Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp840442pxj; Thu, 3 Jun 2021 22:40:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxe4jFK47UXELPb1HctbesLg/CGnPftUuKnYAgPd/w06D3Z1SE81B3bQlHS02c8XImP/HKo X-Received: by 2002:a17:907:6288:: with SMTP id nd8mr2631104ejc.223.1622785204561; Thu, 03 Jun 2021 22:40:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622785204; cv=none; d=google.com; s=arc-20160816; b=rULeR29j7JTf+Z2HR7VCfDy5aWA5uBupaLKMFW130WQsNjsoibkQdQ0QrFBZZvjEze deBgx7C8vJZyWqieABz4aD4OLSNH5pBvrJ0OeYxt8VNsXp1GZ9X40arS0xRL3ItE2hoX 0fWXuU0hh/bHHL85SEkeC5EA+1NjfxDgvqTOZpSop2OGXRLvUC5R/VAHPBH0tN/IHlHn kJA1fMI6jYtjmpOgC+/LGfOC37tJsBQo6ZDPsQjrFBNCSGUIAf7bZYgwC3S1unXhd3Sl 3hgY8Kc3v+4ymru/a2vLQ9JUvEETcdtoaXBmuh2JHq97w/E/ELh/5FNMvJ1ZRIA5GjSF uy0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=goPsG0ZvybVWv4Ouo01fpZW4lJeP0aNbCe0a5SKG3dU=; b=OSp8HzCItyX20POk73g9Wt0AAUnWNqeKug+nsEJ8a8S0UBwC3B8X52bHc5x4q0ai2z RI6hWD12+ituOTg7wJtpyP+Aux6CNCdTTejLTo9T/rdOiPvMqmSrljulePWFr2ZxdLq8 oRvxICpIBYI86CWMznD+6EexPK9r9tMPC413Mgm7ejw3xWEpqkgdeBvOb2AI7ubKFOFW b+HpXEGxfQvFAusCugG0Mr89PolF/1N3bxCiYRYN8atdd0HCPbOmmfXG9WhyGomVyaQ4 L63cWhxNb+4UjCAnHiivMde5mYvtfXzivt+t7J4tOADdnX5RcUyVk1Bp93i8Q9VndLKN WwOA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=NV9NFg8b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jx12si4087783ejc.502.2021.06.03.22.39.39; Thu, 03 Jun 2021 22:40:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=NV9NFg8b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229852AbhFDFkA (ORCPT + 99 others); Fri, 4 Jun 2021 01:40:00 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:44794 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229787AbhFDFj7 (ORCPT ); Fri, 4 Jun 2021 01:39:59 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1622785093; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=goPsG0ZvybVWv4Ouo01fpZW4lJeP0aNbCe0a5SKG3dU=; b=NV9NFg8b14VXo2Qwmqh0i6tnIWwZACRDCl00JdHJPMIsYrAxPlf0lzzOFef0oEPpVsosgE jpT9Pc+4meW4RBtpRFcZjOFMYwautjQgfNbUoUKBLbLbdgeO1b4E8TyUUC74L4auvqAXv9 3aPJERwBcNPmGEWqyG8K3nYITsXDWIs= Received: from mail-pl1-f200.google.com (mail-pl1-f200.google.com [209.85.214.200]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-31-lRMLPHkqPl-JJPqSv8nWXA-1; Fri, 04 Jun 2021 01:38:12 -0400 X-MC-Unique: lRMLPHkqPl-JJPqSv8nWXA-1 Received: by mail-pl1-f200.google.com with SMTP id a6-20020a1709027d86b02901019f88b046so3692573plm.21 for ; Thu, 03 Jun 2021 22:38:12 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=goPsG0ZvybVWv4Ouo01fpZW4lJeP0aNbCe0a5SKG3dU=; b=PF02tVxRkX3fS+t+7XPIZMuLd1nZ4bOeLQB0W/WDjTJfuzPAYQ45Nxpm+NwyOWonET XLLzMo0MEhz8nKZ92k4PimvJK0gzcdjPRtXrGS3/qIx5uEyU71ayrXg94v974imdkIZJ F+ZwQutbr5K6N39tE2q65BffqGL2PGn8dBmKDzWXmp2uKxuGs96GK5gRVVTziq27T3+H 4rxZwqE9aoEpRZAbfV/TzZuKJP9Mmy85Qa61IdeN56zcHhPd0lffDRqMnRqkxr142zhW 6HB/jomdhqGazFeXGQ59GFHB6zjFJPnZWBGjgnXT7oxJwT0Kqc+3Mb1ws8Y5M+k4eqvP sN1g== X-Gm-Message-State: AOAM530BQzSb7Ca7dwBhlDa0r0o7+u4jMuJRAhIWMiEVpEfYN0bnBlai hFz3mWxvT4HmlgtMW3OwJMoYrK62NpVd/NHJ+VfehEH1kwxeDcYsNhm8pWsp0uG5vmCaIUf7qPb xnE0qaTaJ0kxmXVypTvCWRMk+ X-Received: by 2002:a65:6209:: with SMTP id d9mr3255086pgv.39.1622785091239; Thu, 03 Jun 2021 22:38:11 -0700 (PDT) X-Received: by 2002:a65:6209:: with SMTP id d9mr3255058pgv.39.1622785090898; Thu, 03 Jun 2021 22:38:10 -0700 (PDT) Received: from wangxiaodeMacBook-Air.local ([209.132.188.80]) by smtp.gmail.com with ESMTPSA id e17sm694312pfi.131.2021.06.03.22.38.06 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 03 Jun 2021 22:38:10 -0700 (PDT) Subject: Re: [RFC PATCH V2 0/7] Do not read from descripto ring To: "Michael S. Tsirkin" , Christoph Hellwig Cc: virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, xieyongji@bytedance.com, stefanha@redhat.com, file@sect.tu-berlin.de, ashish.kalra@amd.com, konrad.wilk@oracle.com, kvm@vger.kernel.org References: <20210423080942.2997-1-jasowang@redhat.com> <0e9d70b7-6c8a-4ff5-1fa9-3c4f04885bb8@redhat.com> <20210506041057-mutt-send-email-mst@kernel.org> <20210506123829.GA403858@infradead.org> <20210514063516-mutt-send-email-mst@kernel.org> From: Jason Wang Message-ID: <8bf22db2-97d4-9f88-8b6b-d685fd63ac8b@redhat.com> Date: Fri, 4 Jun 2021 13:38:01 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.10.2 MIME-Version: 1.0 In-Reply-To: <20210514063516-mutt-send-email-mst@kernel.org> Content-Type: text/plain; charset=gbk; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ?? 2021/5/14 ????7:13, Michael S. Tsirkin ะด??: > On Thu, May 06, 2021 at 01:38:29PM +0100, Christoph Hellwig wrote: >> On Thu, May 06, 2021 at 04:12:17AM -0400, Michael S. Tsirkin wrote: >>> Let's try for just a bit, won't make this window anyway: >>> >>> I have an old idea. Add a way to find out that unmap is a nop >>> (or more exactly does not use the address/length). >>> Then in that case even with DMA API we do not need >>> the extra data. Hmm? >> So we actually do have a check for that from the early days of the DMA >> API, but it only works at compile time: CONFIG_NEED_DMA_MAP_STATE. >> >> But given how rare configs without an iommu or swiotlb are these days >> it has stopped to be very useful. Unfortunately a runtime-version is >> not entirely trivial, but maybe if we allow for false positives we >> could do something like this >> >> bool dma_direct_need_state(struct device *dev) >> { >> /* some areas could not be covered by any map at all */ >> if (dev->dma_range_map) >> return false; >> if (force_dma_unencrypted(dev)) >> return false; >> if (dma_direct_need_sync(dev)) >> return false; >> return *dev->dma_mask == DMA_BIT_MASK(64); >> } >> >> bool dma_need_state(struct device *dev) >> { >> const struct dma_map_ops *ops = get_dma_ops(dev); >> >> if (dma_map_direct(dev, ops)) >> return dma_direct_need_state(dev); >> return ops->unmap_page || >> ops->sync_single_for_cpu || ops->sync_single_for_device; >> } > Yea that sounds like a good idea. We will need to document that. > > > Something like: > > /* > * dma_need_state - report whether unmap calls use the address and length > * @dev: device to guery > * > * This is a runtime version of CONFIG_NEED_DMA_MAP_STATE. > * > * Return the value indicating whether dma_unmap_* and dma_sync_* calls for the device > * use the DMA state parameters passed to them. > * The DMA state parameters are: scatter/gather list/table, address and > * length. > * > * If dma_need_state returns false then DMA state parameters are > * ignored by all dma_unmap_* and dma_sync_* calls, so it is safe to pass 0 for > * address and length, and DMA_UNMAP_SG_TABLE_INVALID and > * DMA_UNMAP_SG_LIST_INVALID for s/g table and length respectively. > * If dma_need_state returns true then DMA state might > * be used and so the actual values are required. > */ > > And we will need DMA_UNMAP_SG_TABLE_INVALID and > DMA_UNMAP_SG_LIST_INVALID as pointers to an empty global table and list > for calls such as dma_unmap_sgtable that dereference pointers before checking > they are used. > > > Does this look good? > > The table/length variants are for consistency, virtio specifically does > not use s/g at the moment, but it seems nicer than leaving > users wonder what to do about these. > > Thoughts? Jason want to try implementing? I can add it in my todo list other if other people are interested in this, please let us know. But this is just about saving the efforts of unmap and it doesn't eliminate the necessary of using private memory (addr, length) for the metadata for validating the device inputs. And just to clarify, the slight regression we see is testing without VIRTIO_F_ACCESS_PLATFORM which means DMA API is not used. So I will go to post a formal version of this series and we can start from there. Thanks >