Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp1302475pxb; Sat, 23 Apr 2022 02:55:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx1Vu3IDPCGW/McsjAPbh0k4nvUIYIhUdQznU0zNwoCyDhwqcOgBpAgamdgKzOnKvKvVsXY X-Received: by 2002:a17:906:9c09:b0:6e8:89e7:9807 with SMTP id ff9-20020a1709069c0900b006e889e79807mr7744779ejc.473.1650707733725; Sat, 23 Apr 2022 02:55:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650707733; cv=none; d=google.com; s=arc-20160816; b=gY9M8G7NwSfrY6vAZLTFH65OIDMZW8WN2if1FLBSPKhnX1uEmN+70mIjLfcc2ouEfB c0ZudG52oKi6ULgwYXyd5KQjb1pqApvoI4evTGMGYrTgsc3lRsuw6Mk3IS1DHosAnu1E udRG1TLB+gBsICNVrskdx8RNtrqZEJvK/lyPy1xPQHoPyorrgwSLLzNqlw6A7pGaDvih DVre2NNlRyeelCby9fxWlQW8P/Z0tc1TdGRkZ+9YppqW6RUYBiAYh1f56M1lcp9RjrGS IbN6r4mfBa5rIcpB10kO5jnWrrJP5GG52eijgELCkS65or69z+cBwH4dJhlw0Crbd6cW mPcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:in-reply-to:mime-version :user-agent:date:message-id:from:references:cc:to:subject :dkim-signature; bh=/OlakjqnRmEAn/ytZGVcF22kYWzHUx0JWp7WuYws5xc=; b=jBd6gNcOQUJXRqYj9iYAwBrJ4W6vyz3hS4bMOiZIeHEGbPDAWU2Qk4CT1V0mS60pPT UMU1DvSwAtOy72+AR92+mrlvyGWLDr++GbX5YcOv0DiRXonEKiZtyw2kxgfh80yk42bc UGspoMdA+Ic827oMsXWYe/KJX9IBVMMT4kFY8gcYy2FasLLOjdDJHccys9+wDA8WJtPD 2EEh0bJ5+/jw1Py6CDfM0k8fI99MDbiOGFXNNIDXITOog5+WyjsuB6KkzFNcCXuPN7/R 84XMbns3axnfFFSvWi5ygxn8lDIbrIilvCRDtL3iD+aM7jQuzfv7k8+2JPShOCcl2PkI is+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=dG3Cqw8W; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jz8-20020a170906bb0800b006df76385eeasi1428356ejb.906.2022.04.23.02.55.07; Sat, 23 Apr 2022 02:55:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=dG3Cqw8W; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233748AbiDWHI1 (ORCPT + 99 others); Sat, 23 Apr 2022 03:08:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39850 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229984AbiDWHIY (ORCPT ); Sat, 23 Apr 2022 03:08:24 -0400 Received: from mail-lj1-x233.google.com (mail-lj1-x233.google.com [IPv6:2a00:1450:4864:20::233]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8159C62BEA for ; Sat, 23 Apr 2022 00:05:26 -0700 (PDT) Received: by mail-lj1-x233.google.com with SMTP id v1so8664984ljv.3 for ; Sat, 23 Apr 2022 00:05:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language; bh=/OlakjqnRmEAn/ytZGVcF22kYWzHUx0JWp7WuYws5xc=; b=dG3Cqw8W+risw5HhgeGUsOV40IIJN9LsfZ/mAt53EHPXci8Nh+AS0Ukg7ugAniPlvf 2kMqWG/94faucQwjCFPGSlPgAniNw53bC+/Z2jpnNhuAfFOMslvUk8ffO+xJWC6elags DzBBmQPsl2ZWmlUpiBBlF/kAFNvs75hTOMhy9PUF8hRWso+0p7sI8aZARWWvGdyHQMw0 cypec0klqiA/oNpDbS1oDR0knRoiDjcnaD2T5jJwo8w/NfJqc7VmUFOYOb4PF9TfGnUo fX5HlQ1of/u1PYZ2DZwtWGBh26oESoG/Q5kRpeZnQCI1cefaGnb0XbPe80ZES01fcHCu V0bQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language; bh=/OlakjqnRmEAn/ytZGVcF22kYWzHUx0JWp7WuYws5xc=; b=ZY81ZjmA/qhYwwjNoz63Yp8lCiX6iyonrEQvDlgdwusDIH2aRp6NtRzMPVE3JXn/MK B7x/F96eAeuDiq1lxEbMmai5LGJUv9IOUIJdgagOBpAYfkJiAc5itBn9a8NZ4ENxiR9/ TeG3w2N9uAvcC4pLgBK+q+RhUXAdYVLhmbqaiiVjaQx0YP+LZNywlk6E25mVGMJdRBFH 8k139Uw1d6S1Qei4+GNyK6oioknP+pktej/KstHAC0C5sFXfBLUr8E3wcQc97Gg9jlVa BGdI7emnXnsYLHtm7uyPabsEizYsQTCexkdKeejTtUIvNXP6XXGgRbNkRkLAfdauInr6 NGoA== X-Gm-Message-State: AOAM5333Yi6vr4UHAMeN27UA55Xvd/FyerrK/xgObmdVJ3+nGAQP4PxN eQhFRfeLcTgSQTE49qww1cqRM1Q1Gq4= X-Received: by 2002:a2e:9345:0:b0:24b:451:7ce1 with SMTP id m5-20020a2e9345000000b0024b04517ce1mr4877723ljh.258.1650697524590; Sat, 23 Apr 2022 00:05:24 -0700 (PDT) Received: from [192.168.1.7] ([212.22.223.21]) by smtp.gmail.com with ESMTPSA id d6-20020a056512320600b0047196449b7fsm507662lfe.92.2022.04.23.00.05.22 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 23 Apr 2022 00:05:23 -0700 (PDT) Subject: Re: [PATCH V1 3/6] xen/virtio: Add option to restrict memory access under Xen To: Stefano Stabellini Cc: xen-devel@lists.xenproject.org, x86@kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Juergen Gross , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Boris Ostrovsky , Julien Grall , Oleksandr Tyshchenko , "Michael S. Tsirkin" , Christoph Hellwig References: <1650646263-22047-1-git-send-email-olekstysh@gmail.com> <1650646263-22047-4-git-send-email-olekstysh@gmail.com> From: Oleksandr Message-ID: <3de2852b-0a94-fd1d-2eb6-fd818f33fc88@gmail.com> Date: Sat, 23 Apr 2022 10:05:22 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/mixed; boundary="------------1C2D46C789FB115F1F5DE02D" Content-Language: en-US X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is a multi-part message in MIME format. --------------1C2D46C789FB115F1F5DE02D Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit On 23.04.22 02:00, Stefano Stabellini wrote: Hello Stefano > On Fri, 22 Apr 2022, Oleksandr Tyshchenko wrote: >> From: Juergen Gross >> >> Introduce Xen grant DMA-mapping layer which contains special DMA-mapping >> routines for providing grant references as DMA addresses to be used by >> frontends (e.g. virtio) in Xen guests. >> >> In order to support virtio in Xen guests add a config option XEN_VIRTIO >> enabling the user to specify whether in all Xen guests virtio should >> be able to access memory via Xen grant mappings only on the host side. >> >> As this also requires providing arch_has_restricted_virtio_memory_access >> implementation, switch from a pure stub to a real function on Arm >> and combine with existing implementation for the SEV guests on x86. >> >> Add the needed functionality by providing a special set of DMA ops >> handling the needed grant operations for the I/O pages. >> >> Signed-off-by: Juergen Gross >> Signed-off-by: Oleksandr Tyshchenko > There are a couple of minor things that checkpatch.pl reports, Thank you for pointing this out, my fault. > but aside > from those the patch looks fine to me. good The attached diff to be squashed for the new version. One thing remains: checkpatch.pl says regarding drivers/xen/grant-dma-ops.c: WARNING: added, moved or deleted file(s), does MAINTAINERS need updating? #151: new file mode 100644 Which, I assume, this is not an issue as new file falls under XEN HYPERVISOR INTERFACE maintainership? scripts/get_maintainer.pl -f drivers/xen/grant-dma-ops.c Boris Ostrovsky (supporter:XEN HYPERVISOR INTERFACE) Juergen Gross (supporter:XEN HYPERVISOR INTERFACE) Stefano Stabellini (reviewer:XEN HYPERVISOR INTERFACE) xen-devel@lists.xenproject.org (moderated list:XEN HYPERVISOR INTERFACE) linux-kernel@vger.kernel.org (open list) [snip] -- Regards, Oleksandr Tyshchenko --------------1C2D46C789FB115F1F5DE02D Content-Type: text/x-patch; charset=UTF-8; name="0001-fixup.patch" Content-Transfer-Encoding: 8bit Content-Disposition: attachment; filename="0001-fixup.patch" From 8d36fc5a3604a69848c300a42f1a78f8ace41829 Mon Sep 17 00:00:00 2001 From: Oleksandr Tyshchenko Date: Sat, 23 Apr 2022 09:23:04 +0300 Subject: [PATCH] fixup Signed-off-by: Oleksandr Tyshchenko --- drivers/xen/Kconfig | 2 ++ drivers/xen/grant-dma-ops.c | 21 ++++++++++++--------- 2 files changed, 14 insertions(+), 9 deletions(-) diff --git a/drivers/xen/Kconfig b/drivers/xen/Kconfig index b95581f..1727337 100644 --- a/drivers/xen/Kconfig +++ b/drivers/xen/Kconfig @@ -350,4 +350,6 @@ config XEN_VIRTIO guest type this will require special support on the backend side (qemu or kernel, depending on the virtio device types used). + If in doubt, say n. + endmenu diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c index 70d5d77..b9d93d7 100644 --- a/drivers/xen/grant-dma-ops.c +++ b/drivers/xen/grant-dma-ops.c @@ -139,7 +139,7 @@ static struct page *xen_grant_dma_alloc_pages(struct device *dev, size_t size, enum dma_data_direction dir, gfp_t gfp) { - WARN_ONCE(1, "xen_grant_dma_alloc_pages size %zu\n", size); + WARN_ONCE(1, "%s: size %zu\n", __func__, size); return NULL; } @@ -147,7 +147,7 @@ static void xen_grant_dma_free_pages(struct device *dev, size_t size, struct page *vaddr, dma_addr_t dma_handle, enum dma_data_direction dir) { - WARN_ONCE(1, "xen_grant_dma_free_pages size %zu\n", size); + WARN_ONCE(1, "%s: size %zu\n", __func__, size); } static dma_addr_t xen_grant_dma_map_page(struct device *dev, struct page *page, @@ -160,7 +160,8 @@ static dma_addr_t xen_grant_dma_map_page(struct device *dev, struct page *page, grant_ref_t grant; dma_addr_t dma_handle; - BUG_ON(dir == DMA_NONE); + if (WARN_ON(dir == DMA_NONE)) + return DMA_MAPPING_ERROR; data = find_xen_grant_dma_data(dev); if (!data) @@ -190,7 +191,8 @@ static void xen_grant_dma_unmap_page(struct device *dev, dma_addr_t dma_handle, unsigned int i, n_pages = PFN_UP(size); grant_ref_t grant; - BUG_ON(dir == DMA_NONE); + if (WARN_ON(dir == DMA_NONE)) + return; data = find_xen_grant_dma_data(dev); if (!data) @@ -219,7 +221,8 @@ static void xen_grant_dma_unmap_sg(struct device *dev, struct scatterlist *sg, struct scatterlist *s; unsigned int i; - BUG_ON(dir == DMA_NONE); + if (WARN_ON(dir == DMA_NONE)) + return; for_each_sg(sg, s, nents, i) xen_grant_dma_unmap_page(dev, s->dma_address, sg_dma_len(s), dir, @@ -233,7 +236,8 @@ static int xen_grant_dma_map_sg(struct device *dev, struct scatterlist *sg, struct scatterlist *s; unsigned int i; - BUG_ON(dir == DMA_NONE); + if (WARN_ON(dir == DMA_NONE)) + return -EINVAL; for_each_sg(sg, s, nents, i) { s->dma_address = xen_grant_dma_map_page(dev, sg_page(s), s->offset, @@ -303,10 +307,9 @@ void xen_grant_setup_dma_ops(struct device *dev) } data = devm_kzalloc(dev, sizeof(*data), GFP_KERNEL); - if (!data) { - dev_err(dev, "Сannot allocate Xen grant DMA data\n"); + if (!data) goto err; - } + data->dev_domid = dev_domid; data->dev = dev; -- 2.7.4 --------------1C2D46C789FB115F1F5DE02D--