Received: by 10.223.164.202 with SMTP id h10csp77972wrb; Thu, 30 Nov 2017 07:13:34 -0800 (PST) X-Google-Smtp-Source: AGs4zMZimGfHWEb3cOBE/A826ExMnF/kNPrWd1zk8hNYPowpGEZblR1Fj0Zr4RdmkLYcJFfpbozV X-Received: by 10.98.196.77 with SMTP id y74mr7049456pff.186.1512054814597; Thu, 30 Nov 2017 07:13:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1512054814; cv=none; d=google.com; s=arc-20160816; b=GdnGQgWqjNG6GOfshITf9QGW7Shkc+AsTf6AP0OTTvpDwNlmJcRPdL6CKo8oyG8PBM GAlhDbbh8PugYb18RDdO5LxcutMbC5Y1OFHk2UMUGu5u0b7/F6emZePZS6u52Y/MiMzx DA7WcXKEMayMUZ4qa8wJ0t/Qv3yUoZa2sMrAgeI3sb0VNoHi7k5QTOADxb7aLsgy3NA0 li0wD+B4DJpuGSqseZJbslYHQ9E4B8EiO++muqq8eBwWUpvjhkb7cvXkAjtXuq7TA1Rd rv4hVBQv7gUVPQxGjyNNpzG/n6z+D5PtcqsLtLAaDH33l9TTXD+8kxXYLEIWmu4jJH+4 2Zeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject:arc-authentication-results; bh=dCpfMHct1pI69YWrRwtu3TynlDEaCeP7YLw3BZh4DV0=; b=ZInubXGk+xjA4owYOE3OUOSzlvEAFjlnQvHIXExSFy+nLxziDi1xKekDJfCAnHVV2q SKSL63mhi/o0bATQ7IpGuIyU87cSH6TIyfVUB/QinXdmeHWdoPrtt6LWtY2mqz657ped 8dvROKRzxX650f9JIZgD17lb2rF7InToRDRbIYhMS05oJqBJtXyZhDudvpCk8clyV/OW foWnaDcNBkZCspA+CQLidOLpqBS0OyTOEq2iavNQFzmGf62bl6i+ZKXusDAAJPMPtFJS hG0f7W3T+vUnm3SD5Vs0xncCwkiJoOA0dQ58wFov+eR20DyxWHWSLEL/euuNvMxgb4JT Q3+Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 95si3218447plc.547.2017.11.30.07.12.56; Thu, 30 Nov 2017 07:13:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753133AbdK3PLq (ORCPT + 99 others); Thu, 30 Nov 2017 10:11:46 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:38286 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752184AbdK3PLo (ORCPT ); Thu, 30 Nov 2017 10:11:44 -0500 Received: from pps.filterd (m0098420.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id vAUF9fO6063590 for ; Thu, 30 Nov 2017 10:11:44 -0500 Received: from e06smtp11.uk.ibm.com (e06smtp11.uk.ibm.com [195.75.94.107]) by mx0b-001b2d01.pphosted.com with ESMTP id 2ejk1m684j-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Thu, 30 Nov 2017 10:11:43 -0500 Received: from localhost by e06smtp11.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 30 Nov 2017 15:11:38 -0000 Received: from b06cxnps3075.portsmouth.uk.ibm.com (9.149.109.195) by e06smtp11.uk.ibm.com (192.168.101.141) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Thu, 30 Nov 2017 15:11:36 -0000 Received: from d06av26.portsmouth.uk.ibm.com (d06av26.portsmouth.uk.ibm.com [9.149.105.62]) by b06cxnps3075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id vAUFBaYv64225510; Thu, 30 Nov 2017 15:11:36 GMT Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id CA226AE045; Thu, 30 Nov 2017 15:04:41 +0000 (GMT) Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 75B55AE051; Thu, 30 Nov 2017 15:04:41 +0000 (GMT) Received: from [9.145.49.184] (unknown [9.145.49.184]) by d06av26.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 30 Nov 2017 15:04:41 +0000 (GMT) Subject: Re: [PATCH] vfio/iommu_type1: report the IOMMU aperture info To: Alex Williamson Cc: cohuck@redhat.com, borntraeger@de.ibm.com, zyimin@linux.vnet.ibm.com, pasic@linux.vnet.ibm.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org References: <1512041678-4563-1-git-send-email-pmorel@linux.vnet.ibm.com> <20171130070844.7d6c5053@t450s.home> From: Pierre Morel Date: Thu, 30 Nov 2017 16:11:35 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 In-Reply-To: <20171130070844.7d6c5053@t450s.home> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 17113015-0040-0000-0000-000004146E56 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17113015-0041-0000-0000-000020B75711 Message-Id: X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-11-30_04:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1711300199 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 30/11/2017 15:08, Alex Williamson wrote: > On Thu, 30 Nov 2017 12:34:38 +0100 > Pierre Morel wrote: > >> When userland VFIO defines a new IOMMU for a guest it may >> want to specify to the guest the physical limits of >> the underlying host IOMMU to avoid access to forbidden >> memory ranges. >> >> Currently, the vfio_iommu_type1 driver does not report this >> information to userland. >> >> Let's extend the vfio_iommu_type1_info structure reported >> by the ioctl VFIO_IOMMU_GET_INFO command to report the >> IOMMU limits as new uint64_t entries aperture_start and >> aperture_end. >> >> Let's also extend the flags bit map to add a flag specifying >> if this extension of the info structure is reported or not. >> >> Signed-off-by: Pierre Morel >> --- >> drivers/vfio/vfio_iommu_type1.c | 42 +++++++++++++++++++++++++++++++++++++++++ >> include/uapi/linux/vfio.h | 3 +++ >> 2 files changed, 45 insertions(+) >> >> diff --git a/drivers/vfio/vfio_iommu_type1.c b/drivers/vfio/vfio_iommu_type1.c >> index 8549cb1..7da5fe0 100644 >> --- a/drivers/vfio/vfio_iommu_type1.c >> +++ b/drivers/vfio/vfio_iommu_type1.c >> @@ -1526,6 +1526,40 @@ static int vfio_domains_have_iommu_cache(struct vfio_iommu *iommu) >> return ret; >> } >> >> +/** >> + * vfio_get_aperture - report minimal aperture of a vfio_iommu >> + * @iommu: the current vfio_iommu >> + * @start: a pointer to the aperture start >> + * @end : a pointer to the aperture end >> + * >> + * This function iterate on the domains using the given vfio_iommu >> + * and restrict the aperture to the minimal aperture common >> + * to all domains sharing this vfio_iommu. >> + */ >> +static void vfio_get_aperture(struct vfio_iommu *iommu, uint64_t *start, >> + uint64_t *end) >> +{ >> + struct iommu_domain_geometry geometry; >> + struct vfio_domain *domain; >> + >> + *start = 0; >> + *end = U64_MAX; >> + >> + mutex_lock(&iommu->lock); >> + /* loop on all domains using this vfio_iommu */ >> + list_for_each_entry(domain, &iommu->domain_list, next) { >> + iommu_domain_get_attr(domain->domain, DOMAIN_ATTR_GEOMETRY, >> + &geometry); >> + if (geometry.force_aperture) { >> + if (geometry.aperture_start > *start) >> + *start = geometry.aperture_start; >> + if (geometry.aperture_end < *end) >> + *end = geometry.aperture_end; >> + } >> + } >> + mutex_unlock(&iommu->lock); >> +} >> + >> static long vfio_iommu_type1_ioctl(void *iommu_data, >> unsigned int cmd, unsigned long arg) >> { >> @@ -1560,6 +1594,14 @@ static long vfio_iommu_type1_ioctl(void *iommu_data, >> >> info.iova_pgsizes = vfio_pgsize_bitmap(iommu); >> >> + minsz = min_t(size_t, info.argsz, sizeof(info)); >> + if (minsz >= offsetofend(struct vfio_iommu_type1_info, >> + aperture_end)) { >> + info.flags |= VFIO_IOMMU_INFO_APERTURE; >> + vfio_get_aperture(iommu, &info.aperture_start, >> + &info.aperture_end); >> + } >> + >> return copy_to_user((void __user *)arg, &info, minsz) ? >> -EFAULT : 0; >> >> diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h >> index 0fb25fb..780d909 100644 >> --- a/include/uapi/linux/vfio.h >> +++ b/include/uapi/linux/vfio.h >> @@ -519,6 +519,9 @@ struct vfio_iommu_type1_info { >> __u32 flags; >> #define VFIO_IOMMU_INFO_PGSIZES (1 << 0) /* supported page sizes info */ >> __u64 iova_pgsizes; /* Bitmap of supported page sizes */ >> +#define VFIO_IOMMU_INFO_APERTURE (1 << 1) /* supported aperture info */ >> + __u64 aperture_start; /* start of DMA aperture */ >> + __u64 aperture_end; /* end of DMA aperture */ >> }; >> >> #define VFIO_IOMMU_GET_INFO _IO(VFIO_TYPE, VFIO_BASE + 12) > > This only supports the most simple topology, even x86 cannot claim to > have a single contiguous aperture, it's typically bisected by an MSI > window. I think we need an API that supports one or more apertures > out of the box. Also as Eric indicates, a capability is probably the > better option for creating a flexible structure. Thanks, > > Alex > Yes, I understand that a capability here is a must, I will follow this way. For having multiple aperture and MSI protection, I understood it was done using windows and reserved regions. Can you point me to my error? Thanks, Pierre -- Pierre Morel Linux/KVM/QEMU in Böblingen - Germany From 1585503044672071238@xxx Thu Nov 30 14:52:12 +0000 2017 X-GM-THRID: 1585490648319889089 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread