Received: by 10.223.164.202 with SMTP id h10csp1946539wrb; Thu, 16 Nov 2017 07:00:47 -0800 (PST) X-Google-Smtp-Source: AGs4zMb4gFNLzYfNFhE7LFdPjfg7c6/WbIGvgAlSZ6p+bKn+4Tjeuoc7cA5AImQapEUagtjX1s1Y X-Received: by 10.101.77.139 with SMTP id p11mr1923645pgq.286.1510844447155; Thu, 16 Nov 2017 07:00:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1510844447; cv=none; d=google.com; s=arc-20160816; b=cu8k+0KX/q4F0TrFQhD0MropqjBT+RrR9snOiPzpgP2g3fW3oxSX7jpB7CYBxIZ/tC unOWHufpQkLHMJ3+3AueOG1jk1ofTpZLG2ZANYz05yyzRiGNoOskF4epMof0oa2sQpSX WGR7lRBCT+FZ5TYBuX/JO4tGtOgVn7kFpu+ltYP4xdP3taaVKuwXEROwnGzMOxzJC3M1 KdmaQzWW/I/qUXejT4+hOdq9Sd5XKROVch7/CgjFsSkwsv5btqJVUOVLXrE1kIs2DnOd l+hlDMhR1yAMtyNX6BGXG67jujhZg7Di+h/jQ7q283eUSaTAr17Hj3nvq2JD83eT7PIM o8oQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:thread-index:thread-topic :content-transfer-encoding:mime-version:subject:references :in-reply-to:message-id:cc:to:from:date:arc-authentication-results; bh=n5HmTdlSRsZ9n3yL/VQI8nMQ8iyXSb3YTMBPxJe0+Sc=; b=LNg8vW16NBNfIYOdo15L2Dv2tQDgJIumhWD4UIdrurj87U2UIAUjVIzu5nTafZMwPq EM0wsfwuwA1UMfuE2TKdEKEELhFIv3H702THr06d3QC3kAm9eK9V8TR/V7lsjfkk2w8x 4poOr/jdAcwwt4piKF7FSafUjRnD8X0ITe/cp7p1wizmibhdZFO3/u0U+7LCcaJj3mNw FqGhPH8EN25KB6OUWM6zzjBvNMvD3VpP51dNSB+rB1GVy/qxeq9OpL7WRDBGqNp25sbY c9vTVgwFnxHDbTRbXxfKn/GNlvwBfmgQE7+C4WTJM4v6bMudOf2ZCvZYYJpqM8X5+un2 0oig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q9si997055plr.526.2017.11.16.07.00.33; Thu, 16 Nov 2017 07:00:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934780AbdKPMnI convert rfc822-to-8bit (ORCPT + 91 others); Thu, 16 Nov 2017 07:43:08 -0500 Received: from mx1.redhat.com ([209.132.183.28]:52476 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754009AbdKPMnD (ORCPT ); Thu, 16 Nov 2017 07:43:03 -0500 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 63AEFC047B89; Thu, 16 Nov 2017 12:43:03 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.20]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 5923B503AE; Thu, 16 Nov 2017 12:43:03 +0000 (UTC) Received: from zmail17.collab.prod.int.phx2.redhat.com (zmail17.collab.prod.int.phx2.redhat.com [10.5.83.19]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 343951800BD1; Thu, 16 Nov 2017 12:43:03 +0000 (UTC) Date: Thu, 16 Nov 2017 07:43:03 -0500 (EST) From: =?utf-8?Q?Marc-Andr=C3=A9?= Lureau To: "Michael S. Tsirkin" Cc: linux-kernel@vger.kernel.org, somlo@cmu.edu, qemu-devel@nongnu.org Message-ID: <2130338277.40704113.1510836183020.JavaMail.zimbra@redhat.com> In-Reply-To: <20171116033116-mutt-send-email-mst@kernel.org> References: <20171113192750.6505-1-marcandre.lureau@redhat.com> <20171113192750.6505-4-marcandre.lureau@redhat.com> <20171116033116-mutt-send-email-mst@kernel.org> Subject: Re: [PATCH v6 3/5] fw_cfg: do DMA read operation MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT X-Originating-IP: [10.36.112.69, 10.4.195.26] Thread-Topic: fw_cfg: do DMA read operation Thread-Index: ZAQfF7ry/umJ9/cdgEqQwNVMSxMrdA== X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Thu, 16 Nov 2017 12:43:03 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi ----- Original Message ----- > On Mon, Nov 13, 2017 at 08:27:48PM +0100, Marc-André Lureau wrote: > > Modify fw_cfg_read_blob() to use DMA if the device supports it. > > Return errors, because the operation may fail. > > > > To avoid polling with unbound amount of time, the DMA operation is > > expected to complete within 200ms, or will return ETIME error. > > > > We may want to switch all the *buf addresses to use only kmalloc'ed > > buffers (instead of using stack/image addresses with dma=false). > > > > Signed-off-by: Marc-André Lureau > > Reviewed-by: Gabriel Somlo > > This is causing issues for some people. I have reverted it for now. I didn't know you merged it, where did it go? If you are talking about kernel test robot, it seems to be the timeout. I picked FW_CFG_DMA_TIMEOUT 200ms by guess, we may want to extend that for busy hosts. How much? several seconds? > I wonder why bother with DMA reads. Can we limit DMA to writes? Well, we could, but DMA reads are supposedly quite faster. And if DMA read is broken, there are good chances that DMA write will too. > > --- > > drivers/firmware/qemu_fw_cfg.c | 154 > > ++++++++++++++++++++++++++++++++++++----- > > 1 file changed, 137 insertions(+), 17 deletions(-) > > > > diff --git a/drivers/firmware/qemu_fw_cfg.c > > b/drivers/firmware/qemu_fw_cfg.c > > index 1f3e8545dab7..2ac4cd869fe6 100644 > > --- a/drivers/firmware/qemu_fw_cfg.c > > +++ b/drivers/firmware/qemu_fw_cfg.c > > @@ -33,6 +33,8 @@ > > #include > > #include > > #include > > +#include > > +#include > > > > MODULE_AUTHOR("Gabriel L. Somlo "); > > MODULE_DESCRIPTION("QEMU fw_cfg sysfs support"); > > @@ -43,12 +45,26 @@ MODULE_LICENSE("GPL"); > > #define FW_CFG_ID 0x01 > > #define FW_CFG_FILE_DIR 0x19 > > > > +#define FW_CFG_VERSION_DMA 0x02 > > +#define FW_CFG_DMA_CTL_ERROR 0x01 > > +#define FW_CFG_DMA_CTL_READ 0x02 > > +#define FW_CFG_DMA_CTL_SKIP 0x04 > > +#define FW_CFG_DMA_CTL_SELECT 0x08 > > +#define FW_CFG_DMA_CTL_WRITE 0x10 > > +#define FW_CFG_DMA_TIMEOUT 200 /* ms */ > > + > > /* size in bytes of fw_cfg signature */ > > #define FW_CFG_SIG_SIZE 4 > > > > /* fw_cfg "file name" is up to 56 characters (including terminating nul) > > */ > > #define FW_CFG_MAX_FILE_PATH 56 > > > > +/* platform device for dma mapping */ > > +static struct device *dev; > > + > > +/* fw_cfg revision attribute, in /sys/firmware/qemu_fw_cfg top-level dir. > > */ > > +static u32 fw_cfg_rev; > > + > > /* fw_cfg file directory entry type */ > > struct fw_cfg_file { > > u32 size; > > @@ -57,6 +73,12 @@ struct fw_cfg_file { > > char name[FW_CFG_MAX_FILE_PATH]; > > }; > > > > +struct fw_cfg_dma { > > + u32 control; > > + u32 length; > > + u64 address; > > +} __packed; > > + > > /* fw_cfg device i/o register addresses */ > > static bool fw_cfg_is_mmio; > > static phys_addr_t fw_cfg_p_base; > > @@ -75,12 +97,93 @@ static inline u16 fw_cfg_sel_endianness(u16 key) > > return fw_cfg_is_mmio ? cpu_to_be16(key) : cpu_to_le16(key); > > } > > > > +static inline bool fw_cfg_dma_enabled(void) > > +{ > > + return fw_cfg_rev & FW_CFG_VERSION_DMA && fw_cfg_reg_dma; > > +} > > + > > +static bool fw_cfg_wait_for_control(struct fw_cfg_dma *d, unsigned long > > timeout) > > +{ > > + ktime_t start; > > + ktime_t stop; > > + > > + start = ktime_get(); > > + stop = ktime_add(start, ms_to_ktime(timeout)); > > + > > + do { > > + if ((be32_to_cpu(d->control) & ~FW_CFG_DMA_CTL_ERROR) == 0) > > + return true; > > + > > + usleep_range(50, 100); > > + } while (ktime_before(ktime_get(), stop)); > > + > > + return false; > > +} > > + > > +static ssize_t fw_cfg_dma_transfer(void *address, u32 length, u32 control) > > +{ > > + dma_addr_t dma_addr = 0; > > + struct fw_cfg_dma *d; > > + dma_addr_t dma; > > + ssize_t ret = length; > > + enum dma_data_direction dir = > > + (control & FW_CFG_DMA_CTL_READ ? DMA_FROM_DEVICE : 0); > > + > > + if (address && length) { > > + dma_addr = dma_map_single(dev, address, length, dir); > > + if (dma_mapping_error(NULL, dma_addr)) { > > + WARN(1, "%s: failed to map address\n", __func__); > > + return -EFAULT; > > + } > > + } > > + > > + d = kmalloc(sizeof(*d), GFP_KERNEL | GFP_DMA); > > + if (!d) { > > + ret = -ENOMEM; > > + goto end; > > + } > > + > > + dma = dma_map_single(dev, d, sizeof(*d), DMA_BIDIRECTIONAL); > > + if (dma_mapping_error(NULL, dma)) { > > + WARN(1, "%s: failed to map fw_cfg_dma\n", __func__); > > + ret = -EFAULT; > > + goto end; > > + } > > + > > + *d = (struct fw_cfg_dma) { > > + .address = cpu_to_be64(dma_addr), > > + .length = cpu_to_be32(length), > > + .control = cpu_to_be32(control) > > + }; > > + > > + iowrite32be((u64)dma >> 32, fw_cfg_reg_dma); > > + iowrite32be(dma, fw_cfg_reg_dma + 4); > > + > > + if (!fw_cfg_wait_for_control(d, FW_CFG_DMA_TIMEOUT)) { > > + WARN(1, "%s: timeout", __func__); > > + ret = -ETIME; > > + } else if (be32_to_cpu(d->control) & FW_CFG_DMA_CTL_ERROR) { > > + ret = -EIO; > > + } > > + > > + dma_unmap_single(dev, dma, sizeof(*d), DMA_BIDIRECTIONAL); > > + > > +end: > > + kfree(d); > > + if (dma_addr) > > + dma_unmap_single(dev, dma_addr, length, dir); > > + > > + return ret; > > +} > > + > > /* read chunk of given fw_cfg blob (caller responsible for sanity-check) > > */ > > -static inline void fw_cfg_read_blob(u16 key, > > - void *buf, loff_t pos, size_t count) > > +static ssize_t fw_cfg_read_blob(u16 key, > > + void *buf, loff_t pos, size_t count, > > + bool dma) > > { > > u32 glk = -1U; > > acpi_status status; > > + ssize_t ret = count; > > > > /* If we have ACPI, ensure mutual exclusion against any potential > > * device access by the firmware, e.g. via AML methods: > > @@ -90,17 +193,36 @@ static inline void fw_cfg_read_blob(u16 key, > > /* Should never get here */ > > WARN(1, "fw_cfg_read_blob: Failed to lock ACPI!\n"); > > memset(buf, 0, count); > > - return; > > + return -EINVAL; > > } > > > > mutex_lock(&fw_cfg_dev_lock); > > - iowrite16(fw_cfg_sel_endianness(key), fw_cfg_reg_ctrl); > > - while (pos-- > 0) > > - ioread8(fw_cfg_reg_data); > > - ioread8_rep(fw_cfg_reg_data, buf, count); > > + if (dma && fw_cfg_dma_enabled()) { > > + if (pos == 0) { > > + ret = fw_cfg_dma_transfer(buf, count, key << 16 > > + | FW_CFG_DMA_CTL_SELECT > > + | FW_CFG_DMA_CTL_READ); > > + } else { > > + iowrite16(fw_cfg_sel_endianness(key), fw_cfg_reg_ctrl); > > + ret = fw_cfg_dma_transfer(NULL, pos, FW_CFG_DMA_CTL_SKIP); > > + if (ret < 0) > > + goto end; > > + ret = fw_cfg_dma_transfer(buf, count, > > + FW_CFG_DMA_CTL_READ); > > + } > > + } else { > > + iowrite16(fw_cfg_sel_endianness(key), fw_cfg_reg_ctrl); > > + while (pos-- > 0) > > + ioread8(fw_cfg_reg_data); > > + ioread8_rep(fw_cfg_reg_data, buf, count); > > + } > > + > > +end: > > mutex_unlock(&fw_cfg_dev_lock); > > > > acpi_release_global_lock(glk); > > + > > + return ret; > > } > > > > /* clean up fw_cfg device i/o */ > > @@ -192,7 +314,7 @@ static int fw_cfg_do_platform_probe(struct > > platform_device *pdev) > > #endif > > > > /* verify fw_cfg device signature */ > > - fw_cfg_read_blob(FW_CFG_SIGNATURE, sig, 0, FW_CFG_SIG_SIZE); > > + fw_cfg_read_blob(FW_CFG_SIGNATURE, sig, 0, FW_CFG_SIG_SIZE, false); > > if (memcmp(sig, "QEMU", FW_CFG_SIG_SIZE) != 0) { > > fw_cfg_io_cleanup(); > > return -ENODEV; > > @@ -201,9 +323,6 @@ static int fw_cfg_do_platform_probe(struct > > platform_device *pdev) > > return 0; > > } > > > > -/* fw_cfg revision attribute, in /sys/firmware/qemu_fw_cfg top-level dir. > > */ > > -static u32 fw_cfg_rev; > > - > > static ssize_t fw_cfg_showrev(struct kobject *k, struct attribute *a, char > > *buf) > > { > > return sprintf(buf, "%u\n", fw_cfg_rev); > > @@ -351,8 +470,7 @@ static ssize_t fw_cfg_sysfs_read_raw(struct file *filp, > > struct kobject *kobj, > > if (count > entry->f.size - pos) > > count = entry->f.size - pos; > > > > - fw_cfg_read_blob(entry->f.select, buf, pos, count); > > - return count; > > + return fw_cfg_read_blob(entry->f.select, buf, pos, count, true); > > } > > > > static struct bin_attribute fw_cfg_sysfs_attr_raw = { > > @@ -505,7 +623,7 @@ static int fw_cfg_register_dir_entries(void) > > struct fw_cfg_file *dir; > > size_t dir_size; > > > > - fw_cfg_read_blob(FW_CFG_FILE_DIR, &count, 0, sizeof(count)); > > + fw_cfg_read_blob(FW_CFG_FILE_DIR, &count, 0, sizeof(count), false); > > count = be32_to_cpu(count); > > dir_size = count * sizeof(struct fw_cfg_file); > > > > @@ -513,7 +631,7 @@ static int fw_cfg_register_dir_entries(void) > > if (!dir) > > return -ENOMEM; > > > > - fw_cfg_read_blob(FW_CFG_FILE_DIR, dir, sizeof(count), dir_size); > > + fw_cfg_read_blob(FW_CFG_FILE_DIR, dir, sizeof(count), dir_size, true); > > > > for (i = 0; i < count; i++) { > > dir[i].size = be32_to_cpu(dir[i].size); > > @@ -544,9 +662,10 @@ static int fw_cfg_sysfs_probe(struct platform_device > > *pdev) > > * one fw_cfg device exist system-wide, so if one was already found > > * earlier, we might as well stop here. > > */ > > - if (fw_cfg_sel_ko) > > + if (dev) > > return -EBUSY; > > > > + dev = &pdev->dev; > > /* create by_key and by_name subdirs of /sys/firmware/qemu_fw_cfg/ */ > > err = -ENOMEM; > > fw_cfg_sel_ko = kobject_create_and_add("by_key", fw_cfg_top_ko); > > @@ -562,7 +681,7 @@ static int fw_cfg_sysfs_probe(struct platform_device > > *pdev) > > goto err_probe; > > > > /* get revision number, add matching top-level attribute */ > > - fw_cfg_read_blob(FW_CFG_ID, &fw_cfg_rev, 0, sizeof(fw_cfg_rev)); > > + fw_cfg_read_blob(FW_CFG_ID, &fw_cfg_rev, 0, sizeof(fw_cfg_rev), false); > > fw_cfg_rev = le32_to_cpu(fw_cfg_rev); > > err = sysfs_create_file(fw_cfg_top_ko, &fw_cfg_rev_attr.attr); > > if (err) > > @@ -587,6 +706,7 @@ static int fw_cfg_sysfs_probe(struct platform_device > > *pdev) > > err_name: > > fw_cfg_kobj_cleanup(fw_cfg_sel_ko); > > err_sel: > > + dev = NULL; > > return err; > > } > > > > -- > > 2.15.0.125.g8f49766d64 > From 1584185758844054195@xxx Thu Nov 16 01:54:30 +0000 2017 X-GM-THRID: 1583980328971838486 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread