Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4654801ybi; Tue, 11 Jun 2019 10:10:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqxdhucOIMQC+/u8KXVQ5KZ/Gg7laKp1Czmmbch7NLEduKlEK6236hn7/g/i8XuoluQZ3Pfe X-Received: by 2002:a63:161b:: with SMTP id w27mr20892176pgl.338.1560273006263; Tue, 11 Jun 2019 10:10:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560273006; cv=none; d=google.com; s=arc-20160816; b=dHH+vL97ujMn/WW0/8Rs/L0J7K+J6e/VZUcWL/HoOP6p7X+XKB/0IK5CjPaZ8R3/BJ 2cKuHE+2OJZzYj1/7y03E5tuBEnyLqN5JXI6E6aV2FGJ/2jhUh5KyBVv11DN6rd9YTqe FZtCq3lkAoimmIgtzR523QeeQkWn+u4ATMUxmPNjW92Shh6H7eNxKZ03dlblnnN5xkWJ K8cgdqrjTSf96q65eoGl+8oISws7Azzf/tTkq2qwXk/UwI/CaOn8gT+YMOjHnkxjJCWP k7udXjAuIT7oxbBt/YHgrJK+78cfP4YTPOjndX8CXMofgzjTO2OtUAZA5MvEfktNio0b Mw1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=GpukngwoyXFYdN9Z97/rOxFcFaEXg0mVfLTxq/lCri0=; b=U7iBlgl5xXOMCgL5RHlYZZAiIfLS7fqddHA+7S+B33edQiRgmhLt32Zq/y0qx8SyJm No9dtVS/UpLXTltkc4HxYNVtuJ2WhMKVCiW7Z3izO7hAXCZkLiCqnz5xNg/ed8enm22p IPV8xCRYloEinDFWW0FZVCAd3Lt3MS31qjVtcDkNXwoQqcNQ8DZ82Y+YIgfmW2eMmILA 1BFIwJ/NhslQWALPVW5nxDJUglk/RilLO/e0RipCO4ZqCF+cdx6FiFMBGolTJ0v9yu+i jh3HhUL11dVlypHWao8maHwkG4JzP76GsU07sDJ2fqJ/tHGQBlvPbcHNLtPcAIFLy/// iXMw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 33si12925433pgy.582.2019.06.11.10.09.51; Tue, 11 Jun 2019 10:10:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405632AbfFKRDD (ORCPT + 99 others); Tue, 11 Jun 2019 13:03:03 -0400 Received: from mx1.redhat.com ([209.132.183.28]:56772 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404282AbfFKRDD (ORCPT ); Tue, 11 Jun 2019 13:03:03 -0400 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 8D67530C252E; Tue, 11 Jun 2019 17:02:37 +0000 (UTC) Received: from gondolin (ovpn-204-147.brq.redhat.com [10.40.204.147]) by smtp.corp.redhat.com (Postfix) with ESMTP id E032C19698; Tue, 11 Jun 2019 17:02:14 +0000 (UTC) Date: Tue, 11 Jun 2019 19:02:09 +0200 From: Cornelia Huck To: Pankaj Gupta Cc: dm-devel@redhat.com, linux-nvdimm@lists.01.org, linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org, kvm@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-acpi@vger.kernel.org, qemu-devel@nongnu.org, linux-ext4@vger.kernel.org, linux-xfs@vger.kernel.org, dan.j.williams@intel.com, zwisler@kernel.org, vishal.l.verma@intel.com, dave.jiang@intel.com, mst@redhat.com, jasowang@redhat.com, willy@infradead.org, rjw@rjwysocki.net, hch@infradead.org, lenb@kernel.org, jack@suse.cz, tytso@mit.edu, adilger.kernel@dilger.ca, darrick.wong@oracle.com, lcapitulino@redhat.com, kwolf@redhat.com, imammedo@redhat.com, jmoyer@redhat.com, nilal@redhat.com, riel@surriel.com, stefanha@redhat.com, aarcange@redhat.com, david@redhat.com, david@fromorbit.com, xiaoguangrong.eric@gmail.com, pbonzini@redhat.com, yuval.shaia@oracle.com, kilobyte@angband.pl, jstaron@google.com, rdunlap@infradead.org, snitzer@redhat.com Subject: Re: [PATCH v12 2/7] virtio-pmem: Add virtio pmem driver Message-ID: <20190611190209.0b25033e.cohuck@redhat.com> In-Reply-To: <20190611163802.25352-3-pagupta@redhat.com> References: <20190611163802.25352-1-pagupta@redhat.com> <20190611163802.25352-3-pagupta@redhat.com> Organization: Red Hat GmbH MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.40]); Tue, 11 Jun 2019 17:03:02 +0000 (UTC) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Tue, 11 Jun 2019 22:07:57 +0530 Pankaj Gupta wrote: > This patch adds virtio-pmem driver for KVM guest. > > Guest reads the persistent memory range information from > Qemu over VIRTIO and registers it on nvdimm_bus. It also > creates a nd_region object with the persistent memory > range information so that existing 'nvdimm/pmem' driver > can reserve this into system memory map. This way > 'virtio-pmem' driver uses existing functionality of pmem > driver to register persistent memory compatible for DAX > capable filesystems. > > This also provides function to perform guest flush over > VIRTIO from 'pmem' driver when userspace performs flush > on DAX memory range. > > Signed-off-by: Pankaj Gupta > Reviewed-by: Yuval Shaia > Acked-by: Michael S. Tsirkin > Acked-by: Jakub Staron > Tested-by: Jakub Staron > --- > drivers/nvdimm/Makefile | 1 + > drivers/nvdimm/nd_virtio.c | 124 +++++++++++++++++++++++++++++++ > drivers/nvdimm/virtio_pmem.c | 122 ++++++++++++++++++++++++++++++ > drivers/nvdimm/virtio_pmem.h | 55 ++++++++++++++ > drivers/virtio/Kconfig | 11 +++ > include/uapi/linux/virtio_ids.h | 1 + > include/uapi/linux/virtio_pmem.h | 35 +++++++++ > 7 files changed, 349 insertions(+) > create mode 100644 drivers/nvdimm/nd_virtio.c > create mode 100644 drivers/nvdimm/virtio_pmem.c > create mode 100644 drivers/nvdimm/virtio_pmem.h > create mode 100644 include/uapi/linux/virtio_pmem.h Sorry about being late to the party; this one has been sitting in my 'to review' queue for far too long :( (...) > diff --git a/drivers/nvdimm/nd_virtio.c b/drivers/nvdimm/nd_virtio.c > new file mode 100644 > index 000000000000..efc535723517 > --- /dev/null > +++ b/drivers/nvdimm/nd_virtio.c > @@ -0,0 +1,124 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * virtio_pmem.c: Virtio pmem Driver > + * > + * Discovers persistent memory range information > + * from host and provides a virtio based flushing > + * interface. > + */ > +#include "virtio_pmem.h" > +#include "nd.h" > + > + /* The interrupt handler */ > +void host_ack(struct virtqueue *vq) > +{ > + struct virtio_pmem *vpmem = vq->vdev->priv; > + struct virtio_pmem_request *req_data, *req_buf; > + unsigned long flags; > + unsigned int len; > + > + spin_lock_irqsave(&vpmem->pmem_lock, flags); > + while ((req_data = virtqueue_get_buf(vq, &len)) != NULL) { > + req_data->done = true; > + wake_up(&req_data->host_acked); > + > + if (!list_empty(&vpmem->req_list)) { > + req_buf = list_first_entry(&vpmem->req_list, > + struct virtio_pmem_request, list); > + req_buf->wq_buf_avail = true; > + wake_up(&req_buf->wq_buf); > + list_del(&req_buf->list); > + } > + } > + spin_unlock_irqrestore(&vpmem->pmem_lock, flags); > +} > +EXPORT_SYMBOL_GPL(host_ack); Nit: 'host_ack' looks a bit generic for an exported function... would 'virtio_pmem_host_ack' maybe be better? > + > + /* The request submission function */ > +int virtio_pmem_flush(struct nd_region *nd_region) I don't see an EXPORT_SYMBOL_GPL() for this function... should it get one, or should it be made static? > +{ > + struct virtio_device *vdev = nd_region->provider_data; > + struct virtio_pmem *vpmem = vdev->priv; > + struct virtio_pmem_request *req_data; > + struct scatterlist *sgs[2], sg, ret; > + unsigned long flags; > + int err, err1; > + > + might_sleep(); > + req_data = kmalloc(sizeof(*req_data), GFP_KERNEL); > + if (!req_data) > + return -ENOMEM; > + > + req_data->done = false; > + init_waitqueue_head(&req_data->host_acked); > + init_waitqueue_head(&req_data->wq_buf); > + INIT_LIST_HEAD(&req_data->list); > + req_data->req.type = cpu_to_virtio32(vdev, VIRTIO_PMEM_REQ_TYPE_FLUSH); > + sg_init_one(&sg, &req_data->req, sizeof(req_data->req)); > + sgs[0] = &sg; > + sg_init_one(&ret, &req_data->resp.ret, sizeof(req_data->resp)); > + sgs[1] = &ret; > + > + spin_lock_irqsave(&vpmem->pmem_lock, flags); > + /* > + * If virtqueue_add_sgs returns -ENOSPC then req_vq virtual > + * queue does not have free descriptor. We add the request > + * to req_list and wait for host_ack to wake us up when free > + * slots are available. > + */ > + while ((err = virtqueue_add_sgs(vpmem->req_vq, sgs, 1, 1, req_data, > + GFP_ATOMIC)) == -ENOSPC) { > + > + dev_err(&vdev->dev, "failed to send command to virtio pmem device, no free slots in the virtqueue\n"); Hm... by the comment above I would have thought that this is not really an error, but rather a temporary condition? Maybe downgrade this to dev_info()? > + req_data->wq_buf_avail = false; > + list_add_tail(&req_data->list, &vpmem->req_list); > + spin_unlock_irqrestore(&vpmem->pmem_lock, flags); > + > + /* A host response results in "host_ack" getting called */ > + wait_event(req_data->wq_buf, req_data->wq_buf_avail); > + spin_lock_irqsave(&vpmem->pmem_lock, flags); > + } > + err1 = virtqueue_kick(vpmem->req_vq); > + spin_unlock_irqrestore(&vpmem->pmem_lock, flags); > + /* > + * virtqueue_add_sgs failed with error different than -ENOSPC, we can't > + * do anything about that. > + */ Does it make sense to kick if you couldn't add at all? > + if (err || !err1) { > + dev_info(&vdev->dev, "failed to send command to virtio pmem device\n"); If this is dev_info, I think the error above really should be dev_info as well (and maybe also log the error value)? > + err = -EIO; > + } else { > + /* A host repsonse results in "host_ack" getting called */ > + wait_event(req_data->host_acked, req_data->done); > + err = virtio32_to_cpu(vdev, req_data->resp.ret); > + } > + > + kfree(req_data); > + return err; > +}; > + > +/* The asynchronous flush callback function */ > +int async_pmem_flush(struct nd_region *nd_region, struct bio *bio) > +{ > + /* Create child bio for asynchronous flush and chain with > + * parent bio. Otherwise directly call nd_region flush. > + */ Nit: The comment should start with an otherwise empty /* line. > + if (bio && bio->bi_iter.bi_sector != -1) { > + struct bio *child = bio_alloc(GFP_ATOMIC, 0); > + > + if (!child) > + return -ENOMEM; > + bio_copy_dev(child, bio); > + child->bi_opf = REQ_PREFLUSH; > + child->bi_iter.bi_sector = -1; > + bio_chain(child, bio); > + submit_bio(child); > + return 0; > + } > + if (virtio_pmem_flush(nd_region)) > + return -EIO; > + > + return 0; > +}; > +EXPORT_SYMBOL_GPL(async_pmem_flush); > +MODULE_LICENSE("GPL"); (...) I have only some more minor comments; on the whole, this looks good to me.