From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id EBF61C433E0 for ; Mon, 10 Aug 2020 13:44:26 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id C8294206E9 for ; Mon, 10 Aug 2020 13:44:26 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="gosXJgal" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726771AbgHJNoZ (ORCPT ); Mon, 10 Aug 2020 09:44:25 -0400 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:48890 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726571AbgHJNoZ (ORCPT ); Mon, 10 Aug 2020 09:44:25 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1597067062; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=V1Ht/xtTouLriwLsm/eS0eaCM+WZCELWGcwFNPhIusQ=; b=gosXJgalIVH8JMV9L1vcKOuyYe0w8e3uHReyEWU88nEIgElUYoXBhRdemC0sJobVFflKlZ eGo5vf5NsunsNYQtmQvptpQBx5ovQbD6RE14IgpGWiebbYXXIpMoyfCCcZpXzrhafRzi0W XzjzCARamvCHDJHAZAHRLQT02hkFtzs= Received: from mail-wm1-f69.google.com (mail-wm1-f69.google.com [209.85.128.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-563-dZQ6v5HYMDutIRUqSszLcg-1; Mon, 10 Aug 2020 09:44:21 -0400 X-MC-Unique: dZQ6v5HYMDutIRUqSszLcg-1 Received: by mail-wm1-f69.google.com with SMTP id f74so2890209wmf.1 for ; Mon, 10 Aug 2020 06:44:21 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=V1Ht/xtTouLriwLsm/eS0eaCM+WZCELWGcwFNPhIusQ=; b=BA522n36gcH5qSQh4QsbtwkKB6RjIq/dZER58zMENYd4X1o7jUCid1kDFexnZ63Ocd w9tMnjbSOKs9NgE4Xgs3Lm30m6fsQfhTGi/7Fk6WesOFwk1WrXR8ba9v+9WD/gBrxLZp Vhgw1Y74WUCEyjiu0OjT8gSs4QjDblM/J38Gd5g2vdrhhMDlTnLx3R4u1r0C3QmKn5jq Z+y6mOpUnjyDDsR41mgSHgHljMc71mwQBtVQhu6F3JNbfp7PTIgNMuvjciBclpLW23J4 Xt4H1/RQyC0hq+OPRX2b//QwYxHcnBSBAMHJtnny83V5iK4R6ImLT8g4JVlbQQQLC4hv ivuw== X-Gm-Message-State: AOAM530/YG+bOrIRNWIObU6eYXz7vqfwhoaJE8Ys5Hnuw0aeUsk0bsPg 5pz7IoCQc8HyLwQtAU5zNlJ7L40SEq9cOpW85co5xkk1QrGQ+RSURoyZQYLkaaMKmTHbmGPV6m3 SRn0zNfDOwTNF X-Received: by 2002:adf:bb83:: with SMTP id q3mr1711996wrg.58.1597067060157; Mon, 10 Aug 2020 06:44:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJynhZhPGH/raEuBPiKR+cj/1IcMJN4rJhlv/0a7x4pg7k/Q9IZEP+R7MmFeP+iRyWhw2v+v5w== X-Received: by 2002:adf:bb83:: with SMTP id q3mr1711966wrg.58.1597067059858; Mon, 10 Aug 2020 06:44:19 -0700 (PDT) Received: from redhat.com ([192.117.173.58]) by smtp.gmail.com with ESMTPSA id g25sm20355599wmh.35.2020.08.10.06.44.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 10 Aug 2020 06:44:18 -0700 (PDT) Date: Mon, 10 Aug 2020 09:44:15 -0400 From: "Michael S. Tsirkin" To: Guennadi Liakhovetski Cc: kvm@vger.kernel.org, linux-remoteproc@vger.kernel.org, virtualization@lists.linux-foundation.org, sound-open-firmware@alsa-project.org, Pierre-Louis Bossart , Liam Girdwood , Jason Wang , Ohad Ben-Cohen , Bjorn Andersson , Mathieu Poirier , Vincent Whitchurch Subject: Re: [PATCH v4 4/4] vhost: add an RPMsg API Message-ID: <20200810094013-mutt-send-email-mst@kernel.org> References: <20200722150927.15587-1-guennadi.liakhovetski@linux.intel.com> <20200722150927.15587-5-guennadi.liakhovetski@linux.intel.com> <20200804102132-mutt-send-email-mst@kernel.org> <20200804151916.GC19025@ubuntu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200804151916.GC19025@ubuntu> Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org On Tue, Aug 04, 2020 at 05:19:17PM +0200, Guennadi Liakhovetski wrote: > On Tue, Aug 04, 2020 at 10:27:08AM -0400, Michael S. Tsirkin wrote: > > On Wed, Jul 22, 2020 at 05:09:27PM +0200, Guennadi Liakhovetski wrote: > > > Linux supports running the RPMsg protocol over the VirtIO transport > > > protocol, but currently there is only support for VirtIO clients and > > > no support for a VirtIO server. This patch adds a vhost-based RPMsg > > > server implementation. > > > > > > Signed-off-by: Guennadi Liakhovetski > > > --- > > > drivers/vhost/Kconfig | 7 + > > > drivers/vhost/Makefile | 3 + > > > drivers/vhost/rpmsg.c | 375 ++++++++++++++++++++++++++++++++++++ > > > drivers/vhost/vhost_rpmsg.h | 74 +++++++ > > > 4 files changed, 459 insertions(+) > > > create mode 100644 drivers/vhost/rpmsg.c > > > create mode 100644 drivers/vhost/vhost_rpmsg.h > > > > > > diff --git a/drivers/vhost/Kconfig b/drivers/vhost/Kconfig > > > index d3688c6afb87..602421bf1d03 100644 > > > --- a/drivers/vhost/Kconfig > > > +++ b/drivers/vhost/Kconfig > > > @@ -38,6 +38,13 @@ config VHOST_NET > > > To compile this driver as a module, choose M here: the module will > > > be called vhost_net. > > > > > > +config VHOST_RPMSG > > > + tristate > > > > So this lacks a description line so it does not appear > > in menuconfig. How is user supposed to set it? > > I added a one-line description. > > That was on purpose. I don't think there's any value in this API stand-alone, > so I let users select it as needed. But we can change that too, id desired. I guess the patches actually selecting this are separate then? > > > + depends on VHOST > > > > Other drivers select VHOST instead. Any reason not to > > do it like this here? > > I have > > + select VHOST > + select VHOST_RPMSG > > in my client driver patch. Any issues selecting from here so others get it for free? If this is selected then dependencies are ignored ... > > > + help > > > + Vhost RPMsg API allows vhost drivers to communicate with VirtIO > > > + drivers, using the RPMsg over VirtIO protocol. > > > + > > > > > config VHOST_SCSI > > > tristate "VHOST_SCSI TCM fabric driver" > > > depends on TARGET_CORE && EVENTFD > > > diff --git a/drivers/vhost/Makefile b/drivers/vhost/Makefile > > > index f3e1897cce85..9cf459d59f97 100644 > > > --- a/drivers/vhost/Makefile > > > +++ b/drivers/vhost/Makefile > > > @@ -2,6 +2,9 @@ > > > obj-$(CONFIG_VHOST_NET) += vhost_net.o > > > vhost_net-y := net.o > > > > > > +obj-$(CONFIG_VHOST_RPMSG) += vhost_rpmsg.o > > > +vhost_rpmsg-y := rpmsg.o > > > + > > > obj-$(CONFIG_VHOST_SCSI) += vhost_scsi.o > > > vhost_scsi-y := scsi.o > > > > > > diff --git a/drivers/vhost/rpmsg.c b/drivers/vhost/rpmsg.c > > > new file mode 100644 > > > index 000000000000..d7ab48414224 > > > --- /dev/null > > > +++ b/drivers/vhost/rpmsg.c > > > @@ -0,0 +1,375 @@ > > > +// SPDX-License-Identifier: GPL-2.0-only > > > +/* > > > + * Copyright(c) 2020 Intel Corporation. All rights reserved. > > > + * > > > + * Author: Guennadi Liakhovetski > > > + * > > > + * Vhost RPMsg VirtIO interface. It provides a set of functions to match the > > > + * guest side RPMsg VirtIO API, provided by drivers/rpmsg/virtio_rpmsg_bus.c > > > + * These functions handle creation of 2 virtual queues, handling of endpoint > > > + * addresses, sending a name-space announcement to the guest as well as any > > > + * user messages. This API can be used by any vhost driver to handle RPMsg > > > + * specific processing. > > > + * Specific vhost drivers, using this API will use their own VirtIO device > > > + * IDs, that should then also be added to the ID table in virtio_rpmsg_bus.c > > > + */ > > > + > > > +#include > > > +#include > > > +#include > > > +#include > > > +#include > > > +#include > > > +#include > > > +#include > > > + > > > +#include "vhost.h" > > > +#include "vhost_rpmsg.h" > > > + > > > +/* > > > + * All virtio-rpmsg virtual queue kicks always come with just one buffer - > > > + * either input or output > > > + */ > > > +static int vhost_rpmsg_get_single(struct vhost_virtqueue *vq) > > > +{ > > > + struct vhost_rpmsg *vr = container_of(vq->dev, struct vhost_rpmsg, dev); > > > + unsigned int out, in; > > > + int head = vhost_get_vq_desc(vq, vq->iov, ARRAY_SIZE(vq->iov), &out, &in, > > > + NULL, NULL); > > > + if (head < 0) { > > > + vq_err(vq, "%s(): error %d getting buffer\n", > > > + __func__, head); > > > + return head; > > > + } > > > + > > > + /* Nothing new? */ > > > + if (head == vq->num) > > > + return head; > > > + > > > + if (vq == &vr->vq[VIRTIO_RPMSG_RESPONSE] && (out || in != 1)) { > > > > This in != 1 looks like a dependency on a specific message layout. > > virtio spec says to avoid these. Using iov iters it's not too hard to do > > ... > > This is an RPMsg VirtIO implementation, and it has to match the virtio_rpmsg_bus.c > driver, and that one has specific VirtIO queue and message usage patterns. That could be fine for legacy virtio, but now you are claiming support for virtio 1, so need to fix these assumptions in the device. > > > + vq_err(vq, > > > + "%s(): invalid %d input and %d output in response queue\n", > > > + __func__, in, out); > > > + goto return_buf; > > > + } > > > + > > > + if (vq == &vr->vq[VIRTIO_RPMSG_REQUEST] && (in || out != 1)) { > > > + vq_err(vq, > > > + "%s(): invalid %d input and %d output in request queue\n", > > > + __func__, in, out); > > > + goto return_buf; > > > + } > > > + > > > + return head; > > > + > > > +return_buf: > > > + /* > > > + * FIXME: might need to return the buffer using vhost_add_used() > > > + * or vhost_discard_vq_desc(). vhost_discard_vq_desc() is > > > + * described as "being useful for error handling," but it makes > > > + * the thus discarded buffers "unseen," so next time we look we > > > + * retrieve them again? > > > > > > Yes. It's your decision what to do on error. if you also signal > > an eventfd using vq_err, then discarding will > > make it so userspace can poke at ring and hopefully fix it ... > > I assume the user-space in this case is QEMU. Would it be the safest to use > vhost_add_used() then? Your call. > > > + */ > > > + return -EINVAL; > > > +} > > [snip] > > > > + return 0; > > > + > > > +return_buf: > > > + /* > > > + * FIXME: vhost_discard_vq_desc() or vhost_add_used(), see comment in > > > + * vhost_rpmsg_get_single() > > > + */ > > > > What's to be done with this FIXME? > > This is the same question as above - I just wasn't sure which error handling > was appropriate here, don't think many vhost drivers do any od this... > > Thanks > Guennadi