From: Lan Tianyu <tianyu.lan@intel.com>
To: "Michael S. Tsirkin" <mst@redhat.com>
Cc: kvm@vger.kernel.org, kevin.tian@intel.com,
jan.kiszka@siemens.com, jasowang@redhat.com, peterx@redhat.com,
david@gibson.dropbear.id.au, alex.williamson@redhat.com,
yi.l.liu@intel.com
Subject: Re: [RFC PATCH 2/3] VFIO: Add IOMMU fault notifier callback
Date: Tue, 21 Feb 2017 14:13:04 +0800 [thread overview]
Message-ID: <370e5de8-cc3b-0da7-a829-debae7538432@intel.com> (raw)
In-Reply-To: <20170221075030-mutt-send-email-mst@kernel.org>
On 2017年02月21日 13:55, Michael S. Tsirkin wrote:
> On Sun, Feb 19, 2017 at 10:47:08PM +0800, Lan Tianyu wrote:
>> This patch is to add callback to handle fault event reported by
>> IOMMU driver. Callback stores fault into an array and notify userspace
>> via eventfd to read fault info.
>>
>> Signed-off-by: Lan Tianyu <tianyu.lan@intel.com>
>> ---
>> drivers/vfio/vfio_iommu_type1.c | 30 ++++++++++++++++++++++++++++++
>> include/linux/iommu.h | 7 +++++++
>> include/uapi/linux/vfio.h | 7 +++++++
>> 3 files changed, 44 insertions(+)
>>
>> diff --git a/drivers/vfio/vfio_iommu_type1.c b/drivers/vfio/vfio_iommu_type1.c
>> index 46674ea..dc434a3 100644
>> --- a/drivers/vfio/vfio_iommu_type1.c
>> +++ b/drivers/vfio/vfio_iommu_type1.c
>> @@ -56,6 +56,8 @@
>> MODULE_PARM_DESC(disable_hugepages,
>> "Disable VFIO IOMMU support for IOMMU hugepages.");
>>
>> +#define NR_IOMMU_FAULT_INFO 10
>> +
>> struct vfio_iommu {
>> struct list_head domain_list;
>> struct vfio_domain *external_domain; /* domain for external user */
>> @@ -64,6 +66,9 @@ struct vfio_iommu {
>> struct blocking_notifier_head notifier;
>> struct eventfd_ctx *iommu_fault_fd;
>> struct mutex fault_lock;
>> + struct vfio_iommu_fault_info fault_info[NR_IOMMU_FAULT_INFO];
>
> What if you run out of this space? Userspace will not
> see any more faults. What will cause progress to happen?
When userspace gets fault info via new VFIO cmd, the fault_info in arry
will be clear. If userspace doesn't get fault info after triggering
fault event fd, the surplus fault info will be ignored.
>
>
>> + struct blocking_notifier_head iommu_fault_notifier;
>> + u8 fault_count;
>> bool v2;
>> bool nesting;
>> };
>> @@ -1456,6 +1461,7 @@ static void *vfio_iommu_type1_open(unsigned long arg)
>> iommu->dma_list = RB_ROOT;
>> mutex_init(&iommu->lock);
>> mutex_init(&iommu->fault_lock);
>> + iommu->fault_count = 0;
>> BLOCKING_INIT_NOTIFIER_HEAD(&iommu->notifier);
>>
>> return iommu;
>> @@ -1516,6 +1522,30 @@ static int vfio_domains_have_iommu_cache(struct vfio_iommu *iommu)
>> return ret;
>> }
>>
>> +static int vfio_iommu_fault_event_notifier(struct notifier_block *nb,
>> + struct iommu_fault_info *fault_info,
>> + void *data)
>> +{
>> + struct vfio_iommu *iommu = data;
>> + struct vfio_iommu_fault_info *info;
>> +
>> + mutex_lock(&iommu->fault_lock);
>> +
>> + info = &iommu->fault_info[iommu->fault_count];
>> + info->addr = fault_info->addr;
>> + info->sid = fault_info->sid;
>> + info->fault_reason = fault_info->fault_reason;
>> + info->is_write = fault_info->is_write;
>> +
>> + iommu->fault_count++;
>
> Will corrupt memory once array overflows NR_IOMMU_FAULT_INFO.
Yes, I miss check of NR_IOMMU_FAULT_INFO Here. Thanks.
>
>
>> +
>> + if (iommu->iommu_fault_fd)
>> + eventfd_signal(iommu->iommu_fault_fd, 1);
>> +
>> + mutex_unlock(&iommu->fault_lock);
>> + return 0;
>> +}
>> +
>> static long vfio_iommu_type1_ioctl(void *iommu_data,
>> unsigned int cmd, unsigned long arg)
>> {
>> diff --git a/include/linux/iommu.h b/include/linux/iommu.h
>> index 0ff5111..b6a7bdb 100644
>> --- a/include/linux/iommu.h
>> +++ b/include/linux/iommu.h
>> @@ -86,6 +86,13 @@ struct iommu_domain {
>> void *iova_cookie;
>> };
>>
>> +struct iommu_fault_info {
>> + __u64 addr;
>> + __u16 sid;
>> + __u8 fault_reason;
>> + __u8 is_write:1;
>> +};
>> +
>> enum iommu_cap {
>> IOMMU_CAP_CACHE_COHERENCY, /* IOMMU can enforce cache coherent DMA
>> transactions */
>> diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h
>> index 8616334..da359dd 100644
>> --- a/include/uapi/linux/vfio.h
>> +++ b/include/uapi/linux/vfio.h
>> @@ -562,6 +562,13 @@ struct vfio_iommu_type1_set_fault_eventfd {
>>
>> #define VFIO_IOMMU_SET_FAULT_EVENTFD _IO(VFIO_TYPE, VFIO_BASE + 17)
>>
>> +struct vfio_iommu_fault_info {
>> + __u64 addr;
>> + __u16 sid;
>
> It's not clear it's userspace's business to know the sid. It normally
> does not care once management has bound vfio to a device. You should use
> a device identifier that makes sense.
Yes, How about "bdf"?
>
>
>> + __u8 fault_reason;
>> + __u8 is_write:1;
>> +};
>> +
>> /* -------- Additional API for SPAPR TCE (Server POWERPC) IOMMU -------- */
>>
>> /*
>> --
>> 1.8.3.1
--
Best regards
Tianyu Lan
next prev parent reply other threads:[~2017-02-21 6:19 UTC|newest]
Thread overview: 27+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-02-19 14:47 [RFC PATCH 0/3] VFIO: Report IOMMU fault event to userspace Lan Tianyu
2017-02-19 14:47 ` [RFC PATCH 1/3] VFIO: Add new cmd to receive eventfd from userspace to notify IOMMU fault event Lan Tianyu
2017-02-20 20:53 ` Alex Williamson
2017-02-21 5:29 ` Lan Tianyu
2017-02-21 5:48 ` Michael S. Tsirkin
2017-02-21 6:05 ` Alex Williamson
2017-02-21 6:11 ` Liu, Yi L
2017-02-19 14:47 ` [RFC PATCH 2/3] VFIO: Add IOMMU fault notifier callback Lan Tianyu
2017-02-20 2:58 ` Liu, Yi L
2017-02-20 20:53 ` Alex Williamson
2017-02-21 6:05 ` Lan Tianyu
2017-02-21 5:55 ` Michael S. Tsirkin
2017-02-21 6:13 ` Lan Tianyu [this message]
2017-02-19 14:47 ` [RFC PATCH 3/3] VFIO: Add new cmd for user space to get IOMMU fault info Lan Tianyu
2017-02-20 20:53 ` Alex Williamson
2017-02-20 20:53 ` [RFC PATCH 0/3] VFIO: Report IOMMU fault event to userspace Alex Williamson
2017-02-21 4:49 ` Lan Tianyu
2017-02-21 5:29 ` Alex Williamson
2017-02-21 15:18 ` Lan Tianyu
2017-02-21 15:21 ` Lan, Tianyu
2017-02-28 15:58 ` Lan, Tianyu
2017-03-15 6:17 ` Liu, Yi L
2017-03-15 19:52 ` Alex Williamson
2017-03-16 1:42 ` Lan Tianyu
2017-03-16 3:32 ` Jason Wang
2017-03-16 5:22 ` Lan Tianyu
2017-03-21 23:57 ` Liu, Yi L
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=370e5de8-cc3b-0da7-a829-debae7538432@intel.com \
--to=tianyu.lan@intel.com \
--cc=alex.williamson@redhat.com \
--cc=david@gibson.dropbear.id.au \
--cc=jan.kiszka@siemens.com \
--cc=jasowang@redhat.com \
--cc=kevin.tian@intel.com \
--cc=kvm@vger.kernel.org \
--cc=mst@redhat.com \
--cc=peterx@redhat.com \
--cc=yi.l.liu@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox