From: Kirti Wankhede <kwankhede@nvidia.com>
To: Alex Williamson <alex.williamson@redhat.com>
Cc: <cjia@nvidia.com>, <kevin.tian@intel.com>, <ziye.yang@intel.com>,
<changpeng.liu@intel.com>, <yi.l.liu@intel.com>,
<mlevitsk@redhat.com>, <eskultet@redhat.com>, <cohuck@redhat.com>,
<dgilbert@redhat.com>, <jonathan.davies@nutanix.com>,
<eauger@redhat.com>, <aik@ozlabs.ru>, <pasic@linux.ibm.com>,
<felipe@nutanix.com>, <Zhengxiao.zx@Alibaba-inc.com>,
<shuangtai.tst@alibaba-inc.com>, <Ken.Xue@amd.com>,
<zhi.a.wang@intel.com>, <yan.y.zhao@intel.com>,
<qemu-devel@nongnu.org>, <kvm@vger.kernel.org>
Subject: Re: [PATCH v17 Kernel 5/7] vfio iommu: Update UNMAP_DMA ioctl to get dirty bitmap before unmap
Date: Wed, 1 Apr 2020 00:16:13 +0530 [thread overview]
Message-ID: <66af06b5-4e87-9f7a-be85-08a68d6ab982@nvidia.com> (raw)
In-Reply-To: <20200330153421.6246c2c6@w520.home>
On 3/31/2020 3:04 AM, Alex Williamson wrote:
> On Mon, 30 Mar 2020 22:20:42 +0530
> Kirti Wankhede <kwankhede@nvidia.com> wrote:
>
>> DMA mapped pages, including those pinned by mdev vendor drivers, might
>> get unpinned and unmapped while migration is active and device is still
>> running. For example, in pre-copy phase while guest driver could access
>> those pages, host device or vendor driver can dirty these mapped pages.
>> Such pages should be marked dirty so as to maintain memory consistency
>> for a user making use of dirty page tracking.
>>
>> To get bitmap during unmap, user should allocate memory for bitmap, set
>> size of allocated memory, set page size to be considered for bitmap and
>> set flag VFIO_DMA_UNMAP_FLAG_GET_DIRTY_BITMAP.
>>
>> Signed-off-by: Kirti Wankhede <kwankhede@nvidia.com>
>> Reviewed-by: Neo Jia <cjia@nvidia.com>
>> ---
>> drivers/vfio/vfio_iommu_type1.c | 55 ++++++++++++++++++++++++++++++++++++++---
>> include/uapi/linux/vfio.h | 10 ++++++++
>> 2 files changed, 61 insertions(+), 4 deletions(-)
>>
>> diff --git a/drivers/vfio/vfio_iommu_type1.c b/drivers/vfio/vfio_iommu_type1.c
>> index 5efebc2b60e1..266550bd7307 100644
>> --- a/drivers/vfio/vfio_iommu_type1.c
>> +++ b/drivers/vfio/vfio_iommu_type1.c
>> @@ -983,7 +983,8 @@ static int verify_bitmap_size(uint64_t npages, uint64_t bitmap_size)
>> }
>>
>> static int vfio_dma_do_unmap(struct vfio_iommu *iommu,
>> - struct vfio_iommu_type1_dma_unmap *unmap)
>> + struct vfio_iommu_type1_dma_unmap *unmap,
>> + struct vfio_bitmap *bitmap)
>> {
>> uint64_t mask;
>> struct vfio_dma *dma, *dma_last = NULL;
>> @@ -1034,6 +1035,10 @@ static int vfio_dma_do_unmap(struct vfio_iommu *iommu,
>> * will be returned if these conditions are not met. The v2 interface
>> * will only return success and a size of zero if there were no
>> * mappings within the range.
>> + *
>> + * When VFIO_DMA_UNMAP_FLAG_GET_DIRTY_BITMAP flag is set, unmap request
>> + * must be for single mapping. Multiple mappings with this flag set is
>> + * not supported.
>> */
>> if (iommu->v2) {
>> dma = vfio_find_dma(iommu, unmap->iova, 1);
>> @@ -1041,6 +1046,14 @@ static int vfio_dma_do_unmap(struct vfio_iommu *iommu,
>> ret = -EINVAL;
>> goto unlock;
>> }
>> +
>> + if ((unmap->flags & VFIO_DMA_UNMAP_FLAG_GET_DIRTY_BITMAP) &&
>> + dma &&
>> + (dma->iova != unmap->iova || dma->size != unmap->size)) {
>
>
> I think your intention was to return error if the user asked for the
> dirty bitmap and the requested unmap range doesn't exactly match the
> vfio_dma. Not finding a vfio_dma should therefore also be an error.
> For example, if we had a single mapping at {0x1000-0x1fff} and the user
> unmapped with dirty bitmap {0x0-0x2fff}, that should return an error,
> but it's not caught by the above because there is no vfio_dma @0x0.
> Therefore I think you want:
>
> ((unmap->flags & VFIO_DMA_UNMAP_FLAG_GET_DIRTY_BITMAP) &&
> (!dma || dma->iova != unmap->iova || dma->size != unmap->size))
>
> Right? Thanks,
>
Yes, updating check.
Is !dma here also error case when VFIO_DMA_UNMAP_FLAG_GET_DIRTY_BITMAP
flag is not set?
DMA_UNMAP ioctl returns how much was unmapped, from user space
perspective this would be from start of range (unmap->iova), right?
Thanks,
Kirti
next prev parent reply other threads:[~2020-03-31 18:46 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-03-30 16:50 [PATCH v17 Kernel 0/7] KABIs to support migration for VFIO devices Kirti Wankhede
2020-03-30 16:50 ` [PATCH v17 Kernel 1/7] vfio: UAPI for migration interface for device state Kirti Wankhede
2020-03-30 16:50 ` [PATCH v17 Kernel 2/7] vfio iommu: Remove atomicity of ref_count of pinned pages Kirti Wankhede
2020-03-30 16:50 ` [PATCH v17 Kernel 3/7] vfio iommu: Add ioctl definition for dirty pages tracking Kirti Wankhede
2020-03-30 16:50 ` [PATCH v17 Kernel 4/7] vfio iommu: Implementation of ioctl " Kirti Wankhede
2020-03-30 21:19 ` Alex Williamson
2020-03-31 0:10 ` Yan Zhao
2020-04-08 1:10 ` Yan Zhao
2020-03-30 16:50 ` [PATCH v17 Kernel 5/7] vfio iommu: Update UNMAP_DMA ioctl to get dirty bitmap before unmap Kirti Wankhede
2020-03-30 21:34 ` Alex Williamson
2020-03-31 18:46 ` Kirti Wankhede [this message]
2020-03-31 19:06 ` Alex Williamson
2020-03-30 16:50 ` [PATCH v17 Kernel 6/7] vfio iommu: Adds flag to indicate dirty pages tracking capability support Kirti Wankhede
2020-03-30 20:58 ` Alex Williamson
2020-03-31 19:08 ` Kirti Wankhede
2020-03-31 19:15 ` Alex Williamson
2020-04-01 17:25 ` Kirti Wankhede
2020-04-01 17:51 ` Alex Williamson
2020-04-01 17:56 ` Alex Williamson
2020-03-30 16:50 ` [PATCH v17 Kernel 7/7] vfio: Selective dirty page tracking if IOMMU backed device pins pages Kirti Wankhede
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=66af06b5-4e87-9f7a-be85-08a68d6ab982@nvidia.com \
--to=kwankhede@nvidia.com \
--cc=Ken.Xue@amd.com \
--cc=Zhengxiao.zx@Alibaba-inc.com \
--cc=aik@ozlabs.ru \
--cc=alex.williamson@redhat.com \
--cc=changpeng.liu@intel.com \
--cc=cjia@nvidia.com \
--cc=cohuck@redhat.com \
--cc=dgilbert@redhat.com \
--cc=eauger@redhat.com \
--cc=eskultet@redhat.com \
--cc=felipe@nutanix.com \
--cc=jonathan.davies@nutanix.com \
--cc=kevin.tian@intel.com \
--cc=kvm@vger.kernel.org \
--cc=mlevitsk@redhat.com \
--cc=pasic@linux.ibm.com \
--cc=qemu-devel@nongnu.org \
--cc=shuangtai.tst@alibaba-inc.com \
--cc=yan.y.zhao@intel.com \
--cc=yi.l.liu@intel.com \
--cc=zhi.a.wang@intel.com \
--cc=ziye.yang@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox