From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S967742AbeE2WPM (ORCPT ); Tue, 29 May 2018 18:15:12 -0400 Received: from gate.crashing.org ([63.228.1.57]:45183 "EHLO gate.crashing.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S967686AbeE2WPG (ORCPT ); Tue, 29 May 2018 18:15:06 -0400 Message-ID: <230075a7760a9cf878355e2b8abe4cdb967a482a.camel@kernel.crashing.org> Subject: Re: [RFC V2] virtio: Add platform specific DMA API translation for virito devices From: Benjamin Herrenschmidt To: Christoph Hellwig Cc: "Michael S. Tsirkin" , Anshuman Khandual , virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, aik@ozlabs.ru, robh@kernel.org, joe@perches.com, elfring@users.sourceforge.net, david@gibson.dropbear.id.au, jasowang@redhat.com, mpe@ellerman.id.au, luto@kernel.org Date: Wed, 30 May 2018 08:13:54 +1000 In-Reply-To: <20180529140319.GA19972@infradead.org> References: <20180522063317.20956-1-khandual@linux.vnet.ibm.com> <20180523213703-mutt-send-email-mst@kernel.org> <20180525202300-mutt-send-email-mst@kernel.org> <6fff9f5d67361653e6072570a857cf0d1009a123.camel@kernel.crashing.org> <2f1d48cf029c1f0903f3cffea946ae5b85f60ec0.camel@kernel.crashing.org> <20180529140319.GA19972@infradead.org> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.1 (3.28.1-2.fc28) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2018-05-29 at 07:03 -0700, Christoph Hellwig wrote: > On Tue, May 29, 2018 at 09:56:24AM +1000, Benjamin Herrenschmidt wrote: > > I don't think forcing the addition of an emulated iommu in the middle > > just to work around the fact that virtio "cheats" and doesn't use the > > dma API unless there is one, is the right "fix". > > Agreed. > > > The right long term fix is to always use the DMA API, reducing code > > path etc... and just have a single point where virtio can "chose" > > alternate DMA ops (via an arch hook to deal with our case). > > Also agreed. > > When Andi added vring_use_dma_api it was marked as temporary. > > So I'd much rather move to blacklisting platforms that needs this > hack now than adding another exception. > > And then once we have the blacklist move it to a quirk in the arch > code that just forces dma_direct_ops as the per-device dma ops. > > I don't really think this is crazy long term, but something we could > do relatively quickly. Interestingly enough the original commit > mentions PPC64 as a case where this quirk is needed. Not sure why, it's not so much a platform issue today. It's qemu itself who by defaults bypasses any iommu. I suppose ppc64 stood out because unlike x86 we always have an iommu by default. Anyway, Anshuman, I think that's the right approach, first make virtio always use the DMA API with a quirk early to override the ops. Christoph: the overriding of the ops isn't a platform thing. It's a qemu thing, ie, from a Linux perspective, it's a feature of the "device". So it should be done in virtio itself, not the platform code. However, we do want the ability in platform code to force the bounce buffering to solve our secure VM issue. Cheers, Ben. From mboxrd@z Thu Jan 1 00:00:00 1970 From: Benjamin Herrenschmidt Subject: Re: [RFC V2] virtio: Add platform specific DMA API translation for virito devices Date: Wed, 30 May 2018 08:13:54 +1000 Message-ID: <230075a7760a9cf878355e2b8abe4cdb967a482a.camel@kernel.crashing.org> References: <20180522063317.20956-1-khandual@linux.vnet.ibm.com> <20180523213703-mutt-send-email-mst@kernel.org> <20180525202300-mutt-send-email-mst@kernel.org> <6fff9f5d67361653e6072570a857cf0d1009a123.camel@kernel.crashing.org> <2f1d48cf029c1f0903f3cffea946ae5b85f60ec0.camel@kernel.crashing.org> <20180529140319.GA19972@infradead.org> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20180529140319.GA19972@infradead.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: virtualization-bounces@lists.linux-foundation.org Errors-To: virtualization-bounces@lists.linux-foundation.org To: Christoph Hellwig Cc: robh@kernel.org, "Michael S. Tsirkin" , mpe@ellerman.id.au, linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org, luto@kernel.org, joe@perches.com, david@gibson.dropbear.id.au, linuxppc-dev@lists.ozlabs.org, elfring@users.sourceforge.net, Anshuman Khandual List-Id: virtualization@lists.linuxfoundation.org On Tue, 2018-05-29 at 07:03 -0700, Christoph Hellwig wrote: > On Tue, May 29, 2018 at 09:56:24AM +1000, Benjamin Herrenschmidt wrote: > > I don't think forcing the addition of an emulated iommu in the middle > > just to work around the fact that virtio "cheats" and doesn't use the > > dma API unless there is one, is the right "fix". > > Agreed. > > > The right long term fix is to always use the DMA API, reducing code > > path etc... and just have a single point where virtio can "chose" > > alternate DMA ops (via an arch hook to deal with our case). > > Also agreed. > > When Andi added vring_use_dma_api it was marked as temporary. > > So I'd much rather move to blacklisting platforms that needs this > hack now than adding another exception. > > And then once we have the blacklist move it to a quirk in the arch > code that just forces dma_direct_ops as the per-device dma ops. > > I don't really think this is crazy long term, but something we could > do relatively quickly. Interestingly enough the original commit > mentions PPC64 as a case where this quirk is needed. Not sure why, it's not so much a platform issue today. It's qemu itself who by defaults bypasses any iommu. I suppose ppc64 stood out because unlike x86 we always have an iommu by default. Anyway, Anshuman, I think that's the right approach, first make virtio always use the DMA API with a quirk early to override the ops. Christoph: the overriding of the ops isn't a platform thing. It's a qemu thing, ie, from a Linux perspective, it's a feature of the "device". So it should be done in virtio itself, not the platform code. However, we do want the ability in platform code to force the bounce buffering to solve our secure VM issue. Cheers, Ben.