All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] KVM: Mapping IOMMU pages after updating memslot
@ 2013-10-24  1:56 Yang Zhang
  2013-10-28 12:57 ` Paolo Bonzini
  2013-10-28 19:25 ` Alex Williamson
  0 siblings, 2 replies; 3+ messages in thread
From: Yang Zhang @ 2013-10-24  1:56 UTC (permalink / raw)
  To: kvm; +Cc: alex.williamson, pbonzini, gleb, patrick.lu, Yang Zhang

From: Yang Zhang <yang.z.zhang@Intel.com>

In kvm_iommu_map_pages(), we need to know the page size via call
kvm_host_page_size(). And it will check whether the target slot
is valid before return the right page size.
Currently, we will map the iommu pages when creating a new slot.
But we call kvm_iommu_map_pages() during preparing the new slot.
At that time, the new slot is not visible by domain(still in preparing).
So we cannot get the right page size from kvm_host_page_size() and
this will break the IOMMU super page logic.
The solution is to map the iommu pages after we insert the new slot
into domain.

Signed-off-by: Yang Zhang <yang.z.zhang@Intel.com>
Tested-by: Patrick Lu <patrick.lu@intel.com>
---
 virt/kvm/kvm_main.c |   29 ++++++++++++++---------------
 1 files changed, 14 insertions(+), 15 deletions(-)

diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index d469114..9ec60a2 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -873,21 +873,6 @@ int __kvm_set_memory_region(struct kvm *kvm,
 			goto out_free;
 	}
 
-	/*
-	 * IOMMU mapping:  New slots need to be mapped.  Old slots need to be
-	 * un-mapped and re-mapped if their base changes.  Since base change
-	 * unmapping is handled above with slot deletion, mapping alone is
-	 * needed here.  Anything else the iommu might care about for existing
-	 * slots (size changes, userspace addr changes and read-only flag
-	 * changes) is disallowed above, so any other attribute changes getting
-	 * here can be skipped.
-	 */
-	if ((change == KVM_MR_CREATE) || (change == KVM_MR_MOVE)) {
-		r = kvm_iommu_map_pages(kvm, &new);
-		if (r)
-			goto out_slots;
-	}
-
 	/* actual memory is freed via old in kvm_free_physmem_slot below */
 	if (change == KVM_MR_DELETE) {
 		new.dirty_bitmap = NULL;
@@ -901,6 +886,20 @@ int __kvm_set_memory_region(struct kvm *kvm,
 	kvm_free_physmem_slot(&old, &new);
 	kfree(old_memslots);
 
+	/*
+	 * IOMMU mapping:  New slots need to be mapped.  Old slots need to be
+	 * un-mapped and re-mapped if their base changes.  Since base change
+	 * unmapping is handled above with slot deletion, mapping alone is
+	 * needed here.  Anything else the iommu might care about for existing
+	 * slots (size changes, userspace addr changes and read-only flag
+	 * changes) is disallowed above, so any other attribute changes getting
+	 * here can be skipped.
+	 */
+	if ((change == KVM_MR_CREATE) || (change == KVM_MR_MOVE)) {
+		r = kvm_iommu_map_pages(kvm, &new);
+		return r;
+	}
+
 	return 0;
 
 out_slots:
-- 
1.7.1


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [PATCH] KVM: Mapping IOMMU pages after updating memslot
  2013-10-24  1:56 [PATCH] KVM: Mapping IOMMU pages after updating memslot Yang Zhang
@ 2013-10-28 12:57 ` Paolo Bonzini
  2013-10-28 19:25 ` Alex Williamson
  1 sibling, 0 replies; 3+ messages in thread
From: Paolo Bonzini @ 2013-10-28 12:57 UTC (permalink / raw)
  To: Yang Zhang; +Cc: kvm, alex.williamson, gleb, patrick.lu

Il 24/10/2013 03:56, Yang Zhang ha scritto:
> From: Yang Zhang <yang.z.zhang@Intel.com>
> 
> In kvm_iommu_map_pages(), we need to know the page size via call
> kvm_host_page_size(). And it will check whether the target slot
> is valid before return the right page size.
> Currently, we will map the iommu pages when creating a new slot.
> But we call kvm_iommu_map_pages() during preparing the new slot.
> At that time, the new slot is not visible by domain(still in preparing).
> So we cannot get the right page size from kvm_host_page_size() and
> this will break the IOMMU super page logic.
> The solution is to map the iommu pages after we insert the new slot
> into domain.
> 
> Signed-off-by: Yang Zhang <yang.z.zhang@Intel.com>
> Tested-by: Patrick Lu <patrick.lu@intel.com>
> ---
>  virt/kvm/kvm_main.c |   29 ++++++++++++++---------------
>  1 files changed, 14 insertions(+), 15 deletions(-)
> 
> diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
> index d469114..9ec60a2 100644
> --- a/virt/kvm/kvm_main.c
> +++ b/virt/kvm/kvm_main.c
> @@ -873,21 +873,6 @@ int __kvm_set_memory_region(struct kvm *kvm,
>  			goto out_free;
>  	}
>  
> -	/*
> -	 * IOMMU mapping:  New slots need to be mapped.  Old slots need to be
> -	 * un-mapped and re-mapped if their base changes.  Since base change
> -	 * unmapping is handled above with slot deletion, mapping alone is
> -	 * needed here.  Anything else the iommu might care about for existing
> -	 * slots (size changes, userspace addr changes and read-only flag
> -	 * changes) is disallowed above, so any other attribute changes getting
> -	 * here can be skipped.
> -	 */
> -	if ((change == KVM_MR_CREATE) || (change == KVM_MR_MOVE)) {
> -		r = kvm_iommu_map_pages(kvm, &new);
> -		if (r)
> -			goto out_slots;
> -	}
> -
>  	/* actual memory is freed via old in kvm_free_physmem_slot below */
>  	if (change == KVM_MR_DELETE) {
>  		new.dirty_bitmap = NULL;
> @@ -901,6 +886,20 @@ int __kvm_set_memory_region(struct kvm *kvm,
>  	kvm_free_physmem_slot(&old, &new);
>  	kfree(old_memslots);
>  
> +	/*
> +	 * IOMMU mapping:  New slots need to be mapped.  Old slots need to be
> +	 * un-mapped and re-mapped if their base changes.  Since base change
> +	 * unmapping is handled above with slot deletion, mapping alone is
> +	 * needed here.  Anything else the iommu might care about for existing
> +	 * slots (size changes, userspace addr changes and read-only flag
> +	 * changes) is disallowed above, so any other attribute changes getting
> +	 * here can be skipped.
> +	 */
> +	if ((change == KVM_MR_CREATE) || (change == KVM_MR_MOVE)) {
> +		r = kvm_iommu_map_pages(kvm, &new);
> +		return r;
> +	}
> +
>  	return 0;
>  
>  out_slots:
> 

Applied to kvm.git queue, thanks.

Paolo

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH] KVM: Mapping IOMMU pages after updating memslot
  2013-10-24  1:56 [PATCH] KVM: Mapping IOMMU pages after updating memslot Yang Zhang
  2013-10-28 12:57 ` Paolo Bonzini
@ 2013-10-28 19:25 ` Alex Williamson
  1 sibling, 0 replies; 3+ messages in thread
From: Alex Williamson @ 2013-10-28 19:25 UTC (permalink / raw)
  To: Yang Zhang; +Cc: kvm, pbonzini, gleb, patrick.lu

On Thu, 2013-10-24 at 09:56 +0800, Yang Zhang wrote:
> From: Yang Zhang <yang.z.zhang@Intel.com>
> 
> In kvm_iommu_map_pages(), we need to know the page size via call
> kvm_host_page_size(). And it will check whether the target slot
> is valid before return the right page size.
> Currently, we will map the iommu pages when creating a new slot.
> But we call kvm_iommu_map_pages() during preparing the new slot.
> At that time, the new slot is not visible by domain(still in preparing).
> So we cannot get the right page size from kvm_host_page_size() and
> this will break the IOMMU super page logic.
> The solution is to map the iommu pages after we insert the new slot
> into domain.
> 
> Signed-off-by: Yang Zhang <yang.z.zhang@Intel.com>
> Tested-by: Patrick Lu <patrick.lu@intel.com>
> ---
>  virt/kvm/kvm_main.c |   29 ++++++++++++++---------------
>  1 files changed, 14 insertions(+), 15 deletions(-)
> 
> diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
> index d469114..9ec60a2 100644
> --- a/virt/kvm/kvm_main.c
> +++ b/virt/kvm/kvm_main.c
> @@ -873,21 +873,6 @@ int __kvm_set_memory_region(struct kvm *kvm,
>  			goto out_free;
>  	}
>  
> -	/*
> -	 * IOMMU mapping:  New slots need to be mapped.  Old slots need to be
> -	 * un-mapped and re-mapped if their base changes.  Since base change
> -	 * unmapping is handled above with slot deletion, mapping alone is
> -	 * needed here.  Anything else the iommu might care about for existing
> -	 * slots (size changes, userspace addr changes and read-only flag
> -	 * changes) is disallowed above, so any other attribute changes getting
> -	 * here can be skipped.
> -	 */
> -	if ((change == KVM_MR_CREATE) || (change == KVM_MR_MOVE)) {
> -		r = kvm_iommu_map_pages(kvm, &new);
> -		if (r)
> -			goto out_slots;
> -	}
> -
>  	/* actual memory is freed via old in kvm_free_physmem_slot below */
>  	if (change == KVM_MR_DELETE) {
>  		new.dirty_bitmap = NULL;
> @@ -901,6 +886,20 @@ int __kvm_set_memory_region(struct kvm *kvm,
>  	kvm_free_physmem_slot(&old, &new);
>  	kfree(old_memslots);
>  
> +	/*
> +	 * IOMMU mapping:  New slots need to be mapped.  Old slots need to be
> +	 * un-mapped and re-mapped if their base changes.  Since base change
> +	 * unmapping is handled above with slot deletion, mapping alone is
> +	 * needed here.  Anything else the iommu might care about for existing
> +	 * slots (size changes, userspace addr changes and read-only flag
> +	 * changes) is disallowed above, so any other attribute changes getting
> +	 * here can be skipped.
> +	 */
> +	if ((change == KVM_MR_CREATE) || (change == KVM_MR_MOVE)) {
> +		r = kvm_iommu_map_pages(kvm, &new);
> +		return r;
> +	}
> +

An addition to the comment noting that this needs to be done after
install/commit would be helpful.  Thanks,

Alex

>  	return 0;
>  
>  out_slots:




^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2013-10-28 19:25 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2013-10-24  1:56 [PATCH] KVM: Mapping IOMMU pages after updating memslot Yang Zhang
2013-10-28 12:57 ` Paolo Bonzini
2013-10-28 19:25 ` Alex Williamson

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.