From nobody Mon Oct 13 23:27:42 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1582359010; cv=none; d=zohomail.com; s=zohoarc; b=koHgT9WSjVkwus6xmdGZogkv2JH3cN8i3re1OtOREcYsdkhWlpblFXmZKkLOnTWjhck1FDGIQAKPSzgn1NB8AKP1DA1nPIodZQevMT8AxEdIOJH0tMm5FBKuA/PdEUNK8RY5QQ5hDeo1zfvNT4xsx3F+hnbup8PgXc+VyDsGaR4= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1582359010; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To; bh=enF/6sVGrkNp94xXz9bGF4MkRE991xuUx5BLsqETVHs=; b=FvD29GUhfSs0+Y8aS06Kp5y0ZAD+VrG6UCL6UIR7S34dRvz1OvLWKo7Kv0lUdYTpSLKq6NZtT1vAWGJR/GUKjbl8Tw4hArxzSDITjz6dD4HIoTJSk6THkOFAj6BZpAlx2EoBWYqFiftEeRa+owBW3/GmmJRopqCrBXXsoQb1pb0= ARC-Authentication-Results: i=1; mx.zohomail.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 15823590104481016.7766271671959; Sat, 22 Feb 2020 00:10:10 -0800 (PST) Received: from localhost ([::1]:40006 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1j5PrV-00086X-8Z for importer@patchew.org; Sat, 22 Feb 2020 03:10:09 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:57471) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1j5Pjk-0002BD-Ub for qemu-devel@nongnu.org; Sat, 22 Feb 2020 03:02:12 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1j5Pji-000826-Vb for qemu-devel@nongnu.org; Sat, 22 Feb 2020 03:02:08 -0500 Received: from mga12.intel.com ([192.55.52.136]:36228) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1j5Pji-0007zv-M1 for qemu-devel@nongnu.org; Sat, 22 Feb 2020 03:02:06 -0500 Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 22 Feb 2020 00:01:57 -0800 Received: from jacob-builder.jf.intel.com ([10.7.199.155]) by orsmga006.jf.intel.com with ESMTP; 22 Feb 2020 00:01:56 -0800 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.70,471,1574150400"; d="scan'208";a="240547668" From: Liu Yi L To: qemu-devel@nongnu.org, alex.williamson@redhat.com, peterx@redhat.com Subject: [RFC v3.1 06/22] vfio/pci: init HostIOMMUContext per-container Date: Sat, 22 Feb 2020 00:07:07 -0800 Message-Id: <1582358843-51931-7-git-send-email-yi.l.liu@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1582358843-51931-1-git-send-email-yi.l.liu@intel.com> References: <1582358843-51931-1-git-send-email-yi.l.liu@intel.com> X-detected-operating-system: by eggs.gnu.org: Genre and OS details not recognized. X-Received-From: 192.55.52.136 X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: kevin.tian@intel.com, yi.l.liu@intel.com, Yi Sun , kvm@vger.kernel.org, mst@redhat.com, jun.j.tian@intel.com, eric.auger@redhat.com, yi.y.sun@intel.com, Jacob Pan , pbonzini@redhat.com, david@gibson.dropbear.id.au Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" After confirming dual stage DMA translation support with kernel by checking VFIO_TYPE1_NESTING_IOMMU, VFIO inits HostIOMMUContet instance and exposes it to PCI layer. Thus vIOMMU emualtors may make use of such capability by leveraging the ops provided by HostIOMMUContext. Cc: Kevin Tian Cc: Jacob Pan Cc: Peter Xu Cc: Eric Auger Cc: Yi Sun Cc: David Gibson Cc: Alex Williamson Signed-off-by: Liu Yi L --- hw/vfio/common.c | 11 +++++++++++ hw/vfio/pci.c | 21 +++++++++++++++++++++ include/hw/vfio/vfio-common.h | 2 ++ 3 files changed, 34 insertions(+) diff --git a/hw/vfio/common.c b/hw/vfio/common.c index be1a9e5..9ab62a6 100644 --- a/hw/vfio/common.c +++ b/hw/vfio/common.c @@ -1179,10 +1179,15 @@ static int vfio_get_iommu_type(VFIOContainer *conta= iner, return -EINVAL; } =20 +static struct HostIOMMUOps vfio_host_icx_ops =3D { +/* To be added later */ +}; + static int vfio_init_container(VFIOContainer *container, int group_fd, Error **errp) { int iommu_type, ret; + uint64_t flags =3D 0; =20 iommu_type =3D vfio_get_iommu_type(container, errp); if (iommu_type < 0) { @@ -1210,6 +1215,11 @@ static int vfio_init_container(VFIOContainer *contai= ner, int group_fd, return -errno; } =20 + if (iommu_type =3D=3D VFIO_TYPE1_NESTING_IOMMU) { + host_iommu_ctx_init(&container->host_icx, + flags, &vfio_host_icx_ops); + } + container->iommu_type =3D iommu_type; return 0; } @@ -1456,6 +1466,7 @@ static void vfio_disconnect_container(VFIOGroup *grou= p) } =20 trace_vfio_disconnect_container(container->fd); + host_iommu_ctx_destroy(&container->host_icx); close(container->fd); g_free(container); =20 diff --git a/hw/vfio/pci.c b/hw/vfio/pci.c index 5e75a95..df79675 100644 --- a/hw/vfio/pci.c +++ b/hw/vfio/pci.c @@ -2712,11 +2712,20 @@ static void vfio_unregister_req_notifier(VFIOPCIDev= ice *vdev) vdev->req_enabled =3D false; } =20 +static HostIOMMUContext *vfio_host_dma_iommu(PCIDevice *pdev) +{ + VFIOPCIDevice *vdev =3D PCI_VFIO(pdev); + VFIOContainer *container =3D vdev->vbasedev.group->container; + + return &container->host_icx; +} + static void vfio_realize(PCIDevice *pdev, Error **errp) { VFIOPCIDevice *vdev =3D PCI_VFIO(pdev); VFIODevice *vbasedev_iter; VFIOGroup *group; + VFIOContainer *container; char *tmp, *subsys, group_path[PATH_MAX], *group_name; Error *err =3D NULL; ssize_t len; @@ -3028,6 +3037,11 @@ static void vfio_realize(PCIDevice *pdev, Error **er= rp) vfio_register_req_notifier(vdev); vfio_setup_resetfn_quirk(vdev); =20 + container =3D vdev->vbasedev.group->container; + if (container->host_icx.ops) { + pci_device_setup_iommu(pdev, vfio_host_dma_iommu); + } + return; =20 out_deregister: @@ -3072,9 +3086,16 @@ static void vfio_instance_finalize(Object *obj) static void vfio_exitfn(PCIDevice *pdev) { VFIOPCIDevice *vdev =3D PCI_VFIO(pdev); + VFIOContainer *container; =20 vfio_unregister_req_notifier(vdev); vfio_unregister_err_notifier(vdev); + + container =3D vdev->vbasedev.group->container; + if (container->host_icx.ops) { + pci_device_unset_iommu(pdev); + } + pci_device_set_intx_routing_notifier(&vdev->pdev, NULL); if (vdev->irqchip_change_notifier.notify) { kvm_irqchip_remove_change_notifier(&vdev->irqchip_change_notifier); diff --git a/include/hw/vfio/vfio-common.h b/include/hw/vfio/vfio-common.h index fd56420..36abe04 100644 --- a/include/hw/vfio/vfio-common.h +++ b/include/hw/vfio/vfio-common.h @@ -26,6 +26,7 @@ #include "qemu/notify.h" #include "ui/console.h" #include "hw/display/ramfb.h" +#include "hw/iommu/host_iommu_context.h" #ifdef CONFIG_LINUX #include #endif @@ -71,6 +72,7 @@ typedef struct VFIOContainer { MemoryListener listener; MemoryListener prereg_listener; unsigned iommu_type; + HostIOMMUContext host_icx; Error *error; bool initialized; unsigned long pgsizes; --=20 2.7.4