Introduces a VFIO based AP device. The device is defined via
the QEMU command line by specifying:
-device vfio-ap,sysfsdev=<path-to-mediated-matrix-device>
There may be only one vfio-ap device configured for a guest.
The mediated matrix device is created by the VFIO AP device
driver by writing a UUID to a sysfs attribute file (see
docs/vfio-ap.txt). The mediated matrix device will be named
after the UUID. Symbolic links to the $uuid are created in
many places, so the path to the mediated matrix device $uuid
can be specified in any of the following ways:
/sys/devices/vfio_ap/matrix/$uuid
/sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid
/sys/bus/mdev/devices/$uuid
/sys/bus/mdev/drivers/vfio_mdev/$uuid
When the vfio-ap device is realized, it acquires and opens the
VFIO iommu group to which the mediated matrix device is
bound. This causes a VFIO group notification event to be
signaled. The vfio_ap device driver's group notification
handler will get called at which time the device driver
will configure the the AP devices to which the guest will
be granted access.
Signed-off-by: Tony Krowiak <akrowiak@linux.ibm.com>
Tested-by: Pierre Morel<pmorel@linux.ibm.com>
---
MAINTAINERS | 1 +
default-configs/s390x-softmmu.mak | 1 +
hw/vfio/Makefile.objs | 1 +
hw/vfio/ap.c | 180 ++++++++++++++++++++++++++++++
include/hw/vfio/vfio-common.h | 1 +
5 files changed, 184 insertions(+)
create mode 100644 hw/vfio/ap.c
diff --git a/MAINTAINERS b/MAINTAINERS
index 97e8ed808bc0..29041da69237 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -1209,6 +1209,7 @@ F: hw/s390x/ap-device.c
F: hw/s390x/ap-bridge.c
F: include/hw/s390x/ap-device.h
F: include/hw/s390x/ap-bridge.h
+F: hw/vfio/ap.c
L: qemu-s390x@nongnu.org
vhost
diff --git a/default-configs/s390x-softmmu.mak b/default-configs/s390x-softmmu.mak
index d6b67d50f0e4..5eef37592451 100644
--- a/default-configs/s390x-softmmu.mak
+++ b/default-configs/s390x-softmmu.mak
@@ -7,3 +7,4 @@ CONFIG_S390_FLIC=y
CONFIG_S390_FLIC_KVM=$(CONFIG_KVM)
CONFIG_VFIO_CCW=$(CONFIG_LINUX)
CONFIG_WDT_DIAG288=y
+CONFIG_VFIO_AP=$(CONFIG_LINUX)
diff --git a/hw/vfio/Makefile.objs b/hw/vfio/Makefile.objs
index a2e7a0a7cf02..8b3f664d85f7 100644
--- a/hw/vfio/Makefile.objs
+++ b/hw/vfio/Makefile.objs
@@ -6,4 +6,5 @@ obj-$(CONFIG_SOFTMMU) += platform.o
obj-$(CONFIG_VFIO_XGMAC) += calxeda-xgmac.o
obj-$(CONFIG_VFIO_AMD_XGBE) += amd-xgbe.o
obj-$(CONFIG_SOFTMMU) += spapr.o
+obj-$(CONFIG_VFIO_AP) += ap.o
endif
diff --git a/hw/vfio/ap.c b/hw/vfio/ap.c
new file mode 100644
index 000000000000..5543406afc58
--- /dev/null
+++ b/hw/vfio/ap.c
@@ -0,0 +1,180 @@
+/*
+ * VFIO based AP matrix device assignment
+ *
+ * Copyright 2018 IBM Corp.
+ * Author(s): Tony Krowiak <akrowiak@linux.ibm.com>
+ * Halil Pasic <pasic@linux.ibm.com>
+ *
+ * This work is licensed under the terms of the GNU GPL, version 2 or (at
+ * your option) any later version. See the COPYING file in the top-level
+ * directory.
+ */
+
+#include <linux/vfio.h>
+#include <sys/ioctl.h>
+#include "qemu/osdep.h"
+#include "qapi/error.h"
+#include "hw/sysbus.h"
+#include "hw/vfio/vfio.h"
+#include "hw/vfio/vfio-common.h"
+#include "hw/s390x/ap-device.h"
+#include "qemu/error-report.h"
+#include "qemu/queue.h"
+#include "qemu/option.h"
+#include "qemu/config-file.h"
+#include "cpu.h"
+#include "kvm_s390x.h"
+#include "sysemu/sysemu.h"
+#include "hw/s390x/ap-bridge.h"
+#include "exec/address-spaces.h"
+
+#define VFIO_AP_DEVICE_TYPE "vfio-ap"
+
+typedef struct VFIOAPDevice {
+ APDevice apdev;
+ VFIODevice vdev;
+} VFIOAPDevice;
+
+#define VFIO_AP_DEVICE(obj) \
+ OBJECT_CHECK(VFIOAPDevice, (obj), VFIO_AP_DEVICE_TYPE)
+
+static void vfio_ap_compute_needs_reset(VFIODevice *vdev)
+{
+ vdev->needs_reset = false;
+}
+
+/*
+ * We don't need vfio_hot_reset_multi and vfio_eoi operations for
+ * vfio-ap device now.
+ */
+struct VFIODeviceOps vfio_ap_ops = {
+ .vfio_compute_needs_reset = vfio_ap_compute_needs_reset,
+};
+
+static void vfio_ap_put_device(VFIOAPDevice *vapdev)
+{
+ g_free(vapdev->vdev.name);
+ vfio_put_base_device(&vapdev->vdev);
+}
+
+static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
+{
+ GError *gerror;
+ char *symlink, *group_path;
+ int groupid;
+
+ symlink = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev);
+ group_path = g_file_read_link(symlink, &gerror);
+ g_free(symlink);
+
+ if (!group_path) {
+ error_setg(errp, "%s: no iommu_group found for %s: %s",
+ VFIO_AP_DEVICE_TYPE, vapdev->vdev.sysfsdev, gerror->message);
+ return NULL;
+ }
+
+ if (sscanf(basename(group_path), "%d", &groupid) != 1) {
+ error_setg(errp, "vfio: failed to read %s", group_path);
+ return NULL;
+ }
+
+ return vfio_get_group(groupid, &address_space_memory, errp);
+}
+
+static void vfio_ap_realize(DeviceState *dev, Error **errp)
+{
+ int ret;
+ char *mdevid;
+ Error *local_err = NULL;
+ VFIOGroup *vfio_group;
+ APDevice *apdev = AP_DEVICE(dev);
+ VFIOAPDevice *vapdev = VFIO_AP_DEVICE(apdev);
+
+ vfio_group = vfio_ap_get_group(vapdev, &local_err);
+ if (!vfio_group) {
+ goto out_err;
+ }
+
+ vapdev->vdev.ops = &vfio_ap_ops;
+ vapdev->vdev.type = VFIO_DEVICE_TYPE_AP;
+ mdevid = basename(vapdev->vdev.sysfsdev);
+ vapdev->vdev.name = g_strdup_printf("%s", mdevid);
+ vapdev->vdev.dev = dev;
+
+ ret = vfio_get_device(vfio_group, mdevid, &vapdev->vdev, &local_err);
+ if (ret) {
+ goto out_get_dev_err;
+ }
+
+ /* Enable hardware to intepret AP instructions executed on the guest */
+ object_property_set_bool(OBJECT(qdev_get_machine()), true, "apie", NULL);
+
+ return;
+
+out_get_dev_err:
+ vfio_ap_put_device(vapdev);
+ vfio_put_group(vfio_group);
+out_err:
+ error_propagate(errp, local_err);
+}
+
+static void vfio_ap_unrealize(DeviceState *dev, Error **errp)
+{
+ APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev);
+ VFIOAPDevice *vapdev = DO_UPCAST(VFIOAPDevice, apdev, apdev);
+ VFIOGroup *group = vapdev->vdev.group;
+
+ vfio_ap_put_device(vapdev);
+ vfio_put_group(group);
+}
+
+static Property vfio_ap_properties[] = {
+ DEFINE_PROP_STRING("sysfsdev", VFIOAPDevice, vdev.sysfsdev),
+ DEFINE_PROP_END_OF_LIST(),
+};
+
+static void vfio_ap_reset(DeviceState *dev)
+{
+ int ret;
+ APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev);
+ VFIOAPDevice *vapdev = DO_UPCAST(VFIOAPDevice, apdev, apdev);
+
+ ret = ioctl(vapdev->vdev.fd, VFIO_DEVICE_RESET);
+ if (ret) {
+ error_report("%s: failed to reset %s device: %s", __func__,
+ vapdev->vdev.name, strerror(ret));
+ }
+}
+
+static const VMStateDescription vfio_ap_vmstate = {
+ .name = VFIO_AP_DEVICE_TYPE,
+ .unmigratable = 1,
+};
+
+static void vfio_ap_class_init(ObjectClass *klass, void *data)
+{
+ DeviceClass *dc = DEVICE_CLASS(klass);
+
+ dc->props = vfio_ap_properties;
+ dc->vmsd = &vfio_ap_vmstate;
+ dc->desc = "VFIO-based AP device assignment";
+ dc->realize = vfio_ap_realize;
+ dc->unrealize = vfio_ap_unrealize;
+ dc->hotpluggable = false;
+ dc->reset = vfio_ap_reset;
+ dc->bus_type = TYPE_AP_BUS;
+}
+
+static const TypeInfo vfio_ap_info = {
+ .name = VFIO_AP_DEVICE_TYPE,
+ .parent = AP_DEVICE_TYPE,
+ .instance_size = sizeof(VFIOAPDevice),
+ .class_init = vfio_ap_class_init,
+};
+
+static void vfio_ap_type_init(void)
+{
+ type_register_static(&vfio_ap_info);
+}
+
+type_init(vfio_ap_type_init)
diff --git a/include/hw/vfio/vfio-common.h b/include/hw/vfio/vfio-common.h
index 821def05658f..6be9a93f611b 100644
--- a/include/hw/vfio/vfio-common.h
+++ b/include/hw/vfio/vfio-common.h
@@ -37,6 +37,7 @@ enum {
VFIO_DEVICE_TYPE_PCI = 0,
VFIO_DEVICE_TYPE_PLATFORM = 1,
VFIO_DEVICE_TYPE_CCW = 2,
+ VFIO_DEVICE_TYPE_AP = 3,
};
typedef struct VFIOMmap {
--
2.19.0.221.g150f307
> +static void vfio_ap_realize(DeviceState *dev, Error **errp)
> +{
> + int ret;
> + char *mdevid;
> + Error *local_err = NULL;
> + VFIOGroup *vfio_group;
> + APDevice *apdev = AP_DEVICE(dev);
> + VFIOAPDevice *vapdev = VFIO_AP_DEVICE(apdev);
> +
> + vfio_group = vfio_ap_get_group(vapdev, &local_err);
> + if (!vfio_group) {
> + goto out_err;
> + }
> +
> + vapdev->vdev.ops = &vfio_ap_ops;
> + vapdev->vdev.type = VFIO_DEVICE_TYPE_AP;
> + mdevid = basename(vapdev->vdev.sysfsdev);
> + vapdev->vdev.name = g_strdup_printf("%s", mdevid);
> + vapdev->vdev.dev = dev;
> +
> + ret = vfio_get_device(vfio_group, mdevid, &vapdev->vdev, &local_err);
> + if (ret) {
> + goto out_get_dev_err;
> + }
> +
> + /* Enable hardware to intepret AP instructions executed on the guest */
> + object_property_set_bool(OBJECT(qdev_get_machine()), true, "apie", NULL);
> +
I commented on the old version that this is wrong (if I am not starting
to lose my memory). This has to go. (there is no such property, this
will simply report an error we ignore)
(can most probably be fixed when applying)
--
Thanks,
David / dhildenb
On 09/10/2018 21:51, David Hildenbrand wrote:
>
>> +static void vfio_ap_realize(DeviceState *dev, Error **errp)
>> +{
>> + int ret;
>> + char *mdevid;
>> + Error *local_err = NULL;
>> + VFIOGroup *vfio_group;
>> + APDevice *apdev = AP_DEVICE(dev);
>> + VFIOAPDevice *vapdev = VFIO_AP_DEVICE(apdev);
>> +
>> + vfio_group = vfio_ap_get_group(vapdev, &local_err);
>> + if (!vfio_group) {
>> + goto out_err;
>> + }
>> +
>> + vapdev->vdev.ops = &vfio_ap_ops;
>> + vapdev->vdev.type = VFIO_DEVICE_TYPE_AP;
>> + mdevid = basename(vapdev->vdev.sysfsdev);
>> + vapdev->vdev.name = g_strdup_printf("%s", mdevid);
>> + vapdev->vdev.dev = dev;
>> +
>> + ret = vfio_get_device(vfio_group, mdevid, &vapdev->vdev, &local_err);
>> + if (ret) {
>> + goto out_get_dev_err;
>> + }
>> +
>> + /* Enable hardware to intepret AP instructions executed on the guest */
>> + object_property_set_bool(OBJECT(qdev_get_machine()), true, "apie", NULL);
>> +
>
> I commented on the old version that this is wrong (if I am not starting
> to lose my memory). This has to go. (there is no such property, this
> will simply report an error we ignore)
>
> (can most probably be fixed when applying)
>
+1
absolutely no problem to remove this line.
I also tested without this line.
--
Pierre Morel
Linux/KVM/QEMU in Böblingen - Germany
On Wed, 10 Oct 2018 09:29:10 +0200
Pierre Morel <pmorel@linux.ibm.com> wrote:
> On 09/10/2018 21:51, David Hildenbrand wrote:
> >
> >> +static void vfio_ap_realize(DeviceState *dev, Error **errp)
> >> +{
> >> + int ret;
> >> + char *mdevid;
> >> + Error *local_err = NULL;
> >> + VFIOGroup *vfio_group;
> >> + APDevice *apdev = AP_DEVICE(dev);
> >> + VFIOAPDevice *vapdev = VFIO_AP_DEVICE(apdev);
> >> +
> >> + vfio_group = vfio_ap_get_group(vapdev, &local_err);
> >> + if (!vfio_group) {
> >> + goto out_err;
> >> + }
> >> +
> >> + vapdev->vdev.ops = &vfio_ap_ops;
> >> + vapdev->vdev.type = VFIO_DEVICE_TYPE_AP;
> >> + mdevid = basename(vapdev->vdev.sysfsdev);
> >> + vapdev->vdev.name = g_strdup_printf("%s", mdevid);
> >> + vapdev->vdev.dev = dev;
> >> +
> >> + ret = vfio_get_device(vfio_group, mdevid, &vapdev->vdev, &local_err);
> >> + if (ret) {
> >> + goto out_get_dev_err;
> >> + }
> >> +
> >> + /* Enable hardware to intepret AP instructions executed on the guest */
> >> + object_property_set_bool(OBJECT(qdev_get_machine()), true, "apie", NULL);
> >> +
> >
> > I commented on the old version that this is wrong (if I am not starting
> > to lose my memory). This has to go. (there is no such property, this
> > will simply report an error we ignore)
> >
> > (can most probably be fixed when applying)
> >
>
> +1
> absolutely no problem to remove this line.
> I also tested without this line.
>
Yes, I can simply drop it when applying. Thanks for verifying :)
On 10/09/2018 03:51 PM, David Hildenbrand wrote:
>
>> +static void vfio_ap_realize(DeviceState *dev, Error **errp)
>> +{
>> + int ret;
>> + char *mdevid;
>> + Error *local_err = NULL;
>> + VFIOGroup *vfio_group;
>> + APDevice *apdev = AP_DEVICE(dev);
>> + VFIOAPDevice *vapdev = VFIO_AP_DEVICE(apdev);
>> +
>> + vfio_group = vfio_ap_get_group(vapdev, &local_err);
>> + if (!vfio_group) {
>> + goto out_err;
>> + }
>> +
>> + vapdev->vdev.ops = &vfio_ap_ops;
>> + vapdev->vdev.type = VFIO_DEVICE_TYPE_AP;
>> + mdevid = basename(vapdev->vdev.sysfsdev);
>> + vapdev->vdev.name = g_strdup_printf("%s", mdevid);
>> + vapdev->vdev.dev = dev;
>> +
>> + ret = vfio_get_device(vfio_group, mdevid, &vapdev->vdev, &local_err);
>> + if (ret) {
>> + goto out_get_dev_err;
>> + }
>> +
>> + /* Enable hardware to intepret AP instructions executed on the guest */
>> + object_property_set_bool(OBJECT(qdev_get_machine()), true, "apie", NULL);
>> +
>
> I commented on the old version that this is wrong (if I am not starting
> to lose my memory). This has to go. (there is no such property, this
> will simply report an error we ignore)
>
> (can most probably be fixed when applying)
I don't recall whether you mentioned it, but I will fix it, or it can be
fixed when applied .... Connie?
>
On 2018-10-09 19:52, Tony Krowiak wrote:
> Introduces a VFIO based AP device. The device is defined via
> the QEMU command line by specifying:
>
> -device vfio-ap,sysfsdev=<path-to-mediated-matrix-device>
>
> There may be only one vfio-ap device configured for a guest.
>
> The mediated matrix device is created by the VFIO AP device
> driver by writing a UUID to a sysfs attribute file (see
> docs/vfio-ap.txt). The mediated matrix device will be named
> after the UUID. Symbolic links to the $uuid are created in
> many places, so the path to the mediated matrix device $uuid
> can be specified in any of the following ways:
>
> /sys/devices/vfio_ap/matrix/$uuid
> /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid
> /sys/bus/mdev/devices/$uuid
> /sys/bus/mdev/drivers/vfio_mdev/$uuid
>
> When the vfio-ap device is realized, it acquires and opens the
> VFIO iommu group to which the mediated matrix device is
> bound. This causes a VFIO group notification event to be
> signaled. The vfio_ap device driver's group notification
> handler will get called at which time the device driver
> will configure the the AP devices to which the guest will
> be granted access.
>
> Signed-off-by: Tony Krowiak <akrowiak@linux.ibm.com>
> Tested-by: Pierre Morel<pmorel@linux.ibm.com>
> ---
[...]
> +static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
> +{
> + GError *gerror;
> + char *symlink, *group_path;
> + int groupid;
> +
> + symlink = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev);
> + group_path = g_file_read_link(symlink, &gerror);
> + g_free(symlink);
> +
> + if (!group_path) {
> + error_setg(errp, "%s: no iommu_group found for %s: %s",
> + VFIO_AP_DEVICE_TYPE, vapdev->vdev.sysfsdev, gerror->message);
> + return NULL;
> + }
> +
> + if (sscanf(basename(group_path), "%d", &groupid) != 1) {
> + error_setg(errp, "vfio: failed to read %s", group_path);
> + return NULL;
> + }
> +
> + return vfio_get_group(groupid, &address_space_memory, errp);
> +}
I think you've got to g_free(group_path) after you don't need it anymore.
> +static void vfio_ap_realize(DeviceState *dev, Error **errp)
> +{
> + int ret;
> + char *mdevid;
> + Error *local_err = NULL;
> + VFIOGroup *vfio_group;
> + APDevice *apdev = AP_DEVICE(dev);
> + VFIOAPDevice *vapdev = VFIO_AP_DEVICE(apdev);
> +
> + vfio_group = vfio_ap_get_group(vapdev, &local_err);
> + if (!vfio_group) {
> + goto out_err;
> + }
> +
> + vapdev->vdev.ops = &vfio_ap_ops;
> + vapdev->vdev.type = VFIO_DEVICE_TYPE_AP;
> + mdevid = basename(vapdev->vdev.sysfsdev);
> + vapdev->vdev.name = g_strdup_printf("%s", mdevid);
> + vapdev->vdev.dev = dev;
> +
> + ret = vfio_get_device(vfio_group, mdevid, &vapdev->vdev, &local_err);
> + if (ret) {
> + goto out_get_dev_err;
> + }
> +
> + /* Enable hardware to intepret AP instructions executed on the guest */
> + object_property_set_bool(OBJECT(qdev_get_machine()), true, "apie", NULL);
> +
> + return;
> +
> +out_get_dev_err:
> + vfio_ap_put_device(vapdev);
> + vfio_put_group(vfio_group);
> +out_err:
> + error_propagate(errp, local_err);
> +}
> +
> +static void vfio_ap_unrealize(DeviceState *dev, Error **errp)
> +{
> + APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev);
> + VFIOAPDevice *vapdev = DO_UPCAST(VFIOAPDevice, apdev, apdev);
Didn't you want to remove the DO_UPCASTs ?
> + VFIOGroup *group = vapdev->vdev.group;
> +
> + vfio_ap_put_device(vapdev);
> + vfio_put_group(group);
> +}
> +
> +static Property vfio_ap_properties[] = {
> + DEFINE_PROP_STRING("sysfsdev", VFIOAPDevice, vdev.sysfsdev),
> + DEFINE_PROP_END_OF_LIST(),
> +};
> +
> +static void vfio_ap_reset(DeviceState *dev)
> +{
> + int ret;
> + APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev);
> + VFIOAPDevice *vapdev = DO_UPCAST(VFIOAPDevice, apdev, apdev);
dito
> + ret = ioctl(vapdev->vdev.fd, VFIO_DEVICE_RESET);
> + if (ret) {
> + error_report("%s: failed to reset %s device: %s", __func__,
> + vapdev->vdev.name, strerror(ret));
> + }
> +}
Thomas
On Wed, 10 Oct 2018 10:25:22 +0200
Thomas Huth <thuth@redhat.com> wrote:
> On 2018-10-09 19:52, Tony Krowiak wrote:
> [...]
> > +static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
> > +{
> > + GError *gerror;
> > + char *symlink, *group_path;
> > + int groupid;
> > +
> > + symlink = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev);
> > + group_path = g_file_read_link(symlink, &gerror);
> > + g_free(symlink);
> > +
> > + if (!group_path) {
> > + error_setg(errp, "%s: no iommu_group found for %s: %s",
> > + VFIO_AP_DEVICE_TYPE, vapdev->vdev.sysfsdev, gerror->message);
> > + return NULL;
> > + }
> > +
> > + if (sscanf(basename(group_path), "%d", &groupid) != 1) {
> > + error_setg(errp, "vfio: failed to read %s", group_path);
> > + return NULL;
> > + }
> > +
> > + return vfio_get_group(groupid, &address_space_memory, errp);
> > +}
>
> I think you've got to g_free(group_path) after you don't need it anymore.
>
> > +static void vfio_ap_realize(DeviceState *dev, Error **errp)
> > +{
> > + int ret;
> > + char *mdevid;
> > + Error *local_err = NULL;
> > + VFIOGroup *vfio_group;
> > + APDevice *apdev = AP_DEVICE(dev);
> > + VFIOAPDevice *vapdev = VFIO_AP_DEVICE(apdev);
> > +
> > + vfio_group = vfio_ap_get_group(vapdev, &local_err);
> > + if (!vfio_group) {
> > + goto out_err;
> > + }
> > +
> > + vapdev->vdev.ops = &vfio_ap_ops;
> > + vapdev->vdev.type = VFIO_DEVICE_TYPE_AP;
> > + mdevid = basename(vapdev->vdev.sysfsdev);
> > + vapdev->vdev.name = g_strdup_printf("%s", mdevid);
> > + vapdev->vdev.dev = dev;
> > +
> > + ret = vfio_get_device(vfio_group, mdevid, &vapdev->vdev, &local_err);
> > + if (ret) {
> > + goto out_get_dev_err;
> > + }
> > +
> > + /* Enable hardware to intepret AP instructions executed on the guest */
> > + object_property_set_bool(OBJECT(qdev_get_machine()), true, "apie", NULL);
> > +
> > + return;
> > +
> > +out_get_dev_err:
> > + vfio_ap_put_device(vapdev);
> > + vfio_put_group(vfio_group);
> > +out_err:
> > + error_propagate(errp, local_err);
> > +}
> > +
> > +static void vfio_ap_unrealize(DeviceState *dev, Error **errp)
> > +{
> > + APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev);
> > + VFIOAPDevice *vapdev = DO_UPCAST(VFIOAPDevice, apdev, apdev);
>
> Didn't you want to remove the DO_UPCASTs ?
>
> > + VFIOGroup *group = vapdev->vdev.group;
> > +
> > + vfio_ap_put_device(vapdev);
> > + vfio_put_group(group);
> > +}
> > +
> > +static Property vfio_ap_properties[] = {
> > + DEFINE_PROP_STRING("sysfsdev", VFIOAPDevice, vdev.sysfsdev),
> > + DEFINE_PROP_END_OF_LIST(),
> > +};
> > +
> > +static void vfio_ap_reset(DeviceState *dev)
> > +{
> > + int ret;
> > + APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev);
> > + VFIOAPDevice *vapdev = DO_UPCAST(VFIOAPDevice, apdev, apdev);
>
> dito
>
> > + ret = ioctl(vapdev->vdev.fd, VFIO_DEVICE_RESET);
> > + if (ret) {
> > + error_report("%s: failed to reset %s device: %s", __func__,
> > + vapdev->vdev.name, strerror(ret));
> > + }
> > +}
OK, this is now a bit too much stuff all in all to change while
applying...
Tony, can you please do a respin with these changes and the other
things people have noticed? Thanks!
On 10/10/2018 04:52 AM, Cornelia Huck wrote:
> On Wed, 10 Oct 2018 10:25:22 +0200
> Thomas Huth <thuth@redhat.com> wrote:
>
>> On 2018-10-09 19:52, Tony Krowiak wrote:
>
>> [...]
>>> +static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
>>> +{
>>> + GError *gerror;
>>> + char *symlink, *group_path;
>>> + int groupid;
>>> +
>>> + symlink = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev);
>>> + group_path = g_file_read_link(symlink, &gerror);
>>> + g_free(symlink);
>>> +
>>> + if (!group_path) {
>>> + error_setg(errp, "%s: no iommu_group found for %s: %s",
>>> + VFIO_AP_DEVICE_TYPE, vapdev->vdev.sysfsdev, gerror->message);
>>> + return NULL;
>>> + }
>>> +
>>> + if (sscanf(basename(group_path), "%d", &groupid) != 1) {
>>> + error_setg(errp, "vfio: failed to read %s", group_path);
>>> + return NULL;
>>> + }
>>> +
>>> + return vfio_get_group(groupid, &address_space_memory, errp);
>>> +}
>>
>> I think you've got to g_free(group_path) after you don't need it anymore.
>>
>>> +static void vfio_ap_realize(DeviceState *dev, Error **errp)
>>> +{
>>> + int ret;
>>> + char *mdevid;
>>> + Error *local_err = NULL;
>>> + VFIOGroup *vfio_group;
>>> + APDevice *apdev = AP_DEVICE(dev);
>>> + VFIOAPDevice *vapdev = VFIO_AP_DEVICE(apdev);
>>> +
>>> + vfio_group = vfio_ap_get_group(vapdev, &local_err);
>>> + if (!vfio_group) {
>>> + goto out_err;
>>> + }
>>> +
>>> + vapdev->vdev.ops = &vfio_ap_ops;
>>> + vapdev->vdev.type = VFIO_DEVICE_TYPE_AP;
>>> + mdevid = basename(vapdev->vdev.sysfsdev);
>>> + vapdev->vdev.name = g_strdup_printf("%s", mdevid);
>>> + vapdev->vdev.dev = dev;
>>> +
>>> + ret = vfio_get_device(vfio_group, mdevid, &vapdev->vdev, &local_err);
>>> + if (ret) {
>>> + goto out_get_dev_err;
>>> + }
>>> +
>>> + /* Enable hardware to intepret AP instructions executed on the guest */
>>> + object_property_set_bool(OBJECT(qdev_get_machine()), true, "apie", NULL);
>>> +
>>> + return;
>>> +
>>> +out_get_dev_err:
>>> + vfio_ap_put_device(vapdev);
>>> + vfio_put_group(vfio_group);
>>> +out_err:
>>> + error_propagate(errp, local_err);
>>> +}
>>> +
>>> +static void vfio_ap_unrealize(DeviceState *dev, Error **errp)
>>> +{
>>> + APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev);
>>> + VFIOAPDevice *vapdev = DO_UPCAST(VFIOAPDevice, apdev, apdev);
>>
>> Didn't you want to remove the DO_UPCASTs ?
>>
>>> + VFIOGroup *group = vapdev->vdev.group;
>>> +
>>> + vfio_ap_put_device(vapdev);
>>> + vfio_put_group(group);
>>> +}
>>> +
>>> +static Property vfio_ap_properties[] = {
>>> + DEFINE_PROP_STRING("sysfsdev", VFIOAPDevice, vdev.sysfsdev),
>>> + DEFINE_PROP_END_OF_LIST(),
>>> +};
>>> +
>>> +static void vfio_ap_reset(DeviceState *dev)
>>> +{
>>> + int ret;
>>> + APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev);
>>> + VFIOAPDevice *vapdev = DO_UPCAST(VFIOAPDevice, apdev, apdev);
>>
>> dito
>>
>>> + ret = ioctl(vapdev->vdev.fd, VFIO_DEVICE_RESET);
>>> + if (ret) {
>>> + error_report("%s: failed to reset %s device: %s", __func__,
>>> + vapdev->vdev.name, strerror(ret));
>>> + }
>>> +}
>
> OK, this is now a bit too much stuff all in all to change while
> applying...
>
> Tony, can you please do a respin with these changes and the other
> things people have noticed? Thanks!
I will have v11 posted today.
>
On 10/10/2018 04:25 AM, Thomas Huth wrote:
> On 2018-10-09 19:52, Tony Krowiak wrote:
>> Introduces a VFIO based AP device. The device is defined via
>> the QEMU command line by specifying:
>>
>> -device vfio-ap,sysfsdev=<path-to-mediated-matrix-device>
>>
>> There may be only one vfio-ap device configured for a guest.
>>
>> The mediated matrix device is created by the VFIO AP device
>> driver by writing a UUID to a sysfs attribute file (see
>> docs/vfio-ap.txt). The mediated matrix device will be named
>> after the UUID. Symbolic links to the $uuid are created in
>> many places, so the path to the mediated matrix device $uuid
>> can be specified in any of the following ways:
>>
>> /sys/devices/vfio_ap/matrix/$uuid
>> /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid
>> /sys/bus/mdev/devices/$uuid
>> /sys/bus/mdev/drivers/vfio_mdev/$uuid
>>
>> When the vfio-ap device is realized, it acquires and opens the
>> VFIO iommu group to which the mediated matrix device is
>> bound. This causes a VFIO group notification event to be
>> signaled. The vfio_ap device driver's group notification
>> handler will get called at which time the device driver
>> will configure the the AP devices to which the guest will
>> be granted access.
>>
>> Signed-off-by: Tony Krowiak <akrowiak@linux.ibm.com>
>> Tested-by: Pierre Morel<pmorel@linux.ibm.com>
>> ---
> [...]
>> +static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
>> +{
>> + GError *gerror;
>> + char *symlink, *group_path;
>> + int groupid;
>> +
>> + symlink = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev);
>> + group_path = g_file_read_link(symlink, &gerror);
>> + g_free(symlink);
>> +
>> + if (!group_path) {
>> + error_setg(errp, "%s: no iommu_group found for %s: %s",
>> + VFIO_AP_DEVICE_TYPE, vapdev->vdev.sysfsdev, gerror->message);
>> + return NULL;
>> + }
>> +
>> + if (sscanf(basename(group_path), "%d", &groupid) != 1) {
>> + error_setg(errp, "vfio: failed to read %s", group_path);
>> + return NULL;
>> + }
>> +
>> + return vfio_get_group(groupid, &address_space_memory, errp);
>> +}
>
> I think you've got to g_free(group_path) after you don't need it anymore.
Right you are.
>
>> +static void vfio_ap_realize(DeviceState *dev, Error **errp)
>> +{
>> + int ret;
>> + char *mdevid;
>> + Error *local_err = NULL;
>> + VFIOGroup *vfio_group;
>> + APDevice *apdev = AP_DEVICE(dev);
>> + VFIOAPDevice *vapdev = VFIO_AP_DEVICE(apdev);
>> +
>> + vfio_group = vfio_ap_get_group(vapdev, &local_err);
>> + if (!vfio_group) {
>> + goto out_err;
>> + }
>> +
>> + vapdev->vdev.ops = &vfio_ap_ops;
>> + vapdev->vdev.type = VFIO_DEVICE_TYPE_AP;
>> + mdevid = basename(vapdev->vdev.sysfsdev);
>> + vapdev->vdev.name = g_strdup_printf("%s", mdevid);
>> + vapdev->vdev.dev = dev;
>> +
>> + ret = vfio_get_device(vfio_group, mdevid, &vapdev->vdev, &local_err);
>> + if (ret) {
>> + goto out_get_dev_err;
>> + }
>> +
>> + /* Enable hardware to intepret AP instructions executed on the guest */
>> + object_property_set_bool(OBJECT(qdev_get_machine()), true, "apie", NULL);
>> +
>> + return;
>> +
>> +out_get_dev_err:
>> + vfio_ap_put_device(vapdev);
>> + vfio_put_group(vfio_group);
>> +out_err:
>> + error_propagate(errp, local_err);
>> +}
>> +
>> +static void vfio_ap_unrealize(DeviceState *dev, Error **errp)
>> +{
>> + APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev);
>> + VFIOAPDevice *vapdev = DO_UPCAST(VFIOAPDevice, apdev, apdev);
>
> Didn't you want to remove the DO_UPCASTs ?
oops, missed these .... fixed them in the realize function, but
missed this one and the next .... will fix
>
>> + VFIOGroup *group = vapdev->vdev.group;
>> +
>> + vfio_ap_put_device(vapdev);
>> + vfio_put_group(group);
>> +}
>> +
>> +static Property vfio_ap_properties[] = {
>> + DEFINE_PROP_STRING("sysfsdev", VFIOAPDevice, vdev.sysfsdev),
>> + DEFINE_PROP_END_OF_LIST(),
>> +};
>> +
>> +static void vfio_ap_reset(DeviceState *dev)
>> +{
>> + int ret;
>> + APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev);
>> + VFIOAPDevice *vapdev = DO_UPCAST(VFIOAPDevice, apdev, apdev);
>
> dito
ditto
>
>> + ret = ioctl(vapdev->vdev.fd, VFIO_DEVICE_RESET);
>> + if (ret) {
>> + error_report("%s: failed to reset %s device: %s", __func__,
>> + vapdev->vdev.name, strerror(ret));
>> + }
>> +}
>
> Thomas
>
On Tue, 9 Oct 2018 13:52:25 -0400 Tony Krowiak <akrowiak@linux.vnet.ibm.com> wrote: > diff --git a/MAINTAINERS b/MAINTAINERS > index 97e8ed808bc0..29041da69237 100644 > --- a/MAINTAINERS > +++ b/MAINTAINERS > @@ -1209,6 +1209,7 @@ F: hw/s390x/ap-device.c > F: hw/s390x/ap-bridge.c > F: include/hw/s390x/ap-device.h > F: include/hw/s390x/ap-bridge.h > +F: hw/vfio/ap.c > L: qemu-s390x@nongnu.org > > vhost Can you please also add hw/vfio/ap.c to the overall s390 architecture section in MAINTAINERS? The existing pattern does not catch it (but it does catch the files added in the last patch, so that's ok.)
On 10/10/2018 05:21 AM, Cornelia Huck wrote: > On Tue, 9 Oct 2018 13:52:25 -0400 > Tony Krowiak <akrowiak@linux.vnet.ibm.com> wrote: > > >> diff --git a/MAINTAINERS b/MAINTAINERS >> index 97e8ed808bc0..29041da69237 100644 >> --- a/MAINTAINERS >> +++ b/MAINTAINERS >> @@ -1209,6 +1209,7 @@ F: hw/s390x/ap-device.c >> F: hw/s390x/ap-bridge.c >> F: include/hw/s390x/ap-device.h >> F: include/hw/s390x/ap-bridge.h >> +F: hw/vfio/ap.c >> L: qemu-s390x@nongnu.org >> >> vhost > > Can you please also add hw/vfio/ap.c to the overall s390 architecture > section in MAINTAINERS? The existing pattern does not catch it (but it > does catch the files added in the last patch, so that's ok.) Yes I can. >
On 10/09/2018 07:52 PM, Tony Krowiak wrote:
> Introduces a VFIO based AP device. The device is defined via
> the QEMU command line by specifying:
>
> -device vfio-ap,sysfsdev=<path-to-mediated-matrix-device>
>
> There may be only one vfio-ap device configured for a guest.
>
> The mediated matrix device is created by the VFIO AP device
> driver by writing a UUID to a sysfs attribute file (see
> docs/vfio-ap.txt). The mediated matrix device will be named
> after the UUID. Symbolic links to the $uuid are created in
> many places, so the path to the mediated matrix device $uuid
> can be specified in any of the following ways:
>
> /sys/devices/vfio_ap/matrix/$uuid
> /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid
> /sys/bus/mdev/devices/$uuid
> /sys/bus/mdev/drivers/vfio_mdev/$uuid
>
> When the vfio-ap device is realized, it acquires and opens the
> VFIO iommu group to which the mediated matrix device is
> bound. This causes a VFIO group notification event to be
> signaled. The vfio_ap device driver's group notification
> handler will get called at which time the device driver
> will configure the the AP devices to which the guest will
> be granted access.
>
> Signed-off-by: Tony Krowiak <akrowiak@linux.ibm.com>
> Tested-by: Pierre Morel<pmorel@linux.ibm.com>
Whit the things Thomas and David noticed fixed:
Acked-by: Halil Pasic <pasic@linux.ibm.com>
> ---
> MAINTAINERS | 1 +
> default-configs/s390x-softmmu.mak | 1 +
> hw/vfio/Makefile.objs | 1 +
> hw/vfio/ap.c | 180 ++++++++++++++++++++++++++++++
> include/hw/vfio/vfio-common.h | 1 +
> 5 files changed, 184 insertions(+)
> create mode 100644 hw/vfio/ap.c
>
> diff --git a/MAINTAINERS b/MAINTAINERS
> index 97e8ed808bc0..29041da69237 100644
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -1209,6 +1209,7 @@ F: hw/s390x/ap-device.c
> F: hw/s390x/ap-bridge.c
> F: include/hw/s390x/ap-device.h
> F: include/hw/s390x/ap-bridge.h
> +F: hw/vfio/ap.c
> L: qemu-s390x@nongnu.org
>
> vhost
> diff --git a/default-configs/s390x-softmmu.mak b/default-configs/s390x-softmmu.mak
> index d6b67d50f0e4..5eef37592451 100644
> --- a/default-configs/s390x-softmmu.mak
> +++ b/default-configs/s390x-softmmu.mak
> @@ -7,3 +7,4 @@ CONFIG_S390_FLIC=y
> CONFIG_S390_FLIC_KVM=$(CONFIG_KVM)
> CONFIG_VFIO_CCW=$(CONFIG_LINUX)
> CONFIG_WDT_DIAG288=y
> +CONFIG_VFIO_AP=$(CONFIG_LINUX)
> diff --git a/hw/vfio/Makefile.objs b/hw/vfio/Makefile.objs
> index a2e7a0a7cf02..8b3f664d85f7 100644
> --- a/hw/vfio/Makefile.objs
> +++ b/hw/vfio/Makefile.objs
> @@ -6,4 +6,5 @@ obj-$(CONFIG_SOFTMMU) += platform.o
> obj-$(CONFIG_VFIO_XGMAC) += calxeda-xgmac.o
> obj-$(CONFIG_VFIO_AMD_XGBE) += amd-xgbe.o
> obj-$(CONFIG_SOFTMMU) += spapr.o
> +obj-$(CONFIG_VFIO_AP) += ap.o
> endif
> diff --git a/hw/vfio/ap.c b/hw/vfio/ap.c
> new file mode 100644
> index 000000000000..5543406afc58
> --- /dev/null
> +++ b/hw/vfio/ap.c
> @@ -0,0 +1,180 @@
> +/*
> + * VFIO based AP matrix device assignment
> + *
> + * Copyright 2018 IBM Corp.
> + * Author(s): Tony Krowiak <akrowiak@linux.ibm.com>
> + * Halil Pasic <pasic@linux.ibm.com>
> + *
> + * This work is licensed under the terms of the GNU GPL, version 2 or (at
> + * your option) any later version. See the COPYING file in the top-level
> + * directory.
> + */
> +
> +#include <linux/vfio.h>
> +#include <sys/ioctl.h>
> +#include "qemu/osdep.h"
> +#include "qapi/error.h"
> +#include "hw/sysbus.h"
> +#include "hw/vfio/vfio.h"
> +#include "hw/vfio/vfio-common.h"
> +#include "hw/s390x/ap-device.h"
> +#include "qemu/error-report.h"
> +#include "qemu/queue.h"
> +#include "qemu/option.h"
> +#include "qemu/config-file.h"
> +#include "cpu.h"
> +#include "kvm_s390x.h"
> +#include "sysemu/sysemu.h"
> +#include "hw/s390x/ap-bridge.h"
> +#include "exec/address-spaces.h"
> +
> +#define VFIO_AP_DEVICE_TYPE "vfio-ap"
> +
> +typedef struct VFIOAPDevice {
> + APDevice apdev;
> + VFIODevice vdev;
> +} VFIOAPDevice;
> +
> +#define VFIO_AP_DEVICE(obj) \
> + OBJECT_CHECK(VFIOAPDevice, (obj), VFIO_AP_DEVICE_TYPE)
> +
> +static void vfio_ap_compute_needs_reset(VFIODevice *vdev)
> +{
> + vdev->needs_reset = false;
> +}
> +
> +/*
> + * We don't need vfio_hot_reset_multi and vfio_eoi operations for
> + * vfio-ap device now.
> + */
> +struct VFIODeviceOps vfio_ap_ops = {
> + .vfio_compute_needs_reset = vfio_ap_compute_needs_reset,
> +};
> +
> +static void vfio_ap_put_device(VFIOAPDevice *vapdev)
> +{
> + g_free(vapdev->vdev.name);
> + vfio_put_base_device(&vapdev->vdev);
> +}
> +
> +static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
> +{
> + GError *gerror;
> + char *symlink, *group_path;
> + int groupid;
> +
> + symlink = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev);
> + group_path = g_file_read_link(symlink, &gerror);
> + g_free(symlink);
> +
> + if (!group_path) {
> + error_setg(errp, "%s: no iommu_group found for %s: %s",
> + VFIO_AP_DEVICE_TYPE, vapdev->vdev.sysfsdev, gerror->message);
> + return NULL;
> + }
> +
> + if (sscanf(basename(group_path), "%d", &groupid) != 1) {
> + error_setg(errp, "vfio: failed to read %s", group_path);
> + return NULL;
> + }
> +
> + return vfio_get_group(groupid, &address_space_memory, errp);
> +}
> +
> +static void vfio_ap_realize(DeviceState *dev, Error **errp)
> +{
> + int ret;
> + char *mdevid;
> + Error *local_err = NULL;
> + VFIOGroup *vfio_group;
> + APDevice *apdev = AP_DEVICE(dev);
> + VFIOAPDevice *vapdev = VFIO_AP_DEVICE(apdev);
> +
> + vfio_group = vfio_ap_get_group(vapdev, &local_err);
> + if (!vfio_group) {
> + goto out_err;
> + }
> +
> + vapdev->vdev.ops = &vfio_ap_ops;
> + vapdev->vdev.type = VFIO_DEVICE_TYPE_AP;
> + mdevid = basename(vapdev->vdev.sysfsdev);
> + vapdev->vdev.name = g_strdup_printf("%s", mdevid);
> + vapdev->vdev.dev = dev;
> +
> + ret = vfio_get_device(vfio_group, mdevid, &vapdev->vdev, &local_err);
> + if (ret) {
> + goto out_get_dev_err;
> + }
> +
> + /* Enable hardware to intepret AP instructions executed on the guest */
> + object_property_set_bool(OBJECT(qdev_get_machine()), true, "apie", NULL);
> +
> + return;
> +
> +out_get_dev_err:
> + vfio_ap_put_device(vapdev);
> + vfio_put_group(vfio_group);
> +out_err:
> + error_propagate(errp, local_err);
> +}
> +
> +static void vfio_ap_unrealize(DeviceState *dev, Error **errp)
> +{
> + APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev);
> + VFIOAPDevice *vapdev = DO_UPCAST(VFIOAPDevice, apdev, apdev);
> + VFIOGroup *group = vapdev->vdev.group;
> +
> + vfio_ap_put_device(vapdev);
> + vfio_put_group(group);
> +}
> +
> +static Property vfio_ap_properties[] = {
> + DEFINE_PROP_STRING("sysfsdev", VFIOAPDevice, vdev.sysfsdev),
> + DEFINE_PROP_END_OF_LIST(),
> +};
> +
> +static void vfio_ap_reset(DeviceState *dev)
> +{
> + int ret;
> + APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev);
> + VFIOAPDevice *vapdev = DO_UPCAST(VFIOAPDevice, apdev, apdev);
> +
> + ret = ioctl(vapdev->vdev.fd, VFIO_DEVICE_RESET);
> + if (ret) {
> + error_report("%s: failed to reset %s device: %s", __func__,
> + vapdev->vdev.name, strerror(ret));
> + }
> +}
> +
> +static const VMStateDescription vfio_ap_vmstate = {
> + .name = VFIO_AP_DEVICE_TYPE,
> + .unmigratable = 1,
> +};
> +
> +static void vfio_ap_class_init(ObjectClass *klass, void *data)
> +{
> + DeviceClass *dc = DEVICE_CLASS(klass);
> +
> + dc->props = vfio_ap_properties;
> + dc->vmsd = &vfio_ap_vmstate;
> + dc->desc = "VFIO-based AP device assignment";
> + dc->realize = vfio_ap_realize;
> + dc->unrealize = vfio_ap_unrealize;
> + dc->hotpluggable = false;
> + dc->reset = vfio_ap_reset;
> + dc->bus_type = TYPE_AP_BUS;
> +}
> +
> +static const TypeInfo vfio_ap_info = {
> + .name = VFIO_AP_DEVICE_TYPE,
> + .parent = AP_DEVICE_TYPE,
> + .instance_size = sizeof(VFIOAPDevice),
> + .class_init = vfio_ap_class_init,
> +};
> +
> +static void vfio_ap_type_init(void)
> +{
> + type_register_static(&vfio_ap_info);
> +}
> +
> +type_init(vfio_ap_type_init)
> diff --git a/include/hw/vfio/vfio-common.h b/include/hw/vfio/vfio-common.h
> index 821def05658f..6be9a93f611b 100644
> --- a/include/hw/vfio/vfio-common.h
> +++ b/include/hw/vfio/vfio-common.h
> @@ -37,6 +37,7 @@ enum {
> VFIO_DEVICE_TYPE_PCI = 0,
> VFIO_DEVICE_TYPE_PLATFORM = 1,
> VFIO_DEVICE_TYPE_CCW = 2,
> + VFIO_DEVICE_TYPE_AP = 3,
> };
>
> typedef struct VFIOMmap {
>
On 09/10/2018 19:52, Tony Krowiak wrote:
> Introduces a VFIO based AP device. The device is defined via
> the QEMU command line by specifying:
>
> -device vfio-ap,sysfsdev=<path-to-mediated-matrix-device>
>
> There may be only one vfio-ap device configured for a guest.
>
> The mediated matrix device is created by the VFIO AP device
> driver by writing a UUID to a sysfs attribute file (see
> docs/vfio-ap.txt). The mediated matrix device will be named
> after the UUID. Symbolic links to the $uuid are created in
> many places, so the path to the mediated matrix device $uuid
> can be specified in any of the following ways:
>
> /sys/devices/vfio_ap/matrix/$uuid
> /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid
> /sys/bus/mdev/devices/$uuid
> /sys/bus/mdev/drivers/vfio_mdev/$uuid
>
> When the vfio-ap device is realized, it acquires and opens the
> VFIO iommu group to which the mediated matrix device is
> bound. This causes a VFIO group notification event to be
> signaled. The vfio_ap device driver's group notification
> handler will get called at which time the device driver
> will configure the the AP devices to which the guest will
> be granted access.
>
> Signed-off-by: Tony Krowiak <akrowiak@linux.ibm.com>
> Tested-by: Pierre Morel<pmorel@linux.ibm.com>
> ---
> MAINTAINERS | 1 +
> default-configs/s390x-softmmu.mak | 1 +
> hw/vfio/Makefile.objs | 1 +
> hw/vfio/ap.c | 180 ++++++++++++++++++++++++++++++
> include/hw/vfio/vfio-common.h | 1 +
> 5 files changed, 184 insertions(+)
> create mode 100644 hw/vfio/ap.c
>
> diff --git a/MAINTAINERS b/MAINTAINERS
> index 97e8ed808bc0..29041da69237 100644
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -1209,6 +1209,7 @@ F: hw/s390x/ap-device.c
> F: hw/s390x/ap-bridge.c
> F: include/hw/s390x/ap-device.h
> F: include/hw/s390x/ap-bridge.h
> +F: hw/vfio/ap.c
> L: qemu-s390x@nongnu.org
>
> vhost
> diff --git a/default-configs/s390x-softmmu.mak b/default-configs/s390x-softmmu.mak
> index d6b67d50f0e4..5eef37592451 100644
> --- a/default-configs/s390x-softmmu.mak
> +++ b/default-configs/s390x-softmmu.mak
> @@ -7,3 +7,4 @@ CONFIG_S390_FLIC=y
> CONFIG_S390_FLIC_KVM=$(CONFIG_KVM)
> CONFIG_VFIO_CCW=$(CONFIG_LINUX)
> CONFIG_WDT_DIAG288=y
> +CONFIG_VFIO_AP=$(CONFIG_LINUX)
> diff --git a/hw/vfio/Makefile.objs b/hw/vfio/Makefile.objs
> index a2e7a0a7cf02..8b3f664d85f7 100644
> --- a/hw/vfio/Makefile.objs
> +++ b/hw/vfio/Makefile.objs
> @@ -6,4 +6,5 @@ obj-$(CONFIG_SOFTMMU) += platform.o
> obj-$(CONFIG_VFIO_XGMAC) += calxeda-xgmac.o
> obj-$(CONFIG_VFIO_AMD_XGBE) += amd-xgbe.o
> obj-$(CONFIG_SOFTMMU) += spapr.o
> +obj-$(CONFIG_VFIO_AP) += ap.o
> endif
> diff --git a/hw/vfio/ap.c b/hw/vfio/ap.c
> new file mode 100644
> index 000000000000..5543406afc58
> --- /dev/null
> +++ b/hw/vfio/ap.c
> @@ -0,0 +1,180 @@
> +/*
> + * VFIO based AP matrix device assignment
> + *
> + * Copyright 2018 IBM Corp.
> + * Author(s): Tony Krowiak <akrowiak@linux.ibm.com>
> + * Halil Pasic <pasic@linux.ibm.com>
> + *
> + * This work is licensed under the terms of the GNU GPL, version 2 or (at
> + * your option) any later version. See the COPYING file in the top-level
> + * directory.
> + */
> +
> +#include <linux/vfio.h>
> +#include <sys/ioctl.h>
> +#include "qemu/osdep.h"
> +#include "qapi/error.h"
> +#include "hw/sysbus.h"
> +#include "hw/vfio/vfio.h"
> +#include "hw/vfio/vfio-common.h"
> +#include "hw/s390x/ap-device.h"
> +#include "qemu/error-report.h"
> +#include "qemu/queue.h"
> +#include "qemu/option.h"
> +#include "qemu/config-file.h"
> +#include "cpu.h"
> +#include "kvm_s390x.h"
> +#include "sysemu/sysemu.h"
> +#include "hw/s390x/ap-bridge.h"
> +#include "exec/address-spaces.h"
> +
> +#define VFIO_AP_DEVICE_TYPE "vfio-ap"
> +
> +typedef struct VFIOAPDevice {
> + APDevice apdev;
> + VFIODevice vdev;
> +} VFIOAPDevice;
> +
> +#define VFIO_AP_DEVICE(obj) \
> + OBJECT_CHECK(VFIOAPDevice, (obj), VFIO_AP_DEVICE_TYPE)
> +
> +static void vfio_ap_compute_needs_reset(VFIODevice *vdev)
> +{
> + vdev->needs_reset = false;
> +}
> +
> +/*
> + * We don't need vfio_hot_reset_multi and vfio_eoi operations for
> + * vfio-ap device now.
> + */
> +struct VFIODeviceOps vfio_ap_ops = {
> + .vfio_compute_needs_reset = vfio_ap_compute_needs_reset,
> +};
> +
> +static void vfio_ap_put_device(VFIOAPDevice *vapdev)
> +{
> + g_free(vapdev->vdev.name);
> + vfio_put_base_device(&vapdev->vdev);
> +}
> +
> +static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
> +{
> + GError *gerror;
> + char *symlink, *group_path;
> + int groupid;
> +
> + symlink = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev);
> + group_path = g_file_read_link(symlink, &gerror);
hum I oversaw this, it leads to segfault.
You must initialize gerror before use.
The following patch avoid a segmentation fault:
diff --git a/hw/vfio/ap.c b/hw/vfio/ap.c
index 5543406afc..3b8e9ba6dc 100644
--- a/hw/vfio/ap.c
+++ b/hw/vfio/ap.c
@@ -59,7 +59,7 @@ static void vfio_ap_put_device(VFIOAPDevice *vapdev)
static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
{
- GError *gerror;
+ GError *gerror = NULL;
char *symlink, *group_path;
int groupid;
Regards,
Pierre
--
Pierre Morel
Linux/KVM/QEMU in Böblingen - Germany
On 09/10/2018 19:52, Tony Krowiak wrote:
> Introduces a VFIO based AP device. The device is defined via
> the QEMU command line by specifying:
>
> -device vfio-ap,sysfsdev=<path-to-mediated-matrix-device>
>
> There may be only one vfio-ap device configured for a guest.
>
> The mediated matrix device is created by the VFIO AP device
> driver by writing a UUID to a sysfs attribute file (see
> docs/vfio-ap.txt). The mediated matrix device will be named
> after the UUID. Symbolic links to the $uuid are created in
> many places, so the path to the mediated matrix device $uuid
> can be specified in any of the following ways:
>
> /sys/devices/vfio_ap/matrix/$uuid
> /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid
> /sys/bus/mdev/devices/$uuid
> /sys/bus/mdev/drivers/vfio_mdev/$uuid
>
> When the vfio-ap device is realized, it acquires and opens the
> VFIO iommu group to which the mediated matrix device is
> bound. This causes a VFIO group notification event to be
> signaled. The vfio_ap device driver's group notification
> handler will get called at which time the device driver
> will configure the the AP devices to which the guest will
> be granted access.
>
> Signed-off-by: Tony Krowiak <akrowiak@linux.ibm.com>
> Tested-by: Pierre Morel<pmorel@linux.ibm.com>
> ---
> MAINTAINERS | 1 +
> default-configs/s390x-softmmu.mak | 1 +
> hw/vfio/Makefile.objs | 1 +
> hw/vfio/ap.c | 180 ++++++++++++++++++++++++++++++
> include/hw/vfio/vfio-common.h | 1 +
> 5 files changed, 184 insertions(+)
> create mode 100644 hw/vfio/ap.c
>
> diff --git a/MAINTAINERS b/MAINTAINERS
> index 97e8ed808bc0..29041da69237 100644
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -1209,6 +1209,7 @@ F: hw/s390x/ap-device.c
> F: hw/s390x/ap-bridge.c
> F: include/hw/s390x/ap-device.h
> F: include/hw/s390x/ap-bridge.h
> +F: hw/vfio/ap.c
> L: qemu-s390x@nongnu.org
>
> vhost
> diff --git a/default-configs/s390x-softmmu.mak b/default-configs/s390x-softmmu.mak
> index d6b67d50f0e4..5eef37592451 100644
> --- a/default-configs/s390x-softmmu.mak
> +++ b/default-configs/s390x-softmmu.mak
> @@ -7,3 +7,4 @@ CONFIG_S390_FLIC=y
> CONFIG_S390_FLIC_KVM=$(CONFIG_KVM)
> CONFIG_VFIO_CCW=$(CONFIG_LINUX)
> CONFIG_WDT_DIAG288=y
> +CONFIG_VFIO_AP=$(CONFIG_LINUX)
> diff --git a/hw/vfio/Makefile.objs b/hw/vfio/Makefile.objs
> index a2e7a0a7cf02..8b3f664d85f7 100644
> --- a/hw/vfio/Makefile.objs
> +++ b/hw/vfio/Makefile.objs
> @@ -6,4 +6,5 @@ obj-$(CONFIG_SOFTMMU) += platform.o
> obj-$(CONFIG_VFIO_XGMAC) += calxeda-xgmac.o
> obj-$(CONFIG_VFIO_AMD_XGBE) += amd-xgbe.o
> obj-$(CONFIG_SOFTMMU) += spapr.o
> +obj-$(CONFIG_VFIO_AP) += ap.o
> endif
> diff --git a/hw/vfio/ap.c b/hw/vfio/ap.c
> new file mode 100644
> index 000000000000..5543406afc58
> --- /dev/null
> +++ b/hw/vfio/ap.c
> @@ -0,0 +1,180 @@
> +/*
> + * VFIO based AP matrix device assignment
> + *
> + * Copyright 2018 IBM Corp.
> + * Author(s): Tony Krowiak <akrowiak@linux.ibm.com>
> + * Halil Pasic <pasic@linux.ibm.com>
> + *
> + * This work is licensed under the terms of the GNU GPL, version 2 or (at
> + * your option) any later version. See the COPYING file in the top-level
> + * directory.
> + */
> +
> +#include <linux/vfio.h>
> +#include <sys/ioctl.h>
> +#include "qemu/osdep.h"
> +#include "qapi/error.h"
> +#include "hw/sysbus.h"
> +#include "hw/vfio/vfio.h"
> +#include "hw/vfio/vfio-common.h"
> +#include "hw/s390x/ap-device.h"
> +#include "qemu/error-report.h"
> +#include "qemu/queue.h"
> +#include "qemu/option.h"
> +#include "qemu/config-file.h"
> +#include "cpu.h"
> +#include "kvm_s390x.h"
> +#include "sysemu/sysemu.h"
> +#include "hw/s390x/ap-bridge.h"
> +#include "exec/address-spaces.h"
> +
> +#define VFIO_AP_DEVICE_TYPE "vfio-ap"
> +
> +typedef struct VFIOAPDevice {
> + APDevice apdev;
> + VFIODevice vdev;
> +} VFIOAPDevice;
> +
> +#define VFIO_AP_DEVICE(obj) \
> + OBJECT_CHECK(VFIOAPDevice, (obj), VFIO_AP_DEVICE_TYPE)
> +
> +static void vfio_ap_compute_needs_reset(VFIODevice *vdev)
> +{
> + vdev->needs_reset = false;
> +}
> +
> +/*
> + * We don't need vfio_hot_reset_multi and vfio_eoi operations for
> + * vfio-ap device now.
> + */
> +struct VFIODeviceOps vfio_ap_ops = {
> + .vfio_compute_needs_reset = vfio_ap_compute_needs_reset,
> +};
> +
> +static void vfio_ap_put_device(VFIOAPDevice *vapdev)
> +{
> + g_free(vapdev->vdev.name);
> + vfio_put_base_device(&vapdev->vdev);
> +}
> +
> +static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
> +{
> + GError *gerror;
> + char *symlink, *group_path;
> + int groupid;
> +
> + symlink = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev);
> + group_path = g_file_read_link(symlink, &gerror);
hum I oversaw this change, it leads to segfault.
You must initialize gerror before use.
The following patch avoid a segmentation fault:
diff --git a/hw/vfio/ap.c b/hw/vfio/ap.c
index 5543406afc..3b8e9ba6dc 100644
--- a/hw/vfio/ap.c
+++ b/hw/vfio/ap.c
@@ -59,7 +59,7 @@ static void vfio_ap_put_device(VFIOAPDevice *vapdev)
static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
{
- GError *gerror;
+ GError *gerror = NULL;
char *symlink, *group_path;
int groupid;
Regards,
Pierre
With this:
Tested-by: Pierre Morel<pmorel@linux.ibm.com>
--
Pierre Morel
Linux/KVM/QEMU in Böblingen - Germany
On 10/10/2018 02:37 PM, Pierre Morel wrote:
> On 09/10/2018 19:52, Tony Krowiak wrote:
>> +static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
>> +{
>> + GError *gerror;
>> + char *symlink, *group_path;
>> + int groupid;
>> +
>> + symlink = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev);
>> + group_path = g_file_read_link(symlink, &gerror);
>
>
> hum I oversaw this change, it leads to segfault.
Yes, this was a review feedback from v9 to use the glib function.
>
> You must initialize gerror before use.
> The following patch avoid a segmentation fault:
>
>
> diff --git a/hw/vfio/ap.c b/hw/vfio/ap.c
> index 5543406afc..3b8e9ba6dc 100644
> --- a/hw/vfio/ap.c
> +++ b/hw/vfio/ap.c
> @@ -59,7 +59,7 @@ static void vfio_ap_put_device(VFIOAPDevice *vapdev)
>
> static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
> {
> - GError *gerror;
> + GError *gerror = NULL;
> char *symlink, *group_path;
> int groupid;
With that fix, series
Tested-by: Christian Borntraeger <borntraeger@de.ibm.com>
Tony, can you fold that fixup from Pierre into your v11?
On 10/10/2018 08:49 AM, Christian Borntraeger wrote:
>
>
> On 10/10/2018 02:37 PM, Pierre Morel wrote:
>> On 09/10/2018 19:52, Tony Krowiak wrote:
>
>>> +static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
>>> +{
>>> + GError *gerror;
>>> + char *symlink, *group_path;
>>> + int groupid;
>>> +
>>> + symlink = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev);
>>> + group_path = g_file_read_link(symlink, &gerror);
>>
>>
>> hum I oversaw this change, it leads to segfault.
>
> Yes, this was a review feedback from v9 to use the glib function.
>>
>> You must initialize gerror before use.
>> The following patch avoid a segmentation fault:
>>
>>
>> diff --git a/hw/vfio/ap.c b/hw/vfio/ap.c
>> index 5543406afc..3b8e9ba6dc 100644
>> --- a/hw/vfio/ap.c
>> +++ b/hw/vfio/ap.c
>> @@ -59,7 +59,7 @@ static void vfio_ap_put_device(VFIOAPDevice *vapdev)
>>
>> static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp)
>> {
>> - GError *gerror;
>> + GError *gerror = NULL;
>> char *symlink, *group_path;
>> int groupid;
>
> With that fix, series
> Tested-by: Christian Borntraeger <borntraeger@de.ibm.com>
>
> Tony, can you fold that fixup from Pierre into your v11?
It is done.
>
© 2016 - 2025 Red Hat, Inc.