1
The following changes since commit ca61fa4b803e5d0abaf6f1ceb690f23bb78a4def:
1
The following changes since commit 8e6c70b9d4a1b1f3011805947925cfdb31642f7f:
2
2
3
Merge remote-tracking branch 'remotes/quic/tags/pull-hex-20211006' into staging (2021-10-06 12:11:14 -0700)
3
Merge tag 'kraxel-20220614-pull-request' of git://git.kraxel.org/qemu into staging (2022-06-14 06:21:46 -0700)
4
4
5
are available in the Git repository at:
5
are available in the Git repository at:
6
6
7
https://gitlab.com/stefanha/qemu.git tags/block-pull-request
7
https://gitlab.com/stefanha/qemu.git tags/block-pull-request
8
8
9
for you to fetch changes up to 1cc7eada97914f090125e588497986f6f7900514:
9
for you to fetch changes up to 99b969fbe105117f5af6060d3afef40ca39cc9c1:
10
10
11
iothread: use IOThreadParamInfo in iothread_[set|get]_param() (2021-10-07 15:29:50 +0100)
11
linux-aio: explain why max batch is checked in laio_io_unplug() (2022-06-15 16:43:42 +0100)
12
12
13
----------------------------------------------------------------
13
----------------------------------------------------------------
14
Pull request
14
Pull request
15
15
16
This pull request includes an important aio=native I/O stall fix, the
17
experimental vifo-user server, the io_uring_register_ring_fd() optimization for
18
aio=io_uring, and an update to Vladimir Sementsov-Ogievskiy's maintainership
19
details.
20
16
----------------------------------------------------------------
21
----------------------------------------------------------------
17
22
18
Stefano Garzarella (2):
23
Jagannathan Raman (14):
19
iothread: rename PollParamInfo to IOThreadParamInfo
24
qdev: unplug blocker for devices
20
iothread: use IOThreadParamInfo in iothread_[set|get]_param()
25
remote/machine: add HotplugHandler for remote machine
26
remote/machine: add vfio-user property
27
vfio-user: build library
28
vfio-user: define vfio-user-server object
29
vfio-user: instantiate vfio-user context
30
vfio-user: find and init PCI device
31
vfio-user: run vfio-user context
32
vfio-user: handle PCI config space accesses
33
vfio-user: IOMMU support for remote device
34
vfio-user: handle DMA mappings
35
vfio-user: handle PCI BAR accesses
36
vfio-user: handle device interrupts
37
vfio-user: handle reset of remote device
21
38
22
iothread.c | 28 +++++++++++++++-------------
39
Sam Li (1):
23
1 file changed, 15 insertions(+), 13 deletions(-)
40
Use io_uring_register_ring_fd() to skip fd operations
41
42
Stefan Hajnoczi (2):
43
linux-aio: fix unbalanced plugged counter in laio_io_unplug()
44
linux-aio: explain why max batch is checked in laio_io_unplug()
45
46
Vladimir Sementsov-Ogievskiy (1):
47
MAINTAINERS: update Vladimir's address and repositories
48
49
MAINTAINERS | 27 +-
50
meson_options.txt | 2 +
51
qapi/misc.json | 31 +
52
qapi/qom.json | 20 +-
53
configure | 17 +
54
meson.build | 24 +-
55
include/exec/memory.h | 3 +
56
include/hw/pci/msi.h | 1 +
57
include/hw/pci/msix.h | 1 +
58
include/hw/pci/pci.h | 13 +
59
include/hw/qdev-core.h | 29 +
60
include/hw/remote/iommu.h | 40 +
61
include/hw/remote/machine.h | 4 +
62
include/hw/remote/vfio-user-obj.h | 6 +
63
block/io_uring.c | 12 +-
64
block/linux-aio.c | 10 +-
65
hw/core/qdev.c | 24 +
66
hw/pci/msi.c | 49 +-
67
hw/pci/msix.c | 35 +-
68
hw/pci/pci.c | 13 +
69
hw/remote/iommu.c | 131 ++++
70
hw/remote/machine.c | 88 ++-
71
hw/remote/vfio-user-obj.c | 958 ++++++++++++++++++++++++
72
softmmu/physmem.c | 4 +-
73
softmmu/qdev-monitor.c | 4 +
74
stubs/vfio-user-obj.c | 6 +
75
tests/qtest/fuzz/generic_fuzz.c | 9 +-
76
.gitlab-ci.d/buildtest.yml | 1 +
77
.gitmodules | 3 +
78
Kconfig.host | 4 +
79
hw/remote/Kconfig | 4 +
80
hw/remote/meson.build | 4 +
81
hw/remote/trace-events | 11 +
82
scripts/meson-buildoptions.sh | 4 +
83
stubs/meson.build | 1 +
84
subprojects/libvfio-user | 1 +
85
tests/docker/dockerfiles/centos8.docker | 2 +
86
37 files changed, 1565 insertions(+), 31 deletions(-)
87
create mode 100644 include/hw/remote/iommu.h
88
create mode 100644 include/hw/remote/vfio-user-obj.h
89
create mode 100644 hw/remote/iommu.c
90
create mode 100644 hw/remote/vfio-user-obj.c
91
create mode 100644 stubs/vfio-user-obj.c
92
create mode 160000 subprojects/libvfio-user
24
93
25
--
94
--
26
2.31.1
95
2.36.1
27
28
29
diff view generated by jsdifflib
1
From: Stefano Garzarella <sgarzare@redhat.com>
1
From: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>
2
2
3
Commit 1793ad0247 ("iothread: add aio-max-batch parameter") added
3
Signed-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>
4
a new parameter (aio-max-batch) to IOThread and used PollParamInfo
4
Message-id: 20220526115432.138384-1-vsementsov@yandex-team.ru
5
structure to handle it.
6
7
Since it is not a parameter of the polling mechanism, we rename the
8
structure to a more generic IOThreadParamInfo.
9
10
Suggested-by: Kevin Wolf <kwolf@redhat.com>
11
Signed-off-by: Stefano Garzarella <sgarzare@redhat.com>
12
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
13
Message-id: 20210727145936.147032-2-sgarzare@redhat.com
14
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
5
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
15
---
6
---
16
iothread.c | 14 +++++++-------
7
MAINTAINERS | 22 ++++++++++++----------
17
1 file changed, 7 insertions(+), 7 deletions(-)
8
1 file changed, 12 insertions(+), 10 deletions(-)
18
9
19
diff --git a/iothread.c b/iothread.c
10
diff --git a/MAINTAINERS b/MAINTAINERS
20
index XXXXXXX..XXXXXXX 100644
11
index XXXXXXX..XXXXXXX 100644
21
--- a/iothread.c
12
--- a/MAINTAINERS
22
+++ b/iothread.c
13
+++ b/MAINTAINERS
23
@@ -XXX,XX +XXX,XX @@ static void iothread_complete(UserCreatable *obj, Error **errp)
14
@@ -XXX,XX +XXX,XX @@ F: scsi/*
24
typedef struct {
15
25
const char *name;
16
Block Jobs
26
ptrdiff_t offset; /* field's byte offset in IOThread struct */
17
M: John Snow <jsnow@redhat.com>
27
-} PollParamInfo;
18
-M: Vladimir Sementsov-Ogievskiy <v.sementsov-og@mail.ru>
28
+} IOThreadParamInfo;
19
+M: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>
29
20
L: qemu-block@nongnu.org
30
-static PollParamInfo poll_max_ns_info = {
21
S: Supported
31
+static IOThreadParamInfo poll_max_ns_info = {
22
F: blockjob.c
32
"poll-max-ns", offsetof(IOThread, poll_max_ns),
23
@@ -XXX,XX +XXX,XX @@ F: block/aio_task.c
33
};
24
F: util/qemu-co-shared-resource.c
34
-static PollParamInfo poll_grow_info = {
25
F: include/qemu/co-shared-resource.h
35
+static IOThreadParamInfo poll_grow_info = {
26
T: git https://gitlab.com/jsnow/qemu.git jobs
36
"poll-grow", offsetof(IOThread, poll_grow),
27
-T: git https://src.openvz.org/scm/~vsementsov/qemu.git jobs
37
};
28
+T: git https://gitlab.com/vsementsov/qemu.git block
38
-static PollParamInfo poll_shrink_info = {
29
39
+static IOThreadParamInfo poll_shrink_info = {
30
Block QAPI, monitor, command line
40
"poll-shrink", offsetof(IOThread, poll_shrink),
31
M: Markus Armbruster <armbru@redhat.com>
41
};
32
@@ -XXX,XX +XXX,XX @@ F: include/hw/cxl/
42
-static PollParamInfo aio_max_batch_info = {
33
43
+static IOThreadParamInfo aio_max_batch_info = {
34
Dirty Bitmaps
44
"aio-max-batch", offsetof(IOThread, aio_max_batch),
35
M: Eric Blake <eblake@redhat.com>
45
};
36
-M: Vladimir Sementsov-Ogievskiy <v.sementsov-og@mail.ru>
46
37
+M: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>
47
@@ -XXX,XX +XXX,XX @@ static void iothread_get_param(Object *obj, Visitor *v,
38
R: John Snow <jsnow@redhat.com>
48
const char *name, void *opaque, Error **errp)
39
L: qemu-block@nongnu.org
49
{
40
S: Supported
50
IOThread *iothread = IOTHREAD(obj);
41
@@ -XXX,XX +XXX,XX @@ F: util/hbitmap.c
51
- PollParamInfo *info = opaque;
42
F: tests/unit/test-hbitmap.c
52
+ IOThreadParamInfo *info = opaque;
43
F: docs/interop/bitmaps.rst
53
int64_t *field = (void *)iothread + info->offset;
44
T: git https://repo.or.cz/qemu/ericb.git bitmaps
54
45
+T: git https://gitlab.com/vsementsov/qemu.git block
55
visit_type_int64(v, name, field, errp);
46
56
@@ -XXX,XX +XXX,XX @@ static bool iothread_set_param(Object *obj, Visitor *v,
47
Character device backends
57
const char *name, void *opaque, Error **errp)
48
M: Marc-André Lureau <marcandre.lureau@redhat.com>
58
{
49
@@ -XXX,XX +XXX,XX @@ F: scripts/*.py
59
IOThread *iothread = IOTHREAD(obj);
50
F: tests/*.py
60
- PollParamInfo *info = opaque;
51
61
+ IOThreadParamInfo *info = opaque;
52
Benchmark util
62
int64_t *field = (void *)iothread + info->offset;
53
-M: Vladimir Sementsov-Ogievskiy <v.sementsov-og@mail.ru>
63
int64_t value;
54
+M: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>
64
55
S: Maintained
56
F: scripts/simplebench/
57
-T: git https://src.openvz.org/scm/~vsementsov/qemu.git simplebench
58
+T: git https://gitlab.com/vsementsov/qemu.git simplebench
59
60
Transactions helper
61
-M: Vladimir Sementsov-Ogievskiy <v.sementsov-og@mail.ru>
62
+M: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>
63
S: Maintained
64
F: include/qemu/transactions.h
65
F: util/transactions.c
66
+T: git https://gitlab.com/vsementsov/qemu.git block
67
68
QAPI
69
M: Markus Armbruster <armbru@redhat.com>
70
@@ -XXX,XX +XXX,XX @@ F: block/iscsi-opts.c
71
72
Network Block Device (NBD)
73
M: Eric Blake <eblake@redhat.com>
74
-M: Vladimir Sementsov-Ogievskiy <v.sementsov-og@mail.ru>
75
+M: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>
76
L: qemu-block@nongnu.org
77
S: Maintained
78
F: block/nbd*
79
@@ -XXX,XX +XXX,XX @@ F: docs/interop/nbd.txt
80
F: docs/tools/qemu-nbd.rst
81
F: tests/qemu-iotests/tests/*nbd*
82
T: git https://repo.or.cz/qemu/ericb.git nbd
83
-T: git https://src.openvz.org/scm/~vsementsov/qemu.git nbd
84
+T: git https://gitlab.com/vsementsov/qemu.git block
85
86
NFS
87
M: Peter Lieven <pl@kamp.de>
88
@@ -XXX,XX +XXX,XX @@ F: block/dmg.c
89
parallels
90
M: Stefan Hajnoczi <stefanha@redhat.com>
91
M: Denis V. Lunev <den@openvz.org>
92
-M: Vladimir Sementsov-Ogievskiy <v.sementsov-og@mail.ru>
93
+M: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>
94
L: qemu-block@nongnu.org
95
S: Supported
96
F: block/parallels.c
97
F: block/parallels-ext.c
98
F: docs/interop/parallels.txt
99
-T: git https://src.openvz.org/scm/~vsementsov/qemu.git parallels
100
+T: git https://gitlab.com/vsementsov/qemu.git block
101
102
qed
103
M: Stefan Hajnoczi <stefanha@redhat.com>
65
--
104
--
66
2.31.1
105
2.36.1
67
106
68
107
diff view generated by jsdifflib
New patch
1
From: Sam Li <faithilikerun@gmail.com>
1
2
3
Linux recently added a new io_uring(7) optimization API that QEMU
4
doesn't take advantage of yet. The liburing library that QEMU uses
5
has added a corresponding new API calling io_uring_register_ring_fd().
6
When this API is called after creating the ring, the io_uring_submit()
7
library function passes a flag to the io_uring_enter(2) syscall
8
allowing it to skip the ring file descriptor fdget()/fdput()
9
operations. This saves some CPU cycles.
10
11
Signed-off-by: Sam Li <faithilikerun@gmail.com>
12
Message-id: 20220531105011.111082-1-faithilikerun@gmail.com
13
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
14
---
15
meson.build | 1 +
16
block/io_uring.c | 12 +++++++++++-
17
2 files changed, 12 insertions(+), 1 deletion(-)
18
19
diff --git a/meson.build b/meson.build
20
index XXXXXXX..XXXXXXX 100644
21
--- a/meson.build
22
+++ b/meson.build
23
@@ -XXX,XX +XXX,XX @@ config_host_data.set('CONFIG_LIBNFS', libnfs.found())
24
config_host_data.set('CONFIG_LIBSSH', libssh.found())
25
config_host_data.set('CONFIG_LINUX_AIO', libaio.found())
26
config_host_data.set('CONFIG_LINUX_IO_URING', linux_io_uring.found())
27
+config_host_data.set('CONFIG_LIBURING_REGISTER_RING_FD', cc.has_function('io_uring_register_ring_fd', prefix: '#include <liburing.h>', dependencies:linux_io_uring))
28
config_host_data.set('CONFIG_LIBPMEM', libpmem.found())
29
config_host_data.set('CONFIG_NUMA', numa.found())
30
config_host_data.set('CONFIG_OPENGL', opengl.found())
31
diff --git a/block/io_uring.c b/block/io_uring.c
32
index XXXXXXX..XXXXXXX 100644
33
--- a/block/io_uring.c
34
+++ b/block/io_uring.c
35
@@ -XXX,XX +XXX,XX @@
36
#include "qapi/error.h"
37
#include "trace.h"
38
39
+
40
/* io_uring ring size */
41
#define MAX_ENTRIES 128
42
43
@@ -XXX,XX +XXX,XX @@ LuringState *luring_init(Error **errp)
44
}
45
46
ioq_init(&s->io_q);
47
+#ifdef CONFIG_LIBURING_REGISTER_RING_FD
48
+ if (io_uring_register_ring_fd(&s->ring) < 0) {
49
+ /*
50
+ * Only warn about this error: we will fallback to the non-optimized
51
+ * io_uring operations.
52
+ */
53
+ warn_report("failed to register linux io_uring ring file descriptor");
54
+ }
55
+#endif
56
+
57
return s;
58
-
59
}
60
61
void luring_cleanup(LuringState *s)
62
--
63
2.36.1
diff view generated by jsdifflib
New patch
1
From: Jagannathan Raman <jag.raman@oracle.com>
1
2
3
Add blocker to prevent hot-unplug of devices
4
5
TYPE_VFIO_USER_SERVER, which is introduced shortly, attaches itself to a
6
PCIDevice on which it depends. If the attached PCIDevice gets removed
7
while the server in use, it could cause it crash. To prevent this,
8
TYPE_VFIO_USER_SERVER adds an unplug blocker for the PCIDevice.
9
10
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
11
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
12
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
13
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
14
Message-id: c41ef80b7cc063314d629737bed2159e5713f2e0.1655151679.git.jag.raman@oracle.com
15
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
16
---
17
include/hw/qdev-core.h | 29 +++++++++++++++++++++++++++++
18
hw/core/qdev.c | 24 ++++++++++++++++++++++++
19
softmmu/qdev-monitor.c | 4 ++++
20
3 files changed, 57 insertions(+)
21
22
diff --git a/include/hw/qdev-core.h b/include/hw/qdev-core.h
23
index XXXXXXX..XXXXXXX 100644
24
--- a/include/hw/qdev-core.h
25
+++ b/include/hw/qdev-core.h
26
@@ -XXX,XX +XXX,XX @@ struct DeviceState {
27
int instance_id_alias;
28
int alias_required_for_version;
29
ResettableState reset;
30
+ GSList *unplug_blockers;
31
};
32
33
struct DeviceListener {
34
@@ -XXX,XX +XXX,XX @@ void qdev_simple_device_unplug_cb(HotplugHandler *hotplug_dev,
35
void qdev_machine_creation_done(void);
36
bool qdev_machine_modified(void);
37
38
+/**
39
+ * qdev_add_unplug_blocker: Add an unplug blocker to a device
40
+ *
41
+ * @dev: Device to be blocked from unplug
42
+ * @reason: Reason for blocking
43
+ */
44
+void qdev_add_unplug_blocker(DeviceState *dev, Error *reason);
45
+
46
+/**
47
+ * qdev_del_unplug_blocker: Remove an unplug blocker from a device
48
+ *
49
+ * @dev: Device to be unblocked
50
+ * @reason: Pointer to the Error used with qdev_add_unplug_blocker.
51
+ * Used as a handle to lookup the blocker for deletion.
52
+ */
53
+void qdev_del_unplug_blocker(DeviceState *dev, Error *reason);
54
+
55
+/**
56
+ * qdev_unplug_blocked: Confirm if a device is blocked from unplug
57
+ *
58
+ * @dev: Device to be tested
59
+ * @reason: Returns one of the reasons why the device is blocked,
60
+ * if any
61
+ *
62
+ * Returns: true if device is blocked from unplug, false otherwise
63
+ */
64
+bool qdev_unplug_blocked(DeviceState *dev, Error **errp);
65
+
66
/**
67
* GpioPolarity: Polarity of a GPIO line
68
*
69
diff --git a/hw/core/qdev.c b/hw/core/qdev.c
70
index XXXXXXX..XXXXXXX 100644
71
--- a/hw/core/qdev.c
72
+++ b/hw/core/qdev.c
73
@@ -XXX,XX +XXX,XX @@ char *qdev_get_dev_path(DeviceState *dev)
74
return NULL;
75
}
76
77
+void qdev_add_unplug_blocker(DeviceState *dev, Error *reason)
78
+{
79
+ dev->unplug_blockers = g_slist_prepend(dev->unplug_blockers, reason);
80
+}
81
+
82
+void qdev_del_unplug_blocker(DeviceState *dev, Error *reason)
83
+{
84
+ dev->unplug_blockers = g_slist_remove(dev->unplug_blockers, reason);
85
+}
86
+
87
+bool qdev_unplug_blocked(DeviceState *dev, Error **errp)
88
+{
89
+ ERRP_GUARD();
90
+
91
+ if (dev->unplug_blockers) {
92
+ error_propagate(errp, error_copy(dev->unplug_blockers->data));
93
+ return true;
94
+ }
95
+
96
+ return false;
97
+}
98
+
99
static bool device_get_realized(Object *obj, Error **errp)
100
{
101
DeviceState *dev = DEVICE(obj);
102
@@ -XXX,XX +XXX,XX @@ static void device_finalize(Object *obj)
103
104
DeviceState *dev = DEVICE(obj);
105
106
+ g_assert(!dev->unplug_blockers);
107
+
108
QLIST_FOREACH_SAFE(ngl, &dev->gpios, node, next) {
109
QLIST_REMOVE(ngl, node);
110
qemu_free_irqs(ngl->in, ngl->num_in);
111
diff --git a/softmmu/qdev-monitor.c b/softmmu/qdev-monitor.c
112
index XXXXXXX..XXXXXXX 100644
113
--- a/softmmu/qdev-monitor.c
114
+++ b/softmmu/qdev-monitor.c
115
@@ -XXX,XX +XXX,XX @@ void qdev_unplug(DeviceState *dev, Error **errp)
116
HotplugHandlerClass *hdc;
117
Error *local_err = NULL;
118
119
+ if (qdev_unplug_blocked(dev, errp)) {
120
+ return;
121
+ }
122
+
123
if (dev->parent_bus && !qbus_is_hotpluggable(dev->parent_bus)) {
124
error_setg(errp, QERR_BUS_NO_HOTPLUG, dev->parent_bus->name);
125
return;
126
--
127
2.36.1
diff view generated by jsdifflib
New patch
1
From: Jagannathan Raman <jag.raman@oracle.com>
1
2
3
Allow hotplugging of PCI(e) devices to remote machine
4
5
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
6
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
7
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
8
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
9
Message-id: d1e6cfa0afb528ad343758f9b1d918be0175c5e5.1655151679.git.jag.raman@oracle.com
10
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
11
---
12
hw/remote/machine.c | 10 ++++++++++
13
1 file changed, 10 insertions(+)
14
15
diff --git a/hw/remote/machine.c b/hw/remote/machine.c
16
index XXXXXXX..XXXXXXX 100644
17
--- a/hw/remote/machine.c
18
+++ b/hw/remote/machine.c
19
@@ -XXX,XX +XXX,XX @@
20
#include "qapi/error.h"
21
#include "hw/pci/pci_host.h"
22
#include "hw/remote/iohub.h"
23
+#include "hw/qdev-core.h"
24
25
static void remote_machine_init(MachineState *machine)
26
{
27
@@ -XXX,XX +XXX,XX @@ static void remote_machine_init(MachineState *machine)
28
29
pci_bus_irqs(pci_host->bus, remote_iohub_set_irq, remote_iohub_map_irq,
30
&s->iohub, REMOTE_IOHUB_NB_PIRQS);
31
+
32
+ qbus_set_hotplug_handler(BUS(pci_host->bus), OBJECT(s));
33
}
34
35
static void remote_machine_class_init(ObjectClass *oc, void *data)
36
{
37
MachineClass *mc = MACHINE_CLASS(oc);
38
+ HotplugHandlerClass *hc = HOTPLUG_HANDLER_CLASS(oc);
39
40
mc->init = remote_machine_init;
41
mc->desc = "Experimental remote machine";
42
+
43
+ hc->unplug = qdev_simple_device_unplug_cb;
44
}
45
46
static const TypeInfo remote_machine = {
47
@@ -XXX,XX +XXX,XX @@ static const TypeInfo remote_machine = {
48
.parent = TYPE_MACHINE,
49
.instance_size = sizeof(RemoteMachineState),
50
.class_init = remote_machine_class_init,
51
+ .interfaces = (InterfaceInfo[]) {
52
+ { TYPE_HOTPLUG_HANDLER },
53
+ { }
54
+ }
55
};
56
57
static void remote_machine_register_types(void)
58
--
59
2.36.1
diff view generated by jsdifflib
New patch
1
From: Jagannathan Raman <jag.raman@oracle.com>
1
2
3
Add vfio-user to x-remote machine. It is a boolean, which indicates if
4
the machine supports vfio-user protocol. The machine configures the bus
5
differently vfio-user and multiprocess protocols, so this property
6
informs it on how to configure the bus.
7
8
This property should be short lived. Once vfio-user fully replaces
9
multiprocess, this property could be removed.
10
11
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
12
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
13
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
14
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
15
Message-id: 5d51a152a419cbda35d070b8e49b772b60a7230a.1655151679.git.jag.raman@oracle.com
16
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
17
---
18
include/hw/remote/machine.h | 2 ++
19
hw/remote/machine.c | 23 +++++++++++++++++++++++
20
2 files changed, 25 insertions(+)
21
22
diff --git a/include/hw/remote/machine.h b/include/hw/remote/machine.h
23
index XXXXXXX..XXXXXXX 100644
24
--- a/include/hw/remote/machine.h
25
+++ b/include/hw/remote/machine.h
26
@@ -XXX,XX +XXX,XX @@ struct RemoteMachineState {
27
28
RemotePCIHost *host;
29
RemoteIOHubState iohub;
30
+
31
+ bool vfio_user;
32
};
33
34
/* Used to pass to co-routine device and ioc. */
35
diff --git a/hw/remote/machine.c b/hw/remote/machine.c
36
index XXXXXXX..XXXXXXX 100644
37
--- a/hw/remote/machine.c
38
+++ b/hw/remote/machine.c
39
@@ -XXX,XX +XXX,XX @@ static void remote_machine_init(MachineState *machine)
40
qbus_set_hotplug_handler(BUS(pci_host->bus), OBJECT(s));
41
}
42
43
+static bool remote_machine_get_vfio_user(Object *obj, Error **errp)
44
+{
45
+ RemoteMachineState *s = REMOTE_MACHINE(obj);
46
+
47
+ return s->vfio_user;
48
+}
49
+
50
+static void remote_machine_set_vfio_user(Object *obj, bool value, Error **errp)
51
+{
52
+ RemoteMachineState *s = REMOTE_MACHINE(obj);
53
+
54
+ if (phase_check(PHASE_MACHINE_CREATED)) {
55
+ error_setg(errp, "Error enabling vfio-user - machine already created");
56
+ return;
57
+ }
58
+
59
+ s->vfio_user = value;
60
+}
61
+
62
static void remote_machine_class_init(ObjectClass *oc, void *data)
63
{
64
MachineClass *mc = MACHINE_CLASS(oc);
65
@@ -XXX,XX +XXX,XX @@ static void remote_machine_class_init(ObjectClass *oc, void *data)
66
mc->desc = "Experimental remote machine";
67
68
hc->unplug = qdev_simple_device_unplug_cb;
69
+
70
+ object_class_property_add_bool(oc, "vfio-user",
71
+ remote_machine_get_vfio_user,
72
+ remote_machine_set_vfio_user);
73
}
74
75
static const TypeInfo remote_machine = {
76
--
77
2.36.1
diff view generated by jsdifflib
New patch
1
1
From: Jagannathan Raman <jag.raman@oracle.com>
2
3
add the libvfio-user library as a submodule. build it as a meson
4
subproject.
5
6
libvfio-user is distributed with BSD 3-Clause license and
7
json-c with MIT (Expat) license
8
9
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
10
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
11
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
12
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
13
Message-id: c2adec87958b081d1dc8775d4aa05c897912f025.1655151679.git.jag.raman@oracle.com
14
15
[Changed submodule URL to QEMU's libvfio-user mirror on GitLab. The QEMU
16
project mirrors its dependencies so that it can provide full source code
17
even in the event that its dependencies become unavailable. Note that
18
the mirror repo is manually updated, so please contact me to make newer
19
libvfio-user commits available. If I become a bottleneck we can set up a
20
cronjob.
21
22
Updated scripts/meson-buildoptions.sh to match the meson_options.txt
23
change. Failure to do so can result in scripts/meson-buildoptions.sh
24
being modified by the build system later on and you end up with a dirty
25
working tree.
26
--Stefan]
27
28
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
29
---
30
MAINTAINERS | 1 +
31
meson_options.txt | 2 ++
32
configure | 17 +++++++++++++++++
33
meson.build | 23 ++++++++++++++++++++++-
34
.gitlab-ci.d/buildtest.yml | 1 +
35
.gitmodules | 3 +++
36
Kconfig.host | 4 ++++
37
hw/remote/Kconfig | 4 ++++
38
hw/remote/meson.build | 2 ++
39
scripts/meson-buildoptions.sh | 4 ++++
40
subprojects/libvfio-user | 1 +
41
tests/docker/dockerfiles/centos8.docker | 2 ++
42
12 files changed, 63 insertions(+), 1 deletion(-)
43
create mode 160000 subprojects/libvfio-user
44
45
diff --git a/MAINTAINERS b/MAINTAINERS
46
index XXXXXXX..XXXXXXX 100644
47
--- a/MAINTAINERS
48
+++ b/MAINTAINERS
49
@@ -XXX,XX +XXX,XX @@ F: hw/remote/proxy-memory-listener.c
50
F: include/hw/remote/proxy-memory-listener.h
51
F: hw/remote/iohub.c
52
F: include/hw/remote/iohub.h
53
+F: subprojects/libvfio-user
54
55
EBPF:
56
M: Jason Wang <jasowang@redhat.com>
57
diff --git a/meson_options.txt b/meson_options.txt
58
index XXXXXXX..XXXXXXX 100644
59
--- a/meson_options.txt
60
+++ b/meson_options.txt
61
@@ -XXX,XX +XXX,XX @@ option('cfi_debug', type: 'boolean', value: 'false',
62
description: 'Verbose errors in case of CFI violation')
63
option('multiprocess', type: 'feature', value: 'auto',
64
description: 'Out of process device emulation support')
65
+option('vfio_user_server', type: 'feature', value: 'disabled',
66
+ description: 'vfio-user server support')
67
option('dbus_display', type: 'feature', value: 'auto',
68
description: '-display dbus support')
69
option('tpm', type : 'feature', value : 'auto',
70
diff --git a/configure b/configure
71
index XXXXXXX..XXXXXXX 100755
72
--- a/configure
73
+++ b/configure
74
@@ -XXX,XX +XXX,XX @@ meson_args=""
75
ninja=""
76
bindir="bin"
77
skip_meson=no
78
+vfio_user_server="disabled"
79
80
# The following Meson options are handled manually (still they
81
# are included in the automatically generated help message)
82
@@ -XXX,XX +XXX,XX @@ for opt do
83
;;
84
--disable-blobs) meson_option_parse --disable-install-blobs ""
85
;;
86
+ --enable-vfio-user-server) vfio_user_server="enabled"
87
+ ;;
88
+ --disable-vfio-user-server) vfio_user_server="disabled"
89
+ ;;
90
--enable-tcmalloc) meson_option_parse --enable-malloc=tcmalloc tcmalloc
91
;;
92
--enable-jemalloc) meson_option_parse --enable-malloc=jemalloc jemalloc
93
@@ -XXX,XX +XXX,XX @@ write_container_target_makefile() {
94
95
96
97
+##########################################
98
+# check for vfio_user_server
99
+
100
+case "$vfio_user_server" in
101
+ enabled )
102
+ if test "$git_submodules_action" != "ignore"; then
103
+ git_submodules="${git_submodules} subprojects/libvfio-user"
104
+ fi
105
+ ;;
106
+esac
107
+
108
##########################################
109
# End of CC checks
110
# After here, no more $cc or $ld runs
111
@@ -XXX,XX +XXX,XX @@ if test "$skip_meson" = no; then
112
test "$slirp" != auto && meson_option_add "-Dslirp=$slirp"
113
test "$smbd" != '' && meson_option_add "-Dsmbd=$smbd"
114
test "$tcg" != enabled && meson_option_add "-Dtcg=$tcg"
115
+ test "$vfio_user_server" != auto && meson_option_add "-Dvfio_user_server=$vfio_user_server"
116
run_meson() {
117
NINJA=$ninja $meson setup --prefix "$prefix" "$@" $cross_arg "$PWD" "$source_path"
118
}
119
diff --git a/meson.build b/meson.build
120
index XXXXXXX..XXXXXXX 100644
121
--- a/meson.build
122
+++ b/meson.build
123
@@ -XXX,XX +XXX,XX @@ multiprocess_allowed = get_option('multiprocess') \
124
.require(targetos == 'linux', error_message: 'Multiprocess QEMU is supported only on Linux') \
125
.allowed()
126
127
+vfio_user_server_allowed = get_option('vfio_user_server') \
128
+ .require(targetos == 'linux', error_message: 'vfio-user server is supported only on Linux') \
129
+ .allowed()
130
+
131
have_tpm = get_option('tpm') \
132
.require(targetos != 'windows', error_message: 'TPM emulation only available on POSIX systems') \
133
.allowed()
134
@@ -XXX,XX +XXX,XX @@ host_kconfig = \
135
(have_virtfs ? ['CONFIG_VIRTFS=y'] : []) + \
136
('CONFIG_LINUX' in config_host ? ['CONFIG_LINUX=y'] : []) + \
137
(have_pvrdma ? ['CONFIG_PVRDMA=y'] : []) + \
138
- (multiprocess_allowed ? ['CONFIG_MULTIPROCESS_ALLOWED=y'] : [])
139
+ (multiprocess_allowed ? ['CONFIG_MULTIPROCESS_ALLOWED=y'] : []) + \
140
+ (vfio_user_server_allowed ? ['CONFIG_VFIO_USER_SERVER_ALLOWED=y'] : [])
141
142
ignored = [ 'TARGET_XML_FILES', 'TARGET_ABI_DIR', 'TARGET_ARCH' ]
143
144
@@ -XXX,XX +XXX,XX @@ if have_system
145
endif
146
endif
147
148
+libvfio_user_dep = not_found
149
+if have_system and vfio_user_server_allowed
150
+ have_internal = fs.exists(meson.current_source_dir() / 'subprojects/libvfio-user/meson.build')
151
+
152
+ if not have_internal
153
+ error('libvfio-user source not found - please pull git submodule')
154
+ endif
155
+
156
+ libvfio_user_proj = subproject('libvfio-user')
157
+
158
+ libvfio_user_lib = libvfio_user_proj.get_variable('libvfio_user_dep')
159
+
160
+ libvfio_user_dep = declare_dependency(dependencies: [libvfio_user_lib])
161
+endif
162
+
163
fdt = not_found
164
if have_system
165
fdt_opt = get_option('fdt')
166
@@ -XXX,XX +XXX,XX @@ summary_info += {'target list': ' '.join(target_dirs)}
167
if have_system
168
summary_info += {'default devices': get_option('default_devices')}
169
summary_info += {'out of process emulation': multiprocess_allowed}
170
+ summary_info += {'vfio-user server': vfio_user_server_allowed}
171
endif
172
summary(summary_info, bool_yn: true, section: 'Targets and accelerators')
173
174
diff --git a/.gitlab-ci.d/buildtest.yml b/.gitlab-ci.d/buildtest.yml
175
index XXXXXXX..XXXXXXX 100644
176
--- a/.gitlab-ci.d/buildtest.yml
177
+++ b/.gitlab-ci.d/buildtest.yml
178
@@ -XXX,XX +XXX,XX @@ build-system-centos:
179
IMAGE: centos8
180
CONFIGURE_ARGS: --disable-nettle --enable-gcrypt --enable-fdt=system
181
--enable-modules --enable-trace-backends=dtrace --enable-docs
182
+ --enable-vfio-user-server
183
TARGETS: ppc64-softmmu or1k-softmmu s390x-softmmu
184
x86_64-softmmu rx-softmmu sh4-softmmu nios2-softmmu
185
MAKE_CHECK_ARGS: check-build
186
diff --git a/.gitmodules b/.gitmodules
187
index XXXXXXX..XXXXXXX 100644
188
--- a/.gitmodules
189
+++ b/.gitmodules
190
@@ -XXX,XX +XXX,XX @@
191
[submodule "tests/lcitool/libvirt-ci"]
192
    path = tests/lcitool/libvirt-ci
193
    url = https://gitlab.com/libvirt/libvirt-ci.git
194
+[submodule "subprojects/libvfio-user"]
195
+    path = subprojects/libvfio-user
196
+    url = https://gitlab.com/qemu-project/libvfio-user.git
197
diff --git a/Kconfig.host b/Kconfig.host
198
index XXXXXXX..XXXXXXX 100644
199
--- a/Kconfig.host
200
+++ b/Kconfig.host
201
@@ -XXX,XX +XXX,XX @@ config MULTIPROCESS_ALLOWED
202
config FUZZ
203
bool
204
select SPARSE_MEM
205
+
206
+config VFIO_USER_SERVER_ALLOWED
207
+ bool
208
+ imply VFIO_USER_SERVER
209
diff --git a/hw/remote/Kconfig b/hw/remote/Kconfig
210
index XXXXXXX..XXXXXXX 100644
211
--- a/hw/remote/Kconfig
212
+++ b/hw/remote/Kconfig
213
@@ -XXX,XX +XXX,XX @@ config MULTIPROCESS
214
bool
215
depends on PCI && PCI_EXPRESS && KVM
216
select REMOTE_PCIHOST
217
+
218
+config VFIO_USER_SERVER
219
+ bool
220
+ depends on MULTIPROCESS
221
diff --git a/hw/remote/meson.build b/hw/remote/meson.build
222
index XXXXXXX..XXXXXXX 100644
223
--- a/hw/remote/meson.build
224
+++ b/hw/remote/meson.build
225
@@ -XXX,XX +XXX,XX @@ remote_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('remote-obj.c'))
226
remote_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('proxy.c'))
227
remote_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('iohub.c'))
228
229
+remote_ss.add(when: 'CONFIG_VFIO_USER_SERVER', if_true: libvfio_user_dep)
230
+
231
specific_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('memory.c'))
232
specific_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('proxy-memory-listener.c'))
233
234
diff --git a/scripts/meson-buildoptions.sh b/scripts/meson-buildoptions.sh
235
index XXXXXXX..XXXXXXX 100644
236
--- a/scripts/meson-buildoptions.sh
237
+++ b/scripts/meson-buildoptions.sh
238
@@ -XXX,XX +XXX,XX @@ meson_options_help() {
239
printf "%s\n" ' usb-redir libusbredir support'
240
printf "%s\n" ' vde vde network backend support'
241
printf "%s\n" ' vdi vdi image format support'
242
+ printf "%s\n" ' vfio-user-server'
243
+ printf "%s\n" ' vfio-user server support'
244
printf "%s\n" ' vhost-crypto vhost-user crypto backend support'
245
printf "%s\n" ' vhost-kernel vhost kernel backend support'
246
printf "%s\n" ' vhost-net vhost-net kernel acceleration support'
247
@@ -XXX,XX +XXX,XX @@ _meson_option_parse() {
248
--disable-vde) printf "%s" -Dvde=disabled ;;
249
--enable-vdi) printf "%s" -Dvdi=enabled ;;
250
--disable-vdi) printf "%s" -Dvdi=disabled ;;
251
+ --enable-vfio-user-server) printf "%s" -Dvfio_user_server=enabled ;;
252
+ --disable-vfio-user-server) printf "%s" -Dvfio_user_server=disabled ;;
253
--enable-vhost-crypto) printf "%s" -Dvhost_crypto=enabled ;;
254
--disable-vhost-crypto) printf "%s" -Dvhost_crypto=disabled ;;
255
--enable-vhost-kernel) printf "%s" -Dvhost_kernel=enabled ;;
256
diff --git a/subprojects/libvfio-user b/subprojects/libvfio-user
257
new file mode 160000
258
index XXXXXXX..XXXXXXX
259
--- /dev/null
260
+++ b/subprojects/libvfio-user
261
@@ -0,0 +1 @@
262
+Subproject commit 0b28d205572c80b568a1003db2c8f37ca333e4d7
263
diff --git a/tests/docker/dockerfiles/centos8.docker b/tests/docker/dockerfiles/centos8.docker
264
index XXXXXXX..XXXXXXX 100644
265
--- a/tests/docker/dockerfiles/centos8.docker
266
+++ b/tests/docker/dockerfiles/centos8.docker
267
@@ -XXX,XX +XXX,XX @@ RUN dnf update -y && \
268
libbpf-devel \
269
libcacard-devel \
270
libcap-ng-devel \
271
+ libcmocka-devel \
272
libcurl-devel \
273
libdrm-devel \
274
libepoxy-devel \
275
@@ -XXX,XX +XXX,XX @@ RUN dnf update -y && \
276
libgcrypt-devel \
277
libiscsi-devel \
278
libjpeg-devel \
279
+ json-c-devel \
280
libnfs-devel \
281
libpmem-devel \
282
libpng-devel \
283
--
284
2.36.1
diff view generated by jsdifflib
New patch
1
1
From: Jagannathan Raman <jag.raman@oracle.com>
2
3
Define vfio-user object which is remote process server for QEMU. Setup
4
object initialization functions and properties necessary to instantiate
5
the object
6
7
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
8
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
9
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
10
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
11
Message-id: e45a17001e9b38f451543a664ababdf860e5f2f2.1655151679.git.jag.raman@oracle.com
12
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
13
---
14
MAINTAINERS | 1 +
15
qapi/qom.json | 20 +++-
16
include/hw/remote/machine.h | 2 +
17
hw/remote/machine.c | 27 +++++
18
hw/remote/vfio-user-obj.c | 210 ++++++++++++++++++++++++++++++++++++
19
hw/remote/meson.build | 1 +
20
hw/remote/trace-events | 3 +
21
7 files changed, 262 insertions(+), 2 deletions(-)
22
create mode 100644 hw/remote/vfio-user-obj.c
23
24
diff --git a/MAINTAINERS b/MAINTAINERS
25
index XXXXXXX..XXXXXXX 100644
26
--- a/MAINTAINERS
27
+++ b/MAINTAINERS
28
@@ -XXX,XX +XXX,XX @@ F: include/hw/remote/proxy-memory-listener.h
29
F: hw/remote/iohub.c
30
F: include/hw/remote/iohub.h
31
F: subprojects/libvfio-user
32
+F: hw/remote/vfio-user-obj.c
33
34
EBPF:
35
M: Jason Wang <jasowang@redhat.com>
36
diff --git a/qapi/qom.json b/qapi/qom.json
37
index XXXXXXX..XXXXXXX 100644
38
--- a/qapi/qom.json
39
+++ b/qapi/qom.json
40
@@ -XXX,XX +XXX,XX @@
41
{ 'struct': 'RemoteObjectProperties',
42
'data': { 'fd': 'str', 'devid': 'str' } }
43
44
+##
45
+# @VfioUserServerProperties:
46
+#
47
+# Properties for x-vfio-user-server objects.
48
+#
49
+# @socket: socket to be used by the libvfio-user library
50
+#
51
+# @device: the ID of the device to be emulated at the server
52
+#
53
+# Since: 7.1
54
+##
55
+{ 'struct': 'VfioUserServerProperties',
56
+ 'data': { 'socket': 'SocketAddress', 'device': 'str' } }
57
+
58
##
59
# @RngProperties:
60
#
61
@@ -XXX,XX +XXX,XX @@
62
'tls-creds-psk',
63
'tls-creds-x509',
64
'tls-cipher-suites',
65
- { 'name': 'x-remote-object', 'features': [ 'unstable' ] }
66
+ { 'name': 'x-remote-object', 'features': [ 'unstable' ] },
67
+ { 'name': 'x-vfio-user-server', 'features': [ 'unstable' ] }
68
] }
69
70
##
71
@@ -XXX,XX +XXX,XX @@
72
'tls-creds-psk': 'TlsCredsPskProperties',
73
'tls-creds-x509': 'TlsCredsX509Properties',
74
'tls-cipher-suites': 'TlsCredsProperties',
75
- 'x-remote-object': 'RemoteObjectProperties'
76
+ 'x-remote-object': 'RemoteObjectProperties',
77
+ 'x-vfio-user-server': 'VfioUserServerProperties'
78
} }
79
80
##
81
diff --git a/include/hw/remote/machine.h b/include/hw/remote/machine.h
82
index XXXXXXX..XXXXXXX 100644
83
--- a/include/hw/remote/machine.h
84
+++ b/include/hw/remote/machine.h
85
@@ -XXX,XX +XXX,XX @@ struct RemoteMachineState {
86
RemoteIOHubState iohub;
87
88
bool vfio_user;
89
+
90
+ bool auto_shutdown;
91
};
92
93
/* Used to pass to co-routine device and ioc. */
94
diff --git a/hw/remote/machine.c b/hw/remote/machine.c
95
index XXXXXXX..XXXXXXX 100644
96
--- a/hw/remote/machine.c
97
+++ b/hw/remote/machine.c
98
@@ -XXX,XX +XXX,XX @@ static void remote_machine_set_vfio_user(Object *obj, bool value, Error **errp)
99
s->vfio_user = value;
100
}
101
102
+static bool remote_machine_get_auto_shutdown(Object *obj, Error **errp)
103
+{
104
+ RemoteMachineState *s = REMOTE_MACHINE(obj);
105
+
106
+ return s->auto_shutdown;
107
+}
108
+
109
+static void remote_machine_set_auto_shutdown(Object *obj, bool value,
110
+ Error **errp)
111
+{
112
+ RemoteMachineState *s = REMOTE_MACHINE(obj);
113
+
114
+ s->auto_shutdown = value;
115
+}
116
+
117
+static void remote_machine_instance_init(Object *obj)
118
+{
119
+ RemoteMachineState *s = REMOTE_MACHINE(obj);
120
+
121
+ s->auto_shutdown = true;
122
+}
123
+
124
static void remote_machine_class_init(ObjectClass *oc, void *data)
125
{
126
MachineClass *mc = MACHINE_CLASS(oc);
127
@@ -XXX,XX +XXX,XX @@ static void remote_machine_class_init(ObjectClass *oc, void *data)
128
object_class_property_add_bool(oc, "vfio-user",
129
remote_machine_get_vfio_user,
130
remote_machine_set_vfio_user);
131
+
132
+ object_class_property_add_bool(oc, "auto-shutdown",
133
+ remote_machine_get_auto_shutdown,
134
+ remote_machine_set_auto_shutdown);
135
}
136
137
static const TypeInfo remote_machine = {
138
.name = TYPE_REMOTE_MACHINE,
139
.parent = TYPE_MACHINE,
140
.instance_size = sizeof(RemoteMachineState),
141
+ .instance_init = remote_machine_instance_init,
142
.class_init = remote_machine_class_init,
143
.interfaces = (InterfaceInfo[]) {
144
{ TYPE_HOTPLUG_HANDLER },
145
diff --git a/hw/remote/vfio-user-obj.c b/hw/remote/vfio-user-obj.c
146
new file mode 100644
147
index XXXXXXX..XXXXXXX
148
--- /dev/null
149
+++ b/hw/remote/vfio-user-obj.c
150
@@ -XXX,XX +XXX,XX @@
151
+/**
152
+ * QEMU vfio-user-server server object
153
+ *
154
+ * Copyright © 2022 Oracle and/or its affiliates.
155
+ *
156
+ * This work is licensed under the terms of the GNU GPL-v2, version 2 or later.
157
+ *
158
+ * See the COPYING file in the top-level directory.
159
+ *
160
+ */
161
+
162
+/**
163
+ * Usage: add options:
164
+ * -machine x-remote,vfio-user=on,auto-shutdown=on
165
+ * -device <PCI-device>,id=<pci-dev-id>
166
+ * -object x-vfio-user-server,id=<id>,type=unix,path=<socket-path>,
167
+ * device=<pci-dev-id>
168
+ *
169
+ * Note that x-vfio-user-server object must be used with x-remote machine only.
170
+ * This server could only support PCI devices for now.
171
+ *
172
+ * type - SocketAddress type - presently "unix" alone is supported. Required
173
+ * option
174
+ *
175
+ * path - named unix socket, it will be created by the server. It is
176
+ * a required option
177
+ *
178
+ * device - id of a device on the server, a required option. PCI devices
179
+ * alone are supported presently.
180
+ */
181
+
182
+#include "qemu/osdep.h"
183
+
184
+#include "qom/object.h"
185
+#include "qom/object_interfaces.h"
186
+#include "qemu/error-report.h"
187
+#include "trace.h"
188
+#include "sysemu/runstate.h"
189
+#include "hw/boards.h"
190
+#include "hw/remote/machine.h"
191
+#include "qapi/error.h"
192
+#include "qapi/qapi-visit-sockets.h"
193
+
194
+#define TYPE_VFU_OBJECT "x-vfio-user-server"
195
+OBJECT_DECLARE_TYPE(VfuObject, VfuObjectClass, VFU_OBJECT)
196
+
197
+/**
198
+ * VFU_OBJECT_ERROR - reports an error message. If auto_shutdown
199
+ * is set, it aborts the machine on error. Otherwise, it logs an
200
+ * error message without aborting.
201
+ */
202
+#define VFU_OBJECT_ERROR(o, fmt, ...) \
203
+ { \
204
+ if (vfu_object_auto_shutdown()) { \
205
+ error_setg(&error_abort, (fmt), ## __VA_ARGS__); \
206
+ } else { \
207
+ error_report((fmt), ## __VA_ARGS__); \
208
+ } \
209
+ } \
210
+
211
+struct VfuObjectClass {
212
+ ObjectClass parent_class;
213
+
214
+ unsigned int nr_devs;
215
+};
216
+
217
+struct VfuObject {
218
+ /* private */
219
+ Object parent;
220
+
221
+ SocketAddress *socket;
222
+
223
+ char *device;
224
+
225
+ Error *err;
226
+};
227
+
228
+static bool vfu_object_auto_shutdown(void)
229
+{
230
+ bool auto_shutdown = true;
231
+ Error *local_err = NULL;
232
+
233
+ if (!current_machine) {
234
+ return auto_shutdown;
235
+ }
236
+
237
+ auto_shutdown = object_property_get_bool(OBJECT(current_machine),
238
+ "auto-shutdown",
239
+ &local_err);
240
+
241
+ /*
242
+ * local_err would be set if no such property exists - safe to ignore.
243
+ * Unlikely scenario as auto-shutdown is always defined for
244
+ * TYPE_REMOTE_MACHINE, and TYPE_VFU_OBJECT only works with
245
+ * TYPE_REMOTE_MACHINE
246
+ */
247
+ if (local_err) {
248
+ auto_shutdown = true;
249
+ error_free(local_err);
250
+ }
251
+
252
+ return auto_shutdown;
253
+}
254
+
255
+static void vfu_object_set_socket(Object *obj, Visitor *v, const char *name,
256
+ void *opaque, Error **errp)
257
+{
258
+ VfuObject *o = VFU_OBJECT(obj);
259
+
260
+ qapi_free_SocketAddress(o->socket);
261
+
262
+ o->socket = NULL;
263
+
264
+ visit_type_SocketAddress(v, name, &o->socket, errp);
265
+
266
+ if (o->socket->type != SOCKET_ADDRESS_TYPE_UNIX) {
267
+ error_setg(errp, "vfu: Unsupported socket type - %s",
268
+ SocketAddressType_str(o->socket->type));
269
+ qapi_free_SocketAddress(o->socket);
270
+ o->socket = NULL;
271
+ return;
272
+ }
273
+
274
+ trace_vfu_prop("socket", o->socket->u.q_unix.path);
275
+}
276
+
277
+static void vfu_object_set_device(Object *obj, const char *str, Error **errp)
278
+{
279
+ VfuObject *o = VFU_OBJECT(obj);
280
+
281
+ g_free(o->device);
282
+
283
+ o->device = g_strdup(str);
284
+
285
+ trace_vfu_prop("device", str);
286
+}
287
+
288
+static void vfu_object_init(Object *obj)
289
+{
290
+ VfuObjectClass *k = VFU_OBJECT_GET_CLASS(obj);
291
+ VfuObject *o = VFU_OBJECT(obj);
292
+
293
+ k->nr_devs++;
294
+
295
+ if (!object_dynamic_cast(OBJECT(current_machine), TYPE_REMOTE_MACHINE)) {
296
+ error_setg(&o->err, "vfu: %s only compatible with %s machine",
297
+ TYPE_VFU_OBJECT, TYPE_REMOTE_MACHINE);
298
+ return;
299
+ }
300
+}
301
+
302
+static void vfu_object_finalize(Object *obj)
303
+{
304
+ VfuObjectClass *k = VFU_OBJECT_GET_CLASS(obj);
305
+ VfuObject *o = VFU_OBJECT(obj);
306
+
307
+ k->nr_devs--;
308
+
309
+ qapi_free_SocketAddress(o->socket);
310
+
311
+ o->socket = NULL;
312
+
313
+ g_free(o->device);
314
+
315
+ o->device = NULL;
316
+
317
+ if (!k->nr_devs && vfu_object_auto_shutdown()) {
318
+ qemu_system_shutdown_request(SHUTDOWN_CAUSE_GUEST_SHUTDOWN);
319
+ }
320
+}
321
+
322
+static void vfu_object_class_init(ObjectClass *klass, void *data)
323
+{
324
+ VfuObjectClass *k = VFU_OBJECT_CLASS(klass);
325
+
326
+ k->nr_devs = 0;
327
+
328
+ object_class_property_add(klass, "socket", "SocketAddress", NULL,
329
+ vfu_object_set_socket, NULL, NULL);
330
+ object_class_property_set_description(klass, "socket",
331
+ "SocketAddress "
332
+ "(ex: type=unix,path=/tmp/sock). "
333
+ "Only UNIX is presently supported");
334
+ object_class_property_add_str(klass, "device", NULL,
335
+ vfu_object_set_device);
336
+ object_class_property_set_description(klass, "device",
337
+ "device ID - only PCI devices "
338
+ "are presently supported");
339
+}
340
+
341
+static const TypeInfo vfu_object_info = {
342
+ .name = TYPE_VFU_OBJECT,
343
+ .parent = TYPE_OBJECT,
344
+ .instance_size = sizeof(VfuObject),
345
+ .instance_init = vfu_object_init,
346
+ .instance_finalize = vfu_object_finalize,
347
+ .class_size = sizeof(VfuObjectClass),
348
+ .class_init = vfu_object_class_init,
349
+ .interfaces = (InterfaceInfo[]) {
350
+ { TYPE_USER_CREATABLE },
351
+ { }
352
+ }
353
+};
354
+
355
+static void vfu_register_types(void)
356
+{
357
+ type_register_static(&vfu_object_info);
358
+}
359
+
360
+type_init(vfu_register_types);
361
diff --git a/hw/remote/meson.build b/hw/remote/meson.build
362
index XXXXXXX..XXXXXXX 100644
363
--- a/hw/remote/meson.build
364
+++ b/hw/remote/meson.build
365
@@ -XXX,XX +XXX,XX @@ remote_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('message.c'))
366
remote_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('remote-obj.c'))
367
remote_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('proxy.c'))
368
remote_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('iohub.c'))
369
+remote_ss.add(when: 'CONFIG_VFIO_USER_SERVER', if_true: files('vfio-user-obj.c'))
370
371
remote_ss.add(when: 'CONFIG_VFIO_USER_SERVER', if_true: libvfio_user_dep)
372
373
diff --git a/hw/remote/trace-events b/hw/remote/trace-events
374
index XXXXXXX..XXXXXXX 100644
375
--- a/hw/remote/trace-events
376
+++ b/hw/remote/trace-events
377
@@ -XXX,XX +XXX,XX @@
378
379
mpqemu_send_io_error(int cmd, int size, int nfds) "send command %d size %d, %d file descriptors to remote process"
380
mpqemu_recv_io_error(int cmd, int size, int nfds) "failed to receive %d size %d, %d file descriptors to remote process"
381
+
382
+# vfio-user-obj.c
383
+vfu_prop(const char *prop, const char *val) "vfu: setting %s as %s"
384
--
385
2.36.1
386
387
diff view generated by jsdifflib
1
From: Stefano Garzarella <sgarzare@redhat.com>
1
From: Jagannathan Raman <jag.raman@oracle.com>
2
2
3
Commit 0445409d74 ("iothread: generalize
3
create a context with the vfio-user library to run a PCI device
4
iothread_set_param/iothread_get_param") moved common code to set and
5
get IOThread parameters in two new functions.
6
4
7
These functions are called inside callbacks, so we don't need to use an
5
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
8
opaque pointer. Let's replace `void *opaque` parameter with
6
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
9
`IOThreadParamInfo *info`.
7
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
10
8
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
11
Suggested-by: Kevin Wolf <kwolf@redhat.com>
9
Message-id: a452871ac8c812ff96fc4f0ce6037f4769953fab.1655151679.git.jag.raman@oracle.com
12
Signed-off-by: Stefano Garzarella <sgarzare@redhat.com>
13
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
14
Message-id: 20210727145936.147032-3-sgarzare@redhat.com
15
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
10
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
16
---
11
---
17
iothread.c | 18 ++++++++++--------
12
hw/remote/vfio-user-obj.c | 82 +++++++++++++++++++++++++++++++++++++++
18
1 file changed, 10 insertions(+), 8 deletions(-)
13
1 file changed, 82 insertions(+)
19
14
20
diff --git a/iothread.c b/iothread.c
15
diff --git a/hw/remote/vfio-user-obj.c b/hw/remote/vfio-user-obj.c
21
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
22
--- a/iothread.c
17
--- a/hw/remote/vfio-user-obj.c
23
+++ b/iothread.c
18
+++ b/hw/remote/vfio-user-obj.c
24
@@ -XXX,XX +XXX,XX @@ static IOThreadParamInfo aio_max_batch_info = {
19
@@ -XXX,XX +XXX,XX @@
20
#include "hw/remote/machine.h"
21
#include "qapi/error.h"
22
#include "qapi/qapi-visit-sockets.h"
23
+#include "qemu/notify.h"
24
+#include "sysemu/sysemu.h"
25
+#include "libvfio-user.h"
26
27
#define TYPE_VFU_OBJECT "x-vfio-user-server"
28
OBJECT_DECLARE_TYPE(VfuObject, VfuObjectClass, VFU_OBJECT)
29
@@ -XXX,XX +XXX,XX @@ struct VfuObject {
30
char *device;
31
32
Error *err;
33
+
34
+ Notifier machine_done;
35
+
36
+ vfu_ctx_t *vfu_ctx;
25
};
37
};
26
38
27
static void iothread_get_param(Object *obj, Visitor *v,
39
+static void vfu_object_init_ctx(VfuObject *o, Error **errp);
28
- const char *name, void *opaque, Error **errp)
40
+
29
+ const char *name, IOThreadParamInfo *info, Error **errp)
41
static bool vfu_object_auto_shutdown(void)
30
{
42
{
31
IOThread *iothread = IOTHREAD(obj);
43
bool auto_shutdown = true;
32
- IOThreadParamInfo *info = opaque;
44
@@ -XXX,XX +XXX,XX @@ static void vfu_object_set_socket(Object *obj, Visitor *v, const char *name,
33
int64_t *field = (void *)iothread + info->offset;
45
{
34
46
VfuObject *o = VFU_OBJECT(obj);
35
visit_type_int64(v, name, field, errp);
47
48
+ if (o->vfu_ctx) {
49
+ error_setg(errp, "vfu: Unable to set socket property - server busy");
50
+ return;
51
+ }
52
+
53
qapi_free_SocketAddress(o->socket);
54
55
o->socket = NULL;
56
@@ -XXX,XX +XXX,XX @@ static void vfu_object_set_socket(Object *obj, Visitor *v, const char *name,
57
}
58
59
trace_vfu_prop("socket", o->socket->u.q_unix.path);
60
+
61
+ vfu_object_init_ctx(o, errp);
36
}
62
}
37
63
38
static bool iothread_set_param(Object *obj, Visitor *v,
64
static void vfu_object_set_device(Object *obj, const char *str, Error **errp)
39
- const char *name, void *opaque, Error **errp)
40
+ const char *name, IOThreadParamInfo *info, Error **errp)
41
{
65
{
42
IOThread *iothread = IOTHREAD(obj);
66
VfuObject *o = VFU_OBJECT(obj);
43
- IOThreadParamInfo *info = opaque;
67
44
int64_t *field = (void *)iothread + info->offset;
68
+ if (o->vfu_ctx) {
45
int64_t value;
69
+ error_setg(errp, "vfu: Unable to set device property - server busy");
46
70
+ return;
47
@@ -XXX,XX +XXX,XX @@ static bool iothread_set_param(Object *obj, Visitor *v,
71
+ }
48
static void iothread_get_poll_param(Object *obj, Visitor *v,
72
+
49
const char *name, void *opaque, Error **errp)
73
g_free(o->device);
50
{
74
51
+ IOThreadParamInfo *info = opaque;
75
o->device = g_strdup(str);
52
76
53
- iothread_get_param(obj, v, name, opaque, errp);
77
trace_vfu_prop("device", str);
54
+ iothread_get_param(obj, v, name, info, errp);
78
+
79
+ vfu_object_init_ctx(o, errp);
80
+}
81
+
82
+/*
83
+ * TYPE_VFU_OBJECT depends on the availability of the 'socket' and 'device'
84
+ * properties. It also depends on devices instantiated in QEMU. These
85
+ * dependencies are not available during the instance_init phase of this
86
+ * object's life-cycle. As such, the server is initialized after the
87
+ * machine is setup. machine_init_done_notifier notifies TYPE_VFU_OBJECT
88
+ * when the machine is setup, and the dependencies are available.
89
+ */
90
+static void vfu_object_machine_done(Notifier *notifier, void *data)
91
+{
92
+ VfuObject *o = container_of(notifier, VfuObject, machine_done);
93
+ Error *err = NULL;
94
+
95
+ vfu_object_init_ctx(o, &err);
96
+
97
+ if (err) {
98
+ error_propagate(&error_abort, err);
99
+ }
100
+}
101
+
102
+static void vfu_object_init_ctx(VfuObject *o, Error **errp)
103
+{
104
+ ERRP_GUARD();
105
+
106
+ if (o->vfu_ctx || !o->socket || !o->device ||
107
+ !phase_check(PHASE_MACHINE_READY)) {
108
+ return;
109
+ }
110
+
111
+ if (o->err) {
112
+ error_propagate(errp, o->err);
113
+ o->err = NULL;
114
+ return;
115
+ }
116
+
117
+ o->vfu_ctx = vfu_create_ctx(VFU_TRANS_SOCK, o->socket->u.q_unix.path, 0,
118
+ o, VFU_DEV_TYPE_PCI);
119
+ if (o->vfu_ctx == NULL) {
120
+ error_setg(errp, "vfu: Failed to create context - %s", strerror(errno));
121
+ return;
122
+ }
55
}
123
}
56
124
57
static void iothread_set_poll_param(Object *obj, Visitor *v,
125
static void vfu_object_init(Object *obj)
58
const char *name, void *opaque, Error **errp)
126
@@ -XXX,XX +XXX,XX @@ static void vfu_object_init(Object *obj)
59
{
127
TYPE_VFU_OBJECT, TYPE_REMOTE_MACHINE);
60
IOThread *iothread = IOTHREAD(obj);
61
+ IOThreadParamInfo *info = opaque;
62
63
- if (!iothread_set_param(obj, v, name, opaque, errp)) {
64
+ if (!iothread_set_param(obj, v, name, info, errp)) {
65
return;
128
return;
66
}
129
}
67
130
+
68
@@ -XXX,XX +XXX,XX @@ static void iothread_set_poll_param(Object *obj, Visitor *v,
131
+ if (!phase_check(PHASE_MACHINE_READY)) {
69
static void iothread_get_aio_param(Object *obj, Visitor *v,
132
+ o->machine_done.notify = vfu_object_machine_done;
70
const char *name, void *opaque, Error **errp)
133
+ qemu_add_machine_init_done_notifier(&o->machine_done);
71
{
134
+ }
72
+ IOThreadParamInfo *info = opaque;
135
+
73
74
- iothread_get_param(obj, v, name, opaque, errp);
75
+ iothread_get_param(obj, v, name, info, errp);
76
}
136
}
77
137
78
static void iothread_set_aio_param(Object *obj, Visitor *v,
138
static void vfu_object_finalize(Object *obj)
79
const char *name, void *opaque, Error **errp)
139
@@ -XXX,XX +XXX,XX @@ static void vfu_object_finalize(Object *obj)
80
{
140
81
IOThread *iothread = IOTHREAD(obj);
141
o->socket = NULL;
82
+ IOThreadParamInfo *info = opaque;
142
83
143
+ if (o->vfu_ctx) {
84
- if (!iothread_set_param(obj, v, name, opaque, errp)) {
144
+ vfu_destroy_ctx(o->vfu_ctx);
85
+ if (!iothread_set_param(obj, v, name, info, errp)) {
145
+ o->vfu_ctx = NULL;
86
return;
146
+ }
147
+
148
g_free(o->device);
149
150
o->device = NULL;
151
@@ -XXX,XX +XXX,XX @@ static void vfu_object_finalize(Object *obj)
152
if (!k->nr_devs && vfu_object_auto_shutdown()) {
153
qemu_system_shutdown_request(SHUTDOWN_CAUSE_GUEST_SHUTDOWN);
87
}
154
}
88
155
+
156
+ if (o->machine_done.notify) {
157
+ qemu_remove_machine_init_done_notifier(&o->machine_done);
158
+ o->machine_done.notify = NULL;
159
+ }
160
}
161
162
static void vfu_object_class_init(ObjectClass *klass, void *data)
89
--
163
--
90
2.31.1
164
2.36.1
91
92
diff view generated by jsdifflib
New patch
1
From: Jagannathan Raman <jag.raman@oracle.com>
1
2
3
Find the PCI device with specified id. Initialize the device context
4
with the QEMU PCI device
5
6
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
7
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
8
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
9
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
10
Message-id: 7798dbd730099b33fdd00c4c202cfe79e5c5c151.1655151679.git.jag.raman@oracle.com
11
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
12
---
13
hw/remote/vfio-user-obj.c | 67 +++++++++++++++++++++++++++++++++++++++
14
1 file changed, 67 insertions(+)
15
16
diff --git a/hw/remote/vfio-user-obj.c b/hw/remote/vfio-user-obj.c
17
index XXXXXXX..XXXXXXX 100644
18
--- a/hw/remote/vfio-user-obj.c
19
+++ b/hw/remote/vfio-user-obj.c
20
@@ -XXX,XX +XXX,XX @@
21
#include "qemu/notify.h"
22
#include "sysemu/sysemu.h"
23
#include "libvfio-user.h"
24
+#include "hw/qdev-core.h"
25
+#include "hw/pci/pci.h"
26
27
#define TYPE_VFU_OBJECT "x-vfio-user-server"
28
OBJECT_DECLARE_TYPE(VfuObject, VfuObjectClass, VFU_OBJECT)
29
@@ -XXX,XX +XXX,XX @@ struct VfuObject {
30
Notifier machine_done;
31
32
vfu_ctx_t *vfu_ctx;
33
+
34
+ PCIDevice *pci_dev;
35
+
36
+ Error *unplug_blocker;
37
};
38
39
static void vfu_object_init_ctx(VfuObject *o, Error **errp);
40
@@ -XXX,XX +XXX,XX @@ static void vfu_object_machine_done(Notifier *notifier, void *data)
41
static void vfu_object_init_ctx(VfuObject *o, Error **errp)
42
{
43
ERRP_GUARD();
44
+ DeviceState *dev = NULL;
45
+ vfu_pci_type_t pci_type = VFU_PCI_TYPE_CONVENTIONAL;
46
+ int ret;
47
48
if (o->vfu_ctx || !o->socket || !o->device ||
49
!phase_check(PHASE_MACHINE_READY)) {
50
@@ -XXX,XX +XXX,XX @@ static void vfu_object_init_ctx(VfuObject *o, Error **errp)
51
error_setg(errp, "vfu: Failed to create context - %s", strerror(errno));
52
return;
53
}
54
+
55
+ dev = qdev_find_recursive(sysbus_get_default(), o->device);
56
+ if (dev == NULL) {
57
+ error_setg(errp, "vfu: Device %s not found", o->device);
58
+ goto fail;
59
+ }
60
+
61
+ if (!object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
62
+ error_setg(errp, "vfu: %s not a PCI device", o->device);
63
+ goto fail;
64
+ }
65
+
66
+ o->pci_dev = PCI_DEVICE(dev);
67
+
68
+ object_ref(OBJECT(o->pci_dev));
69
+
70
+ if (pci_is_express(o->pci_dev)) {
71
+ pci_type = VFU_PCI_TYPE_EXPRESS;
72
+ }
73
+
74
+ ret = vfu_pci_init(o->vfu_ctx, pci_type, PCI_HEADER_TYPE_NORMAL, 0);
75
+ if (ret < 0) {
76
+ error_setg(errp,
77
+ "vfu: Failed to attach PCI device %s to context - %s",
78
+ o->device, strerror(errno));
79
+ goto fail;
80
+ }
81
+
82
+ error_setg(&o->unplug_blocker,
83
+ "vfu: %s for %s must be deleted before unplugging",
84
+ TYPE_VFU_OBJECT, o->device);
85
+ qdev_add_unplug_blocker(DEVICE(o->pci_dev), o->unplug_blocker);
86
+
87
+ return;
88
+
89
+fail:
90
+ vfu_destroy_ctx(o->vfu_ctx);
91
+ if (o->unplug_blocker && o->pci_dev) {
92
+ qdev_del_unplug_blocker(DEVICE(o->pci_dev), o->unplug_blocker);
93
+ error_free(o->unplug_blocker);
94
+ o->unplug_blocker = NULL;
95
+ }
96
+ if (o->pci_dev) {
97
+ object_unref(OBJECT(o->pci_dev));
98
+ o->pci_dev = NULL;
99
+ }
100
+ o->vfu_ctx = NULL;
101
}
102
103
static void vfu_object_init(Object *obj)
104
@@ -XXX,XX +XXX,XX @@ static void vfu_object_finalize(Object *obj)
105
106
o->device = NULL;
107
108
+ if (o->unplug_blocker && o->pci_dev) {
109
+ qdev_del_unplug_blocker(DEVICE(o->pci_dev), o->unplug_blocker);
110
+ error_free(o->unplug_blocker);
111
+ o->unplug_blocker = NULL;
112
+ }
113
+
114
+ if (o->pci_dev) {
115
+ object_unref(OBJECT(o->pci_dev));
116
+ o->pci_dev = NULL;
117
+ }
118
+
119
if (!k->nr_devs && vfu_object_auto_shutdown()) {
120
qemu_system_shutdown_request(SHUTDOWN_CAUSE_GUEST_SHUTDOWN);
121
}
122
--
123
2.36.1
diff view generated by jsdifflib
New patch
1
From: Jagannathan Raman <jag.raman@oracle.com>
1
2
3
Setup a handler to run vfio-user context. The context is driven by
4
messages to the file descriptor associated with it - get the fd for
5
the context and hook up the handler with it
6
7
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
8
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
9
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
10
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
11
Message-id: e934b0090529d448b6a7972b21dfc3d7421ce494.1655151679.git.jag.raman@oracle.com
12
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
13
---
14
qapi/misc.json | 31 ++++++++++
15
hw/remote/vfio-user-obj.c | 118 +++++++++++++++++++++++++++++++++++++-
16
2 files changed, 148 insertions(+), 1 deletion(-)
17
18
diff --git a/qapi/misc.json b/qapi/misc.json
19
index XXXXXXX..XXXXXXX 100644
20
--- a/qapi/misc.json
21
+++ b/qapi/misc.json
22
@@ -XXX,XX +XXX,XX @@
23
##
24
{ 'event': 'RTC_CHANGE',
25
'data': { 'offset': 'int', 'qom-path': 'str' } }
26
+
27
+##
28
+# @VFU_CLIENT_HANGUP:
29
+#
30
+# Emitted when the client of a TYPE_VFIO_USER_SERVER closes the
31
+# communication channel
32
+#
33
+# @vfu-id: ID of the TYPE_VFIO_USER_SERVER object. It is the last component
34
+# of @vfu-qom-path referenced below
35
+#
36
+# @vfu-qom-path: path to the TYPE_VFIO_USER_SERVER object in the QOM tree
37
+#
38
+# @dev-id: ID of attached PCI device
39
+#
40
+# @dev-qom-path: path to attached PCI device in the QOM tree
41
+#
42
+# Since: 7.1
43
+#
44
+# Example:
45
+#
46
+# <- { "event": "VFU_CLIENT_HANGUP",
47
+# "data": { "vfu-id": "vfu1",
48
+# "vfu-qom-path": "/objects/vfu1",
49
+# "dev-id": "sas1",
50
+# "dev-qom-path": "/machine/peripheral/sas1" },
51
+# "timestamp": { "seconds": 1265044230, "microseconds": 450486 } }
52
+#
53
+##
54
+{ 'event': 'VFU_CLIENT_HANGUP',
55
+ 'data': { 'vfu-id': 'str', 'vfu-qom-path': 'str',
56
+ 'dev-id': 'str', 'dev-qom-path': 'str' } }
57
diff --git a/hw/remote/vfio-user-obj.c b/hw/remote/vfio-user-obj.c
58
index XXXXXXX..XXXXXXX 100644
59
--- a/hw/remote/vfio-user-obj.c
60
+++ b/hw/remote/vfio-user-obj.c
61
@@ -XXX,XX +XXX,XX @@
62
*
63
* device - id of a device on the server, a required option. PCI devices
64
* alone are supported presently.
65
+ *
66
+ * notes - x-vfio-user-server could block IO and monitor during the
67
+ * initialization phase.
68
*/
69
70
#include "qemu/osdep.h"
71
@@ -XXX,XX +XXX,XX @@
72
#include "hw/remote/machine.h"
73
#include "qapi/error.h"
74
#include "qapi/qapi-visit-sockets.h"
75
+#include "qapi/qapi-events-misc.h"
76
#include "qemu/notify.h"
77
+#include "qemu/thread.h"
78
#include "sysemu/sysemu.h"
79
#include "libvfio-user.h"
80
#include "hw/qdev-core.h"
81
#include "hw/pci/pci.h"
82
+#include "qemu/timer.h"
83
84
#define TYPE_VFU_OBJECT "x-vfio-user-server"
85
OBJECT_DECLARE_TYPE(VfuObject, VfuObjectClass, VFU_OBJECT)
86
@@ -XXX,XX +XXX,XX @@ struct VfuObject {
87
PCIDevice *pci_dev;
88
89
Error *unplug_blocker;
90
+
91
+ int vfu_poll_fd;
92
};
93
94
static void vfu_object_init_ctx(VfuObject *o, Error **errp);
95
@@ -XXX,XX +XXX,XX @@ static void vfu_object_set_device(Object *obj, const char *str, Error **errp)
96
vfu_object_init_ctx(o, errp);
97
}
98
99
+static void vfu_object_ctx_run(void *opaque)
100
+{
101
+ VfuObject *o = opaque;
102
+ const char *vfu_id;
103
+ char *vfu_path, *pci_dev_path;
104
+ int ret = -1;
105
+
106
+ while (ret != 0) {
107
+ ret = vfu_run_ctx(o->vfu_ctx);
108
+ if (ret < 0) {
109
+ if (errno == EINTR) {
110
+ continue;
111
+ } else if (errno == ENOTCONN) {
112
+ vfu_id = object_get_canonical_path_component(OBJECT(o));
113
+ vfu_path = object_get_canonical_path(OBJECT(o));
114
+ g_assert(o->pci_dev);
115
+ pci_dev_path = object_get_canonical_path(OBJECT(o->pci_dev));
116
+ /* o->device is a required property and is non-NULL here */
117
+ g_assert(o->device);
118
+ qapi_event_send_vfu_client_hangup(vfu_id, vfu_path,
119
+ o->device, pci_dev_path);
120
+ qemu_set_fd_handler(o->vfu_poll_fd, NULL, NULL, NULL);
121
+ o->vfu_poll_fd = -1;
122
+ object_unparent(OBJECT(o));
123
+ g_free(vfu_path);
124
+ g_free(pci_dev_path);
125
+ break;
126
+ } else {
127
+ VFU_OBJECT_ERROR(o, "vfu: Failed to run device %s - %s",
128
+ o->device, strerror(errno));
129
+ break;
130
+ }
131
+ }
132
+ }
133
+}
134
+
135
+static void vfu_object_attach_ctx(void *opaque)
136
+{
137
+ VfuObject *o = opaque;
138
+ GPollFD pfds[1];
139
+ int ret;
140
+
141
+ qemu_set_fd_handler(o->vfu_poll_fd, NULL, NULL, NULL);
142
+
143
+ pfds[0].fd = o->vfu_poll_fd;
144
+ pfds[0].events = G_IO_IN | G_IO_HUP | G_IO_ERR;
145
+
146
+retry_attach:
147
+ ret = vfu_attach_ctx(o->vfu_ctx);
148
+ if (ret < 0 && (errno == EAGAIN || errno == EWOULDBLOCK)) {
149
+ /**
150
+ * vfu_object_attach_ctx can block QEMU's main loop
151
+ * during attach - the monitor and other IO
152
+ * could be unresponsive during this time.
153
+ */
154
+ (void)qemu_poll_ns(pfds, 1, 500 * (int64_t)SCALE_MS);
155
+ goto retry_attach;
156
+ } else if (ret < 0) {
157
+ VFU_OBJECT_ERROR(o, "vfu: Failed to attach device %s to context - %s",
158
+ o->device, strerror(errno));
159
+ return;
160
+ }
161
+
162
+ o->vfu_poll_fd = vfu_get_poll_fd(o->vfu_ctx);
163
+ if (o->vfu_poll_fd < 0) {
164
+ VFU_OBJECT_ERROR(o, "vfu: Failed to get poll fd %s", o->device);
165
+ return;
166
+ }
167
+
168
+ qemu_set_fd_handler(o->vfu_poll_fd, vfu_object_ctx_run, NULL, o);
169
+}
170
+
171
/*
172
* TYPE_VFU_OBJECT depends on the availability of the 'socket' and 'device'
173
* properties. It also depends on devices instantiated in QEMU. These
174
@@ -XXX,XX +XXX,XX @@ static void vfu_object_machine_done(Notifier *notifier, void *data)
175
}
176
}
177
178
+/**
179
+ * vfu_object_init_ctx: Create and initialize libvfio-user context. Add
180
+ * an unplug blocker for the associated PCI device. Setup a FD handler
181
+ * to process incoming messages in the context's socket.
182
+ *
183
+ * The socket and device properties are mandatory, and this function
184
+ * will not create the context without them - the setters for these
185
+ * properties should call this function when the property is set. The
186
+ * machine should also be ready when this function is invoked - it is
187
+ * because QEMU objects are initialized before devices, and the
188
+ * associated PCI device wouldn't be available at the object
189
+ * initialization time. Until these conditions are satisfied, this
190
+ * function would return early without performing any task.
191
+ */
192
static void vfu_object_init_ctx(VfuObject *o, Error **errp)
193
{
194
ERRP_GUARD();
195
@@ -XXX,XX +XXX,XX @@ static void vfu_object_init_ctx(VfuObject *o, Error **errp)
196
return;
197
}
198
199
- o->vfu_ctx = vfu_create_ctx(VFU_TRANS_SOCK, o->socket->u.q_unix.path, 0,
200
+ o->vfu_ctx = vfu_create_ctx(VFU_TRANS_SOCK, o->socket->u.q_unix.path,
201
+ LIBVFIO_USER_FLAG_ATTACH_NB,
202
o, VFU_DEV_TYPE_PCI);
203
if (o->vfu_ctx == NULL) {
204
error_setg(errp, "vfu: Failed to create context - %s", strerror(errno));
205
@@ -XXX,XX +XXX,XX @@ static void vfu_object_init_ctx(VfuObject *o, Error **errp)
206
TYPE_VFU_OBJECT, o->device);
207
qdev_add_unplug_blocker(DEVICE(o->pci_dev), o->unplug_blocker);
208
209
+ ret = vfu_realize_ctx(o->vfu_ctx);
210
+ if (ret < 0) {
211
+ error_setg(errp, "vfu: Failed to realize device %s- %s",
212
+ o->device, strerror(errno));
213
+ goto fail;
214
+ }
215
+
216
+ o->vfu_poll_fd = vfu_get_poll_fd(o->vfu_ctx);
217
+ if (o->vfu_poll_fd < 0) {
218
+ error_setg(errp, "vfu: Failed to get poll fd %s", o->device);
219
+ goto fail;
220
+ }
221
+
222
+ qemu_set_fd_handler(o->vfu_poll_fd, vfu_object_attach_ctx, NULL, o);
223
+
224
return;
225
226
fail:
227
@@ -XXX,XX +XXX,XX @@ static void vfu_object_init(Object *obj)
228
qemu_add_machine_init_done_notifier(&o->machine_done);
229
}
230
231
+ o->vfu_poll_fd = -1;
232
}
233
234
static void vfu_object_finalize(Object *obj)
235
@@ -XXX,XX +XXX,XX @@ static void vfu_object_finalize(Object *obj)
236
237
o->socket = NULL;
238
239
+ if (o->vfu_poll_fd != -1) {
240
+ qemu_set_fd_handler(o->vfu_poll_fd, NULL, NULL, NULL);
241
+ o->vfu_poll_fd = -1;
242
+ }
243
+
244
if (o->vfu_ctx) {
245
vfu_destroy_ctx(o->vfu_ctx);
246
o->vfu_ctx = NULL;
247
--
248
2.36.1
diff view generated by jsdifflib
New patch
1
From: Jagannathan Raman <jag.raman@oracle.com>
1
2
3
Define and register handlers for PCI config space accesses
4
5
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
6
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
7
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
8
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
9
Message-id: be9d2ccf9b1d24e50dcd9c23404dbf284142cec7.1655151679.git.jag.raman@oracle.com
10
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
11
---
12
hw/remote/vfio-user-obj.c | 51 +++++++++++++++++++++++++++++++++++++++
13
hw/remote/trace-events | 2 ++
14
2 files changed, 53 insertions(+)
15
16
diff --git a/hw/remote/vfio-user-obj.c b/hw/remote/vfio-user-obj.c
17
index XXXXXXX..XXXXXXX 100644
18
--- a/hw/remote/vfio-user-obj.c
19
+++ b/hw/remote/vfio-user-obj.c
20
@@ -XXX,XX +XXX,XX @@
21
#include "qapi/qapi-events-misc.h"
22
#include "qemu/notify.h"
23
#include "qemu/thread.h"
24
+#include "qemu/main-loop.h"
25
#include "sysemu/sysemu.h"
26
#include "libvfio-user.h"
27
#include "hw/qdev-core.h"
28
@@ -XXX,XX +XXX,XX @@ retry_attach:
29
qemu_set_fd_handler(o->vfu_poll_fd, vfu_object_ctx_run, NULL, o);
30
}
31
32
+static ssize_t vfu_object_cfg_access(vfu_ctx_t *vfu_ctx, char * const buf,
33
+ size_t count, loff_t offset,
34
+ const bool is_write)
35
+{
36
+ VfuObject *o = vfu_get_private(vfu_ctx);
37
+ uint32_t pci_access_width = sizeof(uint32_t);
38
+ size_t bytes = count;
39
+ uint32_t val = 0;
40
+ char *ptr = buf;
41
+ int len;
42
+
43
+ /*
44
+ * Writes to the BAR registers would trigger an update to the
45
+ * global Memory and IO AddressSpaces. But the remote device
46
+ * never uses the global AddressSpaces, therefore overlapping
47
+ * memory regions are not a problem
48
+ */
49
+ while (bytes > 0) {
50
+ len = (bytes > pci_access_width) ? pci_access_width : bytes;
51
+ if (is_write) {
52
+ memcpy(&val, ptr, len);
53
+ pci_host_config_write_common(o->pci_dev, offset,
54
+ pci_config_size(o->pci_dev),
55
+ val, len);
56
+ trace_vfu_cfg_write(offset, val);
57
+ } else {
58
+ val = pci_host_config_read_common(o->pci_dev, offset,
59
+ pci_config_size(o->pci_dev), len);
60
+ memcpy(ptr, &val, len);
61
+ trace_vfu_cfg_read(offset, val);
62
+ }
63
+ offset += len;
64
+ ptr += len;
65
+ bytes -= len;
66
+ }
67
+
68
+ return count;
69
+}
70
+
71
/*
72
* TYPE_VFU_OBJECT depends on the availability of the 'socket' and 'device'
73
* properties. It also depends on devices instantiated in QEMU. These
74
@@ -XXX,XX +XXX,XX @@ static void vfu_object_init_ctx(VfuObject *o, Error **errp)
75
TYPE_VFU_OBJECT, o->device);
76
qdev_add_unplug_blocker(DEVICE(o->pci_dev), o->unplug_blocker);
77
78
+ ret = vfu_setup_region(o->vfu_ctx, VFU_PCI_DEV_CFG_REGION_IDX,
79
+ pci_config_size(o->pci_dev), &vfu_object_cfg_access,
80
+ VFU_REGION_FLAG_RW | VFU_REGION_FLAG_ALWAYS_CB,
81
+ NULL, 0, -1, 0);
82
+ if (ret < 0) {
83
+ error_setg(errp,
84
+ "vfu: Failed to setup config space handlers for %s- %s",
85
+ o->device, strerror(errno));
86
+ goto fail;
87
+ }
88
+
89
ret = vfu_realize_ctx(o->vfu_ctx);
90
if (ret < 0) {
91
error_setg(errp, "vfu: Failed to realize device %s- %s",
92
diff --git a/hw/remote/trace-events b/hw/remote/trace-events
93
index XXXXXXX..XXXXXXX 100644
94
--- a/hw/remote/trace-events
95
+++ b/hw/remote/trace-events
96
@@ -XXX,XX +XXX,XX @@ mpqemu_recv_io_error(int cmd, int size, int nfds) "failed to receive %d size %d,
97
98
# vfio-user-obj.c
99
vfu_prop(const char *prop, const char *val) "vfu: setting %s as %s"
100
+vfu_cfg_read(uint32_t offset, uint32_t val) "vfu: cfg: 0x%u -> 0x%x"
101
+vfu_cfg_write(uint32_t offset, uint32_t val) "vfu: cfg: 0x%u <- 0x%x"
102
--
103
2.36.1
diff view generated by jsdifflib
New patch
1
1
From: Jagannathan Raman <jag.raman@oracle.com>
2
3
Assign separate address space for each device in the remote processes.
4
5
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
6
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
7
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
8
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
9
Message-id: afe0b0a97582cdad42b5b25636a29c523265a10a.1655151679.git.jag.raman@oracle.com
10
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
11
---
12
MAINTAINERS | 2 +
13
include/hw/remote/iommu.h | 40 ++++++++++++
14
hw/remote/iommu.c | 131 ++++++++++++++++++++++++++++++++++++++
15
hw/remote/machine.c | 13 +++-
16
hw/remote/meson.build | 1 +
17
5 files changed, 186 insertions(+), 1 deletion(-)
18
create mode 100644 include/hw/remote/iommu.h
19
create mode 100644 hw/remote/iommu.c
20
21
diff --git a/MAINTAINERS b/MAINTAINERS
22
index XXXXXXX..XXXXXXX 100644
23
--- a/MAINTAINERS
24
+++ b/MAINTAINERS
25
@@ -XXX,XX +XXX,XX @@ F: hw/remote/iohub.c
26
F: include/hw/remote/iohub.h
27
F: subprojects/libvfio-user
28
F: hw/remote/vfio-user-obj.c
29
+F: hw/remote/iommu.c
30
+F: include/hw/remote/iommu.h
31
32
EBPF:
33
M: Jason Wang <jasowang@redhat.com>
34
diff --git a/include/hw/remote/iommu.h b/include/hw/remote/iommu.h
35
new file mode 100644
36
index XXXXXXX..XXXXXXX
37
--- /dev/null
38
+++ b/include/hw/remote/iommu.h
39
@@ -XXX,XX +XXX,XX @@
40
+/**
41
+ * Copyright © 2022 Oracle and/or its affiliates.
42
+ *
43
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
44
+ * See the COPYING file in the top-level directory.
45
+ *
46
+ */
47
+
48
+#ifndef REMOTE_IOMMU_H
49
+#define REMOTE_IOMMU_H
50
+
51
+#include "hw/pci/pci_bus.h"
52
+#include "hw/pci/pci.h"
53
+
54
+#ifndef INT2VOIDP
55
+#define INT2VOIDP(i) (void *)(uintptr_t)(i)
56
+#endif
57
+
58
+typedef struct RemoteIommuElem {
59
+ MemoryRegion *mr;
60
+
61
+ AddressSpace as;
62
+} RemoteIommuElem;
63
+
64
+#define TYPE_REMOTE_IOMMU "x-remote-iommu"
65
+OBJECT_DECLARE_SIMPLE_TYPE(RemoteIommu, REMOTE_IOMMU)
66
+
67
+struct RemoteIommu {
68
+ Object parent;
69
+
70
+ GHashTable *elem_by_devfn;
71
+
72
+ QemuMutex lock;
73
+};
74
+
75
+void remote_iommu_setup(PCIBus *pci_bus);
76
+
77
+void remote_iommu_unplug_dev(PCIDevice *pci_dev);
78
+
79
+#endif
80
diff --git a/hw/remote/iommu.c b/hw/remote/iommu.c
81
new file mode 100644
82
index XXXXXXX..XXXXXXX
83
--- /dev/null
84
+++ b/hw/remote/iommu.c
85
@@ -XXX,XX +XXX,XX @@
86
+/**
87
+ * IOMMU for remote device
88
+ *
89
+ * Copyright © 2022 Oracle and/or its affiliates.
90
+ *
91
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
92
+ * See the COPYING file in the top-level directory.
93
+ *
94
+ */
95
+
96
+#include "qemu/osdep.h"
97
+
98
+#include "hw/remote/iommu.h"
99
+#include "hw/pci/pci_bus.h"
100
+#include "hw/pci/pci.h"
101
+#include "exec/memory.h"
102
+#include "exec/address-spaces.h"
103
+#include "trace.h"
104
+
105
+/**
106
+ * IOMMU for TYPE_REMOTE_MACHINE - manages DMA address space isolation
107
+ * for remote machine. It is used by TYPE_VFIO_USER_SERVER.
108
+ *
109
+ * - Each TYPE_VFIO_USER_SERVER instance handles one PCIDevice on a PCIBus.
110
+ * There is one RemoteIommu per PCIBus, so the RemoteIommu tracks multiple
111
+ * PCIDevices by maintaining a ->elem_by_devfn mapping.
112
+ *
113
+ * - memory_region_init_iommu() is not used because vfio-user MemoryRegions
114
+ * will be added to the elem->mr container instead. This is more natural
115
+ * than implementing the IOMMUMemoryRegionClass APIs since vfio-user
116
+ * provides something that is close to a full-fledged MemoryRegion and
117
+ * not like an IOMMU mapping.
118
+ *
119
+ * - When a device is hot unplugged, the elem->mr reference is dropped so
120
+ * all vfio-user MemoryRegions associated with this vfio-user server are
121
+ * destroyed.
122
+ */
123
+
124
+static AddressSpace *remote_iommu_find_add_as(PCIBus *pci_bus,
125
+ void *opaque, int devfn)
126
+{
127
+ RemoteIommu *iommu = opaque;
128
+ RemoteIommuElem *elem = NULL;
129
+
130
+ qemu_mutex_lock(&iommu->lock);
131
+
132
+ elem = g_hash_table_lookup(iommu->elem_by_devfn, INT2VOIDP(devfn));
133
+
134
+ if (!elem) {
135
+ elem = g_malloc0(sizeof(RemoteIommuElem));
136
+ g_hash_table_insert(iommu->elem_by_devfn, INT2VOIDP(devfn), elem);
137
+ }
138
+
139
+ if (!elem->mr) {
140
+ elem->mr = MEMORY_REGION(object_new(TYPE_MEMORY_REGION));
141
+ memory_region_set_size(elem->mr, UINT64_MAX);
142
+ address_space_init(&elem->as, elem->mr, NULL);
143
+ }
144
+
145
+ qemu_mutex_unlock(&iommu->lock);
146
+
147
+ return &elem->as;
148
+}
149
+
150
+void remote_iommu_unplug_dev(PCIDevice *pci_dev)
151
+{
152
+ AddressSpace *as = pci_device_iommu_address_space(pci_dev);
153
+ RemoteIommuElem *elem = NULL;
154
+
155
+ if (as == &address_space_memory) {
156
+ return;
157
+ }
158
+
159
+ elem = container_of(as, RemoteIommuElem, as);
160
+
161
+ address_space_destroy(&elem->as);
162
+
163
+ object_unref(elem->mr);
164
+
165
+ elem->mr = NULL;
166
+}
167
+
168
+static void remote_iommu_init(Object *obj)
169
+{
170
+ RemoteIommu *iommu = REMOTE_IOMMU(obj);
171
+
172
+ iommu->elem_by_devfn = g_hash_table_new_full(NULL, NULL, NULL, g_free);
173
+
174
+ qemu_mutex_init(&iommu->lock);
175
+}
176
+
177
+static void remote_iommu_finalize(Object *obj)
178
+{
179
+ RemoteIommu *iommu = REMOTE_IOMMU(obj);
180
+
181
+ qemu_mutex_destroy(&iommu->lock);
182
+
183
+ g_hash_table_destroy(iommu->elem_by_devfn);
184
+
185
+ iommu->elem_by_devfn = NULL;
186
+}
187
+
188
+void remote_iommu_setup(PCIBus *pci_bus)
189
+{
190
+ RemoteIommu *iommu = NULL;
191
+
192
+ g_assert(pci_bus);
193
+
194
+ iommu = REMOTE_IOMMU(object_new(TYPE_REMOTE_IOMMU));
195
+
196
+ pci_setup_iommu(pci_bus, remote_iommu_find_add_as, iommu);
197
+
198
+ object_property_add_child(OBJECT(pci_bus), "remote-iommu", OBJECT(iommu));
199
+
200
+ object_unref(OBJECT(iommu));
201
+}
202
+
203
+static const TypeInfo remote_iommu_info = {
204
+ .name = TYPE_REMOTE_IOMMU,
205
+ .parent = TYPE_OBJECT,
206
+ .instance_size = sizeof(RemoteIommu),
207
+ .instance_init = remote_iommu_init,
208
+ .instance_finalize = remote_iommu_finalize,
209
+};
210
+
211
+static void remote_iommu_register_types(void)
212
+{
213
+ type_register_static(&remote_iommu_info);
214
+}
215
+
216
+type_init(remote_iommu_register_types)
217
diff --git a/hw/remote/machine.c b/hw/remote/machine.c
218
index XXXXXXX..XXXXXXX 100644
219
--- a/hw/remote/machine.c
220
+++ b/hw/remote/machine.c
221
@@ -XXX,XX +XXX,XX @@
222
#include "qapi/error.h"
223
#include "hw/pci/pci_host.h"
224
#include "hw/remote/iohub.h"
225
+#include "hw/remote/iommu.h"
226
#include "hw/qdev-core.h"
227
228
static void remote_machine_init(MachineState *machine)
229
@@ -XXX,XX +XXX,XX @@ static void remote_machine_instance_init(Object *obj)
230
s->auto_shutdown = true;
231
}
232
233
+static void remote_machine_dev_unplug_cb(HotplugHandler *hotplug_dev,
234
+ DeviceState *dev, Error **errp)
235
+{
236
+ qdev_unrealize(dev);
237
+
238
+ if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
239
+ remote_iommu_unplug_dev(PCI_DEVICE(dev));
240
+ }
241
+}
242
+
243
static void remote_machine_class_init(ObjectClass *oc, void *data)
244
{
245
MachineClass *mc = MACHINE_CLASS(oc);
246
@@ -XXX,XX +XXX,XX @@ static void remote_machine_class_init(ObjectClass *oc, void *data)
247
mc->init = remote_machine_init;
248
mc->desc = "Experimental remote machine";
249
250
- hc->unplug = qdev_simple_device_unplug_cb;
251
+ hc->unplug = remote_machine_dev_unplug_cb;
252
253
object_class_property_add_bool(oc, "vfio-user",
254
remote_machine_get_vfio_user,
255
diff --git a/hw/remote/meson.build b/hw/remote/meson.build
256
index XXXXXXX..XXXXXXX 100644
257
--- a/hw/remote/meson.build
258
+++ b/hw/remote/meson.build
259
@@ -XXX,XX +XXX,XX @@ remote_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('message.c'))
260
remote_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('remote-obj.c'))
261
remote_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('proxy.c'))
262
remote_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('iohub.c'))
263
+remote_ss.add(when: 'CONFIG_MULTIPROCESS', if_true: files('iommu.c'))
264
remote_ss.add(when: 'CONFIG_VFIO_USER_SERVER', if_true: files('vfio-user-obj.c'))
265
266
remote_ss.add(when: 'CONFIG_VFIO_USER_SERVER', if_true: libvfio_user_dep)
267
--
268
2.36.1
269
270
diff view generated by jsdifflib
New patch
1
From: Jagannathan Raman <jag.raman@oracle.com>
1
2
3
Define and register callbacks to manage the RAM regions used for
4
device DMA
5
6
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
7
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
8
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
9
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
10
Message-id: faacbcd45c4d02c591f0dbfdc19041fbb3eae7eb.1655151679.git.jag.raman@oracle.com
11
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
12
---
13
hw/remote/machine.c | 5 ++++
14
hw/remote/vfio-user-obj.c | 55 +++++++++++++++++++++++++++++++++++++++
15
hw/remote/trace-events | 2 ++
16
3 files changed, 62 insertions(+)
17
18
diff --git a/hw/remote/machine.c b/hw/remote/machine.c
19
index XXXXXXX..XXXXXXX 100644
20
--- a/hw/remote/machine.c
21
+++ b/hw/remote/machine.c
22
@@ -XXX,XX +XXX,XX @@
23
#include "hw/remote/iohub.h"
24
#include "hw/remote/iommu.h"
25
#include "hw/qdev-core.h"
26
+#include "hw/remote/iommu.h"
27
28
static void remote_machine_init(MachineState *machine)
29
{
30
@@ -XXX,XX +XXX,XX @@ static void remote_machine_init(MachineState *machine)
31
32
pci_host = PCI_HOST_BRIDGE(rem_host);
33
34
+ if (s->vfio_user) {
35
+ remote_iommu_setup(pci_host->bus);
36
+ }
37
+
38
remote_iohub_init(&s->iohub);
39
40
pci_bus_irqs(pci_host->bus, remote_iohub_set_irq, remote_iohub_map_irq,
41
diff --git a/hw/remote/vfio-user-obj.c b/hw/remote/vfio-user-obj.c
42
index XXXXXXX..XXXXXXX 100644
43
--- a/hw/remote/vfio-user-obj.c
44
+++ b/hw/remote/vfio-user-obj.c
45
@@ -XXX,XX +XXX,XX @@ static ssize_t vfu_object_cfg_access(vfu_ctx_t *vfu_ctx, char * const buf,
46
return count;
47
}
48
49
+static void dma_register(vfu_ctx_t *vfu_ctx, vfu_dma_info_t *info)
50
+{
51
+ VfuObject *o = vfu_get_private(vfu_ctx);
52
+ AddressSpace *dma_as = NULL;
53
+ MemoryRegion *subregion = NULL;
54
+ g_autofree char *name = NULL;
55
+ struct iovec *iov = &info->iova;
56
+
57
+ if (!info->vaddr) {
58
+ return;
59
+ }
60
+
61
+ name = g_strdup_printf("mem-%s-%"PRIx64"", o->device,
62
+ (uint64_t)info->vaddr);
63
+
64
+ subregion = g_new0(MemoryRegion, 1);
65
+
66
+ memory_region_init_ram_ptr(subregion, NULL, name,
67
+ iov->iov_len, info->vaddr);
68
+
69
+ dma_as = pci_device_iommu_address_space(o->pci_dev);
70
+
71
+ memory_region_add_subregion(dma_as->root, (hwaddr)iov->iov_base, subregion);
72
+
73
+ trace_vfu_dma_register((uint64_t)iov->iov_base, iov->iov_len);
74
+}
75
+
76
+static void dma_unregister(vfu_ctx_t *vfu_ctx, vfu_dma_info_t *info)
77
+{
78
+ VfuObject *o = vfu_get_private(vfu_ctx);
79
+ AddressSpace *dma_as = NULL;
80
+ MemoryRegion *mr = NULL;
81
+ ram_addr_t offset;
82
+
83
+ mr = memory_region_from_host(info->vaddr, &offset);
84
+ if (!mr) {
85
+ return;
86
+ }
87
+
88
+ dma_as = pci_device_iommu_address_space(o->pci_dev);
89
+
90
+ memory_region_del_subregion(dma_as->root, mr);
91
+
92
+ object_unparent((OBJECT(mr)));
93
+
94
+ trace_vfu_dma_unregister((uint64_t)info->iova.iov_base);
95
+}
96
+
97
/*
98
* TYPE_VFU_OBJECT depends on the availability of the 'socket' and 'device'
99
* properties. It also depends on devices instantiated in QEMU. These
100
@@ -XXX,XX +XXX,XX @@ static void vfu_object_init_ctx(VfuObject *o, Error **errp)
101
goto fail;
102
}
103
104
+ ret = vfu_setup_device_dma(o->vfu_ctx, &dma_register, &dma_unregister);
105
+ if (ret < 0) {
106
+ error_setg(errp, "vfu: Failed to setup DMA handlers for %s",
107
+ o->device);
108
+ goto fail;
109
+ }
110
+
111
ret = vfu_realize_ctx(o->vfu_ctx);
112
if (ret < 0) {
113
error_setg(errp, "vfu: Failed to realize device %s- %s",
114
diff --git a/hw/remote/trace-events b/hw/remote/trace-events
115
index XXXXXXX..XXXXXXX 100644
116
--- a/hw/remote/trace-events
117
+++ b/hw/remote/trace-events
118
@@ -XXX,XX +XXX,XX @@ mpqemu_recv_io_error(int cmd, int size, int nfds) "failed to receive %d size %d,
119
vfu_prop(const char *prop, const char *val) "vfu: setting %s as %s"
120
vfu_cfg_read(uint32_t offset, uint32_t val) "vfu: cfg: 0x%u -> 0x%x"
121
vfu_cfg_write(uint32_t offset, uint32_t val) "vfu: cfg: 0x%u <- 0x%x"
122
+vfu_dma_register(uint64_t gpa, size_t len) "vfu: registering GPA 0x%"PRIx64", %zu bytes"
123
+vfu_dma_unregister(uint64_t gpa) "vfu: unregistering GPA 0x%"PRIx64""
124
--
125
2.36.1
diff view generated by jsdifflib
New patch
1
From: Jagannathan Raman <jag.raman@oracle.com>
1
2
3
Determine the BARs used by the PCI device and register handlers to
4
manage the access to the same.
5
6
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
7
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
8
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
9
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
10
Message-id: 3373e10b5be5f42846f0632d4382466e1698c505.1655151679.git.jag.raman@oracle.com
11
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
12
---
13
include/exec/memory.h | 3 +
14
hw/remote/vfio-user-obj.c | 190 ++++++++++++++++++++++++++++++++
15
softmmu/physmem.c | 4 +-
16
tests/qtest/fuzz/generic_fuzz.c | 9 +-
17
hw/remote/trace-events | 3 +
18
5 files changed, 203 insertions(+), 6 deletions(-)
19
20
diff --git a/include/exec/memory.h b/include/exec/memory.h
21
index XXXXXXX..XXXXXXX 100644
22
--- a/include/exec/memory.h
23
+++ b/include/exec/memory.h
24
@@ -XXX,XX +XXX,XX @@ MemTxResult address_space_write_cached_slow(MemoryRegionCache *cache,
25
hwaddr addr, const void *buf,
26
hwaddr len);
27
28
+int memory_access_size(MemoryRegion *mr, unsigned l, hwaddr addr);
29
+bool prepare_mmio_access(MemoryRegion *mr);
30
+
31
static inline bool memory_access_is_direct(MemoryRegion *mr, bool is_write)
32
{
33
if (is_write) {
34
diff --git a/hw/remote/vfio-user-obj.c b/hw/remote/vfio-user-obj.c
35
index XXXXXXX..XXXXXXX 100644
36
--- a/hw/remote/vfio-user-obj.c
37
+++ b/hw/remote/vfio-user-obj.c
38
@@ -XXX,XX +XXX,XX @@
39
#include "hw/qdev-core.h"
40
#include "hw/pci/pci.h"
41
#include "qemu/timer.h"
42
+#include "exec/memory.h"
43
44
#define TYPE_VFU_OBJECT "x-vfio-user-server"
45
OBJECT_DECLARE_TYPE(VfuObject, VfuObjectClass, VFU_OBJECT)
46
@@ -XXX,XX +XXX,XX @@ static void dma_unregister(vfu_ctx_t *vfu_ctx, vfu_dma_info_t *info)
47
trace_vfu_dma_unregister((uint64_t)info->iova.iov_base);
48
}
49
50
+static int vfu_object_mr_rw(MemoryRegion *mr, uint8_t *buf, hwaddr offset,
51
+ hwaddr size, const bool is_write)
52
+{
53
+ uint8_t *ptr = buf;
54
+ bool release_lock = false;
55
+ uint8_t *ram_ptr = NULL;
56
+ MemTxResult result;
57
+ int access_size;
58
+ uint64_t val;
59
+
60
+ if (memory_access_is_direct(mr, is_write)) {
61
+ /**
62
+ * Some devices expose a PCI expansion ROM, which could be buffer
63
+ * based as compared to other regions which are primarily based on
64
+ * MemoryRegionOps. memory_region_find() would already check
65
+ * for buffer overflow, we don't need to repeat it here.
66
+ */
67
+ ram_ptr = memory_region_get_ram_ptr(mr);
68
+
69
+ if (is_write) {
70
+ memcpy((ram_ptr + offset), buf, size);
71
+ } else {
72
+ memcpy(buf, (ram_ptr + offset), size);
73
+ }
74
+
75
+ return 0;
76
+ }
77
+
78
+ while (size) {
79
+ /**
80
+ * The read/write logic used below is similar to the ones in
81
+ * flatview_read/write_continue()
82
+ */
83
+ release_lock = prepare_mmio_access(mr);
84
+
85
+ access_size = memory_access_size(mr, size, offset);
86
+
87
+ if (is_write) {
88
+ val = ldn_he_p(ptr, access_size);
89
+
90
+ result = memory_region_dispatch_write(mr, offset, val,
91
+ size_memop(access_size),
92
+ MEMTXATTRS_UNSPECIFIED);
93
+ } else {
94
+ result = memory_region_dispatch_read(mr, offset, &val,
95
+ size_memop(access_size),
96
+ MEMTXATTRS_UNSPECIFIED);
97
+
98
+ stn_he_p(ptr, access_size, val);
99
+ }
100
+
101
+ if (release_lock) {
102
+ qemu_mutex_unlock_iothread();
103
+ release_lock = false;
104
+ }
105
+
106
+ if (result != MEMTX_OK) {
107
+ return -1;
108
+ }
109
+
110
+ size -= access_size;
111
+ ptr += access_size;
112
+ offset += access_size;
113
+ }
114
+
115
+ return 0;
116
+}
117
+
118
+static size_t vfu_object_bar_rw(PCIDevice *pci_dev, int pci_bar,
119
+ hwaddr bar_offset, char * const buf,
120
+ hwaddr len, const bool is_write)
121
+{
122
+ MemoryRegionSection section = { 0 };
123
+ uint8_t *ptr = (uint8_t *)buf;
124
+ MemoryRegion *section_mr = NULL;
125
+ uint64_t section_size;
126
+ hwaddr section_offset;
127
+ hwaddr size = 0;
128
+
129
+ while (len) {
130
+ section = memory_region_find(pci_dev->io_regions[pci_bar].memory,
131
+ bar_offset, len);
132
+
133
+ if (!section.mr) {
134
+ warn_report("vfu: invalid address 0x%"PRIx64"", bar_offset);
135
+ return size;
136
+ }
137
+
138
+ section_mr = section.mr;
139
+ section_offset = section.offset_within_region;
140
+ section_size = int128_get64(section.size);
141
+
142
+ if (is_write && section_mr->readonly) {
143
+ warn_report("vfu: attempting to write to readonly region in "
144
+ "bar %d - [0x%"PRIx64" - 0x%"PRIx64"]",
145
+ pci_bar, bar_offset,
146
+ (bar_offset + section_size));
147
+ memory_region_unref(section_mr);
148
+ return size;
149
+ }
150
+
151
+ if (vfu_object_mr_rw(section_mr, ptr, section_offset,
152
+ section_size, is_write)) {
153
+ warn_report("vfu: failed to %s "
154
+ "[0x%"PRIx64" - 0x%"PRIx64"] in bar %d",
155
+ is_write ? "write to" : "read from", bar_offset,
156
+ (bar_offset + section_size), pci_bar);
157
+ memory_region_unref(section_mr);
158
+ return size;
159
+ }
160
+
161
+ size += section_size;
162
+ bar_offset += section_size;
163
+ ptr += section_size;
164
+ len -= section_size;
165
+
166
+ memory_region_unref(section_mr);
167
+ }
168
+
169
+ return size;
170
+}
171
+
172
+/**
173
+ * VFU_OBJECT_BAR_HANDLER - macro for defining handlers for PCI BARs.
174
+ *
175
+ * To create handler for BAR number 2, VFU_OBJECT_BAR_HANDLER(2) would
176
+ * define vfu_object_bar2_handler
177
+ */
178
+#define VFU_OBJECT_BAR_HANDLER(BAR_NO) \
179
+ static ssize_t vfu_object_bar##BAR_NO##_handler(vfu_ctx_t *vfu_ctx, \
180
+ char * const buf, size_t count, \
181
+ loff_t offset, const bool is_write) \
182
+ { \
183
+ VfuObject *o = vfu_get_private(vfu_ctx); \
184
+ PCIDevice *pci_dev = o->pci_dev; \
185
+ \
186
+ return vfu_object_bar_rw(pci_dev, BAR_NO, offset, \
187
+ buf, count, is_write); \
188
+ } \
189
+
190
+VFU_OBJECT_BAR_HANDLER(0)
191
+VFU_OBJECT_BAR_HANDLER(1)
192
+VFU_OBJECT_BAR_HANDLER(2)
193
+VFU_OBJECT_BAR_HANDLER(3)
194
+VFU_OBJECT_BAR_HANDLER(4)
195
+VFU_OBJECT_BAR_HANDLER(5)
196
+VFU_OBJECT_BAR_HANDLER(6)
197
+
198
+static vfu_region_access_cb_t *vfu_object_bar_handlers[PCI_NUM_REGIONS] = {
199
+ &vfu_object_bar0_handler,
200
+ &vfu_object_bar1_handler,
201
+ &vfu_object_bar2_handler,
202
+ &vfu_object_bar3_handler,
203
+ &vfu_object_bar4_handler,
204
+ &vfu_object_bar5_handler,
205
+ &vfu_object_bar6_handler,
206
+};
207
+
208
+/**
209
+ * vfu_object_register_bars - Identify active BAR regions of pdev and setup
210
+ * callbacks to handle read/write accesses
211
+ */
212
+static void vfu_object_register_bars(vfu_ctx_t *vfu_ctx, PCIDevice *pdev)
213
+{
214
+ int flags = VFU_REGION_FLAG_RW;
215
+ int i;
216
+
217
+ for (i = 0; i < PCI_NUM_REGIONS; i++) {
218
+ if (!pdev->io_regions[i].size) {
219
+ continue;
220
+ }
221
+
222
+ if ((i == VFU_PCI_DEV_ROM_REGION_IDX) ||
223
+ pdev->io_regions[i].memory->readonly) {
224
+ flags &= ~VFU_REGION_FLAG_WRITE;
225
+ }
226
+
227
+ vfu_setup_region(vfu_ctx, VFU_PCI_DEV_BAR0_REGION_IDX + i,
228
+ (size_t)pdev->io_regions[i].size,
229
+ vfu_object_bar_handlers[i],
230
+ flags, NULL, 0, -1, 0);
231
+
232
+ trace_vfu_bar_register(i, pdev->io_regions[i].addr,
233
+ pdev->io_regions[i].size);
234
+ }
235
+}
236
+
237
/*
238
* TYPE_VFU_OBJECT depends on the availability of the 'socket' and 'device'
239
* properties. It also depends on devices instantiated in QEMU. These
240
@@ -XXX,XX +XXX,XX @@ static void vfu_object_init_ctx(VfuObject *o, Error **errp)
241
goto fail;
242
}
243
244
+ vfu_object_register_bars(o->vfu_ctx, o->pci_dev);
245
+
246
ret = vfu_realize_ctx(o->vfu_ctx);
247
if (ret < 0) {
248
error_setg(errp, "vfu: Failed to realize device %s- %s",
249
diff --git a/softmmu/physmem.c b/softmmu/physmem.c
250
index XXXXXXX..XXXXXXX 100644
251
--- a/softmmu/physmem.c
252
+++ b/softmmu/physmem.c
253
@@ -XXX,XX +XXX,XX @@ void memory_region_flush_rom_device(MemoryRegion *mr, hwaddr addr, hwaddr size)
254
invalidate_and_set_dirty(mr, addr, size);
255
}
256
257
-static int memory_access_size(MemoryRegion *mr, unsigned l, hwaddr addr)
258
+int memory_access_size(MemoryRegion *mr, unsigned l, hwaddr addr)
259
{
260
unsigned access_size_max = mr->ops->valid.max_access_size;
261
262
@@ -XXX,XX +XXX,XX @@ static int memory_access_size(MemoryRegion *mr, unsigned l, hwaddr addr)
263
return l;
264
}
265
266
-static bool prepare_mmio_access(MemoryRegion *mr)
267
+bool prepare_mmio_access(MemoryRegion *mr)
268
{
269
bool release_lock = false;
270
271
diff --git a/tests/qtest/fuzz/generic_fuzz.c b/tests/qtest/fuzz/generic_fuzz.c
272
index XXXXXXX..XXXXXXX 100644
273
--- a/tests/qtest/fuzz/generic_fuzz.c
274
+++ b/tests/qtest/fuzz/generic_fuzz.c
275
@@ -XXX,XX +XXX,XX @@ static void *pattern_alloc(pattern p, size_t len)
276
return buf;
277
}
278
279
-static int memory_access_size(MemoryRegion *mr, unsigned l, hwaddr addr)
280
+static int fuzz_memory_access_size(MemoryRegion *mr, unsigned l, hwaddr addr)
281
{
282
unsigned access_size_max = mr->ops->valid.max_access_size;
283
284
@@ -XXX,XX +XXX,XX @@ void fuzz_dma_read_cb(size_t addr, size_t len, MemoryRegion *mr)
285
286
/*
287
* If mr1 isn't RAM, address_space_translate doesn't update l. Use
288
- * memory_access_size to identify the number of bytes that it is safe
289
- * to write without accidentally writing to another MemoryRegion.
290
+ * fuzz_memory_access_size to identify the number of bytes that it
291
+ * is safe to write without accidentally writing to another
292
+ * MemoryRegion.
293
*/
294
if (!memory_region_is_ram(mr1)) {
295
- l = memory_access_size(mr1, l, addr1);
296
+ l = fuzz_memory_access_size(mr1, l, addr1);
297
}
298
if (memory_region_is_ram(mr1) ||
299
memory_region_is_romd(mr1) ||
300
diff --git a/hw/remote/trace-events b/hw/remote/trace-events
301
index XXXXXXX..XXXXXXX 100644
302
--- a/hw/remote/trace-events
303
+++ b/hw/remote/trace-events
304
@@ -XXX,XX +XXX,XX @@ vfu_cfg_read(uint32_t offset, uint32_t val) "vfu: cfg: 0x%u -> 0x%x"
305
vfu_cfg_write(uint32_t offset, uint32_t val) "vfu: cfg: 0x%u <- 0x%x"
306
vfu_dma_register(uint64_t gpa, size_t len) "vfu: registering GPA 0x%"PRIx64", %zu bytes"
307
vfu_dma_unregister(uint64_t gpa) "vfu: unregistering GPA 0x%"PRIx64""
308
+vfu_bar_register(int i, uint64_t addr, uint64_t size) "vfu: BAR %d: addr 0x%"PRIx64" size 0x%"PRIx64""
309
+vfu_bar_rw_enter(const char *op, uint64_t addr) "vfu: %s request for BAR address 0x%"PRIx64""
310
+vfu_bar_rw_exit(const char *op, uint64_t addr) "vfu: Finished %s of BAR address 0x%"PRIx64""
311
--
312
2.36.1
diff view generated by jsdifflib
New patch
1
From: Jagannathan Raman <jag.raman@oracle.com>
1
2
3
Forward remote device's interrupts to the guest
4
5
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
6
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
7
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
8
Message-id: 9523479eaafe050677f4de2af5dd0df18c27cfd9.1655151679.git.jag.raman@oracle.com
9
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
10
---
11
MAINTAINERS | 1 +
12
include/hw/pci/msi.h | 1 +
13
include/hw/pci/msix.h | 1 +
14
include/hw/pci/pci.h | 13 +++
15
include/hw/remote/vfio-user-obj.h | 6 ++
16
hw/pci/msi.c | 49 +++++++--
17
hw/pci/msix.c | 35 ++++++-
18
hw/pci/pci.c | 13 +++
19
hw/remote/machine.c | 16 ++-
20
hw/remote/vfio-user-obj.c | 167 ++++++++++++++++++++++++++++++
21
stubs/vfio-user-obj.c | 6 ++
22
hw/remote/trace-events | 1 +
23
stubs/meson.build | 1 +
24
13 files changed, 298 insertions(+), 12 deletions(-)
25
create mode 100644 include/hw/remote/vfio-user-obj.h
26
create mode 100644 stubs/vfio-user-obj.c
27
28
diff --git a/MAINTAINERS b/MAINTAINERS
29
index XXXXXXX..XXXXXXX 100644
30
--- a/MAINTAINERS
31
+++ b/MAINTAINERS
32
@@ -XXX,XX +XXX,XX @@ F: hw/remote/iohub.c
33
F: include/hw/remote/iohub.h
34
F: subprojects/libvfio-user
35
F: hw/remote/vfio-user-obj.c
36
+F: include/hw/remote/vfio-user-obj.h
37
F: hw/remote/iommu.c
38
F: include/hw/remote/iommu.h
39
40
diff --git a/include/hw/pci/msi.h b/include/hw/pci/msi.h
41
index XXXXXXX..XXXXXXX 100644
42
--- a/include/hw/pci/msi.h
43
+++ b/include/hw/pci/msi.h
44
@@ -XXX,XX +XXX,XX @@ void msi_notify(PCIDevice *dev, unsigned int vector);
45
void msi_send_message(PCIDevice *dev, MSIMessage msg);
46
void msi_write_config(PCIDevice *dev, uint32_t addr, uint32_t val, int len);
47
unsigned int msi_nr_vectors_allocated(const PCIDevice *dev);
48
+void msi_set_mask(PCIDevice *dev, int vector, bool mask, Error **errp);
49
50
static inline bool msi_present(const PCIDevice *dev)
51
{
52
diff --git a/include/hw/pci/msix.h b/include/hw/pci/msix.h
53
index XXXXXXX..XXXXXXX 100644
54
--- a/include/hw/pci/msix.h
55
+++ b/include/hw/pci/msix.h
56
@@ -XXX,XX +XXX,XX @@ void msix_clr_pending(PCIDevice *dev, int vector);
57
int msix_vector_use(PCIDevice *dev, unsigned vector);
58
void msix_vector_unuse(PCIDevice *dev, unsigned vector);
59
void msix_unuse_all_vectors(PCIDevice *dev);
60
+void msix_set_mask(PCIDevice *dev, int vector, bool mask, Error **errp);
61
62
void msix_notify(PCIDevice *dev, unsigned vector);
63
64
diff --git a/include/hw/pci/pci.h b/include/hw/pci/pci.h
65
index XXXXXXX..XXXXXXX 100644
66
--- a/include/hw/pci/pci.h
67
+++ b/include/hw/pci/pci.h
68
@@ -XXX,XX +XXX,XX @@ extern bool pci_available;
69
#define PCI_SLOT(devfn) (((devfn) >> 3) & 0x1f)
70
#define PCI_FUNC(devfn) ((devfn) & 0x07)
71
#define PCI_BUILD_BDF(bus, devfn) ((bus << 8) | (devfn))
72
+#define PCI_BDF_TO_DEVFN(x) ((x) & 0xff)
73
#define PCI_BUS_MAX 256
74
#define PCI_DEVFN_MAX 256
75
#define PCI_SLOT_MAX 32
76
@@ -XXX,XX +XXX,XX @@ typedef void PCIMapIORegionFunc(PCIDevice *pci_dev, int region_num,
77
pcibus_t addr, pcibus_t size, int type);
78
typedef void PCIUnregisterFunc(PCIDevice *pci_dev);
79
80
+typedef void MSITriggerFunc(PCIDevice *dev, MSIMessage msg);
81
+typedef MSIMessage MSIPrepareMessageFunc(PCIDevice *dev, unsigned vector);
82
+typedef MSIMessage MSIxPrepareMessageFunc(PCIDevice *dev, unsigned vector);
83
+
84
typedef struct PCIIORegion {
85
pcibus_t addr; /* current PCI mapping address. -1 means not mapped */
86
#define PCI_BAR_UNMAPPED (~(pcibus_t)0)
87
@@ -XXX,XX +XXX,XX @@ struct PCIDevice {
88
/* Space to store MSIX table & pending bit array */
89
uint8_t *msix_table;
90
uint8_t *msix_pba;
91
+
92
+ /* May be used by INTx or MSI during interrupt notification */
93
+ void *irq_opaque;
94
+
95
+ MSITriggerFunc *msi_trigger;
96
+ MSIPrepareMessageFunc *msi_prepare_message;
97
+ MSIxPrepareMessageFunc *msix_prepare_message;
98
+
99
/* MemoryRegion container for msix exclusive BAR setup */
100
MemoryRegion msix_exclusive_bar;
101
/* Memory Regions for MSIX table and pending bit entries. */
102
diff --git a/include/hw/remote/vfio-user-obj.h b/include/hw/remote/vfio-user-obj.h
103
new file mode 100644
104
index XXXXXXX..XXXXXXX
105
--- /dev/null
106
+++ b/include/hw/remote/vfio-user-obj.h
107
@@ -XXX,XX +XXX,XX @@
108
+#ifndef VFIO_USER_OBJ_H
109
+#define VFIO_USER_OBJ_H
110
+
111
+void vfu_object_set_bus_irq(PCIBus *pci_bus);
112
+
113
+#endif
114
diff --git a/hw/pci/msi.c b/hw/pci/msi.c
115
index XXXXXXX..XXXXXXX 100644
116
--- a/hw/pci/msi.c
117
+++ b/hw/pci/msi.c
118
@@ -XXX,XX +XXX,XX @@ void msi_set_message(PCIDevice *dev, MSIMessage msg)
119
pci_set_word(dev->config + msi_data_off(dev, msi64bit), msg.data);
120
}
121
122
-MSIMessage msi_get_message(PCIDevice *dev, unsigned int vector)
123
+static MSIMessage msi_prepare_message(PCIDevice *dev, unsigned int vector)
124
{
125
uint16_t flags = pci_get_word(dev->config + msi_flags_off(dev));
126
bool msi64bit = flags & PCI_MSI_FLAGS_64BIT;
127
@@ -XXX,XX +XXX,XX @@ MSIMessage msi_get_message(PCIDevice *dev, unsigned int vector)
128
return msg;
129
}
130
131
+MSIMessage msi_get_message(PCIDevice *dev, unsigned int vector)
132
+{
133
+ return dev->msi_prepare_message(dev, vector);
134
+}
135
+
136
bool msi_enabled(const PCIDevice *dev)
137
{
138
return msi_present(dev) &&
139
@@ -XXX,XX +XXX,XX @@ int msi_init(struct PCIDevice *dev, uint8_t offset,
140
0xffffffff >> (PCI_MSI_VECTORS_MAX - nr_vectors));
141
}
142
143
+ dev->msi_prepare_message = msi_prepare_message;
144
+
145
return 0;
146
}
147
148
@@ -XXX,XX +XXX,XX @@ void msi_uninit(struct PCIDevice *dev)
149
cap_size = msi_cap_sizeof(flags);
150
pci_del_capability(dev, PCI_CAP_ID_MSI, cap_size);
151
dev->cap_present &= ~QEMU_PCI_CAP_MSI;
152
+ dev->msi_prepare_message = NULL;
153
154
MSI_DEV_PRINTF(dev, "uninit\n");
155
}
156
@@ -XXX,XX +XXX,XX @@ bool msi_is_masked(const PCIDevice *dev, unsigned int vector)
157
return mask & (1U << vector);
158
}
159
160
+void msi_set_mask(PCIDevice *dev, int vector, bool mask, Error **errp)
161
+{
162
+ ERRP_GUARD();
163
+ uint16_t flags = pci_get_word(dev->config + msi_flags_off(dev));
164
+ bool msi64bit = flags & PCI_MSI_FLAGS_64BIT;
165
+ uint32_t irq_state, vector_mask, pending;
166
+
167
+ if (vector > PCI_MSI_VECTORS_MAX) {
168
+ error_setg(errp, "msi: vector %d not allocated. max vector is %d",
169
+ vector, PCI_MSI_VECTORS_MAX);
170
+ return;
171
+ }
172
+
173
+ vector_mask = (1U << vector);
174
+
175
+ irq_state = pci_get_long(dev->config + msi_mask_off(dev, msi64bit));
176
+
177
+ if (mask) {
178
+ irq_state |= vector_mask;
179
+ } else {
180
+ irq_state &= ~vector_mask;
181
+ }
182
+
183
+ pci_set_long(dev->config + msi_mask_off(dev, msi64bit), irq_state);
184
+
185
+ pending = pci_get_long(dev->config + msi_pending_off(dev, msi64bit));
186
+ if (!mask && (pending & vector_mask)) {
187
+ pending &= ~vector_mask;
188
+ pci_set_long(dev->config + msi_pending_off(dev, msi64bit), pending);
189
+ msi_notify(dev, vector);
190
+ }
191
+}
192
+
193
void msi_notify(PCIDevice *dev, unsigned int vector)
194
{
195
uint16_t flags = pci_get_word(dev->config + msi_flags_off(dev));
196
@@ -XXX,XX +XXX,XX @@ void msi_notify(PCIDevice *dev, unsigned int vector)
197
198
void msi_send_message(PCIDevice *dev, MSIMessage msg)
199
{
200
- MemTxAttrs attrs = {};
201
-
202
- attrs.requester_id = pci_requester_id(dev);
203
- address_space_stl_le(&dev->bus_master_as, msg.address, msg.data,
204
- attrs, NULL);
205
+ dev->msi_trigger(dev, msg);
206
}
207
208
/* Normally called by pci_default_write_config(). */
209
diff --git a/hw/pci/msix.c b/hw/pci/msix.c
210
index XXXXXXX..XXXXXXX 100644
211
--- a/hw/pci/msix.c
212
+++ b/hw/pci/msix.c
213
@@ -XXX,XX +XXX,XX @@
214
#define MSIX_ENABLE_MASK (PCI_MSIX_FLAGS_ENABLE >> 8)
215
#define MSIX_MASKALL_MASK (PCI_MSIX_FLAGS_MASKALL >> 8)
216
217
-MSIMessage msix_get_message(PCIDevice *dev, unsigned vector)
218
+static MSIMessage msix_prepare_message(PCIDevice *dev, unsigned vector)
219
{
220
uint8_t *table_entry = dev->msix_table + vector * PCI_MSIX_ENTRY_SIZE;
221
MSIMessage msg;
222
@@ -XXX,XX +XXX,XX @@ MSIMessage msix_get_message(PCIDevice *dev, unsigned vector)
223
return msg;
224
}
225
226
+MSIMessage msix_get_message(PCIDevice *dev, unsigned vector)
227
+{
228
+ return dev->msix_prepare_message(dev, vector);
229
+}
230
+
231
/*
232
* Special API for POWER to configure the vectors through
233
* a side channel. Should never be used by devices.
234
@@ -XXX,XX +XXX,XX @@ static void msix_handle_mask_update(PCIDevice *dev, int vector, bool was_masked)
235
}
236
}
237
238
+void msix_set_mask(PCIDevice *dev, int vector, bool mask, Error **errp)
239
+{
240
+ ERRP_GUARD();
241
+ unsigned offset;
242
+ bool was_masked;
243
+
244
+ if (vector > dev->msix_entries_nr) {
245
+ error_setg(errp, "msix: vector %d not allocated. max vector is %d",
246
+ vector, dev->msix_entries_nr);
247
+ return;
248
+ }
249
+
250
+ offset = vector * PCI_MSIX_ENTRY_SIZE + PCI_MSIX_ENTRY_VECTOR_CTRL;
251
+
252
+ was_masked = msix_is_masked(dev, vector);
253
+
254
+ if (mask) {
255
+ dev->msix_table[offset] |= PCI_MSIX_ENTRY_CTRL_MASKBIT;
256
+ } else {
257
+ dev->msix_table[offset] &= ~PCI_MSIX_ENTRY_CTRL_MASKBIT;
258
+ }
259
+
260
+ msix_handle_mask_update(dev, vector, was_masked);
261
+}
262
+
263
static bool msix_masked(PCIDevice *dev)
264
{
265
return dev->config[dev->msix_cap + MSIX_CONTROL_OFFSET] & MSIX_MASKALL_MASK;
266
@@ -XXX,XX +XXX,XX @@ int msix_init(struct PCIDevice *dev, unsigned short nentries,
267
"msix-pba", pba_size);
268
memory_region_add_subregion(pba_bar, pba_offset, &dev->msix_pba_mmio);
269
270
+ dev->msix_prepare_message = msix_prepare_message;
271
+
272
return 0;
273
}
274
275
@@ -XXX,XX +XXX,XX @@ void msix_uninit(PCIDevice *dev, MemoryRegion *table_bar, MemoryRegion *pba_bar)
276
g_free(dev->msix_entry_used);
277
dev->msix_entry_used = NULL;
278
dev->cap_present &= ~QEMU_PCI_CAP_MSIX;
279
+ dev->msix_prepare_message = NULL;
280
}
281
282
void msix_uninit_exclusive_bar(PCIDevice *dev)
283
diff --git a/hw/pci/pci.c b/hw/pci/pci.c
284
index XXXXXXX..XXXXXXX 100644
285
--- a/hw/pci/pci.c
286
+++ b/hw/pci/pci.c
287
@@ -XXX,XX +XXX,XX @@ void pci_device_deassert_intx(PCIDevice *dev)
288
}
289
}
290
291
+static void pci_msi_trigger(PCIDevice *dev, MSIMessage msg)
292
+{
293
+ MemTxAttrs attrs = {};
294
+
295
+ attrs.requester_id = pci_requester_id(dev);
296
+ address_space_stl_le(&dev->bus_master_as, msg.address, msg.data,
297
+ attrs, NULL);
298
+}
299
+
300
static void pci_reset_regions(PCIDevice *dev)
301
{
302
int r;
303
@@ -XXX,XX +XXX,XX @@ static void pci_qdev_unrealize(DeviceState *dev)
304
305
pci_device_deassert_intx(pci_dev);
306
do_pci_unregister_device(pci_dev);
307
+
308
+ pci_dev->msi_trigger = NULL;
309
}
310
311
void pci_register_bar(PCIDevice *pci_dev, int region_num,
312
@@ -XXX,XX +XXX,XX @@ static void pci_qdev_realize(DeviceState *qdev, Error **errp)
313
}
314
315
pci_set_power(pci_dev, true);
316
+
317
+ pci_dev->msi_trigger = pci_msi_trigger;
318
}
319
320
PCIDevice *pci_new_multifunction(int devfn, bool multifunction,
321
diff --git a/hw/remote/machine.c b/hw/remote/machine.c
322
index XXXXXXX..XXXXXXX 100644
323
--- a/hw/remote/machine.c
324
+++ b/hw/remote/machine.c
325
@@ -XXX,XX +XXX,XX @@
326
#include "hw/remote/iommu.h"
327
#include "hw/qdev-core.h"
328
#include "hw/remote/iommu.h"
329
+#include "hw/remote/vfio-user-obj.h"
330
+#include "hw/pci/msi.h"
331
332
static void remote_machine_init(MachineState *machine)
333
{
334
@@ -XXX,XX +XXX,XX @@ static void remote_machine_init(MachineState *machine)
335
336
if (s->vfio_user) {
337
remote_iommu_setup(pci_host->bus);
338
+
339
+ msi_nonbroken = true;
340
+
341
+ vfu_object_set_bus_irq(pci_host->bus);
342
+ } else {
343
+ remote_iohub_init(&s->iohub);
344
+
345
+ pci_bus_irqs(pci_host->bus, remote_iohub_set_irq, remote_iohub_map_irq,
346
+ &s->iohub, REMOTE_IOHUB_NB_PIRQS);
347
}
348
349
- remote_iohub_init(&s->iohub);
350
-
351
- pci_bus_irqs(pci_host->bus, remote_iohub_set_irq, remote_iohub_map_irq,
352
- &s->iohub, REMOTE_IOHUB_NB_PIRQS);
353
-
354
qbus_set_hotplug_handler(BUS(pci_host->bus), OBJECT(s));
355
}
356
357
diff --git a/hw/remote/vfio-user-obj.c b/hw/remote/vfio-user-obj.c
358
index XXXXXXX..XXXXXXX 100644
359
--- a/hw/remote/vfio-user-obj.c
360
+++ b/hw/remote/vfio-user-obj.c
361
@@ -XXX,XX +XXX,XX @@
362
#include "hw/pci/pci.h"
363
#include "qemu/timer.h"
364
#include "exec/memory.h"
365
+#include "hw/pci/msi.h"
366
+#include "hw/pci/msix.h"
367
+#include "hw/remote/vfio-user-obj.h"
368
369
#define TYPE_VFU_OBJECT "x-vfio-user-server"
370
OBJECT_DECLARE_TYPE(VfuObject, VfuObjectClass, VFU_OBJECT)
371
@@ -XXX,XX +XXX,XX @@ struct VfuObject {
372
Error *unplug_blocker;
373
374
int vfu_poll_fd;
375
+
376
+ MSITriggerFunc *default_msi_trigger;
377
+ MSIPrepareMessageFunc *default_msi_prepare_message;
378
+ MSIxPrepareMessageFunc *default_msix_prepare_message;
379
};
380
381
static void vfu_object_init_ctx(VfuObject *o, Error **errp);
382
@@ -XXX,XX +XXX,XX @@ static void vfu_object_register_bars(vfu_ctx_t *vfu_ctx, PCIDevice *pdev)
383
}
384
}
385
386
+static int vfu_object_map_irq(PCIDevice *pci_dev, int intx)
387
+{
388
+ int pci_bdf = PCI_BUILD_BDF(pci_bus_num(pci_get_bus(pci_dev)),
389
+ pci_dev->devfn);
390
+
391
+ return pci_bdf;
392
+}
393
+
394
+static void vfu_object_set_irq(void *opaque, int pirq, int level)
395
+{
396
+ PCIBus *pci_bus = opaque;
397
+ PCIDevice *pci_dev = NULL;
398
+ vfu_ctx_t *vfu_ctx = NULL;
399
+ int pci_bus_num, devfn;
400
+
401
+ if (level) {
402
+ pci_bus_num = PCI_BUS_NUM(pirq);
403
+ devfn = PCI_BDF_TO_DEVFN(pirq);
404
+
405
+ /*
406
+ * pci_find_device() performs at O(1) if the device is attached
407
+ * to the root PCI bus. Whereas, if the device is attached to a
408
+ * secondary PCI bus (such as when a root port is involved),
409
+ * finding the parent PCI bus could take O(n)
410
+ */
411
+ pci_dev = pci_find_device(pci_bus, pci_bus_num, devfn);
412
+
413
+ vfu_ctx = pci_dev->irq_opaque;
414
+
415
+ g_assert(vfu_ctx);
416
+
417
+ vfu_irq_trigger(vfu_ctx, 0);
418
+ }
419
+}
420
+
421
+static MSIMessage vfu_object_msi_prepare_msg(PCIDevice *pci_dev,
422
+ unsigned int vector)
423
+{
424
+ MSIMessage msg;
425
+
426
+ msg.address = 0;
427
+ msg.data = vector;
428
+
429
+ return msg;
430
+}
431
+
432
+static void vfu_object_msi_trigger(PCIDevice *pci_dev, MSIMessage msg)
433
+{
434
+ vfu_ctx_t *vfu_ctx = pci_dev->irq_opaque;
435
+
436
+ vfu_irq_trigger(vfu_ctx, msg.data);
437
+}
438
+
439
+static void vfu_object_setup_msi_cbs(VfuObject *o)
440
+{
441
+ o->default_msi_trigger = o->pci_dev->msi_trigger;
442
+ o->default_msi_prepare_message = o->pci_dev->msi_prepare_message;
443
+ o->default_msix_prepare_message = o->pci_dev->msix_prepare_message;
444
+
445
+ o->pci_dev->msi_trigger = vfu_object_msi_trigger;
446
+ o->pci_dev->msi_prepare_message = vfu_object_msi_prepare_msg;
447
+ o->pci_dev->msix_prepare_message = vfu_object_msi_prepare_msg;
448
+}
449
+
450
+static void vfu_object_restore_msi_cbs(VfuObject *o)
451
+{
452
+ o->pci_dev->msi_trigger = o->default_msi_trigger;
453
+ o->pci_dev->msi_prepare_message = o->default_msi_prepare_message;
454
+ o->pci_dev->msix_prepare_message = o->default_msix_prepare_message;
455
+}
456
+
457
+static void vfu_msix_irq_state(vfu_ctx_t *vfu_ctx, uint32_t start,
458
+ uint32_t count, bool mask)
459
+{
460
+ VfuObject *o = vfu_get_private(vfu_ctx);
461
+ Error *err = NULL;
462
+ uint32_t vector;
463
+
464
+ for (vector = start; vector < count; vector++) {
465
+ msix_set_mask(o->pci_dev, vector, mask, &err);
466
+ if (err) {
467
+ VFU_OBJECT_ERROR(o, "vfu: %s: %s", o->device,
468
+ error_get_pretty(err));
469
+ error_free(err);
470
+ err = NULL;
471
+ }
472
+ }
473
+}
474
+
475
+static void vfu_msi_irq_state(vfu_ctx_t *vfu_ctx, uint32_t start,
476
+ uint32_t count, bool mask)
477
+{
478
+ VfuObject *o = vfu_get_private(vfu_ctx);
479
+ Error *err = NULL;
480
+ uint32_t vector;
481
+
482
+ for (vector = start; vector < count; vector++) {
483
+ msi_set_mask(o->pci_dev, vector, mask, &err);
484
+ if (err) {
485
+ VFU_OBJECT_ERROR(o, "vfu: %s: %s", o->device,
486
+ error_get_pretty(err));
487
+ error_free(err);
488
+ err = NULL;
489
+ }
490
+ }
491
+}
492
+
493
+static int vfu_object_setup_irqs(VfuObject *o, PCIDevice *pci_dev)
494
+{
495
+ vfu_ctx_t *vfu_ctx = o->vfu_ctx;
496
+ int ret;
497
+
498
+ ret = vfu_setup_device_nr_irqs(vfu_ctx, VFU_DEV_INTX_IRQ, 1);
499
+ if (ret < 0) {
500
+ return ret;
501
+ }
502
+
503
+ if (msix_nr_vectors_allocated(pci_dev)) {
504
+ ret = vfu_setup_device_nr_irqs(vfu_ctx, VFU_DEV_MSIX_IRQ,
505
+ msix_nr_vectors_allocated(pci_dev));
506
+ vfu_setup_irq_state_callback(vfu_ctx, VFU_DEV_MSIX_IRQ,
507
+ &vfu_msix_irq_state);
508
+ } else if (msi_nr_vectors_allocated(pci_dev)) {
509
+ ret = vfu_setup_device_nr_irqs(vfu_ctx, VFU_DEV_MSI_IRQ,
510
+ msi_nr_vectors_allocated(pci_dev));
511
+ vfu_setup_irq_state_callback(vfu_ctx, VFU_DEV_MSI_IRQ,
512
+ &vfu_msi_irq_state);
513
+ }
514
+
515
+ if (ret < 0) {
516
+ return ret;
517
+ }
518
+
519
+ vfu_object_setup_msi_cbs(o);
520
+
521
+ pci_dev->irq_opaque = vfu_ctx;
522
+
523
+ return 0;
524
+}
525
+
526
+void vfu_object_set_bus_irq(PCIBus *pci_bus)
527
+{
528
+ int bus_num = pci_bus_num(pci_bus);
529
+ int max_bdf = PCI_BUILD_BDF(bus_num, PCI_DEVFN_MAX - 1);
530
+
531
+ pci_bus_irqs(pci_bus, vfu_object_set_irq, vfu_object_map_irq, pci_bus,
532
+ max_bdf);
533
+}
534
+
535
/*
536
* TYPE_VFU_OBJECT depends on the availability of the 'socket' and 'device'
537
* properties. It also depends on devices instantiated in QEMU. These
538
@@ -XXX,XX +XXX,XX @@ static void vfu_object_init_ctx(VfuObject *o, Error **errp)
539
540
vfu_object_register_bars(o->vfu_ctx, o->pci_dev);
541
542
+ ret = vfu_object_setup_irqs(o, o->pci_dev);
543
+ if (ret < 0) {
544
+ error_setg(errp, "vfu: Failed to setup interrupts for %s",
545
+ o->device);
546
+ goto fail;
547
+ }
548
+
549
ret = vfu_realize_ctx(o->vfu_ctx);
550
if (ret < 0) {
551
error_setg(errp, "vfu: Failed to realize device %s- %s",
552
@@ -XXX,XX +XXX,XX @@ fail:
553
o->unplug_blocker = NULL;
554
}
555
if (o->pci_dev) {
556
+ vfu_object_restore_msi_cbs(o);
557
+ o->pci_dev->irq_opaque = NULL;
558
object_unref(OBJECT(o->pci_dev));
559
o->pci_dev = NULL;
560
}
561
@@ -XXX,XX +XXX,XX @@ static void vfu_object_finalize(Object *obj)
562
}
563
564
if (o->pci_dev) {
565
+ vfu_object_restore_msi_cbs(o);
566
+ o->pci_dev->irq_opaque = NULL;
567
object_unref(OBJECT(o->pci_dev));
568
o->pci_dev = NULL;
569
}
570
diff --git a/stubs/vfio-user-obj.c b/stubs/vfio-user-obj.c
571
new file mode 100644
572
index XXXXXXX..XXXXXXX
573
--- /dev/null
574
+++ b/stubs/vfio-user-obj.c
575
@@ -XXX,XX +XXX,XX @@
576
+#include "qemu/osdep.h"
577
+#include "hw/remote/vfio-user-obj.h"
578
+
579
+void vfu_object_set_bus_irq(PCIBus *pci_bus)
580
+{
581
+}
582
diff --git a/hw/remote/trace-events b/hw/remote/trace-events
583
index XXXXXXX..XXXXXXX 100644
584
--- a/hw/remote/trace-events
585
+++ b/hw/remote/trace-events
586
@@ -XXX,XX +XXX,XX @@ vfu_dma_unregister(uint64_t gpa) "vfu: unregistering GPA 0x%"PRIx64""
587
vfu_bar_register(int i, uint64_t addr, uint64_t size) "vfu: BAR %d: addr 0x%"PRIx64" size 0x%"PRIx64""
588
vfu_bar_rw_enter(const char *op, uint64_t addr) "vfu: %s request for BAR address 0x%"PRIx64""
589
vfu_bar_rw_exit(const char *op, uint64_t addr) "vfu: Finished %s of BAR address 0x%"PRIx64""
590
+vfu_interrupt(int pirq) "vfu: sending interrupt to device - PIRQ %d"
591
diff --git a/stubs/meson.build b/stubs/meson.build
592
index XXXXXXX..XXXXXXX 100644
593
--- a/stubs/meson.build
594
+++ b/stubs/meson.build
595
@@ -XXX,XX +XXX,XX @@ if have_system
596
else
597
stub_ss.add(files('qdev.c'))
598
endif
599
+stub_ss.add(when: 'CONFIG_VFIO_USER_SERVER', if_false: files('vfio-user-obj.c'))
600
--
601
2.36.1
diff view generated by jsdifflib
New patch
1
From: Jagannathan Raman <jag.raman@oracle.com>
1
2
3
Adds handler to reset a remote device
4
5
Signed-off-by: Elena Ufimtseva <elena.ufimtseva@oracle.com>
6
Signed-off-by: John G Johnson <john.g.johnson@oracle.com>
7
Signed-off-by: Jagannathan Raman <jag.raman@oracle.com>
8
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
9
Message-id: 112eeadf3bc4c6cdb100bc3f9a6fcfc20b467c1b.1655151679.git.jag.raman@oracle.com
10
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
11
---
12
hw/remote/vfio-user-obj.c | 20 ++++++++++++++++++++
13
1 file changed, 20 insertions(+)
14
15
diff --git a/hw/remote/vfio-user-obj.c b/hw/remote/vfio-user-obj.c
16
index XXXXXXX..XXXXXXX 100644
17
--- a/hw/remote/vfio-user-obj.c
18
+++ b/hw/remote/vfio-user-obj.c
19
@@ -XXX,XX +XXX,XX @@ void vfu_object_set_bus_irq(PCIBus *pci_bus)
20
max_bdf);
21
}
22
23
+static int vfu_object_device_reset(vfu_ctx_t *vfu_ctx, vfu_reset_type_t type)
24
+{
25
+ VfuObject *o = vfu_get_private(vfu_ctx);
26
+
27
+ /* vfu_object_ctx_run() handles lost connection */
28
+ if (type == VFU_RESET_LOST_CONN) {
29
+ return 0;
30
+ }
31
+
32
+ qdev_reset_all(DEVICE(o->pci_dev));
33
+
34
+ return 0;
35
+}
36
+
37
/*
38
* TYPE_VFU_OBJECT depends on the availability of the 'socket' and 'device'
39
* properties. It also depends on devices instantiated in QEMU. These
40
@@ -XXX,XX +XXX,XX @@ static void vfu_object_init_ctx(VfuObject *o, Error **errp)
41
goto fail;
42
}
43
44
+ ret = vfu_setup_device_reset_cb(o->vfu_ctx, &vfu_object_device_reset);
45
+ if (ret < 0) {
46
+ error_setg(errp, "vfu: Failed to setup reset callback");
47
+ goto fail;
48
+ }
49
+
50
ret = vfu_realize_ctx(o->vfu_ctx);
51
if (ret < 0) {
52
error_setg(errp, "vfu: Failed to realize device %s- %s",
53
--
54
2.36.1
diff view generated by jsdifflib
New patch
1
Every laio_io_plug() call has a matching laio_io_unplug() call. There is
2
a plugged counter that tracks the number of levels of plugging and
3
allows for nesting.
1
4
5
The plugged counter must reflect the balance between laio_io_plug() and
6
laio_io_unplug() calls accurately. Otherwise I/O stalls occur since
7
io_submit(2) calls are skipped while plugged.
8
9
Reported-by: Nikolay Tenev <nt@storpool.com>
10
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
11
Reviewed-by: Stefano Garzarella <sgarzare@redhat.com>
12
Message-id: 20220609164712.1539045-2-stefanha@redhat.com
13
Cc: Stefano Garzarella <sgarzare@redhat.com>
14
Fixes: 68d7946648 ("linux-aio: add `dev_max_batch` parameter to laio_io_unplug()")
15
[Stefano Garzarella suggested adding a Fixes tag.
16
--Stefan]
17
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
18
---
19
block/linux-aio.c | 4 +++-
20
1 file changed, 3 insertions(+), 1 deletion(-)
21
22
diff --git a/block/linux-aio.c b/block/linux-aio.c
23
index XXXXXXX..XXXXXXX 100644
24
--- a/block/linux-aio.c
25
+++ b/block/linux-aio.c
26
@@ -XXX,XX +XXX,XX @@ void laio_io_unplug(BlockDriverState *bs, LinuxAioState *s,
27
uint64_t dev_max_batch)
28
{
29
assert(s->io_q.plugged);
30
+ s->io_q.plugged--;
31
+
32
if (s->io_q.in_queue >= laio_max_batch(s, dev_max_batch) ||
33
- (--s->io_q.plugged == 0 &&
34
+ (!s->io_q.plugged &&
35
!s->io_q.blocked && !QSIMPLEQ_EMPTY(&s->io_q.pending))) {
36
ioq_submit(s);
37
}
38
--
39
2.36.1
diff view generated by jsdifflib
New patch
1
It may not be obvious why laio_io_unplug() checks max batch. I discussed
2
this with Stefano and have added a comment summarizing the reason.
1
3
4
Cc: Stefano Garzarella <sgarzare@redhat.com>
5
Cc: Kevin Wolf <kwolf@redhat.com>
6
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
7
Reviewed-by: Stefano Garzarella <sgarzare@redhat.com>
8
Message-id: 20220609164712.1539045-3-stefanha@redhat.com
9
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
10
---
11
block/linux-aio.c | 6 ++++++
12
1 file changed, 6 insertions(+)
13
14
diff --git a/block/linux-aio.c b/block/linux-aio.c
15
index XXXXXXX..XXXXXXX 100644
16
--- a/block/linux-aio.c
17
+++ b/block/linux-aio.c
18
@@ -XXX,XX +XXX,XX @@ void laio_io_unplug(BlockDriverState *bs, LinuxAioState *s,
19
assert(s->io_q.plugged);
20
s->io_q.plugged--;
21
22
+ /*
23
+ * Why max batch checking is performed here:
24
+ * Another BDS may have queued requests with a higher dev_max_batch and
25
+ * therefore in_queue could now exceed our dev_max_batch. Re-check the max
26
+ * batch so we can honor our device's dev_max_batch.
27
+ */
28
if (s->io_q.in_queue >= laio_max_batch(s, dev_max_batch) ||
29
(!s->io_q.plugged &&
30
!s->io_q.blocked && !QSIMPLEQ_EMPTY(&s->io_q.pending))) {
31
--
32
2.36.1
diff view generated by jsdifflib