From: "Cédric Le Goater" <clg@redhat.com>
To: "Duan, Zhenzhong" <zhenzhong.duan@intel.com>,
"qemu-devel@nongnu.org" <qemu-devel@nongnu.org>
Cc: "alex.williamson@redhat.com" <alex.williamson@redhat.com>,
"jgg@nvidia.com" <jgg@nvidia.com>,
"nicolinc@nvidia.com" <nicolinc@nvidia.com>,
"Martins, Joao" <joao.m.martins@oracle.com>,
"eric.auger@redhat.com" <eric.auger@redhat.com>,
"peterx@redhat.com" <peterx@redhat.com>,
"jasowang@redhat.com" <jasowang@redhat.com>,
"Tian, Kevin" <kevin.tian@intel.com>,
"Liu, Yi L" <yi.l.liu@intel.com>,
"Sun, Yi Y" <yi.y.sun@intel.com>,
"Peng, Chao P" <chao.p.peng@intel.com>
Subject: Re: [PATCH v1 04/22] vfio/common: Introduce vfio_container_add|del_section_window()
Date: Thu, 21 Sep 2023 12:55:55 +0200 [thread overview]
Message-ID: <c46f7736-9073-b6eb-e52d-e4988423f5d0@redhat.com> (raw)
In-Reply-To: <SJ0PR11MB6744CFE4E7D6AB400FD8BE6D92F8A@SJ0PR11MB6744.namprd11.prod.outlook.com>
On 9/21/23 12:14, Duan, Zhenzhong wrote:
> Hi Cédric,
>
>> -----Original Message-----
>> From: Cédric Le Goater <clg@redhat.com>
>> Sent: Thursday, September 21, 2023 4:29 PM
>> Subject: Re: [PATCH v1 04/22] vfio/common: Introduce
>> vfio_container_add|del_section_window()
>>
>> Hello Zhenzhong,
>>
>> On 8/30/23 12:37, Zhenzhong Duan wrote:
>>> From: Eric Auger <eric.auger@redhat.com>
>>>
>>> Introduce helper functions that isolate the code used for
>>> VFIO_SPAPR_TCE_v2_IOMMU. This code reliance is IOMMU backend
>>> specific whereas the rest of the code in the callers, ie.
>>> vfio_listener_region_add|del is not.
>>>
>>> Signed-off-by: Eric Auger <eric.auger@redhat.com>
>>> Signed-off-by: Yi Liu <yi.l.liu@intel.com>
>>> Signed-off-by: Zhenzhong Duan <zhenzhong.duan@intel.com>
>>> ---
>>> hw/vfio/common.c | 156 +++++++++++++++++++++++++++--------------------
>>> 1 file changed, 89 insertions(+), 67 deletions(-)
>>>
>>> diff --git a/hw/vfio/common.c b/hw/vfio/common.c
>>> index 9ca695837f..67150e4575 100644
>>> --- a/hw/vfio/common.c
>>> +++ b/hw/vfio/common.c
>>> @@ -796,6 +796,92 @@ static bool
>> vfio_get_section_iova_range(VFIOContainer *container,
>>> return true;
>>> }
>>>
>>> +static int vfio_container_add_section_window(VFIOContainer *container,
>>> + MemoryRegionSection *section,
>>> + Error **errp)
>>> +{
>>> + VFIOHostDMAWindow *hostwin;
>>> + hwaddr pgsize = 0;
>>> + int ret;
>>> +
>>> + if (container->iommu_type != VFIO_SPAPR_TCE_v2_IOMMU) {
>>> + return 0;
>>> + }
>>
>> This test makes me think that we should register a specific backend
>> for the pseries machines, implementing the add/del_window handler,
>> since others do not need it. Correct ?
>
> Yes, introducing a specific backend could help removing above check.
> But each backend has a VFIOIOMMUBackendOps, we need same check
> as above to select Ops.
>
>>
>> It would avoid this ugly test. Let's keep that in mind when the
>> backends are introduced.
>>
>>> +
>>> + /* For now intersections are not allowed, we may relax this later */
>>> + QLIST_FOREACH(hostwin, &container->hostwin_list, hostwin_next) {
>>> + if (ranges_overlap(hostwin->min_iova,
>>> + hostwin->max_iova - hostwin->min_iova + 1,
>>> + section->offset_within_address_space,
>>> + int128_get64(section->size))) {
>>> + error_setg(errp,
>>> + "region [0x%"PRIx64",0x%"PRIx64"] overlaps with existing"
>>> + "host DMA window [0x%"PRIx64",0x%"PRIx64"]",
>>> + section->offset_within_address_space,
>>> + section->offset_within_address_space +
>>> + int128_get64(section->size) - 1,
>>> + hostwin->min_iova, hostwin->max_iova);
>>> + return -EINVAL;
>>> + }
>>> + }
>>> +
>>> + ret = vfio_spapr_create_window(container, section, &pgsize);
>>> + if (ret) {
>>> + error_setg_errno(errp, -ret, "Failed to create SPAPR window");
>>> + return ret;
>>> + }
>>> +
>>> + vfio_host_win_add(container, section->offset_within_address_space,
>>> + section->offset_within_address_space +
>>> + int128_get64(section->size) - 1, pgsize);
>>> +#ifdef CONFIG_KVM
>>
>> the ifdef test doesn't seem useful because the compiler should compile
>> out the section below since, in that case, kvm_enabled() is defined as :
>>
>> #define kvm_enabled() (0)
>
> Looks so, I'll remove it in v2.
>
>>
>>> + if (kvm_enabled()) {
>>> + VFIOGroup *group;
>>> + IOMMUMemoryRegion *iommu_mr =
>> IOMMU_MEMORY_REGION(section->mr);
>>> + struct kvm_vfio_spapr_tce param;
>>> + struct kvm_device_attr attr = {
>>> + .group = KVM_DEV_VFIO_GROUP,
>>> + .attr = KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE,
>>> + .addr = (uint64_t)(unsigned long)¶m,
>>> + };
>>> +
>>> + if (!memory_region_iommu_get_attr(iommu_mr,
>> IOMMU_ATTR_SPAPR_TCE_FD,
>>> + ¶m.tablefd)) {
>>> + QLIST_FOREACH(group, &container->group_list, container_next) {
>>> + param.groupfd = group->fd;
>>> + if (ioctl(vfio_kvm_device_fd, KVM_SET_DEVICE_ATTR, &attr)) {
>>> + error_report("vfio: failed to setup fd %d "
>>> + "for a group with fd %d: %s",
>>> + param.tablefd, param.groupfd,
>>> + strerror(errno));
>>> + return 0;
>>
>> hmm, the code bails out directly without undoing previous actions. we should
>> return some error at least.
>
> I think Eric doesn't intend any functional change in this patch, just refactor these
> code into two wrapper functions. In fact the original code just return void,
> if ioctl() fails. Not clear if that's intentional or a bug.
>
>>
>>> + }
>>> + trace_vfio_spapr_group_attach(param.groupfd, param.tablefd);
>>> + }
>>> + }
>>> + }
>>> +#endif
>>> + return 0;
>>> +}
>>> +
>>> +static void vfio_container_del_section_window(VFIOContainer *container,
>>> + MemoryRegionSection *section)
>>> +{
>>> + if (container->iommu_type != VFIO_SPAPR_TCE_v2_IOMMU) {
>>> + return;
>>> + }
>>> +
>>> + vfio_spapr_remove_window(container,
>>> + section->offset_within_address_space);
>>> + if (vfio_host_win_del(container,
>>> + section->offset_within_address_space,
>>> + section->offset_within_address_space +
>>> + int128_get64(section->size) - 1) < 0) {
>>> + hw_error("%s: Cannot delete missing window at %"HWADDR_PRIx,
>>> + __func__, section->offset_within_address_space);
>>> + }
>>> +}
>>> +
>>> static void vfio_listener_region_add(MemoryListener *listener,
>>> MemoryRegionSection *section)
>>> {
>>> @@ -822,62 +908,8 @@ static void vfio_listener_region_add(MemoryListener
>> *listener,
>>> return;
>>> }
>>>
>>> - if (container->iommu_type == VFIO_SPAPR_TCE_v2_IOMMU) {
>>> - hwaddr pgsize = 0;
>>> -
>>> - /* For now intersections are not allowed, we may relax this later */
>>> - QLIST_FOREACH(hostwin, &container->hostwin_list, hostwin_next) {
>>> - if (ranges_overlap(hostwin->min_iova,
>>> - hostwin->max_iova - hostwin->min_iova + 1,
>>> - section->offset_within_address_space,
>>> - int128_get64(section->size))) {
>>> - error_setg(&err,
>>> - "region [0x%"PRIx64",0x%"PRIx64"] overlaps with existing"
>>> - "host DMA window [0x%"PRIx64",0x%"PRIx64"]",
>>> - section->offset_within_address_space,
>>> - section->offset_within_address_space +
>>> - int128_get64(section->size) - 1,
>>> - hostwin->min_iova, hostwin->max_iova);
>>> - goto fail;
>>> - }
>>> - }
>>> -
>>> - ret = vfio_spapr_create_window(container, section, &pgsize);
>>> - if (ret) {
>>> - error_setg_errno(&err, -ret, "Failed to create SPAPR window");
>>> - goto fail;
>>> - }
>>> -
>>> - vfio_host_win_add(container, section->offset_within_address_space,
>>> - section->offset_within_address_space +
>>> - int128_get64(section->size) - 1, pgsize);
>>> -#ifdef CONFIG_KVM
>>> - if (kvm_enabled()) {
>>> - VFIOGroup *group;
>>> - IOMMUMemoryRegion *iommu_mr =
>> IOMMU_MEMORY_REGION(section->mr);
>>> - struct kvm_vfio_spapr_tce param;
>>> - struct kvm_device_attr attr = {
>>> - .group = KVM_DEV_VFIO_GROUP,
>>> - .attr = KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE,
>>> - .addr = (uint64_t)(unsigned long)¶m,
>>> - };
>>> -
>>> - if (!memory_region_iommu_get_attr(iommu_mr,
>> IOMMU_ATTR_SPAPR_TCE_FD,
>>> - ¶m.tablefd)) {
>>> - QLIST_FOREACH(group, &container->group_list, container_next) {
>>> - param.groupfd = group->fd;
>>> - if (ioctl(vfio_kvm_device_fd, KVM_SET_DEVICE_ATTR, &attr)) {
>>> - error_report("vfio: failed to setup fd %d "
>>> - "for a group with fd %d: %s",
>>> - param.tablefd, param.groupfd,
>>> - strerror(errno));
>>> - return;
>>> - }
>>> - trace_vfio_spapr_group_attach(param.groupfd, param.tablefd);
>>> - }
>>> - }
>>> - }
>>> -#endif
>>> + if (vfio_container_add_section_window(container, section, &err)) {
>>> + goto fail;
>>
>> That's not exactly the same as the return above when the ioctl call
>> fails. there doesn't seem to be much consequences though. Let's keep
>> it that way.
> OK.
>
>>
>>> }
>>>
>>> hostwin = vfio_find_hostwin(container, iova, end);
>>> @@ -1094,17 +1126,7 @@ static void
>> vfio_listener_region_del(MemoryListener *listener,
>>>
>>> memory_region_unref(section->mr);
>>>
>>> - if (container->iommu_type == VFIO_SPAPR_TCE_v2_IOMMU) {
>>> - vfio_spapr_remove_window(container,
>>> - section->offset_within_address_space);
>>> - if (vfio_host_win_del(container,
>>> - section->offset_within_address_space,
>>> - section->offset_within_address_space +
>>> - int128_get64(section->size) - 1) < 0) {
>>> - hw_error("%s: Cannot delete missing window at %"HWADDR_PRIx,
>>> - __func__, section->offset_within_address_space);
>>> - }
>>> - }
>>> + vfio_container_del_section_window(container, section);
>>> }
>>>
>>> static int vfio_set_dirty_page_tracking(VFIOContainer *container, bool start)
>>
>> PPC is in the way. May be we could move these two routines in pseries to
>> help a little. I will look into it.
> Do you mean PPC cleanup?
I will see if we can move out of VFIO the implementation of the spapr routines.
Don't wait for me. It can be addressed in parallel.
Thanks,
C.
>
> Thanks
> Zhenzhong
>
next prev parent reply other threads:[~2023-09-21 13:10 UTC|newest]
Thread overview: 109+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-08-30 10:37 [PATCH v1 00/22] vfio: Adopt iommufd Zhenzhong Duan
2023-08-30 10:37 ` [PATCH v1 01/22] scripts/update-linux-headers: Add iommufd.h Zhenzhong Duan
2023-08-30 10:37 ` [PATCH v1 02/22] Update linux-header to support iommufd cdev and hwpt alloc Zhenzhong Duan
2023-09-14 14:46 ` Eric Auger
2023-09-15 3:02 ` Duan, Zhenzhong
2023-09-20 11:04 ` Eric Auger
2023-09-20 11:15 ` Duan, Zhenzhong
2023-08-30 10:37 ` [PATCH v1 03/22] vfio/common: Move IOMMU agnostic helpers to a separate file Zhenzhong Duan
2023-08-30 10:37 ` [PATCH v1 04/22] vfio/common: Introduce vfio_container_add|del_section_window() Zhenzhong Duan
2023-09-20 11:23 ` Eric Auger
2023-09-20 12:18 ` Duan, Zhenzhong
2023-09-21 8:28 ` Cédric Le Goater
2023-09-21 10:14 ` Duan, Zhenzhong
2023-09-21 10:55 ` Cédric Le Goater [this message]
2023-09-27 2:08 ` Duan, Zhenzhong
2023-09-27 6:50 ` Cédric Le Goater
2023-08-30 10:37 ` [PATCH v1 05/22] vfio/common: Extract out vfio_kvm_device_[add/del]_fd Zhenzhong Duan
2023-09-20 11:49 ` Eric Auger
2023-09-21 2:04 ` Duan, Zhenzhong
2023-09-21 8:42 ` Cédric Le Goater
2023-09-21 10:22 ` Duan, Zhenzhong
2023-09-21 10:53 ` Cédric Le Goater
2023-09-20 21:39 ` Alex Williamson
2023-09-21 6:03 ` Duan, Zhenzhong
2023-08-30 10:37 ` [PATCH v1 06/22] vfio/common: Add a vfio device iterator Zhenzhong Duan
2023-09-20 12:25 ` Eric Auger
2023-09-21 2:27 ` Duan, Zhenzhong
2023-09-20 22:16 ` Alex Williamson
2023-09-21 2:16 ` Duan, Zhenzhong
2023-08-30 10:37 ` [PATCH v1 07/22] vfio/common: Refactor vfio_viommu_preset() to be group agnostic Zhenzhong Duan
2023-09-20 13:00 ` Eric Auger
2023-09-21 2:52 ` Duan, Zhenzhong
2023-09-20 22:51 ` Alex Williamson
2023-09-21 6:13 ` Duan, Zhenzhong
2023-08-30 10:37 ` [PATCH v1 08/22] vfio/common: Move legacy VFIO backend code into separate container.c Zhenzhong Duan
2023-09-20 13:12 ` Eric Auger
2023-09-21 3:02 ` Duan, Zhenzhong
2023-08-30 10:37 ` [PATCH v1 09/22] vfio/container: Introduce vfio_[attach/detach]_device Zhenzhong Duan
2023-09-20 13:33 ` Eric Auger
2023-09-21 3:08 ` Duan, Zhenzhong
2023-09-21 9:44 ` Cédric Le Goater
2023-09-21 10:26 ` Duan, Zhenzhong
2023-08-30 10:37 ` [PATCH v1 10/22] vfio/platform: Use vfio_[attach/detach]_device Zhenzhong Duan
2023-09-21 12:17 ` Cédric Le Goater
2023-08-30 10:37 ` [PATCH v1 11/22] vfio/ap: " Zhenzhong Duan
2023-08-30 10:37 ` [PATCH v1 12/22] vfio/ccw: " Zhenzhong Duan
2023-09-21 12:19 ` Cédric Le Goater
2023-09-21 13:00 ` Duan, Zhenzhong
2023-09-21 13:24 ` Cédric Le Goater
2023-08-30 10:37 ` [PATCH v1 13/22] vfio: Add base container Zhenzhong Duan
2023-09-19 17:23 ` Cédric Le Goater
2023-09-20 8:48 ` Duan, Zhenzhong
2023-09-20 12:57 ` Cédric Le Goater
2023-09-20 13:58 ` Eric Auger
2023-09-21 2:51 ` Duan, Zhenzhong
2023-09-20 13:53 ` Eric Auger
2023-09-21 3:12 ` Duan, Zhenzhong
2023-09-20 17:31 ` Eric Auger
2023-09-21 3:35 ` Duan, Zhenzhong
2023-09-21 6:28 ` Eric Auger
2023-09-21 17:20 ` Eric Auger
2023-09-22 2:52 ` Duan, Zhenzhong
2023-08-30 10:37 ` [PATCH v1 14/22] vfio/common: Simplify vfio_viommu_preset() Zhenzhong Duan
2023-09-19 16:01 ` Cédric Le Goater
2023-09-20 2:59 ` Duan, Zhenzhong
2023-08-30 10:37 ` [PATCH v1 15/22] Add iommufd configure option Zhenzhong Duan
2023-09-19 17:07 ` Cédric Le Goater
2023-09-20 3:42 ` Duan, Zhenzhong
2023-09-20 12:19 ` Cédric Le Goater
2023-09-20 12:51 ` Jason Gunthorpe
2023-09-20 13:01 ` Daniel P. Berrangé
2023-09-20 13:07 ` Jason Gunthorpe
2023-09-20 13:02 ` Cédric Le Goater
2023-09-20 17:37 ` Eric Auger
2023-09-20 17:49 ` Jason Gunthorpe
2023-09-20 18:17 ` Alex Williamson
2023-09-20 18:19 ` Jason Gunthorpe
2023-09-21 3:43 ` Duan, Zhenzhong
2023-09-26 6:05 ` Tian, Kevin
2023-09-21 4:00 ` Duan, Zhenzhong
2023-09-21 2:11 ` Duan, Zhenzhong
2023-09-20 18:01 ` Alex Williamson
2023-09-20 18:12 ` Jason Gunthorpe
2023-09-20 20:29 ` Alex Williamson
2023-09-20 18:15 ` Daniel P. Berrangé
2023-08-30 10:37 ` [PATCH v1 16/22] backends/iommufd: Introduce the iommufd object Zhenzhong Duan
2023-09-22 7:15 ` Cédric Le Goater
2023-09-22 8:39 ` Duan, Zhenzhong
2023-08-30 10:37 ` [PATCH v1 17/22] util/char_dev: Add open_cdev() Zhenzhong Duan
2023-09-20 12:39 ` Daniel P. Berrangé
2023-09-20 12:53 ` Jason Gunthorpe
2023-09-20 12:56 ` Daniel P. Berrangé
2023-09-21 2:37 ` Duan, Zhenzhong
2023-08-30 10:37 ` [PATCH v1 18/22] vfio/iommufd: Implement the iommufd backend Zhenzhong Duan
2023-08-30 10:37 ` [PATCH v1 19/22] vfio/iommufd: Add vfio device iterator callback for iommufd Zhenzhong Duan
2023-08-30 10:37 ` [PATCH v1 20/22] vfio/pci: Adapt vfio pci hot reset support with iommufd BE Zhenzhong Duan
2023-08-30 10:37 ` [PATCH v1 21/22] vfio/pci: Allow the selection of a given iommu backend Zhenzhong Duan
2023-09-06 18:10 ` Jason Gunthorpe
2023-09-06 19:09 ` Alex Williamson
2023-09-07 1:10 ` Jason Gunthorpe
2023-09-07 2:27 ` Duan, Zhenzhong
2023-08-30 10:37 ` [PATCH v1 22/22] vfio/pci: Make vfio cdev pre-openable by passing a file handle Zhenzhong Duan
2023-09-14 9:04 ` [PATCH v1 00/22] vfio: Adopt iommufd Eric Auger
2023-09-14 9:27 ` Duan, Zhenzhong
2023-09-15 12:42 ` Cédric Le Goater
2023-09-15 13:14 ` Duan, Zhenzhong
2023-09-18 11:51 ` Jason Gunthorpe
2023-09-18 12:23 ` Cédric Le Goater
2023-09-18 17:56 ` Jason Gunthorpe
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=c46f7736-9073-b6eb-e52d-e4988423f5d0@redhat.com \
--to=clg@redhat.com \
--cc=alex.williamson@redhat.com \
--cc=chao.p.peng@intel.com \
--cc=eric.auger@redhat.com \
--cc=jasowang@redhat.com \
--cc=jgg@nvidia.com \
--cc=joao.m.martins@oracle.com \
--cc=kevin.tian@intel.com \
--cc=nicolinc@nvidia.com \
--cc=peterx@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=yi.l.liu@intel.com \
--cc=yi.y.sun@intel.com \
--cc=zhenzhong.duan@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).