From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 9301EE95A91 for ; Mon, 9 Oct 2023 13:54:02 +0000 (UTC) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1qpqhT-0002DW-OB; Mon, 09 Oct 2023 09:53:35 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qpqhP-0002D3-VX for qemu-devel@nongnu.org; Mon, 09 Oct 2023 09:53:32 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qpqhN-00031S-AE for qemu-devel@nongnu.org; Mon, 09 Oct 2023 09:53:31 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1696859608; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=KbRHnsGS0MU4y6CetQ6Ns1K2c2JN3RKE4/KDDBT2F2Q=; b=MAFVMesVEoJfqVX5Z7g0GDVAQ5MZMQS/NIsj0oRdcgo/N7t72bj7sTp360TIlbfnAmnHR7 gI2tqNUZg8NYZlYEhkBc8CmL7UQ0/jwJtSdUomvrSOZRE+eko3D5ulUhSuP1FREWriiSE0 l0ny1yl+raG9vAAy7EieX9QkuK9lmIo= Received: from mail-oa1-f69.google.com (mail-oa1-f69.google.com [209.85.160.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-616-rYTikLYKMVqtBvHbJglwKg-1; Mon, 09 Oct 2023 09:53:21 -0400 X-MC-Unique: rYTikLYKMVqtBvHbJglwKg-1 Received: by mail-oa1-f69.google.com with SMTP id 586e51a60fabf-1e1ad195cbbso6719663fac.2 for ; Mon, 09 Oct 2023 06:53:21 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696859601; x=1697464401; h=content-transfer-encoding:in-reply-to:from:references:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=KbRHnsGS0MU4y6CetQ6Ns1K2c2JN3RKE4/KDDBT2F2Q=; b=pFzRJBeJW6ZddkQYCxDG2iYLateASlAKmfCQ33AbcmLWI3gviAmzgLlo/1Pl942QXm J45d/CIsT7PMp1vDX9SDC6VtPW14n1kTDetZDodZ0lMGbCWpGAuDi1dXdoLHtGzbnIor 23Z9OrZDgRJEdLB5eh/YHVJLKXpxYFjdxaZJ72+xPzkESSkxNkKZ1klRZn77W7cFqsU7 aqoRcOvhj3iLiU5NHErHHHGXEQYjGLAtjbelXpIHYMUx1mUtyBotKb+hyWhvu0wD0GlY 1bxwl/F163Dxg56mV9Wz99Qf01v41Tbj1LGwg7W5YxvAjTRp23EAskalOBrTvmkddQAe /17Q== X-Gm-Message-State: AOJu0YwZCJy2cH2cJ88iRClCjtLrQPa8Bu6jRlBSGGuMR7b4J5A/yqdh WGKSDhMHVbVvO1zuQ+FUhSQWl/LrxIAaiIKfil5IVvI+0A0ryow+bPtMbzJWd6NLWanuTvO87Pc xmh/+2u/UQ81FSM0= X-Received: by 2002:a05:6870:d202:b0:1bf:7b3:5116 with SMTP id g2-20020a056870d20200b001bf07b35116mr18090589oac.47.1696859600927; Mon, 09 Oct 2023 06:53:20 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGC/hwFxurcrRDYkEaZ2MRU7R5YyjVN5lzVbAF+zN5zHp9mKarTpGIrgm5rkcdudVUtbCuN0g== X-Received: by 2002:a05:6870:d202:b0:1bf:7b3:5116 with SMTP id g2-20020a056870d20200b001bf07b35116mr18090559oac.47.1696859600598; Mon, 09 Oct 2023 06:53:20 -0700 (PDT) Received: from ?IPV6:2a01:e0a:280:24f0:9db0:474c:ff43:9f5c? ([2a01:e0a:280:24f0:9db0:474c:ff43:9f5c]) by smtp.gmail.com with ESMTPSA id a12-20020a0cb34c000000b00668bb8be252sm3850828qvf.60.2023.10.09.06.53.18 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 09 Oct 2023 06:53:20 -0700 (PDT) Message-ID: Date: Mon, 9 Oct 2023 15:53:17 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.15.1 Subject: Re: [PATCH v5 00/15] Prerequisite changes for IOMMUFD support Content-Language: en-US To: eric.auger@redhat.com, eric.auger.pro@gmail.com, qemu-devel@nongnu.org, zhenzhong.duan@intel.com, alex.williamson@redhat.com, jgg@nvidia.com, nicolinc@nvidia.com, joao.m.martins@oracle.com, peterx@redhat.com, kevin.tian@intel.com, yi.l.liu@intel.com, yi.y.sun@intel.com, chao.p.peng@intel.com, mjrosato@linux.ibm.com, aik@ozlabs.ru References: <20231009091035.433329-1-eric.auger@redhat.com> <36abdd20-bb57-309a-d0b9-74f969455d13@redhat.com> From: =?UTF-8?Q?C=c3=a9dric_Le_Goater?= In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Received-SPF: pass client-ip=170.10.133.124; envelope-from=clg@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -53 X-Spam_score: -5.4 X-Spam_bar: ----- X-Spam_report: (-5.4 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-3.339, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org On 10/9/23 15:38, Eric Auger wrote: > > > On 10/9/23 14:58, Cédric Le Goater wrote: >> On 10/9/23 11:09, Eric Auger wrote: >>> Hi All, >>> >>> This is the v5 respin of the IOMMUFD prerequisite series. >>> This applies on top of vfio-next: >>> https://github.com/legoater/qemu/, branch vfio-next. >>> >>> Per Cédric's suggestion, the IOMMUFD patchset v1[1] is now split >>> into two series, this prerequisite series and the new IOMMUFD backend >>> introduction support series. Hopefully this will ease the review. >>>    The main purpose of this series is to make "common.c" group agnostic: >>> all group related code are moved into container.c. Then we are prepared >>> for next series, abstract base container, adding new backend, etc. >>> >>> This series can be found at >>> https://github.com/eauger/qemu/tree/prereq_v5 >>> previous: https://github.com/eauger/qemu/tree/prereq_v4 >>> >>> Test done: >>> - PCI device were tested >>> - device hotplug test >>> - with or without vIOMMU >>> - VFIO migration with a E800 net card(no dirty sync support) passthrough >>> - platform and ccw were only compile-tested due to environment limit >>> >>> Zhenzhong, Yi, Eric >>> >>> [1] >>> https://lore.kernel.org/all/20230830103754.36461-1-zhenzhong.duan@intel.com/t/#u >> >> Applied to vfio-next in replacement of v4. > > thank you and sorry for the setback np. This is to be expected. The scope is quite large and we should try to secure the prerequisite changes before introducing the new IOMMUFD backend. Let's give vfio-next good testing this week. Thanks, C. > > Eric >> >> Thanks >> >> C. >> >> >>> >>> Changelog: >>> >>> v5: >>> - ap: fix missing return >>> - ccw: remove vbasedev->sysfsdev g_strdup_printf(), remove name local >>> var >>> - container.c: restored !vbasedev->container check in >>> vfio_detach_device() >>> - pci.c: removed vbasedev->name deallocation in error path as this is >>>    handled in instance_finalize function >>> >>> v4: >>> - include qemu/error-report.h in helpers.c >>> - in ap.c, fix the wrongly added >>>    vfio_detach_device(vbasedev) and g_free(vbasedev->name); >>>    also added error_prepend >>> - simplified vbasedev setting in ccw.c >>> - vfio_detach_device: dropped check on >>>    !vbasedev->container >>> - container.c: restore dropped comment >>> >>> v3: >>> - rebased on vfio-next as suggested by Cedric >>> - added vfio/common: Propagate KVM_SET_DEVICE_ATTR error if any >>> - collected Cedric's R-b >>> - Fix some error paths in vfio/cpi which now properly detach the device >>>    and also free the vbasedev->name >>> - Fix vfio/ccw migration (hopefully) [Matthew inputs] >>> - Split [PATCH v2 11/12] vfio/common: Introduce two kinds of VFIO >>> device lists >>>    into 3 patches >>> >>> v2: >>> - Refine patch description per Eric >>> - return errno and errp in vfio_kvm_device_[add/del]_fd per Eric >>> - make memory listener register/deregister in seperate patch per Eric >>> - Include the .h file first per Cédric >>> - Add trace event in vfio_attach_device per Cédric >>> - drop the change to vfio_viommu_preset by refactor per Cédric >>> - Introduce global VFIO device list and per container list per Alex >>> >>> Note changelog below are from full IOMMUFD series: >>> >>> v1: >>> - Alloc hwpt instead of using auto hwpt >>> - elaborate iommufd code per Nicolin >>> - consolidate two patches and drop as.c >>> - typo error fix and function rename >>> >>> rfcv4: >>> - rebase on top of v8.0.3 >>> - Add one patch from Yi which is about vfio device add in kvm >>> - Remove IOAS_COPY optimization and focus on functions in this patchset >>> - Fix wrong name issue reported and fix suggested by Matthew >>> - Fix compilation issue reported and fix sugggsted by Nicolin >>> - Use query_dirty_bitmap callback to replace get_dirty_bitmap for better >>> granularity >>> - Add dev_iter_next() callback to avoid adding so many callback >>>    at container scope, add VFIODevice.hwpt to support that >>> - Restore all functions back to common from container whenever possible, >>>    mainly migration and reset related functions >>> - Add --enable/disable-iommufd config option, enabled by default in >>> linux >>> - Remove VFIODevice.hwpt_next as it's redundant with VFIODevice.next >>> - Adapt new VFIO_DEVICE_PCI_HOT_RESET uAPI for IOMMUFD backed device >>> - vfio_kvm_device_add/del_group call vfio_kvm_device_add/del_fd to >>> remove >>> redundant code >>> - Add FD passing support for vfio device backed by IOMMUFD >>> - Fix hot unplug resource leak issue in vfio_legacy_detach_device() >>> - Fix FD leak in vfio_get_devicefd() >>> >>> rfcv3: >>> - rebase on top of v7.2.0 >>> - Fix the compilation with CONFIG_IOMMUFD unset by using true classes >>> for >>>    VFIO backends >>> - Fix use after free in error path, reported by Alister >>> - Split common.c in several steps to ease the review >>> >>> rfcv2: >>> - remove the first three patches of rfcv1 >>> - add open cdev helper suggested by Jason >>> - remove the QOMification of the VFIOContainer and simply use >>> standard ops >>> (David) >>> - add "-object iommufd" suggested by Alex >>> >>> >>> Eric Auger (7): >>>    scripts/update-linux-headers: Add iommufd.h >>>    vfio/common: Propagate KVM_SET_DEVICE_ATTR error if any >>>    vfio/common: Introduce vfio_container_add|del_section_window() >>>    vfio/pci: Introduce vfio_[attach/detach]_device >>>    vfio/platform: Use vfio_[attach/detach]_device >>>    vfio/ap: Use vfio_[attach/detach]_device >>>    vfio/ccw: Use vfio_[attach/detach]_device >>> >>> Yi Liu (2): >>>    vfio/common: Move IOMMU agnostic helpers to a separate file >>>    vfio/common: Move legacy VFIO backend code into separate container.c >>> >>> Zhenzhong Duan (6): >>>    linux-headers: Add iommufd.h >>>    vfio/common: Extract out vfio_kvm_device_[add/del]_fd >>>    vfio/common: Move VFIO reset handler registration to a group agnostic >>>      function >>>    vfio/common: Introduce a per container device list >>>    vfio/common: Store the parent container in VFIODevice >>>    vfio/common: Introduce a global VFIODevice list >>> >>>   include/hw/vfio/vfio-common.h   |   60 +- >>>   linux-headers/linux/iommufd.h   |  444 ++++++++ >>>   hw/vfio/ap.c                    |   67 +- >>>   hw/vfio/ccw.c                   |  117 +- >>>   hw/vfio/common.c                | 1851 ++----------------------------- >>>   hw/vfio/container.c             | 1161 +++++++++++++++++++ >>>   hw/vfio/helpers.c               |  612 ++++++++++ >>>   hw/vfio/pci.c                   |   66 +- >>>   hw/vfio/platform.c              |   43 +- >>>   hw/vfio/meson.build             |    2 + >>>   hw/vfio/trace-events            |    4 +- >>>   scripts/update-linux-headers.sh |    3 +- >>>   12 files changed, 2456 insertions(+), 1974 deletions(-) >>>   create mode 100644 linux-headers/linux/iommufd.h >>>   create mode 100644 hw/vfio/container.c >>>   create mode 100644 hw/vfio/helpers.c >>> >> >