From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id BDF3DC4167B for ; Mon, 6 Nov 2023 16:37:30 +0000 (UTC) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1r02bC-0001q4-J5; Mon, 06 Nov 2023 11:37:14 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1r02bA-0001oK-HO for qemu-devel@nongnu.org; Mon, 06 Nov 2023 11:37:12 -0500 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1r02b6-0008Rb-On for qemu-devel@nongnu.org; Mon, 06 Nov 2023 11:37:12 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1699288628; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=uvIuv+8i97LwvKnG3/LbXYt9GD9Iqp3S+NYV5jYgFQ0=; b=I4FA5mVxxMotrlL4TNyX5uX5SjBOifB08izMrQ9qdM7a1RwUY+PpjlpyIzcxJfKGkVUxIf kxmvqUoi/gO/TtKwsDVTiFbt4+aliD1WmktfIeN1s7EF9v0tq4NDF1yKDfc4SdEYOiDOB8 xhAP0ZByJtLtqkfgsce9Q4ywPB1fsRQ= Received: from mail-oi1-f199.google.com (mail-oi1-f199.google.com [209.85.167.199]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-422-gtGhOfWKPYmxHJJjx1YCqQ-1; Mon, 06 Nov 2023 11:37:06 -0500 X-MC-Unique: gtGhOfWKPYmxHJJjx1YCqQ-1 Received: by mail-oi1-f199.google.com with SMTP id 5614622812f47-3b2ef9a0756so6946258b6e.2 for ; Mon, 06 Nov 2023 08:37:06 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1699288625; x=1699893425; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=uvIuv+8i97LwvKnG3/LbXYt9GD9Iqp3S+NYV5jYgFQ0=; b=KR/S0a6Xh32XyJXaSVG4HZd4rRb2fCMmXaCo+I7U3CzrGK4PRDgEAvgUivEpFCq8Rc 6YYnMY2hhyanf6iaEvf0qSgp77b5K7HZrL2FkpoBtcIoEIjiZr8ugkhmqoqf0NxdozQz 8MOUTiyRvQcNgMC4+uA/oKSbcq8U5yhRoT0FsqZfsJfju0pXz1MdSw70RjTKVFm7mDXL TlSICWVgbvprNBrWYs1mNAps8OSl94nfG6iHUDSaIOT7duu9ft6d4P3Zap7KyW1HDEdR CXIUzYg07uAzcYpq4c2mUAOjqX+FOCEbFyu/rEj91n4WG+u++3FCTAnYmdNep11MDeBi EzmQ== X-Gm-Message-State: AOJu0YzOHKdXkjAlbsMowzvetB+AuyJK0Zh57RWl4A73SfwRYXV5uCUA C8+wGkD5Yt3svdVe51Wf5rG0tUmw1OYoF2t9TeMYRhJpOCVM4/VtBBliqJqBozmY/EXa0Q8m5dr xrfn0v/o8S2u93/w= X-Received: by 2002:a05:6808:20d:b0:3ae:5bf5:4ad1 with SMTP id l13-20020a056808020d00b003ae5bf54ad1mr30593097oie.33.1699288625722; Mon, 06 Nov 2023 08:37:05 -0800 (PST) X-Google-Smtp-Source: AGHT+IESnwI/2ToGxwyqZOlJlJFo6qawmcFDtuGs6a2Ly4UQw7dgGgAUC333G3hQ26mvbtaw6KqSBg== X-Received: by 2002:a05:6808:20d:b0:3ae:5bf5:4ad1 with SMTP id l13-20020a056808020d00b003ae5bf54ad1mr30593077oie.33.1699288625397; Mon, 06 Nov 2023 08:37:05 -0800 (PST) Received: from ?IPV6:2a01:e0a:280:24f0:9db0:474c:ff43:9f5c? ([2a01:e0a:280:24f0:9db0:474c:ff43:9f5c]) by smtp.gmail.com with ESMTPSA id l3-20020a05620a28c300b0076c96e571f3sm3426450qkp.26.2023.11.06.08.37.03 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 06 Nov 2023 08:37:05 -0800 (PST) Message-ID: Date: Mon, 6 Nov 2023 17:37:02 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v4 08/41] vfio/container: Switch to dma_map|unmap API Content-Language: en-US To: Zhenzhong Duan , qemu-devel@nongnu.org Cc: alex.williamson@redhat.com, jgg@nvidia.com, nicolinc@nvidia.com, joao.m.martins@oracle.com, eric.auger@redhat.com, peterx@redhat.com, jasowang@redhat.com, kevin.tian@intel.com, yi.l.liu@intel.com, yi.y.sun@intel.com, chao.p.peng@intel.com, Yi Sun References: <20231102071302.1818071-1-zhenzhong.duan@intel.com> <20231102071302.1818071-9-zhenzhong.duan@intel.com> From: =?UTF-8?Q?C=C3=A9dric_Le_Goater?= In-Reply-To: <20231102071302.1818071-9-zhenzhong.duan@intel.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Received-SPF: pass client-ip=170.10.133.124; envelope-from=clg@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -5 X-Spam_score: -0.6 X-Spam_bar: / X-Spam_report: (-0.6 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_SORBS_WEB=1.5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org On 11/2/23 08:12, Zhenzhong Duan wrote: > From: Eric Auger > > No fucntional change intended. > > Signed-off-by: Eric Auger > Signed-off-by: Yi Liu > Signed-off-by: Yi Sun > Signed-off-by: Zhenzhong Duan > --- > v4: use SPDX identifier, use assert Reviewed-by: Cédric Le Goater Thanks, C. > > include/hw/vfio/vfio-common.h | 4 --- > include/hw/vfio/vfio-container-base.h | 7 +++++ > hw/vfio/common.c | 45 +++++++++++++++------------ > hw/vfio/container-base.c | 32 +++++++++++++++++++ > hw/vfio/container.c | 22 ++++++++----- > hw/vfio/meson.build | 1 + > hw/vfio/trace-events | 2 +- > 7 files changed, 81 insertions(+), 32 deletions(-) > create mode 100644 hw/vfio/container-base.c > > diff --git a/include/hw/vfio/vfio-common.h b/include/hw/vfio/vfio-common.h > index 678161f207..24a26345e5 100644 > --- a/include/hw/vfio/vfio-common.h > +++ b/include/hw/vfio/vfio-common.h > @@ -208,10 +208,6 @@ void vfio_put_address_space(VFIOAddressSpace *space); > bool vfio_devices_all_running_and_saving(VFIOContainer *container); > > /* container->fd */ > -int vfio_dma_unmap(VFIOContainer *container, hwaddr iova, > - ram_addr_t size, IOMMUTLBEntry *iotlb); > -int vfio_dma_map(VFIOContainer *container, hwaddr iova, > - ram_addr_t size, void *vaddr, bool readonly); > int vfio_set_dirty_page_tracking(VFIOContainer *container, bool start); > int vfio_query_dirty_bitmap(VFIOContainer *container, VFIOBitmap *vbmap, > hwaddr iova, hwaddr size); > diff --git a/include/hw/vfio/vfio-container-base.h b/include/hw/vfio/vfio-container-base.h > index 1d6daaea5d..56b033f59f 100644 > --- a/include/hw/vfio/vfio-container-base.h > +++ b/include/hw/vfio/vfio-container-base.h > @@ -31,6 +31,13 @@ typedef struct VFIOContainerBase { > const VFIOIOMMUOps *ops; > } VFIOContainerBase; > > +int vfio_container_dma_map(VFIOContainerBase *bcontainer, > + hwaddr iova, ram_addr_t size, > + void *vaddr, bool readonly); > +int vfio_container_dma_unmap(VFIOContainerBase *bcontainer, > + hwaddr iova, ram_addr_t size, > + IOMMUTLBEntry *iotlb); > + > struct VFIOIOMMUOps { > /* basic feature */ > int (*dma_map)(VFIOContainerBase *bcontainer, > diff --git a/hw/vfio/common.c b/hw/vfio/common.c > index e70fdf5e0c..e610771888 100644 > --- a/hw/vfio/common.c > +++ b/hw/vfio/common.c > @@ -292,7 +292,7 @@ static bool vfio_get_xlat_addr(IOMMUTLBEntry *iotlb, void **vaddr, > static void vfio_iommu_map_notify(IOMMUNotifier *n, IOMMUTLBEntry *iotlb) > { > VFIOGuestIOMMU *giommu = container_of(n, VFIOGuestIOMMU, n); > - VFIOContainer *container = giommu->container; > + VFIOContainerBase *bcontainer = &giommu->container->bcontainer; > hwaddr iova = iotlb->iova + giommu->iommu_offset; > void *vaddr; > int ret; > @@ -322,21 +322,22 @@ static void vfio_iommu_map_notify(IOMMUNotifier *n, IOMMUTLBEntry *iotlb) > * of vaddr will always be there, even if the memory object is > * destroyed and its backing memory munmap-ed. > */ > - ret = vfio_dma_map(container, iova, > - iotlb->addr_mask + 1, vaddr, > - read_only); > + ret = vfio_container_dma_map(bcontainer, iova, > + iotlb->addr_mask + 1, vaddr, > + read_only); > if (ret) { > - error_report("vfio_dma_map(%p, 0x%"HWADDR_PRIx", " > + error_report("vfio_container_dma_map(%p, 0x%"HWADDR_PRIx", " > "0x%"HWADDR_PRIx", %p) = %d (%s)", > - container, iova, > + bcontainer, iova, > iotlb->addr_mask + 1, vaddr, ret, strerror(-ret)); > } > } else { > - ret = vfio_dma_unmap(container, iova, iotlb->addr_mask + 1, iotlb); > + ret = vfio_container_dma_unmap(bcontainer, iova, > + iotlb->addr_mask + 1, iotlb); > if (ret) { > - error_report("vfio_dma_unmap(%p, 0x%"HWADDR_PRIx", " > + error_report("vfio_container_dma_unmap(%p, 0x%"HWADDR_PRIx", " > "0x%"HWADDR_PRIx") = %d (%s)", > - container, iova, > + bcontainer, iova, > iotlb->addr_mask + 1, ret, strerror(-ret)); > vfio_set_migration_error(ret); > } > @@ -355,9 +356,10 @@ static void vfio_ram_discard_notify_discard(RamDiscardListener *rdl, > int ret; > > /* Unmap with a single call. */ > - ret = vfio_dma_unmap(vrdl->container, iova, size , NULL); > + ret = vfio_container_dma_unmap(&vrdl->container->bcontainer, > + iova, size , NULL); > if (ret) { > - error_report("%s: vfio_dma_unmap() failed: %s", __func__, > + error_report("%s: vfio_container_dma_unmap() failed: %s", __func__, > strerror(-ret)); > } > } > @@ -385,8 +387,8 @@ static int vfio_ram_discard_notify_populate(RamDiscardListener *rdl, > section->offset_within_address_space; > vaddr = memory_region_get_ram_ptr(section->mr) + start; > > - ret = vfio_dma_map(vrdl->container, iova, next - start, > - vaddr, section->readonly); > + ret = vfio_container_dma_map(&vrdl->container->bcontainer, iova, > + next - start, vaddr, section->readonly); > if (ret) { > /* Rollback */ > vfio_ram_discard_notify_discard(rdl, section); > @@ -684,10 +686,11 @@ static void vfio_listener_region_add(MemoryListener *listener, > } > } > > - ret = vfio_dma_map(container, iova, int128_get64(llsize), > - vaddr, section->readonly); > + ret = vfio_container_dma_map(&container->bcontainer, > + iova, int128_get64(llsize), vaddr, > + section->readonly); > if (ret) { > - error_setg(&err, "vfio_dma_map(%p, 0x%"HWADDR_PRIx", " > + error_setg(&err, "vfio_container_dma_map(%p, 0x%"HWADDR_PRIx", " > "0x%"HWADDR_PRIx", %p) = %d (%s)", > container, iova, int128_get64(llsize), vaddr, ret, > strerror(-ret)); > @@ -784,18 +787,20 @@ static void vfio_listener_region_del(MemoryListener *listener, > if (int128_eq(llsize, int128_2_64())) { > /* The unmap ioctl doesn't accept a full 64-bit span. */ > llsize = int128_rshift(llsize, 1); > - ret = vfio_dma_unmap(container, iova, int128_get64(llsize), NULL); > + ret = vfio_container_dma_unmap(&container->bcontainer, iova, > + int128_get64(llsize), NULL); > if (ret) { > - error_report("vfio_dma_unmap(%p, 0x%"HWADDR_PRIx", " > + error_report("vfio_container_dma_unmap(%p, 0x%"HWADDR_PRIx", " > "0x%"HWADDR_PRIx") = %d (%s)", > container, iova, int128_get64(llsize), ret, > strerror(-ret)); > } > iova += int128_get64(llsize); > } > - ret = vfio_dma_unmap(container, iova, int128_get64(llsize), NULL); > + ret = vfio_container_dma_unmap(&container->bcontainer, iova, > + int128_get64(llsize), NULL); > if (ret) { > - error_report("vfio_dma_unmap(%p, 0x%"HWADDR_PRIx", " > + error_report("vfio_container_dma_unmap(%p, 0x%"HWADDR_PRIx", " > "0x%"HWADDR_PRIx") = %d (%s)", > container, iova, int128_get64(llsize), ret, > strerror(-ret)); > diff --git a/hw/vfio/container-base.c b/hw/vfio/container-base.c > new file mode 100644 > index 0000000000..55d3a35fa4 > --- /dev/null > +++ b/hw/vfio/container-base.c > @@ -0,0 +1,32 @@ > +/* > + * VFIO BASE CONTAINER > + * > + * Copyright (C) 2023 Intel Corporation. > + * Copyright Red Hat, Inc. 2023 > + * > + * Authors: Yi Liu > + * Eric Auger > + * > + * SPDX-License-Identifier: GPL-2.0-or-later > + */ > + > +#include "qemu/osdep.h" > +#include "qapi/error.h" > +#include "qemu/error-report.h" > +#include "hw/vfio/vfio-container-base.h" > + > +int vfio_container_dma_map(VFIOContainerBase *bcontainer, > + hwaddr iova, ram_addr_t size, > + void *vaddr, bool readonly) > +{ > + g_assert(bcontainer->ops->dma_map); > + return bcontainer->ops->dma_map(bcontainer, iova, size, vaddr, readonly); > +} > + > +int vfio_container_dma_unmap(VFIOContainerBase *bcontainer, > + hwaddr iova, ram_addr_t size, > + IOMMUTLBEntry *iotlb) > +{ > + g_assert(bcontainer->ops->dma_unmap); > + return bcontainer->ops->dma_unmap(bcontainer, iova, size, iotlb); > +} > diff --git a/hw/vfio/container.c b/hw/vfio/container.c > index 4bc43ddfa4..c04df26323 100644 > --- a/hw/vfio/container.c > +++ b/hw/vfio/container.c > @@ -115,9 +115,11 @@ unmap_exit: > /* > * DMA - Mapping and unmapping for the "type1" IOMMU interface used on x86 > */ > -int vfio_dma_unmap(VFIOContainer *container, hwaddr iova, > - ram_addr_t size, IOMMUTLBEntry *iotlb) > +static int vfio_legacy_dma_unmap(VFIOContainerBase *bcontainer, hwaddr iova, > + ram_addr_t size, IOMMUTLBEntry *iotlb) > { > + VFIOContainer *container = container_of(bcontainer, VFIOContainer, > + bcontainer); > struct vfio_iommu_type1_dma_unmap unmap = { > .argsz = sizeof(unmap), > .flags = 0, > @@ -151,7 +153,7 @@ int vfio_dma_unmap(VFIOContainer *container, hwaddr iova, > */ > if (errno == EINVAL && unmap.size && !(unmap.iova + unmap.size) && > container->iommu_type == VFIO_TYPE1v2_IOMMU) { > - trace_vfio_dma_unmap_overflow_workaround(); > + trace_vfio_legacy_dma_unmap_overflow_workaround(); > unmap.size -= 1ULL << ctz64(container->pgsizes); > continue; > } > @@ -170,9 +172,11 @@ int vfio_dma_unmap(VFIOContainer *container, hwaddr iova, > return 0; > } > > -int vfio_dma_map(VFIOContainer *container, hwaddr iova, > - ram_addr_t size, void *vaddr, bool readonly) > +static int vfio_legacy_dma_map(VFIOContainerBase *bcontainer, hwaddr iova, > + ram_addr_t size, void *vaddr, bool readonly) > { > + VFIOContainer *container = container_of(bcontainer, VFIOContainer, > + bcontainer); > struct vfio_iommu_type1_dma_map map = { > .argsz = sizeof(map), > .flags = VFIO_DMA_MAP_FLAG_READ, > @@ -191,7 +195,8 @@ int vfio_dma_map(VFIOContainer *container, hwaddr iova, > * the VGA ROM space. > */ > if (ioctl(container->fd, VFIO_IOMMU_MAP_DMA, &map) == 0 || > - (errno == EBUSY && vfio_dma_unmap(container, iova, size, NULL) == 0 && > + (errno == EBUSY && > + vfio_legacy_dma_unmap(bcontainer, iova, size, NULL) == 0 && > ioctl(container->fd, VFIO_IOMMU_MAP_DMA, &map) == 0)) { > return 0; > } > @@ -937,4 +942,7 @@ void vfio_detach_device(VFIODevice *vbasedev) > vfio_put_group(group); > } > > -const VFIOIOMMUOps vfio_legacy_ops; > +const VFIOIOMMUOps vfio_legacy_ops = { > + .dma_map = vfio_legacy_dma_map, > + .dma_unmap = vfio_legacy_dma_unmap, > +}; > diff --git a/hw/vfio/meson.build b/hw/vfio/meson.build > index 2a6912c940..eb6ce6229d 100644 > --- a/hw/vfio/meson.build > +++ b/hw/vfio/meson.build > @@ -2,6 +2,7 @@ vfio_ss = ss.source_set() > vfio_ss.add(files( > 'helpers.c', > 'common.c', > + 'container-base.c', > 'container.c', > 'spapr.c', > 'migration.c', > diff --git a/hw/vfio/trace-events b/hw/vfio/trace-events > index 0eb2387cf2..9f7fedee98 100644 > --- a/hw/vfio/trace-events > +++ b/hw/vfio/trace-events > @@ -116,7 +116,7 @@ vfio_region_unmap(const char *name, unsigned long offset, unsigned long end) "Re > vfio_region_sparse_mmap_header(const char *name, int index, int nr_areas) "Device %s region %d: %d sparse mmap entries" > vfio_region_sparse_mmap_entry(int i, unsigned long start, unsigned long end) "sparse entry %d [0x%lx - 0x%lx]" > vfio_get_dev_region(const char *name, int index, uint32_t type, uint32_t subtype) "%s index %d, %08x/%08x" > -vfio_dma_unmap_overflow_workaround(void) "" > +vfio_legacy_dma_unmap_overflow_workaround(void) "" > vfio_get_dirty_bitmap(int fd, uint64_t iova, uint64_t size, uint64_t bitmap_size, uint64_t start, uint64_t dirty_pages) "container fd=%d, iova=0x%"PRIx64" size= 0x%"PRIx64" bitmap_size=0x%"PRIx64" start=0x%"PRIx64" dirty_pages=%"PRIu64 > vfio_iommu_map_dirty_notify(uint64_t iova_start, uint64_t iova_end) "iommu dirty @ 0x%"PRIx64" - 0x%"PRIx64 >