2015-06-08 18:25:25 +03:00
|
|
|
/*
|
|
|
|
* vfio based device assignment support - platform devices
|
|
|
|
*
|
|
|
|
* Copyright Linaro Limited, 2014
|
|
|
|
*
|
|
|
|
* Authors:
|
|
|
|
* Kim Phillips <kim.phillips@linaro.org>
|
|
|
|
* Eric Auger <eric.auger@linaro.org>
|
|
|
|
*
|
|
|
|
* This work is licensed under the terms of the GNU GPL, version 2. See
|
|
|
|
* the COPYING file in the top-level directory.
|
|
|
|
*
|
|
|
|
* Based on vfio based PCI device assignment support:
|
|
|
|
* Copyright Red Hat, Inc. 2012
|
|
|
|
*/
|
|
|
|
|
2016-01-26 21:17:14 +03:00
|
|
|
#include "qemu/osdep.h"
|
2023-11-21 11:44:11 +03:00
|
|
|
#include CONFIG_DEVICES /* CONFIG_IOMMUFD */
|
include/qemu/osdep.h: Don't include qapi/error.h
Commit 57cb38b included qapi/error.h into qemu/osdep.h to get the
Error typedef. Since then, we've moved to include qemu/osdep.h
everywhere. Its file comment explains: "To avoid getting into
possible circular include dependencies, this file should not include
any other QEMU headers, with the exceptions of config-host.h,
compiler.h, os-posix.h and os-win32.h, all of which are doing a
similar job to this file and are under similar constraints."
qapi/error.h doesn't do a similar job, and it doesn't adhere to
similar constraints: it includes qapi-types.h. That's in excess of
100KiB of crap most .c files don't actually need.
Add the typedef to qemu/typedefs.h, and include that instead of
qapi/error.h. Include qapi/error.h in .c files that need it and don't
get it now. Include qapi-types.h in qom/object.h for uint16List.
Update scripts/clean-includes accordingly. Update it further to match
reality: replace config.h by config-target.h, add sysemu/os-posix.h,
sysemu/os-win32.h. Update the list of includes in the qemu/osdep.h
comment quoted above similarly.
This reduces the number of objects depending on qapi/error.h from "all
of them" to less than a third. Unfortunately, the number depending on
qapi-types.h shrinks only a little. More work is needed for that one.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
[Fix compilation without the spice devel packages. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-03-14 11:01:28 +03:00
|
|
|
#include "qapi/error.h"
|
2015-06-08 18:25:25 +03:00
|
|
|
#include <sys/ioctl.h>
|
2015-06-17 15:35:00 +03:00
|
|
|
#include <linux/vfio.h>
|
2015-06-08 18:25:25 +03:00
|
|
|
|
|
|
|
#include "hw/vfio/vfio-platform.h"
|
2023-11-21 11:44:11 +03:00
|
|
|
#include "sysemu/iommufd.h"
|
2019-08-12 08:23:45 +03:00
|
|
|
#include "migration/vmstate.h"
|
2015-06-08 18:25:25 +03:00
|
|
|
#include "qemu/error-report.h"
|
2020-04-04 07:21:08 +03:00
|
|
|
#include "qemu/lockable.h"
|
Include qemu/main-loop.h less
In my "build everything" tree, changing qemu/main-loop.h triggers a
recompile of some 5600 out of 6600 objects (not counting tests and
objects that don't depend on qemu/osdep.h). It includes block/aio.h,
which in turn includes qemu/event_notifier.h, qemu/notify.h,
qemu/processor.h, qemu/qsp.h, qemu/queue.h, qemu/thread-posix.h,
qemu/thread.h, qemu/timer.h, and a few more.
Include qemu/main-loop.h only where it's needed. Touching it now
recompiles only some 1700 objects. For block/aio.h and
qemu/event_notifier.h, these numbers drop from 5600 to 2800. For the
others, they shrink only slightly.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Message-Id: <20190812052359.30071-21-armbru@redhat.com>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
2019-08-12 08:23:50 +03:00
|
|
|
#include "qemu/main-loop.h"
|
2019-05-23 17:35:07 +03:00
|
|
|
#include "qemu/module.h"
|
2015-06-08 18:25:25 +03:00
|
|
|
#include "qemu/range.h"
|
|
|
|
#include "exec/memory.h"
|
2018-05-29 02:26:59 +03:00
|
|
|
#include "exec/address-spaces.h"
|
2015-06-08 18:25:26 +03:00
|
|
|
#include "qemu/queue.h"
|
2015-06-08 18:25:25 +03:00
|
|
|
#include "hw/sysbus.h"
|
|
|
|
#include "trace.h"
|
2019-08-12 08:23:42 +03:00
|
|
|
#include "hw/irq.h"
|
2015-06-08 18:25:25 +03:00
|
|
|
#include "hw/platform-bus.h"
|
2019-08-12 08:23:51 +03:00
|
|
|
#include "hw/qdev-properties.h"
|
2015-07-06 21:15:14 +03:00
|
|
|
#include "sysemu/kvm.h"
|
2015-06-08 18:25:25 +03:00
|
|
|
|
2015-06-08 18:25:26 +03:00
|
|
|
/*
|
|
|
|
* Functions used whatever the injection method
|
|
|
|
*/
|
|
|
|
|
2015-10-05 21:30:12 +03:00
|
|
|
static inline bool vfio_irq_is_automasked(VFIOINTp *intp)
|
|
|
|
{
|
|
|
|
return intp->flags & VFIO_IRQ_INFO_AUTOMASKED;
|
|
|
|
}
|
|
|
|
|
2015-06-08 18:25:26 +03:00
|
|
|
/**
|
|
|
|
* vfio_init_intp - allocate, initialize the IRQ struct pointer
|
|
|
|
* and add it into the list of IRQs
|
|
|
|
* @vbasedev: the VFIO device handle
|
|
|
|
* @info: irq info struct retrieved from VFIO driver
|
2016-10-17 19:58:00 +03:00
|
|
|
* @errp: error object
|
2015-06-08 18:25:26 +03:00
|
|
|
*/
|
|
|
|
static VFIOINTp *vfio_init_intp(VFIODevice *vbasedev,
|
2016-10-17 19:58:00 +03:00
|
|
|
struct vfio_irq_info info, Error **errp)
|
2015-06-08 18:25:26 +03:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
VFIOPlatformDevice *vdev =
|
|
|
|
container_of(vbasedev, VFIOPlatformDevice, vbasedev);
|
|
|
|
SysBusDevice *sbdev = SYS_BUS_DEVICE(vdev);
|
|
|
|
VFIOINTp *intp;
|
|
|
|
|
|
|
|
intp = g_malloc0(sizeof(*intp));
|
|
|
|
intp->vdev = vdev;
|
|
|
|
intp->pin = info.index;
|
|
|
|
intp->flags = info.flags;
|
|
|
|
intp->state = VFIO_IRQ_INACTIVE;
|
2015-07-06 21:15:14 +03:00
|
|
|
intp->kvm_accel = false;
|
2015-06-08 18:25:26 +03:00
|
|
|
|
|
|
|
sysbus_init_irq(sbdev, &intp->qemuirq);
|
|
|
|
|
|
|
|
/* Get an eventfd for trigger */
|
2022-03-15 17:41:56 +03:00
|
|
|
intp->interrupt = g_new0(EventNotifier, 1);
|
2015-10-05 21:30:12 +03:00
|
|
|
ret = event_notifier_init(intp->interrupt, 0);
|
2015-06-08 18:25:26 +03:00
|
|
|
if (ret) {
|
2015-10-05 21:30:12 +03:00
|
|
|
g_free(intp->interrupt);
|
2015-06-08 18:25:26 +03:00
|
|
|
g_free(intp);
|
2016-10-17 19:58:00 +03:00
|
|
|
error_setg_errno(errp, -ret,
|
2019-05-21 18:15:42 +03:00
|
|
|
"failed to initialize trigger eventfd notifier");
|
2015-06-08 18:25:26 +03:00
|
|
|
return NULL;
|
|
|
|
}
|
2015-10-05 21:30:12 +03:00
|
|
|
if (vfio_irq_is_automasked(intp)) {
|
|
|
|
/* Get an eventfd for resample/unmask */
|
2022-03-15 17:41:56 +03:00
|
|
|
intp->unmask = g_new0(EventNotifier, 1);
|
2015-10-05 21:30:12 +03:00
|
|
|
ret = event_notifier_init(intp->unmask, 0);
|
|
|
|
if (ret) {
|
|
|
|
g_free(intp->interrupt);
|
|
|
|
g_free(intp->unmask);
|
|
|
|
g_free(intp);
|
2016-10-17 19:58:00 +03:00
|
|
|
error_setg_errno(errp, -ret,
|
2019-05-21 18:15:42 +03:00
|
|
|
"failed to initialize resample eventfd notifier");
|
2015-10-05 21:30:12 +03:00
|
|
|
return NULL;
|
|
|
|
}
|
2015-07-06 21:15:14 +03:00
|
|
|
}
|
2015-06-08 18:25:26 +03:00
|
|
|
|
|
|
|
QLIST_INSERT_HEAD(&vdev->intp_list, intp, next);
|
|
|
|
return intp;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* vfio_set_trigger_eventfd - set VFIO eventfd handling
|
|
|
|
*
|
|
|
|
* @intp: IRQ struct handle
|
|
|
|
* @handler: handler to be called on eventfd signaling
|
|
|
|
*
|
|
|
|
* Setup VFIO signaling and attach an optional user-side handler
|
|
|
|
* to the eventfd
|
|
|
|
*/
|
|
|
|
static int vfio_set_trigger_eventfd(VFIOINTp *intp,
|
|
|
|
eventfd_user_side_handler_t handler)
|
|
|
|
{
|
|
|
|
VFIODevice *vbasedev = &intp->vdev->vbasedev;
|
2019-06-13 18:57:37 +03:00
|
|
|
int32_t fd = event_notifier_get_fd(intp->interrupt);
|
|
|
|
Error *err = NULL;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
qemu_set_fd_handler(fd, (IOHandler *)handler, NULL, intp);
|
|
|
|
|
|
|
|
ret = vfio_set_irq_signaling(vbasedev, intp->pin, 0,
|
|
|
|
VFIO_IRQ_SET_ACTION_TRIGGER, fd, &err);
|
|
|
|
if (ret) {
|
|
|
|
error_reportf_err(err, VFIO_MSG_PREFIX, vbasedev->name);
|
|
|
|
qemu_set_fd_handler(fd, NULL, NULL, NULL);
|
2015-06-08 18:25:26 +03:00
|
|
|
}
|
2019-06-13 18:57:37 +03:00
|
|
|
|
2015-06-08 18:25:26 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Functions only used when eventfds are handled on user-side
|
|
|
|
* ie. without irqfd
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* vfio_mmap_set_enabled - enable/disable the fast path mode
|
|
|
|
* @vdev: the VFIO platform device
|
|
|
|
* @enabled: the target mmap state
|
|
|
|
*
|
|
|
|
* enabled = true ~ fast path = MMIO region is mmaped (no KVM TRAP);
|
|
|
|
* enabled = false ~ slow path = MMIO region is trapped and region callbacks
|
|
|
|
* are called; slow path enables to trap the device IRQ status register reset
|
|
|
|
*/
|
|
|
|
|
|
|
|
static void vfio_mmap_set_enabled(VFIOPlatformDevice *vdev, bool enabled)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < vdev->vbasedev.num_regions; i++) {
|
2016-03-10 19:39:07 +03:00
|
|
|
vfio_region_mmaps_set_enabled(vdev->regions[i], enabled);
|
2015-06-08 18:25:26 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* vfio_intp_mmap_enable - timer function, restores the fast path
|
|
|
|
* if there is no more active IRQ
|
|
|
|
* @opaque: actually points to the VFIO platform device
|
|
|
|
*
|
2021-07-30 04:26:13 +03:00
|
|
|
* Called on mmap timer timeout, this function checks whether the
|
2015-06-08 18:25:26 +03:00
|
|
|
* IRQ is still active and if not, restores the fast path.
|
|
|
|
* by construction a single eventfd is handled at a time.
|
|
|
|
* if the IRQ is still active, the timer is re-programmed.
|
|
|
|
*/
|
|
|
|
static void vfio_intp_mmap_enable(void *opaque)
|
|
|
|
{
|
|
|
|
VFIOINTp *tmp;
|
|
|
|
VFIOPlatformDevice *vdev = (VFIOPlatformDevice *)opaque;
|
|
|
|
|
2020-10-23 15:43:42 +03:00
|
|
|
QEMU_LOCK_GUARD(&vdev->intp_mutex);
|
2015-06-08 18:25:26 +03:00
|
|
|
QLIST_FOREACH(tmp, &vdev->intp_list, next) {
|
|
|
|
if (tmp->state == VFIO_IRQ_ACTIVE) {
|
|
|
|
trace_vfio_platform_intp_mmap_enable(tmp->pin);
|
|
|
|
/* re-program the timer to check active status later */
|
|
|
|
timer_mod(vdev->mmap_timer,
|
|
|
|
qemu_clock_get_ms(QEMU_CLOCK_VIRTUAL) +
|
|
|
|
vdev->mmap_timeout);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
vfio_mmap_set_enabled(vdev, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* vfio_intp_inject_pending_lockheld - Injects a pending IRQ
|
|
|
|
* @opaque: opaque pointer, in practice the VFIOINTp handle
|
|
|
|
*
|
|
|
|
* The function is called on a previous IRQ completion, from
|
|
|
|
* vfio_platform_eoi, while the intp_mutex is locked.
|
|
|
|
* Also in such situation, the slow path already is set and
|
|
|
|
* the mmap timer was already programmed.
|
|
|
|
*/
|
|
|
|
static void vfio_intp_inject_pending_lockheld(VFIOINTp *intp)
|
|
|
|
{
|
|
|
|
trace_vfio_platform_intp_inject_pending_lockheld(intp->pin,
|
2015-10-05 21:30:12 +03:00
|
|
|
event_notifier_get_fd(intp->interrupt));
|
2015-06-08 18:25:26 +03:00
|
|
|
|
|
|
|
intp->state = VFIO_IRQ_ACTIVE;
|
|
|
|
|
|
|
|
/* trigger the virtual IRQ */
|
|
|
|
qemu_set_irq(intp->qemuirq, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* vfio_intp_interrupt - The user-side eventfd handler
|
|
|
|
* @opaque: opaque pointer which in practice is the VFIOINTp handle
|
|
|
|
*
|
|
|
|
* the function is entered in event handler context:
|
|
|
|
* the vIRQ is injected into the guest if there is no other active
|
|
|
|
* or pending IRQ.
|
|
|
|
*/
|
|
|
|
static void vfio_intp_interrupt(VFIOINTp *intp)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
VFIOINTp *tmp;
|
|
|
|
VFIOPlatformDevice *vdev = intp->vdev;
|
|
|
|
bool delay_handling = false;
|
|
|
|
|
2020-04-04 07:21:08 +03:00
|
|
|
QEMU_LOCK_GUARD(&vdev->intp_mutex);
|
2015-06-08 18:25:26 +03:00
|
|
|
if (intp->state == VFIO_IRQ_INACTIVE) {
|
|
|
|
QLIST_FOREACH(tmp, &vdev->intp_list, next) {
|
|
|
|
if (tmp->state == VFIO_IRQ_ACTIVE ||
|
|
|
|
tmp->state == VFIO_IRQ_PENDING) {
|
|
|
|
delay_handling = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (delay_handling) {
|
|
|
|
/*
|
|
|
|
* the new IRQ gets a pending status and is pushed in
|
|
|
|
* the pending queue
|
|
|
|
*/
|
|
|
|
intp->state = VFIO_IRQ_PENDING;
|
|
|
|
trace_vfio_intp_interrupt_set_pending(intp->pin);
|
|
|
|
QSIMPLEQ_INSERT_TAIL(&vdev->pending_intp_queue,
|
|
|
|
intp, pqnext);
|
2020-08-27 14:03:08 +03:00
|
|
|
event_notifier_test_and_clear(intp->interrupt);
|
2015-06-08 18:25:26 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_vfio_platform_intp_interrupt(intp->pin,
|
2015-10-05 21:30:12 +03:00
|
|
|
event_notifier_get_fd(intp->interrupt));
|
2015-06-08 18:25:26 +03:00
|
|
|
|
2015-10-05 21:30:12 +03:00
|
|
|
ret = event_notifier_test_and_clear(intp->interrupt);
|
2015-06-08 18:25:26 +03:00
|
|
|
if (!ret) {
|
2015-06-29 23:56:26 +03:00
|
|
|
error_report("Error when clearing fd=%d (ret = %d)",
|
2015-10-05 21:30:12 +03:00
|
|
|
event_notifier_get_fd(intp->interrupt), ret);
|
2015-06-08 18:25:26 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
intp->state = VFIO_IRQ_ACTIVE;
|
|
|
|
|
|
|
|
/* sets slow path */
|
|
|
|
vfio_mmap_set_enabled(vdev, false);
|
|
|
|
|
|
|
|
/* trigger the virtual IRQ */
|
|
|
|
qemu_set_irq(intp->qemuirq, 1);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Schedule the mmap timer which will restore fastpath when no IRQ
|
|
|
|
* is active anymore
|
|
|
|
*/
|
|
|
|
if (vdev->mmap_timeout) {
|
|
|
|
timer_mod(vdev->mmap_timer,
|
|
|
|
qemu_clock_get_ms(QEMU_CLOCK_VIRTUAL) +
|
|
|
|
vdev->mmap_timeout);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* vfio_platform_eoi - IRQ completion routine
|
|
|
|
* @vbasedev: the VFIO device handle
|
|
|
|
*
|
|
|
|
* De-asserts the active virtual IRQ and unmasks the physical IRQ
|
|
|
|
* (effective for level sensitive IRQ auto-masked by the VFIO driver).
|
|
|
|
* Then it handles next pending IRQ if any.
|
|
|
|
* eoi function is called on the first access to any MMIO region
|
|
|
|
* after an IRQ was triggered, trapped since slow path was set.
|
|
|
|
* It is assumed this access corresponds to the IRQ status
|
|
|
|
* register reset. With such a mechanism, a single IRQ can be
|
|
|
|
* handled at a time since there is no way to know which IRQ
|
|
|
|
* was completed by the guest (we would need additional details
|
|
|
|
* about the IRQ status register mask).
|
|
|
|
*/
|
|
|
|
static void vfio_platform_eoi(VFIODevice *vbasedev)
|
|
|
|
{
|
|
|
|
VFIOINTp *intp;
|
|
|
|
VFIOPlatformDevice *vdev =
|
|
|
|
container_of(vbasedev, VFIOPlatformDevice, vbasedev);
|
|
|
|
|
2020-10-23 15:43:42 +03:00
|
|
|
QEMU_LOCK_GUARD(&vdev->intp_mutex);
|
2015-06-08 18:25:26 +03:00
|
|
|
QLIST_FOREACH(intp, &vdev->intp_list, next) {
|
|
|
|
if (intp->state == VFIO_IRQ_ACTIVE) {
|
|
|
|
trace_vfio_platform_eoi(intp->pin,
|
2015-10-05 21:30:12 +03:00
|
|
|
event_notifier_get_fd(intp->interrupt));
|
2015-06-08 18:25:26 +03:00
|
|
|
intp->state = VFIO_IRQ_INACTIVE;
|
|
|
|
|
|
|
|
/* deassert the virtual IRQ */
|
|
|
|
qemu_set_irq(intp->qemuirq, 0);
|
|
|
|
|
2015-10-05 21:30:12 +03:00
|
|
|
if (vfio_irq_is_automasked(intp)) {
|
2015-06-08 18:25:26 +03:00
|
|
|
/* unmasks the physical level-sensitive IRQ */
|
|
|
|
vfio_unmask_single_irqindex(vbasedev, intp->pin);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* a single IRQ can be active at a time */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* in case there are pending IRQs, handle the first one */
|
|
|
|
if (!QSIMPLEQ_EMPTY(&vdev->pending_intp_queue)) {
|
|
|
|
intp = QSIMPLEQ_FIRST(&vdev->pending_intp_queue);
|
|
|
|
vfio_intp_inject_pending_lockheld(intp);
|
|
|
|
QSIMPLEQ_REMOVE_HEAD(&vdev->pending_intp_queue, pqnext);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* vfio_start_eventfd_injection - starts the virtual IRQ injection using
|
|
|
|
* user-side handled eventfds
|
2015-10-05 21:30:12 +03:00
|
|
|
* @sbdev: the sysbus device handle
|
|
|
|
* @irq: the qemu irq handle
|
2015-06-08 18:25:26 +03:00
|
|
|
*/
|
|
|
|
|
2015-10-05 21:30:12 +03:00
|
|
|
static void vfio_start_eventfd_injection(SysBusDevice *sbdev, qemu_irq irq)
|
2015-06-08 18:25:26 +03:00
|
|
|
{
|
2015-10-05 21:30:12 +03:00
|
|
|
VFIOPlatformDevice *vdev = VFIO_PLATFORM_DEVICE(sbdev);
|
|
|
|
VFIOINTp *intp;
|
|
|
|
|
|
|
|
QLIST_FOREACH(intp, &vdev->intp_list, next) {
|
|
|
|
if (intp->qemuirq == irq) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
assert(intp);
|
2015-06-08 18:25:26 +03:00
|
|
|
|
2019-06-13 18:57:37 +03:00
|
|
|
if (vfio_set_trigger_eventfd(intp, vfio_intp_interrupt)) {
|
2015-10-05 21:30:12 +03:00
|
|
|
abort();
|
2015-06-08 18:25:26 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-06 21:15:14 +03:00
|
|
|
/*
|
|
|
|
* Functions used for irqfd
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* vfio_set_resample_eventfd - sets the resamplefd for an IRQ
|
|
|
|
* @intp: the IRQ struct handle
|
|
|
|
* programs the VFIO driver to unmask this IRQ when the
|
|
|
|
* intp->unmask eventfd is triggered
|
|
|
|
*/
|
|
|
|
static int vfio_set_resample_eventfd(VFIOINTp *intp)
|
|
|
|
{
|
2019-06-13 18:57:37 +03:00
|
|
|
int32_t fd = event_notifier_get_fd(intp->unmask);
|
2015-07-06 21:15:14 +03:00
|
|
|
VFIODevice *vbasedev = &intp->vdev->vbasedev;
|
2019-06-13 18:57:37 +03:00
|
|
|
Error *err = NULL;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
qemu_set_fd_handler(fd, NULL, NULL, NULL);
|
|
|
|
ret = vfio_set_irq_signaling(vbasedev, intp->pin, 0,
|
|
|
|
VFIO_IRQ_SET_ACTION_UNMASK, fd, &err);
|
|
|
|
if (ret) {
|
|
|
|
error_reportf_err(err, VFIO_MSG_PREFIX, vbasedev->name);
|
2015-07-06 21:15:14 +03:00
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-10-05 21:30:12 +03:00
|
|
|
/**
|
|
|
|
* vfio_start_irqfd_injection - starts the virtual IRQ injection using
|
|
|
|
* irqfd
|
|
|
|
*
|
|
|
|
* @sbdev: the sysbus device handle
|
|
|
|
* @irq: the qemu irq handle
|
|
|
|
*
|
|
|
|
* In case the irqfd setup fails, we fallback to userspace handled eventfd
|
|
|
|
*/
|
2015-07-06 21:15:14 +03:00
|
|
|
static void vfio_start_irqfd_injection(SysBusDevice *sbdev, qemu_irq irq)
|
|
|
|
{
|
|
|
|
VFIOPlatformDevice *vdev = VFIO_PLATFORM_DEVICE(sbdev);
|
|
|
|
VFIOINTp *intp;
|
|
|
|
|
|
|
|
if (!kvm_irqfds_enabled() || !kvm_resamplefds_enabled() ||
|
|
|
|
!vdev->irqfd_allowed) {
|
2015-10-05 21:30:12 +03:00
|
|
|
goto fail_irqfd;
|
2015-07-06 21:15:14 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
QLIST_FOREACH(intp, &vdev->intp_list, next) {
|
|
|
|
if (intp->qemuirq == irq) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
assert(intp);
|
|
|
|
|
2015-10-05 21:30:12 +03:00
|
|
|
if (kvm_irqchip_add_irqfd_notifier(kvm_state, intp->interrupt,
|
|
|
|
intp->unmask, irq) < 0) {
|
2015-07-06 21:15:14 +03:00
|
|
|
goto fail_irqfd;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (vfio_set_trigger_eventfd(intp, NULL) < 0) {
|
|
|
|
goto fail_vfio;
|
|
|
|
}
|
2015-10-05 21:30:12 +03:00
|
|
|
if (vfio_irq_is_automasked(intp)) {
|
|
|
|
if (vfio_set_resample_eventfd(intp) < 0) {
|
|
|
|
goto fail_vfio;
|
|
|
|
}
|
|
|
|
trace_vfio_platform_start_level_irqfd_injection(intp->pin,
|
|
|
|
event_notifier_get_fd(intp->interrupt),
|
|
|
|
event_notifier_get_fd(intp->unmask));
|
|
|
|
} else {
|
|
|
|
trace_vfio_platform_start_edge_irqfd_injection(intp->pin,
|
|
|
|
event_notifier_get_fd(intp->interrupt));
|
2015-07-06 21:15:14 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
intp->kvm_accel = true;
|
|
|
|
|
|
|
|
return;
|
|
|
|
fail_vfio:
|
2015-10-05 21:30:12 +03:00
|
|
|
kvm_irqchip_remove_irqfd_notifier(kvm_state, intp->interrupt, irq);
|
2015-10-05 21:30:12 +03:00
|
|
|
abort();
|
2015-07-06 21:15:14 +03:00
|
|
|
fail_irqfd:
|
2015-10-05 21:30:12 +03:00
|
|
|
vfio_start_eventfd_injection(sbdev, irq);
|
2015-07-06 21:15:14 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-06-08 18:25:25 +03:00
|
|
|
/* VFIO skeleton */
|
|
|
|
|
|
|
|
static void vfio_platform_compute_needs_reset(VFIODevice *vbasedev)
|
|
|
|
{
|
|
|
|
vbasedev->needs_reset = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* not implemented yet */
|
|
|
|
static int vfio_platform_hot_reset_multi(VFIODevice *vbasedev)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* vfio_populate_device - Allocate and populate MMIO region
|
2015-06-08 18:25:26 +03:00
|
|
|
* and IRQ structs according to driver returned information
|
2015-06-08 18:25:25 +03:00
|
|
|
* @vbasedev: the VFIO device handle
|
2016-10-17 19:58:00 +03:00
|
|
|
* @errp: error object
|
2015-06-08 18:25:25 +03:00
|
|
|
*
|
|
|
|
*/
|
2016-10-17 19:58:00 +03:00
|
|
|
static int vfio_populate_device(VFIODevice *vbasedev, Error **errp)
|
2015-06-08 18:25:25 +03:00
|
|
|
{
|
2015-06-08 18:25:26 +03:00
|
|
|
VFIOINTp *intp, *tmp;
|
2015-06-08 18:25:25 +03:00
|
|
|
int i, ret = -1;
|
|
|
|
VFIOPlatformDevice *vdev =
|
|
|
|
container_of(vbasedev, VFIOPlatformDevice, vbasedev);
|
|
|
|
|
|
|
|
if (!(vbasedev->flags & VFIO_DEVICE_FLAGS_PLATFORM)) {
|
2016-10-17 19:58:00 +03:00
|
|
|
error_setg(errp, "this isn't a platform device");
|
2015-06-08 18:25:25 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-06-11 11:44:40 +03:00
|
|
|
vdev->regions = g_new0(VFIORegion *, vbasedev->num_regions);
|
2015-06-08 18:25:25 +03:00
|
|
|
|
|
|
|
for (i = 0; i < vbasedev->num_regions; i++) {
|
2016-03-10 19:39:07 +03:00
|
|
|
char *name = g_strdup_printf("VFIO %s region %d\n", vbasedev->name, i);
|
2015-06-08 18:25:25 +03:00
|
|
|
|
2015-11-10 22:11:08 +03:00
|
|
|
vdev->regions[i] = g_new0(VFIORegion, 1);
|
2016-03-10 19:39:07 +03:00
|
|
|
ret = vfio_region_setup(OBJECT(vdev), vbasedev,
|
|
|
|
vdev->regions[i], i, name);
|
|
|
|
g_free(name);
|
2015-06-08 18:25:25 +03:00
|
|
|
if (ret) {
|
2016-10-17 19:58:00 +03:00
|
|
|
error_setg_errno(errp, -ret, "failed to get region %d info", i);
|
2015-06-08 18:25:25 +03:00
|
|
|
goto reg_error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-08 18:25:26 +03:00
|
|
|
vdev->mmap_timer = timer_new_ms(QEMU_CLOCK_VIRTUAL,
|
|
|
|
vfio_intp_mmap_enable, vdev);
|
|
|
|
|
|
|
|
QSIMPLEQ_INIT(&vdev->pending_intp_queue);
|
|
|
|
|
|
|
|
for (i = 0; i < vbasedev->num_irqs; i++) {
|
|
|
|
struct vfio_irq_info irq = { .argsz = sizeof(irq) };
|
|
|
|
|
|
|
|
irq.index = i;
|
|
|
|
ret = ioctl(vbasedev->fd, VFIO_DEVICE_GET_IRQ_INFO, &irq);
|
|
|
|
if (ret) {
|
2016-10-17 19:58:00 +03:00
|
|
|
error_setg_errno(errp, -ret, "failed to get device irq info");
|
2015-06-08 18:25:26 +03:00
|
|
|
goto irq_err;
|
|
|
|
} else {
|
|
|
|
trace_vfio_platform_populate_interrupts(irq.index,
|
|
|
|
irq.count,
|
|
|
|
irq.flags);
|
2016-10-17 19:58:00 +03:00
|
|
|
intp = vfio_init_intp(vbasedev, irq, errp);
|
2015-06-08 18:25:26 +03:00
|
|
|
if (!intp) {
|
2016-10-17 19:58:00 +03:00
|
|
|
ret = -1;
|
2015-06-08 18:25:26 +03:00
|
|
|
goto irq_err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-06-08 18:25:25 +03:00
|
|
|
return 0;
|
2015-06-08 18:25:26 +03:00
|
|
|
irq_err:
|
|
|
|
timer_del(vdev->mmap_timer);
|
|
|
|
QLIST_FOREACH_SAFE(intp, &vdev->intp_list, next, tmp) {
|
|
|
|
QLIST_REMOVE(intp, next);
|
|
|
|
g_free(intp);
|
|
|
|
}
|
2015-06-08 18:25:25 +03:00
|
|
|
reg_error:
|
|
|
|
for (i = 0; i < vbasedev->num_regions; i++) {
|
2016-03-10 19:39:07 +03:00
|
|
|
if (vdev->regions[i]) {
|
|
|
|
vfio_region_finalize(vdev->regions[i]);
|
|
|
|
}
|
2015-06-08 18:25:25 +03:00
|
|
|
g_free(vdev->regions[i]);
|
|
|
|
}
|
|
|
|
g_free(vdev->regions);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* specialized functions for VFIO Platform devices */
|
|
|
|
static VFIODeviceOps vfio_platform_ops = {
|
|
|
|
.vfio_compute_needs_reset = vfio_platform_compute_needs_reset,
|
|
|
|
.vfio_hot_reset_multi = vfio_platform_hot_reset_multi,
|
2015-06-08 18:25:26 +03:00
|
|
|
.vfio_eoi = vfio_platform_eoi,
|
2015-06-08 18:25:25 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* vfio_base_device_init - perform preliminary VFIO setup
|
|
|
|
* @vbasedev: the VFIO device handle
|
2016-10-17 19:58:01 +03:00
|
|
|
* @errp: error object
|
2015-06-08 18:25:25 +03:00
|
|
|
*
|
|
|
|
* Implement the VFIO command sequence that allows to discover
|
|
|
|
* assigned device resources: group extraction, device
|
|
|
|
* fd retrieval, resource query.
|
|
|
|
* Precondition: the device name must be initialized
|
|
|
|
*/
|
2016-10-17 19:58:01 +03:00
|
|
|
static int vfio_base_device_init(VFIODevice *vbasedev, Error **errp)
|
2015-06-08 18:25:25 +03:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2023-11-21 11:44:12 +03:00
|
|
|
/* @fd takes precedence over @sysfsdev which takes precedence over @host */
|
|
|
|
if (vbasedev->fd < 0 && vbasedev->sysfsdev) {
|
vfio: Add sysfsdev property for pci & platform
vfio-pci currently requires a host= parameter, which comes in the
form of a PCI address in [domain:]<bus:slot.function> notation. We
expect to find a matching entry in sysfs for that under
/sys/bus/pci/devices/. vfio-platform takes a similar approach, but
defines the host= parameter to be a string, which can be matched
directly under /sys/bus/platform/devices/. On the PCI side, we have
some interest in using vfio to expose vGPU devices. These are not
actual discrete PCI devices, so they don't have a compatible host PCI
bus address or a device link where QEMU wants to look for it. There's
also really no requirement that vfio can only be used to expose
physical devices, a new vfio bus and iommu driver could expose a
completely emulated device. To fit within the vfio framework, it
would need a kernel struct device and associated IOMMU group, but
those are easy constraints to manage.
To support such devices, which would include vGPUs, that honor the
VFIO PCI programming API, but are not necessarily backed by a unique
PCI address, add support for specifying any device in sysfs. The
vfio API already has support for probing the device type to ensure
compatibility with either vfio-pci or vfio-platform.
With this, a vfio-pci device could either be specified as:
-device vfio-pci,host=02:00.0
or
-device vfio-pci,sysfsdev=/sys/devices/pci0000:00/0000:00:1c.0/0000:02:00.0
or even
-device vfio-pci,sysfsdev=/sys/bus/pci/devices/0000:02:00.0
When vGPU support comes along, this might look something more like:
-device vfio-pci,sysfsdev=/sys/devices/virtual/intel-vgpu/vgpu0@0000:00:02.0
NB - This is only a made up example path
The same change is made for vfio-platform, specifying sysfsdev has
precedence over the old host option.
Tested-by: Eric Auger <eric.auger@linaro.org>
Reviewed-by: Eric Auger <eric.auger@linaro.org>
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
2016-03-10 19:39:07 +03:00
|
|
|
g_free(vbasedev->name);
|
2018-03-01 10:08:06 +03:00
|
|
|
vbasedev->name = g_path_get_basename(vbasedev->sysfsdev);
|
2023-11-21 11:44:12 +03:00
|
|
|
} else if (vbasedev->fd < 0) {
|
vfio: Add sysfsdev property for pci & platform
vfio-pci currently requires a host= parameter, which comes in the
form of a PCI address in [domain:]<bus:slot.function> notation. We
expect to find a matching entry in sysfs for that under
/sys/bus/pci/devices/. vfio-platform takes a similar approach, but
defines the host= parameter to be a string, which can be matched
directly under /sys/bus/platform/devices/. On the PCI side, we have
some interest in using vfio to expose vGPU devices. These are not
actual discrete PCI devices, so they don't have a compatible host PCI
bus address or a device link where QEMU wants to look for it. There's
also really no requirement that vfio can only be used to expose
physical devices, a new vfio bus and iommu driver could expose a
completely emulated device. To fit within the vfio framework, it
would need a kernel struct device and associated IOMMU group, but
those are easy constraints to manage.
To support such devices, which would include vGPUs, that honor the
VFIO PCI programming API, but are not necessarily backed by a unique
PCI address, add support for specifying any device in sysfs. The
vfio API already has support for probing the device type to ensure
compatibility with either vfio-pci or vfio-platform.
With this, a vfio-pci device could either be specified as:
-device vfio-pci,host=02:00.0
or
-device vfio-pci,sysfsdev=/sys/devices/pci0000:00/0000:00:1c.0/0000:02:00.0
or even
-device vfio-pci,sysfsdev=/sys/bus/pci/devices/0000:02:00.0
When vGPU support comes along, this might look something more like:
-device vfio-pci,sysfsdev=/sys/devices/virtual/intel-vgpu/vgpu0@0000:00:02.0
NB - This is only a made up example path
The same change is made for vfio-platform, specifying sysfsdev has
precedence over the old host option.
Tested-by: Eric Auger <eric.auger@linaro.org>
Reviewed-by: Eric Auger <eric.auger@linaro.org>
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
2016-03-10 19:39:07 +03:00
|
|
|
if (!vbasedev->name || strchr(vbasedev->name, '/')) {
|
2016-10-17 19:58:01 +03:00
|
|
|
error_setg(errp, "wrong host device name");
|
vfio: Add sysfsdev property for pci & platform
vfio-pci currently requires a host= parameter, which comes in the
form of a PCI address in [domain:]<bus:slot.function> notation. We
expect to find a matching entry in sysfs for that under
/sys/bus/pci/devices/. vfio-platform takes a similar approach, but
defines the host= parameter to be a string, which can be matched
directly under /sys/bus/platform/devices/. On the PCI side, we have
some interest in using vfio to expose vGPU devices. These are not
actual discrete PCI devices, so they don't have a compatible host PCI
bus address or a device link where QEMU wants to look for it. There's
also really no requirement that vfio can only be used to expose
physical devices, a new vfio bus and iommu driver could expose a
completely emulated device. To fit within the vfio framework, it
would need a kernel struct device and associated IOMMU group, but
those are easy constraints to manage.
To support such devices, which would include vGPUs, that honor the
VFIO PCI programming API, but are not necessarily backed by a unique
PCI address, add support for specifying any device in sysfs. The
vfio API already has support for probing the device type to ensure
compatibility with either vfio-pci or vfio-platform.
With this, a vfio-pci device could either be specified as:
-device vfio-pci,host=02:00.0
or
-device vfio-pci,sysfsdev=/sys/devices/pci0000:00/0000:00:1c.0/0000:02:00.0
or even
-device vfio-pci,sysfsdev=/sys/bus/pci/devices/0000:02:00.0
When vGPU support comes along, this might look something more like:
-device vfio-pci,sysfsdev=/sys/devices/virtual/intel-vgpu/vgpu0@0000:00:02.0
NB - This is only a made up example path
The same change is made for vfio-platform, specifying sysfsdev has
precedence over the old host option.
Tested-by: Eric Auger <eric.auger@linaro.org>
Reviewed-by: Eric Auger <eric.auger@linaro.org>
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
2016-03-10 19:39:07 +03:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
2015-06-08 18:25:25 +03:00
|
|
|
|
vfio: Add sysfsdev property for pci & platform
vfio-pci currently requires a host= parameter, which comes in the
form of a PCI address in [domain:]<bus:slot.function> notation. We
expect to find a matching entry in sysfs for that under
/sys/bus/pci/devices/. vfio-platform takes a similar approach, but
defines the host= parameter to be a string, which can be matched
directly under /sys/bus/platform/devices/. On the PCI side, we have
some interest in using vfio to expose vGPU devices. These are not
actual discrete PCI devices, so they don't have a compatible host PCI
bus address or a device link where QEMU wants to look for it. There's
also really no requirement that vfio can only be used to expose
physical devices, a new vfio bus and iommu driver could expose a
completely emulated device. To fit within the vfio framework, it
would need a kernel struct device and associated IOMMU group, but
those are easy constraints to manage.
To support such devices, which would include vGPUs, that honor the
VFIO PCI programming API, but are not necessarily backed by a unique
PCI address, add support for specifying any device in sysfs. The
vfio API already has support for probing the device type to ensure
compatibility with either vfio-pci or vfio-platform.
With this, a vfio-pci device could either be specified as:
-device vfio-pci,host=02:00.0
or
-device vfio-pci,sysfsdev=/sys/devices/pci0000:00/0000:00:1c.0/0000:02:00.0
or even
-device vfio-pci,sysfsdev=/sys/bus/pci/devices/0000:02:00.0
When vGPU support comes along, this might look something more like:
-device vfio-pci,sysfsdev=/sys/devices/virtual/intel-vgpu/vgpu0@0000:00:02.0
NB - This is only a made up example path
The same change is made for vfio-platform, specifying sysfsdev has
precedence over the old host option.
Tested-by: Eric Auger <eric.auger@linaro.org>
Reviewed-by: Eric Auger <eric.auger@linaro.org>
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
2016-03-10 19:39:07 +03:00
|
|
|
vbasedev->sysfsdev = g_strdup_printf("/sys/bus/platform/devices/%s",
|
|
|
|
vbasedev->name);
|
|
|
|
}
|
2015-06-08 18:25:25 +03:00
|
|
|
|
2023-11-21 11:44:12 +03:00
|
|
|
ret = vfio_device_get_name(vbasedev, errp);
|
|
|
|
if (ret) {
|
|
|
|
return ret;
|
2015-06-08 18:25:25 +03:00
|
|
|
}
|
|
|
|
|
2023-10-09 12:09:10 +03:00
|
|
|
ret = vfio_attach_device(vbasedev->name, vbasedev,
|
|
|
|
&address_space_memory, errp);
|
2015-06-08 18:25:25 +03:00
|
|
|
if (ret) {
|
2016-10-17 19:58:01 +03:00
|
|
|
return ret;
|
2015-06-08 18:25:25 +03:00
|
|
|
}
|
|
|
|
|
2016-10-17 19:58:01 +03:00
|
|
|
ret = vfio_populate_device(vbasedev, errp);
|
2015-06-08 18:25:25 +03:00
|
|
|
if (ret) {
|
2023-10-09 12:09:10 +03:00
|
|
|
vfio_detach_device(vbasedev);
|
2015-06-08 18:25:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* vfio_platform_realize - the device realize function
|
|
|
|
* @dev: device state pointer
|
|
|
|
* @errp: error
|
|
|
|
*
|
|
|
|
* initialize the device, its memory regions and IRQ structures
|
|
|
|
* IRQ are started separately
|
|
|
|
*/
|
|
|
|
static void vfio_platform_realize(DeviceState *dev, Error **errp)
|
|
|
|
{
|
hw/vfio/platform: Fix missing ERRP_GUARD() for error_prepend()
As the comment in qapi/error, passing @errp to error_prepend() requires
ERRP_GUARD():
* = Why, when and how to use ERRP_GUARD() =
*
* Without ERRP_GUARD(), use of the @errp parameter is restricted:
...
* - It should not be passed to error_prepend(), error_vprepend() or
* error_append_hint(), because that doesn't work with &error_fatal.
* ERRP_GUARD() lifts these restrictions.
*
* To use ERRP_GUARD(), add it right at the beginning of the function.
* @errp can then be used without worrying about the argument being
* NULL or &error_fatal.
ERRP_GUARD() could avoid the case when @errp is &error_fatal, the user
can't see this additional information, because exit() happens in
error_setg earlier than information is added [1].
The vfio_platform_realize() passes @errp to error_prepend(), and as a
DeviceClass.realize method, there are too many possible callers to check
the impact of this defect; it may or may not be harmless. Thus it is
necessary to protect @errp with ERRP_GUARD().
To avoid the issue like [1] said, add missing ERRP_GUARD() at the
beginning of this function.
[1]: Issue description in the commit message of commit ae7c80a7bd73
("error: New macro ERRP_GUARD()").
Cc: Alex Williamson <alex.williamson@redhat.com>
Cc: Cédric Le Goater <clg@redhat.com>
Signed-off-by: Zhao Liu <zhao1.liu@intel.com>
Reviewed-by: Cédric Le Goater <clg@redhat.com>
Message-ID: <20240311033822.3142585-25-zhao1.liu@linux.intel.com>
Signed-off-by: Thomas Huth <thuth@redhat.com>
2024-03-11 06:38:17 +03:00
|
|
|
ERRP_GUARD();
|
2015-06-08 18:25:25 +03:00
|
|
|
VFIOPlatformDevice *vdev = VFIO_PLATFORM_DEVICE(dev);
|
|
|
|
SysBusDevice *sbdev = SYS_BUS_DEVICE(dev);
|
|
|
|
VFIODevice *vbasedev = &vdev->vbasedev;
|
|
|
|
int i, ret;
|
|
|
|
|
2018-02-06 21:08:26 +03:00
|
|
|
qemu_mutex_init(&vdev->intp_mutex);
|
|
|
|
|
vfio: Add sysfsdev property for pci & platform
vfio-pci currently requires a host= parameter, which comes in the
form of a PCI address in [domain:]<bus:slot.function> notation. We
expect to find a matching entry in sysfs for that under
/sys/bus/pci/devices/. vfio-platform takes a similar approach, but
defines the host= parameter to be a string, which can be matched
directly under /sys/bus/platform/devices/. On the PCI side, we have
some interest in using vfio to expose vGPU devices. These are not
actual discrete PCI devices, so they don't have a compatible host PCI
bus address or a device link where QEMU wants to look for it. There's
also really no requirement that vfio can only be used to expose
physical devices, a new vfio bus and iommu driver could expose a
completely emulated device. To fit within the vfio framework, it
would need a kernel struct device and associated IOMMU group, but
those are easy constraints to manage.
To support such devices, which would include vGPUs, that honor the
VFIO PCI programming API, but are not necessarily backed by a unique
PCI address, add support for specifying any device in sysfs. The
vfio API already has support for probing the device type to ensure
compatibility with either vfio-pci or vfio-platform.
With this, a vfio-pci device could either be specified as:
-device vfio-pci,host=02:00.0
or
-device vfio-pci,sysfsdev=/sys/devices/pci0000:00/0000:00:1c.0/0000:02:00.0
or even
-device vfio-pci,sysfsdev=/sys/bus/pci/devices/0000:02:00.0
When vGPU support comes along, this might look something more like:
-device vfio-pci,sysfsdev=/sys/devices/virtual/intel-vgpu/vgpu0@0000:00:02.0
NB - This is only a made up example path
The same change is made for vfio-platform, specifying sysfsdev has
precedence over the old host option.
Tested-by: Eric Auger <eric.auger@linaro.org>
Reviewed-by: Eric Auger <eric.auger@linaro.org>
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
2016-03-10 19:39:07 +03:00
|
|
|
trace_vfio_platform_realize(vbasedev->sysfsdev ?
|
|
|
|
vbasedev->sysfsdev : vbasedev->name,
|
|
|
|
vdev->compat);
|
2015-06-08 18:25:25 +03:00
|
|
|
|
2016-10-17 19:58:01 +03:00
|
|
|
ret = vfio_base_device_init(vbasedev, errp);
|
2015-06-08 18:25:25 +03:00
|
|
|
if (ret) {
|
2016-10-17 19:58:01 +03:00
|
|
|
goto out;
|
2015-06-08 18:25:25 +03:00
|
|
|
}
|
|
|
|
|
2018-10-15 19:52:09 +03:00
|
|
|
if (!vdev->compat) {
|
|
|
|
GError *gerr = NULL;
|
|
|
|
gchar *contents;
|
|
|
|
gsize length;
|
|
|
|
char *path;
|
|
|
|
|
|
|
|
path = g_strdup_printf("%s/of_node/compatible", vbasedev->sysfsdev);
|
|
|
|
if (!g_file_get_contents(path, &contents, &length, &gerr)) {
|
|
|
|
error_setg(errp, "%s", gerr->message);
|
|
|
|
g_error_free(gerr);
|
|
|
|
g_free(path);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
g_free(path);
|
|
|
|
vdev->compat = contents;
|
|
|
|
for (vdev->num_compat = 0; length; vdev->num_compat++) {
|
|
|
|
size_t skip = strlen(contents) + 1;
|
|
|
|
contents += skip;
|
|
|
|
length -= skip;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-08 18:25:25 +03:00
|
|
|
for (i = 0; i < vbasedev->num_regions; i++) {
|
2016-03-10 19:39:07 +03:00
|
|
|
if (vfio_region_mmap(vdev->regions[i])) {
|
2018-10-17 11:26:29 +03:00
|
|
|
warn_report("%s mmap unsupported, performance may be slow",
|
|
|
|
memory_region_name(vdev->regions[i]->mem));
|
2016-03-10 19:39:07 +03:00
|
|
|
}
|
|
|
|
sysbus_init_mmio(sbdev, vdev->regions[i]->mem);
|
2015-06-08 18:25:25 +03:00
|
|
|
}
|
2016-10-17 19:58:01 +03:00
|
|
|
out:
|
|
|
|
if (!ret) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (vdev->vbasedev.name) {
|
2018-10-17 11:26:30 +03:00
|
|
|
error_prepend(errp, VFIO_MSG_PREFIX, vdev->vbasedev.name);
|
2016-10-17 19:58:01 +03:00
|
|
|
} else {
|
|
|
|
error_prepend(errp, "vfio error: ");
|
|
|
|
}
|
2015-06-08 18:25:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static const VMStateDescription vfio_platform_vmstate = {
|
2019-05-21 18:15:41 +03:00
|
|
|
.name = "vfio-platform",
|
2015-06-08 18:25:25 +03:00
|
|
|
.unmigratable = 1,
|
|
|
|
};
|
|
|
|
|
|
|
|
static Property vfio_platform_dev_properties[] = {
|
|
|
|
DEFINE_PROP_STRING("host", VFIOPlatformDevice, vbasedev.name),
|
vfio: Add sysfsdev property for pci & platform
vfio-pci currently requires a host= parameter, which comes in the
form of a PCI address in [domain:]<bus:slot.function> notation. We
expect to find a matching entry in sysfs for that under
/sys/bus/pci/devices/. vfio-platform takes a similar approach, but
defines the host= parameter to be a string, which can be matched
directly under /sys/bus/platform/devices/. On the PCI side, we have
some interest in using vfio to expose vGPU devices. These are not
actual discrete PCI devices, so they don't have a compatible host PCI
bus address or a device link where QEMU wants to look for it. There's
also really no requirement that vfio can only be used to expose
physical devices, a new vfio bus and iommu driver could expose a
completely emulated device. To fit within the vfio framework, it
would need a kernel struct device and associated IOMMU group, but
those are easy constraints to manage.
To support such devices, which would include vGPUs, that honor the
VFIO PCI programming API, but are not necessarily backed by a unique
PCI address, add support for specifying any device in sysfs. The
vfio API already has support for probing the device type to ensure
compatibility with either vfio-pci or vfio-platform.
With this, a vfio-pci device could either be specified as:
-device vfio-pci,host=02:00.0
or
-device vfio-pci,sysfsdev=/sys/devices/pci0000:00/0000:00:1c.0/0000:02:00.0
or even
-device vfio-pci,sysfsdev=/sys/bus/pci/devices/0000:02:00.0
When vGPU support comes along, this might look something more like:
-device vfio-pci,sysfsdev=/sys/devices/virtual/intel-vgpu/vgpu0@0000:00:02.0
NB - This is only a made up example path
The same change is made for vfio-platform, specifying sysfsdev has
precedence over the old host option.
Tested-by: Eric Auger <eric.auger@linaro.org>
Reviewed-by: Eric Auger <eric.auger@linaro.org>
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
2016-03-10 19:39:07 +03:00
|
|
|
DEFINE_PROP_STRING("sysfsdev", VFIOPlatformDevice, vbasedev.sysfsdev),
|
2015-09-23 22:04:44 +03:00
|
|
|
DEFINE_PROP_BOOL("x-no-mmap", VFIOPlatformDevice, vbasedev.no_mmap, false),
|
2015-06-08 18:25:26 +03:00
|
|
|
DEFINE_PROP_UINT32("mmap-timeout-ms", VFIOPlatformDevice,
|
|
|
|
mmap_timeout, 1100),
|
2015-07-06 21:15:14 +03:00
|
|
|
DEFINE_PROP_BOOL("x-irqfd", VFIOPlatformDevice, irqfd_allowed, true),
|
2023-11-21 11:44:11 +03:00
|
|
|
#ifdef CONFIG_IOMMUFD
|
|
|
|
DEFINE_PROP_LINK("iommufd", VFIOPlatformDevice, vbasedev.iommufd,
|
|
|
|
TYPE_IOMMUFD_BACKEND, IOMMUFDBackend *),
|
|
|
|
#endif
|
2015-06-08 18:25:25 +03:00
|
|
|
DEFINE_PROP_END_OF_LIST(),
|
|
|
|
};
|
|
|
|
|
2023-11-21 11:44:12 +03:00
|
|
|
static void vfio_platform_instance_init(Object *obj)
|
|
|
|
{
|
|
|
|
VFIOPlatformDevice *vdev = VFIO_PLATFORM_DEVICE(obj);
|
2023-11-21 11:44:22 +03:00
|
|
|
VFIODevice *vbasedev = &vdev->vbasedev;
|
2023-11-21 11:44:12 +03:00
|
|
|
|
2023-11-21 11:44:25 +03:00
|
|
|
vfio_device_init(vbasedev, VFIO_DEVICE_TYPE_PLATFORM, &vfio_platform_ops,
|
|
|
|
DEVICE(vdev), false);
|
2023-11-21 11:44:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_IOMMUFD
|
|
|
|
static void vfio_platform_set_fd(Object *obj, const char *str, Error **errp)
|
|
|
|
{
|
|
|
|
vfio_device_set_fd(&VFIO_PLATFORM_DEVICE(obj)->vbasedev, str, errp);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-06-08 18:25:25 +03:00
|
|
|
static void vfio_platform_class_init(ObjectClass *klass, void *data)
|
|
|
|
{
|
|
|
|
DeviceClass *dc = DEVICE_CLASS(klass);
|
2015-07-06 21:15:14 +03:00
|
|
|
SysBusDeviceClass *sbc = SYS_BUS_DEVICE_CLASS(klass);
|
2015-06-08 18:25:25 +03:00
|
|
|
|
|
|
|
dc->realize = vfio_platform_realize;
|
2020-01-10 18:30:32 +03:00
|
|
|
device_class_set_props(dc, vfio_platform_dev_properties);
|
2023-11-21 11:44:12 +03:00
|
|
|
#ifdef CONFIG_IOMMUFD
|
|
|
|
object_class_property_add_str(klass, "fd", NULL, vfio_platform_set_fd);
|
|
|
|
#endif
|
2015-06-08 18:25:25 +03:00
|
|
|
dc->vmsd = &vfio_platform_vmstate;
|
|
|
|
dc->desc = "VFIO-based platform device assignment";
|
2015-07-06 21:15:14 +03:00
|
|
|
sbc->connect_irq_notifier = vfio_start_irqfd_injection;
|
2015-06-08 18:25:25 +03:00
|
|
|
set_bit(DEVICE_CATEGORY_MISC, dc->categories);
|
2018-10-15 19:52:09 +03:00
|
|
|
/* Supported by TYPE_VIRT_MACHINE */
|
|
|
|
dc->user_creatable = true;
|
2015-06-08 18:25:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static const TypeInfo vfio_platform_dev_info = {
|
|
|
|
.name = TYPE_VFIO_PLATFORM,
|
|
|
|
.parent = TYPE_SYS_BUS_DEVICE,
|
|
|
|
.instance_size = sizeof(VFIOPlatformDevice),
|
2023-11-21 11:44:12 +03:00
|
|
|
.instance_init = vfio_platform_instance_init,
|
2015-06-08 18:25:25 +03:00
|
|
|
.class_init = vfio_platform_class_init,
|
|
|
|
.class_size = sizeof(VFIOPlatformDeviceClass),
|
|
|
|
};
|
|
|
|
|
|
|
|
static void register_vfio_platform_dev_type(void)
|
|
|
|
{
|
|
|
|
type_register_static(&vfio_platform_dev_info);
|
|
|
|
}
|
|
|
|
|
|
|
|
type_init(register_vfio_platform_dev_type)
|