2023-11-21 11:44:00 +03:00
|
|
|
/*
|
|
|
|
* iommufd container backend
|
|
|
|
*
|
|
|
|
* Copyright (C) 2023 Intel Corporation.
|
|
|
|
* Copyright Red Hat, Inc. 2023
|
|
|
|
*
|
|
|
|
* Authors: Yi Liu <yi.l.liu@intel.com>
|
|
|
|
* Eric Auger <eric.auger@redhat.com>
|
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: GPL-2.0-or-later
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "qemu/osdep.h"
|
|
|
|
#include "sysemu/iommufd.h"
|
|
|
|
#include "qapi/error.h"
|
|
|
|
#include "qemu/module.h"
|
|
|
|
#include "qom/object_interfaces.h"
|
|
|
|
#include "qemu/error-report.h"
|
|
|
|
#include "monitor/monitor.h"
|
|
|
|
#include "trace.h"
|
2024-07-23 00:13:19 +03:00
|
|
|
#include "hw/vfio/vfio-common.h"
|
2023-11-21 11:44:00 +03:00
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <linux/iommufd.h>
|
|
|
|
|
|
|
|
static void iommufd_backend_init(Object *obj)
|
|
|
|
{
|
|
|
|
IOMMUFDBackend *be = IOMMUFD_BACKEND(obj);
|
|
|
|
|
|
|
|
be->fd = -1;
|
|
|
|
be->users = 0;
|
|
|
|
be->owned = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iommufd_backend_finalize(Object *obj)
|
|
|
|
{
|
|
|
|
IOMMUFDBackend *be = IOMMUFD_BACKEND(obj);
|
|
|
|
|
|
|
|
if (be->owned) {
|
|
|
|
close(be->fd);
|
|
|
|
be->fd = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iommufd_backend_set_fd(Object *obj, const char *str, Error **errp)
|
|
|
|
{
|
backends/iommufd: Fix missing ERRP_GUARD() for error_prepend()
As the comment in qapi/error, passing @errp to error_prepend() requires
ERRP_GUARD():
* = Why, when and how to use ERRP_GUARD() =
*
* Without ERRP_GUARD(), use of the @errp parameter is restricted:
...
* - It should not be passed to error_prepend(), error_vprepend() or
* error_append_hint(), because that doesn't work with &error_fatal.
* ERRP_GUARD() lifts these restrictions.
*
* To use ERRP_GUARD(), add it right at the beginning of the function.
* @errp can then be used without worrying about the argument being
* NULL or &error_fatal.
ERRP_GUARD() could avoid the case when @errp is &error_fatal, the user
can't see this additional information, because exit() happens in
error_setg earlier than information is added [1].
The iommufd_backend_set_fd() passes @errp to error_prepend(), to avoid
the above issue, add missing ERRP_GUARD() at the beginning of this
function.
[1]: Issue description in the commit message of commit ae7c80a7bd73
("error: New macro ERRP_GUARD()").
Cc: Yi Liu <yi.l.liu@intel.com>
Cc: Eric Auger <eric.auger@redhat.com>
Cc: Zhenzhong Duan <zhenzhong.duan@intel.com>
Signed-off-by: Zhao Liu <zhao1.liu@intel.com>
Reviewed-by: Zhenzhong Duan <zhenzhong.duan@intel.com>
Reviewed-by: Eric Auger <eric.auger@redhat.com>
Message-ID: <20240311033822.3142585-3-zhao1.liu@linux.intel.com>
Signed-off-by: Thomas Huth <thuth@redhat.com>
2024-03-11 06:37:55 +03:00
|
|
|
ERRP_GUARD();
|
2023-11-21 11:44:00 +03:00
|
|
|
IOMMUFDBackend *be = IOMMUFD_BACKEND(obj);
|
|
|
|
int fd = -1;
|
|
|
|
|
|
|
|
fd = monitor_fd_param(monitor_cur(), str, errp);
|
|
|
|
if (fd == -1) {
|
|
|
|
error_prepend(errp, "Could not parse remote object fd %s:", str);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
be->fd = fd;
|
|
|
|
be->owned = false;
|
|
|
|
trace_iommu_backend_set_fd(be->fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool iommufd_backend_can_be_deleted(UserCreatable *uc)
|
|
|
|
{
|
|
|
|
IOMMUFDBackend *be = IOMMUFD_BACKEND(uc);
|
|
|
|
|
|
|
|
return !be->users;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iommufd_backend_class_init(ObjectClass *oc, void *data)
|
|
|
|
{
|
|
|
|
UserCreatableClass *ucc = USER_CREATABLE_CLASS(oc);
|
|
|
|
|
|
|
|
ucc->can_be_deleted = iommufd_backend_can_be_deleted;
|
|
|
|
|
|
|
|
object_class_property_add_str(oc, "fd", NULL, iommufd_backend_set_fd);
|
|
|
|
}
|
|
|
|
|
2024-05-07 09:42:52 +03:00
|
|
|
bool iommufd_backend_connect(IOMMUFDBackend *be, Error **errp)
|
2023-11-21 11:44:00 +03:00
|
|
|
{
|
2024-05-07 09:42:52 +03:00
|
|
|
int fd;
|
2023-11-21 11:44:00 +03:00
|
|
|
|
|
|
|
if (be->owned && !be->users) {
|
2024-07-15 11:21:54 +03:00
|
|
|
fd = qemu_open("/dev/iommu", O_RDWR, errp);
|
2023-11-21 11:44:00 +03:00
|
|
|
if (fd < 0) {
|
2024-05-07 09:42:52 +03:00
|
|
|
return false;
|
2023-11-21 11:44:00 +03:00
|
|
|
}
|
|
|
|
be->fd = fd;
|
|
|
|
}
|
|
|
|
be->users++;
|
2024-05-07 09:42:52 +03:00
|
|
|
|
|
|
|
trace_iommufd_backend_connect(be->fd, be->owned, be->users);
|
|
|
|
return true;
|
2023-11-21 11:44:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void iommufd_backend_disconnect(IOMMUFDBackend *be)
|
|
|
|
{
|
|
|
|
if (!be->users) {
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
be->users--;
|
|
|
|
if (!be->users && be->owned) {
|
|
|
|
close(be->fd);
|
|
|
|
be->fd = -1;
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
trace_iommufd_backend_disconnect(be->fd, be->users);
|
|
|
|
}
|
|
|
|
|
2024-05-07 09:42:52 +03:00
|
|
|
bool iommufd_backend_alloc_ioas(IOMMUFDBackend *be, uint32_t *ioas_id,
|
|
|
|
Error **errp)
|
2023-11-21 11:44:00 +03:00
|
|
|
{
|
2024-05-07 09:42:52 +03:00
|
|
|
int fd = be->fd;
|
2023-11-21 11:44:00 +03:00
|
|
|
struct iommu_ioas_alloc alloc_data = {
|
|
|
|
.size = sizeof(alloc_data),
|
|
|
|
.flags = 0,
|
|
|
|
};
|
|
|
|
|
2024-05-07 09:42:52 +03:00
|
|
|
if (ioctl(fd, IOMMU_IOAS_ALLOC, &alloc_data)) {
|
2023-11-21 11:44:00 +03:00
|
|
|
error_setg_errno(errp, errno, "Failed to allocate ioas");
|
2024-05-07 09:42:52 +03:00
|
|
|
return false;
|
2023-11-21 11:44:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
*ioas_id = alloc_data.out_ioas_id;
|
2024-05-07 09:42:52 +03:00
|
|
|
trace_iommufd_backend_alloc_ioas(fd, *ioas_id);
|
2023-11-21 11:44:00 +03:00
|
|
|
|
2024-05-07 09:42:52 +03:00
|
|
|
return true;
|
2023-11-21 11:44:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void iommufd_backend_free_id(IOMMUFDBackend *be, uint32_t id)
|
|
|
|
{
|
|
|
|
int ret, fd = be->fd;
|
|
|
|
struct iommu_destroy des = {
|
|
|
|
.size = sizeof(des),
|
|
|
|
.id = id,
|
|
|
|
};
|
|
|
|
|
|
|
|
ret = ioctl(fd, IOMMU_DESTROY, &des);
|
|
|
|
trace_iommufd_backend_free_id(fd, id, ret);
|
|
|
|
if (ret) {
|
|
|
|
error_report("Failed to free id: %u %m", id);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int iommufd_backend_map_dma(IOMMUFDBackend *be, uint32_t ioas_id, hwaddr iova,
|
|
|
|
ram_addr_t size, void *vaddr, bool readonly)
|
|
|
|
{
|
|
|
|
int ret, fd = be->fd;
|
|
|
|
struct iommu_ioas_map map = {
|
|
|
|
.size = sizeof(map),
|
|
|
|
.flags = IOMMU_IOAS_MAP_READABLE |
|
|
|
|
IOMMU_IOAS_MAP_FIXED_IOVA,
|
|
|
|
.ioas_id = ioas_id,
|
|
|
|
.__reserved = 0,
|
|
|
|
.user_va = (uintptr_t)vaddr,
|
|
|
|
.iova = iova,
|
|
|
|
.length = size,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (!readonly) {
|
|
|
|
map.flags |= IOMMU_IOAS_MAP_WRITEABLE;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = ioctl(fd, IOMMU_IOAS_MAP, &map);
|
|
|
|
trace_iommufd_backend_map_dma(fd, ioas_id, iova, size,
|
|
|
|
vaddr, readonly, ret);
|
|
|
|
if (ret) {
|
|
|
|
ret = -errno;
|
|
|
|
|
|
|
|
/* TODO: Not support mapping hardware PCI BAR region for now. */
|
|
|
|
if (errno == EFAULT) {
|
|
|
|
warn_report("IOMMU_IOAS_MAP failed: %m, PCI BAR?");
|
|
|
|
} else {
|
|
|
|
error_report("IOMMU_IOAS_MAP failed: %m");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int iommufd_backend_unmap_dma(IOMMUFDBackend *be, uint32_t ioas_id,
|
|
|
|
hwaddr iova, ram_addr_t size)
|
|
|
|
{
|
|
|
|
int ret, fd = be->fd;
|
|
|
|
struct iommu_ioas_unmap unmap = {
|
|
|
|
.size = sizeof(unmap),
|
|
|
|
.ioas_id = ioas_id,
|
|
|
|
.iova = iova,
|
|
|
|
.length = size,
|
|
|
|
};
|
|
|
|
|
|
|
|
ret = ioctl(fd, IOMMU_IOAS_UNMAP, &unmap);
|
|
|
|
/*
|
|
|
|
* IOMMUFD takes mapping as some kind of object, unmapping
|
|
|
|
* nonexistent mapping is treated as deleting a nonexistent
|
|
|
|
* object and return ENOENT. This is different from legacy
|
|
|
|
* backend which allows it. vIOMMU may trigger a lot of
|
|
|
|
* redundant unmapping, to avoid flush the log, treat them
|
|
|
|
* as succeess for IOMMUFD just like legacy backend.
|
|
|
|
*/
|
|
|
|
if (ret && errno == ENOENT) {
|
|
|
|
trace_iommufd_backend_unmap_dma_non_exist(fd, ioas_id, iova, size, ret);
|
|
|
|
ret = 0;
|
|
|
|
} else {
|
|
|
|
trace_iommufd_backend_unmap_dma(fd, ioas_id, iova, size, ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret) {
|
|
|
|
ret = -errno;
|
|
|
|
error_report("IOMMU_IOAS_UNMAP failed: %m");
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2024-07-23 00:13:18 +03:00
|
|
|
bool iommufd_backend_alloc_hwpt(IOMMUFDBackend *be, uint32_t dev_id,
|
|
|
|
uint32_t pt_id, uint32_t flags,
|
|
|
|
uint32_t data_type, uint32_t data_len,
|
|
|
|
void *data_ptr, uint32_t *out_hwpt,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
int ret, fd = be->fd;
|
|
|
|
struct iommu_hwpt_alloc alloc_hwpt = {
|
|
|
|
.size = sizeof(struct iommu_hwpt_alloc),
|
|
|
|
.flags = flags,
|
|
|
|
.dev_id = dev_id,
|
|
|
|
.pt_id = pt_id,
|
|
|
|
.data_type = data_type,
|
|
|
|
.data_len = data_len,
|
|
|
|
.data_uptr = (uintptr_t)data_ptr,
|
|
|
|
};
|
|
|
|
|
|
|
|
ret = ioctl(fd, IOMMU_HWPT_ALLOC, &alloc_hwpt);
|
|
|
|
trace_iommufd_backend_alloc_hwpt(fd, dev_id, pt_id, flags, data_type,
|
|
|
|
data_len, (uintptr_t)data_ptr,
|
|
|
|
alloc_hwpt.out_hwpt_id, ret);
|
|
|
|
if (ret) {
|
|
|
|
error_setg_errno(errp, errno, "Failed to allocate hwpt");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
*out_hwpt = alloc_hwpt.out_hwpt_id;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2024-07-23 00:13:23 +03:00
|
|
|
bool iommufd_backend_set_dirty_tracking(IOMMUFDBackend *be,
|
|
|
|
uint32_t hwpt_id, bool start,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct iommu_hwpt_set_dirty_tracking set_dirty = {
|
|
|
|
.size = sizeof(set_dirty),
|
|
|
|
.hwpt_id = hwpt_id,
|
|
|
|
.flags = start ? IOMMU_HWPT_DIRTY_TRACKING_ENABLE : 0,
|
|
|
|
};
|
|
|
|
|
|
|
|
ret = ioctl(be->fd, IOMMU_HWPT_SET_DIRTY_TRACKING, &set_dirty);
|
|
|
|
trace_iommufd_backend_set_dirty(be->fd, hwpt_id, start, ret ? errno : 0);
|
|
|
|
if (ret) {
|
|
|
|
error_setg_errno(errp, errno,
|
|
|
|
"IOMMU_HWPT_SET_DIRTY_TRACKING(hwpt_id %u) failed",
|
|
|
|
hwpt_id);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2024-07-23 00:13:24 +03:00
|
|
|
bool iommufd_backend_get_dirty_bitmap(IOMMUFDBackend *be,
|
|
|
|
uint32_t hwpt_id,
|
|
|
|
uint64_t iova, ram_addr_t size,
|
|
|
|
uint64_t page_size, uint64_t *data,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct iommu_hwpt_get_dirty_bitmap get_dirty_bitmap = {
|
|
|
|
.size = sizeof(get_dirty_bitmap),
|
|
|
|
.hwpt_id = hwpt_id,
|
|
|
|
.iova = iova,
|
|
|
|
.length = size,
|
|
|
|
.page_size = page_size,
|
|
|
|
.data = (uintptr_t)data,
|
|
|
|
};
|
|
|
|
|
|
|
|
ret = ioctl(be->fd, IOMMU_HWPT_GET_DIRTY_BITMAP, &get_dirty_bitmap);
|
|
|
|
trace_iommufd_backend_get_dirty_bitmap(be->fd, hwpt_id, iova, size,
|
|
|
|
page_size, ret ? errno : 0);
|
|
|
|
if (ret) {
|
|
|
|
error_setg_errno(errp, errno,
|
|
|
|
"IOMMU_HWPT_GET_DIRTY_BITMAP (iova: 0x%"HWADDR_PRIx
|
|
|
|
" size: 0x"RAM_ADDR_FMT") failed", iova, size);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2024-06-05 11:30:33 +03:00
|
|
|
bool iommufd_backend_get_device_info(IOMMUFDBackend *be, uint32_t devid,
|
|
|
|
uint32_t *type, void *data, uint32_t len,
|
2024-07-19 15:04:51 +03:00
|
|
|
uint64_t *caps, Error **errp)
|
2024-06-05 11:30:33 +03:00
|
|
|
{
|
|
|
|
struct iommu_hw_info info = {
|
|
|
|
.size = sizeof(info),
|
|
|
|
.dev_id = devid,
|
|
|
|
.data_len = len,
|
|
|
|
.data_uptr = (uintptr_t)data,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (ioctl(be->fd, IOMMU_GET_HW_INFO, &info)) {
|
|
|
|
error_setg_errno(errp, errno, "Failed to get hardware info");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
g_assert(type);
|
|
|
|
*type = info.out_data_type;
|
2024-07-19 15:04:51 +03:00
|
|
|
g_assert(caps);
|
|
|
|
*caps = info.out_capabilities;
|
2024-06-05 11:30:33 +03:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2024-06-05 11:30:36 +03:00
|
|
|
static int hiod_iommufd_get_cap(HostIOMMUDevice *hiod, int cap, Error **errp)
|
|
|
|
{
|
|
|
|
HostIOMMUDeviceCaps *caps = &hiod->caps;
|
|
|
|
|
|
|
|
switch (cap) {
|
|
|
|
case HOST_IOMMU_DEVICE_CAP_IOMMU_TYPE:
|
|
|
|
return caps->type;
|
|
|
|
case HOST_IOMMU_DEVICE_CAP_AW_BITS:
|
2024-07-23 00:13:19 +03:00
|
|
|
return vfio_device_get_aw_bits(hiod->agent);
|
2024-06-05 11:30:36 +03:00
|
|
|
default:
|
|
|
|
error_setg(errp, "%s: unsupported capability %x", hiod->name, cap);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hiod_iommufd_class_init(ObjectClass *oc, void *data)
|
|
|
|
{
|
|
|
|
HostIOMMUDeviceClass *hioc = HOST_IOMMU_DEVICE_CLASS(oc);
|
|
|
|
|
|
|
|
hioc->get_cap = hiod_iommufd_get_cap;
|
|
|
|
};
|
|
|
|
|
2024-06-05 11:30:30 +03:00
|
|
|
static const TypeInfo types[] = {
|
|
|
|
{
|
|
|
|
.name = TYPE_IOMMUFD_BACKEND,
|
|
|
|
.parent = TYPE_OBJECT,
|
|
|
|
.instance_size = sizeof(IOMMUFDBackend),
|
|
|
|
.instance_init = iommufd_backend_init,
|
|
|
|
.instance_finalize = iommufd_backend_finalize,
|
|
|
|
.class_size = sizeof(IOMMUFDBackendClass),
|
|
|
|
.class_init = iommufd_backend_class_init,
|
|
|
|
.interfaces = (InterfaceInfo[]) {
|
|
|
|
{ TYPE_USER_CREATABLE },
|
|
|
|
{ }
|
|
|
|
}
|
|
|
|
}, {
|
|
|
|
.name = TYPE_HOST_IOMMU_DEVICE_IOMMUFD,
|
|
|
|
.parent = TYPE_HOST_IOMMU_DEVICE,
|
2024-06-05 11:30:36 +03:00
|
|
|
.class_init = hiod_iommufd_class_init,
|
2024-06-05 11:30:30 +03:00
|
|
|
.abstract = true,
|
2023-11-21 11:44:00 +03:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2024-06-05 11:30:30 +03:00
|
|
|
DEFINE_TYPES(types)
|