03451953c7
ISM device firmware stores unique state information that can
can cause a wholesale unmap of the associated IOMMU (e.g. when
we get a termination signal for QEMU) to trigger firmware errors
because firmware believes we are attempting to invalidate entries
that are still in-use by the guest OS (when in fact that guest is
in the process of being terminated or rebooted).
To alleviate this, register both a shutdown notifier (for unexpected
termination cases e.g. virsh destroy) as well as a reset callback
(for cases like guest OS reboot). For each of these scenarios, trigger
PCI device reset; this is enough to indicate to firmware that the IOMMU
is no longer in-use by the guest OS, making it safe to invalidate any
associated IOMMU entries.
Fixes: 15d0e7942d
("s390x/pci: don't fence interpreted devices without MSI-X")
Signed-off-by: Matthew Rosato <mjrosato@linux.ibm.com>
Message-Id: <20221209195700.263824-1-mjrosato@linux.ibm.com>
Reviewed-by: Eric Farman <farman@linux.ibm.com>
[thuth: Adjusted the hunk in s390-pci-vfio.c due to different context]
Signed-off-by: Thomas Huth <thuth@redhat.com>
378 lines
12 KiB
C
378 lines
12 KiB
C
/*
|
|
* s390 vfio-pci interfaces
|
|
*
|
|
* Copyright 2020 IBM Corp.
|
|
* Author(s): Matthew Rosato <mjrosato@linux.ibm.com>
|
|
*
|
|
* This work is licensed under the terms of the GNU GPL, version 2 or (at
|
|
* your option) any later version. See the COPYING file in the top-level
|
|
* directory.
|
|
*/
|
|
|
|
#include "qemu/osdep.h"
|
|
|
|
#include <sys/ioctl.h>
|
|
#include <linux/vfio.h>
|
|
#include <linux/vfio_zdev.h>
|
|
|
|
#include "trace.h"
|
|
#include "hw/s390x/s390-pci-bus.h"
|
|
#include "hw/s390x/s390-pci-clp.h"
|
|
#include "hw/s390x/s390-pci-vfio.h"
|
|
#include "hw/vfio/pci.h"
|
|
#include "hw/vfio/vfio-common.h"
|
|
|
|
/*
|
|
* Get the current DMA available count from vfio. Returns true if vfio is
|
|
* limiting DMA requests, false otherwise. The current available count read
|
|
* from vfio is returned in avail.
|
|
*/
|
|
bool s390_pci_update_dma_avail(int fd, unsigned int *avail)
|
|
{
|
|
uint32_t argsz = sizeof(struct vfio_iommu_type1_info);
|
|
g_autofree struct vfio_iommu_type1_info *info = g_malloc0(argsz);
|
|
|
|
assert(avail);
|
|
|
|
/*
|
|
* If the specified argsz is not large enough to contain all capabilities
|
|
* it will be updated upon return from the ioctl. Retry until we have
|
|
* a big enough buffer to hold the entire capability chain.
|
|
*/
|
|
retry:
|
|
info->argsz = argsz;
|
|
|
|
if (ioctl(fd, VFIO_IOMMU_GET_INFO, info)) {
|
|
return false;
|
|
}
|
|
|
|
if (info->argsz > argsz) {
|
|
argsz = info->argsz;
|
|
info = g_realloc(info, argsz);
|
|
goto retry;
|
|
}
|
|
|
|
/* If the capability exists, update with the current value */
|
|
return vfio_get_info_dma_avail(info, avail);
|
|
}
|
|
|
|
S390PCIDMACount *s390_pci_start_dma_count(S390pciState *s,
|
|
S390PCIBusDevice *pbdev)
|
|
{
|
|
S390PCIDMACount *cnt;
|
|
uint32_t avail;
|
|
VFIOPCIDevice *vpdev = container_of(pbdev->pdev, VFIOPCIDevice, pdev);
|
|
int id;
|
|
|
|
assert(vpdev);
|
|
|
|
id = vpdev->vbasedev.group->container->fd;
|
|
|
|
if (!s390_pci_update_dma_avail(id, &avail)) {
|
|
return NULL;
|
|
}
|
|
|
|
QTAILQ_FOREACH(cnt, &s->zpci_dma_limit, link) {
|
|
if (cnt->id == id) {
|
|
cnt->users++;
|
|
return cnt;
|
|
}
|
|
}
|
|
|
|
cnt = g_new0(S390PCIDMACount, 1);
|
|
cnt->id = id;
|
|
cnt->users = 1;
|
|
cnt->avail = avail;
|
|
QTAILQ_INSERT_TAIL(&s->zpci_dma_limit, cnt, link);
|
|
pbdev->iommu->max_dma_limit = avail;
|
|
return cnt;
|
|
}
|
|
|
|
void s390_pci_end_dma_count(S390pciState *s, S390PCIDMACount *cnt)
|
|
{
|
|
assert(cnt);
|
|
|
|
cnt->users--;
|
|
if (cnt->users == 0) {
|
|
QTAILQ_REMOVE(&s->zpci_dma_limit, cnt, link);
|
|
}
|
|
}
|
|
|
|
static void s390_pci_read_base(S390PCIBusDevice *pbdev,
|
|
struct vfio_device_info *info)
|
|
{
|
|
struct vfio_info_cap_header *hdr;
|
|
struct vfio_device_info_cap_zpci_base *cap;
|
|
VFIOPCIDevice *vpci = container_of(pbdev->pdev, VFIOPCIDevice, pdev);
|
|
uint64_t vfio_size;
|
|
|
|
hdr = vfio_get_device_info_cap(info, VFIO_DEVICE_INFO_CAP_ZPCI_BASE);
|
|
|
|
/* If capability not provided, just leave the defaults in place */
|
|
if (hdr == NULL) {
|
|
trace_s390_pci_clp_cap(vpci->vbasedev.name,
|
|
VFIO_DEVICE_INFO_CAP_ZPCI_BASE);
|
|
return;
|
|
}
|
|
cap = (void *) hdr;
|
|
|
|
pbdev->zpci_fn.sdma = cap->start_dma;
|
|
pbdev->zpci_fn.edma = cap->end_dma;
|
|
pbdev->zpci_fn.pchid = cap->pchid;
|
|
pbdev->zpci_fn.vfn = cap->vfn;
|
|
pbdev->zpci_fn.pfgid = cap->gid;
|
|
/* The following values remain 0 until we support other FMB formats */
|
|
pbdev->zpci_fn.fmbl = 0;
|
|
pbdev->zpci_fn.pft = 0;
|
|
/* Store function type separately for type-specific behavior */
|
|
pbdev->pft = cap->pft;
|
|
|
|
/*
|
|
* If appropriate, reduce the size of the supported DMA aperture reported
|
|
* to the guest based upon the vfio DMA limit.
|
|
*/
|
|
vfio_size = pbdev->iommu->max_dma_limit << TARGET_PAGE_BITS;
|
|
if (vfio_size < (cap->end_dma - cap->start_dma + 1)) {
|
|
pbdev->zpci_fn.edma = cap->start_dma + vfio_size - 1;
|
|
}
|
|
}
|
|
|
|
static bool get_host_fh(S390PCIBusDevice *pbdev, struct vfio_device_info *info,
|
|
uint32_t *fh)
|
|
{
|
|
struct vfio_info_cap_header *hdr;
|
|
struct vfio_device_info_cap_zpci_base *cap;
|
|
VFIOPCIDevice *vpci = container_of(pbdev->pdev, VFIOPCIDevice, pdev);
|
|
|
|
hdr = vfio_get_device_info_cap(info, VFIO_DEVICE_INFO_CAP_ZPCI_BASE);
|
|
|
|
/* Can only get the host fh with version 2 or greater */
|
|
if (hdr == NULL || hdr->version < 2) {
|
|
trace_s390_pci_clp_cap(vpci->vbasedev.name,
|
|
VFIO_DEVICE_INFO_CAP_ZPCI_BASE);
|
|
return false;
|
|
}
|
|
cap = (void *) hdr;
|
|
|
|
*fh = cap->fh;
|
|
return true;
|
|
}
|
|
|
|
static void s390_pci_read_group(S390PCIBusDevice *pbdev,
|
|
struct vfio_device_info *info)
|
|
{
|
|
struct vfio_info_cap_header *hdr;
|
|
struct vfio_device_info_cap_zpci_group *cap;
|
|
S390pciState *s = s390_get_phb();
|
|
ClpRspQueryPciGrp *resgrp;
|
|
VFIOPCIDevice *vpci = container_of(pbdev->pdev, VFIOPCIDevice, pdev);
|
|
uint8_t start_gid = pbdev->zpci_fn.pfgid;
|
|
|
|
hdr = vfio_get_device_info_cap(info, VFIO_DEVICE_INFO_CAP_ZPCI_GROUP);
|
|
|
|
/*
|
|
* If capability not provided or the underlying hostdev is simulated, just
|
|
* use the default group.
|
|
*/
|
|
if (hdr == NULL || pbdev->zpci_fn.pfgid >= ZPCI_SIM_GRP_START) {
|
|
trace_s390_pci_clp_cap(vpci->vbasedev.name,
|
|
VFIO_DEVICE_INFO_CAP_ZPCI_GROUP);
|
|
pbdev->zpci_fn.pfgid = ZPCI_DEFAULT_FN_GRP;
|
|
pbdev->pci_group = s390_group_find(ZPCI_DEFAULT_FN_GRP);
|
|
return;
|
|
}
|
|
cap = (void *) hdr;
|
|
|
|
/*
|
|
* For an intercept device, let's use an existing simulated group if one
|
|
* one was already created for other intercept devices in this group.
|
|
* If not, create a new simulated group if any are still available.
|
|
* If all else fails, just fall back on the default group.
|
|
*/
|
|
if (!pbdev->interp) {
|
|
pbdev->pci_group = s390_group_find_host_sim(pbdev->zpci_fn.pfgid);
|
|
if (pbdev->pci_group) {
|
|
/* Use existing simulated group */
|
|
pbdev->zpci_fn.pfgid = pbdev->pci_group->id;
|
|
return;
|
|
} else {
|
|
if (s->next_sim_grp == ZPCI_DEFAULT_FN_GRP) {
|
|
/* All out of simulated groups, use default */
|
|
trace_s390_pci_clp_cap(vpci->vbasedev.name,
|
|
VFIO_DEVICE_INFO_CAP_ZPCI_GROUP);
|
|
pbdev->zpci_fn.pfgid = ZPCI_DEFAULT_FN_GRP;
|
|
pbdev->pci_group = s390_group_find(ZPCI_DEFAULT_FN_GRP);
|
|
return;
|
|
} else {
|
|
/* We can assign a new simulated group */
|
|
pbdev->zpci_fn.pfgid = s->next_sim_grp;
|
|
s->next_sim_grp++;
|
|
/* Fall through to create the new sim group using CLP info */
|
|
}
|
|
}
|
|
}
|
|
|
|
/* See if the PCI group is already defined, create if not */
|
|
pbdev->pci_group = s390_group_find(pbdev->zpci_fn.pfgid);
|
|
|
|
if (!pbdev->pci_group) {
|
|
pbdev->pci_group = s390_group_create(pbdev->zpci_fn.pfgid, start_gid);
|
|
|
|
resgrp = &pbdev->pci_group->zpci_group;
|
|
if (cap->flags & VFIO_DEVICE_INFO_ZPCI_FLAG_REFRESH) {
|
|
resgrp->fr = 1;
|
|
}
|
|
resgrp->dasm = cap->dasm;
|
|
resgrp->msia = cap->msi_addr;
|
|
resgrp->mui = cap->mui;
|
|
resgrp->i = cap->noi;
|
|
if (pbdev->interp && hdr->version >= 2) {
|
|
resgrp->maxstbl = cap->imaxstbl;
|
|
} else {
|
|
resgrp->maxstbl = cap->maxstbl;
|
|
}
|
|
resgrp->version = cap->version;
|
|
resgrp->dtsm = ZPCI_DTSM;
|
|
}
|
|
}
|
|
|
|
static void s390_pci_read_util(S390PCIBusDevice *pbdev,
|
|
struct vfio_device_info *info)
|
|
{
|
|
struct vfio_info_cap_header *hdr;
|
|
struct vfio_device_info_cap_zpci_util *cap;
|
|
VFIOPCIDevice *vpci = container_of(pbdev->pdev, VFIOPCIDevice, pdev);
|
|
|
|
hdr = vfio_get_device_info_cap(info, VFIO_DEVICE_INFO_CAP_ZPCI_UTIL);
|
|
|
|
/* If capability not provided, just leave the defaults in place */
|
|
if (hdr == NULL) {
|
|
trace_s390_pci_clp_cap(vpci->vbasedev.name,
|
|
VFIO_DEVICE_INFO_CAP_ZPCI_UTIL);
|
|
return;
|
|
}
|
|
cap = (void *) hdr;
|
|
|
|
if (cap->size > CLP_UTIL_STR_LEN) {
|
|
trace_s390_pci_clp_cap_size(vpci->vbasedev.name, cap->size,
|
|
VFIO_DEVICE_INFO_CAP_ZPCI_UTIL);
|
|
return;
|
|
}
|
|
|
|
pbdev->zpci_fn.flags |= CLP_RSP_QPCI_MASK_UTIL;
|
|
memcpy(pbdev->zpci_fn.util_str, cap->util_str, CLP_UTIL_STR_LEN);
|
|
}
|
|
|
|
static void s390_pci_read_pfip(S390PCIBusDevice *pbdev,
|
|
struct vfio_device_info *info)
|
|
{
|
|
struct vfio_info_cap_header *hdr;
|
|
struct vfio_device_info_cap_zpci_pfip *cap;
|
|
VFIOPCIDevice *vpci = container_of(pbdev->pdev, VFIOPCIDevice, pdev);
|
|
|
|
hdr = vfio_get_device_info_cap(info, VFIO_DEVICE_INFO_CAP_ZPCI_PFIP);
|
|
|
|
/* If capability not provided, just leave the defaults in place */
|
|
if (hdr == NULL) {
|
|
trace_s390_pci_clp_cap(vpci->vbasedev.name,
|
|
VFIO_DEVICE_INFO_CAP_ZPCI_PFIP);
|
|
return;
|
|
}
|
|
cap = (void *) hdr;
|
|
|
|
if (cap->size > CLP_PFIP_NR_SEGMENTS) {
|
|
trace_s390_pci_clp_cap_size(vpci->vbasedev.name, cap->size,
|
|
VFIO_DEVICE_INFO_CAP_ZPCI_PFIP);
|
|
return;
|
|
}
|
|
|
|
memcpy(pbdev->zpci_fn.pfip, cap->pfip, CLP_PFIP_NR_SEGMENTS);
|
|
}
|
|
|
|
static struct vfio_device_info *get_device_info(S390PCIBusDevice *pbdev,
|
|
uint32_t argsz)
|
|
{
|
|
struct vfio_device_info *info = g_malloc0(argsz);
|
|
VFIOPCIDevice *vfio_pci;
|
|
int fd;
|
|
|
|
vfio_pci = container_of(pbdev->pdev, VFIOPCIDevice, pdev);
|
|
fd = vfio_pci->vbasedev.fd;
|
|
|
|
/*
|
|
* If the specified argsz is not large enough to contain all capabilities
|
|
* it will be updated upon return from the ioctl. Retry until we have
|
|
* a big enough buffer to hold the entire capability chain. On error,
|
|
* just exit and rely on CLP defaults.
|
|
*/
|
|
retry:
|
|
info->argsz = argsz;
|
|
|
|
if (ioctl(fd, VFIO_DEVICE_GET_INFO, info)) {
|
|
trace_s390_pci_clp_dev_info(vfio_pci->vbasedev.name);
|
|
g_free(info);
|
|
return NULL;
|
|
}
|
|
|
|
if (info->argsz > argsz) {
|
|
argsz = info->argsz;
|
|
info = g_realloc(info, argsz);
|
|
goto retry;
|
|
}
|
|
|
|
return info;
|
|
}
|
|
|
|
/*
|
|
* Get the host function handle from the vfio CLP capabilities chain. Returns
|
|
* true if a fh value was placed into the provided buffer. Returns false
|
|
* if a fh could not be obtained (ioctl failed or capability version does
|
|
* not include the fh)
|
|
*/
|
|
bool s390_pci_get_host_fh(S390PCIBusDevice *pbdev, uint32_t *fh)
|
|
{
|
|
g_autofree struct vfio_device_info *info = NULL;
|
|
|
|
assert(fh);
|
|
|
|
info = get_device_info(pbdev, sizeof(*info));
|
|
if (!info) {
|
|
return false;
|
|
}
|
|
|
|
return get_host_fh(pbdev, info, fh);
|
|
}
|
|
|
|
/*
|
|
* This function will issue the VFIO_DEVICE_GET_INFO ioctl and look for
|
|
* capabilities that contain information about CLP features provided by the
|
|
* underlying host.
|
|
* On entry, defaults have already been placed into the guest CLP response
|
|
* buffers. On exit, defaults will have been overwritten for any CLP features
|
|
* found in the capability chain; defaults will remain for any CLP features not
|
|
* found in the chain.
|
|
*/
|
|
void s390_pci_get_clp_info(S390PCIBusDevice *pbdev)
|
|
{
|
|
g_autofree struct vfio_device_info *info = NULL;
|
|
|
|
info = get_device_info(pbdev, sizeof(*info));
|
|
if (!info) {
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* Find the CLP features provided and fill in the guest CLP responses.
|
|
* Always call s390_pci_read_base first as information from this could
|
|
* determine which function group is used in s390_pci_read_group.
|
|
* For any feature not found, the default values will remain in the CLP
|
|
* response.
|
|
*/
|
|
s390_pci_read_base(pbdev, info);
|
|
s390_pci_read_group(pbdev, info);
|
|
s390_pci_read_util(pbdev, info);
|
|
s390_pci_read_pfip(pbdev, info);
|
|
|
|
return;
|
|
}
|