From patchwork Mon Oct 9 09:09:02 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Eric Auger X-Patchwork-Id: 1845093 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=K9z9k9vI; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org (client-ip=209.51.188.17; helo=lists.gnu.org; envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org; receiver=patchwork.ozlabs.org) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4S3tZK4GFyz1yq7 for ; Mon, 9 Oct 2023 20:11:37 +1100 (AEDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1qpmI4-0002Ql-17; Mon, 09 Oct 2023 05:11:04 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qpmHx-0002Pz-C3 for qemu-devel@nongnu.org; Mon, 09 Oct 2023 05:10:57 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qpmHv-0007gc-CQ for qemu-devel@nongnu.org; Mon, 09 Oct 2023 05:10:57 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1696842653; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=EqCtGt5AXaWt2jDZiVdXgTe993Zvb1VTVy/rtn53qdQ=; b=K9z9k9vIIc8cdbDzFQ9p+eCsfGn6Q672jtoJs63SNKl6hzPe8d67igRCJNIBGHmHfTKs0J MmWfODVEjHoSJmXjP3kMkNI39v1CN8vGUtJidvgcY5UI8YJwYYSClM9TzA1ruBhQs2tiP1 euR1/9aY+jjKHTDFAni8wdAd3Ktck2g= Received: from mimecast-mx02.redhat.com (mx-ext.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-564-br3zNs29Ofi-uXqADQN_Lw-1; Mon, 09 Oct 2023 05:10:41 -0400 X-MC-Unique: br3zNs29Ofi-uXqADQN_Lw-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id E38B929AB45D; Mon, 9 Oct 2023 09:10:40 +0000 (UTC) Received: from laptop.redhat.com (unknown [10.39.192.172]) by smtp.corp.redhat.com (Postfix) with ESMTP id BBC6363F50; Mon, 9 Oct 2023 09:10:37 +0000 (UTC) From: Eric Auger To: eric.auger.pro@gmail.com, eric.auger@redhat.com, qemu-devel@nongnu.org, zhenzhong.duan@intel.com, alex.williamson@redhat.com, clg@redhat.com, jgg@nvidia.com, nicolinc@nvidia.com, joao.m.martins@oracle.com, peterx@redhat.com, kevin.tian@intel.com, yi.l.liu@intel.com, yi.y.sun@intel.com, chao.p.peng@intel.com, mjrosato@linux.ibm.com, aik@ozlabs.ru Subject: [PATCH v5 00/15] Prerequisite changes for IOMMUFD support Date: Mon, 9 Oct 2023 11:09:02 +0200 Message-ID: <20231009091035.433329-1-eric.auger@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.5 Received-SPF: pass client-ip=170.10.133.124; envelope-from=eric.auger@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Hi All, This is the v5 respin of the IOMMUFD prerequisite series. This applies on top of vfio-next: https://github.com/legoater/qemu/, branch vfio-next. Per Cédric's suggestion, the IOMMUFD patchset v1[1] is now split into two series, this prerequisite series and the new IOMMUFD backend introduction support series. Hopefully this will ease the review. The main purpose of this series is to make "common.c" group agnostic: all group related code are moved into container.c. Then we are prepared for next series, abstract base container, adding new backend, etc. This series can be found at https://github.com/eauger/qemu/tree/prereq_v5 previous: https://github.com/eauger/qemu/tree/prereq_v4 Test done: - PCI device were tested - device hotplug test - with or without vIOMMU - VFIO migration with a E800 net card(no dirty sync support) passthrough - platform and ccw were only compile-tested due to environment limit Zhenzhong, Yi, Eric [1] https://lore.kernel.org/all/20230830103754.36461-1-zhenzhong.duan@intel.com/t/#u Changelog: v5: - ap: fix missing return - ccw: remove vbasedev->sysfsdev g_strdup_printf(), remove name local var - container.c: restored !vbasedev->container check in vfio_detach_device() - pci.c: removed vbasedev->name deallocation in error path as this is handled in instance_finalize function v4: - include qemu/error-report.h in helpers.c - in ap.c, fix the wrongly added vfio_detach_device(vbasedev) and g_free(vbasedev->name); also added error_prepend - simplified vbasedev setting in ccw.c - vfio_detach_device: dropped check on !vbasedev->container - container.c: restore dropped comment v3: - rebased on vfio-next as suggested by Cedric - added vfio/common: Propagate KVM_SET_DEVICE_ATTR error if any - collected Cedric's R-b - Fix some error paths in vfio/cpi which now properly detach the device and also free the vbasedev->name - Fix vfio/ccw migration (hopefully) [Matthew inputs] - Split [PATCH v2 11/12] vfio/common: Introduce two kinds of VFIO device lists into 3 patches v2: - Refine patch description per Eric - return errno and errp in vfio_kvm_device_[add/del]_fd per Eric - make memory listener register/deregister in seperate patch per Eric - Include the .h file first per Cédric - Add trace event in vfio_attach_device per Cédric - drop the change to vfio_viommu_preset by refactor per Cédric - Introduce global VFIO device list and per container list per Alex Note changelog below are from full IOMMUFD series: v1: - Alloc hwpt instead of using auto hwpt - elaborate iommufd code per Nicolin - consolidate two patches and drop as.c - typo error fix and function rename rfcv4: - rebase on top of v8.0.3 - Add one patch from Yi which is about vfio device add in kvm - Remove IOAS_COPY optimization and focus on functions in this patchset - Fix wrong name issue reported and fix suggested by Matthew - Fix compilation issue reported and fix sugggsted by Nicolin - Use query_dirty_bitmap callback to replace get_dirty_bitmap for better granularity - Add dev_iter_next() callback to avoid adding so many callback at container scope, add VFIODevice.hwpt to support that - Restore all functions back to common from container whenever possible, mainly migration and reset related functions - Add --enable/disable-iommufd config option, enabled by default in linux - Remove VFIODevice.hwpt_next as it's redundant with VFIODevice.next - Adapt new VFIO_DEVICE_PCI_HOT_RESET uAPI for IOMMUFD backed device - vfio_kvm_device_add/del_group call vfio_kvm_device_add/del_fd to remove redundant code - Add FD passing support for vfio device backed by IOMMUFD - Fix hot unplug resource leak issue in vfio_legacy_detach_device() - Fix FD leak in vfio_get_devicefd() rfcv3: - rebase on top of v7.2.0 - Fix the compilation with CONFIG_IOMMUFD unset by using true classes for VFIO backends - Fix use after free in error path, reported by Alister - Split common.c in several steps to ease the review rfcv2: - remove the first three patches of rfcv1 - add open cdev helper suggested by Jason - remove the QOMification of the VFIOContainer and simply use standard ops (David) - add "-object iommufd" suggested by Alex Eric Auger (7): scripts/update-linux-headers: Add iommufd.h vfio/common: Propagate KVM_SET_DEVICE_ATTR error if any vfio/common: Introduce vfio_container_add|del_section_window() vfio/pci: Introduce vfio_[attach/detach]_device vfio/platform: Use vfio_[attach/detach]_device vfio/ap: Use vfio_[attach/detach]_device vfio/ccw: Use vfio_[attach/detach]_device Yi Liu (2): vfio/common: Move IOMMU agnostic helpers to a separate file vfio/common: Move legacy VFIO backend code into separate container.c Zhenzhong Duan (6): linux-headers: Add iommufd.h vfio/common: Extract out vfio_kvm_device_[add/del]_fd vfio/common: Move VFIO reset handler registration to a group agnostic function vfio/common: Introduce a per container device list vfio/common: Store the parent container in VFIODevice vfio/common: Introduce a global VFIODevice list include/hw/vfio/vfio-common.h | 60 +- linux-headers/linux/iommufd.h | 444 ++++++++ hw/vfio/ap.c | 67 +- hw/vfio/ccw.c | 117 +- hw/vfio/common.c | 1851 ++----------------------------- hw/vfio/container.c | 1161 +++++++++++++++++++ hw/vfio/helpers.c | 612 ++++++++++ hw/vfio/pci.c | 66 +- hw/vfio/platform.c | 43 +- hw/vfio/meson.build | 2 + hw/vfio/trace-events | 4 +- scripts/update-linux-headers.sh | 3 +- 12 files changed, 2456 insertions(+), 1974 deletions(-) create mode 100644 linux-headers/linux/iommufd.h create mode 100644 hw/vfio/container.c create mode 100644 hw/vfio/helpers.c