From patchwork Thu Mar 1 10:33:30 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Liu, Yi L" X-Patchwork-Id: 879726 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=nongnu.org (client-ip=2001:4830:134:3::11; helo=lists.gnu.org; envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=linux.intel.com Received: from lists.gnu.org (lists.gnu.org [IPv6:2001:4830:134:3::11]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 3zsV2V3ddPz9s0x for ; Thu, 1 Mar 2018 22:05:06 +1100 (AEDT) Received: from localhost ([::1]:55600 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1erM1I-0000hl-1x for incoming@patchwork.ozlabs.org; Thu, 01 Mar 2018 06:05:04 -0500 Received: from eggs.gnu.org ([2001:4830:134:3::10]:53187) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1erLnO-0005dr-De for qemu-devel@nongnu.org; Thu, 01 Mar 2018 05:50:43 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1erLnN-0000Cd-0D for qemu-devel@nongnu.org; Thu, 01 Mar 2018 05:50:42 -0500 Received: from mga14.intel.com ([192.55.52.115]:7359) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1erLnM-00006Y-OR for qemu-devel@nongnu.org; Thu, 01 Mar 2018 05:50:40 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 01 Mar 2018 02:50:40 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.47,408,1515484800"; d="scan'208";a="208048703" Received: from sky-dev.bj.intel.com ([10.238.144.105]) by fmsmga006.fm.intel.com with ESMTP; 01 Mar 2018 02:50:38 -0800 From: "Liu, Yi L" To: qemu-devel@nongnu.org, mst@redhat.com, david@gibson.dropbear.id.au Date: Thu, 1 Mar 2018 18:33:30 +0800 Message-Id: <1519900415-30314-8-git-send-email-yi.l.liu@linux.intel.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1519900415-30314-1-git-send-email-yi.l.liu@linux.intel.com> References: <1519900415-30314-1-git-send-email-yi.l.liu@linux.intel.com> X-detected-operating-system: by eggs.gnu.org: Genre and OS details not recognized. X-Received-From: 192.55.52.115 Subject: [Qemu-devel] [PATCH v3 07/12] vfio/pci: register sva notifier X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: "Liu, Yi L" , kevin.tian@intel.com, yi.l.liu@intel.com, jasowang@redhat.com, peterx@redhat.com, alex.williamson@redhat.com, pbonzini@redhat.com, eric.auger.pro@gmail.com Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: "Qemu-devel" This patch shows how sva notifier is registered. And provided an example by registering notify func for tlb flush propagation. Signed-off-by: Liu, Yi L --- hw/vfio/pci.c | 55 +++++++++++++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 53 insertions(+), 2 deletions(-) diff --git a/hw/vfio/pci.c b/hw/vfio/pci.c index a60a4d7..b7297cc 100644 --- a/hw/vfio/pci.c +++ b/hw/vfio/pci.c @@ -2775,6 +2775,26 @@ static void vfio_unregister_req_notifier(VFIOPCIDevice *vdev) vdev->req_enabled = false; } +static VFIOContainer *vfio_get_container_from_busdev(PCIBus *bus, + int32_t devfn) +{ + VFIOGroup *group; + VFIOPCIDevice *vdev_iter; + VFIODevice *vbasedev_iter; + PCIDevice *pdev_iter; + + QLIST_FOREACH(group, &vfio_group_list, next) { + QLIST_FOREACH(vbasedev_iter, &group->device_list, next) { + vdev_iter = container_of(vbasedev_iter, VFIOPCIDevice, vbasedev); + pdev_iter = &vdev_iter->pdev; + if (pci_get_bus(pdev_iter) == bus && pdev_iter->devfn == devfn) { + return group->container; + } + } + } + return NULL; +} + static void vfio_pci_device_sva_bind_pasid_table(PCIBus *bus, int32_t devfn, uint64_t pasidt_addr, uint32_t size) { @@ -2783,11 +2803,42 @@ static void vfio_pci_device_sva_bind_pasid_table(PCIBus *bus, So far, Intel VT-d and AMD IOMMU requires it. */ } +static void vfio_iommu_sva_tlb_invalidate_notify(IOMMUSVANotifier *n, + IOMMUSVAEventData *event_data) +{ +/* Sample code, would be detailed in coming virt-SVA patchset. + VFIOGuestIOMMUSVAContext *gsva_ctx; + IOMMUSVAContext *sva_ctx; + VFIOContainer *container; + + gsva_ctx = container_of(n, VFIOGuestIOMMUSVAContext, n); + container = gsva_ctx->container; + + TODO: forward to host through VFIO IOCTL +*/ +} + static void vfio_pci_device_sva_register_notifier(PCIBus *bus, int32_t devfn, IOMMUSVAContext *sva_ctx) { - /* Register notifier for TLB invalidation propagation - */ + VFIOContainer *container = vfio_get_container_from_busdev(bus, devfn); + + if (container != NULL) { + VFIOGuestIOMMUSVAContext *gsva_ctx; + gsva_ctx = g_malloc0(sizeof(*gsva_ctx)); + gsva_ctx->sva_ctx = sva_ctx; + gsva_ctx->container = container; + QLIST_INSERT_HEAD(&container->gsva_ctx_list, + gsva_ctx, + gsva_ctx_next); + /* Register vfio_iommu_sva_tlb_invalidate_notify with event flag + IOMMU_SVA_EVENT_TLB_INV */ + iommu_sva_notifier_register(sva_ctx, + &gsva_ctx->n, + vfio_iommu_sva_tlb_invalidate_notify, + IOMMU_SVA_EVENT_TLB_INV); + return; + } } static void vfio_pci_device_sva_unregister_notifier(PCIBus *bus,