Re: [PATCH v28 04/17] vfio: Add migration region initialization and finalize function

2020-10-24 Thread Kirti Wankhede




On 10/23/2020 4:54 PM, Cornelia Huck wrote:

On Fri, 23 Oct 2020 16:10:30 +0530
Kirti Wankhede  wrote:


Whether the VFIO device supports migration or not is decided based of
migration region query. If migration region query is successful and migration
region initialization is successful then migration is supported else
migration is blocked.

Signed-off-by: Kirti Wankhede 
Reviewed-by: Neo Jia 
Acked-by: Dr. David Alan Gilbert 
---
  hw/vfio/meson.build   |   1 +
  hw/vfio/migration.c   | 133 ++
  hw/vfio/trace-events  |   3 +
  include/hw/vfio/vfio-common.h |   9 +++
  4 files changed, 146 insertions(+)
  create mode 100644 hw/vfio/migration.c


(...)


+static int vfio_migration_init(VFIODevice *vbasedev,
+   struct vfio_region_info *info)
+{
+int ret;
+Object *obj;
+VFIOMigration *migration;
+
+if (!vbasedev->ops->vfio_get_object) {
+return -EINVAL;
+}
+
+obj = vbasedev->ops->vfio_get_object(vbasedev);
+if (!obj) {
+return -EINVAL;
+}
+
+migration = g_new0(VFIOMigration, 1);
+
+ret = vfio_region_setup(obj, vbasedev, &migration->region,
+info->index, "migration");
+if (ret) {
+error_report("%s: Failed to setup VFIO migration region %d: %s",
+ vbasedev->name, info->index, strerror(-ret));
+goto err;
+}
+
+vbasedev->migration = migration;
+
+if (!migration->region.size) {
+error_report("%s: Invalid zero-sized of VFIO migration region %d",


s/of //


+ vbasedev->name, info->index);
+ret = -EINVAL;
+goto err;
+}
+return 0;
+
+err:
+vfio_migration_region_exit(vbasedev);
+g_free(migration);
+vbasedev->migration = NULL;
+return ret;
+}


(...)


+void vfio_migration_finalize(VFIODevice *vbasedev)
+{
+VFIOMigration *migration = vbasedev->migration;


I don't think you need this variable?



Removing it.


+
+if (migration) {
+vfio_migration_region_exit(vbasedev);
+g_free(vbasedev->migration);
+vbasedev->migration = NULL;
+}
+
+if (vbasedev->migration_blocker) {
+migrate_del_blocker(vbasedev->migration_blocker);
+error_free(vbasedev->migration_blocker);
+vbasedev->migration_blocker = NULL;
+}
+}


(...)





Re: [PATCH v28 04/17] vfio: Add migration region initialization and finalize function

2020-10-24 Thread Kirti Wankhede




On 10/24/2020 7:51 PM, Alex Williamson wrote:

On Sat, 24 Oct 2020 15:09:14 +0530
Kirti Wankhede  wrote:


On 10/23/2020 10:22 PM, Alex Williamson wrote:

On Fri, 23 Oct 2020 16:10:30 +0530
Kirti Wankhede  wrote:
   

Whether the VFIO device supports migration or not is decided based of
migration region query. If migration region query is successful and migration
region initialization is successful then migration is supported else
migration is blocked.

Signed-off-by: Kirti Wankhede 
Reviewed-by: Neo Jia 
Acked-by: Dr. David Alan Gilbert 
---
   hw/vfio/meson.build   |   1 +
   hw/vfio/migration.c   | 133 
++
   hw/vfio/trace-events  |   3 +
   include/hw/vfio/vfio-common.h |   9 +++
   4 files changed, 146 insertions(+)
   create mode 100644 hw/vfio/migration.c

diff --git a/hw/vfio/meson.build b/hw/vfio/meson.build
index 37efa74018bc..da9af297a0c5 100644
--- a/hw/vfio/meson.build
+++ b/hw/vfio/meson.build
@@ -2,6 +2,7 @@ vfio_ss = ss.source_set()
   vfio_ss.add(files(
 'common.c',
 'spapr.c',
+  'migration.c',
   ))
   vfio_ss.add(when: 'CONFIG_VFIO_PCI', if_true: files(
 'display.c',
diff --git a/hw/vfio/migration.c b/hw/vfio/migration.c
new file mode 100644
index ..bbe6e0b7a6cc
--- /dev/null
+++ b/hw/vfio/migration.c
@@ -0,0 +1,133 @@
+/*
+ * Migration support for VFIO devices
+ *
+ * Copyright NVIDIA, Inc. 2020
+ *
+ * This work is licensed under the terms of the GNU GPL, version 2. See
+ * the COPYING file in the top-level directory.
+ */
+
+#include "qemu/osdep.h"
+#include 
+
+#include "hw/vfio/vfio-common.h"
+#include "cpu.h"
+#include "migration/migration.h"
+#include "migration/qemu-file.h"
+#include "migration/register.h"
+#include "migration/blocker.h"
+#include "migration/misc.h"
+#include "qapi/error.h"
+#include "exec/ramlist.h"
+#include "exec/ram_addr.h"
+#include "pci.h"
+#include "trace.h"
+
+static void vfio_migration_region_exit(VFIODevice *vbasedev)
+{
+VFIOMigration *migration = vbasedev->migration;
+
+if (!migration) {
+return;
+}
+
+vfio_region_exit(&migration->region);
+vfio_region_finalize(&migration->region);


I think it would make sense to also:

g_free(migration);
vbasedev->migration = NULL;

here as well so the callers don't need to.


No, vfio_migration_init() case, err case is also hit when
vbasedev->migration is not yet set but local variable migration is not-NULL.


So why do we even call vfio_migration_region_exit() for that error
case?  It seems that could just g_free(migration); return ret; rather
than goto err.  Thanks,



Removing temporary local variable, with that above 2 can be moved to 
exit function.


Thanks,
Kirti


Alex


Not worth a re-spin itself,
maybe a follow-up if there's no other reason for a re-spin.  Thanks,

Alex
   

+}
+
+static int vfio_migration_init(VFIODevice *vbasedev,
+   struct vfio_region_info *info)
+{
+int ret;
+Object *obj;
+VFIOMigration *migration;
+
+if (!vbasedev->ops->vfio_get_object) {
+return -EINVAL;
+}
+
+obj = vbasedev->ops->vfio_get_object(vbasedev);
+if (!obj) {
+return -EINVAL;
+}
+
+migration = g_new0(VFIOMigration, 1);
+
+ret = vfio_region_setup(obj, vbasedev, &migration->region,
+info->index, "migration");
+if (ret) {
+error_report("%s: Failed to setup VFIO migration region %d: %s",
+ vbasedev->name, info->index, strerror(-ret));
+goto err;
+}
+
+vbasedev->migration = migration;
+
+if (!migration->region.size) {
+error_report("%s: Invalid zero-sized of VFIO migration region %d",
+ vbasedev->name, info->index);
+ret = -EINVAL;
+goto err;
+}
+return 0;
+
+err:
+vfio_migration_region_exit(vbasedev);
+g_free(migration);
+vbasedev->migration = NULL;
+return ret;
+}
+
+/* -- */
+
+int vfio_migration_probe(VFIODevice *vbasedev, Error **errp)
+{
+struct vfio_region_info *info = NULL;
+Error *local_err = NULL;
+int ret;
+
+ret = vfio_get_dev_region_info(vbasedev, VFIO_REGION_TYPE_MIGRATION,
+   VFIO_REGION_SUBTYPE_MIGRATION, &info);
+if (ret) {
+goto add_blocker;
+}
+
+ret = vfio_migration_init(vbasedev, info);
+if (ret) {
+goto add_blocker;
+}
+
+g_free(info);
+trace_vfio_migration_probe(vbasedev->name, info->index);
+return 0;
+
+add_blocker:
+error_setg(&vbasedev->migration_blocker,
+   "VFIO device doesn't support migration");
+g_free(info);
+
+ret = migrate_add_blocker(vbasedev->migration_blocker, &local_err);
+if (local_err) {
+error_propagate(errp, local_err);
+error_free(vbasedev->migration_blocker);
+vbasedev->migration_blocker = NULL;
+}
+return ret;
+}

Re: [PATCH v28 04/17] vfio: Add migration region initialization and finalize function

2020-10-24 Thread Alex Williamson
On Sat, 24 Oct 2020 15:09:14 +0530
Kirti Wankhede  wrote:

> On 10/23/2020 10:22 PM, Alex Williamson wrote:
> > On Fri, 23 Oct 2020 16:10:30 +0530
> > Kirti Wankhede  wrote:
> >   
> >> Whether the VFIO device supports migration or not is decided based of
> >> migration region query. If migration region query is successful and 
> >> migration
> >> region initialization is successful then migration is supported else
> >> migration is blocked.
> >>
> >> Signed-off-by: Kirti Wankhede 
> >> Reviewed-by: Neo Jia 
> >> Acked-by: Dr. David Alan Gilbert 
> >> ---
> >>   hw/vfio/meson.build   |   1 +
> >>   hw/vfio/migration.c   | 133 
> >> ++
> >>   hw/vfio/trace-events  |   3 +
> >>   include/hw/vfio/vfio-common.h |   9 +++
> >>   4 files changed, 146 insertions(+)
> >>   create mode 100644 hw/vfio/migration.c
> >>
> >> diff --git a/hw/vfio/meson.build b/hw/vfio/meson.build
> >> index 37efa74018bc..da9af297a0c5 100644
> >> --- a/hw/vfio/meson.build
> >> +++ b/hw/vfio/meson.build
> >> @@ -2,6 +2,7 @@ vfio_ss = ss.source_set()
> >>   vfio_ss.add(files(
> >> 'common.c',
> >> 'spapr.c',
> >> +  'migration.c',
> >>   ))
> >>   vfio_ss.add(when: 'CONFIG_VFIO_PCI', if_true: files(
> >> 'display.c',
> >> diff --git a/hw/vfio/migration.c b/hw/vfio/migration.c
> >> new file mode 100644
> >> index ..bbe6e0b7a6cc
> >> --- /dev/null
> >> +++ b/hw/vfio/migration.c
> >> @@ -0,0 +1,133 @@
> >> +/*
> >> + * Migration support for VFIO devices
> >> + *
> >> + * Copyright NVIDIA, Inc. 2020
> >> + *
> >> + * This work is licensed under the terms of the GNU GPL, version 2. See
> >> + * the COPYING file in the top-level directory.
> >> + */
> >> +
> >> +#include "qemu/osdep.h"
> >> +#include 
> >> +
> >> +#include "hw/vfio/vfio-common.h"
> >> +#include "cpu.h"
> >> +#include "migration/migration.h"
> >> +#include "migration/qemu-file.h"
> >> +#include "migration/register.h"
> >> +#include "migration/blocker.h"
> >> +#include "migration/misc.h"
> >> +#include "qapi/error.h"
> >> +#include "exec/ramlist.h"
> >> +#include "exec/ram_addr.h"
> >> +#include "pci.h"
> >> +#include "trace.h"
> >> +
> >> +static void vfio_migration_region_exit(VFIODevice *vbasedev)
> >> +{
> >> +VFIOMigration *migration = vbasedev->migration;
> >> +
> >> +if (!migration) {
> >> +return;
> >> +}
> >> +
> >> +vfio_region_exit(&migration->region);
> >> +vfio_region_finalize(&migration->region);  
> > 
> > I think it would make sense to also:
> > 
> > g_free(migration);
> > vbasedev->migration = NULL;
> > 
> > here as well so the callers don't need to.   
> 
> No, vfio_migration_init() case, err case is also hit when 
> vbasedev->migration is not yet set but local variable migration is not-NULL.

So why do we even call vfio_migration_region_exit() for that error
case?  It seems that could just g_free(migration); return ret; rather
than goto err.  Thanks,

Alex

> > Not worth a re-spin itself,
> > maybe a follow-up if there's no other reason for a re-spin.  Thanks,
> > 
> > Alex
> >   
> >> +}
> >> +
> >> +static int vfio_migration_init(VFIODevice *vbasedev,
> >> +   struct vfio_region_info *info)
> >> +{
> >> +int ret;
> >> +Object *obj;
> >> +VFIOMigration *migration;
> >> +
> >> +if (!vbasedev->ops->vfio_get_object) {
> >> +return -EINVAL;
> >> +}
> >> +
> >> +obj = vbasedev->ops->vfio_get_object(vbasedev);
> >> +if (!obj) {
> >> +return -EINVAL;
> >> +}
> >> +
> >> +migration = g_new0(VFIOMigration, 1);
> >> +
> >> +ret = vfio_region_setup(obj, vbasedev, &migration->region,
> >> +info->index, "migration");
> >> +if (ret) {
> >> +error_report("%s: Failed to setup VFIO migration region %d: %s",
> >> + vbasedev->name, info->index, strerror(-ret));
> >> +goto err;
> >> +}
> >> +
> >> +vbasedev->migration = migration;
> >> +
> >> +if (!migration->region.size) {
> >> +error_report("%s: Invalid zero-sized of VFIO migration region %d",
> >> + vbasedev->name, info->index);
> >> +ret = -EINVAL;
> >> +goto err;
> >> +}
> >> +return 0;
> >> +
> >> +err:
> >> +vfio_migration_region_exit(vbasedev);
> >> +g_free(migration);
> >> +vbasedev->migration = NULL;
> >> +return ret;
> >> +}
> >> +
> >> +/* -- 
> >> */
> >> +
> >> +int vfio_migration_probe(VFIODevice *vbasedev, Error **errp)
> >> +{
> >> +struct vfio_region_info *info = NULL;
> >> +Error *local_err = NULL;
> >> +int ret;
> >> +
> >> +ret = vfio_get_dev_region_info(vbasedev, VFIO_REGION_TYPE_MIGRATION,
> >> +   VFIO_REGION_SUBTYPE_MIGRATION, &info);
> >> +if (ret) {
> >> +goto add_blocker;
> >> +}
> >> +
> >> +ret = vfio_migration_init(vbasedev,

Re: [PATCH v28 04/17] vfio: Add migration region initialization and finalize function

2020-10-24 Thread Kirti Wankhede




On 10/23/2020 10:22 PM, Alex Williamson wrote:

On Fri, 23 Oct 2020 16:10:30 +0530
Kirti Wankhede  wrote:


Whether the VFIO device supports migration or not is decided based of
migration region query. If migration region query is successful and migration
region initialization is successful then migration is supported else
migration is blocked.

Signed-off-by: Kirti Wankhede 
Reviewed-by: Neo Jia 
Acked-by: Dr. David Alan Gilbert 
---
  hw/vfio/meson.build   |   1 +
  hw/vfio/migration.c   | 133 ++
  hw/vfio/trace-events  |   3 +
  include/hw/vfio/vfio-common.h |   9 +++
  4 files changed, 146 insertions(+)
  create mode 100644 hw/vfio/migration.c

diff --git a/hw/vfio/meson.build b/hw/vfio/meson.build
index 37efa74018bc..da9af297a0c5 100644
--- a/hw/vfio/meson.build
+++ b/hw/vfio/meson.build
@@ -2,6 +2,7 @@ vfio_ss = ss.source_set()
  vfio_ss.add(files(
'common.c',
'spapr.c',
+  'migration.c',
  ))
  vfio_ss.add(when: 'CONFIG_VFIO_PCI', if_true: files(
'display.c',
diff --git a/hw/vfio/migration.c b/hw/vfio/migration.c
new file mode 100644
index ..bbe6e0b7a6cc
--- /dev/null
+++ b/hw/vfio/migration.c
@@ -0,0 +1,133 @@
+/*
+ * Migration support for VFIO devices
+ *
+ * Copyright NVIDIA, Inc. 2020
+ *
+ * This work is licensed under the terms of the GNU GPL, version 2. See
+ * the COPYING file in the top-level directory.
+ */
+
+#include "qemu/osdep.h"
+#include 
+
+#include "hw/vfio/vfio-common.h"
+#include "cpu.h"
+#include "migration/migration.h"
+#include "migration/qemu-file.h"
+#include "migration/register.h"
+#include "migration/blocker.h"
+#include "migration/misc.h"
+#include "qapi/error.h"
+#include "exec/ramlist.h"
+#include "exec/ram_addr.h"
+#include "pci.h"
+#include "trace.h"
+
+static void vfio_migration_region_exit(VFIODevice *vbasedev)
+{
+VFIOMigration *migration = vbasedev->migration;
+
+if (!migration) {
+return;
+}
+
+vfio_region_exit(&migration->region);
+vfio_region_finalize(&migration->region);


I think it would make sense to also:

g_free(migration);
vbasedev->migration = NULL;

here as well so the callers don't need to. 


No, vfio_migration_init() case, err case is also hit when 
vbasedev->migration is not yet set but local variable migration is not-NULL.


Thanks,
Kirti


Not worth a re-spin itself,
maybe a follow-up if there's no other reason for a re-spin.  Thanks,

Alex


+}
+
+static int vfio_migration_init(VFIODevice *vbasedev,
+   struct vfio_region_info *info)
+{
+int ret;
+Object *obj;
+VFIOMigration *migration;
+
+if (!vbasedev->ops->vfio_get_object) {
+return -EINVAL;
+}
+
+obj = vbasedev->ops->vfio_get_object(vbasedev);
+if (!obj) {
+return -EINVAL;
+}
+
+migration = g_new0(VFIOMigration, 1);
+
+ret = vfio_region_setup(obj, vbasedev, &migration->region,
+info->index, "migration");
+if (ret) {
+error_report("%s: Failed to setup VFIO migration region %d: %s",
+ vbasedev->name, info->index, strerror(-ret));
+goto err;
+}
+
+vbasedev->migration = migration;
+
+if (!migration->region.size) {
+error_report("%s: Invalid zero-sized of VFIO migration region %d",
+ vbasedev->name, info->index);
+ret = -EINVAL;
+goto err;
+}
+return 0;
+
+err:
+vfio_migration_region_exit(vbasedev);
+g_free(migration);
+vbasedev->migration = NULL;
+return ret;
+}
+
+/* -- */
+
+int vfio_migration_probe(VFIODevice *vbasedev, Error **errp)
+{
+struct vfio_region_info *info = NULL;
+Error *local_err = NULL;
+int ret;
+
+ret = vfio_get_dev_region_info(vbasedev, VFIO_REGION_TYPE_MIGRATION,
+   VFIO_REGION_SUBTYPE_MIGRATION, &info);
+if (ret) {
+goto add_blocker;
+}
+
+ret = vfio_migration_init(vbasedev, info);
+if (ret) {
+goto add_blocker;
+}
+
+g_free(info);
+trace_vfio_migration_probe(vbasedev->name, info->index);
+return 0;
+
+add_blocker:
+error_setg(&vbasedev->migration_blocker,
+   "VFIO device doesn't support migration");
+g_free(info);
+
+ret = migrate_add_blocker(vbasedev->migration_blocker, &local_err);
+if (local_err) {
+error_propagate(errp, local_err);
+error_free(vbasedev->migration_blocker);
+vbasedev->migration_blocker = NULL;
+}
+return ret;
+}
+
+void vfio_migration_finalize(VFIODevice *vbasedev)
+{
+VFIOMigration *migration = vbasedev->migration;
+
+if (migration) {
+vfio_migration_region_exit(vbasedev);
+g_free(vbasedev->migration);
+vbasedev->migration = NULL;
+}
+
+if (vbasedev->migration_blocker) {
+migrate_del_blocker(vbasedev->migration_blocker);
+error_fr

Re: [PATCH v28 04/17] vfio: Add migration region initialization and finalize function

2020-10-23 Thread Alex Williamson
On Fri, 23 Oct 2020 16:10:30 +0530
Kirti Wankhede  wrote:

> Whether the VFIO device supports migration or not is decided based of
> migration region query. If migration region query is successful and migration
> region initialization is successful then migration is supported else
> migration is blocked.
> 
> Signed-off-by: Kirti Wankhede 
> Reviewed-by: Neo Jia 
> Acked-by: Dr. David Alan Gilbert 
> ---
>  hw/vfio/meson.build   |   1 +
>  hw/vfio/migration.c   | 133 
> ++
>  hw/vfio/trace-events  |   3 +
>  include/hw/vfio/vfio-common.h |   9 +++
>  4 files changed, 146 insertions(+)
>  create mode 100644 hw/vfio/migration.c
> 
> diff --git a/hw/vfio/meson.build b/hw/vfio/meson.build
> index 37efa74018bc..da9af297a0c5 100644
> --- a/hw/vfio/meson.build
> +++ b/hw/vfio/meson.build
> @@ -2,6 +2,7 @@ vfio_ss = ss.source_set()
>  vfio_ss.add(files(
>'common.c',
>'spapr.c',
> +  'migration.c',
>  ))
>  vfio_ss.add(when: 'CONFIG_VFIO_PCI', if_true: files(
>'display.c',
> diff --git a/hw/vfio/migration.c b/hw/vfio/migration.c
> new file mode 100644
> index ..bbe6e0b7a6cc
> --- /dev/null
> +++ b/hw/vfio/migration.c
> @@ -0,0 +1,133 @@
> +/*
> + * Migration support for VFIO devices
> + *
> + * Copyright NVIDIA, Inc. 2020
> + *
> + * This work is licensed under the terms of the GNU GPL, version 2. See
> + * the COPYING file in the top-level directory.
> + */
> +
> +#include "qemu/osdep.h"
> +#include 
> +
> +#include "hw/vfio/vfio-common.h"
> +#include "cpu.h"
> +#include "migration/migration.h"
> +#include "migration/qemu-file.h"
> +#include "migration/register.h"
> +#include "migration/blocker.h"
> +#include "migration/misc.h"
> +#include "qapi/error.h"
> +#include "exec/ramlist.h"
> +#include "exec/ram_addr.h"
> +#include "pci.h"
> +#include "trace.h"
> +
> +static void vfio_migration_region_exit(VFIODevice *vbasedev)
> +{
> +VFIOMigration *migration = vbasedev->migration;
> +
> +if (!migration) {
> +return;
> +}
> +
> +vfio_region_exit(&migration->region);
> +vfio_region_finalize(&migration->region);

I think it would make sense to also:

g_free(migration);
vbasedev->migration = NULL;

here as well so the callers don't need to.  Not worth a re-spin itself,
maybe a follow-up if there's no other reason for a re-spin.  Thanks,

Alex

> +}
> +
> +static int vfio_migration_init(VFIODevice *vbasedev,
> +   struct vfio_region_info *info)
> +{
> +int ret;
> +Object *obj;
> +VFIOMigration *migration;
> +
> +if (!vbasedev->ops->vfio_get_object) {
> +return -EINVAL;
> +}
> +
> +obj = vbasedev->ops->vfio_get_object(vbasedev);
> +if (!obj) {
> +return -EINVAL;
> +}
> +
> +migration = g_new0(VFIOMigration, 1);
> +
> +ret = vfio_region_setup(obj, vbasedev, &migration->region,
> +info->index, "migration");
> +if (ret) {
> +error_report("%s: Failed to setup VFIO migration region %d: %s",
> + vbasedev->name, info->index, strerror(-ret));
> +goto err;
> +}
> +
> +vbasedev->migration = migration;
> +
> +if (!migration->region.size) {
> +error_report("%s: Invalid zero-sized of VFIO migration region %d",
> + vbasedev->name, info->index);
> +ret = -EINVAL;
> +goto err;
> +}
> +return 0;
> +
> +err:
> +vfio_migration_region_exit(vbasedev);
> +g_free(migration);
> +vbasedev->migration = NULL;
> +return ret;
> +}
> +
> +/* -- */
> +
> +int vfio_migration_probe(VFIODevice *vbasedev, Error **errp)
> +{
> +struct vfio_region_info *info = NULL;
> +Error *local_err = NULL;
> +int ret;
> +
> +ret = vfio_get_dev_region_info(vbasedev, VFIO_REGION_TYPE_MIGRATION,
> +   VFIO_REGION_SUBTYPE_MIGRATION, &info);
> +if (ret) {
> +goto add_blocker;
> +}
> +
> +ret = vfio_migration_init(vbasedev, info);
> +if (ret) {
> +goto add_blocker;
> +}
> +
> +g_free(info);
> +trace_vfio_migration_probe(vbasedev->name, info->index);
> +return 0;
> +
> +add_blocker:
> +error_setg(&vbasedev->migration_blocker,
> +   "VFIO device doesn't support migration");
> +g_free(info);
> +
> +ret = migrate_add_blocker(vbasedev->migration_blocker, &local_err);
> +if (local_err) {
> +error_propagate(errp, local_err);
> +error_free(vbasedev->migration_blocker);
> +vbasedev->migration_blocker = NULL;
> +}
> +return ret;
> +}
> +
> +void vfio_migration_finalize(VFIODevice *vbasedev)
> +{
> +VFIOMigration *migration = vbasedev->migration;
> +
> +if (migration) {
> +vfio_migration_region_exit(vbasedev);
> +g_free(vbasedev->migration);
> +vbasedev->migration = NULL;
> +}
> +
> +if (vba

Re: [PATCH v28 04/17] vfio: Add migration region initialization and finalize function

2020-10-23 Thread Cornelia Huck
On Fri, 23 Oct 2020 16:10:30 +0530
Kirti Wankhede  wrote:

> Whether the VFIO device supports migration or not is decided based of
> migration region query. If migration region query is successful and migration
> region initialization is successful then migration is supported else
> migration is blocked.
> 
> Signed-off-by: Kirti Wankhede 
> Reviewed-by: Neo Jia 
> Acked-by: Dr. David Alan Gilbert 
> ---
>  hw/vfio/meson.build   |   1 +
>  hw/vfio/migration.c   | 133 
> ++
>  hw/vfio/trace-events  |   3 +
>  include/hw/vfio/vfio-common.h |   9 +++
>  4 files changed, 146 insertions(+)
>  create mode 100644 hw/vfio/migration.c

(...)

> +static int vfio_migration_init(VFIODevice *vbasedev,
> +   struct vfio_region_info *info)
> +{
> +int ret;
> +Object *obj;
> +VFIOMigration *migration;
> +
> +if (!vbasedev->ops->vfio_get_object) {
> +return -EINVAL;
> +}
> +
> +obj = vbasedev->ops->vfio_get_object(vbasedev);
> +if (!obj) {
> +return -EINVAL;
> +}
> +
> +migration = g_new0(VFIOMigration, 1);
> +
> +ret = vfio_region_setup(obj, vbasedev, &migration->region,
> +info->index, "migration");
> +if (ret) {
> +error_report("%s: Failed to setup VFIO migration region %d: %s",
> + vbasedev->name, info->index, strerror(-ret));
> +goto err;
> +}
> +
> +vbasedev->migration = migration;
> +
> +if (!migration->region.size) {
> +error_report("%s: Invalid zero-sized of VFIO migration region %d",

s/of //

> + vbasedev->name, info->index);
> +ret = -EINVAL;
> +goto err;
> +}
> +return 0;
> +
> +err:
> +vfio_migration_region_exit(vbasedev);
> +g_free(migration);
> +vbasedev->migration = NULL;
> +return ret;
> +}

(...)

> +void vfio_migration_finalize(VFIODevice *vbasedev)
> +{
> +VFIOMigration *migration = vbasedev->migration;

I don't think you need this variable?

> +
> +if (migration) {
> +vfio_migration_region_exit(vbasedev);
> +g_free(vbasedev->migration);
> +vbasedev->migration = NULL;
> +}
> +
> +if (vbasedev->migration_blocker) {
> +migrate_del_blocker(vbasedev->migration_blocker);
> +error_free(vbasedev->migration_blocker);
> +vbasedev->migration_blocker = NULL;
> +}
> +}

(...)




[PATCH v28 04/17] vfio: Add migration region initialization and finalize function

2020-10-23 Thread Kirti Wankhede
Whether the VFIO device supports migration or not is decided based of
migration region query. If migration region query is successful and migration
region initialization is successful then migration is supported else
migration is blocked.

Signed-off-by: Kirti Wankhede 
Reviewed-by: Neo Jia 
Acked-by: Dr. David Alan Gilbert 
---
 hw/vfio/meson.build   |   1 +
 hw/vfio/migration.c   | 133 ++
 hw/vfio/trace-events  |   3 +
 include/hw/vfio/vfio-common.h |   9 +++
 4 files changed, 146 insertions(+)
 create mode 100644 hw/vfio/migration.c

diff --git a/hw/vfio/meson.build b/hw/vfio/meson.build
index 37efa74018bc..da9af297a0c5 100644
--- a/hw/vfio/meson.build
+++ b/hw/vfio/meson.build
@@ -2,6 +2,7 @@ vfio_ss = ss.source_set()
 vfio_ss.add(files(
   'common.c',
   'spapr.c',
+  'migration.c',
 ))
 vfio_ss.add(when: 'CONFIG_VFIO_PCI', if_true: files(
   'display.c',
diff --git a/hw/vfio/migration.c b/hw/vfio/migration.c
new file mode 100644
index ..bbe6e0b7a6cc
--- /dev/null
+++ b/hw/vfio/migration.c
@@ -0,0 +1,133 @@
+/*
+ * Migration support for VFIO devices
+ *
+ * Copyright NVIDIA, Inc. 2020
+ *
+ * This work is licensed under the terms of the GNU GPL, version 2. See
+ * the COPYING file in the top-level directory.
+ */
+
+#include "qemu/osdep.h"
+#include 
+
+#include "hw/vfio/vfio-common.h"
+#include "cpu.h"
+#include "migration/migration.h"
+#include "migration/qemu-file.h"
+#include "migration/register.h"
+#include "migration/blocker.h"
+#include "migration/misc.h"
+#include "qapi/error.h"
+#include "exec/ramlist.h"
+#include "exec/ram_addr.h"
+#include "pci.h"
+#include "trace.h"
+
+static void vfio_migration_region_exit(VFIODevice *vbasedev)
+{
+VFIOMigration *migration = vbasedev->migration;
+
+if (!migration) {
+return;
+}
+
+vfio_region_exit(&migration->region);
+vfio_region_finalize(&migration->region);
+}
+
+static int vfio_migration_init(VFIODevice *vbasedev,
+   struct vfio_region_info *info)
+{
+int ret;
+Object *obj;
+VFIOMigration *migration;
+
+if (!vbasedev->ops->vfio_get_object) {
+return -EINVAL;
+}
+
+obj = vbasedev->ops->vfio_get_object(vbasedev);
+if (!obj) {
+return -EINVAL;
+}
+
+migration = g_new0(VFIOMigration, 1);
+
+ret = vfio_region_setup(obj, vbasedev, &migration->region,
+info->index, "migration");
+if (ret) {
+error_report("%s: Failed to setup VFIO migration region %d: %s",
+ vbasedev->name, info->index, strerror(-ret));
+goto err;
+}
+
+vbasedev->migration = migration;
+
+if (!migration->region.size) {
+error_report("%s: Invalid zero-sized of VFIO migration region %d",
+ vbasedev->name, info->index);
+ret = -EINVAL;
+goto err;
+}
+return 0;
+
+err:
+vfio_migration_region_exit(vbasedev);
+g_free(migration);
+vbasedev->migration = NULL;
+return ret;
+}
+
+/* -- */
+
+int vfio_migration_probe(VFIODevice *vbasedev, Error **errp)
+{
+struct vfio_region_info *info = NULL;
+Error *local_err = NULL;
+int ret;
+
+ret = vfio_get_dev_region_info(vbasedev, VFIO_REGION_TYPE_MIGRATION,
+   VFIO_REGION_SUBTYPE_MIGRATION, &info);
+if (ret) {
+goto add_blocker;
+}
+
+ret = vfio_migration_init(vbasedev, info);
+if (ret) {
+goto add_blocker;
+}
+
+g_free(info);
+trace_vfio_migration_probe(vbasedev->name, info->index);
+return 0;
+
+add_blocker:
+error_setg(&vbasedev->migration_blocker,
+   "VFIO device doesn't support migration");
+g_free(info);
+
+ret = migrate_add_blocker(vbasedev->migration_blocker, &local_err);
+if (local_err) {
+error_propagate(errp, local_err);
+error_free(vbasedev->migration_blocker);
+vbasedev->migration_blocker = NULL;
+}
+return ret;
+}
+
+void vfio_migration_finalize(VFIODevice *vbasedev)
+{
+VFIOMigration *migration = vbasedev->migration;
+
+if (migration) {
+vfio_migration_region_exit(vbasedev);
+g_free(vbasedev->migration);
+vbasedev->migration = NULL;
+}
+
+if (vbasedev->migration_blocker) {
+migrate_del_blocker(vbasedev->migration_blocker);
+error_free(vbasedev->migration_blocker);
+vbasedev->migration_blocker = NULL;
+}
+}
diff --git a/hw/vfio/trace-events b/hw/vfio/trace-events
index a0c7b49a2ebc..9ced5ec6277c 100644
--- a/hw/vfio/trace-events
+++ b/hw/vfio/trace-events
@@ -145,3 +145,6 @@ vfio_display_edid_link_up(void) ""
 vfio_display_edid_link_down(void) ""
 vfio_display_edid_update(uint32_t prefx, uint32_t prefy) "%ux%u"
 vfio_display_edid_write_error(void) ""
+
+# migration.c
+vfio_migration_probe(const char *name, uint32_t index) " (%s)