Re: [Qemu-devel] [PATCH v4 4/5] s390x/vfio: ap: Introduce VFIO AP device
On 04/23/2018 03:00 AM, Cornelia Huck wrote: On Sun, 22 Apr 2018 12:05:44 -0400 Tony Krowiakwrote: On 04/19/2018 08:03 AM, Cornelia Huck wrote: On Sun, 15 Apr 2018 15:07:23 -0400 Tony Krowiak wrote: Introduces a VFIO based AP device. The device is defined via the QEMU command line by specifying: -device vfio-ap,sysfsdev= There may be only one vfio-ap device configured for a guest. The mediated matrix device is created by the VFIO AP device driver by writing a UUID to a sysfs attribute file (see docs/vfio-ap.txt). The mediated matrix device will be named after the UUID. Symbolic links to the $uuid are created in many places, so the path to the mediated matrix device $uuid can be specified in any of the following ways: /sys/devices/vfio_ap/matrix/$uuid /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid /sys/bus/mdev/devices/$uuid /sys/bus/mdev/drivers/vfio_mdev/$uuid When the vfio-ap device is realized, it acquires and opens the VFIO iommu group to which the mediated matrix device is bound. This causes a VFIO group notification event to be signaled. The vfio_ap device driver's group notification handler will get called at which time the device driver will configure the the AP devices to which the guest will be granted access. Signed-off-by: Tony Krowiak --- default-configs/s390x-softmmu.mak |1 + hw/vfio/Makefile.objs |1 + hw/vfio/ap.c | 191 + include/hw/vfio/vfio-common.h |1 + 4 files changed, 194 insertions(+), 0 deletions(-) create mode 100644 hw/vfio/ap.c +static void vfio_ap_realize(DeviceState *dev, Error **errp) +{ +VFIODevice *vbasedev; +VFIOGroup *vfio_group; +APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev); +char *mdevid; +Error *local_err = NULL; +int ret; + +/* + * Since a guest's matrix is configured in its entirety by the mediated + * matrix device and hot plug is not currently supported, there is no + * need to have more than one vfio-ap device. Check if a vfio-ap device + * has already been defined. + */ +if (vfio_apdev) { +error_setg(_err, "Only one %s device is allowed", + VFIO_AP_DEVICE_TYPE); +goto out_err; +} + +if (!s390_has_feat(S390_FEAT_AP)) { +error_setg(_err, "AP support not enabled"); +goto out_err; +} + +vfio_apdev = DO_UPCAST(VFIOAPDevice, apdev, apdev); + +vfio_group = vfio_ap_get_group(vfio_apdev, _err); +if (!vfio_group) { +goto out_err; +} + +vfio_apdev->vdev.ops = _ap_ops; +vfio_apdev->vdev.type = VFIO_DEVICE_TYPE_AP; +mdevid = basename(vfio_apdev->vdev.sysfsdev); +vfio_apdev->vdev.name = g_strdup_printf("%s", mdevid); +vfio_apdev->vdev.dev = dev; +QLIST_FOREACH(vbasedev, _group->device_list, next) { +if (strcmp(vbasedev->name, vfio_apdev->vdev.name) == 0) { +error_setg(_err, + "%s: AP device %s has already been realized", + VFIO_AP_DEVICE_TYPE, vfio_apdev->vdev.name); +goto out_device_err; +} +} + +ret = vfio_get_device(vfio_group, mdevid, _apdev->vdev, _err); +if (ret) { +goto out_device_err; +} Don't you need a put somewhere to avoid memory leaks? There is a call to vfio_put_device in the unrealize function. I don't think unrealize is called if realize failed, so you need to clean up in the error cases? Very true. I misinterpreted your point. Yes, I need to clean up if realize fails. + +return; + + +out_device_err: +vfio_put_group(vfio_group); +out_err: +vfio_apdev = NULL; +error_propagate(errp, local_err); +}
Re: [Qemu-devel] [PATCH v4 4/5] s390x/vfio: ap: Introduce VFIO AP device
On Sun, 22 Apr 2018 12:05:44 -0400 Tony Krowiakwrote: > On 04/19/2018 08:03 AM, Cornelia Huck wrote: > > On Sun, 15 Apr 2018 15:07:23 -0400 > > Tony Krowiak wrote: > > > >> Introduces a VFIO based AP device. The device is defined via > >> the QEMU command line by specifying: > >> > >> -device vfio-ap,sysfsdev= > >> > >> There may be only one vfio-ap device configured for a guest. > >> > >> The mediated matrix device is created by the VFIO AP device > >> driver by writing a UUID to a sysfs attribute file (see > >> docs/vfio-ap.txt). The mediated matrix device will be named > >> after the UUID. Symbolic links to the $uuid are created in > >> many places, so the path to the mediated matrix device $uuid > >> can be specified in any of the following ways: > >> > >> /sys/devices/vfio_ap/matrix/$uuid > >> /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid > >> /sys/bus/mdev/devices/$uuid > >> /sys/bus/mdev/drivers/vfio_mdev/$uuid > >> > >> When the vfio-ap device is realized, it acquires and opens the > >> VFIO iommu group to which the mediated matrix device is > >> bound. This causes a VFIO group notification event to be > >> signaled. The vfio_ap device driver's group notification > >> handler will get called at which time the device driver > >> will configure the the AP devices to which the guest will > >> be granted access. > >> > >> Signed-off-by: Tony Krowiak > >> --- > >> default-configs/s390x-softmmu.mak |1 + > >> hw/vfio/Makefile.objs |1 + > >> hw/vfio/ap.c | 191 > >> + > >> include/hw/vfio/vfio-common.h |1 + > >> 4 files changed, 194 insertions(+), 0 deletions(-) > >> create mode 100644 hw/vfio/ap.c > >> +static void vfio_ap_realize(DeviceState *dev, Error **errp) > >> +{ > >> +VFIODevice *vbasedev; > >> +VFIOGroup *vfio_group; > >> +APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev); > >> +char *mdevid; > >> +Error *local_err = NULL; > >> +int ret; > >> + > >> +/* > >> + * Since a guest's matrix is configured in its entirety by the > >> mediated > >> + * matrix device and hot plug is not currently supported, there is no > >> + * need to have more than one vfio-ap device. Check if a vfio-ap > >> device > >> + * has already been defined. > >> + */ > >> +if (vfio_apdev) { > >> +error_setg(_err, "Only one %s device is allowed", > >> + VFIO_AP_DEVICE_TYPE); > >> +goto out_err; > >> +} > >> + > >> +if (!s390_has_feat(S390_FEAT_AP)) { > >> +error_setg(_err, "AP support not enabled"); > >> +goto out_err; > >> +} > >> + > >> +vfio_apdev = DO_UPCAST(VFIOAPDevice, apdev, apdev); > >> + > >> +vfio_group = vfio_ap_get_group(vfio_apdev, _err); > >> +if (!vfio_group) { > >> +goto out_err; > >> +} > >> + > >> +vfio_apdev->vdev.ops = _ap_ops; > >> +vfio_apdev->vdev.type = VFIO_DEVICE_TYPE_AP; > >> +mdevid = basename(vfio_apdev->vdev.sysfsdev); > >> +vfio_apdev->vdev.name = g_strdup_printf("%s", mdevid); > >> +vfio_apdev->vdev.dev = dev; > >> +QLIST_FOREACH(vbasedev, _group->device_list, next) { > >> +if (strcmp(vbasedev->name, vfio_apdev->vdev.name) == 0) { > >> +error_setg(_err, > >> + "%s: AP device %s has already been realized", > >> + VFIO_AP_DEVICE_TYPE, vfio_apdev->vdev.name); > >> +goto out_device_err; > >> +} > >> +} > >> + > >> +ret = vfio_get_device(vfio_group, mdevid, _apdev->vdev, > >> _err); > >> +if (ret) { > >> +goto out_device_err; > >> +} > > Don't you need a put somewhere to avoid memory leaks? > > There is a call to vfio_put_device in the unrealize function. I don't think unrealize is called if realize failed, so you need to clean up in the error cases? > > > > >> + > >> +return; > >> + > >> + > >> +out_device_err: > >> +vfio_put_group(vfio_group); > >> +out_err: > >> +vfio_apdev = NULL; > >> +error_propagate(errp, local_err); > >> +} > >
Re: [Qemu-devel] [PATCH v4 4/5] s390x/vfio: ap: Introduce VFIO AP device
On 04/19/2018 08:03 AM, Cornelia Huck wrote: On Sun, 15 Apr 2018 15:07:23 -0400 Tony Krowiakwrote: Introduces a VFIO based AP device. The device is defined via the QEMU command line by specifying: -device vfio-ap,sysfsdev= There may be only one vfio-ap device configured for a guest. The mediated matrix device is created by the VFIO AP device driver by writing a UUID to a sysfs attribute file (see docs/vfio-ap.txt). The mediated matrix device will be named after the UUID. Symbolic links to the $uuid are created in many places, so the path to the mediated matrix device $uuid can be specified in any of the following ways: /sys/devices/vfio_ap/matrix/$uuid /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid /sys/bus/mdev/devices/$uuid /sys/bus/mdev/drivers/vfio_mdev/$uuid When the vfio-ap device is realized, it acquires and opens the VFIO iommu group to which the mediated matrix device is bound. This causes a VFIO group notification event to be signaled. The vfio_ap device driver's group notification handler will get called at which time the device driver will configure the the AP devices to which the guest will be granted access. Signed-off-by: Tony Krowiak --- default-configs/s390x-softmmu.mak |1 + hw/vfio/Makefile.objs |1 + hw/vfio/ap.c | 191 + include/hw/vfio/vfio-common.h |1 + 4 files changed, 194 insertions(+), 0 deletions(-) create mode 100644 hw/vfio/ap.c +static void vfio_ap_realize(DeviceState *dev, Error **errp) +{ +VFIODevice *vbasedev; +VFIOGroup *vfio_group; +APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev); +char *mdevid; +Error *local_err = NULL; +int ret; + +/* + * Since a guest's matrix is configured in its entirety by the mediated + * matrix device and hot plug is not currently supported, there is no + * need to have more than one vfio-ap device. Check if a vfio-ap device + * has already been defined. + */ +if (vfio_apdev) { +error_setg(_err, "Only one %s device is allowed", + VFIO_AP_DEVICE_TYPE); +goto out_err; +} + +if (!s390_has_feat(S390_FEAT_AP)) { +error_setg(_err, "AP support not enabled"); +goto out_err; +} + +vfio_apdev = DO_UPCAST(VFIOAPDevice, apdev, apdev); + +vfio_group = vfio_ap_get_group(vfio_apdev, _err); +if (!vfio_group) { +goto out_err; +} + +vfio_apdev->vdev.ops = _ap_ops; +vfio_apdev->vdev.type = VFIO_DEVICE_TYPE_AP; +mdevid = basename(vfio_apdev->vdev.sysfsdev); +vfio_apdev->vdev.name = g_strdup_printf("%s", mdevid); +vfio_apdev->vdev.dev = dev; +QLIST_FOREACH(vbasedev, _group->device_list, next) { +if (strcmp(vbasedev->name, vfio_apdev->vdev.name) == 0) { +error_setg(_err, + "%s: AP device %s has already been realized", + VFIO_AP_DEVICE_TYPE, vfio_apdev->vdev.name); +goto out_device_err; +} +} + +ret = vfio_get_device(vfio_group, mdevid, _apdev->vdev, _err); +if (ret) { +goto out_device_err; +} Don't you need a put somewhere to avoid memory leaks? There is a call to vfio_put_device in the unrealize function. + +return; + + +out_device_err: +vfio_put_group(vfio_group); +out_err: +vfio_apdev = NULL; +error_propagate(errp, local_err); +}
Re: [Qemu-devel] [PATCH v4 4/5] s390x/vfio: ap: Introduce VFIO AP device
On 04/18/2018 05:11 AM, Pierre Morel wrote: On 15/04/2018 21:07, Tony Krowiak wrote: Introduces a VFIO based AP device. The device is defined via the QEMU command line by specifying: -device vfio-ap,sysfsdev= There may be only one vfio-ap device configured for a guest. The mediated matrix device is created by the VFIO AP device driver by writing a UUID to a sysfs attribute file (see docs/vfio-ap.txt). The mediated matrix device will be named after the UUID. Symbolic links to the $uuid are created in many places, so the path to the mediated matrix device $uuid can be specified in any of the following ways: /sys/devices/vfio_ap/matrix/$uuid /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid /sys/bus/mdev/devices/$uuid /sys/bus/mdev/drivers/vfio_mdev/$uuid When the vfio-ap device is realized, it acquires and opens the VFIO iommu group to which the mediated matrix device is bound. This causes a VFIO group notification event to be signaled. The vfio_ap device driver's group notification handler will get called at which time the device driver will configure the the AP devices to which the guest will be granted access. Signed-off-by: Tony Krowiak--- default-configs/s390x-softmmu.mak |1 + hw/vfio/Makefile.objs |1 + hw/vfio/ap.c | 191 + include/hw/vfio/vfio-common.h |1 + 4 files changed, 194 insertions(+), 0 deletions(-) create mode 100644 hw/vfio/ap.c diff --git a/default-configs/s390x-softmmu.mak b/default-configs/s390x-softmmu.mak index 2f4bfe7..0b784b6 100644 --- a/default-configs/s390x-softmmu.mak +++ b/default-configs/s390x-softmmu.mak @@ -9,3 +9,4 @@ CONFIG_S390_FLIC=y CONFIG_S390_FLIC_KVM=$(CONFIG_KVM) CONFIG_VFIO_CCW=$(CONFIG_LINUX) CONFIG_WDT_DIAG288=y +CONFIG_VFIO_AP=$(CONFIG_LINUX) diff --git a/hw/vfio/Makefile.objs b/hw/vfio/Makefile.objs index a2e7a0a..8b3f664 100644 --- a/hw/vfio/Makefile.objs +++ b/hw/vfio/Makefile.objs @@ -6,4 +6,5 @@ obj-$(CONFIG_SOFTMMU) += platform.o obj-$(CONFIG_VFIO_XGMAC) += calxeda-xgmac.o obj-$(CONFIG_VFIO_AMD_XGBE) += amd-xgbe.o obj-$(CONFIG_SOFTMMU) += spapr.o +obj-$(CONFIG_VFIO_AP) += ap.o endif diff --git a/hw/vfio/ap.c b/hw/vfio/ap.c new file mode 100644 index 000..7b48a3a --- /dev/null +++ b/hw/vfio/ap.c @@ -0,0 +1,191 @@ +/* + * VFIO based AP matrix device assignment + * + * Copyright 2018 IBM Corp. + * Author(s): Tony Krowiak + * + * This work is licensed under the terms of the GNU GPL, version 2 or (at + * your option) any later version. See the COPYING file in the top-level + * directory. + */ + +#include +#include +#include "qemu/osdep.h" +#include "qapi/error.h" +#include "hw/sysbus.h" +#include "hw/vfio/vfio.h" +#include "hw/vfio/vfio-common.h" +#include "hw/s390x/ap-device.h" +#include "qemu/error-report.h" +#include "qemu/queue.h" +#include "qemu/option.h" +#include "qemu/config-file.h" +#include "cpu.h" +#include "kvm_s390x.h" +#include "sysemu/sysemu.h" + +#define VFIO_AP_DEVICE_TYPE "vfio-ap" + +typedef struct VFIOAPDevice { +APDevice apdev; +VFIODevice vdev; +QTAILQ_ENTRY(VFIOAPDevice) sibling; +} VFIOAPDevice; + +VFIOAPDevice *vfio_apdev; + +static void vfio_ap_compute_needs_reset(VFIODevice *vdev) +{ +vdev->needs_reset = false; +} + +/* + * We don't need vfio_hot_reset_multi and vfio_eoi operations for + * vfio-ap-matrix device now. + */ +struct VFIODeviceOps vfio_ap_ops = { +.vfio_compute_needs_reset = vfio_ap_compute_needs_reset, +}; + +static void vfio_put_device(VFIOAPDevice *vapdev) +{ +g_free(vapdev->vdev.name); +vfio_put_base_device(>vdev); +} + +static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp) +{ +char *tmp, group_path[PATH_MAX]; +ssize_t len; +int groupid; + +tmp = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev); +len = readlink(tmp, group_path, sizeof(group_path)); +g_free(tmp); + +if (len <= 0 || len >= sizeof(group_path)) { +error_setg(errp, "%s: no iommu_group found for %s", + VFIO_AP_DEVICE_TYPE, vapdev->vdev.sysfsdev); +return NULL; +} + +group_path[len] = 0; + +if (sscanf(basename(group_path), "%d", ) != 1) { +error_setg(errp, "vfio: failed to read %s", group_path); +return NULL; +} + +return vfio_get_group(groupid, _space_memory, errp); +} + +static void vfio_ap_realize(DeviceState *dev, Error **errp) +{ +VFIODevice *vbasedev; +VFIOGroup *vfio_group; +APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev); +char *mdevid; +Error *local_err = NULL; +int ret; + +/* + * Since a guest's matrix is configured in its entirety by the mediated + * matrix device and hot plug is not currently supported, there is no + * need to have more than one vfio-ap device. Check if a vfio-ap device + * has already been
Re: [Qemu-devel] [PATCH v4 4/5] s390x/vfio: ap: Introduce VFIO AP device
On Sun, 15 Apr 2018 15:07:23 -0400 Tony Krowiakwrote: > Introduces a VFIO based AP device. The device is defined via > the QEMU command line by specifying: > > -device vfio-ap,sysfsdev= > > There may be only one vfio-ap device configured for a guest. > > The mediated matrix device is created by the VFIO AP device > driver by writing a UUID to a sysfs attribute file (see > docs/vfio-ap.txt). The mediated matrix device will be named > after the UUID. Symbolic links to the $uuid are created in > many places, so the path to the mediated matrix device $uuid > can be specified in any of the following ways: > > /sys/devices/vfio_ap/matrix/$uuid > /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid > /sys/bus/mdev/devices/$uuid > /sys/bus/mdev/drivers/vfio_mdev/$uuid > > When the vfio-ap device is realized, it acquires and opens the > VFIO iommu group to which the mediated matrix device is > bound. This causes a VFIO group notification event to be > signaled. The vfio_ap device driver's group notification > handler will get called at which time the device driver > will configure the the AP devices to which the guest will > be granted access. > > Signed-off-by: Tony Krowiak > --- > default-configs/s390x-softmmu.mak |1 + > hw/vfio/Makefile.objs |1 + > hw/vfio/ap.c | 191 > + > include/hw/vfio/vfio-common.h |1 + > 4 files changed, 194 insertions(+), 0 deletions(-) > create mode 100644 hw/vfio/ap.c > +static void vfio_ap_realize(DeviceState *dev, Error **errp) > +{ > +VFIODevice *vbasedev; > +VFIOGroup *vfio_group; > +APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev); > +char *mdevid; > +Error *local_err = NULL; > +int ret; > + > +/* > + * Since a guest's matrix is configured in its entirety by the mediated > + * matrix device and hot plug is not currently supported, there is no > + * need to have more than one vfio-ap device. Check if a vfio-ap device > + * has already been defined. > + */ > +if (vfio_apdev) { > +error_setg(_err, "Only one %s device is allowed", > + VFIO_AP_DEVICE_TYPE); > +goto out_err; > +} > + > +if (!s390_has_feat(S390_FEAT_AP)) { > +error_setg(_err, "AP support not enabled"); > +goto out_err; > +} > + > +vfio_apdev = DO_UPCAST(VFIOAPDevice, apdev, apdev); > + > +vfio_group = vfio_ap_get_group(vfio_apdev, _err); > +if (!vfio_group) { > +goto out_err; > +} > + > +vfio_apdev->vdev.ops = _ap_ops; > +vfio_apdev->vdev.type = VFIO_DEVICE_TYPE_AP; > +mdevid = basename(vfio_apdev->vdev.sysfsdev); > +vfio_apdev->vdev.name = g_strdup_printf("%s", mdevid); > +vfio_apdev->vdev.dev = dev; > +QLIST_FOREACH(vbasedev, _group->device_list, next) { > +if (strcmp(vbasedev->name, vfio_apdev->vdev.name) == 0) { > +error_setg(_err, > + "%s: AP device %s has already been realized", > + VFIO_AP_DEVICE_TYPE, vfio_apdev->vdev.name); > +goto out_device_err; > +} > +} > + > +ret = vfio_get_device(vfio_group, mdevid, _apdev->vdev, _err); > +if (ret) { > +goto out_device_err; > +} Don't you need a put somewhere to avoid memory leaks? > + > +return; > + > + > +out_device_err: > +vfio_put_group(vfio_group); > +out_err: > +vfio_apdev = NULL; > +error_propagate(errp, local_err); > +}
Re: [Qemu-devel] [PATCH v4 4/5] s390x/vfio: ap: Introduce VFIO AP device
On 15/04/2018 21:07, Tony Krowiak wrote: Introduces a VFIO based AP device. The device is defined via the QEMU command line by specifying: -device vfio-ap,sysfsdev= There may be only one vfio-ap device configured for a guest. The mediated matrix device is created by the VFIO AP device driver by writing a UUID to a sysfs attribute file (see docs/vfio-ap.txt). The mediated matrix device will be named after the UUID. Symbolic links to the $uuid are created in many places, so the path to the mediated matrix device $uuid can be specified in any of the following ways: /sys/devices/vfio_ap/matrix/$uuid /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid /sys/bus/mdev/devices/$uuid /sys/bus/mdev/drivers/vfio_mdev/$uuid When the vfio-ap device is realized, it acquires and opens the VFIO iommu group to which the mediated matrix device is bound. This causes a VFIO group notification event to be signaled. The vfio_ap device driver's group notification handler will get called at which time the device driver will configure the the AP devices to which the guest will be granted access. Signed-off-by: Tony Krowiak--- default-configs/s390x-softmmu.mak |1 + hw/vfio/Makefile.objs |1 + hw/vfio/ap.c | 191 + include/hw/vfio/vfio-common.h |1 + 4 files changed, 194 insertions(+), 0 deletions(-) create mode 100644 hw/vfio/ap.c diff --git a/default-configs/s390x-softmmu.mak b/default-configs/s390x-softmmu.mak index 2f4bfe7..0b784b6 100644 --- a/default-configs/s390x-softmmu.mak +++ b/default-configs/s390x-softmmu.mak @@ -9,3 +9,4 @@ CONFIG_S390_FLIC=y CONFIG_S390_FLIC_KVM=$(CONFIG_KVM) CONFIG_VFIO_CCW=$(CONFIG_LINUX) CONFIG_WDT_DIAG288=y +CONFIG_VFIO_AP=$(CONFIG_LINUX) diff --git a/hw/vfio/Makefile.objs b/hw/vfio/Makefile.objs index a2e7a0a..8b3f664 100644 --- a/hw/vfio/Makefile.objs +++ b/hw/vfio/Makefile.objs @@ -6,4 +6,5 @@ obj-$(CONFIG_SOFTMMU) += platform.o obj-$(CONFIG_VFIO_XGMAC) += calxeda-xgmac.o obj-$(CONFIG_VFIO_AMD_XGBE) += amd-xgbe.o obj-$(CONFIG_SOFTMMU) += spapr.o +obj-$(CONFIG_VFIO_AP) += ap.o endif diff --git a/hw/vfio/ap.c b/hw/vfio/ap.c new file mode 100644 index 000..7b48a3a --- /dev/null +++ b/hw/vfio/ap.c @@ -0,0 +1,191 @@ +/* + * VFIO based AP matrix device assignment + * + * Copyright 2018 IBM Corp. + * Author(s): Tony Krowiak + * + * This work is licensed under the terms of the GNU GPL, version 2 or (at + * your option) any later version. See the COPYING file in the top-level + * directory. + */ + +#include +#include +#include "qemu/osdep.h" +#include "qapi/error.h" +#include "hw/sysbus.h" +#include "hw/vfio/vfio.h" +#include "hw/vfio/vfio-common.h" +#include "hw/s390x/ap-device.h" +#include "qemu/error-report.h" +#include "qemu/queue.h" +#include "qemu/option.h" +#include "qemu/config-file.h" +#include "cpu.h" +#include "kvm_s390x.h" +#include "sysemu/sysemu.h" + +#define VFIO_AP_DEVICE_TYPE "vfio-ap" + +typedef struct VFIOAPDevice { +APDevice apdev; +VFIODevice vdev; +QTAILQ_ENTRY(VFIOAPDevice) sibling; +} VFIOAPDevice; + +VFIOAPDevice *vfio_apdev; + +static void vfio_ap_compute_needs_reset(VFIODevice *vdev) +{ +vdev->needs_reset = false; +} + +/* + * We don't need vfio_hot_reset_multi and vfio_eoi operations for + * vfio-ap-matrix device now. + */ +struct VFIODeviceOps vfio_ap_ops = { +.vfio_compute_needs_reset = vfio_ap_compute_needs_reset, +}; + +static void vfio_put_device(VFIOAPDevice *vapdev) +{ +g_free(vapdev->vdev.name); +vfio_put_base_device(>vdev); +} + +static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp) +{ +char *tmp, group_path[PATH_MAX]; +ssize_t len; +int groupid; + +tmp = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev); +len = readlink(tmp, group_path, sizeof(group_path)); +g_free(tmp); + +if (len <= 0 || len >= sizeof(group_path)) { +error_setg(errp, "%s: no iommu_group found for %s", + VFIO_AP_DEVICE_TYPE, vapdev->vdev.sysfsdev); +return NULL; +} + +group_path[len] = 0; + +if (sscanf(basename(group_path), "%d", ) != 1) { +error_setg(errp, "vfio: failed to read %s", group_path); +return NULL; +} + +return vfio_get_group(groupid, _space_memory, errp); +} + +static void vfio_ap_realize(DeviceState *dev, Error **errp) +{ +VFIODevice *vbasedev; +VFIOGroup *vfio_group; +APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev); +char *mdevid; +Error *local_err = NULL; +int ret; + +/* + * Since a guest's matrix is configured in its entirety by the mediated + * matrix device and hot plug is not currently supported, there is no + * need to have more than one vfio-ap device. Check if a vfio-ap device + * has already been defined. + */ +if (vfio_apdev) { +
[Qemu-devel] [PATCH v4 4/5] s390x/vfio: ap: Introduce VFIO AP device
Introduces a VFIO based AP device. The device is defined via the QEMU command line by specifying: -device vfio-ap,sysfsdev= There may be only one vfio-ap device configured for a guest. The mediated matrix device is created by the VFIO AP device driver by writing a UUID to a sysfs attribute file (see docs/vfio-ap.txt). The mediated matrix device will be named after the UUID. Symbolic links to the $uuid are created in many places, so the path to the mediated matrix device $uuid can be specified in any of the following ways: /sys/devices/vfio_ap/matrix/$uuid /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough/devices/$uuid /sys/bus/mdev/devices/$uuid /sys/bus/mdev/drivers/vfio_mdev/$uuid When the vfio-ap device is realized, it acquires and opens the VFIO iommu group to which the mediated matrix device is bound. This causes a VFIO group notification event to be signaled. The vfio_ap device driver's group notification handler will get called at which time the device driver will configure the the AP devices to which the guest will be granted access. Signed-off-by: Tony Krowiak--- default-configs/s390x-softmmu.mak |1 + hw/vfio/Makefile.objs |1 + hw/vfio/ap.c | 191 + include/hw/vfio/vfio-common.h |1 + 4 files changed, 194 insertions(+), 0 deletions(-) create mode 100644 hw/vfio/ap.c diff --git a/default-configs/s390x-softmmu.mak b/default-configs/s390x-softmmu.mak index 2f4bfe7..0b784b6 100644 --- a/default-configs/s390x-softmmu.mak +++ b/default-configs/s390x-softmmu.mak @@ -9,3 +9,4 @@ CONFIG_S390_FLIC=y CONFIG_S390_FLIC_KVM=$(CONFIG_KVM) CONFIG_VFIO_CCW=$(CONFIG_LINUX) CONFIG_WDT_DIAG288=y +CONFIG_VFIO_AP=$(CONFIG_LINUX) diff --git a/hw/vfio/Makefile.objs b/hw/vfio/Makefile.objs index a2e7a0a..8b3f664 100644 --- a/hw/vfio/Makefile.objs +++ b/hw/vfio/Makefile.objs @@ -6,4 +6,5 @@ obj-$(CONFIG_SOFTMMU) += platform.o obj-$(CONFIG_VFIO_XGMAC) += calxeda-xgmac.o obj-$(CONFIG_VFIO_AMD_XGBE) += amd-xgbe.o obj-$(CONFIG_SOFTMMU) += spapr.o +obj-$(CONFIG_VFIO_AP) += ap.o endif diff --git a/hw/vfio/ap.c b/hw/vfio/ap.c new file mode 100644 index 000..7b48a3a --- /dev/null +++ b/hw/vfio/ap.c @@ -0,0 +1,191 @@ +/* + * VFIO based AP matrix device assignment + * + * Copyright 2018 IBM Corp. + * Author(s): Tony Krowiak + * + * This work is licensed under the terms of the GNU GPL, version 2 or (at + * your option) any later version. See the COPYING file in the top-level + * directory. + */ + +#include +#include +#include "qemu/osdep.h" +#include "qapi/error.h" +#include "hw/sysbus.h" +#include "hw/vfio/vfio.h" +#include "hw/vfio/vfio-common.h" +#include "hw/s390x/ap-device.h" +#include "qemu/error-report.h" +#include "qemu/queue.h" +#include "qemu/option.h" +#include "qemu/config-file.h" +#include "cpu.h" +#include "kvm_s390x.h" +#include "sysemu/sysemu.h" + +#define VFIO_AP_DEVICE_TYPE "vfio-ap" + +typedef struct VFIOAPDevice { +APDevice apdev; +VFIODevice vdev; +QTAILQ_ENTRY(VFIOAPDevice) sibling; +} VFIOAPDevice; + +VFIOAPDevice *vfio_apdev; + +static void vfio_ap_compute_needs_reset(VFIODevice *vdev) +{ +vdev->needs_reset = false; +} + +/* + * We don't need vfio_hot_reset_multi and vfio_eoi operations for + * vfio-ap-matrix device now. + */ +struct VFIODeviceOps vfio_ap_ops = { +.vfio_compute_needs_reset = vfio_ap_compute_needs_reset, +}; + +static void vfio_put_device(VFIOAPDevice *vapdev) +{ +g_free(vapdev->vdev.name); +vfio_put_base_device(>vdev); +} + +static VFIOGroup *vfio_ap_get_group(VFIOAPDevice *vapdev, Error **errp) +{ +char *tmp, group_path[PATH_MAX]; +ssize_t len; +int groupid; + +tmp = g_strdup_printf("%s/iommu_group", vapdev->vdev.sysfsdev); +len = readlink(tmp, group_path, sizeof(group_path)); +g_free(tmp); + +if (len <= 0 || len >= sizeof(group_path)) { +error_setg(errp, "%s: no iommu_group found for %s", + VFIO_AP_DEVICE_TYPE, vapdev->vdev.sysfsdev); +return NULL; +} + +group_path[len] = 0; + +if (sscanf(basename(group_path), "%d", ) != 1) { +error_setg(errp, "vfio: failed to read %s", group_path); +return NULL; +} + +return vfio_get_group(groupid, _space_memory, errp); +} + +static void vfio_ap_realize(DeviceState *dev, Error **errp) +{ +VFIODevice *vbasedev; +VFIOGroup *vfio_group; +APDevice *apdev = DO_UPCAST(APDevice, parent_obj, dev); +char *mdevid; +Error *local_err = NULL; +int ret; + +/* + * Since a guest's matrix is configured in its entirety by the mediated + * matrix device and hot plug is not currently supported, there is no + * need to have more than one vfio-ap device. Check if a vfio-ap device + * has already been defined. + */ +if (vfio_apdev) { +error_setg(_err, "Only one %s device is allowed", +