[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[RFC v8 10/28] pci: introduce PCIPASIDOps to PCIDevice
From: |
Eric Auger |
Subject: |
[RFC v8 10/28] pci: introduce PCIPASIDOps to PCIDevice |
Date: |
Thu, 25 Feb 2021 11:52:15 +0100 |
From: Liu Yi L <yi.l.liu@intel.com>
This patch introduces PCIPASIDOps for IOMMU related operations.
https://lists.gnu.org/archive/html/qemu-devel/2018-03/msg00078.html
https://lists.gnu.org/archive/html/qemu-devel/2018-03/msg00940.html
So far, to setup virt-SVA for assigned SVA capable device, needs to
configure host translation structures for specific pasid. (e.g. bind
guest page table to host and enable nested translation in host).
Besides, vIOMMU emulator needs to forward guest's cache invalidation
to host since host nested translation is enabled. e.g. on VT-d, guest
owns 1st level translation table, thus cache invalidation for 1st
level should be propagated to host.
This patch adds two functions: alloc_pasid and free_pasid to support
guest pasid allocation and free. The implementations of the callbacks
would be device passthru modules. Like vfio.
Cc: Kevin Tian <kevin.tian@intel.com>
Cc: Jacob Pan <jacob.jun.pan@linux.intel.com>
Cc: Peter Xu <peterx@redhat.com>
Cc: Eric Auger <eric.auger@redhat.com>
Cc: Yi Sun <yi.y.sun@linux.intel.com>
Cc: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Liu Yi L <yi.l.liu@intel.com>
Signed-off-by: Yi Sun <yi.y.sun@linux.intel.com>
---
hw/pci/pci.c | 34 ++++++++++++++++++++++++++++++++++
include/hw/pci/pci.h | 11 +++++++++++
2 files changed, 45 insertions(+)
diff --git a/hw/pci/pci.c b/hw/pci/pci.c
index a9ebef8a35..8f79c9bf45 100644
--- a/hw/pci/pci.c
+++ b/hw/pci/pci.c
@@ -2724,6 +2724,40 @@ void pci_setup_iommu(PCIBus *bus, PCIIOMMUFunc fn, void
*opaque)
bus->iommu_opaque = opaque;
}
+void pci_setup_pasid_ops(PCIDevice *dev, PCIPASIDOps *ops)
+{
+ assert(ops && !dev->pasid_ops);
+ dev->pasid_ops = ops;
+}
+
+bool pci_device_is_pasid_ops_set(PCIBus *bus, int32_t devfn)
+{
+ PCIDevice *dev;
+
+ if (!bus) {
+ return false;
+ }
+
+ dev = bus->devices[devfn];
+ return !!(dev && dev->pasid_ops);
+}
+
+int pci_device_set_pasid_table(PCIBus *bus, int32_t devfn,
+ IOMMUConfig *config)
+{
+ PCIDevice *dev;
+
+ if (!bus) {
+ return -EINVAL;
+ }
+
+ dev = bus->devices[devfn];
+ if (dev && dev->pasid_ops && dev->pasid_ops->set_pasid_table) {
+ return dev->pasid_ops->set_pasid_table(bus, devfn, config);
+ }
+ return -ENOENT;
+}
+
static void pci_dev_get_w64(PCIBus *b, PCIDevice *dev, void *opaque)
{
Range *range = opaque;
diff --git a/include/hw/pci/pci.h b/include/hw/pci/pci.h
index 1bc231480f..820c3485a1 100644
--- a/include/hw/pci/pci.h
+++ b/include/hw/pci/pci.h
@@ -9,6 +9,7 @@
#include "hw/pci/pcie.h"
#include "qom/object.h"
+#include "hw/iommu/iommu.h"
extern bool pci_available;
@@ -265,6 +266,11 @@ struct PCIReqIDCache {
};
typedef struct PCIReqIDCache PCIReqIDCache;
+struct PCIPASIDOps {
+ int (*set_pasid_table)(PCIBus *bus, int32_t devfn, IOMMUConfig *config);
+};
+typedef struct PCIPASIDOps PCIPASIDOps;
+
struct PCIDevice {
DeviceState qdev;
bool partially_hotplugged;
@@ -359,6 +365,7 @@ struct PCIDevice {
/* ID of standby device in net_failover pair */
char *failover_pair_id;
+ PCIPASIDOps *pasid_ops;
};
void pci_register_bar(PCIDevice *pci_dev, int region_num,
@@ -490,6 +497,10 @@ typedef AddressSpace *(*PCIIOMMUFunc)(PCIBus *, void *,
int);
AddressSpace *pci_device_iommu_address_space(PCIDevice *dev);
void pci_setup_iommu(PCIBus *bus, PCIIOMMUFunc fn, void *opaque);
+void pci_setup_pasid_ops(PCIDevice *dev, PCIPASIDOps *ops);
+bool pci_device_is_pasid_ops_set(PCIBus *bus, int32_t devfn);
+int pci_device_set_pasid_table(PCIBus *bus, int32_t devfn, IOMMUConfig
*config);
+
static inline void
pci_set_byte(uint8_t *config, uint8_t val)
{
--
2.26.2
- [RFC v8 00/28] vSMMUv3/pSMMUv3 2 stage VFIO integration, Eric Auger, 2021/02/25
- [RFC v8 01/28] hw/vfio/common: trace vfio_connect_container operations, Eric Auger, 2021/02/25
- [RFC v8 02/28] update-linux-headers: Import iommu.h, Eric Auger, 2021/02/25
- [RFC v8 03/28] header update against 5.11-rc2 and IOMMU/VFIO nested stage APIs, Eric Auger, 2021/02/25
- [RFC v8 04/28] memory: Add new fields in IOTLBEntry, Eric Auger, 2021/02/25
- [RFC v8 05/28] hw/arm/smmuv3: Properly propagate S1 asid invalidation, Eric Auger, 2021/02/25
- [RFC v8 06/28] memory: Add IOMMU_ATTR_VFIO_NESTED IOMMU memory region attribute, Eric Auger, 2021/02/25
- [RFC v8 07/28] memory: Add IOMMU_ATTR_MSI_TRANSLATE IOMMU memory region attribute, Eric Auger, 2021/02/25
- [RFC v8 08/28] memory: Introduce IOMMU Memory Region inject_faults API, Eric Auger, 2021/02/25
- [RFC v8 09/28] iommu: Introduce generic header, Eric Auger, 2021/02/25
- [RFC v8 10/28] pci: introduce PCIPASIDOps to PCIDevice,
Eric Auger <=
- [RFC v8 11/28] vfio: Force nested if iommu requires it, Eric Auger, 2021/02/25
- [RFC v8 12/28] vfio: Introduce hostwin_from_range helper, Eric Auger, 2021/02/25
- [RFC v8 13/28] vfio: Introduce helpers to DMA map/unmap a RAM section, Eric Auger, 2021/02/25
- [RFC v8 14/28] vfio: Set up nested stage mappings, Eric Auger, 2021/02/25
- [RFC v8 15/28] vfio: Pass stage 1 MSI bindings to the host, Eric Auger, 2021/02/25
- [RFC v8 16/28] vfio: Helper to get IRQ info including capabilities, Eric Auger, 2021/02/25
- [RFC v8 17/28] vfio/pci: Register handler for iommu fault, Eric Auger, 2021/02/25
- [RFC v8 18/28] vfio/pci: Set up the DMA FAULT region, Eric Auger, 2021/02/25
- [RFC v8 19/28] vfio/pci: Implement the DMA fault handler, Eric Auger, 2021/02/25
- [RFC v8 20/28] hw/arm/smmuv3: Advertise MSI_TRANSLATE attribute, Eric Auger, 2021/02/25