[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v3 07/13] virtio-iommu: Introduce per IOMMUDevice reserved region
From: |
Eric Auger |
Subject: |
[PATCH v3 07/13] virtio-iommu: Introduce per IOMMUDevice reserved regions |
Date: |
Wed, 11 Oct 2023 19:52:23 +0200 |
For the time being the per device reserved regions are
just a duplicate of IOMMU wide reserved regions. Subsequent
patches will combine those with host reserved regions, if any.
Signed-off-by: Eric Auger <eric.auger@redhat.com>
---
v2 -> v3:
- do the initialization of the GList when creating the IOMMUDevice
instead of in virtio_iommu_fill_resv_mem_prop(), which is called
conditionnally in driver's probe. Also use resv_region_list_insert()
---
include/hw/virtio/virtio-iommu.h | 1 +
hw/virtio/virtio-iommu.c | 37 +++++++++++++++++++++++++-------
2 files changed, 30 insertions(+), 8 deletions(-)
diff --git a/include/hw/virtio/virtio-iommu.h b/include/hw/virtio/virtio-iommu.h
index eea4564782..70b8ace34d 100644
--- a/include/hw/virtio/virtio-iommu.h
+++ b/include/hw/virtio/virtio-iommu.h
@@ -39,6 +39,7 @@ typedef struct IOMMUDevice {
AddressSpace as;
MemoryRegion root; /* The root container of the device */
MemoryRegion bypass_mr; /* The alias of shared memory MR */
+ GList *resv_regions;
} IOMMUDevice;
typedef struct IOMMUPciBus {
diff --git a/hw/virtio/virtio-iommu.c b/hw/virtio/virtio-iommu.c
index 979cdb5648..0e2370663d 100644
--- a/hw/virtio/virtio-iommu.c
+++ b/hw/virtio/virtio-iommu.c
@@ -26,6 +26,7 @@
#include "sysemu/kvm.h"
#include "sysemu/reset.h"
#include "sysemu/sysemu.h"
+#include "qemu/reserved-region.h"
#include "qapi/error.h"
#include "qemu/error-report.h"
#include "trace.h"
@@ -378,6 +379,19 @@ static void virtio_iommu_put_domain(gpointer data)
g_free(domain);
}
+static void add_prop_resv_regions(IOMMUDevice *sdev)
+{
+ VirtIOIOMMU *s = sdev->viommu;
+ int i;
+
+ for (i = 0; i < s->nr_prop_resv_regions; i++) {
+ ReservedRegion *reg = g_new0(ReservedRegion, 1);
+
+ *reg = s->prop_resv_regions[i];
+ sdev->resv_regions = resv_region_list_insert(sdev->resv_regions, reg);
+ }
+}
+
static AddressSpace *virtio_iommu_find_add_as(PCIBus *bus, void *opaque,
int devfn)
{
@@ -408,6 +422,7 @@ static AddressSpace *virtio_iommu_find_add_as(PCIBus *bus,
void *opaque,
memory_region_init(&sdev->root, OBJECT(s), name, UINT64_MAX);
address_space_init(&sdev->as, &sdev->root, TYPE_VIRTIO_IOMMU);
+ add_prop_resv_regions(sdev);
/*
* Build the IOMMU disabled container with aliases to the
@@ -629,17 +644,23 @@ static ssize_t
virtio_iommu_fill_resv_mem_prop(VirtIOIOMMU *s, uint32_t ep,
{
struct virtio_iommu_probe_resv_mem prop = {};
size_t size = sizeof(prop), length = size - sizeof(prop.head), total;
- int i;
+ IOMMUDevice *sdev;
+ GList *l;
- total = size * s->nr_prop_resv_regions;
+ sdev = container_of(virtio_iommu_mr(s, ep), IOMMUDevice, iommu_mr);
+ if (!sdev) {
+ return -EINVAL;
+ }
+ total = size * g_list_length(sdev->resv_regions);
if (total > free) {
return -ENOSPC;
}
- for (i = 0; i < s->nr_prop_resv_regions; i++) {
- unsigned subtype = s->prop_resv_regions[i].type;
- Range *range = &s->prop_resv_regions[i].range;
+ for (l = sdev->resv_regions; l; l = l->next) {
+ ReservedRegion *reg = l->data;
+ unsigned subtype = reg->type;
+ Range *range = ®->range;
assert(subtype == VIRTIO_IOMMU_RESV_MEM_T_RESERVED ||
subtype == VIRTIO_IOMMU_RESV_MEM_T_MSI);
@@ -857,7 +878,7 @@ static IOMMUTLBEntry
virtio_iommu_translate(IOMMUMemoryRegion *mr, hwaddr addr,
bool bypass_allowed;
int granule;
bool found;
- int i;
+ GList *l;
interval.low = addr;
interval.high = addr + 1;
@@ -895,8 +916,8 @@ static IOMMUTLBEntry
virtio_iommu_translate(IOMMUMemoryRegion *mr, hwaddr addr,
goto unlock;
}
- for (i = 0; i < s->nr_prop_resv_regions; i++) {
- ReservedRegion *reg = &s->prop_resv_regions[i];
+ for (l = sdev->resv_regions; l; l = l->next) {
+ ReservedRegion *reg = l->data;
if (range_contains(®->range, addr)) {
switch (reg->type) {
--
2.41.0
- [PATCH v3 00/13] VIRTIO-IOMMU/VFIO: Don't assume 64b IOVA space, Eric Auger, 2023/10/11
- [PATCH v3 01/13] memory: Let ReservedRegion use Range, Eric Auger, 2023/10/11
- [PATCH v3 02/13] memory: Introduce memory_region_iommu_set_iova_ranges, Eric Auger, 2023/10/11
- [PATCH v3 05/13] range: Make range_compare() public, Eric Auger, 2023/10/11
- [PATCH v3 03/13] vfio: Collect container iova range info, Eric Auger, 2023/10/11
- [PATCH v3 04/13] virtio-iommu: Rename reserved_regions into prop_resv_regions, Eric Auger, 2023/10/11
- [PATCH v3 07/13] virtio-iommu: Introduce per IOMMUDevice reserved regions,
Eric Auger <=
- [PATCH v3 11/13] virtio-iommu: Consolidate host reserved regions and property set ones, Eric Auger, 2023/10/11
- [PATCH v3 08/13] range: Introduce range_inverse_array(), Eric Auger, 2023/10/11
- [PATCH v3 09/13] virtio-iommu: Record whether a probe request has been issued, Eric Auger, 2023/10/11
- [PATCH v3 12/13] test: Add some tests for range and resv-mem helpers, Eric Auger, 2023/10/11
- [PATCH v3 06/13] util/reserved-region: Add new ReservedRegion helpers, Eric Auger, 2023/10/11
- [PATCH v3 13/13] vfio: Remove 64-bit IOVA address space assumption, Eric Auger, 2023/10/11
- [PATCH v3 10/13] virtio-iommu: Implement set_iova_ranges() callback, Eric Auger, 2023/10/11