* [Qemu-devel] [PATCH fixup 0/2] Vhost device IOTLB fixup for vfio enablment
@ 2017-03-20 3:36 Jason Wang
2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 1/2] intel_iommu: use the correct memory region for device IOTLB notification Jason Wang
2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region Jason Wang
0 siblings, 2 replies; 9+ messages in thread
From: Jason Wang @ 2017-03-20 3:36 UTC (permalink / raw)
To: mst, peterx, qemu-devel; +Cc: Jason Wang
Hi:
This series is a fixup for vfio enablement series which breaks vhost
device IOTLB. The main reason is that vhost device IOTLB assumes the
iommu region were alwasy as->root. Fixing by using a memory listener
to register iommu notifiers.
Please review.
Jason Wang (2):
intel_iommu: use the correct memory region for device IOTLB
notification
vhost: genearlize iommu memory region
hw/i386/intel_iommu.c | 2 +-
hw/virtio/vhost.c | 93 +++++++++++++++++++++++++++++++++++++----------
include/hw/virtio/vhost.h | 10 +++++
3 files changed, 84 insertions(+), 21 deletions(-)
--
2.7.4
^ permalink raw reply [flat|nested] 9+ messages in thread
* [Qemu-devel] [PATCH fixup 1/2] intel_iommu: use the correct memory region for device IOTLB notification
2017-03-20 3:36 [Qemu-devel] [PATCH fixup 0/2] Vhost device IOTLB fixup for vfio enablment Jason Wang
@ 2017-03-20 3:36 ` Jason Wang
2017-03-20 7:10 ` Peter Xu
2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region Jason Wang
1 sibling, 1 reply; 9+ messages in thread
From: Jason Wang @ 2017-03-20 3:36 UTC (permalink / raw)
To: mst, peterx, qemu-devel
Cc: Jason Wang, Paolo Bonzini, Richard Henderson, Eduardo Habkost
We have a specific memory region for DMAR now, so it's wrong to
trigger the notifier with the root region.
Cc: Michael S. Tsirkin <mst@redhat.com>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Cc: Richard Henderson <rth@twiddle.net>
Cc: Eduardo Habkost <ehabkost@redhat.com>
Signed-off-by: Jason Wang <jasowang@redhat.com>
---
hw/i386/intel_iommu.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/hw/i386/intel_iommu.c b/hw/i386/intel_iommu.c
index 9b1ba1b..bc95304 100644
--- a/hw/i386/intel_iommu.c
+++ b/hw/i386/intel_iommu.c
@@ -1709,7 +1709,7 @@ static bool vtd_process_device_iotlb_desc(IntelIOMMUState *s,
entry.iova = addr;
entry.perm = IOMMU_NONE;
entry.translated_addr = 0;
- memory_region_notify_iommu(entry.target_as->root, entry);
+ memory_region_notify_iommu(&vtd_dev_as->iommu, entry);
done:
return true;
--
2.7.4
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region
2017-03-20 3:36 [Qemu-devel] [PATCH fixup 0/2] Vhost device IOTLB fixup for vfio enablment Jason Wang
2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 1/2] intel_iommu: use the correct memory region for device IOTLB notification Jason Wang
@ 2017-03-20 3:36 ` Jason Wang
2017-03-20 9:07 ` Peter Xu
1 sibling, 1 reply; 9+ messages in thread
From: Jason Wang @ 2017-03-20 3:36 UTC (permalink / raw)
To: mst, peterx, qemu-devel; +Cc: Jason Wang
We assumes the iommu_ops were attached to the root region of address
space. This may not true for all kinds of IOMMU implementation. So fix
this by not assume as->root has iommu_ops and:
- register a memory listener to dma_as
- during region_add, if it's a region of IOMMU, register a specific
IOMMU notifier, and store all notifiers in a list
- during region_del, compare and delete the IOMMU notifier
This is a must for making vhost device IOTLB works for IOMMU other
than intel ones.
Signed-off-by: Jason Wang <jasowang@redhat.com>
---
hw/virtio/vhost.c | 93 +++++++++++++++++++++++++++++++++++++----------
include/hw/virtio/vhost.h | 10 +++++
2 files changed, 83 insertions(+), 20 deletions(-)
diff --git a/hw/virtio/vhost.c b/hw/virtio/vhost.c
index ccf8b2e..45f75da 100644
--- a/hw/virtio/vhost.c
+++ b/hw/virtio/vhost.c
@@ -425,10 +425,8 @@ static inline void vhost_dev_log_resize(struct vhost_dev *dev, uint64_t size)
static int vhost_dev_has_iommu(struct vhost_dev *dev)
{
VirtIODevice *vdev = dev->vdev;
- AddressSpace *dma_as = vdev->dma_as;
- return memory_region_is_iommu(dma_as->root) &&
- virtio_host_has_feature(vdev, VIRTIO_F_IOMMU_PLATFORM);
+ return virtio_host_has_feature(vdev, VIRTIO_F_IOMMU_PLATFORM);
}
static void *vhost_memory_map(struct vhost_dev *dev, hwaddr addr,
@@ -720,6 +718,69 @@ static void vhost_region_del(MemoryListener *listener,
}
}
+static void vhost_iommu_unmap_notify(IOMMUNotifier *n, IOMMUTLBEntry *iotlb)
+{
+ struct vhost_iommu *iommu = container_of(n, struct vhost_iommu, n);
+ struct vhost_dev *hdev = iommu->hdev;
+
+ if (hdev->vhost_ops->vhost_invalidate_device_iotlb(hdev,
+ iotlb->iova,
+ iotlb->addr_mask + 1)) {
+ error_report("Fail to invalidate device iotlb");
+ }
+}
+
+static void vhost_iommu_region_add(MemoryListener *listener,
+ MemoryRegionSection *section)
+{
+ struct vhost_dev *dev = container_of(listener, struct vhost_dev,
+ iommu_listener);
+ struct vhost_iommu *iommu;
+ Int128 llend;
+
+ if (!memory_region_is_iommu(section->mr)) {
+ return;
+ }
+
+ llend = int128_make64(section->offset_within_address_space);
+ llend = int128_add(llend, section->size);
+ llend = int128_sub(llend, int128_one());
+
+ iommu = g_malloc0(sizeof(*iommu));
+ iommu->mr = section->mr;
+ iommu->hdev = dev;
+ iommu_notifier_init(&iommu->n, vhost_iommu_unmap_notify,
+ IOMMU_NOTIFIER_UNMAP,
+ section->offset_within_region,
+ int128_get64(llend));
+ memory_region_register_iommu_notifier(section->mr, &iommu->n);
+ /* TODO: can replay help performance here? */
+ QLIST_INSERT_HEAD(&dev->iommu_list, iommu, iommu_next);
+}
+
+static void vhost_iommu_region_del(MemoryListener *listener,
+ MemoryRegionSection *section)
+{
+ struct vhost_dev *dev = container_of(listener, struct vhost_dev,
+ iommu_listener);
+ struct vhost_iommu *iommu;
+
+ if (!memory_region_is_iommu(section->mr)) {
+ return;
+ }
+
+ QLIST_FOREACH(iommu, &dev->iommu_list, iommu_next) {
+ if (iommu->mr == section->mr &&
+ iommu->n.start == section->offset_within_region) {
+ memory_region_unregister_iommu_notifier(iommu->mr,
+ &iommu->n);
+ QLIST_REMOVE(iommu, iommu_next);
+ g_free(iommu);
+ break;
+ }
+ }
+}
+
static void vhost_region_nop(MemoryListener *listener,
MemoryRegionSection *section)
{
@@ -1161,17 +1222,6 @@ static void vhost_virtqueue_cleanup(struct vhost_virtqueue *vq)
event_notifier_cleanup(&vq->masked_notifier);
}
-static void vhost_iommu_unmap_notify(IOMMUNotifier *n, IOMMUTLBEntry *iotlb)
-{
- struct vhost_dev *hdev = container_of(n, struct vhost_dev, n);
-
- if (hdev->vhost_ops->vhost_invalidate_device_iotlb(hdev,
- iotlb->iova,
- iotlb->addr_mask + 1)) {
- error_report("Fail to invalidate device iotlb");
- }
-}
-
int vhost_dev_init(struct vhost_dev *hdev, void *opaque,
VhostBackendType backend_type, uint32_t busyloop_timeout)
{
@@ -1244,6 +1294,11 @@ int vhost_dev_init(struct vhost_dev *hdev, void *opaque,
.priority = 10
};
+ hdev->iommu_listener = (MemoryListener) {
+ .region_add = vhost_iommu_region_add,
+ .region_del = vhost_iommu_region_del,
+ };
+
iommu_notifier_init(&hdev->n, vhost_iommu_unmap_notify,
IOMMU_NOTIFIER_UNMAP, 0, ~0ULL);
@@ -1454,9 +1509,8 @@ int vhost_dev_start(struct vhost_dev *hdev, VirtIODevice *vdev)
goto fail_features;
}
- if (vhost_dev_has_iommu(hdev)) {
- memory_region_register_iommu_notifier(vdev->dma_as->root,
- &hdev->n);
+ if (true) {
+ memory_listener_register(&hdev->iommu_listener, vdev->dma_as);
}
r = hdev->vhost_ops->vhost_set_mem_table(hdev, hdev->mem);
@@ -1536,10 +1590,9 @@ void vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev)
hdev->vq_index + i);
}
- if (vhost_dev_has_iommu(hdev)) {
+ if (true) {
hdev->vhost_ops->vhost_set_iotlb_callback(hdev, false);
- memory_region_unregister_iommu_notifier(vdev->dma_as->root,
- &hdev->n);
+ memory_listener_unregister(&hdev->iommu_listener);
}
vhost_log_put(hdev, true);
hdev->started = false;
diff --git a/include/hw/virtio/vhost.h b/include/hw/virtio/vhost.h
index 52f633e..4d89dcd 100644
--- a/include/hw/virtio/vhost.h
+++ b/include/hw/virtio/vhost.h
@@ -37,10 +37,19 @@ struct vhost_log {
vhost_log_chunk_t *log;
};
+struct vhost_dev;
+struct vhost_iommu {
+ struct vhost_dev *hdev;
+ MemoryRegion *mr;
+ IOMMUNotifier n;
+ QLIST_ENTRY(vhost_iommu) iommu_next;
+};
+
struct vhost_memory;
struct vhost_dev {
VirtIODevice *vdev;
MemoryListener memory_listener;
+ MemoryListener iommu_listener;
struct vhost_memory *mem;
int n_mem_sections;
MemoryRegionSection *mem_sections;
@@ -64,6 +73,7 @@ struct vhost_dev {
void *opaque;
struct vhost_log *log;
QLIST_ENTRY(vhost_dev) entry;
+ QLIST_HEAD(,vhost_iommu) iommu_list;
IOMMUNotifier n;
};
--
2.7.4
^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH fixup 1/2] intel_iommu: use the correct memory region for device IOTLB notification
2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 1/2] intel_iommu: use the correct memory region for device IOTLB notification Jason Wang
@ 2017-03-20 7:10 ` Peter Xu
0 siblings, 0 replies; 9+ messages in thread
From: Peter Xu @ 2017-03-20 7:10 UTC (permalink / raw)
To: Jason Wang
Cc: mst, qemu-devel, Paolo Bonzini, Richard Henderson, Eduardo Habkost
On Mon, Mar 20, 2017 at 11:36:38AM +0800, Jason Wang wrote:
> We have a specific memory region for DMAR now, so it's wrong to
> trigger the notifier with the root region.
>
> Cc: Michael S. Tsirkin <mst@redhat.com>
> Cc: Paolo Bonzini <pbonzini@redhat.com>
> Cc: Richard Henderson <rth@twiddle.net>
> Cc: Eduardo Habkost <ehabkost@redhat.com>
> Signed-off-by: Jason Wang <jasowang@redhat.com>
Reviewed-by: Peter Xu <peterx@redhat.com>
-- peterx
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region
2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region Jason Wang
@ 2017-03-20 9:07 ` Peter Xu
2017-03-21 1:12 ` Michael S. Tsirkin
0 siblings, 1 reply; 9+ messages in thread
From: Peter Xu @ 2017-03-20 9:07 UTC (permalink / raw)
To: Jason Wang; +Cc: mst, qemu-devel
On Mon, Mar 20, 2017 at 11:36:39AM +0800, Jason Wang wrote:
> We assumes the iommu_ops were attached to the root region of address
> space. This may not true for all kinds of IOMMU implementation. So fix
> this by not assume as->root has iommu_ops and:
>
> - register a memory listener to dma_as
> - during region_add, if it's a region of IOMMU, register a specific
> IOMMU notifier, and store all notifiers in a list
> - during region_del, compare and delete the IOMMU notifier
>
> This is a must for making vhost device IOTLB works for IOMMU other
> than intel ones.
>
> Signed-off-by: Jason Wang <jasowang@redhat.com>
[...]
> @@ -1454,9 +1509,8 @@ int vhost_dev_start(struct vhost_dev *hdev, VirtIODevice *vdev)
> goto fail_features;
> }
>
> - if (vhost_dev_has_iommu(hdev)) {
> - memory_region_register_iommu_notifier(vdev->dma_as->root,
> - &hdev->n);
> + if (true) {
Here the if clause can be removed. And...
> + memory_listener_register(&hdev->iommu_listener, vdev->dma_as);
> }
>
> r = hdev->vhost_ops->vhost_set_mem_table(hdev, hdev->mem);
> @@ -1536,10 +1590,9 @@ void vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev)
> hdev->vq_index + i);
> }
>
> - if (vhost_dev_has_iommu(hdev)) {
> + if (true) {
...here. Besides that:
Reviewed-by: Peter Xu <peterx@redhat.com>
Since this patchset depends on vtd vfio series and fixes its breakage
to vhost, I'll pick them up for consistency for next post of vtd vfio
series as well.
Thanks,
-- peterx
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region
2017-03-20 9:07 ` Peter Xu
@ 2017-03-21 1:12 ` Michael S. Tsirkin
2017-03-21 1:21 ` Eric Blake
0 siblings, 1 reply; 9+ messages in thread
From: Michael S. Tsirkin @ 2017-03-21 1:12 UTC (permalink / raw)
To: Peter Xu; +Cc: Jason Wang, qemu-devel
On Mon, Mar 20, 2017 at 05:07:34PM +0800, Peter Xu wrote:
> On Mon, Mar 20, 2017 at 11:36:39AM +0800, Jason Wang wrote:
> > We assumes the iommu_ops were attached to the root region of address
> > space. This may not true for all kinds of IOMMU implementation. So fix
> > this by not assume as->root has iommu_ops and:
> >
> > - register a memory listener to dma_as
> > - during region_add, if it's a region of IOMMU, register a specific
> > IOMMU notifier, and store all notifiers in a list
> > - during region_del, compare and delete the IOMMU notifier
> >
> > This is a must for making vhost device IOTLB works for IOMMU other
> > than intel ones.
> >
> > Signed-off-by: Jason Wang <jasowang@redhat.com>
>
> [...]
>
> > @@ -1454,9 +1509,8 @@ int vhost_dev_start(struct vhost_dev *hdev, VirtIODevice *vdev)
> > goto fail_features;
> > }
> >
> > - if (vhost_dev_has_iommu(hdev)) {
> > - memory_region_register_iommu_notifier(vdev->dma_as->root,
> > - &hdev->n);
> > + if (true) {
>
> Here the if clause can be removed. And...
>
> > + memory_listener_register(&hdev->iommu_listener, vdev->dma_as);
> > }
> >
> > r = hdev->vhost_ops->vhost_set_mem_table(hdev, hdev->mem);
> > @@ -1536,10 +1590,9 @@ void vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev)
> > hdev->vq_index + i);
> > }
> >
> > - if (vhost_dev_has_iommu(hdev)) {
> > + if (true) {
>
> ...here. Besides that:
>
> Reviewed-by: Peter Xu <peterx@redhat.com>
>
> Since this patchset depends on vtd vfio series and fixes its breakage
> to vhost, I'll pick them up for consistency for next post of vtd vfio
> series as well.
>
> Thanks,
>
> -- peterx
Sounds good. It's best to order patches in a way that avoids
breakages even for people that bisect though.
Might require some patch squashing.
--
MST
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region
2017-03-21 1:12 ` Michael S. Tsirkin
@ 2017-03-21 1:21 ` Eric Blake
2017-03-21 1:39 ` Peter Xu
0 siblings, 1 reply; 9+ messages in thread
From: Eric Blake @ 2017-03-21 1:21 UTC (permalink / raw)
To: Michael S. Tsirkin, Peter Xu; +Cc: Jason Wang, qemu-devel
[-- Attachment #1: Type: text/plain, Size: 835 bytes --]
On 03/20/2017 08:12 PM, Michael S. Tsirkin wrote:
>>
>> Since this patchset depends on vtd vfio series and fixes its breakage
>> to vhost, I'll pick them up for consistency for next post of vtd vfio
>> series as well.
>>
>> Thanks,
>>
>> -- peterx
>
> Sounds good. It's best to order patches in a way that avoids
> breakages even for people that bisect though.
> Might require some patch squashing.
Indeed - a patch submitted with 'fixup' in the title is usually best
incorporated by squashing into a prior patch that has not actually
landed in master, rather than as a standalone patch.
But if you do post this to master as a standalone patch, please fix the
subject line: s/genearlize/generalize/
--
Eric Blake eblake redhat com +1-919-301-3266
Libvirt virtualization library http://libvirt.org
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 604 bytes --]
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region
2017-03-21 1:21 ` Eric Blake
@ 2017-03-21 1:39 ` Peter Xu
2017-03-29 2:57 ` Jason Wang
0 siblings, 1 reply; 9+ messages in thread
From: Peter Xu @ 2017-03-21 1:39 UTC (permalink / raw)
To: Eric Blake; +Cc: Michael S. Tsirkin, Jason Wang, qemu-devel
On Mon, Mar 20, 2017 at 08:21:44PM -0500, Eric Blake wrote:
> On 03/20/2017 08:12 PM, Michael S. Tsirkin wrote:
>
> >>
> >> Since this patchset depends on vtd vfio series and fixes its breakage
> >> to vhost, I'll pick them up for consistency for next post of vtd vfio
> >> series as well.
> >>
> >> Thanks,
> >>
> >> -- peterx
> >
> > Sounds good. It's best to order patches in a way that avoids
> > breakages even for people that bisect though.
> > Might require some patch squashing.
>
> Indeed - a patch submitted with 'fixup' in the title is usually best
> incorporated by squashing into a prior patch that has not actually
> landed in master, rather than as a standalone patch.
>
> But if you do post this to master as a standalone patch, please fix the
> subject line: s/genearlize/generalize/
Will do. Thanks!
-- peterx
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region
2017-03-21 1:39 ` Peter Xu
@ 2017-03-29 2:57 ` Jason Wang
0 siblings, 0 replies; 9+ messages in thread
From: Jason Wang @ 2017-03-29 2:57 UTC (permalink / raw)
To: Peter Xu, Eric Blake; +Cc: Michael S. Tsirkin, qemu-devel
On 2017年03月21日 09:39, Peter Xu wrote:
> On Mon, Mar 20, 2017 at 08:21:44PM -0500, Eric Blake wrote:
>> On 03/20/2017 08:12 PM, Michael S. Tsirkin wrote:
>>
>>>> Since this patchset depends on vtd vfio series and fixes its breakage
>>>> to vhost, I'll pick them up for consistency for next post of vtd vfio
>>>> series as well.
>>>>
>>>> Thanks,
>>>>
>>>> -- peterx
>>> Sounds good. It's best to order patches in a way that avoids
>>> breakages even for people that bisect though.
>>> Might require some patch squashing.
>> Indeed - a patch submitted with 'fixup' in the title is usually best
>> incorporated by squashing into a prior patch that has not actually
>> landed in master, rather than as a standalone patch.
>>
>> But if you do post this to master as a standalone patch, please fix the
>> subject line: s/genearlize/generalize/
> Will do. Thanks!
>
> -- peterx
Looks like the assumption were broken by the introducing of bus master
container, so this patch is needed for 2.9. Will post a formal patch
for this.
Thanks
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2017-03-29 2:58 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-03-20 3:36 [Qemu-devel] [PATCH fixup 0/2] Vhost device IOTLB fixup for vfio enablment Jason Wang
2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 1/2] intel_iommu: use the correct memory region for device IOTLB notification Jason Wang
2017-03-20 7:10 ` Peter Xu
2017-03-20 3:36 ` [Qemu-devel] [PATCH fixup 2/2] vhost: genearlize iommu memory region Jason Wang
2017-03-20 9:07 ` Peter Xu
2017-03-21 1:12 ` Michael S. Tsirkin
2017-03-21 1:21 ` Eric Blake
2017-03-21 1:39 ` Peter Xu
2017-03-29 2:57 ` Jason Wang
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.