2024-11-20 13:30:48 +00:00
|
|
|
From 8ba1a6d1a432e2ae82ae532253c2b254e6ce82a7 Mon Sep 17 00:00:00 2001
|
2021-02-16 07:43:20 +00:00
|
|
|
From: Bandan Das <bsd@redhat.com>
|
|
|
|
Date: Tue, 3 Dec 2013 20:05:13 +0100
|
|
|
|
Subject: vfio: cap number of devices that can be assigned
|
|
|
|
|
|
|
|
Go through all groups to get count of total number of devices
|
|
|
|
active to enforce limit
|
|
|
|
|
|
|
|
Reasoning from Alex for the limit(32) - Assuming 3 slots per
|
|
|
|
device, with 125 slots (number of memory slots for RHEL 7),
|
|
|
|
we can support almost 40 devices and still have few slots left
|
|
|
|
for other uses. Stepping down a bit, the number 32 arbitrarily
|
|
|
|
matches the number of slots on a PCI bus and is also a nice power
|
|
|
|
of two.
|
|
|
|
|
2024-11-20 13:30:48 +00:00
|
|
|
Count of slots increased to 509 later so we could increase limit
|
|
|
|
to 64 as some usecases require more than 32 devices.
|
2021-02-16 07:43:20 +00:00
|
|
|
|
2024-11-20 13:30:48 +00:00
|
|
|
Signed-off-by: Bandan Das <bsd@redhat.com>
|
2021-02-16 07:43:20 +00:00
|
|
|
---
|
2024-11-20 13:30:48 +00:00
|
|
|
hw/vfio/pci.c | 31 ++++++++++++++++++++++++++++++-
|
2021-02-16 07:43:20 +00:00
|
|
|
hw/vfio/pci.h | 1 +
|
2024-11-20 13:30:48 +00:00
|
|
|
2 files changed, 31 insertions(+), 1 deletion(-)
|
2021-02-16 07:43:20 +00:00
|
|
|
|
|
|
|
diff --git a/hw/vfio/pci.c b/hw/vfio/pci.c
|
2024-11-20 13:30:48 +00:00
|
|
|
index 64780d1b79..57ac63c10c 100644
|
2021-02-16 07:43:20 +00:00
|
|
|
--- a/hw/vfio/pci.c
|
|
|
|
+++ b/hw/vfio/pci.c
|
2024-11-20 13:30:48 +00:00
|
|
|
@@ -50,6 +50,9 @@
|
|
|
|
/* Protected by BQL */
|
|
|
|
static KVMRouteChange vfio_route_change;
|
2021-02-16 07:43:20 +00:00
|
|
|
|
|
|
|
+/* RHEL only: Set once for the first assigned dev */
|
|
|
|
+static uint16_t device_limit;
|
|
|
|
+
|
|
|
|
static void vfio_disable_interrupts(VFIOPCIDevice *vdev);
|
|
|
|
static void vfio_mmap_set_enabled(VFIOPCIDevice *vdev, bool enabled);
|
2024-11-20 13:30:48 +00:00
|
|
|
static void vfio_msi_disable_common(VFIOPCIDevice *vdev);
|
|
|
|
@@ -2946,13 +2949,36 @@ static void vfio_realize(PCIDevice *pdev, Error **errp)
|
|
|
|
ERRP_GUARD();
|
|
|
|
VFIOPCIDevice *vdev = VFIO_PCI(pdev);
|
|
|
|
VFIODevice *vbasedev = &vdev->vbasedev;
|
|
|
|
+ VFIODevice *vbasedev_iter;
|
|
|
|
+ VFIOGroup *group;
|
|
|
|
char *tmp, *subsys;
|
|
|
|
Error *err = NULL;
|
2021-02-16 07:43:20 +00:00
|
|
|
- int i, ret;
|
|
|
|
+ int ret, i = 0;
|
|
|
|
bool is_mdev;
|
2024-11-20 13:30:48 +00:00
|
|
|
char uuid[UUID_STR_LEN];
|
|
|
|
char *name;
|
2021-02-16 07:43:20 +00:00
|
|
|
|
|
|
|
+ if (device_limit && device_limit != vdev->assigned_device_limit) {
|
|
|
|
+ error_setg(errp, "Assigned device limit has been redefined. "
|
|
|
|
+ "Old:%d, New:%d",
|
|
|
|
+ device_limit, vdev->assigned_device_limit);
|
|
|
|
+ return;
|
|
|
|
+ } else {
|
|
|
|
+ device_limit = vdev->assigned_device_limit;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ QLIST_FOREACH(group, &vfio_group_list, next) {
|
|
|
|
+ QLIST_FOREACH(vbasedev_iter, &group->device_list, next) {
|
|
|
|
+ i++;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ if (i >= vdev->assigned_device_limit) {
|
|
|
|
+ error_setg(errp, "Maximum supported vfio devices (%d) "
|
|
|
|
+ "already attached", vdev->assigned_device_limit);
|
|
|
|
+ return;
|
|
|
|
+ }
|
|
|
|
+
|
2024-11-20 13:30:48 +00:00
|
|
|
if (vbasedev->fd < 0 && !vbasedev->sysfsdev) {
|
2021-02-16 07:43:20 +00:00
|
|
|
if (!(~vdev->host.domain || ~vdev->host.bus ||
|
|
|
|
~vdev->host.slot || ~vdev->host.function)) {
|
2024-11-20 13:30:48 +00:00
|
|
|
@@ -3370,6 +3396,9 @@ static Property vfio_pci_dev_properties[] = {
|
2021-02-16 07:43:20 +00:00
|
|
|
DEFINE_PROP_BOOL("x-no-kvm-msix", VFIOPCIDevice, no_kvm_msix, false),
|
|
|
|
DEFINE_PROP_BOOL("x-no-geforce-quirks", VFIOPCIDevice,
|
|
|
|
no_geforce_quirks, false),
|
|
|
|
+ /* RHEL only */
|
|
|
|
+ DEFINE_PROP_UINT16("x-assigned-device-limit", VFIOPCIDevice,
|
|
|
|
+ assigned_device_limit, 64),
|
|
|
|
DEFINE_PROP_BOOL("x-no-kvm-ioeventfd", VFIOPCIDevice, no_kvm_ioeventfd,
|
|
|
|
false),
|
|
|
|
DEFINE_PROP_BOOL("x-no-vfio-ioeventfd", VFIOPCIDevice, no_vfio_ioeventfd,
|
|
|
|
diff --git a/hw/vfio/pci.h b/hw/vfio/pci.h
|
2024-11-20 13:30:48 +00:00
|
|
|
index 6e64a2654e..b7de39c010 100644
|
2021-02-16 07:43:20 +00:00
|
|
|
--- a/hw/vfio/pci.h
|
|
|
|
+++ b/hw/vfio/pci.h
|
2024-11-20 13:30:48 +00:00
|
|
|
@@ -142,6 +142,7 @@ struct VFIOPCIDevice {
|
2021-02-16 07:43:20 +00:00
|
|
|
EventNotifier err_notifier;
|
|
|
|
EventNotifier req_notifier;
|
|
|
|
int (*resetfn)(struct VFIOPCIDevice *);
|
|
|
|
+ uint16_t assigned_device_limit;
|
|
|
|
uint32_t vendor_id;
|
|
|
|
uint32_t device_id;
|
|
|
|
uint32_t sub_vendor_id;
|
|
|
|
--
|
2024-11-20 13:30:48 +00:00
|
|
|
2.39.3
|
2021-02-16 07:43:20 +00:00
|
|
|
|