- kvm-s390x-Fix-leak-in-machine_set_loadparm.patch [RHEL-98554] - kvm-hw-s390x-ccw-device-Fix-memory-leak-in-loadparm-sett.patch [RHEL-98554] - kvm-amd_iommu-Rename-variable-mmio-to-mr_mmio.patch [RHEL-66202] - kvm-amd_iommu-Add-support-for-pass-though-mode.patch [RHEL-66202] - kvm-amd_iommu-Use-shared-memory-region-for-Interrupt-Rem.patch [RHEL-66202] - kvm-amd_iommu-Send-notification-when-invalidate-interrup.patch [RHEL-66202] - kvm-amd_iommu-Check-APIC-ID-255-for-XTSup.patch [RHEL-66202] - kvm-io-Fix-partial-struct-copy-in-qio_dns_resolver_looku.patch [RHEL-67104] - kvm-util-qemu-sockets-Refactor-setting-client-sockopts-i.patch [RHEL-67104] - kvm-util-qemu-sockets-Refactor-success-and-failure-paths.patch [RHEL-67104] - kvm-util-qemu-sockets-Add-support-for-keep-alive-flag-to.patch [RHEL-67104] - kvm-util-qemu-sockets-Refactor-inet_parse-to-use-QemuOpt.patch [RHEL-67104] - kvm-util-qemu-sockets-Introduce-inet-socket-options-cont.patch [RHEL-67104] - kvm-tests-unit-test-util-sockets-fix-mem-leak-on-error-o.patch [RHEL-67104] - kvm-target-i386-Expose-bits-related-to-SRSO-vulnerabilit.patch [RHEL-52649] - kvm-target-i386-Add-PerfMonV2-feature-bit.patch [RHEL-52649] - kvm-target-i386-Update-EPYC-CPU-model-for-Cache-property.patch [RHEL-52649] - kvm-target-i386-Update-EPYC-Rome-CPU-model-for-Cache-pro.patch [RHEL-52649] - kvm-target-i386-Update-EPYC-Milan-CPU-model-for-Cache-pr.patch [RHEL-52649] - kvm-target-i386-Add-couple-of-feature-bits-in-CPUID_Fn80.patch [RHEL-52649] - kvm-target-i386-Update-EPYC-Genoa-for-Cache-property-per.patch [RHEL-52649] - kvm-target-i386-Add-support-for-EPYC-Turin-model.patch [RHEL-52649] - kvm-hw-i386-amd_iommu-Assign-pci-id-0x1419-for-the-AMD-I.patch [RHEL-70926] - kvm-hw-i386-amd_iommu-Isolate-AMDVI-PCI-from-amd-iommu-d.patch [RHEL-70925] - kvm-hw-i386-amd_iommu-Allow-migration-when-explicitly-cr.patch [RHEL-70925] - kvm-Enable-amd-iommu-device.patch [RHEL-70925] - kvm-include-qemu-compiler-add-QEMU_UNINITIALIZED-attribu.patch [RHEL-99888] - kvm-hw-virtio-virtio-avoid-cost-of-ftrivial-auto-var-ini.patch [RHEL-99888] - kvm-block-skip-automatic-zero-init-of-large-array-in-ioq.patch [RHEL-99888] - kvm-chardev-char-fd-skip-automatic-zero-init-of-large-ar.patch [RHEL-99888] - kvm-chardev-char-pty-skip-automatic-zero-init-of-large-a.patch [RHEL-99888] - kvm-chardev-char-socket-skip-automatic-zero-init-of-larg.patch [RHEL-99888] - kvm-hw-audio-ac97-skip-automatic-zero-init-of-large-arra.patch [RHEL-99888] - kvm-hw-audio-cs4231a-skip-automatic-zero-init-of-large-a.patch [RHEL-99888] - kvm-hw-audio-es1370-skip-automatic-zero-init-of-large-ar.patch [RHEL-99888] - kvm-hw-audio-gus-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-hw-audio-marvell_88w8618-skip-automatic-zero-init-of.patch [RHEL-99888] - kvm-hw-audio-sb16-skip-automatic-zero-init-of-large-arra.patch [RHEL-99888] - kvm-hw-audio-via-ac97-skip-automatic-zero-init-of-large-.patch [RHEL-99888] - kvm-hw-char-sclpconsole-lm-skip-automatic-zero-init-of-l.patch [RHEL-99888] - kvm-hw-dma-xlnx_csu_dma-skip-automatic-zero-init-of-larg.patch [RHEL-99888] - kvm-hw-display-vmware_vga-skip-automatic-zero-init-of-la.patch [RHEL-99888] - kvm-hw-hyperv-syndbg-skip-automatic-zero-init-of-large-a.patch [RHEL-99888] - kvm-hw-misc-aspeed_hace-skip-automatic-zero-init-of-larg.patch [RHEL-99888] - kvm-hw-net-rtl8139-skip-automatic-zero-init-of-large-arr.patch [RHEL-99888] - kvm-hw-net-tulip-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-hw-net-virtio-net-skip-automatic-zero-init-of-large-.patch [RHEL-99888] - kvm-hw-net-xgamc-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-hw-nvme-ctrl-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-hw-ppc-spapr_tpm_proxy-skip-automatic-zero-init-of-l.patch [RHEL-99888] - kvm-hw-usb-hcd-ohci-skip-automatic-zero-init-of-large-ar.patch [RHEL-99888] - kvm-hw-scsi-lsi53c895a-skip-automatic-zero-init-of-large.patch [RHEL-99888] - kvm-hw-scsi-megasas-skip-automatic-zero-init-of-large-ar.patch [RHEL-99888] - kvm-hw-ufs-lu-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-net-socket-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-net-stream-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-ui-vnc-Update-display-update-interval-when-VM-state-.patch [RHEL-100741] - Resolves: RHEL-98554 ([s390x][RHEL9.7.0][virtio_block] there would be memory leak with virtio_blk disks) - Resolves: RHEL-66202 ([AMDSERVER 9.6 Feature] qemu: Interrupt Remap support for emulated amd viommu) - Resolves: RHEL-67104 (postcopy on the destination host can't switch into pause status under the network issue if boot VM with '-S') - Resolves: RHEL-52649 ([AMDSERVER 9.6 Feature] Turin: Qemu EPYC-Turin Model) - Resolves: RHEL-70926 (Qemu/amd-iommu: Advertise a suitable device id) - Resolves: RHEL-70925 (Qemu/amd-iommu: Add ability to manually specify the AMDVI-PCI device) - Resolves: RHEL-99888 (-ftrivial-auto-var-init=zero reduced performance [rhel-9]) - Resolves: RHEL-100741 (Video stuck after switchover phase when play one video during migration [rhel-9])
142 lines
6.6 KiB
Diff
142 lines
6.6 KiB
Diff
From 4114553452f7187283aefa001bc8342fc65b6b72 Mon Sep 17 00:00:00 2001
|
|
From: John Allen <john.allen@amd.com>
|
|
Date: Wed, 11 Dec 2024 15:06:48 -0600
|
|
Subject: [PATCH 04/57] amd_iommu: Add support for pass though mode
|
|
|
|
RH-Author: John Allen <None>
|
|
RH-MergeRequest: 303: Interrupt Remap support for emulated amd viommu
|
|
RH-Jira: RHEL-66202
|
|
RH-Acked-by: Miroslav Rezanina <mrezanin@redhat.com>
|
|
RH-Commit: [2/5] 0434fefd554baf27fb9d93026af513c621f8cdb0 (johnalle/qemu-kvm-fork)
|
|
|
|
JIRA: https://issues.redhat.com/browse/RHEL-66202
|
|
|
|
commit c1f46999ef506d9854534560a94d02cf3cf9edd1
|
|
Author: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
|
|
Date: Fri Sep 27 12:29:10 2024 -0500
|
|
|
|
amd_iommu: Add support for pass though mode
|
|
|
|
Introduce 'nodma' shared memory region to support PT mode
|
|
so that for each device, we only create an alias to shared memory
|
|
region when DMA-remapping is disabled.
|
|
|
|
Reviewed-by: Alejandro Jimenez <alejandro.j.jimenez@oracle.com>
|
|
Signed-off-by: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
|
|
Signed-off-by: Santosh Shukla <santosh.shukla@amd.com>
|
|
Message-Id: <20240927172913.121477-3-santosh.shukla@amd.com>
|
|
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
|
|
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
|
|
|
|
Signed-off-by: John Allen <john.allen@amd.com>
|
|
---
|
|
hw/i386/amd_iommu.c | 49 ++++++++++++++++++++++++++++++++++++---------
|
|
hw/i386/amd_iommu.h | 2 ++
|
|
2 files changed, 42 insertions(+), 9 deletions(-)
|
|
|
|
diff --git a/hw/i386/amd_iommu.c b/hw/i386/amd_iommu.c
|
|
index 148b5ee51d..567cb8adc9 100644
|
|
--- a/hw/i386/amd_iommu.c
|
|
+++ b/hw/i386/amd_iommu.c
|
|
@@ -60,8 +60,9 @@ struct AMDVIAddressSpace {
|
|
uint8_t bus_num; /* bus number */
|
|
uint8_t devfn; /* device function */
|
|
AMDVIState *iommu_state; /* AMDVI - one per machine */
|
|
- MemoryRegion root; /* AMDVI Root memory map region */
|
|
+ MemoryRegion root; /* AMDVI Root memory map region */
|
|
IOMMUMemoryRegion iommu; /* Device's address translation region */
|
|
+ MemoryRegion iommu_nodma; /* Alias of shared nodma memory region */
|
|
MemoryRegion iommu_ir; /* Device's interrupt remapping region */
|
|
AddressSpace as; /* device's corresponding address space */
|
|
};
|
|
@@ -1412,6 +1413,7 @@ static AddressSpace *amdvi_host_dma_iommu(PCIBus *bus, void *opaque, int devfn)
|
|
AMDVIState *s = opaque;
|
|
AMDVIAddressSpace **iommu_as, *amdvi_dev_as;
|
|
int bus_num = pci_bus_num(bus);
|
|
+ X86IOMMUState *x86_iommu = X86_IOMMU_DEVICE(s);
|
|
|
|
iommu_as = s->address_spaces[bus_num];
|
|
|
|
@@ -1436,13 +1438,13 @@ static AddressSpace *amdvi_host_dma_iommu(PCIBus *bus, void *opaque, int devfn)
|
|
* Memory region relationships looks like (Address range shows
|
|
* only lower 32 bits to make it short in length...):
|
|
*
|
|
- * |-----------------+-------------------+----------|
|
|
- * | Name | Address range | Priority |
|
|
- * |-----------------+-------------------+----------+
|
|
- * | amdvi_root | 00000000-ffffffff | 0 |
|
|
- * | amdvi_iommu | 00000000-ffffffff | 1 |
|
|
- * | amdvi_iommu_ir | fee00000-feefffff | 64 |
|
|
- * |-----------------+-------------------+----------|
|
|
+ * |--------------------+-------------------+----------|
|
|
+ * | Name | Address range | Priority |
|
|
+ * |--------------------+-------------------+----------+
|
|
+ * | amdvi-root | 00000000-ffffffff | 0 |
|
|
+ * | amdvi-iommu_nodma | 00000000-ffffffff | 0 |
|
|
+ * | amdvi-iommu_ir | fee00000-feefffff | 64 |
|
|
+ * |--------------------+-------------------+----------|
|
|
*/
|
|
memory_region_init_iommu(&amdvi_dev_as->iommu,
|
|
sizeof(amdvi_dev_as->iommu),
|
|
@@ -1461,7 +1463,25 @@ static AddressSpace *amdvi_host_dma_iommu(PCIBus *bus, void *opaque, int devfn)
|
|
64);
|
|
memory_region_add_subregion_overlap(&amdvi_dev_as->root, 0,
|
|
MEMORY_REGION(&amdvi_dev_as->iommu),
|
|
- 1);
|
|
+ 0);
|
|
+
|
|
+ /* Build the DMA Disabled alias to shared memory */
|
|
+ memory_region_init_alias(&amdvi_dev_as->iommu_nodma, OBJECT(s),
|
|
+ "amdvi-sys", &s->mr_sys, 0,
|
|
+ memory_region_size(&s->mr_sys));
|
|
+ memory_region_add_subregion_overlap(&amdvi_dev_as->root, 0,
|
|
+ &amdvi_dev_as->iommu_nodma,
|
|
+ 0);
|
|
+
|
|
+ if (!x86_iommu->pt_supported) {
|
|
+ memory_region_set_enabled(&amdvi_dev_as->iommu_nodma, false);
|
|
+ memory_region_set_enabled(MEMORY_REGION(&amdvi_dev_as->iommu),
|
|
+ true);
|
|
+ } else {
|
|
+ memory_region_set_enabled(MEMORY_REGION(&amdvi_dev_as->iommu),
|
|
+ false);
|
|
+ memory_region_set_enabled(&amdvi_dev_as->iommu_nodma, true);
|
|
+ }
|
|
}
|
|
return &iommu_as[devfn]->as;
|
|
}
|
|
@@ -1602,6 +1622,17 @@ static void amdvi_sysbus_realize(DeviceState *dev, Error **errp)
|
|
"amdvi-mmio", AMDVI_MMIO_SIZE);
|
|
memory_region_add_subregion(get_system_memory(), AMDVI_BASE_ADDR,
|
|
&s->mr_mmio);
|
|
+
|
|
+ /* Create the share memory regions by all devices */
|
|
+ memory_region_init(&s->mr_sys, OBJECT(s), "amdvi-sys", UINT64_MAX);
|
|
+
|
|
+ /* set up the DMA disabled memory region */
|
|
+ memory_region_init_alias(&s->mr_nodma, OBJECT(s),
|
|
+ "amdvi-nodma", get_system_memory(), 0,
|
|
+ memory_region_size(get_system_memory()));
|
|
+ memory_region_add_subregion_overlap(&s->mr_sys, 0,
|
|
+ &s->mr_nodma, 0);
|
|
+
|
|
pci_setup_iommu(bus, &amdvi_iommu_ops, s);
|
|
amdvi_init(s);
|
|
}
|
|
diff --git a/hw/i386/amd_iommu.h b/hw/i386/amd_iommu.h
|
|
index e5c2ae94f2..be417e51c4 100644
|
|
--- a/hw/i386/amd_iommu.h
|
|
+++ b/hw/i386/amd_iommu.h
|
|
@@ -354,6 +354,8 @@ struct AMDVIState {
|
|
uint32_t pprlog_tail; /* ppr log tail */
|
|
|
|
MemoryRegion mr_mmio; /* MMIO region */
|
|
+ MemoryRegion mr_sys;
|
|
+ MemoryRegion mr_nodma;
|
|
uint8_t mmior[AMDVI_MMIO_SIZE]; /* read/write MMIO */
|
|
uint8_t w1cmask[AMDVI_MMIO_SIZE]; /* read/write 1 clear mask */
|
|
uint8_t romask[AMDVI_MMIO_SIZE]; /* MMIO read/only mask */
|
|
--
|
|
2.39.3
|
|
|