d82d8d21a6
-------------------------------------------------------- * Mon Jul 17 2023 Miroslav Rezanina <mrezanin@redhat.com> - 8.0.0-8 - kvm-virtio-iommu-Fix-64kB-host-page-size-VFIO-device-ass.patch [bz#2211609 bz#2211634] - kvm-virtio-iommu-Rework-the-traces-in-virtio_iommu_set_p.patch [bz#2211609 bz#2211634] - kvm-vfio-pci-add-support-for-VF-token.patch [bz#2192818] - kvm-vfio-migration-Skip-log_sync-during-migration-SETUP-.patch [bz#2192818] - kvm-vfio-pci-Static-Resizable-BAR-capability.patch [bz#2192818] - kvm-vfio-pci-Fix-a-use-after-free-issue.patch [bz#2192818] - kvm-util-vfio-helpers-Use-g_file_read_link.patch [bz#2192818] - kvm-migration-Make-all-functions-check-have-the-same-for.patch [bz#2192818] - kvm-migration-Move-migration_properties-to-options.c.patch [bz#2192818] - kvm-migration-Add-switchover-ack-capability.patch [bz#2192818] - kvm-migration-Implement-switchover-ack-logic.patch [bz#2192818] - kvm-migration-Enable-switchover-ack-capability.patch [bz#2192818] - kvm-vfio-migration-Refactor-vfio_save_block-to-return-sa.patch [bz#2192818] - kvm-vfio-migration-Store-VFIO-migration-flags-in-VFIOMig.patch [bz#2192818] - kvm-vfio-migration-Add-VFIO-migration-pre-copy-support.patch [bz#2192818] - kvm-vfio-migration-Add-support-for-switchover-ack-capabi.patch [bz#2192818] - kvm-vfio-Implement-a-common-device-info-helper.patch [bz#2192818] - kvm-hw-vfio-pci-quirks-Support-alternate-offset-for-GPUD.patch [bz#2192818] - kvm-vfio-pci-Call-vfio_prepare_kvm_msi_virq_batch-in-MSI.patch [bz#2192818] - kvm-vfio-migration-Reset-bytes_transferred-properly.patch [bz#2192818] - kvm-vfio-migration-Make-VFIO-migration-non-experimental.patch [bz#2192818] - kvm-vfio-pci-Fix-a-segfault-in-vfio_realize.patch [bz#2192818] - kvm-vfio-pci-Free-leaked-timer-in-vfio_realize-error-pat.patch [bz#2192818] - kvm-hw-vfio-pci-quirks-Sanitize-capability-pointer.patch [bz#2192818] - kvm-vfio-pci-Disable-INTx-in-vfio_realize-error-path.patch [bz#2192818] - kvm-vfio-migration-Change-vIOMMU-blocker-from-global-to-.patch [bz#2192818] - kvm-vfio-migration-Free-resources-when-vfio_migration_re.patch [bz#2192818] - kvm-vfio-migration-Remove-print-of-Migration-disabled.patch [bz#2192818] - kvm-vfio-migration-Return-bool-type-for-vfio_migration_r.patch [bz#2192818] - kvm-vfio-Fix-null-pointer-dereference-bug-in-vfio_bars_f.patch [bz#2192818] - kvm-pc-bios-s390-ccw-Makefile-Use-z-noexecstack-to-silen.patch [bz#2220866] - kvm-pc-bios-s390-ccw-Fix-indentation-in-start.S.patch [bz#2220866] - kvm-pc-bios-s390-ccw-Provide-space-for-initial-stack-fra.patch [bz#2220866] - kvm-pc-bios-s390-ccw-Don-t-use-__bss_start-with-the-larl.patch [bz#2220866] - kvm-ui-Fix-pixel-colour-channel-order-for-PNG-screenshot.patch [bz#2222579] - kvm-block-blkio-fix-module_block.py-parsing.patch [bz#2213317] - kvm-Fix-virtio-blk-vhost-vdpa-typo-in-spec-file.patch [bz#2213317] - Resolves: bz#2211609 (With virtio-iommu and vfio-pci, qemu reports "warning: virtio-iommu page mask 0xfffffffffffff000 does not match 0x40201000") - Resolves: bz#2211634 ([aarch64] With virtio-iommu and vfio-pci, qemu coredump when host using kernel-64k package) - Resolves: bz#2192818 ([VFIO LM] Live migration) - Resolves: bz#2220866 (Misaligned symbol for s390-ccw image during qemu-kvm build) - Resolves: bz#2222579 (PNG screendump doesn't save screen correctly) - Resolves: bz#2213317 (Enable libblkio-based block drivers in QEMU)
197 lines
6.2 KiB
Diff
197 lines
6.2 KiB
Diff
From f68e8c5d841cd7fc785cc3d15b3c280211bfb4c3 Mon Sep 17 00:00:00 2001
|
|
From: =?UTF-8?q?C=C3=A9dric=20Le=20Goater?= <clg@redhat.com>
|
|
Date: Wed, 12 Jul 2023 17:46:57 +0200
|
|
Subject: [PATCH 17/37] vfio: Implement a common device info helper
|
|
MIME-Version: 1.0
|
|
Content-Type: text/plain; charset=UTF-8
|
|
Content-Transfer-Encoding: 8bit
|
|
|
|
RH-Author: Cédric Le Goater <clg@redhat.com>
|
|
RH-MergeRequest: 179: vfio: live migration support
|
|
RH-Bugzilla: 2192818
|
|
RH-Acked-by: Eric Auger <eric.auger@redhat.com>
|
|
RH-Acked-by: Miroslav Rezanina <mrezanin@redhat.com>
|
|
RH-Commit: [15/28] 9cfd233ab1b95dc7de776e8ef901823bd37c5a6b (clegoate/qemu-kvm-c9s)
|
|
|
|
Bugzilla: https://bugzilla.redhat.com/2192818
|
|
|
|
commit 634f38f0f73f
|
|
Author: Alex Williamson <alex.williamson@redhat.com>
|
|
Date: Thu Jun 1 08:45:06 2023 -0600
|
|
|
|
vfio: Implement a common device info helper
|
|
|
|
A common helper implementing the realloc algorithm for handling
|
|
capabilities.
|
|
|
|
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
|
|
Reviewed-by: Cédric Le Goater <clg@redhat.com>
|
|
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
|
|
Reviewed-by: Robin Voetter <robin@streamhpc.com>
|
|
Signed-off-by: Cédric Le Goater <clg@redhat.com>
|
|
|
|
Signed-off-by: Cédric Le Goater <clg@redhat.com>
|
|
---
|
|
hw/s390x/s390-pci-vfio.c | 37 ++++------------------------
|
|
hw/vfio/common.c | 46 ++++++++++++++++++++++++++---------
|
|
include/hw/vfio/vfio-common.h | 1 +
|
|
3 files changed, 41 insertions(+), 43 deletions(-)
|
|
|
|
diff --git a/hw/s390x/s390-pci-vfio.c b/hw/s390x/s390-pci-vfio.c
|
|
index f51190d466..59a2e03873 100644
|
|
--- a/hw/s390x/s390-pci-vfio.c
|
|
+++ b/hw/s390x/s390-pci-vfio.c
|
|
@@ -289,38 +289,11 @@ static void s390_pci_read_pfip(S390PCIBusDevice *pbdev,
|
|
memcpy(pbdev->zpci_fn.pfip, cap->pfip, CLP_PFIP_NR_SEGMENTS);
|
|
}
|
|
|
|
-static struct vfio_device_info *get_device_info(S390PCIBusDevice *pbdev,
|
|
- uint32_t argsz)
|
|
+static struct vfio_device_info *get_device_info(S390PCIBusDevice *pbdev)
|
|
{
|
|
- struct vfio_device_info *info = g_malloc0(argsz);
|
|
- VFIOPCIDevice *vfio_pci;
|
|
- int fd;
|
|
+ VFIOPCIDevice *vfio_pci = container_of(pbdev->pdev, VFIOPCIDevice, pdev);
|
|
|
|
- vfio_pci = container_of(pbdev->pdev, VFIOPCIDevice, pdev);
|
|
- fd = vfio_pci->vbasedev.fd;
|
|
-
|
|
- /*
|
|
- * If the specified argsz is not large enough to contain all capabilities
|
|
- * it will be updated upon return from the ioctl. Retry until we have
|
|
- * a big enough buffer to hold the entire capability chain. On error,
|
|
- * just exit and rely on CLP defaults.
|
|
- */
|
|
-retry:
|
|
- info->argsz = argsz;
|
|
-
|
|
- if (ioctl(fd, VFIO_DEVICE_GET_INFO, info)) {
|
|
- trace_s390_pci_clp_dev_info(vfio_pci->vbasedev.name);
|
|
- g_free(info);
|
|
- return NULL;
|
|
- }
|
|
-
|
|
- if (info->argsz > argsz) {
|
|
- argsz = info->argsz;
|
|
- info = g_realloc(info, argsz);
|
|
- goto retry;
|
|
- }
|
|
-
|
|
- return info;
|
|
+ return vfio_get_device_info(vfio_pci->vbasedev.fd);
|
|
}
|
|
|
|
/*
|
|
@@ -335,7 +308,7 @@ bool s390_pci_get_host_fh(S390PCIBusDevice *pbdev, uint32_t *fh)
|
|
|
|
assert(fh);
|
|
|
|
- info = get_device_info(pbdev, sizeof(*info));
|
|
+ info = get_device_info(pbdev);
|
|
if (!info) {
|
|
return false;
|
|
}
|
|
@@ -356,7 +329,7 @@ void s390_pci_get_clp_info(S390PCIBusDevice *pbdev)
|
|
{
|
|
g_autofree struct vfio_device_info *info = NULL;
|
|
|
|
- info = get_device_info(pbdev, sizeof(*info));
|
|
+ info = get_device_info(pbdev);
|
|
if (!info) {
|
|
return;
|
|
}
|
|
diff --git a/hw/vfio/common.c b/hw/vfio/common.c
|
|
index b73086e17a..3b4ac53f15 100644
|
|
--- a/hw/vfio/common.c
|
|
+++ b/hw/vfio/common.c
|
|
@@ -2845,11 +2845,35 @@ void vfio_put_group(VFIOGroup *group)
|
|
}
|
|
}
|
|
|
|
+struct vfio_device_info *vfio_get_device_info(int fd)
|
|
+{
|
|
+ struct vfio_device_info *info;
|
|
+ uint32_t argsz = sizeof(*info);
|
|
+
|
|
+ info = g_malloc0(argsz);
|
|
+
|
|
+retry:
|
|
+ info->argsz = argsz;
|
|
+
|
|
+ if (ioctl(fd, VFIO_DEVICE_GET_INFO, info)) {
|
|
+ g_free(info);
|
|
+ return NULL;
|
|
+ }
|
|
+
|
|
+ if (info->argsz > argsz) {
|
|
+ argsz = info->argsz;
|
|
+ info = g_realloc(info, argsz);
|
|
+ goto retry;
|
|
+ }
|
|
+
|
|
+ return info;
|
|
+}
|
|
+
|
|
int vfio_get_device(VFIOGroup *group, const char *name,
|
|
VFIODevice *vbasedev, Error **errp)
|
|
{
|
|
- struct vfio_device_info dev_info = { .argsz = sizeof(dev_info) };
|
|
- int ret, fd;
|
|
+ g_autofree struct vfio_device_info *info = NULL;
|
|
+ int fd;
|
|
|
|
fd = ioctl(group->fd, VFIO_GROUP_GET_DEVICE_FD, name);
|
|
if (fd < 0) {
|
|
@@ -2861,11 +2885,11 @@ int vfio_get_device(VFIOGroup *group, const char *name,
|
|
return fd;
|
|
}
|
|
|
|
- ret = ioctl(fd, VFIO_DEVICE_GET_INFO, &dev_info);
|
|
- if (ret) {
|
|
+ info = vfio_get_device_info(fd);
|
|
+ if (!info) {
|
|
error_setg_errno(errp, errno, "error getting device info");
|
|
close(fd);
|
|
- return ret;
|
|
+ return -1;
|
|
}
|
|
|
|
/*
|
|
@@ -2893,14 +2917,14 @@ int vfio_get_device(VFIOGroup *group, const char *name,
|
|
vbasedev->group = group;
|
|
QLIST_INSERT_HEAD(&group->device_list, vbasedev, next);
|
|
|
|
- vbasedev->num_irqs = dev_info.num_irqs;
|
|
- vbasedev->num_regions = dev_info.num_regions;
|
|
- vbasedev->flags = dev_info.flags;
|
|
+ vbasedev->num_irqs = info->num_irqs;
|
|
+ vbasedev->num_regions = info->num_regions;
|
|
+ vbasedev->flags = info->flags;
|
|
+
|
|
+ trace_vfio_get_device(name, info->flags, info->num_regions, info->num_irqs);
|
|
|
|
- trace_vfio_get_device(name, dev_info.flags, dev_info.num_regions,
|
|
- dev_info.num_irqs);
|
|
+ vbasedev->reset_works = !!(info->flags & VFIO_DEVICE_FLAGS_RESET);
|
|
|
|
- vbasedev->reset_works = !!(dev_info.flags & VFIO_DEVICE_FLAGS_RESET);
|
|
return 0;
|
|
}
|
|
|
|
diff --git a/include/hw/vfio/vfio-common.h b/include/hw/vfio/vfio-common.h
|
|
index 3dc5f2104c..6d1b8487c3 100644
|
|
--- a/include/hw/vfio/vfio-common.h
|
|
+++ b/include/hw/vfio/vfio-common.h
|
|
@@ -216,6 +216,7 @@ void vfio_region_finalize(VFIORegion *region);
|
|
void vfio_reset_handler(void *opaque);
|
|
VFIOGroup *vfio_get_group(int groupid, AddressSpace *as, Error **errp);
|
|
void vfio_put_group(VFIOGroup *group);
|
|
+struct vfio_device_info *vfio_get_device_info(int fd);
|
|
int vfio_get_device(VFIOGroup *group, const char *name,
|
|
VFIODevice *vbasedev, Error **errp);
|
|
|
|
--
|
|
2.39.3
|
|
|