From patchwork Mon Jul 7 12:27:16 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Auger Eric X-Patchwork-Id: 33150 Return-Path: X-Original-To: linaro@patches.linaro.org Delivered-To: linaro@patches.linaro.org Received: from mail-pd0-f199.google.com (mail-pd0-f199.google.com [209.85.192.199]) by ip-10-151-82-157.ec2.internal (Postfix) with ESMTPS id 0684620C88 for ; Mon, 7 Jul 2014 12:31:02 +0000 (UTC) Received: by mail-pd0-f199.google.com with SMTP id r10sf29816024pdi.10 for ; Mon, 07 Jul 2014 05:31:01 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:delivered-to:from:to:cc:subject :date:message-id:in-reply-to:references:x-original-sender :x-original-authentication-results:precedence:mailing-list:list-id :list-post:list-help:list-archive:list-unsubscribe; bh=/2R7atKaoko/Re9scwTzyXnZ5N/Yja3rrmrggwl86Hk=; b=guhDtzf7eQtfBxfcAjw+EtjDg7W0LWFZWhmCBsRRzBhEbYx7IphCzr0epTsgkIMieu bYoL4ZL8GyCMLEJ1Isl5tVUYd0krfSUTD461N/kl33q9HPl406aBn+VBHrr5+WV0R31Q lWdUy91JTRA1tCOb/1mHPFZdAiw4epcIGWLFhVu/3pg0FQl9JiNh9klMnHhRuQn/8rQA hwafvYzoZ5ZfgeQJEinqcykogVfJuWHNwP77PfPQSsM6mk5KxoXR6qPzUnORnRUEIEj7 5ly/lEbLl2ALijCJ5eTtARMi5S05dBGC2jKbSJF4DTQY2TL5KaODqQ9xNb9/B1O5s14Q 25Bw== X-Gm-Message-State: ALoCoQnjAVZSLv1EQ1O5DMMZZboi3AbJiA47Nru+EyVkZnRk9uIMwDlmwqPqJiEojiOwS2U44Mqb X-Received: by 10.66.230.226 with SMTP id tb2mr12672344pac.41.1404736261341; Mon, 07 Jul 2014 05:31:01 -0700 (PDT) MIME-Version: 1.0 X-BeenThere: patchwork-forward@linaro.org Received: by 10.140.96.201 with SMTP id k67ls1802919qge.22.gmail; Mon, 07 Jul 2014 05:31:01 -0700 (PDT) X-Received: by 10.52.248.209 with SMTP id yo17mr1910630vdc.60.1404736261234; Mon, 07 Jul 2014 05:31:01 -0700 (PDT) Received: from mail-vc0-f171.google.com (mail-vc0-f171.google.com [209.85.220.171]) by mx.google.com with ESMTPS id fv9si2449027vdb.75.2014.07.07.05.31.01 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 07 Jul 2014 05:31:01 -0700 (PDT) Received-SPF: pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.220.171 as permitted sender) client-ip=209.85.220.171; Received: by mail-vc0-f171.google.com with SMTP id id10so3844706vcb.16 for ; Mon, 07 Jul 2014 05:31:01 -0700 (PDT) X-Received: by 10.58.112.65 with SMTP id io1mr135296veb.61.1404736261129; Mon, 07 Jul 2014 05:31:01 -0700 (PDT) X-Forwarded-To: patchwork-forward@linaro.org X-Forwarded-For: patch@linaro.org patchwork-forward@linaro.org Delivered-To: patches@linaro.org Received: by 10.221.37.5 with SMTP id tc5csp662459vcb; Mon, 7 Jul 2014 05:31:00 -0700 (PDT) X-Received: by 10.195.12.97 with SMTP id ep1mr16026645wjd.26.1404736259283; Mon, 07 Jul 2014 05:30:59 -0700 (PDT) Received: from mail-wg0-f46.google.com (mail-wg0-f46.google.com [74.125.82.46]) by mx.google.com with ESMTPS id es20si6613927wic.71.2014.07.07.05.30.58 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 07 Jul 2014 05:30:59 -0700 (PDT) Received-SPF: pass (google.com: domain of eric.auger@linaro.org designates 74.125.82.46 as permitted sender) client-ip=74.125.82.46; Received: by mail-wg0-f46.google.com with SMTP id l18so932034wgh.29 for ; Mon, 07 Jul 2014 05:30:58 -0700 (PDT) X-Received: by 10.194.79.135 with SMTP id j7mr33069391wjx.56.1404736258885; Mon, 07 Jul 2014 05:30:58 -0700 (PDT) Received: from midway01-04-00.lavalab ([88.98.47.97]) by mx.google.com with ESMTPSA id ec8sm95805182wic.10.2014.07.07.05.30.57 for (version=TLSv1.1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 07 Jul 2014 05:30:58 -0700 (PDT) From: Eric Auger To: eric.auger@st.com, christoffer.dall@linaro.org, qemu-devel@nongnu.org, kim.phillips@freescale.com, a.rigo@virtualopensystems.com Cc: eric.auger@linaro.org, will.deacon@arm.com, kvmarm@lists.cs.columbia.edu, alex.williamson@redhat.com, Bharat.Bhushan@freescale.com, agraf@suse.de, peter.maydell@linaro.org, stuart.yoder@freescale.com, a.motakis@virtualopensystems.com, patches@linaro.org Subject: [RFC v4 06/13] hw/vfio/pci: split vfio_get_device Date: Mon, 7 Jul 2014 13:27:16 +0100 Message-Id: <1404736043-22900-7-git-send-email-eric.auger@linaro.org> X-Mailer: git-send-email 1.8.3.2 In-Reply-To: <1404736043-22900-1-git-send-email-eric.auger@linaro.org> References: <1404736043-22900-1-git-send-email-eric.auger@linaro.org> X-Removed-Original-Auth: Dkim didn't pass. X-Original-Sender: eric.auger@linaro.org X-Original-Authentication-Results: mx.google.com; spf=pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.220.171 as permitted sender) smtp.mail=patch+caf_=patchwork-forward=linaro.org@linaro.org Precedence: list Mailing-list: list patchwork-forward@linaro.org; contact patchwork-forward+owners@linaro.org List-ID: X-Google-Group-Id: 836684582541 List-Post: , List-Help: , List-Archive: List-Unsubscribe: , vfio_get_device now takes a VFIODevice as argument. The function is split into 4 functional parts: dev_info query, device check, region populate and interrupt populate. the last 3 are specialized by parent device and are added into DeviceOps. 3 new fields are introduced in VFIODevice to store dev_info. vfio_put_base_device is created. Signed-off-by: Eric Auger --- hw/vfio/pci.c | 181 +++++++++++++++++++++++++++++++++++++++------------------- 1 file changed, 121 insertions(+), 60 deletions(-) diff --git a/hw/vfio/pci.c b/hw/vfio/pci.c index 5f0164a..d228cf8 100644 --- a/hw/vfio/pci.c +++ b/hw/vfio/pci.c @@ -194,12 +194,18 @@ typedef struct VFIODevice { bool reset_works; bool needs_reset; VFIODeviceOps *ops; + unsigned int num_irqs; + unsigned int num_regions; + unsigned int flags; } VFIODevice; struct VFIODeviceOps { bool (*vfio_compute_needs_reset)(VFIODevice *vdev); int (*vfio_hot_reset_multi)(VFIODevice *vdev); void (*vfio_eoi)(VFIODevice *vdev); + int (*vfio_check_device)(VFIODevice *vdev); + int (*vfio_populate_regions)(VFIODevice *vdev); + int (*vfio_populate_interrupts)(VFIODevice *vdev); }; typedef struct VFIOPCIDevice { @@ -286,6 +292,10 @@ static uint32_t vfio_pci_read_config(PCIDevice *pdev, uint32_t addr, int len); static void vfio_pci_write_config(PCIDevice *pdev, uint32_t addr, uint32_t val, int len); static void vfio_mmap_set_enabled(VFIOPCIDevice *vdev, bool enabled); +static void vfio_put_base_device(VFIODevice *vbasedev); +static int vfio_check_device(VFIODevice *vbasedev); +static int vfio_populate_regions(VFIODevice *vbasedev); +static int vfio_populate_interrupts(VFIODevice *vbasedev); /* * Common VFIO interrupt disable @@ -3585,6 +3595,9 @@ static VFIODeviceOps vfio_pci_ops = { .vfio_compute_needs_reset = vfio_pci_compute_needs_reset, .vfio_hot_reset_multi = vfio_pci_hot_reset_multi, .vfio_eoi = vfio_eoi, + .vfio_check_device = vfio_check_device, + .vfio_populate_regions = vfio_populate_regions, + .vfio_populate_interrupts = vfio_populate_interrupts, }; static void vfio_reset_handler(void *opaque) @@ -3927,54 +3940,53 @@ static void vfio_put_group(VFIOGroup *group) } } -static int vfio_get_device(VFIOGroup *group, const char *name, - VFIOPCIDevice *vdev) +static int vfio_check_device(VFIODevice *vbasedev) { - struct vfio_device_info dev_info = { .argsz = sizeof(dev_info) }; - struct vfio_region_info reg_info = { .argsz = sizeof(reg_info) }; - struct vfio_irq_info irq_info = { .argsz = sizeof(irq_info) }; - int ret, i; - - ret = ioctl(group->fd, VFIO_GROUP_GET_DEVICE_FD, name); - if (ret < 0) { - error_report("vfio: error getting device %s from group %d: %m", - name, group->groupid); - error_printf("Verify all devices in group %d are bound to vfio-pci " - "or pci-stub and not already in use\n", group->groupid); - return ret; + if (!(vbasedev->flags & VFIO_DEVICE_FLAGS_PCI)) { + error_report("vfio: Um, this isn't a PCI device"); + goto error; } - - vdev->vbasedev.fd = ret; - vdev->vbasedev.group = group; - QLIST_INSERT_HEAD(&group->device_list, &vdev->vbasedev, next); - - /* Sanity check device */ - ret = ioctl(vdev->vbasedev.fd, VFIO_DEVICE_GET_INFO, &dev_info); - if (ret) { - error_report("vfio: error getting device info: %m"); + if (vbasedev->num_regions < VFIO_PCI_CONFIG_REGION_INDEX + 1) { + error_report("vfio: unexpected number of io regions %u", + vbasedev->num_regions); goto error; } - - DPRINTF("Device %s flags: %u, regions: %u, irgs: %u\n", name, - dev_info.flags, dev_info.num_regions, dev_info.num_irqs); - - if (!(dev_info.flags & VFIO_DEVICE_FLAGS_PCI)) { - error_report("vfio: Um, this isn't a PCI device"); + if (vbasedev->num_irqs < VFIO_PCI_MSIX_IRQ_INDEX + 1) { + error_report("vfio: unexpected number of irqs %u", + vbasedev->num_irqs); goto error; } + return 0; +error: + vfio_put_base_device(vbasedev); + return -errno; +} - vdev->vbasedev.reset_works = !!(dev_info.flags & VFIO_DEVICE_FLAGS_RESET); +static int vfio_populate_interrupts(VFIODevice *vbasedev) +{ + VFIOPCIDevice *vdev = container_of(vbasedev, VFIOPCIDevice, vbasedev); + int ret; + struct vfio_irq_info irq_info = { .argsz = sizeof(irq_info) }; + irq_info.index = VFIO_PCI_ERR_IRQ_INDEX; - if (dev_info.num_regions < VFIO_PCI_CONFIG_REGION_INDEX + 1) { - error_report("vfio: unexpected number of io regions %u", - dev_info.num_regions); - goto error; + ret = ioctl(vbasedev->fd, VFIO_DEVICE_GET_IRQ_INFO, &irq_info); + if (ret) { + /* This can fail for an old kernel or legacy PCI dev */ + DPRINTF("VFIO_DEVICE_GET_IRQ_INFO failure: %m\n"); + } else if (irq_info.count == 1) { + vdev->pci_aer = true; + } else { + error_report("vfio: %s Could not enable error recovery for the device", + vbasedev->name); } + return ret; +} - if (dev_info.num_irqs < VFIO_PCI_MSIX_IRQ_INDEX + 1) { - error_report("vfio: unexpected number of irqs %u", dev_info.num_irqs); - goto error; - } +static int vfio_populate_regions(VFIODevice *vbasedev) +{ + struct vfio_region_info reg_info = { .argsz = sizeof(reg_info) }; + int i, ret; + VFIOPCIDevice *vdev = container_of(vbasedev, VFIOPCIDevice, vbasedev); for (i = VFIO_PCI_BAR0_REGION_INDEX; i < VFIO_PCI_ROM_REGION_INDEX; i++) { reg_info.index = i; @@ -4018,7 +4030,7 @@ static int vfio_get_device(VFIOGroup *group, const char *name, vdev->config_offset = reg_info.offset; if ((vdev->features & VFIO_FEATURE_ENABLE_VGA) && - dev_info.num_regions > VFIO_PCI_VGA_REGION_INDEX) { + vbasedev->num_regions > VFIO_PCI_VGA_REGION_INDEX) { struct vfio_region_info vga_info = { .argsz = sizeof(vga_info), .index = VFIO_PCI_VGA_REGION_INDEX, @@ -4057,38 +4069,87 @@ static int vfio_get_device(VFIOGroup *group, const char *name, vdev->has_vga = true; } - irq_info.index = VFIO_PCI_ERR_IRQ_INDEX; + return 0; +error: + vfio_put_base_device(vbasedev); + return -errno; +} + +static int vfio_get_device(VFIOGroup *group, const char *name, + VFIODevice *vbasedev) +{ + struct vfio_device_info dev_info = { .argsz = sizeof(dev_info) }; + struct vfio_region_info reg_info = { .argsz = sizeof(reg_info) }; + struct vfio_irq_info irq_info = { .argsz = sizeof(irq_info) }; + int ret; + + ret = ioctl(group->fd, VFIO_GROUP_GET_DEVICE_FD, name); + if (ret < 0) { + error_report("vfio: error getting device %s from group %d: %m", + name, group->groupid); + error_printf("Verify all devices in group %d are bound to vfio-pci " + "or pci-stub and not already in use\n", group->groupid); + return ret; + } + + vbasedev->fd = ret; + vbasedev->group = group; + QLIST_INSERT_HEAD(&group->device_list, vbasedev, next); - ret = ioctl(vdev->vbasedev.fd, VFIO_DEVICE_GET_IRQ_INFO, &irq_info); + ret = ioctl(vbasedev->fd, VFIO_DEVICE_GET_INFO, &dev_info); if (ret) { - /* This can fail for an old kernel or legacy PCI dev */ - DPRINTF("VFIO_DEVICE_GET_IRQ_INFO failure: %m\n"); - ret = 0; - } else if (irq_info.count == 1) { - vdev->pci_aer = true; - } else { - error_report("vfio: %04x:%02x:%02x.%x " - "Could not enable error recovery for the device", - vdev->host.domain, vdev->host.bus, vdev->host.slot, - vdev->host.function); + error_report("vfio: error getting device info: %m"); + goto error; + } + + vbasedev->num_irqs = dev_info.num_irqs; + vbasedev->num_regions = dev_info.num_regions; + vbasedev->flags = dev_info.flags; + + DPRINTF("Device %s flags: %u, regions: %u, irgs: %u\n", name, + dev_info.flags, dev_info.num_regions, dev_info.num_irqs); + + vbasedev->reset_works = !!(dev_info.flags & VFIO_DEVICE_FLAGS_RESET); + + /* call device specific functions */ + ret = vbasedev->ops->vfio_check_device(vbasedev); + if (ret) { + error_report("vfio: error when checking device %s\n", + vbasedev->name); + goto error; + } + ret = vbasedev->ops->vfio_populate_regions(vbasedev); + if (ret) { + error_report("vfio: error when populating regions of device %s\n", + vbasedev->name); + goto error; + } + ret = vbasedev->ops->vfio_populate_interrupts(vbasedev); + if (ret) { + error_report("vfio: error when populating interrupts of device %s\n", + vbasedev->name); + goto error; } error: if (ret) { - QLIST_REMOVE(&vdev->vbasedev, next); - vdev->vbasedev.group = NULL; - close(vdev->vbasedev.fd); + vfio_put_base_device(vbasedev); } return ret; } -static void vfio_put_device(VFIOPCIDevice *vdev) +void vfio_put_base_device(VFIODevice *vbasedev) { - QLIST_REMOVE(&vdev->vbasedev, next); - vdev->vbasedev.group = NULL; + QLIST_REMOVE(vbasedev, next); + vbasedev->group = NULL; DPRINTF("vfio_put_device: close vdev->fd\n"); - close(vdev->vbasedev.fd); - g_free(vdev->vbasedev.name); + close(vbasedev->fd); + g_free(vbasedev->name); +} + +static void vfio_put_device(VFIOPCIDevice *vdev) +{ + vfio_put_base_device(&vdev->vbasedev); if (vdev->msix) { g_free(vdev->msix); vdev->msix = NULL; @@ -4266,7 +4327,7 @@ static int vfio_initfn(PCIDevice *pdev) } } - ret = vfio_get_device(group, path, vdev); + ret = vfio_get_device(group, path, &vdev->vbasedev); if (ret) { error_report("vfio: failed to get device %s", path); vfio_put_group(group);