On 2026/02/25 15:03, Kasireddy, Vivek wrote:
Hi Akihiko,

Subject: Re: [PATCH v7 10/10] virtio-gpu-dmabuf: Create dmabuf for
blobs associated with VFIO devices

On 2026/02/23 17:00, Vivek Kasireddy wrote:
In addition to memfd, a blob resource can also have its backing
storage in a VFIO device region. Since, there is no effective way
to determine where the backing storage is located, we first try to
create a dmabuf assuming it is in memfd. If that fails, we try to
create a dmabuf assuming it is in VFIO device region.

So, we first call virtio_gpu_create_udmabuf() to check if the blob's
backing storage is located in a memfd or not. If it is not, we invoke
the vfio_device_create_dmabuf() API which identifies the right VFIO
device and eventually creates a dmabuf fd.

Note that in virtio_gpu_remap_dmabuf(), we first try to test if
the VFIO dmabuf exporter supports mmap or not. If it doesn't, we
fall back to the vfio_device_mmap_dmabuf() API to get a mapping
created for the dmabuf.

Cc: Marc-André Lureau <[email protected]>
Cc: Alex Bennée <[email protected]>
Cc: Akihiko Odaki <[email protected]>
Cc: Dmitry Osipenko <[email protected]>
Cc: Alex Williamson <[email protected]>
Cc: Cédric Le Goater <[email protected]>
Signed-off-by: Vivek Kasireddy <[email protected]>
---
   hw/display/meson.build         |  1 +
   hw/display/vfio-dmabuf-stubs.c | 23 +++++++++++++++++++++++
   hw/display/virtio-gpu-dmabuf.c | 32 ++++++++++++++++++++++++-----
---
   3 files changed, 48 insertions(+), 8 deletions(-)
   create mode 100644 hw/display/vfio-dmabuf-stubs.c

diff --git a/hw/display/meson.build b/hw/display/meson.build
index f5f92b1068..7d2bd839cc 100644
--- a/hw/display/meson.build
+++ b/hw/display/meson.build
@@ -70,6 +70,7 @@ if
config_all_devices.has_key('CONFIG_VIRTIO_GPU')
                       if_true: [files('virtio-gpu-base.c', 'virtio-gpu.c'), 
pixman])
     if host_os == 'linux'
       virtio_gpu_ss.add(files('virtio-gpu-dmabuf.c'))
+    virtio_gpu_ss.add(when: 'CONFIG_VFIO', if_false: files('vfio-
dmabuf-stubs.c'))
     else
       virtio_gpu_ss.add(files('virtio-gpu-dmabuf-stubs.c'))
     endif
diff --git a/hw/display/vfio-dmabuf-stubs.c b/hw/display/vfio-dmabuf-
stubs.c
new file mode 100644
index 0000000000..12f016f0c5
--- /dev/null
+++ b/hw/display/vfio-dmabuf-stubs.c
@@ -0,0 +1,23 @@
+/*
+ * Copyright (c) 2026 Intel and/or its affiliates.
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+#include "qemu/osdep.h"
+#include "qemu/error-report.h"
+#include "qemu/iov.h"
+
+bool vfio_device_create_dmabuf(struct iovec *iov, unsigned int
iov_cnt,
+                               int *fd, Error **errp)
+{
+    error_setg(errp, "VFIO dmabuf support is not enabled");
+    return false;
+}
+
+bool vfio_device_mmap_dmabuf(struct iovec *iov, unsigned int
iov_cnt,
+                             void **addr, size_t total_size, Error **errp)
+{
+    error_setg(errp, "VFIO mmap dmabuf support is not enabled");
+    return false;
+}

This is VFIO's implementation and shouldn't be here. Follow what
hw/vfio/iommufd-stubs.c, the previously-mentioned example, does.
Ok, I'll move this file to hw/vfio directory.


diff --git a/hw/display/virtio-gpu-dmabuf.c b/hw/display/virtio-gpu-
dmabuf.c
index fdcf8e53a2..3f39371de1 100644
--- a/hw/display/virtio-gpu-dmabuf.c
+++ b/hw/display/virtio-gpu-dmabuf.c
@@ -18,6 +18,7 @@
   #include "ui/console.h"
   #include "hw/virtio/virtio-gpu.h"
   #include "hw/virtio/virtio-gpu-pixman.h"
+#include "hw/vfio/vfio-device.h"
   #include "trace.h"
   #include "system/ramblock.h"
   #include "system/hostmem.h"
@@ -82,13 +83,21 @@ virtio_gpu_create_udmabuf(struct
virtio_gpu_simple_resource *res, int *fd,
   static bool virtio_gpu_remap_dmabuf(struct
virtio_gpu_simple_resource *res,
                                       Error **errp)
   {
+    Error *mmap_err = NULL;
       void *map;

       map = mmap(NULL, res->blob_size, PROT_READ, MAP_SHARED,
res->dmabuf_fd, 0);
       if (map == MAP_FAILED) {
-        error_setg_errno(errp, errno, "dmabuf mmap failed");
+        error_setg_errno(&mmap_err, errno, "dmabuf mmap failed: ");
           res->remapped = NULL;
-        return false;
+
+        if (!vfio_device_mmap_dmabuf(res->iov, res->iov_cnt, &map,
+                                     res->blob_size, errp)) {
+            error_report_err(mmap_err);
+            return false;
+        }
+        error_free(mmap_err);
+        mmap_err = NULL;
       }
       res->remapped = map;
       return true;
@@ -145,7 +154,7 @@ bool virtio_gpu_have_udmabuf(void)

   void virtio_gpu_init_dmabuf(struct virtio_gpu_simple_resource *res)
   {
-    Error *local_err = NULL;
+    Error *local_err = NULL, *vfio_err = NULL;
       VirtIOGPUErrorType err;
       void *pdata = NULL;
       int fd;
@@ -158,12 +167,19 @@ void virtio_gpu_init_dmabuf(struct
virtio_gpu_simple_resource *res)
           err = virtio_gpu_create_udmabuf(res, &fd, &local_err);
           if (err != VIRTIO_GPU_NO_ERROR) {
               error_prepend(&local_err, "Cannot create dmabuf: ");
-            if (err == VIRTIO_GPU_GUEST_ERROR) {
-                qemu_log_mask(LOG_GUEST_ERROR,
-                              "Cannot create dmabuf: incompatible mem\n");
+
+            if (!vfio_device_create_dmabuf(res->iov, res->iov_cnt, &fd,
+                                           &vfio_err)) {
+                if (err == VIRTIO_GPU_GUEST_ERROR) {
+                    qemu_log_mask(LOG_GUEST_ERROR,
+                                  "Cannot create dmabuf: incompatible mem\n");

This logic is faulty. err is not set by vfio_device_create_dmabuf(), so
it reports a guest error even when the memory is compatible with
vfio_device_create_dmabuf() and it raised an error for a different
reason.
Maybe I misunderstood your previous comment about this but I thought
we are going to assume that if both virtio_gpu_create_udmabuf() and
vfio_device_create_dmabuf() fail (assuming Guest error in case of
virtio_gpu_create_udmabuf ()) then it is reasonable to assume that Guest
is at fault for passing in incompatible memory addresses.

It's not what I suggested. What I suggested is as follows:
> virtio_gpu_create_udmabuf(res);
> if (it turned out the memory is incompatible with udmabuf) {
>     virtio_gpu_create_vfio_dmabuf(res);
>     if (it turned out the memory is not backed by VFIO) {
>         qemu_log_mask(LOG_GUEST_ERROR, "incompatible\n");
>         return;
>     }
> }

https://lore.kernel.org/qemu-devel/[email protected]/

It is not correct to assume vfio_device_create_dmabuf() is failed due to a guest error when virtio_gpu_create_udmabuf(). For example, when mmap() fails in vfio_device_mmap_dmabuf(), it is a host error, and reporting a guest error in the case is a bug.


However, in order to fix this properly, I think we would have to have
vfio_device_create_dmabuf() return VIRTIO_GPU_GUEST/HOST_ERROR
(or something equivalent) which I was trying to avoid. Do you see any
other proper way to fix this issue without messing with the return type
of vfio_device_create_dmabuf()?

The reason why I am hesitant to make vfio_device_create_dmabuf() return
Guest/Host error is because a future user of this API may not need this info.

A future user may not need it, but we need it to make this code bug-free.

Regards,
Akihiko Odaki


Thanks,
Vivek


Regards,
Akihiko Odaki

+                }
+                error_report_err(local_err);
+                error_report_err(vfio_err);
+                return;
               }
-            error_report_err(local_err);
-            return;
+            error_free(local_err);
+            local_err = NULL;
           }

           res->dmabuf_fd = fd;



Reply via email to