This patch introduces PCIPASIDOps for PASID related operations in future usage like virt-SVA. Related discussions can be found in below links.
https://lists.gnu.org/archive/html/qemu-devel/2018-03/msg00078.html https://lists.gnu.org/archive/html/qemu-devel/2018-03/msg00940.html So far, to setup virt-SVA for assigned SVA capable device, needs to configure host translation structures for specific pasid. (e.g. bind guest page table to host and enable nested translation in host). Besides, vIOMMU emulator needs to forward guest's cache invalidation to host since host nested translation is enabled. e.g. on VT-d, guest owns 1st level translation table, thus cache invalidation for 1st level should be propagated to host. This patch adds two functions: alloc_pasid and free_pasid to support guest pasid allocation and free. The implementations of the callbacks would be device passthru modules. Like vfio. Cc: Kevin Tian <kevin.t...@intel.com> Cc: Jacob Pan <jacob.jun....@linux.intel.com> Cc: Peter Xu <pet...@redhat.com> Cc: Eric Auger <eric.au...@redhat.com> Cc: Yi Sun <yi.y....@linux.intel.com> Cc: David Gibson <da...@gibson.dropbear.id.au> Signed-off-by: Liu Yi L <yi.l....@intel.com> Signed-off-by: Yi Sun <yi.y....@linux.intel.com> --- hw/pci/pci.c | 50 ++++++++++++++++++++++++++++++++++++++++++++++++++ include/hw/pci/pci.h | 14 ++++++++++++++ 2 files changed, 64 insertions(+) diff --git a/hw/pci/pci.c b/hw/pci/pci.c index 8076a80..710f9e9 100644 --- a/hw/pci/pci.c +++ b/hw/pci/pci.c @@ -2626,6 +2626,56 @@ void pci_setup_iommu(PCIBus *bus, PCIIOMMUFunc fn, void *opaque) bus->iommu_opaque = opaque; } +void pci_setup_pasid_ops(PCIDevice *dev, PCIPASIDOps *ops) +{ + assert(ops && !dev->pasid_ops); + dev->pasid_ops = ops; +} + +bool pci_device_is_ops_set(PCIBus *bus, int32_t devfn) +{ + PCIDevice *dev; + + if (!bus) { + return false; + } + + dev = bus->devices[devfn]; + return !!(dev && dev->pasid_ops); +} + +int pci_device_request_pasid_alloc(PCIBus *bus, int32_t devfn, + uint32_t min_pasid, uint32_t max_pasid) +{ + PCIDevice *dev; + + if (!bus) { + return -1; + } + + dev = bus->devices[devfn]; + if (dev && dev->pasid_ops && dev->pasid_ops->alloc_pasid) { + return dev->pasid_ops->alloc_pasid(bus, devfn, min_pasid, max_pasid); + } + return -1; +} + +int pci_device_request_pasid_free(PCIBus *bus, int32_t devfn, + uint32_t pasid) +{ + PCIDevice *dev; + + if (!bus) { + return -1; + } + + dev = bus->devices[devfn]; + if (dev && dev->pasid_ops && dev->pasid_ops->free_pasid) { + return dev->pasid_ops->free_pasid(bus, devfn, pasid); + } + return -1; +} + static void pci_dev_get_w64(PCIBus *b, PCIDevice *dev, void *opaque) { Range *range = opaque; diff --git a/include/hw/pci/pci.h b/include/hw/pci/pci.h index d082707..16e5b8e 100644 --- a/include/hw/pci/pci.h +++ b/include/hw/pci/pci.h @@ -262,6 +262,13 @@ struct PCIReqIDCache { }; typedef struct PCIReqIDCache PCIReqIDCache; +typedef struct PCIPASIDOps PCIPASIDOps; +struct PCIPASIDOps { + int (*alloc_pasid)(PCIBus *bus, int32_t devfn, + uint32_t min_pasid, uint32_t max_pasid); + int (*free_pasid)(PCIBus *bus, int32_t devfn, uint32_t pasid); +}; + struct PCIDevice { DeviceState qdev; @@ -351,6 +358,7 @@ struct PCIDevice { MSIVectorUseNotifier msix_vector_use_notifier; MSIVectorReleaseNotifier msix_vector_release_notifier; MSIVectorPollNotifier msix_vector_poll_notifier; + PCIPASIDOps *pasid_ops; }; void pci_register_bar(PCIDevice *pci_dev, int region_num, @@ -484,6 +492,12 @@ typedef AddressSpace *(*PCIIOMMUFunc)(PCIBus *, void *, int); AddressSpace *pci_device_iommu_address_space(PCIDevice *dev); void pci_setup_iommu(PCIBus *bus, PCIIOMMUFunc fn, void *opaque); +void pci_setup_pasid_ops(PCIDevice *dev, PCIPASIDOps *ops); +bool pci_device_is_ops_set(PCIBus *bus, int32_t devfn); +int pci_device_request_pasid_alloc(PCIBus *bus, int32_t devfn, + uint32_t min_pasid, uint32_t max_pasid); +int pci_device_request_pasid_free(PCIBus *bus, int32_t devfn, uint32_t pasid); + static inline void pci_set_byte(uint8_t *config, uint8_t val) { -- 2.7.4