- vdpa-dev: Fix initialisation order to restore VDUSE compatibility - tcg: Allow top bit of SIMD_DATA_BITS to be set in simd_desc() - migration: fix-possible-int-overflow - target/m68k: Map FPU exceptions to FPSR register - qemu-options: Fix CXL Fixed Memory Window interleave-granularity typo - hvf: arm: Fix encodings for ID_AA64PFR1_EL1 and debug System registers - hw/intc/arm_gic: Fix handling of NS view of GICC_APR<n> - qio: Inherit follow_coroutine_ctx across TLS - target/riscv: Fix the element agnostic function problem - accel/tcg: Fix typo causing tb->page_addr[1] to not be recorded - tcg/loongarch64: Fix tcg_out_movi vs some pcrel pointers - migration: Fix file migration with fdset - ui/vnc: don't return an empty SASL mechlist to the client - target/arm: Fix FJCVTZS vs flush-to-zero - hw/ppc/e500: Prefer QOM cast - sphinx/qapidoc: Fix to generate doc for explicit, unboxed arguments - hw/ppc/e500: Remove unused "irqs" parameter - hw/ppc/e500: Add missing device tree properties to i2c controller node - hw/i386/amd_iommu: Don't leak memory in amdvi_update_iotlb() - hw/arm/mps2-tz.c: fix RX/TX interrupts order - target/i386: csv: Add support to migrate the incoming context for CSV3 guest - target/i386: csv: Add support to migrate the outgoing context for CSV3 guest - target/i386: csv: Add support to migrate the incoming page for CSV3 guest - target/i386: csv: Add support to migrate the outgoing page for CSV3 guest - linux-headers: update kernel headers to include CSV3 migration cmds - vfio: Only map shared region for CSV3 virtual machine - vga: Force full update for CSV3 guest - target/i386: csv: Load initial image to private memory for CSV3 guest - target/i386: csv: Do not register/unregister guest secure memory for CSV3 guest - target/i386: cpu: Populate CPUID 0x8000_001F when CSV3 is active - target/i386: csv: Add command to load vmcb to CSV3 guest memory - target/i386: csv: Add command to load data to CSV3 guest memory - target/i386: csv: Add command to initialize CSV3 context - target/i386: csv: Add CSV3 context - next-kbd: convert to use qemu_input_handler_register() - qemu/bswap: Undefine CPU_CONVERT() once done - exec/memop: Remove unused memop_big_endian() helper - hw/nvme: fix handling of over-committed queues - 9pfs: fix crash on 'Treaddir' request - hw/misc/psp: Pin the hugepage memory specified by mem2 during use for psp - hw/misc: support tkm use mem2 memory - hw/i386: add mem2 option for qemu - kvm: add support for guest physical bits - target/i386: add guest-phys-bits cpu property Signed-off-by: Jiabo Feng <fengjiabo1@huawei.com> (cherry picked from commit f45f35e88509a4ffa9f62332ee9601e9fe1f8d09)
181 lines
6.8 KiB
Diff
181 lines
6.8 KiB
Diff
From 9ab31c6abf095d8f7c986676cf6a70132a3441b7 Mon Sep 17 00:00:00 2001
|
|
From: Adttil <2429917001@qq.com>
|
|
Date: Tue, 10 Dec 2024 00:33:28 +0800
|
|
Subject: [PATCH] vdpa-dev: Fix initialisation order to restore VDUSE
|
|
compatibility
|
|
MIME-Version: 1.0
|
|
Content-Type: text/plain; charset=UTF-8
|
|
Content-Transfer-Encoding: 8bit
|
|
|
|
VDUSE requires that virtqueues are first enabled before the DRIVER_OK
|
|
status flag is set; with the current API of the kernel module, it is
|
|
impossible to enable the opposite order in our block export code because
|
|
userspace is not notified when a virtqueue is enabled.
|
|
|
|
This requirement also mathces the normal initialisation order as done by
|
|
the generic vhost code in QEMU. However, commit 6c48254 accidentally
|
|
changed the order for vdpa-dev and broke access to VDUSE devices with
|
|
this.
|
|
|
|
This changes vdpa-dev to use the normal order again and use the standard
|
|
vhost callback .vhost_set_vring_enable for this. VDUSE devices can be
|
|
used with vdpa-dev again after this fix.
|
|
|
|
vhost_net intentionally avoided enabling the vrings for vdpa and does
|
|
this manually later while it does enable them for other vhost backends.
|
|
Reflect this in the vhost_net code and return early for vdpa, so that
|
|
the behaviour doesn't change for this device.
|
|
|
|
Cc: qemu-stable@nongnu.org
|
|
Fixes: 6c48254 ('vdpa: move vhost_vdpa_set_vring_ready to the caller')
|
|
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
|
|
Message-ID: <20240315155949.86066-1-kwolf@redhat.com>
|
|
Reviewed-by: Eugenio Pérez <eperezma@redhat.com>
|
|
Reviewed-by: Stefano Garzarella <sgarzare@redhat.com>
|
|
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
|
|
---
|
|
hw/net/vhost_net.c | 10 ++++++++++
|
|
hw/virtio/trace-events | 2 +-
|
|
hw/virtio/vdpa-dev.c | 5 +----
|
|
hw/virtio/vhost-vdpa.c | 29 ++++++++++++++++++++++++++---
|
|
hw/virtio/vhost.c | 8 +++++++-
|
|
5 files changed, 45 insertions(+), 9 deletions(-)
|
|
|
|
diff --git a/hw/net/vhost_net.c b/hw/net/vhost_net.c
|
|
index e48c373b14..a02d65d208 100644
|
|
--- a/hw/net/vhost_net.c
|
|
+++ b/hw/net/vhost_net.c
|
|
@@ -599,6 +599,16 @@ int vhost_set_vring_enable(NetClientState *nc, int enable)
|
|
VHostNetState *net = get_vhost_net(nc);
|
|
const VhostOps *vhost_ops = net->dev.vhost_ops;
|
|
|
|
+ /*
|
|
+ * vhost-vdpa network devices need to enable dataplane virtqueues after
|
|
+ * DRIVER_OK, so they can recover device state before starting dataplane.
|
|
+ * Because of that, we don't enable virtqueues here and leave it to
|
|
+ * net/vhost-vdpa.c.
|
|
+ */
|
|
+ if (nc->info->type == NET_CLIENT_DRIVER_VHOST_VDPA) {
|
|
+ return 0;
|
|
+ }
|
|
+
|
|
nc->vring_enable = enable;
|
|
|
|
if (vhost_ops && vhost_ops->vhost_set_vring_enable) {
|
|
diff --git a/hw/virtio/trace-events b/hw/virtio/trace-events
|
|
index 637cac4edf..f136815072 100644
|
|
--- a/hw/virtio/trace-events
|
|
+++ b/hw/virtio/trace-events
|
|
@@ -48,7 +48,7 @@ vhost_vdpa_set_features(void *dev, uint64_t features) "dev: %p features: 0x%"PRI
|
|
vhost_vdpa_get_device_id(void *dev, uint32_t device_id) "dev: %p device_id %"PRIu32
|
|
vhost_vdpa_reset_device(void *dev) "dev: %p"
|
|
vhost_vdpa_get_vq_index(void *dev, int idx, int vq_idx) "dev: %p idx: %d vq idx: %d"
|
|
-vhost_vdpa_set_vring_ready(void *dev, unsigned i, int r) "dev: %p, idx: %u, r: %d"
|
|
+vhost_vdpa_set_vring_enable_one(void *dev, unsigned i, int enable, int r) "dev: %p, idx: %u, enable: %u, r: %d"
|
|
vhost_vdpa_dump_config(void *dev, const char *line) "dev: %p %s"
|
|
vhost_vdpa_set_config(void *dev, uint32_t offset, uint32_t size, uint32_t flags) "dev: %p offset: %"PRIu32" size: %"PRIu32" flags: 0x%"PRIx32
|
|
vhost_vdpa_get_config(void *dev, void *config, uint32_t config_len) "dev: %p config: %p config_len: %"PRIu32
|
|
diff --git a/hw/virtio/vdpa-dev.c b/hw/virtio/vdpa-dev.c
|
|
index 91e71847b0..7b2b19dfb8 100644
|
|
--- a/hw/virtio/vdpa-dev.c
|
|
+++ b/hw/virtio/vdpa-dev.c
|
|
@@ -259,14 +259,11 @@ static int vhost_vdpa_device_start(VirtIODevice *vdev, Error **errp)
|
|
|
|
s->dev.acked_features = vdev->guest_features;
|
|
|
|
- ret = vhost_dev_start(&s->dev, vdev, false);
|
|
+ ret = vhost_dev_start(&s->dev, vdev, true);
|
|
if (ret < 0) {
|
|
error_setg_errno(errp, -ret, "Error starting vhost");
|
|
goto err_guest_notifiers;
|
|
}
|
|
- for (i = 0; i < s->dev.nvqs; ++i) {
|
|
- vhost_vdpa_set_vring_ready(&s->vdpa, i);
|
|
- }
|
|
s->started = true;
|
|
|
|
/*
|
|
diff --git a/hw/virtio/vhost-vdpa.c b/hw/virtio/vhost-vdpa.c
|
|
index d49826845f..7e172eee49 100644
|
|
--- a/hw/virtio/vhost-vdpa.c
|
|
+++ b/hw/virtio/vhost-vdpa.c
|
|
@@ -883,12 +883,13 @@ static int vhost_vdpa_get_vq_index(struct vhost_dev *dev, int idx)
|
|
return idx;
|
|
}
|
|
|
|
-int vhost_vdpa_set_vring_ready(struct vhost_vdpa *v, unsigned idx)
|
|
+static int vhost_vdpa_set_vring_enable_one(struct vhost_vdpa *v, unsigned idx,
|
|
+ int enable)
|
|
{
|
|
struct vhost_dev *dev = v->dev;
|
|
struct vhost_vring_state state = {
|
|
.index = idx,
|
|
- .num = 1,
|
|
+ .num = enable,
|
|
};
|
|
hwaddr addr = virtio_queue_get_desc_addr(dev->vdev, idx);
|
|
if (addr == 0) {
|
|
@@ -897,10 +898,31 @@ int vhost_vdpa_set_vring_ready(struct vhost_vdpa *v, unsigned idx)
|
|
|
|
int r = vhost_vdpa_call(dev, VHOST_VDPA_SET_VRING_ENABLE, &state);
|
|
|
|
- trace_vhost_vdpa_set_vring_ready(dev, idx, r);
|
|
+ trace_vhost_vdpa_set_vring_enable_one(dev, idx, enable, r);
|
|
return r;
|
|
}
|
|
|
|
+static int vhost_vdpa_set_vring_enable(struct vhost_dev *dev, int enable)
|
|
+{
|
|
+ struct vhost_vdpa *v = dev->opaque;
|
|
+ unsigned int i;
|
|
+ int ret;
|
|
+
|
|
+ for (i = 0; i < dev->nvqs; ++i) {
|
|
+ ret = vhost_vdpa_set_vring_enable_one(v, i, enable);
|
|
+ if (ret < 0) {
|
|
+ return ret;
|
|
+ }
|
|
+ }
|
|
+
|
|
+ return 0;
|
|
+}
|
|
+
|
|
+int vhost_vdpa_set_vring_ready(struct vhost_vdpa *v, unsigned idx)
|
|
+{
|
|
+ return vhost_vdpa_set_vring_enable_one(v, idx, 1);
|
|
+}
|
|
+
|
|
static int vhost_vdpa_set_config_call(struct vhost_dev *dev,
|
|
int fd)
|
|
{
|
|
@@ -1584,6 +1606,7 @@ const VhostOps vdpa_ops = {
|
|
.vhost_set_features = vhost_vdpa_set_features,
|
|
.vhost_reset_device = vhost_vdpa_reset_device,
|
|
.vhost_get_vq_index = vhost_vdpa_get_vq_index,
|
|
+ .vhost_set_vring_enable = vhost_vdpa_set_vring_enable,
|
|
.vhost_get_config = vhost_vdpa_get_config,
|
|
.vhost_set_config = vhost_vdpa_set_config,
|
|
.vhost_requires_shm_log = NULL,
|
|
diff --git a/hw/virtio/vhost.c b/hw/virtio/vhost.c
|
|
index d073a6d5a5..d29075aa04 100644
|
|
--- a/hw/virtio/vhost.c
|
|
+++ b/hw/virtio/vhost.c
|
|
@@ -2063,7 +2063,13 @@ static int vhost_dev_set_vring_enable(struct vhost_dev *hdev, int enable)
|
|
return hdev->vhost_ops->vhost_set_vring_enable(hdev, enable);
|
|
}
|
|
|
|
-/* Host notifiers must be enabled at this point. */
|
|
+/*
|
|
+ * Host notifiers must be enabled at this point.
|
|
+ *
|
|
+ * If @vrings is true, this function will enable all vrings before starting the
|
|
+ * device. If it is false, the vring initialization is left to be done by the
|
|
+ * caller.
|
|
+ */
|
|
int vhost_dev_start(struct vhost_dev *hdev, VirtIODevice *vdev, bool vrings)
|
|
{
|
|
int i, r;
|
|
--
|
|
2.41.0.windows.1
|
|
|