mirror of
https://github.com/Motorhead1991/qemu.git
synced 2025-08-09 02:24:58 -06:00
vdpa: move iova_range to vhost_vdpa_shared
Next patches will register the vhost_vdpa memory listener while the VM is migrating at the destination, so we can map the memory to the device before stopping the VM at the source. The main goal is to reduce the downtime. However, the destination QEMU is unaware of which vhost_vdpa device will register its memory_listener. If the source guest has CVQ enabled, it will be the CVQ device. Otherwise, it will be the first one. Move the iova range to VhostVDPAShared so all vhost_vdpa can use it, rather than always in the first or last vhost_vdpa. Signed-off-by: Eugenio Pérez <eperezma@redhat.com> Acked-by: Jason Wang <jasowang@redhat.com> Message-Id: <20231221174322.3130442-4-eperezma@redhat.com> Tested-by: Lei Yang <leiyang@redhat.com> Reviewed-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
This commit is contained in:
parent
5edb02e800
commit
ae25ff41b7
4 changed files with 21 additions and 13 deletions
|
@ -114,7 +114,8 @@ static void vhost_vdpa_device_realize(DeviceState *dev, Error **errp)
|
|||
strerror(-ret));
|
||||
goto free_vqs;
|
||||
}
|
||||
v->vdpa.iova_range = iova_range;
|
||||
v->vdpa.shared = g_new0(VhostVDPAShared, 1);
|
||||
v->vdpa.shared->iova_range = iova_range;
|
||||
|
||||
ret = vhost_dev_init(&v->dev, &v->vdpa, VHOST_BACKEND_TYPE_VDPA, 0, NULL);
|
||||
if (ret < 0) {
|
||||
|
@ -162,6 +163,7 @@ vhost_cleanup:
|
|||
vhost_dev_cleanup(&v->dev);
|
||||
free_vqs:
|
||||
g_free(vqs);
|
||||
g_free(v->vdpa.shared);
|
||||
out:
|
||||
qemu_close(v->vhostfd);
|
||||
v->vhostfd = -1;
|
||||
|
@ -184,6 +186,7 @@ static void vhost_vdpa_device_unrealize(DeviceState *dev)
|
|||
g_free(s->config);
|
||||
g_free(s->dev.vqs);
|
||||
vhost_dev_cleanup(&s->dev);
|
||||
g_free(s->vdpa.shared);
|
||||
qemu_close(s->vhostfd);
|
||||
s->vhostfd = -1;
|
||||
}
|
||||
|
|
|
@ -213,10 +213,10 @@ static void vhost_vdpa_iommu_map_notify(IOMMUNotifier *n, IOMMUTLBEntry *iotlb)
|
|||
RCU_READ_LOCK_GUARD();
|
||||
/* check if RAM section out of device range */
|
||||
llend = int128_add(int128_makes64(iotlb->addr_mask), int128_makes64(iova));
|
||||
if (int128_gt(llend, int128_make64(v->iova_range.last))) {
|
||||
if (int128_gt(llend, int128_make64(v->shared->iova_range.last))) {
|
||||
error_report("RAM section out of device range (max=0x%" PRIx64
|
||||
", end addr=0x%" PRIx64 ")",
|
||||
v->iova_range.last, int128_get64(llend));
|
||||
v->shared->iova_range.last, int128_get64(llend));
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -316,8 +316,10 @@ static void vhost_vdpa_listener_region_add(MemoryListener *listener,
|
|||
int page_size = qemu_target_page_size();
|
||||
int page_mask = -page_size;
|
||||
|
||||
if (vhost_vdpa_listener_skipped_section(section, v->iova_range.first,
|
||||
v->iova_range.last, page_mask)) {
|
||||
if (vhost_vdpa_listener_skipped_section(section,
|
||||
v->shared->iova_range.first,
|
||||
v->shared->iova_range.last,
|
||||
page_mask)) {
|
||||
return;
|
||||
}
|
||||
if (memory_region_is_iommu(section->mr)) {
|
||||
|
@ -403,8 +405,10 @@ static void vhost_vdpa_listener_region_del(MemoryListener *listener,
|
|||
int page_size = qemu_target_page_size();
|
||||
int page_mask = -page_size;
|
||||
|
||||
if (vhost_vdpa_listener_skipped_section(section, v->iova_range.first,
|
||||
v->iova_range.last, page_mask)) {
|
||||
if (vhost_vdpa_listener_skipped_section(section,
|
||||
v->shared->iova_range.first,
|
||||
v->shared->iova_range.last,
|
||||
page_mask)) {
|
||||
return;
|
||||
}
|
||||
if (memory_region_is_iommu(section->mr)) {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue