Message ID | 20210519162903.1172366-26-eperezma@redhat.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | vDPA software assisted live migration | expand |
在 2021/5/20 上午12:28, Eugenio Pérez 写道: > Use translations added in IOVAReverseMaps in SVQ if the vhost device > does not support the mapping of the full qemu's virtual address space. > In other cases, Shadow Virtqueue still uses the qemu's virtual address > of the buffer pointed by the descriptor, which has been translated > already by qemu's VirtQueue machinery. I'd say let stick to a single kind of translation (iova allocator) that works for all the cases first and add optimizations on top. > > Now every element needs to store the previous address also, so VirtQueue > can consume the elements properly. This adds a little overhead per VQ > element, having to allocate more memory to stash them. As a possible > optimization, this allocation could be avoided if the descriptor is not > a chain but a single one, but this is left undone. > > Checking also for vhost_set_iotlb_callback to send used ring remapping. > This is only needed for kernel, and would print an error in case of > vhost devices with its own mapping (vdpa). > > This could change for other callback, like checking for > vhost_force_iommu, enable_custom_iommu, or another. Another option could > be to, at least, extract the check of "is map(used, writable) needed?" > in another function. But at the moment just copy the check used in > vhost_dev_start here. > > Signed-off-by: Eugenio Pérez <eperezma@redhat.com> > --- > hw/virtio/vhost-shadow-virtqueue.c | 134 ++++++++++++++++++++++++++--- > hw/virtio/vhost.c | 29 +++++-- > 2 files changed, 145 insertions(+), 18 deletions(-) > > diff --git a/hw/virtio/vhost-shadow-virtqueue.c b/hw/virtio/vhost-shadow-virtqueue.c > index 934d3bb27b..a92da979d1 100644 > --- a/hw/virtio/vhost-shadow-virtqueue.c > +++ b/hw/virtio/vhost-shadow-virtqueue.c > @@ -10,12 +10,19 @@ > #include "hw/virtio/vhost-shadow-virtqueue.h" > #include "hw/virtio/vhost.h" > #include "hw/virtio/virtio-access.h" > +#include "hw/virtio/vhost-iova-tree.h" > > #include "standard-headers/linux/vhost_types.h" > > #include "qemu/error-report.h" > #include "qemu/main-loop.h" > > +typedef struct SVQElement { > + VirtQueueElement elem; > + void **in_sg_stash; > + void **out_sg_stash; Any reason for the trick like this? Can we simply use iovec and iov_copy() here? Thanks
On Wed, Jun 2, 2021 at 11:52 AM Jason Wang <jasowang@redhat.com> wrote: > > > 在 2021/5/20 上午12:28, Eugenio Pérez 写道: > > Use translations added in IOVAReverseMaps in SVQ if the vhost device > > does not support the mapping of the full qemu's virtual address space. > > In other cases, Shadow Virtqueue still uses the qemu's virtual address > > of the buffer pointed by the descriptor, which has been translated > > already by qemu's VirtQueue machinery. > > > I'd say let stick to a single kind of translation (iova allocator) that > works for all the cases first and add optimizations on top. > Ok, I will start from here for the next revision. > > > > > Now every element needs to store the previous address also, so VirtQueue > > can consume the elements properly. This adds a little overhead per VQ > > element, having to allocate more memory to stash them. As a possible > > optimization, this allocation could be avoided if the descriptor is not > > a chain but a single one, but this is left undone. > > > > Checking also for vhost_set_iotlb_callback to send used ring remapping. > > This is only needed for kernel, and would print an error in case of > > vhost devices with its own mapping (vdpa). > > > > This could change for other callback, like checking for > > vhost_force_iommu, enable_custom_iommu, or another. Another option could > > be to, at least, extract the check of "is map(used, writable) needed?" > > in another function. But at the moment just copy the check used in > > vhost_dev_start here. > > > > Signed-off-by: Eugenio Pérez <eperezma@redhat.com> > > --- > > hw/virtio/vhost-shadow-virtqueue.c | 134 ++++++++++++++++++++++++++--- > > hw/virtio/vhost.c | 29 +++++-- > > 2 files changed, 145 insertions(+), 18 deletions(-) > > > > diff --git a/hw/virtio/vhost-shadow-virtqueue.c b/hw/virtio/vhost-shadow-virtqueue.c > > index 934d3bb27b..a92da979d1 100644 > > --- a/hw/virtio/vhost-shadow-virtqueue.c > > +++ b/hw/virtio/vhost-shadow-virtqueue.c > > @@ -10,12 +10,19 @@ > > #include "hw/virtio/vhost-shadow-virtqueue.h" > > #include "hw/virtio/vhost.h" > > #include "hw/virtio/virtio-access.h" > > +#include "hw/virtio/vhost-iova-tree.h" > > > > #include "standard-headers/linux/vhost_types.h" > > > > #include "qemu/error-report.h" > > #include "qemu/main-loop.h" > > > > +typedef struct SVQElement { > > + VirtQueueElement elem; > > + void **in_sg_stash; > > + void **out_sg_stash; > > > Any reason for the trick like this? > > Can we simply use iovec and iov_copy() here? > At the moment the device writes the buffer directly to the guest's memory, and SVQ only translates the descriptor. In this scenario, there would be no need for iov_copy, isn't it? The reason for stash and unstash them was to allow the 1:1 mapping with qemu memory and IOMMU and iova allocator to work with less changes, In particular, the reason for unstash is that virtqueue_fill, expects qemu pointers to set the guest memory page as dirty in virtqueue_unmap_sg->dma_memory_unmap. Now I think that just storing the iova address from the allocator in a separated field and using a wrapper to get the IOVA addresses in SVQ would be a better idea, so I would change to this if everyone agrees. Thanks! > Thanks > >
在 2021/6/3 上午1:51, Eugenio Perez Martin 写道: > On Wed, Jun 2, 2021 at 11:52 AM Jason Wang <jasowang@redhat.com> wrote: >> >> 在 2021/5/20 上午12:28, Eugenio Pérez 写道: >>> Use translations added in IOVAReverseMaps in SVQ if the vhost device >>> does not support the mapping of the full qemu's virtual address space. >>> In other cases, Shadow Virtqueue still uses the qemu's virtual address >>> of the buffer pointed by the descriptor, which has been translated >>> already by qemu's VirtQueue machinery. >> >> I'd say let stick to a single kind of translation (iova allocator) that >> works for all the cases first and add optimizations on top. >> > Ok, I will start from here for the next revision. > >>> Now every element needs to store the previous address also, so VirtQueue >>> can consume the elements properly. This adds a little overhead per VQ >>> element, having to allocate more memory to stash them. As a possible >>> optimization, this allocation could be avoided if the descriptor is not >>> a chain but a single one, but this is left undone. >>> >>> Checking also for vhost_set_iotlb_callback to send used ring remapping. >>> This is only needed for kernel, and would print an error in case of >>> vhost devices with its own mapping (vdpa). >>> >>> This could change for other callback, like checking for >>> vhost_force_iommu, enable_custom_iommu, or another. Another option could >>> be to, at least, extract the check of "is map(used, writable) needed?" >>> in another function. But at the moment just copy the check used in >>> vhost_dev_start here. >>> >>> Signed-off-by: Eugenio Pérez <eperezma@redhat.com> >>> --- >>> hw/virtio/vhost-shadow-virtqueue.c | 134 ++++++++++++++++++++++++++--- >>> hw/virtio/vhost.c | 29 +++++-- >>> 2 files changed, 145 insertions(+), 18 deletions(-) >>> >>> diff --git a/hw/virtio/vhost-shadow-virtqueue.c b/hw/virtio/vhost-shadow-virtqueue.c >>> index 934d3bb27b..a92da979d1 100644 >>> --- a/hw/virtio/vhost-shadow-virtqueue.c >>> +++ b/hw/virtio/vhost-shadow-virtqueue.c >>> @@ -10,12 +10,19 @@ >>> #include "hw/virtio/vhost-shadow-virtqueue.h" >>> #include "hw/virtio/vhost.h" >>> #include "hw/virtio/virtio-access.h" >>> +#include "hw/virtio/vhost-iova-tree.h" >>> >>> #include "standard-headers/linux/vhost_types.h" >>> >>> #include "qemu/error-report.h" >>> #include "qemu/main-loop.h" >>> >>> +typedef struct SVQElement { >>> + VirtQueueElement elem; >>> + void **in_sg_stash; >>> + void **out_sg_stash; >> >> Any reason for the trick like this? >> >> Can we simply use iovec and iov_copy() here? >> > At the moment the device writes the buffer directly to the guest's > memory, and SVQ only translates the descriptor. In this scenario, > there would be no need for iov_copy, isn't it? It depends on which kinds of translation you used. If I read the code correctly, stash is used for storing HVAs after the HVA->IOVA translation. This looks exactly the work of iov (and do we guarantee the there will be a 1:1 translation?) And if the mapping is 1:1 you can simply use iov_copy(). But this wont' be a option if we will always use iova allocator. > > The reason for stash and unstash them was to allow the 1:1 mapping > with qemu memory and IOMMU and iova allocator to work with less > changes, In particular, the reason for unstash is that virtqueue_fill, > expects qemu pointers to set the guest memory page as dirty in > virtqueue_unmap_sg->dma_memory_unmap. > > Now I think that just storing the iova address from the allocator in a > separated field and using a wrapper to get the IOVA addresses in SVQ > would be a better idea, so I would change to this if everyone agrees. I agree. Thanks > > Thanks! > >> Thanks >> >>
On Thu, Jun 3, 2021 at 5:39 AM Jason Wang <jasowang@redhat.com> wrote: > > > 在 2021/6/3 上午1:51, Eugenio Perez Martin 写道: > > On Wed, Jun 2, 2021 at 11:52 AM Jason Wang <jasowang@redhat.com> wrote: > >> > >> 在 2021/5/20 上午12:28, Eugenio Pérez 写道: > >>> Use translations added in IOVAReverseMaps in SVQ if the vhost device > >>> does not support the mapping of the full qemu's virtual address space. > >>> In other cases, Shadow Virtqueue still uses the qemu's virtual address > >>> of the buffer pointed by the descriptor, which has been translated > >>> already by qemu's VirtQueue machinery. > >> > >> I'd say let stick to a single kind of translation (iova allocator) that > >> works for all the cases first and add optimizations on top. > >> > > Ok, I will start from here for the next revision. > > > >>> Now every element needs to store the previous address also, so VirtQueue > >>> can consume the elements properly. This adds a little overhead per VQ > >>> element, having to allocate more memory to stash them. As a possible > >>> optimization, this allocation could be avoided if the descriptor is not > >>> a chain but a single one, but this is left undone. > >>> > >>> Checking also for vhost_set_iotlb_callback to send used ring remapping. > >>> This is only needed for kernel, and would print an error in case of > >>> vhost devices with its own mapping (vdpa). > >>> > >>> This could change for other callback, like checking for > >>> vhost_force_iommu, enable_custom_iommu, or another. Another option could > >>> be to, at least, extract the check of "is map(used, writable) needed?" > >>> in another function. But at the moment just copy the check used in > >>> vhost_dev_start here. > >>> > >>> Signed-off-by: Eugenio Pérez <eperezma@redhat.com> > >>> --- > >>> hw/virtio/vhost-shadow-virtqueue.c | 134 ++++++++++++++++++++++++++--- > >>> hw/virtio/vhost.c | 29 +++++-- > >>> 2 files changed, 145 insertions(+), 18 deletions(-) > >>> > >>> diff --git a/hw/virtio/vhost-shadow-virtqueue.c b/hw/virtio/vhost-shadow-virtqueue.c > >>> index 934d3bb27b..a92da979d1 100644 > >>> --- a/hw/virtio/vhost-shadow-virtqueue.c > >>> +++ b/hw/virtio/vhost-shadow-virtqueue.c > >>> @@ -10,12 +10,19 @@ > >>> #include "hw/virtio/vhost-shadow-virtqueue.h" > >>> #include "hw/virtio/vhost.h" > >>> #include "hw/virtio/virtio-access.h" > >>> +#include "hw/virtio/vhost-iova-tree.h" > >>> > >>> #include "standard-headers/linux/vhost_types.h" > >>> > >>> #include "qemu/error-report.h" > >>> #include "qemu/main-loop.h" > >>> > >>> +typedef struct SVQElement { > >>> + VirtQueueElement elem; > >>> + void **in_sg_stash; > >>> + void **out_sg_stash; > >> > >> Any reason for the trick like this? > >> > >> Can we simply use iovec and iov_copy() here? > >> > > At the moment the device writes the buffer directly to the guest's > > memory, and SVQ only translates the descriptor. In this scenario, > > there would be no need for iov_copy, isn't it? > > > It depends on which kinds of translation you used. > > If I read the code correctly, stash is used for storing HVAs after the > HVA->IOVA translation. > > This looks exactly the work of iov (and do we guarantee the there will > be a 1:1 translation?) > > And if the mapping is 1:1 you can simply use iov_copy(). > > But this wont' be a option if we will always use iova allocator. > Right, the stash is only used in case of iova allocator. In case of 1:1 translation, svq->iova_map is never !NULL and _stash/_unstash functions are never called. And yes, I could have used iov_copy [1], but the check of overlapping would have been unnecessary. It was like using memmove vs memset in my head. Thanks! [1] I thought you meant iov_to_buf in your last mail, so please omit the part of the buffer copy in my answer :). > > > > > The reason for stash and unstash them was to allow the 1:1 mapping > > with qemu memory and IOMMU and iova allocator to work with less > > changes, In particular, the reason for unstash is that virtqueue_fill, > > expects qemu pointers to set the guest memory page as dirty in > > virtqueue_unmap_sg->dma_memory_unmap. > > > > Now I think that just storing the iova address from the allocator in a > > separated field and using a wrapper to get the IOVA addresses in SVQ > > would be a better idea, so I would change to this if everyone agrees. > > > I agree. > > Thanks > > > > > > Thanks! > > > >> Thanks > >> > >> >
diff --git a/hw/virtio/vhost-shadow-virtqueue.c b/hw/virtio/vhost-shadow-virtqueue.c index 934d3bb27b..a92da979d1 100644 --- a/hw/virtio/vhost-shadow-virtqueue.c +++ b/hw/virtio/vhost-shadow-virtqueue.c @@ -10,12 +10,19 @@ #include "hw/virtio/vhost-shadow-virtqueue.h" #include "hw/virtio/vhost.h" #include "hw/virtio/virtio-access.h" +#include "hw/virtio/vhost-iova-tree.h" #include "standard-headers/linux/vhost_types.h" #include "qemu/error-report.h" #include "qemu/main-loop.h" +typedef struct SVQElement { + VirtQueueElement elem; + void **in_sg_stash; + void **out_sg_stash; +} SVQElement; + /* Shadow virtqueue to relay notifications */ typedef struct VhostShadowVirtqueue { /* Shadow vring */ @@ -50,8 +57,11 @@ typedef struct VhostShadowVirtqueue { /* Virtio device */ VirtIODevice *vdev; + /* IOVA mapping if used */ + VhostIOVATree *iova_map; + /* Map for returning guest's descriptors */ - VirtQueueElement **ring_id_maps; + SVQElement **ring_id_maps; /* Next head to expose to device */ uint16_t avail_idx_shadow; @@ -88,6 +98,66 @@ static void vhost_shadow_vq_set_notification(VhostShadowVirtqueue *svq, } } +static void vhost_shadow_vq_stash_addr(void ***stash, const struct iovec *iov, + size_t num) +{ + size_t i; + + if (num == 0) { + return; + } + + *stash = g_new(void *, num); + for (i = 0; i < num; ++i) { + (*stash)[i] = iov[i].iov_base; + } +} + +static void vhost_shadow_vq_unstash_addr(void **stash, + struct iovec *iov, + size_t num) +{ + size_t i; + + if (num == 0) { + return; + } + + for (i = 0; i < num; ++i) { + iov[i].iov_base = stash[i]; + } + g_free(stash); +} + +static void vhost_shadow_vq_translate_addr(const VhostShadowVirtqueue *svq, + struct iovec *iovec, size_t num) +{ + size_t i; + + for (i = 0; i < num; ++i) { + VhostDMAMap needle = { + .translated_addr = iovec[i].iov_base, + .size = iovec[i].iov_len, + }; + size_t off; + + const VhostDMAMap *map = vhost_iova_tree_find_iova(svq->iova_map, + &needle); + /* + * Map cannot be NULL since iova map contains all guest space and + * qemu already has a physical address mapped + */ + assert(map); + + /* + * Map->iova chunk size is ignored. What to do if descriptor + * (addr, size) does not fit is delegated to the device. + */ + off = needle.translated_addr - map->translated_addr; + iovec[i].iov_base = (void *)(map->iova + off); + } +} + static void vhost_vring_write_descs(VhostShadowVirtqueue *svq, const struct iovec *iovec, size_t num, bool more_descs, bool write) @@ -118,8 +188,9 @@ static void vhost_vring_write_descs(VhostShadowVirtqueue *svq, } static unsigned vhost_shadow_vq_add_split(VhostShadowVirtqueue *svq, - VirtQueueElement *elem) + SVQElement *svq_elem) { + VirtQueueElement *elem = &svq_elem->elem; int head; unsigned avail_idx; vring_avail_t *avail = svq->vring.avail; @@ -129,6 +200,16 @@ static unsigned vhost_shadow_vq_add_split(VhostShadowVirtqueue *svq, /* We need some descriptors here */ assert(elem->out_num || elem->in_num); + if (svq->iova_map) { + vhost_shadow_vq_stash_addr(&svq_elem->in_sg_stash, elem->in_sg, + elem->in_num); + vhost_shadow_vq_stash_addr(&svq_elem->out_sg_stash, elem->out_sg, + elem->out_num); + + vhost_shadow_vq_translate_addr(svq, elem->in_sg, elem->in_num); + vhost_shadow_vq_translate_addr(svq, elem->out_sg, elem->out_num); + } + vhost_vring_write_descs(svq, elem->out_sg, elem->out_num, elem->in_num > 0, false); vhost_vring_write_descs(svq, elem->in_sg, elem->in_num, false, true); @@ -150,7 +231,7 @@ static unsigned vhost_shadow_vq_add_split(VhostShadowVirtqueue *svq, } static void vhost_shadow_vq_add(VhostShadowVirtqueue *svq, - VirtQueueElement *elem) + SVQElement *elem) { unsigned qemu_head = vhost_shadow_vq_add_split(svq, elem); @@ -184,7 +265,7 @@ static void vhost_handle_guest_kick(EventNotifier *n) } while (true) { - VirtQueueElement *elem = virtqueue_pop(svq->vq, sizeof(*elem)); + SVQElement *elem = virtqueue_pop(svq->vq, sizeof(*elem)); if (!elem) { break; } @@ -210,7 +291,7 @@ static bool vhost_shadow_vq_more_used(VhostShadowVirtqueue *svq) return svq->used_idx != svq->shadow_used_idx; } -static VirtQueueElement *vhost_shadow_vq_get_buf(VhostShadowVirtqueue *svq) +static SVQElement *vhost_shadow_vq_get_buf(VhostShadowVirtqueue *svq) { vring_desc_t *descs = svq->vring.desc; const vring_used_t *used = svq->vring.used; @@ -235,7 +316,7 @@ static VirtQueueElement *vhost_shadow_vq_get_buf(VhostShadowVirtqueue *svq) svq->free_head = used_elem.id; svq->used_idx++; - svq->ring_id_maps[used_elem.id]->len = used_elem.len; + svq->ring_id_maps[used_elem.id]->elem.len = used_elem.len; return g_steal_pointer(&svq->ring_id_maps[used_elem.id]); } @@ -255,12 +336,21 @@ static void vhost_shadow_vq_handle_call_no_test(EventNotifier *n) vhost_shadow_vq_set_notification(svq, false); while (true) { - g_autofree VirtQueueElement *elem = vhost_shadow_vq_get_buf(svq); - if (!elem) { + g_autofree SVQElement *svq_elem = vhost_shadow_vq_get_buf(svq); + VirtQueueElement *elem; + if (!svq_elem) { break; } assert(i < svq->vring.num); + elem = &svq_elem->elem; + + if (svq->iova_map) { + vhost_shadow_vq_unstash_addr(svq_elem->in_sg_stash, + elem->in_sg, elem->in_num); + vhost_shadow_vq_unstash_addr(svq_elem->out_sg_stash, + elem->out_sg, elem->out_num); + } virtqueue_fill(vq, elem, elem->len, i++); } @@ -455,14 +545,27 @@ void vhost_shadow_vq_stop(struct vhost_dev *dev, for (i = 0; i < svq->vring.num; ++i) { - g_autofree VirtQueueElement *elem = svq->ring_id_maps[i]; + g_autofree SVQElement *svq_elem = svq->ring_id_maps[i]; + VirtQueueElement *elem; + + if (!svq_elem) { + continue; + } + + elem = &svq_elem->elem; + + if (svq->iova_map) { + vhost_shadow_vq_unstash_addr(svq_elem->in_sg_stash, elem->in_sg, + elem->in_num); + vhost_shadow_vq_unstash_addr(svq_elem->out_sg_stash, elem->out_sg, + elem->out_num); + } + /* * Although the doc says we must unpop in order, it's ok to unpop * everything. */ - if (elem) { - virtqueue_unpop(svq->vq, elem, elem->len); - } + virtqueue_unpop(svq->vq, elem, elem->len); } } @@ -504,11 +607,16 @@ VhostShadowVirtqueue *vhost_shadow_vq_new(struct vhost_dev *dev, int idx) memset(svq->vring.desc, 0, driver_size); svq->vring.used = qemu_memalign(qemu_real_host_page_size, device_size); memset(svq->vring.used, 0, device_size); + + if (vhost_has_limited_iova_range(dev)) { + svq->iova_map = &dev->iova_map; + } + for (i = 0; i < num - 1; i++) { svq->vring.desc[i].next = cpu_to_le16(i + 1); } - svq->ring_id_maps = g_new0(VirtQueueElement *, num); + svq->ring_id_maps = g_new0(SVQElement *, num); event_notifier_set_handler(&svq->call_notifier, vhost_shadow_vq_handle_call); return g_steal_pointer(&svq); diff --git a/hw/virtio/vhost.c b/hw/virtio/vhost.c index 925d2146a4..4339b899ea 100644 --- a/hw/virtio/vhost.c +++ b/hw/virtio/vhost.c @@ -1306,7 +1306,13 @@ static bool vhost_shadow_vq_start_store_sections(struct vhost_dev *dev) .perm = VHOST_ACCESS_RW, }; - VhostDMAMapNewRC r = vhost_iova_tree_insert(&dev->iova_map, ®ion); + VhostDMAMapNewRC r; + + if (vhost_has_limited_iova_range(dev)) { + r = vhost_iova_tree_alloc(&dev->iova_map, ®ion); + } else { + r = vhost_iova_tree_insert(&dev->iova_map, ®ion); + } assert(r == VHOST_DMA_MAP_OK); } @@ -1351,11 +1357,24 @@ static bool vhost_sw_live_migration_start_vq(struct vhost_dev *dev, .perm = VHOST_ACCESS_RW, }; - r = vhost_iova_tree_insert(&dev->iova_map, &driver_region); - assert(r == VHOST_DMA_MAP_OK); + if (vhost_has_limited_iova_range(dev)) { + r = vhost_iova_tree_alloc(&dev->iova_map, &driver_region); + assert(r == VHOST_DMA_MAP_OK); + + r = vhost_iova_tree_alloc(&dev->iova_map, &device_region); + assert(r == VHOST_DMA_MAP_OK); - r = vhost_iova_tree_insert(&dev->iova_map, &device_region); - assert(r == VHOST_DMA_MAP_OK); + addr.avail_user_addr = driver_region.iova + addr.avail_user_addr + - addr.desc_user_addr; + addr.desc_user_addr = driver_region.iova; + addr.used_user_addr = device_region.iova; + } else { + r = vhost_iova_tree_insert(&dev->iova_map, &driver_region); + assert(r == VHOST_DMA_MAP_OK); + + r = vhost_iova_tree_insert(&dev->iova_map, &device_region); + assert(r == VHOST_DMA_MAP_OK); + } vhost_virtqueue_stop(dev, dev->vdev, &dev->vqs[idx], dev->vq_index + idx); ok = vhost_shadow_vq_start(dev, idx, dev->shadow_vqs[idx]);
Use translations added in IOVAReverseMaps in SVQ if the vhost device does not support the mapping of the full qemu's virtual address space. In other cases, Shadow Virtqueue still uses the qemu's virtual address of the buffer pointed by the descriptor, which has been translated already by qemu's VirtQueue machinery. Now every element needs to store the previous address also, so VirtQueue can consume the elements properly. This adds a little overhead per VQ element, having to allocate more memory to stash them. As a possible optimization, this allocation could be avoided if the descriptor is not a chain but a single one, but this is left undone. Checking also for vhost_set_iotlb_callback to send used ring remapping. This is only needed for kernel, and would print an error in case of vhost devices with its own mapping (vdpa). This could change for other callback, like checking for vhost_force_iommu, enable_custom_iommu, or another. Another option could be to, at least, extract the check of "is map(used, writable) needed?" in another function. But at the moment just copy the check used in vhost_dev_start here. Signed-off-by: Eugenio Pérez <eperezma@redhat.com> --- hw/virtio/vhost-shadow-virtqueue.c | 134 ++++++++++++++++++++++++++--- hw/virtio/vhost.c | 29 +++++-- 2 files changed, 145 insertions(+), 18 deletions(-)