[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH V2 11/25] x86/hvm: Introduce a emulated VTD for HVM



On 2017年08月23日 15:58, Roger Pau Monné wrote:
> On Wed, Aug 09, 2017 at 04:34:12PM -0400, Lan Tianyu wrote:
>> From: Chao Gao <chao.gao@xxxxxxxxx>
>>
>> This patch adds create/destroy/query function for the emulated VTD
>> and adapts it to the common VIOMMU abstraction.
>>
>> Signed-off-by: Chao Gao <chao.gao@xxxxxxxxx>
>> Signed-off-by: Lan Tianyu <tianyu.lan@xxxxxxxxx>
>> ---
>>  xen/drivers/passthrough/vtd/Makefile |   7 +-
>>  xen/drivers/passthrough/vtd/iommu.h  |  99 +++++++++++++++++-----
>>  xen/drivers/passthrough/vtd/vvtd.c   | 158 
>> +++++++++++++++++++++++++++++++++++
>>  xen/include/asm-x86/viommu.h         |   3 +
>>  4 files changed, 241 insertions(+), 26 deletions(-)
>>  create mode 100644 xen/drivers/passthrough/vtd/vvtd.c
>>
>> diff --git a/xen/drivers/passthrough/vtd/Makefile 
>> b/xen/drivers/passthrough/vtd/Makefile
>> index f302653..163c7fe 100644
>> --- a/xen/drivers/passthrough/vtd/Makefile
>> +++ b/xen/drivers/passthrough/vtd/Makefile
>> @@ -1,8 +1,9 @@
>>  subdir-$(CONFIG_X86) += x86
>>  
>> -obj-y += iommu.o
>>  obj-y += dmar.o
>> -obj-y += utils.o
>> -obj-y += qinval.o
>>  obj-y += intremap.o
>> +obj-y += iommu.o
>> +obj-y += qinval.o
>>  obj-y += quirks.o
>> +obj-y += utils.o
>> +obj-$(CONFIG_VIOMMU) += vvtd.o
>> diff --git a/xen/drivers/passthrough/vtd/iommu.h 
>> b/xen/drivers/passthrough/vtd/iommu.h
>> index 72c1a2e..55f3b6e 100644
>> --- a/xen/drivers/passthrough/vtd/iommu.h
>> +++ b/xen/drivers/passthrough/vtd/iommu.h
>> @@ -23,31 +23,54 @@
>>  #include <asm/msi.h>
>>  
>>  /*
>> - * Intel IOMMU register specification per version 1.0 public spec.
>> + * Intel IOMMU register specification per version 2.4 public spec.
>>   */
>>  
>> -#define    DMAR_VER_REG    0x0    /* Arch version supported by this IOMMU */
>> -#define    DMAR_CAP_REG    0x8    /* Hardware supported capabilities */
>> -#define    DMAR_ECAP_REG    0x10    /* Extended capabilities supported */
>> -#define    DMAR_GCMD_REG    0x18    /* Global command register */
>> -#define    DMAR_GSTS_REG    0x1c    /* Global status register */
>> -#define    DMAR_RTADDR_REG    0x20    /* Root entry table */
>> -#define    DMAR_CCMD_REG    0x28    /* Context command reg */
>> -#define    DMAR_FSTS_REG    0x34    /* Fault Status register */
>> -#define    DMAR_FECTL_REG    0x38    /* Fault control register */
>> -#define    DMAR_FEDATA_REG    0x3c    /* Fault event interrupt data 
>> register */
>> -#define    DMAR_FEADDR_REG    0x40    /* Fault event interrupt addr 
>> register */
>> -#define    DMAR_FEUADDR_REG 0x44    /* Upper address register */
>> -#define    DMAR_AFLOG_REG    0x58    /* Advanced Fault control */
>> -#define    DMAR_PMEN_REG    0x64    /* Enable Protected Memory Region */
>> -#define    DMAR_PLMBASE_REG 0x68    /* PMRR Low addr */
>> -#define    DMAR_PLMLIMIT_REG 0x6c    /* PMRR low limit */
>> -#define    DMAR_PHMBASE_REG 0x70    /* pmrr high base addr */
>> -#define    DMAR_PHMLIMIT_REG 0x78    /* pmrr high limit */
>> -#define    DMAR_IQH_REG    0x80    /* invalidation queue head */
>> -#define    DMAR_IQT_REG    0x88    /* invalidation queue tail */
>> -#define    DMAR_IQA_REG    0x90    /* invalidation queue addr */
>> -#define    DMAR_IRTA_REG   0xB8    /* intr remap */
>> +#define DMAR_VER_REG            0x0  /* Arch version supported by this 
>> IOMMU */
>> +#define DMAR_CAP_REG            0x8  /* Hardware supported capabilities */
>> +#define DMAR_ECAP_REG           0x10 /* Extended capabilities supported */
>> +#define DMAR_GCMD_REG           0x18 /* Global command register */
>> +#define DMAR_GSTS_REG           0x1c /* Global status register */
>> +#define DMAR_RTADDR_REG         0x20 /* Root entry table */
>> +#define DMAR_CCMD_REG           0x28 /* Context command reg */
>> +#define DMAR_FSTS_REG           0x34 /* Fault Status register */
>> +#define DMAR_FECTL_REG          0x38 /* Fault control register */
>> +#define DMAR_FEDATA_REG         0x3c /* Fault event interrupt data register 
>> */
>> +#define DMAR_FEADDR_REG         0x40 /* Fault event interrupt addr register 
>> */
>> +#define DMAR_FEUADDR_REG        0x44 /* Upper address register */
>> +#define DMAR_AFLOG_REG          0x58 /* Advanced Fault control */
>> +#define DMAR_PMEN_REG           0x64 /* Enable Protected Memory Region */
>> +#define DMAR_PLMBASE_REG        0x68 /* PMRR Low addr */
>> +#define DMAR_PLMLIMIT_REG       0x6c /* PMRR low limit */
>> +#define DMAR_PHMBASE_REG        0x70 /* pmrr high base addr */
>> +#define DMAR_PHMLIMIT_REG       0x78 /* pmrr high limit */
>> +#define DMAR_IQH_REG            0x80 /* invalidation queue head */
>> +#define DMAR_IQT_REG            0x88 /* invalidation queue tail */
>> +#define DMAR_IQT_REG_HI         0x8c
>> +#define DMAR_IQA_REG            0x90 /* invalidation queue addr */
>> +#define DMAR_IQA_REG_HI         0x94
>> +#define DMAR_ICS_REG            0x9c /* Invalidation complete status */
>> +#define DMAR_IECTL_REG          0xa0 /* Invalidation event control */
>> +#define DMAR_IEDATA_REG         0xa4 /* Invalidation event data */
>> +#define DMAR_IEADDR_REG         0xa8 /* Invalidation event address */
>> +#define DMAR_IEUADDR_REG        0xac /* Invalidation event address */
>> +#define DMAR_IRTA_REG           0xb8 /* Interrupt remapping table addr */
>> +#define DMAR_IRTA_REG_HI        0xbc
>> +#define DMAR_PQH_REG            0xc0 /* Page request queue head */
>> +#define DMAR_PQH_REG_HI         0xc4
>> +#define DMAR_PQT_REG            0xc8 /* Page request queue tail*/
>> +#define DMAR_PQT_REG_HI         0xcc
>> +#define DMAR_PQA_REG            0xd0 /* Page request queue address */
>> +#define DMAR_PQA_REG_HI         0xd4
>> +#define DMAR_PRS_REG            0xdc /* Page request status */
>> +#define DMAR_PECTL_REG          0xe0 /* Page request event control */
>> +#define DMAR_PEDATA_REG         0xe4 /* Page request event data */
>> +#define DMAR_PEADDR_REG         0xe8 /* Page request event address */
>> +#define DMAR_PEUADDR_REG        0xec /* Page event upper address */
>> +#define DMAR_MTRRCAP_REG        0x100 /* MTRR capability */
>> +#define DMAR_MTRRCAP_REG_HI     0x104
>> +#define DMAR_MTRRDEF_REG        0x108 /* MTRR default type */
>> +#define DMAR_MTRRDEF_REG_HI     0x10c
>>  
>>  #define OFFSET_STRIDE        (9)
>>  #define dmar_readl(dmar, reg) readl((dmar) + (reg))
>> @@ -58,6 +81,30 @@
>>  #define VER_MAJOR(v)        (((v) & 0xf0) >> 4)
>>  #define VER_MINOR(v)        ((v) & 0x0f)
>>  
>> +/* CAP_REG */
>> +#define DMA_DOMAIN_ID_SHIFT         16  /* 16-bit domain id for 64K domains 
>> */
>> +#define DMA_DOMAIN_ID_MASK          ((1UL << DMA_DOMAIN_ID_SHIFT) - 1)
>> +#define DMA_CAP_ND                  (((DMA_DOMAIN_ID_SHIFT - 4) / 2) & 7ULL)
>> +#define DMA_MGAW                    39  /* Maximum Guest Address Width */
>> +#define DMA_CAP_MGAW                (((DMA_MGAW - 1) & 0x3fULL) << 16)
>> +#define DMA_MAMV                    18ULL
>> +#define DMA_CAP_MAMV                (DMA_MAMV << 48)
>> +#define DMA_CAP_PSI                 (1ULL << 39)
>> +#define DMA_CAP_SLLPS               ((1ULL << 34) | (1ULL << 35))
>> +#define DMA_FRCD_REG_NR             1ULL
>> +#define DMA_CAP_NFR                 ((DMA_FRCD_REG_NR - 1) << 40)
>> +#define DMA_CAP_FRO_OFFSET          0x220ULL
>> +#define DMA_CAP_FRO                 (DMA_CAP_FRO_OFFSET << 20)
>> +
>> +/* Supported Adjusted Guest Address Widths */
>> +#define DMA_CAP_SAGAW_SHIFT         8
>> +#define DMA_CAP_SAGAW_MASK          (0x1fULL << DMA_CAP_SAGAW_SHIFT)
>> + /* 39-bit AGAW, 3-level page-table */
>> +#define DMA_CAP_SAGAW_39bit         (0x2ULL << DMA_CAP_SAGAW_SHIFT)
>> + /* 48-bit AGAW, 4-level page-table */
>> +#define DMA_CAP_SAGAW_48bit         (0x4ULL << DMA_CAP_SAGAW_SHIFT)
>> +#define DMA_CAP_SAGAW               DMA_CAP_SAGAW_39bit
>> +
>>  /*
>>   * Decoding Capability Register
>>   */
>> @@ -89,6 +136,12 @@
>>  #define cap_afl(c)        (((c) >> 3) & 1)
>>  #define cap_ndoms(c)        (1 << (4 + 2 * ((c) & 0x7)))
>>  
>> +/* ECAP_REG */
>> +#define DMA_ECAP_QI                 (1ULL << 1)
>> +#define DMA_ECAP_IR                 (1ULL << 3)
>> +#define DMA_ECAP_EIM                (1ULL << 4)
>> +#define DMA_ECAP_MHMV               (15ULL << 20)
> 
> Wow, what's this chunk above? The description only mentions adding
> functions for the VDT IOMMU implementation, yet there seems to be some
> code movement here. Please split it into a separate patch.
> 

Sure. Will split.

>>  /*
>>   * Extended Capability Register
>>   */
>> diff --git a/xen/drivers/passthrough/vtd/vvtd.c 
>> b/xen/drivers/passthrough/vtd/vvtd.c
>> new file mode 100644
>> index 0000000..353fafe
>> --- /dev/null
>> +++ b/xen/drivers/passthrough/vtd/vvtd.c
>> @@ -0,0 +1,158 @@
>> +/*
>> + * vvtd.c
>> + *
>> + * virtualize VTD for HVM.
>> + *
>> + * Copyright (C) 2017 Chao Gao, Intel Corporation.
>> + *
>> + * This program is free software; you can redistribute it and/or
>> + * modify it under the terms and conditions of the GNU General Public
>> + * License, version 2, as published by the Free Software Foundation.
>> + *
>> + * This program is distributed in the hope that it will be useful,
>> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
>> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
>> + * General Public License for more details.
>> + *
>> + * You should have received a copy of the GNU General Public
>> + * License along with this program; If not, see 
>> <http://www.gnu.org/licenses/>.
>> + */
>> +
>> +#include <xen/domain_page.h>
>> +#include <xen/sched.h>
>> +#include <xen/types.h>
>> +#include <xen/viommu.h>
>> +#include <xen/xmalloc.h>
>> +#include <asm/current.h>
>> +#include <asm/hvm/domain.h>
>> +#include <asm/page.h>
>> +
>> +#include "iommu.h"
>> +
>> +struct hvm_hw_vvtd_regs {
>> +    uint8_t data[1024];
>> +};
>> +
>> +/* Status field of struct vvtd */
>> +#define VIOMMU_STATUS_DEFAULT                   (0)
>> +#define VIOMMU_STATUS_IRQ_REMAPPING_ENABLED     (1 << 0)
>> +#define VIOMMU_STATUS_DMA_REMAPPING_ENABLED     (1 << 1)
>> +
>> +struct vvtd {
>> +    /* VIOMMU_STATUS_XXX */
>> +    int status;
> 
> unsigned int if it's a bitfield.
> 
>> +    /* Address range of remapping hardware register-set */
>> +    uint64_t base_addr;
>> +    uint64_t length;
>> +    /* Point back to the owner domain */
>> +    struct domain *domain;
>> +    struct hvm_hw_vvtd_regs *regs;
>> +    struct page_info *regs_page;
>> +};
>> +
>> +static inline void vvtd_set_reg(struct vvtd *vtd, uint32_t reg,
>> +                                uint32_t value)
>> +{
>> +    *((uint32_t *)(&vtd->regs->data[reg])) = value;
>> +}
>> +
>> +static inline uint32_t vvtd_get_reg(struct vvtd *vtd, uint32_t reg)
>> +{
>> +    return *((uint32_t *)(&vtd->regs->data[reg]));
>> +}
>> +
>> +static inline uint8_t vvtd_get_reg_byte(struct vvtd *vtd, uint32_t reg)
>> +{
>> +    return *((uint8_t *)(&vtd->regs->data[reg]));
> 
> You don't need castings here, data is already an array of
> uint8_t.
> 
>> +}
>> +
>> +#define vvtd_get_reg_quad(vvtd, reg, val) do {  \
>> +    (val) = vvtd_get_reg(vvtd, (reg) + 4 );     \
>> +    (val) = (val) << 32;                        \
>> +    (val) += vvtd_get_reg(vvtd, reg);           \
>> +} while(0)
>> +#define vvtd_set_reg_quad(vvtd, reg, val) do {  \
>> +    vvtd_set_reg(vvtd, reg, (val));             \
>> +    vvtd_set_reg(vvtd, (reg) + 4, (val) >> 32); \
>> +} while(0)
> 
> You seem to need to access hvm_hw_vvtd_regs using different sizes, why
> not do:
> 
> union hvm_hw_vvtd_regs {
>     uint8_t  data8[1024];
>     uint16_t data16[512];
>     uint32_t data32[256];
>     uint64_t data64[128];
> };
> 
> Then the access is much more straightforward and you don't need the
> complicated helpers that you have above.

Yes, that will be simpler.

> 
>> +static void vvtd_reset(struct vvtd *vvtd, uint64_t capability)
>> +{
>> +    uint64_t cap = DMA_CAP_NFR | DMA_CAP_SLLPS | DMA_CAP_FRO |
>> +                   DMA_CAP_MGAW | DMA_CAP_SAGAW | DMA_CAP_ND;
>> +    uint64_t ecap = DMA_ECAP_IR | DMA_ECAP_EIM | DMA_ECAP_QI;
>> +
>> +    vvtd_set_reg(vvtd, DMAR_VER_REG, 0x10UL);
>> +    vvtd_set_reg_quad(vvtd, DMAR_CAP_REG, cap);
>> +    vvtd_set_reg_quad(vvtd, DMAR_ECAP_REG, ecap);
>> +    vvtd_set_reg(vvtd, DMAR_FECTL_REG, 0x80000000UL);
>> +    vvtd_set_reg(vvtd, DMAR_IECTL_REG, 0x80000000UL);
>> +}
>> +
>> +static u64 vvtd_query_caps(struct domain *d)
>> +{
>> +    return VIOMMU_CAP_IRQ_REMAPPING;
>> +}
>> +
>> +static int vvtd_create(struct domain *d, struct viommu *viommu)
>> +{
>> +    struct vvtd *vvtd;
>> +    int ret;
>> +
>> +    if ( !is_hvm_domain(d) || (viommu->length != PAGE_SIZE) ||
>> +        (~vvtd_query_caps(d) & viommu->caps) )
>> +        return -EINVAL;
>> +
>> +    ret = -ENOMEM;
>> +    vvtd = xmalloc_bytes(sizeof(struct vvtd));
>> +    if ( !vvtd )
>> +        return ret;
>> +
>> +    vvtd->regs_page = alloc_domheap_page(d, MEMF_no_owner);
>> +    if ( !vvtd->regs_page )
>> +        goto out1;
>> +
>> +    vvtd->regs = __map_domain_page_global(vvtd->regs_page);
>> +    if ( !vvtd->regs )
>> +        goto out2;
>> +    clear_page(vvtd->regs);
>> +
>> +    vvtd_reset(vvtd, viommu->caps);
>> +    vvtd->base_addr = viommu->base_address;
> 
> Don't you need to perform any checks on the base_address? It needs to
> be page aligned at least.

Yes, it should be check.

-- 
Best regards
Tianyu Lan

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.