[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH V2 11/25] x86/hvm: Introduce a emulated VTD for HVM
On 2017年08月23日 15:58, Roger Pau Monné wrote: > On Wed, Aug 09, 2017 at 04:34:12PM -0400, Lan Tianyu wrote: >> From: Chao Gao <chao.gao@xxxxxxxxx> >> >> This patch adds create/destroy/query function for the emulated VTD >> and adapts it to the common VIOMMU abstraction. >> >> Signed-off-by: Chao Gao <chao.gao@xxxxxxxxx> >> Signed-off-by: Lan Tianyu <tianyu.lan@xxxxxxxxx> >> --- >> xen/drivers/passthrough/vtd/Makefile | 7 +- >> xen/drivers/passthrough/vtd/iommu.h | 99 +++++++++++++++++----- >> xen/drivers/passthrough/vtd/vvtd.c | 158 >> +++++++++++++++++++++++++++++++++++ >> xen/include/asm-x86/viommu.h | 3 + >> 4 files changed, 241 insertions(+), 26 deletions(-) >> create mode 100644 xen/drivers/passthrough/vtd/vvtd.c >> >> diff --git a/xen/drivers/passthrough/vtd/Makefile >> b/xen/drivers/passthrough/vtd/Makefile >> index f302653..163c7fe 100644 >> --- a/xen/drivers/passthrough/vtd/Makefile >> +++ b/xen/drivers/passthrough/vtd/Makefile >> @@ -1,8 +1,9 @@ >> subdir-$(CONFIG_X86) += x86 >> >> -obj-y += iommu.o >> obj-y += dmar.o >> -obj-y += utils.o >> -obj-y += qinval.o >> obj-y += intremap.o >> +obj-y += iommu.o >> +obj-y += qinval.o >> obj-y += quirks.o >> +obj-y += utils.o >> +obj-$(CONFIG_VIOMMU) += vvtd.o >> diff --git a/xen/drivers/passthrough/vtd/iommu.h >> b/xen/drivers/passthrough/vtd/iommu.h >> index 72c1a2e..55f3b6e 100644 >> --- a/xen/drivers/passthrough/vtd/iommu.h >> +++ b/xen/drivers/passthrough/vtd/iommu.h >> @@ -23,31 +23,54 @@ >> #include <asm/msi.h> >> >> /* >> - * Intel IOMMU register specification per version 1.0 public spec. >> + * Intel IOMMU register specification per version 2.4 public spec. >> */ >> >> -#define DMAR_VER_REG 0x0 /* Arch version supported by this IOMMU */ >> -#define DMAR_CAP_REG 0x8 /* Hardware supported capabilities */ >> -#define DMAR_ECAP_REG 0x10 /* Extended capabilities supported */ >> -#define DMAR_GCMD_REG 0x18 /* Global command register */ >> -#define DMAR_GSTS_REG 0x1c /* Global status register */ >> -#define DMAR_RTADDR_REG 0x20 /* Root entry table */ >> -#define DMAR_CCMD_REG 0x28 /* Context command reg */ >> -#define DMAR_FSTS_REG 0x34 /* Fault Status register */ >> -#define DMAR_FECTL_REG 0x38 /* Fault control register */ >> -#define DMAR_FEDATA_REG 0x3c /* Fault event interrupt data >> register */ >> -#define DMAR_FEADDR_REG 0x40 /* Fault event interrupt addr >> register */ >> -#define DMAR_FEUADDR_REG 0x44 /* Upper address register */ >> -#define DMAR_AFLOG_REG 0x58 /* Advanced Fault control */ >> -#define DMAR_PMEN_REG 0x64 /* Enable Protected Memory Region */ >> -#define DMAR_PLMBASE_REG 0x68 /* PMRR Low addr */ >> -#define DMAR_PLMLIMIT_REG 0x6c /* PMRR low limit */ >> -#define DMAR_PHMBASE_REG 0x70 /* pmrr high base addr */ >> -#define DMAR_PHMLIMIT_REG 0x78 /* pmrr high limit */ >> -#define DMAR_IQH_REG 0x80 /* invalidation queue head */ >> -#define DMAR_IQT_REG 0x88 /* invalidation queue tail */ >> -#define DMAR_IQA_REG 0x90 /* invalidation queue addr */ >> -#define DMAR_IRTA_REG 0xB8 /* intr remap */ >> +#define DMAR_VER_REG 0x0 /* Arch version supported by this >> IOMMU */ >> +#define DMAR_CAP_REG 0x8 /* Hardware supported capabilities */ >> +#define DMAR_ECAP_REG 0x10 /* Extended capabilities supported */ >> +#define DMAR_GCMD_REG 0x18 /* Global command register */ >> +#define DMAR_GSTS_REG 0x1c /* Global status register */ >> +#define DMAR_RTADDR_REG 0x20 /* Root entry table */ >> +#define DMAR_CCMD_REG 0x28 /* Context command reg */ >> +#define DMAR_FSTS_REG 0x34 /* Fault Status register */ >> +#define DMAR_FECTL_REG 0x38 /* Fault control register */ >> +#define DMAR_FEDATA_REG 0x3c /* Fault event interrupt data register >> */ >> +#define DMAR_FEADDR_REG 0x40 /* Fault event interrupt addr register >> */ >> +#define DMAR_FEUADDR_REG 0x44 /* Upper address register */ >> +#define DMAR_AFLOG_REG 0x58 /* Advanced Fault control */ >> +#define DMAR_PMEN_REG 0x64 /* Enable Protected Memory Region */ >> +#define DMAR_PLMBASE_REG 0x68 /* PMRR Low addr */ >> +#define DMAR_PLMLIMIT_REG 0x6c /* PMRR low limit */ >> +#define DMAR_PHMBASE_REG 0x70 /* pmrr high base addr */ >> +#define DMAR_PHMLIMIT_REG 0x78 /* pmrr high limit */ >> +#define DMAR_IQH_REG 0x80 /* invalidation queue head */ >> +#define DMAR_IQT_REG 0x88 /* invalidation queue tail */ >> +#define DMAR_IQT_REG_HI 0x8c >> +#define DMAR_IQA_REG 0x90 /* invalidation queue addr */ >> +#define DMAR_IQA_REG_HI 0x94 >> +#define DMAR_ICS_REG 0x9c /* Invalidation complete status */ >> +#define DMAR_IECTL_REG 0xa0 /* Invalidation event control */ >> +#define DMAR_IEDATA_REG 0xa4 /* Invalidation event data */ >> +#define DMAR_IEADDR_REG 0xa8 /* Invalidation event address */ >> +#define DMAR_IEUADDR_REG 0xac /* Invalidation event address */ >> +#define DMAR_IRTA_REG 0xb8 /* Interrupt remapping table addr */ >> +#define DMAR_IRTA_REG_HI 0xbc >> +#define DMAR_PQH_REG 0xc0 /* Page request queue head */ >> +#define DMAR_PQH_REG_HI 0xc4 >> +#define DMAR_PQT_REG 0xc8 /* Page request queue tail*/ >> +#define DMAR_PQT_REG_HI 0xcc >> +#define DMAR_PQA_REG 0xd0 /* Page request queue address */ >> +#define DMAR_PQA_REG_HI 0xd4 >> +#define DMAR_PRS_REG 0xdc /* Page request status */ >> +#define DMAR_PECTL_REG 0xe0 /* Page request event control */ >> +#define DMAR_PEDATA_REG 0xe4 /* Page request event data */ >> +#define DMAR_PEADDR_REG 0xe8 /* Page request event address */ >> +#define DMAR_PEUADDR_REG 0xec /* Page event upper address */ >> +#define DMAR_MTRRCAP_REG 0x100 /* MTRR capability */ >> +#define DMAR_MTRRCAP_REG_HI 0x104 >> +#define DMAR_MTRRDEF_REG 0x108 /* MTRR default type */ >> +#define DMAR_MTRRDEF_REG_HI 0x10c >> >> #define OFFSET_STRIDE (9) >> #define dmar_readl(dmar, reg) readl((dmar) + (reg)) >> @@ -58,6 +81,30 @@ >> #define VER_MAJOR(v) (((v) & 0xf0) >> 4) >> #define VER_MINOR(v) ((v) & 0x0f) >> >> +/* CAP_REG */ >> +#define DMA_DOMAIN_ID_SHIFT 16 /* 16-bit domain id for 64K domains >> */ >> +#define DMA_DOMAIN_ID_MASK ((1UL << DMA_DOMAIN_ID_SHIFT) - 1) >> +#define DMA_CAP_ND (((DMA_DOMAIN_ID_SHIFT - 4) / 2) & 7ULL) >> +#define DMA_MGAW 39 /* Maximum Guest Address Width */ >> +#define DMA_CAP_MGAW (((DMA_MGAW - 1) & 0x3fULL) << 16) >> +#define DMA_MAMV 18ULL >> +#define DMA_CAP_MAMV (DMA_MAMV << 48) >> +#define DMA_CAP_PSI (1ULL << 39) >> +#define DMA_CAP_SLLPS ((1ULL << 34) | (1ULL << 35)) >> +#define DMA_FRCD_REG_NR 1ULL >> +#define DMA_CAP_NFR ((DMA_FRCD_REG_NR - 1) << 40) >> +#define DMA_CAP_FRO_OFFSET 0x220ULL >> +#define DMA_CAP_FRO (DMA_CAP_FRO_OFFSET << 20) >> + >> +/* Supported Adjusted Guest Address Widths */ >> +#define DMA_CAP_SAGAW_SHIFT 8 >> +#define DMA_CAP_SAGAW_MASK (0x1fULL << DMA_CAP_SAGAW_SHIFT) >> + /* 39-bit AGAW, 3-level page-table */ >> +#define DMA_CAP_SAGAW_39bit (0x2ULL << DMA_CAP_SAGAW_SHIFT) >> + /* 48-bit AGAW, 4-level page-table */ >> +#define DMA_CAP_SAGAW_48bit (0x4ULL << DMA_CAP_SAGAW_SHIFT) >> +#define DMA_CAP_SAGAW DMA_CAP_SAGAW_39bit >> + >> /* >> * Decoding Capability Register >> */ >> @@ -89,6 +136,12 @@ >> #define cap_afl(c) (((c) >> 3) & 1) >> #define cap_ndoms(c) (1 << (4 + 2 * ((c) & 0x7))) >> >> +/* ECAP_REG */ >> +#define DMA_ECAP_QI (1ULL << 1) >> +#define DMA_ECAP_IR (1ULL << 3) >> +#define DMA_ECAP_EIM (1ULL << 4) >> +#define DMA_ECAP_MHMV (15ULL << 20) > > Wow, what's this chunk above? The description only mentions adding > functions for the VDT IOMMU implementation, yet there seems to be some > code movement here. Please split it into a separate patch. > Sure. Will split. >> /* >> * Extended Capability Register >> */ >> diff --git a/xen/drivers/passthrough/vtd/vvtd.c >> b/xen/drivers/passthrough/vtd/vvtd.c >> new file mode 100644 >> index 0000000..353fafe >> --- /dev/null >> +++ b/xen/drivers/passthrough/vtd/vvtd.c >> @@ -0,0 +1,158 @@ >> +/* >> + * vvtd.c >> + * >> + * virtualize VTD for HVM. >> + * >> + * Copyright (C) 2017 Chao Gao, Intel Corporation. >> + * >> + * This program is free software; you can redistribute it and/or >> + * modify it under the terms and conditions of the GNU General Public >> + * License, version 2, as published by the Free Software Foundation. >> + * >> + * This program is distributed in the hope that it will be useful, >> + * but WITHOUT ANY WARRANTY; without even the implied warranty of >> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU >> + * General Public License for more details. >> + * >> + * You should have received a copy of the GNU General Public >> + * License along with this program; If not, see >> <http://www.gnu.org/licenses/>. >> + */ >> + >> +#include <xen/domain_page.h> >> +#include <xen/sched.h> >> +#include <xen/types.h> >> +#include <xen/viommu.h> >> +#include <xen/xmalloc.h> >> +#include <asm/current.h> >> +#include <asm/hvm/domain.h> >> +#include <asm/page.h> >> + >> +#include "iommu.h" >> + >> +struct hvm_hw_vvtd_regs { >> + uint8_t data[1024]; >> +}; >> + >> +/* Status field of struct vvtd */ >> +#define VIOMMU_STATUS_DEFAULT (0) >> +#define VIOMMU_STATUS_IRQ_REMAPPING_ENABLED (1 << 0) >> +#define VIOMMU_STATUS_DMA_REMAPPING_ENABLED (1 << 1) >> + >> +struct vvtd { >> + /* VIOMMU_STATUS_XXX */ >> + int status; > > unsigned int if it's a bitfield. > >> + /* Address range of remapping hardware register-set */ >> + uint64_t base_addr; >> + uint64_t length; >> + /* Point back to the owner domain */ >> + struct domain *domain; >> + struct hvm_hw_vvtd_regs *regs; >> + struct page_info *regs_page; >> +}; >> + >> +static inline void vvtd_set_reg(struct vvtd *vtd, uint32_t reg, >> + uint32_t value) >> +{ >> + *((uint32_t *)(&vtd->regs->data[reg])) = value; >> +} >> + >> +static inline uint32_t vvtd_get_reg(struct vvtd *vtd, uint32_t reg) >> +{ >> + return *((uint32_t *)(&vtd->regs->data[reg])); >> +} >> + >> +static inline uint8_t vvtd_get_reg_byte(struct vvtd *vtd, uint32_t reg) >> +{ >> + return *((uint8_t *)(&vtd->regs->data[reg])); > > You don't need castings here, data is already an array of > uint8_t. > >> +} >> + >> +#define vvtd_get_reg_quad(vvtd, reg, val) do { \ >> + (val) = vvtd_get_reg(vvtd, (reg) + 4 ); \ >> + (val) = (val) << 32; \ >> + (val) += vvtd_get_reg(vvtd, reg); \ >> +} while(0) >> +#define vvtd_set_reg_quad(vvtd, reg, val) do { \ >> + vvtd_set_reg(vvtd, reg, (val)); \ >> + vvtd_set_reg(vvtd, (reg) + 4, (val) >> 32); \ >> +} while(0) > > You seem to need to access hvm_hw_vvtd_regs using different sizes, why > not do: > > union hvm_hw_vvtd_regs { > uint8_t data8[1024]; > uint16_t data16[512]; > uint32_t data32[256]; > uint64_t data64[128]; > }; > > Then the access is much more straightforward and you don't need the > complicated helpers that you have above. Yes, that will be simpler. > >> +static void vvtd_reset(struct vvtd *vvtd, uint64_t capability) >> +{ >> + uint64_t cap = DMA_CAP_NFR | DMA_CAP_SLLPS | DMA_CAP_FRO | >> + DMA_CAP_MGAW | DMA_CAP_SAGAW | DMA_CAP_ND; >> + uint64_t ecap = DMA_ECAP_IR | DMA_ECAP_EIM | DMA_ECAP_QI; >> + >> + vvtd_set_reg(vvtd, DMAR_VER_REG, 0x10UL); >> + vvtd_set_reg_quad(vvtd, DMAR_CAP_REG, cap); >> + vvtd_set_reg_quad(vvtd, DMAR_ECAP_REG, ecap); >> + vvtd_set_reg(vvtd, DMAR_FECTL_REG, 0x80000000UL); >> + vvtd_set_reg(vvtd, DMAR_IECTL_REG, 0x80000000UL); >> +} >> + >> +static u64 vvtd_query_caps(struct domain *d) >> +{ >> + return VIOMMU_CAP_IRQ_REMAPPING; >> +} >> + >> +static int vvtd_create(struct domain *d, struct viommu *viommu) >> +{ >> + struct vvtd *vvtd; >> + int ret; >> + >> + if ( !is_hvm_domain(d) || (viommu->length != PAGE_SIZE) || >> + (~vvtd_query_caps(d) & viommu->caps) ) >> + return -EINVAL; >> + >> + ret = -ENOMEM; >> + vvtd = xmalloc_bytes(sizeof(struct vvtd)); >> + if ( !vvtd ) >> + return ret; >> + >> + vvtd->regs_page = alloc_domheap_page(d, MEMF_no_owner); >> + if ( !vvtd->regs_page ) >> + goto out1; >> + >> + vvtd->regs = __map_domain_page_global(vvtd->regs_page); >> + if ( !vvtd->regs ) >> + goto out2; >> + clear_page(vvtd->regs); >> + >> + vvtd_reset(vvtd, viommu->caps); >> + vvtd->base_addr = viommu->base_address; > > Don't you need to perform any checks on the base_address? It needs to > be page aligned at least. Yes, it should be check. -- Best regards Tianyu Lan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |