On 02/07/19 8:41 PM, Jan Kiszka wrote:
> On 02.07.19 16:36, Pratyush Yadav wrote:
>> From: Nikhil Devshatwar <[email protected]>
>>
>> Right now, jailhouse only supports iommu for x86.
>> Generalize the data structures to support iommus of different types
>>
>> Assumption is that each jailhouse_system can define iommu
>> instances of different types. Extend the jailhouse_iommu
>> to add type info and add a type specific struct
>>
>> Move the AMD specific details in the jailhouse_iommu_amd and Intel
>> specific details in jailhouse_iommu_intel and update the code
>> accordingly.
>> Update the x86 config files which to reflect updated data
>> structure and define the new type field.
>> No code changes, just replace iommu->xyz with iommu->amd.xyz or
>> iommu->intel.xyz
>>
>> Also get rid of the iommu_count_units and implement
>> simple logic to process iommus of the desired type.
>
> This will require more resources, though it may safe some LoC. In any case,
> it should be a separate topic with some more detailed reasoning.
>
>>
>> [[email protected]: Add Intel IOMMU and fix compiler errors for AMD and
>> VT-D]
>>
>> Signed-off-by: Nikhil Devshatwar <[email protected]>
>> Signed-off-by: Lokesh Vutla <[email protected]>
>> Signed-off-by: Pratyush Yadav <[email protected]>
>> ---
>> configs/x86/f2a88xm-hd3.c | 13 ++++---
>> configs/x86/qemu-x86.c | 5 ++-
>> hypervisor/arch/x86/amd_iommu.c | 52 +++++++++++++------------
>> hypervisor/arch/x86/include/asm/iommu.h | 2 -
>> hypervisor/arch/x86/iommu.c | 10 -----
>> hypervisor/arch/x86/vtd.c | 17 ++++----
>> include/jailhouse/cell-config.h | 28 ++++++++++---
>> 7 files changed, 70 insertions(+), 57 deletions(-)
>
> Looks like this does not update the config generator and the related config
> template, see tools/root-cell-config.c.tmpl and pyjailhouse/.
Ok, will do.
>>
>> diff --git a/configs/x86/f2a88xm-hd3.c b/configs/x86/f2a88xm-hd3.c
>> index 315d0e29..026f974a 100644
>> --- a/configs/x86/f2a88xm-hd3.c
>> +++ b/configs/x86/f2a88xm-hd3.c
>> @@ -50,12 +50,13 @@ struct {
>> .pm_timer_address = 0x808,
>> .iommu_units = {
>> {
>> - .base = 0xfeb80000,
>> - .size = 0x80000,
>> - .amd_bdf = 0x02,
>> - .amd_base_cap = 0x40,
>> - .amd_msi_cap = 0x54,
>> - .amd_features = 0x80048824,
>> + .type = JAILHOUSE_IOMMU_AMD,
>> + .amd.base = 0xfeb80000,
>> + .amd.size = 0x80000,
>> + .amd.bdf = 0x02,
>> + .amd.base_cap = 0x40,
>> + .amd.msi_cap = 0x54,
>> + .amd.features = 0x80048824,
>> },
>> },
>> },
>> diff --git a/configs/x86/qemu-x86.c b/configs/x86/qemu-x86.c
>> index fdfa8915..549deed9 100644
>> --- a/configs/x86/qemu-x86.c
>> +++ b/configs/x86/qemu-x86.c
>> @@ -50,8 +50,9 @@ struct {
>> .vtd_interrupt_limit = 256,
>> .iommu_units = {
>> {
>> - .base = 0xfed90000,
>> - .size = 0x1000,
>> + .type = JAILHOUSE_IOMMU_INTEL,
>> + .intel.base = 0xfed90000,
>> + .intel.size = 0x1000,
>> },
>> },
>> },
>> diff --git a/hypervisor/arch/x86/amd_iommu.c
>> b/hypervisor/arch/x86/amd_iommu.c
>> index 02712571..999590cd 100644
>> --- a/hypervisor/arch/x86/amd_iommu.c
>> +++ b/hypervisor/arch/x86/amd_iommu.c
>> @@ -448,14 +448,14 @@ static void amd_iommu_init_fault_nmi(void)
>> &system_config->platform_info.x86.iommu_units[iommu->idx];
>> /* Disable MSI during interrupt reprogramming. */
>> - pci_write_config(cfg->amd_bdf, cfg->amd_msi_cap + 2 , 0, 2);
>> + pci_write_config(cfg->amd.bdf, cfg->amd.msi_cap + 2 , 0, 2);
>
> A chance to get rid of the stray blank "...cap + 2, 0, 2);"
Done.
>> /*
>> * Write new MSI capability block, re-enabling interrupts with
>> * the last word.
>> */
>> for (n = 3; n >= 0; n--)
>> - pci_write_config(cfg->amd_bdf, cfg->amd_msi_cap + 4 * n,
>> + pci_write_config(cfg->amd.bdf, cfg->amd.msi_cap + 4 * n,
>> msi_reg.raw[n], 4);
>> }
>> @@ -633,37 +633,37 @@ static int amd_iommu_init_pci(struct amd_iommu
>> *entry,
>> u64 caps_header, hi, lo;
>> /* Check alignment */
>> - if (iommu->size & (iommu->size - 1))
>> + if (iommu->amd.size & (iommu->amd.size - 1))
>> return trace_error(-EINVAL);
>> /* Check that EFR is supported */
>> - caps_header = pci_read_config(iommu->amd_bdf, iommu->amd_base_cap, 4);
>> + caps_header = pci_read_config(iommu->amd.bdf, iommu->amd.base_cap, 4);
>> if (!(caps_header & CAPS_IOMMU_EFR_SUP))
>> return trace_error(-EIO);
>> - lo = pci_read_config(iommu->amd_bdf,
>> - iommu->amd_base_cap + CAPS_IOMMU_BASE_LOW_REG, 4);
>> - hi = pci_read_config(iommu->amd_bdf,
>> - iommu->amd_base_cap + CAPS_IOMMU_BASE_HI_REG, 4);
>> + lo = pci_read_config(iommu->amd.bdf,
>> + iommu->amd.base_cap + CAPS_IOMMU_BASE_LOW_REG, 4);
>> + hi = pci_read_config(iommu->amd.bdf,
>> + iommu->amd.base_cap + CAPS_IOMMU_BASE_HI_REG, 4);
>> if (lo & CAPS_IOMMU_ENABLE &&
>> - ((hi << 32) | lo) != (iommu->base | CAPS_IOMMU_ENABLE)) {
>> + ((hi << 32) | lo) != (iommu->amd.base | CAPS_IOMMU_ENABLE)) {
>> printk("FATAL: IOMMU %d config is locked in invalid state.\n",
>> entry->idx);
>> return trace_error(-EPERM);
>> }
>> /* Should be configured by BIOS, but we want to be sure */
>> - pci_write_config(iommu->amd_bdf,
>> - iommu->amd_base_cap + CAPS_IOMMU_BASE_HI_REG,
>> - (u32)(iommu->base >> 32), 4);
>> - pci_write_config(iommu->amd_bdf,
>> - iommu->amd_base_cap + CAPS_IOMMU_BASE_LOW_REG,
>> - (u32)(iommu->base & 0xffffffff) | CAPS_IOMMU_ENABLE,
>> + pci_write_config(iommu->amd.bdf,
>> + iommu->amd.base_cap + CAPS_IOMMU_BASE_HI_REG,
>> + (u32)(iommu->amd.base >> 32), 4);
>> + pci_write_config(iommu->amd.bdf,
>> + iommu->amd.base_cap + CAPS_IOMMU_BASE_LOW_REG,
>> + (u32)(iommu->amd.base & 0xffffffff) | CAPS_IOMMU_ENABLE,
>> 4);
>> /* Allocate and map MMIO space */
>> - entry->mmio_base = paging_map_device(iommu->base, iommu->size);
>> + entry->mmio_base = paging_map_device(iommu->amd.base, iommu->amd.size);
>> if (!entry->mmio_base)
>> return -ENOMEM;
>> @@ -687,9 +687,9 @@ static int amd_iommu_init_features(struct amd_iommu
>> *entry,
>> return trace_error(-EIO);
>> /* Figure out if hardware events are supported. */
>> - if (iommu->amd_features)
>> + if (iommu->amd.features)
>> entry->he_supported =
>> - iommu->amd_features & ACPI_REPORTING_HE_SUP;
>> + iommu->amd.features & ACPI_REPORTING_HE_SUP;
>> else
>> entry->he_supported = efr & AMD_EXT_FEAT_HE_SUP;
>> @@ -777,20 +777,24 @@ static int amd_iommu_init(void)
>> {
>> struct jailhouse_iommu *iommu;
>> struct amd_iommu *entry;
>> - unsigned int n;
>> + unsigned int i;
>
> Why? "i" like "integer" i.e. signed. "n" because it's unsigned.
>
>> int err;
>> - iommu = &system_config->platform_info.x86.iommu_units[0];
>> - for (n = 0; iommu->base && n < iommu_count_units(); iommu++, n++) {
>> + for (i = 0; i < JAILHOUSE_MAX_IOMMU_UNITS; i++) {
>> +
>> + iommu = &system_config->platform_info.x86.iommu_units[i];
>> + if (iommu->type != JAILHOUSE_IOMMU_AMD)
>> + continue;
>
> return trace_error(-EINVAL);
Can you not mix two types of IOMMUs on x86? What if a system has both Intel and
AMD IOMMUs?
>> +
>> entry = &iommu_units[iommu_units_count];
>> - entry->idx = n;
>> + entry->idx = i;
>> /* Protect against accidental VT-d configs. */
>> - if (!iommu->amd_bdf)
>> + if (!iommu->amd.bdf)
>> return trace_error(-EINVAL);
>
> Can be removed when you have the type check above.
Will do.
>> - printk("AMD IOMMU @0x%llx/0x%x\n", iommu->base, iommu->size);
>> + printk("AMD IOMMU @0x%llx/0x%x\n", iommu->amd.base,
>> iommu->amd.size);
>> /* Initialize PCI registers and MMIO space */
>> err = amd_iommu_init_pci(entry, iommu);
>> diff --git a/hypervisor/arch/x86/include/asm/iommu.h
>> b/hypervisor/arch/x86/include/asm/iommu.h
>> index 848feb77..92051673 100644
>> --- a/hypervisor/arch/x86/include/asm/iommu.h
>> +++ b/hypervisor/arch/x86/include/asm/iommu.h
>> @@ -23,8 +23,6 @@
>> extern unsigned int fault_reporting_cpu_id;
>> -unsigned int iommu_count_units(void);
>> -
>> int iommu_map_memory_region(struct cell *cell,
>> const struct jailhouse_memory *mem);
>> int iommu_unmap_memory_region(struct cell *cell,
>> diff --git a/hypervisor/arch/x86/iommu.c b/hypervisor/arch/x86/iommu.c
>> index 68ca323f..aeaf21e5 100644
>> --- a/hypervisor/arch/x86/iommu.c
>> +++ b/hypervisor/arch/x86/iommu.c
>> @@ -15,16 +15,6 @@
>> unsigned int fault_reporting_cpu_id;
>> -unsigned int iommu_count_units(void)
>> -{
>> - unsigned int units = 0;
>> -
>> - while (units < JAILHOUSE_MAX_IOMMU_UNITS &&
>> - system_config->platform_info.x86.iommu_units[units].base)
>> - units++;
>> - return units;
>> -}
>> -
>> struct public_per_cpu *iommu_select_fault_reporting_cpu(void)
>> {
>> struct public_per_cpu *target_data;
>> diff --git a/hypervisor/arch/x86/vtd.c b/hypervisor/arch/x86/vtd.c
>> index a43632f5..1e817b36 100644
>> --- a/hypervisor/arch/x86/vtd.c
>> +++ b/hypervisor/arch/x86/vtd.c
>> @@ -207,7 +207,7 @@ static bool dmar_units_initialized;
>> static unsigned int vtd_mmio_count_regions(struct cell *cell)
>> {
>> - return cell == &root_cell ? iommu_count_units() : 0;
>> + return cell == &root_cell ? JAILHOUSE_MAX_IOMMU_UNITS : 0;
>
> Probably fine, at least as long as JAILHOUSE_MAX_IOMMU_UNITS is just 8.
>
>> }
>> static unsigned int inv_queue_write(void *inv_queue, unsigned int index,
>> @@ -959,7 +959,7 @@ static int vtd_init_ir_emulation(unsigned int unit_no,
>> void *reg_base)
>> root_cell.arch.vtd.ir_emulation = true;
>> - base = system_config->platform_info.x86.iommu_units[unit_no].base;
>> + base = system_config->platform_info.x86.iommu_units[unit_no].intel.base;
>> mmio_region_register(&root_cell, base, PAGE_SIZE,
>> vtd_unit_access_handler, unit);
>> @@ -1008,9 +1008,7 @@ static int vtd_init(void)
>> int_remap_table_size_log2 = n;
>> - units = iommu_count_units();
>> - if (units == 0)
>> - return trace_error(-EINVAL);
>
> Where does this check go? Well, it will probably be better placed in an
> offline "jailhouse config check" script... OK, fine with me.
>
>> + units = JAILHOUSE_MAX_IOMMU_UNITS;
>
> This is wrong now: This is not just an upper limit, we also set dmar_units to
> this. You will have to update the code accordingly. And I don't think we need
> "units" anymore then.
>
>> dmar_reg_base = page_alloc(&remap_pool, units *
>> PAGES(DMAR_MMIO_SIZE));
>> if (!dmar_reg_base)
>> @@ -1022,11 +1020,13 @@ static int vtd_init(void)
>> for (n = 0; n < units; n++) {
>> unit = &system_config->platform_info.x86.iommu_units[n];
>> + if (unit->type != JAILHOUSE_IOMMU_INTEL)
>> + continue;
>
> That would actually be a bug, and we should fail, analogously to AMD
>
>> reg_base = dmar_reg_base + n * DMAR_MMIO_SIZE;
>> - err = paging_create(&hv_paging_structs, unit->base, unit->size,
>> - (unsigned long)reg_base,
>> + err = paging_create(&hv_paging_structs, unit->intel.base,
>> + unit->intel.size, (unsigned long)reg_base,
>> PAGE_DEFAULT_FLAGS | PAGE_FLAG_DEVICE,
>> PAGING_NON_COHERENT);
>> if (err)
>> @@ -1036,7 +1036,8 @@ static int vtd_init(void)
>> if (version < VTD_VER_MIN || version == 0xff)
>> return trace_error(-EIO);
>> - printk("DMAR unit @0x%llx/0x%x\n", unit->base, unit->size);
>> + printk("DMAR unit @0x%llx/0x%x\n", unit->intel.base,
>> + unit->intel.size);
>> caps = mmio_read64(reg_base + VTD_CAP_REG);
>> if (caps & VTD_CAP_SAGAW39)
>> diff --git a/include/jailhouse/cell-config.h
>> b/include/jailhouse/cell-config.h
>> index 5739f332..f492e409 100644
>> --- a/include/jailhouse/cell-config.h
>> +++ b/include/jailhouse/cell-config.h
>> @@ -196,13 +196,31 @@ struct jailhouse_pci_capability {
>> #define JAILHOUSE_MAX_IOMMU_UNITS 8
>> -struct jailhouse_iommu {
>> +enum jailhouse_iommu_type {
>> + JAILHOUSE_IOMMU_AMD,
>> + JAILHOUSE_IOMMU_INTEL,
>> +};
>> +
>> +struct jailhouse_iommu_amd {
>> + __u64 base;
>> + __u32 size;
>
> Look like base and size remain common fields, for all IOMMU types. Why making
> them specific then?
No specific reason. I'll make them common.
>> + __u16 bdf;
>> + __u8 base_cap;
>> + __u8 msi_cap;
>> + __u32 features;
>> +};
>> +
>> +struct jailhouse_iommu_intel {
>> __u64 base;
>> __u32 size;
>> - __u16 amd_bdf;
>> - __u8 amd_base_cap;
>> - __u8 amd_msi_cap;
>> - __u32 amd_features;
>> +};
>> +
>> +struct jailhouse_iommu {
>> + __u32 type;
>> + union {
>> + struct jailhouse_iommu_amd amd;
>> + struct jailhouse_iommu_intel intel;
>> + };
>> } __attribute__((packed));
>> #define JAILHOUSE_SYSTEM_SIGNATURE "JHSYST"
>>
>
> Jan
>
--
Regards,
Pratyush Yadav
--
You received this message because you are subscribed to the Google Groups
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/jailhouse-dev/c86f10aa-db0a-e133-ef0c-f5710f437bde%40ti.com.
For more options, visit https://groups.google.com/d/optout.