Re: [Qemu-devel] [RFC v4 00/27] vSMMUv3/pSMMUv3 2 stage VFIO integration
On Thu, Jul 11, 2019 at 1:55 PM Auger Eric wrote: > > Hi Zhangfei, > > On 7/11/19 3:53 AM, Zhangfei Gao wrote: > > On Mon, May 27, 2019 at 7:44 PM Eric Auger wrote: > >> > >> Up to now vSMMUv3 has not been integrated with VFIO. VFIO > >> integration requires to program the physical IOMMU consistently > >> with the guest mappings. However, as opposed to VTD, SMMUv3 has > >> no "Caching Mode" which allows easy trapping of guest mappings. > >> This means the vSMMUV3 cannot use the same VFIO integration as VTD. > >> > >> However SMMUv3 has 2 translation stages. This was devised with > >> virtualization use case in mind where stage 1 is "owned" by the > >> guest whereas the host uses stage 2 for VM isolation. > >> > >> This series sets up this nested translation stage. It only works > >> if there is one physical SMMUv3 used along with QEMU vSMMUv3 (in > >> other words, it does not work if there is a physical SMMUv2). > >> > >> The series uses a new kernel user API [1], still under definition. > >> > >> - We force the host to use stage 2 instead of stage 1, when we > >> detect a vSMMUV3 is behind a VFIO device. For a VFIO device > >> without any virtual IOMMU, we still use stage 1 as many existing > >> SMMUs expect this behavior. > >> - We introduce new IOTLB "config" notifiers, requested to notify > >> changes in the config of a given iommu memory region. So now > >> we have notifiers for IOTLB changes and config changes. > >> - vSMMUv3 calls config notifiers when STE (Stream Table Entries) > >> are updated by the guest. > >> - We implement a specific UNMAP notifier that conveys guest > >> IOTLB invalidations to the host > >> - We implement a new MAP notifiers only used for MSI IOVAs so > >> that the host can build a nested stage translation for MSI IOVAs > >> - As the legacy MAP notifier is not called anymore, we must make > >> sure stage 2 mappings are set. This is achieved through another > >> memory listener. > >> - Physical SMMUs faults are reported to the guest via en eventfd > >> mechanism and reinjected into this latter. > >> > >> Note: The first patch is a code cleanup and was sent separately. > >> > >> Best Regards > >> > >> Eric > >> > >> This series can be found at: > >> https://github.com/eauger/qemu/tree/v4.0.0-2stage-rfcv4 > >> > >> Compatible with kernel series: > >> [PATCH v8 00/29] SMMUv3 Nested Stage Setup > >> (https://lkml.org/lkml/2019/5/26/95) > >> > > > > Have tested vfio mode in qemu on arm64 platform. > > > > Tested-by: Zhangfei Gao > > qemu: https://github.com/eauger/qemu/tree/v4.0.0-2stage-rfcv4 > > kernel: https://github.com/eauger/linux/tree/v5.2-rc1-2stage-v8 > > Your testing is really appreciated. > > Both kernel and QEMU series will be respinned. I am currently waiting > for 5.3 kernel window as it will resolve some dependencies on the fault > reporting APIs. My focus is to get the updated kernel series reviewed > and tested and then refine the QEMU integration accordingly. > Thanks Eric, that's great Since I found kernel part (drivers/iommu/arm-smmu-v3.c) will be conflicting with Jean's sva patch. Especially this one: iommu/smmuv3: Dynamically allocate s1_cfg and s2_cfg Thanks
Re: [Qemu-devel] [RFC v4 00/27] vSMMUv3/pSMMUv3 2 stage VFIO integration
Hi Zhangfei, On 7/11/19 3:53 AM, Zhangfei Gao wrote: > On Mon, May 27, 2019 at 7:44 PM Eric Auger wrote: >> >> Up to now vSMMUv3 has not been integrated with VFIO. VFIO >> integration requires to program the physical IOMMU consistently >> with the guest mappings. However, as opposed to VTD, SMMUv3 has >> no "Caching Mode" which allows easy trapping of guest mappings. >> This means the vSMMUV3 cannot use the same VFIO integration as VTD. >> >> However SMMUv3 has 2 translation stages. This was devised with >> virtualization use case in mind where stage 1 is "owned" by the >> guest whereas the host uses stage 2 for VM isolation. >> >> This series sets up this nested translation stage. It only works >> if there is one physical SMMUv3 used along with QEMU vSMMUv3 (in >> other words, it does not work if there is a physical SMMUv2). >> >> The series uses a new kernel user API [1], still under definition. >> >> - We force the host to use stage 2 instead of stage 1, when we >> detect a vSMMUV3 is behind a VFIO device. For a VFIO device >> without any virtual IOMMU, we still use stage 1 as many existing >> SMMUs expect this behavior. >> - We introduce new IOTLB "config" notifiers, requested to notify >> changes in the config of a given iommu memory region. So now >> we have notifiers for IOTLB changes and config changes. >> - vSMMUv3 calls config notifiers when STE (Stream Table Entries) >> are updated by the guest. >> - We implement a specific UNMAP notifier that conveys guest >> IOTLB invalidations to the host >> - We implement a new MAP notifiers only used for MSI IOVAs so >> that the host can build a nested stage translation for MSI IOVAs >> - As the legacy MAP notifier is not called anymore, we must make >> sure stage 2 mappings are set. This is achieved through another >> memory listener. >> - Physical SMMUs faults are reported to the guest via en eventfd >> mechanism and reinjected into this latter. >> >> Note: The first patch is a code cleanup and was sent separately. >> >> Best Regards >> >> Eric >> >> This series can be found at: >> https://github.com/eauger/qemu/tree/v4.0.0-2stage-rfcv4 >> >> Compatible with kernel series: >> [PATCH v8 00/29] SMMUv3 Nested Stage Setup >> (https://lkml.org/lkml/2019/5/26/95) >> > > Have tested vfio mode in qemu on arm64 platform. > > Tested-by: Zhangfei Gao > qemu: https://github.com/eauger/qemu/tree/v4.0.0-2stage-rfcv4 > kernel: https://github.com/eauger/linux/tree/v5.2-rc1-2stage-v8 Your testing is really appreciated. Both kernel and QEMU series will be respinned. I am currently waiting for 5.3 kernel window as it will resolve some dependencies on the fault reporting APIs. My focus is to get the updated kernel series reviewed and tested and then refine the QEMU integration accordingly. Thanks Eric >
Re: [Qemu-devel] [RFC v4 00/27] vSMMUv3/pSMMUv3 2 stage VFIO integration
On Mon, May 27, 2019 at 7:44 PM Eric Auger wrote: > > Up to now vSMMUv3 has not been integrated with VFIO. VFIO > integration requires to program the physical IOMMU consistently > with the guest mappings. However, as opposed to VTD, SMMUv3 has > no "Caching Mode" which allows easy trapping of guest mappings. > This means the vSMMUV3 cannot use the same VFIO integration as VTD. > > However SMMUv3 has 2 translation stages. This was devised with > virtualization use case in mind where stage 1 is "owned" by the > guest whereas the host uses stage 2 for VM isolation. > > This series sets up this nested translation stage. It only works > if there is one physical SMMUv3 used along with QEMU vSMMUv3 (in > other words, it does not work if there is a physical SMMUv2). > > The series uses a new kernel user API [1], still under definition. > > - We force the host to use stage 2 instead of stage 1, when we > detect a vSMMUV3 is behind a VFIO device. For a VFIO device > without any virtual IOMMU, we still use stage 1 as many existing > SMMUs expect this behavior. > - We introduce new IOTLB "config" notifiers, requested to notify > changes in the config of a given iommu memory region. So now > we have notifiers for IOTLB changes and config changes. > - vSMMUv3 calls config notifiers when STE (Stream Table Entries) > are updated by the guest. > - We implement a specific UNMAP notifier that conveys guest > IOTLB invalidations to the host > - We implement a new MAP notifiers only used for MSI IOVAs so > that the host can build a nested stage translation for MSI IOVAs > - As the legacy MAP notifier is not called anymore, we must make > sure stage 2 mappings are set. This is achieved through another > memory listener. > - Physical SMMUs faults are reported to the guest via en eventfd > mechanism and reinjected into this latter. > > Note: The first patch is a code cleanup and was sent separately. > > Best Regards > > Eric > > This series can be found at: > https://github.com/eauger/qemu/tree/v4.0.0-2stage-rfcv4 > > Compatible with kernel series: > [PATCH v8 00/29] SMMUv3 Nested Stage Setup > (https://lkml.org/lkml/2019/5/26/95) > Have tested vfio mode in qemu on arm64 platform. Tested-by: Zhangfei Gao qemu: https://github.com/eauger/qemu/tree/v4.0.0-2stage-rfcv4 kernel: https://github.com/eauger/linux/tree/v5.2-rc1-2stage-v8
Re: [Qemu-devel] [RFC v4 00/27] vSMMUv3/pSMMUv3 2 stage VFIO integration
Patchew URL: https://patchew.org/QEMU/20190527114203.2762-1-eric.au...@redhat.com/ Hi, This series failed build test on s390x host. Please find the details below. === TEST SCRIPT BEGIN === #!/bin/bash # Testing script will be invoked under the git checkout with # HEAD pointing to a commit that has the patches applied on top of "base" # branch set -e CC=$HOME/bin/cc INSTALL=$PWD/install BUILD=$PWD/build mkdir -p $BUILD $INSTALL SRC=$PWD cd $BUILD $SRC/configure --cc=$CC --prefix=$INSTALL make -j4 # XXX: we need reliable clean up # make check -j4 V=1 make install echo echo "=== ENV ===" env echo echo "=== PACKAGES ===" rpm -qa === TEST SCRIPT END === CC ppc-softmmu/hw/display/vga.o CC mips-softmmu/hw/mips/mips_r4k.o /var/tmp/patchew-tester-tmp-oaqfmxu5/src/hw/ppc/spapr_iommu.c: In function ‘spapr_tce_replay’: /var/tmp/patchew-tester-tmp-oaqfmxu5/src/hw/ppc/spapr_iommu.c:161:14: error: ‘IOMMUNotifier’ {aka ‘struct IOMMUNotifier’} has no member named ‘notify’ 161 | n->notify(n, ); | ^~ make[1]: *** [/var/tmp/patchew-tester-tmp-oaqfmxu5/src/rules.mak:69: hw/ppc/spapr_iommu.o] Error 1 The full log is available at http://patchew.org/logs/20190527114203.2762-1-eric.au...@redhat.com/testing.s390x/?type=message. --- Email generated automatically by Patchew [https://patchew.org/]. Please send your feedback to patchew-de...@redhat.com
[Qemu-devel] [RFC v4 00/27] vSMMUv3/pSMMUv3 2 stage VFIO integration
Up to now vSMMUv3 has not been integrated with VFIO. VFIO integration requires to program the physical IOMMU consistently with the guest mappings. However, as opposed to VTD, SMMUv3 has no "Caching Mode" which allows easy trapping of guest mappings. This means the vSMMUV3 cannot use the same VFIO integration as VTD. However SMMUv3 has 2 translation stages. This was devised with virtualization use case in mind where stage 1 is "owned" by the guest whereas the host uses stage 2 for VM isolation. This series sets up this nested translation stage. It only works if there is one physical SMMUv3 used along with QEMU vSMMUv3 (in other words, it does not work if there is a physical SMMUv2). The series uses a new kernel user API [1], still under definition. - We force the host to use stage 2 instead of stage 1, when we detect a vSMMUV3 is behind a VFIO device. For a VFIO device without any virtual IOMMU, we still use stage 1 as many existing SMMUs expect this behavior. - We introduce new IOTLB "config" notifiers, requested to notify changes in the config of a given iommu memory region. So now we have notifiers for IOTLB changes and config changes. - vSMMUv3 calls config notifiers when STE (Stream Table Entries) are updated by the guest. - We implement a specific UNMAP notifier that conveys guest IOTLB invalidations to the host - We implement a new MAP notifiers only used for MSI IOVAs so that the host can build a nested stage translation for MSI IOVAs - As the legacy MAP notifier is not called anymore, we must make sure stage 2 mappings are set. This is achieved through another memory listener. - Physical SMMUs faults are reported to the guest via en eventfd mechanism and reinjected into this latter. Note: The first patch is a code cleanup and was sent separately. Best Regards Eric This series can be found at: https://github.com/eauger/qemu/tree/v4.0.0-2stage-rfcv4 Compatible with kernel series: [PATCH v8 00/29] SMMUv3 Nested Stage Setup (https://lkml.org/lkml/2019/5/26/95) History: v3 -> v4: - adapt to changes in uapi (asid cache invalidation) - check VFIO_PCI_DMA_FAULT_IRQ_INDEX is supported at kernel level before attempting to set signaling for it. - sync on 5.2-rc1 kernel headers + Drew's patch that imports sve_context.h - fix MSI binding for MSI (not MSIX) - fix mingw compilation v2 -> v3: - rework fault handling - MSI binding registration done in vfio-pci. MSI binding tear down called on container cleanup path - leaf parameter propagated v1 -> v2: - Fixed dual assignment (asid now correctly propagated on TLB invalidations) - Integrated fault reporting Andrew Jones (1): update-linux-headers: Add sve_context.h to asm-arm64 Eric Auger (26): vfio/common: Introduce vfio_set_irq_signaling helper update-linux-headers: Import iommu.h header update against 5.2.0-rc1 and IOMMU/VFIO nested stage APIs memory: add IOMMU_ATTR_VFIO_NESTED IOMMU memory region attribute memory: add IOMMU_ATTR_MSI_TRANSLATE IOMMU memory region attribute hw/arm/smmuv3: Advertise VFIO_NESTED and MSI_TRANSLATE attributes hw/vfio/common: Force nested if iommu requires it memory: Prepare for different kinds of IOMMU MR notifiers memory: Add IOMMUConfigNotifier memory: Add arch_id and leaf fields in IOTLBEntry hw/arm/smmuv3: Store the PASID table GPA in the translation config hw/arm/smmuv3: Implement dummy replay hw/arm/smmuv3: Fill the IOTLBEntry arch_id on NH_VA invalidation hw/arm/smmuv3: Fill the IOTLBEntry leaf field on NH_VA invalidation hw/arm/smmuv3: Notify on config changes hw/vfio/common: Introduce vfio_alloc_guest_iommu helper hw/vfio/common: Introduce hostwin_from_range helper hw/vfio/common: Introduce helpers to DMA map/unmap a RAM section hw/vfio/common: Setup nested stage mappings hw/vfio/common: Register a MAP notifier for MSI binding vfio-pci: Expose MSI stage 1 bindings to the host memory: Introduce IOMMU Memory Region inject_faults API hw/arm/smmuv3: Implement fault injection vfio-pci: register handler for iommu fault vfio-pci: Set up fault regions vfio-pci: Implement the DMA fault handler exec.c | 12 +- hw/arm/smmu-common.c| 10 +- hw/arm/smmuv3.c | 198 +-- hw/arm/trace-events | 3 +- hw/i386/amd_iommu.c | 2 +- hw/i386/intel_iommu.c | 25 +- hw/misc/tz-mpc.c| 8 +- hw/ppc/spapr_iommu.c| 2 +- hw/s390x/s390-pci-inst.c| 4 +- hw/vfio/common.c| 572 ++-- hw/vfio/pci.c | 471 -- hw/vfio/pci.h | 4 + hw/vfio/platform.c | 54 ++- hw/vfio/trace-events| 8 +- hw/virtio/vhost.c | 14 +- include/exec/memory.h | 158 +++-- include/hw/arm/smmu-common.h| 1 + include/hw/vfio/vfio-common.h | 10 + linux-headers/linux/iommu.h | 280