From patchwork Thu May 18 05:34:39 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "lan,Tianyu" X-Patchwork-Id: 9733907 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 79A85601BC for ; Thu, 18 May 2017 11:43:06 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 672FF20952 for ; Thu, 18 May 2017 11:43:06 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 5B2BB2621D; Thu, 18 May 2017 11:43:06 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.7 required=2.0 tests=BAYES_00, DATE_IN_PAST_06_12, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 96F8420952 for ; Thu, 18 May 2017 11:43:05 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dBJnF-0004Pe-0u; Thu, 18 May 2017 11:40:33 +0000 Received: from mail6.bemta6.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dBJnD-0004OS-QT for xen-devel@lists.xen.org; Thu, 18 May 2017 11:40:31 +0000 Received: from [193.109.254.147] by server-4.bemta-6.messagelabs.com id AE/0E-02956-F288D195; Thu, 18 May 2017 11:40:31 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrJLMWRWlGSWpSXmKPExsVywNxEW1evQzb SYPJ9eYslHxezODB6HN39mymAMYo1My8pvyKBNWPngjmMBb8iK+ae2srWwHjEoYuRk0NIoEJi YtdxRhBbQoBX4siyGawQtr/EniML2LsYuYBqOhglPh9cCpZgE1CXOLF4IliDiIC0xLXPl8FsZ oF9jBJvnquC2MICWRJ3v7xgA7FZBFQl1jV1sIPYvAKuEqtfn2CCWKAgMeXhe2YQmxMovm3rLR aIg1wkGhf2sk5g5F3AyLCKUb04tagstUjXWC+pKDM9oyQ3MTNH19DATC83tbg4MT01JzGpWC8 5P3cTIzAYGIBgB2PHP6dDjJIcTEqivIcLZCOF+JLyUyozEosz4otKc1KLDzHKcHAoSfDytQPl BItS01Mr0jJzgGEJk5bg4FES4U0BSfMWFyTmFmemQ6ROMepyvFv64T2TEEtefl6qlDivF0iRA EhRRmke3AhYjFxilJUS5mUEOkqIpyC1KDezBFX+FaM4B6OSMG8VyBSezLwSuE2vgI5gAjqi+Y E0yBEliQgpqQZGe7UN6zR4VC5w6l0q3mL4VHeXbf7xxkNZbJdtTFhy5/Tt6FvOs2jW+/iQm3s +TnDde2Vj+cGJHwX9fsy+fMPLpbj2iOH7tC9n5HdFK78/w8Ia2pv8cME9s8Jzu69yWHz86SO4 X3nVnNfJXzcmnL1Z4ve/+Vta8A6Lyg4mDatlRjkzslO6LW6/UmIpzkg01GIuKk4EAHG0atyMA gAA X-Env-Sender: tianyu.lan@intel.com X-Msg-Ref: server-6.tower-27.messagelabs.com!1495107628!103212571!1 X-Originating-IP: [192.55.52.43] X-SpamReason: No, hits=0.8 required=7.0 tests=DATE_IN_PAST_06_12 X-StarScan-Received: X-StarScan-Version: 9.4.12; banners=-,-,- X-VirusChecked: Checked Received: (qmail 47605 invoked from network); 18 May 2017 11:40:30 -0000 Received: from mga05.intel.com (HELO mga05.intel.com) (192.55.52.43) by server-6.tower-27.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 18 May 2017 11:40:30 -0000 Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmsmga105.fm.intel.com with ESMTP; 18 May 2017 04:40:27 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.38,358,1491289200"; d="scan'208";a="970138758" Received: from sky-ws.sh.intel.com (HELO localhost) ([10.239.48.124]) by orsmga003.jf.intel.com with ESMTP; 18 May 2017 04:40:26 -0700 From: Lan Tianyu To: xen-devel@lists.xen.org Date: Thu, 18 May 2017 01:34:39 -0400 Message-Id: <1495085696-10819-10-git-send-email-tianyu.lan@intel.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1495085696-10819-1-git-send-email-tianyu.lan@intel.com> References: <1495085696-10819-1-git-send-email-tianyu.lan@intel.com> Cc: Lan Tianyu , kevin.tian@intel.com, wei.liu2@citrix.com, andrew.cooper3@citrix.com, ian.jackson@eu.citrix.com, jbeulich@suse.com, Chao Gao Subject: [Xen-devel] [RFC PATCH V2 9/26] Tools/libacpi: Add a user configurable parameter to control vIOMMU attributes X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP From: Chao Gao a field, viommu_info, is added to struct libxl_domain_build_info. Several attributes can be specified by guest configuration file for the DMAR table building and vIOMMU creation. In domain creation process, a new logic is added to build ACPI DMAR table in tool stack according VM configuration and to pass though it to hvmloader via xenstore ACPI PT channel. If there are ACPI tables needed to pass through, we joint the tables. Signed-off-by: Chao Gao Signed-off-by: Lan Tianyu --- docs/man/xl.cfg.pod.5.in | 34 +++++++++++++++++- tools/libacpi/build.c | 5 +++ tools/libacpi/libacpi.h | 1 + tools/libxl/libxl_dom.c | 87 +++++++++++++++++++++++++++++++++++++++++++++ tools/libxl/libxl_types.idl | 10 ++++++ tools/xl/xl_parse.c | 64 +++++++++++++++++++++++++++++++++ 6 files changed, 200 insertions(+), 1 deletion(-) diff --git a/docs/man/xl.cfg.pod.5.in b/docs/man/xl.cfg.pod.5.in index 13167ff..dda7748 100644 --- a/docs/man/xl.cfg.pod.5.in +++ b/docs/man/xl.cfg.pod.5.in @@ -1481,7 +1481,39 @@ Do not provide a VM generation ID. See also "Virtual Machine Generation ID" by Microsoft (http://www.microsoft.com/en-us/download/details.aspx?id=30707). -=back +=back + +=item B + +Specifies the viommu which are to be provided to the guest. + +B has the form C where: + +=over 4 + +=item B + +Possible Bs are: + +=over 4 + +=item B + +Currently there is only one valid type: + +(X86 only) "vtd" means providing a emulated intel VT-d to the guest. + +=item B + +Specifies whether the vvtd should support intrrupt remapping +and default 'true'. + +=item B + +Specifies whether the vvtd should support x2apic mode +and default 'true'. + +=back =head3 Guest Virtual Time Controls diff --git a/tools/libacpi/build.c b/tools/libacpi/build.c index d5bedfd..0c3d3db 100644 --- a/tools/libacpi/build.c +++ b/tools/libacpi/build.c @@ -561,6 +561,11 @@ static int new_vm_gid(struct acpi_ctxt *ctxt, return 1; } +uint32_t acpi_get_table_size(struct acpi_header * header) +{ + return header ? header->length : 0; +} + int acpi_build_tables(struct acpi_ctxt *ctxt, struct acpi_config *config) { struct acpi_info *acpi_info; diff --git a/tools/libacpi/libacpi.h b/tools/libacpi/libacpi.h index 6a4e1cf..0a58d6f 100644 --- a/tools/libacpi/libacpi.h +++ b/tools/libacpi/libacpi.h @@ -109,6 +109,7 @@ struct acpi_config { #define DMAR_X2APIC_OPT_OUT 0x2 struct acpi_dmar *construct_dmar(struct acpi_ctxt *ctxt, const struct acpi_config *config); +uint32_t acpi_get_table_size(struct acpi_header * header); int acpi_build_tables(struct acpi_ctxt *ctxt, struct acpi_config *config); #endif /* __LIBACPI_H__ */ diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c index 5d914a5..f8d61c2 100644 --- a/tools/libxl/libxl_dom.c +++ b/tools/libxl/libxl_dom.c @@ -19,11 +19,13 @@ #include "libxl_internal.h" #include "libxl_arch.h" +#include "libacpi/libacpi.h" #include #include #include #include +#include #include "_paths.h" @@ -925,6 +927,43 @@ out: return rc; } +static unsigned long acpi_v2p(struct acpi_ctxt *ctxt, void *v) +{ + return (unsigned long)v; +} + +static void *acpi_mem_alloc(struct acpi_ctxt *ctxt, + uint32_t size, uint32_t align) +{ + return aligned_alloc(align, size); +} + +static void acpi_mem_free(struct acpi_ctxt *ctxt, + void *v, uint32_t size) +{ + /* ACPI builder currently doesn't free memory so this is just a stub */ +} + +static int libxl__acpi_build_dmar(libxl__gc *gc, + struct acpi_config *config, + void **data_r, int *datalen_r) +{ + struct acpi_ctxt ctxt; + void *table; + + ctxt.mem_ops.alloc = acpi_mem_alloc; + ctxt.mem_ops.free = acpi_mem_free; + ctxt.mem_ops.v2p = acpi_v2p; + + table = construct_dmar(&ctxt, config); + if ( !table ) + return ERROR_FAIL; + + *data_r = table; + *datalen_r = acpi_get_table_size((struct acpi_header *)table); + return 0; +} + static int libxl__domain_firmware(libxl__gc *gc, libxl_domain_build_info *info, struct xc_dom_image *dom) @@ -1045,6 +1084,54 @@ static int libxl__domain_firmware(libxl__gc *gc, } } + /* build DMAR table according guest configuration and joint it with other + * apci tables specified by acpi_modules */ + if ((info->u.hvm.viommu.type == VIOMMU_TYPE_INTEL_VTD) && + !libxl_defbool_is_default(info->u.hvm.viommu.intremap) && + info->device_model_version == LIBXL_DEVICE_MODEL_VERSION_QEMU_XEN) { + struct acpi_config config; + + memset(&config, 0, sizeof(config)); + if (libxl_defbool_val(info->u.hvm.viommu.intremap)) { + config.table_flags |= ACPI_HAS_DMAR; + config.dmar_flag = DMAR_INTR_REMAP; + if (!libxl_defbool_is_default(info->u.hvm.viommu.x2apic) + && !libxl_defbool_val(info->u.hvm.viommu.x2apic)) + config.dmar_flag |= DMAR_X2APIC_OPT_OUT; + + config.viommu_base_addr = info->u.hvm.viommu.base_addr; + data = NULL; + e = libxl__acpi_build_dmar(gc, &config, &data, &datalen); + if (e) { + LOGE(ERROR, "failed to build DMAR table"); + rc = ERROR_FAIL; + goto out; + } + + libxl__ptr_add(gc, data); + if (datalen) { + if (!dom->acpi_modules[0].data) { + dom->acpi_modules[0].data = data; + dom->acpi_modules[0].length = (uint32_t)datalen; + } else { + /* joint tables */ + void *newdata; + newdata = malloc(datalen + dom->acpi_modules[0].length); + if (!newdata) { + LOGE(ERROR, "failed to joint DMAR table to acpi modules"); + rc = ERROR_FAIL; + goto out; + } + memcpy(newdata, dom->acpi_modules[0].data, + dom->acpi_modules[0].length); + memcpy(newdata + dom->acpi_modules[0].length, data, datalen); + dom->acpi_modules[0].data = newdata; + dom->acpi_modules[0].length += (uint32_t)datalen; + } + } + } + } + return 0; out: assert(rc != 0); diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl index 2204425..93e9e2c 100644 --- a/tools/libxl/libxl_types.idl +++ b/tools/libxl/libxl_types.idl @@ -450,6 +450,15 @@ libxl_altp2m_mode = Enumeration("altp2m_mode", [ (3, "limited"), ], init_val = "LIBXL_ALTP2M_MODE_DISABLED") +libxl_viommu_info = Struct("viommu_info", [ + ("type", uint64), + ("intremap", libxl_defbool), + ("x2apic", libxl_defbool), + ("cap", uint64), + ("base_addr", uint64), + ("length", uint64), + ]) + libxl_domain_build_info = Struct("domain_build_info",[ ("max_vcpus", integer), ("avail_vcpus", libxl_bitmap), @@ -564,6 +573,7 @@ libxl_domain_build_info = Struct("domain_build_info",[ ("serial_list", libxl_string_list), ("rdm", libxl_rdm_reserve), ("rdm_mem_boundary_memkb", MemKB), + ("viommu", libxl_viommu_info), ])), ("pv", Struct(None, [("kernel", string), ("slack_memkb", MemKB), diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c index 856a304..584d805 100644 --- a/tools/xl/xl_parse.c +++ b/tools/xl/xl_parse.c @@ -18,6 +18,7 @@ #include #include #include +#include #include #include @@ -29,6 +30,9 @@ extern void set_default_nic_values(libxl_device_nic *nic); +#define VIOMMU_BASE_ADDR 0xfed90000UL +#define VIOMMU_REGISTER_LEN 0x1000UL + #define ARRAY_EXTEND_INIT__CORE(array,count,initfn,more) \ ({ \ typeof((count)) array_extend_old_count = (count); \ @@ -803,6 +807,32 @@ int parse_usbdev_config(libxl_device_usbdev *usbdev, char *token) return 0; } +/* Parses viommu data and adds info into viommu + * Returns 1 if the input token does not match one of the keys + * or parsed values are not correct. Successful parse returns 0 */ +static int parse_viommu_config(libxl_viommu_info *viommu, char *token) +{ + char *oparg; + + if (MATCH_OPTION("type", token, oparg)) { + if (!strcmp(oparg, "vtd")) { + viommu->type = VIOMMU_TYPE_INTEL_VTD; + } else { + fprintf(stderr, "Invalid viommu type: %s\n", oparg); + return 1; + } + } else if (MATCH_OPTION("intremap", token, oparg)) { + libxl_defbool_set(&viommu->intremap, !!strtoul(oparg, NULL, 0)); + } else if (MATCH_OPTION("x2apic", token, oparg)) { + libxl_defbool_set(&viommu->x2apic, !!strtoul(oparg, NULL, 0)); + } else { + fprintf(stderr, "Unknown string `%s' in viommu spec\n", token); + return 1; + } + + return 0; +} + void parse_config_data(const char *config_source, const char *config_data, int config_len, @@ -1182,6 +1212,40 @@ void parse_config_data(const char *config_source, if (!xlu_cfg_get_long (config, "rdm_mem_boundary", &l, 0)) b_info->u.hvm.rdm_mem_boundary_memkb = l * 1024; + + if (!xlu_cfg_get_string(config, "viommu", &buf, 0)) { + libxl_viommu_info viommu; + char *p, *str2; + + str2 = strdup(buf); + if (!str2) { + fprintf(stderr, "ERROR: strdup failed\n"); + exit (1); + } + p = strtok(str2, ","); + if (!p) { + fprintf(stderr, "ERROR: invalid viommu_info format\n"); + exit (1); + } + do { + if (*p == ' ') + p++; + if (parse_viommu_config(&viommu, p)) { + fprintf(stderr, "ERROR: invalid viommu setting\n"); + exit (1); + } + } while ((p=strtok(NULL, ",")) != NULL); + free(str2); + b_info->u.hvm.viommu.type = viommu.type; + b_info->u.hvm.viommu.intremap = viommu.intremap; + b_info->u.hvm.viommu.x2apic = viommu.x2apic; + if ( libxl_defbool_val(b_info->u.hvm.viommu.intremap) ) + { + b_info->u.hvm.viommu.cap = VIOMMU_CAP_IRQ_REMAPPING; + b_info->u.hvm.viommu.base_addr = VIOMMU_BASE_ADDR; + b_info->u.hvm.viommu.length = VIOMMU_REGISTER_LEN; + } + } break; case LIBXL_DOMAIN_TYPE_PV: {