From nobody Fri May 17 16:39:06 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1dmarc=pass fromdomain=amd.com) ARC-Seal: i=2; a=rsa-sha256; t=1601323669; cv=pass; d=zohomail.com; s=zohoarc; b=g4seGEIVu9cNDunh5a77dfk/uYZYOR0J89sbm40qXYXRAQj/U9n/MYTUIUw4Y0lByRnbsQ0lyj25nk8pochRloQUbt5clWN2toSt85+6RzpjBGs089Y3tuwhP1Fjh5qtURzxzV42FT00ltwAFGG1fJmIkJ4FiBGRZM0H1QDG7+o= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1601323669; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=+lGCQG8ohaktYqh4DdntmrGbaibr6BlmrS5abSwHzQg=; b=PIow4HqekKYQ91m3X3wSBhEYHrHsPKYbdRp+HD03Sv04Yq4csmsdbOi3dzzVMq1894FzzJG+SkA4RLB5Petgr3pKd6qJShKOJq1nlwoyIvnXdRbe3ZzBTFb1phEskhmSGDwmHHMx0WgfIJTpNXDNHs+LUWAZ7maHuwZIcFoNbSQ= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1dmarc=pass fromdomain=amd.com) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1601323669424805.2221720784462; Mon, 28 Sep 2020 13:07:49 -0700 (PDT) Received: from localhost ([::1]:58912 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1kMzR5-0007iC-Q7 for importer@patchew.org; Mon, 28 Sep 2020 16:07:47 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:36396) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kMzPS-0006Oj-SJ for qemu-devel@nongnu.org; Mon, 28 Sep 2020 16:06:07 -0400 Received: from mail-mw2nam10on2065.outbound.protection.outlook.com ([40.107.94.65]:7990 helo=NAM10-MW2-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kMzPP-0006yf-SS for qemu-devel@nongnu.org; Mon, 28 Sep 2020 16:06:06 -0400 Received: from CY4PR12MB1494.namprd12.prod.outlook.com (2603:10b6:910:f::22) by CY4PR1201MB0023.namprd12.prod.outlook.com (2603:10b6:910:1f::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3412.21; Mon, 28 Sep 2020 20:05:26 +0000 Received: from CY4PR12MB1494.namprd12.prod.outlook.com ([fe80::11f9:59c8:16c0:7718]) by CY4PR12MB1494.namprd12.prod.outlook.com ([fe80::11f9:59c8:16c0:7718%8]) with mapi id 15.20.3412.029; Mon, 28 Sep 2020 20:05:26 +0000 Received: from ethanolx56bbhost.amd.com (165.204.78.2) by DM5PR11CA0014.namprd11.prod.outlook.com (2603:10b6:3:115::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3412.20 via Frontend Transport; Mon, 28 Sep 2020 20:05:25 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SnWXgHmGXzSTGEc+w8j4VvQMiH2aY9grDpbNqwhLLhVhz3ZQVVBPM95iT0v6BySqxNfpFOHlB4GXBVY8hP8+nd1OyGFfYl9VAu0X2QHxUXrQzYTle+W8je/M6kUG9iEE7QzKszcxInBBRaKA1ad67KTA4E8svBd7p2KEuKKamM2EfzAbyE5qlxYKIzpMh5TktAFV8vpijyyEAaYWQmw9a+zuPUdMm/mxF9uipdCIpBLPUXY9CYscg4+BElzbGLvk2hZtga8HF8kV9bs3bjcHH81kzZl1MZMLk28TKbdGet04yI1hF373U4d8/0GWG4pLWphVxKbMj26NNkn3wrYTOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+lGCQG8ohaktYqh4DdntmrGbaibr6BlmrS5abSwHzQg=; b=CtXy/sFxBMNtX5q6IynBTXCrMR0cC5z/9FbI3kfU2ro0qNs8HEK6y2uN+3b3VlYgqUat7qCOZR97pWPAoaoaoQaxfvbNEx4cm4SdmmnYjQqkkX0jqo2qy9wDohEbxYX982uFh3ZmJndXtByyDrlEl5MlNoQUFQhJiyBla40vjLSB1bSgFOgwO3K+VWBnWgF3aomBzJmlbIeTtzxg/0vI57ELvQD3KzvVnHpqd7ryHzTDHxeLLcK5r5zYpRULDcvJql7pVtcy/tewXibv+TUKlQQScihgDa9JWhWlxh4sOpBmURTE/L8atBRbWuCTAiJAN0MnYBrc4dT1hc8swGGPFA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector2-amdcloud-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+lGCQG8ohaktYqh4DdntmrGbaibr6BlmrS5abSwHzQg=; b=GSU3/lV6ZT+U5kL5exerUmJ6ZJrPcaO0JZxeR64I1qZ8Vdo/UoO8B3nxYOgPcabQyfSBq5zvs3MAD39Pp/0iLXoQJHvcFWjdufR7mVZ4RstGvAT7AipiX9Gj+fhPwogLfIDgHIfzh1MgRdrYTpVFaBDR5dD91J+lYPTdLIOrpXs= Authentication-Results: nongnu.org; dkim=none (message not signed) header.d=none;nongnu.org; dmarc=none action=none header.from=amd.com; From: Wei Huang To: qemu-devel@nongnu.org Subject: [PATCH V1 1/3] amd-iommu: Add address space notifier and replay support Date: Mon, 28 Sep 2020 15:05:04 -0500 Message-Id: <20200928200506.75441-2-wei.huang2@amd.com> X-Mailer: git-send-email 2.25.2 In-Reply-To: <20200928200506.75441-1-wei.huang2@amd.com> References: <20200928200506.75441-1-wei.huang2@amd.com> Content-Transfer-Encoding: quoted-printable X-Originating-IP: [165.204.78.2] X-ClientProxiedBy: DM5PR11CA0014.namprd11.prod.outlook.com (2603:10b6:3:115::24) To CY4PR12MB1494.namprd12.prod.outlook.com (2603:10b6:910:f::22) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 4946a599-834f-4fc4-db9d-08d863e9d733 X-MS-TrafficTypeDiagnostic: CY4PR1201MB0023: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:415; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: TcqEX/7ffe/9I+gGNDWSw2wRUzjxWqimXWjFJdcKsQ5w1CFYK2EWzg6N6SbQ1xOPIzjQraLYuNh18Sw1S1eKgPeGtXsZGST7DhLpdNPGTWtw8bfyH7c6Rk/hHCT5+d4u5N8l3AqH5jkUIaO+gws4y7y4weQCQBTFtATCvWaOd41YmmpElslsCusZmc3vE0BoMx/i3YZlLmx+jXqqiBygCHnFtHRaYOd3+WCKjMqclHgcVDGHJ36MyefM+YI4VrCWNGZbGzF/tuRefsy5X81ggCr3wsDIWA55Tray9iCH7XUQTLL5fv/PEOhMZA3skrfrUszzpGzbfcy854jRQXdz7QUP9ZKpPK/ubgbHVj7fBTnpd3pH8QL+ntH11Nu330vi X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CY4PR12MB1494.namprd12.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(366004)(376002)(346002)(396003)(136003)(6486002)(4326008)(316002)(2906002)(8676002)(86362001)(8936002)(6666004)(478600001)(16526019)(5660300002)(186003)(26005)(1076003)(6916009)(83380400001)(66946007)(2616005)(52116002)(7696005)(66476007)(956004)(36756003)(66556008); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData: LjdDq0yUkLYjk0MTFqinzhJaVIZIc8OCMFqS+FWvzgZyaFFW8zXhLkLwx8/9hNroRyvovvh94k2v0fA3WoRz7UglDiTy0cjpC9VYHcOQvJcAHL58Ee3EHrH5qdHrnulst3sqvhnkwIE74L4MlAb+jTmZKjvsFjsDiO9TFeNa5rsYuVCL1DrSsEipk9BmOeNKa3EpD7F430Iu9IvmAiZqMnOTQR8jd2R6X6OOPKPOlni4/bimYqU8lb5P72k+xjj/PssqVRypkCNGnjAm1lxz40zi3lhwaCdUgKwjM1+PkOcQBEa5Kl4bGBobteTfx84vp5L8XO7wItnJnB2x+7mSbhx9i6ceANeVyuXYyoNi2x0XS3PlW5ZFgPyWmCNwBx/V6xITzVuMeTnl1pwzM9ecI2tkpbsEmRm7VT2dSWo21dxemP2Kef7DjXDNygF9GPXMSzydGDvntPswM7gBAzmNvCJjXokXyL1X7HyFuOCQjQGFSdBIomwy+wa2pTWsl5zuMMvYC6/YeTThuYsgcDgHvmaX7N48g5ZGW23Kh33dbbNVY3hh7+eIekcN5+Tw3Q7OQZvf8SNwlMbp4C29+DXu6HD0kzXd2gfB7M7fD2hK8A5ROB3kapDjU1e1uSeo+FXQZrm1B/A6bafmu88IaPbYBg== X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4946a599-834f-4fc4-db9d-08d863e9d733 X-MS-Exchange-CrossTenant-AuthSource: CY4PR12MB1494.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Sep 2020 20:05:26.4863 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 8PO+FZA5i4gPVUqM9eG/UePMMfvi1m70SGmpGpRiikbROzAvDqtnhiwk6xVwgjav X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR1201MB0023 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: none client-ip=40.107.94.65; envelope-from=Wei.Huang2@amd.com; helo=NAM10-MW2-obe.outbound.protection.outlook.com X-detected-operating-system: by eggs.gnu.org: First seen = 2020/09/28 16:06:01 X-ACL-Warn: Detected OS = Windows NT kernel [generic] [fuzzy] X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FORGED_SPF_HELO=1, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.614, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ehabkost@redhat.com, mst@redhat.com, wei.huang2@amd.com, peterx@redhat.com, alex.williamson@redhat.com, pbonzini@redhat.com, Suravee.Suthikulpanit@amd.com, rth@twiddle.net Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @amdcloud.onmicrosoft.com) Content-Type: text/plain; charset="utf-8" Currently the emulated amd-iommu device does not support memory address space notifier and replay. These two functions are required to have I/O devices supported inside guest VMs as passthru devices. This patch adds basic as_notifier infrastructure and replay function in amd_iommu. Co-developed-by: Wei Huang Signed-off-by: Suravee Suthikulpanit --- hw/i386/amd_iommu.c | 45 +++++++++++++++++++++++++++++++++++++++------ hw/i386/amd_iommu.h | 3 +++ 2 files changed, 42 insertions(+), 6 deletions(-) diff --git a/hw/i386/amd_iommu.c b/hw/i386/amd_iommu.c index 74a93a5d93f4..c7d24a05484d 100644 --- a/hw/i386/amd_iommu.c +++ b/hw/i386/amd_iommu.c @@ -63,6 +63,8 @@ struct AMDVIAddressSpace { IOMMUMemoryRegion iommu; /* Device's address translation region */ MemoryRegion iommu_ir; /* Device's interrupt remapping region */ AddressSpace as; /* device's corresponding address space */ + IOMMUNotifierFlag notifier_flags; /* notifier flags of address space */ + QLIST_ENTRY(AMDVIAddressSpace) next; /* notifier linked list */ }; =20 /* AMDVI cache entry */ @@ -425,6 +427,22 @@ static void amdvi_inval_all(AMDVIState *s, uint64_t *c= md) trace_amdvi_all_inval(); } =20 +static void amdvi_address_space_unmap(AMDVIAddressSpace *as, IOMMUNotifier= *n) +{ + IOMMUTLBEntry entry; + hwaddr start =3D n->start; + hwaddr end =3D n->end; + hwaddr size =3D end - start + 1; + + entry.target_as =3D &address_space_memory; + entry.iova =3D start; + entry.translated_addr =3D 0; + entry.perm =3D IOMMU_NONE; + entry.addr_mask =3D size - 1; + + memory_region_notify_one(n, &entry); +} + static gboolean amdvi_iotlb_remove_by_domid(gpointer key, gpointer value, gpointer user_data) { @@ -1473,14 +1491,17 @@ static int amdvi_iommu_notify_flag_changed(IOMMUMem= oryRegion *iommu, Error **errp) { AMDVIAddressSpace *as =3D container_of(iommu, AMDVIAddressSpace, iommu= ); + AMDVIState *s =3D as->iommu_state; =20 - if (new & IOMMU_NOTIFIER_MAP) { - error_setg(errp, - "device %02x.%02x.%x requires iommu notifier which is n= ot " - "currently supported", as->bus_num, PCI_SLOT(as->devfn), - PCI_FUNC(as->devfn)); - return -EINVAL; + /* Update address space notifier flags */ + as->notifier_flags =3D new; + + if (old =3D=3D IOMMU_NOTIFIER_NONE) { + QLIST_INSERT_HEAD(&s->amdvi_as_with_notifiers, as, next); + } else if (new =3D=3D IOMMU_NOTIFIER_NONE) { + QLIST_REMOVE(as, next); } + return 0; } =20 @@ -1573,6 +1594,8 @@ static void amdvi_realize(DeviceState *dev, Error **e= rrp) /* Pseudo address space under root PCI bus. */ x86ms->ioapic_as =3D amdvi_host_dma_iommu(bus, s, AMDVI_IOAPIC_SB_DEVI= D); =20 + QLIST_INIT(&s->amdvi_as_with_notifiers); + /* set up MMIO */ memory_region_init_io(&s->mmio, OBJECT(s), &mmio_mem_ops, s, "amdvi-mm= io", AMDVI_MMIO_SIZE); @@ -1631,12 +1654,22 @@ static const TypeInfo amdviPCI =3D { }, }; =20 +static void amdvi_iommu_replay(IOMMUMemoryRegion *iommu_mr, IOMMUNotifier = *n) +{ + AMDVIAddressSpace *as =3D container_of(iommu_mr, AMDVIAddressSpace, io= mmu); + + amdvi_address_space_unmap(as, n); + + return; +} + static void amdvi_iommu_memory_region_class_init(ObjectClass *klass, void = *data) { IOMMUMemoryRegionClass *imrc =3D IOMMU_MEMORY_REGION_CLASS(klass); =20 imrc->translate =3D amdvi_translate; imrc->notify_flag_changed =3D amdvi_iommu_notify_flag_changed; + imrc->replay =3D amdvi_iommu_replay; } =20 static const TypeInfo amdvi_iommu_memory_region_info =3D { diff --git a/hw/i386/amd_iommu.h b/hw/i386/amd_iommu.h index fa5feb183c03..aeed9fd1cbb0 100644 --- a/hw/i386/amd_iommu.h +++ b/hw/i386/amd_iommu.h @@ -364,6 +364,9 @@ struct AMDVIState { /* for each served device */ AMDVIAddressSpace **address_spaces[PCI_BUS_MAX]; =20 + /* list of registered notifiers */ + QLIST_HEAD(, AMDVIAddressSpace) amdvi_as_with_notifiers; + /* IOTLB */ GHashTable *iotlb; =20 --=20 2.25.2 From nobody Fri May 17 16:39:06 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1dmarc=pass fromdomain=amd.com) ARC-Seal: i=2; a=rsa-sha256; t=1601323684; cv=pass; d=zohomail.com; s=zohoarc; b=jvGn2StA9pGoFz2OKXFFeZyLtNQAbCjKQEJAnQZFObGXJ5BPWmg/ym//wUI/vh4XUwYIwy0vTZHexWulUor6fY3gJgUnnkBUcSsR1RgWL4zs3W0UG9ipcz9CPXvyD3Jq4cjBT+F/mtnA5ZdFyDinsvASVGDAmMvj29Nqs1rdDAI= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1601323684; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=pWK0AiE1R7OpfQL0YgCijwIzf5o0BJZYlHT8WKEqxbg=; b=Bb076J0l5WXlo6gukGwwN65bWYNmrxcakn9KwZ4ISobeANzRTnJl1WxKGMF7G1gdo3yf5yp78e+Y6Y47pE1/oX9kEpfInt/cBnQka93CPhGx/Qdfrg0NFIB9EFsYHJE+nWhjZIDfV6EePwKlko3wReRrDePWITNPC0uDSVOFBHQ= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1dmarc=pass fromdomain=amd.com) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1601323684267965.634029704706; Mon, 28 Sep 2020 13:08:04 -0700 (PDT) Received: from localhost ([::1]:59998 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1kMzRK-00088u-Nv for importer@patchew.org; Mon, 28 Sep 2020 16:08:02 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:36418) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kMzPU-0006Sg-VG for qemu-devel@nongnu.org; Mon, 28 Sep 2020 16:06:09 -0400 Received: from mail-mw2nam10on2065.outbound.protection.outlook.com ([40.107.94.65]:7990 helo=NAM10-MW2-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kMzPT-0006yf-31 for qemu-devel@nongnu.org; Mon, 28 Sep 2020 16:06:08 -0400 Received: from CY4PR12MB1494.namprd12.prod.outlook.com (2603:10b6:910:f::22) by CY4PR1201MB0023.namprd12.prod.outlook.com (2603:10b6:910:1f::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3412.21; Mon, 28 Sep 2020 20:05:39 +0000 Received: from CY4PR12MB1494.namprd12.prod.outlook.com ([fe80::11f9:59c8:16c0:7718]) by CY4PR12MB1494.namprd12.prod.outlook.com ([fe80::11f9:59c8:16c0:7718%8]) with mapi id 15.20.3412.029; Mon, 28 Sep 2020 20:05:38 +0000 Received: from ethanolx56bbhost.amd.com (165.204.78.2) by SN6PR2101CA0026.namprd21.prod.outlook.com (2603:10b6:805:106::36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3433.8 via Frontend Transport; Mon, 28 Sep 2020 20:05:37 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cHK9xv9DaqLl2CV+8Cu9GFqGbbOMus9O4FnyWKv8TpKQpsXwG8ZsxMYKaZGu7NL20PcolX6OZDx5wKN53YRp3AKHVK+zLUZqwsfESEZfIsOaiatv6U3g7ZRGo/KJtCvxUtSWOfhc1pV6BNfxL3e9vsFdKf2XNzhd0xIROqif7XY7YwYrDxsYbh8AQEbU8np45wG49PJv7puP6jFC46MEshEt6IRCeuVkDatGeFQl7jAaQrxHTWCpppSqbfaiJFn/n7KXAuiIQJLQEc5w06X2e5tRtAN13zLpRQYp+fOuz8FPYgq9f2rHnz99APjjgofoCUTfHhQIQZcJD8H/4urbFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pWK0AiE1R7OpfQL0YgCijwIzf5o0BJZYlHT8WKEqxbg=; b=XJHigPgcoh/jjpDp3uyKYiUGSEFIAaN5Q8F4mCobHXp0w+6jMvcHYiB6TOgr8z/bVXw1sUablQhGEzHevBfYmeILkNRi6MUNuF4Uq/lsvXPFzMKSmsLbDoGKOd1scV6UoOcZzCR2/2JwjrUih9Hi/8CzFoI30UCzM3R9ERnc0+Sz93du4sW7wPCfxHmh0zzkwG2c+/5x4SPISoqtD0x2JvqUvqfIv8ntXQwgGhvwNDk2kCYphWX194+eQ6OTKrBz+O1KYwbePy00TQxsNOz+m7vBN0CUqzI2wVd5K4ivloCnv9evBFI4RxNfMzVP3GUkosrlkJqSCRm5N0ztqmAPTg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector2-amdcloud-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pWK0AiE1R7OpfQL0YgCijwIzf5o0BJZYlHT8WKEqxbg=; b=w0qKoxxUxTe5OVptsaV/9P+Gqpm97f+tHcmC4/tal9abZDIGaaZ/Cv8eFQ/lgq8If1lPanMsjthLBQBJ8DSIetDWCThUrx+x9JYozEIpprmXkaS6XPxeyqJBxoEUWMgMFej0GND5VZ5LXD24ZmMoW3OLqqe6Kv2i/2gTaUY6Kck= Authentication-Results: nongnu.org; dkim=none (message not signed) header.d=none;nongnu.org; dmarc=none action=none header.from=amd.com; From: Wei Huang To: qemu-devel@nongnu.org Subject: [PATCH V1 2/3] amd-iommu: Sync IOVA-to-GPA translation during page invalidation Date: Mon, 28 Sep 2020 15:05:05 -0500 Message-Id: <20200928200506.75441-3-wei.huang2@amd.com> X-Mailer: git-send-email 2.25.2 In-Reply-To: <20200928200506.75441-1-wei.huang2@amd.com> References: <20200928200506.75441-1-wei.huang2@amd.com> Content-Transfer-Encoding: quoted-printable X-Originating-IP: [165.204.78.2] X-ClientProxiedBy: SN6PR2101CA0026.namprd21.prod.outlook.com (2603:10b6:805:106::36) To CY4PR12MB1494.namprd12.prod.outlook.com (2603:10b6:910:f::22) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 7be42512-eb61-4154-ec08-08d863e9de6f X-MS-TrafficTypeDiagnostic: CY4PR1201MB0023: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:2449; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: UD1kJJLJ3+C+6bKMfquTEADb/A38AH5bLpth7hImjEHwXFV0SmxFZM3ozbB2Be+egPrT9M+bScytdsjzdQu9N4o9hCCV0h8+1Gi2aGt4Dt6WTl9oh5khM23J4Qh/pwaBpN1dwuBUlTrWJyS5Iv+0GuNNywmiBB+/jZciCUKxPKZpEe4OhugZmoZEkWW5WN+eMx9Z1OBgEgGd3teyclsBXqILW8d3RYNpNd0JGXQ3Vt3Xgm99pOczv2I3FhPoZc554dVzW9O7qJPTlz/vTEZSfCly1nQlcI/7EXQZDlOZ1LPclFIZtMBZ12170dHgz5rS1P+k8JZj3+ZGLyVgv24iU098qfwKUWXCKo7hBitvizd+xnraMOWSnzZSCwzxJ7kaFvXJ9nrRc4UxgnKEf1wAzZcagt56mEHGi/M0BhIbxA+uQzbbP/h921URkFn4fYXQ X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CY4PR12MB1494.namprd12.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(366004)(376002)(346002)(396003)(136003)(6486002)(4326008)(316002)(2906002)(8676002)(86362001)(8936002)(6666004)(478600001)(16526019)(5660300002)(186003)(26005)(1076003)(6916009)(83380400001)(66946007)(2616005)(52116002)(7696005)(66476007)(956004)(36756003)(66556008)(473944003)(414714003); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 7be42512-eb61-4154-ec08-08d863e9de6f X-MS-Exchange-CrossTenant-AuthSource: CY4PR12MB1494.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Sep 2020 20:05:38.5950 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: pYBJ03RjjNPUPB7/uYYlZzbEKEUHpFtKvpzUv+GX/np0XsSrKKDW15PcKgES7lHa X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR1201MB0023 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: none client-ip=40.107.94.65; envelope-from=Wei.Huang2@amd.com; helo=NAM10-MW2-obe.outbound.protection.outlook.com X-detected-operating-system: by eggs.gnu.org: First seen = 2020/09/28 16:06:01 X-ACL-Warn: Detected OS = Windows NT kernel [generic] [fuzzy] X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FORGED_SPF_HELO=1, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.614, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ehabkost@redhat.com, mst@redhat.com, wei.huang2@amd.com, peterx@redhat.com, alex.williamson@redhat.com, pbonzini@redhat.com, Suravee.Suthikulpanit@amd.com, rth@twiddle.net Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @amdcloud.onmicrosoft.com) Content-Type: text/plain; charset="utf-8" Add support to sync the IOVA-to-GPA translation at the time of IOMMU page invalidation. This function is called when two IOMMU commands, AMDVI_CMD_INVAL_AMDVI_PAGES and AMDVI_CMD_INVAL_AMDVI_ALL, are intercepted. Address space notifiers are called accordingly. Co-developed-by: Wei Huang Signed-off-by: Suravee Suthikulpanit --- hw/i386/amd_iommu.c | 177 ++++++++++++++++++++++++++++++++++++++++++++ hw/i386/amd_iommu.h | 10 +++ hw/vfio/common.c | 3 +- 3 files changed, 189 insertions(+), 1 deletion(-) diff --git a/hw/i386/amd_iommu.c b/hw/i386/amd_iommu.c index c7d24a05484d..7604e2080595 100644 --- a/hw/i386/amd_iommu.c +++ b/hw/i386/amd_iommu.c @@ -76,6 +76,12 @@ typedef struct AMDVIIOTLBEntry { uint64_t page_mask; /* physical page size */ } AMDVIIOTLBEntry; =20 +static bool amdvi_get_dte(AMDVIState *s, int devid, uint64_t *entry); +static void amdvi_sync_domain(AMDVIState *s, uint32_t domid, + uint64_t addr, uint16_t flags); +static void amdvi_walk_level(AMDVIAddressSpace *as, uint64_t pte, + uint64_t iova, uint64_t partial); + /* configure MMIO registers at startup/reset */ static void amdvi_set_quad(AMDVIState *s, hwaddr addr, uint64_t val, uint64_t romask, uint64_t w1cmask) @@ -443,6 +449,78 @@ static void amdvi_address_space_unmap(AMDVIAddressSpac= e *as, IOMMUNotifier *n) memory_region_notify_one(n, &entry); } =20 +/* + * Sync the IOVA-to-GPA translation at the time of IOMMU page invalidation. + * This function is called when IOMMU commands, AMDVI_CMD_INVAL_AMDVI_PAGES + * and AMDVI_CMD_INVAL_AMDVI_ALL, are triggred. + * + * The range of addr invalidation is determined by addr and flags, using + * the following rules: + * - All pages + * In this case, we unmap the whole address space and then re-walk the + * I/O page table to sync the mapping relationship. + * - Single page: + * Re-walk the page based on the specified iova, and only sync the + * newly mapped page. + */ +static void amdvi_sync_domain(AMDVIState *s, uint32_t domid, + uint64_t addr, uint16_t flags) +{ + AMDVIAddressSpace *as; + bool sync_all_domains =3D false; + uint64_t mask, size =3D 0x1000; + + if (domid =3D=3D AMDVI_DOMAIN_ALL) { + sync_all_domains =3D true; + } + + /* S=3D1 means the invalidation size is from addr field; otherwise 4K= B */ + if (flags & AMDVI_CMD_INVAL_IOMMU_PAGES_S_BIT) { + uint32_t zbit =3D cto64(addr | 0xFFF) + 1; + + size =3D 1ULL << zbit; + + if (size < 0x1000) { + addr =3D 0; + size =3D AMDVI_PGSZ_ENTIRE; + } else { + mask =3D ~(size - 1); + addr &=3D mask; + } + } + + QLIST_FOREACH(as, &s->amdvi_as_with_notifiers, next) { + uint64_t dte[4]; + IOMMUNotifier *n; + + if (!amdvi_get_dte(s, as->devfn, dte)) { + continue; + } + + if (!sync_all_domains && (domid !=3D (dte[1] & 0xFFFULL))) { + continue; + } + + /* + * In case of syncing more than a page, we invalidate the entire + * address range and re-walk the whole page table. + */ + if (size =3D=3D AMDVI_PGSZ_ENTIRE) { + IOMMU_NOTIFIER_FOREACH(n, &as->iommu) { + amdvi_address_space_unmap(as, n); + } + } else if (size > 0x1000) { + IOMMU_NOTIFIER_FOREACH(n, &as->iommu) { + if (n->start <=3D addr && addr + size < n->end) { + amdvi_address_space_unmap(as, n); + } + } + } + + amdvi_walk_level(as, dte[0], addr, 0); + } +} + static gboolean amdvi_iotlb_remove_by_domid(gpointer key, gpointer value, gpointer user_data) { @@ -455,6 +533,8 @@ static gboolean amdvi_iotlb_remove_by_domid(gpointer ke= y, gpointer value, static void amdvi_inval_pages(AMDVIState *s, uint64_t *cmd) { uint16_t domid =3D cpu_to_le16((uint16_t)extract64(cmd[0], 32, 16)); + uint64_t addr =3D cpu_to_le64(extract64(cmd[1], 12, 52)) << 12; + uint16_t flags =3D cpu_to_le16((uint16_t)extract64(cmd[1], 0, 12)); =20 if (extract64(cmd[0], 20, 12) || extract64(cmd[0], 48, 12) || extract64(cmd[1], 3, 9)) { @@ -465,6 +545,8 @@ static void amdvi_inval_pages(AMDVIState *s, uint64_t *= cmd) g_hash_table_foreach_remove(s->iotlb, amdvi_iotlb_remove_by_domid, &domid); trace_amdvi_pages_inval(domid); + + amdvi_sync_domain(s, domid, addr, flags); } =20 static void amdvi_prefetch_pages(AMDVIState *s, uint64_t *cmd) @@ -910,6 +992,101 @@ static inline uint64_t amdvi_get_pte_entry(AMDVIState= *s, uint64_t pte_addr, return pte; } =20 +static inline uint64_t pte_get_page_size(uint64_t level) +{ + return 1UL << ((level * 9) + 3); +} + +static void amdvi_sync_iova(AMDVIAddressSpace *as, uint64_t pte, uint64_t = iova) +{ + IOMMUTLBEntry entry; + uint64_t addr =3D pte & AMDVI_DEV_PT_ROOT_MASK; + uint32_t level =3D get_pte_translation_mode(pte); + uint64_t size =3D pte_get_page_size(level + 1); + uint64_t perm =3D amdvi_get_perms(pte); + + assert(level =3D=3D 0 || level =3D=3D 7); + + entry.target_as =3D &address_space_memory; + entry.iova =3D iova ; + entry.perm =3D perm; + if (level =3D=3D 0) { + entry.addr_mask =3D size - 1; + entry.translated_addr =3D addr; + } else if (level =3D=3D 7) { + entry.addr_mask =3D (1 << (cto64(addr | 0xFFF) + 1)) - 1; + entry.translated_addr =3D addr & ~entry.addr_mask; + } + + memory_region_notify_iommu(&as->iommu, 0, entry); +} + +/* + * Walk the I/O page table and notify mapping change. Note that iova + * determines if this function's behavior: + * - iova =3D=3D 0: re-walk the whole page table + * - iova !=3D 0: re-walk the address defined in iova + */ +static void amdvi_walk_level(AMDVIAddressSpace *as, uint64_t pte, + uint64_t iova, uint64_t partial) +{ + uint64_t index =3D 0; + uint8_t level =3D get_pte_translation_mode(pte); + uint64_t cur_addr =3D pte & AMDVI_DEV_PT_ROOT_MASK; + uint64_t end_addr =3D cur_addr + 4096; + uint64_t new_partial =3D 0; + + if (!(pte & AMDVI_PTE_PRESENT)) { + return; + } + + if (level =3D=3D 7) { + amdvi_sync_iova(as, pte, iova); + return; + } + + /* narrow the scope of table walk if iova !=3D 0 */ + if (iova) { + cur_addr +=3D ((iova >> (3 + 9 * level)) & 0x1FF) << 3; + end_addr =3D cur_addr + 8; + } + + while (cur_addr < end_addr) { + int cur_addr_inc =3D 8; + int index_inc =3D 1; + + pte =3D amdvi_get_pte_entry(as->iommu_state, cur_addr, as->devfn); + /* validate the entry */ + if (!(pte & AMDVI_PTE_PRESENT)) { + goto next; + } + + if (level > 1) { + new_partial =3D (partial << 9) | index; + amdvi_walk_level(as, pte, iova, new_partial); + } else { + /* found a page, sync the mapping first */ + if (iova) { + amdvi_sync_iova(as, pte, iova); + } else { + amdvi_sync_iova(as, pte, ((partial << 9) | index) << 12); + } + + /* skip following entries when a large page is found */ + if (get_pte_translation_mode(pte) =3D=3D 7) { + int skipped =3D 1 << (cto64(pte >> 12) + 1); + + cur_addr_inc =3D 8 * skipped; + index_inc =3D skipped; + } + } + +next: + cur_addr +=3D cur_addr_inc; + index +=3D index_inc; + } +} + static void amdvi_page_walk(AMDVIAddressSpace *as, uint64_t *dte, IOMMUTLBEntry *ret, unsigned perms, hwaddr addr) diff --git a/hw/i386/amd_iommu.h b/hw/i386/amd_iommu.h index aeed9fd1cbb0..22f846837a95 100644 --- a/hw/i386/amd_iommu.h +++ b/hw/i386/amd_iommu.h @@ -123,6 +123,8 @@ #define AMDVI_CMD_COMPLETE_PPR_REQUEST 0x07 #define AMDVI_CMD_INVAL_AMDVI_ALL 0x08 =20 +#define AMDVI_CMD_INVAL_IOMMU_PAGES_S_BIT (1ULL << 0) + #define AMDVI_DEVTAB_ENTRY_SIZE 32 =20 /* Device table entry bits 0:63 */ @@ -148,6 +150,9 @@ #define AMDVI_EVENT_ILLEGAL_COMMAND_ERROR (0x5U << 12) #define AMDVI_EVENT_COMMAND_HW_ERROR (0x6U << 12) =20 +/* PTE bits */ +#define AMDVI_PTE_PRESENT (1ULL << 0) + #define AMDVI_EVENT_LEN 16 #define AMDVI_PERM_READ (1 << 0) #define AMDVI_PERM_WRITE (1 << 1) @@ -198,6 +203,11 @@ #define AMDVI_MAX_PH_ADDR (40UL << 8) #define AMDVI_MAX_GVA_ADDR (48UL << 15) =20 +#define AMDVI_PGSZ_ENTIRE (0X0007FFFFFFFFF000ULL) + +/* The domain id is 16-bit, so use 32-bit all 1's to represent all domains= */ +#define AMDVI_DOMAIN_ALL (UINT32_MAX) + /* Completion Wait data size */ #define AMDVI_COMPLETION_DATA_SIZE 8 =20 diff --git a/hw/vfio/common.c b/hw/vfio/common.c index 13471ae29436..243216499ce0 100644 --- a/hw/vfio/common.c +++ b/hw/vfio/common.c @@ -346,7 +346,8 @@ static int vfio_dma_map(VFIOContainer *container, hwadd= r iova, * the VGA ROM space. */ if (ioctl(container->fd, VFIO_IOMMU_MAP_DMA, &map) =3D=3D 0 || - (errno =3D=3D EBUSY && vfio_dma_unmap(container, iova, size) =3D= =3D 0 && + ((errno =3D=3D EEXIST || errno =3D=3D EBUSY) && + vfio_dma_unmap(container, iova, size) =3D=3D 0 && ioctl(container->fd, VFIO_IOMMU_MAP_DMA, &map) =3D=3D 0)) { return 0; } --=20 2.25.2 From nobody Fri May 17 16:39:06 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1dmarc=pass fromdomain=amd.com) ARC-Seal: i=2; a=rsa-sha256; t=1601323722; cv=pass; d=zohomail.com; s=zohoarc; b=i24GTTzd2HIolqhLsn4PtaUlKrZKmw6QJYelSxCxUfyTOa8YQ6JV5qzSfsDyxcQdg4aZfAnCK4sNBTroG/tuj5xD2qsdi3p6W0Zum74s6ddR23HmGu7pkA7cG5tXjDcvEPaBUbFLShPyKvRjVMqF1qOKAmOQgHjHtmG/z5HU2XA= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1601323722; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=CMe/pp6s+8dbhrTztejnvQj6XXscuz4gpO6YE2NMuwY=; b=Mlo52c2NNhXNl5eXrVKU7SnBlC/23zVaJ/eACrZpxr89WSSRnfNRN7OkPt8ZzufS0+dAyNVCCHUFAIh1F8wQyz950DDS7MgwR/0FNKHvUqaoJ6xTHueo1aRgzTO6lYMsKe2z8koH5ZJkx/Lveu/z51I3oTxSDnX6dMG74u0dXIg= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1dmarc=pass fromdomain=amd.com) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1601323722012705.5369557448923; Mon, 28 Sep 2020 13:08:42 -0700 (PDT) Received: from localhost ([::1]:33646 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1kMzRw-0000TH-QP for importer@patchew.org; Mon, 28 Sep 2020 16:08:40 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:36470) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kMzPZ-0006Vw-Cb for qemu-devel@nongnu.org; Mon, 28 Sep 2020 16:06:14 -0400 Received: from mail-mw2nam10on2065.outbound.protection.outlook.com ([40.107.94.65]:7990 helo=NAM10-MW2-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kMzPW-0006yf-87 for qemu-devel@nongnu.org; Mon, 28 Sep 2020 16:06:11 -0400 Received: from CY4PR12MB1494.namprd12.prod.outlook.com (2603:10b6:910:f::22) by CY4PR1201MB0023.namprd12.prod.outlook.com (2603:10b6:910:1f::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3412.21; Mon, 28 Sep 2020 20:05:51 +0000 Received: from CY4PR12MB1494.namprd12.prod.outlook.com ([fe80::11f9:59c8:16c0:7718]) by CY4PR12MB1494.namprd12.prod.outlook.com ([fe80::11f9:59c8:16c0:7718%8]) with mapi id 15.20.3412.029; Mon, 28 Sep 2020 20:05:51 +0000 Received: from ethanolx56bbhost.amd.com (165.204.78.2) by SN4PR0601CA0019.namprd06.prod.outlook.com (2603:10b6:803:2f::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3412.20 via Frontend Transport; Mon, 28 Sep 2020 20:05:49 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FgCnxfLbw7qOX06/6OWP+4OD25Qyoivl1aftZceljhqcuT71uSuTX9DHsNYaW2gYyKU8GnH5PbJ4DMLpsPTsksw8wqnNtO5xy8EoFf00+qrzhDrvhOjRLEQjXVGeJ99ViLIJ69wKzRQNg0mmrfZDqRHjy/d0JYpwRLxLR5qeAZvrKelywEHVGbmUPsV9NZ+XN9kWx5B/lYlnmCHRUpo4b3DTWQ+db96NmAi4Qlk/NqzfVJJZQVEvMnnUIDSntnCQKEEmCr8i9eWrE88pGJAhMJOtXrKtCQTRLnbNUj/bo9e+6/5WsYG44ng1CSUSY6RgKkVsG2UmgMPh56y1UXRqUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CMe/pp6s+8dbhrTztejnvQj6XXscuz4gpO6YE2NMuwY=; b=hx2DTjACMmBeyMXgNPSdragU1YX+rjiNks7IrxYbzbfzXRxMgvV+jM6hdUc861ZuHQghD5uxdqSur99tVkAhhxlT5qPR7UrkKea+Rj2uBOy/51jMMXVzrHiGev4wf7R6ryvJjUUaX5jjEcfY/bE9ai4HE7cwd9XoLbcvPgQB97SiGns1DvRMuRkJ2UdHUvS2lZ/6JWyXoY9e1uv75eL/VsERYNB2o1OsVHWhfig9+qFtbE6ITI901in6ZXofWLCgAixryT5gKlyDJtVneU8/qkPVrysVKrPbMLpYa55oYfdUW0mpBNm4xWL2RTo1/nJXqTdz8HWRwxtHhh6PgUOHqQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector2-amdcloud-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CMe/pp6s+8dbhrTztejnvQj6XXscuz4gpO6YE2NMuwY=; b=lWp6ytByxZtZdUgKfW0l2K+BCSi3pKhAQihv1yLXmB7dwc1+2H06vmH7tVDrhRt7xn4DWXFPKhI3yj6WSqX2jsbort9v8wZtTPUBWoN+JCgChAdntd8WwJfOiZAbiT+53iGT9iXktkjjLQIEJTvwbfzPBJpZjOyoWEHwdJWZhWU= Authentication-Results: nongnu.org; dkim=none (message not signed) header.d=none;nongnu.org; dmarc=none action=none header.from=amd.com; From: Wei Huang To: qemu-devel@nongnu.org Subject: [PATCH V1 3/3] amd-iommu: Fix amdvi_mmio_trace() to differentiate MMIO R/W Date: Mon, 28 Sep 2020 15:05:06 -0500 Message-Id: <20200928200506.75441-4-wei.huang2@amd.com> X-Mailer: git-send-email 2.25.2 In-Reply-To: <20200928200506.75441-1-wei.huang2@amd.com> References: <20200928200506.75441-1-wei.huang2@amd.com> Content-Transfer-Encoding: quoted-printable X-Originating-IP: [165.204.78.2] X-ClientProxiedBy: SN4PR0601CA0019.namprd06.prod.outlook.com (2603:10b6:803:2f::29) To CY4PR12MB1494.namprd12.prod.outlook.com (2603:10b6:910:f::22) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: df1c5895-fc15-4d61-d933-08d863e9e5bb X-MS-TrafficTypeDiagnostic: CY4PR1201MB0023: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:155; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: NdPPSilLvDDkSZTS9kpz6kwNKApGKM07VLuK3nUeloP/kFN1+DbEST3AEsOsgBmDdRRGqDI79+LglaVoXcul5L7vVxAMXbDLSWraxEts/LSmJwu6wz+YKcP9jG8C8iKr9rars1sw5N96IDe1Tuqm5rzlSE/SGe/khUoS9FUGlDSOFAHbAxIkWOxWv+iL+GK0qOaWhj8mx3sJWf7Mt8/wu3abU6rr4wHkzSUDLfSisC4fMezbAvWiaiglQl0i6PbBH0Y8ixBlJ5OAA1ns91i1H2ppP0mMNMp8YEpgqxRVITDRM3v5SMgDiKD2og2Jww8l6Fq6WH07pBRmer9OHzY5vwWZqJBj1E5FM0h82slzfMlq47CSyq0nl7xjVSf5XY4V X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CY4PR12MB1494.namprd12.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(366004)(376002)(346002)(396003)(136003)(6486002)(4326008)(316002)(2906002)(8676002)(86362001)(8936002)(6666004)(478600001)(16526019)(5660300002)(186003)(26005)(1076003)(6916009)(83380400001)(66946007)(2616005)(52116002)(7696005)(66476007)(956004)(36756003)(66556008); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: df1c5895-fc15-4d61-d933-08d863e9e5bb X-MS-Exchange-CrossTenant-AuthSource: CY4PR12MB1494.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Sep 2020 20:05:50.8497 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: eI0Gkba9RYW3l7vm6ryNjnhTanww6qY3hTPERI1hiLuj7P8dqtP6cbfZ2l9IZdWY X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR1201MB0023 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: none client-ip=40.107.94.65; envelope-from=Wei.Huang2@amd.com; helo=NAM10-MW2-obe.outbound.protection.outlook.com X-detected-operating-system: by eggs.gnu.org: First seen = 2020/09/28 16:06:01 X-ACL-Warn: Detected OS = Windows NT kernel [generic] [fuzzy] X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FORGED_SPF_HELO=1, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.614, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ehabkost@redhat.com, mst@redhat.com, wei.huang2@amd.com, peterx@redhat.com, alex.williamson@redhat.com, pbonzini@redhat.com, Suravee.Suthikulpanit@amd.com, rth@twiddle.net Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @amdcloud.onmicrosoft.com) Content-Type: text/plain; charset="utf-8" amd-iommu MMIO trace function does not differentiate MMIO writes from reads. Let us extend it to support both types. Co-developed-by: Wei Huang Signed-off-by: Suravee Suthikulpanit --- hw/i386/amd_iommu.c | 21 ++++++++++++++++----- 1 file changed, 16 insertions(+), 5 deletions(-) diff --git a/hw/i386/amd_iommu.c b/hw/i386/amd_iommu.c index 7604e2080595..827818b9f781 100644 --- a/hw/i386/amd_iommu.c +++ b/hw/i386/amd_iommu.c @@ -662,17 +662,28 @@ static void amdvi_cmdbuf_run(AMDVIState *s) } } =20 -static void amdvi_mmio_trace(hwaddr addr, unsigned size) +static void amdvi_mmio_trace(hwaddr addr, unsigned size, bool iswrite, + uint64_t val) { uint8_t index =3D (addr & ~0x2000) / 8; =20 if ((addr & 0x2000)) { /* high table */ index =3D index >=3D AMDVI_MMIO_REGS_HIGH ? AMDVI_MMIO_REGS_HIGH := index; - trace_amdvi_mmio_read(amdvi_mmio_high[index], addr, size, addr & ~= 0x07); + if (!iswrite) + trace_amdvi_mmio_read(amdvi_mmio_high[index], addr, size, + addr & ~0x07); + else + trace_amdvi_mmio_write(amdvi_mmio_high[index], addr, size, val, + addr & ~0x07); } else { index =3D index >=3D AMDVI_MMIO_REGS_LOW ? AMDVI_MMIO_REGS_LOW : i= ndex; - trace_amdvi_mmio_read(amdvi_mmio_low[index], addr, size, addr & ~0= x07); + if (!iswrite) + trace_amdvi_mmio_read(amdvi_mmio_low[index], addr, size, + addr & ~0x07); + else + trace_amdvi_mmio_write(amdvi_mmio_low[index], addr, size, val, + addr & ~0x07); } } =20 @@ -693,7 +704,7 @@ static uint64_t amdvi_mmio_read(void *opaque, hwaddr ad= dr, unsigned size) } else if (size =3D=3D 8) { val =3D amdvi_readq(s, addr); } - amdvi_mmio_trace(addr, size); + amdvi_mmio_trace(addr, size, 0, val); =20 return val; } @@ -840,7 +851,7 @@ static void amdvi_mmio_write(void *opaque, hwaddr addr,= uint64_t val, return; } =20 - amdvi_mmio_trace(addr, size); + amdvi_mmio_trace(addr, size, 1, val); switch (addr & ~0x07) { case AMDVI_MMIO_CONTROL: amdvi_mmio_reg_write(s, size, val, addr); --=20 2.25.2