[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[RFC v10 00/25] intel_iommu: expose Shared Virtual Addressing to VMs

From: Liu Yi L
Subject: [RFC v10 00/25] intel_iommu: expose Shared Virtual Addressing to VMs
Date: Thu, 10 Sep 2020 03:56:13 -0700

Shared Virtual Addressing (SVA), a.k.a, Shared Virtual Memory (SVM) on
Intel platforms allows address space sharing between device DMA and
applications. SVA can reduce programming complexity and enhance security.

This QEMU series is intended to expose SVA usage to VMs. i.e. Sharing
guest application address space with passthru devices. This is called
vSVA in this series. The whole vSVA enabling requires QEMU/VFIO/IOMMU

The high-level architecture for SVA virtualization is as below, the key
design of vSVA support is to utilize the dual-stage IOMMU translation (
also known as IOMMU nesting translation) capability in host IOMMU.

    .-------------.  .---------------------------.
    |   vIOMMU    |  | Guest process CR3, FL only|
    |             |  '---------------------------'
    | PASID Entry |--- PASID cache flush -
    '-------------'                       |
    |             |                       V
    |             |                CR3 in GPA
------| Shadow |--------------------------|--------
      v        v                          v
    .-------------.  .----------------------.
    |   pIOMMU    |  | Bind FL for GVA-GPA  |
    |             |  '----------------------'
    .----------------/  |
    | PASID Entry |     V (Nested xlate)
    |             |   |SL for GPA-HPA, default domain|
    |             |   '------------------------------'
 - FL = First level/stage one page tables
 - SL = Second level/stage two page tables

The complete vSVA kernel upstream patches are divided into three phases:
    1. Common APIs and PCI device direct assignment
    2. IOMMU-backed Mediated Device assignment
    3. Page Request Services (PRS) support

This QEMU patchset is aiming for the phase 1 and phase 2. It is based
on the kernel series below:
[PATCH v7 00/16] vfio: expose virtual Shared Virtual Addressing to VMs

Patch Overview:
 1. patch 0001 - 0002: update kernel header files
 2. patch 0003 - 0007: select VFIO_TYPE1_NESTING_IOMMU for vIOMMU built
                       on IOMMU nesting translation.
 3. patch 0008 - 0010: set HostIOMMUContext to vIOMMU.
 4. patch 0011 - 0013: allocate PASID for vIOMMU.
 5. patch 0014 - 0015: PASID cache management for Intel vIOMMU.
 6. patch 0016 - 0020: bind guest page table to host.
 7. patch 0021 - 0024: flush first level/stage cache for vIOMMU.
 8. patch 0025: expose SVA to VM by x-scalable-mode="modern"

The complete QEMU set can be found in below link:
https://github.com/luxis1999/qemu.git vsva_5.9_rc2_qemu_rfcv10

Complete kernel can be found in:
https://github.com/luxis1999/linux-vsva.git vsva-linux-5.9-rc2-v7

Tests: basci vSVA functionality test, VM reboot/shutdown/crash, kernel build in
guest, boot VM with vSVA disabled, full comapilation with all archs, passthru
entire PCI device, passthru Scalable IOV ADI.

Yi Liu

        - RFC v9 -> RFC v10:
          a) Rebase to latest kernel implementation (5.9-rc2 vsva v7)
          RFC v9: 

        - RFC v8 -> RFC v9:
          a) Rebase to latest kernel implementation (5.8-rc6 vsva v6)
          RFC v8: 

        - RFC v7 -> RFC v8:
          a) Rebase to latest kernel implementation (5.8-rc3 vsva v5)
          RFC v7: 

        - RFC v6 -> RFC v7:
          a) Rebase to latest kernel implementation (5.8-rc3 vsva)
          RFC v6: 

        - RFC v5 -> RFC v6:
          a) Use RFC instead of formal patch as kernel patch is in progress.
          b) Address comments from Peter and Eric.
          c) Add get_iommu_attr() to advertise vIOMMU nesting requirement to
          d) Update per latest kernel UAPI definition.
          e) Add patch 0017 to check iommu nesting cap info in set_iommu().
          RFC v5: https://www.spinics.net/lists/kvm/msg211475.html

        - RFC v4 -> RFC v5:
          a) Refactor the vfio HostIOMMUContext init code (patch 0008 - 0009 of 
v1 series)
          b) Refactor the pasid binding handling (patch 0011 - 0016 of v1 
          RFC v4: https://patchwork.ozlabs.org/cover/1259648/

        - RFC v3.1 -> RFC v4:
          a) Implement HostIOMMUContext in QOM manner.
          b) Add pci_set/unset_iommu_context() to register HostIOMMUContext to
             vIOMMU, thus the lifecircle of HostIOMMUContext is awared in vIOMMU
             side. In such way, vIOMMU could use the methods provided by the
             HostIOMMUContext safely.
          c) Add back patch "[RFC v3 01/25] hw/pci: modify pci_setup_iommu() to 
          RFCv3.1: https://patchwork.kernel.org/cover/11397879/

        - RFC v3 -> v3.1:
          a) Drop IOMMUContext, and rename DualStageIOMMUObject to 
             HostIOMMUContext is per-vfio-container, it is exposed to  vIOMMU 
via PCI
             layer. VFIO registers a PCIHostIOMMUFunc callback to PCI layer, 
             could get HostIOMMUContext instance via it.
          b) Check IOMMU uAPI version by VFIO_CHECK_EXTENSION
          c) Add a check on VFIO_PASID_REQ availability via VFIO_GET_IOMMU_IHNFO
          d) Reorder the series, put vSVA linux header file update in the 
             put the x-scalable-mode option mofification in the end of the 
          e) Dropped patch "[RFC v3 01/25] hw/pci: modify pci_setup_iommu() to 
          RFCv3: https://patchwork.kernel.org/cover/11356033/

        - RFC v2 -> v3:
          a) Introduce DualStageIOMMUObject to abstract the host IOMMU 
          capability. e.g. request PASID from host, setup IOMMU nesting 
          on host IOMMU. The pasid_alloc/bind_guest_page_table/iommu_cache_flush
          operations are moved to be DualStageIOMMUOps. Thus, 
          is an abstract layer which provides QEMU vIOMMU emulators with an 
          method to program host IOMMU.
          b) Compared with RFC v2, the IOMMUContext has also been updated. It is
          modified to provide an abstract for vIOMMU emulators. It provides the
          method for pass-through modules (like VFIO) to communicate with host 
          e.g. tell vIOMMU emulators about the IOMMU nesting capability on host 
          and report the host IOMMU DMA translation faults to vIOMMU emulators.
          RFC v2: https://www.spinics.net/lists/kvm/msg198556.html

        - RFC v1 -> v2:
          Introduce IOMMUContext to abstract the connection between VFIO
          and vIOMMU emulators, which is a replacement of the PCIPASIDOps
          in RFC v1. Modify x-scalable-mode to be string option instead of
          adding a new option as RFC v1 did. Refined the pasid cache management

Eric Auger (1):
  scripts/update-linux-headers: Import iommu.h

Liu Yi L (24):
  header file update VFIO/IOMMU vSVA APIs kernel 5.9-rc2
  hw/pci: modify pci_setup_iommu() to set PCIIOMMUOps
  hw/pci: introduce pci_device_get_iommu_attr()
  intel_iommu: add get_iommu_attr() callback
  vfio: pass nesting requirement into vfio_get_group()
  vfio: check VFIO_TYPE1_NESTING_IOMMU support
  hw/iommu: introduce HostIOMMUContext
  hw/pci: introduce pci_device_set/unset_iommu_context()
  intel_iommu: add set/unset_iommu_context callback
  vfio/common: provide PASID alloc/free hooks
  vfio: init HostIOMMUContext per-container
  intel_iommu: add virtual command capability support
  intel_iommu: process PASID cache invalidation
  intel_iommu: add PASID cache management infrastructure
  vfio: add bind stage-1 page table support
  intel_iommu: sync IOMMU nesting cap info for assigned devices
  intel_iommu: bind/unbind guest page table to host
  intel_iommu: replay pasid binds after context cache invalidation
  intel_iommu: do not pass down pasid bind for PASID #0
  vfio: add support for flush iommu stage-1 cache
  intel_iommu: process PASID-based iotlb invalidation
  intel_iommu: propagate PASID-based iotlb invalidation to host
  intel_iommu: process PASID-based Device-TLB invalidation
  intel_iommu: modify x-scalable-mode to be string option

 hw/Kconfig                            |    3 +
 hw/alpha/typhoon.c                    |    6 +-
 hw/arm/smmu-common.c                  |    6 +-
 hw/hppa/dino.c                        |    6 +-
 hw/i386/amd_iommu.c                   |    6 +-
 hw/i386/intel_iommu.c                 | 1231 ++++++++++++++++++++++++++++++++-
 hw/i386/intel_iommu_internal.h        |  131 ++++
 hw/i386/trace-events                  |    6 +
 hw/iommu/Kconfig                      |    4 +
 hw/iommu/host_iommu_context.c         |  171 +++++
 hw/iommu/meson.build                  |    6 +
 hw/meson.build                        |    1 +
 hw/pci-host/designware.c              |    6 +-
 hw/pci-host/pnv_phb3.c                |    6 +-
 hw/pci-host/pnv_phb4.c                |    6 +-
 hw/pci-host/ppce500.c                 |    6 +-
 hw/pci-host/prep.c                    |    6 +-
 hw/pci-host/sabre.c                   |    6 +-
 hw/pci/pci.c                          |   73 +-
 hw/ppc/ppc440_pcix.c                  |    6 +-
 hw/ppc/spapr_pci.c                    |    6 +-
 hw/s390x/s390-pci-bus.c               |    8 +-
 hw/vfio/ap.c                          |    2 +-
 hw/vfio/ccw.c                         |    2 +-
 hw/vfio/common.c                      |  299 +++++++-
 hw/vfio/pci.c                         |   26 +-
 hw/vfio/platform.c                    |    2 +-
 hw/virtio/virtio-iommu.c              |    6 +-
 include/hw/i386/intel_iommu.h         |   61 +-
 include/hw/iommu/host_iommu_context.h |  103 +++
 include/hw/pci/pci.h                  |   25 +-
 include/hw/pci/pci_bus.h              |    2 +-
 include/hw/vfio/vfio-common.h         |    7 +-
 linux-headers/linux/iommu.h           |  420 +++++++++++
 linux-headers/linux/vfio.h            |  103 ++-
 scripts/update-linux-headers.sh       |    2 +-
 36 files changed, 2705 insertions(+), 61 deletions(-)
 create mode 100644 hw/iommu/Kconfig
 create mode 100644 hw/iommu/host_iommu_context.c
 create mode 100644 hw/iommu/meson.build
 create mode 100644 include/hw/iommu/host_iommu_context.h
 create mode 100644 linux-headers/linux/iommu.h


reply via email to

[Prev in Thread] Current Thread [Next in Thread]