[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v2 08/17] intel_iommu: Set accessed and dirty bits during fir
|
From: |
CLEMENT MATHIEU--DRIF |
|
Subject: |
Re: [PATCH v2 08/17] intel_iommu: Set accessed and dirty bits during first stage translation |
|
Date: |
Fri, 16 Aug 2024 04:29:38 +0000 |
On 16/08/2024 04:37, Duan, Zhenzhong wrote:
> Caution: External email. Do not open attachments or click links, unless this
> email comes from a known sender and you know the content is safe.
>
>
>> -----Original Message-----
>> From: Liu, Yi L <yi.l.liu@intel.com>
>> Subject: Re: [PATCH v2 08/17] intel_iommu: Set accessed and dirty bits
>> during first stage translation
>>
>> On 2024/8/5 14:27, Zhenzhong Duan wrote:
>>> From: Clément Mathieu--Drif <clement.mathieu--drif@eviden.com>
>>>
>>> Signed-off-by: Clément Mathieu--Drif <clement.mathieu--drif@eviden.com>
>>> Signed-off-by: Zhenzhong Duan <zhenzhong.duan@intel.com>
>>> ---
>>> hw/i386/intel_iommu_internal.h | 3 +++
>>> hw/i386/intel_iommu.c | 24 ++++++++++++++++++++++++
>>> 2 files changed, 27 insertions(+)
>>>
>>> diff --git a/hw/i386/intel_iommu_internal.h
>> b/hw/i386/intel_iommu_internal.h
>>> index 668583aeca..7786ef7624 100644
>>> --- a/hw/i386/intel_iommu_internal.h
>>> +++ b/hw/i386/intel_iommu_internal.h
>>> @@ -324,6 +324,7 @@ typedef enum VTDFaultReason {
>>>
>>> /* Output address in the interrupt address range for scalable mode */
>>> VTD_FR_SM_INTERRUPT_ADDR = 0x87,
>>> + VTD_FR_FS_BIT_UPDATE_FAILED = 0x91, /* SFS.10 */
>>> VTD_FR_MAX, /* Guard */
>>> } VTDFaultReason;
>>>
>>> @@ -549,6 +550,8 @@ typedef struct VTDRootEntry VTDRootEntry;
>>> /* Masks for First Level Paging Entry */
>>> #define VTD_FL_P 1ULL
>>> #define VTD_FL_RW_MASK (1ULL << 1)
>>> +#define VTD_FL_A 0x20
>>> +#define VTD_FL_D 0x40
>>>
>>> /* Second Level Page Translation Pointer*/
>>> #define VTD_SM_PASID_ENTRY_SLPTPTR (~0xfffULL)
>>> diff --git a/hw/i386/intel_iommu.c b/hw/i386/intel_iommu.c
>>> index 6121cca4cd..3c2ceed284 100644
>>> --- a/hw/i386/intel_iommu.c
>>> +++ b/hw/i386/intel_iommu.c
>>> @@ -1822,6 +1822,7 @@ static const bool vtd_qualified_faults[] = {
>>> [VTD_FR_PASID_TABLE_ENTRY_INV] = true,
>>> [VTD_FR_SM_INTERRUPT_ADDR] = true,
>>> [VTD_FR_FS_NON_CANONICAL] = true,
>>> + [VTD_FR_FS_BIT_UPDATE_FAILED] = true,
>>> [VTD_FR_MAX] = false,
>>> };
>>>
>>> @@ -1939,6 +1940,20 @@ static bool
>> vtd_iova_fl_check_canonical(IntelIOMMUState *s, uint64_t iova,
>>> );
>>> }
>>>
>>> +static MemTxResult vtd_set_flag_in_pte(dma_addr_t base_addr,
>> uint32_t index,
>>> + uint64_t pte, uint64_t flag)
>>> +{
>>> + if (pte & flag) {
>>> + return MEMTX_OK;
>>> + }
>>> + pte |= flag;
>>> + pte = cpu_to_le64(pte);
>>> + return dma_memory_write(&address_space_memory,
>>> + base_addr + index * sizeof(pte),
>>> + &pte, sizeof(pte),
>>> + MEMTXATTRS_UNSPECIFIED);
>> Can we ensure this write is atomic? A/D bit setting should be atomic from
>> guest p.o.v.
> Yes, what about below:
>
> @@ -2096,7 +2096,7 @@ static int vtd_iova_to_flpte(IntelIOMMUState *s,
> VTDContextEntry *ce,
> dma_addr_t addr = vtd_get_iova_pgtbl_base(s, ce, pasid);
> uint32_t level = vtd_get_iova_level(s, ce, pasid);
> uint32_t offset;
> - uint64_t flpte;
> + uint64_t flpte, flag_ad = VTD_FL_A;
>
> if (!vtd_iova_fl_check_canonical(s, iova, ce, pasid)) {
> error_report_once("%s: detected non canonical IOVA (iova=0x%"
> PRIx64 ","
> @@ -2134,16 +2134,15 @@ static int vtd_iova_to_flpte(IntelIOMMUState *s,
> VTDContextEntry *ce,
> return -VTD_FR_PAGING_ENTRY_RSVD;
> }
>
> - if (vtd_set_flag_in_pte(addr, offset, flpte, VTD_FL_A) != MEMTX_OK) {
> + if (vtd_is_last_pte(flpte, level) && is_write) {
> + flag_ad |= VTD_FL_D;
> + }
> +
> + if (vtd_set_flag_in_pte(addr, offset, flpte, flag_ad) != MEMTX_OK) {
> return -VTD_FR_FS_BIT_UPDATE_FAILED;
> }
>
> if (vtd_is_last_pte(flpte, level)) {
> - if (is_write &&
> - (vtd_set_flag_in_pte(addr, offset, flpte, VTD_FL_D) !=
> -
> MEMTX_OK)) {
> - return -VTD_FR_FS_BIT_UPDATE_FAILED;
> - }
> *flptep = flpte;
> *flpte_level = level;
> return 0;
lgtm
Thanks
>cmd
>
> Thanks
> Zhenzhong
>
- RE: [PATCH v2 04/17] intel_iommu: Flush stage-2 cache in PASID-selective PASID-based iotlb invalidation, (continued)
[PATCH v2 05/17] intel_iommu: Rename slpte to pte, Zhenzhong Duan, 2024/08/05
[PATCH v2 06/17] intel_iommu: Implement stage-1 translation, Zhenzhong Duan, 2024/08/05
[PATCH v2 07/17] intel_iommu: Check if the input address is canonical, Zhenzhong Duan, 2024/08/05
[PATCH v2 08/17] intel_iommu: Set accessed and dirty bits during first stage translation, Zhenzhong Duan, 2024/08/05
[PATCH v2 09/17] intel_iommu: Flush stage-1 cache in iotlb invalidation, Zhenzhong Duan, 2024/08/05
[PATCH v2 13/17] intel_iommu: piotlb invalidation should notify unmap, Zhenzhong Duan, 2024/08/05
[PATCH v2 10/17] intel_iommu: Process PASID-based iotlb invalidation, Zhenzhong Duan, 2024/08/05
[PATCH v2 12/17] intel_iommu: Add support for PASID-based device IOTLB invalidation, Zhenzhong Duan, 2024/08/05
[PATCH v2 11/17] intel_iommu: Add an internal API to find an address space with PASID, Zhenzhong Duan, 2024/08/05