From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([208.118.235.92]:57133) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1SAkSa-0006ke-QI for qemu-devel@nongnu.org; Thu, 22 Mar 2012 12:02:05 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1SAkSR-0004Ux-90 for qemu-devel@nongnu.org; Thu, 22 Mar 2012 12:01:56 -0400 Received: from smtp.citrix.com ([66.165.176.89]:41445) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1SAkSR-0004UL-1i for qemu-devel@nongnu.org; Thu, 22 Mar 2012 12:01:47 -0400 From: Julien Grall Date: Thu, 22 Mar 2012 15:59:22 +0000 Message-ID: <2187e535bf91f5f650401a4e08e0e795003ad2aa.1332430810.git.julien.grall@citrix.com> In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain Subject: [Qemu-devel] [XEN][RFC PATCH 01/15] hvm: Modify interface to support multiple ioreq server List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: xen-devel@lists.xensource.com Cc: Stefano.Stabellini@eu.citrix.com, qemu-devel@nongnu.org, julian.pidancet@citrix.com Add structure to handle ioreq server. It's server which can handle a range of IO (MMIO and/or PIO) and emulate a PCI. Each server as its own shared page to receive ioreq. So we have introduced to HVM PARAM to set/get the first and the last shared used for ioreq. With it's id, the server knows which page it must use. We introduce a new kind a ioreq type IOREQ_TYPE_PCICONFIG which permit to forward easily PCI config space access. Signed-off-by: Julien Grall --- xen/include/asm-x86/hvm/domain.h | 24 +++++++++++++++++- xen/include/asm-x86/hvm/vcpu.h | 4 ++- xen/include/public/hvm/hvm_op.h | 49 ++++++++++++++++++++++++++++++++++++++ xen/include/public/hvm/ioreq.h | 1 + xen/include/public/hvm/params.h | 6 ++++- xen/include/public/xen.h | 1 + xen/include/xen/hvm/pci_emul.h | 37 ++++++++++++++++++++++++++++ 7 files changed, 119 insertions(+), 3 deletions(-) create mode 100644 xen/include/xen/hvm/pci_emul.h diff --git a/xen/include/asm-x86/hvm/domain.h b/xen/include/asm-x86/hvm/domain.h index 27b3de5..0cfdc69 100644 --- a/xen/include/asm-x86/hvm/domain.h +++ b/xen/include/asm-x86/hvm/domain.h @@ -28,6 +28,7 @@ #include #include #include +#include #include #include #include @@ -41,14 +42,35 @@ struct hvm_ioreq_page { void *va; }; +struct hvm_io_range { + uint64_t s, e; + struct hvm_io_range *next; +}; + +struct hvm_ioreq_server { + unsigned int id; + struct hvm_io_range *mmio_range_list; + struct hvm_io_range *portio_range_list; + struct hvm_ioreq_server *next; + struct hvm_ioreq_page ioreq; + struct hvm_ioreq_page buf_ioreq; + unsigned int buf_ioreq_evtchn; +}; + struct hvm_domain { + /* Use for the IO handles by Xen */ struct hvm_ioreq_page ioreq; - struct hvm_ioreq_page buf_ioreq; + struct hvm_ioreq_server *ioreq_server_list; + uint32_t nr_ioreq_server; + spinlock_t ioreq_server_lock; struct pl_time pl_time; struct hvm_io_handler *io_handler; + /* PCI Information */ + struct pci_root_emul pci_root; + /* Lock protects access to irq, vpic and vioapic. */ spinlock_t irq_lock; struct hvm_irq irq; diff --git a/xen/include/asm-x86/hvm/vcpu.h b/xen/include/asm-x86/hvm/vcpu.h index 537da96..2774ced 100644 --- a/xen/include/asm-x86/hvm/vcpu.h +++ b/xen/include/asm-x86/hvm/vcpu.h @@ -125,7 +125,9 @@ struct hvm_vcpu { spinlock_t tm_lock; struct list_head tm_list; - int xen_port; + struct hvm_ioreq_page *ioreq; + /* PCI Information */ + uint32_t pci_cf8; bool_t flag_dr_dirty; bool_t debug_state_latch; diff --git a/xen/include/public/hvm/hvm_op.h b/xen/include/public/hvm/hvm_op.h index 6a78f75..1e0e27b 100644 --- a/xen/include/public/hvm/hvm_op.h +++ b/xen/include/public/hvm/hvm_op.h @@ -24,6 +24,8 @@ #include "../xen.h" #include "../trace.h" +#include "hvm_info_table.h" /* HVM_MAX_VCPUS */ + /* Get/set subcommands: extra argument == pointer to xen_hvm_param struct. */ #define HVMOP_set_param 0 #define HVMOP_get_param 1 @@ -227,6 +229,53 @@ struct xen_hvm_inject_trap { typedef struct xen_hvm_inject_trap xen_hvm_inject_trap_t; DEFINE_XEN_GUEST_HANDLE(xen_hvm_inject_trap_t); +#define HVMOP_register_ioreq_server 20 +struct xen_hvm_register_ioreq_server { + domid_t domid; /* IN - domain to be serviced */ + unsigned int id; /* OUT - handle for identifying this server */ +}; +typedef struct xen_hvm_register_ioreq_server xen_hvm_register_ioreq_server_t; +DEFINE_XEN_GUEST_HANDLE(xen_hvm_register_ioreq_server_t); + +#define HVMOP_get_ioreq_server_buf_channel 21 +struct xen_hvm_get_ioreq_server_buf_channel { + domid_t domid; /* IN - domain to be serviced */ + servid_t id; /* IN - handle from HVMOP_register_ioreq_server */ + unsigned int channel; /* OUT - buf ioreq channel */ +}; +typedef struct xen_hvm_get_ioreq_server_buf_channel xen_hvm_get_ioreq_server_buf_channel_t; +DEFINE_XEN_GUEST_HANDLE(xen_hvm_get_ioreq_server_buf_channel_t); + +#define HVMOP_map_io_range_to_ioreq_server 22 +struct xen_hvm_map_io_range_to_ioreq_server { + domid_t domid; /* IN - domain to be serviced */ + uint8_t is_mmio; /* IN - MMIO or port IO? */ + servid_t id; /* IN - handle from HVMOP_register_ioreq_server */ + uint64_aligned_t s, e; /* IN - inclusive start and end of range */ +}; +typedef struct xen_hvm_map_io_range_to_ioreq_server xen_hvm_map_io_range_to_ioreq_server_t; +DEFINE_XEN_GUEST_HANDLE(xen_hvm_map_io_range_to_ioreq_server_t); + +#define HVMOP_unmap_io_range_from_ioreq_server 23 +struct xen_hvm_unmap_io_range_from_ioreq_server { + domid_t domid; /* IN - domain to be serviced */ + uint8_t is_mmio; /* IN - MMIO or port IO? */ + servid_t id; /* IN - handle from HVMOP_register_ioreq_server */ + uint64_aligned_t addr; /* IN - address inside the range to remove */ +}; +typedef struct xen_hvm_unmap_io_range_from_ioreq_server xen_hvm_unmap_io_range_from_ioreq_server_t; +DEFINE_XEN_GUEST_HANDLE(xen_hvm_unmap_io_range_from_ioreq_server_t); + +#define HVMOP_register_pcidev 24 +struct xen_hvm_register_pcidev { + domid_t domid; /* IN - domain to be serviced */ + servid_t id; /* IN - handle from HVMOP_register_ioreq_server */ + uint16_t bdf; /* IN - pci */ +}; +typedef struct xen_hvm_register_pcidev xen_hvm_register_pcidev_t; +DEFINE_XEN_GUEST_HANDLE(xen_hvm_register_pcidev_t); + + #endif /* defined(__XEN__) || defined(__XEN_TOOLS__) */ #define HVMOP_get_mem_type 15 diff --git a/xen/include/public/hvm/ioreq.h b/xen/include/public/hvm/ioreq.h index 4022a1d..87aacd3 100644 --- a/xen/include/public/hvm/ioreq.h +++ b/xen/include/public/hvm/ioreq.h @@ -34,6 +34,7 @@ #define IOREQ_TYPE_PIO 0 /* pio */ #define IOREQ_TYPE_COPY 1 /* mmio ops */ +#define IOREQ_TYPE_PCI_CONFIG 2 /* pci config space ops */ #define IOREQ_TYPE_TIMEOFFSET 7 #define IOREQ_TYPE_INVALIDATE 8 /* mapcache */ diff --git a/xen/include/public/hvm/params.h b/xen/include/public/hvm/params.h index 55c1b57..309ac1b 100644 --- a/xen/include/public/hvm/params.h +++ b/xen/include/public/hvm/params.h @@ -147,6 +147,10 @@ #define HVM_PARAM_ACCESS_RING_PFN 28 #define HVM_PARAM_SHARING_RING_PFN 29 -#define HVM_NR_PARAMS 30 +/* Param for ioreq servers */ +#define HVM_PARAM_IO_PFN_FIRST 30 +#define HVM_PARAM_IO_PFN_LAST 31 + +#define HVM_NR_PARAMS 32 #endif /* __XEN_PUBLIC_HVM_PARAMS_H__ */ diff --git a/xen/include/public/xen.h b/xen/include/public/xen.h index b2f6c50..26d0e9d 100644 --- a/xen/include/public/xen.h +++ b/xen/include/public/xen.h @@ -466,6 +466,7 @@ DEFINE_XEN_GUEST_HANDLE(mmuext_op_t); #ifndef __ASSEMBLY__ typedef uint16_t domid_t; +typedef uint32_t servid_t; /* Domain ids >= DOMID_FIRST_RESERVED cannot be used for ordinary domains. */ #define DOMID_FIRST_RESERVED (0x7FF0U) diff --git a/xen/include/xen/hvm/pci_emul.h b/xen/include/xen/hvm/pci_emul.h new file mode 100644 index 0000000..4e4a2fd --- /dev/null +++ b/xen/include/xen/hvm/pci_emul.h @@ -0,0 +1,37 @@ +#ifndef PCI_EMUL_H_ +# define PCI_EMUL_H_ + +# include +# include + +int hvm_init_pci_emul(struct domain *d); +void hvm_destroy_pci_emul(struct domain *d); +int hvm_register_pcidev(domid_t domid, servid_t id, u16 bdf); + +/* Size of the standard PCI config space */ +#define PCI_CONFIG_SPACE_SIZE 0x100 +#define PCI_CMP_BDF(Pci, Bdf) ((Pci)->bdf == PCI_MASK_BDF(Bdf)) +#define PCI_MASK_BDF(bdf) (((bdf) & 0x00ffff00) >> 8) + +struct pci_device_emul { + u16 bdf; + struct hvm_ioreq_server *server; + struct pci_device_emul *next; +}; + +struct pci_root_emul { + spinlock_t pci_lock; + struct pci_device_emul *pci; +}; + +#endif /* !PCI_EMUL_H_ */ + +/* + * Local variables: + * mode: C + * c-set-style: "BSD" + * c-basic-offset: 4 + * tab-width: 4 + * indent-tabs-mode: nil + * End: + */ -- Julien Grall From mboxrd@z Thu Jan 1 00:00:00 1970 From: Julien Grall Subject: [XEN][RFC PATCH 01/15] hvm: Modify interface to support multiple ioreq server Date: Thu, 22 Mar 2012 15:59:22 +0000 Message-ID: <2187e535bf91f5f650401a4e08e0e795003ad2aa.1332430810.git.julien.grall@citrix.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: xen-devel@lists.xensource.com Cc: Stefano.Stabellini@eu.citrix.com, qemu-devel@nongnu.org, julian.pidancet@citrix.com List-Id: xen-devel@lists.xenproject.org Add structure to handle ioreq server. It's server which can handle a range of IO (MMIO and/or PIO) and emulate a PCI. Each server as its own shared page to receive ioreq. So we have introduced to HVM PARAM to set/get the first and the last shared used for ioreq. With it's id, the server knows which page it must use. We introduce a new kind a ioreq type IOREQ_TYPE_PCICONFIG which permit to forward easily PCI config space access. Signed-off-by: Julien Grall --- xen/include/asm-x86/hvm/domain.h | 24 +++++++++++++++++- xen/include/asm-x86/hvm/vcpu.h | 4 ++- xen/include/public/hvm/hvm_op.h | 49 ++++++++++++++++++++++++++++++++++++++ xen/include/public/hvm/ioreq.h | 1 + xen/include/public/hvm/params.h | 6 ++++- xen/include/public/xen.h | 1 + xen/include/xen/hvm/pci_emul.h | 37 ++++++++++++++++++++++++++++ 7 files changed, 119 insertions(+), 3 deletions(-) create mode 100644 xen/include/xen/hvm/pci_emul.h diff --git a/xen/include/asm-x86/hvm/domain.h b/xen/include/asm-x86/hvm/domain.h index 27b3de5..0cfdc69 100644 --- a/xen/include/asm-x86/hvm/domain.h +++ b/xen/include/asm-x86/hvm/domain.h @@ -28,6 +28,7 @@ #include #include #include +#include #include #include #include @@ -41,14 +42,35 @@ struct hvm_ioreq_page { void *va; }; +struct hvm_io_range { + uint64_t s, e; + struct hvm_io_range *next; +}; + +struct hvm_ioreq_server { + unsigned int id; + struct hvm_io_range *mmio_range_list; + struct hvm_io_range *portio_range_list; + struct hvm_ioreq_server *next; + struct hvm_ioreq_page ioreq; + struct hvm_ioreq_page buf_ioreq; + unsigned int buf_ioreq_evtchn; +}; + struct hvm_domain { + /* Use for the IO handles by Xen */ struct hvm_ioreq_page ioreq; - struct hvm_ioreq_page buf_ioreq; + struct hvm_ioreq_server *ioreq_server_list; + uint32_t nr_ioreq_server; + spinlock_t ioreq_server_lock; struct pl_time pl_time; struct hvm_io_handler *io_handler; + /* PCI Information */ + struct pci_root_emul pci_root; + /* Lock protects access to irq, vpic and vioapic. */ spinlock_t irq_lock; struct hvm_irq irq; diff --git a/xen/include/asm-x86/hvm/vcpu.h b/xen/include/asm-x86/hvm/vcpu.h index 537da96..2774ced 100644 --- a/xen/include/asm-x86/hvm/vcpu.h +++ b/xen/include/asm-x86/hvm/vcpu.h @@ -125,7 +125,9 @@ struct hvm_vcpu { spinlock_t tm_lock; struct list_head tm_list; - int xen_port; + struct hvm_ioreq_page *ioreq; + /* PCI Information */ + uint32_t pci_cf8; bool_t flag_dr_dirty; bool_t debug_state_latch; diff --git a/xen/include/public/hvm/hvm_op.h b/xen/include/public/hvm/hvm_op.h index 6a78f75..1e0e27b 100644 --- a/xen/include/public/hvm/hvm_op.h +++ b/xen/include/public/hvm/hvm_op.h @@ -24,6 +24,8 @@ #include "../xen.h" #include "../trace.h" +#include "hvm_info_table.h" /* HVM_MAX_VCPUS */ + /* Get/set subcommands: extra argument == pointer to xen_hvm_param struct. */ #define HVMOP_set_param 0 #define HVMOP_get_param 1 @@ -227,6 +229,53 @@ struct xen_hvm_inject_trap { typedef struct xen_hvm_inject_trap xen_hvm_inject_trap_t; DEFINE_XEN_GUEST_HANDLE(xen_hvm_inject_trap_t); +#define HVMOP_register_ioreq_server 20 +struct xen_hvm_register_ioreq_server { + domid_t domid; /* IN - domain to be serviced */ + unsigned int id; /* OUT - handle for identifying this server */ +}; +typedef struct xen_hvm_register_ioreq_server xen_hvm_register_ioreq_server_t; +DEFINE_XEN_GUEST_HANDLE(xen_hvm_register_ioreq_server_t); + +#define HVMOP_get_ioreq_server_buf_channel 21 +struct xen_hvm_get_ioreq_server_buf_channel { + domid_t domid; /* IN - domain to be serviced */ + servid_t id; /* IN - handle from HVMOP_register_ioreq_server */ + unsigned int channel; /* OUT - buf ioreq channel */ +}; +typedef struct xen_hvm_get_ioreq_server_buf_channel xen_hvm_get_ioreq_server_buf_channel_t; +DEFINE_XEN_GUEST_HANDLE(xen_hvm_get_ioreq_server_buf_channel_t); + +#define HVMOP_map_io_range_to_ioreq_server 22 +struct xen_hvm_map_io_range_to_ioreq_server { + domid_t domid; /* IN - domain to be serviced */ + uint8_t is_mmio; /* IN - MMIO or port IO? */ + servid_t id; /* IN - handle from HVMOP_register_ioreq_server */ + uint64_aligned_t s, e; /* IN - inclusive start and end of range */ +}; +typedef struct xen_hvm_map_io_range_to_ioreq_server xen_hvm_map_io_range_to_ioreq_server_t; +DEFINE_XEN_GUEST_HANDLE(xen_hvm_map_io_range_to_ioreq_server_t); + +#define HVMOP_unmap_io_range_from_ioreq_server 23 +struct xen_hvm_unmap_io_range_from_ioreq_server { + domid_t domid; /* IN - domain to be serviced */ + uint8_t is_mmio; /* IN - MMIO or port IO? */ + servid_t id; /* IN - handle from HVMOP_register_ioreq_server */ + uint64_aligned_t addr; /* IN - address inside the range to remove */ +}; +typedef struct xen_hvm_unmap_io_range_from_ioreq_server xen_hvm_unmap_io_range_from_ioreq_server_t; +DEFINE_XEN_GUEST_HANDLE(xen_hvm_unmap_io_range_from_ioreq_server_t); + +#define HVMOP_register_pcidev 24 +struct xen_hvm_register_pcidev { + domid_t domid; /* IN - domain to be serviced */ + servid_t id; /* IN - handle from HVMOP_register_ioreq_server */ + uint16_t bdf; /* IN - pci */ +}; +typedef struct xen_hvm_register_pcidev xen_hvm_register_pcidev_t; +DEFINE_XEN_GUEST_HANDLE(xen_hvm_register_pcidev_t); + + #endif /* defined(__XEN__) || defined(__XEN_TOOLS__) */ #define HVMOP_get_mem_type 15 diff --git a/xen/include/public/hvm/ioreq.h b/xen/include/public/hvm/ioreq.h index 4022a1d..87aacd3 100644 --- a/xen/include/public/hvm/ioreq.h +++ b/xen/include/public/hvm/ioreq.h @@ -34,6 +34,7 @@ #define IOREQ_TYPE_PIO 0 /* pio */ #define IOREQ_TYPE_COPY 1 /* mmio ops */ +#define IOREQ_TYPE_PCI_CONFIG 2 /* pci config space ops */ #define IOREQ_TYPE_TIMEOFFSET 7 #define IOREQ_TYPE_INVALIDATE 8 /* mapcache */ diff --git a/xen/include/public/hvm/params.h b/xen/include/public/hvm/params.h index 55c1b57..309ac1b 100644 --- a/xen/include/public/hvm/params.h +++ b/xen/include/public/hvm/params.h @@ -147,6 +147,10 @@ #define HVM_PARAM_ACCESS_RING_PFN 28 #define HVM_PARAM_SHARING_RING_PFN 29 -#define HVM_NR_PARAMS 30 +/* Param for ioreq servers */ +#define HVM_PARAM_IO_PFN_FIRST 30 +#define HVM_PARAM_IO_PFN_LAST 31 + +#define HVM_NR_PARAMS 32 #endif /* __XEN_PUBLIC_HVM_PARAMS_H__ */ diff --git a/xen/include/public/xen.h b/xen/include/public/xen.h index b2f6c50..26d0e9d 100644 --- a/xen/include/public/xen.h +++ b/xen/include/public/xen.h @@ -466,6 +466,7 @@ DEFINE_XEN_GUEST_HANDLE(mmuext_op_t); #ifndef __ASSEMBLY__ typedef uint16_t domid_t; +typedef uint32_t servid_t; /* Domain ids >= DOMID_FIRST_RESERVED cannot be used for ordinary domains. */ #define DOMID_FIRST_RESERVED (0x7FF0U) diff --git a/xen/include/xen/hvm/pci_emul.h b/xen/include/xen/hvm/pci_emul.h new file mode 100644 index 0000000..4e4a2fd --- /dev/null +++ b/xen/include/xen/hvm/pci_emul.h @@ -0,0 +1,37 @@ +#ifndef PCI_EMUL_H_ +# define PCI_EMUL_H_ + +# include +# include + +int hvm_init_pci_emul(struct domain *d); +void hvm_destroy_pci_emul(struct domain *d); +int hvm_register_pcidev(domid_t domid, servid_t id, u16 bdf); + +/* Size of the standard PCI config space */ +#define PCI_CONFIG_SPACE_SIZE 0x100 +#define PCI_CMP_BDF(Pci, Bdf) ((Pci)->bdf == PCI_MASK_BDF(Bdf)) +#define PCI_MASK_BDF(bdf) (((bdf) & 0x00ffff00) >> 8) + +struct pci_device_emul { + u16 bdf; + struct hvm_ioreq_server *server; + struct pci_device_emul *next; +}; + +struct pci_root_emul { + spinlock_t pci_lock; + struct pci_device_emul *pci; +}; + +#endif /* !PCI_EMUL_H_ */ + +/* + * Local variables: + * mode: C + * c-set-style: "BSD" + * c-basic-offset: 4 + * tab-width: 4 + * indent-tabs-mode: nil + * End: + */ -- Julien Grall