[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [XEN PATCH v3] xen/arm: introduce dummy iommu node for dom0


  • To: Sergiy Kibrik <Sergiy_Kibrik@xxxxxxxx>
  • From: Rahul Singh <Rahul.Singh@xxxxxxx>
  • Date: Fri, 14 Jan 2022 08:21:35 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=gnUz3Bs6Swf0XDUbLTMu654w+yHd2hLWnHN6N6yr1xA=; b=RxzDidvO8H9amneAyX74n32oClepZTLfhb4m96h2sDo7G2I3v1nPpRcEvnpASBFxlgewdh/+tHkt/HrxIhN4NFA3iKKgNoAlqsqQUZEXT+tGKTKg+ccim2H+Xgk53QKPJU8lkn1XRPc3yJvz8c2r11bGQXuQr/2sp1UQQxv0Xa4eSCc/wvhJu4yGSO7riCPThavBI7XDLBlzy8Yd179NR/bH9n7O/gQoYYC+lKplxLiPCKnG1K0DcMKFUHXXW9RTGo4HRKxq9AWIM3uRIhUn878eI4qEzK3k1/tJ4Nsf/m7d6Y9TzQScwiHNhsa4TQcgbuWuiAyuZD43qDgR/sUBWg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=a+mvp9uMNYK/0ZKadn9rPnUpwDUdOd/s/FiFC8PWSfweI9wgV/QT9VBtcf/W2e3TRV/ABgVsQC5hqV737EZtuY9oLKQAJ1Y0/W0yH3qmvGUtgUqPLYAenyBTXl1AZu1lIMFWu2x019C9svg/jxx0Ht3AO7bLzxo20g6Kx78x5lrnV06/l8RMaTqx35uX/ZbZSx8ZynZJG43jcVXcHUOX6yeTCuS/yJpe3MqutgnOngR6ckfQ6Z+yPIlzuD7UUe/2Kb+W4cEmPXd/gyEyr8Ydq036W2tOJRI2SKPuzGcSYF0KaQM/GPYBm2mQxi99XMnYXV+CM56Ki2nO+9pmndtZSg==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Oleksandr Tyshchenko <olekstysh@xxxxxxxxx>, Andrii Anisov <Andrii_Anisov@xxxxxxxx>
  • Delivery-date: Fri, 14 Jan 2022 08:22:18 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHYBt4itusLhq1+GU+ohCCSHNq3taxiMcCA
  • Thread-topic: [XEN PATCH v3] xen/arm: introduce dummy iommu node for dom0

Hi,

> On 11 Jan 2022, at 11:26 am, Sergiy Kibrik <Sergiy_Kibrik@xxxxxxxx> wrote:
> 
> Currently no IOMMU properties are exposed to dom0, thus kernel by default
> assumes no protection and enables swiotlb-xen, which leads to costly and
> unnecessary buffers bouncing.
> 
> To let kernel know which device is behing IOMMU and hence needs no swiotlb
> services we introduce dummy xen-iommu node in FDT and link protected device
> nodes to it, using here device tree iommu bindings.
> 
> Signed-off-by: Sergiy Kibrik <Sergiy_Kibrik@xxxxxxxx>

Reviewed-by: Rahul Singh <rahul.singh@xxxxxxx>

Regards,
Rahul
> ---
> Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>
> Cc: Julien Grall <julien@xxxxxxx>
> Cc: Oleksandr Tyshchenko <olekstysh@xxxxxxxxx>
> Cc: Andrii Anisov <Andrii_Anisov@xxxxxxxx>
> 
> 
> Changelog:
> 
> v3: rebased over staging & remove redundand phandle_iommu attribute, 
> discussion:
>       
> https://lists.xenproject.org/archives/html/xen-devel/2021-12/msg01753.html
> 
> v2: re-use common iommu dt bindings to let guests know which devices are 
> protected:
>       
> https://lists.xenproject.org/archives/html/xen-devel/2021-10/msg00073.html
> 
> xen/arch/arm/domain_build.c           | 42 +++++++++++++++++++++++++++
> xen/include/public/device_tree_defs.h |  1 +
> 2 files changed, 43 insertions(+)
> 
> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> index 6931c022a2..b82ba72fac 100644
> --- a/xen/arch/arm/domain_build.c
> +++ b/xen/arch/arm/domain_build.c
> @@ -845,6 +845,12 @@ static int __init write_properties(struct domain *d, 
> struct kernel_info *kinfo,
>         }
>     }
> 
> +    if ( iommu_node && is_iommu_enabled(d) && dt_device_is_protected(node) )
> +    {
> +        res = fdt_property_cell(kinfo->fdt, "iommus", GUEST_PHANDLE_IOMMU);
> +        if ( res )
> +            return res;
> +    }
>     return 0;
> }
> 
> @@ -1479,6 +1485,38 @@ static int __init make_cpus_node(const struct domain 
> *d, void *fdt)
>     return res;
> }
> 
> +static int __init make_iommu_node(const struct domain *d,
> +                                  const struct kernel_info *kinfo)
> +{
> +    const char compat[] = "xen,iommu-el2-v1";
> +    int res;
> +
> +    if ( !is_iommu_enabled(d) )
> +        return 0;
> +
> +    dt_dprintk("Create iommu node\n");
> +
> +    res = fdt_begin_node(kinfo->fdt, "xen-iommu");
> +    if ( res )
> +        return res;
> +
> +    res = fdt_property(kinfo->fdt, "compatible", compat, sizeof(compat));
> +    if ( res )
> +        return res;
> +
> +    res = fdt_property_cell(kinfo->fdt, "#iommu-cells", 0);
> +    if ( res )
> +        return res;
> +
> +    res = fdt_property_cell(kinfo->fdt, "phandle", GUEST_PHANDLE_IOMMU);
> +
> +    res = fdt_end_node(kinfo->fdt);
> +    if ( res )
> +        return res;
> +
> +    return res;
> +}
> +
> static int __init make_gic_node(const struct domain *d, void *fdt,
>                                 const struct dt_device_node *node)
> {
> @@ -2127,6 +2165,10 @@ static int __init handle_node(struct domain *d, struct 
> kernel_info *kinfo,
>         if ( res )
>             return res;
> 
> +        res = make_iommu_node(d, kinfo);
> +        if ( res )
> +            return res;
> +
>         res = make_memory_node(d, kinfo->fdt, addrcells, sizecells, 
> &kinfo->mem);
>         if ( res )
>             return res;
> diff --git a/xen/include/public/device_tree_defs.h 
> b/xen/include/public/device_tree_defs.h
> index 209d43de3f..df58944bd0 100644
> --- a/xen/include/public/device_tree_defs.h
> +++ b/xen/include/public/device_tree_defs.h
> @@ -7,6 +7,7 @@
>  * onwards. Reserve a high value for the GIC phandle.
>  */
> #define GUEST_PHANDLE_GIC (65000)
> +#define GUEST_PHANDLE_IOMMU (GUEST_PHANDLE_GIC + 1)
> 
> #define GUEST_ROOT_ADDRESS_CELLS 2
> #define GUEST_ROOT_SIZE_CELLS 2
> -- 
> 2.25.1
> 
> 




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.