mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-11-24 12:50:52 +07:00
d8cac29b1d
This region provides a mechanism to pass a Channel Report Word that affect vfio-ccw devices, and needs to be passed to the guest for its awareness and/or processing. The base driver (see crw_collect_info()) provides space for two CRWs, as a subchannel event may have two CRWs chained together (one for the ssid, one for the subchannel). As vfio-ccw will deal with everything at the subchannel level, provide space for a single CRW to be transferred in one shot. Signed-off-by: Farhan Ali <alifm@linux.ibm.com> Signed-off-by: Eric Farman <farman@linux.ibm.com> Reviewed-by: Cornelia Huck <cohuck@redhat.com> Message-Id: <20200505122745.53208-7-farman@linux.ibm.com> [CH: added padding to ccw_crw_region] Signed-off-by: Cornelia Huck <cohuck@redhat.com>
446 lines
16 KiB
ReStructuredText
446 lines
16 KiB
ReStructuredText
==================================
|
|
vfio-ccw: the basic infrastructure
|
|
==================================
|
|
|
|
Introduction
|
|
------------
|
|
|
|
Here we describe the vfio support for I/O subchannel devices for
|
|
Linux/s390. Motivation for vfio-ccw is to passthrough subchannels to a
|
|
virtual machine, while vfio is the means.
|
|
|
|
Different than other hardware architectures, s390 has defined a unified
|
|
I/O access method, which is so called Channel I/O. It has its own access
|
|
patterns:
|
|
|
|
- Channel programs run asynchronously on a separate (co)processor.
|
|
- The channel subsystem will access any memory designated by the caller
|
|
in the channel program directly, i.e. there is no iommu involved.
|
|
|
|
Thus when we introduce vfio support for these devices, we realize it
|
|
with a mediated device (mdev) implementation. The vfio mdev will be
|
|
added to an iommu group, so as to make itself able to be managed by the
|
|
vfio framework. And we add read/write callbacks for special vfio I/O
|
|
regions to pass the channel programs from the mdev to its parent device
|
|
(the real I/O subchannel device) to do further address translation and
|
|
to perform I/O instructions.
|
|
|
|
This document does not intend to explain the s390 I/O architecture in
|
|
every detail. More information/reference could be found here:
|
|
|
|
- A good start to know Channel I/O in general:
|
|
https://en.wikipedia.org/wiki/Channel_I/O
|
|
- s390 architecture:
|
|
s390 Principles of Operation manual (IBM Form. No. SA22-7832)
|
|
- The existing QEMU code which implements a simple emulated channel
|
|
subsystem could also be a good reference. It makes it easier to follow
|
|
the flow.
|
|
qemu/hw/s390x/css.c
|
|
|
|
For vfio mediated device framework:
|
|
- Documentation/driver-api/vfio-mediated-device.rst
|
|
|
|
Motivation of vfio-ccw
|
|
----------------------
|
|
|
|
Typically, a guest virtualized via QEMU/KVM on s390 only sees
|
|
paravirtualized virtio devices via the "Virtio Over Channel I/O
|
|
(virtio-ccw)" transport. This makes virtio devices discoverable via
|
|
standard operating system algorithms for handling channel devices.
|
|
|
|
However this is not enough. On s390 for the majority of devices, which
|
|
use the standard Channel I/O based mechanism, we also need to provide
|
|
the functionality of passing through them to a QEMU virtual machine.
|
|
This includes devices that don't have a virtio counterpart (e.g. tape
|
|
drives) or that have specific characteristics which guests want to
|
|
exploit.
|
|
|
|
For passing a device to a guest, we want to use the same interface as
|
|
everybody else, namely vfio. We implement this vfio support for channel
|
|
devices via the vfio mediated device framework and the subchannel device
|
|
driver "vfio_ccw".
|
|
|
|
Access patterns of CCW devices
|
|
------------------------------
|
|
|
|
s390 architecture has implemented a so called channel subsystem, that
|
|
provides a unified view of the devices physically attached to the
|
|
systems. Though the s390 hardware platform knows about a huge variety of
|
|
different peripheral attachments like disk devices (aka. DASDs), tapes,
|
|
communication controllers, etc. They can all be accessed by a well
|
|
defined access method and they are presenting I/O completion a unified
|
|
way: I/O interruptions.
|
|
|
|
All I/O requires the use of channel command words (CCWs). A CCW is an
|
|
instruction to a specialized I/O channel processor. A channel program is
|
|
a sequence of CCWs which are executed by the I/O channel subsystem. To
|
|
issue a channel program to the channel subsystem, it is required to
|
|
build an operation request block (ORB), which can be used to point out
|
|
the format of the CCW and other control information to the system. The
|
|
operating system signals the I/O channel subsystem to begin executing
|
|
the channel program with a SSCH (start sub-channel) instruction. The
|
|
central processor is then free to proceed with non-I/O instructions
|
|
until interrupted. The I/O completion result is received by the
|
|
interrupt handler in the form of interrupt response block (IRB).
|
|
|
|
Back to vfio-ccw, in short:
|
|
|
|
- ORBs and channel programs are built in guest kernel (with guest
|
|
physical addresses).
|
|
- ORBs and channel programs are passed to the host kernel.
|
|
- Host kernel translates the guest physical addresses to real addresses
|
|
and starts the I/O with issuing a privileged Channel I/O instruction
|
|
(e.g SSCH).
|
|
- channel programs run asynchronously on a separate processor.
|
|
- I/O completion will be signaled to the host with I/O interruptions.
|
|
And it will be copied as IRB to user space to pass it back to the
|
|
guest.
|
|
|
|
Physical vfio ccw device and its child mdev
|
|
-------------------------------------------
|
|
|
|
As mentioned above, we realize vfio-ccw with a mdev implementation.
|
|
|
|
Channel I/O does not have IOMMU hardware support, so the physical
|
|
vfio-ccw device does not have an IOMMU level translation or isolation.
|
|
|
|
Subchannel I/O instructions are all privileged instructions. When
|
|
handling the I/O instruction interception, vfio-ccw has the software
|
|
policing and translation how the channel program is programmed before
|
|
it gets sent to hardware.
|
|
|
|
Within this implementation, we have two drivers for two types of
|
|
devices:
|
|
|
|
- The vfio_ccw driver for the physical subchannel device.
|
|
This is an I/O subchannel driver for the real subchannel device. It
|
|
realizes a group of callbacks and registers to the mdev framework as a
|
|
parent (physical) device. As a consequence, mdev provides vfio_ccw a
|
|
generic interface (sysfs) to create mdev devices. A vfio mdev could be
|
|
created by vfio_ccw then and added to the mediated bus. It is the vfio
|
|
device that added to an IOMMU group and a vfio group.
|
|
vfio_ccw also provides an I/O region to accept channel program
|
|
request from user space and store I/O interrupt result for user
|
|
space to retrieve. To notify user space an I/O completion, it offers
|
|
an interface to setup an eventfd fd for asynchronous signaling.
|
|
|
|
- The vfio_mdev driver for the mediated vfio ccw device.
|
|
This is provided by the mdev framework. It is a vfio device driver for
|
|
the mdev that created by vfio_ccw.
|
|
It realizes a group of vfio device driver callbacks, adds itself to a
|
|
vfio group, and registers itself to the mdev framework as a mdev
|
|
driver.
|
|
It uses a vfio iommu backend that uses the existing map and unmap
|
|
ioctls, but rather than programming them into an IOMMU for a device,
|
|
it simply stores the translations for use by later requests. This
|
|
means that a device programmed in a VM with guest physical addresses
|
|
can have the vfio kernel convert that address to process virtual
|
|
address, pin the page and program the hardware with the host physical
|
|
address in one step.
|
|
For a mdev, the vfio iommu backend will not pin the pages during the
|
|
VFIO_IOMMU_MAP_DMA ioctl. Mdev framework will only maintain a database
|
|
of the iova<->vaddr mappings in this operation. And they export a
|
|
vfio_pin_pages and a vfio_unpin_pages interfaces from the vfio iommu
|
|
backend for the physical devices to pin and unpin pages by demand.
|
|
|
|
Below is a high Level block diagram::
|
|
|
|
+-------------+
|
|
| |
|
|
| +---------+ | mdev_register_driver() +--------------+
|
|
| | Mdev | +<-----------------------+ |
|
|
| | bus | | | vfio_mdev.ko |
|
|
| | driver | +----------------------->+ |<-> VFIO user
|
|
| +---------+ | probe()/remove() +--------------+ APIs
|
|
| |
|
|
| MDEV CORE |
|
|
| MODULE |
|
|
| mdev.ko |
|
|
| +---------+ | mdev_register_device() +--------------+
|
|
| |Physical | +<-----------------------+ |
|
|
| | device | | | vfio_ccw.ko |<-> subchannel
|
|
| |interface| +----------------------->+ | device
|
|
| +---------+ | callback +--------------+
|
|
+-------------+
|
|
|
|
The process of how these work together.
|
|
|
|
1. vfio_ccw.ko drives the physical I/O subchannel, and registers the
|
|
physical device (with callbacks) to mdev framework.
|
|
When vfio_ccw probing the subchannel device, it registers device
|
|
pointer and callbacks to the mdev framework. Mdev related file nodes
|
|
under the device node in sysfs would be created for the subchannel
|
|
device, namely 'mdev_create', 'mdev_destroy' and
|
|
'mdev_supported_types'.
|
|
2. Create a mediated vfio ccw device.
|
|
Use the 'mdev_create' sysfs file, we need to manually create one (and
|
|
only one for our case) mediated device.
|
|
3. vfio_mdev.ko drives the mediated ccw device.
|
|
vfio_mdev is also the vfio device drvier. It will probe the mdev and
|
|
add it to an iommu_group and a vfio_group. Then we could pass through
|
|
the mdev to a guest.
|
|
|
|
|
|
VFIO-CCW Regions
|
|
----------------
|
|
|
|
The vfio-ccw driver exposes MMIO regions to accept requests from and return
|
|
results to userspace.
|
|
|
|
vfio-ccw I/O region
|
|
-------------------
|
|
|
|
An I/O region is used to accept channel program request from user
|
|
space and store I/O interrupt result for user space to retrieve. The
|
|
definition of the region is::
|
|
|
|
struct ccw_io_region {
|
|
#define ORB_AREA_SIZE 12
|
|
__u8 orb_area[ORB_AREA_SIZE];
|
|
#define SCSW_AREA_SIZE 12
|
|
__u8 scsw_area[SCSW_AREA_SIZE];
|
|
#define IRB_AREA_SIZE 96
|
|
__u8 irb_area[IRB_AREA_SIZE];
|
|
__u32 ret_code;
|
|
} __packed;
|
|
|
|
This region is always available.
|
|
|
|
While starting an I/O request, orb_area should be filled with the
|
|
guest ORB, and scsw_area should be filled with the SCSW of the Virtual
|
|
Subchannel.
|
|
|
|
irb_area stores the I/O result.
|
|
|
|
ret_code stores a return code for each access of the region. The following
|
|
values may occur:
|
|
|
|
``0``
|
|
The operation was successful.
|
|
|
|
``-EOPNOTSUPP``
|
|
The orb specified transport mode or an unidentified IDAW format, or the
|
|
scsw specified a function other than the start function.
|
|
|
|
``-EIO``
|
|
A request was issued while the device was not in a state ready to accept
|
|
requests, or an internal error occurred.
|
|
|
|
``-EBUSY``
|
|
The subchannel was status pending or busy, or a request is already active.
|
|
|
|
``-EAGAIN``
|
|
A request was being processed, and the caller should retry.
|
|
|
|
``-EACCES``
|
|
The channel path(s) used for the I/O were found to be not operational.
|
|
|
|
``-ENODEV``
|
|
The device was found to be not operational.
|
|
|
|
``-EINVAL``
|
|
The orb specified a chain longer than 255 ccws, or an internal error
|
|
occurred.
|
|
|
|
|
|
vfio-ccw cmd region
|
|
-------------------
|
|
|
|
The vfio-ccw cmd region is used to accept asynchronous instructions
|
|
from userspace::
|
|
|
|
#define VFIO_CCW_ASYNC_CMD_HSCH (1 << 0)
|
|
#define VFIO_CCW_ASYNC_CMD_CSCH (1 << 1)
|
|
struct ccw_cmd_region {
|
|
__u32 command;
|
|
__u32 ret_code;
|
|
} __packed;
|
|
|
|
This region is exposed via region type VFIO_REGION_SUBTYPE_CCW_ASYNC_CMD.
|
|
|
|
Currently, CLEAR SUBCHANNEL and HALT SUBCHANNEL use this region.
|
|
|
|
command specifies the command to be issued; ret_code stores a return code
|
|
for each access of the region. The following values may occur:
|
|
|
|
``0``
|
|
The operation was successful.
|
|
|
|
``-ENODEV``
|
|
The device was found to be not operational.
|
|
|
|
``-EINVAL``
|
|
A command other than halt or clear was specified.
|
|
|
|
``-EIO``
|
|
A request was issued while the device was not in a state ready to accept
|
|
requests.
|
|
|
|
``-EAGAIN``
|
|
A request was being processed, and the caller should retry.
|
|
|
|
``-EBUSY``
|
|
The subchannel was status pending or busy while processing a halt request.
|
|
|
|
vfio-ccw schib region
|
|
---------------------
|
|
|
|
The vfio-ccw schib region is used to return Subchannel-Information
|
|
Block (SCHIB) data to userspace::
|
|
|
|
struct ccw_schib_region {
|
|
#define SCHIB_AREA_SIZE 52
|
|
__u8 schib_area[SCHIB_AREA_SIZE];
|
|
} __packed;
|
|
|
|
This region is exposed via region type VFIO_REGION_SUBTYPE_CCW_SCHIB.
|
|
|
|
Reading this region triggers a STORE SUBCHANNEL to be issued to the
|
|
associated hardware.
|
|
|
|
vfio-ccw crw region
|
|
---------------------
|
|
|
|
The vfio-ccw crw region is used to return Channel Report Word (CRW)
|
|
data to userspace::
|
|
|
|
struct ccw_crw_region {
|
|
__u32 crw;
|
|
__u32 pad;
|
|
} __packed;
|
|
|
|
This region is exposed via region type VFIO_REGION_SUBTYPE_CCW_CRW.
|
|
|
|
Reading this region returns a CRW if one that is relevant for this
|
|
subchannel (e.g. one reporting changes in channel path state) is
|
|
pending, or all zeroes if not. If multiple CRWs are pending (including
|
|
possibly chained CRWs), reading this region again will return the next
|
|
one, until no more CRWs are pending and zeroes are returned. This is
|
|
similar to how STORE CHANNEL REPORT WORD works.
|
|
|
|
vfio-ccw operation details
|
|
--------------------------
|
|
|
|
vfio-ccw follows what vfio-pci did on the s390 platform and uses
|
|
vfio-iommu-type1 as the vfio iommu backend.
|
|
|
|
* CCW translation APIs
|
|
A group of APIs (start with `cp_`) to do CCW translation. The CCWs
|
|
passed in by a user space program are organized with their guest
|
|
physical memory addresses. These APIs will copy the CCWs into kernel
|
|
space, and assemble a runnable kernel channel program by updating the
|
|
guest physical addresses with their corresponding host physical addresses.
|
|
Note that we have to use IDALs even for direct-access CCWs, as the
|
|
referenced memory can be located anywhere, including above 2G.
|
|
|
|
* vfio_ccw device driver
|
|
This driver utilizes the CCW translation APIs and introduces
|
|
vfio_ccw, which is the driver for the I/O subchannel devices you want
|
|
to pass through.
|
|
vfio_ccw implements the following vfio ioctls::
|
|
|
|
VFIO_DEVICE_GET_INFO
|
|
VFIO_DEVICE_GET_IRQ_INFO
|
|
VFIO_DEVICE_GET_REGION_INFO
|
|
VFIO_DEVICE_RESET
|
|
VFIO_DEVICE_SET_IRQS
|
|
|
|
This provides an I/O region, so that the user space program can pass a
|
|
channel program to the kernel, to do further CCW translation before
|
|
issuing them to a real device.
|
|
This also provides the SET_IRQ ioctl to setup an event notifier to
|
|
notify the user space program the I/O completion in an asynchronous
|
|
way.
|
|
|
|
The use of vfio-ccw is not limited to QEMU, while QEMU is definitely a
|
|
good example to get understand how these patches work. Here is a little
|
|
bit more detail how an I/O request triggered by the QEMU guest will be
|
|
handled (without error handling).
|
|
|
|
Explanation:
|
|
|
|
- Q1-Q7: QEMU side process.
|
|
- K1-K5: Kernel side process.
|
|
|
|
Q1.
|
|
Get I/O region info during initialization.
|
|
|
|
Q2.
|
|
Setup event notifier and handler to handle I/O completion.
|
|
|
|
... ...
|
|
|
|
Q3.
|
|
Intercept a ssch instruction.
|
|
Q4.
|
|
Write the guest channel program and ORB to the I/O region.
|
|
|
|
K1.
|
|
Copy from guest to kernel.
|
|
K2.
|
|
Translate the guest channel program to a host kernel space
|
|
channel program, which becomes runnable for a real device.
|
|
K3.
|
|
With the necessary information contained in the orb passed in
|
|
by QEMU, issue the ccwchain to the device.
|
|
K4.
|
|
Return the ssch CC code.
|
|
Q5.
|
|
Return the CC code to the guest.
|
|
|
|
... ...
|
|
|
|
K5.
|
|
Interrupt handler gets the I/O result and write the result to
|
|
the I/O region.
|
|
K6.
|
|
Signal QEMU to retrieve the result.
|
|
|
|
Q6.
|
|
Get the signal and event handler reads out the result from the I/O
|
|
region.
|
|
Q7.
|
|
Update the irb for the guest.
|
|
|
|
Limitations
|
|
-----------
|
|
|
|
The current vfio-ccw implementation focuses on supporting basic commands
|
|
needed to implement block device functionality (read/write) of DASD/ECKD
|
|
device only. Some commands may need special handling in the future, for
|
|
example, anything related to path grouping.
|
|
|
|
DASD is a kind of storage device. While ECKD is a data recording format.
|
|
More information for DASD and ECKD could be found here:
|
|
https://en.wikipedia.org/wiki/Direct-access_storage_device
|
|
https://en.wikipedia.org/wiki/Count_key_data
|
|
|
|
Together with the corresponding work in QEMU, we can bring the passed
|
|
through DASD/ECKD device online in a guest now and use it as a block
|
|
device.
|
|
|
|
The current code allows the guest to start channel programs via
|
|
START SUBCHANNEL, and to issue HALT SUBCHANNEL, CLEAR SUBCHANNEL,
|
|
and STORE SUBCHANNEL.
|
|
|
|
Currently all channel programs are prefetched, regardless of the
|
|
p-bit setting in the ORB. As a result, self modifying channel
|
|
programs are not supported. For this reason, IPL has to be handled as
|
|
a special case by a userspace/guest program; this has been implemented
|
|
in QEMU's s390-ccw bios as of QEMU 4.1.
|
|
|
|
vfio-ccw supports classic (command mode) channel I/O only. Transport
|
|
mode (HPF) is not supported.
|
|
|
|
QDIO subchannels are currently not supported. Classic devices other than
|
|
DASD/ECKD might work, but have not been tested.
|
|
|
|
Reference
|
|
---------
|
|
1. ESA/s390 Principles of Operation manual (IBM Form. No. SA22-7832)
|
|
2. ESA/390 Common I/O Device Commands manual (IBM Form. No. SA22-7204)
|
|
3. https://en.wikipedia.org/wiki/Channel_I/O
|
|
4. Documentation/s390/cds.rst
|
|
5. Documentation/driver-api/vfio.rst
|
|
6. Documentation/driver-api/vfio-mediated-device.rst
|