From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-BN3-obe.outbound.protection.outlook.com (mail-bn3nam01on0057.outbound.protection.outlook.com [104.47.33.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 19D6021DF37CB for ; Mon, 7 Aug 2017 04:57:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=WfHJ+yxa5um498Rii+ig16TWHbTYW0QZo/yHsNlCTlg=; b=GLTI6RSIHJ+qvBnUvBt65esK/CARBu/256XPoDb0fT32E/BjKXJcn3jsUGVc3SWOQYPYtrCEQrpzpyE5YBe4ofZ4uOwyC5ICeuc7tniNPU4EopF6yGhJZzuw8CatBCIfdzLedAsJHyEeleGxVJgQjCBHD2oRqoRJ04izbCRNAeA= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=brijesh.singh@amd.com; Received: from brijesh-build-machine.amd.com (165.204.77.1) by SN1PR12MB0159.namprd12.prod.outlook.com (10.162.3.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1320.16; Mon, 7 Aug 2017 11:59:21 +0000 From: Brijesh Singh To: edk2-devel@lists.01.org Cc: Brijesh Singh , Ard Biesheuvel , Jordan Justen , Tom Lendacky , Laszlo Ersek Date: Mon, 7 Aug 2017 07:58:46 -0400 Message-Id: <1502107139-412-2-git-send-email-brijesh.singh@amd.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1502107139-412-1-git-send-email-brijesh.singh@amd.com> References: <1502107139-412-1-git-send-email-brijesh.singh@amd.com> MIME-Version: 1.0 X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: CY4PR04CA0033.namprd04.prod.outlook.com (10.172.133.19) To SN1PR12MB0159.namprd12.prod.outlook.com (10.162.3.146) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 5d22e2f8-0d40-4473-fef4-08d4dd8bbe03 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(48565401081)(300000503095)(300135400095)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:SN1PR12MB0159; X-Microsoft-Exchange-Diagnostics: 1; SN1PR12MB0159; 3:OWpXBYOc8Qhx+1hkFyEf2O2yPX0IVlthGwA32JilVazmg4RorWsl5xrqcjmkXMacqDYFyMttHA2RZG2LM8VgPljXdOy3iCW6buG5rohY3+AoSdGXUsomP4LGDW3eZD2ct/Zo8lxm9jN7eOO8rFz1fdJ7zb6/qJtkRBdBjPgoIoL9ddh7CwXmoxqQPpc2QnEG32hjQ78kTsDlqH6FyZ4zXYbOzdP68ivpTIEilvo2des+4j9mSZKN04UnZ1pje4ze; 25:BdoXlcJx+xC0J6Iu0B34czuTH+s6kIZMHTmdLmAdmkI31wSgUUKc7yua5NjfpfqiqPabaHs23YUREOUJAqVHPm0EWzaRPke26l8QvrAJO6ZXtL17pSTlN1rU9uB8ikZCqyER2HM73136XI8yWO5sp/ridxsxZZtUhPh89Snh1pVz/SvSBKOIEOhQZfKScxDQ344AycT4/F4/9wKamyA7qRsuvAGe55ImEPhDrHE8BY/KM6TZIpe7EPJapFclREffuF8pi8lrH26yLoendzb9vYwL9iItyscf2zZy0ayQ7Oo17e1EFSDGe4LqSWr8ZB3yTYzqMh44XZprvfcBER6OCg==; 31:sZDCd07jg626JMDvqxxZumD2I+E5uv1hu0EbUoBuoUrVaIWg3q6zXBOeWIokWA3J1pJjcBatDC7M7pPRCBmxIlZdoIvg3YwoLy1i97tcGrwYxFOVvY+5ICo4migUHnaUQ4jCuYmEzYmC89w6l8v9ZonPzOKgdMFfalgHaKkpvqfI9txDwJQ0Z5M1sN1TdAxa/z4VE66aZ4+8b3PR0XR5Nhs2gDVKjmCHakE5raWJ10E= X-MS-TrafficTypeDiagnostic: SN1PR12MB0159: X-Microsoft-Exchange-Diagnostics: 1; SN1PR12MB0159; 20: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; 4:Ha9TsPG52QdpgBbnkIDT0OOQ04AJ0AD71ee+utC39urCUESbkPJ/2o5wOzgoo4u9B69Fd4Nw+X6+tTMXoojSSV6OEQNgDuilxAzsdMIlHp0zdMrlyNtYdxSJWf/XbTO2d1R8YYe9NnPKX741BNgkbsQy4VtkbI/ur6Ssj7Tkyr+VvpZRe+sPw3Joosq2A8mdMOP01qb9fbfr/ShYC922LlMhEUXbsTLwZbyNZtTbeLuqamZA4nreU1Rc9W4r3zrIu9H1Urij3C9uiV6iQ888x35WukXKK+ln0CR/VJgq0LWlDYyQl3PVjS74vJR02fLSqPtigp9pThF0QjCGrYiH3w== X-Exchange-Antispam-Report-Test: UriScan:(767451399110)(228905959029699); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(100000703101)(100105400095)(93006095)(93001095)(10201501046)(3002001)(6055026)(6041248)(20161123562025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123564025)(20161123558100)(20161123560025)(20161123555025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:SN1PR12MB0159; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:SN1PR12MB0159; X-Forefront-PRVS: 0392679D18 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(7370300001)(6009001)(39400400002)(39850400002)(39450400003)(39410400002)(39840400002)(39860400002)(199003)(189002)(3846002)(6116002)(5660300001)(81156014)(81166006)(54906002)(8676002)(68736007)(50466002)(53936002)(53416004)(106356001)(2950100002)(105586002)(2351001)(42186005)(86362001)(6666003)(5003940100001)(36756003)(189998001)(33646002)(6916009)(97736004)(25786009)(2906002)(478600001)(110136004)(47776003)(38730400002)(76176999)(50986999)(66066001)(4326008)(2361001)(305945005)(50226002)(48376002)(7350300001)(101416001)(6486002)(7736002); DIR:OUT; SFP:1101; SCL:1; SRVR:SN1PR12MB0159; H:brijesh-build-machine.amd.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; SN1PR12MB0159; 23:b+M81ikuAkzq/I59aqPK+N/7qhagjbBPDNl4htNMD?= =?us-ascii?Q?chDICCAZ9tlELDxXDfDfdBF1JXfY7NCpp8E2GSq/XxdiCjXhcaxWXCxkwnKF?= =?us-ascii?Q?/FYi/edXQKG0Tfd2ZIZ/itJEXOiIKym/qse9odj9tDZ60qvXYSG6WRC10A7N?= =?us-ascii?Q?HTwK5GkxwNgt27FSjwI9YEvlCILK77XMA4K/PggCZVcTmYiO858dQ1Xp2r3o?= =?us-ascii?Q?QZ9Dw7d4aWaGE+VdMptx9uhld8Df8H/LKVCd8CDOcbD5bSfo0uQVRD1pc2KT?= =?us-ascii?Q?FUPs2RKSXYLy6A293ze5ov8FVtO/wnKsfAyI1WoRqdM3rrggazhKdtStYzfL?= =?us-ascii?Q?+VjKCQ5HFII3ODznHRTcusS0AtWUZ21WrvFgAPkKzl7E62nQ4mA5XIg+9bfT?= =?us-ascii?Q?QBObmp6FoIxV6kpWjAWMHizAxkrpXQLWm0HCVlfHg/HHq1cjaTBQfuAQZzwk?= =?us-ascii?Q?AQy+eYban21dxnzQLKJMkTCtTb2evzGMcKWXmxS9zqN3mVm5o5Mc6mHD50XC?= =?us-ascii?Q?23EwI7c/1vlwcdSOzXDM2FWjdLXXLW3EiidPnmHJp3F2XIPU1LhPRXEaWQe2?= =?us-ascii?Q?Eq5ajBzl2IMsClgyJaN+NOWBcxY2oM4XzITRFiVlCzg89yhonuulWdUpBV3o?= =?us-ascii?Q?HMxRmyeTUBu7omePOLi3pRLQyQOjBn8hRM8M5bNB5RHIDsEA4R8iqx2cvyVn?= =?us-ascii?Q?IhBCksU/7s0GEKHUYJOHWMA+Kh4e0nZ3D3ZADkInYjeTEG+Fsf/ySKYK62cW?= =?us-ascii?Q?vYJq6fUaFlnH4NHFqIiF1UoSMDmC5EsFYSewcJhqdCKmmLyf65pKMRiq65ZS?= =?us-ascii?Q?MtUjSm30SERMP/hGoZw/L4/IKb49GA3CV3SFRGdVdzstTHCouBMEyJWOR7ml?= =?us-ascii?Q?dS3tgvh91ImEzO0sR1Dt8dzSW3vuZBs+pV6gDgAggq7ygXHaoPKuGmvFoBxV?= =?us-ascii?Q?6KQTSU40tposJ5RYpF+aJiQ4epFU2ukVJoHTA1n9BsYKjvaoaxiH7yndCxzF?= =?us-ascii?Q?DsyFvLqihES8j+sHlADIKr3UegHy+SY/BdgtGv/W6SKBkacMyhAzkgVBq9Ly?= =?us-ascii?Q?AU7zD+2Yq3J76bEriuv6LaeQXuQzlE0Bk2HGj62M9HsbyWGB4KhtmtiWOEe0?= =?us-ascii?Q?LbCLO8dQVUaIZ3bJCCvVXTjEskDyXztks5tt7BwcadZow1STHTpOYrLCP99P?= =?us-ascii?Q?SEBfFtAyS6bhKHZryTw2oaY/8C5MAB6zVBYyReXWCOoNHMJfD2QZBqaYaig0?= =?us-ascii?Q?D+lx6F3/fbzGS6QhNthttKIX8zuL5u3HoYp884gHByGH43HNWoyzuiIapqIl?= =?us-ascii?Q?5laKPuslHdqgBxqXFtJtiA=3D?= X-Microsoft-Exchange-Diagnostics: 1; SN1PR12MB0159; 6:m45K6PdapXzQNsga5qzJd8R7Jt9iNcupvz0/0tLt5+hQ9y+o8pG3ryWa2JX2n3VSkyNFRBRmt+f1pqDHUMLY5lKKydzqiydHYOpGjW66vzFWywVz7EZCLs7qwlBJaWxpjw4cGwUf9wdN4kIjPR53BxtkGaQe0akdBPbPzOmfi1KnYB3XAuxZVsGPg6Hg9iQRTNORw78ObpDcXH/w7BeR3/n43xrEWMh+19tX4+iAQ5BZQm1ESdP1YoiVS0NBO08SC5XY1Jq/or1SP3drZ8lowfv9OWcrMROXQluZOKPcFFpWh4DI6gKHJ/N1ZRHhXKmkK4V3+oALe1P6P6l5MfeHvA==; 5:3pjnFcFSLEnoGNMgxyQdrZWYKgv9QVwiFs8uT/r5gyIupnjgYAd1V6YPpZYoJEPcHxtHCwB7j8FxRM5tOQyqFH0wJ7fsSYIuo+bqG5sznUbOnwk18Qga+9HDkc7/wGD9G/sMfqJQu8D8zPGP2Y4teQ==; 24:VksJ/UK6JKR6u9IWoGR+CVm3u9jGKd8eKEvQaKJkAQbkLP2B7yNj75GimOdNE9DOqnMzHm5P4rzegAvwkt/7LvHxp51RqvUzs+/lc5XQaDI=; 7:Ncu/rnml6Zyq5OOHQN0NrEcDW9D0jS4bFZhhmkbxyZv5I4O9/pKAGXhJhGfYEFn602Jvuavs9v6/AK+E380OhNr6RxF0bRQZ4POpaXVw6TVH+wOEdJEmT+eLKxDeaZv2YplgKafc4gpeTGF0Gb8zK2eymFLsxz1drKFIcDvAZLRkQGDBgIgP8ykyB+iqcbXBhSRAK9m7NaX5VDWP4obgrK9oGWsUWPdpcaLrZUVxvNc= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; SN1PR12MB0159; 20:ub5QpxvZpKabibDsmdqFsHyfZIWbsGdTwT6luvuegyFR0GJGvL2HxyoGpWNb2r4273MS2mNwH9xq90tCjmkfUBWIQ4xAVM7milxEtHrmjuErw36mDq8hprYwLJJIjnYQer/fVoX58LtikU/+CA1Hgv2xbCE1EJAk0vIJBvmH/gOqmuwElqK3iqAV7ned1ZcLu5Xi/u34GvMR9isccTlokKXnRv+uQmZrnsRLI/UOCf/sQ8ZbjHSiDsAcsJ8/i/mV X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Aug 2017 11:59:21.9991 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN1PR12MB0159 Subject: [PATCH v1 01/14] OvmfPkg/Virtio: Introduce new member functions in VIRTIO_DEVICE_PROTOCOL X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 07 Aug 2017 11:57:08 -0000 Content-Type: text/plain The patch extends VIRTIO_DEVICE_PROTOCOL to provide the following new member functions: - AllocateSharedPages : allocate a memory region suitable for sharing between guest and hypervisor (e.g ring buffer). - FreeSharedPages: free the memory allocated using AllocateSharedPages (). - MapSharedBuffer: map a host address to device address suitable to share with device for bus master operations. - UnmapSharedBuffer: unmap the device address obtained through the MapSharedBuffer(). Suggested-by: Laszlo Ersek Cc: Ard Biesheuvel Cc: Jordan Justen Cc: Tom Lendacky Cc: Laszlo Ersek Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Brijesh Singh --- OvmfPkg/Include/Protocol/VirtioDevice.h | 121 ++++++++++++++++++++ 1 file changed, 121 insertions(+) diff --git a/OvmfPkg/Include/Protocol/VirtioDevice.h b/OvmfPkg/Include/Protocol/VirtioDevice.h index 910a4866e7ac..ea5272165389 100644 --- a/OvmfPkg/Include/Protocol/VirtioDevice.h +++ b/OvmfPkg/Include/Protocol/VirtioDevice.h @@ -5,6 +5,7 @@ and should not be used outside of the EDK II tree. Copyright (c) 2013, ARM Ltd. All rights reserved.
+ Copyright (c) 2017, AMD Inc, All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this @@ -31,6 +32,26 @@ typedef struct _VIRTIO_DEVICE_PROTOCOL VIRTIO_DEVICE_PROTOCOL; +// +// VIRTIO Operation for Map +// +typedef enum { + // + // A read operation from system memory by a bus master + // + EfiVirtIoOperationBusMasterRead, + // + // A write operation from system memory by a bus master + // + EfiVirtIoOperationBusMasterWrite, + // + // Provides both read and write access to system memory by both the + // processor and a bus master + // + EfiVirtIoOperationBusMasterCommonBuffer, + EfiVirtIoOperationMaximum +} VIRTIO_MAP_OPERATION; + /** Read a word from the device-specific I/O region of the Virtio Header. @@ -319,6 +340,100 @@ EFI_STATUS IN UINT8 DeviceStatus ); +/** + + Allocates pages that are suitable for sharing between guest and hypervisor. + + @param This The protocol instance pointer. + @param Pages The number of pages to allocate. + @param HostAddress A pointer to store the base system memory + address of the allocated range. + + @retval EFI_SUCCESS The requested memory pages were allocated. + @retval EFI_OUT_OF_RESOURCES The memory pages could not be allocated. + +**/ +typedef +EFI_STATUS +(EFIAPI *VIRTIO_ALLOCATE_SHARED)( + IN VIRTIO_DEVICE_PROTOCOL *This, + IN UINTN Pages, + IN OUT VOID **HostAddress + ); + +/** + Frees memory that was allocated with SharedAllocateBuffer(). + + @param This The protocol instance pointer. + @param Pages The number of pages to free. + @param HostAddress The base system memory address of the allocated range. + +**/ +typedef +VOID +(EFIAPI *VIRTIO_FREE_SHARED)( + IN VIRTIO_DEVICE_PROTOCOL *This, + IN UINTN Pages, + IN VOID *HostAddress + ); + +/** + Provides the shared addresses required to access system memory from a + DMA bus master. + + @param This The protocol instance pointer. + @param Operation Indicates if the bus master is going to + read or write to system memory. + @param HostAddress The system memory address to map to shared + buffer address. + @param NumberOfBytes On input the number of bytes to map. + On output the number of bytes that were + mapped. + @param DeviceAddress The resulting shared map address for the + bus master to access the hosts HostAddress. + @param Mapping A resulting value to pass to Unmap(). + + + @retval EFI_SUCCESS The range was mapped for the returned + NumberOfBytes. + @retval EFI_UNSUPPORTED The HostAddress cannot be mapped as a + common buffer. + @retval EFI_INVALID_PARAMETER One or more parameters are invalid. + @retval EFI_OUT_OF_RESOURCES The request could not be completed due to + a lack of resources. + @retval EFI_DEVICE_ERROR The system hardware could not map the + requested address. +**/ + +typedef +EFI_STATUS +(EFIAPI *VIRTIO_MAP_SHARED) ( + IN VIRTIO_DEVICE_PROTOCOL *This, + IN VIRTIO_MAP_OPERATION Operation, + IN VOID *HostAddress, + IN OUT UINTN *NumberOfBytes, + OUT EFI_PHYSICAL_ADDRESS *DeviceAddress, + OUT VOID **Mapping + ); + +/** + Completes the Map() operation and releases any corresponding resources. + + @param This The protocol instance pointer. + @param Mapping The mapping value returned from Map(). + + @retval EFI_SUCCESS The range was unmapped. + @retval EFI_INVALID_PARAMETER Mapping is not a value that was returned by + Map(). + @retval EFI_DEVICE_ERROR The data was not committed to the target + system memory. +**/ +typedef +EFI_STATUS +(EFIAPI *VIRTIO_UNMAP_SHARED)( + IN VIRTIO_DEVICE_PROTOCOL *This, + IN VOID *Mapping + ); /// /// This protocol provides an abstraction over the VirtIo transport layer @@ -353,6 +468,12 @@ struct _VIRTIO_DEVICE_PROTOCOL { // Functions to read/write Device Specific headers VIRTIO_DEVICE_WRITE WriteDevice; VIRTIO_DEVICE_READ ReadDevice; + + // Function to allocate, free, map and unmap shared buffer + VIRTIO_ALLOCATE_SHARED AllocateSharedPages; + VIRTIO_FREE_SHARED FreeSharedPages; + VIRTIO_MAP_SHARED MapSharedBuffer; + VIRTIO_UNMAP_SHARED UnmapSharedBuffer; }; extern EFI_GUID gVirtioDeviceProtocolGuid; -- 2.7.4