mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-12-29 01:05:29 +00:00
dda057ad8c
remove an extra semicolon from the example code Signed-off-by: foryun.ma <foryun.ma@jaguarmicro.com> Link: https://lore.kernel.org/r/20240510003735.2766-1-foryun.ma@jaguarmicro.com Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
708 lines
29 KiB
ReStructuredText
708 lines
29 KiB
ReStructuredText
==================================
|
|
VFIO - "Virtual Function I/O" [1]_
|
|
==================================
|
|
|
|
Many modern systems now provide DMA and interrupt remapping facilities
|
|
to help ensure I/O devices behave within the boundaries they've been
|
|
allotted. This includes x86 hardware with AMD-Vi and Intel VT-d,
|
|
POWER systems with Partitionable Endpoints (PEs) and embedded PowerPC
|
|
systems such as Freescale PAMU. The VFIO driver is an IOMMU/device
|
|
agnostic framework for exposing direct device access to userspace, in
|
|
a secure, IOMMU protected environment. In other words, this allows
|
|
safe [2]_, non-privileged, userspace drivers.
|
|
|
|
Why do we want that? Virtual machines often make use of direct device
|
|
access ("device assignment") when configured for the highest possible
|
|
I/O performance. From a device and host perspective, this simply
|
|
turns the VM into a userspace driver, with the benefits of
|
|
significantly reduced latency, higher bandwidth, and direct use of
|
|
bare-metal device drivers [3]_.
|
|
|
|
Some applications, particularly in the high performance computing
|
|
field, also benefit from low-overhead, direct device access from
|
|
userspace. Examples include network adapters (often non-TCP/IP based)
|
|
and compute accelerators. Prior to VFIO, these drivers had to either
|
|
go through the full development cycle to become proper upstream
|
|
driver, be maintained out of tree, or make use of the UIO framework,
|
|
which has no notion of IOMMU protection, limited interrupt support,
|
|
and requires root privileges to access things like PCI configuration
|
|
space.
|
|
|
|
The VFIO driver framework intends to unify these, replacing both the
|
|
KVM PCI specific device assignment code as well as provide a more
|
|
secure, more featureful userspace driver environment than UIO.
|
|
|
|
Groups, Devices, and IOMMUs
|
|
---------------------------
|
|
|
|
Devices are the main target of any I/O driver. Devices typically
|
|
create a programming interface made up of I/O access, interrupts,
|
|
and DMA. Without going into the details of each of these, DMA is
|
|
by far the most critical aspect for maintaining a secure environment
|
|
as allowing a device read-write access to system memory imposes the
|
|
greatest risk to the overall system integrity.
|
|
|
|
To help mitigate this risk, many modern IOMMUs now incorporate
|
|
isolation properties into what was, in many cases, an interface only
|
|
meant for translation (ie. solving the addressing problems of devices
|
|
with limited address spaces). With this, devices can now be isolated
|
|
from each other and from arbitrary memory access, thus allowing
|
|
things like secure direct assignment of devices into virtual machines.
|
|
|
|
This isolation is not always at the granularity of a single device
|
|
though. Even when an IOMMU is capable of this, properties of devices,
|
|
interconnects, and IOMMU topologies can each reduce this isolation.
|
|
For instance, an individual device may be part of a larger multi-
|
|
function enclosure. While the IOMMU may be able to distinguish
|
|
between devices within the enclosure, the enclosure may not require
|
|
transactions between devices to reach the IOMMU. Examples of this
|
|
could be anything from a multi-function PCI device with backdoors
|
|
between functions to a non-PCI-ACS (Access Control Services) capable
|
|
bridge allowing redirection without reaching the IOMMU. Topology
|
|
can also play a factor in terms of hiding devices. A PCIe-to-PCI
|
|
bridge masks the devices behind it, making transaction appear as if
|
|
from the bridge itself. Obviously IOMMU design plays a major factor
|
|
as well.
|
|
|
|
Therefore, while for the most part an IOMMU may have device level
|
|
granularity, any system is susceptible to reduced granularity. The
|
|
IOMMU API therefore supports a notion of IOMMU groups. A group is
|
|
a set of devices which is isolatable from all other devices in the
|
|
system. Groups are therefore the unit of ownership used by VFIO.
|
|
|
|
While the group is the minimum granularity that must be used to
|
|
ensure secure user access, it's not necessarily the preferred
|
|
granularity. In IOMMUs which make use of page tables, it may be
|
|
possible to share a set of page tables between different groups,
|
|
reducing the overhead both to the platform (reduced TLB thrashing,
|
|
reduced duplicate page tables), and to the user (programming only
|
|
a single set of translations). For this reason, VFIO makes use of
|
|
a container class, which may hold one or more groups. A container
|
|
is created by simply opening the /dev/vfio/vfio character device.
|
|
|
|
On its own, the container provides little functionality, with all
|
|
but a couple version and extension query interfaces locked away.
|
|
The user needs to add a group into the container for the next level
|
|
of functionality. To do this, the user first needs to identify the
|
|
group associated with the desired device. This can be done using
|
|
the sysfs links described in the example below. By unbinding the
|
|
device from the host driver and binding it to a VFIO driver, a new
|
|
VFIO group will appear for the group as /dev/vfio/$GROUP, where
|
|
$GROUP is the IOMMU group number of which the device is a member.
|
|
If the IOMMU group contains multiple devices, each will need to
|
|
be bound to a VFIO driver before operations on the VFIO group
|
|
are allowed (it's also sufficient to only unbind the device from
|
|
host drivers if a VFIO driver is unavailable; this will make the
|
|
group available, but not that particular device). TBD - interface
|
|
for disabling driver probing/locking a device.
|
|
|
|
Once the group is ready, it may be added to the container by opening
|
|
the VFIO group character device (/dev/vfio/$GROUP) and using the
|
|
VFIO_GROUP_SET_CONTAINER ioctl, passing the file descriptor of the
|
|
previously opened container file. If desired and if the IOMMU driver
|
|
supports sharing the IOMMU context between groups, multiple groups may
|
|
be set to the same container. If a group fails to set to a container
|
|
with existing groups, a new empty container will need to be used
|
|
instead.
|
|
|
|
With a group (or groups) attached to a container, the remaining
|
|
ioctls become available, enabling access to the VFIO IOMMU interfaces.
|
|
Additionally, it now becomes possible to get file descriptors for each
|
|
device within a group using an ioctl on the VFIO group file descriptor.
|
|
|
|
The VFIO device API includes ioctls for describing the device, the I/O
|
|
regions and their read/write/mmap offsets on the device descriptor, as
|
|
well as mechanisms for describing and registering interrupt
|
|
notifications.
|
|
|
|
VFIO Usage Example
|
|
------------------
|
|
|
|
Assume user wants to access PCI device 0000:06:0d.0::
|
|
|
|
$ readlink /sys/bus/pci/devices/0000:06:0d.0/iommu_group
|
|
../../../../kernel/iommu_groups/26
|
|
|
|
This device is therefore in IOMMU group 26. This device is on the
|
|
pci bus, therefore the user will make use of vfio-pci to manage the
|
|
group::
|
|
|
|
# modprobe vfio-pci
|
|
|
|
Binding this device to the vfio-pci driver creates the VFIO group
|
|
character devices for this group::
|
|
|
|
$ lspci -n -s 0000:06:0d.0
|
|
06:0d.0 0401: 1102:0002 (rev 08)
|
|
# echo 0000:06:0d.0 > /sys/bus/pci/devices/0000:06:0d.0/driver/unbind
|
|
# echo 1102 0002 > /sys/bus/pci/drivers/vfio-pci/new_id
|
|
|
|
Now we need to look at what other devices are in the group to free
|
|
it for use by VFIO::
|
|
|
|
$ ls -l /sys/bus/pci/devices/0000:06:0d.0/iommu_group/devices
|
|
total 0
|
|
lrwxrwxrwx. 1 root root 0 Apr 23 16:13 0000:00:1e.0 ->
|
|
../../../../devices/pci0000:00/0000:00:1e.0
|
|
lrwxrwxrwx. 1 root root 0 Apr 23 16:13 0000:06:0d.0 ->
|
|
../../../../devices/pci0000:00/0000:00:1e.0/0000:06:0d.0
|
|
lrwxrwxrwx. 1 root root 0 Apr 23 16:13 0000:06:0d.1 ->
|
|
../../../../devices/pci0000:00/0000:00:1e.0/0000:06:0d.1
|
|
|
|
This device is behind a PCIe-to-PCI bridge [4]_, therefore we also
|
|
need to add device 0000:06:0d.1 to the group following the same
|
|
procedure as above. Device 0000:00:1e.0 is a bridge that does
|
|
not currently have a host driver, therefore it's not required to
|
|
bind this device to the vfio-pci driver (vfio-pci does not currently
|
|
support PCI bridges).
|
|
|
|
The final step is to provide the user with access to the group if
|
|
unprivileged operation is desired (note that /dev/vfio/vfio provides
|
|
no capabilities on its own and is therefore expected to be set to
|
|
mode 0666 by the system)::
|
|
|
|
# chown user:user /dev/vfio/26
|
|
|
|
The user now has full access to all the devices and the iommu for this
|
|
group and can access them as follows::
|
|
|
|
int container, group, device, i;
|
|
struct vfio_group_status group_status =
|
|
{ .argsz = sizeof(group_status) };
|
|
struct vfio_iommu_type1_info iommu_info = { .argsz = sizeof(iommu_info) };
|
|
struct vfio_iommu_type1_dma_map dma_map = { .argsz = sizeof(dma_map) };
|
|
struct vfio_device_info device_info = { .argsz = sizeof(device_info) };
|
|
|
|
/* Create a new container */
|
|
container = open("/dev/vfio/vfio", O_RDWR);
|
|
|
|
if (ioctl(container, VFIO_GET_API_VERSION) != VFIO_API_VERSION)
|
|
/* Unknown API version */
|
|
|
|
if (!ioctl(container, VFIO_CHECK_EXTENSION, VFIO_TYPE1_IOMMU))
|
|
/* Doesn't support the IOMMU driver we want. */
|
|
|
|
/* Open the group */
|
|
group = open("/dev/vfio/26", O_RDWR);
|
|
|
|
/* Test the group is viable and available */
|
|
ioctl(group, VFIO_GROUP_GET_STATUS, &group_status);
|
|
|
|
if (!(group_status.flags & VFIO_GROUP_FLAGS_VIABLE))
|
|
/* Group is not viable (ie, not all devices bound for vfio) */
|
|
|
|
/* Add the group to the container */
|
|
ioctl(group, VFIO_GROUP_SET_CONTAINER, &container);
|
|
|
|
/* Enable the IOMMU model we want */
|
|
ioctl(container, VFIO_SET_IOMMU, VFIO_TYPE1_IOMMU);
|
|
|
|
/* Get addition IOMMU info */
|
|
ioctl(container, VFIO_IOMMU_GET_INFO, &iommu_info);
|
|
|
|
/* Allocate some space and setup a DMA mapping */
|
|
dma_map.vaddr = mmap(0, 1024 * 1024, PROT_READ | PROT_WRITE,
|
|
MAP_PRIVATE | MAP_ANONYMOUS, 0, 0);
|
|
dma_map.size = 1024 * 1024;
|
|
dma_map.iova = 0; /* 1MB starting at 0x0 from device view */
|
|
dma_map.flags = VFIO_DMA_MAP_FLAG_READ | VFIO_DMA_MAP_FLAG_WRITE;
|
|
|
|
ioctl(container, VFIO_IOMMU_MAP_DMA, &dma_map);
|
|
|
|
/* Get a file descriptor for the device */
|
|
device = ioctl(group, VFIO_GROUP_GET_DEVICE_FD, "0000:06:0d.0");
|
|
|
|
/* Test and setup the device */
|
|
ioctl(device, VFIO_DEVICE_GET_INFO, &device_info);
|
|
|
|
for (i = 0; i < device_info.num_regions; i++) {
|
|
struct vfio_region_info reg = { .argsz = sizeof(reg) };
|
|
|
|
reg.index = i;
|
|
|
|
ioctl(device, VFIO_DEVICE_GET_REGION_INFO, ®);
|
|
|
|
/* Setup mappings... read/write offsets, mmaps
|
|
* For PCI devices, config space is a region */
|
|
}
|
|
|
|
for (i = 0; i < device_info.num_irqs; i++) {
|
|
struct vfio_irq_info irq = { .argsz = sizeof(irq) };
|
|
|
|
irq.index = i;
|
|
|
|
ioctl(device, VFIO_DEVICE_GET_IRQ_INFO, &irq);
|
|
|
|
/* Setup IRQs... eventfds, VFIO_DEVICE_SET_IRQS */
|
|
}
|
|
|
|
/* Gratuitous device reset and go... */
|
|
ioctl(device, VFIO_DEVICE_RESET);
|
|
|
|
IOMMUFD and vfio_iommu_type1
|
|
----------------------------
|
|
|
|
IOMMUFD is the new user API to manage I/O page tables from userspace.
|
|
It intends to be the portal of delivering advanced userspace DMA
|
|
features (nested translation [5]_, PASID [6]_, etc.) while also providing
|
|
a backwards compatibility interface for existing VFIO_TYPE1v2_IOMMU use
|
|
cases. Eventually the vfio_iommu_type1 driver, as well as the legacy
|
|
vfio container and group model is intended to be deprecated.
|
|
|
|
The IOMMUFD backwards compatibility interface can be enabled two ways.
|
|
In the first method, the kernel can be configured with
|
|
CONFIG_IOMMUFD_VFIO_CONTAINER, in which case the IOMMUFD subsystem
|
|
transparently provides the entire infrastructure for the VFIO
|
|
container and IOMMU backend interfaces. The compatibility mode can
|
|
also be accessed if the VFIO container interface, ie. /dev/vfio/vfio is
|
|
simply symlink'd to /dev/iommu. Note that at the time of writing, the
|
|
compatibility mode is not entirely feature complete relative to
|
|
VFIO_TYPE1v2_IOMMU (ex. DMA mapping MMIO) and does not attempt to
|
|
provide compatibility to the VFIO_SPAPR_TCE_IOMMU interface. Therefore
|
|
it is not generally advisable at this time to switch from native VFIO
|
|
implementations to the IOMMUFD compatibility interfaces.
|
|
|
|
Long term, VFIO users should migrate to device access through the cdev
|
|
interface described below, and native access through the IOMMUFD
|
|
provided interfaces.
|
|
|
|
VFIO Device cdev
|
|
----------------
|
|
|
|
Traditionally user acquires a device fd via VFIO_GROUP_GET_DEVICE_FD
|
|
in a VFIO group.
|
|
|
|
With CONFIG_VFIO_DEVICE_CDEV=y the user can now acquire a device fd
|
|
by directly opening a character device /dev/vfio/devices/vfioX where
|
|
"X" is the number allocated uniquely by VFIO for registered devices.
|
|
cdev interface does not support noiommu devices, so user should use
|
|
the legacy group interface if noiommu is wanted.
|
|
|
|
The cdev only works with IOMMUFD. Both VFIO drivers and applications
|
|
must adapt to the new cdev security model which requires using
|
|
VFIO_DEVICE_BIND_IOMMUFD to claim DMA ownership before starting to
|
|
actually use the device. Once BIND succeeds then a VFIO device can
|
|
be fully accessed by the user.
|
|
|
|
VFIO device cdev doesn't rely on VFIO group/container/iommu drivers.
|
|
Hence those modules can be fully compiled out in an environment
|
|
where no legacy VFIO application exists.
|
|
|
|
So far SPAPR does not support IOMMUFD yet. So it cannot support device
|
|
cdev either.
|
|
|
|
vfio device cdev access is still bound by IOMMU group semantics, ie. there
|
|
can be only one DMA owner for the group. Devices belonging to the same
|
|
group can not be bound to multiple iommufd_ctx or shared between native
|
|
kernel and vfio bus driver or other driver supporting the driver_managed_dma
|
|
flag. A violation of this ownership requirement will fail at the
|
|
VFIO_DEVICE_BIND_IOMMUFD ioctl, which gates full device access.
|
|
|
|
Device cdev Example
|
|
-------------------
|
|
|
|
Assume user wants to access PCI device 0000:6a:01.0::
|
|
|
|
$ ls /sys/bus/pci/devices/0000:6a:01.0/vfio-dev/
|
|
vfio0
|
|
|
|
This device is therefore represented as vfio0. The user can verify
|
|
its existence::
|
|
|
|
$ ls -l /dev/vfio/devices/vfio0
|
|
crw------- 1 root root 511, 0 Feb 16 01:22 /dev/vfio/devices/vfio0
|
|
$ cat /sys/bus/pci/devices/0000:6a:01.0/vfio-dev/vfio0/dev
|
|
511:0
|
|
$ ls -l /dev/char/511\:0
|
|
lrwxrwxrwx 1 root root 21 Feb 16 01:22 /dev/char/511:0 -> ../vfio/devices/vfio0
|
|
|
|
Then provide the user with access to the device if unprivileged
|
|
operation is desired::
|
|
|
|
$ chown user:user /dev/vfio/devices/vfio0
|
|
|
|
Finally the user could get cdev fd by::
|
|
|
|
cdev_fd = open("/dev/vfio/devices/vfio0", O_RDWR);
|
|
|
|
An opened cdev_fd doesn't give the user any permission of accessing
|
|
the device except binding the cdev_fd to an iommufd. After that point
|
|
then the device is fully accessible including attaching it to an
|
|
IOMMUFD IOAS/HWPT to enable userspace DMA::
|
|
|
|
struct vfio_device_bind_iommufd bind = {
|
|
.argsz = sizeof(bind),
|
|
.flags = 0,
|
|
};
|
|
struct iommu_ioas_alloc alloc_data = {
|
|
.size = sizeof(alloc_data),
|
|
.flags = 0,
|
|
};
|
|
struct vfio_device_attach_iommufd_pt attach_data = {
|
|
.argsz = sizeof(attach_data),
|
|
.flags = 0,
|
|
};
|
|
struct iommu_ioas_map map = {
|
|
.size = sizeof(map),
|
|
.flags = IOMMU_IOAS_MAP_READABLE |
|
|
IOMMU_IOAS_MAP_WRITEABLE |
|
|
IOMMU_IOAS_MAP_FIXED_IOVA,
|
|
.__reserved = 0,
|
|
};
|
|
|
|
iommufd = open("/dev/iommu", O_RDWR);
|
|
|
|
bind.iommufd = iommufd;
|
|
ioctl(cdev_fd, VFIO_DEVICE_BIND_IOMMUFD, &bind);
|
|
|
|
ioctl(iommufd, IOMMU_IOAS_ALLOC, &alloc_data);
|
|
attach_data.pt_id = alloc_data.out_ioas_id;
|
|
ioctl(cdev_fd, VFIO_DEVICE_ATTACH_IOMMUFD_PT, &attach_data);
|
|
|
|
/* Allocate some space and setup a DMA mapping */
|
|
map.user_va = (int64_t)mmap(0, 1024 * 1024, PROT_READ | PROT_WRITE,
|
|
MAP_PRIVATE | MAP_ANONYMOUS, 0, 0);
|
|
map.iova = 0; /* 1MB starting at 0x0 from device view */
|
|
map.length = 1024 * 1024;
|
|
map.ioas_id = alloc_data.out_ioas_id;
|
|
|
|
ioctl(iommufd, IOMMU_IOAS_MAP, &map);
|
|
|
|
/* Other device operations as stated in "VFIO Usage Example" */
|
|
|
|
VFIO User API
|
|
-------------------------------------------------------------------------------
|
|
|
|
Please see include/uapi/linux/vfio.h for complete API documentation.
|
|
|
|
VFIO bus driver API
|
|
-------------------------------------------------------------------------------
|
|
|
|
VFIO bus drivers, such as vfio-pci make use of only a few interfaces
|
|
into VFIO core. When devices are bound and unbound to the driver,
|
|
Following interfaces are called when devices are bound to and
|
|
unbound from the driver::
|
|
|
|
int vfio_register_group_dev(struct vfio_device *device);
|
|
int vfio_register_emulated_iommu_dev(struct vfio_device *device);
|
|
void vfio_unregister_group_dev(struct vfio_device *device);
|
|
|
|
The driver should embed the vfio_device in its own structure and use
|
|
vfio_alloc_device() to allocate the structure, and can register
|
|
@init/@release callbacks to manage any private state wrapping the
|
|
vfio_device::
|
|
|
|
vfio_alloc_device(dev_struct, member, dev, ops);
|
|
void vfio_put_device(struct vfio_device *device);
|
|
|
|
vfio_register_group_dev() indicates to the core to begin tracking the
|
|
iommu_group of the specified dev and register the dev as owned by a VFIO bus
|
|
driver. Once vfio_register_group_dev() returns it is possible for userspace to
|
|
start accessing the driver, thus the driver should ensure it is completely
|
|
ready before calling it. The driver provides an ops structure for callbacks
|
|
similar to a file operations structure::
|
|
|
|
struct vfio_device_ops {
|
|
char *name;
|
|
int (*init)(struct vfio_device *vdev);
|
|
void (*release)(struct vfio_device *vdev);
|
|
int (*bind_iommufd)(struct vfio_device *vdev,
|
|
struct iommufd_ctx *ictx, u32 *out_device_id);
|
|
void (*unbind_iommufd)(struct vfio_device *vdev);
|
|
int (*attach_ioas)(struct vfio_device *vdev, u32 *pt_id);
|
|
void (*detach_ioas)(struct vfio_device *vdev);
|
|
int (*open_device)(struct vfio_device *vdev);
|
|
void (*close_device)(struct vfio_device *vdev);
|
|
ssize_t (*read)(struct vfio_device *vdev, char __user *buf,
|
|
size_t count, loff_t *ppos);
|
|
ssize_t (*write)(struct vfio_device *vdev, const char __user *buf,
|
|
size_t count, loff_t *size);
|
|
long (*ioctl)(struct vfio_device *vdev, unsigned int cmd,
|
|
unsigned long arg);
|
|
int (*mmap)(struct vfio_device *vdev, struct vm_area_struct *vma);
|
|
void (*request)(struct vfio_device *vdev, unsigned int count);
|
|
int (*match)(struct vfio_device *vdev, char *buf);
|
|
void (*dma_unmap)(struct vfio_device *vdev, u64 iova, u64 length);
|
|
int (*device_feature)(struct vfio_device *device, u32 flags,
|
|
void __user *arg, size_t argsz);
|
|
};
|
|
|
|
Each function is passed the vdev that was originally registered
|
|
in the vfio_register_group_dev() or vfio_register_emulated_iommu_dev()
|
|
call above. This allows the bus driver to obtain its private data using
|
|
container_of().
|
|
|
|
::
|
|
|
|
- The init/release callbacks are issued when vfio_device is initialized
|
|
and released.
|
|
|
|
- The open/close device callbacks are issued when the first
|
|
instance of a file descriptor for the device is created (eg.
|
|
via VFIO_GROUP_GET_DEVICE_FD) for a user session.
|
|
|
|
- The ioctl callback provides a direct pass through for some VFIO_DEVICE_*
|
|
ioctls.
|
|
|
|
- The [un]bind_iommufd callbacks are issued when the device is bound to
|
|
and unbound from iommufd.
|
|
|
|
- The [de]attach_ioas callback is issued when the device is attached to
|
|
and detached from an IOAS managed by the bound iommufd. However, the
|
|
attached IOAS can also be automatically detached when the device is
|
|
unbound from iommufd.
|
|
|
|
- The read/write/mmap callbacks implement the device region access defined
|
|
by the device's own VFIO_DEVICE_GET_REGION_INFO ioctl.
|
|
|
|
- The request callback is issued when device is going to be unregistered,
|
|
such as when trying to unbind the device from the vfio bus driver.
|
|
|
|
- The dma_unmap callback is issued when a range of iovas are unmapped
|
|
in the container or IOAS attached by the device. Drivers which make
|
|
use of the vfio page pinning interface must implement this callback in
|
|
order to unpin pages within the dma_unmap range. Drivers must tolerate
|
|
this callback even before calls to open_device().
|
|
|
|
PPC64 sPAPR implementation note
|
|
-------------------------------
|
|
|
|
This implementation has some specifics:
|
|
|
|
1) On older systems (POWER7 with P5IOC2/IODA1) only one IOMMU group per
|
|
container is supported as an IOMMU table is allocated at the boot time,
|
|
one table per a IOMMU group which is a Partitionable Endpoint (PE)
|
|
(PE is often a PCI domain but not always).
|
|
|
|
Newer systems (POWER8 with IODA2) have improved hardware design which allows
|
|
to remove this limitation and have multiple IOMMU groups per a VFIO
|
|
container.
|
|
|
|
2) The hardware supports so called DMA windows - the PCI address range
|
|
within which DMA transfer is allowed, any attempt to access address space
|
|
out of the window leads to the whole PE isolation.
|
|
|
|
3) PPC64 guests are paravirtualized but not fully emulated. There is an API
|
|
to map/unmap pages for DMA, and it normally maps 1..32 pages per call and
|
|
currently there is no way to reduce the number of calls. In order to make
|
|
things faster, the map/unmap handling has been implemented in real mode
|
|
which provides an excellent performance which has limitations such as
|
|
inability to do locked pages accounting in real time.
|
|
|
|
4) According to sPAPR specification, A Partitionable Endpoint (PE) is an I/O
|
|
subtree that can be treated as a unit for the purposes of partitioning and
|
|
error recovery. A PE may be a single or multi-function IOA (IO Adapter), a
|
|
function of a multi-function IOA, or multiple IOAs (possibly including
|
|
switch and bridge structures above the multiple IOAs). PPC64 guests detect
|
|
PCI errors and recover from them via EEH RTAS services, which works on the
|
|
basis of additional ioctl commands.
|
|
|
|
So 4 additional ioctls have been added:
|
|
|
|
VFIO_IOMMU_SPAPR_TCE_GET_INFO
|
|
returns the size and the start of the DMA window on the PCI bus.
|
|
|
|
VFIO_IOMMU_ENABLE
|
|
enables the container. The locked pages accounting
|
|
is done at this point. This lets user first to know what
|
|
the DMA window is and adjust rlimit before doing any real job.
|
|
|
|
VFIO_IOMMU_DISABLE
|
|
disables the container.
|
|
|
|
VFIO_EEH_PE_OP
|
|
provides an API for EEH setup, error detection and recovery.
|
|
|
|
The code flow from the example above should be slightly changed::
|
|
|
|
struct vfio_eeh_pe_op pe_op = { .argsz = sizeof(pe_op), .flags = 0 };
|
|
|
|
.....
|
|
/* Add the group to the container */
|
|
ioctl(group, VFIO_GROUP_SET_CONTAINER, &container);
|
|
|
|
/* Enable the IOMMU model we want */
|
|
ioctl(container, VFIO_SET_IOMMU, VFIO_SPAPR_TCE_IOMMU)
|
|
|
|
/* Get addition sPAPR IOMMU info */
|
|
vfio_iommu_spapr_tce_info spapr_iommu_info;
|
|
ioctl(container, VFIO_IOMMU_SPAPR_TCE_GET_INFO, &spapr_iommu_info);
|
|
|
|
if (ioctl(container, VFIO_IOMMU_ENABLE))
|
|
/* Cannot enable container, may be low rlimit */
|
|
|
|
/* Allocate some space and setup a DMA mapping */
|
|
dma_map.vaddr = mmap(0, 1024 * 1024, PROT_READ | PROT_WRITE,
|
|
MAP_PRIVATE | MAP_ANONYMOUS, 0, 0);
|
|
|
|
dma_map.size = 1024 * 1024;
|
|
dma_map.iova = 0; /* 1MB starting at 0x0 from device view */
|
|
dma_map.flags = VFIO_DMA_MAP_FLAG_READ | VFIO_DMA_MAP_FLAG_WRITE;
|
|
|
|
/* Check here is .iova/.size are within DMA window from spapr_iommu_info */
|
|
ioctl(container, VFIO_IOMMU_MAP_DMA, &dma_map);
|
|
|
|
/* Get a file descriptor for the device */
|
|
device = ioctl(group, VFIO_GROUP_GET_DEVICE_FD, "0000:06:0d.0");
|
|
|
|
....
|
|
|
|
/* Gratuitous device reset and go... */
|
|
ioctl(device, VFIO_DEVICE_RESET);
|
|
|
|
/* Make sure EEH is supported */
|
|
ioctl(container, VFIO_CHECK_EXTENSION, VFIO_EEH);
|
|
|
|
/* Enable the EEH functionality on the device */
|
|
pe_op.op = VFIO_EEH_PE_ENABLE;
|
|
ioctl(container, VFIO_EEH_PE_OP, &pe_op);
|
|
|
|
/* You're suggested to create additional data struct to represent
|
|
* PE, and put child devices belonging to same IOMMU group to the
|
|
* PE instance for later reference.
|
|
*/
|
|
|
|
/* Check the PE's state and make sure it's in functional state */
|
|
pe_op.op = VFIO_EEH_PE_GET_STATE;
|
|
ioctl(container, VFIO_EEH_PE_OP, &pe_op);
|
|
|
|
/* Save device state using pci_save_state().
|
|
* EEH should be enabled on the specified device.
|
|
*/
|
|
|
|
....
|
|
|
|
/* Inject EEH error, which is expected to be caused by 32-bits
|
|
* config load.
|
|
*/
|
|
pe_op.op = VFIO_EEH_PE_INJECT_ERR;
|
|
pe_op.err.type = EEH_ERR_TYPE_32;
|
|
pe_op.err.func = EEH_ERR_FUNC_LD_CFG_ADDR;
|
|
pe_op.err.addr = 0ul;
|
|
pe_op.err.mask = 0ul;
|
|
ioctl(container, VFIO_EEH_PE_OP, &pe_op);
|
|
|
|
....
|
|
|
|
/* When 0xFF's returned from reading PCI config space or IO BARs
|
|
* of the PCI device. Check the PE's state to see if that has been
|
|
* frozen.
|
|
*/
|
|
ioctl(container, VFIO_EEH_PE_OP, &pe_op);
|
|
|
|
/* Waiting for pending PCI transactions to be completed and don't
|
|
* produce any more PCI traffic from/to the affected PE until
|
|
* recovery is finished.
|
|
*/
|
|
|
|
/* Enable IO for the affected PE and collect logs. Usually, the
|
|
* standard part of PCI config space, AER registers are dumped
|
|
* as logs for further analysis.
|
|
*/
|
|
pe_op.op = VFIO_EEH_PE_UNFREEZE_IO;
|
|
ioctl(container, VFIO_EEH_PE_OP, &pe_op);
|
|
|
|
/*
|
|
* Issue PE reset: hot or fundamental reset. Usually, hot reset
|
|
* is enough. However, the firmware of some PCI adapters would
|
|
* require fundamental reset.
|
|
*/
|
|
pe_op.op = VFIO_EEH_PE_RESET_HOT;
|
|
ioctl(container, VFIO_EEH_PE_OP, &pe_op);
|
|
pe_op.op = VFIO_EEH_PE_RESET_DEACTIVATE;
|
|
ioctl(container, VFIO_EEH_PE_OP, &pe_op);
|
|
|
|
/* Configure the PCI bridges for the affected PE */
|
|
pe_op.op = VFIO_EEH_PE_CONFIGURE;
|
|
ioctl(container, VFIO_EEH_PE_OP, &pe_op);
|
|
|
|
/* Restored state we saved at initialization time. pci_restore_state()
|
|
* is good enough as an example.
|
|
*/
|
|
|
|
/* Hopefully, error is recovered successfully. Now, you can resume to
|
|
* start PCI traffic to/from the affected PE.
|
|
*/
|
|
|
|
....
|
|
|
|
5) There is v2 of SPAPR TCE IOMMU. It deprecates VFIO_IOMMU_ENABLE/
|
|
VFIO_IOMMU_DISABLE and implements 2 new ioctls:
|
|
VFIO_IOMMU_SPAPR_REGISTER_MEMORY and VFIO_IOMMU_SPAPR_UNREGISTER_MEMORY
|
|
(which are unsupported in v1 IOMMU).
|
|
|
|
PPC64 paravirtualized guests generate a lot of map/unmap requests,
|
|
and the handling of those includes pinning/unpinning pages and updating
|
|
mm::locked_vm counter to make sure we do not exceed the rlimit.
|
|
The v2 IOMMU splits accounting and pinning into separate operations:
|
|
|
|
- VFIO_IOMMU_SPAPR_REGISTER_MEMORY/VFIO_IOMMU_SPAPR_UNREGISTER_MEMORY ioctls
|
|
receive a user space address and size of the block to be pinned.
|
|
Bisecting is not supported and VFIO_IOMMU_UNREGISTER_MEMORY is expected to
|
|
be called with the exact address and size used for registering
|
|
the memory block. The userspace is not expected to call these often.
|
|
The ranges are stored in a linked list in a VFIO container.
|
|
|
|
- VFIO_IOMMU_MAP_DMA/VFIO_IOMMU_UNMAP_DMA ioctls only update the actual
|
|
IOMMU table and do not do pinning; instead these check that the userspace
|
|
address is from pre-registered range.
|
|
|
|
This separation helps in optimizing DMA for guests.
|
|
|
|
6) sPAPR specification allows guests to have an additional DMA window(s) on
|
|
a PCI bus with a variable page size. Two ioctls have been added to support
|
|
this: VFIO_IOMMU_SPAPR_TCE_CREATE and VFIO_IOMMU_SPAPR_TCE_REMOVE.
|
|
The platform has to support the functionality or error will be returned to
|
|
the userspace. The existing hardware supports up to 2 DMA windows, one is
|
|
2GB long, uses 4K pages and called "default 32bit window"; the other can
|
|
be as big as entire RAM, use different page size, it is optional - guests
|
|
create those in run-time if the guest driver supports 64bit DMA.
|
|
|
|
VFIO_IOMMU_SPAPR_TCE_CREATE receives a page shift, a DMA window size and
|
|
a number of TCE table levels (if a TCE table is going to be big enough and
|
|
the kernel may not be able to allocate enough of physically contiguous
|
|
memory). It creates a new window in the available slot and returns the bus
|
|
address where the new window starts. Due to hardware limitation, the user
|
|
space cannot choose the location of DMA windows.
|
|
|
|
VFIO_IOMMU_SPAPR_TCE_REMOVE receives the bus start address of the window
|
|
and removes it.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
.. [1] VFIO was originally an acronym for "Virtual Function I/O" in its
|
|
initial implementation by Tom Lyon while as Cisco. We've since
|
|
outgrown the acronym, but it's catchy.
|
|
|
|
.. [2] "safe" also depends upon a device being "well behaved". It's
|
|
possible for multi-function devices to have backdoors between
|
|
functions and even for single function devices to have alternative
|
|
access to things like PCI config space through MMIO registers. To
|
|
guard against the former we can include additional precautions in the
|
|
IOMMU driver to group multi-function PCI devices together
|
|
(iommu=group_mf). The latter we can't prevent, but the IOMMU should
|
|
still provide isolation. For PCI, SR-IOV Virtual Functions are the
|
|
best indicator of "well behaved", as these are designed for
|
|
virtualization usage models.
|
|
|
|
.. [3] As always there are trade-offs to virtual machine device
|
|
assignment that are beyond the scope of VFIO. It's expected that
|
|
future IOMMU technologies will reduce some, but maybe not all, of
|
|
these trade-offs.
|
|
|
|
.. [4] In this case the device is below a PCI bridge, so transactions
|
|
from either function of the device are indistinguishable to the iommu::
|
|
|
|
-[0000:00]-+-1e.0-[06]--+-0d.0
|
|
\-0d.1
|
|
|
|
00:1e.0 PCI bridge: Intel Corporation 82801 PCI Bridge (rev 90)
|
|
|
|
.. [5] Nested translation is an IOMMU feature which supports two stage
|
|
address translations. This improves the address translation efficiency
|
|
in IOMMU virtualization.
|
|
|
|
.. [6] PASID stands for Process Address Space ID, introduced by PCI
|
|
Express. It is a prerequisite for Shared Virtual Addressing (SVA)
|
|
and Scalable I/O Virtualization (Scalable IOV).
|