From: Kay, Allen M <[EMAIL PROTECTED]> This patch includes the functions to support VT-d for passthrough devices.
[Ben: fixed memory pinning] Signed-off-by: Kay, Allen M <[EMAIL PROTECTED]> Signed-off-by: Weidong Han <[EMAIL PROTECTED]> Signed-off-by: Ben-Ami Yassour <[EMAIL PROTECTED]> --- arch/x86/kvm/Makefile | 2 +- arch/x86/kvm/vtd.c | 191 ++++++++++++++++++++++++++++++++++++++++++++ arch/x86/kvm/vtd.h | 36 ++++++++ include/asm-x86/kvm_host.h | 17 ++++ include/asm-x86/kvm_para.h | 14 +++ include/linux/kvm_host.h | 8 ++ 6 files changed, 267 insertions(+), 1 deletions(-) create mode 100644 arch/x86/kvm/vtd.c create mode 100644 arch/x86/kvm/vtd.h diff --git a/arch/x86/kvm/Makefile b/arch/x86/kvm/Makefile index d0e940b..5d9d079 100644 --- a/arch/x86/kvm/Makefile +++ b/arch/x86/kvm/Makefile @@ -11,7 +11,7 @@ endif EXTRA_CFLAGS += -Ivirt/kvm -Iarch/x86/kvm kvm-objs := $(common-objs) x86.o mmu.o x86_emulate.o i8259.o irq.o lapic.o \ - i8254.o + i8254.o vtd.o obj-$(CONFIG_KVM) += kvm.o kvm-intel-objs = vmx.o obj-$(CONFIG_KVM_INTEL) += kvm-intel.o diff --git a/arch/x86/kvm/vtd.c b/arch/x86/kvm/vtd.c new file mode 100644 index 0000000..f665357 --- /dev/null +++ b/arch/x86/kvm/vtd.c @@ -0,0 +1,191 @@ +/* + * Copyright (c) 2006, Intel Corporation. + * + * This program is free software; you can redistribute it and/or modify it + * under the terms and conditions of the GNU General Public License, + * version 2, as published by the Free Software Foundation. + * + * This program is distributed in the hope it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for + * more details. + * + * You should have received a copy of the GNU General Public License along with + * this program; if not, write to the Free Software Foundation, Inc., 59 Temple + * Place - Suite 330, Boston, MA 02111-1307 USA. + * + * Copyright (C) 2006-2008 Intel Corporation + * Author: Allen M. Kay <[EMAIL PROTECTED]> + * Author: Weidong Han <[EMAIL PROTECTED]> + */ + +#include <linux/list.h> +#include <linux/kvm_host.h> +#include <linux/pci.h> +#include <linux/dmar.h> +#include <linux/intel-iommu.h> +#include "vtd.h" + +static int kvm_iommu_unmap_memslots(struct kvm *kvm); + +int kvm_iommu_map_pages(struct kvm *kvm, + gfn_t base_gfn, unsigned long npages) +{ + gfn_t gfn = base_gfn; + pfn_t pfn; + struct page *page; + int i, rc; + struct dmar_domain *domain = kvm->arch.intel_iommu_domain; + + if (!domain) + return -EFAULT; + + for (i = 0; i < npages; i++) { + pfn = gfn_to_pfn(kvm, gfn); + if (pfn_valid(pfn)) { + rc = kvm_intel_iommu_page_mapping(domain, + gfn << PAGE_SHIFT, + pfn << PAGE_SHIFT, + PAGE_SIZE, + DMA_PTE_READ | + DMA_PTE_WRITE); + if (rc) { + page = pfn_to_page(pfn); + put_page(page); + } + } else { + printk(KERN_DEBUG "kvm_iommu_map_page:" + "invalid pfn=%lx\n", pfn); + return 0; + } + gfn++; + } + return 0; +} + +static int kvm_iommu_map_memslots(struct kvm *kvm) +{ + int i, rc; + for (i = 0; i < kvm->nmemslots; i++) { + rc = kvm_iommu_map_pages(kvm, kvm->memslots[i].base_gfn, + kvm->memslots[i].npages); + if (rc) + return rc; + } + return 0; +} + +int kvm_iommu_map_guest(struct kvm *kvm, + struct kvm_pci_passthrough_dev *pci_pt_dev) +{ + struct pci_dev *pdev = NULL; + + printk(KERN_DEBUG "VT-d direct map: host bdf = %x:%x:%x\n", + pci_pt_dev->host.busnr, + PCI_SLOT(pci_pt_dev->host.devfn), + PCI_FUNC(pci_pt_dev->host.devfn)); + + for_each_pci_dev(pdev) { + if ((pdev->bus->number == pci_pt_dev->host.busnr) && + (pdev->devfn == pci_pt_dev->host.devfn)) { + break; + } + } + + if (pdev == NULL) { + if (kvm->arch.intel_iommu_domain) { + kvm_intel_iommu_domain_exit(kvm->arch. + intel_iommu_domain); + kvm->arch.intel_iommu_domain = NULL; + } + return -ENODEV; + } + + kvm->arch.intel_iommu_domain = kvm_intel_iommu_domain_alloc(pdev); + + if (kvm_iommu_map_memslots(kvm)) { + kvm_iommu_unmap_memslots(kvm); + return -EFAULT; + } + + kvm_intel_iommu_detach_dev(kvm->arch.intel_iommu_domain, + pdev->bus->number, pdev->devfn); + + if (kvm_intel_iommu_context_mapping(kvm->arch.intel_iommu_domain, + pdev)) { + printk(KERN_ERR "Domain context map for %s failed", + pci_name(pdev)); + return -EFAULT; + } + return 0; +} + +static int kvm_iommu_put_pages(struct kvm *kvm, + gfn_t base_gfn, unsigned long npages) +{ + gfn_t gfn = base_gfn; + pfn_t pfn; + struct page *page; + struct dmar_domain *domain = kvm->arch.intel_iommu_domain; + int i; + + if (!domain) + return -EFAULT; + + for (i = 0; i < npages; i++) { + pfn = (pfn_t)kvm_intel_iommu_gfn_to_pfn(domain, + gfn); + + if (pfn && pfn_valid(pfn)) { + page = pfn_to_page(pfn); + put_page(page); + } + gfn++; + } + return 0; +} + +static int kvm_iommu_unmap_memslots(struct kvm *kvm) +{ + int i, rc; + for (i = 0; i < kvm->nmemslots; i++) { + rc = kvm_iommu_put_pages(kvm, kvm->memslots[i].base_gfn, + kvm->memslots[i].npages); + if (rc) + return rc; + } + return 0; +} + +int kvm_iommu_unmap_guest(struct kvm *kvm) +{ + struct kvm_pci_pt_dev_list *entry; + struct pci_dev *pdev = NULL; + struct dmar_domain *domain = kvm->arch.intel_iommu_domain; + + if (!domain) + return 0; + + list_for_each_entry(entry, &kvm->arch.pci_pt_dev_head, list) { + printk(KERN_DEBUG "VT-d unmap: host bdf = %x:%x:%x\n", + entry->pt_dev.host.busnr, + PCI_SLOT(entry->pt_dev.host.devfn), + PCI_FUNC(entry->pt_dev.host.devfn)); + + for_each_pci_dev(pdev) { + if ((pdev->bus->number == entry->pt_dev.host.busnr) && + (pdev->devfn == entry->pt_dev.host.devfn)) + break; + } + + if (pdev == NULL) + return -ENODEV; + + /* detach kvm dmar domain */ + kvm_intel_iommu_detach_dev(domain, + pdev->bus->number, pdev->devfn); + } + kvm_iommu_unmap_memslots(kvm); + kvm_intel_iommu_domain_exit(domain); + return 0; +} diff --git a/arch/x86/kvm/vtd.h b/arch/x86/kvm/vtd.h new file mode 100644 index 0000000..9823cfd --- /dev/null +++ b/arch/x86/kvm/vtd.h @@ -0,0 +1,36 @@ +#ifndef __KVM_INTEL_IOMMU_H +#define __KVM_INTEL_IOMMU_H + +/* + * Copyright (c) 2006, Intel Corporation. + * + * This program is free software; you can redistribute it and/or modify it + * under the terms and conditions of the GNU General Public License, + * version 2, as published by the Free Software Foundation. + * + * This program is distributed in the hope it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for + * more details. + * + * You should have received a copy of the GNU General Public License along with + * this program; if not, write to the Free Software Foundation, Inc., 59 Temple + * Place - Suite 330, Boston, MA 02111-1307 USA. + * + * Copyright (C) 2006-2008 Intel Corporation + * Author: Allen M. Kay <[EMAIL PROTECTED]> + * Author: Weidong Han <[EMAIL PROTECTED]> + */ + +/* #define DEBUG */ + +int kvm_intel_iommu_context_mapping(struct dmar_domain *d, + struct pci_dev *pdev); +int kvm_intel_iommu_page_mapping(struct dmar_domain *domain, dma_addr_t iova, + u64 hpa, size_t size, int prot); +void kvm_intel_iommu_detach_dev(struct dmar_domain *domain, u8 bus, u8 devfn); +struct dmar_domain *kvm_intel_iommu_domain_alloc(struct pci_dev *pdev); +void kvm_intel_iommu_domain_exit(struct dmar_domain *domain); +struct dmar_domain *kvm_intel_iommu_find_domain(struct pci_dev *pdev); + +#endif diff --git a/include/asm-x86/kvm_host.h b/include/asm-x86/kvm_host.h index bae1b76..19194a2 100644 --- a/include/asm-x86/kvm_host.h +++ b/include/asm-x86/kvm_host.h @@ -308,6 +308,21 @@ struct kvm_mem_alias { gfn_t target_gfn; }; +struct kvm_pci_passthrough_dev_kernel { + struct kvm_pci_pt_info guest; + struct kvm_pci_pt_info host; + struct pci_dev *dev; +}; + +/* This list is to store the guest bus:device:function-irq and host + * bus:device:function-irq mapping for assigned devices. + */ +struct kvm_pci_pt_dev_list { + struct list_head list; + struct kvm_pci_passthrough_dev_kernel pt_dev; +}; + + struct kvm_arch{ int naliases; struct kvm_mem_alias aliases[KVM_ALIAS_SLOTS]; @@ -320,6 +335,8 @@ struct kvm_arch{ * Hash table of struct kvm_mmu_page. */ struct list_head active_mmu_pages; + struct list_head pci_pt_dev_head; + struct dmar_domain *intel_iommu_domain; struct kvm_pic *vpic; struct kvm_ioapic *vioapic; struct kvm_pit *vpit; diff --git a/include/asm-x86/kvm_para.h b/include/asm-x86/kvm_para.h index bfd9900..a833f6b 100644 --- a/include/asm-x86/kvm_para.h +++ b/include/asm-x86/kvm_para.h @@ -139,4 +139,18 @@ static inline unsigned int kvm_arch_para_features(void) #endif +/* Stores information for identifying host PCI devices assigned to the + * guest: this is used in the host kernel and in the userspace. + */ +struct kvm_pci_pt_info { + unsigned char busnr; + unsigned int devfn; + __u32 irq; +}; + +/* Mapping between host and guest PCI device */ +struct kvm_pci_passthrough_dev { + struct kvm_pci_pt_info guest; + struct kvm_pci_pt_info host; +}; #endif diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index d220b49..39b7c32 100644 --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h @@ -278,6 +278,14 @@ int kvm_cpu_has_interrupt(struct kvm_vcpu *v); int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu); void kvm_vcpu_kick(struct kvm_vcpu *vcpu); +int kvm_iommu_map_pages(struct kvm *kvm, gfn_t base_gfn, + unsigned long npages); +int kvm_iommu_map_guest(struct kvm *kvm, + struct kvm_pci_passthrough_dev *pci_pt_dev); +int kvm_iommu_unmap_guest(struct kvm *kvm); +int kvm_intel_iommu_found(void); +u64 kvm_intel_iommu_gfn_to_pfn(struct dmar_domain *domain, u64 gfn); + static inline void kvm_guest_enter(void) { account_system_vtime(current); -- 1.5.5.1 -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html