On Wed, 2008-07-09 at 10:49 -0500, Anthony Liguori wrote:
> Ben-Ami Yassour wrote:
> > From: Kay, Allen M <[EMAIL PROTECTED]>
> >
> > This patch includes the functions to support VT-d for passthrough
> > devices.
> >
> > [Ben: fixed memory pinning]
> >
> > Signed-off-by: Kay, Allen M <[EMAIL PROTECTED]>
> > Signed-off-by: Weidong Han <[EMAIL PROTECTED]>
> > Signed-off-by: Ben-Ami Yassour <[EMAIL PROTECTED]>
> > ---
> >  arch/x86/kvm/Makefile      |    2 +-
> >  arch/x86/kvm/vtd.c         |  189 
> > ++++++++++++++++++++++++++++++++++++++++++++
> >  include/asm-x86/kvm_host.h |   17 ++++
> >  include/asm-x86/kvm_para.h |   14 +++
> >  include/linux/kvm_host.h   |    6 ++
> >  5 files changed, 227 insertions(+), 1 deletions(-)
> >  create mode 100644 arch/x86/kvm/vtd.c
> >
> > diff --git a/arch/x86/kvm/Makefile b/arch/x86/kvm/Makefile
> > index d0e940b..5d9d079 100644
> > --- a/arch/x86/kvm/Makefile
> > +++ b/arch/x86/kvm/Makefile
> > @@ -11,7 +11,7 @@ endif
> >  EXTRA_CFLAGS += -Ivirt/kvm -Iarch/x86/kvm
> >  
> >  kvm-objs := $(common-objs) x86.o mmu.o x86_emulate.o i8259.o irq.o lapic.o 
> > \
> > -   i8254.o
> > +   i8254.o vtd.o
> >  obj-$(CONFIG_KVM) += kvm.o
> >  kvm-intel-objs = vmx.o
> >  obj-$(CONFIG_KVM_INTEL) += kvm-intel.o
> > diff --git a/arch/x86/kvm/vtd.c b/arch/x86/kvm/vtd.c
> > new file mode 100644
> > index 0000000..5abeef1
> > --- /dev/null
> > +++ b/arch/x86/kvm/vtd.c
> > @@ -0,0 +1,189 @@
> > +/*
> > + * Copyright (c) 2006, Intel Corporation.
> > + *
> > + * This program is free software; you can redistribute it and/or modify it
> > + * under the terms and conditions of the GNU General Public License,
> > + * version 2, as published by the Free Software Foundation.
> > + *
> > + * This program is distributed in the hope it will be useful, but WITHOUT
> > + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
> > + * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License 
> > for
> > + * more details.
> > + *
> > + * You should have received a copy of the GNU General Public License along 
> > with
> > + * this program; if not, write to the Free Software Foundation, Inc., 59 
> > Temple
> > + * Place - Suite 330, Boston, MA 02111-1307 USA.
> > + *
> > + * Copyright (C) 2006-2008 Intel Corporation
> > + * Author: Allen M. Kay <[EMAIL PROTECTED]>
> > + * Author: Weidong Han <[EMAIL PROTECTED]>
> > + */
> > +
> > +#include <linux/list.h>
> > +#include <linux/kvm_host.h>
> > +#include <linux/pci.h>
> > +#include <linux/dmar.h>
> > +#include <linux/intel-iommu.h>
> > +
> > +static int kvm_iommu_unmap_memslots(struct kvm *kvm);
> > +
> > +int kvm_iommu_map_pages(struct kvm *kvm,
> > +                   gfn_t base_gfn, unsigned long npages)
> > +{
> > +   gfn_t gfn = base_gfn;
> > +   pfn_t pfn;
> > +   struct page *page;
> > +   int i, rc;
> > +   struct dmar_domain *domain = kvm->arch.intel_iommu_domain;
> > +
> > +   if (!domain)
> > +           return -EFAULT;
> > +
> > +   for (i = 0; i < npages; i++) {
> > +           pfn = gfn_to_pfn(kvm, gfn);
> > +           if (pfn_valid(pfn)) {
> >   
> 
> As I've mentioned before, this is wrong.  We should add MMIO pages to 
> the VT-d tables but at any rate, pfn_valid() doesn't work for checking 
> if something is MMIO.

removing the check.

> 
> > +                   rc = intel_iommu_page_mapping(domain,
> > +                                                 gfn << PAGE_SHIFT,
> > +                                                 pfn << PAGE_SHIFT,
> > +                                                 PAGE_SIZE,
> > +                                                 DMA_PTE_READ |
> > +                                                 DMA_PTE_WRITE);
> > +                   if (rc) {
> > +                           page = pfn_to_page(pfn);
> > +                           put_page(page);
> >   
> 
> This should be kvm_release_pfn_clean().

fixed in the new version.

> 
> > +                   }
> > +           } else {
> > +                   printk(KERN_DEBUG "kvm_iommu_map_page:"
> > +                          "invalid pfn=%lx\n", pfn);
> > +                   return 0;
> > +           }
> > +           gfn++;
> > +   }
> > +   return 0;
> > +}
> > +
> > +static int kvm_iommu_map_memslots(struct kvm *kvm)
> > +{
> > +   int i, rc;
> > +   for (i = 0; i < kvm->nmemslots; i++) {
> > +           rc = kvm_iommu_map_pages(kvm, kvm->memslots[i].base_gfn,
> > +                                    kvm->memslots[i].npages);
> > +           if (rc)
> > +                   return rc;
> > +   }
> > +   return 0;
> > +}
> > +
> > +int kvm_iommu_map_guest(struct kvm *kvm,
> > +                   struct kvm_pci_passthrough_dev *pci_pt_dev)
> > +{
> > +   struct pci_dev *pdev = NULL;
> > +
> > +   printk(KERN_DEBUG "VT-d direct map: host bdf = %x:%x:%x\n",
> > +          pci_pt_dev->host.busnr,
> > +          PCI_SLOT(pci_pt_dev->host.devfn),
> > +          PCI_FUNC(pci_pt_dev->host.devfn));
> > +
> > +   for_each_pci_dev(pdev) {
> > +           if ((pdev->bus->number == pci_pt_dev->host.busnr) &&
> > +               (pdev->devfn == pci_pt_dev->host.devfn)) {
> > +                   break;
> > +           }
> > +   }
> > +
> > +   if (pdev == NULL) {
> > +           if (kvm->arch.intel_iommu_domain) {
> > +                   intel_iommu_domain_exit(kvm->arch.intel_iommu_domain);
> > +                   kvm->arch.intel_iommu_domain = NULL;
> > +           }
> > +           return -ENODEV;
> > +   }
> > +
> > +   kvm->arch.intel_iommu_domain = intel_iommu_domain_alloc(pdev);
> > +
> > +   if (kvm_iommu_map_memslots(kvm)) {
> > +           kvm_iommu_unmap_memslots(kvm);
> > +           return -EFAULT;
> > +   }
> > +
> > +   intel_iommu_detach_dev(kvm->arch.intel_iommu_domain,
> > +                          pdev->bus->number, pdev->devfn);
> > +
> > +   if (intel_iommu_context_mapping(kvm->arch.intel_iommu_domain,
> > +                                   pdev)) {
> > +           printk(KERN_ERR "Domain context map for %s failed",
> > +                  pci_name(pdev));
> > +           return -EFAULT;
> > +   }
> > +   return 0;
> > +}
> > +
> > +static int kvm_iommu_put_pages(struct kvm *kvm,
> > +                          gfn_t base_gfn, unsigned long npages)
> > +{
> > +   gfn_t gfn = base_gfn;
> > +   pfn_t pfn;
> > +   struct page *page;
> > +   struct dmar_domain *domain = kvm->arch.intel_iommu_domain;
> > +   int i;
> > +
> > +   if (!domain)
> > +           return -EFAULT;
> > +
> > +   for (i = 0; i < npages; i++) {
> > +           pfn = (pfn_t)intel_iommu_iova_to_pfn(domain,
> > +                                                gfn << PAGE_SHIFT);
> > +
> > +           if (pfn && pfn_valid(pfn)) {
> > +                   page = pfn_to_page(pfn);
> > +                   put_page(page);

based on the comment above, changing this to: kvm_release_pfn_clean

> > +           }
> > +           gfn++;
> > +   }
> > +   return 0;
> > +}
> > +
> > +static int kvm_iommu_unmap_memslots(struct kvm *kvm)
> > +{
> > +   int i, rc;
> > +   for (i = 0; i < kvm->nmemslots; i++) {
> > +           rc = kvm_iommu_put_pages(kvm, kvm->memslots[i].base_gfn,
> > +                                    kvm->memslots[i].npages);
> > +           if (rc)
> > +                   return rc;
> > +   }
> > +   return 0;
> > +}
> > +
> > +int kvm_iommu_unmap_guest(struct kvm *kvm)
> > +{
> > +   struct kvm_pci_pt_dev_list *entry;
> > +   struct pci_dev *pdev = NULL;
> > +   struct dmar_domain *domain = kvm->arch.intel_iommu_domain;
> > +
> > +   if (!domain)
> > +           return 0;
> > +
> > +   list_for_each_entry(entry, &kvm->arch.pci_pt_dev_head, list) {
> > +           printk(KERN_DEBUG "VT-d unmap: host bdf = %x:%x:%x\n",
> > +                  entry->pt_dev.host.busnr,
> > +                  PCI_SLOT(entry->pt_dev.host.devfn),
> > +                  PCI_FUNC(entry->pt_dev.host.devfn));
> > +
> > +           for_each_pci_dev(pdev) {
> > +                   if ((pdev->bus->number == entry->pt_dev.host.busnr) &&
> > +                       (pdev->devfn == entry->pt_dev.host.devfn))
> > +                           break;
> > +           }
> > +
> > +           if (pdev == NULL)
> > +                   return -ENODEV;
> > +
> > +           /* detach kvm dmar domain */
> > +           intel_iommu_detach_dev(domain,
> > +                                  pdev->bus->number, pdev->devfn);
> > +   }
> > +   kvm_iommu_unmap_memslots(kvm);
> > +   intel_iommu_domain_exit(domain);
> > +   return 0;
> > +}
> > diff --git a/include/asm-x86/kvm_host.h b/include/asm-x86/kvm_host.h
> > index 41332f6..9391e57 100644
> > --- a/include/asm-x86/kvm_host.h
> > +++ b/include/asm-x86/kvm_host.h
> > @@ -308,6 +308,21 @@ struct kvm_mem_alias {
> >     gfn_t target_gfn;
> >  };
> >  
> > +struct kvm_pci_passthrough_dev_kernel {
> > +   struct kvm_pci_pt_info guest;
> > +   struct kvm_pci_pt_info host;
> > +   struct pci_dev *dev;
> > +};
> > +
> > +/* This list is to store the guest bus:device:function-irq and host
> > + * bus:device:function-irq mapping for assigned devices.
> > + */
> > +struct kvm_pci_pt_dev_list {
> > +   struct list_head list;
> > +   struct kvm_pci_passthrough_dev_kernel pt_dev;
> > +};
> > +
> > +
> >  struct kvm_arch{
> >     int naliases;
> >     struct kvm_mem_alias aliases[KVM_ALIAS_SLOTS];
> > @@ -320,6 +335,8 @@ struct kvm_arch{
> >      * Hash table of struct kvm_mmu_page.
> >      */
> >     struct list_head active_mmu_pages;
> > +   struct list_head pci_pt_dev_head;
> > +   struct dmar_domain *intel_iommu_domain;
> >     struct kvm_pic *vpic;
> >     struct kvm_ioapic *vioapic;
> >     struct kvm_pit *vpit;
> > diff --git a/include/asm-x86/kvm_para.h b/include/asm-x86/kvm_para.h
> > index 76f3921..88153f4 100644
> > --- a/include/asm-x86/kvm_para.h
> > +++ b/include/asm-x86/kvm_para.h
> > @@ -144,4 +144,18 @@ static inline unsigned int kvm_arch_para_features(void)
> >  
> >  #endif
> >  
> > +/* Stores information for identifying host PCI devices assigned to the
> > + * guest: this is used in the host kernel and in the userspace.
> > + */
> > +struct kvm_pci_pt_info {
> > +   unsigned char busnr;
> > +   unsigned int devfn;
> > +   __u32 irq;
> >   
> 
> Userspace should not have to provide the IRQ.  Just use the PCI device 
> structure to find it.  We should use different structures for host/guest 
> devices.

This is part of the PCIPT code (not the VT-d code).
I agree that it needs to change, but its not related to the VT-d code.
This struct was included in the patch just so the VT-d code can be
compiled we on the main KVM tree without the PCI passthrough code.
The new patch that I sent is rebased on Amit's tree.

> 
> > +};
> > +
> > +/* Mapping between host and guest PCI device */
> > +struct kvm_pci_passthrough_dev {
> > +   struct kvm_pci_pt_info guest;
> > +   struct kvm_pci_pt_info host;
> > +};
> >  #endif
> > diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
> > index fc685c5..424534b 100644
> > --- a/include/linux/kvm_host.h
> > +++ b/include/linux/kvm_host.h
> > @@ -278,6 +278,12 @@ int kvm_cpu_has_interrupt(struct kvm_vcpu *v);
> >  int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu);
> >  void kvm_vcpu_kick(struct kvm_vcpu *vcpu);
> >  
> > +int kvm_iommu_map_pages(struct kvm *kvm, gfn_t base_gfn,
> > +                   unsigned long npages);
> > +int kvm_iommu_map_guest(struct kvm *kvm,
> > +                   struct kvm_pci_passthrough_dev *pci_pt_dev);
> > +int kvm_iommu_unmap_guest(struct kvm *kvm);
> > +
> >  static inline void kvm_guest_enter(void)
> >  {
> >     account_system_vtime(current);
> >   
> 
> I'm not seeing these functions called anywhere?  Am I missing something 
> obvious or is part of your patch missing?

The 3 APIs above are the interface between the PCI passthrough code and
the VT-d code. I am resending the patch rebased on Amit's tree so you
can see the way that the PCI passthrough code is calling this interface.

Thanks,
Ben

> 
> Regards,
> 
> Anthony Liguori

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to