mirror of
https://github.com/cloud-hypervisor/cloud-hypervisor.git
synced 2025-01-03 03:15:20 +00:00
vfio: Switch to the vfio-ioctls crate ch branch
Signed-off-by: Samuel Ortiz <sameo@linux.intel.com>
This commit is contained in:
parent
d24aa72d3e
commit
3336e80192
17
Cargo.lock
generated
17
Cargo.lock
generated
@ -690,7 +690,7 @@ dependencies = [
|
||||
"serde",
|
||||
"serde_derive",
|
||||
"serde_json",
|
||||
"vfio-bindings",
|
||||
"vfio-bindings 0.2.0 (git+https://github.com/rust-vmm/vfio-bindings)",
|
||||
"vfio-ioctls",
|
||||
"vm-allocator",
|
||||
"vm-device",
|
||||
@ -1352,18 +1352,22 @@ dependencies = [
|
||||
"vmm-sys-util",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "vfio-bindings"
|
||||
version = "0.2.0"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "4a21f546f2bda37f5a8cfb138c87f95b8e34d2d78d6a7a92ba3785f4e08604a7"
|
||||
|
||||
[[package]]
|
||||
name = "vfio-ioctls"
|
||||
version = "0.0.1"
|
||||
version = "0.1.0"
|
||||
source = "git+https://github.com/cloud-hypervisor/vfio-ioctls?branch=ch#f6f81ee865cb60a24ad5d4ba8200940ed1d5d1f4"
|
||||
dependencies = [
|
||||
"arc-swap",
|
||||
"byteorder",
|
||||
"kvm-bindings",
|
||||
"kvm-ioctls",
|
||||
"libc",
|
||||
"log 0.4.8",
|
||||
"vfio-bindings",
|
||||
"vm-device",
|
||||
"vfio-bindings 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)",
|
||||
"vm-memory",
|
||||
"vmm-sys-util",
|
||||
]
|
||||
@ -1509,6 +1513,7 @@ dependencies = [
|
||||
"serde_derive",
|
||||
"serde_json",
|
||||
"tempfile",
|
||||
"vfio-ioctls",
|
||||
"vhost",
|
||||
"virtio-bindings",
|
||||
"vm-allocator",
|
||||
|
@ -63,7 +63,6 @@ members = [
|
||||
"vhost_user_backend",
|
||||
"vhost_user_fs",
|
||||
"vhost_user_net",
|
||||
"vfio-ioctls",
|
||||
"net_util",
|
||||
"acpi_tables",
|
||||
"arch_gen",
|
||||
|
@ -10,7 +10,7 @@ byteorder = "1.3.4"
|
||||
devices = { path = "../devices" }
|
||||
kvm-bindings = { git = "https://github.com/cloud-hypervisor/kvm-bindings", branch = "ch" }
|
||||
kvm-ioctls = { git = "https://github.com/cloud-hypervisor/kvm-ioctls", branch = "ch" }
|
||||
vfio-ioctls = { path = "../vfio-ioctls" }
|
||||
vfio-ioctls = { git = "https://github.com/cloud-hypervisor/vfio-ioctls", branch = "ch" }
|
||||
vmm-sys-util = ">=0.3.1"
|
||||
libc = "0.2.71"
|
||||
log = "0.4.8"
|
||||
|
@ -6,16 +6,17 @@
|
||||
extern crate devices;
|
||||
extern crate vm_allocator;
|
||||
|
||||
use byteorder::{ByteOrder, LittleEndian};
|
||||
use devices::BusDevice;
|
||||
use kvm_bindings::kvm_userspace_memory_region;
|
||||
use kvm_ioctls::*;
|
||||
use crate::{
|
||||
msi_num_enabled_vectors, BarReprogrammingParams, MsiConfig, MsixCap, MsixConfig,
|
||||
PciBarConfiguration, PciBarRegionType, PciCapabilityID, PciClassCode, PciConfiguration,
|
||||
PciDevice, PciDeviceError, PciHeaderType, PciSubclass, MSIX_TABLE_ENTRY_SIZE,
|
||||
};
|
||||
use byteorder::{ByteOrder, LittleEndian};
|
||||
use devices::BusDevice;
|
||||
use kvm_bindings::kvm_userspace_memory_region;
|
||||
use kvm_ioctls::*;
|
||||
use std::any::Any;
|
||||
use std::ops::Deref;
|
||||
use std::os::unix::io::AsRawFd;
|
||||
use std::ptr::null_mut;
|
||||
use std::sync::Arc;
|
||||
@ -26,7 +27,10 @@ use vm_allocator::SystemAllocator;
|
||||
use vm_device::interrupt::{
|
||||
InterruptIndex, InterruptManager, InterruptSourceGroup, MsiIrqGroupConfig,
|
||||
};
|
||||
use vm_memory::{Address, GuestAddress, GuestRegionMmap, GuestUsize};
|
||||
use vm_memory::{
|
||||
Address, GuestAddress, GuestAddressSpace, GuestMemoryAtomic, GuestMemoryMmap, GuestRegionMmap,
|
||||
GuestUsize,
|
||||
};
|
||||
use vmm_sys_util::eventfd::EventFd;
|
||||
|
||||
#[derive(Debug)]
|
||||
@ -283,6 +287,7 @@ pub struct VfioPciDevice {
|
||||
configuration: PciConfiguration,
|
||||
mmio_regions: Vec<MmioRegion>,
|
||||
interrupt: Interrupt,
|
||||
mem: GuestMemoryAtomic<GuestMemoryMmap>,
|
||||
}
|
||||
|
||||
impl VfioPciDevice {
|
||||
@ -291,6 +296,7 @@ impl VfioPciDevice {
|
||||
vm_fd: &Arc<VmFd>,
|
||||
device: VfioDevice,
|
||||
interrupt_manager: &Arc<dyn InterruptManager<GroupConfig = MsiIrqGroupConfig>>,
|
||||
mem: GuestMemoryAtomic<GuestMemoryMmap>,
|
||||
) -> Result<Self> {
|
||||
let device = Arc::new(device);
|
||||
device.reset();
|
||||
@ -320,6 +326,7 @@ impl VfioPciDevice {
|
||||
msi: None,
|
||||
msix: None,
|
||||
},
|
||||
mem,
|
||||
};
|
||||
|
||||
vfio_pci_device.parse_capabilities(interrupt_manager);
|
||||
@ -636,7 +643,11 @@ impl Drop for VfioPciDevice {
|
||||
}
|
||||
}
|
||||
|
||||
if self.device.unset_dma_map().is_err() {
|
||||
if self
|
||||
.device
|
||||
.setup_dma_map(self.mem.memory().deref())
|
||||
.is_err()
|
||||
{
|
||||
error!("failed to remove all guest memory regions from iommu table");
|
||||
}
|
||||
}
|
||||
@ -842,7 +853,11 @@ impl PciDevice for VfioPciDevice {
|
||||
}
|
||||
}
|
||||
|
||||
if self.device.setup_dma_map().is_err() {
|
||||
if self
|
||||
.device
|
||||
.setup_dma_map(self.mem.memory().deref())
|
||||
.is_err()
|
||||
{
|
||||
error!("failed to add all guest memory regions into iommu table");
|
||||
}
|
||||
|
||||
|
@ -1,19 +0,0 @@
|
||||
[package]
|
||||
name = "vfio-ioctls"
|
||||
version = "0.0.1"
|
||||
authors = ["The Cloud Hypervisor Authors"]
|
||||
|
||||
[dependencies]
|
||||
arc-swap = ">=0.4.4"
|
||||
byteorder = "1.3.4"
|
||||
kvm-bindings = { git = "https://github.com/cloud-hypervisor/kvm-bindings", branch = "ch" }
|
||||
kvm-ioctls = { git = "https://github.com/cloud-hypervisor/kvm-ioctls", branch = "ch" }
|
||||
libc = "0.2.71"
|
||||
log = "0.4.8"
|
||||
vm-device = { path = "../vm-device" }
|
||||
vm-memory = { version = "0.2.1", features = ["backend-mmap"] }
|
||||
vmm-sys-util = ">=0.3.1"
|
||||
|
||||
[dependencies.vfio-bindings]
|
||||
git = "https://github.com/rust-vmm/vfio-bindings"
|
||||
features = ["fam-wrappers"]
|
@ -1,56 +0,0 @@
|
||||
// Copyright © 2019 Intel Corporation
|
||||
//
|
||||
// SPDX-License-Identifier: Apache-2.0 OR BSD-3-Clause
|
||||
//
|
||||
|
||||
//#![deny(missing_docs)]
|
||||
//! Virtual Function I/O (VFIO) API
|
||||
extern crate arc_swap;
|
||||
extern crate byteorder;
|
||||
extern crate kvm_bindings;
|
||||
extern crate kvm_ioctls;
|
||||
#[macro_use]
|
||||
extern crate log;
|
||||
extern crate vfio_bindings;
|
||||
extern crate vm_device;
|
||||
extern crate vm_memory;
|
||||
#[macro_use]
|
||||
extern crate vmm_sys_util;
|
||||
|
||||
mod vfio_device;
|
||||
mod vfio_ioctls;
|
||||
|
||||
use std::mem::size_of;
|
||||
|
||||
pub use vfio_device::{VfioContainer, VfioDevice, VfioDmaMapping, VfioError};
|
||||
|
||||
// Returns a `Vec<T>` with a size in bytes at least as large as `size_in_bytes`.
|
||||
fn vec_with_size_in_bytes<T: Default>(size_in_bytes: usize) -> Vec<T> {
|
||||
let rounded_size = (size_in_bytes + size_of::<T>() - 1) / size_of::<T>();
|
||||
let mut v = Vec::with_capacity(rounded_size);
|
||||
for _ in 0..rounded_size {
|
||||
v.push(T::default())
|
||||
}
|
||||
v
|
||||
}
|
||||
|
||||
// The kvm API has many structs that resemble the following `Foo` structure:
|
||||
//
|
||||
// ```
|
||||
// #[repr(C)]
|
||||
// struct Foo {
|
||||
// some_data: u32
|
||||
// entries: __IncompleteArrayField<__u32>,
|
||||
// }
|
||||
// ```
|
||||
//
|
||||
// In order to allocate such a structure, `size_of::<Foo>()` would be too small because it would not
|
||||
// include any space for `entries`. To make the allocation large enough while still being aligned
|
||||
// for `Foo`, a `Vec<Foo>` is created. Only the first element of `Vec<Foo>` would actually be used
|
||||
// as a `Foo`. The remaining memory in the `Vec<Foo>` is for `entries`, which must be contiguous
|
||||
// with `Foo`. This function is used to make the `Vec<Foo>` with enough space for `count` entries.
|
||||
pub fn vec_with_array_field<T: Default, F>(count: usize) -> Vec<T> {
|
||||
let element_space = count * size_of::<F>();
|
||||
let vec_size_bytes = size_of::<T>() + element_space;
|
||||
vec_with_size_in_bytes(vec_size_bytes)
|
||||
}
|
@ -1,914 +0,0 @@
|
||||
// Copyright © 2019 Intel Corporation
|
||||
//
|
||||
// SPDX-License-Identifier: Apache-2.0 OR BSD-3-Clause
|
||||
//
|
||||
use crate::vec_with_array_field;
|
||||
use byteorder::{ByteOrder, LittleEndian};
|
||||
use kvm_ioctls::*;
|
||||
use std::collections::HashMap;
|
||||
use std::convert::TryInto;
|
||||
use std::ffi::CString;
|
||||
use std::fmt;
|
||||
use std::fs::{File, OpenOptions};
|
||||
use std::io;
|
||||
use std::mem;
|
||||
use std::num;
|
||||
use std::os::unix::io::{AsRawFd, FromRawFd, RawFd};
|
||||
use std::os::unix::prelude::FileExt;
|
||||
use std::path::{Path, PathBuf};
|
||||
use std::result;
|
||||
use std::sync::Arc;
|
||||
use std::u32;
|
||||
use vfio_bindings::bindings::vfio::*;
|
||||
use vfio_bindings::bindings::IrqSet;
|
||||
use vfio_ioctls::*;
|
||||
use vm_device::{get_host_address_range, ExternalDmaMapping};
|
||||
use vm_memory::{
|
||||
Address, GuestAddress, GuestAddressSpace, GuestMemory, GuestMemoryAtomic, GuestMemoryMmap,
|
||||
GuestMemoryRegion, GuestRegionMmap,
|
||||
};
|
||||
use vmm_sys_util::eventfd::EventFd;
|
||||
use vmm_sys_util::fam::FamStruct;
|
||||
use vmm_sys_util::ioctl::*;
|
||||
|
||||
#[derive(Debug)]
|
||||
pub enum VfioError {
|
||||
OpenContainer(io::Error),
|
||||
OpenGroup(io::Error),
|
||||
GetGroupStatus,
|
||||
GroupViable,
|
||||
VfioApiVersion,
|
||||
VfioExtension,
|
||||
VfioInvalidType,
|
||||
VfioType1V2,
|
||||
GroupSetContainer,
|
||||
UnsetContainer,
|
||||
ContainerSetIOMMU,
|
||||
GroupGetDeviceFD,
|
||||
KvmSetDeviceAttr(kvm_ioctls::Error),
|
||||
VfioDeviceGetInfo,
|
||||
VfioDeviceGetRegionInfo,
|
||||
InvalidPath,
|
||||
IommuDmaMap,
|
||||
IommuDmaUnmap,
|
||||
VfioDeviceGetIrqInfo,
|
||||
VfioDeviceSetIrq,
|
||||
VfioNoIommuGroup(String),
|
||||
ReadLink(io::Error),
|
||||
ParseInt(num::ParseIntError),
|
||||
}
|
||||
pub type Result<T> = std::result::Result<T, VfioError>;
|
||||
|
||||
impl fmt::Display for VfioError {
|
||||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||||
match self {
|
||||
VfioError::OpenContainer(e) => {
|
||||
write!(f, "failed to open /dev/vfio/vfio container: {}", e)
|
||||
}
|
||||
VfioError::OpenGroup(e) => {
|
||||
write!(f, "failed to open /dev/vfio/$group_num group: {}", e)
|
||||
}
|
||||
VfioError::GetGroupStatus => write!(f, "failed to get Group Status"),
|
||||
VfioError::GroupViable => write!(f, "group is inviable"),
|
||||
VfioError::VfioApiVersion => write!(
|
||||
f,
|
||||
"vfio API version doesn't match with VFIO_API_VERSION defined in vfio-bindings"
|
||||
),
|
||||
VfioError::VfioExtension => write!(f, "failed to check VFIO extension"),
|
||||
VfioError::VfioInvalidType => write!(f, "invalid VFIO type"),
|
||||
VfioError::VfioType1V2 => {
|
||||
write!(f, "container dones't support VfioType1V2 IOMMU driver type")
|
||||
}
|
||||
VfioError::GroupSetContainer => {
|
||||
write!(f, "failed to add vfio group into vfio container")
|
||||
}
|
||||
VfioError::UnsetContainer => write!(f, "failed to unset vfio container"),
|
||||
VfioError::ContainerSetIOMMU => write!(
|
||||
f,
|
||||
"failed to set container's IOMMU driver type as VfioType1V2"
|
||||
),
|
||||
VfioError::GroupGetDeviceFD => write!(f, "failed to get vfio device fd"),
|
||||
VfioError::KvmSetDeviceAttr(e) => {
|
||||
write!(f, "failed to set KVM vfio device's attribute: {}", e)
|
||||
}
|
||||
VfioError::VfioDeviceGetInfo => {
|
||||
write!(f, "failed to get vfio device's info or info doesn't match")
|
||||
}
|
||||
VfioError::VfioDeviceGetRegionInfo => {
|
||||
write!(f, "failed to get vfio device's region info")
|
||||
}
|
||||
VfioError::InvalidPath => write!(f, "invalid file path"),
|
||||
VfioError::IommuDmaMap => write!(f, "failed to add guest memory map into iommu table"),
|
||||
VfioError::IommuDmaUnmap => {
|
||||
write!(f, "failed to remove guest memory map from iommu table")
|
||||
}
|
||||
VfioError::VfioDeviceGetIrqInfo => write!(f, "failed to get vfio device irq info"),
|
||||
VfioError::VfioDeviceSetIrq => write!(f, "failed to set vfio deviece irq"),
|
||||
VfioError::ReadLink(e) => write!(f, "failed to read link from path: {}", e),
|
||||
VfioError::VfioNoIommuGroup(e) => write!(f, "Failed to find iommu_group for: {}", e),
|
||||
VfioError::ParseInt(e) => write!(f, "failed to parse integer: {}", e),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Debug, Default)]
|
||||
struct vfio_region_info_with_cap {
|
||||
region_info: vfio_region_info,
|
||||
cap_info: __IncompleteArrayField<u8>,
|
||||
}
|
||||
|
||||
pub struct VfioContainer {
|
||||
container: File,
|
||||
}
|
||||
|
||||
impl VfioContainer {
|
||||
fn new() -> Result<Self> {
|
||||
let container = OpenOptions::new()
|
||||
.read(true)
|
||||
.write(true)
|
||||
.open("/dev/vfio/vfio")
|
||||
.map_err(VfioError::OpenContainer)?;
|
||||
|
||||
Ok(VfioContainer { container })
|
||||
}
|
||||
|
||||
fn get_api_version(&self) -> i32 {
|
||||
// Safe as file is vfio container fd and ioctl is defined by kernel.
|
||||
unsafe { ioctl(self, VFIO_GET_API_VERSION()) }
|
||||
}
|
||||
|
||||
fn check_extension(&self, val: u32) -> Result<()> {
|
||||
if val != VFIO_TYPE1_IOMMU && val != VFIO_TYPE1v2_IOMMU {
|
||||
return Err(VfioError::VfioInvalidType);
|
||||
}
|
||||
|
||||
// Safe as file is vfio container and make sure val is valid.
|
||||
let ret = unsafe { ioctl_with_val(self, VFIO_CHECK_EXTENSION(), val.into()) };
|
||||
if ret != 1 {
|
||||
return Err(VfioError::VfioExtension);
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn set_iommu(&self, val: u32) -> Result<()> {
|
||||
if val != VFIO_TYPE1_IOMMU && val != VFIO_TYPE1v2_IOMMU {
|
||||
return Err(VfioError::VfioInvalidType);
|
||||
}
|
||||
|
||||
// Safe as file is vfio container and make sure val is valid.
|
||||
let ret = unsafe { ioctl_with_val(self, VFIO_SET_IOMMU(), val.into()) };
|
||||
if ret < 0 {
|
||||
return Err(VfioError::ContainerSetIOMMU);
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn vfio_dma_map(&self, iova: u64, size: u64, user_addr: u64) -> Result<()> {
|
||||
let dma_map = vfio_iommu_type1_dma_map {
|
||||
argsz: mem::size_of::<vfio_iommu_type1_dma_map>() as u32,
|
||||
flags: VFIO_DMA_MAP_FLAG_READ | VFIO_DMA_MAP_FLAG_WRITE,
|
||||
vaddr: user_addr,
|
||||
iova,
|
||||
size,
|
||||
};
|
||||
|
||||
// Safe as file is vfio container, dma_map is constructed by us, and
|
||||
// we check the return value
|
||||
let ret = unsafe { ioctl_with_ref(self, VFIO_IOMMU_MAP_DMA(), &dma_map) };
|
||||
if ret != 0 {
|
||||
return Err(VfioError::IommuDmaMap);
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn vfio_dma_unmap(&self, iova: u64, size: u64) -> Result<()> {
|
||||
let mut dma_unmap = vfio_iommu_type1_dma_unmap {
|
||||
argsz: mem::size_of::<vfio_iommu_type1_dma_unmap>() as u32,
|
||||
flags: 0,
|
||||
iova,
|
||||
size,
|
||||
};
|
||||
|
||||
// Safe as file is vfio container, dma_unmap is constructed by us, and
|
||||
// we check the return value
|
||||
let ret = unsafe { ioctl_with_mut_ref(self, VFIO_IOMMU_UNMAP_DMA(), &mut dma_unmap) };
|
||||
if ret != 0 || dma_unmap.size != size {
|
||||
return Err(VfioError::IommuDmaUnmap);
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
impl AsRawFd for VfioContainer {
|
||||
fn as_raw_fd(&self) -> RawFd {
|
||||
self.container.as_raw_fd()
|
||||
}
|
||||
}
|
||||
|
||||
struct VfioGroup {
|
||||
group: File,
|
||||
device: Arc<DeviceFd>,
|
||||
container: Arc<VfioContainer>,
|
||||
}
|
||||
|
||||
impl VfioGroup {
|
||||
fn new(id: u32, device: Arc<DeviceFd>) -> Result<Self> {
|
||||
let group_path = Path::new("/dev/vfio").join(id.to_string());
|
||||
let group = OpenOptions::new()
|
||||
.read(true)
|
||||
.write(true)
|
||||
.open(&group_path)
|
||||
.map_err(VfioError::OpenGroup)?;
|
||||
|
||||
let mut group_status = vfio_group_status {
|
||||
argsz: mem::size_of::<vfio_group_status>() as u32,
|
||||
flags: 0,
|
||||
};
|
||||
// Safe as we are the owner of group and group_status which are valid value.
|
||||
let mut ret =
|
||||
unsafe { ioctl_with_mut_ref(&group, VFIO_GROUP_GET_STATUS(), &mut group_status) };
|
||||
if ret < 0 {
|
||||
return Err(VfioError::GetGroupStatus);
|
||||
}
|
||||
|
||||
if group_status.flags != VFIO_GROUP_FLAGS_VIABLE {
|
||||
return Err(VfioError::GroupViable);
|
||||
}
|
||||
|
||||
let container = Arc::new(VfioContainer::new()?);
|
||||
if container.get_api_version() as u32 != VFIO_API_VERSION {
|
||||
return Err(VfioError::VfioApiVersion);
|
||||
}
|
||||
|
||||
container.check_extension(VFIO_TYPE1v2_IOMMU)?;
|
||||
|
||||
// Safe as we are the owner of group and container_raw_fd which are valid value,
|
||||
// and we verify the ret value
|
||||
let container_raw_fd = container.as_raw_fd();
|
||||
ret = unsafe { ioctl_with_ref(&group, VFIO_GROUP_SET_CONTAINER(), &container_raw_fd) };
|
||||
if ret < 0 {
|
||||
return Err(VfioError::GroupSetContainer);
|
||||
}
|
||||
|
||||
container.set_iommu(VFIO_TYPE1v2_IOMMU)?;
|
||||
|
||||
Self::kvm_device_add_group(&device, &group)?;
|
||||
|
||||
Ok(VfioGroup {
|
||||
group,
|
||||
device,
|
||||
container,
|
||||
})
|
||||
}
|
||||
|
||||
fn kvm_device_add_group(device_fd: &Arc<DeviceFd>, group: &File) -> Result<()> {
|
||||
let group_fd = group.as_raw_fd();
|
||||
let group_fd_ptr = &group_fd as *const i32;
|
||||
let dev_attr = kvm_bindings::kvm_device_attr {
|
||||
flags: 0,
|
||||
group: kvm_bindings::KVM_DEV_VFIO_GROUP,
|
||||
attr: u64::from(kvm_bindings::KVM_DEV_VFIO_GROUP_ADD),
|
||||
addr: group_fd_ptr as u64,
|
||||
};
|
||||
|
||||
device_fd
|
||||
.set_device_attr(&dev_attr)
|
||||
.map_err(VfioError::KvmSetDeviceAttr)
|
||||
}
|
||||
|
||||
fn kvm_device_del_group(&self) -> std::result::Result<(), kvm_ioctls::Error> {
|
||||
let group_fd = self.as_raw_fd();
|
||||
let group_fd_ptr = &group_fd as *const i32;
|
||||
let dev_attr = kvm_bindings::kvm_device_attr {
|
||||
flags: 0,
|
||||
group: kvm_bindings::KVM_DEV_VFIO_GROUP,
|
||||
attr: u64::from(kvm_bindings::KVM_DEV_VFIO_GROUP_DEL),
|
||||
addr: group_fd_ptr as u64,
|
||||
};
|
||||
|
||||
self.device.set_device_attr(&dev_attr)
|
||||
}
|
||||
|
||||
fn unset_container(&self) -> std::result::Result<(), io::Error> {
|
||||
let container_raw_fd = self.container.as_raw_fd();
|
||||
|
||||
// Safe as we are the owner of self and container_raw_fd which are valid value.
|
||||
let ret = unsafe { ioctl_with_ref(self, VFIO_GROUP_UNSET_CONTAINER(), &container_raw_fd) };
|
||||
if ret < 0 {
|
||||
return Err(io::Error::last_os_error());
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn get_device(&self, name: &Path) -> Result<VfioDeviceInfo> {
|
||||
let uuid_osstr = name.file_name().ok_or(VfioError::InvalidPath)?;
|
||||
let uuid_str = uuid_osstr.to_str().ok_or(VfioError::InvalidPath)?;
|
||||
let path: CString = CString::new(uuid_str.as_bytes()).expect("CString::new() failed");
|
||||
let path_ptr = path.as_ptr();
|
||||
|
||||
// Safe as we are the owner of self and path_ptr which are valid value.
|
||||
let fd = unsafe { ioctl_with_ptr(self, VFIO_GROUP_GET_DEVICE_FD(), path_ptr) };
|
||||
if fd < 0 {
|
||||
return Err(VfioError::GroupGetDeviceFD);
|
||||
}
|
||||
|
||||
// Safe as fd is valid FD
|
||||
let device = unsafe { File::from_raw_fd(fd) };
|
||||
|
||||
let mut dev_info = vfio_device_info {
|
||||
argsz: mem::size_of::<vfio_device_info>() as u32,
|
||||
flags: 0,
|
||||
num_regions: 0,
|
||||
num_irqs: 0,
|
||||
};
|
||||
// Safe as we are the owner of dev and dev_info which are valid value,
|
||||
// and we verify the return value.
|
||||
let ret = unsafe { ioctl_with_mut_ref(&device, VFIO_DEVICE_GET_INFO(), &mut dev_info) };
|
||||
if ret < 0
|
||||
|| (dev_info.flags & VFIO_DEVICE_FLAGS_PCI) == 0
|
||||
|| dev_info.num_regions < VFIO_PCI_CONFIG_REGION_INDEX + 1
|
||||
|| dev_info.num_irqs < VFIO_PCI_MSIX_IRQ_INDEX + 1
|
||||
{
|
||||
return Err(VfioError::VfioDeviceGetInfo);
|
||||
}
|
||||
|
||||
Ok(VfioDeviceInfo {
|
||||
device,
|
||||
flags: dev_info.flags,
|
||||
num_regions: dev_info.num_regions,
|
||||
num_irqs: dev_info.num_irqs,
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
impl AsRawFd for VfioGroup {
|
||||
fn as_raw_fd(&self) -> RawFd {
|
||||
self.group.as_raw_fd()
|
||||
}
|
||||
}
|
||||
|
||||
impl Drop for VfioGroup {
|
||||
fn drop(&mut self) {
|
||||
match self.kvm_device_del_group() {
|
||||
Ok(_) => {}
|
||||
Err(e) => {
|
||||
error!("Could not delete VFIO group: {:?}", e);
|
||||
}
|
||||
}
|
||||
|
||||
match self.unset_container() {
|
||||
Ok(_) => {}
|
||||
Err(e) => {
|
||||
error!("Could not unset container: {:?}", e);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
struct VfioRegion {
|
||||
flags: u32,
|
||||
size: u64,
|
||||
offset: u64,
|
||||
mmap: (u64, u64),
|
||||
}
|
||||
|
||||
struct VfioIrq {
|
||||
flags: u32,
|
||||
index: u32,
|
||||
count: u32,
|
||||
}
|
||||
|
||||
struct VfioDeviceInfo {
|
||||
device: File,
|
||||
flags: u32,
|
||||
num_regions: u32,
|
||||
num_irqs: u32,
|
||||
}
|
||||
|
||||
impl VfioDeviceInfo {
|
||||
fn get_irqs(&self) -> Result<HashMap<u32, VfioIrq>> {
|
||||
let mut irqs: HashMap<u32, VfioIrq> = HashMap::new();
|
||||
|
||||
for index in 0..self.num_irqs {
|
||||
let mut irq_info = vfio_irq_info {
|
||||
argsz: mem::size_of::<vfio_irq_info>() as u32,
|
||||
flags: 0,
|
||||
index,
|
||||
count: 0,
|
||||
};
|
||||
|
||||
let ret = unsafe {
|
||||
ioctl_with_mut_ref(&self.device, VFIO_DEVICE_GET_IRQ_INFO(), &mut irq_info)
|
||||
};
|
||||
if ret < 0 {
|
||||
warn!("Could not get VFIO IRQ info for index {:}", index);
|
||||
continue;
|
||||
}
|
||||
|
||||
let irq = VfioIrq {
|
||||
flags: irq_info.flags,
|
||||
index,
|
||||
count: irq_info.count,
|
||||
};
|
||||
|
||||
debug!("IRQ #{}", index);
|
||||
debug!("\tflag 0x{:x}", irq.flags);
|
||||
debug!("\tindex {}", irq.index);
|
||||
debug!("\tcount {}", irq.count);
|
||||
|
||||
irqs.insert(index, irq);
|
||||
}
|
||||
|
||||
Ok(irqs)
|
||||
}
|
||||
|
||||
fn get_regions(&self) -> Result<Vec<VfioRegion>> {
|
||||
let mut regions: Vec<VfioRegion> = Vec::new();
|
||||
|
||||
for i in VFIO_PCI_BAR0_REGION_INDEX..self.num_regions {
|
||||
let argsz: u32 = mem::size_of::<vfio_region_info>() as u32;
|
||||
|
||||
let mut reg_info = vfio_region_info {
|
||||
argsz,
|
||||
flags: 0,
|
||||
index: i,
|
||||
cap_offset: 0,
|
||||
size: 0,
|
||||
offset: 0,
|
||||
};
|
||||
// Safe as we are the owner of dev and reg_info which are valid value,
|
||||
// and we verify the return value.
|
||||
let mut ret = unsafe {
|
||||
ioctl_with_mut_ref(&self.device, VFIO_DEVICE_GET_REGION_INFO(), &mut reg_info)
|
||||
};
|
||||
if ret < 0 {
|
||||
warn!("Could not get region #{} info", i);
|
||||
continue;
|
||||
}
|
||||
|
||||
let mut mmap_size: u64 = reg_info.size;
|
||||
let mut mmap_offset: u64 = 0;
|
||||
if reg_info.flags & VFIO_REGION_INFO_FLAG_CAPS != 0 && reg_info.argsz > argsz {
|
||||
let cap_len: usize = (reg_info.argsz - argsz) as usize;
|
||||
let mut region_with_cap =
|
||||
vec_with_array_field::<vfio_region_info_with_cap, u8>(cap_len);
|
||||
region_with_cap[0].region_info.argsz = reg_info.argsz;
|
||||
region_with_cap[0].region_info.flags = 0;
|
||||
region_with_cap[0].region_info.index = i;
|
||||
region_with_cap[0].region_info.cap_offset = 0;
|
||||
region_with_cap[0].region_info.size = 0;
|
||||
region_with_cap[0].region_info.offset = 0;
|
||||
// Safe as we are the owner of dev and region_info which are valid value,
|
||||
// and we verify the return value.
|
||||
ret = unsafe {
|
||||
ioctl_with_mut_ref(
|
||||
&self.device,
|
||||
VFIO_DEVICE_GET_REGION_INFO(),
|
||||
&mut (region_with_cap[0].region_info),
|
||||
)
|
||||
};
|
||||
if ret < 0 {
|
||||
warn!("Could not get region #{} info", i);
|
||||
continue;
|
||||
}
|
||||
// region_with_cap[0].cap_info may contain vfio_region_info_cap_sparse_mmap
|
||||
// struct or vfio_region_info_cap_type struct. Both of them begin with
|
||||
// vfio_info_cap_header.
|
||||
// so safe to convert cap_info into vfio_info_cap_header pointer first, and
|
||||
// safe to access its elments through this poiner.
|
||||
#[allow(clippy::cast_ptr_alignment)]
|
||||
let cap_header =
|
||||
unsafe { region_with_cap[0].cap_info.as_ptr() as *const vfio_info_cap_header };
|
||||
if unsafe { u32::from((*cap_header).id) } == VFIO_REGION_INFO_CAP_SPARSE_MMAP {
|
||||
// cap_info is vfio_region_sparse_mmap here
|
||||
// so safe to convert cap_info into vfio_info_region_sparse_mmap pointer, and
|
||||
// safe to access its elements through this pointer.
|
||||
#[allow(clippy::cast_ptr_alignment)]
|
||||
let sparse_mmap = unsafe {
|
||||
region_with_cap[0].cap_info.as_ptr()
|
||||
as *const vfio_region_info_cap_sparse_mmap
|
||||
};
|
||||
let mmap_area = unsafe {
|
||||
(*sparse_mmap).areas.as_ptr() as *const vfio_region_sparse_mmap_area
|
||||
};
|
||||
mmap_size = unsafe { (*mmap_area).size };
|
||||
mmap_offset = unsafe { (*mmap_area).offset };
|
||||
}
|
||||
}
|
||||
|
||||
let region = VfioRegion {
|
||||
flags: reg_info.flags,
|
||||
size: reg_info.size,
|
||||
offset: reg_info.offset,
|
||||
mmap: (mmap_offset, mmap_size),
|
||||
};
|
||||
|
||||
debug!("Region #{}", i);
|
||||
debug!("\tflag 0x{:x}", region.flags);
|
||||
debug!("\tsize 0x{:x}", region.size);
|
||||
debug!("\toffset 0x{:x}", region.offset);
|
||||
|
||||
regions.push(region);
|
||||
}
|
||||
|
||||
Ok(regions)
|
||||
}
|
||||
}
|
||||
|
||||
/// This structure implements the ExternalDmaMapping trait. It is meant to
|
||||
/// be used when the caller tries to provide a way to update the mappings
|
||||
/// associated with a specific VFIO container.
|
||||
pub struct VfioDmaMapping {
|
||||
container: Arc<VfioContainer>,
|
||||
memory: GuestMemoryAtomic<GuestMemoryMmap>,
|
||||
}
|
||||
|
||||
impl VfioDmaMapping {
|
||||
pub fn new(container: Arc<VfioContainer>, memory: GuestMemoryAtomic<GuestMemoryMmap>) -> Self {
|
||||
VfioDmaMapping { container, memory }
|
||||
}
|
||||
}
|
||||
|
||||
impl ExternalDmaMapping for VfioDmaMapping {
|
||||
fn map(&self, iova: u64, gpa: u64, size: u64) -> result::Result<(), io::Error> {
|
||||
let user_addr = if let Some(addr) = get_host_address_range(
|
||||
&self.memory.memory(),
|
||||
GuestAddress(gpa),
|
||||
size.try_into().unwrap(),
|
||||
) {
|
||||
addr as u64
|
||||
} else {
|
||||
return Err(io::Error::new(
|
||||
io::ErrorKind::Other,
|
||||
format!(
|
||||
"failed to convert guest address 0x{:x} into \
|
||||
host user virtual address",
|
||||
gpa
|
||||
),
|
||||
));
|
||||
};
|
||||
|
||||
self.container
|
||||
.vfio_dma_map(iova, size, user_addr)
|
||||
.map_err(|e| {
|
||||
io::Error::new(
|
||||
io::ErrorKind::Other,
|
||||
format!(
|
||||
"failed to map memory for VFIO container, \
|
||||
iova 0x{:x}, gpa 0x{:x}, size 0x{:x}: {:?}",
|
||||
iova, gpa, size, e
|
||||
),
|
||||
)
|
||||
})
|
||||
}
|
||||
|
||||
fn unmap(&self, iova: u64, size: u64) -> result::Result<(), io::Error> {
|
||||
self.container.vfio_dma_unmap(iova, size).map_err(|e| {
|
||||
io::Error::new(
|
||||
io::ErrorKind::Other,
|
||||
format!(
|
||||
"failed to unmap memory for VFIO container, \
|
||||
iova 0x{:x}, size 0x{:x}: {:?}",
|
||||
iova, size, e
|
||||
),
|
||||
)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
/// Vfio device for exposing regions which could be read/write to kernel vfio device.
|
||||
pub struct VfioDevice {
|
||||
device: File,
|
||||
flags: u32,
|
||||
group: VfioGroup,
|
||||
regions: Vec<VfioRegion>,
|
||||
irqs: HashMap<u32, VfioIrq>,
|
||||
mem: GuestMemoryAtomic<GuestMemoryMmap>,
|
||||
iommu_attached: bool,
|
||||
}
|
||||
|
||||
impl VfioDevice {
|
||||
/// Create a new vfio device, then guest read/write on this device could be
|
||||
/// transfered into kernel vfio.
|
||||
/// sysfspath specify the vfio device path in sys file system.
|
||||
pub fn new(
|
||||
sysfspath: &Path,
|
||||
device_fd: Arc<DeviceFd>,
|
||||
mem: GuestMemoryAtomic<GuestMemoryMmap>,
|
||||
iommu_attached: bool,
|
||||
) -> Result<Self> {
|
||||
let uuid_path: PathBuf = [sysfspath, Path::new("iommu_group")].iter().collect();
|
||||
if !uuid_path.exists() {
|
||||
return Err(VfioError::VfioNoIommuGroup(
|
||||
uuid_path.to_str().unwrap().to_string(),
|
||||
));
|
||||
}
|
||||
let group_path = uuid_path.read_link().map_err(VfioError::ReadLink)?;
|
||||
let group_osstr = group_path.file_name().ok_or(VfioError::InvalidPath)?;
|
||||
let group_str = group_osstr.to_str().ok_or(VfioError::InvalidPath)?;
|
||||
let group_id = group_str.parse::<u32>().map_err(VfioError::ParseInt)?;
|
||||
|
||||
let group = VfioGroup::new(group_id, device_fd)?;
|
||||
let device_info = group.get_device(sysfspath)?;
|
||||
let regions = device_info.get_regions()?;
|
||||
let irqs = device_info.get_irqs()?;
|
||||
|
||||
Ok(VfioDevice {
|
||||
device: device_info.device,
|
||||
flags: device_info.flags,
|
||||
group,
|
||||
regions,
|
||||
irqs,
|
||||
mem,
|
||||
iommu_attached,
|
||||
})
|
||||
}
|
||||
|
||||
/// VFIO device reset.
|
||||
/// Only if the device supports being reset.
|
||||
pub fn reset(&self) {
|
||||
if self.flags & VFIO_DEVICE_FLAGS_RESET != 0 {
|
||||
unsafe { ioctl(self, VFIO_DEVICE_RESET()) };
|
||||
}
|
||||
}
|
||||
|
||||
/// Enables a VFIO device IRQs.
|
||||
/// This maps a vector of EventFds to all VFIO managed interrupts. In other words, this
|
||||
/// tells VFIO which EventFd to write into whenever one of the device interrupt vector
|
||||
/// is triggered.
|
||||
///
|
||||
/// # Arguments
|
||||
///
|
||||
/// * `irq_index` - The type (INTX, MSI or MSI-X) of interrupts to enable.
|
||||
/// * `event_fds` - The EventFds vector that matches all the supported VFIO interrupts.
|
||||
pub fn enable_irq(&self, irq_index: u32, event_fds: Vec<&EventFd>) -> Result<()> {
|
||||
let irq = self
|
||||
.irqs
|
||||
.get(&irq_index)
|
||||
.ok_or(VfioError::VfioDeviceSetIrq)?;
|
||||
if irq.count == 0 {
|
||||
return Err(VfioError::VfioDeviceSetIrq);
|
||||
}
|
||||
|
||||
let mut irq_set_wrapper = IrqSet::new(event_fds.len() * mem::size_of::<u32>());
|
||||
let mut irq_set = irq_set_wrapper.as_mut_fam_struct();
|
||||
let fds = irq_set.as_mut_slice();
|
||||
|
||||
for (index, event_fd) in event_fds.iter().enumerate() {
|
||||
let fds_offset = index * mem::size_of::<u32>();
|
||||
let fd = &mut fds[fds_offset..fds_offset + mem::size_of::<u32>()];
|
||||
LittleEndian::write_u32(fd, event_fd.as_raw_fd() as u32);
|
||||
}
|
||||
|
||||
irq_set.argsz = mem::size_of::<vfio_irq_set>() as u32
|
||||
+ (event_fds.len() * mem::size_of::<u32>()) as u32;
|
||||
irq_set.flags = VFIO_IRQ_SET_DATA_EVENTFD | VFIO_IRQ_SET_ACTION_TRIGGER;
|
||||
irq_set.index = irq_index;
|
||||
irq_set.start = 0;
|
||||
irq_set.count = irq.count;
|
||||
|
||||
// Safe as we are the owner of self and irq_set which are valid value
|
||||
let ret = unsafe { ioctl_with_ref(self, VFIO_DEVICE_SET_IRQS(), irq_set) };
|
||||
if ret < 0 {
|
||||
return Err(VfioError::VfioDeviceSetIrq);
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Disables a VFIO device IRQs
|
||||
///
|
||||
/// # Arguments
|
||||
///
|
||||
/// * `irq_index` - The type (INTX, MSI or MSI-X) of interrupts to disable.
|
||||
pub fn disable_irq(&self, irq_index: u32) -> Result<()> {
|
||||
let irq = self
|
||||
.irqs
|
||||
.get(&irq_index)
|
||||
.ok_or(VfioError::VfioDeviceSetIrq)?;
|
||||
if irq.count == 0 {
|
||||
return Err(VfioError::VfioDeviceSetIrq);
|
||||
}
|
||||
|
||||
let mut irq_set = vec_with_array_field::<vfio_irq_set, u32>(0);
|
||||
irq_set[0].argsz = mem::size_of::<vfio_irq_set>() as u32;
|
||||
irq_set[0].flags = VFIO_IRQ_SET_ACTION_TRIGGER | VFIO_IRQ_SET_DATA_NONE;
|
||||
irq_set[0].index = irq_index;
|
||||
irq_set[0].start = 0;
|
||||
irq_set[0].count = 0;
|
||||
|
||||
// Safe as we are the owner of self and irq_set which are valid value
|
||||
let ret = unsafe { ioctl_with_ref(self, VFIO_DEVICE_SET_IRQS(), &irq_set[0]) };
|
||||
if ret < 0 {
|
||||
return Err(VfioError::VfioDeviceSetIrq);
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Wrapper to enable MSI IRQs.
|
||||
pub fn enable_msi(&self, fds: Vec<&EventFd>) -> Result<()> {
|
||||
self.enable_irq(VFIO_PCI_MSI_IRQ_INDEX, fds)
|
||||
}
|
||||
|
||||
/// Wrapper to disable MSI IRQs.
|
||||
pub fn disable_msi(&self) -> Result<()> {
|
||||
self.disable_irq(VFIO_PCI_MSI_IRQ_INDEX)
|
||||
}
|
||||
|
||||
/// Wrapper to enable MSI-X IRQs.
|
||||
pub fn enable_msix(&self, fds: Vec<&EventFd>) -> Result<()> {
|
||||
self.enable_irq(VFIO_PCI_MSIX_IRQ_INDEX, fds)
|
||||
}
|
||||
|
||||
/// Wrapper to disable MSI-X IRQs.
|
||||
pub fn disable_msix(&self) -> Result<()> {
|
||||
self.disable_irq(VFIO_PCI_MSIX_IRQ_INDEX)
|
||||
}
|
||||
|
||||
/// get a region's flag
|
||||
pub fn get_region_flags(&self, index: u32) -> u32 {
|
||||
match self.regions.get(index as usize) {
|
||||
Some(v) => v.flags,
|
||||
None => 0,
|
||||
}
|
||||
}
|
||||
|
||||
/// get a region's offset
|
||||
pub fn get_region_offset(&self, index: u32) -> u64 {
|
||||
match self.regions.get(index as usize) {
|
||||
Some(v) => v.offset,
|
||||
None => 0,
|
||||
}
|
||||
}
|
||||
|
||||
/// get a region's mmap info
|
||||
pub fn get_region_mmap(&self, index: u32) -> (u64, u64) {
|
||||
match self.regions.get(index as usize) {
|
||||
Some(v) => v.mmap,
|
||||
None => {
|
||||
warn!("get_region_mmap with invalid index: {}", index);
|
||||
(0, 0)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// get a region's size
|
||||
pub fn get_region_size(&self, index: u32) -> u64 {
|
||||
match self.regions.get(index as usize) {
|
||||
Some(v) => v.size,
|
||||
None => {
|
||||
warn!("get_region_size with invalid index: {}", index);
|
||||
0
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// Read region's data from VFIO device into buf
|
||||
/// index: region num
|
||||
/// buf: data destination and buf length is read size
|
||||
/// addr: offset in the region
|
||||
pub fn region_read(&self, index: u32, buf: &mut [u8], addr: u64) {
|
||||
let region: &VfioRegion;
|
||||
match self.regions.get(index as usize) {
|
||||
Some(v) => region = v,
|
||||
None => {
|
||||
warn!("region read with invalid index: {}", index);
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
||||
let size = buf.len() as u64;
|
||||
if size > region.size || addr + size > region.size {
|
||||
warn!(
|
||||
"region read with invalid parameter, add: {}, size: {}",
|
||||
addr, size
|
||||
);
|
||||
return;
|
||||
}
|
||||
|
||||
if let Err(e) = self.device.read_exact_at(buf, region.offset + addr) {
|
||||
warn!(
|
||||
"Failed to read region in index: {}, addr: {}, error: {}",
|
||||
index, addr, e
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
/// write the data from buf into a vfio device region
|
||||
/// index: region num
|
||||
/// buf: data src and buf length is write size
|
||||
/// addr: offset in the region
|
||||
pub fn region_write(&self, index: u32, buf: &[u8], addr: u64) {
|
||||
let stub: &VfioRegion;
|
||||
match self.regions.get(index as usize) {
|
||||
Some(v) => stub = v,
|
||||
None => {
|
||||
warn!("region write with invalid index: {}", index);
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
||||
let size = buf.len() as u64;
|
||||
if size > stub.size
|
||||
|| addr + size > stub.size
|
||||
|| (stub.flags & VFIO_REGION_INFO_FLAG_WRITE) == 0
|
||||
{
|
||||
warn!(
|
||||
"region write with invalid parameter, add: {}, size: {}",
|
||||
addr, size
|
||||
);
|
||||
return;
|
||||
}
|
||||
|
||||
if let Err(e) = self.device.write_all_at(buf, stub.offset + addr) {
|
||||
warn!(
|
||||
"Failed to write region in index: {}, addr: {}, error: {}",
|
||||
index, addr, e
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
pub fn get_container(&self) -> Arc<VfioContainer> {
|
||||
self.group.container.clone()
|
||||
}
|
||||
|
||||
fn vfio_dma_map(&self, iova: u64, size: u64, user_addr: u64) -> Result<()> {
|
||||
self.group.container.vfio_dma_map(iova, size, user_addr)
|
||||
}
|
||||
|
||||
fn vfio_dma_unmap(&self, iova: u64, size: u64) -> Result<()> {
|
||||
self.group.container.vfio_dma_unmap(iova, size)
|
||||
}
|
||||
|
||||
/// Add all guest memory regions into vfio container's iommu table,
|
||||
/// then vfio kernel driver could access guest memory from gfn
|
||||
pub fn setup_dma_map(&self) -> Result<()> {
|
||||
if !self.iommu_attached {
|
||||
self.mem.memory().with_regions(|_index, region| {
|
||||
self.vfio_dma_map(
|
||||
region.start_addr().raw_value(),
|
||||
region.len() as u64,
|
||||
region.as_ptr() as u64,
|
||||
)
|
||||
})?;
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// remove all guest memory regions from vfio containers iommu table
|
||||
/// then vfio kernel driver couldn't access this guest memory
|
||||
pub fn unset_dma_map(&self) -> Result<()> {
|
||||
if !self.iommu_attached {
|
||||
self.mem.memory().with_regions(|_index, region| {
|
||||
self.vfio_dma_unmap(region.start_addr().raw_value(), region.len() as u64)
|
||||
})?;
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn extend_dma_map(&self, new_region: &Arc<GuestRegionMmap>) -> Result<()> {
|
||||
if !self.iommu_attached {
|
||||
self.vfio_dma_map(
|
||||
new_region.start_addr().raw_value(),
|
||||
new_region.len() as u64,
|
||||
new_region.as_ptr() as u64,
|
||||
)
|
||||
} else {
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
/// Return the maximum numner of interrupts a VFIO device can request.
|
||||
/// This is used for pre-allocating the VFIO PCI routes.
|
||||
pub fn max_interrupts(&self) -> u32 {
|
||||
let mut max_interrupts = 0;
|
||||
let irq_indexes = vec![
|
||||
VFIO_PCI_INTX_IRQ_INDEX,
|
||||
VFIO_PCI_MSI_IRQ_INDEX,
|
||||
VFIO_PCI_MSIX_IRQ_INDEX,
|
||||
];
|
||||
|
||||
for index in irq_indexes {
|
||||
if let Some(irq_info) = self.irqs.get(&index) {
|
||||
if irq_info.count > max_interrupts {
|
||||
max_interrupts = irq_info.count;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
max_interrupts
|
||||
}
|
||||
}
|
||||
|
||||
impl AsRawFd for VfioDevice {
|
||||
fn as_raw_fd(&self) -> RawFd {
|
||||
self.device.as_raw_fd()
|
||||
}
|
||||
}
|
@ -1,36 +0,0 @@
|
||||
// Copyright © 2019 Intel Corporation
|
||||
//
|
||||
// SPDX-License-Identifier: Apache-2.0 OR BSD-3-Clause
|
||||
//
|
||||
#![allow(non_upper_case_globals)]
|
||||
#![allow(non_camel_case_types)]
|
||||
#![allow(non_snake_case)]
|
||||
|
||||
use vfio_bindings::bindings::vfio::*;
|
||||
|
||||
ioctl_io_nr!(VFIO_GET_API_VERSION, VFIO_TYPE, VFIO_BASE);
|
||||
ioctl_io_nr!(VFIO_CHECK_EXTENSION, VFIO_TYPE, VFIO_BASE + 1);
|
||||
ioctl_io_nr!(VFIO_SET_IOMMU, VFIO_TYPE, VFIO_BASE + 2);
|
||||
ioctl_io_nr!(VFIO_GROUP_GET_STATUS, VFIO_TYPE, VFIO_BASE + 3);
|
||||
ioctl_io_nr!(VFIO_GROUP_SET_CONTAINER, VFIO_TYPE, VFIO_BASE + 4);
|
||||
ioctl_io_nr!(VFIO_GROUP_UNSET_CONTAINER, VFIO_TYPE, VFIO_BASE + 5);
|
||||
ioctl_io_nr!(VFIO_GROUP_GET_DEVICE_FD, VFIO_TYPE, VFIO_BASE + 6);
|
||||
ioctl_io_nr!(VFIO_DEVICE_GET_INFO, VFIO_TYPE, VFIO_BASE + 7);
|
||||
ioctl_io_nr!(VFIO_DEVICE_GET_REGION_INFO, VFIO_TYPE, VFIO_BASE + 8);
|
||||
ioctl_io_nr!(VFIO_DEVICE_GET_IRQ_INFO, VFIO_TYPE, VFIO_BASE + 9);
|
||||
ioctl_io_nr!(VFIO_DEVICE_SET_IRQS, VFIO_TYPE, VFIO_BASE + 10);
|
||||
ioctl_io_nr!(VFIO_DEVICE_RESET, VFIO_TYPE, VFIO_BASE + 11);
|
||||
ioctl_io_nr!(
|
||||
VFIO_DEVICE_GET_PCI_HOT_RESET_INFO,
|
||||
VFIO_TYPE,
|
||||
VFIO_BASE + 12
|
||||
);
|
||||
ioctl_io_nr!(VFIO_DEVICE_PCI_HOT_RESET, VFIO_TYPE, VFIO_BASE + 13);
|
||||
ioctl_io_nr!(VFIO_DEVICE_QUERY_GFX_PLANE, VFIO_TYPE, VFIO_BASE + 14);
|
||||
ioctl_io_nr!(VFIO_DEVICE_GET_GFX_DMABUF, VFIO_TYPE, VFIO_BASE + 15);
|
||||
ioctl_io_nr!(VFIO_DEVICE_IOEVENTFD, VFIO_TYPE, VFIO_BASE + 16);
|
||||
ioctl_io_nr!(VFIO_IOMMU_GET_INFO, VFIO_TYPE, VFIO_BASE + 12);
|
||||
ioctl_io_nr!(VFIO_IOMMU_MAP_DMA, VFIO_TYPE, VFIO_BASE + 13);
|
||||
ioctl_io_nr!(VFIO_IOMMU_UNMAP_DMA, VFIO_TYPE, VFIO_BASE + 14);
|
||||
ioctl_io_nr!(VFIO_IOMMU_ENABLE, VFIO_TYPE, VFIO_BASE + 15);
|
||||
ioctl_io_nr!(VFIO_IOMMU_DISABLE, VFIO_TYPE, VFIO_BASE + 16);
|
@ -42,18 +42,6 @@ pub enum Resource {
|
||||
KvmMemSlot(u32),
|
||||
}
|
||||
|
||||
/// Trait meant for triggering the DMA mapping update related to an external
|
||||
/// device not managed fully through virtio. It is dedicated to virtio-iommu
|
||||
/// in order to trigger the map update anytime the mapping is updated from the
|
||||
/// guest.
|
||||
pub trait ExternalDmaMapping: Send + Sync {
|
||||
/// Map a memory range
|
||||
fn map(&self, iova: u64, gpa: u64, size: u64) -> std::result::Result<(), std::io::Error>;
|
||||
|
||||
/// Unmap a memory range
|
||||
fn unmap(&self, iova: u64, size: u64) -> std::result::Result<(), std::io::Error>;
|
||||
}
|
||||
|
||||
fn get_region_host_address_range(
|
||||
region: &GuestRegionMmap,
|
||||
addr: MemoryRegionAddress,
|
||||
|
@ -25,6 +25,7 @@ serde_derive = ">=1.0.27"
|
||||
serde_json = ">=1.0.9"
|
||||
tempfile = "3.1.0"
|
||||
virtio-bindings = { version = "0.1", features = ["virtio-v5_0_0"]}
|
||||
vfio-ioctls = { git = "https://github.com/cloud-hypervisor/vfio-ioctls", branch = "ch" }
|
||||
vm-allocator = { path = "../vm-allocator" }
|
||||
vm-device = { path = "../vm-device" }
|
||||
vm-memory = { version = "0.2.1", features = ["backend-mmap", "backend-atomic"] }
|
||||
|
@ -22,7 +22,7 @@ use std::result;
|
||||
use std::sync::atomic::{AtomicBool, Ordering};
|
||||
use std::sync::{Arc, RwLock};
|
||||
use std::thread;
|
||||
use vm_device::ExternalDmaMapping;
|
||||
use vfio_ioctls::ExternalDmaMapping;
|
||||
use vm_memory::{
|
||||
Address, ByteValued, Bytes, GuestAddress, GuestAddressSpace, GuestMemoryAtomic,
|
||||
GuestMemoryError, GuestMemoryMmap,
|
||||
|
@ -34,7 +34,7 @@ serde = {version = ">=1.0.27", features = ["rc"] }
|
||||
serde_derive = ">=1.0.27"
|
||||
serde_json = ">=1.0.9"
|
||||
url = "2.1.1"
|
||||
vfio-ioctls = { path = "../vfio-ioctls", optional = true }
|
||||
vfio-ioctls = { git = "https://github.com/cloud-hypervisor/vfio-ioctls", branch = "ch", optional = true }
|
||||
vm-allocator = { path = "../vm-allocator" }
|
||||
vm-device = { path = "../vm-device" }
|
||||
vm-memory = { version = "0.2.1", features = ["backend-mmap", "backend-atomic"] }
|
||||
|
@ -55,7 +55,7 @@ use std::result;
|
||||
use std::sync::{Arc, Mutex};
|
||||
use tempfile::NamedTempFile;
|
||||
#[cfg(feature = "pci_support")]
|
||||
use vfio_ioctls::{VfioDevice, VfioDmaMapping};
|
||||
use vfio_ioctls::{VfioContainer, VfioDevice, VfioDmaMapping};
|
||||
use vm_allocator::SystemAllocator;
|
||||
use vm_device::interrupt::{
|
||||
InterruptIndex, InterruptManager, LegacyIrqGroupConfig, MsiIrqGroupConfig,
|
||||
@ -2177,18 +2177,23 @@ impl DeviceManager {
|
||||
<< 3;
|
||||
|
||||
let memory = self.memory_manager.lock().unwrap().guest_memory();
|
||||
let vfio_container = Arc::new(
|
||||
VfioContainer::new(device_fd.clone()).map_err(DeviceManagerError::VfioCreate)?,
|
||||
);
|
||||
|
||||
let vfio_device = VfioDevice::new(
|
||||
&device_cfg.path,
|
||||
device_fd.clone(),
|
||||
memory.clone(),
|
||||
Arc::clone(&vfio_container),
|
||||
device_cfg.iommu,
|
||||
)
|
||||
.map_err(DeviceManagerError::VfioCreate)?;
|
||||
|
||||
if device_cfg.iommu {
|
||||
if let Some(iommu) = &self.iommu_device {
|
||||
let vfio_mapping =
|
||||
Arc::new(VfioDmaMapping::new(vfio_device.get_container(), memory));
|
||||
let vfio_mapping = Arc::new(VfioDmaMapping::new(
|
||||
Arc::clone(&vfio_container),
|
||||
Arc::new(memory),
|
||||
));
|
||||
|
||||
iommu
|
||||
.lock()
|
||||
@ -2197,9 +2202,14 @@ impl DeviceManager {
|
||||
}
|
||||
}
|
||||
|
||||
let mut vfio_pci_device =
|
||||
VfioPciDevice::new(&self.address_manager.vm_fd, vfio_device, interrupt_manager)
|
||||
.map_err(DeviceManagerError::VfioPciCreate)?;
|
||||
let memory = self.memory_manager.lock().unwrap().guest_memory();
|
||||
let mut vfio_pci_device = VfioPciDevice::new(
|
||||
&self.address_manager.vm_fd,
|
||||
vfio_device,
|
||||
interrupt_manager,
|
||||
memory,
|
||||
)
|
||||
.map_err(DeviceManagerError::VfioPciCreate)?;
|
||||
|
||||
let bars = vfio_pci_device
|
||||
.allocate_bars(&mut self.address_manager.allocator.lock().unwrap())
|
||||
|
Loading…
Reference in New Issue
Block a user