From: Avi Kivity <avi@redhat.com>
To: Alex Williamson <alex.williamson@redhat.com>
Cc: chrisw@redhat.com, mst@redhat.com, qemu-devel@nongnu.org,
kvm@vger.kernel.org, pugs@cisco.com
Subject: [Qemu-devel] Re: [RFC PATCH 5/5] VFIO based device assignment
Date: Sun, 11 Jul 2010 21:27:33 +0300 [thread overview]
Message-ID: <4C3A0D15.3070302@redhat.com> (raw)
In-Reply-To: <20100711180942.20121.97368.stgit@localhost6.localdomain6>
On 07/11/2010 09:09 PM, Alex Williamson wrote:
> This patch adds qemu device assignment support using the proposed
> VFIO/UIOMMU kernel interfaces. The existing KVM-only device assignment
> code makes use of various pci sysfs files for config space, MMIO BAR
> mapping, and misc other config items. It then jumps over to KVM-specific
> ioctls for enabling interrupts and assigning devices to IOMMU domains.
> Finally, IO-port support uses in/out directly. This is a messy model
> to support and causes numerous issues when we try to allow unprivileged
> users to access PCI devices.
>
> VFIO/UIOMMU reduces this to two interfaces, /dev/vfioX and /dev/uiommu.
> The VFIO device file provides all the necessary support for accessing
> PCI config space, read/write/mmap BARs (including IO-port space),
> configuring INTx/MSI/MSI-X interupts and setting up DMA mapping. The
> UIOMMU interface allows iommu domains to be created, and via vfio,
> devices can be bound to a domain. This provides an easier model to
> support (IMHO) and removes the bindings that make current device
> assignment only useable for KVM enabled guests.
>
> Usage is similar to KVM device assignment. Rather than binding the
> device to the pci-stub driver, vfio devices need to be bound to the
> vfio driver. From there, it's a simple matter of specifying the
> device as:
>
> -device vfio,host=01:00.0
>
> This example requires either root privileges or proper permissions on
> /dev/uiommu and /dev/vfioX. To support unprivileged operation, the
> options vfiofd= and uiommufd= are available. Depending on the usage
> of uiommufd, each guest device can be assigned to the same iommu
> domain, or to independent iommu domains. In the example above, each
> device is assigned to a separate iommu domain.
>
> As VFIO has no KVM dependencies, this patch works with or without
> -enable-kvm. I have successfully used a couple assigned devices in a
> guest without KVM support, however Michael Tsirkin warns that tcg
> may not provide atomic operations to memory visible to the passthrough
> device, which could result in failures for devices depending on such
> for synchronization.
>
> This patch is functional, but hasn't seen a lot of testing. I've
> tested 82576 PFs and VFs, an Intel HDA audio device, and UHCI and EHCI
> USB devices (this actually includes INTx/MSI/MSI-X, 4k aligned MMIO
> BARs, non-4k aligned MMIO BARs, and IO-Port BARs).
>
>
Good stuff.
I presume the iommu interface is responsible for page pinning. What
about page attributes?
There are two cases:
- snoop capable iommu - can use write-backed RAM, but need to enable
snoop. BARs still need to respect page attributes.
- older mmu - need to respect guest memory type; probably cannot be done
without kvm.
If the guest maps a BAR or RAM using write-combine memory type, can we
reflect that? This may provide a considerable performance benefit.
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
next prev parent reply other threads:[~2010-07-11 18:27 UTC|newest]
Thread overview: 32+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-07-11 18:09 [Qemu-devel] [RFC PATCH 0/5] QEMU VFIO device assignment Alex Williamson
2010-07-11 18:09 ` [Qemu-devel] [RFC PATCH 1/5] qemu_ram_map/unmap: Allow pre-allocated space to be mapped Alex Williamson
2010-07-11 18:09 ` [Qemu-devel] [RFC PATCH 2/5] Minimal RAM API support Alex Williamson
2010-07-11 18:18 ` [Qemu-devel] " Alex Williamson
2010-07-11 18:20 ` Avi Kivity
2010-07-11 18:24 ` Alex Williamson
2010-07-11 18:29 ` Avi Kivity
2010-07-11 18:09 ` [Qemu-devel] [RFC PATCH 3/5] RAM API: Make use of it for x86 PC Alex Williamson
2010-07-11 18:09 ` [Qemu-devel] [RFC PATCH 4/5] APIC/IOAPIC EOI callback Alex Williamson
2010-07-11 18:14 ` [Qemu-devel] " Avi Kivity
2010-07-11 18:26 ` Alex Williamson
2010-07-11 18:30 ` Avi Kivity
2010-07-11 18:54 ` Michael S. Tsirkin
2010-07-11 19:21 ` Alex Williamson
2010-07-11 19:23 ` Michael S. Tsirkin
2010-07-11 20:03 ` Alex Williamson
2010-07-11 20:05 ` Michael S. Tsirkin
2010-07-11 20:12 ` Michael S. Tsirkin
2010-07-11 21:59 ` Alex Williamson
2010-07-12 6:33 ` Avi Kivity
2010-07-12 9:05 ` Gleb Natapov
2010-07-12 9:13 ` Avi Kivity
2010-07-11 18:09 ` [Qemu-devel] [RFC PATCH 5/5] VFIO based device assignment Alex Williamson
2010-07-11 18:27 ` Avi Kivity [this message]
2010-07-11 19:38 ` [Qemu-devel] " Alex Williamson
2010-07-12 6:37 ` Avi Kivity
2010-07-11 18:17 ` [Qemu-devel] Re: [RFC PATCH 0/5] QEMU VFIO " Avi Kivity
2010-07-11 18:37 ` Alex Williamson
2010-07-11 18:43 ` Avi Kivity
2010-07-11 20:24 ` Alex Williamson
2010-07-12 6:29 ` Avi Kivity
2010-07-12 11:03 ` Michael S. Tsirkin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4C3A0D15.3070302@redhat.com \
--to=avi@redhat.com \
--cc=alex.williamson@redhat.com \
--cc=chrisw@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=mst@redhat.com \
--cc=pugs@cisco.com \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).