2 * Copyright (c) 2018 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
17 #include <sys/types.h>
20 #include <linux/vfio.h>
21 #include <sys/ioctl.h>
23 #include <vppinfra/linux/sysfs.h>
25 #include <vlib/vlib.h>
26 #include <vlib/unix/unix.h>
27 #include <vlib/pci/pci.h>
28 #include <vlib/linux/vfio.h>
29 #include <vlib/physmem.h>
31 #ifndef VFIO_NOIOMMU_IOMMU
32 #define VFIO_NOIOMMU_IOMMU 8
35 linux_vfio_main_t vfio_main;
38 map_regions (vlib_main_t * vm, int fd)
40 vlib_physmem_main_t *vpm = &physmem_main;
41 linux_vfio_main_t *lvm = &vfio_main;
42 vlib_physmem_region_t *pr;
43 struct vfio_iommu_type1_dma_map dm = { 0 };
46 dm.argsz = sizeof (struct vfio_iommu_type1_dma_map);
47 dm.flags = VFIO_DMA_MAP_FLAG_READ | VFIO_DMA_MAP_FLAG_WRITE;
50 pool_foreach (pr, vpm->regions,
52 vec_foreach_index (i, pr->page_table)
55 dm.vaddr = pointer_to_uword (pr->mem) + (i << pr->log2_page_size);
56 dm.size = 1 << pr->log2_page_size;
58 vlib_log_debug (lvm->log_default, "map DMA va:0x%lx iova:%lx "
59 "size:0x%lx", dm.vaddr, dm.iova, dm.size);
61 if ((rv = ioctl (fd, VFIO_IOMMU_MAP_DMA, &dm)))
63 vlib_log_err (lvm->log_default, "map DMA va:0x%lx iova:%lx "
64 "size:0x%lx failed, error %s (errno %d)",
65 dm.vaddr, dm.iova, dm.size, strerror (errno),
76 linux_vfio_dma_map_regions (vlib_main_t * vm)
78 linux_vfio_main_t *lvm = &vfio_main;
80 if (lvm->container_fd != -1)
81 map_regions (vm, lvm->container_fd);
84 static linux_pci_vfio_iommu_group_t *
85 get_vfio_iommu_group (int group)
87 linux_vfio_main_t *lvm = &vfio_main;
90 p = hash_get (lvm->iommu_pool_index_by_group, group);
92 return p ? pool_elt_at_index (lvm->iommu_groups, p[0]) : 0;
96 open_vfio_iommu_group (int group, int is_noiommu)
98 linux_vfio_main_t *lvm = &vfio_main;
99 linux_pci_vfio_iommu_group_t *g;
100 clib_error_t *err = 0;
101 struct vfio_group_status group_status;
105 g = get_vfio_iommu_group (group);
111 s = format (s, "/dev/vfio/%s%u%c", is_noiommu ? "noiommu-" : "", group, 0);
112 fd = open ((char *) s, O_RDWR);
114 return clib_error_return_unix (0, "open '%s'", s);
116 group_status.argsz = sizeof (group_status);
117 if (ioctl (fd, VFIO_GROUP_GET_STATUS, &group_status) < 0)
119 err = clib_error_return_unix (0, "ioctl(VFIO_GROUP_GET_STATUS) '%s'",
124 if (!(group_status.flags & VFIO_GROUP_FLAGS_VIABLE))
126 err = clib_error_return (0, "iommu group %d is not viable (not all "
127 "devices in this group bound to vfio-pci)",
132 if (ioctl (fd, VFIO_GROUP_SET_CONTAINER, &lvm->container_fd) < 0)
134 err = clib_error_return_unix (0, "ioctl(VFIO_GROUP_SET_CONTAINER) '%s'",
139 if (lvm->iommu_mode == 0)
142 lvm->iommu_mode = VFIO_NOIOMMU_IOMMU;
144 lvm->iommu_mode = VFIO_TYPE1_IOMMU;
146 if (ioctl (lvm->container_fd, VFIO_SET_IOMMU, lvm->iommu_mode) < 0)
148 err = clib_error_return_unix (0, "ioctl(VFIO_SET_IOMMU) "
155 pool_get (lvm->iommu_groups, g);
158 hash_set (lvm->iommu_pool_index_by_group, group, g - lvm->iommu_groups);
167 linux_vfio_group_get_device_fd (vlib_pci_addr_t * addr, int *fdp)
169 clib_error_t *err = 0;
170 linux_pci_vfio_iommu_group_t *g;
177 s = format (s, "/sys/bus/pci/devices/%U/iommu_group", format_vlib_pci_addr,
179 tmpstr = clib_sysfs_link_to_name ((char *) s);
182 iommu_group = atoi ((char *) tmpstr);
187 err = clib_error_return (0, "Cannot find IOMMU group for PCI device ",
188 "'%U'", format_vlib_pci_addr, addr);
191 vec_reset_length (s);
194 format (s, "/sys/bus/pci/devices/%U/iommu_group/name",
195 format_vlib_pci_addr, addr);
196 err = clib_sysfs_read ((char *) s, "%s", &tmpstr);
199 if (strncmp ((char *) tmpstr, "vfio-noiommu", 12) == 0)
204 clib_error_free (err);
205 vec_reset_length (s);
206 if ((err = open_vfio_iommu_group (iommu_group, is_noiommu)))
209 g = get_vfio_iommu_group (iommu_group);
211 s = format (s, "%U%c", format_vlib_pci_addr, addr, 0);
212 if ((fd = ioctl (g->fd, VFIO_GROUP_GET_DEVICE_FD, (char *) s)) < 0)
214 err = clib_error_return_unix (0, "ioctl(VFIO_GROUP_GET_DEVICE_FD) '%U'",
215 format_vlib_pci_addr, addr);
218 vec_reset_length (s);
228 linux_vfio_init (vlib_main_t * vm)
230 linux_vfio_main_t *lvm = &vfio_main;
233 lvm->log_default = vlib_log_register_class ("vfio", 0);
235 fd = open ("/dev/vfio/vfio", O_RDWR);
237 /* check if iommu is available */
240 if (ioctl (fd, VFIO_GET_API_VERSION) != VFIO_API_VERSION)
247 if (ioctl (fd, VFIO_CHECK_EXTENSION, VFIO_TYPE1_IOMMU) == 1)
249 lvm->flags |= LINUX_VFIO_F_HAVE_IOMMU;
250 vlib_log_info (lvm->log_default, "type 1 IOMMU mode supported");
252 if (ioctl (fd, VFIO_CHECK_EXTENSION, VFIO_NOIOMMU_IOMMU) == 1)
254 lvm->flags |= LINUX_VFIO_F_HAVE_NOIOMMU;
255 vlib_log_info (lvm->log_default, "NOIOMMU mode supported");
260 lvm->iommu_pool_index_by_group = hash_create (0, sizeof (uword));
261 lvm->container_fd = fd;
266 * fd.io coding-style-patch-verification: ON
269 * eval: (c-set-style "gnu")