Re: Supporting VFIO on nVidia's Orin platform

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Sep 30, 2024 at 05:27:33PM -0400, Michael Williamson wrote:
> On Mon, Sep 30, 2024 at 12:00 AM Yi Liu <yi.l.liu@xxxxxxxxx> wrote:
> >
> > On 2024/9/29 23:02, Michael Williamson wrote:
> > > Hello,
> > >
> > > I've been trying to get VFIO working on nVidia's Orin platform (ARM64) in
> > > order to support moving data efficiently off of an attached FPGA PCIe board
> > > using the SMMU from a user space application.  We have a full application
> > > working on x86/x64 boxes that properly support the VFIO interface.  We're
> > > trying to port support to the Orin.
> > >
> > > I'm on nVidia's 5.15.36 branch.  It doesn't work out of the box, as the
> > > tegra194-pcie platform controller is lumped in the same iommu group as the
> > > actual PCIe card.  The acs override patch didn't help to separate them.
> > >
> > > I have a patch below that *seems* to work for us, but I will admit I do not
> > > know the implications of what I am doing here.
> >
> > your below patch is to pass the vfio_dev_viable() check I suppose. If you
> 
> yes.
> 
> > are sure the tegra194-pcie platform controller will not issue DMA, then it
> > is fine. If not, you should be careful about it.
> >
> 
> There are multiple tegra194-pcie platform controllers defined in the dts.  This
> one only has the one PCIe slot we are working with and nothing else.  There
> are other instances of the tegra194-pcie controllers that have control over
> other PCIe devices in the system.  There appear to be two main smmu controllers
> that support multiple masters.  The tegra194-pcie platform controller tied
> to the PCIe bus I want has a unique smmu/iommu master ID but is sharing the main
> smmu controller with other devices.  However, they are all assigned to
> different iommu groups, so I think this is OK?
> 
> > > Can anyone let me know if this is (and why it is) a bad idea, and what really
> > > needs to be done?  Or if this is the wrong mailing list, point me in the right
> > > direction?
> >
> > this is the right place to ask. +NV folks I know.
> >
> 
> I appreciate the insight.  Thank you.

I am not quite sure about tegra194-pcie. +Vidya who's the owner.

Nicolin

> > > Thanks,
> > > Mike
> > >
> > > diff --git a/drivers/vfio/vfio.c b/drivers/vfio/vfio.c
> > > index 818e47fc0896..a598a2204781 100644
> > > --- a/drivers/vfio/vfio.c
> > > +++ b/drivers/vfio/vfio.c
> > > @@ -638,8 +638,15 @@ static struct vfio_device
> > > *vfio_group_get_device(struct vfio_group *group,
> > >    * breaks anything, it only does so for user owned devices downstream.  Note
> > >    * that error notification via MSI can be affected for platforms that handle
> > >    * MSI within the same IOVA space as DMA.
> > > + *
> > > + * [MAW] - the tegra194-pcie driver is a platform PCie device controller and
> > > + * fails the dev_is_pci() check below.  Not sure if it's because its grouping
> > > + * needs to be reworked, but I don't know how this is (or if it
> > > should be) done.
> > > + * This is a hack to see if we can get it going well enough to use the
> > > + * SMMU from user space.  The other two devices (for the Orin) in the group
> > > + * are the host bridge and the PCIe card itself.
> > >    */
> > > -static const char * const vfio_driver_allowed[] = { "pci-stub" };
> > > +static const char * const vfio_driver_allowed[] = { "pci-stub",
> > > "tegra194-pcie" };
> > >
> > >   static bool vfio_dev_driver_allowed(struct device *dev,
> > >                                      struct device_driver *drv)
> > > diff --git a/drivers/vfio/vfio_iommu_type1.c b/drivers/vfio/vfio_iommu_type1.c
> > > index 66bbb125d761..e34fbe17ae1a 100644
> > > --- a/drivers/vfio/vfio_iommu_type1.c
> > > +++ b/drivers/vfio/vfio_iommu_type1.c
> > > @@ -45,7 +45,8 @@
> > >   #define DRIVER_AUTHOR   "Alex Williamson <alex.williamson@xxxxxxxxxx>"
> > >   #define DRIVER_DESC     "Type1 IOMMU driver for VFIO"
> > >
> > > -static bool allow_unsafe_interrupts;
> > > +/** [MAW] - hack, need this set for Orin test, not compiled is module
> > > currently */
> > > +static bool allow_unsafe_interrupts = true;
> > >   module_param_named(allow_unsafe_interrupts,
> > >                     allow_unsafe_interrupts, bool, S_IRUGO | S_IWUSR);
> > >   MODULE_PARM_DESC(allow_unsafe_interrupts,
> > > @@ -1733,8 +1734,18 @@ static int vfio_bus_type(struct device *dev, void *data)
> > >   {
> > >          struct bus_type **bus = data;
> > >
> > > -       if (*bus && *bus != dev->bus)
> > > +       /**
> > > +        * [MAW] - hack.  the orin tegra194-pcie is in this group and
> > > +        * reports in as bus-type of "platform".  We will ignore it
> > > +        * in an attempt to get vfio to play along.
> > > +        */
> > > +       if (!strcmp(dev->bus->name,"platform")) {
> > > +               return 0;
> > > +       }
> > > +
> > > +       if (*bus && *bus != dev->bus) {
> > >                  return -EINVAL;
> > > +       }
> > >
> > >          *bus = dev->bus;
> > >
> >
> > --
> > Regards,
> > Yi Liu
> 
> 
> 
> --
> Mike Williamson
> OpenPGP Public Key




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux