[Kimchi-devel] [PATCH v6 2/4] Host device passthrough: List eligible device to passthrough
Zhou Zheng Sheng
zhshzhou at linux.vnet.ibm.com
Tue Jun 10 02:04:23 UTC 2014
on 2014/06/09 23:14, Sheldon wrote:
> On 06/09/2014 05:28 PM, Zhou Zheng Sheng wrote:
>> This patch adds a '_passthrough=1' filter to /host/devices, so it can
> _passthrough=True :-)
>
Oops, thank you very much.
>> filter and shows all devices eligible to passthrough to guest.
>> Theoretically, all PCI, USB and SCSI devices can be assigned to guest
>> directly. However usually all host devices form a tree, if we assign a
>> PCI port/SCSI controller/USB controller to guest, all devices/disks
>> under the controller are assigned as well. In this patch we only present
>> the "leaf" host devices to the user as potential passthrough devices.
>> In other word, the possible devices are wireless network interface, SD
>> card reader, camera, SCSI unit(disk or CD), and so on.
>>
>> Linux kernel is able to recognize the host IOMMU group layout. If two
>> PCI devices are in the same IOMMU group, it means there are possible
>> interconnections between the devices, and the devices can talk to each
>> other bypassing IOMMU. This implies isolation is not pefect between those
>> devices, so all devices in a IOMMU group must be assigned to guest
>> together. On host that recognizes IOMMU groups, by accessing the URI
>> /host/devices/deviceX/passthrough_affected_devices, it returns a list
>> containing the devices in the same IOMMU group as deviceX.
>>
>> How to test:
>>
>> List all types of devices to passthrough
>> curl -k -u root -H "Content-Type: application/json" \
>> -H "Accept: application/json" \
>> 'https://127.0.0.1:8001/host/devices?_passthrough=true'
>>
>> List all eligible PCI devices to passthrough
>> /host/devices?_passthrough=true&_cap=pci
>>
>> List all USB devices to passthrough
>> /host/devices?_passthrough=true&_cap=usb_device
>>
>> List all SCSI devices to passthrough
>> /host/devices?_passthrough=true&_cap=scsi
>>
>> List devices in the same IOMMU group as pci_0000_00_19_0
>> /host/devices/pci_0000_00_19_0/passthrough_affected_devices
>>
>> v1:
>> v1 series does not contain this patch.
>>
>> v2:
>> Deal with calculation "leaf" device and "affected" device.
>>
>> v3 v4:
>> No change.
>>
>> v5:
>> Change _passthrough=1 to _passthrough=true in the URI scheme. Filter
>> PCI devices according the PCI class.
>>
>> v6:
>> Don't passthrough PCI device of class code 07. In modern
>> x86 machine, it's possible that
>> "6 Series/C200 Series Chipset Family MEI Controller" and
>> "6 Series/C200 Series Chipset Family KT Controller"
>> are of this class code. These two devices are not suitable to
>> passthrough to guest. We don't have simple and reliable way to
>> distinguish normal serial controller and host chipset XXX controller.
>> This type of PCI devices also include various serial, parallel, modem,
>> communication controller. Serial and parallel controllers can be
>> re-direct from ttyS0 to QEMU's pty using socat, and there is little
>> performance benefit to directly assign to guest. So it'k ok not to
>> passththrough PCI device of class code 07.
>>
>> Signed-off-by: Zhou Zheng Sheng <zhshzhou at linux.vnet.ibm.com>
>> ---
>> src/kimchi/control/host.py | 9 ++++
>> src/kimchi/hostdev.py | 107
>> +++++++++++++++++++++++++++++++++++++++++++++
>> src/kimchi/model/host.py | 17 ++++++-
>> 3 files changed, 132 insertions(+), 1 deletion(-)
>>
>> diff --git a/src/kimchi/control/host.py b/src/kimchi/control/host.py
>> index ebf1bed..15f2343 100644
>> --- a/src/kimchi/control/host.py
>> +++ b/src/kimchi/control/host.py
>> @@ -103,9 +103,18 @@ class Devices(Collection):
>> self.resource = Device
>>
>>
>> +class PassthroughAffectedDevices
>> (Collection):
>> + def __init__(self, model, device_id):
>> + super(PassthroughAffectedDevices, self).__init__(model)
>> + self.resource = Device
>> + self.model_args = (device_id, )
>> +
>> +
>> class Device(Resource):
>> def __init__(self, model, id):
>> super(Device, self).__init__(model, id)
>> + self.passthrough_affected_devices = \
>> + PassthroughAffectedDevices(self.model, id)
>>
>> @property
>> def data(self):
>> diff --git a/src/kimchi/hostdev.py b/src/kimchi/hostdev.py
>> index d4c142d..f70154f 100644
>> --- a/src/kimchi/hostdev.py
>> +++ b/src/kimchi/hostdev.py
>> @@ -17,6 +17,8 @@
>> # License along with this library; if not, write to the Free Software
>> # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
>> 02110-1301 USA
>>
>> +import os
>> +
>> from kimchi.model.libvirtconnection import LibvirtConnection
>> from kimchi.utils import kimchi_log
>> from kimchi.xmlutils import dictize
>> @@ -46,6 +48,108 @@ def _get_dev_info_tree(dev_infos):
>> return root
>>
>>
>> +def _strip_parents(devs, dev):
>> + parent = dev['parent']
>> + while parent is not None:
>> + try:
>> + parent_dev = devs.pop(parent)
>> + except KeyError:
>> + break
>> +
>> + if (parent_dev['device_type'],
>> + dev['device_type']) == ('usb_device', 'scsi'):
>> + # For USB device containing mass storage, passthrough the
>> + # USB device itself, not the SCSI unit.
>> + devs.pop(dev['name'])
>> + break
>> +
>> + parent = parent_dev['parent']
>> +
>> +
>> +def _is_pci_qualified(pci_dev):
>> + # PCI class such as bridge and storage controller are not
>> suitable to
>> + # passthrough to VM, so we make a whitelist and only passthrough PCI
>> + # class in the list.
>> +
>> + whitelist_pci_classes = {
>> + # Refer to Linux Kernel code include/linux/pci_ids.h
>> + 0x000000: { # Old PCI devices
>> + 0x000100: None}, # Old VGA devices
> looks strange?
>> + 0x020000: None, # Network controller
>> + 0x030000: None, # Display controller
>> + 0x040000: None, # Multimedia device
>> + 0x090000: None, # Inupt device
>> + 0x0d0000: None, # Wireless controller
>> + 0x0f0000: None, # Satellite communication controller
>> + 0x100000: None, # Cryption controller
>> + 0x110000: None, # Signal Processing controller
>> + }
>> +
>> + with open(os.path.join(pci_dev['path'], 'class')) as f:
>> + pci_class = int(f.read(), 16)
>> +
>> + try:
>> + subclass = whitelist_pci_classes[pci_class & 0xff0000]
>> + except KeyError:
>> + return False
>> +
>> + if subclass is None:
>> + return True
>> +
>> + if pci_class & 0xffff00 in subclass:
>> + return True
>> +
>> + return False
>> +
>> +
>> +def get_passthrough_dev_infos():
>> + ''' Get devices eligible to be passed through to VM. '''
>> +
>> + dev_infos = _get_all_host_dev_infos()
>> + devs = dict([(dev_info['name'], dev_info) for dev_info in
>> dev_infos])
>> +
>> + for dev in dev_infos:
>> + if dev['device_type'] in ('pci', 'usb_device', 'scsi'):
>> + _strip_parents(devs, dev)
>> +
>> + def is_eligible(dev):
>> + if dev['device_type'] not in ('pci', 'usb_device', 'scsi'):
>> + return False
>> + if dev['device_type'] == 'pci':
>> + return _is_pci_qualified(dev)
>> + return True
>> +
>> + return [dev for dev in devs.itervalues() if is_eligible(dev)]
>> +
>> +
>> +def get_affected_passthrough_devices(passthrough_dev):
>> + devs = dict([(dev['name'], dev) for dev in
>> _get_all_host_dev_infos()])
>> +
>> + def get_iommu_group(dev_info):
>> + try:
>> + return int(dev_info['iommuGroup'])
>> + except KeyError:
>> + pass
>> +
>> + parent = dev_info['parent']
>> + while parent is not None:
>> + try:
>> + iommuGroup = int(devs[parent]['iommuGroup'])
>> + except KeyError:
>> + pass
>> + else:
>> + return iommuGroup
>> + parent = devs[parent]['parent']
>> +
>> + return -1
>> +
>> + iommu_group = get_iommu_group(passthrough_dev)
>> +
>> + return [dev for dev in get_passthrough_dev_infos()
>> + if dev['name'] != passthrough_dev['name'] and
>> + get_iommu_group(dev) == iommu_group]
> does this means dev['name'] and passthrough_dev['name'] in same IOMMU
> group ?
>> +
>> +
>> def get_dev_info(node_dev):
>> ''' Parse the node device XML string into dict according to
>> http://libvirt.org/formatnode.html. '''
>> @@ -206,4 +310,7 @@ def _format_dev_node(node):
>>
>>
>> if __name__ == '__main__':
>> + from pprint import pprint
>> _print_host_dev_tree()
>> + print 'Eligible passthrough devices:'
>> + pprint(get_passthrough_dev_infos())
>> diff --git a/src/kimchi/model/host.py b/src/kimchi/model/host.py
>> index 1ea97f0..280aa53 100644
>> --- a/src/kimchi/model/host.py
>> +++ b/src/kimchi/model/host.py
>> @@ -247,7 +247,7 @@ class DevicesModel(object):
>> def __init__(self, **kargs):
>> self.conn = kargs['conn']
>>
>> - def get_list(self, _cap=None):
>> + def get_list(self, _cap=None, _passthrough=None):
>> conn = self.conn.get()
>> if _cap is None:
>> dev_names = [name.name() for name in
>> conn.listAllDevices(0)]
>> @@ -256,6 +256,11 @@ class DevicesModel(object):
>> else:
>> # Get devices with required capability
>> dev_names = conn.listDevices(_cap, 0)
>> +
>> + if _passthrough is not None and _passthrough.lower() == 'true':
>> + passthrough_names = [
>> + dev['name'] for dev in
>> hostdev.get_passthrough_dev_infos()]
>> + dev_names = list(set(dev_names) & set(passthrough_names))
>> return dev_names
>>
>> def _get_devices_fc_host(self):
>> @@ -273,6 +278,16 @@ class DevicesModel(object):
>> return conn.listDevices('fc_host', 0)
>>
>>
>> +class PassthroughAffectedDevicesModel(object):
>> + def __init__(self, **kargs):
>> + self.conn = kargs['conn']
>> +
>> + def get_list(self, device_id):
>> + dev_info = DeviceModel(conn=self.conn).lookup(device_id)
>> + affected = hostdev.get_affected_passthrough_devices(dev_info)
>> + return [dev['name'] for dev in affected]
>> +
>> +
>> class DeviceModel(object):
>> def __init__(self, **kargs):
>> self.conn = kargs['conn']
>
>
--
Zhou Zheng Sheng / 周征晟
E-mail: zhshzhou at linux.vnet.ibm.com
Telephone: 86-10-82454397
More information about the Kimchi-devel
mailing list