2015-09-09 65 views
0

Linux已經編有IOMMU功能ON,從dmesg日誌,我可以確保:爲什麼ioctl命令報告「KVM不支持IOMMU」?

[[email protected] vm]# dmesg | grep -e DMAR -e IOMMU 
[ 0.000000] ACPI: DMAR 000000007bfbb000 00368 (v01 HP  03010201 00000002 HPAG 00020000) 
[ 0.000000] DMAR: IOMMU enabled 
[ 0.512361] DMAR: Host address width 44 
[ 0.516675] DMAR: DRHD base: 0x00000093ff8000 flags: 0x0 
[ 0.522664] DMAR: IOMMU 0: reg_base_addr 93ff8000 ver 1:0 cap d2078c106f0466 ecap f020de 
[ 0.531762] DMAR: DRHD base: 0x00000097ff8000 flags: 0x0 
[ 0.537744] DMAR: IOMMU 1: reg_base_addr 97ff8000 ver 1:0 cap d2078c106f0466 ecap f020de 
[ 0.546837] DMAR: DRHD base: 0x0000009bff8000 flags: 0x0 
[ 0.552829] DMAR: IOMMU 2: reg_base_addr 9bff8000 ver 1:0 cap d2078c106f0466 ecap f020de 
[ 0.561922] DMAR: DRHD base: 0x0000009fff8000 flags: 0x0 
[ 0.567904] DMAR: IOMMU 3: reg_base_addr 9fff8000 ver 1:0 cap d2078c106f0466 ecap f020de 
[ 0.576994] DMAR: RMRR base: 0x00000079911000 end: 0x00000079913fff 
[ 0.584038] DMAR: RMRR base: 0x0000007990e000 end: 0x00000079910fff 
[ 0.591079] DMAR: ATSR flags: 0x0 
[ 0.594805] DMAR: ATSR flags: 0x0 
[ 0.598530] DMAR: ATSR flags: 0x0 
[ 0.602255] DMAR: ATSR flags: 0x0 
[ 0.605982] DMAR: RHSA base: 0x00000093ff8000 proximity domain: 0x0 
[ 0.613024] DMAR: RHSA base: 0x00000097ff8000 proximity domain: 0x1 
[ 0.620067] DMAR: RHSA base: 0x0000009bff8000 proximity domain: 0x2 
[ 0.627110] DMAR: RHSA base: 0x0000009fff8000 proximity domain: 0x3 
[ 0.634163] DMAR-IR: IOAPIC id 13 under DRHD base 0x9fff8000 IOMMU 3 
[ 0.641411] DMAR-IR: IOAPIC id 11 under DRHD base 0x9bff8000 IOMMU 2 
[ 0.648647] DMAR-IR: IOAPIC id 12 under DRHD base 0x9bff8000 IOMMU 2 
[ 0.655887] DMAR-IR: IOAPIC id 10 under DRHD base 0x97ff8000 IOMMU 1 
[ 0.663126] DMAR-IR: IOAPIC id 8 under DRHD base 0x93ff8000 IOMMU 0 
[ 0.670264] DMAR-IR: IOAPIC id 9 under DRHD base 0x93ff8000 IOMMU 0 
[ 0.677404] DMAR-IR: HPET id 0 under DRHD base 0x93ff8000 
[ 0.683483] DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. 
[ 0.696950] DMAR-IR: Enabled IRQ remapping in x2apic mode 
[ 5.505856] DMAR: dmar3: Using Queued invalidation 
[ 5.511765] DMAR: dmar2: Using Queued invalidation 
[ 5.517667] DMAR: dmar1: Using Queued invalidation 
[ 5.523223] DMAR: dmar0: Using Queued invalidation 
[ 5.528914] DMAR: Setting RMRR: 
[ 5.532484] DMAR: Setting identity map for device 0000:20:1d.0 [0x7990e000 - 0x79910fff] 
[ 5.541659] DMAR: Setting identity map for device 0000:00:1d.0 [0x79911000 - 0x79913fff] 
[ 5.550776] DMAR: Prepare 0-16MiB unity mapping for LPC 
[ 5.556672] DMAR: Setting identity map for device 0000:00:1f.0 [0x0 - 0xffffff] 
[ 5.564908] DMAR: PCI-DMA: Intel(R) Virtualization Technology for Directed I/O 

但執行下面的測試代碼:

#include <stdio.h> 
#include <stdlib.h> 
#include <sys/types.h> 
#include <sys/stat.h> 
#include <sys/ioctl.h> 
#include <fcntl.h> 
#include <unistd.h> 
#include <linux/kvm.h> 

#define KVM_FILE "/dev/kvm" 

int main(void) 
{ 
     int dev; 
     int ret; 

     dev = open(KVM_FILE,O_RDWR|O_NDELAY); 
     ret = ioctl(dev,KVM_CHECK_EXTENSION,KVM_CAP_IOMMU); 
     if(ret != 0) 
       printf("----KVM supports IOMMU (i.e. Intel VT-d or AMD IOMMU).----\n"); 
     else 
       printf("----KVM doesn't support IOMMU (i.e. Intel VT-d or AMD IOMMU).----\n"); 

     return 0; 
} 

輸出是:

----KVM doesn't support IOMMU (i.e. Intel VT-d or AMD IOMMU).---- 

我有點困惑,因爲從dmesg日誌,內核已報告支持IOMMU,爲什麼ioctl命令假設kernel不支持IOMMU

回答

0

的根源已經找到,需要配置KVM_DEVICE_ASSIGNMENT選項來構建內核。因爲在kvm_vm_ioctl_check_extension功能:

#ifdef CONFIG_KVM_DEVICE_ASSIGNMENT 
    case KVM_CAP_IOMMU: 
     r = iommu_present(&pci_bus_type); 
     break; 
#endif 

沒有這個選項,函數直接返回0
請參考discussion

0

因爲您沒有正確檢查ioctl返回值。 man ioctl應該可以幫到你。

通常,成功時返回零。一些ioctl()請求使用 返回值作爲輸出參數,並在 成功時返回非負值。錯誤時,返回-1,並設置errno適當

由第提到,在KVM_CHECK_EXTENSION IOCTL的特殊情況下將返回正值,如果蓋的支持,0,如果不是的話,和-1如果發生錯誤。

所以代碼應該是:

if(ret > 0) 
    printf("----KVM supports IOMMU (i.e. Intel VT-d or AMD IOMMU).----\n"); 
else 
    printf("----KVM doesn't support IOMMU (i.e. Intel VT-d or AMD IOMMU).----\n"); 

你會找到你的內核文件(4.4節)內的多一點細節:https://www.kernel.org/doc/Documentation/virtual/kvm/api.txt

+0

差不多。如果檢查成功,KVM_CHECK_EXTENSION ioctl尤其會返回> 0,即存在KVM_CAP_IOMMU。如果不是,則爲-1;如果發生錯誤,則爲-1。如果你正在檢查一個內核不知道的擴展,它甚至會返回0。所以我懷疑OP的代碼結果是不會改變的。感謝, – nos

+0

會糾正這一點。 –

+0

@nos:你能否就這個問題提供一些線索?非常感謝! –

相關問題