From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Subject: Re: [PATCH v4 04/14] PCI/P2PDMA: Clear ACS P2P flags for all devices behind switches To: Alex Williamson Cc: Stephen Bates , Dan Williams , Logan Gunthorpe , Linux Kernel Mailing List , "linux-pci@vger.kernel.org" , "linux-nvme@lists.infradead.org" , linux-rdma , linux-nvdimm , "linux-block@vger.kernel.org" , Christoph Hellwig , Jens Axboe , Keith Busch , Sagi Grimberg , Bjorn Helgaas , Jason Gunthorpe , Max Gurtovoy , =?UTF-8?B?SsOpcsO0bWUgR2xpc3Nl?= , Benjamin Herrenschmidt , =?UTF-8?Q?Christian_K=c3=b6nig?= References: <20180423233046.21476-1-logang@deltatee.com> <20180423233046.21476-5-logang@deltatee.com> <64C231F5-DE36-415F-B308-3A423B0BBACB@raithlin.com> <15433946-f7f5-f610-4e80-380fb59920e5@redhat.com> <3C9FB262-A93C-4C8F-B1E0-85C6D6F78BC2@raithlin.com> <20180508180157.7c7b393f@w520.home> From: Don Dutile Message-ID: Date: Wed, 9 May 2018 11:47:31 -0400 MIME-Version: 1.0 In-Reply-To: <20180508180157.7c7b393f@w520.home> Content-Type: text/plain; charset=utf-8; format=flowed Sender: linux-kernel-owner@vger.kernel.org List-ID: On 05/08/2018 08:01 PM, Alex Williamson wrote: > On Tue, 8 May 2018 19:06:17 -0400 > Don Dutile wrote: >> On 05/08/2018 05:27 PM, Stephen Bates wrote: >>> As I understand it VMs need to know because VFIO passes IOMMU >>> grouping up into the VMs. So if a IOMMU grouping changes the VM's >>> view of its PCIe topology changes. I think we even have to be >>> cognizant of the fact the OS running on the VM may not even support >>> hot-plug of PCI devices. >> Alex: >> Really? IOMMU groups are created by the kernel, so don't know how >> they would be passed into the VMs, unless indirectly via PCI(e) >> layout. At best, twiddling w/ACS enablement (emulation) would cause >> VMs to see different IOMMU groups, but again, VMs are not the >> security point/level, the host/HV's are. > > Correct, the VM has no concept of the host's IOMMU groups, only the > hypervisor knows about the groups, but really only to the extent of > which device belongs to which group and whether the group is viable. > Any runtime change to grouping though would require DMA mapping > updates, which I don't see how we can reasonably do with drivers, > vfio-pci or native host drivers, bound to the affected devices. Thanks, > > Alex > A change in iommu groups would/could require a device remove/add cycle to get an updated DMA-mapping (yet-another-overused-term: iommu 'domain').