From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Peter Kay <syllopsium@syllopsium.co.uk>, xen-devel@lists.xen.org
Subject: Re: Determining iommu groups in Xen?
Date: Fri, 29 Aug 2014 09:27:14 +0100 [thread overview]
Message-ID: <54003962.4040303@citrix.com> (raw)
In-Reply-To: <CAN4OnohmWjaWvbdZpm0aEXULju2MT_twUGTeQr2ENjKpa7f4Ww@mail.gmail.com>
[-- Attachment #1.1: Type: text/plain, Size: 3299 bytes --]
On 29/08/2014 01:35, Peter Kay wrote:
>
>
> On 28 August 2014 19:45, Peter Kay <syllopsium@syllopsium.co.uk
> <mailto:syllopsium@syllopsium.co.uk>> wrote:
>
>
>
> On 28 August 2014 19:02:47 BST, Andrew Cooper
> <andrew.cooper3@citrix.com <mailto:andrew.cooper3@citrix.com>> wrote:
> >On 28/08/14 18:53, Peter Kay wrote:
> >>
> >> On 28 August 2014 18:13:07 BST, Andrew Cooper
> ><andrew.cooper3@citrix.com <mailto:andrew.cooper3@citrix.com>> wrote:
>
> >> An iommu group, as far as I'm aware, is the group of devices
> that are
> >not protected from each other. In KVM, you must pass through the
> entire
> >group to a VM at once, unless a 'don't go crying to me if it stomps
> >over your memory space or worse' patch is applied to the kennel
> >claiming that everything is fine.
> >
> >I have googled the term in the meantime, and it is what I initially
> >thought.
> >
> >All PCI devices passed though to the same domain share the same
> single
> >"iommu group" per Kernel/KVM terminology. There is not currently any
> >support for multiple iommu contexts within a single VM.
> >
> >~Andrew
>
>
> See http://lxr.free-electrons.com/source/drivers/iommu/iommu.c and
> intel-iommu.c (or amd-iommu.c). It is based on the ACS capability of
> the upstream device. See in particular intel_iommu_add_device()
>
> From https://www.kernel.org/doc/Documentation/vfio.txt
>
> 'Therefore, while for the most part an IOMMU may have device level
> granularity, any system is susceptible to reduced granularity. The
> IOMMU API therefore supports a notion of IOMMU groups. A group is
> a set of devices which is isolatable from all other devices in the
> system. Groups are therefore the unit of ownership used by VFIO'
>
> So far as reliable quirks go for ACS protection, see
> drivers/pci/quirks.c static const u16 pci_quirk_intel_pch_acs_ids[]
> and Red Hat bugzilla 1037684
>
> I'll have to do some more testing to see if lspci -t is a reasonable
> indication of iommu groups or if I can write some code to figure them out.
>
> Obviously returning the information from the Linux source is
> ultimately not really a good idea(*), because the dom0 may not be
> Linux. It is in my case, because NetBSD is (unfortunately) not yet
> functional enough for my needs and I don't want to use Solaris derived
> OS, but that doesn't help everyone else.
>
> (*) Assuming it's possible at all, as the Linux dom0 is running on top
> of Xen and therefore is restricted in some ways.
>
> PK
Ah right. I see now. The IOMMU groups are kernel/errata logic applied
to the system which impose restrictions as to which devices cannot
safely/functionally be split apart.
There is absolutely nothing like this in Xen, or dom0 (as dom0 is
unaware of IOMMUs in general). If I recall correctly, it does feature
on the wishlist of the XenServer team of which I am am member, pending
some copious quantites of free time. I know for certain that the libxl
and Xapi toolstacks do not have logic like this, leaving all passthrough
setup in the manual hands of the host administrator.
Konrad: Probably an item for the 4.6 wishlist/featurelist. It will
probably mix well with the other IO-NUMA stuff which has been deferred.
~Andrew
[-- Attachment #1.2: Type: text/html, Size: 6270 bytes --]
[-- Attachment #2: Type: text/plain, Size: 126 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
next prev parent reply other threads:[~2014-08-29 8:27 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-08-28 13:26 Determining iommu groups in Xen? Peter Kay
2014-08-28 13:54 ` Andrew Cooper
2014-08-28 16:48 ` Peter Kay
2014-08-28 17:13 ` Andrew Cooper
2014-08-28 17:53 ` Peter Kay
2014-08-28 18:02 ` Andrew Cooper
2014-08-28 18:45 ` Peter Kay
2014-08-29 0:35 ` Peter Kay
2014-08-29 8:27 ` Andrew Cooper [this message]
2014-08-29 14:34 ` Konrad Rzeszutek Wilk
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=54003962.4040303@citrix.com \
--to=andrew.cooper3@citrix.com \
--cc=syllopsium@syllopsium.co.uk \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).