xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Peter Kay <syllopsium@syllopsium.co.uk>, xen-devel@lists.xen.org
Subject: Re: Determining iommu groups in Xen?
Date: Fri, 29 Aug 2014 09:27:14 +0100	[thread overview]
Message-ID: <54003962.4040303@citrix.com> (raw)
In-Reply-To: <CAN4OnohmWjaWvbdZpm0aEXULju2MT_twUGTeQr2ENjKpa7f4Ww@mail.gmail.com>


[-- Attachment #1.1: Type: text/plain, Size: 3299 bytes --]

On 29/08/2014 01:35, Peter Kay wrote:
>
>
> On 28 August 2014 19:45, Peter Kay <syllopsium@syllopsium.co.uk
> <mailto:syllopsium@syllopsium.co.uk>> wrote:
>
>
>
>     On 28 August 2014 19:02:47 BST, Andrew Cooper
>     <andrew.cooper3@citrix.com <mailto:andrew.cooper3@citrix.com>> wrote:
>     >On 28/08/14 18:53, Peter Kay wrote:
>     >>
>     >> On 28 August 2014 18:13:07 BST, Andrew Cooper
>     ><andrew.cooper3@citrix.com <mailto:andrew.cooper3@citrix.com>> wrote:
>
>     >> An iommu group, as far as I'm aware, is the group of devices
>     that are
>     >not protected from each other. In KVM, you must pass through the
>     entire
>     >group to a VM at once, unless a 'don't go crying to me if it stomps
>     >over your memory space or worse' patch is applied to the kennel
>     >claiming that everything is fine.
>     >
>     >I have googled the term in the meantime, and it is what I initially
>     >thought.
>     >
>     >All PCI devices passed though to the same domain share the same
>     single
>     >"iommu group" per Kernel/KVM terminology.  There is not currently any
>     >support for multiple iommu contexts within a single VM.
>     >
>     >~Andrew
>
>  
> See  http://lxr.free-electrons.com/source/drivers/iommu/iommu.c  and
> intel-iommu.c (or amd-iommu.c). It is based on the ACS capability of
> the upstream device. See in particular intel_iommu_add_device()
>
> From  https://www.kernel.org/doc/Documentation/vfio.txt
>
> 'Therefore, while for the most part an IOMMU may have device level
> granularity, any system is susceptible to reduced granularity.  The
> IOMMU API therefore supports a notion of IOMMU groups.  A group is
> a set of devices which is isolatable from all other devices in the
> system.  Groups are therefore the unit of ownership used by VFIO'
>
> So far as reliable quirks go for ACS protection, see
> drivers/pci/quirks.c static const u16 pci_quirk_intel_pch_acs_ids[]
> and Red Hat bugzilla 1037684
>
> I'll have to do some more testing to see if lspci -t is a reasonable
> indication of iommu groups or if I can write some code to figure them out.
>
> Obviously returning the information from the Linux source is
> ultimately not really a good idea(*), because the dom0 may not be
> Linux. It is in my case, because NetBSD is (unfortunately) not yet
> functional enough for my needs and I don't want to use Solaris derived
> OS, but that doesn't help everyone else.
>
> (*) Assuming it's possible at all, as the Linux dom0 is running on top
> of Xen and therefore is restricted in some ways.
>
> PK

Ah right.  I see now.  The IOMMU groups are kernel/errata logic applied
to the system which impose restrictions as to which devices cannot
safely/functionally be split apart.

There is absolutely nothing like this in Xen, or dom0 (as dom0 is
unaware of IOMMUs in general).  If I recall correctly, it does feature
on the wishlist of the XenServer team of which I am am member, pending
some copious quantites of free time.  I know for certain that the libxl
and Xapi toolstacks do not have logic like this, leaving all passthrough
setup in the manual hands of the host administrator.

Konrad: Probably an item for the 4.6 wishlist/featurelist.  It will
probably mix well with the other IO-NUMA stuff which has been deferred.

~Andrew

[-- Attachment #1.2: Type: text/html, Size: 6270 bytes --]

[-- Attachment #2: Type: text/plain, Size: 126 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

  reply	other threads:[~2014-08-29  8:27 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-08-28 13:26 Determining iommu groups in Xen? Peter Kay
2014-08-28 13:54 ` Andrew Cooper
2014-08-28 16:48   ` Peter Kay
2014-08-28 17:13     ` Andrew Cooper
2014-08-28 17:53       ` Peter Kay
2014-08-28 18:02         ` Andrew Cooper
2014-08-28 18:45           ` Peter Kay
2014-08-29  0:35             ` Peter Kay
2014-08-29  8:27               ` Andrew Cooper [this message]
2014-08-29 14:34                 ` Konrad Rzeszutek Wilk

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=54003962.4040303@citrix.com \
    --to=andrew.cooper3@citrix.com \
    --cc=syllopsium@syllopsium.co.uk \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).