Re: [RFC] iommu/vt-d: Group and domain relationship

2018-11-12 Thread James Sewart via iommu
Hey Jacob,

> On 9 Nov 2018, at 19:09, Jacob Pan  wrote:
> 
> On Thu, 8 Nov 2018 11:30:04 +
> James Sewart mailto:jamessew...@arista.com>> wrote:
> 
>> Hey,
>> 
>>> On 8 Nov 2018, at 01:42, Lu Baolu  wrote:
>>> 
>>> Hi,
>>> 
>>> On 11/8/18 1:55 AM, James Sewart wrote:  
 Hey,  
> On 7 Nov 2018, at 02:10, Lu Baolu 
> wrote:
> 
> Hi,
> 
> On 11/6/18 6:40 PM, James Sewart wrote:  
>> Hey Lu,
>> Would you be able to go into more detail about the issues with
>> allowing IOMMU_DOMAIN_DMA to be allocated via domain_alloc?  
> 
> This door is closed because intel iommu driver does everything for
> IOMMU_DOMAIN_DMA: allocating a domain and setup the context
> entries for the domain.  
 As far as I can tell, attach_device in the intel driver will handle
 cleaning up any old domain context mapping and ensure the new
 domain is mapped with calls to dmar_remove_one_dev_info and
 domain_add_dev_info.  
>>> 
>>> That's only for domains of IOMMU_DOMAIN_UNMANAGED, right?  
>> 
>> attach_device has logic for cleaning up domains that are allocated by
>> the intel driver.
>> 
>>  old_domain = find_domain(dev);
>>  if (old_domain) {
>>  rcu_read_lock();
>>  dmar_remove_one_dev_info(old_domain, dev);
>>  rcu_read_unlock();
>> 
>>  if (!domain_type_is_vm_or_si(old_domain) &&
>>   list_empty(_domain->devices))
>>  domain_exit(old_domain);
>>  }
>> 
>> This is checking the type of the old domain only, freeing it if is
>> not attached to any devices. Looking at this now, maybe the solution
>> would be to distinguish between internally allocated dma domains and
>> dma domains allocated via the external api, so we avoid freeing a
>> domain a driver has reference to.
>> 
> I think this can also be solved by adopting default domain and moving
> internal domain to the generic code at group level. i.e. when device is
> added to a group, the group gets a default domain (also set as current
> domain) for DMA APIs. When device is attached to an unmanaged domain
> (VFIO container and IOMMU API), it will switch the current domain to
> the new domain. Old domain will be inactive but not exited.
> 
> Why do we want to open this door? Probably we want the generic
> iommu layer to handle these things (it's called default domain).  
 I’d like to allocate a domain and attach it to multiple devices in
 a group/multiple groups so that they share address translation,
 but still allow drivers for devices in those groups to use the
 dma_map_ops api.  
>>> 
>>> Just out of curiosity, why do you want to share a single domain
>>> across multiple groups? By default, the groups and DMA domains are
>>> normally 1-1 mapped, right?  
>> 
>> Currently we see each device in a group with their own domain. 
>> find_or_alloc_domain looks at dma aliases to determine who shares
>> domains whereas pci_device_group in the generic iommu code determines
>> groups using a few other checks. We have observed internally that
>> devices under a pcie switch will be put in the same group but they do
>> not share a domain within that group.
>> 
>> Getting every device within a group to share a domain would get us
>> 90% of the way to what we want. But we have some configurations where
>> there exist devices put in other groups that we want to share
>> translations with.
>> 
> This is indeed a huge disconnect between IOMMU API and VT-d handling
> of the DMA API. IOMMU API operates at group granu (per group domain)
> that is based on ACS whereas DMA API in VT-d has per device domain and
> sharing is not based on ACS. So I agree you could have multiple domains
> under the same group for DMA API use.
> 
> I am working on a patch to align the two, e.g. use per group
> default domain for DMA APIs. My idea is as follows:
> - support DOMAIN_DMA type in intel_iommu_domain_alloc()
> - add device to group will attach to the default DMA domain
>   - have to inherit any RMRR or identity mapping holes set up
> prior to IOMMU group setup.
>   - Or perhaps implement apply_resv_region() in VT-d driver and
> move RMRR setup here.
> - DMA map API, will use per group default domain instead of per device
>  private domain
> 
> The change is rather pervasive so i am trying to set a balance for
> short term functionality and complete clean up. Any ideas welcome.
> 

Sounds good, thanks. I am eager to test the patch.

>>> 
> So we can't just open the door but not cleanup the things right?  
 A user of domain_alloc and attach_device is responsible for
 detaching a domain if it is no longer needed and calling
 domain_free.  
>>> 
>>> Currently DMA API calls get_valid_domain_for_dev() to retrieve a DMA
>>> domain. If the domain has already been allocated, return directly.
>>> Otherwise, allocate and 

Re: [RFC] iommu/vt-d: Group and domain relationship

2018-11-09 Thread Jacob Pan
On Thu, 8 Nov 2018 11:30:04 +
James Sewart  wrote:

> Hey,
> 
> > On 8 Nov 2018, at 01:42, Lu Baolu  wrote:
> > 
> > Hi,
> > 
> > On 11/8/18 1:55 AM, James Sewart wrote:  
> >> Hey,  
> >>> On 7 Nov 2018, at 02:10, Lu Baolu 
> >>> wrote:
> >>> 
> >>> Hi,
> >>> 
> >>> On 11/6/18 6:40 PM, James Sewart wrote:  
>  Hey Lu,
>  Would you be able to go into more detail about the issues with
>  allowing IOMMU_DOMAIN_DMA to be allocated via domain_alloc?  
> >>> 
> >>> This door is closed because intel iommu driver does everything for
> >>> IOMMU_DOMAIN_DMA: allocating a domain and setup the context
> >>> entries for the domain.  
> >> As far as I can tell, attach_device in the intel driver will handle
> >> cleaning up any old domain context mapping and ensure the new
> >> domain is mapped with calls to dmar_remove_one_dev_info and
> >> domain_add_dev_info.  
> > 
> > That's only for domains of IOMMU_DOMAIN_UNMANAGED, right?  
> 
> attach_device has logic for cleaning up domains that are allocated by
> the intel driver.
> 
>   old_domain = find_domain(dev);
>   if (old_domain) {
>   rcu_read_lock();
>   dmar_remove_one_dev_info(old_domain, dev);
>   rcu_read_unlock();
> 
>   if (!domain_type_is_vm_or_si(old_domain) &&
>list_empty(_domain->devices))
>   domain_exit(old_domain);
>   }
> 
> This is checking the type of the old domain only, freeing it if is
> not attached to any devices. Looking at this now, maybe the solution
> would be to distinguish between internally allocated dma domains and
> dma domains allocated via the external api, so we avoid freeing a
> domain a driver has reference to.
> 
I think this can also be solved by adopting default domain and moving
internal domain to the generic code at group level. i.e. when device is
added to a group, the group gets a default domain (also set as current
domain) for DMA APIs. When device is attached to an unmanaged domain
(VFIO container and IOMMU API), it will switch the current domain to
the new domain. Old domain will be inactive but not exited.
> >>> 
> >>> Why do we want to open this door? Probably we want the generic
> >>> iommu layer to handle these things (it's called default domain).  
> >> I’d like to allocate a domain and attach it to multiple devices in
> >> a group/multiple groups so that they share address translation,
> >> but still allow drivers for devices in those groups to use the
> >> dma_map_ops api.  
> > 
> > Just out of curiosity, why do you want to share a single domain
> > across multiple groups? By default, the groups and DMA domains are
> > normally 1-1 mapped, right?  
> 
> Currently we see each device in a group with their own domain. 
> find_or_alloc_domain looks at dma aliases to determine who shares
> domains whereas pci_device_group in the generic iommu code determines
> groups using a few other checks. We have observed internally that
> devices under a pcie switch will be put in the same group but they do
> not share a domain within that group.
> 
> Getting every device within a group to share a domain would get us
> 90% of the way to what we want. But we have some configurations where
> there exist devices put in other groups that we want to share
> translations with.
> 
This is indeed a huge disconnect between IOMMU API and VT-d handling
of the DMA API. IOMMU API operates at group granu (per group domain)
that is based on ACS whereas DMA API in VT-d has per device domain and
sharing is not based on ACS. So I agree you could have multiple domains
under the same group for DMA API use.

I am working on a patch to align the two, e.g. use per group
default domain for DMA APIs. My idea is as follows:
- support DOMAIN_DMA type in intel_iommu_domain_alloc()
- add device to group will attach to the default DMA domain
- have to inherit any RMRR or identity mapping holes set up
  prior to IOMMU group setup.
- Or perhaps implement apply_resv_region() in VT-d driver and
  move RMRR setup here.
- DMA map API, will use per group default domain instead of per device
  private domain

The change is rather pervasive so i am trying to set a balance for
short term functionality and complete clean up. Any ideas welcome.

> >   
> >>> So we can't just open the door but not cleanup the things right?  
> >> A user of domain_alloc and attach_device is responsible for
> >> detaching a domain if it is no longer needed and calling
> >> domain_free.  
> > 
> > Currently DMA API calls get_valid_domain_for_dev() to retrieve a DMA
> > domain. If the domain has already been allocated, return directly.
> > Otherwise, allocate and initialize a new one for the device. Let's
> > call domains allocated by get_valid_domain_for_dev() as "A".
> > 
> > If we open the door and allow another component to manage the DMA
> > domains through domain 

Re: [RFC] iommu/vt-d: Group and domain relationship

2018-11-09 Thread James Sewart via iommu
Hey Yi,

> On 9 Nov 2018, at 06:54, Liu, Yi L  wrote:
> 
> Hi James,
> 
> Regards to the relationship of iommu group and domain, the blog written by 
> Alex
> may help you. The blog explained very well on how iommu group is determined 
> and
> why.
> 
> http://vfio.blogspot.com/2014/08/iommu-groups-inside-and-out.html

Thanks for the link, this explains how I expected the group domain 
relationship to work.

> 
>> From: iommu-boun...@lists.linux-foundation.org [mailto:iommu-
>> boun...@lists.linux-foundation.org] On Behalf Of James Sewart via iommu
>> Sent: Thursday, November 8, 2018 7:30 PM
>> Subject: Re: [RFC] iommu/vt-d: Group and domain relationship
>> 
>> Hey,
>> 
>>> On 8 Nov 2018, at 01:42, Lu Baolu  wrote:
>>> 
>>> Hi,
>>> 
>>> On 11/8/18 1:55 AM, James Sewart wrote:
>>>> Hey,
>>>>> On 7 Nov 2018, at 02:10, Lu Baolu  wrote:
>>>>> 
>>>>> Hi,
>>>>> 
>>>>> On 11/6/18 6:40 PM, James Sewart wrote:
>>>>>> Hey Lu,
>>>>>> Would you be able to go into more detail about the issues with
> 
> [...]
> 
>>>>> 
>>>>> Why do we want to open this door? Probably we want the generic iommu
>>>>> layer to handle these things (it's called default domain).
>>>> I’d like to allocate a domain and attach it to multiple devices in a
>>>> group/multiple groups so that they share address translation, but still
>>>> allow drivers for devices in those groups to use the dma_map_ops api.
>>> 
>>> Just out of curiosity, why do you want to share a single domain across
>>> multiple groups? By default, the groups and DMA domains are normally
>>> 1-1 mapped, right?
>> 
>> Currently we see each device in a group with their own domain.
>> find_or_alloc_domain looks at dma aliases to determine who shares domains
>> whereas pci_device_group in the generic iommu code determines groups using
>> a few other checks. We have observed internally that devices under a pcie
>> switch will be put in the same group but they do not share a domain within
>> that group.
> 
> Really? iommu group is DMA isolation unit. You said they are not sharing a 
> domain.
> Do you mean they have different IOVA address space by mentioning they are not
> sharing a domain? Is there any special things(e.g. special IOVA allocation to 
> avoid
> unexpected P2P) done on your system? Normally, devices within an iommu group
> should share an IOVA address space.

We see a unique set of mappings for each device within a group. Adding 
debug output to the kernel shows find_or_alloc_domain allocating a new 
domain for each device in a group. We don’t have any special configuration 
with regard to IOVA allocation.

I think the issue is that find_or_alloc_domain only uses 
pci_for_each_dma_alias to determine domain sharing. This doesn’t check the 
configuration of upstream pcie-pcie switches and doesn’t look to see if ACS 
is enabled or disabled. pci_device_group in drivers/iommu/iommu.c, which 
is used to determine which group a device is assigned, performs an extra 
walk of the upstream buses to see if there exists a bus without ACS which 
would allow peer-to-peer dma and groups the device accordingly.

One solution would be to allow the generic iommu code to assign domains, 
which it does based on the device_group function of the iommu_ops. The 
reason it doesn’t currently is that the default domain type is 
IOMMU_DOMAIN_DMA which the intel driver currently disallows allocating via 
the domain_alloc api.

Cheers,
James.


___
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

RE: [RFC] iommu/vt-d: Group and domain relationship

2018-11-08 Thread Liu, Yi L
Hi James,

Regards to the relationship of iommu group and domain, the blog written by Alex
may help you. The blog explained very well on how iommu group is determined and
why.

http://vfio.blogspot.com/2014/08/iommu-groups-inside-and-out.html

> From: iommu-boun...@lists.linux-foundation.org [mailto:iommu-
> boun...@lists.linux-foundation.org] On Behalf Of James Sewart via iommu
> Sent: Thursday, November 8, 2018 7:30 PM
> Subject: Re: [RFC] iommu/vt-d: Group and domain relationship
> 
> Hey,
> 
> > On 8 Nov 2018, at 01:42, Lu Baolu  wrote:
> >
> > Hi,
> >
> > On 11/8/18 1:55 AM, James Sewart wrote:
> >> Hey,
> >>> On 7 Nov 2018, at 02:10, Lu Baolu  wrote:
> >>>
> >>> Hi,
> >>>
> >>> On 11/6/18 6:40 PM, James Sewart wrote:
> >>>> Hey Lu,
> >>>> Would you be able to go into more detail about the issues with

[...]

> >>>
> >>> Why do we want to open this door? Probably we want the generic iommu
> >>> layer to handle these things (it's called default domain).
> >> I’d like to allocate a domain and attach it to multiple devices in a
> >> group/multiple groups so that they share address translation, but still
> >> allow drivers for devices in those groups to use the dma_map_ops api.
> >
> > Just out of curiosity, why do you want to share a single domain across
> > multiple groups? By default, the groups and DMA domains are normally
> > 1-1 mapped, right?
> 
> Currently we see each device in a group with their own domain.
> find_or_alloc_domain looks at dma aliases to determine who shares domains
> whereas pci_device_group in the generic iommu code determines groups using
> a few other checks. We have observed internally that devices under a pcie
> switch will be put in the same group but they do not share a domain within
> that group.

Really? iommu group is DMA isolation unit. You said they are not sharing a 
domain.
Do you mean they have different IOVA address space by mentioning they are not
sharing a domain? Is there any special things(e.g. special IOVA allocation to 
avoid
unexpected P2P) done on your system? Normally, devices within an iommu group
should share an IOVA address space.

Thanks,
Yi Liu
___
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

Re: [RFC] iommu/vt-d: Group and domain relationship

2018-11-08 Thread James Sewart via iommu
Hey,

> On 8 Nov 2018, at 01:42, Lu Baolu  wrote:
> 
> Hi,
> 
> On 11/8/18 1:55 AM, James Sewart wrote:
>> Hey,
>>> On 7 Nov 2018, at 02:10, Lu Baolu  wrote:
>>> 
>>> Hi,
>>> 
>>> On 11/6/18 6:40 PM, James Sewart wrote:
 Hey Lu,
 Would you be able to go into more detail about the issues with
 allowing IOMMU_DOMAIN_DMA to be allocated via domain_alloc?
>>> 
>>> This door is closed because intel iommu driver does everything for
>>> IOMMU_DOMAIN_DMA: allocating a domain and setup the context entries
>>> for the domain.
>> As far as I can tell, attach_device in the intel driver will handle
>> cleaning up any old domain context mapping and ensure the new domain is
>> mapped with calls to dmar_remove_one_dev_info and domain_add_dev_info.
> 
> That's only for domains of IOMMU_DOMAIN_UNMANAGED, right?

attach_device has logic for cleaning up domains that are allocated by the 
intel driver.

old_domain = find_domain(dev);
if (old_domain) {
rcu_read_lock();
dmar_remove_one_dev_info(old_domain, dev);
rcu_read_unlock();

if (!domain_type_is_vm_or_si(old_domain) &&
 list_empty(_domain->devices))
domain_exit(old_domain);
}

This is checking the type of the old domain only, freeing it if is not 
attached to any devices. Looking at this now, maybe the solution would be 
to distinguish between internally allocated dma domains and dma domains 
allocated via the external api, so we avoid freeing a domain a driver has 
reference to.

>>> 
>>> Why do we want to open this door? Probably we want the generic iommu
>>> layer to handle these things (it's called default domain).
>> I’d like to allocate a domain and attach it to multiple devices in a
>> group/multiple groups so that they share address translation, but still
>> allow drivers for devices in those groups to use the dma_map_ops api.
> 
> Just out of curiosity, why do you want to share a single domain across
> multiple groups? By default, the groups and DMA domains are normally
> 1-1 mapped, right?

Currently we see each device in a group with their own domain. 
find_or_alloc_domain looks at dma aliases to determine who shares domains 
whereas pci_device_group in the generic iommu code determines groups using 
a few other checks. We have observed internally that devices under a pcie 
switch will be put in the same group but they do not share a domain within 
that group.

Getting every device within a group to share a domain would get us 90% of 
the way to what we want. But we have some configurations where there exist 
devices put in other groups that we want to share translations with.

> 
>>> So we can't just open the door but not cleanup the things right?
>> A user of domain_alloc and attach_device is responsible for detaching a
>> domain if it is no longer needed and calling domain_free.
> 
> Currently DMA API calls get_valid_domain_for_dev() to retrieve a DMA
> domain. If the domain has already been allocated, return directly.
> Otherwise, allocate and initialize a new one for the device. Let's call
> domains allocated by get_valid_domain_for_dev() as "A".
> 
> If we open the door and allow another component to manage the DMA
> domains through domain iommu_domain_alloc/free(). Let's call domains
> allocated through iommu_domain_alloc() as "B".
> 
> So how can we sync between A and B?

I’m not sure we need to sync them. Domain A would be replaced entirely for 
a certain device with domain B by attach_device. As we saw above domain A 
would be freed if there are no more devices attached to it. Domain B would 
be managed by the user of the iommu api. If a device is detached from 
domain B, the find_or_alloc_domain logic will take over once more and 
allocate a fresh domain.

Cheers,
James.

> 
> Need to go through the code to find out more.
> 
> Best regards,
> Lu Baolu
>> Cheers,
>> James.
>>> 
>>> I haven't spent time on details. So I cc'ed Jacob for corrections.
>>> 
>>> Best regards,
>>> Lu Baolu
>>> 
 Cheers,
 James.
 On Fri, Nov 2, 2018 at 2:43 AM Lu Baolu  wrote:
> 
> Hi,
> 
> On 10/30/18 10:18 PM, James Sewart via iommu wrote:
>> Hey,
>> 
>> I’ve been investigating the relationship between iommu groups and domains
>> on our systems and have a few question. Why does the intel iommu code not
>> allow allocating IOMMU_DOMAIN_DMA? Returning NULL when given this domain
>> type has the side effect that the default_domain for an iommu group is 
>> not
>> set, which, when using for e.g. dma_map_ops.map_page, means a domain is
>> allocated per device.
> 
> Intel vt-d driver doesn't implement the default domain and allocates
> domain only on demanded. There are lots of things to do before we allow
> iommu API to allocate domains other than IOMMU_DOMAIN_UNMANAGED.
> 
> Best 

Re: [RFC] iommu/vt-d: Group and domain relationship

2018-11-07 Thread Lu Baolu

Hi,

On 11/8/18 1:55 AM, James Sewart wrote:

Hey,


On 7 Nov 2018, at 02:10, Lu Baolu  wrote:

Hi,

On 11/6/18 6:40 PM, James Sewart wrote:

Hey Lu,
Would you be able to go into more detail about the issues with
allowing IOMMU_DOMAIN_DMA to be allocated via domain_alloc?


This door is closed because intel iommu driver does everything for
IOMMU_DOMAIN_DMA: allocating a domain and setup the context entries
for the domain.


As far as I can tell, attach_device in the intel driver will handle
cleaning up any old domain context mapping and ensure the new domain is
mapped with calls to dmar_remove_one_dev_info and domain_add_dev_info.


That's only for domains of IOMMU_DOMAIN_UNMANAGED, right?





Why do we want to open this door? Probably we want the generic iommu
layer to handle these things (it's called default domain).


I’d like to allocate a domain and attach it to multiple devices in a
group/multiple groups so that they share address translation, but still
allow drivers for devices in those groups to use the dma_map_ops api.


Just out of curiosity, why do you want to share a single domain across
multiple groups? By default, the groups and DMA domains are normally
1-1 mapped, right?




So we can't just open the door but not cleanup the things right?


A user of domain_alloc and attach_device is responsible for detaching a
domain if it is no longer needed and calling domain_free.


Currently DMA API calls get_valid_domain_for_dev() to retrieve a DMA
domain. If the domain has already been allocated, return directly.
Otherwise, allocate and initialize a new one for the device. Let's call
domains allocated by get_valid_domain_for_dev() as "A".

If we open the door and allow another component to manage the DMA
domains through domain iommu_domain_alloc/free(). Let's call domains
allocated through iommu_domain_alloc() as "B".

So how can we sync between A and B?

Need to go through the code to find out more.

Best regards,
Lu Baolu


Cheers,
James.




I haven't spent time on details. So I cc'ed Jacob for corrections.

Best regards,
Lu Baolu


Cheers,
James.
On Fri, Nov 2, 2018 at 2:43 AM Lu Baolu  wrote:


Hi,

On 10/30/18 10:18 PM, James Sewart via iommu wrote:

Hey,

I’ve been investigating the relationship between iommu groups and domains
on our systems and have a few question. Why does the intel iommu code not
allow allocating IOMMU_DOMAIN_DMA? Returning NULL when given this domain
type has the side effect that the default_domain for an iommu group is not
set, which, when using for e.g. dma_map_ops.map_page, means a domain is
allocated per device.


Intel vt-d driver doesn't implement the default domain and allocates
domain only on demanded. There are lots of things to do before we allow
iommu API to allocate domains other than IOMMU_DOMAIN_UNMANAGED.

Best regards,
Lu Baolu



This seems to be the opposite behaviour to the AMD iommu code which
supports allocating an IOMMU_DOMAIN_DMA and will only look to the iommu
group if a domain is not attached to the device rather than allocating a
new one. On AMD every device in an iommu group will share the same domain.

Appended is what I think a patch to implement domain_alloc for
IOMMU_DOMAIN_DMA and also IOMMU_DOMAIN_IDENTITY would look like. Testing
shows each device in a group will share a domain by default, it also
allows allocating a new dma domain that can be successfully attached to a
group with iommu_attach_group.

Looking for comment on why the behaviour is how it is currently and if
there are any issues with the solution I’ve been testing.

Cheers,
James.


diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c
index bff2abd6..3a58389f 100644
--- a/drivers/iommu/intel-iommu.c
+++ b/drivers/iommu/intel-iommu.c
@@ -5170,10 +5170,15 @@ static struct iommu_domain 
*intel_iommu_domain_alloc(unsigned type)
   struct dmar_domain *dmar_domain;
   struct iommu_domain *domain;

- if (type != IOMMU_DOMAIN_UNMANAGED)
+ if (type == IOMMU_DOMAIN_UNMANAGED)
+ dmar_domain = alloc_domain(DOMAIN_FLAG_VIRTUAL_MACHINE);
+ else if(type == IOMMU_DOMAIN_DMA)
+ dmar_domain = alloc_domain(0);
+ else if(type == IOMMU_DOMAIN_IDENTITY)
+ dmar_domain = alloc_domain(DOMAIN_FLAG_STATIC_IDENTITY);
+ else
   return NULL;

- dmar_domain = alloc_domain(DOMAIN_FLAG_VIRTUAL_MACHINE);
   if (!dmar_domain) {
   pr_err("Can't allocate dmar_domain\n");
   return NULL;
@@ -5186,9 +5191,12 @@ static struct iommu_domain 
*intel_iommu_domain_alloc(unsigned type)
   domain_update_iommu_cap(dmar_domain);

   domain = _domain->domain;
- domain->geometry.aperture_start = 0;
- domain->geometry.aperture_end   = __DOMAIN_MAX_ADDR(dmar_domain->gaw);
- domain->geometry.force_aperture = true;
+
+ if (type == IOMMU_DOMAIN_UNMANAGED) {
+ domain->geometry.aperture_start = 0;
+ domain->geometry.aperture_end   = 

Re: [RFC] iommu/vt-d: Group and domain relationship

2018-11-07 Thread James Sewart via iommu
Hey,

> On 7 Nov 2018, at 02:10, Lu Baolu  wrote:
> 
> Hi,
> 
> On 11/6/18 6:40 PM, James Sewart wrote:
>> Hey Lu,
>> Would you be able to go into more detail about the issues with
>> allowing IOMMU_DOMAIN_DMA to be allocated via domain_alloc?
> 
> This door is closed because intel iommu driver does everything for
> IOMMU_DOMAIN_DMA: allocating a domain and setup the context entries
> for the domain.

As far as I can tell, attach_device in the intel driver will handle 
cleaning up any old domain context mapping and ensure the new domain is 
mapped with calls to dmar_remove_one_dev_info and domain_add_dev_info.

> 
> Why do we want to open this door? Probably we want the generic iommu
> layer to handle these things (it's called default domain).

I’d like to allocate a domain and attach it to multiple devices in a 
group/multiple groups so that they share address translation, but still 
allow drivers for devices in those groups to use the dma_map_ops api.

> So we can't just open the door but not cleanup the things right?

A user of domain_alloc and attach_device is responsible for detaching a 
domain if it is no longer needed and calling domain_free.

Cheers,
James.


> 
> I haven't spent time on details. So I cc'ed Jacob for corrections.
> 
> Best regards,
> Lu Baolu
> 
>> Cheers,
>> James.
>> On Fri, Nov 2, 2018 at 2:43 AM Lu Baolu  wrote:
>>> 
>>> Hi,
>>> 
>>> On 10/30/18 10:18 PM, James Sewart via iommu wrote:
 Hey,
 
 I’ve been investigating the relationship between iommu groups and domains
 on our systems and have a few question. Why does the intel iommu code not
 allow allocating IOMMU_DOMAIN_DMA? Returning NULL when given this domain
 type has the side effect that the default_domain for an iommu group is not
 set, which, when using for e.g. dma_map_ops.map_page, means a domain is
 allocated per device.
>>> 
>>> Intel vt-d driver doesn't implement the default domain and allocates
>>> domain only on demanded. There are lots of things to do before we allow
>>> iommu API to allocate domains other than IOMMU_DOMAIN_UNMANAGED.
>>> 
>>> Best regards,
>>> Lu Baolu
>>> 
 
 This seems to be the opposite behaviour to the AMD iommu code which
 supports allocating an IOMMU_DOMAIN_DMA and will only look to the iommu
 group if a domain is not attached to the device rather than allocating a
 new one. On AMD every device in an iommu group will share the same domain.
 
 Appended is what I think a patch to implement domain_alloc for
 IOMMU_DOMAIN_DMA and also IOMMU_DOMAIN_IDENTITY would look like. Testing
 shows each device in a group will share a domain by default, it also
 allows allocating a new dma domain that can be successfully attached to a
 group with iommu_attach_group.
 
 Looking for comment on why the behaviour is how it is currently and if
 there are any issues with the solution I’ve been testing.
 
 Cheers,
 James.
 
 
 diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c
 index bff2abd6..3a58389f 100644
 --- a/drivers/iommu/intel-iommu.c
 +++ b/drivers/iommu/intel-iommu.c
 @@ -5170,10 +5170,15 @@ static struct iommu_domain 
 *intel_iommu_domain_alloc(unsigned type)
   struct dmar_domain *dmar_domain;
   struct iommu_domain *domain;
 
 - if (type != IOMMU_DOMAIN_UNMANAGED)
 + if (type == IOMMU_DOMAIN_UNMANAGED)
 + dmar_domain = alloc_domain(DOMAIN_FLAG_VIRTUAL_MACHINE);
 + else if(type == IOMMU_DOMAIN_DMA)
 + dmar_domain = alloc_domain(0);
 + else if(type == IOMMU_DOMAIN_IDENTITY)
 + dmar_domain = alloc_domain(DOMAIN_FLAG_STATIC_IDENTITY);
 + else
   return NULL;
 
 - dmar_domain = alloc_domain(DOMAIN_FLAG_VIRTUAL_MACHINE);
   if (!dmar_domain) {
   pr_err("Can't allocate dmar_domain\n");
   return NULL;
 @@ -5186,9 +5191,12 @@ static struct iommu_domain 
 *intel_iommu_domain_alloc(unsigned type)
   domain_update_iommu_cap(dmar_domain);
 
   domain = _domain->domain;
 - domain->geometry.aperture_start = 0;
 - domain->geometry.aperture_end   = 
 __DOMAIN_MAX_ADDR(dmar_domain->gaw);
 - domain->geometry.force_aperture = true;
 +
 + if (type == IOMMU_DOMAIN_UNMANAGED) {
 + domain->geometry.aperture_start = 0;
 + domain->geometry.aperture_end   = 
 __DOMAIN_MAX_ADDR(dmar_domain->gaw);
 + domain->geometry.force_aperture = true;
 + }
 
   return domain;
   }
 ___
 iommu mailing list
 iommu@lists.linux-foundation.org
 https://lists.linuxfoundation.org/mailman/listinfo/iommu
 

___
iommu mailing list
iommu@lists.linux-foundation.org

Re: [RFC] iommu/vt-d: Group and domain relationship

2018-11-06 Thread Lu Baolu

Hi,

On 11/6/18 6:40 PM, James Sewart wrote:

Hey Lu,

Would you be able to go into more detail about the issues with
allowing IOMMU_DOMAIN_DMA to be allocated via domain_alloc?


This door is closed because intel iommu driver does everything for
IOMMU_DOMAIN_DMA: allocating a domain and setup the context entries
for the domain.

Why do we want to open this door? Probably we want the generic iommu
layer to handle these things (it's called default domain).

So we can't just open the door but not cleanup the things right?

I haven't spent time on details. So I cc'ed Jacob for corrections.

Best regards,
Lu Baolu




Cheers,
James.
On Fri, Nov 2, 2018 at 2:43 AM Lu Baolu  wrote:


Hi,

On 10/30/18 10:18 PM, James Sewart via iommu wrote:

Hey,

I’ve been investigating the relationship between iommu groups and domains
on our systems and have a few question. Why does the intel iommu code not
allow allocating IOMMU_DOMAIN_DMA? Returning NULL when given this domain
type has the side effect that the default_domain for an iommu group is not
set, which, when using for e.g. dma_map_ops.map_page, means a domain is
allocated per device.


Intel vt-d driver doesn't implement the default domain and allocates
domain only on demanded. There are lots of things to do before we allow
iommu API to allocate domains other than IOMMU_DOMAIN_UNMANAGED.

Best regards,
Lu Baolu



This seems to be the opposite behaviour to the AMD iommu code which
supports allocating an IOMMU_DOMAIN_DMA and will only look to the iommu
group if a domain is not attached to the device rather than allocating a
new one. On AMD every device in an iommu group will share the same domain.

Appended is what I think a patch to implement domain_alloc for
IOMMU_DOMAIN_DMA and also IOMMU_DOMAIN_IDENTITY would look like. Testing
shows each device in a group will share a domain by default, it also
allows allocating a new dma domain that can be successfully attached to a
group with iommu_attach_group.

Looking for comment on why the behaviour is how it is currently and if
there are any issues with the solution I’ve been testing.

Cheers,
James.


diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c
index bff2abd6..3a58389f 100644
--- a/drivers/iommu/intel-iommu.c
+++ b/drivers/iommu/intel-iommu.c
@@ -5170,10 +5170,15 @@ static struct iommu_domain 
*intel_iommu_domain_alloc(unsigned type)
   struct dmar_domain *dmar_domain;
   struct iommu_domain *domain;

- if (type != IOMMU_DOMAIN_UNMANAGED)
+ if (type == IOMMU_DOMAIN_UNMANAGED)
+ dmar_domain = alloc_domain(DOMAIN_FLAG_VIRTUAL_MACHINE);
+ else if(type == IOMMU_DOMAIN_DMA)
+ dmar_domain = alloc_domain(0);
+ else if(type == IOMMU_DOMAIN_IDENTITY)
+ dmar_domain = alloc_domain(DOMAIN_FLAG_STATIC_IDENTITY);
+ else
   return NULL;

- dmar_domain = alloc_domain(DOMAIN_FLAG_VIRTUAL_MACHINE);
   if (!dmar_domain) {
   pr_err("Can't allocate dmar_domain\n");
   return NULL;
@@ -5186,9 +5191,12 @@ static struct iommu_domain 
*intel_iommu_domain_alloc(unsigned type)
   domain_update_iommu_cap(dmar_domain);

   domain = _domain->domain;
- domain->geometry.aperture_start = 0;
- domain->geometry.aperture_end   = __DOMAIN_MAX_ADDR(dmar_domain->gaw);
- domain->geometry.force_aperture = true;
+
+ if (type == IOMMU_DOMAIN_UNMANAGED) {
+ domain->geometry.aperture_start = 0;
+ domain->geometry.aperture_end   = 
__DOMAIN_MAX_ADDR(dmar_domain->gaw);
+ domain->geometry.force_aperture = true;
+ }

   return domain;
   }
___
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu




___
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

Re: [RFC] iommu/vt-d: Group and domain relationship

2018-11-06 Thread James Sewart via iommu
Hey Lu,

Would you be able to go into more detail about the issues with
allowing IOMMU_DOMAIN_DMA to be allocated via domain_alloc?


Cheers,
James.
On Fri, Nov 2, 2018 at 2:43 AM Lu Baolu  wrote:
>
> Hi,
>
> On 10/30/18 10:18 PM, James Sewart via iommu wrote:
> > Hey,
> >
> > I’ve been investigating the relationship between iommu groups and domains
> > on our systems and have a few question. Why does the intel iommu code not
> > allow allocating IOMMU_DOMAIN_DMA? Returning NULL when given this domain
> > type has the side effect that the default_domain for an iommu group is not
> > set, which, when using for e.g. dma_map_ops.map_page, means a domain is
> > allocated per device.
>
> Intel vt-d driver doesn't implement the default domain and allocates
> domain only on demanded. There are lots of things to do before we allow
> iommu API to allocate domains other than IOMMU_DOMAIN_UNMANAGED.
>
> Best regards,
> Lu Baolu
>
> >
> > This seems to be the opposite behaviour to the AMD iommu code which
> > supports allocating an IOMMU_DOMAIN_DMA and will only look to the iommu
> > group if a domain is not attached to the device rather than allocating a
> > new one. On AMD every device in an iommu group will share the same domain.
> >
> > Appended is what I think a patch to implement domain_alloc for
> > IOMMU_DOMAIN_DMA and also IOMMU_DOMAIN_IDENTITY would look like. Testing
> > shows each device in a group will share a domain by default, it also
> > allows allocating a new dma domain that can be successfully attached to a
> > group with iommu_attach_group.
> >
> > Looking for comment on why the behaviour is how it is currently and if
> > there are any issues with the solution I’ve been testing.
> >
> > Cheers,
> > James.
> >
> >
> > diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c
> > index bff2abd6..3a58389f 100644
> > --- a/drivers/iommu/intel-iommu.c
> > +++ b/drivers/iommu/intel-iommu.c
> > @@ -5170,10 +5170,15 @@ static struct iommu_domain 
> > *intel_iommu_domain_alloc(unsigned type)
> >   struct dmar_domain *dmar_domain;
> >   struct iommu_domain *domain;
> >
> > - if (type != IOMMU_DOMAIN_UNMANAGED)
> > + if (type == IOMMU_DOMAIN_UNMANAGED)
> > + dmar_domain = alloc_domain(DOMAIN_FLAG_VIRTUAL_MACHINE);
> > + else if(type == IOMMU_DOMAIN_DMA)
> > + dmar_domain = alloc_domain(0);
> > + else if(type == IOMMU_DOMAIN_IDENTITY)
> > + dmar_domain = alloc_domain(DOMAIN_FLAG_STATIC_IDENTITY);
> > + else
> >   return NULL;
> >
> > - dmar_domain = alloc_domain(DOMAIN_FLAG_VIRTUAL_MACHINE);
> >   if (!dmar_domain) {
> >   pr_err("Can't allocate dmar_domain\n");
> >   return NULL;
> > @@ -5186,9 +5191,12 @@ static struct iommu_domain 
> > *intel_iommu_domain_alloc(unsigned type)
> >   domain_update_iommu_cap(dmar_domain);
> >
> >   domain = _domain->domain;
> > - domain->geometry.aperture_start = 0;
> > - domain->geometry.aperture_end   = __DOMAIN_MAX_ADDR(dmar_domain->gaw);
> > - domain->geometry.force_aperture = true;
> > +
> > + if (type == IOMMU_DOMAIN_UNMANAGED) {
> > + domain->geometry.aperture_start = 0;
> > + domain->geometry.aperture_end   = 
> > __DOMAIN_MAX_ADDR(dmar_domain->gaw);
> > + domain->geometry.force_aperture = true;
> > + }
> >
> >   return domain;
> >   }
> > ___
> > iommu mailing list
> > iommu@lists.linux-foundation.org
> > https://lists.linuxfoundation.org/mailman/listinfo/iommu
> >
___
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

Re: [RFC] iommu/vt-d: Group and domain relationship

2018-11-01 Thread Lu Baolu

Hi,

On 10/30/18 10:18 PM, James Sewart via iommu wrote:

Hey,

I’ve been investigating the relationship between iommu groups and domains
on our systems and have a few question. Why does the intel iommu code not
allow allocating IOMMU_DOMAIN_DMA? Returning NULL when given this domain
type has the side effect that the default_domain for an iommu group is not
set, which, when using for e.g. dma_map_ops.map_page, means a domain is
allocated per device.


Intel vt-d driver doesn't implement the default domain and allocates
domain only on demanded. There are lots of things to do before we allow
iommu API to allocate domains other than IOMMU_DOMAIN_UNMANAGED.

Best regards,
Lu Baolu



This seems to be the opposite behaviour to the AMD iommu code which
supports allocating an IOMMU_DOMAIN_DMA and will only look to the iommu
group if a domain is not attached to the device rather than allocating a
new one. On AMD every device in an iommu group will share the same domain.

Appended is what I think a patch to implement domain_alloc for
IOMMU_DOMAIN_DMA and also IOMMU_DOMAIN_IDENTITY would look like. Testing
shows each device in a group will share a domain by default, it also
allows allocating a new dma domain that can be successfully attached to a
group with iommu_attach_group.

Looking for comment on why the behaviour is how it is currently and if
there are any issues with the solution I’ve been testing.

Cheers,
James.


diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c
index bff2abd6..3a58389f 100644
--- a/drivers/iommu/intel-iommu.c
+++ b/drivers/iommu/intel-iommu.c
@@ -5170,10 +5170,15 @@ static struct iommu_domain 
*intel_iommu_domain_alloc(unsigned type)
struct dmar_domain *dmar_domain;
struct iommu_domain *domain;
  
-	if (type != IOMMU_DOMAIN_UNMANAGED)

+   if (type == IOMMU_DOMAIN_UNMANAGED)
+   dmar_domain = alloc_domain(DOMAIN_FLAG_VIRTUAL_MACHINE);
+   else if(type == IOMMU_DOMAIN_DMA)
+   dmar_domain = alloc_domain(0);
+   else if(type == IOMMU_DOMAIN_IDENTITY)
+   dmar_domain = alloc_domain(DOMAIN_FLAG_STATIC_IDENTITY);
+   else
return NULL;
  
-	dmar_domain = alloc_domain(DOMAIN_FLAG_VIRTUAL_MACHINE);

if (!dmar_domain) {
pr_err("Can't allocate dmar_domain\n");
return NULL;
@@ -5186,9 +5191,12 @@ static struct iommu_domain 
*intel_iommu_domain_alloc(unsigned type)
domain_update_iommu_cap(dmar_domain);
  
  	domain = _domain->domain;

-   domain->geometry.aperture_start = 0;
-   domain->geometry.aperture_end   = __DOMAIN_MAX_ADDR(dmar_domain->gaw);
-   domain->geometry.force_aperture = true;
+
+   if (type == IOMMU_DOMAIN_UNMANAGED) {
+   domain->geometry.aperture_start = 0;
+   domain->geometry.aperture_end   = 
__DOMAIN_MAX_ADDR(dmar_domain->gaw);
+   domain->geometry.force_aperture = true;
+   }
  
  	return domain;

  }
___
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu


___
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu