On 18/07/2024 01:44, Minwoo Im wrote:

Caution: External email. Do not open attachments or click links, unless this 
email comes from a known sender and you know the content is safe.


On 24-07-11 19:00:58, CLEMENT MATHIEU--DRIF wrote:




On 11/07/2024 10:04, Minwoo Im wrote:


Caution: External email. Do not open attachments or click links, unless this 
email comes from a known sender and you know the content is safe.


On 24-07-10 05:17:42, CLEMENT MATHIEU--DRIF wrote:



On 09/07/2024 23:17, Minwoo Im wrote:


Caution: External email. Do not open attachments or click links, unless this 
email comes from a known sender and you know the content is safe.


On 24-07-09 11:58:53, CLEMENT MATHIEU--DRIF wrote:


On 09/07/2024 12:15, Minwoo Im wrote:


Caution: External email. Do not open attachments or click links, unless this 
email comes from a known sender and you know the content is safe.


On 24-07-02 05:52:45, CLEMENT MATHIEU--DRIF wrote:


From: Clément Mathieu--Drif 
<clement.mathieu--d...@eviden.com><mailto:clement.mathieu--d...@eviden.com>

Devices implementing ATS can send translation requests using
pci_ats_request_translation_pasid.

The invalidation events are sent back to the device using the iommu
notifier managed with pci_register_iommu_tlb_event_notifier and
pci_unregister_iommu_tlb_event_notifier

Signed-off-by: Clément Mathieu--Drif 
<clement.mathieu--d...@eviden.com><mailto:clement.mathieu--d...@eviden.com>
---
    hw/pci/pci.c         | 44 +++++++++++++++++++++++++++++++++++++
    include/hw/pci/pci.h | 52 ++++++++++++++++++++++++++++++++++++++++++++
    2 files changed, 96 insertions(+)

diff --git a/hw/pci/pci.c b/hw/pci/pci.c
index 7a483dd05d..93b816aff2 100644
--- a/hw/pci/pci.c
+++ b/hw/pci/pci.c
@@ -2833,6 +2833,50 @@ void pci_device_unset_iommu_device(PCIDevice *dev)
        }
    }

+ssize_t pci_ats_request_translation_pasid(PCIDevice *dev, uint32_t pasid,
+                                          bool priv_req, bool exec_req,
+                                          hwaddr addr, size_t length,
+                                          bool no_write, IOMMUTLBEntry *result,
+                                          size_t result_length,
+                                          uint32_t *err_count)
+{
+    assert(result_length);
+    IOMMUMemoryRegion *iommu_mr = pci_device_iommu_memory_region_pasid(dev,
+                                                                        pasid);
+    if (!iommu_mr || !pcie_ats_enabled(dev)) {
+        return -EPERM;
+    }
+    return memory_region_iommu_ats_request_translation(iommu_mr, priv_req,
+                                                       exec_req, addr, length,
+                                                       no_write, result,
+                                                       result_length,
+                                                       err_count);
+}


Can we use this function not from the endpoint PCI device, but inside of the pci
subsystem (hw/pci/pci.c) to make transparent abstraction for ATS request from
PCI endpoint device POV?  I guess it would be better to have PCI subsystem to
issue ATS request if pcie_ats_enabled(dev) rather than calling from the endpoint
side.


Hi,

This series aims to bring support for SVM (we are trying to integrate
the patches bit by bit).
   From a spec point of view, I don't know if it would make sense to
implement the SVM logic at the PCI level
as it's supposed to be implemented by endpoint devices.


Understood that this series is targeting the SVM usage.  But ATS feature is
something general to PCI devices, not only just for SVM, so I guess it would be
better to have caller to `pci_ats_request_translation_pasid()` in pci subsystem
like pci_dma_rw() to avoid duplicated implementation in the future for the
other PCI enpoint devices.


Would we store the ATC directly in the PCI subsytem?


Yes, endpoint device (e.g., svm.c) should call pci_* helpers in PCI subsystem
with `PCIDevice *pdev instance` which represents the endpoint device itself.
By the instance, we can look up the IOTLB entry from the ATC in the PCI
subsystem, not the current caller side.



However, we could consider providing a reference/reusable/encapsulated
implementation of SVM with a simplified API
that would call the pci_* functions under the hood.


I would prefer that PCI devices which want to request ATS translation has no
additional implementation for ATS, but only pcie_ats_init().


Hi,

I think both strategies can coexist.
Keeping control can be interesting for people who use Qemu for hardware
prototyping and who generally want to experiment.
We can keep the current PCI-level API for devices that want to
reimplement the logic themselves
and add a kind of "DMA module"/"ATS+PRI module" that works out of the box.


I think we should proivde hybrid mode on this.  One for a `generic` cache
policy mode for every PCI endpoint devices which can be controlled in the PCI
subsystem for ATC, the other one is that device-specific cache policy mode
which let each device implement their own ATC lookup behaviors to optimize
their own caching impact.



That module could be called "struct PciDmaModule" and expose a simple
set of functions like pci_dma_module_init, pci_dma_module_read,
pci_dma_module_write.
I think it's important to keep existing DMA API as is to allow devices
to do both "with ATS" and "without ATS" operations.

Do you agree with that?


Indeed.  Keeping the existing APIs is a good choice, but I would like to have
endpoint devices code much more simpler for the generic usages :)


That's a good point, we will se what we can do once the current work is
integrated.
Thanks for your comment :)



Do you have a plan to repost this series soon? I would like to apply your
patches and review/test this series.  It looks like you've been through some of
fix patches for VT-d, but I'm curious your further plan for the actual SVM
feature :)

Hi,

As you may have noticed, my SVM implementation is based on Zhenzhong Duan's 
FLTS series, which has not yet been integrated.
The VT-d quick fixes were the only fixes without dependencies.
I'm now waiting for FLTS support to be integrated upstream before sending my 
series again (I'll add you to CC).

If you want to test the features, you can clone the following repos:
- https://github.com/BullSequana/Qemu-in-guest-SVM-demo
- https://github.com/BullSequana/qemu (submodule of the repo above)

>cmd









Do you have a specific use case in mind?


ATS/PRI is the actual use case, and it's not that different what you are
targeting for :)



   >cmd








Reply via email to