On 18/07/2024 01:44, Minwoo Im wrote:
Caution: External email. Do not open attachments or click links, unless this email comes from a known sender and you know the content is safe. On 24-07-11 19:00:58, CLEMENT MATHIEU--DRIF wrote: On 11/07/2024 10:04, Minwoo Im wrote: Caution: External email. Do not open attachments or click links, unless this email comes from a known sender and you know the content is safe. On 24-07-10 05:17:42, CLEMENT MATHIEU--DRIF wrote: On 09/07/2024 23:17, Minwoo Im wrote: Caution: External email. Do not open attachments or click links, unless this email comes from a known sender and you know the content is safe. On 24-07-09 11:58:53, CLEMENT MATHIEU--DRIF wrote: On 09/07/2024 12:15, Minwoo Im wrote: Caution: External email. Do not open attachments or click links, unless this email comes from a known sender and you know the content is safe. On 24-07-02 05:52:45, CLEMENT MATHIEU--DRIF wrote: From: Clément Mathieu--Drif <clement.mathieu--d...@eviden.com><mailto:clement.mathieu--d...@eviden.com> Devices implementing ATS can send translation requests using pci_ats_request_translation_pasid. The invalidation events are sent back to the device using the iommu notifier managed with pci_register_iommu_tlb_event_notifier and pci_unregister_iommu_tlb_event_notifier Signed-off-by: Clément Mathieu--Drif <clement.mathieu--d...@eviden.com><mailto:clement.mathieu--d...@eviden.com> --- hw/pci/pci.c | 44 +++++++++++++++++++++++++++++++++++++ include/hw/pci/pci.h | 52 ++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 96 insertions(+) diff --git a/hw/pci/pci.c b/hw/pci/pci.c index 7a483dd05d..93b816aff2 100644 --- a/hw/pci/pci.c +++ b/hw/pci/pci.c @@ -2833,6 +2833,50 @@ void pci_device_unset_iommu_device(PCIDevice *dev) } } +ssize_t pci_ats_request_translation_pasid(PCIDevice *dev, uint32_t pasid, + bool priv_req, bool exec_req, + hwaddr addr, size_t length, + bool no_write, IOMMUTLBEntry *result, + size_t result_length, + uint32_t *err_count) +{ + assert(result_length); + IOMMUMemoryRegion *iommu_mr = pci_device_iommu_memory_region_pasid(dev, + pasid); + if (!iommu_mr || !pcie_ats_enabled(dev)) { + return -EPERM; + } + return memory_region_iommu_ats_request_translation(iommu_mr, priv_req, + exec_req, addr, length, + no_write, result, + result_length, + err_count); +} Can we use this function not from the endpoint PCI device, but inside of the pci subsystem (hw/pci/pci.c) to make transparent abstraction for ATS request from PCI endpoint device POV? I guess it would be better to have PCI subsystem to issue ATS request if pcie_ats_enabled(dev) rather than calling from the endpoint side. Hi, This series aims to bring support for SVM (we are trying to integrate the patches bit by bit). From a spec point of view, I don't know if it would make sense to implement the SVM logic at the PCI level as it's supposed to be implemented by endpoint devices. Understood that this series is targeting the SVM usage. But ATS feature is something general to PCI devices, not only just for SVM, so I guess it would be better to have caller to `pci_ats_request_translation_pasid()` in pci subsystem like pci_dma_rw() to avoid duplicated implementation in the future for the other PCI enpoint devices. Would we store the ATC directly in the PCI subsytem? Yes, endpoint device (e.g., svm.c) should call pci_* helpers in PCI subsystem with `PCIDevice *pdev instance` which represents the endpoint device itself. By the instance, we can look up the IOTLB entry from the ATC in the PCI subsystem, not the current caller side. However, we could consider providing a reference/reusable/encapsulated implementation of SVM with a simplified API that would call the pci_* functions under the hood. I would prefer that PCI devices which want to request ATS translation has no additional implementation for ATS, but only pcie_ats_init(). Hi, I think both strategies can coexist. Keeping control can be interesting for people who use Qemu for hardware prototyping and who generally want to experiment. We can keep the current PCI-level API for devices that want to reimplement the logic themselves and add a kind of "DMA module"/"ATS+PRI module" that works out of the box. I think we should proivde hybrid mode on this. One for a `generic` cache policy mode for every PCI endpoint devices which can be controlled in the PCI subsystem for ATC, the other one is that device-specific cache policy mode which let each device implement their own ATC lookup behaviors to optimize their own caching impact. That module could be called "struct PciDmaModule" and expose a simple set of functions like pci_dma_module_init, pci_dma_module_read, pci_dma_module_write. I think it's important to keep existing DMA API as is to allow devices to do both "with ATS" and "without ATS" operations. Do you agree with that? Indeed. Keeping the existing APIs is a good choice, but I would like to have endpoint devices code much more simpler for the generic usages :) That's a good point, we will se what we can do once the current work is integrated. Thanks for your comment :) Do you have a plan to repost this series soon? I would like to apply your patches and review/test this series. It looks like you've been through some of fix patches for VT-d, but I'm curious your further plan for the actual SVM feature :) Hi, As you may have noticed, my SVM implementation is based on Zhenzhong Duan's FLTS series, which has not yet been integrated. The VT-d quick fixes were the only fixes without dependencies. I'm now waiting for FLTS support to be integrated upstream before sending my series again (I'll add you to CC). If you want to test the features, you can clone the following repos: - https://github.com/BullSequana/Qemu-in-guest-SVM-demo - https://github.com/BullSequana/qemu (submodule of the repo above) >cmd Do you have a specific use case in mind? ATS/PRI is the actual use case, and it's not that different what you are targeting for :) >cmd