From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from foss.arm.com ([217.140.101.70]:48320 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751247AbdHGMu0 (ORCPT ); Mon, 7 Aug 2017 08:50:26 -0400 Subject: Re: Support SVM without PASID To: Bob Liu , valmiki , Alex Williamson Cc: tianyu.lan@intel.com, kevin.tian@intel.com, kvm@vger.kernel.org, linux-pci@vger.kernel.org, iommu@lists.linux-foundation.org, jacob.jun.pan@intel.com References: <20170708140257.2de02d63@w520.home> <73619426-6fcc-21ce-cfd4-8c66bde63f9a@gmail.com> <41333a03-bf91-1152-4779-6579845609f6@gmail.com> <564ba70b-db95-7fe0-86bb-bb4eefcd87ec@arm.com> <32b6402d-40fb-d40c-32f3-1ed6b9a3185a@gmail.com> <9b8611ca-3e39-90ec-e18e-7455115b38b3@arm.com> From: Jean-Philippe Brucker Message-ID: <1ef75c2d-f980-5cef-f760-be3b133c82ca@arm.com> Date: Mon, 7 Aug 2017 13:52:26 +0100 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252 Sender: linux-pci-owner@vger.kernel.org List-ID: Hi Bob, On 07/08/17 13:18, Bob Liu wrote: > On 2017/8/7 18:31, Jean-Philippe Brucker wrote: >> On 05/08/17 06:14, valmiki wrote: >> [...] >>> Hi Jean, Thanks a lot, now i understood the flow. From vfio kernel >>> documentation we fill vaddr and iova in struct vfio_iommu_type1_dma_map >>> and pass them to VFIO. But if we use dynamic allocation in application >>> (say malloc), do we need to use dma API to get iova and then call >>> VFIO_IOMMU_MAP ioctl ? >>> If application needs multiple such dynamic allocations, then it need to >>> allocate large chunk and program it via VFIO_IOMMU_MAP ioctl and then >>> manage rest allocations requirements from this buffer ? >> >> Yes, without SVM, the application allocates large buffers, allocates IOVAs >> itself, and maps them with VFIO_IOMMU_MAP. Userspace doesn't rely on the >> DMA API at all, it manages IOVAs as it wants. Sizes passed to >> VFIO_IOMMU_MAP have to be multiples of the MMU or IOMMU page granularity >> (that is at least 4kB), and both iova and vaddr have to be aligned on that >> granularity as well. So malloc isn't really suitable in this case, you'll >> need mmap. The application can then implement a small allocator to manage >> the DMA pool created with VFIO_IOMMU_MAP. >> >> With SVM the application binds its address space to the device, and then >> uses malloc for all DMA buffers, no need for VFIO_IOMMU_MAP. >> > > Hi Jean, > > I think there is another way to support SVM without PASID. > > Suppose there is a device in the same SOC-chip, the device access memory through SMMU(using internal bus instead of PCIe) > Once page fault, the device send an event with (vaddr, substreamID) to SMMU, then SMMU triggers an event interrupt. > > In the event interrupt handler, we can implement the same logic as PRI interrupt in your patch. > What do you think about that? What you're describing is the SMMU stall model for platform devices. From the driver perspective it's the same as PRI and PASID (SubstreamID=PASID). When a stall-capable device accesses unmapped memory, the SMMU parks the transaction and sends an event marked "stall" on the event queue, with a stall tag (STAG, roughly equivalent to PRG Index). The OS handles the fault and sends a CMD_RESUME command with the status and the STAG. Then the SMMU completes the access or terminates it. In a prototype I have, the stall implementation reuses most of the PASID/PRI code. The main difficulty is defining SSID and stall capability in firmware, as there are no standard capability probing for platform devices. Stall-capable devices must be able to wait an indefinite amount of time that their DMA transactions returns, therefore the stall model cannot work with PCI, only some integrated devices. Thanks, Jean