Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp935778ybz; Wed, 15 Apr 2020 22:55:33 -0700 (PDT) X-Google-Smtp-Source: APiQypI5pn544KHvMVOe3jqNP4CZ6v98bl6Jlt9732pZnce50dWf1A2ySkrdFxtp+s05J0NpmCUB X-Received: by 2002:aa7:d518:: with SMTP id y24mr4839884edq.222.1587016533216; Wed, 15 Apr 2020 22:55:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587016533; cv=none; d=google.com; s=arc-20160816; b=QuTBPYSA5J8UjnXp7Z3M1WMgjp7x6W14r28qHiuMQdbkzX43iza+Ec6MjRGr+tlvCI naRJI0WOh2WNXd2WVfjMwzQOodyfkorhWI3V+KKOd9ocR2V9P+xo7H7wRnaq9fJDjPiQ iEdpWA2iLuLR/hGLCXd558OJiiTn4jqlfsdSRQbb1fBhbptPo1EU3DAi0PQR4c0tox2o 3jwj9lzp+rBYJFHqdkdITsHwq+EKKMFmYGQaa/HK0zqTKnnOvuOS0F/fzkDJGGOTnXgr 3xWyz7IcxVLl2d41VPuoaGTM218IHfo6qpbcz64T74HclcI9hRNv2Y36dwzsK8bK5V7N Kxrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:cc:to:from:subject; bh=HshXtUrQi1oAqxhSV550gj7bf6j4lMxQpL+n3xGLEtA=; b=qea5y6NZ1HRaxALCXSq4qS3EKWdqYVGC40tTYVqDQ9iIHYdN2jsRY7e5QQM9Uf/i17 2/fedjnRAHylfDAQomV/gHjgayoHrJe7Bow9MRlCzyyDLWJQjpyzLH3UBEGnuRhPfae6 iotnf0L0Nog4HBQ3xdYc2PTU+FX3S2iiTA0FZ0jb1Ng8btenNHj1IPqNtOISyGWgzrDT 3190Fqy24VibnKKf2SO6VLSkWD39RHhvVyKJhXx57v8nq2yAEyyQgWjQRjF9C4ztr4PH AETGQW6oTQXrJ6ooUV7QEpJ8Uy6Z8rKraQuOdu65LI74pHyzK1B/M4AJN1X4gnZe3Rux NX2Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 24si11508568ejv.109.2020.04.15.22.55.09; Wed, 15 Apr 2020 22:55:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2407167AbgDPFvX (ORCPT + 99 others); Thu, 16 Apr 2020 01:51:23 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:52770 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2407074AbgDPFvO (ORCPT ); Thu, 16 Apr 2020 01:51:14 -0400 Received: from pps.filterd (m0098419.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 03G5XKaG061475; Thu, 16 Apr 2020 01:50:43 -0400 Received: from pps.reinject (localhost [127.0.0.1]) by mx0b-001b2d01.pphosted.com with ESMTP id 30edx1ncb4-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 16 Apr 2020 01:50:42 -0400 Received: from m0098419.ppops.net (m0098419.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.36/8.16.0.36) with SMTP id 03G5fhEA085061; Thu, 16 Apr 2020 01:50:42 -0400 Received: from ppma01wdc.us.ibm.com (fd.55.37a9.ip4.static.sl-reverse.com [169.55.85.253]) by mx0b-001b2d01.pphosted.com with ESMTP id 30edx1ncav-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 16 Apr 2020 01:50:42 -0400 Received: from pps.filterd (ppma01wdc.us.ibm.com [127.0.0.1]) by ppma01wdc.us.ibm.com (8.16.0.27/8.16.0.27) with SMTP id 03G5k25M016571; Thu, 16 Apr 2020 05:50:41 GMT Received: from b03cxnp07029.gho.boulder.ibm.com (b03cxnp07029.gho.boulder.ibm.com [9.17.130.16]) by ppma01wdc.us.ibm.com with ESMTP id 30b5h6qwx1-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 16 Apr 2020 05:50:41 +0000 Received: from b03ledav005.gho.boulder.ibm.com (b03ledav005.gho.boulder.ibm.com [9.17.130.236]) by b03cxnp07029.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 03G5oe9361800812 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 16 Apr 2020 05:50:40 GMT Received: from b03ledav005.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 7E656BE04F; Thu, 16 Apr 2020 05:50:40 +0000 (GMT) Received: from b03ledav005.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id B71CFBE051; Thu, 16 Apr 2020 05:50:39 +0000 (GMT) Received: from [9.70.82.143] (unknown [9.70.82.143]) by b03ledav005.gho.boulder.ibm.com (Postfix) with ESMTP; Thu, 16 Apr 2020 05:50:39 +0000 (GMT) Subject: [PATCH v11 00/14] powerpc/vas: Page fault handling for user space NX requests From: Haren Myneni To: mpe@ellerman.id.au Cc: mikey@neuling.org, srikar@linux.vnet.ibm.com, ajd@linux.ibm.com, frederic.barrat@fr.ibm.com, hch@infradead.org, oohall@gmail.com, npiggin@gmail.com, clg@kaod.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, sukadev@linux.vnet.ibm.com, herbert@gondor.apana.org.au Content-Type: text/plain; charset="UTF-8" Date: Wed, 15 Apr 2020 22:50:14 -0700 Message-ID: <1587016214.2275.1036.camel@hbabu-laptop> Mime-Version: 1.0 X-Mailer: Evolution 2.28.3 Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.138,18.0.676 definitions=2020-04-16_01:2020-04-14,2020-04-16 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 suspectscore=3 bulkscore=0 adultscore=0 priorityscore=1501 phishscore=0 mlxlogscore=651 impostorscore=0 clxscore=1015 lowpriorityscore=0 malwarescore=0 mlxscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2003020000 definitions=main-2004160029 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On power9, Virtual Accelerator Switchboard (VAS) allows user space or kernel to communicate with Nest Accelerator (NX) directly using COPY/PASTE instructions. NX provides various functionalities such as compression, encryption and etc. But only compression (842 and GZIP formats) is supported in Linux kernel on power9. 842 compression driver (drivers/crypto/nx/nx-842-powernv.c) is already included in Linux. Only GZIP support will be available from user space. Applications can issue GZIP compression / decompression requests to NX with COPY/PASTE instructions. When NX is processing these requests, can hit fault on the request buffer (not in memory). It issues an interrupt and pastes fault CRB in fault FIFO. Expects kernel to handle this fault and return credits for both send and fault windows after processing. This patch series adds IRQ and fault window setup, and NX fault handling: - Alloc IRQ and trigger port address, and configure IRQ per VAS instance. - Set port# for each window to generate an interrupt when noticed fault. - Set fault window and FIFO on which NX paste fault CRB. - Setup IRQ thread fault handler per VAS instance. - When receiving an interrupt, Read CRBs from fault FIFO and update coprocessor_status_block (CSB) in the corresponding CRB with translation failure (CSB_CC_TRANSLATION). After issuing NX requests, process polls on CSB address. When it sees translation error, can touch the request buffer to bring the page in to memory and reissue NX request. - If copy_to_user fails on user space CSB address, OS sends SEGV signal. Tested these patches with NX-GZIP enable patches and posted them as separate patch series. Patch 1: Define alloc IRQ per chip which is needed to alloc IRQ per VAS instance. Patch 2: Define nx_fault_stamp on which NX writes fault status for the fault CRB Patch 3: Alloc and setup IRQ and trigger port address for each VAS instance Patches 4 & 5: Setup fault window and register NX per each VAS instance. This window is used for NX to paste fault CRB in FIFO. Patch 6: Reference to pid and mm so that pid is not used until window closed. Needed for multi thread application where child can open a window and can be used by parent it later. Patch 7: Setup threaded IRQ handler per VAS Patch 8: Process CRBs from fault FIFO and notify tasks by updating CSB or through signals. Patches 9 & 11: Return credits for send and fault windows after handling faults. Patches 10 & 12: Dump FIFO / CRB data and messages for error conditions Patch 13: Fix closing send window after all credits are returned. This issue happens only for user space requests. No page faults on kernel request buffer. Patch 14: For each process / thread, use mm_context->vas_windows counter to clear foreign address mapping and disable it. Changelog: V2: - Use threaded IRQ instead of own kernel thread handler - Use pswid instead of user space CSB address to find valid CRB - Removed unused macros and other changes as suggested by Christoph Hellwig V3: - Rebased to 5.5-rc2 - Use struct pid * instead of pid_t for vas_window tgid - Code cleanup as suggested by Christoph Hellwig V4: - Define xive alloc and get IRQ info based on chip ID and use these functions for IRQ setup per VAS instance. It eliminates skiboot dependency as suggested by Oliver. V5: - Do not update CSB if the process is exiting (patch8) V6: - Add interrupt handler instead of default one and return IRQ_HANDLED if the fault handling thread is already in progress. (Patch7) - Use platform send window ID and CCW[0] bit to find valid CRB in fault FIFO (Patch7). - Return fault address to user space in BE and other changes as suggested by Michael Neuling. (patch8) - Rebased to 5.6-rc4 V7: - Fixed sparse warnings (patches 4, 9 and 10) V8: - Moved mm_context_remove_copro() before mmdrop() (patch6) - Moved barrier before csb.flags store and add WARN_ON_ONCE() checks (patch8) V9: - Rebased to 5.6 - Changes based on Cedric's comments - Removed "Define xive_native_alloc_get_irq_info()" patch and used irq_get_handler_data() (patch3) - Changes based on comments from Nicholas Piggin - Moved "Taking PID reference" patch before setting VAS fault handler patch - Removed mutex_lock/unlock (patch7) - Other cleanup changes V10: - Include patch to enable and disable CP_ABORT execution using mm_context->vas_windows counter. - Remove 'if (txwin)' line which is covered with 'else' before (patch6) V11: - Added comments for fault_lock and fifo_in_progress elements (patch7) - Use pr_warn_ratelimited instead of pr_debug to display message during window close (patch12) - Moved set_thread_uses_vas() to vas_win_open() (patch14) Haren Myneni (14): powerpc/xive: Define xive_native_alloc_irq_on_chip() powerpc/vas: Define nx_fault_stamp in coprocessor_request_block powerpc/vas: Alloc and setup IRQ and trigger port address powerpc/vas: Setup fault window per VAS instance powerpc/vas: Register NX with fault window ID and IRQ port value powerpc/vas: Take reference to PID and mm for user space windows powerpc/vas: Setup thread IRQ handler per VAS instance powerpc/vas: Update CSB and notify process for fault CRBs powerpc/vas: Return credits after handling fault powerpc/vas: Print CRB and FIFO values powerpc/vas: Do not use default credits for receive window powerpc/vas: Display process stuck message powerpc/vas: Free send window in VAS instance after credits returned powerpc: Use mm_context vas_windows counter to issue CP_ABORT arch/powerpc/include/asm/book3s/64/mmu.h | 3 + arch/powerpc/include/asm/icswx.h | 20 +- arch/powerpc/include/asm/mmu_context.h | 30 +++ arch/powerpc/include/asm/processor.h | 1 - arch/powerpc/include/asm/switch_to.h | 2 - arch/powerpc/include/asm/xive.h | 9 +- arch/powerpc/kernel/process.c | 24 +- arch/powerpc/platforms/powernv/Makefile | 2 +- arch/powerpc/platforms/powernv/vas-debug.c | 2 +- arch/powerpc/platforms/powernv/vas-fault.c | 382 ++++++++++++++++++++++++++++ arch/powerpc/platforms/powernv/vas-window.c | 215 ++++++++++++++-- arch/powerpc/platforms/powernv/vas.c | 85 ++++++- arch/powerpc/platforms/powernv/vas.h | 57 ++++- arch/powerpc/sysdev/xive/native.c | 6 +- 14 files changed, 779 insertions(+), 59 deletions(-) create mode 100644 arch/powerpc/platforms/powernv/vas-fault.c -- 1.8.3.1