Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1309086rwl; Fri, 7 Apr 2023 13:33:14 -0700 (PDT) X-Google-Smtp-Source: AKy350YuELgHhMMzGzYO8hgbnKTu0swQm74JF3SGrZphoJE4QGzQ3RDAWe4q3/mBskDAEkxV0+cy X-Received: by 2002:a17:906:e298:b0:932:6452:2396 with SMTP id gg24-20020a170906e29800b0093264522396mr478304ejb.74.1680899594679; Fri, 07 Apr 2023 13:33:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680899594; cv=none; d=google.com; s=arc-20160816; b=jFClqykpvOpB3GUQtUQqTankt/Y3MPLSCXnpDTBALVywCjfD2FmmrWyQRjjxJyMwtu qJq3GYuedt69waG+BjPNSm+seY5EP6zuUXhwkbBESSXKLo3avE8Wya7nYrPNwx66a0TX lTL/PE2GvY+L++aj2jGMiD98TH2v3WdOZNDneblDM+sqHE7jBx5mU3CD6tVAnVVv9QaS iiaAJqMzeQqqFSXLua4PRz/2xg/Q72vUrPAWaAJE3N8ww3e+g7MD0BuUzfX3XcATDu4/ iLWaOUh0IQWXd3r4Sk6JgLJq8T3JrkhnAXYqVmffJz3vwWOhIN/tfR9s2WkDEYra29ph Gjug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=E+1lEohWZfecNejjv3z+ZfspJuxPxU8vncPrOi4ULEA=; b=0ERZFRHX1f0rwD71PugJN45pjS8bNJvZMkTcaOWNB6ezKJIurd6JB/1KyWvnYbJ9ea 8pmb8Lp0vUQSD8Dw+cMDdQxZUJwoYmnDZUDWu9unGtJ1qWbxTYvJqQ7vcfgXF6YPX3Zs qhlbkKE2wLAiF9ZBi5U3UbCtLDWZfS+cu2V55NbsZ21GyqOUSDyxxlck7QjdscANO/3v 11MQsknbfFXo/2eEsr3mYxyILCr4rXqJvQi5Ds3CKxI1FYWuBSDONvqC5TGUo8IyAob6 o1uNFkkluWw8fe/EKZU36ovs3M2ol1JlUuNcITCDXXvaiHzVcC3IYq4SaB2YvOFq9t3H 5ZPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="fN3/v9Tz"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b1-20020a170906660100b009094a93d9b7si486049ejp.990.2023.04.07.13.32.49; Fri, 07 Apr 2023 13:33:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="fN3/v9Tz"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230121AbjDGUb2 (ORCPT + 99 others); Fri, 7 Apr 2023 16:31:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54646 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229804AbjDGUb1 (ORCPT ); Fri, 7 Apr 2023 16:31:27 -0400 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2FF197A83; Fri, 7 Apr 2023 13:31:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1680899486; x=1712435486; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=d5ElvGTF+k75NnvAvIHuLEmVfaAX2fwLZSMzSXGu1vU=; b=fN3/v9TzDbHgGcHoYnUtboa/ugRC7DpwFiKu2FzbEo8Y2vMxWKKj3WmD FufxcWHCo9Y+JR55FgbMkupFRNlpmnzGPpNk+nsQyn3yH/A3n9DRnPyu8 XSnnkArOuM1Ypv90FtZWwlFNAvk/30Cwet1ki9T7cAbcpIdvGe2kGzTuQ GyYe4NeV7rlIgfmnR3KMoS+zvsdZuIq+ebP6uy7ZmWyXjhIbJ+cCLYOzB AiBBjmR9CI/m+WFYCAtNAZrTVp89uRzT9XXsHSzP0z4qnWgGyGJiTL+l2 Po+Hog0VpiNbOS8bE+k2QvD4ISbHez4FRRWTFo9XhURit5WWnWWmGuwLS w==; X-IronPort-AV: E=McAfee;i="6600,9927,10673"; a="408196844" X-IronPort-AV: E=Sophos;i="5.98,327,1673942400"; d="scan'208";a="408196844" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Apr 2023 13:31:25 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10673"; a="681125860" X-IronPort-AV: E=Sophos;i="5.98,327,1673942400"; d="scan'208";a="681125860" Received: from fyu1.sc.intel.com ([172.25.103.126]) by orsmga007.jf.intel.com with ESMTP; 07 Apr 2023 13:31:25 -0700 From: Fenghua Yu To: "Vinod Koul" , "Dave Jiang" Cc: dmaengine@vger.kernel.org, "linux-kernel" , Fenghua Yu Subject: [PATCH v4 00/16] Enable DSA 2.0 Event Log and completion record faulting features Date: Fri, 7 Apr 2023 13:31:27 -0700 Message-Id: <20230407203143.2189681-1-fenghua.yu@intel.com> X-Mailer: git-send-email 2.37.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.5 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Applications can send 64B descriptors to the DSA device via CPU instructions MOVDIR64B or ENQCMD. The application can choose to have the device write back a completion record (CR) in system memory to indicate the status of the descriptor submitted on completion. With the DSA hardware, the device is able to do on demand paging through the hardware by faulting in the user pages that do not have physical memory page backing with assistance from IOMMU. In the spec this was designated as the block on fault feature. While this hardware feature made operation simpler, it also stalls the device engines while the memory pages are being faulted in through Page Request Service (PRS). For applications sharing the same workqueue (wq) or wqs in the same group, operations are stalled if there are no free engines. To avoid slowing the performance of all other running applications sharing the same device engine(s), PRS can to be disabled and software can deal with partial completion. The block on fault feature on DSA 1.0 can be disabled for the wq. However, PRS is not completely disabled for the whole path. It is not disabled for CRs or batch list for a batch operation. The other issue is the DSA 1.0 error reporting mechanism, SWERROR register. The SWERROR register can only report a single error at a time until the driver reads and acknowledges the error. The follow on errors cannot be reported until the current error is "cleared" by the software by writing a bit to the SWERR register. If a large number of faults arrive and the software cannot clear them fast enough, overflowed errors will be dropped by the device. A CR is the optional 32 bytes (DSA) or 64 bytes (IAA) status that is written back for a submitted descriptor. If the address for the CR faults, the error is reported to the SWERROR register instead. With DSA 2.0 hardware [1], the event log feature is added. All errors are reported as an entry in a circular buffer reside in the system memory. The system admin is responsible to configure the size of the circular buffer large enough per device to handle the potential errors that may be reported. If the buffer is full and another error needs to be reported, the device engine will block until there's a free slot in the buffer. An event log entry for a faulted CR will contain the error information, the CR address that faulted, and the expected CR content the device had originally intended to write. DSA 2.0 also introduces per wq PRS disable knob. This will disable all PRS operations for the specific wq. The device will still have Address Translation Service (ATS) on. When ATS fails on a memory address for a CR, an eventlog entry will be written by the hardware into the event log ring buffer. The driver software is expected to parse the event log entry, fault in the address of the CR, and the write the content of the CR to the memory address. This patch series will implement the DSA 2 event log support. The support for the handling of the faulted user CR is added. The driver is also adding the same support for batch operation descriptors. With a batch operation the handling of the event log entry is a bit more complex. The faulting CR could be for the batch descriptor or any of the operation descriptors within the batch. The hardware generates a batch identifier that is used by the driver software to correlate the event log entries for the relevant descriptors of that batch. The faulting of source and destination addresses for the operation is not handled by the driver. That is left to be handled by the user application by faulting in the memory and re-submit the remaining operation. This series consists of three parts: 1. Patch 1: Make misc interrupt one shot. Event Log interrupt depends on this patch. This patch was released before but is not in upstream yet: https://lore.kernel.org/dmaengine/165125374675.311834.10460196228320964350.stgit@djiang5-desk3.ch.intel.com/ 2. Patches 2-15: Enable Event Log and Completion Record faulting. 3. Patch 16: Configure PRS disable per WQ. This series is applied cleanly on top of "Expose IAA 2.0 device capabilities" series (which is in dmaengine next branch now): https://lore.kernel.org/lkml/20230303213732.3357494-1-fenghua.yu@intel.com/ Change log: v4: - Use kthread_use_mm(), copy_to_user(), and kthread_unuse_mm() to switch to the mm, copy completion record to the mm, and switch back to the current mm. It's simpler than previous access_remote_vm() or emulation ways (Jason Gunthorpe, Christoph Hellwig, Tony Luck). - Change dev_err() to dev_dbg_ratelimited() in CR page fault handler (Tony Luck). v3: - Since iommu_sva_find() will be removed in IOMMU and access_remote_vm() cannot be exported, the completion record copy function idxd_copy_cr() is rewritten by maintaining and finding mm in xarray and copy completion record to the mm. Please check discussion on iommu_sva_find() will be removed and access_remote_vm() cannot be exported: 1. https://lore.kernel.org/lkml/ZAjSsm4%2FPDRqViwa@nvidia.com/ 2. https://lore.kernel.org/lkml/20230306163138.587484-1-fenghua.yu@intel.com/T/#m1fc97725a0e56ea269c8bdabacee447070d51846 v2: - Define and export iommu_access_remote_vm() for IDXD driver to write completion record to user address space. This change removes patch 8 and 9 in v1 (Alistair Popple) https://lore.kernel.org/lkml/20230306163138.587484-1-fenghua.yu@intel.com/ Dave Jiang (15): dmaengine: idxd: make misc interrupt one shot dmaengine: idxd: add event log size sysfs attribute dmaengine: idxd: setup event log configuration dmaengine: idxd: add interrupt handling for event log dmanegine: idxd: add debugfs for event log dump dmaengine: idxd: add per DSA wq workqueue for processing cr faults dmaengine: idxd: create kmem cache for event log fault items dmaengine: idxd: process user page faults for completion record dmaengine: idxd: add descs_completed field for completion record dmaengine: idxd: process batch descriptor completion record faults dmaengine: idxd: add per file user counters for completion record faults dmaengine: idxd: add a device to represent the file opened dmaengine: idxd: expose fault counters to sysfs dmaengine: idxd: add pid to exported sysfs attribute for opened file dmaengine: idxd: add per wq PRS disable Fenghua Yu (1): dmaengine: idxd: add idxd_copy_cr() to copy user completion record during page fault handling .../ABI/stable/sysfs-driver-dma-idxd | 43 +++ drivers/dma/idxd/Makefile | 2 +- drivers/dma/idxd/cdev.c | 334 ++++++++++++++++-- drivers/dma/idxd/debugfs.c | 138 ++++++++ drivers/dma/idxd/device.c | 113 +++++- drivers/dma/idxd/idxd.h | 65 ++++ drivers/dma/idxd/init.c | 53 +++ drivers/dma/idxd/irq.c | 210 +++++++++-- drivers/dma/idxd/registers.h | 105 +++++- drivers/dma/idxd/sysfs.c | 112 +++++- include/uapi/linux/idxd.h | 15 +- 11 files changed, 1126 insertions(+), 64 deletions(-) create mode 100644 drivers/dma/idxd/debugfs.c -- 2.37.1