Message ID | 20230306163138.587484-1-fenghua.yu@intel.com |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:5915:0:0:0:0:0 with SMTP id v21csp1955443wrd; Mon, 6 Mar 2023 09:03:13 -0800 (PST) X-Google-Smtp-Source: AK7set+a+UjL0x3eCKKU1YR/ZXagz7PFt/LDRMVGqt9BaHG35szBtIHPr6WAldB2Wcur/TxOqBG9 X-Received: by 2002:a17:906:68c5:b0:8b1:353a:2636 with SMTP id y5-20020a17090668c500b008b1353a2636mr9891691ejr.14.1678122193665; Mon, 06 Mar 2023 09:03:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1678122193; cv=none; d=google.com; s=arc-20160816; b=F54sSSL38ocIm+ISdx1dSWtF7OYhQZaU6U2OsKFtxgDKmpahtR9w+uqQUCLiuwdsVl iervrEkOmoiG8wcpaeYOYhs3Ayt/UxiK62Z71efgmIr2W+FVPlAqZ5+kf3kgRx4S3bfZ 8WP7Sb63VO/FhjnZIidhNmTTFCBc+5+T6ye/8a76PkrKTD54lBOkOH50meb6POmsDGYl 0FitK9YgwarzE4CLij+gCbruqtLoW0mZnZr4os/fO3AngsQjnL9LhaJOYg3uWGzNAo3F +vy40zQ1nVNaE5bDefUYcl/BnGe+U/IKe/9VzmLn8MuzWegpEQbmLP6njX4jytEqlGpZ hzrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=Bz7P9cLf+jy7C7OH+kep7gQPVcL/MVih23o3rQJ8fPI=; b=mdJyjDNhn/xMHi9ZxCYi1TdBRvy/AG7OEHzhEo46wAIGTE7/W6DTLm5saP97yIqlG2 QDToi64An14egDZ4IJiAsQasv3vN3JWgfidHfPu54hIpOsBE1G7a9/LIhG06sVuy42Q8 goPvNwaSamUIAoIXzPs6mmwjTwYhSfPANentWq1g3ts7mc+IDiVVNZJnqkNQjP6rfwM3 7zr92guLK1YGqQbFMedl5cgsOF3FSlpsAZ2hs/c+u11kvpRTfIhJLTJsFI8mr3vCnF/i 9MbcrbnDyxOv/HdQ5T7Q7GyiHhvMvGjYlROMSUGPiHku+CyBuI65Xw6glHQaX5BgAtLm pJLw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=AevzY5s4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y12-20020a1709064b0c00b008f8d6a7e0c9si3457491eju.101.2023.03.06.09.02.49; Mon, 06 Mar 2023 09:03:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=AevzY5s4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230224AbjCFQo3 (ORCPT <rfc822;toshivichauhan@gmail.com> + 99 others); Mon, 6 Mar 2023 11:44:29 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34468 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230242AbjCFQoH (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Mon, 6 Mar 2023 11:44:07 -0500 Received: from mga06.intel.com (mga06b.intel.com [134.134.136.31]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 927679EDB; Mon, 6 Mar 2023 08:43:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1678121023; x=1709657023; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=kJZUZf+J47j7PPpaqeXXB3/Hvai5TS6lAosU6kfHu3s=; b=AevzY5s437XuVBMrk5YtNu7pe//oHK3ltCtLvbMOSAjXPlJsRPVMXAPS yZKSK2bxUuiAnRWz3N0Tc79LfpaffwDolYuu9gxA6+9fREVJPvUC4gUvG bE+YV36YJBvGVBwL1fqIuuBZV41uPnhNwk4VyKtoc701kMicIMn7KJulM fgbjA48wGchokMTorjyGaaMlc0qvryRnnYnzaKJKA5Ns7dZfYlwDa2wUS xsvHTF7TfvBNfF5ZkKT5GF7vawH/fkisKxiNI5gt3ZuuixsKWW/wMJqtD +TIpNyqGdsn7ENVwrCklAeLMCZ9JHm/4bqK1RlK2j1/MXgCOfn2NbhK2R w==; X-IronPort-AV: E=McAfee;i="6500,9779,10641"; a="398181125" X-IronPort-AV: E=Sophos;i="5.98,238,1673942400"; d="scan'208";a="398181125" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Mar 2023 08:31:54 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10641"; a="669504454" X-IronPort-AV: E=Sophos;i="5.98,238,1673942400"; d="scan'208";a="669504454" Received: from fyu1.sc.intel.com ([172.25.103.126]) by orsmga007.jf.intel.com with ESMTP; 06 Mar 2023 08:31:54 -0800 From: Fenghua Yu <fenghua.yu@intel.com> To: "Vinod Koul" <vkoul@kernel.org>, "Dave Jiang" <dave.jiang@intel.com> Cc: dmaengine@vger.kernel.org, "linux-kernel" <linux-kernel@vger.kernel.org>, Fenghua Yu <fenghua.yu@intel.com> Subject: [PATCH v2 00/16] Enable DSA 2.0 Event Log and completion record faulting features Date: Mon, 6 Mar 2023 08:31:22 -0800 Message-Id: <20230306163138.587484-1-fenghua.yu@intel.com> X-Mailer: git-send-email 2.37.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1759638657502330028?= X-GMAIL-MSGID: =?utf-8?q?1759638657502330028?= |
Series |
Enable DSA 2.0 Event Log and completion record faulting features
|
|
Message
Fenghua Yu
March 6, 2023, 4:31 p.m. UTC
Applications can send 64B descriptors to the DSA device via CPU instructions MOVDIR64B or ENQCMD. The application can choose to have the device write back a completion record (CR) in system memory to indicate the status of the descriptor submitted on completion. With the DSA hardware, the device is able to do on demand paging through the hardware by faulting in the user pages that do not have physical memory page backing with assistance from IOMMU. In the spec this was designated as the block on fault feature. While this hardware feature made operation simpler, it also stalls the device engines while the memory pages are being faulted in through Page Request Service (PRS). For applications sharing the same workqueue (wq) or wqs in the same group, operations are stalled if there are no free engines. To avoid slowing the performance of all other running applications sharing the same device engine(s), PRS can to be disabled and software can deal with partial completion. The block on fault feature on DSA 1.0 can be disabled for the wq. However, PRS is not completely disabled for the whole path. It is not disabled for CRs or batch list for a batch operation. The other issue is the DSA 1.0 error reporting mechanism, SWERROR register. The SWERROR register can only report a single error at a time until the driver reads and acknowledges the error. The follow on errors cannot be reported until the current error is "cleared" by the software by writing a bit to the SWERR register. If a large number of faults arrive and the software cannot clear them fast enough, overflowed errors will be dropped by the device. A CR is the optional 32 bytes (DSA) or 64 bytes (IAA) status that is written back for a submitted descriptor. If the address for the CR faults, the error is reported to the SWERROR register instead. With DSA 2.0 hardware [1], the event log feature is added. All errors are reported as an entry in a circular buffer reside in the system memory. The system admin is responsible to configure the size of the circular buffer large enough per device to handle the potential errors that may be reported. If the buffer is full and another error needs to be reported, the device engine will block until there's a free slot in the buffer. An event log entry for a faulted CR will contain the error information, the CR address that faulted, and the expected CR content the device had originally intended to write. DSA 2.0 also introduces per wq PRS disable knob. This will disable all PRS operations for the specific wq. The device will still have Address Translation Service (ATS) on. When ATS fails on a memory address for a CR, an eventlog entry will be written by the hardware into the event log ring buffer. The driver software is expected to parse the event log entry, fault in the address of the CR, and the write the content of the CR to the memory address. This patch series will implement the DSA 2 event log support. The support for the handling of the faulted user CR is added. The driver is also adding the same support for batch operation descriptors. With a batch operation the handling of the event log entry is a bit more complex. The faulting CR could be for the batch descriptor or any of the operation descriptors within the batch. The hardware generates a batch identifier that is used by the driver software to correlate the event log entries for the relevant descriptors of that batch. The faulting of source and destination addresses for the operation is not handled by the driver. That is left to be handled by the user application by faulting in the memory and re-submit the remaining operation. This series consists of three parts: 1. Patch 1: Make misc interrupt one shot. Event Log interrupt depends on this patch. This patch was released before but is not in upstream yet: https://lore.kernel.org/dmaengine/165125374675.311834.10460196228320964350.stgit@djiang5-desk3.ch.intel.com/ 2. Patches 2-15: Enable Event Log and Completion Record faulting. 3. Patch 16: Configure PRS disable per WQ. This series is applied cleanly on top of "Expose IAA 2.0 device capabilities" series: https://lore.kernel.org/lkml/20230303213732.3357494-1-fenghua.yu@intel.com/ Change log: v2: - Define and export iommu_access_remote_vm() for IDXD driver to write completion record to user address space. This change removes patch 8 and 9 in v1 (Alistair Popple) Dave Jiang (15): dmaengine: idxd: make misc interrupt one shot dmaengine: idxd: add event log size sysfs attribute dmaengine: idxd: setup event log configuration dmaengine: idxd: add interrupt handling for event log dmanegine: idxd: add debugfs for event log dump dmaengine: idxd: add per DSA wq workqueue for processing cr faults dmaengine: idxd: create kmem cache for event log fault items dmaengine: idxd: process user page faults for completion record dmaengine: idxd: add descs_completed field for completion record dmaengine: idxd: process batch descriptor completion record faults dmaengine: idxd: add per file user counters for completion record faults dmaengine: idxd: add a device to represent the file opened dmaengine: idxd: expose fault counters to sysfs dmaengine: idxd: add pid to exported sysfs attribute for opened file dmaengine: idxd: add per wq PRS disable Fenghua Yu (1): iommu: define and export iommu_access_remote_vm() .../ABI/stable/sysfs-driver-dma-idxd | 43 +++ drivers/dma/Kconfig | 1 + drivers/dma/idxd/Makefile | 2 +- drivers/dma/idxd/cdev.c | 264 ++++++++++++++++-- drivers/dma/idxd/debugfs.c | 138 +++++++++ drivers/dma/idxd/device.c | 113 +++++++- drivers/dma/idxd/idxd.h | 63 +++++ drivers/dma/idxd/init.c | 53 ++++ drivers/dma/idxd/irq.c | 203 ++++++++++++-- drivers/dma/idxd/registers.h | 105 ++++++- drivers/dma/idxd/sysfs.c | 112 +++++++- drivers/iommu/iommu-sva.c | 35 +++ include/linux/iommu.h | 9 + include/uapi/linux/idxd.h | 15 +- 14 files changed, 1091 insertions(+), 65 deletions(-) create mode 100644 drivers/dma/idxd/debugfs.c