| .. SPDX-License-Identifier: GPL-2.0-only |
| |
| =============================== |
| Qualcomm Cloud AI 100 (AIC100) |
| =============================== |
| |
| Overview |
| ======== |
| |
| The Qualcomm Cloud AI 100/AIC100 family of products (including SA9000P - part of |
| Snapdragon Ride) are PCIe adapter cards which contain a dedicated SoC ASIC for |
| the purpose of efficiently running Artificial Intelligence (AI) Deep Learning |
| inference workloads. They are AI accelerators. |
| |
| The PCIe interface of AIC100 is capable of PCIe Gen4 speeds over eight lanes |
| (x8). An individual SoC on a card can have up to 16 NSPs for running workloads. |
| Each SoC has an A53 management CPU. On card, there can be up to 32 GB of DDR. |
| |
| Multiple AIC100 cards can be hosted in a single system to scale overall |
| performance. AIC100 cards are multi-user capable and able to execute workloads |
| from multiple users in a concurrent manner. |
| |
| Hardware Description |
| ==================== |
| |
| An AIC100 card consists of an AIC100 SoC, on-card DDR, and a set of misc |
| peripherals (PMICs, etc). |
| |
| An AIC100 card can either be a PCIe HHHL form factor (a traditional PCIe card), |
| or a Dual M.2 card. Both use PCIe to connect to the host system. |
| |
| As a PCIe endpoint/adapter, AIC100 uses the standard VendorID(VID)/ |
| DeviceID(DID) combination to uniquely identify itself to the host. AIC100 |
| uses the standard Qualcomm VID (0x17cb). All AIC100 SKUs use the same |
| AIC100 DID (0xa100). |
| |
| AIC100 does not implement FLR (function level reset). |
| |
| AIC100 implements MSI but does not implement MSI-X. AIC100 requires 17 MSIs to |
| operate (1 for MHI, 16 for the DMA Bridge). |
| |
| As a PCIe device, AIC100 utilizes BARs to provide host interfaces to the device |
| hardware. AIC100 provides 3, 64-bit BARs. |
| |
| * The first BAR is 4K in size, and exposes the MHI interface to the host. |
| |
| * The second BAR is 2M in size, and exposes the DMA Bridge interface to the |
| host. |
| |
| * The third BAR is variable in size based on an individual AIC100's |
| configuration, but defaults to 64K. This BAR currently has no purpose. |
| |
| From the host perspective, AIC100 has several key hardware components - |
| |
| * MHI (Modem Host Interface) |
| * QSM (QAIC Service Manager) |
| * NSPs (Neural Signal Processor) |
| * DMA Bridge |
| * DDR |
| |
| MHI |
| --- |
| |
| AIC100 has one MHI interface over PCIe. MHI itself is documented at |
| Documentation/mhi/index.rst MHI is the mechanism the host uses to communicate |
| with the QSM. Except for workload data via the DMA Bridge, all interaction with |
| the device occurs via MHI. |
| |
| QSM |
| --- |
| |
| QAIC Service Manager. This is an ARM A53 CPU that runs the primary |
| firmware of the card and performs on-card management tasks. It also |
| communicates with the host via MHI. Each AIC100 has one of |
| these. |
| |
| NSP |
| --- |
| |
| Neural Signal Processor. Each AIC100 has up to 16 of these. These are |
| the processors that run the workloads on AIC100. Each NSP is a Qualcomm Hexagon |
| (Q6) DSP with HVX and HMX. Each NSP can only run one workload at a time, but |
| multiple NSPs may be assigned to a single workload. Since each NSP can only run |
| one workload, AIC100 is limited to 16 concurrent workloads. Workload |
| "scheduling" is under the purview of the host. AIC100 does not automatically |
| timeslice. |
| |
| DMA Bridge |
| ---------- |
| |
| The DMA Bridge is custom DMA engine that manages the flow of data |
| in and out of workloads. AIC100 has one of these. The DMA Bridge has 16 |
| channels, each consisting of a set of request/response FIFOs. Each active |
| workload is assigned a single DMA Bridge channel. The DMA Bridge exposes |
| hardware registers to manage the FIFOs (head/tail pointers), but requires host |
| memory to store the FIFOs. |
| |
| DDR |
| --- |
| |
| AIC100 has on-card DDR. In total, an AIC100 can have up to 32 GB of DDR. |
| This DDR is used to store workloads, data for the workloads, and is used by the |
| QSM for managing the device. NSPs are granted access to sections of the DDR by |
| the QSM. The host does not have direct access to the DDR, and must make |
| requests to the QSM to transfer data to the DDR. |
| |
| High-level Use Flow |
| =================== |
| |
| AIC100 is a multi-user, programmable accelerator typically used for running |
| neural networks in inferencing mode to efficiently perform AI operations. |
| AIC100 is not intended for training neural networks. AIC100 can be utilized |
| for generic compute workloads. |
| |
| Assuming a user wants to utilize AIC100, they would follow these steps: |
| |
| 1. Compile the workload into an ELF targeting the NSP(s) |
| 2. Make requests to the QSM to load the workload and related artifacts into the |
| device DDR |
| 3. Make a request to the QSM to activate the workload onto a set of idle NSPs |
| 4. Make requests to the DMA Bridge to send input data to the workload to be |
| processed, and other requests to receive processed output data from the |
| workload. |
| 5. Once the workload is no longer required, make a request to the QSM to |
| deactivate the workload, thus putting the NSPs back into an idle state. |
| 6. Once the workload and related artifacts are no longer needed for future |
| sessions, make requests to the QSM to unload the data from DDR. This frees |
| the DDR to be used by other users. |
| |
| |
| Boot Flow |
| ========= |
| |
| AIC100 uses a flashless boot flow, derived from Qualcomm MSMs. |
| |
| When AIC100 is first powered on, it begins executing PBL (Primary Bootloader) |
| from ROM. PBL enumerates the PCIe link, and initializes the BHI (Boot Host |
| Interface) component of MHI. |
| |
| Using BHI, the host points PBL to the location of the SBL (Secondary Bootloader) |
| image. The PBL pulls the image from the host, validates it, and begins |
| execution of SBL. |
| |
| SBL initializes MHI, and uses MHI to notify the host that the device has entered |
| the SBL stage. SBL performs a number of operations: |
| |
| * SBL initializes the majority of hardware (anything PBL left uninitialized), |
| including DDR. |
| * SBL offloads the bootlog to the host. |
| * SBL synchronizes timestamps with the host for future logging. |
| * SBL uses the Sahara protocol to obtain the runtime firmware images from the |
| host. |
| |
| Once SBL has obtained and validated the runtime firmware, it brings the NSPs out |
| of reset, and jumps into the QSM. |
| |
| The QSM uses MHI to notify the host that the device has entered the QSM stage |
| (AMSS in MHI terms). At this point, the AIC100 device is fully functional, and |
| ready to process workloads. |
| |
| Userspace components |
| ==================== |
| |
| Compiler |
| -------- |
| |
| An open compiler for AIC100 based on upstream LLVM can be found at: |
| https://github.com/quic/software-kit-for-qualcomm-cloud-ai-100-cc |
| |
| Usermode Driver (UMD) |
| --------------------- |
| |
| An open UMD that interfaces with the qaic kernel driver can be found at: |
| https://github.com/quic/software-kit-for-qualcomm-cloud-ai-100 |
| |
| Sahara loader |
| ------------- |
| |
| An open implementation of the Sahara protocol called kickstart can be found at: |
| https://github.com/andersson/qdl |
| |
| MHI Channels |
| ============ |
| |
| AIC100 defines a number of MHI channels for different purposes. This is a list |
| of the defined channels, and their uses. |
| |
| +----------------+---------+----------+----------------------------------------+ |
| | Channel name | IDs | EEs | Purpose | |
| +================+=========+==========+========================================+ |
| | QAIC_LOOPBACK | 0 & 1 | AMSS | Any data sent to the device on this | |
| | | | | channel is sent back to the host. | |
| +----------------+---------+----------+----------------------------------------+ |
| | QAIC_SAHARA | 2 & 3 | SBL | Used by SBL to obtain the runtime | |
| | | | | firmware from the host. | |
| +----------------+---------+----------+----------------------------------------+ |
| | QAIC_DIAG | 4 & 5 | AMSS | Used to communicate with QSM via the | |
| | | | | DIAG protocol. | |
| +----------------+---------+----------+----------------------------------------+ |
| | QAIC_SSR | 6 & 7 | AMSS | Used to notify the host of subsystem | |
| | | | | restart events, and to offload SSR | |
| | | | | crashdumps. | |
| +----------------+---------+----------+----------------------------------------+ |
| | QAIC_QDSS | 8 & 9 | AMSS | Used for the Qualcomm Debug Subsystem. | |
| +----------------+---------+----------+----------------------------------------+ |
| | QAIC_CONTROL | 10 & 11 | AMSS | Used for the Neural Network Control | |
| | | | | (NNC) protocol. This is the primary | |
| | | | | channel between host and QSM for | |
| | | | | managing workloads. | |
| +----------------+---------+----------+----------------------------------------+ |
| | QAIC_LOGGING | 12 & 13 | SBL | Used by the SBL to send the bootlog to | |
| | | | | the host. | |
| +----------------+---------+----------+----------------------------------------+ |
| | QAIC_STATUS | 14 & 15 | AMSS | Used to notify the host of Reliability,| |
| | | | | Accessibility, Serviceability (RAS) | |
| | | | | events. | |
| +----------------+---------+----------+----------------------------------------+ |
| | QAIC_TELEMETRY | 16 & 17 | AMSS | Used to get/set power/thermal/etc | |
| | | | | attributes. | |
| +----------------+---------+----------+----------------------------------------+ |
| | QAIC_DEBUG | 18 & 19 | AMSS | Not used. | |
| +----------------+---------+----------+----------------------------------------+ |
| | QAIC_TIMESYNC | 20 & 21 | SBL/AMSS | Used to synchronize timestamps in the | |
| | | | | device side logs with the host time | |
| | | | | source. | |
| +----------------+---------+----------+----------------------------------------+ |
| |
| DMA Bridge |
| ========== |
| |
| Overview |
| -------- |
| |
| The DMA Bridge is one of the main interfaces to the host from the device |
| (the other being MHI). As part of activating a workload to run on NSPs, the QSM |
| assigns that network a DMA Bridge channel. A workload's DMA Bridge channel |
| (DBC for short) is solely for the use of that workload and is not shared with |
| other workloads. |
| |
| Each DBC is a pair of FIFOs that manage data in and out of the workload. One |
| FIFO is the request FIFO. The other FIFO is the response FIFO. |
| |
| Each DBC contains 4 registers in hardware: |
| |
| * Request FIFO head pointer (offset 0x0). Read only by the host. Indicates the |
| latest item in the FIFO the device has consumed. |
| * Request FIFO tail pointer (offset 0x4). Read/write by the host. Host |
| increments this register to add new items to the FIFO. |
| * Response FIFO head pointer (offset 0x8). Read/write by the host. Indicates |
| the latest item in the FIFO the host has consumed. |
| * Response FIFO tail pointer (offset 0xc). Read only by the host. Device |
| increments this register to add new items to the FIFO. |
| |
| The values in each register are indexes in the FIFO. To get the location of the |
| FIFO element pointed to by the register: FIFO base address + register * element |
| size. |
| |
| DBC registers are exposed to the host via the second BAR. Each DBC consumes |
| 4KB of space in the BAR. |
| |
| The actual FIFOs are backed by host memory. When sending a request to the QSM |
| to activate a network, the host must donate memory to be used for the FIFOs. |
| Due to internal mapping limitations of the device, a single contiguous chunk of |
| memory must be provided per DBC, which hosts both FIFOs. The request FIFO will |
| consume the beginning of the memory chunk, and the response FIFO will consume |
| the end of the memory chunk. |
| |
| Request FIFO |
| ------------ |
| |
| A request FIFO element has the following structure: |
| |
| .. code-block:: c |
| |
| struct request_elem { |
| u16 req_id; |
| u8 seq_id; |
| u8 pcie_dma_cmd; |
| u32 reserved; |
| u64 pcie_dma_source_addr; |
| u64 pcie_dma_dest_addr; |
| u32 pcie_dma_len; |
| u32 reserved; |
| u64 doorbell_addr; |
| u8 doorbell_attr; |
| u8 reserved; |
| u16 reserved; |
| u32 doorbell_data; |
| u32 sem_cmd0; |
| u32 sem_cmd1; |
| u32 sem_cmd2; |
| u32 sem_cmd3; |
| }; |
| |
| Request field descriptions: |
| |
| req_id |
| request ID. A request FIFO element and a response FIFO element with |
| the same request ID refer to the same command. |
| |
| seq_id |
| sequence ID within a request. Ignored by the DMA Bridge. |
| |
| pcie_dma_cmd |
| describes the DMA element of this request. |
| |
| * Bit(7) is the force msi flag, which overrides the DMA Bridge MSI logic |
| and generates a MSI when this request is complete, and QSM |
| configures the DMA Bridge to look at this bit. |
| * Bits(6:5) are reserved. |
| * Bit(4) is the completion code flag, and indicates that the DMA Bridge |
| shall generate a response FIFO element when this request is |
| complete. |
| * Bit(3) indicates if this request is a linked list transfer(0) or a bulk |
| transfer(1). |
| * Bit(2) is reserved. |
| * Bits(1:0) indicate the type of transfer. No transfer(0), to device(1), |
| from device(2). Value 3 is illegal. |
| |
| pcie_dma_source_addr |
| source address for a bulk transfer, or the address of the linked list. |
| |
| pcie_dma_dest_addr |
| destination address for a bulk transfer. |
| |
| pcie_dma_len |
| length of the bulk transfer. Note that the size of this field |
| limits transfers to 4G in size. |
| |
| doorbell_addr |
| address of the doorbell to ring when this request is complete. |
| |
| doorbell_attr |
| doorbell attributes. |
| |
| * Bit(7) indicates if a write to a doorbell is to occur. |
| * Bits(6:2) are reserved. |
| * Bits(1:0) contain the encoding of the doorbell length. 0 is 32-bit, |
| 1 is 16-bit, 2 is 8-bit, 3 is reserved. The doorbell address |
| must be naturally aligned to the specified length. |
| |
| doorbell_data |
| data to write to the doorbell. Only the bits corresponding to |
| the doorbell length are valid. |
| |
| sem_cmdN |
| semaphore command. |
| |
| * Bit(31) indicates this semaphore command is enabled. |
| * Bit(30) is the to-device DMA fence. Block this request until all |
| to-device DMA transfers are complete. |
| * Bit(29) is the from-device DMA fence. Block this request until all |
| from-device DMA transfers are complete. |
| * Bits(28:27) are reserved. |
| * Bits(26:24) are the semaphore command. 0 is NOP. 1 is init with the |
| specified value. 2 is increment. 3 is decrement. 4 is wait |
| until the semaphore is equal to the specified value. 5 is wait |
| until the semaphore is greater or equal to the specified value. |
| 6 is "P", wait until semaphore is greater than 0, then |
| decrement by 1. 7 is reserved. |
| * Bit(23) is reserved. |
| * Bit(22) is the semaphore sync. 0 is post sync, which means that the |
| semaphore operation is done after the DMA transfer. 1 is |
| presync, which gates the DMA transfer. Only one presync is |
| allowed per request. |
| * Bit(21) is reserved. |
| * Bits(20:16) is the index of the semaphore to operate on. |
| * Bits(15:12) are reserved. |
| * Bits(11:0) are the semaphore value to use in operations. |
| |
| Overall, a request is processed in 4 steps: |
| |
| 1. If specified, the presync semaphore condition must be true |
| 2. If enabled, the DMA transfer occurs |
| 3. If specified, the postsync semaphore conditions must be true |
| 4. If enabled, the doorbell is written |
| |
| By using the semaphores in conjunction with the workload running on the NSPs, |
| the data pipeline can be synchronized such that the host can queue multiple |
| requests of data for the workload to process, but the DMA Bridge will only copy |
| the data into the memory of the workload when the workload is ready to process |
| the next input. |
| |
| Response FIFO |
| ------------- |
| |
| Once a request is fully processed, a response FIFO element is generated if |
| specified in pcie_dma_cmd. The structure of a response FIFO element: |
| |
| .. code-block:: c |
| |
| struct response_elem { |
| u16 req_id; |
| u16 completion_code; |
| }; |
| |
| req_id |
| matches the req_id of the request that generated this element. |
| |
| completion_code |
| status of this request. 0 is success. Non-zero is an error. |
| |
| The DMA Bridge will generate a MSI to the host as a reaction to activity in the |
| response FIFO of a DBC. The DMA Bridge hardware has an IRQ storm mitigation |
| algorithm, where it will only generate a MSI when the response FIFO transitions |
| from empty to non-empty (unless force MSI is enabled and triggered). In |
| response to this MSI, the host is expected to drain the response FIFO, and must |
| take care to handle any race conditions between draining the FIFO, and the |
| device inserting elements into the FIFO. |
| |
| Neural Network Control (NNC) Protocol |
| ===================================== |
| |
| The NNC protocol is how the host makes requests to the QSM to manage workloads. |
| It uses the QAIC_CONTROL MHI channel. |
| |
| Each NNC request is packaged into a message. Each message is a series of |
| transactions. A passthrough type transaction can contain elements known as |
| commands. |
| |
| QSM requires NNC messages be little endian encoded and the fields be naturally |
| aligned. Since there are 64-bit elements in some NNC messages, 64-bit alignment |
| must be maintained. |
| |
| A message contains a header and then a series of transactions. A message may be |
| at most 4K in size from QSM to the host. From the host to the QSM, a message |
| can be at most 64K (maximum size of a single MHI packet), but there is a |
| continuation feature where message N+1 can be marked as a continuation of |
| message N. This is used for exceedingly large DMA xfer transactions. |
| |
| Transaction descriptions |
| ------------------------ |
| |
| passthrough |
| Allows userspace to send an opaque payload directly to the QSM. |
| This is used for NNC commands. Userspace is responsible for managing |
| the QSM message requirements in the payload. |
| |
| dma_xfer |
| DMA transfer. Describes an object that the QSM should DMA into the |
| device via address and size tuples. |
| |
| activate |
| Activate a workload onto NSPs. The host must provide memory to be |
| used by the DBC. |
| |
| deactivate |
| Deactivate an active workload and return the NSPs to idle. |
| |
| status |
| Query the QSM about it's NNC implementation. Returns the NNC version, |
| and if CRC is used. |
| |
| terminate |
| Release a user's resources. |
| |
| dma_xfer_cont |
| Continuation of a previous DMA transfer. If a DMA transfer |
| cannot be specified in a single message (highly fragmented), this |
| transaction can be used to specify more ranges. |
| |
| validate_partition |
| Query to QSM to determine if a partition identifier is valid. |
| |
| Each message is tagged with a user id, and a partition id. The user id allows |
| QSM to track resources, and release them when the user goes away (eg the process |
| crashes). A partition id identifies the resource partition that QSM manages, |
| which this message applies to. |
| |
| Messages may have CRCs. Messages should have CRCs applied until the QSM |
| reports via the status transaction that CRCs are not needed. The QSM on the |
| SA9000P requires CRCs for black channel safing. |
| |
| Subsystem Restart (SSR) |
| ======================= |
| |
| SSR is the concept of limiting the impact of an error. An AIC100 device may |
| have multiple users, each with their own workload running. If the workload of |
| one user crashes, the fallout of that should be limited to that workload and not |
| impact other workloads. SSR accomplishes this. |
| |
| If a particular workload crashes, QSM notifies the host via the QAIC_SSR MHI |
| channel. This notification identifies the workload by it's assigned DBC. A |
| multi-stage recovery process is then used to cleanup both sides, and get the |
| DBC/NSPs into a working state. |
| |
| When SSR occurs, any state in the workload is lost. Any inputs that were in |
| process, or queued by not yet serviced, are lost. The loaded artifacts will |
| remain in on-card DDR, but the host will need to re-activate the workload if |
| it desires to recover the workload. |
| |
| Reliability, Accessibility, Serviceability (RAS) |
| ================================================ |
| |
| AIC100 is expected to be deployed in server systems where RAS ideology is |
| applied. Simply put, RAS is the concept of detecting, classifying, and |
| reporting errors. While PCIe has AER (Advanced Error Reporting) which factors |
| into RAS, AER does not allow for a device to report details about internal |
| errors. Therefore, AIC100 implements a custom RAS mechanism. When a RAS event |
| occurs, QSM will report the event with appropriate details via the QAIC_STATUS |
| MHI channel. A sysadmin may determine that a particular device needs |
| additional service based on RAS reports. |
| |
| Telemetry |
| ========= |
| |
| QSM has the ability to report various physical attributes of the device, and in |
| some cases, to allow the host to control them. Examples include thermal limits, |
| thermal readings, and power readings. These items are communicated via the |
| QAIC_TELEMETRY MHI channel. |