Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp5490420ybl; Tue, 14 Jan 2020 09:47:02 -0800 (PST) X-Google-Smtp-Source: APXvYqywbKtA/b1grUeBFReqcS9pI4j+BoWIKRgkWKxqHRFdEkEh0B1Ti/DRu7w8+2Nmiu1GGJhI X-Received: by 2002:a9d:f26:: with SMTP id 35mr18846027ott.260.1579024022663; Tue, 14 Jan 2020 09:47:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579024022; cv=none; d=google.com; s=arc-20160816; b=wvNT0QXQ1xqugC3xB6KvjGmS3e+xzCpCvQ7D58ce9nI6eRvEyIBrfURi2D7oJjOrCQ h04aSvEiWkORaDMunp8gXiX7YC9DSBM5W5vxO5GgsrTOTPfgiicA0zdiPcFrnqOiQora Akfm79H185d8jpI98AV/6thEZC2Vpk/DXQWew0trJVCdP5CFZJgQSanBuKEpz/iETPo0 r5K8+b2FBmJtp9IPRMQ1tXIpB5BRMzCeTU3MMkKvexoRKH3wdRpUIe8uQAbDt5Qu2+x/ n9Em95rGV9F63uEnjqjK+IpgP1s8Vns418ObeSNB0RFXrVhGwRBDejiztGkST2AONNLL zfOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=IEReIqiV9DqHXynuZUoOdv3vrFwkK9mEmA9xvO2qdVM=; b=S26Tv0g0A2mgPsAASBDbbc2FV7hme17qB9xWLQnpv3adI6yRsmV1swqNcWqEJfOOrE bhwi0af+qkpYVWnUZ2nf0pcvTEnc+xbZkICLWDtvIg4vvxvLrG3uSTw6ZnMgn2176l+h AxD/mn9d+UR+cWqFBpOvWLvSneGht+qIY9rXxL9Y8a+91XdE5mf0ZGzVrChguGVbZCAr 7mkGxhdz1xrSl9JtQMX11U4LCGIQsaL3Z2ao9AnZr2h8NBfW+Aw8WzIdMXSlOLChGH94 HtNenBjc7TxM2Hk5cTYic2MzVZgCT5irlLe0J1QzmLti5ls/9QyXPJmuXzdRCWpbEut6 U0Gg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@brkho-com.20150623.gappssmtp.com header.s=20150623 header.b=SQ1M75nB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w5si9117831otq.238.2020.01.14.09.46.51; Tue, 14 Jan 2020 09:47:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@brkho-com.20150623.gappssmtp.com header.s=20150623 header.b=SQ1M75nB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728819AbgANRpk (ORCPT + 99 others); Tue, 14 Jan 2020 12:45:40 -0500 Received: from mail-vk1-f226.google.com ([209.85.221.226]:41666 "EHLO mail-vk1-f226.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726491AbgANRpk (ORCPT ); Tue, 14 Jan 2020 12:45:40 -0500 Received: by mail-vk1-f226.google.com with SMTP id p191so3871833vkf.8 for ; Tue, 14 Jan 2020 09:45:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=brkho-com.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=IEReIqiV9DqHXynuZUoOdv3vrFwkK9mEmA9xvO2qdVM=; b=SQ1M75nBLkNeAmQ+001qHsQS9SIbcVKCV9HenJqQp3MKVoZzELHJnxWUapFur3RI+L rq6nLNQi7kwMMdJao1IyDmEjsL7v9A66vyDeTc8u2bTK1IwiJzxr0NYVwRQ0jJkCTqdf 5fNIludEQ3n0pwvnFcOscpzezyNSFqDWmsZYabCFYKpPOjDGrI1VYkNbYcLOTXgbpr37 Qjchmk7WHVgMIuy5Ur4J9LtxDlaTQJrsyaomrpalW4Rw4gHSg4rtjCrDnUDReCZn1Ugr qZ30vZL/BcznnOeHZ2MdPbYpJ+uXxe7nRMtLI2bkf/6Hq+Xq3eaCnswrUncykQ817bRg lJvA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=IEReIqiV9DqHXynuZUoOdv3vrFwkK9mEmA9xvO2qdVM=; b=eMZpmODcb4A5UnDePfTXBQrGpXIU7GxXkosNn3sxfCXy1KLtKyy3jdYRMqa240NgDE KHurQxPeJdpwKGcZ7y7dsqckE+WaS2WYghKTP3TC6Z/e+ZgJbDr0k/D6TmfbYKJ5KDaU BmE1E+P/dz5W+86lcteEqFe8czUQ0M851J5jk4YBaqe5gvYleyxqGbqU1Chg954NLUn7 /JmvZaLqnT8W7O6d5Dnpq8q7g0DDiX75znEwZ0967rWfpaEekaV73uAthewpKeUHRyxA 6XhVv0R1Gl704eBTpWk3eYjDr1wl4feXX4zEGouE8QQ14i/akr+iW6PGjL6oO3i7fMSr Qrpg== X-Gm-Message-State: APjAAAWE5tzoXNzf1r4bSIW2DAH6x3G00IbJjNI2tMtcBBkT/ZvhX724 YQovP1N4wXdJblv/OLA/GFAxksl3cYpI5lhZ9eBc5weGB2K/4g== X-Received: by 2002:a05:6122:332:: with SMTP id d18mr11769867vko.89.1579023939106; Tue, 14 Jan 2020 09:45:39 -0800 (PST) Received: from google.com ([100.118.32.120]) by smtp-relay.gmail.com with ESMTPS id f205sm1505678vka.0.2020.01.14.09.45.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 14 Jan 2020 09:45:39 -0800 (PST) X-Relaying-Domain: brkho.com Date: Tue, 14 Jan 2020 12:45:22 -0500 From: Brian Ho To: Rob Clark Cc: Kristian Kristensen , freedreno , hoegsberg , Rob Clark , Sean Paul , David Airlie , Daniel Vetter , "open list:DRM DRIVER FOR MSM ADRENO GPU" , "open list:DRM DRIVER FOR MSM ADRENO GPU" , open list Subject: Re: [PATCH 2/2] drm/msm: Add MSM_WAIT_IOVA ioctl Message-ID: <20200114174521.GA239970@google.com> References: <20200113153605.52350-1-brian@brkho.com> <20200113153605.52350-3-brian@brkho.com> <20200113225516.GA157345@google.com> <20200114164034.GA213224@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 14, 2020 at 08:48:48AM -0800, Rob Clark wrote: > On Tue, Jan 14, 2020 at 8:40 AM Brian Ho wrote: > > > > On Mon, Jan 13, 2020 at 03:17:38PM -0800, Rob Clark wrote: > > > On Mon, Jan 13, 2020 at 2:55 PM Brian Ho wrote: > > > > > > > > On Mon, Jan 13, 2020 at 09:57:43AM -0800, Kristian Kristensen wrote: > > > > > On Mon, Jan 13, 2020 at 8:25 AM Rob Clark wrote: > > > > > > > > > > > On Mon, Jan 13, 2020 at 7:37 AM Brian Ho wrote: > > > > > > > > > > > > > > Implements an ioctl to wait until a value at a given iova is greater > > > > > > > than or equal to a supplied value. > > > > > > > > > > > > > > This will initially be used by turnip (open-source Vulkan driver for > > > > > > > QC in mesa) for occlusion queries where the userspace driver can > > > > > > > block on a query becoming available before continuing via > > > > > > > vkGetQueryPoolResults. > > > > > > > > > > > > > > Signed-off-by: Brian Ho > > > > > > > --- > > > > > > > drivers/gpu/drm/msm/msm_drv.c | 63 +++++++++++++++++++++++++++++++++-- > > > > > > > include/uapi/drm/msm_drm.h | 13 ++++++++ > > > > > > > 2 files changed, 74 insertions(+), 2 deletions(-) > > > > > > > > > > > > > > diff --git a/drivers/gpu/drm/msm/msm_drv.c > > > > > > b/drivers/gpu/drm/msm/msm_drv.c > > > > > > > index c84f0a8b3f2c..dcc46874a5a2 100644 > > > > > > > --- a/drivers/gpu/drm/msm/msm_drv.c > > > > > > > +++ b/drivers/gpu/drm/msm/msm_drv.c > > > > > > > @@ -36,10 +36,11 @@ > > > > > > > * MSM_GEM_INFO ioctl. > > > > > > > * - 1.4.0 - softpin, MSM_RELOC_BO_DUMP, and GEM_INFO support to set/get > > > > > > > * GEM object's debug name > > > > > > > - * - 1.5.0 - Add SUBMITQUERY_QUERY ioctl > > > > > > > + * - 1.5.0 - Add SUBMITQUEUE_QUERY ioctl > > > > > > > + * - 1.6.0 - Add WAIT_IOVA ioctl > > > > > > > */ > > > > > > > #define MSM_VERSION_MAJOR 1 > > > > > > > -#define MSM_VERSION_MINOR 5 > > > > > > > +#define MSM_VERSION_MINOR 6 > > > > > > > #define MSM_VERSION_PATCHLEVEL 0 > > > > > > > > > > > > > > static const struct drm_mode_config_funcs mode_config_funcs = { > > > > > > > @@ -952,6 +953,63 @@ static int msm_ioctl_submitqueue_close(struct > > > > > > drm_device *dev, void *data, > > > > > > > return msm_submitqueue_remove(file->driver_priv, id); > > > > > > > } > > > > > > > > > > > > > > +static int msm_ioctl_wait_iova(struct drm_device *dev, void *data, > > > > > > > + struct drm_file *file) > > > > > > > +{ > > > > > > > + struct msm_drm_private *priv = dev->dev_private; > > > > > > > + struct drm_gem_object *obj; > > > > > > > + struct drm_msm_wait_iova *args = data; > > > > > > > + ktime_t timeout = to_ktime(args->timeout); > > > > > > > + unsigned long remaining_jiffies = timeout_to_jiffies(&timeout); > > > > > > > + struct msm_gpu *gpu = priv->gpu; > > > > > > > + void *base_vaddr; > > > > > > > + uint64_t *vaddr; > > > > > > > + int ret; > > > > > > > + > > > > > > > + if (args->pad) > > > > > > > + return -EINVAL; > > > > > > > + > > > > > > > + if (!gpu) > > > > > > > + return 0; > > > > > > > > > > > > hmm, I'm not sure we should return zero in this case.. maybe -ENODEV? > > > > > > > > > > > > > + > > > > > > > + obj = drm_gem_object_lookup(file, args->handle); > > > > > > > + if (!obj) > > > > > > > + return -ENOENT; > > > > > > > + > > > > > > > + base_vaddr = msm_gem_get_vaddr(obj); > > > > > > > + if (IS_ERR(base_vaddr)) { > > > > > > > + ret = PTR_ERR(base_vaddr); > > > > > > > + goto err_put_gem_object; > > > > > > > + } > > > > > > > + if (args->offset + sizeof(*vaddr) > obj->size) { > > > > > > > + ret = -EINVAL; > > > > > > > + goto err_put_vaddr; > > > > > > > + } > > > > > > > + > > > > > > > + vaddr = base_vaddr + args->offset; > > > > > > > + > > > > > > > + /* Assumes WC mapping */ > > > > > > > + ret = wait_event_interruptible_timeout( > > > > > > > + gpu->event, *vaddr >= args->value, > > > > > > remaining_jiffies); > > > > > > > > > > > > > > > > This needs to do the awkward looking > > > > > > > > > > (int64_t)(*data - value) >= 0 > > > > > > > > > > to properly handle the wraparound case. > > > > > > > > > > > > > I think this comparison will run into issues if we allow for 64-bit > > > > reference values. For example, if value is ULLONG_MAX, and *data > > > > starts at 0 on the first comparison, we'll immediately return. > > > > > > > > It's not too much of an issue in fence_completed (msm_fence.c), but > > > > in this ioctl, *data can grow at an arbitrary rate. Are we concerned > > > > about this? > > > > > > > > > > + > > > > > > > + if (ret == 0) { > > > > > > > + ret = -ETIMEDOUT; > > > > > > > + goto err_put_vaddr; > > > > > > > + } else if (ret == -ERESTARTSYS) { > > > > > > > + goto err_put_vaddr; > > > > > > > + } > > > > > > > > > > > > maybe: > > > > > > > > > > > > } else { > > > > > > ret = 0; > > > > > > } > > > > > > > > > > > > and then drop the next three lines? > > > > > > > > > > > > > + > > > > > > > + msm_gem_put_vaddr(obj); > > > > > > > + drm_gem_object_put_unlocked(obj); > > > > > > > + return 0; > > > > > > > + > > > > > > > +err_put_vaddr: > > > > > > > + msm_gem_put_vaddr(obj); > > > > > > > +err_put_gem_object: > > > > > > > + drm_gem_object_put_unlocked(obj); > > > > > > > + return ret; > > > > > > > +} > > > > > > > + > > > > > > > static const struct drm_ioctl_desc msm_ioctls[] = { > > > > > > > DRM_IOCTL_DEF_DRV(MSM_GET_PARAM, msm_ioctl_get_param, > > > > > > DRM_RENDER_ALLOW), > > > > > > > DRM_IOCTL_DEF_DRV(MSM_GEM_NEW, msm_ioctl_gem_new, > > > > > > DRM_RENDER_ALLOW), > > > > > > > @@ -964,6 +1022,7 @@ static const struct drm_ioctl_desc msm_ioctls[] = { > > > > > > > DRM_IOCTL_DEF_DRV(MSM_SUBMITQUEUE_NEW, > > > > > > msm_ioctl_submitqueue_new, DRM_RENDER_ALLOW), > > > > > > > DRM_IOCTL_DEF_DRV(MSM_SUBMITQUEUE_CLOSE, > > > > > > msm_ioctl_submitqueue_close, DRM_RENDER_ALLOW), > > > > > > > DRM_IOCTL_DEF_DRV(MSM_SUBMITQUEUE_QUERY, > > > > > > msm_ioctl_submitqueue_query, DRM_RENDER_ALLOW), > > > > > > > + DRM_IOCTL_DEF_DRV(MSM_WAIT_IOVA, msm_ioctl_wait_iova, > > > > > > DRM_RENDER_ALLOW), > > > > > > > }; > > > > > > > > > > > > > > static const struct vm_operations_struct vm_ops = { > > > > > > > diff --git a/include/uapi/drm/msm_drm.h b/include/uapi/drm/msm_drm.h > > > > > > > index 0b85ed6a3710..8477f28a4ee1 100644 > > > > > > > --- a/include/uapi/drm/msm_drm.h > > > > > > > +++ b/include/uapi/drm/msm_drm.h > > > > > > > @@ -298,6 +298,17 @@ struct drm_msm_submitqueue_query { > > > > > > > __u32 pad; > > > > > > > }; > > > > > > > > > > > > > > +/* This ioctl blocks until the u64 value at bo + offset is greater than > > > > > > or > > > > > > > + * equal to the reference value. > > > > > > > + */ > > > > > > > +struct drm_msm_wait_iova { > > > > > > > + __u32 handle; /* in, GEM handle */ > > > > > > > + __u32 pad; > > > > > > > + struct drm_msm_timespec timeout; /* in */ > > > > > > > + __u64 offset; /* offset into bo */ > > > > > > > + __u64 value; /* reference value */ > > > > > > > > > > > > Maybe we should go ahead and add a __u64 mask; > > > > > > > > > > > > that would let us wait for 32b values as well, and wait for bits in a > > > > > > bitmask > > > > > > > > > > > > > > > > I think we'd be OK to just default to 32 bit values instead, since most of > > > > > the CP commands that this is intended to work with (CP_EVENT_WRITE, > > > > > CP_WAIT_MEM_GTE etc) operate on 32 bit values. We could move 'value' to the > > > > > slot right after 'handle' but then we'd not have any pad/reserved fields. > > > > > Maybe we keep 'value' 64 bit but restrict it to 32 bits, with an option to > > > > > add a 64 bit flag in 'pad' later on? > > > > > > > > > > > > > FWIW, the current usage of this in my mesa MR uses a 64 bit value. > > > > There's no super great reason that the available bit is 64 bits and > > > > not 32 bits (I think it made the addressing math a bit simpler), but > > > > I'm fine with whatever you all decide on here. > > > > > > > > > > I assume you are waiting for a fence value written w/ CP_EVENT_WRITE? > > > Or at least that is what I'd recommend. That would be 32b > > > > > > BR, > > > -R > > > > > > > So it's actually a little bit different than that. I allocate a bo > > for the occlusion query which has an "availability" bit (0 for > > unavailable, 1 for available). When the occlusion query ends, we > > write the fragments passed value to the bo via CP_EVENT_WRITE and > > then wait for that write to complete before setting the available > > bit to 1 via a simple CP_MEM_WRITE [1]. > > > > It's that CP_MEM_WRITE that I plan on waiting on with this new iova > > ioctl. > > > > [1] https://gitlab.freedesktop.org/mesa/mesa/blob/768106c50a5569796bb6d5e04b5e4d65c1d00ea0/src/freedreno/vulkan/tu_query.c#L529 > > > > hmm, interesting.. I had in mind something more like: > > https://gitlab.freedesktop.org/drm/msm/blob/msm-next/drivers/gpu/drm/msm/adreno/a6xx_gpu.c#L137 > > The high bit in the first dword of the packet (which we probably > shouldn't open-code) is the "give me an irq after the value in last > dword is written to memory".. > > (I haven't checked yet whether we can use the "gimme an irq" bit from userspace) > > BR, > -R I see. Let's continue discussing this on the mesa MR because there's more context there. Regardless of how we end up implementing vkCmdEndQuery, I think it will be safe to default to 32 bit values for this ioctl and have a flag to use 64 bit instead like Kristian suggested. If that sounds good to you, I'll go ahead and make the change for the v2 patch series.