RE: Implement svm without BO concept in xe driver

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> -----Original Message-----
> From: dri-devel <dri-devel-bounces@xxxxxxxxxxxxxxxxxxxxx> On Behalf Of Dave
> Airlie
> Sent: August 20, 2023 6:21 PM
> To: Zeng, Oak <oak.zeng@xxxxxxxxx>
> Cc: Brost, Matthew <matthew.brost@xxxxxxxxx>; Thomas Hellström
> <thomas.hellstrom@xxxxxxxxxxxxxxx>; Philip Yang <Philip.Yang@xxxxxxx>; Felix
> Kuehling <felix.kuehling@xxxxxxx>; Welty, Brian <brian.welty@xxxxxxxxx>; dri-
> devel@xxxxxxxxxxxxxxxxxxxxx; intel-xe@xxxxxxxxxxxxxxxxxxxxx; Vishwanathapura,
> Niranjana <niranjana.vishwanathapura@xxxxxxxxx>; Christian König
> <christian.koenig@xxxxxxx>
> Subject: Re: Implement svm without BO concept in xe driver
> 
> On Thu, 17 Aug 2023 at 12:13, Zeng, Oak <oak.zeng@xxxxxxxxx> wrote:
> >
> > > -----Original Message-----
> > > From: Dave Airlie <airlied@xxxxxxxxx>
> > > Sent: August 16, 2023 6:52 PM
> > > To: Felix Kuehling <felix.kuehling@xxxxxxx>
> > > Cc: Zeng, Oak <oak.zeng@xxxxxxxxx>; Christian König
> > > <christian.koenig@xxxxxxx>; Thomas Hellström
> > > <thomas.hellstrom@xxxxxxxxxxxxxxx>; Brost, Matthew
> > > <matthew.brost@xxxxxxxxx>; maarten.lankhorst@xxxxxxxxxxxxxxx;
> > > Vishwanathapura, Niranjana <niranjana.vishwanathapura@xxxxxxxxx>; Welty,
> > > Brian <brian.welty@xxxxxxxxx>; Philip Yang <Philip.Yang@xxxxxxx>; intel-
> > > xe@xxxxxxxxxxxxxxxxxxxxx; dri-devel@xxxxxxxxxxxxxxxxxxxxx
> > > Subject: Re: Implement svm without BO concept in xe driver
> > >
> > > On Thu, 17 Aug 2023 at 08:15, Felix Kuehling <felix.kuehling@xxxxxxx>
> wrote:
> > > >
> > > > On 2023-08-16 13:30, Zeng, Oak wrote:
> > > > > I spoke with Thomas. We discussed two approaches:
> > > > >
> > > > > 1) make ttm_resource a central place for vram management functions
> such as
> > > eviction, cgroup memory accounting. Both the BO-based driver and BO-less
> SVM
> > > codes call into ttm_resource_alloc/free functions for vram allocation/free.
> > > > >      *This way BO driver and SVM driver shares the eviction/cgroup logic, no
> > > need to reimplment LRU eviction list in SVM driver. Cgroup logic should be in
> > > ttm_resource layer. +Maarten.
> > > > >      *ttm_resource is not a perfect match for SVM to allocate vram. It is still
> a
> > > big overhead. The *bo* member of ttm_resource is not needed for SVM -
> this
> > > might end up with invasive changes to ttm...need to look into more details
> > > >
> > > > Overhead is a problem. We'd want to be able to allocate, free and evict
> > > > memory at a similar granularity as our preferred migration and page
> > > > fault granularity, which defaults to 2MB in our SVM implementation.
> > > >
> > > >
> > > > >
> > > > > 2) svm code allocate memory directly from drm-buddy allocator, and
> expose
> > > memory eviction functions from both ttm and svm so they can evict memory
> > > from each other. For example, expose the ttm_mem_evict_first function
> from
> > > ttm side so hmm/svm code can call it; expose a similar function from svm side
> so
> > > ttm can evict hmm memory.
> > > >
> > > > I like this option. One thing that needs some thought with this is how
> > > > to get some semblance of fairness between the two types of clients.
> > > > Basically how to choose what to evict. And what share of the available
> > > > memory does each side get to use on average. E.g. an idle client may get
> > > > all its memory evicted while a busy client may get a bigger share of the
> > > > available memory.
> > >
> > > I'd also like to suggest we try to write any management/generic code
> > > in driver agnostic way as much as possible here. I don't really see
> > > much hw difference should be influencing it.
> > >
> > > I do worry about having effectively 2 LRUs here, you can't really have
> > > two "leasts".
> > >
> > > Like if we hit the shrinker paths who goes first? do we shrink one
> > > object from each side in turn?
> >
> > One way to solve this fairness problem is to create a driver agnostic
> drm_vram_mgr. Maintain a single LRU in drm_vram_mgr. Move the memory
> eviction/cgroups memory accounting logic from ttm_resource manager to
> drm_vram_mgr. Both BO-based driver and SVM driver calls to drm_vram_mgr to
> allocate/free memory.
> >
> > I am not sure whether this meets the 2M allocate/free/evict granularity
> requirement Felix mentioned above. SVM can allocate 2M size blocks. But BO
> driver should be able to allocate any arbitrary sized blocks - So the eviction is also
> arbitrary size.
> >
> > >
> > > Also will we have systems where we can expose system SVM but userspace
> > > may choose to not use the fine grained SVM and use one of the older
> > > modes, will that path get emulated on top of SVM or use the BO paths?
> >
> >
> > If by "older modes" you meant the gem_bo_create (such as xe_gem_create or
> amdgpu_gem_create), then today both amd and intel implement those
> interfaces using BO path. We don't have a plan to emulate that old mode on tope
> of SVM, afaict.
> 
> I'm not sure how the older modes manifest in the kernel I assume as bo
> creates (but they may use userptr), SVM isn't a specific thing, it's a
> group of 3 things.
> 
> 1) coarse-grained SVM which I think is BO
> 2) fine-grained SVM which is page level
> 3) fine-grained system SVM which is HMM
> 
> I suppose I'm asking about the previous versions and how they would
> operate in a system SVM capable system.

I got your question now. 

As I understand it, the system SVM provides similar functionality as BO-based SVM (i.e., share virtual address space b/t cpu and gpu program, no explicit memory placement for gpu program), but they have different user interface (malloc, mmap vs bo create, vm bind).

>From functionality perspective, on a system SVM capable system, we don't need #1/#2. Once #3 is implemented and turned out be as performant as #1/#2, we can ask user space to switch to #3.

As far as I know, AMD doesn't have #1/#2 - their BO-based driver *requires* all valid GPU virtual address be mapped to GPU page table *before* GPU kernel submission, aka a GPU page fault is treated as fatal. Felix please fix me, as my AMD knowledge is fading away...

>From interface perspective, i.e., to keep UMD which using #1/#2 continue to run without modification, we need #1/#2 to continue exist.

Should we emulate #1/#2 on top of #3? I feel the BO-based memory management and the struct page/hmm based memory management are quite different design philosophy. Trying to emulate one on top of another can run into serious difficulty. For example, how do we emulate a vm_bind on top of #3? Remember for #1/#2 virtual address space is managed by user space while #3 virtual address space is managed by kernel core mm (vma struct...). It is a hard conflict here...

Thanks again for the great question!
Oak 

> 
> Dave.
> >
> > Thanks,
> > Oak
> >
> > >
> > > Dave.




[Index of Archives]     [Linux DRI Users]     [Linux Intel Graphics]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [XFree86]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux