Quoting Umesh Nerlige Ramappa (2020-07-14 21:10:02) > On Tue, Jul 14, 2020 at 12:28:15PM +0100, Chris Wilson wrote: > >Quoting Umesh Nerlige Ramappa (2020-07-14 08:22:39) > >> From: Piotr Maciejewski <piotr.maciejewski@xxxxxxxxx> > >> > >> i915 used to support time based sampling mode which is good for overall > >> system monitoring, but is not enough for query mode used to measure a > >> single draw call or dispatch. Gen9-Gen11 are using current i915 perf > >> implementation for query, but Gen12+ requires a new approach based on > >> triggered reports within oa buffer. In order to enable above feature > >> two changes are required: > >> > >> 1. Whitelist update: > >> - enable triggered reports within oa buffer > >> - reading oa buffer head/tail/status information > >> - reading gpu ticks counter. > >> > >> 2. Map oa buffer at umd driver level to solve below constraints related > >> to time based sampling interface: > >> - longer time to access reports collected by oa buffer > > > >If you aren't talking about a few 10us, then something else is wrong. > > > >> - slow oa reports browsing since oa buffer size is large > > > >Nothing changes on the surface. That does not sound like inherent > >inefficiencies. Since the same number of events will be generated and > >need to be processed. You may argue that they are easier to process in > >situ, and that the number of events dwarf L1 cache. An mmap interface > >could eliminate one copy (and certainly a copy-to-user). > > > >> - missing oa report index, so query cannot browse report directly > > > >There's more to it than that otherwise you would have proposed an > >extension to the event format. > > > >> - with direct access to oa buffer, query can extract other useful > >> reports like context switch information needed to calculate correct > >> performance counters values. > > > >Why would you not start with an unprivileged mediated mmapped buffer? > >If the goal is to reduce sample latency by replacing read ioctls with a > >mmap, that would seem to be an orthogonal step to exposing the raw OA > >buffer. The inference would be that you do want to extract extra details > >from the OA that are not being catered for. That's perfectly fine, our > >goal is to _safely_ expose HW and not get in the way of userspace. But > >if that was the intent, it should not appear to be an afterthought. > >[i.e. that mmap should be inherently faster for accessing a large ring > >of data is much less important than discussing the safety concerns of > >letting userspace have direct control/access of OA.] > > fwiu > > The goal is mainly being able to quickly view reports of interest within > a window in the OA buffer. The start and end of the window are defined > by triggered OA reports using the OAREPORTTRIG registers along with some > counters that act as markers (A18 - A20). Ok, that was not apparent from reading. Could you put that usecase to the front; aiui userspace can read/define a region of interest within the mmap that correspond to the oareporttrig. In particular describe how userspace either triggers or responds to the OA and finds the roi. [Psuedocode for the win.] That's useful to know why we need this, and some details into the how to flesh out the interface. > In initial implementation, the user was trying to maintain a copy of the > oa buffer that was being built by reading OA reports from the perf_fd > read interface. Using a new ioctl interface that returned HW TAIL, the > user would try to index into the window in this buffer. However, the > mapping was not 1:1 because perf_fd read would drop reports that are > zeroed out or invalid. Added to that, the user buffer was limited by > size. This made mapping things to an intermediate user buffer more messy > as it would require more information from the driver to do so. > > Hence, the decision was to map the OA buffer to umd provided (1) that it > is accessed from a privileged user and (2) OA report filtering is not > used. These 2 conditions would satisfy the safety criteria that the > perf_fd interface addresses. It is refreshing to keep the paranoid perf discussions to the front. We still need to think about whether any new method exposes more information that was previously available, and if that is safe even for a privileged user. It's just a matter of writing down the details and making sure we are happy we've hooked up the protections. And in the code, we want comments as to why. It's just a matter of recording the details for due diligence. And you never know, we might just uncover something horrid. -Chris _______________________________________________ Intel-gfx mailing list Intel-gfx@xxxxxxxxxxxxxxxxxxxxx https://lists.freedesktop.org/mailman/listinfo/intel-gfx