On Fri, Jun 19, 2020 at 3:12 PM Chris Wilson <chris@xxxxxxxxxxxxxxxxxx> wrote: > > Quoting Daniel Vetter (2020-06-19 10:43:09) > > On Fri, Jun 19, 2020 at 10:13:35AM +0100, Chris Wilson wrote: > > > Quoting Daniel Vetter (2020-06-19 09:51:59) > > > > On Fri, Jun 19, 2020 at 10:25 AM Chris Wilson <chris@xxxxxxxxxxxxxxxxxx> wrote: > > > > > Forcing a generic primitive to always be part of the same global map is > > > > > horrible. > > > > > > > > And no concrete example or reason for why that's not possible. > > > > Because frankly it's not horrible, this is what upstream is all about: > > > > Shared concepts, shared contracts, shared code. > > > > > > > > The proposed patches might very well encode the wrong contract, that's > > > > all up for discussion. But fundamentally questioning that we need one > > > > is missing what upstream is all about. > > > > > > Then I have not clearly communicated, as my opinion is not that > > > validation is worthless, but that the implementation is enshrining a > > > global property on a low level primitive that prevents it from being > > > used elsewhere. And I want to replace completion [chains] with fences, and > > > bio with fences, and closures with fences, and what other equivalencies > > > there are in the kernel. The fence is as central a locking construct as > > > struct completion and deserves to be a foundational primitive provided > > > by kernel/ used throughout all drivers for discrete problem domains. > > > > > > This is narrowing dma_fence whereby adding > > > struct lockdep_map *dma_fence::wait_map > > > and annotating linkage, allows you to continue to specify that all > > > dma_fence used for a particular purpose must follow common rules, > > > without restricting the primitive for uses outside of this scope. > > > > Somewhere else in this thread I had discussions with Jason Gunthorpe about > > this topic. It might maybe change somewhat depending upon exact rules, but > > his take is very much "I don't want dma_fence in rdma". Or pretty close to > > that at least. > > > > Similar discussions with habanalabs, they're using dma_fence internally > > without any of the uapi. Discussion there has also now concluded that it's > > best if they remove them, and simply switch over to a wait_queue or > > completion like every other driver does. > > > > The next round of the patches already have a paragraph to at least > > somewhat limit how non-gpu drivers use dma_fence. And I guess actual > > consensus might be pointing even more strongly at dma_fence being solely > > something for gpus and closely related subsystem (maybe media) for syncing > > dma-buf access. > > > > So dma_fence as general replacement for completion chains I think just > > wont happen. > > That is sad. I cannot comprehend going back to pure completions after a > taste of fence scheduling. And we are not even close to fully utilising > them, as not all the async cpu [allocation!] tasks are fully tracked by > fences yet and are still stuck in a FIFO workqueue. > > > What might make sense is if e.g. the lockdep annotations could be reused, > > at least in design, for wait_queue or completion or anything else > > really. I do think that has a fair chance compared to the automagic > > cross-release annotations approach, which relied way too heavily on > > guessing where barriers are. My experience from just a bit of playing > > around with these patches here and discussing them with other driver > > maintainers is that accurately deciding where critical sections start and > > end is a job for humans only. And if you get it wrong, you will have a > > false positive. > > > > And you're indeed correct that if we'd do annotations for completions and > > wait queues, then that would need to have a class per semantically > > equivalent user, like we have lockdep classes for mutexes, not just one > > overall. > > > > But dma_fence otoh is something very specific, which comes with very > > specific rules attached - it's not a generic wait_queue at all. Originally > > it did start out as one even, but it is a very specialized wait_queue. > > > > So there's imo two cases: > > > > - Your completion is entirely orthogonal of dma_fences, and can never ever > > block a dma_fence. Don't use dma_fence for this, and no problem. It's > > just another wait_queue somewhere. > > > > - Your completion can eventually, maybe through lots of convolutions and > > depdencies, block a dma_fence. In that case full dma_fence rules apply, > > and the only thing you can do with a custom annotation is make the rules > > even stricter. E.g. if a sub-timeline in the scheduler isn't allowed to > > take certain scheduler locks. But the userspace visible/published fence > > do take them, maybe as part of command submission or retirement. > > Entirely hypotethical, no idea any driver actually needs this. > > I think we are faced with this very real problem. > > The papering we have today over userptr is so very thin, and if you > squint you can already see it is coupled into the completion signal. Just > it happens to be on the other side of the fence. > > The next batch of priority inversions involve integrating the async cpu > tasks into the scheduler, and have full dependency tracking over every > internal fence. I do not see any way to avoid coupling the completion > signal from the GPU to the earliest resource allocation, as it's an > unbroken chain of work, at least from the user's perspective. [Next up > for annotations is that we need to always assume that userspace has an > implicit lock on GPU resources; having to break that lock with a GPU > reset should be a breach of our data integrity, and best avoided, for > compute does not care one iota about system integrity and insist > userspace knows best.] Such allocations have to be allowed to fail and > for that failure to propagate cancelling the queued work, such that I'm > considering what rules we need for gfp_t. That might allow enough > leverage to break any fs_reclaim loops, but userptr is likely forever > doomed [aside from its fs_reclaim loop is as preventable as the normal > shrinker paths], but we still need to suggest to pin_user_pages that > failure is better than oom and that is not clear atm. Plus the usual > failure can happen at any time after updating the user facing > bookkeeping, but that is just extra layers in the execution monitor > ready to step in and replacing failing work with the error propagation. > Or where the system grinds to a halt, requiring the monitor to patch in > a new page / resource. Zooming out a bunch, since this is a lot about the details of making this happen, and I want to make sure I'm understanding your aim correctly. I think we have 2 big things here interacting: On one side the "everything async" push, for some value of everything. Once everything is async we let either the linux scheduler (for dma_fence_work) or the gpu scheduler (for i915_request) figure out how to order everything, with all the dependencies. For memory allocations there's likely quite a bit of retrying (on the allocation side) and skipping (on the shrinker/mmu notifier side) involved to make this all pan out. Maybe something like a GFP_NOGPU flag. On the other side we have opinionated userspace with both very long-running batches (they might as well be infinite, best we can do is check that they still preempt within a reasonable amount of time, lack of hw support for preemption in all cases notwithstanding). And batches which synchronize across engines and whatever entirely under userspace controls, with stuff like gpu semaphore waits entirely in the cmd stream, without any kernel or gpu scheduler involvement. Well maybe a slightly smarter gpu scheduler which converts the semaphore wait from a pure busy loop into a "repoll on each scheduler timeslice". But not actual dependency tracking awareness in the kernel (or guc/hw fwiw) of what userspace is really trying to do. Later is a big motivator for the former, since with arbitrary long batches and arbitrary fences any wait for a batch to complete can take forever, hence anything that might end up doing that needs to be done async and without locks. That way we don't have to shoot anything if a batch takes too long. Finally if anything goes wrong (on the kernel side at least) we just propagete fence error state through the entire ladder of in-flight things (only if it goes wrong terminally ofc). Roughly correct or did I miss a big (or small but really important) thing? Thanks, Daniel -- Daniel Vetter Software Engineer, Intel Corporation http://blog.ffwll.ch