| ========================================== |
| I915 VM_BIND feature design and use cases |
| ========================================== |
| |
| VM_BIND feature |
| ================ |
| DRM_I915_GEM_VM_BIND/UNBIND ioctls allows UMD to bind/unbind GEM buffer |
| objects (BOs) or sections of a BOs at specified GPU virtual addresses on a |
| specified address space (VM). These mappings (also referred to as persistent |
| mappings) will be persistent across multiple GPU submissions (execbuf calls) |
| issued by the UMD, without user having to provide a list of all required |
| mappings during each submission (as required by older execbuf mode). |
| |
| The VM_BIND/UNBIND calls allow UMDs to request a timeline out fence for |
| signaling the completion of bind/unbind operation. |
| |
| VM_BIND feature is advertised to user via I915_PARAM_VM_BIND_VERSION. |
| User has to opt-in for VM_BIND mode of binding for an address space (VM) |
| during VM creation time via I915_VM_CREATE_FLAGS_USE_VM_BIND extension. |
| |
| VM_BIND/UNBIND ioctl calls executed on different CPU threads concurrently are |
| not ordered. Furthermore, parts of the VM_BIND/UNBIND operations can be done |
| asynchronously, when valid out fence is specified. |
| |
| VM_BIND features include: |
| |
| * Multiple Virtual Address (VA) mappings can map to the same physical pages |
| of an object (aliasing). |
| * VA mapping can map to a partial section of the BO (partial binding). |
| * Support capture of persistent mappings in the dump upon GPU error. |
| * Support for userptr gem objects (no special uapi is required for this). |
| |
| TLB flush consideration |
| ------------------------ |
| The i915 driver flushes the TLB for each submission and when an object's |
| pages are released. The VM_BIND/UNBIND operation will not do any additional |
| TLB flush. Any VM_BIND mapping added will be in the working set for subsequent |
| submissions on that VM and will not be in the working set for currently running |
| batches (which would require additional TLB flushes, which is not supported). |
| |
| Execbuf ioctl in VM_BIND mode |
| ------------------------------- |
| A VM in VM_BIND mode will not support older execbuf mode of binding. |
| The execbuf ioctl handling in VM_BIND mode differs significantly from the |
| older execbuf2 ioctl (See struct drm_i915_gem_execbuffer2). |
| Hence, a new execbuf3 ioctl has been added to support VM_BIND mode. (See |
| struct drm_i915_gem_execbuffer3). The execbuf3 ioctl will not accept any |
| execlist. Hence, no support for implicit sync. It is expected that the below |
| work will be able to support requirements of object dependency setting in all |
| use cases: |
| |
| "dma-buf: Add an API for exporting sync files" |
| (https://lwn.net/Articles/859290/) |
| |
| The new execbuf3 ioctl only works in VM_BIND mode and the VM_BIND mode only |
| works with execbuf3 ioctl for submission. All BOs mapped on that VM (through |
| VM_BIND call) at the time of execbuf3 call are deemed required for that |
| submission. |
| |
| The execbuf3 ioctl directly specifies the batch addresses instead of as |
| object handles as in execbuf2 ioctl. The execbuf3 ioctl will also not |
| support many of the older features like in/out/submit fences, fence array, |
| default gem context and many more (See struct drm_i915_gem_execbuffer3). |
| |
| In VM_BIND mode, VA allocation is completely managed by the user instead of |
| the i915 driver. Hence all VA assignment, eviction are not applicable in |
| VM_BIND mode. Also, for determining object activeness, VM_BIND mode will not |
| be using the i915_vma active reference tracking. It will instead use dma-resv |
| object for that (See `VM_BIND dma_resv usage`_). |
| |
| So, a lot of existing code supporting execbuf2 ioctl, like relocations, VA |
| evictions, vma lookup table, implicit sync, vma active reference tracking etc., |
| are not applicable for execbuf3 ioctl. Hence, all execbuf3 specific handling |
| should be in a separate file and only functionalities common to these ioctls |
| can be the shared code where possible. |
| |
| VM_PRIVATE objects |
| ------------------- |
| By default, BOs can be mapped on multiple VMs and can also be dma-buf |
| exported. Hence these BOs are referred to as Shared BOs. |
| During each execbuf submission, the request fence must be added to the |
| dma-resv fence list of all shared BOs mapped on the VM. |
| |
| VM_BIND feature introduces an optimization where user can create BO which |
| is private to a specified VM via I915_GEM_CREATE_EXT_VM_PRIVATE flag during |
| BO creation. Unlike Shared BOs, these VM private BOs can only be mapped on |
| the VM they are private to and can't be dma-buf exported. |
| All private BOs of a VM share the dma-resv object. Hence during each execbuf |
| submission, they need only one dma-resv fence list updated. Thus, the fast |
| path (where required mappings are already bound) submission latency is O(1) |
| w.r.t the number of VM private BOs. |
| |
| VM_BIND locking hirarchy |
| ------------------------- |
| The locking design here supports the older (execlist based) execbuf mode, the |
| newer VM_BIND mode, the VM_BIND mode with GPU page faults and possible future |
| system allocator support (See `Shared Virtual Memory (SVM) support`_). |
| The older execbuf mode and the newer VM_BIND mode without page faults manages |
| residency of backing storage using dma_fence. The VM_BIND mode with page faults |
| and the system allocator support do not use any dma_fence at all. |
| |
| VM_BIND locking order is as below. |
| |
| 1) Lock-A: A vm_bind mutex will protect vm_bind lists. This lock is taken in |
| vm_bind/vm_unbind ioctl calls, in the execbuf path and while releasing the |
| mapping. |
| |
| In future, when GPU page faults are supported, we can potentially use a |
| rwsem instead, so that multiple page fault handlers can take the read side |
| lock to lookup the mapping and hence can run in parallel. |
| The older execbuf mode of binding do not need this lock. |
| |
| 2) Lock-B: The object's dma-resv lock will protect i915_vma state and needs to |
| be held while binding/unbinding a vma in the async worker and while updating |
| dma-resv fence list of an object. Note that private BOs of a VM will all |
| share a dma-resv object. |
| |
| The future system allocator support will use the HMM prescribed locking |
| instead. |
| |
| 3) Lock-C: Spinlock/s to protect some of the VM's lists like the list of |
| invalidated vmas (due to eviction and userptr invalidation) etc. |
| |
| When GPU page faults are supported, the execbuf path do not take any of these |
| locks. There we will simply smash the new batch buffer address into the ring and |
| then tell the scheduler run that. The lock taking only happens from the page |
| fault handler, where we take lock-A in read mode, whichever lock-B we need to |
| find the backing storage (dma_resv lock for gem objects, and hmm/core mm for |
| system allocator) and some additional locks (lock-D) for taking care of page |
| table races. Page fault mode should not need to ever manipulate the vm lists, |
| so won't ever need lock-C. |
| |
| VM_BIND LRU handling |
| --------------------- |
| We need to ensure VM_BIND mapped objects are properly LRU tagged to avoid |
| performance degradation. We will also need support for bulk LRU movement of |
| VM_BIND objects to avoid additional latencies in execbuf path. |
| |
| The page table pages are similar to VM_BIND mapped objects (See |
| `Evictable page table allocations`_) and are maintained per VM and needs to |
| be pinned in memory when VM is made active (ie., upon an execbuf call with |
| that VM). So, bulk LRU movement of page table pages is also needed. |
| |
| VM_BIND dma_resv usage |
| ----------------------- |
| Fences needs to be added to all VM_BIND mapped objects. During each execbuf |
| submission, they are added with DMA_RESV_USAGE_BOOKKEEP usage to prevent |
| over sync (See enum dma_resv_usage). One can override it with either |
| DMA_RESV_USAGE_READ or DMA_RESV_USAGE_WRITE usage during explicit object |
| dependency setting. |
| |
| Note that DRM_I915_GEM_WAIT and DRM_I915_GEM_BUSY ioctls do not check for |
| DMA_RESV_USAGE_BOOKKEEP usage and hence should not be used for end of batch |
| check. Instead, the execbuf3 out fence should be used for end of batch check |
| (See struct drm_i915_gem_execbuffer3). |
| |
| Also, in VM_BIND mode, use dma-resv apis for determining object activeness |
| (See dma_resv_test_signaled() and dma_resv_wait_timeout()) and do not use the |
| older i915_vma active reference tracking which is deprecated. This should be |
| easier to get it working with the current TTM backend. |
| |
| Mesa use case |
| -------------- |
| VM_BIND can potentially reduce the CPU overhead in Mesa (both Vulkan and Iris), |
| hence improving performance of CPU-bound applications. It also allows us to |
| implement Vulkan's Sparse Resources. With increasing GPU hardware performance, |
| reducing CPU overhead becomes more impactful. |
| |
| |
| Other VM_BIND use cases |
| ======================== |
| |
| Long running Compute contexts |
| ------------------------------ |
| Usage of dma-fence expects that they complete in reasonable amount of time. |
| Compute on the other hand can be long running. Hence it is appropriate for |
| compute to use user/memory fence (See `User/Memory Fence`_) and dma-fence usage |
| must be limited to in-kernel consumption only. |
| |
| Where GPU page faults are not available, kernel driver upon buffer invalidation |
| will initiate a suspend (preemption) of long running context, finish the |
| invalidation, revalidate the BO and then resume the compute context. This is |
| done by having a per-context preempt fence which is enabled when someone tries |
| to wait on it and triggers the context preemption. |
| |
| User/Memory Fence |
| ~~~~~~~~~~~~~~~~~~ |
| User/Memory fence is a <address, value> pair. To signal the user fence, the |
| specified value will be written at the specified virtual address and wakeup the |
| waiting process. User fence can be signaled either by the GPU or kernel async |
| worker (like upon bind completion). User can wait on a user fence with a new |
| user fence wait ioctl. |
| |
| Here is some prior work on this: |
| https://patchwork.freedesktop.org/patch/349417/ |
| |
| Low Latency Submission |
| ~~~~~~~~~~~~~~~~~~~~~~~ |
| Allows compute UMD to directly submit GPU jobs instead of through execbuf |
| ioctl. This is made possible by VM_BIND is not being synchronized against |
| execbuf. VM_BIND allows bind/unbind of mappings required for the directly |
| submitted jobs. |
| |
| Debugger |
| --------- |
| With debug event interface user space process (debugger) is able to keep track |
| of and act upon resources created by another process (debugged) and attached |
| to GPU via vm_bind interface. |
| |
| GPU page faults |
| ---------------- |
| GPU page faults when supported (in future), will only be supported in the |
| VM_BIND mode. While both the older execbuf mode and the newer VM_BIND mode of |
| binding will require using dma-fence to ensure residency, the GPU page faults |
| mode when supported, will not use any dma-fence as residency is purely managed |
| by installing and removing/invalidating page table entries. |
| |
| Page level hints settings |
| -------------------------- |
| VM_BIND allows any hints setting per mapping instead of per BO. Possible hints |
| include placement and atomicity. Sub-BO level placement hint will be even more |
| relevant with upcoming GPU on-demand page fault support. |
| |
| Page level Cache/CLOS settings |
| ------------------------------- |
| VM_BIND allows cache/CLOS settings per mapping instead of per BO. |
| |
| Evictable page table allocations |
| --------------------------------- |
| Make pagetable allocations evictable and manage them similar to VM_BIND |
| mapped objects. Page table pages are similar to persistent mappings of a |
| VM (difference here are that the page table pages will not have an i915_vma |
| structure and after swapping pages back in, parent page link needs to be |
| updated). |
| |
| Shared Virtual Memory (SVM) support |
| ------------------------------------ |
| VM_BIND interface can be used to map system memory directly (without gem BO |
| abstraction) using the HMM interface. SVM is only supported with GPU page |
| faults enabled. |
| |
| VM_BIND UAPI |
| ============= |
| |
| .. kernel-doc:: Documentation/gpu/rfc/i915_vm_bind.h |