From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.6 required=3.0 tests=DKIM_INVALID,DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id F1FFEC433DF for ; Tue, 19 May 2020 09:26:42 +0000 (UTC) Received: from hemlock.osuosl.org (smtp2.osuosl.org [140.211.166.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id BC971207D3 for ; Tue, 19 May 2020 09:26:42 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=mg.codeaurora.org header.i=@mg.codeaurora.org header.b="OgqWyRF8" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org BC971207D3 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=iommu-bounces@lists.linux-foundation.org Received: from localhost (localhost [127.0.0.1]) by hemlock.osuosl.org (Postfix) with ESMTP id 9956D87E91; Tue, 19 May 2020 09:26:42 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from hemlock.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JmrmX8blVUig; Tue, 19 May 2020 09:26:41 +0000 (UTC) Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56]) by hemlock.osuosl.org (Postfix) with ESMTP id E661287E80; Tue, 19 May 2020 09:26:41 +0000 (UTC) Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id D8A89C0881; Tue, 19 May 2020 09:26:41 +0000 (UTC) Received: from hemlock.osuosl.org (smtp2.osuosl.org [140.211.166.133]) by lists.linuxfoundation.org (Postfix) with ESMTP id 30A21C0176 for ; Tue, 19 May 2020 09:26:41 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by hemlock.osuosl.org (Postfix) with ESMTP id 1E98F87E80 for ; Tue, 19 May 2020 09:26:41 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from hemlock.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g+pZCnM5VZGn for ; Tue, 19 May 2020 09:26:39 +0000 (UTC) X-Greylist: from auto-whitelisted by SQLgrey-1.7.6 Received: from mail26.static.mailgun.info (mail26.static.mailgun.info [104.130.122.26]) by hemlock.osuosl.org (Postfix) with ESMTPS id D67C487E74 for ; Tue, 19 May 2020 09:26:37 +0000 (UTC) DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1589880399; h=Message-ID: References: In-Reply-To: Subject: Cc: To: From: Date: Content-Transfer-Encoding: Content-Type: MIME-Version: Sender; bh=aJ2iFgde8rnDCoyGqYJM6cG8pZxDm5e8UHUvHqksFTA=; b=OgqWyRF88M5QeOiuWq3jp63a94wqMJTkf8jwPtKgAWegSU0AEGsuDXPNvwXutZZA+QF69EPD SfgGNjEM8YErty0s08ov092jNuQyBmc1WsIq89o0BEX1iYvsz+Bv6/TkoacJPYg8vFyy0JA2 syhNW96EqAZGI54FXOqaF3Wazwo= X-Mailgun-Sending-Ip: 104.130.122.26 X-Mailgun-Sid: WyI3NDkwMCIsICJpb21tdUBsaXN0cy5saW51eC1mb3VuZGF0aW9uLm9yZyIsICJiZTllNGEiXQ== Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by mxa.mailgun.org with ESMTP id 5ec3a64a.7f33d1bdf688-smtp-out-n02; Tue, 19 May 2020 09:26:34 -0000 (UTC) Received: by smtp.codeaurora.org (Postfix, from userid 1001) id 93678C44788; Tue, 19 May 2020 09:26:34 +0000 (UTC) Received: from mail.codeaurora.org (localhost.localdomain [127.0.0.1]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: saiprakash.ranjan) by smtp.codeaurora.org (Postfix) with ESMTPSA id 9F34BC433F2; Tue, 19 May 2020 09:26:33 +0000 (UTC) MIME-Version: 1.0 Date: Tue, 19 May 2020 14:56:33 +0530 From: Sai Prakash Ranjan To: Will Deacon Subject: Re: [PATCH] iomm/arm-smmu: Add stall implementation hook In-Reply-To: <20200518154522.GN32394@willie-the-truck> References: <20200421202004.11686-1-saiprakash.ranjan@codeaurora.org> <1ced023b-157c-21a0-ac75-1adef7f029f0@arm.com> <20200507125357.GA31783@willie-the-truck> <20200511173008.GA24282@jcrouse1-lnx.qualcomm.com> <20200518154522.GN32394@willie-the-truck> Message-ID: <5a0ad639e272026c8be57393937cda22@codeaurora.org> X-Sender: saiprakash.ranjan@codeaurora.org User-Agent: Roundcube Webmail/1.3.9 Cc: linux-arm-msm , "list@263.net:IOMMU DRIVERS , Joerg Roedel , " , Linux Kernel Mailing List , Robin Murphy , "moderated list:ARM/FREESCALE IMX / MXC ARM ARCHITECTURE" X-BeenThere: iommu@lists.linux-foundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Development issues for Linux IOMMU support List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="us-ascii"; Format="flowed" Errors-To: iommu-bounces@lists.linux-foundation.org Sender: "iommu" Hi Will, On 2020-05-18 21:15, Will Deacon wrote: > On Mon, May 11, 2020 at 11:30:08AM -0600, Jordan Crouse wrote: >> On Fri, May 08, 2020 at 08:40:40AM -0700, Rob Clark wrote: >> > On Fri, May 8, 2020 at 8:32 AM Rob Clark wrote: >> > > >> > > On Thu, May 7, 2020 at 5:54 AM Will Deacon wrote: >> > > > >> > > > On Thu, May 07, 2020 at 11:55:54AM +0100, Robin Murphy wrote: >> > > > > On 2020-05-07 11:14 am, Sai Prakash Ranjan wrote: >> > > > > > On 2020-04-22 01:50, Sai Prakash Ranjan wrote: >> > > > > > > Add stall implementation hook to enable stalling >> > > > > > > faults on QCOM platforms which supports it without >> > > > > > > causing any kind of hardware mishaps. Without this >> > > > > > > on QCOM platforms, GPU faults can cause unrelated >> > > > > > > GPU memory accesses to return zeroes. This has the >> > > > > > > unfortunate result of command-stream reads from CP >> > > > > > > getting invalid data, causing a cascade of fail. >> > > > > >> > > > > I think this came up before, but something about this rationale doesn't add >> > > > > up - we're not *using* stalls at all, we're still terminating faulting >> > > > > transactions unconditionally; we're just using CFCFG to terminate them with >> > > > > a slight delay, rather than immediately. It's really not clear how or why >> > > > > that makes a difference. Is it a GPU bug? Or an SMMU bug? Is this reliable >> > > > > (or even a documented workaround for something), or might things start >> > > > > blowing up again if any other behaviour subtly changes? I'm not dead set >> > > > > against adding this, but I'd *really* like to have a lot more confidence in >> > > > > it. >> > > > >> > > > Rob mentioned something about the "bus returning zeroes" before, but I agree >> > > > that we need more information so that we can reason about this and maintain >> > > > the code as the driver continues to change. That needs to be a comment in >> > > > the driver, and I don't think "but android seems to work" is a good enough >> > > > justification. There was some interaction with HUPCF as well. >> > > >> > > The issue is that there are multiple parallel memory accesses >> > > happening at the same time, for example CP (the cmdstream processor) >> > > will be reading ahead and setting things up for the next draw or >> > > compute grid, in parallel with some memory accesses from the shader >> > > which could trigger a fault. (And with faults triggered by something >> > > in the shader, there are *many* shader threads running in parallel so >> > > those tend to generate a big number of faults at the same time.) >> > > >> > > We need either CFCFG or HUPCF, otherwise what I have observed is that >> > > while the fault happens, CP's memory access will start returning >> > > zero's instead of valid cmdstream data, which triggers a GPU hang. I >> > > can't say whether this is something unique to qcom's implementation of >> > > the smmu spec or not. >> > > >> > > *Often* a fault is the result of the usermode gl/vk/cl driver bug, >> > > although I don't think that is an argument against fixing this in the >> > > smmu driver.. I've been carrying around a local patch to set HUPCF for >> > > *years* because debugging usermode driver issues is so much harder >> > > without. But there are some APIs where faults can be caused by the >> > > user's app on top of the usermode driver. >> > > >> > >> > Also, I'll add to that, a big wish of mine is to have stall with the >> > ability to resume later from a wq context. That would enable me to >> > hook in the gpu crash dump handling for faults, which would make >> > debugging these sorts of issues much easier. I think I posted a >> > prototype of this quite some time back, which would schedule a worker >> > on the first fault (since there are cases where you see 1000's of >> > faults at once), which grabbed some information about the currently >> > executing submit and some gpu registers to indicate *where* in the >> > submit (a single submit could have 100's or 1000's of draws), and then >> > resumed the iommu cb. >> > >> > (This would ofc eventually be useful for svm type things.. I expect >> > we'll eventually care about that too.) >> >> Rob is right about HUPCF. Due to the parallel nature of the command >> processor >> there is always a very good chance that a CP access is somewhere in >> the bus so >> any pagefault is usually a death sentence. The GPU context bank would >> always >> want HUPCF set to 1. > > So this sounds like an erratum to me, and I'm happy to set HUPCF if we > detect the broken implementation. However, it will need an entry in > Documentation/arm64/silicon-errata.rst and a decent comment in the > driver > to explain what we're doing and why. > AFAIK there is no erratum documented internally for this behaviour and this exists from MSM8996 SoC time and errata usually don't survive this long across generation of SoCs and there is no point for us in disguising it. Is it OK if we clearly mention it as the "design limitation" or some other term which we can agree upon along with the description which Rob and Jordan provided for setting HUPCF in the driver when we add the set_hupcf callback? Thanks, Sai -- QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation _______________________________________________ iommu mailing list iommu@lists.linux-foundation.org https://lists.linuxfoundation.org/mailman/listinfo/iommu