[Intel-gfx] [RFC] GPU reset notification interface

Daniel Vetter daniel at ffwll.ch
Wed Jul 18 11:20:14 CEST 2012


On Tue, Jul 17, 2012 at 03:16:19PM -0700, Ian Romanick wrote:
> I'm getting ready to implement the reset notification part of
> GL_ARB_robustness in the i965 driver.  There are a bunch of quirky
> bits of the extension that are causing some grief in designing the
> kernel / user interface.  I think I've settled on an interface that
> should meet all of the requirements, but I want to bounce it off
> people before I start writing code.
> 
> Here's the list of requirements.
> 
> - Applications poll for reset status.
> 
> - Contexts that did not lose data or rendering should not receive a
> reset notification.  This isn't strictly a requirement of the spec,
> but it seems like a good practice.  Once an application receives a
> reset notification for a context, it is supposed to destroy that
> context and start over.
> 
> - If one context in an OpenGL share group receives a reset
> notification, all contexts in that share group must receive a reset
> notification.
> 
> - All contexts in a single GL share group will have the same fd.
> This isn't a requirement so much as a simplifying assumption.  All
> contexts in a share group have to be in the same address space, so I
> will assume that means they're all controlled by one DRI driver
> instance with a single fd.
> 
> - The reset notification given to the application should try to
> assign guilt.  There are three values possible: unknown guilt,
> you're not guilty, or you are guilty.
> 
> - If there are multiple resets between polls, the application should
> get the "most guilty" answer.  In other words, if there are two
> resets and the context was guilty for one and not the other, the
> application should get the guilty notification.
> 
> - After the application polls the status, the status should revert
> to "no reset occurred."
> 
> - If the application polls the status and the reset operation is
> still in progress, it should continue to get the reset value until
> it is "safe" to begin issuing GL commands again.
> 
> At some point I'd like to extend this to give slightly finer grained
> mechanism so that a context could be told that everything after a
> particular GL sync (fence) operation was lost.  This could prevent
> some applications from having to destroy and rebuild their context.
> This isn't a requirement, but it's an idea that I've been mulling.
> 
> Each time a reset occurs, an internal count is incremented.  This
> associates a unique integer, starting with 1, with each reset event.
> Each context affected by the reset will have the reset event ID
> stored in one its three guilt levels.  An ioctl will be provided
> that returns the following data for all contexts associated with a
> particular fd.
> 
> In addition, it will return the index of any reset operation that is
> still in progress.
> 
> I think this should be sufficient information for user space to meet
> all of the requirements.  I had a conversation with Paul and Ken
> about this.  Paul was pretty happy with the idea.  Ken felt like too
> little policy was in the kernel, and the resulting interface was too
> heavy (I'm paraphrasing).

A few things:
- I agree with Chris that reset_in_progress should go, if userspace can
  sneak in and witness a reset event, we have a bug in the kernel. Since
  very recently, we actually have a few bugs less in that area ;-)

- The "all contexts in a share group need to receive a reset notification"
  wording is irking me a bit because we currently only track all the
  actively used things. So if another context in that share group isn't
  affected (i.e. doesn't even use any of the potentially corrupted bos),
  is the idea that the kernel grows the required tracking, or should
  userspace always ask the reset state for all contexts and do the math
  itself?

- The above essentially links in with how we blame the guilt and figure
  out who's affected. Especially when there's no hw context around, e.g.
  on the blitter or bsd rings, or when an object is used by another
  process and gets corrupted there. Does the spec make any guarantees for
  such a case? Or should we just blame an unknown_reset for all the
  contexts that belong to the fd that submitted the bad batch.

As an idea for the above two issues, what about the kernel also keeps a
per-fd reset statistics, which will also be returned with this ioctl?
We'd then restrict the meaning of the ctx fields to only mean "and the
context was actually active". Userspace could then wrap all the per-fd
hang reports into reset_unknown for arb_robustness, but I think this would
be a bit more flexible for other userspace.

struct drm_context_reset_counts {
	__u32 ctx_id;

	/**
         * Index of the most recent reset where this context was
	 * guilty.  Zero if none.
         */
	__u32 ctx_guilty;

	/**
         * Index of the most recent reset where this context was active,
	 * not guilty.  Zero if none.
         */
	__u32 ctx_not_guilty;

	/**
         * Index of the most recent reset where this context was active,
	 * but guilt was unknown. Zero if none.
         */
	__u32 ctx_unknown_guilt;

	/**
         * Index of the most recent reset where any batchbuffer submitted
	 * through this fd was guilty.  Zero if none.
         */
	__u32 fd_guilty;

	/**
         * Index of the most recent reset where any batchbuffer submitted
	 * through this fd was not guilty, but affected.  Zero if none.
         */
	__u32 fd_not_guilty;

	/**
         * Index of the most recent reset where any batchbuffer submitted
	 * through this fd was affected, but no guilt for the hang could
	 * be assigned.  Zero if none.
         */
	__u32 fd_unknown_guilt;
};

The above could also be important to know when a hw context is toast and
should better not be used any more.

- I like Chris' suggestion of using our seqno breadcrumbs for this. If you
  also add a small extension to execbuf to return the seqno of the new
  batch, you should also have all the tools in place to implement your
  extension to notify userspace up to which glFence things have completed.
  Note though that returning the seqno in execbuffer is only correct once
  we've eliminated the flushing_list.

- Last but not least, how often is userspace expected to call this ioctl?
  Around once per patchbuffer submission or way more/less?

Cheers, Daniel
> 
> struct drm_context_reset_counts {
> 	__u32 ctx_id;
> 
> 	/**
>          * Index of the most recent reset where this context was
> 	 * guilty.  Zero if none.
>          */
> 	__u32 guilty;
> 
> 	/**
>          * Index of the most recent reset where this context was
> 	 * not guilty.  Zero if none.
>          */
> 	__u32 not_guilty;
> 
> 	/**
>          * Index of the most recent reset where guilt was unknown.
> 	 * Zero if none.
>          */
> 	__u32 unknown_guilt;
> };
> 
> struct drm_reset_counts {
> 	/** Index of the in-progress reset.  Zero if none. */
> 	unsigned reset_index_in_progress;
> 
> 	/** Number of contexts. */
> 	__u32 num_contexts;
> 
> 	struct drm_context_reset_counts contexts[0];
> };
> _______________________________________________
> Intel-gfx mailing list
> Intel-gfx at lists.freedesktop.org
> http://lists.freedesktop.org/mailman/listinfo/intel-gfx

-- 
Daniel Vetter
Mail: daniel at ffwll.ch
Mobile: +41 (0)79 365 57 48



More information about the Intel-gfx mailing list