From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id E0F0FC48BD1 for ; Wed, 9 Jun 2021 21:30:20 +0000 (UTC) Received: from gabe.freedesktop.org (gabe.freedesktop.org [131.252.210.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id AFDC6613EE for ; Wed, 9 Jun 2021 21:30:20 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org AFDC6613EE Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=jlekstrand.net Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=intel-gfx-bounces@lists.freedesktop.org Received: from gabe.freedesktop.org (localhost [127.0.0.1]) by gabe.freedesktop.org (Postfix) with ESMTP id 90E9D6EB76; Wed, 9 Jun 2021 21:30:14 +0000 (UTC) Received: from mail-pj1-x102f.google.com (mail-pj1-x102f.google.com [IPv6:2607:f8b0:4864:20::102f]) by gabe.freedesktop.org (Postfix) with ESMTPS id D3EBF6EB5F for ; Wed, 9 Jun 2021 21:30:10 +0000 (UTC) Received: by mail-pj1-x102f.google.com with SMTP id k7so2378241pjf.5 for ; Wed, 09 Jun 2021 14:30:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jlekstrand-net.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=BG9tpybh3pbygSCt9T3vWKf6iagoboAQ8BQvwxHPpsE=; b=0PZCxFlqdgOwgUeiptjuRDmVy2XIV9oyTSVCRlWvGmx1Vd8WeDcP1xN9obHsdZrufu ppWBL0fUEXV5WNMkSz/XGAhJ8uA/X/mXcsbvjfSDFvV0j1mTum7GKswx2IWtlp0jGi29 gtoAxZMKDyaIzHCaPwqaBCVrp1rGIIUzFJILX18zIybZGCGtrD6xFPkgufi+OJiUAANw eGqIBqqJrjpG4cDayoRmEJgZHWMZkRNFv85gb4PZOmDr2tbwDEhN/CTY2v+WkhHWQ06Z Fm56p103lltl14ZVv/E2jU4I3kMd9SwjEvlPKnFtvpsbLS0ssmsS7RjrYekk7ifsl46h uhtQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=BG9tpybh3pbygSCt9T3vWKf6iagoboAQ8BQvwxHPpsE=; b=tEbnTL1+tVxXUqNHhiPwiIPX39ftESjrYYUUoirXeRq3CMpf5842ZgCZxg0/qbYiMe 1Lh6A7Fivtquy0lWt+XWupzYEsAgb/xWi8NUp0peotpPvM66hQDYKFScexqlpfocn97K eoTf+546rttr0nUnq/sS9yKukNVoEWEyg7LjP58BFSXVY7KaKVFivX2LRV22CxB3YOce BQAPaM1UqvoQ5gmbcVxo6gDJS99EfVJ1hNzLvW4IAJnzyXWWt5N0XZzwBDXh3Qv+nDrG RxPyhm6deiM/0ZoOgyKNLnismC4Tv/jgh5CR9d2TXaQbW7vnhna64sJR1rgJTGt7oc/p DB9w== X-Gm-Message-State: AOAM533/5DtWV2LaiDODRe0lHivVxh+B5Xvbu6eyaZcUHZ24TO+aeqHt HpVTVTUi+2i7eScr//cRq6UenQ== X-Google-Smtp-Source: ABdhPJyZHW5XcvVIrh9HZzGc7XNDtcQjWMJIthNTX7+zVQfEhrBNIFrI1YuDtk3oHBteH5HygmdYoQ== X-Received: by 2002:a17:902:b687:b029:eb:6491:b3f7 with SMTP id c7-20020a170902b687b02900eb6491b3f7mr1713761pls.38.1623274210405; Wed, 09 Jun 2021 14:30:10 -0700 (PDT) Received: from omlet.lan (jfdmzpr04-ext.jf.intel.com. [134.134.137.73]) by smtp.gmail.com with ESMTPSA id u14sm519133pjx.14.2021.06.09.14.30.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 09 Jun 2021 14:30:10 -0700 (PDT) From: Jason Ekstrand To: dri-devel@lists.freedesktop.org, intel-gfx@lists.freedesktop.org Date: Wed, 9 Jun 2021 16:29:57 -0500 Message-Id: <20210609212959.471209-4-jason@jlekstrand.net> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210609212959.471209-1-jason@jlekstrand.net> References: <20210609212959.471209-1-jason@jlekstrand.net> MIME-Version: 1.0 Subject: [Intel-gfx] [PATCH 3/5] drm/i915: Stop using SLAB_TYPESAFE_BY_RCU for i915_request X-BeenThere: intel-gfx@lists.freedesktop.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Intel graphics driver community testing & development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Daniel Vetter , Matthew Auld , Dave Airlie , =?UTF-8?q?Christian=20K=C3=B6nig?= Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: intel-gfx-bounces@lists.freedesktop.org Sender: "Intel-gfx" RXZlciBzaW5jZSAwZWFmZWM2ZDMyNDQgKCJkcm0vaTkxNTogRW5hYmxlIGxvY2tsZXNzIGxvb2t1 cCBvZiByZXF1ZXN0CnRyYWNraW5nIHZpYSBSQ1UiKSwgdGhlIGk5MTUgZHJpdmVyIGhhcyB1c2Vk IFNMQUJfVFlQRVNBRkVfQllfUkNVIChpdAp3YXMgY2FsbGVkIFNMQUJfREVTVFJPWV9CWV9SQ1Ug YXQgdGhlIHRpbWUpIGluIG9yZGVyIHRvIGFsbG93IFJDVSBvbgppOTE1X3JlcXVlc3QuICBBcyBu aWZ0eSBhcyBTTEFCX1RZUEVTQUZFX0JZX1JDVSBtYXkgYmUsIGl0IGNvbWVzIHdpdGgKc29tZSBz ZXJpb3VzIGRpc2NsYWltZXJzLiAgSW4gcGFydGljdWxhciwgb2JqZWN0cyBjYW4gZ2V0IHJlY3lj bGVkIHdoaWxlClJDVSByZWFkZXJzIGFyZSBzdGlsbCBpbi1mbGlnaHQuICBUaGlzIGNhbiBiZSBv ayBpZiBldmVyeW9uZSB3aG8gdG91Y2hlcwp0aGVzZSBvYmplY3RzIGtub3dzIGFib3V0IHRoZSBk aXNjbGFpbWVycyBhbmQgaXMgY2FyZWZ1bC4gIEhvd2V2ZXIsCmJlY2F1c2Ugd2UndmUgY2hvc2Vu IHRvIHVzZSBTTEFCX1RZUEVTQUZFX0JZX1JDVSBmb3IgaTkxNV9yZXF1ZXN0IGFuZApiZWNhdXNl IGk5MTVfcmVxdWVzdCBjb250YWlucyBhIGRtYV9mZW5jZSwgd2UndmUgbGVha2VkClNMQUJfVFlQ RVNBRkVfQllfUkNVIGFuZCBpdHMgd2hvbGUgcGlsZSBvZiBkaXNjbGFpbWVycyB0byBldmVyeSBk cml2ZXIKaW4gdGhlIGtlcm5lbCB3aGljaCBtYXkgY29uc3VtZSBhIGRtYV9mZW5jZS4KCldlJ3Zl IHRyaWVkIHRvIGtlZXAgaXQgc29tZXdoYXQgY29udGFpbmVkIGJ5IGRvaW5nIG1vc3Qgb2YgdGhl IGhhcmQgd29yawp0byBwcmV2ZW50IGFjY2VzcyBvZiByZWN5Y2xlZCBvYmplY3RzIHZpYSBkbWFf ZmVuY2VfZ2V0X3JjdV9zYWZlKCkuCkhvd2V2ZXIsIGEgcXVpY2sgZ3JlcCBvZiBrZXJuZWwgc291 cmNlcyBzYXlzIHRoYXQsIG9mIHRoZSAzMCBpbnN0YW5jZXMKb2YgZG1hX2ZlbmNlX2dldF9yY3Uq LCBvbmx5IDExIG9mIHRoZW0gdXNlIGRtYV9mZW5jZV9nZXRfcmN1X3NhZmUoKS4KSXQncyBsaWtl bHkgdGhlcmUgYmVhciB0cmFwcyBpbiBEUk0gYW5kIHJlbGF0ZWQgc3Vic3lzdGVtcyBqdXN0IHdh aXRpbmcKZm9yIHNvbWVvbmUgdG8gYWNjaWRlbnRhbGx5IHN0ZXAgaW4gdGhlbS4KClRoaXMgY29t bWl0IGdldHMgc3RvcHMgdXMgdXNpbmcgU0xBQl9UWVBFU0FGRV9CWV9SQ1UgZm9yIGk5MTVfcmVx dWVzdAphbmQsIGluc3RlYWQsIGRvZXMgYW4gUkNVLXNhZmUgc2xhYiBmcmVlIHZpYSByY3VfY2Fs bCgpLiAgVGhpcyBzaG91bGQKbGV0IHVzIGtlZXAgbW9zdCBvZiB0aGUgcGVyZiBiZW5lZml0cyBv ZiBzbGFiIGFsbG9jYXRpb24gd2hpbGUgYXZvaWRpbmcKdGhlIGJlYXIgdHJhcHMgaW5oZXJlbnQg aW4gU0xBQl9UWVBFU0FGRV9CWV9SQ1UuCgpTaWduZWQtb2ZmLWJ5OiBKYXNvbiBFa3N0cmFuZCA8 amFzb25Aamxla3N0cmFuZC5uZXQ+CkNjOiBKb24gQmxvb21maWVsZCA8am9uLmJsb29tZmllbGRA aW50ZWwuY29tPgpDYzogRGFuaWVsIFZldHRlciA8ZGFuaWVsLnZldHRlckBmZndsbC5jaD4KQ2M6 IENocmlzdGlhbiBLw7ZuaWcgPGNocmlzdGlhbi5rb2VuaWdAYW1kLmNvbT4KQ2M6IERhdmUgQWly bGllIDxhaXJsaWVkQHJlZGhhdC5jb20+CkNjOiBNYXR0aGV3IEF1bGQgPG1hdHRoZXcuYXVsZEBp bnRlbC5jb20+CkNjOiBNYWFydGVuIExhbmtob3JzdCA8bWFhcnRlbi5sYW5raG9yc3RAbGludXgu aW50ZWwuY29tPgotLS0KIGRyaXZlcnMvZ3B1L2RybS9pOTE1L2k5MTVfcmVxdWVzdC5jIHwgNzYg KysrKysrKysrKysrKysrKy0tLS0tLS0tLS0tLS0KIDEgZmlsZSBjaGFuZ2VkLCA0MyBpbnNlcnRp b25zKCspLCAzMyBkZWxldGlvbnMoLSkKCmRpZmYgLS1naXQgYS9kcml2ZXJzL2dwdS9kcm0vaTkx NS9pOTE1X3JlcXVlc3QuYyBiL2RyaXZlcnMvZ3B1L2RybS9pOTE1L2k5MTVfcmVxdWVzdC5jCmlu ZGV4IGU1MzFjNzRmMGIwZTIuLjU1ZmE5MzgxMjYxMDAgMTAwNjQ0Ci0tLSBhL2RyaXZlcnMvZ3B1 L2RybS9pOTE1L2k5MTVfcmVxdWVzdC5jCisrKyBiL2RyaXZlcnMvZ3B1L2RybS9pOTE1L2k5MTVf cmVxdWVzdC5jCkBAIC0xMTEsOSArMTExLDQ0IEBAIHZvaWQgaW50ZWxfZW5naW5lX2ZyZWVfcmVx dWVzdF9wb29sKHN0cnVjdCBpbnRlbF9lbmdpbmVfY3MgKmVuZ2luZSkKIAlpZiAoIWVuZ2luZS0+ cmVxdWVzdF9wb29sKQogCQlyZXR1cm47CiAKKwkvKgorCSAqIEl0J3Mgc2FmZSB0byBmcmVlIHRo aXMgcmlnaHQgYXdheSBiZWNhdXNlIHdlIGFsd2F5cyBwdXQgYSBmcmVzaAorCSAqIGk5MTVfcmVx dWVzdCBpbiB0aGUgY2FjaGUgdGhhdCdzIG5ldmVyIGJlZW4gdG91Y2hlZCBieSBhbiBSQ1UKKwkg KiByZWFkZXIuCisJICovCiAJa21lbV9jYWNoZV9mcmVlKGdsb2JhbC5zbGFiX3JlcXVlc3RzLCBl bmdpbmUtPnJlcXVlc3RfcG9vbCk7CiB9CiAKK3N0YXRpYyB2b2lkIF9faTkxNV9yZXF1ZXN0X2Zy ZWUoc3RydWN0IHJjdV9oZWFkICpoZWFkKQoreworCXN0cnVjdCBpOTE1X3JlcXVlc3QgKnJxID0g Y29udGFpbmVyX29mKGhlYWQsIHR5cGVvZigqcnEpLCBmZW5jZS5yY3UpOworCisJa21lbV9jYWNo ZV9mcmVlKGdsb2JhbC5zbGFiX3JlcXVlc3RzLCBycSk7Cit9CisKK3N0YXRpYyB2b2lkIGk5MTVf cmVxdWVzdF9mcmVlX3JjdShzdHJ1Y3QgaTkxNV9yZXF1ZXN0ICpycSkKK3sKKwkvKgorCSAqIEJl Y2F1c2Ugd2UncmUgb24gYSBzbGFiIGFsbG9jYXRvciwgbWVtb3J5IG1heSBiZSByZS11c2VkIHRo ZQorCSAqIG1vbWVudCB3ZSBmcmVlIGl0LiAgVGhlcmUgaXMgbm8ga2ZyZWVfcmN1KCkgZXF1aXZh bGVudCBmb3IKKwkgKiBzbGFicy4gIEluc3RlYWQsIHdlIGhhbmQtcm9sbCBpdCBoZXJlIHdpdGgg Y2FsbF9yY3UoKS4gIFRoaXMKKwkgKiBnaXZlcyB1cyBhbGwgdGhlIHBlcmYgYmVuZWZpdHMgdG8g c2xhYiBhbGxvY2F0aW9uIHdoaWxlIGVuc3VyaW5nCisJICogdGhhdCB3ZSBuZXZlciByZWxlYXNl IGEgcmVxdWVzdCBiYWNrIHRvIHRoZSBzbGFiIHVudGlsIHRoZXJlIGFyZQorCSAqIG5vIG1vcmUg cmVhZGVycy4KKwkgKgorCSAqIFdlIGRvIGhhdmUgdG8gYmUgY2FyZWZ1bCwgdGhvdWdoLCB3aGVu IGNhbGxpbmcga21lbV9jYWNoZV9kZXN0cm95KCkKKwkgKiBhcyB0aGVyZSBtYXkgYmUgb3V0c3Rh bmRpbmcgZnJlZSByZXF1ZXN0cy4gIFRoaXMgaXMgc29sdmVkIGJ5CisJICogaW5zZXJ0aW5nIGFu IHJjdV9iYXJyaWVyKCkgYmVmb3JlIGttZW1fY2FjaGVfZGVzdHJveSgpLiAgQW4gUkNVCisJICog YmFycmllciBpcyBzdWZmaWNpZW50IGFuZCB3ZSBkb24ndCBuZWVkIHN5bmNocm9uaXplX3JjdSgp CisJICogYmVjYXVzZSB0aGUgY2FsbF9yY3UoKSBoZXJlIHdpbGwgd2FpdCBvbiBhbnkgb3V0c3Rh bmRpbmcgUkNVCisJICogcmVhZGVycyBhbmQgdGhlIHJjdV9iYXJyaWVyKCkgd2lsbCB3YWl0IG9u IGFueSBvdXRzdGFuZGluZworCSAqIGNhbGxfcmN1KCkgY2FsbGJhY2tzLiAgU28sIGlmIHRoZXJl IGFyZSBhbnkgcmVhZGVycyB3aG8gb25jZSBoYWQKKwkgKiB2YWxpZCByZWZlcmVuY2VzIHRvIGEg cmVxdWVzdCwgcmN1X2JhcnJpZXIoKSB3aWxsIGVuZCB1cCB3YWl0aW5nCisJICogb24gdGhlbSBi eSB0cmFuc2l0aXZpdHkuCisJICovCisJY2FsbF9yY3UoJnJxLT5mZW5jZS5yY3UsIF9faTkxNV9y ZXF1ZXN0X2ZyZWUpOworfQorCiBzdGF0aWMgdm9pZCBpOTE1X2ZlbmNlX3JlbGVhc2Uoc3RydWN0 IGRtYV9mZW5jZSAqZmVuY2UpCiB7CiAJc3RydWN0IGk5MTVfcmVxdWVzdCAqcnEgPSB0b19yZXF1 ZXN0KGZlbmNlKTsKQEAgLTEyNyw4ICsxNjIsNyBAQCBzdGF0aWMgdm9pZCBpOTE1X2ZlbmNlX3Jl bGVhc2Uoc3RydWN0IGRtYV9mZW5jZSAqZmVuY2UpCiAJICovCiAJaTkxNV9zd19mZW5jZV9maW5p KCZycS0+c3VibWl0KTsKIAlpOTE1X3N3X2ZlbmNlX2ZpbmkoJnJxLT5zZW1hcGhvcmUpOwotCi0J a21lbV9jYWNoZV9mcmVlKGdsb2JhbC5zbGFiX3JlcXVlc3RzLCBycSk7CisJaTkxNV9yZXF1ZXN0 X2ZyZWVfcmN1KHJxKTsKIH0KIAogY29uc3Qgc3RydWN0IGRtYV9mZW5jZV9vcHMgaTkxNV9mZW5j ZV9vcHMgPSB7CkBAIC05MzMsMzUgKzk2Nyw2IEBAIF9faTkxNV9yZXF1ZXN0X2NyZWF0ZShzdHJ1 Y3QgaW50ZWxfY29udGV4dCAqY2UsIGdmcF90IGdmcCkKIAkgKi8KIAllbnN1cmVfY2FjaGVkX3Jl cXVlc3QoJmNlLT5lbmdpbmUtPnJlcXVlc3RfcG9vbCwgZ2ZwKTsKIAotCS8qCi0JICogQmV3YXJl OiBEcmFnb25zIGJlIGZseWluZyBvdmVyaGVhZC4KLQkgKgotCSAqIFdlIHVzZSBSQ1UgdG8gbG9v ayB1cCByZXF1ZXN0cyBpbiBmbGlnaHQuIFRoZSBsb29rdXBzIG1heQotCSAqIHJhY2Ugd2l0aCB0 aGUgcmVxdWVzdCBiZWluZyBhbGxvY2F0ZWQgZnJvbSB0aGUgc2xhYiBmcmVlbGlzdC4KLQkgKiBU aGF0IGlzIHRoZSByZXF1ZXN0IHdlIGFyZSB3cml0aW5nIHRvIGhlcmUsIG1heSBiZSBpbiB0aGUg cHJvY2VzcwotCSAqIG9mIGJlaW5nIHJlYWQgYnkgX19pOTE1X2FjdGl2ZV9yZXF1ZXN0X2dldF9y Y3UoKS4gQXMgc3VjaCwKLQkgKiB3ZSBoYXZlIHRvIGJlIHZlcnkgY2FyZWZ1bCB3aGVuIG92ZXJ3 cml0aW5nIHRoZSBjb250ZW50cy4gRHVyaW5nCi0JICogdGhlIFJDVSBsb29rdXAsIHdlIGNoYW5n ZSBjaGFzZSB0aGUgcmVxdWVzdC0+ZW5naW5lIHBvaW50ZXIsCi0JICogcmVhZCB0aGUgcmVxdWVz dC0+Z2xvYmFsX3NlcW5vIGFuZCBpbmNyZW1lbnQgdGhlIHJlZmVyZW5jZSBjb3VudC4KLQkgKgot CSAqIFRoZSByZWZlcmVuY2UgY291bnQgaXMgaW5jcmVtZW50ZWQgYXRvbWljYWxseS4gSWYgaXQg aXMgemVybywKLQkgKiB0aGUgbG9va3VwIGtub3dzIHRoZSByZXF1ZXN0IGlzIHVuYWxsb2NhdGVk IGFuZCBjb21wbGV0ZS4gT3RoZXJ3aXNlLAotCSAqIGl0IGlzIGVpdGhlciBzdGlsbCBpbiB1c2Us IG9yIGhhcyBiZWVuIHJlYWxsb2NhdGVkIGFuZCByZXNldAotCSAqIHdpdGggZG1hX2ZlbmNlX2lu aXQoKS4gVGhpcyBpbmNyZW1lbnQgaXMgc2FmZSBmb3IgcmVsZWFzZSBhcyB3ZQotCSAqIGNoZWNr IHRoYXQgdGhlIHJlcXVlc3Qgd2UgaGF2ZSBhIHJlZmVyZW5jZSB0byBhbmQgbWF0Y2hlcyB0aGUg YWN0aXZlCi0JICogcmVxdWVzdC4KLQkgKgotCSAqIEJlZm9yZSB3ZSBpbmNyZW1lbnQgdGhlIHJl ZmNvdW50LCB3ZSBjaGFzZSB0aGUgcmVxdWVzdC0+ZW5naW5lCi0JICogcG9pbnRlci4gV2UgbXVz dCBub3QgY2FsbCBrbWVtX2NhY2hlX3phbGxvYygpIG9yIGVsc2Ugd2Ugc2V0Ci0JICogdGhhdCBw b2ludGVyIHRvIE5VTEwgYW5kIGNhdXNlIGEgY3Jhc2ggZHVyaW5nIHRoZSBsb29rdXAuIElmCi0J ICogd2Ugc2VlIHRoZSByZXF1ZXN0IGlzIGNvbXBsZXRlZCAoYmFzZWQgb24gdGhlIHZhbHVlIG9m IHRoZQotCSAqIG9sZCBlbmdpbmUgYW5kIHNlcW5vKSwgdGhlIGxvb2t1cCBpcyBjb21wbGV0ZSBh bmQgcmVwb3J0cyBOVUxMLgotCSAqIElmIHdlIGRlY2lkZSB0aGUgcmVxdWVzdCBpcyBub3QgY29t cGxldGVkIChuZXcgZW5naW5lIG9yIHNlcW5vKSwKLQkgKiB0aGVuIHdlIGdyYWIgYSByZWZlcmVu Y2UgYW5kIGRvdWJsZSBjaGVjayB0aGF0IGl0IGlzIHN0aWxsIHRoZQotCSAqIGFjdGl2ZSByZXF1 ZXN0IC0gd2hpY2ggaXQgd29uJ3QgYmUgYW5kIHJlc3RhcnQgdGhlIGxvb2t1cC4KLQkgKgotCSAq IERvIG5vdCB1c2Uga21lbV9jYWNoZV96YWxsb2MoKSBoZXJlIQotCSAqLwogCXJxID0ga21lbV9j YWNoZV9hbGxvYyhnbG9iYWwuc2xhYl9yZXF1ZXN0cywKIAkJCSAgICAgIGdmcCB8IF9fR0ZQX1JF VFJZX01BWUZBSUwgfCBfX0dGUF9OT1dBUk4pOwogCWlmICh1bmxpa2VseSghcnEpKSB7CkBAIC0y MTE2LDYgKzIxMjEsMTIgQEAgc3RhdGljIHZvaWQgaTkxNV9nbG9iYWxfcmVxdWVzdF9zaHJpbmso dm9pZCkKIAogc3RhdGljIHZvaWQgaTkxNV9nbG9iYWxfcmVxdWVzdF9leGl0KHZvaWQpCiB7CisJ LyoKKwkgKiBXZSBuZWVkIHRvIHJjdV9iYXJyaWVyKCkgYmVmb3JlIGRlc3Ryb3lpbmcgc2xhYl9y ZXF1ZXN0cy4gIFNlZQorCSAqIGk5MTVfcmVxdWVzdF9mcmVlX3JjdSgpIGZvciBtb3JlIGRldGFp bHMuCisJICovCisJcmN1X2JhcnJpZXIoKTsKKwogCWttZW1fY2FjaGVfZGVzdHJveShnbG9iYWwu c2xhYl9leGVjdXRlX2Nicyk7CiAJa21lbV9jYWNoZV9kZXN0cm95KGdsb2JhbC5zbGFiX3JlcXVl c3RzKTsKIH0KQEAgLTIxMzIsOCArMjE0Myw3IEBAIGludCBfX2luaXQgaTkxNV9nbG9iYWxfcmVx dWVzdF9pbml0KHZvaWQpCiAJCQkJICBzaXplb2Yoc3RydWN0IGk5MTVfcmVxdWVzdCksCiAJCQkJ ICBfX2FsaWdub2ZfXyhzdHJ1Y3QgaTkxNV9yZXF1ZXN0KSwKIAkJCQkgIFNMQUJfSFdDQUNIRV9B TElHTiB8Ci0JCQkJICBTTEFCX1JFQ0xBSU1fQUNDT1VOVCB8Ci0JCQkJICBTTEFCX1RZUEVTQUZF X0JZX1JDVSwKKwkJCQkgIFNMQUJfUkVDTEFJTV9BQ0NPVU5ULAogCQkJCSAgX19pOTE1X3JlcXVl c3RfY3Rvcik7CiAJaWYgKCFnbG9iYWwuc2xhYl9yZXF1ZXN0cykKIAkJcmV0dXJuIC1FTk9NRU07 Ci0tIAoyLjMxLjEKCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fCkludGVsLWdmeCBtYWlsaW5nIGxpc3QKSW50ZWwtZ2Z4QGxpc3RzLmZyZWVkZXNrdG9wLm9y ZwpodHRwczovL2xpc3RzLmZyZWVkZXNrdG9wLm9yZy9tYWlsbWFuL2xpc3RpbmZvL2ludGVsLWdm eAo= From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0CB14C48BCD for ; Wed, 9 Jun 2021 21:30:19 +0000 (UTC) Received: from gabe.freedesktop.org (gabe.freedesktop.org [131.252.210.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id CF58361009 for ; Wed, 9 Jun 2021 21:30:18 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org CF58361009 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=jlekstrand.net Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=dri-devel-bounces@lists.freedesktop.org Received: from gabe.freedesktop.org (localhost [127.0.0.1]) by gabe.freedesktop.org (Postfix) with ESMTP id 23D996EB6C; Wed, 9 Jun 2021 21:30:13 +0000 (UTC) Received: from mail-pj1-x1036.google.com (mail-pj1-x1036.google.com [IPv6:2607:f8b0:4864:20::1036]) by gabe.freedesktop.org (Postfix) with ESMTPS id 23C456EB6A for ; Wed, 9 Jun 2021 21:30:11 +0000 (UTC) Received: by mail-pj1-x1036.google.com with SMTP id m13-20020a17090b068db02901656cc93a75so2442078pjz.3 for ; Wed, 09 Jun 2021 14:30:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jlekstrand-net.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=BG9tpybh3pbygSCt9T3vWKf6iagoboAQ8BQvwxHPpsE=; b=0PZCxFlqdgOwgUeiptjuRDmVy2XIV9oyTSVCRlWvGmx1Vd8WeDcP1xN9obHsdZrufu ppWBL0fUEXV5WNMkSz/XGAhJ8uA/X/mXcsbvjfSDFvV0j1mTum7GKswx2IWtlp0jGi29 gtoAxZMKDyaIzHCaPwqaBCVrp1rGIIUzFJILX18zIybZGCGtrD6xFPkgufi+OJiUAANw eGqIBqqJrjpG4cDayoRmEJgZHWMZkRNFv85gb4PZOmDr2tbwDEhN/CTY2v+WkhHWQ06Z Fm56p103lltl14ZVv/E2jU4I3kMd9SwjEvlPKnFtvpsbLS0ssmsS7RjrYekk7ifsl46h uhtQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=BG9tpybh3pbygSCt9T3vWKf6iagoboAQ8BQvwxHPpsE=; b=R67Dmxvx7gYKGxI/1jCFjcIC85Oi2iqLMxX/q2cIMbVhLOa8mROVRTX2bsajMfdQit bZwcyw3hEsHVZlEecQo5xZ0SAr2h/CTKkBADV9ey7LvS7cVkWlXNwJL4b/5vqmm5q60c qbJEY+I2KRXmvlWD39ic9pkqV1Ges3AQq1yoyCvyLrQtKz1LqLWRoPElxPzgKUOcbqp2 wEdCH9xPz5l+DnpBie5safptEkE22u1Z5SraaeRiAbYamOdRrJb+VlN1M2svqkAZwILb CslgLvt2b9KI17qpIVbCaCJCL+wCYK7bWyqzElMhPehiz+6gab7OuVFnV+BljCFbF6Hd u4Aw== X-Gm-Message-State: AOAM532FbZLeUoFbe7Nr0amq/UW21rlkJHss4Op0cVS2wn9WPe9+UbWe 1NqTqtSsTbPevZb5/uIDs0xJJmI9ykKH1Q== X-Google-Smtp-Source: ABdhPJyZHW5XcvVIrh9HZzGc7XNDtcQjWMJIthNTX7+zVQfEhrBNIFrI1YuDtk3oHBteH5HygmdYoQ== X-Received: by 2002:a17:902:b687:b029:eb:6491:b3f7 with SMTP id c7-20020a170902b687b02900eb6491b3f7mr1713761pls.38.1623274210405; Wed, 09 Jun 2021 14:30:10 -0700 (PDT) Received: from omlet.lan (jfdmzpr04-ext.jf.intel.com. [134.134.137.73]) by smtp.gmail.com with ESMTPSA id u14sm519133pjx.14.2021.06.09.14.30.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 09 Jun 2021 14:30:10 -0700 (PDT) From: Jason Ekstrand To: dri-devel@lists.freedesktop.org, intel-gfx@lists.freedesktop.org Subject: [PATCH 3/5] drm/i915: Stop using SLAB_TYPESAFE_BY_RCU for i915_request Date: Wed, 9 Jun 2021 16:29:57 -0500 Message-Id: <20210609212959.471209-4-jason@jlekstrand.net> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210609212959.471209-1-jason@jlekstrand.net> References: <20210609212959.471209-1-jason@jlekstrand.net> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: dri-devel@lists.freedesktop.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Direct Rendering Infrastructure - Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Daniel Vetter , Jon Bloomfield , Matthew Auld , Jason Ekstrand , Dave Airlie , =?UTF-8?q?Christian=20K=C3=B6nig?= Errors-To: dri-devel-bounces@lists.freedesktop.org Sender: "dri-devel" Ever since 0eafec6d3244 ("drm/i915: Enable lockless lookup of request tracking via RCU"), the i915 driver has used SLAB_TYPESAFE_BY_RCU (it was called SLAB_DESTROY_BY_RCU at the time) in order to allow RCU on i915_request. As nifty as SLAB_TYPESAFE_BY_RCU may be, it comes with some serious disclaimers. In particular, objects can get recycled while RCU readers are still in-flight. This can be ok if everyone who touches these objects knows about the disclaimers and is careful. However, because we've chosen to use SLAB_TYPESAFE_BY_RCU for i915_request and because i915_request contains a dma_fence, we've leaked SLAB_TYPESAFE_BY_RCU and its whole pile of disclaimers to every driver in the kernel which may consume a dma_fence. We've tried to keep it somewhat contained by doing most of the hard work to prevent access of recycled objects via dma_fence_get_rcu_safe(). However, a quick grep of kernel sources says that, of the 30 instances of dma_fence_get_rcu*, only 11 of them use dma_fence_get_rcu_safe(). It's likely there bear traps in DRM and related subsystems just waiting for someone to accidentally step in them. This commit gets stops us using SLAB_TYPESAFE_BY_RCU for i915_request and, instead, does an RCU-safe slab free via rcu_call(). This should let us keep most of the perf benefits of slab allocation while avoiding the bear traps inherent in SLAB_TYPESAFE_BY_RCU. Signed-off-by: Jason Ekstrand Cc: Jon Bloomfield Cc: Daniel Vetter Cc: Christian König Cc: Dave Airlie Cc: Matthew Auld Cc: Maarten Lankhorst --- drivers/gpu/drm/i915/i915_request.c | 76 ++++++++++++++++------------- 1 file changed, 43 insertions(+), 33 deletions(-) diff --git a/drivers/gpu/drm/i915/i915_request.c b/drivers/gpu/drm/i915/i915_request.c index e531c74f0b0e2..55fa938126100 100644 --- a/drivers/gpu/drm/i915/i915_request.c +++ b/drivers/gpu/drm/i915/i915_request.c @@ -111,9 +111,44 @@ void intel_engine_free_request_pool(struct intel_engine_cs *engine) if (!engine->request_pool) return; + /* + * It's safe to free this right away because we always put a fresh + * i915_request in the cache that's never been touched by an RCU + * reader. + */ kmem_cache_free(global.slab_requests, engine->request_pool); } +static void __i915_request_free(struct rcu_head *head) +{ + struct i915_request *rq = container_of(head, typeof(*rq), fence.rcu); + + kmem_cache_free(global.slab_requests, rq); +} + +static void i915_request_free_rcu(struct i915_request *rq) +{ + /* + * Because we're on a slab allocator, memory may be re-used the + * moment we free it. There is no kfree_rcu() equivalent for + * slabs. Instead, we hand-roll it here with call_rcu(). This + * gives us all the perf benefits to slab allocation while ensuring + * that we never release a request back to the slab until there are + * no more readers. + * + * We do have to be careful, though, when calling kmem_cache_destroy() + * as there may be outstanding free requests. This is solved by + * inserting an rcu_barrier() before kmem_cache_destroy(). An RCU + * barrier is sufficient and we don't need synchronize_rcu() + * because the call_rcu() here will wait on any outstanding RCU + * readers and the rcu_barrier() will wait on any outstanding + * call_rcu() callbacks. So, if there are any readers who once had + * valid references to a request, rcu_barrier() will end up waiting + * on them by transitivity. + */ + call_rcu(&rq->fence.rcu, __i915_request_free); +} + static void i915_fence_release(struct dma_fence *fence) { struct i915_request *rq = to_request(fence); @@ -127,8 +162,7 @@ static void i915_fence_release(struct dma_fence *fence) */ i915_sw_fence_fini(&rq->submit); i915_sw_fence_fini(&rq->semaphore); - - kmem_cache_free(global.slab_requests, rq); + i915_request_free_rcu(rq); } const struct dma_fence_ops i915_fence_ops = { @@ -933,35 +967,6 @@ __i915_request_create(struct intel_context *ce, gfp_t gfp) */ ensure_cached_request(&ce->engine->request_pool, gfp); - /* - * Beware: Dragons be flying overhead. - * - * We use RCU to look up requests in flight. The lookups may - * race with the request being allocated from the slab freelist. - * That is the request we are writing to here, may be in the process - * of being read by __i915_active_request_get_rcu(). As such, - * we have to be very careful when overwriting the contents. During - * the RCU lookup, we change chase the request->engine pointer, - * read the request->global_seqno and increment the reference count. - * - * The reference count is incremented atomically. If it is zero, - * the lookup knows the request is unallocated and complete. Otherwise, - * it is either still in use, or has been reallocated and reset - * with dma_fence_init(). This increment is safe for release as we - * check that the request we have a reference to and matches the active - * request. - * - * Before we increment the refcount, we chase the request->engine - * pointer. We must not call kmem_cache_zalloc() or else we set - * that pointer to NULL and cause a crash during the lookup. If - * we see the request is completed (based on the value of the - * old engine and seqno), the lookup is complete and reports NULL. - * If we decide the request is not completed (new engine or seqno), - * then we grab a reference and double check that it is still the - * active request - which it won't be and restart the lookup. - * - * Do not use kmem_cache_zalloc() here! - */ rq = kmem_cache_alloc(global.slab_requests, gfp | __GFP_RETRY_MAYFAIL | __GFP_NOWARN); if (unlikely(!rq)) { @@ -2116,6 +2121,12 @@ static void i915_global_request_shrink(void) static void i915_global_request_exit(void) { + /* + * We need to rcu_barrier() before destroying slab_requests. See + * i915_request_free_rcu() for more details. + */ + rcu_barrier(); + kmem_cache_destroy(global.slab_execute_cbs); kmem_cache_destroy(global.slab_requests); } @@ -2132,8 +2143,7 @@ int __init i915_global_request_init(void) sizeof(struct i915_request), __alignof__(struct i915_request), SLAB_HWCACHE_ALIGN | - SLAB_RECLAIM_ACCOUNT | - SLAB_TYPESAFE_BY_RCU, + SLAB_RECLAIM_ACCOUNT, __i915_request_ctor); if (!global.slab_requests) return -ENOMEM; -- 2.31.1