From: Matthew Brost <matthew.brost@intel.com>
To: Jonathan Cavitt <jonathan.cavitt@intel.com>
Cc: <intel-xe@lists.freedesktop.org>, <saurabhg.gupta@intel.com>,
<alex.zuo@intel.com>, <joonas.lahtinen@linux.intel.com>,
<jianxun.zhang@intel.com>, <shuicheng.lin@intel.com>,
<dri-devel@lists.freedesktop.org>, <Michal.Wajdeczko@intel.com>,
<michal.mrozek@intel.com>, <raag.jadav@intel.com>,
<ivan.briano@intel.com>, <matthew.auld@intel.com>,
<dafna.hirschfeld@intel.com>
Subject: Re: [PATCH v29 5/5] drm/xe/xe_vm: Implement xe_vm_get_property_ioctl
Date: Tue, 2 Dec 2025 13:51:08 -0800 [thread overview]
Message-ID: <aS9fTA8q4N5gyBEN@lstrano-desk.jf.intel.com> (raw)
In-Reply-To: <20251202184636.96142-12-jonathan.cavitt@intel.com>
On Tue, Dec 02, 2025 at 06:46:42PM +0000, Jonathan Cavitt wrote:
> Add support for userspace to request a list of observed faults
> from a specified VM.
>
> v2:
> - Only allow querying of failed pagefaults (Matt Brost)
>
> v3:
> - Remove unnecessary size parameter from helper function, as it
> is a property of the arguments. (jcavitt)
> - Remove unnecessary copy_from_user (Jainxun)
> - Set address_precision to 1 (Jainxun)
> - Report max size instead of dynamic size for memory allocation
> purposes. Total memory usage is reported separately.
>
> v4:
> - Return int from xe_vm_get_property_size (Shuicheng)
> - Fix memory leak (Shuicheng)
> - Remove unnecessary size variable (jcavitt)
>
> v5:
> - Rename ioctl to xe_vm_get_faults_ioctl (jcavitt)
> - Update fill_property_pfs to eliminate need for kzalloc (Jianxun)
>
> v6:
> - Repair and move fill_faults break condition (Dan Carpenter)
> - Free vm after use (jcavitt)
> - Combine assertions (jcavitt)
> - Expand size check in xe_vm_get_faults_ioctl (jcavitt)
> - Remove return mask from fill_faults, as return is already -EFAULT or 0
> (jcavitt)
>
> v7:
> - Revert back to using xe_vm_get_property_ioctl
> - Apply better copy_to_user logic (jcavitt)
>
> v8:
> - Fix and clean up error value handling in ioctl (jcavitt)
> - Reapply return mask for fill_faults (jcavitt)
>
> v9:
> - Future-proof size logic for zero-size properties (jcavitt)
> - Add access and fault types (Jianxun)
> - Remove address type (Jianxun)
>
> v10:
> - Remove unnecessary switch case logic (Raag)
> - Compress size get, size validation, and property fill functions into a
> single helper function (jcavitt)
> - Assert valid size (jcavitt)
>
> v11:
> - Remove unnecessary else condition
> - Correct backwards helper function size logic (jcavitt)
>
> v12:
> - Use size_t instead of int (Raag)
>
> v13:
> - Remove engine class and instance (Ivan)
>
> v14:
> - Map access type, fault type, and fault level to user macros (Matt
> Brost, Ivan)
>
> v15:
> - Remove unnecessary size assertion (jcavitt)
>
> v16:
> - Nit fixes (Matt Brost)
>
> v17:
> - Rebase and refactor (jcavitt)
>
> v18:
> - Do not copy_to_user in critical section (Matt Brost)
> - Assert args->size is multiple of sizeof(struct xe_vm_fault) (Matt
> Brost)
>
> v19:
> - Remove unnecessary memset (Matt Brost)
>
> Signed-off-by: Jonathan Cavitt <jonathan.cavitt@intel.com>
> Suggested-by: Matthew Brost <matthew.brost@intel.com>
Reviewed-by: Matthew Brost <matthew.brost@intel.com>
> Cc: Jainxun Zhang <jianxun.zhang@intel.com>
> Cc: Shuicheng Lin <shuicheng.lin@intel.com>
> Cc: Raag Jadav <raag.jadav@intel.com>
> Cc: Ivan Briano <ivan.briano@intel.com>
> ---
> drivers/gpu/drm/xe/xe_device.c | 2 +
> drivers/gpu/drm/xe/xe_vm.c | 117 +++++++++++++++++++++++++++++++++
> drivers/gpu/drm/xe/xe_vm.h | 3 +
> 3 files changed, 122 insertions(+)
>
> diff --git a/drivers/gpu/drm/xe/xe_device.c b/drivers/gpu/drm/xe/xe_device.c
> index 1197f914ef77..69baf01f008a 100644
> --- a/drivers/gpu/drm/xe/xe_device.c
> +++ b/drivers/gpu/drm/xe/xe_device.c
> @@ -207,6 +207,8 @@ static const struct drm_ioctl_desc xe_ioctls[] = {
> DRM_IOCTL_DEF_DRV(XE_MADVISE, xe_vm_madvise_ioctl, DRM_RENDER_ALLOW),
> DRM_IOCTL_DEF_DRV(XE_VM_QUERY_MEM_RANGE_ATTRS, xe_vm_query_vmas_attrs_ioctl,
> DRM_RENDER_ALLOW),
> + DRM_IOCTL_DEF_DRV(XE_VM_GET_PROPERTY, xe_vm_get_property_ioctl,
> + DRM_RENDER_ALLOW),
> };
>
> static long xe_drm_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
> diff --git a/drivers/gpu/drm/xe/xe_vm.c b/drivers/gpu/drm/xe/xe_vm.c
> index 41fd352dcfb2..eb293c7b7c0c 100644
> --- a/drivers/gpu/drm/xe/xe_vm.c
> +++ b/drivers/gpu/drm/xe/xe_vm.c
> @@ -3850,6 +3850,123 @@ int xe_vm_bind_ioctl(struct drm_device *dev, void *data, struct drm_file *file)
> return err;
> }
>
> +/*
> + * Map access type, fault type, and fault level from current bspec
> + * specification to user spec abstraction. The current mapping is
> + * 1-to-1, but if there is ever a hardware change, we will need
> + * this abstraction layer to maintain API stability through the
> + * hardware change.
> + */
> +static u8 xe_to_user_access_type(u8 access_type)
> +{
> + return access_type;
> +}
> +
> +static u8 xe_to_user_fault_type(u8 fault_type)
> +{
> + return fault_type;
> +}
> +
> +static u8 xe_to_user_fault_level(u8 fault_level)
> +{
> + return fault_level;
> +}
> +
> +static int fill_faults(struct xe_vm *vm,
> + struct drm_xe_vm_get_property *args)
> +{
> + struct xe_vm_fault __user *usr_ptr = u64_to_user_ptr(args->data);
> + struct xe_vm_fault *fault_list, fault_entry = { 0 };
> + struct xe_vm_fault_entry *entry;
> + int ret = 0, i = 0, count, entry_size;
> +
> + entry_size = sizeof(struct xe_vm_fault);
> + count = args->size / entry_size;
> +
> + fault_list = kcalloc(count, sizeof(struct xe_vm_fault), GFP_KERNEL);
> + if (!fault_list)
> + return -ENOMEM;
> +
> + spin_lock(&vm->faults.lock);
> + list_for_each_entry(entry, &vm->faults.list, list) {
> + if (i == count)
> + break;
> +
> + fault_entry.address = entry->address;
> + fault_entry.address_precision = entry->address_precision;
> +
> + fault_entry.access_type = xe_to_user_access_type(entry->access_type);
> + fault_entry.fault_type = xe_to_user_fault_type(entry->fault_type);
> + fault_entry.fault_level = xe_to_user_fault_level(entry->fault_level);
> +
> + memcpy(&fault_list[i], &fault_entry, entry_size);
> +
> + i++;
> + }
> + spin_unlock(&vm->faults.lock);
> +
> + ret = copy_to_user(usr_ptr, fault_list, args->size);
> +
> + kfree(fault_list);
> + return ret ? -EFAULT : 0;
> +}
> +
> +static int xe_vm_get_property_helper(struct xe_vm *vm,
> + struct drm_xe_vm_get_property *args)
> +{
> + size_t size;
> +
> + switch (args->property) {
> + case DRM_XE_VM_GET_PROPERTY_FAULTS:
> + spin_lock(&vm->faults.lock);
> + size = size_mul(sizeof(struct xe_vm_fault), vm->faults.len);
> + spin_unlock(&vm->faults.lock);
> +
> + if (!args->size) {
> + args->size = size;
> + return 0;
> + }
> +
> + /*
> + * Number of faults may increase between calls to
> + * xe_vm_get_property_ioctl, so just report the number of
> + * faults the user requests if it's less than or equal to
> + * the number of faults in the VM fault array.
> + *
> + * We should also at least assert that the args->size value
> + * is a multiple of the xe_vm_fault struct size.
> + */
> + if (args->size > size || args->size % sizeof(struct xe_vm_fault))
> + return -EINVAL;
> +
> + return fill_faults(vm, args);
> + }
> + return -EINVAL;
> +}
> +
> +int xe_vm_get_property_ioctl(struct drm_device *drm, void *data,
> + struct drm_file *file)
> +{
> + struct xe_device *xe = to_xe_device(drm);
> + struct xe_file *xef = to_xe_file(file);
> + struct drm_xe_vm_get_property *args = data;
> + struct xe_vm *vm;
> + int ret = 0;
> +
> + if (XE_IOCTL_DBG(xe, args->reserved[0] || args->reserved[1] ||
> + args->reserved[2]))
> + return -EINVAL;
> +
> + vm = xe_vm_lookup(xef, args->vm_id);
> + if (XE_IOCTL_DBG(xe, !vm))
> + return -ENOENT;
> +
> + ret = xe_vm_get_property_helper(vm, args);
> +
> + xe_vm_put(vm);
> + return ret;
> +}
> +
> /**
> * xe_vm_bind_kernel_bo - bind a kernel BO to a VM
> * @vm: VM to bind the BO to
> diff --git a/drivers/gpu/drm/xe/xe_vm.h b/drivers/gpu/drm/xe/xe_vm.h
> index e9f2de4189e0..f2675ec9e8c4 100644
> --- a/drivers/gpu/drm/xe/xe_vm.h
> +++ b/drivers/gpu/drm/xe/xe_vm.h
> @@ -210,6 +210,9 @@ int xe_vm_destroy_ioctl(struct drm_device *dev, void *data,
> int xe_vm_bind_ioctl(struct drm_device *dev, void *data,
> struct drm_file *file);
> int xe_vm_query_vmas_attrs_ioctl(struct drm_device *dev, void *data, struct drm_file *file);
> +int xe_vm_get_property_ioctl(struct drm_device *dev, void *data,
> + struct drm_file *file);
> +
> void xe_vm_close_and_put(struct xe_vm *vm);
>
> static inline bool xe_vm_in_fault_mode(struct xe_vm *vm)
> --
> 2.43.0
>
next prev parent reply other threads:[~2025-12-02 21:51 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-12-02 18:46 [PATCH v29 0/5] drm/xe/xe_vm: Implement xe_vm_get_property_ioctl Jonathan Cavitt
2025-12-02 18:46 ` [PATCH v29 1/5] drm/xe/xe_pagefault: Disallow writes to read-only VMAs Jonathan Cavitt
2025-12-02 18:46 ` [PATCH v29 2/5] drm/xe/xe_pagefault: Track address precision per pagefault Jonathan Cavitt
2025-12-02 21:45 ` Matthew Brost
2025-12-03 3:00 ` Matthew Brost
2025-12-02 18:46 ` [PATCH v29 3/5] drm/xe/uapi: Define drm_xe_vm_get_property Jonathan Cavitt
2025-12-04 22:46 ` ivan.briano
2025-12-02 18:46 ` [PATCH v29 4/5] drm/xe/xe_vm: Add per VM fault info Jonathan Cavitt
2025-12-02 21:48 ` Matthew Brost
2025-12-02 18:46 ` [PATCH v29 5/5] drm/xe/xe_vm: Implement xe_vm_get_property_ioctl Jonathan Cavitt
2025-12-02 21:51 ` Matthew Brost [this message]
2025-12-02 21:29 ` ✗ CI.checkpatch: warning for " Patchwork
2025-12-02 21:30 ` ✓ CI.KUnit: success " Patchwork
2025-12-02 21:52 ` [PATCH v29 0/5] " Matthew Brost
2025-12-02 22:03 ` Cavitt, Jonathan
2025-12-02 22:31 ` ✓ Xe.CI.BAT: success for " Patchwork
2025-12-03 5:53 ` ✗ Xe.CI.Full: failure " Patchwork
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=aS9fTA8q4N5gyBEN@lstrano-desk.jf.intel.com \
--to=matthew.brost@intel.com \
--cc=Michal.Wajdeczko@intel.com \
--cc=alex.zuo@intel.com \
--cc=dafna.hirschfeld@intel.com \
--cc=dri-devel@lists.freedesktop.org \
--cc=intel-xe@lists.freedesktop.org \
--cc=ivan.briano@intel.com \
--cc=jianxun.zhang@intel.com \
--cc=jonathan.cavitt@intel.com \
--cc=joonas.lahtinen@linux.intel.com \
--cc=matthew.auld@intel.com \
--cc=michal.mrozek@intel.com \
--cc=raag.jadav@intel.com \
--cc=saurabhg.gupta@intel.com \
--cc=shuicheng.lin@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox