On 3/19/26 13:08, Matthew Brost wrote:
On Wed, Mar 18, 2026 at 04:59:31PM +0800, Honglei Huang wrote:
Disclaimer I haven't look at any code in this series yet.
On 3/17/26 19:48, Christian König wrote:
Adding a few XE and drm_gpuvm people on TO.
On 3/17/26 12:29, Honglei Huang wrote:
From: Honglei Huang <[email protected]>
This is a POC/draft patch series of SVM feature in amdgpu based on the
drm_gpusvm framework. The primary purpose of this RFC is to validate
the framework's applicability, identify implementation challenges,
and start discussion on framework evolution. This is not a production
+1. Open to any ideas. Given this was designed originally for Xe we very
well could have missed other drivers requirements.
Hi Matt,
Thank you for the openness. And thank you so much for the incredibly
detailed and patient response. I really appreciate you taking the time
to walk through each point.
Actually I am still a learner when it comes to the drm_gpusvm framework
and GPU SVM design in general. Some of my descriptions below may not be
entirely accurate. But I really want to bring drm_gpusvm into amdgpu and
make it work well.
ready submission.
This patch series implements basic SVM support with the following features:
1. attributes sepatarated from physical page management:
- Attribute layer (amdgpu_svm_attr_tree): a driver side interval
tree that stores SVM attributes. Managed through the SET_ATTR,
and mmu notifier callback.
Can you explain the mmu notifier callback interaction here? See below in
Xe the attribute tree is existing VMA tree (gpuvm).
Let me try to explain, apologies if the description is not fully
precise.
In current implementation, the MMU notifier callback interacts with the
attr tree only in the munmap path remove the corresponding attribute
entries from the attr tree so that stale attributes do not persist for
freed address space.
- Physical page layer (drm_gpusvm ranges): managed by the
drm_gpusvm framework, representing actual HMM backed DMA
mappings and GPU page table entries.
This separation is necessary:
- The framework does not support range splitting, so a partial
munmap destroys the entire overlapping range, including the
still valid parts. If attributes were stored inside drm_gpusvm
ranges, they would be lost on unmapping.
The separate attr tree preserves userspace set attributes
across range operations.
Yes, in Xe the divide is at the VMA level (set by user space) via VM
bind (parts of VM may be mappings BOs, parts could be setup for SVM) or
madvise IOCTLs which reflect user space attributes on current SVM
mappings or future ones.
The SVM range tree reflects mappings that have been faulted into the
device and contain pages. This is an intentional choice.
That makes a lot of sense. Thank you for clarifying the design intent. I
think the current adopt the same principle: the drm_gpusvm range tree
only reflect actual faulted in mappings.
Isn't that actually intended? When parts of the range unmap then that usually
means the whole range isn't valid any more.
Yes, this was an intentional design choice to not support partial unmap,
and instead rely on the driver to recreate a new range.
The reasoning is:
- In practice, this should be rare for well-behaved applications.
- With THP / large device pages, if a sub-range is unmapped, the entire
GPU mapping is invalidated anyway due to the page size change. As a
result, the cost of creating a new range is minimal, since the device
will likely fault again on the remaining pages.
So there is no need to over-engineer the common code.
FWIW, to even test partial unmaps in Xe, I had to do things I doubt
anyone would ever do:
ptr = mmap(SZ_2M);
/* fault in memory to the device */
munmap(ptr, SZ_1M);
/* touch memory again on the device */
Thank you for this explanation and the concrete example. After further
discussion internally with Christian, we are now aligned with same
position partial unmap. Will remove rebuild on partial unmap logic in
the next version and handle it as only partially backed range.
It is about partial unmap, some subregion in drm_gpusvm_range is still valid
but some other subregion is invalid, but under drm_gpusvm, need to destroy
the entire range.
e.g.:
[---------------unmap region in mmu notifier-----------------]
[0x1000 ------------ 0x9000]
[ valid ][ invalid ]
see deatil in drm_gpusvm.c:110 line
section:Partial Unmapping of Ranges
- drm_gpusvm range boundaries are determined by fault address
and pre setted chunk size, not by userspace attribute boundaries.
Ranges may be rechunked on memory changes. Embedding
attributes in framework ranges would scatter attr state
across many small ranges and require complex reassemble
logic when operate attrbute.
Yeah, that makes a lot of sense.
2) System memory mapping via drm_gpusvm
The core mapping path uses drm_gpusvm_range_find_or_insert() to
create ranges, drm_gpusvm_range_get_pages() for HMM page fault
and DMA mapping, then updates GPU page tables via
amdgpu_vm_update_range().
3) IOCTL driven mapping (XNACK off / no GPU fault mode)
On XNACK off hardware the GPU cannot recover from page faults,
so mappings must be established through ioctl. When
userspace calls SET_ATTR with ACCESS=ENABLE, the driver
walks the attr tree and maps all accessible intervals
to the GPU by amdgpu_svm_range_map_attr_ranges().
Can you expand on XNACK off / GPU no faults? Is this to the share GPU
between 3D (dma-fences) and faulting clients? We have something similar
in Xe, but it isn't an explicit IOCTL rather we switch between on demand
as 3D client submits and then resumes page faults when all dma-fences
have signaled.
I see below you mention page tables are modified during quiesce KFD
queues? I'm not sure that is required - you just need to guarnette
faulting clients won't trigger page faults when dma-fence is in flight.
Maybe give me an explaination of exactly what the requirement from AMD
are here so I have better picture.
Thank you for the patience, let me try to explain our situation, though
I may not get every detail right.
XNACK off means hardware that does not have GPU page fault capability
(or turned off)
So for these GPUs, ALL page table entries must be fully populated before
the GPU can access the memory. This is why we need the ioctl driven
mapping path, when userspace calls SET_ATTR with ACCESS=ENABLE, need
walk the attribute tree and eagerly map all accessible ranges into the
GPU page tables. This is functionally similar to what you describe as
prefetch IOCTLs / VM bind in Xe.
Regarding queue quiesce during page table modification: on XNACK off
hardware, because the GPU cannot fault, we must ensure the GPU is
completely stopped before modifying any PTE it might be accessing.
Otherwise the GPU could access a partially updated page table and hang.
The quiesce/resume is the mechanism to guarantee this.
I hope that helps clarify the picture.
4) Invalidation, GC worker, and restore worker
MMU notifier callbacks (amdgpu_svm_range_invalidate) handle
three cases based on event type and hardware mode:
- unmap event: clear GPU PTEs in the notifier context,
unmap DMA pages, mark ranges as unmapped, flush TLB,
and enqueue to the GC worker. On XNACK off, also
quiesce KFD queues and schedule rebuild of the
still valid portions that were destroyed together with
the unmapped subregion.
- evict on XNACK off:
quiesce KFD queues first, then unmap DMA pages and
enqueue to the restore worker.
Is that done through the DMA fence or by talking directly to the MES/HWS?
Currently KFD queues quiesce/resume API are reused, lookig forward to a
better solution.
+1
Regards,
Honglei
Thanks,
Christian.
- evict on XNACK on:
clear GPU PTEs, unmap DMA pages, and flush TLB, but do
not schedule any worker. The GPU will fault on next
access and the fault handler establishes the mapping.
Not supported feature:
- XNACK on GPU page fault mode
- migration and prefetch feature
- Multi GPU support
XNACK on enablement is ongoing.The GPUs that support XNACK on
are currently only accessible to us via remote lab machines, which slows
down progress.
Patch overview:
01/12 UAPI definitions: DRM_AMDGPU_GEM_SVM ioctl, SVM flags,
SET_ATTR/GET_ATTR operations, attribute types, and related
structs in amdgpu_drm.h.
02/12 Core data structures: amdgpu_svm wrapping drm_gpusvm with
refcount, attr_tree, workqueues, locks, and
callbacks (begin/end_restore, flush_tlb).
03/12 Attribute data structures: amdgpu_svm_attrs, attr_range
(interval tree node), attr_tree, access enum, flag masks,
and change trigger enum.
04/12 Attribute tree operations: interval tree lookup, insert,
remove, and tree create/destroy lifecycle.
05/12 Attribute set: validate UAPI attributes, apply to internal
attrs, handle hole/existing range with head/tail splitting,
compute change triggers, and -EAGAIN retry loop.
Implements attr_clear_pages for unmap cleanup and attr_get.
06/12 Range data structures: amdgpu_svm_range extending
drm_gpusvm_range with gpu_mapped state, pending ops,
pte_flags cache, and GC/restore queue linkage.
07/12 PTE flags and GPU mapping: simple gpu pte function,
GPU page table update with DMA address, range mapping loop:
find_or_insert -> get_pages -> validate -> update PTE,
and attribute change driven mapping function.
08/12 Notifier and invalidation: synchronous GPU PTE clear in
notifier context, range removal and overlap cleanup,
rebuild after destroy logic, and MMU event dispatcher
09/12 Workers: KFD queue quiesce/resume via kgd2kfd APIs, GC
worker for unmap processing and rebuild, ordered restore
worker for mapping evicted ranges, and flush/sync
helpers.
10/12 Initialization and fini: kmem_cache for range/attr,
drm_gpusvm_init with chunk sizes, XNACK detection, TLB
flush helper, and amdgpu_svm init/close/fini lifecycle.
11/12 IOCTL and fault handler: PASID based SVM lookup with kref
protection, amdgpu_gem_svm_ioctl dispatcher, and
amdgpu_svm_handle_fault for GPU page fault recovery.
12/12 Build integration: Kconfig option (CONFIG_DRM_AMDGPU_SVM),
Makefile rules, ioctl table registration, and amdgpu_vm
hooks (init in make_compute, close/fini, fault dispatch).
Test result:
on gfx1100(W7900) and gfx943(MI300x)
kfd test: 95%+ passed, same failed cases with offical relase
rocr test: all passed
hip catch test: 20 cases failed in all 5366 cases, +13 failures vs offical
relase
During implementation we identified several challenges / design questions:
1. No range splitting on partial unmap
drm_gpusvm explicitly does not support range splitting in drm_gpusvm.c:122.
Partial munmap needs to destroy the entire range including the valid
interval.
GPU fault driven hardware can handle this design by extra gpu fault handle,
but AMDGPU needs to support XNACK off hardware, this design requires driver
rebuild the valid part in the removed entire range. Whichs bring a very
heavy
restore work in work queue/GC worker: unmap/destroy -> rebuild(insert and
map)
this restore work even heavier than kfd_svm. In previous driver work queue
only needs to restore or unmap, but in drm_gpusvm driver needs to unmap and
restore.
which brings about more complex logic, heavier worker queue workload, and
synchronization issues.
Is this common in the workload you are running? I'm also wondering if
your restore logic / KFDs design is contributing to this actally the
problem.
Honestly, you raise a fair point.
We will redesign the logic about the partial munap, which should
eliminate most of this complexity.
2. Fault driven vs ioctl driven mapping
drm_gpusvm is designed around GPU page fault handlers. The primary entry
point drm_gpusvm_range_find_or_insert() takes a fault_addr.
AMDGPU needs to support IOCTL driven mapping cause No XNACK hardware that
GPU cannot fault at all
I think we refer to these as prefetch IOCTLs in Xe. Ideally, user space
issues these so the device does not fault (e.g., prefetch creates a set
of SVM ranges based on user input). In Xe, prefetch IOCTLs are simply
specific VM bind operations.
That is a very helpful way to think about it. Yes, our ioctl driven
mapping(xnack off) is essentially equivalent to a prefetch operation. We
are trying to improve it.
The ioctl path cannot hold mmap_read_lock across the entire operation
because drm_gpusvm_range_find_or_insert() acquires/releases it
internally. This creates race windows with MMU notifiers / workers.
This is a very intentional choice in the locking design: mmap_read_lock
is held only in very specific parts of GPU SVM, and the driver should
never need to take this lock.
Yes, notifiers can race, which is why the GPU fault handler and prefetch
handler are structured as retry loops when a notifier race is detected.
In practice, with well-behaved applications, these races should be
rare—but they do occur, and the driver must handle them.
__xe_svm_handle_pagefault implements the page fault retry loop. VM bind
prefetch has similar logic, although it is more spread out given that it
is part of a deeper software pipeline.
FWIW, holding locks to avoid races was rejected by Sima because we
reasoned it is essentially impossible to guarantee the absence of races
by holding a lock. CPU page fault handlers are also effectively just
large retry loops.
So this is one point I believe you will need to fixup driver side.
Understood. Thank you for the detailed explanation and for pointing to
__xe_svm_handle_pagefault as a reference. We will restructure both our
fault handler and ioctl path to a betterretry loop pattern with sequence
number race detection.
3. Multi GPU support
drm_gpusvm binds one drm_device to one instance. In multi GPU systems,
each GPU gets an independent instance with its own range tree, MMU
notifiers, notifier_lock, and DMA mappings.
This is a part I am absolutely open to fixing. Right now, each
drm_gpusvm_range has a single set of drm_gpusvm_pages. I am open to
decoupling a GPU SVM instance from a single device, allowing each
drm_gpusvm_range to have multiple sets of drm_gpusvm_pages (one per
device).
This would give drivers the flexibility to use one GPU SVM instance per
VM/device instance (as in Xe), or to maintain a single GPU SVM per CPU
MM.
That would be wonderful! Looking forward to your patch very much!
This may brings huge overhead:
- N x MMU notifier registrations for the same address range
The notifier overhead is a real concern. We recently introduced two-pass
notifiers [1] to speed up multi-device notifiers. At least in Xe, the
TLB invalidations—which are the truly expensive part—can be pipelined
using the two=pass approach. Currently, [1] only implements two-pass
notifiers for userptr, but Xe’s GPU SVM will be updated to use them
shortly.
[1] https://patchwork.freedesktop.org/series/153280/
Thank you for the pointer to two-pass notifiers. Will study this
series.
- N x hmm_range_fault() calls for the same page (KFD: 1x)
hmm_range_fault is extremely fast compared to the actual migration.
Running hmm_range_fault on a 2MB region using 4KB pages takes less
than 1µs. With THP or large device pages [2] (merged last week), it’s
around 1/20 of a microsecond. So I wouldn’t be too concerned about this.
[2] https://patchwork.freedesktop.org/series/163141/
That is very helpful data. Perhaps worry too much.
- N x DMA mapping memory
You will always have N x DMA mapping memory if the pages are in system
memory as the dma-mapping API is per device.
Totally agreed.
- N x invalidation + restore worker scheduling per CPU unmap event
- N x GPU page table flush / TLB invalidation
I agree you do not want serialize GPU page table flush / TLB
invalidations. Hence two-pass notifiers [1].
Yes, will learn it.
- Increased mmap_lock hold time, N callbacks serialize under it
compatibility issues:
- Quiesce/resume scope mismatch: to integrate with KFD compute
queues, the driver reuses kgd2kfd_quiesce_mm()/resume_mm()
which have process level semantics. Under the per GPU
drm_gpusvm model, maybe there are some issues on sync. To properly
integrate with KFD under the per SVM model, a compatibility or
new per VM level queue control APIs maybe need to introduced.
I thought the idea to get rid of KFD and move over to AMDGPU? I thought
Christian mentioned this to me at XDC.
Migration challenges:
- No global migration decision logic: each per GPU SVM
instance maintains its own attribute tree independently. This
allows conflicting settings (e.g., GPU0's SVM sets
PREFERRED_LOC=GPU0 while GPU1's SVM sets PREFERRED_LOC=GPU1
for the same address range) with no detection or resolution.
A global attribute coordinator or a shared manager is needed to
provide a unified global view for migration decisions
Yes, this is hole in the Xe API too. We have told UMDs if they setup
individual VMs with conflict attributes for a single CPU address space
the behavior is undefined. Our UMD implement madvise is basically loop
over al GPU VMs setting the same attributes.
Will follow the same approach for now, the UMD is responsible for
setting consistent attributes across GPU VMs.
- migrate_vma_setup broadcast: one GPU's migration triggers MMU
notifier callbacks in ALL N-1 other drm_gpusvm instances,
causing N-1 unnecessary restore workers to be scheduled. And
My feeling is that you shouldn’t reschedule restore workers unless you
actually have to invalidate page tables (i.e., you have a local SVM
range within the notifier). So the first migration to an untouched
region may trigger notifiers, but they won’t do anything because you
don’t have any valid SVM ranges yet. Subsequent mappings of the migrated
region won’t trigger a notifier unless the memory is moved again.
That is a very good point. We should check whether we actually have
valid SVM ranges before scheduling restore workers. If there is nothing
to invalidate, the notifier callback should be a no-op. We will review
our notifier callback logic to ensure we are not doing unnecessary work
here. Thank you for pointing this out.
creates races between the initiating migration and the other
instance's restore attempts.
Yes, if multiple devices try to migrate the same CPU pages at the same
time, that will race. That’s why in Xe we have a module-level
driver_migrate_lock. The first migration runs in read mode; if it
detects a race and aborts, it then takes driver_migrate_lock in write
mode so it becomes the only device allowed to move memory / CPU pages.
See xe_svm_alloc_vram() for how this is used.
I’m not sure this approach will work for you, but I just wanted to point
out that we identified this as a potential issue.
Thank you for sharing the driver_migrate_lock approach and pointing to
xe_svm_alloc_vram(). Will explore whether a similar lock pattern can
work for our case.
- No cross instance migration serialization: each per GPU
drm_gpusvm instance has independent locking, so two GPUs'
"decide -> migrate -> remap" sequences can interleave. While
the kernel page lock prevents truly simultaneous migration of
the same physical page, the losing side's retry (evict from
other GPU's VRAM -> migrate back) triggers broadcast notifier
invalidations and restore workers, compounding the ping pong
problem above.
See the driver_migrate_lock above.
Acknowledged, thank you.
- No VRAM to VRAM migration: drm_pagemap_migrate_to_devmem()
hardcodes MIGRATE_VMA_SELECT_SYSTEM (drm_pagemap.c:328), meaning
it only selects system memory pages for migration.
I think this is fixed? We did find some core MM bugs that blocked VRAM
to VRAM but those have been worked out.
The code I'm looking at:
517 int drm_pagemap_migrate_to_devmem(struct drm_pagemap_devmem
*devmem_allocation,
518 struct mm_struct *mm,
519 unsigned long start, unsigned long end,
520 const struct
drm_pagemap_migrate_details *mdetails)
521 {
522 const struct drm_pagemap_devmem_ops *ops = devmem_allocation->ops;
523 struct drm_pagemap *dpagemap = devmem_allocation->dpagemap;
524 struct dev_pagemap *pagemap = dpagemap->pagemap;
525 struct migrate_vma migrate = {
526 .start = start,
527 .end = end,
528 .pgmap_owner = pagemap->owner,
529 .flags = MIGRATE_VMA_SELECT_SYSTEM |
MIGRATE_VMA_SELECT_DEVICE_COHERENT |
530 MIGRATE_VMA_SELECT_DEVICE_PRIVATE |
MIGRATE_VMA_SELECT_COMPOUND,
531 };
Thank you for checking! I am using v6.18 for this POC, missed the fix,
will rebase to the latest.
- CPU fault reverse migration race: CPU page fault triggers
migrate_to_ram while GPU instances are concurrently operating.
Per GPU notifier_lock does not protect cross GPU operations.
No, again retry loop as discussed above.
Understood.
We believe a strong, well designed solution at the framework level is
needed to properly address these problems, and we look forward to
discussion and suggestions.
Let's work together to figure out what is missing here.
Thank you so much, Matt. Your feedback has been incredibly valuable and
has given us a much clearer picture of the framework's design.
Ireally appreciate the effort you put into building drm_gpusvm as a
shared framework. Will incorporate your suggestions into our next
revision and look forward to continuing the collaboration.
Regards,
Honglei
Matt
Honglei Huang (12):
drm/amdgpu: add SVM UAPI definitions
drm/amdgpu: add SVM data structures and header
drm/amdgpu: add SVM attribute data structures
drm/amdgpu: implement SVM attribute tree operations
drm/amdgpu: implement SVM attribute set
drm/amdgpu: add SVM range data structures
drm/amdgpu: implement SVM range PTE flags and GPU mapping
drm/amdgpu: implement SVM range notifier and invalidation
drm/amdgpu: implement SVM range workers
drm/amdgpu: implement SVM core initialization and fini
drm/amdgpu: implement SVM ioctl and fault handler
drm/amdgpu: wire up SVM build system and fault handler
drivers/gpu/drm/amd/amdgpu/Kconfig | 11 +
drivers/gpu/drm/amd/amdgpu/Makefile | 13 +
drivers/gpu/drm/amd/amdgpu/amdgpu_drv.c | 2 +
drivers/gpu/drm/amd/amdgpu/amdgpu_svm.c | 430 ++++++
drivers/gpu/drm/amd/amdgpu/amdgpu_svm.h | 147 ++
drivers/gpu/drm/amd/amdgpu/amdgpu_svm_attr.c | 894 ++++++++++++
drivers/gpu/drm/amd/amdgpu/amdgpu_svm_attr.h | 110 ++
drivers/gpu/drm/amd/amdgpu/amdgpu_svm_range.c | 1196 +++++++++++++++++
drivers/gpu/drm/amd/amdgpu/amdgpu_svm_range.h | 76 ++
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c | 40 +-
drivers/gpu/drm/amd/amdgpu/amdgpu_vm.h | 4 +
include/uapi/drm/amdgpu_drm.h | 39 +
12 files changed, 2958 insertions(+), 4 deletions(-)
create mode 100644 drivers/gpu/drm/amd/amdgpu/amdgpu_svm.c
create mode 100644 drivers/gpu/drm/amd/amdgpu/amdgpu_svm.h
create mode 100644 drivers/gpu/drm/amd/amdgpu/amdgpu_svm_attr.c
create mode 100644 drivers/gpu/drm/amd/amdgpu/amdgpu_svm_attr.h
create mode 100644 drivers/gpu/drm/amd/amdgpu/amdgpu_svm_range.c
create mode 100644 drivers/gpu/drm/amd/amdgpu/amdgpu_svm_range.h
base-commit: 7d0a66e4bb9081d75c82ec4957c50034cb0ea449