00:15 pabs:wonders where fdobridge is bridging to
00:20 airlied: pabs: discord
00:20 karolherbst: there are no mems there
00:20 karolherbst: *memes
00:41 pabs:ew
00:43 karolherbst: yeah..... atm just trying out various things and to know what's out there, but I have the feeling that if fdo switches over to something different than IRC, it might be zulip
00:43 karolherbst: it's saw how evertyhing sucks in their own way
00:44 karolherbst: *sad
00:45 karolherbst: not gonna lie, discord is the best platform from a feature perspective and the only downside is it's not FOSS and you can't host it yourself
00:45 airlied: and they ban people very quick
00:45 karolherbst: evertyhing else is just sad in comparison
00:45 karolherbst: yeah.. that's a "can't host it yourself" problem though
00:46 airlied: I count it as a major negative if your contributors can't use the service no matter who hosts it
00:46 karolherbst: sometimes thinking about pulling the bridges, but some users won't use IRC
00:46 i509VCB: There was a self hosted alternative to discord I recall, can't remember the name of head
00:46 karolherbst: there are a few
00:46 karolherbst: but zulip seems to be the closest one
00:46 karolherbst: didn't try it out though
00:46 karolherbst: that's what I plan for the weekend
00:47 i509VCB: Not zulip
00:47 airlied: like it's inconvenient when you can't chat to your gamer friends, but when you can't do work because a platform bans you it's not a suitable platform for working on
00:48 karolherbst: yeah, I don't disagree
00:48 karolherbst: just saying it's the best alternative if it wouldn't be for that
00:48 airlied: I thought matrix was the new irc
00:48 karolherbst: ewww
00:49 i509VCB: Revolt was what I was thinking of
00:49 karolherbst: matrix is like IRC just persistent messages
00:49 karolherbst: ahhh
00:50 karolherbst: i509VCB: revolt can't do oauth logins, can it?
00:51 i509VCB: No idea, I haven't been involved with the group that experimented with in a while
00:51 i509VCB: I wouldn't mind an fdo discourse instance to be fair
00:51 karolherbst: yeah.... I kind of want to require oauth so we can plug in our fdo gitlab server there
00:52 karolherbst: I think discourse is a bit too much
00:52 karolherbst: discourse isn't really a chat plattform
00:53 karolherbst: zulip has this interesting mix of being mainly a chat, but also allows you do to more threading type of conversation
00:53 karolherbst: also I'd like to have video/screensharing integration for extra lols
00:53 karolherbst: like what if you want to get together with 2 or 3 others and do some coding together
00:53 i509VCB: The druid folks live on the xi editor zulip and it seems to work fine for them
00:54 karolherbst: or want to give a quick ad hoc presentation outside of XDCs timeline
00:54 karolherbst: mattermost would be also an idea, but that's also a bit too much
00:55 karolherbst: I'd consider revolt if we could login via gitlab
00:55 i509VCB: Yeah the problem is discord vertically integrated all those features and we have to use irc, jitsi and then xdc
00:55 karolherbst: but it doesn't seem to support that
00:55 i509VCB: karolherbst: I checked there is an oauth issue but no oauth
00:55 karolherbst: yeah..
00:55 karolherbst: my feeling says that it probably will be zulip
00:55 i509VCB: Rust backend though :)
00:56 karolherbst: right
00:57 karolherbst: anyway, my plan is to setup a zulip server locally and if I think it's worth a shot try to host it somewhere and do the same as on discord atm. At least we can use the same bridge as it also supports zulip
00:59 karolherbst: ohhhhh wait
01:00 karolherbst: zulips hosting is free for open source projects.. interesting...
01:01 karolherbst: it usually costs $6.67 per user per month.. wondering what they say if we come around with like 1000 of users :D
01:12 i509VCB: Probably less expensive than Rust's zulip still
01:14 karolherbst: ehhh.. mhh.. maybe zulip isn't it in the end...
01:15 i509VCB: I wonder when "fine we will write it ourselves" will appear as an option
01:15 karolherbst: uhm....
01:16 karolherbst: I guess I'd rather add support for gitlab oauth to Revolt
01:19 airlied: karolherbst: you know about address space limits?
01:19 karolherbst: mhh? in which sense you mena?
01:19 karolherbst: *mean
01:19 airlied: like what parts of the hw have bitsize limits
01:20 karolherbst: ahh.. yeah
01:20 karolherbst: I think push buffers have some weirdo 40 bit limit
01:21 airlied: seeing a compute test fail if I allocate from the top of 40-bit space, but passes if I set vma to alloc from bottom
01:21 karolherbst: but besides that not really. Normally it's all 48 bit
01:21 karolherbst: airlied: yeah.. try to only allocate push buffers below 40 bit
01:21 karolherbst: that might just fix it
01:22 airlied:thought I was doing everything below 40
01:22 karolherbst: could be the limit was sometihng else
01:22 airlied: yeah wondering if the qmd stuff has other limits
01:22 karolherbst: but I think skeggsb_ said something about them being special
01:22 karolherbst: mhhh
01:22 karolherbst: potentially?
01:23 karolherbst: maybe some alignment problem instead?
01:23 karolherbst: does the hardware complain? and how?
01:23 airlied: yeah it could be that as well
01:23 airlied: lots of traps with MULTIPLE_WARP_ERRORS
01:23 karolherbst: okay..
01:23 karolherbst: so the shader is running
01:24 karolherbst: well..
01:24 karolherbst: but what kind of warp errors?
01:24 airlied: https://paste.centos.org/view/03f772b1 is an example
01:25 airlied: I was hoping we'd just messed up another mask, but can't spot it :-P
01:25 karolherbst: looks like images are busted
01:25 karolherbst: at least the TPC complains
01:26 karolherbst: airlied: what about compute shaders not doing image related things?
01:27 airlied: test has ssbo only I think
01:27 airlied: dEQP-VK.binding_model.buffer_device_address.set0.depth2.basessbo.load.store.multi.std140.comp
01:27 karolherbst: depth?
01:27 karolherbst: could dump the nir
01:29 airlied: oh it does indeed have an image
01:29 karolherbst: yeah.. would be surprised why the TPC complains otherwise
01:30 karolherbst: but would also be nice if we'd know why it complains
01:41 karolherbst: airlied: anyway, my bet would be on badly alligned images :p
01:41 karolherbst: also.. sleep
02:11 airlied: jekstrand: you understand dma fence errors? does userspace get notified via syncobj wait if a fence is signalled in error?
02:11 airlied: or how is userspace expected to notice that sort of failure?
02:22 airlied: dakr: ^ was asking about it
02:32 dakr: airlied, jekstrand: afaics syncobj don't consider dma_fence_get_status(), hence if a fence gets signaled with fence->error being set the syncobj wait ioctl() should still return 0
03:07 airlied: karolherbst: I think it's a bug around bindless image address and sustp
03:07 airlied: so probably in codegen
03:21 airlied: jekstrand: I think there's some bug with bindless images address > 32 bits
03:22 airlied: might be in descriptor lowering, but I don't totally understand it all yet
03:33 airlied: hmm might not be that either
03:33 airlied: definitely a 32-bit limit somewhere in buffer or image encoding
07:24 airlied: Pass: 223283, Fail: 4841, Crash: 867, Warn: 4, Skip: 1394954, Timeout: 3, Flake: 13304, Duration: 3:16:35, Remaining: 0
07:24 airlied: seems better with alloc vma space from lower bounds
09:25 fdobridge: <kā€‹arolherbstšŸ§šŸ¦€> I suspect codegen has terrible 64 ptr handling bugs
09:25 fdobridge: <kā€‹arolherbstšŸ§šŸ¦€> normally we only end up with ptrs below 32 bit
14:15 fdobridge: <jā€‹ekstrand> fence errors are evil. We shouldn't rely on them.
14:19 dakr: jekstrand, In nouveau, when a channel faults, the fence is signaled (and fence->error is set) when the fence context is killed. In such a case a syncobj wait ioctl would return with 0. How would userspace know it can't trust the result of the exec job without considering the fence error?
14:27 fdobridge: <jā€‹ekstrand> It should be looking for any sort of device loss event which can be communicated in other ways.
14:28 fdobridge: <jā€‹ekstrand> Fence errors are mostly ok if they remain within a single context but the moment you start leaking them around, things get tricky.
14:29 fdobridge: <jā€‹ekstrand> We had problems with i915 for a while where a hang in a client app would kill the X server because we were trying to preserve fence errors.
14:29 fdobridge: <jā€‹ekstrand> So maybe "evil" was a bit strong but we shouldn't rely on them as the only mechanism and we need to be very careful how we let them propagate.
14:30 fdobridge: <jā€‹ekstrand> From a userspace driver POV, we need some sort of very fast query for "is my channel still alive?" which gets checked periodically.
14:33 dakr: jekstrand, the only other way to query it would probably be another ioctl() to check after the syncobj wait ioctl returns..
14:35 dakr: actually, I probably wouldn't consider the fence->error as return value for the syncobj wait ioctl, but put it into struct drm_syncobj_wait and struct drm_syncobj_timeline_wait, both have a 32bit padding field at the end which could be used..
14:35 fdobridge: <jā€‹ekstrand> Yup, it means another ioctl.
14:35 fdobridge: <jā€‹ekstrand> But that's important because when you do syncobj wait, you have no idea where that fence came from. It may have come from your context or some entirely unrelated context.
14:36 fdobridge: <jā€‹ekstrand> You don't want to kill your context just because some unrelated context hung
14:36 fdobridge: <kā€‹arolherbstšŸ§šŸ¦€> we kind of already have that ioctl, it's just very stupid to use
14:36 fdobridge: <jā€‹ekstrand> No, dummy submit is not that ioctl
14:36 fdobridge: <kā€‹arolherbstšŸ§šŸ¦€> I know, that's why I said stupid
14:44 dakr: jekstrand, for a certain uapi we should know the context the syncobj's fence came from and hence what the error code means.
14:53 fdobridge: <jā€‹ekstrand> If you assume that the kernel wraps every fence it receives in another contex-specific fence before sticking it on the syncobj, yes. That's an implementation detail, not something userspace should assume.
14:54 fdobridge: <jā€‹ekstrand> Especially when you start sharing synchronization primitives across processes which is what drm_syncobj is designed for.
15:26 fdobridge: <jā€‹ekstrand> In particular, if we have an imported semaphore or fence, we can't tell the difference between one that was exported from our context and re-imported vs. something that came from some other context.
15:26 fdobridge: <jā€‹ekstrand> We could, in theory, track all the semaphores which have never and will never be shared and trust the error codes coming from them and ignore everything that might be shared.
15:27 fdobridge: <jā€‹ekstrand> If we need to do that for a perf reason, I guess we could. Seems easier to just ioctl every once in a while, though.
15:53 dakr: jekstrand, sure, that's what I mean, it would only be meaningful for syncobjs that were directly attached to an operation via a driver specific ioctl, where the result is defined for this particular uapi. for all other cases, where a syncobj is fed into a chain of operations, userspace can't detect if all of the chain's operations were successful or not anyways.
15:56 dakr: but yeah, another ioctl would probably be more obvious.
16:01 dakr: though, the result of the ioctl wouldn't necessarily relate to the job that was signaled to be finished, since in between the ioctls another queued job could have caused the channel fault.
16:08 fdobridge: <jā€‹ekstrand> Sure, but if a queued thing faulted, it may have also scribbled over memory used by the thing you're waiting on meaning that you can't trust those results either, regardless of whether or not it was that job that faulted.
17:26 dakr: jekstrand, yeah, true. then I'll probably just add another ioctl. though as karolherbst already mentioned, a dummy exec ioctl would return ENODEV too if the channel is dead.
17:28 dakr: airlied, I just pushed split/merge support if you're curious, it's still wip and only tested against not breaking existing functionality though: https://gitlab.freedesktop.org/nouvelles/kernel/-/commits/wip-split-merge
17:30 jekstrand: dakr: Yeah, but a dummy exec requires you actually have something to submit...
17:31 jekstrand: Speaking of... airlied: The new submit ioctl shoudl allow zero pushbufs.
17:32 dakr: jekstrand, it does allow it.
17:32 jekstrand: Oh, neat. Then why are we submitting a pushbuf... šŸ¤” Maybe because we're still depending on implicit sync for our explicit sync?
17:36 karolherbst: jekstrand: it still returns ENODEV if the channel is dead
17:37 karolherbst: it's the first check
17:37 jekstrand: Ok, that's not quite as bad then
17:42 jekstrand: Maybe I'll poke at modifiers again today...
17:46 jekstrand: And now I'm remembering why I gave up, lol.
17:46 jekstrand: linear....
18:04 HdkR: Who needs any modifier beyond linear? :P
18:04 jekstrand: Linear is the problem. :P
18:04 jekstrand: NV can't do linear
18:09 HdkR: whaaaa
18:10 karolherbst: well.. it can, just not when rendering depth/stencil
18:10 jekstrand: More specifically, it can't render to linear if you also have a Z/S buffer.
18:10 jekstrand: Which means that supporting the linear modifier is going to be "fun"
18:10 jekstrand: We can do literally everything else with it.
18:10 jekstrand: One option is to allocate a tiled shadow buffer, render to that, and then copy at the end of the render pass.
18:11 jekstrand: Or we can kick that to the WSI present code somehow.
18:12 jekstrand: But the more immediate problem is that I need to figure out why my system GL is giving me bogus modifiers. :-/
18:12 karolherbst: probably because it's weirdly broken since forever
18:12 karolherbst: just works well enough
18:12 jekstrand: that's not a real explanation
18:26 jekstrand: Of course using the piglit test returns a different set of modifiers than either Vulkan or X11
18:30 jekstrand: ugh... I bet the bogus modifiers are coming from KMS.