2016-12-09 21:53:05 +03:00
|
|
|
Buffer Sharing and Synchronization
|
|
|
|
==================================
|
|
|
|
|
|
|
|
The dma-buf subsystem provides the framework for sharing buffers for
|
|
|
|
hardware (DMA) access across multiple device drivers and subsystems, and
|
|
|
|
for synchronizing asynchronous hardware access.
|
|
|
|
|
|
|
|
This is used, for example, by drm "prime" multi-GPU support, but is of
|
|
|
|
course not limited to GPU use cases.
|
|
|
|
|
|
|
|
The three main components of this are: (1) dma-buf, representing a
|
|
|
|
sg_table and exposed to userspace as a file descriptor to allow passing
|
|
|
|
between devices, (2) fence, which provides a mechanism to signal when
|
2020-04-20 10:41:15 +03:00
|
|
|
one device has finished access, and (3) reservation, which manages the
|
2016-12-09 21:53:05 +03:00
|
|
|
shared or exclusive fence(s) associated with the buffer.
|
|
|
|
|
|
|
|
Shared DMA Buffers
|
|
|
|
------------------
|
|
|
|
|
2016-12-09 21:53:07 +03:00
|
|
|
This document serves as a guide to device-driver writers on what is the dma-buf
|
|
|
|
buffer sharing API, how to use it for exporting and using shared buffers.
|
|
|
|
|
|
|
|
Any device driver which wishes to be a part of DMA buffer sharing, can do so as
|
|
|
|
either the 'exporter' of buffers, or the 'user' or 'importer' of buffers.
|
|
|
|
|
|
|
|
Say a driver A wants to use buffers created by driver B, then we call B as the
|
|
|
|
exporter, and A as buffer-user/importer.
|
|
|
|
|
|
|
|
The exporter
|
|
|
|
|
|
|
|
- implements and manages operations in :c:type:`struct dma_buf_ops
|
|
|
|
<dma_buf_ops>` for the buffer,
|
|
|
|
- allows other users to share the buffer by using dma_buf sharing APIs,
|
2020-04-20 10:41:15 +03:00
|
|
|
- manages the details of buffer allocation, wrapped in a :c:type:`struct
|
2016-12-09 21:53:07 +03:00
|
|
|
dma_buf <dma_buf>`,
|
|
|
|
- decides about the actual backing storage where this allocation happens,
|
|
|
|
- and takes care of any migration of scatterlist - for all (shared) users of
|
|
|
|
this buffer.
|
|
|
|
|
|
|
|
The buffer-user
|
|
|
|
|
|
|
|
- is one of (many) sharing users of the buffer.
|
|
|
|
- doesn't need to worry about how the buffer is allocated, or where.
|
|
|
|
- and needs a mechanism to get access to the scatterlist that makes up this
|
|
|
|
buffer in memory, mapped into its own address space, so it can access the
|
|
|
|
same area of memory. This interface is provided by :c:type:`struct
|
|
|
|
dma_buf_attachment <dma_buf_attachment>`.
|
|
|
|
|
2016-12-10 00:50:55 +03:00
|
|
|
Any exporters or users of the dma-buf buffer sharing framework must have a
|
|
|
|
'select DMA_SHARED_BUFFER' in their respective Kconfigs.
|
|
|
|
|
|
|
|
Userspace Interface Notes
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
Mostly a DMA buffer file descriptor is simply an opaque object for userspace,
|
|
|
|
and hence the generic interface exposed is very minimal. There's a few things to
|
|
|
|
consider though:
|
|
|
|
|
|
|
|
- Since kernel 3.12 the dma-buf FD supports the llseek system call, but only
|
|
|
|
with offset=0 and whence=SEEK_END|SEEK_SET. SEEK_SET is supported to allow
|
|
|
|
the usual size discover pattern size = SEEK_END(0); SEEK_SET(0). Every other
|
|
|
|
llseek operation will report -EINVAL.
|
|
|
|
|
|
|
|
If llseek on dma-buf FDs isn't support the kernel will report -ESPIPE for all
|
|
|
|
cases. Userspace can use this to detect support for discovering the dma-buf
|
|
|
|
size using llseek.
|
|
|
|
|
|
|
|
- In order to avoid fd leaks on exec, the FD_CLOEXEC flag must be set
|
|
|
|
on the file descriptor. This is not just a resource leak, but a
|
|
|
|
potential security hole. It could give the newly exec'd application
|
|
|
|
access to buffers, via the leaked fd, to which it should otherwise
|
|
|
|
not be permitted access.
|
|
|
|
|
|
|
|
The problem with doing this via a separate fcntl() call, versus doing it
|
|
|
|
atomically when the fd is created, is that this is inherently racy in a
|
|
|
|
multi-threaded app[3]. The issue is made worse when it is library code
|
|
|
|
opening/creating the file descriptor, as the application may not even be
|
|
|
|
aware of the fd's.
|
|
|
|
|
|
|
|
To avoid this problem, userspace must have a way to request O_CLOEXEC
|
|
|
|
flag be set when the dma-buf fd is created. So any API provided by
|
|
|
|
the exporting driver to create a dmabuf fd must provide a way to let
|
|
|
|
userspace control setting of O_CLOEXEC flag passed in to dma_buf_fd().
|
|
|
|
|
|
|
|
- Memory mapping the contents of the DMA buffer is also supported. See the
|
|
|
|
discussion below on `CPU Access to DMA Buffer Objects`_ for the full details.
|
|
|
|
|
2020-09-09 17:10:51 +03:00
|
|
|
- The DMA buffer FD is also pollable, see `Implicit Fence Poll Support`_ below for
|
2016-12-10 00:50:55 +03:00
|
|
|
details.
|
|
|
|
|
2016-12-09 21:53:07 +03:00
|
|
|
Basic Operation and Device DMA Access
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
.. kernel-doc:: drivers/dma-buf/dma-buf.c
|
|
|
|
:doc: dma buf device access
|
|
|
|
|
2016-12-09 21:53:08 +03:00
|
|
|
CPU Access to DMA Buffer Objects
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
.. kernel-doc:: drivers/dma-buf/dma-buf.c
|
|
|
|
:doc: cpu access
|
|
|
|
|
2020-06-12 10:05:35 +03:00
|
|
|
Implicit Fence Poll Support
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
2016-12-10 00:50:55 +03:00
|
|
|
|
|
|
|
.. kernel-doc:: drivers/dma-buf/dma-buf.c
|
2020-06-12 10:05:35 +03:00
|
|
|
:doc: implicit fence polling
|
2016-12-10 00:50:55 +03:00
|
|
|
|
2016-12-09 21:53:07 +03:00
|
|
|
Kernel Functions and Structures Reference
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
2016-12-09 21:53:05 +03:00
|
|
|
.. kernel-doc:: drivers/dma-buf/dma-buf.c
|
|
|
|
:export:
|
|
|
|
|
|
|
|
.. kernel-doc:: include/linux/dma-buf.h
|
|
|
|
:internal:
|
|
|
|
|
|
|
|
Reservation Objects
|
|
|
|
-------------------
|
|
|
|
|
2019-09-27 14:15:04 +03:00
|
|
|
.. kernel-doc:: drivers/dma-buf/dma-resv.c
|
2016-12-09 21:53:05 +03:00
|
|
|
:doc: Reservation Object Overview
|
|
|
|
|
2019-09-27 14:15:04 +03:00
|
|
|
.. kernel-doc:: drivers/dma-buf/dma-resv.c
|
2016-12-09 21:53:05 +03:00
|
|
|
:export:
|
|
|
|
|
2019-09-27 14:15:04 +03:00
|
|
|
.. kernel-doc:: include/linux/dma-resv.h
|
2016-12-09 21:53:05 +03:00
|
|
|
:internal:
|
|
|
|
|
|
|
|
DMA Fences
|
|
|
|
----------
|
|
|
|
|
2018-07-04 12:29:09 +03:00
|
|
|
.. kernel-doc:: drivers/dma-buf/dma-fence.c
|
|
|
|
:doc: DMA fences overview
|
|
|
|
|
dma-fence: prime lockdep annotations
Two in one go:
- it is allowed to call dma_fence_wait() while holding a
dma_resv_lock(). This is fundamental to how eviction works with ttm,
so required.
- it is allowed to call dma_fence_wait() from memory reclaim contexts,
specifically from shrinker callbacks (which i915 does), and from mmu
notifier callbacks (which amdgpu does, and which i915 sometimes also
does, and probably always should, but that's kinda a debate). Also
for stuff like HMM we really need to be able to do this, or things
get real dicey.
Consequence is that any critical path necessary to get to a
dma_fence_signal for a fence must never a) call dma_resv_lock nor b)
allocate memory with GFP_KERNEL. Also by implication of
dma_resv_lock(), no userspace faulting allowed. That's some supremely
obnoxious limitations, which is why we need to sprinkle the right
annotations to all relevant paths.
The one big locking context we're leaving out here is mmu notifiers,
added in
commit 23b68395c7c78a764e8963fc15a7cfd318bf187f
Author: Daniel Vetter <daniel.vetter@ffwll.ch>
Date: Mon Aug 26 22:14:21 2019 +0200
mm/mmu_notifiers: add a lockdep map for invalidate_range_start/end
that one covers a lot of other callsites, and it's also allowed to
wait on dma-fences from mmu notifiers. But there's no ready-made
functions exposed to prime this, so I've left it out for now.
v2: Also track against mmu notifier context.
v3: kerneldoc to spec the cross-driver contract. Note that currently
i915 throws in a hard-coded 10s timeout on foreign fences (not sure
why that was done, but it's there), which is why that rule is worded
with SHOULD instead of MUST.
Also some of the mmu_notifier/shrinker rules might surprise SoC
drivers, I haven't fully audited them all. Which is infeasible anyway,
we'll need to run them with lockdep and dma-fence annotations and see
what goes boom.
v4: A spelling fix from Mika
v5: #ifdef for CONFIG_MMU_NOTIFIER. Reported by 0day. Unfortunately
this means lockdep enforcement is slightly inconsistent, it won't spot
GFP_NOIO and GFP_NOFS allocations in the wrong spot if
CONFIG_MMU_NOTIFIER is disabled in the kernel config. Oh well.
v5: Note that only drivers/gpu has a reasonable (or at least
historical) excuse to use dma_fence_wait() from shrinker and mmu
notifier callbacks. Everyone else should either have a better memory
manager model, or better hardware. This reflects discussions with
Jason Gunthorpe.
Cc: Jason Gunthorpe <jgg@mellanox.com>
Cc: Felix Kuehling <Felix.Kuehling@amd.com>
Cc: kernel test robot <lkp@intel.com>
Acked-by: Christian König <christian.koenig@amd.com>
Acked-by: Dave Airlie <airlied@redhat.com>
Reviewed-by: Maarten Lankhorst <maarten.lankhorst@linux.intel.com>
Reviewed-by: Thomas Hellström <thomas.hellstrom@intel.com> (v4)
Cc: Mika Kuoppala <mika.kuoppala@intel.com>
Cc: Thomas Hellstrom <thomas.hellstrom@intel.com>
Cc: linux-media@vger.kernel.org
Cc: linaro-mm-sig@lists.linaro.org
Cc: linux-rdma@vger.kernel.org
Cc: amd-gfx@lists.freedesktop.org
Cc: intel-gfx@lists.freedesktop.org
Cc: Chris Wilson <chris@chris-wilson.co.uk>
Cc: Maarten Lankhorst <maarten.lankhorst@linux.intel.com>
Cc: Christian König <christian.koenig@amd.com>
Signed-off-by: Daniel Vetter <daniel.vetter@intel.com>
Link: https://patchwork.freedesktop.org/patch/msgid/20200707201229.472834-3-daniel.vetter@ffwll.ch
2020-07-07 23:12:06 +03:00
|
|
|
DMA Fence Cross-Driver Contract
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
.. kernel-doc:: drivers/dma-buf/dma-fence.c
|
|
|
|
:doc: fence cross-driver contract
|
|
|
|
|
dma-fence: basic lockdep annotations
Design is similar to the lockdep annotations for workers, but with
some twists:
- We use a read-lock for the execution/worker/completion side, so that
this explicit annotation can be more liberally sprinkled around.
With read locks lockdep isn't going to complain if the read-side
isn't nested the same way under all circumstances, so ABBA deadlocks
are ok. Which they are, since this is an annotation only.
- We're using non-recursive lockdep read lock mode, since in recursive
read lock mode lockdep does not catch read side hazards. And we
_very_ much want read side hazards to be caught. For full details of
this limitation see
commit e91498589746065e3ae95d9a00b068e525eec34f
Author: Peter Zijlstra <peterz@infradead.org>
Date: Wed Aug 23 13:13:11 2017 +0200
locking/lockdep/selftests: Add mixed read-write ABBA tests
- To allow nesting of the read-side explicit annotations we explicitly
keep track of the nesting. lock_is_held() allows us to do that.
- The wait-side annotation is a write lock, and entirely done within
dma_fence_wait() for everyone by default.
- To be able to freely annotate helper functions I want to make it ok
to call dma_fence_begin/end_signalling from soft/hardirq context.
First attempt was using the hardirq locking context for the write
side in lockdep, but this forces all normal spinlocks nested within
dma_fence_begin/end_signalling to be spinlocks. That bollocks.
The approach now is to simple check in_atomic(), and for these cases
entirely rely on the might_sleep() check in dma_fence_wait(). That
will catch any wrong nesting against spinlocks from soft/hardirq
contexts.
The idea here is that every code path that's critical for eventually
signalling a dma_fence should be annotated with
dma_fence_begin/end_signalling. The annotation ideally starts right
after a dma_fence is published (added to a dma_resv, exposed as a
sync_file fd, attached to a drm_syncobj fd, or anything else that
makes the dma_fence visible to other kernel threads), up to and
including the dma_fence_wait(). Examples are irq handlers, the
scheduler rt threads, the tail of execbuf (after the corresponding
fences are visible), any workers that end up signalling dma_fences and
really anything else. Not annotated should be code paths that only
complete fences opportunistically as the gpu progresses, like e.g.
shrinker/eviction code.
The main class of deadlocks this is supposed to catch are:
Thread A:
mutex_lock(A);
mutex_unlock(A);
dma_fence_signal();
Thread B:
mutex_lock(A);
dma_fence_wait();
mutex_unlock(A);
Thread B is blocked on A signalling the fence, but A never gets around
to that because it cannot acquire the lock A.
Note that dma_fence_wait() is allowed to be nested within
dma_fence_begin/end_signalling sections. To allow this to happen the
read lock needs to be upgraded to a write lock, which means that any
other lock is acquired between the dma_fence_begin_signalling() call and
the call to dma_fence_wait(), and still held, this will result in an
immediate lockdep complaint. The only other option would be to not
annotate such calls, defeating the point. Therefore these annotations
cannot be sprinkled over the code entirely mindless to avoid false
positives.
Originally I hope that the cross-release lockdep extensions would
alleviate the need for explicit annotations:
https://lwn.net/Articles/709849/
But there's a few reasons why that's not an option:
- It's not happening in upstream, since it got reverted due to too
many false positives:
commit e966eaeeb623f09975ef362c2866fae6f86844f9
Author: Ingo Molnar <mingo@kernel.org>
Date: Tue Dec 12 12:31:16 2017 +0100
locking/lockdep: Remove the cross-release locking checks
This code (CONFIG_LOCKDEP_CROSSRELEASE=y and CONFIG_LOCKDEP_COMPLETIONS=y),
while it found a number of old bugs initially, was also causing too many
false positives that caused people to disable lockdep - which is arguably
a worse overall outcome.
- cross-release uses the complete() call to annotate the end of
critical sections, for dma_fence that would be dma_fence_signal().
But we do not want all dma_fence_signal() calls to be treated as
critical, since many are opportunistic cleanup of gpu requests. If
these get stuck there's still the main completion interrupt and
workers who can unblock everyone. Automatically annotating all
dma_fence_signal() calls would hence cause false positives.
- cross-release had some educated guesses for when a critical section
starts, like fresh syscall or fresh work callback. This would again
cause false positives without explicit annotations, since for
dma_fence the critical sections only starts when we publish a fence.
- Furthermore there can be cases where a thread never does a
dma_fence_signal, but is still critical for reaching completion of
fences. One example would be a scheduler kthread which picks up jobs
and pushes them into hardware, where the interrupt handler or
another completion thread calls dma_fence_signal(). But if the
scheduler thread hangs, then all the fences hang, hence we need to
manually annotate it. cross-release aimed to solve this by chaining
cross-release dependencies, but the dependency from scheduler thread
to the completion interrupt handler goes through hw where
cross-release code can't observe it.
In short, without manual annotations and careful review of the start
and end of critical sections, cross-relese dependency tracking doesn't
work. We need explicit annotations.
v2: handle soft/hardirq ctx better against write side and dont forget
EXPORT_SYMBOL, drivers can't use this otherwise.
v3: Kerneldoc.
v4: Some spelling fixes from Mika
v5: Amend commit message to explain in detail why cross-release isn't
the solution.
v6: Pull out misplaced .rst hunk.
Acked-by: Christian König <christian.koenig@amd.com>
Acked-by: Dave Airlie <airlied@redhat.com>
Cc: Felix Kuehling <Felix.Kuehling@amd.com>
Reviewed-by: Thomas Hellström <thomas.hellstrom@intel.com>
Reviewed-by: Maarten Lankhorst <maarten.lankhorst@linux.intel.com>
Cc: Mika Kuoppala <mika.kuoppala@intel.com>
Cc: Thomas Hellstrom <thomas.hellstrom@intel.com>
Cc: linux-media@vger.kernel.org
Cc: linaro-mm-sig@lists.linaro.org
Cc: linux-rdma@vger.kernel.org
Cc: amd-gfx@lists.freedesktop.org
Cc: intel-gfx@lists.freedesktop.org
Cc: Chris Wilson <chris@chris-wilson.co.uk>
Cc: Maarten Lankhorst <maarten.lankhorst@linux.intel.com>
Cc: Christian König <christian.koenig@amd.com>
Signed-off-by: Daniel Vetter <daniel.vetter@intel.com>
Link: https://patchwork.freedesktop.org/patch/msgid/20200707201229.472834-2-daniel.vetter@ffwll.ch
2020-07-07 23:12:05 +03:00
|
|
|
DMA Fence Signalling Annotations
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
.. kernel-doc:: drivers/dma-buf/dma-fence.c
|
|
|
|
:doc: fence signalling annotation
|
|
|
|
|
2018-07-04 12:29:09 +03:00
|
|
|
DMA Fences Functions Reference
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
2016-12-09 21:53:05 +03:00
|
|
|
.. kernel-doc:: drivers/dma-buf/dma-fence.c
|
|
|
|
:export:
|
|
|
|
|
|
|
|
.. kernel-doc:: include/linux/dma-fence.h
|
|
|
|
:internal:
|
|
|
|
|
|
|
|
Seqno Hardware Fences
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
.. kernel-doc:: include/linux/seqno-fence.h
|
|
|
|
:internal:
|
|
|
|
|
|
|
|
DMA Fence Array
|
|
|
|
~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
.. kernel-doc:: drivers/dma-buf/dma-fence-array.c
|
|
|
|
:export:
|
|
|
|
|
|
|
|
.. kernel-doc:: include/linux/dma-fence-array.h
|
|
|
|
:internal:
|
|
|
|
|
|
|
|
DMA Fence uABI/Sync File
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
.. kernel-doc:: drivers/dma-buf/sync_file.c
|
|
|
|
:export:
|
|
|
|
|
|
|
|
.. kernel-doc:: include/linux/sync_file.h
|
|
|
|
:internal:
|
|
|
|
|
2020-07-09 15:33:38 +03:00
|
|
|
Indefinite DMA Fences
|
2020-08-24 02:41:59 +03:00
|
|
|
~~~~~~~~~~~~~~~~~~~~~
|
2020-07-09 15:33:38 +03:00
|
|
|
|
|
|
|
At various times &dma_fence with an indefinite time until dma_fence_wait()
|
|
|
|
finishes have been proposed. Examples include:
|
|
|
|
|
|
|
|
* Future fences, used in HWC1 to signal when a buffer isn't used by the display
|
|
|
|
any longer, and created with the screen update that makes the buffer visible.
|
|
|
|
The time this fence completes is entirely under userspace's control.
|
|
|
|
|
|
|
|
* Proxy fences, proposed to handle &drm_syncobj for which the fence has not yet
|
|
|
|
been set. Used to asynchronously delay command submission.
|
|
|
|
|
|
|
|
* Userspace fences or gpu futexes, fine-grained locking within a command buffer
|
|
|
|
that userspace uses for synchronization across engines or with the CPU, which
|
|
|
|
are then imported as a DMA fence for integration into existing winsys
|
|
|
|
protocols.
|
|
|
|
|
|
|
|
* Long-running compute command buffers, while still using traditional end of
|
|
|
|
batch DMA fences for memory management instead of context preemption DMA
|
|
|
|
fences which get reattached when the compute job is rescheduled.
|
|
|
|
|
|
|
|
Common to all these schemes is that userspace controls the dependencies of these
|
|
|
|
fences and controls when they fire. Mixing indefinite fences with normal
|
|
|
|
in-kernel DMA fences does not work, even when a fallback timeout is included to
|
|
|
|
protect against malicious userspace:
|
|
|
|
|
|
|
|
* Only the kernel knows about all DMA fence dependencies, userspace is not aware
|
|
|
|
of dependencies injected due to memory management or scheduler decisions.
|
|
|
|
|
|
|
|
* Only userspace knows about all dependencies in indefinite fences and when
|
|
|
|
exactly they will complete, the kernel has no visibility.
|
|
|
|
|
|
|
|
Furthermore the kernel has to be able to hold up userspace command submission
|
|
|
|
for memory management needs, which means we must support indefinite fences being
|
|
|
|
dependent upon DMA fences. If the kernel also support indefinite fences in the
|
|
|
|
kernel like a DMA fence, like any of the above proposal would, there is the
|
|
|
|
potential for deadlocks.
|
|
|
|
|
|
|
|
.. kernel-render:: DOT
|
|
|
|
:alt: Indefinite Fencing Dependency Cycle
|
|
|
|
:caption: Indefinite Fencing Dependency Cycle
|
|
|
|
|
|
|
|
digraph "Fencing Cycle" {
|
|
|
|
node [shape=box bgcolor=grey style=filled]
|
|
|
|
kernel [label="Kernel DMA Fences"]
|
|
|
|
userspace [label="userspace controlled fences"]
|
|
|
|
kernel -> userspace [label="memory management"]
|
|
|
|
userspace -> kernel [label="Future fence, fence proxy, ..."]
|
|
|
|
|
|
|
|
{ rank=same; kernel userspace }
|
|
|
|
}
|
|
|
|
|
|
|
|
This means that the kernel might accidentally create deadlocks
|
|
|
|
through memory management dependencies which userspace is unaware of, which
|
|
|
|
randomly hangs workloads until the timeout kicks in. Workloads, which from
|
|
|
|
userspace's perspective, do not contain a deadlock. In such a mixed fencing
|
|
|
|
architecture there is no single entity with knowledge of all dependencies.
|
|
|
|
Thefore preventing such deadlocks from within the kernel is not possible.
|
|
|
|
|
|
|
|
The only solution to avoid dependencies loops is by not allowing indefinite
|
|
|
|
fences in the kernel. This means:
|
|
|
|
|
|
|
|
* No future fences, proxy fences or userspace fences imported as DMA fences,
|
|
|
|
with or without a timeout.
|
|
|
|
|
|
|
|
* No DMA fences that signal end of batchbuffer for command submission where
|
|
|
|
userspace is allowed to use userspace fencing or long running compute
|
|
|
|
workloads. This also means no implicit fencing for shared buffers in these
|
|
|
|
cases.
|