Hi, On Tue, Jan 21, 2020 at 08:05:27PM +0100, Arnd Bergmann wrote: > On Tue, Jan 21, 2020 at 5:10 PM Lucas Stach <l.stach@xxxxxxxxxxxxxx> wrote: > > > > Hi Guido, > > > > On Di, 2020-01-21 at 13:55 +0100, Guido Günther wrote: > > > Hi, > > > On Tue, Jan 21, 2020 at 12:45:25PM +0100, Arnd Bergmann wrote: > > > > As Guido Günther reported, get_abs_timeout() in the etnaviv user space > > > > sometimes passes timeouts with nanosecond values larger than 1000000000, > > > > which gets rejected after my first patch. > > > > > > > > To avoid breaking this, while also not allowing completely arbitrary > > > > values, set the limit to 1999999999 and use set_normalized_timespec64() > > > > to get the correct format before comparing it. > > > > > > I'm seeing values up to 5 seconds so I need > > > > > > if (args->timeout.tv_nsec > (5 * NSEC_PER_SEC)) > > > > > > to unbreak rendering. Which seems to match what mesa's get_abs_timeout() > > > does and how it's invoked. > > > > I have not tested this myself yet, only looked at the code. From the > > code I quoted earlier, I don't see how we end up with 5 * NSEC_PER_SEC > > in the tv_nsec member, even if the timeout passed to get_abs_timeout() > > is 5 seconds. > > I can think of two different ways you'd end up with around five seconds here: > > a) you have a completely arbitrary 32-bit number through truncation, > which is up to 4.2 seconds > b) you have the same kind of 32-bit number, but add up to another 999999999 > nanoseconds, so you get up to 5.2 seconds in the 64-bit field. I've dumped out some values tv_nsec values with current mesa git on arm64: [ 33.699652] etnaviv_ioctl_gem_cpu_prep: 4990449401 [ 33.813081] etnaviv_ioctl_gem_cpu_prep: 5103872445 [ 33.822936] etnaviv_ioctl_gem_cpu_prep: 5113731286 [ 33.840963] etnaviv_ioctl_gem_cpu_prep: 5131762726 [ 33.854120] etnaviv_ioctl_gem_cpu_prep: 5144920127 [ 33.861426] etnaviv_ioctl_gem_cpu_prep: 5152227527 [ 33.872666] etnaviv_ioctl_gem_cpu_prep: 5163466968 [ 33.879485] etnaviv_ioctl_gem_cpu_prep: 5170286808 The problem is that in mesa/libdrm static inline void get_abs_timeout(struct drm_etnaviv_timespec *tv, uint64_t ns) { struct timespec t; uint32_t s = ns / 1000000000; clock_gettime(CLOCK_MONOTONIC, &t); tv->tv_sec = t.tv_sec + s; tv->tv_nsec = t.tv_nsec + ns - (s * 1000000000); ^^^^^^^^^^^^^^^ this overflows (since `s` is `uint_32t` and hence we substract a way too small value with ns = 5000000000 which mesa uses in etna_bo_cpu_prep. } So with current mesa/libdrm (which needs to be fixed) we'd have a maximum t.tv_nsec + ns - (s_max * 1000000000) 999999999 + 5000000000 - 705032704 = 5294967295 Does that make sense? If so that'd be the possible upper bound for the kernel. Note that this only applies to etnaviv_ioctl_gem_cpu_prep. While etnaviv_ioctl_wait_fence and etnaviv_ioctl_gem_wait are affected too i've not yet seen user space passing in larger values. Cheers, -- Guido > > It could of course be something completely different. If this works correctly > today, we may need to allow any 64-bit input for the nanoseconds and do > an expensive 64-bit div/mod in the kernel for normalization rather than the > cheaper set_normalized_timespec64() from my patch. > > Arnd > _______________________________________________ dri-devel mailing list dri-devel@xxxxxxxxxxxxxxxxxxxxx https://lists.freedesktop.org/mailman/listinfo/dri-devel