On 25/02/2022 17:39, John Harrison wrote:
On 2/25/2022 09:06, Tvrtko Ursulin wrote:
On 24/02/2022 19:19, John Harrison wrote:
[snip]
./gt/uc/intel_guc_fwif.h: u32 execution_quantum;
./gt/uc/intel_guc_submission.c: desc->execution_quantum =
engine->props.timeslice_duration_ms * 1000;
./gt/intel_engine_types.h: unsigned long
timeslice_duration_ms;
timeslice_store/preempt_timeout_store:
err = kstrtoull(buf, 0, &duration);
So both kconfig and sysfs can already overflow GuC, not only
because of tick conversion internally but because at backend
level nothing was done for assigning 64-bit into 32-bit. Or I
failed to find where it is handled.
That's why I'm adding this range check to make sure we don't
allow overflows.
Yes and no, this fixes it, but the first bug was not only due GuC
internal tick conversion. It was present ever since the u64 from
i915 was shoved into u32 sent to GuC. So even if GuC used the
value without additional multiplication, bug was be there. My
point being when GuC backend was added timeout_ms values should
have been limited/clamped to U32_MAX. The tick discovery is
additional limit on top.
I'm not disagreeing. I'm just saying that the truncation wasn't
noticed until I actually tried using very long timeouts to debug a
particular problem. Now that it is noticed, we need some method of
range checking and this simple clamp solves all the truncation
problems.
Agreed in principle, just please mention in the commit message all
aspects of the problem.
I think we can get away without a Fixes: tag since it requires user
fiddling to break things in unexpected ways.
I would though put in a code a clamping which expresses both,
something like min(u32, ..GUC LIMIT..). So the full story is
documented forever. Or "if > u32 || > ..GUC LIMIT..) return
-EINVAL". Just in case GuC limit one day changes but u32 stays.
Perhaps internal ticks go away or anything and we are left with
plain 1:1 millisecond relationship.
Can certainly add a comment along the lines of "GuC API only takes a
32bit field but that is further reduced to GUC_LIMIT due to internal
calculations which would otherwise overflow".
But if the GuC limit is > u32 then, by definition, that means the GuC
API has changed to take a u64 instead of a u32. So there will no u32
truncation any more. So I'm not seeing a need to explicitly test the
integer size when the value check covers that.
Hmm I was thinking if the internal conversion in the GuC fw changes so
that GUC_POLICY_MAX_PREEMPT_TIMEOUT_MS goes above u32, then to be
extra safe by documenting in code there is the additional limit of the
data structure field. Say the field was changed to take some unit
larger than a millisecond. Then the check against the GuC MAX limit
define would not be enough, unless that would account both for
internal implementation and u32 in the protocol. Maybe that is
overdefensive but I don't see that it harms. 50-50, but it's do it
once and forget so I'd do it.
Huh?
How can the limit be greater than a u32 if the interface only takes a
u32? By definition the limit would be clamped to u32 size.
If you mean that the GuC policy is in different units and those units
might not overflow but ms units do, then actually that is already the
case. The GuC works in us not ms. That's part of why the wrap around is
so low, we have to multiply by 1000 before sending to GuC. However, that
is actually irrelevant because the comparison is being done on the i915
side in i915's units. We have to scale the GuC limit to match what i915
is using. And the i915 side is u64 so if the scaling to i915 numbers
overflows a u32 then who cares because that comparison can be done at 64
bits wide.
If the units change then that is a backwards breaking API change that
will require a manual driver code update. You can't just recompile with
a new header and magically get an ms to us or ms to s conversion in your
a = b assignment. The code will need to be changed to do the new unit
conversion (note we already convert from ms to us, the GuC API is all
expressed in us). And that code change will mean having to revisit any
and all scaling, type conversions, etc. I.e. any pre-existing checks
will not necessarily be valid and will need to be re-visted anyway. But
as above, any scaling to GuC units has to be incorporated into the limit
already because otherwise the limit would not fit in the GuC's own API.
Yes I get that, I was just worried that u32 field in the protocol and
GUC_POLICY_MAX_EXEC_QUANTUM_MS defines are separate in the source code
and then how to protect against forgetting to update both in sync.
Like if the protocol was changed to take nanoseconds, and firmware
implementation changed to support the full range, but define
left/forgotten at 100s. That would then overflow u32.
Regards,
Tvrtko
John.
Signed-off-by: John Harrison <John.C.Harrison@xxxxxxxxx>
---
drivers/gpu/drm/i915/gt/intel_engine_cs.c | 15 +++++++++++++++
drivers/gpu/drm/i915/gt/sysfs_engines.c | 14 ++++++++++++++
drivers/gpu/drm/i915/gt/uc/intel_guc_fwif.h | 9 +++++++++
3 files changed, 38 insertions(+)
diff --git a/drivers/gpu/drm/i915/gt/intel_engine_cs.c
b/drivers/gpu/drm/i915/gt/intel_engine_cs.c
index e53008b4dd05..2a1e9f36e6f5 100644
--- a/drivers/gpu/drm/i915/gt/intel_engine_cs.c
+++ b/drivers/gpu/drm/i915/gt/intel_engine_cs.c
@@ -389,6 +389,21 @@ static int intel_engine_setup(struct
intel_gt *gt, enum intel_engine_id id,
if (GRAPHICS_VER(i915) == 12 && engine->class ==
RENDER_CLASS)
engine->props.preempt_timeout_ms = 0;
+ /* Cap timeouts to prevent overflow inside GuC */
+ if (intel_guc_submission_is_wanted(>->uc.guc)) {
+ if (engine->props.timeslice_duration_ms >
GUC_POLICY_MAX_EXEC_QUANTUM_MS) {
Hm "wanted".. There's been too much back and forth on the GuC
load options over the years to keep track..
intel_engine_uses_guc work sounds like would work and read nicer.
I'm not adding a new feature check here. I'm just using the
existing one. If we want to rename it yet again then that would
be a different patch set.
$ grep intel_engine_uses_guc . -rl
./i915_perf.c
./i915_request.c
./selftests/intel_scheduler_helpers.c
./gem/i915_gem_context.c
./gt/intel_context.c
./gt/intel_engine.h
./gt/intel_engine_cs.c
./gt/intel_engine_heartbeat.c
./gt/intel_engine_pm.c
./gt/intel_reset.c
./gt/intel_lrc.c
./gt/selftest_context.c
./gt/selftest_engine_pm.c
./gt/selftest_hangcheck.c
./gt/selftest_mocs.c
./gt/selftest_workarounds.c
Sounds better to me than intel_guc_submission_is_wanted. What does
the reader know whether "is wanted" translates to "is actually
used". Shrug on "is wanted".
Yes, but isn't '_uses' the one that hits a BUG_ON if you call it
too early in the boot up sequence? I never understood why that was
necessary or why we need so many different ways to ask the same
question. But this version already exists and definitely works
without hitting any explosions.
No idea if it causes a bug on, doesn't in the helper itself so maybe
you are saying it is called too early? Might be.. I think over time
the nice idea we had that "setup" and "init" phases of engine setup
clearly separated got destroyed a bit. There would always be an
option to move this clamping in a later phase, once the submission
method is known. One could argue that if the submission method is
not yet known at this point, it is even wrong to clamp based on
something which will only be decided later. Because:
int intel_engines_init(struct intel_gt *gt)
{
int (*setup)(struct intel_engine_cs *engine);
struct intel_engine_cs *engine;
enum intel_engine_id id;
int err;
if (intel_uc_uses_guc_submission(>->uc)) {
gt->submission_method = INTEL_SUBMISSION_GUC;
So this uses "uses", not "wanted". Presumably the point for having
"wanted" and "uses" is that they can disagree, in which case if you
clamp early based on "wanted" that suggests it could be wrong.
Okay, looks like I was getting confused with intel_guc_is_used().
That one blows up if called too early.
I'll change it to _uses_ and repost, then.
Check that it isn't called too early, before gt->submission_setup is set.
Obviously it is because it blew up. But I am not re-writing the driver
start up sequence just to use the word 'use' instead of 'want'.
And limit to class instead of applying to all engines looks like
a miss.
As per follow up email, the class limit is not applied here.
+ drm_info(&engine->i915->drm, "Warning, clamping timeslice
duration to %d to prevent possibly overflow\n",
+ GUC_POLICY_MAX_EXEC_QUANTUM_MS);
+ engine->props.timeslice_duration_ms =
GUC_POLICY_MAX_EXEC_QUANTUM_MS;
I am not sure logging such message during driver load is useful.
Sounds more like a confused driver which starts with one value
and then overrides itself. I'd just silently set the value
appropriate for the active backend. Preemption timeout kconfig
text already documents the fact timeouts can get overriden at
runtime depending on platform+engine. So maybe just add same
text to timeslice kconfig.
The point is to make people aware if they compile with
unsupported config options. As far as I know, there is no way to
apply range checking or other limits to config defines. Which
means that a user would silently get unwanted behaviour. That
seems like a bad thing to me. If the driver is confused because
the user built it in a confused manner then we should let them know.
Okay, but I think make it notice low level.
Also consider in patch 3/3 when you triple it, and then clamp back
down here. That's even more confused state since tripling gets
nerfed. I think that's also an argument to always account preempt
timeout in heartbeat interval calculation. Haven't got to your
reply on 2/3 yet though..
That sounds like even more reason to make sure the warning gets
seen. The more complex the system and the more chances there are to
get it wrong, the more important it is to have a nice easy to see
and understand notification that it did go wrong.
I did not disagree, just said make it notice, one level higher than
info! :)
But then it won't appear unless you have explicitly said an elevated
debug level. Whereas info appears in dmesg by default (but is still
not classed as an error by CI and such).
Notice is higher than info! :) If info appears by default so does
notice, warning, err, etc...
Doh! I could have sworn those were the other way around.
Okay. Will update to use notice :).
#define KERN_EMERG KERN_SOH "0" /* system is unusable */
#define KERN_ALERT KERN_SOH "1" /* action must be taken
immediately */
#define KERN_CRIT KERN_SOH "2" /* critical conditions */
#define KERN_ERR KERN_SOH "3" /* error conditions */
#define KERN_WARNING KERN_SOH "4" /* warning conditions */
#define KERN_NOTICE KERN_SOH "5" /* normal but significant
condition */
#define KERN_INFO KERN_SOH "6" /* informational */
#define KERN_DEBUG KERN_SOH "7" /* debug-level messages */
But also think how, if we agree to go with tripling, that you'd have
to consider that in the sysfs store when hearbeat timeout is
written, to consider whether or not to triple and error out if
preemption timeout is over limit.
I see this as just setting the default values. If an end user is
explicitly overriding the defaults then we should obey what they have
requested. If they are changing the heartbeat interval then they can
also change the pre-emption timeout appropriately.
Question is can they unknowingly and without any feedback configure a
much worse state than they expect? Like when they set heartbeats up to
some value, everything is configured as you intended - but if you go
over a certain hidden limit the overall scheme degrades in some way.
What is the failure mode here if you silently let them do that?
You can always configure things to be worse than expected. If you don't
understand what you are doing then any control can make things worse
instead of better. The assumption is that if a user is savvy enough to
be writing to sysfs overrides of kernel parameters then they know what
those parameters are and what their implications are. If they want to
set a very short heartbeat with a very long pre-emption timeout then its
their problem if they hit frequent TDRs. Conversely, if they want to set
a very long heartbeat with a very short pre-emption timeout then its
still their problem if they hit frequent TDRs.
But if the user explicitly requests a heartbeat period of 3s and a
pre-emption timeout of 2s and the i915 arbitrarily splats their 2s and
makes it 9s then that is wrong.
We should give the driver defaults that work for the majority of users
and then let the minority specify exactly what they need.
And there is no silent or hidden limit. If the user specifies a value
too large then they will get -EINVAL. Nothing hidden or silent about
that. Any other values are legal and the behaviour will be whatever has
been requested.
John.
Regards,
Tvrtko