Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp6884624rwr; Tue, 25 Apr 2023 05:25:11 -0700 (PDT) X-Google-Smtp-Source: AKy350bkTcadjSczfeDcJr5D+uTNddp5wMwPet0pgavCLCcQ4AVv3T8R7P1p7U5G1XWkEoToxC9z X-Received: by 2002:a17:902:f353:b0:1a6:7ed8:84f7 with SMTP id q19-20020a170902f35300b001a67ed884f7mr15809694ple.20.1682425510766; Tue, 25 Apr 2023 05:25:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682425510; cv=none; d=google.com; s=arc-20160816; b=IgHzf5Px8XkvAqN+vZLLJGnh5RpaLktxfZe4lQ1PbIPkKU4GvsDAXrySWARxqGi95a zZsuqlhiXK1P8uhS3n8z1jJMtzhSGFoIk9t3mr+hYNl43Cy0LObXXs2n9X96XLYKzd0a JB1sDrhVDBmCsdYTifKVVFWwKoKOOkXXaNdqQnWYpZ4rI01X2dtmMDKRHxb6Q4MKW0RV qifmxsF7B3hdA2EUzcgipqzLt4JJ8b1nCJnCxsb4PkSt425eB5JVQg/fj4DLugno/HuQ H3H1848T/UDS0d9syrfy/p77BVP6pwmaLu6kMF48s9VKj7zIicMeWkzjjEkGvsZojZxH kJqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:mime-version:date :message-id:dkim-signature; bh=poZDX7ERqd3433b5t5xbFCz+/zTUxs5bwbl+7lhQVZc=; b=elfXFLl0yfYJHA+hJ1hNo34aAgpA9KNQOk0EmuaR0qxeZUsAlNQZ8i7kNWaZUB1akP FWqYxjPcCED8En+8pdgApTEMMyUfV6umPUf3/0WzIz03uH0P9N+Cq12w1XO45nMV4ibG RsmlwSlv3doumXr1CUv5n4zHPtbCfgOBXHHELLz2sGQ3MBi9lXemaWzSH9ZHve8Xnfjb PlUF01GeNil/xFCOMNKbI12vDPTJCUHS6zYDzuzHAIOEvFmeBQwUeTth7J0gxFs+8RVT EBajetpKftQ1Nh6YXDUcGszYyDWpwZVGXTt+9Uh9sTSV9BlDkRwtEHnxvhyndYUmsQ5F 5w1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mailbox.org header.s=mail20150812 header.b="HCPQVE3/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=mailbox.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k1-20020a17090ac50100b0024b6ee72f16si10212412pjt.133.2023.04.25.05.24.53; Tue, 25 Apr 2023 05:25:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@mailbox.org header.s=mail20150812 header.b="HCPQVE3/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=mailbox.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233910AbjDYMOw (ORCPT + 99 others); Tue, 25 Apr 2023 08:14:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39656 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233827AbjDYMOu (ORCPT ); Tue, 25 Apr 2023 08:14:50 -0400 Received: from mout-p-102.mailbox.org (mout-p-102.mailbox.org [80.241.56.152]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 00CFE524C for ; Tue, 25 Apr 2023 05:14:47 -0700 (PDT) Received: from smtp202.mailbox.org (smtp202.mailbox.org [10.196.197.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-102.mailbox.org (Postfix) with ESMTPS id 4Q5LXd6m5Cz9skf; Tue, 25 Apr 2023 14:14:41 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mailbox.org; s=mail20150812; t=1682424881; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=poZDX7ERqd3433b5t5xbFCz+/zTUxs5bwbl+7lhQVZc=; b=HCPQVE3/qzdL9utjEssxxMZ4NRX42q0atTuI12Nh+/EpLGrIukLztzVsRvJvgPhc59VGpi e4ntCyU3F2scFzuljYeluTnLC/Ogiof9C5tscS23rpWtquU24n+suKZJGx2cH5JqazqtNN yWwk5VaJX3Qkde4UtApirrolerKWjOm6daepPJSfkEDlCPR7/B4ntfsrbgryBbe/B0Y0yd wPGzJrvTKIM7HJ8mUVJoYfLbp+3BWjXmmgWFJKXQvwG5F5bxGiVHEt1Oiq3peSc7urklwQ ROIGL43kFpLG1LMviCRPh13v1UNxh1hYnyR9h5t7tYcAzbUcAcuee8lbaMUAgA== Message-ID: <5262c73e-e77c-91f7-e49e-a9c3571e2cc9@mailbox.org> Date: Tue, 25 Apr 2023 14:14:40 +0200 MIME-Version: 1.0 Subject: Re: [PATCH] drm/amdgpu: Mark contexts guilty for any reset type Content-Language: de-CH-frami, en-CA To: =?UTF-8?Q?Christian_K=c3=b6nig?= , =?UTF-8?B?TWFyZWsgT2zFocOhaw==?= Cc: Pierre-Eric Pelloux-Prayer , =?UTF-8?Q?Andr=c3=a9_Almeida?= , Linux Kernel Mailing List , dri-devel , "Tuikov, Luben" , amd-gfx mailing list , kernel-dev@igalia.com, "Deucher, Alexander" References: <20230424014324.218531-1-andrealmeid@igalia.com> <784561bb-0937-befc-3774-892d6f6a4318@mailbox.org> <19406ec5-79d6-e9e6-fbdd-eb2f4a872fc4@amd.com> From: =?UTF-8?Q?Michel_D=c3=a4nzer?= In-Reply-To: <19406ec5-79d6-e9e6-fbdd-eb2f4a872fc4@amd.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-MBO-RS-ID: aa81d56095e85c51e35 X-MBO-RS-META: xsaisb5d1of8caxkudtw34c613fom6my X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/25/23 14:08, Christian König wrote: > Well signaling that something happened is not the question. We do this for both soft as well as hard resets. > > The question is if errors result in blocking further submissions with the same context or not. > > In case of a hard reset and potential loss of state we have to kill the context, otherwise a follow up submission would just lockup the hardware once more. > > In case of a soft reset I think we can keep the context alive, this way even applications without robustness handling can keep work. > > You potentially still get some corruption, but at least not your compositor killed. Right, and if there is corruption, the user can restart the session. Maybe a possible compromise could be making soft resets fatal if user space enabled robustness for the context, and non-fatal if not. > Am 25.04.23 um 13:07 schrieb Marek Olšák: >> That supposedly depends on the compositor. There may be compositors for very specific cases (e.g. Steam Deck) that handle resets very well, and those would like to be properly notified of all resets because that's how they get the best outcome, e.g. no corruption. A soft reset that is unhandled by userspace may result in persistent corruption. -- Earthling Michel Dänzer | https://redhat.com Libre software enthusiast | Mesa and Xwayland developer