[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9087ef09-e617-dcf3-343e-162f79dc3e51@mailbox.org>
Date: Wed, 26 Apr 2023 11:51:50 +0200
From: Michel Dänzer <michel.daenzer@...lbox.org>
To: Marek Olšák <maraeo@...il.com>,
Christian König <christian.koenig@....com>
Cc: Pierre-Eric Pelloux-Prayer <pierre-eric.pelloux-prayer@....com>,
André Almeida <andrealmeid@...lia.com>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
dri-devel <dri-devel@...ts.freedesktop.org>,
"Tuikov, Luben" <Luben.Tuikov@....com>,
amd-gfx mailing list <amd-gfx@...ts.freedesktop.org>,
kernel-dev@...lia.com,
"Deucher, Alexander" <alexander.deucher@....com>
Subject: Re: [PATCH] drm/amdgpu: Mark contexts guilty for any reset type
On 4/25/23 21:11, Marek Olšák wrote:
> The last 3 comments in this thread contain arguments that are false and were specifically pointed out as false 6 comments ago: Soft resets are just as fatal as hard resets. There is nothing better about soft resets. If the VRAM is lost completely, that's a different story, and if the hard reset is 100% unreliable, that's also a different story, but other than those two outliers, there is no difference between the two from the user point view. Both can repeatedly hang if you don't prevent the app that caused the hang from using the GPU even if the app is not robust. The robustness context type doesn't matter here. By definition, no guilty app can continue after a reset, and no innocent apps affected by a reset can continue either because those can now hang too. That's how destructive all resets are. Personal anecdotes that the soft reset is better are just that, anecdotes.
You're trying to frame the situation as black or white, but reality is shades of grey.
There's a similar situation with kernel Oopsen: In principle it's not safe to continue executing the kernel after it hits an Oops, since it might be in an inconsistent state, which could result in any kind of misbehaviour. Still, the default behaviour is to continue executing, and in most cases it turns out fine. Users which cannot accept the residual risk can choose to make the kernel panic when it hits an Oops (either via CONFIG_PANIC_ON_OOPS at build time, or via oops=panic on the kernel command line). A kernel panic means that the machine basically freezes from a user PoV, which would be worse as the default behaviour for most users (because it would e.g. incur a higher risk of losing filesystem data).
--
Earthling Michel Dänzer | https://redhat.com
Libre software enthusiast | Mesa and Xwayland developer
Powered by blists - more mailing lists