From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from gabe.freedesktop.org (gabe.freedesktop.org [131.252.210.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id DAAF6CD3436 for ; Fri, 8 May 2026 04:10:47 +0000 (UTC) Received: from gabe.freedesktop.org (localhost [127.0.0.1]) by gabe.freedesktop.org (Postfix) with ESMTP id 87A5410F332; Fri, 8 May 2026 04:10:47 +0000 (UTC) Authentication-Results: gabe.freedesktop.org; dkim=pass (2048-bit key; unprotected) header.d=intel.com header.i=@intel.com header.b="WjJEwt2m"; dkim-atps=neutral Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.8]) by gabe.freedesktop.org (Postfix) with ESMTPS id 73A0710F32C for ; Fri, 8 May 2026 04:10:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1778213431; x=1809749431; h=date:message-id:from:to:cc:subject:in-reply-to: references:mime-version; bh=CMgj59PA4NQE6CahXb1jBKTWg032TAeJwBuzFWEgkWg=; b=WjJEwt2mEBGfaQqS6dxDFbiSBV2iabvh939Cw7xm54U8wQIBKt4URC/C S4bA5GYMMv3eLcSKVrV11MaSBwsKXoO1WDF1wOyjndIYqoGYaTwa7Yuju smQ5iGItZTuZpu5A4BcFKIY/zCeUUuuj+BW5LkFB1vj86OpiNWC85JjQY hNZ3Fz9oYuol4BZHFN9TAiiho0xhUZQXDzUdM+zDQSHgJemk3oQw7YhFS i85nbSOFb3VWr4tTki2f1aVK69HQLV7wvFfnBnfPuuXJ/0F98/FWGvfDg DuCeaeGiZGV4lG/Q1vFWMaTHd7m9H5+hxGG1MgnBDGL51aKmvu/bpFjtY g==; X-CSE-ConnectionGUID: 8UWjWY7lQgGhh7F2Y5DsMQ== X-CSE-MsgGUID: 6e7QLF1KQs2C5i3waJu1fQ== X-IronPort-AV: E=McAfee;i="6800,10657,11779"; a="96744835" X-IronPort-AV: E=Sophos;i="6.23,222,1770624000"; d="scan'208";a="96744835" Received: from fmviesa003.fm.intel.com ([10.60.135.143]) by fmvoesa102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 May 2026 21:10:31 -0700 X-CSE-ConnectionGUID: 4k2a3P6OQs2oLAIn3TJ1jA== X-CSE-MsgGUID: E4X5vMKpS9O0nWUwMN5FsQ== X-ExtLoop1: 1 Received: from mrrichar-mobl.amr.corp.intel.com (HELO adixit-MOBL3.intel.com) ([10.125.10.218]) by fmviesa003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 May 2026 21:10:30 -0700 Date: Thu, 07 May 2026 21:10:29 -0700 Message-ID: <87o6iq7d8q.wl-ashutosh.dixit@intel.com> From: "Dixit, Ashutosh" To: Shekhar Chauhan Cc: Subject: Re: [PATCH v7 2/2] tests/intel/xe_oa: Wa_14026633728 In-Reply-To: <20260508021329.876072-3-shekhar.chauhan@intel.com> References: <20260508021329.876072-1-shekhar.chauhan@intel.com> <20260508021329.876072-3-shekhar.chauhan@intel.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?ISO-8859-4?Q?Goj=F2?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/30.2 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-BeenThere: igt-dev@lists.freedesktop.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development mailing list for IGT GPU Tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: igt-dev-bounces@lists.freedesktop.org Sender: "igt-dev" On Thu, 07 May 2026 19:13:29 -0700, Shekhar Chauhan wrote: > > For MERTOA in CRI, oa buffer can be in device memory. Because of slower > device mem access, OA exponent values lower than 8 can result in buffer > overflows. Bump the OA exponent value. Reviewed-by: Ashutosh Dixit > > Signed-off-by: Shekhar Chauhan > --- > tests/intel/xe_oa.c | 13 +++++++++++++ > 1 file changed, 13 insertions(+) > > diff --git a/tests/intel/xe_oa.c b/tests/intel/xe_oa.c > index 988c46df6..2f73b5210 100644 > --- a/tests/intel/xe_oa.c > +++ b/tests/intel/xe_oa.c > @@ -24,6 +24,7 @@ > #include "igt_device.h" > #include "igt_syncobj.h" > #include "igt_sysfs.h" > +#include "intel_wa.h" > #include "xe/xe_ioctl.h" > #include "xe/xe_query.h" > #include "xe/xe_oa.h" > @@ -2671,6 +2672,18 @@ test_non_zero_reason(const struct drm_xe_oa_unit *oau, size_t oa_buffer_size) > int len, check_idx; > u32 oa_status; > > + /* > + * Wa_14026633728: For MERTOA in CRI, oa buffer can be in device memory. > + * Because of slower device mem access, OA exponent values lower than 8 > + * can result in buffer overflows. Also, update the value of oa_exponent > + * in properties[]. > + */ > + if (oau->oa_unit_type == DRM_XE_OA_UNIT_TYPE_MERT && > + igt_has_intel_wa(drm_fd, "14026633728")) { > + oa_exponent = max(oa_exponent, 8); > + properties[9] = oa_exponent; > + } > + > igt_assert(buf); > > igt_debug("Ready to read about %u bytes\n", buf_size); > -- > 2.53.0 >