Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1000655imu; Fri, 4 Jan 2019 11:03:03 -0800 (PST) X-Google-Smtp-Source: ALg8bN6qmB7JqNRoMkjo3i/s01BOTuU5fQ3yfXp70/pYIUCR8IId8o52JiimApxjE3MEnP3WhbAJ X-Received: by 2002:a63:2bc4:: with SMTP id r187mr2583954pgr.306.1546628583103; Fri, 04 Jan 2019 11:03:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546628583; cv=none; d=google.com; s=arc-20160816; b=M+5gh85/XDhCm4jDe9m0XXZPgFqTEcqRPDhTZuXb8CI72HABzofkQi+YvTMurhN9KE FdbdLuISCZPqEqFJ004G8iCMzN9thPOVPGUDr7u2T9L/+SftVqSHGRIq+nVykwI1SC7L ug/grD4Po9ppN1FDeUoNKgrgE8qGIumiY08O5NzrByvwwkjnLhsKBsFK8sNIo1YsREyT IYTEjaVjsn5t7NDmb+LEq4oOkgVA0SJ5kJjnbHSbgtv2c40FL5zR0ea3x8YvVW4Xhi2/ e9X0zYU1zdxnov6Af4W2hJC74QqnqJmmjf3qb4ZDx57HFyiolOlcEzA0Eq5U5TaNg5I0 PYog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dmarc-filter :dkim-signature:dkim-signature; bh=dwI1XYmqeQJm24MoPt9inn9UydLZNKR6DPfBymwcuy4=; b=LQgD2WALcRf+v+u7pr1zqqVMhN6HE9zmLhZt9QnN1mPVY5swdyc7Lu/H+h1YAK69ZL 18gejRB+4dqdw313KT9kufh7HKauuUdQF7k8ONF61S9nAZE9GnLz9nEkZH6JTLsUAe4D gRsxcZLBmBipAuBYGSkjOBLc/Hf64tB/zzn2pFIiK9LzLL2HJ7UulL8k3JklOxMJmH1f fEYFnq9aFKSK30cXnJxOv277RR1MM3lJP+gw8LwaZLlbVzVRiOrR15u40Hqd+1Y3dyS2 MDx0kEQfqT+6+klU60kaHE7Nv5hL6j+rB4VOtKJvx+B/ko01M2fYEpNd41BulrpgMP15 7HsQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=b9PjUlbt; dkim=pass header.i=@codeaurora.org header.s=default header.b=IJR+G2sI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g83si127865pfb.278.2019.01.04.11.02.48; Fri, 04 Jan 2019 11:03:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=b9PjUlbt; dkim=pass header.i=@codeaurora.org header.s=default header.b=IJR+G2sI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727865AbfADRmF (ORCPT + 99 others); Fri, 4 Jan 2019 12:42:05 -0500 Received: from smtp.codeaurora.org ([198.145.29.96]:39058 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727127AbfADRmF (ORCPT ); Fri, 4 Jan 2019 12:42:05 -0500 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id 323D4608C6; Fri, 4 Jan 2019 17:42:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1546623723; bh=zca2SsK3nw3O37+eqanDCtOSt04ycSV0pycfbAUlwnI=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=b9PjUlbtJ2QlUpybN3OBem5d0O9WUYXMoSAXC7N3zW0aG8y8p0QvKPdG0sjPvDZuZ 6DvTTFDO60kawEQT5yizdZ2UMpxQo/Se15zytYP1BWBEZ9ypfz6bTKIArK6Iy4QlDT MWvPfUkzxZH+bTe73cwoD4ODg1Mq7in4blGePNz4= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.7 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_INVALID,DKIM_SIGNED autolearn=no autolearn_force=no version=3.4.0 Received: from lmark-linux.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: lmark@smtp.codeaurora.org) by smtp.codeaurora.org (Postfix) with ESMTPSA id 98AED6087F; Fri, 4 Jan 2019 17:41:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1546623719; bh=zca2SsK3nw3O37+eqanDCtOSt04ycSV0pycfbAUlwnI=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=IJR+G2sINhxdvmzAbMxLh5+weluEm2lBDAh1E/lf9Nn1mcd4eG2m6y4CE7CbY3COG iWM2tFd6tSd5LR2uu3JkcFczsFHpZY87BjkOYjPQBmk8x3k85PkDM92RBgfKwcZjtU RLtUdx+niAyuKkPHzkKKoK3eK5XYvWlQ19Uhc42M= DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org 98AED6087F Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=lmark@codeaurora.org Date: Fri, 4 Jan 2019 09:41:57 -0800 (PST) From: Liam Mark X-X-Sender: lmark@lmark-linux.qualcomm.com To: Alexey Skidanov cc: Laura Abbott , Greg KH , devel@driverdev.osuosl.org, tkjos@android.com, rve@android.com, linux-kernel@vger.kernel.org, maco@android.com, sumit.semwal@linaro.org Subject: Re: [PATCH v3] staging: android: ion: Add implementation of dma_buf_vmap and dma_buf_vunmap In-Reply-To: <3740948f-02be-cf7a-bc41-54b4fd195103@intel.com> Message-ID: References: <1517400222-2854-1-git-send-email-alexey.skidanov@intel.com> <20180131130047.GA22917@kroah.com> <89be45dd-ac0e-4efb-2b21-e6c07b0cd66e@intel.com> <7d836085-cd8d-300b-56be-e8db4ff37afc@intel.com> <67f288db-d9ea-2d45-ddcf-a15dbff316f5@intel.com> <3740948f-02be-cf7a-bc41-54b4fd195103@intel.com> User-Agent: Alpine 2.10 (DEB 1266 2009-07-14) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 18 Dec 2018, Alexey Skidanov wrote: > >>> I was wondering if we could re-open the discussion on adding support to > >>> ION for dma_buf_vmap. > >>> It seems like the patch was not taken as the reviewers wanted more > >>> evidence of an upstream use case. > >>> > >>> Here would be my upstream usage argument for including dma_buf_vmap > >>> support in ION. > >>> > >>> Currently all calls to ion_dma_buf_begin_cpu_access result in the creation > >>> of a kernel mapping for the buffer, unfortunately the resulting call to > >>> alloc_vmap_area can be quite expensive and this has caused a performance > >>> regression for certain clients when they have moved to the new version of > >>> ION. > >>> > >>> The kernel mapping is not actually needed in ion_dma_buf_begin_cpu_access, > >>> and generally isn't needed by clients. So if we remove the creation of the > >>> kernel mapping in ion_dma_buf_begin_cpu_access and only create it when > >>> needed we can speed up the calls to ion_dma_buf_begin_cpu_access. > >>> > >>> An additional benefit of removing the creation of kernel mappings from > >>> ion_dma_buf_begin_cpu_access is that it makes the ION code more secure. > >>> Currently a malicious client could call the DMA_BUF_IOCTL_SYNC IOCTL with > >>> flags DMA_BUF_SYNC_END multiple times to cause the ION buffer kmap_cnt to > >>> go negative which could lead to undesired behavior. > >>> > >>> One disadvantage of the above change is that a kernel mapping is not > >>> already created when a client calls dma_buf_kmap. So the following > >>> dma_buf_kmap contract can't be satisfied. > >>> > >>> /** > >>> * dma_buf_kmap - Map a page of the buffer object into kernel address > >>> space. The > >>> * same restrictions as for kmap and friends apply. > >>> * @dmabuf: [in] buffer to map page from. > >>> * @page_num: [in] page in PAGE_SIZE units to map. > >>> * > >>> * This call must always succeed, any necessary preparations that might > >>> fail > >>> * need to be done in begin_cpu_access. > >>> */ > >>> > >>> But hopefully we can work around this by moving clients to dma_buf_vmap. > >> I think the problem is with the contract. We can't ensure that the call > >> is always succeeds regardless the implementation - any mapping might > >> fail. Probably this is why *all* clients of dma_buf_kmap() check the > >> return value (so it's safe to return NULL in case of failure). > >> > > > > I think currently the call to dma_buf_kmap will always succeed since the > > DMA-Buf contract requires that the client first successfully call > > dma_buf_begin_cpu_access(), and if dma_buf_begin_cpu_access() succeeds > > then dma_buf_kmap will succeed. > > > >> I would suggest to fix the contract and to keep the dma_buf_kmap() > >> support in ION. > > > > I will leave it to the DMA-Buf maintainers as to whether they want to > > change their contract. > > > > Liam > > > > Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, > > a Linux Foundation Collaborative Project > > > > Ok. We need the list of the clients using the ION in the mainline tree. > Looks to me like the only functions which might be calling dma_buf_kmap/dma_buf_kunmap on ION buffers are tegra_bo_kmap/tegra_bo_kunmap, I assume Tegra is used in some Android automotive products. Looks like these functions could be moved over to using dma_buf_vmap/dma_buf_vunmap but it wouldn't be very clean and would add a performance hit. Liam Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, a Linux Foundation Collaborative Project