Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1194299ybz; Thu, 16 Apr 2020 04:50:03 -0700 (PDT) X-Google-Smtp-Source: APiQypK7+Mh68I4A57S1d/pJXuBxKZMYnyM+GPKcd3Q7Ygpck+RnbxMFpjZe/m/BpXSZx3dY/nh1 X-Received: by 2002:a17:906:9442:: with SMTP id z2mr8773846ejx.249.1587037803340; Thu, 16 Apr 2020 04:50:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587037803; cv=none; d=google.com; s=arc-20160816; b=c173TyejrFA+T8dmZXc3b2TLa5yBbCS2MHjP1DaXG5g6onsa8Uijsh2S9tI+9ghcti /FXVzqH0SxSQwqQO2UtNTP3oYCU7h6NvWFATRo3I9xcvRxOzix5XUUkqz7pv5u3XUEHz NwAa08Dd99oo4BlVaG0DHXfJPqq16LToCHHhhCXIPZHbNpOPi3ZClqUQh4ViGWe7iSQ6 +nE5uzaoUeqklclKhHzVdxlGDvcBnVaarvE/ojrqGxokTpSkSI4Etdw8PMsmcrOMTiWX 8SoMuqwIyK2zNtfZ14FWHW7zCdU6nr9iS+/5T+CyUqnJ9eAu0rHFlPpeQs1fWZ2JJTWF WBwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=j/zupZiD1foB3EIZQ0MyrUGw2/IYzzYCtApYZPgDYUk=; b=Px41IEcsNiHHucVy5edAnRs2sUo9PhxYrX9pyNhFn/4loW9sc+f8TE4PRBeG9pBQzd VjXM4uXFl5/JBjv6hQbQd3kaIhfyi/NEBk7CI7cuaHbU0fVhm8XC5SSqud4dmOGusa/Z ZM4ENxe7MpuckGRaLspdstOnDg4lLdMv3zgeggW82/EQyYdf8u5AvxZ3iJXYLom81mrD J4qpP7Pr2UsTGtX7hiri+CTT4UCa6o4dXCeIkIwfJPZKVKd4RTKigG8MZVrfZzdyoegi 1qSOKC5ZWtRUCC74I91sjgSEcCjPAxQo9GXletXbpM1ggpTe9xt+1iMkL+1ts8XjjQje ZoiA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=W2uMPyIU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j3si12223612ejb.482.2020.04.16.04.49.40; Thu, 16 Apr 2020 04:50:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=W2uMPyIU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2506638AbgDPLr2 (ORCPT + 99 others); Thu, 16 Apr 2020 07:47:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:55366 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2504827AbgDPKZO (ORCPT ); Thu, 16 Apr 2020 06:25:14 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 457552192A; Thu, 16 Apr 2020 10:25:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587032711; bh=lKwbnEdUTTba3AJVKzmuvKJ2X9FO6D210s3WkJT/zZQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=W2uMPyIU+mZIh4oNdYX1OAnVqWzjphWKBN2GBWPvfUx+i38L7tiemQkppi+gxHlZW JlF2YNYah1X+HwUMB3yZOQ35X0ro+n9Y78fNlVj/EfyxfoZZsOyB5MYhQSYl8R4ERW H/AbdIG7irc1sh8ffKpw66MvAQ+0sft+pvgi+fyg= Date: Thu, 16 Apr 2020 12:25:08 +0200 From: Greg Kroah-Hartman To: John Stultz Cc: driverdevel , nd , Todd Kjos , Lecopzer Chen , Arnd Bergmann , Daniel Vetter , lkml , dri-devel , "moderated list:DMA BUFFER SHARING FRAMEWORK" , Arve =?iso-8859-1?B?SGr4bm5lduVn?= , Anders Pedersen , Joel Fernandes , "Darren Hart (VMware)" , =?iso-8859-1?Q?=D8rjan?= Eide , Laura Abbott , Martijn Coenen , Sumit Semwal , Christian Brauner , linux-media@vger.kernel.org Subject: Re: [PATCH] staging: android: ion: Skip sync if not mapped Message-ID: <20200416102508.GA820251@kroah.com> References: <20200414134629.54567-1-orjan.eide@arm.com> <20200414141849.55654-1-orjan.eide@arm.com> <20200414142810.GA958163@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 14, 2020 at 09:41:31PM -0700, John Stultz wrote: > On Tue, Apr 14, 2020 at 7:28 AM Greg Kroah-Hartman > wrote: > > > > On Tue, Apr 14, 2020 at 04:18:47PM +0200, ?rjan Eide wrote: > > > Only sync the sg-list of an Ion dma-buf attachment when the attachment > > > is actually mapped on the device. > > > > > > dma-bufs may be synced at any time. It can be reached from user space > > > via DMA_BUF_IOCTL_SYNC, so there are no guarantees from callers on when > > > syncs may be attempted, and dma_buf_end_cpu_access() and > > > dma_buf_begin_cpu_access() may not be paired. > > > > > > Since the sg_list's dma_address isn't set up until the buffer is used > > > on the device, and dma_map_sg() is called on it, the dma_address will be > > > NULL if sync is attempted on the dma-buf before it's mapped on a device. > > > > > > Before v5.0 (commit 55897af63091 ("dma-direct: merge swiotlb_dma_ops > > > into the dma_direct code")) this was a problem as the dma-api (at least > > > the swiotlb_dma_ops on arm64) would use the potentially invalid > > > dma_address. How that failed depended on how the device handled physical > > > address 0. If 0 was a valid address to physical ram, that page would get > > > flushed a lot, while the actual pages in the buffer would not get synced > > > correctly. While if 0 is an invalid physical address it may cause a > > > fault and trigger a crash. > > > > > > In v5.0 this was incidentally fixed by commit 55897af63091 ("dma-direct: > > > merge swiotlb_dma_ops into the dma_direct code"), as this moved the > > > dma-api to use the page pointer in the sg_list, and (for Ion buffers at > > > least) this will always be valid if the sg_list exists at all. > > > > > > But, this issue is re-introduced in v5.3 with > > > commit 449fa54d6815 ("dma-direct: correct the physical addr in > > > dma_direct_sync_sg_for_cpu/device") moves the dma-api back to the old > > > behaviour and picks the dma_address that may be invalid. > > > > > > dma-buf core doesn't ensure that the buffer is mapped on the device, and > > > thus have a valid sg_list, before calling the exporter's > > > begin_cpu_access. > > > > > > Signed-off-by: ?rjan Eide > > > --- > > > drivers/staging/android/ion/ion.c | 12 ++++++++++++ > > > 1 file changed, 12 insertions(+) > > > > > > Resubmit without disclaimer, sorry about that. > > > > > > This seems to be part of a bigger issue where dma-buf exporters assume > > > that their dma-buf begin_cpu_access and end_cpu_access callbacks have a > > > certain guaranteed behavior, which isn't ensured by dma-buf core. > > > > > > This patch fixes this in ion only, but it also needs to be fixed for > > > other exporters, either handled like this in each exporter, or in > > > dma-buf core before calling into the exporters. > > > > > > diff --git a/drivers/staging/android/ion/ion.c b/drivers/staging/android/ion/ion.c > > > index 38b51eace4f9..7b752ba0cb6d 100644 > > > --- a/drivers/staging/android/ion/ion.c > > > +++ b/drivers/staging/android/ion/ion.c > > > > Now that we have the dma-buff stuff in the tree, do we even need the > > ion code in the kernel anymore? Can't we delete it now? > > > > I agree that we shouldn't be taking further (non-security/cleanup) > patches to the ION code. > > I'd like to give developers a little bit of a transition period (I was > thinking a year, but really just one LTS release that has both would > do) where they can move their ION heaps over to dmabuf heaps and test > both against the same tree. > > But I do think we can mark it as deprecated and let folks know that > around the end of the year it will be deleted. No one ever notices "depreciated" things, they only notice if the code is no longer there :) So I'm all for just deleting it and seeing who even notices... thanks, greg k-h