Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp5759833iog; Thu, 23 Jun 2022 04:59:19 -0700 (PDT) X-Google-Smtp-Source: AGRyM1sBKK1JMxEChNae23zlJFQ5X4biMFbsNgqIgsug9xi0iO51Lm6U52iIVsHtJr+OuPQc9lkk X-Received: by 2002:a17:907:a0c8:b0:711:d8a5:caff with SMTP id hw8-20020a170907a0c800b00711d8a5caffmr7625189ejc.43.1655985559370; Thu, 23 Jun 2022 04:59:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655985559; cv=none; d=google.com; s=arc-20160816; b=Ro8quRj195L/saew34uwe/EH+TVr/ZSwDyBZaaosS4fSUHbgKT15AfqF+1IKXgFaYG 6uHMVBre1qlfHgeAw+9GgP9FHkGx0S3oUFXdGw3orsvEapxOF2t8oPqiWTocVAHHt7kL za42YkXu/QwdzOXKyvOtqEtIjflmWkalHlMOdk/vyKuJEIUCaSa8oipWr2F1kBtPicSx 5fYecY18peTdPzaDJTKZD+JPRx5TWkq+m+n/fVkFmtbgAsYaFCbcBzud8oUCptr2Newi Byl3xEfDFVxzWlUAi403GVxfHVAl2snkQLoDA8EeOVMIdhHECVAyBh9c9AscXTfZ1jfV QmpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=y8Yo5wlbd0YXn06exwKF3O4Cz3fxX3jJzoAnIybqxJg=; b=CbIvj+DpfwBPl88Dc2cbxV2Re5EaPYxxeUxj/7ebgAPDXE0WQ08stevCAE5kCCBSt+ MPJFreOY8/+xAPOLtRKMMhZs5DW+5b6AL5673HgnmuGj1qQO5dhMqQ0w5kp+91X5i8JB HDIVCcntDc6ldEzp+A0vMbfQpMB68tSRSfLctk1U2kk2UVYt6clohkIDlevPkNikRTxn fpsIutNFK2yj5XqLXzZBQV5Hm+ZpOlDCWdIfvQjTiWMPczv1i7Mpgz+9yLhnMZASTrEn zenY5EdtbLaf9+vUkiBGU+y56oB6J0Ic0Gxlo/kLMVG9t7kzz0G9AjvWgQ7u8PiWsilB ln5A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gb28-20020a170907961c00b0072629670b9dsi1452148ejc.965.2022.06.23.04.58.53; Thu, 23 Jun 2022 04:59:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231249AbiFWL3m (ORCPT + 99 others); Thu, 23 Jun 2022 07:29:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48588 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230257AbiFWL3k (ORCPT ); Thu, 23 Jun 2022 07:29:40 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 62DCC4BB99 for ; Thu, 23 Jun 2022 04:29:39 -0700 (PDT) Received: from gallifrey.ext.pengutronix.de ([2001:67c:670:201:5054:ff:fe8d:eefb] helo=[IPv6:::1]) by metis.ext.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1o4L1j-0004KC-6N; Thu, 23 Jun 2022 13:29:35 +0200 Message-ID: Subject: Re: DMA-buf and uncached system memory From: Lucas Stach To: Christian =?ISO-8859-1?Q?K=F6nig?= , Pekka Paalanen Cc: "Sharma, Shashank" , lkml , dri-devel , Nicolas Dufresne , linaro-mm-sig@lists.linaro.org, Sumit Semwal , linux-media Date: Thu, 23 Jun 2022 13:29:34 +0200 In-Reply-To: <6287f5f8-d9af-e03d-a2c8-ea8ddcbdc0d8@amd.com> References: <91ff0bbb-ea3a-2663-3453-dea96ccd6dd8@amd.com> <9178e19f5c0e141772b61b759abaa0d176f902b6.camel@ndufresne.ca> <20220623101326.18beeab3@eldfell> <954d0a9b-29ef-52ef-f6ca-22d7e6aa3f4d@amd.com> <4b69f9f542d6efde2190b73c87096e87fa24d8ef.camel@pengutronix.de> <95cca943bbfda6af07339fb8d2dc7f4da3aa0280.camel@pengutronix.de> <05814ddb-4f3e-99d8-025a-c31db7b2c46b@amd.com> <708e27755317a7650ca08ba2e4c14691ac0d6ba2.camel@pengutronix.de> <6287f5f8-d9af-e03d-a2c8-ea8ddcbdc0d8@amd.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.40.4 (3.40.4-1.fc34) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 2001:67c:670:201:5054:ff:fe8d:eefb X-SA-Exim-Mail-From: l.stach@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Am Donnerstag, dem 23.06.2022 um 13:10 +0200 schrieb Christian König: > Am 23.06.22 um 12:13 schrieb Lucas Stach: > > [SNIP] > > > > On most of the multimedia > > > > targeted ARM SoCs being unable to snoop the cache is the norm, not an > > > > exception. > > > > > > > > > See for example on AMD/Intel hardware most of the engines can perfectly > > > > > deal with cache coherent memory accesses. Only the display engines can't. > > > > > > > > > > So on import time we can't even say if the access can be coherent and > > > > > snoop the CPU cache or not because we don't know how the imported > > > > > DMA-buf will be used later on. > > > > > > > > > So for those mixed use cases, wouldn't it help to have something > > > > similar to the dma_sync in the DMA-buf API, so your scanout usage can > > > > tell the exporter that it's going to do non-snoop access and any dirty > > > > cache lines must be cleaned? Signaling this to the exporter would allow > > > > to skip the cache maintenance if the buffer is in CPU uncached memory, > > > > which again is a default case for the ARM SoC world. > > > Well for the AMD and Intel use cases we at least have the opportunity to > > > signal cache flushing, but I'm not sure if that counts for everybody. > > > > > Sure, all the non-coherent arches have some way to do the cache > > maintenance in some explicit way. Non coherent and no cache maintenance > > instruction would be a recipe for desaster. ;) > > > > > What we would rather do for those use cases is an indicator on the > > > DMA-buf if the underlying backing store is CPU cached or not. The > > > importer can then cleanly reject the use cases where it can't support > > > CPU cache snooping. > > > > > > This then results in the normal fallback paths which we have anyway for > > > those use cases because DMA-buf sharing is not always possible. > > > > > That's a very x86 centric world view you have there. 99% of DMA-buf > > uses on those cheap ARM SoCs is non-snooping. We can not do any > > fallbacks here, as the whole graphics world on those SoCs with their > > different IP cores mixed together depends on DMA-buf sharing working > > efficiently even when the SoC is mostly non coherent. > > > > In fact DMA-buf sharing works fine on most of those SoCs because > > everyone just assumes that all the accelerators don't snoop, so the > > memory shared via DMA-buf is mostly CPU uncached. It only falls apart > > for uses like the UVC cameras, where the shared buffer ends up being > > CPU cached. > > Well then the existing DMA-buf framework is not what you want to use for > this. > Sorry, but this is just ignoring reality. You try to flag 8+ years of DMA-buf usage on non-coherent arches as "you shouldn't do this". At this point there are probably a lot more users (drivers) of DMA-buf in the kernel for devices, which are used on non-coherent arches, than there are on coherent arches. > > Non-coherent without explicit domain transfer points is just not going > > to work. So why can't we solve the issue for DMA-buf in the same way as > > the DMA API already solved it years ago: by adding the equivalent of > > the dma_sync calls that do cache maintenance when necessary? On x86 (or > > any system where things are mostly coherent) you could still no-op them > > for the common case and only trigger cache cleaning if the importer > > explicitly says that is going to do a non-snooping access. > > Because DMA-buf is a framework for buffer sharing between cache coherent > devices which don't signal transitions. > > We intentionally didn't implemented any of the dma_sync_* functions > because that would break the intended use case. > Non coherent access, including your non-snoop scanout, and no domain transition signal just doesn't go together when you want to solve things in a generic way. Remember that in a fully (not only IO) coherent system the CPU isn't the only agent that may cache the content you are trying to access here. The dirty cacheline could reasonably still be sitting in a GPU or VPU cache, so you need some way to clean those cachelines, which isn't a magic "importer knows how to call CPU cache clean instructions". > You can of course use DMA-buf in an incoherent environment, but then you > can't expect that this works all the time. > > This is documented behavior and so far we have bluntly rejected any of > the complains that it doesn't work on most ARM SoCs and I don't really > see a way to do this differently. Can you point me to that part of the documentation? A quick grep for "coherent" didn't immediately turn something up within the DMA-buf dirs. Regards, Lucas