[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1752163.uYYNevmZpH@np-p-burton>
Date: Tue, 26 Sep 2017 14:30:33 -0700
From: Paul Burton <paul.burton@...tec.com>
To: David Miller <davem@...emloft.net>
CC: <matt.redfearn@...tec.com>, <netdev@...r.kernel.org>,
<alexandre.torgue@...com>, <peppe.cavallaro@...com>,
<linux-kernel@...r.kernel.org>, <linux-mips@...ux-mips.org>,
<james.hogan@...tec.com>
Subject: Re: [PATCH] net: stmmac: Meet alignment requirements for DMA
Hi David,
On Tuesday, 26 September 2017 13:33:09 PDT David Miller wrote:
> From: Paul Burton <paul.burton@...tec.com>
> Date: Tue, 26 Sep 2017 11:48:19 -0700
>
> >> The device writes into only the bytes it was given access to, which
> >> starts at the DMA address.
> >
> > OK - still fine but *only* if we don't write to anything that happens to
> > be
> > part of the cache lines that are only partially covered by the DMA mapping
> > & make them dirty. If we do then any writeback of those lines will
> > clobber data the device wrote, and any invalidation of them will discard
> > data the CPU wrote.
> >
> > How would you have us ensure that such writes don't occur?
> >
> > This really does not feel to me like something to leave up to drivers
> > without any means of checking or enforcing correctness. The requirement
> > to align DMA mappings at cache-line boundaries, as outlined in
> > Documentation/DMA-API.txt, allows this to be enforced. If you want to
> > ignore this requirement then there is no clear way to verify that we
> > aren't writing to cache lines involved in a DMA transfer whilst the
> > transfer is occurring, and no sane way to handle those cache lines if we
> > do.
>
> The memory immediately before skb->data and immediately after
> skb->data+skb->len will not be accessed. This is guaranteed.
This guarantee is not made known to the DMA API or the per-arch code backing
it, nor can I see it documented anywhere. It's good to hear that it exists in
some form though.
> I will request something exactly one more time to give you the benfit
> of the doubt that you want to show me why this is _really_ a problem
> and not a problem only in theory.
My previous message simply walked through your existing example & explained
why your assumptions can be incorrect as far as the DMA API & interactions
with caches go - I don't think that warrants the seemingly confrontational
tone.
> Please show me an exact sequence, with current code, in a current driver
> that uses the DMA API properly, where corruption really can occur.
How about this:
https://patchwork.kernel.org/patch/9423097/
Now this isn't networking code at fault, it was a problem with MMC. Given that
you say there's a guarantee that networking code won't write to cache lines
that partially include memory mapped for DMA, perhaps networking code is
immune to this issue (though at a minimum I think that guarantee ought to be
documented so that others know to keep it true).
The question remains though: what would you have us do to catch the broken
uses of the DMA API with non-cacheline-aligned memory? By not obeying
Documentation/DMA-API.txt you're preventing us from adding checks that catch
others who also disobey the alignment requirement in ways that are not fine,
and which result in otherwise difficult to track down memory corruption.
> The new restriction is absolutely not reasonable for this use case.
> It it furthermore impractical to require the 200+ drivers the use this
> technique to allocate and map networking buffers to abide by this new
> rule. Many platforms with even worse cache problems that MIPS handle
> this just fine.
>
> Thank you.
One disconnect here is that you describe a "new restriction" whilst the
restriction we're talking about has been documented in Documentation/DMA-
API.txt since at least the beginning of the git era - it is not new at all.
The only thing that changed for us that I have intended to warn when the
restriction is not met, because that often indicates genuine & otherwise
difficult to detect bugs such as the MMC one I linked to above. FYI that
warning has not gone into mainline yet anyway.
I'd suggest that at a minimum if you're unwilling to obey the API as described
in Documentation/DMA-API.txt then it would be beneficial if you could propose
a change to it such that it works for you, and perhaps we can extend the API &
its documentation to allow your usage whilst also allowing us to catch broken
uses.
Surely we can agree that the current situation wherein networking code clearly
disobeys the documented API is not a good one, and that allowing other broken
uses to slip by unnoticed except in rare difficult to track down corner cases
is not good either.
Thanks,
Paul
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists