From: Demi Marie Obenour <demiobenour@gmail.com>
To: "Christian König" <christian.koenig@amd.com>,
dri-devel@lists.freedesktop.org,
"Xen developer discussion" <xen-devel@lists.xenproject.org>,
linux-media@vger.kernel.org
Cc: Val Packett <val@invisiblethingslab.com>,
Suwit Semal <sumit.semwal@linaro.org>
Subject: Re: Pinned, non-revocable mappings of VRAM: will bad things happen?
Date: Fri, 17 Apr 2026 15:35:51 -0400 [thread overview]
Message-ID: <7472bfcf-8c22-4ac7-b903-a883cdb8f1c6@gmail.com> (raw)
In-Reply-To: <4751cf03-d3c1-4d5d-af8e-39ad7c8ffb84@amd.com>
[-- Attachment #1.1.1: Type: text/plain, Size: 3815 bytes --]
On 4/17/26 03:53, Christian König wrote:
> On 4/16/26 18:13, Demi Marie Obenour wrote:
>> On 4/16/26 05:57, Christian König wrote:
>>> On 4/16/26 01:27, Demi Marie Obenour wrote:
>>>> Is it safe to assume that if a dmabuf exporter cannot handle
>>>> non-revocable, pinned importers, it will fail the import? Or is
>>>> using dma_buf_pin() unsafe if one does not know the exporter?
>>>
>>> Neither.
>>>
>>> dma_buf_pin() makes sure that the importer doesn't get any invalidation notifications because the exporter moves the backing store of the buffer around for memory management.
>>>
>>> But what is still possible is that the exporter is hot removed, in which case the importer should basically terminate it's DMA operation as soon as possible.
>>>
>>> GPU drivers usually reject pin requests to VRAM from DMA-buf importers when that isn't restricted by cgroups for example, because that can otherwise easily result in a deny of service.
>>>
>>> Amdgpu only recently started to allow pinning into VRAM to support RDMA without ODP (I think it was ODP, but could be that I mixed up the RDMA three letter code for that feature).
>>>
>>>> For context, Xen grant tables do not support revocation. One can ask
>>>> the guest to unmap the grants, but if the guest doesn't obey the only
>>>> recourse is to ungracefully kill it. They also do not support page
>>>> faults, so the pages must be pinned. Right now, grant tables don't
>>>> support PCI BAR mappings, but that's fixable.
>>>
>>> That sounds like an use case for the DMA-buf pin interface.
>>>
>>>> How badly is this going to break with dGPU VRAM, if at all? I know
>>>> that AMDGPU has a fallback when the BAR isn't mappable. What about
>>>> other drivers? Supporting page faults the way KVM does is going to
>>>> be extremely hard, so pinned mappings and DMA transfers are vastly
>>>> preferable.
>>>
>>> Well if you only want to share a fixed amount of VRAM then that is pretty much ok.
>>>
>>> But when the client VM can trigger pinning on demand without any limitation you can pretty easily have deny of service against the host. That is usually a rather bad idea.
>>
>> Is there a reasonable way to choose such an amount?
>
> Not really.
>
>> Unless I am
>> mistaken, client workloads are highly non-uniform: a single game or
>> compute job might well use more VRAM than every other program on the
>> system combined.
>
> Yeah, perfectly correct.
>
>> Are these workloads impossible to make work well with pinning?
>
> No, as long as you don't know the workload beforehand, e.g. when you define the limit.
>
> I mean that's why basically everybody avoids pinning and assigning fixed amounts of resources.
>
> Even if you can make it work technically pinning usually results in a rather bad end user experience.
>
> Regards,
> Christian.
Do drivers and programs assume that they can access VRAM from the CPU?
Are any of the following reasonable options?
1. Change the guest kernel to only map (and thus pin) a small subset
of VRAM at any given time. If unmapped VRAM is accessed the guest
traps the page fault, evicts an old VRAM mapping, and creates a
new one.
2. Pretend that resizable BAR is not enabled, so the guest doesn't
think it can map much of VRAM at once. If resizable BAR is enabled
on the host, it might be possible to split the large BAR mapping
in a lot of ways.
Or does Xen really need to allow the host to handle guest page faults?
That adds a huge amount of complexity to trusted and security-critical
parts of the system, so it really is a last resort. Putting the
complexity in to the guest virtio-GPU driver is vastly preferable if
it can be made to work well.
--
Sincerely,
Demi Marie Obenour (she/her/hers)
[-- Attachment #1.1.2: OpenPGP public key --]
[-- Type: application/pgp-keys, Size: 7253 bytes --]
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
next prev parent reply other threads:[~2026-04-17 19:36 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-15 23:27 Pinned, non-revocable mappings of VRAM: will bad things happen? Demi Marie Obenour
2026-04-16 9:57 ` Christian König
2026-04-16 16:13 ` Demi Marie Obenour
2026-04-17 7:53 ` Christian König
2026-04-17 19:35 ` Demi Marie Obenour [this message]
2026-04-20 8:49 ` Christian König
2026-04-20 17:03 ` Demi Marie Obenour
2026-04-20 17:58 ` Christian König
2026-04-20 18:46 ` Demi Marie Obenour
2026-04-20 18:53 ` Christian König
2026-04-20 19:12 ` Demi Marie Obenour
2026-04-21 16:55 ` Val Packett
2026-04-21 17:43 ` Christian König
2026-04-22 1:27 ` Demi Marie Obenour
2026-04-22 2:03 ` Alex Deucher
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=7472bfcf-8c22-4ac7-b903-a883cdb8f1c6@gmail.com \
--to=demiobenour@gmail.com \
--cc=christian.koenig@amd.com \
--cc=dri-devel@lists.freedesktop.org \
--cc=linux-media@vger.kernel.org \
--cc=sumit.semwal@linaro.org \
--cc=val@invisiblethingslab.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox