Received: by 10.223.176.5 with SMTP id f5csp1603750wra; Wed, 31 Jan 2018 08:48:27 -0800 (PST) X-Google-Smtp-Source: AH8x224zJSN11YnjLN1EJ5ctxfjM8hJqa/yMnY+DkMaz3ygKMILfDJEN8bys+vuHsaQGmTRv1y1P X-Received: by 10.99.110.10 with SMTP id j10mr9851134pgc.72.1517417306933; Wed, 31 Jan 2018 08:48:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517417306; cv=none; d=google.com; s=arc-20160816; b=NW/cce+RjUydGK3o/o0AJUyTgegVs4jBzL3GbVR0NoxBvjVyVYEHo+RC6Cxa9lUMW3 3Y7wozxb4acRiIY9sijN4sipOQqyh6C+bZUxphOR0dbBJbL5AwRORqtedAhDiH+Zp2Wu lLK9eOr9Eez+6jU9+wcgIhWdNLwjuB0GMqLozYF1Za7K6I3/S3W8GrpbIvIAQxNPcWIe qf8FOrdwatAq9tLm3inu5luYTwUjUN08XOCgucyfWEp2TULp4Mqdn5UPgINORVfX/Dpe 0lS9rBULSWMRcpi4wBLn8aON8gk6hMVK7/dAwA2raq1canInG59LBJ8TxNXjgfF9GFMB WkCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=NPyrX0O6kEkQlFphJoDXraosoPRf0u2X90KF8+M8i8Q=; b=QAKslwwq30dzb8M3tkbkMRNo0MN0Vn0KACuejzyPzUSr/3X31ZwqDzy/K0mUONq9K+ wpjb4UTMXiXaWye82J3voWhSbcLuFa3zrO+WZ1atVaNeuswFUWcMZ/eB9kG+bwitx4RA Z/cKotbe1njXCC87m6RymF3aAOqY4qEUIJlLiXRwRMH94JWiTTNZ7nXWxzNdbYwqD/EM 3uHeslUtjfkd/M7oo5d2T1bfILNipn0q+WYTfxHYVIkkBOZKIR1vBtqaHWFqQqTK/FmC OnCZYvLHEJr8xtj0WV5vPn4O/RgW4HIue/rnwbe06lUYXAOEkyODWlr5NciBFZttTjJ+ dgbg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b17si4232341pfl.222.2018.01.31.08.48.12; Wed, 31 Jan 2018 08:48:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753847AbeAaQQ1 (ORCPT + 99 others); Wed, 31 Jan 2018 11:16:27 -0500 Received: from lb2-smtp-cloud7.xs4all.net ([194.109.24.28]:59574 "EHLO lb2-smtp-cloud7.xs4all.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751842AbeAaQQZ (ORCPT ); Wed, 31 Jan 2018 11:16:25 -0500 Received: from [192.168.2.10] ([212.251.195.8]) by smtp-cloud7.xs4all.net with ESMTPA id gv3YerE4zExGfgv3be4d7w; Wed, 31 Jan 2018 17:16:23 +0100 Subject: Re: [RFC PATCH 0/8] [media] Request API, take three To: Tomasz Figa Cc: Alexandre Courbot , Mauro Carvalho Chehab , Laurent Pinchart , Pawel Osciak , Marek Szyprowski , Sakari Ailus , Gustavo Padovan , Linux Media Mailing List , linux-kernel@vger.kernel.org References: <20180126060216.147918-1-acourbot@chromium.org> <307f58dd-ce7e-b6f5-092a-f8679349be73@xs4all.nl> From: Hans Verkuil Message-ID: <30ee67f2-b375-4957-44ff-c663095b74de@xs4all.nl> Date: Wed, 31 Jan 2018 17:16:16 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-CMAE-Envelope: MS4wfKVV9wPLkMu05ind5TVbkR4/9Q2tBGrXGa7MKB2HivbXbwShyIz3aGLDeVWYYILmyOMYBmjJbayJMdbpJ34sTFOX8G62K4jakkL4jrPcsVLxxQ2vf+Tr ZdH3yBvEJo5sC8NipGQC/1ax/ouJorWw6AFRHKX9P2v8bSLqyvWP4/Kf0+9DKBrb5/cMEdX8j0cCXc9eDCG61NBT4FChnL6EeeGNbwz1RdmwtiAvFtIt4IXm TgyTmQIrAyloDphrjOyvLgIGbTeguj1CaSpwKwcdziOBYtZZmXypoEMzqcxJtWl82til/13QGhg/XxRYETP1jE6vQ8ZUz+uvh+DWFBe6oVM8c7C1X1ccHC5b gGgGBrRcjBzjqc2Frq5NmqfvKgtPoWi6fCjMYnAIBBo1uAWsj10xE0Caa/oGBlBjigUFCrTk4B94Rze9oWrqt5IqY3qnsw== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/31/2018 10:46 AM, Tomasz Figa wrote: > On Wed, Jan 31, 2018 at 5:47 PM, Hans Verkuil wrote: >> On 01/31/2018 09:10 AM, Tomasz Figa wrote: >>> Hi Hans, >>> >>> Sorry for joining the party late. >>> >>> On Wed, Jan 31, 2018 at 4:50 PM, Hans Verkuil wrote: >>>> On 01/30/2018 07:31 AM, Alexandre Courbot wrote: >>>>> Hi Hans, >>>>> >>>>> On Mon, Jan 29, 2018 at 8:21 PM, Hans Verkuil wrote: >>>>>> On 01/26/2018 07:02 AM, Alexandre Courbot wrote: >>>>>>> Howdy. Here is your bi-weekly request API redesign! ;) >>>>>>> >>>>>>> Again, this is a simple version that only implements the flow of requests, >>>>>>> without applying controls. The intent is to get an agreement on a base to work >>>>>>> on, since the previous versions went straight back to the redesign board. >>>>>>> >>>>>>> Highlights of this version: >>>>>>> >>>>>>> * As requested by Hans, request-bound buffers are now passed earlier to drivers, >>>>>>> as early as the request itself is submitted. Doing it earlier is not be useful >>>>>>> since the driver would not know the state of the request, and thus cannot do >>>>>>> anything with the buffer. Drivers are now responsible for applying request >>>>>>> parameters themselves. >>>>>>> >>>>>>> * As a consequence, there is no such thing as a "request queue" anymore. The >>>>>>> flow of buffers decides the order in which requests are processed. Individual >>>>>>> devices of the same pipeline can implement synchronization if needed, but this >>>>>>> is beyond this first version. >>>>>>> >>>>>>> * VB2 code is still a bit shady. Some of it will interfere with the fences >>>>>>> series, so I am waiting for the latter to land to do it properly. >>>>>>> >>>>>>> * Requests that are not yet submitted effectively act as fences on the buffers >>>>>>> they own, resulting in the buffer queue being blocked until the request is >>>>>>> submitted. An alternate design would be to only block the >>>>>>> not-submitted-request's buffer and let further buffers pass before it, but since >>>>>>> buffer order is becoming increasingly important I have decided to just block the >>>>>>> queue. This is open to discussion though. >>>>>> >>>>>> I don't think we should mess with the order. >>>>> >>>>> Agreed, let's keep it that way then. >>>>> >>> >>> I'm not sure I'm following here. Does it mean (quoting Alex): >>> >>> a) "Requests that are not yet submitted effectively act as fences on the buffers >>> they own, resulting in the buffer queue being blocked until the request is >>> submitted." >>> >>> b) "block the not-submitted-request's buffer and let further buffers >>> pass before it" >>> >>> or neither? >>> >>> Hans, could you clarify what you think is the right behavior here? >> >> I think I misread the text. Alexandre, buffers in not-yet-submitted requests >> should not act as fences. They are similar to buffers that are prepared >> through the VIDIOC_PREPARE_BUF call. They are just sitting there and won't >> be in the queue until someone calls QBUF. >> >> It's the same for not-yet-submitted requests: the buffers don't act as >> fences until the request is submitted. > > Thanks for explanation. > > To be 100% sure, that would mean that a buffer is added into the vb2 > queue as soon as the request that includes related QBUF call is > queued, right? Correct. > >> >> Interesting related questions: how does VIDIOC_PREPARE_BUF interact with >> a request? What happens if a buffer is added to a non-yet-submitted request >> and userspace calls VIDIOC_QBUF with that same buffer but with no request? >> >> This all needs to be defined. > > That sounds like a failure to me. Actually very similar to trying to > call QBUF twice on the same buffer, without dequeuing it. What would > be the behavior in such case? I would say that it makes no sense to use VIDIOC_PREPARE_BUF with a request and should be considered an error. Although it is perfectly fine IMHO to queue a previously prepared buffer to a request. Calling QBUF for a buffer that is added to a not-yet-submitted request is an error. I would expect something like -EBUSY to be returned. > >> >>> >>>>>>> * For the codec usecase, I have experimented a bit marking CAPTURE buffers with >>>>>>> the request FD that produced them (vim2m acts that way). This seems to work >>>>>>> well, however FDs are process-local and could be closed before the CAPTURE >>>>>>> buffer is dequeued, rendering that information less meaningful, if not >>>>>>> dangerous. >>>>>> >>>>>> I don't follow this. Once the fd is passed to the kernel its refcount should be >>>>>> increased so the data it represents won't be released if userspace closes the fd. >>>>> >>>>> The refcount of the request is increased. The refcount of the FD is >>>>> not, since it is only a userspace reference to the request. >>>> >>>> I don't think that's right. Looking at how dma-buf does this (dma_buf_get in >>>> dma-buf.c) it calls fget(fd) which increases the fd refcount. In fact, as far as >>>> I can see the struct dma_buf doesn't have a refcount, it is solely refcounted >>>> through the fd. That's probably the model you want to follow. >>> >>> As far as I can see from the code, fget() on an fd increases a >>> reference count on the struct file backing the fd. I don't think there >>> is another level of reference counting of fds themselves - that's why >>> dup(fd) gives you another fd and you can't call close(fd) on the same >>> fd two times. >>> >>>> >>>>> >>>>>> >>>>>> Obviously if userspace closes the fd it cannot do anything with it anymore, but >>>>>> it shouldn't be 'dangerous' AFAICT. >>>>> >>>>> It userspace later gets that closed FD back from a DQBUF call, and >>>>> decides to use it again, then we would have a problem. I agree that it >>>>> is userspace responsibility to be careful here, but making things >>>>> foolproof never hurts. >>>> >>>> I think all the issues will go away if you refcount the fd instead of the >>>> request. It worked well for dma-buf for years. >>> >>> I'm confused here. The kernel never returns the same FD for the same >>> DMA-buf twice. Every time an ioctl is called, which returns a DMA-buf >>> FD, it creates a new FD. >> >> Sorry, where I say 'refcount the fd' I indeed meant 'refcount the file struct'. >> >> Looking at the code in the patch series I see: >> >> +struct media_request * >> +media_request_get_from_fd(int fd) >> +{ >> + struct file *f; >> + struct media_request *req; >> + >> + f = fget(fd); >> + if (!f) >> + return NULL; >> + >> + /* Not a request FD? */ >> + if (f->f_op != &request_fops) { >> + fput(f); >> + return NULL; >> + } >> + >> + req = f->private_data; >> + media_request_get(req); >> + fput(f); >> + >> + return req; >> +} >> +EXPORT_SYMBOL_GPL(media_request_get_from_fd); >> >> So this does not refcount the file struct but the request struct, and I think >> that's wrong. The file struct represents the request struct, and it is the >> file struct that should be refcounted. So when you give a request_fd to >> VIDIOC_QBUF, then the refcount should be increased since vb2 now needs to >> hold on to it. It's what dma-buf does. >> >> Now, I agree that if userspace closes the fd before kernelspace is finished >> with it, then the request_fd returned by VIDIOC_DQBUF is no longer valid. >> But so what? It's the same with the dma-buf fd. I don't think this is a problem >> at all. > > Okay, I feel like we're much more on the same page now, thanks for > clarification. ;) > > I'm still wondering if having the link from-buffer-to-request is the > most convenient for userspace, though. One possible scenario where I > think this might be problematic is when the request FD is shared with > another process, e.g. one process creating the requests, filling them > in and submitting and separate process dequeuing and handling > completed requests. In this case, the FD used for queuing the request > and the FD used for dequeuing the request would be different. Not sure > how we could handle it. I don't think this is an issue. The way vb2 works is that whoever allocates the buffers becomes the owner and only that process can queue and dequeue buffers. Otherwise an external process could dequeue buffers from underneath the main process. So the process that queues the buffers for a request will be the same process that dequeues them, and the request_fd is always valid for that process. This is really an already existing limitation. In other words, you can do this with separate threads but not with separate processes. And this isn't an issue if you use threads since they use the same fd. Good question, though. I had to think carefully about this for a bit. > An alternative approach that would let us completely avoid this kind > of unique identifier problem, would bo to have links > from-request-to-buffers. The process that dequeues the requests would > then query the dequeued request for the buffers related to it. For > example, DQBUF could be made symmetric to QBUF with respect to the > request FD and it would only dequeue buffers related to given request. Regards, Hans