Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4216307yba; Wed, 17 Apr 2019 07:05:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqwC+vM083YssfmeWQYwEZuyx70mp4c89UTORca7QljsFGa+ua0EGqLoGUTxZbjUHb/iDw/1 X-Received: by 2002:a65:518d:: with SMTP id h13mr5206575pgq.259.1555509902351; Wed, 17 Apr 2019 07:05:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555509902; cv=none; d=google.com; s=arc-20160816; b=IwbiA0+hVE5aiHUd5OPOB6UON07RVzc2EnMEQWV7lVdov5CQ8Kf31ksf6WbxtHFC6E YJJkkDfDwoorBFsUF4i89Gf2K6Tmi9hE6hOkDwOmVMis7SxOzPmP06NYuI6PvQtUt//E uuOkJAMG08kwoWgOjh01nYZsWXvEn7Ljwc6dT5VFcX4HUlkTOIzYWJNLluSsvK07nBsM oRs3vFgkBFQpnonOW+ZcAwxsz9pSRJgCSUNRPvY2SHLIeOS/N14DXkbIViixM5JaC3lQ 8alm0z4uvF7WjcPNGZo7NQ+d22kN1LKXRtmyTBqne+BO9BXmR189MKtTdxi0Ffb206lh k/6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:mail-followup-to:message-id:subject:cc:to:from:date :dkim-signature; bh=/smunqBLQ0csGAXClwGfq8DJlpLhcvVohm+B2YKcrI0=; b=mcpU8ltEkE1aDbtIeY+zk9/poRMXaVFOX7aP2mXpgopSKH8b6/U1dKKhX4FQHAyYop aegpBa9tcawbf8GHXqFMDNC86lVxnAJBXbvF7DICG1JhaSRqT0ZwGG2Qi+yONFl4ta3c GScB3jaPzcsMdbXNlwXzEy2rFHjKMgo3xwN4Egn1z1UjBu5v/lSkZJ+tMv5ySMtZrMia 8gvpyrqyWv0MkwBMITkyy7VTPsegOkhAiv+yE7GuwUnX4uRfNZw1x+OHQkOBgGm5D4qy 3gFcHaI4k7iFqyZ9SWoMW70QvLlZa0EGkuTS9zeWQlfWLGQ93rn5lsIDw/qnrH+ipvds h+XA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@ffwll.ch header.s=google header.b=gA0HxHD1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k66si50522960pgc.247.2019.04.17.07.04.46; Wed, 17 Apr 2019 07:05:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@ffwll.ch header.s=google header.b=gA0HxHD1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732360AbfDQOBX (ORCPT + 99 others); Wed, 17 Apr 2019 10:01:23 -0400 Received: from mail-ed1-f68.google.com ([209.85.208.68]:38686 "EHLO mail-ed1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730463AbfDQOBW (ORCPT ); Wed, 17 Apr 2019 10:01:22 -0400 Received: by mail-ed1-f68.google.com with SMTP id d13so21084653edr.5 for ; Wed, 17 Apr 2019 07:01:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=sender:date:from:to:cc:subject:message-id:mail-followup-to :references:mime-version:content-disposition :content-transfer-encoding:in-reply-to:user-agent; bh=/smunqBLQ0csGAXClwGfq8DJlpLhcvVohm+B2YKcrI0=; b=gA0HxHD1qS0oqf+zsC2W3LQukKoxPXH/xStVtjCTtF1VF7yZ+Y20r1SGJUyu4ZceB9 4Tu0J71uZhpO7JfYrLf4nHn+qGAyBfKPVC7j9JqRgJ0Qfa11wH5sfu0WoDtXGb/G1Eqt PBw/WtoYxZ4jwq7Bs2tUbEoGGrIbEgjSyWfQ8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :mail-followup-to:references:mime-version:content-disposition :content-transfer-encoding:in-reply-to:user-agent; bh=/smunqBLQ0csGAXClwGfq8DJlpLhcvVohm+B2YKcrI0=; b=GNOsHFT/qNJDrG/keHJtULYFztY+7ZhdJvxzHYVrUnG6/CjR+qzKNJPbNuHh5umNd8 o9GDB5GZPT7Gwo7/7xCJ93zaSC8wuEAQ8OOYaJuvFrBZi+PoPuIAdAzQgDsOGc3VYvWA exoahiku0crm5OMtbTZ/Ucav4Cp2DLxdLGPtXK8DYokqsaat0xP3jER9nP8QML7VaNf7 T/Sb8N9TeXt07/UHcuHZ+K8ewn+THiREbaD5hIA8dzS3XzXb7vyJsd2Ceg5/WxcOtCE8 LSOAgzQEUKikKaj5xX3rymRsgRMUbpDW8+Azy3IAtzLCNzb8XNg9+EQmrm+cJVUYR2bL qeOg== X-Gm-Message-State: APjAAAWzXm20hergcJiYFdn5OfW/9LL7tCP//DMQat+5eyKM9Z05cDd7 4ROKkV9603KIrRl3Hsl9sQqEQw== X-Received: by 2002:a17:906:b202:: with SMTP id p2mr47831080ejz.266.1555509679679; Wed, 17 Apr 2019 07:01:19 -0700 (PDT) Received: from phenom.ffwll.local ([2a02:168:569e:0:3106:d637:d723:e855]) by smtp.gmail.com with ESMTPSA id s44sm13626378edd.49.2019.04.17.07.01.18 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 17 Apr 2019 07:01:18 -0700 (PDT) Date: Wed, 17 Apr 2019 16:01:16 +0200 From: Daniel Vetter To: Christian =?iso-8859-1?Q?K=F6nig?= Cc: sumit.semwal@linaro.org, linux-media@vger.kernel.org, dri-devel@lists.freedesktop.org, linaro-mm-sig@lists.linaro.org, linux-kernel@vger.kernel.org, amd-gfx@lists.freedesktop.org Subject: Re: [PATCH 04/12] dma-buf: add optional invalidate_mappings callback v5 Message-ID: <20190417140116.GC13337@phenom.ffwll.local> Mail-Followup-To: Christian =?iso-8859-1?Q?K=F6nig?= , sumit.semwal@linaro.org, linux-media@vger.kernel.org, dri-devel@lists.freedesktop.org, linaro-mm-sig@lists.linaro.org, linux-kernel@vger.kernel.org, amd-gfx@lists.freedesktop.org References: <20190416183841.1577-1-christian.koenig@amd.com> <20190416183841.1577-5-christian.koenig@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20190416183841.1577-5-christian.koenig@amd.com> X-Operating-System: Linux phenom 4.19.0-1-amd64 User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 16, 2019 at 08:38:33PM +0200, Christian K?nig wrote: > Each importer can now provide an invalidate_mappings callback. > > This allows the exporter to provide the mappings without the need to pin > the backing store. > > v2: don't try to invalidate mappings when the callback is NULL, > lock the reservation obj while using the attachments, > add helper to set the callback > v3: move flag for invalidation support into the DMA-buf, > use new attach_info structure to set the callback > v4: use importer_priv field instead of mangling exporter priv. > v5: drop invalidation_supported flag > > Signed-off-by: Christian K?nig > --- > drivers/dma-buf/dma-buf.c | 37 +++++++++++++++++++++++++++++++++++++ > include/linux/dma-buf.h | 33 +++++++++++++++++++++++++++++++-- > 2 files changed, 68 insertions(+), 2 deletions(-) > > diff --git a/drivers/dma-buf/dma-buf.c b/drivers/dma-buf/dma-buf.c > index 83c92bfd964c..a3738fab3927 100644 > --- a/drivers/dma-buf/dma-buf.c > +++ b/drivers/dma-buf/dma-buf.c > @@ -563,6 +563,8 @@ struct dma_buf_attachment *dma_buf_attach(const struct dma_buf_attach_info *info > > attach->dev = info->dev; > attach->dmabuf = dmabuf; > + attach->importer_priv = info->importer_priv; > + attach->invalidate = info->invalidate; > > mutex_lock(&dmabuf->lock); > > @@ -571,7 +573,9 @@ struct dma_buf_attachment *dma_buf_attach(const struct dma_buf_attach_info *info > if (ret) > goto err_attach; > } > + reservation_object_lock(dmabuf->resv, NULL); > list_add(&attach->node, &dmabuf->attachments); > + reservation_object_unlock(dmabuf->resv); > > mutex_unlock(&dmabuf->lock); > > @@ -615,7 +619,9 @@ void dma_buf_detach(struct dma_buf *dmabuf, struct dma_buf_attachment *attach) > DMA_BIDIRECTIONAL); > > mutex_lock(&dmabuf->lock); > + reservation_object_lock(dmabuf->resv, NULL); > list_del(&attach->node); > + reservation_object_unlock(dmabuf->resv); > if (dmabuf->ops->detach) > dmabuf->ops->detach(dmabuf, attach); > > @@ -653,7 +659,16 @@ dma_buf_map_attachment_locked(struct dma_buf_attachment *attach, > if (attach->sgt) > return attach->sgt; > > + /* > + * Mapping a DMA-buf can trigger its invalidation, prevent sending this > + * event to the caller by temporary removing this attachment from the > + * list. > + */ > + if (attach->invalidate) > + list_del(&attach->node); > sg_table = attach->dmabuf->ops->map_dma_buf(attach, direction); > + if (attach->invalidate) > + list_add(&attach->node, &attach->dmabuf->attachments); > if (!sg_table) > sg_table = ERR_PTR(-ENOMEM); > > @@ -751,6 +766,26 @@ void dma_buf_unmap_attachment(struct dma_buf_attachment *attach, > } > EXPORT_SYMBOL_GPL(dma_buf_unmap_attachment); > > +/** > + * dma_buf_invalidate_mappings - invalidate all mappings of this dma_buf > + * > + * @dmabuf: [in] buffer which mappings should be invalidated > + * > + * Informs all attachmenst that they need to destroy and recreated all their > + * mappings. > + */ > +void dma_buf_invalidate_mappings(struct dma_buf *dmabuf) > +{ > + struct dma_buf_attachment *attach; > + > + reservation_object_assert_held(dmabuf->resv); > + > + list_for_each_entry(attach, &dmabuf->attachments, node) > + if (attach->invalidate) > + attach->invalidate(attach); > +} > +EXPORT_SYMBOL_GPL(dma_buf_invalidate_mappings); > + > /** > * DOC: cpu access > * > @@ -1163,10 +1198,12 @@ static int dma_buf_debug_show(struct seq_file *s, void *unused) > seq_puts(s, "\tAttached Devices:\n"); > attach_count = 0; > > + reservation_object_lock(buf_obj->resv, NULL); > list_for_each_entry(attach_obj, &buf_obj->attachments, node) { > seq_printf(s, "\t%s\n", dev_name(attach_obj->dev)); > attach_count++; > } > + reservation_object_unlock(buf_obj->resv); > > seq_printf(s, "Total %d devices attached\n\n", > attach_count); > diff --git a/include/linux/dma-buf.h b/include/linux/dma-buf.h > index 7e23758db3a4..ece4638359a8 100644 > --- a/include/linux/dma-buf.h > +++ b/include/linux/dma-buf.h > @@ -324,6 +324,7 @@ struct dma_buf { > * @dev: device attached to the buffer. > * @node: list of dma_buf_attachment. > * @priv: exporter specific attachment data. > + * @importer_priv: importer specific attachment data. > * > * This structure holds the attachment information between the dma_buf buffer > * and its user device(s). The list contains one attachment struct per device > @@ -340,6 +341,29 @@ struct dma_buf_attachment { > struct list_head node; > void *priv; > struct sg_table *sgt; > + void *importer_priv; > + > + /** > + * @invalidate: > + * > + * Optional callback provided by the importer of the dma-buf. > + * > + * If provided the exporter can avoid pinning the backing store while > + * mappings exists. > + * > + * The function is called with the lock of the reservation object > + * associated with the dma_buf held and the mapping function must be > + * called with this lock held as well. This makes sure that no mapping > + * is created concurrently with an ongoing invalidation. > + * > + * After the callback all existing mappings are still valid until all > + * fences in the dma_bufs reservation object are signaled, but should be > + * destroyed by the importer as soon as possible. > + * > + * New mappings can be created immediately, but can't be used before the > + * exclusive fence in the dma_bufs reservation object is signaled. > + */ > + void (*invalidate)(struct dma_buf_attachment *attach); I would put the long kerneldoc into dma_buf_attach_info (as an inline comment, you can mix the styles). And reference it from here with something like "Set from &dma_buf_attach_info.invalidate in dma_buf_attach(), see there for more information." This here feels a bit too much hidden. -Daniel > }; > > /** > @@ -378,8 +402,10 @@ struct dma_buf_export_info { > > /** > * struct dma_buf_attach_info - holds information needed to attach to a dma_buf > - * @dmabuf: the exported dma_buf > - * @dev: the device which wants to import the attachment > + * @dmabuf: the exported dma_buf > + * @dev: the device which wants to import the attachment > + * @importer_priv: private data of importer to this attachment > + * @invalidate: callback to use for invalidating mappings > * > * This structure holds the information required to attach to a buffer. Used > * with dma_buf_attach() only. > @@ -387,6 +413,8 @@ struct dma_buf_export_info { > struct dma_buf_attach_info { > struct dma_buf *dmabuf; > struct device *dev; > + void *importer_priv; > + void (*invalidate)(struct dma_buf_attachment *attach); > }; > > /** > @@ -423,6 +451,7 @@ void dma_buf_unmap_attachment_locked(struct dma_buf_attachment *, > enum dma_data_direction); > void dma_buf_unmap_attachment(struct dma_buf_attachment *, struct sg_table *, > enum dma_data_direction); > +void dma_buf_invalidate_mappings(struct dma_buf *dma_buf); > int dma_buf_begin_cpu_access(struct dma_buf *dma_buf, > enum dma_data_direction dir); > int dma_buf_end_cpu_access(struct dma_buf *dma_buf, > -- > 2.17.1 > > _______________________________________________ > dri-devel mailing list > dri-devel@lists.freedesktop.org > https://lists.freedesktop.org/mailman/listinfo/dri-devel -- Daniel Vetter Software Engineer, Intel Corporation http://blog.ffwll.ch