Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp7142559ybi; Thu, 13 Jun 2019 10:16:05 -0700 (PDT) X-Google-Smtp-Source: APXvYqwzL6zqdO9RoqBhsRXJN7cGa6wpcbuG0Z2NJumFK9iyRi5qiS74OD1wE69hUE/ETg2/Eys7 X-Received: by 2002:a17:902:8a94:: with SMTP id p20mr69871827plo.312.1560446165794; Thu, 13 Jun 2019 10:16:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560446165; cv=none; d=google.com; s=arc-20160816; b=UYFjA4uWqEDBOTyUOtMHvZx/Zivfm0d9FlIk0pbON70Pp1+fRU4aqwKkUVUDwJ9z30 LfTSm6mQMvSCbO74mqxMnK0XgSgoSEUvMR0BOi5hU8T4eCtxdipC9y96MHm4u3BTgamH Oj6X7suCW5wroSCuZ/mhgV2vURGdUTyLo0EtPeqcRGWoKUI5Xl1FptC0gNqav10A2cZx MBxLSnzz0l7yrKdwjqf5p86r8A1hpMWomUpuZG/XSo+D+wtQylzBdaZcD3gXOKGkCBua kz0Gs5HNgxUtb2SalzTs9kN59mLMBURluC311ZIxEzCPkvl4FOjO8sIZ/f6uOnky1QA8 h0Og== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=zoBzDpH5YOdjElv8Qgb2rV6UIQ7orAaJLXcSTUietcc=; b=agKLX83nrkXT/RUtZZSd3gyD3fvCufmDbcvLqqSUShHuDcZjhwYmdNRiphS89aNuY2 Czb4FrvmCLNt1VVdKLzb23K7fTqU/u3yn2vOVliEyWnmm6mQHr/xVYqaFH8zGrOSopkU OaY4PIYo8lOc2MvrbK478gTPQYBr0Gm+CM/zmhi3OAovvM+0HfFd3otCm9tjUXThisNq anOZrzj/SW0xr5jUnSXIriZS1ltB93KqUnvx3UHMU4UBNDnC6+lQ0uwRj0gsM/pUAZl3 ayMQG3in7cbk9RKu4UoANMOxIZEDq7oKGfB8rv0keBqfiKimwvrLTNUigDyrYSEm+0PR FWZw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=EO253Xha; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g2si269158pgs.215.2019.06.13.10.15.50; Thu, 13 Jun 2019 10:16:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=EO253Xha; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2393280AbfFMRP0 (ORCPT + 99 others); Thu, 13 Jun 2019 13:15:26 -0400 Received: from mail-lj1-f194.google.com ([209.85.208.194]:37042 "EHLO mail-lj1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728796AbfFLVtT (ORCPT ); Wed, 12 Jun 2019 17:49:19 -0400 Received: by mail-lj1-f194.google.com with SMTP id 131so16496448ljf.4 for ; Wed, 12 Jun 2019 14:49:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=zoBzDpH5YOdjElv8Qgb2rV6UIQ7orAaJLXcSTUietcc=; b=EO253XhaAHB4yl9Nu24UhOX8GEp/dgQ19qYRVQU5Eg0No8LUH9LaqbGblUqt4wLImf 1VwTuEHlO1ZRZBFEg/K415/Lc2Qx+ox4mKrsMxzs8GdnuCBn2FR1bMiyd+rY+shkKnni 8rx2lhjAhBluDJGhKOqwEfWHARE9U12ZE/vB6HLn3Hyt6S4AqynhaO2F9o6UNs0XNa/5 IhBmjjhs+PuysAuwKsXkojkgUezuIHjd8HN6fXfqwMmSVjOumuXLlAW4jyqSDlVPImRc v4EfWm4kGxWUAhLozRgoRalhVqdNvGbgHxAsbpspF4s7MOI81365UL7oe0smS6bSEawq TpfA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=zoBzDpH5YOdjElv8Qgb2rV6UIQ7orAaJLXcSTUietcc=; b=kOhj7qVQsqCcyTNrMSwZaemntSkqFwCe6vlGJdBFywj785IojahrUBgHnA12N+TnUS Ryo4B7HFJ531riqRna9zzjChlNPh2TnkyisuiaozFsqCE9RSldmKhgwqsehg3w9e35t5 g3L+kfEhdkaHKqOWp8nLi9lijJ7Z/RfSEfKcmekQZ4FUrmtKqxzdSVTvlQWKdvL/5g39 BHjBD30ohb45NRykkA01UBHukgrTJof2XkmgoBqFYUbXI3Lk7WI14A16jCf771abWsZ8 3c5vvcutbrxAOa6JSNAvLA/giHmzj2BeT9vS41maZFT8KBJ4jBUH4knISinLNkadeLCr w3Kg== X-Gm-Message-State: APjAAAVXzoMsFgynGf+oArs4z92qTYPuJN7J5owpiR1fICXHh8FTZiLT 794PxATnK8DjwZ8p7kMwBGknc9cZdvUq3yQ6c4EETA== X-Received: by 2002:a2e:5d1:: with SMTP id 200mr26543483ljf.10.1560376155230; Wed, 12 Jun 2019 14:49:15 -0700 (PDT) MIME-Version: 1.0 References: <20190611000230.152670-1-fengc@google.com> <20190611000230.152670-3-fengc@google.com> In-Reply-To: From: Chenbo Feng Date: Wed, 12 Jun 2019 14:49:03 -0700 Message-ID: Subject: Re: [RESEND PATCH v3 2/3] dma-buf: add DMA_BUF_{GET,SET}_NAME ioctls To: Sumit Semwal Cc: LKML , DRI mailing list , Android Kernel Team Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 12, 2019 at 7:43 AM Sumit Semwal wrote: > > Hello Chenbo, > > Thanks very much for your patches. Other than a couple tiny nits > below, I think these look good, and I will merge them before the end > of this week. > On Tue, 11 Jun 2019 at 05:32, Chenbo Feng wrote: > > > > From: Greg Hackmann > > > > This patch adds complimentary DMA_BUF_SET_NAME and DMA_BUF_GET_NAME > > ioctls, which lets userspace processes attach a free-form name to each > > buffer. > This should remove the _GET_NAME bit since it's not there anymore. > > > > This information can be extremely helpful for tracking and accounting > > shared buffers. For example, on Android, we know what each buffer will > > be used for at allocation time: GL, multimedia, camera, etc. The > > userspace allocator can use DMA_BUF_SET_NAME to associate that > > information with the buffer, so we can later give developers a > > breakdown of how much memory they're allocating for graphics, camera, > > etc. > > > > Signed-off-by: Greg Hackmann > > Signed-off-by: Chenbo Feng > > --- > > drivers/dma-buf/dma-buf.c | 49 +++++++++++++++++++++++++++++++++--- > > include/linux/dma-buf.h | 5 +++- > > include/uapi/linux/dma-buf.h | 3 +++ > > 3 files changed, 53 insertions(+), 4 deletions(-) > > > > diff --git a/drivers/dma-buf/dma-buf.c b/drivers/dma-buf/dma-buf.c > > index ffd5a2ad7d6f..c1da5f9ce44d 100644 > > --- a/drivers/dma-buf/dma-buf.c > > +++ b/drivers/dma-buf/dma-buf.c > > @@ -48,8 +48,24 @@ struct dma_buf_list { > > > > static struct dma_buf_list db_list; > > > > +static char *dmabuffs_dname(struct dentry *dentry, char *buffer, int buflen) > > +{ > > + struct dma_buf *dmabuf; > > + char name[DMA_BUF_NAME_LEN]; > > + size_t ret = 0; > > + > > + dmabuf = dentry->d_fsdata; > > + mutex_lock(&dmabuf->lock); > > + if (dmabuf->name) > > + ret = strlcpy(name, dmabuf->name, DMA_BUF_NAME_LEN); > > + mutex_unlock(&dmabuf->lock); > > + > > + return dynamic_dname(dentry, buffer, buflen, "/%s:%s", > > + dentry->d_name.name, ret > 0 ? name : ""); > > +} > > + > > static const struct dentry_operations dma_buf_dentry_ops = { > > - .d_dname = simple_dname, > > + .d_dname = dmabuffs_dname, > > }; > > > > static struct vfsmount *dma_buf_mnt; > > @@ -297,6 +313,27 @@ static __poll_t dma_buf_poll(struct file *file, poll_table *poll) > > return events; > > } > > > > +static long dma_buf_set_name(struct dma_buf *dmabuf, const char __user *buf) > > +{ > > + char *name = strndup_user(buf, DMA_BUF_NAME_LEN); > > + long ret = 0; > > + > > + if (IS_ERR(name)) > > + return PTR_ERR(name); > > + > > + mutex_lock(&dmabuf->lock); > > + if (!list_empty(&dmabuf->attachments)) { > > + ret = -EBUSY; > > + goto out_unlock; > > + } > We might also want to document this better - that name change for a > buffer is still allowed if it doesn't have any attached devices after > its usage is done but before it is destroyed? (theoritically it could > be reused with a different name?) > > > + kfree(dmabuf->name); > > + dmabuf->name = name; > > + > > +out_unlock: > > + mutex_unlock(&dmabuf->lock); > > + return ret; > > +} > > + > > static long dma_buf_ioctl(struct file *file, > > unsigned int cmd, unsigned long arg) > > { > > @@ -335,6 +372,10 @@ static long dma_buf_ioctl(struct file *file, > > ret = dma_buf_begin_cpu_access(dmabuf, direction); > > > > return ret; > > + > > + case DMA_BUF_SET_NAME: > > + return dma_buf_set_name(dmabuf, (const char __user *)arg); > > + > > default: > > return -ENOTTY; > > } > > @@ -376,6 +417,7 @@ static struct file *dma_buf_getfile(struct dma_buf *dmabuf, int flags) > > goto err_alloc_file; > > file->f_flags = flags & (O_ACCMODE | O_NONBLOCK); > > file->private_data = dmabuf; > > + file->f_path.dentry->d_fsdata = dmabuf; > > > > return file; > > > > @@ -1082,12 +1124,13 @@ static int dma_buf_debug_show(struct seq_file *s, void *unused) > > continue; > > } > > > > - seq_printf(s, "%08zu\t%08x\t%08x\t%08ld\t%s\t%08lu\n", > > + seq_printf(s, "%08zu\t%08x\t%08x\t%08ld\t%s\t%08lu\t%s\n", > > buf_obj->size, > > buf_obj->file->f_flags, buf_obj->file->f_mode, > > file_count(buf_obj->file), > > buf_obj->exp_name, > > - file_inode(buf_obj->file)->i_ino); > > + file_inode(buf_obj->file)->i_ino, > > + buf_obj->name ?: ""); > > > > robj = buf_obj->resv; > > while (true) { > > diff --git a/include/linux/dma-buf.h b/include/linux/dma-buf.h > > index 58725f890b5b..582998e19df6 100644 > > --- a/include/linux/dma-buf.h > > +++ b/include/linux/dma-buf.h > > @@ -255,10 +255,12 @@ struct dma_buf_ops { > > * @file: file pointer used for sharing buffers across, and for refcounting. > > * @attachments: list of dma_buf_attachment that denotes all devices attached. > > * @ops: dma_buf_ops associated with this buffer object. > > - * @lock: used internally to serialize list manipulation, attach/detach and vmap/unmap > > + * @lock: used internally to serialize list manipulation, attach/detach and > > + * vmap/unmap, and accesses to name > > * @vmapping_counter: used internally to refcnt the vmaps > > * @vmap_ptr: the current vmap ptr if vmapping_counter > 0 > > * @exp_name: name of the exporter; useful for debugging. > > + * @name: userspace-provided name; useful for accounting and debugging. > > * @owner: pointer to exporter module; used for refcounting when exporter is a > > * kernel module. > > * @list_node: node for dma_buf accounting and debugging. > > @@ -286,6 +288,7 @@ struct dma_buf { > > unsigned vmapping_counter; > > void *vmap_ptr; > > const char *exp_name; > > + const char *name; > > struct module *owner; > > struct list_head list_node; > > void *priv; > > diff --git a/include/uapi/linux/dma-buf.h b/include/uapi/linux/dma-buf.h > > index d75df5210a4a..dbc7092e04b5 100644 > > --- a/include/uapi/linux/dma-buf.h > > +++ b/include/uapi/linux/dma-buf.h > > @@ -35,7 +35,10 @@ struct dma_buf_sync { > > #define DMA_BUF_SYNC_VALID_FLAGS_MASK \ > > (DMA_BUF_SYNC_RW | DMA_BUF_SYNC_END) > > > > +#define DMA_BUF_NAME_LEN 32 > > + > > #define DMA_BUF_BASE 'b' > > #define DMA_BUF_IOCTL_SYNC _IOW(DMA_BUF_BASE, 0, struct dma_buf_sync) > > +#define DMA_BUF_SET_NAME _IOW(DMA_BUF_BASE, 1, const char *) > > > > #endif > > -- > > 2.22.0.rc2.383.gf4fbbf30c2-goog > > > > Best, > Sumit. Thanks for the feedback, I updated the commit message and resent the patch. Chenbo