Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp4233470ybg; Mon, 8 Jun 2020 02:35:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyX2sPb9qeDFqVvEf9xDmXg+9ZsEwypvx0u/mqijoomXa7C9jvxbrnJ9hRHxrJJelYyRNl+ X-Received: by 2002:a17:906:3456:: with SMTP id d22mr19627755ejb.358.1591608928329; Mon, 08 Jun 2020 02:35:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591608928; cv=none; d=google.com; s=arc-20160816; b=r3MO3ZnyNQxf6jRTuo9N30qjyWN2WqGhZ3qUjYYQcvNpHY9xhPwSXoHzWL90XDL1KV waxMQkXO3JhAYOagyfCyz+DCVoHZLTy2Q9cgDLbA5eSHstOa/oJUJK8vbAKTbQnZV63y HB7y2k5YVM3Qy1wwIEogsgodVcjRCjTeWdMmqo6MZb7SH/lHTuNuxzp62kykOpCRvx7S Q+wN6+OZGRsrOfzUvlpCLtLsp91FHw3sYS5kdzlXzO9g1Rc+f0ha1gFqHtoQC3Cp6TMP NcvF16kgycgwK2jnJv/YORjV9fLs50jpoNjTouyoEZFU/eQx49tZCzSZpINs+i/3eujR LZVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=FiS6FXFBbYvuiObSkizJLnD188Qx4xGnrdqq/91Kjfk=; b=anckvwlEiEerOd56YgMyG3IAPC3ZpE1zY6r5DAr2x0A8RRf/jtRhe1/rideTGBgsZK Lkv2JxQ2yBftf+zq4VTauAcG4y0LXLu3KFDBfWoqupEgHA7Bdr7PwJSk1YA1Nquzk65h KoWbLfOQI95dOVQ9Iox6t2879oQ7N/zdxbI6T7MSks4rUW8CBlFXENXS2MorQ/Zr+wcL XSR1XY2eUsRRKak3rIRdvEij/rTNwWlgNsK5ktlnwbkr8s21cJiAvp0SYSBhUV8KTtA6 2HPCM0yOSIdcanNUgI9pPp6Q4q2mnLy4+wJ3NefS6UZWcKB0gNLwPljAbyWdJE6d91sF 7bIg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=NEXT3lPG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r25si7963265ejz.752.2020.06.08.02.35.04; Mon, 08 Jun 2020 02:35:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=NEXT3lPG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729212AbgFHJau (ORCPT + 99 others); Mon, 8 Jun 2020 05:30:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52638 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729111AbgFHJau (ORCPT ); Mon, 8 Jun 2020 05:30:50 -0400 Received: from mail-qk1-x744.google.com (mail-qk1-x744.google.com [IPv6:2607:f8b0:4864:20::744]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D1776C08C5C4 for ; Mon, 8 Jun 2020 02:30:49 -0700 (PDT) Received: by mail-qk1-x744.google.com with SMTP id b27so16528817qka.4 for ; Mon, 08 Jun 2020 02:30:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=FiS6FXFBbYvuiObSkizJLnD188Qx4xGnrdqq/91Kjfk=; b=NEXT3lPGN24I0sCOBTtQEvemeXK7AIoCm4xsEx7f/5gzIYXUaBO9zxrTfMz9ZfRISR Jl6eVUxNku//cyjm+Tw/uA4gHILbvSoE+nAVgmdzo4MsHQPHsdukrtHYssDG7fdbbo2i LwXJlLaAgy++e/qqaZCajIcQtTBDCAzq6DF8M= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=FiS6FXFBbYvuiObSkizJLnD188Qx4xGnrdqq/91Kjfk=; b=O1XabdUuXK04d37Uk+6rxIJlqVsu5peDCXrUBAo68q+jfw3vqiP6tP5mBXY4YV+fRu 4Klm+t/6F4yLPWOWzOK1WLsHnE/0GQ8A1PVt0mtCrrTqrJKcnHFD/PqXcfGcWm/e2GbP y1e/v08lQAWcN/TZ84eI6f6T/b4uV+i7MoTVeK5ZjD5Rit7/kGLXhlaDj+cKvwQ66v5i spCflyVQm70fThP6beQDssX8VP+R6z7WrConCkGW1CPQj1r4u3xy2wgYFrYFdYKt/JE9 49QDj5syxjnozhsbS6IOTvrbcPAwChQDBf37A0O0eobKTkt4H7eWjHNyPqCOvOlxVE5w of6Q== X-Gm-Message-State: AOAM532xmwNcK0RiELsRdKAmnZwuRH7VfbnnGH3LqVpcMtVX9YMw9D9l kcJwrHLI4TfmlN0d6YNAZXzanKrT6AZyBgd6uW80MA== X-Received: by 2002:a37:48cc:: with SMTP id v195mr4863659qka.232.1591608648827; Mon, 08 Jun 2020 02:30:48 -0700 (PDT) MIME-Version: 1.0 References: <20200526105811.30784-1-stevensd@chromium.org> <20200526105811.30784-2-stevensd@chromium.org> <20200604145620-mutt-send-email-mst@kernel.org> <20200606160155-mutt-send-email-mst@kernel.org> <20200608015728-mutt-send-email-mst@kernel.org> <20200608045721-mutt-send-email-mst@kernel.org> In-Reply-To: <20200608045721-mutt-send-email-mst@kernel.org> From: David Stevens Date: Mon, 8 Jun 2020 18:30:37 +0900 Message-ID: Subject: Re: [PATCH v4 1/3] virtio: add dma-buf support for exported objects To: "Michael S. Tsirkin" Cc: Gerd Hoffmann , David Airlie , Daniel Vetter , Sumit Semwal , Jason Wang , Maarten Lankhorst , Maxime Ripard , Thomas Zimmermann , open list , ML dri-devel , "open list:VIRTIO GPU DRIVER" , Linux Media Mailing List , "moderated list:DMA BUFFER SHARING FRAMEWORK" , virtio-dev@lists.oasis-open.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 8, 2020 at 6:05 PM Michael S. Tsirkin wrote: > > On Mon, Jun 08, 2020 at 05:32:26PM +0900, David Stevens wrote: > > On Mon, Jun 8, 2020 at 3:00 PM Michael S. Tsirkin wrote: > > > > > > On Mon, Jun 08, 2020 at 10:33:09AM +0900, David Stevens wrote: > > > > On Sun, Jun 7, 2020 at 5:04 AM Michael S. Tsirkin wrote: > > > > > > > > > > On Fri, Jun 05, 2020 at 10:28:42AM +0900, David Stevens wrote: > > > > > > On Fri, Jun 5, 2020 at 4:05 AM Michael S. Tsirkin wrote: > > > > > > > > > > > > > > On Tue, May 26, 2020 at 07:58:09PM +0900, David Stevens wrote: > > > > > > > > This change adds a new flavor of dma-bufs that can be used by virtio > > > > > > > > drivers to share exported objects. A virtio dma-buf can be queried by > > > > > > > > virtio drivers to obtain the UUID which identifies the underlying > > > > > > > > exported object. > > > > > > > > > > > > > > > > Signed-off-by: David Stevens > > > > > > > > > > > > > > Is this just for graphics? If yes I'd rather we put it in the graphics > > > > > > > driver. We can always move it later ... > > > > > > > > > > > > As stated in the cover letter, this will be used by virtio-video. > > > > > > > > > > > > The proposed virtio-video patches: https://markmail.org/thread/p5d3k566srtdtute > > > > > > The patch which imports these dma-bufs (slightly out of data, uses v3 > > > > > > of this patch set): https://markmail.org/thread/j4xlqaaim266qpks > > > > > > > > > > > > > > --- > > > > > > > > drivers/virtio/Makefile | 2 +- > > > > > > > > drivers/virtio/virtio.c | 6 +++ > > > > > > > > drivers/virtio/virtio_dma_buf.c | 89 +++++++++++++++++++++++++++++++++ > > > > > > > > include/linux/virtio.h | 1 + > > > > > > > > include/linux/virtio_dma_buf.h | 58 +++++++++++++++++++++ > > > > > > > > 5 files changed, 155 insertions(+), 1 deletion(-) > > > > > > > > create mode 100644 drivers/virtio/virtio_dma_buf.c > > > > > > > > create mode 100644 include/linux/virtio_dma_buf.h > > > > > > > > > > > > > > > > diff --git a/drivers/virtio/Makefile b/drivers/virtio/Makefile > > > > > > > > index 29a1386ecc03..ecdae5b596de 100644 > > > > > > > > --- a/drivers/virtio/Makefile > > > > > > > > +++ b/drivers/virtio/Makefile > > > > > > > > @@ -1,5 +1,5 @@ > > > > > > > > # SPDX-License-Identifier: GPL-2.0 > > > > > > > > -obj-$(CONFIG_VIRTIO) += virtio.o virtio_ring.o > > > > > > > > +obj-$(CONFIG_VIRTIO) += virtio.o virtio_ring.o virtio_dma_buf.o > > > > > > > > obj-$(CONFIG_VIRTIO_MMIO) += virtio_mmio.o > > > > > > > > obj-$(CONFIG_VIRTIO_PCI) += virtio_pci.o > > > > > > > > virtio_pci-y := virtio_pci_modern.o virtio_pci_common.o > > > > > > > > diff --git a/drivers/virtio/virtio.c b/drivers/virtio/virtio.c > > > > > > > > index a977e32a88f2..5d46f0ded92d 100644 > > > > > > > > --- a/drivers/virtio/virtio.c > > > > > > > > +++ b/drivers/virtio/virtio.c > > > > > > > > @@ -357,6 +357,12 @@ int register_virtio_device(struct virtio_device *dev) > > > > > > > > } > > > > > > > > EXPORT_SYMBOL_GPL(register_virtio_device); > > > > > > > > > > > > > > > > +bool is_virtio_device(struct device *dev) > > > > > > > > +{ > > > > > > > > + return dev->bus == &virtio_bus; > > > > > > > > +} > > > > > > > > +EXPORT_SYMBOL_GPL(is_virtio_device); > > > > > > > > + > > > > > > > > void unregister_virtio_device(struct virtio_device *dev) > > > > > > > > { > > > > > > > > int index = dev->index; /* save for after device release */ > > > > > > > > diff --git a/drivers/virtio/virtio_dma_buf.c b/drivers/virtio/virtio_dma_buf.c > > > > > > > > new file mode 100644 > > > > > > > > index 000000000000..23e3399b11ed > > > > > > > > --- /dev/null > > > > > > > > +++ b/drivers/virtio/virtio_dma_buf.c > > > > > > > > @@ -0,0 +1,89 @@ > > > > > > > > +// SPDX-License-Identifier: GPL-2.0-or-later > > > > > > > > +/* > > > > > > > > + * dma-bufs for virtio exported objects > > > > > > > > + * > > > > > > > > + * Copyright (C) 2020 Google, Inc. > > > > > > > > + */ > > > > > > > > + > > > > > > > > +#include > > > > > > > > + > > > > > > > > +/** > > > > > > > > + * virtio_dma_buf_export - Creates a new dma-buf for a virtio exported object > > > > > > > > + * > > > > > > > > + * This wraps dma_buf_export() to allow virtio drivers to create a dma-buf > > > > > > > > + * for an virtio exported object that can be queried by other virtio drivers > > > > > > > > + * for the object's UUID. > > > > > > > > + */ > > > > > > > > +struct dma_buf *virtio_dma_buf_export( > > > > > > > > + const struct virtio_dma_buf_export_info *virtio_exp_info) > > > > > > > > +{ > > > > > > > > + struct dma_buf_export_info exp_info; > > > > > > > > + > > > > > > > > + if (!virtio_exp_info->ops > > > > > > > > + || virtio_exp_info->ops->ops.attach != &virtio_dma_buf_attach > > > > > > > > + || !virtio_exp_info->ops->get_uuid) { > > > > > > > > + return ERR_PTR(-EINVAL); > > > > > > > > + } > > > > > > > > + > > > > > > > > + exp_info.exp_name = virtio_exp_info->exp_name; > > > > > > > > + exp_info.owner = virtio_exp_info->owner; > > > > > > > > + exp_info.ops = &virtio_exp_info->ops->ops; > > > > > > > > + exp_info.size = virtio_exp_info->size; > > > > > > > > + exp_info.flags = virtio_exp_info->flags; > > > > > > > > + exp_info.resv = virtio_exp_info->resv; > > > > > > > > + exp_info.priv = virtio_exp_info->priv; > > > > > > > > + BUILD_BUG_ON(sizeof(struct virtio_dma_buf_export_info) > > > > > > > > + != sizeof(struct dma_buf_export_info)); > > > > > > > > > > > > > > This is the only part that gives me pause. Why do we need this hack? > > > > > > > What's wrong with just using dma_buf_export_info directly, > > > > > > > and if you want the virtio ops, just using container_off? > > > > > > > > > > > > This approach provides a more explicit type signature and a little > > > > > > more type safety, I think. If others don't think it's a worthwhile > > > > > > tradeoff, I can remove it. > > > > > > > > > > > > -David > > > > > > > > > > The cost is that if dma_buf_export_info changes even slightly, we get > > > > > weird crashes. > > > > > > > > I'm not sure I understand what types of changes you're referring to. > > > > As this is written, virtio-dma-buf is just another client of the > > > > dma-buf API. If this were rewritten to use dma-buf directly, then > > > > whatever code calls virtio_dma_buf_export would become a client of the > > > > dma-buf API. If the semantics of existing fields in the dma-buf API > > > > were changed and virtio-dma-buf wasn't updated, then yes, you could > > > > get weird crashes from virtio-dma-buf. > > > > However, the same problem would > > > > exist if virtio_dma_buf_export used dma-buf directly - changes to > > > > dma-buf's semantics could cause weird crashes if the caller of > > > > virtio_dma_buf_export wasn't updated properly. The only potential > > > > source of problems I see is if virtio_dma_buf_export_info wasn't > > > > updated properly, but virtio_dma_buf_export_info is dead simple, so I > > > > don't know if that's really a problem. > > > > > > > > -David > > > > > > I think you can get weird crashes if fields in dma buf are reordered, or > > > if a field size changes. You have a build bug catching overall struct > > > size changes but that can remain the same due do compiler padding or > > > such. > > > > Since it's manually copying the fields instead of trying something > > clever like memcpy, I don't see how reordering the fields or changing > > the size of the fields would cause problems. Right now, > > virtio_dma_buf_export is just a regular client of dma_buf_export, no > > different than any of the other call sites in the kernel. > > > > Overall, I don't really think that this is a problem. If someone makes > > breaking changes to the semantics of dma-buf, then they will need to > > update this call site, just like they will need to update all of the > > other call sites in the kernel. If someone adds new functionality to > > dma-buf and adds another field to dma_buf_export_info, the build bug > > is a reminder to add it to virtio_dma_buf_export_info. However, if the > > struct padding happens to work out such that the build bug doesn't > > trigger, that doesn't really matter - it just means that the new > > dma-buf feature won't be exposed by virito-dma-buf until someone needs > > it and notices that the new field is missing. > > > > -David > > Think about the reasons for the BUILD_BUG_ON being there, checking > struct sizes like this is a clear sign of something strange going on. Like I said, it's there as a reminder to update the virtio-dma-buf API if the dma-buf API gets updated. Perhaps you could say it's a misuse of BUILD_BUG_ON, since not updating virtio-dma-buf in such a situation isn't a bug per se. If the BUILD_BUG_ON actually caught a real bug, there would be a much more fundamental issue going on. The code is doing nothing strange, nothing fundamentally different from any other call such as in drm_gem_prime_export or udmabuf_create - it's just setting fields in the dma_buf_export_info struct to values. > But really this is just unnecessary complexity anyway. > > The only difference with dma_buf is get_uuid and device_attacj, isn't it? > > And they are called like this: > > > > + */ > +int virtio_dma_buf_get_uuid(struct dma_buf *dma_buf, > + uuid_t *uuid) > +{ > + const struct virtio_dma_buf_ops *ops = container_of( > + dma_buf->ops, const struct virtio_dma_buf_ops, ops); > + > + if (!is_virtio_dma_buf(dma_buf)) > + return -EINVAL; > + > + return ops->get_uuid(dma_buf, uuid); > +} > > > So you are doing the container_of trick anyway, the extra structure > did not give us any type safety. Lack of type safety in one situation doesn't mean that type safety in another situation isn't worthwhile. If that were the case, then why does C have typedef? Why does Linux bother with types at all, since you can cast anything to anything with strict aliasing disabled? We can still make the virtio_dma_buf_export function more type-safe and readable while still having some unavoidable casting. But that being said, it's not worth further bikeshedding. I'll send out an updated patch set. -David