Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp7178pxj; Wed, 26 May 2021 14:32:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz94O/53esIOXc1YmxlOzk3GkLP1v9ZjR3QoCS47EACkknnhdHb40dQoXCvdxnccX/K833g X-Received: by 2002:a17:907:76e8:: with SMTP id kg8mr305493ejc.130.1622064720413; Wed, 26 May 2021 14:32:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622064720; cv=none; d=google.com; s=arc-20160816; b=p6rz0+FP0N/KmJFQwSxDCZtRDakUj2YQPjVcB32k8uBYONAKjIJtpXYioU9FchaXK0 mlgqeNbwAMPvshPV6sVMGIl+HZy48CGMMHtz63s5F0vcRDYQ/SgZs7vX2UUW80TckCTn p7Rvw4ylONIedNdjX5z6C5F8nnvhroKwcCs/ukiUwxJNXfWlsF5413Pr6DaWYZV9S7t3 boFngZDNfSo025+zHieuj/f89yicq81LFtA4ArGxeIFV1ZklUcn3VeTmG0kN5p00fzJm iMgG4S7Z7mEWepacHUiauIZlCbQuGgNF9NmOVAxUFUFpn1n3EBmBh1SAcmSuA6q5Igzh +jZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=DgN9Z6zUXFPVP3iwHP2Fv4ElWsgcWm0s/uOYp+qLD20=; b=UXirZWayTQyvjxkaXI/iw5xI+LfiJbUEyqkqaWyF/VSPcDeBCvMnLVXZambVH4MjXm WEEo5ZkZuxbTQqTY5O8ejPer3y0btJKi2i4GnC7BSZnrKkXGv0hB6Cvx3ni8HMSxA0Y9 577PZIPfI/BS3aoyqaNBuV0zmTAsMLQQ3G6vaOLhsahOGkeRXX5rkBsWfIAgvliAEKBT pmC9KX9jw6P1bC4binkURlBiHP4kVWKRoEewJZ2ZM2HoQBsZ3vhD58AJmjA5RgzuxidC YyG1VQT/dCHiDZKrjuZRTmbX2ZjLKoRkt1h70aOnn0OpP/661mzUT9J921twEJ1mZlCY 5Mkw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=ryD6SXbk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l18si49232edv.57.2021.05.26.14.31.36; Wed, 26 May 2021 14:32:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=ryD6SXbk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233790AbhEZVcB (ORCPT + 99 others); Wed, 26 May 2021 17:32:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44484 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233791AbhEZVb5 (ORCPT ); Wed, 26 May 2021 17:31:57 -0400 Received: from mail-yb1-xb2a.google.com (mail-yb1-xb2a.google.com [IPv6:2607:f8b0:4864:20::b2a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6B129C06175F for ; Wed, 26 May 2021 14:30:22 -0700 (PDT) Received: by mail-yb1-xb2a.google.com with SMTP id b13so4119450ybk.4 for ; Wed, 26 May 2021 14:30:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=DgN9Z6zUXFPVP3iwHP2Fv4ElWsgcWm0s/uOYp+qLD20=; b=ryD6SXbkYnY8F/W84AYiQ7zPvuCO9sEj0L+GKE21RuzB9eoUJuXMX4VRJ/SOf8Na9a qCdoxcrjifFGwEzVplWybCI/crFnQbPFzWnyPMKDO3Bm4pPysap3k0j/WSeRSL4p1B9f lRLbromJXdNneWwR/lNo1OlpJ7kDcX+/TdOghU9eq2A9dFbHUg1NZDpLlTGUxqKLBKCs kiv4lk770Z0inH23dgqavXW6VLaYm2gALke8xrizfsZrhrqs8bK5Bp0JxADivQUd68VC rGwaOu6QrfNOGUQOeJV4hfye5hS7QyMq+wzn9tTmqGiB4PbugQ9R6lbkC+bZN3KVfMs4 OO5w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=DgN9Z6zUXFPVP3iwHP2Fv4ElWsgcWm0s/uOYp+qLD20=; b=ncSSgcIBX67eSV12iOD4RIpSUISrGj7VTwUhb54gcNKorVnSvUNqtkQ4LSbwStmMIH JVHl4n+65my4rjQD5pyYYMYftl+ohLEHQ8M14eJgxhDshkQkf+7nk667LtHQMxzgo+3h zYFBIGUvGeUlNc9P03Zs36vdPHdW4JuOfXOcwizl4BgcWzGeZatUN8Zks0mrQ4CwVRjz VGWwqtuAVls63ybn3tNGV/KYB4lTmZ5q/V1sFmlNH9n8Qt6BjaO5gOrVTyidEM2R4Upt DWyDoNBu+6c9dB0UyyQtCvpUYljSXyL9W/QQIvgWUVB6/15/ii/b3k2je6gpz/O9JMfV gc7g== X-Gm-Message-State: AOAM531AIpdcOehgrMj3gSnDFVyj7gXQkLVi+3u/iqj6ERYTeJ34cZvF 8U6rleJOMXsoD+HZo5nTO4Hhorvi0nKMNpYO3p1Y2g== X-Received: by 2002:a05:6902:1008:: with SMTP id w8mr99874ybt.330.1622064621193; Wed, 26 May 2021 14:30:21 -0700 (PDT) MIME-Version: 1.0 References: <20210525183720.1739480-1-hridya@google.com> <3fd5145c-bb71-6f09-d412-6328ae9ea0a1@amd.com> In-Reply-To: From: Hridya Valsaraju Date: Wed, 26 May 2021 14:29:45 -0700 Message-ID: Subject: Re: [PATCH v4] dmabuf: Add the capability to expose DMA-BUF stats in sysfs To: =?UTF-8?Q?Christian_K=C3=B6nig?= , Hridya Valsaraju , Sumit Semwal , LKML , "open list:DMA BUFFER SHARING FRAMEWORK" , dri-devel , "moderated list:DMA BUFFER SHARING FRAMEWORK" , Android Kernel Team , Greg Kroah-Hartman , John Stultz , Suren Baghdasaryan , kernel test robot Cc: Daniel Vetter Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 26, 2021 at 7:01 AM Daniel Vetter wrote: > > On Wed, May 26, 2021 at 12:40:14PM +0200, Christian K=C3=B6nig wrote: > > Hi Hridya, > > > > Am 25.05.21 um 20:37 schrieb Hridya Valsaraju: > > > This patch allows statistics to be enabled for each DMA-BUF in > > > sysfs by enabling the config CONFIG_DMABUF_SYSFS_STATS. > > > > > > The following stats will be exposed by the interface: > > > > > > /sys/kernel/dmabuf/buffers//exporter_name > > > /sys/kernel/dmabuf/buffers//size > > > /sys/kernel/dmabuf/buffers//attachments//de= vice > > > /sys/kernel/dmabuf/buffers//attachments//ma= p_counter > > > > > > The inode_number is unique for each DMA-BUF and was added earlier [1] > > > in order to allow userspace to track DMA-BUF usage across different > > > processes. > > > > > > Currently, this information is exposed in > > > /sys/kernel/debug/dma_buf/bufinfo. > > > However, since debugfs is considered unsafe to be mounted in producti= on, > > > it is being duplicated in sysfs. > > > > > > Procfs also uses the proc//fdinfo/ file to expose some > > > information about DMA-BUF fds. However, the existing procfs interface= s > > > can only provide information about the buffers for which processes > > > hold fds or have the buffers mmapped into their address space. > > > The sysfs interface also exposes attachment statistics for each buffe= r. > > > > > > This information will be used to derive DMA-BUF > > > per-exporter stats and per-device usage stats for Android Bug reports= . > > > The corresponding userspace changes can be found at [2]. > > > Telemetry tools will also capture this information(along with other > > > memory metrics) periodically as well as on important events like a > > > foreground app kill (which might have been triggered by Low Memory > > > Killer). It will also contribute to provide a snapshot of the system > > > memory usage on other events such as OOM kills and Application Not > > > Responding events. > > > > > > A shell script that can be run on a classic Linux environment to read > > > out the DMA-BUF statistics can be found at [3](suggested by John > > > Stultz). > > > > > > The patch contains the following major improvements over v1: > > > 1) Each attachment is represented by its own directory to allow creat= ing > > > a symlink to the importing device and to also provide room for future > > > expansion. > > > 2) The number of distinct mappings of each attachment is exposed in a > > > separate file. > > > 3) The per-buffer statistics are now in /sys/kernel/dmabuf/buffers > > > inorder to make the interface expandable in future. > > > > > > All of the improvements above are based on suggestions/feedback from > > > Daniel Vetter and Christian K=C3=B6nig. > > > > > > [1]: https://nam11.safelinks.protection.outlook.com/?url=3Dhttps%3A%2= F%2Flore.kernel.org%2Fpatchwork%2Fpatch%2F1088791%2F&data=3D04%7C01%7Cc= hristian.koenig%40amd.com%7C72394dc653194a3fd3fd08d91fac2fb9%7C3dd8961fe488= 4e608e11a82d994e183d%7C0%7C0%7C637575646676575967%7CUnknown%7CTWFpbGZsb3d8e= yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&am= p;sdata=3DEJ8KluQVn8FTOYRBAYpxAaG7rua46eQpmGwI%2FxIMthQ%3D&reserved=3D0 > > > [2]: https://nam11.safelinks.protection.outlook.com/?url=3Dhttps%3A%2= F%2Fandroid-review.googlesource.com%2Fq%2Ftopic%3A%2522dmabuf-sysfs%2522&am= p;data=3D04%7C01%7Cchristian.koenig%40amd.com%7C72394dc653194a3fd3fd08d91fa= c2fb9%7C3dd8961fe4884e608e11a82d994e183d%7C0%7C0%7C637575646676575967%7CUnk= nown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX= VCI6Mn0%3D%7C1000&sdata=3D4sAAqK%2F6mtSr5MWpcu2EbwOvL93UA6kMwQ2uk4fMP1g= %3D&reserved=3D0+(status:open%20OR%20status:merged) > > > [3]: https://nam11.safelinks.protection.outlook.com/?url=3Dhttps%3A%2= F%2Fandroid-review.googlesource.com%2Fc%2Fplatform%2Fsystem%2Fmemory%2Flibm= eminfo%2F%2B%2F1549734&data=3D04%7C01%7Cchristian.koenig%40amd.com%7C72= 394dc653194a3fd3fd08d91fac2fb9%7C3dd8961fe4884e608e11a82d994e183d%7C0%7C0%7= C637575646676575967%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2l= uMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=3Dhs40%2FMAnJaZQA4pkYu= cGqeCOGk2A9dUU%2Fj9ajqAoyFk%3D&reserved=3D0 > > > > > > Signed-off-by: Hridya Valsaraju > > > Reported-by: kernel test robot > > > --- > > > > > > Hi Daniel, > > > > > > I am sending the latest version of the DMA-BUF sysfs statistics patch= to > > > the list again as per your suggestion to restart the discussion on it= :) > > > Please do take a look and let me know your thoughts, thank you! > > > > Daniel and Sumit might correct me, but I think in the previous discussi= on we > > came pretty much to the conclusion that this is not the right approach. Sorry about the confusion Christian. I should have added a brief summary of our meeting with Daniel as well to provide further context. > > > > DMA-buf is just the transport vehicle for driver allocations and as Dan= iel > > outlined it doesn't really make sense to account on a DMA-buf level exc= ept > > for debugging. > > > > So while this patch is technically correct it will only add another hal= ve > > backed uAPI. So question is rather what the alternative should look lik= e? > > So I chatted a bit with Android folks in a quick meeting, and the rough > conclusions we've had was > > - for per-process stats we'll look into cgroups for tracking this (becaus= e > Android will add matching cgroup for each app the want to track) > > - same for the tracking for OOM killer > > - that does leave them with a gap for shared processes, for which I agree= d > that just exposing the per dma-buf info is reasonable. It's not going t= o > be super useful on desktop linux because the dma-buf tends to not stick > around much, but it fits fairly perfectly on Android. > > So yeah that's why I think this is ok to have. > > What's missing is explaining this properly in the commit message. The > commit message explains nicely what's being added (which really should be > proper uapi docs in our Documentation/ files, not hidden in a commit > message where it's forgotten). But it fails to explain a bit the reasons > why we need this, I think a short summary of what Android needs (in an > abstract sense ie. high level semantics, not the specific implementation) > and why this fits and there's nothing better is needed here I think. Thank you Daniel, let me rewrite the commit message to explain this in a better manner and send out another patch set. The patch does add the ABI documentation in Documentation/ABI/testing/sysfs-kernel-dmabuf-buffers. Is the suggestion to add them in a different location? > > > Both AMD and Intel engineers are currently discussion a fdinfo based > > approach on the dri-devel mailing list. > > > > I strongly suggest that you join this discussion as well (and sorry I d= on't > > have the link at hand). > > Yeah I think since Android keeps the dma-buf fd around anyway (by design)= , > and since this is geared 100% for Android, implementing this exact > functionality as an fdinfo on the dma-buf sounds a lot cleaner to me. > Putting this in sysfs is really a bit a hack. The /proc//fdinfo/ interface can only provide information about the buffers for which processes hold fds. Hence, for the purposes of calculating per-buffer statistics, parsing /proc//fdinfo/ by itself would not provide a complete picture. Thank you for the reviews and comments Greg, Christian and Daniel! Regards, Hridya > > But it is also orthogonal to our fdinfo discussion, since our fdinfo is > for the drm_file, not the dma-buf fd. > > Except ofc I'm yet again not quite understanding what exactly Android > wants/needs. > -Daniel > > > > > Regards, > > Christian. > > > > > > > > Regards, > > > Hridya > > > > > > Changes in v4: > > > -Suppress uevents from kset creation to avoid waking up uevent listen= ers on > > > DMA-BUF export/release. > > > > > > Changes in v3: > > > -Fix a warning reported by the kernel test robot. > > > > > > Changes in v2: > > > -Move statistics to /sys/kernel/dmabuf/buffers in oder to allow addit= ion > > > of other DMA-BUF-related sysfs stats in future. Based on feedback fro= m > > > Daniel Vetter. > > > -Each attachment has its own directory to represent attaching devices= as > > > symlinks and to introduce map_count as a separate file. Based on > > > feedback from Daniel Vetter and Christian K=C3=B6nig. Thank you both! > > > -Commit messages updated to point to userspace code in AOSP that will > > > read the DMA-BUF sysfs stats. > > > > > > .../ABI/testing/sysfs-kernel-dmabuf-buffers | 52 +++ > > > drivers/dma-buf/Kconfig | 11 + > > > drivers/dma-buf/Makefile | 1 + > > > drivers/dma-buf/dma-buf-sysfs-stats.c | 300 +++++++++++++++= +++ > > > drivers/dma-buf/dma-buf-sysfs-stats.h | 62 ++++ > > > drivers/dma-buf/dma-buf.c | 37 +++ > > > include/linux/dma-buf.h | 20 ++ > > > 7 files changed, 483 insertions(+) > > > create mode 100644 Documentation/ABI/testing/sysfs-kernel-dmabuf-bu= ffers > > > create mode 100644 drivers/dma-buf/dma-buf-sysfs-stats.c > > > create mode 100644 drivers/dma-buf/dma-buf-sysfs-stats.h > > > > > > diff --git a/Documentation/ABI/testing/sysfs-kernel-dmabuf-buffers b/= Documentation/ABI/testing/sysfs-kernel-dmabuf-buffers > > > new file mode 100644 > > > index 000000000000..73a8c372b0f2 > > > --- /dev/null > > > +++ b/Documentation/ABI/testing/sysfs-kernel-dmabuf-buffers > > > @@ -0,0 +1,52 @@ > > > +What: /sys/kernel/dmabuf/buffers > > > +Date: May 2021 > > > +KernelVersion: v5.13 > > > +Contact: Hridya Valsaraju > > > +Description: The /sys/kernel/dmabuf/buffers directory contains= a > > > + snapshot of the internal state of every DMA-BUF. > > > + /sys/kernel/dmabuf/buffers/ will contain th= e > > > + statistics for the DMA-BUF with the unique inode number > > > + > > > +Users: kernel memory tuning/debugging tools > > > + > > > +What: /sys/kernel/dmabuf/buffers//exporte= r_name > > > +Date: May 2021 > > > +KernelVersion: v5.13 > > > +Contact: Hridya Valsaraju > > > +Description: This file is read-only and contains the name of t= he exporter of > > > + the DMA-BUF. > > > + > > > +What: /sys/kernel/dmabuf/buffers//size > > > +Date: May 2021 > > > +KernelVersion: v5.13 > > > +Contact: Hridya Valsaraju > > > +Description: This file is read-only and specifies the size of = the DMA-BUF in > > > + bytes. > > > + > > > +What: /sys/kernel/dmabuf/buffers//attachm= ents > > > +Date: May 2021 > > > +KernelVersion: v5.13 > > > +Contact: Hridya Valsaraju > > > +Description: This directory will contain subdirectories repres= enting every > > > + attachment of the DMA-BUF. > > > + > > > +What: /sys/kernel/dmabuf/buffers//attachm= ents/ > > > +Date: May 2021 > > > +KernelVersion: v5.13 > > > +Contact: Hridya Valsaraju > > > +Description: This directory will contain information on the at= taching device > > > + and the number of current distinct device mappings. > > > + > > > +What: /sys/kernel/dmabuf/buffers//attachm= ents//device > > > +Date: May 2021 > > > +KernelVersion: v5.13 > > > +Contact: Hridya Valsaraju > > > +Description: This file is read-only and is a symlink to the at= taching devices's > > > + sysfs entry. > > > + > > > +What: /sys/kernel/dmabuf/buffers//attachm= ents//map_counter > > > +Date: May 2021 > > > +KernelVersion: v5.13 > > > +Contact: Hridya Valsaraju > > > +Description: This file is read-only and contains a map_counter= indicating the > > > + number of distinct device mappings of the attachment. > > > diff --git a/drivers/dma-buf/Kconfig b/drivers/dma-buf/Kconfig > > > index 4e16c71c24b7..9561e3d2d428 100644 > > > --- a/drivers/dma-buf/Kconfig > > > +++ b/drivers/dma-buf/Kconfig > > > @@ -72,6 +72,17 @@ menuconfig DMABUF_HEAPS > > > allows userspace to allocate dma-bufs that can be shared > > > between drivers. > > > +menuconfig DMABUF_SYSFS_STATS > > > + bool "DMA-BUF sysfs statistics" > > > + select DMA_SHARED_BUFFER > > > + help > > > + Choose this option to enable DMA-BUF sysfs statistics > > > + in location /sys/kernel/dmabuf/buffers. > > > + > > > + /sys/kernel/dmabuf/buffers/ will contain > > > + statistics for the DMA-BUF with the unique inode number > > > + . > > > + > > > source "drivers/dma-buf/heaps/Kconfig" > > > endmenu > > > diff --git a/drivers/dma-buf/Makefile b/drivers/dma-buf/Makefile > > > index 995e05f609ff..40d81f23cacf 100644 > > > --- a/drivers/dma-buf/Makefile > > > +++ b/drivers/dma-buf/Makefile > > > @@ -6,6 +6,7 @@ obj-$(CONFIG_DMABUF_HEAPS) +=3D heaps/ > > > obj-$(CONFIG_SYNC_FILE) +=3D sync_file.o > > > obj-$(CONFIG_SW_SYNC) +=3D sw_sync.o sync_debug.o > > > obj-$(CONFIG_UDMABUF) +=3D udmabuf.o > > > +obj-$(CONFIG_DMABUF_SYSFS_STATS) +=3D dma-buf-sysfs-stats.o > > > dmabuf_selftests-y :=3D \ > > > selftest.o \ > > > diff --git a/drivers/dma-buf/dma-buf-sysfs-stats.c b/drivers/dma-buf/= dma-buf-sysfs-stats.c > > > new file mode 100644 > > > index 000000000000..45717c8108c8 > > > --- /dev/null > > > +++ b/drivers/dma-buf/dma-buf-sysfs-stats.c > > > @@ -0,0 +1,300 @@ > > > +// SPDX-License-Identifier: GPL-2.0-only > > > +/* > > > + * DMA-BUF sysfs statistics. > > > + * > > > + * Copyright (C) 2021 Google LLC. > > > + */ > > > + > > > +#include > > > +#include > > > +#include > > > +#include > > > +#include > > > +#include > > > + > > > +#include "dma-buf-sysfs-stats.h" > > > + > > > +#define to_dma_buf_entry_from_kobj(x) container_of(x, struct dma_buf= _sysfs_entry, kobj) > > > + > > > +struct dma_buf_stats_attribute { > > > + struct attribute attr; > > > + ssize_t (*show)(struct dma_buf *dmabuf, > > > + struct dma_buf_stats_attribute *attr, char *buf); > > > +}; > > > +#define to_dma_buf_stats_attr(x) container_of(x, struct dma_buf_stat= s_attribute, attr) > > > + > > > +static ssize_t dma_buf_stats_attribute_show(struct kobject *kobj, > > > + struct attribute *attr, > > > + char *buf) > > > +{ > > > + struct dma_buf_stats_attribute *attribute; > > > + struct dma_buf_sysfs_entry *sysfs_entry; > > > + struct dma_buf *dmabuf; > > > + > > > + attribute =3D to_dma_buf_stats_attr(attr); > > > + sysfs_entry =3D to_dma_buf_entry_from_kobj(kobj); > > > + dmabuf =3D sysfs_entry->dmabuf; > > > + > > > + if (!dmabuf || !attribute->show) > > > + return -EIO; > > > + > > > + return attribute->show(dmabuf, attribute, buf); > > > +} > > > + > > > +static const struct sysfs_ops dma_buf_stats_sysfs_ops =3D { > > > + .show =3D dma_buf_stats_attribute_show, > > > +}; > > > + > > > +static ssize_t exporter_name_show(struct dma_buf *dmabuf, > > > + struct dma_buf_stats_attribute *attr, > > > + char *buf) > > > +{ > > > + return sysfs_emit(buf, "%s\n", dmabuf->exp_name); > > > +} > > > + > > > +static ssize_t size_show(struct dma_buf *dmabuf, > > > + struct dma_buf_stats_attribute *attr, > > > + char *buf) > > > +{ > > > + return sysfs_emit(buf, "%zu\n", dmabuf->size); > > > +} > > > + > > > +static struct dma_buf_stats_attribute exporter_name_attribute =3D > > > + __ATTR_RO(exporter_name); > > > +static struct dma_buf_stats_attribute size_attribute =3D __ATTR_RO(s= ize); > > > + > > > +static struct attribute *dma_buf_stats_default_attrs[] =3D { > > > + &exporter_name_attribute.attr, > > > + &size_attribute.attr, > > > + NULL, > > > +}; > > > +ATTRIBUTE_GROUPS(dma_buf_stats_default); > > > + > > > +static void dma_buf_sysfs_release(struct kobject *kobj) > > > +{ > > > + struct dma_buf_sysfs_entry *sysfs_entry; > > > + > > > + sysfs_entry =3D to_dma_buf_entry_from_kobj(kobj); > > > + kfree(sysfs_entry); > > > +} > > > + > > > +static struct kobj_type dma_buf_ktype =3D { > > > + .sysfs_ops =3D &dma_buf_stats_sysfs_ops, > > > + .release =3D dma_buf_sysfs_release, > > > + .default_groups =3D dma_buf_stats_default_groups, > > > +}; > > > + > > > +#define to_dma_buf_attach_entry_from_kobj(x) container_of(x, struct = dma_buf_attach_sysfs_entry, kobj) > > > + > > > +struct dma_buf_attach_stats_attribute { > > > + struct attribute attr; > > > + ssize_t (*show)(struct dma_buf_attach_sysfs_entry *sysfs_entry, > > > + struct dma_buf_attach_stats_attribute *attr, char= *buf); > > > +}; > > > +#define to_dma_buf_attach_stats_attr(x) container_of(x, struct dma_b= uf_attach_stats_attribute, attr) > > > + > > > +static ssize_t dma_buf_attach_stats_attribute_show(struct kobject *k= obj, > > > + struct attribute *attr= , > > > + char *buf) > > > +{ > > > + struct dma_buf_attach_stats_attribute *attribute; > > > + struct dma_buf_attach_sysfs_entry *sysfs_entry; > > > + > > > + attribute =3D to_dma_buf_attach_stats_attr(attr); > > > + sysfs_entry =3D to_dma_buf_attach_entry_from_kobj(kobj); > > > + > > > + if (!attribute->show) > > > + return -EIO; > > > + > > > + return attribute->show(sysfs_entry, attribute, buf); > > > +} > > > + > > > +static const struct sysfs_ops dma_buf_attach_stats_sysfs_ops =3D { > > > + .show =3D dma_buf_attach_stats_attribute_show, > > > +}; > > > + > > > +static ssize_t map_counter_show(struct dma_buf_attach_sysfs_entry *s= ysfs_entry, > > > + struct dma_buf_attach_stats_attribute *at= tr, > > > + char *buf) > > > +{ > > > + return sysfs_emit(buf, "%u\n", sysfs_entry->map_counter); > > > +} > > > + > > > +static struct dma_buf_attach_stats_attribute map_counter_attribute = =3D > > > + __ATTR_RO(map_counter); > > > + > > > +static struct attribute *dma_buf_attach_stats_default_attrs[] =3D { > > > + &map_counter_attribute.attr, > > > + NULL, > > > +}; > > > +ATTRIBUTE_GROUPS(dma_buf_attach_stats_default); > > > + > > > +static void dma_buf_attach_sysfs_release(struct kobject *kobj) > > > +{ > > > + struct dma_buf_attach_sysfs_entry *sysfs_entry; > > > + > > > + sysfs_entry =3D to_dma_buf_attach_entry_from_kobj(kobj); > > > + kfree(sysfs_entry); > > > +} > > > + > > > +static struct kobj_type dma_buf_attach_ktype =3D { > > > + .sysfs_ops =3D &dma_buf_attach_stats_sysfs_ops, > > > + .release =3D dma_buf_attach_sysfs_release, > > > + .default_groups =3D dma_buf_attach_stats_default_groups, > > > +}; > > > + > > > +void dma_buf_attach_stats_teardown(struct dma_buf_attachment *attach= ) > > > +{ > > > + struct dma_buf_attach_sysfs_entry *sysfs_entry; > > > + > > > + sysfs_entry =3D attach->sysfs_entry; > > > + if (!sysfs_entry) > > > + return; > > > + > > > + sysfs_delete_link(&sysfs_entry->kobj, &attach->dev->kobj, "device= "); > > > + > > > + kobject_del(&sysfs_entry->kobj); > > > + kobject_put(&sysfs_entry->kobj); > > > +} > > > + > > > +int dma_buf_attach_stats_setup(struct dma_buf_attachment *attach, > > > + unsigned int uid) > > > +{ > > > + struct dma_buf_attach_sysfs_entry *sysfs_entry; > > > + int ret; > > > + struct dma_buf *dmabuf; > > > + > > > + if (!attach) > > > + return -EINVAL; > > > + > > > + dmabuf =3D attach->dmabuf; > > > + > > > + sysfs_entry =3D kzalloc(sizeof(struct dma_buf_attach_sysfs_entry)= , > > > + GFP_KERNEL); > > > + if (!sysfs_entry) > > > + return -ENOMEM; > > > + > > > + sysfs_entry->kobj.kset =3D dmabuf->sysfs_entry->attach_stats_kset= ; > > > + > > > + attach->sysfs_entry =3D sysfs_entry; > > > + > > > + ret =3D kobject_init_and_add(&sysfs_entry->kobj, &dma_buf_attach_= ktype, > > > + NULL, "%u", uid); > > > + if (ret) > > > + goto kobj_err; > > > + > > > + ret =3D sysfs_create_link(&sysfs_entry->kobj, &attach->dev->kobj, > > > + "device"); > > > + if (ret) > > > + goto link_err; > > > + > > > + return 0; > > > + > > > +link_err: > > > + kobject_del(&sysfs_entry->kobj); > > > +kobj_err: > > > + kobject_put(&sysfs_entry->kobj); > > > + attach->sysfs_entry =3D NULL; > > > + > > > + return ret; > > > +} > > > +void dma_buf_stats_teardown(struct dma_buf *dmabuf) > > > +{ > > > + struct dma_buf_sysfs_entry *sysfs_entry; > > > + > > > + sysfs_entry =3D dmabuf->sysfs_entry; > > > + if (!sysfs_entry) > > > + return; > > > + > > > + kset_unregister(sysfs_entry->attach_stats_kset); > > > + kobject_del(&sysfs_entry->kobj); > > > + kobject_put(&sysfs_entry->kobj); > > > +} > > > + > > > + > > > +/* Statistics files do not need to send uevents. */ > > > +static int dmabuf_sysfs_uevent_filter(struct kset *kset, struct kobj= ect *kobj) > > > +{ > > > + return 0; > > > +} > > > + > > > +static const struct kset_uevent_ops dmabuf_sysfs_no_uevent_ops =3D { > > > + .filter =3D dmabuf_sysfs_uevent_filter, > > > +}; > > > + > > > +static struct kset *dma_buf_stats_kset; > > > +static struct kset *dma_buf_per_buffer_stats_kset; > > > +int dma_buf_init_sysfs_statistics(void) > > > +{ > > > + dma_buf_stats_kset =3D kset_create_and_add("dmabuf", > > > + &dmabuf_sysfs_no_uevent_= ops, > > > + kernel_kobj); > > > + if (!dma_buf_stats_kset) > > > + return -ENOMEM; > > > + > > > + dma_buf_per_buffer_stats_kset =3D kset_create_and_add("buffers", > > > + &dmabuf_sysfs= _no_uevent_ops, > > > + &dma_buf_stat= s_kset->kobj); > > > + if (!dma_buf_per_buffer_stats_kset) { > > > + kset_unregister(dma_buf_stats_kset); > > > + return -ENOMEM; > > > + } > > > + > > > + return 0; > > > +} > > > + > > > +void dma_buf_uninit_sysfs_statistics(void) > > > +{ > > > + kset_unregister(dma_buf_per_buffer_stats_kset); > > > + kset_unregister(dma_buf_stats_kset); > > > +} > > > + > > > +int dma_buf_stats_setup(struct dma_buf *dmabuf) > > > +{ > > > + struct dma_buf_sysfs_entry *sysfs_entry; > > > + int ret; > > > + struct kset *attach_stats_kset; > > > + > > > + if (!dmabuf || !dmabuf->file) > > > + return -EINVAL; > > > + > > > + if (!dmabuf->exp_name) { > > > + pr_err("exporter name must not be empty if stats needed\n= "); > > > + return -EINVAL; > > > + } > > > + > > > + sysfs_entry =3D kzalloc(sizeof(struct dma_buf_sysfs_entry), GFP_K= ERNEL); > > > + if (!sysfs_entry) > > > + return -ENOMEM; > > > + > > > + sysfs_entry->kobj.kset =3D dma_buf_per_buffer_stats_kset; > > > + sysfs_entry->dmabuf =3D dmabuf; > > > + > > > + dmabuf->sysfs_entry =3D sysfs_entry; > > > + > > > + /* create the directory for buffer stats */ > > > + ret =3D kobject_init_and_add(&sysfs_entry->kobj, &dma_buf_ktype, = NULL, > > > + "%lu", file_inode(dmabuf->file)->i_ino= ); > > > + if (ret) > > > + goto err_sysfs_dmabuf; > > > + > > > + /* create the directory for attachment stats */ > > > + attach_stats_kset =3D kset_create_and_add("attachments", > > > + &dmabuf_sysfs_no_uevent_o= ps, > > > + &sysfs_entry->kobj); > > > + if (!attach_stats_kset) { > > > + ret =3D -ENOMEM; > > > + goto err_sysfs_attach; > > > + } > > > + > > > + sysfs_entry->attach_stats_kset =3D attach_stats_kset; > > > + > > > + return 0; > > > + > > > +err_sysfs_attach: > > > + kobject_del(&sysfs_entry->kobj); > > > +err_sysfs_dmabuf: > > > + kobject_put(&sysfs_entry->kobj); > > > + dmabuf->sysfs_entry =3D NULL; > > > + return ret; > > > +} > > > diff --git a/drivers/dma-buf/dma-buf-sysfs-stats.h b/drivers/dma-buf/= dma-buf-sysfs-stats.h > > > new file mode 100644 > > > index 000000000000..5f4703249117 > > > --- /dev/null > > > +++ b/drivers/dma-buf/dma-buf-sysfs-stats.h > > > @@ -0,0 +1,62 @@ > > > +/* SPDX-License-Identifier: GPL-2.0-only */ > > > +/* > > > + * DMA-BUF sysfs statistics. > > > + * > > > + * Copyright (C) 2021 Google LLC. > > > + */ > > > + > > > +#ifndef _DMA_BUF_SYSFS_STATS_H > > > +#define _DMA_BUF_SYSFS_STATS_H > > > + > > > +#ifdef CONFIG_DMABUF_SYSFS_STATS > > > + > > > +int dma_buf_init_sysfs_statistics(void); > > > +void dma_buf_uninit_sysfs_statistics(void); > > > + > > > +int dma_buf_stats_setup(struct dma_buf *dmabuf); > > > +int dma_buf_attach_stats_setup(struct dma_buf_attachment *attach, > > > + unsigned int uid); > > > +static inline void dma_buf_update_attachment_map_count(struct dma_bu= f_attachment *attach, > > > + int delta) > > > +{ > > > + struct dma_buf_attach_sysfs_entry *entry =3D attach->sysfs_entry; > > > + > > > + entry->map_counter +=3D delta; > > > +} > > > +void dma_buf_stats_teardown(struct dma_buf *dmabuf); > > > +void dma_buf_attach_stats_teardown(struct dma_buf_attachment *attach= ); > > > +static inline unsigned int dma_buf_update_attach_uid(struct dma_buf = *dmabuf) > > > +{ > > > + struct dma_buf_sysfs_entry *entry =3D dmabuf->sysfs_entry; > > > + > > > + return entry->attachment_uid++; > > > +} > > > +#else > > > + > > > +static inline int dma_buf_init_sysfs_statistics(void) > > > +{ > > > + return 0; > > > +} > > > + > > > +static inline void dma_buf_uninit_sysfs_statistics(void) {} > > > + > > > +static inline int dma_buf_stats_setup(struct dma_buf *dmabuf) > > > +{ > > > + return 0; > > > +} > > > +static inline int dma_buf_attach_stats_setup(struct dma_buf_attachme= nt *attach, > > > + unsigned int uid) > > > +{ > > > + return 0; > > > +} > > > + > > > +static inline void dma_buf_stats_teardown(struct dma_buf *dmabuf) {} > > > +static inline void dma_buf_attach_stats_teardown(struct dma_buf_atta= chment *attach) {} > > > +static inline void dma_buf_update_attachment_map_count(struct dma_bu= f_attachment *attach, > > > + int delta) {} > > > +static inline unsigned int dma_buf_update_attach_uid(struct dma_buf = *dmabuf) > > > +{ > > > + return 0; > > > +} > > > +#endif > > > +#endif // _DMA_BUF_SYSFS_STATS_H > > > diff --git a/drivers/dma-buf/dma-buf.c b/drivers/dma-buf/dma-buf.c > > > index f264b70c383e..184dd7acb1ed 100644 > > > --- a/drivers/dma-buf/dma-buf.c > > > +++ b/drivers/dma-buf/dma-buf.c > > > @@ -29,6 +29,8 @@ > > > #include > > > #include > > > +#include "dma-buf-sysfs-stats.h" > > > + > > > static inline int is_dma_buf_file(struct file *); > > > struct dma_buf_list { > > > @@ -79,6 +81,7 @@ static void dma_buf_release(struct dentry *dentry) > > > if (dmabuf->resv =3D=3D (struct dma_resv *)&dmabuf[1]) > > > dma_resv_fini(dmabuf->resv); > > > + dma_buf_stats_teardown(dmabuf); > > > module_put(dmabuf->owner); > > > kfree(dmabuf->name); > > > kfree(dmabuf); > > > @@ -580,6 +583,10 @@ struct dma_buf *dma_buf_export(const struct dma_= buf_export_info *exp_info) > > > file->f_mode |=3D FMODE_LSEEK; > > > dmabuf->file =3D file; > > > + ret =3D dma_buf_stats_setup(dmabuf); > > > + if (ret) > > > + goto err_sysfs; > > > + > > > mutex_init(&dmabuf->lock); > > > INIT_LIST_HEAD(&dmabuf->attachments); > > > @@ -589,6 +596,14 @@ struct dma_buf *dma_buf_export(const struct dma_= buf_export_info *exp_info) > > > return dmabuf; > > > +err_sysfs: > > > + /* > > > + * Set file->f_path.dentry->d_fsdata to NULL so that when > > > + * dma_buf_release() gets invoked by dentry_ops, it exits > > > + * early before calling the release() dma_buf op. > > > + */ > > > + file->f_path.dentry->d_fsdata =3D NULL; > > > + fput(file); > > > err_dmabuf: > > > kfree(dmabuf); > > > err_module: > > > @@ -723,6 +738,7 @@ dma_buf_dynamic_attach(struct dma_buf *dmabuf, st= ruct device *dev, > > > { > > > struct dma_buf_attachment *attach; > > > int ret; > > > + unsigned int attach_uid; > > > if (WARN_ON(!dmabuf || !dev)) > > > return ERR_PTR(-EINVAL); > > > @@ -748,8 +764,13 @@ dma_buf_dynamic_attach(struct dma_buf *dmabuf, s= truct device *dev, > > > } > > > dma_resv_lock(dmabuf->resv, NULL); > > > list_add(&attach->node, &dmabuf->attachments); > > > + attach_uid =3D dma_buf_update_attach_uid(dmabuf); > > > dma_resv_unlock(dmabuf->resv); > > > + ret =3D dma_buf_attach_stats_setup(attach, attach_uid); > > > + if (ret) > > > + goto err_sysfs; > > > + > > > /* When either the importer or the exporter can't handle dynamic > > > * mappings we cache the mapping here to avoid issues with the > > > * reservation object lock. > > > @@ -776,6 +797,7 @@ dma_buf_dynamic_attach(struct dma_buf *dmabuf, st= ruct device *dev, > > > dma_resv_unlock(attach->dmabuf->resv); > > > attach->sgt =3D sgt; > > > attach->dir =3D DMA_BIDIRECTIONAL; > > > + dma_buf_update_attachment_map_count(attach, 1 /* delta */= ); > > > } > > > return attach; > > > @@ -792,6 +814,7 @@ dma_buf_dynamic_attach(struct dma_buf *dmabuf, st= ruct device *dev, > > > if (dma_buf_is_dynamic(attach->dmabuf)) > > > dma_resv_unlock(attach->dmabuf->resv); > > > +err_sysfs: > > > dma_buf_detach(dmabuf, attach); > > > return ERR_PTR(ret); > > > } > > > @@ -841,6 +864,7 @@ void dma_buf_detach(struct dma_buf *dmabuf, struc= t dma_buf_attachment *attach) > > > dma_resv_lock(attach->dmabuf->resv, NULL); > > > __unmap_dma_buf(attach, attach->sgt, attach->dir); > > > + dma_buf_update_attachment_map_count(attach, -1 /* delta *= /); > > > if (dma_buf_is_dynamic(attach->dmabuf)) { > > > dma_buf_unpin(attach); > > > @@ -854,6 +878,7 @@ void dma_buf_detach(struct dma_buf *dmabuf, struc= t dma_buf_attachment *attach) > > > if (dmabuf->ops->detach) > > > dmabuf->ops->detach(dmabuf, attach); > > > + dma_buf_attach_stats_teardown(attach); > > > kfree(attach); > > > } > > > EXPORT_SYMBOL_GPL(dma_buf_detach); > > > @@ -993,6 +1018,9 @@ struct sg_table *dma_buf_map_attachment(struct d= ma_buf_attachment *attach, > > > } > > > #endif /* CONFIG_DMA_API_DEBUG */ > > > + if (!IS_ERR(sg_table)) > > > + dma_buf_update_attachment_map_count(attach, 1 /* delta */= ); > > > + > > > return sg_table; > > > } > > > EXPORT_SYMBOL_GPL(dma_buf_map_attachment); > > > @@ -1030,6 +1058,8 @@ void dma_buf_unmap_attachment(struct dma_buf_at= tachment *attach, > > > if (dma_buf_is_dynamic(attach->dmabuf) && > > > !IS_ENABLED(CONFIG_DMABUF_MOVE_NOTIFY)) > > > dma_buf_unpin(attach); > > > + > > > + dma_buf_update_attachment_map_count(attach, -1 /* delta */); > > > } > > > EXPORT_SYMBOL_GPL(dma_buf_unmap_attachment); > > > @@ -1480,6 +1510,12 @@ static inline void dma_buf_uninit_debugfs(void= ) > > > static int __init dma_buf_init(void) > > > { > > > + int ret; > > > + > > > + ret =3D dma_buf_init_sysfs_statistics(); > > > + if (ret) > > > + return ret; > > > + > > > dma_buf_mnt =3D kern_mount(&dma_buf_fs_type); > > > if (IS_ERR(dma_buf_mnt)) > > > return PTR_ERR(dma_buf_mnt); > > > @@ -1495,5 +1531,6 @@ static void __exit dma_buf_deinit(void) > > > { > > > dma_buf_uninit_debugfs(); > > > kern_unmount(dma_buf_mnt); > > > + dma_buf_uninit_sysfs_statistics(); > > > } > > > __exitcall(dma_buf_deinit); > > > diff --git a/include/linux/dma-buf.h b/include/linux/dma-buf.h > > > index efdc56b9d95f..342585bd6dff 100644 > > > --- a/include/linux/dma-buf.h > > > +++ b/include/linux/dma-buf.h > > > @@ -295,6 +295,9 @@ struct dma_buf_ops { > > > * @poll: for userspace poll support > > > * @cb_excl: for userspace poll support > > > * @cb_shared: for userspace poll support > > > + * @sysfs_entry: for exposing information about this buffer in sysfs= . > > > + * The attachment_uid member of @sysfs_entry is protected by dma_res= v lock > > > + * and is incremented on each attach. > > > * > > > * This represents a shared buffer, created by calling dma_buf_expo= rt(). The > > > * userspace representation is a normal file descriptor, which can = be created by > > > @@ -330,6 +333,15 @@ struct dma_buf { > > > __poll_t active; > > > } cb_excl, cb_shared; > > > +#ifdef CONFIG_DMABUF_SYSFS_STATS > > > + /* for sysfs stats */ > > > + struct dma_buf_sysfs_entry { > > > + struct kobject kobj; > > > + struct dma_buf *dmabuf; > > > + unsigned int attachment_uid; > > > + struct kset *attach_stats_kset; > > > + } *sysfs_entry; > > > +#endif > > > }; > > > /** > > > @@ -379,6 +391,7 @@ struct dma_buf_attach_ops { > > > * @importer_ops: importer operations for this attachment, if provi= ded > > > * dma_buf_map/unmap_attachment() must be called with the dma_resv = lock held. > > > * @importer_priv: importer specific attachment data. > > > + * @sysfs_entry: For exposing information about this attachment in s= ysfs. > > > * > > > * This structure holds the attachment information between the dma_= buf buffer > > > * and its user device(s). The list contains one attachment struct = per device > > > @@ -399,6 +412,13 @@ struct dma_buf_attachment { > > > const struct dma_buf_attach_ops *importer_ops; > > > void *importer_priv; > > > void *priv; > > > +#ifdef CONFIG_DMABUF_SYSFS_STATS > > > + /* for sysfs stats */ > > > + struct dma_buf_attach_sysfs_entry { > > > + struct kobject kobj; > > > + unsigned int map_counter; > > > + } *sysfs_entry; > > > +#endif > > > }; > > > /** > > > > -- > Daniel Vetter > Software Engineer, Intel Corporation > http://blog.ffwll.ch