Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3523255pxj; Tue, 15 Jun 2021 02:50:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwyTPfvaoK/iTYDdANPSnaoplEYNius6wnWTHExqVTG89variPHlQ2CAPWz+jyCXGkyV7DJ X-Received: by 2002:a5e:9306:: with SMTP id k6mr18400763iom.157.1623750643622; Tue, 15 Jun 2021 02:50:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623750643; cv=none; d=google.com; s=arc-20160816; b=ccPOV9jlZBLg+EhUjWfsMa8j9ta15ldLN2duNGmodYPUcN7rjxvikg0CCGgNNK2hPc dbDwB3CWe87QaMPqbaL0sxX4jJ+ombytwin74zZq7t9KhSTLU8DS2C33NfGI+vp2kBp+ usQ3E2U8rFTk2Nty9hVHVzNkXWNkp4N63TZ6FCaBHOK4xgvvPC4nOStOxUVWUj9DVmkJ i021xxNHG0x1kLEOXFsfRnJbFDS+tUsKCqa/HWcAnco8bzEFgtiWVy6ipw/MhHbOv/g0 3t/Hg2QvXpjg5ZYf0dniR8ShgLDm8a8hRCi7k0CQWXOHyRCfsGE8Zw2Sd4J203RW0hR5 ixjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:dkim-signature; bh=oFMt+3asFUPB62nq8rulMbTdyfSDPvY6nBcgrT8n8yA=; b=kUpkHfBVTl7FSZ7YVReLzJmy0LIJXO7un3UGyCuCUBc9gbeNMbhxl09PdfdozUG0vD kUdd428F4SbOuEkk9YjMZhcLZ6bMDyVqplJMOHC/D8Aj1uV/flj3sFrozEICHXPRYjjm 6dT3nkslwUx5xIC6hZcmAw+wabr71hOTlnz4iGzMLW+R/j9nR87+Bkh+WDOrqM/f9Zea o78+QfFHj5BUaMCFk78g+toxAsjPaPr5slMOgQ73nfWGEUfwLKbJmdDjlTUCdkXrsJ/I ApF2GKcvN/JHae21s0cdGYdvqEMjfm+ZMMyHhGSJzNP3IdI3+RomRvgfhzheX8ZMqT3n pNkw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=Ya3nfwtx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y17si20976827iow.61.2021.06.15.02.50.31; Tue, 15 Jun 2021 02:50:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=Ya3nfwtx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231588AbhFOJvw (ORCPT + 99 others); Tue, 15 Jun 2021 05:51:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58760 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231346AbhFOJvv (ORCPT ); Tue, 15 Jun 2021 05:51:51 -0400 Received: from mail-wm1-x32a.google.com (mail-wm1-x32a.google.com [IPv6:2a00:1450:4864:20::32a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 510D4C06175F for ; Tue, 15 Jun 2021 02:49:47 -0700 (PDT) Received: by mail-wm1-x32a.google.com with SMTP id 3-20020a05600c0243b029019f2f9b2b8aso1623751wmj.2 for ; Tue, 15 Jun 2021 02:49:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=date:from:to:cc:subject:message-id:mail-followup-to:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=oFMt+3asFUPB62nq8rulMbTdyfSDPvY6nBcgrT8n8yA=; b=Ya3nfwtxdDOXzksDwtq0R/ag6jBXp/WN4jzgzu+IC+zQKpdKcFV2DG5Cvo0BmGP9rO T+fVo+/tbc6TZ/pEaUb9p+eTNmKoyQp97Xz6Ue4VykySFxCI6KhhqzOSKoTSoQQx8ogw 8qEDIJfnZUBJxjKkjfU8KFblXyNKN5fFkYYV4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id :mail-followup-to:references:mime-version:content-disposition :content-transfer-encoding:in-reply-to; bh=oFMt+3asFUPB62nq8rulMbTdyfSDPvY6nBcgrT8n8yA=; b=c/914WjnwdYmjFEwyYM99R+fV3tisWEQYbsq8Xy7IBWiQcmHXAG3dvgFBcEdzBv4Ny 08S4VOeB7lRS7Qwq89ovsCMDZ50EtHtpR6dA7zBOv/YMHxWbfdm8u0ZufNldX406KKq2 wrCuBSD8DI1ZAooQBPSS0u4P9FGg3MQM6XjOQG84PwOQbGbjhGfeaU1/93T6D0mP3ELg 9qTxL6Ivyfop9fp5fsa4vgYF04qmOctd28C3pd6JDBwdPEtrR+5Z9JjXcB/Aql6+tGo1 67kxx/rfXIqB/kALQFv3qzfnzRQNPYmyrH72FmS9lSC/DfHiYBZJI1eP/5LjYORvnDve e2uw== X-Gm-Message-State: AOAM532hhn1aa2fdb22mnYAaR9nYbd3r2Ab+UT9Kb2j4n5IS2E86tpqW 05XBrY5tm/iQpq9w/u/avTzVSQ== X-Received: by 2002:a7b:cd06:: with SMTP id f6mr21770305wmj.125.1623750585792; Tue, 15 Jun 2021 02:49:45 -0700 (PDT) Received: from phenom.ffwll.local ([2a02:168:57f4:0:efd0:b9e5:5ae6:c2fa]) by smtp.gmail.com with ESMTPSA id c12sm1170270wrw.46.2021.06.15.02.49.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 15 Jun 2021 02:49:45 -0700 (PDT) Date: Tue, 15 Jun 2021 11:49:38 +0200 From: Daniel Vetter To: Hridya Valsaraju Cc: daniel@ffwll.ch, Sumit Semwal , Christian =?iso-8859-1?Q?K=F6nig?= , Jonathan Corbet , Greg Kroah-Hartman , linux-kernel@vger.kernel.org, linux-media@vger.kernel.org, dri-devel@lists.freedesktop.org, linaro-mm-sig@lists.linaro.org, linux-doc@vger.kernel.org, kernel-team@android.com, john.stultz@linaro.org, surenb@google.com, kernel test robot Subject: Re: [PATCH v6] dmabuf: Add the capability to expose DMA-BUF stats in sysfs Message-ID: Mail-Followup-To: Hridya Valsaraju , Sumit Semwal , Christian =?iso-8859-1?Q?K=F6nig?= , Jonathan Corbet , Greg Kroah-Hartman , linux-kernel@vger.kernel.org, linux-media@vger.kernel.org, dri-devel@lists.freedesktop.org, linaro-mm-sig@lists.linaro.org, linux-doc@vger.kernel.org, kernel-team@android.com, john.stultz@linaro.org, surenb@google.com, kernel test robot References: <20210603214758.2955251-1-hridya@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20210603214758.2955251-1-hridya@google.com> X-Operating-System: Linux phenom 5.10.0-7-amd64 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 03, 2021 at 02:47:51PM -0700, Hridya Valsaraju wrote: > Overview > ======== > The patch adds DMA-BUF statistics to /sys/kernel/dmabuf/buffers. It > allows statistics to be enabled for each DMA-BUF in sysfs by enabling > the config CONFIG_DMABUF_SYSFS_STATS. > > The following stats will be exposed by the interface: > > /sys/kernel/dmabuf/buffers//exporter_name > /sys/kernel/dmabuf/buffers//size > /sys/kernel/dmabuf/buffers//attachments//device > /sys/kernel/dmabuf/buffers//attachments//map_counter > > The inode_number is unique for each DMA-BUF and was added earlier [1] > in order to allow userspace to track DMA-BUF usage across different > processes. > > Use Cases > ========= > The interface provides a way to gather DMA-BUF per-buffer statistics > from production devices. These statistics will be used to derive DMA-BUF > per-exporter stats and per-device usage stats for Android Bug reports. > The corresponding userspace changes can be found at [2]. > Telemetry tools will also capture this information(along with other > memory metrics) periodically as well as on important events like a > foreground app kill (which might have been triggered by Low Memory > Killer). It will also contribute to provide a snapshot of the system > memory usage on other events such as OOM kills and Application Not > Responding events. > > Background > ========== > Currently, there are two existing interfaces that provide information > about DMA-BUFs. > 1) /sys/kernel/debug/dma_buf/bufinfo > debugfs is however unsuitable to be mounted in production systems and > cannot be considered as an alternative to the sysfs interface being > proposed. > 2) proc//fdinfo/ > The proc//fdinfo/ files expose information about DMA-BUF fds. > However, the existing procfs interfaces can only provide information > about the buffers for which processes hold fds or have the buffers > mmapped into their address space. Since the procfs interfaces alone > cannot provide a full picture of all DMA-BUFs in the system, there is > the need for an alternate interface to provide this information on > production systems. > > The patch contains the following major improvements over v1: > 1) Each attachment is represented by its own directory to allow creating > a symlink to the importing device and to also provide room for future > expansion. > 2) The number of distinct mappings of each attachment is exposed in a > separate file. > 3) The per-buffer statistics are now in /sys/kernel/dmabuf/buffers > inorder to make the interface expandable in future. > > All of the improvements above are based on suggestions/feedback from > Daniel Vetter and Christian K?nig. > > A shell script that can be run on a classic Linux environment to read > out the DMA-BUF statistics can be found at [3](suggested by John > Stultz). > > [1]: https://lore.kernel.org/patchwork/patch/1088791/ > [2]: https://android-review.googlesource.com/q/topic:%22dmabuf-sysfs%22+(status:open%20OR%20status:merged) > [3]: https://android-review.googlesource.com/c/platform/system/memory/libmeminfo/+/1549734 > > Reviewed-by: Greg Kroah-Hartman > Signed-off-by: Hridya Valsaraju > Reported-by: kernel test robot > --- > > Hello Daniel, > > I have added the documentation as a DOC: overview section in the > dma-buf-sysfs-stats.c file as per your suggestion. Please do take a look > when you get a chance. Thanks in advance! > > Regards, > Hridya > > Change in v6: > -Moved documentation content from Documentation/driver-api/dma-buf.rst > to drivers/dma-buf/dma-buf-sysfs-stats.c as a DOC section and linked to > it from Documentation/driver-api/dma-buf.rst. Based on feedback from > Daniel Vetter. > > Change in v5: > -Added a section on DMA-BUF statistics to > Documentation/driver-api/dma-buf.rst. Organized the commit message to > clearly state the need for the new interface and provide the > background on why the existing means of DMA-BUF accounting will not > suffice. Based on feedback from Daniel Vetter. > > Changes in v4: > -Suppress uevents from kset creation to avoid waking up uevent listeners > on DMA-BUF export/release. > > Changes in v3: > -Fix a warning reported by the kernel test robot. > > Changes in v2: > -Move statistics to /sys/kernel/dmabuf/buffers in oder to allow addition > of other DMA-BUF-related sysfs stats in future. Based on feedback from > Daniel Vetter. > -Each attachment has its own directory to represent attached devices as > symlinks and to introduce map_count as a separate file. Based on > feedback from Daniel Vetter and Christian K?nig. Thank you both! > -Commit messages updated to point to userspace code in AOSP that will > read the DMA-BUF sysfs stats. Pushed to drm-misc-next, thanks for your work. I think the timing just conspired that this might miss the next merge window though :-/ -Daniel > > .../ABI/testing/sysfs-kernel-dmabuf-buffers | 52 +++ > Documentation/driver-api/dma-buf.rst | 5 + > drivers/dma-buf/Kconfig | 11 + > drivers/dma-buf/Makefile | 1 + > drivers/dma-buf/dma-buf-sysfs-stats.c | 337 ++++++++++++++++++ > drivers/dma-buf/dma-buf-sysfs-stats.h | 62 ++++ > drivers/dma-buf/dma-buf.c | 37 ++ > include/linux/dma-buf.h | 20 ++ > 8 files changed, 525 insertions(+) > create mode 100644 Documentation/ABI/testing/sysfs-kernel-dmabuf-buffers > create mode 100644 drivers/dma-buf/dma-buf-sysfs-stats.c > create mode 100644 drivers/dma-buf/dma-buf-sysfs-stats.h > > diff --git a/Documentation/ABI/testing/sysfs-kernel-dmabuf-buffers b/Documentation/ABI/testing/sysfs-kernel-dmabuf-buffers > new file mode 100644 > index 000000000000..a243984ed420 > --- /dev/null > +++ b/Documentation/ABI/testing/sysfs-kernel-dmabuf-buffers > @@ -0,0 +1,52 @@ > +What: /sys/kernel/dmabuf/buffers > +Date: May 2021 > +KernelVersion: v5.13 > +Contact: Hridya Valsaraju > +Description: The /sys/kernel/dmabuf/buffers directory contains a > + snapshot of the internal state of every DMA-BUF. > + /sys/kernel/dmabuf/buffers/ will contain the > + statistics for the DMA-BUF with the unique inode number > + > +Users: kernel memory tuning/debugging tools > + > +What: /sys/kernel/dmabuf/buffers//exporter_name > +Date: May 2021 > +KernelVersion: v5.13 > +Contact: Hridya Valsaraju > +Description: This file is read-only and contains the name of the exporter of > + the DMA-BUF. > + > +What: /sys/kernel/dmabuf/buffers//size > +Date: May 2021 > +KernelVersion: v5.13 > +Contact: Hridya Valsaraju > +Description: This file is read-only and specifies the size of the DMA-BUF in > + bytes. > + > +What: /sys/kernel/dmabuf/buffers//attachments > +Date: May 2021 > +KernelVersion: v5.13 > +Contact: Hridya Valsaraju > +Description: This directory will contain subdirectories representing every > + attachment of the DMA-BUF. > + > +What: /sys/kernel/dmabuf/buffers//attachments/ > +Date: May 2021 > +KernelVersion: v5.13 > +Contact: Hridya Valsaraju > +Description: This directory will contain information on the attached device > + and the number of current distinct device mappings. > + > +What: /sys/kernel/dmabuf/buffers//attachments//device > +Date: May 2021 > +KernelVersion: v5.13 > +Contact: Hridya Valsaraju > +Description: This file is read-only and is a symlink to the attached device's > + sysfs entry. > + > +What: /sys/kernel/dmabuf/buffers//attachments//map_counter > +Date: May 2021 > +KernelVersion: v5.13 > +Contact: Hridya Valsaraju > +Description: This file is read-only and contains a map_counter indicating the > + number of distinct device mappings of the attachment. > diff --git a/Documentation/driver-api/dma-buf.rst b/Documentation/driver-api/dma-buf.rst > index 7f37ec30d9fd..d47a429dc549 100644 > --- a/Documentation/driver-api/dma-buf.rst > +++ b/Documentation/driver-api/dma-buf.rst > @@ -106,6 +106,11 @@ Implicit Fence Poll Support > .. kernel-doc:: drivers/dma-buf/dma-buf.c > :doc: implicit fence polling > > +DMA-BUF statistics > +~~~~~~~~~~~~~~~~~~ > +.. kernel-doc:: drivers/dma-buf/dma-buf-sysfs-stats.c > + :doc: overview > + > Kernel Functions and Structures Reference > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > > diff --git a/drivers/dma-buf/Kconfig b/drivers/dma-buf/Kconfig > index 4e16c71c24b7..9561e3d2d428 100644 > --- a/drivers/dma-buf/Kconfig > +++ b/drivers/dma-buf/Kconfig > @@ -72,6 +72,17 @@ menuconfig DMABUF_HEAPS > allows userspace to allocate dma-bufs that can be shared > between drivers. > > +menuconfig DMABUF_SYSFS_STATS > + bool "DMA-BUF sysfs statistics" > + select DMA_SHARED_BUFFER > + help > + Choose this option to enable DMA-BUF sysfs statistics > + in location /sys/kernel/dmabuf/buffers. > + > + /sys/kernel/dmabuf/buffers/ will contain > + statistics for the DMA-BUF with the unique inode number > + . > + > source "drivers/dma-buf/heaps/Kconfig" > > endmenu > diff --git a/drivers/dma-buf/Makefile b/drivers/dma-buf/Makefile > index 995e05f609ff..40d81f23cacf 100644 > --- a/drivers/dma-buf/Makefile > +++ b/drivers/dma-buf/Makefile > @@ -6,6 +6,7 @@ obj-$(CONFIG_DMABUF_HEAPS) += heaps/ > obj-$(CONFIG_SYNC_FILE) += sync_file.o > obj-$(CONFIG_SW_SYNC) += sw_sync.o sync_debug.o > obj-$(CONFIG_UDMABUF) += udmabuf.o > +obj-$(CONFIG_DMABUF_SYSFS_STATS) += dma-buf-sysfs-stats.o > > dmabuf_selftests-y := \ > selftest.o \ > diff --git a/drivers/dma-buf/dma-buf-sysfs-stats.c b/drivers/dma-buf/dma-buf-sysfs-stats.c > new file mode 100644 > index 000000000000..a2638e84199c > --- /dev/null > +++ b/drivers/dma-buf/dma-buf-sysfs-stats.c > @@ -0,0 +1,337 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * DMA-BUF sysfs statistics. > + * > + * Copyright (C) 2021 Google LLC. > + */ > + > +#include > +#include > +#include > +#include > +#include > +#include > + > +#include "dma-buf-sysfs-stats.h" > + > +#define to_dma_buf_entry_from_kobj(x) container_of(x, struct dma_buf_sysfs_entry, kobj) > + > +/** > + * DOC: overview > + * > + * ``/sys/kernel/debug/dma_buf/bufinfo`` provides an overview of every DMA-BUF > + * in the system. However, since debugfs is not safe to be mounted in > + * production, procfs and sysfs can be used to gather DMA-BUF statistics on > + * production systems. > + * > + * The ``/proc//fdinfo/`` files in procfs can be used to gather > + * information about DMA-BUF fds. Detailed documentation about the interface > + * is present in Documentation/filesystems/proc.rst. > + * > + * Unfortunately, the existing procfs interfaces can only provide information > + * about the DMA-BUFs for which processes hold fds or have the buffers mmapped > + * into their address space. This necessitated the creation of the DMA-BUF sysfs > + * statistics interface to provide per-buffer information on production systems. > + * > + * The interface at ``/sys/kernel/dma-buf/buffers`` exposes information about > + * every DMA-BUF when ``CONFIG_DMABUF_SYSFS_STATS`` is enabled. > + * > + * The following stats are exposed by the interface: > + * > + * * ``/sys/kernel/dmabuf/buffers//exporter_name`` > + * * ``/sys/kernel/dmabuf/buffers//size`` > + * * ``/sys/kernel/dmabuf/buffers//attachments//device`` > + * * ``/sys/kernel/dmabuf/buffers//attachments//map_counter`` > + * > + * The information in the interface can also be used to derive per-exporter and > + * per-device usage statistics. The data from the interface can be gathered > + * on error conditions or other important events to provide a snapshot of > + * DMA-BUF usage. It can also be collected periodically by telemetry to monitor > + * various metrics. > + * > + * Detailed documentation about the interface is present in > + * Documentation/ABI/testing/sysfs-kernel-dmabuf-buffers. > + */ > + > +struct dma_buf_stats_attribute { > + struct attribute attr; > + ssize_t (*show)(struct dma_buf *dmabuf, > + struct dma_buf_stats_attribute *attr, char *buf); > +}; > +#define to_dma_buf_stats_attr(x) container_of(x, struct dma_buf_stats_attribute, attr) > + > +static ssize_t dma_buf_stats_attribute_show(struct kobject *kobj, > + struct attribute *attr, > + char *buf) > +{ > + struct dma_buf_stats_attribute *attribute; > + struct dma_buf_sysfs_entry *sysfs_entry; > + struct dma_buf *dmabuf; > + > + attribute = to_dma_buf_stats_attr(attr); > + sysfs_entry = to_dma_buf_entry_from_kobj(kobj); > + dmabuf = sysfs_entry->dmabuf; > + > + if (!dmabuf || !attribute->show) > + return -EIO; > + > + return attribute->show(dmabuf, attribute, buf); > +} > + > +static const struct sysfs_ops dma_buf_stats_sysfs_ops = { > + .show = dma_buf_stats_attribute_show, > +}; > + > +static ssize_t exporter_name_show(struct dma_buf *dmabuf, > + struct dma_buf_stats_attribute *attr, > + char *buf) > +{ > + return sysfs_emit(buf, "%s\n", dmabuf->exp_name); > +} > + > +static ssize_t size_show(struct dma_buf *dmabuf, > + struct dma_buf_stats_attribute *attr, > + char *buf) > +{ > + return sysfs_emit(buf, "%zu\n", dmabuf->size); > +} > + > +static struct dma_buf_stats_attribute exporter_name_attribute = > + __ATTR_RO(exporter_name); > +static struct dma_buf_stats_attribute size_attribute = __ATTR_RO(size); > + > +static struct attribute *dma_buf_stats_default_attrs[] = { > + &exporter_name_attribute.attr, > + &size_attribute.attr, > + NULL, > +}; > +ATTRIBUTE_GROUPS(dma_buf_stats_default); > + > +static void dma_buf_sysfs_release(struct kobject *kobj) > +{ > + struct dma_buf_sysfs_entry *sysfs_entry; > + > + sysfs_entry = to_dma_buf_entry_from_kobj(kobj); > + kfree(sysfs_entry); > +} > + > +static struct kobj_type dma_buf_ktype = { > + .sysfs_ops = &dma_buf_stats_sysfs_ops, > + .release = dma_buf_sysfs_release, > + .default_groups = dma_buf_stats_default_groups, > +}; > + > +#define to_dma_buf_attach_entry_from_kobj(x) container_of(x, struct dma_buf_attach_sysfs_entry, kobj) > + > +struct dma_buf_attach_stats_attribute { > + struct attribute attr; > + ssize_t (*show)(struct dma_buf_attach_sysfs_entry *sysfs_entry, > + struct dma_buf_attach_stats_attribute *attr, char *buf); > +}; > +#define to_dma_buf_attach_stats_attr(x) container_of(x, struct dma_buf_attach_stats_attribute, attr) > + > +static ssize_t dma_buf_attach_stats_attribute_show(struct kobject *kobj, > + struct attribute *attr, > + char *buf) > +{ > + struct dma_buf_attach_stats_attribute *attribute; > + struct dma_buf_attach_sysfs_entry *sysfs_entry; > + > + attribute = to_dma_buf_attach_stats_attr(attr); > + sysfs_entry = to_dma_buf_attach_entry_from_kobj(kobj); > + > + if (!attribute->show) > + return -EIO; > + > + return attribute->show(sysfs_entry, attribute, buf); > +} > + > +static const struct sysfs_ops dma_buf_attach_stats_sysfs_ops = { > + .show = dma_buf_attach_stats_attribute_show, > +}; > + > +static ssize_t map_counter_show(struct dma_buf_attach_sysfs_entry *sysfs_entry, > + struct dma_buf_attach_stats_attribute *attr, > + char *buf) > +{ > + return sysfs_emit(buf, "%u\n", sysfs_entry->map_counter); > +} > + > +static struct dma_buf_attach_stats_attribute map_counter_attribute = > + __ATTR_RO(map_counter); > + > +static struct attribute *dma_buf_attach_stats_default_attrs[] = { > + &map_counter_attribute.attr, > + NULL, > +}; > +ATTRIBUTE_GROUPS(dma_buf_attach_stats_default); > + > +static void dma_buf_attach_sysfs_release(struct kobject *kobj) > +{ > + struct dma_buf_attach_sysfs_entry *sysfs_entry; > + > + sysfs_entry = to_dma_buf_attach_entry_from_kobj(kobj); > + kfree(sysfs_entry); > +} > + > +static struct kobj_type dma_buf_attach_ktype = { > + .sysfs_ops = &dma_buf_attach_stats_sysfs_ops, > + .release = dma_buf_attach_sysfs_release, > + .default_groups = dma_buf_attach_stats_default_groups, > +}; > + > +void dma_buf_attach_stats_teardown(struct dma_buf_attachment *attach) > +{ > + struct dma_buf_attach_sysfs_entry *sysfs_entry; > + > + sysfs_entry = attach->sysfs_entry; > + if (!sysfs_entry) > + return; > + > + sysfs_delete_link(&sysfs_entry->kobj, &attach->dev->kobj, "device"); > + > + kobject_del(&sysfs_entry->kobj); > + kobject_put(&sysfs_entry->kobj); > +} > + > +int dma_buf_attach_stats_setup(struct dma_buf_attachment *attach, > + unsigned int uid) > +{ > + struct dma_buf_attach_sysfs_entry *sysfs_entry; > + int ret; > + struct dma_buf *dmabuf; > + > + if (!attach) > + return -EINVAL; > + > + dmabuf = attach->dmabuf; > + > + sysfs_entry = kzalloc(sizeof(struct dma_buf_attach_sysfs_entry), > + GFP_KERNEL); > + if (!sysfs_entry) > + return -ENOMEM; > + > + sysfs_entry->kobj.kset = dmabuf->sysfs_entry->attach_stats_kset; > + > + attach->sysfs_entry = sysfs_entry; > + > + ret = kobject_init_and_add(&sysfs_entry->kobj, &dma_buf_attach_ktype, > + NULL, "%u", uid); > + if (ret) > + goto kobj_err; > + > + ret = sysfs_create_link(&sysfs_entry->kobj, &attach->dev->kobj, > + "device"); > + if (ret) > + goto link_err; > + > + return 0; > + > +link_err: > + kobject_del(&sysfs_entry->kobj); > +kobj_err: > + kobject_put(&sysfs_entry->kobj); > + attach->sysfs_entry = NULL; > + > + return ret; > +} > +void dma_buf_stats_teardown(struct dma_buf *dmabuf) > +{ > + struct dma_buf_sysfs_entry *sysfs_entry; > + > + sysfs_entry = dmabuf->sysfs_entry; > + if (!sysfs_entry) > + return; > + > + kset_unregister(sysfs_entry->attach_stats_kset); > + kobject_del(&sysfs_entry->kobj); > + kobject_put(&sysfs_entry->kobj); > +} > + > + > +/* Statistics files do not need to send uevents. */ > +static int dmabuf_sysfs_uevent_filter(struct kset *kset, struct kobject *kobj) > +{ > + return 0; > +} > + > +static const struct kset_uevent_ops dmabuf_sysfs_no_uevent_ops = { > + .filter = dmabuf_sysfs_uevent_filter, > +}; > + > +static struct kset *dma_buf_stats_kset; > +static struct kset *dma_buf_per_buffer_stats_kset; > +int dma_buf_init_sysfs_statistics(void) > +{ > + dma_buf_stats_kset = kset_create_and_add("dmabuf", > + &dmabuf_sysfs_no_uevent_ops, > + kernel_kobj); > + if (!dma_buf_stats_kset) > + return -ENOMEM; > + > + dma_buf_per_buffer_stats_kset = kset_create_and_add("buffers", > + &dmabuf_sysfs_no_uevent_ops, > + &dma_buf_stats_kset->kobj); > + if (!dma_buf_per_buffer_stats_kset) { > + kset_unregister(dma_buf_stats_kset); > + return -ENOMEM; > + } > + > + return 0; > +} > + > +void dma_buf_uninit_sysfs_statistics(void) > +{ > + kset_unregister(dma_buf_per_buffer_stats_kset); > + kset_unregister(dma_buf_stats_kset); > +} > + > +int dma_buf_stats_setup(struct dma_buf *dmabuf) > +{ > + struct dma_buf_sysfs_entry *sysfs_entry; > + int ret; > + struct kset *attach_stats_kset; > + > + if (!dmabuf || !dmabuf->file) > + return -EINVAL; > + > + if (!dmabuf->exp_name) { > + pr_err("exporter name must not be empty if stats needed\n"); > + return -EINVAL; > + } > + > + sysfs_entry = kzalloc(sizeof(struct dma_buf_sysfs_entry), GFP_KERNEL); > + if (!sysfs_entry) > + return -ENOMEM; > + > + sysfs_entry->kobj.kset = dma_buf_per_buffer_stats_kset; > + sysfs_entry->dmabuf = dmabuf; > + > + dmabuf->sysfs_entry = sysfs_entry; > + > + /* create the directory for buffer stats */ > + ret = kobject_init_and_add(&sysfs_entry->kobj, &dma_buf_ktype, NULL, > + "%lu", file_inode(dmabuf->file)->i_ino); > + if (ret) > + goto err_sysfs_dmabuf; > + > + /* create the directory for attachment stats */ > + attach_stats_kset = kset_create_and_add("attachments", > + &dmabuf_sysfs_no_uevent_ops, > + &sysfs_entry->kobj); > + if (!attach_stats_kset) { > + ret = -ENOMEM; > + goto err_sysfs_attach; > + } > + > + sysfs_entry->attach_stats_kset = attach_stats_kset; > + > + return 0; > + > +err_sysfs_attach: > + kobject_del(&sysfs_entry->kobj); > +err_sysfs_dmabuf: > + kobject_put(&sysfs_entry->kobj); > + dmabuf->sysfs_entry = NULL; > + return ret; > +} > diff --git a/drivers/dma-buf/dma-buf-sysfs-stats.h b/drivers/dma-buf/dma-buf-sysfs-stats.h > new file mode 100644 > index 000000000000..5f4703249117 > --- /dev/null > +++ b/drivers/dma-buf/dma-buf-sysfs-stats.h > @@ -0,0 +1,62 @@ > +/* SPDX-License-Identifier: GPL-2.0-only */ > +/* > + * DMA-BUF sysfs statistics. > + * > + * Copyright (C) 2021 Google LLC. > + */ > + > +#ifndef _DMA_BUF_SYSFS_STATS_H > +#define _DMA_BUF_SYSFS_STATS_H > + > +#ifdef CONFIG_DMABUF_SYSFS_STATS > + > +int dma_buf_init_sysfs_statistics(void); > +void dma_buf_uninit_sysfs_statistics(void); > + > +int dma_buf_stats_setup(struct dma_buf *dmabuf); > +int dma_buf_attach_stats_setup(struct dma_buf_attachment *attach, > + unsigned int uid); > +static inline void dma_buf_update_attachment_map_count(struct dma_buf_attachment *attach, > + int delta) > +{ > + struct dma_buf_attach_sysfs_entry *entry = attach->sysfs_entry; > + > + entry->map_counter += delta; > +} > +void dma_buf_stats_teardown(struct dma_buf *dmabuf); > +void dma_buf_attach_stats_teardown(struct dma_buf_attachment *attach); > +static inline unsigned int dma_buf_update_attach_uid(struct dma_buf *dmabuf) > +{ > + struct dma_buf_sysfs_entry *entry = dmabuf->sysfs_entry; > + > + return entry->attachment_uid++; > +} > +#else > + > +static inline int dma_buf_init_sysfs_statistics(void) > +{ > + return 0; > +} > + > +static inline void dma_buf_uninit_sysfs_statistics(void) {} > + > +static inline int dma_buf_stats_setup(struct dma_buf *dmabuf) > +{ > + return 0; > +} > +static inline int dma_buf_attach_stats_setup(struct dma_buf_attachment *attach, > + unsigned int uid) > +{ > + return 0; > +} > + > +static inline void dma_buf_stats_teardown(struct dma_buf *dmabuf) {} > +static inline void dma_buf_attach_stats_teardown(struct dma_buf_attachment *attach) {} > +static inline void dma_buf_update_attachment_map_count(struct dma_buf_attachment *attach, > + int delta) {} > +static inline unsigned int dma_buf_update_attach_uid(struct dma_buf *dmabuf) > +{ > + return 0; > +} > +#endif > +#endif // _DMA_BUF_SYSFS_STATS_H > diff --git a/drivers/dma-buf/dma-buf.c b/drivers/dma-buf/dma-buf.c > index f264b70c383e..184dd7acb1ed 100644 > --- a/drivers/dma-buf/dma-buf.c > +++ b/drivers/dma-buf/dma-buf.c > @@ -29,6 +29,8 @@ > #include > #include > > +#include "dma-buf-sysfs-stats.h" > + > static inline int is_dma_buf_file(struct file *); > > struct dma_buf_list { > @@ -79,6 +81,7 @@ static void dma_buf_release(struct dentry *dentry) > if (dmabuf->resv == (struct dma_resv *)&dmabuf[1]) > dma_resv_fini(dmabuf->resv); > > + dma_buf_stats_teardown(dmabuf); > module_put(dmabuf->owner); > kfree(dmabuf->name); > kfree(dmabuf); > @@ -580,6 +583,10 @@ struct dma_buf *dma_buf_export(const struct dma_buf_export_info *exp_info) > file->f_mode |= FMODE_LSEEK; > dmabuf->file = file; > > + ret = dma_buf_stats_setup(dmabuf); > + if (ret) > + goto err_sysfs; > + > mutex_init(&dmabuf->lock); > INIT_LIST_HEAD(&dmabuf->attachments); > > @@ -589,6 +596,14 @@ struct dma_buf *dma_buf_export(const struct dma_buf_export_info *exp_info) > > return dmabuf; > > +err_sysfs: > + /* > + * Set file->f_path.dentry->d_fsdata to NULL so that when > + * dma_buf_release() gets invoked by dentry_ops, it exits > + * early before calling the release() dma_buf op. > + */ > + file->f_path.dentry->d_fsdata = NULL; > + fput(file); > err_dmabuf: > kfree(dmabuf); > err_module: > @@ -723,6 +738,7 @@ dma_buf_dynamic_attach(struct dma_buf *dmabuf, struct device *dev, > { > struct dma_buf_attachment *attach; > int ret; > + unsigned int attach_uid; > > if (WARN_ON(!dmabuf || !dev)) > return ERR_PTR(-EINVAL); > @@ -748,8 +764,13 @@ dma_buf_dynamic_attach(struct dma_buf *dmabuf, struct device *dev, > } > dma_resv_lock(dmabuf->resv, NULL); > list_add(&attach->node, &dmabuf->attachments); > + attach_uid = dma_buf_update_attach_uid(dmabuf); > dma_resv_unlock(dmabuf->resv); > > + ret = dma_buf_attach_stats_setup(attach, attach_uid); > + if (ret) > + goto err_sysfs; > + > /* When either the importer or the exporter can't handle dynamic > * mappings we cache the mapping here to avoid issues with the > * reservation object lock. > @@ -776,6 +797,7 @@ dma_buf_dynamic_attach(struct dma_buf *dmabuf, struct device *dev, > dma_resv_unlock(attach->dmabuf->resv); > attach->sgt = sgt; > attach->dir = DMA_BIDIRECTIONAL; > + dma_buf_update_attachment_map_count(attach, 1 /* delta */); > } > > return attach; > @@ -792,6 +814,7 @@ dma_buf_dynamic_attach(struct dma_buf *dmabuf, struct device *dev, > if (dma_buf_is_dynamic(attach->dmabuf)) > dma_resv_unlock(attach->dmabuf->resv); > > +err_sysfs: > dma_buf_detach(dmabuf, attach); > return ERR_PTR(ret); > } > @@ -841,6 +864,7 @@ void dma_buf_detach(struct dma_buf *dmabuf, struct dma_buf_attachment *attach) > dma_resv_lock(attach->dmabuf->resv, NULL); > > __unmap_dma_buf(attach, attach->sgt, attach->dir); > + dma_buf_update_attachment_map_count(attach, -1 /* delta */); > > if (dma_buf_is_dynamic(attach->dmabuf)) { > dma_buf_unpin(attach); > @@ -854,6 +878,7 @@ void dma_buf_detach(struct dma_buf *dmabuf, struct dma_buf_attachment *attach) > if (dmabuf->ops->detach) > dmabuf->ops->detach(dmabuf, attach); > > + dma_buf_attach_stats_teardown(attach); > kfree(attach); > } > EXPORT_SYMBOL_GPL(dma_buf_detach); > @@ -993,6 +1018,9 @@ struct sg_table *dma_buf_map_attachment(struct dma_buf_attachment *attach, > } > #endif /* CONFIG_DMA_API_DEBUG */ > > + if (!IS_ERR(sg_table)) > + dma_buf_update_attachment_map_count(attach, 1 /* delta */); > + > return sg_table; > } > EXPORT_SYMBOL_GPL(dma_buf_map_attachment); > @@ -1030,6 +1058,8 @@ void dma_buf_unmap_attachment(struct dma_buf_attachment *attach, > if (dma_buf_is_dynamic(attach->dmabuf) && > !IS_ENABLED(CONFIG_DMABUF_MOVE_NOTIFY)) > dma_buf_unpin(attach); > + > + dma_buf_update_attachment_map_count(attach, -1 /* delta */); > } > EXPORT_SYMBOL_GPL(dma_buf_unmap_attachment); > > @@ -1480,6 +1510,12 @@ static inline void dma_buf_uninit_debugfs(void) > > static int __init dma_buf_init(void) > { > + int ret; > + > + ret = dma_buf_init_sysfs_statistics(); > + if (ret) > + return ret; > + > dma_buf_mnt = kern_mount(&dma_buf_fs_type); > if (IS_ERR(dma_buf_mnt)) > return PTR_ERR(dma_buf_mnt); > @@ -1495,5 +1531,6 @@ static void __exit dma_buf_deinit(void) > { > dma_buf_uninit_debugfs(); > kern_unmount(dma_buf_mnt); > + dma_buf_uninit_sysfs_statistics(); > } > __exitcall(dma_buf_deinit); > diff --git a/include/linux/dma-buf.h b/include/linux/dma-buf.h > index efdc56b9d95f..342585bd6dff 100644 > --- a/include/linux/dma-buf.h > +++ b/include/linux/dma-buf.h > @@ -295,6 +295,9 @@ struct dma_buf_ops { > * @poll: for userspace poll support > * @cb_excl: for userspace poll support > * @cb_shared: for userspace poll support > + * @sysfs_entry: for exposing information about this buffer in sysfs. > + * The attachment_uid member of @sysfs_entry is protected by dma_resv lock > + * and is incremented on each attach. > * > * This represents a shared buffer, created by calling dma_buf_export(). The > * userspace representation is a normal file descriptor, which can be created by > @@ -330,6 +333,15 @@ struct dma_buf { > > __poll_t active; > } cb_excl, cb_shared; > +#ifdef CONFIG_DMABUF_SYSFS_STATS > + /* for sysfs stats */ > + struct dma_buf_sysfs_entry { > + struct kobject kobj; > + struct dma_buf *dmabuf; > + unsigned int attachment_uid; > + struct kset *attach_stats_kset; > + } *sysfs_entry; > +#endif > }; > > /** > @@ -379,6 +391,7 @@ struct dma_buf_attach_ops { > * @importer_ops: importer operations for this attachment, if provided > * dma_buf_map/unmap_attachment() must be called with the dma_resv lock held. > * @importer_priv: importer specific attachment data. > + * @sysfs_entry: For exposing information about this attachment in sysfs. > * > * This structure holds the attachment information between the dma_buf buffer > * and its user device(s). The list contains one attachment struct per device > @@ -399,6 +412,13 @@ struct dma_buf_attachment { > const struct dma_buf_attach_ops *importer_ops; > void *importer_priv; > void *priv; > +#ifdef CONFIG_DMABUF_SYSFS_STATS > + /* for sysfs stats */ > + struct dma_buf_attach_sysfs_entry { > + struct kobject kobj; > + unsigned int map_counter; > + } *sysfs_entry; > +#endif > }; > > /** > -- > 2.32.0.rc1.229.g3e70b5a671-goog > -- Daniel Vetter Software Engineer, Intel Corporation http://blog.ffwll.ch