Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp2933503pxb; Fri, 8 Oct 2021 19:48:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxtNEDx0LHMsVpr0k+wlHM/2hA+CqoIofLVpCnZTk+a2Rq3Awr1zzqOnjXpg7RSviIYhzAB X-Received: by 2002:a05:6402:3128:: with SMTP id dd8mr19795690edb.383.1633747721136; Fri, 08 Oct 2021 19:48:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633747721; cv=none; d=google.com; s=arc-20160816; b=IBRzAkElTNutv3ffGbJZDOpNAf6PGOAc7F0G5HLxiXjvEank+KSCeYYHbVd+fnEWzg 2NUWoP4lo6sXUAAHZFnKjcCnQUhnzCB5FRhx9pZiRpC94cegoL+Ujy3n8m7XhdkVCjN5 2cQX08xjrNHkHfCL/vx2VJ0f1bWFbtgqasfaIg5suIx1Jhkg/Z9pFse/venja2sPeCYj SeQNGSiZB/Wm5/wmO8d886/FRNpCQpuhKwKSIFyd8Bb6qhN+Uec3l4CfhZiJXNM7B/Uv ioBnOO8LgtAjWr9S7ad4f28DNN2gGgBEnWo//qsb9+Ingh9kOi//7hqaCULnPoEqnWt8 ACtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=qgyjafVq7/xjk2yVDJVT7EQ9+jJ8IiwHQ4baWI6x+BI=; b=QmmFIjNcRtRVWJQghd2hKpNhncVCU1PdZycHP9FKW7attqCckBXs14qItrcln1ul8B 0HlAuoIy+mrQNBBybb8W6u0DBq5+eWkWVXnaN+NfZyoAoHmHAJjp9fg6UNgG2QBjDvTD rIgmGd0k3SUwOwhtsUOx6m4NERVe3Av6OjAVZty88XRvKKBLBvTUYILaqrzHvmG5Udo9 zUaElnou311k7J8XMwOwakXYuBQMhgVAIowuIZg/4etrbMzV0+r/wX9o+Xh1NLrDsFG4 EDXp4ndkiIC3iaEPyp1fcIPYkwoyRhgwFCvx1wjdtSQ3N4MjPriNMFlYmMJrdjXFa7/H PtAg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id do4si2655175ejc.579.2021.10.08.19.48.15; Fri, 08 Oct 2021 19:48:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244041AbhJICru (ORCPT + 99 others); Fri, 8 Oct 2021 22:47:50 -0400 Received: from mailgw02.mediatek.com ([210.61.82.184]:43202 "EHLO mailgw02.mediatek.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S232267AbhJICrt (ORCPT ); Fri, 8 Oct 2021 22:47:49 -0400 X-UUID: 3c2e614b433e45a4bfdc23e2206201e8-20211009 X-UUID: 3c2e614b433e45a4bfdc23e2206201e8-20211009 Received: from mtkcas06.mediatek.inc [(172.21.101.30)] by mailgw02.mediatek.com (envelope-from ) (Generic MTA with TLSv1.2 ECDHE-RSA-AES256-SHA384 256/256) with ESMTP id 1214547654; Sat, 09 Oct 2021 10:45:49 +0800 Received: from mtkcas10.mediatek.inc (172.21.101.39) by mtkmbs10n2.mediatek.inc (172.21.101.183) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Sat, 9 Oct 2021 10:45:47 +0800 Received: from mszswglt01.gcn.mediatek.inc (10.16.20.20) by mtkcas10.mediatek.inc (172.21.101.73) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Sat, 9 Oct 2021 10:45:47 +0800 From: To: Sumit Semwal , =?UTF-8?q?Christian=20K=C3=B6nig?= , Matthias Brugger , "open list:DMA BUFFER SHARING FRAMEWORK" , "open list:DMA BUFFER SHARING FRAMEWORK" , "moderated list:DMA BUFFER SHARING FRAMEWORK" , open list , "moderated list:ARM/Mediatek SoC support" , "moderated list:ARM/Mediatek SoC support" CC: , Guangming Cao Subject: [PATCH] dma-buf: remove restriction of IOCTL:DMA_BUF_SET_NAME Date: Sat, 9 Oct 2021 10:47:33 +0800 Message-ID: <20211009024733.65676-1-guangming.cao@mediatek.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain X-MTK: N Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Guangming Cao If dma-buf don't want userspace users to touch the dmabuf buffer, it seems we should add this restriction into dma_buf_ops.mmap, not in this IOCTL:DMA_BUF_SET_NAME. With this restriction, we can only know the kernel users of the dmabuf by attachments. However, for many userspace users, such as userpsace users of dma_heap, they also need to mark the usage of dma-buf, and they don't care about who attached to this dmabuf, and seems it's no meaning to waitting for IOCTL:DMA_BUF_SET_NAME rather than mmap. Signed-off-by: Guangming Cao --- drivers/dma-buf/dma-buf.c | 14 ++------------ 1 file changed, 2 insertions(+), 12 deletions(-) diff --git a/drivers/dma-buf/dma-buf.c b/drivers/dma-buf/dma-buf.c index 511fe0d217a0..afbd0a226639 100644 --- a/drivers/dma-buf/dma-buf.c +++ b/drivers/dma-buf/dma-buf.c @@ -325,10 +325,8 @@ static __poll_t dma_buf_poll(struct file *file, poll_table *poll) /** * dma_buf_set_name - Set a name to a specific dma_buf to track the usage. - * The name of the dma-buf buffer can only be set when the dma-buf is not - * attached to any devices. It could theoritically support changing the - * name of the dma-buf if the same piece of memory is used for multiple - * purpose between different devices. + * It could theoritically support changing the name of the dma-buf if the same + * piece of memory is used for multiple purpose between different devices. * * @dmabuf: [in] dmabuf buffer that will be renamed. * @buf: [in] A piece of userspace memory that contains the name of @@ -346,19 +344,11 @@ static long dma_buf_set_name(struct dma_buf *dmabuf, const char __user *buf) if (IS_ERR(name)) return PTR_ERR(name); - dma_resv_lock(dmabuf->resv, NULL); - if (!list_empty(&dmabuf->attachments)) { - ret = -EBUSY; - kfree(name); - goto out_unlock; - } spin_lock(&dmabuf->name_lock); kfree(dmabuf->name); dmabuf->name = name; spin_unlock(&dmabuf->name_lock); -out_unlock: - dma_resv_unlock(dmabuf->resv); return ret; } -- 2.17.1