Received: by 2002:a05:6358:e9c4:b0:b2:91dc:71ab with SMTP id hc4csp3922804rwb; Sun, 7 Aug 2022 10:14:46 -0700 (PDT) X-Google-Smtp-Source: AA6agR6R//tUkeNmuupMzTAQ9Pt7YOHmeU8DWzTL7XdlAD5jQ+hFkwFbwfY+1EV14ZmW/fohV8Nh X-Received: by 2002:a17:907:7243:b0:730:b954:6306 with SMTP id ds3-20020a170907724300b00730b9546306mr11713247ejc.117.1659892485972; Sun, 07 Aug 2022 10:14:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1659892485; cv=none; d=google.com; s=arc-20160816; b=f57XB/HE0stsgzzDAKqljyY5KxIPDvOZOaQwbRZqs1BqjSey8E26tMfbLzajxKkMd6 X3XQh9bM2bnMeDOh6g/utbhZomGNCPIQNXhEI15s9unw6WettpiFk31Q/ByvBSngdivz Uw4Q91LyMQzQ4OyuAGN18CsQak+yB1PTkZosdgVa2d3BLvNE4ovUwcuqbzXqQMl7KOZP 2lcrePH6cW3EhDNmm5l2SazBdl/q9zkwvlv9n2eg3kAkmAJIuNUrT/PpJ7gqezfW429H EQKabfj0UkueMUCiIh03Do+P8h19pdCdz20n1SNDrhrwasQFCgimPNeIFEm7eQShQmh0 Z8XA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=UexIQBHjABkmkv5zIZB336H90NxlDHKneuesdeJF4x0=; b=gJYUxVWN8bvw16JuvXyQu+YJXITM2baxEglYdMmOZ3DL5hLIANipETqoSl+/x6DItF hShKoZ3q+qg1PzecTMQ/3ULRhjhVfm22kLMNlSf37lJyCg7c79IY4wS9aQD5i7t9fHZw fmeLT8jNybIWu845pFf33r4C8wnWlyD6JJg0HJ4OBk9d6Vdk9woq5iwBqwZCpgczRA3D JOTilTYh+xMqYrd/csfFHkti54zfHqvPLubssk5HF37OljrjcbIq9FEGbCttQ1PMgGmS EuPBFatWEXtqlS2cDYQsW1MRS9xyuvWk+2UvpG3a135tO4Qdxj48nzWIDd4q4EeJMgaS Emyg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=E2f7YV6x; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hd9-20020a170907968900b0072b1224ebf2si7717274ejc.285.2022.08.07.10.14.17; Sun, 07 Aug 2022 10:14:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=E2f7YV6x; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234182AbiHGRCJ (ORCPT + 99 others); Sun, 7 Aug 2022 13:02:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49500 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229898AbiHGRCH (ORCPT ); Sun, 7 Aug 2022 13:02:07 -0400 Received: from mail-io1-xd2a.google.com (mail-io1-xd2a.google.com [IPv6:2607:f8b0:4864:20::d2a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C2FA063C8; Sun, 7 Aug 2022 10:02:06 -0700 (PDT) Received: by mail-io1-xd2a.google.com with SMTP id e69so5453647iof.5; Sun, 07 Aug 2022 10:02:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc; bh=UexIQBHjABkmkv5zIZB336H90NxlDHKneuesdeJF4x0=; b=E2f7YV6xbfQ44d32cpGWSLgDK9oLKPy8mKTp/8YzYv7tfEvTmEV4OfnR7sY8x7yhbD n+9TciUdHz09F/mb2GrnUz0pW82Txr612T1t/kUH5ylxHx+DZ6FSHLjn3wUxsSafasRt 5PJFwyJwpUTQ4mXVrSTrz8FqRrEGZEUxzuAiguy4bITWZNXj6Y9ruotpmPiccfD28DOp VdRlB7BqMakFg2l+fW+bs7HegSE4RGZt6P/7E+iDb+kgZ/hF0OFOZ7RVbQL3ikHWauej czMIWnEj0qu8HCh9h0Q5mqLQ/4WeZPjNb3sHXojcnHQNv61dGgTZPoAw5fPtKke3/Zv7 ioxA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc; bh=UexIQBHjABkmkv5zIZB336H90NxlDHKneuesdeJF4x0=; b=7i/VNaIA9b6MmHE8uZ4TA7KbckYzJPFF7DYlLPa2Kc0VzDX9oqlbOoOS3Uad0jxKWB VOLC8onY0yfFT5gPqCUTTv8PLbGUQK1qtyDne6uKwfzto+G/C+lJ8kZYXRIeRkUotJ+h 32haj0RzmaK86oO9oBV3ML5/fBeAJIJQhm3IhRsCqXmjVRZkNq3PN16TbgfW2Q9hahNm 2og6F4LNCNsL4yoX4MknaoLRJ3ok+uaB1xC0x9q5Hoh5GS1PQMy0w8JE60LjxJT5E5+3 ahoarKJ8wUzkwYVknhTL8C3sFmhVQHFPN/KwwBIn0TpiI6mAIQN6sC8XUlbGLm8T1PD1 33eQ== X-Gm-Message-State: ACgBeo3addwicCL39xeuSZd8ydFpvm2yD3Up+uAVdOTxVlUKtSibkf/U qM9y1In1kHSp7S99Y9YzK+ld5Xk1L6Vh9P8DJic= X-Received: by 2002:a05:6638:25d6:b0:342:916c:d59a with SMTP id u22-20020a05663825d600b00342916cd59amr6676935jat.51.1659891726060; Sun, 07 Aug 2022 10:02:06 -0700 (PDT) MIME-Version: 1.0 References: <20220729170744.1301044-1-robdclark@gmail.com> <20220729170744.1301044-2-robdclark@gmail.com> <3d2083aa-fc6c-6875-3daf-e5abe45fb762@gmail.com> In-Reply-To: <3d2083aa-fc6c-6875-3daf-e5abe45fb762@gmail.com> From: Rob Clark Date: Sun, 7 Aug 2022 10:02:32 -0700 Message-ID: Subject: Re: [Linaro-mm-sig] [PATCH 1/3] dma-buf: Add ioctl to query mmap info To: =?UTF-8?Q?Christian_K=C3=B6nig?= Cc: dri-devel@lists.freedesktop.org, Daniel Vetter , freedreno@lists.freedesktop.org, Rob Clark , Sumit Semwal , =?UTF-8?Q?Christian_K=C3=B6nig?= , =?UTF-8?B?SsOpcsO0bWUgUG91aWxsZXI=?= , "open list:DMA BUFFER SHARING FRAMEWORK" , "moderated list:DMA BUFFER SHARING FRAMEWORK" , open list Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Aug 7, 2022 at 9:09 AM Christian K=C3=B6nig wrote: > > Am 29.07.22 um 19:07 schrieb Rob Clark: > > From: Rob Clark > > > > This is a fairly narrowly focused interface, providing a way for a VMM > > in userspace to tell the guest kernel what pgprot settings to use when > > mapping a buffer to guest userspace. > > > > For buffers that get mapped into guest userspace, virglrenderer returns > > a dma-buf fd to the VMM (crosvm or qemu). > > Wow, wait a second. Who is giving whom the DMA-buf fd here? Not sure I understand the question.. the dma-buf fd could come from EGL_MESA_image_dma_buf_export, gbm, or similar. > My last status was that this design was illegal and couldn't be > implemented because it requires internal knowledge only the exporting > driver can have. This ioctl provides that information from the exporting driver so that a VMM doesn't have to make assumptions ;-) Currently crosvm assumes if (drivername =3D=3D "i915") then it is a cached mapping, otherwise it is wc. I'm trying to find a way to fix this. Suggestions welcome, but because of how mapping to a guest VM works, a VMM is a somewhat special case where this information is needed in userspace. BR, -R > @Daniel has anything changed on that is or my status still valid? > > Regards, > Christian. > > > In addition to mapping the > > pages into the guest VM, it needs to report to drm/virtio in the guest > > the cache settings to use for guest userspace. In particular, on some > > architectures, creating aliased mappings with different cache attribute= s > > is frowned upon, so it is important that the guest mappings have the > > same cache attributes as any potential host mappings. > > > > Signed-off-by: Rob Clark > > --- > > drivers/dma-buf/dma-buf.c | 26 ++++++++++++++++++++++++++ > > include/linux/dma-buf.h | 7 +++++++ > > include/uapi/linux/dma-buf.h | 28 ++++++++++++++++++++++++++++ > > 3 files changed, 61 insertions(+) > > > > diff --git a/drivers/dma-buf/dma-buf.c b/drivers/dma-buf/dma-buf.c > > index 32f55640890c..d02d6c2a3b49 100644 > > --- a/drivers/dma-buf/dma-buf.c > > +++ b/drivers/dma-buf/dma-buf.c > > @@ -326,6 +326,29 @@ static long dma_buf_set_name(struct dma_buf *dmabu= f, const char __user *buf) > > return 0; > > } > > > > +static long dma_buf_info(struct dma_buf *dmabuf, const void __user *ua= rg) > > +{ > > + struct dma_buf_info arg; > > + > > + if (copy_from_user(&arg, uarg, sizeof(arg))) > > + return -EFAULT; > > + > > + switch (arg.param) { > > + case DMA_BUF_INFO_VM_PROT: > > + if (!dmabuf->ops->mmap_info) > > + return -ENOSYS; > > + arg.value =3D dmabuf->ops->mmap_info(dmabuf); > > + break; > > + default: > > + return -EINVAL; > > + } > > + > > + if (copy_to_user(uarg, &arg, sizeof(arg))) > > + return -EFAULT; > > + > > + return 0; > > +} > > + > > static long dma_buf_ioctl(struct file *file, > > unsigned int cmd, unsigned long arg) > > { > > @@ -369,6 +392,9 @@ static long dma_buf_ioctl(struct file *file, > > case DMA_BUF_SET_NAME_B: > > return dma_buf_set_name(dmabuf, (const char __user *)arg)= ; > > > > + case DMA_BUF_IOCTL_INFO: > > + return dma_buf_info(dmabuf, (const void __user *)arg); > > + > > default: > > return -ENOTTY; > > } > > diff --git a/include/linux/dma-buf.h b/include/linux/dma-buf.h > > index 71731796c8c3..6f4de64a5937 100644 > > --- a/include/linux/dma-buf.h > > +++ b/include/linux/dma-buf.h > > @@ -283,6 +283,13 @@ struct dma_buf_ops { > > */ > > int (*mmap)(struct dma_buf *, struct vm_area_struct *vma); > > > > + /** > > + * @mmap_info: > > + * > > + * Return mmapping info for the buffer. See DMA_BUF_INFO_VM_PROT= . > > + */ > > + int (*mmap_info)(struct dma_buf *); > > + > > int (*vmap)(struct dma_buf *dmabuf, struct iosys_map *map); > > void (*vunmap)(struct dma_buf *dmabuf, struct iosys_map *map); > > }; > > diff --git a/include/uapi/linux/dma-buf.h b/include/uapi/linux/dma-buf.= h > > index b1523cb8ab30..a41adac0f46a 100644 > > --- a/include/uapi/linux/dma-buf.h > > +++ b/include/uapi/linux/dma-buf.h > > @@ -85,6 +85,32 @@ struct dma_buf_sync { > > > > #define DMA_BUF_NAME_LEN 32 > > > > + > > +/** > > + * struct dma_buf_info - Query info about the buffer. > > + */ > > +struct dma_buf_info { > > + > > +#define DMA_BUF_INFO_VM_PROT 1 > > +# define DMA_BUF_VM_PROT_WC 0 > > +# define DMA_BUF_VM_PROT_CACHED 1 > > + > > + /** > > + * @param: Which param to query > > + * > > + * DMA_BUF_INFO_BM_PROT: > > + * Query the access permissions of userspace mmap's of this b= uffer. > > + * Returns one of DMA_BUF_VM_PROT_x > > + */ > > + __u32 param; > > + __u32 pad; > > + > > + /** > > + * @value: Return value of the query. > > + */ > > + __u64 value; > > +}; > > + > > #define DMA_BUF_BASE 'b' > > #define DMA_BUF_IOCTL_SYNC _IOW(DMA_BUF_BASE, 0, struct dma_buf_sync= ) > > > > @@ -95,4 +121,6 @@ struct dma_buf_sync { > > #define DMA_BUF_SET_NAME_A _IOW(DMA_BUF_BASE, 1, __u32) > > #define DMA_BUF_SET_NAME_B _IOW(DMA_BUF_BASE, 1, __u64) > > > > +#define DMA_BUF_IOCTL_INFO _IOWR(DMA_BUF_BASE, 2, struct dma_buf_inf= o) > > + > > #endif >