Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp3716573rwd; Mon, 29 May 2023 15:50:02 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7Q3QkhaSSFvu/M4vuk6per80Mege/1JhyqsR1Q7CwYjSm9pPeiORdY9bIQOodKzcp9XATM X-Received: by 2002:a05:6a00:c82:b0:649:dd0d:69d1 with SMTP id a2-20020a056a000c8200b00649dd0d69d1mr76479pfv.31.1685400602010; Mon, 29 May 2023 15:50:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685400601; cv=none; d=google.com; s=arc-20160816; b=br2s0RldV6+B2gKKOKMKtGTOE0Gh0A2Yz2iH+heIjes1i1EJF8TTktt4jOMVGdTRU1 nLI/hXh4VITRSvyJ2eFj76AQTCAJM8kuhG5HBWg+4CtePyMAdpgmwE0FmvQ4RVRPvx5K orjsPGxbm+LijcH8GZWWk7KC51WEKfxSQ6o2y5FsmDoNkXK961JD6IoQQ4tb5c/vMfFH tz+Sc1b3dDR1/E8WUjRyStlhb4waKy1vXIs6+73eXwMrAjI/1lG58cUA3uH/x1UYa6H5 ewRqSZyT14Cu8NKtQXvW2dlpOLfBeCeoSUYvtvu0EALML0YS/i1HcCxYAftGXKQMcdox hD0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=r2rcqx32rcCKT+JqcKhka6Xjht9IvnH+VLBYB3QTlkw=; b=plhZQ1iijjeGfL4ybYIceyFMViz2LiHZgiXb4sZLYYX+laTpV4JmBKdfXtfPa0hHRp nI9aiuAYFjE7M78qhQKjwASQeaRlmoV4OVBz+VZpWohxDMK3GAUUYrUHH/XgUMDamtFo 1/YundPvAoLJnUe3B6qjQYy5TRcyUFkaFGMvT6hP3uz5IH5QcCf5rs0os5aW3zIYb8fL GauFbOp4h1Wawo+iUJOO/5UelrZbIhAyuw5UD1upsm0eiqRLo/NGifHtRz67BVNpUnfi ihmiJvQ4umnw9b1bRMafqZfWWQr222qc9Qro4Oxvm2L97WEKNbMeZyO9nrA7VekCIKzP AIag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=lH3K1m+5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=collabora.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q29-20020aa7983d000000b00645e57d8cccsi590482pfl.89.2023.05.29.15.49.50; Mon, 29 May 2023 15:50:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=lH3K1m+5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230062AbjE2WqZ (ORCPT + 99 others); Mon, 29 May 2023 18:46:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56884 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230025AbjE2WqS (ORCPT ); Mon, 29 May 2023 18:46:18 -0400 Received: from madras.collabora.co.uk (madras.collabora.co.uk [IPv6:2a00:1098:0:82:1000:25:2eeb:e5ab]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C2306FC; Mon, 29 May 2023 15:46:12 -0700 (PDT) Received: from workpc.. (109-252-150-34.dynamic.spd-mgts.ru [109.252.150.34]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: dmitry.osipenko) by madras.collabora.co.uk (Postfix) with ESMTPSA id E4A5E6606E67; Mon, 29 May 2023 23:46:09 +0100 (BST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=collabora.com; s=mail; t=1685400371; bh=symvHYPP/EMcGbkf4YtrMJjT6I7acjd3Gvzu8SfXfzs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lH3K1m+5HAc0zqBSBmiQ9LvuPH+hRjN0VZtaVSvwa6lcWylbWb4hQGdei9wOR6oUN ol9rNz/HGCwSAL57SqDEFtMSOb59p1PIs/zwhsIKGHCiij96jlL0Wn7eLs22ZeLNHt BLqROhtsEhijuUWsjhvM91VO3wBFCqY+cjDkZOjt+gLEGKRpRyKav0CvxviuT9xxsa ahtPNoFkU4ehrp2o4UT4060EIrZYaSx3+2KSWCdPaV8bZ52tHaLGfOBs0qhbHKKLSS EBx6YONtPSRmWrevqtJHZV2RopzhdBWsMlHcBeYrxLXjGmLR0wgs9RlsnZgfU3T8zz /d0u2LGIjJn4w== From: Dmitry Osipenko To: Sumit Semwal , =?UTF-8?q?Christian=20K=C3=B6nig?= , Benjamin Gaignard , Brian Starkey , John Stultz , Gerd Hoffmann , Daniel Vetter , Jani Nikula , Arnd Bergmann , Thomas Zimmermann , Tomi Valkeinen , Thierry Reding , Tomasz Figa , Marek Szyprowski , Mauro Carvalho Chehab , Emil Velikov Cc: linux-media@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org, intel-gfx@lists.freedesktop.org, linux-tegra@vger.kernel.org, kernel@collabora.com Subject: [PATCH v4 2/6] dma-buf/heaps: Don't assert held reservation lock for dma-buf mmapping Date: Tue, 30 May 2023 01:39:31 +0300 Message-Id: <20230529223935.2672495-3-dmitry.osipenko@collabora.com> X-Mailer: git-send-email 2.40.1 In-Reply-To: <20230529223935.2672495-1-dmitry.osipenko@collabora.com> References: <20230529223935.2672495-1-dmitry.osipenko@collabora.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Don't assert held dma-buf reservation lock on memory mapping of exported buffer. We're going to change dma-buf mmap() locking policy such that exporters will have to handle the lock. The previous locking policy caused deadlock problem for DRM drivers in a case of self-imported dma-bufs once these drivers are moved to use reservation lock universally. The problem solved by moving the lock down to exporters. This patch prepares dma-buf heaps for the locking policy update. Reviewed-by: Emil Velikov Signed-off-by: Dmitry Osipenko --- drivers/dma-buf/heaps/cma_heap.c | 3 --- drivers/dma-buf/heaps/system_heap.c | 3 --- 2 files changed, 6 deletions(-) diff --git a/drivers/dma-buf/heaps/cma_heap.c b/drivers/dma-buf/heaps/cma_heap.c index 1131fb943992..28fb04eccdd0 100644 --- a/drivers/dma-buf/heaps/cma_heap.c +++ b/drivers/dma-buf/heaps/cma_heap.c @@ -13,7 +13,6 @@ #include #include #include -#include #include #include #include @@ -183,8 +182,6 @@ static int cma_heap_mmap(struct dma_buf *dmabuf, struct vm_area_struct *vma) { struct cma_heap_buffer *buffer = dmabuf->priv; - dma_resv_assert_held(dmabuf->resv); - if ((vma->vm_flags & (VM_SHARED | VM_MAYSHARE)) == 0) return -EINVAL; diff --git a/drivers/dma-buf/heaps/system_heap.c b/drivers/dma-buf/heaps/system_heap.c index e8bd10e60998..fcf836ba9c1f 100644 --- a/drivers/dma-buf/heaps/system_heap.c +++ b/drivers/dma-buf/heaps/system_heap.c @@ -13,7 +13,6 @@ #include #include #include -#include #include #include #include @@ -202,8 +201,6 @@ static int system_heap_mmap(struct dma_buf *dmabuf, struct vm_area_struct *vma) struct sg_page_iter piter; int ret; - dma_resv_assert_held(dmabuf->resv); - for_each_sgtable_page(table, &piter, vma->vm_pgoff) { struct page *page = sg_page_iter_page(&piter); -- 2.40.1