Received: by 10.223.164.202 with SMTP id h10csp3050030wrb; Tue, 28 Nov 2017 05:33:29 -0800 (PST) X-Google-Smtp-Source: AGs4zMYrMcyen/PUUKgYRjcHcaboIDMDWas4f09ThW0dA+WyZVZzDlcLOAOnp5teTw4YP2CjbHnM X-Received: by 10.159.206.200 with SMTP id x8mr37979716plo.273.1511876009361; Tue, 28 Nov 2017 05:33:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1511876009; cv=none; d=google.com; s=arc-20160816; b=i4EcJ5hUeJ05LFhRem0cG8w/JpygjYxHTj7ecDP1qD+KNEKwIx3guMXdc+GpM7zy90 ppOHTxSYxhNBqRthLksTsT9zIyLcJO+3zrcAZP86zeGLDQmnUL0dbvv1N49F5JdyU2qO QcS5wDTXgWXQa6DR5toXYpJvhJ/RgxnjnXDOM5VOta94yvzcZBtsX9kpYzSC4EdaNgUo zQse0/VIftgklEz24YCoSO7fNqT5pyyPwPjYK3aUwzmWCInSwEykkcibLQEZafF3vDhu Zhz0MgloSHA3/lKV+3yIBrUpfn05BViY9o0XiPwpcOXzRHAp/9QM3PFJxfLsBzVwOUip aitQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=+mrFlA/wdh5NEMO4dFPWrPy0WLkdpJ9MQkHYh5qFV6g=; b=SlGDp+VlAbN3m1xbGSfuWTBKAd8pEahOGrBY1guMbkN+7y3iKPnBkAZ+0+O6Rr+SAh 3n8tmVAcvVmTlXGtY/SjOi0Q1HM8eKFdZV56o1e1aTqT/3MLmN05YjiMMx5RVkHfkFtB 8BGMQXejRisBVd/FH/gtP391C3jylLV52cMxhbmZAggQxJQsxG69hx05LOjC1+qZWpHh iL60lwLelD7Drem+KWW2HBQMfMP2oHp0HYZrw5Ro6TZ3dXsC3gFWWnzpM7eaSZ1E5mt/ ZLQbNuRWPql8d7HjFGydidKtpARrKTX4cxOySXAkR0lMsoPAKYdkiSklFP1/QGyhK2k+ /XdA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f64si27411536pfk.57.2017.11.28.05.33.17; Tue, 28 Nov 2017 05:33:29 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752878AbdK1NcP (ORCPT + 76 others); Tue, 28 Nov 2017 08:32:15 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:51664 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751716AbdK1NcN (ORCPT ); Tue, 28 Nov 2017 08:32:13 -0500 Received: from localhost (LFbn-1-12253-150.w90-92.abo.wanadoo.fr [90.92.67.150]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 95855B1E; Tue, 28 Nov 2017 13:32:12 +0000 (UTC) Date: Tue, 28 Nov 2017 14:32:17 +0100 From: Greg KH To: Benjamin Gaignard Cc: labbott@redhat.com, sumit.semwal@linaro.org, arve@android.com, riandrews@android.com, broonie@kernel.org, dan.carpenter@oracle.com, devel@driverdev.osuosl.org, linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-api@vger.kernel.org Subject: Re: [PATCH v6 2/2] staging: ion: create one device entry per heap Message-ID: <20171128133217.GA29995@kroah.com> References: <1509983985-20950-1-git-send-email-benjamin.gaignard@linaro.org> <1509983985-20950-3-git-send-email-benjamin.gaignard@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1509983985-20950-3-git-send-email-benjamin.gaignard@linaro.org> User-Agent: Mutt/1.9.1 (2017-09-22) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Nov 06, 2017 at 04:59:45PM +0100, Benjamin Gaignard wrote: > Instead a getting only one common device "/dev/ion" for > all the heaps this patch allow to create one device > entry ("/dev/ionX") per heap. > Getting an entry per heap could allow to set security rules > per heap and global ones for all heaps. > > Allocation requests will be only allowed if the mask_id > match with device minor. > Query request could be done on any of the devices. > > Signed-off-by: Benjamin Gaignard > --- > drivers/staging/android/TODO | 1 - > drivers/staging/android/ion/Kconfig | 7 ++++ > drivers/staging/android/ion/ion-ioctl.c | 18 ++++++++-- > drivers/staging/android/ion/ion.c | 62 +++++++++++++++++++++++++++++---- > drivers/staging/android/ion/ion.h | 15 ++++++-- > 5 files changed, 91 insertions(+), 12 deletions(-) > > diff --git a/drivers/staging/android/TODO b/drivers/staging/android/TODO > index 687e0ea..8a11931 100644 > --- a/drivers/staging/android/TODO > +++ b/drivers/staging/android/TODO > @@ -8,7 +8,6 @@ TODO: > ion/ > - Add dt-bindings for remaining heaps (chunk and carveout heaps). This would > involve putting appropriate bindings in a memory node for Ion to find. > - - Split /dev/ion up into multiple nodes (e.g. /dev/ion/heap0) > - Better test framework (integration with VGEM was suggested) > > Please send patches to Greg Kroah-Hartman and Cc: > diff --git a/drivers/staging/android/ion/Kconfig b/drivers/staging/android/ion/Kconfig > index a517b2d..cb4666e 100644 > --- a/drivers/staging/android/ion/Kconfig > +++ b/drivers/staging/android/ion/Kconfig > @@ -10,6 +10,13 @@ menuconfig ION > If you're not using Android its probably safe to > say N here. > > +config ION_LEGACY_DEVICE_API > + bool "Keep using Ion legacy misc device API" > + depends on ION You want to default to Y here, so when you do 'make oldconfig' nothing breaks, right? > + help > + Choose this option to keep using Ion legacy misc device API > + i.e. /dev/ion You need more text here to describe the trade offs. Why would I not want to keep doing this? What does turning this off get me? What does keeping it on keep me from doing? > + > config ION_SYSTEM_HEAP > bool "Ion system heap" > depends on ION > diff --git a/drivers/staging/android/ion/ion-ioctl.c b/drivers/staging/android/ion/ion-ioctl.c > index e26b786..bb5c77b 100644 > --- a/drivers/staging/android/ion/ion-ioctl.c > +++ b/drivers/staging/android/ion/ion-ioctl.c > @@ -25,7 +25,8 @@ union ion_ioctl_arg { > struct ion_heap_query query; > }; > > -static int validate_ioctl_arg(unsigned int cmd, union ion_ioctl_arg *arg) > +static int validate_ioctl_arg(struct file *filp, > + unsigned int cmd, union ion_ioctl_arg *arg) > { > switch (cmd) { > case ION_IOC_HEAP_QUERY: > @@ -34,6 +35,19 @@ static int validate_ioctl_arg(unsigned int cmd, union ion_ioctl_arg *arg) > arg->query.reserved2 ) > return -EINVAL; > break; > + > + case ION_IOC_ALLOC: > + { > + int mask = 1 << iminor(filp->f_inode); > + > +#ifdef CONFIG_ION_LEGACY_DEVICE_API > + if (imajor(filp->f_inode) == MISC_MAJOR) > + return 0; Why return 0? Because it is already allocated? Some comments here as to exactly what you are doing would be nice. > +#endif > + if (!(arg->allocation.heap_id_mask & mask)) This doesn't allocate anthing, just check to see if it is? > + return -EINVAL; > + break; > + } > default: > break; > } > @@ -69,7 +83,7 @@ long ion_ioctl(struct file *filp, unsigned int cmd, unsigned long arg) > if (copy_from_user(&data, (void __user *)arg, _IOC_SIZE(cmd))) > return -EFAULT; > > - ret = validate_ioctl_arg(cmd, &data); > + ret = validate_ioctl_arg(filp, cmd, &data); > if (WARN_ON_ONCE(ret)) > return ret; > > diff --git a/drivers/staging/android/ion/ion.c b/drivers/staging/android/ion/ion.c > index fda9756..2c2568b 100644 > --- a/drivers/staging/android/ion/ion.c > +++ b/drivers/staging/android/ion/ion.c > @@ -40,6 +40,9 @@ > > #include "ion.h" > > +#define ION_DEV_MAX 32 Why 32? Where did that number come from? > +#define ION_NAME "ion" > + > static struct ion_device *internal_dev; > static int heap_id; > > @@ -535,15 +538,38 @@ static int debug_shrink_get(void *data, u64 *val) > DEFINE_SIMPLE_ATTRIBUTE(debug_shrink_fops, debug_shrink_get, > debug_shrink_set, "%llu\n"); > > -void ion_device_add_heap(struct ion_heap *heap) > +static struct device ion_bus = { > + .init_name = ION_NAME, > +}; Oh look, a struct device on the stack. Watch bad things happen :( This is a dynamic device, make it dynamic, or else you had better know exactly what you are doing... > + > +static struct bus_type ion_bus_type = { > + .name = ION_NAME, > +}; > + > +int ion_device_add_heap(struct ion_heap *heap) > { > struct dentry *debug_file; > struct ion_device *dev = internal_dev; > + int ret = 0; Why set this to 0? > > if (!heap->ops->allocate || !heap->ops->free) > pr_err("%s: can not add heap with invalid ops struct.\n", > __func__); > > + if (heap_id >= ION_DEV_MAX) > + return -EBUSY; Busy for an invalid value? > + > + heap->ddev.parent = &ion_bus; > + heap->ddev.bus = &ion_bus_type; > + heap->ddev.devt = MKDEV(MAJOR(internal_dev->devt), heap_id); > + dev_set_name(&heap->ddev, ION_NAME"%d", heap_id); > + device_initialize(&heap->ddev); > + cdev_init(&heap->chrdev, &ion_fops); > + heap->chrdev.owner = THIS_MODULE; > + ret = cdev_device_add(&heap->chrdev, &heap->ddev); > + if (ret < 0) > + return ret; > + > spin_lock_init(&heap->free_lock); > heap->free_list_size = 0; > > @@ -581,6 +607,8 @@ void ion_device_add_heap(struct ion_heap *heap) > > dev->heap_cnt++; > up_write(&dev->lock); > + > + return ret; > } > EXPORT_SYMBOL(ion_device_add_heap); > > @@ -593,8 +621,9 @@ static int ion_device_create(void) > if (!idev) > return -ENOMEM; > > +#ifdef CONFIG_ION_LEGACY_DEVICE_API > idev->dev.minor = MISC_DYNAMIC_MINOR; > - idev->dev.name = "ion"; > + idev->dev.name = ION_NAME; > idev->dev.fops = &ion_fops; > idev->dev.parent = NULL; > ret = misc_register(&idev->dev); > @@ -603,19 +632,38 @@ static int ion_device_create(void) > kfree(idev); > return ret; > } > +#endif > > - idev->debug_root = debugfs_create_dir("ion", NULL); > - if (!idev->debug_root) { > + ret = device_register(&ion_bus); You call device_register for something you are calling a bus??? Are you _sure_ about this? What exactly are you creating in sysfs here? You are throwing around "raw" devices, which is almost never what you ever want to do. Especially for some random char driver. > + if (ret) > + goto clean_misc; > + > + ret = bus_register(&ion_bus_type); > + if (ret) > + goto clean_device; > + > + ret = alloc_chrdev_region(&idev->devt, 0, ION_DEV_MAX, ION_NAME); > + if (ret) > + goto clean_device; > + > + idev->debug_root = debugfs_create_dir(ION_NAME, NULL); > + if (!idev->debug_root) Why do you care about this? (hint, never care about any debugfs call...) > pr_err("ion: failed to create debugfs root directory.\n"); > - goto debugfs_done; > - } > > -debugfs_done: > idev->buffers = RB_ROOT; > mutex_init(&idev->buffer_lock); > init_rwsem(&idev->lock); > plist_head_init(&idev->heaps); > internal_dev = idev; > return 0; > + > +clean_device: > + device_unregister(&ion_bus); > +clean_misc: > +#ifdef CONFIG_ION_LEGACY_DEVICE_API > + misc_deregister(&idev->dev); > +#endif > + kfree(idev); > + return ret; > } > subsys_initcall(ion_device_create); > diff --git a/drivers/staging/android/ion/ion.h b/drivers/staging/android/ion/ion.h > index f5f9cd6..4869e96 100644 > --- a/drivers/staging/android/ion/ion.h > +++ b/drivers/staging/android/ion/ion.h > @@ -17,16 +17,19 @@ > #ifndef _ION_H > #define _ION_H > > +#include > #include > #include > #include > +#ifdef CONFIG_ION_LEGACY_DEVICE_API > +#include > +#endif Why do you need a #ifdef here? > #include > #include > #include > #include > #include > #include > -#include > > #include "../uapi/ion.h" > > @@ -92,12 +95,16 @@ void ion_buffer_destroy(struct ion_buffer *buffer); > /** > * struct ion_device - the metadata of the ion device node > * @dev: the actual misc device > + * @devt: Ion device devt? That's not a "device", it's a dev_t, which means something else, right? > * @buffers: an rb tree of all the existing buffers > * @buffer_lock: lock protecting the tree of buffers > * @lock: rwsem protecting the tree of heaps and clients > */ > struct ion_device { > +#ifdef CONFIG_ION_LEGACY_DEVICE_API > struct miscdevice dev; > +#endif Why use #ifdef? > + dev_t devt; > struct rb_root buffers; > struct mutex buffer_lock; > struct rw_semaphore lock; > @@ -153,6 +160,8 @@ struct ion_heap_ops { > * struct ion_heap - represents a heap in the system > * @node: rb node to put the heap on the device's tree of heaps > * @dev: back pointer to the ion_device > + * @ddev: device structure How many different reference counted objects do you now have in this structure? And what exactly is the lifetime rules involved in them? Hint, you never tried removing any of these from the system, otherwise you would have seen the kernel warnings... Step back here, what exactly do you want to do? What do you expect sysfs to look like? What do you want /dev/ to look like? Where is the documentation for the new sysfs files and the new ioctl call you added? What did you do to test this out? Where are the AOSP patches to use this? Happen to have a VTS test for it? This needs a lot more work, if for no other reason than the integration into the driver model is totally wrong and will blow up into tiny pieces... thanks, greg k-h From 1585237517930731191@xxx Mon Nov 27 16:31:46 +0000 2017 X-GM-THRID: 1583334148445829702 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread