RE: [PATCH v4 01/13] dma-buf: Add vmap_local and vnumap_local operations

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




>-----Original Message-----
>From: dri-devel <dri-devel-bounces@xxxxxxxxxxxxxxxxxxxxx> On Behalf Of
>Thomas Zimmermann
>Sent: Tuesday, January 12, 2021 2:45 AM
>To: Ruhl, Michael J <michael.j.ruhl@xxxxxxxxx>; sumit.semwal@xxxxxxxxxx;
>christian.koenig@xxxxxxx; airlied@xxxxxxxxxx; daniel@xxxxxxxx;
>maarten.lankhorst@xxxxxxxxxxxxxxx; mripard@xxxxxxxxxx;
>kraxel@xxxxxxxxxx; hdegoede@xxxxxxxxxx; sean@xxxxxxxxxx;
>eric@xxxxxxxxxx; sam@xxxxxxxxxxxx
>Cc: linaro-mm-sig@xxxxxxxxxxxxxxxx; Daniel Vetter <daniel.vetter@xxxxxxxx>;
>virtualization@xxxxxxxxxxxxxxxxxxxxxxxxxx; dri-devel@xxxxxxxxxxxxxxxxxxxxx;
>linux-media@xxxxxxxxxxxxxxx
>Subject: Re: [PATCH v4 01/13] dma-buf: Add vmap_local and vnumap_local
>operations
>
>Hi
>
>Am 08.01.21 um 17:12 schrieb Ruhl, Michael J:
>>> -----Original Message-----
>>> From: dri-devel <dri-devel-bounces@xxxxxxxxxxxxxxxxxxxxx> On Behalf Of
>>> Thomas Zimmermann
>>> Sent: Friday, January 8, 2021 4:43 AM
>>> To: sumit.semwal@xxxxxxxxxx; christian.koenig@xxxxxxx;
>>> airlied@xxxxxxxxxx; daniel@xxxxxxxx; maarten.lankhorst@xxxxxxxxxxxxxxx;
>>> mripard@xxxxxxxxxx; kraxel@xxxxxxxxxx; hdegoede@xxxxxxxxxx;
>>> sean@xxxxxxxxxx; eric@xxxxxxxxxx; sam@xxxxxxxxxxxx
>>> Cc: Daniel Vetter <daniel.vetter@xxxxxxxx>; dri-
>devel@xxxxxxxxxxxxxxxxxxxxx;
>>> virtualization@xxxxxxxxxxxxxxxxxxxxxxxxxx; linaro-mm-sig@xxxxxxxxxxxxxxxx;
>>> Thomas Zimmermann <tzimmermann@xxxxxxx>; linux-
>>> media@xxxxxxxxxxxxxxx
>>> Subject: [PATCH v4 01/13] dma-buf: Add vmap_local and vnumap_local
>>> operations
>>>
>>> The existing dma-buf calls dma_buf_vmap() and dma_buf_vunmap() are
>>> allowed to pin the buffer or acquire the buffer's reservation object
>>> lock.
>>>
>>> This is a problem for callers that only require a short-term mapping
>>> of the buffer without the pinning, or callers that have special locking
>>> requirements. These may suffer from unnecessary overhead or interfere
>>> with regular pin operations.
>>>
>>> The new interfaces dma_buf_vmap_local(), dma_buf_vunmapo_local(),
>and
>>> their rsp callbacks in struct dma_buf_ops provide an alternative without
>>> pinning or reservation locking. Callers are responsible for these
>>> operations.
>>>
>>> v4:
>>> 	* update documentation (Daniel)
>>>
>>> Signed-off-by: Thomas Zimmermann <tzimmermann@xxxxxxx>
>>> Reviewed-by: Daniel Vetter <daniel.vetter@xxxxxxxx>
>>> Suggested-by: Daniel Vetter <daniel.vetter@xxxxxxxx>
>>> ---
>>> drivers/dma-buf/dma-buf.c | 81
>>> +++++++++++++++++++++++++++++++++++++++
>>> include/linux/dma-buf.h   | 34 ++++++++++++++++
>>> 2 files changed, 115 insertions(+)
>>>
>>> diff --git a/drivers/dma-buf/dma-buf.c b/drivers/dma-buf/dma-buf.c
>>> index b8465243eca2..01f9c74d97fa 100644
>>> --- a/drivers/dma-buf/dma-buf.c
>>> +++ b/drivers/dma-buf/dma-buf.c
>>> @@ -1295,6 +1295,87 @@ void dma_buf_vunmap(struct dma_buf
>*dmabuf,
>>> struct dma_buf_map *map)
>>> }
>>> EXPORT_SYMBOL_GPL(dma_buf_vunmap);
>>>
>>> +/**
>>> + * dma_buf_vmap_local - Create virtual mapping for the buffer object
>into
>>> kernel
>>> + * address space.
>>> + * @dmabuf:	[in]	buffer to vmap
>>> + * @map:	[out]	returns the vmap pointer
>>> + *
>>> + * Unlike dma_buf_vmap() this is a short term mapping and will not pin
>>> + * the buffer. The struct dma_resv for the @dmabuf must be locked until
>>> + * dma_buf_vunmap_local() is called.
>>> + *
>>> + * Returns:
>>> + * 0 on success, or a negative errno code otherwise.
>>> + */
>>> +int dma_buf_vmap_local(struct dma_buf *dmabuf, struct dma_buf_map
>>> *map)
>>> +{
>>> +	struct dma_buf_map ptr;
>>> +	int ret = 0;
>>> +
>>> +	dma_buf_map_clear(map);
>>> +
>>> +	if (WARN_ON(!dmabuf))
>>> +		return -EINVAL;
>>> +
>>> +	dma_resv_assert_held(dmabuf->resv);
>>> +
>>> +	if (!dmabuf->ops->vmap_local)
>>> +		return -EINVAL;
>>
>> You are clearing the map, and then doing the above checks.
>>
>> Is it ok to change the map info and then exit on error?
>
>In vmap_local map argument returns the mapping's address. Callers are
>expected to check the return code. But I would expect a careless caller
>to not check, or check for map being cleared. Clearing it here first is
>the save thing to do.

Ahh, a pre-emptive attempt to make sure the caller doesn't cause more
problems on error. 😊

Thanks,

M

>Best regards
>Thomas
>
>>
>> Mike
>>
>>> +	mutex_lock(&dmabuf->lock);
>>> +	if (dmabuf->vmapping_counter) {
>>> +		dmabuf->vmapping_counter++;
>>> +		BUG_ON(dma_buf_map_is_null(&dmabuf->vmap_ptr));
>>> +		*map = dmabuf->vmap_ptr;
>>> +		goto out_unlock;
>>> +	}
>>> +
>>> +	BUG_ON(dma_buf_map_is_set(&dmabuf->vmap_ptr));
>>> +
>>> +	ret = dmabuf->ops->vmap_local(dmabuf, &ptr);
>>> +	if (WARN_ON_ONCE(ret))
>>> +		goto out_unlock;
>>> +
>>> +	dmabuf->vmap_ptr = ptr;
>>> +	dmabuf->vmapping_counter = 1;
>>> +
>>> +	*map = dmabuf->vmap_ptr;
>>> +
>>> +out_unlock:
>>> +	mutex_unlock(&dmabuf->lock);
>>> +	return ret;
>>> +}
>>> +EXPORT_SYMBOL_GPL(dma_buf_vmap_local);
>>> +
>>> +/**
>>> + * dma_buf_vunmap_local - Unmap a vmap obtained by
>>> dma_buf_vmap_local.
>>> + * @dmabuf:	[in]	buffer to vunmap
>>> + * @map:	[in]	vmap pointer to vunmap
>>> + *
>>> + * Release a mapping established with dma_buf_vmap_local().
>>> + */
>>> +void dma_buf_vunmap_local(struct dma_buf *dmabuf, struct
>>> dma_buf_map *map)
>>> +{
>>> +	if (WARN_ON(!dmabuf))
>>> +		return;
>>> +
>>> +	dma_resv_assert_held(dmabuf->resv);
>>> +
>>> +	BUG_ON(dma_buf_map_is_null(&dmabuf->vmap_ptr));
>>> +	BUG_ON(dmabuf->vmapping_counter == 0);
>>> +	BUG_ON(!dma_buf_map_is_equal(&dmabuf->vmap_ptr, map));
>>> +
>>> +	mutex_lock(&dmabuf->lock);
>>> +	if (--dmabuf->vmapping_counter == 0) {
>>> +		if (dmabuf->ops->vunmap_local)
>>> +			dmabuf->ops->vunmap_local(dmabuf, map);
>>> +		dma_buf_map_clear(&dmabuf->vmap_ptr);
>>> +	}
>>> +	mutex_unlock(&dmabuf->lock);
>>> +}
>>> +EXPORT_SYMBOL_GPL(dma_buf_vunmap_local);
>>> +
>>> #ifdef CONFIG_DEBUG_FS
>>> static int dma_buf_debug_show(struct seq_file *s, void *unused)
>>> {
>>> diff --git a/include/linux/dma-buf.h b/include/linux/dma-buf.h
>>> index 628681bf6c99..aeed754b5467 100644
>>> --- a/include/linux/dma-buf.h
>>> +++ b/include/linux/dma-buf.h
>>> @@ -264,6 +264,38 @@ struct dma_buf_ops {
>>>
>>> 	int (*vmap)(struct dma_buf *dmabuf, struct dma_buf_map *map);
>>> 	void (*vunmap)(struct dma_buf *dmabuf, struct dma_buf_map
>>> *map);
>>> +
>>> +	/**
>>> +	 * @vmap_local:
>>> +	 *
>>> +	 * Creates a virtual mapping for the buffer into kernel address space.
>>> +	 *
>>> +	 * This callback establishes short-term mappings for situations where
>>> +	 * callers only use the buffer for a bounded amount of time; such as
>>> +	 * updates to the framebuffer or reading back contained information.
>>> +	 * In contrast to the regular @vmap callback, vmap_local does never
>>> pin
>>> +	 * the buffer to a specific domain or acquire the buffer's reservation
>>> +	 * lock.
>>> +	 *
>>> +	 * This is called with the &dma_buf.resv object locked. Callers must
>>> hold
>>> +	 * the lock until after removing the mapping with @vunmap_local.
>>> +	 *
>>> +	 * This callback is optional.
>>> +	 *
>>> +	 * Returns:
>>> +	 *
>>> +	 * 0 on success or a negative error code on failure.
>>> +	 */
>>> +	int (*vmap_local)(struct dma_buf *dmabuf, struct dma_buf_map
>>> *map);
>>> +
>>> +	/**
>>> +	 * @vunmap_local:
>>> +	 *
>>> +	 * Removes a virtual mapping that was established by @vmap_local.
>>> +	 *
>>> +	 * This callback is optional.
>>> +	 */
>>> +	void (*vunmap_local)(struct dma_buf *dmabuf, struct dma_buf_map
>>> *map);
>>> };
>>>
>>> /**
>>> @@ -501,4 +533,6 @@ int dma_buf_mmap(struct dma_buf *, struct
>>> vm_area_struct *,
>>> 		 unsigned long);
>>> int dma_buf_vmap(struct dma_buf *dmabuf, struct dma_buf_map
>*map);
>>> void dma_buf_vunmap(struct dma_buf *dmabuf, struct dma_buf_map
>>> *map);
>>> +int dma_buf_vmap_local(struct dma_buf *dmabuf, struct dma_buf_map
>>> *map);
>>> +void dma_buf_vunmap_local(struct dma_buf *dmabuf, struct
>>> dma_buf_map *map);
>>> #endif /* __DMA_BUF_H__ */
>>> --
>>> 2.29.2
>>>
>>> _______________________________________________
>>> dri-devel mailing list
>>> dri-devel@xxxxxxxxxxxxxxxxxxxxx
>>> https://lists.freedesktop.org/mailman/listinfo/dri-devel
>> _______________________________________________
>> dri-devel mailing list
>> dri-devel@xxxxxxxxxxxxxxxxxxxxx
>> https://lists.freedesktop.org/mailman/listinfo/dri-devel
>>
>
>--
>Thomas Zimmermann
>Graphics Driver Developer
>SUSE Software Solutions Germany GmbH
>Maxfeldstr. 5, 90409 Nürnberg, Germany
>(HRB 36809, AG Nürnberg)
>Geschäftsführer: Felix Imendörffer

_______________________________________________
dri-devel mailing list
dri-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.freedesktop.org/mailman/listinfo/dri-devel




[Index of Archives]     [Linux DRI Users]     [Linux Intel Graphics]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [XFree86]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux