On Sat, Jan 9, 2016 at 4:13 AM, Aniroop Mathur <aniroop.mathur@xxxxxxxxx> wrote: > On Sat, Jan 9, 2016 at 3:57 AM, Dmitry Torokhov > <dmitry.torokhov@xxxxxxxxx> wrote: >> On Sat, Jan 09, 2016 at 03:46:41AM +0530, Aniroop Mathur wrote: >>> On Sat, Jan 9, 2016 at 2:32 AM, Dmitry Torokhov >>> <dmitry.torokhov@xxxxxxxxx> wrote: >>> > On Fri, Jan 8, 2016 at 12:51 PM, Aniroop Mathur >>> > <aniroop.mathur@xxxxxxxxx> wrote: >>> >> On Sat, Jan 9, 2016 at 2:03 AM, One Thousand Gnomes >>> >> <gnomes@xxxxxxxxxxxxxxxxxxx> wrote: >>> >>> On Sat, 9 Jan 2016 01:50:42 +0530 >>> >>> Aniroop Mathur <aniroop.mathur@xxxxxxxxx> wrote: >>> >>> >>> >>>> On Sat, Jan 9, 2016 at 1:43 AM, One Thousand Gnomes >>> >>>> <gnomes@xxxxxxxxxxxxxxxxxxx> wrote: >>> >>>> >> During system boot up, user space buf size is fixed, it cannot be >>> >>>> >> resized later and we cannot choose by hit&trial. >>> >>>> >> struct input_event* mBuffer = new input_event[mBuf]; >>> >>>> > >>> >>>> > Who says that won't change ? Imagine a future case where plugging in a >>> >>>> > device changes the buffer size ? >>> >>>> > >>> >>>> >>> >>>> Ofcourse buffer size can be changed but it will also change the value of bufsize >>> >>>> variable and accordingly user space client should also change its buf size. >>> >>> >>> >>> If its hot plugged why shouldn't that value change dynamically after >>> >>> you've asked ? >>> >>> >>> >> >>> >> Please put up your query clearly. what value ? what asked ? >>> > >>> > There is nothing that would stop us (kernel) to decide to resize the >>> > buffer after you issued your new EVIOCGBUFSIZE. For example one can >>> > decide to implement a feature that will double the size of evdev's >>> > client buffer if there happened too many overruns i a given time >>> > period. >>> > >>> >>> If one decided to double the size of evdev buffer then it would be done >>> by the same client facing buffer overrun and for this case client would >>> not need to request for evdev buf size again as it has only set it. And >>> still evdev buf size variable value be changed as well with the request >>> to change buf size so client can read it again, if wishes. >> >> I was talking about changing the size of the buffer on kernel side. >> >>> >>> > In any case the userpsace consumers already have to inspect input >>> > device in question (number of axes and what they are; number of >>> > keys/buttons, number of slots, etc) so that they can handle devices >>> > properly and it should have enough information to intelligently size >>> > of the receiving buffers. There is no need for a new kernel ioctl. >>> > >>> >>> yes, consumers have to inspect input device but they cannot know >>> the size of evdev buffer initially set as it is calculated in evdev.c file >>> Consumer does not know that there is a limit of 8 packets. >>> #define EVDEV_BUF_PACKETS 8 >>> unsigned int n_events = >>> max(dev->hint_events_per_packet * EVDEV_BUF_PACKETS, EVDEV_MIN_BUFFER_SIZE); >>> return roundup_pow_of_two(n_events); >>> This value varies for every device as every device has different value >>> of hint_events_per_packet. >>> >>> Even after increasing kernel buffer size, buffer overrun can occur >>> if reading is delayed and userspace buf is very small say only 1/2. >>> In this case, buffer overrun will still occur and it will only be delayed. >>> This was happening in my use case for gyroscope sensor device for >>> which I initially forcefully increased the evdev buf size but problem was >>> still not solved and buffer overrun was only delayed. The cause of the >>> problem was that gyroscope client was using very small buf size for >>> reading and after increasing the user space buf size, problem was solved. >>> If client chooses maximum possible buffer size then it will be able to >>> consume maximum events when reading is delayed and hence there will >>> be least chance of buffer overrun. Evdev buf size should only be increased >>> when buffer overrun occurs even with max user-space buf size. >>> But the max user space buf size cannot be known until client request for it >>> using this ioctl. So, I added it. >>> >>> So, are you convinced now that this ioctl is required ? >> >> No because I'd rather you managed size of your own buffer and increased >> it as needed if you see drops. Let's say kernel decides to have buffer >> of 100 events, do you have to mirror this size? What if device only >> generates 1 event per minute? >> > > We do not want any drop in the first place by keeping max buf size for > reading for devices which need it only. On changing buf size on run time > would not do any help because many events have already been dropped. > And then after rebooting the system, user space buf size will again change > to old value and so again events will be dropped and again buf size need to > be changed. > Yes, there is a need to mirror it, especially for device which support batching. > If device generates only 1 event per minute, then client can choose minimum > user space buf size, say 1. It is not compulsory to choose max buf size always > for every device. > Any update on above in order to conclude this change ? As consumer need to manage the user-space buf size as per requirement, it needs to know the max limit upto which it can be increased so that consumer should not request to read for more data than the max limit. Also, evdev read should be changed to - if (count != 0 && count < input_event_size()) + if ((count != 0 && count < input_event_size()) || (count > client->bufsize)) return -EINVAL; And most likely, if kernel buf size need to be changed it will done through ioctl request by client which needs it and so client already know about new kernel buf size. And if kernel but size is decided by device driver during probe then that will be first buf size set which is same original case so no problem here. And less likely, if input subsystem by self decides to change buf size without any request from client or device driver, then it should notify about it to user space through a new event and obviously update the but size variable. > Regards, > Aniroop > >> Thanks. >> >> -- >> Dmitry -- To unsubscribe from this list: send the line "unsubscribe linux-input" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html