From: Thomas Hellstrom <thellstrom@vmware.com>
To: Al Viro <viro@ZenIV.linux.org.uk>
Cc: linux-kernel@vger.kernel.org
Subject: Re: [PATCH RFC RESEND] dma-buf/fs Add get_[file|dma_buf]_unless_doomed
Date: Mon, 11 Nov 2013 17:15:57 +0100 [thread overview]
Message-ID: <528102BD.90207@vmware.com> (raw)
In-Reply-To: <20131111151704.GX13318@ZenIV.linux.org.uk>
On 11/11/2013 04:17 PM, Al Viro wrote:
> On Mon, Nov 11, 2013 at 12:57:47AM -0800, Thomas Hellstrom wrote:
>> Resending since it appears this RFC never got to the dri-devel lkml lists.
>>
>> In this context, a "doomed" object is an object whose refcount has reached
>> zero, but that has not yet been freed.
>>
>> To avoid mutual refcounting vmwgfx need to have a non-refcounted pointer to
>> a dma-buf in a lookup structure. The pointer is removed in the dma-buf
>> destructor. To allow lookup-structure private locks we need
>> get_dma_buf_unless_doomed(). This common refcounting scenario is described
>> with examples in detail in the kref documentaion.
>> The solution with local locks is under kref_get_unless_zero().
>> See also kobject_get_unless_zero() and its commit message.
>> Since dma-bufs are using the attached file for refcounting,
>> get_dma_buf_unless_doomed maps directly to a get_file_unless_doomed.
> NAK for struct file. This kind of stuff is for implementing primitives,
> not as a public API.
That's only partially correct. Public access (through in this case a
release callback) to the object destructor validates a public
ref_unless_doomed method. It's particularly useful if an external user
wants to implement a lookup table for objects that are removed from the
table in the object destructor or, (which doesn't apply in this case)
using RCU locks for lookups.
Still want to NAK this, could you please elaborate a bit more why you
don't want it in? Fear of misuse or general dislike of this
lookup method?
> BTW, as for dmabuf... dma_buf_fd() calling conventions
> are seriously misguided - we are trying to transfer the reference we hold
> into something (in this case - descriptor table), so the failure exit
> should be dropping the reference, not leaving that to caller
You're probably right, though I'm only a dma_buf API user, trying to
extend the dma_buf API useful for my use-case.
Thanks,
Thomas
prev parent reply other threads:[~2013-11-11 16:16 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-11-11 8:57 [PATCH RFC RESEND] dma-buf/fs Add get_[file|dma_buf]_unless_doomed Thomas Hellstrom
2013-11-11 15:17 ` Al Viro
2013-11-11 16:15 ` Thomas Hellstrom [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=528102BD.90207@vmware.com \
--to=thellstrom@vmware.com \
--cc=linux-kernel@vger.kernel.org \
--cc=viro@ZenIV.linux.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox