From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-18.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id EDDB7C4743C for ; Wed, 23 Jun 2021 16:19:20 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id D44DD6101D for ; Wed, 23 Jun 2021 16:19:20 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229926AbhFWQVh (ORCPT ); Wed, 23 Jun 2021 12:21:37 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56306 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229726AbhFWQVg (ORCPT ); Wed, 23 Jun 2021 12:21:36 -0400 Received: from mail-ej1-x62c.google.com (mail-ej1-x62c.google.com [IPv6:2a00:1450:4864:20::62c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2B3A0C061574 for ; Wed, 23 Jun 2021 09:19:19 -0700 (PDT) Received: by mail-ej1-x62c.google.com with SMTP id ot9so3888097ejb.8 for ; Wed, 23 Jun 2021 09:19:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=cO1vJz5pucDouo6X9nWZ3NnckMomg2MFYmOs4y5pkK4=; b=DDCIl7hcJY4ZO4Z513KKDraLBQhvHBFR7V7PcQgwkC9h1HodRqSx7sm8LZKM6bEVC9 WOayaqmWTq3+JXKAiy5bErOphH/Qd10hwxfJ2x7ehnbQyoSsrVkduUnnXA0koCzIOrQn tBGcVmg6448ZIHIYUY2YhukxUFoJTB+3HSijE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=cO1vJz5pucDouo6X9nWZ3NnckMomg2MFYmOs4y5pkK4=; b=hOZvvGHADu/0VFNOxQoyfSBrMElOnnV+5wafl9mTa7hNCdkXFfwgIHh/hq88REwyJ+ Ax8LHmJZxwsf3LXaGzBtaYpDVy1WtQx4suP7oga1sbPE3DReSuAkYkar8HkIKQ3HgOur nAJSgG2ZNA6HwIfNjQ4RC87ifZB4RyCGtkD0W7Cog5+VqRneYKaSPWJlfRtVQDUvMPrw 8Fo6TvdQml+KMI5bPorR/p3T8mVXW46vJiCfBpkMi2D0bw9E03Kvj2BjOXcnUubSo9Z7 0weR6GHjZ53NJDGhWXAVtbnpte2WrmZC+OfMUcuj59A4bTzA/0eCIgA4c6Xy6gAc5vJ9 j3Eg== X-Gm-Message-State: AOAM533l5YrQLIuk/pQ0cQe4ZaHMkAdiBYqUYaDOBJX29BP+bv035rgo Cqlw1zE5FyWjhj5gv7STAUJLPg== X-Google-Smtp-Source: ABdhPJwKsMbsDP0Bcv38UaSZ4GVVy38OY+3qXIada2qcpL3Cx8ePFIJRMy9XGPeKjAnrgyRYyPhRQg== X-Received: by 2002:a17:907:2d8b:: with SMTP id gt11mr903565ejc.80.1624465157754; Wed, 23 Jun 2021 09:19:17 -0700 (PDT) Received: from phenom.ffwll.local ([2a02:168:57f4:0:efd0:b9e5:5ae6:c2fa]) by smtp.gmail.com with ESMTPSA id ee47sm285539edb.51.2021.06.23.09.19.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 23 Jun 2021 09:19:17 -0700 (PDT) From: Daniel Vetter To: DRI Development Cc: Intel Graphics Development , Daniel Vetter , =?UTF-8?q?Christian=20K=C3=B6nig?= , Sam Ravnborg , Alex Deucher , Daniel Vetter , Sumit Semwal , Dave Airlie , Nirmoy Das , Deepak R Varma , Chen Li , Kevin Wang , linux-media@vger.kernel.org, linaro-mm-sig@lists.linaro.org Subject: [PATCH] dma-buf: Switch to inline kerneldoc Date: Wed, 23 Jun 2021 18:17:12 +0200 Message-Id: <20210623161712.3370885-1-daniel.vetter@ffwll.ch> X-Mailer: git-send-email 2.32.0.rc2 In-Reply-To: <20210622165511.3169559-3-daniel.vetter@ffwll.ch> References: <20210622165511.3169559-3-daniel.vetter@ffwll.ch> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-media@vger.kernel.org Also review & update everything while we're at it. This is prep work to smash a ton of stuff into the kerneldoc for @resv. v2: Move the doc for sysfs_entry.attachment_uid to the right place too (Sam) Acked-by: Christian König Cc: Sam Ravnborg Reviewed-by: Alex Deucher Signed-off-by: Daniel Vetter Cc: Sumit Semwal Cc: "Christian König" Cc: Alex Deucher Cc: Daniel Vetter Cc: Dave Airlie Cc: Nirmoy Das Cc: Deepak R Varma Cc: Chen Li Cc: Kevin Wang Cc: linux-media@vger.kernel.org Cc: linaro-mm-sig@lists.linaro.org --- include/linux/dma-buf.h | 116 +++++++++++++++++++++++++++++++--------- 1 file changed, 90 insertions(+), 26 deletions(-) diff --git a/include/linux/dma-buf.h b/include/linux/dma-buf.h index 92eec38a03aa..81cebf414505 100644 --- a/include/linux/dma-buf.h +++ b/include/linux/dma-buf.h @@ -289,30 +289,6 @@ struct dma_buf_ops { /** * struct dma_buf - shared buffer object - * @size: size of the buffer; invariant over the lifetime of the buffer. - * @file: file pointer used for sharing buffers across, and for refcounting. - * @attachments: list of dma_buf_attachment that denotes all devices attached, - * protected by dma_resv lock. - * @ops: dma_buf_ops associated with this buffer object. - * @lock: used internally to serialize list manipulation, attach/detach and - * vmap/unmap - * @vmapping_counter: used internally to refcnt the vmaps - * @vmap_ptr: the current vmap ptr if vmapping_counter > 0 - * @exp_name: name of the exporter; useful for debugging. - * @name: userspace-provided name; useful for accounting and debugging, - * protected by @resv. - * @name_lock: spinlock to protect name access - * @owner: pointer to exporter module; used for refcounting when exporter is a - * kernel module. - * @list_node: node for dma_buf accounting and debugging. - * @priv: exporter specific private data for this buffer object. - * @resv: reservation object linked to this dma-buf - * @poll: for userspace poll support - * @cb_excl: for userspace poll support - * @cb_shared: for userspace poll support - * @sysfs_entry: for exposing information about this buffer in sysfs. - * The attachment_uid member of @sysfs_entry is protected by dma_resv lock - * and is incremented on each attach. * * This represents a shared buffer, created by calling dma_buf_export(). The * userspace representation is a normal file descriptor, which can be created by @@ -324,24 +300,100 @@ struct dma_buf_ops { * Device DMA access is handled by the separate &struct dma_buf_attachment. */ struct dma_buf { + /** + * @size: + * + * Size of the buffer; invariant over the lifetime of the buffer. + */ size_t size; + + /** + * @file: + * + * File pointer used for sharing buffers across, and for refcounting. + * See dma_buf_get() and dma_buf_put(). + */ struct file *file; + + /** + * @attachments: + * + * List of dma_buf_attachment that denotes all devices attached, + * protected by &dma_resv lock @resv. + */ struct list_head attachments; + + /** @ops: dma_buf_ops associated with this buffer object. */ const struct dma_buf_ops *ops; + + /** + * @lock: + * + * Used internally to serialize list manipulation, attach/detach and + * vmap/unmap. Note that in many cases this is superseeded by + * dma_resv_lock() on @resv. + */ struct mutex lock; + + /** + * @vmapping_counter: + * + * Used internally to refcnt the vmaps returned by dma_buf_vmap(). + * Protected by @lock. + */ unsigned vmapping_counter; + + /** + * @vmap_ptr: + * The current vmap ptr if @vmapping_counter > 0. Protected by @lock. + */ struct dma_buf_map vmap_ptr; + + /** + * @exp_name: + * + * Name of the exporter; useful for debugging. See the + * DMA_BUF_SET_NAME IOCTL. + */ const char *exp_name; + + /** + * @name: + * + * Userspace-provided name; useful for accounting and debugging, + * protected by dma_resv_lock() on @resv and @name_lock for read access. + */ const char *name; + + /** @name_lock: Spinlock to protect name acces for read access. */ spinlock_t name_lock; + + /** + * @owner: + * + * Pointer to exporter module; used for refcounting when exporter is a + * kernel module. + */ struct module *owner; + + /** @list_node: node for dma_buf accounting and debugging. */ struct list_head list_node; + + /** @priv: exporter specific private data for this buffer object. */ void *priv; + + /** + * @resv: + * + * Reservation object linked to this dma-buf. + */ struct dma_resv *resv; - /* poll support */ + /** @poll: for userspace poll support */ wait_queue_head_t poll; + /** @cb_excl: for userspace poll support */ + /** @cb_shared: for userspace poll support */ struct dma_buf_poll_cb_t { struct dma_fence_cb cb; wait_queue_head_t *poll; @@ -349,10 +401,22 @@ struct dma_buf { __poll_t active; } cb_excl, cb_shared; #ifdef CONFIG_DMABUF_SYSFS_STATS - /* for sysfs stats */ + /** + * @sysfs_entry: + * + * For exposing information about this buffer in sysfs. See also + * `DMA-BUF statistics`_ for the uapi this enables. + */ struct dma_buf_sysfs_entry { struct kobject kobj; struct dma_buf *dmabuf; + + /** + * @sysfs_entry.attachment_uid: + * + * This is protected by the dma_resv_lock() on @resv and is + * incremented on each attach. + */ unsigned int attachment_uid; struct kset *attach_stats_kset; } *sysfs_entry; -- 2.32.0.rc2 From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 199ECC48BE5 for ; Wed, 23 Jun 2021 16:19:23 +0000 (UTC) Received: from gabe.freedesktop.org (gabe.freedesktop.org [131.252.210.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 7727960FE3 for ; Wed, 23 Jun 2021 16:19:22 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 7727960FE3 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=ffwll.ch Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=dri-devel-bounces@lists.freedesktop.org Received: from gabe.freedesktop.org (localhost [127.0.0.1]) by gabe.freedesktop.org (Postfix) with ESMTP id CF4616E8A8; Wed, 23 Jun 2021 16:19:20 +0000 (UTC) Received: from mail-ej1-x62f.google.com (mail-ej1-x62f.google.com [IPv6:2a00:1450:4864:20::62f]) by gabe.freedesktop.org (Postfix) with ESMTPS id 26F626E8A8 for ; Wed, 23 Jun 2021 16:19:19 +0000 (UTC) Received: by mail-ej1-x62f.google.com with SMTP id gn32so4931368ejc.2 for ; Wed, 23 Jun 2021 09:19:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=cO1vJz5pucDouo6X9nWZ3NnckMomg2MFYmOs4y5pkK4=; b=DDCIl7hcJY4ZO4Z513KKDraLBQhvHBFR7V7PcQgwkC9h1HodRqSx7sm8LZKM6bEVC9 WOayaqmWTq3+JXKAiy5bErOphH/Qd10hwxfJ2x7ehnbQyoSsrVkduUnnXA0koCzIOrQn tBGcVmg6448ZIHIYUY2YhukxUFoJTB+3HSijE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=cO1vJz5pucDouo6X9nWZ3NnckMomg2MFYmOs4y5pkK4=; b=GjzRYRurXIsdKRg4S3R2QRmJb4OU1bNh2Oq7ricybGeCcy2ls/sicwTAQTBMYpFNNe hN3GWi2t9l7CA6gvIx5ge5ILUC7lCI2oXlcy6RiBE4OaCk7nJZ8S1w3MB16RHWDNvcsr qF7oshNy/kHlwRrZ2mZj3QVzqU7yTBWy8uvzSmFwz9eRGlYaXkJDfdQkd4kGHxEvfXR/ UOJXUznrjQQR5NLpOLKEoNCP+ntMxpaPRgEG+FKpUrvgXi8qXkOvR9y9rpqGZVuPQM3t Lc58O8b7wnjnPjKp6c1qSiQPwzBlUsMPZkY3TM948oOJOm5Xj7yUhEwayP+Jc0EdlzIL Xy0Q== X-Gm-Message-State: AOAM531TUriqT00UQO9nAfXhpG2RIOwG86MWdkLQIqQY7h0tXGnIS8Qm BjJT7gFaENzsSXzk1/MfhdqJsRf5t+qWbg== X-Google-Smtp-Source: ABdhPJwKsMbsDP0Bcv38UaSZ4GVVy38OY+3qXIada2qcpL3Cx8ePFIJRMy9XGPeKjAnrgyRYyPhRQg== X-Received: by 2002:a17:907:2d8b:: with SMTP id gt11mr903565ejc.80.1624465157754; Wed, 23 Jun 2021 09:19:17 -0700 (PDT) Received: from phenom.ffwll.local ([2a02:168:57f4:0:efd0:b9e5:5ae6:c2fa]) by smtp.gmail.com with ESMTPSA id ee47sm285539edb.51.2021.06.23.09.19.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 23 Jun 2021 09:19:17 -0700 (PDT) From: Daniel Vetter To: DRI Development Subject: [PATCH] dma-buf: Switch to inline kerneldoc Date: Wed, 23 Jun 2021 18:17:12 +0200 Message-Id: <20210623161712.3370885-1-daniel.vetter@ffwll.ch> X-Mailer: git-send-email 2.32.0.rc2 In-Reply-To: <20210622165511.3169559-3-daniel.vetter@ffwll.ch> References: <20210622165511.3169559-3-daniel.vetter@ffwll.ch> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: dri-devel@lists.freedesktop.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Direct Rendering Infrastructure - Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Deepak R Varma , Daniel Vetter , Intel Graphics Development , Kevin Wang , linaro-mm-sig@lists.linaro.org, Nirmoy Das , Chen Li , Dave Airlie , Alex Deucher , Daniel Vetter , Sam Ravnborg , =?UTF-8?q?Christian=20K=C3=B6nig?= , linux-media@vger.kernel.org Errors-To: dri-devel-bounces@lists.freedesktop.org Sender: "dri-devel" Also review & update everything while we're at it. This is prep work to smash a ton of stuff into the kerneldoc for @resv. v2: Move the doc for sysfs_entry.attachment_uid to the right place too (Sam) Acked-by: Christian König Cc: Sam Ravnborg Reviewed-by: Alex Deucher Signed-off-by: Daniel Vetter Cc: Sumit Semwal Cc: "Christian König" Cc: Alex Deucher Cc: Daniel Vetter Cc: Dave Airlie Cc: Nirmoy Das Cc: Deepak R Varma Cc: Chen Li Cc: Kevin Wang Cc: linux-media@vger.kernel.org Cc: linaro-mm-sig@lists.linaro.org --- include/linux/dma-buf.h | 116 +++++++++++++++++++++++++++++++--------- 1 file changed, 90 insertions(+), 26 deletions(-) diff --git a/include/linux/dma-buf.h b/include/linux/dma-buf.h index 92eec38a03aa..81cebf414505 100644 --- a/include/linux/dma-buf.h +++ b/include/linux/dma-buf.h @@ -289,30 +289,6 @@ struct dma_buf_ops { /** * struct dma_buf - shared buffer object - * @size: size of the buffer; invariant over the lifetime of the buffer. - * @file: file pointer used for sharing buffers across, and for refcounting. - * @attachments: list of dma_buf_attachment that denotes all devices attached, - * protected by dma_resv lock. - * @ops: dma_buf_ops associated with this buffer object. - * @lock: used internally to serialize list manipulation, attach/detach and - * vmap/unmap - * @vmapping_counter: used internally to refcnt the vmaps - * @vmap_ptr: the current vmap ptr if vmapping_counter > 0 - * @exp_name: name of the exporter; useful for debugging. - * @name: userspace-provided name; useful for accounting and debugging, - * protected by @resv. - * @name_lock: spinlock to protect name access - * @owner: pointer to exporter module; used for refcounting when exporter is a - * kernel module. - * @list_node: node for dma_buf accounting and debugging. - * @priv: exporter specific private data for this buffer object. - * @resv: reservation object linked to this dma-buf - * @poll: for userspace poll support - * @cb_excl: for userspace poll support - * @cb_shared: for userspace poll support - * @sysfs_entry: for exposing information about this buffer in sysfs. - * The attachment_uid member of @sysfs_entry is protected by dma_resv lock - * and is incremented on each attach. * * This represents a shared buffer, created by calling dma_buf_export(). The * userspace representation is a normal file descriptor, which can be created by @@ -324,24 +300,100 @@ struct dma_buf_ops { * Device DMA access is handled by the separate &struct dma_buf_attachment. */ struct dma_buf { + /** + * @size: + * + * Size of the buffer; invariant over the lifetime of the buffer. + */ size_t size; + + /** + * @file: + * + * File pointer used for sharing buffers across, and for refcounting. + * See dma_buf_get() and dma_buf_put(). + */ struct file *file; + + /** + * @attachments: + * + * List of dma_buf_attachment that denotes all devices attached, + * protected by &dma_resv lock @resv. + */ struct list_head attachments; + + /** @ops: dma_buf_ops associated with this buffer object. */ const struct dma_buf_ops *ops; + + /** + * @lock: + * + * Used internally to serialize list manipulation, attach/detach and + * vmap/unmap. Note that in many cases this is superseeded by + * dma_resv_lock() on @resv. + */ struct mutex lock; + + /** + * @vmapping_counter: + * + * Used internally to refcnt the vmaps returned by dma_buf_vmap(). + * Protected by @lock. + */ unsigned vmapping_counter; + + /** + * @vmap_ptr: + * The current vmap ptr if @vmapping_counter > 0. Protected by @lock. + */ struct dma_buf_map vmap_ptr; + + /** + * @exp_name: + * + * Name of the exporter; useful for debugging. See the + * DMA_BUF_SET_NAME IOCTL. + */ const char *exp_name; + + /** + * @name: + * + * Userspace-provided name; useful for accounting and debugging, + * protected by dma_resv_lock() on @resv and @name_lock for read access. + */ const char *name; + + /** @name_lock: Spinlock to protect name acces for read access. */ spinlock_t name_lock; + + /** + * @owner: + * + * Pointer to exporter module; used for refcounting when exporter is a + * kernel module. + */ struct module *owner; + + /** @list_node: node for dma_buf accounting and debugging. */ struct list_head list_node; + + /** @priv: exporter specific private data for this buffer object. */ void *priv; + + /** + * @resv: + * + * Reservation object linked to this dma-buf. + */ struct dma_resv *resv; - /* poll support */ + /** @poll: for userspace poll support */ wait_queue_head_t poll; + /** @cb_excl: for userspace poll support */ + /** @cb_shared: for userspace poll support */ struct dma_buf_poll_cb_t { struct dma_fence_cb cb; wait_queue_head_t *poll; @@ -349,10 +401,22 @@ struct dma_buf { __poll_t active; } cb_excl, cb_shared; #ifdef CONFIG_DMABUF_SYSFS_STATS - /* for sysfs stats */ + /** + * @sysfs_entry: + * + * For exposing information about this buffer in sysfs. See also + * `DMA-BUF statistics`_ for the uapi this enables. + */ struct dma_buf_sysfs_entry { struct kobject kobj; struct dma_buf *dmabuf; + + /** + * @sysfs_entry.attachment_uid: + * + * This is protected by the dma_resv_lock() on @resv and is + * incremented on each attach. + */ unsigned int attachment_uid; struct kset *attach_stats_kset; } *sysfs_entry; -- 2.32.0.rc2 From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 09BD9C48BC2 for ; Wed, 23 Jun 2021 16:19:21 +0000 (UTC) Received: from gabe.freedesktop.org (gabe.freedesktop.org [131.252.210.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 7094960FE3 for ; Wed, 23 Jun 2021 16:19:20 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 7094960FE3 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=ffwll.ch Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=intel-gfx-bounces@lists.freedesktop.org Received: from gabe.freedesktop.org (localhost [127.0.0.1]) by gabe.freedesktop.org (Postfix) with ESMTP id 16B186E0E7; Wed, 23 Jun 2021 16:19:20 +0000 (UTC) Received: from mail-ej1-x635.google.com (mail-ej1-x635.google.com [IPv6:2a00:1450:4864:20::635]) by gabe.freedesktop.org (Postfix) with ESMTPS id 162B26E0E7 for ; Wed, 23 Jun 2021 16:19:19 +0000 (UTC) Received: by mail-ej1-x635.google.com with SMTP id hc16so4829887ejc.12 for ; Wed, 23 Jun 2021 09:19:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=cO1vJz5pucDouo6X9nWZ3NnckMomg2MFYmOs4y5pkK4=; b=DDCIl7hcJY4ZO4Z513KKDraLBQhvHBFR7V7PcQgwkC9h1HodRqSx7sm8LZKM6bEVC9 WOayaqmWTq3+JXKAiy5bErOphH/Qd10hwxfJ2x7ehnbQyoSsrVkduUnnXA0koCzIOrQn tBGcVmg6448ZIHIYUY2YhukxUFoJTB+3HSijE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=cO1vJz5pucDouo6X9nWZ3NnckMomg2MFYmOs4y5pkK4=; b=EqcVtPUPWzmoE1d27ttUQCHnqphO5WgGZUHRy4gyRu67DBKGg3Efawfq7vAtQ3fc6t U7CHetbtTHuVQkETwYHLHYixoGR1z9PKaonBZ8qAWhYTTmd/ku+JIQFjXNxaUB2+8tAS V/D0fmc02M/5qhriv7RdH9a1jPuwzVbxp7T0f5uz5GHlPtmwNNT4Qm9KpPWPqNuc8lkJ AIiwiscBFOq64Ubh7q3vZ4KNzU6gM32IDQhQf8LIdydZb1KuEHzY2EbzK8HrwXwc8n2H HsC1hJ3BqEjO7CNlSzlx3s2ulXJgf67r8ZHb0mLK+yOGpcXYFuVCWWFxxc75cIpPsCKr rtfQ== X-Gm-Message-State: AOAM532fio0AqcuNdi2nIBWUNyJR4IlBMvRGiDVDdn7dw35IiIpAzicF sbD8spNu0dVr7tfcJQOqkM7j0g== X-Google-Smtp-Source: ABdhPJwKsMbsDP0Bcv38UaSZ4GVVy38OY+3qXIada2qcpL3Cx8ePFIJRMy9XGPeKjAnrgyRYyPhRQg== X-Received: by 2002:a17:907:2d8b:: with SMTP id gt11mr903565ejc.80.1624465157754; Wed, 23 Jun 2021 09:19:17 -0700 (PDT) Received: from phenom.ffwll.local ([2a02:168:57f4:0:efd0:b9e5:5ae6:c2fa]) by smtp.gmail.com with ESMTPSA id ee47sm285539edb.51.2021.06.23.09.19.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 23 Jun 2021 09:19:17 -0700 (PDT) From: Daniel Vetter To: DRI Development Date: Wed, 23 Jun 2021 18:17:12 +0200 Message-Id: <20210623161712.3370885-1-daniel.vetter@ffwll.ch> X-Mailer: git-send-email 2.32.0.rc2 In-Reply-To: <20210622165511.3169559-3-daniel.vetter@ffwll.ch> References: <20210622165511.3169559-3-daniel.vetter@ffwll.ch> MIME-Version: 1.0 Subject: [Intel-gfx] [PATCH] dma-buf: Switch to inline kerneldoc X-BeenThere: intel-gfx@lists.freedesktop.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Intel graphics driver community testing & development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Deepak R Varma , Daniel Vetter , Intel Graphics Development , Kevin Wang , Sumit Semwal , linaro-mm-sig@lists.linaro.org, Nirmoy Das , Chen Li , Dave Airlie , Alex Deucher , Daniel Vetter , Sam Ravnborg , =?UTF-8?q?Christian=20K=C3=B6nig?= , linux-media@vger.kernel.org Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: intel-gfx-bounces@lists.freedesktop.org Sender: "Intel-gfx" QWxzbyByZXZpZXcgJiB1cGRhdGUgZXZlcnl0aGluZyB3aGlsZSB3ZSdyZSBhdCBpdC4KClRoaXMg aXMgcHJlcCB3b3JrIHRvIHNtYXNoIGEgdG9uIG9mIHN0dWZmIGludG8gdGhlIGtlcm5lbGRvYyBm b3IKQHJlc3YuCgp2MjogTW92ZSB0aGUgZG9jIGZvciBzeXNmc19lbnRyeS5hdHRhY2htZW50X3Vp ZCB0byB0aGUgcmlnaHQgcGxhY2UgdG9vCihTYW0pCgpBY2tlZC1ieTogQ2hyaXN0aWFuIEvDtm5p ZyA8Y2hyaXN0aWFuLmtvZW5pZ0BhbWQuY29tPgpDYzogU2FtIFJhdm5ib3JnIDxzYW1AcmF2bmJv cmcub3JnPgpSZXZpZXdlZC1ieTogQWxleCBEZXVjaGVyIDxhbGV4YW5kZXIuZGV1Y2hlckBhbWQu Y29tPgpTaWduZWQtb2ZmLWJ5OiBEYW5pZWwgVmV0dGVyIDxkYW5pZWwudmV0dGVyQGludGVsLmNv bT4KQ2M6IFN1bWl0IFNlbXdhbCA8c3VtaXQuc2Vtd2FsQGxpbmFyby5vcmc+CkNjOiAiQ2hyaXN0 aWFuIEvDtm5pZyIgPGNocmlzdGlhbi5rb2VuaWdAYW1kLmNvbT4KQ2M6IEFsZXggRGV1Y2hlciA8 YWxleGFuZGVyLmRldWNoZXJAYW1kLmNvbT4KQ2M6IERhbmllbCBWZXR0ZXIgPGRhbmllbC52ZXR0 ZXJAZmZ3bGwuY2g+CkNjOiBEYXZlIEFpcmxpZSA8YWlybGllZEByZWRoYXQuY29tPgpDYzogTmly bW95IERhcyA8bmlybW95LmRhc0BhbWQuY29tPgpDYzogRGVlcGFrIFIgVmFybWEgPG1oMTJneDI4 MjVAZ21haWwuY29tPgpDYzogQ2hlbiBMaSA8Y2hlbmxpQHVuaW9udGVjaC5jb20+CkNjOiBLZXZp biBXYW5nIDxrZXZpbjEud2FuZ0BhbWQuY29tPgpDYzogbGludXgtbWVkaWFAdmdlci5rZXJuZWwu b3JnCkNjOiBsaW5hcm8tbW0tc2lnQGxpc3RzLmxpbmFyby5vcmcKLS0tCiBpbmNsdWRlL2xpbnV4 L2RtYS1idWYuaCB8IDExNiArKysrKysrKysrKysrKysrKysrKysrKysrKysrKysrLS0tLS0tLS0t CiAxIGZpbGUgY2hhbmdlZCwgOTAgaW5zZXJ0aW9ucygrKSwgMjYgZGVsZXRpb25zKC0pCgpkaWZm IC0tZ2l0IGEvaW5jbHVkZS9saW51eC9kbWEtYnVmLmggYi9pbmNsdWRlL2xpbnV4L2RtYS1idWYu aAppbmRleCA5MmVlYzM4YTAzYWEuLjgxY2ViZjQxNDUwNSAxMDA2NDQKLS0tIGEvaW5jbHVkZS9s aW51eC9kbWEtYnVmLmgKKysrIGIvaW5jbHVkZS9saW51eC9kbWEtYnVmLmgKQEAgLTI4OSwzMCAr Mjg5LDYgQEAgc3RydWN0IGRtYV9idWZfb3BzIHsKIAogLyoqCiAgKiBzdHJ1Y3QgZG1hX2J1ZiAt IHNoYXJlZCBidWZmZXIgb2JqZWN0Ci0gKiBAc2l6ZTogc2l6ZSBvZiB0aGUgYnVmZmVyOyBpbnZh cmlhbnQgb3ZlciB0aGUgbGlmZXRpbWUgb2YgdGhlIGJ1ZmZlci4KLSAqIEBmaWxlOiBmaWxlIHBv aW50ZXIgdXNlZCBmb3Igc2hhcmluZyBidWZmZXJzIGFjcm9zcywgYW5kIGZvciByZWZjb3VudGlu Zy4KLSAqIEBhdHRhY2htZW50czogbGlzdCBvZiBkbWFfYnVmX2F0dGFjaG1lbnQgdGhhdCBkZW5v dGVzIGFsbCBkZXZpY2VzIGF0dGFjaGVkLAotICogICAgICAgICAgICAgICBwcm90ZWN0ZWQgYnkg ZG1hX3Jlc3YgbG9jay4KLSAqIEBvcHM6IGRtYV9idWZfb3BzIGFzc29jaWF0ZWQgd2l0aCB0aGlz IGJ1ZmZlciBvYmplY3QuCi0gKiBAbG9jazogdXNlZCBpbnRlcm5hbGx5IHRvIHNlcmlhbGl6ZSBs aXN0IG1hbmlwdWxhdGlvbiwgYXR0YWNoL2RldGFjaCBhbmQKLSAqICAgICAgICB2bWFwL3VubWFw Ci0gKiBAdm1hcHBpbmdfY291bnRlcjogdXNlZCBpbnRlcm5hbGx5IHRvIHJlZmNudCB0aGUgdm1h cHMKLSAqIEB2bWFwX3B0cjogdGhlIGN1cnJlbnQgdm1hcCBwdHIgaWYgdm1hcHBpbmdfY291bnRl ciA+IDAKLSAqIEBleHBfbmFtZTogbmFtZSBvZiB0aGUgZXhwb3J0ZXI7IHVzZWZ1bCBmb3IgZGVi dWdnaW5nLgotICogQG5hbWU6IHVzZXJzcGFjZS1wcm92aWRlZCBuYW1lOyB1c2VmdWwgZm9yIGFj Y291bnRpbmcgYW5kIGRlYnVnZ2luZywKLSAqICAgICAgICBwcm90ZWN0ZWQgYnkgQHJlc3YuCi0g KiBAbmFtZV9sb2NrOiBzcGlubG9jayB0byBwcm90ZWN0IG5hbWUgYWNjZXNzCi0gKiBAb3duZXI6 IHBvaW50ZXIgdG8gZXhwb3J0ZXIgbW9kdWxlOyB1c2VkIGZvciByZWZjb3VudGluZyB3aGVuIGV4 cG9ydGVyIGlzIGEKLSAqICAgICAgICAga2VybmVsIG1vZHVsZS4KLSAqIEBsaXN0X25vZGU6IG5v ZGUgZm9yIGRtYV9idWYgYWNjb3VudGluZyBhbmQgZGVidWdnaW5nLgotICogQHByaXY6IGV4cG9y dGVyIHNwZWNpZmljIHByaXZhdGUgZGF0YSBmb3IgdGhpcyBidWZmZXIgb2JqZWN0LgotICogQHJl c3Y6IHJlc2VydmF0aW9uIG9iamVjdCBsaW5rZWQgdG8gdGhpcyBkbWEtYnVmCi0gKiBAcG9sbDog Zm9yIHVzZXJzcGFjZSBwb2xsIHN1cHBvcnQKLSAqIEBjYl9leGNsOiBmb3IgdXNlcnNwYWNlIHBv bGwgc3VwcG9ydAotICogQGNiX3NoYXJlZDogZm9yIHVzZXJzcGFjZSBwb2xsIHN1cHBvcnQKLSAq IEBzeXNmc19lbnRyeTogZm9yIGV4cG9zaW5nIGluZm9ybWF0aW9uIGFib3V0IHRoaXMgYnVmZmVy IGluIHN5c2ZzLgotICogVGhlIGF0dGFjaG1lbnRfdWlkIG1lbWJlciBvZiBAc3lzZnNfZW50cnkg aXMgcHJvdGVjdGVkIGJ5IGRtYV9yZXN2IGxvY2sKLSAqIGFuZCBpcyBpbmNyZW1lbnRlZCBvbiBl YWNoIGF0dGFjaC4KICAqCiAgKiBUaGlzIHJlcHJlc2VudHMgYSBzaGFyZWQgYnVmZmVyLCBjcmVh dGVkIGJ5IGNhbGxpbmcgZG1hX2J1Zl9leHBvcnQoKS4gVGhlCiAgKiB1c2Vyc3BhY2UgcmVwcmVz ZW50YXRpb24gaXMgYSBub3JtYWwgZmlsZSBkZXNjcmlwdG9yLCB3aGljaCBjYW4gYmUgY3JlYXRl ZCBieQpAQCAtMzI0LDI0ICszMDAsMTAwIEBAIHN0cnVjdCBkbWFfYnVmX29wcyB7CiAgKiBEZXZp Y2UgRE1BIGFjY2VzcyBpcyBoYW5kbGVkIGJ5IHRoZSBzZXBhcmF0ZSAmc3RydWN0IGRtYV9idWZf YXR0YWNobWVudC4KICAqLwogc3RydWN0IGRtYV9idWYgeworCS8qKgorCSAqIEBzaXplOgorCSAq CisJICogU2l6ZSBvZiB0aGUgYnVmZmVyOyBpbnZhcmlhbnQgb3ZlciB0aGUgbGlmZXRpbWUgb2Yg dGhlIGJ1ZmZlci4KKwkgKi8KIAlzaXplX3Qgc2l6ZTsKKworCS8qKgorCSAqIEBmaWxlOgorCSAq CisJICogRmlsZSBwb2ludGVyIHVzZWQgZm9yIHNoYXJpbmcgYnVmZmVycyBhY3Jvc3MsIGFuZCBm b3IgcmVmY291bnRpbmcuCisJICogU2VlIGRtYV9idWZfZ2V0KCkgYW5kIGRtYV9idWZfcHV0KCku CisJICovCiAJc3RydWN0IGZpbGUgKmZpbGU7CisKKwkvKioKKwkgKiBAYXR0YWNobWVudHM6CisJ ICoKKwkgKiBMaXN0IG9mIGRtYV9idWZfYXR0YWNobWVudCB0aGF0IGRlbm90ZXMgYWxsIGRldmlj ZXMgYXR0YWNoZWQsCisJICogcHJvdGVjdGVkIGJ5ICZkbWFfcmVzdiBsb2NrIEByZXN2LgorCSAq LwogCXN0cnVjdCBsaXN0X2hlYWQgYXR0YWNobWVudHM7CisKKwkvKiogQG9wczogZG1hX2J1Zl9v cHMgYXNzb2NpYXRlZCB3aXRoIHRoaXMgYnVmZmVyIG9iamVjdC4gKi8KIAljb25zdCBzdHJ1Y3Qg ZG1hX2J1Zl9vcHMgKm9wczsKKworCS8qKgorCSAqIEBsb2NrOgorCSAqCisJICogVXNlZCBpbnRl cm5hbGx5IHRvIHNlcmlhbGl6ZSBsaXN0IG1hbmlwdWxhdGlvbiwgYXR0YWNoL2RldGFjaCBhbmQK KwkgKiB2bWFwL3VubWFwLiBOb3RlIHRoYXQgaW4gbWFueSBjYXNlcyB0aGlzIGlzIHN1cGVyc2Vl ZGVkIGJ5CisJICogZG1hX3Jlc3ZfbG9jaygpIG9uIEByZXN2LgorCSAqLwogCXN0cnVjdCBtdXRl eCBsb2NrOworCisJLyoqCisJICogQHZtYXBwaW5nX2NvdW50ZXI6CisJICoKKwkgKiBVc2VkIGlu dGVybmFsbHkgdG8gcmVmY250IHRoZSB2bWFwcyByZXR1cm5lZCBieSBkbWFfYnVmX3ZtYXAoKS4K KwkgKiBQcm90ZWN0ZWQgYnkgQGxvY2suCisJICovCiAJdW5zaWduZWQgdm1hcHBpbmdfY291bnRl cjsKKworCS8qKgorCSAqIEB2bWFwX3B0cjoKKwkgKiBUaGUgY3VycmVudCB2bWFwIHB0ciBpZiBA dm1hcHBpbmdfY291bnRlciA+IDAuIFByb3RlY3RlZCBieSBAbG9jay4KKwkgKi8KIAlzdHJ1Y3Qg ZG1hX2J1Zl9tYXAgdm1hcF9wdHI7CisKKwkvKioKKwkgKiBAZXhwX25hbWU6CisJICoKKwkgKiBO YW1lIG9mIHRoZSBleHBvcnRlcjsgdXNlZnVsIGZvciBkZWJ1Z2dpbmcuIFNlZSB0aGUKKwkgKiBE TUFfQlVGX1NFVF9OQU1FIElPQ1RMLgorCSAqLwogCWNvbnN0IGNoYXIgKmV4cF9uYW1lOworCisJ LyoqCisJICogQG5hbWU6CisJICoKKwkgKiBVc2Vyc3BhY2UtcHJvdmlkZWQgbmFtZTsgdXNlZnVs IGZvciBhY2NvdW50aW5nIGFuZCBkZWJ1Z2dpbmcsCisJICogcHJvdGVjdGVkIGJ5IGRtYV9yZXN2 X2xvY2soKSBvbiBAcmVzdiBhbmQgQG5hbWVfbG9jayBmb3IgcmVhZCBhY2Nlc3MuCisJICovCiAJ Y29uc3QgY2hhciAqbmFtZTsKKworCS8qKiBAbmFtZV9sb2NrOiBTcGlubG9jayB0byBwcm90ZWN0 IG5hbWUgYWNjZXMgZm9yIHJlYWQgYWNjZXNzLiAqLwogCXNwaW5sb2NrX3QgbmFtZV9sb2NrOwor CisJLyoqCisJICogQG93bmVyOgorCSAqCisJICogUG9pbnRlciB0byBleHBvcnRlciBtb2R1bGU7 IHVzZWQgZm9yIHJlZmNvdW50aW5nIHdoZW4gZXhwb3J0ZXIgaXMgYQorCSAqIGtlcm5lbCBtb2R1 bGUuCisJICovCiAJc3RydWN0IG1vZHVsZSAqb3duZXI7CisKKwkvKiogQGxpc3Rfbm9kZTogbm9k ZSBmb3IgZG1hX2J1ZiBhY2NvdW50aW5nIGFuZCBkZWJ1Z2dpbmcuICovCiAJc3RydWN0IGxpc3Rf aGVhZCBsaXN0X25vZGU7CisKKwkvKiogQHByaXY6IGV4cG9ydGVyIHNwZWNpZmljIHByaXZhdGUg ZGF0YSBmb3IgdGhpcyBidWZmZXIgb2JqZWN0LiAqLwogCXZvaWQgKnByaXY7CisKKwkvKioKKwkg KiBAcmVzdjoKKwkgKgorCSAqIFJlc2VydmF0aW9uIG9iamVjdCBsaW5rZWQgdG8gdGhpcyBkbWEt YnVmLgorCSAqLwogCXN0cnVjdCBkbWFfcmVzdiAqcmVzdjsKIAotCS8qIHBvbGwgc3VwcG9ydCAq LworCS8qKiBAcG9sbDogZm9yIHVzZXJzcGFjZSBwb2xsIHN1cHBvcnQgKi8KIAl3YWl0X3F1ZXVl X2hlYWRfdCBwb2xsOwogCisJLyoqIEBjYl9leGNsOiBmb3IgdXNlcnNwYWNlIHBvbGwgc3VwcG9y dCAqLworCS8qKiBAY2Jfc2hhcmVkOiBmb3IgdXNlcnNwYWNlIHBvbGwgc3VwcG9ydCAqLwogCXN0 cnVjdCBkbWFfYnVmX3BvbGxfY2JfdCB7CiAJCXN0cnVjdCBkbWFfZmVuY2VfY2IgY2I7CiAJCXdh aXRfcXVldWVfaGVhZF90ICpwb2xsOwpAQCAtMzQ5LDEwICs0MDEsMjIgQEAgc3RydWN0IGRtYV9i dWYgewogCQlfX3BvbGxfdCBhY3RpdmU7CiAJfSBjYl9leGNsLCBjYl9zaGFyZWQ7CiAjaWZkZWYg Q09ORklHX0RNQUJVRl9TWVNGU19TVEFUUwotCS8qIGZvciBzeXNmcyBzdGF0cyAqLworCS8qKgor CSAqIEBzeXNmc19lbnRyeToKKwkgKgorCSAqIEZvciBleHBvc2luZyBpbmZvcm1hdGlvbiBhYm91 dCB0aGlzIGJ1ZmZlciBpbiBzeXNmcy4gU2VlIGFsc28KKwkgKiBgRE1BLUJVRiBzdGF0aXN0aWNz YF8gZm9yIHRoZSB1YXBpIHRoaXMgZW5hYmxlcy4KKwkgKi8KIAlzdHJ1Y3QgZG1hX2J1Zl9zeXNm c19lbnRyeSB7CiAJCXN0cnVjdCBrb2JqZWN0IGtvYmo7CiAJCXN0cnVjdCBkbWFfYnVmICpkbWFi dWY7CisKKwkJLyoqCisJCSAqIEBzeXNmc19lbnRyeS5hdHRhY2htZW50X3VpZDoKKwkJICoKKwkJ ICogVGhpcyBpcyBwcm90ZWN0ZWQgYnkgdGhlIGRtYV9yZXN2X2xvY2soKSBvbiBAcmVzdiBhbmQg aXMKKwkJICogaW5jcmVtZW50ZWQgb24gZWFjaCBhdHRhY2guCisJCSAqLwogCQl1bnNpZ25lZCBp bnQgYXR0YWNobWVudF91aWQ7CiAJCXN0cnVjdCBrc2V0ICphdHRhY2hfc3RhdHNfa3NldDsKIAl9 ICpzeXNmc19lbnRyeTsKLS0gCjIuMzIuMC5yYzIKCl9fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fCkludGVsLWdmeCBtYWlsaW5nIGxpc3QKSW50ZWwtZ2Z4QGxp c3RzLmZyZWVkZXNrdG9wLm9yZwpodHRwczovL2xpc3RzLmZyZWVkZXNrdG9wLm9yZy9tYWlsbWFu L2xpc3RpbmZvL2ludGVsLWdmeAo=