All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v3] dma-buf: Add a capabilities directory
@ 2022-05-27  7:34 Simon Ser
  2022-05-30  7:09 ` Christian König
  0 siblings, 1 reply; 8+ messages in thread
From: Simon Ser @ 2022-05-27  7:34 UTC (permalink / raw)
  To: dri-devel; +Cc: Jason Ekstrand, Greg KH, Christian König, Daniel Vetter

To discover support for new DMA-BUF IOCTLs, user-space has no
choice but to try to perform the IOCTL on an existing DMA-BUF.
However, user-space may want to figure out whether or not the
IOCTL is available before it has a DMA-BUF at hand, e.g. at
initialization time in a Wayland compositor.

Add a /sys/kernel/dmabuf/caps directory which allows the DMA-BUF
subsystem to advertise supported features. Add a
sync_file_import_export entry which indicates that importing and
exporting sync_files from/to DMA-BUFs is supported.

v2: Add missing files lost in a rebase

v3:
- Create separate file in Documentation/ABI/testing/, add it to
  MAINTAINERS
- Fix kernel version (Daniel)
- Remove unnecessary brackets (Jason)
- Fix SPDX comment style

Signed-off-by: Simon Ser <contact@emersion.fr>
Reviewed-by: Jason Ekstrand <jason.ekstrand@collabora.com>
Cc: Daniel Vetter <daniel.vetter@ffwll.ch>
Cc: Bas Nieuwenhuizen <bas@basnieuwenhuizen.nl>
Cc: Christian König <christian.koenig@amd.com>
Cc: Greg KH <greg@kroah.com>
---
 .../ABI/testing/sysfs-kernel-dmabuf-caps      | 13 +++++
 MAINTAINERS                                   |  1 +
 drivers/dma-buf/Makefile                      |  2 +-
 drivers/dma-buf/dma-buf-sysfs-caps.c          | 51 +++++++++++++++++++
 drivers/dma-buf/dma-buf-sysfs-caps.h          | 16 ++++++
 drivers/dma-buf/dma-buf-sysfs-stats.c         | 16 ++----
 drivers/dma-buf/dma-buf-sysfs-stats.h         |  6 ++-
 drivers/dma-buf/dma-buf.c                     | 43 ++++++++++++++--
 include/uapi/linux/dma-buf.h                  |  6 +++
 9 files changed, 134 insertions(+), 20 deletions(-)
 create mode 100644 Documentation/ABI/testing/sysfs-kernel-dmabuf-caps
 create mode 100644 drivers/dma-buf/dma-buf-sysfs-caps.c
 create mode 100644 drivers/dma-buf/dma-buf-sysfs-caps.h

diff --git a/Documentation/ABI/testing/sysfs-kernel-dmabuf-caps b/Documentation/ABI/testing/sysfs-kernel-dmabuf-caps
new file mode 100644
index 000000000000..f83af422fd18
--- /dev/null
+++ b/Documentation/ABI/testing/sysfs-kernel-dmabuf-caps
@@ -0,0 +1,13 @@
+What:		/sys/kernel/dmabuf/caps
+Date:		May 2022
+KernelVersion:	v5.20
+Contact:	Simon Ser <contact@emersion.fr>
+Description:	This directory advertises DMA-BUF capabilities supported by the
+		kernel.
+
+What:		/sys/kernel/dmabuf/caps/sync_file_import_export
+Date:		May 2022
+KernelVersion:	v5.20
+Contact:	Simon Ser <contact@emersion.fr>
+Description:	This file is read-only and advertises support for importing and
+		exporting sync_files from/to DMA-BUFs.
diff --git a/MAINTAINERS b/MAINTAINERS
index 11da16bfa123..8966686f7231 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -5871,6 +5871,7 @@ L:	dri-devel@lists.freedesktop.org
 L:	linaro-mm-sig@lists.linaro.org (moderated for non-subscribers)
 S:	Maintained
 T:	git git://anongit.freedesktop.org/drm/drm-misc
+F:	Documentation/ABI/testing/sysfs-kernel-dmabuf-caps
 F:	Documentation/driver-api/dma-buf.rst
 F:	drivers/dma-buf/
 F:	include/linux/*fence.h
diff --git a/drivers/dma-buf/Makefile b/drivers/dma-buf/Makefile
index 4c9eb53ba3f8..afc874272710 100644
--- a/drivers/dma-buf/Makefile
+++ b/drivers/dma-buf/Makefile
@@ -1,6 +1,6 @@
 # SPDX-License-Identifier: GPL-2.0-only
 obj-y := dma-buf.o dma-fence.o dma-fence-array.o dma-fence-chain.o \
-	 dma-resv.o
+	 dma-resv.o dma-buf-sysfs-caps.o
 obj-$(CONFIG_DMABUF_HEAPS)	+= dma-heap.o
 obj-$(CONFIG_DMABUF_HEAPS)	+= heaps/
 obj-$(CONFIG_SYNC_FILE)		+= sync_file.o
diff --git a/drivers/dma-buf/dma-buf-sysfs-caps.c b/drivers/dma-buf/dma-buf-sysfs-caps.c
new file mode 100644
index 000000000000..82b91eb874a9
--- /dev/null
+++ b/drivers/dma-buf/dma-buf-sysfs-caps.c
@@ -0,0 +1,51 @@
+// SPDX-License-Identifier: GPL-2.0-only
+/*
+ * DMA-BUF sysfs capabilities.
+ *
+ * Copyright (C) 2022 Simon Ser
+ */
+
+#include <linux/kobject.h>
+#include <linux/sysfs.h>
+
+#include "dma-buf-sysfs-caps.h"
+
+static ssize_t sync_file_import_export_show(struct kobject *kobj,
+					    struct kobj_attribute *attr,
+					    char *buf)
+{
+	return sysfs_emit(buf, "1\n");
+}
+
+static struct kobj_attribute dma_buf_sync_file_import_export_attr =
+	__ATTR_RO(sync_file_import_export);
+
+static struct attribute *dma_buf_caps_attrs[] = {
+	&dma_buf_sync_file_import_export_attr.attr,
+	NULL,
+};
+
+static const struct attribute_group dma_buf_caps_attr_group = {
+	.attrs = dma_buf_caps_attrs,
+};
+
+static struct kobject *dma_buf_caps_kobj;
+
+int dma_buf_init_sysfs_capabilities(struct kset *kset)
+{
+	int ret;
+
+	dma_buf_caps_kobj = kobject_create_and_add("caps", &kset->kobj);
+	if (!dma_buf_caps_kobj)
+		return -ENOMEM;
+
+	ret = sysfs_create_group(dma_buf_caps_kobj, &dma_buf_caps_attr_group);
+	if (ret)
+		kobject_put(dma_buf_caps_kobj);
+	return ret;
+}
+
+void dma_buf_uninit_sysfs_capabilities(void)
+{
+	kobject_put(dma_buf_caps_kobj);
+}
diff --git a/drivers/dma-buf/dma-buf-sysfs-caps.h b/drivers/dma-buf/dma-buf-sysfs-caps.h
new file mode 100644
index 000000000000..d7bcef490b31
--- /dev/null
+++ b/drivers/dma-buf/dma-buf-sysfs-caps.h
@@ -0,0 +1,16 @@
+/* SPDX-License-Identifier: GPL-2.0-only */
+/*
+ * DMA-BUF sysfs capabilities.
+ *
+ * Copyright (C) 2022 Simon Ser
+ */
+
+#ifndef _DMA_BUF_SYSFS_CAPS_H
+#define _DMA_BUF_SYSFS_CAPS_H
+
+struct kset;
+
+int dma_buf_init_sysfs_capabilities(struct kset *kset);
+void dma_buf_uninit_sysfs_capabilities(void);
+
+#endif // _DMA_BUF_SYSFS_CAPS_H
diff --git a/drivers/dma-buf/dma-buf-sysfs-stats.c b/drivers/dma-buf/dma-buf-sysfs-stats.c
index 2bba0babcb62..e2e62f83ce18 100644
--- a/drivers/dma-buf/dma-buf-sysfs-stats.c
+++ b/drivers/dma-buf/dma-buf-sysfs-stats.c
@@ -141,23 +141,14 @@ static const struct kset_uevent_ops dmabuf_sysfs_no_uevent_ops = {
 	.filter = dmabuf_sysfs_uevent_filter,
 };
 
-static struct kset *dma_buf_stats_kset;
 static struct kset *dma_buf_per_buffer_stats_kset;
-int dma_buf_init_sysfs_statistics(void)
+int dma_buf_init_sysfs_statistics(struct kset *kset)
 {
-	dma_buf_stats_kset = kset_create_and_add("dmabuf",
-						 &dmabuf_sysfs_no_uevent_ops,
-						 kernel_kobj);
-	if (!dma_buf_stats_kset)
-		return -ENOMEM;
-
 	dma_buf_per_buffer_stats_kset = kset_create_and_add("buffers",
 							    &dmabuf_sysfs_no_uevent_ops,
-							    &dma_buf_stats_kset->kobj);
-	if (!dma_buf_per_buffer_stats_kset) {
-		kset_unregister(dma_buf_stats_kset);
+							    &kset->kobj);
+	if (!dma_buf_per_buffer_stats_kset)
 		return -ENOMEM;
-	}
 
 	return 0;
 }
@@ -165,7 +156,6 @@ int dma_buf_init_sysfs_statistics(void)
 void dma_buf_uninit_sysfs_statistics(void)
 {
 	kset_unregister(dma_buf_per_buffer_stats_kset);
-	kset_unregister(dma_buf_stats_kset);
 }
 
 int dma_buf_stats_setup(struct dma_buf *dmabuf)
diff --git a/drivers/dma-buf/dma-buf-sysfs-stats.h b/drivers/dma-buf/dma-buf-sysfs-stats.h
index a49c6e2650cc..798c54fb8ee3 100644
--- a/drivers/dma-buf/dma-buf-sysfs-stats.h
+++ b/drivers/dma-buf/dma-buf-sysfs-stats.h
@@ -8,9 +8,11 @@
 #ifndef _DMA_BUF_SYSFS_STATS_H
 #define _DMA_BUF_SYSFS_STATS_H
 
+struct kset;
+
 #ifdef CONFIG_DMABUF_SYSFS_STATS
 
-int dma_buf_init_sysfs_statistics(void);
+int dma_buf_init_sysfs_statistics(struct kset *kset);
 void dma_buf_uninit_sysfs_statistics(void);
 
 int dma_buf_stats_setup(struct dma_buf *dmabuf);
@@ -18,7 +20,7 @@ int dma_buf_stats_setup(struct dma_buf *dmabuf);
 void dma_buf_stats_teardown(struct dma_buf *dmabuf);
 #else
 
-static inline int dma_buf_init_sysfs_statistics(void)
+static inline int dma_buf_init_sysfs_statistics(struct kset *kset)
 {
 	return 0;
 }
diff --git a/drivers/dma-buf/dma-buf.c b/drivers/dma-buf/dma-buf.c
index 5e1b0534b3ce..b5c5a5050508 100644
--- a/drivers/dma-buf/dma-buf.c
+++ b/drivers/dma-buf/dma-buf.c
@@ -30,6 +30,7 @@
 #include <uapi/linux/dma-buf.h>
 #include <uapi/linux/magic.h>
 
+#include "dma-buf-sysfs-caps.h"
 #include "dma-buf-sysfs-stats.h"
 
 static inline int is_dma_buf_file(struct file *);
@@ -1546,22 +1547,54 @@ static inline void dma_buf_uninit_debugfs(void)
 }
 #endif
 
+/* Capabilities and statistics files do not need to send uevents. */
+static int dmabuf_sysfs_uevent_filter(struct kobject *kobj)
+{
+	return 0;
+}
+
+static const struct kset_uevent_ops dmabuf_sysfs_no_uevent_ops = {
+	.filter = dmabuf_sysfs_uevent_filter,
+};
+
+static struct kset *dma_buf_kset;
+
 static int __init dma_buf_init(void)
 {
 	int ret;
 
-	ret = dma_buf_init_sysfs_statistics();
+	dma_buf_kset = kset_create_and_add("dmabuf",
+					   &dmabuf_sysfs_no_uevent_ops,
+					   kernel_kobj);
+	if (!dma_buf_kset)
+		return -ENOMEM;
+
+	ret = dma_buf_init_sysfs_capabilities(dma_buf_kset);
 	if (ret)
-		return ret;
+		goto err_kset;
+
+	ret = dma_buf_init_sysfs_statistics(dma_buf_kset);
+	if (ret)
+		goto err_sysfs_caps;
 
 	dma_buf_mnt = kern_mount(&dma_buf_fs_type);
-	if (IS_ERR(dma_buf_mnt))
-		return PTR_ERR(dma_buf_mnt);
+	if (IS_ERR(dma_buf_mnt)) {
+		ret = PTR_ERR(dma_buf_mnt);
+		goto err_sysfs_stats;
+	}
 
 	mutex_init(&db_list.lock);
 	INIT_LIST_HEAD(&db_list.head);
 	dma_buf_init_debugfs();
 	return 0;
+
+err_sysfs_stats:
+	dma_buf_uninit_sysfs_statistics();
+err_sysfs_caps:
+	dma_buf_uninit_sysfs_capabilities();
+err_kset:
+	kset_unregister(dma_buf_kset);
+	return ret;
 }
 subsys_initcall(dma_buf_init);
 
@@ -1570,5 +1603,7 @@ static void __exit dma_buf_deinit(void)
 	dma_buf_uninit_debugfs();
 	kern_unmount(dma_buf_mnt);
 	dma_buf_uninit_sysfs_statistics();
+	dma_buf_uninit_sysfs_capabilities();
+	kset_unregister(dma_buf_kset);
 }
 __exitcall(dma_buf_deinit);
diff --git a/include/uapi/linux/dma-buf.h b/include/uapi/linux/dma-buf.h
index 70e213a0d7d9..ab3afd5da75a 100644
--- a/include/uapi/linux/dma-buf.h
+++ b/include/uapi/linux/dma-buf.h
@@ -114,6 +114,9 @@ struct dma_buf_sync {
  * ordering via these fences, it is the respnosibility of userspace to use
  * locks or other mechanisms to ensure that no other context adds fences or
  * submits work between steps 1 and 3 above.
+ *
+ * Userspace can check the availability of this API via
+ * /sys/kernel/dmabuf/caps/sync_file_import_export.
  */
 struct dma_buf_export_sync_file {
 	/**
@@ -146,6 +149,9 @@ struct dma_buf_export_sync_file {
  * synchronized APIs such as Vulkan to inter-op with dma-buf consumers
  * which expect implicit synchronization such as OpenGL or most media
  * drivers/video.
+ *
+ * Userspace can check the availability of this API via
+ * /sys/kernel/dmabuf/caps/sync_file_import_export.
  */
 struct dma_buf_import_sync_file {
 	/**
-- 
2.36.1



^ permalink raw reply related	[flat|nested] 8+ messages in thread

* Re: [PATCH v3] dma-buf: Add a capabilities directory
  2022-05-27  7:34 [PATCH v3] dma-buf: Add a capabilities directory Simon Ser
@ 2022-05-30  7:09 ` Christian König
  2022-05-30  7:20   ` Greg KH
  2022-05-30  7:55   ` Simon Ser
  0 siblings, 2 replies; 8+ messages in thread
From: Christian König @ 2022-05-30  7:09 UTC (permalink / raw)
  To: Simon Ser, dri-devel; +Cc: Jason Ekstrand, Greg KH, Daniel Vetter

Am 27.05.22 um 09:34 schrieb Simon Ser:
> To discover support for new DMA-BUF IOCTLs, user-space has no
> choice but to try to perform the IOCTL on an existing DMA-BUF.
> However, user-space may want to figure out whether or not the
> IOCTL is available before it has a DMA-BUF at hand, e.g. at
> initialization time in a Wayland compositor.
>
> Add a /sys/kernel/dmabuf/caps directory which allows the DMA-BUF
> subsystem to advertise supported features. Add a
> sync_file_import_export entry which indicates that importing and
> exporting sync_files from/to DMA-BUFs is supported.

I find a separate directory rather unusual, but can't come up with any 
better idea either.

IIRC the security module had a mask file with names for the supported 
capabilities.

>
> v2: Add missing files lost in a rebase
>
> v3:
> - Create separate file in Documentation/ABI/testing/, add it to
>    MAINTAINERS
> - Fix kernel version (Daniel)
> - Remove unnecessary brackets (Jason)
> - Fix SPDX comment style
>
> Signed-off-by: Simon Ser <contact@emersion.fr>
> Reviewed-by: Jason Ekstrand <jason.ekstrand@collabora.com>
> Cc: Daniel Vetter <daniel.vetter@ffwll.ch>
> Cc: Bas Nieuwenhuizen <bas@basnieuwenhuizen.nl>
> Cc: Christian König <christian.koenig@amd.com>
> Cc: Greg KH <greg@kroah.com>
> ---
>   .../ABI/testing/sysfs-kernel-dmabuf-caps      | 13 +++++
>   MAINTAINERS                                   |  1 +
>   drivers/dma-buf/Makefile                      |  2 +-
>   drivers/dma-buf/dma-buf-sysfs-caps.c          | 51 +++++++++++++++++++
>   drivers/dma-buf/dma-buf-sysfs-caps.h          | 16 ++++++
>   drivers/dma-buf/dma-buf-sysfs-stats.c         | 16 ++----
>   drivers/dma-buf/dma-buf-sysfs-stats.h         |  6 ++-
>   drivers/dma-buf/dma-buf.c                     | 43 ++++++++++++++--
>   include/uapi/linux/dma-buf.h                  |  6 +++
>   9 files changed, 134 insertions(+), 20 deletions(-)
>   create mode 100644 Documentation/ABI/testing/sysfs-kernel-dmabuf-caps
>   create mode 100644 drivers/dma-buf/dma-buf-sysfs-caps.c
>   create mode 100644 drivers/dma-buf/dma-buf-sysfs-caps.h
>
> diff --git a/Documentation/ABI/testing/sysfs-kernel-dmabuf-caps b/Documentation/ABI/testing/sysfs-kernel-dmabuf-caps
> new file mode 100644
> index 000000000000..f83af422fd18
> --- /dev/null
> +++ b/Documentation/ABI/testing/sysfs-kernel-dmabuf-caps
> @@ -0,0 +1,13 @@
> +What:		/sys/kernel/dmabuf/caps
> +Date:		May 2022
> +KernelVersion:	v5.20
> +Contact:	Simon Ser <contact@emersion.fr>
> +Description:	This directory advertises DMA-BUF capabilities supported by the
> +		kernel.
> +
> +What:		/sys/kernel/dmabuf/caps/sync_file_import_export
> +Date:		May 2022
> +KernelVersion:	v5.20
> +Contact:	Simon Ser <contact@emersion.fr>
> +Description:	This file is read-only and advertises support for importing and
> +		exporting sync_files from/to DMA-BUFs.
> diff --git a/MAINTAINERS b/MAINTAINERS
> index 11da16bfa123..8966686f7231 100644
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -5871,6 +5871,7 @@ L:	dri-devel@lists.freedesktop.org
>   L:	linaro-mm-sig@lists.linaro.org (moderated for non-subscribers)
>   S:	Maintained
>   T:	git git://anongit.freedesktop.org/drm/drm-misc
> +F:	Documentation/ABI/testing/sysfs-kernel-dmabuf-caps
>   F:	Documentation/driver-api/dma-buf.rst
>   F:	drivers/dma-buf/
>   F:	include/linux/*fence.h
> diff --git a/drivers/dma-buf/Makefile b/drivers/dma-buf/Makefile
> index 4c9eb53ba3f8..afc874272710 100644
> --- a/drivers/dma-buf/Makefile
> +++ b/drivers/dma-buf/Makefile
> @@ -1,6 +1,6 @@
>   # SPDX-License-Identifier: GPL-2.0-only
>   obj-y := dma-buf.o dma-fence.o dma-fence-array.o dma-fence-chain.o \
> -	 dma-resv.o
> +	 dma-resv.o dma-buf-sysfs-caps.o
>   obj-$(CONFIG_DMABUF_HEAPS)	+= dma-heap.o
>   obj-$(CONFIG_DMABUF_HEAPS)	+= heaps/
>   obj-$(CONFIG_SYNC_FILE)		+= sync_file.o
> diff --git a/drivers/dma-buf/dma-buf-sysfs-caps.c b/drivers/dma-buf/dma-buf-sysfs-caps.c
> new file mode 100644
> index 000000000000..82b91eb874a9
> --- /dev/null
> +++ b/drivers/dma-buf/dma-buf-sysfs-caps.c
> @@ -0,0 +1,51 @@
> +// SPDX-License-Identifier: GPL-2.0-only
> +/*
> + * DMA-BUF sysfs capabilities.
> + *
> + * Copyright (C) 2022 Simon Ser
> + */
> +
> +#include <linux/kobject.h>
> +#include <linux/sysfs.h>
> +
> +#include "dma-buf-sysfs-caps.h"
> +
> +static ssize_t sync_file_import_export_show(struct kobject *kobj,
> +					    struct kobj_attribute *attr,
> +					    char *buf)
> +{
> +	return sysfs_emit(buf, "1\n");
> +}
> +
> +static struct kobj_attribute dma_buf_sync_file_import_export_attr =
> +	__ATTR_RO(sync_file_import_export);
> +
> +static struct attribute *dma_buf_caps_attrs[] = {
> +	&dma_buf_sync_file_import_export_attr.attr,
> +	NULL,
> +};
> +
> +static const struct attribute_group dma_buf_caps_attr_group = {
> +	.attrs = dma_buf_caps_attrs,
> +};

Didn't we had macros for those? I think I have seen something for that.

Apart from those two random thoughts looks good to me as well.

Regards,
Christian.

> +
> +static struct kobject *dma_buf_caps_kobj;
> +
> +int dma_buf_init_sysfs_capabilities(struct kset *kset)
> +{
> +	int ret;
> +
> +	dma_buf_caps_kobj = kobject_create_and_add("caps", &kset->kobj);
> +	if (!dma_buf_caps_kobj)
> +		return -ENOMEM;
> +
> +	ret = sysfs_create_group(dma_buf_caps_kobj, &dma_buf_caps_attr_group);
> +	if (ret)
> +		kobject_put(dma_buf_caps_kobj);
> +	return ret;
> +}
> +
> +void dma_buf_uninit_sysfs_capabilities(void)
> +{
> +	kobject_put(dma_buf_caps_kobj);
> +}
> diff --git a/drivers/dma-buf/dma-buf-sysfs-caps.h b/drivers/dma-buf/dma-buf-sysfs-caps.h
> new file mode 100644
> index 000000000000..d7bcef490b31
> --- /dev/null
> +++ b/drivers/dma-buf/dma-buf-sysfs-caps.h
> @@ -0,0 +1,16 @@
> +/* SPDX-License-Identifier: GPL-2.0-only */
> +/*
> + * DMA-BUF sysfs capabilities.
> + *
> + * Copyright (C) 2022 Simon Ser
> + */
> +
> +#ifndef _DMA_BUF_SYSFS_CAPS_H
> +#define _DMA_BUF_SYSFS_CAPS_H
> +
> +struct kset;
> +
> +int dma_buf_init_sysfs_capabilities(struct kset *kset);
> +void dma_buf_uninit_sysfs_capabilities(void);
> +
> +#endif // _DMA_BUF_SYSFS_CAPS_H
> diff --git a/drivers/dma-buf/dma-buf-sysfs-stats.c b/drivers/dma-buf/dma-buf-sysfs-stats.c
> index 2bba0babcb62..e2e62f83ce18 100644
> --- a/drivers/dma-buf/dma-buf-sysfs-stats.c
> +++ b/drivers/dma-buf/dma-buf-sysfs-stats.c
> @@ -141,23 +141,14 @@ static const struct kset_uevent_ops dmabuf_sysfs_no_uevent_ops = {
>   	.filter = dmabuf_sysfs_uevent_filter,
>   };
>   
> -static struct kset *dma_buf_stats_kset;
>   static struct kset *dma_buf_per_buffer_stats_kset;
> -int dma_buf_init_sysfs_statistics(void)
> +int dma_buf_init_sysfs_statistics(struct kset *kset)
>   {
> -	dma_buf_stats_kset = kset_create_and_add("dmabuf",
> -						 &dmabuf_sysfs_no_uevent_ops,
> -						 kernel_kobj);
> -	if (!dma_buf_stats_kset)
> -		return -ENOMEM;
> -
>   	dma_buf_per_buffer_stats_kset = kset_create_and_add("buffers",
>   							    &dmabuf_sysfs_no_uevent_ops,
> -							    &dma_buf_stats_kset->kobj);
> -	if (!dma_buf_per_buffer_stats_kset) {
> -		kset_unregister(dma_buf_stats_kset);
> +							    &kset->kobj);
> +	if (!dma_buf_per_buffer_stats_kset)
>   		return -ENOMEM;
> -	}
>   
>   	return 0;
>   }
> @@ -165,7 +156,6 @@ int dma_buf_init_sysfs_statistics(void)
>   void dma_buf_uninit_sysfs_statistics(void)
>   {
>   	kset_unregister(dma_buf_per_buffer_stats_kset);
> -	kset_unregister(dma_buf_stats_kset);
>   }
>   
>   int dma_buf_stats_setup(struct dma_buf *dmabuf)
> diff --git a/drivers/dma-buf/dma-buf-sysfs-stats.h b/drivers/dma-buf/dma-buf-sysfs-stats.h
> index a49c6e2650cc..798c54fb8ee3 100644
> --- a/drivers/dma-buf/dma-buf-sysfs-stats.h
> +++ b/drivers/dma-buf/dma-buf-sysfs-stats.h
> @@ -8,9 +8,11 @@
>   #ifndef _DMA_BUF_SYSFS_STATS_H
>   #define _DMA_BUF_SYSFS_STATS_H
>   
> +struct kset;
> +
>   #ifdef CONFIG_DMABUF_SYSFS_STATS
>   
> -int dma_buf_init_sysfs_statistics(void);
> +int dma_buf_init_sysfs_statistics(struct kset *kset);
>   void dma_buf_uninit_sysfs_statistics(void);
>   
>   int dma_buf_stats_setup(struct dma_buf *dmabuf);
> @@ -18,7 +20,7 @@ int dma_buf_stats_setup(struct dma_buf *dmabuf);
>   void dma_buf_stats_teardown(struct dma_buf *dmabuf);
>   #else
>   
> -static inline int dma_buf_init_sysfs_statistics(void)
> +static inline int dma_buf_init_sysfs_statistics(struct kset *kset)
>   {
>   	return 0;
>   }
> diff --git a/drivers/dma-buf/dma-buf.c b/drivers/dma-buf/dma-buf.c
> index 5e1b0534b3ce..b5c5a5050508 100644
> --- a/drivers/dma-buf/dma-buf.c
> +++ b/drivers/dma-buf/dma-buf.c
> @@ -30,6 +30,7 @@
>   #include <uapi/linux/dma-buf.h>
>   #include <uapi/linux/magic.h>
>   
> +#include "dma-buf-sysfs-caps.h"
>   #include "dma-buf-sysfs-stats.h"
>   
>   static inline int is_dma_buf_file(struct file *);
> @@ -1546,22 +1547,54 @@ static inline void dma_buf_uninit_debugfs(void)
>   }
>   #endif
>   
> +/* Capabilities and statistics files do not need to send uevents. */
> +static int dmabuf_sysfs_uevent_filter(struct kobject *kobj)
> +{
> +	return 0;
> +}
> +
> +static const struct kset_uevent_ops dmabuf_sysfs_no_uevent_ops = {
> +	.filter = dmabuf_sysfs_uevent_filter,
> +};
> +
> +static struct kset *dma_buf_kset;
> +
>   static int __init dma_buf_init(void)
>   {
>   	int ret;
>   
> -	ret = dma_buf_init_sysfs_statistics();
> +	dma_buf_kset = kset_create_and_add("dmabuf",
> +					   &dmabuf_sysfs_no_uevent_ops,
> +					   kernel_kobj);
> +	if (!dma_buf_kset)
> +		return -ENOMEM;
> +
> +	ret = dma_buf_init_sysfs_capabilities(dma_buf_kset);
>   	if (ret)
> -		return ret;
> +		goto err_kset;
> +
> +	ret = dma_buf_init_sysfs_statistics(dma_buf_kset);
> +	if (ret)
> +		goto err_sysfs_caps;
>   
>   	dma_buf_mnt = kern_mount(&dma_buf_fs_type);
> -	if (IS_ERR(dma_buf_mnt))
> -		return PTR_ERR(dma_buf_mnt);
> +	if (IS_ERR(dma_buf_mnt)) {
> +		ret = PTR_ERR(dma_buf_mnt);
> +		goto err_sysfs_stats;
> +	}
>   
>   	mutex_init(&db_list.lock);
>   	INIT_LIST_HEAD(&db_list.head);
>   	dma_buf_init_debugfs();
>   	return 0;
> +
> +err_sysfs_stats:
> +	dma_buf_uninit_sysfs_statistics();
> +err_sysfs_caps:
> +	dma_buf_uninit_sysfs_capabilities();
> +err_kset:
> +	kset_unregister(dma_buf_kset);
> +	return ret;
>   }
>   subsys_initcall(dma_buf_init);
>   
> @@ -1570,5 +1603,7 @@ static void __exit dma_buf_deinit(void)
>   	dma_buf_uninit_debugfs();
>   	kern_unmount(dma_buf_mnt);
>   	dma_buf_uninit_sysfs_statistics();
> +	dma_buf_uninit_sysfs_capabilities();
> +	kset_unregister(dma_buf_kset);
>   }
>   __exitcall(dma_buf_deinit);
> diff --git a/include/uapi/linux/dma-buf.h b/include/uapi/linux/dma-buf.h
> index 70e213a0d7d9..ab3afd5da75a 100644
> --- a/include/uapi/linux/dma-buf.h
> +++ b/include/uapi/linux/dma-buf.h
> @@ -114,6 +114,9 @@ struct dma_buf_sync {
>    * ordering via these fences, it is the respnosibility of userspace to use
>    * locks or other mechanisms to ensure that no other context adds fences or
>    * submits work between steps 1 and 3 above.
> + *
> + * Userspace can check the availability of this API via
> + * /sys/kernel/dmabuf/caps/sync_file_import_export.
>    */
>   struct dma_buf_export_sync_file {
>   	/**
> @@ -146,6 +149,9 @@ struct dma_buf_export_sync_file {
>    * synchronized APIs such as Vulkan to inter-op with dma-buf consumers
>    * which expect implicit synchronization such as OpenGL or most media
>    * drivers/video.
> + *
> + * Userspace can check the availability of this API via
> + * /sys/kernel/dmabuf/caps/sync_file_import_export.
>    */
>   struct dma_buf_import_sync_file {
>   	/**


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH v3] dma-buf: Add a capabilities directory
  2022-05-30  7:09 ` Christian König
@ 2022-05-30  7:20   ` Greg KH
  2022-05-30  8:15     ` Simon Ser
  2022-05-30  7:55   ` Simon Ser
  1 sibling, 1 reply; 8+ messages in thread
From: Greg KH @ 2022-05-30  7:20 UTC (permalink / raw)
  To: Christian König, Simon Ser; +Cc: Jason Ekstrand, dri-devel, Daniel Vetter

On Mon, May 30, 2022 at 09:09:30AM +0200, Christian König wrote:
> Am 27.05.22 um 09:34 schrieb Simon Ser:
> > To discover support for new DMA-BUF IOCTLs, user-space has no
> > choice but to try to perform the IOCTL on an existing DMA-BUF.
> > However, user-space may want to figure out whether or not the
> > IOCTL is available before it has a DMA-BUF at hand, e.g. at
> > initialization time in a Wayland compositor.
> > 
> > Add a /sys/kernel/dmabuf/caps directory which allows the DMA-BUF
> > subsystem to advertise supported features. Add a
> > sync_file_import_export entry which indicates that importing and
> > exporting sync_files from/to DMA-BUFs is supported.
> 
> I find a separate directory rather unusual, but can't come up with any
> better idea either.
> 
> IIRC the security module had a mask file with names for the supported
> capabilities.
> 
> > 
> > v2: Add missing files lost in a rebase
> > 
> > v3:
> > - Create separate file in Documentation/ABI/testing/, add it to
> >    MAINTAINERS
> > - Fix kernel version (Daniel)
> > - Remove unnecessary brackets (Jason)
> > - Fix SPDX comment style
> > 
> > Signed-off-by: Simon Ser <contact@emersion.fr>
> > Reviewed-by: Jason Ekstrand <jason.ekstrand@collabora.com>
> > Cc: Daniel Vetter <daniel.vetter@ffwll.ch>
> > Cc: Bas Nieuwenhuizen <bas@basnieuwenhuizen.nl>
> > Cc: Christian König <christian.koenig@amd.com>
> > Cc: Greg KH <greg@kroah.com>
> > ---
> >   .../ABI/testing/sysfs-kernel-dmabuf-caps      | 13 +++++
> >   MAINTAINERS                                   |  1 +
> >   drivers/dma-buf/Makefile                      |  2 +-
> >   drivers/dma-buf/dma-buf-sysfs-caps.c          | 51 +++++++++++++++++++
> >   drivers/dma-buf/dma-buf-sysfs-caps.h          | 16 ++++++
> >   drivers/dma-buf/dma-buf-sysfs-stats.c         | 16 ++----
> >   drivers/dma-buf/dma-buf-sysfs-stats.h         |  6 ++-
> >   drivers/dma-buf/dma-buf.c                     | 43 ++++++++++++++--
> >   include/uapi/linux/dma-buf.h                  |  6 +++
> >   9 files changed, 134 insertions(+), 20 deletions(-)
> >   create mode 100644 Documentation/ABI/testing/sysfs-kernel-dmabuf-caps
> >   create mode 100644 drivers/dma-buf/dma-buf-sysfs-caps.c
> >   create mode 100644 drivers/dma-buf/dma-buf-sysfs-caps.h
> > 
> > diff --git a/Documentation/ABI/testing/sysfs-kernel-dmabuf-caps b/Documentation/ABI/testing/sysfs-kernel-dmabuf-caps
> > new file mode 100644
> > index 000000000000..f83af422fd18
> > --- /dev/null
> > +++ b/Documentation/ABI/testing/sysfs-kernel-dmabuf-caps
> > @@ -0,0 +1,13 @@
> > +What:		/sys/kernel/dmabuf/caps
> > +Date:		May 2022
> > +KernelVersion:	v5.20
> > +Contact:	Simon Ser <contact@emersion.fr>
> > +Description:	This directory advertises DMA-BUF capabilities supported by the
> > +		kernel.
> > +
> > +What:		/sys/kernel/dmabuf/caps/sync_file_import_export
> > +Date:		May 2022
> > +KernelVersion:	v5.20
> > +Contact:	Simon Ser <contact@emersion.fr>
> > +Description:	This file is read-only and advertises support for importing and
> > +		exporting sync_files from/to DMA-BUFs.
> > diff --git a/MAINTAINERS b/MAINTAINERS
> > index 11da16bfa123..8966686f7231 100644
> > --- a/MAINTAINERS
> > +++ b/MAINTAINERS
> > @@ -5871,6 +5871,7 @@ L:	dri-devel@lists.freedesktop.org
> >   L:	linaro-mm-sig@lists.linaro.org (moderated for non-subscribers)
> >   S:	Maintained
> >   T:	git git://anongit.freedesktop.org/drm/drm-misc
> > +F:	Documentation/ABI/testing/sysfs-kernel-dmabuf-caps
> >   F:	Documentation/driver-api/dma-buf.rst
> >   F:	drivers/dma-buf/
> >   F:	include/linux/*fence.h
> > diff --git a/drivers/dma-buf/Makefile b/drivers/dma-buf/Makefile
> > index 4c9eb53ba3f8..afc874272710 100644
> > --- a/drivers/dma-buf/Makefile
> > +++ b/drivers/dma-buf/Makefile
> > @@ -1,6 +1,6 @@
> >   # SPDX-License-Identifier: GPL-2.0-only
> >   obj-y := dma-buf.o dma-fence.o dma-fence-array.o dma-fence-chain.o \
> > -	 dma-resv.o
> > +	 dma-resv.o dma-buf-sysfs-caps.o
> >   obj-$(CONFIG_DMABUF_HEAPS)	+= dma-heap.o
> >   obj-$(CONFIG_DMABUF_HEAPS)	+= heaps/
> >   obj-$(CONFIG_SYNC_FILE)		+= sync_file.o
> > diff --git a/drivers/dma-buf/dma-buf-sysfs-caps.c b/drivers/dma-buf/dma-buf-sysfs-caps.c
> > new file mode 100644
> > index 000000000000..82b91eb874a9
> > --- /dev/null
> > +++ b/drivers/dma-buf/dma-buf-sysfs-caps.c
> > @@ -0,0 +1,51 @@
> > +// SPDX-License-Identifier: GPL-2.0-only
> > +/*
> > + * DMA-BUF sysfs capabilities.
> > + *
> > + * Copyright (C) 2022 Simon Ser
> > + */
> > +
> > +#include <linux/kobject.h>
> > +#include <linux/sysfs.h>
> > +
> > +#include "dma-buf-sysfs-caps.h"
> > +
> > +static ssize_t sync_file_import_export_show(struct kobject *kobj,
> > +					    struct kobj_attribute *attr,
> > +					    char *buf)
> > +{
> > +	return sysfs_emit(buf, "1\n");
> > +}
> > +
> > +static struct kobj_attribute dma_buf_sync_file_import_export_attr =
> > +	__ATTR_RO(sync_file_import_export);
> > +
> > +static struct attribute *dma_buf_caps_attrs[] = {
> > +	&dma_buf_sync_file_import_export_attr.attr,
> > +	NULL,
> > +};
> > +
> > +static const struct attribute_group dma_buf_caps_attr_group = {
> > +	.attrs = dma_buf_caps_attrs,
> > +};
> 
> Didn't we had macros for those? I think I have seen something for that.

Yes, please use ATTRIBUTE_GROUPS()

> > +
> > +static struct kobject *dma_buf_caps_kobj;
> > +
> > +int dma_buf_init_sysfs_capabilities(struct kset *kset)
> > +{
> > +	int ret;
> > +
> > +	dma_buf_caps_kobj = kobject_create_and_add("caps", &kset->kobj);
> > +	if (!dma_buf_caps_kobj)
> > +		return -ENOMEM;
> > +
> > +	ret = sysfs_create_group(dma_buf_caps_kobj, &dma_buf_caps_attr_group);

Why do we have "raw" kobjects here?

A group can have a name, which puts it in the subdirectory of the object
it is attached to.  Please do that and do not create a new kobject.

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH v3] dma-buf: Add a capabilities directory
  2022-05-30  7:09 ` Christian König
  2022-05-30  7:20   ` Greg KH
@ 2022-05-30  7:55   ` Simon Ser
  1 sibling, 0 replies; 8+ messages in thread
From: Simon Ser @ 2022-05-30  7:55 UTC (permalink / raw)
  To: Christian König; +Cc: Jason Ekstrand, Greg KH, dri-devel, Daniel Vetter

On Monday, May 30th, 2022 at 09:09, Christian König <christian.koenig@amd.com> wrote:

> I find a separate directory rather unusual, but can't come up with any
> better idea either.
>
> IIRC the security module had a mask file with names for the supported
> capabilities.

Are you referring to /sys/kernel/security/lsm?

This sounds more painful to parse from user-space. Instead of a simple
stat(), user-space would need to read the file, split on commas, and
compare strings.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH v3] dma-buf: Add a capabilities directory
  2022-05-30  7:20   ` Greg KH
@ 2022-05-30  8:15     ` Simon Ser
  2022-05-30  8:26       ` Greg KH
  0 siblings, 1 reply; 8+ messages in thread
From: Simon Ser @ 2022-05-30  8:15 UTC (permalink / raw)
  To: Greg KH; +Cc: Jason Ekstrand, Christian König, dri-devel, Daniel Vetter

On Monday, May 30th, 2022 at 09:20, Greg KH <gregkh@linuxfoundation.org> wrote:

> > > +static struct attribute *dma_buf_caps_attrs[] = {
> > > +	&dma_buf_sync_file_import_export_attr.attr,
> > > +	NULL,
> > > +};
> > > +
> > > +static const struct attribute_group dma_buf_caps_attr_group = {
> > > +	.attrs = dma_buf_caps_attrs,
> > > +};
> >
> > Didn't we had macros for those? I think I have seen something for that.
>
> Yes, please use ATTRIBUTE_GROUPS()

This doesn't allow the user to set a group name, and creates an unused
"_groups" variable, causing warnings.

> > > +
> > > +static struct kobject *dma_buf_caps_kobj;
> > > +
> > > +int dma_buf_init_sysfs_capabilities(struct kset *kset)
> > > +{
> > > +	int ret;
> > > +
> > > +	dma_buf_caps_kobj = kobject_create_and_add("caps", &kset->kobj);
> > > +	if (!dma_buf_caps_kobj)
> > > +		return -ENOMEM;
> > > +
> > > +	ret = sysfs_create_group(dma_buf_caps_kobj, &dma_buf_caps_attr_group);
>
> Why do we have "raw" kobjects here?
>
> A group can have a name, which puts it in the subdirectory of the object
> it is attached to.  Please do that and do not create a new kobject.

I see, I'll switch to sysfs_create_group with a group name in the next version.

Thanks for the pointers!

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH v3] dma-buf: Add a capabilities directory
  2022-05-30  8:15     ` Simon Ser
@ 2022-05-30  8:26       ` Greg KH
  2022-05-31 12:53         ` Jason Ekstrand
  0 siblings, 1 reply; 8+ messages in thread
From: Greg KH @ 2022-05-30  8:26 UTC (permalink / raw)
  To: Simon Ser; +Cc: Jason Ekstrand, Christian König, dri-devel, Daniel Vetter

On Mon, May 30, 2022 at 08:15:04AM +0000, Simon Ser wrote:
> On Monday, May 30th, 2022 at 09:20, Greg KH <gregkh@linuxfoundation.org> wrote:
> 
> > > > +static struct attribute *dma_buf_caps_attrs[] = {
> > > > +	&dma_buf_sync_file_import_export_attr.attr,
> > > > +	NULL,
> > > > +};
> > > > +
> > > > +static const struct attribute_group dma_buf_caps_attr_group = {
> > > > +	.attrs = dma_buf_caps_attrs,
> > > > +};
> > >
> > > Didn't we had macros for those? I think I have seen something for that.
> >
> > Yes, please use ATTRIBUTE_GROUPS()
> 
> This doesn't allow the user to set a group name, and creates an unused
> "_groups" variable, causing warnings.

Then set a group name.

But you really want to almost always be using lists of groups, which is
why that macro works that way.

> 
> > > > +
> > > > +static struct kobject *dma_buf_caps_kobj;
> > > > +
> > > > +int dma_buf_init_sysfs_capabilities(struct kset *kset)
> > > > +{
> > > > +	int ret;
> > > > +
> > > > +	dma_buf_caps_kobj = kobject_create_and_add("caps", &kset->kobj);
> > > > +	if (!dma_buf_caps_kobj)
> > > > +		return -ENOMEM;
> > > > +
> > > > +	ret = sysfs_create_group(dma_buf_caps_kobj, &dma_buf_caps_attr_group);
> >
> > Why do we have "raw" kobjects here?
> >
> > A group can have a name, which puts it in the subdirectory of the object
> > it is attached to.  Please do that and do not create a new kobject.
> 
> I see, I'll switch to sysfs_create_group with a group name in the next version.

No, do not do that, add it to the list of groups for the original
kobject.

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH v3] dma-buf: Add a capabilities directory
  2022-05-30  8:26       ` Greg KH
@ 2022-05-31 12:53         ` Jason Ekstrand
  2022-05-31 18:37           ` Greg KH
  0 siblings, 1 reply; 8+ messages in thread
From: Jason Ekstrand @ 2022-05-31 12:53 UTC (permalink / raw)
  To: Greg KH, Simon Ser; +Cc: Daniel Vetter, Christian König, dri-devel

On Mon, 2022-05-30 at 10:26 +0200, Greg KH wrote:
> On Mon, May 30, 2022 at 08:15:04AM +0000, Simon Ser wrote:
> > On Monday, May 30th, 2022 at 09:20, Greg KH
> > <gregkh@linuxfoundation.org> wrote:
> > 
> > > > > +static struct attribute *dma_buf_caps_attrs[] = {
> > > > > +       &dma_buf_sync_file_import_export_attr.attr,
> > > > > +       NULL,
> > > > > +};
> > > > > +
> > > > > +static const struct attribute_group dma_buf_caps_attr_group
> > > > > = {
> > > > > +       .attrs = dma_buf_caps_attrs,
> > > > > +};
> > > > 
> > > > Didn't we had macros for those? I think I have seen something
> > > > for that.
> > > 
> > > Yes, please use ATTRIBUTE_GROUPS()
> > 
> > This doesn't allow the user to set a group name, and creates an
> > unused
> > "_groups" variable, causing warnings.
> 
> Then set a group name.
> 
> But you really want to almost always be using lists of groups, which
> is
> why that macro works that way.

I think I see the confusion here.  The ATTRIBUTE_GROUPS() macro is
intended for device drivers and to be used with add_device().  However,
this is dma-buf so there is no device and no add_device() call to hook.
Unless there are other magic macros to use in this case, I think we're
stuck doing it manually.

--Jason


> > 
> > > > > +
> > > > > +static struct kobject *dma_buf_caps_kobj;
> > > > > +
> > > > > +int dma_buf_init_sysfs_capabilities(struct kset *kset)
> > > > > +{
> > > > > +       int ret;
> > > > > +
> > > > > +       dma_buf_caps_kobj = kobject_create_and_add("caps",
> > > > > &kset->kobj);
> > > > > +       if (!dma_buf_caps_kobj)
> > > > > +               return -ENOMEM;
> > > > > +
> > > > > +       ret = sysfs_create_group(dma_buf_caps_kobj,
> > > > > &dma_buf_caps_attr_group);
> > > 
> > > Why do we have "raw" kobjects here?
> > > 
> > > A group can have a name, which puts it in the subdirectory of the
> > > object
> > > it is attached to.  Please do that and do not create a new
> > > kobject.
> > 
> > I see, I'll switch to sysfs_create_group with a group name in the
> > next version.
> 
> No, do not do that, add it to the list of groups for the original
> kobject.
> 
> thanks,
> 
> greg k-h


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH v3] dma-buf: Add a capabilities directory
  2022-05-31 12:53         ` Jason Ekstrand
@ 2022-05-31 18:37           ` Greg KH
  0 siblings, 0 replies; 8+ messages in thread
From: Greg KH @ 2022-05-31 18:37 UTC (permalink / raw)
  To: Jason Ekstrand; +Cc: Christian König, dri-devel, Daniel Vetter

On Tue, May 31, 2022 at 07:53:50AM -0500, Jason Ekstrand wrote:
> On Mon, 2022-05-30 at 10:26 +0200, Greg KH wrote:
> > On Mon, May 30, 2022 at 08:15:04AM +0000, Simon Ser wrote:
> > > On Monday, May 30th, 2022 at 09:20, Greg KH
> > > <gregkh@linuxfoundation.org> wrote:
> > > 
> > > > > > +static struct attribute *dma_buf_caps_attrs[] = {
> > > > > > +       &dma_buf_sync_file_import_export_attr.attr,
> > > > > > +       NULL,
> > > > > > +};
> > > > > > +
> > > > > > +static const struct attribute_group dma_buf_caps_attr_group
> > > > > > = {
> > > > > > +       .attrs = dma_buf_caps_attrs,
> > > > > > +};
> > > > > 
> > > > > Didn't we had macros for those? I think I have seen something
> > > > > for that.
> > > > 
> > > > Yes, please use ATTRIBUTE_GROUPS()
> > > 
> > > This doesn't allow the user to set a group name, and creates an
> > > unused
> > > "_groups" variable, causing warnings.
> > 
> > Then set a group name.
> > 
> > But you really want to almost always be using lists of groups, which
> > is
> > why that macro works that way.
> 
> I think I see the confusion here.  The ATTRIBUTE_GROUPS() macro is
> intended for device drivers and to be used with add_device().  However,
> this is dma-buf so there is no device and no add_device() call to hook.
> Unless there are other magic macros to use in this case, I think we're
> stuck doing it manually.

Have a list of attribute groups and add it to the kobject when you
create it so they all get created at the same time.

Don't do piece-meal "add one, and then another, and then another" as
that just gets messy and complex and impossible to unwind the error
conditions from.

sysfs_create_groups() is what you need to use here.  I need to drop
sysfs_create_group() one day...

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2022-05-31 18:37 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-05-27  7:34 [PATCH v3] dma-buf: Add a capabilities directory Simon Ser
2022-05-30  7:09 ` Christian König
2022-05-30  7:20   ` Greg KH
2022-05-30  8:15     ` Simon Ser
2022-05-30  8:26       ` Greg KH
2022-05-31 12:53         ` Jason Ekstrand
2022-05-31 18:37           ` Greg KH
2022-05-30  7:55   ` Simon Ser

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.