Received: by 10.192.165.148 with SMTP id m20csp4497573imm; Tue, 24 Apr 2018 03:55:01 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+T7QrN7zwHdF/xpGfi+2SyBshXx1RC0B9VCSMAbDJVhIlLkjOJij1ESkXqw6jMyg5xphTQ X-Received: by 10.99.113.80 with SMTP id b16mr19913758pgn.326.1524567301905; Tue, 24 Apr 2018 03:55:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524567301; cv=none; d=google.com; s=arc-20160816; b=MsZKenXd9Y/35e+ytjbNFkodSYXOTmXUYH7h5k2E+EtJBI2hhw9dnW2AmA9YCIknPk 0A5FnbVXAGKUiyNuQBItwBa0tL8NtwAlyzxjkZPvifxb0u7GcRaZPfFPuTCNQ9Bbni9O FnwAsfr9jsHZT8iOQf7G9lGgadpMeNH3EM7c7t+snc8xgy03a1h26aMd0RY2pwjQq7VN c2FQYwUR0ZZ1pCQhR6BV2HHBhud6IYCL3guI/Tu3j0rt7QO3Q7m9cXavQqI0pLhRKIML YtTFUWAAT3rOFE8DZUBrg55XtuwwA7XqyL8HfDKW1nNN8aP4Mn0CXUPVgWKFZflOyKeh iOCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=+KFxVVeApZGG5lKLEzCwbbI++0gIXGq83MsBy7HhOas=; b=KRxlo7AuMY/OA0h5uxbpCvdHTlo45d7NbCPI5JuJ3uTt7tQj104YW/To1vbYkslUzm NUG/OglCVGKjxb+siC6rmt1L+sxpZuiHXxIb8UZHseJvT164UL8U6+7FFlFcttYU+/Bx sFZUFQaVzYQz+jq2krUrBnxeaYl7hUQFZoMXbTG5Hv6cm50HQMGccQcbUiZwiP2FgaAB Y3sMoqWP7gOJYrnnYCqFUhJra9smm1ah5PHQyBuCwcO/bdcZvGvu5CXiyXS8c0S+9DlG rd4ZcmzJzXJ0sB/zH0j37ibAAtClGc3MdCV4jDctLT/RSDO+9jJK9X9vaoMzivaqCQzg 9dWA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p12-v6si14188973pls.578.2018.04.24.03.54.46; Tue, 24 Apr 2018 03:55:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933019AbeDXIkh (ORCPT + 99 others); Tue, 24 Apr 2018 04:40:37 -0400 Received: from mx2.suse.de ([195.135.220.15]:55374 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932850AbeDXIkc (ORCPT ); Tue, 24 Apr 2018 04:40:32 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id BD98EAC57; Tue, 24 Apr 2018 08:40:30 +0000 (UTC) Subject: Re: [Xen-devel] [PATCH 0/1] drm/xen-zcopy: Add Xen zero-copy helper DRM driver To: Oleksandr Andrushchenko , Boris Ostrovsky , Wei Liu Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= , Artem Mygaiev , Dongwon Kim , konrad.wilk@oracle.com, airlied@linux.ie, "Oleksandr_Andrushchenko@epam.com" , linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, "Potrola, MateuszX" , xen-devel@lists.xenproject.org, daniel.vetter@intel.com References: <5d8fec7f-956c-378f-be90-f45029385740@gmail.com> <20180416192905.GA18096@downor-Z87X-UD5H> <20180417075928.GT31310@phenom.ffwll.local> <20180417205744.GA15930@downor-Z87X-UD5H> <41487acb-a67a-8933-d0c3-702c19b0938e@gmail.com> <20180418073508.ptvntwedczpvl7bx@MacBook-Pro-de-Roger.local> <20180418101058.hyqk3gr3b2ibxswu@MacBook-Pro-de-Roger.local> <20180420071914.GG31310@phenom.ffwll.local> <76cdc65a-7bb1-9377-7bc5-6164e32f7b5d@gmail.com> <20180423115242.ywdwqblj2aseu3fr@citrix.com> <61105351-8896-072b-abf0-757c7f6c0edf@gmail.com> <30ddb005-96c8-f47c-2e23-4e0d354e5842@gmail.com> From: Juergen Gross Message-ID: <6089d701-5221-75b4-38eb-b23bc5dc30cd@suse.com> Date: Tue, 24 Apr 2018 10:40:29 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 24/04/18 10:07, Oleksandr Andrushchenko wrote: > On 04/24/2018 10:51 AM, Juergen Gross wrote: >> On 24/04/18 07:43, Oleksandr Andrushchenko wrote: >>> On 04/24/2018 01:41 AM, Boris Ostrovsky wrote: >>>> On 04/23/2018 08:10 AM, Oleksandr Andrushchenko wrote: >>>>> On 04/23/2018 02:52 PM, Wei Liu wrote: >>>>>> On Fri, Apr 20, 2018 at 02:25:20PM +0300, Oleksandr Andrushchenko >>>>>> wrote: >>>>>>>>>        the gntdev. >>>>>>>>> >>>>>>>>> I think this is generic enough that it could be implemented by a >>>>>>>>> device not tied to Xen. AFAICT the hyper_dma guys also wanted >>>>>>>>> something similar to this. >>>>>>>> You can't just wrap random userspace memory into a dma-buf. We've >>>>>>>> just had >>>>>>>> this discussion with kvm/qemu folks, who proposed just that, and >>>>>>>> after a >>>>>>>> bit of discussion they'll now try to have a driver which just >>>>>>>> wraps a >>>>>>>> memfd into a dma-buf. >>>>>>> So, we have to decide either we introduce a new driver >>>>>>> (say, under drivers/xen/xen-dma-buf) or extend the existing >>>>>>> gntdev/balloon to support dma-buf use-cases. >>>>>>> >>>>>>> Can anybody from Xen community express their preference here? >>>>>>> >>>>>> Oleksandr talked to me on IRC about this, he said a few IOCTLs >>>>>> need to >>>>>> be added to either existing drivers or a new driver. >>>>>> >>>>>> I went through this thread twice and skimmed through the relevant >>>>>> documents, but I couldn't see any obvious pros and cons for either >>>>>> approach. So I don't really have an opinion on this. >>>>>> >>>>>> But, assuming if implemented in existing drivers, those IOCTLs >>>>>> need to >>>>>> be added to different drivers, which means userspace program needs to >>>>>> write more code and get more handles, it would be slightly better to >>>>>> implement a new driver from that perspective. >>>>> If gntdev/balloon extension is still considered: >>>>> >>>>> All the IOCTLs will be in gntdev driver (in current xen-zcopy >>>>> terminology): >>>>>    - DRM_ICOTL_XEN_ZCOPY_DUMB_FROM_REFS >>>>>    - DRM_IOCTL_XEN_ZCOPY_DUMB_TO_REFS >>>>>    - DRM_IOCTL_XEN_ZCOPY_DUMB_WAIT_FREE >>>>> >>>>> Balloon driver extension, which is needed for contiguous/DMA >>>>> buffers, will be to provide new *kernel API*, no UAPI is needed. >>>>> >>>> So I am obviously a bit late to this thread, but why do you need to add >>>> new ioctls to gntdev and balloon? Doesn't this driver manage to do what >>>> you want without any extensions? >>> 1. I only (may) need to add IOCTLs to gntdev >>> 2. balloon driver needs to be extended, so it can allocate >>> contiguous (DMA) memory, not IOCTLs/UAPI here, all lives >>> in the kernel. >>> 3. The reason I need to extend gnttab with new IOCTLs is to >>> provide new functionality to create a dma-buf from grant references >>> and to produce grant references for a dma-buf. This is what I have as >>> UAPI >>> description for xen-zcopy driver: >>> >>> 1. DRM_IOCTL_XEN_ZCOPY_DUMB_FROM_REFS >>> This will create a DRM dumb buffer from grant references provided >>> by the frontend. The intended usage is: >>>    - Frontend >>>      - creates a dumb/display buffer and allocates memory >>>      - grants foreign access to the buffer pages >>>      - passes granted references to the backend >>>    - Backend >>>      - issues DRM_XEN_ZCOPY_DUMB_FROM_REFS ioctl to map >>>        granted references and create a dumb buffer >>>      - requests handle to fd conversion via DRM_IOCTL_PRIME_HANDLE_TO_FD >>>      - requests real HW driver/consumer to import the PRIME buffer with >>>        DRM_IOCTL_PRIME_FD_TO_HANDLE >>>      - uses handle returned by the real HW driver >>>    - at the end: >>>      o closes real HW driver's handle with DRM_IOCTL_GEM_CLOSE >>>      o closes zero-copy driver's handle with DRM_IOCTL_GEM_CLOSE >>>      o closes file descriptor of the exported buffer >>> >>> 2. DRM_IOCTL_XEN_ZCOPY_DUMB_TO_REFS >>> This will grant references to a dumb/display buffer's memory provided by >>> the >>> backend. The intended usage is: >>>    - Frontend >>>      - requests backend to allocate dumb/display buffer and grant >>> references >>>        to its pages >>>    - Backend >>>      - requests real HW driver to create a dumb with >>> DRM_IOCTL_MODE_CREATE_DUMB >>>      - requests handle to fd conversion via DRM_IOCTL_PRIME_HANDLE_TO_FD >>>      - requests zero-copy driver to import the PRIME buffer with >>>        DRM_IOCTL_PRIME_FD_TO_HANDLE >>>      - issues DRM_XEN_ZCOPY_DUMB_TO_REFS ioctl to >>>        grant references to the buffer's memory. >>>      - passes grant references to the frontend >>>   - at the end: >>>      - closes zero-copy driver's handle with DRM_IOCTL_GEM_CLOSE >>>      - closes real HW driver's handle with DRM_IOCTL_GEM_CLOSE >>>      - closes file descriptor of the imported buffer >>> >>> 3. DRM_XEN_ZCOPY_DUMB_WAIT_FREE >>> This will block until the dumb buffer with the wait handle provided be >>> freed: >>> this is needed for synchronization between frontend and backend in case >>> frontend provides grant references of the buffer via >>> DRM_XEN_ZCOPY_DUMB_FROM_REFS IOCTL and which must be released before >>> backend replies with XENDISPL_OP_DBUF_DESTROY response. >>> wait_handle must be the same value returned while calling >>> DRM_XEN_ZCOPY_DUMB_FROM_REFS IOCTL. >>> >>> So, as you can see the above functionality is not covered by the >>> existing UAPI >>> of the gntdev driver. >>> Now, if we change dumb -> dma-buf and remove DRM code (which is only a >>> wrapper >>> here on top of dma-buf) we get new driver for dma-buf for Xen. >>> >>> This is why I have 2 options here: either create a dedicated driver for >>> this >>> (e.g. re-work xen-zcopy to be DRM independent and put it under >>> drivers/xen/xen-dma-buf, for example) or extend the existing gntdev >>> driver >>> with the above UAPI + make changes to the balloon driver to provide >>> kernel >>> API for DMA buffer allocations. >> Which user component would use the new ioctls? > It is currently used by the display backend [1] and will > probably be used by the hyper-dmabuf frontend/backend > (Dongwon from Intel can provide more info on this). >> >> I'm asking because I'm not very fond of adding more linux specific >> functions to libgnttab which are not related to a specific Xen version, >> but to a kernel version. > Hm, I was not thinking about this UAPI to be added to libgnttab. > It seems it can be used directly w/o wrappers in user-space Would this program use libgnttab in parallel? If yes how would the two usage paths be combined (same applies to the separate driver, btw)? The gntdev driver manages resources per file descriptor and libgnttab is hiding the file descriptor it is using for a connection. Or would the user program use only the new driver for communicating with the gntdev driver? In this case it might be an option to extend the gntdev driver to present a new device (e.g. "gntdmadev") for that purpose. >> >> So doing this in a separate driver seems to be the better option in >> this regard. > Well, from maintenance POV it is easier for me to have it all in > a separate driver as all dma-buf related functionality will > reside at one place. This also means that no changes to existing > drivers will be needed (if it is ok to have ballooning in/out > code for DMA buffers (allocated with dma_alloc_xxx) not in the balloon > driver) I think in the end this really depends on how the complete solution will look like. gntdev is a special wrapper for the gnttab driver. In case the new dma-buf driver needs to use parts of gntdev I'd rather have a new driver above gnttab ("gntuser"?) used by gntdev and dma-buf. Juergen