Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1666392imm; Tue, 22 May 2018 07:33:13 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpYGi7IpenH4ii5Zjj/VzelMQcM8U6AVCQKuPslYzbbwYBPiJWbIul5dOiQz59Xfjn9hr3B X-Received: by 2002:a62:59d1:: with SMTP id k78-v6mr24461395pfj.54.1526999593389; Tue, 22 May 2018 07:33:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526999593; cv=none; d=google.com; s=arc-20160816; b=ZW+92ljOBHjzMEFz/W1m8n7U/k39p1V1cF+DPDS7jtIHQtoSXryW0qMo+TNJU3w3mP 2LyMEpyjFqAYdSQS0YM9D57NK8zQA7qTE82wdTH8CLLhn2+xCwUz+yCgxk9I7j9tLXKF sYlNULjVkPFkEO3zqnGjYGd7DiH9It//IlJqSbuw/4R+JFke0/C6to2EQAOHJS1MZkRr cBH6ZSKNnpcaduvmfjnu+UlANNOlun1NGKv8yiTh1hq53amlo7+vtFEs2TGvJrPoqDuG Z72X+IZPh6aSsjA8+njAfR3Le2vBrkzt6wMuv0l2WiIefs1O/I2DnQFh5+PwQwn9Q0We VmyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:openpgp:from:references:cc:to:subject :dkim-signature:arc-authentication-results; bh=u1QXkAtWv5wD4jSGSc4GXslZlMQsKE9YgBuEqPpoJLQ=; b=dlphuxwjR8bgE+6scnSoxSlBvbNm/IKKNgVm+HGjJ9OhYw3arhFg48JbHu0IXk4TOQ iGAtEk2VqBUeI2ftMXAG1zqr3LrzheafldncZ1jB7172yR7Pu86zwyEHoOAr4b95H8Oc +02ANqi75UQ0RNe7bLmwLW18kVIIVHr/N2/U0+HfNCs76+X3bu8McXUJ6LrzrvHlGNDD LJYb2sdb4YEH8Ce2M6jPGqJ2lwBFYbn2ss9wNxQw+DLNZYdQOtVgwEMvhf3Repp/Uzef D+lkMSwD3oTWa5J8e/aP4+1kTZOULNRLu5UgSXf8WmZRimaFlcI6T44ZHmkKeH30uBIp RCJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=JZ7+BYVG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x67-v6si15973101pfx.216.2018.05.22.07.32.57; Tue, 22 May 2018 07:33:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=JZ7+BYVG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751445AbeEVObC (ORCPT + 99 others); Tue, 22 May 2018 10:31:02 -0400 Received: from userp2130.oracle.com ([156.151.31.86]:46368 "EHLO userp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751173AbeEVOa5 (ORCPT ); Tue, 22 May 2018 10:30:57 -0400 Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w4MEUZPn034668; Tue, 22 May 2018 14:30:44 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=corp-2017-10-26; bh=u1QXkAtWv5wD4jSGSc4GXslZlMQsKE9YgBuEqPpoJLQ=; b=JZ7+BYVGn3IKvX5RAqjdH4y0eXhFiZE2D+5kXVxT03Gqg6/v51CoSvUHUCldz2//xlwh BQ39jWHmr+hjTytA5uFAOsU5N5nn32lelQnhxFN53nI0fjtIcfff1DmzDw3pFJ6qrofW z4Q6tfS9S0oSdQOCBNJcy7Mv9MNMVaiBL29Y/ZsGHBNevzVXELiDBC7EsgA3Ro/yQhiA 7DsmWVQcAsYCGFA5EIQ8hFPNklkosTeFzmN6mP8HMOvjLoKI/gp1hL28gocxhTf2FeTJ wDulsg8543w2ZOlP2ki45FTtfV/jTPfA/k0R3DDa9FvOvc/Ri/QmRGvscClN0s9jjG/x 4w== Received: from aserv0021.oracle.com (aserv0021.oracle.com [141.146.126.233]) by userp2130.oracle.com with ESMTP id 2j2bcdgs6v-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 22 May 2018 14:30:44 +0000 Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by aserv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w4MEUhZR025571 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 22 May 2018 14:30:43 GMT Received: from abhmp0017.oracle.com (abhmp0017.oracle.com [141.146.116.23]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w4MEUhH2021927; Tue, 22 May 2018 14:30:43 GMT Received: from dhcp-burlington7-2nd-B-east-10-152-55-162.usdhcp.oraclecorp.com (/10.152.32.65) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 22 May 2018 07:30:43 -0700 Subject: Re: [Xen-devel] [RFC 1/3] xen/balloon: Allow allocating DMA buffers To: Oleksandr Andrushchenko , Oleksandr Andrushchenko , xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, jgross@suse.com, konrad.wilk@oracle.com Cc: daniel.vetter@intel.com, matthew.d.roper@intel.com, dongwon.kim@intel.com References: <20180517082604.14828-1-andr2000@gmail.com> <20180517082604.14828-2-andr2000@gmail.com> <6a108876-19b7-49d0-3de2-9e10f984736c@oracle.com> <9541926e-001a-e41e-317c-dbff6d687761@gmail.com> <218e2bf7-490d-f89e-9866-27b7e3dbc835@oracle.com> <77c20852-b9b8-c35a-26b0-b0317e6aba09@gmail.com> From: Boris Ostrovsky Openpgp: preference=signencrypt Autocrypt: addr=boris.ostrovsky@oracle.com; prefer-encrypt=mutual; keydata= xsFNBFH8CgsBEAC0KiOi9siOvlXatK2xX99e/J3OvApoYWjieVQ9232Eb7GzCWrItCzP8FUV PQg8rMsSd0OzIvvjbEAvaWLlbs8wa3MtVLysHY/DfqRK9Zvr/RgrsYC6ukOB7igy2PGqZd+M MDnSmVzik0sPvB6xPV7QyFsykEgpnHbvdZAUy/vyys8xgT0PVYR5hyvhyf6VIfGuvqIsvJw5 C8+P71CHI+U/IhsKrLrsiYHpAhQkw+Zvyeml6XSi5w4LXDbF+3oholKYCkPwxmGdK8MUIdkM d7iYdKqiP4W6FKQou/lC3jvOceGupEoDV9botSWEIIlKdtm6C4GfL45RD8V4B9iy24JHPlom woVWc0xBZboQguhauQqrBFooHO3roEeM1pxXjLUbDtH4t3SAI3gt4dpSyT3EvzhyNQVVIxj2 FXnIChrYxR6S0ijSqUKO0cAduenhBrpYbz9qFcB/GyxD+ZWY7OgQKHUZMWapx5bHGQ8bUZz2 SfjZwK+GETGhfkvNMf6zXbZkDq4kKB/ywaKvVPodS1Poa44+B9sxbUp1jMfFtlOJ3AYB0WDS Op3d7F2ry20CIf1Ifh0nIxkQPkTX7aX5rI92oZeu5u038dHUu/dO2EcuCjl1eDMGm5PLHDSP 0QUw5xzk1Y8MG1JQ56PtqReO33inBXG63yTIikJmUXFTw6lLJwARAQABzTNCb3JpcyBPc3Ry b3Zza3kgKFdvcmspIDxib3Jpcy5vc3Ryb3Zza3lAb3JhY2xlLmNvbT7CwXgEEwECACIFAlH8 CgsCGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEIredpCGysGyasEP/j5xApopUf4g 9Fl3UxZuBx+oduuw3JHqgbGZ2siA3EA4bKwtKq8eT7ekpApn4c0HA8TWTDtgZtLSV5IdH+9z JimBDrhLkDI3Zsx2CafL4pMJvpUavhc5mEU8myp4dWCuIylHiWG65agvUeFZYK4P33fGqoaS VGx3tsQIAr7MsQxilMfRiTEoYH0WWthhE0YVQzV6kx4wj4yLGYPPBtFqnrapKKC8yFTpgjaK jImqWhU9CSUAXdNEs/oKVR1XlkDpMCFDl88vKAuJwugnixjbPFTVPyoC7+4Bm/FnL3iwlJVE qIGQRspt09r+datFzPqSbp5Fo/9m4JSvgtPp2X2+gIGgLPWp2ft1NXHHVWP19sPgEsEJXSr9 tskM8ScxEkqAUuDs6+x/ISX8wa5Pvmo65drN+JWA8EqKOHQG6LUsUdJolFM2i4Z0k40BnFU/ kjTARjrXW94LwokVy4x+ZYgImrnKWeKac6fMfMwH2aKpCQLlVxdO4qvJkv92SzZz4538az1T m+3ekJAimou89cXwXHCFb5WqJcyjDfdQF857vTn1z4qu7udYCuuV/4xDEhslUq1+GcNDjAhB nNYPzD+SvhWEsrjuXv+fDONdJtmLUpKs4Jtak3smGGhZsqpcNv8nQzUGDQZjuCSmDqW8vn2o hWwveNeRTkxh+2x1Qb3GT46uzsFNBFH8CgsBEADGC/yx5ctcLQlB9hbq7KNqCDyZNoYu1HAB Hal3MuxPfoGKObEktawQPQaSTB5vNlDxKihezLnlT/PKjcXC2R1OjSDinlu5XNGc6mnky03q yymUPyiMtWhBBftezTRxWRslPaFWlg/h/Y1iDuOcklhpr7K1h1jRPCrf1yIoxbIpDbffnuyz kuto4AahRvBU4Js4sU7f/btU+h+e0AcLVzIhTVPIz7PM+Gk2LNzZ3/on4dnEc/qd+ZZFlOQ4 KDN/hPqlwA/YJsKzAPX51L6Vv344pqTm6Z0f9M7YALB/11FO2nBB7zw7HAUYqJeHutCwxm7i BDNt0g9fhviNcJzagqJ1R7aPjtjBoYvKkbwNu5sWDpQ4idnsnck4YT6ctzN4I+6lfkU8zMzC gM2R4qqUXmxFIS4Bee+gnJi0Pc3KcBYBZsDK44FtM//5Cp9DrxRQOh19kNHBlxkmEb8kL/pw XIDcEq8MXzPBbxwHKJ3QRWRe5jPNpf8HCjnZz0XyJV0/4M1JvOua7IZftOttQ6KnM4m6WNIZ 2ydg7dBhDa6iv1oKdL7wdp/rCulVWn8R7+3cRK95SnWiJ0qKDlMbIN8oGMhHdin8cSRYdmHK kTnvSGJNlkis5a+048o0C6jI3LozQYD/W9wq7MvgChgVQw1iEOB4u/3FXDEGulRVko6xCBU4 SQARAQABwsFfBBgBAgAJBQJR/AoLAhsMAAoJEIredpCGysGyfvMQAIywR6jTqix6/fL0Ip8G jpt3uk//QNxGJE3ZkUNLX6N786vnEJvc1beCu6EwqD1ezG9fJKMl7F3SEgpYaiKEcHfoKGdh 30B3Hsq44vOoxR6zxw2B/giADjhmWTP5tWQ9548N4VhIZMYQMQCkdqaueSL+8asp8tBNP+TJ PAIIANYvJaD8xA7sYUXGTzOXDh2THWSvmEWWmzok8er/u6ZKdS1YmZkUy8cfzrll/9hiGCTj u3qcaOM6i/m4hqtvsI1cOORMVwjJF4+IkC5ZBoeRs/xW5zIBdSUoC8L+OCyj5JETWTt40+lu qoqAF/AEGsNZTrwHJYu9rbHH260C0KYCNqmxDdcROUqIzJdzDKOrDmebkEVnxVeLJBIhYZUd t3Iq9hdjpU50TA6sQ3mZxzBdfRgg+vaj2DsJqI5Xla9QGKD+xNT6v14cZuIMZzO7w0DoojM4 ByrabFsOQxGvE0w9Dch2BDSI2Xyk1zjPKxG1VNBQVx3flH37QDWpL2zlJikW29Ws86PHdthh Fm5PY8YtX576DchSP6qJC57/eAAe/9ztZdVAdesQwGb9hZHJc75B+VNm4xrh/PJO6c1THqdQ 19WVJ+7rDx3PhVncGlbAOiiiE3NOFPJ1OQYxPKtpBUukAlOTnkKE6QcA4zckFepUkfmBV1wM Jg6OxFYd01z+a+oL Message-ID: Date: Tue, 22 May 2018 10:33:58 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <77c20852-b9b8-c35a-26b0-b0317e6aba09@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8900 signatures=668700 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1805220168 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/22/2018 01:55 AM, Oleksandr Andrushchenko wrote: > On 05/21/2018 11:36 PM, Boris Ostrovsky wrote: >> On 05/21/2018 03:13 PM, Oleksandr Andrushchenko wrote: >>> On 05/21/2018 09:53 PM, Boris Ostrovsky wrote: >>>> On 05/21/2018 01:32 PM, Oleksandr Andrushchenko wrote: >>>>> On 05/21/2018 07:35 PM, Boris Ostrovsky wrote: >>>>>> On 05/21/2018 01:40 AM, Oleksandr Andrushchenko wrote: >>>>>>> On 05/19/2018 01:04 AM, Boris Ostrovsky wrote: >>>>>>>> On 05/17/2018 04:26 AM, Oleksandr Andrushchenko wrote: >>>>>>>>> From: Oleksandr Andrushchenko >>>>>>>> A commit message would be useful. >>>>>>> Sure, v1 will have it >>>>>>>>> Signed-off-by: Oleksandr Andrushchenko >>>>>>>>> >>>>>>>>> >>>>>>>>>          for (i = 0; i < nr_pages; i++) { >>>>>>>>> -        page = alloc_page(gfp); >>>>>>>>> -        if (page == NULL) { >>>>>>>>> -            nr_pages = i; >>>>>>>>> -            state = BP_EAGAIN; >>>>>>>>> -            break; >>>>>>>>> +        if (ext_pages) { >>>>>>>>> +            page = ext_pages[i]; >>>>>>>>> +        } else { >>>>>>>>> +            page = alloc_page(gfp); >>>>>>>>> +            if (page == NULL) { >>>>>>>>> +                nr_pages = i; >>>>>>>>> +                state = BP_EAGAIN; >>>>>>>>> +                break; >>>>>>>>> +            } >>>>>>>>>              } >>>>>>>>>              scrub_page(page); >>>>>>>>>              list_add(&page->lru, &pages); >>>>>>>>> @@ -529,7 +565,7 @@ static enum bp_state >>>>>>>>> decrease_reservation(unsigned long nr_pages, gfp_t gfp) >>>>>>>>>          i = 0; >>>>>>>>>          list_for_each_entry_safe(page, tmp, &pages, lru) { >>>>>>>>>              /* XENMEM_decrease_reservation requires a GFN */ >>>>>>>>> -        frame_list[i++] = xen_page_to_gfn(page); >>>>>>>>> +        frames[i++] = xen_page_to_gfn(page); >>>>>>>>>        #ifdef CONFIG_XEN_HAVE_PVMMU >>>>>>>>>              /* >>>>>>>>> @@ -552,18 +588,22 @@ static enum bp_state >>>>>>>>> decrease_reservation(unsigned long nr_pages, gfp_t gfp) >>>>>>>>>      #endif >>>>>>>>>              list_del(&page->lru); >>>>>>>>>      -        balloon_append(page); >>>>>>>>> +        if (!ext_pages) >>>>>>>>> +            balloon_append(page); >>>>>>>> So what you are proposing is not really ballooning. You are just >>>>>>>> piggybacking on existing interfaces, aren't you? >>>>>>> Sort of. Basically I need to {increase|decrease}_reservation, not >>>>>>> actually >>>>>>> allocating ballooned pages. >>>>>>> Do you think I can simply EXPORT_SYMBOL for >>>>>>> {increase|decrease}_reservation? >>>>>>> Any other suggestion? >>>>>> I am actually wondering how much of that code you end up reusing. >>>>>> You >>>>>> pretty much create new code paths in both routines and common code >>>>>> ends >>>>>> up being essentially the hypercall. >>>>> Well, I hoped that it would be easier to maintain if I modify >>>>> existing >>>>> code >>>>> to support both use-cases, but I am also ok to create new routines if >>>>> this >>>>> seems to be reasonable - please let me know >>>>>>     So the question is --- would it make >>>>>> sense to do all of this separately from the balloon driver? >>>>> This can be done, but which driver will host this code then? If we >>>>> move from >>>>> the balloon driver, then this could go to either gntdev or >>>>> grant-table. >>>>> What's your preference? >>>> A separate module? >>>> Is there any use for this feature outside of your zero-copy DRM >>>> driver? >>> Intel's hyper dma-buf (Dongwon/Matt CC'ed), V4L/GPU at least. >>> >>> At the time I tried to upstream zcopy driver it was discussed and >>> decided that >>> it would be better if I remove all DRM specific code and move it to >>> Xen drivers. >>> Thus, this RFC. >>> >>> But it can also be implemented as a dedicated Xen dma-buf driver which >>> will have all the >>> code from this RFC + a bit more (char/misc device handling at least). >>> This will also require a dedicated user-space library, just like >>> libxengnttab.so >>> for gntdev (now I have all new IOCTLs covered there). >>> >>> If the idea of a dedicated Xen dma-buf driver seems to be more >>> attractive we >>> can work toward this solution. BTW, I do support this idea, but was not >>> sure if Xen community accepts yet another driver which duplicates >>> quite some code >>> of the existing gntdev/balloon/grant-table. And now after this RFC I >>> hope that all cons >>> and pros of both dedicated driver and gntdev/balloon/grant-table >>> extension are >>> clearly seen and we can make a decision. >> >> IIRC the objection for a separate module was in the context of gntdev >> was discussion, because (among other things) people didn't want to have >> yet another file in /dev/xen/ >> >> Here we are talking about (a new) balloon-like module which doesn't >> create any new user-visible interfaces. And as for duplicating code --- >> as I said, I am not convinced there is much of duplication. >> >> I might even argue that we should add a new config option for this >> module. > I am not quite sure I am fully following you here: so, you suggest > that we have balloon.c unchanged, but instead create a new > module (namely a file under the same folder as balloon.c, e.g. > dma-buf-reservation.c) and move those {increase|decrease}_reservation > routines (specific to dma-buf) to that new file? And make it selectable > via Kconfig? If so, then how about the changes to grant-table and gntdev? > Those will look inconsistent then. Inconsistent with what? The changes to grant code will also be under the new config option. > > If you suggest a new kernel driver module: > IMO, there is nothing bad if we create a dedicated kernel module > (driver) for Xen dma-buf handling selectable under Kconfig option. > Yes, this will create a yet another device under /dev/xen, > but most people will never see it if we set Kconfig to default to "n". > And then we'll need user-space support for that, so Xen tools will > be extended with libxendmabuf.so or so. > This way all Xen dma-buf support can be localized at one place which > might be easier to maintain. What is more it could be totally transparent > to most of us as Kconfig option won't be set by default (both kernel > and Xen). The downside is that we will end up having another device for doing things that are not that different from what we are already doing with existing gnttab device. Or are they? -boris