Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp488268imm; Fri, 1 Jun 2018 04:42:40 -0700 (PDT) X-Google-Smtp-Source: ADUXVKICHw40jcST+44bjha8FPiWs0fi52km169iemlYwqVqyfihJqfOJ0rHGfG12p6tL+vy+OlO X-Received: by 2002:a63:384d:: with SMTP id h13-v6mr8592317pgn.209.1527853360445; Fri, 01 Jun 2018 04:42:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527853360; cv=none; d=google.com; s=arc-20160816; b=dA6ONxg2NHN5xEqHD4DMtZRfarK9d3xTLkzO51JlqwJxBQGe46PoIzWxtGaiQJSTsb OkM/QbeIikAE6Yn7FU5ta5KXeC2FKf0wC79r0NYLYcjezOLNHaPoA3hQzDPiwPoZF6Mw AvOtDDE2PSoAH0tPrCAtO7nksm6MqgqkNoipHTOsRCptlwrnXgSJc42UhT7w/a0+Yy6Z 797pvnDHo3S50QUe4y3dmqoFb7JDRVg6jsik+DyHm0qO0x/RnKttS1LNSP6YYZfnkDJM oT2KM/5vQleqQcCyxZjSDMj8UMRGkJezk6FQBY3KkhAJ4TyLYz4ain1eopPEWSmulm9V L1+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=vCxzGMYQ5XYsIMvEka2yGtICetDhhIUM/zOjJg2pJW0=; b=NfDt1UMPB3moM8NVOJ2dgJmchHTjxs32QnyxXP//rUg2c9uBFR7T0DhdwML9ms/t+H j/7A5q1E39Bxw8Zm5Myk0euxUpihrrY6NaOG2itiLRFd6cPczPBropbgRTjsqubithT/ LNSt9ZSkjcsO+kqPOdYLCYBHbaKRQZXMzt7iPz61XZvugYIygm1ze6BLdgkukdbcW8Gh 3GgTFETSy1bMEing4dXGE5t1Qu2r/g52HUaflrUKOH/iEWmw+mVdXtPxLWoP3QjXSC6+ WM3bnyXfXagQO6RVtq7gr3m4X6o/B26ajE6DzDoagsnn8NZun9CV0a5Et2GNHf0m7lxe /ZeA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=tQf/s71x; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f130-v6si241272pgc.376.2018.06.01.04.42.25; Fri, 01 Jun 2018 04:42:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=tQf/s71x; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751863AbeFALln (ORCPT + 99 others); Fri, 1 Jun 2018 07:41:43 -0400 Received: from mail-lf0-f68.google.com ([209.85.215.68]:35141 "EHLO mail-lf0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751092AbeFALll (ORCPT ); Fri, 1 Jun 2018 07:41:41 -0400 Received: by mail-lf0-f68.google.com with SMTP id y72-v6so14370321lfd.2; Fri, 01 Jun 2018 04:41:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=vCxzGMYQ5XYsIMvEka2yGtICetDhhIUM/zOjJg2pJW0=; b=tQf/s71xgDINyW4KUU+9UbxRCKA/C7gxd5ijKE6ykOHcqVnVFeoaLrcjLo6euM1Wsi U9dATBU0h8NsLjOOOjmzHhNK4nw2NGuwUS7NfumTd3pwwD1vUZ5AOnJFH7CTkdjDqrrm jXxhpOrdMG2fTQmj2EBSPW8+vGgA3T6wwLhm4h0GHQ6+nJZm3tHeTA/B0OlE1prqT0BO XoZ7UatwUhPrhenf9zzDPfWKjEMlSdAlWJsef+ibghZTY9mV5UGme7bs3rYIKJlIcxlq 5DF/bTKuXEX56O2gK77Jh6S9yNv8lUA86PepY+xaDEaXcERwVpAzQLJT+uqmMVDPkzuH wGqg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=vCxzGMYQ5XYsIMvEka2yGtICetDhhIUM/zOjJg2pJW0=; b=DUi1yYpn7k3HbXKE2X3NhXRxpVuwq2iRSlQxntSP/HPfKX/jYqBTfJkyVugzk8M6RY vF2vxwWFqhWnBB7AkZLm0qxvqKPqMYsZkzUuUgKq5WxZtbExpdl9z9Z2Bzy93+viIPe1 /Z05YrwyhcmY+lk+jKsud5BrENZumE12zTgCguUfXANsDElg0jN3XW0Obo8Lff5jN97Q 1ZJprKasZFO+ojsIy0VPsYhdBV73qv/IbO/gHtjmYI5tPBS5zhr/5hvk7g9rG4lExpYM NuXuUEl4Mod4+74P9HzFZooNqyqgMUkv2PVKYMqKmnGKaVbOO9BTBkWEG0j5ovOPX1ng kh4Q== X-Gm-Message-State: ALKqPwfJ8+h9P8ewMCs0NoGJpYsnn3KyPEFuzcEs/kfIjWbyGFnzxjqG 2cs+ZhW0WgtOujC17iwOc9OiFA== X-Received: by 2002:a2e:83d7:: with SMTP id s23-v6mr7862343ljh.34.1527853299691; Fri, 01 Jun 2018 04:41:39 -0700 (PDT) Received: from a2k-HP-ProDesk-600-G2-SFF.kyiv.epam.com (ll-51.209.223.85.sovam.net.ua. [85.223.209.51]) by smtp.gmail.com with ESMTPSA id c6-v6sm8066280lja.22.2018.06.01.04.41.37 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 01 Jun 2018 04:41:38 -0700 (PDT) From: Oleksandr Andrushchenko To: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, jgross@suse.com, boris.ostrovsky@oracle.com, konrad.wilk@oracle.com Cc: daniel.vetter@intel.com, andr2000@gmail.com, dongwon.kim@intel.com, matthew.d.roper@intel.com, Oleksandr Andrushchenko Subject: [PATCH v2 0/9] xen: dma-buf support for grant device Date: Fri, 1 Jun 2018 14:41:23 +0300 Message-Id: <20180601114132.22596-1-andr2000@gmail.com> X-Mailer: git-send-email 2.17.0 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Oleksandr Andrushchenko This work is in response to my previous attempt to introduce Xen/DRM zero-copy driver [1] to enable Linux dma-buf API [2] for Xen based frontends/backends. There is also an existing hyper_dmabuf approach available [3] which, if reworked to utilize the proposed solution, can greatly benefit as well. RFC for this series was published and discussed [9], comments addressed. The original rationale behind this work was to enable zero-copying use-cases while working with Xen para-virtual display driver [4]: when using Xen PV DRM frontend driver then on backend side one will need to do copying of display buffers' contents (filled by the frontend's user-space) into buffers allocated at the backend side. Taking into account the size of display buffers and frames per second it may result in unneeded huge data bus occupation and performance loss. The helper driver [4] allows implementing zero-copying use-cases when using Xen para-virtualized frontend display driver by implementing a DRM/KMS helper driver running on backend's side. It utilizes PRIME buffers API (implemented on top of Linux dma-buf) to share frontend's buffers with physical device drivers on backend's side: - a dumb buffer created on backend's side can be shared with the Xen PV frontend driver, so it directly writes into backend's domain memory (into the buffer exported from DRM/KMS driver of a physical display device) - a dumb buffer allocated by the frontend can be imported into physical device DRM/KMS driver, thus allowing to achieve no copying as well Finally, it was discussed and decided ([1], [5]) that it is worth implementing such use-cases via extension of the existing Xen gntdev driver instead of introducing new DRM specific driver. Please note, that the support of dma-buf is Linux only, as dma-buf is a Linux only thing. Now to the proposed solution. The changes to the existing Xen drivers in the Linux kernel fall into 2 categories: 1. DMA-able memory buffer allocation and increasing/decreasing memory reservation of the pages of such a buffer. This is required if we are about to share dma-buf with the hardware that does require those to be allocated with dma_alloc_xxx API. (It is still possible to allocate a dma-buf from any system memory, e.g. system pages). 2. Extension of the gntdev driver to enable it to import/export dma-buf’s. The first five patches are in preparation for Xen dma-buf support, but I consider those usable regardless of the dma-buf use-case, e.g. other frontend/backend kernel modules may also benefit from these for better code reuse: 0001-xen-grant-table-Export-gnttab_-alloc-free-_pages-as-.patch 0002-xen-grant-table-Make-set-clear-page-private-code-sha.patch 0003-xen-balloon-Share-common-memory-reservation-routines.patch 0004-xen-grant-table-Allow-allocating-buffers-suitable-fo.patch 0005-xen-gntdev-Allow-mappings-for-DMA-buffers.patch The next three patches are Xen implementation of dma-buf as part of the grant device: 0006-xen-gntdev-Add-initial-support-for-dma-buf-UAPI.patch 0007-xen-gntdev-Implement-dma-buf-export-functionality.patch 0008-xen-gntdev-Implement-dma-buf-import-functionality.patch The last patch makes it possible for in-kernel use of Xen dma-buf API: 0009-xen-gntdev-Expose-gntdev-s-dma-buf-API-for-in-kernel.patch The corresponding libxengnttab changes are available at [6]. All the above was tested with display backend [7] and its accompanying helper library [8] on Renesas ARM64 based board. Basic balloon tests on x86. *To all the communities*: I would like to ask you to review the proposed solution and give feedback on it, so I can improve and send final patches for review (this is still work in progress, but enough to start discussing the implementation). Thank you in advance, Oleksandr Andrushchenko [1] https://lists.freedesktop.org/archives/dri-devel/2018-April/173163.html [2] https://elixir.bootlin.com/linux/v4.17-rc5/source/Documentation/driver-api/dma-buf.rst [3] https://lists.xenproject.org/archives/html/xen-devel/2018-02/msg01202.html [4] https://cgit.freedesktop.org/drm/drm-misc/tree/drivers/gpu/drm/xen [5] https://patchwork.kernel.org/patch/10279681/ [6] https://github.com/andr2000/xen/tree/xen_dma_buf_v1 [7] https://github.com/andr2000/displ_be/tree/xen_dma_buf_v1 [8] https://github.com/andr2000/libxenbe/tree/xen_dma_buf_v1 [9] https://lkml.org/lkml/2018/5/17/215 Changes since v1: ***************** - Define GNTDEV_DMA_FLAG_XXX starting from bit 0 - Rename mem_reservation.h to mem-reservation.h - Remove usless comments - Change licenses from GPLv2 OR MIT to GPLv2 only - Make xenmem_reservation_va_mapping_{update|clear} inline - Change EXPORT_SYMBOL to EXPORT_SYMBOL_GPL for new functions - Make gnttab_dma_{alloc|free}_pages to request frames array be allocated outside - Fixe gnttab_dma_alloc_pages fail path (added xenmem_reservation_increase) - Move most of dma-buf from gntdev.c to gntdev-dmabuf.c - Add required dependencies to Kconfig - Rework "#ifdef CONFIG_XEN_XXX" for if/else - Export gnttab_{alloc|free}_pages as GPL symbols (patch 1) Oleksandr Andrushchenko (9): xen/grant-table: Export gnttab_{alloc|free}_pages as GPL xen/grant-table: Make set/clear page private code shared xen/balloon: Share common memory reservation routines xen/grant-table: Allow allocating buffers suitable for DMA xen/gntdev: Allow mappings for DMA buffers xen/gntdev: Add initial support for dma-buf UAPI xen/gntdev: Implement dma-buf export functionality xen/gntdev: Implement dma-buf import functionality xen/gntdev: Expose gntdev's dma-buf API for in-kernel use drivers/xen/Kconfig | 23 ++ drivers/xen/Makefile | 2 + drivers/xen/balloon.c | 71 +--- drivers/xen/gntdev-dmabuf.c | 707 ++++++++++++++++++++++++++++++++++ drivers/xen/gntdev-dmabuf.h | 48 +++ drivers/xen/gntdev.c | 387 ++++++++++++++++++- drivers/xen/grant-table.c | 165 +++++++- drivers/xen/mem-reservation.c | 120 ++++++ include/uapi/xen/gntdev.h | 106 +++++ include/xen/grant_dev.h | 37 ++ include/xen/grant_table.h | 21 + include/xen/mem-reservation.h | 65 ++++ 12 files changed, 1647 insertions(+), 105 deletions(-) create mode 100644 drivers/xen/gntdev-dmabuf.c create mode 100644 drivers/xen/gntdev-dmabuf.h create mode 100644 drivers/xen/mem-reservation.c create mode 100644 include/xen/grant_dev.h create mode 100644 include/xen/mem-reservation.h -- 2.17.0