Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp495974imm; Wed, 6 Jun 2018 00:53:49 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJB7lSBkxN6Lt1nWKRLTOYec/4x0DtcCEELoonoWxRfnbV0nqb2mKTtRqSI6y5Secc//AlG X-Received: by 2002:a63:a702:: with SMTP id d2-v6mr1757879pgf.246.1528271629804; Wed, 06 Jun 2018 00:53:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528271629; cv=none; d=google.com; s=arc-20160816; b=A9X78Ax85cRkagguukZNA7w6qdv9QSdFC+QnYeH6cq6eHDPKZdpQvl6iLrTchNeZ9l L56uRIAcRwomPuVion/rgzeLaZCQf+WljTIrNckas9oLloJwd9wkgGRtypESZjXWg51f xUDRiqHOzaGaFvISRD1JxTttpULEx/aOD+UQL7wS3zJXq8YXqgV7xICn58qfM2CPCy6P cUxqzdjd0Z9fuc0y31QGIa3SO/NjUieIq4EFSnviOlkzEnx1IuXCJxWPgc+Klp7jjCPJ d7GGWhbAUBA3uJrADYcxzP/MQGnAIi5fuY2D8UPmUM2lzLFZpunJZIdcdSHGtnzSm5PQ rEZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=xiMPOiKCtzon9d9NVG2a/Bq2+HRteOWJVBw0lQfsniQ=; b=o1iRwKsZRiC6MZEgkJkOg9T4jsE1RHFhS4r3s7FgTcYb5fJw/TR/CfSZkbOXlp6pEN 6izvrPRBQ3HqbYlgAX3KJDDrs8nu4MTA/BmYOhYukAjNcrYbqMFe2w/nsA2vX9T3IE1L xglwzyZLzn0brnZfNW9S7Fki08U8MiI8ggqGOaVrZx/6gv+DB/pA6NJ0bT/EY94Y1iIW 4Ck9EtmCA66ZNWGRudfTWil3JTd516Lkz+oBJ6PVQNoSJTdzS/+VysUqTwM6rZpLWVVv ao7lqXMLqVc1q7zLsfCE/sczfjP1op6UsLzeGJkhI4ZsHf4me9I3K0xL49WUtY3OKJfa sTEg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=GFc+Q/IR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d10-v6si12252461pgo.630.2018.06.06.00.53.35; Wed, 06 Jun 2018 00:53:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=GFc+Q/IR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932510AbeFFHwl (ORCPT + 99 others); Wed, 6 Jun 2018 03:52:41 -0400 Received: from mail-lf0-f66.google.com ([209.85.215.66]:39617 "EHLO mail-lf0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932371AbeFFHv3 (ORCPT ); Wed, 6 Jun 2018 03:51:29 -0400 Received: by mail-lf0-f66.google.com with SMTP id t134-v6so7602717lff.6; Wed, 06 Jun 2018 00:51:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=xiMPOiKCtzon9d9NVG2a/Bq2+HRteOWJVBw0lQfsniQ=; b=GFc+Q/IRudDRXeFJ43CbS5Yb6wAPH+SLF+8sIs0ClQ6sBPsBtAPYvgED+Ygi8TLfeC 2xFRwCmdV11/EqZ63eDWDmLhN+A1NmOMRqf5THYV9fWMYkyXz9UzxeiSXN8eNXhEVAZh c1Hlo0mFOlSwi7SQgJ7s8sdOBbGFRY/+PjgQFJJXK/5A7ykHxeuJ3WvBa8DQABYHqOQ6 hTITOQ06OUayVsEBwfYhtkqWdasIjJdFE5s7pW0OxUfk8mlLZ2flgGdmjFGfaH9xhd+k a7GecDaMut1CP9nQ4S4vC34kU5kL4KllgTaG+t8m41652NRaIW2ThEQvQHXEsa4oeX7N JE6A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=xiMPOiKCtzon9d9NVG2a/Bq2+HRteOWJVBw0lQfsniQ=; b=Rp9Osc0RGtvMTYXUNYoRqFycpy7CdjbbycMFUGRyhb7nCUiUSW38U6KS8Qg2DdnyJn 5OcAAB6BTDE1cS/goxWfQjBEnxrnQPk5n8ECa3lkdv9pqoz1NdiQ5ZoEkcRroEukj7gs ZiZSdkEV4en0hNwad6wmtXX+jo5ykYIIVZ6FMhq2Hi0YZTy6JpYX0JLoxOwAbeBaNaaV xGgOkBS65XomkT+IlAmxoSe1AGABEz5Mtc/VfxCyaoo5cZM1DogMIs35ju1retrKWboZ VJw4O9bvOSB9doixsP6jRX2aRKG2KALeBS4yL7xZ2ywgDV7HZt7xhQnrdIR+R3ADd8B8 3XRw== X-Gm-Message-State: APt69E1yGODoZpdBrkhND8BfW3MrKmlwttpqzG0a458wPzsSrNopRDuJ ifsGLf5vlIoxuZtgBeLg1kE= X-Received: by 2002:a19:d7aa:: with SMTP id q42-v6mr1174844lfi.75.1528271487113; Wed, 06 Jun 2018 00:51:27 -0700 (PDT) Received: from [10.17.182.9] (ll-55.209.223.85.sovam.net.ua. [85.223.209.55]) by smtp.gmail.com with ESMTPSA id v1-v6sm10868717ljg.58.2018.06.06.00.51.25 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 06 Jun 2018 00:51:26 -0700 (PDT) Subject: Re: [PATCH v2 4/9] xen/grant-table: Allow allocating buffers suitable for DMA To: Boris Ostrovsky , xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, jgross@suse.com, konrad.wilk@oracle.com Cc: daniel.vetter@intel.com, dongwon.kim@intel.com, matthew.d.roper@intel.com, Oleksandr Andrushchenko References: <20180601114132.22596-1-andr2000@gmail.com> <20180601114132.22596-5-andr2000@gmail.com> <9214078e-6e94-e31b-6b36-c066e1aa5e40@oracle.com> From: Oleksandr Andrushchenko Message-ID: <35dd20e9-381a-2098-85e1-00b135e1370d@gmail.com> Date: Wed, 6 Jun 2018 10:51:24 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <9214078e-6e94-e31b-6b36-c066e1aa5e40@oracle.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 06/04/2018 09:46 PM, Boris Ostrovsky wrote: > On 06/01/2018 07:41 AM, Oleksandr Andrushchenko wrote: >> From: Oleksandr Andrushchenko >> >> Extend grant table module API to allow allocating buffers that can >> be used for DMA operations and mapping foreign grant references >> on top of those. >> The resulting buffer is similar to the one allocated by the balloon >> driver in terms that proper memory reservation is made >> ({increase|decrease}_reservation and VA mappings updated if needed). >> This is useful for sharing foreign buffers with HW drivers which >> cannot work with scattered buffers provided by the balloon driver, >> but require DMAable memory instead. >> >> Signed-off-by: Oleksandr Andrushchenko >> --- >> drivers/xen/Kconfig | 13 +++++ >> drivers/xen/grant-table.c | 109 ++++++++++++++++++++++++++++++++++++++ >> include/xen/grant_table.h | 18 +++++++ >> 3 files changed, 140 insertions(+) >> >> diff --git a/drivers/xen/Kconfig b/drivers/xen/Kconfig >> index e5d0c28372ea..39536ddfbce4 100644 >> --- a/drivers/xen/Kconfig >> +++ b/drivers/xen/Kconfig >> @@ -161,6 +161,19 @@ config XEN_GRANT_DEV_ALLOC >> to other domains. This can be used to implement frontend drivers >> or as part of an inter-domain shared memory channel. >> >> +config XEN_GRANT_DMA_ALLOC >> + bool "Allow allocating DMA capable buffers with grant reference module" >> + depends on XEN && HAS_DMA >> + help >> + Extends grant table module API to allow allocating DMA capable >> + buffers and mapping foreign grant references on top of it. >> + The resulting buffer is similar to one allocated by the balloon >> + driver in terms that proper memory reservation is made >> + ({increase|decrease}_reservation and VA mappings updated if needed). >> + This is useful for sharing foreign buffers with HW drivers which >> + cannot work with scattered buffers provided by the balloon driver, >> + but require DMAable memory instead. >> + >> config SWIOTLB_XEN >> def_bool y >> select SWIOTLB >> diff --git a/drivers/xen/grant-table.c b/drivers/xen/grant-table.c >> index dbb48a89e987..5658e58d9cc6 100644 >> --- a/drivers/xen/grant-table.c >> +++ b/drivers/xen/grant-table.c >> @@ -45,6 +45,9 @@ >> #include >> #include >> #include >> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC >> +#include >> +#endif >> >> #include >> #include >> @@ -57,6 +60,7 @@ >> #ifdef CONFIG_X86 >> #include >> #endif >> +#include >> #include >> #include >> >> @@ -811,6 +815,73 @@ int gnttab_alloc_pages(int nr_pages, struct page **pages) >> } >> EXPORT_SYMBOL_GPL(gnttab_alloc_pages); >> >> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC >> +/** >> + * gnttab_dma_alloc_pages - alloc DMAable pages suitable for grant mapping into >> + * @args: arguments to the function >> + */ >> +int gnttab_dma_alloc_pages(struct gnttab_dma_alloc_args *args) >> +{ >> + unsigned long pfn, start_pfn; >> + size_t size; >> + int i, ret; >> + >> + size = args->nr_pages << PAGE_SHIFT; >> + if (args->coherent) >> + args->vaddr = dma_alloc_coherent(args->dev, size, >> + &args->dev_bus_addr, >> + GFP_KERNEL | __GFP_NOWARN); >> + else >> + args->vaddr = dma_alloc_wc(args->dev, size, >> + &args->dev_bus_addr, >> + GFP_KERNEL | __GFP_NOWARN); >> + if (!args->vaddr) { >> + pr_err("Failed to allocate DMA buffer of size %zu\n", size); >> + return -ENOMEM; >> + } >> + >> + start_pfn = __phys_to_pfn(args->dev_bus_addr); >> + for (pfn = start_pfn, i = 0; pfn < start_pfn + args->nr_pages; >> + pfn++, i++) { >> + struct page *page = pfn_to_page(pfn); >> + >> + args->pages[i] = page; >> + args->frames[i] = xen_page_to_gfn(page); >> + xenmem_reservation_scrub_page(page); >> + } >> + >> + xenmem_reservation_va_mapping_reset(args->nr_pages, args->pages); >> + >> + ret = xenmem_reservation_decrease(args->nr_pages, args->frames); >> + if (ret != args->nr_pages) { >> + pr_err("Failed to decrease reservation for DMA buffer\n"); >> + ret = -EFAULT; >> + goto fail_free_dma; >> + } >> + >> + ret = gnttab_pages_set_private(args->nr_pages, args->pages); >> + if (ret < 0) >> + goto fail_clear_private; >> + >> + return 0; >> + >> +fail_clear_private: >> + gnttab_pages_clear_private(args->nr_pages, args->pages); >> +fail_free_dma: >> + xenmem_reservation_increase(args->nr_pages, args->frames); >> + xenmem_reservation_va_mapping_update(args->nr_pages, args->pages, >> + args->frames); >> + if (args->coherent) >> + dma_free_coherent(args->dev, size, >> + args->vaddr, args->dev_bus_addr); >> + else >> + dma_free_wc(args->dev, size, >> + args->vaddr, args->dev_bus_addr); >> + return ret; >> +} > > Would it be possible to call gnttab_dma_free_pages() here? As we moved frames array outside - yes, I'll call gnttab_dma_free_pages on failure then. > >> +EXPORT_SYMBOL_GPL(gnttab_dma_alloc_pages); >> +#endif >> + >> void gnttab_pages_clear_private(int nr_pages, struct page **pages) >> { >> int i; >> @@ -838,6 +909,44 @@ void gnttab_free_pages(int nr_pages, struct page **pages) >> } >> EXPORT_SYMBOL_GPL(gnttab_free_pages); >> >> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC > I'd move this after (or before) gnttab_dma_alloc_page() to keep both > inside a single ifdef block. Ok, will also move and regroup functions to be implemented close to each other: gnttab_dma_{alloc|free}_pages gnttab_{alloc|free}_pages gnttab_pages_{set|clear}_private > -boris > > >> +/** >> + * gnttab_dma_free_pages - free DMAable pages >> + * @args: arguments to the function >> + */ >> +int gnttab_dma_free_pages(struct gnttab_dma_alloc_args *args) >> +{ >> + size_t size; >> + int i, ret; >> + >> + gnttab_pages_clear_private(args->nr_pages, args->pages); >> + >> + for (i = 0; i < args->nr_pages; i++) >> + args->frames[i] = page_to_xen_pfn(args->pages[i]); >> + >> + ret = xenmem_reservation_increase(args->nr_pages, args->frames); >> + if (ret != args->nr_pages) { >> + pr_err("Failed to decrease reservation for DMA buffer\n"); >> + ret = -EFAULT; >> + } else { >> + ret = 0; >> + } >> + >> + xenmem_reservation_va_mapping_update(args->nr_pages, args->pages, >> + args->frames); >> + >> + size = args->nr_pages << PAGE_SHIFT; >> + if (args->coherent) >> + dma_free_coherent(args->dev, size, >> + args->vaddr, args->dev_bus_addr); >> + else >> + dma_free_wc(args->dev, size, >> + args->vaddr, args->dev_bus_addr); >> + return ret; >> +} >> +EXPORT_SYMBOL_GPL(gnttab_dma_free_pages); >> +#endif >> + >> /* Handling of paged out grant targets (GNTST_eagain) */ >> #define MAX_DELAY 256 >> static inline void >> diff --git a/include/xen/grant_table.h b/include/xen/grant_table.h >> index de03f2542bb7..9bc5bc07d4d3 100644 >> --- a/include/xen/grant_table.h >> +++ b/include/xen/grant_table.h >> @@ -198,6 +198,24 @@ void gnttab_free_auto_xlat_frames(void); >> int gnttab_alloc_pages(int nr_pages, struct page **pages); >> void gnttab_free_pages(int nr_pages, struct page **pages); >> >> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC >> +struct gnttab_dma_alloc_args { >> + /* Device for which DMA memory will be/was allocated. */ >> + struct device *dev; >> + /* If set then DMA buffer is coherent and write-combine otherwise. */ >> + bool coherent; >> + >> + int nr_pages; >> + struct page **pages; >> + xen_pfn_t *frames; >> + void *vaddr; >> + dma_addr_t dev_bus_addr; >> +}; >> + >> +int gnttab_dma_alloc_pages(struct gnttab_dma_alloc_args *args); >> +int gnttab_dma_free_pages(struct gnttab_dma_alloc_args *args); >> +#endif >> + >> int gnttab_pages_set_private(int nr_pages, struct page **pages); >> void gnttab_pages_clear_private(int nr_pages, struct page **pages); >>