Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp513034imm; Wed, 6 Jun 2018 01:15:12 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKRTXya9VcZfZLaIsTVaQAtyluGITdqRp4/YkvTlw/F9AntthEADnbU3G/oeVoC33KQ0k0V X-Received: by 2002:a62:ca99:: with SMTP id y25-v6mr1445531pfk.187.1528272912844; Wed, 06 Jun 2018 01:15:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528272912; cv=none; d=google.com; s=arc-20160816; b=pN8x5AuLiKvyDajXP+h2eGI4GVMf9TqsXvWZpp8E7axMH3joE6D1t1adXoj0MdiUOx ZIAVeBMoAs8v7a8vj740a/VJ7Wmr8DdHgoiat//NsbYRQg7zuJ08JsM3Lw2/PB+7RN9U zriKPnhVqyMmDOrio+OWsKUS76wgnM+Rrufg3ZYgPDJJU2XnYAQo/yt98dOlC7TsPMKl kCL7iIlTr22tv1E+pNEPVGGbT/hea56m7X2T78hGBEV45vwmHIzSnXvtrpWYjFnHsnqE 8+J/ODsbHb9xXNDVK26BuQotT3UILCpep/F/EKEYbYOPwIymq2rgHYLs/U+nXOPtM4iK 4OQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=vzTwuKUa1Mp4gSv0ZZ/gD+COf7R225EXSPgRXzk1HZ4=; b=aqzszPzinQuTI9rua4oCdrQNe3KiEC4x93xKv7hDOthMNUV2cy76lbBdY8JYnCnnH7 q413KP7NIfKaysqc001ykVhAtv9zvT3nrCzs8CP94q3gjBXTy+P86hX8CFRCA84gKB5h Tp6vklQB6DDhXmwNhCCt7M99cr7sKrMWXOWFq8DP+WKV0PdDk9Z9cmuHeNovOhuz8OXK bRKwxK7RpdH2ZOuW9aBjRb8VQ5/NFgFTOJxOegW1QU5/9yBTK8DrWbph08I86/7P4Jer 1fMY8tfIy8J5fSaHko+MFfcssT02YEoUzu4OTJ9Z8Cr07YKE2QTHDgHN7xX3orPaNN4W xyhA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=p33Op+KD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 64-v6si50276055pfl.309.2018.06.06.01.14.58; Wed, 06 Jun 2018 01:15:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=p33Op+KD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932493AbeFFIOS (ORCPT + 99 others); Wed, 6 Jun 2018 04:14:18 -0400 Received: from mail-lf0-f65.google.com ([209.85.215.65]:43609 "EHLO mail-lf0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932405AbeFFIOQ (ORCPT ); Wed, 6 Jun 2018 04:14:16 -0400 Received: by mail-lf0-f65.google.com with SMTP id n15-v6so7686344lfn.10; Wed, 06 Jun 2018 01:14:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=vzTwuKUa1Mp4gSv0ZZ/gD+COf7R225EXSPgRXzk1HZ4=; b=p33Op+KD9xyrmXqqrC2+TzmUrUTF049Ako0Vma5GciLFLtZiNrKKijn5anIXBXUXHc duJYtaZlstMJHZVLytShxZaAI1i5EHaO57NZwFEFWmPCvY7F9Bgy9sxdvM8vCVofqX7i luxJVSIoC16Jca4Ew1FboCZjRaTJrCB/Sb8afigZMwSXrCyY32GndSJ+uc+JkdYP1X3f IJ05fGGJjfNSiKeil+B/9C0mlII4W7hC9nFWfeZDTWa4dLN69yEIBssJfLwLuL6EXClr /IekdxF9RP92dRGjC0wUgEhVwuKiDCOv/exXRidWwDWK2nZd4iaTT7HGGzGLtJraFo5X vP0Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=vzTwuKUa1Mp4gSv0ZZ/gD+COf7R225EXSPgRXzk1HZ4=; b=lmIkGmQgv6v/Rj0yrUn9bbjq5Ou7XgZpkslAZZ0HKfoU0vovz8iXrcfmhczHE+f+pX 5Oi1MH4TVIc3ks+llMyfdhLFJ5eWRWGg0+NX66rBDxQEtOSbXZdaDi4Az0dsBiBFNle1 RImMWxOIW5/6/pxByUF4ICGIKSdzUHiMLUgNph0KSzHZKYkbJ0NvlaTo1+X/5EsyHk7Y YnXxsfxoyJZYwZ6od0bBxadFGtaQqthKpS4OCWntjhS5fPKUo+/exjQ5LCifrjypwq+A 0fhXnCZSgdfNqFeaj6IM4bpL+Ne0UO9HwtzQdhrL3lZcMjUTz8nnrYp7xEzRFsNV7MN2 Vp0A== X-Gm-Message-State: APt69E2bWFnn5j43LNMYiTR+SmMSKnn0AAkySQiC0JMUtyBjHgUTcl0b 3kXyLCl/dEyLyfS3XcG4HgbX/aI/ X-Received: by 2002:a19:944f:: with SMTP id w76-v6mr1259438lfd.90.1528272854541; Wed, 06 Jun 2018 01:14:14 -0700 (PDT) Received: from [10.17.182.9] (ll-55.209.223.85.sovam.net.ua. [85.223.209.55]) by smtp.gmail.com with ESMTPSA id n4-v6sm6055921ljc.35.2018.06.06.01.14.13 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 06 Jun 2018 01:14:13 -0700 (PDT) Subject: Re: [Xen-devel] [PATCH v2 5/9] xen/gntdev: Allow mappings for DMA buffers To: Boris Ostrovsky , xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, jgross@suse.com, konrad.wilk@oracle.com Cc: daniel.vetter@intel.com, matthew.d.roper@intel.com, dongwon.kim@intel.com, Oleksandr Andrushchenko References: <20180601114132.22596-1-andr2000@gmail.com> <20180601114132.22596-6-andr2000@gmail.com> <64facf05-0a51-c3d9-9d3b-780893248628@oracle.com> From: Oleksandr Andrushchenko Message-ID: <84217eac-b83b-710f-39ab-c93cad65bf9a@gmail.com> Date: Wed, 6 Jun 2018 11:14:12 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <64facf05-0a51-c3d9-9d3b-780893248628@oracle.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 06/04/2018 11:12 PM, Boris Ostrovsky wrote: > On 06/01/2018 07:41 AM, Oleksandr Andrushchenko wrote: >> From: Oleksandr Andrushchenko >> >> Allow mappings for DMA backed buffers if grant table module >> supports such: this extends grant device to not only map buffers >> made of balloon pages, but also from buffers allocated with >> dma_alloc_xxx. >> >> Signed-off-by: Oleksandr Andrushchenko >> --- >> drivers/xen/gntdev.c | 99 ++++++++++++++++++++++++++++++++++++++- >> include/uapi/xen/gntdev.h | 15 ++++++ >> 2 files changed, 112 insertions(+), 2 deletions(-) >> >> diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c >> index bd56653b9bbc..9813fc440c70 100644 >> --- a/drivers/xen/gntdev.c >> +++ b/drivers/xen/gntdev.c >> @@ -37,6 +37,9 @@ >> #include >> #include >> #include >> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC >> +#include >> +#endif >> >> #include >> #include >> @@ -72,6 +75,11 @@ struct gntdev_priv { >> struct mutex lock; >> struct mm_struct *mm; >> struct mmu_notifier mn; >> + >> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC >> + /* Device for which DMA memory is allocated. */ >> + struct device *dma_dev; >> +#endif >> }; >> >> struct unmap_notify { >> @@ -96,10 +104,27 @@ struct grant_map { >> struct gnttab_unmap_grant_ref *kunmap_ops; >> struct page **pages; >> unsigned long pages_vm_start; >> + >> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC >> + /* >> + * If dmabuf_vaddr is not NULL then this mapping is backed by DMA >> + * capable memory. >> + */ >> + >> + struct device *dma_dev; >> + /* Flags used to create this DMA buffer: GNTDEV_DMA_FLAG_XXX. */ >> + int dma_flags; >> + void *dma_vaddr; >> + dma_addr_t dma_bus_addr; >> + /* This is required for gnttab_dma_{alloc|free}_pages. */ > How about > > /* Needed to avoid allocation in gnttab_dma_free_pages(). */ > Ok >> + xen_pfn_t *frames; >> +#endif >> }; >> >> static int unmap_grant_pages(struct grant_map *map, int offset, int pages); >> >> +static struct miscdevice gntdev_miscdev; >> + >> /* ------------------------------------------------------------------ */ >> >> static void gntdev_print_maps(struct gntdev_priv *priv, >> @@ -121,8 +146,27 @@ static void gntdev_free_map(struct grant_map *map) >> if (map == NULL) >> return; >> >> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC >> + if (map->dma_vaddr) { >> + struct gnttab_dma_alloc_args args; >> + >> + args.dev = map->dma_dev; >> + args.coherent = map->dma_flags & GNTDEV_DMA_FLAG_COHERENT; >> + args.nr_pages = map->count; >> + args.pages = map->pages; >> + args.frames = map->frames; >> + args.vaddr = map->dma_vaddr; >> + args.dev_bus_addr = map->dma_bus_addr; >> + >> + gnttab_dma_free_pages(&args); >> + } else >> +#endif >> if (map->pages) >> gnttab_free_pages(map->count, map->pages); >> + >> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC >> + kfree(map->frames); >> +#endif > > Can this be done under if (map->dma_vaddr) ? > In other words, is it > possible for dma_vaddr to be NULL and still have unallocated frames pointer? It is possible to have vaddr == NULL and frames != NULL as we allocate frames outside of gnttab_dma_alloc_pages which may fail. Calling kfree on NULL pointer is safe, so I see no reason to change this code. > >> kfree(map->pages); >> kfree(map->grants); >> kfree(map->map_ops); >> @@ -132,7 +176,8 @@ static void gntdev_free_map(struct grant_map *map) >> kfree(map); >> } >> >> -static struct grant_map *gntdev_alloc_map(struct gntdev_priv *priv, int count) >> +static struct grant_map *gntdev_alloc_map(struct gntdev_priv *priv, int count, >> + int dma_flags) >> { >> struct grant_map *add; >> int i; >> @@ -155,6 +200,37 @@ static struct grant_map *gntdev_alloc_map(struct gntdev_priv *priv, int count) >> NULL == add->pages) >> goto err; >> >> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC >> + add->dma_flags = dma_flags; >> + >> + /* >> + * Check if this mapping is requested to be backed >> + * by a DMA buffer. >> + */ >> + if (dma_flags & (GNTDEV_DMA_FLAG_WC | GNTDEV_DMA_FLAG_COHERENT)) { >> + struct gnttab_dma_alloc_args args; >> + >> + add->frames = kcalloc(count, sizeof(add->frames[0]), >> + GFP_KERNEL); >> + if (!add->frames) >> + goto err; >> + >> + /* Remember the device, so we can free DMA memory. */ >> + add->dma_dev = priv->dma_dev; >> + >> + args.dev = priv->dma_dev; >> + args.coherent = dma_flags & GNTDEV_DMA_FLAG_COHERENT; >> + args.nr_pages = count; >> + args.pages = add->pages; >> + args.frames = add->frames; >> + >> + if (gnttab_dma_alloc_pages(&args)) >> + goto err; >> + >> + add->dma_vaddr = args.vaddr; >> + add->dma_bus_addr = args.dev_bus_addr; >> + } else >> +#endif >> if (gnttab_alloc_pages(count, add->pages)) >> goto err; >> >> @@ -325,6 +401,14 @@ static int map_grant_pages(struct grant_map *map) >> map->unmap_ops[i].handle = map->map_ops[i].handle; >> if (use_ptemod) >> map->kunmap_ops[i].handle = map->kmap_ops[i].handle; >> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC >> + else if (map->dma_vaddr) { >> + unsigned long mfn; >> + >> + mfn = __pfn_to_mfn(page_to_pfn(map->pages[i])); > > Not pfn_to_mfn()? I'd love to, but pfn_to_mfn is only defined for x86, not ARM: [1] and [2] Thus, drivers/xen/gntdev.c:408:10: error: implicit declaration of function ‘pfn_to_mfn’ [-Werror=implicit-function-declaration]     mfn = pfn_to_mfn(page_to_pfn(map->pages[i])); So, I'll keep __pfn_to_mfn > > > -boris Thank you, Oleksandr >> + map->unmap_ops[i].dev_bus_addr = __pfn_to_phys(mfn); >> + } >> +#endif >> } >> return err; >> } >> @@ -548,6 +632,17 @@ static int gntdev_open(struct inode *inode, struct file *flip) >> } >> >> flip->private_data = priv; >> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC >> + priv->dma_dev = gntdev_miscdev.this_device; >> + >> + /* >> + * The device is not spawn from a device tree, so arch_setup_dma_ops >> + * is not called, thus leaving the device with dummy DMA ops. >> + * Fix this call of_dma_configure() with a NULL node to set >> + * default DMA ops. >> + */ >> + of_dma_configure(priv->dma_dev, NULL); >> +#endif >> pr_debug("priv %p\n", priv); >> >> return 0; >> @@ -589,7 +684,7 @@ static long gntdev_ioctl_map_grant_ref(struct gntdev_priv *priv, >> return -EINVAL; >> >> err = -ENOMEM; >> - map = gntdev_alloc_map(priv, op.count); >> + map = gntdev_alloc_map(priv, op.count, 0 /* This is not a dma-buf. */); >> if (!map) >> return err; >> >> diff --git a/include/uapi/xen/gntdev.h b/include/uapi/xen/gntdev.h >> index 6d1163456c03..4b9d498a31d4 100644 >> --- a/include/uapi/xen/gntdev.h >> +++ b/include/uapi/xen/gntdev.h >> @@ -200,4 +200,19 @@ struct ioctl_gntdev_grant_copy { >> /* Send an interrupt on the indicated event channel */ >> #define UNMAP_NOTIFY_SEND_EVENT 0x2 >> >> +/* >> + * Flags to be used while requesting memory mapping's backing storage >> + * to be allocated with DMA API. >> + */ >> + >> +/* >> + * The buffer is backed with memory allocated with dma_alloc_wc. >> + */ >> +#define GNTDEV_DMA_FLAG_WC (1 << 0) >> + >> +/* >> + * The buffer is backed with memory allocated with dma_alloc_coherent. >> + */ >> +#define GNTDEV_DMA_FLAG_COHERENT (1 << 1) >> + >> #endif /* __LINUX_PUBLIC_GNTDEV_H__ */ > > _______________________________________________ > Xen-devel mailing list > Xen-devel@lists.xenproject.org > https://lists.xenproject.org/mailman/listinfo/xen-devel [1] https://elixir.bootlin.com/linux/v4.17/ident/pfn_to_mfn [2] https://elixir.bootlin.com/linux/v4.17/ident/__pfn_to_mfn