Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp4428489imm; Mon, 11 Jun 2018 12:09:29 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKKktggSN6YeMI0SFbhRflBvQSPxkABDqDAOO2QWMWWgt8S8+W+W2LN0Lw3Gw0E6ao7qkIg X-Received: by 2002:a62:9e0b:: with SMTP id s11-v6mr442208pfd.198.1528744169402; Mon, 11 Jun 2018 12:09:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528744169; cv=none; d=google.com; s=arc-20160816; b=07GQh8GDKru/lHF/u10YdpeXqe6u6fAJ4ikIDY4j/kW/XTlCPjRjWt6WB36urCy0Q+ Nx7OAuREepUjbQiR7vvFjGb28EnV0JYWfwkERquczfJKUUjQkA9Yy2FnHCs9Q2zw2yyn 3/aQww21JWj2Hu8i0PzmK5+GcsqDHpVcBTitYqvmu/JOeOUV4CLfAX93293hXDuPbtFy xHXXEZHPF3lUvuCThkXGtkVU0xnePsMI5sXgXXBoiOKdaSEHFG7NzvhAiU9IusvgakA9 tLhau/hdsYgNHelT5QWZRoXR1wjHb5M/gRPBGM/fMUuEVTCrmcRcfpip3b0zE7DWTPP9 41gw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=fvuGcMkUT9IwMiLrAH2SP5yxSLt3X4HZ09u/7Q9tJHg=; b=CnrAHcgeTOu+Pmz8P5xe7tgFZNWCwgPOGYfDuZomkCBTOhbJDEzuS/wpCuOIqwvN82 ojsWTgDmmYuelXltgpVzrkIexnCTTPgE+Jk9p8f8Vk11PnSka8aISSNWurBjTb7RcLSi yFt9U1FN4m0FlSF+cgCHqRE2m32J+9sDA1pXR7opy07ECPuhJ/J8vgPqTtbmTERKNgW3 vQKJWcbSlD2rP9zsSpSSPJPvhwTxroGAKrd+LldpzSjpSFNyd6FxctRdDwtUQuJ65oW2 CptWFWmzfFxo1Yugjk6oFeTBnz7h6pZbIYqWsHv1H8CUbisVP8OQI0G0AHe6FtyKSgFz QWfQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l187-v6si13324435pfc.87.2018.06.11.12.09.14; Mon, 11 Jun 2018 12:09:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933350AbeFKRrA (ORCPT + 99 others); Mon, 11 Jun 2018 13:47:00 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:54346 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932300AbeFKRq7 (ORCPT ); Mon, 11 Jun 2018 13:46:59 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id E56AE1435; Mon, 11 Jun 2018 10:46:58 -0700 (PDT) Received: from [192.168.43.63] (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 04A2B3F59D; Mon, 11 Jun 2018 10:46:51 -0700 (PDT) Subject: Re: [Xen-devel] [PATCH v2 5/9] xen/gntdev: Allow mappings for DMA buffers To: Oleksandr Andrushchenko , Stefano Stabellini , Oleksandr Andrushchenko Cc: Boris Ostrovsky , xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, jgross@suse.com, konrad.wilk@oracle.com, daniel.vetter@intel.com, matthew.d.roper@intel.com, dongwon.kim@intel.com References: <20180601114132.22596-1-andr2000@gmail.com> <20180601114132.22596-6-andr2000@gmail.com> <64facf05-0a51-c3d9-9d3b-780893248628@oracle.com> <84217eac-b83b-710f-39ab-c93cad65bf9a@gmail.com> <30fa03c0-1b75-c0b1-b14f-8b52ea584e20@gmail.com> <78dc2fc4-cdac-05b7-2c34-22b69e7e009c@oracle.com> <4be24882-185d-01e3-6aa1-751e341433c7@gmail.com> <06eff3fe-3ffc-47f6-6bd6-d8f2f823b382@gmail.com> From: Julien Grall Message-ID: <33984b9b-966a-78bb-0472-37af23b8ba9d@arm.com> Date: Mon, 11 Jun 2018 18:46:45 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On 06/11/2018 06:16 PM, Oleksandr Andrushchenko wrote: > On 06/11/2018 07:51 PM, Stefano Stabellini wrote: >> On Mon, 11 Jun 2018, Oleksandr Andrushchenko wrote: >>> On 06/08/2018 10:21 PM, Boris Ostrovsky wrote: >>>> On 06/08/2018 01:59 PM, Stefano Stabellini wrote: >>>>>>>>>>>>       @@ -325,6 +401,14 @@ static int map_grant_pages(struct >>>>>>>>>>>> grant_map >>>>>>>>>>>> *map) >>>>>>>>>>>>               map->unmap_ops[i].handle = >>>>>>>>>>>> map->map_ops[i].handle; >>>>>>>>>>>>               if (use_ptemod) >>>>>>>>>>>>                   map->kunmap_ops[i].handle = >>>>>>>>>>>> map->kmap_ops[i].handle; >>>>>>>>>>>> +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC >>>>>>>>>>>> +        else if (map->dma_vaddr) { >>>>>>>>>>>> +            unsigned long mfn; >>>>>>>>>>>> + >>>>>>>>>>>> +            mfn = __pfn_to_mfn(page_to_pfn(map->pages[i])); >>>>>>>>>>> Not pfn_to_mfn()? >>>>>>>>>> I'd love to, but pfn_to_mfn is only defined for x86, not ARM: >>>>>>>>>> [1] >>>>>>>>>> and [2] >>>>>>>>>> Thus, >>>>>>>>>> >>>>>>>>>> drivers/xen/gntdev.c:408:10: error: implicit declaration of >>>>>>>>>> function >>>>>>>>>> ‘pfn_to_mfn’ [-Werror=implicit-function-declaration] >>>>>>>>>>         mfn = pfn_to_mfn(page_to_pfn(map->pages[i])); >>>>>>>>>> >>>>>>>>>> So, I'll keep __pfn_to_mfn >>>>>>>>> How will this work on non-PV x86? >>>>>>>> So, you mean I need: >>>>>>>> #ifdef CONFIG_X86 >>>>>>>> mfn = pfn_to_mfn(page_to_pfn(map->pages[i])); >>>>>>>> #else >>>>>>>> mfn = __pfn_to_mfn(page_to_pfn(map->pages[i])); >>>>>>>> #endif >>>>>>>> >>>>>>> I'd rather fix it in ARM code. Stefano, why does ARM uses the >>>>>>> underscored version? >>>>>> Do you want me to add one more patch for ARM to wrap __pfn_to_mfn >>>>>> with static inline for ARM? e.g. >>>>>> static inline ...pfn_to_mfn(...) >>>>>> { >>>>>>       __pfn_to_mfn(); >>>>>> } >>>>> A Xen on ARM guest doesn't actually know the mfns behind its own >>>>> pseudo-physical pages. This is why we stopped using pfn_to_mfn and >>>>> started using pfn_to_bfn instead, which will generally return "pfn", >>>>> unless the page is a foreign grant. See include/xen/arm/page.h. >>>>> pfn_to_bfn was also introduced on x86. For example, see the usage of >>>>> pfn_to_bfn in drivers/xen/swiotlb-xen.c. Otherwise, if you don't care >>>>> about other mapped grants, you can just use pfn_to_gfn, that always >>>>> returns pfn. >>>> I think then this code needs to use pfn_to_bfn(). >>> Ok >>>> >>>>> Also, for your information, we support different page granularities in >>>>> Linux as a Xen guest, see the comment at include/xen/arm/page.h: >>>>> >>>>>     /* >>>>>      * The pseudo-physical frame (pfn) used in all the helpers is >>>>> always >>>>> based >>>>>      * on Xen page granularity (i.e 4KB). >>>>>      * >>>>>      * A Linux page may be split across multiple non-contiguous Xen >>>>> page so >>>>> we >>>>>      * have to keep track with frame based on 4KB page granularity. >>>>>      * >>>>>      * PV drivers should never make a direct usage of those helpers >>>>> (particularly >>>>>      * pfn_to_gfn and gfn_to_pfn). >>>>>      */ >>>>> >>>>> A Linux page could be 64K, but a Xen page is always 4K. A granted page >>>>> is also 4K. We have helpers to take into account the offsets to map >>>>> multiple Xen grants in a single Linux page, see for example >>>>> drivers/xen/grant-table.c:gnttab_foreach_grant. Most PV drivers have >>>>> been converted to be able to work with 64K pages correctly, but if I >>>>> remember correctly gntdev.c is the only remaining driver that doesn't >>>>> support 64K pages yet, so you don't have to deal with it if you don't >>>>> want to. >>>> I believe somewhere in this series there is a test for PAGE_SIZE vs. >>>> XEN_PAGE_SIZE. Right, Oleksandr? >>> Not in gntdev. You might have seen this in xen-drmfront/xen-sndfront, >>> but I didn't touch gntdev for that. Do you want me to add yet another >>> patch >>> in the series to check for that? >> gntdev.c is already not capable of handling PAGE_SIZE != XEN_PAGE_SIZE, >> so you are not going to break anything that is not already broken :-) If >> your new gntdev.c code relies on PAGE_SIZE == XEN_PAGE_SIZE, it might be >> good to add an in-code comment about it, just to make it easier to fix >> the whole of gntdev.c in the future. >> > Yes, I just mean I can add something like [1] as a separate patch to the > series, > so we are on the safe side here See my comment on Stefano's e-mail. I believe gntdev is able to handle PAGE_SIZE != XEN_PAGE_SIZE. So I would rather keep the behavior we have today for such case. Cheers, -- Julien Grall