Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp420206imm; Thu, 14 Jun 2018 23:29:41 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLJlrIGyKg2R62qmUtMfyjFnA3d7TSqqiRkruUh5NeA4Jk2s2JjXMl6qraCesGGoqlMgWnw X-Received: by 2002:a63:42c7:: with SMTP id p190-v6mr387838pga.142.1529044181849; Thu, 14 Jun 2018 23:29:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529044181; cv=none; d=google.com; s=arc-20160816; b=oQoNgqqLP2SkN9nbEn5DTWZYSYqGzhXoA2n7wb39yzElnHtY5aVe/YpVFJy3p3eGiP l9jVBgyMSoOmnJGK/U8RmZALXrRRvcK7N3N/XR72pK3b8wxZGREuLgjWxYJe+6+8Bwq1 EIfri7Bu1hJN6lmvYjsPFYJI58VAmudj+jQ0EWHSD6XQGjKAM/zSWMpjWwsUrBt+HzYc 4TkV5g03zQn7F+4LiKnBn9ICcL6no3HWy1gctAJunYX6Keccgi16pEfedSzuVRiCu45w zY6mnhGQIUFafnpX6l3ykQ+ehJ+v8VzidJOVGwMnwrW398qX9zaNEXGxU0DXQHGts4wT aIjQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=lO/YW3VD2qK4RjQ2OMGZtyBbkzRhl/hgXGJB1eXDFj4=; b=nzBXvxuJ3Edue29KGe0lzUsXlATHcXD1j1svS0gnnw2H93QMtUUklOCDgcZJgUA1Oe TRh3+O+PPK6xJ9Pc0vBgzqgiXOHYAFSKD68YyU9GkhQPEytkrdQuKmWzjEeF5spaCvDF +FUm2xf8m0Aat5x8bNRCkcQOzvF+yw9Yo9L9A1aOoRkgg7GKDSASYV1LlAwI/DyRurCc iXy0NnlwoJXzJFowonk6J2c8RMmU9rompd1X2qgGlNPkTJdOmyfPurpRm6/DbASzaLyK s7BUXdifALdcny241yZJNFmO9gsOhn+U/7N4nYTvh+r6ghRsaK+lMKlGfAtZG41YCLE3 6YCg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=tqXx3a0U; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3-v6si7546699plf.84.2018.06.14.23.29.27; Thu, 14 Jun 2018 23:29:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=tqXx3a0U; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755875AbeFOG2P (ORCPT + 99 others); Fri, 15 Jun 2018 02:28:15 -0400 Received: from mail-lf0-f65.google.com ([209.85.215.65]:34720 "EHLO mail-lf0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755801AbeFOG2M (ORCPT ); Fri, 15 Jun 2018 02:28:12 -0400 Received: by mail-lf0-f65.google.com with SMTP id o9-v6so13006660lfk.1; Thu, 14 Jun 2018 23:28:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=lO/YW3VD2qK4RjQ2OMGZtyBbkzRhl/hgXGJB1eXDFj4=; b=tqXx3a0UGbLLpzTB3GJS5YsBsH6zRpgsp5r+znpvG1HVERjtg+NTscxjS8PuTOZNHM bXFjXw8ixMpX1zhYPJ3gXW3VPNI7Gh71A3GvVgrjBnw0dciAoXkOUIxBkzOmoLKDKqqn 49/H7sxxijEkoOB/yGjkNZIwNlaldpZHO0R6jf40uCzg1GAZCBpO7nQ7WYxeFPtEqPdc qXP85d3eMhsMxePdzo7pco18a3054tBQyq9blHBJCrjAGgZSMwDQL+NtUAiQdzshI/87 IMGXby3rMZlqhwqU4O54cNdNcYVr/UytN7iITLCtQBrkU9vumiC54Hylz2LI6QfEfTq7 sZhQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=lO/YW3VD2qK4RjQ2OMGZtyBbkzRhl/hgXGJB1eXDFj4=; b=c3ze7xoBEl7gJI5xSdYPUFE1f+7IhQXyDDaxQpPsx0SGghLbTM3Ab1ngcphuT33MIW S+W9GNM/yU6QxLO+CDYPTQ2J38+TeMoG6pyb1rrjhdsA3AM5vCsU1oZcqAmn5EXcrmkp IQGZAc0U+JYkBUTU02uA6EJHhNzegO16nHnwvFvzFVaI6feXhiOGLSqyirNRS8atctou r1ge7ywTN3ro13CWn5ZpW/13NJlgQK/oImux99wkG/j77//oHSA9VEtJwWWIej7YiHoS OEQBvWk6rGXjrDuikMaDh2d363VwxDh7hGzEmaknUUMmJUuxZXkCGv4MUc8FEW5+R2EQ fMTg== X-Gm-Message-State: APt69E1N4zIx8iBC/n64RCzeQHJ8w2rzZFn/2gnjqvOpyB4OOJVE6Gw+ tph8ZjsEhh9i5IWZoSbn0Q17LdeC X-Received: by 2002:a19:9601:: with SMTP id y1-v6mr276280lfd.130.1529044090315; Thu, 14 Jun 2018 23:28:10 -0700 (PDT) Received: from a2k-HP-ProDesk-600-G2-SFF.kyiv.epam.com (ll-74.141.223.85.sovam.net.ua. [85.223.141.74]) by smtp.gmail.com with ESMTPSA id t126-v6sm1355040lff.7.2018.06.14.23.28.08 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 14 Jun 2018 23:28:09 -0700 (PDT) From: Oleksandr Andrushchenko To: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, jgross@suse.com, boris.ostrovsky@oracle.com, konrad.wilk@oracle.com Cc: daniel.vetter@intel.com, andr2000@gmail.com, dongwon.kim@intel.com, matthew.d.roper@intel.com, Oleksandr Andrushchenko Subject: [PATCH v4 5/9] xen/gntdev: Allow mappings for DMA buffers Date: Fri, 15 Jun 2018 09:27:49 +0300 Message-Id: <20180615062753.9229-6-andr2000@gmail.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180615062753.9229-1-andr2000@gmail.com> References: <20180615062753.9229-1-andr2000@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Oleksandr Andrushchenko Allow mappings for DMA backed buffers if grant table module supports such: this extends grant device to not only map buffers made of balloon pages, but also from buffers allocated with dma_alloc_xxx. Signed-off-by: Oleksandr Andrushchenko Reviewed-by: Boris Ostrovsky --- drivers/xen/gntdev.c | 99 ++++++++++++++++++++++++++++++++++++++- include/uapi/xen/gntdev.h | 15 ++++++ 2 files changed, 112 insertions(+), 2 deletions(-) diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index bd56653b9bbc..0ec670d1d4e7 100644 --- a/drivers/xen/gntdev.c +++ b/drivers/xen/gntdev.c @@ -37,6 +37,9 @@ #include #include #include +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC +#include +#endif #include #include @@ -72,6 +75,11 @@ struct gntdev_priv { struct mutex lock; struct mm_struct *mm; struct mmu_notifier mn; + +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + /* Device for which DMA memory is allocated. */ + struct device *dma_dev; +#endif }; struct unmap_notify { @@ -96,10 +104,27 @@ struct grant_map { struct gnttab_unmap_grant_ref *kunmap_ops; struct page **pages; unsigned long pages_vm_start; + +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + /* + * If dmabuf_vaddr is not NULL then this mapping is backed by DMA + * capable memory. + */ + + struct device *dma_dev; + /* Flags used to create this DMA buffer: GNTDEV_DMA_FLAG_XXX. */ + int dma_flags; + void *dma_vaddr; + dma_addr_t dma_bus_addr; + /* Needed to avoid allocation in gnttab_dma_free_pages(). */ + xen_pfn_t *frames; +#endif }; static int unmap_grant_pages(struct grant_map *map, int offset, int pages); +static struct miscdevice gntdev_miscdev; + /* ------------------------------------------------------------------ */ static void gntdev_print_maps(struct gntdev_priv *priv, @@ -121,8 +146,27 @@ static void gntdev_free_map(struct grant_map *map) if (map == NULL) return; +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + if (map->dma_vaddr) { + struct gnttab_dma_alloc_args args; + + args.dev = map->dma_dev; + args.coherent = !!(map->dma_flags & GNTDEV_DMA_FLAG_COHERENT); + args.nr_pages = map->count; + args.pages = map->pages; + args.frames = map->frames; + args.vaddr = map->dma_vaddr; + args.dev_bus_addr = map->dma_bus_addr; + + gnttab_dma_free_pages(&args); + } else +#endif if (map->pages) gnttab_free_pages(map->count, map->pages); + +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + kfree(map->frames); +#endif kfree(map->pages); kfree(map->grants); kfree(map->map_ops); @@ -132,7 +176,8 @@ static void gntdev_free_map(struct grant_map *map) kfree(map); } -static struct grant_map *gntdev_alloc_map(struct gntdev_priv *priv, int count) +static struct grant_map *gntdev_alloc_map(struct gntdev_priv *priv, int count, + int dma_flags) { struct grant_map *add; int i; @@ -155,6 +200,37 @@ static struct grant_map *gntdev_alloc_map(struct gntdev_priv *priv, int count) NULL == add->pages) goto err; +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + add->dma_flags = dma_flags; + + /* + * Check if this mapping is requested to be backed + * by a DMA buffer. + */ + if (dma_flags & (GNTDEV_DMA_FLAG_WC | GNTDEV_DMA_FLAG_COHERENT)) { + struct gnttab_dma_alloc_args args; + + add->frames = kcalloc(count, sizeof(add->frames[0]), + GFP_KERNEL); + if (!add->frames) + goto err; + + /* Remember the device, so we can free DMA memory. */ + add->dma_dev = priv->dma_dev; + + args.dev = priv->dma_dev; + args.coherent = !!(dma_flags & GNTDEV_DMA_FLAG_COHERENT); + args.nr_pages = count; + args.pages = add->pages; + args.frames = add->frames; + + if (gnttab_dma_alloc_pages(&args)) + goto err; + + add->dma_vaddr = args.vaddr; + add->dma_bus_addr = args.dev_bus_addr; + } else +#endif if (gnttab_alloc_pages(count, add->pages)) goto err; @@ -325,6 +401,14 @@ static int map_grant_pages(struct grant_map *map) map->unmap_ops[i].handle = map->map_ops[i].handle; if (use_ptemod) map->kunmap_ops[i].handle = map->kmap_ops[i].handle; +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + else if (map->dma_vaddr) { + unsigned long bfn; + + bfn = pfn_to_bfn(page_to_pfn(map->pages[i])); + map->unmap_ops[i].dev_bus_addr = __pfn_to_phys(bfn); + } +#endif } return err; } @@ -548,6 +632,17 @@ static int gntdev_open(struct inode *inode, struct file *flip) } flip->private_data = priv; +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + priv->dma_dev = gntdev_miscdev.this_device; + + /* + * The device is not spawn from a device tree, so arch_setup_dma_ops + * is not called, thus leaving the device with dummy DMA ops. + * Fix this by calling of_dma_configure() with a NULL node to set + * default DMA ops. + */ + of_dma_configure(priv->dma_dev, NULL); +#endif pr_debug("priv %p\n", priv); return 0; @@ -589,7 +684,7 @@ static long gntdev_ioctl_map_grant_ref(struct gntdev_priv *priv, return -EINVAL; err = -ENOMEM; - map = gntdev_alloc_map(priv, op.count); + map = gntdev_alloc_map(priv, op.count, 0 /* This is not a dma-buf. */); if (!map) return err; diff --git a/include/uapi/xen/gntdev.h b/include/uapi/xen/gntdev.h index 6d1163456c03..4b9d498a31d4 100644 --- a/include/uapi/xen/gntdev.h +++ b/include/uapi/xen/gntdev.h @@ -200,4 +200,19 @@ struct ioctl_gntdev_grant_copy { /* Send an interrupt on the indicated event channel */ #define UNMAP_NOTIFY_SEND_EVENT 0x2 +/* + * Flags to be used while requesting memory mapping's backing storage + * to be allocated with DMA API. + */ + +/* + * The buffer is backed with memory allocated with dma_alloc_wc. + */ +#define GNTDEV_DMA_FLAG_WC (1 << 0) + +/* + * The buffer is backed with memory allocated with dma_alloc_coherent. + */ +#define GNTDEV_DMA_FLAG_COHERENT (1 << 1) + #endif /* __LINUX_PUBLIC_GNTDEV_H__ */ -- 2.17.1