Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2634760imm; Fri, 20 Jul 2018 02:03:34 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcacJEmUyNejDS/N7FJWCB5fOd32byOImgJyzkUkWrGTaPv/PFoNGsLJp0SoQR7ooUJi6dY X-Received: by 2002:a63:338e:: with SMTP id z136-v6mr1220676pgz.171.1532077414016; Fri, 20 Jul 2018 02:03:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532077413; cv=none; d=google.com; s=arc-20160816; b=gCDhnuDgohyXtDScxpReFUtnhkghmVDKFDbeKYI4ol7B8JK06HRB59M3fJ36q1IAFM qk1iCjVwi+WETw/QIV6RqNAAGnlwOoUnRk7hlzdpr5mNp6JCn5DLt+/jZ17BwziB7BRJ oDmrnnsFA+oJ4xhUnpgYrAXBW8NkvkwNOsp8JEYWJ8JKCWEwteId3QpvOcD2yJib3iCR mVz1K1zTkPUsjIzqoqjqFufXGucnSFDfrBRNw2OQWLr93sK3mjtf0YwiOmtysTuSvt47 vxBowy4JUJT4zfoAjuVtmD9esg7Eg2XqlbTeWzk13GwbKsm3ukcm29G4G/m/0MpsVNJQ rjvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=/Q1vABwwh7H0rb1Vj3alynD1c0eaDYejJ8INmBKO6Tk=; b=LLNpyH8qCr6F2rVshnwLUQUyaOcoLr46IGh7gks6d1O68gc7ij5j58PnrTnqtJU4Jt ZUFA8VGo6pc6orWY1LX4nCgh9BB9aGJcbApDs23Lbjux0ntlVaQJOkb/1B9NDBaTfWAR PA2+/3fRjeXBNa9LZN+WJIFblTjRELaefBlT54D1ZDDmPHQI1dHAx26pVAkF7EQ+K0IK Q4YQ9UoBjdc59at8JwHp5aLtJtP2rHmOIw6J4+hiPDvSqj9Mb7o82zH09vf5g5eZkrfV lgCTdLmRsp/vW0kvkPYUZ+lnwTbu1UTX/LQg08tKsv7+pn3Wbnbctsw7y0/Z1t5+W8Wz yhVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=JHMGrdgP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e9-v6si1317757pgn.576.2018.07.20.02.03.19; Fri, 20 Jul 2018 02:03:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=JHMGrdgP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729817AbeGTJtY (ORCPT + 99 others); Fri, 20 Jul 2018 05:49:24 -0400 Received: from mail-lj1-f196.google.com ([209.85.208.196]:42315 "EHLO mail-lj1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727243AbeGTJtX (ORCPT ); Fri, 20 Jul 2018 05:49:23 -0400 Received: by mail-lj1-f196.google.com with SMTP id f1-v6so8876251ljc.9; Fri, 20 Jul 2018 02:02:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=/Q1vABwwh7H0rb1Vj3alynD1c0eaDYejJ8INmBKO6Tk=; b=JHMGrdgPINq6MKoi3oR9SIbR5utUDXwGRLc45SPTID84Bnck0ioXCaPviR18CTpvLM PYr4a4Jyczp+hOBC7xJcwrl7u1Cel7g7oBxRbYHSVfFmAv6bIJBqtzsp70USVfcWoaeI vu9CVSB9bmavHMnO/zzudtTMFr+njjcZigdjbjd0UtpU4CqSMi5biFSz4TqVFcaMygYk lBy4zHZNwObi4aT0jyPqNvVIFiW1GFvRe6yUjsDNUbKHPUUhe4G37KQhLFgYPRMo+5AM dqfjLMzUZW+ZaNRb9p6+7PorU9g+fcH81zPCCvVYJS2arSIeeNTHAGSTyuVZ+/MU5P29 dbNw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=/Q1vABwwh7H0rb1Vj3alynD1c0eaDYejJ8INmBKO6Tk=; b=hZFyxq2V8Ian3d5Z17K0hAHLw70juMPOZLHSDE4GDqAx5lqfFHRV0Jjtsc4Qeu92mq tuwNgNWfzaW1OjFZJtkntvcbEwA9zu0NRaJtedQbuMX0vSIM2Yr/pkZiBjjrFGsnkDcq YnCpg+67xHiaTNWpoZPgElqjZvhB0uXX/nqarZ4eso/7pAeyUsugUYkN3sLNlPp3lCyU 5mppVGnmMYXf/UNXUA1u6j8XqFOuzLoY3BpETOmT/lAPDuHCmgzYZMSV8vVEgpguN5nR kaOxiv/4jw86yzyoAynAqt2uNRwq5Z8GKnzJoAGGahm2FgZVtg1bbJea1XT/xofi6fos 2PbQ== X-Gm-Message-State: AOUpUlHmy2D0yAMUhA84ceKKPS2x3mHoUtDdWv78t1bVxm5DXdkHGXJf 6Yocoo7t18apqGxu+/ey7LU= X-Received: by 2002:a2e:4401:: with SMTP id r1-v6mr1060086lja.21.1532077324522; Fri, 20 Jul 2018 02:02:04 -0700 (PDT) Received: from a2k-HP-ProDesk-600-G2-SFF.kyiv.epam.com (ll-74.141.223.85.sovam.net.ua. [85.223.141.74]) by smtp.gmail.com with ESMTPSA id w2-v6sm252394lje.73.2018.07.20.02.02.03 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 20 Jul 2018 02:02:03 -0700 (PDT) From: Oleksandr Andrushchenko To: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, jgross@suse.com, boris.ostrovsky@oracle.com, konrad.wilk@oracle.com Cc: daniel.vetter@intel.com, andr2000@gmail.com, dongwon.kim@intel.com, matthew.d.roper@intel.com, Oleksandr Andrushchenko Subject: [PATCH v5 4/8] xen/gntdev: Allow mappings for DMA buffers Date: Fri, 20 Jul 2018 12:01:46 +0300 Message-Id: <20180720090150.24560-5-andr2000@gmail.com> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180720090150.24560-1-andr2000@gmail.com> References: <20180720090150.24560-1-andr2000@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Oleksandr Andrushchenko Allow mappings for DMA backed buffers if grant table module supports such: this extends grant device to not only map buffers made of balloon pages, but also from buffers allocated with dma_alloc_xxx. Signed-off-by: Oleksandr Andrushchenko Reviewed-by: Boris Ostrovsky --- drivers/xen/gntdev.c | 99 ++++++++++++++++++++++++++++++++++++++- include/uapi/xen/gntdev.h | 15 ++++++ 2 files changed, 112 insertions(+), 2 deletions(-) diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index bd56653b9bbc..173332f439d8 100644 --- a/drivers/xen/gntdev.c +++ b/drivers/xen/gntdev.c @@ -37,6 +37,9 @@ #include #include #include +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC +#include +#endif #include #include @@ -72,6 +75,11 @@ struct gntdev_priv { struct mutex lock; struct mm_struct *mm; struct mmu_notifier mn; + +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + /* Device for which DMA memory is allocated. */ + struct device *dma_dev; +#endif }; struct unmap_notify { @@ -96,10 +104,27 @@ struct grant_map { struct gnttab_unmap_grant_ref *kunmap_ops; struct page **pages; unsigned long pages_vm_start; + +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + /* + * If dmabuf_vaddr is not NULL then this mapping is backed by DMA + * capable memory. + */ + + struct device *dma_dev; + /* Flags used to create this DMA buffer: GNTDEV_DMA_FLAG_XXX. */ + int dma_flags; + void *dma_vaddr; + dma_addr_t dma_bus_addr; + /* Needed to avoid allocation in gnttab_dma_free_pages(). */ + xen_pfn_t *frames; +#endif }; static int unmap_grant_pages(struct grant_map *map, int offset, int pages); +static struct miscdevice gntdev_miscdev; + /* ------------------------------------------------------------------ */ static void gntdev_print_maps(struct gntdev_priv *priv, @@ -121,8 +146,27 @@ static void gntdev_free_map(struct grant_map *map) if (map == NULL) return; +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + if (map->dma_vaddr) { + struct gnttab_dma_alloc_args args; + + args.dev = map->dma_dev; + args.coherent = !!(map->dma_flags & GNTDEV_DMA_FLAG_COHERENT); + args.nr_pages = map->count; + args.pages = map->pages; + args.frames = map->frames; + args.vaddr = map->dma_vaddr; + args.dev_bus_addr = map->dma_bus_addr; + + gnttab_dma_free_pages(&args); + } else +#endif if (map->pages) gnttab_free_pages(map->count, map->pages); + +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + kfree(map->frames); +#endif kfree(map->pages); kfree(map->grants); kfree(map->map_ops); @@ -132,7 +176,8 @@ static void gntdev_free_map(struct grant_map *map) kfree(map); } -static struct grant_map *gntdev_alloc_map(struct gntdev_priv *priv, int count) +static struct grant_map *gntdev_alloc_map(struct gntdev_priv *priv, int count, + int dma_flags) { struct grant_map *add; int i; @@ -155,6 +200,37 @@ static struct grant_map *gntdev_alloc_map(struct gntdev_priv *priv, int count) NULL == add->pages) goto err; +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + add->dma_flags = dma_flags; + + /* + * Check if this mapping is requested to be backed + * by a DMA buffer. + */ + if (dma_flags & (GNTDEV_DMA_FLAG_WC | GNTDEV_DMA_FLAG_COHERENT)) { + struct gnttab_dma_alloc_args args; + + add->frames = kcalloc(count, sizeof(add->frames[0]), + GFP_KERNEL); + if (!add->frames) + goto err; + + /* Remember the device, so we can free DMA memory. */ + add->dma_dev = priv->dma_dev; + + args.dev = priv->dma_dev; + args.coherent = !!(dma_flags & GNTDEV_DMA_FLAG_COHERENT); + args.nr_pages = count; + args.pages = add->pages; + args.frames = add->frames; + + if (gnttab_dma_alloc_pages(&args)) + goto err; + + add->dma_vaddr = args.vaddr; + add->dma_bus_addr = args.dev_bus_addr; + } else +#endif if (gnttab_alloc_pages(count, add->pages)) goto err; @@ -325,6 +401,14 @@ static int map_grant_pages(struct grant_map *map) map->unmap_ops[i].handle = map->map_ops[i].handle; if (use_ptemod) map->kunmap_ops[i].handle = map->kmap_ops[i].handle; +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + else if (map->dma_vaddr) { + unsigned long bfn; + + bfn = pfn_to_bfn(page_to_pfn(map->pages[i])); + map->unmap_ops[i].dev_bus_addr = __pfn_to_phys(bfn); + } +#endif } return err; } @@ -548,6 +632,17 @@ static int gntdev_open(struct inode *inode, struct file *flip) } flip->private_data = priv; +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + priv->dma_dev = gntdev_miscdev.this_device; + + /* + * The device is not spawn from a device tree, so arch_setup_dma_ops + * is not called, thus leaving the device with dummy DMA ops. + * Fix this by calling of_dma_configure() with a NULL node to set + * default DMA ops. + */ + of_dma_configure(priv->dma_dev, NULL, true); +#endif pr_debug("priv %p\n", priv); return 0; @@ -589,7 +684,7 @@ static long gntdev_ioctl_map_grant_ref(struct gntdev_priv *priv, return -EINVAL; err = -ENOMEM; - map = gntdev_alloc_map(priv, op.count); + map = gntdev_alloc_map(priv, op.count, 0 /* This is not a dma-buf. */); if (!map) return err; diff --git a/include/uapi/xen/gntdev.h b/include/uapi/xen/gntdev.h index 6d1163456c03..4b9d498a31d4 100644 --- a/include/uapi/xen/gntdev.h +++ b/include/uapi/xen/gntdev.h @@ -200,4 +200,19 @@ struct ioctl_gntdev_grant_copy { /* Send an interrupt on the indicated event channel */ #define UNMAP_NOTIFY_SEND_EVENT 0x2 +/* + * Flags to be used while requesting memory mapping's backing storage + * to be allocated with DMA API. + */ + +/* + * The buffer is backed with memory allocated with dma_alloc_wc. + */ +#define GNTDEV_DMA_FLAG_WC (1 << 0) + +/* + * The buffer is backed with memory allocated with dma_alloc_coherent. + */ +#define GNTDEV_DMA_FLAG_COHERENT (1 << 1) + #endif /* __LINUX_PUBLIC_GNTDEV_H__ */ -- 2.18.0