Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3584563imu; Fri, 30 Nov 2018 02:49:00 -0800 (PST) X-Google-Smtp-Source: AFSGD/XzWHk1eVsDo0jdnKkmreWHD4ZdJrWC5/OUdEKfq+5uhVw1e8NkYbh1f9r5w4VcDGyOpOdt X-Received: by 2002:a62:8949:: with SMTP id v70mr4980937pfd.85.1543574940862; Fri, 30 Nov 2018 02:49:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543574940; cv=none; d=google.com; s=arc-20160816; b=YDd8GXlkhfDynySdl58x62wAGTbyidzxNc4rL7RQFzXPrYiz7f7aORbvq8UN0/bLXG JjV5KyiLHXCA/DeyfaqoIX7a8Md8bS7V049kj0BX9pa+IVEmynNu+vO0hkFB1YTQotQ+ 99fZCaiURTlubcPxdCgBvFa3ZGcFVRgUUo6vxki8ZuTnpwgXBQFJGxuaZ6Jw7uRVv01w 1o1i5rxS8sYba3XBYHG/FYl0lwna2mfIyFPzBKcEEpgUnpy/muY4eWhwNiVBB2etxb38 jnkZgUqV/Knc46wYGxIXLezhU1U1KdY+qG28VqyJHV93/4sdQfn1VyqxgXp4vcSreLxw QC4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=H9qjdn/c387gvtfUKEl5bxOl70UBdeJeDDgUe1gSkpE=; b=prX9apvdhnA5pH8Jj6SEqycXOQtIr0B9NQb71ZuD9RJ/8XeGE3JWsFHQZLiO/29Bd/ UNh+TTVdZ/AiCwoBpKDl9j4nbmyr6hgTB1W/nOKBs8dg956YPS0/F58b9qbZET9zLZwx h9TMBLGWDIUh03fw1abVfn/a5N10pWPShWLhjESSjGH6csR4Gs6ic4LJNCw0vdXCQIJO Se1ayn6kwUszvqHcgACqORiTxMZ7YA1hLjGJ/k7XozhzFUrQQUgfKDjBXHwzFsHcy7Ja q0dvFiV66K7ohsrMA4jvPByJhFz/Lc2D+uEHsy7Ve5m3tSIoBCoPukHB/khcglMJYDC8 uIcQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="Nva1STv/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p5-v6si5021331plo.7.2018.11.30.02.48.46; Fri, 30 Nov 2018 02:49:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="Nva1STv/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727096AbeK3V5A (ORCPT + 99 others); Fri, 30 Nov 2018 16:57:00 -0500 Received: from mail-wm1-f68.google.com ([209.85.128.68]:37377 "EHLO mail-wm1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726973AbeK3V46 (ORCPT ); Fri, 30 Nov 2018 16:56:58 -0500 Received: by mail-wm1-f68.google.com with SMTP id g67so5204823wmd.2 for ; Fri, 30 Nov 2018 02:48:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=H9qjdn/c387gvtfUKEl5bxOl70UBdeJeDDgUe1gSkpE=; b=Nva1STv/TgUvlEkf0QcVE8dinbAysbFyytKiD0H3cI6EtSxYjQZeAYvlcOeolkskDm bv1eaL2fmxHzbePFRfTruEzhtbmLc/V20hfM9BiYwRTkz+tSjKH6O4yS2pZHIdnSqWGy w4PrvPuJpkCTK7uxuFngQIFOel1GdwS0x1+II= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=H9qjdn/c387gvtfUKEl5bxOl70UBdeJeDDgUe1gSkpE=; b=fRsTg/oV9hF1QRxbQMl4xAivu5LDpibBXRsAkUQ4b8f/RzO2XONJvKq4NRSuzA1cTc 2az/1jJuU6WxxWfc1dAXqO7a0RJBAdP1ZjHp23hehEOVGZkFTWDen5g91CVnCPyQ6ozQ yjR+/t1wd/WzmHsYbawRxeE4dbLf3SX+XAmWZjpHGOuHS+GjzkSOc8CepLHHvtZ3qNi6 w9r0eQVF5fC+VyJ500qLcp0xtGuTne5n2FM1nQzHjnE1LElMmAMmMlk42CVBBwDEu6Sh mlxgOAm+R6cfeGdAbx3tjeSap+Yq/apcCC6NNllkHPkUvHMT6HYtpw9rIK8s41rU9G4g P3fw== X-Gm-Message-State: AA+aEWaN8HhFT3gRgpCygOl56xOB0zBtzpBjjbLtKBFNM3gXz/1av82K rZLOzHK1iaKkFyIU+bO8uM7jyg== X-Received: by 2002:a1c:2e0c:: with SMTP id u12mr4467144wmu.81.1543574883541; Fri, 30 Nov 2018 02:48:03 -0800 (PST) Received: from srini-hackbox.lan (cpc89974-aztw32-2-0-cust43.18-1.cable.virginm.net. [86.30.250.44]) by smtp.gmail.com with ESMTPSA id 18sm6964211wmm.32.2018.11.30.02.48.02 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 30 Nov 2018 02:48:02 -0800 (PST) From: Srinivas Kandagatla To: robh+dt@kernel.org, gregkh@linuxfoundation.org, arnd@arndb.de Cc: mark.rutland@arm.com, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, bjorn.andersson@linaro.org, linux-arm-msm@vger.kernel.org, bkumar@qti.qualcomm.com, thierry.escande@linaro.org, Srinivas Kandagatla Subject: [RFC PATCH 5/6] char: fastrpc: Add support for dmabuf exporter Date: Fri, 30 Nov 2018 10:46:56 +0000 Message-Id: <20181130104657.14875-6-srinivas.kandagatla@linaro.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181130104657.14875-1-srinivas.kandagatla@linaro.org> References: <20181130104657.14875-1-srinivas.kandagatla@linaro.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org User process can involve dealing with big buffer sizes, and also passing buffers from one compute context bank to other compute context bank for complex dsp algorithms. This patch adds support to fastrpc to make it a proper dmabuf exporter to avoid making copies of buffers. Signed-off-by: Srinivas Kandagatla --- drivers/char/fastrpc.c | 173 ++++++++++++++++++++++++++++++++++- include/uapi/linux/fastrpc.h | 8 ++ 2 files changed, 180 insertions(+), 1 deletion(-) diff --git a/drivers/char/fastrpc.c b/drivers/char/fastrpc.c index 3630e883d3f4..3c52502eae9f 100644 --- a/drivers/char/fastrpc.c +++ b/drivers/char/fastrpc.c @@ -110,10 +110,20 @@ struct fastrpc_invoke_rsp { struct fastrpc_buf { struct fastrpc_user *fl; + struct dma_buf *dmabuf; struct device *dev; void *virt; uint64_t phys; size_t size; + /* Lock for dma buf attachments */ + struct mutex lock; + struct list_head attachments; +}; + +struct fastrpc_dma_buf_attachment { + struct device *dev; + struct sg_table sgt; + struct list_head node; }; struct fastrpc_map { @@ -256,6 +266,9 @@ static int fastrpc_buf_alloc(struct fastrpc_user *fl, struct device *dev, if (!buf) return -ENOMEM; + INIT_LIST_HEAD(&buf->attachments); + mutex_init(&buf->lock); + buf->fl = fl; buf->virt = NULL; buf->phys = 0; @@ -394,6 +407,109 @@ static struct fastrpc_invoke_ctx *fastrpc_context_alloc( return ERR_PTR(err); } +static struct sg_table *fastrpc_map_dma_buf(struct dma_buf_attachment + *attachment, enum dma_data_direction dir) +{ + struct fastrpc_dma_buf_attachment *a = attachment->priv; + struct sg_table *table; + + table = &a->sgt; + + if (!dma_map_sg(attachment->dev, table->sgl, table->nents, dir)) + return ERR_PTR(-ENOMEM); + + return table; +} + +static void fastrpc_unmap_dma_buf(struct dma_buf_attachment *attach, + struct sg_table *table, + enum dma_data_direction dir) +{ +} + +static void fastrpc_release(struct dma_buf *dmabuf) +{ + struct fastrpc_buf *buffer = dmabuf->priv; + + fastrpc_buf_free(buffer); +} + +static int fastrpc_dma_buf_attach(struct dma_buf *dmabuf, + struct dma_buf_attachment *attachment) +{ + struct fastrpc_dma_buf_attachment *a; + struct fastrpc_buf *buffer = dmabuf->priv; + int ret; + + a = kzalloc(sizeof(*a), GFP_KERNEL); + if (!a) + return -ENOMEM; + + ret = dma_get_sgtable(buffer->dev, &a->sgt, buffer->virt, + FASTRPC_PHYS(buffer->phys), buffer->size); + if (ret < 0) { + dev_err(buffer->dev, "failed to get scatterlist from DMA API\n"); + return -EINVAL; + } + + a->dev = attachment->dev; + INIT_LIST_HEAD(&a->node); + attachment->priv = a; + + mutex_lock(&buffer->lock); + list_add(&a->node, &buffer->attachments); + mutex_unlock(&buffer->lock); + + return 0; +} + +static void fastrpc_dma_buf_detatch(struct dma_buf *dmabuf, + struct dma_buf_attachment *attachment) +{ + struct fastrpc_dma_buf_attachment *a = attachment->priv; + struct fastrpc_buf *buffer = dmabuf->priv; + + mutex_lock(&buffer->lock); + list_del(&a->node); + mutex_unlock(&buffer->lock); + kfree(a); +} + +static void *fastrpc_kmap(struct dma_buf *dmabuf, unsigned long pgnum) +{ + struct fastrpc_buf *buf = dmabuf->priv; + + return buf->virt ? buf->virt + pgnum * PAGE_SIZE : NULL; +} + +static void *fastrpc_vmap(struct dma_buf *dmabuf) +{ + struct fastrpc_buf *buf = dmabuf->priv; + + return buf->virt; +} + +static int fastrpc_mmap(struct dma_buf *dmabuf, + struct vm_area_struct *vma) +{ + struct fastrpc_buf *buf = dmabuf->priv; + size_t size = vma->vm_end - vma->vm_start; + + return dma_mmap_coherent(buf->dev, vma, buf->virt, + FASTRPC_PHYS(buf->phys), size); +} + +static const struct dma_buf_ops fastrpc_dma_buf_ops = { + .attach = fastrpc_dma_buf_attach, + .detach = fastrpc_dma_buf_detatch, + .map_dma_buf = fastrpc_map_dma_buf, + .unmap_dma_buf = fastrpc_unmap_dma_buf, + .mmap = fastrpc_mmap, + .map = fastrpc_kmap, + .vmap = fastrpc_vmap, + .release = fastrpc_release, +}; + static int fastrpc_map_create(struct fastrpc_user *fl, int fd, uintptr_t va, size_t len, struct fastrpc_map **ppmap) { @@ -989,7 +1105,8 @@ static long fastrpc_device_ioctl(struct file *file, unsigned int cmd, char __user *argp = (char __user *)arg; int err; - if (!fl->sctx) { + if (!fl->sctx && cmd != FASTRPC_IOCTL_ALLOC_DMA_BUFF && + cmd != FASTRPC_IOCTL_FREE_DMA_BUFF) { fl->sctx = fastrpc_session_alloc(cctx, 0); if (!fl->sctx) return -ENOENT; @@ -1027,6 +1144,60 @@ static long fastrpc_device_ioctl(struct file *file, unsigned int cmd, goto bail; } break; + + case FASTRPC_IOCTL_FREE_DMA_BUFF: { + struct dma_buf *buf; + uint32_t info; + + err = copy_from_user(&info, argp, sizeof(info)); + if (err) + goto bail; + + buf = dma_buf_get(info); + if (IS_ERR_OR_NULL(buf)) { + err = -EINVAL; + goto bail; + } + /* + * one for the last get and other for the ALLOC_DMA_BUFF ioctl + */ + dma_buf_put(buf); + dma_buf_put(buf); + } + break; + case FASTRPC_IOCTL_ALLOC_DMA_BUFF: { + struct fastrpc_ioctl_alloc_dma_buf bp; + DEFINE_DMA_BUF_EXPORT_INFO(exp_info); + struct fastrpc_buf *buf = NULL; + + err = copy_from_user(&bp, argp, sizeof(bp)); + if (err) + goto bail; + + err = fastrpc_buf_alloc(fl, fl->dev, bp.size, &buf); + exp_info.ops = &fastrpc_dma_buf_ops; + exp_info.size = bp.size; + exp_info.flags = O_RDWR; + exp_info.priv = buf; + buf->dmabuf = dma_buf_export(&exp_info); + if (IS_ERR(buf->dmabuf)) { + err = PTR_ERR(buf->dmabuf); + goto bail; + } + get_dma_buf(buf->dmabuf); + bp.fd = dma_buf_fd(buf->dmabuf, O_ACCMODE); + if (bp.fd < 0) { + dma_buf_put(buf->dmabuf); + err = -EINVAL; + goto bail; + } + + err = copy_to_user(argp, &bp, sizeof(bp)); + if (err) + goto bail; + + } + break; default: err = -ENOTTY; pr_info("bad ioctl: %d\n", cmd); diff --git a/include/uapi/linux/fastrpc.h b/include/uapi/linux/fastrpc.h index 6b596fc7ddf3..6b1ca29867fd 100644 --- a/include/uapi/linux/fastrpc.h +++ b/include/uapi/linux/fastrpc.h @@ -5,6 +5,8 @@ #include +#define FASTRPC_IOCTL_ALLOC_DMA_BUFF _IOWR('R', 1, struct fastrpc_ioctl_alloc_dma_buf) +#define FASTRPC_IOCTL_FREE_DMA_BUFF _IOWR('R', 2, uint32_t) #define FASTRPC_IOCTL_INVOKE _IOWR('R', 3, struct fastrpc_ioctl_invoke) #define FASTRPC_IOCTL_INIT _IOWR('R', 4, struct fastrpc_ioctl_init) @@ -71,4 +73,10 @@ struct fastrpc_ioctl_init { unsigned int siglen; }; +struct fastrpc_ioctl_alloc_dma_buf { + int fd; /* fd */ + ssize_t size; /* size */ + uint32_t flags; /* flags to map with */ +}; + #endif /* __QCOM_FASTRPC_H__ */ -- 2.19.2