Received: by 2002:a25:5b86:0:0:0:0:0 with SMTP id p128csp1637722ybb; Fri, 29 Mar 2019 08:21:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqz7IsJK2hOhRZ/GG2MLEva3XTgrJLFTqkZ/aOoHU2yCv7Xx/Xm7o4iRtKouqCXCbgAidzsM X-Received: by 2002:a62:4115:: with SMTP id o21mr46441726pfa.153.1553872868043; Fri, 29 Mar 2019 08:21:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553872868; cv=none; d=google.com; s=arc-20160816; b=rluVbMslox3wRw7C5qYPvZr7fc+8Y3BWexzwbTjGumxPWg/kzjqSdrG1dRtWm79WyD 9bP+mQCS2k8GJd9+1xdVgsAYvaHXKz2GDD90zZJbrzkl2L2wFM8wpwUeoyrLlFWiJ4CO tL+/sEvBqAROs+mni0igYwvSnHwG+ccaMSD1svBwjDgfaUh4fwyP3wqgtDg2/QdVoKIi oks6i7uc0IGwd/yG15t8xd1XG74iHE4vLy3RGYxcXvbcAVp3UzQIL0BVip9XJpPWzfPy MlmeRjKb0shJbnFIf15HybMJHXAIRH6AVv0tH7gDRO30SwX2rn7UzLV+rllOK4QO+9aN aGMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=Ka8M82ca2m205M2HsMNyfSttvqni/txd3tdFsodSxOI=; b=dxlrMuRWbsJgaLNIDiMvPivo2RBRubirG+VaGiHI14lMk+g9FRN5DuLC/zhRL8qNF0 KTbiarf6FbcQdLfZt0gEmVXIJia1XaTv7YG/jIBDbXfzV9pMG4mDVjy9Xc6w65LyDBMg 0cYtWhvy2m05Y5wlsQPfozJpyQybg5vCya/QquEeQ3H76sU1zA0mqcVKvmEuj5rPoGgZ 7pHRrSsZy9RoOEeIB35WlGad+EsgTtiTDrWwlA3ZxXUGXMs3n8FIsDvyfslu5du1q3iI vAeGmEyvyAUdBpos5Gk5HVFDZG7QcCsz88rLCz/rLth0hAElb2hcLT61+5mcGWhWjONp FuRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b="N7DV4F/b"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a61si2190801pla.178.2019.03.29.08.20.50; Fri, 29 Mar 2019 08:21:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b="N7DV4F/b"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729269AbfC2PUE (ORCPT + 99 others); Fri, 29 Mar 2019 11:20:04 -0400 Received: from fllv0016.ext.ti.com ([198.47.19.142]:52432 "EHLO fllv0016.ext.ti.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728869AbfC2PUD (ORCPT ); Fri, 29 Mar 2019 11:20:03 -0400 Received: from fllv0035.itg.ti.com ([10.64.41.0]) by fllv0016.ext.ti.com (8.15.2/8.15.2) with ESMTP id x2TFJLKM041482; Fri, 29 Mar 2019 10:19:21 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1553872761; bh=Ka8M82ca2m205M2HsMNyfSttvqni/txd3tdFsodSxOI=; h=Subject:To:CC:References:From:Date:In-Reply-To; b=N7DV4F/bubUpAuPagSHnYcDo8enyw5ZRu4rTRhKKMLKrZymyLRTfGDXL+3mcIbiNo jwU11zSAjYqdwHFeTtolNtnvH9lw0AmCxqutT/1ljIlQrWm2jHR1haMX1iEwNvcUaj csJ5F4lDuvGvEKJuWvN8BwFJLZ9QqWIXSagwtess= Received: from DFLE105.ent.ti.com (dfle105.ent.ti.com [10.64.6.26]) by fllv0035.itg.ti.com (8.15.2/8.15.2) with ESMTPS id x2TFJLEo054250 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=FAIL); Fri, 29 Mar 2019 10:19:21 -0500 Received: from DFLE104.ent.ti.com (10.64.6.25) by DFLE105.ent.ti.com (10.64.6.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Fri, 29 Mar 2019 10:19:21 -0500 Received: from lelv0327.itg.ti.com (10.180.67.183) by DFLE104.ent.ti.com (10.64.6.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5 via Frontend Transport; Fri, 29 Mar 2019 10:19:21 -0500 Received: from [10.250.67.168] (ileax41-snat.itg.ti.com [10.172.224.153]) by lelv0327.itg.ti.com (8.15.2/8.15.2) with ESMTP id x2TFJKXN047835; Fri, 29 Mar 2019 10:19:20 -0500 Subject: Re: [RFC][PATCH 4/6 v3] dma-buf: heaps: Add CMA heap to dmabuf heapss To: Benjamin Gaignard , John Stultz CC: lkml , Laura Abbott , Sumit Semwal , Liam Mark , Pratik Patel , Brian Starkey , Vincent Donnefort , Sudipto Paul , Xu YiPing , "Chenfeng (puck)" , butao , "Xiaqing (A)" , Yudongbin , Christoph Hellwig , Chenbo Feng , Alistair Strachan , ML dri-devel References: <1553818562-2516-1-git-send-email-john.stultz@linaro.org> <1553818562-2516-5-git-send-email-john.stultz@linaro.org> From: "Andrew F. Davis" Message-ID: Date: Fri, 29 Mar 2019 10:19:20 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.5.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 3/29/19 9:44 AM, Benjamin Gaignard wrote: > Le ven. 29 mars 2019 à 01:16, John Stultz a écrit : >> >> This adds a CMA heap, which allows userspace to allocate >> a dma-buf of contiguous memory out of a CMA region. >> >> This code is an evolution of the Android ION implementation, so >> thanks to its original author and maintainters: >> Benjamin Gaignard, Laura Abbott, and others! >> >> Cc: Laura Abbott >> Cc: Benjamin Gaignard >> Cc: Sumit Semwal >> Cc: Liam Mark >> Cc: Pratik Patel >> Cc: Brian Starkey >> Cc: Vincent Donnefort >> Cc: Sudipto Paul >> Cc: Andrew F. Davis >> Cc: Xu YiPing >> Cc: "Chenfeng (puck)" >> Cc: butao >> Cc: "Xiaqing (A)" >> Cc: Yudongbin >> Cc: Christoph Hellwig >> Cc: Chenbo Feng >> Cc: Alistair Strachan >> Cc: dri-devel@lists.freedesktop.org >> Signed-off-by: John Stultz >> --- >> v2: >> * Switch allocate to return dmabuf fd >> * Simplify init code >> * Checkpatch fixups >> v3: >> * Switch to inline function for to_cma_heap() >> * Minor cleanups suggested by Brian >> * Fold in new registration style from Andrew >> * Folded in changes from Andrew to use simplified page list >> from the heap helpers >> --- >> drivers/dma-buf/heaps/Kconfig | 8 ++ >> drivers/dma-buf/heaps/Makefile | 1 + >> drivers/dma-buf/heaps/cma_heap.c | 170 +++++++++++++++++++++++++++++++++++++++ >> 3 files changed, 179 insertions(+) >> create mode 100644 drivers/dma-buf/heaps/cma_heap.c >> >> diff --git a/drivers/dma-buf/heaps/Kconfig b/drivers/dma-buf/heaps/Kconfig >> index 2050527..a5eef06 100644 >> --- a/drivers/dma-buf/heaps/Kconfig >> +++ b/drivers/dma-buf/heaps/Kconfig >> @@ -4,3 +4,11 @@ config DMABUF_HEAPS_SYSTEM >> help >> Choose this option to enable the system dmabuf heap. The system heap >> is backed by pages from the buddy allocator. If in doubt, say Y. >> + >> +config DMABUF_HEAPS_CMA >> + bool "DMA-BUF CMA Heap" >> + depends on DMABUF_HEAPS && DMA_CMA >> + help >> + Choose this option to enable dma-buf CMA heap. This heap is backed >> + by the Contiguous Memory Allocator (CMA). If your system has these >> + regions, you should say Y here. >> diff --git a/drivers/dma-buf/heaps/Makefile b/drivers/dma-buf/heaps/Makefile >> index d1808ec..6e54cde 100644 >> --- a/drivers/dma-buf/heaps/Makefile >> +++ b/drivers/dma-buf/heaps/Makefile >> @@ -1,3 +1,4 @@ >> # SPDX-License-Identifier: GPL-2.0 >> obj-y += heap-helpers.o >> obj-$(CONFIG_DMABUF_HEAPS_SYSTEM) += system_heap.o >> +obj-$(CONFIG_DMABUF_HEAPS_CMA) += cma_heap.o >> diff --git a/drivers/dma-buf/heaps/cma_heap.c b/drivers/dma-buf/heaps/cma_heap.c >> new file mode 100644 >> index 0000000..f4485c60 >> --- /dev/null >> +++ b/drivers/dma-buf/heaps/cma_heap.c >> @@ -0,0 +1,170 @@ >> +// SPDX-License-Identifier: GPL-2.0 >> +/* >> + * DMABUF CMA heap exporter >> + * >> + * Copyright (C) 2012, 2019 Linaro Ltd. >> + * Author: for ST-Ericsson. >> + */ >> + >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> + >> +#include "heap-helpers.h" >> + >> +struct cma_heap { >> + struct dma_heap *heap; >> + struct cma *cma; >> +}; >> + >> +static void cma_heap_free(struct heap_helper_buffer *buffer) >> +{ >> + struct cma_heap *cma_heap = dma_heap_get_data(buffer->heap_buffer.heap); >> + struct page *pages = buffer->priv_virt; >> + unsigned long nr_pages; >> + >> + nr_pages = buffer->heap_buffer.size >> PAGE_SHIFT; >> + >> + /* free page list */ >> + kfree(buffer->pages); >> + /* release memory */ >> + cma_release(cma_heap->cma, pages, nr_pages); >> + kfree(buffer); >> +} >> + >> +/* dmabuf heap CMA operations functions */ >> +static int cma_heap_allocate(struct dma_heap *heap, >> + unsigned long len, >> + unsigned long flags) >> +{ >> + struct cma_heap *cma_heap = dma_heap_get_data(heap); >> + struct heap_helper_buffer *helper_buffer; >> + struct page *pages; >> + size_t size = PAGE_ALIGN(len); >> + unsigned long nr_pages = size >> PAGE_SHIFT; >> + unsigned long align = get_order(size); >> + DEFINE_DMA_BUF_EXPORT_INFO(exp_info); >> + struct dma_buf *dmabuf; >> + int ret = -ENOMEM; >> + pgoff_t pg; >> + >> + if (align > CONFIG_CMA_ALIGNMENT) >> + align = CONFIG_CMA_ALIGNMENT; >> + >> + helper_buffer = kzalloc(sizeof(*helper_buffer), GFP_KERNEL); >> + if (!helper_buffer) >> + return -ENOMEM; >> + >> + INIT_HEAP_HELPER_BUFFER(helper_buffer, cma_heap_free); >> + helper_buffer->heap_buffer.flags = flags; >> + helper_buffer->heap_buffer.heap = heap; >> + helper_buffer->heap_buffer.size = len; >> + >> + pages = cma_alloc(cma_heap->cma, nr_pages, align, false); >> + if (!pages) >> + goto free_buf; >> + >> + if (PageHighMem(pages)) { >> + unsigned long nr_clear_pages = nr_pages; >> + struct page *page = pages; >> + >> + while (nr_clear_pages > 0) { >> + void *vaddr = kmap_atomic(page); >> + >> + memset(vaddr, 0, PAGE_SIZE); >> + kunmap_atomic(vaddr); >> + page++; >> + nr_clear_pages--; >> + } >> + } else { >> + memset(page_address(pages), 0, size); >> + } >> + >> + helper_buffer->pagecount = nr_pages; >> + helper_buffer->pages = kmalloc_array(helper_buffer->pagecount, >> + sizeof(*helper_buffer->pages), >> + GFP_KERNEL); >> + if (!helper_buffer->pages) { >> + ret = -ENOMEM; >> + goto free_cma; >> + } >> + >> + for (pg = 0; pg < helper_buffer->pagecount; pg++) { >> + helper_buffer->pages[pg] = &pages[pg]; >> + if (!helper_buffer->pages[pg]) >> + goto free_pages; >> + } >> + >> + /* create the dmabuf */ >> + exp_info.ops = &heap_helper_ops; >> + exp_info.size = len; >> + exp_info.flags = O_RDWR; > > I think that the flags should be provided when requesting the allocation > like it is done in DRM or V4L2. > For me DMA_HEAP_VALID_FLAGS = (O_CLOEXEC | O_ACCMODE). > So something like done in udmabuf? https://elixir.bootlin.com/linux/v5.1-rc1/source/include/uapi/linux/udmabuf.h#L8 I think that can be arranged. John, This might be a good reason to move the dma_buf_fd() call below out of the heap and back into the core. That way the file exporting flags can be common and core handled. I don't think it would complicate the error handling any as we only need to dma_buf_put(dmabuf) in the core on failure and the heap specific cleanup will happen for us. Andrew > Benjamin > > Benjamin > >> + exp_info.priv = &helper_buffer->heap_buffer; >> + dmabuf = dma_buf_export(&exp_info); >> + if (IS_ERR(dmabuf)) { >> + ret = PTR_ERR(dmabuf); >> + goto free_pages; >> + } >> + >> + helper_buffer->heap_buffer.dmabuf = dmabuf; >> + helper_buffer->priv_virt = pages; >> + >> + ret = dma_buf_fd(dmabuf, O_CLOEXEC); >> + if (ret < 0) { >> + dma_buf_put(dmabuf); >> + /* just return, as put will call release and that will free */ >> + return ret; >> + } >> + >> + return ret; >> + >> +free_pages: >> + kfree(helper_buffer->pages); >> +free_cma: >> + cma_release(cma_heap->cma, pages, nr_pages); >> +free_buf: >> + kfree(helper_buffer); >> + return ret; >> +} >> + >> +static struct dma_heap_ops cma_heap_ops = { >> + .allocate = cma_heap_allocate, >> +}; >> + >> +static int __add_cma_heap(struct cma *cma, void *data) >> +{ >> + struct cma_heap *cma_heap; >> + struct dma_heap_export_info exp_info; >> + >> + cma_heap = kzalloc(sizeof(*cma_heap), GFP_KERNEL); >> + if (!cma_heap) >> + return -ENOMEM; >> + cma_heap->cma = cma; >> + >> + exp_info.name = cma_get_name(cma); >> + exp_info.ops = &cma_heap_ops; >> + exp_info.priv = cma_heap; >> + >> + cma_heap->heap = dma_heap_add(&exp_info); >> + if (IS_ERR(cma_heap->heap)) { >> + int ret = PTR_ERR(cma_heap->heap); >> + >> + kfree(cma_heap); >> + return ret; >> + } >> + >> + return 0; >> +} >> + >> +static int add_cma_heaps(void) >> +{ >> + cma_for_each_area(__add_cma_heap, NULL); >> + return 0; >> +} >> +device_initcall(add_cma_heaps); >> -- >> 2.7.4 >>