Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4409698imu; Tue, 29 Jan 2019 00:44:32 -0800 (PST) X-Google-Smtp-Source: ALg8bN7amUvBS4KCQxNUMbV50P9+hT7+7wzvE/f6G1jfyhfS1u6JDwfZhN+lq4Zwwqgeah6Sxs01 X-Received: by 2002:a62:a510:: with SMTP id v16mr25109292pfm.18.1548751471949; Tue, 29 Jan 2019 00:44:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548751471; cv=none; d=google.com; s=arc-20160816; b=tqinB84+DO+jf/dnKiwpmvOFtRggmlITmMfxcrX8T6bDL/aNA2EpeJjc1eakVjGr7v Fg1LBwXc5VFOL8UWU6l9WbM2BqXqkb8NcEMVyzvXVnCFTcygCrmMey/TCdkRj1Ei51HF U0idE4K0wAhws8EMuyemwAIuJQxF4tTQRcuBwIHQuCEgTYA+iH3ri2wDbgE4cH+I4vmM KXmG80tAyMfLcJkspSynNdq1UYoLyTFEn0q3zELfBVlAaQLwKXtNsV38en8Xt7gy0q2Q eqDjOa2GRZ9mUgB4+CWZ+Tw61wKrQjOGQaeiO2whXaT+bzZYcuzbJFW4CqFkB1mYAnAi 1HXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=wjML4V/kXFiFYrx/z+kXjzNVnnUyERRe+saZapX8hvU=; b=Gk1Cii9fllgF9m+Nf/D/8YrlYxruwcLSCe7cYdWHbeb12KYtWSkG9CCw60H10g8iZY Aoy4spG2C8Pqvlc+0x3TrUVPLqVotNQGASjbjzj/EMss8Aai8W0p10eQ5aNVh6enaSqE Ns9pWh+HsWPm3w97mh8YUL38xPbZPuizAn1gHRm+zO54tyu9lTg0fjyIwlUdYYMQ+xzI 3wWk0Kl5ADee6zXvNNl8j+BEcg3Z6T2Uvj0ujNkaIniwtj+jB/VVhGKnfHBoOwvbb4Ti qHcT/WcA59cAfs4GtNo0riZbYyQJcRnGdis/AsXvdtkn8rK5yZRZ1TXFMux7CWMhM5HJ sTxA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ay7si35212045plb.410.2019.01.29.00.44.16; Tue, 29 Jan 2019 00:44:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727253AbfA2Ins (ORCPT + 99 others); Tue, 29 Jan 2019 03:43:48 -0500 Received: from 8bytes.org ([81.169.241.247]:35504 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725298AbfA2Inq (ORCPT ); Tue, 29 Jan 2019 03:43:46 -0500 Received: by theia.8bytes.org (Postfix, from userid 1000) id 574DD1F1; Tue, 29 Jan 2019 09:43:44 +0100 (CET) From: Joerg Roedel To: "Michael S . Tsirkin" , Jason Wang , Konrad Rzeszutek Wilk , Christoph Hellwig Cc: Jens Axboe , virtualization@lists.linux-foundation.org, linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, iommu@lists.linux-foundation.org, jfehlig@suse.com, jon.grimm@amd.com, brijesh.singh@amd.com, joro@8bytes.org, jroedel@suse.de Subject: [PATCH 0/5 v4] Fix virtio-blk issue with SWIOTLB Date: Tue, 29 Jan 2019 09:43:37 +0100 Message-Id: <20190129084342.26030-1-joro@8bytes.org> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, here is the fourth version of this patch-set. Previous versions can be found here: V1: https://lore.kernel.org/lkml/20190110134433.15672-1-joro@8bytes.org/ V2: https://lore.kernel.org/lkml/20190115132257.6426-1-joro@8bytes.org/ V3: https://lore.kernel.org/lkml/20190123163049.24863-1-joro@8bytes.org/ The problem solved here is a limitation of the SWIOTLB implementation, which does not support allocations larger than 256kb. When the virtio-blk driver tries to read/write a block larger than that, the allocation of the dma-handle fails and an IO error is reported. For all changes to v3, a diff to v3 of the patch-set is at the end of this email. Please review. Thanks, Joerg Joerg Roedel (5): swiotlb: Introduce swiotlb_max_mapping_size() swiotlb: Add is_swiotlb_active() function dma: Introduce dma_max_mapping_size() virtio: Introduce virtio_max_dma_size() virtio-blk: Consider virtio_max_dma_size() for maximum segment size Documentation/DMA-API.txt | 8 ++++++++ drivers/block/virtio_blk.c | 10 ++++++---- drivers/virtio/virtio_ring.c | 10 ++++++++++ include/linux/dma-mapping.h | 16 ++++++++++++++++ include/linux/swiotlb.h | 11 +++++++++++ include/linux/virtio.h | 2 ++ kernel/dma/direct.c | 11 +++++++++++ kernel/dma/swiotlb.c | 14 ++++++++++++++ 8 files changed, 78 insertions(+), 4 deletions(-) -- 2.17.1 diff --git a/Documentation/DMA-API.txt b/Documentation/DMA-API.txt index e133ccd60228..acfe3d0f78d1 100644 --- a/Documentation/DMA-API.txt +++ b/Documentation/DMA-API.txt @@ -195,6 +195,14 @@ Requesting the required mask does not alter the current mask. If you wish to take advantage of it, you should issue a dma_set_mask() call to set the mask to the value returned. +:: + + size_t + dma_direct_max_mapping_size(struct device *dev); + +Returns the maximum size of a mapping for the device. The size parameter +of the mapping functions like dma_map_single(), dma_map_page() and +others should not be larger than the returned value. Part Id - Streaming DMA mappings -------------------------------- diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h index 5c087d330b4b..e9e786b4b598 100644 --- a/include/linux/swiotlb.h +++ b/include/linux/swiotlb.h @@ -62,7 +62,7 @@ extern void swiotlb_tbl_sync_single(struct device *hwdev, extern int swiotlb_dma_supported(struct device *hwdev, u64 mask); -extern size_t swiotlb_max_mapping_size(struct device *dev); +size_t swiotlb_max_mapping_size(struct device *dev); bool is_swiotlb_active(void); #ifdef CONFIG_SWIOTLB diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c index 9fbd075081d9..c873f9cc2146 100644 --- a/kernel/dma/swiotlb.c +++ b/kernel/dma/swiotlb.c @@ -670,5 +670,9 @@ size_t swiotlb_max_mapping_size(struct device *dev) bool is_swiotlb_active(void) { - return !no_iotlb_memory; + /* + * When SWIOTLB is initialized, even if io_tlb_start points to physical + * address zero, io_tlb_end surely doesn't. + */ + return io_tlb_end != 0; }