Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp630140img; Fri, 22 Mar 2019 05:30:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqzg3xm+v90wCnNgwjpePRUFZ3ynbjVqpfTYBFwX8ABv8hAJJcTJpoZgRbwvftoj4tkRrUoa X-Received: by 2002:a63:f310:: with SMTP id l16mr8582189pgh.72.1553257844106; Fri, 22 Mar 2019 05:30:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553257844; cv=none; d=google.com; s=arc-20160816; b=oscPVIGA8r4E1yRydZvS5iOlfSJaN6Kyzae/a7pW3NLj5dMXLJi9KuZPzvB7/5rE3n zC/oOiU9DFUxedZ7Lg/BjQf/jT/j+m+tCipjfEN+hImE5Bb8RyZ5u1lyC0hiHMIZTPJG T+PDiNCF3F1HdZTLZeK3Ql/F0JOGZ1/GIz3ZebYvZ+otuM0H0uGQ6Uxw8SFCoXps4pwW B3N1zvBr4OOY2JevspL4CuNGa1UW18H+a53jplXmA8qV/Nx8mIVZvF0p9bezCicgVME5 3uvs6stYdgaqSLkQaWtjMvJL/LB5BlFANVfOVr1p5qUiQdElfZONMtNEFAlFvaGey1te tnbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=BXzgQE2cyQTCeGUibv3hs2zV10avfLVtDpCC6SMVWuw=; b=THz7b5QoySgxP2AXKZVacs+oehFsowCVKZt0F3le8FXxyU8xcFZ6YldFkpxy+HXP7Z EtMQdug44QYi5bT+IjLE7xUZipHfkeqbYbTUorvLzdmBqBVRQjqCgRdW5aWzhgGl4Utr Zrq7t7AqkHqL46jF2eBTjPKSxRB08NXU7vAaJ4o9ackKYkdCpGASZBPYBCf0YVepyI/B 4XyEZMqLwLL6Sr00EKEK+2nDo/kSxKcUS4yIjphOBf/wMUNgXYpjv5T7FIW2xwvExgQu 8SU5Phhzd87DfRk1nUdl1xW1YQkX+mKngaYcbqMnmvaD/swWsUmIE/dNPWHfLLioiE8G 6nVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uy92EwWV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n16si4006865pgb.274.2019.03.22.05.30.26; Fri, 22 Mar 2019 05:30:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uy92EwWV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390997AbfCVM3s (ORCPT + 99 others); Fri, 22 Mar 2019 08:29:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:57792 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389798AbfCVMSu (ORCPT ); Fri, 22 Mar 2019 08:18:50 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 48DFC2082C; Fri, 22 Mar 2019 12:18:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553257129; bh=7tZkvRCcrdfTnBGnYmkgnAnJEGxeASGr6fz4vnoQ0NU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uy92EwWVUmd2OSUzxZ16ZY5crcUqeqt2yKYIFYeaZUXJtRR1LcmG6/URU+eiTFmeL SnKezgm9mSUMHiO28dXtMTrrpMT5Uq2dIRdnh+2wVeeWa/jiN555g0FnUvfF37esKO AvxVD0TUtAVS/BkiwzvdvqhR6AdHKL/YgMVH+yf8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Konrad Rzeszutek Wilk , Christoph Hellwig , Joerg Roedel , "Michael S. Tsirkin" Subject: [PATCH 5.0 124/238] dma: Introduce dma_max_mapping_size() Date: Fri, 22 Mar 2019 12:15:43 +0100 Message-Id: <20190322111305.835827654@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111258.383569278@linuxfoundation.org> References: <20190322111258.383569278@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ From: Joerg Roedel commit 133d624b1cee16906134e92d5befb843b58bcf31 upstream. The function returns the maximum size that can be mapped using DMA-API functions. The patch also adds the implementation for direct DMA and a new dma_map_ops pointer so that other implementations can expose their limit. Cc: stable@vger.kernel.org Reviewed-by: Konrad Rzeszutek Wilk Reviewed-by: Christoph Hellwig Signed-off-by: Joerg Roedel Signed-off-by: Michael S. Tsirkin Signed-off-by: Greg Kroah-Hartman --- Documentation/DMA-API.txt | 8 ++++++++ include/linux/dma-mapping.h | 8 ++++++++ kernel/dma/direct.c | 11 +++++++++++ kernel/dma/mapping.c | 14 ++++++++++++++ 4 files changed, 41 insertions(+) --- a/Documentation/DMA-API.txt +++ b/Documentation/DMA-API.txt @@ -195,6 +195,14 @@ Requesting the required mask does not al wish to take advantage of it, you should issue a dma_set_mask() call to set the mask to the value returned. +:: + + size_t + dma_direct_max_mapping_size(struct device *dev); + +Returns the maximum size of a mapping for the device. The size parameter +of the mapping functions like dma_map_single(), dma_map_page() and +others should not be larger than the returned value. Part Id - Streaming DMA mappings -------------------------------- --- a/include/linux/dma-mapping.h +++ b/include/linux/dma-mapping.h @@ -130,6 +130,7 @@ struct dma_map_ops { enum dma_data_direction direction); int (*dma_supported)(struct device *dev, u64 mask); u64 (*get_required_mask)(struct device *dev); + size_t (*max_mapping_size)(struct device *dev); }; #define DMA_MAPPING_ERROR (~(dma_addr_t)0) @@ -257,6 +258,8 @@ static inline void dma_direct_sync_sg_fo } #endif +size_t dma_direct_max_mapping_size(struct device *dev); + #ifdef CONFIG_HAS_DMA #include @@ -460,6 +463,7 @@ int dma_supported(struct device *dev, u6 int dma_set_mask(struct device *dev, u64 mask); int dma_set_coherent_mask(struct device *dev, u64 mask); u64 dma_get_required_mask(struct device *dev); +size_t dma_max_mapping_size(struct device *dev); #else /* CONFIG_HAS_DMA */ static inline dma_addr_t dma_map_page_attrs(struct device *dev, struct page *page, size_t offset, size_t size, @@ -561,6 +565,10 @@ static inline u64 dma_get_required_mask( { return 0; } +static inline size_t dma_max_mapping_size(struct device *dev) +{ + return 0; +} #endif /* CONFIG_HAS_DMA */ static inline dma_addr_t dma_map_single_attrs(struct device *dev, void *ptr, --- a/kernel/dma/direct.c +++ b/kernel/dma/direct.c @@ -380,3 +380,14 @@ int dma_direct_supported(struct device * */ return mask >= __phys_to_dma(dev, min_mask); } + +size_t dma_direct_max_mapping_size(struct device *dev) +{ + size_t size = SIZE_MAX; + + /* If SWIOTLB is active, use its maximum mapping size */ + if (is_swiotlb_active()) + size = swiotlb_max_mapping_size(dev); + + return size; +} --- a/kernel/dma/mapping.c +++ b/kernel/dma/mapping.c @@ -357,3 +357,17 @@ void dma_cache_sync(struct device *dev, ops->cache_sync(dev, vaddr, size, dir); } EXPORT_SYMBOL(dma_cache_sync); + +size_t dma_max_mapping_size(struct device *dev) +{ + const struct dma_map_ops *ops = get_dma_ops(dev); + size_t size = SIZE_MAX; + + if (dma_is_direct(ops)) + size = dma_direct_max_mapping_size(dev); + else if (ops && ops->max_mapping_size) + size = ops->max_mapping_size(dev); + + return size; +} +EXPORT_SYMBOL_GPL(dma_max_mapping_size);