Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp3070508ybl; Mon, 19 Aug 2019 11:40:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqwpu9MSHhPlbzEpyjCAREeAFMkQjAHi/zDyFgpmPUNTnnxILrhyn5PUENZD3zZjesY03DZe X-Received: by 2002:a17:90a:d343:: with SMTP id i3mr23232622pjx.15.1566240034127; Mon, 19 Aug 2019 11:40:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566240034; cv=none; d=google.com; s=arc-20160816; b=vZaTZkAU2/iYWmnd9O+EeXGqSFgxEDhYWQipqhwVdpeSXph+Ikdqj/fX19QtTZPTm6 Ys7iIdLv9F3KqU2RIzRG9ybIcnOB25CdJpzr6GIH3sEMUW9wWQrfWhD9EH5i2P21QmGp rxltwi3vAEaBSFKFVx42GU767ebkukN73fukJDDvRtoxEQ3M98fkWcYaPfN/Ra39/YIF IgbnvhnYNvU+T0kngmwY1ssUr5HptOBYSJ9r9M840c1ozkz7difk/4LduVH3v4gTbaZw MMQlrFPVuJC0m4zPIMOogoINRaLlpJN4x25NcsYfh+mcAxj1nM9GDTdOC1VXY5/tTnvS kwBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=x9bkfcOEzvu2Q/5VH9p8jE1gazSlunOq7h5S0y2E1vM=; b=O9QelzG4OpUDd6wgFgvm6kRB6jthnuC3cA+KMVXSupGBIqDX5X+w+lkwdZFr9xaeO2 2VZqifeuwR2wcHMCdvsjAHqY2AYVNCuxdtgK2A1urfk/c98HRR8BUghK6xZfMVbUiKUB FUj1Ldtab2PPAcpdPW/5V0NMSprayfmjtgVvYrhNE3dXRQKJbl8xPJJoJUMwzotVnKOW FFsVsUEEGIf1cAPTi5rgu/ZMzSBhYZgWl6urKV8Lk5X0pPR1tXq/muCLUK691xsuLfom MUwz+0XUQQOk2zTPeGwKbAz1fXQVk7pQrlAmbZchfu29lscaGmD/+Oawmo5FJFZq+km+ bw2Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u5si3421480plm.434.2019.08.19.11.40.19; Mon, 19 Aug 2019 11:40:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728273AbfHSSj3 (ORCPT + 99 others); Mon, 19 Aug 2019 14:39:29 -0400 Received: from foss.arm.com ([217.140.110.172]:58776 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727957AbfHSSj3 (ORCPT ); Mon, 19 Aug 2019 14:39:29 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id F1408360; Mon, 19 Aug 2019 11:39:27 -0700 (PDT) Received: from [10.1.197.57] (e110467-lin.cambridge.arm.com [10.1.197.57]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 963663F246; Mon, 19 Aug 2019 11:39:24 -0700 (PDT) Subject: Re: [PATCH V5 4/5] iommu/dma-iommu: Use the dev->coherent_dma_mask To: Tom Murphy , iommu@lists.linux-foundation.org Cc: Joerg Roedel , Will Deacon , Marek Szyprowski , Kukjin Kim , Krzysztof Kozlowski , David Woodhouse , Andy Gross , Matthias Brugger , Rob Clark , Heiko Stuebner , Gerald Schaefer , Thierry Reding , Jonathan Hunter , Jean-Philippe Brucker , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-samsung-soc@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-mediatek@lists.infradead.org, linux-rockchip@lists.infradead.org, linux-s390@vger.kernel.org, linux-tegra@vger.kernel.org, virtualization@lists.linux-foundation.org References: <20190815110944.3579-1-murphyt7@tcd.ie> <20190815110944.3579-5-murphyt7@tcd.ie> From: Robin Murphy Message-ID: Date: Mon, 19 Aug 2019 19:39:23 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <20190815110944.3579-5-murphyt7@tcd.ie> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 15/08/2019 12:09, Tom Murphy wrote: > Use the dev->coherent_dma_mask when allocating in the dma-iommu ops api. Oops... I suppose technically that's my latent bug, but since we've all missed it so far, I doubt arm64 systems ever see any devices which actually have different masks. Reviewed-by: Robin Murphy > Signed-off-by: Tom Murphy > --- > drivers/iommu/dma-iommu.c | 12 +++++++----- > 1 file changed, 7 insertions(+), 5 deletions(-) > > diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c > index 906b7fa14d3c..b9a3ab02434b 100644 > --- a/drivers/iommu/dma-iommu.c > +++ b/drivers/iommu/dma-iommu.c > @@ -471,7 +471,7 @@ static void __iommu_dma_unmap(struct device *dev, dma_addr_t dma_addr, > } > > static dma_addr_t __iommu_dma_map(struct device *dev, phys_addr_t phys, > - size_t size, int prot) > + size_t size, int prot, dma_addr_t dma_mask) > { > struct iommu_domain *domain = iommu_get_dma_domain(dev); > struct iommu_dma_cookie *cookie = domain->iova_cookie; > @@ -484,7 +484,7 @@ static dma_addr_t __iommu_dma_map(struct device *dev, phys_addr_t phys, > > size = iova_align(iovad, size + iova_off); > > - iova = iommu_dma_alloc_iova(domain, size, dma_get_mask(dev), dev); > + iova = iommu_dma_alloc_iova(domain, size, dma_mask, dev); > if (!iova) > return DMA_MAPPING_ERROR; > > @@ -735,7 +735,7 @@ static dma_addr_t iommu_dma_map_page(struct device *dev, struct page *page, > int prot = dma_info_to_prot(dir, coherent, attrs); > dma_addr_t dma_handle; > > - dma_handle = __iommu_dma_map(dev, phys, size, prot); > + dma_handle = __iommu_dma_map(dev, phys, size, prot, dma_get_mask(dev)); > if (!coherent && !(attrs & DMA_ATTR_SKIP_CPU_SYNC) && > dma_handle != DMA_MAPPING_ERROR) > arch_sync_dma_for_device(dev, phys, size, dir); > @@ -938,7 +938,8 @@ static dma_addr_t iommu_dma_map_resource(struct device *dev, phys_addr_t phys, > size_t size, enum dma_data_direction dir, unsigned long attrs) > { > return __iommu_dma_map(dev, phys, size, > - dma_info_to_prot(dir, false, attrs) | IOMMU_MMIO); > + dma_info_to_prot(dir, false, attrs) | IOMMU_MMIO, > + dma_get_mask(dev)); > } > > static void iommu_dma_unmap_resource(struct device *dev, dma_addr_t handle, > @@ -1041,7 +1042,8 @@ static void *iommu_dma_alloc(struct device *dev, size_t size, > if (!cpu_addr) > return NULL; > > - *handle = __iommu_dma_map(dev, page_to_phys(page), size, ioprot); > + *handle = __iommu_dma_map(dev, page_to_phys(page), size, ioprot, > + dev->coherent_dma_mask); > if (*handle == DMA_MAPPING_ERROR) { > __iommu_dma_free(dev, size, cpu_addr); > return NULL; >