Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp539180ybl; Fri, 31 Jan 2020 03:36:08 -0800 (PST) X-Google-Smtp-Source: APXvYqy/x4L7E+m7WqqmPtEIZjNrbLIiy13g+9os97Iz9+La7beL4/TXm1HTcQdEogP6Dwz4OzXL X-Received: by 2002:aca:2407:: with SMTP id n7mr6085018oic.14.1580470568179; Fri, 31 Jan 2020 03:36:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580470568; cv=none; d=google.com; s=arc-20160816; b=UJeyIIpq3YpdTOJRBOQDsYPtotC7w4YWeX9LhubsG6B7SBHmly7FmT698Q7PV0PCxI 3f4OjW5z7b2MXYaRXLsYn23Uz3kkq2Ru4fP+L+PJGg/64XtGKxegsobsX2eOW+SlCbb4 fXE2IgYo3WBAUdrHVdYMS27RTXPYBXL21cmqBpqNdTkR+RUD4VcqOA/p9vxhe3faQLl1 cs069f8A073Ig3P9smrELaXkMMI0gWlEWU7552Yk4C1tzrQ1gAWrs8RnO9gNr0mEU1AV d22YuF1hxCqTLLCJ8is1Rho/C26NwX2jL+Wxi2JG5Fdg0pLWFbttTUmwCxJXew/Mb9ls wK/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=0Ic/EKE0pHO+INLvpntUTqIfLdnU+Rnyu+2ZN5oQ7YU=; b=eCUhHXSV/QIKHAO+mtAwhTkf+cdxH5sxWns8awPjYNevlx1K35W9BbAw++S45LK+rH DLOy6NdX+JPiUFtoI1eG/ZwsBgeYPaKTz/3MZVLsealI48ycn7P1iMl9AkcVKxrLrfXI qUIFyAfBCj9vf87XI3G5zLFtv17oEpSJPOE8wb9pmMt6csZH2CvIYWmflj1Uz3p9GMKt U199RyZJ0N0XEhBih6j7TmXZ4LXBu3hSV3NO5CQlpABfKTF7ffq+1cjoGBHcUCaPAers HM6leTvUUBUGM+peNMXmSQogkNBf22muHr1iL1xOMnhL/8rGNlGFpb0aijfFA+G0QU0g vxXQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h17si4266939oih.53.2020.01.31.03.35.56; Fri, 31 Jan 2020 03:36:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728463AbgAaLdx (ORCPT + 99 others); Fri, 31 Jan 2020 06:33:53 -0500 Received: from foss.arm.com ([217.140.110.172]:34496 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728325AbgAaLdx (ORCPT ); Fri, 31 Jan 2020 06:33:53 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 1B9C2106F; Fri, 31 Jan 2020 03:33:53 -0800 (PST) Received: from [192.168.1.123] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E56053F67D; Fri, 31 Jan 2020 03:33:51 -0800 (PST) Subject: Re: [PATCH] dma-debug: dynamic allocation of hash table To: Geert Uytterhoeven Cc: Eric Dumazet , Christoph Hellwig , Joerg Roedel , Linux IOMMU , Eric Dumazet , linux-kernel References: <20200130191049.190569-1-edumazet@google.com> From: Robin Murphy Message-ID: Date: Fri, 31 Jan 2020 11:33:48 +0000 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Thunderbird/68.4.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020-01-31 9:06 am, Geert Uytterhoeven wrote: > Hi Robin, > > On Fri, Jan 31, 2020 at 12:46 AM Robin Murphy wrote: >> On 2020-01-30 7:10 pm, Eric Dumazet via iommu wrote: >>> Increasing the size of dma_entry_hash size by 327680 bytes >>> has reached some bootloaders limitations. >> >> [ That might warrant some further explanation - I don't quite follow how >> this would relate to a bootloader specifically :/ ] > > Increasing the size of a static array increases kernel size. > Some (all? ;-) bootloaders have limitations on the maximum size of a > kernel image they can boot (usually something critical gets overwritten > when handling a too large image). While boot loaders can be fixed and > upgraded, this is usually much more cumbersome than updating the > kernel. Ah, OK - I'm all too familiar with bootloaders having image size limits, but I'm also used to implicitly-initialised statics being collected into a runtime-initialised .bss section, so I hadn't realised that there might still be platforms where that space is actually allocated in the image at link-time. > Besides, a static array always consumes valuable unswapable memory, > even when the feature would not be used (e.g. disabled by a command > line option). Indeed, and that alone might have been a reasonable rationale for the patch - I was merely querying the wording of the commit message, not its intent :) Thanks, Robin.