Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp808875ybk; Wed, 13 May 2020 13:45:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwjpKRb5Lz57RZ4A/w/ktX6xbn3oq/XqJUsWkVdlAzRPm0LpN3xYXEuAHf1MwrxLpjX1UCh X-Received: by 2002:a17:906:509:: with SMTP id j9mr817623eja.152.1589402714422; Wed, 13 May 2020 13:45:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589402714; cv=none; d=google.com; s=arc-20160816; b=xQiktUP6BWhQFS5+2XS2heAN/KK0q5//chQhEVkJ0usHt7Rz3TWseYV3zxm3E9Hdoc 3pIXNDwzNQ5T+kwXyfbsATOE7ZnLehsMxeAFYVEWZ+QTkBMqLQPWjTPSRYeuVzaXkCv3 JxxYun+tEI0gwyrASkVSwLhtoy44aygIS6z26QESgWtENvCNTrkTrZ3YsL88Mx7ud7BL 13RyZFY/Bx14OQ8GBswsTXga+ivqtwUZw7/EugZenL8DdaHxF5HBeOiLVmQzVIAEujt8 8Fg/UxBSNK/GBO96X16Kwi+xQy0FzoSqendOqi4MaXhJkhyPfMEQFj2Jz3RQplPaTXLM +IrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=QENcOpGqCh+yAkHXM9di26llTi4LG8KrgkhSJUBKBkw=; b=jADe7QBiMoUkMItTjVOsm7dLysOHEegldSOCfHcXgtRdSXP7fZuJihexFm4P7wYOgw mkvJRcaT9RyLBCGFdJA5onVf8UwGKKyzf2MIs6Tg8rolmMkcr3gtJ+wil/oQEWFh2EvC mRwlotmdviLHoZaO0BPEkdMqXgGPHTl1ufMNwE/8yWJFAdHldOFZee4LfctrxMoM0f5C Oki1tveuLM6FOxi38ciDFSQnlZFYYtIGOnwKpJ38cLlP0fuH9BVnuvvEZO0NaUit/Euf FNuQ3k9KvXStd9t8PoImi49ViSdSrK4SZBBvnhNBO/QSeMFlRvhGAHfgSy4mssOHXsLx T7FQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b13si535665ejg.10.2020.05.13.13.44.51; Wed, 13 May 2020 13:45:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387512AbgEMN15 (ORCPT + 99 others); Wed, 13 May 2020 09:27:57 -0400 Received: from foss.arm.com ([217.140.110.172]:46022 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728341AbgEMN15 (ORCPT ); Wed, 13 May 2020 09:27:57 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D01F230E; Wed, 13 May 2020 06:27:56 -0700 (PDT) Received: from [10.57.36.85] (unknown [10.57.36.85]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 101FC3F71E; Wed, 13 May 2020 06:27:54 -0700 (PDT) Subject: Re: [PATCH v4 03/38] iommu: add generic helper for mapping sgtable objects To: Marek Szyprowski , dri-devel@lists.freedesktop.org, iommu@lists.linux-foundation.org, linaro-mm-sig@lists.linaro.org, linux-kernel@vger.kernel.org Cc: Christoph Hellwig , Bartlomiej Zolnierkiewicz , linux-arm-kernel@lists.infradead.org, David Airlie , Daniel Vetter , Joerg Roedel References: <20200512085710.14688-1-m.szyprowski@samsung.com> <20200512090058.14910-1-m.szyprowski@samsung.com> <20200512090058.14910-3-m.szyprowski@samsung.com> From: Robin Murphy Message-ID: Date: Wed, 13 May 2020 14:27:52 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Thunderbird/68.8.0 MIME-Version: 1.0 In-Reply-To: <20200512090058.14910-3-m.szyprowski@samsung.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020-05-12 10:00 am, Marek Szyprowski wrote: > struct sg_table is a common structure used for describing a memory > buffer. It consists of a scatterlist with memory pages and DMA addresses > (sgl entry), as well as the number of scatterlist entries: CPU pages > (orig_nents entry) and DMA mapped pages (nents entry). > > It turned out that it was a common mistake to misuse nents and orig_nents > entries, calling mapping functions with a wrong number of entries. > > To avoid such issues, lets introduce a common wrapper operating directly > on the struct sg_table objects, which take care of the proper use of > the nents and orig_nents entries. Modulo Joerg's comments, Reviewed-by: Robin Murphy > Signed-off-by: Marek Szyprowski > --- > For more information, see '[PATCH v4 00/38] DRM: fix struct sg_table nents > vs. orig_nents misuse' thread: > https://lore.kernel.org/dri-devel/20200512085710.14688-1-m.szyprowski@samsung.com/T/ > --- > include/linux/iommu.h | 16 ++++++++++++++++ > 1 file changed, 16 insertions(+) > > diff --git a/include/linux/iommu.h b/include/linux/iommu.h > index 7cfd2dd..ba662ba 100644 > --- a/include/linux/iommu.h > +++ b/include/linux/iommu.h > @@ -478,6 +478,22 @@ extern size_t iommu_map_sg_atomic(struct iommu_domain *domain, > extern void iommu_set_fault_handler(struct iommu_domain *domain, > iommu_fault_handler_t handler, void *token); > > +/** > + * iommu_map_sgtable - Map the given buffer to the IOMMU domain > + * @domain: The IOMMU domain to perfor > + * @iova: The start addrees to map the buffer > + * @sgt: The sg_table object describing the buffer > + * @prot: IOMMU protection bits > + * > + * Create a mapping at @iova for the buffer described by a scatterlist > + * stored in the given sg_table object in the provided IOMMU domain. > + */ > +static inline size_t iommu_map_sgtable(struct iommu_domain *domain, > + unsigned long iova, struct sg_table *sgt, int prot) > +{ > + return iommu_map_sg(domain, iova, sgt->sgl, sgt->orig_nents, prot); > +} > + > extern void iommu_get_resv_regions(struct device *dev, struct list_head *list); > extern void iommu_put_resv_regions(struct device *dev, struct list_head *list); > extern void generic_iommu_put_resv_regions(struct device *dev, >