Received: by 2002:a17:90b:8d0:0:0:0:0 with SMTP id ds16csp5067325pjb; Mon, 27 Jul 2020 12:04:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw4EooaU+M9awcMP/GAPrx66KKRIucGd+11ygNfqAW8MGmcASBHXbG/9vIpQzxAYPRRG1V+ X-Received: by 2002:a17:906:2b9b:: with SMTP id m27mr22496435ejg.19.1595876680481; Mon, 27 Jul 2020 12:04:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595876680; cv=none; d=google.com; s=arc-20160816; b=p0DlYuRUW6DenMiodKio1OkTFuMTHE/k0MqJxkNLIK6XONZnk7lXgXylTtbqc24hWP /eu54XHU4jX++pGw05z3yqueOMHzZpBaEzaOj+eviI8hrgHWsuA5PPDDfbdtW4BzVgTe xJdR+eD1unbJYAED97glU+XyvFbLZxr3NV0St1lm+eG4DzcUAgoPlPszkweCjdcoFbiG 05cBcUi48zL46eoDchBTc850ZtxfEy0Ax7eD4Jr1tANNlm7xQRRMpTj4/SAEcpq3mPL4 Qwn3dgEUNNJSw2qWDO6x82/gXCIVM8vRF5wCY4i1DUAenihwB8+zAayMwj62tDrd2MxW RWlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:date:cc:to:from:subject:message-id; bh=qtCcOBPH+9to2IryOF4IIEWHVFKmN35IhsadAF7bHbc=; b=NOeHopK5Tto474CN/2oR+iNfHIge7RjSclZJcTu2rNdqcj8iSM+KWG1KkpTvgQP7Yc j0SsrCZzKkjBZnbEUJHnsfFc0gTdm8AtVFtCQb5CfdLwbtguX4V+6Tgi/Aakrxt4B3vI KvCl4ggT2O25GDiCGocBmfbjdyv3xqIWRWgx4ok3MLNpTEe0pi1z6oF+BraduxgRthJQ 7ugBuj5P1WPs351TFzEA98tBuG8jq41v5rBL9mYSCfwmGR17ZzSn0Q5iPx/0fQ4r+p+e CabRku9MGxxUCud+Aji1aRXRPawxCBxvJyE2X1aFw9uhrPMWI3vDAuqvt+oq/sSbTczU GDkQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r12si5935680ejs.370.2020.07.27.12.04.17; Mon, 27 Jul 2020 12:04:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729453AbgG0R5A (ORCPT + 99 others); Mon, 27 Jul 2020 13:57:00 -0400 Received: from mx2.suse.de ([195.135.220.15]:36584 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729144AbgG0R5A (ORCPT ); Mon, 27 Jul 2020 13:57:00 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 08CABABE9; Mon, 27 Jul 2020 17:57:09 +0000 (UTC) Message-ID: Subject: Re: [PATCH] dma-pool: Do not allocate pool memory from CMA From: Nicolas Saenz Julienne To: Christoph Hellwig , Amit Pundir Cc: Marek Szyprowski , Robin Murphy , David Rientjes , linux-rpi-kernel@lists.infradead.org, jeremy.linton@arm.com, iommu@lists.linux-foundation.org, lkml , John Stultz , Sumit Semwal Date: Mon, 27 Jul 2020 19:56:56 +0200 In-Reply-To: <20200724134114.GA3152@lst.de> References: <550b30a86c0785049d24c945e2c6628d491cee3a.camel@suse.de> <011994f8a717a00dcd9ed7682a1ddeb421c2c43f.camel@suse.de> <01831596e4a2a6c9c066138b23bd30435f8e5569.camel@suse.de> <6db722947546221ed99d3f473f78e1a6de65d7d6.camel@suse.de> <0dc1e922bf87fa73790e7471b3974528dd261486.camel@suse.de> <20200724134114.GA3152@lst.de> Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-qFFwwRyYdW0g8uHUD6n0" User-Agent: Evolution 3.36.4 MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --=-qFFwwRyYdW0g8uHUD6n0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hi Christoph, thanks for having a look at this! On Fri, 2020-07-24 at 15:41 +0200, Christoph Hellwig wrote: > Yes, the iommu is an interesting case, and the current code is > wrong for that. Care to expand on this? I do get that checking dma_coherent_ok() on memory that'll later on be mapped into an iommu is kind of silly, although I think harmless in Amir's specific case, since devices have wide enough dma-ranges= . Is there more to it? > Can you try the patch below? It contains a modified version of Nicolas' > patch to try CMA again for the expansion and a new (for now hackish) way = to > not apply the addressability check for dma-iommu allocations. >=20 > diff --git a/kernel/dma/pool.c b/kernel/dma/pool.c > index 6bc74a2d51273e..ec5e525d2b9309 100644 > --- a/kernel/dma/pool.c > +++ b/kernel/dma/pool.c > @@ -3,7 +3,9 @@ > * Copyright (C) 2012 ARM Ltd. > * Copyright (C) 2020 Google LLC > */ > +#include > #include > +#include > #include > #include > #include > @@ -55,6 +57,31 @@ static void dma_atomic_pool_size_add(gfp_t gfp, size_t > size) > pool_size_kernel +=3D size; > } > =20 > +static bool cma_in_zone(gfp_t gfp) > +{ > + phys_addr_t end; > + unsigned long size; > + struct cma *cma; > + > + cma =3D dev_get_cma_area(NULL); > + if (!cma) > + return false; > + > + size =3D cma_get_size(cma); > + if (!size) > + return false; > + end =3D cma_get_base(cma) - memblock_start_of_DRAM() + size - 1; > + > + /* CMA can't cross zone boundaries, see cma_activate_area() */ > + if (IS_ENABLED(CONFIG_ZONE_DMA) && (gfp & GFP_DMA) && > + end <=3D DMA_BIT_MASK(zone_dma_bits)) > + return true; > + if (IS_ENABLED(CONFIG_ZONE_DMA32) && (gfp & GFP_DMA32) && > + end <=3D DMA_BIT_MASK(32)) > + return true; > + return true; IIUC this will always return true given a CMA is present. Which reverts to = the previous behaviour (previous as in breaking some rpi4 setups), isn't it? Regards, Nicolas --=-qFFwwRyYdW0g8uHUD6n0 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- iQEzBAABCAAdFiEErOkkGDHCg2EbPcGjlfZmHno8x/4FAl8fFWgACgkQlfZmHno8 x/6obgf+LDzEyQY0PPgnBX0Bop85cj9nPiNdylLhZ6He/5cLrZMAcWtA69qcst1i PQdp5ThWKd7Gd0mlmg+B9MdxgehKMf0q517j0pb4pBBxx96D4Hg/QjGSOfGeHLVe 9oaxYdxDf+xKTIn5v8myvHyQIHPYF8pkcVHp1M5b+q/Q9CUXpWB7wVQWM0vlcCIt +HgRuyEzktxngXkRZsYCxmtEMEGGUri5klRs7O+M6Vbn+tlRHtYmjCFOEzmlXS9W +bph7Ekf1b448fF2q5P7Xu5fhE7CYN8k8nr63AcVXVaLR/DsJ5GxjWFGKNye5/21 91Uk2Go4FCB6IrjoB9vmp5/TowXkOQ== =D8U2 -----END PGP SIGNATURE----- --=-qFFwwRyYdW0g8uHUD6n0--