Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp147394ybg; Tue, 28 Jul 2020 02:14:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxNRBqxzKIz9pkIX6FrfYBHT7DqPEaQqzt7PAmxQKE2fk3m2at+eGc1zsGojtH4pgeP3m7E X-Received: by 2002:a17:906:aad2:: with SMTP id kt18mr6746597ejb.537.1595927652212; Tue, 28 Jul 2020 02:14:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595927652; cv=none; d=google.com; s=arc-20160816; b=L+HD7EyNAgYaaflX9wtH/I14KOH+fSa4+Lzx8oD5v7+PPvPjDxm9u5fQ3UECgXkwyy WmOfUAUy4rZpxkb6BsbpyeFOl1lg0B16qt5mau8F7WxSIJWlAMfOautOK6besL0bOWSW WdNgL5mVBZqWZKRRiCEYKJzE9nAFUxW7N4SaYNoGKNgjYE8NVWzVhdCatPpMZKE0tL/Y 1YuB5pqRhdgcD2YhIv3O9DeL7Sb1XESbW/kpQxT1Ny5Vrv0bESRnd9AIpnopuU0IGXTy pB2FrgDGwnvjY8sn0wAhZtZ9MKsMzCbtex39jgC9WFohVzxhqiWwUz+YSukgsp6xxG5R yXVA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=uuVnVvRqyc/Yx4po36K3kOSS80x6WL1uSNGFueF8whY=; b=I1UvNDob00Ssa9MhSa7pwiPNVHsBw6sE5H6akW3gPz7de3QOcFJ8rlnOWkbaJOlGHG MhWcm/Iv1ZXwaj9vnLgY+SowLRQciYkmWNcPbyk3dvA6uo+bT+PPdTOENxh2tI+rmbbw gVlJT/+LEeKH1VYnJNbR5Z9nJIWt8BxeCveckbmSALkITbx5DP763aDA7VRR5nq5HC9U clSxHtD1EALOPWO7VFxM2J+IbWt0dj+P0WIBxo63VVJLMdrma3+Sc2YmcwQKCcN79ZAW 1ieztTm/LRvYh9J7rRXvss0CyRkG5/bU2oIJKv1dxk4agFPeNy3HytOcQn+VzxQ1bfaI 9DZQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y16si7785366edq.189.2020.07.28.02.13.50; Tue, 28 Jul 2020 02:14:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728081AbgG1JNj (ORCPT + 99 others); Tue, 28 Jul 2020 05:13:39 -0400 Received: from verein.lst.de ([213.95.11.211]:47388 "EHLO verein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728021AbgG1JNj (ORCPT ); Tue, 28 Jul 2020 05:13:39 -0400 Received: by verein.lst.de (Postfix, from userid 2407) id CE5F668B05; Tue, 28 Jul 2020 11:13:35 +0200 (CEST) Date: Tue, 28 Jul 2020 11:13:35 +0200 From: Christoph Hellwig To: Nicolas Saenz Julienne Cc: Christoph Hellwig , Amit Pundir , Marek Szyprowski , Robin Murphy , David Rientjes , linux-rpi-kernel@lists.infradead.org, jeremy.linton@arm.com, iommu@lists.linux-foundation.org, lkml , John Stultz , Sumit Semwal Subject: Re: [PATCH] dma-pool: Do not allocate pool memory from CMA Message-ID: <20200728091335.GA23744@lst.de> References: <011994f8a717a00dcd9ed7682a1ddeb421c2c43f.camel@suse.de> <01831596e4a2a6c9c066138b23bd30435f8e5569.camel@suse.de> <6db722947546221ed99d3f473f78e1a6de65d7d6.camel@suse.de> <0dc1e922bf87fa73790e7471b3974528dd261486.camel@suse.de> <20200724134114.GA3152@lst.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.17 (2007-11-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 27, 2020 at 07:56:56PM +0200, Nicolas Saenz Julienne wrote: > Hi Christoph, > thanks for having a look at this! > > On Fri, 2020-07-24 at 15:41 +0200, Christoph Hellwig wrote: > > Yes, the iommu is an interesting case, and the current code is > > wrong for that. > > Care to expand on this? I do get that checking dma_coherent_ok() on memory > that'll later on be mapped into an iommu is kind of silly, although I think > harmless in Amir's specific case, since devices have wide enough dma-ranges. Is > there more to it? I think the problem is that it can lead to not finding suitable memory. > > > Can you try the patch below? It contains a modified version of Nicolas' > > patch to try CMA again for the expansion and a new (for now hackish) way to > > not apply the addressability check for dma-iommu allocations. > > > > diff --git a/kernel/dma/pool.c b/kernel/dma/pool.c > > index 6bc74a2d51273e..ec5e525d2b9309 100644 > > --- a/kernel/dma/pool.c > > +++ b/kernel/dma/pool.c > > @@ -3,7 +3,9 @@ > > * Copyright (C) 2012 ARM Ltd. > > * Copyright (C) 2020 Google LLC > > */ > > +#include > > #include > > +#include > > #include > > #include > > #include > > @@ -55,6 +57,31 @@ static void dma_atomic_pool_size_add(gfp_t gfp, size_t > > size) > > pool_size_kernel += size; > > } > > > > +static bool cma_in_zone(gfp_t gfp) > > +{ > > + phys_addr_t end; > > + unsigned long size; > > + struct cma *cma; > > + > > + cma = dev_get_cma_area(NULL); > > + if (!cma) > > + return false; > > + > > + size = cma_get_size(cma); > > + if (!size) > > + return false; > > + end = cma_get_base(cma) - memblock_start_of_DRAM() + size - 1; > > + > > + /* CMA can't cross zone boundaries, see cma_activate_area() */ > > + if (IS_ENABLED(CONFIG_ZONE_DMA) && (gfp & GFP_DMA) && > > + end <= DMA_BIT_MASK(zone_dma_bits)) > > + return true; > > + if (IS_ENABLED(CONFIG_ZONE_DMA32) && (gfp & GFP_DMA32) && > > + end <= DMA_BIT_MASK(32)) > > + return true; > > + return true; > > IIUC this will always return true given a CMA is present. Which reverts to the > previous behaviour (previous as in breaking some rpi4 setups), isn't it? Was that really what broke the PI? I'll try to get the split out series today, which might have a few more tweaks, and then we'll need to test it both on these rpi4 setups and Amits phone.