Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3282507pxk; Tue, 15 Sep 2020 15:16:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzVKSzVi5uZ9fNylVFcl1No7F06LAW2w43vfwRy4PtGYzNH05hf+hXxsbkr3U66HUaNABFD X-Received: by 2002:a05:6402:cb4:: with SMTP id cn20mr24853656edb.369.1600208177630; Tue, 15 Sep 2020 15:16:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600208177; cv=none; d=google.com; s=arc-20160816; b=mHESc9rbq12itm5wzGzFOP/Qs9x3dE1nrjv1z60E6W9RKdhfvqFEm+atemREi3V1t3 hDE1o77ttkJzATtv2PKzaFCYSbK7qVblgA5ICXmWQj4XrPS/8QUwRKJvf1vXsyQvXCtp BK9z+Fl6JVR8Q9QnGJa4PM3te7hBvKpoKlYRkcJvsnhPTds6TrovK6YOOLEwbww5Uxws GdqL0nz89OId665INpb+V8hHX/DYYVBPFzwr84yjE/D9E55fugzFFM1Ykr/Ilp6Gcf0M bPjkUYHDIRi5zfX/oFd3druuw3ToVexPbUjtG6ZMezN2Jngqwkg412JiQavPzgufC9KU pAnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=5I0Wekw7PGkNV3dZaIEsA8c8Eplwzl97xo8vYosQxdI=; b=nmfLSz1oqu2MYUl6F06SuSOSavnn5Rj8WUtsCvB3eVWO5O1X69Jy0/IOZaJg2tOEl6 a92fhIwa2478x8ynZG06hzsrUN5laQIj/HoXc2NDrf+dsX9oxRM43m9BoZgat+BxcT+3 nMCnpHu6vulEd5aAzyY0sJmuE0uwdhhmywPbY4qO7lHy/uk9NppIP/6V+K21CNpDeI3n dBVCvhJlnHm5YYPOtdKK7WxDZnwXb5Toa8vY6VQIuyG5sXU1HWkjljzW4yk0fooiScRb Htozk+39dKAwLZbgaXw98jZ4WxVJWaSbZS0EeOxpYZIO7NnYNSpOYO+FXV1pRZMP7ehw XHVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=casper.20170209 header.b=jyzc8j2w; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q23si9790933ejd.363.2020.09.15.15.15.54; Tue, 15 Sep 2020 15:16:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=casper.20170209 header.b=jyzc8j2w; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727758AbgIOWPA (ORCPT + 99 others); Tue, 15 Sep 2020 18:15:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54420 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727761AbgIOQit (ORCPT ); Tue, 15 Sep 2020 12:38:49 -0400 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 970E1C0611C0; Tue, 15 Sep 2020 09:04:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=Content-Transfer-Encoding:MIME-Version: References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To: Content-Type:Content-ID:Content-Description; bh=5I0Wekw7PGkNV3dZaIEsA8c8Eplwzl97xo8vYosQxdI=; b=jyzc8j2w+fdt85nueKxbnd3ezP GuBg/J0RMKy53mEvPLRvYYUeRE5qfD5pZK/2Tg56DYlGHEbkysaFTe/z7DbC3zZ0it9jaR+Ho4oKb WOidKq9LH32d8MbsIyn+EYu/QtdftFyud9pZgBRYX6fV0ATMBBQWcgDXSXhH3CUw8UpF+twk1mY5j 9b1OtIxjo6lTrMtXdNQtB+WILFf1H+IvhiDOzJTlJEVRAssivT7ZhTdp6FlQfsfVe/xidCfVGoTim M/jzfaXnAQdUutiuaqhKSAHmP6hnx5JVmcNjwpY2wXcC8uu+7pYrtjrX2VAxOT4u7diGSMpHJV/If sHAa5gkw==; Received: from 089144214092.atnat0023.highway.a1.net ([89.144.214.92] helo=localhost) by casper.infradead.org with esmtpsa (Exim 4.92.3 #3 (Red Hat Linux)) id 1kIDRV-00047a-8O; Tue, 15 Sep 2020 16:04:29 +0000 From: Christoph Hellwig To: Mauro Carvalho Chehab , Thomas Bogendoerfer , "James E.J. Bottomley" , Joonyoung Shim , Seung-Woo Kim , Ben Skeggs , Marek Szyprowski , Tomasz Figa , Matt Porter , iommu@lists.linux-foundation.org Cc: Stefan Richter , linux1394-devel@lists.sourceforge.net, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-media@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linux-samsung-soc@vger.kernel.org, nouveau@lists.freedesktop.org, netdev@vger.kernel.org, linux-scsi@vger.kernel.org, linux-mm@kvack.org, alsa-devel@alsa-project.org Subject: [PATCH 05/18] net/au1000-eth: stop using DMA_ATTR_NON_CONSISTENT Date: Tue, 15 Sep 2020 17:51:09 +0200 Message-Id: <20200915155122.1768241-6-hch@lst.de> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200915155122.1768241-1-hch@lst.de> References: <20200915155122.1768241-1-hch@lst.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SRS-Rewrite: SMTP reverse-path rewritten from by casper.infradead.org. See http://www.infradead.org/rpr.html Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The au1000-eth driver contains none of the manual cache synchronization required for using DMA_ATTR_NON_CONSISTENT. From what I can tell it can be used on both dma coherent and non-coherent DMA platforms, but I suspect it has been buggy on the non-coherent platforms all along. Signed-off-by: Christoph Hellwig --- drivers/net/ethernet/amd/au1000_eth.c | 15 ++++++--------- 1 file changed, 6 insertions(+), 9 deletions(-) diff --git a/drivers/net/ethernet/amd/au1000_eth.c b/drivers/net/ethernet/amd/au1000_eth.c index 75dbd221dc594b..19e195420e2434 100644 --- a/drivers/net/ethernet/amd/au1000_eth.c +++ b/drivers/net/ethernet/amd/au1000_eth.c @@ -1131,10 +1131,9 @@ static int au1000_probe(struct platform_device *pdev) /* Allocate the data buffers * Snooping works fine with eth on all au1xxx */ - aup->vaddr = (u32)dma_alloc_attrs(&pdev->dev, MAX_BUF_SIZE * + aup->vaddr = (u32)dma_alloc_coherent(&pdev->dev, MAX_BUF_SIZE * (NUM_TX_BUFFS + NUM_RX_BUFFS), - &aup->dma_addr, 0, - DMA_ATTR_NON_CONSISTENT); + &aup->dma_addr, 0); if (!aup->vaddr) { dev_err(&pdev->dev, "failed to allocate data buffers\n"); err = -ENOMEM; @@ -1310,9 +1309,8 @@ static int au1000_probe(struct platform_device *pdev) err_remap2: iounmap(aup->mac); err_remap1: - dma_free_attrs(&pdev->dev, MAX_BUF_SIZE * (NUM_TX_BUFFS + NUM_RX_BUFFS), - (void *)aup->vaddr, aup->dma_addr, - DMA_ATTR_NON_CONSISTENT); + dma_free_coherent(&pdev->dev, MAX_BUF_SIZE * (NUM_TX_BUFFS + NUM_RX_BUFFS), + (void *)aup->vaddr, aup->dma_addr); err_vaddr: free_netdev(dev); err_alloc: @@ -1344,9 +1342,8 @@ static int au1000_remove(struct platform_device *pdev) if (aup->tx_db_inuse[i]) au1000_ReleaseDB(aup, aup->tx_db_inuse[i]); - dma_free_attrs(&pdev->dev, MAX_BUF_SIZE * (NUM_TX_BUFFS + NUM_RX_BUFFS), - (void *)aup->vaddr, aup->dma_addr, - DMA_ATTR_NON_CONSISTENT); + dma_free_coherent(&pdev->dev, MAX_BUF_SIZE * (NUM_TX_BUFFS + NUM_RX_BUFFS), + (void *)aup->vaddr, aup->dma_addr); iounmap(aup->macdma); iounmap(aup->mac); -- 2.28.0