Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp4678136pxt; Wed, 11 Aug 2021 11:24:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzVJMTAHBhOpMFE5GIc7W2qfocijsbnfM4FkDTauSdyPybcuD+KFG8x+WEImAyzypV2ZIu2 X-Received: by 2002:a5d:8484:: with SMTP id t4mr190080iom.126.1628706272425; Wed, 11 Aug 2021 11:24:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628706272; cv=none; d=google.com; s=arc-20160816; b=fwGpgKYt+lwPFk5Svijg8WqBUI9PsY+0Mi25w50e0N83PCDkbLg5JAxMzWHSYX/Dgq nZqD7NX4FQZ5amdRtbU/r1DErPKYfweX9O9mtZ54ds0XWdBDeeL94jp19ogs9OGeKMXG 9dfngk57CEz3OhFIn5ZGsRqH8B70qIRo6x62UNSwkmRvZugmUQGoYZG8G6+u9iM0rMaM siEdrUtOjzMEk9VWL/x9SEN69Csrh7plPqLstAjfDdYGbOi9JypkvosetigMMOgvJsp8 vQyT+SxXiP9gShp+3DcaQMfstOMrAha70rs/b/ot4GPrMtwwUwtgYfa848mjnV3VwQIa aGHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=48Jm09cyiesY5yNfcUjCwM65lPVaZndzLFWa21hVrc8=; b=u1dysVe2oT6KZeHPQ5cld2O+u/p0nKUE/MFqANvnRSmYm5O6uFHaksUeCMaE399Po1 Ntg8d8mjJX2oGTzT1xTMQLmg+cUK+8dwLaKlCnwsLk40UfkCbQOzgHXSrAqngXqvRHuR pZtTBdfFzIL+UcRtb3thEDj+fXy2f/98oknYr7KrxtC8JC48HC2a+TTOUfv/JDXsZtKC Lt+HSErtVHJGsHIzAR2s1sJq/o3j6ouSFMR69gcrDv9bwWVVAbbMT2VGIqIvF0wwEq/b wiTKpqU5KC88p492RfXMIflD9TJ1U1uugeOm5Pf36IQi7EDbw2KH0xnjaxfPUHeVz8XB kV3A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r7si155772ilg.55.2021.08.11.11.24.19; Wed, 11 Aug 2021 11:24:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229921AbhHKSWy (ORCPT + 99 others); Wed, 11 Aug 2021 14:22:54 -0400 Received: from foss.arm.com ([217.140.110.172]:55934 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229655AbhHKSWx (ORCPT ); Wed, 11 Aug 2021 14:22:53 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 61D69D6E; Wed, 11 Aug 2021 11:22:29 -0700 (PDT) Received: from [10.57.36.146] (unknown [10.57.36.146]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 5A9E23F40C; Wed, 11 Aug 2021 11:22:28 -0700 (PDT) Subject: Re: [PATCH v3 1/5] dma-iommu: fix sync_sg with swiotlb To: Christoph Hellwig , David Stevens Cc: Will Deacon , linux-kernel@vger.kernel.org, Tom Murphy , iommu@lists.linux-foundation.org References: <20210811024247.1144246-1-stevensd@google.com> <20210811024247.1144246-2-stevensd@google.com> From: Robin Murphy Message-ID: <0340855f-def5-d5cf-0f2a-6d978df2c5c6@arm.com> Date: Wed, 11 Aug 2021 19:22:22 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021-08-11 06:57, Christoph Hellwig wrote: > On Wed, Aug 11, 2021 at 11:42:43AM +0900, David Stevens wrote: >> From: David Stevens >> >> The is_swiotlb_buffer function takes the physical address of the swiotlb >> buffer, not the physical address of the original buffer. The sglist >> contains the physical addresses of the original buffer, so for the >> sync_sg functions to work properly when a bounce buffer might have been >> used, we need to use iommu_iova_to_phys to look up the physical address. >> This is what sync_single does, so call that function on each sglist >> segment. >> >> The previous code mostly worked because swiotlb does the transfer on map >> and unmap. However, any callers which use DMA_ATTR_SKIP_CPU_SYNC with >> sglists or which call sync_sg would not have had anything copied to the >> bounce buffer. >> >> Fixes: 82612d66d51d ("iommu: Allow the dma-iommu api to use bounce buffers") >> Signed-off-by: David Stevens >> --- >> drivers/iommu/dma-iommu.c | 27 +++++++++++++-------------- >> 1 file changed, 13 insertions(+), 14 deletions(-) >> >> diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c >> index 98ba927aee1a..54e103b989d9 100644 >> --- a/drivers/iommu/dma-iommu.c >> +++ b/drivers/iommu/dma-iommu.c >> @@ -813,14 +813,13 @@ static void iommu_dma_sync_sg_for_cpu(struct device *dev, >> if (dev_is_dma_coherent(dev) && !dev_is_untrusted(dev)) >> return; >> >> + if (dev_is_untrusted(dev)) >> + for_each_sg(sgl, sg, nelems, i) >> + iommu_dma_sync_single_for_cpu(dev, sg_dma_address(sg), >> + sg->length, dir); >> + else >> + for_each_sg(sgl, sg, nelems, i) >> arch_sync_dma_for_cpu(sg_phys(sg), sg->length, dir); >> } > > I'd remove the above check and fold the if (!dev_is_dma_coherent(dev)) > into the else line. Same for iommu_dma_sync_sg_for_device. +1 With those also cleaned up, Reviewed-by: Robin Murphy