Received: by 2002:ab2:6857:0:b0:1ef:ffd0:ce49 with SMTP id l23csp2805960lqp; Mon, 25 Mar 2024 09:40:28 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCU0lYQNtezqBUO0PvmDt/3LoujItaTvD+LcFZZId0nd3XhRyVqc2o8bS6ZR3lSddWdJNYcJnfiOJpv+Gd2tsll1CTmoGmaQL4d39Ca+MQ== X-Google-Smtp-Source: AGHT+IHGLz9sKvrVx3D+vaicmxtrmzuHvAnAYZS+EWcBMTIaEbGEFApms1FwieaFSRrsxGxusLuH X-Received: by 2002:a17:902:e5c7:b0:1e0:9d43:55cb with SMTP id u7-20020a170902e5c700b001e09d4355cbmr9846733plf.34.1711384828179; Mon, 25 Mar 2024 09:40:28 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711384828; cv=pass; d=google.com; s=arc-20160816; b=QGAky+qmHJRmnRub29kGiRb3+Kc2XRhUaq44aqFUIOXh4WyLWGgs5KjsIMLcCfFbLq yJqfGpIeaY7W1yMb333dh9xndojoR3PZlXLI42zIboYawgsQ7CHlV9rxwO5VtwmL9qS1 dHzjBKnmzAcNrp/Ug6u8kNh5iJbCIGyw4pkNahE5CLZHvP/4zGdR3XjI6ZDm7RhtNK4f N8BAsvrAoI7eZpdU/5E50MTG1C+t4NZuirniZxdaGu3ZCOKbTFHzrP33e36hDWysQt7L 7oXCE7WcNhPveQJHsU+uWMGBnpcye9GY9gqmjgFSwTbkfL+5Po4bJQXlE51AiVw1xjS6 ZwuQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=f/PdNOhTrx6gPUxS313xg4uJei38LtyoZx0x4Dnq9xE=; fh=fiD72s8nhjLwmcqAHiyS2CGptPYIf4ggBFa0e9OVO7U=; b=T6+51KLQEiwRbuZrwh1IKtO38mS/Whn2dIAmX3KIjM49bGMYyq7Jb/taW7HIcoCOgl bbCe2BJnN/QEI2/AAVZyEE/KIxAdSfQKHPCQ8Uj8u7+S+ocU9glDTmZ7/WZwnOAcdumg 3b0NI8e0rQlKXJUWkF2AvSjVBb0CVWEaUqj23t7LjDh7OrUSODRt/gwRy30HlG1WjskN 3R8Rw6vCHhjkwrroci8T6GhcJKurdQgrPIzIidJx6gui3YJ4NV+SaBAq9bvKC0FCUrMD Ri/Iy0KXIkHDWiN2bB+3g01uoyCePYHrQUxa81KkpocJRgvHZKbcu5rpp4aX8UfcL9Yz VtkQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@tesarici.cz header.s=mail header.b=QKMAynZw; arc=pass (i=1 spf=pass spfdomain=tesarici.cz dkim=pass dkdomain=tesarici.cz dmarc=pass fromdomain=tesarici.cz); spf=pass (google.com: domain of linux-kernel+bounces-117203-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-117203-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=tesarici.cz Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id y7-20020a17090322c700b001e01f24fcb1si3407341plg.173.2024.03.25.09.40.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 25 Mar 2024 09:40:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-117203-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@tesarici.cz header.s=mail header.b=QKMAynZw; arc=pass (i=1 spf=pass spfdomain=tesarici.cz dkim=pass dkdomain=tesarici.cz dmarc=pass fromdomain=tesarici.cz); spf=pass (google.com: domain of linux-kernel+bounces-117203-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-117203-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=tesarici.cz Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 66E403435FA for ; Mon, 25 Mar 2024 16:14:23 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id B7F7A763E4; Mon, 25 Mar 2024 14:06:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=tesarici.cz header.i=@tesarici.cz header.b="QKMAynZw" Received: from bee.tesarici.cz (bee.tesarici.cz [37.205.15.56]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C969B48788 for ; Mon, 25 Mar 2024 14:06:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=37.205.15.56 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711375609; cv=none; b=AlYD5M3+mFaLYm+1E0le5ynW/1xo9Ude67SJMxX37kTRdgp7FsqlTh2E9L1WXvuk9nm1lXBGVXqETaa+qpRr3G2Dx1WTowb8JqDGksYNgGmu13bUDbPXxnzZsnxRuWYq8sTVJB2zyMR8Eha2yuv+R0VQSIE9fnGDKL9bv6sxKDI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711375609; c=relaxed/simple; bh=whCGAWo+4IdQWlqI1uXsHuZAKQymFmPeY9MTgmqXwDY=; h=Date:From:To:Cc:Subject:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=AcrqZ06QlkAJNz39TQ8xgX31yC0LMNTer5NLDMUvszOLX+f2iml36VwrV/gttmILVZC849vgaI8mVzfNIzr6yhQQN6rt9aRuMBArBE1rr2tJD7PIpxdCCPNkbSrRk8RHbqDH0wXQZu6xZC4FhaMi9dvQTh3JAGVaVClWYV7drmA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=tesarici.cz; spf=pass smtp.mailfrom=tesarici.cz; dkim=pass (2048-bit key) header.d=tesarici.cz header.i=@tesarici.cz header.b=QKMAynZw; arc=none smtp.client-ip=37.205.15.56 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=tesarici.cz Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=tesarici.cz Received: from meshulam.tesarici.cz (dynamic-2a00-1028-83b8-1e7a-4427-cc85-6706-c595.ipv6.o2.cz [IPv6:2a00:1028:83b8:1e7a:4427:cc85:6706:c595]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by bee.tesarici.cz (Postfix) with ESMTPSA id D09231AFA98; Mon, 25 Mar 2024 15:06:42 +0100 (CET) Authentication-Results: mail.tesarici.cz; dmarc=fail (p=quarantine dis=none) header.from=tesarici.cz DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tesarici.cz; s=mail; t=1711375603; bh=f/PdNOhTrx6gPUxS313xg4uJei38LtyoZx0x4Dnq9xE=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=QKMAynZwmp7EZd6pU/aLEOSFdcLHxMQol3W1RjNisaHSlPC1Tdtn7vSvo41vtJnpS psIFXtmBCN0WxIPEXq2cp/x+eAZSe/W8mBq0O/70qn1GYOAsFM0G73DLxR3GkW6XGG 1hlJz3AKF4Hb3XBgmjGX8PDaRdQeHxpyONkVBovs8c7/A4HtxAgF8in+f3vSy0kjjE +DvBwV0MPiR0TGe9Lu8FX89RA4AcEyfkyOGWn3EB04Zs3FVEyJc1XMX/mcIhXdzTQu /FR0unjEbYQHGvvTwlPuIqi8ql+MA449BrAKEa9J3NmTM/6RcUwdgQCA9HnWnakjlI 9Zx4/Qpqh8qYQ== Date: Mon, 25 Mar 2024 15:06:41 +0100 From: Petr =?UTF-8?B?VGVzYcWZw61r?= To: Petr Tesarik Cc: Christoph Hellwig , Marek Szyprowski , Robin Murphy , linux-kernel@vger.kernel.org (open list), iommu@lists.linux.dev (open list:DMA MAPPING HELPERS), Will Deacon , Michael Kelley , Roberto Sassu Subject: Re: [PATCH 1/1] swiotlb: add a KUnit test suite Message-ID: <20240325150641.0c7b2d73@meshulam.tesarici.cz> In-Reply-To: <20240313092740.192-1-petrtesarik@huaweicloud.com> References: <20240313092740.192-1-petrtesarik@huaweicloud.com> X-Mailer: Claws Mail 4.2.0 (GTK 3.24.41; x86_64-suse-linux-gnu) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Wed, 13 Mar 2024 10:27:40 +0100 Petr Tesarik wrote: > From: Petr Tesarik > > Add unit tests to help avoid regressions in the SWIOTLB code. > > These features are covered by the test suite: > > * basic functionality (map, sync) > * alignment based on mapping size > * alignment based on min_align_mask > * explicit alignment with alloc_align_mask > * combination of alignment constraints > > Select CONFIG_SWIOTLB rather than depend on it, because it allows to run > the test with UML (default KUnit target). Hi all, I know it's not super-urgent, but I'm just curious: Has anyone had time to try out this patch? Did it work for you? Petr T > Signed-off-by: Petr Tesarik > --- > kernel/dma/Kconfig | 13 ++ > kernel/dma/Makefile | 1 + > kernel/dma/swiotlb_test.c | 413 ++++++++++++++++++++++++++++++++++++++ > 3 files changed, 427 insertions(+) > create mode 100644 kernel/dma/swiotlb_test.c > > diff --git a/kernel/dma/Kconfig b/kernel/dma/Kconfig > index d62f5957f36b..44c62faa8d89 100644 > --- a/kernel/dma/Kconfig > +++ b/kernel/dma/Kconfig > @@ -103,6 +103,19 @@ config SWIOTLB_DYNAMIC > > If unsure, say N. > > +config SWIOTLB_KUNIT_TEST > + tristate "Unit tests for software IO TLB" if !KUNIT_ALL_TESTS > + select SWIOTLB > + depends on KUNIT > + default KUNIT_ALL_TESTS > + help > + Build unit tests for software IO TLB. > + > + For more information on KUnit and unit tests in general, please refer > + to the KUnit documentation in Documentation/dev-tools/kunit/. > + > + If unsure, say N. > + > config DMA_BOUNCE_UNALIGNED_KMALLOC > bool > depends on SWIOTLB > diff --git a/kernel/dma/Makefile b/kernel/dma/Makefile > index 21926e46ef4f..bfb130020219 100644 > --- a/kernel/dma/Makefile > +++ b/kernel/dma/Makefile > @@ -7,6 +7,7 @@ obj-$(CONFIG_DMA_CMA) += contiguous.o > obj-$(CONFIG_DMA_DECLARE_COHERENT) += coherent.o > obj-$(CONFIG_DMA_API_DEBUG) += debug.o > obj-$(CONFIG_SWIOTLB) += swiotlb.o > +obj-$(CONFIG_SWIOTLB_KUNIT_TEST) += swiotlb_test.o > obj-$(CONFIG_DMA_COHERENT_POOL) += pool.o > obj-$(CONFIG_MMU) += remap.o > obj-$(CONFIG_DMA_MAP_BENCHMARK) += map_benchmark.o > diff --git a/kernel/dma/swiotlb_test.c b/kernel/dma/swiotlb_test.c > new file mode 100644 > index 000000000000..46e4d8055ef5 > --- /dev/null > +++ b/kernel/dma/swiotlb_test.c > @@ -0,0 +1,413 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * Copyright (C) 2024 Huawei Technologies Duesseldorf GmbH > + */ > + > +#include > +#include > + > +#include > +#include > +#include > +#include > +#include > + > +/* Alignment check repeat count. */ > +#define NUM_CHECK_ALIGNED 5 > + > +/* Offset of mapped data inside the allocated buffer. */ > +#define MAP_OFF 128 > + > +#define PASS 0x600d600d > +#define FAIL 0xbad00bad > + > +static struct { > + unsigned char pad1[MAP_OFF]; > + unsigned long value; > + unsigned char pad2[PAGE_SIZE]; > +} test_data __page_aligned_bss; > + > +/************************************************************** > + * Various helper functions. > + */ > + > +static int swiotlb_suite_init(struct kunit_suite *suite) > +{ > + if (is_swiotlb_allocated()) > + return 0; > + > + return swiotlb_init_late(swiotlb_size_or_default(), GFP_KERNEL, NULL); > +} > + > +static int swiotlb_drv_probe(struct device *dev) > +{ > + dev->dma_parms = devm_kzalloc(dev, sizeof(*dev->dma_parms), > + GFP_KERNEL); > + if (!dev->dma_parms) > + return -ENOMEM; > + > + return 0; > +} > + > +static int swiotlb_test_init(struct kunit *test) > +{ > + struct device_driver *driver; > + > + driver = kunit_driver_create(test, "swiotlb_driver"); > + KUNIT_ASSERT_NOT_ERR_OR_NULL(test, driver); > + driver->probe = swiotlb_drv_probe; > + > + test->priv = driver; > + return 0; > +} > + > +/** > + * test_device() - get a dummy device for testing > + * @test: KUnit test instance. > + * > + * Allocate a device suitable for SWIOTLB. > + */ > +static struct device *test_device(struct kunit *test) > +{ > + struct device_driver *driver = test->priv; > + struct device *dev; > + u64 mask; > + > + dev = kunit_device_register_with_driver(test, "swiotlb", driver); > + KUNIT_ASSERT_NOT_ERR_OR_NULL(test, dev); > + > + mask = DMA_BIT_MASK(64); > + KUNIT_ASSERT_EQ(test, dma_coerce_mask_and_coherent(dev, mask), 0); > + > + return dev; > +} > + > +/** > + * check_aligned() - check that bounce buffers are aligned > + * @test: KUnit test instance. > + * @dev: Device. > + * @buf: Pointer to the original buffer. > + * @size: Size of the original buffer. > + * @align: Allocation alignment (in bytes). > + * @check_bits: > + * Number of low bits checked in the swiotlb address. > + * @preserve_bits: > + * Number of low bits preserved from the original address. > + * > + * Mapping is repeated a few times, and a small buffer is allocated after > + * each attempt. This should cover the case when the first free slot merely > + * happens to be suitably aligned. > + */ > +static void check_aligned(struct kunit *test, struct device *dev, > + void *buf, size_t size, unsigned long align, > + int check_bits, int preserve_bits) > +{ > + dma_addr_t tlb_addr[NUM_CHECK_ALIGNED]; > + dma_addr_t pad_addr[NUM_CHECK_ALIGNED]; > + u64 check_mask, check_val; > + phys_addr_t phys_addr; > + char *orig, *tlb; > + int i; > + > + orig = (char *)buf; > + phys_addr = virt_to_phys(buf); > + check_mask = DMA_BIT_MASK(check_bits); > + check_val = phys_addr & DMA_BIT_MASK(preserve_bits); > + > + for (i = 0; i < NUM_CHECK_ALIGNED; ++i) { > + tlb_addr[i] = > + swiotlb_tbl_map_single(dev, phys_addr, size, size, > + align - 1, DMA_TO_DEVICE, 0); > + KUNIT_ASSERT_NE(test, tlb_addr[i], DMA_MAPPING_ERROR); > + KUNIT_EXPECT_TRUE(test, is_swiotlb_buffer(dev, tlb_addr[i])); > + KUNIT_EXPECT_EQ(test, tlb_addr[i] & check_mask, check_val); > + > + /* Check sync in both directions. */ > + tlb = phys_to_virt(tlb_addr[i]); > + KUNIT_EXPECT_EQ(test, *orig, *tlb); > + *orig ^= 0xff; > + swiotlb_sync_single_for_device(dev, tlb_addr[i], sizeof(*orig), > + DMA_TO_DEVICE); > + KUNIT_EXPECT_EQ(test, *orig, *tlb); > + *tlb ^= 0xff; > + swiotlb_sync_single_for_cpu(dev, tlb_addr[i], sizeof(*orig), > + DMA_FROM_DEVICE); > + KUNIT_EXPECT_EQ(test, *orig, *tlb); > + > + pad_addr[i] = swiotlb_map(dev, phys_addr, sizeof(long), > + DMA_TO_DEVICE, 0); > + KUNIT_ASSERT_NE(test, pad_addr[i], DMA_MAPPING_ERROR); > + } > + > + for (i = 0; i < NUM_CHECK_ALIGNED; ++i) { > + swiotlb_tbl_unmap_single(dev, pad_addr[i], sizeof(long), > + DMA_FROM_DEVICE, 0); > + swiotlb_tbl_unmap_single(dev, tlb_addr[i], size, > + DMA_FROM_DEVICE, 0); > + } > +} > + > +/************************************************************** > + * Map a DMA buffer. > + * > + * Test that a DMA buffer can be mapped and synced. > + */ > + > +static void swiotlb_test_map(struct kunit *test) > +{ > + struct device *dev = test_device(test); > + phys_addr_t phys_addr; > + dma_addr_t tlb_addr; > + unsigned long *tlb; > + > + phys_addr = virt_to_phys(&test_data.value); > + test_data.value = PASS; > + tlb_addr = swiotlb_map(dev, phys_addr, sizeof(unsigned long), > + DMA_TO_DEVICE, 0); > + KUNIT_ASSERT_NE(test, tlb_addr, DMA_MAPPING_ERROR); > + KUNIT_EXPECT_TRUE(test, is_swiotlb_buffer(dev, tlb_addr)); > + tlb = phys_to_virt(tlb_addr); > + > + /* Bounce buffer is initialized to original buffer. */ > + KUNIT_EXPECT_EQ(test, *tlb, PASS); > + > + /* Bounce buffer is updated on sync to device. */ > + test_data.value = PASS + 1; > + swiotlb_sync_single_for_device(dev, tlb_addr, sizeof(unsigned long), > + DMA_TO_DEVICE); > + KUNIT_EXPECT_EQ(test, *tlb, PASS + 1); > + > + /* Original buffer is updated on sync from device. */ > + *tlb = PASS + 2; > + swiotlb_sync_single_for_cpu(dev, tlb_addr, sizeof(unsigned long), > + DMA_FROM_DEVICE); > + KUNIT_EXPECT_EQ(test, test_data.value, PASS + 2); > + > + /* Original buffer is also updated on unmap. */ > + *tlb = PASS + 3; > + swiotlb_tbl_unmap_single(dev, tlb_addr, sizeof(unsigned long), > + DMA_FROM_DEVICE, 0); > + KUNIT_EXPECT_EQ(test, test_data.value, PASS + 3); > +} > + > +/************************************************************** > + * Map DMA buffer as bi-directional. > + * > + * Test that buffer is synced with DMA_BIDIRECTIONAL. > + */ > + > +static void swiotlb_test_bidirectional(struct kunit *test) > +{ > + struct device *dev = test_device(test); > + phys_addr_t phys_addr; > + dma_addr_t tlb_addr; > + unsigned long *tlb; > + > + test_data.value = PASS; > + phys_addr = virt_to_phys(&test_data.value); > + tlb_addr = swiotlb_map(dev, phys_addr, sizeof(unsigned long), > + DMA_BIDIRECTIONAL, 0); > + KUNIT_ASSERT_NE(test, tlb_addr, DMA_MAPPING_ERROR); > + KUNIT_EXPECT_TRUE(test, is_swiotlb_buffer(dev, tlb_addr)); > + tlb = phys_to_virt(tlb_addr); > + > + /* Bounce buffer is initialized to original buffer. */ > + KUNIT_EXPECT_EQ(test, *tlb, PASS); > + > + /* Original buffer is updated on unmap. */ > + *tlb = PASS + 1; > + swiotlb_tbl_unmap_single(dev, tlb_addr, sizeof(unsigned long), > + DMA_BIDIRECTIONAL, 0); > + KUNIT_EXPECT_EQ(test, test_data.value, PASS + 1); > +} > + > +/************************************************************** > + * Skip sync on unmap. > + * > + * Test that sync does not happen with DMA_ATTR_SKIP_CPU_SYNC. > + * On swiotlb_map(), this flag skips only sync for non-coherent > + * DMA; the bounce buffer itself is always synced to the > + * original buffer. > + */ > + > +static void swiotlb_test_skip_sync(struct kunit *test) > +{ > + struct device *dev = test_device(test); > + phys_addr_t phys_addr; > + dma_addr_t tlb_addr; > + unsigned long *tlb; > + > + test_data.value = PASS; > + phys_addr = virt_to_phys(&test_data.value); > + tlb_addr = swiotlb_map(dev, phys_addr, sizeof(unsigned long), > + DMA_TO_DEVICE, DMA_ATTR_SKIP_CPU_SYNC); > + KUNIT_ASSERT_NE(test, tlb_addr, DMA_MAPPING_ERROR); > + KUNIT_EXPECT_TRUE(test, is_swiotlb_buffer(dev, tlb_addr)); > + tlb = phys_to_virt(tlb_addr); > + > + /* Bounce buffer is initialized to original buffer anyway. */ > + KUNIT_EXPECT_EQ(test, *tlb, PASS); > + > + /* Original buffer is not updated on unmap. */ > + *tlb = FAIL; > + swiotlb_tbl_unmap_single(dev, tlb_addr, sizeof(unsigned long), > + DMA_FROM_DEVICE, DMA_ATTR_SKIP_CPU_SYNC); > + KUNIT_EXPECT_EQ(test, test_data.value, PASS); > +} > + > +/************************************************************** > + * Historical page alignment. > + * > + * Test that mappings of at least PAGE_SIZE get a page-aligned > + * DMA address. > + */ > + > +static void swiotlb_test_page_align(struct kunit *test) > +{ > + struct device *dev = test_device(test); > + > + /* Bounce buffer is page-aligned. */ > + check_aligned(test, dev, &test_data, sizeof(test_data), 1, > + PAGE_SHIFT, 0); > + > + /* Even if the original buffer is not page-aligned. */ > + check_aligned(test, dev, &test_data.value, PAGE_SIZE, 1, > + PAGE_SHIFT, 0); > +} > + > +/************************************************************** > + * Device physical address alignment. > + * > + * Test that physical address low bits are preserved. > + */ > + > +static void check_min_align(struct kunit *test, int bits) > +{ > + u64 min_align_mask = DMA_BIT_MASK(bits); > + struct device *dev = test_device(test); > + unsigned long vaddr; > + void *ptr; > + > + KUNIT_ASSERT_EQ(test, dma_set_min_align_mask(dev, min_align_mask), 0); > + > + vaddr = devm_get_free_pages(dev, GFP_KERNEL, > + bits > PAGE_SHIFT ? bits - PAGE_SHIFT : 0); > + KUNIT_ASSERT_NE(test, vaddr, 0); > + > + /* Check low bits */ > + ptr = (void *)vaddr + MAP_OFF; > + check_aligned(test, dev, ptr, sizeof(long), 1, bits, bits); > + > + /* Check high bits */ > + ptr = (void *)vaddr + (1UL << bits) - MAP_OFF - sizeof(long); > + check_aligned(test, dev, ptr, sizeof(long), 1, bits, bits); > + > + kunit_device_unregister(test, dev); > +} > + > +static void swiotlb_test_min_align(struct kunit *test) > +{ > + check_min_align(test, 12); > + check_min_align(test, PAGE_SHIFT); > + check_min_align(test, 16); > +} > + > +/************************************************************** > + * Explicit allocation alignment. > + * > + * Test that the bounce buffer is aligned to an explicit value > + * regardless of allocation size. > + */ > + > +static void check_alloc_align(struct kunit *test, int bits) > +{ > + struct device *dev = test_device(test); > + void *base, *ptr; > + size_t size; > + > + size = 1UL << bits; > + base = devm_kmalloc(dev, size, GFP_KERNEL); > + KUNIT_ASSERT_NOT_ERR_OR_NULL(test, base); > + > + /* Check low bits */ > + ptr = base + MAP_OFF; > + check_aligned(test, dev, ptr, sizeof(long), size, bits, 0); > + > + /* Check high bits */ > + ptr = base + size - MAP_OFF - sizeof(long); > + check_aligned(test, dev, ptr, sizeof(long), size, bits, 0); > + > + kunit_device_unregister(test, dev); > +} > + > +static void swiotlb_test_alloc_align(struct kunit *test) > +{ > + check_alloc_align(test, 12); > + check_alloc_align(test, 14); > +} > + > +/************************************************************** > + * Both allocation and device physical address alignment. > + * > + * Test that the bounce buffer is aligned to an explicit value > + * regardless of allocation size and it also preserves physical > + * address low bits. > + */ > + > +static void check_both_align(struct kunit *test, int min_align_bits, > + int alloc_align_bits) > +{ > + u64 min_align_mask = DMA_BIT_MASK(min_align_bits); > + struct device *dev = test_device(test); > + void *base, *ptr; > + size_t size; > + > + KUNIT_ASSERT_EQ(test, dma_set_min_align_mask(dev, min_align_mask), 0); > + > + size = 1UL << max(min_align_bits, alloc_align_bits); > + base = devm_kmalloc(dev, size, GFP_KERNEL); > + KUNIT_ASSERT_NOT_ERR_OR_NULL(test, base); > + > + /* Check low bits */ > + ptr = base + MAP_OFF; > + check_aligned(test, dev, ptr, sizeof(long), size, > + min_align_bits, min_align_bits); > + > + /* Check high bits */ > + ptr = base + size - MAP_OFF - sizeof(long); > + check_aligned(test, dev, ptr, sizeof(long), size, > + min_align_bits, min_align_bits); > + > + kunit_device_unregister(test, dev); > +} > + > +static void swiotlb_test_both_align(struct kunit *test) > +{ > + check_both_align(test, 12, 12); > + check_both_align(test, 12, 16); > + check_both_align(test, 14, 16); > +} > + > +/************************************************************** > + * Test suite metadata. > + */ > + > +static struct kunit_case swiotlb_test_cases[] = { > + KUNIT_CASE(swiotlb_test_map), > + KUNIT_CASE(swiotlb_test_bidirectional), > + KUNIT_CASE(swiotlb_test_skip_sync), > + KUNIT_CASE(swiotlb_test_page_align), > + KUNIT_CASE(swiotlb_test_min_align), > + KUNIT_CASE(swiotlb_test_alloc_align), > + KUNIT_CASE(swiotlb_test_both_align), > + {} > +}; > + > +static struct kunit_suite swiotlb_test_suite = { > + .name = "swiotlb", > + .suite_init = swiotlb_suite_init, > + .init = swiotlb_test_init, > + .test_cases = swiotlb_test_cases, > +}; > + > +kunit_test_suites(&swiotlb_test_suite);