lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 11 Jun 2021 23:26:47 +0800 From: Claire Chang <tientzu@...omium.org> To: Rob Herring <robh+dt@...nel.org>, mpe@...erman.id.au, Joerg Roedel <joro@...tes.org>, Will Deacon <will@...nel.org>, Frank Rowand <frowand.list@...il.com>, Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>, boris.ostrovsky@...cle.com, jgross@...e.com, Christoph Hellwig <hch@....de>, Marek Szyprowski <m.szyprowski@...sung.com> Cc: benh@...nel.crashing.org, paulus@...ba.org, "list@....net:IOMMU DRIVERS" <iommu@...ts.linux-foundation.org>, sstabellini@...nel.org, Robin Murphy <robin.murphy@....com>, grant.likely@....com, xypron.glpk@....de, Thierry Reding <treding@...dia.com>, mingo@...nel.org, bauerman@...ux.ibm.com, peterz@...radead.org, Greg KH <gregkh@...uxfoundation.org>, Saravana Kannan <saravanak@...gle.com>, "Rafael J . Wysocki" <rafael.j.wysocki@...el.com>, heikki.krogerus@...ux.intel.com, Andy Shevchenko <andriy.shevchenko@...ux.intel.com>, Randy Dunlap <rdunlap@...radead.org>, Dan Williams <dan.j.williams@...el.com>, Bartosz Golaszewski <bgolaszewski@...libre.com>, linux-devicetree <devicetree@...r.kernel.org>, lkml <linux-kernel@...r.kernel.org>, linuxppc-dev@...ts.ozlabs.org, xen-devel@...ts.xenproject.org, Nicolas Boichat <drinkcat@...omium.org>, Jim Quinlan <james.quinlan@...adcom.com>, tfiga@...omium.org, bskeggs@...hat.com, bhelgaas@...gle.com, chris@...is-wilson.co.uk, tientzu@...omium.org, daniel@...ll.ch, airlied@...ux.ie, dri-devel@...ts.freedesktop.org, intel-gfx@...ts.freedesktop.org, jani.nikula@...ux.intel.com, jxgao@...gle.com, joonas.lahtinen@...ux.intel.com, linux-pci@...r.kernel.org, maarten.lankhorst@...ux.intel.com, matthew.auld@...el.com, rodrigo.vivi@...el.com, thomas.hellstrom@...ux.intel.com Subject: [PATCH v9 02/14] swiotlb: Refactor swiotlb_create_debugfs Split the debugfs creation to make the code reusable for supporting different bounce buffer pools, e.g. restricted DMA pool. Signed-off-by: Claire Chang <tientzu@...omium.org> --- kernel/dma/swiotlb.c | 23 ++++++++++++++++------- 1 file changed, 16 insertions(+), 7 deletions(-) diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c index 1a1208c81e85..8a3e2b3b246d 100644 --- a/kernel/dma/swiotlb.c +++ b/kernel/dma/swiotlb.c @@ -64,6 +64,9 @@ enum swiotlb_force swiotlb_force; struct io_tlb_mem *io_tlb_default_mem; +#ifdef CONFIG_DEBUG_FS +static struct dentry *debugfs_dir; +#endif /* * Max segment that we can provide which (if pages are contingous) will @@ -664,18 +667,24 @@ EXPORT_SYMBOL_GPL(is_swiotlb_active); #ifdef CONFIG_DEBUG_FS -static int __init swiotlb_create_debugfs(void) +static void swiotlb_create_debugfs_files(struct io_tlb_mem *mem) { - struct io_tlb_mem *mem = io_tlb_default_mem; - - if (!mem) - return 0; - mem->debugfs = debugfs_create_dir("swiotlb", NULL); debugfs_create_ulong("io_tlb_nslabs", 0400, mem->debugfs, &mem->nslabs); debugfs_create_ulong("io_tlb_used", 0400, mem->debugfs, &mem->used); +} + +static int __init swiotlb_create_default_debugfs(void) +{ + struct io_tlb_mem *mem = io_tlb_default_mem; + + debugfs_dir = debugfs_create_dir("swiotlb", NULL); + if (mem) { + mem->debugfs = debugfs_dir; + swiotlb_create_debugfs_files(mem); + } return 0; } -late_initcall(swiotlb_create_debugfs); +late_initcall(swiotlb_create_default_debugfs); #endif -- 2.32.0.272.g935e593368-goog
Powered by blists - more mailing lists