From mboxrd@z Thu Jan 1 00:00:00 1970 From: =?UTF-8?q?Niklas=20S=C3=B6derlund?= Subject: [PATCH v5 7/9] dmaengine: rcar-dmac: add iommu support for slave transfers Date: Tue, 8 Mar 2016 03:42:52 +0100 Message-ID: <1457404974-1800-8-git-send-email-niklas.soderlund+renesas@ragnatech.se> References: <1457404974-1800-1-git-send-email-niklas.soderlund+renesas@ragnatech.se> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Return-path: In-Reply-To: <1457404974-1800-1-git-send-email-niklas.soderlund+renesas-1zkq55x86MTxsAP9Fp7wbw@public.gmane.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: iommu-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org Errors-To: iommu-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org To: vinod.koul-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org, linux-renesas-soc-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org, linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, dmaengine-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org Cc: linux-arch-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, =?UTF-8?q?Niklas=20S=C3=B6derlund?= , geert+renesas-gXvu3+zWzMSzQB+pC5nmwQ@public.gmane.org, arnd-r2nGTMty4D4@public.gmane.org, linus.walleij-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org, laurent.pinchart-ryLnwIuWjnjg/C1BVhZhaw@public.gmane.org, dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org List-Id: linux-arch.vger.kernel.org RW5hYmxlIHNsYXZlIHRyYW5zZmVycyB0byBhIGRldmljZSBiZWhpbmQgYSBJUE1NVSBieSBtYXBw aW5nIHRoZSBzbGF2ZQphZGRyZXNzZXMgdXNpbmcgdGhlIGRtYS1tYXBwaW5nIEFQSS4KClNpZ25l ZC1vZmYtYnk6IE5pa2xhcyBTw7ZkZXJsdW5kIDxuaWtsYXMuc29kZXJsdW5kK3JlbmVzYXNAcmFn bmF0ZWNoLnNlPgotLS0KIGRyaXZlcnMvZG1hL3NoL3JjYXItZG1hYy5jIHwgODIgKysrKysrKysr KysrKysrKysrKysrKysrKysrKysrKysrKysrKysrKystLS0tLQogMSBmaWxlIGNoYW5nZWQsIDc0 IGluc2VydGlvbnMoKyksIDggZGVsZXRpb25zKC0pCgpkaWZmIC0tZ2l0IGEvZHJpdmVycy9kbWEv c2gvcmNhci1kbWFjLmMgYi9kcml2ZXJzL2RtYS9zaC9yY2FyLWRtYWMuYwppbmRleCBiMzkxMWZl Li41NjgxNmUzIDEwMDY0NAotLS0gYS9kcml2ZXJzL2RtYS9zaC9yY2FyLWRtYWMuYworKysgYi9k cml2ZXJzL2RtYS9zaC9yY2FyLWRtYWMuYwpAQCAtMTI4LDYgKzEyOCwxOCBAQCBzdHJ1Y3QgcmNh cl9kbWFjX2NoYW5fc2xhdmUgewogfTsKIAogLyoKKyAqIHN0cnVjdCByY2FyX2RtYWNfY2hhbl9t YXAgLSBNYXAgb2Ygc2xhdmUgZGV2aWNlIHBoeXMgdG8gZG1hIGFkZHJlc3MKKyAqIEBhZGRyOiBz bGF2ZSBkbWEgYWRkcmVzcworICogQGRpcjogZGlyZWN0aW9uIG9mIG1hcHBpbmcKKyAqIEBzbGF2 ZTogc2xhdmUgY29uZmlndXJhdGlvbiB0aGF0IGlzIG1hcHBlZAorICovCitzdHJ1Y3QgcmNhcl9k bWFjX2NoYW5fbWFwIHsKKwlkbWFfYWRkcl90IGFkZHI7CisJZW51bSBkbWFfZGF0YV9kaXJlY3Rp b24gZGlyOworCXN0cnVjdCByY2FyX2RtYWNfY2hhbl9zbGF2ZSBzbGF2ZTsKK307CisKKy8qCiAg KiBzdHJ1Y3QgcmNhcl9kbWFjX2NoYW4gLSBSLUNhciBHZW4yIERNQSBDb250cm9sbGVyIENoYW5u ZWwKICAqIEBjaGFuOiBiYXNlIERNQSBjaGFubmVsIG9iamVjdAogICogQGlvbWVtOiBjaGFubmVs IEkvTyBtZW1vcnkgYmFzZQpAQCAtMTUyLDYgKzE2NCw3IEBAIHN0cnVjdCByY2FyX2RtYWNfY2hh biB7CiAKIAlzdHJ1Y3QgcmNhcl9kbWFjX2NoYW5fc2xhdmUgc3JjOwogCXN0cnVjdCByY2FyX2Rt YWNfY2hhbl9zbGF2ZSBkc3Q7CisJc3RydWN0IHJjYXJfZG1hY19jaGFuX21hcCBtYXA7CiAJaW50 IG1pZF9yaWQ7CiAKIAlzcGlubG9ja190IGxvY2s7CkBAIC0xMDI3LDEzICsxMDQwLDY1IEBAIHJj YXJfZG1hY19wcmVwX2RtYV9tZW1jcHkoc3RydWN0IGRtYV9jaGFuICpjaGFuLCBkbWFfYWRkcl90 IGRtYV9kZXN0LAogCQkJCSAgICAgIERNQV9NRU1fVE9fTUVNLCBmbGFncywgZmFsc2UpOwogfQog CitzdGF0aWMgaW50IHJjYXJfZG1hY19tYXBfc2xhdmVfYWRkcihzdHJ1Y3QgZG1hX2NoYW4gKmNo YW4sCisJCQkJICAgIGVudW0gZG1hX3RyYW5zZmVyX2RpcmVjdGlvbiBkaXIpCit7CisJc3RydWN0 IHJjYXJfZG1hY19jaGFuICpyY2hhbiA9IHRvX3JjYXJfZG1hY19jaGFuKGNoYW4pOworCXN0cnVj dCByY2FyX2RtYWNfY2hhbl9tYXAgKm1hcCA9ICZyY2hhbi0+bWFwOworCXBoeXNfYWRkcl90IGRl dl9hZGRyOworCXNpemVfdCBkZXZfc2l6ZTsKKwllbnVtIGRtYV9kYXRhX2RpcmVjdGlvbiBkZXZf ZGlyOworCisJaWYgKGRpciA9PSBETUFfREVWX1RPX01FTSkgeworCQlkZXZfYWRkciA9IHJjaGFu LT5zcmMuc2xhdmVfYWRkcjsKKwkJZGV2X3NpemUgPSByY2hhbi0+c3JjLnhmZXJfc2l6ZTsKKwkJ ZGV2X2RpciA9IERNQV9UT19ERVZJQ0U7CisJfSBlbHNlIHsKKwkJZGV2X2FkZHIgPSByY2hhbi0+ ZHN0LnNsYXZlX2FkZHI7CisJCWRldl9zaXplID0gcmNoYW4tPmRzdC54ZmVyX3NpemU7CisJCWRl dl9kaXIgPSBETUFfRlJPTV9ERVZJQ0U7CisJfQorCisJLyogUmV1c2UgY3VycmVudCBtYXAgaWYg cG9zc2libGUuICovCisJaWYgKGRldl9hZGRyID09IG1hcC0+c2xhdmUuc2xhdmVfYWRkciAmJgor CSAgICBkZXZfc2l6ZSA9PSBtYXAtPnNsYXZlLnhmZXJfc2l6ZSAmJgorCSAgICBkZXZfZGlyID09 IG1hcC0+ZGlyKQorCQlyZXR1cm4gMDsKKworCS8qIFJlbW92ZSBvbGQgbWFwcGluZyBpZiBwcmVz ZW50LiAqLworCWlmIChtYXAtPnNsYXZlLnhmZXJfc2l6ZSkKKwkJZG1hX3VubWFwX3Jlc291cmNl KGNoYW4tPmRldmljZS0+ZGV2LCBtYXAtPmFkZHIsCisJCQkJICAgbWFwLT5zbGF2ZS54ZmVyX3Np emUsIG1hcC0+ZGlyLCBOVUxMKTsKKwltYXAtPnNsYXZlLnhmZXJfc2l6ZSA9IDA7CisKKwkvKiBD cmVhdGUgbmV3IHNsYXZlIGFkZHJlc3MgbWFwLiAqLworCW1hcC0+YWRkciA9IGRtYV9tYXBfcmVz b3VyY2UoY2hhbi0+ZGV2aWNlLT5kZXYsIGRldl9hZGRyLCBkZXZfc2l6ZSwKKwkJCQkgICAgIGRl dl9kaXIsIE5VTEwpOworCisJaWYgKGRtYV9tYXBwaW5nX2Vycm9yKGNoYW4tPmRldmljZS0+ZGV2 LCBtYXAtPmFkZHIpKSB7CisJCWRldl9lcnIoY2hhbi0+ZGV2aWNlLT5kZXYsCisJCQkiY2hhbiV1 OiBmYWlsZWQgdG8gbWFwICV6eEAlcGFwIiwgcmNoYW4tPmluZGV4LAorCQkJZGV2X3NpemUsICZk ZXZfYWRkcik7CisJCXJldHVybiAtRUlPOworCX0KKworCWRldl9kYmcoY2hhbi0+ZGV2aWNlLT5k ZXYsICJjaGFuJXU6IG1hcCAlenhAJXBhcCB0byAlcGFkIGRpcjogJXNcbiIsCisJCXJjaGFuLT5p bmRleCwgZGV2X3NpemUsICZkZXZfYWRkciwgJm1hcC0+YWRkciwKKwkJZGV2X2RpciA9PSBETUFf VE9fREVWSUNFID8gIkRNQV9UT19ERVZJQ0UiIDogIkRNQV9GUk9NX0RFVklDRSIpOworCisJbWFw LT5zbGF2ZS5zbGF2ZV9hZGRyID0gZGV2X2FkZHI7CisJbWFwLT5zbGF2ZS54ZmVyX3NpemUgPSBk ZXZfc2l6ZTsKKwltYXAtPmRpciA9IGRldl9kaXI7CisKKwlyZXR1cm4gMDsKK30KKwogc3RhdGlj IHN0cnVjdCBkbWFfYXN5bmNfdHhfZGVzY3JpcHRvciAqCiByY2FyX2RtYWNfcHJlcF9zbGF2ZV9z ZyhzdHJ1Y3QgZG1hX2NoYW4gKmNoYW4sIHN0cnVjdCBzY2F0dGVybGlzdCAqc2dsLAogCQkJdW5z aWduZWQgaW50IHNnX2xlbiwgZW51bSBkbWFfdHJhbnNmZXJfZGlyZWN0aW9uIGRpciwKIAkJCXVu c2lnbmVkIGxvbmcgZmxhZ3MsIHZvaWQgKmNvbnRleHQpCiB7CiAJc3RydWN0IHJjYXJfZG1hY19j aGFuICpyY2hhbiA9IHRvX3JjYXJfZG1hY19jaGFuKGNoYW4pOwotCWRtYV9hZGRyX3QgZGV2X2Fk ZHI7CiAKIAkvKiBTb21lb25lIGNhbGxpbmcgc2xhdmUgRE1BIG9uIGEgZ2VuZXJpYyBjaGFubmVs PyAqLwogCWlmIChyY2hhbi0+bWlkX3JpZCA8IDAgfHwgIXNnX2xlbikgewpAQCAtMTA0Myw5ICsx MTA4LDEwIEBAIHJjYXJfZG1hY19wcmVwX3NsYXZlX3NnKHN0cnVjdCBkbWFfY2hhbiAqY2hhbiwg c3RydWN0IHNjYXR0ZXJsaXN0ICpzZ2wsCiAJCXJldHVybiBOVUxMOwogCX0KIAotCWRldl9hZGRy ID0gZGlyID09IERNQV9ERVZfVE9fTUVNCi0JCSA/IHJjaGFuLT5zcmMuc2xhdmVfYWRkciA6IHJj aGFuLT5kc3Quc2xhdmVfYWRkcjsKLQlyZXR1cm4gcmNhcl9kbWFjX2NoYW5fcHJlcF9zZyhyY2hh biwgc2dsLCBzZ19sZW4sIGRldl9hZGRyLAorCWlmIChyY2FyX2RtYWNfbWFwX3NsYXZlX2FkZHIo Y2hhbiwgZGlyKSkKKwkJcmV0dXJuIE5VTEw7CisKKwlyZXR1cm4gcmNhcl9kbWFjX2NoYW5fcHJl cF9zZyhyY2hhbiwgc2dsLCBzZ19sZW4sIHJjaGFuLT5tYXAuYWRkciwKIAkJCQkgICAgICBkaXIs IGZsYWdzLCBmYWxzZSk7CiB9CiAKQEAgLTEwNTksNyArMTEyNSw2IEBAIHJjYXJfZG1hY19wcmVw X2RtYV9jeWNsaWMoc3RydWN0IGRtYV9jaGFuICpjaGFuLCBkbWFfYWRkcl90IGJ1Zl9hZGRyLAog CXN0cnVjdCByY2FyX2RtYWNfY2hhbiAqcmNoYW4gPSB0b19yY2FyX2RtYWNfY2hhbihjaGFuKTsK IAlzdHJ1Y3QgZG1hX2FzeW5jX3R4X2Rlc2NyaXB0b3IgKmRlc2M7CiAJc3RydWN0IHNjYXR0ZXJs aXN0ICpzZ2w7Ci0JZG1hX2FkZHJfdCBkZXZfYWRkcjsKIAl1bnNpZ25lZCBpbnQgc2dfbGVuOwog CXVuc2lnbmVkIGludCBpOwogCkBAIC0xMDcxLDYgKzExMzYsOSBAQCByY2FyX2RtYWNfcHJlcF9k bWFfY3ljbGljKHN0cnVjdCBkbWFfY2hhbiAqY2hhbiwgZG1hX2FkZHJfdCBidWZfYWRkciwKIAkJ cmV0dXJuIE5VTEw7CiAJfQogCisJaWYgKHJjYXJfZG1hY19tYXBfc2xhdmVfYWRkcihjaGFuLCBk aXIpKQorCQlyZXR1cm4gTlVMTDsKKwogCXNnX2xlbiA9IGJ1Zl9sZW4gLyBwZXJpb2RfbGVuOwog CWlmIChzZ19sZW4gPiBSQ0FSX0RNQUNfTUFYX1NHX0xFTikgewogCQlkZXZfZXJyKGNoYW4tPmRl dmljZS0+ZGV2LApAQCAtMTA5OCw5ICsxMTY2LDcgQEAgcmNhcl9kbWFjX3ByZXBfZG1hX2N5Y2xp YyhzdHJ1Y3QgZG1hX2NoYW4gKmNoYW4sIGRtYV9hZGRyX3QgYnVmX2FkZHIsCiAJCXNnX2RtYV9s ZW4oJnNnbFtpXSkgPSBwZXJpb2RfbGVuOwogCX0KIAotCWRldl9hZGRyID0gZGlyID09IERNQV9E RVZfVE9fTUVNCi0JCSA/IHJjaGFuLT5zcmMuc2xhdmVfYWRkciA6IHJjaGFuLT5kc3Quc2xhdmVf YWRkcjsKLQlkZXNjID0gcmNhcl9kbWFjX2NoYW5fcHJlcF9zZyhyY2hhbiwgc2dsLCBzZ19sZW4s IGRldl9hZGRyLAorCWRlc2MgPSByY2FyX2RtYWNfY2hhbl9wcmVwX3NnKHJjaGFuLCBzZ2wsIHNn X2xlbiwgcmNoYW4tPm1hcC5hZGRyLAogCQkJCSAgICAgIGRpciwgZmxhZ3MsIHRydWUpOwogCiAJ a2ZyZWUoc2dsKTsKLS0gCjIuNy4yCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fXwppb21tdSBtYWlsaW5nIGxpc3QKaW9tbXVAbGlzdHMubGludXgtZm91bmRh dGlvbi5vcmcKaHR0cHM6Ly9saXN0cy5saW51eGZvdW5kYXRpb24ub3JnL21haWxtYW4vbGlzdGlu Zm8vaW9tbXU= From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smtp-4.sys.kth.se ([130.237.48.193]:38776 "EHLO smtp-4.sys.kth.se" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932352AbcCHCoV (ORCPT ); Mon, 7 Mar 2016 21:44:21 -0500 From: =?UTF-8?q?Niklas=20S=C3=B6derlund?= Subject: [PATCH v5 7/9] dmaengine: rcar-dmac: add iommu support for slave transfers Date: Tue, 8 Mar 2016 03:42:52 +0100 Message-ID: <1457404974-1800-8-git-send-email-niklas.soderlund+renesas@ragnatech.se> In-Reply-To: <1457404974-1800-1-git-send-email-niklas.soderlund+renesas@ragnatech.se> References: <1457404974-1800-1-git-send-email-niklas.soderlund+renesas@ragnatech.se> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-arch-owner@vger.kernel.org List-ID: To: vinod.koul@intel.com, linux-renesas-soc@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, dmaengine@vger.kernel.org, iommu@lists.linux-foundation.org Cc: robin.murphy@arm.com, laurent.pinchart@ideasonboard.com, geert+renesas@glider.be, linus.walleij@linaro.org, dan.j.williams@intel.com, arnd@arndb.de, linux-arch@vger.kernel.org, =?UTF-8?q?Niklas=20S=C3=B6derlund?= Message-ID: <20160308024252.RavpY6IckfnAfT4BQwexz9T_JUr9kv_F7a07V6sbErs@z> Enable slave transfers to a device behind a IPMMU by mapping the slave addresses using the dma-mapping API. Signed-off-by: Niklas Söderlund --- drivers/dma/sh/rcar-dmac.c | 82 +++++++++++++++++++++++++++++++++++++++++----- 1 file changed, 74 insertions(+), 8 deletions(-) diff --git a/drivers/dma/sh/rcar-dmac.c b/drivers/dma/sh/rcar-dmac.c index b3911fe..56816e3 100644 --- a/drivers/dma/sh/rcar-dmac.c +++ b/drivers/dma/sh/rcar-dmac.c @@ -128,6 +128,18 @@ struct rcar_dmac_chan_slave { }; /* + * struct rcar_dmac_chan_map - Map of slave device phys to dma address + * @addr: slave dma address + * @dir: direction of mapping + * @slave: slave configuration that is mapped + */ +struct rcar_dmac_chan_map { + dma_addr_t addr; + enum dma_data_direction dir; + struct rcar_dmac_chan_slave slave; +}; + +/* * struct rcar_dmac_chan - R-Car Gen2 DMA Controller Channel * @chan: base DMA channel object * @iomem: channel I/O memory base @@ -152,6 +164,7 @@ struct rcar_dmac_chan { struct rcar_dmac_chan_slave src; struct rcar_dmac_chan_slave dst; + struct rcar_dmac_chan_map map; int mid_rid; spinlock_t lock; @@ -1027,13 +1040,65 @@ rcar_dmac_prep_dma_memcpy(struct dma_chan *chan, dma_addr_t dma_dest, DMA_MEM_TO_MEM, flags, false); } +static int rcar_dmac_map_slave_addr(struct dma_chan *chan, + enum dma_transfer_direction dir) +{ + struct rcar_dmac_chan *rchan = to_rcar_dmac_chan(chan); + struct rcar_dmac_chan_map *map = &rchan->map; + phys_addr_t dev_addr; + size_t dev_size; + enum dma_data_direction dev_dir; + + if (dir == DMA_DEV_TO_MEM) { + dev_addr = rchan->src.slave_addr; + dev_size = rchan->src.xfer_size; + dev_dir = DMA_TO_DEVICE; + } else { + dev_addr = rchan->dst.slave_addr; + dev_size = rchan->dst.xfer_size; + dev_dir = DMA_FROM_DEVICE; + } + + /* Reuse current map if possible. */ + if (dev_addr == map->slave.slave_addr && + dev_size == map->slave.xfer_size && + dev_dir == map->dir) + return 0; + + /* Remove old mapping if present. */ + if (map->slave.xfer_size) + dma_unmap_resource(chan->device->dev, map->addr, + map->slave.xfer_size, map->dir, NULL); + map->slave.xfer_size = 0; + + /* Create new slave address map. */ + map->addr = dma_map_resource(chan->device->dev, dev_addr, dev_size, + dev_dir, NULL); + + if (dma_mapping_error(chan->device->dev, map->addr)) { + dev_err(chan->device->dev, + "chan%u: failed to map %zx@%pap", rchan->index, + dev_size, &dev_addr); + return -EIO; + } + + dev_dbg(chan->device->dev, "chan%u: map %zx@%pap to %pad dir: %s\n", + rchan->index, dev_size, &dev_addr, &map->addr, + dev_dir == DMA_TO_DEVICE ? "DMA_TO_DEVICE" : "DMA_FROM_DEVICE"); + + map->slave.slave_addr = dev_addr; + map->slave.xfer_size = dev_size; + map->dir = dev_dir; + + return 0; +} + static struct dma_async_tx_descriptor * rcar_dmac_prep_slave_sg(struct dma_chan *chan, struct scatterlist *sgl, unsigned int sg_len, enum dma_transfer_direction dir, unsigned long flags, void *context) { struct rcar_dmac_chan *rchan = to_rcar_dmac_chan(chan); - dma_addr_t dev_addr; /* Someone calling slave DMA on a generic channel? */ if (rchan->mid_rid < 0 || !sg_len) { @@ -1043,9 +1108,10 @@ rcar_dmac_prep_slave_sg(struct dma_chan *chan, struct scatterlist *sgl, return NULL; } - dev_addr = dir == DMA_DEV_TO_MEM - ? rchan->src.slave_addr : rchan->dst.slave_addr; - return rcar_dmac_chan_prep_sg(rchan, sgl, sg_len, dev_addr, + if (rcar_dmac_map_slave_addr(chan, dir)) + return NULL; + + return rcar_dmac_chan_prep_sg(rchan, sgl, sg_len, rchan->map.addr, dir, flags, false); } @@ -1059,7 +1125,6 @@ rcar_dmac_prep_dma_cyclic(struct dma_chan *chan, dma_addr_t buf_addr, struct rcar_dmac_chan *rchan = to_rcar_dmac_chan(chan); struct dma_async_tx_descriptor *desc; struct scatterlist *sgl; - dma_addr_t dev_addr; unsigned int sg_len; unsigned int i; @@ -1071,6 +1136,9 @@ rcar_dmac_prep_dma_cyclic(struct dma_chan *chan, dma_addr_t buf_addr, return NULL; } + if (rcar_dmac_map_slave_addr(chan, dir)) + return NULL; + sg_len = buf_len / period_len; if (sg_len > RCAR_DMAC_MAX_SG_LEN) { dev_err(chan->device->dev, @@ -1098,9 +1166,7 @@ rcar_dmac_prep_dma_cyclic(struct dma_chan *chan, dma_addr_t buf_addr, sg_dma_len(&sgl[i]) = period_len; } - dev_addr = dir == DMA_DEV_TO_MEM - ? rchan->src.slave_addr : rchan->dst.slave_addr; - desc = rcar_dmac_chan_prep_sg(rchan, sgl, sg_len, dev_addr, + desc = rcar_dmac_chan_prep_sg(rchan, sgl, sg_len, rchan->map.addr, dir, flags, true); kfree(sgl); -- 2.7.2