2008-06-26 19:27:53 +00:00
|
|
|
/*
|
2010-10-13 09:13:21 +00:00
|
|
|
* Copyright (C) 2007-2010 Advanced Micro Devices, Inc.
|
2008-06-26 19:27:53 +00:00
|
|
|
* Author: Joerg Roedel <joerg.roedel@amd.com>
|
|
|
|
* Leo Duran <leo.duran@amd.com>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms of the GNU General Public License version 2 as published
|
|
|
|
* by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/pci.h>
|
2009-12-16 00:48:28 +00:00
|
|
|
#include <linux/bitmap.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 08:04:11 +00:00
|
|
|
#include <linux/slab.h>
|
2008-12-12 12:50:21 +00:00
|
|
|
#include <linux/debugfs.h>
|
2008-06-26 19:27:53 +00:00
|
|
|
#include <linux/scatterlist.h>
|
2009-01-05 14:47:25 +00:00
|
|
|
#include <linux/dma-mapping.h>
|
2008-06-26 19:27:53 +00:00
|
|
|
#include <linux/iommu-helper.h>
|
2008-12-02 17:13:27 +00:00
|
|
|
#include <linux/iommu.h>
|
2008-06-26 19:27:53 +00:00
|
|
|
#include <asm/proto.h>
|
2008-07-11 01:23:42 +00:00
|
|
|
#include <asm/iommu.h>
|
2008-11-27 17:39:15 +00:00
|
|
|
#include <asm/gart.h>
|
2009-11-20 12:22:21 +00:00
|
|
|
#include <asm/amd_iommu_proto.h>
|
2008-06-26 19:27:53 +00:00
|
|
|
#include <asm/amd_iommu_types.h>
|
2008-06-26 19:28:06 +00:00
|
|
|
#include <asm/amd_iommu.h>
|
2008-06-26 19:27:53 +00:00
|
|
|
|
|
|
|
#define CMD_SET_TYPE(cmd, t) ((cmd)->data[1] |= ((t) << 28))
|
|
|
|
|
2008-07-11 15:14:27 +00:00
|
|
|
#define EXIT_LOOP_COUNT 10000000
|
|
|
|
|
2008-06-26 19:27:53 +00:00
|
|
|
static DEFINE_RWLOCK(amd_iommu_devtable_lock);
|
|
|
|
|
2008-09-11 08:24:48 +00:00
|
|
|
/* A list of preallocated protection domains */
|
|
|
|
static LIST_HEAD(iommu_pd_list);
|
|
|
|
static DEFINE_SPINLOCK(iommu_pd_list_lock);
|
|
|
|
|
2009-08-26 13:26:30 +00:00
|
|
|
/*
|
|
|
|
* Domain for untranslated devices - only allocated
|
|
|
|
* if iommu=pt passed on kernel cmd line.
|
|
|
|
*/
|
|
|
|
static struct protection_domain *pt_domain;
|
|
|
|
|
2008-12-03 16:00:17 +00:00
|
|
|
static struct iommu_ops amd_iommu_ops;
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* general struct to manage commands send to an IOMMU
|
|
|
|
*/
|
2008-07-11 15:14:28 +00:00
|
|
|
struct iommu_cmd {
|
2008-06-26 19:27:53 +00:00
|
|
|
u32 data[4];
|
|
|
|
};
|
|
|
|
|
2009-09-03 13:01:43 +00:00
|
|
|
static void reset_iommu_command_buffer(struct amd_iommu *iommu);
|
2009-09-02 14:00:23 +00:00
|
|
|
static void update_domain(struct protection_domain *domain);
|
2009-05-21 07:56:58 +00:00
|
|
|
|
2009-11-24 14:39:42 +00:00
|
|
|
/****************************************************************************
|
|
|
|
*
|
|
|
|
* Helper functions
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static inline u16 get_device_id(struct device *dev)
|
|
|
|
{
|
|
|
|
struct pci_dev *pdev = to_pci_dev(dev);
|
|
|
|
|
|
|
|
return calc_devid(pdev->bus->number, pdev->devfn);
|
|
|
|
}
|
|
|
|
|
2009-11-23 14:26:46 +00:00
|
|
|
static struct iommu_dev_data *get_dev_data(struct device *dev)
|
|
|
|
{
|
|
|
|
return dev->archdata.iommu;
|
|
|
|
}
|
|
|
|
|
2009-11-24 15:43:06 +00:00
|
|
|
/*
|
|
|
|
* In this function the list of preallocated protection domains is traversed to
|
|
|
|
* find the domain for a specific device
|
|
|
|
*/
|
|
|
|
static struct dma_ops_domain *find_protection_domain(u16 devid)
|
|
|
|
{
|
|
|
|
struct dma_ops_domain *entry, *ret = NULL;
|
|
|
|
unsigned long flags;
|
|
|
|
u16 alias = amd_iommu_alias_table[devid];
|
|
|
|
|
|
|
|
if (list_empty(&iommu_pd_list))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&iommu_pd_list_lock, flags);
|
|
|
|
|
|
|
|
list_for_each_entry(entry, &iommu_pd_list, list) {
|
|
|
|
if (entry->target_dev == devid ||
|
|
|
|
entry->target_dev == alias) {
|
|
|
|
ret = entry;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_unlock_irqrestore(&iommu_pd_list_lock, flags);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-11-24 16:19:23 +00:00
|
|
|
/*
|
|
|
|
* This function checks if the driver got a valid device from the caller to
|
|
|
|
* avoid dereferencing invalid pointers.
|
|
|
|
*/
|
|
|
|
static bool check_device(struct device *dev)
|
|
|
|
{
|
|
|
|
u16 devid;
|
|
|
|
|
|
|
|
if (!dev || !dev->dma_mask)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* No device or no PCI device */
|
2010-02-06 08:42:39 +00:00
|
|
|
if (dev->bus != &pci_bus_type)
|
2009-11-24 16:19:23 +00:00
|
|
|
return false;
|
|
|
|
|
|
|
|
devid = get_device_id(dev);
|
|
|
|
|
|
|
|
/* Out of our scope? */
|
|
|
|
if (devid > amd_iommu_last_bdf)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (amd_iommu_rlookup_table[devid] == NULL)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2009-11-23 14:26:46 +00:00
|
|
|
static int iommu_init_device(struct device *dev)
|
|
|
|
{
|
|
|
|
struct iommu_dev_data *dev_data;
|
|
|
|
struct pci_dev *pdev;
|
|
|
|
u16 devid, alias;
|
|
|
|
|
|
|
|
if (dev->archdata.iommu)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
dev_data = kzalloc(sizeof(*dev_data), GFP_KERNEL);
|
|
|
|
if (!dev_data)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2009-11-26 14:35:33 +00:00
|
|
|
dev_data->dev = dev;
|
|
|
|
|
2009-11-23 14:26:46 +00:00
|
|
|
devid = get_device_id(dev);
|
|
|
|
alias = amd_iommu_alias_table[devid];
|
|
|
|
pdev = pci_get_bus_and_slot(PCI_BUS(alias), alias & 0xff);
|
|
|
|
if (pdev)
|
|
|
|
dev_data->alias = &pdev->dev;
|
|
|
|
|
2009-11-25 14:59:57 +00:00
|
|
|
atomic_set(&dev_data->bind, 0);
|
|
|
|
|
2009-11-23 14:26:46 +00:00
|
|
|
dev->archdata.iommu = dev_data;
|
|
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iommu_uninit_device(struct device *dev)
|
|
|
|
{
|
|
|
|
kfree(dev->archdata.iommu);
|
|
|
|
}
|
2009-12-10 10:03:39 +00:00
|
|
|
|
|
|
|
void __init amd_iommu_uninit_devices(void)
|
|
|
|
{
|
|
|
|
struct pci_dev *pdev = NULL;
|
|
|
|
|
|
|
|
for_each_pci_dev(pdev) {
|
|
|
|
|
|
|
|
if (!check_device(&pdev->dev))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
iommu_uninit_device(&pdev->dev);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int __init amd_iommu_init_devices(void)
|
|
|
|
{
|
|
|
|
struct pci_dev *pdev = NULL;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
for_each_pci_dev(pdev) {
|
|
|
|
|
|
|
|
if (!check_device(&pdev->dev))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
ret = iommu_init_device(&pdev->dev);
|
|
|
|
if (ret)
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
|
|
|
|
amd_iommu_uninit_devices();
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
2008-12-12 12:50:21 +00:00
|
|
|
#ifdef CONFIG_AMD_IOMMU_STATS
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Initialization code for statistics collection
|
|
|
|
*/
|
|
|
|
|
2008-12-12 13:59:58 +00:00
|
|
|
DECLARE_STATS_COUNTER(compl_wait);
|
2008-12-12 14:05:16 +00:00
|
|
|
DECLARE_STATS_COUNTER(cnt_map_single);
|
2008-12-12 14:07:12 +00:00
|
|
|
DECLARE_STATS_COUNTER(cnt_unmap_single);
|
2008-12-12 14:09:48 +00:00
|
|
|
DECLARE_STATS_COUNTER(cnt_map_sg);
|
2008-12-12 14:12:14 +00:00
|
|
|
DECLARE_STATS_COUNTER(cnt_unmap_sg);
|
2008-12-12 14:14:21 +00:00
|
|
|
DECLARE_STATS_COUNTER(cnt_alloc_coherent);
|
2008-12-12 14:16:38 +00:00
|
|
|
DECLARE_STATS_COUNTER(cnt_free_coherent);
|
2008-12-12 14:42:39 +00:00
|
|
|
DECLARE_STATS_COUNTER(cross_page);
|
2008-12-12 14:46:29 +00:00
|
|
|
DECLARE_STATS_COUNTER(domain_flush_single);
|
2008-12-12 14:48:28 +00:00
|
|
|
DECLARE_STATS_COUNTER(domain_flush_all);
|
2008-12-12 14:57:30 +00:00
|
|
|
DECLARE_STATS_COUNTER(alloced_io_mem);
|
2008-12-12 15:13:04 +00:00
|
|
|
DECLARE_STATS_COUNTER(total_map_requests);
|
2008-12-12 13:59:58 +00:00
|
|
|
|
2008-12-12 12:50:21 +00:00
|
|
|
static struct dentry *stats_dir;
|
|
|
|
static struct dentry *de_fflush;
|
|
|
|
|
|
|
|
static void amd_iommu_stats_add(struct __iommu_counter *cnt)
|
|
|
|
{
|
|
|
|
if (stats_dir == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cnt->dent = debugfs_create_u64(cnt->name, 0444, stats_dir,
|
|
|
|
&cnt->value);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amd_iommu_stats_init(void)
|
|
|
|
{
|
|
|
|
stats_dir = debugfs_create_dir("amd-iommu", NULL);
|
|
|
|
if (stats_dir == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
de_fflush = debugfs_create_bool("fullflush", 0444, stats_dir,
|
|
|
|
(u32 *)&amd_iommu_unmap_flush);
|
2008-12-12 13:59:58 +00:00
|
|
|
|
|
|
|
amd_iommu_stats_add(&compl_wait);
|
2008-12-12 14:05:16 +00:00
|
|
|
amd_iommu_stats_add(&cnt_map_single);
|
2008-12-12 14:07:12 +00:00
|
|
|
amd_iommu_stats_add(&cnt_unmap_single);
|
2008-12-12 14:09:48 +00:00
|
|
|
amd_iommu_stats_add(&cnt_map_sg);
|
2008-12-12 14:12:14 +00:00
|
|
|
amd_iommu_stats_add(&cnt_unmap_sg);
|
2008-12-12 14:14:21 +00:00
|
|
|
amd_iommu_stats_add(&cnt_alloc_coherent);
|
2008-12-12 14:16:38 +00:00
|
|
|
amd_iommu_stats_add(&cnt_free_coherent);
|
2008-12-12 14:42:39 +00:00
|
|
|
amd_iommu_stats_add(&cross_page);
|
2008-12-12 14:46:29 +00:00
|
|
|
amd_iommu_stats_add(&domain_flush_single);
|
2008-12-12 14:48:28 +00:00
|
|
|
amd_iommu_stats_add(&domain_flush_all);
|
2008-12-12 14:57:30 +00:00
|
|
|
amd_iommu_stats_add(&alloced_io_mem);
|
2008-12-12 15:13:04 +00:00
|
|
|
amd_iommu_stats_add(&total_map_requests);
|
2008-12-12 12:50:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2008-09-11 14:51:41 +00:00
|
|
|
/****************************************************************************
|
|
|
|
*
|
|
|
|
* Interrupt handling functions
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2009-09-03 12:02:10 +00:00
|
|
|
static void dump_dte_entry(u16 devid)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < 8; ++i)
|
|
|
|
pr_err("AMD-Vi: DTE[%d]: %08x\n", i,
|
|
|
|
amd_iommu_dev_table[devid].data[i]);
|
|
|
|
}
|
|
|
|
|
2009-09-03 12:25:02 +00:00
|
|
|
static void dump_command(unsigned long phys_addr)
|
|
|
|
{
|
|
|
|
struct iommu_cmd *cmd = phys_to_virt(phys_addr);
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < 4; ++i)
|
|
|
|
pr_err("AMD-Vi: CMD[%d]: %08x\n", i, cmd->data[i]);
|
|
|
|
}
|
|
|
|
|
2009-09-03 13:01:43 +00:00
|
|
|
static void iommu_print_event(struct amd_iommu *iommu, void *__evt)
|
2008-09-09 14:41:05 +00:00
|
|
|
{
|
|
|
|
u32 *event = __evt;
|
|
|
|
int type = (event[1] >> EVENT_TYPE_SHIFT) & EVENT_TYPE_MASK;
|
|
|
|
int devid = (event[0] >> EVENT_DEVID_SHIFT) & EVENT_DEVID_MASK;
|
|
|
|
int domid = (event[1] >> EVENT_DOMID_SHIFT) & EVENT_DOMID_MASK;
|
|
|
|
int flags = (event[1] >> EVENT_FLAGS_SHIFT) & EVENT_FLAGS_MASK;
|
|
|
|
u64 address = (u64)(((u64)event[3]) << 32) | event[2];
|
|
|
|
|
2009-09-01 14:43:58 +00:00
|
|
|
printk(KERN_ERR "AMD-Vi: Event logged [");
|
2008-09-09 14:41:05 +00:00
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case EVENT_TYPE_ILL_DEV:
|
|
|
|
printk("ILLEGAL_DEV_TABLE_ENTRY device=%02x:%02x.%x "
|
|
|
|
"address=0x%016llx flags=0x%04x]\n",
|
|
|
|
PCI_BUS(devid), PCI_SLOT(devid), PCI_FUNC(devid),
|
|
|
|
address, flags);
|
2009-09-03 12:02:10 +00:00
|
|
|
dump_dte_entry(devid);
|
2008-09-09 14:41:05 +00:00
|
|
|
break;
|
|
|
|
case EVENT_TYPE_IO_FAULT:
|
|
|
|
printk("IO_PAGE_FAULT device=%02x:%02x.%x "
|
|
|
|
"domain=0x%04x address=0x%016llx flags=0x%04x]\n",
|
|
|
|
PCI_BUS(devid), PCI_SLOT(devid), PCI_FUNC(devid),
|
|
|
|
domid, address, flags);
|
|
|
|
break;
|
|
|
|
case EVENT_TYPE_DEV_TAB_ERR:
|
|
|
|
printk("DEV_TAB_HARDWARE_ERROR device=%02x:%02x.%x "
|
|
|
|
"address=0x%016llx flags=0x%04x]\n",
|
|
|
|
PCI_BUS(devid), PCI_SLOT(devid), PCI_FUNC(devid),
|
|
|
|
address, flags);
|
|
|
|
break;
|
|
|
|
case EVENT_TYPE_PAGE_TAB_ERR:
|
|
|
|
printk("PAGE_TAB_HARDWARE_ERROR device=%02x:%02x.%x "
|
|
|
|
"domain=0x%04x address=0x%016llx flags=0x%04x]\n",
|
|
|
|
PCI_BUS(devid), PCI_SLOT(devid), PCI_FUNC(devid),
|
|
|
|
domid, address, flags);
|
|
|
|
break;
|
|
|
|
case EVENT_TYPE_ILL_CMD:
|
|
|
|
printk("ILLEGAL_COMMAND_ERROR address=0x%016llx]\n", address);
|
2009-11-26 14:45:41 +00:00
|
|
|
iommu->reset_in_progress = true;
|
2009-09-03 13:01:43 +00:00
|
|
|
reset_iommu_command_buffer(iommu);
|
2009-09-03 12:25:02 +00:00
|
|
|
dump_command(address);
|
2008-09-09 14:41:05 +00:00
|
|
|
break;
|
|
|
|
case EVENT_TYPE_CMD_HARD_ERR:
|
|
|
|
printk("COMMAND_HARDWARE_ERROR address=0x%016llx "
|
|
|
|
"flags=0x%04x]\n", address, flags);
|
|
|
|
break;
|
|
|
|
case EVENT_TYPE_IOTLB_INV_TO:
|
|
|
|
printk("IOTLB_INV_TIMEOUT device=%02x:%02x.%x "
|
|
|
|
"address=0x%016llx]\n",
|
|
|
|
PCI_BUS(devid), PCI_SLOT(devid), PCI_FUNC(devid),
|
|
|
|
address);
|
|
|
|
break;
|
|
|
|
case EVENT_TYPE_INV_DEV_REQ:
|
|
|
|
printk("INVALID_DEVICE_REQUEST device=%02x:%02x.%x "
|
|
|
|
"address=0x%016llx flags=0x%04x]\n",
|
|
|
|
PCI_BUS(devid), PCI_SLOT(devid), PCI_FUNC(devid),
|
|
|
|
address, flags);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
printk(KERN_ERR "UNKNOWN type=0x%02x]\n", type);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iommu_poll_events(struct amd_iommu *iommu)
|
|
|
|
{
|
|
|
|
u32 head, tail;
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&iommu->lock, flags);
|
|
|
|
|
|
|
|
head = readl(iommu->mmio_base + MMIO_EVT_HEAD_OFFSET);
|
|
|
|
tail = readl(iommu->mmio_base + MMIO_EVT_TAIL_OFFSET);
|
|
|
|
|
|
|
|
while (head != tail) {
|
2009-09-03 13:01:43 +00:00
|
|
|
iommu_print_event(iommu, iommu->evt_buf + head);
|
2008-09-09 14:41:05 +00:00
|
|
|
head = (head + EVENT_ENTRY_SIZE) % iommu->evt_buf_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
writel(head, iommu->mmio_base + MMIO_EVT_HEAD_OFFSET);
|
|
|
|
|
|
|
|
spin_unlock_irqrestore(&iommu->lock, flags);
|
|
|
|
}
|
|
|
|
|
2008-09-11 14:51:41 +00:00
|
|
|
irqreturn_t amd_iommu_int_handler(int irq, void *data)
|
|
|
|
{
|
2008-09-09 14:41:05 +00:00
|
|
|
struct amd_iommu *iommu;
|
|
|
|
|
2009-05-04 13:06:20 +00:00
|
|
|
for_each_iommu(iommu)
|
2008-09-09 14:41:05 +00:00
|
|
|
iommu_poll_events(iommu);
|
|
|
|
|
|
|
|
return IRQ_HANDLED;
|
2008-09-11 14:51:41 +00:00
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/****************************************************************************
|
|
|
|
*
|
|
|
|
* IOMMU command queuing functions
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2011-04-06 08:53:48 +00:00
|
|
|
static void build_completion_wait(struct iommu_cmd *cmd)
|
|
|
|
{
|
|
|
|
memset(cmd, 0, sizeof(*cmd));
|
|
|
|
cmd->data[0] = CMD_COMPL_WAIT_INT_MASK;
|
|
|
|
CMD_SET_TYPE(cmd, CMD_COMPL_WAIT);
|
|
|
|
}
|
|
|
|
|
2011-04-06 09:07:21 +00:00
|
|
|
static void build_inv_dte(struct iommu_cmd *cmd, u16 devid)
|
|
|
|
{
|
|
|
|
memset(cmd, 0, sizeof(*cmd));
|
|
|
|
cmd->data[0] = devid;
|
|
|
|
CMD_SET_TYPE(cmd, CMD_INV_DEV_ENTRY);
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* Writes the command to the IOMMUs command buffer and informs the
|
|
|
|
* hardware about the new command. Must be called with iommu->lock held.
|
|
|
|
*/
|
2008-07-11 15:14:28 +00:00
|
|
|
static int __iommu_queue_command(struct amd_iommu *iommu, struct iommu_cmd *cmd)
|
2008-06-26 19:27:55 +00:00
|
|
|
{
|
|
|
|
u32 tail, head;
|
|
|
|
u8 *target;
|
|
|
|
|
2010-04-03 01:27:53 +00:00
|
|
|
WARN_ON(iommu->cmd_buf_size & CMD_BUFFER_UNINITIALIZED);
|
2008-06-26 19:27:55 +00:00
|
|
|
tail = readl(iommu->mmio_base + MMIO_CMD_TAIL_OFFSET);
|
2008-08-19 00:13:55 +00:00
|
|
|
target = iommu->cmd_buf + tail;
|
2008-06-26 19:27:55 +00:00
|
|
|
memcpy_toio(target, cmd, sizeof(*cmd));
|
|
|
|
tail = (tail + sizeof(*cmd)) % iommu->cmd_buf_size;
|
|
|
|
head = readl(iommu->mmio_base + MMIO_CMD_HEAD_OFFSET);
|
|
|
|
if (tail == head)
|
|
|
|
return -ENOMEM;
|
|
|
|
writel(tail, iommu->mmio_base + MMIO_CMD_TAIL_OFFSET);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* General queuing function for commands. Takes iommu->lock and calls
|
|
|
|
* __iommu_queue_command().
|
|
|
|
*/
|
2008-07-11 15:14:28 +00:00
|
|
|
static int iommu_queue_command(struct amd_iommu *iommu, struct iommu_cmd *cmd)
|
2008-06-26 19:27:55 +00:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&iommu->lock, flags);
|
|
|
|
ret = __iommu_queue_command(iommu, cmd);
|
2008-12-03 11:19:27 +00:00
|
|
|
if (!ret)
|
2008-12-10 18:58:00 +00:00
|
|
|
iommu->need_sync = true;
|
2008-06-26 19:27:55 +00:00
|
|
|
spin_unlock_irqrestore(&iommu->lock, flags);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2008-12-02 19:34:41 +00:00
|
|
|
/*
|
|
|
|
* This function waits until an IOMMU has completed a completion
|
|
|
|
* wait command
|
|
|
|
*/
|
|
|
|
static void __iommu_wait_for_completion(struct amd_iommu *iommu)
|
|
|
|
{
|
|
|
|
int ready = 0;
|
|
|
|
unsigned status = 0;
|
|
|
|
unsigned long i = 0;
|
|
|
|
|
2008-12-12 13:59:58 +00:00
|
|
|
INC_STATS_COUNTER(compl_wait);
|
|
|
|
|
2008-12-02 19:34:41 +00:00
|
|
|
while (!ready && (i < EXIT_LOOP_COUNT)) {
|
|
|
|
++i;
|
|
|
|
/* wait for the bit to become one */
|
|
|
|
status = readl(iommu->mmio_base + MMIO_STATUS_OFFSET);
|
|
|
|
ready = status & MMIO_STATUS_COM_WAIT_INT_MASK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* set bit back to zero */
|
|
|
|
status &= ~MMIO_STATUS_COM_WAIT_INT_MASK;
|
|
|
|
writel(status, iommu->mmio_base + MMIO_STATUS_OFFSET);
|
|
|
|
|
2009-11-26 14:45:41 +00:00
|
|
|
if (unlikely(i == EXIT_LOOP_COUNT))
|
|
|
|
iommu->reset_in_progress = true;
|
2008-12-02 19:34:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This function queues a completion wait command into the command
|
|
|
|
* buffer of an IOMMU
|
|
|
|
*/
|
|
|
|
static int __iommu_completion_wait(struct amd_iommu *iommu)
|
|
|
|
{
|
|
|
|
struct iommu_cmd cmd;
|
|
|
|
|
2011-04-06 08:53:48 +00:00
|
|
|
build_completion_wait(&cmd);
|
2008-12-02 19:34:41 +00:00
|
|
|
|
|
|
|
return __iommu_queue_command(iommu, &cmd);
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* This function is called whenever we need to ensure that the IOMMU has
|
|
|
|
* completed execution of all commands we sent. It sends a
|
|
|
|
* COMPLETION_WAIT command and waits for it to finish. The IOMMU informs
|
|
|
|
* us about that by writing a value to a physical address we pass with
|
|
|
|
* the command.
|
|
|
|
*/
|
2008-06-26 19:27:55 +00:00
|
|
|
static int iommu_completion_wait(struct amd_iommu *iommu)
|
|
|
|
{
|
2008-12-02 19:34:41 +00:00
|
|
|
int ret = 0;
|
|
|
|
unsigned long flags;
|
2008-06-26 19:27:55 +00:00
|
|
|
|
2008-09-17 12:19:15 +00:00
|
|
|
spin_lock_irqsave(&iommu->lock, flags);
|
|
|
|
|
2008-12-03 11:19:27 +00:00
|
|
|
if (!iommu->need_sync)
|
|
|
|
goto out;
|
|
|
|
|
2008-12-02 19:34:41 +00:00
|
|
|
ret = __iommu_completion_wait(iommu);
|
2008-12-03 11:19:27 +00:00
|
|
|
|
2008-12-10 18:58:00 +00:00
|
|
|
iommu->need_sync = false;
|
2008-06-26 19:27:55 +00:00
|
|
|
|
|
|
|
if (ret)
|
2008-09-17 12:19:15 +00:00
|
|
|
goto out;
|
2008-06-26 19:27:55 +00:00
|
|
|
|
2008-12-02 19:34:41 +00:00
|
|
|
__iommu_wait_for_completion(iommu);
|
2008-12-17 15:36:44 +00:00
|
|
|
|
2008-09-17 12:19:15 +00:00
|
|
|
out:
|
|
|
|
spin_unlock_irqrestore(&iommu->lock, flags);
|
2008-06-26 19:27:55 +00:00
|
|
|
|
2009-11-26 14:45:41 +00:00
|
|
|
if (iommu->reset_in_progress)
|
|
|
|
reset_iommu_command_buffer(iommu);
|
|
|
|
|
2008-06-26 19:27:55 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2009-11-20 15:00:05 +00:00
|
|
|
static void iommu_flush_complete(struct protection_domain *domain)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < amd_iommus_present; ++i) {
|
|
|
|
if (!domain->dev_iommu[i])
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Devices of this domain are behind this IOMMU
|
|
|
|
* We need to wait for completion of all commands.
|
|
|
|
*/
|
|
|
|
iommu_completion_wait(amd_iommus[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* Command send function for invalidating a device table entry
|
|
|
|
*/
|
2009-11-26 14:04:38 +00:00
|
|
|
static int iommu_flush_device(struct device *dev)
|
|
|
|
{
|
|
|
|
struct amd_iommu *iommu;
|
2009-11-26 14:35:33 +00:00
|
|
|
struct iommu_cmd cmd;
|
2009-11-26 14:04:38 +00:00
|
|
|
u16 devid;
|
|
|
|
|
|
|
|
devid = get_device_id(dev);
|
|
|
|
iommu = amd_iommu_rlookup_table[devid];
|
|
|
|
|
2011-04-06 09:07:21 +00:00
|
|
|
build_inv_dte(&cmd, devid);
|
2009-11-26 14:35:33 +00:00
|
|
|
|
|
|
|
return iommu_queue_command(iommu, &cmd);
|
2009-11-26 14:04:38 +00:00
|
|
|
}
|
|
|
|
|
2008-12-02 19:54:37 +00:00
|
|
|
static void __iommu_build_inv_iommu_pages(struct iommu_cmd *cmd, u64 address,
|
|
|
|
u16 domid, int pde, int s)
|
|
|
|
{
|
|
|
|
memset(cmd, 0, sizeof(*cmd));
|
|
|
|
address &= PAGE_MASK;
|
|
|
|
CMD_SET_TYPE(cmd, CMD_INV_IOMMU_PAGES);
|
|
|
|
cmd->data[1] |= domid;
|
|
|
|
cmd->data[2] = lower_32_bits(address);
|
|
|
|
cmd->data[3] = upper_32_bits(address);
|
|
|
|
if (s) /* size bit - we flush more than one 4kb page */
|
|
|
|
cmd->data[2] |= CMD_INV_IOMMU_PAGES_SIZE_MASK;
|
|
|
|
if (pde) /* PDE bit - we wan't flush everything not only the PTEs */
|
|
|
|
cmd->data[2] |= CMD_INV_IOMMU_PAGES_PDE_MASK;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* Generic command send function for invalidaing TLB entries
|
|
|
|
*/
|
2008-06-26 19:27:55 +00:00
|
|
|
static int iommu_queue_inv_iommu_pages(struct amd_iommu *iommu,
|
|
|
|
u64 address, u16 domid, int pde, int s)
|
|
|
|
{
|
2008-07-11 15:14:28 +00:00
|
|
|
struct iommu_cmd cmd;
|
2008-09-17 11:47:25 +00:00
|
|
|
int ret;
|
2008-06-26 19:27:55 +00:00
|
|
|
|
2008-12-02 19:54:37 +00:00
|
|
|
__iommu_build_inv_iommu_pages(&cmd, address, domid, pde, s);
|
2008-06-26 19:27:55 +00:00
|
|
|
|
2008-09-17 11:47:25 +00:00
|
|
|
ret = iommu_queue_command(iommu, &cmd);
|
|
|
|
|
|
|
|
return ret;
|
2008-06-26 19:27:55 +00:00
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* TLB invalidation function which is called from the mapping functions.
|
|
|
|
* It invalidates a single PTE if the range to flush is within a single
|
|
|
|
* page. Otherwise it flushes the whole TLB of the IOMMU.
|
|
|
|
*/
|
2009-11-23 17:30:32 +00:00
|
|
|
static void __iommu_flush_pages(struct protection_domain *domain,
|
|
|
|
u64 address, size_t size, int pde)
|
2008-06-26 19:27:55 +00:00
|
|
|
{
|
2009-11-23 17:30:32 +00:00
|
|
|
int s = 0, i;
|
2009-11-20 14:30:58 +00:00
|
|
|
unsigned long pages = iommu_num_pages(address, size, PAGE_SIZE);
|
2008-06-26 19:27:55 +00:00
|
|
|
|
|
|
|
address &= PAGE_MASK;
|
|
|
|
|
2008-07-03 17:35:08 +00:00
|
|
|
if (pages > 1) {
|
|
|
|
/*
|
|
|
|
* If we have to flush more than one page, flush all
|
|
|
|
* TLB entries for this domain
|
|
|
|
*/
|
|
|
|
address = CMD_INV_IOMMU_ALL_PAGES_ADDRESS;
|
|
|
|
s = 1;
|
2008-06-26 19:27:55 +00:00
|
|
|
}
|
|
|
|
|
2008-07-03 17:35:08 +00:00
|
|
|
|
2009-11-23 17:30:32 +00:00
|
|
|
for (i = 0; i < amd_iommus_present; ++i) {
|
|
|
|
if (!domain->dev_iommu[i])
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Devices of this domain are behind this IOMMU
|
|
|
|
* We need a TLB flush
|
|
|
|
*/
|
|
|
|
iommu_queue_inv_iommu_pages(amd_iommus[i], address,
|
|
|
|
domain->id, pde, s);
|
|
|
|
}
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iommu_flush_pages(struct protection_domain *domain,
|
|
|
|
u64 address, size_t size)
|
|
|
|
{
|
|
|
|
__iommu_flush_pages(domain, address, size, 0);
|
2008-06-26 19:27:55 +00:00
|
|
|
}
|
2008-06-26 19:27:53 +00:00
|
|
|
|
2008-09-04 16:40:05 +00:00
|
|
|
/* Flush the whole IO/TLB for a given protection domain */
|
2009-11-20 14:30:58 +00:00
|
|
|
static void iommu_flush_tlb(struct protection_domain *domain)
|
2008-09-04 16:40:05 +00:00
|
|
|
{
|
2009-11-20 14:30:58 +00:00
|
|
|
__iommu_flush_pages(domain, 0, CMD_INV_IOMMU_ALL_PAGES_ADDRESS, 0);
|
2008-09-04 16:40:05 +00:00
|
|
|
}
|
|
|
|
|
2009-06-15 13:42:00 +00:00
|
|
|
/* Flush the whole IO/TLB for a given protection domain - including PDE */
|
2009-11-20 14:30:58 +00:00
|
|
|
static void iommu_flush_tlb_pde(struct protection_domain *domain)
|
2009-06-15 13:42:00 +00:00
|
|
|
{
|
2009-11-20 14:30:58 +00:00
|
|
|
__iommu_flush_pages(domain, 0, CMD_INV_IOMMU_ALL_PAGES_ADDRESS, 1);
|
2009-06-15 13:42:00 +00:00
|
|
|
}
|
|
|
|
|
2009-11-26 14:35:33 +00:00
|
|
|
|
2008-12-02 20:01:12 +00:00
|
|
|
/*
|
2009-11-26 14:35:33 +00:00
|
|
|
* This function flushes the DTEs for all devices in domain
|
2008-12-02 20:01:12 +00:00
|
|
|
*/
|
2009-11-26 14:35:33 +00:00
|
|
|
static void iommu_flush_domain_devices(struct protection_domain *domain)
|
|
|
|
{
|
|
|
|
struct iommu_dev_data *dev_data;
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&domain->lock, flags);
|
|
|
|
|
|
|
|
list_for_each_entry(dev_data, &domain->dev_list, list)
|
|
|
|
iommu_flush_device(dev_data->dev);
|
|
|
|
|
|
|
|
spin_unlock_irqrestore(&domain->lock, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iommu_flush_all_domain_devices(void)
|
2008-12-02 20:01:12 +00:00
|
|
|
{
|
2009-11-20 16:02:44 +00:00
|
|
|
struct protection_domain *domain;
|
2009-09-03 13:28:33 +00:00
|
|
|
unsigned long flags;
|
2008-12-12 14:48:28 +00:00
|
|
|
|
2009-11-20 16:02:44 +00:00
|
|
|
spin_lock_irqsave(&amd_iommu_pd_lock, flags);
|
2009-05-05 13:33:57 +00:00
|
|
|
|
2009-11-20 16:02:44 +00:00
|
|
|
list_for_each_entry(domain, &amd_iommu_pd_list, list) {
|
2009-11-26 14:35:33 +00:00
|
|
|
iommu_flush_domain_devices(domain);
|
2009-11-20 16:02:44 +00:00
|
|
|
iommu_flush_complete(domain);
|
2009-05-05 13:33:57 +00:00
|
|
|
}
|
2009-09-03 13:28:33 +00:00
|
|
|
|
2009-11-20 16:02:44 +00:00
|
|
|
spin_unlock_irqrestore(&amd_iommu_pd_lock, flags);
|
2009-09-03 13:28:33 +00:00
|
|
|
}
|
|
|
|
|
2009-11-26 14:35:33 +00:00
|
|
|
void amd_iommu_flush_all_devices(void)
|
|
|
|
{
|
|
|
|
iommu_flush_all_domain_devices();
|
|
|
|
}
|
|
|
|
|
2009-11-20 16:02:44 +00:00
|
|
|
/*
|
|
|
|
* This function uses heavy locking and may disable irqs for some time. But
|
|
|
|
* this is no issue because it is only called during resume.
|
|
|
|
*/
|
2009-05-05 13:33:57 +00:00
|
|
|
void amd_iommu_flush_all_domains(void)
|
2009-09-03 13:28:33 +00:00
|
|
|
{
|
2009-11-20 15:48:58 +00:00
|
|
|
struct protection_domain *domain;
|
2009-11-20 16:02:44 +00:00
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&amd_iommu_pd_lock, flags);
|
2009-09-03 13:28:33 +00:00
|
|
|
|
2009-11-20 15:48:58 +00:00
|
|
|
list_for_each_entry(domain, &amd_iommu_pd_list, list) {
|
2009-11-20 16:02:44 +00:00
|
|
|
spin_lock(&domain->lock);
|
2009-11-20 15:48:58 +00:00
|
|
|
iommu_flush_tlb_pde(domain);
|
|
|
|
iommu_flush_complete(domain);
|
2009-11-20 16:02:44 +00:00
|
|
|
spin_unlock(&domain->lock);
|
2009-11-20 15:48:58 +00:00
|
|
|
}
|
2009-11-20 16:02:44 +00:00
|
|
|
|
|
|
|
spin_unlock_irqrestore(&amd_iommu_pd_lock, flags);
|
2009-05-05 13:33:57 +00:00
|
|
|
}
|
|
|
|
|
2009-09-03 13:01:43 +00:00
|
|
|
static void reset_iommu_command_buffer(struct amd_iommu *iommu)
|
|
|
|
{
|
|
|
|
pr_err("AMD-Vi: Resetting IOMMU command buffer\n");
|
|
|
|
|
2009-09-03 13:08:09 +00:00
|
|
|
if (iommu->reset_in_progress)
|
|
|
|
panic("AMD-Vi: ILLEGAL_COMMAND_ERROR while resetting command buffer\n");
|
|
|
|
|
2009-09-03 13:01:43 +00:00
|
|
|
amd_iommu_reset_cmd_buffer(iommu);
|
2009-11-26 14:35:33 +00:00
|
|
|
amd_iommu_flush_all_devices();
|
|
|
|
amd_iommu_flush_all_domains();
|
2009-09-03 13:08:09 +00:00
|
|
|
|
|
|
|
iommu->reset_in_progress = false;
|
2009-09-03 13:01:43 +00:00
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/****************************************************************************
|
|
|
|
*
|
|
|
|
* The functions below are used the create the page table mappings for
|
|
|
|
* unity mapped regions.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2009-11-24 16:43:32 +00:00
|
|
|
/*
|
|
|
|
* This function is used to add another level to an IO page table. Adding
|
|
|
|
* another level increases the size of the address space by 9 bits to a size up
|
|
|
|
* to 64 bits.
|
|
|
|
*/
|
|
|
|
static bool increase_address_space(struct protection_domain *domain,
|
|
|
|
gfp_t gfp)
|
|
|
|
{
|
|
|
|
u64 *pte;
|
|
|
|
|
|
|
|
if (domain->mode == PAGE_MODE_6_LEVEL)
|
|
|
|
/* address space already 64 bit large */
|
|
|
|
return false;
|
|
|
|
|
|
|
|
pte = (void *)get_zeroed_page(gfp);
|
|
|
|
if (!pte)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
*pte = PM_LEVEL_PDE(domain->mode,
|
|
|
|
virt_to_phys(domain->pt_root));
|
|
|
|
domain->pt_root = pte;
|
|
|
|
domain->mode += 1;
|
|
|
|
domain->updated = true;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static u64 *alloc_pte(struct protection_domain *domain,
|
|
|
|
unsigned long address,
|
2010-01-15 13:41:15 +00:00
|
|
|
unsigned long page_size,
|
2009-11-24 16:43:32 +00:00
|
|
|
u64 **pte_page,
|
|
|
|
gfp_t gfp)
|
|
|
|
{
|
2010-01-15 13:41:15 +00:00
|
|
|
int level, end_lvl;
|
2009-11-24 16:43:32 +00:00
|
|
|
u64 *pte, *page;
|
2010-01-15 13:41:15 +00:00
|
|
|
|
|
|
|
BUG_ON(!is_power_of_2(page_size));
|
2009-11-24 16:43:32 +00:00
|
|
|
|
|
|
|
while (address > PM_LEVEL_SIZE(domain->mode))
|
|
|
|
increase_address_space(domain, gfp);
|
|
|
|
|
2010-01-15 13:41:15 +00:00
|
|
|
level = domain->mode - 1;
|
|
|
|
pte = &domain->pt_root[PM_LEVEL_INDEX(level, address)];
|
|
|
|
address = PAGE_SIZE_ALIGN(address, page_size);
|
|
|
|
end_lvl = PAGE_SIZE_LEVEL(page_size);
|
2009-11-24 16:43:32 +00:00
|
|
|
|
|
|
|
while (level > end_lvl) {
|
|
|
|
if (!IOMMU_PTE_PRESENT(*pte)) {
|
|
|
|
page = (u64 *)get_zeroed_page(gfp);
|
|
|
|
if (!page)
|
|
|
|
return NULL;
|
|
|
|
*pte = PM_LEVEL_PDE(level, virt_to_phys(page));
|
|
|
|
}
|
|
|
|
|
2010-01-15 13:41:15 +00:00
|
|
|
/* No level skipping support yet */
|
|
|
|
if (PM_PTE_LEVEL(*pte) != level)
|
|
|
|
return NULL;
|
|
|
|
|
2009-11-24 16:43:32 +00:00
|
|
|
level -= 1;
|
|
|
|
|
|
|
|
pte = IOMMU_PTE_PAGE(*pte);
|
|
|
|
|
|
|
|
if (pte_page && level == end_lvl)
|
|
|
|
*pte_page = pte;
|
|
|
|
|
|
|
|
pte = &pte[PM_LEVEL_INDEX(level, address)];
|
|
|
|
}
|
|
|
|
|
|
|
|
return pte;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This function checks if there is a PTE for a given dma address. If
|
|
|
|
* there is one, it returns the pointer to it.
|
|
|
|
*/
|
2010-01-19 16:27:39 +00:00
|
|
|
static u64 *fetch_pte(struct protection_domain *domain, unsigned long address)
|
2009-11-24 16:43:32 +00:00
|
|
|
{
|
|
|
|
int level;
|
|
|
|
u64 *pte;
|
|
|
|
|
2010-01-19 16:27:39 +00:00
|
|
|
if (address > PM_LEVEL_SIZE(domain->mode))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
level = domain->mode - 1;
|
|
|
|
pte = &domain->pt_root[PM_LEVEL_INDEX(level, address)];
|
2009-11-24 16:43:32 +00:00
|
|
|
|
2010-01-19 16:27:39 +00:00
|
|
|
while (level > 0) {
|
|
|
|
|
|
|
|
/* Not Present */
|
2009-11-24 16:43:32 +00:00
|
|
|
if (!IOMMU_PTE_PRESENT(*pte))
|
|
|
|
return NULL;
|
|
|
|
|
2010-01-19 16:27:39 +00:00
|
|
|
/* Large PTE */
|
|
|
|
if (PM_PTE_LEVEL(*pte) == 0x07) {
|
|
|
|
unsigned long pte_mask, __pte;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we have a series of large PTEs, make
|
|
|
|
* sure to return a pointer to the first one.
|
|
|
|
*/
|
|
|
|
pte_mask = PTE_PAGE_SIZE(*pte);
|
|
|
|
pte_mask = ~((PAGE_SIZE_PTE_COUNT(pte_mask) << 3) - 1);
|
|
|
|
__pte = ((unsigned long)pte) & pte_mask;
|
|
|
|
|
|
|
|
return (u64 *)__pte;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* No level skipping support yet */
|
|
|
|
if (PM_PTE_LEVEL(*pte) != level)
|
|
|
|
return NULL;
|
|
|
|
|
2009-11-24 16:43:32 +00:00
|
|
|
level -= 1;
|
|
|
|
|
2010-01-19 16:27:39 +00:00
|
|
|
/* Walk to the next level */
|
2009-11-24 16:43:32 +00:00
|
|
|
pte = IOMMU_PTE_PAGE(*pte);
|
|
|
|
pte = &pte[PM_LEVEL_INDEX(level, address)];
|
|
|
|
}
|
|
|
|
|
|
|
|
return pte;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* Generic mapping functions. It maps a physical address into a DMA
|
|
|
|
* address space. It allocates the page table pages if necessary.
|
|
|
|
* In the future it can be extended to a generic mapping function
|
|
|
|
* supporting all features of AMD IOMMU page tables like level skipping
|
|
|
|
* and full 64 bit address spaces.
|
|
|
|
*/
|
2008-12-02 16:27:52 +00:00
|
|
|
static int iommu_map_page(struct protection_domain *dom,
|
|
|
|
unsigned long bus_addr,
|
|
|
|
unsigned long phys_addr,
|
2009-09-03 09:33:51 +00:00
|
|
|
int prot,
|
2010-01-15 13:41:15 +00:00
|
|
|
unsigned long page_size)
|
2008-06-26 19:27:56 +00:00
|
|
|
{
|
2009-05-12 10:02:46 +00:00
|
|
|
u64 __pte, *pte;
|
2010-01-15 13:41:15 +00:00
|
|
|
int i, count;
|
2009-09-03 09:33:51 +00:00
|
|
|
|
2009-09-02 14:52:23 +00:00
|
|
|
if (!(prot & IOMMU_PROT_MASK))
|
2008-06-26 19:27:56 +00:00
|
|
|
return -EINVAL;
|
|
|
|
|
2010-01-15 13:41:15 +00:00
|
|
|
bus_addr = PAGE_ALIGN(bus_addr);
|
|
|
|
phys_addr = PAGE_ALIGN(phys_addr);
|
|
|
|
count = PAGE_SIZE_PTE_COUNT(page_size);
|
|
|
|
pte = alloc_pte(dom, bus_addr, page_size, NULL, GFP_KERNEL);
|
|
|
|
|
|
|
|
for (i = 0; i < count; ++i)
|
|
|
|
if (IOMMU_PTE_PRESENT(pte[i]))
|
|
|
|
return -EBUSY;
|
2008-06-26 19:27:56 +00:00
|
|
|
|
2010-01-15 13:41:15 +00:00
|
|
|
if (page_size > PAGE_SIZE) {
|
|
|
|
__pte = PAGE_SIZE_PTE(phys_addr, page_size);
|
|
|
|
__pte |= PM_LEVEL_ENC(7) | IOMMU_PTE_P | IOMMU_PTE_FC;
|
|
|
|
} else
|
|
|
|
__pte = phys_addr | IOMMU_PTE_P | IOMMU_PTE_FC;
|
2008-06-26 19:27:56 +00:00
|
|
|
|
|
|
|
if (prot & IOMMU_PROT_IR)
|
|
|
|
__pte |= IOMMU_PTE_IR;
|
|
|
|
if (prot & IOMMU_PROT_IW)
|
|
|
|
__pte |= IOMMU_PTE_IW;
|
|
|
|
|
2010-01-15 13:41:15 +00:00
|
|
|
for (i = 0; i < count; ++i)
|
|
|
|
pte[i] = __pte;
|
2008-06-26 19:27:56 +00:00
|
|
|
|
2009-09-02 14:00:23 +00:00
|
|
|
update_domain(dom);
|
|
|
|
|
2008-06-26 19:27:56 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-01-19 16:27:39 +00:00
|
|
|
static unsigned long iommu_unmap_page(struct protection_domain *dom,
|
|
|
|
unsigned long bus_addr,
|
|
|
|
unsigned long page_size)
|
2008-12-02 18:59:10 +00:00
|
|
|
{
|
2010-01-19 16:27:39 +00:00
|
|
|
unsigned long long unmap_size, unmapped;
|
|
|
|
u64 *pte;
|
|
|
|
|
|
|
|
BUG_ON(!is_power_of_2(page_size));
|
|
|
|
|
|
|
|
unmapped = 0;
|
2008-12-02 18:59:10 +00:00
|
|
|
|
2010-01-19 16:27:39 +00:00
|
|
|
while (unmapped < page_size) {
|
|
|
|
|
|
|
|
pte = fetch_pte(dom, bus_addr);
|
|
|
|
|
|
|
|
if (!pte) {
|
|
|
|
/*
|
|
|
|
* No PTE for this address
|
|
|
|
* move forward in 4kb steps
|
|
|
|
*/
|
|
|
|
unmap_size = PAGE_SIZE;
|
|
|
|
} else if (PM_PTE_LEVEL(*pte) == 0) {
|
|
|
|
/* 4kb PTE found for this address */
|
|
|
|
unmap_size = PAGE_SIZE;
|
|
|
|
*pte = 0ULL;
|
|
|
|
} else {
|
|
|
|
int count, i;
|
|
|
|
|
|
|
|
/* Large PTE found which maps this address */
|
|
|
|
unmap_size = PTE_PAGE_SIZE(*pte);
|
|
|
|
count = PAGE_SIZE_PTE_COUNT(unmap_size);
|
|
|
|
for (i = 0; i < count; i++)
|
|
|
|
pte[i] = 0ULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
bus_addr = (bus_addr & ~(unmap_size - 1)) + unmap_size;
|
|
|
|
unmapped += unmap_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
BUG_ON(!is_power_of_2(unmapped));
|
2008-12-02 18:59:10 +00:00
|
|
|
|
2010-01-19 16:27:39 +00:00
|
|
|
return unmapped;
|
2008-12-02 18:59:10 +00:00
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* This function checks if a specific unity mapping entry is needed for
|
|
|
|
* this specific IOMMU.
|
|
|
|
*/
|
2008-06-26 19:27:56 +00:00
|
|
|
static int iommu_for_unity_map(struct amd_iommu *iommu,
|
|
|
|
struct unity_map_entry *entry)
|
|
|
|
{
|
|
|
|
u16 bdf, i;
|
|
|
|
|
|
|
|
for (i = entry->devid_start; i <= entry->devid_end; ++i) {
|
|
|
|
bdf = amd_iommu_alias_table[i];
|
|
|
|
if (amd_iommu_rlookup_table[bdf] == iommu)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* This function actually applies the mapping to the page table of the
|
|
|
|
* dma_ops domain.
|
|
|
|
*/
|
2008-06-26 19:27:56 +00:00
|
|
|
static int dma_ops_unity_map(struct dma_ops_domain *dma_dom,
|
|
|
|
struct unity_map_entry *e)
|
|
|
|
{
|
|
|
|
u64 addr;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
for (addr = e->address_start; addr < e->address_end;
|
|
|
|
addr += PAGE_SIZE) {
|
2009-09-03 09:33:51 +00:00
|
|
|
ret = iommu_map_page(&dma_dom->domain, addr, addr, e->prot,
|
2010-01-15 13:41:15 +00:00
|
|
|
PAGE_SIZE);
|
2008-06-26 19:27:56 +00:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
/*
|
|
|
|
* if unity mapping is in aperture range mark the page
|
|
|
|
* as allocated in the aperture
|
|
|
|
*/
|
|
|
|
if (addr < dma_dom->aperture_size)
|
2009-05-12 08:56:44 +00:00
|
|
|
__set_bit(addr >> PAGE_SHIFT,
|
2009-05-15 10:30:05 +00:00
|
|
|
dma_dom->aperture[0]->bitmap);
|
2008-06-26 19:27:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2009-11-24 16:47:56 +00:00
|
|
|
/*
|
|
|
|
* Init the unity mappings for a specific IOMMU in the system
|
|
|
|
*
|
|
|
|
* Basically iterates over all unity mapping entries and applies them to
|
|
|
|
* the default domain DMA of that IOMMU if necessary.
|
|
|
|
*/
|
|
|
|
static int iommu_init_unity_mappings(struct amd_iommu *iommu)
|
|
|
|
{
|
|
|
|
struct unity_map_entry *entry;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
list_for_each_entry(entry, &amd_iommu_unity_map, list) {
|
|
|
|
if (!iommu_for_unity_map(iommu, entry))
|
|
|
|
continue;
|
|
|
|
ret = dma_ops_unity_map(iommu->default_dom, entry);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* Inits the unity mappings required for a specific device
|
|
|
|
*/
|
2008-06-26 19:27:56 +00:00
|
|
|
static int init_unity_mappings_for_device(struct dma_ops_domain *dma_dom,
|
|
|
|
u16 devid)
|
|
|
|
{
|
|
|
|
struct unity_map_entry *e;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
list_for_each_entry(e, &amd_iommu_unity_map, list) {
|
|
|
|
if (!(devid >= e->devid_start && devid <= e->devid_end))
|
|
|
|
continue;
|
|
|
|
ret = dma_ops_unity_map(dma_dom, e);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/****************************************************************************
|
|
|
|
*
|
|
|
|
* The next functions belong to the address allocator for the dma_ops
|
|
|
|
* interface functions. They work like the allocators in the other IOMMU
|
|
|
|
* drivers. Its basically a bitmap which marks the allocated pages in
|
|
|
|
* the aperture. Maybe it could be enhanced in the future to a more
|
|
|
|
* efficient allocator.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
2008-06-26 19:27:57 +00:00
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
2009-05-15 10:30:05 +00:00
|
|
|
* The address allocator core functions.
|
2008-07-11 15:14:22 +00:00
|
|
|
*
|
|
|
|
* called with domain->lock held
|
|
|
|
*/
|
2009-05-15 10:30:05 +00:00
|
|
|
|
2009-11-24 16:47:56 +00:00
|
|
|
/*
|
|
|
|
* Used to reserve address ranges in the aperture (e.g. for exclusion
|
|
|
|
* ranges.
|
|
|
|
*/
|
|
|
|
static void dma_ops_reserve_addresses(struct dma_ops_domain *dom,
|
|
|
|
unsigned long start_page,
|
|
|
|
unsigned int pages)
|
|
|
|
{
|
|
|
|
unsigned int i, last_page = dom->aperture_size >> PAGE_SHIFT;
|
|
|
|
|
|
|
|
if (start_page + pages > last_page)
|
|
|
|
pages = last_page - start_page;
|
|
|
|
|
|
|
|
for (i = start_page; i < start_page + pages; ++i) {
|
|
|
|
int index = i / APERTURE_RANGE_PAGES;
|
|
|
|
int page = i % APERTURE_RANGE_PAGES;
|
|
|
|
__set_bit(page, dom->aperture[index]->bitmap);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-05-18 14:38:55 +00:00
|
|
|
/*
|
|
|
|
* This function is used to add a new aperture range to an existing
|
|
|
|
* aperture in case of dma_ops domain allocation or address allocation
|
|
|
|
* failure.
|
|
|
|
*/
|
2009-11-23 18:08:46 +00:00
|
|
|
static int alloc_new_range(struct dma_ops_domain *dma_dom,
|
2009-05-18 14:38:55 +00:00
|
|
|
bool populate, gfp_t gfp)
|
|
|
|
{
|
|
|
|
int index = dma_dom->aperture_size >> APERTURE_RANGE_SHIFT;
|
2009-11-23 18:08:46 +00:00
|
|
|
struct amd_iommu *iommu;
|
2010-01-22 15:40:20 +00:00
|
|
|
unsigned long i;
|
2009-05-18 14:38:55 +00:00
|
|
|
|
2009-05-22 10:31:53 +00:00
|
|
|
#ifdef CONFIG_IOMMU_STRESS
|
|
|
|
populate = false;
|
|
|
|
#endif
|
|
|
|
|
2009-05-18 14:38:55 +00:00
|
|
|
if (index >= APERTURE_MAX_RANGES)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
dma_dom->aperture[index] = kzalloc(sizeof(struct aperture_range), gfp);
|
|
|
|
if (!dma_dom->aperture[index])
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
dma_dom->aperture[index]->bitmap = (void *)get_zeroed_page(gfp);
|
|
|
|
if (!dma_dom->aperture[index]->bitmap)
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
dma_dom->aperture[index]->offset = dma_dom->aperture_size;
|
|
|
|
|
|
|
|
if (populate) {
|
|
|
|
unsigned long address = dma_dom->aperture_size;
|
|
|
|
int i, num_ptes = APERTURE_RANGE_PAGES / 512;
|
|
|
|
u64 *pte, *pte_page;
|
|
|
|
|
|
|
|
for (i = 0; i < num_ptes; ++i) {
|
2010-01-15 13:41:15 +00:00
|
|
|
pte = alloc_pte(&dma_dom->domain, address, PAGE_SIZE,
|
2009-05-18 14:38:55 +00:00
|
|
|
&pte_page, gfp);
|
|
|
|
if (!pte)
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
dma_dom->aperture[index]->pte_pages[i] = pte_page;
|
|
|
|
|
|
|
|
address += APERTURE_RANGE_SIZE / 64;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
dma_dom->aperture_size += APERTURE_RANGE_SIZE;
|
|
|
|
|
tree-wide: fix comment/printk typos
"gadget", "through", "command", "maintain", "maintain", "controller", "address",
"between", "initiali[zs]e", "instead", "function", "select", "already",
"equal", "access", "management", "hierarchy", "registration", "interest",
"relative", "memory", "offset", "already",
Signed-off-by: Uwe Kleine-König <u.kleine-koenig@pengutronix.de>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
2010-11-01 19:38:34 +00:00
|
|
|
/* Initialize the exclusion range if necessary */
|
2009-11-23 18:08:46 +00:00
|
|
|
for_each_iommu(iommu) {
|
|
|
|
if (iommu->exclusion_start &&
|
|
|
|
iommu->exclusion_start >= dma_dom->aperture[index]->offset
|
|
|
|
&& iommu->exclusion_start < dma_dom->aperture_size) {
|
|
|
|
unsigned long startpage;
|
|
|
|
int pages = iommu_num_pages(iommu->exclusion_start,
|
|
|
|
iommu->exclusion_length,
|
|
|
|
PAGE_SIZE);
|
|
|
|
startpage = iommu->exclusion_start >> PAGE_SHIFT;
|
|
|
|
dma_ops_reserve_addresses(dma_dom, startpage, pages);
|
|
|
|
}
|
2009-05-19 07:52:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check for areas already mapped as present in the new aperture
|
|
|
|
* range and mark those pages as reserved in the allocator. Such
|
|
|
|
* mappings may already exist as a result of requested unity
|
|
|
|
* mappings for devices.
|
|
|
|
*/
|
|
|
|
for (i = dma_dom->aperture[index]->offset;
|
|
|
|
i < dma_dom->aperture_size;
|
|
|
|
i += PAGE_SIZE) {
|
2010-01-19 16:27:39 +00:00
|
|
|
u64 *pte = fetch_pte(&dma_dom->domain, i);
|
2009-05-19 07:52:40 +00:00
|
|
|
if (!pte || !IOMMU_PTE_PRESENT(*pte))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
dma_ops_reserve_addresses(dma_dom, i << PAGE_SHIFT, 1);
|
|
|
|
}
|
|
|
|
|
2009-09-02 14:00:23 +00:00
|
|
|
update_domain(&dma_dom->domain);
|
|
|
|
|
2009-05-18 14:38:55 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
out_free:
|
2009-09-02 14:00:23 +00:00
|
|
|
update_domain(&dma_dom->domain);
|
|
|
|
|
2009-05-18 14:38:55 +00:00
|
|
|
free_page((unsigned long)dma_dom->aperture[index]->bitmap);
|
|
|
|
|
|
|
|
kfree(dma_dom->aperture[index]);
|
|
|
|
dma_dom->aperture[index] = NULL;
|
|
|
|
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2009-05-15 10:30:05 +00:00
|
|
|
static unsigned long dma_ops_area_alloc(struct device *dev,
|
|
|
|
struct dma_ops_domain *dom,
|
|
|
|
unsigned int pages,
|
|
|
|
unsigned long align_mask,
|
|
|
|
u64 dma_mask,
|
|
|
|
unsigned long start)
|
|
|
|
{
|
2009-05-18 13:32:48 +00:00
|
|
|
unsigned long next_bit = dom->next_address % APERTURE_RANGE_SIZE;
|
2009-05-15 10:30:05 +00:00
|
|
|
int max_index = dom->aperture_size >> APERTURE_RANGE_SHIFT;
|
|
|
|
int i = start >> APERTURE_RANGE_SHIFT;
|
|
|
|
unsigned long boundary_size;
|
|
|
|
unsigned long address = -1;
|
|
|
|
unsigned long limit;
|
|
|
|
|
2009-05-18 13:32:48 +00:00
|
|
|
next_bit >>= PAGE_SHIFT;
|
|
|
|
|
2009-05-15 10:30:05 +00:00
|
|
|
boundary_size = ALIGN(dma_get_seg_boundary(dev) + 1,
|
|
|
|
PAGE_SIZE) >> PAGE_SHIFT;
|
|
|
|
|
|
|
|
for (;i < max_index; ++i) {
|
|
|
|
unsigned long offset = dom->aperture[i]->offset >> PAGE_SHIFT;
|
|
|
|
|
|
|
|
if (dom->aperture[i]->offset >= dma_mask)
|
|
|
|
break;
|
|
|
|
|
|
|
|
limit = iommu_device_max_index(APERTURE_RANGE_PAGES, offset,
|
|
|
|
dma_mask >> PAGE_SHIFT);
|
|
|
|
|
|
|
|
address = iommu_area_alloc(dom->aperture[i]->bitmap,
|
|
|
|
limit, next_bit, pages, 0,
|
|
|
|
boundary_size, align_mask);
|
|
|
|
if (address != -1) {
|
|
|
|
address = dom->aperture[i]->offset +
|
|
|
|
(address << PAGE_SHIFT);
|
2009-05-18 13:32:48 +00:00
|
|
|
dom->next_address = address + (pages << PAGE_SHIFT);
|
2009-05-15 10:30:05 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
next_bit = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return address;
|
|
|
|
}
|
|
|
|
|
2008-06-26 19:27:57 +00:00
|
|
|
static unsigned long dma_ops_alloc_addresses(struct device *dev,
|
|
|
|
struct dma_ops_domain *dom,
|
2008-09-04 17:18:02 +00:00
|
|
|
unsigned int pages,
|
2008-09-18 13:54:23 +00:00
|
|
|
unsigned long align_mask,
|
|
|
|
u64 dma_mask)
|
2008-06-26 19:27:57 +00:00
|
|
|
{
|
|
|
|
unsigned long address;
|
|
|
|
|
2009-05-22 10:27:53 +00:00
|
|
|
#ifdef CONFIG_IOMMU_STRESS
|
|
|
|
dom->next_address = 0;
|
|
|
|
dom->need_flush = true;
|
|
|
|
#endif
|
2008-06-26 19:27:57 +00:00
|
|
|
|
2009-05-15 10:30:05 +00:00
|
|
|
address = dma_ops_area_alloc(dev, dom, pages, align_mask,
|
2009-05-18 13:32:48 +00:00
|
|
|
dma_mask, dom->next_address);
|
2008-06-26 19:27:57 +00:00
|
|
|
|
2008-09-04 16:40:05 +00:00
|
|
|
if (address == -1) {
|
2009-05-18 13:32:48 +00:00
|
|
|
dom->next_address = 0;
|
2009-05-15 10:30:05 +00:00
|
|
|
address = dma_ops_area_alloc(dev, dom, pages, align_mask,
|
|
|
|
dma_mask, 0);
|
2008-09-04 16:40:05 +00:00
|
|
|
dom->need_flush = true;
|
|
|
|
}
|
2008-06-26 19:27:57 +00:00
|
|
|
|
2009-05-15 10:30:05 +00:00
|
|
|
if (unlikely(address == -1))
|
2009-11-15 12:19:53 +00:00
|
|
|
address = DMA_ERROR_CODE;
|
2008-06-26 19:27:57 +00:00
|
|
|
|
|
|
|
WARN_ON((address + (PAGE_SIZE*pages)) > dom->aperture_size);
|
|
|
|
|
|
|
|
return address;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* The address free function.
|
|
|
|
*
|
|
|
|
* called with domain->lock held
|
|
|
|
*/
|
2008-06-26 19:27:57 +00:00
|
|
|
static void dma_ops_free_addresses(struct dma_ops_domain *dom,
|
|
|
|
unsigned long address,
|
|
|
|
unsigned int pages)
|
|
|
|
{
|
2009-05-15 10:30:05 +00:00
|
|
|
unsigned i = address >> APERTURE_RANGE_SHIFT;
|
|
|
|
struct aperture_range *range = dom->aperture[i];
|
2008-11-06 13:59:05 +00:00
|
|
|
|
2009-05-15 10:30:05 +00:00
|
|
|
BUG_ON(i >= APERTURE_MAX_RANGES || range == NULL);
|
|
|
|
|
2009-05-22 10:40:54 +00:00
|
|
|
#ifdef CONFIG_IOMMU_STRESS
|
|
|
|
if (i < 4)
|
|
|
|
return;
|
|
|
|
#endif
|
2008-11-06 13:59:05 +00:00
|
|
|
|
2009-05-18 13:32:48 +00:00
|
|
|
if (address >= dom->next_address)
|
2008-11-06 13:59:05 +00:00
|
|
|
dom->need_flush = true;
|
2009-05-15 10:30:05 +00:00
|
|
|
|
|
|
|
address = (address % APERTURE_RANGE_SIZE) >> PAGE_SHIFT;
|
2009-05-18 13:32:48 +00:00
|
|
|
|
2009-12-16 00:48:28 +00:00
|
|
|
bitmap_clear(range->bitmap, address, pages);
|
2009-05-15 10:30:05 +00:00
|
|
|
|
2008-06-26 19:27:57 +00:00
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/****************************************************************************
|
|
|
|
*
|
|
|
|
* The next functions belong to the domain allocation. A domain is
|
|
|
|
* allocated for every IOMMU as the default domain. If device isolation
|
|
|
|
* is enabled, every device get its own domain. The most important thing
|
|
|
|
* about domains is the page table mapping the DMA address space they
|
|
|
|
* contain.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2009-11-20 15:44:01 +00:00
|
|
|
/*
|
|
|
|
* This function adds a protection domain to the global protection domain list
|
|
|
|
*/
|
|
|
|
static void add_domain_to_list(struct protection_domain *domain)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&amd_iommu_pd_lock, flags);
|
|
|
|
list_add(&domain->list, &amd_iommu_pd_list);
|
|
|
|
spin_unlock_irqrestore(&amd_iommu_pd_lock, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This function removes a protection domain to the global
|
|
|
|
* protection domain list
|
|
|
|
*/
|
|
|
|
static void del_domain_from_list(struct protection_domain *domain)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&amd_iommu_pd_lock, flags);
|
|
|
|
list_del(&domain->list);
|
|
|
|
spin_unlock_irqrestore(&amd_iommu_pd_lock, flags);
|
|
|
|
}
|
|
|
|
|
2008-06-26 19:27:58 +00:00
|
|
|
static u16 domain_id_alloc(void)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
int id;
|
|
|
|
|
|
|
|
write_lock_irqsave(&amd_iommu_devtable_lock, flags);
|
|
|
|
id = find_first_zero_bit(amd_iommu_pd_alloc_bitmap, MAX_DOMAIN_ID);
|
|
|
|
BUG_ON(id == 0);
|
|
|
|
if (id > 0 && id < MAX_DOMAIN_ID)
|
|
|
|
__set_bit(id, amd_iommu_pd_alloc_bitmap);
|
|
|
|
else
|
|
|
|
id = 0;
|
|
|
|
write_unlock_irqrestore(&amd_iommu_devtable_lock, flags);
|
|
|
|
|
|
|
|
return id;
|
|
|
|
}
|
|
|
|
|
2008-12-02 17:28:53 +00:00
|
|
|
static void domain_id_free(int id)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
write_lock_irqsave(&amd_iommu_devtable_lock, flags);
|
|
|
|
if (id > 0 && id < MAX_DOMAIN_ID)
|
|
|
|
__clear_bit(id, amd_iommu_pd_alloc_bitmap);
|
|
|
|
write_unlock_irqrestore(&amd_iommu_devtable_lock, flags);
|
|
|
|
}
|
|
|
|
|
2008-12-02 17:20:21 +00:00
|
|
|
static void free_pagetable(struct protection_domain *domain)
|
2008-06-26 19:27:58 +00:00
|
|
|
{
|
|
|
|
int i, j;
|
|
|
|
u64 *p1, *p2, *p3;
|
|
|
|
|
2008-12-02 17:20:21 +00:00
|
|
|
p1 = domain->pt_root;
|
2008-06-26 19:27:58 +00:00
|
|
|
|
|
|
|
if (!p1)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (i = 0; i < 512; ++i) {
|
|
|
|
if (!IOMMU_PTE_PRESENT(p1[i]))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
p2 = IOMMU_PTE_PAGE(p1[i]);
|
2008-12-04 15:44:31 +00:00
|
|
|
for (j = 0; j < 512; ++j) {
|
2008-06-26 19:27:58 +00:00
|
|
|
if (!IOMMU_PTE_PRESENT(p2[j]))
|
|
|
|
continue;
|
|
|
|
p3 = IOMMU_PTE_PAGE(p2[j]);
|
|
|
|
free_page((unsigned long)p3);
|
|
|
|
}
|
|
|
|
|
|
|
|
free_page((unsigned long)p2);
|
|
|
|
}
|
|
|
|
|
|
|
|
free_page((unsigned long)p1);
|
2008-12-02 17:20:21 +00:00
|
|
|
|
|
|
|
domain->pt_root = NULL;
|
2008-06-26 19:27:58 +00:00
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* Free a domain, only used if something went wrong in the
|
|
|
|
* allocation path and we need to free an already allocated page table
|
|
|
|
*/
|
2008-06-26 19:27:58 +00:00
|
|
|
static void dma_ops_domain_free(struct dma_ops_domain *dom)
|
|
|
|
{
|
2009-05-15 10:30:05 +00:00
|
|
|
int i;
|
|
|
|
|
2008-06-26 19:27:58 +00:00
|
|
|
if (!dom)
|
|
|
|
return;
|
|
|
|
|
2009-11-20 15:44:01 +00:00
|
|
|
del_domain_from_list(&dom->domain);
|
|
|
|
|
2008-12-02 17:20:21 +00:00
|
|
|
free_pagetable(&dom->domain);
|
2008-06-26 19:27:58 +00:00
|
|
|
|
2009-05-15 10:30:05 +00:00
|
|
|
for (i = 0; i < APERTURE_MAX_RANGES; ++i) {
|
|
|
|
if (!dom->aperture[i])
|
|
|
|
continue;
|
|
|
|
free_page((unsigned long)dom->aperture[i]->bitmap);
|
|
|
|
kfree(dom->aperture[i]);
|
|
|
|
}
|
2008-06-26 19:27:58 +00:00
|
|
|
|
|
|
|
kfree(dom);
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* Allocates a new protection domain usable for the dma_ops functions.
|
tree-wide: fix comment/printk typos
"gadget", "through", "command", "maintain", "maintain", "controller", "address",
"between", "initiali[zs]e", "instead", "function", "select", "already",
"equal", "access", "management", "hierarchy", "registration", "interest",
"relative", "memory", "offset", "already",
Signed-off-by: Uwe Kleine-König <u.kleine-koenig@pengutronix.de>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
2010-11-01 19:38:34 +00:00
|
|
|
* It also initializes the page table and the address allocator data
|
2008-07-11 15:14:22 +00:00
|
|
|
* structures required for the dma_ops interface
|
|
|
|
*/
|
2009-11-24 16:26:43 +00:00
|
|
|
static struct dma_ops_domain *dma_ops_domain_alloc(void)
|
2008-06-26 19:27:58 +00:00
|
|
|
{
|
|
|
|
struct dma_ops_domain *dma_dom;
|
|
|
|
|
|
|
|
dma_dom = kzalloc(sizeof(struct dma_ops_domain), GFP_KERNEL);
|
|
|
|
if (!dma_dom)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
spin_lock_init(&dma_dom->domain.lock);
|
|
|
|
|
|
|
|
dma_dom->domain.id = domain_id_alloc();
|
|
|
|
if (dma_dom->domain.id == 0)
|
|
|
|
goto free_dma_dom;
|
2009-11-26 10:13:32 +00:00
|
|
|
INIT_LIST_HEAD(&dma_dom->domain.dev_list);
|
2009-09-02 14:55:24 +00:00
|
|
|
dma_dom->domain.mode = PAGE_MODE_2_LEVEL;
|
2008-06-26 19:27:58 +00:00
|
|
|
dma_dom->domain.pt_root = (void *)get_zeroed_page(GFP_KERNEL);
|
2008-12-02 16:46:25 +00:00
|
|
|
dma_dom->domain.flags = PD_DMA_OPS_MASK;
|
2008-06-26 19:27:58 +00:00
|
|
|
dma_dom->domain.priv = dma_dom;
|
|
|
|
if (!dma_dom->domain.pt_root)
|
|
|
|
goto free_dma_dom;
|
|
|
|
|
2008-09-04 16:40:05 +00:00
|
|
|
dma_dom->need_flush = false;
|
2008-09-11 08:24:48 +00:00
|
|
|
dma_dom->target_dev = 0xffff;
|
2008-09-04 16:40:05 +00:00
|
|
|
|
2009-11-20 15:44:01 +00:00
|
|
|
add_domain_to_list(&dma_dom->domain);
|
|
|
|
|
2009-11-23 18:08:46 +00:00
|
|
|
if (alloc_new_range(dma_dom, true, GFP_KERNEL))
|
2008-06-26 19:27:58 +00:00
|
|
|
goto free_dma_dom;
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
2008-06-26 19:27:58 +00:00
|
|
|
* mark the first page as allocated so we never return 0 as
|
|
|
|
* a valid dma-address. So we can use 0 as error value
|
2008-07-11 15:14:22 +00:00
|
|
|
*/
|
2009-05-15 10:30:05 +00:00
|
|
|
dma_dom->aperture[0]->bitmap[0] = 1;
|
2009-05-18 13:32:48 +00:00
|
|
|
dma_dom->next_address = 0;
|
2008-06-26 19:27:58 +00:00
|
|
|
|
|
|
|
|
|
|
|
return dma_dom;
|
|
|
|
|
|
|
|
free_dma_dom:
|
|
|
|
dma_ops_domain_free(dma_dom);
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2008-12-02 16:49:42 +00:00
|
|
|
/*
|
|
|
|
* little helper function to check whether a given protection domain is a
|
|
|
|
* dma_ops domain
|
|
|
|
*/
|
|
|
|
static bool dma_ops_domain(struct protection_domain *domain)
|
|
|
|
{
|
|
|
|
return domain->flags & PD_DMA_OPS_MASK;
|
|
|
|
}
|
|
|
|
|
2009-09-02 14:07:00 +00:00
|
|
|
static void set_dte_entry(u16 devid, struct protection_domain *domain)
|
2008-06-26 19:27:59 +00:00
|
|
|
{
|
|
|
|
u64 pte_root = virt_to_phys(domain->pt_root);
|
2008-12-02 16:56:36 +00:00
|
|
|
|
2008-09-11 08:38:32 +00:00
|
|
|
pte_root |= (domain->mode & DEV_ENTRY_MODE_MASK)
|
|
|
|
<< DEV_ENTRY_MODE_SHIFT;
|
|
|
|
pte_root |= IOMMU_PTE_IR | IOMMU_PTE_IW | IOMMU_PTE_P | IOMMU_PTE_TV;
|
2008-06-26 19:27:59 +00:00
|
|
|
|
|
|
|
amd_iommu_dev_table[devid].data[2] = domain->id;
|
2009-08-31 14:01:48 +00:00
|
|
|
amd_iommu_dev_table[devid].data[1] = upper_32_bits(pte_root);
|
|
|
|
amd_iommu_dev_table[devid].data[0] = lower_32_bits(pte_root);
|
2009-11-24 14:39:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void clear_dte_entry(u16 devid)
|
|
|
|
{
|
|
|
|
/* remove entry from the device table seen by the hardware */
|
|
|
|
amd_iommu_dev_table[devid].data[0] = IOMMU_PTE_P | IOMMU_PTE_TV;
|
|
|
|
amd_iommu_dev_table[devid].data[1] = 0;
|
|
|
|
amd_iommu_dev_table[devid].data[2] = 0;
|
|
|
|
|
|
|
|
amd_iommu_apply_erratum_63(devid);
|
2009-11-26 13:49:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void do_attach(struct device *dev, struct protection_domain *domain)
|
|
|
|
{
|
|
|
|
struct iommu_dev_data *dev_data;
|
|
|
|
struct amd_iommu *iommu;
|
|
|
|
u16 devid;
|
|
|
|
|
|
|
|
devid = get_device_id(dev);
|
|
|
|
iommu = amd_iommu_rlookup_table[devid];
|
|
|
|
dev_data = get_dev_data(dev);
|
|
|
|
|
|
|
|
/* Update data structures */
|
|
|
|
dev_data->domain = domain;
|
|
|
|
list_add(&dev_data->list, &domain->dev_list);
|
|
|
|
set_dte_entry(devid, domain);
|
|
|
|
|
|
|
|
/* Do reference counting */
|
|
|
|
domain->dev_iommu[iommu->index] += 1;
|
|
|
|
domain->dev_cnt += 1;
|
|
|
|
|
|
|
|
/* Flush the DTE entry */
|
2009-11-26 14:04:38 +00:00
|
|
|
iommu_flush_device(dev);
|
2009-11-26 13:49:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void do_detach(struct device *dev)
|
|
|
|
{
|
|
|
|
struct iommu_dev_data *dev_data;
|
|
|
|
struct amd_iommu *iommu;
|
|
|
|
u16 devid;
|
|
|
|
|
|
|
|
devid = get_device_id(dev);
|
|
|
|
iommu = amd_iommu_rlookup_table[devid];
|
|
|
|
dev_data = get_dev_data(dev);
|
2009-11-24 14:39:42 +00:00
|
|
|
|
|
|
|
/* decrease reference counters */
|
2009-11-26 13:49:59 +00:00
|
|
|
dev_data->domain->dev_iommu[iommu->index] -= 1;
|
|
|
|
dev_data->domain->dev_cnt -= 1;
|
|
|
|
|
|
|
|
/* Update data structures */
|
|
|
|
dev_data->domain = NULL;
|
|
|
|
list_del(&dev_data->list);
|
|
|
|
clear_dte_entry(devid);
|
2009-11-24 14:39:42 +00:00
|
|
|
|
2009-11-26 13:49:59 +00:00
|
|
|
/* Flush the DTE entry */
|
2009-11-26 14:04:38 +00:00
|
|
|
iommu_flush_device(dev);
|
2009-09-03 15:14:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If a device is not yet associated with a domain, this function does
|
|
|
|
* assigns it visible for the hardware
|
|
|
|
*/
|
2009-11-24 14:39:42 +00:00
|
|
|
static int __attach_device(struct device *dev,
|
|
|
|
struct protection_domain *domain)
|
2009-09-03 15:14:57 +00:00
|
|
|
{
|
2009-11-23 14:26:46 +00:00
|
|
|
struct iommu_dev_data *dev_data, *alias_data;
|
2010-05-27 10:31:51 +00:00
|
|
|
int ret;
|
2009-11-23 14:26:46 +00:00
|
|
|
|
|
|
|
dev_data = get_dev_data(dev);
|
|
|
|
alias_data = get_dev_data(dev_data->alias);
|
2009-11-26 13:49:59 +00:00
|
|
|
|
2009-11-23 14:26:46 +00:00
|
|
|
if (!alias_data)
|
|
|
|
return -EINVAL;
|
2009-11-24 14:39:42 +00:00
|
|
|
|
2009-09-03 15:14:57 +00:00
|
|
|
/* lock domain */
|
|
|
|
spin_lock(&domain->lock);
|
|
|
|
|
2009-11-24 14:39:42 +00:00
|
|
|
/* Some sanity checks */
|
2010-05-27 10:31:51 +00:00
|
|
|
ret = -EBUSY;
|
2009-11-23 14:26:46 +00:00
|
|
|
if (alias_data->domain != NULL &&
|
|
|
|
alias_data->domain != domain)
|
2010-05-27 10:31:51 +00:00
|
|
|
goto out_unlock;
|
2009-09-01 10:07:08 +00:00
|
|
|
|
2009-11-23 14:26:46 +00:00
|
|
|
if (dev_data->domain != NULL &&
|
|
|
|
dev_data->domain != domain)
|
2010-05-27 10:31:51 +00:00
|
|
|
goto out_unlock;
|
2009-11-24 14:39:42 +00:00
|
|
|
|
|
|
|
/* Do real assignment */
|
2009-11-26 13:49:59 +00:00
|
|
|
if (dev_data->alias != dev) {
|
|
|
|
alias_data = get_dev_data(dev_data->alias);
|
|
|
|
if (alias_data->domain == NULL)
|
|
|
|
do_attach(dev_data->alias, domain);
|
2009-11-25 14:59:57 +00:00
|
|
|
|
|
|
|
atomic_inc(&alias_data->bind);
|
2009-11-23 14:26:46 +00:00
|
|
|
}
|
2009-11-24 14:39:42 +00:00
|
|
|
|
2009-11-26 13:49:59 +00:00
|
|
|
if (dev_data->domain == NULL)
|
|
|
|
do_attach(dev, domain);
|
2009-09-01 10:07:08 +00:00
|
|
|
|
2009-11-25 14:59:57 +00:00
|
|
|
atomic_inc(&dev_data->bind);
|
|
|
|
|
2010-05-27 10:31:51 +00:00
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
out_unlock:
|
|
|
|
|
2009-09-01 10:07:08 +00:00
|
|
|
/* ready */
|
|
|
|
spin_unlock(&domain->lock);
|
2009-11-24 14:39:42 +00:00
|
|
|
|
2010-05-27 10:31:51 +00:00
|
|
|
return ret;
|
2009-08-26 13:26:30 +00:00
|
|
|
}
|
2008-06-26 19:27:59 +00:00
|
|
|
|
2009-09-02 14:07:00 +00:00
|
|
|
/*
|
|
|
|
* If a device is not yet associated with a domain, this function does
|
|
|
|
* assigns it visible for the hardware
|
|
|
|
*/
|
2009-11-24 14:39:42 +00:00
|
|
|
static int attach_device(struct device *dev,
|
|
|
|
struct protection_domain *domain)
|
2009-08-26 13:26:30 +00:00
|
|
|
{
|
2009-09-01 10:07:08 +00:00
|
|
|
unsigned long flags;
|
2009-11-24 14:39:42 +00:00
|
|
|
int ret;
|
2009-09-01 10:07:08 +00:00
|
|
|
|
|
|
|
write_lock_irqsave(&amd_iommu_devtable_lock, flags);
|
2009-11-24 14:39:42 +00:00
|
|
|
ret = __attach_device(dev, domain);
|
2008-06-26 19:27:59 +00:00
|
|
|
write_unlock_irqrestore(&amd_iommu_devtable_lock, flags);
|
|
|
|
|
2009-08-26 13:26:30 +00:00
|
|
|
/*
|
|
|
|
* We might boot into a crash-kernel here. The crashed kernel
|
|
|
|
* left the caches in the IOMMU dirty. So we have to flush
|
|
|
|
* here to evict all dirty stuff.
|
|
|
|
*/
|
2009-11-20 14:30:58 +00:00
|
|
|
iommu_flush_tlb_pde(domain);
|
2009-11-24 14:39:42 +00:00
|
|
|
|
|
|
|
return ret;
|
2008-06-26 19:27:59 +00:00
|
|
|
}
|
|
|
|
|
2008-12-08 11:02:41 +00:00
|
|
|
/*
|
|
|
|
* Removes a device from a protection domain (unlocked)
|
|
|
|
*/
|
2009-11-24 14:39:42 +00:00
|
|
|
static void __detach_device(struct device *dev)
|
2008-12-08 11:02:41 +00:00
|
|
|
{
|
2009-11-23 14:26:46 +00:00
|
|
|
struct iommu_dev_data *dev_data = get_dev_data(dev);
|
2009-11-25 14:59:57 +00:00
|
|
|
struct iommu_dev_data *alias_data;
|
2010-01-22 15:45:31 +00:00
|
|
|
struct protection_domain *domain;
|
2009-11-26 10:13:32 +00:00
|
|
|
unsigned long flags;
|
2009-11-20 13:57:32 +00:00
|
|
|
|
2009-11-26 13:49:59 +00:00
|
|
|
BUG_ON(!dev_data->domain);
|
2008-12-08 11:02:41 +00:00
|
|
|
|
2010-01-22 15:45:31 +00:00
|
|
|
domain = dev_data->domain;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&domain->lock, flags);
|
2009-11-25 14:59:57 +00:00
|
|
|
|
2009-11-26 13:49:59 +00:00
|
|
|
if (dev_data->alias != dev) {
|
2009-11-25 14:59:57 +00:00
|
|
|
alias_data = get_dev_data(dev_data->alias);
|
2009-11-26 13:49:59 +00:00
|
|
|
if (atomic_dec_and_test(&alias_data->bind))
|
|
|
|
do_detach(dev_data->alias);
|
2009-11-25 14:59:57 +00:00
|
|
|
}
|
|
|
|
|
2009-11-26 13:49:59 +00:00
|
|
|
if (atomic_dec_and_test(&dev_data->bind))
|
|
|
|
do_detach(dev);
|
|
|
|
|
2010-01-22 15:45:31 +00:00
|
|
|
spin_unlock_irqrestore(&domain->lock, flags);
|
2009-09-01 09:59:42 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If we run in passthrough mode the device must be assigned to the
|
2010-01-22 16:55:27 +00:00
|
|
|
* passthrough domain if it is detached from any other domain.
|
|
|
|
* Make sure we can deassign from the pt_domain itself.
|
2009-09-01 09:59:42 +00:00
|
|
|
*/
|
2010-01-22 16:55:27 +00:00
|
|
|
if (iommu_pass_through &&
|
|
|
|
(dev_data->domain == NULL && domain != pt_domain))
|
2009-11-24 14:39:42 +00:00
|
|
|
__attach_device(dev, pt_domain);
|
2008-12-08 11:02:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Removes a device from a protection domain (with devtable_lock held)
|
|
|
|
*/
|
2009-11-24 14:39:42 +00:00
|
|
|
static void detach_device(struct device *dev)
|
2008-12-08 11:02:41 +00:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
/* lock device table */
|
|
|
|
write_lock_irqsave(&amd_iommu_devtable_lock, flags);
|
2009-11-24 14:39:42 +00:00
|
|
|
__detach_device(dev);
|
2008-12-08 11:02:41 +00:00
|
|
|
write_unlock_irqrestore(&amd_iommu_devtable_lock, flags);
|
|
|
|
}
|
2008-12-10 17:27:25 +00:00
|
|
|
|
2009-11-24 14:39:42 +00:00
|
|
|
/*
|
|
|
|
* Find out the protection domain structure for a given PCI device. This
|
|
|
|
* will give us the pointer to the page table root for example.
|
|
|
|
*/
|
|
|
|
static struct protection_domain *domain_for_device(struct device *dev)
|
|
|
|
{
|
|
|
|
struct protection_domain *dom;
|
2009-11-23 14:26:46 +00:00
|
|
|
struct iommu_dev_data *dev_data, *alias_data;
|
2009-11-24 14:39:42 +00:00
|
|
|
unsigned long flags;
|
|
|
|
u16 devid, alias;
|
|
|
|
|
2009-11-23 14:26:46 +00:00
|
|
|
devid = get_device_id(dev);
|
|
|
|
alias = amd_iommu_alias_table[devid];
|
|
|
|
dev_data = get_dev_data(dev);
|
|
|
|
alias_data = get_dev_data(dev_data->alias);
|
|
|
|
if (!alias_data)
|
|
|
|
return NULL;
|
2009-11-24 14:39:42 +00:00
|
|
|
|
|
|
|
read_lock_irqsave(&amd_iommu_devtable_lock, flags);
|
2009-11-23 14:26:46 +00:00
|
|
|
dom = dev_data->domain;
|
2009-11-24 14:39:42 +00:00
|
|
|
if (dom == NULL &&
|
2009-11-23 14:26:46 +00:00
|
|
|
alias_data->domain != NULL) {
|
|
|
|
__attach_device(dev, alias_data->domain);
|
|
|
|
dom = alias_data->domain;
|
2009-11-24 14:39:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
read_unlock_irqrestore(&amd_iommu_devtable_lock, flags);
|
|
|
|
|
|
|
|
return dom;
|
|
|
|
}
|
|
|
|
|
2008-12-10 17:27:25 +00:00
|
|
|
static int device_change_notifier(struct notifier_block *nb,
|
|
|
|
unsigned long action, void *data)
|
|
|
|
{
|
|
|
|
struct device *dev = data;
|
2009-11-24 16:19:23 +00:00
|
|
|
u16 devid;
|
2008-12-10 17:27:25 +00:00
|
|
|
struct protection_domain *domain;
|
|
|
|
struct dma_ops_domain *dma_domain;
|
|
|
|
struct amd_iommu *iommu;
|
2008-12-10 18:33:26 +00:00
|
|
|
unsigned long flags;
|
2008-12-10 17:27:25 +00:00
|
|
|
|
2009-11-24 16:19:23 +00:00
|
|
|
if (!check_device(dev))
|
|
|
|
return 0;
|
2008-12-10 17:27:25 +00:00
|
|
|
|
2009-11-24 16:19:23 +00:00
|
|
|
devid = get_device_id(dev);
|
|
|
|
iommu = amd_iommu_rlookup_table[devid];
|
2008-12-10 17:27:25 +00:00
|
|
|
|
|
|
|
switch (action) {
|
2009-05-21 07:56:58 +00:00
|
|
|
case BUS_NOTIFY_UNBOUND_DRIVER:
|
2009-11-23 14:26:46 +00:00
|
|
|
|
|
|
|
domain = domain_for_device(dev);
|
|
|
|
|
2008-12-10 17:27:25 +00:00
|
|
|
if (!domain)
|
|
|
|
goto out;
|
2009-09-01 10:22:22 +00:00
|
|
|
if (iommu_pass_through)
|
|
|
|
break;
|
2009-11-24 14:39:42 +00:00
|
|
|
detach_device(dev);
|
2008-12-10 18:33:26 +00:00
|
|
|
break;
|
|
|
|
case BUS_NOTIFY_ADD_DEVICE:
|
2009-11-23 14:26:46 +00:00
|
|
|
|
|
|
|
iommu_init_device(dev);
|
|
|
|
|
|
|
|
domain = domain_for_device(dev);
|
|
|
|
|
2008-12-10 18:33:26 +00:00
|
|
|
/* allocate a protection domain if a device is added */
|
|
|
|
dma_domain = find_protection_domain(devid);
|
|
|
|
if (dma_domain)
|
|
|
|
goto out;
|
2009-11-24 16:26:43 +00:00
|
|
|
dma_domain = dma_ops_domain_alloc();
|
2008-12-10 18:33:26 +00:00
|
|
|
if (!dma_domain)
|
|
|
|
goto out;
|
|
|
|
dma_domain->target_dev = devid;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&iommu_pd_list_lock, flags);
|
|
|
|
list_add_tail(&dma_domain->list, &iommu_pd_list);
|
|
|
|
spin_unlock_irqrestore(&iommu_pd_list_lock, flags);
|
|
|
|
|
2008-12-10 17:27:25 +00:00
|
|
|
break;
|
2009-11-23 14:26:46 +00:00
|
|
|
case BUS_NOTIFY_DEL_DEVICE:
|
|
|
|
|
|
|
|
iommu_uninit_device(dev);
|
|
|
|
|
2008-12-10 17:27:25 +00:00
|
|
|
default:
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2009-11-26 14:04:38 +00:00
|
|
|
iommu_flush_device(dev);
|
2008-12-10 17:27:25 +00:00
|
|
|
iommu_completion_wait(iommu);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2009-07-01 14:23:14 +00:00
|
|
|
static struct notifier_block device_nb = {
|
2008-12-10 17:27:25 +00:00
|
|
|
.notifier_call = device_change_notifier,
|
|
|
|
};
|
2008-12-08 11:02:41 +00:00
|
|
|
|
2009-12-10 10:12:25 +00:00
|
|
|
void amd_iommu_init_notifier(void)
|
|
|
|
{
|
|
|
|
bus_register_notifier(&pci_bus_type, &device_nb);
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*****************************************************************************
|
|
|
|
*
|
|
|
|
* The next functions belong to the dma_ops mapping/unmapping code.
|
|
|
|
*
|
|
|
|
*****************************************************************************/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* In the dma_ops path we only have the struct device. This function
|
|
|
|
* finds the corresponding IOMMU, the protection domain and the
|
|
|
|
* requestor id for a given device.
|
|
|
|
* If the device is not yet associated with a domain this is also done
|
|
|
|
* in this function.
|
|
|
|
*/
|
2009-11-24 15:40:02 +00:00
|
|
|
static struct protection_domain *get_domain(struct device *dev)
|
2008-06-26 19:27:59 +00:00
|
|
|
{
|
2009-11-24 15:40:02 +00:00
|
|
|
struct protection_domain *domain;
|
2008-06-26 19:27:59 +00:00
|
|
|
struct dma_ops_domain *dma_dom;
|
2009-11-24 15:40:02 +00:00
|
|
|
u16 devid = get_device_id(dev);
|
2008-06-26 19:27:59 +00:00
|
|
|
|
2009-11-23 15:52:56 +00:00
|
|
|
if (!check_device(dev))
|
2009-11-24 15:40:02 +00:00
|
|
|
return ERR_PTR(-EINVAL);
|
2008-06-26 19:27:59 +00:00
|
|
|
|
2009-11-24 15:40:02 +00:00
|
|
|
domain = domain_for_device(dev);
|
|
|
|
if (domain != NULL && !dma_ops_domain(domain))
|
|
|
|
return ERR_PTR(-EBUSY);
|
2009-11-23 15:52:56 +00:00
|
|
|
|
2009-11-24 15:40:02 +00:00
|
|
|
if (domain != NULL)
|
|
|
|
return domain;
|
2008-06-26 19:27:59 +00:00
|
|
|
|
2009-11-24 14:39:42 +00:00
|
|
|
/* Device not bount yet - bind it */
|
2009-11-24 15:40:02 +00:00
|
|
|
dma_dom = find_protection_domain(devid);
|
2009-11-24 14:39:42 +00:00
|
|
|
if (!dma_dom)
|
2009-11-24 15:40:02 +00:00
|
|
|
dma_dom = amd_iommu_rlookup_table[devid]->default_dom;
|
|
|
|
attach_device(dev, &dma_dom->domain);
|
2009-11-24 14:39:42 +00:00
|
|
|
DUMP_printk("Using protection domain %d for device %s\n",
|
2009-11-24 15:40:02 +00:00
|
|
|
dma_dom->domain.id, dev_name(dev));
|
2008-11-25 11:56:12 +00:00
|
|
|
|
2009-11-24 15:40:02 +00:00
|
|
|
return &dma_dom->domain;
|
2008-06-26 19:27:59 +00:00
|
|
|
}
|
|
|
|
|
2009-09-02 14:00:23 +00:00
|
|
|
static void update_device_table(struct protection_domain *domain)
|
|
|
|
{
|
2009-11-27 12:25:47 +00:00
|
|
|
struct iommu_dev_data *dev_data;
|
2009-09-02 14:00:23 +00:00
|
|
|
|
2009-11-27 12:25:47 +00:00
|
|
|
list_for_each_entry(dev_data, &domain->dev_list, list) {
|
|
|
|
u16 devid = get_device_id(dev_data->dev);
|
|
|
|
set_dte_entry(devid, domain);
|
2009-09-02 14:00:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void update_domain(struct protection_domain *domain)
|
|
|
|
{
|
|
|
|
if (!domain->updated)
|
|
|
|
return;
|
|
|
|
|
|
|
|
update_device_table(domain);
|
2009-11-26 14:35:33 +00:00
|
|
|
iommu_flush_domain_devices(domain);
|
2009-11-20 15:08:55 +00:00
|
|
|
iommu_flush_tlb_pde(domain);
|
2009-09-02 14:00:23 +00:00
|
|
|
|
|
|
|
domain->updated = false;
|
|
|
|
}
|
|
|
|
|
2009-05-12 10:02:46 +00:00
|
|
|
/*
|
|
|
|
* This function fetches the PTE for a given address in the aperture
|
|
|
|
*/
|
|
|
|
static u64* dma_ops_get_pte(struct dma_ops_domain *dom,
|
|
|
|
unsigned long address)
|
|
|
|
{
|
2009-05-15 10:30:05 +00:00
|
|
|
struct aperture_range *aperture;
|
2009-05-12 10:02:46 +00:00
|
|
|
u64 *pte, *pte_page;
|
|
|
|
|
2009-05-15 10:30:05 +00:00
|
|
|
aperture = dom->aperture[APERTURE_RANGE_INDEX(address)];
|
|
|
|
if (!aperture)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
pte = aperture->pte_pages[APERTURE_PAGE_INDEX(address)];
|
2009-05-12 10:02:46 +00:00
|
|
|
if (!pte) {
|
2010-01-15 13:41:15 +00:00
|
|
|
pte = alloc_pte(&dom->domain, address, PAGE_SIZE, &pte_page,
|
2009-09-03 09:33:51 +00:00
|
|
|
GFP_ATOMIC);
|
2009-05-15 10:30:05 +00:00
|
|
|
aperture->pte_pages[APERTURE_PAGE_INDEX(address)] = pte_page;
|
|
|
|
} else
|
2009-09-02 15:30:00 +00:00
|
|
|
pte += PM_LEVEL_INDEX(0, address);
|
2009-05-12 10:02:46 +00:00
|
|
|
|
2009-09-02 14:00:23 +00:00
|
|
|
update_domain(&dom->domain);
|
2009-05-12 10:02:46 +00:00
|
|
|
|
|
|
|
return pte;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* This is the generic map function. It maps one 4kb page at paddr to
|
|
|
|
* the given address in the DMA address space for the domain.
|
|
|
|
*/
|
2009-11-23 17:44:42 +00:00
|
|
|
static dma_addr_t dma_ops_domain_map(struct dma_ops_domain *dom,
|
2008-06-26 19:28:00 +00:00
|
|
|
unsigned long address,
|
|
|
|
phys_addr_t paddr,
|
|
|
|
int direction)
|
|
|
|
{
|
|
|
|
u64 *pte, __pte;
|
|
|
|
|
|
|
|
WARN_ON(address > dom->aperture_size);
|
|
|
|
|
|
|
|
paddr &= PAGE_MASK;
|
|
|
|
|
2009-05-12 10:02:46 +00:00
|
|
|
pte = dma_ops_get_pte(dom, address);
|
2009-05-12 10:17:38 +00:00
|
|
|
if (!pte)
|
2009-11-15 12:19:53 +00:00
|
|
|
return DMA_ERROR_CODE;
|
2008-06-26 19:28:00 +00:00
|
|
|
|
|
|
|
__pte = paddr | IOMMU_PTE_P | IOMMU_PTE_FC;
|
|
|
|
|
|
|
|
if (direction == DMA_TO_DEVICE)
|
|
|
|
__pte |= IOMMU_PTE_IR;
|
|
|
|
else if (direction == DMA_FROM_DEVICE)
|
|
|
|
__pte |= IOMMU_PTE_IW;
|
|
|
|
else if (direction == DMA_BIDIRECTIONAL)
|
|
|
|
__pte |= IOMMU_PTE_IR | IOMMU_PTE_IW;
|
|
|
|
|
|
|
|
WARN_ON(*pte);
|
|
|
|
|
|
|
|
*pte = __pte;
|
|
|
|
|
|
|
|
return (dma_addr_t)address;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* The generic unmapping function for on page in the DMA address space.
|
|
|
|
*/
|
2009-11-23 17:44:42 +00:00
|
|
|
static void dma_ops_domain_unmap(struct dma_ops_domain *dom,
|
2008-06-26 19:28:00 +00:00
|
|
|
unsigned long address)
|
|
|
|
{
|
2009-05-15 10:30:05 +00:00
|
|
|
struct aperture_range *aperture;
|
2008-06-26 19:28:00 +00:00
|
|
|
u64 *pte;
|
|
|
|
|
|
|
|
if (address >= dom->aperture_size)
|
|
|
|
return;
|
|
|
|
|
2009-05-15 10:30:05 +00:00
|
|
|
aperture = dom->aperture[APERTURE_RANGE_INDEX(address)];
|
|
|
|
if (!aperture)
|
|
|
|
return;
|
|
|
|
|
|
|
|
pte = aperture->pte_pages[APERTURE_PAGE_INDEX(address)];
|
|
|
|
if (!pte)
|
|
|
|
return;
|
2008-06-26 19:28:00 +00:00
|
|
|
|
2009-09-02 15:30:00 +00:00
|
|
|
pte += PM_LEVEL_INDEX(0, address);
|
2008-06-26 19:28:00 +00:00
|
|
|
|
|
|
|
WARN_ON(!*pte);
|
|
|
|
|
|
|
|
*pte = 0ULL;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* This function contains common code for mapping of a physically
|
2008-12-08 13:25:39 +00:00
|
|
|
* contiguous memory region into DMA address space. It is used by all
|
|
|
|
* mapping functions provided with this IOMMU driver.
|
2008-07-11 15:14:22 +00:00
|
|
|
* Must be called with the domain lock held.
|
|
|
|
*/
|
2008-06-26 19:28:00 +00:00
|
|
|
static dma_addr_t __map_single(struct device *dev,
|
|
|
|
struct dma_ops_domain *dma_dom,
|
|
|
|
phys_addr_t paddr,
|
|
|
|
size_t size,
|
2008-09-04 17:18:02 +00:00
|
|
|
int dir,
|
2008-09-18 13:54:23 +00:00
|
|
|
bool align,
|
|
|
|
u64 dma_mask)
|
2008-06-26 19:28:00 +00:00
|
|
|
{
|
|
|
|
dma_addr_t offset = paddr & ~PAGE_MASK;
|
2009-05-12 10:17:38 +00:00
|
|
|
dma_addr_t address, start, ret;
|
2008-06-26 19:28:00 +00:00
|
|
|
unsigned int pages;
|
2008-09-04 17:18:02 +00:00
|
|
|
unsigned long align_mask = 0;
|
2008-06-26 19:28:00 +00:00
|
|
|
int i;
|
|
|
|
|
2008-10-16 05:02:11 +00:00
|
|
|
pages = iommu_num_pages(paddr, size, PAGE_SIZE);
|
2008-06-26 19:28:00 +00:00
|
|
|
paddr &= PAGE_MASK;
|
|
|
|
|
2008-12-12 15:13:04 +00:00
|
|
|
INC_STATS_COUNTER(total_map_requests);
|
|
|
|
|
2008-12-12 14:42:39 +00:00
|
|
|
if (pages > 1)
|
|
|
|
INC_STATS_COUNTER(cross_page);
|
|
|
|
|
2008-09-04 17:18:02 +00:00
|
|
|
if (align)
|
|
|
|
align_mask = (1UL << get_order(size)) - 1;
|
|
|
|
|
2009-05-19 08:23:15 +00:00
|
|
|
retry:
|
2008-09-18 13:54:23 +00:00
|
|
|
address = dma_ops_alloc_addresses(dev, dma_dom, pages, align_mask,
|
|
|
|
dma_mask);
|
2009-11-15 12:19:53 +00:00
|
|
|
if (unlikely(address == DMA_ERROR_CODE)) {
|
2009-05-19 08:23:15 +00:00
|
|
|
/*
|
|
|
|
* setting next_address here will let the address
|
|
|
|
* allocator only scan the new allocated range in the
|
|
|
|
* first run. This is a small optimization.
|
|
|
|
*/
|
|
|
|
dma_dom->next_address = dma_dom->aperture_size;
|
|
|
|
|
2009-11-23 18:08:46 +00:00
|
|
|
if (alloc_new_range(dma_dom, false, GFP_ATOMIC))
|
2009-05-19 08:23:15 +00:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
/*
|
tree-wide: fix assorted typos all over the place
That is "success", "unknown", "through", "performance", "[re|un]mapping"
, "access", "default", "reasonable", "[con]currently", "temperature"
, "channel", "[un]used", "application", "example","hierarchy", "therefore"
, "[over|under]flow", "contiguous", "threshold", "enough" and others.
Signed-off-by: André Goddard Rosa <andre.goddard@gmail.com>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
2009-11-14 15:09:05 +00:00
|
|
|
* aperture was successfully enlarged by 128 MB, try
|
2009-05-19 08:23:15 +00:00
|
|
|
* allocation again
|
|
|
|
*/
|
|
|
|
goto retry;
|
|
|
|
}
|
2008-06-26 19:28:00 +00:00
|
|
|
|
|
|
|
start = address;
|
|
|
|
for (i = 0; i < pages; ++i) {
|
2009-11-23 17:44:42 +00:00
|
|
|
ret = dma_ops_domain_map(dma_dom, start, paddr, dir);
|
2009-11-15 12:19:53 +00:00
|
|
|
if (ret == DMA_ERROR_CODE)
|
2009-05-12 10:17:38 +00:00
|
|
|
goto out_unmap;
|
|
|
|
|
2008-06-26 19:28:00 +00:00
|
|
|
paddr += PAGE_SIZE;
|
|
|
|
start += PAGE_SIZE;
|
|
|
|
}
|
|
|
|
address += offset;
|
|
|
|
|
2008-12-12 14:57:30 +00:00
|
|
|
ADD_STATS_COUNTER(alloced_io_mem, size);
|
|
|
|
|
2008-09-19 16:23:30 +00:00
|
|
|
if (unlikely(dma_dom->need_flush && !amd_iommu_unmap_flush)) {
|
2009-11-20 14:30:58 +00:00
|
|
|
iommu_flush_tlb(&dma_dom->domain);
|
2008-09-04 16:40:05 +00:00
|
|
|
dma_dom->need_flush = false;
|
2009-11-23 17:32:38 +00:00
|
|
|
} else if (unlikely(amd_iommu_np_cache))
|
2009-11-23 17:30:32 +00:00
|
|
|
iommu_flush_pages(&dma_dom->domain, address, size);
|
2008-09-04 13:49:46 +00:00
|
|
|
|
2008-06-26 19:28:00 +00:00
|
|
|
out:
|
|
|
|
return address;
|
2009-05-12 10:17:38 +00:00
|
|
|
|
|
|
|
out_unmap:
|
|
|
|
|
|
|
|
for (--i; i >= 0; --i) {
|
|
|
|
start -= PAGE_SIZE;
|
2009-11-23 17:44:42 +00:00
|
|
|
dma_ops_domain_unmap(dma_dom, start);
|
2009-05-12 10:17:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
dma_ops_free_addresses(dma_dom, address, pages);
|
|
|
|
|
2009-11-15 12:19:53 +00:00
|
|
|
return DMA_ERROR_CODE;
|
2008-06-26 19:28:00 +00:00
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* Does the reverse of the __map_single function. Must be called with
|
|
|
|
* the domain lock held too
|
|
|
|
*/
|
2009-11-23 18:33:56 +00:00
|
|
|
static void __unmap_single(struct dma_ops_domain *dma_dom,
|
2008-06-26 19:28:00 +00:00
|
|
|
dma_addr_t dma_addr,
|
|
|
|
size_t size,
|
|
|
|
int dir)
|
|
|
|
{
|
2010-09-23 14:12:48 +00:00
|
|
|
dma_addr_t flush_addr;
|
2008-06-26 19:28:00 +00:00
|
|
|
dma_addr_t i, start;
|
|
|
|
unsigned int pages;
|
|
|
|
|
2009-11-15 12:19:53 +00:00
|
|
|
if ((dma_addr == DMA_ERROR_CODE) ||
|
2008-12-08 13:40:26 +00:00
|
|
|
(dma_addr + size > dma_dom->aperture_size))
|
2008-06-26 19:28:00 +00:00
|
|
|
return;
|
|
|
|
|
2010-09-23 14:12:48 +00:00
|
|
|
flush_addr = dma_addr;
|
2008-10-16 05:02:11 +00:00
|
|
|
pages = iommu_num_pages(dma_addr, size, PAGE_SIZE);
|
2008-06-26 19:28:00 +00:00
|
|
|
dma_addr &= PAGE_MASK;
|
|
|
|
start = dma_addr;
|
|
|
|
|
|
|
|
for (i = 0; i < pages; ++i) {
|
2009-11-23 17:44:42 +00:00
|
|
|
dma_ops_domain_unmap(dma_dom, start);
|
2008-06-26 19:28:00 +00:00
|
|
|
start += PAGE_SIZE;
|
|
|
|
}
|
|
|
|
|
2008-12-12 14:57:30 +00:00
|
|
|
SUB_STATS_COUNTER(alloced_io_mem, size);
|
|
|
|
|
2008-06-26 19:28:00 +00:00
|
|
|
dma_ops_free_addresses(dma_dom, dma_addr, pages);
|
2008-09-04 13:49:46 +00:00
|
|
|
|
2008-11-06 13:59:05 +00:00
|
|
|
if (amd_iommu_unmap_flush || dma_dom->need_flush) {
|
2010-09-23 14:12:48 +00:00
|
|
|
iommu_flush_pages(&dma_dom->domain, flush_addr, size);
|
2008-11-06 13:59:05 +00:00
|
|
|
dma_dom->need_flush = false;
|
|
|
|
}
|
2008-06-26 19:28:00 +00:00
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* The exported map_single function for dma_ops.
|
|
|
|
*/
|
2009-01-05 14:47:25 +00:00
|
|
|
static dma_addr_t map_page(struct device *dev, struct page *page,
|
|
|
|
unsigned long offset, size_t size,
|
|
|
|
enum dma_data_direction dir,
|
|
|
|
struct dma_attrs *attrs)
|
2008-06-26 19:28:01 +00:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
struct protection_domain *domain;
|
|
|
|
dma_addr_t addr;
|
2008-09-18 13:54:23 +00:00
|
|
|
u64 dma_mask;
|
2009-01-05 14:47:25 +00:00
|
|
|
phys_addr_t paddr = page_to_phys(page) + offset;
|
2008-06-26 19:28:01 +00:00
|
|
|
|
2008-12-12 14:05:16 +00:00
|
|
|
INC_STATS_COUNTER(cnt_map_single);
|
|
|
|
|
2009-11-24 15:40:02 +00:00
|
|
|
domain = get_domain(dev);
|
|
|
|
if (PTR_ERR(domain) == -EINVAL)
|
2008-06-26 19:28:01 +00:00
|
|
|
return (dma_addr_t)paddr;
|
2009-11-24 15:40:02 +00:00
|
|
|
else if (IS_ERR(domain))
|
|
|
|
return DMA_ERROR_CODE;
|
2008-06-26 19:28:01 +00:00
|
|
|
|
2009-11-23 15:52:56 +00:00
|
|
|
dma_mask = *dev->dma_mask;
|
|
|
|
|
2008-06-26 19:28:01 +00:00
|
|
|
spin_lock_irqsave(&domain->lock, flags);
|
2009-11-24 15:40:02 +00:00
|
|
|
|
2009-11-23 18:33:56 +00:00
|
|
|
addr = __map_single(dev, domain->priv, paddr, size, dir, false,
|
2008-09-18 13:54:23 +00:00
|
|
|
dma_mask);
|
2009-11-15 12:19:53 +00:00
|
|
|
if (addr == DMA_ERROR_CODE)
|
2008-06-26 19:28:01 +00:00
|
|
|
goto out;
|
|
|
|
|
2009-11-20 15:00:05 +00:00
|
|
|
iommu_flush_complete(domain);
|
2008-06-26 19:28:01 +00:00
|
|
|
|
|
|
|
out:
|
|
|
|
spin_unlock_irqrestore(&domain->lock, flags);
|
|
|
|
|
|
|
|
return addr;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* The exported unmap_single function for dma_ops.
|
|
|
|
*/
|
2009-01-05 14:47:25 +00:00
|
|
|
static void unmap_page(struct device *dev, dma_addr_t dma_addr, size_t size,
|
|
|
|
enum dma_data_direction dir, struct dma_attrs *attrs)
|
2008-06-26 19:28:01 +00:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
struct protection_domain *domain;
|
|
|
|
|
2008-12-12 14:07:12 +00:00
|
|
|
INC_STATS_COUNTER(cnt_unmap_single);
|
|
|
|
|
2009-11-24 15:40:02 +00:00
|
|
|
domain = get_domain(dev);
|
|
|
|
if (IS_ERR(domain))
|
2008-12-02 16:49:42 +00:00
|
|
|
return;
|
|
|
|
|
2008-06-26 19:28:01 +00:00
|
|
|
spin_lock_irqsave(&domain->lock, flags);
|
|
|
|
|
2009-11-23 18:33:56 +00:00
|
|
|
__unmap_single(domain->priv, dma_addr, size, dir);
|
2008-06-26 19:28:01 +00:00
|
|
|
|
2009-11-20 15:00:05 +00:00
|
|
|
iommu_flush_complete(domain);
|
2008-06-26 19:28:01 +00:00
|
|
|
|
|
|
|
spin_unlock_irqrestore(&domain->lock, flags);
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* This is a special map_sg function which is used if we should map a
|
|
|
|
* device which is not handled by an AMD IOMMU in the system.
|
|
|
|
*/
|
2008-06-26 19:28:02 +00:00
|
|
|
static int map_sg_no_iommu(struct device *dev, struct scatterlist *sglist,
|
|
|
|
int nelems, int dir)
|
|
|
|
{
|
|
|
|
struct scatterlist *s;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for_each_sg(sglist, s, nelems, i) {
|
|
|
|
s->dma_address = (dma_addr_t)sg_phys(s);
|
|
|
|
s->dma_length = s->length;
|
|
|
|
}
|
|
|
|
|
|
|
|
return nelems;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* The exported map_sg function for dma_ops (handles scatter-gather
|
|
|
|
* lists).
|
|
|
|
*/
|
2008-06-26 19:28:02 +00:00
|
|
|
static int map_sg(struct device *dev, struct scatterlist *sglist,
|
2009-01-05 14:59:02 +00:00
|
|
|
int nelems, enum dma_data_direction dir,
|
|
|
|
struct dma_attrs *attrs)
|
2008-06-26 19:28:02 +00:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
struct protection_domain *domain;
|
|
|
|
int i;
|
|
|
|
struct scatterlist *s;
|
|
|
|
phys_addr_t paddr;
|
|
|
|
int mapped_elems = 0;
|
2008-09-18 13:54:23 +00:00
|
|
|
u64 dma_mask;
|
2008-06-26 19:28:02 +00:00
|
|
|
|
2008-12-12 14:09:48 +00:00
|
|
|
INC_STATS_COUNTER(cnt_map_sg);
|
|
|
|
|
2009-11-24 15:40:02 +00:00
|
|
|
domain = get_domain(dev);
|
|
|
|
if (PTR_ERR(domain) == -EINVAL)
|
2009-11-23 15:52:56 +00:00
|
|
|
return map_sg_no_iommu(dev, sglist, nelems, dir);
|
2009-11-24 15:40:02 +00:00
|
|
|
else if (IS_ERR(domain))
|
|
|
|
return 0;
|
2008-09-04 13:04:26 +00:00
|
|
|
|
2008-09-18 13:54:23 +00:00
|
|
|
dma_mask = *dev->dma_mask;
|
2008-06-26 19:28:02 +00:00
|
|
|
|
|
|
|
spin_lock_irqsave(&domain->lock, flags);
|
|
|
|
|
|
|
|
for_each_sg(sglist, s, nelems, i) {
|
|
|
|
paddr = sg_phys(s);
|
|
|
|
|
2009-11-23 18:33:56 +00:00
|
|
|
s->dma_address = __map_single(dev, domain->priv,
|
2008-09-18 13:54:23 +00:00
|
|
|
paddr, s->length, dir, false,
|
|
|
|
dma_mask);
|
2008-06-26 19:28:02 +00:00
|
|
|
|
|
|
|
if (s->dma_address) {
|
|
|
|
s->dma_length = s->length;
|
|
|
|
mapped_elems++;
|
|
|
|
} else
|
|
|
|
goto unmap;
|
|
|
|
}
|
|
|
|
|
2009-11-20 15:00:05 +00:00
|
|
|
iommu_flush_complete(domain);
|
2008-06-26 19:28:02 +00:00
|
|
|
|
|
|
|
out:
|
|
|
|
spin_unlock_irqrestore(&domain->lock, flags);
|
|
|
|
|
|
|
|
return mapped_elems;
|
|
|
|
unmap:
|
|
|
|
for_each_sg(sglist, s, mapped_elems, i) {
|
|
|
|
if (s->dma_address)
|
2009-11-23 18:33:56 +00:00
|
|
|
__unmap_single(domain->priv, s->dma_address,
|
2008-06-26 19:28:02 +00:00
|
|
|
s->dma_length, dir);
|
|
|
|
s->dma_address = s->dma_length = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
mapped_elems = 0;
|
|
|
|
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* The exported map_sg function for dma_ops (handles scatter-gather
|
|
|
|
* lists).
|
|
|
|
*/
|
2008-06-26 19:28:02 +00:00
|
|
|
static void unmap_sg(struct device *dev, struct scatterlist *sglist,
|
2009-01-05 14:59:02 +00:00
|
|
|
int nelems, enum dma_data_direction dir,
|
|
|
|
struct dma_attrs *attrs)
|
2008-06-26 19:28:02 +00:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
struct protection_domain *domain;
|
|
|
|
struct scatterlist *s;
|
|
|
|
int i;
|
|
|
|
|
2008-12-12 14:12:14 +00:00
|
|
|
INC_STATS_COUNTER(cnt_unmap_sg);
|
|
|
|
|
2009-11-24 15:40:02 +00:00
|
|
|
domain = get_domain(dev);
|
|
|
|
if (IS_ERR(domain))
|
2008-12-02 16:49:42 +00:00
|
|
|
return;
|
|
|
|
|
2008-06-26 19:28:02 +00:00
|
|
|
spin_lock_irqsave(&domain->lock, flags);
|
|
|
|
|
|
|
|
for_each_sg(sglist, s, nelems, i) {
|
2009-11-23 18:33:56 +00:00
|
|
|
__unmap_single(domain->priv, s->dma_address,
|
2008-06-26 19:28:02 +00:00
|
|
|
s->dma_length, dir);
|
|
|
|
s->dma_address = s->dma_length = 0;
|
|
|
|
}
|
|
|
|
|
2009-11-20 15:00:05 +00:00
|
|
|
iommu_flush_complete(domain);
|
2008-06-26 19:28:02 +00:00
|
|
|
|
|
|
|
spin_unlock_irqrestore(&domain->lock, flags);
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* The exported alloc_coherent function for dma_ops.
|
|
|
|
*/
|
2008-06-26 19:28:03 +00:00
|
|
|
static void *alloc_coherent(struct device *dev, size_t size,
|
|
|
|
dma_addr_t *dma_addr, gfp_t flag)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
void *virt_addr;
|
|
|
|
struct protection_domain *domain;
|
|
|
|
phys_addr_t paddr;
|
2008-09-18 13:54:23 +00:00
|
|
|
u64 dma_mask = dev->coherent_dma_mask;
|
2008-06-26 19:28:03 +00:00
|
|
|
|
2008-12-12 14:14:21 +00:00
|
|
|
INC_STATS_COUNTER(cnt_alloc_coherent);
|
|
|
|
|
2009-11-24 15:40:02 +00:00
|
|
|
domain = get_domain(dev);
|
|
|
|
if (PTR_ERR(domain) == -EINVAL) {
|
2009-11-23 15:52:56 +00:00
|
|
|
virt_addr = (void *)__get_free_pages(flag, get_order(size));
|
|
|
|
*dma_addr = __pa(virt_addr);
|
|
|
|
return virt_addr;
|
2009-11-24 15:40:02 +00:00
|
|
|
} else if (IS_ERR(domain))
|
|
|
|
return NULL;
|
2008-06-26 19:28:03 +00:00
|
|
|
|
2009-11-23 15:52:56 +00:00
|
|
|
dma_mask = dev->coherent_dma_mask;
|
|
|
|
flag &= ~(__GFP_DMA | __GFP_HIGHMEM | __GFP_DMA32);
|
|
|
|
flag |= __GFP_ZERO;
|
2008-06-26 19:28:03 +00:00
|
|
|
|
|
|
|
virt_addr = (void *)__get_free_pages(flag, get_order(size));
|
|
|
|
if (!virt_addr)
|
2009-07-01 14:23:14 +00:00
|
|
|
return NULL;
|
2008-06-26 19:28:03 +00:00
|
|
|
|
|
|
|
paddr = virt_to_phys(virt_addr);
|
|
|
|
|
2008-09-18 13:54:23 +00:00
|
|
|
if (!dma_mask)
|
|
|
|
dma_mask = *dev->dma_mask;
|
|
|
|
|
2008-06-26 19:28:03 +00:00
|
|
|
spin_lock_irqsave(&domain->lock, flags);
|
|
|
|
|
2009-11-23 18:33:56 +00:00
|
|
|
*dma_addr = __map_single(dev, domain->priv, paddr,
|
2008-09-18 13:54:23 +00:00
|
|
|
size, DMA_BIDIRECTIONAL, true, dma_mask);
|
2008-06-26 19:28:03 +00:00
|
|
|
|
2009-11-15 12:19:53 +00:00
|
|
|
if (*dma_addr == DMA_ERROR_CODE) {
|
2009-05-28 07:54:48 +00:00
|
|
|
spin_unlock_irqrestore(&domain->lock, flags);
|
2008-12-02 16:49:42 +00:00
|
|
|
goto out_free;
|
2009-05-28 07:54:48 +00:00
|
|
|
}
|
2008-06-26 19:28:03 +00:00
|
|
|
|
2009-11-20 15:00:05 +00:00
|
|
|
iommu_flush_complete(domain);
|
2008-06-26 19:28:03 +00:00
|
|
|
|
|
|
|
spin_unlock_irqrestore(&domain->lock, flags);
|
|
|
|
|
|
|
|
return virt_addr;
|
2008-12-02 16:49:42 +00:00
|
|
|
|
|
|
|
out_free:
|
|
|
|
|
|
|
|
free_pages((unsigned long)virt_addr, get_order(size));
|
|
|
|
|
|
|
|
return NULL;
|
2008-06-26 19:28:03 +00:00
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* The exported free_coherent function for dma_ops.
|
|
|
|
*/
|
2008-06-26 19:28:03 +00:00
|
|
|
static void free_coherent(struct device *dev, size_t size,
|
|
|
|
void *virt_addr, dma_addr_t dma_addr)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
struct protection_domain *domain;
|
|
|
|
|
2008-12-12 14:16:38 +00:00
|
|
|
INC_STATS_COUNTER(cnt_free_coherent);
|
|
|
|
|
2009-11-24 15:40:02 +00:00
|
|
|
domain = get_domain(dev);
|
|
|
|
if (IS_ERR(domain))
|
2008-12-02 16:49:42 +00:00
|
|
|
goto free_mem;
|
|
|
|
|
2008-06-26 19:28:03 +00:00
|
|
|
spin_lock_irqsave(&domain->lock, flags);
|
|
|
|
|
2009-11-23 18:33:56 +00:00
|
|
|
__unmap_single(domain->priv, dma_addr, size, DMA_BIDIRECTIONAL);
|
2008-06-26 19:28:03 +00:00
|
|
|
|
2009-11-20 15:00:05 +00:00
|
|
|
iommu_flush_complete(domain);
|
2008-06-26 19:28:03 +00:00
|
|
|
|
|
|
|
spin_unlock_irqrestore(&domain->lock, flags);
|
|
|
|
|
|
|
|
free_mem:
|
|
|
|
free_pages((unsigned long)virt_addr, get_order(size));
|
|
|
|
}
|
|
|
|
|
2008-09-09 16:40:46 +00:00
|
|
|
/*
|
|
|
|
* This function is called by the DMA layer to find out if we can handle a
|
|
|
|
* particular device. It is part of the dma_ops.
|
|
|
|
*/
|
|
|
|
static int amd_iommu_dma_supported(struct device *dev, u64 mask)
|
|
|
|
{
|
2009-11-23 15:14:57 +00:00
|
|
|
return check_device(dev);
|
2008-09-09 16:40:46 +00:00
|
|
|
}
|
|
|
|
|
2008-06-26 19:28:04 +00:00
|
|
|
/*
|
2008-07-11 15:14:22 +00:00
|
|
|
* The function for pre-allocating protection domains.
|
|
|
|
*
|
2008-06-26 19:28:04 +00:00
|
|
|
* If the driver core informs the DMA layer if a driver grabs a device
|
|
|
|
* we don't need to preallocate the protection domains anymore.
|
|
|
|
* For now we have to.
|
|
|
|
*/
|
2008-12-29 16:15:22 +00:00
|
|
|
static void prealloc_protection_domains(void)
|
2008-06-26 19:28:04 +00:00
|
|
|
{
|
|
|
|
struct pci_dev *dev = NULL;
|
|
|
|
struct dma_ops_domain *dma_dom;
|
2009-11-24 16:19:23 +00:00
|
|
|
u16 devid;
|
2008-06-26 19:28:04 +00:00
|
|
|
|
2010-04-03 01:27:55 +00:00
|
|
|
for_each_pci_dev(dev) {
|
2009-11-24 16:19:23 +00:00
|
|
|
|
|
|
|
/* Do we handle this device? */
|
|
|
|
if (!check_device(&dev->dev))
|
2008-06-26 19:28:04 +00:00
|
|
|
continue;
|
2009-11-24 16:19:23 +00:00
|
|
|
|
|
|
|
/* Is there already any domain for it? */
|
2009-11-24 14:39:42 +00:00
|
|
|
if (domain_for_device(&dev->dev))
|
2008-06-26 19:28:04 +00:00
|
|
|
continue;
|
2009-11-24 16:19:23 +00:00
|
|
|
|
|
|
|
devid = get_device_id(&dev->dev);
|
|
|
|
|
2009-11-24 16:26:43 +00:00
|
|
|
dma_dom = dma_ops_domain_alloc();
|
2008-06-26 19:28:04 +00:00
|
|
|
if (!dma_dom)
|
|
|
|
continue;
|
|
|
|
init_unity_mappings_for_device(dma_dom, devid);
|
2008-09-11 08:24:48 +00:00
|
|
|
dma_dom->target_dev = devid;
|
|
|
|
|
2009-11-24 14:39:42 +00:00
|
|
|
attach_device(&dev->dev, &dma_dom->domain);
|
2009-11-23 11:50:00 +00:00
|
|
|
|
2008-09-11 08:24:48 +00:00
|
|
|
list_add_tail(&dma_dom->list, &iommu_pd_list);
|
2008-06-26 19:28:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-01-05 14:59:02 +00:00
|
|
|
static struct dma_map_ops amd_iommu_dma_ops = {
|
2008-06-26 19:28:05 +00:00
|
|
|
.alloc_coherent = alloc_coherent,
|
|
|
|
.free_coherent = free_coherent,
|
2009-01-05 14:47:25 +00:00
|
|
|
.map_page = map_page,
|
|
|
|
.unmap_page = unmap_page,
|
2008-06-26 19:28:05 +00:00
|
|
|
.map_sg = map_sg,
|
|
|
|
.unmap_sg = unmap_sg,
|
2008-09-09 16:40:46 +00:00
|
|
|
.dma_supported = amd_iommu_dma_supported,
|
2008-06-26 19:28:05 +00:00
|
|
|
};
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* The function which clues the AMD IOMMU driver into dma_ops.
|
|
|
|
*/
|
2010-01-22 16:44:35 +00:00
|
|
|
|
|
|
|
void __init amd_iommu_init_api(void)
|
|
|
|
{
|
|
|
|
register_iommu(&amd_iommu_ops);
|
|
|
|
}
|
|
|
|
|
2008-06-26 19:28:05 +00:00
|
|
|
int __init amd_iommu_init_dma_ops(void)
|
|
|
|
{
|
|
|
|
struct amd_iommu *iommu;
|
|
|
|
int ret;
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
|
|
|
* first allocate a default protection domain for every IOMMU we
|
|
|
|
* found in the system. Devices not assigned to any other
|
|
|
|
* protection domain will be assigned to the default one.
|
|
|
|
*/
|
2009-05-04 13:06:20 +00:00
|
|
|
for_each_iommu(iommu) {
|
2009-11-24 16:26:43 +00:00
|
|
|
iommu->default_dom = dma_ops_domain_alloc();
|
2008-06-26 19:28:05 +00:00
|
|
|
if (iommu->default_dom == NULL)
|
|
|
|
return -ENOMEM;
|
2008-12-10 17:48:59 +00:00
|
|
|
iommu->default_dom->domain.flags |= PD_DEFAULT_MASK;
|
2008-06-26 19:28:05 +00:00
|
|
|
ret = iommu_init_unity_mappings(iommu);
|
|
|
|
if (ret)
|
|
|
|
goto free_domains;
|
|
|
|
}
|
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/*
|
2009-11-27 10:40:33 +00:00
|
|
|
* Pre-allocate the protection domains for each device.
|
2008-07-11 15:14:22 +00:00
|
|
|
*/
|
2009-11-27 10:40:33 +00:00
|
|
|
prealloc_protection_domains();
|
2008-06-26 19:28:05 +00:00
|
|
|
|
|
|
|
iommu_detected = 1;
|
2009-11-10 10:46:20 +00:00
|
|
|
swiotlb = 0;
|
2008-06-26 19:28:05 +00:00
|
|
|
|
2008-07-11 15:14:22 +00:00
|
|
|
/* Make the driver finally visible to the drivers */
|
2008-06-26 19:28:05 +00:00
|
|
|
dma_ops = &amd_iommu_dma_ops;
|
|
|
|
|
2008-12-12 12:50:21 +00:00
|
|
|
amd_iommu_stats_init();
|
|
|
|
|
2008-06-26 19:28:05 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
free_domains:
|
|
|
|
|
2009-05-04 13:06:20 +00:00
|
|
|
for_each_iommu(iommu) {
|
2008-06-26 19:28:05 +00:00
|
|
|
if (iommu->default_dom)
|
|
|
|
dma_ops_domain_free(iommu->default_dom);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
2008-12-08 11:05:55 +00:00
|
|
|
|
|
|
|
/*****************************************************************************
|
|
|
|
*
|
|
|
|
* The following functions belong to the exported interface of AMD IOMMU
|
|
|
|
*
|
|
|
|
* This interface allows access to lower level functions of the IOMMU
|
|
|
|
* like protection domain handling and assignement of devices to domains
|
|
|
|
* which is not possible with the dma_ops interface.
|
|
|
|
*
|
|
|
|
*****************************************************************************/
|
|
|
|
|
|
|
|
static void cleanup_domain(struct protection_domain *domain)
|
|
|
|
{
|
2009-11-27 12:25:47 +00:00
|
|
|
struct iommu_dev_data *dev_data, *next;
|
2008-12-08 11:05:55 +00:00
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
write_lock_irqsave(&amd_iommu_devtable_lock, flags);
|
|
|
|
|
2009-11-27 12:25:47 +00:00
|
|
|
list_for_each_entry_safe(dev_data, next, &domain->dev_list, list) {
|
|
|
|
struct device *dev = dev_data->dev;
|
|
|
|
|
2010-02-17 16:51:20 +00:00
|
|
|
__detach_device(dev);
|
2009-11-27 12:25:47 +00:00
|
|
|
atomic_set(&dev_data->bind, 0);
|
|
|
|
}
|
2008-12-08 11:05:55 +00:00
|
|
|
|
|
|
|
write_unlock_irqrestore(&amd_iommu_devtable_lock, flags);
|
|
|
|
}
|
|
|
|
|
2009-08-26 14:52:40 +00:00
|
|
|
static void protection_domain_free(struct protection_domain *domain)
|
|
|
|
{
|
|
|
|
if (!domain)
|
|
|
|
return;
|
|
|
|
|
2009-11-20 15:44:01 +00:00
|
|
|
del_domain_from_list(domain);
|
|
|
|
|
2009-08-26 14:52:40 +00:00
|
|
|
if (domain->id)
|
|
|
|
domain_id_free(domain->id);
|
|
|
|
|
|
|
|
kfree(domain);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct protection_domain *protection_domain_alloc(void)
|
2008-12-02 17:13:27 +00:00
|
|
|
{
|
|
|
|
struct protection_domain *domain;
|
|
|
|
|
|
|
|
domain = kzalloc(sizeof(*domain), GFP_KERNEL);
|
|
|
|
if (!domain)
|
2009-08-26 14:52:40 +00:00
|
|
|
return NULL;
|
2008-12-02 17:13:27 +00:00
|
|
|
|
|
|
|
spin_lock_init(&domain->lock);
|
2010-02-08 13:44:49 +00:00
|
|
|
mutex_init(&domain->api_lock);
|
2008-12-02 17:13:27 +00:00
|
|
|
domain->id = domain_id_alloc();
|
|
|
|
if (!domain->id)
|
2009-08-26 14:52:40 +00:00
|
|
|
goto out_err;
|
2009-11-26 10:13:32 +00:00
|
|
|
INIT_LIST_HEAD(&domain->dev_list);
|
2009-08-26 14:52:40 +00:00
|
|
|
|
2009-11-20 15:44:01 +00:00
|
|
|
add_domain_to_list(domain);
|
|
|
|
|
2009-08-26 14:52:40 +00:00
|
|
|
return domain;
|
|
|
|
|
|
|
|
out_err:
|
|
|
|
kfree(domain);
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int amd_iommu_domain_init(struct iommu_domain *dom)
|
|
|
|
{
|
|
|
|
struct protection_domain *domain;
|
|
|
|
|
|
|
|
domain = protection_domain_alloc();
|
|
|
|
if (!domain)
|
2008-12-02 17:13:27 +00:00
|
|
|
goto out_free;
|
2009-08-26 14:52:40 +00:00
|
|
|
|
|
|
|
domain->mode = PAGE_MODE_3_LEVEL;
|
2008-12-02 17:13:27 +00:00
|
|
|
domain->pt_root = (void *)get_zeroed_page(GFP_KERNEL);
|
|
|
|
if (!domain->pt_root)
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
dom->priv = domain;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out_free:
|
2009-08-26 14:52:40 +00:00
|
|
|
protection_domain_free(domain);
|
2008-12-02 17:13:27 +00:00
|
|
|
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2008-12-02 17:34:12 +00:00
|
|
|
static void amd_iommu_domain_destroy(struct iommu_domain *dom)
|
|
|
|
{
|
|
|
|
struct protection_domain *domain = dom->priv;
|
|
|
|
|
|
|
|
if (!domain)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (domain->dev_cnt > 0)
|
|
|
|
cleanup_domain(domain);
|
|
|
|
|
|
|
|
BUG_ON(domain->dev_cnt != 0);
|
|
|
|
|
|
|
|
free_pagetable(domain);
|
|
|
|
|
2010-03-08 13:20:07 +00:00
|
|
|
protection_domain_free(domain);
|
2008-12-02 17:34:12 +00:00
|
|
|
|
|
|
|
dom->priv = NULL;
|
|
|
|
}
|
|
|
|
|
2008-12-08 11:07:44 +00:00
|
|
|
static void amd_iommu_detach_device(struct iommu_domain *dom,
|
|
|
|
struct device *dev)
|
|
|
|
{
|
2009-11-23 14:26:46 +00:00
|
|
|
struct iommu_dev_data *dev_data = dev->archdata.iommu;
|
2008-12-08 11:07:44 +00:00
|
|
|
struct amd_iommu *iommu;
|
|
|
|
u16 devid;
|
|
|
|
|
2009-11-24 16:19:23 +00:00
|
|
|
if (!check_device(dev))
|
2008-12-08 11:07:44 +00:00
|
|
|
return;
|
|
|
|
|
2009-11-24 16:19:23 +00:00
|
|
|
devid = get_device_id(dev);
|
2008-12-08 11:07:44 +00:00
|
|
|
|
2009-11-23 14:26:46 +00:00
|
|
|
if (dev_data->domain != NULL)
|
2009-11-24 14:39:42 +00:00
|
|
|
detach_device(dev);
|
2008-12-08 11:07:44 +00:00
|
|
|
|
|
|
|
iommu = amd_iommu_rlookup_table[devid];
|
|
|
|
if (!iommu)
|
|
|
|
return;
|
|
|
|
|
2009-11-26 14:04:38 +00:00
|
|
|
iommu_flush_device(dev);
|
2008-12-08 11:07:44 +00:00
|
|
|
iommu_completion_wait(iommu);
|
|
|
|
}
|
|
|
|
|
2008-12-02 18:34:11 +00:00
|
|
|
static int amd_iommu_attach_device(struct iommu_domain *dom,
|
|
|
|
struct device *dev)
|
|
|
|
{
|
|
|
|
struct protection_domain *domain = dom->priv;
|
2009-11-23 14:26:46 +00:00
|
|
|
struct iommu_dev_data *dev_data;
|
2008-12-02 18:34:11 +00:00
|
|
|
struct amd_iommu *iommu;
|
2009-11-24 14:39:42 +00:00
|
|
|
int ret;
|
2008-12-02 18:34:11 +00:00
|
|
|
u16 devid;
|
|
|
|
|
2009-11-24 16:19:23 +00:00
|
|
|
if (!check_device(dev))
|
2008-12-02 18:34:11 +00:00
|
|
|
return -EINVAL;
|
|
|
|
|
2009-11-23 14:26:46 +00:00
|
|
|
dev_data = dev->archdata.iommu;
|
|
|
|
|
2009-11-24 16:19:23 +00:00
|
|
|
devid = get_device_id(dev);
|
2008-12-02 18:34:11 +00:00
|
|
|
|
|
|
|
iommu = amd_iommu_rlookup_table[devid];
|
|
|
|
if (!iommu)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2009-11-23 14:26:46 +00:00
|
|
|
if (dev_data->domain)
|
2009-11-24 14:39:42 +00:00
|
|
|
detach_device(dev);
|
2008-12-02 18:34:11 +00:00
|
|
|
|
2009-11-24 14:39:42 +00:00
|
|
|
ret = attach_device(dev, domain);
|
2008-12-02 18:34:11 +00:00
|
|
|
|
|
|
|
iommu_completion_wait(iommu);
|
|
|
|
|
2009-11-24 14:39:42 +00:00
|
|
|
return ret;
|
2008-12-02 18:34:11 +00:00
|
|
|
}
|
|
|
|
|
2010-01-21 15:37:36 +00:00
|
|
|
static int amd_iommu_map(struct iommu_domain *dom, unsigned long iova,
|
|
|
|
phys_addr_t paddr, int gfp_order, int iommu_prot)
|
2008-12-02 18:48:43 +00:00
|
|
|
{
|
2010-01-21 15:37:36 +00:00
|
|
|
unsigned long page_size = 0x1000UL << gfp_order;
|
2008-12-02 18:48:43 +00:00
|
|
|
struct protection_domain *domain = dom->priv;
|
|
|
|
int prot = 0;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (iommu_prot & IOMMU_READ)
|
|
|
|
prot |= IOMMU_PROT_IR;
|
|
|
|
if (iommu_prot & IOMMU_WRITE)
|
|
|
|
prot |= IOMMU_PROT_IW;
|
|
|
|
|
2010-02-08 13:44:49 +00:00
|
|
|
mutex_lock(&domain->api_lock);
|
2010-05-11 15:40:57 +00:00
|
|
|
ret = iommu_map_page(domain, iova, paddr, prot, page_size);
|
2010-02-08 13:44:49 +00:00
|
|
|
mutex_unlock(&domain->api_lock);
|
|
|
|
|
2010-05-11 15:40:57 +00:00
|
|
|
return ret;
|
2008-12-02 18:48:43 +00:00
|
|
|
}
|
|
|
|
|
2010-01-21 15:37:36 +00:00
|
|
|
static int amd_iommu_unmap(struct iommu_domain *dom, unsigned long iova,
|
|
|
|
int gfp_order)
|
2008-12-02 18:59:10 +00:00
|
|
|
{
|
|
|
|
struct protection_domain *domain = dom->priv;
|
2010-01-21 15:37:36 +00:00
|
|
|
unsigned long page_size, unmap_size;
|
2008-12-02 18:59:10 +00:00
|
|
|
|
2010-01-21 15:37:36 +00:00
|
|
|
page_size = 0x1000UL << gfp_order;
|
2008-12-02 18:59:10 +00:00
|
|
|
|
2010-02-08 13:44:49 +00:00
|
|
|
mutex_lock(&domain->api_lock);
|
2010-01-21 15:37:36 +00:00
|
|
|
unmap_size = iommu_unmap_page(domain, iova, page_size);
|
2010-05-11 15:40:57 +00:00
|
|
|
mutex_unlock(&domain->api_lock);
|
2008-12-02 18:59:10 +00:00
|
|
|
|
2009-11-20 15:08:55 +00:00
|
|
|
iommu_flush_tlb_pde(domain);
|
2010-02-08 13:44:49 +00:00
|
|
|
|
2010-01-21 15:37:36 +00:00
|
|
|
return get_order(unmap_size);
|
2008-12-02 18:59:10 +00:00
|
|
|
}
|
|
|
|
|
2008-12-02 19:05:50 +00:00
|
|
|
static phys_addr_t amd_iommu_iova_to_phys(struct iommu_domain *dom,
|
|
|
|
unsigned long iova)
|
|
|
|
{
|
|
|
|
struct protection_domain *domain = dom->priv;
|
2010-01-21 15:15:24 +00:00
|
|
|
unsigned long offset_mask;
|
2008-12-02 19:05:50 +00:00
|
|
|
phys_addr_t paddr;
|
2010-01-21 15:15:24 +00:00
|
|
|
u64 *pte, __pte;
|
2008-12-02 19:05:50 +00:00
|
|
|
|
2010-01-19 16:27:39 +00:00
|
|
|
pte = fetch_pte(domain, iova);
|
2008-12-02 19:05:50 +00:00
|
|
|
|
2009-09-02 15:08:55 +00:00
|
|
|
if (!pte || !IOMMU_PTE_PRESENT(*pte))
|
2008-12-02 19:05:50 +00:00
|
|
|
return 0;
|
|
|
|
|
2010-01-21 15:15:24 +00:00
|
|
|
if (PM_PTE_LEVEL(*pte) == 0)
|
|
|
|
offset_mask = PAGE_SIZE - 1;
|
|
|
|
else
|
|
|
|
offset_mask = PTE_PAGE_SIZE(*pte) - 1;
|
|
|
|
|
|
|
|
__pte = *pte & PM_ADDR_MASK;
|
|
|
|
paddr = (__pte & ~offset_mask) | (iova & offset_mask);
|
2008-12-02 19:05:50 +00:00
|
|
|
|
|
|
|
return paddr;
|
|
|
|
}
|
|
|
|
|
2009-03-18 07:33:06 +00:00
|
|
|
static int amd_iommu_domain_has_cap(struct iommu_domain *domain,
|
|
|
|
unsigned long cap)
|
|
|
|
{
|
2010-07-27 15:14:24 +00:00
|
|
|
switch (cap) {
|
|
|
|
case IOMMU_CAP_CACHE_COHERENCY:
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2009-03-18 07:33:06 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-12-03 16:00:17 +00:00
|
|
|
static struct iommu_ops amd_iommu_ops = {
|
|
|
|
.domain_init = amd_iommu_domain_init,
|
|
|
|
.domain_destroy = amd_iommu_domain_destroy,
|
|
|
|
.attach_dev = amd_iommu_attach_device,
|
|
|
|
.detach_dev = amd_iommu_detach_device,
|
2010-01-21 15:37:36 +00:00
|
|
|
.map = amd_iommu_map,
|
|
|
|
.unmap = amd_iommu_unmap,
|
2008-12-03 16:00:17 +00:00
|
|
|
.iova_to_phys = amd_iommu_iova_to_phys,
|
2009-03-18 07:33:06 +00:00
|
|
|
.domain_has_cap = amd_iommu_domain_has_cap,
|
2008-12-03 16:00:17 +00:00
|
|
|
};
|
|
|
|
|
2009-08-26 13:26:30 +00:00
|
|
|
/*****************************************************************************
|
|
|
|
*
|
|
|
|
* The next functions do a basic initialization of IOMMU for pass through
|
|
|
|
* mode
|
|
|
|
*
|
|
|
|
* In passthrough mode the IOMMU is initialized and enabled but not used for
|
|
|
|
* DMA-API translation.
|
|
|
|
*
|
|
|
|
*****************************************************************************/
|
|
|
|
|
|
|
|
int __init amd_iommu_init_passthrough(void)
|
|
|
|
{
|
2009-11-24 14:39:42 +00:00
|
|
|
struct amd_iommu *iommu;
|
2009-08-26 13:26:30 +00:00
|
|
|
struct pci_dev *dev = NULL;
|
2009-11-24 14:39:42 +00:00
|
|
|
u16 devid;
|
2009-08-26 13:26:30 +00:00
|
|
|
|
tree-wide: fix assorted typos all over the place
That is "success", "unknown", "through", "performance", "[re|un]mapping"
, "access", "default", "reasonable", "[con]currently", "temperature"
, "channel", "[un]used", "application", "example","hierarchy", "therefore"
, "[over|under]flow", "contiguous", "threshold", "enough" and others.
Signed-off-by: André Goddard Rosa <andre.goddard@gmail.com>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
2009-11-14 15:09:05 +00:00
|
|
|
/* allocate passthrough domain */
|
2009-08-26 13:26:30 +00:00
|
|
|
pt_domain = protection_domain_alloc();
|
|
|
|
if (!pt_domain)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
pt_domain->mode |= PAGE_MODE_NONE;
|
|
|
|
|
2010-07-03 16:03:51 +00:00
|
|
|
for_each_pci_dev(dev) {
|
2009-11-24 16:19:23 +00:00
|
|
|
if (!check_device(&dev->dev))
|
2009-08-26 13:26:30 +00:00
|
|
|
continue;
|
|
|
|
|
2009-11-24 16:19:23 +00:00
|
|
|
devid = get_device_id(&dev->dev);
|
|
|
|
|
2009-11-24 14:39:42 +00:00
|
|
|
iommu = amd_iommu_rlookup_table[devid];
|
2009-08-26 13:26:30 +00:00
|
|
|
if (!iommu)
|
|
|
|
continue;
|
|
|
|
|
2009-11-24 14:39:42 +00:00
|
|
|
attach_device(&dev->dev, pt_domain);
|
2009-08-26 13:26:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pr_info("AMD-Vi: Initialized for Passthrough Mode\n");
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|