]>
Commit | Line | Data |
---|---|---|
1da177e4 | 1 | /* |
1da177e4 LT |
2 | * Copyright (C) 2001 Mike Corrigan & Dave Engebretsen, IBM Corporation |
3 | * | |
4 | * Rewrite, cleanup, new allocation schemes, virtual merging: | |
5 | * Copyright (C) 2004 Olof Johansson, IBM Corporation | |
6 | * and Ben. Herrenschmidt, IBM Corporation | |
7 | * | |
8 | * Dynamic DMA mapping support, bus-independent parts. | |
9 | * | |
10 | * This program is free software; you can redistribute it and/or modify | |
11 | * it under the terms of the GNU General Public License as published by | |
12 | * the Free Software Foundation; either version 2 of the License, or | |
13 | * (at your option) any later version. | |
14 | * | |
15 | * This program is distributed in the hope that it will be useful, | |
16 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
18 | * GNU General Public License for more details. | |
19 | * | |
20 | * You should have received a copy of the GNU General Public License | |
21 | * along with this program; if not, write to the Free Software | |
22 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | |
23 | */ | |
24 | ||
25 | ||
1da177e4 LT |
26 | #include <linux/init.h> |
27 | #include <linux/types.h> | |
28 | #include <linux/slab.h> | |
29 | #include <linux/mm.h> | |
30 | #include <linux/spinlock.h> | |
31 | #include <linux/string.h> | |
32 | #include <linux/dma-mapping.h> | |
a66022c4 | 33 | #include <linux/bitmap.h> |
fb3475e9 | 34 | #include <linux/iommu-helper.h> |
62a8bd6c | 35 | #include <linux/crash_dump.h> |
b4c3a872 | 36 | #include <linux/hash.h> |
d6b9a81b AB |
37 | #include <linux/fault-inject.h> |
38 | #include <linux/pci.h> | |
4e13c1ac AK |
39 | #include <linux/iommu.h> |
40 | #include <linux/sched.h> | |
1da177e4 LT |
41 | #include <asm/io.h> |
42 | #include <asm/prom.h> | |
43 | #include <asm/iommu.h> | |
44 | #include <asm/pci-bridge.h> | |
45 | #include <asm/machdep.h> | |
5f50867b | 46 | #include <asm/kdump.h> |
3ccc00a7 | 47 | #include <asm/fadump.h> |
d6b9a81b | 48 | #include <asm/vio.h> |
4e13c1ac | 49 | #include <asm/tce.h> |
1da177e4 LT |
50 | |
51 | #define DBG(...) | |
52 | ||
191aee58 | 53 | static int novmerge; |
56997559 | 54 | |
6490c490 RJ |
55 | static void __iommu_free(struct iommu_table *, dma_addr_t, unsigned int); |
56 | ||
1da177e4 LT |
57 | static int __init setup_iommu(char *str) |
58 | { | |
59 | if (!strcmp(str, "novmerge")) | |
60 | novmerge = 1; | |
61 | else if (!strcmp(str, "vmerge")) | |
62 | novmerge = 0; | |
63 | return 1; | |
64 | } | |
65 | ||
66 | __setup("iommu=", setup_iommu); | |
67 | ||
b4c3a872 AB |
68 | static DEFINE_PER_CPU(unsigned int, iommu_pool_hash); |
69 | ||
70 | /* | |
71 | * We precalculate the hash to avoid doing it on every allocation. | |
72 | * | |
73 | * The hash is important to spread CPUs across all the pools. For example, | |
74 | * on a POWER7 with 4 way SMT we want interrupts on the primary threads and | |
75 | * with 4 pools all primary threads would map to the same pool. | |
76 | */ | |
77 | static int __init setup_iommu_pool_hash(void) | |
78 | { | |
79 | unsigned int i; | |
80 | ||
81 | for_each_possible_cpu(i) | |
82 | per_cpu(iommu_pool_hash, i) = hash_32(i, IOMMU_POOL_HASHBITS); | |
83 | ||
84 | return 0; | |
85 | } | |
86 | subsys_initcall(setup_iommu_pool_hash); | |
87 | ||
d6b9a81b AB |
88 | #ifdef CONFIG_FAIL_IOMMU |
89 | ||
90 | static DECLARE_FAULT_ATTR(fail_iommu); | |
91 | ||
92 | static int __init setup_fail_iommu(char *str) | |
93 | { | |
94 | return setup_fault_attr(&fail_iommu, str); | |
95 | } | |
96 | __setup("fail_iommu=", setup_fail_iommu); | |
97 | ||
98 | static bool should_fail_iommu(struct device *dev) | |
99 | { | |
100 | return dev->archdata.fail_iommu && should_fail(&fail_iommu, 1); | |
101 | } | |
102 | ||
103 | static int __init fail_iommu_debugfs(void) | |
104 | { | |
105 | struct dentry *dir = fault_create_debugfs_attr("fail_iommu", | |
106 | NULL, &fail_iommu); | |
107 | ||
8c6ffba0 | 108 | return PTR_ERR_OR_ZERO(dir); |
d6b9a81b AB |
109 | } |
110 | late_initcall(fail_iommu_debugfs); | |
111 | ||
112 | static ssize_t fail_iommu_show(struct device *dev, | |
113 | struct device_attribute *attr, char *buf) | |
114 | { | |
115 | return sprintf(buf, "%d\n", dev->archdata.fail_iommu); | |
116 | } | |
117 | ||
118 | static ssize_t fail_iommu_store(struct device *dev, | |
119 | struct device_attribute *attr, const char *buf, | |
120 | size_t count) | |
121 | { | |
122 | int i; | |
123 | ||
124 | if (count > 0 && sscanf(buf, "%d", &i) > 0) | |
125 | dev->archdata.fail_iommu = (i == 0) ? 0 : 1; | |
126 | ||
127 | return count; | |
128 | } | |
129 | ||
130 | static DEVICE_ATTR(fail_iommu, S_IRUGO|S_IWUSR, fail_iommu_show, | |
131 | fail_iommu_store); | |
132 | ||
133 | static int fail_iommu_bus_notify(struct notifier_block *nb, | |
134 | unsigned long action, void *data) | |
135 | { | |
136 | struct device *dev = data; | |
137 | ||
138 | if (action == BUS_NOTIFY_ADD_DEVICE) { | |
139 | if (device_create_file(dev, &dev_attr_fail_iommu)) | |
140 | pr_warn("Unable to create IOMMU fault injection sysfs " | |
141 | "entries\n"); | |
142 | } else if (action == BUS_NOTIFY_DEL_DEVICE) { | |
143 | device_remove_file(dev, &dev_attr_fail_iommu); | |
144 | } | |
145 | ||
146 | return 0; | |
147 | } | |
148 | ||
149 | static struct notifier_block fail_iommu_bus_notifier = { | |
150 | .notifier_call = fail_iommu_bus_notify | |
151 | }; | |
152 | ||
153 | static int __init fail_iommu_setup(void) | |
154 | { | |
155 | #ifdef CONFIG_PCI | |
156 | bus_register_notifier(&pci_bus_type, &fail_iommu_bus_notifier); | |
157 | #endif | |
158 | #ifdef CONFIG_IBMVIO | |
159 | bus_register_notifier(&vio_bus_type, &fail_iommu_bus_notifier); | |
160 | #endif | |
161 | ||
162 | return 0; | |
163 | } | |
164 | /* | |
165 | * Must execute after PCI and VIO subsystem have initialised but before | |
166 | * devices are probed. | |
167 | */ | |
168 | arch_initcall(fail_iommu_setup); | |
169 | #else | |
170 | static inline bool should_fail_iommu(struct device *dev) | |
171 | { | |
172 | return false; | |
173 | } | |
174 | #endif | |
175 | ||
fb3475e9 FT |
176 | static unsigned long iommu_range_alloc(struct device *dev, |
177 | struct iommu_table *tbl, | |
1da177e4 LT |
178 | unsigned long npages, |
179 | unsigned long *handle, | |
7daa411b | 180 | unsigned long mask, |
1da177e4 LT |
181 | unsigned int align_order) |
182 | { | |
fb3475e9 | 183 | unsigned long n, end, start; |
1da177e4 LT |
184 | unsigned long limit; |
185 | int largealloc = npages > 15; | |
186 | int pass = 0; | |
187 | unsigned long align_mask; | |
fb3475e9 | 188 | unsigned long boundary_size; |
d3622137 | 189 | unsigned long flags; |
b4c3a872 AB |
190 | unsigned int pool_nr; |
191 | struct iommu_pool *pool; | |
1da177e4 LT |
192 | |
193 | align_mask = 0xffffffffffffffffl >> (64 - align_order); | |
194 | ||
195 | /* This allocator was derived from x86_64's bit string search */ | |
196 | ||
197 | /* Sanity check */ | |
13a2eea1 | 198 | if (unlikely(npages == 0)) { |
1da177e4 LT |
199 | if (printk_ratelimit()) |
200 | WARN_ON(1); | |
201 | return DMA_ERROR_CODE; | |
202 | } | |
203 | ||
d6b9a81b AB |
204 | if (should_fail_iommu(dev)) |
205 | return DMA_ERROR_CODE; | |
206 | ||
b4c3a872 AB |
207 | /* |
208 | * We don't need to disable preemption here because any CPU can | |
209 | * safely use any IOMMU pool. | |
210 | */ | |
69111bac | 211 | pool_nr = __this_cpu_read(iommu_pool_hash) & (tbl->nr_pools - 1); |
d3622137 | 212 | |
b4c3a872 AB |
213 | if (largealloc) |
214 | pool = &(tbl->large_pool); | |
1da177e4 | 215 | else |
b4c3a872 | 216 | pool = &(tbl->pools[pool_nr]); |
1da177e4 | 217 | |
b4c3a872 AB |
218 | spin_lock_irqsave(&(pool->lock), flags); |
219 | ||
220 | again: | |
d900bd73 AB |
221 | if ((pass == 0) && handle && *handle && |
222 | (*handle >= pool->start) && (*handle < pool->end)) | |
b4c3a872 AB |
223 | start = *handle; |
224 | else | |
225 | start = pool->hint; | |
1da177e4 | 226 | |
b4c3a872 | 227 | limit = pool->end; |
1da177e4 LT |
228 | |
229 | /* The case below can happen if we have a small segment appended | |
230 | * to a large, or when the previous alloc was at the very end of | |
231 | * the available space. If so, go back to the initial start. | |
232 | */ | |
233 | if (start >= limit) | |
b4c3a872 | 234 | start = pool->start; |
1da177e4 | 235 | |
7daa411b OJ |
236 | if (limit + tbl->it_offset > mask) { |
237 | limit = mask - tbl->it_offset + 1; | |
238 | /* If we're constrained on address range, first try | |
239 | * at the masked hint to avoid O(n) search complexity, | |
b4c3a872 | 240 | * but on second pass, start at 0 in pool 0. |
7daa411b | 241 | */ |
b4c3a872 | 242 | if ((start & mask) >= limit || pass > 0) { |
d900bd73 | 243 | spin_unlock(&(pool->lock)); |
b4c3a872 | 244 | pool = &(tbl->pools[0]); |
d900bd73 | 245 | spin_lock(&(pool->lock)); |
b4c3a872 AB |
246 | start = pool->start; |
247 | } else { | |
7daa411b | 248 | start &= mask; |
b4c3a872 | 249 | } |
7daa411b OJ |
250 | } |
251 | ||
fb3475e9 FT |
252 | if (dev) |
253 | boundary_size = ALIGN(dma_get_seg_boundary(dev) + 1, | |
d0847757 | 254 | 1 << tbl->it_page_shift); |
fb3475e9 | 255 | else |
d0847757 | 256 | boundary_size = ALIGN(1UL << 32, 1 << tbl->it_page_shift); |
fb3475e9 | 257 | /* 4GB boundary for iseries_hv_alloc and iseries_hv_map */ |
1da177e4 | 258 | |
d0847757 AP |
259 | n = iommu_area_alloc(tbl->it_map, limit, start, npages, tbl->it_offset, |
260 | boundary_size >> tbl->it_page_shift, align_mask); | |
fb3475e9 | 261 | if (n == -1) { |
b4c3a872 AB |
262 | if (likely(pass == 0)) { |
263 | /* First try the pool from the start */ | |
264 | pool->hint = pool->start; | |
1da177e4 LT |
265 | pass++; |
266 | goto again; | |
b4c3a872 AB |
267 | |
268 | } else if (pass <= tbl->nr_pools) { | |
269 | /* Now try scanning all the other pools */ | |
270 | spin_unlock(&(pool->lock)); | |
271 | pool_nr = (pool_nr + 1) & (tbl->nr_pools - 1); | |
272 | pool = &tbl->pools[pool_nr]; | |
273 | spin_lock(&(pool->lock)); | |
274 | pool->hint = pool->start; | |
275 | pass++; | |
276 | goto again; | |
277 | ||
1da177e4 | 278 | } else { |
b4c3a872 AB |
279 | /* Give up */ |
280 | spin_unlock_irqrestore(&(pool->lock), flags); | |
1da177e4 LT |
281 | return DMA_ERROR_CODE; |
282 | } | |
283 | } | |
284 | ||
fb3475e9 | 285 | end = n + npages; |
1da177e4 LT |
286 | |
287 | /* Bump the hint to a new block for small allocs. */ | |
288 | if (largealloc) { | |
289 | /* Don't bump to new block to avoid fragmentation */ | |
b4c3a872 | 290 | pool->hint = end; |
1da177e4 LT |
291 | } else { |
292 | /* Overflow will be taken care of at the next allocation */ | |
b4c3a872 | 293 | pool->hint = (end + tbl->it_blocksize - 1) & |
1da177e4 LT |
294 | ~(tbl->it_blocksize - 1); |
295 | } | |
296 | ||
297 | /* Update handle for SG allocations */ | |
298 | if (handle) | |
299 | *handle = end; | |
300 | ||
b4c3a872 AB |
301 | spin_unlock_irqrestore(&(pool->lock), flags); |
302 | ||
1da177e4 LT |
303 | return n; |
304 | } | |
305 | ||
fb3475e9 FT |
306 | static dma_addr_t iommu_alloc(struct device *dev, struct iommu_table *tbl, |
307 | void *page, unsigned int npages, | |
308 | enum dma_data_direction direction, | |
4f3dd8a0 MN |
309 | unsigned long mask, unsigned int align_order, |
310 | struct dma_attrs *attrs) | |
1da177e4 | 311 | { |
d3622137 | 312 | unsigned long entry; |
1da177e4 | 313 | dma_addr_t ret = DMA_ERROR_CODE; |
6490c490 | 314 | int build_fail; |
7daa411b | 315 | |
fb3475e9 | 316 | entry = iommu_range_alloc(dev, tbl, npages, NULL, mask, align_order); |
1da177e4 | 317 | |
0e4bc95d | 318 | if (unlikely(entry == DMA_ERROR_CODE)) |
1da177e4 | 319 | return DMA_ERROR_CODE; |
1da177e4 LT |
320 | |
321 | entry += tbl->it_offset; /* Offset into real TCE table */ | |
d0847757 | 322 | ret = entry << tbl->it_page_shift; /* Set the return dma address */ |
1da177e4 LT |
323 | |
324 | /* Put the TCEs in the HW table */ | |
6490c490 | 325 | build_fail = ppc_md.tce_build(tbl, entry, npages, |
d0847757 AP |
326 | (unsigned long)page & |
327 | IOMMU_PAGE_MASK(tbl), direction, attrs); | |
6490c490 RJ |
328 | |
329 | /* ppc_md.tce_build() only returns non-zero for transient errors. | |
330 | * Clean up the table bitmap in this case and return | |
331 | * DMA_ERROR_CODE. For all other errors the functionality is | |
332 | * not altered. | |
333 | */ | |
334 | if (unlikely(build_fail)) { | |
335 | __iommu_free(tbl, ret, npages); | |
6490c490 RJ |
336 | return DMA_ERROR_CODE; |
337 | } | |
1da177e4 LT |
338 | |
339 | /* Flush/invalidate TLB caches if necessary */ | |
340 | if (ppc_md.tce_flush) | |
341 | ppc_md.tce_flush(tbl); | |
342 | ||
1da177e4 LT |
343 | /* Make sure updates are seen by hardware */ |
344 | mb(); | |
345 | ||
346 | return ret; | |
347 | } | |
348 | ||
67ca1415 AB |
349 | static bool iommu_free_check(struct iommu_table *tbl, dma_addr_t dma_addr, |
350 | unsigned int npages) | |
1da177e4 LT |
351 | { |
352 | unsigned long entry, free_entry; | |
1da177e4 | 353 | |
d0847757 | 354 | entry = dma_addr >> tbl->it_page_shift; |
1da177e4 LT |
355 | free_entry = entry - tbl->it_offset; |
356 | ||
357 | if (((free_entry + npages) > tbl->it_size) || | |
358 | (entry < tbl->it_offset)) { | |
359 | if (printk_ratelimit()) { | |
360 | printk(KERN_INFO "iommu_free: invalid entry\n"); | |
361 | printk(KERN_INFO "\tentry = 0x%lx\n", entry); | |
fe333321 IM |
362 | printk(KERN_INFO "\tdma_addr = 0x%llx\n", (u64)dma_addr); |
363 | printk(KERN_INFO "\tTable = 0x%llx\n", (u64)tbl); | |
364 | printk(KERN_INFO "\tbus# = 0x%llx\n", (u64)tbl->it_busno); | |
365 | printk(KERN_INFO "\tsize = 0x%llx\n", (u64)tbl->it_size); | |
366 | printk(KERN_INFO "\tstartOff = 0x%llx\n", (u64)tbl->it_offset); | |
367 | printk(KERN_INFO "\tindex = 0x%llx\n", (u64)tbl->it_index); | |
1da177e4 LT |
368 | WARN_ON(1); |
369 | } | |
67ca1415 AB |
370 | |
371 | return false; | |
1da177e4 LT |
372 | } |
373 | ||
67ca1415 AB |
374 | return true; |
375 | } | |
376 | ||
b4c3a872 AB |
377 | static struct iommu_pool *get_pool(struct iommu_table *tbl, |
378 | unsigned long entry) | |
379 | { | |
380 | struct iommu_pool *p; | |
381 | unsigned long largepool_start = tbl->large_pool.start; | |
382 | ||
383 | /* The large pool is the last pool at the top of the table */ | |
384 | if (entry >= largepool_start) { | |
385 | p = &tbl->large_pool; | |
386 | } else { | |
387 | unsigned int pool_nr = entry / tbl->poolsize; | |
388 | ||
389 | BUG_ON(pool_nr > tbl->nr_pools); | |
390 | p = &tbl->pools[pool_nr]; | |
391 | } | |
392 | ||
393 | return p; | |
394 | } | |
395 | ||
67ca1415 AB |
396 | static void __iommu_free(struct iommu_table *tbl, dma_addr_t dma_addr, |
397 | unsigned int npages) | |
1da177e4 | 398 | { |
67ca1415 | 399 | unsigned long entry, free_entry; |
1da177e4 | 400 | unsigned long flags; |
b4c3a872 | 401 | struct iommu_pool *pool; |
1da177e4 | 402 | |
d0847757 | 403 | entry = dma_addr >> tbl->it_page_shift; |
67ca1415 AB |
404 | free_entry = entry - tbl->it_offset; |
405 | ||
b4c3a872 AB |
406 | pool = get_pool(tbl, free_entry); |
407 | ||
67ca1415 AB |
408 | if (!iommu_free_check(tbl, dma_addr, npages)) |
409 | return; | |
410 | ||
411 | ppc_md.tce_free(tbl, entry, npages); | |
412 | ||
b4c3a872 | 413 | spin_lock_irqsave(&(pool->lock), flags); |
67ca1415 | 414 | bitmap_clear(tbl->it_map, free_entry, npages); |
b4c3a872 | 415 | spin_unlock_irqrestore(&(pool->lock), flags); |
67ca1415 AB |
416 | } |
417 | ||
418 | static void iommu_free(struct iommu_table *tbl, dma_addr_t dma_addr, | |
419 | unsigned int npages) | |
420 | { | |
421 | __iommu_free(tbl, dma_addr, npages); | |
1da177e4 LT |
422 | |
423 | /* Make sure TLB cache is flushed if the HW needs it. We do | |
424 | * not do an mb() here on purpose, it is not needed on any of | |
425 | * the current platforms. | |
426 | */ | |
427 | if (ppc_md.tce_flush) | |
428 | ppc_md.tce_flush(tbl); | |
1da177e4 LT |
429 | } |
430 | ||
0690cbd2 JR |
431 | int ppc_iommu_map_sg(struct device *dev, struct iommu_table *tbl, |
432 | struct scatterlist *sglist, int nelems, | |
433 | unsigned long mask, enum dma_data_direction direction, | |
434 | struct dma_attrs *attrs) | |
1da177e4 LT |
435 | { |
436 | dma_addr_t dma_next = 0, dma_addr; | |
1da177e4 | 437 | struct scatterlist *s, *outs, *segstart; |
6490c490 | 438 | int outcount, incount, i, build_fail = 0; |
d262c32a | 439 | unsigned int align; |
1da177e4 | 440 | unsigned long handle; |
740c3ce6 | 441 | unsigned int max_seg_size; |
1da177e4 LT |
442 | |
443 | BUG_ON(direction == DMA_NONE); | |
444 | ||
445 | if ((nelems == 0) || !tbl) | |
446 | return 0; | |
447 | ||
448 | outs = s = segstart = &sglist[0]; | |
449 | outcount = 1; | |
ac9af7cb | 450 | incount = nelems; |
1da177e4 LT |
451 | handle = 0; |
452 | ||
453 | /* Init first segment length for backout at failure */ | |
454 | outs->dma_length = 0; | |
455 | ||
5d2efba6 | 456 | DBG("sg mapping %d elements:\n", nelems); |
1da177e4 | 457 | |
740c3ce6 | 458 | max_seg_size = dma_get_max_seg_size(dev); |
78bdc310 | 459 | for_each_sg(sglist, s, nelems, i) { |
1da177e4 LT |
460 | unsigned long vaddr, npages, entry, slen; |
461 | ||
462 | slen = s->length; | |
463 | /* Sanity check */ | |
464 | if (slen == 0) { | |
465 | dma_next = 0; | |
466 | continue; | |
467 | } | |
468 | /* Allocate iommu entries for that segment */ | |
58b053e4 | 469 | vaddr = (unsigned long) sg_virt(s); |
d0847757 | 470 | npages = iommu_num_pages(vaddr, slen, IOMMU_PAGE_SIZE(tbl)); |
d262c32a | 471 | align = 0; |
d0847757 | 472 | if (tbl->it_page_shift < PAGE_SHIFT && slen >= PAGE_SIZE && |
d262c32a | 473 | (vaddr & ~PAGE_MASK) == 0) |
d0847757 | 474 | align = PAGE_SHIFT - tbl->it_page_shift; |
fb3475e9 | 475 | entry = iommu_range_alloc(dev, tbl, npages, &handle, |
d0847757 | 476 | mask >> tbl->it_page_shift, align); |
1da177e4 LT |
477 | |
478 | DBG(" - vaddr: %lx, size: %lx\n", vaddr, slen); | |
479 | ||
480 | /* Handle failure */ | |
481 | if (unlikely(entry == DMA_ERROR_CODE)) { | |
482 | if (printk_ratelimit()) | |
4dfa9c47 AB |
483 | dev_info(dev, "iommu_alloc failed, tbl %p " |
484 | "vaddr %lx npages %lu\n", tbl, vaddr, | |
485 | npages); | |
1da177e4 LT |
486 | goto failure; |
487 | } | |
488 | ||
489 | /* Convert entry to a dma_addr_t */ | |
490 | entry += tbl->it_offset; | |
d0847757 AP |
491 | dma_addr = entry << tbl->it_page_shift; |
492 | dma_addr |= (s->offset & ~IOMMU_PAGE_MASK(tbl)); | |
1da177e4 | 493 | |
5d2efba6 | 494 | DBG(" - %lu pages, entry: %lx, dma_addr: %lx\n", |
1da177e4 LT |
495 | npages, entry, dma_addr); |
496 | ||
497 | /* Insert into HW table */ | |
6490c490 | 498 | build_fail = ppc_md.tce_build(tbl, entry, npages, |
d0847757 AP |
499 | vaddr & IOMMU_PAGE_MASK(tbl), |
500 | direction, attrs); | |
6490c490 RJ |
501 | if(unlikely(build_fail)) |
502 | goto failure; | |
1da177e4 LT |
503 | |
504 | /* If we are in an open segment, try merging */ | |
505 | if (segstart != s) { | |
506 | DBG(" - trying merge...\n"); | |
507 | /* We cannot merge if: | |
508 | * - allocated dma_addr isn't contiguous to previous allocation | |
509 | */ | |
740c3ce6 FT |
510 | if (novmerge || (dma_addr != dma_next) || |
511 | (outs->dma_length + s->length > max_seg_size)) { | |
1da177e4 LT |
512 | /* Can't merge: create a new segment */ |
513 | segstart = s; | |
78bdc310 JA |
514 | outcount++; |
515 | outs = sg_next(outs); | |
1da177e4 LT |
516 | DBG(" can't merge, new segment.\n"); |
517 | } else { | |
518 | outs->dma_length += s->length; | |
5d2efba6 | 519 | DBG(" merged, new len: %ux\n", outs->dma_length); |
1da177e4 LT |
520 | } |
521 | } | |
522 | ||
523 | if (segstart == s) { | |
524 | /* This is a new segment, fill entries */ | |
525 | DBG(" - filling new segment.\n"); | |
526 | outs->dma_address = dma_addr; | |
527 | outs->dma_length = slen; | |
528 | } | |
529 | ||
530 | /* Calculate next page pointer for contiguous check */ | |
531 | dma_next = dma_addr + slen; | |
532 | ||
533 | DBG(" - dma next is: %lx\n", dma_next); | |
534 | } | |
535 | ||
536 | /* Flush/invalidate TLB caches if necessary */ | |
537 | if (ppc_md.tce_flush) | |
538 | ppc_md.tce_flush(tbl); | |
539 | ||
1da177e4 LT |
540 | DBG("mapped %d elements:\n", outcount); |
541 | ||
0690cbd2 | 542 | /* For the sake of ppc_iommu_unmap_sg, we clear out the length in the |
1da177e4 LT |
543 | * next entry of the sglist if we didn't fill the list completely |
544 | */ | |
ac9af7cb | 545 | if (outcount < incount) { |
78bdc310 | 546 | outs = sg_next(outs); |
1da177e4 LT |
547 | outs->dma_address = DMA_ERROR_CODE; |
548 | outs->dma_length = 0; | |
549 | } | |
a958a264 JM |
550 | |
551 | /* Make sure updates are seen by hardware */ | |
552 | mb(); | |
553 | ||
1da177e4 LT |
554 | return outcount; |
555 | ||
556 | failure: | |
78bdc310 | 557 | for_each_sg(sglist, s, nelems, i) { |
1da177e4 LT |
558 | if (s->dma_length != 0) { |
559 | unsigned long vaddr, npages; | |
560 | ||
d0847757 | 561 | vaddr = s->dma_address & IOMMU_PAGE_MASK(tbl); |
2994a3b2 | 562 | npages = iommu_num_pages(s->dma_address, s->dma_length, |
d0847757 | 563 | IOMMU_PAGE_SIZE(tbl)); |
d3622137 | 564 | __iommu_free(tbl, vaddr, npages); |
a958a264 JM |
565 | s->dma_address = DMA_ERROR_CODE; |
566 | s->dma_length = 0; | |
1da177e4 | 567 | } |
78bdc310 JA |
568 | if (s == outs) |
569 | break; | |
1da177e4 | 570 | } |
1da177e4 LT |
571 | return 0; |
572 | } | |
573 | ||
574 | ||
0690cbd2 JR |
575 | void ppc_iommu_unmap_sg(struct iommu_table *tbl, struct scatterlist *sglist, |
576 | int nelems, enum dma_data_direction direction, | |
577 | struct dma_attrs *attrs) | |
1da177e4 | 578 | { |
78bdc310 | 579 | struct scatterlist *sg; |
1da177e4 LT |
580 | |
581 | BUG_ON(direction == DMA_NONE); | |
582 | ||
583 | if (!tbl) | |
584 | return; | |
585 | ||
78bdc310 | 586 | sg = sglist; |
1da177e4 LT |
587 | while (nelems--) { |
588 | unsigned int npages; | |
78bdc310 | 589 | dma_addr_t dma_handle = sg->dma_address; |
1da177e4 | 590 | |
78bdc310 | 591 | if (sg->dma_length == 0) |
1da177e4 | 592 | break; |
2994a3b2 | 593 | npages = iommu_num_pages(dma_handle, sg->dma_length, |
d0847757 | 594 | IOMMU_PAGE_SIZE(tbl)); |
d3622137 | 595 | __iommu_free(tbl, dma_handle, npages); |
78bdc310 | 596 | sg = sg_next(sg); |
1da177e4 LT |
597 | } |
598 | ||
599 | /* Flush/invalidate TLBs if necessary. As for iommu_free(), we | |
600 | * do not do an mb() here, the affected platforms do not need it | |
601 | * when freeing. | |
602 | */ | |
603 | if (ppc_md.tce_flush) | |
604 | ppc_md.tce_flush(tbl); | |
1da177e4 LT |
605 | } |
606 | ||
54622f10 MK |
607 | static void iommu_table_clear(struct iommu_table *tbl) |
608 | { | |
3ccc00a7 MS |
609 | /* |
610 | * In case of firmware assisted dump system goes through clean | |
611 | * reboot process at the time of system crash. Hence it's safe to | |
612 | * clear the TCE entries if firmware assisted dump is active. | |
613 | */ | |
614 | if (!is_kdump_kernel() || is_fadump_active()) { | |
54622f10 MK |
615 | /* Clear the table in case firmware left allocations in it */ |
616 | ppc_md.tce_free(tbl, tbl->it_offset, tbl->it_size); | |
617 | return; | |
618 | } | |
619 | ||
620 | #ifdef CONFIG_CRASH_DUMP | |
621 | if (ppc_md.tce_get) { | |
622 | unsigned long index, tceval, tcecount = 0; | |
623 | ||
624 | /* Reserve the existing mappings left by the first kernel. */ | |
625 | for (index = 0; index < tbl->it_size; index++) { | |
626 | tceval = ppc_md.tce_get(tbl, index + tbl->it_offset); | |
627 | /* | |
628 | * Freed TCE entry contains 0x7fffffffffffffff on JS20 | |
629 | */ | |
630 | if (tceval && (tceval != 0x7fffffffffffffffUL)) { | |
631 | __set_bit(index, tbl->it_map); | |
632 | tcecount++; | |
633 | } | |
634 | } | |
635 | ||
636 | if ((tbl->it_size - tcecount) < KDUMP_MIN_TCE_ENTRIES) { | |
637 | printk(KERN_WARNING "TCE table is full; freeing "); | |
638 | printk(KERN_WARNING "%d entries for the kdump boot\n", | |
639 | KDUMP_MIN_TCE_ENTRIES); | |
640 | for (index = tbl->it_size - KDUMP_MIN_TCE_ENTRIES; | |
641 | index < tbl->it_size; index++) | |
642 | __clear_bit(index, tbl->it_map); | |
643 | } | |
644 | } | |
645 | #endif | |
646 | } | |
647 | ||
1da177e4 LT |
648 | /* |
649 | * Build a iommu_table structure. This contains a bit map which | |
650 | * is used to manage allocation of the tce space. | |
651 | */ | |
ca1588e7 | 652 | struct iommu_table *iommu_init_table(struct iommu_table *tbl, int nid) |
1da177e4 LT |
653 | { |
654 | unsigned long sz; | |
655 | static int welcomed = 0; | |
ca1588e7 | 656 | struct page *page; |
b4c3a872 AB |
657 | unsigned int i; |
658 | struct iommu_pool *p; | |
1da177e4 LT |
659 | |
660 | /* number of bytes needed for the bitmap */ | |
c5a0809a | 661 | sz = BITS_TO_LONGS(tbl->it_size) * sizeof(unsigned long); |
1da177e4 | 662 | |
1cf389df | 663 | page = alloc_pages_node(nid, GFP_KERNEL, get_order(sz)); |
ca1588e7 | 664 | if (!page) |
1da177e4 | 665 | panic("iommu_init_table: Can't allocate %ld bytes\n", sz); |
ca1588e7 | 666 | tbl->it_map = page_address(page); |
1da177e4 LT |
667 | memset(tbl->it_map, 0, sz); |
668 | ||
d12b524f TLSC |
669 | /* |
670 | * Reserve page 0 so it will not be used for any mappings. | |
671 | * This avoids buggy drivers that consider page 0 to be invalid | |
672 | * to crash the machine or even lose data. | |
673 | */ | |
674 | if (tbl->it_offset == 0) | |
675 | set_bit(0, tbl->it_map); | |
676 | ||
b4c3a872 | 677 | /* We only split the IOMMU table if we have 1GB or more of space */ |
d0847757 | 678 | if ((tbl->it_size << tbl->it_page_shift) >= (1UL * 1024 * 1024 * 1024)) |
b4c3a872 AB |
679 | tbl->nr_pools = IOMMU_NR_POOLS; |
680 | else | |
681 | tbl->nr_pools = 1; | |
682 | ||
683 | /* We reserve the top 1/4 of the table for large allocations */ | |
dcd261ba | 684 | tbl->poolsize = (tbl->it_size * 3 / 4) / tbl->nr_pools; |
b4c3a872 | 685 | |
dcd261ba | 686 | for (i = 0; i < tbl->nr_pools; i++) { |
b4c3a872 AB |
687 | p = &tbl->pools[i]; |
688 | spin_lock_init(&(p->lock)); | |
689 | p->start = tbl->poolsize * i; | |
690 | p->hint = p->start; | |
691 | p->end = p->start + tbl->poolsize; | |
692 | } | |
693 | ||
694 | p = &tbl->large_pool; | |
695 | spin_lock_init(&(p->lock)); | |
696 | p->start = tbl->poolsize * i; | |
697 | p->hint = p->start; | |
698 | p->end = tbl->it_size; | |
1da177e4 | 699 | |
54622f10 | 700 | iommu_table_clear(tbl); |
d3588ba9 | 701 | |
1da177e4 LT |
702 | if (!welcomed) { |
703 | printk(KERN_INFO "IOMMU table initialized, virtual merging %s\n", | |
704 | novmerge ? "disabled" : "enabled"); | |
705 | welcomed = 1; | |
706 | } | |
707 | ||
708 | return tbl; | |
709 | } | |
710 | ||
68d315f5 | 711 | void iommu_free_table(struct iommu_table *tbl, const char *node_name) |
1da177e4 | 712 | { |
c5a0809a | 713 | unsigned long bitmap_sz; |
1da177e4 LT |
714 | unsigned int order; |
715 | ||
716 | if (!tbl || !tbl->it_map) { | |
e48b1b45 | 717 | printk(KERN_ERR "%s: expected TCE map for %s\n", __func__, |
68d315f5 | 718 | node_name); |
1da177e4 LT |
719 | return; |
720 | } | |
721 | ||
7f966d39 TLSC |
722 | /* |
723 | * In case we have reserved the first bit, we should not emit | |
724 | * the warning below. | |
725 | */ | |
726 | if (tbl->it_offset == 0) | |
727 | clear_bit(0, tbl->it_map); | |
728 | ||
4e13c1ac AK |
729 | #ifdef CONFIG_IOMMU_API |
730 | if (tbl->it_group) { | |
731 | iommu_group_put(tbl->it_group); | |
732 | BUG_ON(tbl->it_group); | |
733 | } | |
734 | #endif | |
735 | ||
1da177e4 | 736 | /* verify that table contains no entries */ |
c5a0809a AM |
737 | if (!bitmap_empty(tbl->it_map, tbl->it_size)) |
738 | pr_warn("%s: Unexpected TCEs for %s\n", __func__, node_name); | |
1da177e4 LT |
739 | |
740 | /* calculate bitmap size in bytes */ | |
c5a0809a | 741 | bitmap_sz = BITS_TO_LONGS(tbl->it_size) * sizeof(unsigned long); |
1da177e4 LT |
742 | |
743 | /* free bitmap */ | |
744 | order = get_order(bitmap_sz); | |
745 | free_pages((unsigned long) tbl->it_map, order); | |
746 | ||
747 | /* free table */ | |
748 | kfree(tbl); | |
749 | } | |
750 | ||
751 | /* Creates TCEs for a user provided buffer. The user buffer must be | |
f9226d57 MN |
752 | * contiguous real kernel storage (not vmalloc). The address passed here |
753 | * comprises a page address and offset into that page. The dma_addr_t | |
754 | * returned will point to the same byte within the page as was passed in. | |
1da177e4 | 755 | */ |
f9226d57 MN |
756 | dma_addr_t iommu_map_page(struct device *dev, struct iommu_table *tbl, |
757 | struct page *page, unsigned long offset, size_t size, | |
758 | unsigned long mask, enum dma_data_direction direction, | |
759 | struct dma_attrs *attrs) | |
1da177e4 LT |
760 | { |
761 | dma_addr_t dma_handle = DMA_ERROR_CODE; | |
f9226d57 | 762 | void *vaddr; |
1da177e4 | 763 | unsigned long uaddr; |
d262c32a | 764 | unsigned int npages, align; |
1da177e4 LT |
765 | |
766 | BUG_ON(direction == DMA_NONE); | |
767 | ||
f9226d57 | 768 | vaddr = page_address(page) + offset; |
1da177e4 | 769 | uaddr = (unsigned long)vaddr; |
d0847757 | 770 | npages = iommu_num_pages(uaddr, size, IOMMU_PAGE_SIZE(tbl)); |
1da177e4 LT |
771 | |
772 | if (tbl) { | |
d262c32a | 773 | align = 0; |
d0847757 | 774 | if (tbl->it_page_shift < PAGE_SHIFT && size >= PAGE_SIZE && |
d262c32a | 775 | ((unsigned long)vaddr & ~PAGE_MASK) == 0) |
d0847757 | 776 | align = PAGE_SHIFT - tbl->it_page_shift; |
d262c32a | 777 | |
fb3475e9 | 778 | dma_handle = iommu_alloc(dev, tbl, vaddr, npages, direction, |
d0847757 | 779 | mask >> tbl->it_page_shift, align, |
4f3dd8a0 | 780 | attrs); |
1da177e4 LT |
781 | if (dma_handle == DMA_ERROR_CODE) { |
782 | if (printk_ratelimit()) { | |
4dfa9c47 AB |
783 | dev_info(dev, "iommu_alloc failed, tbl %p " |
784 | "vaddr %p npages %d\n", tbl, vaddr, | |
785 | npages); | |
1da177e4 LT |
786 | } |
787 | } else | |
d0847757 | 788 | dma_handle |= (uaddr & ~IOMMU_PAGE_MASK(tbl)); |
1da177e4 LT |
789 | } |
790 | ||
791 | return dma_handle; | |
792 | } | |
793 | ||
f9226d57 MN |
794 | void iommu_unmap_page(struct iommu_table *tbl, dma_addr_t dma_handle, |
795 | size_t size, enum dma_data_direction direction, | |
796 | struct dma_attrs *attrs) | |
1da177e4 | 797 | { |
5d2efba6 LV |
798 | unsigned int npages; |
799 | ||
1da177e4 LT |
800 | BUG_ON(direction == DMA_NONE); |
801 | ||
5d2efba6 | 802 | if (tbl) { |
d0847757 AP |
803 | npages = iommu_num_pages(dma_handle, size, |
804 | IOMMU_PAGE_SIZE(tbl)); | |
5d2efba6 LV |
805 | iommu_free(tbl, dma_handle, npages); |
806 | } | |
1da177e4 LT |
807 | } |
808 | ||
809 | /* Allocates a contiguous real buffer and creates mappings over it. | |
810 | * Returns the virtual address of the buffer and sets dma_handle | |
811 | * to the dma address (mapping) of the first page. | |
812 | */ | |
fb3475e9 FT |
813 | void *iommu_alloc_coherent(struct device *dev, struct iommu_table *tbl, |
814 | size_t size, dma_addr_t *dma_handle, | |
815 | unsigned long mask, gfp_t flag, int node) | |
1da177e4 LT |
816 | { |
817 | void *ret = NULL; | |
818 | dma_addr_t mapping; | |
5d2efba6 LV |
819 | unsigned int order; |
820 | unsigned int nio_pages, io_order; | |
8eb6c6e3 | 821 | struct page *page; |
1da177e4 LT |
822 | |
823 | size = PAGE_ALIGN(size); | |
1da177e4 LT |
824 | order = get_order(size); |
825 | ||
826 | /* | |
827 | * Client asked for way too much space. This is checked later | |
828 | * anyway. It is easier to debug here for the drivers than in | |
829 | * the tce tables. | |
830 | */ | |
831 | if (order >= IOMAP_MAX_ORDER) { | |
4dfa9c47 AB |
832 | dev_info(dev, "iommu_alloc_consistent size too large: 0x%lx\n", |
833 | size); | |
1da177e4 LT |
834 | return NULL; |
835 | } | |
836 | ||
837 | if (!tbl) | |
838 | return NULL; | |
839 | ||
840 | /* Alloc enough pages (and possibly more) */ | |
05061354 | 841 | page = alloc_pages_node(node, flag, order); |
8eb6c6e3 | 842 | if (!page) |
1da177e4 | 843 | return NULL; |
8eb6c6e3 | 844 | ret = page_address(page); |
1da177e4 LT |
845 | memset(ret, 0, size); |
846 | ||
847 | /* Set up tces to cover the allocated range */ | |
d0847757 AP |
848 | nio_pages = size >> tbl->it_page_shift; |
849 | io_order = get_iommu_order(size, tbl); | |
fb3475e9 | 850 | mapping = iommu_alloc(dev, tbl, ret, nio_pages, DMA_BIDIRECTIONAL, |
d0847757 | 851 | mask >> tbl->it_page_shift, io_order, NULL); |
1da177e4 LT |
852 | if (mapping == DMA_ERROR_CODE) { |
853 | free_pages((unsigned long)ret, order); | |
8eb6c6e3 CH |
854 | return NULL; |
855 | } | |
856 | *dma_handle = mapping; | |
1da177e4 LT |
857 | return ret; |
858 | } | |
859 | ||
860 | void iommu_free_coherent(struct iommu_table *tbl, size_t size, | |
861 | void *vaddr, dma_addr_t dma_handle) | |
862 | { | |
1da177e4 | 863 | if (tbl) { |
5d2efba6 LV |
864 | unsigned int nio_pages; |
865 | ||
866 | size = PAGE_ALIGN(size); | |
d0847757 | 867 | nio_pages = size >> tbl->it_page_shift; |
5d2efba6 | 868 | iommu_free(tbl, dma_handle, nio_pages); |
1da177e4 | 869 | size = PAGE_ALIGN(size); |
1da177e4 LT |
870 | free_pages((unsigned long)vaddr, get_order(size)); |
871 | } | |
872 | } | |
4e13c1ac AK |
873 | |
874 | #ifdef CONFIG_IOMMU_API | |
875 | /* | |
876 | * SPAPR TCE API | |
877 | */ | |
878 | static void group_release(void *iommu_data) | |
879 | { | |
880 | struct iommu_table *tbl = iommu_data; | |
881 | tbl->it_group = NULL; | |
882 | } | |
883 | ||
884 | void iommu_register_group(struct iommu_table *tbl, | |
885 | int pci_domain_number, unsigned long pe_num) | |
886 | { | |
887 | struct iommu_group *grp; | |
888 | char *name; | |
889 | ||
890 | grp = iommu_group_alloc(); | |
891 | if (IS_ERR(grp)) { | |
892 | pr_warn("powerpc iommu api: cannot create new group, err=%ld\n", | |
893 | PTR_ERR(grp)); | |
894 | return; | |
895 | } | |
896 | tbl->it_group = grp; | |
897 | iommu_group_set_iommudata(grp, tbl, group_release); | |
898 | name = kasprintf(GFP_KERNEL, "domain%d-pe%lx", | |
899 | pci_domain_number, pe_num); | |
900 | if (!name) | |
901 | return; | |
902 | iommu_group_set_name(grp, name); | |
903 | kfree(name); | |
904 | } | |
905 | ||
906 | enum dma_data_direction iommu_tce_direction(unsigned long tce) | |
907 | { | |
908 | if ((tce & TCE_PCI_READ) && (tce & TCE_PCI_WRITE)) | |
909 | return DMA_BIDIRECTIONAL; | |
910 | else if (tce & TCE_PCI_READ) | |
911 | return DMA_TO_DEVICE; | |
912 | else if (tce & TCE_PCI_WRITE) | |
913 | return DMA_FROM_DEVICE; | |
914 | else | |
915 | return DMA_NONE; | |
916 | } | |
917 | EXPORT_SYMBOL_GPL(iommu_tce_direction); | |
918 | ||
919 | void iommu_flush_tce(struct iommu_table *tbl) | |
920 | { | |
921 | /* Flush/invalidate TLB caches if necessary */ | |
922 | if (ppc_md.tce_flush) | |
923 | ppc_md.tce_flush(tbl); | |
924 | ||
925 | /* Make sure updates are seen by hardware */ | |
926 | mb(); | |
927 | } | |
928 | EXPORT_SYMBOL_GPL(iommu_flush_tce); | |
929 | ||
930 | int iommu_tce_clear_param_check(struct iommu_table *tbl, | |
931 | unsigned long ioba, unsigned long tce_value, | |
932 | unsigned long npages) | |
933 | { | |
934 | /* ppc_md.tce_free() does not support any value but 0 */ | |
935 | if (tce_value) | |
936 | return -EINVAL; | |
937 | ||
d0847757 | 938 | if (ioba & ~IOMMU_PAGE_MASK(tbl)) |
4e13c1ac AK |
939 | return -EINVAL; |
940 | ||
d0847757 | 941 | ioba >>= tbl->it_page_shift; |
4e13c1ac AK |
942 | if (ioba < tbl->it_offset) |
943 | return -EINVAL; | |
944 | ||
945 | if ((ioba + npages) > (tbl->it_offset + tbl->it_size)) | |
946 | return -EINVAL; | |
947 | ||
948 | return 0; | |
949 | } | |
950 | EXPORT_SYMBOL_GPL(iommu_tce_clear_param_check); | |
951 | ||
952 | int iommu_tce_put_param_check(struct iommu_table *tbl, | |
953 | unsigned long ioba, unsigned long tce) | |
954 | { | |
955 | if (!(tce & (TCE_PCI_WRITE | TCE_PCI_READ))) | |
956 | return -EINVAL; | |
957 | ||
d0847757 | 958 | if (tce & ~(IOMMU_PAGE_MASK(tbl) | TCE_PCI_WRITE | TCE_PCI_READ)) |
4e13c1ac AK |
959 | return -EINVAL; |
960 | ||
d0847757 | 961 | if (ioba & ~IOMMU_PAGE_MASK(tbl)) |
4e13c1ac AK |
962 | return -EINVAL; |
963 | ||
d0847757 | 964 | ioba >>= tbl->it_page_shift; |
4e13c1ac AK |
965 | if (ioba < tbl->it_offset) |
966 | return -EINVAL; | |
967 | ||
968 | if ((ioba + 1) > (tbl->it_offset + tbl->it_size)) | |
969 | return -EINVAL; | |
970 | ||
971 | return 0; | |
972 | } | |
973 | EXPORT_SYMBOL_GPL(iommu_tce_put_param_check); | |
974 | ||
975 | unsigned long iommu_clear_tce(struct iommu_table *tbl, unsigned long entry) | |
976 | { | |
977 | unsigned long oldtce; | |
978 | struct iommu_pool *pool = get_pool(tbl, entry); | |
979 | ||
980 | spin_lock(&(pool->lock)); | |
981 | ||
982 | oldtce = ppc_md.tce_get(tbl, entry); | |
983 | if (oldtce & (TCE_PCI_WRITE | TCE_PCI_READ)) | |
984 | ppc_md.tce_free(tbl, entry, 1); | |
985 | else | |
986 | oldtce = 0; | |
987 | ||
988 | spin_unlock(&(pool->lock)); | |
989 | ||
990 | return oldtce; | |
991 | } | |
992 | EXPORT_SYMBOL_GPL(iommu_clear_tce); | |
993 | ||
994 | int iommu_clear_tces_and_put_pages(struct iommu_table *tbl, | |
995 | unsigned long entry, unsigned long pages) | |
996 | { | |
997 | unsigned long oldtce; | |
998 | struct page *page; | |
999 | ||
1000 | for ( ; pages; --pages, ++entry) { | |
1001 | oldtce = iommu_clear_tce(tbl, entry); | |
1002 | if (!oldtce) | |
1003 | continue; | |
1004 | ||
1005 | page = pfn_to_page(oldtce >> PAGE_SHIFT); | |
1006 | WARN_ON(!page); | |
1007 | if (page) { | |
1008 | if (oldtce & TCE_PCI_WRITE) | |
1009 | SetPageDirty(page); | |
1010 | put_page(page); | |
1011 | } | |
1012 | } | |
1013 | ||
1014 | return 0; | |
1015 | } | |
1016 | EXPORT_SYMBOL_GPL(iommu_clear_tces_and_put_pages); | |
1017 | ||
1018 | /* | |
1019 | * hwaddr is a kernel virtual address here (0xc... bazillion), | |
1020 | * tce_build converts it to a physical address. | |
1021 | */ | |
1022 | int iommu_tce_build(struct iommu_table *tbl, unsigned long entry, | |
1023 | unsigned long hwaddr, enum dma_data_direction direction) | |
1024 | { | |
1025 | int ret = -EBUSY; | |
1026 | unsigned long oldtce; | |
1027 | struct iommu_pool *pool = get_pool(tbl, entry); | |
1028 | ||
1029 | spin_lock(&(pool->lock)); | |
1030 | ||
1031 | oldtce = ppc_md.tce_get(tbl, entry); | |
1032 | /* Add new entry if it is not busy */ | |
1033 | if (!(oldtce & (TCE_PCI_WRITE | TCE_PCI_READ))) | |
1034 | ret = ppc_md.tce_build(tbl, entry, 1, hwaddr, direction, NULL); | |
1035 | ||
1036 | spin_unlock(&(pool->lock)); | |
1037 | ||
1038 | /* if (unlikely(ret)) | |
1039 | pr_err("iommu_tce: %s failed on hwaddr=%lx ioba=%lx kva=%lx ret=%d\n", | |
84f1966e | 1040 | __func__, hwaddr, entry << tbl->it_page_shift, |
4e13c1ac AK |
1041 | hwaddr, ret); */ |
1042 | ||
1043 | return ret; | |
1044 | } | |
1045 | EXPORT_SYMBOL_GPL(iommu_tce_build); | |
1046 | ||
1047 | int iommu_put_tce_user_mode(struct iommu_table *tbl, unsigned long entry, | |
1048 | unsigned long tce) | |
1049 | { | |
1050 | int ret; | |
1051 | struct page *page = NULL; | |
d0847757 | 1052 | unsigned long hwaddr, offset = tce & IOMMU_PAGE_MASK(tbl) & ~PAGE_MASK; |
4e13c1ac AK |
1053 | enum dma_data_direction direction = iommu_tce_direction(tce); |
1054 | ||
1055 | ret = get_user_pages_fast(tce & PAGE_MASK, 1, | |
1056 | direction != DMA_TO_DEVICE, &page); | |
1057 | if (unlikely(ret != 1)) { | |
1058 | /* pr_err("iommu_tce: get_user_pages_fast failed tce=%lx ioba=%lx ret=%d\n", | |
84f1966e | 1059 | tce, entry << tbl->it_page_shift, ret); */ |
4e13c1ac AK |
1060 | return -EFAULT; |
1061 | } | |
1062 | hwaddr = (unsigned long) page_address(page) + offset; | |
1063 | ||
1064 | ret = iommu_tce_build(tbl, entry, hwaddr, direction); | |
1065 | if (ret) | |
1066 | put_page(page); | |
1067 | ||
1068 | if (ret < 0) | |
1069 | pr_err("iommu_tce: %s failed ioba=%lx, tce=%lx, ret=%d\n", | |
d0847757 | 1070 | __func__, entry << tbl->it_page_shift, tce, ret); |
4e13c1ac AK |
1071 | |
1072 | return ret; | |
1073 | } | |
1074 | EXPORT_SYMBOL_GPL(iommu_put_tce_user_mode); | |
1075 | ||
1076 | int iommu_take_ownership(struct iommu_table *tbl) | |
1077 | { | |
1078 | unsigned long sz = (tbl->it_size + 7) >> 3; | |
1079 | ||
1080 | if (tbl->it_offset == 0) | |
1081 | clear_bit(0, tbl->it_map); | |
1082 | ||
1083 | if (!bitmap_empty(tbl->it_map, tbl->it_size)) { | |
1084 | pr_err("iommu_tce: it_map is not empty"); | |
1085 | return -EBUSY; | |
1086 | } | |
1087 | ||
1088 | memset(tbl->it_map, 0xff, sz); | |
1089 | iommu_clear_tces_and_put_pages(tbl, tbl->it_offset, tbl->it_size); | |
1090 | ||
cd15b048 BH |
1091 | /* |
1092 | * Disable iommu bypass, otherwise the user can DMA to all of | |
1093 | * our physical memory via the bypass window instead of just | |
1094 | * the pages that has been explicitly mapped into the iommu | |
1095 | */ | |
1096 | if (tbl->set_bypass) | |
1097 | tbl->set_bypass(tbl, false); | |
1098 | ||
4e13c1ac AK |
1099 | return 0; |
1100 | } | |
1101 | EXPORT_SYMBOL_GPL(iommu_take_ownership); | |
1102 | ||
1103 | void iommu_release_ownership(struct iommu_table *tbl) | |
1104 | { | |
1105 | unsigned long sz = (tbl->it_size + 7) >> 3; | |
1106 | ||
1107 | iommu_clear_tces_and_put_pages(tbl, tbl->it_offset, tbl->it_size); | |
1108 | memset(tbl->it_map, 0, sz); | |
1109 | ||
1110 | /* Restore bit#0 set by iommu_init_table() */ | |
1111 | if (tbl->it_offset == 0) | |
1112 | set_bit(0, tbl->it_map); | |
cd15b048 BH |
1113 | |
1114 | /* The kernel owns the device now, we can restore the iommu bypass */ | |
1115 | if (tbl->set_bypass) | |
1116 | tbl->set_bypass(tbl, true); | |
4e13c1ac AK |
1117 | } |
1118 | EXPORT_SYMBOL_GPL(iommu_release_ownership); | |
1119 | ||
d905c5df | 1120 | int iommu_add_device(struct device *dev) |
4e13c1ac AK |
1121 | { |
1122 | struct iommu_table *tbl; | |
4e13c1ac | 1123 | |
763fe0ad GS |
1124 | /* |
1125 | * The sysfs entries should be populated before | |
1126 | * binding IOMMU group. If sysfs entries isn't | |
1127 | * ready, we simply bail. | |
1128 | */ | |
1129 | if (!device_is_registered(dev)) | |
1130 | return -ENOENT; | |
1131 | ||
1132 | if (dev->iommu_group) { | |
1133 | pr_debug("%s: Skipping device %s with iommu group %d\n", | |
1134 | __func__, dev_name(dev), | |
1135 | iommu_group_id(dev->iommu_group)); | |
4e13c1ac AK |
1136 | return -EBUSY; |
1137 | } | |
1138 | ||
1139 | tbl = get_iommu_table_base(dev); | |
1140 | if (!tbl || !tbl->it_group) { | |
763fe0ad GS |
1141 | pr_debug("%s: Skipping device %s with no tbl\n", |
1142 | __func__, dev_name(dev)); | |
4e13c1ac AK |
1143 | return 0; |
1144 | } | |
1145 | ||
763fe0ad GS |
1146 | pr_debug("%s: Adding %s to iommu group %d\n", |
1147 | __func__, dev_name(dev), | |
1148 | iommu_group_id(tbl->it_group)); | |
4e13c1ac | 1149 | |
d0847757 | 1150 | if (PAGE_SIZE < IOMMU_PAGE_SIZE(tbl)) { |
763fe0ad GS |
1151 | pr_err("%s: Invalid IOMMU page size %lx (%lx) on %s\n", |
1152 | __func__, IOMMU_PAGE_SIZE(tbl), | |
1153 | PAGE_SIZE, dev_name(dev)); | |
d0847757 AP |
1154 | return -EINVAL; |
1155 | } | |
1156 | ||
763fe0ad | 1157 | return iommu_group_add_device(tbl->it_group, dev); |
4e13c1ac | 1158 | } |
d905c5df | 1159 | EXPORT_SYMBOL_GPL(iommu_add_device); |
4e13c1ac | 1160 | |
d905c5df | 1161 | void iommu_del_device(struct device *dev) |
4e13c1ac | 1162 | { |
0c4b9e27 GS |
1163 | /* |
1164 | * Some devices might not have IOMMU table and group | |
1165 | * and we needn't detach them from the associated | |
1166 | * IOMMU groups | |
1167 | */ | |
1168 | if (!dev->iommu_group) { | |
1169 | pr_debug("iommu_tce: skipping device %s with no tbl\n", | |
1170 | dev_name(dev)); | |
1171 | return; | |
1172 | } | |
1173 | ||
4e13c1ac AK |
1174 | iommu_group_remove_device(dev); |
1175 | } | |
d905c5df | 1176 | EXPORT_SYMBOL_GPL(iommu_del_device); |
4e13c1ac AK |
1177 | |
1178 | #endif /* CONFIG_IOMMU_API */ |