2019-06-03 05:44:50 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2015-10-01 19:13:58 +00:00
|
|
|
/*
|
|
|
|
* A fairly generic DMA-API to IOMMU-API glue layer.
|
|
|
|
*
|
|
|
|
* Copyright (C) 2014-2015 ARM Ltd.
|
|
|
|
*
|
|
|
|
* based in part on arch/arm/mm/dma-mapping.c:
|
|
|
|
* Copyright (C) 2000-2004 Russell King
|
|
|
|
*/
|
|
|
|
|
2018-02-13 15:20:51 +00:00
|
|
|
#include <linux/acpi_iort.h>
|
2021-12-17 15:31:03 +00:00
|
|
|
#include <linux/atomic.h>
|
|
|
|
#include <linux/crash_dump.h>
|
2015-10-01 19:13:58 +00:00
|
|
|
#include <linux/device.h>
|
2021-12-17 15:31:03 +00:00
|
|
|
#include <linux/dma-direct.h>
|
|
|
|
#include <linux/dma-map-ops.h>
|
2015-12-18 17:01:46 +00:00
|
|
|
#include <linux/gfp.h>
|
2015-10-01 19:13:58 +00:00
|
|
|
#include <linux/huge_mm.h>
|
|
|
|
#include <linux/iommu.h>
|
|
|
|
#include <linux/iova.h>
|
2016-09-12 16:13:59 +00:00
|
|
|
#include <linux/irq.h>
|
2022-05-09 10:16:08 +00:00
|
|
|
#include <linux/list_sort.h>
|
2022-07-08 16:50:59 +00:00
|
|
|
#include <linux/memremap.h>
|
2015-10-01 19:13:58 +00:00
|
|
|
#include <linux/mm.h>
|
2019-12-09 19:47:25 +00:00
|
|
|
#include <linux/mutex.h>
|
2023-01-20 17:42:51 +00:00
|
|
|
#include <linux/of_iommu.h>
|
2016-09-12 16:14:00 +00:00
|
|
|
#include <linux/pci.h>
|
2015-12-18 17:01:46 +00:00
|
|
|
#include <linux/scatterlist.h>
|
2021-12-17 15:31:03 +00:00
|
|
|
#include <linux/spinlock.h>
|
|
|
|
#include <linux/swiotlb.h>
|
2015-12-18 17:01:46 +00:00
|
|
|
#include <linux/vmalloc.h>
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2022-08-16 17:28:05 +00:00
|
|
|
#include "dma-iommu.h"
|
|
|
|
|
2016-09-12 16:13:59 +00:00
|
|
|
struct iommu_dma_msi_page {
|
|
|
|
struct list_head list;
|
|
|
|
dma_addr_t iova;
|
|
|
|
phys_addr_t phys;
|
|
|
|
};
|
|
|
|
|
2017-01-19 20:57:46 +00:00
|
|
|
enum iommu_dma_cookie_type {
|
|
|
|
IOMMU_DMA_IOVA_COOKIE,
|
|
|
|
IOMMU_DMA_MSI_COOKIE,
|
|
|
|
};
|
|
|
|
|
2023-09-28 14:31:39 +00:00
|
|
|
enum iommu_dma_queue_type {
|
|
|
|
IOMMU_DMA_OPTS_PER_CPU_QUEUE,
|
|
|
|
IOMMU_DMA_OPTS_SINGLE_QUEUE,
|
|
|
|
};
|
|
|
|
|
|
|
|
struct iommu_dma_options {
|
|
|
|
enum iommu_dma_queue_type qt;
|
2023-09-28 14:31:40 +00:00
|
|
|
size_t fq_size;
|
|
|
|
unsigned int fq_timeout;
|
2023-09-28 14:31:39 +00:00
|
|
|
};
|
|
|
|
|
2016-09-12 16:13:59 +00:00
|
|
|
struct iommu_dma_cookie {
|
2017-01-19 20:57:46 +00:00
|
|
|
enum iommu_dma_cookie_type type;
|
|
|
|
union {
|
|
|
|
/* Full allocator for IOMMU_DMA_IOVA_COOKIE */
|
2021-12-17 15:31:03 +00:00
|
|
|
struct {
|
|
|
|
struct iova_domain iovad;
|
2023-09-28 14:31:39 +00:00
|
|
|
/* Flush queue */
|
|
|
|
union {
|
|
|
|
struct iova_fq *single_fq;
|
|
|
|
struct iova_fq __percpu *percpu_fq;
|
|
|
|
};
|
2021-12-17 15:31:03 +00:00
|
|
|
/* Number of TLB flushes that have been started */
|
|
|
|
atomic64_t fq_flush_start_cnt;
|
|
|
|
/* Number of TLB flushes that have been finished */
|
|
|
|
atomic64_t fq_flush_finish_cnt;
|
|
|
|
/* Timer to regularily empty the flush queues */
|
|
|
|
struct timer_list fq_timer;
|
|
|
|
/* 1 when timer is active, 0 when not */
|
|
|
|
atomic_t fq_timer_on;
|
|
|
|
};
|
2017-01-19 20:57:46 +00:00
|
|
|
/* Trivial linear page allocator for IOMMU_DMA_MSI_COOKIE */
|
|
|
|
dma_addr_t msi_iova;
|
|
|
|
};
|
|
|
|
struct list_head msi_page_list;
|
2018-09-20 16:10:22 +00:00
|
|
|
|
|
|
|
/* Domain for flush queue callback; NULL if flush queue not in use */
|
|
|
|
struct iommu_domain *fq_domain;
|
2023-09-28 14:31:39 +00:00
|
|
|
/* Options for dma-iommu use */
|
|
|
|
struct iommu_dma_options options;
|
2022-05-30 12:07:45 +00:00
|
|
|
struct mutex mutex;
|
2016-09-12 16:13:59 +00:00
|
|
|
};
|
|
|
|
|
2021-01-26 11:53:36 +00:00
|
|
|
static DEFINE_STATIC_KEY_FALSE(iommu_deferred_attach_enabled);
|
2022-08-06 20:24:56 +00:00
|
|
|
bool iommu_dma_forcedac __read_mostly;
|
2021-03-05 16:32:34 +00:00
|
|
|
|
|
|
|
static int __init iommu_dma_forcedac_setup(char *str)
|
|
|
|
{
|
|
|
|
int ret = kstrtobool(str, &iommu_dma_forcedac);
|
|
|
|
|
|
|
|
if (!ret && iommu_dma_forcedac)
|
|
|
|
pr_info("Forcing DAC for PCI devices\n");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
early_param("iommu.forcedac", iommu_dma_forcedac_setup);
|
2021-01-26 11:53:36 +00:00
|
|
|
|
2021-12-17 15:31:03 +00:00
|
|
|
/* Number of entries per flush queue */
|
2023-09-28 14:31:40 +00:00
|
|
|
#define IOVA_DEFAULT_FQ_SIZE 256
|
|
|
|
#define IOVA_SINGLE_FQ_SIZE 32768
|
2021-12-17 15:31:03 +00:00
|
|
|
|
|
|
|
/* Timeout (in ms) after which entries are flushed from the queue */
|
2023-09-28 14:31:40 +00:00
|
|
|
#define IOVA_DEFAULT_FQ_TIMEOUT 10
|
|
|
|
#define IOVA_SINGLE_FQ_TIMEOUT 1000
|
2021-12-17 15:31:03 +00:00
|
|
|
|
|
|
|
/* Flush queue entry for deferred flushing */
|
|
|
|
struct iova_fq_entry {
|
|
|
|
unsigned long iova_pfn;
|
|
|
|
unsigned long pages;
|
|
|
|
struct list_head freelist;
|
|
|
|
u64 counter; /* Flush counter when this entry was added */
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Per-CPU flush queue structure */
|
|
|
|
struct iova_fq {
|
|
|
|
spinlock_t lock;
|
2023-09-28 14:31:40 +00:00
|
|
|
unsigned int head, tail;
|
|
|
|
unsigned int mod_mask;
|
|
|
|
struct iova_fq_entry entries[];
|
2021-12-17 15:31:03 +00:00
|
|
|
};
|
|
|
|
|
2021-12-17 15:31:02 +00:00
|
|
|
#define fq_ring_for_each(i, fq) \
|
2023-09-28 14:31:40 +00:00
|
|
|
for ((i) = (fq)->head; (i) != (fq)->tail; (i) = ((i) + 1) & (fq)->mod_mask)
|
2021-12-17 15:31:02 +00:00
|
|
|
|
|
|
|
static inline bool fq_full(struct iova_fq *fq)
|
|
|
|
{
|
|
|
|
assert_spin_locked(&fq->lock);
|
2023-09-28 14:31:40 +00:00
|
|
|
return (((fq->tail + 1) & fq->mod_mask) == fq->head);
|
2021-12-17 15:31:02 +00:00
|
|
|
}
|
|
|
|
|
2021-12-17 15:31:03 +00:00
|
|
|
static inline unsigned int fq_ring_add(struct iova_fq *fq)
|
2021-12-17 15:31:02 +00:00
|
|
|
{
|
2021-12-17 15:31:03 +00:00
|
|
|
unsigned int idx = fq->tail;
|
2021-12-17 15:31:02 +00:00
|
|
|
|
|
|
|
assert_spin_locked(&fq->lock);
|
|
|
|
|
2023-09-28 14:31:40 +00:00
|
|
|
fq->tail = (idx + 1) & fq->mod_mask;
|
2021-12-17 15:31:02 +00:00
|
|
|
|
|
|
|
return idx;
|
|
|
|
}
|
|
|
|
|
2023-09-28 14:31:39 +00:00
|
|
|
static void fq_ring_free_locked(struct iommu_dma_cookie *cookie, struct iova_fq *fq)
|
2021-12-17 15:31:02 +00:00
|
|
|
{
|
2021-12-17 15:31:03 +00:00
|
|
|
u64 counter = atomic64_read(&cookie->fq_flush_finish_cnt);
|
|
|
|
unsigned int idx;
|
2021-12-17 15:31:02 +00:00
|
|
|
|
|
|
|
assert_spin_locked(&fq->lock);
|
|
|
|
|
|
|
|
fq_ring_for_each(idx, fq) {
|
|
|
|
|
|
|
|
if (fq->entries[idx].counter >= counter)
|
|
|
|
break;
|
|
|
|
|
|
|
|
put_pages_list(&fq->entries[idx].freelist);
|
2021-12-17 15:31:03 +00:00
|
|
|
free_iova_fast(&cookie->iovad,
|
2021-12-17 15:31:02 +00:00
|
|
|
fq->entries[idx].iova_pfn,
|
|
|
|
fq->entries[idx].pages);
|
|
|
|
|
2023-09-28 14:31:40 +00:00
|
|
|
fq->head = (fq->head + 1) & fq->mod_mask;
|
2021-12-17 15:31:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-28 14:31:39 +00:00
|
|
|
static void fq_ring_free(struct iommu_dma_cookie *cookie, struct iova_fq *fq)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&fq->lock, flags);
|
|
|
|
fq_ring_free_locked(cookie, fq);
|
|
|
|
spin_unlock_irqrestore(&fq->lock, flags);
|
|
|
|
}
|
|
|
|
|
2021-12-17 15:31:03 +00:00
|
|
|
static void fq_flush_iotlb(struct iommu_dma_cookie *cookie)
|
2021-12-17 15:31:02 +00:00
|
|
|
{
|
2021-12-17 15:31:03 +00:00
|
|
|
atomic64_inc(&cookie->fq_flush_start_cnt);
|
|
|
|
cookie->fq_domain->ops->flush_iotlb_all(cookie->fq_domain);
|
|
|
|
atomic64_inc(&cookie->fq_flush_finish_cnt);
|
2021-12-17 15:31:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void fq_flush_timeout(struct timer_list *t)
|
|
|
|
{
|
2021-12-17 15:31:03 +00:00
|
|
|
struct iommu_dma_cookie *cookie = from_timer(cookie, t, fq_timer);
|
2021-12-17 15:31:02 +00:00
|
|
|
int cpu;
|
|
|
|
|
2021-12-17 15:31:03 +00:00
|
|
|
atomic_set(&cookie->fq_timer_on, 0);
|
|
|
|
fq_flush_iotlb(cookie);
|
2021-12-17 15:31:02 +00:00
|
|
|
|
2023-09-28 14:31:39 +00:00
|
|
|
if (cookie->options.qt == IOMMU_DMA_OPTS_SINGLE_QUEUE) {
|
|
|
|
fq_ring_free(cookie, cookie->single_fq);
|
|
|
|
} else {
|
|
|
|
for_each_possible_cpu(cpu)
|
|
|
|
fq_ring_free(cookie, per_cpu_ptr(cookie->percpu_fq, cpu));
|
2021-12-17 15:31:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-12-17 15:31:03 +00:00
|
|
|
static void queue_iova(struct iommu_dma_cookie *cookie,
|
2021-12-17 15:31:02 +00:00
|
|
|
unsigned long pfn, unsigned long pages,
|
|
|
|
struct list_head *freelist)
|
|
|
|
{
|
|
|
|
struct iova_fq *fq;
|
|
|
|
unsigned long flags;
|
2021-12-17 15:31:03 +00:00
|
|
|
unsigned int idx;
|
2021-12-17 15:31:02 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Order against the IOMMU driver's pagetable update from unmapping
|
2021-12-17 15:31:03 +00:00
|
|
|
* @pte, to guarantee that fq_flush_iotlb() observes that if called
|
2021-12-17 15:31:02 +00:00
|
|
|
* from a different CPU before we release the lock below. Full barrier
|
|
|
|
* so it also pairs with iommu_dma_init_fq() to avoid seeing partially
|
|
|
|
* written fq state here.
|
|
|
|
*/
|
|
|
|
smp_mb();
|
|
|
|
|
2023-09-28 14:31:39 +00:00
|
|
|
if (cookie->options.qt == IOMMU_DMA_OPTS_SINGLE_QUEUE)
|
|
|
|
fq = cookie->single_fq;
|
|
|
|
else
|
|
|
|
fq = raw_cpu_ptr(cookie->percpu_fq);
|
|
|
|
|
2021-12-17 15:31:02 +00:00
|
|
|
spin_lock_irqsave(&fq->lock, flags);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* First remove all entries from the flush queue that have already been
|
|
|
|
* flushed out on another CPU. This makes the fq_full() check below less
|
|
|
|
* likely to be true.
|
|
|
|
*/
|
2023-09-28 14:31:39 +00:00
|
|
|
fq_ring_free_locked(cookie, fq);
|
2021-12-17 15:31:02 +00:00
|
|
|
|
|
|
|
if (fq_full(fq)) {
|
2021-12-17 15:31:03 +00:00
|
|
|
fq_flush_iotlb(cookie);
|
2023-09-28 14:31:39 +00:00
|
|
|
fq_ring_free_locked(cookie, fq);
|
2021-12-17 15:31:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
idx = fq_ring_add(fq);
|
|
|
|
|
|
|
|
fq->entries[idx].iova_pfn = pfn;
|
|
|
|
fq->entries[idx].pages = pages;
|
2021-12-17 15:31:03 +00:00
|
|
|
fq->entries[idx].counter = atomic64_read(&cookie->fq_flush_start_cnt);
|
2021-12-17 15:31:02 +00:00
|
|
|
list_splice(freelist, &fq->entries[idx].freelist);
|
|
|
|
|
|
|
|
spin_unlock_irqrestore(&fq->lock, flags);
|
|
|
|
|
|
|
|
/* Avoid false sharing as much as possible. */
|
2021-12-17 15:31:03 +00:00
|
|
|
if (!atomic_read(&cookie->fq_timer_on) &&
|
|
|
|
!atomic_xchg(&cookie->fq_timer_on, 1))
|
|
|
|
mod_timer(&cookie->fq_timer,
|
2023-09-28 14:31:40 +00:00
|
|
|
jiffies + msecs_to_jiffies(cookie->options.fq_timeout));
|
2021-12-17 15:31:02 +00:00
|
|
|
}
|
|
|
|
|
2023-09-28 14:31:39 +00:00
|
|
|
static void iommu_dma_free_fq_single(struct iova_fq *fq)
|
2021-12-17 15:31:02 +00:00
|
|
|
{
|
2023-09-28 14:31:39 +00:00
|
|
|
int idx;
|
2021-12-17 15:31:02 +00:00
|
|
|
|
2023-09-28 14:31:39 +00:00
|
|
|
fq_ring_for_each(idx, fq)
|
|
|
|
put_pages_list(&fq->entries[idx].freelist);
|
|
|
|
vfree(fq);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iommu_dma_free_fq_percpu(struct iova_fq __percpu *percpu_fq)
|
|
|
|
{
|
|
|
|
int cpu, idx;
|
2021-12-17 15:31:02 +00:00
|
|
|
|
2021-12-17 15:31:03 +00:00
|
|
|
/* The IOVAs will be torn down separately, so just free our queued pages */
|
2021-12-17 15:31:02 +00:00
|
|
|
for_each_possible_cpu(cpu) {
|
2023-09-28 14:31:39 +00:00
|
|
|
struct iova_fq *fq = per_cpu_ptr(percpu_fq, cpu);
|
2021-12-17 15:31:02 +00:00
|
|
|
|
|
|
|
fq_ring_for_each(idx, fq)
|
|
|
|
put_pages_list(&fq->entries[idx].freelist);
|
|
|
|
}
|
|
|
|
|
2023-09-28 14:31:39 +00:00
|
|
|
free_percpu(percpu_fq);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iommu_dma_free_fq(struct iommu_dma_cookie *cookie)
|
|
|
|
{
|
|
|
|
if (!cookie->fq_domain)
|
|
|
|
return;
|
|
|
|
|
|
|
|
del_timer_sync(&cookie->fq_timer);
|
|
|
|
if (cookie->options.qt == IOMMU_DMA_OPTS_SINGLE_QUEUE)
|
|
|
|
iommu_dma_free_fq_single(cookie->single_fq);
|
|
|
|
else
|
|
|
|
iommu_dma_free_fq_percpu(cookie->percpu_fq);
|
|
|
|
}
|
|
|
|
|
2023-09-28 14:31:40 +00:00
|
|
|
static void iommu_dma_init_one_fq(struct iova_fq *fq, size_t fq_size)
|
2023-09-28 14:31:39 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
fq->head = 0;
|
|
|
|
fq->tail = 0;
|
2023-09-28 14:31:40 +00:00
|
|
|
fq->mod_mask = fq_size - 1;
|
2023-09-28 14:31:39 +00:00
|
|
|
|
|
|
|
spin_lock_init(&fq->lock);
|
|
|
|
|
2023-09-28 14:31:40 +00:00
|
|
|
for (i = 0; i < fq_size; i++)
|
2023-09-28 14:31:39 +00:00
|
|
|
INIT_LIST_HEAD(&fq->entries[i].freelist);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iommu_dma_init_fq_single(struct iommu_dma_cookie *cookie)
|
|
|
|
{
|
2023-09-28 14:31:40 +00:00
|
|
|
size_t fq_size = cookie->options.fq_size;
|
2023-09-28 14:31:39 +00:00
|
|
|
struct iova_fq *queue;
|
|
|
|
|
2023-09-28 14:31:40 +00:00
|
|
|
queue = vmalloc(struct_size(queue, entries, fq_size));
|
2023-09-28 14:31:39 +00:00
|
|
|
if (!queue)
|
|
|
|
return -ENOMEM;
|
2023-09-28 14:31:40 +00:00
|
|
|
iommu_dma_init_one_fq(queue, fq_size);
|
2023-09-28 14:31:39 +00:00
|
|
|
cookie->single_fq = queue;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iommu_dma_init_fq_percpu(struct iommu_dma_cookie *cookie)
|
|
|
|
{
|
2023-09-28 14:31:40 +00:00
|
|
|
size_t fq_size = cookie->options.fq_size;
|
2023-09-28 14:31:39 +00:00
|
|
|
struct iova_fq __percpu *queue;
|
|
|
|
int cpu;
|
|
|
|
|
2023-09-28 14:31:40 +00:00
|
|
|
queue = __alloc_percpu(struct_size(queue, entries, fq_size),
|
|
|
|
__alignof__(*queue));
|
2023-09-28 14:31:39 +00:00
|
|
|
if (!queue)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
for_each_possible_cpu(cpu)
|
2023-09-28 14:31:40 +00:00
|
|
|
iommu_dma_init_one_fq(per_cpu_ptr(queue, cpu), fq_size);
|
2023-09-28 14:31:39 +00:00
|
|
|
cookie->percpu_fq = queue;
|
|
|
|
return 0;
|
2021-12-17 15:31:02 +00:00
|
|
|
}
|
|
|
|
|
2021-12-17 15:31:03 +00:00
|
|
|
/* sysfs updates are serialised by the mutex of the group owning @domain */
|
|
|
|
int iommu_dma_init_fq(struct iommu_domain *domain)
|
2021-12-17 15:31:02 +00:00
|
|
|
{
|
2021-12-17 15:31:03 +00:00
|
|
|
struct iommu_dma_cookie *cookie = domain->iova_cookie;
|
2023-09-28 14:31:39 +00:00
|
|
|
int rc;
|
2021-12-17 15:31:02 +00:00
|
|
|
|
2021-12-17 15:31:03 +00:00
|
|
|
if (cookie->fq_domain)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
atomic64_set(&cookie->fq_flush_start_cnt, 0);
|
|
|
|
atomic64_set(&cookie->fq_flush_finish_cnt, 0);
|
2021-12-17 15:31:02 +00:00
|
|
|
|
2023-09-28 14:31:39 +00:00
|
|
|
if (cookie->options.qt == IOMMU_DMA_OPTS_SINGLE_QUEUE)
|
|
|
|
rc = iommu_dma_init_fq_single(cookie);
|
|
|
|
else
|
|
|
|
rc = iommu_dma_init_fq_percpu(cookie);
|
|
|
|
|
|
|
|
if (rc) {
|
2021-12-17 15:31:03 +00:00
|
|
|
pr_warn("iova flush queue initialization failed\n");
|
2021-12-17 15:31:02 +00:00
|
|
|
return -ENOMEM;
|
2021-12-17 15:31:03 +00:00
|
|
|
}
|
2021-12-17 15:31:02 +00:00
|
|
|
|
2021-12-17 15:31:03 +00:00
|
|
|
timer_setup(&cookie->fq_timer, fq_flush_timeout, 0);
|
|
|
|
atomic_set(&cookie->fq_timer_on, 0);
|
|
|
|
/*
|
|
|
|
* Prevent incomplete fq state being observable. Pairs with path from
|
|
|
|
* __iommu_dma_unmap() through iommu_dma_free_iova() to queue_iova()
|
|
|
|
*/
|
|
|
|
smp_wmb();
|
|
|
|
WRITE_ONCE(cookie->fq_domain, domain);
|
2021-12-17 15:31:02 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-01-19 20:57:46 +00:00
|
|
|
static inline size_t cookie_msi_granule(struct iommu_dma_cookie *cookie)
|
|
|
|
{
|
|
|
|
if (cookie->type == IOMMU_DMA_IOVA_COOKIE)
|
|
|
|
return cookie->iovad.granule;
|
|
|
|
return PAGE_SIZE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct iommu_dma_cookie *cookie_alloc(enum iommu_dma_cookie_type type)
|
|
|
|
{
|
|
|
|
struct iommu_dma_cookie *cookie;
|
|
|
|
|
|
|
|
cookie = kzalloc(sizeof(*cookie), GFP_KERNEL);
|
|
|
|
if (cookie) {
|
|
|
|
INIT_LIST_HEAD(&cookie->msi_page_list);
|
|
|
|
cookie->type = type;
|
|
|
|
}
|
|
|
|
return cookie;
|
2016-09-12 16:13:59 +00:00
|
|
|
}
|
|
|
|
|
2015-10-01 19:13:58 +00:00
|
|
|
/**
|
|
|
|
* iommu_get_dma_cookie - Acquire DMA-API resources for a domain
|
|
|
|
* @domain: IOMMU domain to prepare for DMA-API usage
|
|
|
|
*/
|
|
|
|
int iommu_get_dma_cookie(struct iommu_domain *domain)
|
2017-01-19 20:57:46 +00:00
|
|
|
{
|
|
|
|
if (domain->iova_cookie)
|
|
|
|
return -EEXIST;
|
|
|
|
|
|
|
|
domain->iova_cookie = cookie_alloc(IOMMU_DMA_IOVA_COOKIE);
|
|
|
|
if (!domain->iova_cookie)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2022-05-30 12:07:45 +00:00
|
|
|
mutex_init(&domain->iova_cookie->mutex);
|
2017-01-19 20:57:46 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* iommu_get_msi_cookie - Acquire just MSI remapping resources
|
|
|
|
* @domain: IOMMU domain to prepare
|
|
|
|
* @base: Start address of IOVA region for MSI mappings
|
|
|
|
*
|
|
|
|
* Users who manage their own IOVA allocation and do not want DMA API support,
|
|
|
|
* but would still like to take advantage of automatic MSI remapping, can use
|
|
|
|
* this to initialise their own domain appropriately. Users should reserve a
|
|
|
|
* contiguous IOVA region, starting at @base, large enough to accommodate the
|
|
|
|
* number of PAGE_SIZE mappings necessary to cover every MSI doorbell address
|
|
|
|
* used by the devices attached to @domain.
|
|
|
|
*/
|
|
|
|
int iommu_get_msi_cookie(struct iommu_domain *domain, dma_addr_t base)
|
2015-10-01 19:13:58 +00:00
|
|
|
{
|
2016-09-12 16:13:59 +00:00
|
|
|
struct iommu_dma_cookie *cookie;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2017-01-19 20:57:46 +00:00
|
|
|
if (domain->type != IOMMU_DOMAIN_UNMANAGED)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2015-10-01 19:13:58 +00:00
|
|
|
if (domain->iova_cookie)
|
|
|
|
return -EEXIST;
|
|
|
|
|
2017-01-19 20:57:46 +00:00
|
|
|
cookie = cookie_alloc(IOMMU_DMA_MSI_COOKIE);
|
2016-09-12 16:13:59 +00:00
|
|
|
if (!cookie)
|
|
|
|
return -ENOMEM;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2017-01-19 20:57:46 +00:00
|
|
|
cookie->msi_iova = base;
|
2016-09-12 16:13:59 +00:00
|
|
|
domain->iova_cookie = cookie;
|
|
|
|
return 0;
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
2017-01-19 20:57:46 +00:00
|
|
|
EXPORT_SYMBOL(iommu_get_msi_cookie);
|
2015-10-01 19:13:58 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* iommu_put_dma_cookie - Release a domain's DMA mapping resources
|
2017-01-19 20:57:46 +00:00
|
|
|
* @domain: IOMMU domain previously prepared by iommu_get_dma_cookie() or
|
|
|
|
* iommu_get_msi_cookie()
|
2015-10-01 19:13:58 +00:00
|
|
|
*/
|
|
|
|
void iommu_put_dma_cookie(struct iommu_domain *domain)
|
|
|
|
{
|
2016-09-12 16:13:59 +00:00
|
|
|
struct iommu_dma_cookie *cookie = domain->iova_cookie;
|
|
|
|
struct iommu_dma_msi_page *msi, *tmp;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2016-09-12 16:13:59 +00:00
|
|
|
if (!cookie)
|
2015-10-01 19:13:58 +00:00
|
|
|
return;
|
|
|
|
|
2021-12-17 15:31:02 +00:00
|
|
|
if (cookie->type == IOMMU_DMA_IOVA_COOKIE && cookie->iovad.granule) {
|
2021-12-17 15:31:03 +00:00
|
|
|
iommu_dma_free_fq(cookie);
|
2016-09-12 16:13:59 +00:00
|
|
|
put_iova_domain(&cookie->iovad);
|
2021-12-17 15:31:02 +00:00
|
|
|
}
|
2016-09-12 16:13:59 +00:00
|
|
|
|
|
|
|
list_for_each_entry_safe(msi, tmp, &cookie->msi_page_list, list) {
|
|
|
|
list_del(&msi->list);
|
|
|
|
kfree(msi);
|
|
|
|
}
|
|
|
|
kfree(cookie);
|
2015-10-01 19:13:58 +00:00
|
|
|
domain->iova_cookie = NULL;
|
|
|
|
}
|
|
|
|
|
2017-03-16 17:00:19 +00:00
|
|
|
/**
|
|
|
|
* iommu_dma_get_resv_regions - Reserved region driver helper
|
|
|
|
* @dev: Device from iommu_get_resv_regions()
|
|
|
|
* @list: Reserved region list from iommu_get_resv_regions()
|
|
|
|
*
|
|
|
|
* IOMMU drivers can use this to implement their .get_resv_regions callback
|
2018-04-18 11:40:42 +00:00
|
|
|
* for general non-IOMMU-specific reservations. Currently, this covers GICv3
|
|
|
|
* ITS region reservation on ACPI based ARM platforms that may require HW MSI
|
|
|
|
* reservation.
|
2017-03-16 17:00:19 +00:00
|
|
|
*/
|
|
|
|
void iommu_dma_get_resv_regions(struct device *dev, struct list_head *list)
|
2016-09-12 16:14:00 +00:00
|
|
|
{
|
|
|
|
|
2018-11-29 13:01:00 +00:00
|
|
|
if (!is_of_node(dev_iommu_fwspec_get(dev)->iommu_fwnode))
|
2022-06-15 10:10:38 +00:00
|
|
|
iort_iommu_get_resv_regions(dev, list);
|
2017-03-16 17:00:19 +00:00
|
|
|
|
2023-01-20 17:42:51 +00:00
|
|
|
if (dev->of_node)
|
|
|
|
of_iommu_get_resv_regions(dev, list);
|
2016-09-12 16:14:00 +00:00
|
|
|
}
|
2017-03-16 17:00:19 +00:00
|
|
|
EXPORT_SYMBOL(iommu_dma_get_resv_regions);
|
2016-09-12 16:14:00 +00:00
|
|
|
|
2017-03-16 17:00:18 +00:00
|
|
|
static int cookie_init_hw_msi_region(struct iommu_dma_cookie *cookie,
|
|
|
|
phys_addr_t start, phys_addr_t end)
|
|
|
|
{
|
|
|
|
struct iova_domain *iovad = &cookie->iovad;
|
|
|
|
struct iommu_dma_msi_page *msi_page;
|
|
|
|
int i, num_pages;
|
|
|
|
|
|
|
|
start -= iova_offset(iovad, start);
|
|
|
|
num_pages = iova_align(iovad, end - start) >> iova_shift(iovad);
|
|
|
|
|
|
|
|
for (i = 0; i < num_pages; i++) {
|
2020-03-04 11:11:17 +00:00
|
|
|
msi_page = kmalloc(sizeof(*msi_page), GFP_KERNEL);
|
|
|
|
if (!msi_page)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
msi_page->phys = start;
|
|
|
|
msi_page->iova = start;
|
|
|
|
INIT_LIST_HEAD(&msi_page->list);
|
|
|
|
list_add(&msi_page->list, &cookie->msi_page_list);
|
2017-03-16 17:00:18 +00:00
|
|
|
start += iovad->granule;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-05-09 10:16:08 +00:00
|
|
|
static int iommu_dma_ranges_sort(void *priv, const struct list_head *a,
|
|
|
|
const struct list_head *b)
|
|
|
|
{
|
|
|
|
struct resource_entry *res_a = list_entry(a, typeof(*res_a), node);
|
|
|
|
struct resource_entry *res_b = list_entry(b, typeof(*res_b), node);
|
|
|
|
|
|
|
|
return res_a->res->start > res_b->res->start;
|
|
|
|
}
|
|
|
|
|
2019-05-03 14:05:33 +00:00
|
|
|
static int iova_reserve_pci_windows(struct pci_dev *dev,
|
2018-04-18 11:40:42 +00:00
|
|
|
struct iova_domain *iovad)
|
|
|
|
{
|
|
|
|
struct pci_host_bridge *bridge = pci_find_host_bridge(dev->bus);
|
|
|
|
struct resource_entry *window;
|
|
|
|
unsigned long lo, hi;
|
2019-05-03 14:05:33 +00:00
|
|
|
phys_addr_t start = 0, end;
|
2018-04-18 11:40:42 +00:00
|
|
|
|
|
|
|
resource_list_for_each_entry(window, &bridge->windows) {
|
|
|
|
if (resource_type(window->res) != IORESOURCE_MEM)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
lo = iova_pfn(iovad, window->res->start - window->offset);
|
|
|
|
hi = iova_pfn(iovad, window->res->end - window->offset);
|
|
|
|
reserve_iova(iovad, lo, hi);
|
|
|
|
}
|
2019-05-03 14:05:33 +00:00
|
|
|
|
|
|
|
/* Get reserved DMA windows from host bridge */
|
2022-05-09 10:16:08 +00:00
|
|
|
list_sort(NULL, &bridge->dma_ranges, iommu_dma_ranges_sort);
|
2019-05-03 14:05:33 +00:00
|
|
|
resource_list_for_each_entry(window, &bridge->dma_ranges) {
|
|
|
|
end = window->res->start - window->offset;
|
|
|
|
resv_iova:
|
|
|
|
if (end > start) {
|
|
|
|
lo = iova_pfn(iovad, start);
|
|
|
|
hi = iova_pfn(iovad, end);
|
|
|
|
reserve_iova(iovad, lo, hi);
|
2020-09-14 07:23:19 +00:00
|
|
|
} else if (end < start) {
|
2022-05-09 10:16:08 +00:00
|
|
|
/* DMA ranges should be non-overlapping */
|
2020-09-14 07:23:19 +00:00
|
|
|
dev_err(&dev->dev,
|
2021-06-07 12:49:05 +00:00
|
|
|
"Failed to reserve IOVA [%pa-%pa]\n",
|
|
|
|
&start, &end);
|
2019-05-03 14:05:33 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
start = window->res->end - window->offset + 1;
|
|
|
|
/* If window is last entry */
|
|
|
|
if (window->node.next == &bridge->dma_ranges &&
|
2019-06-17 13:30:54 +00:00
|
|
|
end != ~(phys_addr_t)0) {
|
|
|
|
end = ~(phys_addr_t)0;
|
2019-05-03 14:05:33 +00:00
|
|
|
goto resv_iova;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
2018-04-18 11:40:42 +00:00
|
|
|
}
|
|
|
|
|
2017-03-16 17:00:18 +00:00
|
|
|
static int iova_reserve_iommu_regions(struct device *dev,
|
|
|
|
struct iommu_domain *domain)
|
|
|
|
{
|
|
|
|
struct iommu_dma_cookie *cookie = domain->iova_cookie;
|
|
|
|
struct iova_domain *iovad = &cookie->iovad;
|
|
|
|
struct iommu_resv_region *region;
|
|
|
|
LIST_HEAD(resv_regions);
|
|
|
|
int ret = 0;
|
|
|
|
|
2019-05-03 14:05:33 +00:00
|
|
|
if (dev_is_pci(dev)) {
|
|
|
|
ret = iova_reserve_pci_windows(to_pci_dev(dev), iovad);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
2018-04-18 11:40:42 +00:00
|
|
|
|
2017-03-16 17:00:18 +00:00
|
|
|
iommu_get_resv_regions(dev, &resv_regions);
|
|
|
|
list_for_each_entry(region, &resv_regions, list) {
|
|
|
|
unsigned long lo, hi;
|
|
|
|
|
|
|
|
/* We ARE the software that manages these! */
|
|
|
|
if (region->type == IOMMU_RESV_SW_MSI)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
lo = iova_pfn(iovad, region->start);
|
|
|
|
hi = iova_pfn(iovad, region->start + region->length - 1);
|
|
|
|
reserve_iova(iovad, lo, hi);
|
|
|
|
|
|
|
|
if (region->type == IOMMU_RESV_MSI)
|
|
|
|
ret = cookie_init_hw_msi_region(cookie, region->start,
|
|
|
|
region->start + region->length);
|
|
|
|
if (ret)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
iommu_put_resv_regions(dev, &resv_regions);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-02-25 06:14:54 +00:00
|
|
|
static bool dev_is_untrusted(struct device *dev)
|
|
|
|
{
|
|
|
|
return dev_is_pci(dev) && to_pci_dev(dev)->untrusted;
|
|
|
|
}
|
|
|
|
|
2023-06-12 15:31:59 +00:00
|
|
|
static bool dev_use_swiotlb(struct device *dev, size_t size,
|
|
|
|
enum dma_data_direction dir)
|
2021-09-29 02:32:58 +00:00
|
|
|
{
|
2023-06-12 15:31:59 +00:00
|
|
|
return IS_ENABLED(CONFIG_SWIOTLB) &&
|
|
|
|
(dev_is_untrusted(dev) ||
|
|
|
|
dma_kmalloc_needs_bounce(dev, size, dir));
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool dev_use_sg_swiotlb(struct device *dev, struct scatterlist *sg,
|
|
|
|
int nents, enum dma_data_direction dir)
|
|
|
|
{
|
|
|
|
struct scatterlist *s;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (!IS_ENABLED(CONFIG_SWIOTLB))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (dev_is_untrusted(dev))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If kmalloc() buffers are not DMA-safe for this device and
|
|
|
|
* direction, check the individual lengths in the sg list. If any
|
|
|
|
* element is deemed unsafe, use the swiotlb for bouncing.
|
|
|
|
*/
|
|
|
|
if (!dma_kmalloc_safe(dev, dir)) {
|
|
|
|
for_each_sg(sg, s, nents, i)
|
|
|
|
if (!dma_kmalloc_size_aligned(s->length))
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
2021-09-29 02:32:58 +00:00
|
|
|
}
|
|
|
|
|
2023-09-28 14:31:39 +00:00
|
|
|
/**
|
|
|
|
* iommu_dma_init_options - Initialize dma-iommu options
|
|
|
|
* @options: The options to be initialized
|
|
|
|
* @dev: Device the options are set for
|
|
|
|
*
|
|
|
|
* This allows tuning dma-iommu specific to device properties
|
|
|
|
*/
|
|
|
|
static void iommu_dma_init_options(struct iommu_dma_options *options,
|
|
|
|
struct device *dev)
|
|
|
|
{
|
2023-09-28 14:31:40 +00:00
|
|
|
/* Shadowing IOTLB flushes do better with a single large queue */
|
|
|
|
if (dev->iommu->shadow_on_flush) {
|
2023-09-28 14:31:39 +00:00
|
|
|
options->qt = IOMMU_DMA_OPTS_SINGLE_QUEUE;
|
2023-09-28 14:31:40 +00:00
|
|
|
options->fq_timeout = IOVA_SINGLE_FQ_TIMEOUT;
|
|
|
|
options->fq_size = IOVA_SINGLE_FQ_SIZE;
|
|
|
|
} else {
|
2023-09-28 14:31:39 +00:00
|
|
|
options->qt = IOMMU_DMA_OPTS_PER_CPU_QUEUE;
|
2023-09-28 14:31:40 +00:00
|
|
|
options->fq_size = IOVA_DEFAULT_FQ_SIZE;
|
|
|
|
options->fq_timeout = IOVA_DEFAULT_FQ_TIMEOUT;
|
|
|
|
}
|
2023-09-28 14:31:39 +00:00
|
|
|
}
|
|
|
|
|
2015-10-01 19:13:58 +00:00
|
|
|
/**
|
|
|
|
* iommu_dma_init_domain - Initialise a DMA mapping domain
|
|
|
|
* @domain: IOMMU domain previously prepared by iommu_get_dma_cookie()
|
|
|
|
* @base: IOVA at which the mappable address space starts
|
2021-06-18 15:20:59 +00:00
|
|
|
* @limit: Last address of the IOVA space
|
2016-09-12 16:14:00 +00:00
|
|
|
* @dev: Device the domain is being initialised for
|
2015-10-01 19:13:58 +00:00
|
|
|
*
|
2021-06-18 15:20:59 +00:00
|
|
|
* @base and @limit + 1 should be exact multiples of IOMMU page granularity to
|
2015-10-01 19:13:58 +00:00
|
|
|
* avoid rounding surprises. If necessary, we reserve the page at address 0
|
|
|
|
* to ensure it is an invalid IOVA. It is safe to reinitialise a domain, but
|
|
|
|
* any change which could make prior IOVAs invalid will fail.
|
|
|
|
*/
|
2019-05-20 07:29:29 +00:00
|
|
|
static int iommu_dma_init_domain(struct iommu_domain *domain, dma_addr_t base,
|
2021-06-18 15:20:59 +00:00
|
|
|
dma_addr_t limit, struct device *dev)
|
2015-10-01 19:13:58 +00:00
|
|
|
{
|
2017-01-19 20:57:46 +00:00
|
|
|
struct iommu_dma_cookie *cookie = domain->iova_cookie;
|
2019-01-24 07:10:02 +00:00
|
|
|
unsigned long order, base_pfn;
|
2019-08-24 01:47:12 +00:00
|
|
|
struct iova_domain *iovad;
|
2022-02-03 09:59:20 +00:00
|
|
|
int ret;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2017-01-19 20:57:46 +00:00
|
|
|
if (!cookie || cookie->type != IOMMU_DMA_IOVA_COOKIE)
|
|
|
|
return -EINVAL;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2019-08-24 01:47:12 +00:00
|
|
|
iovad = &cookie->iovad;
|
|
|
|
|
2015-10-01 19:13:58 +00:00
|
|
|
/* Use the smallest supported page size for IOVA granularity */
|
2016-04-07 17:42:06 +00:00
|
|
|
order = __ffs(domain->pgsize_bitmap);
|
2015-10-01 19:13:58 +00:00
|
|
|
base_pfn = max_t(unsigned long, 1, base >> order);
|
|
|
|
|
|
|
|
/* Check the domain allows at least some access to the device... */
|
|
|
|
if (domain->geometry.force_aperture) {
|
|
|
|
if (base > domain->geometry.aperture_end ||
|
2021-06-18 15:20:59 +00:00
|
|
|
limit < domain->geometry.aperture_start) {
|
2015-10-01 19:13:58 +00:00
|
|
|
pr_warn("specified DMA range outside IOMMU capability\n");
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
/* ...then finally give it a kicking to make sure it fits */
|
|
|
|
base_pfn = max_t(unsigned long, base_pfn,
|
|
|
|
domain->geometry.aperture_start >> order);
|
|
|
|
}
|
|
|
|
|
2017-01-16 13:24:54 +00:00
|
|
|
/* start_pfn is always nonzero for an already-initialised domain */
|
2022-05-30 12:07:45 +00:00
|
|
|
mutex_lock(&cookie->mutex);
|
2015-10-01 19:13:58 +00:00
|
|
|
if (iovad->start_pfn) {
|
|
|
|
if (1UL << order != iovad->granule ||
|
2017-01-16 13:24:54 +00:00
|
|
|
base_pfn != iovad->start_pfn) {
|
2015-10-01 19:13:58 +00:00
|
|
|
pr_warn("Incompatible range for DMA domain\n");
|
2022-05-30 12:07:45 +00:00
|
|
|
ret = -EFAULT;
|
|
|
|
goto done_unlock;
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
2017-03-16 17:00:18 +00:00
|
|
|
|
2022-05-30 12:07:45 +00:00
|
|
|
ret = 0;
|
|
|
|
goto done_unlock;
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
2017-03-16 17:00:18 +00:00
|
|
|
|
2017-09-21 15:52:45 +00:00
|
|
|
init_iova_domain(iovad, 1UL << order, base_pfn);
|
2022-02-03 09:59:20 +00:00
|
|
|
ret = iova_domain_init_rcaches(iovad);
|
|
|
|
if (ret)
|
2022-05-30 12:07:45 +00:00
|
|
|
goto done_unlock;
|
2018-09-20 16:10:22 +00:00
|
|
|
|
2023-09-28 14:31:39 +00:00
|
|
|
iommu_dma_init_options(&cookie->options, dev);
|
|
|
|
|
2021-08-11 12:21:34 +00:00
|
|
|
/* If the FQ fails we can simply fall back to strict mode */
|
2023-05-04 21:10:56 +00:00
|
|
|
if (domain->type == IOMMU_DOMAIN_DMA_FQ &&
|
|
|
|
(!device_iommu_capable(dev, IOMMU_CAP_DEFERRED_FLUSH) || iommu_dma_init_fq(domain)))
|
2021-08-11 12:21:38 +00:00
|
|
|
domain->type = IOMMU_DOMAIN_DMA;
|
2017-03-16 17:00:18 +00:00
|
|
|
|
2022-05-30 12:07:45 +00:00
|
|
|
ret = iova_reserve_iommu_regions(dev, domain);
|
|
|
|
|
|
|
|
done_unlock:
|
|
|
|
mutex_unlock(&cookie->mutex);
|
|
|
|
return ret;
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-01-06 13:28:12 +00:00
|
|
|
* dma_info_to_prot - Translate DMA API directions and attributes to IOMMU API
|
|
|
|
* page flags.
|
2015-10-01 19:13:58 +00:00
|
|
|
* @dir: Direction of DMA transfer
|
|
|
|
* @coherent: Is the DMA master cache-coherent?
|
2017-01-06 13:28:12 +00:00
|
|
|
* @attrs: DMA attributes for the mapping
|
2015-10-01 19:13:58 +00:00
|
|
|
*
|
|
|
|
* Return: corresponding IOMMU API page protection flags
|
|
|
|
*/
|
2019-05-20 07:29:29 +00:00
|
|
|
static int dma_info_to_prot(enum dma_data_direction dir, bool coherent,
|
2017-01-06 13:28:12 +00:00
|
|
|
unsigned long attrs)
|
2015-10-01 19:13:58 +00:00
|
|
|
{
|
|
|
|
int prot = coherent ? IOMMU_CACHE : 0;
|
|
|
|
|
2017-01-06 13:28:12 +00:00
|
|
|
if (attrs & DMA_ATTR_PRIVILEGED)
|
|
|
|
prot |= IOMMU_PRIV;
|
|
|
|
|
2015-10-01 19:13:58 +00:00
|
|
|
switch (dir) {
|
|
|
|
case DMA_BIDIRECTIONAL:
|
|
|
|
return prot | IOMMU_READ | IOMMU_WRITE;
|
|
|
|
case DMA_TO_DEVICE:
|
|
|
|
return prot | IOMMU_READ;
|
|
|
|
case DMA_FROM_DEVICE:
|
|
|
|
return prot | IOMMU_WRITE;
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-03-31 14:46:05 +00:00
|
|
|
static dma_addr_t iommu_dma_alloc_iova(struct iommu_domain *domain,
|
2019-12-11 18:33:26 +00:00
|
|
|
size_t size, u64 dma_limit, struct device *dev)
|
2015-10-01 19:13:58 +00:00
|
|
|
{
|
2017-03-31 14:46:06 +00:00
|
|
|
struct iommu_dma_cookie *cookie = domain->iova_cookie;
|
|
|
|
struct iova_domain *iovad = &cookie->iovad;
|
iommu: Optimise PCI SAC address trick
Per the reasoning in commit 4bf7fda4dce2 ("iommu/dma: Add config for
PCI SAC address trick") and its subsequent revert, this mechanism no
longer serves its original purpose, but now only works around broken
hardware/drivers in a way that is unfortunately too impactful to remove.
This does not, however, prevent us from solving the performance impact
which that workaround has on large-scale systems that don't need it.
Once the 32-bit IOVA space fills up and a workload starts allocating and
freeing on both sides of the boundary, the opportunistic SAC allocation
can then end up spending significant time hunting down scattered
fragments of free 32-bit space, or just reestablishing max32_alloc_size.
This can easily be exacerbated by a change in allocation pattern, such
as by changing the network MTU, which can increase pressure on the
32-bit space by leaving a large quantity of cached IOVAs which are now
the wrong size to be recycled, but also won't be freed since the
non-opportunistic allocations can still be satisfied from the whole
64-bit space without triggering the reclaim path.
However, in the context of a workaround where smaller DMA addresses
aren't simply a preference but a necessity, if we get to that point at
all then in fact it's already the endgame. The nature of the allocator
is currently such that the first IOVA we give to a device after the
32-bit space runs out will be the highest possible address for that
device, ever. If that works, then great, we know we can optimise for
speed by always allocating from the full range. And if it doesn't, then
the worst has already happened and any brokenness is now showing, so
there's little point in continuing to try to hide it.
To that end, implement a flag to refine the SAC business into a
per-device policy that can automatically get itself out of the way if
and when it stops being useful.
CC: Linus Torvalds <torvalds@linux-foundation.org>
CC: Jakub Kicinski <kuba@kernel.org>
Reviewed-by: John Garry <john.g.garry@oracle.com>
Signed-off-by: Robin Murphy <robin.murphy@arm.com>
Tested-by: Vasant Hegde <vasant.hegde@amd.com>
Tested-by: Jakub Kicinski <kuba@kernel.org>
Link: https://lore.kernel.org/r/b8502b115b915d2a3fabde367e099e39106686c8.1681392791.git.robin.murphy@arm.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2023-04-13 13:40:25 +00:00
|
|
|
unsigned long shift, iova_len, iova;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2017-03-31 14:46:06 +00:00
|
|
|
if (cookie->type == IOMMU_DMA_MSI_COOKIE) {
|
|
|
|
cookie->msi_iova += size;
|
|
|
|
return cookie->msi_iova - size;
|
|
|
|
}
|
|
|
|
|
|
|
|
shift = iova_shift(iovad);
|
|
|
|
iova_len = size >> shift;
|
|
|
|
|
2019-11-21 09:26:44 +00:00
|
|
|
dma_limit = min_not_zero(dma_limit, dev->bus_dma_limit);
|
2018-07-23 22:16:10 +00:00
|
|
|
|
2016-08-09 16:31:35 +00:00
|
|
|
if (domain->geometry.force_aperture)
|
2019-12-11 18:33:26 +00:00
|
|
|
dma_limit = min(dma_limit, (u64)domain->geometry.aperture_end);
|
2017-01-16 13:24:55 +00:00
|
|
|
|
iommu: Optimise PCI SAC address trick
Per the reasoning in commit 4bf7fda4dce2 ("iommu/dma: Add config for
PCI SAC address trick") and its subsequent revert, this mechanism no
longer serves its original purpose, but now only works around broken
hardware/drivers in a way that is unfortunately too impactful to remove.
This does not, however, prevent us from solving the performance impact
which that workaround has on large-scale systems that don't need it.
Once the 32-bit IOVA space fills up and a workload starts allocating and
freeing on both sides of the boundary, the opportunistic SAC allocation
can then end up spending significant time hunting down scattered
fragments of free 32-bit space, or just reestablishing max32_alloc_size.
This can easily be exacerbated by a change in allocation pattern, such
as by changing the network MTU, which can increase pressure on the
32-bit space by leaving a large quantity of cached IOVAs which are now
the wrong size to be recycled, but also won't be freed since the
non-opportunistic allocations can still be satisfied from the whole
64-bit space without triggering the reclaim path.
However, in the context of a workaround where smaller DMA addresses
aren't simply a preference but a necessity, if we get to that point at
all then in fact it's already the endgame. The nature of the allocator
is currently such that the first IOVA we give to a device after the
32-bit space runs out will be the highest possible address for that
device, ever. If that works, then great, we know we can optimise for
speed by always allocating from the full range. And if it doesn't, then
the worst has already happened and any brokenness is now showing, so
there's little point in continuing to try to hide it.
To that end, implement a flag to refine the SAC business into a
per-device policy that can automatically get itself out of the way if
and when it stops being useful.
CC: Linus Torvalds <torvalds@linux-foundation.org>
CC: Jakub Kicinski <kuba@kernel.org>
Reviewed-by: John Garry <john.g.garry@oracle.com>
Signed-off-by: Robin Murphy <robin.murphy@arm.com>
Tested-by: Vasant Hegde <vasant.hegde@amd.com>
Tested-by: Jakub Kicinski <kuba@kernel.org>
Link: https://lore.kernel.org/r/b8502b115b915d2a3fabde367e099e39106686c8.1681392791.git.robin.murphy@arm.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2023-04-13 13:40:25 +00:00
|
|
|
/*
|
|
|
|
* Try to use all the 32-bit PCI addresses first. The original SAC vs.
|
|
|
|
* DAC reasoning loses relevance with PCIe, but enough hardware and
|
|
|
|
* firmware bugs are still lurking out there that it's safest not to
|
|
|
|
* venture into the 64-bit space until necessary.
|
|
|
|
*
|
|
|
|
* If your device goes wrong after seeing the notice then likely either
|
|
|
|
* its driver is not setting DMA masks accurately, the hardware has
|
|
|
|
* some inherent bug in handling >32-bit addresses, or not all the
|
|
|
|
* expected address bits are wired up between the device and the IOMMU.
|
|
|
|
*/
|
|
|
|
if (dma_limit > DMA_BIT_MASK(32) && dev->iommu->pci_32bit_workaround) {
|
2017-09-20 08:52:02 +00:00
|
|
|
iova = alloc_iova_fast(iovad, iova_len,
|
|
|
|
DMA_BIT_MASK(32) >> shift, false);
|
iommu: Optimise PCI SAC address trick
Per the reasoning in commit 4bf7fda4dce2 ("iommu/dma: Add config for
PCI SAC address trick") and its subsequent revert, this mechanism no
longer serves its original purpose, but now only works around broken
hardware/drivers in a way that is unfortunately too impactful to remove.
This does not, however, prevent us from solving the performance impact
which that workaround has on large-scale systems that don't need it.
Once the 32-bit IOVA space fills up and a workload starts allocating and
freeing on both sides of the boundary, the opportunistic SAC allocation
can then end up spending significant time hunting down scattered
fragments of free 32-bit space, or just reestablishing max32_alloc_size.
This can easily be exacerbated by a change in allocation pattern, such
as by changing the network MTU, which can increase pressure on the
32-bit space by leaving a large quantity of cached IOVAs which are now
the wrong size to be recycled, but also won't be freed since the
non-opportunistic allocations can still be satisfied from the whole
64-bit space without triggering the reclaim path.
However, in the context of a workaround where smaller DMA addresses
aren't simply a preference but a necessity, if we get to that point at
all then in fact it's already the endgame. The nature of the allocator
is currently such that the first IOVA we give to a device after the
32-bit space runs out will be the highest possible address for that
device, ever. If that works, then great, we know we can optimise for
speed by always allocating from the full range. And if it doesn't, then
the worst has already happened and any brokenness is now showing, so
there's little point in continuing to try to hide it.
To that end, implement a flag to refine the SAC business into a
per-device policy that can automatically get itself out of the way if
and when it stops being useful.
CC: Linus Torvalds <torvalds@linux-foundation.org>
CC: Jakub Kicinski <kuba@kernel.org>
Reviewed-by: John Garry <john.g.garry@oracle.com>
Signed-off-by: Robin Murphy <robin.murphy@arm.com>
Tested-by: Vasant Hegde <vasant.hegde@amd.com>
Tested-by: Jakub Kicinski <kuba@kernel.org>
Link: https://lore.kernel.org/r/b8502b115b915d2a3fabde367e099e39106686c8.1681392791.git.robin.murphy@arm.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2023-04-13 13:40:25 +00:00
|
|
|
if (iova)
|
|
|
|
goto done;
|
2017-03-31 14:46:07 +00:00
|
|
|
|
iommu: Optimise PCI SAC address trick
Per the reasoning in commit 4bf7fda4dce2 ("iommu/dma: Add config for
PCI SAC address trick") and its subsequent revert, this mechanism no
longer serves its original purpose, but now only works around broken
hardware/drivers in a way that is unfortunately too impactful to remove.
This does not, however, prevent us from solving the performance impact
which that workaround has on large-scale systems that don't need it.
Once the 32-bit IOVA space fills up and a workload starts allocating and
freeing on both sides of the boundary, the opportunistic SAC allocation
can then end up spending significant time hunting down scattered
fragments of free 32-bit space, or just reestablishing max32_alloc_size.
This can easily be exacerbated by a change in allocation pattern, such
as by changing the network MTU, which can increase pressure on the
32-bit space by leaving a large quantity of cached IOVAs which are now
the wrong size to be recycled, but also won't be freed since the
non-opportunistic allocations can still be satisfied from the whole
64-bit space without triggering the reclaim path.
However, in the context of a workaround where smaller DMA addresses
aren't simply a preference but a necessity, if we get to that point at
all then in fact it's already the endgame. The nature of the allocator
is currently such that the first IOVA we give to a device after the
32-bit space runs out will be the highest possible address for that
device, ever. If that works, then great, we know we can optimise for
speed by always allocating from the full range. And if it doesn't, then
the worst has already happened and any brokenness is now showing, so
there's little point in continuing to try to hide it.
To that end, implement a flag to refine the SAC business into a
per-device policy that can automatically get itself out of the way if
and when it stops being useful.
CC: Linus Torvalds <torvalds@linux-foundation.org>
CC: Jakub Kicinski <kuba@kernel.org>
Reviewed-by: John Garry <john.g.garry@oracle.com>
Signed-off-by: Robin Murphy <robin.murphy@arm.com>
Tested-by: Vasant Hegde <vasant.hegde@amd.com>
Tested-by: Jakub Kicinski <kuba@kernel.org>
Link: https://lore.kernel.org/r/b8502b115b915d2a3fabde367e099e39106686c8.1681392791.git.robin.murphy@arm.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2023-04-13 13:40:25 +00:00
|
|
|
dev->iommu->pci_32bit_workaround = false;
|
|
|
|
dev_notice(dev, "Using %d-bit DMA addresses\n", bits_per(dma_limit));
|
|
|
|
}
|
2017-01-16 13:24:55 +00:00
|
|
|
|
iommu: Optimise PCI SAC address trick
Per the reasoning in commit 4bf7fda4dce2 ("iommu/dma: Add config for
PCI SAC address trick") and its subsequent revert, this mechanism no
longer serves its original purpose, but now only works around broken
hardware/drivers in a way that is unfortunately too impactful to remove.
This does not, however, prevent us from solving the performance impact
which that workaround has on large-scale systems that don't need it.
Once the 32-bit IOVA space fills up and a workload starts allocating and
freeing on both sides of the boundary, the opportunistic SAC allocation
can then end up spending significant time hunting down scattered
fragments of free 32-bit space, or just reestablishing max32_alloc_size.
This can easily be exacerbated by a change in allocation pattern, such
as by changing the network MTU, which can increase pressure on the
32-bit space by leaving a large quantity of cached IOVAs which are now
the wrong size to be recycled, but also won't be freed since the
non-opportunistic allocations can still be satisfied from the whole
64-bit space without triggering the reclaim path.
However, in the context of a workaround where smaller DMA addresses
aren't simply a preference but a necessity, if we get to that point at
all then in fact it's already the endgame. The nature of the allocator
is currently such that the first IOVA we give to a device after the
32-bit space runs out will be the highest possible address for that
device, ever. If that works, then great, we know we can optimise for
speed by always allocating from the full range. And if it doesn't, then
the worst has already happened and any brokenness is now showing, so
there's little point in continuing to try to hide it.
To that end, implement a flag to refine the SAC business into a
per-device policy that can automatically get itself out of the way if
and when it stops being useful.
CC: Linus Torvalds <torvalds@linux-foundation.org>
CC: Jakub Kicinski <kuba@kernel.org>
Reviewed-by: John Garry <john.g.garry@oracle.com>
Signed-off-by: Robin Murphy <robin.murphy@arm.com>
Tested-by: Vasant Hegde <vasant.hegde@amd.com>
Tested-by: Jakub Kicinski <kuba@kernel.org>
Link: https://lore.kernel.org/r/b8502b115b915d2a3fabde367e099e39106686c8.1681392791.git.robin.murphy@arm.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2023-04-13 13:40:25 +00:00
|
|
|
iova = alloc_iova_fast(iovad, iova_len, dma_limit >> shift, true);
|
|
|
|
done:
|
2017-03-31 14:46:07 +00:00
|
|
|
return (dma_addr_t)iova << shift;
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
|
|
|
|
2017-03-31 14:46:05 +00:00
|
|
|
static void iommu_dma_free_iova(struct iommu_dma_cookie *cookie,
|
2021-08-11 12:21:38 +00:00
|
|
|
dma_addr_t iova, size_t size, struct iommu_iotlb_gather *gather)
|
2015-10-01 19:13:58 +00:00
|
|
|
{
|
2017-03-31 14:46:05 +00:00
|
|
|
struct iova_domain *iovad = &cookie->iovad;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2017-03-31 14:46:06 +00:00
|
|
|
/* The MSI case is only ever cleaning up its most recent allocation */
|
2017-03-31 14:46:07 +00:00
|
|
|
if (cookie->type == IOMMU_DMA_MSI_COOKIE)
|
2017-03-31 14:46:06 +00:00
|
|
|
cookie->msi_iova -= size;
|
2021-08-11 12:21:38 +00:00
|
|
|
else if (gather && gather->queued)
|
2021-12-17 15:31:03 +00:00
|
|
|
queue_iova(cookie, iova_pfn(iovad, iova),
|
2020-11-24 08:20:51 +00:00
|
|
|
size >> iova_shift(iovad),
|
2021-12-17 15:31:00 +00:00
|
|
|
&gather->freelist);
|
2017-03-31 14:46:07 +00:00
|
|
|
else
|
2017-05-15 15:01:30 +00:00
|
|
|
free_iova_fast(iovad, iova_pfn(iovad, iova),
|
|
|
|
size >> iova_shift(iovad));
|
2017-03-31 14:46:05 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:31 +00:00
|
|
|
static void __iommu_dma_unmap(struct device *dev, dma_addr_t dma_addr,
|
2017-03-31 14:46:05 +00:00
|
|
|
size_t size)
|
|
|
|
{
|
2019-05-20 07:29:31 +00:00
|
|
|
struct iommu_domain *domain = iommu_get_dma_domain(dev);
|
2017-03-31 14:46:06 +00:00
|
|
|
struct iommu_dma_cookie *cookie = domain->iova_cookie;
|
|
|
|
struct iova_domain *iovad = &cookie->iovad;
|
2017-03-31 14:46:05 +00:00
|
|
|
size_t iova_off = iova_offset(iovad, dma_addr);
|
2019-07-02 15:43:48 +00:00
|
|
|
struct iommu_iotlb_gather iotlb_gather;
|
|
|
|
size_t unmapped;
|
2017-03-31 14:46:05 +00:00
|
|
|
|
|
|
|
dma_addr -= iova_off;
|
|
|
|
size = iova_align(iovad, size + iova_off);
|
2019-07-02 15:43:48 +00:00
|
|
|
iommu_iotlb_gather_init(&iotlb_gather);
|
2021-08-11 12:21:38 +00:00
|
|
|
iotlb_gather.queued = READ_ONCE(cookie->fq_domain);
|
2019-07-02 15:43:48 +00:00
|
|
|
|
|
|
|
unmapped = iommu_unmap_fast(domain, dma_addr, size, &iotlb_gather);
|
|
|
|
WARN_ON(unmapped != size);
|
2017-03-31 14:46:05 +00:00
|
|
|
|
2021-08-11 12:21:38 +00:00
|
|
|
if (!iotlb_gather.queued)
|
2020-08-17 21:00:49 +00:00
|
|
|
iommu_iotlb_sync(domain, &iotlb_gather);
|
2021-08-11 12:21:38 +00:00
|
|
|
iommu_dma_free_iova(cookie, dma_addr, size, &iotlb_gather);
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:30 +00:00
|
|
|
static dma_addr_t __iommu_dma_map(struct device *dev, phys_addr_t phys,
|
2019-12-11 18:33:26 +00:00
|
|
|
size_t size, int prot, u64 dma_mask)
|
2019-05-20 07:29:30 +00:00
|
|
|
{
|
2019-05-20 07:29:31 +00:00
|
|
|
struct iommu_domain *domain = iommu_get_dma_domain(dev);
|
2019-05-20 07:29:30 +00:00
|
|
|
struct iommu_dma_cookie *cookie = domain->iova_cookie;
|
2019-07-29 15:32:38 +00:00
|
|
|
struct iova_domain *iovad = &cookie->iovad;
|
|
|
|
size_t iova_off = iova_offset(iovad, phys);
|
2019-05-20 07:29:30 +00:00
|
|
|
dma_addr_t iova;
|
|
|
|
|
2021-01-26 11:53:36 +00:00
|
|
|
if (static_branch_unlikely(&iommu_deferred_attach_enabled) &&
|
iommu: use the __iommu_attach_device() directly for deferred attach
Currently, because domain attach allows to be deferred from iommu
driver to device driver, and when iommu initializes, the devices
on the bus will be scanned and the default groups will be allocated.
Due to the above changes, some devices could be added to the same
group as below:
[ 3.859417] pci 0000:01:00.0: Adding to iommu group 16
[ 3.864572] pci 0000:01:00.1: Adding to iommu group 16
[ 3.869738] pci 0000:02:00.0: Adding to iommu group 17
[ 3.874892] pci 0000:02:00.1: Adding to iommu group 17
But when attaching these devices, it doesn't allow that a group has
more than one device, otherwise it will return an error. This conflicts
with the deferred attaching. Unfortunately, it has two devices in the
same group for my side, for example:
[ 9.627014] iommu_group_device_count(): device name[0]:0000:01:00.0
[ 9.633545] iommu_group_device_count(): device name[1]:0000:01:00.1
...
[ 10.255609] iommu_group_device_count(): device name[0]:0000:02:00.0
[ 10.262144] iommu_group_device_count(): device name[1]:0000:02:00.1
Finally, which caused the failure of tg3 driver when tg3 driver calls
the dma_alloc_coherent() to allocate coherent memory in the tg3_test_dma().
[ 9.660310] tg3 0000:01:00.0: DMA engine test failed, aborting
[ 9.754085] tg3: probe of 0000:01:00.0 failed with error -12
[ 9.997512] tg3 0000:01:00.1: DMA engine test failed, aborting
[ 10.043053] tg3: probe of 0000:01:00.1 failed with error -12
[ 10.288905] tg3 0000:02:00.0: DMA engine test failed, aborting
[ 10.334070] tg3: probe of 0000:02:00.0 failed with error -12
[ 10.578303] tg3 0000:02:00.1: DMA engine test failed, aborting
[ 10.622629] tg3: probe of 0000:02:00.1 failed with error -12
In addition, the similar situations also occur in other drivers such
as the bnxt_en driver. That can be reproduced easily in kdump kernel
when SME is active.
Let's move the handling currently in iommu_dma_deferred_attach() into
the iommu core code so that it can call the __iommu_attach_device()
directly instead of the iommu_attach_device(). The external interface
iommu_attach_device() is not suitable for handling this situation.
Signed-off-by: Lianbo Jiang <lijiang@redhat.com>
Reviewed-by: Robin Murphy <robin.murphy@arm.com>
Link: https://lore.kernel.org/r/20210126115337.20068-3-lijiang@redhat.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2021-01-26 11:53:37 +00:00
|
|
|
iommu_deferred_attach(dev, domain))
|
2019-09-08 16:56:39 +00:00
|
|
|
return DMA_MAPPING_ERROR;
|
|
|
|
|
2019-07-29 15:32:38 +00:00
|
|
|
size = iova_align(iovad, size + iova_off);
|
2019-05-20 07:29:30 +00:00
|
|
|
|
2019-09-08 16:56:40 +00:00
|
|
|
iova = iommu_dma_alloc_iova(domain, size, dma_mask, dev);
|
2019-05-20 07:29:30 +00:00
|
|
|
if (!iova)
|
|
|
|
return DMA_MAPPING_ERROR;
|
|
|
|
|
2023-01-23 20:35:55 +00:00
|
|
|
if (iommu_map(domain, iova, phys - iova_off, size, prot, GFP_ATOMIC)) {
|
2020-11-24 08:20:51 +00:00
|
|
|
iommu_dma_free_iova(cookie, iova, size, NULL);
|
2019-05-20 07:29:30 +00:00
|
|
|
return DMA_MAPPING_ERROR;
|
|
|
|
}
|
|
|
|
return iova + iova_off;
|
|
|
|
}
|
|
|
|
|
2015-10-01 19:13:58 +00:00
|
|
|
static void __iommu_dma_free_pages(struct page **pages, int count)
|
|
|
|
{
|
|
|
|
while (count--)
|
|
|
|
__free_page(pages[count]);
|
|
|
|
kvfree(pages);
|
|
|
|
}
|
|
|
|
|
2018-11-30 11:14:00 +00:00
|
|
|
static struct page **__iommu_dma_alloc_pages(struct device *dev,
|
|
|
|
unsigned int count, unsigned long order_mask, gfp_t gfp)
|
2015-10-01 19:13:58 +00:00
|
|
|
{
|
|
|
|
struct page **pages;
|
2018-11-30 11:14:00 +00:00
|
|
|
unsigned int i = 0, nid = dev_to_node(dev);
|
2016-04-13 16:29:10 +00:00
|
|
|
|
2023-03-15 11:31:33 +00:00
|
|
|
order_mask &= GENMASK(MAX_ORDER, 0);
|
2016-04-13 16:29:10 +00:00
|
|
|
if (!order_mask)
|
|
|
|
return NULL;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2021-09-28 22:22:29 +00:00
|
|
|
pages = kvcalloc(count, sizeof(*pages), GFP_KERNEL);
|
2015-10-01 19:13:58 +00:00
|
|
|
if (!pages)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
/* IOMMU can map any pages, so himem can also be used here */
|
|
|
|
gfp |= __GFP_NOWARN | __GFP_HIGHMEM;
|
|
|
|
|
|
|
|
while (count) {
|
|
|
|
struct page *page = NULL;
|
2016-04-13 16:29:10 +00:00
|
|
|
unsigned int order_size;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Higher-order allocations are a convenience rather
|
|
|
|
* than a necessity, hence using __GFP_NORETRY until
|
2016-04-13 16:29:10 +00:00
|
|
|
* falling back to minimum-order allocations.
|
2015-10-01 19:13:58 +00:00
|
|
|
*/
|
2023-03-15 11:31:32 +00:00
|
|
|
for (order_mask &= GENMASK(__fls(count), 0);
|
2016-04-13 16:29:10 +00:00
|
|
|
order_mask; order_mask &= ~order_size) {
|
|
|
|
unsigned int order = __fls(order_mask);
|
2018-11-30 11:14:00 +00:00
|
|
|
gfp_t alloc_flags = gfp;
|
2016-04-13 16:29:10 +00:00
|
|
|
|
|
|
|
order_size = 1U << order;
|
2018-11-30 11:14:00 +00:00
|
|
|
if (order_mask > order_size)
|
|
|
|
alloc_flags |= __GFP_NORETRY;
|
|
|
|
page = alloc_pages_node(nid, alloc_flags, order);
|
2015-10-01 19:13:58 +00:00
|
|
|
if (!page)
|
|
|
|
continue;
|
2020-09-03 11:34:04 +00:00
|
|
|
if (order)
|
2015-10-01 19:13:58 +00:00
|
|
|
split_page(page, order);
|
2020-09-03 11:34:04 +00:00
|
|
|
break;
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
|
|
|
if (!page) {
|
|
|
|
__iommu_dma_free_pages(pages, i);
|
|
|
|
return NULL;
|
|
|
|
}
|
2016-04-13 16:29:10 +00:00
|
|
|
count -= order_size;
|
|
|
|
while (order_size--)
|
2015-10-01 19:13:58 +00:00
|
|
|
pages[i++] = page++;
|
|
|
|
}
|
|
|
|
return pages;
|
|
|
|
}
|
|
|
|
|
2021-01-28 13:44:15 +00:00
|
|
|
/*
|
|
|
|
* If size is less than PAGE_SIZE, then a full CPU page will be allocated,
|
2015-10-01 19:13:58 +00:00
|
|
|
* but an IOMMU which supports smaller pages might not map the whole thing.
|
|
|
|
*/
|
2021-01-28 13:44:15 +00:00
|
|
|
static struct page **__iommu_dma_alloc_noncontiguous(struct device *dev,
|
|
|
|
size_t size, struct sg_table *sgt, gfp_t gfp, pgprot_t prot,
|
2020-09-01 12:00:56 +00:00
|
|
|
unsigned long attrs)
|
2015-10-01 19:13:58 +00:00
|
|
|
{
|
2018-09-12 15:24:13 +00:00
|
|
|
struct iommu_domain *domain = iommu_get_dma_domain(dev);
|
2017-03-31 14:46:05 +00:00
|
|
|
struct iommu_dma_cookie *cookie = domain->iova_cookie;
|
|
|
|
struct iova_domain *iovad = &cookie->iovad;
|
2019-05-20 07:29:34 +00:00
|
|
|
bool coherent = dev_is_dma_coherent(dev);
|
|
|
|
int ioprot = dma_info_to_prot(DMA_BIDIRECTIONAL, coherent, attrs);
|
|
|
|
unsigned int count, min_size, alloc_sizes = domain->pgsize_bitmap;
|
2015-10-01 19:13:58 +00:00
|
|
|
struct page **pages;
|
2017-03-31 14:46:05 +00:00
|
|
|
dma_addr_t iova;
|
2022-05-07 08:52:03 +00:00
|
|
|
ssize_t ret;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2021-01-26 11:53:36 +00:00
|
|
|
if (static_branch_unlikely(&iommu_deferred_attach_enabled) &&
|
iommu: use the __iommu_attach_device() directly for deferred attach
Currently, because domain attach allows to be deferred from iommu
driver to device driver, and when iommu initializes, the devices
on the bus will be scanned and the default groups will be allocated.
Due to the above changes, some devices could be added to the same
group as below:
[ 3.859417] pci 0000:01:00.0: Adding to iommu group 16
[ 3.864572] pci 0000:01:00.1: Adding to iommu group 16
[ 3.869738] pci 0000:02:00.0: Adding to iommu group 17
[ 3.874892] pci 0000:02:00.1: Adding to iommu group 17
But when attaching these devices, it doesn't allow that a group has
more than one device, otherwise it will return an error. This conflicts
with the deferred attaching. Unfortunately, it has two devices in the
same group for my side, for example:
[ 9.627014] iommu_group_device_count(): device name[0]:0000:01:00.0
[ 9.633545] iommu_group_device_count(): device name[1]:0000:01:00.1
...
[ 10.255609] iommu_group_device_count(): device name[0]:0000:02:00.0
[ 10.262144] iommu_group_device_count(): device name[1]:0000:02:00.1
Finally, which caused the failure of tg3 driver when tg3 driver calls
the dma_alloc_coherent() to allocate coherent memory in the tg3_test_dma().
[ 9.660310] tg3 0000:01:00.0: DMA engine test failed, aborting
[ 9.754085] tg3: probe of 0000:01:00.0 failed with error -12
[ 9.997512] tg3 0000:01:00.1: DMA engine test failed, aborting
[ 10.043053] tg3: probe of 0000:01:00.1 failed with error -12
[ 10.288905] tg3 0000:02:00.0: DMA engine test failed, aborting
[ 10.334070] tg3: probe of 0000:02:00.0 failed with error -12
[ 10.578303] tg3 0000:02:00.1: DMA engine test failed, aborting
[ 10.622629] tg3: probe of 0000:02:00.1 failed with error -12
In addition, the similar situations also occur in other drivers such
as the bnxt_en driver. That can be reproduced easily in kdump kernel
when SME is active.
Let's move the handling currently in iommu_dma_deferred_attach() into
the iommu core code so that it can call the __iommu_attach_device()
directly instead of the iommu_attach_device(). The external interface
iommu_attach_device() is not suitable for handling this situation.
Signed-off-by: Lianbo Jiang <lijiang@redhat.com>
Reviewed-by: Robin Murphy <robin.murphy@arm.com>
Link: https://lore.kernel.org/r/20210126115337.20068-3-lijiang@redhat.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2021-01-26 11:53:37 +00:00
|
|
|
iommu_deferred_attach(dev, domain))
|
2019-09-08 16:56:39 +00:00
|
|
|
return NULL;
|
|
|
|
|
2016-04-13 16:29:10 +00:00
|
|
|
min_size = alloc_sizes & -alloc_sizes;
|
|
|
|
if (min_size < PAGE_SIZE) {
|
|
|
|
min_size = PAGE_SIZE;
|
|
|
|
alloc_sizes |= PAGE_SIZE;
|
|
|
|
} else {
|
|
|
|
size = ALIGN(size, min_size);
|
|
|
|
}
|
2016-08-03 20:46:00 +00:00
|
|
|
if (attrs & DMA_ATTR_ALLOC_SINGLE_PAGES)
|
2016-04-13 16:29:10 +00:00
|
|
|
alloc_sizes = min_size;
|
|
|
|
|
|
|
|
count = PAGE_ALIGN(size) >> PAGE_SHIFT;
|
2018-11-30 11:14:00 +00:00
|
|
|
pages = __iommu_dma_alloc_pages(dev, count, alloc_sizes >> PAGE_SHIFT,
|
|
|
|
gfp);
|
2015-10-01 19:13:58 +00:00
|
|
|
if (!pages)
|
|
|
|
return NULL;
|
|
|
|
|
2017-03-31 14:46:05 +00:00
|
|
|
size = iova_align(iovad, size);
|
|
|
|
iova = iommu_dma_alloc_iova(domain, size, dev->coherent_dma_mask, dev);
|
2015-10-01 19:13:58 +00:00
|
|
|
if (!iova)
|
|
|
|
goto out_free_pages;
|
|
|
|
|
2023-01-23 20:35:57 +00:00
|
|
|
/*
|
|
|
|
* Remove the zone/policy flags from the GFP - these are applied to the
|
|
|
|
* __iommu_dma_alloc_pages() but are not used for the supporting
|
|
|
|
* internal allocations that follow.
|
|
|
|
*/
|
|
|
|
gfp &= ~(__GFP_DMA | __GFP_DMA32 | __GFP_HIGHMEM | __GFP_COMP);
|
|
|
|
|
|
|
|
if (sg_alloc_table_from_pages(sgt, pages, count, 0, size, gfp))
|
2015-10-01 19:13:58 +00:00
|
|
|
goto out_free_iova;
|
|
|
|
|
2019-05-20 07:29:34 +00:00
|
|
|
if (!(ioprot & IOMMU_CACHE)) {
|
2019-05-20 07:29:28 +00:00
|
|
|
struct scatterlist *sg;
|
|
|
|
int i;
|
|
|
|
|
2021-01-28 13:44:15 +00:00
|
|
|
for_each_sg(sgt->sgl, sg, sgt->orig_nents, i)
|
2019-05-20 07:29:28 +00:00
|
|
|
arch_dma_prep_coherent(sg_page(sg), sg->length);
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
|
|
|
|
2023-01-23 20:35:56 +00:00
|
|
|
ret = iommu_map_sg(domain, iova, sgt->sgl, sgt->orig_nents, ioprot,
|
2023-01-23 20:35:57 +00:00
|
|
|
gfp);
|
2022-05-07 08:52:03 +00:00
|
|
|
if (ret < 0 || ret < size)
|
2015-10-01 19:13:58 +00:00
|
|
|
goto out_free_sg;
|
|
|
|
|
2021-01-28 13:44:15 +00:00
|
|
|
sgt->sgl->dma_address = iova;
|
2021-01-28 13:47:29 +00:00
|
|
|
sgt->sgl->dma_length = size;
|
2021-01-28 13:44:15 +00:00
|
|
|
return pages;
|
|
|
|
|
|
|
|
out_free_sg:
|
|
|
|
sg_free_table(sgt);
|
|
|
|
out_free_iova:
|
|
|
|
iommu_dma_free_iova(cookie, iova, size, NULL);
|
|
|
|
out_free_pages:
|
|
|
|
__iommu_dma_free_pages(pages, count);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void *iommu_dma_alloc_remap(struct device *dev, size_t size,
|
|
|
|
dma_addr_t *dma_handle, gfp_t gfp, pgprot_t prot,
|
|
|
|
unsigned long attrs)
|
|
|
|
{
|
|
|
|
struct page **pages;
|
|
|
|
struct sg_table sgt;
|
|
|
|
void *vaddr;
|
|
|
|
|
|
|
|
pages = __iommu_dma_alloc_noncontiguous(dev, size, &sgt, gfp, prot,
|
|
|
|
attrs);
|
|
|
|
if (!pages)
|
|
|
|
return NULL;
|
|
|
|
*dma_handle = sgt.sgl->dma_address;
|
|
|
|
sg_free_table(&sgt);
|
2019-08-30 06:51:01 +00:00
|
|
|
vaddr = dma_common_pages_remap(pages, size, prot,
|
2019-05-20 07:29:34 +00:00
|
|
|
__builtin_return_address(0));
|
|
|
|
if (!vaddr)
|
|
|
|
goto out_unmap;
|
|
|
|
return vaddr;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2019-05-20 07:29:34 +00:00
|
|
|
out_unmap:
|
2021-01-28 13:44:15 +00:00
|
|
|
__iommu_dma_unmap(dev, *dma_handle, size);
|
|
|
|
__iommu_dma_free_pages(pages, PAGE_ALIGN(size) >> PAGE_SHIFT);
|
2015-10-01 19:13:58 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2021-01-28 13:47:29 +00:00
|
|
|
static struct sg_table *iommu_dma_alloc_noncontiguous(struct device *dev,
|
|
|
|
size_t size, enum dma_data_direction dir, gfp_t gfp,
|
|
|
|
unsigned long attrs)
|
|
|
|
{
|
|
|
|
struct dma_sgt_handle *sh;
|
|
|
|
|
|
|
|
sh = kmalloc(sizeof(*sh), gfp);
|
|
|
|
if (!sh)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
sh->pages = __iommu_dma_alloc_noncontiguous(dev, size, &sh->sgt, gfp,
|
|
|
|
PAGE_KERNEL, attrs);
|
|
|
|
if (!sh->pages) {
|
|
|
|
kfree(sh);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return &sh->sgt;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void iommu_dma_free_noncontiguous(struct device *dev, size_t size,
|
|
|
|
struct sg_table *sgt, enum dma_data_direction dir)
|
|
|
|
{
|
|
|
|
struct dma_sgt_handle *sh = sgt_handle(sgt);
|
|
|
|
|
|
|
|
__iommu_dma_unmap(dev, sgt->sgl->dma_address, size);
|
|
|
|
__iommu_dma_free_pages(sh->pages, PAGE_ALIGN(size) >> PAGE_SHIFT);
|
|
|
|
sg_free_table(&sh->sgt);
|
2021-07-23 01:05:52 +00:00
|
|
|
kfree(sh);
|
2021-01-28 13:47:29 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
static void iommu_dma_sync_single_for_cpu(struct device *dev,
|
|
|
|
dma_addr_t dma_handle, size_t size, enum dma_data_direction dir)
|
2015-10-01 19:13:58 +00:00
|
|
|
{
|
2019-05-20 07:29:29 +00:00
|
|
|
phys_addr_t phys;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2023-06-12 15:31:59 +00:00
|
|
|
if (dev_is_dma_coherent(dev) && !dev_use_swiotlb(dev, size, dir))
|
2019-05-20 07:29:29 +00:00
|
|
|
return;
|
2017-05-15 15:01:30 +00:00
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
phys = iommu_iova_to_phys(iommu_get_dma_domain(dev), dma_handle);
|
2020-11-24 08:20:53 +00:00
|
|
|
if (!dev_is_dma_coherent(dev))
|
|
|
|
arch_sync_dma_for_cpu(phys, size, dir);
|
|
|
|
|
2021-06-19 03:40:35 +00:00
|
|
|
if (is_swiotlb_buffer(dev, phys))
|
2021-03-01 07:44:26 +00:00
|
|
|
swiotlb_sync_single_for_cpu(dev, phys, size, dir);
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
static void iommu_dma_sync_single_for_device(struct device *dev,
|
|
|
|
dma_addr_t dma_handle, size_t size, enum dma_data_direction dir)
|
2015-10-01 19:13:58 +00:00
|
|
|
{
|
2019-05-20 07:29:29 +00:00
|
|
|
phys_addr_t phys;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2023-06-12 15:31:59 +00:00
|
|
|
if (dev_is_dma_coherent(dev) && !dev_use_swiotlb(dev, size, dir))
|
2019-05-20 07:29:29 +00:00
|
|
|
return;
|
2017-05-15 15:01:30 +00:00
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
phys = iommu_iova_to_phys(iommu_get_dma_domain(dev), dma_handle);
|
2021-06-19 03:40:35 +00:00
|
|
|
if (is_swiotlb_buffer(dev, phys))
|
2021-03-01 07:44:26 +00:00
|
|
|
swiotlb_sync_single_for_device(dev, phys, size, dir);
|
2020-11-24 08:20:53 +00:00
|
|
|
|
|
|
|
if (!dev_is_dma_coherent(dev))
|
|
|
|
arch_sync_dma_for_device(phys, size, dir);
|
2019-05-20 07:29:29 +00:00
|
|
|
}
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
static void iommu_dma_sync_sg_for_cpu(struct device *dev,
|
|
|
|
struct scatterlist *sgl, int nelems,
|
|
|
|
enum dma_data_direction dir)
|
|
|
|
{
|
|
|
|
struct scatterlist *sg;
|
|
|
|
int i;
|
|
|
|
|
2023-06-12 15:31:59 +00:00
|
|
|
if (sg_dma_is_swiotlb(sgl))
|
2021-09-29 02:32:54 +00:00
|
|
|
for_each_sg(sgl, sg, nelems, i)
|
|
|
|
iommu_dma_sync_single_for_cpu(dev, sg_dma_address(sg),
|
|
|
|
sg->length, dir);
|
|
|
|
else if (!dev_is_dma_coherent(dev))
|
|
|
|
for_each_sg(sgl, sg, nelems, i)
|
2020-11-24 08:20:53 +00:00
|
|
|
arch_sync_dma_for_cpu(sg_phys(sg), sg->length, dir);
|
2019-05-20 07:29:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void iommu_dma_sync_sg_for_device(struct device *dev,
|
|
|
|
struct scatterlist *sgl, int nelems,
|
|
|
|
enum dma_data_direction dir)
|
|
|
|
{
|
|
|
|
struct scatterlist *sg;
|
|
|
|
int i;
|
|
|
|
|
2023-06-12 15:31:59 +00:00
|
|
|
if (sg_dma_is_swiotlb(sgl))
|
2021-09-29 02:32:54 +00:00
|
|
|
for_each_sg(sgl, sg, nelems, i)
|
|
|
|
iommu_dma_sync_single_for_device(dev,
|
|
|
|
sg_dma_address(sg),
|
|
|
|
sg->length, dir);
|
|
|
|
else if (!dev_is_dma_coherent(dev))
|
|
|
|
for_each_sg(sgl, sg, nelems, i)
|
2020-11-24 08:20:53 +00:00
|
|
|
arch_sync_dma_for_device(sg_phys(sg), sg->length, dir);
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
static dma_addr_t iommu_dma_map_page(struct device *dev, struct page *page,
|
|
|
|
unsigned long offset, size_t size, enum dma_data_direction dir,
|
|
|
|
unsigned long attrs)
|
2016-11-14 12:16:26 +00:00
|
|
|
{
|
2019-05-20 07:29:29 +00:00
|
|
|
phys_addr_t phys = page_to_phys(page) + offset;
|
|
|
|
bool coherent = dev_is_dma_coherent(dev);
|
2021-09-29 02:32:57 +00:00
|
|
|
int prot = dma_info_to_prot(dir, coherent, attrs);
|
|
|
|
struct iommu_domain *domain = iommu_get_dma_domain(dev);
|
|
|
|
struct iommu_dma_cookie *cookie = domain->iova_cookie;
|
|
|
|
struct iova_domain *iovad = &cookie->iovad;
|
|
|
|
dma_addr_t iova, dma_mask = dma_get_mask(dev);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If both the physical buffer start address and size are
|
|
|
|
* page aligned, we don't need to use a bounce page.
|
|
|
|
*/
|
2023-06-12 15:31:59 +00:00
|
|
|
if (dev_use_swiotlb(dev, size, dir) &&
|
|
|
|
iova_offset(iovad, phys | size)) {
|
2021-09-29 02:32:57 +00:00
|
|
|
void *padding_start;
|
2021-09-29 02:33:00 +00:00
|
|
|
size_t padding_size, aligned_size;
|
2021-09-29 02:32:57 +00:00
|
|
|
|
2022-04-04 20:47:23 +00:00
|
|
|
if (!is_swiotlb_active(dev)) {
|
|
|
|
dev_warn_once(dev, "DMA bounce buffers are inactive, unable to map unaligned transaction.\n");
|
|
|
|
return DMA_MAPPING_ERROR;
|
|
|
|
}
|
|
|
|
|
2021-09-29 02:32:57 +00:00
|
|
|
aligned_size = iova_align(iovad, size);
|
2021-09-29 02:32:59 +00:00
|
|
|
phys = swiotlb_tbl_map_single(dev, phys, size, aligned_size,
|
|
|
|
iova_mask(iovad), dir, attrs);
|
2021-09-29 02:32:57 +00:00
|
|
|
|
|
|
|
if (phys == DMA_MAPPING_ERROR)
|
|
|
|
return DMA_MAPPING_ERROR;
|
2019-05-20 07:29:29 +00:00
|
|
|
|
2021-09-29 02:32:57 +00:00
|
|
|
/* Cleanup the padding area. */
|
|
|
|
padding_start = phys_to_virt(phys);
|
|
|
|
padding_size = aligned_size;
|
|
|
|
|
|
|
|
if (!(attrs & DMA_ATTR_SKIP_CPU_SYNC) &&
|
|
|
|
(dir == DMA_TO_DEVICE || dir == DMA_BIDIRECTIONAL)) {
|
|
|
|
padding_start += size;
|
|
|
|
padding_size -= size;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(padding_start, 0, padding_size);
|
|
|
|
}
|
2019-05-20 07:29:29 +00:00
|
|
|
|
2021-09-29 02:32:57 +00:00
|
|
|
if (!coherent && !(attrs & DMA_ATTR_SKIP_CPU_SYNC))
|
2019-11-07 17:03:11 +00:00
|
|
|
arch_sync_dma_for_device(phys, size, dir);
|
2021-09-29 02:32:57 +00:00
|
|
|
|
2021-09-29 02:33:00 +00:00
|
|
|
iova = __iommu_dma_map(dev, phys, size, prot, dma_mask);
|
2021-09-29 02:32:57 +00:00
|
|
|
if (iova == DMA_MAPPING_ERROR && is_swiotlb_buffer(dev, phys))
|
|
|
|
swiotlb_tbl_unmap_single(dev, phys, size, dir, attrs);
|
|
|
|
return iova;
|
2016-11-14 12:16:26 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
static void iommu_dma_unmap_page(struct device *dev, dma_addr_t dma_handle,
|
|
|
|
size_t size, enum dma_data_direction dir, unsigned long attrs)
|
2015-10-01 19:13:58 +00:00
|
|
|
{
|
2021-09-29 02:32:57 +00:00
|
|
|
struct iommu_domain *domain = iommu_get_dma_domain(dev);
|
|
|
|
phys_addr_t phys;
|
|
|
|
|
|
|
|
phys = iommu_iova_to_phys(domain, dma_handle);
|
|
|
|
if (WARN_ON(!phys))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!(attrs & DMA_ATTR_SKIP_CPU_SYNC) && !dev_is_dma_coherent(dev))
|
|
|
|
arch_sync_dma_for_cpu(phys, size, dir);
|
|
|
|
|
|
|
|
__iommu_dma_unmap(dev, dma_handle, size);
|
|
|
|
|
|
|
|
if (unlikely(is_swiotlb_buffer(dev, phys)))
|
|
|
|
swiotlb_tbl_unmap_single(dev, phys, size, dir, attrs);
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Prepare a successfully-mapped scatterlist to give back to the caller.
|
2016-04-11 11:32:31 +00:00
|
|
|
*
|
|
|
|
* At this point the segments are already laid out by iommu_dma_map_sg() to
|
|
|
|
* avoid individually crossing any boundaries, so we merely need to check a
|
|
|
|
* segment's start address to avoid concatenating across one.
|
2015-10-01 19:13:58 +00:00
|
|
|
*/
|
|
|
|
static int __finalise_sg(struct device *dev, struct scatterlist *sg, int nents,
|
|
|
|
dma_addr_t dma_addr)
|
|
|
|
{
|
2016-04-11 11:32:31 +00:00
|
|
|
struct scatterlist *s, *cur = sg;
|
|
|
|
unsigned long seg_mask = dma_get_seg_boundary(dev);
|
|
|
|
unsigned int cur_len = 0, max_len = dma_get_max_seg_size(dev);
|
|
|
|
int i, count = 0;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
|
|
|
for_each_sg(sg, s, nents, i) {
|
2016-04-11 11:32:31 +00:00
|
|
|
/* Restore this segment's original unaligned fields first */
|
2022-07-08 16:50:59 +00:00
|
|
|
dma_addr_t s_dma_addr = sg_dma_address(s);
|
2016-04-11 11:32:31 +00:00
|
|
|
unsigned int s_iova_off = sg_dma_address(s);
|
2015-10-01 19:13:58 +00:00
|
|
|
unsigned int s_length = sg_dma_len(s);
|
2016-04-11 11:32:31 +00:00
|
|
|
unsigned int s_iova_len = s->length;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2018-11-21 18:35:19 +00:00
|
|
|
sg_dma_address(s) = DMA_MAPPING_ERROR;
|
2016-04-11 11:32:31 +00:00
|
|
|
sg_dma_len(s) = 0;
|
|
|
|
|
2023-06-12 15:31:57 +00:00
|
|
|
if (sg_dma_is_bus_address(s)) {
|
2022-07-08 16:50:59 +00:00
|
|
|
if (i > 0)
|
|
|
|
cur = sg_next(cur);
|
|
|
|
|
|
|
|
sg_dma_unmark_bus_address(s);
|
|
|
|
sg_dma_address(cur) = s_dma_addr;
|
|
|
|
sg_dma_len(cur) = s_length;
|
|
|
|
sg_dma_mark_bus_address(cur);
|
|
|
|
count++;
|
|
|
|
cur_len = 0;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
s->offset += s_iova_off;
|
|
|
|
s->length = s_length;
|
|
|
|
|
2016-04-11 11:32:31 +00:00
|
|
|
/*
|
|
|
|
* Now fill in the real DMA data. If...
|
|
|
|
* - there is a valid output segment to append to
|
|
|
|
* - and this segment starts on an IOVA page boundary
|
|
|
|
* - but doesn't fall at a segment boundary
|
|
|
|
* - and wouldn't make the resulting output segment too long
|
|
|
|
*/
|
|
|
|
if (cur_len && !s_iova_off && (dma_addr & seg_mask) &&
|
2019-07-29 16:46:00 +00:00
|
|
|
(max_len - cur_len >= s_length)) {
|
2016-04-11 11:32:31 +00:00
|
|
|
/* ...then concatenate it with the previous one */
|
|
|
|
cur_len += s_length;
|
|
|
|
} else {
|
|
|
|
/* Otherwise start the next output segment */
|
|
|
|
if (i > 0)
|
|
|
|
cur = sg_next(cur);
|
|
|
|
cur_len = s_length;
|
|
|
|
count++;
|
|
|
|
|
|
|
|
sg_dma_address(cur) = dma_addr + s_iova_off;
|
|
|
|
}
|
|
|
|
|
|
|
|
sg_dma_len(cur) = cur_len;
|
|
|
|
dma_addr += s_iova_len;
|
|
|
|
|
|
|
|
if (s_length + s_iova_off < s_iova_len)
|
|
|
|
cur_len = 0;
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
2016-04-11 11:32:31 +00:00
|
|
|
return count;
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If mapping failed, then just restore the original list,
|
|
|
|
* but making sure the DMA fields are invalidated.
|
|
|
|
*/
|
|
|
|
static void __invalidate_sg(struct scatterlist *sg, int nents)
|
|
|
|
{
|
|
|
|
struct scatterlist *s;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for_each_sg(sg, s, nents, i) {
|
2023-06-12 15:31:57 +00:00
|
|
|
if (sg_dma_is_bus_address(s)) {
|
2022-07-08 16:50:59 +00:00
|
|
|
sg_dma_unmark_bus_address(s);
|
|
|
|
} else {
|
|
|
|
if (sg_dma_address(s) != DMA_MAPPING_ERROR)
|
|
|
|
s->offset += sg_dma_address(s);
|
|
|
|
if (sg_dma_len(s))
|
|
|
|
s->length = sg_dma_len(s);
|
|
|
|
}
|
2018-11-21 18:35:19 +00:00
|
|
|
sg_dma_address(s) = DMA_MAPPING_ERROR;
|
2015-10-01 19:13:58 +00:00
|
|
|
sg_dma_len(s) = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-24 08:20:53 +00:00
|
|
|
static void iommu_dma_unmap_sg_swiotlb(struct device *dev, struct scatterlist *sg,
|
|
|
|
int nents, enum dma_data_direction dir, unsigned long attrs)
|
|
|
|
{
|
|
|
|
struct scatterlist *s;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for_each_sg(sg, s, nents, i)
|
2021-09-29 02:32:57 +00:00
|
|
|
iommu_dma_unmap_page(dev, sg_dma_address(s),
|
2020-11-24 08:20:53 +00:00
|
|
|
sg_dma_len(s), dir, attrs);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int iommu_dma_map_sg_swiotlb(struct device *dev, struct scatterlist *sg,
|
|
|
|
int nents, enum dma_data_direction dir, unsigned long attrs)
|
|
|
|
{
|
|
|
|
struct scatterlist *s;
|
|
|
|
int i;
|
|
|
|
|
2023-06-12 15:31:59 +00:00
|
|
|
sg_dma_mark_swiotlb(sg);
|
|
|
|
|
2020-11-24 08:20:53 +00:00
|
|
|
for_each_sg(sg, s, nents, i) {
|
2021-09-29 02:32:57 +00:00
|
|
|
sg_dma_address(s) = iommu_dma_map_page(dev, sg_page(s),
|
|
|
|
s->offset, s->length, dir, attrs);
|
2020-11-24 08:20:53 +00:00
|
|
|
if (sg_dma_address(s) == DMA_MAPPING_ERROR)
|
|
|
|
goto out_unmap;
|
|
|
|
sg_dma_len(s) = s->length;
|
|
|
|
}
|
|
|
|
|
|
|
|
return nents;
|
|
|
|
|
|
|
|
out_unmap:
|
|
|
|
iommu_dma_unmap_sg_swiotlb(dev, sg, i, dir, attrs | DMA_ATTR_SKIP_CPU_SYNC);
|
2021-07-29 20:15:22 +00:00
|
|
|
return -EIO;
|
2020-11-24 08:20:53 +00:00
|
|
|
}
|
|
|
|
|
2015-10-01 19:13:58 +00:00
|
|
|
/*
|
|
|
|
* The DMA API client is passing in a scatterlist which could describe
|
|
|
|
* any old buffer layout, but the IOMMU API requires everything to be
|
|
|
|
* aligned to IOMMU pages. Hence the need for this complicated bit of
|
|
|
|
* impedance-matching, to be able to hand off a suitably-aligned list,
|
|
|
|
* but still preserve the original offsets and sizes for the caller.
|
|
|
|
*/
|
2019-05-20 07:29:29 +00:00
|
|
|
static int iommu_dma_map_sg(struct device *dev, struct scatterlist *sg,
|
|
|
|
int nents, enum dma_data_direction dir, unsigned long attrs)
|
2015-10-01 19:13:58 +00:00
|
|
|
{
|
2018-09-12 15:24:13 +00:00
|
|
|
struct iommu_domain *domain = iommu_get_dma_domain(dev);
|
2017-03-31 14:46:05 +00:00
|
|
|
struct iommu_dma_cookie *cookie = domain->iova_cookie;
|
|
|
|
struct iova_domain *iovad = &cookie->iovad;
|
2015-10-01 19:13:58 +00:00
|
|
|
struct scatterlist *s, *prev = NULL;
|
2019-05-20 07:29:29 +00:00
|
|
|
int prot = dma_info_to_prot(dir, dev_is_dma_coherent(dev), attrs);
|
2022-07-08 16:50:59 +00:00
|
|
|
struct pci_p2pdma_map_state p2pdma_state = {};
|
|
|
|
enum pci_p2pdma_map_type map;
|
2017-03-31 14:46:05 +00:00
|
|
|
dma_addr_t iova;
|
2015-10-01 19:13:58 +00:00
|
|
|
size_t iova_len = 0;
|
2016-04-11 11:32:31 +00:00
|
|
|
unsigned long mask = dma_get_seg_boundary(dev);
|
2021-07-29 20:15:22 +00:00
|
|
|
ssize_t ret;
|
2015-10-01 19:13:58 +00:00
|
|
|
int i;
|
|
|
|
|
2021-07-29 20:15:22 +00:00
|
|
|
if (static_branch_unlikely(&iommu_deferred_attach_enabled)) {
|
|
|
|
ret = iommu_deferred_attach(dev, domain);
|
2021-10-27 17:47:57 +00:00
|
|
|
if (ret)
|
|
|
|
goto out;
|
2021-07-29 20:15:22 +00:00
|
|
|
}
|
2019-09-08 16:56:39 +00:00
|
|
|
|
2023-06-12 15:31:59 +00:00
|
|
|
if (dev_use_sg_swiotlb(dev, sg, nents, dir))
|
2020-11-24 08:20:53 +00:00
|
|
|
return iommu_dma_map_sg_swiotlb(dev, sg, nents, dir, attrs);
|
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
if (!(attrs & DMA_ATTR_SKIP_CPU_SYNC))
|
|
|
|
iommu_dma_sync_sg_for_device(dev, sg, nents, dir);
|
|
|
|
|
2015-10-01 19:13:58 +00:00
|
|
|
/*
|
|
|
|
* Work out how much IOVA space we need, and align the segments to
|
|
|
|
* IOVA granules for the IOMMU driver to handle. With some clever
|
|
|
|
* trickery we can modify the list in-place, but reversibly, by
|
2016-04-11 11:32:31 +00:00
|
|
|
* stashing the unaligned parts in the as-yet-unused DMA fields.
|
2015-10-01 19:13:58 +00:00
|
|
|
*/
|
|
|
|
for_each_sg(sg, s, nents, i) {
|
2016-04-11 11:32:31 +00:00
|
|
|
size_t s_iova_off = iova_offset(iovad, s->offset);
|
2015-10-01 19:13:58 +00:00
|
|
|
size_t s_length = s->length;
|
2016-04-11 11:32:31 +00:00
|
|
|
size_t pad_len = (mask - iova_len + 1) & mask;
|
2015-10-01 19:13:58 +00:00
|
|
|
|
2022-07-08 16:50:59 +00:00
|
|
|
if (is_pci_p2pdma_page(sg_page(s))) {
|
|
|
|
map = pci_p2pdma_map_segment(&p2pdma_state, dev, s);
|
|
|
|
switch (map) {
|
|
|
|
case PCI_P2PDMA_MAP_BUS_ADDR:
|
|
|
|
/*
|
|
|
|
* iommu_map_sg() will skip this segment as
|
|
|
|
* it is marked as a bus address,
|
|
|
|
* __finalise_sg() will copy the dma address
|
|
|
|
* into the output segment.
|
|
|
|
*/
|
|
|
|
continue;
|
|
|
|
case PCI_P2PDMA_MAP_THRU_HOST_BRIDGE:
|
|
|
|
/*
|
|
|
|
* Mapping through host bridge should be
|
|
|
|
* mapped with regular IOVAs, thus we
|
|
|
|
* do nothing here and continue below.
|
|
|
|
*/
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -EREMOTEIO;
|
|
|
|
goto out_restore_sg;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-11 11:32:31 +00:00
|
|
|
sg_dma_address(s) = s_iova_off;
|
2015-10-01 19:13:58 +00:00
|
|
|
sg_dma_len(s) = s_length;
|
2016-04-11 11:32:31 +00:00
|
|
|
s->offset -= s_iova_off;
|
|
|
|
s_length = iova_align(iovad, s_length + s_iova_off);
|
2015-10-01 19:13:58 +00:00
|
|
|
s->length = s_length;
|
|
|
|
|
|
|
|
/*
|
2016-04-11 11:32:31 +00:00
|
|
|
* Due to the alignment of our single IOVA allocation, we can
|
|
|
|
* depend on these assumptions about the segment boundary mask:
|
|
|
|
* - If mask size >= IOVA size, then the IOVA range cannot
|
|
|
|
* possibly fall across a boundary, so we don't care.
|
|
|
|
* - If mask size < IOVA size, then the IOVA range must start
|
|
|
|
* exactly on a boundary, therefore we can lay things out
|
|
|
|
* based purely on segment lengths without needing to know
|
|
|
|
* the actual addresses beforehand.
|
|
|
|
* - The mask must be a power of 2, so pad_len == 0 if
|
|
|
|
* iova_len == 0, thus we cannot dereference prev the first
|
|
|
|
* time through here (i.e. before it has a meaningful value).
|
2015-10-01 19:13:58 +00:00
|
|
|
*/
|
2016-04-11 11:32:31 +00:00
|
|
|
if (pad_len && pad_len < s_length - 1) {
|
2015-10-01 19:13:58 +00:00
|
|
|
prev->length += pad_len;
|
|
|
|
iova_len += pad_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
iova_len += s_length;
|
|
|
|
prev = s;
|
|
|
|
}
|
|
|
|
|
2022-07-08 16:50:59 +00:00
|
|
|
if (!iova_len)
|
|
|
|
return __finalise_sg(dev, sg, nents, 0);
|
|
|
|
|
2017-03-31 14:46:05 +00:00
|
|
|
iova = iommu_dma_alloc_iova(domain, iova_len, dma_get_mask(dev), dev);
|
2021-07-29 20:15:22 +00:00
|
|
|
if (!iova) {
|
|
|
|
ret = -ENOMEM;
|
2015-10-01 19:13:58 +00:00
|
|
|
goto out_restore_sg;
|
2021-07-29 20:15:22 +00:00
|
|
|
}
|
2015-10-01 19:13:58 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* We'll leave any physical concatenation to the IOMMU driver's
|
|
|
|
* implementation - it knows better than we do.
|
|
|
|
*/
|
2023-01-23 20:35:56 +00:00
|
|
|
ret = iommu_map_sg(domain, iova, sg, nents, prot, GFP_ATOMIC);
|
2022-05-07 08:52:03 +00:00
|
|
|
if (ret < 0 || ret < iova_len)
|
2015-10-01 19:13:58 +00:00
|
|
|
goto out_free_iova;
|
|
|
|
|
2017-03-31 14:46:05 +00:00
|
|
|
return __finalise_sg(dev, sg, nents, iova);
|
2015-10-01 19:13:58 +00:00
|
|
|
|
|
|
|
out_free_iova:
|
2020-11-24 08:20:51 +00:00
|
|
|
iommu_dma_free_iova(cookie, iova, iova_len, NULL);
|
2015-10-01 19:13:58 +00:00
|
|
|
out_restore_sg:
|
|
|
|
__invalidate_sg(sg, nents);
|
2021-07-29 20:15:22 +00:00
|
|
|
out:
|
2022-07-08 16:50:59 +00:00
|
|
|
if (ret != -ENOMEM && ret != -EREMOTEIO)
|
2021-07-29 20:15:22 +00:00
|
|
|
return -EINVAL;
|
|
|
|
return ret;
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
static void iommu_dma_unmap_sg(struct device *dev, struct scatterlist *sg,
|
|
|
|
int nents, enum dma_data_direction dir, unsigned long attrs)
|
2015-10-01 19:13:58 +00:00
|
|
|
{
|
2022-07-08 16:50:59 +00:00
|
|
|
dma_addr_t end = 0, start;
|
2017-03-31 14:46:05 +00:00
|
|
|
struct scatterlist *tmp;
|
|
|
|
int i;
|
2019-05-20 07:29:29 +00:00
|
|
|
|
2023-06-12 15:31:59 +00:00
|
|
|
if (sg_dma_is_swiotlb(sg)) {
|
2020-11-24 08:20:53 +00:00
|
|
|
iommu_dma_unmap_sg_swiotlb(dev, sg, nents, dir, attrs);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-09-29 02:32:56 +00:00
|
|
|
if (!(attrs & DMA_ATTR_SKIP_CPU_SYNC))
|
|
|
|
iommu_dma_sync_sg_for_cpu(dev, sg, nents, dir);
|
|
|
|
|
2015-10-01 19:13:58 +00:00
|
|
|
/*
|
|
|
|
* The scatterlist segments are mapped into a single
|
2022-07-08 16:50:59 +00:00
|
|
|
* contiguous IOVA allocation, the start and end points
|
|
|
|
* just have to be determined.
|
2015-10-01 19:13:58 +00:00
|
|
|
*/
|
2022-07-08 16:50:59 +00:00
|
|
|
for_each_sg(sg, tmp, nents, i) {
|
2023-06-12 15:31:57 +00:00
|
|
|
if (sg_dma_is_bus_address(tmp)) {
|
2022-07-08 16:50:59 +00:00
|
|
|
sg_dma_unmark_bus_address(tmp);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2017-03-31 14:46:05 +00:00
|
|
|
if (sg_dma_len(tmp) == 0)
|
|
|
|
break;
|
2022-07-08 16:50:59 +00:00
|
|
|
|
|
|
|
start = sg_dma_address(tmp);
|
|
|
|
break;
|
2017-03-31 14:46:05 +00:00
|
|
|
}
|
2022-07-08 16:50:59 +00:00
|
|
|
|
|
|
|
nents -= i;
|
|
|
|
for_each_sg(tmp, tmp, nents, i) {
|
2023-06-12 15:31:57 +00:00
|
|
|
if (sg_dma_is_bus_address(tmp)) {
|
2022-07-08 16:50:59 +00:00
|
|
|
sg_dma_unmark_bus_address(tmp);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2017-03-31 14:46:05 +00:00
|
|
|
if (sg_dma_len(tmp) == 0)
|
|
|
|
break;
|
2022-07-08 16:50:59 +00:00
|
|
|
|
|
|
|
end = sg_dma_address(tmp) + sg_dma_len(tmp);
|
2017-03-31 14:46:05 +00:00
|
|
|
}
|
2022-07-08 16:50:59 +00:00
|
|
|
|
|
|
|
if (end)
|
|
|
|
__iommu_dma_unmap(dev, start, end - start);
|
2015-10-01 19:13:58 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
static dma_addr_t iommu_dma_map_resource(struct device *dev, phys_addr_t phys,
|
2016-11-14 12:16:26 +00:00
|
|
|
size_t size, enum dma_data_direction dir, unsigned long attrs)
|
|
|
|
{
|
|
|
|
return __iommu_dma_map(dev, phys, size,
|
2019-09-08 16:56:40 +00:00
|
|
|
dma_info_to_prot(dir, false, attrs) | IOMMU_MMIO,
|
|
|
|
dma_get_mask(dev));
|
2016-11-14 12:16:26 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
static void iommu_dma_unmap_resource(struct device *dev, dma_addr_t handle,
|
2016-11-14 12:16:26 +00:00
|
|
|
size_t size, enum dma_data_direction dir, unsigned long attrs)
|
|
|
|
{
|
2019-05-20 07:29:31 +00:00
|
|
|
__iommu_dma_unmap(dev, handle, size);
|
2016-11-14 12:16:26 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:40 +00:00
|
|
|
static void __iommu_dma_free(struct device *dev, size_t size, void *cpu_addr)
|
2019-05-20 07:29:36 +00:00
|
|
|
{
|
|
|
|
size_t alloc_size = PAGE_ALIGN(size);
|
|
|
|
int count = alloc_size >> PAGE_SHIFT;
|
|
|
|
struct page *page = NULL, **pages = NULL;
|
|
|
|
|
|
|
|
/* Non-coherent atomic allocation? Easy */
|
2019-05-20 07:29:45 +00:00
|
|
|
if (IS_ENABLED(CONFIG_DMA_DIRECT_REMAP) &&
|
2020-04-15 00:04:55 +00:00
|
|
|
dma_free_from_pool(dev, cpu_addr, alloc_size))
|
2019-05-20 07:29:36 +00:00
|
|
|
return;
|
|
|
|
|
2022-02-26 15:40:21 +00:00
|
|
|
if (is_vmalloc_addr(cpu_addr)) {
|
2019-05-20 07:29:36 +00:00
|
|
|
/*
|
|
|
|
* If it the address is remapped, then it's either non-coherent
|
|
|
|
* or highmem CMA, or an iommu_dma_alloc_remap() construction.
|
|
|
|
*/
|
2019-06-03 07:14:31 +00:00
|
|
|
pages = dma_common_find_pages(cpu_addr);
|
2019-05-20 07:29:36 +00:00
|
|
|
if (!pages)
|
|
|
|
page = vmalloc_to_page(cpu_addr);
|
2019-08-30 06:51:01 +00:00
|
|
|
dma_common_free_remap(cpu_addr, alloc_size);
|
2019-05-20 07:29:36 +00:00
|
|
|
} else {
|
|
|
|
/* Lowmem means a coherent atomic or CMA allocation */
|
|
|
|
page = virt_to_page(cpu_addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pages)
|
|
|
|
__iommu_dma_free_pages(pages, count);
|
2019-06-03 22:52:59 +00:00
|
|
|
if (page)
|
|
|
|
dma_free_contiguous(dev, page, alloc_size);
|
2019-05-20 07:29:36 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:40 +00:00
|
|
|
static void iommu_dma_free(struct device *dev, size_t size, void *cpu_addr,
|
|
|
|
dma_addr_t handle, unsigned long attrs)
|
|
|
|
{
|
|
|
|
__iommu_dma_unmap(dev, handle, size);
|
|
|
|
__iommu_dma_free(dev, size, cpu_addr);
|
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:42 +00:00
|
|
|
static void *iommu_dma_alloc_pages(struct device *dev, size_t size,
|
|
|
|
struct page **pagep, gfp_t gfp, unsigned long attrs)
|
2019-05-20 07:29:29 +00:00
|
|
|
{
|
|
|
|
bool coherent = dev_is_dma_coherent(dev);
|
2019-05-20 07:29:41 +00:00
|
|
|
size_t alloc_size = PAGE_ALIGN(size);
|
2019-08-20 02:45:49 +00:00
|
|
|
int node = dev_to_node(dev);
|
2019-05-20 07:29:39 +00:00
|
|
|
struct page *page = NULL;
|
2019-05-20 07:29:41 +00:00
|
|
|
void *cpu_addr;
|
2019-05-20 07:29:29 +00:00
|
|
|
|
2019-06-03 22:52:59 +00:00
|
|
|
page = dma_alloc_contiguous(dev, alloc_size, gfp);
|
2019-08-20 02:45:49 +00:00
|
|
|
if (!page)
|
|
|
|
page = alloc_pages_node(node, gfp, get_order(alloc_size));
|
2019-05-20 07:29:37 +00:00
|
|
|
if (!page)
|
|
|
|
return NULL;
|
|
|
|
|
2022-02-26 15:40:21 +00:00
|
|
|
if (!coherent || PageHighMem(page)) {
|
2019-07-26 07:26:40 +00:00
|
|
|
pgprot_t prot = dma_pgprot(dev, PAGE_KERNEL, attrs);
|
2019-05-20 07:29:37 +00:00
|
|
|
|
2019-05-20 07:29:41 +00:00
|
|
|
cpu_addr = dma_common_contiguous_remap(page, alloc_size,
|
2019-08-30 06:51:01 +00:00
|
|
|
prot, __builtin_return_address(0));
|
2019-05-20 07:29:41 +00:00
|
|
|
if (!cpu_addr)
|
2019-05-20 07:29:42 +00:00
|
|
|
goto out_free_pages;
|
2019-05-20 07:29:38 +00:00
|
|
|
|
|
|
|
if (!coherent)
|
2019-05-20 07:29:41 +00:00
|
|
|
arch_dma_prep_coherent(page, size);
|
2019-05-20 07:29:38 +00:00
|
|
|
} else {
|
2019-05-20 07:29:41 +00:00
|
|
|
cpu_addr = page_address(page);
|
2019-05-20 07:29:38 +00:00
|
|
|
}
|
2019-05-20 07:29:42 +00:00
|
|
|
|
|
|
|
*pagep = page;
|
2019-05-20 07:29:41 +00:00
|
|
|
memset(cpu_addr, 0, alloc_size);
|
|
|
|
return cpu_addr;
|
2019-05-20 07:29:37 +00:00
|
|
|
out_free_pages:
|
2019-06-03 22:52:59 +00:00
|
|
|
dma_free_contiguous(dev, page, alloc_size);
|
2019-05-20 07:29:37 +00:00
|
|
|
return NULL;
|
2019-05-20 07:29:29 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:42 +00:00
|
|
|
static void *iommu_dma_alloc(struct device *dev, size_t size,
|
|
|
|
dma_addr_t *handle, gfp_t gfp, unsigned long attrs)
|
|
|
|
{
|
|
|
|
bool coherent = dev_is_dma_coherent(dev);
|
|
|
|
int ioprot = dma_info_to_prot(DMA_BIDIRECTIONAL, coherent, attrs);
|
|
|
|
struct page *page = NULL;
|
|
|
|
void *cpu_addr;
|
|
|
|
|
|
|
|
gfp |= __GFP_ZERO;
|
|
|
|
|
2022-02-26 15:40:21 +00:00
|
|
|
if (gfpflags_allow_blocking(gfp) &&
|
2020-09-01 12:00:56 +00:00
|
|
|
!(attrs & DMA_ATTR_FORCE_CONTIGUOUS)) {
|
|
|
|
return iommu_dma_alloc_remap(dev, size, handle, gfp,
|
|
|
|
dma_pgprot(dev, PAGE_KERNEL, attrs), attrs);
|
|
|
|
}
|
2019-05-20 07:29:42 +00:00
|
|
|
|
2019-05-20 07:29:45 +00:00
|
|
|
if (IS_ENABLED(CONFIG_DMA_DIRECT_REMAP) &&
|
|
|
|
!gfpflags_allow_blocking(gfp) && !coherent)
|
2020-08-14 10:26:24 +00:00
|
|
|
page = dma_alloc_from_pool(dev, PAGE_ALIGN(size), &cpu_addr,
|
|
|
|
gfp, NULL);
|
2019-05-20 07:29:42 +00:00
|
|
|
else
|
|
|
|
cpu_addr = iommu_dma_alloc_pages(dev, size, &page, gfp, attrs);
|
|
|
|
if (!cpu_addr)
|
|
|
|
return NULL;
|
|
|
|
|
2019-09-08 16:56:40 +00:00
|
|
|
*handle = __iommu_dma_map(dev, page_to_phys(page), size, ioprot,
|
|
|
|
dev->coherent_dma_mask);
|
2019-05-20 07:29:42 +00:00
|
|
|
if (*handle == DMA_MAPPING_ERROR) {
|
|
|
|
__iommu_dma_free(dev, size, cpu_addr);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return cpu_addr;
|
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
static int iommu_dma_mmap(struct device *dev, struct vm_area_struct *vma,
|
|
|
|
void *cpu_addr, dma_addr_t dma_addr, size_t size,
|
|
|
|
unsigned long attrs)
|
|
|
|
{
|
|
|
|
unsigned long nr_pages = PAGE_ALIGN(size) >> PAGE_SHIFT;
|
2019-05-20 07:29:44 +00:00
|
|
|
unsigned long pfn, off = vma->vm_pgoff;
|
2019-05-20 07:29:29 +00:00
|
|
|
int ret;
|
|
|
|
|
2019-07-26 07:26:40 +00:00
|
|
|
vma->vm_page_prot = dma_pgprot(dev, vma->vm_page_prot, attrs);
|
2019-05-20 07:29:29 +00:00
|
|
|
|
|
|
|
if (dma_mmap_from_dev_coherent(dev, vma, cpu_addr, size, &ret))
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
if (off >= nr_pages || vma_pages(vma) > nr_pages - off)
|
|
|
|
return -ENXIO;
|
|
|
|
|
2022-02-26 15:40:21 +00:00
|
|
|
if (is_vmalloc_addr(cpu_addr)) {
|
2019-06-03 07:14:31 +00:00
|
|
|
struct page **pages = dma_common_find_pages(cpu_addr);
|
2019-05-20 07:29:29 +00:00
|
|
|
|
2019-05-20 07:29:44 +00:00
|
|
|
if (pages)
|
2020-12-09 11:20:19 +00:00
|
|
|
return vm_map_pages(vma, pages, nr_pages);
|
2019-05-20 07:29:44 +00:00
|
|
|
pfn = vmalloc_to_pfn(cpu_addr);
|
|
|
|
} else {
|
|
|
|
pfn = page_to_pfn(virt_to_page(cpu_addr));
|
2019-05-20 07:29:29 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:44 +00:00
|
|
|
return remap_pfn_range(vma, vma->vm_start, pfn + off,
|
|
|
|
vma->vm_end - vma->vm_start,
|
|
|
|
vma->vm_page_prot);
|
2019-05-20 07:29:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int iommu_dma_get_sgtable(struct device *dev, struct sg_table *sgt,
|
|
|
|
void *cpu_addr, dma_addr_t dma_addr, size_t size,
|
|
|
|
unsigned long attrs)
|
|
|
|
{
|
2019-05-20 07:29:43 +00:00
|
|
|
struct page *page;
|
|
|
|
int ret;
|
2019-05-20 07:29:29 +00:00
|
|
|
|
2022-02-26 15:40:21 +00:00
|
|
|
if (is_vmalloc_addr(cpu_addr)) {
|
2019-06-03 07:14:31 +00:00
|
|
|
struct page **pages = dma_common_find_pages(cpu_addr);
|
2019-05-20 07:29:29 +00:00
|
|
|
|
2019-05-20 07:29:43 +00:00
|
|
|
if (pages) {
|
|
|
|
return sg_alloc_table_from_pages(sgt, pages,
|
|
|
|
PAGE_ALIGN(size) >> PAGE_SHIFT,
|
|
|
|
0, size, GFP_KERNEL);
|
|
|
|
}
|
|
|
|
|
|
|
|
page = vmalloc_to_page(cpu_addr);
|
|
|
|
} else {
|
|
|
|
page = virt_to_page(cpu_addr);
|
2019-05-20 07:29:29 +00:00
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:43 +00:00
|
|
|
ret = sg_alloc_table(sgt, 1, GFP_KERNEL);
|
|
|
|
if (!ret)
|
|
|
|
sg_set_page(sgt->sgl, page, PAGE_ALIGN(size), 0);
|
|
|
|
return ret;
|
2019-05-20 07:29:29 +00:00
|
|
|
}
|
|
|
|
|
2019-08-28 12:35:41 +00:00
|
|
|
static unsigned long iommu_dma_get_merge_boundary(struct device *dev)
|
|
|
|
{
|
|
|
|
struct iommu_domain *domain = iommu_get_dma_domain(dev);
|
|
|
|
|
|
|
|
return (1UL << __ffs(domain->pgsize_bitmap)) - 1;
|
|
|
|
}
|
|
|
|
|
2022-07-14 11:15:25 +00:00
|
|
|
static size_t iommu_dma_opt_mapping_size(void)
|
|
|
|
{
|
|
|
|
return iova_rcache_range();
|
|
|
|
}
|
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
static const struct dma_map_ops iommu_dma_ops = {
|
2022-07-08 16:50:59 +00:00
|
|
|
.flags = DMA_F_PCI_P2PDMA_SUPPORTED,
|
2019-05-20 07:29:29 +00:00
|
|
|
.alloc = iommu_dma_alloc,
|
|
|
|
.free = iommu_dma_free,
|
2020-09-01 11:34:33 +00:00
|
|
|
.alloc_pages = dma_common_alloc_pages,
|
|
|
|
.free_pages = dma_common_free_pages,
|
2021-01-28 13:47:29 +00:00
|
|
|
.alloc_noncontiguous = iommu_dma_alloc_noncontiguous,
|
|
|
|
.free_noncontiguous = iommu_dma_free_noncontiguous,
|
2019-05-20 07:29:29 +00:00
|
|
|
.mmap = iommu_dma_mmap,
|
|
|
|
.get_sgtable = iommu_dma_get_sgtable,
|
|
|
|
.map_page = iommu_dma_map_page,
|
|
|
|
.unmap_page = iommu_dma_unmap_page,
|
|
|
|
.map_sg = iommu_dma_map_sg,
|
|
|
|
.unmap_sg = iommu_dma_unmap_sg,
|
|
|
|
.sync_single_for_cpu = iommu_dma_sync_single_for_cpu,
|
|
|
|
.sync_single_for_device = iommu_dma_sync_single_for_device,
|
|
|
|
.sync_sg_for_cpu = iommu_dma_sync_sg_for_cpu,
|
|
|
|
.sync_sg_for_device = iommu_dma_sync_sg_for_device,
|
|
|
|
.map_resource = iommu_dma_map_resource,
|
|
|
|
.unmap_resource = iommu_dma_unmap_resource,
|
2019-08-28 12:35:41 +00:00
|
|
|
.get_merge_boundary = iommu_dma_get_merge_boundary,
|
2022-07-14 11:15:25 +00:00
|
|
|
.opt_mapping_size = iommu_dma_opt_mapping_size,
|
2019-05-20 07:29:29 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The IOMMU core code allocates the default DMA domain, which the underlying
|
|
|
|
* IOMMU driver needs to support via the dma-iommu layer.
|
|
|
|
*/
|
2021-06-18 15:20:59 +00:00
|
|
|
void iommu_setup_dma_ops(struct device *dev, u64 dma_base, u64 dma_limit)
|
2019-05-20 07:29:29 +00:00
|
|
|
{
|
|
|
|
struct iommu_domain *domain = iommu_get_domain_for_dev(dev);
|
|
|
|
|
|
|
|
if (!domain)
|
|
|
|
goto out_err;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The IOMMU core code allocates the default DMA domain, which the
|
|
|
|
* underlying IOMMU driver needs to support via the dma-iommu layer.
|
|
|
|
*/
|
2021-08-11 12:21:30 +00:00
|
|
|
if (iommu_is_dma_domain(domain)) {
|
2021-06-18 15:20:59 +00:00
|
|
|
if (iommu_dma_init_domain(domain, dma_base, dma_limit, dev))
|
2019-05-20 07:29:29 +00:00
|
|
|
goto out_err;
|
|
|
|
dev->dma_ops = &iommu_dma_ops;
|
|
|
|
}
|
|
|
|
|
|
|
|
return;
|
|
|
|
out_err:
|
|
|
|
pr_warn("Failed to set up IOMMU for device %s; retaining platform DMA ops\n",
|
|
|
|
dev_name(dev));
|
2016-11-14 12:16:26 +00:00
|
|
|
}
|
2021-06-18 15:21:00 +00:00
|
|
|
EXPORT_SYMBOL_GPL(iommu_setup_dma_ops);
|
2016-11-14 12:16:26 +00:00
|
|
|
|
2016-09-12 16:13:59 +00:00
|
|
|
static struct iommu_dma_msi_page *iommu_dma_get_msi_page(struct device *dev,
|
|
|
|
phys_addr_t msi_addr, struct iommu_domain *domain)
|
|
|
|
{
|
|
|
|
struct iommu_dma_cookie *cookie = domain->iova_cookie;
|
|
|
|
struct iommu_dma_msi_page *msi_page;
|
2017-03-31 14:46:05 +00:00
|
|
|
dma_addr_t iova;
|
2016-09-12 16:13:59 +00:00
|
|
|
int prot = IOMMU_WRITE | IOMMU_NOEXEC | IOMMU_MMIO;
|
2017-01-19 20:57:46 +00:00
|
|
|
size_t size = cookie_msi_granule(cookie);
|
2016-09-12 16:13:59 +00:00
|
|
|
|
2017-01-19 20:57:46 +00:00
|
|
|
msi_addr &= ~(phys_addr_t)(size - 1);
|
2016-09-12 16:13:59 +00:00
|
|
|
list_for_each_entry(msi_page, &cookie->msi_page_list, list)
|
|
|
|
if (msi_page->phys == msi_addr)
|
|
|
|
return msi_page;
|
|
|
|
|
2019-12-09 19:47:25 +00:00
|
|
|
msi_page = kzalloc(sizeof(*msi_page), GFP_KERNEL);
|
2016-09-12 16:13:59 +00:00
|
|
|
if (!msi_page)
|
|
|
|
return NULL;
|
|
|
|
|
2019-07-29 15:32:38 +00:00
|
|
|
iova = iommu_dma_alloc_iova(domain, size, dma_get_mask(dev), dev);
|
|
|
|
if (!iova)
|
2017-03-31 14:46:06 +00:00
|
|
|
goto out_free_page;
|
2016-09-12 16:13:59 +00:00
|
|
|
|
2023-01-23 20:35:54 +00:00
|
|
|
if (iommu_map(domain, iova, msi_addr, size, prot, GFP_KERNEL))
|
2019-07-29 15:32:38 +00:00
|
|
|
goto out_free_iova;
|
|
|
|
|
2016-09-12 16:13:59 +00:00
|
|
|
INIT_LIST_HEAD(&msi_page->list);
|
2017-03-31 14:46:06 +00:00
|
|
|
msi_page->phys = msi_addr;
|
|
|
|
msi_page->iova = iova;
|
2016-09-12 16:13:59 +00:00
|
|
|
list_add(&msi_page->list, &cookie->msi_page_list);
|
|
|
|
return msi_page;
|
|
|
|
|
2019-07-29 15:32:38 +00:00
|
|
|
out_free_iova:
|
2020-11-24 08:20:51 +00:00
|
|
|
iommu_dma_free_iova(cookie, iova, size, NULL);
|
2016-09-12 16:13:59 +00:00
|
|
|
out_free_page:
|
|
|
|
kfree(msi_page);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2022-08-16 17:28:04 +00:00
|
|
|
/**
|
|
|
|
* iommu_dma_prepare_msi() - Map the MSI page in the IOMMU domain
|
|
|
|
* @desc: MSI descriptor, will store the MSI page
|
|
|
|
* @msi_addr: MSI target address to be mapped
|
|
|
|
*
|
|
|
|
* Return: 0 on success or negative error code if the mapping failed.
|
|
|
|
*/
|
2019-05-01 13:58:19 +00:00
|
|
|
int iommu_dma_prepare_msi(struct msi_desc *desc, phys_addr_t msi_addr)
|
2016-09-12 16:13:59 +00:00
|
|
|
{
|
2019-05-01 13:58:19 +00:00
|
|
|
struct device *dev = msi_desc_to_dev(desc);
|
2016-09-12 16:13:59 +00:00
|
|
|
struct iommu_domain *domain = iommu_get_domain_for_dev(dev);
|
|
|
|
struct iommu_dma_msi_page *msi_page;
|
2019-12-09 19:47:25 +00:00
|
|
|
static DEFINE_MUTEX(msi_prepare_lock); /* see below */
|
2016-09-12 16:13:59 +00:00
|
|
|
|
2019-05-01 13:58:19 +00:00
|
|
|
if (!domain || !domain->iova_cookie) {
|
|
|
|
desc->iommu_cookie = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
2016-09-12 16:13:59 +00:00
|
|
|
|
|
|
|
/*
|
2019-12-09 19:47:25 +00:00
|
|
|
* In fact the whole prepare operation should already be serialised by
|
|
|
|
* irq_domain_mutex further up the callchain, but that's pretty subtle
|
|
|
|
* on its own, so consider this locking as failsafe documentation...
|
2016-09-12 16:13:59 +00:00
|
|
|
*/
|
2019-12-09 19:47:25 +00:00
|
|
|
mutex_lock(&msi_prepare_lock);
|
2016-09-12 16:13:59 +00:00
|
|
|
msi_page = iommu_dma_get_msi_page(dev, msi_addr, domain);
|
2019-12-09 19:47:25 +00:00
|
|
|
mutex_unlock(&msi_prepare_lock);
|
2016-09-12 16:13:59 +00:00
|
|
|
|
2019-05-01 13:58:19 +00:00
|
|
|
msi_desc_set_iommu_cookie(desc, msi_page);
|
|
|
|
|
|
|
|
if (!msi_page)
|
|
|
|
return -ENOMEM;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-08-16 17:28:04 +00:00
|
|
|
/**
|
|
|
|
* iommu_dma_compose_msi_msg() - Apply translation to an MSI message
|
|
|
|
* @desc: MSI descriptor prepared by iommu_dma_prepare_msi()
|
|
|
|
* @msg: MSI message containing target physical address
|
|
|
|
*/
|
|
|
|
void iommu_dma_compose_msi_msg(struct msi_desc *desc, struct msi_msg *msg)
|
2019-05-01 13:58:19 +00:00
|
|
|
{
|
|
|
|
struct device *dev = msi_desc_to_dev(desc);
|
|
|
|
const struct iommu_domain *domain = iommu_get_domain_for_dev(dev);
|
|
|
|
const struct iommu_dma_msi_page *msi_page;
|
|
|
|
|
|
|
|
msi_page = msi_desc_get_iommu_cookie(desc);
|
|
|
|
|
|
|
|
if (!domain || !domain->iova_cookie || WARN_ON(!msi_page))
|
|
|
|
return;
|
|
|
|
|
|
|
|
msg->address_hi = upper_32_bits(msi_page->iova);
|
|
|
|
msg->address_lo &= cookie_msi_granule(domain->iova_cookie) - 1;
|
|
|
|
msg->address_lo += lower_32_bits(msi_page->iova);
|
2016-09-12 16:13:59 +00:00
|
|
|
}
|
2019-05-20 07:29:29 +00:00
|
|
|
|
|
|
|
static int iommu_dma_init(void)
|
|
|
|
{
|
2021-01-26 11:53:36 +00:00
|
|
|
if (is_kdump_kernel())
|
|
|
|
static_branch_enable(&iommu_deferred_attach_enabled);
|
|
|
|
|
2019-05-20 07:29:29 +00:00
|
|
|
return iova_cache_get();
|
2016-09-12 16:13:59 +00:00
|
|
|
}
|
2019-05-20 07:29:29 +00:00
|
|
|
arch_initcall(iommu_dma_init);
|