1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * Copyright (C) 2001 Mike Corrigan & Dave Engebretsen, IBM Corporation
5 * Rewrite, cleanup, new allocation schemes, virtual merging:
6 * Copyright (C) 2004 Olof Johansson, IBM Corporation
7 * and Ben. Herrenschmidt, IBM Corporation
9 * Dynamic DMA mapping support, bus-independent parts.
13 #include <linux/init.h>
14 #include <linux/types.h>
15 #include <linux/slab.h>
17 #include <linux/spinlock.h>
18 #include <linux/string.h>
19 #include <linux/dma-mapping.h>
20 #include <linux/bitmap.h>
21 #include <linux/iommu-helper.h>
22 #include <linux/crash_dump.h>
23 #include <linux/hash.h>
24 #include <linux/fault-inject.h>
25 #include <linux/pci.h>
26 #include <linux/iommu.h>
27 #include <linux/sched.h>
30 #include <asm/iommu.h>
31 #include <asm/pci-bridge.h>
32 #include <asm/machdep.h>
33 #include <asm/kdump.h>
34 #include <asm/fadump.h>
37 #include <asm/mmu_context.h>
43 static void __iommu_free(struct iommu_table
*, dma_addr_t
, unsigned int);
45 static int __init
setup_iommu(char *str
)
47 if (!strcmp(str
, "novmerge"))
49 else if (!strcmp(str
, "vmerge"))
54 __setup("iommu=", setup_iommu
);
56 static DEFINE_PER_CPU(unsigned int, iommu_pool_hash
);
59 * We precalculate the hash to avoid doing it on every allocation.
61 * The hash is important to spread CPUs across all the pools. For example,
62 * on a POWER7 with 4 way SMT we want interrupts on the primary threads and
63 * with 4 pools all primary threads would map to the same pool.
65 static int __init
setup_iommu_pool_hash(void)
69 for_each_possible_cpu(i
)
70 per_cpu(iommu_pool_hash
, i
) = hash_32(i
, IOMMU_POOL_HASHBITS
);
74 subsys_initcall(setup_iommu_pool_hash
);
76 #ifdef CONFIG_FAIL_IOMMU
78 static DECLARE_FAULT_ATTR(fail_iommu
);
80 static int __init
setup_fail_iommu(char *str
)
82 return setup_fault_attr(&fail_iommu
, str
);
84 __setup("fail_iommu=", setup_fail_iommu
);
86 static bool should_fail_iommu(struct device
*dev
)
88 return dev
->archdata
.fail_iommu
&& should_fail(&fail_iommu
, 1);
91 static int __init
fail_iommu_debugfs(void)
93 struct dentry
*dir
= fault_create_debugfs_attr("fail_iommu",
96 return PTR_ERR_OR_ZERO(dir
);
98 late_initcall(fail_iommu_debugfs
);
100 static ssize_t
fail_iommu_show(struct device
*dev
,
101 struct device_attribute
*attr
, char *buf
)
103 return sprintf(buf
, "%d\n", dev
->archdata
.fail_iommu
);
106 static ssize_t
fail_iommu_store(struct device
*dev
,
107 struct device_attribute
*attr
, const char *buf
,
112 if (count
> 0 && sscanf(buf
, "%d", &i
) > 0)
113 dev
->archdata
.fail_iommu
= (i
== 0) ? 0 : 1;
118 static DEVICE_ATTR_RW(fail_iommu
);
120 static int fail_iommu_bus_notify(struct notifier_block
*nb
,
121 unsigned long action
, void *data
)
123 struct device
*dev
= data
;
125 if (action
== BUS_NOTIFY_ADD_DEVICE
) {
126 if (device_create_file(dev
, &dev_attr_fail_iommu
))
127 pr_warn("Unable to create IOMMU fault injection sysfs "
129 } else if (action
== BUS_NOTIFY_DEL_DEVICE
) {
130 device_remove_file(dev
, &dev_attr_fail_iommu
);
136 static struct notifier_block fail_iommu_bus_notifier
= {
137 .notifier_call
= fail_iommu_bus_notify
140 static int __init
fail_iommu_setup(void)
143 bus_register_notifier(&pci_bus_type
, &fail_iommu_bus_notifier
);
146 bus_register_notifier(&vio_bus_type
, &fail_iommu_bus_notifier
);
152 * Must execute after PCI and VIO subsystem have initialised but before
153 * devices are probed.
155 arch_initcall(fail_iommu_setup
);
157 static inline bool should_fail_iommu(struct device
*dev
)
163 static unsigned long iommu_range_alloc(struct device
*dev
,
164 struct iommu_table
*tbl
,
165 unsigned long npages
,
166 unsigned long *handle
,
168 unsigned int align_order
)
170 unsigned long n
, end
, start
;
172 int largealloc
= npages
> 15;
174 unsigned long align_mask
;
176 unsigned int pool_nr
;
177 struct iommu_pool
*pool
;
179 align_mask
= (1ull << align_order
) - 1;
181 /* This allocator was derived from x86_64's bit string search */
184 if (unlikely(npages
== 0)) {
185 if (printk_ratelimit())
187 return DMA_MAPPING_ERROR
;
190 if (should_fail_iommu(dev
))
191 return DMA_MAPPING_ERROR
;
194 * We don't need to disable preemption here because any CPU can
195 * safely use any IOMMU pool.
197 pool_nr
= raw_cpu_read(iommu_pool_hash
) & (tbl
->nr_pools
- 1);
200 pool
= &(tbl
->large_pool
);
202 pool
= &(tbl
->pools
[pool_nr
]);
204 spin_lock_irqsave(&(pool
->lock
), flags
);
207 if ((pass
== 0) && handle
&& *handle
&&
208 (*handle
>= pool
->start
) && (*handle
< pool
->end
))
215 /* The case below can happen if we have a small segment appended
216 * to a large, or when the previous alloc was at the very end of
217 * the available space. If so, go back to the initial start.
222 if (limit
+ tbl
->it_offset
> mask
) {
223 limit
= mask
- tbl
->it_offset
+ 1;
224 /* If we're constrained on address range, first try
225 * at the masked hint to avoid O(n) search complexity,
226 * but on second pass, start at 0 in pool 0.
228 if ((start
& mask
) >= limit
|| pass
> 0) {
229 spin_unlock(&(pool
->lock
));
230 pool
= &(tbl
->pools
[0]);
231 spin_lock(&(pool
->lock
));
238 n
= iommu_area_alloc(tbl
->it_map
, limit
, start
, npages
, tbl
->it_offset
,
239 dma_get_seg_boundary_nr_pages(dev
, tbl
->it_page_shift
),
242 if (likely(pass
== 0)) {
243 /* First try the pool from the start */
244 pool
->hint
= pool
->start
;
248 } else if (pass
<= tbl
->nr_pools
) {
249 /* Now try scanning all the other pools */
250 spin_unlock(&(pool
->lock
));
251 pool_nr
= (pool_nr
+ 1) & (tbl
->nr_pools
- 1);
252 pool
= &tbl
->pools
[pool_nr
];
253 spin_lock(&(pool
->lock
));
254 pool
->hint
= pool
->start
;
260 spin_unlock_irqrestore(&(pool
->lock
), flags
);
261 return DMA_MAPPING_ERROR
;
267 /* Bump the hint to a new block for small allocs. */
269 /* Don't bump to new block to avoid fragmentation */
272 /* Overflow will be taken care of at the next allocation */
273 pool
->hint
= (end
+ tbl
->it_blocksize
- 1) &
274 ~(tbl
->it_blocksize
- 1);
277 /* Update handle for SG allocations */
281 spin_unlock_irqrestore(&(pool
->lock
), flags
);
286 static dma_addr_t
iommu_alloc(struct device
*dev
, struct iommu_table
*tbl
,
287 void *page
, unsigned int npages
,
288 enum dma_data_direction direction
,
289 unsigned long mask
, unsigned int align_order
,
293 dma_addr_t ret
= DMA_MAPPING_ERROR
;
296 entry
= iommu_range_alloc(dev
, tbl
, npages
, NULL
, mask
, align_order
);
298 if (unlikely(entry
== DMA_MAPPING_ERROR
))
299 return DMA_MAPPING_ERROR
;
301 entry
+= tbl
->it_offset
; /* Offset into real TCE table */
302 ret
= entry
<< tbl
->it_page_shift
; /* Set the return dma address */
304 /* Put the TCEs in the HW table */
305 build_fail
= tbl
->it_ops
->set(tbl
, entry
, npages
,
306 (unsigned long)page
&
307 IOMMU_PAGE_MASK(tbl
), direction
, attrs
);
309 /* tbl->it_ops->set() only returns non-zero for transient errors.
310 * Clean up the table bitmap in this case and return
311 * DMA_MAPPING_ERROR. For all other errors the functionality is
314 if (unlikely(build_fail
)) {
315 __iommu_free(tbl
, ret
, npages
);
316 return DMA_MAPPING_ERROR
;
319 /* Flush/invalidate TLB caches if necessary */
320 if (tbl
->it_ops
->flush
)
321 tbl
->it_ops
->flush(tbl
);
323 /* Make sure updates are seen by hardware */
329 static bool iommu_free_check(struct iommu_table
*tbl
, dma_addr_t dma_addr
,
332 unsigned long entry
, free_entry
;
334 entry
= dma_addr
>> tbl
->it_page_shift
;
335 free_entry
= entry
- tbl
->it_offset
;
337 if (((free_entry
+ npages
) > tbl
->it_size
) ||
338 (entry
< tbl
->it_offset
)) {
339 if (printk_ratelimit()) {
340 printk(KERN_INFO
"iommu_free: invalid entry\n");
341 printk(KERN_INFO
"\tentry = 0x%lx\n", entry
);
342 printk(KERN_INFO
"\tdma_addr = 0x%llx\n", (u64
)dma_addr
);
343 printk(KERN_INFO
"\tTable = 0x%llx\n", (u64
)tbl
);
344 printk(KERN_INFO
"\tbus# = 0x%llx\n", (u64
)tbl
->it_busno
);
345 printk(KERN_INFO
"\tsize = 0x%llx\n", (u64
)tbl
->it_size
);
346 printk(KERN_INFO
"\tstartOff = 0x%llx\n", (u64
)tbl
->it_offset
);
347 printk(KERN_INFO
"\tindex = 0x%llx\n", (u64
)tbl
->it_index
);
357 static struct iommu_pool
*get_pool(struct iommu_table
*tbl
,
360 struct iommu_pool
*p
;
361 unsigned long largepool_start
= tbl
->large_pool
.start
;
363 /* The large pool is the last pool at the top of the table */
364 if (entry
>= largepool_start
) {
365 p
= &tbl
->large_pool
;
367 unsigned int pool_nr
= entry
/ tbl
->poolsize
;
369 BUG_ON(pool_nr
> tbl
->nr_pools
);
370 p
= &tbl
->pools
[pool_nr
];
376 static void __iommu_free(struct iommu_table
*tbl
, dma_addr_t dma_addr
,
379 unsigned long entry
, free_entry
;
381 struct iommu_pool
*pool
;
383 entry
= dma_addr
>> tbl
->it_page_shift
;
384 free_entry
= entry
- tbl
->it_offset
;
386 pool
= get_pool(tbl
, free_entry
);
388 if (!iommu_free_check(tbl
, dma_addr
, npages
))
391 tbl
->it_ops
->clear(tbl
, entry
, npages
);
393 spin_lock_irqsave(&(pool
->lock
), flags
);
394 bitmap_clear(tbl
->it_map
, free_entry
, npages
);
395 spin_unlock_irqrestore(&(pool
->lock
), flags
);
398 static void iommu_free(struct iommu_table
*tbl
, dma_addr_t dma_addr
,
401 __iommu_free(tbl
, dma_addr
, npages
);
403 /* Make sure TLB cache is flushed if the HW needs it. We do
404 * not do an mb() here on purpose, it is not needed on any of
405 * the current platforms.
407 if (tbl
->it_ops
->flush
)
408 tbl
->it_ops
->flush(tbl
);
411 int ppc_iommu_map_sg(struct device
*dev
, struct iommu_table
*tbl
,
412 struct scatterlist
*sglist
, int nelems
,
413 unsigned long mask
, enum dma_data_direction direction
,
416 dma_addr_t dma_next
= 0, dma_addr
;
417 struct scatterlist
*s
, *outs
, *segstart
;
418 int outcount
, incount
, i
, build_fail
= 0;
420 unsigned long handle
;
421 unsigned int max_seg_size
;
423 BUG_ON(direction
== DMA_NONE
);
425 if ((nelems
== 0) || !tbl
)
428 outs
= s
= segstart
= &sglist
[0];
433 /* Init first segment length for backout at failure */
434 outs
->dma_length
= 0;
436 DBG("sg mapping %d elements:\n", nelems
);
438 max_seg_size
= dma_get_max_seg_size(dev
);
439 for_each_sg(sglist
, s
, nelems
, i
) {
440 unsigned long vaddr
, npages
, entry
, slen
;
448 /* Allocate iommu entries for that segment */
449 vaddr
= (unsigned long) sg_virt(s
);
450 npages
= iommu_num_pages(vaddr
, slen
, IOMMU_PAGE_SIZE(tbl
));
452 if (tbl
->it_page_shift
< PAGE_SHIFT
&& slen
>= PAGE_SIZE
&&
453 (vaddr
& ~PAGE_MASK
) == 0)
454 align
= PAGE_SHIFT
- tbl
->it_page_shift
;
455 entry
= iommu_range_alloc(dev
, tbl
, npages
, &handle
,
456 mask
>> tbl
->it_page_shift
, align
);
458 DBG(" - vaddr: %lx, size: %lx\n", vaddr
, slen
);
461 if (unlikely(entry
== DMA_MAPPING_ERROR
)) {
462 if (!(attrs
& DMA_ATTR_NO_WARN
) &&
464 dev_info(dev
, "iommu_alloc failed, tbl %p "
465 "vaddr %lx npages %lu\n", tbl
, vaddr
,
470 /* Convert entry to a dma_addr_t */
471 entry
+= tbl
->it_offset
;
472 dma_addr
= entry
<< tbl
->it_page_shift
;
473 dma_addr
|= (s
->offset
& ~IOMMU_PAGE_MASK(tbl
));
475 DBG(" - %lu pages, entry: %lx, dma_addr: %lx\n",
476 npages
, entry
, dma_addr
);
478 /* Insert into HW table */
479 build_fail
= tbl
->it_ops
->set(tbl
, entry
, npages
,
480 vaddr
& IOMMU_PAGE_MASK(tbl
),
482 if(unlikely(build_fail
))
485 /* If we are in an open segment, try merging */
487 DBG(" - trying merge...\n");
488 /* We cannot merge if:
489 * - allocated dma_addr isn't contiguous to previous allocation
491 if (novmerge
|| (dma_addr
!= dma_next
) ||
492 (outs
->dma_length
+ s
->length
> max_seg_size
)) {
493 /* Can't merge: create a new segment */
496 outs
= sg_next(outs
);
497 DBG(" can't merge, new segment.\n");
499 outs
->dma_length
+= s
->length
;
500 DBG(" merged, new len: %ux\n", outs
->dma_length
);
505 /* This is a new segment, fill entries */
506 DBG(" - filling new segment.\n");
507 outs
->dma_address
= dma_addr
;
508 outs
->dma_length
= slen
;
511 /* Calculate next page pointer for contiguous check */
512 dma_next
= dma_addr
+ slen
;
514 DBG(" - dma next is: %lx\n", dma_next
);
517 /* Flush/invalidate TLB caches if necessary */
518 if (tbl
->it_ops
->flush
)
519 tbl
->it_ops
->flush(tbl
);
521 DBG("mapped %d elements:\n", outcount
);
523 /* For the sake of ppc_iommu_unmap_sg, we clear out the length in the
524 * next entry of the sglist if we didn't fill the list completely
526 if (outcount
< incount
) {
527 outs
= sg_next(outs
);
528 outs
->dma_address
= DMA_MAPPING_ERROR
;
529 outs
->dma_length
= 0;
532 /* Make sure updates are seen by hardware */
538 for_each_sg(sglist
, s
, nelems
, i
) {
539 if (s
->dma_length
!= 0) {
540 unsigned long vaddr
, npages
;
542 vaddr
= s
->dma_address
& IOMMU_PAGE_MASK(tbl
);
543 npages
= iommu_num_pages(s
->dma_address
, s
->dma_length
,
544 IOMMU_PAGE_SIZE(tbl
));
545 __iommu_free(tbl
, vaddr
, npages
);
546 s
->dma_address
= DMA_MAPPING_ERROR
;
556 void ppc_iommu_unmap_sg(struct iommu_table
*tbl
, struct scatterlist
*sglist
,
557 int nelems
, enum dma_data_direction direction
,
560 struct scatterlist
*sg
;
562 BUG_ON(direction
== DMA_NONE
);
570 dma_addr_t dma_handle
= sg
->dma_address
;
572 if (sg
->dma_length
== 0)
574 npages
= iommu_num_pages(dma_handle
, sg
->dma_length
,
575 IOMMU_PAGE_SIZE(tbl
));
576 __iommu_free(tbl
, dma_handle
, npages
);
580 /* Flush/invalidate TLBs if necessary. As for iommu_free(), we
581 * do not do an mb() here, the affected platforms do not need it
584 if (tbl
->it_ops
->flush
)
585 tbl
->it_ops
->flush(tbl
);
588 static void iommu_table_clear(struct iommu_table
*tbl
)
591 * In case of firmware assisted dump system goes through clean
592 * reboot process at the time of system crash. Hence it's safe to
593 * clear the TCE entries if firmware assisted dump is active.
595 if (!is_kdump_kernel() || is_fadump_active()) {
596 /* Clear the table in case firmware left allocations in it */
597 tbl
->it_ops
->clear(tbl
, tbl
->it_offset
, tbl
->it_size
);
601 #ifdef CONFIG_CRASH_DUMP
602 if (tbl
->it_ops
->get
) {
603 unsigned long index
, tceval
, tcecount
= 0;
605 /* Reserve the existing mappings left by the first kernel. */
606 for (index
= 0; index
< tbl
->it_size
; index
++) {
607 tceval
= tbl
->it_ops
->get(tbl
, index
+ tbl
->it_offset
);
609 * Freed TCE entry contains 0x7fffffffffffffff on JS20
611 if (tceval
&& (tceval
!= 0x7fffffffffffffffUL
)) {
612 __set_bit(index
, tbl
->it_map
);
617 if ((tbl
->it_size
- tcecount
) < KDUMP_MIN_TCE_ENTRIES
) {
618 printk(KERN_WARNING
"TCE table is full; freeing ");
619 printk(KERN_WARNING
"%d entries for the kdump boot\n",
620 KDUMP_MIN_TCE_ENTRIES
);
621 for (index
= tbl
->it_size
- KDUMP_MIN_TCE_ENTRIES
;
622 index
< tbl
->it_size
; index
++)
623 __clear_bit(index
, tbl
->it_map
);
629 static void iommu_table_reserve_pages(struct iommu_table
*tbl
,
630 unsigned long res_start
, unsigned long res_end
)
634 WARN_ON_ONCE(res_end
< res_start
);
636 * Reserve page 0 so it will not be used for any mappings.
637 * This avoids buggy drivers that consider page 0 to be invalid
638 * to crash the machine or even lose data.
640 if (tbl
->it_offset
== 0)
641 set_bit(0, tbl
->it_map
);
643 tbl
->it_reserved_start
= res_start
;
644 tbl
->it_reserved_end
= res_end
;
646 /* Check if res_start..res_end isn't empty and overlaps the table */
647 if (res_start
&& res_end
&&
648 (tbl
->it_offset
+ tbl
->it_size
< res_start
||
649 res_end
< tbl
->it_offset
))
652 for (i
= tbl
->it_reserved_start
; i
< tbl
->it_reserved_end
; ++i
)
653 set_bit(i
- tbl
->it_offset
, tbl
->it_map
);
656 static void iommu_table_release_pages(struct iommu_table
*tbl
)
661 * In case we have reserved the first bit, we should not emit
664 if (tbl
->it_offset
== 0)
665 clear_bit(0, tbl
->it_map
);
667 for (i
= tbl
->it_reserved_start
; i
< tbl
->it_reserved_end
; ++i
)
668 clear_bit(i
- tbl
->it_offset
, tbl
->it_map
);
672 * Build a iommu_table structure. This contains a bit map which
673 * is used to manage allocation of the tce space.
675 struct iommu_table
*iommu_init_table(struct iommu_table
*tbl
, int nid
,
676 unsigned long res_start
, unsigned long res_end
)
679 static int welcomed
= 0;
682 struct iommu_pool
*p
;
684 BUG_ON(!tbl
->it_ops
);
686 /* number of bytes needed for the bitmap */
687 sz
= BITS_TO_LONGS(tbl
->it_size
) * sizeof(unsigned long);
689 page
= alloc_pages_node(nid
, GFP_KERNEL
, get_order(sz
));
691 panic("iommu_init_table: Can't allocate %ld bytes\n", sz
);
692 tbl
->it_map
= page_address(page
);
693 memset(tbl
->it_map
, 0, sz
);
695 iommu_table_reserve_pages(tbl
, res_start
, res_end
);
697 /* We only split the IOMMU table if we have 1GB or more of space */
698 if ((tbl
->it_size
<< tbl
->it_page_shift
) >= (1UL * 1024 * 1024 * 1024))
699 tbl
->nr_pools
= IOMMU_NR_POOLS
;
703 /* We reserve the top 1/4 of the table for large allocations */
704 tbl
->poolsize
= (tbl
->it_size
* 3 / 4) / tbl
->nr_pools
;
706 for (i
= 0; i
< tbl
->nr_pools
; i
++) {
708 spin_lock_init(&(p
->lock
));
709 p
->start
= tbl
->poolsize
* i
;
711 p
->end
= p
->start
+ tbl
->poolsize
;
714 p
= &tbl
->large_pool
;
715 spin_lock_init(&(p
->lock
));
716 p
->start
= tbl
->poolsize
* i
;
718 p
->end
= tbl
->it_size
;
720 iommu_table_clear(tbl
);
723 printk(KERN_INFO
"IOMMU table initialized, virtual merging %s\n",
724 novmerge
? "disabled" : "enabled");
731 static void iommu_table_free(struct kref
*kref
)
733 unsigned long bitmap_sz
;
735 struct iommu_table
*tbl
;
737 tbl
= container_of(kref
, struct iommu_table
, it_kref
);
739 if (tbl
->it_ops
->free
)
740 tbl
->it_ops
->free(tbl
);
747 iommu_table_release_pages(tbl
);
749 /* verify that table contains no entries */
750 if (!bitmap_empty(tbl
->it_map
, tbl
->it_size
))
751 pr_warn("%s: Unexpected TCEs\n", __func__
);
753 /* calculate bitmap size in bytes */
754 bitmap_sz
= BITS_TO_LONGS(tbl
->it_size
) * sizeof(unsigned long);
757 order
= get_order(bitmap_sz
);
758 free_pages((unsigned long) tbl
->it_map
, order
);
764 struct iommu_table
*iommu_tce_table_get(struct iommu_table
*tbl
)
766 if (kref_get_unless_zero(&tbl
->it_kref
))
771 EXPORT_SYMBOL_GPL(iommu_tce_table_get
);
773 int iommu_tce_table_put(struct iommu_table
*tbl
)
778 return kref_put(&tbl
->it_kref
, iommu_table_free
);
780 EXPORT_SYMBOL_GPL(iommu_tce_table_put
);
782 /* Creates TCEs for a user provided buffer. The user buffer must be
783 * contiguous real kernel storage (not vmalloc). The address passed here
784 * comprises a page address and offset into that page. The dma_addr_t
785 * returned will point to the same byte within the page as was passed in.
787 dma_addr_t
iommu_map_page(struct device
*dev
, struct iommu_table
*tbl
,
788 struct page
*page
, unsigned long offset
, size_t size
,
789 unsigned long mask
, enum dma_data_direction direction
,
792 dma_addr_t dma_handle
= DMA_MAPPING_ERROR
;
795 unsigned int npages
, align
;
797 BUG_ON(direction
== DMA_NONE
);
799 vaddr
= page_address(page
) + offset
;
800 uaddr
= (unsigned long)vaddr
;
803 npages
= iommu_num_pages(uaddr
, size
, IOMMU_PAGE_SIZE(tbl
));
805 if (tbl
->it_page_shift
< PAGE_SHIFT
&& size
>= PAGE_SIZE
&&
806 ((unsigned long)vaddr
& ~PAGE_MASK
) == 0)
807 align
= PAGE_SHIFT
- tbl
->it_page_shift
;
809 dma_handle
= iommu_alloc(dev
, tbl
, vaddr
, npages
, direction
,
810 mask
>> tbl
->it_page_shift
, align
,
812 if (dma_handle
== DMA_MAPPING_ERROR
) {
813 if (!(attrs
& DMA_ATTR_NO_WARN
) &&
814 printk_ratelimit()) {
815 dev_info(dev
, "iommu_alloc failed, tbl %p "
816 "vaddr %p npages %d\n", tbl
, vaddr
,
820 dma_handle
|= (uaddr
& ~IOMMU_PAGE_MASK(tbl
));
826 void iommu_unmap_page(struct iommu_table
*tbl
, dma_addr_t dma_handle
,
827 size_t size
, enum dma_data_direction direction
,
832 BUG_ON(direction
== DMA_NONE
);
835 npages
= iommu_num_pages(dma_handle
, size
,
836 IOMMU_PAGE_SIZE(tbl
));
837 iommu_free(tbl
, dma_handle
, npages
);
841 /* Allocates a contiguous real buffer and creates mappings over it.
842 * Returns the virtual address of the buffer and sets dma_handle
843 * to the dma address (mapping) of the first page.
845 void *iommu_alloc_coherent(struct device
*dev
, struct iommu_table
*tbl
,
846 size_t size
, dma_addr_t
*dma_handle
,
847 unsigned long mask
, gfp_t flag
, int node
)
852 unsigned int nio_pages
, io_order
;
855 size
= PAGE_ALIGN(size
);
856 order
= get_order(size
);
859 * Client asked for way too much space. This is checked later
860 * anyway. It is easier to debug here for the drivers than in
863 if (order
>= IOMAP_MAX_ORDER
) {
864 dev_info(dev
, "iommu_alloc_consistent size too large: 0x%lx\n",
872 /* Alloc enough pages (and possibly more) */
873 page
= alloc_pages_node(node
, flag
, order
);
876 ret
= page_address(page
);
877 memset(ret
, 0, size
);
879 /* Set up tces to cover the allocated range */
880 nio_pages
= size
>> tbl
->it_page_shift
;
881 io_order
= get_iommu_order(size
, tbl
);
882 mapping
= iommu_alloc(dev
, tbl
, ret
, nio_pages
, DMA_BIDIRECTIONAL
,
883 mask
>> tbl
->it_page_shift
, io_order
, 0);
884 if (mapping
== DMA_MAPPING_ERROR
) {
885 free_pages((unsigned long)ret
, order
);
888 *dma_handle
= mapping
;
892 void iommu_free_coherent(struct iommu_table
*tbl
, size_t size
,
893 void *vaddr
, dma_addr_t dma_handle
)
896 unsigned int nio_pages
;
898 size
= PAGE_ALIGN(size
);
899 nio_pages
= size
>> tbl
->it_page_shift
;
900 iommu_free(tbl
, dma_handle
, nio_pages
);
901 size
= PAGE_ALIGN(size
);
902 free_pages((unsigned long)vaddr
, get_order(size
));
906 unsigned long iommu_direction_to_tce_perm(enum dma_data_direction dir
)
909 case DMA_BIDIRECTIONAL
:
910 return TCE_PCI_READ
| TCE_PCI_WRITE
;
911 case DMA_FROM_DEVICE
:
912 return TCE_PCI_WRITE
;
919 EXPORT_SYMBOL_GPL(iommu_direction_to_tce_perm
);
921 #ifdef CONFIG_IOMMU_API
925 static void group_release(void *iommu_data
)
927 struct iommu_table_group
*table_group
= iommu_data
;
929 table_group
->group
= NULL
;
932 void iommu_register_group(struct iommu_table_group
*table_group
,
933 int pci_domain_number
, unsigned long pe_num
)
935 struct iommu_group
*grp
;
938 grp
= iommu_group_alloc();
940 pr_warn("powerpc iommu api: cannot create new group, err=%ld\n",
944 table_group
->group
= grp
;
945 iommu_group_set_iommudata(grp
, table_group
, group_release
);
946 name
= kasprintf(GFP_KERNEL
, "domain%d-pe%lx",
947 pci_domain_number
, pe_num
);
950 iommu_group_set_name(grp
, name
);
954 enum dma_data_direction
iommu_tce_direction(unsigned long tce
)
956 if ((tce
& TCE_PCI_READ
) && (tce
& TCE_PCI_WRITE
))
957 return DMA_BIDIRECTIONAL
;
958 else if (tce
& TCE_PCI_READ
)
959 return DMA_TO_DEVICE
;
960 else if (tce
& TCE_PCI_WRITE
)
961 return DMA_FROM_DEVICE
;
965 EXPORT_SYMBOL_GPL(iommu_tce_direction
);
967 void iommu_flush_tce(struct iommu_table
*tbl
)
969 /* Flush/invalidate TLB caches if necessary */
970 if (tbl
->it_ops
->flush
)
971 tbl
->it_ops
->flush(tbl
);
973 /* Make sure updates are seen by hardware */
976 EXPORT_SYMBOL_GPL(iommu_flush_tce
);
978 int iommu_tce_check_ioba(unsigned long page_shift
,
979 unsigned long offset
, unsigned long size
,
980 unsigned long ioba
, unsigned long npages
)
982 unsigned long mask
= (1UL << page_shift
) - 1;
991 if ((ioba
+ 1) > (offset
+ size
))
996 EXPORT_SYMBOL_GPL(iommu_tce_check_ioba
);
998 int iommu_tce_check_gpa(unsigned long page_shift
, unsigned long gpa
)
1000 unsigned long mask
= (1UL << page_shift
) - 1;
1007 EXPORT_SYMBOL_GPL(iommu_tce_check_gpa
);
1009 extern long iommu_tce_xchg_no_kill(struct mm_struct
*mm
,
1010 struct iommu_table
*tbl
,
1011 unsigned long entry
, unsigned long *hpa
,
1012 enum dma_data_direction
*direction
)
1015 unsigned long size
= 0;
1017 ret
= tbl
->it_ops
->xchg_no_kill(tbl
, entry
, hpa
, direction
, false);
1018 if (!ret
&& ((*direction
== DMA_FROM_DEVICE
) ||
1019 (*direction
== DMA_BIDIRECTIONAL
)) &&
1020 !mm_iommu_is_devmem(mm
, *hpa
, tbl
->it_page_shift
,
1022 SetPageDirty(pfn_to_page(*hpa
>> PAGE_SHIFT
));
1026 EXPORT_SYMBOL_GPL(iommu_tce_xchg_no_kill
);
1028 void iommu_tce_kill(struct iommu_table
*tbl
,
1029 unsigned long entry
, unsigned long pages
)
1031 if (tbl
->it_ops
->tce_kill
)
1032 tbl
->it_ops
->tce_kill(tbl
, entry
, pages
, false);
1034 EXPORT_SYMBOL_GPL(iommu_tce_kill
);
1036 int iommu_take_ownership(struct iommu_table
*tbl
)
1038 unsigned long flags
, i
, sz
= (tbl
->it_size
+ 7) >> 3;
1042 * VFIO does not control TCE entries allocation and the guest
1043 * can write new TCEs on top of existing ones so iommu_tce_build()
1044 * must be able to release old pages. This functionality
1045 * requires exchange() callback defined so if it is not
1046 * implemented, we disallow taking ownership over the table.
1048 if (!tbl
->it_ops
->xchg_no_kill
)
1051 spin_lock_irqsave(&tbl
->large_pool
.lock
, flags
);
1052 for (i
= 0; i
< tbl
->nr_pools
; i
++)
1053 spin_lock(&tbl
->pools
[i
].lock
);
1055 iommu_table_release_pages(tbl
);
1057 if (!bitmap_empty(tbl
->it_map
, tbl
->it_size
)) {
1058 pr_err("iommu_tce: it_map is not empty");
1060 /* Undo iommu_table_release_pages, i.e. restore bit#0, etc */
1061 iommu_table_reserve_pages(tbl
, tbl
->it_reserved_start
,
1062 tbl
->it_reserved_end
);
1064 memset(tbl
->it_map
, 0xff, sz
);
1067 for (i
= 0; i
< tbl
->nr_pools
; i
++)
1068 spin_unlock(&tbl
->pools
[i
].lock
);
1069 spin_unlock_irqrestore(&tbl
->large_pool
.lock
, flags
);
1073 EXPORT_SYMBOL_GPL(iommu_take_ownership
);
1075 void iommu_release_ownership(struct iommu_table
*tbl
)
1077 unsigned long flags
, i
, sz
= (tbl
->it_size
+ 7) >> 3;
1079 spin_lock_irqsave(&tbl
->large_pool
.lock
, flags
);
1080 for (i
= 0; i
< tbl
->nr_pools
; i
++)
1081 spin_lock(&tbl
->pools
[i
].lock
);
1083 memset(tbl
->it_map
, 0, sz
);
1085 iommu_table_reserve_pages(tbl
, tbl
->it_reserved_start
,
1086 tbl
->it_reserved_end
);
1088 for (i
= 0; i
< tbl
->nr_pools
; i
++)
1089 spin_unlock(&tbl
->pools
[i
].lock
);
1090 spin_unlock_irqrestore(&tbl
->large_pool
.lock
, flags
);
1092 EXPORT_SYMBOL_GPL(iommu_release_ownership
);
1094 int iommu_add_device(struct iommu_table_group
*table_group
, struct device
*dev
)
1097 * The sysfs entries should be populated before
1098 * binding IOMMU group. If sysfs entries isn't
1099 * ready, we simply bail.
1101 if (!device_is_registered(dev
))
1104 if (device_iommu_mapped(dev
)) {
1105 pr_debug("%s: Skipping device %s with iommu group %d\n",
1106 __func__
, dev_name(dev
),
1107 iommu_group_id(dev
->iommu_group
));
1111 pr_debug("%s: Adding %s to iommu group %d\n",
1112 __func__
, dev_name(dev
), iommu_group_id(table_group
->group
));
1114 return iommu_group_add_device(table_group
->group
, dev
);
1116 EXPORT_SYMBOL_GPL(iommu_add_device
);
1118 void iommu_del_device(struct device
*dev
)
1121 * Some devices might not have IOMMU table and group
1122 * and we needn't detach them from the associated
1125 if (!device_iommu_mapped(dev
)) {
1126 pr_debug("iommu_tce: skipping device %s with no tbl\n",
1131 iommu_group_remove_device(dev
);
1133 EXPORT_SYMBOL_GPL(iommu_del_device
);
1134 #endif /* CONFIG_IOMMU_API */