Linux Audio

Check our new training course

Loading...
v4.17
  1// SPDX-License-Identifier: GPL-2.0
 
  2#include <linux/dma-direct.h>
  3#include <linux/dma-debug.h>
  4#include <linux/dmar.h>
  5#include <linux/export.h>
  6#include <linux/bootmem.h>
  7#include <linux/gfp.h>
  8#include <linux/pci.h>
 
  9
 10#include <asm/proto.h>
 11#include <asm/dma.h>
 12#include <asm/iommu.h>
 13#include <asm/gart.h>
 14#include <asm/calgary.h>
 15#include <asm/x86_init.h>
 16#include <asm/iommu_table.h>
 17
 18static int forbid_dac __read_mostly;
 
 19
 20const struct dma_map_ops *dma_ops = &dma_direct_ops;
 21EXPORT_SYMBOL(dma_ops);
 22
 23static int iommu_sac_force __read_mostly;
 
 24
 25#ifdef CONFIG_IOMMU_DEBUG
 26int panic_on_overflow __read_mostly = 1;
 27int force_iommu __read_mostly = 1;
 28#else
 29int panic_on_overflow __read_mostly = 0;
 30int force_iommu __read_mostly = 0;
 31#endif
 32
 33int iommu_merge __read_mostly = 0;
 34
 35int no_iommu __read_mostly;
 36/* Set this to 1 if there is a HW IOMMU in the system */
 37int iommu_detected __read_mostly = 0;
 38
 39/*
 40 * This variable becomes 1 if iommu=pt is passed on the kernel command line.
 41 * If this variable is 1, IOMMU implementations do no DMA translation for
 42 * devices and allow every device to access to whole physical memory. This is
 43 * useful if a user wants to use an IOMMU only for KVM device assignment to
 44 * guests and not for driver dma translation.
 45 */
 46int iommu_pass_through __read_mostly;
 47
 48extern struct iommu_table_entry __iommu_table[], __iommu_table_end[];
 49
 50/* Dummy device used for NULL arguments (normally ISA). */
 51struct device x86_dma_fallback_dev = {
 52	.init_name = "fallback device",
 53	.coherent_dma_mask = ISA_DMA_BIT_MASK,
 54	.dma_mask = &x86_dma_fallback_dev.coherent_dma_mask,
 55};
 56EXPORT_SYMBOL(x86_dma_fallback_dev);
 57
 58/* Number of entries preallocated for DMA-API debugging */
 59#define PREALLOC_DMA_DEBUG_ENTRIES       65536
 60
 61void __init pci_iommu_alloc(void)
 62{
 63	struct iommu_table_entry *p;
 64
 65	sort_iommu_table(__iommu_table, __iommu_table_end);
 66	check_iommu_entries(__iommu_table, __iommu_table_end);
 67
 68	for (p = __iommu_table; p < __iommu_table_end; p++) {
 69		if (p && p->detect && p->detect() > 0) {
 70			p->flags |= IOMMU_DETECTED;
 71			if (p->early_init)
 72				p->early_init();
 73			if (p->flags & IOMMU_FINISH_IF_DETECTED)
 74				break;
 75		}
 
 
 
 
 
 
 76	}
 77}
 
 
 
 
 
 
 78
 79bool arch_dma_alloc_attrs(struct device **dev, gfp_t *gfp)
 
 80{
 81	if (!*dev)
 82		*dev = &x86_dma_fallback_dev;
 
 83
 84	if (!is_device_dma_capable(*dev))
 85		return false;
 86	return true;
 
 
 
 
 
 
 
 
 
 
 
 
 
 87
 
 
 
 
 
 
 
 
 
 
 
 88}
 89EXPORT_SYMBOL(arch_dma_alloc_attrs);
 90
 91/*
 92 * See <Documentation/x86/x86_64/boot-options.txt> for the iommu kernel
 93 * parameter documentation.
 94 */
 95static __init int iommu_setup(char *p)
 96{
 97	iommu_merge = 1;
 98
 99	if (!p)
100		return -EINVAL;
101
102	while (*p) {
103		if (!strncmp(p, "off", 3))
104			no_iommu = 1;
105		/* gart_parse_options has more force support */
106		if (!strncmp(p, "force", 5))
107			force_iommu = 1;
108		if (!strncmp(p, "noforce", 7)) {
109			iommu_merge = 0;
110			force_iommu = 0;
111		}
112
113		if (!strncmp(p, "biomerge", 8)) {
114			iommu_merge = 1;
115			force_iommu = 1;
116		}
117		if (!strncmp(p, "panic", 5))
118			panic_on_overflow = 1;
119		if (!strncmp(p, "nopanic", 7))
120			panic_on_overflow = 0;
121		if (!strncmp(p, "merge", 5)) {
122			iommu_merge = 1;
123			force_iommu = 1;
124		}
125		if (!strncmp(p, "nomerge", 7))
126			iommu_merge = 0;
127		if (!strncmp(p, "forcesac", 8))
128			iommu_sac_force = 1;
129		if (!strncmp(p, "allowdac", 8))
130			forbid_dac = 0;
131		if (!strncmp(p, "nodac", 5))
132			forbid_dac = 1;
133		if (!strncmp(p, "usedac", 6)) {
134			forbid_dac = -1;
135			return 1;
136		}
137#ifdef CONFIG_SWIOTLB
138		if (!strncmp(p, "soft", 4))
139			swiotlb = 1;
140#endif
141		if (!strncmp(p, "pt", 2))
142			iommu_pass_through = 1;
 
 
143
144		gart_parse_options(p);
145
146#ifdef CONFIG_CALGARY_IOMMU
147		if (!strncmp(p, "calgary", 7))
148			use_calgary = 1;
149#endif /* CONFIG_CALGARY_IOMMU */
150
151		p += strcspn(p, ",");
152		if (*p == ',')
153			++p;
154	}
155	return 0;
156}
157early_param("iommu", iommu_setup);
158
159int arch_dma_supported(struct device *dev, u64 mask)
160{
161#ifdef CONFIG_PCI
162	if (mask > 0xffffffff && forbid_dac > 0) {
163		dev_info(dev, "PCI: Disallowing DAC for device\n");
164		return 0;
165	}
166#endif
167
168	/* Tell the device to use SAC when IOMMU force is on.  This
169	   allows the driver to use cheaper accesses in some cases.
170
171	   Problem with this is that if we overflow the IOMMU area and
172	   return DAC as fallback address the device may not handle it
173	   correctly.
174
175	   As a special case some controllers have a 39bit address
176	   mode that is as efficient as 32bit (aic79xx). Don't force
177	   SAC for these.  Assume all masks <= 40 bits are of this
178	   type. Normally this doesn't make any difference, but gives
179	   more gentle handling of IOMMU overflow. */
180	if (iommu_sac_force && (mask >= DMA_BIT_MASK(40))) {
181		dev_info(dev, "Force SAC with mask %Lx\n", mask);
182		return 0;
183	}
184
185	return 1;
186}
187EXPORT_SYMBOL(arch_dma_supported);
188
189static int __init pci_iommu_init(void)
190{
191	struct iommu_table_entry *p;
192	dma_debug_init(PREALLOC_DMA_DEBUG_ENTRIES);
193
194#ifdef CONFIG_PCI
195	dma_debug_add_bus(&pci_bus_type);
196#endif
197	x86_init.iommu.iommu_init();
198
199	for (p = __iommu_table; p < __iommu_table_end; p++) {
200		if (p && (p->flags & IOMMU_DETECTED) && p->late_init)
201			p->late_init();
 
 
 
 
202	}
 
203
204	return 0;
205}
206/* Must execute after PCI subsystem */
207rootfs_initcall(pci_iommu_init);
208
209#ifdef CONFIG_PCI
210/* Many VIA bridges seem to corrupt data for DAC. Disable it here */
211
 
 
 
 
 
 
212static void via_no_dac(struct pci_dev *dev)
213{
214	if (forbid_dac == 0) {
215		dev_info(&dev->dev, "disabling DAC on VIA PCI bridge\n");
216		forbid_dac = 1;
217	}
218}
219DECLARE_PCI_FIXUP_CLASS_FINAL(PCI_VENDOR_ID_VIA, PCI_ANY_ID,
220				PCI_CLASS_BRIDGE_PCI, 8, via_no_dac);
221#endif
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0
  2#include <linux/dma-map-ops.h>
  3#include <linux/dma-direct.h>
  4#include <linux/iommu.h>
  5#include <linux/dmar.h>
  6#include <linux/export.h>
  7#include <linux/memblock.h>
  8#include <linux/gfp.h>
  9#include <linux/pci.h>
 10#include <linux/amd-iommu.h>
 11
 12#include <asm/proto.h>
 13#include <asm/dma.h>
 14#include <asm/iommu.h>
 15#include <asm/gart.h>
 
 16#include <asm/x86_init.h>
 
 17
 18#include <xen/xen.h>
 19#include <xen/swiotlb-xen.h>
 20
 21static bool disable_dac_quirk __read_mostly;
 
 22
 23const struct dma_map_ops *dma_ops;
 24EXPORT_SYMBOL(dma_ops);
 25
 26#ifdef CONFIG_IOMMU_DEBUG
 27int panic_on_overflow __read_mostly = 1;
 28int force_iommu __read_mostly = 1;
 29#else
 30int panic_on_overflow __read_mostly = 0;
 31int force_iommu __read_mostly = 0;
 32#endif
 33
 34int iommu_merge __read_mostly = 0;
 35
 36int no_iommu __read_mostly;
 37/* Set this to 1 if there is a HW IOMMU in the system */
 38int iommu_detected __read_mostly = 0;
 39
 40#ifdef CONFIG_SWIOTLB
 41bool x86_swiotlb_enable;
 42static unsigned int x86_swiotlb_flags;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 43
 44static void __init pci_swiotlb_detect(void)
 45{
 46	/* don't initialize swiotlb if iommu=off (no_iommu=1) */
 47	if (!no_iommu && max_possible_pfn > MAX_DMA32_PFN)
 48		x86_swiotlb_enable = true;
 49
 50	/*
 51	 * Set swiotlb to 1 so that bounce buffers are allocated and used for
 52	 * devices that can't support DMA to encrypted memory.
 53	 */
 54	if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
 55		x86_swiotlb_enable = true;
 56
 57	/*
 58	 * Guest with guest memory encryption currently perform all DMA through
 59	 * bounce buffers as the hypervisor can't access arbitrary VM memory
 60	 * that is not explicitly shared with it.
 61	 */
 62	if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT)) {
 63		x86_swiotlb_enable = true;
 64		x86_swiotlb_flags |= SWIOTLB_FORCE;
 65	}
 66}
 67#else
 68static inline void __init pci_swiotlb_detect(void)
 69{
 70}
 71#define x86_swiotlb_flags 0
 72#endif /* CONFIG_SWIOTLB */
 73
 74#ifdef CONFIG_SWIOTLB_XEN
 75static bool xen_swiotlb_enabled(void)
 76{
 77	return xen_initial_domain() || x86_swiotlb_enable ||
 78		(IS_ENABLED(CONFIG_XEN_PCIDEV_FRONTEND) && xen_pv_pci_possible);
 79}
 80
 81static void __init pci_xen_swiotlb_init(void)
 82{
 83	if (!xen_swiotlb_enabled())
 84		return;
 85	x86_swiotlb_enable = true;
 86	x86_swiotlb_flags |= SWIOTLB_ANY;
 87	swiotlb_init_remap(true, x86_swiotlb_flags, xen_swiotlb_fixup);
 88	dma_ops = &xen_swiotlb_dma_ops;
 89	if (IS_ENABLED(CONFIG_PCI))
 90		pci_request_acs();
 91}
 92#else
 93static inline void __init pci_xen_swiotlb_init(void)
 94{
 95}
 96#endif /* CONFIG_SWIOTLB_XEN */
 97
 98void __init pci_iommu_alloc(void)
 99{
100	if (xen_pv_domain()) {
101		pci_xen_swiotlb_init();
102		return;
103	}
104	pci_swiotlb_detect();
105	gart_iommu_hole_init();
106	amd_iommu_detect();
107	detect_intel_iommu();
108	swiotlb_init(x86_swiotlb_enable, x86_swiotlb_flags);
109}
 
110
111/*
112 * See <Documentation/arch/x86/x86_64/boot-options.rst> for the iommu kernel
113 * parameter documentation.
114 */
115static __init int iommu_setup(char *p)
116{
117	iommu_merge = 1;
118
119	if (!p)
120		return -EINVAL;
121
122	while (*p) {
123		if (!strncmp(p, "off", 3))
124			no_iommu = 1;
125		/* gart_parse_options has more force support */
126		if (!strncmp(p, "force", 5))
127			force_iommu = 1;
128		if (!strncmp(p, "noforce", 7)) {
129			iommu_merge = 0;
130			force_iommu = 0;
131		}
132
133		if (!strncmp(p, "biomerge", 8)) {
134			iommu_merge = 1;
135			force_iommu = 1;
136		}
137		if (!strncmp(p, "panic", 5))
138			panic_on_overflow = 1;
139		if (!strncmp(p, "nopanic", 7))
140			panic_on_overflow = 0;
141		if (!strncmp(p, "merge", 5)) {
142			iommu_merge = 1;
143			force_iommu = 1;
144		}
145		if (!strncmp(p, "nomerge", 7))
146			iommu_merge = 0;
147		if (!strncmp(p, "forcesac", 8))
148			pr_warn("forcesac option ignored.\n");
149		if (!strncmp(p, "allowdac", 8))
150			pr_warn("allowdac option ignored.\n");
151		if (!strncmp(p, "nodac", 5))
152			pr_warn("nodac option ignored.\n");
153		if (!strncmp(p, "usedac", 6)) {
154			disable_dac_quirk = true;
155			return 1;
156		}
157#ifdef CONFIG_SWIOTLB
158		if (!strncmp(p, "soft", 4))
159			x86_swiotlb_enable = true;
160#endif
161		if (!strncmp(p, "pt", 2))
162			iommu_set_default_passthrough(true);
163		if (!strncmp(p, "nopt", 4))
164			iommu_set_default_translated(true);
165
166		gart_parse_options(p);
167
 
 
 
 
 
168		p += strcspn(p, ",");
169		if (*p == ',')
170			++p;
171	}
172	return 0;
173}
174early_param("iommu", iommu_setup);
175
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
176static int __init pci_iommu_init(void)
177{
 
 
 
 
 
 
178	x86_init.iommu.iommu_init();
179
180#ifdef CONFIG_SWIOTLB
181	/* An IOMMU turned us off. */
182	if (x86_swiotlb_enable) {
183		pr_info("PCI-DMA: Using software bounce buffering for IO (SWIOTLB)\n");
184		swiotlb_print_info();
185	} else {
186		swiotlb_exit();
187	}
188#endif
189
190	return 0;
191}
192/* Must execute after PCI subsystem */
193rootfs_initcall(pci_iommu_init);
194
195#ifdef CONFIG_PCI
196/* Many VIA bridges seem to corrupt data for DAC. Disable it here */
197
198static int via_no_dac_cb(struct pci_dev *pdev, void *data)
199{
200	pdev->dev.bus_dma_limit = DMA_BIT_MASK(32);
201	return 0;
202}
203
204static void via_no_dac(struct pci_dev *dev)
205{
206	if (!disable_dac_quirk) {
207		dev_info(&dev->dev, "disabling DAC on VIA PCI bridge\n");
208		pci_walk_bus(dev->subordinate, via_no_dac_cb, NULL);
209	}
210}
211DECLARE_PCI_FIXUP_CLASS_FINAL(PCI_VENDOR_ID_VIA, PCI_ANY_ID,
212				PCI_CLASS_BRIDGE_PCI, 8, via_no_dac);
213#endif