Loading...
1// SPDX-License-Identifier: GPL-2.0
2#include <linux/dma-direct.h>
3#include <linux/dma-debug.h>
4#include <linux/dmar.h>
5#include <linux/export.h>
6#include <linux/bootmem.h>
7#include <linux/gfp.h>
8#include <linux/pci.h>
9
10#include <asm/proto.h>
11#include <asm/dma.h>
12#include <asm/iommu.h>
13#include <asm/gart.h>
14#include <asm/calgary.h>
15#include <asm/x86_init.h>
16#include <asm/iommu_table.h>
17
18static int forbid_dac __read_mostly;
19
20const struct dma_map_ops *dma_ops = &dma_direct_ops;
21EXPORT_SYMBOL(dma_ops);
22
23static int iommu_sac_force __read_mostly;
24
25#ifdef CONFIG_IOMMU_DEBUG
26int panic_on_overflow __read_mostly = 1;
27int force_iommu __read_mostly = 1;
28#else
29int panic_on_overflow __read_mostly = 0;
30int force_iommu __read_mostly = 0;
31#endif
32
33int iommu_merge __read_mostly = 0;
34
35int no_iommu __read_mostly;
36/* Set this to 1 if there is a HW IOMMU in the system */
37int iommu_detected __read_mostly = 0;
38
39/*
40 * This variable becomes 1 if iommu=pt is passed on the kernel command line.
41 * If this variable is 1, IOMMU implementations do no DMA translation for
42 * devices and allow every device to access to whole physical memory. This is
43 * useful if a user wants to use an IOMMU only for KVM device assignment to
44 * guests and not for driver dma translation.
45 */
46int iommu_pass_through __read_mostly;
47
48extern struct iommu_table_entry __iommu_table[], __iommu_table_end[];
49
50/* Dummy device used for NULL arguments (normally ISA). */
51struct device x86_dma_fallback_dev = {
52 .init_name = "fallback device",
53 .coherent_dma_mask = ISA_DMA_BIT_MASK,
54 .dma_mask = &x86_dma_fallback_dev.coherent_dma_mask,
55};
56EXPORT_SYMBOL(x86_dma_fallback_dev);
57
58/* Number of entries preallocated for DMA-API debugging */
59#define PREALLOC_DMA_DEBUG_ENTRIES 65536
60
61void __init pci_iommu_alloc(void)
62{
63 struct iommu_table_entry *p;
64
65 sort_iommu_table(__iommu_table, __iommu_table_end);
66 check_iommu_entries(__iommu_table, __iommu_table_end);
67
68 for (p = __iommu_table; p < __iommu_table_end; p++) {
69 if (p && p->detect && p->detect() > 0) {
70 p->flags |= IOMMU_DETECTED;
71 if (p->early_init)
72 p->early_init();
73 if (p->flags & IOMMU_FINISH_IF_DETECTED)
74 break;
75 }
76 }
77}
78
79bool arch_dma_alloc_attrs(struct device **dev, gfp_t *gfp)
80{
81 if (!*dev)
82 *dev = &x86_dma_fallback_dev;
83
84 if (!is_device_dma_capable(*dev))
85 return false;
86 return true;
87
88}
89EXPORT_SYMBOL(arch_dma_alloc_attrs);
90
91/*
92 * See <Documentation/x86/x86_64/boot-options.txt> for the iommu kernel
93 * parameter documentation.
94 */
95static __init int iommu_setup(char *p)
96{
97 iommu_merge = 1;
98
99 if (!p)
100 return -EINVAL;
101
102 while (*p) {
103 if (!strncmp(p, "off", 3))
104 no_iommu = 1;
105 /* gart_parse_options has more force support */
106 if (!strncmp(p, "force", 5))
107 force_iommu = 1;
108 if (!strncmp(p, "noforce", 7)) {
109 iommu_merge = 0;
110 force_iommu = 0;
111 }
112
113 if (!strncmp(p, "biomerge", 8)) {
114 iommu_merge = 1;
115 force_iommu = 1;
116 }
117 if (!strncmp(p, "panic", 5))
118 panic_on_overflow = 1;
119 if (!strncmp(p, "nopanic", 7))
120 panic_on_overflow = 0;
121 if (!strncmp(p, "merge", 5)) {
122 iommu_merge = 1;
123 force_iommu = 1;
124 }
125 if (!strncmp(p, "nomerge", 7))
126 iommu_merge = 0;
127 if (!strncmp(p, "forcesac", 8))
128 iommu_sac_force = 1;
129 if (!strncmp(p, "allowdac", 8))
130 forbid_dac = 0;
131 if (!strncmp(p, "nodac", 5))
132 forbid_dac = 1;
133 if (!strncmp(p, "usedac", 6)) {
134 forbid_dac = -1;
135 return 1;
136 }
137#ifdef CONFIG_SWIOTLB
138 if (!strncmp(p, "soft", 4))
139 swiotlb = 1;
140#endif
141 if (!strncmp(p, "pt", 2))
142 iommu_pass_through = 1;
143
144 gart_parse_options(p);
145
146#ifdef CONFIG_CALGARY_IOMMU
147 if (!strncmp(p, "calgary", 7))
148 use_calgary = 1;
149#endif /* CONFIG_CALGARY_IOMMU */
150
151 p += strcspn(p, ",");
152 if (*p == ',')
153 ++p;
154 }
155 return 0;
156}
157early_param("iommu", iommu_setup);
158
159int arch_dma_supported(struct device *dev, u64 mask)
160{
161#ifdef CONFIG_PCI
162 if (mask > 0xffffffff && forbid_dac > 0) {
163 dev_info(dev, "PCI: Disallowing DAC for device\n");
164 return 0;
165 }
166#endif
167
168 /* Tell the device to use SAC when IOMMU force is on. This
169 allows the driver to use cheaper accesses in some cases.
170
171 Problem with this is that if we overflow the IOMMU area and
172 return DAC as fallback address the device may not handle it
173 correctly.
174
175 As a special case some controllers have a 39bit address
176 mode that is as efficient as 32bit (aic79xx). Don't force
177 SAC for these. Assume all masks <= 40 bits are of this
178 type. Normally this doesn't make any difference, but gives
179 more gentle handling of IOMMU overflow. */
180 if (iommu_sac_force && (mask >= DMA_BIT_MASK(40))) {
181 dev_info(dev, "Force SAC with mask %Lx\n", mask);
182 return 0;
183 }
184
185 return 1;
186}
187EXPORT_SYMBOL(arch_dma_supported);
188
189static int __init pci_iommu_init(void)
190{
191 struct iommu_table_entry *p;
192 dma_debug_init(PREALLOC_DMA_DEBUG_ENTRIES);
193
194#ifdef CONFIG_PCI
195 dma_debug_add_bus(&pci_bus_type);
196#endif
197 x86_init.iommu.iommu_init();
198
199 for (p = __iommu_table; p < __iommu_table_end; p++) {
200 if (p && (p->flags & IOMMU_DETECTED) && p->late_init)
201 p->late_init();
202 }
203
204 return 0;
205}
206/* Must execute after PCI subsystem */
207rootfs_initcall(pci_iommu_init);
208
209#ifdef CONFIG_PCI
210/* Many VIA bridges seem to corrupt data for DAC. Disable it here */
211
212static void via_no_dac(struct pci_dev *dev)
213{
214 if (forbid_dac == 0) {
215 dev_info(&dev->dev, "disabling DAC on VIA PCI bridge\n");
216 forbid_dac = 1;
217 }
218}
219DECLARE_PCI_FIXUP_CLASS_FINAL(PCI_VENDOR_ID_VIA, PCI_ANY_ID,
220 PCI_CLASS_BRIDGE_PCI, 8, via_no_dac);
221#endif
1// SPDX-License-Identifier: GPL-2.0
2#include <linux/dma-map-ops.h>
3#include <linux/dma-direct.h>
4#include <linux/iommu.h>
5#include <linux/dmar.h>
6#include <linux/export.h>
7#include <linux/memblock.h>
8#include <linux/gfp.h>
9#include <linux/pci.h>
10#include <linux/amd-iommu.h>
11
12#include <asm/proto.h>
13#include <asm/dma.h>
14#include <asm/iommu.h>
15#include <asm/gart.h>
16#include <asm/x86_init.h>
17
18#include <xen/xen.h>
19#include <xen/swiotlb-xen.h>
20
21static bool disable_dac_quirk __read_mostly;
22
23const struct dma_map_ops *dma_ops;
24EXPORT_SYMBOL(dma_ops);
25
26#ifdef CONFIG_IOMMU_DEBUG
27int panic_on_overflow __read_mostly = 1;
28int force_iommu __read_mostly = 1;
29#else
30int panic_on_overflow __read_mostly = 0;
31int force_iommu __read_mostly = 0;
32#endif
33
34int iommu_merge __read_mostly = 0;
35
36int no_iommu __read_mostly;
37/* Set this to 1 if there is a HW IOMMU in the system */
38int iommu_detected __read_mostly = 0;
39
40#ifdef CONFIG_SWIOTLB
41bool x86_swiotlb_enable;
42static unsigned int x86_swiotlb_flags;
43
44static void __init pci_swiotlb_detect(void)
45{
46 /* don't initialize swiotlb if iommu=off (no_iommu=1) */
47 if (!no_iommu && max_possible_pfn > MAX_DMA32_PFN)
48 x86_swiotlb_enable = true;
49
50 /*
51 * Set swiotlb to 1 so that bounce buffers are allocated and used for
52 * devices that can't support DMA to encrypted memory.
53 */
54 if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
55 x86_swiotlb_enable = true;
56
57 /*
58 * Guest with guest memory encryption currently perform all DMA through
59 * bounce buffers as the hypervisor can't access arbitrary VM memory
60 * that is not explicitly shared with it.
61 */
62 if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT)) {
63 x86_swiotlb_enable = true;
64 x86_swiotlb_flags |= SWIOTLB_FORCE;
65 }
66}
67#else
68static inline void __init pci_swiotlb_detect(void)
69{
70}
71#define x86_swiotlb_flags 0
72#endif /* CONFIG_SWIOTLB */
73
74#ifdef CONFIG_SWIOTLB_XEN
75static void __init pci_xen_swiotlb_init(void)
76{
77 if (!xen_initial_domain() && !x86_swiotlb_enable)
78 return;
79 x86_swiotlb_enable = true;
80 x86_swiotlb_flags |= SWIOTLB_ANY;
81 swiotlb_init_remap(true, x86_swiotlb_flags, xen_swiotlb_fixup);
82 dma_ops = &xen_swiotlb_dma_ops;
83 if (IS_ENABLED(CONFIG_PCI))
84 pci_request_acs();
85}
86
87int pci_xen_swiotlb_init_late(void)
88{
89 if (dma_ops == &xen_swiotlb_dma_ops)
90 return 0;
91
92 /* we can work with the default swiotlb */
93 if (!io_tlb_default_mem.nslabs) {
94 int rc = swiotlb_init_late(swiotlb_size_or_default(),
95 GFP_KERNEL, xen_swiotlb_fixup);
96 if (rc < 0)
97 return rc;
98 }
99
100 /* XXX: this switches the dma ops under live devices! */
101 dma_ops = &xen_swiotlb_dma_ops;
102 if (IS_ENABLED(CONFIG_PCI))
103 pci_request_acs();
104 return 0;
105}
106EXPORT_SYMBOL_GPL(pci_xen_swiotlb_init_late);
107#else
108static inline void __init pci_xen_swiotlb_init(void)
109{
110}
111#endif /* CONFIG_SWIOTLB_XEN */
112
113void __init pci_iommu_alloc(void)
114{
115 if (xen_pv_domain()) {
116 pci_xen_swiotlb_init();
117 return;
118 }
119 pci_swiotlb_detect();
120 gart_iommu_hole_init();
121 amd_iommu_detect();
122 detect_intel_iommu();
123 swiotlb_init(x86_swiotlb_enable, x86_swiotlb_flags);
124}
125
126/*
127 * See <Documentation/x86/x86_64/boot-options.rst> for the iommu kernel
128 * parameter documentation.
129 */
130static __init int iommu_setup(char *p)
131{
132 iommu_merge = 1;
133
134 if (!p)
135 return -EINVAL;
136
137 while (*p) {
138 if (!strncmp(p, "off", 3))
139 no_iommu = 1;
140 /* gart_parse_options has more force support */
141 if (!strncmp(p, "force", 5))
142 force_iommu = 1;
143 if (!strncmp(p, "noforce", 7)) {
144 iommu_merge = 0;
145 force_iommu = 0;
146 }
147
148 if (!strncmp(p, "biomerge", 8)) {
149 iommu_merge = 1;
150 force_iommu = 1;
151 }
152 if (!strncmp(p, "panic", 5))
153 panic_on_overflow = 1;
154 if (!strncmp(p, "nopanic", 7))
155 panic_on_overflow = 0;
156 if (!strncmp(p, "merge", 5)) {
157 iommu_merge = 1;
158 force_iommu = 1;
159 }
160 if (!strncmp(p, "nomerge", 7))
161 iommu_merge = 0;
162 if (!strncmp(p, "forcesac", 8))
163 pr_warn("forcesac option ignored.\n");
164 if (!strncmp(p, "allowdac", 8))
165 pr_warn("allowdac option ignored.\n");
166 if (!strncmp(p, "nodac", 5))
167 pr_warn("nodac option ignored.\n");
168 if (!strncmp(p, "usedac", 6)) {
169 disable_dac_quirk = true;
170 return 1;
171 }
172#ifdef CONFIG_SWIOTLB
173 if (!strncmp(p, "soft", 4))
174 x86_swiotlb_enable = true;
175#endif
176 if (!strncmp(p, "pt", 2))
177 iommu_set_default_passthrough(true);
178 if (!strncmp(p, "nopt", 4))
179 iommu_set_default_translated(true);
180
181 gart_parse_options(p);
182
183 p += strcspn(p, ",");
184 if (*p == ',')
185 ++p;
186 }
187 return 0;
188}
189early_param("iommu", iommu_setup);
190
191static int __init pci_iommu_init(void)
192{
193 x86_init.iommu.iommu_init();
194
195#ifdef CONFIG_SWIOTLB
196 /* An IOMMU turned us off. */
197 if (x86_swiotlb_enable) {
198 pr_info("PCI-DMA: Using software bounce buffering for IO (SWIOTLB)\n");
199 swiotlb_print_info();
200 } else {
201 swiotlb_exit();
202 }
203#endif
204
205 return 0;
206}
207/* Must execute after PCI subsystem */
208rootfs_initcall(pci_iommu_init);
209
210#ifdef CONFIG_PCI
211/* Many VIA bridges seem to corrupt data for DAC. Disable it here */
212
213static int via_no_dac_cb(struct pci_dev *pdev, void *data)
214{
215 pdev->dev.bus_dma_limit = DMA_BIT_MASK(32);
216 return 0;
217}
218
219static void via_no_dac(struct pci_dev *dev)
220{
221 if (!disable_dac_quirk) {
222 dev_info(&dev->dev, "disabling DAC on VIA PCI bridge\n");
223 pci_walk_bus(dev->subordinate, via_no_dac_cb, NULL);
224 }
225}
226DECLARE_PCI_FIXUP_CLASS_FINAL(PCI_VENDOR_ID_VIA, PCI_ANY_ID,
227 PCI_CLASS_BRIDGE_PCI, 8, via_no_dac);
228#endif