Loading...
1// SPDX-License-Identifier: GPL-2.0
2#include <linux/dma-map-ops.h>
3#include <linux/dma-direct.h>
4#include <linux/iommu.h>
5#include <linux/dmar.h>
6#include <linux/export.h>
7#include <linux/memblock.h>
8#include <linux/gfp.h>
9#include <linux/pci.h>
10#include <linux/amd-iommu.h>
11
12#include <asm/proto.h>
13#include <asm/dma.h>
14#include <asm/iommu.h>
15#include <asm/gart.h>
16#include <asm/x86_init.h>
17
18#include <xen/xen.h>
19#include <xen/swiotlb-xen.h>
20
21static bool disable_dac_quirk __read_mostly;
22
23const struct dma_map_ops *dma_ops;
24EXPORT_SYMBOL(dma_ops);
25
26#ifdef CONFIG_IOMMU_DEBUG
27int panic_on_overflow __read_mostly = 1;
28int force_iommu __read_mostly = 1;
29#else
30int panic_on_overflow __read_mostly = 0;
31int force_iommu __read_mostly = 0;
32#endif
33
34int iommu_merge __read_mostly = 0;
35
36int no_iommu __read_mostly;
37/* Set this to 1 if there is a HW IOMMU in the system */
38int iommu_detected __read_mostly = 0;
39
40#ifdef CONFIG_SWIOTLB
41bool x86_swiotlb_enable;
42static unsigned int x86_swiotlb_flags;
43
44static void __init pci_swiotlb_detect(void)
45{
46 /* don't initialize swiotlb if iommu=off (no_iommu=1) */
47 if (!no_iommu && max_possible_pfn > MAX_DMA32_PFN)
48 x86_swiotlb_enable = true;
49
50 /*
51 * Set swiotlb to 1 so that bounce buffers are allocated and used for
52 * devices that can't support DMA to encrypted memory.
53 */
54 if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
55 x86_swiotlb_enable = true;
56
57 /*
58 * Guest with guest memory encryption currently perform all DMA through
59 * bounce buffers as the hypervisor can't access arbitrary VM memory
60 * that is not explicitly shared with it.
61 */
62 if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT)) {
63 x86_swiotlb_enable = true;
64 x86_swiotlb_flags |= SWIOTLB_FORCE;
65 }
66}
67#else
68static inline void __init pci_swiotlb_detect(void)
69{
70}
71#define x86_swiotlb_flags 0
72#endif /* CONFIG_SWIOTLB */
73
74#ifdef CONFIG_SWIOTLB_XEN
75static bool xen_swiotlb_enabled(void)
76{
77 return xen_initial_domain() || x86_swiotlb_enable ||
78 (IS_ENABLED(CONFIG_XEN_PCIDEV_FRONTEND) && xen_pv_pci_possible);
79}
80
81static void __init pci_xen_swiotlb_init(void)
82{
83 if (!xen_swiotlb_enabled())
84 return;
85 x86_swiotlb_enable = true;
86 x86_swiotlb_flags |= SWIOTLB_ANY;
87 swiotlb_init_remap(true, x86_swiotlb_flags, xen_swiotlb_fixup);
88 dma_ops = &xen_swiotlb_dma_ops;
89 if (IS_ENABLED(CONFIG_PCI))
90 pci_request_acs();
91}
92#else
93static inline void __init pci_xen_swiotlb_init(void)
94{
95}
96#endif /* CONFIG_SWIOTLB_XEN */
97
98void __init pci_iommu_alloc(void)
99{
100 if (xen_pv_domain()) {
101 pci_xen_swiotlb_init();
102 return;
103 }
104 pci_swiotlb_detect();
105 gart_iommu_hole_init();
106 amd_iommu_detect();
107 detect_intel_iommu();
108 swiotlb_init(x86_swiotlb_enable, x86_swiotlb_flags);
109}
110
111/*
112 * See <Documentation/arch/x86/x86_64/boot-options.rst> for the iommu kernel
113 * parameter documentation.
114 */
115static __init int iommu_setup(char *p)
116{
117 iommu_merge = 1;
118
119 if (!p)
120 return -EINVAL;
121
122 while (*p) {
123 if (!strncmp(p, "off", 3))
124 no_iommu = 1;
125 /* gart_parse_options has more force support */
126 if (!strncmp(p, "force", 5))
127 force_iommu = 1;
128 if (!strncmp(p, "noforce", 7)) {
129 iommu_merge = 0;
130 force_iommu = 0;
131 }
132
133 if (!strncmp(p, "biomerge", 8)) {
134 iommu_merge = 1;
135 force_iommu = 1;
136 }
137 if (!strncmp(p, "panic", 5))
138 panic_on_overflow = 1;
139 if (!strncmp(p, "nopanic", 7))
140 panic_on_overflow = 0;
141 if (!strncmp(p, "merge", 5)) {
142 iommu_merge = 1;
143 force_iommu = 1;
144 }
145 if (!strncmp(p, "nomerge", 7))
146 iommu_merge = 0;
147 if (!strncmp(p, "forcesac", 8))
148 pr_warn("forcesac option ignored.\n");
149 if (!strncmp(p, "allowdac", 8))
150 pr_warn("allowdac option ignored.\n");
151 if (!strncmp(p, "nodac", 5))
152 pr_warn("nodac option ignored.\n");
153 if (!strncmp(p, "usedac", 6)) {
154 disable_dac_quirk = true;
155 return 1;
156 }
157#ifdef CONFIG_SWIOTLB
158 if (!strncmp(p, "soft", 4))
159 x86_swiotlb_enable = true;
160#endif
161 if (!strncmp(p, "pt", 2))
162 iommu_set_default_passthrough(true);
163 if (!strncmp(p, "nopt", 4))
164 iommu_set_default_translated(true);
165
166 gart_parse_options(p);
167
168 p += strcspn(p, ",");
169 if (*p == ',')
170 ++p;
171 }
172 return 0;
173}
174early_param("iommu", iommu_setup);
175
176static int __init pci_iommu_init(void)
177{
178 x86_init.iommu.iommu_init();
179
180#ifdef CONFIG_SWIOTLB
181 /* An IOMMU turned us off. */
182 if (x86_swiotlb_enable) {
183 pr_info("PCI-DMA: Using software bounce buffering for IO (SWIOTLB)\n");
184 swiotlb_print_info();
185 } else {
186 swiotlb_exit();
187 }
188#endif
189
190 return 0;
191}
192/* Must execute after PCI subsystem */
193rootfs_initcall(pci_iommu_init);
194
195#ifdef CONFIG_PCI
196/* Many VIA bridges seem to corrupt data for DAC. Disable it here */
197
198static int via_no_dac_cb(struct pci_dev *pdev, void *data)
199{
200 pdev->dev.bus_dma_limit = DMA_BIT_MASK(32);
201 return 0;
202}
203
204static void via_no_dac(struct pci_dev *dev)
205{
206 if (!disable_dac_quirk) {
207 dev_info(&dev->dev, "disabling DAC on VIA PCI bridge\n");
208 pci_walk_bus(dev->subordinate, via_no_dac_cb, NULL);
209 }
210}
211DECLARE_PCI_FIXUP_CLASS_FINAL(PCI_VENDOR_ID_VIA, PCI_ANY_ID,
212 PCI_CLASS_BRIDGE_PCI, 8, via_no_dac);
213#endif
1#include <linux/dma-mapping.h>
2#include <linux/dma-debug.h>
3#include <linux/dmar.h>
4#include <linux/export.h>
5#include <linux/bootmem.h>
6#include <linux/gfp.h>
7#include <linux/pci.h>
8#include <linux/kmemleak.h>
9
10#include <asm/proto.h>
11#include <asm/dma.h>
12#include <asm/iommu.h>
13#include <asm/gart.h>
14#include <asm/calgary.h>
15#include <asm/x86_init.h>
16#include <asm/iommu_table.h>
17
18static int forbid_dac __read_mostly;
19
20struct dma_map_ops *dma_ops = &nommu_dma_ops;
21EXPORT_SYMBOL(dma_ops);
22
23static int iommu_sac_force __read_mostly;
24
25#ifdef CONFIG_IOMMU_DEBUG
26int panic_on_overflow __read_mostly = 1;
27int force_iommu __read_mostly = 1;
28#else
29int panic_on_overflow __read_mostly = 0;
30int force_iommu __read_mostly = 0;
31#endif
32
33int iommu_merge __read_mostly = 0;
34
35int no_iommu __read_mostly;
36/* Set this to 1 if there is a HW IOMMU in the system */
37int iommu_detected __read_mostly = 0;
38
39/*
40 * This variable becomes 1 if iommu=pt is passed on the kernel command line.
41 * If this variable is 1, IOMMU implementations do no DMA translation for
42 * devices and allow every device to access to whole physical memory. This is
43 * useful if a user wants to use an IOMMU only for KVM device assignment to
44 * guests and not for driver dma translation.
45 */
46int iommu_pass_through __read_mostly;
47
48extern struct iommu_table_entry __iommu_table[], __iommu_table_end[];
49
50/* Dummy device used for NULL arguments (normally ISA). */
51struct device x86_dma_fallback_dev = {
52 .init_name = "fallback device",
53 .coherent_dma_mask = ISA_DMA_BIT_MASK,
54 .dma_mask = &x86_dma_fallback_dev.coherent_dma_mask,
55};
56EXPORT_SYMBOL(x86_dma_fallback_dev);
57
58/* Number of entries preallocated for DMA-API debugging */
59#define PREALLOC_DMA_DEBUG_ENTRIES 65536
60
61int dma_set_mask(struct device *dev, u64 mask)
62{
63 if (!dev->dma_mask || !dma_supported(dev, mask))
64 return -EIO;
65
66 *dev->dma_mask = mask;
67
68 return 0;
69}
70EXPORT_SYMBOL(dma_set_mask);
71
72void __init pci_iommu_alloc(void)
73{
74 struct iommu_table_entry *p;
75
76 sort_iommu_table(__iommu_table, __iommu_table_end);
77 check_iommu_entries(__iommu_table, __iommu_table_end);
78
79 for (p = __iommu_table; p < __iommu_table_end; p++) {
80 if (p && p->detect && p->detect() > 0) {
81 p->flags |= IOMMU_DETECTED;
82 if (p->early_init)
83 p->early_init();
84 if (p->flags & IOMMU_FINISH_IF_DETECTED)
85 break;
86 }
87 }
88}
89void *dma_generic_alloc_coherent(struct device *dev, size_t size,
90 dma_addr_t *dma_addr, gfp_t flag,
91 struct dma_attrs *attrs)
92{
93 unsigned long dma_mask;
94 struct page *page;
95 unsigned int count = PAGE_ALIGN(size) >> PAGE_SHIFT;
96 dma_addr_t addr;
97
98 dma_mask = dma_alloc_coherent_mask(dev, flag);
99
100 flag |= __GFP_ZERO;
101again:
102 page = NULL;
103 /* CMA can be used only in the context which permits sleeping */
104 if (flag & __GFP_WAIT)
105 page = dma_alloc_from_contiguous(dev, count, get_order(size));
106 /* fallback */
107 if (!page)
108 page = alloc_pages_node(dev_to_node(dev), flag, get_order(size));
109 if (!page)
110 return NULL;
111
112 addr = page_to_phys(page);
113 if (addr + size > dma_mask) {
114 __free_pages(page, get_order(size));
115
116 if (dma_mask < DMA_BIT_MASK(32) && !(flag & GFP_DMA)) {
117 flag = (flag & ~GFP_DMA32) | GFP_DMA;
118 goto again;
119 }
120
121 return NULL;
122 }
123
124 *dma_addr = addr;
125 return page_address(page);
126}
127
128void dma_generic_free_coherent(struct device *dev, size_t size, void *vaddr,
129 dma_addr_t dma_addr, struct dma_attrs *attrs)
130{
131 unsigned int count = PAGE_ALIGN(size) >> PAGE_SHIFT;
132 struct page *page = virt_to_page(vaddr);
133
134 if (!dma_release_from_contiguous(dev, page, count))
135 free_pages((unsigned long)vaddr, get_order(size));
136}
137
138/*
139 * See <Documentation/x86/x86_64/boot-options.txt> for the iommu kernel
140 * parameter documentation.
141 */
142static __init int iommu_setup(char *p)
143{
144 iommu_merge = 1;
145
146 if (!p)
147 return -EINVAL;
148
149 while (*p) {
150 if (!strncmp(p, "off", 3))
151 no_iommu = 1;
152 /* gart_parse_options has more force support */
153 if (!strncmp(p, "force", 5))
154 force_iommu = 1;
155 if (!strncmp(p, "noforce", 7)) {
156 iommu_merge = 0;
157 force_iommu = 0;
158 }
159
160 if (!strncmp(p, "biomerge", 8)) {
161 iommu_merge = 1;
162 force_iommu = 1;
163 }
164 if (!strncmp(p, "panic", 5))
165 panic_on_overflow = 1;
166 if (!strncmp(p, "nopanic", 7))
167 panic_on_overflow = 0;
168 if (!strncmp(p, "merge", 5)) {
169 iommu_merge = 1;
170 force_iommu = 1;
171 }
172 if (!strncmp(p, "nomerge", 7))
173 iommu_merge = 0;
174 if (!strncmp(p, "forcesac", 8))
175 iommu_sac_force = 1;
176 if (!strncmp(p, "allowdac", 8))
177 forbid_dac = 0;
178 if (!strncmp(p, "nodac", 5))
179 forbid_dac = 1;
180 if (!strncmp(p, "usedac", 6)) {
181 forbid_dac = -1;
182 return 1;
183 }
184#ifdef CONFIG_SWIOTLB
185 if (!strncmp(p, "soft", 4))
186 swiotlb = 1;
187#endif
188 if (!strncmp(p, "pt", 2))
189 iommu_pass_through = 1;
190
191 gart_parse_options(p);
192
193#ifdef CONFIG_CALGARY_IOMMU
194 if (!strncmp(p, "calgary", 7))
195 use_calgary = 1;
196#endif /* CONFIG_CALGARY_IOMMU */
197
198 p += strcspn(p, ",");
199 if (*p == ',')
200 ++p;
201 }
202 return 0;
203}
204early_param("iommu", iommu_setup);
205
206int dma_supported(struct device *dev, u64 mask)
207{
208 struct dma_map_ops *ops = get_dma_ops(dev);
209
210#ifdef CONFIG_PCI
211 if (mask > 0xffffffff && forbid_dac > 0) {
212 dev_info(dev, "PCI: Disallowing DAC for device\n");
213 return 0;
214 }
215#endif
216
217 if (ops->dma_supported)
218 return ops->dma_supported(dev, mask);
219
220 /* Copied from i386. Doesn't make much sense, because it will
221 only work for pci_alloc_coherent.
222 The caller just has to use GFP_DMA in this case. */
223 if (mask < DMA_BIT_MASK(24))
224 return 0;
225
226 /* Tell the device to use SAC when IOMMU force is on. This
227 allows the driver to use cheaper accesses in some cases.
228
229 Problem with this is that if we overflow the IOMMU area and
230 return DAC as fallback address the device may not handle it
231 correctly.
232
233 As a special case some controllers have a 39bit address
234 mode that is as efficient as 32bit (aic79xx). Don't force
235 SAC for these. Assume all masks <= 40 bits are of this
236 type. Normally this doesn't make any difference, but gives
237 more gentle handling of IOMMU overflow. */
238 if (iommu_sac_force && (mask >= DMA_BIT_MASK(40))) {
239 dev_info(dev, "Force SAC with mask %Lx\n", mask);
240 return 0;
241 }
242
243 return 1;
244}
245EXPORT_SYMBOL(dma_supported);
246
247static int __init pci_iommu_init(void)
248{
249 struct iommu_table_entry *p;
250 dma_debug_init(PREALLOC_DMA_DEBUG_ENTRIES);
251
252#ifdef CONFIG_PCI
253 dma_debug_add_bus(&pci_bus_type);
254#endif
255 x86_init.iommu.iommu_init();
256
257 for (p = __iommu_table; p < __iommu_table_end; p++) {
258 if (p && (p->flags & IOMMU_DETECTED) && p->late_init)
259 p->late_init();
260 }
261
262 return 0;
263}
264/* Must execute after PCI subsystem */
265rootfs_initcall(pci_iommu_init);
266
267#ifdef CONFIG_PCI
268/* Many VIA bridges seem to corrupt data for DAC. Disable it here */
269
270static void via_no_dac(struct pci_dev *dev)
271{
272 if (forbid_dac == 0) {
273 dev_info(&dev->dev, "disabling DAC on VIA PCI bridge\n");
274 forbid_dac = 1;
275 }
276}
277DECLARE_PCI_FIXUP_CLASS_FINAL(PCI_VENDOR_ID_VIA, PCI_ANY_ID,
278 PCI_CLASS_BRIDGE_PCI, 8, via_no_dac);
279#endif