1. 04 11月, 2014 1 次提交
    • O
      iommu: Add iommu_map_sg() function · 315786eb
      Olav Haugan 提交于
      Mapping and unmapping are more often than not in the critical path.
      map_sg allows IOMMU driver implementations to optimize the process
      of mapping buffers into the IOMMU page tables.
      
      Instead of mapping a buffer one page at a time and requiring potentially
      expensive TLB operations for each page, this function allows the driver
      to map all pages in one go and defer TLB maintenance until after all
      pages have been mapped.
      
      Additionally, the mapping operation would be faster in general since
      clients does not have to keep calling map API over and over again for
      each physically contiguous chunk of memory that needs to be mapped to a
      virtually contiguous region.
      Signed-off-by: NOlav Haugan <ohaugan@codeaurora.org>
      Signed-off-by: NJoerg Roedel <jroedel@suse.de>
      315786eb
  2. 02 10月, 2014 3 次提交
  3. 26 9月, 2014 2 次提交
  4. 25 9月, 2014 15 次提交
  5. 24 9月, 2014 1 次提交
    • A
      kvm: Fix page ageing bugs · 57128468
      Andres Lagar-Cavilla 提交于
      1. We were calling clear_flush_young_notify in unmap_one, but we are
      within an mmu notifier invalidate range scope. The spte exists no more
      (due to range_start) and the accessed bit info has already been
      propagated (due to kvm_pfn_set_accessed). Simply call
      clear_flush_young.
      
      2. We clear_flush_young on a primary MMU PMD, but this may be mapped
      as a collection of PTEs by the secondary MMU (e.g. during log-dirty).
      This required expanding the interface of the clear_flush_young mmu
      notifier, so a lot of code has been trivially touched.
      
      3. In the absence of shadow_accessed_mask (e.g. EPT A bit), we emulate
      the access bit by blowing the spte. This requires proper synchronizing
      with MMU notifier consumers, like every other removal of spte's does.
      Signed-off-by: NAndres Lagar-Cavilla <andreslc@google.com>
      Acked-by: NRik van Riel <riel@redhat.com>
      Signed-off-by: NPaolo Bonzini <pbonzini@redhat.com>
      57128468
  6. 22 9月, 2014 1 次提交
  7. 17 9月, 2014 7 次提交
    • R
      iommu/arm-smmu: support MMU-401 · d3aba046
      Robin Murphy 提交于
      MMU-401 is similar to MMU-400, but updated with limited ARMv8 support.
      Signed-off-by: NRobin Murphy <robin.murphy@arm.com>
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      d3aba046
    • R
      iommu/arm-smmu: fix architecture version detection · 09360403
      Robin Murphy 提交于
      The SMMU driver was relying on a quirk of MMU-500 r2px to identify
      the correct architecture version. Since this does not apply to other
      implementations, make the architecture version for each supported
      implementation explicit.
      
      While we're at it, remove the unnecessary #ifdef since the dependencies
      for CONFIG_ARM_SMMU already imply CONFIG_OF.
      Signed-off-by: NRobin Murphy <robin.murphy@arm.com>
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      09360403
    • W
      iommu/arm-smmu: don't bother truncating the s1 output size to VA_BITS · 28d6007b
      Will Deacon 提交于
      In order for nested translation to work correctly, we need to ensure
      that the maximum output address size from stage-1 is <= the maximum
      supported input address size to stage-2. The latter is currently defined
      by VA_BITS, since we make use of the CPU page table functions for
      allocating out tables and so the driver currently enforces this
      restriction by truncating the stage-1 output size during probe.
      
      In reality, this doesn't make a lot of sense; the guest OS is responsible
      for managing the stage-1 page tables, so we actually just need to ensure
      that the ID registers of the virtual SMMU interface only advertise the
      supported stage-2 input size.
      
      This patch fixes the problem by treating the stage-1 and stage-2 input
      address sizes separately.
      Reported-by: NTirumalesh Chalamarla <tchalamarla@cavium.com>
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      28d6007b
    • W
      iommu/arm-smmu: use page shift instead of page size to avoid division · c757e852
      Will Deacon 提交于
      Arbitrary integer division is not available in all ARM CPUs, so the GCC
      may spit out calls to helper functions which are not implemented in
      the kernel.
      
      This patch avoids these problems in the SMMU driver by using page shift
      instead of page size, so that divisions by the page size (as required
      by the vSMMU code) can be expressed as a simple right shift.
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      c757e852
    • W
      iommu/arm-smmu: put iommu_domain pointer in dev->archdata.iommu · 844e35bd
      Will Deacon 提交于
      In preparation for nested translation support, stick a pointer to the
      iommu_domain in dev->archdata.iommu. This makes it much easier to grab
      hold of the physical group configuration (e.g. cbndx) when dealing with
      vSMMU accesses from a guest.
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      844e35bd
    • W
      iommu/arm-smmu: add support for multi-master iommu groups · 8f68f8e2
      Will Deacon 提交于
      Whilst the driver currently creates one IOMMU group per device, this
      will soon change when we start supporting non-transparent PCI bridges
      which require all upstream masters to be assigned to the same address
      space.
      
      This patch reworks our IOMMU group code so that we can easily support
      multi-master groups. The master configuration (streamids and smrs) is
      stored as private iommudata on the group, whilst the low-level attach/detach
      code is updated to avoid double alloc/free when dealing with multiple
      masters sharing the same SMMU configuration. This unifies device
      handling, regardless of whether the device sits on the platform or pci
      bus.
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      8f68f8e2
    • W
      iommu/arm-smmu: allow translation stage to be forced on the cmdline · 4cf740b0
      Will Deacon 提交于
      When debugging and testing code on an SMMU that supports nested
      translation, it can be useful to restrict the driver to a particular
      stage of translation.
      
      This patch adds a module parameter to the ARM SMMU driver to allow this
      by restricting the ability of the probe() code to detect support for
      only the specified stage.
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      4cf740b0
  8. 05 9月, 2014 3 次提交
    • V
      iommu/fsl: Fix warning resulting from adding PCI device twice · 5a9137a6
      Varun Sethi 提交于
      iommu_group_get_for_dev determines the iommu group for the PCI device and adds
      the device to the group.
      
      In the PAMU driver we were again adding the device to the same group without checking
      if the device already had an iommu group. This resulted in the following warning.
      
      sysfs: cannot create duplicate filename '/devices/ffe200000.pcie/pci0000:00/0000:00:00.0/iommu_group'
      ------------[ cut here ]------------
      WARNING: at fs/sysfs/dir.c:31
      Modules linked in:
      CPU: 0 PID: 1 Comm: swapper/0 Not tainted 3.17.0-rc3-00002-g7505ceaf-dirty #126
      task: c0000001fe0a0000 ti: c0000001fe044000 task.ti: c0000001fe044000
      NIP: c00000000018879c LR: c000000000188798 CTR: c00000000001ea50
      REGS: c0000001fe047040 TRAP: 0700   Not tainted  (3.17.0-rc3-00002-g7505ceaf-dirty)
      MSR: 0000000080029000 <CE,EE,ME>  CR: 24ad8e22  XER: 20000000
      SOFTE: 1
      GPR00: c000000000188798 c0000001fe0472c0 c0000000009a52e0 0000000000000065
      GPR04: 0000000000000001 0000000000000000 3a30303a00000000 0000000027000000
      GPR08: 2f696f6d00000000 c0000000008d3830 c0000000009b3938 c0000000009bb3d0
      GPR12: 0000000028ad8e24 c00000000fff4000 c00000000000205c 0000000000000000
      GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
      GPR20: 0000000000000000 0000000000000000 0000000000000000 c0000000008a4c70
      GPR24: c0000000007e9010 c0000001fe0140a8 ffffffffffffffef 0000000000000001
      GPR28: c0000001fe22ebb8 c0000000007e9010 c00000000090bf10 c0000001fe220000
      NIP [c00000000018879c] .sysfs_warn_dup+0x74/0xa4
      LR [c000000000188798] .sysfs_warn_dup+0x70/0xa4
      Call Trace:
      [c0000001fe0472c0] [c000000000188798] .sysfs_warn_dup+0x70/0xa4 (unreliable)
      [c0000001fe047350] [c000000000188d34] .sysfs_do_create_link_sd.clone.2+0x168/0x174
      [c0000001fe047400] [c0000000004b3cf8] .iommu_group_add_device+0x78/0x244
      [c0000001fe0474b0] [c0000000004b6964] .fsl_pamu_add_device+0x88/0x1a8
      [c0000001fe047570] [c0000000004b3960] .iommu_bus_notifier+0xdc/0x15c
      [c0000001fe047600] [c000000000059848] .notifier_call_chain+0x8c/0xe8
      [c0000001fe0476a0] [c000000000059d04] .__blocking_notifier_call_chain+0x58/0x84
      [c0000001fe047750] [c00000000036619c] .device_add+0x464/0x5c8
      [c0000001fe047820] [c000000000300ebc] .pci_device_add+0x14c/0x17c
      [c0000001fe0478c0] [c000000000300fbc] .pci_scan_single_device+0xd0/0xf4
      [c0000001fe047970] [c00000000030104c] .pci_scan_slot+0x6c/0x18c
      [c0000001fe047a10] [c00000000030226c] .pci_scan_child_bus+0x40/0x114
      [c0000001fe047ac0] [c000000000021974] .pcibios_scan_phb+0x240/0x2c8
      [c0000001fe047b70] [c00000000085a970] .pcibios_init+0x64/0xc8
      [c0000001fe047c00] [c000000000001884] .do_one_initcall+0xbc/0x224
      [c0000001fe047d00] [c000000000852d50] .kernel_init_freeable+0x14c/0x21c
      [c0000001fe047db0] [c000000000002078] .kernel_init+0x1c/0xfa4
      [c0000001fe047e30] [c000000000000884] .ret_from_kernel_thread+0x58/0xd4
      Instruction dump:
      7c7f1b79 4182001c 7fe4fb78 7f83e378 38a01000 4bffc905 60000000 7c641b78
      e87e8008 7fa5eb78 48482ff5 60000000 <0fe00000> 7fe3fb78 4bf7bd39 60000000
      Signed-off-by: NVarun Sethi <Varun.Sethi@freescale.com>
      Cc: stable@vger.kernel.org
      Signed-off-by: NJoerg Roedel <jroedel@suse.de>
      5a9137a6
    • S
      iommu/omap: Fix iommu archdata name for DT-based devices · 7d682774
      Suman Anna 提交于
      A device is tied to an iommu through its archdata field. The archdata
      is allocated on the fly for DT-based devices automatically through the
      .add_device iommu ops. The current logic incorrectly assigned the name
      of the IOMMU user device, instead of the name of the IOMMU device as
      required by the attach logic. Fix this issue so that DT-based devices
      can attach successfully to an IOMMU domain.
      Signed-off-by: NSuman Anna <s-anna@ti.com>
      Acked-by: NLaurent Pinchart <laurent.pinchart@ideasonboard.com>
      Signed-off-by: NJoerg Roedel <jroedel@suse.de>
      7d682774
    • S
      iommu/omap: Check for valid archdata in attach_dev · e3f595b9
      Suman Anna 提交于
      Any device requiring to be attached to an iommu_domain must have
      valid archdata containing the necessary iommu information, which
      is SoC-specific. Add a check in the omap_iommu_attach_dev to make
      sure that the device has valid archdata before accessing
      different SoC-specific fields of the archdata. This prevents a
      NULL pointer dereference on any misconfigured devices.
      Signed-off-by: NSuman Anna <s-anna@ti.com>
      Acked-by: NLaurent Pinchart <laurent.pinchart@ideasonboard.com>
      Signed-off-by: NJoerg Roedel <jroedel@suse.de>
      e3f595b9
  9. 02 9月, 2014 4 次提交
  10. 01 9月, 2014 3 次提交
    • V
      iommu/arm-smmu: remove pgtable_page_{c,d}tor() · 93b14135
      Vladimir Murzin 提交于
      If split page table lock for PTE tables is enabled (CONFIG_SPLIT_PTLOCK_CPUS
      <=NR_CPUS) pgtable_page_ctor() leads to non-atomic allocation for ptlock with
      a spinlock held, resulting in:
      
      ------------[ cut here ]------------
      WARNING: CPU: 0 PID: 466 at kernel/locking/lockdep.c:2742 lockdep_trace_alloc+0xd8/0xf4()
      DEBUG_LOCKS_WARN_ON(irqs_disabled_flags(flags))
      Modules linked in:
      CPU: 0 PID: 466 Comm: dma0chan0-copy0 Not tainted 3.16.0-3d47efb-clean-pl330-dma_test-ve-a15-a32-slr-m
      c-on-3+ #55
      [<80014748>] (unwind_backtrace) from [<80011640>] (show_stack+0x10/0x14)
      [<80011640>] (show_stack) from [<802bf864>] (dump_stack+0x80/0xb4)
      [<802bf864>] (dump_stack) from [<8002385c>] (warn_slowpath_common+0x64/0x88)
      [<8002385c>] (warn_slowpath_common) from [<80023914>] (warn_slowpath_fmt+0x30/0x40)
      [<80023914>] (warn_slowpath_fmt) from [<8005d818>] (lockdep_trace_alloc+0xd8/0xf4)
      [<8005d818>] (lockdep_trace_alloc) from [<800d3d78>] (kmem_cache_alloc+0x24/0x144)
      [<800d3d78>] (kmem_cache_alloc) from [<800bfae4>] (ptlock_alloc+0x18/0x2c)
      [<800bfae4>] (ptlock_alloc) from [<802b1ec0>] (arm_smmu_handle_mapping+0x4c0/0x690)
      [<802b1ec0>] (arm_smmu_handle_mapping) from [<802b0cd8>] (iommu_map+0xe0/0x148)
      [<802b0cd8>] (iommu_map) from [<80019098>] (arm_coherent_iommu_map_page+0x160/0x278)
      [<80019098>] (arm_coherent_iommu_map_page) from [<801f4d78>] (dmatest_func+0x60c/0x1098)
      [<801f4d78>] (dmatest_func) from [<8003f8ac>] (kthread+0xcc/0xe8)
      [<8003f8ac>] (kthread) from [<8000e868>] (ret_from_fork+0x14/0x2c)
      ---[ end trace ce0d27e6f434acf8 ]--
      
      Split page tables lock is not used in the driver. In fact, page tables are
      guarded with domain lock, so remove calls to pgtable_page_{c,d}tor().
      
      Cc: <stable@vger.kernel.org>
      Signed-off-by: NVladimir Murzin <vladimir.murzin@arm.com>
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      93b14135
    • O
      iommu/arm-smmu: fix programming of SMMU_CBn_TCR for stage 1 · 1fc870c7
      Olav Haugan 提交于
      Stage-1 context banks do not have the SMMU_CBn_TCR[SL0] field since it
      is only applicable to stage-2 context banks.
      
      This patch ensures that we don't set the reserved TCR bits for stage-1
      translations.
      
      Cc: <stable@vger.kernel.org>
      Signed-off-by: NOlav Haugan <ohaugan@codeaurora.org>
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      1fc870c7
    • M
      iommu/arm-smmu: avoid calling request_irq in atomic context · a18037b2
      Mitchel Humpherys 提交于
      request_irq shouldn't be called from atomic context since it might
      sleep, but we're calling it with a spinlock held, resulting in:
      
          [    9.172202] BUG: sleeping function called from invalid context at kernel/mm/slub.c:926
          [    9.182989] in_atomic(): 1, irqs_disabled(): 128, pid: 1, name: swapper/0
          [    9.189762] CPU: 1 PID: 1 Comm: swapper/0 Tainted: G        W    3.10.40-gbc1b510b-38437-g55831d3bd9-dirty #97
          [    9.199757] [<c020c448>] (unwind_backtrace+0x0/0x11c) from [<c02097d0>] (show_stack+0x10/0x14)
          [    9.208346] [<c02097d0>] (show_stack+0x10/0x14) from [<c0301d74>] (kmem_cache_alloc_trace+0x3c/0x210)
          [    9.217543] [<c0301d74>] (kmem_cache_alloc_trace+0x3c/0x210) from [<c0276a48>] (request_threaded_irq+0x88/0x11c)
          [    9.227702] [<c0276a48>] (request_threaded_irq+0x88/0x11c) from [<c0931ca4>] (arm_smmu_attach_dev+0x188/0x858)
          [    9.237686] [<c0931ca4>] (arm_smmu_attach_dev+0x188/0x858) from [<c0212cd8>] (arm_iommu_attach_device+0x18/0xd0)
          [    9.247837] [<c0212cd8>] (arm_iommu_attach_device+0x18/0xd0) from [<c093314c>] (arm_smmu_test_probe+0x68/0xd4)
          [    9.257823] [<c093314c>] (arm_smmu_test_probe+0x68/0xd4) from [<c05aadd0>] (driver_probe_device+0x12c/0x330)
          [    9.267629] [<c05aadd0>] (driver_probe_device+0x12c/0x330) from [<c05ab080>] (__driver_attach+0x68/0x8c)
          [    9.277090] [<c05ab080>] (__driver_attach+0x68/0x8c) from [<c05a92d4>] (bus_for_each_dev+0x70/0x84)
          [    9.286118] [<c05a92d4>] (bus_for_each_dev+0x70/0x84) from [<c05aa3b0>] (bus_add_driver+0x100/0x244)
          [    9.295233] [<c05aa3b0>] (bus_add_driver+0x100/0x244) from [<c05ab5d0>] (driver_register+0x9c/0x124)
          [    9.304347] [<c05ab5d0>] (driver_register+0x9c/0x124) from [<c0933088>] (arm_smmu_test_init+0x14/0x38)
          [    9.313635] [<c0933088>] (arm_smmu_test_init+0x14/0x38) from [<c0200618>] (do_one_initcall+0xb8/0x160)
          [    9.322926] [<c0200618>] (do_one_initcall+0xb8/0x160) from [<c1200b7c>] (kernel_init_freeable+0x108/0x1cc)
          [    9.332564] [<c1200b7c>] (kernel_init_freeable+0x108/0x1cc) from [<c0b924b0>] (kernel_init+0xc/0xe4)
          [    9.341675] [<c0b924b0>] (kernel_init+0xc/0xe4) from [<c0205e38>] (ret_from_fork+0x14/0x3c)
      
      Fix this by moving the request_irq out of the critical section. This
      should be okay since smmu_domain->smmu is still being protected by the
      critical section. Also, we still don't program the Stream Match Register
      until after registering our interrupt handler so we shouldn't be missing
      any interrupts.
      
      Cc: <stable@vger.kernel.org>
      Signed-off-by: NMitchel Humpherys <mitchelh@codeaurora.org>
      [will: code cleanup and fixed request_irq token parameter]
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      a18037b2