lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100816183226.GA31512@phenom.dumpdata.com>
Date:	Mon, 16 Aug 2010 14:32:26 -0400
From:	Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>
To:	Stepan Moskovchenko <stepanm@...eaurora.org>
Cc:	dwalker@...eaurora.org, linux-arm-kernel@...ts.infradead.org,
	linux-kernel@...r.kernel.org, linux-arm-msm@...r.kernel.org
Subject: Re: [PATCH v4] arm: msm: Add MSM IOMMU support.

I did a very brief look.

> +static void __flush_iotlb(struct iommu_domain *domain)
> +{
> +	struct msm_priv *priv = domain->priv;
> +	struct msm_iommu_drvdata *iommu_drvdata;
> +	struct msm_iommu_ctx_drvdata *ctx_drvdata;
> +
> +#ifndef CONFIG_IOMMU_PGTABLES_L2
> +	unsigned long *fl_table = priv->pgtable;
> +	int i;
> +
> +	dmac_flush_range(fl_table, fl_table + SZ_16K);
> +
> +	for (i = 0; i < 4096; i++)

Can you use a #define for the 4096? Will that value ever change?

> +		if ((fl_table[i] & 0x03) == FL_TYPE_TABLE) {
> +			void *sl_table = __va(fl_table[i] & 0xFFFFFC00);

Does it make sense to define say:
#define MASK_XX (x) x & 0xFFFFFC00
and
#define MASK_XY (x) x & 0xFFFF0000

and use those instead of these hard-coded values?

> +			dmac_flush_range(sl_table, sl_table + SZ_4K);
> +		}
> +#endif
> +
> +	list_for_each_entry(ctx_drvdata, &priv->list_attached, attached_elm) {
> +		if (!ctx_drvdata->pdev || !ctx_drvdata->pdev->dev.parent)
> +			BUG();
> +
> +		iommu_drvdata = dev_get_drvdata(ctx_drvdata->pdev->dev.parent);
> +		SET_CTX_TLBIALL(iommu_drvdata->base, ctx_drvdata->num, 0);
> +	}
> +}
> +
> +static void __reset_context(void __iomem *base, int ctx)
> +{
> +	SET_BPRCOSH(base, ctx, 0);
> +	SET_BPRCISH(base, ctx, 0);
> +	SET_BPRCNSH(base, ctx, 0);
> +	SET_BPSHCFG(base, ctx, 0);
> +	SET_BPMTCFG(base, ctx, 0);
> +	SET_ACTLR(base, ctx, 0);
> +	SET_SCTLR(base, ctx, 0);
> +	SET_FSRRESTORE(base, ctx, 0);
> +	SET_TTBR0(base, ctx, 0);
> +	SET_TTBR1(base, ctx, 0);
> +	SET_TTBCR(base, ctx, 0);
> +	SET_BFBCR(base, ctx, 0);
> +	SET_PAR(base, ctx, 0);
> +	SET_FAR(base, ctx, 0);
> +	SET_CTX_TLBIALL(base, ctx, 0);
> +	SET_TLBFLPTER(base, ctx, 0);
> +	SET_TLBSLPTER(base, ctx, 0);
> +	SET_TLBLKCR(base, ctx, 0);
> +	SET_PRRR(base, ctx, 0);
> +	SET_NMRR(base, ctx, 0);
> +	SET_CONTEXTIDR(base, ctx, 0);
> +}
> +
> +static void __program_context(void __iomem *base, int ctx, phys_addr_t pgtable)
> +{
> +	__reset_context(base, ctx);
> +
> +	/* Set up HTW mode */
> +	/* TLB miss configuration: perform HTW on miss */
> +	SET_TLBMCFG(base, ctx, 0x3);
> +
> +	/* V2P configuration: HTW for access */
> +	SET_V2PCFG(base, ctx, 0x3);
> +
> +	SET_TTBCR(base, ctx, 0);
> +	SET_TTBR0_PA(base, ctx, (pgtable >> 14));
> +
> +	/* Invalidate the TLB for this context */
> +	SET_CTX_TLBIALL(base, ctx, 0);
> +
> +	/* Set interrupt number to "secure" interrupt */
> +	SET_IRPTNDX(base, ctx, 0);
> +
> +	/* Enable context fault interrupt */
> +	SET_CFEIE(base, ctx, 1);
> +
> +	/* Stall access on a context fault and let the handler deal with it */
> +	SET_CFCFG(base, ctx, 1);
> +
> +	/* Redirect all cacheable requests to L2 slave port. */
> +	SET_RCISH(base, ctx, 1);
> +	SET_RCOSH(base, ctx, 1);
> +	SET_RCNSH(base, ctx, 1);
> +
> +	/* Turn on TEX Remap */
> +	SET_TRE(base, ctx, 1);
> +
> +	/* Do not configure PRRR / NMRR on the IOMMU for now. We will assume
> +	 * TEX class 0 for everything until attributes are properly worked out
> +	 */
> +	SET_PRRR(base, ctx, 0);
> +	SET_NMRR(base, ctx, 0);
> +
> +	/* Turn on BFB prefetch */
> +	SET_BFBDFE(base, ctx, 1);
> +
> +#ifdef CONFIG_IOMMU_PGTABLES_L2
> +	/* Configure page tables as inner-cacheable and shareable to reduce
> +	 * the TLB miss penalty.
> +	 */
> +	SET_TTBR0_SH(base, ctx, 1);
> +	SET_TTBR1_SH(base, ctx, 1);
> +
> +	SET_TTBR0_NOS(base, ctx, 1);
> +	SET_TTBR1_NOS(base, ctx, 1);
> +
> +	SET_TTBR0_IRGNH(base, ctx, 0); /* WB, WA */
> +	SET_TTBR0_IRGNL(base, ctx, 1);
> +
> +	SET_TTBR1_IRGNH(base, ctx, 0); /* WB, WA */
> +	SET_TTBR1_IRGNL(base, ctx, 1);
> +
> +	SET_TTBR0_ORGN(base, ctx, 1); /* WB, WA */
> +	SET_TTBR1_ORGN(base, ctx, 1); /* WB, WA */
> +#endif
> +
> +	/* Enable the MMU */
> +	SET_M(base, ctx, 1);
> +}
> +
> +static int msm_iommu_domain_init(struct iommu_domain *domain)
> +{
> +	struct msm_priv *priv = kzalloc(sizeof(*priv), GFP_KERNEL);
> +
> +	if (!priv)
> +		goto fail_nomem;
> +
> +	INIT_LIST_HEAD(&priv->list_attached);
> +	priv->pgtable = (unsigned long *)__get_free_pages(GFP_KERNEL, 2);

Ugh.  Can you use get_order(SZ_16K) instead?

> +
> +	if (!priv->pgtable)
> +		goto fail_nomem;
> +
> +	memset(priv->pgtable, 0, SZ_16K);
> +	domain->priv = priv;
> +	return 0;
> +
> +fail_nomem:
> +	kfree(priv);
> +	return -ENOMEM;
> +}
> +
> +static void msm_iommu_domain_destroy(struct iommu_domain *domain)
> +{
> +	struct msm_priv *priv;
> +	unsigned long flags;
> +	unsigned long *fl_table;
> +	int i;
> +
> +	spin_lock_irqsave(&msm_iommu_lock, flags);
> +	priv = domain->priv;
> +	domain->priv = NULL;
> +
> +	if (priv) {
> +		fl_table = priv->pgtable;
> +
> +		for (i = 0; i < 4096; i++)

Ditto
> +			if ((fl_table[i] & 0x03) == FL_TYPE_TABLE)
> +				free_page((unsigned long) __va(((fl_table[i]) &
> +								0xFFFFFC00)));
> +
> +		free_pages((unsigned long)priv->pgtable, 2);

And here as well.
> +		priv->pgtable = NULL;
> +	}
> +
> +	kfree(priv);
> +	spin_unlock_irqrestore(&msm_iommu_lock, flags);
> +}
> +
> +static int msm_iommu_attach_dev(struct iommu_domain *domain, struct device *dev)
> +{
> +	struct msm_priv *priv;
> +	struct msm_iommu_ctx_dev *ctx_dev;
> +	struct msm_iommu_drvdata *iommu_drvdata;
> +	struct msm_iommu_ctx_drvdata *ctx_drvdata;
> +	struct msm_iommu_ctx_drvdata *tmp_drvdata;
> +	int ret = 0;
> +	unsigned long flags;
> +
> +	spin_lock_irqsave(&msm_iommu_lock, flags);
> +
> +	priv = domain->priv;
> +
> +	if (!priv || !dev) {
> +		ret = -EINVAL;
> +		goto fail;
> +	}
> +
> +	iommu_drvdata = dev_get_drvdata(dev->parent);
> +	ctx_drvdata = dev_get_drvdata(dev);
> +	ctx_dev = dev->platform_data;
> +
> +	if (!iommu_drvdata || !ctx_drvdata || !ctx_dev) {
> +		ret = -EINVAL;
> +		goto fail;
> +	}
> +
> +	list_for_each_entry(tmp_drvdata, &priv->list_attached, attached_elm)
> +		if (tmp_drvdata == ctx_drvdata) {
> +			ret = -EBUSY;
> +			goto fail;
> +		}
> +
> +	__program_context(iommu_drvdata->base, ctx_dev->num,
> +			  __pa(priv->pgtable));
> +
> +	list_add(&(ctx_drvdata->attached_elm), &priv->list_attached);
> +	__flush_iotlb(domain);
> +
> +fail:
> +	spin_unlock_irqrestore(&msm_iommu_lock, flags);
> +	return ret;
> +}
> +
> +static void msm_iommu_detach_dev(struct iommu_domain *domain,
> +				 struct device *dev)
> +{
> +	struct msm_priv *priv;
> +	struct msm_iommu_ctx_dev *ctx_dev;
> +	struct msm_iommu_drvdata *iommu_drvdata;
> +	struct msm_iommu_ctx_drvdata *ctx_drvdata;
> +	unsigned long flags;
> +
> +	spin_lock_irqsave(&msm_iommu_lock, flags);
> +	priv = domain->priv;
> +
> +	if (!priv || !dev)
> +		goto fail;
> +
> +	iommu_drvdata = dev_get_drvdata(dev->parent);
> +	ctx_drvdata = dev_get_drvdata(dev);
> +	ctx_dev = dev->platform_data;
> +
> +	if (!iommu_drvdata || !ctx_drvdata || !ctx_dev)
> +		goto fail;
> +
> +	__flush_iotlb(domain);
> +	__reset_context(iommu_drvdata->base, ctx_dev->num);
> +	list_del_init(&ctx_drvdata->attached_elm);
> +
> +fail:
> +	spin_unlock_irqrestore(&msm_iommu_lock, flags);
> +}
> +
> +static int msm_iommu_map(struct iommu_domain *domain, unsigned long va,
> +			 phys_addr_t pa, int order, int prot)
> +{
> +	struct msm_priv *priv;
> +	unsigned long flags;
> +	unsigned long *fl_table;
> +	unsigned long *fl_pte;
> +	unsigned long fl_offset;
> +	unsigned long *sl_table;
> +	unsigned long *sl_pte;
> +	unsigned long sl_offset;
> +	size_t len = 0x1000UL << order;
> +	int ret = 0;
> +
> +	spin_lock_irqsave(&msm_iommu_lock, flags);
> +	priv = domain->priv;
> +
> +	if (!priv) {
> +		ret = -EINVAL;
> +		goto fail;
> +	}
> +
> +	fl_table = priv->pgtable;
> +
> +	if (len != SZ_16M && len != SZ_1M &&
> +	    len != SZ_64K && len != SZ_4K) {
> +		pr_debug("Bad size: %d\n", len);
> +		ret = -EINVAL;
> +		goto fail;
> +	}
> +
> +	if (!fl_table) {
> +		pr_debug("Null page table\n");
> +		ret = -EINVAL;
> +		goto fail;
> +	}
> +
> +	fl_offset = FL_OFFSET(va);	/* Upper 12 bits */
> +	fl_pte = fl_table + fl_offset;	/* int pointers, 4 bytes */
> +
> +	if (len == SZ_16M) {
> +		int i = 0;
> +		for (i = 0; i < 16; i++)
> +			*(fl_pte+i) = (pa & 0xFF000000) | FL_SUPERSECTION |
> +				  FL_AP_READ | FL_AP_WRITE | FL_TYPE_SECT |
> +				  FL_SHARED;
> +	}
> +
> +	if (len == SZ_1M)
> +		*fl_pte = (pa & 0xFFF00000) | FL_AP_READ | FL_AP_WRITE |
> +						FL_TYPE_SECT | FL_SHARED;
> +
> +	/* Need a 2nd level table */
> +	if ((len == SZ_4K || len == SZ_64K) && (*fl_pte) == 0) {
> +		unsigned long *sl;
> +		sl = (unsigned long *) __get_free_pages(GFP_KERNEL, 0);

get_order(SZ_4K)

> +
> +		if (!sl) {
> +			pr_debug("Could not allocate second level table\n");
> +			ret = -ENOMEM;
> +			goto fail;
> +		}
> +
> +		memset(sl, 0, SZ_4K);
> +		*fl_pte = ((((int)__pa(sl)) & 0xFFFFFC00) | FL_TYPE_TABLE);
> +	}
> +
> +	sl_table = (unsigned long *) __va(((*fl_pte) & 0xFFFFFC00));
> +	sl_offset = SL_OFFSET(va);
> +	sl_pte = sl_table + sl_offset;
> +
> +
> +	if (len == SZ_4K)
> +		*sl_pte = (pa & 0xFFFFF000) | SL_AP0 | SL_AP1 |	SL_SHARED |
> +					      SL_TYPE_SMALL;
> +
> +	if (len == SZ_64K) {
> +		int i;
> +
> +		for (i = 0; i < 16; i++)
> +			*(sl_pte+i) = (pa & 0xFFFF0000) | SL_AP0 | SL_AP1 |
> +					      SL_SHARED | SL_TYPE_LARGE;
> +	}
> +
> +	__flush_iotlb(domain);
> +fail:
> +	spin_unlock_irqrestore(&msm_iommu_lock, flags);
> +	return ret;
> +}
> +
> +static int msm_iommu_unmap(struct iommu_domain *domain, unsigned long va,
> +			    int order)
> +{
> +	struct msm_priv *priv;
> +	unsigned long flags;
> +	unsigned long *fl_table;
> +	unsigned long *fl_pte;
> +	unsigned long fl_offset;
> +	unsigned long *sl_table;
> +	unsigned long *sl_pte;
> +	unsigned long sl_offset;
> +	size_t len = 0x1000UL << order;
> +	int i, ret = 0;
> +
> +	spin_lock_irqsave(&msm_iommu_lock, flags);
> +
> +	priv = domain->priv;
> +
> +	if (!priv) {
> +		ret = -ENODEV;
> +		goto fail;
> +	}
> +
> +	fl_table = priv->pgtable;
> +
> +	if (len != SZ_16M && len != SZ_1M &&
> +	    len != SZ_64K && len != SZ_4K) {
> +		pr_debug("Bad length: %d\n", len);
> +		ret = -EINVAL;
> +		goto fail;
> +	}
> +
> +	if (!fl_table) {
> +		pr_debug("Null page table\n");
> +		ret = -EINVAL;
> +		goto fail;
> +	}
> +
> +	fl_offset = FL_OFFSET(va);	/* Upper 12 bits */
> +	fl_pte = fl_table + fl_offset;	/* int pointers, 4 bytes */
> +
> +	if (*fl_pte == 0) {
> +		pr_debug("First level PTE is 0\n");
> +		ret = -ENODEV;
> +		goto fail;
> +	}
> +
> +	/* Unmap supersection */
> +	if (len == SZ_16M)
> +		for (i = 0; i < 16; i++)
> +			*(fl_pte+i) = 0;
> +
> +	if (len == SZ_1M)
> +		*fl_pte = 0;
> +
> +	sl_table = (unsigned long *) __va(((*fl_pte) & 0xFFFFFC00));
> +	sl_offset = SL_OFFSET(va);
> +	sl_pte = sl_table + sl_offset;
> +
> +	if (len == SZ_64K) {
> +		for (i = 0; i < 16; i++)
> +			*(sl_pte+i) = 0;
> +	}
> +
> +	if (len == SZ_4K)
> +		*sl_pte = 0;
> +
> +	if (len == SZ_4K || len == SZ_64K) {
> +		int used = 0;
> +
> +		for (i = 0; i < 256; i++)
> +			if (sl_table[i])
> +				used = 1;
> +		if (!used) {
> +			free_page((unsigned long)sl_table);
> +			*fl_pte = 0;
> +		}
> +	}
> +
> +	__flush_iotlb(domain);
> +fail:
> +	spin_unlock_irqrestore(&msm_iommu_lock, flags);
> +	return ret;
> +}
> +
> +static phys_addr_t msm_iommu_iova_to_phys(struct iommu_domain *domain,
> +					  unsigned long va)
> +{
> +	struct msm_priv *priv;
> +	struct msm_iommu_drvdata *iommu_drvdata;
> +	struct msm_iommu_ctx_drvdata *ctx_drvdata;
> +	unsigned int par;
> +	unsigned long flags;
> +	void __iomem *base;
> +	phys_addr_t ret = 0;
> +	int ctx;
> +
> +	spin_lock_irqsave(&msm_iommu_lock, flags);
> +
> +	priv = domain->priv;
> +	if (list_empty(&priv->list_attached))
> +		goto fail;
> +
> +	ctx_drvdata = list_entry(priv->list_attached.next,
> +				 struct msm_iommu_ctx_drvdata, attached_elm);
> +	iommu_drvdata = dev_get_drvdata(ctx_drvdata->pdev->dev.parent);
> +
> +	base = iommu_drvdata->base;
> +	ctx = ctx_drvdata->num;
> +
> +	/* Invalidate context TLB */
> +	SET_CTX_TLBIALL(base, ctx, 0);
> +	SET_V2PPR_VA(base, ctx, va >> 12);

Hmm, PAGE_SHIFT can't be used? Or some other #define?
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ