Received: by 10.192.165.148 with SMTP id m20csp731087imm; Fri, 4 May 2018 05:38:48 -0700 (PDT) X-Google-Smtp-Source: AB8JxZohgQ/wQ7QPYkNk+yaS/CCdI7mw6anOYukgMqz1PqgbKpJBGHDwkA2j9uzq2fgmJ7AkCyK+ X-Received: by 2002:a65:6349:: with SMTP id p9-v6mr22229025pgv.111.1525437528541; Fri, 04 May 2018 05:38:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525437528; cv=none; d=google.com; s=arc-20160816; b=LgPU/x0VVNJH/FoVKGIcmp5R865vz3FEjW2qZ/SL0S0p7X3g++HGBZ1fLIG4MnSBcY ewOs6MaJ3bCFaL7LxuJ3waqJQqzghPf4UJzz2ypsdSV245wmqkfJEeA4oyTYq+DxfpkO C1TJs274XkD6moJ1X6QGTrX681Sj4JERgxTU/B/fym84VY7mPbmd00T9dxb1OGuHGbMS e1XmKH55saWbHPNxpH8KvhXX4ZpeQjvFv1ECon8U19Ob+YcA4C3HaJhUmYuoPyCfJYFp QkEWufborZ4Ry0O1QQyZmmqFTa3gVP4U44A1UdTfHspvTXMs8P0g83nAty6bh4MlCVA7 PuJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:cc:to:subject:from:references :in-reply-to:message-id:arc-authentication-results; bh=7REEAcCMP+lDavcZJdbuaIvl1tqPWtH5TF5gAcBQjjQ=; b=qBnZp1hurbvnxnOJ1+0Xc4747Gbtp0RxQPgO2FpPLmebs7tLFpboQhLA5RMGscUE3u wVmRnzrFVcSyW1MHVTon1BudJzGnkppNJ+wokTisZZGAPm2Kv9sQ/gnCDH5QlxBf+VTN 4MWfBMLEt0Gx2pm0iJzu0h/QuTxRp8X2P15zU98sS4LYTyHspCNfY4Ecq0Mmu5Es+rS7 3IhTa31fR4G+hd0kGEX4ofK1aWoO6C6l9PYWbeLJ5f66jzenEmoWIF6uxRLvKpjQyEcD nP9/bd4Tc9TgsGzDjmJmSqlAq5TEjYJ1OVgEQJltkXNMnlidNWyeICaNqrmLtjCYNe5l H4vg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bj1-v6si9592469plb.395.2018.05.04.05.38.33; Fri, 04 May 2018 05:38:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751566AbeEDMeG (ORCPT + 99 others); Fri, 4 May 2018 08:34:06 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:18516 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751470AbeEDMeE (ORCPT ); Fri, 4 May 2018 08:34:04 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 40crzW1cNmz9tvTF; Fri, 4 May 2018 14:33:59 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id L_ltrA0uy0wi; Fri, 4 May 2018 14:33:59 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 40crzW16HDz9ttC1; Fri, 4 May 2018 14:33:59 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id EE1E68B975; Fri, 4 May 2018 14:34:02 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id RfukZlvbVBxB; Fri, 4 May 2018 14:34:02 +0200 (CEST) Received: from po14934vm.idsi0.si.c-s.fr (po15451.idsi0.si.c-s.fr [172.25.231.2]) by messagerie.si.c-s.fr (Postfix) with ESMTP id C85B58B972; Fri, 4 May 2018 14:34:02 +0200 (CEST) Received: by po14934vm.idsi0.si.c-s.fr (Postfix, from userid 0) id B0CE66CF2D; Fri, 4 May 2018 14:34:02 +0200 (CEST) Message-Id: In-Reply-To: References: From: Christophe Leroy Subject: [PATCH 06/17] powerpc: common ioremap functions. To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , aneesh.kumar@linux.vnet.ibm.com Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Fri, 4 May 2018 14:34:02 +0200 (CEST) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org __ioremap(), ioremap(), ioremap_wc() et ioremap_prot() are very similar between PPC32 and PPC64, they can easily be made common. _PAGE_WRITE equals to _PAGE_RW on PPC32 _PAGE_RO and _PAGE_HWWRITE are 0 on PPC64 iounmap() can also be made common by renamig the PPC32 iounmap() as __iounmap() Signed-off-by: Christophe Leroy --- arch/powerpc/include/asm/book3s/64/pgtable.h | 1 + arch/powerpc/include/asm/machdep.h | 2 +- arch/powerpc/mm/ioremap.c | 95 +++++++++------------------- 3 files changed, 31 insertions(+), 67 deletions(-) diff --git a/arch/powerpc/include/asm/book3s/64/pgtable.h b/arch/powerpc/include/asm/book3s/64/pgtable.h index 47b5ffc8715d..c5c6ead06bfb 100644 --- a/arch/powerpc/include/asm/book3s/64/pgtable.h +++ b/arch/powerpc/include/asm/book3s/64/pgtable.h @@ -17,6 +17,7 @@ #define _PAGE_NA 0 #define _PAGE_RO 0 #define _PAGE_USER 0 +#define _PAGE_HWWRITE 0 #define _PAGE_EXEC 0x00001 /* execute permission */ #define _PAGE_WRITE 0x00002 /* write access allowed */ diff --git a/arch/powerpc/include/asm/machdep.h b/arch/powerpc/include/asm/machdep.h index ffe7c71e1132..84d99ed82d5d 100644 --- a/arch/powerpc/include/asm/machdep.h +++ b/arch/powerpc/include/asm/machdep.h @@ -33,11 +33,11 @@ struct pci_host_bridge; struct machdep_calls { char *name; -#ifdef CONFIG_PPC64 void __iomem * (*ioremap)(phys_addr_t addr, unsigned long size, unsigned long flags, void *caller); void (*iounmap)(volatile void __iomem *token); +#ifdef CONFIG_PPC64 #ifdef CONFIG_PM void (*iommu_save)(void); void (*iommu_restore)(void); diff --git a/arch/powerpc/mm/ioremap.c b/arch/powerpc/mm/ioremap.c index 5d2645193568..f8dc9638c598 100644 --- a/arch/powerpc/mm/ioremap.c +++ b/arch/powerpc/mm/ioremap.c @@ -23,6 +23,7 @@ #include #include #include +#include #include "mmu_decl.h" @@ -32,44 +33,6 @@ unsigned long ioremap_bot; EXPORT_SYMBOL(ioremap_bot); /* aka VMALLOC_END */ void __iomem * -ioremap(phys_addr_t addr, unsigned long size) -{ - return __ioremap_caller(addr, size, _PAGE_NO_CACHE | _PAGE_GUARDED, - __builtin_return_address(0)); -} -EXPORT_SYMBOL(ioremap); - -void __iomem * -ioremap_wc(phys_addr_t addr, unsigned long size) -{ - return __ioremap_caller(addr, size, _PAGE_NO_CACHE, - __builtin_return_address(0)); -} -EXPORT_SYMBOL(ioremap_wc); - -void __iomem * -ioremap_prot(phys_addr_t addr, unsigned long size, unsigned long flags) -{ - /* writeable implies dirty for kernel addresses */ - if ((flags & (_PAGE_RW | _PAGE_RO)) != _PAGE_RO) - flags |= _PAGE_DIRTY | _PAGE_HWWRITE; - - /* we don't want to let _PAGE_USER and _PAGE_EXEC leak out */ - flags &= ~(_PAGE_USER | _PAGE_EXEC); - flags |= _PAGE_PRIVILEGED; - - return __ioremap_caller(addr, size, flags, __builtin_return_address(0)); -} -EXPORT_SYMBOL(ioremap_prot); - -void __iomem * -__ioremap(phys_addr_t addr, unsigned long size, unsigned long flags) -{ - return __ioremap_caller(addr, size, flags, __builtin_return_address(0)); -} -EXPORT_SYMBOL(__ioremap); - -void __iomem * __ioremap_caller(phys_addr_t addr, unsigned long size, unsigned long flags, void *caller) { @@ -153,7 +116,7 @@ __ioremap_caller(phys_addr_t addr, unsigned long size, unsigned long flags, return (void __iomem *) (v + ((unsigned long)addr & ~PAGE_MASK)); } -void iounmap(volatile void __iomem *addr) +void __iounmap(volatile void __iomem *addr) { /* * If mapped by BATs then there is nothing to do. @@ -165,7 +128,7 @@ void iounmap(volatile void __iomem *addr) if (addr > high_memory && (unsigned long) addr < ioremap_bot) vunmap((void *) (PAGE_MASK & (unsigned long)addr)); } -EXPORT_SYMBOL(iounmap); +EXPORT_SYMBOL(__iounmap); #else @@ -264,6 +227,30 @@ void __iomem * __ioremap_caller(phys_addr_t addr, unsigned long size, return ret; } +/* + * Unmap an IO region and remove it from imalloc'd list. + * Access to IO memory should be serialized by driver. + */ +void __iounmap(volatile void __iomem *token) +{ + void *addr; + + if (!slab_is_available()) + return; + + addr = (void *) ((unsigned long __force) + PCI_FIX_ADDR(token) & PAGE_MASK); + if ((unsigned long)addr < ioremap_bot) { + printk(KERN_WARNING "Attempt to iounmap early bolted mapping" + " at 0x%p\n", addr); + return; + } + vunmap(addr); +} +EXPORT_SYMBOL(__iounmap); + +#endif + void __iomem * __ioremap(phys_addr_t addr, unsigned long size, unsigned long flags) { @@ -299,8 +286,8 @@ void __iomem * ioremap_prot(phys_addr_t addr, unsigned long size, void *caller = __builtin_return_address(0); /* writeable implies dirty for kernel addresses */ - if (flags & _PAGE_WRITE) - flags |= _PAGE_DIRTY; + if ((flags & (_PAGE_WRITE | _PAGE_RO)) != _PAGE_RO) + flags |= _PAGE_DIRTY | _PAGE_HWWRITE; /* we don't want to let _PAGE_EXEC leak out */ flags &= ~_PAGE_EXEC; @@ -316,28 +303,6 @@ void __iomem * ioremap_prot(phys_addr_t addr, unsigned long size, } EXPORT_SYMBOL(ioremap_prot); -/* - * Unmap an IO region and remove it from imalloc'd list. - * Access to IO memory should be serialized by driver. - */ -void __iounmap(volatile void __iomem *token) -{ - void *addr; - - if (!slab_is_available()) - return; - - addr = (void *) ((unsigned long __force) - PCI_FIX_ADDR(token) & PAGE_MASK); - if ((unsigned long)addr < ioremap_bot) { - printk(KERN_WARNING "Attempt to iounmap early bolted mapping" - " at 0x%p\n", addr); - return; - } - vunmap(addr); -} -EXPORT_SYMBOL(__iounmap); - void iounmap(volatile void __iomem *token) { if (ppc_md.iounmap) @@ -346,5 +311,3 @@ void iounmap(volatile void __iomem *token) __iounmap(token); } EXPORT_SYMBOL(iounmap); - -#endif -- 2.13.3