From nobody Thu Dec 26 12:34:06 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1504081284648943.9136030232945; Wed, 30 Aug 2017 01:21:24 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 02F4921E95E18; Wed, 30 Aug 2017 01:18:41 -0700 (PDT) Received: from mail-wr0-x22f.google.com (mail-wr0-x22f.google.com [IPv6:2a00:1450:400c:c0c::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 2275421E95E11 for ; Wed, 30 Aug 2017 01:18:38 -0700 (PDT) Received: by mail-wr0-x22f.google.com with SMTP id j29so15396670wre.2 for ; Wed, 30 Aug 2017 01:21:19 -0700 (PDT) Received: from localhost.localdomain ([105.133.189.215]) by smtp.gmail.com with ESMTPSA id h8sm3051642wma.46.2017.08.30.01.21.16 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 30 Aug 2017 01:21:17 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=mrT7UhGcKB0nUxxC+2EHq3NEDxmSeoKA38UjCQL4iMs=; b=KI0SxcMqMPgP1M7HhEKVkajSDq99coP2IYUPHv44OxEvQU321oFi2r8VKh4LBSIpF9 ZF+XIdAgBiCNYAPlYgkWtLU6EKIfAeedGiLOYFVHtDFv8Cdp+8vvv5QG1aoOR2OUoBFf aU9CKCMOV5QMWQ7MokbD8wj0zW4IaMe3hLH/g= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=mrT7UhGcKB0nUxxC+2EHq3NEDxmSeoKA38UjCQL4iMs=; b=oA69riFvzCdKpKVkBD9VmCEAuGqDs4Uqqgag51hg4btenDBUtDKdV4ebI4QNlN6tzR +F0BvXYex6Ob3qbPTHzJzftoisrrPKJ6sGDFpPPMH6dwsym4t0TxAAj5BcuJstzJ+TN4 +Ehxw2rk9/+445QKCChXNGGmZzc0pkkh+s23AFsIL1xlqA+TSGPD7q00GWN0/YahwSlO UjDwIs9s5K25TP28QMACLTWfV8S5U2wXjruiMwufslu2cF/p1J8X9PlN6MXjpQMN1la7 5w00VIE6gvcB9hMiPNge6XDXwS4QxCcVfiSzNZj0J7JXimOBIbzuR8PYUNWvqLaKOZqw 1YXw== X-Gm-Message-State: AHYfb5inVLNQm3BKCkSdI7p50xtffPFQ1CcX0dw5oiHkGs5KErczdzVW xKxexX3j1nqUCagctfvVQg== X-Received: by 10.223.134.161 with SMTP id 30mr509792wrx.147.1504081277843; Wed, 30 Aug 2017 01:21:17 -0700 (PDT) From: Ard Biesheuvel To: edk2-devel@lists.01.org, leif.lindholm@linaro.org Date: Wed, 30 Aug 2017 09:21:03 +0100 Message-Id: <20170830082108.7470-2-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20170830082108.7470-1-ard.biesheuvel@linaro.org> References: <20170830082108.7470-1-ard.biesheuvel@linaro.org> Subject: [edk2] [PATCH 1/6] EmbeddedPkg: rename NullDmaLib to CoherentDmaLib X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Ard Biesheuvel MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" Rename NullDmaLib to CoherentDmaLib to better reflect its nature, and to better convey the fact that it actually serves a useful purpose, i.e., as a DmaLib library class resolution for drivers that control hardware that may only be cache coherent or in some cases (i.e., on some platforms but not on others). Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel Reviewed-by: Leif Lindholm --- EmbeddedPkg/EmbeddedPkg.dsc = | 2 +- EmbeddedPkg/Library/{NullDmaLib/NullDmaLib.c =3D> CoherentDmaLib/CoherentD= maLib.c} | 0 EmbeddedPkg/Library/{NullDmaLib/NullDmaLib.inf =3D> CoherentDmaLib/Coheren= tDmaLib.inf} | 20 ++++++-------------- 3 files changed, 7 insertions(+), 15 deletions(-) diff --git a/EmbeddedPkg/EmbeddedPkg.dsc b/EmbeddedPkg/EmbeddedPkg.dsc index 4a34e34843ad..84c5a842e37e 100644 --- a/EmbeddedPkg/EmbeddedPkg.dsc +++ b/EmbeddedPkg/EmbeddedPkg.dsc @@ -250,7 +250,7 @@ [Components.common] EmbeddedPkg/Library/TemplateResetSystemLib/TemplateResetSystemLib.inf EmbeddedPkg/Library/TemplateRealTimeClockLib/TemplateRealTimeClockLib.inf EmbeddedPkg/Library/LzmaHobCustomDecompressLib/LzmaHobCustomDecompressLi= b.inf - EmbeddedPkg/Library/NullDmaLib/NullDmaLib.inf + EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.inf EmbeddedPkg/Library/DxeDtPlatformDtbLoaderLibDefault/DxeDtPlatformDtbLoa= derLibDefault.inf =20 EmbeddedPkg/Ebl/Ebl.inf diff --git a/EmbeddedPkg/Library/NullDmaLib/NullDmaLib.c b/EmbeddedPkg/Libr= ary/CoherentDmaLib/CoherentDmaLib.c similarity index 100% rename from EmbeddedPkg/Library/NullDmaLib/NullDmaLib.c rename to EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.c diff --git a/EmbeddedPkg/Library/NullDmaLib/NullDmaLib.inf b/EmbeddedPkg/Li= brary/CoherentDmaLib/CoherentDmaLib.inf similarity index 78% rename from EmbeddedPkg/Library/NullDmaLib/NullDmaLib.inf rename to EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.inf index 38261d5ede2b..c40a600cf6a3 100644 --- a/EmbeddedPkg/Library/NullDmaLib/NullDmaLib.inf +++ b/EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.inf @@ -1,6 +1,8 @@ #/** @file # # Copyright (c) 2008 - 2010, Apple Inc. All rights reserved.
+# Copyright (c) 2017, Linaro, Ltd. All rights reserved.
+# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License # which accompanies this distribution. The full text of the license may = be found at @@ -12,15 +14,15 @@ #**/ =20 [Defines] - INF_VERSION =3D 0x00010005 - BASE_NAME =3D NullDmaLib + INF_VERSION =3D 0x00010019 + BASE_NAME =3D CoherentDmaLib FILE_GUID =3D 0F2A0816-D319-4ee7-A6B8-D58524E4428F MODULE_TYPE =3D BASE VERSION_STRING =3D 1.0 LIBRARY_CLASS =3D DmaLib =20 -[Sources.common] - NullDmaLib.c +[Sources] + CoherentDmaLib.c =20 [Packages] MdePkg/MdePkg.dec @@ -29,13 +31,3 @@ [Packages] [LibraryClasses] DebugLib MemoryAllocationLib - - -[Protocols] - -[Guids] - -[Pcd] - -[Depex] - TRUE --=20 2.11.0 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Thu Dec 26 12:34:06 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1504081287202797.2214533410524; Wed, 30 Aug 2017 01:21:27 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 3C61221E95E1B; Wed, 30 Aug 2017 01:18:41 -0700 (PDT) Received: from mail-wr0-x22d.google.com (mail-wr0-x22d.google.com [IPv6:2a00:1450:400c:c0c::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id AAF2421E95E0F for ; Wed, 30 Aug 2017 01:18:39 -0700 (PDT) Received: by mail-wr0-x22d.google.com with SMTP id k9so4035687wre.4 for ; Wed, 30 Aug 2017 01:21:21 -0700 (PDT) Received: from localhost.localdomain ([105.133.189.215]) by smtp.gmail.com with ESMTPSA id h8sm3051642wma.46.2017.08.30.01.21.18 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 30 Aug 2017 01:21:18 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=SgtBES6SoFg23UKzdJujgYroDdhbOcZqSjp3kaa8R+A=; b=R5b//KOwKBnGJ5lcED39JT21ICC4T7APPBx4JVupzkMZo+PBRKKpCVKrOIz8DuA9n4 oYeP0w+dOA49eGxvqRq4up7EOmbSfEbK2IpOqFx8wz0W2xPD7cS0jgIjlyfwgHiuo6a7 IjkSK5C8VN1b4d3pTrocTAIHeNstxCmZCyks8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=SgtBES6SoFg23UKzdJujgYroDdhbOcZqSjp3kaa8R+A=; b=QajPVR4AYbiW7XgzMniZRG+TeZpuLAgC0BbybFn4fGydDF2Z8QmTiW79kJJloBfHS+ QigaNSLuIuSSoZA4MDFgrVyjO69Ysl2Cf3S9BYOQ1XvF/AEJXpgYYm/gYrao+7nINq03 FY/h5WouZeEtOPC2ZFJVUWQ12a8GheoqgaAuOAHoYDbfMf7GyjJoj3vyqubTtsVio80U qfRHPWbseNT0XBv4uQr8tycCC2HoI6iTwYQ6E2uGeiMYffrFgjEQ+bNt5z5weHU4zXAc /Hcx8WWWHA2ybCqdOrrAZp7wav10D1vTzjnXhxdch/1ceOB194XJtfk6hTFdib2WvWMp eJsw== X-Gm-Message-State: AHYfb5gwuigx1ytg4Sb8Ba0kSxRM/w01cNbXfXo+AHnW0jqew079evhm SGEi5moPBPUpikm9eaWI0g== X-Received: by 10.223.132.39 with SMTP id 36mr538117wrf.69.1504081279505; Wed, 30 Aug 2017 01:21:19 -0700 (PDT) From: Ard Biesheuvel To: edk2-devel@lists.01.org, leif.lindholm@linaro.org Date: Wed, 30 Aug 2017 09:21:04 +0100 Message-Id: <20170830082108.7470-3-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20170830082108.7470-1-ard.biesheuvel@linaro.org> References: <20170830082108.7470-1-ard.biesheuvel@linaro.org> Subject: [edk2] [PATCH 2/6] EmbeddedPkg/CoherentDmaLib: add support for non-1:1 DMA translation X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Ard Biesheuvel MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" Bring CoherentDmaLib in line with ArmDmaLib, and add support for defining a static offset between the host's and the bus master's view of memory. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel Reviewed-by: Leif Lindholm --- EmbeddedPkg/EmbeddedPkg.dec | 7 +++++++ EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.c | 10 +++++++++- EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.inf | 3 +++ 3 files changed, 19 insertions(+), 1 deletion(-) diff --git a/EmbeddedPkg/EmbeddedPkg.dec b/EmbeddedPkg/EmbeddedPkg.dec index 8ad2a84c045c..ccdf38e36a8c 100644 --- a/EmbeddedPkg/EmbeddedPkg.dec +++ b/EmbeddedPkg/EmbeddedPkg.dec @@ -208,3 +208,10 @@ [PcdsFixedAtBuild.X64] =20 [PcdsFixedAtBuild.common, PcdsDynamic.common] gEmbeddedTokenSpaceGuid.PcdFdtDevicePaths|L""|VOID*|0x00000055 + + # + # Value to add to a host address to obtain a device address, using + # unsigned 64-bit integer arithmetic. This means we can rely on + # truncation on overflow to specify negative offsets. + # + gEmbeddedTokenSpaceGuid.PcdDmaDeviceOffset|0x0|UINT64|0x0000058 diff --git a/EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.c b/Embedded= Pkg/Library/CoherentDmaLib/CoherentDmaLib.c index 4cbe349190a9..564db83c901c 100644 --- a/EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.c +++ b/EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.c @@ -19,6 +19,14 @@ #include =20 =20 +STATIC +PHYSICAL_ADDRESS +HostToDeviceAddress ( + IN VOID *Address + ) +{ + return (PHYSICAL_ADDRESS)(UINTN)Address + PcdGet64 (PcdDmaDeviceOffset); +} =20 /** Provides the DMA controller-specific addresses needed to access system m= emory. @@ -50,7 +58,7 @@ DmaMap ( OUT VOID **Mapping ) { - *DeviceAddress =3D (PHYSICAL_ADDRESS)(UINTN)HostAddress; + *DeviceAddress =3D HostToDeviceAddress (HostAddress); *Mapping =3D NULL; return EFI_SUCCESS; } diff --git a/EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.inf b/Embedd= edPkg/Library/CoherentDmaLib/CoherentDmaLib.inf index c40a600cf6a3..f64d780e16ed 100644 --- a/EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.inf +++ b/EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.inf @@ -31,3 +31,6 @@ [Packages] [LibraryClasses] DebugLib MemoryAllocationLib + +[Pcd] + gEmbeddedTokenSpaceGuid.PcdDmaDeviceOffset --=20 2.11.0 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Thu Dec 26 12:34:06 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1504081290483567.8955291159422; Wed, 30 Aug 2017 01:21:30 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 785D621E95E1F; Wed, 30 Aug 2017 01:18:43 -0700 (PDT) Received: from mail-wm0-x22a.google.com (mail-wm0-x22a.google.com [IPv6:2a00:1450:400c:c09::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 8066921CE748D for ; Wed, 30 Aug 2017 01:18:42 -0700 (PDT) Received: by mail-wm0-x22a.google.com with SMTP id e62so41193wma.0 for ; Wed, 30 Aug 2017 01:21:23 -0700 (PDT) Received: from localhost.localdomain ([105.133.189.215]) by smtp.gmail.com with ESMTPSA id h8sm3051642wma.46.2017.08.30.01.21.19 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 30 Aug 2017 01:21:20 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=w+mcBc8HJUBKAOGbwM5mTjs+aOMJTAFuhmnMjx7c4Yw=; b=NF9aVs0KvJRmM4EU2ZBsvV82CBqtFsU0ShXPiePlRgBZ18qfpL+EwHEHz7oJGaNnqD gxnuDW27hsZRH+w4XpI/zXBcaYGYtytmP/ANSAJ0NlJ+X4EocHJLrRjhFdPpu2tZ5z07 /TABMe8R92ZiZ7iHx1CQI8XHqFst46ANgiYD0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=w+mcBc8HJUBKAOGbwM5mTjs+aOMJTAFuhmnMjx7c4Yw=; b=NDCkfSzj6fFskwGxKeR8Fic4TJurL8OXq2wkkOFLJa8cJTVClCU9DB4EO1SKHn3HUb FGpZSDvIPgPtCgTw9pa1iL++Yrga9NRLLsBIuA9WgwhOfkFF+8d78CcnZTZ8VFc45a+d xbHeLNevAHwuikY99ComNlh+ExqKM6dhaBDRH2o1ukif/fg4QNLmrl2wy0roUihUpPvO jJu27/CvWEW4E0XtqnrpDJaUG26NAKtI7h9yxdaaNmTxhwis8EydkjmuSreQ0Cruy48J lAO+uEpV16wk/NmcOpsSDicwO2LiHuSTIQRBgLSoWJMNoXbepTtt8Pb2kfN0YtKNDUFo W+Og== X-Gm-Message-State: AHYfb5i86IylfX9Ntc8V9e/2AlxmrdoVeo94OlK50fQITn2wc39tP1m0 n7nVz9ABgQqGMvBUjFMPsQ== X-Received: by 10.28.129.67 with SMTP id c64mr883699wmd.79.1504081282015; Wed, 30 Aug 2017 01:21:22 -0700 (PDT) From: Ard Biesheuvel To: edk2-devel@lists.01.org, leif.lindholm@linaro.org Date: Wed, 30 Aug 2017 09:21:05 +0100 Message-Id: <20170830082108.7470-4-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20170830082108.7470-1-ard.biesheuvel@linaro.org> References: <20170830082108.7470-1-ard.biesheuvel@linaro.org> Subject: [edk2] [PATCH 3/6] EmbeddedPkg: implement NonCoherentDmaLib based on ArmDmaLib X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Ard Biesheuvel MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" The non-coherent DmaLib implementation in ArmDmaLib no longer relies on anything in ArmPkg. So clone it into EmbeddedPkg, and rename it to NonCoherentDmaLib. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel Reviewed-by: Leif Lindholm --- EmbeddedPkg/EmbeddedPkg.dsc | 1 + EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.c | 491 ++++++++= ++++++++++++ EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.inf | 50 ++ 3 files changed, 542 insertions(+) diff --git a/EmbeddedPkg/EmbeddedPkg.dsc b/EmbeddedPkg/EmbeddedPkg.dsc index 84c5a842e37e..012721a332f4 100644 --- a/EmbeddedPkg/EmbeddedPkg.dsc +++ b/EmbeddedPkg/EmbeddedPkg.dsc @@ -251,6 +251,7 @@ [Components.common] EmbeddedPkg/Library/TemplateRealTimeClockLib/TemplateRealTimeClockLib.inf EmbeddedPkg/Library/LzmaHobCustomDecompressLib/LzmaHobCustomDecompressLi= b.inf EmbeddedPkg/Library/CoherentDmaLib/CoherentDmaLib.inf + EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.inf EmbeddedPkg/Library/DxeDtPlatformDtbLoaderLibDefault/DxeDtPlatformDtbLoa= derLibDefault.inf =20 EmbeddedPkg/Ebl/Ebl.inf diff --git a/EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.c b/Em= beddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.c new file mode 100644 index 000000000000..08b9c017f426 --- /dev/null +++ b/EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.c @@ -0,0 +1,491 @@ +/** @file + + Generic non-coherent implementation of DmaLib.h + + Copyright (c) 2008 - 2010, Apple Inc. All rights reserved.
+ Copyright (c) 2015 - 2017, Linaro, Ltd. All rights reserved.
+ + This program and the accompanying materials are licensed and made + available under the terms and conditions of the BSD License which + accompanies this distribution. The full text of the license may be + found at http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR + IMPLIED. + +**/ + +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include + +typedef struct { + EFI_PHYSICAL_ADDRESS HostAddress; + VOID *BufferAddress; + UINTN NumberOfBytes; + DMA_MAP_OPERATION Operation; + BOOLEAN DoubleBuffer; +} MAP_INFO_INSTANCE; + + +typedef struct { + LIST_ENTRY Link; + VOID *HostAddress; + UINTN NumPages; + UINT64 Attributes; +} UNCACHED_ALLOCATION; + +STATIC EFI_CPU_ARCH_PROTOCOL *mCpu; +STATIC LIST_ENTRY UncachedAllocationList; + +STATIC +PHYSICAL_ADDRESS +HostToDeviceAddress ( + IN VOID *Address + ) +{ + return (PHYSICAL_ADDRESS)(UINTN)Address + PcdGet64 (PcdDmaDeviceOffset); +} + +/** + Provides the DMA controller-specific addresses needed to access system m= emory. + + Operation is relative to the DMA bus master. + + @param Operation Indicates if the bus master is going to re= ad or + write to system memory. + @param HostAddress The system memory address to map to the DMA + controller. + @param NumberOfBytes On input the number of bytes to map. On ou= tput + the number of bytes that were mapped. + @param DeviceAddress The resulting map address for the bus mast= er + controller to use to access the host's + HostAddress. + @param Mapping A resulting value to pass to Unmap(). + + @retval EFI_SUCCESS The range was mapped for the returned + NumberOfBytes. + @retval EFI_UNSUPPORTED The HostAddress cannot be mapped as a comm= on + buffer. + @retval EFI_INVALID_PARAMETER One or more parameters are invalid. + @retval EFI_OUT_OF_RESOURCES The request could not be completed due to = a lack + of resources. + @retval EFI_DEVICE_ERROR The system hardware could not map the requ= ested + address. + +**/ +EFI_STATUS +EFIAPI +DmaMap ( + IN DMA_MAP_OPERATION Operation, + IN VOID *HostAddress, + IN OUT UINTN *NumberOfBytes, + OUT PHYSICAL_ADDRESS *DeviceAddress, + OUT VOID **Mapping + ) +{ + EFI_STATUS Status; + MAP_INFO_INSTANCE *Map; + VOID *Buffer; + EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor; + UINTN AllocSize; + + if (HostAddress =3D=3D NULL || + NumberOfBytes =3D=3D NULL || + DeviceAddress =3D=3D NULL || + Mapping =3D=3D NULL ) { + return EFI_INVALID_PARAMETER; + } + + if (Operation >=3D MapOperationMaximum) { + return EFI_INVALID_PARAMETER; + } + + *DeviceAddress =3D HostToDeviceAddress (HostAddress); + + // Remember range so we can flush on the other side + Map =3D AllocatePool (sizeof (MAP_INFO_INSTANCE)); + if (Map =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + + if (Operation !=3D MapOperationBusMasterRead && + ((((UINTN)HostAddress & (mCpu->DmaBufferAlignment - 1)) !=3D 0) || + ((*NumberOfBytes & (mCpu->DmaBufferAlignment - 1)) !=3D 0))) { + + // Get the cacheability of the region + Status =3D gDS->GetMemorySpaceDescriptor ((UINTN)HostAddress, &GcdDesc= riptor); + if (EFI_ERROR(Status)) { + goto FreeMapInfo; + } + + // If the mapped buffer is not an uncached buffer + if ((GcdDescriptor.Attributes & (EFI_MEMORY_WB | EFI_MEMORY_WT)) !=3D = 0) { + // + // Operations of type MapOperationBusMasterCommonBuffer are only all= owed + // on uncached buffers. + // + if (Operation =3D=3D MapOperationBusMasterCommonBuffer) { + DEBUG ((DEBUG_ERROR, + "%a: Operation type 'MapOperationBusMasterCommonBuffer' is only " + "supported\non memory regions that were allocated using " + "DmaAllocateBuffer ()\n", __FUNCTION__)); + Status =3D EFI_UNSUPPORTED; + goto FreeMapInfo; + } + + // + // If the buffer does not fill entire cache lines we must double buf= fer + // into a suitably aligned allocation that allows us to invalidate t= he + // cache without running the risk of corrupting adjacent unrelated d= ata. + // Note that pool allocations are guaranteed to be 8 byte aligned, so + // we only have to add (alignment - 8) worth of padding. + // + Map->DoubleBuffer =3D TRUE; + AllocSize =3D ALIGN_VALUE (*NumberOfBytes, mCpu->DmaBufferAlignment)= + + (mCpu->DmaBufferAlignment - 8); + Map->BufferAddress =3D AllocatePool (AllocSize); + if (Map->BufferAddress =3D=3D NULL) { + Status =3D EFI_OUT_OF_RESOURCES; + goto FreeMapInfo; + } + + Buffer =3D ALIGN_POINTER (Map->BufferAddress, mCpu->DmaBufferAlignme= nt); + *DeviceAddress =3D HostToDeviceAddress (Buffer); + + // + // Get rid of any dirty cachelines covering the double buffer. This + // prevents them from being written back unexpectedly, potentially + // overwriting the data we receive from the device. + // + mCpu->FlushDataCache (mCpu, (UINTN)Buffer, *NumberOfBytes, + EfiCpuFlushTypeWriteBack); + } else { + Map->DoubleBuffer =3D FALSE; + } + } else { + Map->DoubleBuffer =3D FALSE; + + DEBUG_CODE_BEGIN (); + + // + // The operation type check above only executes if the buffer happens = to be + // misaligned with respect to CWG, but even if it is aligned, we shoul= d not + // allow arbitrary buffers to be used for creating consistent mappings. + // So duplicate the check here when running in DEBUG mode, just to ass= ert + // that we are not trying to create a consistent mapping for cached me= mory. + // + Status =3D gDS->GetMemorySpaceDescriptor ((UINTN)HostAddress, &GcdDesc= riptor); + ASSERT_EFI_ERROR(Status); + + ASSERT (Operation !=3D MapOperationBusMasterCommonBuffer || + (GcdDescriptor.Attributes & (EFI_MEMORY_WB | EFI_MEMORY_WT)) = =3D=3D 0); + + DEBUG_CODE_END (); + + // Flush the Data Cache (should not have any effect if the memory regi= on is + // uncached) + mCpu->FlushDataCache (mCpu, (UINTN)HostAddress, *NumberOfBytes, + EfiCpuFlushTypeWriteBackInvalidate); + } + + Map->HostAddress =3D (UINTN)HostAddress; + Map->NumberOfBytes =3D *NumberOfBytes; + Map->Operation =3D Operation; + + *Mapping =3D Map; + + return EFI_SUCCESS; + +FreeMapInfo: + FreePool (Map); + + return Status; +} + + +/** + Completes the DmaMapBusMasterRead(), DmaMapBusMasterWrite(), or + DmaMapBusMasterCommonBuffer() operation and releases any corresponding + resources. + + @param Mapping The mapping value returned from DmaMap*(). + + @retval EFI_SUCCESS The range was unmapped. + @retval EFI_DEVICE_ERROR The data was not committed to the target s= ystem + memory. + @retval EFI_INVALID_PARAMETER An inconsistency was detected between the + mapping type and the DoubleBuffer field + +**/ +EFI_STATUS +EFIAPI +DmaUnmap ( + IN VOID *Mapping + ) +{ + MAP_INFO_INSTANCE *Map; + EFI_STATUS Status; + VOID *Buffer; + + if (Mapping =3D=3D NULL) { + ASSERT (FALSE); + return EFI_INVALID_PARAMETER; + } + + Map =3D (MAP_INFO_INSTANCE *)Mapping; + + Status =3D EFI_SUCCESS; + if (Map->DoubleBuffer) { + ASSERT (Map->Operation =3D=3D MapOperationBusMasterWrite); + + if (Map->Operation !=3D MapOperationBusMasterWrite) { + Status =3D EFI_INVALID_PARAMETER; + } else { + Buffer =3D ALIGN_POINTER (Map->BufferAddress, mCpu->DmaBufferAlignme= nt); + + mCpu->FlushDataCache (mCpu, (UINTN)Buffer, Map->NumberOfBytes, + EfiCpuFlushTypeInvalidate); + + CopyMem ((VOID *)(UINTN)Map->HostAddress, Buffer, Map->NumberOfBytes= ); + + FreePool (Map->BufferAddress); + } + } else { + if (Map->Operation =3D=3D MapOperationBusMasterWrite) { + // + // Make sure we read buffer from uncached memory and not the cache + // + mCpu->FlushDataCache (mCpu, Map->HostAddress, Map->NumberOfBytes, + EfiCpuFlushTypeInvalidate); + } + } + + FreePool (Map); + + return Status; +} + +/** + Allocates pages that are suitable for an DmaMap() of type + MapOperationBusMasterCommonBuffer mapping. + + @param MemoryType The type of memory to allocate, + EfiBootServicesData or EfiRuntimeServicesD= ata. + @param Pages The number of pages to allocate. + @param HostAddress A pointer to store the base system memory + address of the allocated range. + + @retval EFI_SUCCESS The requested memory pages were allocated. + @retval EFI_INVALID_PARAMETER One or more parameters are invalid. + @retval EFI_OUT_OF_RESOURCES The memory pages could not be allocated. + +**/ +EFI_STATUS +EFIAPI +DmaAllocateBuffer ( + IN EFI_MEMORY_TYPE MemoryType, + IN UINTN Pages, + OUT VOID **HostAddress + ) +{ + return DmaAllocateAlignedBuffer (MemoryType, Pages, 0, HostAddress); +} + +/** + Allocates pages that are suitable for an DmaMap() of type + MapOperationBusMasterCommonBuffer mapping, at the requested alignment. + + @param MemoryType The type of memory to allocate, + EfiBootServicesData or EfiRuntimeServicesD= ata. + @param Pages The number of pages to allocate. + @param Alignment Alignment in bytes of the base of the retu= rned + buffer (must be a power of 2) + @param HostAddress A pointer to store the base system memory + address of the allocated range. + + @retval EFI_SUCCESS The requested memory pages were allocated. + @retval EFI_INVALID_PARAMETER One or more parameters are invalid. + @retval EFI_OUT_OF_RESOURCES The memory pages could not be allocated. + +**/ +EFI_STATUS +EFIAPI +DmaAllocateAlignedBuffer ( + IN EFI_MEMORY_TYPE MemoryType, + IN UINTN Pages, + IN UINTN Alignment, + OUT VOID **HostAddress + ) +{ + EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor; + VOID *Allocation; + UINT64 MemType; + UNCACHED_ALLOCATION *Alloc; + EFI_STATUS Status; + + if (Alignment =3D=3D 0) { + Alignment =3D EFI_PAGE_SIZE; + } + + if (HostAddress =3D=3D NULL || + (Alignment & (Alignment - 1)) !=3D 0) { + return EFI_INVALID_PARAMETER; + } + + if (MemoryType =3D=3D EfiBootServicesData) { + Allocation =3D AllocateAlignedPages (Pages, Alignment); + } else if (MemoryType =3D=3D EfiRuntimeServicesData) { + Allocation =3D AllocateAlignedRuntimePages (Pages, Alignment); + } else { + return EFI_INVALID_PARAMETER; + } + + if (Allocation =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + + // Get the cacheability of the region + Status =3D gDS->GetMemorySpaceDescriptor ((UINTN)Allocation, &GcdDescrip= tor); + if (EFI_ERROR(Status)) { + goto FreeBuffer; + } + + // Choose a suitable uncached memory type that is supported by the region + if (GcdDescriptor.Capabilities & EFI_MEMORY_WC) { + MemType =3D EFI_MEMORY_WC; + } else if (GcdDescriptor.Capabilities & EFI_MEMORY_UC) { + MemType =3D EFI_MEMORY_UC; + } else { + Status =3D EFI_UNSUPPORTED; + goto FreeBuffer; + } + + Alloc =3D AllocatePool (sizeof *Alloc); + if (Alloc =3D=3D NULL) { + goto FreeBuffer; + } + + Alloc->HostAddress =3D Allocation; + Alloc->NumPages =3D Pages; + Alloc->Attributes =3D GcdDescriptor.Attributes; + + InsertHeadList (&UncachedAllocationList, &Alloc->Link); + + // Remap the region with the new attributes + Status =3D gDS->SetMemorySpaceAttributes ((PHYSICAL_ADDRESS)(UINTN)Alloc= ation, + EFI_PAGES_TO_SIZE (Pages), + MemType); + if (EFI_ERROR (Status)) { + goto FreeAlloc; + } + + Status =3D mCpu->FlushDataCache (mCpu, + (PHYSICAL_ADDRESS)(UINTN)Allocation, + EFI_PAGES_TO_SIZE (Pages), + EfiCpuFlushTypeInvalidate); + if (EFI_ERROR (Status)) { + goto FreeAlloc; + } + + *HostAddress =3D Allocation; + + return EFI_SUCCESS; + +FreeAlloc: + RemoveEntryList (&Alloc->Link); + FreePool (Alloc); + +FreeBuffer: + FreePages (Allocation, Pages); + return Status; +} + + +/** + Frees memory that was allocated with DmaAllocateBuffer(). + + @param Pages The number of pages to free. + @param HostAddress The base system memory address of the allo= cated + range. + + @retval EFI_SUCCESS The requested memory pages were freed. + @retval EFI_INVALID_PARAMETER The memory range specified by HostAddress = and + Pages was not allocated with + DmaAllocateBuffer(). + +**/ +EFI_STATUS +EFIAPI +DmaFreeBuffer ( + IN UINTN Pages, + IN VOID *HostAddress + ) +{ + LIST_ENTRY *Link; + UNCACHED_ALLOCATION *Alloc; + BOOLEAN Found; + EFI_STATUS Status; + + if (HostAddress =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + for (Link =3D GetFirstNode (&UncachedAllocationList), Found =3D FALSE; + !IsNull (&UncachedAllocationList, Link); + Link =3D GetNextNode (&UncachedAllocationList, Link)) { + + Alloc =3D BASE_CR (Link, UNCACHED_ALLOCATION, Link); + if (Alloc->HostAddress =3D=3D HostAddress && Alloc->NumPages =3D=3D Pa= ges) { + Found =3D TRUE; + break; + } + } + + if (!Found) { + ASSERT (FALSE); + return EFI_INVALID_PARAMETER; + } + + RemoveEntryList (&Alloc->Link); + + Status =3D gDS->SetMemorySpaceAttributes ((PHYSICAL_ADDRESS)(UINTN)HostA= ddress, + EFI_PAGES_TO_SIZE (Pages), + Alloc->Attributes); + if (EFI_ERROR (Status)) { + goto FreeAlloc; + } + + // + // If we fail to restore the original attributes, it is better to leak t= he + // memory than to return it to the heap + // + FreePages (HostAddress, Pages); + +FreeAlloc: + FreePool (Alloc); + return Status; +} + + +EFI_STATUS +EFIAPI +NonCoherentDmaLibConstructor ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +{ + InitializeListHead (&UncachedAllocationList); + + // Get the Cpu protocol for later use + return gBS->LocateProtocol (&gEfiCpuArchProtocolGuid, NULL, (VOID **)&mC= pu); +} diff --git a/EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.inf b/= EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.inf new file mode 100644 index 000000000000..9f430d6c3721 --- /dev/null +++ b/EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.inf @@ -0,0 +1,50 @@ +#/** @file +# +# Generic non-coherent implementation of DmaLib.h +# +# Copyright (c) 2008 - 2010, Apple Inc. All rights reserved.
+# Copyright (c) 2015 - 2017, Linaro, Ltd. All rights reserved.
+# +# This program and the accompanying materials are licensed and made +# available under the terms and conditions of the BSD License which +# accompanies this distribution. The full text of the license may be +# found at http://opensource.org/licenses/bsd-license.php +# +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR +# IMPLIED. +# +#**/ + +[Defines] + INF_VERSION =3D 0x00010019 + BASE_NAME =3D NonCoherentDmaLib + FILE_GUID =3D 43ad4920-db15-4e24-9889-2db568431fbd + MODULE_TYPE =3D DXE_DRIVER + VERSION_STRING =3D 1.0 + LIBRARY_CLASS =3D DmaLib + CONSTRUCTOR =3D NonCoherentDmaLibConstructor + +[Sources] + NonCoherentDmaLib.c + +[Packages] + EmbeddedPkg/EmbeddedPkg.dec + MdePkg/MdePkg.dec + +[LibraryClasses] + BaseMemoryLib + DebugLib + DxeServicesTableLib + IoLib + MemoryAllocationLib + UefiBootServicesTableLib + +[Protocols] + gEfiCpuArchProtocolGuid + +[Pcd] + gEmbeddedTokenSpaceGuid.PcdDmaDeviceOffset + +[Depex] + gEfiCpuArchProtocolGuid --=20 2.11.0 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Thu Dec 26 12:34:06 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1504081293969891.6772645592881; Wed, 30 Aug 2017 01:21:33 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id C316E21E95E17; Wed, 30 Aug 2017 01:18:45 -0700 (PDT) Received: from mail-wr0-x22e.google.com (mail-wr0-x22e.google.com [IPv6:2a00:1450:400c:c0c::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id A7CE621CE748D for ; Wed, 30 Aug 2017 01:18:43 -0700 (PDT) Received: by mail-wr0-x22e.google.com with SMTP id 40so15791229wrv.5 for ; Wed, 30 Aug 2017 01:21:25 -0700 (PDT) Received: from localhost.localdomain ([105.133.189.215]) by smtp.gmail.com with ESMTPSA id h8sm3051642wma.46.2017.08.30.01.21.22 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 30 Aug 2017 01:21:22 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=2j4k4SAyLPHjr3TtxjkoXPKGWN1eEaxXzdL3pCmMCEg=; b=V+E25679YlEfp+PO91CYCxqqvnp4rlQuqs6GquFJlD74Oy/Xhvih6zhSfODNNN/zF0 Tg8s8cRm97jdjZsI7SYK3OuSKa2ppjCacLAO043kpJzxXGGBORTOMK3OwWs0nLMTZ5dv pkqhYpEeFHHMS3dVFAAMhvymK2wRyUCMe+N1w= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=2j4k4SAyLPHjr3TtxjkoXPKGWN1eEaxXzdL3pCmMCEg=; b=SdJUFHcGVAAVTqU79t1GF+ZYVxRkn/08MyK3gwWrbXaUG10WeEFN+v3Pi7l4SGkBNM meZCu5Yack8mIAmYx+D7CsBbTCrt3HZEu8jeCseXVjKNAvSm0U0KZEThvCb5nUn19oGu meVEuscMdeiy0BuQwK1L4lSMpMSdR8R21sWmIk4hH6Rk86Ed7jbCH8fqCA0g9p8TLlp8 hye24Qfqwmsz+nYIUgtkzr+SqxRCDvhxE3n81+G/nUhc+WU+zR5232lBZBEIjSOp89OH FenLxtAksftL+LOiOKl2B3n/3lGOPC5UOKdRZhoEIGN7RtagNl7hOHkO23RDoYK5N7kW sdtw== X-Gm-Message-State: AHYfb5isxZVOHM3Yx53SwN3OfecX3f1KjAojxN2K7JmpHqYsH15E+8oW ruax25fsI0EPMFhF11K6tg== X-Received: by 10.223.199.135 with SMTP id l7mr611823wrg.94.1504081283549; Wed, 30 Aug 2017 01:21:23 -0700 (PDT) From: Ard Biesheuvel To: edk2-devel@lists.01.org, leif.lindholm@linaro.org Date: Wed, 30 Aug 2017 09:21:06 +0100 Message-Id: <20170830082108.7470-5-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20170830082108.7470-1-ard.biesheuvel@linaro.org> References: <20170830082108.7470-1-ard.biesheuvel@linaro.org> Subject: [edk2] [PATCH 4/6] Omap35xxPkg: switch to EmbeddedPkg's NonCoherentDmaLib X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Ard Biesheuvel MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" Replace the reference to the ARM specific ArmDmaLib with a reference to the generic NonCoherentDmaLib. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel Reviewed-by: Leif Lindholm --- Omap35xxPkg/Omap35xxPkg.dsc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Omap35xxPkg/Omap35xxPkg.dsc b/Omap35xxPkg/Omap35xxPkg.dsc index 941bc97060b9..c5d9746104e6 100644 --- a/Omap35xxPkg/Omap35xxPkg.dsc +++ b/Omap35xxPkg/Omap35xxPkg.dsc @@ -61,7 +61,7 @@ [LibraryClasses.common] DxeServicesTableLib|MdePkg/Library/DxeServicesTableLib/DxeServicesTableL= ib.inf UefiDriverEntryPoint|MdePkg/Library/UefiDriverEntryPoint/UefiDriverEntry= Point.inf UefiApplicationEntryPoint|MdePkg/Library/UefiApplicationEntryPoint/UefiA= pplicationEntryPoint.inf - DmaLib|ArmPkg/Library/ArmDmaLib/ArmDmaLib.inf + DmaLib|EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.inf =20 TimerLib|Omap35xxPkg/Library/Omap35xxTimerLib/Omap35xxTimerLib.inf =20 --=20 2.11.0 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Thu Dec 26 12:34:06 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1504081297394402.08473514568254; Wed, 30 Aug 2017 01:21:37 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 182C221CE748D; Wed, 30 Aug 2017 01:18:47 -0700 (PDT) Received: from mail-wr0-x232.google.com (mail-wr0-x232.google.com [IPv6:2a00:1450:400c:c0c::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id EC5A321CE748D for ; Wed, 30 Aug 2017 01:18:45 -0700 (PDT) Received: by mail-wr0-x232.google.com with SMTP id z91so16347382wrc.1 for ; Wed, 30 Aug 2017 01:21:27 -0700 (PDT) Received: from localhost.localdomain ([105.133.189.215]) by smtp.gmail.com with ESMTPSA id h8sm3051642wma.46.2017.08.30.01.21.23 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 30 Aug 2017 01:21:24 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=JEqthR6gIBJKSfb/I1iP++2EXRabkcc6JkbwHgIKo0M=; b=HmGu8t9qeyVSDvAPSsYvR1wC1eV3W2agga8zVgvtpILlAx2FMGdnTUnfj35a/+QLVq GWNwCa8wPj5xf4yfle9hRYD4P2WUyHbtPQgAquJAf29gMZla4YMC5yry5qfQHJfB6dkb mIuW1z9Rxrqh8rZUG7/r7fMwvKIBnr2dh1ThY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=JEqthR6gIBJKSfb/I1iP++2EXRabkcc6JkbwHgIKo0M=; b=G89npwKKW6dZkDaBCNDpDBeEuwavcHyYY8Re9KrPZDNR2YlpMee2yOf2q8NHBuK1+A 1KAwtcSMZQHkYr5WeyZp5FD7QP6CbSqAFlHsTZ0MqW0qXH1u5o5cswXi6I6hZQG4cfi+ b1NRhU+cN/dtUKhxiVUK3TZbAy+OkYVescOHBsllFXo4m8uGxkVHr55Br3rYFFJna+oc W/Xv4W4gimcw4eDtYjwX1xHhmE7b0ahFxHWKNvewlL6OaA2ZgWZSDBMCWrwGt1/qwlXM SY/ysz58j18qIWeJFbAuQu6653zxoc6bNk+eq7c43UR7aOUtg+HZrU0KOZQzmxOlFFi0 6Tkw== X-Gm-Message-State: AHYfb5hy4Ta+gT5sfYxLkHRSOthCIyBeFY5DdeM+3x0yMHbFTEY8GTd1 DcwWQKFuGof9fHufyOofUg== X-Received: by 10.223.192.14 with SMTP id z14mr510846wre.292.1504081285661; Wed, 30 Aug 2017 01:21:25 -0700 (PDT) From: Ard Biesheuvel To: edk2-devel@lists.01.org, leif.lindholm@linaro.org Date: Wed, 30 Aug 2017 09:21:07 +0100 Message-Id: <20170830082108.7470-6-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20170830082108.7470-1-ard.biesheuvel@linaro.org> References: <20170830082108.7470-1-ard.biesheuvel@linaro.org> Subject: [edk2] [PATCH 5/6] BeagleBoardPkg: switch to generic non-coherent DmaLib X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Ard Biesheuvel MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" Replace the reference to the ARM specific ArmDmaLib with a reference to the generic NonCoherentDmaLib. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel Reviewed-by: Leif Lindholm --- BeagleBoardPkg/BeagleBoardPkg.dsc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/BeagleBoardPkg/BeagleBoardPkg.dsc b/BeagleBoardPkg/BeagleBoard= Pkg.dsc index 84aae84ff52d..30f6fd02e82f 100644 --- a/BeagleBoardPkg/BeagleBoardPkg.dsc +++ b/BeagleBoardPkg/BeagleBoardPkg.dsc @@ -122,7 +122,7 @@ [LibraryClasses.common] GdbSerialLib|Omap35xxPkg/Library/GdbSerialLib/GdbSerialLib.inf ArmDisassemblerLib|ArmPkg/Library/ArmDisassemblerLib/ArmDisassemblerLib.= inf DebugAgentLib|MdeModulePkg/Library/DebugAgentLibNull/DebugAgentLibNull.i= nf - DmaLib|ArmPkg/Library/ArmDmaLib/ArmDmaLib.inf + DmaLib|EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.inf =20 NetLib|MdeModulePkg/Library/DxeNetLib/DxeNetLib.inf FdtLib|EmbeddedPkg/Library/FdtLib/FdtLib.inf --=20 2.11.0 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel From nobody Thu Dec 26 12:34:06 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1504081300615645.2971054226612; Wed, 30 Aug 2017 01:21:40 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 59A0A21E95E16; Wed, 30 Aug 2017 01:18:50 -0700 (PDT) Received: from mail-wr0-x22b.google.com (mail-wr0-x22b.google.com [IPv6:2a00:1450:400c:c0c::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 773F421E95E0F for ; Wed, 30 Aug 2017 01:18:48 -0700 (PDT) Received: by mail-wr0-x22b.google.com with SMTP id z91so16347720wrc.1 for ; Wed, 30 Aug 2017 01:21:29 -0700 (PDT) Received: from localhost.localdomain ([105.133.189.215]) by smtp.gmail.com with ESMTPSA id h8sm3051642wma.46.2017.08.30.01.21.25 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 30 Aug 2017 01:21:27 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=k+EKEGIVzkmyX3q3eIp4Y7kOXOdZESXJltVwtae0eMI=; b=ceGfu96w/h9PxY6XtJVZrbHxPj6TCLb+nhIsXvrNArZper/eifUZsNcns+6xEAdVzv CfRrmTM7BR3abNJhypxpyWxCRyqF9fnOPe0caSP8LST/cKdgMFE9FIQvEJfYETVzaZfF LNLMtl1TMpCXzKPQz0S47uLWk+XBr1TYINdo0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=k+EKEGIVzkmyX3q3eIp4Y7kOXOdZESXJltVwtae0eMI=; b=B7x4OB3Wy/G9w3sGEEK8CjFFH1YNrsOHSoJ8/RVrGeuVpwDk6NhjkAxlozKX+K92Ub BSCRz2vccjzSSqyWVbUqoHGEGi4Uezmfpvn9ThB/Urvjx7lxbBdls7iWBS0yRZCYREdm iMtXJfU8gygck/yiltb+Ur8SFfuKCBUY+7bNY4WvloEaFm+qYh6v31MeU9gVUvEw1ljA KxDL7qfRdoyMAZxDWFwgj9PXkEGlGqHxA0KvxZXl7TjqUFLGEA5GWPRkIgid0Ughgo76 G+7ZW2ear+SdaMu/fODm+gGw1EqWabNXVB8tFnbW2Q+Edv1aoc6eCWgldHrrb7agB/nP sF6Q== X-Gm-Message-State: AHYfb5i1/NDXOAEOKBDO9WoNTGI+Zjg/ZK6bjTedzlp75TTQdN3g7Rme d49XQZfn0j+6Uu1Lknp9eQ== X-Received: by 10.223.185.39 with SMTP id k36mr492017wrf.251.1504081287893; Wed, 30 Aug 2017 01:21:27 -0700 (PDT) From: Ard Biesheuvel To: edk2-devel@lists.01.org, leif.lindholm@linaro.org Date: Wed, 30 Aug 2017 09:21:08 +0100 Message-Id: <20170830082108.7470-7-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20170830082108.7470-1-ard.biesheuvel@linaro.org> References: <20170830082108.7470-1-ard.biesheuvel@linaro.org> Subject: [edk2] [PATCH 6/6] ArmPkg: remove ArmDmaLib X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Ard Biesheuvel MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" Now that we have a generic DmaLib implementation for non-coherent DMA, let's get rid of the ARM specific one. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel Reviewed-by: Leif Lindholm --- ArmPkg/ArmPkg.dsc | 2 - ArmPkg/Library/ArmDmaLib/ArmDmaLib.c | 478 -------------------- ArmPkg/Library/ArmDmaLib/ArmDmaLib.inf | 49 -- 3 files changed, 529 deletions(-) diff --git a/ArmPkg/ArmPkg.dsc b/ArmPkg/ArmPkg.dsc index ff2b0c074dc1..cf86f89bd702 100644 --- a/ArmPkg/ArmPkg.dsc +++ b/ArmPkg/ArmPkg.dsc @@ -72,7 +72,6 @@ [LibraryClasses.common] ArmGenericTimerCounterLib|ArmPkg/Library/ArmGenericTimerPhyCounterLib/Ar= mGenericTimerPhyCounterLib.inf ArmSmcLib|ArmPkg/Library/ArmSmcLib/ArmSmcLib.inf ArmDisassemblerLib|ArmPkg/Library/ArmDisassemblerLib/ArmDisassemblerLib.= inf - DmaLib|ArmPkg/Library/ArmDmaLib/ArmDmaLib.inf =20 UefiApplicationEntryPoint|MdePkg/Library/UefiApplicationEntryPoint/UefiA= pplicationEntryPoint.inf PerformanceLib|MdePkg/Library/BasePerformanceLibNull/BasePerformanceLibN= ull.inf @@ -106,7 +105,6 @@ [LibraryClasses.ARM, LibraryClasses.AARCH64] [Components.common] ArmPkg/Library/ArmCacheMaintenanceLib/ArmCacheMaintenanceLib.inf ArmPkg/Library/ArmDisassemblerLib/ArmDisassemblerLib.inf - ArmPkg/Library/ArmDmaLib/ArmDmaLib.inf ArmPkg/Library/BdsLib/BdsLib.inf ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf ArmPkg/Library/DebugAgentSymbolsBaseLib/DebugAgentSymbolsBaseLib.inf diff --git a/ArmPkg/Library/ArmDmaLib/ArmDmaLib.c b/ArmPkg/Library/ArmDmaLi= b/ArmDmaLib.c deleted file mode 100644 index 2a8cf0fe21a4..000000000000 --- a/ArmPkg/Library/ArmDmaLib/ArmDmaLib.c +++ /dev/null @@ -1,478 +0,0 @@ -/** @file - Generic ARM implementation of DmaLib.h - - Copyright (c) 2008 - 2010, Apple Inc. All rights reserved.
- Copyright (c) 2015 - 2017, Linaro, Ltd. All rights reserved.
- - This program and the accompanying materials - are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at - http://opensource.org/licenses/bsd-license.php - - THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, - WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. - -**/ - -#include -#include -#include -#include -#include -#include -#include -#include -#include - -#include - -typedef struct { - EFI_PHYSICAL_ADDRESS HostAddress; - VOID *BufferAddress; - UINTN NumberOfBytes; - DMA_MAP_OPERATION Operation; - BOOLEAN DoubleBuffer; -} MAP_INFO_INSTANCE; - - -typedef struct { - LIST_ENTRY Link; - VOID *HostAddress; - UINTN NumPages; - UINT64 Attributes; -} UNCACHED_ALLOCATION; - -STATIC EFI_CPU_ARCH_PROTOCOL *mCpu; -STATIC LIST_ENTRY UncachedAllocationList; - -STATIC -PHYSICAL_ADDRESS -HostToDeviceAddress ( - IN VOID *Address - ) -{ - return (PHYSICAL_ADDRESS)(UINTN)Address + PcdGet64 (PcdArmDmaDeviceOffse= t); -} - -/** - Provides the DMA controller-specific addresses needed to access system m= emory. - - Operation is relative to the DMA bus master. - - @param Operation Indicates if the bus master is going to re= ad or write to system memory. - @param HostAddress The system memory address to map to the DM= A controller. - @param NumberOfBytes On input the number of bytes to map. On ou= tput the number of bytes - that were mapped. - @param DeviceAddress The resulting map address for the bus mast= er controller to use to - access the hosts HostAddress. - @param Mapping A resulting value to pass to Unmap(). - - @retval EFI_SUCCESS The range was mapped for the returned Numb= erOfBytes. - @retval EFI_UNSUPPORTED The HostAddress cannot be mapped as a comm= on buffer. - @retval EFI_INVALID_PARAMETER One or more parameters are invalid. - @retval EFI_OUT_OF_RESOURCES The request could not be completed due to = a lack of resources. - @retval EFI_DEVICE_ERROR The system hardware could not map the requ= ested address. - -**/ -EFI_STATUS -EFIAPI -DmaMap ( - IN DMA_MAP_OPERATION Operation, - IN VOID *HostAddress, - IN OUT UINTN *NumberOfBytes, - OUT PHYSICAL_ADDRESS *DeviceAddress, - OUT VOID **Mapping - ) -{ - EFI_STATUS Status; - MAP_INFO_INSTANCE *Map; - VOID *Buffer; - EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor; - UINTN AllocSize; - - if (HostAddress =3D=3D NULL || NumberOfBytes =3D=3D NULL || DeviceAddres= s =3D=3D NULL || Mapping =3D=3D NULL ) { - return EFI_INVALID_PARAMETER; - } - - if (Operation >=3D MapOperationMaximum) { - return EFI_INVALID_PARAMETER; - } - - *DeviceAddress =3D HostToDeviceAddress (HostAddress); - - // Remember range so we can flush on the other side - Map =3D AllocatePool (sizeof (MAP_INFO_INSTANCE)); - if (Map =3D=3D NULL) { - return EFI_OUT_OF_RESOURCES; - } - - if (Operation !=3D MapOperationBusMasterRead && - ((((UINTN)HostAddress & (mCpu->DmaBufferAlignment - 1)) !=3D 0) || - ((*NumberOfBytes & (mCpu->DmaBufferAlignment - 1)) !=3D 0))) { - - // Get the cacheability of the region - Status =3D gDS->GetMemorySpaceDescriptor ((UINTN)HostAddress, &GcdDesc= riptor); - if (EFI_ERROR(Status)) { - goto FreeMapInfo; - } - - // If the mapped buffer is not an uncached buffer - if ((GcdDescriptor.Attributes & (EFI_MEMORY_WB | EFI_MEMORY_WT)) !=3D = 0) { - // - // Operations of type MapOperationBusMasterCommonBuffer are only all= owed - // on uncached buffers. - // - if (Operation =3D=3D MapOperationBusMasterCommonBuffer) { - DEBUG ((EFI_D_ERROR, - "%a: Operation type 'MapOperationBusMasterCommonBuffer' is only = supported\n" - "on memory regions that were allocated using DmaAllocateBuffer (= )\n", - __FUNCTION__)); - Status =3D EFI_UNSUPPORTED; - goto FreeMapInfo; - } - - // - // If the buffer does not fill entire cache lines we must double buf= fer - // into a suitably aligned allocation that allows us to invalidate t= he - // cache without running the risk of corrupting adjacent unrelated d= ata. - // Note that pool allocations are guaranteed to be 8 byte aligned, so - // we only have to add (alignment - 8) worth of padding. - // - Map->DoubleBuffer =3D TRUE; - AllocSize =3D ALIGN_VALUE (*NumberOfBytes, mCpu->DmaBufferAlignment)= + - (mCpu->DmaBufferAlignment - 8); - Map->BufferAddress =3D AllocatePool (AllocSize); - if (Map->BufferAddress =3D=3D NULL) { - Status =3D EFI_OUT_OF_RESOURCES; - goto FreeMapInfo; - } - - Buffer =3D ALIGN_POINTER (Map->BufferAddress, mCpu->DmaBufferAlignme= nt); - *DeviceAddress =3D HostToDeviceAddress (Buffer); - - // - // Get rid of any dirty cachelines covering the double buffer. This - // prevents them from being written back unexpectedly, potentially - // overwriting the data we receive from the device. - // - mCpu->FlushDataCache (mCpu, (UINTN)Buffer, *NumberOfBytes, - EfiCpuFlushTypeWriteBack); - } else { - Map->DoubleBuffer =3D FALSE; - } - } else { - Map->DoubleBuffer =3D FALSE; - - DEBUG_CODE_BEGIN (); - - // - // The operation type check above only executes if the buffer happens = to be - // misaligned with respect to CWG, but even if it is aligned, we shoul= d not - // allow arbitrary buffers to be used for creating consistent mappings. - // So duplicate the check here when running in DEBUG mode, just to ass= ert - // that we are not trying to create a consistent mapping for cached me= mory. - // - Status =3D gDS->GetMemorySpaceDescriptor ((UINTN)HostAddress, &GcdDesc= riptor); - ASSERT_EFI_ERROR(Status); - - ASSERT (Operation !=3D MapOperationBusMasterCommonBuffer || - (GcdDescriptor.Attributes & (EFI_MEMORY_WB | EFI_MEMORY_WT)) = =3D=3D 0); - - DEBUG_CODE_END (); - - // Flush the Data Cache (should not have any effect if the memory regi= on is uncached) - mCpu->FlushDataCache (mCpu, (UINTN)HostAddress, *NumberOfBytes, - EfiCpuFlushTypeWriteBackInvalidate); - } - - Map->HostAddress =3D (UINTN)HostAddress; - Map->NumberOfBytes =3D *NumberOfBytes; - Map->Operation =3D Operation; - - *Mapping =3D Map; - - return EFI_SUCCESS; - -FreeMapInfo: - FreePool (Map); - - return Status; -} - - -/** - Completes the DmaMapBusMasterRead(), DmaMapBusMasterWrite(), or DmaMapBu= sMasterCommonBuffer() - operation and releases any corresponding resources. - - @param Mapping The mapping value returned from DmaMap*(). - - @retval EFI_SUCCESS The range was unmapped. - @retval EFI_DEVICE_ERROR The data was not committed to the target s= ystem memory. - @retval EFI_INVALID_PARAMETER An inconsistency was detected between the = mapping type - and the DoubleBuffer field - -**/ -EFI_STATUS -EFIAPI -DmaUnmap ( - IN VOID *Mapping - ) -{ - MAP_INFO_INSTANCE *Map; - EFI_STATUS Status; - VOID *Buffer; - - if (Mapping =3D=3D NULL) { - ASSERT (FALSE); - return EFI_INVALID_PARAMETER; - } - - Map =3D (MAP_INFO_INSTANCE *)Mapping; - - Status =3D EFI_SUCCESS; - if (Map->DoubleBuffer) { - ASSERT (Map->Operation =3D=3D MapOperationBusMasterWrite); - - if (Map->Operation !=3D MapOperationBusMasterWrite) { - Status =3D EFI_INVALID_PARAMETER; - } else { - Buffer =3D ALIGN_POINTER (Map->BufferAddress, mCpu->DmaBufferAlignme= nt); - - mCpu->FlushDataCache (mCpu, (UINTN)Buffer, Map->NumberOfBytes, - EfiCpuFlushTypeInvalidate); - - CopyMem ((VOID *)(UINTN)Map->HostAddress, Buffer, Map->NumberOfBytes= ); - - FreePool (Map->BufferAddress); - } - } else { - if (Map->Operation =3D=3D MapOperationBusMasterWrite) { - // - // Make sure we read buffer from uncached memory and not the cache - // - mCpu->FlushDataCache (mCpu, Map->HostAddress, Map->NumberOfBytes, - EfiCpuFlushTypeInvalidate); - } - } - - FreePool (Map); - - return Status; -} - -/** - Allocates pages that are suitable for an DmaMap() of type MapOperationBu= sMasterCommonBuffer. - mapping. - - @param MemoryType The type of memory to allocate, EfiBootSer= vicesData or - EfiRuntimeServicesData. - @param Pages The number of pages to allocate. - @param HostAddress A pointer to store the base system memory = address of the - allocated range. - - @retval EFI_SUCCESS The requested memory pages were allocated. - @retval EFI_UNSUPPORTED Attributes is unsupported. The only legal = attribute bits are - MEMORY_WRITE_COMBINE and MEMORY_CACHED. - @retval EFI_INVALID_PARAMETER One or more parameters are invalid. - @retval EFI_OUT_OF_RESOURCES The memory pages could not be allocated. - -**/ -EFI_STATUS -EFIAPI -DmaAllocateBuffer ( - IN EFI_MEMORY_TYPE MemoryType, - IN UINTN Pages, - OUT VOID **HostAddress - ) -{ - return DmaAllocateAlignedBuffer (MemoryType, Pages, 0, HostAddress); -} - -/** - Allocates pages that are suitable for an DmaMap() of type - MapOperationBusMasterCommonBuffer mapping, at the requested alignment. - - @param MemoryType The type of memory to allocate, EfiBootSer= vicesData or - EfiRuntimeServicesData. - @param Pages The number of pages to allocate. - @param Alignment Alignment in bytes of the base of the retu= rned - buffer (must be a power of 2) - @param HostAddress A pointer to store the base system memory = address of the - allocated range. - - @retval EFI_SUCCESS The requested memory pages were allocated. - @retval EFI_UNSUPPORTED Attributes is unsupported. The only legal = attribute bits are - MEMORY_WRITE_COMBINE and MEMORY_CACHED. - @retval EFI_INVALID_PARAMETER One or more parameters are invalid. - @retval EFI_OUT_OF_RESOURCES The memory pages could not be allocated. - -**/ -EFI_STATUS -EFIAPI -DmaAllocateAlignedBuffer ( - IN EFI_MEMORY_TYPE MemoryType, - IN UINTN Pages, - IN UINTN Alignment, - OUT VOID **HostAddress - ) -{ - EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor; - VOID *Allocation; - UINT64 MemType; - UNCACHED_ALLOCATION *Alloc; - EFI_STATUS Status; - - if (Alignment =3D=3D 0) { - Alignment =3D EFI_PAGE_SIZE; - } - - if (HostAddress =3D=3D NULL || - (Alignment & (Alignment - 1)) !=3D 0) { - return EFI_INVALID_PARAMETER; - } - - if (MemoryType =3D=3D EfiBootServicesData) { - Allocation =3D AllocateAlignedPages (Pages, Alignment); - } else if (MemoryType =3D=3D EfiRuntimeServicesData) { - Allocation =3D AllocateAlignedRuntimePages (Pages, Alignment); - } else { - return EFI_INVALID_PARAMETER; - } - - if (Allocation =3D=3D NULL) { - return EFI_OUT_OF_RESOURCES; - } - - // Get the cacheability of the region - Status =3D gDS->GetMemorySpaceDescriptor ((UINTN)Allocation, &GcdDescrip= tor); - if (EFI_ERROR(Status)) { - goto FreeBuffer; - } - - // Choose a suitable uncached memory type that is supported by the region - if (GcdDescriptor.Capabilities & EFI_MEMORY_WC) { - MemType =3D EFI_MEMORY_WC; - } else if (GcdDescriptor.Capabilities & EFI_MEMORY_UC) { - MemType =3D EFI_MEMORY_UC; - } else { - Status =3D EFI_UNSUPPORTED; - goto FreeBuffer; - } - - Alloc =3D AllocatePool (sizeof *Alloc); - if (Alloc =3D=3D NULL) { - goto FreeBuffer; - } - - Alloc->HostAddress =3D Allocation; - Alloc->NumPages =3D Pages; - Alloc->Attributes =3D GcdDescriptor.Attributes; - - InsertHeadList (&UncachedAllocationList, &Alloc->Link); - - // Remap the region with the new attributes - Status =3D gDS->SetMemorySpaceAttributes ((PHYSICAL_ADDRESS)(UINTN)Alloc= ation, - EFI_PAGES_TO_SIZE (Pages), - MemType); - if (EFI_ERROR (Status)) { - goto FreeAlloc; - } - - Status =3D mCpu->FlushDataCache (mCpu, - (PHYSICAL_ADDRESS)(UINTN)Allocation, - EFI_PAGES_TO_SIZE (Pages), - EfiCpuFlushTypeInvalidate); - if (EFI_ERROR (Status)) { - goto FreeAlloc; - } - - *HostAddress =3D Allocation; - - return EFI_SUCCESS; - -FreeAlloc: - RemoveEntryList (&Alloc->Link); - FreePool (Alloc); - -FreeBuffer: - FreePages (Allocation, Pages); - return Status; -} - - -/** - Frees memory that was allocated with DmaAllocateBuffer(). - - @param Pages The number of pages to free. - @param HostAddress The base system memory address of the allo= cated range. - - @retval EFI_SUCCESS The requested memory pages were freed. - @retval EFI_INVALID_PARAMETER The memory range specified by HostAddress = and Pages - was not allocated with DmaAllocateBuffer(). - -**/ -EFI_STATUS -EFIAPI -DmaFreeBuffer ( - IN UINTN Pages, - IN VOID *HostAddress - ) -{ - LIST_ENTRY *Link; - UNCACHED_ALLOCATION *Alloc; - BOOLEAN Found; - EFI_STATUS Status; - - if (HostAddress =3D=3D NULL) { - return EFI_INVALID_PARAMETER; - } - - for (Link =3D GetFirstNode (&UncachedAllocationList), Found =3D FALSE; - !IsNull (&UncachedAllocationList, Link); - Link =3D GetNextNode (&UncachedAllocationList, Link)) { - - Alloc =3D BASE_CR (Link, UNCACHED_ALLOCATION, Link); - if (Alloc->HostAddress =3D=3D HostAddress && Alloc->NumPages =3D=3D Pa= ges) { - Found =3D TRUE; - break; - } - } - - if (!Found) { - ASSERT (FALSE); - return EFI_INVALID_PARAMETER; - } - - RemoveEntryList (&Alloc->Link); - - Status =3D gDS->SetMemorySpaceAttributes ((PHYSICAL_ADDRESS)(UINTN)HostA= ddress, - EFI_PAGES_TO_SIZE (Pages), - Alloc->Attributes); - if (EFI_ERROR (Status)) { - goto FreeAlloc; - } - - // - // If we fail to restore the original attributes, it is better to leak t= he - // memory than to return it to the heap - // - FreePages (HostAddress, Pages); - -FreeAlloc: - FreePool (Alloc); - return Status; -} - - -EFI_STATUS -EFIAPI -ArmDmaLibConstructor ( - IN EFI_HANDLE ImageHandle, - IN EFI_SYSTEM_TABLE *SystemTable - ) -{ - InitializeListHead (&UncachedAllocationList); - - // Get the Cpu protocol for later use - return gBS->LocateProtocol (&gEfiCpuArchProtocolGuid, NULL, (VOID **)&mC= pu); -} diff --git a/ArmPkg/Library/ArmDmaLib/ArmDmaLib.inf b/ArmPkg/Library/ArmDma= Lib/ArmDmaLib.inf deleted file mode 100644 index e33ed92c9d20..000000000000 --- a/ArmPkg/Library/ArmDmaLib/ArmDmaLib.inf +++ /dev/null @@ -1,49 +0,0 @@ -#/** @file -# -# Copyright (c) 2008 - 2010, Apple Inc. All rights reserved.
-# This program and the accompanying materials -# are licensed and made available under the terms and conditions of the B= SD License -# which accompanies this distribution. The full text of the license may = be found at -# http://opensource.org/licenses/bsd-license.php -# -# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, -# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. -# -#**/ - -[Defines] - INF_VERSION =3D 0x00010005 - BASE_NAME =3D ArmDmaLib - FILE_GUID =3D F1BD6B36-B705-43aa-8A28-33F58ED85EFB - MODULE_TYPE =3D UEFI_DRIVER - VERSION_STRING =3D 1.0 - LIBRARY_CLASS =3D DmaLib - CONSTRUCTOR =3D ArmDmaLibConstructor - -[Sources.common] - ArmDmaLib.c - -[Packages] - MdePkg/MdePkg.dec - EmbeddedPkg/EmbeddedPkg.dec - ArmPkg/ArmPkg.dec - - -[LibraryClasses] - DebugLib - DxeServicesTableLib - UefiBootServicesTableLib - MemoryAllocationLib - IoLib - BaseMemoryLib - -[Protocols] - gEfiCpuArchProtocolGuid - -[Guids] - -[Pcd] - gArmTokenSpaceGuid.PcdArmDmaDeviceOffset - -[Depex] - gEfiCpuArchProtocolGuid --=20 2.11.0 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel