diff options
| author | Takashi Iwai <tiwai@suse.de> | 2011-08-08 14:30:29 +0200 | 
|---|---|---|
| committer | Takashi Iwai <tiwai@suse.de> | 2011-08-08 14:30:29 +0200 | 
| commit | 0a2d31b62dba9b5b92a38c67c9cc42630513662a (patch) | |
| tree | f755d74ec85248de645e10c45ed1a2ed467530f6 /drivers/iommu/dmar.c | |
| parent | 8039290a91c5dc4414093c086987a5d7738fe2fd (diff) | |
| parent | df944f66784e6d4f2f50739263a4947885d8b6ae (diff) | |
Merge branch 'fix/kconfig' into for-linus
Diffstat (limited to 'drivers/iommu/dmar.c')
| -rw-r--r-- | drivers/iommu/dmar.c | 1461 | 
1 files changed, 1461 insertions, 0 deletions
| diff --git a/drivers/iommu/dmar.c b/drivers/iommu/dmar.c new file mode 100644 index 000000000000..3dc9befa5aec --- /dev/null +++ b/drivers/iommu/dmar.c @@ -0,0 +1,1461 @@ +/* + * Copyright (c) 2006, Intel Corporation. + * + * This program is free software; you can redistribute it and/or modify it + * under the terms and conditions of the GNU General Public License, + * version 2, as published by the Free Software Foundation. + * + * This program is distributed in the hope it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or + * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for + * more details. + * + * You should have received a copy of the GNU General Public License along with + * this program; if not, write to the Free Software Foundation, Inc., 59 Temple + * Place - Suite 330, Boston, MA 02111-1307 USA. + * + * Copyright (C) 2006-2008 Intel Corporation + * Author: Ashok Raj <ashok.raj@intel.com> + * Author: Shaohua Li <shaohua.li@intel.com> + * Author: Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com> + * + * This file implements early detection/parsing of Remapping Devices + * reported to OS through BIOS via DMA remapping reporting (DMAR) ACPI + * tables. + * + * These routines are used by both DMA-remapping and Interrupt-remapping + */ + +#include <linux/pci.h> +#include <linux/dmar.h> +#include <linux/iova.h> +#include <linux/intel-iommu.h> +#include <linux/timer.h> +#include <linux/irq.h> +#include <linux/interrupt.h> +#include <linux/tboot.h> +#include <linux/dmi.h> +#include <linux/slab.h> +#include <asm/iommu_table.h> + +#define PREFIX "DMAR: " + +/* No locks are needed as DMA remapping hardware unit + * list is constructed at boot time and hotplug of + * these units are not supported by the architecture. + */ +LIST_HEAD(dmar_drhd_units); + +static struct acpi_table_header * __initdata dmar_tbl; +static acpi_size dmar_tbl_size; + +static void __init dmar_register_drhd_unit(struct dmar_drhd_unit *drhd) +{ +	/* +	 * add INCLUDE_ALL at the tail, so scan the list will find it at +	 * the very end. +	 */ +	if (drhd->include_all) +		list_add_tail(&drhd->list, &dmar_drhd_units); +	else +		list_add(&drhd->list, &dmar_drhd_units); +} + +static int __init dmar_parse_one_dev_scope(struct acpi_dmar_device_scope *scope, +					   struct pci_dev **dev, u16 segment) +{ +	struct pci_bus *bus; +	struct pci_dev *pdev = NULL; +	struct acpi_dmar_pci_path *path; +	int count; + +	bus = pci_find_bus(segment, scope->bus); +	path = (struct acpi_dmar_pci_path *)(scope + 1); +	count = (scope->length - sizeof(struct acpi_dmar_device_scope)) +		/ sizeof(struct acpi_dmar_pci_path); + +	while (count) { +		if (pdev) +			pci_dev_put(pdev); +		/* +		 * Some BIOSes list non-exist devices in DMAR table, just +		 * ignore it +		 */ +		if (!bus) { +			printk(KERN_WARNING +			PREFIX "Device scope bus [%d] not found\n", +			scope->bus); +			break; +		} +		pdev = pci_get_slot(bus, PCI_DEVFN(path->dev, path->fn)); +		if (!pdev) { +			printk(KERN_WARNING PREFIX +			"Device scope device [%04x:%02x:%02x.%02x] not found\n", +				segment, bus->number, path->dev, path->fn); +			break; +		} +		path ++; +		count --; +		bus = pdev->subordinate; +	} +	if (!pdev) { +		printk(KERN_WARNING PREFIX +		"Device scope device [%04x:%02x:%02x.%02x] not found\n", +		segment, scope->bus, path->dev, path->fn); +		*dev = NULL; +		return 0; +	} +	if ((scope->entry_type == ACPI_DMAR_SCOPE_TYPE_ENDPOINT && \ +			pdev->subordinate) || (scope->entry_type == \ +			ACPI_DMAR_SCOPE_TYPE_BRIDGE && !pdev->subordinate)) { +		pci_dev_put(pdev); +		printk(KERN_WARNING PREFIX +			"Device scope type does not match for %s\n", +			 pci_name(pdev)); +		return -EINVAL; +	} +	*dev = pdev; +	return 0; +} + +static int __init dmar_parse_dev_scope(void *start, void *end, int *cnt, +				       struct pci_dev ***devices, u16 segment) +{ +	struct acpi_dmar_device_scope *scope; +	void * tmp = start; +	int index; +	int ret; + +	*cnt = 0; +	while (start < end) { +		scope = start; +		if (scope->entry_type == ACPI_DMAR_SCOPE_TYPE_ENDPOINT || +		    scope->entry_type == ACPI_DMAR_SCOPE_TYPE_BRIDGE) +			(*cnt)++; +		else if (scope->entry_type != ACPI_DMAR_SCOPE_TYPE_IOAPIC) { +			printk(KERN_WARNING PREFIX +			       "Unsupported device scope\n"); +		} +		start += scope->length; +	} +	if (*cnt == 0) +		return 0; + +	*devices = kcalloc(*cnt, sizeof(struct pci_dev *), GFP_KERNEL); +	if (!*devices) +		return -ENOMEM; + +	start = tmp; +	index = 0; +	while (start < end) { +		scope = start; +		if (scope->entry_type == ACPI_DMAR_SCOPE_TYPE_ENDPOINT || +		    scope->entry_type == ACPI_DMAR_SCOPE_TYPE_BRIDGE) { +			ret = dmar_parse_one_dev_scope(scope, +				&(*devices)[index], segment); +			if (ret) { +				kfree(*devices); +				return ret; +			} +			index ++; +		} +		start += scope->length; +	} + +	return 0; +} + +/** + * dmar_parse_one_drhd - parses exactly one DMA remapping hardware definition + * structure which uniquely represent one DMA remapping hardware unit + * present in the platform + */ +static int __init +dmar_parse_one_drhd(struct acpi_dmar_header *header) +{ +	struct acpi_dmar_hardware_unit *drhd; +	struct dmar_drhd_unit *dmaru; +	int ret = 0; + +	drhd = (struct acpi_dmar_hardware_unit *)header; +	dmaru = kzalloc(sizeof(*dmaru), GFP_KERNEL); +	if (!dmaru) +		return -ENOMEM; + +	dmaru->hdr = header; +	dmaru->reg_base_addr = drhd->address; +	dmaru->segment = drhd->segment; +	dmaru->include_all = drhd->flags & 0x1; /* BIT0: INCLUDE_ALL */ + +	ret = alloc_iommu(dmaru); +	if (ret) { +		kfree(dmaru); +		return ret; +	} +	dmar_register_drhd_unit(dmaru); +	return 0; +} + +static int __init dmar_parse_dev(struct dmar_drhd_unit *dmaru) +{ +	struct acpi_dmar_hardware_unit *drhd; +	int ret = 0; + +	drhd = (struct acpi_dmar_hardware_unit *) dmaru->hdr; + +	if (dmaru->include_all) +		return 0; + +	ret = dmar_parse_dev_scope((void *)(drhd + 1), +				((void *)drhd) + drhd->header.length, +				&dmaru->devices_cnt, &dmaru->devices, +				drhd->segment); +	if (ret) { +		list_del(&dmaru->list); +		kfree(dmaru); +	} +	return ret; +} + +#ifdef CONFIG_DMAR +LIST_HEAD(dmar_rmrr_units); + +static void __init dmar_register_rmrr_unit(struct dmar_rmrr_unit *rmrr) +{ +	list_add(&rmrr->list, &dmar_rmrr_units); +} + + +static int __init +dmar_parse_one_rmrr(struct acpi_dmar_header *header) +{ +	struct acpi_dmar_reserved_memory *rmrr; +	struct dmar_rmrr_unit *rmrru; + +	rmrru = kzalloc(sizeof(*rmrru), GFP_KERNEL); +	if (!rmrru) +		return -ENOMEM; + +	rmrru->hdr = header; +	rmrr = (struct acpi_dmar_reserved_memory *)header; +	rmrru->base_address = rmrr->base_address; +	rmrru->end_address = rmrr->end_address; + +	dmar_register_rmrr_unit(rmrru); +	return 0; +} + +static int __init +rmrr_parse_dev(struct dmar_rmrr_unit *rmrru) +{ +	struct acpi_dmar_reserved_memory *rmrr; +	int ret; + +	rmrr = (struct acpi_dmar_reserved_memory *) rmrru->hdr; +	ret = dmar_parse_dev_scope((void *)(rmrr + 1), +		((void *)rmrr) + rmrr->header.length, +		&rmrru->devices_cnt, &rmrru->devices, rmrr->segment); + +	if (ret || (rmrru->devices_cnt == 0)) { +		list_del(&rmrru->list); +		kfree(rmrru); +	} +	return ret; +} + +static LIST_HEAD(dmar_atsr_units); + +static int __init dmar_parse_one_atsr(struct acpi_dmar_header *hdr) +{ +	struct acpi_dmar_atsr *atsr; +	struct dmar_atsr_unit *atsru; + +	atsr = container_of(hdr, struct acpi_dmar_atsr, header); +	atsru = kzalloc(sizeof(*atsru), GFP_KERNEL); +	if (!atsru) +		return -ENOMEM; + +	atsru->hdr = hdr; +	atsru->include_all = atsr->flags & 0x1; + +	list_add(&atsru->list, &dmar_atsr_units); + +	return 0; +} + +static int __init atsr_parse_dev(struct dmar_atsr_unit *atsru) +{ +	int rc; +	struct acpi_dmar_atsr *atsr; + +	if (atsru->include_all) +		return 0; + +	atsr = container_of(atsru->hdr, struct acpi_dmar_atsr, header); +	rc = dmar_parse_dev_scope((void *)(atsr + 1), +				(void *)atsr + atsr->header.length, +				&atsru->devices_cnt, &atsru->devices, +				atsr->segment); +	if (rc || !atsru->devices_cnt) { +		list_del(&atsru->list); +		kfree(atsru); +	} + +	return rc; +} + +int dmar_find_matched_atsr_unit(struct pci_dev *dev) +{ +	int i; +	struct pci_bus *bus; +	struct acpi_dmar_atsr *atsr; +	struct dmar_atsr_unit *atsru; + +	dev = pci_physfn(dev); + +	list_for_each_entry(atsru, &dmar_atsr_units, list) { +		atsr = container_of(atsru->hdr, struct acpi_dmar_atsr, header); +		if (atsr->segment == pci_domain_nr(dev->bus)) +			goto found; +	} + +	return 0; + +found: +	for (bus = dev->bus; bus; bus = bus->parent) { +		struct pci_dev *bridge = bus->self; + +		if (!bridge || !pci_is_pcie(bridge) || +		    bridge->pcie_type == PCI_EXP_TYPE_PCI_BRIDGE) +			return 0; + +		if (bridge->pcie_type == PCI_EXP_TYPE_ROOT_PORT) { +			for (i = 0; i < atsru->devices_cnt; i++) +				if (atsru->devices[i] == bridge) +					return 1; +			break; +		} +	} + +	if (atsru->include_all) +		return 1; + +	return 0; +} +#endif + +#ifdef CONFIG_ACPI_NUMA +static int __init +dmar_parse_one_rhsa(struct acpi_dmar_header *header) +{ +	struct acpi_dmar_rhsa *rhsa; +	struct dmar_drhd_unit *drhd; + +	rhsa = (struct acpi_dmar_rhsa *)header; +	for_each_drhd_unit(drhd) { +		if (drhd->reg_base_addr == rhsa->base_address) { +			int node = acpi_map_pxm_to_node(rhsa->proximity_domain); + +			if (!node_online(node)) +				node = -1; +			drhd->iommu->node = node; +			return 0; +		} +	} +	WARN_TAINT( +		1, TAINT_FIRMWARE_WORKAROUND, +		"Your BIOS is broken; RHSA refers to non-existent DMAR unit at %llx\n" +		"BIOS vendor: %s; Ver: %s; Product Version: %s\n", +		drhd->reg_base_addr, +		dmi_get_system_info(DMI_BIOS_VENDOR), +		dmi_get_system_info(DMI_BIOS_VERSION), +		dmi_get_system_info(DMI_PRODUCT_VERSION)); + +	return 0; +} +#endif + +static void __init +dmar_table_print_dmar_entry(struct acpi_dmar_header *header) +{ +	struct acpi_dmar_hardware_unit *drhd; +	struct acpi_dmar_reserved_memory *rmrr; +	struct acpi_dmar_atsr *atsr; +	struct acpi_dmar_rhsa *rhsa; + +	switch (header->type) { +	case ACPI_DMAR_TYPE_HARDWARE_UNIT: +		drhd = container_of(header, struct acpi_dmar_hardware_unit, +				    header); +		printk (KERN_INFO PREFIX +			"DRHD base: %#016Lx flags: %#x\n", +			(unsigned long long)drhd->address, drhd->flags); +		break; +	case ACPI_DMAR_TYPE_RESERVED_MEMORY: +		rmrr = container_of(header, struct acpi_dmar_reserved_memory, +				    header); +		printk (KERN_INFO PREFIX +			"RMRR base: %#016Lx end: %#016Lx\n", +			(unsigned long long)rmrr->base_address, +			(unsigned long long)rmrr->end_address); +		break; +	case ACPI_DMAR_TYPE_ATSR: +		atsr = container_of(header, struct acpi_dmar_atsr, header); +		printk(KERN_INFO PREFIX "ATSR flags: %#x\n", atsr->flags); +		break; +	case ACPI_DMAR_HARDWARE_AFFINITY: +		rhsa = container_of(header, struct acpi_dmar_rhsa, header); +		printk(KERN_INFO PREFIX "RHSA base: %#016Lx proximity domain: %#x\n", +		       (unsigned long long)rhsa->base_address, +		       rhsa->proximity_domain); +		break; +	} +} + +/** + * dmar_table_detect - checks to see if the platform supports DMAR devices + */ +static int __init dmar_table_detect(void) +{ +	acpi_status status = AE_OK; + +	/* if we could find DMAR table, then there are DMAR devices */ +	status = acpi_get_table_with_size(ACPI_SIG_DMAR, 0, +				(struct acpi_table_header **)&dmar_tbl, +				&dmar_tbl_size); + +	if (ACPI_SUCCESS(status) && !dmar_tbl) { +		printk (KERN_WARNING PREFIX "Unable to map DMAR\n"); +		status = AE_NOT_FOUND; +	} + +	return (ACPI_SUCCESS(status) ? 1 : 0); +} + +/** + * parse_dmar_table - parses the DMA reporting table + */ +static int __init +parse_dmar_table(void) +{ +	struct acpi_table_dmar *dmar; +	struct acpi_dmar_header *entry_header; +	int ret = 0; + +	/* +	 * Do it again, earlier dmar_tbl mapping could be mapped with +	 * fixed map. +	 */ +	dmar_table_detect(); + +	/* +	 * ACPI tables may not be DMA protected by tboot, so use DMAR copy +	 * SINIT saved in SinitMleData in TXT heap (which is DMA protected) +	 */ +	dmar_tbl = tboot_get_dmar_table(dmar_tbl); + +	dmar = (struct acpi_table_dmar *)dmar_tbl; +	if (!dmar) +		return -ENODEV; + +	if (dmar->width < PAGE_SHIFT - 1) { +		printk(KERN_WARNING PREFIX "Invalid DMAR haw\n"); +		return -EINVAL; +	} + +	printk (KERN_INFO PREFIX "Host address width %d\n", +		dmar->width + 1); + +	entry_header = (struct acpi_dmar_header *)(dmar + 1); +	while (((unsigned long)entry_header) < +			(((unsigned long)dmar) + dmar_tbl->length)) { +		/* Avoid looping forever on bad ACPI tables */ +		if (entry_header->length == 0) { +			printk(KERN_WARNING PREFIX +				"Invalid 0-length structure\n"); +			ret = -EINVAL; +			break; +		} + +		dmar_table_print_dmar_entry(entry_header); + +		switch (entry_header->type) { +		case ACPI_DMAR_TYPE_HARDWARE_UNIT: +			ret = dmar_parse_one_drhd(entry_header); +			break; +		case ACPI_DMAR_TYPE_RESERVED_MEMORY: +#ifdef CONFIG_DMAR +			ret = dmar_parse_one_rmrr(entry_header); +#endif +			break; +		case ACPI_DMAR_TYPE_ATSR: +#ifdef CONFIG_DMAR +			ret = dmar_parse_one_atsr(entry_header); +#endif +			break; +		case ACPI_DMAR_HARDWARE_AFFINITY: +#ifdef CONFIG_ACPI_NUMA +			ret = dmar_parse_one_rhsa(entry_header); +#endif +			break; +		default: +			printk(KERN_WARNING PREFIX +				"Unknown DMAR structure type %d\n", +				entry_header->type); +			ret = 0; /* for forward compatibility */ +			break; +		} +		if (ret) +			break; + +		entry_header = ((void *)entry_header + entry_header->length); +	} +	return ret; +} + +static int dmar_pci_device_match(struct pci_dev *devices[], int cnt, +			  struct pci_dev *dev) +{ +	int index; + +	while (dev) { +		for (index = 0; index < cnt; index++) +			if (dev == devices[index]) +				return 1; + +		/* Check our parent */ +		dev = dev->bus->self; +	} + +	return 0; +} + +struct dmar_drhd_unit * +dmar_find_matched_drhd_unit(struct pci_dev *dev) +{ +	struct dmar_drhd_unit *dmaru = NULL; +	struct acpi_dmar_hardware_unit *drhd; + +	dev = pci_physfn(dev); + +	list_for_each_entry(dmaru, &dmar_drhd_units, list) { +		drhd = container_of(dmaru->hdr, +				    struct acpi_dmar_hardware_unit, +				    header); + +		if (dmaru->include_all && +		    drhd->segment == pci_domain_nr(dev->bus)) +			return dmaru; + +		if (dmar_pci_device_match(dmaru->devices, +					  dmaru->devices_cnt, dev)) +			return dmaru; +	} + +	return NULL; +} + +int __init dmar_dev_scope_init(void) +{ +	struct dmar_drhd_unit *drhd, *drhd_n; +	int ret = -ENODEV; + +	list_for_each_entry_safe(drhd, drhd_n, &dmar_drhd_units, list) { +		ret = dmar_parse_dev(drhd); +		if (ret) +			return ret; +	} + +#ifdef CONFIG_DMAR +	{ +		struct dmar_rmrr_unit *rmrr, *rmrr_n; +		struct dmar_atsr_unit *atsr, *atsr_n; + +		list_for_each_entry_safe(rmrr, rmrr_n, &dmar_rmrr_units, list) { +			ret = rmrr_parse_dev(rmrr); +			if (ret) +				return ret; +		} + +		list_for_each_entry_safe(atsr, atsr_n, &dmar_atsr_units, list) { +			ret = atsr_parse_dev(atsr); +			if (ret) +				return ret; +		} +	} +#endif + +	return ret; +} + + +int __init dmar_table_init(void) +{ +	static int dmar_table_initialized; +	int ret; + +	if (dmar_table_initialized) +		return 0; + +	dmar_table_initialized = 1; + +	ret = parse_dmar_table(); +	if (ret) { +		if (ret != -ENODEV) +			printk(KERN_INFO PREFIX "parse DMAR table failure.\n"); +		return ret; +	} + +	if (list_empty(&dmar_drhd_units)) { +		printk(KERN_INFO PREFIX "No DMAR devices found\n"); +		return -ENODEV; +	} + +#ifdef CONFIG_DMAR +	if (list_empty(&dmar_rmrr_units)) +		printk(KERN_INFO PREFIX "No RMRR found\n"); + +	if (list_empty(&dmar_atsr_units)) +		printk(KERN_INFO PREFIX "No ATSR found\n"); +#endif + +	return 0; +} + +static void warn_invalid_dmar(u64 addr, const char *message) +{ +	WARN_TAINT_ONCE( +		1, TAINT_FIRMWARE_WORKAROUND, +		"Your BIOS is broken; DMAR reported at address %llx%s!\n" +		"BIOS vendor: %s; Ver: %s; Product Version: %s\n", +		addr, message, +		dmi_get_system_info(DMI_BIOS_VENDOR), +		dmi_get_system_info(DMI_BIOS_VERSION), +		dmi_get_system_info(DMI_PRODUCT_VERSION)); +} + +int __init check_zero_address(void) +{ +	struct acpi_table_dmar *dmar; +	struct acpi_dmar_header *entry_header; +	struct acpi_dmar_hardware_unit *drhd; + +	dmar = (struct acpi_table_dmar *)dmar_tbl; +	entry_header = (struct acpi_dmar_header *)(dmar + 1); + +	while (((unsigned long)entry_header) < +			(((unsigned long)dmar) + dmar_tbl->length)) { +		/* Avoid looping forever on bad ACPI tables */ +		if (entry_header->length == 0) { +			printk(KERN_WARNING PREFIX +				"Invalid 0-length structure\n"); +			return 0; +		} + +		if (entry_header->type == ACPI_DMAR_TYPE_HARDWARE_UNIT) { +			void __iomem *addr; +			u64 cap, ecap; + +			drhd = (void *)entry_header; +			if (!drhd->address) { +				warn_invalid_dmar(0, ""); +				goto failed; +			} + +			addr = early_ioremap(drhd->address, VTD_PAGE_SIZE); +			if (!addr ) { +				printk("IOMMU: can't validate: %llx\n", drhd->address); +				goto failed; +			} +			cap = dmar_readq(addr + DMAR_CAP_REG); +			ecap = dmar_readq(addr + DMAR_ECAP_REG); +			early_iounmap(addr, VTD_PAGE_SIZE); +			if (cap == (uint64_t)-1 && ecap == (uint64_t)-1) { +				warn_invalid_dmar(drhd->address, +						  " returns all ones"); +				goto failed; +			} +		} + +		entry_header = ((void *)entry_header + entry_header->length); +	} +	return 1; + +failed: +#ifdef CONFIG_DMAR +	dmar_disabled = 1; +#endif +	return 0; +} + +int __init detect_intel_iommu(void) +{ +	int ret; + +	ret = dmar_table_detect(); +	if (ret) +		ret = check_zero_address(); +	{ +#ifdef CONFIG_INTR_REMAP +		struct acpi_table_dmar *dmar; + +		dmar = (struct acpi_table_dmar *) dmar_tbl; +		if (ret && cpu_has_x2apic && dmar->flags & 0x1) +			printk(KERN_INFO +			       "Queued invalidation will be enabled to support " +			       "x2apic and Intr-remapping.\n"); +#endif +#ifdef CONFIG_DMAR +		if (ret && !no_iommu && !iommu_detected && !dmar_disabled) { +			iommu_detected = 1; +			/* Make sure ACS will be enabled */ +			pci_request_acs(); +		} +#endif +#ifdef CONFIG_X86 +		if (ret) +			x86_init.iommu.iommu_init = intel_iommu_init; +#endif +	} +	early_acpi_os_unmap_memory(dmar_tbl, dmar_tbl_size); +	dmar_tbl = NULL; + +	return ret ? 1 : -ENODEV; +} + + +int alloc_iommu(struct dmar_drhd_unit *drhd) +{ +	struct intel_iommu *iommu; +	int map_size; +	u32 ver; +	static int iommu_allocated = 0; +	int agaw = 0; +	int msagaw = 0; + +	if (!drhd->reg_base_addr) { +		warn_invalid_dmar(0, ""); +		return -EINVAL; +	} + +	iommu = kzalloc(sizeof(*iommu), GFP_KERNEL); +	if (!iommu) +		return -ENOMEM; + +	iommu->seq_id = iommu_allocated++; +	sprintf (iommu->name, "dmar%d", iommu->seq_id); + +	iommu->reg = ioremap(drhd->reg_base_addr, VTD_PAGE_SIZE); +	if (!iommu->reg) { +		printk(KERN_ERR "IOMMU: can't map the region\n"); +		goto error; +	} +	iommu->cap = dmar_readq(iommu->reg + DMAR_CAP_REG); +	iommu->ecap = dmar_readq(iommu->reg + DMAR_ECAP_REG); + +	if (iommu->cap == (uint64_t)-1 && iommu->ecap == (uint64_t)-1) { +		warn_invalid_dmar(drhd->reg_base_addr, " returns all ones"); +		goto err_unmap; +	} + +#ifdef CONFIG_DMAR +	agaw = iommu_calculate_agaw(iommu); +	if (agaw < 0) { +		printk(KERN_ERR +		       "Cannot get a valid agaw for iommu (seq_id = %d)\n", +		       iommu->seq_id); +		goto err_unmap; +	} +	msagaw = iommu_calculate_max_sagaw(iommu); +	if (msagaw < 0) { +		printk(KERN_ERR +			"Cannot get a valid max agaw for iommu (seq_id = %d)\n", +			iommu->seq_id); +		goto err_unmap; +	} +#endif +	iommu->agaw = agaw; +	iommu->msagaw = msagaw; + +	iommu->node = -1; + +	/* the registers might be more than one page */ +	map_size = max_t(int, ecap_max_iotlb_offset(iommu->ecap), +		cap_max_fault_reg_offset(iommu->cap)); +	map_size = VTD_PAGE_ALIGN(map_size); +	if (map_size > VTD_PAGE_SIZE) { +		iounmap(iommu->reg); +		iommu->reg = ioremap(drhd->reg_base_addr, map_size); +		if (!iommu->reg) { +			printk(KERN_ERR "IOMMU: can't map the region\n"); +			goto error; +		} +	} + +	ver = readl(iommu->reg + DMAR_VER_REG); +	pr_info("IOMMU %d: reg_base_addr %llx ver %d:%d cap %llx ecap %llx\n", +		iommu->seq_id, +		(unsigned long long)drhd->reg_base_addr, +		DMAR_VER_MAJOR(ver), DMAR_VER_MINOR(ver), +		(unsigned long long)iommu->cap, +		(unsigned long long)iommu->ecap); + +	spin_lock_init(&iommu->register_lock); + +	drhd->iommu = iommu; +	return 0; + + err_unmap: +	iounmap(iommu->reg); + error: +	kfree(iommu); +	return -1; +} + +void free_iommu(struct intel_iommu *iommu) +{ +	if (!iommu) +		return; + +#ifdef CONFIG_DMAR +	free_dmar_iommu(iommu); +#endif + +	if (iommu->reg) +		iounmap(iommu->reg); +	kfree(iommu); +} + +/* + * Reclaim all the submitted descriptors which have completed its work. + */ +static inline void reclaim_free_desc(struct q_inval *qi) +{ +	while (qi->desc_status[qi->free_tail] == QI_DONE || +	       qi->desc_status[qi->free_tail] == QI_ABORT) { +		qi->desc_status[qi->free_tail] = QI_FREE; +		qi->free_tail = (qi->free_tail + 1) % QI_LENGTH; +		qi->free_cnt++; +	} +} + +static int qi_check_fault(struct intel_iommu *iommu, int index) +{ +	u32 fault; +	int head, tail; +	struct q_inval *qi = iommu->qi; +	int wait_index = (index + 1) % QI_LENGTH; + +	if (qi->desc_status[wait_index] == QI_ABORT) +		return -EAGAIN; + +	fault = readl(iommu->reg + DMAR_FSTS_REG); + +	/* +	 * If IQE happens, the head points to the descriptor associated +	 * with the error. No new descriptors are fetched until the IQE +	 * is cleared. +	 */ +	if (fault & DMA_FSTS_IQE) { +		head = readl(iommu->reg + DMAR_IQH_REG); +		if ((head >> DMAR_IQ_SHIFT) == index) { +			printk(KERN_ERR "VT-d detected invalid descriptor: " +				"low=%llx, high=%llx\n", +				(unsigned long long)qi->desc[index].low, +				(unsigned long long)qi->desc[index].high); +			memcpy(&qi->desc[index], &qi->desc[wait_index], +					sizeof(struct qi_desc)); +			__iommu_flush_cache(iommu, &qi->desc[index], +					sizeof(struct qi_desc)); +			writel(DMA_FSTS_IQE, iommu->reg + DMAR_FSTS_REG); +			return -EINVAL; +		} +	} + +	/* +	 * If ITE happens, all pending wait_desc commands are aborted. +	 * No new descriptors are fetched until the ITE is cleared. +	 */ +	if (fault & DMA_FSTS_ITE) { +		head = readl(iommu->reg + DMAR_IQH_REG); +		head = ((head >> DMAR_IQ_SHIFT) - 1 + QI_LENGTH) % QI_LENGTH; +		head |= 1; +		tail = readl(iommu->reg + DMAR_IQT_REG); +		tail = ((tail >> DMAR_IQ_SHIFT) - 1 + QI_LENGTH) % QI_LENGTH; + +		writel(DMA_FSTS_ITE, iommu->reg + DMAR_FSTS_REG); + +		do { +			if (qi->desc_status[head] == QI_IN_USE) +				qi->desc_status[head] = QI_ABORT; +			head = (head - 2 + QI_LENGTH) % QI_LENGTH; +		} while (head != tail); + +		if (qi->desc_status[wait_index] == QI_ABORT) +			return -EAGAIN; +	} + +	if (fault & DMA_FSTS_ICE) +		writel(DMA_FSTS_ICE, iommu->reg + DMAR_FSTS_REG); + +	return 0; +} + +/* + * Submit the queued invalidation descriptor to the remapping + * hardware unit and wait for its completion. + */ +int qi_submit_sync(struct qi_desc *desc, struct intel_iommu *iommu) +{ +	int rc; +	struct q_inval *qi = iommu->qi; +	struct qi_desc *hw, wait_desc; +	int wait_index, index; +	unsigned long flags; + +	if (!qi) +		return 0; + +	hw = qi->desc; + +restart: +	rc = 0; + +	spin_lock_irqsave(&qi->q_lock, flags); +	while (qi->free_cnt < 3) { +		spin_unlock_irqrestore(&qi->q_lock, flags); +		cpu_relax(); +		spin_lock_irqsave(&qi->q_lock, flags); +	} + +	index = qi->free_head; +	wait_index = (index + 1) % QI_LENGTH; + +	qi->desc_status[index] = qi->desc_status[wait_index] = QI_IN_USE; + +	hw[index] = *desc; + +	wait_desc.low = QI_IWD_STATUS_DATA(QI_DONE) | +			QI_IWD_STATUS_WRITE | QI_IWD_TYPE; +	wait_desc.high = virt_to_phys(&qi->desc_status[wait_index]); + +	hw[wait_index] = wait_desc; + +	__iommu_flush_cache(iommu, &hw[index], sizeof(struct qi_desc)); +	__iommu_flush_cache(iommu, &hw[wait_index], sizeof(struct qi_desc)); + +	qi->free_head = (qi->free_head + 2) % QI_LENGTH; +	qi->free_cnt -= 2; + +	/* +	 * update the HW tail register indicating the presence of +	 * new descriptors. +	 */ +	writel(qi->free_head << DMAR_IQ_SHIFT, iommu->reg + DMAR_IQT_REG); + +	while (qi->desc_status[wait_index] != QI_DONE) { +		/* +		 * We will leave the interrupts disabled, to prevent interrupt +		 * context to queue another cmd while a cmd is already submitted +		 * and waiting for completion on this cpu. This is to avoid +		 * a deadlock where the interrupt context can wait indefinitely +		 * for free slots in the queue. +		 */ +		rc = qi_check_fault(iommu, index); +		if (rc) +			break; + +		spin_unlock(&qi->q_lock); +		cpu_relax(); +		spin_lock(&qi->q_lock); +	} + +	qi->desc_status[index] = QI_DONE; + +	reclaim_free_desc(qi); +	spin_unlock_irqrestore(&qi->q_lock, flags); + +	if (rc == -EAGAIN) +		goto restart; + +	return rc; +} + +/* + * Flush the global interrupt entry cache. + */ +void qi_global_iec(struct intel_iommu *iommu) +{ +	struct qi_desc desc; + +	desc.low = QI_IEC_TYPE; +	desc.high = 0; + +	/* should never fail */ +	qi_submit_sync(&desc, iommu); +} + +void qi_flush_context(struct intel_iommu *iommu, u16 did, u16 sid, u8 fm, +		      u64 type) +{ +	struct qi_desc desc; + +	desc.low = QI_CC_FM(fm) | QI_CC_SID(sid) | QI_CC_DID(did) +			| QI_CC_GRAN(type) | QI_CC_TYPE; +	desc.high = 0; + +	qi_submit_sync(&desc, iommu); +} + +void qi_flush_iotlb(struct intel_iommu *iommu, u16 did, u64 addr, +		    unsigned int size_order, u64 type) +{ +	u8 dw = 0, dr = 0; + +	struct qi_desc desc; +	int ih = 0; + +	if (cap_write_drain(iommu->cap)) +		dw = 1; + +	if (cap_read_drain(iommu->cap)) +		dr = 1; + +	desc.low = QI_IOTLB_DID(did) | QI_IOTLB_DR(dr) | QI_IOTLB_DW(dw) +		| QI_IOTLB_GRAN(type) | QI_IOTLB_TYPE; +	desc.high = QI_IOTLB_ADDR(addr) | QI_IOTLB_IH(ih) +		| QI_IOTLB_AM(size_order); + +	qi_submit_sync(&desc, iommu); +} + +void qi_flush_dev_iotlb(struct intel_iommu *iommu, u16 sid, u16 qdep, +			u64 addr, unsigned mask) +{ +	struct qi_desc desc; + +	if (mask) { +		BUG_ON(addr & ((1 << (VTD_PAGE_SHIFT + mask)) - 1)); +		addr |= (1 << (VTD_PAGE_SHIFT + mask - 1)) - 1; +		desc.high = QI_DEV_IOTLB_ADDR(addr) | QI_DEV_IOTLB_SIZE; +	} else +		desc.high = QI_DEV_IOTLB_ADDR(addr); + +	if (qdep >= QI_DEV_IOTLB_MAX_INVS) +		qdep = 0; + +	desc.low = QI_DEV_IOTLB_SID(sid) | QI_DEV_IOTLB_QDEP(qdep) | +		   QI_DIOTLB_TYPE; + +	qi_submit_sync(&desc, iommu); +} + +/* + * Disable Queued Invalidation interface. + */ +void dmar_disable_qi(struct intel_iommu *iommu) +{ +	unsigned long flags; +	u32 sts; +	cycles_t start_time = get_cycles(); + +	if (!ecap_qis(iommu->ecap)) +		return; + +	spin_lock_irqsave(&iommu->register_lock, flags); + +	sts =  dmar_readq(iommu->reg + DMAR_GSTS_REG); +	if (!(sts & DMA_GSTS_QIES)) +		goto end; + +	/* +	 * Give a chance to HW to complete the pending invalidation requests. +	 */ +	while ((readl(iommu->reg + DMAR_IQT_REG) != +		readl(iommu->reg + DMAR_IQH_REG)) && +		(DMAR_OPERATION_TIMEOUT > (get_cycles() - start_time))) +		cpu_relax(); + +	iommu->gcmd &= ~DMA_GCMD_QIE; +	writel(iommu->gcmd, iommu->reg + DMAR_GCMD_REG); + +	IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG, readl, +		      !(sts & DMA_GSTS_QIES), sts); +end: +	spin_unlock_irqrestore(&iommu->register_lock, flags); +} + +/* + * Enable queued invalidation. + */ +static void __dmar_enable_qi(struct intel_iommu *iommu) +{ +	u32 sts; +	unsigned long flags; +	struct q_inval *qi = iommu->qi; + +	qi->free_head = qi->free_tail = 0; +	qi->free_cnt = QI_LENGTH; + +	spin_lock_irqsave(&iommu->register_lock, flags); + +	/* write zero to the tail reg */ +	writel(0, iommu->reg + DMAR_IQT_REG); + +	dmar_writeq(iommu->reg + DMAR_IQA_REG, virt_to_phys(qi->desc)); + +	iommu->gcmd |= DMA_GCMD_QIE; +	writel(iommu->gcmd, iommu->reg + DMAR_GCMD_REG); + +	/* Make sure hardware complete it */ +	IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG, readl, (sts & DMA_GSTS_QIES), sts); + +	spin_unlock_irqrestore(&iommu->register_lock, flags); +} + +/* + * Enable Queued Invalidation interface. This is a must to support + * interrupt-remapping. Also used by DMA-remapping, which replaces + * register based IOTLB invalidation. + */ +int dmar_enable_qi(struct intel_iommu *iommu) +{ +	struct q_inval *qi; +	struct page *desc_page; + +	if (!ecap_qis(iommu->ecap)) +		return -ENOENT; + +	/* +	 * queued invalidation is already setup and enabled. +	 */ +	if (iommu->qi) +		return 0; + +	iommu->qi = kmalloc(sizeof(*qi), GFP_ATOMIC); +	if (!iommu->qi) +		return -ENOMEM; + +	qi = iommu->qi; + + +	desc_page = alloc_pages_node(iommu->node, GFP_ATOMIC | __GFP_ZERO, 0); +	if (!desc_page) { +		kfree(qi); +		iommu->qi = 0; +		return -ENOMEM; +	} + +	qi->desc = page_address(desc_page); + +	qi->desc_status = kmalloc(QI_LENGTH * sizeof(int), GFP_ATOMIC); +	if (!qi->desc_status) { +		free_page((unsigned long) qi->desc); +		kfree(qi); +		iommu->qi = 0; +		return -ENOMEM; +	} + +	qi->free_head = qi->free_tail = 0; +	qi->free_cnt = QI_LENGTH; + +	spin_lock_init(&qi->q_lock); + +	__dmar_enable_qi(iommu); + +	return 0; +} + +/* iommu interrupt handling. Most stuff are MSI-like. */ + +enum faulttype { +	DMA_REMAP, +	INTR_REMAP, +	UNKNOWN, +}; + +static const char *dma_remap_fault_reasons[] = +{ +	"Software", +	"Present bit in root entry is clear", +	"Present bit in context entry is clear", +	"Invalid context entry", +	"Access beyond MGAW", +	"PTE Write access is not set", +	"PTE Read access is not set", +	"Next page table ptr is invalid", +	"Root table address invalid", +	"Context table ptr is invalid", +	"non-zero reserved fields in RTP", +	"non-zero reserved fields in CTP", +	"non-zero reserved fields in PTE", +}; + +static const char *intr_remap_fault_reasons[] = +{ +	"Detected reserved fields in the decoded interrupt-remapped request", +	"Interrupt index exceeded the interrupt-remapping table size", +	"Present field in the IRTE entry is clear", +	"Error accessing interrupt-remapping table pointed by IRTA_REG", +	"Detected reserved fields in the IRTE entry", +	"Blocked a compatibility format interrupt request", +	"Blocked an interrupt request due to source-id verification failure", +}; + +#define MAX_FAULT_REASON_IDX 	(ARRAY_SIZE(fault_reason_strings) - 1) + +const char *dmar_get_fault_reason(u8 fault_reason, int *fault_type) +{ +	if (fault_reason >= 0x20 && (fault_reason <= 0x20 + +				     ARRAY_SIZE(intr_remap_fault_reasons))) { +		*fault_type = INTR_REMAP; +		return intr_remap_fault_reasons[fault_reason - 0x20]; +	} else if (fault_reason < ARRAY_SIZE(dma_remap_fault_reasons)) { +		*fault_type = DMA_REMAP; +		return dma_remap_fault_reasons[fault_reason]; +	} else { +		*fault_type = UNKNOWN; +		return "Unknown"; +	} +} + +void dmar_msi_unmask(struct irq_data *data) +{ +	struct intel_iommu *iommu = irq_data_get_irq_handler_data(data); +	unsigned long flag; + +	/* unmask it */ +	spin_lock_irqsave(&iommu->register_lock, flag); +	writel(0, iommu->reg + DMAR_FECTL_REG); +	/* Read a reg to force flush the post write */ +	readl(iommu->reg + DMAR_FECTL_REG); +	spin_unlock_irqrestore(&iommu->register_lock, flag); +} + +void dmar_msi_mask(struct irq_data *data) +{ +	unsigned long flag; +	struct intel_iommu *iommu = irq_data_get_irq_handler_data(data); + +	/* mask it */ +	spin_lock_irqsave(&iommu->register_lock, flag); +	writel(DMA_FECTL_IM, iommu->reg + DMAR_FECTL_REG); +	/* Read a reg to force flush the post write */ +	readl(iommu->reg + DMAR_FECTL_REG); +	spin_unlock_irqrestore(&iommu->register_lock, flag); +} + +void dmar_msi_write(int irq, struct msi_msg *msg) +{ +	struct intel_iommu *iommu = irq_get_handler_data(irq); +	unsigned long flag; + +	spin_lock_irqsave(&iommu->register_lock, flag); +	writel(msg->data, iommu->reg + DMAR_FEDATA_REG); +	writel(msg->address_lo, iommu->reg + DMAR_FEADDR_REG); +	writel(msg->address_hi, iommu->reg + DMAR_FEUADDR_REG); +	spin_unlock_irqrestore(&iommu->register_lock, flag); +} + +void dmar_msi_read(int irq, struct msi_msg *msg) +{ +	struct intel_iommu *iommu = irq_get_handler_data(irq); +	unsigned long flag; + +	spin_lock_irqsave(&iommu->register_lock, flag); +	msg->data = readl(iommu->reg + DMAR_FEDATA_REG); +	msg->address_lo = readl(iommu->reg + DMAR_FEADDR_REG); +	msg->address_hi = readl(iommu->reg + DMAR_FEUADDR_REG); +	spin_unlock_irqrestore(&iommu->register_lock, flag); +} + +static int dmar_fault_do_one(struct intel_iommu *iommu, int type, +		u8 fault_reason, u16 source_id, unsigned long long addr) +{ +	const char *reason; +	int fault_type; + +	reason = dmar_get_fault_reason(fault_reason, &fault_type); + +	if (fault_type == INTR_REMAP) +		printk(KERN_ERR "INTR-REMAP: Request device [[%02x:%02x.%d] " +		       "fault index %llx\n" +			"INTR-REMAP:[fault reason %02d] %s\n", +			(source_id >> 8), PCI_SLOT(source_id & 0xFF), +			PCI_FUNC(source_id & 0xFF), addr >> 48, +			fault_reason, reason); +	else +		printk(KERN_ERR +		       "DMAR:[%s] Request device [%02x:%02x.%d] " +		       "fault addr %llx \n" +		       "DMAR:[fault reason %02d] %s\n", +		       (type ? "DMA Read" : "DMA Write"), +		       (source_id >> 8), PCI_SLOT(source_id & 0xFF), +		       PCI_FUNC(source_id & 0xFF), addr, fault_reason, reason); +	return 0; +} + +#define PRIMARY_FAULT_REG_LEN (16) +irqreturn_t dmar_fault(int irq, void *dev_id) +{ +	struct intel_iommu *iommu = dev_id; +	int reg, fault_index; +	u32 fault_status; +	unsigned long flag; + +	spin_lock_irqsave(&iommu->register_lock, flag); +	fault_status = readl(iommu->reg + DMAR_FSTS_REG); +	if (fault_status) +		printk(KERN_ERR "DRHD: handling fault status reg %x\n", +		       fault_status); + +	/* TBD: ignore advanced fault log currently */ +	if (!(fault_status & DMA_FSTS_PPF)) +		goto clear_rest; + +	fault_index = dma_fsts_fault_record_index(fault_status); +	reg = cap_fault_reg_offset(iommu->cap); +	while (1) { +		u8 fault_reason; +		u16 source_id; +		u64 guest_addr; +		int type; +		u32 data; + +		/* highest 32 bits */ +		data = readl(iommu->reg + reg + +				fault_index * PRIMARY_FAULT_REG_LEN + 12); +		if (!(data & DMA_FRCD_F)) +			break; + +		fault_reason = dma_frcd_fault_reason(data); +		type = dma_frcd_type(data); + +		data = readl(iommu->reg + reg + +				fault_index * PRIMARY_FAULT_REG_LEN + 8); +		source_id = dma_frcd_source_id(data); + +		guest_addr = dmar_readq(iommu->reg + reg + +				fault_index * PRIMARY_FAULT_REG_LEN); +		guest_addr = dma_frcd_page_addr(guest_addr); +		/* clear the fault */ +		writel(DMA_FRCD_F, iommu->reg + reg + +			fault_index * PRIMARY_FAULT_REG_LEN + 12); + +		spin_unlock_irqrestore(&iommu->register_lock, flag); + +		dmar_fault_do_one(iommu, type, fault_reason, +				source_id, guest_addr); + +		fault_index++; +		if (fault_index >= cap_num_fault_regs(iommu->cap)) +			fault_index = 0; +		spin_lock_irqsave(&iommu->register_lock, flag); +	} +clear_rest: +	/* clear all the other faults */ +	fault_status = readl(iommu->reg + DMAR_FSTS_REG); +	writel(fault_status, iommu->reg + DMAR_FSTS_REG); + +	spin_unlock_irqrestore(&iommu->register_lock, flag); +	return IRQ_HANDLED; +} + +int dmar_set_interrupt(struct intel_iommu *iommu) +{ +	int irq, ret; + +	/* +	 * Check if the fault interrupt is already initialized. +	 */ +	if (iommu->irq) +		return 0; + +	irq = create_irq(); +	if (!irq) { +		printk(KERN_ERR "IOMMU: no free vectors\n"); +		return -EINVAL; +	} + +	irq_set_handler_data(irq, iommu); +	iommu->irq = irq; + +	ret = arch_setup_dmar_msi(irq); +	if (ret) { +		irq_set_handler_data(irq, NULL); +		iommu->irq = 0; +		destroy_irq(irq); +		return ret; +	} + +	ret = request_irq(irq, dmar_fault, 0, iommu->name, iommu); +	if (ret) +		printk(KERN_ERR "IOMMU: can't request irq\n"); +	return ret; +} + +int __init enable_drhd_fault_handling(void) +{ +	struct dmar_drhd_unit *drhd; + +	/* +	 * Enable fault control interrupt. +	 */ +	for_each_drhd_unit(drhd) { +		int ret; +		struct intel_iommu *iommu = drhd->iommu; +		ret = dmar_set_interrupt(iommu); + +		if (ret) { +			printk(KERN_ERR "DRHD %Lx: failed to enable fault, " +			       " interrupt, ret %d\n", +			       (unsigned long long)drhd->reg_base_addr, ret); +			return -1; +		} + +		/* +		 * Clear any previous faults. +		 */ +		dmar_fault(iommu->irq, iommu); +	} + +	return 0; +} + +/* + * Re-enable Queued Invalidation interface. + */ +int dmar_reenable_qi(struct intel_iommu *iommu) +{ +	if (!ecap_qis(iommu->ecap)) +		return -ENOENT; + +	if (!iommu->qi) +		return -ENOENT; + +	/* +	 * First disable queued invalidation. +	 */ +	dmar_disable_qi(iommu); +	/* +	 * Then enable queued invalidation again. Since there is no pending +	 * invalidation requests now, it's safe to re-enable queued +	 * invalidation. +	 */ +	__dmar_enable_qi(iommu); + +	return 0; +} + +/* + * Check interrupt remapping support in DMAR table description. + */ +int __init dmar_ir_support(void) +{ +	struct acpi_table_dmar *dmar; +	dmar = (struct acpi_table_dmar *)dmar_tbl; +	if (!dmar) +		return 0; +	return dmar->flags & 0x1; +} +IOMMU_INIT_POST(detect_intel_iommu); | 
