iommu/vt-d: fix access after free issue in function free_dmar_iommu()
[deliverable/linux.git] / drivers / iommu / dmar.c
CommitLineData
10e5247f
KA
1/*
2 * Copyright (c) 2006, Intel Corporation.
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
13 * You should have received a copy of the GNU General Public License along with
14 * this program; if not, write to the Free Software Foundation, Inc., 59 Temple
15 * Place - Suite 330, Boston, MA 02111-1307 USA.
16 *
98bcef56 17 * Copyright (C) 2006-2008 Intel Corporation
18 * Author: Ashok Raj <ashok.raj@intel.com>
19 * Author: Shaohua Li <shaohua.li@intel.com>
20 * Author: Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com>
10e5247f 21 *
e61d98d8 22 * This file implements early detection/parsing of Remapping Devices
10e5247f
KA
23 * reported to OS through BIOS via DMA remapping reporting (DMAR) ACPI
24 * tables.
e61d98d8
SS
25 *
26 * These routines are used by both DMA-remapping and Interrupt-remapping
10e5247f
KA
27 */
28
e9071b0b
DD
29#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt /* has to precede printk.h */
30
10e5247f
KA
31#include <linux/pci.h>
32#include <linux/dmar.h>
38717946
KA
33#include <linux/iova.h>
34#include <linux/intel-iommu.h>
fe962e90 35#include <linux/timer.h>
0ac2491f
SS
36#include <linux/irq.h>
37#include <linux/interrupt.h>
69575d38 38#include <linux/tboot.h>
eb27cae8 39#include <linux/dmi.h>
5a0e3ad6 40#include <linux/slab.h>
8a8f422d 41#include <asm/irq_remapping.h>
4db77ff3 42#include <asm/iommu_table.h>
10e5247f 43
078e1ee2
JR
44#include "irq_remapping.h"
45
10e5247f
KA
46/* No locks are needed as DMA remapping hardware unit
47 * list is constructed at boot time and hotplug of
48 * these units are not supported by the architecture.
49 */
50LIST_HEAD(dmar_drhd_units);
10e5247f 51
41750d31 52struct acpi_table_header * __initdata dmar_tbl;
8e1568f3 53static acpi_size dmar_tbl_size;
10e5247f 54
694835dc 55static int alloc_iommu(struct dmar_drhd_unit *drhd);
a868e6b7 56static void free_iommu(struct intel_iommu *iommu);
694835dc 57
10e5247f
KA
58static void __init dmar_register_drhd_unit(struct dmar_drhd_unit *drhd)
59{
60 /*
61 * add INCLUDE_ALL at the tail, so scan the list will find it at
62 * the very end.
63 */
64 if (drhd->include_all)
65 list_add_tail(&drhd->list, &dmar_drhd_units);
66 else
67 list_add(&drhd->list, &dmar_drhd_units);
68}
69
10e5247f
KA
70static int __init dmar_parse_one_dev_scope(struct acpi_dmar_device_scope *scope,
71 struct pci_dev **dev, u16 segment)
72{
73 struct pci_bus *bus;
74 struct pci_dev *pdev = NULL;
75 struct acpi_dmar_pci_path *path;
76 int count;
77
78 bus = pci_find_bus(segment, scope->bus);
79 path = (struct acpi_dmar_pci_path *)(scope + 1);
80 count = (scope->length - sizeof(struct acpi_dmar_device_scope))
81 / sizeof(struct acpi_dmar_pci_path);
82
83 while (count) {
84 if (pdev)
85 pci_dev_put(pdev);
86 /*
87 * Some BIOSes list non-exist devices in DMAR table, just
88 * ignore it
89 */
90 if (!bus) {
e9071b0b 91 pr_warn("Device scope bus [%d] not found\n", scope->bus);
10e5247f
KA
92 break;
93 }
fa5f508f 94 pdev = pci_get_slot(bus, PCI_DEVFN(path->device, path->function));
10e5247f 95 if (!pdev) {
e9071b0b 96 /* warning will be printed below */
10e5247f
KA
97 break;
98 }
99 path ++;
100 count --;
101 bus = pdev->subordinate;
102 }
103 if (!pdev) {
e9071b0b 104 pr_warn("Device scope device [%04x:%02x:%02x.%02x] not found\n",
fa5f508f 105 segment, scope->bus, path->device, path->function);
10e5247f
KA
106 return 0;
107 }
108 if ((scope->entry_type == ACPI_DMAR_SCOPE_TYPE_ENDPOINT && \
109 pdev->subordinate) || (scope->entry_type == \
110 ACPI_DMAR_SCOPE_TYPE_BRIDGE && !pdev->subordinate)) {
111 pci_dev_put(pdev);
e9071b0b
DD
112 pr_warn("Device scope type does not match for %s\n",
113 pci_name(pdev));
10e5247f
KA
114 return -EINVAL;
115 }
116 *dev = pdev;
117 return 0;
118}
119
318fe7df
SS
120int __init dmar_parse_dev_scope(void *start, void *end, int *cnt,
121 struct pci_dev ***devices, u16 segment)
10e5247f
KA
122{
123 struct acpi_dmar_device_scope *scope;
124 void * tmp = start;
125 int index;
126 int ret;
127
128 *cnt = 0;
129 while (start < end) {
130 scope = start;
131 if (scope->entry_type == ACPI_DMAR_SCOPE_TYPE_ENDPOINT ||
132 scope->entry_type == ACPI_DMAR_SCOPE_TYPE_BRIDGE)
133 (*cnt)++;
ae3e7f3a
LC
134 else if (scope->entry_type != ACPI_DMAR_SCOPE_TYPE_IOAPIC &&
135 scope->entry_type != ACPI_DMAR_SCOPE_TYPE_HPET) {
e9071b0b 136 pr_warn("Unsupported device scope\n");
5715f0f9 137 }
10e5247f
KA
138 start += scope->length;
139 }
140 if (*cnt == 0)
141 return 0;
142
143 *devices = kcalloc(*cnt, sizeof(struct pci_dev *), GFP_KERNEL);
144 if (!*devices)
145 return -ENOMEM;
146
147 start = tmp;
148 index = 0;
149 while (start < end) {
150 scope = start;
151 if (scope->entry_type == ACPI_DMAR_SCOPE_TYPE_ENDPOINT ||
152 scope->entry_type == ACPI_DMAR_SCOPE_TYPE_BRIDGE) {
153 ret = dmar_parse_one_dev_scope(scope,
154 &(*devices)[index], segment);
155 if (ret) {
ada4d4b2 156 dmar_free_dev_scope(devices, cnt);
10e5247f
KA
157 return ret;
158 }
159 index ++;
160 }
161 start += scope->length;
162 }
163
164 return 0;
165}
166
ada4d4b2
JL
167void dmar_free_dev_scope(struct pci_dev ***devices, int *cnt)
168{
169 if (*devices && *cnt) {
170 while (--*cnt >= 0)
171 pci_dev_put((*devices)[*cnt]);
172 kfree(*devices);
173 *devices = NULL;
174 *cnt = 0;
175 }
176}
177
10e5247f
KA
178/**
179 * dmar_parse_one_drhd - parses exactly one DMA remapping hardware definition
180 * structure which uniquely represent one DMA remapping hardware unit
181 * present in the platform
182 */
183static int __init
184dmar_parse_one_drhd(struct acpi_dmar_header *header)
185{
186 struct acpi_dmar_hardware_unit *drhd;
187 struct dmar_drhd_unit *dmaru;
188 int ret = 0;
10e5247f 189
e523b38e 190 drhd = (struct acpi_dmar_hardware_unit *)header;
10e5247f
KA
191 dmaru = kzalloc(sizeof(*dmaru), GFP_KERNEL);
192 if (!dmaru)
193 return -ENOMEM;
194
1886e8a9 195 dmaru->hdr = header;
10e5247f 196 dmaru->reg_base_addr = drhd->address;
276dbf99 197 dmaru->segment = drhd->segment;
10e5247f
KA
198 dmaru->include_all = drhd->flags & 0x1; /* BIT0: INCLUDE_ALL */
199
1886e8a9
SS
200 ret = alloc_iommu(dmaru);
201 if (ret) {
202 kfree(dmaru);
203 return ret;
204 }
205 dmar_register_drhd_unit(dmaru);
206 return 0;
207}
208
a868e6b7
JL
209static void dmar_free_drhd(struct dmar_drhd_unit *dmaru)
210{
211 if (dmaru->devices && dmaru->devices_cnt)
212 dmar_free_dev_scope(&dmaru->devices, &dmaru->devices_cnt);
213 if (dmaru->iommu)
214 free_iommu(dmaru->iommu);
215 kfree(dmaru);
216}
217
f82851a8 218static int __init dmar_parse_dev(struct dmar_drhd_unit *dmaru)
1886e8a9
SS
219{
220 struct acpi_dmar_hardware_unit *drhd;
1886e8a9
SS
221
222 drhd = (struct acpi_dmar_hardware_unit *) dmaru->hdr;
223
2e824f79
YZ
224 if (dmaru->include_all)
225 return 0;
226
a868e6b7
JL
227 return dmar_parse_dev_scope((void *)(drhd + 1),
228 ((void *)drhd) + drhd->header.length,
229 &dmaru->devices_cnt, &dmaru->devices,
230 drhd->segment);
10e5247f
KA
231}
232
aa697079 233#ifdef CONFIG_ACPI_NUMA
ee34b32d
SS
234static int __init
235dmar_parse_one_rhsa(struct acpi_dmar_header *header)
236{
237 struct acpi_dmar_rhsa *rhsa;
238 struct dmar_drhd_unit *drhd;
239
240 rhsa = (struct acpi_dmar_rhsa *)header;
aa697079 241 for_each_drhd_unit(drhd) {
ee34b32d
SS
242 if (drhd->reg_base_addr == rhsa->base_address) {
243 int node = acpi_map_pxm_to_node(rhsa->proximity_domain);
244
245 if (!node_online(node))
246 node = -1;
247 drhd->iommu->node = node;
aa697079
DW
248 return 0;
249 }
ee34b32d 250 }
fd0c8894
BH
251 WARN_TAINT(
252 1, TAINT_FIRMWARE_WORKAROUND,
253 "Your BIOS is broken; RHSA refers to non-existent DMAR unit at %llx\n"
254 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
255 drhd->reg_base_addr,
256 dmi_get_system_info(DMI_BIOS_VENDOR),
257 dmi_get_system_info(DMI_BIOS_VERSION),
258 dmi_get_system_info(DMI_PRODUCT_VERSION));
ee34b32d 259
aa697079 260 return 0;
ee34b32d 261}
aa697079 262#endif
ee34b32d 263
10e5247f
KA
264static void __init
265dmar_table_print_dmar_entry(struct acpi_dmar_header *header)
266{
267 struct acpi_dmar_hardware_unit *drhd;
268 struct acpi_dmar_reserved_memory *rmrr;
aa5d2b51 269 struct acpi_dmar_atsr *atsr;
17b60977 270 struct acpi_dmar_rhsa *rhsa;
10e5247f
KA
271
272 switch (header->type) {
273 case ACPI_DMAR_TYPE_HARDWARE_UNIT:
aa5d2b51
YZ
274 drhd = container_of(header, struct acpi_dmar_hardware_unit,
275 header);
e9071b0b 276 pr_info("DRHD base: %#016Lx flags: %#x\n",
aa5d2b51 277 (unsigned long long)drhd->address, drhd->flags);
10e5247f
KA
278 break;
279 case ACPI_DMAR_TYPE_RESERVED_MEMORY:
aa5d2b51
YZ
280 rmrr = container_of(header, struct acpi_dmar_reserved_memory,
281 header);
e9071b0b 282 pr_info("RMRR base: %#016Lx end: %#016Lx\n",
5b6985ce
FY
283 (unsigned long long)rmrr->base_address,
284 (unsigned long long)rmrr->end_address);
10e5247f 285 break;
aa5d2b51
YZ
286 case ACPI_DMAR_TYPE_ATSR:
287 atsr = container_of(header, struct acpi_dmar_atsr, header);
e9071b0b 288 pr_info("ATSR flags: %#x\n", atsr->flags);
aa5d2b51 289 break;
17b60977
RD
290 case ACPI_DMAR_HARDWARE_AFFINITY:
291 rhsa = container_of(header, struct acpi_dmar_rhsa, header);
e9071b0b 292 pr_info("RHSA base: %#016Lx proximity domain: %#x\n",
17b60977
RD
293 (unsigned long long)rhsa->base_address,
294 rhsa->proximity_domain);
295 break;
10e5247f
KA
296 }
297}
298
f6dd5c31
YL
299/**
300 * dmar_table_detect - checks to see if the platform supports DMAR devices
301 */
302static int __init dmar_table_detect(void)
303{
304 acpi_status status = AE_OK;
305
306 /* if we could find DMAR table, then there are DMAR devices */
8e1568f3
YL
307 status = acpi_get_table_with_size(ACPI_SIG_DMAR, 0,
308 (struct acpi_table_header **)&dmar_tbl,
309 &dmar_tbl_size);
f6dd5c31
YL
310
311 if (ACPI_SUCCESS(status) && !dmar_tbl) {
e9071b0b 312 pr_warn("Unable to map DMAR\n");
f6dd5c31
YL
313 status = AE_NOT_FOUND;
314 }
315
316 return (ACPI_SUCCESS(status) ? 1 : 0);
317}
aaa9d1dd 318
10e5247f
KA
319/**
320 * parse_dmar_table - parses the DMA reporting table
321 */
322static int __init
323parse_dmar_table(void)
324{
325 struct acpi_table_dmar *dmar;
326 struct acpi_dmar_header *entry_header;
327 int ret = 0;
7cef3347 328 int drhd_count = 0;
10e5247f 329
f6dd5c31
YL
330 /*
331 * Do it again, earlier dmar_tbl mapping could be mapped with
332 * fixed map.
333 */
334 dmar_table_detect();
335
a59b50e9
JC
336 /*
337 * ACPI tables may not be DMA protected by tboot, so use DMAR copy
338 * SINIT saved in SinitMleData in TXT heap (which is DMA protected)
339 */
340 dmar_tbl = tboot_get_dmar_table(dmar_tbl);
341
10e5247f
KA
342 dmar = (struct acpi_table_dmar *)dmar_tbl;
343 if (!dmar)
344 return -ENODEV;
345
5b6985ce 346 if (dmar->width < PAGE_SHIFT - 1) {
e9071b0b 347 pr_warn("Invalid DMAR haw\n");
10e5247f
KA
348 return -EINVAL;
349 }
350
e9071b0b 351 pr_info("Host address width %d\n", dmar->width + 1);
10e5247f
KA
352
353 entry_header = (struct acpi_dmar_header *)(dmar + 1);
354 while (((unsigned long)entry_header) <
355 (((unsigned long)dmar) + dmar_tbl->length)) {
084eb960
TB
356 /* Avoid looping forever on bad ACPI tables */
357 if (entry_header->length == 0) {
e9071b0b 358 pr_warn("Invalid 0-length structure\n");
084eb960
TB
359 ret = -EINVAL;
360 break;
361 }
362
10e5247f
KA
363 dmar_table_print_dmar_entry(entry_header);
364
365 switch (entry_header->type) {
366 case ACPI_DMAR_TYPE_HARDWARE_UNIT:
7cef3347 367 drhd_count++;
10e5247f
KA
368 ret = dmar_parse_one_drhd(entry_header);
369 break;
370 case ACPI_DMAR_TYPE_RESERVED_MEMORY:
371 ret = dmar_parse_one_rmrr(entry_header);
aa5d2b51
YZ
372 break;
373 case ACPI_DMAR_TYPE_ATSR:
aa5d2b51 374 ret = dmar_parse_one_atsr(entry_header);
10e5247f 375 break;
17b60977 376 case ACPI_DMAR_HARDWARE_AFFINITY:
aa697079 377#ifdef CONFIG_ACPI_NUMA
ee34b32d 378 ret = dmar_parse_one_rhsa(entry_header);
aa697079 379#endif
17b60977 380 break;
10e5247f 381 default:
e9071b0b 382 pr_warn("Unknown DMAR structure type %d\n",
4de75cf9 383 entry_header->type);
10e5247f
KA
384 ret = 0; /* for forward compatibility */
385 break;
386 }
387 if (ret)
388 break;
389
390 entry_header = ((void *)entry_header + entry_header->length);
391 }
7cef3347
LZH
392 if (drhd_count == 0)
393 pr_warn(FW_BUG "No DRHD structure found in DMAR table\n");
10e5247f
KA
394 return ret;
395}
396
dda56549 397static int dmar_pci_device_match(struct pci_dev *devices[], int cnt,
e61d98d8
SS
398 struct pci_dev *dev)
399{
400 int index;
401
402 while (dev) {
403 for (index = 0; index < cnt; index++)
404 if (dev == devices[index])
405 return 1;
406
407 /* Check our parent */
408 dev = dev->bus->self;
409 }
410
411 return 0;
412}
413
414struct dmar_drhd_unit *
415dmar_find_matched_drhd_unit(struct pci_dev *dev)
416{
2e824f79
YZ
417 struct dmar_drhd_unit *dmaru = NULL;
418 struct acpi_dmar_hardware_unit *drhd;
419
dda56549
Y
420 dev = pci_physfn(dev);
421
8b161f0e 422 for_each_drhd_unit(dmaru) {
2e824f79
YZ
423 drhd = container_of(dmaru->hdr,
424 struct acpi_dmar_hardware_unit,
425 header);
426
427 if (dmaru->include_all &&
428 drhd->segment == pci_domain_nr(dev->bus))
429 return dmaru;
e61d98d8 430
2e824f79
YZ
431 if (dmar_pci_device_match(dmaru->devices,
432 dmaru->devices_cnt, dev))
433 return dmaru;
e61d98d8
SS
434 }
435
436 return NULL;
437}
438
1886e8a9
SS
439int __init dmar_dev_scope_init(void)
440{
c2c7286a 441 static int dmar_dev_scope_initialized;
a868e6b7 442 struct dmar_drhd_unit *drhd;
1886e8a9
SS
443 int ret = -ENODEV;
444
c2c7286a
SS
445 if (dmar_dev_scope_initialized)
446 return dmar_dev_scope_initialized;
447
318fe7df
SS
448 if (list_empty(&dmar_drhd_units))
449 goto fail;
450
a868e6b7 451 list_for_each_entry(drhd, &dmar_drhd_units, list) {
1886e8a9
SS
452 ret = dmar_parse_dev(drhd);
453 if (ret)
c2c7286a 454 goto fail;
1886e8a9
SS
455 }
456
318fe7df
SS
457 ret = dmar_parse_rmrr_atsr_dev();
458 if (ret)
459 goto fail;
1886e8a9 460
c2c7286a
SS
461 dmar_dev_scope_initialized = 1;
462 return 0;
463
464fail:
465 dmar_dev_scope_initialized = ret;
1886e8a9
SS
466 return ret;
467}
468
10e5247f
KA
469
470int __init dmar_table_init(void)
471{
1886e8a9 472 static int dmar_table_initialized;
093f87d2
FY
473 int ret;
474
1886e8a9
SS
475 if (dmar_table_initialized)
476 return 0;
477
478 dmar_table_initialized = 1;
479
093f87d2
FY
480 ret = parse_dmar_table();
481 if (ret) {
1886e8a9 482 if (ret != -ENODEV)
e9071b0b 483 pr_info("parse DMAR table failure.\n");
093f87d2
FY
484 return ret;
485 }
486
10e5247f 487 if (list_empty(&dmar_drhd_units)) {
e9071b0b 488 pr_info("No DMAR devices found\n");
10e5247f
KA
489 return -ENODEV;
490 }
093f87d2 491
10e5247f
KA
492 return 0;
493}
494
3a8663ee
BH
495static void warn_invalid_dmar(u64 addr, const char *message)
496{
fd0c8894
BH
497 WARN_TAINT_ONCE(
498 1, TAINT_FIRMWARE_WORKAROUND,
499 "Your BIOS is broken; DMAR reported at address %llx%s!\n"
500 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
501 addr, message,
502 dmi_get_system_info(DMI_BIOS_VENDOR),
503 dmi_get_system_info(DMI_BIOS_VERSION),
504 dmi_get_system_info(DMI_PRODUCT_VERSION));
3a8663ee 505}
6ecbf01c 506
21004dcd 507static int __init check_zero_address(void)
86cf898e
DW
508{
509 struct acpi_table_dmar *dmar;
510 struct acpi_dmar_header *entry_header;
511 struct acpi_dmar_hardware_unit *drhd;
512
513 dmar = (struct acpi_table_dmar *)dmar_tbl;
514 entry_header = (struct acpi_dmar_header *)(dmar + 1);
515
516 while (((unsigned long)entry_header) <
517 (((unsigned long)dmar) + dmar_tbl->length)) {
518 /* Avoid looping forever on bad ACPI tables */
519 if (entry_header->length == 0) {
e9071b0b 520 pr_warn("Invalid 0-length structure\n");
86cf898e
DW
521 return 0;
522 }
523
524 if (entry_header->type == ACPI_DMAR_TYPE_HARDWARE_UNIT) {
2c992208
CW
525 void __iomem *addr;
526 u64 cap, ecap;
527
86cf898e
DW
528 drhd = (void *)entry_header;
529 if (!drhd->address) {
3a8663ee 530 warn_invalid_dmar(0, "");
2c992208
CW
531 goto failed;
532 }
533
534 addr = early_ioremap(drhd->address, VTD_PAGE_SIZE);
535 if (!addr ) {
536 printk("IOMMU: can't validate: %llx\n", drhd->address);
537 goto failed;
538 }
539 cap = dmar_readq(addr + DMAR_CAP_REG);
540 ecap = dmar_readq(addr + DMAR_ECAP_REG);
541 early_iounmap(addr, VTD_PAGE_SIZE);
542 if (cap == (uint64_t)-1 && ecap == (uint64_t)-1) {
3a8663ee
BH
543 warn_invalid_dmar(drhd->address,
544 " returns all ones");
2c992208 545 goto failed;
86cf898e 546 }
86cf898e
DW
547 }
548
549 entry_header = ((void *)entry_header + entry_header->length);
550 }
551 return 1;
2c992208
CW
552
553failed:
2c992208 554 return 0;
86cf898e
DW
555}
556
480125ba 557int __init detect_intel_iommu(void)
2ae21010
SS
558{
559 int ret;
560
f6dd5c31 561 ret = dmar_table_detect();
86cf898e
DW
562 if (ret)
563 ret = check_zero_address();
2ae21010 564 {
11bd04f6 565 if (ret && !no_iommu && !iommu_detected && !dmar_disabled) {
2ae21010 566 iommu_detected = 1;
5d990b62
CW
567 /* Make sure ACS will be enabled */
568 pci_request_acs();
569 }
f5d1b97b 570
9d5ce73a
FT
571#ifdef CONFIG_X86
572 if (ret)
573 x86_init.iommu.iommu_init = intel_iommu_init;
2ae21010 574#endif
cacd4213 575 }
8e1568f3 576 early_acpi_os_unmap_memory(dmar_tbl, dmar_tbl_size);
f6dd5c31 577 dmar_tbl = NULL;
480125ba 578
4db77ff3 579 return ret ? 1 : -ENODEV;
2ae21010
SS
580}
581
582
6f5cf521
DD
583static void unmap_iommu(struct intel_iommu *iommu)
584{
585 iounmap(iommu->reg);
586 release_mem_region(iommu->reg_phys, iommu->reg_size);
587}
588
589/**
590 * map_iommu: map the iommu's registers
591 * @iommu: the iommu to map
592 * @phys_addr: the physical address of the base resgister
e9071b0b 593 *
6f5cf521 594 * Memory map the iommu's registers. Start w/ a single page, and
e9071b0b 595 * possibly expand if that turns out to be insufficent.
6f5cf521
DD
596 */
597static int map_iommu(struct intel_iommu *iommu, u64 phys_addr)
598{
599 int map_size, err=0;
600
601 iommu->reg_phys = phys_addr;
602 iommu->reg_size = VTD_PAGE_SIZE;
603
604 if (!request_mem_region(iommu->reg_phys, iommu->reg_size, iommu->name)) {
605 pr_err("IOMMU: can't reserve memory\n");
606 err = -EBUSY;
607 goto out;
608 }
609
610 iommu->reg = ioremap(iommu->reg_phys, iommu->reg_size);
611 if (!iommu->reg) {
612 pr_err("IOMMU: can't map the region\n");
613 err = -ENOMEM;
614 goto release;
615 }
616
617 iommu->cap = dmar_readq(iommu->reg + DMAR_CAP_REG);
618 iommu->ecap = dmar_readq(iommu->reg + DMAR_ECAP_REG);
619
620 if (iommu->cap == (uint64_t)-1 && iommu->ecap == (uint64_t)-1) {
621 err = -EINVAL;
622 warn_invalid_dmar(phys_addr, " returns all ones");
623 goto unmap;
624 }
625
626 /* the registers might be more than one page */
627 map_size = max_t(int, ecap_max_iotlb_offset(iommu->ecap),
628 cap_max_fault_reg_offset(iommu->cap));
629 map_size = VTD_PAGE_ALIGN(map_size);
630 if (map_size > iommu->reg_size) {
631 iounmap(iommu->reg);
632 release_mem_region(iommu->reg_phys, iommu->reg_size);
633 iommu->reg_size = map_size;
634 if (!request_mem_region(iommu->reg_phys, iommu->reg_size,
635 iommu->name)) {
636 pr_err("IOMMU: can't reserve memory\n");
637 err = -EBUSY;
638 goto out;
639 }
640 iommu->reg = ioremap(iommu->reg_phys, iommu->reg_size);
641 if (!iommu->reg) {
642 pr_err("IOMMU: can't map the region\n");
643 err = -ENOMEM;
644 goto release;
645 }
646 }
647 err = 0;
648 goto out;
649
650unmap:
651 iounmap(iommu->reg);
652release:
653 release_mem_region(iommu->reg_phys, iommu->reg_size);
654out:
655 return err;
656}
657
694835dc 658static int alloc_iommu(struct dmar_drhd_unit *drhd)
e61d98d8 659{
c42d9f32 660 struct intel_iommu *iommu;
3a93c841 661 u32 ver, sts;
c42d9f32 662 static int iommu_allocated = 0;
43f7392b 663 int agaw = 0;
4ed0d3e6 664 int msagaw = 0;
6f5cf521 665 int err;
c42d9f32 666
6ecbf01c 667 if (!drhd->reg_base_addr) {
3a8663ee 668 warn_invalid_dmar(0, "");
6ecbf01c
DW
669 return -EINVAL;
670 }
671
c42d9f32
SS
672 iommu = kzalloc(sizeof(*iommu), GFP_KERNEL);
673 if (!iommu)
1886e8a9 674 return -ENOMEM;
c42d9f32
SS
675
676 iommu->seq_id = iommu_allocated++;
9d783ba0 677 sprintf (iommu->name, "dmar%d", iommu->seq_id);
e61d98d8 678
6f5cf521
DD
679 err = map_iommu(iommu, drhd->reg_base_addr);
680 if (err) {
681 pr_err("IOMMU: failed to map %s\n", iommu->name);
e61d98d8
SS
682 goto error;
683 }
0815565a 684
6f5cf521 685 err = -EINVAL;
1b573683
WH
686 agaw = iommu_calculate_agaw(iommu);
687 if (agaw < 0) {
bf947fcb
DD
688 pr_err("Cannot get a valid agaw for iommu (seq_id = %d)\n",
689 iommu->seq_id);
0815565a 690 goto err_unmap;
4ed0d3e6
FY
691 }
692 msagaw = iommu_calculate_max_sagaw(iommu);
693 if (msagaw < 0) {
bf947fcb 694 pr_err("Cannot get a valid max agaw for iommu (seq_id = %d)\n",
1b573683 695 iommu->seq_id);
0815565a 696 goto err_unmap;
1b573683
WH
697 }
698 iommu->agaw = agaw;
4ed0d3e6 699 iommu->msagaw = msagaw;
1b573683 700
ee34b32d
SS
701 iommu->node = -1;
702
e61d98d8 703 ver = readl(iommu->reg + DMAR_VER_REG);
680a7524
YL
704 pr_info("IOMMU %d: reg_base_addr %llx ver %d:%d cap %llx ecap %llx\n",
705 iommu->seq_id,
5b6985ce
FY
706 (unsigned long long)drhd->reg_base_addr,
707 DMAR_VER_MAJOR(ver), DMAR_VER_MINOR(ver),
708 (unsigned long long)iommu->cap,
709 (unsigned long long)iommu->ecap);
e61d98d8 710
3a93c841
TI
711 /* Reflect status in gcmd */
712 sts = readl(iommu->reg + DMAR_GSTS_REG);
713 if (sts & DMA_GSTS_IRES)
714 iommu->gcmd |= DMA_GCMD_IRE;
715 if (sts & DMA_GSTS_TES)
716 iommu->gcmd |= DMA_GCMD_TE;
717 if (sts & DMA_GSTS_QIES)
718 iommu->gcmd |= DMA_GCMD_QIE;
719
1f5b3c3f 720 raw_spin_lock_init(&iommu->register_lock);
e61d98d8
SS
721
722 drhd->iommu = iommu;
1886e8a9 723 return 0;
0815565a
DW
724
725 err_unmap:
6f5cf521 726 unmap_iommu(iommu);
0815565a 727 error:
e61d98d8 728 kfree(iommu);
6f5cf521 729 return err;
e61d98d8
SS
730}
731
a868e6b7 732static void free_iommu(struct intel_iommu *iommu)
e61d98d8 733{
a868e6b7
JL
734 if (iommu->irq) {
735 free_irq(iommu->irq, iommu);
736 irq_set_handler_data(iommu->irq, NULL);
737 destroy_irq(iommu->irq);
738 }
e61d98d8
SS
739
740 if (iommu->reg)
6f5cf521
DD
741 unmap_iommu(iommu);
742
e61d98d8
SS
743 kfree(iommu);
744}
fe962e90
SS
745
746/*
747 * Reclaim all the submitted descriptors which have completed its work.
748 */
749static inline void reclaim_free_desc(struct q_inval *qi)
750{
6ba6c3a4
YZ
751 while (qi->desc_status[qi->free_tail] == QI_DONE ||
752 qi->desc_status[qi->free_tail] == QI_ABORT) {
fe962e90
SS
753 qi->desc_status[qi->free_tail] = QI_FREE;
754 qi->free_tail = (qi->free_tail + 1) % QI_LENGTH;
755 qi->free_cnt++;
756 }
757}
758
704126ad
YZ
759static int qi_check_fault(struct intel_iommu *iommu, int index)
760{
761 u32 fault;
6ba6c3a4 762 int head, tail;
704126ad
YZ
763 struct q_inval *qi = iommu->qi;
764 int wait_index = (index + 1) % QI_LENGTH;
765
6ba6c3a4
YZ
766 if (qi->desc_status[wait_index] == QI_ABORT)
767 return -EAGAIN;
768
704126ad
YZ
769 fault = readl(iommu->reg + DMAR_FSTS_REG);
770
771 /*
772 * If IQE happens, the head points to the descriptor associated
773 * with the error. No new descriptors are fetched until the IQE
774 * is cleared.
775 */
776 if (fault & DMA_FSTS_IQE) {
777 head = readl(iommu->reg + DMAR_IQH_REG);
6ba6c3a4 778 if ((head >> DMAR_IQ_SHIFT) == index) {
bf947fcb 779 pr_err("VT-d detected invalid descriptor: "
6ba6c3a4
YZ
780 "low=%llx, high=%llx\n",
781 (unsigned long long)qi->desc[index].low,
782 (unsigned long long)qi->desc[index].high);
704126ad
YZ
783 memcpy(&qi->desc[index], &qi->desc[wait_index],
784 sizeof(struct qi_desc));
785 __iommu_flush_cache(iommu, &qi->desc[index],
786 sizeof(struct qi_desc));
787 writel(DMA_FSTS_IQE, iommu->reg + DMAR_FSTS_REG);
788 return -EINVAL;
789 }
790 }
791
6ba6c3a4
YZ
792 /*
793 * If ITE happens, all pending wait_desc commands are aborted.
794 * No new descriptors are fetched until the ITE is cleared.
795 */
796 if (fault & DMA_FSTS_ITE) {
797 head = readl(iommu->reg + DMAR_IQH_REG);
798 head = ((head >> DMAR_IQ_SHIFT) - 1 + QI_LENGTH) % QI_LENGTH;
799 head |= 1;
800 tail = readl(iommu->reg + DMAR_IQT_REG);
801 tail = ((tail >> DMAR_IQ_SHIFT) - 1 + QI_LENGTH) % QI_LENGTH;
802
803 writel(DMA_FSTS_ITE, iommu->reg + DMAR_FSTS_REG);
804
805 do {
806 if (qi->desc_status[head] == QI_IN_USE)
807 qi->desc_status[head] = QI_ABORT;
808 head = (head - 2 + QI_LENGTH) % QI_LENGTH;
809 } while (head != tail);
810
811 if (qi->desc_status[wait_index] == QI_ABORT)
812 return -EAGAIN;
813 }
814
815 if (fault & DMA_FSTS_ICE)
816 writel(DMA_FSTS_ICE, iommu->reg + DMAR_FSTS_REG);
817
704126ad
YZ
818 return 0;
819}
820
fe962e90
SS
821/*
822 * Submit the queued invalidation descriptor to the remapping
823 * hardware unit and wait for its completion.
824 */
704126ad 825int qi_submit_sync(struct qi_desc *desc, struct intel_iommu *iommu)
fe962e90 826{
6ba6c3a4 827 int rc;
fe962e90
SS
828 struct q_inval *qi = iommu->qi;
829 struct qi_desc *hw, wait_desc;
830 int wait_index, index;
831 unsigned long flags;
832
833 if (!qi)
704126ad 834 return 0;
fe962e90
SS
835
836 hw = qi->desc;
837
6ba6c3a4
YZ
838restart:
839 rc = 0;
840
3b8f4048 841 raw_spin_lock_irqsave(&qi->q_lock, flags);
fe962e90 842 while (qi->free_cnt < 3) {
3b8f4048 843 raw_spin_unlock_irqrestore(&qi->q_lock, flags);
fe962e90 844 cpu_relax();
3b8f4048 845 raw_spin_lock_irqsave(&qi->q_lock, flags);
fe962e90
SS
846 }
847
848 index = qi->free_head;
849 wait_index = (index + 1) % QI_LENGTH;
850
851 qi->desc_status[index] = qi->desc_status[wait_index] = QI_IN_USE;
852
853 hw[index] = *desc;
854
704126ad
YZ
855 wait_desc.low = QI_IWD_STATUS_DATA(QI_DONE) |
856 QI_IWD_STATUS_WRITE | QI_IWD_TYPE;
fe962e90
SS
857 wait_desc.high = virt_to_phys(&qi->desc_status[wait_index]);
858
859 hw[wait_index] = wait_desc;
860
861 __iommu_flush_cache(iommu, &hw[index], sizeof(struct qi_desc));
862 __iommu_flush_cache(iommu, &hw[wait_index], sizeof(struct qi_desc));
863
864 qi->free_head = (qi->free_head + 2) % QI_LENGTH;
865 qi->free_cnt -= 2;
866
fe962e90
SS
867 /*
868 * update the HW tail register indicating the presence of
869 * new descriptors.
870 */
6ba6c3a4 871 writel(qi->free_head << DMAR_IQ_SHIFT, iommu->reg + DMAR_IQT_REG);
fe962e90
SS
872
873 while (qi->desc_status[wait_index] != QI_DONE) {
f05810c9
SS
874 /*
875 * We will leave the interrupts disabled, to prevent interrupt
876 * context to queue another cmd while a cmd is already submitted
877 * and waiting for completion on this cpu. This is to avoid
878 * a deadlock where the interrupt context can wait indefinitely
879 * for free slots in the queue.
880 */
704126ad
YZ
881 rc = qi_check_fault(iommu, index);
882 if (rc)
6ba6c3a4 883 break;
704126ad 884
3b8f4048 885 raw_spin_unlock(&qi->q_lock);
fe962e90 886 cpu_relax();
3b8f4048 887 raw_spin_lock(&qi->q_lock);
fe962e90 888 }
6ba6c3a4
YZ
889
890 qi->desc_status[index] = QI_DONE;
fe962e90
SS
891
892 reclaim_free_desc(qi);
3b8f4048 893 raw_spin_unlock_irqrestore(&qi->q_lock, flags);
704126ad 894
6ba6c3a4
YZ
895 if (rc == -EAGAIN)
896 goto restart;
897
704126ad 898 return rc;
fe962e90
SS
899}
900
901/*
902 * Flush the global interrupt entry cache.
903 */
904void qi_global_iec(struct intel_iommu *iommu)
905{
906 struct qi_desc desc;
907
908 desc.low = QI_IEC_TYPE;
909 desc.high = 0;
910
704126ad 911 /* should never fail */
fe962e90
SS
912 qi_submit_sync(&desc, iommu);
913}
914
4c25a2c1
DW
915void qi_flush_context(struct intel_iommu *iommu, u16 did, u16 sid, u8 fm,
916 u64 type)
3481f210 917{
3481f210
YS
918 struct qi_desc desc;
919
3481f210
YS
920 desc.low = QI_CC_FM(fm) | QI_CC_SID(sid) | QI_CC_DID(did)
921 | QI_CC_GRAN(type) | QI_CC_TYPE;
922 desc.high = 0;
923
4c25a2c1 924 qi_submit_sync(&desc, iommu);
3481f210
YS
925}
926
1f0ef2aa
DW
927void qi_flush_iotlb(struct intel_iommu *iommu, u16 did, u64 addr,
928 unsigned int size_order, u64 type)
3481f210
YS
929{
930 u8 dw = 0, dr = 0;
931
932 struct qi_desc desc;
933 int ih = 0;
934
3481f210
YS
935 if (cap_write_drain(iommu->cap))
936 dw = 1;
937
938 if (cap_read_drain(iommu->cap))
939 dr = 1;
940
941 desc.low = QI_IOTLB_DID(did) | QI_IOTLB_DR(dr) | QI_IOTLB_DW(dw)
942 | QI_IOTLB_GRAN(type) | QI_IOTLB_TYPE;
943 desc.high = QI_IOTLB_ADDR(addr) | QI_IOTLB_IH(ih)
944 | QI_IOTLB_AM(size_order);
945
1f0ef2aa 946 qi_submit_sync(&desc, iommu);
3481f210
YS
947}
948
6ba6c3a4
YZ
949void qi_flush_dev_iotlb(struct intel_iommu *iommu, u16 sid, u16 qdep,
950 u64 addr, unsigned mask)
951{
952 struct qi_desc desc;
953
954 if (mask) {
955 BUG_ON(addr & ((1 << (VTD_PAGE_SHIFT + mask)) - 1));
956 addr |= (1 << (VTD_PAGE_SHIFT + mask - 1)) - 1;
957 desc.high = QI_DEV_IOTLB_ADDR(addr) | QI_DEV_IOTLB_SIZE;
958 } else
959 desc.high = QI_DEV_IOTLB_ADDR(addr);
960
961 if (qdep >= QI_DEV_IOTLB_MAX_INVS)
962 qdep = 0;
963
964 desc.low = QI_DEV_IOTLB_SID(sid) | QI_DEV_IOTLB_QDEP(qdep) |
965 QI_DIOTLB_TYPE;
966
967 qi_submit_sync(&desc, iommu);
968}
969
eba67e5d
SS
970/*
971 * Disable Queued Invalidation interface.
972 */
973void dmar_disable_qi(struct intel_iommu *iommu)
974{
975 unsigned long flags;
976 u32 sts;
977 cycles_t start_time = get_cycles();
978
979 if (!ecap_qis(iommu->ecap))
980 return;
981
1f5b3c3f 982 raw_spin_lock_irqsave(&iommu->register_lock, flags);
eba67e5d
SS
983
984 sts = dmar_readq(iommu->reg + DMAR_GSTS_REG);
985 if (!(sts & DMA_GSTS_QIES))
986 goto end;
987
988 /*
989 * Give a chance to HW to complete the pending invalidation requests.
990 */
991 while ((readl(iommu->reg + DMAR_IQT_REG) !=
992 readl(iommu->reg + DMAR_IQH_REG)) &&
993 (DMAR_OPERATION_TIMEOUT > (get_cycles() - start_time)))
994 cpu_relax();
995
996 iommu->gcmd &= ~DMA_GCMD_QIE;
eba67e5d
SS
997 writel(iommu->gcmd, iommu->reg + DMAR_GCMD_REG);
998
999 IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG, readl,
1000 !(sts & DMA_GSTS_QIES), sts);
1001end:
1f5b3c3f 1002 raw_spin_unlock_irqrestore(&iommu->register_lock, flags);
eba67e5d
SS
1003}
1004
eb4a52bc
FY
1005/*
1006 * Enable queued invalidation.
1007 */
1008static void __dmar_enable_qi(struct intel_iommu *iommu)
1009{
c416daa9 1010 u32 sts;
eb4a52bc
FY
1011 unsigned long flags;
1012 struct q_inval *qi = iommu->qi;
1013
1014 qi->free_head = qi->free_tail = 0;
1015 qi->free_cnt = QI_LENGTH;
1016
1f5b3c3f 1017 raw_spin_lock_irqsave(&iommu->register_lock, flags);
eb4a52bc
FY
1018
1019 /* write zero to the tail reg */
1020 writel(0, iommu->reg + DMAR_IQT_REG);
1021
1022 dmar_writeq(iommu->reg + DMAR_IQA_REG, virt_to_phys(qi->desc));
1023
eb4a52bc 1024 iommu->gcmd |= DMA_GCMD_QIE;
c416daa9 1025 writel(iommu->gcmd, iommu->reg + DMAR_GCMD_REG);
eb4a52bc
FY
1026
1027 /* Make sure hardware complete it */
1028 IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG, readl, (sts & DMA_GSTS_QIES), sts);
1029
1f5b3c3f 1030 raw_spin_unlock_irqrestore(&iommu->register_lock, flags);
eb4a52bc
FY
1031}
1032
fe962e90
SS
1033/*
1034 * Enable Queued Invalidation interface. This is a must to support
1035 * interrupt-remapping. Also used by DMA-remapping, which replaces
1036 * register based IOTLB invalidation.
1037 */
1038int dmar_enable_qi(struct intel_iommu *iommu)
1039{
fe962e90 1040 struct q_inval *qi;
751cafe3 1041 struct page *desc_page;
fe962e90
SS
1042
1043 if (!ecap_qis(iommu->ecap))
1044 return -ENOENT;
1045
1046 /*
1047 * queued invalidation is already setup and enabled.
1048 */
1049 if (iommu->qi)
1050 return 0;
1051
fa4b57cc 1052 iommu->qi = kmalloc(sizeof(*qi), GFP_ATOMIC);
fe962e90
SS
1053 if (!iommu->qi)
1054 return -ENOMEM;
1055
1056 qi = iommu->qi;
1057
751cafe3
SS
1058
1059 desc_page = alloc_pages_node(iommu->node, GFP_ATOMIC | __GFP_ZERO, 0);
1060 if (!desc_page) {
fe962e90
SS
1061 kfree(qi);
1062 iommu->qi = 0;
1063 return -ENOMEM;
1064 }
1065
751cafe3
SS
1066 qi->desc = page_address(desc_page);
1067
37a40710 1068 qi->desc_status = kzalloc(QI_LENGTH * sizeof(int), GFP_ATOMIC);
fe962e90
SS
1069 if (!qi->desc_status) {
1070 free_page((unsigned long) qi->desc);
1071 kfree(qi);
1072 iommu->qi = 0;
1073 return -ENOMEM;
1074 }
1075
1076 qi->free_head = qi->free_tail = 0;
1077 qi->free_cnt = QI_LENGTH;
1078
3b8f4048 1079 raw_spin_lock_init(&qi->q_lock);
fe962e90 1080
eb4a52bc 1081 __dmar_enable_qi(iommu);
fe962e90
SS
1082
1083 return 0;
1084}
0ac2491f
SS
1085
1086/* iommu interrupt handling. Most stuff are MSI-like. */
1087
9d783ba0
SS
1088enum faulttype {
1089 DMA_REMAP,
1090 INTR_REMAP,
1091 UNKNOWN,
1092};
1093
1094static const char *dma_remap_fault_reasons[] =
0ac2491f
SS
1095{
1096 "Software",
1097 "Present bit in root entry is clear",
1098 "Present bit in context entry is clear",
1099 "Invalid context entry",
1100 "Access beyond MGAW",
1101 "PTE Write access is not set",
1102 "PTE Read access is not set",
1103 "Next page table ptr is invalid",
1104 "Root table address invalid",
1105 "Context table ptr is invalid",
1106 "non-zero reserved fields in RTP",
1107 "non-zero reserved fields in CTP",
1108 "non-zero reserved fields in PTE",
4ecccd9e 1109 "PCE for translation request specifies blocking",
0ac2491f 1110};
9d783ba0 1111
95a02e97 1112static const char *irq_remap_fault_reasons[] =
9d783ba0
SS
1113{
1114 "Detected reserved fields in the decoded interrupt-remapped request",
1115 "Interrupt index exceeded the interrupt-remapping table size",
1116 "Present field in the IRTE entry is clear",
1117 "Error accessing interrupt-remapping table pointed by IRTA_REG",
1118 "Detected reserved fields in the IRTE entry",
1119 "Blocked a compatibility format interrupt request",
1120 "Blocked an interrupt request due to source-id verification failure",
1121};
1122
21004dcd 1123static const char *dmar_get_fault_reason(u8 fault_reason, int *fault_type)
0ac2491f 1124{
fefe1ed1
DC
1125 if (fault_reason >= 0x20 && (fault_reason - 0x20 <
1126 ARRAY_SIZE(irq_remap_fault_reasons))) {
9d783ba0 1127 *fault_type = INTR_REMAP;
95a02e97 1128 return irq_remap_fault_reasons[fault_reason - 0x20];
9d783ba0
SS
1129 } else if (fault_reason < ARRAY_SIZE(dma_remap_fault_reasons)) {
1130 *fault_type = DMA_REMAP;
1131 return dma_remap_fault_reasons[fault_reason];
1132 } else {
1133 *fault_type = UNKNOWN;
0ac2491f 1134 return "Unknown";
9d783ba0 1135 }
0ac2491f
SS
1136}
1137
5c2837fb 1138void dmar_msi_unmask(struct irq_data *data)
0ac2491f 1139{
dced35ae 1140 struct intel_iommu *iommu = irq_data_get_irq_handler_data(data);
0ac2491f
SS
1141 unsigned long flag;
1142
1143 /* unmask it */
1f5b3c3f 1144 raw_spin_lock_irqsave(&iommu->register_lock, flag);
0ac2491f
SS
1145 writel(0, iommu->reg + DMAR_FECTL_REG);
1146 /* Read a reg to force flush the post write */
1147 readl(iommu->reg + DMAR_FECTL_REG);
1f5b3c3f 1148 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
0ac2491f
SS
1149}
1150
5c2837fb 1151void dmar_msi_mask(struct irq_data *data)
0ac2491f
SS
1152{
1153 unsigned long flag;
dced35ae 1154 struct intel_iommu *iommu = irq_data_get_irq_handler_data(data);
0ac2491f
SS
1155
1156 /* mask it */
1f5b3c3f 1157 raw_spin_lock_irqsave(&iommu->register_lock, flag);
0ac2491f
SS
1158 writel(DMA_FECTL_IM, iommu->reg + DMAR_FECTL_REG);
1159 /* Read a reg to force flush the post write */
1160 readl(iommu->reg + DMAR_FECTL_REG);
1f5b3c3f 1161 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
0ac2491f
SS
1162}
1163
1164void dmar_msi_write(int irq, struct msi_msg *msg)
1165{
dced35ae 1166 struct intel_iommu *iommu = irq_get_handler_data(irq);
0ac2491f
SS
1167 unsigned long flag;
1168
1f5b3c3f 1169 raw_spin_lock_irqsave(&iommu->register_lock, flag);
0ac2491f
SS
1170 writel(msg->data, iommu->reg + DMAR_FEDATA_REG);
1171 writel(msg->address_lo, iommu->reg + DMAR_FEADDR_REG);
1172 writel(msg->address_hi, iommu->reg + DMAR_FEUADDR_REG);
1f5b3c3f 1173 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
0ac2491f
SS
1174}
1175
1176void dmar_msi_read(int irq, struct msi_msg *msg)
1177{
dced35ae 1178 struct intel_iommu *iommu = irq_get_handler_data(irq);
0ac2491f
SS
1179 unsigned long flag;
1180
1f5b3c3f 1181 raw_spin_lock_irqsave(&iommu->register_lock, flag);
0ac2491f
SS
1182 msg->data = readl(iommu->reg + DMAR_FEDATA_REG);
1183 msg->address_lo = readl(iommu->reg + DMAR_FEADDR_REG);
1184 msg->address_hi = readl(iommu->reg + DMAR_FEUADDR_REG);
1f5b3c3f 1185 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
0ac2491f
SS
1186}
1187
1188static int dmar_fault_do_one(struct intel_iommu *iommu, int type,
1189 u8 fault_reason, u16 source_id, unsigned long long addr)
1190{
1191 const char *reason;
9d783ba0 1192 int fault_type;
0ac2491f 1193
9d783ba0 1194 reason = dmar_get_fault_reason(fault_reason, &fault_type);
0ac2491f 1195
9d783ba0 1196 if (fault_type == INTR_REMAP)
bf947fcb 1197 pr_err("INTR-REMAP: Request device [[%02x:%02x.%d] "
9d783ba0
SS
1198 "fault index %llx\n"
1199 "INTR-REMAP:[fault reason %02d] %s\n",
1200 (source_id >> 8), PCI_SLOT(source_id & 0xFF),
1201 PCI_FUNC(source_id & 0xFF), addr >> 48,
1202 fault_reason, reason);
1203 else
bf947fcb 1204 pr_err("DMAR:[%s] Request device [%02x:%02x.%d] "
9d783ba0
SS
1205 "fault addr %llx \n"
1206 "DMAR:[fault reason %02d] %s\n",
1207 (type ? "DMA Read" : "DMA Write"),
1208 (source_id >> 8), PCI_SLOT(source_id & 0xFF),
1209 PCI_FUNC(source_id & 0xFF), addr, fault_reason, reason);
0ac2491f
SS
1210 return 0;
1211}
1212
1213#define PRIMARY_FAULT_REG_LEN (16)
1531a6a6 1214irqreturn_t dmar_fault(int irq, void *dev_id)
0ac2491f
SS
1215{
1216 struct intel_iommu *iommu = dev_id;
1217 int reg, fault_index;
1218 u32 fault_status;
1219 unsigned long flag;
1220
1f5b3c3f 1221 raw_spin_lock_irqsave(&iommu->register_lock, flag);
0ac2491f 1222 fault_status = readl(iommu->reg + DMAR_FSTS_REG);
9d783ba0 1223 if (fault_status)
bf947fcb 1224 pr_err("DRHD: handling fault status reg %x\n", fault_status);
0ac2491f
SS
1225
1226 /* TBD: ignore advanced fault log currently */
1227 if (!(fault_status & DMA_FSTS_PPF))
bd5cdad0 1228 goto unlock_exit;
0ac2491f
SS
1229
1230 fault_index = dma_fsts_fault_record_index(fault_status);
1231 reg = cap_fault_reg_offset(iommu->cap);
1232 while (1) {
1233 u8 fault_reason;
1234 u16 source_id;
1235 u64 guest_addr;
1236 int type;
1237 u32 data;
1238
1239 /* highest 32 bits */
1240 data = readl(iommu->reg + reg +
1241 fault_index * PRIMARY_FAULT_REG_LEN + 12);
1242 if (!(data & DMA_FRCD_F))
1243 break;
1244
1245 fault_reason = dma_frcd_fault_reason(data);
1246 type = dma_frcd_type(data);
1247
1248 data = readl(iommu->reg + reg +
1249 fault_index * PRIMARY_FAULT_REG_LEN + 8);
1250 source_id = dma_frcd_source_id(data);
1251
1252 guest_addr = dmar_readq(iommu->reg + reg +
1253 fault_index * PRIMARY_FAULT_REG_LEN);
1254 guest_addr = dma_frcd_page_addr(guest_addr);
1255 /* clear the fault */
1256 writel(DMA_FRCD_F, iommu->reg + reg +
1257 fault_index * PRIMARY_FAULT_REG_LEN + 12);
1258
1f5b3c3f 1259 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
0ac2491f
SS
1260
1261 dmar_fault_do_one(iommu, type, fault_reason,
1262 source_id, guest_addr);
1263
1264 fault_index++;
8211a7b5 1265 if (fault_index >= cap_num_fault_regs(iommu->cap))
0ac2491f 1266 fault_index = 0;
1f5b3c3f 1267 raw_spin_lock_irqsave(&iommu->register_lock, flag);
0ac2491f 1268 }
0ac2491f 1269
bd5cdad0
LZH
1270 writel(DMA_FSTS_PFO | DMA_FSTS_PPF, iommu->reg + DMAR_FSTS_REG);
1271
1272unlock_exit:
1f5b3c3f 1273 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
0ac2491f
SS
1274 return IRQ_HANDLED;
1275}
1276
1277int dmar_set_interrupt(struct intel_iommu *iommu)
1278{
1279 int irq, ret;
1280
9d783ba0
SS
1281 /*
1282 * Check if the fault interrupt is already initialized.
1283 */
1284 if (iommu->irq)
1285 return 0;
1286
0ac2491f
SS
1287 irq = create_irq();
1288 if (!irq) {
bf947fcb 1289 pr_err("IOMMU: no free vectors\n");
0ac2491f
SS
1290 return -EINVAL;
1291 }
1292
dced35ae 1293 irq_set_handler_data(irq, iommu);
0ac2491f
SS
1294 iommu->irq = irq;
1295
1296 ret = arch_setup_dmar_msi(irq);
1297 if (ret) {
dced35ae 1298 irq_set_handler_data(irq, NULL);
0ac2491f
SS
1299 iommu->irq = 0;
1300 destroy_irq(irq);
dd726435 1301 return ret;
0ac2491f
SS
1302 }
1303
477694e7 1304 ret = request_irq(irq, dmar_fault, IRQF_NO_THREAD, iommu->name, iommu);
0ac2491f 1305 if (ret)
bf947fcb 1306 pr_err("IOMMU: can't request irq\n");
0ac2491f
SS
1307 return ret;
1308}
9d783ba0
SS
1309
1310int __init enable_drhd_fault_handling(void)
1311{
1312 struct dmar_drhd_unit *drhd;
7c919779 1313 struct intel_iommu *iommu;
9d783ba0
SS
1314
1315 /*
1316 * Enable fault control interrupt.
1317 */
7c919779 1318 for_each_iommu(iommu, drhd) {
bd5cdad0 1319 u32 fault_status;
7c919779 1320 int ret = dmar_set_interrupt(iommu);
9d783ba0
SS
1321
1322 if (ret) {
e9071b0b 1323 pr_err("DRHD %Lx: failed to enable fault, interrupt, ret %d\n",
9d783ba0
SS
1324 (unsigned long long)drhd->reg_base_addr, ret);
1325 return -1;
1326 }
7f99d946
SS
1327
1328 /*
1329 * Clear any previous faults.
1330 */
1331 dmar_fault(iommu->irq, iommu);
bd5cdad0
LZH
1332 fault_status = readl(iommu->reg + DMAR_FSTS_REG);
1333 writel(fault_status, iommu->reg + DMAR_FSTS_REG);
9d783ba0
SS
1334 }
1335
1336 return 0;
1337}
eb4a52bc
FY
1338
1339/*
1340 * Re-enable Queued Invalidation interface.
1341 */
1342int dmar_reenable_qi(struct intel_iommu *iommu)
1343{
1344 if (!ecap_qis(iommu->ecap))
1345 return -ENOENT;
1346
1347 if (!iommu->qi)
1348 return -ENOENT;
1349
1350 /*
1351 * First disable queued invalidation.
1352 */
1353 dmar_disable_qi(iommu);
1354 /*
1355 * Then enable queued invalidation again. Since there is no pending
1356 * invalidation requests now, it's safe to re-enable queued
1357 * invalidation.
1358 */
1359 __dmar_enable_qi(iommu);
1360
1361 return 0;
1362}
074835f0
YS
1363
1364/*
1365 * Check interrupt remapping support in DMAR table description.
1366 */
0b8973a8 1367int __init dmar_ir_support(void)
074835f0
YS
1368{
1369 struct acpi_table_dmar *dmar;
1370 dmar = (struct acpi_table_dmar *)dmar_tbl;
4f506e07
AP
1371 if (!dmar)
1372 return 0;
074835f0
YS
1373 return dmar->flags & 0x1;
1374}
694835dc 1375
a868e6b7
JL
1376static int __init dmar_free_unused_resources(void)
1377{
1378 struct dmar_drhd_unit *dmaru, *dmaru_n;
1379
1380 /* DMAR units are in use */
1381 if (irq_remapping_enabled || intel_iommu_enabled)
1382 return 0;
1383
1384 list_for_each_entry_safe(dmaru, dmaru_n, &dmar_drhd_units, list) {
1385 list_del(&dmaru->list);
1386 dmar_free_drhd(dmaru);
1387 }
1388
1389 return 0;
1390}
1391
1392late_initcall(dmar_free_unused_resources);
4db77ff3 1393IOMMU_INIT_POST(detect_intel_iommu);
This page took 0.485724 seconds and 5 git commands to generate.