x86, GART/AMD-VI: Make AMD GART and IOMMU use IOMMU_INIT_* macros.
[deliverable/linux.git] / drivers / pci / dmar.c
CommitLineData
10e5247f
KA
1/*
2 * Copyright (c) 2006, Intel Corporation.
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
13 * You should have received a copy of the GNU General Public License along with
14 * this program; if not, write to the Free Software Foundation, Inc., 59 Temple
15 * Place - Suite 330, Boston, MA 02111-1307 USA.
16 *
98bcef56 17 * Copyright (C) 2006-2008 Intel Corporation
18 * Author: Ashok Raj <ashok.raj@intel.com>
19 * Author: Shaohua Li <shaohua.li@intel.com>
20 * Author: Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com>
10e5247f 21 *
e61d98d8 22 * This file implements early detection/parsing of Remapping Devices
10e5247f
KA
23 * reported to OS through BIOS via DMA remapping reporting (DMAR) ACPI
24 * tables.
e61d98d8
SS
25 *
26 * These routines are used by both DMA-remapping and Interrupt-remapping
10e5247f
KA
27 */
28
29#include <linux/pci.h>
30#include <linux/dmar.h>
38717946
KA
31#include <linux/iova.h>
32#include <linux/intel-iommu.h>
fe962e90 33#include <linux/timer.h>
0ac2491f
SS
34#include <linux/irq.h>
35#include <linux/interrupt.h>
69575d38 36#include <linux/tboot.h>
eb27cae8 37#include <linux/dmi.h>
5a0e3ad6 38#include <linux/slab.h>
10e5247f 39
a192a958 40#define PREFIX "DMAR: "
10e5247f
KA
41
42/* No locks are needed as DMA remapping hardware unit
43 * list is constructed at boot time and hotplug of
44 * these units are not supported by the architecture.
45 */
46LIST_HEAD(dmar_drhd_units);
10e5247f
KA
47
48static struct acpi_table_header * __initdata dmar_tbl;
8e1568f3 49static acpi_size dmar_tbl_size;
10e5247f
KA
50
51static void __init dmar_register_drhd_unit(struct dmar_drhd_unit *drhd)
52{
53 /*
54 * add INCLUDE_ALL at the tail, so scan the list will find it at
55 * the very end.
56 */
57 if (drhd->include_all)
58 list_add_tail(&drhd->list, &dmar_drhd_units);
59 else
60 list_add(&drhd->list, &dmar_drhd_units);
61}
62
10e5247f
KA
63static int __init dmar_parse_one_dev_scope(struct acpi_dmar_device_scope *scope,
64 struct pci_dev **dev, u16 segment)
65{
66 struct pci_bus *bus;
67 struct pci_dev *pdev = NULL;
68 struct acpi_dmar_pci_path *path;
69 int count;
70
71 bus = pci_find_bus(segment, scope->bus);
72 path = (struct acpi_dmar_pci_path *)(scope + 1);
73 count = (scope->length - sizeof(struct acpi_dmar_device_scope))
74 / sizeof(struct acpi_dmar_pci_path);
75
76 while (count) {
77 if (pdev)
78 pci_dev_put(pdev);
79 /*
80 * Some BIOSes list non-exist devices in DMAR table, just
81 * ignore it
82 */
83 if (!bus) {
84 printk(KERN_WARNING
85 PREFIX "Device scope bus [%d] not found\n",
86 scope->bus);
87 break;
88 }
89 pdev = pci_get_slot(bus, PCI_DEVFN(path->dev, path->fn));
90 if (!pdev) {
91 printk(KERN_WARNING PREFIX
92 "Device scope device [%04x:%02x:%02x.%02x] not found\n",
93 segment, bus->number, path->dev, path->fn);
94 break;
95 }
96 path ++;
97 count --;
98 bus = pdev->subordinate;
99 }
100 if (!pdev) {
101 printk(KERN_WARNING PREFIX
102 "Device scope device [%04x:%02x:%02x.%02x] not found\n",
103 segment, scope->bus, path->dev, path->fn);
104 *dev = NULL;
105 return 0;
106 }
107 if ((scope->entry_type == ACPI_DMAR_SCOPE_TYPE_ENDPOINT && \
108 pdev->subordinate) || (scope->entry_type == \
109 ACPI_DMAR_SCOPE_TYPE_BRIDGE && !pdev->subordinate)) {
110 pci_dev_put(pdev);
111 printk(KERN_WARNING PREFIX
112 "Device scope type does not match for %s\n",
113 pci_name(pdev));
114 return -EINVAL;
115 }
116 *dev = pdev;
117 return 0;
118}
119
120static int __init dmar_parse_dev_scope(void *start, void *end, int *cnt,
121 struct pci_dev ***devices, u16 segment)
122{
123 struct acpi_dmar_device_scope *scope;
124 void * tmp = start;
125 int index;
126 int ret;
127
128 *cnt = 0;
129 while (start < end) {
130 scope = start;
131 if (scope->entry_type == ACPI_DMAR_SCOPE_TYPE_ENDPOINT ||
132 scope->entry_type == ACPI_DMAR_SCOPE_TYPE_BRIDGE)
133 (*cnt)++;
5715f0f9 134 else if (scope->entry_type != ACPI_DMAR_SCOPE_TYPE_IOAPIC) {
10e5247f 135 printk(KERN_WARNING PREFIX
5715f0f9
YL
136 "Unsupported device scope\n");
137 }
10e5247f
KA
138 start += scope->length;
139 }
140 if (*cnt == 0)
141 return 0;
142
143 *devices = kcalloc(*cnt, sizeof(struct pci_dev *), GFP_KERNEL);
144 if (!*devices)
145 return -ENOMEM;
146
147 start = tmp;
148 index = 0;
149 while (start < end) {
150 scope = start;
151 if (scope->entry_type == ACPI_DMAR_SCOPE_TYPE_ENDPOINT ||
152 scope->entry_type == ACPI_DMAR_SCOPE_TYPE_BRIDGE) {
153 ret = dmar_parse_one_dev_scope(scope,
154 &(*devices)[index], segment);
155 if (ret) {
156 kfree(*devices);
157 return ret;
158 }
159 index ++;
160 }
161 start += scope->length;
162 }
163
164 return 0;
165}
166
167/**
168 * dmar_parse_one_drhd - parses exactly one DMA remapping hardware definition
169 * structure which uniquely represent one DMA remapping hardware unit
170 * present in the platform
171 */
172static int __init
173dmar_parse_one_drhd(struct acpi_dmar_header *header)
174{
175 struct acpi_dmar_hardware_unit *drhd;
176 struct dmar_drhd_unit *dmaru;
177 int ret = 0;
10e5247f 178
e523b38e 179 drhd = (struct acpi_dmar_hardware_unit *)header;
10e5247f
KA
180 dmaru = kzalloc(sizeof(*dmaru), GFP_KERNEL);
181 if (!dmaru)
182 return -ENOMEM;
183
1886e8a9 184 dmaru->hdr = header;
10e5247f 185 dmaru->reg_base_addr = drhd->address;
276dbf99 186 dmaru->segment = drhd->segment;
10e5247f
KA
187 dmaru->include_all = drhd->flags & 0x1; /* BIT0: INCLUDE_ALL */
188
1886e8a9
SS
189 ret = alloc_iommu(dmaru);
190 if (ret) {
191 kfree(dmaru);
192 return ret;
193 }
194 dmar_register_drhd_unit(dmaru);
195 return 0;
196}
197
f82851a8 198static int __init dmar_parse_dev(struct dmar_drhd_unit *dmaru)
1886e8a9
SS
199{
200 struct acpi_dmar_hardware_unit *drhd;
f82851a8 201 int ret = 0;
1886e8a9
SS
202
203 drhd = (struct acpi_dmar_hardware_unit *) dmaru->hdr;
204
2e824f79
YZ
205 if (dmaru->include_all)
206 return 0;
207
208 ret = dmar_parse_dev_scope((void *)(drhd + 1),
1886e8a9 209 ((void *)drhd) + drhd->header.length,
10e5247f
KA
210 &dmaru->devices_cnt, &dmaru->devices,
211 drhd->segment);
1c7d1bca 212 if (ret) {
1886e8a9 213 list_del(&dmaru->list);
10e5247f 214 kfree(dmaru);
1886e8a9 215 }
10e5247f
KA
216 return ret;
217}
218
aaa9d1dd
SS
219#ifdef CONFIG_DMAR
220LIST_HEAD(dmar_rmrr_units);
221
222static void __init dmar_register_rmrr_unit(struct dmar_rmrr_unit *rmrr)
223{
224 list_add(&rmrr->list, &dmar_rmrr_units);
225}
226
227
10e5247f
KA
228static int __init
229dmar_parse_one_rmrr(struct acpi_dmar_header *header)
230{
231 struct acpi_dmar_reserved_memory *rmrr;
232 struct dmar_rmrr_unit *rmrru;
10e5247f
KA
233
234 rmrru = kzalloc(sizeof(*rmrru), GFP_KERNEL);
235 if (!rmrru)
236 return -ENOMEM;
237
1886e8a9 238 rmrru->hdr = header;
10e5247f
KA
239 rmrr = (struct acpi_dmar_reserved_memory *)header;
240 rmrru->base_address = rmrr->base_address;
241 rmrru->end_address = rmrr->end_address;
1886e8a9
SS
242
243 dmar_register_rmrr_unit(rmrru);
244 return 0;
245}
246
247static int __init
248rmrr_parse_dev(struct dmar_rmrr_unit *rmrru)
249{
250 struct acpi_dmar_reserved_memory *rmrr;
251 int ret;
252
253 rmrr = (struct acpi_dmar_reserved_memory *) rmrru->hdr;
10e5247f 254 ret = dmar_parse_dev_scope((void *)(rmrr + 1),
1886e8a9 255 ((void *)rmrr) + rmrr->header.length,
10e5247f
KA
256 &rmrru->devices_cnt, &rmrru->devices, rmrr->segment);
257
1886e8a9
SS
258 if (ret || (rmrru->devices_cnt == 0)) {
259 list_del(&rmrru->list);
10e5247f 260 kfree(rmrru);
1886e8a9 261 }
10e5247f
KA
262 return ret;
263}
aa5d2b51
YZ
264
265static LIST_HEAD(dmar_atsr_units);
266
267static int __init dmar_parse_one_atsr(struct acpi_dmar_header *hdr)
268{
269 struct acpi_dmar_atsr *atsr;
270 struct dmar_atsr_unit *atsru;
271
272 atsr = container_of(hdr, struct acpi_dmar_atsr, header);
273 atsru = kzalloc(sizeof(*atsru), GFP_KERNEL);
274 if (!atsru)
275 return -ENOMEM;
276
277 atsru->hdr = hdr;
278 atsru->include_all = atsr->flags & 0x1;
279
280 list_add(&atsru->list, &dmar_atsr_units);
281
282 return 0;
283}
284
285static int __init atsr_parse_dev(struct dmar_atsr_unit *atsru)
286{
287 int rc;
288 struct acpi_dmar_atsr *atsr;
289
290 if (atsru->include_all)
291 return 0;
292
293 atsr = container_of(atsru->hdr, struct acpi_dmar_atsr, header);
294 rc = dmar_parse_dev_scope((void *)(atsr + 1),
295 (void *)atsr + atsr->header.length,
296 &atsru->devices_cnt, &atsru->devices,
297 atsr->segment);
298 if (rc || !atsru->devices_cnt) {
299 list_del(&atsru->list);
300 kfree(atsru);
301 }
302
303 return rc;
304}
305
306int dmar_find_matched_atsr_unit(struct pci_dev *dev)
307{
308 int i;
309 struct pci_bus *bus;
310 struct acpi_dmar_atsr *atsr;
311 struct dmar_atsr_unit *atsru;
312
dda56549
Y
313 dev = pci_physfn(dev);
314
aa5d2b51
YZ
315 list_for_each_entry(atsru, &dmar_atsr_units, list) {
316 atsr = container_of(atsru->hdr, struct acpi_dmar_atsr, header);
317 if (atsr->segment == pci_domain_nr(dev->bus))
318 goto found;
319 }
320
321 return 0;
322
323found:
324 for (bus = dev->bus; bus; bus = bus->parent) {
325 struct pci_dev *bridge = bus->self;
326
5f4d91a1 327 if (!bridge || !pci_is_pcie(bridge) ||
aa5d2b51
YZ
328 bridge->pcie_type == PCI_EXP_TYPE_PCI_BRIDGE)
329 return 0;
330
331 if (bridge->pcie_type == PCI_EXP_TYPE_ROOT_PORT) {
332 for (i = 0; i < atsru->devices_cnt; i++)
333 if (atsru->devices[i] == bridge)
334 return 1;
335 break;
336 }
337 }
338
339 if (atsru->include_all)
340 return 1;
341
342 return 0;
343}
aaa9d1dd 344#endif
10e5247f 345
aa697079 346#ifdef CONFIG_ACPI_NUMA
ee34b32d
SS
347static int __init
348dmar_parse_one_rhsa(struct acpi_dmar_header *header)
349{
350 struct acpi_dmar_rhsa *rhsa;
351 struct dmar_drhd_unit *drhd;
352
353 rhsa = (struct acpi_dmar_rhsa *)header;
aa697079 354 for_each_drhd_unit(drhd) {
ee34b32d
SS
355 if (drhd->reg_base_addr == rhsa->base_address) {
356 int node = acpi_map_pxm_to_node(rhsa->proximity_domain);
357
358 if (!node_online(node))
359 node = -1;
360 drhd->iommu->node = node;
aa697079
DW
361 return 0;
362 }
ee34b32d 363 }
fd0c8894
BH
364 WARN_TAINT(
365 1, TAINT_FIRMWARE_WORKAROUND,
366 "Your BIOS is broken; RHSA refers to non-existent DMAR unit at %llx\n"
367 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
368 drhd->reg_base_addr,
369 dmi_get_system_info(DMI_BIOS_VENDOR),
370 dmi_get_system_info(DMI_BIOS_VERSION),
371 dmi_get_system_info(DMI_PRODUCT_VERSION));
ee34b32d 372
aa697079 373 return 0;
ee34b32d 374}
aa697079 375#endif
ee34b32d 376
10e5247f
KA
377static void __init
378dmar_table_print_dmar_entry(struct acpi_dmar_header *header)
379{
380 struct acpi_dmar_hardware_unit *drhd;
381 struct acpi_dmar_reserved_memory *rmrr;
aa5d2b51 382 struct acpi_dmar_atsr *atsr;
17b60977 383 struct acpi_dmar_rhsa *rhsa;
10e5247f
KA
384
385 switch (header->type) {
386 case ACPI_DMAR_TYPE_HARDWARE_UNIT:
aa5d2b51
YZ
387 drhd = container_of(header, struct acpi_dmar_hardware_unit,
388 header);
10e5247f 389 printk (KERN_INFO PREFIX
aa5d2b51
YZ
390 "DRHD base: %#016Lx flags: %#x\n",
391 (unsigned long long)drhd->address, drhd->flags);
10e5247f
KA
392 break;
393 case ACPI_DMAR_TYPE_RESERVED_MEMORY:
aa5d2b51
YZ
394 rmrr = container_of(header, struct acpi_dmar_reserved_memory,
395 header);
10e5247f 396 printk (KERN_INFO PREFIX
aa5d2b51 397 "RMRR base: %#016Lx end: %#016Lx\n",
5b6985ce
FY
398 (unsigned long long)rmrr->base_address,
399 (unsigned long long)rmrr->end_address);
10e5247f 400 break;
aa5d2b51
YZ
401 case ACPI_DMAR_TYPE_ATSR:
402 atsr = container_of(header, struct acpi_dmar_atsr, header);
403 printk(KERN_INFO PREFIX "ATSR flags: %#x\n", atsr->flags);
404 break;
17b60977
RD
405 case ACPI_DMAR_HARDWARE_AFFINITY:
406 rhsa = container_of(header, struct acpi_dmar_rhsa, header);
407 printk(KERN_INFO PREFIX "RHSA base: %#016Lx proximity domain: %#x\n",
408 (unsigned long long)rhsa->base_address,
409 rhsa->proximity_domain);
410 break;
10e5247f
KA
411 }
412}
413
f6dd5c31
YL
414/**
415 * dmar_table_detect - checks to see if the platform supports DMAR devices
416 */
417static int __init dmar_table_detect(void)
418{
419 acpi_status status = AE_OK;
420
421 /* if we could find DMAR table, then there are DMAR devices */
8e1568f3
YL
422 status = acpi_get_table_with_size(ACPI_SIG_DMAR, 0,
423 (struct acpi_table_header **)&dmar_tbl,
424 &dmar_tbl_size);
f6dd5c31
YL
425
426 if (ACPI_SUCCESS(status) && !dmar_tbl) {
427 printk (KERN_WARNING PREFIX "Unable to map DMAR\n");
428 status = AE_NOT_FOUND;
429 }
430
431 return (ACPI_SUCCESS(status) ? 1 : 0);
432}
aaa9d1dd 433
10e5247f
KA
434/**
435 * parse_dmar_table - parses the DMA reporting table
436 */
437static int __init
438parse_dmar_table(void)
439{
440 struct acpi_table_dmar *dmar;
441 struct acpi_dmar_header *entry_header;
442 int ret = 0;
443
f6dd5c31
YL
444 /*
445 * Do it again, earlier dmar_tbl mapping could be mapped with
446 * fixed map.
447 */
448 dmar_table_detect();
449
a59b50e9
JC
450 /*
451 * ACPI tables may not be DMA protected by tboot, so use DMAR copy
452 * SINIT saved in SinitMleData in TXT heap (which is DMA protected)
453 */
454 dmar_tbl = tboot_get_dmar_table(dmar_tbl);
455
10e5247f
KA
456 dmar = (struct acpi_table_dmar *)dmar_tbl;
457 if (!dmar)
458 return -ENODEV;
459
5b6985ce 460 if (dmar->width < PAGE_SHIFT - 1) {
093f87d2 461 printk(KERN_WARNING PREFIX "Invalid DMAR haw\n");
10e5247f
KA
462 return -EINVAL;
463 }
464
465 printk (KERN_INFO PREFIX "Host address width %d\n",
466 dmar->width + 1);
467
468 entry_header = (struct acpi_dmar_header *)(dmar + 1);
469 while (((unsigned long)entry_header) <
470 (((unsigned long)dmar) + dmar_tbl->length)) {
084eb960
TB
471 /* Avoid looping forever on bad ACPI tables */
472 if (entry_header->length == 0) {
473 printk(KERN_WARNING PREFIX
474 "Invalid 0-length structure\n");
475 ret = -EINVAL;
476 break;
477 }
478
10e5247f
KA
479 dmar_table_print_dmar_entry(entry_header);
480
481 switch (entry_header->type) {
482 case ACPI_DMAR_TYPE_HARDWARE_UNIT:
483 ret = dmar_parse_one_drhd(entry_header);
484 break;
485 case ACPI_DMAR_TYPE_RESERVED_MEMORY:
aaa9d1dd 486#ifdef CONFIG_DMAR
10e5247f 487 ret = dmar_parse_one_rmrr(entry_header);
aa5d2b51
YZ
488#endif
489 break;
490 case ACPI_DMAR_TYPE_ATSR:
491#ifdef CONFIG_DMAR
492 ret = dmar_parse_one_atsr(entry_header);
aaa9d1dd 493#endif
10e5247f 494 break;
17b60977 495 case ACPI_DMAR_HARDWARE_AFFINITY:
aa697079 496#ifdef CONFIG_ACPI_NUMA
ee34b32d 497 ret = dmar_parse_one_rhsa(entry_header);
aa697079 498#endif
17b60977 499 break;
10e5247f
KA
500 default:
501 printk(KERN_WARNING PREFIX
4de75cf9
RD
502 "Unknown DMAR structure type %d\n",
503 entry_header->type);
10e5247f
KA
504 ret = 0; /* for forward compatibility */
505 break;
506 }
507 if (ret)
508 break;
509
510 entry_header = ((void *)entry_header + entry_header->length);
511 }
512 return ret;
513}
514
dda56549 515static int dmar_pci_device_match(struct pci_dev *devices[], int cnt,
e61d98d8
SS
516 struct pci_dev *dev)
517{
518 int index;
519
520 while (dev) {
521 for (index = 0; index < cnt; index++)
522 if (dev == devices[index])
523 return 1;
524
525 /* Check our parent */
526 dev = dev->bus->self;
527 }
528
529 return 0;
530}
531
532struct dmar_drhd_unit *
533dmar_find_matched_drhd_unit(struct pci_dev *dev)
534{
2e824f79
YZ
535 struct dmar_drhd_unit *dmaru = NULL;
536 struct acpi_dmar_hardware_unit *drhd;
537
dda56549
Y
538 dev = pci_physfn(dev);
539
2e824f79
YZ
540 list_for_each_entry(dmaru, &dmar_drhd_units, list) {
541 drhd = container_of(dmaru->hdr,
542 struct acpi_dmar_hardware_unit,
543 header);
544
545 if (dmaru->include_all &&
546 drhd->segment == pci_domain_nr(dev->bus))
547 return dmaru;
e61d98d8 548
2e824f79
YZ
549 if (dmar_pci_device_match(dmaru->devices,
550 dmaru->devices_cnt, dev))
551 return dmaru;
e61d98d8
SS
552 }
553
554 return NULL;
555}
556
1886e8a9
SS
557int __init dmar_dev_scope_init(void)
558{
04e2ea67 559 struct dmar_drhd_unit *drhd, *drhd_n;
1886e8a9
SS
560 int ret = -ENODEV;
561
04e2ea67 562 list_for_each_entry_safe(drhd, drhd_n, &dmar_drhd_units, list) {
1886e8a9
SS
563 ret = dmar_parse_dev(drhd);
564 if (ret)
565 return ret;
566 }
567
aaa9d1dd
SS
568#ifdef CONFIG_DMAR
569 {
04e2ea67 570 struct dmar_rmrr_unit *rmrr, *rmrr_n;
aa5d2b51
YZ
571 struct dmar_atsr_unit *atsr, *atsr_n;
572
04e2ea67 573 list_for_each_entry_safe(rmrr, rmrr_n, &dmar_rmrr_units, list) {
aaa9d1dd
SS
574 ret = rmrr_parse_dev(rmrr);
575 if (ret)
576 return ret;
577 }
aa5d2b51
YZ
578
579 list_for_each_entry_safe(atsr, atsr_n, &dmar_atsr_units, list) {
580 ret = atsr_parse_dev(atsr);
581 if (ret)
582 return ret;
583 }
1886e8a9 584 }
aaa9d1dd 585#endif
1886e8a9
SS
586
587 return ret;
588}
589
10e5247f
KA
590
591int __init dmar_table_init(void)
592{
1886e8a9 593 static int dmar_table_initialized;
093f87d2
FY
594 int ret;
595
1886e8a9
SS
596 if (dmar_table_initialized)
597 return 0;
598
599 dmar_table_initialized = 1;
600
093f87d2
FY
601 ret = parse_dmar_table();
602 if (ret) {
1886e8a9
SS
603 if (ret != -ENODEV)
604 printk(KERN_INFO PREFIX "parse DMAR table failure.\n");
093f87d2
FY
605 return ret;
606 }
607
10e5247f
KA
608 if (list_empty(&dmar_drhd_units)) {
609 printk(KERN_INFO PREFIX "No DMAR devices found\n");
610 return -ENODEV;
611 }
093f87d2 612
aaa9d1dd 613#ifdef CONFIG_DMAR
2d6b5f85 614 if (list_empty(&dmar_rmrr_units))
093f87d2 615 printk(KERN_INFO PREFIX "No RMRR found\n");
aa5d2b51
YZ
616
617 if (list_empty(&dmar_atsr_units))
618 printk(KERN_INFO PREFIX "No ATSR found\n");
aaa9d1dd 619#endif
093f87d2 620
10e5247f
KA
621 return 0;
622}
623
3a8663ee
BH
624static void warn_invalid_dmar(u64 addr, const char *message)
625{
fd0c8894
BH
626 WARN_TAINT_ONCE(
627 1, TAINT_FIRMWARE_WORKAROUND,
628 "Your BIOS is broken; DMAR reported at address %llx%s!\n"
629 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
630 addr, message,
631 dmi_get_system_info(DMI_BIOS_VENDOR),
632 dmi_get_system_info(DMI_BIOS_VERSION),
633 dmi_get_system_info(DMI_PRODUCT_VERSION));
3a8663ee 634}
6ecbf01c 635
86cf898e
DW
636int __init check_zero_address(void)
637{
638 struct acpi_table_dmar *dmar;
639 struct acpi_dmar_header *entry_header;
640 struct acpi_dmar_hardware_unit *drhd;
641
642 dmar = (struct acpi_table_dmar *)dmar_tbl;
643 entry_header = (struct acpi_dmar_header *)(dmar + 1);
644
645 while (((unsigned long)entry_header) <
646 (((unsigned long)dmar) + dmar_tbl->length)) {
647 /* Avoid looping forever on bad ACPI tables */
648 if (entry_header->length == 0) {
649 printk(KERN_WARNING PREFIX
650 "Invalid 0-length structure\n");
651 return 0;
652 }
653
654 if (entry_header->type == ACPI_DMAR_TYPE_HARDWARE_UNIT) {
2c992208
CW
655 void __iomem *addr;
656 u64 cap, ecap;
657
86cf898e
DW
658 drhd = (void *)entry_header;
659 if (!drhd->address) {
3a8663ee 660 warn_invalid_dmar(0, "");
2c992208
CW
661 goto failed;
662 }
663
664 addr = early_ioremap(drhd->address, VTD_PAGE_SIZE);
665 if (!addr ) {
666 printk("IOMMU: can't validate: %llx\n", drhd->address);
667 goto failed;
668 }
669 cap = dmar_readq(addr + DMAR_CAP_REG);
670 ecap = dmar_readq(addr + DMAR_ECAP_REG);
671 early_iounmap(addr, VTD_PAGE_SIZE);
672 if (cap == (uint64_t)-1 && ecap == (uint64_t)-1) {
3a8663ee
BH
673 warn_invalid_dmar(drhd->address,
674 " returns all ones");
2c992208 675 goto failed;
86cf898e 676 }
86cf898e
DW
677 }
678
679 entry_header = ((void *)entry_header + entry_header->length);
680 }
681 return 1;
2c992208
CW
682
683failed:
684#ifdef CONFIG_DMAR
685 dmar_disabled = 1;
686#endif
687 return 0;
86cf898e
DW
688}
689
480125ba 690int __init detect_intel_iommu(void)
2ae21010
SS
691{
692 int ret;
693
f6dd5c31 694 ret = dmar_table_detect();
86cf898e
DW
695 if (ret)
696 ret = check_zero_address();
2ae21010 697 {
cacd4213 698#ifdef CONFIG_INTR_REMAP
1cb11583
SS
699 struct acpi_table_dmar *dmar;
700 /*
701 * for now we will disable dma-remapping when interrupt
702 * remapping is enabled.
703 * When support for queued invalidation for IOTLB invalidation
704 * is added, we will not need this any more.
705 */
706 dmar = (struct acpi_table_dmar *) dmar_tbl;
cacd4213 707 if (ret && cpu_has_x2apic && dmar->flags & 0x1)
1cb11583
SS
708 printk(KERN_INFO
709 "Queued invalidation will be enabled to support "
710 "x2apic and Intr-remapping.\n");
cacd4213 711#endif
cacd4213 712#ifdef CONFIG_DMAR
11bd04f6 713 if (ret && !no_iommu && !iommu_detected && !dmar_disabled) {
2ae21010 714 iommu_detected = 1;
5d990b62
CW
715 /* Make sure ACS will be enabled */
716 pci_request_acs();
717 }
9d5ce73a
FT
718#endif
719#ifdef CONFIG_X86
720 if (ret)
721 x86_init.iommu.iommu_init = intel_iommu_init;
2ae21010 722#endif
cacd4213 723 }
8e1568f3 724 early_acpi_os_unmap_memory(dmar_tbl, dmar_tbl_size);
f6dd5c31 725 dmar_tbl = NULL;
480125ba
KRW
726
727 return (ret ? 1 : -ENODEV);
2ae21010
SS
728}
729
730
1886e8a9 731int alloc_iommu(struct dmar_drhd_unit *drhd)
e61d98d8 732{
c42d9f32 733 struct intel_iommu *iommu;
e61d98d8
SS
734 int map_size;
735 u32 ver;
c42d9f32 736 static int iommu_allocated = 0;
43f7392b 737 int agaw = 0;
4ed0d3e6 738 int msagaw = 0;
c42d9f32 739
6ecbf01c 740 if (!drhd->reg_base_addr) {
3a8663ee 741 warn_invalid_dmar(0, "");
6ecbf01c
DW
742 return -EINVAL;
743 }
744
c42d9f32
SS
745 iommu = kzalloc(sizeof(*iommu), GFP_KERNEL);
746 if (!iommu)
1886e8a9 747 return -ENOMEM;
c42d9f32
SS
748
749 iommu->seq_id = iommu_allocated++;
9d783ba0 750 sprintf (iommu->name, "dmar%d", iommu->seq_id);
e61d98d8 751
5b6985ce 752 iommu->reg = ioremap(drhd->reg_base_addr, VTD_PAGE_SIZE);
e61d98d8
SS
753 if (!iommu->reg) {
754 printk(KERN_ERR "IOMMU: can't map the region\n");
755 goto error;
756 }
757 iommu->cap = dmar_readq(iommu->reg + DMAR_CAP_REG);
758 iommu->ecap = dmar_readq(iommu->reg + DMAR_ECAP_REG);
759
0815565a 760 if (iommu->cap == (uint64_t)-1 && iommu->ecap == (uint64_t)-1) {
3a8663ee 761 warn_invalid_dmar(drhd->reg_base_addr, " returns all ones");
0815565a
DW
762 goto err_unmap;
763 }
764
43f7392b 765#ifdef CONFIG_DMAR
1b573683
WH
766 agaw = iommu_calculate_agaw(iommu);
767 if (agaw < 0) {
768 printk(KERN_ERR
4ed0d3e6
FY
769 "Cannot get a valid agaw for iommu (seq_id = %d)\n",
770 iommu->seq_id);
0815565a 771 goto err_unmap;
4ed0d3e6
FY
772 }
773 msagaw = iommu_calculate_max_sagaw(iommu);
774 if (msagaw < 0) {
775 printk(KERN_ERR
776 "Cannot get a valid max agaw for iommu (seq_id = %d)\n",
1b573683 777 iommu->seq_id);
0815565a 778 goto err_unmap;
1b573683 779 }
43f7392b 780#endif
1b573683 781 iommu->agaw = agaw;
4ed0d3e6 782 iommu->msagaw = msagaw;
1b573683 783
ee34b32d
SS
784 iommu->node = -1;
785
e61d98d8
SS
786 /* the registers might be more than one page */
787 map_size = max_t(int, ecap_max_iotlb_offset(iommu->ecap),
788 cap_max_fault_reg_offset(iommu->cap));
5b6985ce
FY
789 map_size = VTD_PAGE_ALIGN(map_size);
790 if (map_size > VTD_PAGE_SIZE) {
e61d98d8
SS
791 iounmap(iommu->reg);
792 iommu->reg = ioremap(drhd->reg_base_addr, map_size);
793 if (!iommu->reg) {
794 printk(KERN_ERR "IOMMU: can't map the region\n");
795 goto error;
796 }
797 }
798
799 ver = readl(iommu->reg + DMAR_VER_REG);
680a7524
YL
800 pr_info("IOMMU %d: reg_base_addr %llx ver %d:%d cap %llx ecap %llx\n",
801 iommu->seq_id,
5b6985ce
FY
802 (unsigned long long)drhd->reg_base_addr,
803 DMAR_VER_MAJOR(ver), DMAR_VER_MINOR(ver),
804 (unsigned long long)iommu->cap,
805 (unsigned long long)iommu->ecap);
e61d98d8
SS
806
807 spin_lock_init(&iommu->register_lock);
808
809 drhd->iommu = iommu;
1886e8a9 810 return 0;
0815565a
DW
811
812 err_unmap:
813 iounmap(iommu->reg);
814 error:
e61d98d8 815 kfree(iommu);
1886e8a9 816 return -1;
e61d98d8
SS
817}
818
819void free_iommu(struct intel_iommu *iommu)
820{
821 if (!iommu)
822 return;
823
824#ifdef CONFIG_DMAR
825 free_dmar_iommu(iommu);
826#endif
827
828 if (iommu->reg)
829 iounmap(iommu->reg);
830 kfree(iommu);
831}
fe962e90
SS
832
833/*
834 * Reclaim all the submitted descriptors which have completed its work.
835 */
836static inline void reclaim_free_desc(struct q_inval *qi)
837{
6ba6c3a4
YZ
838 while (qi->desc_status[qi->free_tail] == QI_DONE ||
839 qi->desc_status[qi->free_tail] == QI_ABORT) {
fe962e90
SS
840 qi->desc_status[qi->free_tail] = QI_FREE;
841 qi->free_tail = (qi->free_tail + 1) % QI_LENGTH;
842 qi->free_cnt++;
843 }
844}
845
704126ad
YZ
846static int qi_check_fault(struct intel_iommu *iommu, int index)
847{
848 u32 fault;
6ba6c3a4 849 int head, tail;
704126ad
YZ
850 struct q_inval *qi = iommu->qi;
851 int wait_index = (index + 1) % QI_LENGTH;
852
6ba6c3a4
YZ
853 if (qi->desc_status[wait_index] == QI_ABORT)
854 return -EAGAIN;
855
704126ad
YZ
856 fault = readl(iommu->reg + DMAR_FSTS_REG);
857
858 /*
859 * If IQE happens, the head points to the descriptor associated
860 * with the error. No new descriptors are fetched until the IQE
861 * is cleared.
862 */
863 if (fault & DMA_FSTS_IQE) {
864 head = readl(iommu->reg + DMAR_IQH_REG);
6ba6c3a4
YZ
865 if ((head >> DMAR_IQ_SHIFT) == index) {
866 printk(KERN_ERR "VT-d detected invalid descriptor: "
867 "low=%llx, high=%llx\n",
868 (unsigned long long)qi->desc[index].low,
869 (unsigned long long)qi->desc[index].high);
704126ad
YZ
870 memcpy(&qi->desc[index], &qi->desc[wait_index],
871 sizeof(struct qi_desc));
872 __iommu_flush_cache(iommu, &qi->desc[index],
873 sizeof(struct qi_desc));
874 writel(DMA_FSTS_IQE, iommu->reg + DMAR_FSTS_REG);
875 return -EINVAL;
876 }
877 }
878
6ba6c3a4
YZ
879 /*
880 * If ITE happens, all pending wait_desc commands are aborted.
881 * No new descriptors are fetched until the ITE is cleared.
882 */
883 if (fault & DMA_FSTS_ITE) {
884 head = readl(iommu->reg + DMAR_IQH_REG);
885 head = ((head >> DMAR_IQ_SHIFT) - 1 + QI_LENGTH) % QI_LENGTH;
886 head |= 1;
887 tail = readl(iommu->reg + DMAR_IQT_REG);
888 tail = ((tail >> DMAR_IQ_SHIFT) - 1 + QI_LENGTH) % QI_LENGTH;
889
890 writel(DMA_FSTS_ITE, iommu->reg + DMAR_FSTS_REG);
891
892 do {
893 if (qi->desc_status[head] == QI_IN_USE)
894 qi->desc_status[head] = QI_ABORT;
895 head = (head - 2 + QI_LENGTH) % QI_LENGTH;
896 } while (head != tail);
897
898 if (qi->desc_status[wait_index] == QI_ABORT)
899 return -EAGAIN;
900 }
901
902 if (fault & DMA_FSTS_ICE)
903 writel(DMA_FSTS_ICE, iommu->reg + DMAR_FSTS_REG);
904
704126ad
YZ
905 return 0;
906}
907
fe962e90
SS
908/*
909 * Submit the queued invalidation descriptor to the remapping
910 * hardware unit and wait for its completion.
911 */
704126ad 912int qi_submit_sync(struct qi_desc *desc, struct intel_iommu *iommu)
fe962e90 913{
6ba6c3a4 914 int rc;
fe962e90
SS
915 struct q_inval *qi = iommu->qi;
916 struct qi_desc *hw, wait_desc;
917 int wait_index, index;
918 unsigned long flags;
919
920 if (!qi)
704126ad 921 return 0;
fe962e90
SS
922
923 hw = qi->desc;
924
6ba6c3a4
YZ
925restart:
926 rc = 0;
927
f05810c9 928 spin_lock_irqsave(&qi->q_lock, flags);
fe962e90 929 while (qi->free_cnt < 3) {
f05810c9 930 spin_unlock_irqrestore(&qi->q_lock, flags);
fe962e90 931 cpu_relax();
f05810c9 932 spin_lock_irqsave(&qi->q_lock, flags);
fe962e90
SS
933 }
934
935 index = qi->free_head;
936 wait_index = (index + 1) % QI_LENGTH;
937
938 qi->desc_status[index] = qi->desc_status[wait_index] = QI_IN_USE;
939
940 hw[index] = *desc;
941
704126ad
YZ
942 wait_desc.low = QI_IWD_STATUS_DATA(QI_DONE) |
943 QI_IWD_STATUS_WRITE | QI_IWD_TYPE;
fe962e90
SS
944 wait_desc.high = virt_to_phys(&qi->desc_status[wait_index]);
945
946 hw[wait_index] = wait_desc;
947
948 __iommu_flush_cache(iommu, &hw[index], sizeof(struct qi_desc));
949 __iommu_flush_cache(iommu, &hw[wait_index], sizeof(struct qi_desc));
950
951 qi->free_head = (qi->free_head + 2) % QI_LENGTH;
952 qi->free_cnt -= 2;
953
fe962e90
SS
954 /*
955 * update the HW tail register indicating the presence of
956 * new descriptors.
957 */
6ba6c3a4 958 writel(qi->free_head << DMAR_IQ_SHIFT, iommu->reg + DMAR_IQT_REG);
fe962e90
SS
959
960 while (qi->desc_status[wait_index] != QI_DONE) {
f05810c9
SS
961 /*
962 * We will leave the interrupts disabled, to prevent interrupt
963 * context to queue another cmd while a cmd is already submitted
964 * and waiting for completion on this cpu. This is to avoid
965 * a deadlock where the interrupt context can wait indefinitely
966 * for free slots in the queue.
967 */
704126ad
YZ
968 rc = qi_check_fault(iommu, index);
969 if (rc)
6ba6c3a4 970 break;
704126ad 971
fe962e90
SS
972 spin_unlock(&qi->q_lock);
973 cpu_relax();
974 spin_lock(&qi->q_lock);
975 }
6ba6c3a4
YZ
976
977 qi->desc_status[index] = QI_DONE;
fe962e90
SS
978
979 reclaim_free_desc(qi);
f05810c9 980 spin_unlock_irqrestore(&qi->q_lock, flags);
704126ad 981
6ba6c3a4
YZ
982 if (rc == -EAGAIN)
983 goto restart;
984
704126ad 985 return rc;
fe962e90
SS
986}
987
988/*
989 * Flush the global interrupt entry cache.
990 */
991void qi_global_iec(struct intel_iommu *iommu)
992{
993 struct qi_desc desc;
994
995 desc.low = QI_IEC_TYPE;
996 desc.high = 0;
997
704126ad 998 /* should never fail */
fe962e90
SS
999 qi_submit_sync(&desc, iommu);
1000}
1001
4c25a2c1
DW
1002void qi_flush_context(struct intel_iommu *iommu, u16 did, u16 sid, u8 fm,
1003 u64 type)
3481f210 1004{
3481f210
YS
1005 struct qi_desc desc;
1006
3481f210
YS
1007 desc.low = QI_CC_FM(fm) | QI_CC_SID(sid) | QI_CC_DID(did)
1008 | QI_CC_GRAN(type) | QI_CC_TYPE;
1009 desc.high = 0;
1010
4c25a2c1 1011 qi_submit_sync(&desc, iommu);
3481f210
YS
1012}
1013
1f0ef2aa
DW
1014void qi_flush_iotlb(struct intel_iommu *iommu, u16 did, u64 addr,
1015 unsigned int size_order, u64 type)
3481f210
YS
1016{
1017 u8 dw = 0, dr = 0;
1018
1019 struct qi_desc desc;
1020 int ih = 0;
1021
3481f210
YS
1022 if (cap_write_drain(iommu->cap))
1023 dw = 1;
1024
1025 if (cap_read_drain(iommu->cap))
1026 dr = 1;
1027
1028 desc.low = QI_IOTLB_DID(did) | QI_IOTLB_DR(dr) | QI_IOTLB_DW(dw)
1029 | QI_IOTLB_GRAN(type) | QI_IOTLB_TYPE;
1030 desc.high = QI_IOTLB_ADDR(addr) | QI_IOTLB_IH(ih)
1031 | QI_IOTLB_AM(size_order);
1032
1f0ef2aa 1033 qi_submit_sync(&desc, iommu);
3481f210
YS
1034}
1035
6ba6c3a4
YZ
1036void qi_flush_dev_iotlb(struct intel_iommu *iommu, u16 sid, u16 qdep,
1037 u64 addr, unsigned mask)
1038{
1039 struct qi_desc desc;
1040
1041 if (mask) {
1042 BUG_ON(addr & ((1 << (VTD_PAGE_SHIFT + mask)) - 1));
1043 addr |= (1 << (VTD_PAGE_SHIFT + mask - 1)) - 1;
1044 desc.high = QI_DEV_IOTLB_ADDR(addr) | QI_DEV_IOTLB_SIZE;
1045 } else
1046 desc.high = QI_DEV_IOTLB_ADDR(addr);
1047
1048 if (qdep >= QI_DEV_IOTLB_MAX_INVS)
1049 qdep = 0;
1050
1051 desc.low = QI_DEV_IOTLB_SID(sid) | QI_DEV_IOTLB_QDEP(qdep) |
1052 QI_DIOTLB_TYPE;
1053
1054 qi_submit_sync(&desc, iommu);
1055}
1056
eba67e5d
SS
1057/*
1058 * Disable Queued Invalidation interface.
1059 */
1060void dmar_disable_qi(struct intel_iommu *iommu)
1061{
1062 unsigned long flags;
1063 u32 sts;
1064 cycles_t start_time = get_cycles();
1065
1066 if (!ecap_qis(iommu->ecap))
1067 return;
1068
1069 spin_lock_irqsave(&iommu->register_lock, flags);
1070
1071 sts = dmar_readq(iommu->reg + DMAR_GSTS_REG);
1072 if (!(sts & DMA_GSTS_QIES))
1073 goto end;
1074
1075 /*
1076 * Give a chance to HW to complete the pending invalidation requests.
1077 */
1078 while ((readl(iommu->reg + DMAR_IQT_REG) !=
1079 readl(iommu->reg + DMAR_IQH_REG)) &&
1080 (DMAR_OPERATION_TIMEOUT > (get_cycles() - start_time)))
1081 cpu_relax();
1082
1083 iommu->gcmd &= ~DMA_GCMD_QIE;
eba67e5d
SS
1084 writel(iommu->gcmd, iommu->reg + DMAR_GCMD_REG);
1085
1086 IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG, readl,
1087 !(sts & DMA_GSTS_QIES), sts);
1088end:
1089 spin_unlock_irqrestore(&iommu->register_lock, flags);
1090}
1091
eb4a52bc
FY
1092/*
1093 * Enable queued invalidation.
1094 */
1095static void __dmar_enable_qi(struct intel_iommu *iommu)
1096{
c416daa9 1097 u32 sts;
eb4a52bc
FY
1098 unsigned long flags;
1099 struct q_inval *qi = iommu->qi;
1100
1101 qi->free_head = qi->free_tail = 0;
1102 qi->free_cnt = QI_LENGTH;
1103
1104 spin_lock_irqsave(&iommu->register_lock, flags);
1105
1106 /* write zero to the tail reg */
1107 writel(0, iommu->reg + DMAR_IQT_REG);
1108
1109 dmar_writeq(iommu->reg + DMAR_IQA_REG, virt_to_phys(qi->desc));
1110
eb4a52bc 1111 iommu->gcmd |= DMA_GCMD_QIE;
c416daa9 1112 writel(iommu->gcmd, iommu->reg + DMAR_GCMD_REG);
eb4a52bc
FY
1113
1114 /* Make sure hardware complete it */
1115 IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG, readl, (sts & DMA_GSTS_QIES), sts);
1116
1117 spin_unlock_irqrestore(&iommu->register_lock, flags);
1118}
1119
fe962e90
SS
1120/*
1121 * Enable Queued Invalidation interface. This is a must to support
1122 * interrupt-remapping. Also used by DMA-remapping, which replaces
1123 * register based IOTLB invalidation.
1124 */
1125int dmar_enable_qi(struct intel_iommu *iommu)
1126{
fe962e90 1127 struct q_inval *qi;
751cafe3 1128 struct page *desc_page;
fe962e90
SS
1129
1130 if (!ecap_qis(iommu->ecap))
1131 return -ENOENT;
1132
1133 /*
1134 * queued invalidation is already setup and enabled.
1135 */
1136 if (iommu->qi)
1137 return 0;
1138
fa4b57cc 1139 iommu->qi = kmalloc(sizeof(*qi), GFP_ATOMIC);
fe962e90
SS
1140 if (!iommu->qi)
1141 return -ENOMEM;
1142
1143 qi = iommu->qi;
1144
751cafe3
SS
1145
1146 desc_page = alloc_pages_node(iommu->node, GFP_ATOMIC | __GFP_ZERO, 0);
1147 if (!desc_page) {
fe962e90
SS
1148 kfree(qi);
1149 iommu->qi = 0;
1150 return -ENOMEM;
1151 }
1152
751cafe3
SS
1153 qi->desc = page_address(desc_page);
1154
fa4b57cc 1155 qi->desc_status = kmalloc(QI_LENGTH * sizeof(int), GFP_ATOMIC);
fe962e90
SS
1156 if (!qi->desc_status) {
1157 free_page((unsigned long) qi->desc);
1158 kfree(qi);
1159 iommu->qi = 0;
1160 return -ENOMEM;
1161 }
1162
1163 qi->free_head = qi->free_tail = 0;
1164 qi->free_cnt = QI_LENGTH;
1165
1166 spin_lock_init(&qi->q_lock);
1167
eb4a52bc 1168 __dmar_enable_qi(iommu);
fe962e90
SS
1169
1170 return 0;
1171}
0ac2491f
SS
1172
1173/* iommu interrupt handling. Most stuff are MSI-like. */
1174
9d783ba0
SS
1175enum faulttype {
1176 DMA_REMAP,
1177 INTR_REMAP,
1178 UNKNOWN,
1179};
1180
1181static const char *dma_remap_fault_reasons[] =
0ac2491f
SS
1182{
1183 "Software",
1184 "Present bit in root entry is clear",
1185 "Present bit in context entry is clear",
1186 "Invalid context entry",
1187 "Access beyond MGAW",
1188 "PTE Write access is not set",
1189 "PTE Read access is not set",
1190 "Next page table ptr is invalid",
1191 "Root table address invalid",
1192 "Context table ptr is invalid",
1193 "non-zero reserved fields in RTP",
1194 "non-zero reserved fields in CTP",
1195 "non-zero reserved fields in PTE",
1196};
9d783ba0
SS
1197
1198static const char *intr_remap_fault_reasons[] =
1199{
1200 "Detected reserved fields in the decoded interrupt-remapped request",
1201 "Interrupt index exceeded the interrupt-remapping table size",
1202 "Present field in the IRTE entry is clear",
1203 "Error accessing interrupt-remapping table pointed by IRTA_REG",
1204 "Detected reserved fields in the IRTE entry",
1205 "Blocked a compatibility format interrupt request",
1206 "Blocked an interrupt request due to source-id verification failure",
1207};
1208
0ac2491f
SS
1209#define MAX_FAULT_REASON_IDX (ARRAY_SIZE(fault_reason_strings) - 1)
1210
9d783ba0 1211const char *dmar_get_fault_reason(u8 fault_reason, int *fault_type)
0ac2491f 1212{
9d783ba0
SS
1213 if (fault_reason >= 0x20 && (fault_reason <= 0x20 +
1214 ARRAY_SIZE(intr_remap_fault_reasons))) {
1215 *fault_type = INTR_REMAP;
1216 return intr_remap_fault_reasons[fault_reason - 0x20];
1217 } else if (fault_reason < ARRAY_SIZE(dma_remap_fault_reasons)) {
1218 *fault_type = DMA_REMAP;
1219 return dma_remap_fault_reasons[fault_reason];
1220 } else {
1221 *fault_type = UNKNOWN;
0ac2491f 1222 return "Unknown";
9d783ba0 1223 }
0ac2491f
SS
1224}
1225
1226void dmar_msi_unmask(unsigned int irq)
1227{
1228 struct intel_iommu *iommu = get_irq_data(irq);
1229 unsigned long flag;
1230
1231 /* unmask it */
1232 spin_lock_irqsave(&iommu->register_lock, flag);
1233 writel(0, iommu->reg + DMAR_FECTL_REG);
1234 /* Read a reg to force flush the post write */
1235 readl(iommu->reg + DMAR_FECTL_REG);
1236 spin_unlock_irqrestore(&iommu->register_lock, flag);
1237}
1238
1239void dmar_msi_mask(unsigned int irq)
1240{
1241 unsigned long flag;
1242 struct intel_iommu *iommu = get_irq_data(irq);
1243
1244 /* mask it */
1245 spin_lock_irqsave(&iommu->register_lock, flag);
1246 writel(DMA_FECTL_IM, iommu->reg + DMAR_FECTL_REG);
1247 /* Read a reg to force flush the post write */
1248 readl(iommu->reg + DMAR_FECTL_REG);
1249 spin_unlock_irqrestore(&iommu->register_lock, flag);
1250}
1251
1252void dmar_msi_write(int irq, struct msi_msg *msg)
1253{
1254 struct intel_iommu *iommu = get_irq_data(irq);
1255 unsigned long flag;
1256
1257 spin_lock_irqsave(&iommu->register_lock, flag);
1258 writel(msg->data, iommu->reg + DMAR_FEDATA_REG);
1259 writel(msg->address_lo, iommu->reg + DMAR_FEADDR_REG);
1260 writel(msg->address_hi, iommu->reg + DMAR_FEUADDR_REG);
1261 spin_unlock_irqrestore(&iommu->register_lock, flag);
1262}
1263
1264void dmar_msi_read(int irq, struct msi_msg *msg)
1265{
1266 struct intel_iommu *iommu = get_irq_data(irq);
1267 unsigned long flag;
1268
1269 spin_lock_irqsave(&iommu->register_lock, flag);
1270 msg->data = readl(iommu->reg + DMAR_FEDATA_REG);
1271 msg->address_lo = readl(iommu->reg + DMAR_FEADDR_REG);
1272 msg->address_hi = readl(iommu->reg + DMAR_FEUADDR_REG);
1273 spin_unlock_irqrestore(&iommu->register_lock, flag);
1274}
1275
1276static int dmar_fault_do_one(struct intel_iommu *iommu, int type,
1277 u8 fault_reason, u16 source_id, unsigned long long addr)
1278{
1279 const char *reason;
9d783ba0 1280 int fault_type;
0ac2491f 1281
9d783ba0 1282 reason = dmar_get_fault_reason(fault_reason, &fault_type);
0ac2491f 1283
9d783ba0
SS
1284 if (fault_type == INTR_REMAP)
1285 printk(KERN_ERR "INTR-REMAP: Request device [[%02x:%02x.%d] "
1286 "fault index %llx\n"
1287 "INTR-REMAP:[fault reason %02d] %s\n",
1288 (source_id >> 8), PCI_SLOT(source_id & 0xFF),
1289 PCI_FUNC(source_id & 0xFF), addr >> 48,
1290 fault_reason, reason);
1291 else
1292 printk(KERN_ERR
1293 "DMAR:[%s] Request device [%02x:%02x.%d] "
1294 "fault addr %llx \n"
1295 "DMAR:[fault reason %02d] %s\n",
1296 (type ? "DMA Read" : "DMA Write"),
1297 (source_id >> 8), PCI_SLOT(source_id & 0xFF),
1298 PCI_FUNC(source_id & 0xFF), addr, fault_reason, reason);
0ac2491f
SS
1299 return 0;
1300}
1301
1302#define PRIMARY_FAULT_REG_LEN (16)
1531a6a6 1303irqreturn_t dmar_fault(int irq, void *dev_id)
0ac2491f
SS
1304{
1305 struct intel_iommu *iommu = dev_id;
1306 int reg, fault_index;
1307 u32 fault_status;
1308 unsigned long flag;
1309
1310 spin_lock_irqsave(&iommu->register_lock, flag);
1311 fault_status = readl(iommu->reg + DMAR_FSTS_REG);
9d783ba0
SS
1312 if (fault_status)
1313 printk(KERN_ERR "DRHD: handling fault status reg %x\n",
1314 fault_status);
0ac2491f
SS
1315
1316 /* TBD: ignore advanced fault log currently */
1317 if (!(fault_status & DMA_FSTS_PPF))
9d783ba0 1318 goto clear_rest;
0ac2491f
SS
1319
1320 fault_index = dma_fsts_fault_record_index(fault_status);
1321 reg = cap_fault_reg_offset(iommu->cap);
1322 while (1) {
1323 u8 fault_reason;
1324 u16 source_id;
1325 u64 guest_addr;
1326 int type;
1327 u32 data;
1328
1329 /* highest 32 bits */
1330 data = readl(iommu->reg + reg +
1331 fault_index * PRIMARY_FAULT_REG_LEN + 12);
1332 if (!(data & DMA_FRCD_F))
1333 break;
1334
1335 fault_reason = dma_frcd_fault_reason(data);
1336 type = dma_frcd_type(data);
1337
1338 data = readl(iommu->reg + reg +
1339 fault_index * PRIMARY_FAULT_REG_LEN + 8);
1340 source_id = dma_frcd_source_id(data);
1341
1342 guest_addr = dmar_readq(iommu->reg + reg +
1343 fault_index * PRIMARY_FAULT_REG_LEN);
1344 guest_addr = dma_frcd_page_addr(guest_addr);
1345 /* clear the fault */
1346 writel(DMA_FRCD_F, iommu->reg + reg +
1347 fault_index * PRIMARY_FAULT_REG_LEN + 12);
1348
1349 spin_unlock_irqrestore(&iommu->register_lock, flag);
1350
1351 dmar_fault_do_one(iommu, type, fault_reason,
1352 source_id, guest_addr);
1353
1354 fault_index++;
8211a7b5 1355 if (fault_index >= cap_num_fault_regs(iommu->cap))
0ac2491f
SS
1356 fault_index = 0;
1357 spin_lock_irqsave(&iommu->register_lock, flag);
1358 }
9d783ba0
SS
1359clear_rest:
1360 /* clear all the other faults */
0ac2491f 1361 fault_status = readl(iommu->reg + DMAR_FSTS_REG);
9d783ba0 1362 writel(fault_status, iommu->reg + DMAR_FSTS_REG);
0ac2491f
SS
1363
1364 spin_unlock_irqrestore(&iommu->register_lock, flag);
1365 return IRQ_HANDLED;
1366}
1367
1368int dmar_set_interrupt(struct intel_iommu *iommu)
1369{
1370 int irq, ret;
1371
9d783ba0
SS
1372 /*
1373 * Check if the fault interrupt is already initialized.
1374 */
1375 if (iommu->irq)
1376 return 0;
1377
0ac2491f
SS
1378 irq = create_irq();
1379 if (!irq) {
1380 printk(KERN_ERR "IOMMU: no free vectors\n");
1381 return -EINVAL;
1382 }
1383
1384 set_irq_data(irq, iommu);
1385 iommu->irq = irq;
1386
1387 ret = arch_setup_dmar_msi(irq);
1388 if (ret) {
1389 set_irq_data(irq, NULL);
1390 iommu->irq = 0;
1391 destroy_irq(irq);
dd726435 1392 return ret;
0ac2491f
SS
1393 }
1394
0ac2491f
SS
1395 ret = request_irq(irq, dmar_fault, 0, iommu->name, iommu);
1396 if (ret)
1397 printk(KERN_ERR "IOMMU: can't request irq\n");
1398 return ret;
1399}
9d783ba0
SS
1400
1401int __init enable_drhd_fault_handling(void)
1402{
1403 struct dmar_drhd_unit *drhd;
1404
1405 /*
1406 * Enable fault control interrupt.
1407 */
1408 for_each_drhd_unit(drhd) {
1409 int ret;
1410 struct intel_iommu *iommu = drhd->iommu;
1411 ret = dmar_set_interrupt(iommu);
1412
1413 if (ret) {
1414 printk(KERN_ERR "DRHD %Lx: failed to enable fault, "
1415 " interrupt, ret %d\n",
1416 (unsigned long long)drhd->reg_base_addr, ret);
1417 return -1;
1418 }
1419 }
1420
1421 return 0;
1422}
eb4a52bc
FY
1423
1424/*
1425 * Re-enable Queued Invalidation interface.
1426 */
1427int dmar_reenable_qi(struct intel_iommu *iommu)
1428{
1429 if (!ecap_qis(iommu->ecap))
1430 return -ENOENT;
1431
1432 if (!iommu->qi)
1433 return -ENOENT;
1434
1435 /*
1436 * First disable queued invalidation.
1437 */
1438 dmar_disable_qi(iommu);
1439 /*
1440 * Then enable queued invalidation again. Since there is no pending
1441 * invalidation requests now, it's safe to re-enable queued
1442 * invalidation.
1443 */
1444 __dmar_enable_qi(iommu);
1445
1446 return 0;
1447}
074835f0
YS
1448
1449/*
1450 * Check interrupt remapping support in DMAR table description.
1451 */
0b8973a8 1452int __init dmar_ir_support(void)
074835f0
YS
1453{
1454 struct acpi_table_dmar *dmar;
1455 dmar = (struct acpi_table_dmar *)dmar_tbl;
4f506e07
AP
1456 if (!dmar)
1457 return 0;
074835f0
YS
1458 return dmar->flags & 0x1;
1459}
This page took 0.290576 seconds and 5 git commands to generate.