Lines Matching +full:segment +full:- +full:no +full:- +full:remap
1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright (C) 2006-2008 Intel Corporation
14 * These routines are used by both DMA-remapping and Interrupt-remapping
22 #include <linux/intel-iommu.h>
47 * 1) The hotplug framework guarentees that DMAR unit will be hot-added
49 * 2) The hotplug framework guarantees that DMAR unit will be hot-removed
75 if (drhd->include_all) in dmar_register_drhd_unit()
76 list_add_tail_rcu(&drhd->list, &dmar_drhd_units); in dmar_register_drhd_unit()
78 list_add_rcu(&drhd->list, &dmar_drhd_units); in dmar_register_drhd_unit()
88 if (scope->entry_type == ACPI_DMAR_SCOPE_TYPE_NAMESPACE || in dmar_alloc_dev_scope()
89 scope->entry_type == ACPI_DMAR_SCOPE_TYPE_ENDPOINT || in dmar_alloc_dev_scope()
90 scope->entry_type == ACPI_DMAR_SCOPE_TYPE_BRIDGE) in dmar_alloc_dev_scope()
92 else if (scope->entry_type != ACPI_DMAR_SCOPE_TYPE_IOAPIC && in dmar_alloc_dev_scope()
93 scope->entry_type != ACPI_DMAR_SCOPE_TYPE_HPET) { in dmar_alloc_dev_scope()
96 start += scope->length; in dmar_alloc_dev_scope()
130 BUG_ON(dev->is_virtfn); in dmar_alloc_pci_notify_info()
136 if (pci_domain_nr(dev->bus) > U16_MAX) in dmar_alloc_pci_notify_info()
141 for (tmp = dev; tmp; tmp = tmp->bus->self) in dmar_alloc_pci_notify_info()
153 dmar_dev_scope_status = -ENOMEM; in dmar_alloc_pci_notify_info()
158 info->event = event; in dmar_alloc_pci_notify_info()
159 info->dev = dev; in dmar_alloc_pci_notify_info()
160 info->seg = pci_domain_nr(dev->bus); in dmar_alloc_pci_notify_info()
161 info->level = level; in dmar_alloc_pci_notify_info()
163 for (tmp = dev; tmp; tmp = tmp->bus->self) { in dmar_alloc_pci_notify_info()
164 level--; in dmar_alloc_pci_notify_info()
165 info->path[level].bus = tmp->bus->number; in dmar_alloc_pci_notify_info()
166 info->path[level].device = PCI_SLOT(tmp->devfn); in dmar_alloc_pci_notify_info()
167 info->path[level].function = PCI_FUNC(tmp->devfn); in dmar_alloc_pci_notify_info()
168 if (pci_is_root_bus(tmp->bus)) in dmar_alloc_pci_notify_info()
169 info->bus = tmp->bus->number; in dmar_alloc_pci_notify_info()
187 if (info->bus != bus) in dmar_match_pci_path()
189 if (info->level != count) in dmar_match_pci_path()
193 if (path[i].device != info->path[i].device || in dmar_match_pci_path()
194 path[i].function != info->path[i].function) in dmar_match_pci_path()
205 i = info->level - 1; in dmar_match_pci_path()
206 if (bus == info->path[i].bus && in dmar_match_pci_path()
207 path[0].device == info->path[i].device && in dmar_match_pci_path()
208 path[0].function == info->path[i].function) { in dmar_match_pci_path()
209 pr_info(FW_BUG "RMRR entry for device %02x:%02x.%x is broken - applying workaround\n", in dmar_match_pci_path()
217 /* Return: > 0 if match found, 0 if no match found, < 0 if error happens */
219 void *start, void*end, u16 segment, in dmar_insert_dev_scope() argument
224 struct device *tmp, *dev = &info->dev->dev; in dmar_insert_dev_scope()
228 if (segment != info->seg) in dmar_insert_dev_scope()
231 for (; start < end; start += scope->length) { in dmar_insert_dev_scope()
233 if (scope->entry_type != ACPI_DMAR_SCOPE_TYPE_ENDPOINT && in dmar_insert_dev_scope()
234 scope->entry_type != ACPI_DMAR_SCOPE_TYPE_BRIDGE) in dmar_insert_dev_scope()
238 level = (scope->length - sizeof(*scope)) / sizeof(*path); in dmar_insert_dev_scope()
239 if (!dmar_match_pci_path(info, scope->bus, path, level)) in dmar_insert_dev_scope()
248 * "BRIDGE_OTHER" (0680h) - we don't declare a socpe mismatch in dmar_insert_dev_scope()
251 if ((scope->entry_type == ACPI_DMAR_SCOPE_TYPE_ENDPOINT && in dmar_insert_dev_scope()
252 info->dev->hdr_type != PCI_HEADER_TYPE_NORMAL) || in dmar_insert_dev_scope()
253 (scope->entry_type == ACPI_DMAR_SCOPE_TYPE_BRIDGE && in dmar_insert_dev_scope()
254 (info->dev->hdr_type == PCI_HEADER_TYPE_NORMAL && in dmar_insert_dev_scope()
255 info->dev->class >> 16 != PCI_BASE_CLASS_BRIDGE))) { in dmar_insert_dev_scope()
257 pci_name(info->dev)); in dmar_insert_dev_scope()
258 return -EINVAL; in dmar_insert_dev_scope()
263 devices[i].bus = info->dev->bus->number; in dmar_insert_dev_scope()
264 devices[i].devfn = info->dev->devfn; in dmar_insert_dev_scope()
275 int dmar_remove_dev_scope(struct dmar_pci_notify_info *info, u16 segment, in dmar_remove_dev_scope() argument
281 if (info->seg != segment) in dmar_remove_dev_scope()
285 if (tmp == &info->dev->dev) { in dmar_remove_dev_scope()
302 if (dmaru->include_all) in dmar_pci_bus_add_dev()
305 drhd = container_of(dmaru->hdr, in dmar_pci_bus_add_dev()
308 ((void *)drhd) + drhd->header.length, in dmar_pci_bus_add_dev()
309 dmaru->segment, in dmar_pci_bus_add_dev()
310 dmaru->devices, dmaru->devices_cnt); in dmar_pci_bus_add_dev()
330 if (dmar_remove_dev_scope(info, dmaru->segment, in dmar_pci_bus_del_dev()
331 dmaru->devices, dmaru->devices_cnt)) in dmar_pci_bus_del_dev()
340 dev_set_msi_domain(&pdev->dev, dev_get_msi_domain(&physfn->dev)); in vf_inherit_msi_domain()
352 if (pdev->is_virtfn) { in dmar_pci_bus_notifier()
398 if (dmaru->segment == drhd->segment && in dmar_find_dmaru()
399 dmaru->reg_base_addr == drhd->address) in dmar_find_dmaru()
406 * dmar_parse_one_drhd - parses exactly one DMA remapping hardware definition
421 dmaru = kzalloc(sizeof(*dmaru) + header->length, GFP_KERNEL); in dmar_parse_one_drhd()
423 return -ENOMEM; in dmar_parse_one_drhd()
429 dmaru->hdr = (void *)(dmaru + 1); in dmar_parse_one_drhd()
430 memcpy(dmaru->hdr, header, header->length); in dmar_parse_one_drhd()
431 dmaru->reg_base_addr = drhd->address; in dmar_parse_one_drhd()
432 dmaru->segment = drhd->segment; in dmar_parse_one_drhd()
433 dmaru->include_all = drhd->flags & 0x1; /* BIT0: INCLUDE_ALL */ in dmar_parse_one_drhd()
434 dmaru->devices = dmar_alloc_dev_scope((void *)(drhd + 1), in dmar_parse_one_drhd()
435 ((void *)drhd) + drhd->header.length, in dmar_parse_one_drhd()
436 &dmaru->devices_cnt); in dmar_parse_one_drhd()
437 if (dmaru->devices_cnt && dmaru->devices == NULL) { in dmar_parse_one_drhd()
439 return -ENOMEM; in dmar_parse_one_drhd()
444 dmar_free_dev_scope(&dmaru->devices, in dmar_parse_one_drhd()
445 &dmaru->devices_cnt); in dmar_parse_one_drhd()
460 if (dmaru->devices && dmaru->devices_cnt) in dmar_free_drhd()
461 dmar_free_dev_scope(&dmaru->devices, &dmaru->devices_cnt); in dmar_free_drhd()
462 if (dmaru->iommu) in dmar_free_drhd()
463 free_iommu(dmaru->iommu); in dmar_free_drhd()
473 if (strnlen(andd->device_name, header->length - 8) == header->length - 8) { in dmar_parse_one_andd()
475 "Your BIOS is broken; ANDD object name is not NUL-terminated\n" in dmar_parse_one_andd()
481 return -EINVAL; in dmar_parse_one_andd()
483 pr_info("ANDD device: %x name: %s\n", andd->device_number, in dmar_parse_one_andd()
484 andd->device_name); in dmar_parse_one_andd()
497 if (drhd->reg_base_addr == rhsa->base_address) { in dmar_parse_one_rhsa()
498 int node = pxm_to_node(rhsa->proximity_domain); in dmar_parse_one_rhsa()
502 drhd->iommu->node = node; in dmar_parse_one_rhsa()
507 "Your BIOS is broken; RHSA refers to non-existent DMAR unit at %llx\n" in dmar_parse_one_rhsa()
509 rhsa->base_address, in dmar_parse_one_rhsa()
529 switch (header->type) { in dmar_table_print_dmar_entry()
534 (unsigned long long)drhd->address, drhd->flags); in dmar_table_print_dmar_entry()
540 (unsigned long long)rmrr->base_address, in dmar_table_print_dmar_entry()
541 (unsigned long long)rmrr->end_address); in dmar_table_print_dmar_entry()
545 pr_info("ATSR flags: %#x\n", atsr->flags); in dmar_table_print_dmar_entry()
550 (unsigned long long)rhsa->base_address, in dmar_table_print_dmar_entry()
551 rhsa->proximity_domain); in dmar_table_print_dmar_entry()
554 /* We don't print this here because we need to sanity-check in dmar_table_print_dmar_entry()
561 * dmar_table_detect - checks to see if the platform supports DMAR devices
575 return ACPI_SUCCESS(status) ? 0 : -ENOENT; in dmar_table_detect()
585 next = (void *)iter + iter->length; in dmar_walk_remapping_entries()
586 if (iter->length == 0) { in dmar_walk_remapping_entries()
588 pr_debug(FW_BUG "Invalid 0-length structure\n"); in dmar_walk_remapping_entries()
593 return -EINVAL; in dmar_walk_remapping_entries()
596 if (cb->print_entry) in dmar_walk_remapping_entries()
599 if (iter->type >= ACPI_DMAR_TYPE_RESERVED) { in dmar_walk_remapping_entries()
602 iter->type); in dmar_walk_remapping_entries()
603 } else if (cb->cb[iter->type]) { in dmar_walk_remapping_entries()
606 ret = cb->cb[iter->type](iter, cb->arg[iter->type]); in dmar_walk_remapping_entries()
609 } else if (!cb->ignore_unhandled) { in dmar_walk_remapping_entries()
610 pr_warn("No handler for DMAR structure type %d\n", in dmar_walk_remapping_entries()
611 iter->type); in dmar_walk_remapping_entries()
612 return -EINVAL; in dmar_walk_remapping_entries()
623 dmar->header.length - sizeof(*dmar), cb); in dmar_walk_dmar_table()
627 * parse_dmar_table - parses the DMA reporting table
660 return -ENODEV; in parse_dmar_table()
662 if (dmar->width < PAGE_SHIFT - 1) { in parse_dmar_table()
664 return -EINVAL; in parse_dmar_table()
667 pr_info("Host address width %d\n", dmar->width + 1); in parse_dmar_table()
670 pr_warn(FW_BUG "No DRHD structure found in DMAR table\n"); in parse_dmar_table()
687 dev = dev->bus->self; in dmar_pci_device_match()
703 drhd = container_of(dmaru->hdr, in dmar_find_matched_drhd_unit()
707 if (dmaru->include_all && in dmar_find_matched_drhd_unit()
708 drhd->segment == pci_domain_nr(dev->bus)) in dmar_find_matched_drhd_unit()
711 if (dmar_pci_device_match(dmaru->devices, in dmar_find_matched_drhd_unit()
712 dmaru->devices_cnt, dev)) in dmar_find_matched_drhd_unit()
733 drhd = container_of(dmaru->hdr, in dmar_acpi_insert_dev_scope()
738 (unsigned long)scope < ((unsigned long)drhd) + drhd->header.length; in dmar_acpi_insert_dev_scope()
739 scope = ((void *)scope) + scope->length) { in dmar_acpi_insert_dev_scope()
740 if (scope->entry_type != ACPI_DMAR_SCOPE_TYPE_NAMESPACE) in dmar_acpi_insert_dev_scope()
742 if (scope->enumeration_id != device_number) in dmar_acpi_insert_dev_scope()
747 dev_name(&adev->dev), dmaru->reg_base_addr, in dmar_acpi_insert_dev_scope()
748 scope->bus, path->device, path->function); in dmar_acpi_insert_dev_scope()
749 for_each_dev_scope(dmaru->devices, dmaru->devices_cnt, i, tmp) in dmar_acpi_insert_dev_scope()
751 dmaru->devices[i].bus = scope->bus; in dmar_acpi_insert_dev_scope()
752 dmaru->devices[i].devfn = PCI_DEVFN(path->device, in dmar_acpi_insert_dev_scope()
753 path->function); in dmar_acpi_insert_dev_scope()
754 rcu_assign_pointer(dmaru->devices[i].dev, in dmar_acpi_insert_dev_scope()
755 get_device(&adev->dev)); in dmar_acpi_insert_dev_scope()
758 BUG_ON(i >= dmaru->devices_cnt); in dmar_acpi_insert_dev_scope()
761 pr_warn("No IOMMU scope found for ANDD enumeration ID %d (%s)\n", in dmar_acpi_insert_dev_scope()
762 device_number, dev_name(&adev->dev)); in dmar_acpi_insert_dev_scope()
770 return -ENODEV; in dmar_acpi_dev_scope_init()
773 ((unsigned long)andd) < ((unsigned long)dmar_tbl) + dmar_tbl->length; in dmar_acpi_dev_scope_init()
774 andd = ((void *)andd) + andd->header.length) { in dmar_acpi_dev_scope_init()
775 if (andd->header.type == ACPI_DMAR_TYPE_NAMESPACE) { in dmar_acpi_dev_scope_init()
780 andd->device_name, in dmar_acpi_dev_scope_init()
783 andd->device_name); in dmar_acpi_dev_scope_init()
788 andd->device_name); in dmar_acpi_dev_scope_init()
791 dmar_acpi_insert_dev_scope(andd->device_number, adev); in dmar_acpi_dev_scope_init()
806 dmar_dev_scope_status = -ENODEV; in dmar_dev_scope_init()
813 if (dev->is_virtfn) in dmar_dev_scope_init()
845 if (ret != -ENODEV) in dmar_table_init()
848 pr_info("No DMAR devices found\n"); in dmar_table_init()
849 ret = -ENODEV; in dmar_table_init()
881 if (!drhd->address) { in dmar_validate_one_drhd()
883 return -EINVAL; in dmar_validate_one_drhd()
887 addr = ioremap(drhd->address, VTD_PAGE_SIZE); in dmar_validate_one_drhd()
889 addr = early_ioremap(drhd->address, VTD_PAGE_SIZE); in dmar_validate_one_drhd()
891 pr_warn("Can't validate DRHD address: %llx\n", drhd->address); in dmar_validate_one_drhd()
892 return -EINVAL; in dmar_validate_one_drhd()
903 if (cap == (uint64_t)-1 && ecap == (uint64_t)-1) { in dmar_validate_one_drhd()
904 warn_invalid_dmar(drhd->address, " returns all ones"); in dmar_validate_one_drhd()
905 return -EINVAL; in dmar_validate_one_drhd()
950 iounmap(iommu->reg); in unmap_iommu()
951 release_mem_region(iommu->reg_phys, iommu->reg_size); in unmap_iommu()
966 iommu->reg_phys = phys_addr; in map_iommu()
967 iommu->reg_size = VTD_PAGE_SIZE; in map_iommu()
969 if (!request_mem_region(iommu->reg_phys, iommu->reg_size, iommu->name)) { in map_iommu()
971 err = -EBUSY; in map_iommu()
975 iommu->reg = ioremap(iommu->reg_phys, iommu->reg_size); in map_iommu()
976 if (!iommu->reg) { in map_iommu()
978 err = -ENOMEM; in map_iommu()
982 iommu->cap = dmar_readq(iommu->reg + DMAR_CAP_REG); in map_iommu()
983 iommu->ecap = dmar_readq(iommu->reg + DMAR_ECAP_REG); in map_iommu()
985 if (iommu->cap == (uint64_t)-1 && iommu->ecap == (uint64_t)-1) { in map_iommu()
986 err = -EINVAL; in map_iommu()
990 if (ecap_vcs(iommu->ecap)) in map_iommu()
991 iommu->vccap = dmar_readq(iommu->reg + DMAR_VCCAP_REG); in map_iommu()
994 map_size = max_t(int, ecap_max_iotlb_offset(iommu->ecap), in map_iommu()
995 cap_max_fault_reg_offset(iommu->cap)); in map_iommu()
997 if (map_size > iommu->reg_size) { in map_iommu()
998 iounmap(iommu->reg); in map_iommu()
999 release_mem_region(iommu->reg_phys, iommu->reg_size); in map_iommu()
1000 iommu->reg_size = map_size; in map_iommu()
1001 if (!request_mem_region(iommu->reg_phys, iommu->reg_size, in map_iommu()
1002 iommu->name)) { in map_iommu()
1004 err = -EBUSY; in map_iommu()
1007 iommu->reg = ioremap(iommu->reg_phys, iommu->reg_size); in map_iommu()
1008 if (!iommu->reg) { in map_iommu()
1010 err = -ENOMEM; in map_iommu()
1018 iounmap(iommu->reg); in map_iommu()
1020 release_mem_region(iommu->reg_phys, iommu->reg_size); in map_iommu()
1027 iommu->seq_id = find_first_zero_bit(dmar_seq_ids, in dmar_alloc_seq_id()
1029 if (iommu->seq_id >= DMAR_UNITS_SUPPORTED) { in dmar_alloc_seq_id()
1030 iommu->seq_id = -1; in dmar_alloc_seq_id()
1032 set_bit(iommu->seq_id, dmar_seq_ids); in dmar_alloc_seq_id()
1033 sprintf(iommu->name, "dmar%d", iommu->seq_id); in dmar_alloc_seq_id()
1036 return iommu->seq_id; in dmar_alloc_seq_id()
1041 if (iommu->seq_id >= 0) { in dmar_free_seq_id()
1042 clear_bit(iommu->seq_id, dmar_seq_ids); in dmar_free_seq_id()
1043 iommu->seq_id = -1; in dmar_free_seq_id()
1051 int agaw = -1; in alloc_iommu()
1052 int msagaw = -1; in alloc_iommu()
1055 if (!drhd->reg_base_addr) { in alloc_iommu()
1057 return -EINVAL; in alloc_iommu()
1062 return -ENOMEM; in alloc_iommu()
1066 err = -ENOSPC; in alloc_iommu()
1070 err = map_iommu(iommu, drhd->reg_base_addr); in alloc_iommu()
1072 pr_err("Failed to map %s\n", iommu->name); in alloc_iommu()
1076 err = -EINVAL; in alloc_iommu()
1077 if (cap_sagaw(iommu->cap) == 0) { in alloc_iommu()
1078 pr_info("%s: No supported address widths. Not attempting DMA translation.\n", in alloc_iommu()
1079 iommu->name); in alloc_iommu()
1080 drhd->ignored = 1; in alloc_iommu()
1083 if (!drhd->ignored) { in alloc_iommu()
1087 iommu->seq_id); in alloc_iommu()
1088 drhd->ignored = 1; in alloc_iommu()
1091 if (!drhd->ignored) { in alloc_iommu()
1095 iommu->seq_id); in alloc_iommu()
1096 drhd->ignored = 1; in alloc_iommu()
1097 agaw = -1; in alloc_iommu()
1100 iommu->agaw = agaw; in alloc_iommu()
1101 iommu->msagaw = msagaw; in alloc_iommu()
1102 iommu->segment = drhd->segment; in alloc_iommu()
1104 iommu->node = NUMA_NO_NODE; in alloc_iommu()
1106 ver = readl(iommu->reg + DMAR_VER_REG); in alloc_iommu()
1108 iommu->name, in alloc_iommu()
1109 (unsigned long long)drhd->reg_base_addr, in alloc_iommu()
1111 (unsigned long long)iommu->cap, in alloc_iommu()
1112 (unsigned long long)iommu->ecap); in alloc_iommu()
1115 sts = readl(iommu->reg + DMAR_GSTS_REG); in alloc_iommu()
1117 iommu->gcmd |= DMA_GCMD_IRE; in alloc_iommu()
1119 iommu->gcmd |= DMA_GCMD_TE; in alloc_iommu()
1121 iommu->gcmd |= DMA_GCMD_QIE; in alloc_iommu()
1123 raw_spin_lock_init(&iommu->register_lock); in alloc_iommu()
1130 if (intel_iommu_enabled && !drhd->ignored) { in alloc_iommu()
1131 err = iommu_device_sysfs_add(&iommu->iommu, NULL, in alloc_iommu()
1133 "%s", iommu->name); in alloc_iommu()
1137 iommu_device_set_ops(&iommu->iommu, &intel_iommu_ops); in alloc_iommu()
1139 err = iommu_device_register(&iommu->iommu); in alloc_iommu()
1144 drhd->iommu = iommu; in alloc_iommu()
1145 iommu->drhd = drhd; in alloc_iommu()
1150 iommu_device_sysfs_remove(&iommu->iommu); in alloc_iommu()
1162 if (intel_iommu_enabled && !iommu->drhd->ignored) { in free_iommu()
1163 iommu_device_unregister(&iommu->iommu); in free_iommu()
1164 iommu_device_sysfs_remove(&iommu->iommu); in free_iommu()
1167 if (iommu->irq) { in free_iommu()
1168 if (iommu->pr_irq) { in free_iommu()
1169 free_irq(iommu->pr_irq, iommu); in free_iommu()
1170 dmar_free_hwirq(iommu->pr_irq); in free_iommu()
1171 iommu->pr_irq = 0; in free_iommu()
1173 free_irq(iommu->irq, iommu); in free_iommu()
1174 dmar_free_hwirq(iommu->irq); in free_iommu()
1175 iommu->irq = 0; in free_iommu()
1178 if (iommu->qi) { in free_iommu()
1179 free_page((unsigned long)iommu->qi->desc); in free_iommu()
1180 kfree(iommu->qi->desc_status); in free_iommu()
1181 kfree(iommu->qi); in free_iommu()
1184 if (iommu->reg) in free_iommu()
1196 while (qi->desc_status[qi->free_tail] == QI_DONE || in reclaim_free_desc()
1197 qi->desc_status[qi->free_tail] == QI_ABORT) { in reclaim_free_desc()
1198 qi->desc_status[qi->free_tail] = QI_FREE; in reclaim_free_desc()
1199 qi->free_tail = (qi->free_tail + 1) % QI_LENGTH; in reclaim_free_desc()
1200 qi->free_cnt++; in reclaim_free_desc()
1208 struct q_inval *qi = iommu->qi; in qi_check_fault()
1211 if (qi->desc_status[wait_index] == QI_ABORT) in qi_check_fault()
1212 return -EAGAIN; in qi_check_fault()
1214 fault = readl(iommu->reg + DMAR_FSTS_REG); in qi_check_fault()
1218 * with the error. No new descriptors are fetched until the IQE in qi_check_fault()
1222 head = readl(iommu->reg + DMAR_IQH_REG); in qi_check_fault()
1224 struct qi_desc *desc = qi->desc + head; in qi_check_fault()
1227 * desc->qw2 and desc->qw3 are either reserved or in qi_check_fault()
1231 pr_err("VT-d detected invalid descriptor: qw0 = %llx, qw1 = %llx\n", in qi_check_fault()
1232 (unsigned long long)desc->qw0, in qi_check_fault()
1233 (unsigned long long)desc->qw1); in qi_check_fault()
1234 memcpy(desc, qi->desc + (wait_index << shift), in qi_check_fault()
1236 writel(DMA_FSTS_IQE, iommu->reg + DMAR_FSTS_REG); in qi_check_fault()
1237 return -EINVAL; in qi_check_fault()
1243 * No new descriptors are fetched until the ITE is cleared. in qi_check_fault()
1246 head = readl(iommu->reg + DMAR_IQH_REG); in qi_check_fault()
1247 head = ((head >> shift) - 1 + QI_LENGTH) % QI_LENGTH; in qi_check_fault()
1249 tail = readl(iommu->reg + DMAR_IQT_REG); in qi_check_fault()
1250 tail = ((tail >> shift) - 1 + QI_LENGTH) % QI_LENGTH; in qi_check_fault()
1252 writel(DMA_FSTS_ITE, iommu->reg + DMAR_FSTS_REG); in qi_check_fault()
1255 if (qi->desc_status[head] == QI_IN_USE) in qi_check_fault()
1256 qi->desc_status[head] = QI_ABORT; in qi_check_fault()
1257 head = (head - 2 + QI_LENGTH) % QI_LENGTH; in qi_check_fault()
1260 if (qi->desc_status[wait_index] == QI_ABORT) in qi_check_fault()
1261 return -EAGAIN; in qi_check_fault()
1265 writel(DMA_FSTS_ICE, iommu->reg + DMAR_FSTS_REG); in qi_check_fault()
1280 struct q_inval *qi = iommu->qi; in qi_submit_sync()
1293 raw_spin_lock_irqsave(&qi->q_lock, flags); in qi_submit_sync()
1299 while (qi->free_cnt < count + 2) { in qi_submit_sync()
1300 raw_spin_unlock_irqrestore(&qi->q_lock, flags); in qi_submit_sync()
1302 raw_spin_lock_irqsave(&qi->q_lock, flags); in qi_submit_sync()
1305 index = qi->free_head; in qi_submit_sync()
1311 memcpy(qi->desc + offset, &desc[i], 1 << shift); in qi_submit_sync()
1312 qi->desc_status[(index + i) % QI_LENGTH] = QI_IN_USE; in qi_submit_sync()
1314 qi->desc_status[wait_index] = QI_IN_USE; in qi_submit_sync()
1320 wait_desc.qw1 = virt_to_phys(&qi->desc_status[wait_index]); in qi_submit_sync()
1325 memcpy(qi->desc + offset, &wait_desc, 1 << shift); in qi_submit_sync()
1327 qi->free_head = (qi->free_head + count + 1) % QI_LENGTH; in qi_submit_sync()
1328 qi->free_cnt -= count + 1; in qi_submit_sync()
1334 writel(qi->free_head << shift, iommu->reg + DMAR_IQT_REG); in qi_submit_sync()
1336 while (qi->desc_status[wait_index] != QI_DONE) { in qi_submit_sync()
1348 raw_spin_unlock(&qi->q_lock); in qi_submit_sync()
1350 raw_spin_lock(&qi->q_lock); in qi_submit_sync()
1354 qi->desc_status[(index + i) % QI_LENGTH] = QI_DONE; in qi_submit_sync()
1357 raw_spin_unlock_irqrestore(&qi->q_lock, flags); in qi_submit_sync()
1359 if (rc == -EAGAIN) in qi_submit_sync()
1403 if (cap_write_drain(iommu->cap)) in qi_flush_iotlb()
1406 if (cap_read_drain(iommu->cap)) in qi_flush_iotlb()
1425 addr |= (1ULL << (VTD_PAGE_SHIFT + mask - 1)) - 1; in qi_flush_dev_iotlb()
1441 /* PASID-based IOTLB invalidation */
1448 * npages == -1 means a PASID-selective invalidation, otherwise, in qi_flush_piotlb()
1449 * a positive value for Page-selective-within-PASID invalidation. in qi_flush_piotlb()
1457 if (npages == -1) { in qi_flush_piotlb()
1482 /* PASID-based device IOTLB Invalidate */
1486 unsigned long mask = 1UL << (VTD_PAGE_SHIFT + size_order - 1); in qi_flush_dev_iotlb_pasid()
1496 * range. VT-d spec 6.5.2.6. in qi_flush_dev_iotlb_pasid()
1503 pr_warn_ratelimited("Invalidate non-aligned address %llx, order %d\n", in qi_flush_dev_iotlb_pasid()
1515 desc.qw1 |= GENMASK_ULL(size_order + VTD_PAGE_SHIFT - 1, in qi_flush_dev_iotlb_pasid()
1545 if (!ecap_qis(iommu->ecap)) in dmar_disable_qi()
1548 raw_spin_lock_irqsave(&iommu->register_lock, flags); in dmar_disable_qi()
1550 sts = readl(iommu->reg + DMAR_GSTS_REG); in dmar_disable_qi()
1557 while ((readl(iommu->reg + DMAR_IQT_REG) != in dmar_disable_qi()
1558 readl(iommu->reg + DMAR_IQH_REG)) && in dmar_disable_qi()
1559 (DMAR_OPERATION_TIMEOUT > (get_cycles() - start_time))) in dmar_disable_qi()
1562 iommu->gcmd &= ~DMA_GCMD_QIE; in dmar_disable_qi()
1563 writel(iommu->gcmd, iommu->reg + DMAR_GCMD_REG); in dmar_disable_qi()
1568 raw_spin_unlock_irqrestore(&iommu->register_lock, flags); in dmar_disable_qi()
1578 struct q_inval *qi = iommu->qi; in __dmar_enable_qi()
1579 u64 val = virt_to_phys(qi->desc); in __dmar_enable_qi()
1581 qi->free_head = qi->free_tail = 0; in __dmar_enable_qi()
1582 qi->free_cnt = QI_LENGTH; in __dmar_enable_qi()
1588 if (ecap_smts(iommu->ecap)) in __dmar_enable_qi()
1591 raw_spin_lock_irqsave(&iommu->register_lock, flags); in __dmar_enable_qi()
1594 writel(0, iommu->reg + DMAR_IQT_REG); in __dmar_enable_qi()
1596 dmar_writeq(iommu->reg + DMAR_IQA_REG, val); in __dmar_enable_qi()
1598 iommu->gcmd |= DMA_GCMD_QIE; in __dmar_enable_qi()
1599 writel(iommu->gcmd, iommu->reg + DMAR_GCMD_REG); in __dmar_enable_qi()
1604 raw_spin_unlock_irqrestore(&iommu->register_lock, flags); in __dmar_enable_qi()
1609 * interrupt-remapping. Also used by DMA-remapping, which replaces
1617 if (!ecap_qis(iommu->ecap)) in dmar_enable_qi()
1618 return -ENOENT; in dmar_enable_qi()
1623 if (iommu->qi) in dmar_enable_qi()
1626 iommu->qi = kmalloc(sizeof(*qi), GFP_ATOMIC); in dmar_enable_qi()
1627 if (!iommu->qi) in dmar_enable_qi()
1628 return -ENOMEM; in dmar_enable_qi()
1630 qi = iommu->qi; in dmar_enable_qi()
1636 desc_page = alloc_pages_node(iommu->node, GFP_ATOMIC | __GFP_ZERO, in dmar_enable_qi()
1637 !!ecap_smts(iommu->ecap)); in dmar_enable_qi()
1640 iommu->qi = NULL; in dmar_enable_qi()
1641 return -ENOMEM; in dmar_enable_qi()
1644 qi->desc = page_address(desc_page); in dmar_enable_qi()
1646 qi->desc_status = kcalloc(QI_LENGTH, sizeof(int), GFP_ATOMIC); in dmar_enable_qi()
1647 if (!qi->desc_status) { in dmar_enable_qi()
1648 free_page((unsigned long) qi->desc); in dmar_enable_qi()
1650 iommu->qi = NULL; in dmar_enable_qi()
1651 return -ENOMEM; in dmar_enable_qi()
1654 raw_spin_lock_init(&qi->q_lock); in dmar_enable_qi()
1661 /* iommu interrupt handling. Most stuff are MSI-like. */
1681 "non-zero reserved fields in RTP",
1682 "non-zero reserved fields in CTP",
1683 "non-zero reserved fields in PTE",
1691 "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", /* 0x33-0x37 */
1694 "SM: Non-zero reserved field set in Root Entry",
1695 "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", /* 0x3B-0x3F */
1698 "SM: Non-zero reserved field set in the Context Entry",
1703 "SM: PRE field in Context-Entry is clear",
1704 "SM: RID_PASID field error in Context-Entry",
1705 "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", /* 0x49-0x4F */
1708 "SM: Non-zero reserved field set in PASID Directory Entry",
1709 "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", /* 0x53-0x57 */
1712 "SM: Non-zero reserved field set in PASID Table Entry",
1713 "SM: Invalid Scalable-Mode PASID Table Entry",
1716 "Unknown", "Unknown",/* 0x5E-0x5F */
1717 …"Unknown", "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", /* 0x60-0x…
1718 …"Unknown", "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", /* 0x68-0x…
1719 "SM: Error attempting to access first-level paging entry",
1720 "SM: Present bit in first-level paging entry is clear",
1721 "SM: Non-zero reserved field set in first-level paging entry",
1722 "SM: Error attempting to access FL-PML4 entry",
1723 "SM: First-level entry address beyond MGAW in Nested translation",
1724 "SM: Read permission error in FL-PML4 entry in Nested translation",
1725 "SM: Read permission error in first-level paging entry in Nested translation",
1726 "SM: Write permission error in first-level paging entry in Nested translation",
1727 "SM: Error attempting to access second-level paging entry",
1728 "SM: Read/Write permission error in second-level paging entry",
1729 "SM: Non-zero reserved field set in second-level paging entry",
1730 "SM: Invalid second-level page table pointer",
1731 "SM: A/D bit update needed in second-level entry when set up in no snoop",
1732 "Unknown", "Unknown", "Unknown", /* 0x7D-0x7F */
1733 "SM: Address in first-level translation is not canonical",
1734 "SM: U/S set 0 for first-level translation with user privilege",
1735 "SM: No execute permission for request with PASID and ER=1",
1737 "SM: Second-level entry address beyond the max",
1738 "SM: No write permission for Write/AtomicOp request",
1739 "SM: No read permission for Read/AtomicOp request",
1740 "SM: Invalid address-interrupt address",
1741 …"Unknown", "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", "Unknown", /* 0x88-0x…
1742 "SM: A/D bit update needed in first-level entry when set up in no snoop",
1747 "Detected reserved fields in the decoded interrupt-remapped request",
1748 "Interrupt index exceeded the interrupt-remapping table size",
1750 "Error accessing interrupt-remapping table pointed by IRTA_REG",
1753 "Blocked an interrupt request due to source-id verification failure",
1758 if (fault_reason >= 0x20 && (fault_reason - 0x20 < in dmar_get_fault_reason()
1761 return irq_remap_fault_reasons[fault_reason - 0x20]; in dmar_get_fault_reason()
1762 } else if (fault_reason >= 0x30 && (fault_reason - 0x30 < in dmar_get_fault_reason()
1765 return dma_remap_sm_fault_reasons[fault_reason - 0x30]; in dmar_get_fault_reason()
1778 if (iommu->irq == irq) in dmar_msi_reg()
1780 else if (iommu->pr_irq == irq) in dmar_msi_reg()
1789 int reg = dmar_msi_reg(iommu, data->irq); in dmar_msi_unmask()
1793 raw_spin_lock_irqsave(&iommu->register_lock, flag); in dmar_msi_unmask()
1794 writel(0, iommu->reg + reg); in dmar_msi_unmask()
1796 readl(iommu->reg + reg); in dmar_msi_unmask()
1797 raw_spin_unlock_irqrestore(&iommu->register_lock, flag); in dmar_msi_unmask()
1803 int reg = dmar_msi_reg(iommu, data->irq); in dmar_msi_mask()
1807 raw_spin_lock_irqsave(&iommu->register_lock, flag); in dmar_msi_mask()
1808 writel(DMA_FECTL_IM, iommu->reg + reg); in dmar_msi_mask()
1810 readl(iommu->reg + reg); in dmar_msi_mask()
1811 raw_spin_unlock_irqrestore(&iommu->register_lock, flag); in dmar_msi_mask()
1820 raw_spin_lock_irqsave(&iommu->register_lock, flag); in dmar_msi_write()
1821 writel(msg->data, iommu->reg + reg + 4); in dmar_msi_write()
1822 writel(msg->address_lo, iommu->reg + reg + 8); in dmar_msi_write()
1823 writel(msg->address_hi, iommu->reg + reg + 12); in dmar_msi_write()
1824 raw_spin_unlock_irqrestore(&iommu->register_lock, flag); in dmar_msi_write()
1833 raw_spin_lock_irqsave(&iommu->register_lock, flag); in dmar_msi_read()
1834 msg->data = readl(iommu->reg + reg + 4); in dmar_msi_read()
1835 msg->address_lo = readl(iommu->reg + reg + 8); in dmar_msi_read()
1836 msg->address_hi = readl(iommu->reg + reg + 12); in dmar_msi_read()
1837 raw_spin_unlock_irqrestore(&iommu->register_lock, flag); in dmar_msi_read()
1850 pr_err("[INTR-REMAP] Request device [%02x:%02x.%d] fault index %llx [fault reason %02d] %s\n", in dmar_fault_do_one()
1874 raw_spin_lock_irqsave(&iommu->register_lock, flag); in dmar_fault()
1875 fault_status = readl(iommu->reg + DMAR_FSTS_REG); in dmar_fault()
1884 reg = cap_fault_reg_offset(iommu->cap); in dmar_fault()
1897 data = readl(iommu->reg + reg + in dmar_fault()
1907 data = readl(iommu->reg + reg + in dmar_fault()
1912 guest_addr = dmar_readq(iommu->reg + reg + in dmar_fault()
1918 writel(DMA_FRCD_F, iommu->reg + reg + in dmar_fault()
1921 raw_spin_unlock_irqrestore(&iommu->register_lock, flag); in dmar_fault()
1924 /* Using pasid -1 if pasid is not present */ in dmar_fault()
1926 pasid_present ? pasid : -1, in dmar_fault()
1930 if (fault_index >= cap_num_fault_regs(iommu->cap)) in dmar_fault()
1932 raw_spin_lock_irqsave(&iommu->register_lock, flag); in dmar_fault()
1936 iommu->reg + DMAR_FSTS_REG); in dmar_fault()
1939 raw_spin_unlock_irqrestore(&iommu->register_lock, flag); in dmar_fault()
1950 if (iommu->irq) in dmar_set_interrupt()
1953 irq = dmar_alloc_hwirq(iommu->seq_id, iommu->node, iommu); in dmar_set_interrupt()
1955 iommu->irq = irq; in dmar_set_interrupt()
1957 pr_err("No free IRQ vectors\n"); in dmar_set_interrupt()
1958 return -EINVAL; in dmar_set_interrupt()
1961 ret = request_irq(irq, dmar_fault, IRQF_NO_THREAD, iommu->name, iommu); in dmar_set_interrupt()
1981 (unsigned long long)drhd->reg_base_addr, ret); in enable_drhd_fault_handling()
1982 return -1; in enable_drhd_fault_handling()
1988 dmar_fault(iommu->irq, iommu); in enable_drhd_fault_handling()
1989 fault_status = readl(iommu->reg + DMAR_FSTS_REG); in enable_drhd_fault_handling()
1990 writel(fault_status, iommu->reg + DMAR_FSTS_REG); in enable_drhd_fault_handling()
1997 * Re-enable Queued Invalidation interface.
2001 if (!ecap_qis(iommu->ecap)) in dmar_reenable_qi()
2002 return -ENOENT; in dmar_reenable_qi()
2004 if (!iommu->qi) in dmar_reenable_qi()
2005 return -ENOENT; in dmar_reenable_qi()
2012 * Then enable queued invalidation again. Since there is no pending in dmar_reenable_qi()
2013 * invalidation requests now, it's safe to re-enable queued in dmar_reenable_qi()
2030 return dmar->flags & 0x1; in dmar_ir_support()
2051 list_del(&dmaru->list); in dmar_free_unused_resources()
2065 * for Directed-IO Architecture Specifiction, Rev 2.2, Section 8.8
2089 int ret = -ENODEV; in dmar_walk_dsm_resource()
2105 return -ENODEV; in dmar_walk_dsm_resource()
2110 start = (struct acpi_dmar_header *)obj->buffer.pointer; in dmar_walk_dsm_resource()
2111 ret = dmar_walk_remapping_entries(start, obj->buffer.length, &callback); in dmar_walk_dsm_resource()
2125 return -ENODEV; in dmar_hp_add_drhd()
2147 if (!dmaru->include_all && dmaru->devices && dmaru->devices_cnt) { in dmar_hp_remove_drhd()
2148 for_each_active_dev_scope(dmaru->devices, in dmar_hp_remove_drhd()
2149 dmaru->devices_cnt, i, dev) in dmar_hp_remove_drhd()
2150 return -EBUSY; in dmar_hp_remove_drhd()
2166 list_del_rcu(&dmaru->list); in dmar_hp_release_drhd()
2187 pr_warn(FW_BUG "No DRHD structures in buffer returned by _DSM method\n"); in dmar_hotplug_insert()
2275 return -ENXIO; in dmar_device_hotplug()
2302 * dmar_platform_optin - Is %DMA_CTRL_PLATFORM_OPT_IN_FLAG set in DMAR table
2306 * sure no device can issue DMA outside of RMRR regions.
2319 ret = !!(dmar->flags & DMAR_PLATFORM_OPT_IN); in dmar_platform_optin()