blob: 13dc2318e17a3af7d5887b7b2e719c8ae483087f [file] [log] [blame]
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001/*
David Woodhouseea8ea462014-03-05 17:09:32 +00002 * Copyright © 2006-2014 Intel Corporation.
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
David Woodhouseea8ea462014-03-05 17:09:32 +000013 * Authors: David Woodhouse <dwmw2@infradead.org>,
14 * Ashok Raj <ashok.raj@intel.com>,
15 * Shaohua Li <shaohua.li@intel.com>,
16 * Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com>,
17 * Fenghua Yu <fenghua.yu@intel.com>
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070018 */
19
20#include <linux/init.h>
21#include <linux/bitmap.h>
mark gross5e0d2a62008-03-04 15:22:08 -080022#include <linux/debugfs.h>
Paul Gortmaker54485c32011-10-29 10:26:25 -040023#include <linux/export.h>
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070024#include <linux/slab.h>
25#include <linux/irq.h>
26#include <linux/interrupt.h>
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070027#include <linux/spinlock.h>
28#include <linux/pci.h>
29#include <linux/dmar.h>
30#include <linux/dma-mapping.h>
31#include <linux/mempool.h>
Jiang Liu75f05562014-02-19 14:07:37 +080032#include <linux/memory.h>
mark gross5e0d2a62008-03-04 15:22:08 -080033#include <linux/timer.h>
Kay, Allen M38717942008-09-09 18:37:29 +030034#include <linux/iova.h>
Joerg Roedel5d450802008-12-03 14:52:32 +010035#include <linux/iommu.h>
Kay, Allen M38717942008-09-09 18:37:29 +030036#include <linux/intel-iommu.h>
Rafael J. Wysocki134fac32011-03-23 22:16:14 +010037#include <linux/syscore_ops.h>
Shane Wang69575d32009-09-01 18:25:07 -070038#include <linux/tboot.h>
Stephen Rothwelladb2fe02009-08-31 15:24:23 +100039#include <linux/dmi.h>
Joerg Roedel5cdede22011-04-04 15:55:18 +020040#include <linux/pci-ats.h>
Tejun Heo0ee332c2011-12-08 10:22:09 -080041#include <linux/memblock.h>
Suresh Siddha8a8f4222012-03-30 11:47:08 -070042#include <asm/irq_remapping.h>
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070043#include <asm/cacheflush.h>
FUJITA Tomonori46a7fa22008-07-11 10:23:42 +090044#include <asm/iommu.h>
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070045
Joerg Roedel078e1ee2012-09-26 12:44:43 +020046#include "irq_remapping.h"
Varun Sethi61e015a2013-04-23 10:05:24 +053047#include "pci.h"
Joerg Roedel078e1ee2012-09-26 12:44:43 +020048
Fenghua Yu5b6985c2008-10-16 18:02:32 -070049#define ROOT_SIZE VTD_PAGE_SIZE
50#define CONTEXT_SIZE VTD_PAGE_SIZE
51
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070052#define IS_GFX_DEVICE(pdev) ((pdev->class >> 16) == PCI_BASE_CLASS_DISPLAY)
53#define IS_ISA_DEVICE(pdev) ((pdev->class >> 8) == PCI_CLASS_BRIDGE_ISA)
David Woodhousee0fc7e02009-09-30 09:12:17 -070054#define IS_AZALIA(pdev) ((pdev)->vendor == 0x8086 && (pdev)->device == 0x3a3e)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070055
56#define IOAPIC_RANGE_START (0xfee00000)
57#define IOAPIC_RANGE_END (0xfeefffff)
58#define IOVA_START_ADDR (0x1000)
59
60#define DEFAULT_DOMAIN_ADDRESS_WIDTH 48
61
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -070062#define MAX_AGAW_WIDTH 64
Jiang Liu5c645b32014-01-06 14:18:12 +080063#define MAX_AGAW_PFN_WIDTH (MAX_AGAW_WIDTH - VTD_PAGE_SHIFT)
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -070064
David Woodhouse2ebe3152009-09-19 07:34:04 -070065#define __DOMAIN_MAX_PFN(gaw) ((((uint64_t)1) << (gaw-VTD_PAGE_SHIFT)) - 1)
66#define __DOMAIN_MAX_ADDR(gaw) ((((uint64_t)1) << gaw) - 1)
67
68/* We limit DOMAIN_MAX_PFN to fit in an unsigned long, and DOMAIN_MAX_ADDR
69 to match. That way, we can use 'unsigned long' for PFNs with impunity. */
70#define DOMAIN_MAX_PFN(gaw) ((unsigned long) min_t(uint64_t, \
71 __DOMAIN_MAX_PFN(gaw), (unsigned long)-1))
72#define DOMAIN_MAX_ADDR(gaw) (((uint64_t)__DOMAIN_MAX_PFN(gaw)) << VTD_PAGE_SHIFT)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070073
Mark McLoughlinf27be032008-11-20 15:49:43 +000074#define IOVA_PFN(addr) ((addr) >> PAGE_SHIFT)
Yang Hongyang284901a2009-04-06 19:01:15 -070075#define DMA_32BIT_PFN IOVA_PFN(DMA_BIT_MASK(32))
Yang Hongyang6a355282009-04-06 19:01:13 -070076#define DMA_64BIT_PFN IOVA_PFN(DMA_BIT_MASK(64))
mark gross5e0d2a62008-03-04 15:22:08 -080077
Andrew Mortondf08cdc2010-09-22 13:05:11 -070078/* page table handling */
79#define LEVEL_STRIDE (9)
80#define LEVEL_MASK (((u64)1 << LEVEL_STRIDE) - 1)
81
Ohad Ben-Cohen6d1c56a2011-11-10 11:32:30 +020082/*
83 * This bitmap is used to advertise the page sizes our hardware support
84 * to the IOMMU core, which will then use this information to split
85 * physically contiguous memory regions it is mapping into page sizes
86 * that we support.
87 *
88 * Traditionally the IOMMU core just handed us the mappings directly,
89 * after making sure the size is an order of a 4KiB page and that the
90 * mapping has natural alignment.
91 *
92 * To retain this behavior, we currently advertise that we support
93 * all page sizes that are an order of 4KiB.
94 *
95 * If at some point we'd like to utilize the IOMMU core's new behavior,
96 * we could change this to advertise the real page sizes we support.
97 */
98#define INTEL_IOMMU_PGSIZES (~0xFFFUL)
99
Andrew Mortondf08cdc2010-09-22 13:05:11 -0700100static inline int agaw_to_level(int agaw)
101{
102 return agaw + 2;
103}
104
105static inline int agaw_to_width(int agaw)
106{
Jiang Liu5c645b32014-01-06 14:18:12 +0800107 return min_t(int, 30 + agaw * LEVEL_STRIDE, MAX_AGAW_WIDTH);
Andrew Mortondf08cdc2010-09-22 13:05:11 -0700108}
109
110static inline int width_to_agaw(int width)
111{
Jiang Liu5c645b32014-01-06 14:18:12 +0800112 return DIV_ROUND_UP(width - 30, LEVEL_STRIDE);
Andrew Mortondf08cdc2010-09-22 13:05:11 -0700113}
114
115static inline unsigned int level_to_offset_bits(int level)
116{
117 return (level - 1) * LEVEL_STRIDE;
118}
119
120static inline int pfn_level_offset(unsigned long pfn, int level)
121{
122 return (pfn >> level_to_offset_bits(level)) & LEVEL_MASK;
123}
124
125static inline unsigned long level_mask(int level)
126{
127 return -1UL << level_to_offset_bits(level);
128}
129
130static inline unsigned long level_size(int level)
131{
132 return 1UL << level_to_offset_bits(level);
133}
134
135static inline unsigned long align_to_level(unsigned long pfn, int level)
136{
137 return (pfn + level_size(level) - 1) & level_mask(level);
138}
David Woodhousefd18de52009-05-10 23:57:41 +0100139
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100140static inline unsigned long lvl_to_nr_pages(unsigned int lvl)
141{
Jiang Liu5c645b32014-01-06 14:18:12 +0800142 return 1 << min_t(int, (lvl - 1) * LEVEL_STRIDE, MAX_AGAW_PFN_WIDTH);
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100143}
144
David Woodhousedd4e8312009-06-27 16:21:20 +0100145/* VT-d pages must always be _smaller_ than MM pages. Otherwise things
146 are never going to work. */
147static inline unsigned long dma_to_mm_pfn(unsigned long dma_pfn)
148{
149 return dma_pfn >> (PAGE_SHIFT - VTD_PAGE_SHIFT);
150}
151
152static inline unsigned long mm_to_dma_pfn(unsigned long mm_pfn)
153{
154 return mm_pfn << (PAGE_SHIFT - VTD_PAGE_SHIFT);
155}
156static inline unsigned long page_to_dma_pfn(struct page *pg)
157{
158 return mm_to_dma_pfn(page_to_pfn(pg));
159}
160static inline unsigned long virt_to_dma_pfn(void *p)
161{
162 return page_to_dma_pfn(virt_to_page(p));
163}
164
Weidong Hand9630fe2008-12-08 11:06:32 +0800165/* global iommu list, set NULL for ignored DMAR units */
166static struct intel_iommu **g_iommus;
167
David Woodhousee0fc7e02009-09-30 09:12:17 -0700168static void __init check_tylersburg_isoch(void);
David Woodhouse9af88142009-02-13 23:18:03 +0000169static int rwbf_quirk;
170
Mark McLoughlin46b08e12008-11-20 15:49:44 +0000171/*
Joseph Cihulab7792602011-05-03 00:08:37 -0700172 * set to 1 to panic kernel if can't successfully enable VT-d
173 * (used when kernel is launched w/ TXT)
174 */
175static int force_on = 0;
176
177/*
Mark McLoughlin46b08e12008-11-20 15:49:44 +0000178 * 0: Present
179 * 1-11: Reserved
180 * 12-63: Context Ptr (12 - (haw-1))
181 * 64-127: Reserved
182 */
183struct root_entry {
184 u64 val;
185 u64 rsvd1;
186};
187#define ROOT_ENTRY_NR (VTD_PAGE_SIZE/sizeof(struct root_entry))
188static inline bool root_present(struct root_entry *root)
189{
190 return (root->val & 1);
191}
192static inline void set_root_present(struct root_entry *root)
193{
194 root->val |= 1;
195}
196static inline void set_root_value(struct root_entry *root, unsigned long value)
197{
198 root->val |= value & VTD_PAGE_MASK;
199}
200
201static inline struct context_entry *
202get_context_addr_from_root(struct root_entry *root)
203{
204 return (struct context_entry *)
205 (root_present(root)?phys_to_virt(
206 root->val & VTD_PAGE_MASK) :
207 NULL);
208}
209
Mark McLoughlin7a8fc252008-11-20 15:49:45 +0000210/*
211 * low 64 bits:
212 * 0: present
213 * 1: fault processing disable
214 * 2-3: translation type
215 * 12-63: address space root
216 * high 64 bits:
217 * 0-2: address width
218 * 3-6: aval
219 * 8-23: domain id
220 */
221struct context_entry {
222 u64 lo;
223 u64 hi;
224};
Mark McLoughlin7a8fc252008-11-20 15:49:45 +0000225
Mark McLoughlinc07e7d22008-11-21 16:54:46 +0000226static inline bool context_present(struct context_entry *context)
227{
228 return (context->lo & 1);
229}
230static inline void context_set_present(struct context_entry *context)
231{
232 context->lo |= 1;
233}
234
235static inline void context_set_fault_enable(struct context_entry *context)
236{
237 context->lo &= (((u64)-1) << 2) | 1;
238}
239
Mark McLoughlinc07e7d22008-11-21 16:54:46 +0000240static inline void context_set_translation_type(struct context_entry *context,
241 unsigned long value)
242{
243 context->lo &= (((u64)-1) << 4) | 3;
244 context->lo |= (value & 3) << 2;
245}
246
247static inline void context_set_address_root(struct context_entry *context,
248 unsigned long value)
249{
250 context->lo |= value & VTD_PAGE_MASK;
251}
252
253static inline void context_set_address_width(struct context_entry *context,
254 unsigned long value)
255{
256 context->hi |= value & 7;
257}
258
259static inline void context_set_domain_id(struct context_entry *context,
260 unsigned long value)
261{
262 context->hi |= (value & ((1 << 16) - 1)) << 8;
263}
264
265static inline void context_clear_entry(struct context_entry *context)
266{
267 context->lo = 0;
268 context->hi = 0;
269}
Mark McLoughlin7a8fc252008-11-20 15:49:45 +0000270
Mark McLoughlin622ba122008-11-20 15:49:46 +0000271/*
272 * 0: readable
273 * 1: writable
274 * 2-6: reserved
275 * 7: super page
Sheng Yang9cf066972009-03-18 15:33:07 +0800276 * 8-10: available
277 * 11: snoop behavior
Mark McLoughlin622ba122008-11-20 15:49:46 +0000278 * 12-63: Host physcial address
279 */
280struct dma_pte {
281 u64 val;
282};
Mark McLoughlin622ba122008-11-20 15:49:46 +0000283
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000284static inline void dma_clear_pte(struct dma_pte *pte)
285{
286 pte->val = 0;
287}
288
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000289static inline u64 dma_pte_addr(struct dma_pte *pte)
290{
David Woodhousec85994e2009-07-01 19:21:24 +0100291#ifdef CONFIG_64BIT
292 return pte->val & VTD_PAGE_MASK;
293#else
294 /* Must have a full atomic 64-bit read */
David Woodhouse1a8bd482010-08-10 01:38:53 +0100295 return __cmpxchg64(&pte->val, 0ULL, 0ULL) & VTD_PAGE_MASK;
David Woodhousec85994e2009-07-01 19:21:24 +0100296#endif
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000297}
298
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000299static inline bool dma_pte_present(struct dma_pte *pte)
300{
301 return (pte->val & 3) != 0;
302}
Mark McLoughlin622ba122008-11-20 15:49:46 +0000303
Allen Kay4399c8b2011-10-14 12:32:46 -0700304static inline bool dma_pte_superpage(struct dma_pte *pte)
305{
306 return (pte->val & (1 << 7));
307}
308
David Woodhouse75e6bf92009-07-02 11:21:16 +0100309static inline int first_pte_in_page(struct dma_pte *pte)
310{
311 return !((unsigned long)pte & ~VTD_PAGE_MASK);
312}
313
Fenghua Yu2c2e2c32009-06-19 13:47:29 -0700314/*
315 * This domain is a statically identity mapping domain.
316 * 1. This domain creats a static 1:1 mapping to all usable memory.
317 * 2. It maps to each iommu if successful.
318 * 3. Each iommu mapps to this domain if successful.
319 */
David Woodhouse19943b02009-08-04 16:19:20 +0100320static struct dmar_domain *si_domain;
321static int hw_pass_through = 1;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -0700322
Weidong Han3b5410e2008-12-08 09:17:15 +0800323/* devices under the same p2p bridge are owned in one domain */
Mike Daycdc7b832008-12-12 17:16:30 +0100324#define DOMAIN_FLAG_P2P_MULTIPLE_DEVICES (1 << 0)
Weidong Han3b5410e2008-12-08 09:17:15 +0800325
Weidong Han1ce28fe2008-12-08 16:35:39 +0800326/* domain represents a virtual machine, more than one devices
327 * across iommus may be owned in one domain, e.g. kvm guest.
328 */
329#define DOMAIN_FLAG_VIRTUAL_MACHINE (1 << 1)
330
Fenghua Yu2c2e2c32009-06-19 13:47:29 -0700331/* si_domain contains mulitple devices */
332#define DOMAIN_FLAG_STATIC_IDENTITY (1 << 2)
333
Mike Travis1b198bb2012-03-05 15:05:16 -0800334/* define the limit of IOMMUs supported in each domain */
335#ifdef CONFIG_X86
336# define IOMMU_UNITS_SUPPORTED MAX_IO_APICS
337#else
338# define IOMMU_UNITS_SUPPORTED 64
339#endif
340
Mark McLoughlin99126f72008-11-20 15:49:47 +0000341struct dmar_domain {
342 int id; /* domain id */
Suresh Siddha4c923d42009-10-02 11:01:24 -0700343 int nid; /* node id */
Mike Travis1b198bb2012-03-05 15:05:16 -0800344 DECLARE_BITMAP(iommu_bmp, IOMMU_UNITS_SUPPORTED);
345 /* bitmap of iommus this domain uses*/
Mark McLoughlin99126f72008-11-20 15:49:47 +0000346
347 struct list_head devices; /* all devices' list */
348 struct iova_domain iovad; /* iova's that belong to this domain */
349
350 struct dma_pte *pgd; /* virtual address */
Mark McLoughlin99126f72008-11-20 15:49:47 +0000351 int gaw; /* max guest address width */
352
353 /* adjusted guest address width, 0 is level 2 30-bit */
354 int agaw;
355
Weidong Han3b5410e2008-12-08 09:17:15 +0800356 int flags; /* flags to find out type of domain */
Weidong Han8e6040972008-12-08 15:49:06 +0800357
358 int iommu_coherency;/* indicate coherency of iommu access */
Sheng Yang58c610b2009-03-18 15:33:05 +0800359 int iommu_snooping; /* indicate snooping control feature*/
Weidong Hanc7151a82008-12-08 22:51:37 +0800360 int iommu_count; /* reference count of iommu */
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100361 int iommu_superpage;/* Level of superpages supported:
362 0 == 4KiB (no superpages), 1 == 2MiB,
363 2 == 1GiB, 3 == 512GiB, 4 == 1TiB */
Weidong Hanc7151a82008-12-08 22:51:37 +0800364 spinlock_t iommu_lock; /* protect iommu set in domain */
Weidong Hanfe40f1e2008-12-08 23:10:23 +0800365 u64 max_addr; /* maximum mapped address */
Mark McLoughlin99126f72008-11-20 15:49:47 +0000366};
367
Mark McLoughlina647dac2008-11-20 15:49:48 +0000368/* PCI domain-device relationship */
369struct device_domain_info {
370 struct list_head link; /* link to domain siblings */
371 struct list_head global; /* link to global list */
David Woodhouse276dbf992009-04-04 01:45:37 +0100372 u8 bus; /* PCI bus number */
Mark McLoughlina647dac2008-11-20 15:49:48 +0000373 u8 devfn; /* PCI devfn number */
David Woodhouse0bcb3e22014-03-06 17:12:03 +0000374 struct device *dev; /* it's NULL for PCIe-to-PCI bridge */
Yu Zhao93a23a72009-05-18 13:51:37 +0800375 struct intel_iommu *iommu; /* IOMMU used by this device */
Mark McLoughlina647dac2008-11-20 15:49:48 +0000376 struct dmar_domain *domain; /* pointer to domain */
377};
378
Jiang Liub94e4112014-02-19 14:07:25 +0800379struct dmar_rmrr_unit {
380 struct list_head list; /* list of rmrr units */
381 struct acpi_dmar_header *hdr; /* ACPI header */
382 u64 base_address; /* reserved base address*/
383 u64 end_address; /* reserved end address */
David Woodhouse832bd852014-03-07 15:08:36 +0000384 struct dmar_dev_scope *devices; /* target devices */
Jiang Liub94e4112014-02-19 14:07:25 +0800385 int devices_cnt; /* target device count */
386};
387
388struct dmar_atsr_unit {
389 struct list_head list; /* list of ATSR units */
390 struct acpi_dmar_header *hdr; /* ACPI header */
David Woodhouse832bd852014-03-07 15:08:36 +0000391 struct dmar_dev_scope *devices; /* target devices */
Jiang Liub94e4112014-02-19 14:07:25 +0800392 int devices_cnt; /* target device count */
393 u8 include_all:1; /* include all ports */
394};
395
396static LIST_HEAD(dmar_atsr_units);
397static LIST_HEAD(dmar_rmrr_units);
398
399#define for_each_rmrr_units(rmrr) \
400 list_for_each_entry(rmrr, &dmar_rmrr_units, list)
401
mark gross5e0d2a62008-03-04 15:22:08 -0800402static void flush_unmaps_timeout(unsigned long data);
403
Jiang Liub707cb02014-01-06 14:18:26 +0800404static DEFINE_TIMER(unmap_timer, flush_unmaps_timeout, 0, 0);
mark gross5e0d2a62008-03-04 15:22:08 -0800405
mark gross80b20dd2008-04-18 13:53:58 -0700406#define HIGH_WATER_MARK 250
407struct deferred_flush_tables {
408 int next;
409 struct iova *iova[HIGH_WATER_MARK];
410 struct dmar_domain *domain[HIGH_WATER_MARK];
David Woodhouseea8ea462014-03-05 17:09:32 +0000411 struct page *freelist[HIGH_WATER_MARK];
mark gross80b20dd2008-04-18 13:53:58 -0700412};
413
414static struct deferred_flush_tables *deferred_flush;
415
mark gross5e0d2a62008-03-04 15:22:08 -0800416/* bitmap for indexing intel_iommus */
mark gross5e0d2a62008-03-04 15:22:08 -0800417static int g_num_of_iommus;
418
419static DEFINE_SPINLOCK(async_umap_flush_lock);
420static LIST_HEAD(unmaps_to_do);
421
422static int timer_on;
423static long list_size;
mark gross5e0d2a62008-03-04 15:22:08 -0800424
Jiang Liu92d03cc2014-02-19 14:07:28 +0800425static void domain_exit(struct dmar_domain *domain);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700426static void domain_remove_dev_info(struct dmar_domain *domain);
Jiang Liub94e4112014-02-19 14:07:25 +0800427static void domain_remove_one_dev_info(struct dmar_domain *domain,
David Woodhousebf9c9ed2014-03-09 16:19:13 -0700428 struct device *dev);
Jiang Liu92d03cc2014-02-19 14:07:28 +0800429static void iommu_detach_dependent_devices(struct intel_iommu *iommu,
David Woodhouse0bcb3e22014-03-06 17:12:03 +0000430 struct device *dev);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700431
Suresh Siddhad3f13812011-08-23 17:05:25 -0700432#ifdef CONFIG_INTEL_IOMMU_DEFAULT_ON
Kyle McMartin0cd5c3c2009-02-04 14:29:19 -0800433int dmar_disabled = 0;
434#else
435int dmar_disabled = 1;
Suresh Siddhad3f13812011-08-23 17:05:25 -0700436#endif /*CONFIG_INTEL_IOMMU_DEFAULT_ON*/
Kyle McMartin0cd5c3c2009-02-04 14:29:19 -0800437
Eugeni Dodonov8bc1f852011-11-23 16:42:14 -0200438int intel_iommu_enabled = 0;
439EXPORT_SYMBOL_GPL(intel_iommu_enabled);
440
David Woodhouse2d9e6672010-06-15 10:57:57 +0100441static int dmar_map_gfx = 1;
Keshavamurthy, Anil S7d3b03c2007-10-21 16:41:53 -0700442static int dmar_forcedac;
mark gross5e0d2a62008-03-04 15:22:08 -0800443static int intel_iommu_strict;
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100444static int intel_iommu_superpage = 1;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700445
David Woodhousec0771df2011-10-14 20:59:46 +0100446int intel_iommu_gfx_mapped;
447EXPORT_SYMBOL_GPL(intel_iommu_gfx_mapped);
448
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700449#define DUMMY_DEVICE_DOMAIN_INFO ((struct device_domain_info *)(-1))
450static DEFINE_SPINLOCK(device_domain_lock);
451static LIST_HEAD(device_domain_list);
452
Joerg Roedela8bcbb0d2008-12-03 15:14:02 +0100453static struct iommu_ops intel_iommu_ops;
454
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700455static int __init intel_iommu_setup(char *str)
456{
457 if (!str)
458 return -EINVAL;
459 while (*str) {
Kyle McMartin0cd5c3c2009-02-04 14:29:19 -0800460 if (!strncmp(str, "on", 2)) {
461 dmar_disabled = 0;
462 printk(KERN_INFO "Intel-IOMMU: enabled\n");
463 } else if (!strncmp(str, "off", 3)) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700464 dmar_disabled = 1;
Kyle McMartin0cd5c3c2009-02-04 14:29:19 -0800465 printk(KERN_INFO "Intel-IOMMU: disabled\n");
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700466 } else if (!strncmp(str, "igfx_off", 8)) {
467 dmar_map_gfx = 0;
468 printk(KERN_INFO
469 "Intel-IOMMU: disable GFX device mapping\n");
Keshavamurthy, Anil S7d3b03c2007-10-21 16:41:53 -0700470 } else if (!strncmp(str, "forcedac", 8)) {
mark gross5e0d2a62008-03-04 15:22:08 -0800471 printk(KERN_INFO
Keshavamurthy, Anil S7d3b03c2007-10-21 16:41:53 -0700472 "Intel-IOMMU: Forcing DAC for PCI devices\n");
473 dmar_forcedac = 1;
mark gross5e0d2a62008-03-04 15:22:08 -0800474 } else if (!strncmp(str, "strict", 6)) {
475 printk(KERN_INFO
476 "Intel-IOMMU: disable batched IOTLB flush\n");
477 intel_iommu_strict = 1;
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100478 } else if (!strncmp(str, "sp_off", 6)) {
479 printk(KERN_INFO
480 "Intel-IOMMU: disable supported super page\n");
481 intel_iommu_superpage = 0;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700482 }
483
484 str += strcspn(str, ",");
485 while (*str == ',')
486 str++;
487 }
488 return 0;
489}
490__setup("intel_iommu=", intel_iommu_setup);
491
492static struct kmem_cache *iommu_domain_cache;
493static struct kmem_cache *iommu_devinfo_cache;
494static struct kmem_cache *iommu_iova_cache;
495
Suresh Siddha4c923d42009-10-02 11:01:24 -0700496static inline void *alloc_pgtable_page(int node)
Keshavamurthy, Anil Seb3fa7c2007-10-21 16:41:52 -0700497{
Suresh Siddha4c923d42009-10-02 11:01:24 -0700498 struct page *page;
499 void *vaddr = NULL;
Keshavamurthy, Anil Seb3fa7c2007-10-21 16:41:52 -0700500
Suresh Siddha4c923d42009-10-02 11:01:24 -0700501 page = alloc_pages_node(node, GFP_ATOMIC | __GFP_ZERO, 0);
502 if (page)
503 vaddr = page_address(page);
Keshavamurthy, Anil Seb3fa7c2007-10-21 16:41:52 -0700504 return vaddr;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700505}
506
507static inline void free_pgtable_page(void *vaddr)
508{
509 free_page((unsigned long)vaddr);
510}
511
512static inline void *alloc_domain_mem(void)
513{
KOSAKI Motohiro354bb652009-11-17 16:21:09 +0900514 return kmem_cache_alloc(iommu_domain_cache, GFP_ATOMIC);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700515}
516
Kay, Allen M38717942008-09-09 18:37:29 +0300517static void free_domain_mem(void *vaddr)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700518{
519 kmem_cache_free(iommu_domain_cache, vaddr);
520}
521
522static inline void * alloc_devinfo_mem(void)
523{
KOSAKI Motohiro354bb652009-11-17 16:21:09 +0900524 return kmem_cache_alloc(iommu_devinfo_cache, GFP_ATOMIC);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700525}
526
527static inline void free_devinfo_mem(void *vaddr)
528{
529 kmem_cache_free(iommu_devinfo_cache, vaddr);
530}
531
532struct iova *alloc_iova_mem(void)
533{
KOSAKI Motohiro354bb652009-11-17 16:21:09 +0900534 return kmem_cache_alloc(iommu_iova_cache, GFP_ATOMIC);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700535}
536
537void free_iova_mem(struct iova *iova)
538{
539 kmem_cache_free(iommu_iova_cache, iova);
540}
541
Weidong Han1b573682008-12-08 15:34:06 +0800542
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -0700543static int __iommu_calculate_agaw(struct intel_iommu *iommu, int max_gaw)
Weidong Han1b573682008-12-08 15:34:06 +0800544{
545 unsigned long sagaw;
546 int agaw = -1;
547
548 sagaw = cap_sagaw(iommu->cap);
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -0700549 for (agaw = width_to_agaw(max_gaw);
Weidong Han1b573682008-12-08 15:34:06 +0800550 agaw >= 0; agaw--) {
551 if (test_bit(agaw, &sagaw))
552 break;
553 }
554
555 return agaw;
556}
557
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -0700558/*
559 * Calculate max SAGAW for each iommu.
560 */
561int iommu_calculate_max_sagaw(struct intel_iommu *iommu)
562{
563 return __iommu_calculate_agaw(iommu, MAX_AGAW_WIDTH);
564}
565
566/*
567 * calculate agaw for each iommu.
568 * "SAGAW" may be different across iommus, use a default agaw, and
569 * get a supported less agaw for iommus that don't support the default agaw.
570 */
571int iommu_calculate_agaw(struct intel_iommu *iommu)
572{
573 return __iommu_calculate_agaw(iommu, DEFAULT_DOMAIN_ADDRESS_WIDTH);
574}
575
Fenghua Yu2c2e2c32009-06-19 13:47:29 -0700576/* This functionin only returns single iommu in a domain */
Weidong Han8c11e792008-12-08 15:29:22 +0800577static struct intel_iommu *domain_get_iommu(struct dmar_domain *domain)
578{
579 int iommu_id;
580
Fenghua Yu2c2e2c32009-06-19 13:47:29 -0700581 /* si_domain and vm domain should not get here. */
Weidong Han1ce28fe2008-12-08 16:35:39 +0800582 BUG_ON(domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -0700583 BUG_ON(domain->flags & DOMAIN_FLAG_STATIC_IDENTITY);
Weidong Han1ce28fe2008-12-08 16:35:39 +0800584
Mike Travis1b198bb2012-03-05 15:05:16 -0800585 iommu_id = find_first_bit(domain->iommu_bmp, g_num_of_iommus);
Weidong Han8c11e792008-12-08 15:29:22 +0800586 if (iommu_id < 0 || iommu_id >= g_num_of_iommus)
587 return NULL;
588
589 return g_iommus[iommu_id];
590}
591
Weidong Han8e6040972008-12-08 15:49:06 +0800592static void domain_update_iommu_coherency(struct dmar_domain *domain)
593{
David Woodhoused0501962014-03-11 17:10:29 -0700594 struct dmar_drhd_unit *drhd;
595 struct intel_iommu *iommu;
596 int i, found = 0;
Weidong Han8e6040972008-12-08 15:49:06 +0800597
David Woodhoused0501962014-03-11 17:10:29 -0700598 domain->iommu_coherency = 1;
Weidong Han8e6040972008-12-08 15:49:06 +0800599
Mike Travis1b198bb2012-03-05 15:05:16 -0800600 for_each_set_bit(i, domain->iommu_bmp, g_num_of_iommus) {
David Woodhoused0501962014-03-11 17:10:29 -0700601 found = 1;
Weidong Han8e6040972008-12-08 15:49:06 +0800602 if (!ecap_coherent(g_iommus[i]->ecap)) {
603 domain->iommu_coherency = 0;
604 break;
605 }
Weidong Han8e6040972008-12-08 15:49:06 +0800606 }
David Woodhoused0501962014-03-11 17:10:29 -0700607 if (found)
608 return;
609
610 /* No hardware attached; use lowest common denominator */
611 rcu_read_lock();
612 for_each_active_iommu(iommu, drhd) {
613 if (!ecap_coherent(iommu->ecap)) {
614 domain->iommu_coherency = 0;
615 break;
616 }
617 }
618 rcu_read_unlock();
Weidong Han8e6040972008-12-08 15:49:06 +0800619}
620
Sheng Yang58c610b2009-03-18 15:33:05 +0800621static void domain_update_iommu_snooping(struct dmar_domain *domain)
622{
623 int i;
624
625 domain->iommu_snooping = 1;
626
Mike Travis1b198bb2012-03-05 15:05:16 -0800627 for_each_set_bit(i, domain->iommu_bmp, g_num_of_iommus) {
Sheng Yang58c610b2009-03-18 15:33:05 +0800628 if (!ecap_sc_support(g_iommus[i]->ecap)) {
629 domain->iommu_snooping = 0;
630 break;
631 }
Sheng Yang58c610b2009-03-18 15:33:05 +0800632 }
633}
634
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100635static void domain_update_iommu_superpage(struct dmar_domain *domain)
636{
Allen Kay8140a952011-10-14 12:32:17 -0700637 struct dmar_drhd_unit *drhd;
638 struct intel_iommu *iommu = NULL;
639 int mask = 0xf;
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100640
641 if (!intel_iommu_superpage) {
642 domain->iommu_superpage = 0;
643 return;
644 }
645
Allen Kay8140a952011-10-14 12:32:17 -0700646 /* set iommu_superpage to the smallest common denominator */
Jiang Liu0e242612014-02-19 14:07:34 +0800647 rcu_read_lock();
Allen Kay8140a952011-10-14 12:32:17 -0700648 for_each_active_iommu(iommu, drhd) {
649 mask &= cap_super_page_val(iommu->cap);
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100650 if (!mask) {
651 break;
652 }
653 }
Jiang Liu0e242612014-02-19 14:07:34 +0800654 rcu_read_unlock();
655
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100656 domain->iommu_superpage = fls(mask);
657}
658
Sheng Yang58c610b2009-03-18 15:33:05 +0800659/* Some capabilities may be different across iommus */
660static void domain_update_iommu_cap(struct dmar_domain *domain)
661{
662 domain_update_iommu_coherency(domain);
663 domain_update_iommu_snooping(domain);
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100664 domain_update_iommu_superpage(domain);
Sheng Yang58c610b2009-03-18 15:33:05 +0800665}
666
David Woodhouse156baca2014-03-09 14:00:57 -0700667static struct intel_iommu *device_to_iommu(struct device *dev, u8 *bus, u8 *devfn)
Weidong Hanc7151a82008-12-08 22:51:37 +0800668{
669 struct dmar_drhd_unit *drhd = NULL;
Jiang Liub683b232014-02-19 14:07:32 +0800670 struct intel_iommu *iommu;
David Woodhouse156baca2014-03-09 14:00:57 -0700671 struct device *tmp;
672 struct pci_dev *ptmp, *pdev = NULL;
673 u16 segment;
Weidong Hanc7151a82008-12-08 22:51:37 +0800674 int i;
675
David Woodhouse156baca2014-03-09 14:00:57 -0700676 if (dev_is_pci(dev)) {
677 pdev = to_pci_dev(dev);
678 segment = pci_domain_nr(pdev->bus);
679 } else if (ACPI_COMPANION(dev))
680 dev = &ACPI_COMPANION(dev)->dev;
681
Jiang Liu0e242612014-02-19 14:07:34 +0800682 rcu_read_lock();
Jiang Liub683b232014-02-19 14:07:32 +0800683 for_each_active_iommu(iommu, drhd) {
David Woodhouse156baca2014-03-09 14:00:57 -0700684 if (pdev && segment != drhd->segment)
David Woodhouse276dbf992009-04-04 01:45:37 +0100685 continue;
Weidong Hanc7151a82008-12-08 22:51:37 +0800686
Jiang Liub683b232014-02-19 14:07:32 +0800687 for_each_active_dev_scope(drhd->devices,
David Woodhouse156baca2014-03-09 14:00:57 -0700688 drhd->devices_cnt, i, tmp) {
689 if (tmp == dev) {
690 *bus = drhd->devices[i].bus;
691 *devfn = drhd->devices[i].devfn;
692 goto out;
693 }
694
695 if (!pdev || !dev_is_pci(tmp))
David Woodhouse832bd852014-03-07 15:08:36 +0000696 continue;
David Woodhouse156baca2014-03-09 14:00:57 -0700697
698 ptmp = to_pci_dev(tmp);
699 if (ptmp->subordinate &&
700 ptmp->subordinate->number <= pdev->bus->number &&
701 ptmp->subordinate->busn_res.end >= pdev->bus->number)
702 goto got_pdev;
David Woodhouse924b6232009-04-04 00:39:25 +0100703 }
Weidong Hanc7151a82008-12-08 22:51:37 +0800704
David Woodhouse156baca2014-03-09 14:00:57 -0700705 if (pdev && drhd->include_all) {
706 got_pdev:
707 *bus = pdev->bus->number;
708 *devfn = pdev->devfn;
Jiang Liub683b232014-02-19 14:07:32 +0800709 goto out;
David Woodhouse156baca2014-03-09 14:00:57 -0700710 }
Weidong Hanc7151a82008-12-08 22:51:37 +0800711 }
Jiang Liub683b232014-02-19 14:07:32 +0800712 iommu = NULL;
David Woodhouse156baca2014-03-09 14:00:57 -0700713 out:
Jiang Liu0e242612014-02-19 14:07:34 +0800714 rcu_read_unlock();
Weidong Hanc7151a82008-12-08 22:51:37 +0800715
Jiang Liub683b232014-02-19 14:07:32 +0800716 return iommu;
Weidong Hanc7151a82008-12-08 22:51:37 +0800717}
718
Weidong Han5331fe62008-12-08 23:00:00 +0800719static void domain_flush_cache(struct dmar_domain *domain,
720 void *addr, int size)
721{
722 if (!domain->iommu_coherency)
723 clflush_cache_range(addr, size);
724}
725
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700726/* Gets context entry for a given bus and devfn */
727static struct context_entry * device_to_context_entry(struct intel_iommu *iommu,
728 u8 bus, u8 devfn)
729{
730 struct root_entry *root;
731 struct context_entry *context;
732 unsigned long phy_addr;
733 unsigned long flags;
734
735 spin_lock_irqsave(&iommu->lock, flags);
736 root = &iommu->root_entry[bus];
737 context = get_context_addr_from_root(root);
738 if (!context) {
Suresh Siddha4c923d42009-10-02 11:01:24 -0700739 context = (struct context_entry *)
740 alloc_pgtable_page(iommu->node);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700741 if (!context) {
742 spin_unlock_irqrestore(&iommu->lock, flags);
743 return NULL;
744 }
Fenghua Yu5b6985c2008-10-16 18:02:32 -0700745 __iommu_flush_cache(iommu, (void *)context, CONTEXT_SIZE);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700746 phy_addr = virt_to_phys((void *)context);
747 set_root_value(root, phy_addr);
748 set_root_present(root);
749 __iommu_flush_cache(iommu, root, sizeof(*root));
750 }
751 spin_unlock_irqrestore(&iommu->lock, flags);
752 return &context[devfn];
753}
754
755static int device_context_mapped(struct intel_iommu *iommu, u8 bus, u8 devfn)
756{
757 struct root_entry *root;
758 struct context_entry *context;
759 int ret;
760 unsigned long flags;
761
762 spin_lock_irqsave(&iommu->lock, flags);
763 root = &iommu->root_entry[bus];
764 context = get_context_addr_from_root(root);
765 if (!context) {
766 ret = 0;
767 goto out;
768 }
Mark McLoughlinc07e7d22008-11-21 16:54:46 +0000769 ret = context_present(&context[devfn]);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700770out:
771 spin_unlock_irqrestore(&iommu->lock, flags);
772 return ret;
773}
774
775static void clear_context_table(struct intel_iommu *iommu, u8 bus, u8 devfn)
776{
777 struct root_entry *root;
778 struct context_entry *context;
779 unsigned long flags;
780
781 spin_lock_irqsave(&iommu->lock, flags);
782 root = &iommu->root_entry[bus];
783 context = get_context_addr_from_root(root);
784 if (context) {
Mark McLoughlinc07e7d22008-11-21 16:54:46 +0000785 context_clear_entry(&context[devfn]);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700786 __iommu_flush_cache(iommu, &context[devfn], \
787 sizeof(*context));
788 }
789 spin_unlock_irqrestore(&iommu->lock, flags);
790}
791
792static void free_context_table(struct intel_iommu *iommu)
793{
794 struct root_entry *root;
795 int i;
796 unsigned long flags;
797 struct context_entry *context;
798
799 spin_lock_irqsave(&iommu->lock, flags);
800 if (!iommu->root_entry) {
801 goto out;
802 }
803 for (i = 0; i < ROOT_ENTRY_NR; i++) {
804 root = &iommu->root_entry[i];
805 context = get_context_addr_from_root(root);
806 if (context)
807 free_pgtable_page(context);
808 }
809 free_pgtable_page(iommu->root_entry);
810 iommu->root_entry = NULL;
811out:
812 spin_unlock_irqrestore(&iommu->lock, flags);
813}
814
David Woodhouseb026fd22009-06-28 10:37:25 +0100815static struct dma_pte *pfn_to_dma_pte(struct dmar_domain *domain,
David Woodhouse5cf0a762014-03-19 16:07:49 +0000816 unsigned long pfn, int *target_level)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700817{
David Woodhouseb026fd22009-06-28 10:37:25 +0100818 int addr_width = agaw_to_width(domain->agaw) - VTD_PAGE_SHIFT;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700819 struct dma_pte *parent, *pte = NULL;
820 int level = agaw_to_level(domain->agaw);
Allen Kay4399c8b2011-10-14 12:32:46 -0700821 int offset;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700822
823 BUG_ON(!domain->pgd);
Julian Stecklinaf9423602013-10-09 10:03:52 +0200824
825 if (addr_width < BITS_PER_LONG && pfn >> addr_width)
826 /* Address beyond IOMMU's addressing capabilities. */
827 return NULL;
828
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700829 parent = domain->pgd;
830
David Woodhouse5cf0a762014-03-19 16:07:49 +0000831 while (1) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700832 void *tmp_page;
833
David Woodhouseb026fd22009-06-28 10:37:25 +0100834 offset = pfn_level_offset(pfn, level);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700835 pte = &parent[offset];
David Woodhouse5cf0a762014-03-19 16:07:49 +0000836 if (!*target_level && (dma_pte_superpage(pte) || !dma_pte_present(pte)))
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100837 break;
David Woodhouse5cf0a762014-03-19 16:07:49 +0000838 if (level == *target_level)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700839 break;
840
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000841 if (!dma_pte_present(pte)) {
David Woodhousec85994e2009-07-01 19:21:24 +0100842 uint64_t pteval;
843
Suresh Siddha4c923d42009-10-02 11:01:24 -0700844 tmp_page = alloc_pgtable_page(domain->nid);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700845
David Woodhouse206a73c12009-07-01 19:30:28 +0100846 if (!tmp_page)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700847 return NULL;
David Woodhouse206a73c12009-07-01 19:30:28 +0100848
David Woodhousec85994e2009-07-01 19:21:24 +0100849 domain_flush_cache(domain, tmp_page, VTD_PAGE_SIZE);
Benjamin LaHaise64de5af2009-09-16 21:05:55 -0400850 pteval = ((uint64_t)virt_to_dma_pfn(tmp_page) << VTD_PAGE_SHIFT) | DMA_PTE_READ | DMA_PTE_WRITE;
David Woodhousec85994e2009-07-01 19:21:24 +0100851 if (cmpxchg64(&pte->val, 0ULL, pteval)) {
852 /* Someone else set it while we were thinking; use theirs. */
853 free_pgtable_page(tmp_page);
854 } else {
855 dma_pte_addr(pte);
856 domain_flush_cache(domain, pte, sizeof(*pte));
857 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700858 }
David Woodhouse5cf0a762014-03-19 16:07:49 +0000859 if (level == 1)
860 break;
861
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000862 parent = phys_to_virt(dma_pte_addr(pte));
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700863 level--;
864 }
865
David Woodhouse5cf0a762014-03-19 16:07:49 +0000866 if (!*target_level)
867 *target_level = level;
868
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700869 return pte;
870}
871
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100872
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700873/* return address's pte at specific level */
David Woodhouse90dcfb52009-06-27 17:14:59 +0100874static struct dma_pte *dma_pfn_level_pte(struct dmar_domain *domain,
875 unsigned long pfn,
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100876 int level, int *large_page)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700877{
878 struct dma_pte *parent, *pte = NULL;
879 int total = agaw_to_level(domain->agaw);
880 int offset;
881
882 parent = domain->pgd;
883 while (level <= total) {
David Woodhouse90dcfb52009-06-27 17:14:59 +0100884 offset = pfn_level_offset(pfn, total);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700885 pte = &parent[offset];
886 if (level == total)
887 return pte;
888
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100889 if (!dma_pte_present(pte)) {
890 *large_page = total;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700891 break;
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100892 }
893
894 if (pte->val & DMA_PTE_LARGE_PAGE) {
895 *large_page = total;
896 return pte;
897 }
898
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000899 parent = phys_to_virt(dma_pte_addr(pte));
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700900 total--;
901 }
902 return NULL;
903}
904
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700905/* clear last level pte, a tlb flush should be followed */
David Woodhouse5cf0a762014-03-19 16:07:49 +0000906static void dma_pte_clear_range(struct dmar_domain *domain,
David Woodhouse595badf2009-06-27 22:09:11 +0100907 unsigned long start_pfn,
908 unsigned long last_pfn)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700909{
David Woodhouse04b18e62009-06-27 19:15:01 +0100910 int addr_width = agaw_to_width(domain->agaw) - VTD_PAGE_SHIFT;
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100911 unsigned int large_page = 1;
David Woodhouse310a5ab2009-06-28 18:52:20 +0100912 struct dma_pte *first_pte, *pte;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700913
David Woodhouse04b18e62009-06-27 19:15:01 +0100914 BUG_ON(addr_width < BITS_PER_LONG && start_pfn >> addr_width);
David Woodhouse595badf2009-06-27 22:09:11 +0100915 BUG_ON(addr_width < BITS_PER_LONG && last_pfn >> addr_width);
David Woodhouse59c36282009-09-19 07:36:28 -0700916 BUG_ON(start_pfn > last_pfn);
David Woodhouse66eae842009-06-27 19:00:32 +0100917
David Woodhouse04b18e62009-06-27 19:15:01 +0100918 /* we don't need lock here; nobody else touches the iova range */
David Woodhouse59c36282009-09-19 07:36:28 -0700919 do {
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100920 large_page = 1;
921 first_pte = pte = dma_pfn_level_pte(domain, start_pfn, 1, &large_page);
David Woodhouse310a5ab2009-06-28 18:52:20 +0100922 if (!pte) {
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100923 start_pfn = align_to_level(start_pfn + 1, large_page + 1);
David Woodhouse310a5ab2009-06-28 18:52:20 +0100924 continue;
925 }
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100926 do {
David Woodhouse310a5ab2009-06-28 18:52:20 +0100927 dma_clear_pte(pte);
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100928 start_pfn += lvl_to_nr_pages(large_page);
David Woodhouse310a5ab2009-06-28 18:52:20 +0100929 pte++;
David Woodhouse75e6bf92009-07-02 11:21:16 +0100930 } while (start_pfn <= last_pfn && !first_pte_in_page(pte));
931
David Woodhouse310a5ab2009-06-28 18:52:20 +0100932 domain_flush_cache(domain, first_pte,
933 (void *)pte - (void *)first_pte);
David Woodhouse59c36282009-09-19 07:36:28 -0700934
935 } while (start_pfn && start_pfn <= last_pfn);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700936}
937
Alex Williamson3269ee02013-06-15 10:27:19 -0600938static void dma_pte_free_level(struct dmar_domain *domain, int level,
939 struct dma_pte *pte, unsigned long pfn,
940 unsigned long start_pfn, unsigned long last_pfn)
941{
942 pfn = max(start_pfn, pfn);
943 pte = &pte[pfn_level_offset(pfn, level)];
944
945 do {
946 unsigned long level_pfn;
947 struct dma_pte *level_pte;
948
949 if (!dma_pte_present(pte) || dma_pte_superpage(pte))
950 goto next;
951
952 level_pfn = pfn & level_mask(level - 1);
953 level_pte = phys_to_virt(dma_pte_addr(pte));
954
955 if (level > 2)
956 dma_pte_free_level(domain, level - 1, level_pte,
957 level_pfn, start_pfn, last_pfn);
958
959 /* If range covers entire pagetable, free it */
960 if (!(start_pfn > level_pfn ||
Alex Williamson08336fd2014-01-21 15:48:18 -0800961 last_pfn < level_pfn + level_size(level) - 1)) {
Alex Williamson3269ee02013-06-15 10:27:19 -0600962 dma_clear_pte(pte);
963 domain_flush_cache(domain, pte, sizeof(*pte));
964 free_pgtable_page(level_pte);
965 }
966next:
967 pfn += level_size(level);
968 } while (!first_pte_in_page(++pte) && pfn <= last_pfn);
969}
970
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700971/* free page table pages. last level pte should already be cleared */
972static void dma_pte_free_pagetable(struct dmar_domain *domain,
David Woodhoused794dc92009-06-28 00:27:49 +0100973 unsigned long start_pfn,
974 unsigned long last_pfn)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700975{
David Woodhouse6660c632009-06-27 22:41:00 +0100976 int addr_width = agaw_to_width(domain->agaw) - VTD_PAGE_SHIFT;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700977
David Woodhouse6660c632009-06-27 22:41:00 +0100978 BUG_ON(addr_width < BITS_PER_LONG && start_pfn >> addr_width);
979 BUG_ON(addr_width < BITS_PER_LONG && last_pfn >> addr_width);
David Woodhouse59c36282009-09-19 07:36:28 -0700980 BUG_ON(start_pfn > last_pfn);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700981
David Woodhousef3a0a522009-06-30 03:40:07 +0100982 /* We don't need lock here; nobody else touches the iova range */
Alex Williamson3269ee02013-06-15 10:27:19 -0600983 dma_pte_free_level(domain, agaw_to_level(domain->agaw),
984 domain->pgd, 0, start_pfn, last_pfn);
David Woodhouse6660c632009-06-27 22:41:00 +0100985
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700986 /* free pgd */
David Woodhoused794dc92009-06-28 00:27:49 +0100987 if (start_pfn == 0 && last_pfn == DOMAIN_MAX_PFN(domain->gaw)) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700988 free_pgtable_page(domain->pgd);
989 domain->pgd = NULL;
990 }
991}
992
David Woodhouseea8ea462014-03-05 17:09:32 +0000993/* When a page at a given level is being unlinked from its parent, we don't
994 need to *modify* it at all. All we need to do is make a list of all the
995 pages which can be freed just as soon as we've flushed the IOTLB and we
996 know the hardware page-walk will no longer touch them.
997 The 'pte' argument is the *parent* PTE, pointing to the page that is to
998 be freed. */
999static struct page *dma_pte_list_pagetables(struct dmar_domain *domain,
1000 int level, struct dma_pte *pte,
1001 struct page *freelist)
1002{
1003 struct page *pg;
1004
1005 pg = pfn_to_page(dma_pte_addr(pte) >> PAGE_SHIFT);
1006 pg->freelist = freelist;
1007 freelist = pg;
1008
1009 if (level == 1)
1010 return freelist;
1011
Jiang Liuadeb2592014-04-09 10:20:39 +08001012 pte = page_address(pg);
1013 do {
David Woodhouseea8ea462014-03-05 17:09:32 +00001014 if (dma_pte_present(pte) && !dma_pte_superpage(pte))
1015 freelist = dma_pte_list_pagetables(domain, level - 1,
1016 pte, freelist);
Jiang Liuadeb2592014-04-09 10:20:39 +08001017 pte++;
1018 } while (!first_pte_in_page(pte));
David Woodhouseea8ea462014-03-05 17:09:32 +00001019
1020 return freelist;
1021}
1022
1023static struct page *dma_pte_clear_level(struct dmar_domain *domain, int level,
1024 struct dma_pte *pte, unsigned long pfn,
1025 unsigned long start_pfn,
1026 unsigned long last_pfn,
1027 struct page *freelist)
1028{
1029 struct dma_pte *first_pte = NULL, *last_pte = NULL;
1030
1031 pfn = max(start_pfn, pfn);
1032 pte = &pte[pfn_level_offset(pfn, level)];
1033
1034 do {
1035 unsigned long level_pfn;
1036
1037 if (!dma_pte_present(pte))
1038 goto next;
1039
1040 level_pfn = pfn & level_mask(level);
1041
1042 /* If range covers entire pagetable, free it */
1043 if (start_pfn <= level_pfn &&
1044 last_pfn >= level_pfn + level_size(level) - 1) {
1045 /* These suborbinate page tables are going away entirely. Don't
1046 bother to clear them; we're just going to *free* them. */
1047 if (level > 1 && !dma_pte_superpage(pte))
1048 freelist = dma_pte_list_pagetables(domain, level - 1, pte, freelist);
1049
1050 dma_clear_pte(pte);
1051 if (!first_pte)
1052 first_pte = pte;
1053 last_pte = pte;
1054 } else if (level > 1) {
1055 /* Recurse down into a level that isn't *entirely* obsolete */
1056 freelist = dma_pte_clear_level(domain, level - 1,
1057 phys_to_virt(dma_pte_addr(pte)),
1058 level_pfn, start_pfn, last_pfn,
1059 freelist);
1060 }
1061next:
1062 pfn += level_size(level);
1063 } while (!first_pte_in_page(++pte) && pfn <= last_pfn);
1064
1065 if (first_pte)
1066 domain_flush_cache(domain, first_pte,
1067 (void *)++last_pte - (void *)first_pte);
1068
1069 return freelist;
1070}
1071
1072/* We can't just free the pages because the IOMMU may still be walking
1073 the page tables, and may have cached the intermediate levels. The
1074 pages can only be freed after the IOTLB flush has been done. */
1075struct page *domain_unmap(struct dmar_domain *domain,
1076 unsigned long start_pfn,
1077 unsigned long last_pfn)
1078{
1079 int addr_width = agaw_to_width(domain->agaw) - VTD_PAGE_SHIFT;
1080 struct page *freelist = NULL;
1081
1082 BUG_ON(addr_width < BITS_PER_LONG && start_pfn >> addr_width);
1083 BUG_ON(addr_width < BITS_PER_LONG && last_pfn >> addr_width);
1084 BUG_ON(start_pfn > last_pfn);
1085
1086 /* we don't need lock here; nobody else touches the iova range */
1087 freelist = dma_pte_clear_level(domain, agaw_to_level(domain->agaw),
1088 domain->pgd, 0, start_pfn, last_pfn, NULL);
1089
1090 /* free pgd */
1091 if (start_pfn == 0 && last_pfn == DOMAIN_MAX_PFN(domain->gaw)) {
1092 struct page *pgd_page = virt_to_page(domain->pgd);
1093 pgd_page->freelist = freelist;
1094 freelist = pgd_page;
1095
1096 domain->pgd = NULL;
1097 }
1098
1099 return freelist;
1100}
1101
1102void dma_free_pagelist(struct page *freelist)
1103{
1104 struct page *pg;
1105
1106 while ((pg = freelist)) {
1107 freelist = pg->freelist;
1108 free_pgtable_page(page_address(pg));
1109 }
1110}
1111
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001112/* iommu handling */
1113static int iommu_alloc_root_entry(struct intel_iommu *iommu)
1114{
1115 struct root_entry *root;
1116 unsigned long flags;
1117
Suresh Siddha4c923d42009-10-02 11:01:24 -07001118 root = (struct root_entry *)alloc_pgtable_page(iommu->node);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001119 if (!root)
1120 return -ENOMEM;
1121
Fenghua Yu5b6985c2008-10-16 18:02:32 -07001122 __iommu_flush_cache(iommu, root, ROOT_SIZE);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001123
1124 spin_lock_irqsave(&iommu->lock, flags);
1125 iommu->root_entry = root;
1126 spin_unlock_irqrestore(&iommu->lock, flags);
1127
1128 return 0;
1129}
1130
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001131static void iommu_set_root_entry(struct intel_iommu *iommu)
1132{
1133 void *addr;
David Woodhousec416daa2009-05-10 20:30:58 +01001134 u32 sts;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001135 unsigned long flag;
1136
1137 addr = iommu->root_entry;
1138
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001139 raw_spin_lock_irqsave(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001140 dmar_writeq(iommu->reg + DMAR_RTADDR_REG, virt_to_phys(addr));
1141
David Woodhousec416daa2009-05-10 20:30:58 +01001142 writel(iommu->gcmd | DMA_GCMD_SRTP, iommu->reg + DMAR_GCMD_REG);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001143
1144 /* Make sure hardware complete it */
1145 IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG,
David Woodhousec416daa2009-05-10 20:30:58 +01001146 readl, (sts & DMA_GSTS_RTPS), sts);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001147
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001148 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001149}
1150
1151static void iommu_flush_write_buffer(struct intel_iommu *iommu)
1152{
1153 u32 val;
1154 unsigned long flag;
1155
David Woodhouse9af88142009-02-13 23:18:03 +00001156 if (!rwbf_quirk && !cap_rwbf(iommu->cap))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001157 return;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001158
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001159 raw_spin_lock_irqsave(&iommu->register_lock, flag);
David Woodhouse462b60f2009-05-10 20:18:18 +01001160 writel(iommu->gcmd | DMA_GCMD_WBF, iommu->reg + DMAR_GCMD_REG);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001161
1162 /* Make sure hardware complete it */
1163 IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG,
David Woodhousec416daa2009-05-10 20:30:58 +01001164 readl, (!(val & DMA_GSTS_WBFS)), val);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001165
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001166 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001167}
1168
1169/* return value determine if we need a write buffer flush */
David Woodhouse4c25a2c2009-05-10 17:16:06 +01001170static void __iommu_flush_context(struct intel_iommu *iommu,
1171 u16 did, u16 source_id, u8 function_mask,
1172 u64 type)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001173{
1174 u64 val = 0;
1175 unsigned long flag;
1176
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001177 switch (type) {
1178 case DMA_CCMD_GLOBAL_INVL:
1179 val = DMA_CCMD_GLOBAL_INVL;
1180 break;
1181 case DMA_CCMD_DOMAIN_INVL:
1182 val = DMA_CCMD_DOMAIN_INVL|DMA_CCMD_DID(did);
1183 break;
1184 case DMA_CCMD_DEVICE_INVL:
1185 val = DMA_CCMD_DEVICE_INVL|DMA_CCMD_DID(did)
1186 | DMA_CCMD_SID(source_id) | DMA_CCMD_FM(function_mask);
1187 break;
1188 default:
1189 BUG();
1190 }
1191 val |= DMA_CCMD_ICC;
1192
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001193 raw_spin_lock_irqsave(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001194 dmar_writeq(iommu->reg + DMAR_CCMD_REG, val);
1195
1196 /* Make sure hardware complete it */
1197 IOMMU_WAIT_OP(iommu, DMAR_CCMD_REG,
1198 dmar_readq, (!(val & DMA_CCMD_ICC)), val);
1199
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001200 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001201}
1202
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001203/* return value determine if we need a write buffer flush */
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01001204static void __iommu_flush_iotlb(struct intel_iommu *iommu, u16 did,
1205 u64 addr, unsigned int size_order, u64 type)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001206{
1207 int tlb_offset = ecap_iotlb_offset(iommu->ecap);
1208 u64 val = 0, val_iva = 0;
1209 unsigned long flag;
1210
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001211 switch (type) {
1212 case DMA_TLB_GLOBAL_FLUSH:
1213 /* global flush doesn't need set IVA_REG */
1214 val = DMA_TLB_GLOBAL_FLUSH|DMA_TLB_IVT;
1215 break;
1216 case DMA_TLB_DSI_FLUSH:
1217 val = DMA_TLB_DSI_FLUSH|DMA_TLB_IVT|DMA_TLB_DID(did);
1218 break;
1219 case DMA_TLB_PSI_FLUSH:
1220 val = DMA_TLB_PSI_FLUSH|DMA_TLB_IVT|DMA_TLB_DID(did);
David Woodhouseea8ea462014-03-05 17:09:32 +00001221 /* IH bit is passed in as part of address */
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001222 val_iva = size_order | addr;
1223 break;
1224 default:
1225 BUG();
1226 }
1227 /* Note: set drain read/write */
1228#if 0
1229 /*
1230 * This is probably to be super secure.. Looks like we can
1231 * ignore it without any impact.
1232 */
1233 if (cap_read_drain(iommu->cap))
1234 val |= DMA_TLB_READ_DRAIN;
1235#endif
1236 if (cap_write_drain(iommu->cap))
1237 val |= DMA_TLB_WRITE_DRAIN;
1238
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001239 raw_spin_lock_irqsave(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001240 /* Note: Only uses first TLB reg currently */
1241 if (val_iva)
1242 dmar_writeq(iommu->reg + tlb_offset, val_iva);
1243 dmar_writeq(iommu->reg + tlb_offset + 8, val);
1244
1245 /* Make sure hardware complete it */
1246 IOMMU_WAIT_OP(iommu, tlb_offset + 8,
1247 dmar_readq, (!(val & DMA_TLB_IVT)), val);
1248
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001249 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001250
1251 /* check IOTLB invalidation granularity */
1252 if (DMA_TLB_IAIG(val) == 0)
1253 printk(KERN_ERR"IOMMU: flush IOTLB failed\n");
1254 if (DMA_TLB_IAIG(val) != DMA_TLB_IIRG(type))
1255 pr_debug("IOMMU: tlb flush request %Lx, actual %Lx\n",
Fenghua Yu5b6985c2008-10-16 18:02:32 -07001256 (unsigned long long)DMA_TLB_IIRG(type),
1257 (unsigned long long)DMA_TLB_IAIG(val));
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001258}
1259
David Woodhouse64ae8922014-03-09 12:52:30 -07001260static struct device_domain_info *
1261iommu_support_dev_iotlb (struct dmar_domain *domain, struct intel_iommu *iommu,
1262 u8 bus, u8 devfn)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001263{
Yu Zhao93a23a72009-05-18 13:51:37 +08001264 int found = 0;
1265 unsigned long flags;
1266 struct device_domain_info *info;
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001267 struct pci_dev *pdev;
Yu Zhao93a23a72009-05-18 13:51:37 +08001268
1269 if (!ecap_dev_iotlb_support(iommu->ecap))
1270 return NULL;
1271
1272 if (!iommu->qi)
1273 return NULL;
1274
1275 spin_lock_irqsave(&device_domain_lock, flags);
1276 list_for_each_entry(info, &domain->devices, link)
1277 if (info->bus == bus && info->devfn == devfn) {
1278 found = 1;
1279 break;
1280 }
1281 spin_unlock_irqrestore(&device_domain_lock, flags);
1282
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001283 if (!found || !info->dev || !dev_is_pci(info->dev))
Yu Zhao93a23a72009-05-18 13:51:37 +08001284 return NULL;
1285
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001286 pdev = to_pci_dev(info->dev);
1287
1288 if (!pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_ATS))
Yu Zhao93a23a72009-05-18 13:51:37 +08001289 return NULL;
1290
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001291 if (!dmar_find_matched_atsr_unit(pdev))
Yu Zhao93a23a72009-05-18 13:51:37 +08001292 return NULL;
1293
Yu Zhao93a23a72009-05-18 13:51:37 +08001294 return info;
1295}
1296
1297static void iommu_enable_dev_iotlb(struct device_domain_info *info)
1298{
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001299 if (!info || !dev_is_pci(info->dev))
Yu Zhao93a23a72009-05-18 13:51:37 +08001300 return;
1301
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001302 pci_enable_ats(to_pci_dev(info->dev), VTD_PAGE_SHIFT);
Yu Zhao93a23a72009-05-18 13:51:37 +08001303}
1304
1305static void iommu_disable_dev_iotlb(struct device_domain_info *info)
1306{
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001307 if (!info->dev || !dev_is_pci(info->dev) ||
1308 !pci_ats_enabled(to_pci_dev(info->dev)))
Yu Zhao93a23a72009-05-18 13:51:37 +08001309 return;
1310
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001311 pci_disable_ats(to_pci_dev(info->dev));
Yu Zhao93a23a72009-05-18 13:51:37 +08001312}
1313
1314static void iommu_flush_dev_iotlb(struct dmar_domain *domain,
1315 u64 addr, unsigned mask)
1316{
1317 u16 sid, qdep;
1318 unsigned long flags;
1319 struct device_domain_info *info;
1320
1321 spin_lock_irqsave(&device_domain_lock, flags);
1322 list_for_each_entry(info, &domain->devices, link) {
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001323 struct pci_dev *pdev;
1324 if (!info->dev || !dev_is_pci(info->dev))
1325 continue;
1326
1327 pdev = to_pci_dev(info->dev);
1328 if (!pci_ats_enabled(pdev))
Yu Zhao93a23a72009-05-18 13:51:37 +08001329 continue;
1330
1331 sid = info->bus << 8 | info->devfn;
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001332 qdep = pci_ats_queue_depth(pdev);
Yu Zhao93a23a72009-05-18 13:51:37 +08001333 qi_flush_dev_iotlb(info->iommu, sid, qdep, addr, mask);
1334 }
1335 spin_unlock_irqrestore(&device_domain_lock, flags);
1336}
1337
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01001338static void iommu_flush_iotlb_psi(struct intel_iommu *iommu, u16 did,
David Woodhouseea8ea462014-03-05 17:09:32 +00001339 unsigned long pfn, unsigned int pages, int ih, int map)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001340{
Yu Zhao9dd2fe82009-05-18 13:51:36 +08001341 unsigned int mask = ilog2(__roundup_pow_of_two(pages));
David Woodhouse03d6a242009-06-28 15:33:46 +01001342 uint64_t addr = (uint64_t)pfn << VTD_PAGE_SHIFT;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001343
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001344 BUG_ON(pages == 0);
1345
David Woodhouseea8ea462014-03-05 17:09:32 +00001346 if (ih)
1347 ih = 1 << 6;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001348 /*
Yu Zhao9dd2fe82009-05-18 13:51:36 +08001349 * Fallback to domain selective flush if no PSI support or the size is
1350 * too big.
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001351 * PSI requires page size to be 2 ^ x, and the base address is naturally
1352 * aligned to the size
1353 */
Yu Zhao9dd2fe82009-05-18 13:51:36 +08001354 if (!cap_pgsel_inv(iommu->cap) || mask > cap_max_amask_val(iommu->cap))
1355 iommu->flush.flush_iotlb(iommu, did, 0, 0,
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01001356 DMA_TLB_DSI_FLUSH);
Yu Zhao9dd2fe82009-05-18 13:51:36 +08001357 else
David Woodhouseea8ea462014-03-05 17:09:32 +00001358 iommu->flush.flush_iotlb(iommu, did, addr | ih, mask,
Yu Zhao9dd2fe82009-05-18 13:51:36 +08001359 DMA_TLB_PSI_FLUSH);
Yu Zhaobf92df32009-06-29 11:31:45 +08001360
1361 /*
Nadav Amit82653632010-04-01 13:24:40 +03001362 * In caching mode, changes of pages from non-present to present require
1363 * flush. However, device IOTLB doesn't need to be flushed in this case.
Yu Zhaobf92df32009-06-29 11:31:45 +08001364 */
Nadav Amit82653632010-04-01 13:24:40 +03001365 if (!cap_caching_mode(iommu->cap) || !map)
Yu Zhao93a23a72009-05-18 13:51:37 +08001366 iommu_flush_dev_iotlb(iommu->domains[did], addr, mask);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001367}
1368
mark grossf8bab732008-02-08 04:18:38 -08001369static void iommu_disable_protect_mem_regions(struct intel_iommu *iommu)
1370{
1371 u32 pmen;
1372 unsigned long flags;
1373
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001374 raw_spin_lock_irqsave(&iommu->register_lock, flags);
mark grossf8bab732008-02-08 04:18:38 -08001375 pmen = readl(iommu->reg + DMAR_PMEN_REG);
1376 pmen &= ~DMA_PMEN_EPM;
1377 writel(pmen, iommu->reg + DMAR_PMEN_REG);
1378
1379 /* wait for the protected region status bit to clear */
1380 IOMMU_WAIT_OP(iommu, DMAR_PMEN_REG,
1381 readl, !(pmen & DMA_PMEN_PRS), pmen);
1382
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001383 raw_spin_unlock_irqrestore(&iommu->register_lock, flags);
mark grossf8bab732008-02-08 04:18:38 -08001384}
1385
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001386static int iommu_enable_translation(struct intel_iommu *iommu)
1387{
1388 u32 sts;
1389 unsigned long flags;
1390
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001391 raw_spin_lock_irqsave(&iommu->register_lock, flags);
David Woodhousec416daa2009-05-10 20:30:58 +01001392 iommu->gcmd |= DMA_GCMD_TE;
1393 writel(iommu->gcmd, iommu->reg + DMAR_GCMD_REG);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001394
1395 /* Make sure hardware complete it */
1396 IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG,
David Woodhousec416daa2009-05-10 20:30:58 +01001397 readl, (sts & DMA_GSTS_TES), sts);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001398
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001399 raw_spin_unlock_irqrestore(&iommu->register_lock, flags);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001400 return 0;
1401}
1402
1403static int iommu_disable_translation(struct intel_iommu *iommu)
1404{
1405 u32 sts;
1406 unsigned long flag;
1407
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001408 raw_spin_lock_irqsave(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001409 iommu->gcmd &= ~DMA_GCMD_TE;
1410 writel(iommu->gcmd, iommu->reg + DMAR_GCMD_REG);
1411
1412 /* Make sure hardware complete it */
1413 IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG,
David Woodhousec416daa2009-05-10 20:30:58 +01001414 readl, (!(sts & DMA_GSTS_TES)), sts);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001415
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001416 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001417 return 0;
1418}
1419
Keshavamurthy, Anil S3460a6d2007-10-21 16:41:54 -07001420
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001421static int iommu_init_domains(struct intel_iommu *iommu)
1422{
1423 unsigned long ndomains;
1424 unsigned long nlongs;
1425
1426 ndomains = cap_ndoms(iommu->cap);
Jiang Liu852bdb02014-01-06 14:18:11 +08001427 pr_debug("IOMMU%d: Number of Domains supported <%ld>\n",
1428 iommu->seq_id, ndomains);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001429 nlongs = BITS_TO_LONGS(ndomains);
1430
Donald Dutile94a91b52009-08-20 16:51:34 -04001431 spin_lock_init(&iommu->lock);
1432
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001433 /* TBD: there might be 64K domains,
1434 * consider other allocation for future chip
1435 */
1436 iommu->domain_ids = kcalloc(nlongs, sizeof(unsigned long), GFP_KERNEL);
1437 if (!iommu->domain_ids) {
Jiang Liu852bdb02014-01-06 14:18:11 +08001438 pr_err("IOMMU%d: allocating domain id array failed\n",
1439 iommu->seq_id);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001440 return -ENOMEM;
1441 }
1442 iommu->domains = kcalloc(ndomains, sizeof(struct dmar_domain *),
1443 GFP_KERNEL);
1444 if (!iommu->domains) {
Jiang Liu852bdb02014-01-06 14:18:11 +08001445 pr_err("IOMMU%d: allocating domain array failed\n",
1446 iommu->seq_id);
1447 kfree(iommu->domain_ids);
1448 iommu->domain_ids = NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001449 return -ENOMEM;
1450 }
1451
1452 /*
1453 * if Caching mode is set, then invalid translations are tagged
1454 * with domainid 0. Hence we need to pre-allocate it.
1455 */
1456 if (cap_caching_mode(iommu->cap))
1457 set_bit(0, iommu->domain_ids);
1458 return 0;
1459}
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001460
Jiang Liua868e6b2014-01-06 14:18:20 +08001461static void free_dmar_iommu(struct intel_iommu *iommu)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001462{
1463 struct dmar_domain *domain;
Jiang Liu5ced12a2014-01-06 14:18:22 +08001464 int i, count;
Weidong Hanc7151a82008-12-08 22:51:37 +08001465 unsigned long flags;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001466
Donald Dutile94a91b52009-08-20 16:51:34 -04001467 if ((iommu->domains) && (iommu->domain_ids)) {
Akinobu Mitaa45946a2010-03-11 14:04:08 -08001468 for_each_set_bit(i, iommu->domain_ids, cap_ndoms(iommu->cap)) {
Jiang Liua4eaa862014-02-19 14:07:30 +08001469 /*
1470 * Domain id 0 is reserved for invalid translation
1471 * if hardware supports caching mode.
1472 */
1473 if (cap_caching_mode(iommu->cap) && i == 0)
1474 continue;
1475
Donald Dutile94a91b52009-08-20 16:51:34 -04001476 domain = iommu->domains[i];
1477 clear_bit(i, iommu->domain_ids);
Weidong Hanc7151a82008-12-08 22:51:37 +08001478
Donald Dutile94a91b52009-08-20 16:51:34 -04001479 spin_lock_irqsave(&domain->iommu_lock, flags);
Jiang Liu5ced12a2014-01-06 14:18:22 +08001480 count = --domain->iommu_count;
1481 spin_unlock_irqrestore(&domain->iommu_lock, flags);
Jiang Liu92d03cc2014-02-19 14:07:28 +08001482 if (count == 0)
1483 domain_exit(domain);
Weidong Han5e98c4b2008-12-08 23:03:27 +08001484 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001485 }
1486
1487 if (iommu->gcmd & DMA_GCMD_TE)
1488 iommu_disable_translation(iommu);
1489
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001490 kfree(iommu->domains);
1491 kfree(iommu->domain_ids);
Jiang Liua868e6b2014-01-06 14:18:20 +08001492 iommu->domains = NULL;
1493 iommu->domain_ids = NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001494
Weidong Hand9630fe2008-12-08 11:06:32 +08001495 g_iommus[iommu->seq_id] = NULL;
1496
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001497 /* free context mapping */
1498 free_context_table(iommu);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001499}
1500
Jiang Liu92d03cc2014-02-19 14:07:28 +08001501static struct dmar_domain *alloc_domain(bool vm)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001502{
Jiang Liu92d03cc2014-02-19 14:07:28 +08001503 /* domain id for virtual machine, it won't be set in context */
1504 static atomic_t vm_domid = ATOMIC_INIT(0);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001505 struct dmar_domain *domain;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001506
1507 domain = alloc_domain_mem();
1508 if (!domain)
1509 return NULL;
1510
Suresh Siddha4c923d42009-10-02 11:01:24 -07001511 domain->nid = -1;
Jiang Liu92d03cc2014-02-19 14:07:28 +08001512 domain->iommu_count = 0;
Mike Travis1b198bb2012-03-05 15:05:16 -08001513 memset(domain->iommu_bmp, 0, sizeof(domain->iommu_bmp));
Weidong Hand71a2f32008-12-07 21:13:41 +08001514 domain->flags = 0;
Jiang Liu92d03cc2014-02-19 14:07:28 +08001515 spin_lock_init(&domain->iommu_lock);
1516 INIT_LIST_HEAD(&domain->devices);
1517 if (vm) {
1518 domain->id = atomic_inc_return(&vm_domid);
1519 domain->flags = DOMAIN_FLAG_VIRTUAL_MACHINE;
1520 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001521
1522 return domain;
1523}
1524
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001525static int iommu_attach_domain(struct dmar_domain *domain,
1526 struct intel_iommu *iommu)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001527{
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001528 int num;
1529 unsigned long ndomains;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001530 unsigned long flags;
1531
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001532 ndomains = cap_ndoms(iommu->cap);
Weidong Han8c11e792008-12-08 15:29:22 +08001533
1534 spin_lock_irqsave(&iommu->lock, flags);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001535
1536 num = find_first_zero_bit(iommu->domain_ids, ndomains);
1537 if (num >= ndomains) {
1538 spin_unlock_irqrestore(&iommu->lock, flags);
1539 printk(KERN_ERR "IOMMU: no free domain ids\n");
1540 return -ENOMEM;
1541 }
1542
1543 domain->id = num;
Jiang Liu9ebd6822014-02-19 14:07:29 +08001544 domain->iommu_count++;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001545 set_bit(num, iommu->domain_ids);
Mike Travis1b198bb2012-03-05 15:05:16 -08001546 set_bit(iommu->seq_id, domain->iommu_bmp);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001547 iommu->domains[num] = domain;
1548 spin_unlock_irqrestore(&iommu->lock, flags);
1549
1550 return 0;
1551}
1552
1553static void iommu_detach_domain(struct dmar_domain *domain,
1554 struct intel_iommu *iommu)
1555{
1556 unsigned long flags;
1557 int num, ndomains;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001558
1559 spin_lock_irqsave(&iommu->lock, flags);
1560 ndomains = cap_ndoms(iommu->cap);
Akinobu Mitaa45946a2010-03-11 14:04:08 -08001561 for_each_set_bit(num, iommu->domain_ids, ndomains) {
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001562 if (iommu->domains[num] == domain) {
Jiang Liu92d03cc2014-02-19 14:07:28 +08001563 clear_bit(num, iommu->domain_ids);
1564 iommu->domains[num] = NULL;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001565 break;
1566 }
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001567 }
Weidong Han8c11e792008-12-08 15:29:22 +08001568 spin_unlock_irqrestore(&iommu->lock, flags);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001569}
1570
1571static struct iova_domain reserved_iova_list;
Mark Gross8a443df2008-03-04 14:59:31 -08001572static struct lock_class_key reserved_rbtree_key;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001573
Joseph Cihula51a63e62011-03-21 11:04:24 -07001574static int dmar_init_reserved_ranges(void)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001575{
1576 struct pci_dev *pdev = NULL;
1577 struct iova *iova;
1578 int i;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001579
David Millerf6611972008-02-06 01:36:23 -08001580 init_iova_domain(&reserved_iova_list, DMA_32BIT_PFN);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001581
Mark Gross8a443df2008-03-04 14:59:31 -08001582 lockdep_set_class(&reserved_iova_list.iova_rbtree_lock,
1583 &reserved_rbtree_key);
1584
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001585 /* IOAPIC ranges shouldn't be accessed by DMA */
1586 iova = reserve_iova(&reserved_iova_list, IOVA_PFN(IOAPIC_RANGE_START),
1587 IOVA_PFN(IOAPIC_RANGE_END));
Joseph Cihula51a63e62011-03-21 11:04:24 -07001588 if (!iova) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001589 printk(KERN_ERR "Reserve IOAPIC range failed\n");
Joseph Cihula51a63e62011-03-21 11:04:24 -07001590 return -ENODEV;
1591 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001592
1593 /* Reserve all PCI MMIO to avoid peer-to-peer access */
1594 for_each_pci_dev(pdev) {
1595 struct resource *r;
1596
1597 for (i = 0; i < PCI_NUM_RESOURCES; i++) {
1598 r = &pdev->resource[i];
1599 if (!r->flags || !(r->flags & IORESOURCE_MEM))
1600 continue;
David Woodhouse1a4a4552009-06-28 16:00:42 +01001601 iova = reserve_iova(&reserved_iova_list,
1602 IOVA_PFN(r->start),
1603 IOVA_PFN(r->end));
Joseph Cihula51a63e62011-03-21 11:04:24 -07001604 if (!iova) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001605 printk(KERN_ERR "Reserve iova failed\n");
Joseph Cihula51a63e62011-03-21 11:04:24 -07001606 return -ENODEV;
1607 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001608 }
1609 }
Joseph Cihula51a63e62011-03-21 11:04:24 -07001610 return 0;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001611}
1612
1613static void domain_reserve_special_ranges(struct dmar_domain *domain)
1614{
1615 copy_reserved_iova(&reserved_iova_list, &domain->iovad);
1616}
1617
1618static inline int guestwidth_to_adjustwidth(int gaw)
1619{
1620 int agaw;
1621 int r = (gaw - 12) % 9;
1622
1623 if (r == 0)
1624 agaw = gaw;
1625 else
1626 agaw = gaw + 9 - r;
1627 if (agaw > 64)
1628 agaw = 64;
1629 return agaw;
1630}
1631
1632static int domain_init(struct dmar_domain *domain, int guest_width)
1633{
1634 struct intel_iommu *iommu;
1635 int adjust_width, agaw;
1636 unsigned long sagaw;
1637
David Millerf6611972008-02-06 01:36:23 -08001638 init_iova_domain(&domain->iovad, DMA_32BIT_PFN);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001639 domain_reserve_special_ranges(domain);
1640
1641 /* calculate AGAW */
Weidong Han8c11e792008-12-08 15:29:22 +08001642 iommu = domain_get_iommu(domain);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001643 if (guest_width > cap_mgaw(iommu->cap))
1644 guest_width = cap_mgaw(iommu->cap);
1645 domain->gaw = guest_width;
1646 adjust_width = guestwidth_to_adjustwidth(guest_width);
1647 agaw = width_to_agaw(adjust_width);
1648 sagaw = cap_sagaw(iommu->cap);
1649 if (!test_bit(agaw, &sagaw)) {
1650 /* hardware doesn't support it, choose a bigger one */
1651 pr_debug("IOMMU: hardware doesn't support agaw %d\n", agaw);
1652 agaw = find_next_bit(&sagaw, 5, agaw);
1653 if (agaw >= 5)
1654 return -ENODEV;
1655 }
1656 domain->agaw = agaw;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001657
Weidong Han8e6040972008-12-08 15:49:06 +08001658 if (ecap_coherent(iommu->ecap))
1659 domain->iommu_coherency = 1;
1660 else
1661 domain->iommu_coherency = 0;
1662
Sheng Yang58c610b2009-03-18 15:33:05 +08001663 if (ecap_sc_support(iommu->ecap))
1664 domain->iommu_snooping = 1;
1665 else
1666 domain->iommu_snooping = 0;
1667
David Woodhouse214e39a2014-03-19 10:38:49 +00001668 if (intel_iommu_superpage)
1669 domain->iommu_superpage = fls(cap_super_page_val(iommu->cap));
1670 else
1671 domain->iommu_superpage = 0;
1672
Suresh Siddha4c923d42009-10-02 11:01:24 -07001673 domain->nid = iommu->node;
Weidong Hanc7151a82008-12-08 22:51:37 +08001674
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001675 /* always allocate the top pgd */
Suresh Siddha4c923d42009-10-02 11:01:24 -07001676 domain->pgd = (struct dma_pte *)alloc_pgtable_page(domain->nid);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001677 if (!domain->pgd)
1678 return -ENOMEM;
Fenghua Yu5b6985c2008-10-16 18:02:32 -07001679 __iommu_flush_cache(iommu, domain->pgd, PAGE_SIZE);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001680 return 0;
1681}
1682
1683static void domain_exit(struct dmar_domain *domain)
1684{
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001685 struct dmar_drhd_unit *drhd;
1686 struct intel_iommu *iommu;
David Woodhouseea8ea462014-03-05 17:09:32 +00001687 struct page *freelist = NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001688
1689 /* Domain 0 is reserved, so dont process it */
1690 if (!domain)
1691 return;
1692
Alex Williamson7b668352011-05-24 12:02:41 +01001693 /* Flush any lazy unmaps that may reference this domain */
1694 if (!intel_iommu_strict)
1695 flush_unmaps_timeout(0);
1696
Jiang Liu92d03cc2014-02-19 14:07:28 +08001697 /* remove associated devices */
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001698 domain_remove_dev_info(domain);
Jiang Liu92d03cc2014-02-19 14:07:28 +08001699
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001700 /* destroy iovas */
1701 put_iova_domain(&domain->iovad);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001702
David Woodhouseea8ea462014-03-05 17:09:32 +00001703 freelist = domain_unmap(domain, 0, DOMAIN_MAX_PFN(domain->gaw));
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001704
Jiang Liu92d03cc2014-02-19 14:07:28 +08001705 /* clear attached or cached domains */
Jiang Liu0e242612014-02-19 14:07:34 +08001706 rcu_read_lock();
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001707 for_each_active_iommu(iommu, drhd)
Jiang Liu92d03cc2014-02-19 14:07:28 +08001708 if (domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE ||
1709 test_bit(iommu->seq_id, domain->iommu_bmp))
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001710 iommu_detach_domain(domain, iommu);
Jiang Liu0e242612014-02-19 14:07:34 +08001711 rcu_read_unlock();
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001712
David Woodhouseea8ea462014-03-05 17:09:32 +00001713 dma_free_pagelist(freelist);
1714
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001715 free_domain_mem(domain);
1716}
1717
David Woodhouse64ae8922014-03-09 12:52:30 -07001718static int domain_context_mapping_one(struct dmar_domain *domain,
1719 struct intel_iommu *iommu,
1720 u8 bus, u8 devfn, int translation)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001721{
1722 struct context_entry *context;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001723 unsigned long flags;
Weidong Hanea6606b2008-12-08 23:08:15 +08001724 struct dma_pte *pgd;
1725 unsigned long num;
1726 unsigned long ndomains;
1727 int id;
1728 int agaw;
Yu Zhao93a23a72009-05-18 13:51:37 +08001729 struct device_domain_info *info = NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001730
1731 pr_debug("Set context mapping for %02x:%02x.%d\n",
1732 bus, PCI_SLOT(devfn), PCI_FUNC(devfn));
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001733
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001734 BUG_ON(!domain->pgd);
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001735 BUG_ON(translation != CONTEXT_TT_PASS_THROUGH &&
1736 translation != CONTEXT_TT_MULTI_LEVEL);
Weidong Han5331fe62008-12-08 23:00:00 +08001737
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001738 context = device_to_context_entry(iommu, bus, devfn);
1739 if (!context)
1740 return -ENOMEM;
1741 spin_lock_irqsave(&iommu->lock, flags);
Mark McLoughlinc07e7d22008-11-21 16:54:46 +00001742 if (context_present(context)) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001743 spin_unlock_irqrestore(&iommu->lock, flags);
1744 return 0;
1745 }
1746
Weidong Hanea6606b2008-12-08 23:08:15 +08001747 id = domain->id;
1748 pgd = domain->pgd;
1749
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001750 if (domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE ||
1751 domain->flags & DOMAIN_FLAG_STATIC_IDENTITY) {
Weidong Hanea6606b2008-12-08 23:08:15 +08001752 int found = 0;
1753
1754 /* find an available domain id for this device in iommu */
1755 ndomains = cap_ndoms(iommu->cap);
Akinobu Mitaa45946a2010-03-11 14:04:08 -08001756 for_each_set_bit(num, iommu->domain_ids, ndomains) {
Weidong Hanea6606b2008-12-08 23:08:15 +08001757 if (iommu->domains[num] == domain) {
1758 id = num;
1759 found = 1;
1760 break;
1761 }
Weidong Hanea6606b2008-12-08 23:08:15 +08001762 }
1763
1764 if (found == 0) {
1765 num = find_first_zero_bit(iommu->domain_ids, ndomains);
1766 if (num >= ndomains) {
1767 spin_unlock_irqrestore(&iommu->lock, flags);
1768 printk(KERN_ERR "IOMMU: no free domain ids\n");
1769 return -EFAULT;
1770 }
1771
1772 set_bit(num, iommu->domain_ids);
1773 iommu->domains[num] = domain;
1774 id = num;
1775 }
1776
1777 /* Skip top levels of page tables for
1778 * iommu which has less agaw than default.
Chris Wright1672af12009-12-02 12:06:34 -08001779 * Unnecessary for PT mode.
Weidong Hanea6606b2008-12-08 23:08:15 +08001780 */
Chris Wright1672af12009-12-02 12:06:34 -08001781 if (translation != CONTEXT_TT_PASS_THROUGH) {
1782 for (agaw = domain->agaw; agaw != iommu->agaw; agaw--) {
1783 pgd = phys_to_virt(dma_pte_addr(pgd));
1784 if (!dma_pte_present(pgd)) {
1785 spin_unlock_irqrestore(&iommu->lock, flags);
1786 return -ENOMEM;
1787 }
Weidong Hanea6606b2008-12-08 23:08:15 +08001788 }
1789 }
1790 }
1791
1792 context_set_domain_id(context, id);
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001793
Yu Zhao93a23a72009-05-18 13:51:37 +08001794 if (translation != CONTEXT_TT_PASS_THROUGH) {
David Woodhouse64ae8922014-03-09 12:52:30 -07001795 info = iommu_support_dev_iotlb(domain, iommu, bus, devfn);
Yu Zhao93a23a72009-05-18 13:51:37 +08001796 translation = info ? CONTEXT_TT_DEV_IOTLB :
1797 CONTEXT_TT_MULTI_LEVEL;
1798 }
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001799 /*
1800 * In pass through mode, AW must be programmed to indicate the largest
1801 * AGAW value supported by hardware. And ASR is ignored by hardware.
1802 */
Yu Zhao93a23a72009-05-18 13:51:37 +08001803 if (unlikely(translation == CONTEXT_TT_PASS_THROUGH))
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001804 context_set_address_width(context, iommu->msagaw);
Yu Zhao93a23a72009-05-18 13:51:37 +08001805 else {
1806 context_set_address_root(context, virt_to_phys(pgd));
1807 context_set_address_width(context, iommu->agaw);
1808 }
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001809
1810 context_set_translation_type(context, translation);
Mark McLoughlinc07e7d22008-11-21 16:54:46 +00001811 context_set_fault_enable(context);
1812 context_set_present(context);
Weidong Han5331fe62008-12-08 23:00:00 +08001813 domain_flush_cache(domain, context, sizeof(*context));
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001814
David Woodhouse4c25a2c2009-05-10 17:16:06 +01001815 /*
1816 * It's a non-present to present mapping. If hardware doesn't cache
1817 * non-present entry we only need to flush the write-buffer. If the
1818 * _does_ cache non-present entries, then it does so in the special
1819 * domain #0, which we have to flush:
1820 */
1821 if (cap_caching_mode(iommu->cap)) {
1822 iommu->flush.flush_context(iommu, 0,
1823 (((u16)bus) << 8) | devfn,
1824 DMA_CCMD_MASK_NOBIT,
1825 DMA_CCMD_DEVICE_INVL);
Nadav Amit82653632010-04-01 13:24:40 +03001826 iommu->flush.flush_iotlb(iommu, domain->id, 0, 0, DMA_TLB_DSI_FLUSH);
David Woodhouse4c25a2c2009-05-10 17:16:06 +01001827 } else {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001828 iommu_flush_write_buffer(iommu);
David Woodhouse4c25a2c2009-05-10 17:16:06 +01001829 }
Yu Zhao93a23a72009-05-18 13:51:37 +08001830 iommu_enable_dev_iotlb(info);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001831 spin_unlock_irqrestore(&iommu->lock, flags);
Weidong Hanc7151a82008-12-08 22:51:37 +08001832
1833 spin_lock_irqsave(&domain->iommu_lock, flags);
Mike Travis1b198bb2012-03-05 15:05:16 -08001834 if (!test_and_set_bit(iommu->seq_id, domain->iommu_bmp)) {
Weidong Hanc7151a82008-12-08 22:51:37 +08001835 domain->iommu_count++;
Suresh Siddha4c923d42009-10-02 11:01:24 -07001836 if (domain->iommu_count == 1)
1837 domain->nid = iommu->node;
Sheng Yang58c610b2009-03-18 15:33:05 +08001838 domain_update_iommu_cap(domain);
Weidong Hanc7151a82008-12-08 22:51:37 +08001839 }
1840 spin_unlock_irqrestore(&domain->iommu_lock, flags);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001841 return 0;
1842}
1843
1844static int
David Woodhousee1f167f2014-03-09 15:24:46 -07001845domain_context_mapping(struct dmar_domain *domain, struct device *dev,
1846 int translation)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001847{
1848 int ret;
David Woodhousee1f167f2014-03-09 15:24:46 -07001849 struct pci_dev *pdev, *tmp, *parent;
David Woodhouse64ae8922014-03-09 12:52:30 -07001850 struct intel_iommu *iommu;
David Woodhouse156baca2014-03-09 14:00:57 -07001851 u8 bus, devfn;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001852
David Woodhousee1f167f2014-03-09 15:24:46 -07001853 iommu = device_to_iommu(dev, &bus, &devfn);
David Woodhouse64ae8922014-03-09 12:52:30 -07001854 if (!iommu)
1855 return -ENODEV;
1856
David Woodhouse156baca2014-03-09 14:00:57 -07001857 ret = domain_context_mapping_one(domain, iommu, bus, devfn,
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001858 translation);
David Woodhousee1f167f2014-03-09 15:24:46 -07001859 if (ret || !dev_is_pci(dev))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001860 return ret;
1861
1862 /* dependent device mapping */
David Woodhousee1f167f2014-03-09 15:24:46 -07001863 pdev = to_pci_dev(dev);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001864 tmp = pci_find_upstream_pcie_bridge(pdev);
1865 if (!tmp)
1866 return 0;
1867 /* Secondary interface's bus number and devfn 0 */
1868 parent = pdev->bus->self;
1869 while (parent != tmp) {
David Woodhouse64ae8922014-03-09 12:52:30 -07001870 ret = domain_context_mapping_one(domain, iommu,
David Woodhouse276dbf992009-04-04 01:45:37 +01001871 parent->bus->number,
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001872 parent->devfn, translation);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001873 if (ret)
1874 return ret;
1875 parent = parent->bus->self;
1876 }
Stefan Assmann45e829e2009-12-03 06:49:24 -05001877 if (pci_is_pcie(tmp)) /* this is a PCIe-to-PCI bridge */
David Woodhouse64ae8922014-03-09 12:52:30 -07001878 return domain_context_mapping_one(domain, iommu,
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001879 tmp->subordinate->number, 0,
1880 translation);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001881 else /* this is a legacy PCI bridge */
David Woodhouse64ae8922014-03-09 12:52:30 -07001882 return domain_context_mapping_one(domain, iommu,
David Woodhouse276dbf992009-04-04 01:45:37 +01001883 tmp->bus->number,
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001884 tmp->devfn,
1885 translation);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001886}
1887
David Woodhousee1f167f2014-03-09 15:24:46 -07001888static int domain_context_mapped(struct device *dev)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001889{
1890 int ret;
David Woodhousee1f167f2014-03-09 15:24:46 -07001891 struct pci_dev *pdev, *tmp, *parent;
Weidong Han5331fe62008-12-08 23:00:00 +08001892 struct intel_iommu *iommu;
David Woodhouse156baca2014-03-09 14:00:57 -07001893 u8 bus, devfn;
Weidong Han5331fe62008-12-08 23:00:00 +08001894
David Woodhousee1f167f2014-03-09 15:24:46 -07001895 iommu = device_to_iommu(dev, &bus, &devfn);
Weidong Han5331fe62008-12-08 23:00:00 +08001896 if (!iommu)
1897 return -ENODEV;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001898
David Woodhouse156baca2014-03-09 14:00:57 -07001899 ret = device_context_mapped(iommu, bus, devfn);
David Woodhousee1f167f2014-03-09 15:24:46 -07001900 if (!ret || !dev_is_pci(dev))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001901 return ret;
David Woodhousee1f167f2014-03-09 15:24:46 -07001902
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001903 /* dependent device mapping */
David Woodhousee1f167f2014-03-09 15:24:46 -07001904 pdev = to_pci_dev(dev);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001905 tmp = pci_find_upstream_pcie_bridge(pdev);
1906 if (!tmp)
1907 return ret;
1908 /* Secondary interface's bus number and devfn 0 */
1909 parent = pdev->bus->self;
1910 while (parent != tmp) {
Weidong Han8c11e792008-12-08 15:29:22 +08001911 ret = device_context_mapped(iommu, parent->bus->number,
David Woodhouse276dbf992009-04-04 01:45:37 +01001912 parent->devfn);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001913 if (!ret)
1914 return ret;
1915 parent = parent->bus->self;
1916 }
Kenji Kaneshige5f4d91a2009-11-11 14:36:17 +09001917 if (pci_is_pcie(tmp))
David Woodhouse276dbf992009-04-04 01:45:37 +01001918 return device_context_mapped(iommu, tmp->subordinate->number,
1919 0);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001920 else
David Woodhouse276dbf992009-04-04 01:45:37 +01001921 return device_context_mapped(iommu, tmp->bus->number,
1922 tmp->devfn);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001923}
1924
Fenghua Yuf5329592009-08-04 15:09:37 -07001925/* Returns a number of VTD pages, but aligned to MM page size */
1926static inline unsigned long aligned_nrpages(unsigned long host_addr,
1927 size_t size)
1928{
1929 host_addr &= ~PAGE_MASK;
1930 return PAGE_ALIGN(host_addr + size) >> VTD_PAGE_SHIFT;
1931}
1932
Youquan Song6dd9a7c2011-05-25 19:13:49 +01001933/* Return largest possible superpage level for a given mapping */
1934static inline int hardware_largepage_caps(struct dmar_domain *domain,
1935 unsigned long iov_pfn,
1936 unsigned long phy_pfn,
1937 unsigned long pages)
1938{
1939 int support, level = 1;
1940 unsigned long pfnmerge;
1941
1942 support = domain->iommu_superpage;
1943
1944 /* To use a large page, the virtual *and* physical addresses
1945 must be aligned to 2MiB/1GiB/etc. Lower bits set in either
1946 of them will mean we have to use smaller pages. So just
1947 merge them and check both at once. */
1948 pfnmerge = iov_pfn | phy_pfn;
1949
1950 while (support && !(pfnmerge & ~VTD_STRIDE_MASK)) {
1951 pages >>= VTD_STRIDE_SHIFT;
1952 if (!pages)
1953 break;
1954 pfnmerge >>= VTD_STRIDE_SHIFT;
1955 level++;
1956 support--;
1957 }
1958 return level;
1959}
1960
David Woodhouse9051aa02009-06-29 12:30:54 +01001961static int __domain_mapping(struct dmar_domain *domain, unsigned long iov_pfn,
1962 struct scatterlist *sg, unsigned long phys_pfn,
1963 unsigned long nr_pages, int prot)
David Woodhousee1605492009-06-29 11:17:38 +01001964{
1965 struct dma_pte *first_pte = NULL, *pte = NULL;
David Woodhouse9051aa02009-06-29 12:30:54 +01001966 phys_addr_t uninitialized_var(pteval);
David Woodhousee1605492009-06-29 11:17:38 +01001967 int addr_width = agaw_to_width(domain->agaw) - VTD_PAGE_SHIFT;
David Woodhouse9051aa02009-06-29 12:30:54 +01001968 unsigned long sg_res;
Youquan Song6dd9a7c2011-05-25 19:13:49 +01001969 unsigned int largepage_lvl = 0;
1970 unsigned long lvl_pages = 0;
David Woodhousee1605492009-06-29 11:17:38 +01001971
1972 BUG_ON(addr_width < BITS_PER_LONG && (iov_pfn + nr_pages - 1) >> addr_width);
1973
1974 if ((prot & (DMA_PTE_READ|DMA_PTE_WRITE)) == 0)
1975 return -EINVAL;
1976
1977 prot &= DMA_PTE_READ | DMA_PTE_WRITE | DMA_PTE_SNP;
1978
David Woodhouse9051aa02009-06-29 12:30:54 +01001979 if (sg)
1980 sg_res = 0;
1981 else {
1982 sg_res = nr_pages + 1;
1983 pteval = ((phys_addr_t)phys_pfn << VTD_PAGE_SHIFT) | prot;
1984 }
1985
Youquan Song6dd9a7c2011-05-25 19:13:49 +01001986 while (nr_pages > 0) {
David Woodhousec85994e2009-07-01 19:21:24 +01001987 uint64_t tmp;
1988
David Woodhousee1605492009-06-29 11:17:38 +01001989 if (!sg_res) {
Fenghua Yuf5329592009-08-04 15:09:37 -07001990 sg_res = aligned_nrpages(sg->offset, sg->length);
David Woodhousee1605492009-06-29 11:17:38 +01001991 sg->dma_address = ((dma_addr_t)iov_pfn << VTD_PAGE_SHIFT) + sg->offset;
1992 sg->dma_length = sg->length;
1993 pteval = page_to_phys(sg_page(sg)) | prot;
Youquan Song6dd9a7c2011-05-25 19:13:49 +01001994 phys_pfn = pteval >> VTD_PAGE_SHIFT;
David Woodhousee1605492009-06-29 11:17:38 +01001995 }
Youquan Song6dd9a7c2011-05-25 19:13:49 +01001996
David Woodhousee1605492009-06-29 11:17:38 +01001997 if (!pte) {
Youquan Song6dd9a7c2011-05-25 19:13:49 +01001998 largepage_lvl = hardware_largepage_caps(domain, iov_pfn, phys_pfn, sg_res);
1999
David Woodhouse5cf0a762014-03-19 16:07:49 +00002000 first_pte = pte = pfn_to_dma_pte(domain, iov_pfn, &largepage_lvl);
David Woodhousee1605492009-06-29 11:17:38 +01002001 if (!pte)
2002 return -ENOMEM;
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002003 /* It is large page*/
Woodhouse, David6491d4d2012-12-19 13:25:35 +00002004 if (largepage_lvl > 1) {
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002005 pteval |= DMA_PTE_LARGE_PAGE;
Woodhouse, David6491d4d2012-12-19 13:25:35 +00002006 /* Ensure that old small page tables are removed to make room
2007 for superpage, if they exist. */
2008 dma_pte_clear_range(domain, iov_pfn,
2009 iov_pfn + lvl_to_nr_pages(largepage_lvl) - 1);
2010 dma_pte_free_pagetable(domain, iov_pfn,
2011 iov_pfn + lvl_to_nr_pages(largepage_lvl) - 1);
2012 } else {
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002013 pteval &= ~(uint64_t)DMA_PTE_LARGE_PAGE;
Woodhouse, David6491d4d2012-12-19 13:25:35 +00002014 }
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002015
David Woodhousee1605492009-06-29 11:17:38 +01002016 }
2017 /* We don't need lock here, nobody else
2018 * touches the iova range
2019 */
David Woodhouse7766a3f2009-07-01 20:27:03 +01002020 tmp = cmpxchg64_local(&pte->val, 0ULL, pteval);
David Woodhousec85994e2009-07-01 19:21:24 +01002021 if (tmp) {
David Woodhouse1bf20f02009-06-29 22:06:43 +01002022 static int dumps = 5;
David Woodhousec85994e2009-07-01 19:21:24 +01002023 printk(KERN_CRIT "ERROR: DMA PTE for vPFN 0x%lx already set (to %llx not %llx)\n",
2024 iov_pfn, tmp, (unsigned long long)pteval);
David Woodhouse1bf20f02009-06-29 22:06:43 +01002025 if (dumps) {
2026 dumps--;
2027 debug_dma_dump_mappings(NULL);
2028 }
2029 WARN_ON(1);
2030 }
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002031
2032 lvl_pages = lvl_to_nr_pages(largepage_lvl);
2033
2034 BUG_ON(nr_pages < lvl_pages);
2035 BUG_ON(sg_res < lvl_pages);
2036
2037 nr_pages -= lvl_pages;
2038 iov_pfn += lvl_pages;
2039 phys_pfn += lvl_pages;
2040 pteval += lvl_pages * VTD_PAGE_SIZE;
2041 sg_res -= lvl_pages;
2042
2043 /* If the next PTE would be the first in a new page, then we
2044 need to flush the cache on the entries we've just written.
2045 And then we'll need to recalculate 'pte', so clear it and
2046 let it get set again in the if (!pte) block above.
2047
2048 If we're done (!nr_pages) we need to flush the cache too.
2049
2050 Also if we've been setting superpages, we may need to
2051 recalculate 'pte' and switch back to smaller pages for the
2052 end of the mapping, if the trailing size is not enough to
2053 use another superpage (i.e. sg_res < lvl_pages). */
David Woodhousee1605492009-06-29 11:17:38 +01002054 pte++;
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002055 if (!nr_pages || first_pte_in_page(pte) ||
2056 (largepage_lvl > 1 && sg_res < lvl_pages)) {
David Woodhousee1605492009-06-29 11:17:38 +01002057 domain_flush_cache(domain, first_pte,
2058 (void *)pte - (void *)first_pte);
2059 pte = NULL;
2060 }
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002061
2062 if (!sg_res && nr_pages)
David Woodhousee1605492009-06-29 11:17:38 +01002063 sg = sg_next(sg);
2064 }
2065 return 0;
2066}
2067
David Woodhouse9051aa02009-06-29 12:30:54 +01002068static inline int domain_sg_mapping(struct dmar_domain *domain, unsigned long iov_pfn,
2069 struct scatterlist *sg, unsigned long nr_pages,
2070 int prot)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002071{
David Woodhouse9051aa02009-06-29 12:30:54 +01002072 return __domain_mapping(domain, iov_pfn, sg, 0, nr_pages, prot);
2073}
Fenghua Yu5b6985c2008-10-16 18:02:32 -07002074
David Woodhouse9051aa02009-06-29 12:30:54 +01002075static inline int domain_pfn_mapping(struct dmar_domain *domain, unsigned long iov_pfn,
2076 unsigned long phys_pfn, unsigned long nr_pages,
2077 int prot)
2078{
2079 return __domain_mapping(domain, iov_pfn, NULL, phys_pfn, nr_pages, prot);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002080}
2081
Weidong Hanc7151a82008-12-08 22:51:37 +08002082static void iommu_detach_dev(struct intel_iommu *iommu, u8 bus, u8 devfn)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002083{
Weidong Hanc7151a82008-12-08 22:51:37 +08002084 if (!iommu)
2085 return;
Weidong Han8c11e792008-12-08 15:29:22 +08002086
2087 clear_context_table(iommu, bus, devfn);
2088 iommu->flush.flush_context(iommu, 0, 0, 0,
David Woodhouse4c25a2c2009-05-10 17:16:06 +01002089 DMA_CCMD_GLOBAL_INVL);
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01002090 iommu->flush.flush_iotlb(iommu, 0, 0, 0, DMA_TLB_GLOBAL_FLUSH);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002091}
2092
David Woodhouse109b9b02012-05-25 17:43:02 +01002093static inline void unlink_domain_info(struct device_domain_info *info)
2094{
2095 assert_spin_locked(&device_domain_lock);
2096 list_del(&info->link);
2097 list_del(&info->global);
2098 if (info->dev)
David Woodhouse0bcb3e22014-03-06 17:12:03 +00002099 info->dev->archdata.iommu = NULL;
David Woodhouse109b9b02012-05-25 17:43:02 +01002100}
2101
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002102static void domain_remove_dev_info(struct dmar_domain *domain)
2103{
2104 struct device_domain_info *info;
Jiang Liu92d03cc2014-02-19 14:07:28 +08002105 unsigned long flags, flags2;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002106
2107 spin_lock_irqsave(&device_domain_lock, flags);
2108 while (!list_empty(&domain->devices)) {
2109 info = list_entry(domain->devices.next,
2110 struct device_domain_info, link);
David Woodhouse109b9b02012-05-25 17:43:02 +01002111 unlink_domain_info(info);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002112 spin_unlock_irqrestore(&device_domain_lock, flags);
2113
Yu Zhao93a23a72009-05-18 13:51:37 +08002114 iommu_disable_dev_iotlb(info);
David Woodhouse7c7faa12014-03-09 13:33:06 -07002115 iommu_detach_dev(info->iommu, info->bus, info->devfn);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002116
Jiang Liu92d03cc2014-02-19 14:07:28 +08002117 if (domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE) {
David Woodhouse7c7faa12014-03-09 13:33:06 -07002118 iommu_detach_dependent_devices(info->iommu, info->dev);
Jiang Liu92d03cc2014-02-19 14:07:28 +08002119 /* clear this iommu in iommu_bmp, update iommu count
2120 * and capabilities
2121 */
2122 spin_lock_irqsave(&domain->iommu_lock, flags2);
David Woodhouse7c7faa12014-03-09 13:33:06 -07002123 if (test_and_clear_bit(info->iommu->seq_id,
Jiang Liu92d03cc2014-02-19 14:07:28 +08002124 domain->iommu_bmp)) {
2125 domain->iommu_count--;
2126 domain_update_iommu_cap(domain);
2127 }
2128 spin_unlock_irqrestore(&domain->iommu_lock, flags2);
2129 }
2130
2131 free_devinfo_mem(info);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002132 spin_lock_irqsave(&device_domain_lock, flags);
2133 }
2134 spin_unlock_irqrestore(&device_domain_lock, flags);
2135}
2136
2137/*
2138 * find_domain
David Woodhouse1525a292014-03-06 16:19:30 +00002139 * Note: we use struct device->archdata.iommu stores the info
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002140 */
David Woodhouse1525a292014-03-06 16:19:30 +00002141static struct dmar_domain *find_domain(struct device *dev)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002142{
2143 struct device_domain_info *info;
2144
2145 /* No lock here, assumes no domain exit in normal case */
David Woodhouse1525a292014-03-06 16:19:30 +00002146 info = dev->archdata.iommu;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002147 if (info)
2148 return info->domain;
2149 return NULL;
2150}
2151
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002152static inline struct device_domain_info *
Jiang Liu745f2582014-02-19 14:07:26 +08002153dmar_search_domain_by_dev_info(int segment, int bus, int devfn)
2154{
2155 struct device_domain_info *info;
2156
2157 list_for_each_entry(info, &device_domain_list, global)
David Woodhouse41e80dca2014-03-09 13:55:54 -07002158 if (info->iommu->segment == segment && info->bus == bus &&
Jiang Liu745f2582014-02-19 14:07:26 +08002159 info->devfn == devfn)
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002160 return info;
Jiang Liu745f2582014-02-19 14:07:26 +08002161
2162 return NULL;
2163}
2164
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002165static struct dmar_domain *dmar_insert_dev_info(struct intel_iommu *iommu,
David Woodhouse41e80dca2014-03-09 13:55:54 -07002166 int bus, int devfn,
David Woodhouseb718cd32014-03-09 13:11:33 -07002167 struct device *dev,
2168 struct dmar_domain *domain)
Jiang Liu745f2582014-02-19 14:07:26 +08002169{
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002170 struct dmar_domain *found = NULL;
Jiang Liu745f2582014-02-19 14:07:26 +08002171 struct device_domain_info *info;
2172 unsigned long flags;
2173
2174 info = alloc_devinfo_mem();
2175 if (!info)
David Woodhouseb718cd32014-03-09 13:11:33 -07002176 return NULL;
Jiang Liu745f2582014-02-19 14:07:26 +08002177
Jiang Liu745f2582014-02-19 14:07:26 +08002178 info->bus = bus;
2179 info->devfn = devfn;
2180 info->dev = dev;
2181 info->domain = domain;
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002182 info->iommu = iommu;
Jiang Liu745f2582014-02-19 14:07:26 +08002183 if (!dev)
2184 domain->flags |= DOMAIN_FLAG_P2P_MULTIPLE_DEVICES;
2185
2186 spin_lock_irqsave(&device_domain_lock, flags);
2187 if (dev)
David Woodhouse0bcb3e22014-03-06 17:12:03 +00002188 found = find_domain(dev);
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002189 else {
2190 struct device_domain_info *info2;
David Woodhouse41e80dca2014-03-09 13:55:54 -07002191 info2 = dmar_search_domain_by_dev_info(iommu->segment, bus, devfn);
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002192 if (info2)
2193 found = info2->domain;
2194 }
Jiang Liu745f2582014-02-19 14:07:26 +08002195 if (found) {
2196 spin_unlock_irqrestore(&device_domain_lock, flags);
2197 free_devinfo_mem(info);
David Woodhouseb718cd32014-03-09 13:11:33 -07002198 /* Caller must free the original domain */
2199 return found;
Jiang Liu745f2582014-02-19 14:07:26 +08002200 }
2201
David Woodhouseb718cd32014-03-09 13:11:33 -07002202 list_add(&info->link, &domain->devices);
2203 list_add(&info->global, &device_domain_list);
2204 if (dev)
2205 dev->archdata.iommu = info;
2206 spin_unlock_irqrestore(&device_domain_lock, flags);
2207
2208 return domain;
Jiang Liu745f2582014-02-19 14:07:26 +08002209}
2210
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002211/* domain is initialized */
David Woodhouse146922e2014-03-09 15:44:17 -07002212static struct dmar_domain *get_domain_for_dev(struct device *dev, int gaw)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002213{
Jiang Liue85bb5d2014-02-19 14:07:27 +08002214 struct dmar_domain *domain, *free = NULL;
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002215 struct intel_iommu *iommu = NULL;
2216 struct device_domain_info *info;
David Woodhouse146922e2014-03-09 15:44:17 -07002217 struct pci_dev *dev_tmp = NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002218 unsigned long flags;
David Woodhouse146922e2014-03-09 15:44:17 -07002219 u8 bus, devfn, bridge_bus, bridge_devfn;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002220
David Woodhouse146922e2014-03-09 15:44:17 -07002221 domain = find_domain(dev);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002222 if (domain)
2223 return domain;
2224
David Woodhouse146922e2014-03-09 15:44:17 -07002225 if (dev_is_pci(dev)) {
2226 struct pci_dev *pdev = to_pci_dev(dev);
2227 u16 segment;
David Woodhouse276dbf992009-04-04 01:45:37 +01002228
David Woodhouse146922e2014-03-09 15:44:17 -07002229 segment = pci_domain_nr(pdev->bus);
2230 dev_tmp = pci_find_upstream_pcie_bridge(pdev);
2231 if (dev_tmp) {
2232 if (pci_is_pcie(dev_tmp)) {
2233 bridge_bus = dev_tmp->subordinate->number;
2234 bridge_devfn = 0;
2235 } else {
2236 bridge_bus = dev_tmp->bus->number;
2237 bridge_devfn = dev_tmp->devfn;
2238 }
2239 spin_lock_irqsave(&device_domain_lock, flags);
2240 info = dmar_search_domain_by_dev_info(segment, bus, devfn);
2241 if (info) {
2242 iommu = info->iommu;
2243 domain = info->domain;
2244 }
2245 spin_unlock_irqrestore(&device_domain_lock, flags);
2246 /* pcie-pci bridge already has a domain, uses it */
2247 if (info)
2248 goto found_domain;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002249 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002250 }
2251
David Woodhouse146922e2014-03-09 15:44:17 -07002252 iommu = device_to_iommu(dev, &bus, &devfn);
2253 if (!iommu)
2254 goto error;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002255
David Woodhouse146922e2014-03-09 15:44:17 -07002256 /* Allocate and initialize new domain for the device */
Jiang Liu92d03cc2014-02-19 14:07:28 +08002257 domain = alloc_domain(false);
Jiang Liu745f2582014-02-19 14:07:26 +08002258 if (!domain)
2259 goto error;
2260 if (iommu_attach_domain(domain, iommu)) {
Alex Williamson2fe9723d2011-03-04 14:52:30 -07002261 free_domain_mem(domain);
Dan Carpenter14d40562014-03-28 11:29:50 +03002262 domain = NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002263 goto error;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002264 }
Jiang Liue85bb5d2014-02-19 14:07:27 +08002265 free = domain;
2266 if (domain_init(domain, gaw))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002267 goto error;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002268
2269 /* register pcie-to-pci device */
2270 if (dev_tmp) {
David Woodhouse146922e2014-03-09 15:44:17 -07002271 domain = dmar_insert_dev_info(iommu, bridge_bus, bridge_devfn,
2272 NULL, domain);
David Woodhouseb718cd32014-03-09 13:11:33 -07002273 if (!domain)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002274 goto error;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002275 }
2276
2277found_domain:
David Woodhouse146922e2014-03-09 15:44:17 -07002278 domain = dmar_insert_dev_info(iommu, bus, devfn, dev, domain);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002279error:
David Woodhouseb718cd32014-03-09 13:11:33 -07002280 if (free != domain)
Jiang Liue85bb5d2014-02-19 14:07:27 +08002281 domain_exit(free);
David Woodhouseb718cd32014-03-09 13:11:33 -07002282
2283 return domain;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002284}
2285
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002286static int iommu_identity_mapping;
David Woodhousee0fc7e02009-09-30 09:12:17 -07002287#define IDENTMAP_ALL 1
2288#define IDENTMAP_GFX 2
2289#define IDENTMAP_AZALIA 4
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002290
David Woodhouseb2132032009-06-26 18:50:28 +01002291static int iommu_domain_identity_map(struct dmar_domain *domain,
2292 unsigned long long start,
2293 unsigned long long end)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002294{
David Woodhousec5395d52009-06-28 16:35:56 +01002295 unsigned long first_vpfn = start >> VTD_PAGE_SHIFT;
2296 unsigned long last_vpfn = end >> VTD_PAGE_SHIFT;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002297
David Woodhousec5395d52009-06-28 16:35:56 +01002298 if (!reserve_iova(&domain->iovad, dma_to_mm_pfn(first_vpfn),
2299 dma_to_mm_pfn(last_vpfn))) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002300 printk(KERN_ERR "IOMMU: reserve iova failed\n");
David Woodhouseb2132032009-06-26 18:50:28 +01002301 return -ENOMEM;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002302 }
2303
David Woodhousec5395d52009-06-28 16:35:56 +01002304 pr_debug("Mapping reserved region %llx-%llx for domain %d\n",
2305 start, end, domain->id);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002306 /*
2307 * RMRR range might have overlap with physical memory range,
2308 * clear it first
2309 */
David Woodhousec5395d52009-06-28 16:35:56 +01002310 dma_pte_clear_range(domain, first_vpfn, last_vpfn);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002311
David Woodhousec5395d52009-06-28 16:35:56 +01002312 return domain_pfn_mapping(domain, first_vpfn, first_vpfn,
2313 last_vpfn - first_vpfn + 1,
David Woodhouse61df7442009-06-28 11:55:58 +01002314 DMA_PTE_READ|DMA_PTE_WRITE);
David Woodhouseb2132032009-06-26 18:50:28 +01002315}
2316
David Woodhouse0b9d9752014-03-09 15:48:15 -07002317static int iommu_prepare_identity_map(struct device *dev,
David Woodhouseb2132032009-06-26 18:50:28 +01002318 unsigned long long start,
2319 unsigned long long end)
2320{
2321 struct dmar_domain *domain;
2322 int ret;
2323
David Woodhouse0b9d9752014-03-09 15:48:15 -07002324 domain = get_domain_for_dev(dev, DEFAULT_DOMAIN_ADDRESS_WIDTH);
David Woodhouseb2132032009-06-26 18:50:28 +01002325 if (!domain)
2326 return -ENOMEM;
2327
David Woodhouse19943b02009-08-04 16:19:20 +01002328 /* For _hardware_ passthrough, don't bother. But for software
2329 passthrough, we do it anyway -- it may indicate a memory
2330 range which is reserved in E820, so which didn't get set
2331 up to start with in si_domain */
2332 if (domain == si_domain && hw_pass_through) {
2333 printk("Ignoring identity map for HW passthrough device %s [0x%Lx - 0x%Lx]\n",
David Woodhouse0b9d9752014-03-09 15:48:15 -07002334 dev_name(dev), start, end);
David Woodhouse19943b02009-08-04 16:19:20 +01002335 return 0;
2336 }
2337
2338 printk(KERN_INFO
2339 "IOMMU: Setting identity map for device %s [0x%Lx - 0x%Lx]\n",
David Woodhouse0b9d9752014-03-09 15:48:15 -07002340 dev_name(dev), start, end);
David Woodhouse2ff729f2009-08-26 14:25:41 +01002341
David Woodhouse5595b522009-12-02 09:21:55 +00002342 if (end < start) {
2343 WARN(1, "Your BIOS is broken; RMRR ends before it starts!\n"
2344 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
2345 dmi_get_system_info(DMI_BIOS_VENDOR),
2346 dmi_get_system_info(DMI_BIOS_VERSION),
2347 dmi_get_system_info(DMI_PRODUCT_VERSION));
2348 ret = -EIO;
2349 goto error;
2350 }
2351
David Woodhouse2ff729f2009-08-26 14:25:41 +01002352 if (end >> agaw_to_width(domain->agaw)) {
2353 WARN(1, "Your BIOS is broken; RMRR exceeds permitted address width (%d bits)\n"
2354 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
2355 agaw_to_width(domain->agaw),
2356 dmi_get_system_info(DMI_BIOS_VENDOR),
2357 dmi_get_system_info(DMI_BIOS_VERSION),
2358 dmi_get_system_info(DMI_PRODUCT_VERSION));
2359 ret = -EIO;
2360 goto error;
2361 }
David Woodhouse19943b02009-08-04 16:19:20 +01002362
David Woodhouseb2132032009-06-26 18:50:28 +01002363 ret = iommu_domain_identity_map(domain, start, end);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002364 if (ret)
2365 goto error;
2366
2367 /* context entry init */
David Woodhouse0b9d9752014-03-09 15:48:15 -07002368 ret = domain_context_mapping(domain, dev, CONTEXT_TT_MULTI_LEVEL);
David Woodhouseb2132032009-06-26 18:50:28 +01002369 if (ret)
2370 goto error;
2371
2372 return 0;
2373
2374 error:
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002375 domain_exit(domain);
2376 return ret;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002377}
2378
2379static inline int iommu_prepare_rmrr_dev(struct dmar_rmrr_unit *rmrr,
David Woodhouse0b9d9752014-03-09 15:48:15 -07002380 struct device *dev)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002381{
David Woodhouse0b9d9752014-03-09 15:48:15 -07002382 if (dev->archdata.iommu == DUMMY_DEVICE_DOMAIN_INFO)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002383 return 0;
David Woodhouse0b9d9752014-03-09 15:48:15 -07002384 return iommu_prepare_identity_map(dev, rmrr->base_address,
2385 rmrr->end_address);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002386}
2387
Suresh Siddhad3f13812011-08-23 17:05:25 -07002388#ifdef CONFIG_INTEL_IOMMU_FLOPPY_WA
Keshavamurthy, Anil S49a04292007-10-21 16:41:57 -07002389static inline void iommu_prepare_isa(void)
2390{
2391 struct pci_dev *pdev;
2392 int ret;
2393
2394 pdev = pci_get_class(PCI_CLASS_BRIDGE_ISA << 8, NULL);
2395 if (!pdev)
2396 return;
2397
David Woodhousec7ab48d2009-06-26 19:10:36 +01002398 printk(KERN_INFO "IOMMU: Prepare 0-16MiB unity mapping for LPC\n");
David Woodhouse0b9d9752014-03-09 15:48:15 -07002399 ret = iommu_prepare_identity_map(&pdev->dev, 0, 16*1024*1024 - 1);
Keshavamurthy, Anil S49a04292007-10-21 16:41:57 -07002400
2401 if (ret)
David Woodhousec7ab48d2009-06-26 19:10:36 +01002402 printk(KERN_ERR "IOMMU: Failed to create 0-16MiB identity map; "
2403 "floppy might not work\n");
Keshavamurthy, Anil S49a04292007-10-21 16:41:57 -07002404
2405}
2406#else
2407static inline void iommu_prepare_isa(void)
2408{
2409 return;
2410}
Suresh Siddhad3f13812011-08-23 17:05:25 -07002411#endif /* !CONFIG_INTEL_IOMMU_FLPY_WA */
Keshavamurthy, Anil S49a04292007-10-21 16:41:57 -07002412
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002413static int md_domain_init(struct dmar_domain *domain, int guest_width);
David Woodhousec7ab48d2009-06-26 19:10:36 +01002414
Matt Kraai071e1372009-08-23 22:30:22 -07002415static int __init si_domain_init(int hw)
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002416{
2417 struct dmar_drhd_unit *drhd;
2418 struct intel_iommu *iommu;
David Woodhousec7ab48d2009-06-26 19:10:36 +01002419 int nid, ret = 0;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002420
Jiang Liu92d03cc2014-02-19 14:07:28 +08002421 si_domain = alloc_domain(false);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002422 if (!si_domain)
2423 return -EFAULT;
2424
Jiang Liu92d03cc2014-02-19 14:07:28 +08002425 si_domain->flags = DOMAIN_FLAG_STATIC_IDENTITY;
2426
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002427 for_each_active_iommu(iommu, drhd) {
2428 ret = iommu_attach_domain(si_domain, iommu);
2429 if (ret) {
2430 domain_exit(si_domain);
2431 return -EFAULT;
2432 }
2433 }
2434
2435 if (md_domain_init(si_domain, DEFAULT_DOMAIN_ADDRESS_WIDTH)) {
2436 domain_exit(si_domain);
2437 return -EFAULT;
2438 }
2439
Jiang Liu9544c002014-01-06 14:18:13 +08002440 pr_debug("IOMMU: identity mapping domain is domain %d\n",
2441 si_domain->id);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002442
David Woodhouse19943b02009-08-04 16:19:20 +01002443 if (hw)
2444 return 0;
2445
David Woodhousec7ab48d2009-06-26 19:10:36 +01002446 for_each_online_node(nid) {
Tejun Heod4bbf7e2011-11-28 09:46:22 -08002447 unsigned long start_pfn, end_pfn;
2448 int i;
2449
2450 for_each_mem_pfn_range(i, nid, &start_pfn, &end_pfn, NULL) {
2451 ret = iommu_domain_identity_map(si_domain,
2452 PFN_PHYS(start_pfn), PFN_PHYS(end_pfn));
2453 if (ret)
2454 return ret;
2455 }
David Woodhousec7ab48d2009-06-26 19:10:36 +01002456 }
2457
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002458 return 0;
2459}
2460
David Woodhouse9b226622014-03-09 14:03:28 -07002461static int identity_mapping(struct device *dev)
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002462{
2463 struct device_domain_info *info;
2464
2465 if (likely(!iommu_identity_mapping))
2466 return 0;
2467
David Woodhouse9b226622014-03-09 14:03:28 -07002468 info = dev->archdata.iommu;
Mike Traviscb452a42011-05-28 13:15:03 -05002469 if (info && info != DUMMY_DEVICE_DOMAIN_INFO)
2470 return (info->domain == si_domain);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002471
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002472 return 0;
2473}
2474
2475static int domain_add_dev_info(struct dmar_domain *domain,
David Woodhouse5913c9b2014-03-09 16:27:31 -07002476 struct device *dev, int translation)
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002477{
David Woodhouse0ac72662014-03-09 13:19:22 -07002478 struct dmar_domain *ndomain;
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002479 struct intel_iommu *iommu;
David Woodhouse156baca2014-03-09 14:00:57 -07002480 u8 bus, devfn;
David Woodhouse5fe60f42009-08-09 10:53:41 +01002481 int ret;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002482
David Woodhouse5913c9b2014-03-09 16:27:31 -07002483 iommu = device_to_iommu(dev, &bus, &devfn);
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002484 if (!iommu)
2485 return -ENODEV;
2486
David Woodhouse5913c9b2014-03-09 16:27:31 -07002487 ndomain = dmar_insert_dev_info(iommu, bus, devfn, dev, domain);
David Woodhouse0ac72662014-03-09 13:19:22 -07002488 if (ndomain != domain)
2489 return -EBUSY;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002490
David Woodhouse5913c9b2014-03-09 16:27:31 -07002491 ret = domain_context_mapping(domain, dev, translation);
David Woodhousee2ad23d2012-05-25 17:42:54 +01002492 if (ret) {
David Woodhouse5913c9b2014-03-09 16:27:31 -07002493 domain_remove_one_dev_info(domain, dev);
David Woodhousee2ad23d2012-05-25 17:42:54 +01002494 return ret;
2495 }
2496
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002497 return 0;
2498}
2499
David Woodhouse0b9d9752014-03-09 15:48:15 -07002500static bool device_has_rmrr(struct device *dev)
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002501{
2502 struct dmar_rmrr_unit *rmrr;
David Woodhouse832bd852014-03-07 15:08:36 +00002503 struct device *tmp;
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002504 int i;
2505
Jiang Liu0e242612014-02-19 14:07:34 +08002506 rcu_read_lock();
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002507 for_each_rmrr_units(rmrr) {
Jiang Liub683b232014-02-19 14:07:32 +08002508 /*
2509 * Return TRUE if this RMRR contains the device that
2510 * is passed in.
2511 */
2512 for_each_active_dev_scope(rmrr->devices,
2513 rmrr->devices_cnt, i, tmp)
David Woodhouse0b9d9752014-03-09 15:48:15 -07002514 if (tmp == dev) {
Jiang Liu0e242612014-02-19 14:07:34 +08002515 rcu_read_unlock();
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002516 return true;
Jiang Liub683b232014-02-19 14:07:32 +08002517 }
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002518 }
Jiang Liu0e242612014-02-19 14:07:34 +08002519 rcu_read_unlock();
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002520 return false;
2521}
2522
David Woodhouse3bdb2592014-03-09 16:03:08 -07002523static int iommu_should_identity_map(struct device *dev, int startup)
David Woodhouse6941af22009-07-04 18:24:27 +01002524{
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002525
David Woodhouse3bdb2592014-03-09 16:03:08 -07002526 if (dev_is_pci(dev)) {
2527 struct pci_dev *pdev = to_pci_dev(dev);
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002528
David Woodhouse3bdb2592014-03-09 16:03:08 -07002529 /*
2530 * We want to prevent any device associated with an RMRR from
2531 * getting placed into the SI Domain. This is done because
2532 * problems exist when devices are moved in and out of domains
2533 * and their respective RMRR info is lost. We exempt USB devices
2534 * from this process due to their usage of RMRRs that are known
2535 * to not be needed after BIOS hand-off to OS.
2536 */
2537 if (device_has_rmrr(dev) &&
2538 (pdev->class >> 8) != PCI_CLASS_SERIAL_USB)
2539 return 0;
David Woodhousee0fc7e02009-09-30 09:12:17 -07002540
David Woodhouse3bdb2592014-03-09 16:03:08 -07002541 if ((iommu_identity_mapping & IDENTMAP_AZALIA) && IS_AZALIA(pdev))
2542 return 1;
David Woodhousee0fc7e02009-09-30 09:12:17 -07002543
David Woodhouse3bdb2592014-03-09 16:03:08 -07002544 if ((iommu_identity_mapping & IDENTMAP_GFX) && IS_GFX_DEVICE(pdev))
2545 return 1;
2546
2547 if (!(iommu_identity_mapping & IDENTMAP_ALL))
2548 return 0;
2549
2550 /*
2551 * We want to start off with all devices in the 1:1 domain, and
2552 * take them out later if we find they can't access all of memory.
2553 *
2554 * However, we can't do this for PCI devices behind bridges,
2555 * because all PCI devices behind the same bridge will end up
2556 * with the same source-id on their transactions.
2557 *
2558 * Practically speaking, we can't change things around for these
2559 * devices at run-time, because we can't be sure there'll be no
2560 * DMA transactions in flight for any of their siblings.
2561 *
2562 * So PCI devices (unless they're on the root bus) as well as
2563 * their parent PCI-PCI or PCIe-PCI bridges must be left _out_ of
2564 * the 1:1 domain, just in _case_ one of their siblings turns out
2565 * not to be able to map all of memory.
2566 */
2567 if (!pci_is_pcie(pdev)) {
2568 if (!pci_is_root_bus(pdev->bus))
2569 return 0;
2570 if (pdev->class >> 8 == PCI_CLASS_BRIDGE_PCI)
2571 return 0;
2572 } else if (pci_pcie_type(pdev) == PCI_EXP_TYPE_PCI_BRIDGE)
2573 return 0;
2574 } else {
2575 if (device_has_rmrr(dev))
2576 return 0;
2577 }
David Woodhouse6941af22009-07-04 18:24:27 +01002578
David Woodhouse3dfc8132009-07-04 19:11:08 +01002579 /*
David Woodhouse3dfc8132009-07-04 19:11:08 +01002580 * At boot time, we don't yet know if devices will be 64-bit capable.
David Woodhouse3bdb2592014-03-09 16:03:08 -07002581 * Assume that they will — if they turn out not to be, then we can
David Woodhouse3dfc8132009-07-04 19:11:08 +01002582 * take them out of the 1:1 domain later.
2583 */
Chris Wright8fcc5372011-05-28 13:15:02 -05002584 if (!startup) {
2585 /*
2586 * If the device's dma_mask is less than the system's memory
2587 * size then this is not a candidate for identity mapping.
2588 */
David Woodhouse3bdb2592014-03-09 16:03:08 -07002589 u64 dma_mask = *dev->dma_mask;
Chris Wright8fcc5372011-05-28 13:15:02 -05002590
David Woodhouse3bdb2592014-03-09 16:03:08 -07002591 if (dev->coherent_dma_mask &&
2592 dev->coherent_dma_mask < dma_mask)
2593 dma_mask = dev->coherent_dma_mask;
Chris Wright8fcc5372011-05-28 13:15:02 -05002594
David Woodhouse3bdb2592014-03-09 16:03:08 -07002595 return dma_mask >= dma_get_required_mask(dev);
Chris Wright8fcc5372011-05-28 13:15:02 -05002596 }
David Woodhouse6941af22009-07-04 18:24:27 +01002597
2598 return 1;
2599}
2600
David Woodhousecf04eee2014-03-21 16:49:04 +00002601static int __init dev_prepare_static_identity_mapping(struct device *dev, int hw)
2602{
2603 int ret;
2604
2605 if (!iommu_should_identity_map(dev, 1))
2606 return 0;
2607
2608 ret = domain_add_dev_info(si_domain, dev,
2609 hw ? CONTEXT_TT_PASS_THROUGH :
2610 CONTEXT_TT_MULTI_LEVEL);
2611 if (!ret)
2612 pr_info("IOMMU: %s identity mapping for device %s\n",
2613 hw ? "hardware" : "software", dev_name(dev));
2614 else if (ret == -ENODEV)
2615 /* device not associated with an iommu */
2616 ret = 0;
2617
2618 return ret;
2619}
2620
2621
Matt Kraai071e1372009-08-23 22:30:22 -07002622static int __init iommu_prepare_static_identity_mapping(int hw)
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002623{
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002624 struct pci_dev *pdev = NULL;
David Woodhousecf04eee2014-03-21 16:49:04 +00002625 struct dmar_drhd_unit *drhd;
2626 struct intel_iommu *iommu;
2627 struct device *dev;
2628 int i;
2629 int ret = 0;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002630
David Woodhouse19943b02009-08-04 16:19:20 +01002631 ret = si_domain_init(hw);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002632 if (ret)
2633 return -EFAULT;
2634
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002635 for_each_pci_dev(pdev) {
David Woodhousecf04eee2014-03-21 16:49:04 +00002636 ret = dev_prepare_static_identity_mapping(&pdev->dev, hw);
2637 if (ret)
2638 return ret;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002639 }
2640
David Woodhousecf04eee2014-03-21 16:49:04 +00002641 for_each_active_iommu(iommu, drhd)
2642 for_each_active_dev_scope(drhd->devices, drhd->devices_cnt, i, dev) {
2643 struct acpi_device_physical_node *pn;
2644 struct acpi_device *adev;
2645
2646 if (dev->bus != &acpi_bus_type)
2647 continue;
2648
2649 adev= to_acpi_device(dev);
2650 mutex_lock(&adev->physical_node_lock);
2651 list_for_each_entry(pn, &adev->physical_node_list, node) {
2652 ret = dev_prepare_static_identity_mapping(pn->dev, hw);
2653 if (ret)
2654 break;
2655 }
2656 mutex_unlock(&adev->physical_node_lock);
2657 if (ret)
2658 return ret;
2659 }
2660
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002661 return 0;
2662}
2663
Joseph Cihulab7792602011-05-03 00:08:37 -07002664static int __init init_dmars(void)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002665{
2666 struct dmar_drhd_unit *drhd;
2667 struct dmar_rmrr_unit *rmrr;
David Woodhouse832bd852014-03-07 15:08:36 +00002668 struct device *dev;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002669 struct intel_iommu *iommu;
Suresh Siddha9d783ba2009-03-16 17:04:55 -07002670 int i, ret;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002671
2672 /*
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002673 * for each drhd
2674 * allocate root
2675 * initialize and program root entry to not present
2676 * endfor
2677 */
2678 for_each_drhd_unit(drhd) {
mark gross5e0d2a62008-03-04 15:22:08 -08002679 /*
2680 * lock not needed as this is only incremented in the single
2681 * threaded kernel __init code path all other access are read
2682 * only
2683 */
Mike Travis1b198bb2012-03-05 15:05:16 -08002684 if (g_num_of_iommus < IOMMU_UNITS_SUPPORTED) {
2685 g_num_of_iommus++;
2686 continue;
2687 }
2688 printk_once(KERN_ERR "intel-iommu: exceeded %d IOMMUs\n",
2689 IOMMU_UNITS_SUPPORTED);
mark gross5e0d2a62008-03-04 15:22:08 -08002690 }
2691
Weidong Hand9630fe2008-12-08 11:06:32 +08002692 g_iommus = kcalloc(g_num_of_iommus, sizeof(struct intel_iommu *),
2693 GFP_KERNEL);
2694 if (!g_iommus) {
2695 printk(KERN_ERR "Allocating global iommu array failed\n");
2696 ret = -ENOMEM;
2697 goto error;
2698 }
2699
mark gross80b20dd2008-04-18 13:53:58 -07002700 deferred_flush = kzalloc(g_num_of_iommus *
2701 sizeof(struct deferred_flush_tables), GFP_KERNEL);
2702 if (!deferred_flush) {
mark gross5e0d2a62008-03-04 15:22:08 -08002703 ret = -ENOMEM;
Jiang Liu989d51f2014-02-19 14:07:21 +08002704 goto free_g_iommus;
mark gross5e0d2a62008-03-04 15:22:08 -08002705 }
2706
Jiang Liu7c919772014-01-06 14:18:18 +08002707 for_each_active_iommu(iommu, drhd) {
Weidong Hand9630fe2008-12-08 11:06:32 +08002708 g_iommus[iommu->seq_id] = iommu;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002709
Suresh Siddhae61d98d2008-07-10 11:16:35 -07002710 ret = iommu_init_domains(iommu);
2711 if (ret)
Jiang Liu989d51f2014-02-19 14:07:21 +08002712 goto free_iommu;
Suresh Siddhae61d98d2008-07-10 11:16:35 -07002713
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002714 /*
2715 * TBD:
2716 * we could share the same root & context tables
Lucas De Marchi25985ed2011-03-30 22:57:33 -03002717 * among all IOMMU's. Need to Split it later.
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002718 */
2719 ret = iommu_alloc_root_entry(iommu);
2720 if (ret) {
2721 printk(KERN_ERR "IOMMU: allocate root entry failed\n");
Jiang Liu989d51f2014-02-19 14:07:21 +08002722 goto free_iommu;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002723 }
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07002724 if (!ecap_pass_through(iommu->ecap))
David Woodhouse19943b02009-08-04 16:19:20 +01002725 hw_pass_through = 0;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002726 }
2727
Suresh Siddha1531a6a2009-03-16 17:04:57 -07002728 /*
2729 * Start from the sane iommu hardware state.
2730 */
Jiang Liu7c919772014-01-06 14:18:18 +08002731 for_each_active_iommu(iommu, drhd) {
Suresh Siddha1531a6a2009-03-16 17:04:57 -07002732 /*
2733 * If the queued invalidation is already initialized by us
2734 * (for example, while enabling interrupt-remapping) then
2735 * we got the things already rolling from a sane state.
2736 */
2737 if (iommu->qi)
2738 continue;
2739
2740 /*
2741 * Clear any previous faults.
2742 */
2743 dmar_fault(-1, iommu);
2744 /*
2745 * Disable queued invalidation if supported and already enabled
2746 * before OS handover.
2747 */
2748 dmar_disable_qi(iommu);
2749 }
2750
Jiang Liu7c919772014-01-06 14:18:18 +08002751 for_each_active_iommu(iommu, drhd) {
Youquan Songa77b67d2008-10-16 16:31:56 -07002752 if (dmar_enable_qi(iommu)) {
2753 /*
2754 * Queued Invalidate not enabled, use Register Based
2755 * Invalidate
2756 */
2757 iommu->flush.flush_context = __iommu_flush_context;
2758 iommu->flush.flush_iotlb = __iommu_flush_iotlb;
Yinghai Lu680a7522010-04-08 19:58:23 +01002759 printk(KERN_INFO "IOMMU %d 0x%Lx: using Register based "
FUJITA Tomonorib4e0f9e2008-11-19 13:53:42 +09002760 "invalidation\n",
Yinghai Lu680a7522010-04-08 19:58:23 +01002761 iommu->seq_id,
FUJITA Tomonorib4e0f9e2008-11-19 13:53:42 +09002762 (unsigned long long)drhd->reg_base_addr);
Youquan Songa77b67d2008-10-16 16:31:56 -07002763 } else {
2764 iommu->flush.flush_context = qi_flush_context;
2765 iommu->flush.flush_iotlb = qi_flush_iotlb;
Yinghai Lu680a7522010-04-08 19:58:23 +01002766 printk(KERN_INFO "IOMMU %d 0x%Lx: using Queued "
FUJITA Tomonorib4e0f9e2008-11-19 13:53:42 +09002767 "invalidation\n",
Yinghai Lu680a7522010-04-08 19:58:23 +01002768 iommu->seq_id,
FUJITA Tomonorib4e0f9e2008-11-19 13:53:42 +09002769 (unsigned long long)drhd->reg_base_addr);
Youquan Songa77b67d2008-10-16 16:31:56 -07002770 }
2771 }
2772
David Woodhouse19943b02009-08-04 16:19:20 +01002773 if (iommu_pass_through)
David Woodhousee0fc7e02009-09-30 09:12:17 -07002774 iommu_identity_mapping |= IDENTMAP_ALL;
2775
Suresh Siddhad3f13812011-08-23 17:05:25 -07002776#ifdef CONFIG_INTEL_IOMMU_BROKEN_GFX_WA
David Woodhousee0fc7e02009-09-30 09:12:17 -07002777 iommu_identity_mapping |= IDENTMAP_GFX;
David Woodhouse19943b02009-08-04 16:19:20 +01002778#endif
David Woodhousee0fc7e02009-09-30 09:12:17 -07002779
2780 check_tylersburg_isoch();
2781
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07002782 /*
2783 * If pass through is not set or not enabled, setup context entries for
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002784 * identity mappings for rmrr, gfx, and isa and may fall back to static
2785 * identity mapping if iommu_identity_mapping is set.
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07002786 */
David Woodhouse19943b02009-08-04 16:19:20 +01002787 if (iommu_identity_mapping) {
2788 ret = iommu_prepare_static_identity_mapping(hw_pass_through);
2789 if (ret) {
2790 printk(KERN_CRIT "Failed to setup IOMMU pass-through\n");
Jiang Liu989d51f2014-02-19 14:07:21 +08002791 goto free_iommu;
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07002792 }
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07002793 }
David Woodhouse19943b02009-08-04 16:19:20 +01002794 /*
2795 * For each rmrr
2796 * for each dev attached to rmrr
2797 * do
2798 * locate drhd for dev, alloc domain for dev
2799 * allocate free domain
2800 * allocate page table entries for rmrr
2801 * if context not allocated for bus
2802 * allocate and init context
2803 * set present in root table for this bus
2804 * init context with domain, translation etc
2805 * endfor
2806 * endfor
2807 */
2808 printk(KERN_INFO "IOMMU: Setting RMRR:\n");
2809 for_each_rmrr_units(rmrr) {
Jiang Liub683b232014-02-19 14:07:32 +08002810 /* some BIOS lists non-exist devices in DMAR table. */
2811 for_each_active_dev_scope(rmrr->devices, rmrr->devices_cnt,
David Woodhouse832bd852014-03-07 15:08:36 +00002812 i, dev) {
David Woodhouse0b9d9752014-03-09 15:48:15 -07002813 ret = iommu_prepare_rmrr_dev(rmrr, dev);
David Woodhouse19943b02009-08-04 16:19:20 +01002814 if (ret)
2815 printk(KERN_ERR
2816 "IOMMU: mapping reserved region failed\n");
2817 }
2818 }
2819
2820 iommu_prepare_isa();
Keshavamurthy, Anil S49a04292007-10-21 16:41:57 -07002821
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002822 /*
2823 * for each drhd
2824 * enable fault log
2825 * global invalidate context cache
2826 * global invalidate iotlb
2827 * enable translation
2828 */
Jiang Liu7c919772014-01-06 14:18:18 +08002829 for_each_iommu(iommu, drhd) {
Joseph Cihula51a63e62011-03-21 11:04:24 -07002830 if (drhd->ignored) {
2831 /*
2832 * we always have to disable PMRs or DMA may fail on
2833 * this device
2834 */
2835 if (force_on)
Jiang Liu7c919772014-01-06 14:18:18 +08002836 iommu_disable_protect_mem_regions(iommu);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002837 continue;
Joseph Cihula51a63e62011-03-21 11:04:24 -07002838 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002839
2840 iommu_flush_write_buffer(iommu);
2841
Keshavamurthy, Anil S3460a6d2007-10-21 16:41:54 -07002842 ret = dmar_set_interrupt(iommu);
2843 if (ret)
Jiang Liu989d51f2014-02-19 14:07:21 +08002844 goto free_iommu;
Keshavamurthy, Anil S3460a6d2007-10-21 16:41:54 -07002845
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002846 iommu_set_root_entry(iommu);
2847
David Woodhouse4c25a2c2009-05-10 17:16:06 +01002848 iommu->flush.flush_context(iommu, 0, 0, 0, DMA_CCMD_GLOBAL_INVL);
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01002849 iommu->flush.flush_iotlb(iommu, 0, 0, 0, DMA_TLB_GLOBAL_FLUSH);
mark grossf8bab732008-02-08 04:18:38 -08002850
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002851 ret = iommu_enable_translation(iommu);
2852 if (ret)
Jiang Liu989d51f2014-02-19 14:07:21 +08002853 goto free_iommu;
David Woodhouseb94996c2009-09-19 15:28:12 -07002854
2855 iommu_disable_protect_mem_regions(iommu);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002856 }
2857
2858 return 0;
Jiang Liu989d51f2014-02-19 14:07:21 +08002859
2860free_iommu:
Jiang Liu7c919772014-01-06 14:18:18 +08002861 for_each_active_iommu(iommu, drhd)
Jiang Liua868e6b2014-01-06 14:18:20 +08002862 free_dmar_iommu(iommu);
Jiang Liu9bdc5312014-01-06 14:18:27 +08002863 kfree(deferred_flush);
Jiang Liu989d51f2014-02-19 14:07:21 +08002864free_g_iommus:
Weidong Hand9630fe2008-12-08 11:06:32 +08002865 kfree(g_iommus);
Jiang Liu989d51f2014-02-19 14:07:21 +08002866error:
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002867 return ret;
2868}
2869
David Woodhouse5a5e02a2009-07-04 09:35:44 +01002870/* This takes a number of _MM_ pages, not VTD pages */
David Woodhouse875764d2009-06-28 21:20:51 +01002871static struct iova *intel_alloc_iova(struct device *dev,
2872 struct dmar_domain *domain,
2873 unsigned long nrpages, uint64_t dma_mask)
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002874{
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002875 struct iova *iova = NULL;
2876
David Woodhouse875764d2009-06-28 21:20:51 +01002877 /* Restrict dma_mask to the width that the iommu can handle */
2878 dma_mask = min_t(uint64_t, DOMAIN_MAX_ADDR(domain->gaw), dma_mask);
2879
2880 if (!dmar_forcedac && dma_mask > DMA_BIT_MASK(32)) {
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002881 /*
2882 * First try to allocate an io virtual address in
Yang Hongyang284901a2009-04-06 19:01:15 -07002883 * DMA_BIT_MASK(32) and if that fails then try allocating
Joe Perches36098012007-12-17 11:40:11 -08002884 * from higher range
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002885 */
David Woodhouse875764d2009-06-28 21:20:51 +01002886 iova = alloc_iova(&domain->iovad, nrpages,
2887 IOVA_PFN(DMA_BIT_MASK(32)), 1);
2888 if (iova)
2889 return iova;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002890 }
David Woodhouse875764d2009-06-28 21:20:51 +01002891 iova = alloc_iova(&domain->iovad, nrpages, IOVA_PFN(dma_mask), 1);
2892 if (unlikely(!iova)) {
2893 printk(KERN_ERR "Allocating %ld-page iova for %s failed",
David Woodhouse207e3592014-03-09 16:12:32 -07002894 nrpages, dev_name(dev));
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002895 return NULL;
2896 }
2897
2898 return iova;
2899}
2900
David Woodhoused4b709f2014-03-09 16:07:40 -07002901static struct dmar_domain *__get_valid_domain_for_dev(struct device *dev)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002902{
2903 struct dmar_domain *domain;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002904 int ret;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002905
David Woodhoused4b709f2014-03-09 16:07:40 -07002906 domain = get_domain_for_dev(dev, DEFAULT_DOMAIN_ADDRESS_WIDTH);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002907 if (!domain) {
David Woodhoused4b709f2014-03-09 16:07:40 -07002908 printk(KERN_ERR "Allocating domain for %s failed",
2909 dev_name(dev));
Al Viro4fe05bb2007-10-29 04:51:16 +00002910 return NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002911 }
2912
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002913 /* make sure context mapping is ok */
David Woodhoused4b709f2014-03-09 16:07:40 -07002914 if (unlikely(!domain_context_mapped(dev))) {
2915 ret = domain_context_mapping(domain, dev, CONTEXT_TT_MULTI_LEVEL);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002916 if (ret) {
David Woodhoused4b709f2014-03-09 16:07:40 -07002917 printk(KERN_ERR "Domain context map for %s failed",
2918 dev_name(dev));
Al Viro4fe05bb2007-10-29 04:51:16 +00002919 return NULL;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002920 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002921 }
2922
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002923 return domain;
2924}
2925
David Woodhoused4b709f2014-03-09 16:07:40 -07002926static inline struct dmar_domain *get_valid_domain_for_dev(struct device *dev)
David Woodhouse147202a2009-07-07 19:43:20 +01002927{
2928 struct device_domain_info *info;
2929
2930 /* No lock here, assumes no domain exit in normal case */
David Woodhoused4b709f2014-03-09 16:07:40 -07002931 info = dev->archdata.iommu;
David Woodhouse147202a2009-07-07 19:43:20 +01002932 if (likely(info))
2933 return info->domain;
2934
2935 return __get_valid_domain_for_dev(dev);
2936}
2937
David Woodhouse3d891942014-03-06 15:59:26 +00002938static int iommu_dummy(struct device *dev)
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002939{
David Woodhouse3d891942014-03-06 15:59:26 +00002940 return dev->archdata.iommu == DUMMY_DEVICE_DOMAIN_INFO;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002941}
2942
David Woodhouseecb509e2014-03-09 16:29:55 -07002943/* Check if the dev needs to go through non-identity map and unmap process.*/
David Woodhouse73676832009-07-04 14:08:36 +01002944static int iommu_no_mapping(struct device *dev)
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002945{
2946 int found;
2947
David Woodhouse3d891942014-03-06 15:59:26 +00002948 if (iommu_dummy(dev))
David Woodhouse1e4c64c2009-07-04 10:40:38 +01002949 return 1;
2950
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002951 if (!iommu_identity_mapping)
David Woodhouse1e4c64c2009-07-04 10:40:38 +01002952 return 0;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002953
David Woodhouse9b226622014-03-09 14:03:28 -07002954 found = identity_mapping(dev);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002955 if (found) {
David Woodhouseecb509e2014-03-09 16:29:55 -07002956 if (iommu_should_identity_map(dev, 0))
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002957 return 1;
2958 else {
2959 /*
2960 * 32 bit DMA is removed from si_domain and fall back
2961 * to non-identity mapping.
2962 */
David Woodhousebf9c9ed2014-03-09 16:19:13 -07002963 domain_remove_one_dev_info(si_domain, dev);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002964 printk(KERN_INFO "32bit %s uses non-identity mapping\n",
David Woodhouseecb509e2014-03-09 16:29:55 -07002965 dev_name(dev));
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002966 return 0;
2967 }
2968 } else {
2969 /*
2970 * In case of a detached 64 bit DMA device from vm, the device
2971 * is put into si_domain for identity mapping.
2972 */
David Woodhouseecb509e2014-03-09 16:29:55 -07002973 if (iommu_should_identity_map(dev, 0)) {
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002974 int ret;
David Woodhouse5913c9b2014-03-09 16:27:31 -07002975 ret = domain_add_dev_info(si_domain, dev,
David Woodhouse5fe60f42009-08-09 10:53:41 +01002976 hw_pass_through ?
2977 CONTEXT_TT_PASS_THROUGH :
2978 CONTEXT_TT_MULTI_LEVEL);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002979 if (!ret) {
2980 printk(KERN_INFO "64bit %s uses identity mapping\n",
David Woodhouseecb509e2014-03-09 16:29:55 -07002981 dev_name(dev));
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002982 return 1;
2983 }
2984 }
2985 }
2986
David Woodhouse1e4c64c2009-07-04 10:40:38 +01002987 return 0;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002988}
2989
David Woodhouse5040a912014-03-09 16:14:00 -07002990static dma_addr_t __intel_map_single(struct device *dev, phys_addr_t paddr,
FUJITA Tomonoribb9e6d62008-10-15 16:08:28 +09002991 size_t size, int dir, u64 dma_mask)
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002992{
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002993 struct dmar_domain *domain;
Fenghua Yu5b6985c2008-10-16 18:02:32 -07002994 phys_addr_t start_paddr;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002995 struct iova *iova;
2996 int prot = 0;
Ingo Molnar6865f0d2008-04-22 11:09:04 +02002997 int ret;
Weidong Han8c11e792008-12-08 15:29:22 +08002998 struct intel_iommu *iommu;
Fenghua Yu33041ec2009-08-04 15:10:59 -07002999 unsigned long paddr_pfn = paddr >> PAGE_SHIFT;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003000
3001 BUG_ON(dir == DMA_NONE);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07003002
David Woodhouse5040a912014-03-09 16:14:00 -07003003 if (iommu_no_mapping(dev))
Ingo Molnar6865f0d2008-04-22 11:09:04 +02003004 return paddr;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003005
David Woodhouse5040a912014-03-09 16:14:00 -07003006 domain = get_valid_domain_for_dev(dev);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003007 if (!domain)
3008 return 0;
3009
Weidong Han8c11e792008-12-08 15:29:22 +08003010 iommu = domain_get_iommu(domain);
David Woodhouse88cb6a72009-06-28 15:03:06 +01003011 size = aligned_nrpages(paddr, size);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003012
David Woodhouse5040a912014-03-09 16:14:00 -07003013 iova = intel_alloc_iova(dev, domain, dma_to_mm_pfn(size), dma_mask);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003014 if (!iova)
3015 goto error;
3016
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003017 /*
3018 * Check if DMAR supports zero-length reads on write only
3019 * mappings..
3020 */
3021 if (dir == DMA_TO_DEVICE || dir == DMA_BIDIRECTIONAL || \
Weidong Han8c11e792008-12-08 15:29:22 +08003022 !cap_zlr(iommu->cap))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003023 prot |= DMA_PTE_READ;
3024 if (dir == DMA_FROM_DEVICE || dir == DMA_BIDIRECTIONAL)
3025 prot |= DMA_PTE_WRITE;
3026 /*
Ingo Molnar6865f0d2008-04-22 11:09:04 +02003027 * paddr - (paddr + size) might be partial page, we should map the whole
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003028 * page. Note: if two part of one page are separately mapped, we
Ingo Molnar6865f0d2008-04-22 11:09:04 +02003029 * might have two guest_addr mapping to the same host paddr, but this
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003030 * is not a big problem
3031 */
David Woodhouse0ab36de2009-06-28 14:01:43 +01003032 ret = domain_pfn_mapping(domain, mm_to_dma_pfn(iova->pfn_lo),
Fenghua Yu33041ec2009-08-04 15:10:59 -07003033 mm_to_dma_pfn(paddr_pfn), size, prot);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003034 if (ret)
3035 goto error;
3036
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003037 /* it's a non-present to present mapping. Only flush if caching mode */
3038 if (cap_caching_mode(iommu->cap))
David Woodhouseea8ea462014-03-05 17:09:32 +00003039 iommu_flush_iotlb_psi(iommu, domain->id, mm_to_dma_pfn(iova->pfn_lo), size, 0, 1);
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003040 else
Weidong Han8c11e792008-12-08 15:29:22 +08003041 iommu_flush_write_buffer(iommu);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003042
David Woodhouse03d6a242009-06-28 15:33:46 +01003043 start_paddr = (phys_addr_t)iova->pfn_lo << PAGE_SHIFT;
3044 start_paddr += paddr & ~PAGE_MASK;
3045 return start_paddr;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003046
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003047error:
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003048 if (iova)
3049 __free_iova(&domain->iovad, iova);
David Woodhouse4cf2e752009-02-11 17:23:43 +00003050 printk(KERN_ERR"Device %s request: %zx@%llx dir %d --- failed\n",
David Woodhouse5040a912014-03-09 16:14:00 -07003051 dev_name(dev), size, (unsigned long long)paddr, dir);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003052 return 0;
3053}
3054
FUJITA Tomonoriffbbef52009-01-05 23:47:26 +09003055static dma_addr_t intel_map_page(struct device *dev, struct page *page,
3056 unsigned long offset, size_t size,
3057 enum dma_data_direction dir,
3058 struct dma_attrs *attrs)
FUJITA Tomonoribb9e6d62008-10-15 16:08:28 +09003059{
FUJITA Tomonoriffbbef52009-01-05 23:47:26 +09003060 return __intel_map_single(dev, page_to_phys(page) + offset, size,
David Woodhouse46333e32014-03-10 20:01:21 -07003061 dir, *dev->dma_mask);
FUJITA Tomonoribb9e6d62008-10-15 16:08:28 +09003062}
3063
mark gross5e0d2a62008-03-04 15:22:08 -08003064static void flush_unmaps(void)
3065{
mark gross80b20dd2008-04-18 13:53:58 -07003066 int i, j;
mark gross5e0d2a62008-03-04 15:22:08 -08003067
mark gross5e0d2a62008-03-04 15:22:08 -08003068 timer_on = 0;
3069
3070 /* just flush them all */
3071 for (i = 0; i < g_num_of_iommus; i++) {
Weidong Hana2bb8452008-12-08 11:24:12 +08003072 struct intel_iommu *iommu = g_iommus[i];
3073 if (!iommu)
3074 continue;
Suresh Siddhac42d9f32008-07-10 11:16:36 -07003075
Yu Zhao9dd2fe82009-05-18 13:51:36 +08003076 if (!deferred_flush[i].next)
3077 continue;
3078
Nadav Amit78d5f0f2010-04-08 23:00:41 +03003079 /* In caching mode, global flushes turn emulation expensive */
3080 if (!cap_caching_mode(iommu->cap))
3081 iommu->flush.flush_iotlb(iommu, 0, 0, 0,
Yu Zhao93a23a72009-05-18 13:51:37 +08003082 DMA_TLB_GLOBAL_FLUSH);
Yu Zhao9dd2fe82009-05-18 13:51:36 +08003083 for (j = 0; j < deferred_flush[i].next; j++) {
Yu Zhao93a23a72009-05-18 13:51:37 +08003084 unsigned long mask;
3085 struct iova *iova = deferred_flush[i].iova[j];
Nadav Amit78d5f0f2010-04-08 23:00:41 +03003086 struct dmar_domain *domain = deferred_flush[i].domain[j];
Yu Zhao93a23a72009-05-18 13:51:37 +08003087
Nadav Amit78d5f0f2010-04-08 23:00:41 +03003088 /* On real hardware multiple invalidations are expensive */
3089 if (cap_caching_mode(iommu->cap))
3090 iommu_flush_iotlb_psi(iommu, domain->id,
David Woodhouseea8ea462014-03-05 17:09:32 +00003091 iova->pfn_lo, iova->pfn_hi - iova->pfn_lo + 1,
3092 !deferred_flush[i].freelist[j], 0);
Nadav Amit78d5f0f2010-04-08 23:00:41 +03003093 else {
3094 mask = ilog2(mm_to_dma_pfn(iova->pfn_hi - iova->pfn_lo + 1));
3095 iommu_flush_dev_iotlb(deferred_flush[i].domain[j],
3096 (uint64_t)iova->pfn_lo << PAGE_SHIFT, mask);
3097 }
Yu Zhao93a23a72009-05-18 13:51:37 +08003098 __free_iova(&deferred_flush[i].domain[j]->iovad, iova);
David Woodhouseea8ea462014-03-05 17:09:32 +00003099 if (deferred_flush[i].freelist[j])
3100 dma_free_pagelist(deferred_flush[i].freelist[j]);
mark gross80b20dd2008-04-18 13:53:58 -07003101 }
Yu Zhao9dd2fe82009-05-18 13:51:36 +08003102 deferred_flush[i].next = 0;
mark gross5e0d2a62008-03-04 15:22:08 -08003103 }
3104
mark gross5e0d2a62008-03-04 15:22:08 -08003105 list_size = 0;
mark gross5e0d2a62008-03-04 15:22:08 -08003106}
3107
3108static void flush_unmaps_timeout(unsigned long data)
3109{
mark gross80b20dd2008-04-18 13:53:58 -07003110 unsigned long flags;
3111
3112 spin_lock_irqsave(&async_umap_flush_lock, flags);
mark gross5e0d2a62008-03-04 15:22:08 -08003113 flush_unmaps();
mark gross80b20dd2008-04-18 13:53:58 -07003114 spin_unlock_irqrestore(&async_umap_flush_lock, flags);
mark gross5e0d2a62008-03-04 15:22:08 -08003115}
3116
David Woodhouseea8ea462014-03-05 17:09:32 +00003117static void add_unmap(struct dmar_domain *dom, struct iova *iova, struct page *freelist)
mark gross5e0d2a62008-03-04 15:22:08 -08003118{
3119 unsigned long flags;
mark gross80b20dd2008-04-18 13:53:58 -07003120 int next, iommu_id;
Weidong Han8c11e792008-12-08 15:29:22 +08003121 struct intel_iommu *iommu;
mark gross5e0d2a62008-03-04 15:22:08 -08003122
3123 spin_lock_irqsave(&async_umap_flush_lock, flags);
mark gross80b20dd2008-04-18 13:53:58 -07003124 if (list_size == HIGH_WATER_MARK)
3125 flush_unmaps();
3126
Weidong Han8c11e792008-12-08 15:29:22 +08003127 iommu = domain_get_iommu(dom);
3128 iommu_id = iommu->seq_id;
Suresh Siddhac42d9f32008-07-10 11:16:36 -07003129
mark gross80b20dd2008-04-18 13:53:58 -07003130 next = deferred_flush[iommu_id].next;
3131 deferred_flush[iommu_id].domain[next] = dom;
3132 deferred_flush[iommu_id].iova[next] = iova;
David Woodhouseea8ea462014-03-05 17:09:32 +00003133 deferred_flush[iommu_id].freelist[next] = freelist;
mark gross80b20dd2008-04-18 13:53:58 -07003134 deferred_flush[iommu_id].next++;
mark gross5e0d2a62008-03-04 15:22:08 -08003135
3136 if (!timer_on) {
3137 mod_timer(&unmap_timer, jiffies + msecs_to_jiffies(10));
3138 timer_on = 1;
3139 }
3140 list_size++;
3141 spin_unlock_irqrestore(&async_umap_flush_lock, flags);
3142}
3143
FUJITA Tomonoriffbbef52009-01-05 23:47:26 +09003144static void intel_unmap_page(struct device *dev, dma_addr_t dev_addr,
3145 size_t size, enum dma_data_direction dir,
3146 struct dma_attrs *attrs)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003147{
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003148 struct dmar_domain *domain;
David Woodhoused794dc92009-06-28 00:27:49 +01003149 unsigned long start_pfn, last_pfn;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003150 struct iova *iova;
Weidong Han8c11e792008-12-08 15:29:22 +08003151 struct intel_iommu *iommu;
David Woodhouseea8ea462014-03-05 17:09:32 +00003152 struct page *freelist;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003153
David Woodhouse73676832009-07-04 14:08:36 +01003154 if (iommu_no_mapping(dev))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003155 return;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07003156
David Woodhouse1525a292014-03-06 16:19:30 +00003157 domain = find_domain(dev);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003158 BUG_ON(!domain);
3159
Weidong Han8c11e792008-12-08 15:29:22 +08003160 iommu = domain_get_iommu(domain);
3161
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003162 iova = find_iova(&domain->iovad, IOVA_PFN(dev_addr));
David Woodhouse85b98272009-07-01 19:27:53 +01003163 if (WARN_ONCE(!iova, "Driver unmaps unmatched page at PFN %llx\n",
3164 (unsigned long long)dev_addr))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003165 return;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003166
David Woodhoused794dc92009-06-28 00:27:49 +01003167 start_pfn = mm_to_dma_pfn(iova->pfn_lo);
3168 last_pfn = mm_to_dma_pfn(iova->pfn_hi + 1) - 1;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003169
David Woodhoused794dc92009-06-28 00:27:49 +01003170 pr_debug("Device %s unmapping: pfn %lx-%lx\n",
David Woodhouse207e3592014-03-09 16:12:32 -07003171 dev_name(dev), start_pfn, last_pfn);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003172
David Woodhouseea8ea462014-03-05 17:09:32 +00003173 freelist = domain_unmap(domain, start_pfn, last_pfn);
David Woodhoused794dc92009-06-28 00:27:49 +01003174
mark gross5e0d2a62008-03-04 15:22:08 -08003175 if (intel_iommu_strict) {
David Woodhouse03d6a242009-06-28 15:33:46 +01003176 iommu_flush_iotlb_psi(iommu, domain->id, start_pfn,
David Woodhouseea8ea462014-03-05 17:09:32 +00003177 last_pfn - start_pfn + 1, !freelist, 0);
mark gross5e0d2a62008-03-04 15:22:08 -08003178 /* free iova */
3179 __free_iova(&domain->iovad, iova);
David Woodhouseea8ea462014-03-05 17:09:32 +00003180 dma_free_pagelist(freelist);
mark gross5e0d2a62008-03-04 15:22:08 -08003181 } else {
David Woodhouseea8ea462014-03-05 17:09:32 +00003182 add_unmap(domain, iova, freelist);
mark gross5e0d2a62008-03-04 15:22:08 -08003183 /*
3184 * queue up the release of the unmap to save the 1/6th of the
3185 * cpu used up by the iotlb flush operation...
3186 */
mark gross5e0d2a62008-03-04 15:22:08 -08003187 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003188}
3189
David Woodhouse5040a912014-03-09 16:14:00 -07003190static void *intel_alloc_coherent(struct device *dev, size_t size,
Andrzej Pietrasiewiczbaa676f2012-03-27 14:28:18 +02003191 dma_addr_t *dma_handle, gfp_t flags,
3192 struct dma_attrs *attrs)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003193{
3194 void *vaddr;
3195 int order;
3196
Fenghua Yu5b6985c2008-10-16 18:02:32 -07003197 size = PAGE_ALIGN(size);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003198 order = get_order(size);
Alex Williamsone8bb9102009-11-04 15:59:34 -07003199
David Woodhouse5040a912014-03-09 16:14:00 -07003200 if (!iommu_no_mapping(dev))
Alex Williamsone8bb9102009-11-04 15:59:34 -07003201 flags &= ~(GFP_DMA | GFP_DMA32);
David Woodhouse5040a912014-03-09 16:14:00 -07003202 else if (dev->coherent_dma_mask < dma_get_required_mask(dev)) {
3203 if (dev->coherent_dma_mask < DMA_BIT_MASK(32))
Alex Williamsone8bb9102009-11-04 15:59:34 -07003204 flags |= GFP_DMA;
3205 else
3206 flags |= GFP_DMA32;
3207 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003208
3209 vaddr = (void *)__get_free_pages(flags, order);
3210 if (!vaddr)
3211 return NULL;
3212 memset(vaddr, 0, size);
3213
David Woodhouse5040a912014-03-09 16:14:00 -07003214 *dma_handle = __intel_map_single(dev, virt_to_bus(vaddr), size,
FUJITA Tomonoribb9e6d62008-10-15 16:08:28 +09003215 DMA_BIDIRECTIONAL,
David Woodhouse5040a912014-03-09 16:14:00 -07003216 dev->coherent_dma_mask);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003217 if (*dma_handle)
3218 return vaddr;
3219 free_pages((unsigned long)vaddr, order);
3220 return NULL;
3221}
3222
David Woodhouse5040a912014-03-09 16:14:00 -07003223static void intel_free_coherent(struct device *dev, size_t size, void *vaddr,
Andrzej Pietrasiewiczbaa676f2012-03-27 14:28:18 +02003224 dma_addr_t dma_handle, struct dma_attrs *attrs)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003225{
3226 int order;
3227
Fenghua Yu5b6985c2008-10-16 18:02:32 -07003228 size = PAGE_ALIGN(size);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003229 order = get_order(size);
3230
David Woodhouse5040a912014-03-09 16:14:00 -07003231 intel_unmap_page(dev, dma_handle, size, DMA_BIDIRECTIONAL, NULL);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003232 free_pages((unsigned long)vaddr, order);
3233}
3234
David Woodhouse5040a912014-03-09 16:14:00 -07003235static void intel_unmap_sg(struct device *dev, struct scatterlist *sglist,
FUJITA Tomonorid7ab5c42009-01-28 21:53:18 +09003236 int nelems, enum dma_data_direction dir,
3237 struct dma_attrs *attrs)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003238{
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003239 struct dmar_domain *domain;
David Woodhoused794dc92009-06-28 00:27:49 +01003240 unsigned long start_pfn, last_pfn;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003241 struct iova *iova;
Weidong Han8c11e792008-12-08 15:29:22 +08003242 struct intel_iommu *iommu;
David Woodhouseea8ea462014-03-05 17:09:32 +00003243 struct page *freelist;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003244
David Woodhouse5040a912014-03-09 16:14:00 -07003245 if (iommu_no_mapping(dev))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003246 return;
3247
David Woodhouse5040a912014-03-09 16:14:00 -07003248 domain = find_domain(dev);
Weidong Han8c11e792008-12-08 15:29:22 +08003249 BUG_ON(!domain);
3250
3251 iommu = domain_get_iommu(domain);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003252
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003253 iova = find_iova(&domain->iovad, IOVA_PFN(sglist[0].dma_address));
David Woodhouse85b98272009-07-01 19:27:53 +01003254 if (WARN_ONCE(!iova, "Driver unmaps unmatched sglist at PFN %llx\n",
3255 (unsigned long long)sglist[0].dma_address))
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003256 return;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003257
David Woodhoused794dc92009-06-28 00:27:49 +01003258 start_pfn = mm_to_dma_pfn(iova->pfn_lo);
3259 last_pfn = mm_to_dma_pfn(iova->pfn_hi + 1) - 1;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003260
David Woodhouseea8ea462014-03-05 17:09:32 +00003261 freelist = domain_unmap(domain, start_pfn, last_pfn);
David Woodhoused794dc92009-06-28 00:27:49 +01003262
David Woodhouseacea0012009-07-14 01:55:11 +01003263 if (intel_iommu_strict) {
3264 iommu_flush_iotlb_psi(iommu, domain->id, start_pfn,
David Woodhouseea8ea462014-03-05 17:09:32 +00003265 last_pfn - start_pfn + 1, !freelist, 0);
David Woodhouseacea0012009-07-14 01:55:11 +01003266 /* free iova */
3267 __free_iova(&domain->iovad, iova);
David Woodhouseea8ea462014-03-05 17:09:32 +00003268 dma_free_pagelist(freelist);
David Woodhouseacea0012009-07-14 01:55:11 +01003269 } else {
David Woodhouseea8ea462014-03-05 17:09:32 +00003270 add_unmap(domain, iova, freelist);
David Woodhouseacea0012009-07-14 01:55:11 +01003271 /*
3272 * queue up the release of the unmap to save the 1/6th of the
3273 * cpu used up by the iotlb flush operation...
3274 */
3275 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003276}
3277
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003278static int intel_nontranslate_map_sg(struct device *hddev,
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003279 struct scatterlist *sglist, int nelems, int dir)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003280{
3281 int i;
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003282 struct scatterlist *sg;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003283
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003284 for_each_sg(sglist, sg, nelems, i) {
FUJITA Tomonori12d4d402007-10-23 09:32:25 +02003285 BUG_ON(!sg_page(sg));
David Woodhouse4cf2e752009-02-11 17:23:43 +00003286 sg->dma_address = page_to_phys(sg_page(sg)) + sg->offset;
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003287 sg->dma_length = sg->length;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003288 }
3289 return nelems;
3290}
3291
David Woodhouse5040a912014-03-09 16:14:00 -07003292static int intel_map_sg(struct device *dev, struct scatterlist *sglist, int nelems,
FUJITA Tomonorid7ab5c42009-01-28 21:53:18 +09003293 enum dma_data_direction dir, struct dma_attrs *attrs)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003294{
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003295 int i;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003296 struct dmar_domain *domain;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003297 size_t size = 0;
3298 int prot = 0;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003299 struct iova *iova = NULL;
3300 int ret;
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003301 struct scatterlist *sg;
David Woodhouseb536d242009-06-28 14:49:31 +01003302 unsigned long start_vpfn;
Weidong Han8c11e792008-12-08 15:29:22 +08003303 struct intel_iommu *iommu;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003304
3305 BUG_ON(dir == DMA_NONE);
David Woodhouse5040a912014-03-09 16:14:00 -07003306 if (iommu_no_mapping(dev))
3307 return intel_nontranslate_map_sg(dev, sglist, nelems, dir);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003308
David Woodhouse5040a912014-03-09 16:14:00 -07003309 domain = get_valid_domain_for_dev(dev);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003310 if (!domain)
3311 return 0;
3312
Weidong Han8c11e792008-12-08 15:29:22 +08003313 iommu = domain_get_iommu(domain);
3314
David Woodhouseb536d242009-06-28 14:49:31 +01003315 for_each_sg(sglist, sg, nelems, i)
David Woodhouse88cb6a72009-06-28 15:03:06 +01003316 size += aligned_nrpages(sg->offset, sg->length);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003317
David Woodhouse5040a912014-03-09 16:14:00 -07003318 iova = intel_alloc_iova(dev, domain, dma_to_mm_pfn(size),
3319 *dev->dma_mask);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003320 if (!iova) {
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003321 sglist->dma_length = 0;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003322 return 0;
3323 }
3324
3325 /*
3326 * Check if DMAR supports zero-length reads on write only
3327 * mappings..
3328 */
3329 if (dir == DMA_TO_DEVICE || dir == DMA_BIDIRECTIONAL || \
Weidong Han8c11e792008-12-08 15:29:22 +08003330 !cap_zlr(iommu->cap))
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003331 prot |= DMA_PTE_READ;
3332 if (dir == DMA_FROM_DEVICE || dir == DMA_BIDIRECTIONAL)
3333 prot |= DMA_PTE_WRITE;
3334
David Woodhouseb536d242009-06-28 14:49:31 +01003335 start_vpfn = mm_to_dma_pfn(iova->pfn_lo);
David Woodhousee1605492009-06-29 11:17:38 +01003336
Fenghua Yuf5329592009-08-04 15:09:37 -07003337 ret = domain_sg_mapping(domain, start_vpfn, sglist, size, prot);
David Woodhousee1605492009-06-29 11:17:38 +01003338 if (unlikely(ret)) {
3339 /* clear the page */
3340 dma_pte_clear_range(domain, start_vpfn,
3341 start_vpfn + size - 1);
3342 /* free page tables */
3343 dma_pte_free_pagetable(domain, start_vpfn,
3344 start_vpfn + size - 1);
3345 /* free iova */
3346 __free_iova(&domain->iovad, iova);
3347 return 0;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003348 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003349
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003350 /* it's a non-present to present mapping. Only flush if caching mode */
3351 if (cap_caching_mode(iommu->cap))
David Woodhouseea8ea462014-03-05 17:09:32 +00003352 iommu_flush_iotlb_psi(iommu, domain->id, start_vpfn, size, 0, 1);
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003353 else
Weidong Han8c11e792008-12-08 15:29:22 +08003354 iommu_flush_write_buffer(iommu);
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003355
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003356 return nelems;
3357}
3358
FUJITA Tomonoridfb805e2009-01-28 21:53:17 +09003359static int intel_mapping_error(struct device *dev, dma_addr_t dma_addr)
3360{
3361 return !dma_addr;
3362}
3363
FUJITA Tomonori160c1d82009-01-05 23:59:02 +09003364struct dma_map_ops intel_dma_ops = {
Andrzej Pietrasiewiczbaa676f2012-03-27 14:28:18 +02003365 .alloc = intel_alloc_coherent,
3366 .free = intel_free_coherent,
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003367 .map_sg = intel_map_sg,
3368 .unmap_sg = intel_unmap_sg,
FUJITA Tomonoriffbbef52009-01-05 23:47:26 +09003369 .map_page = intel_map_page,
3370 .unmap_page = intel_unmap_page,
FUJITA Tomonoridfb805e2009-01-28 21:53:17 +09003371 .mapping_error = intel_mapping_error,
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003372};
3373
3374static inline int iommu_domain_cache_init(void)
3375{
3376 int ret = 0;
3377
3378 iommu_domain_cache = kmem_cache_create("iommu_domain",
3379 sizeof(struct dmar_domain),
3380 0,
3381 SLAB_HWCACHE_ALIGN,
3382
3383 NULL);
3384 if (!iommu_domain_cache) {
3385 printk(KERN_ERR "Couldn't create iommu_domain cache\n");
3386 ret = -ENOMEM;
3387 }
3388
3389 return ret;
3390}
3391
3392static inline int iommu_devinfo_cache_init(void)
3393{
3394 int ret = 0;
3395
3396 iommu_devinfo_cache = kmem_cache_create("iommu_devinfo",
3397 sizeof(struct device_domain_info),
3398 0,
3399 SLAB_HWCACHE_ALIGN,
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003400 NULL);
3401 if (!iommu_devinfo_cache) {
3402 printk(KERN_ERR "Couldn't create devinfo cache\n");
3403 ret = -ENOMEM;
3404 }
3405
3406 return ret;
3407}
3408
3409static inline int iommu_iova_cache_init(void)
3410{
3411 int ret = 0;
3412
3413 iommu_iova_cache = kmem_cache_create("iommu_iova",
3414 sizeof(struct iova),
3415 0,
3416 SLAB_HWCACHE_ALIGN,
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003417 NULL);
3418 if (!iommu_iova_cache) {
3419 printk(KERN_ERR "Couldn't create iova cache\n");
3420 ret = -ENOMEM;
3421 }
3422
3423 return ret;
3424}
3425
3426static int __init iommu_init_mempool(void)
3427{
3428 int ret;
3429 ret = iommu_iova_cache_init();
3430 if (ret)
3431 return ret;
3432
3433 ret = iommu_domain_cache_init();
3434 if (ret)
3435 goto domain_error;
3436
3437 ret = iommu_devinfo_cache_init();
3438 if (!ret)
3439 return ret;
3440
3441 kmem_cache_destroy(iommu_domain_cache);
3442domain_error:
3443 kmem_cache_destroy(iommu_iova_cache);
3444
3445 return -ENOMEM;
3446}
3447
3448static void __init iommu_exit_mempool(void)
3449{
3450 kmem_cache_destroy(iommu_devinfo_cache);
3451 kmem_cache_destroy(iommu_domain_cache);
3452 kmem_cache_destroy(iommu_iova_cache);
3453
3454}
3455
Dan Williams556ab452010-07-23 15:47:56 -07003456static void quirk_ioat_snb_local_iommu(struct pci_dev *pdev)
3457{
3458 struct dmar_drhd_unit *drhd;
3459 u32 vtbar;
3460 int rc;
3461
3462 /* We know that this device on this chipset has its own IOMMU.
3463 * If we find it under a different IOMMU, then the BIOS is lying
3464 * to us. Hope that the IOMMU for this device is actually
3465 * disabled, and it needs no translation...
3466 */
3467 rc = pci_bus_read_config_dword(pdev->bus, PCI_DEVFN(0, 0), 0xb0, &vtbar);
3468 if (rc) {
3469 /* "can't" happen */
3470 dev_info(&pdev->dev, "failed to run vt-d quirk\n");
3471 return;
3472 }
3473 vtbar &= 0xffff0000;
3474
3475 /* we know that the this iommu should be at offset 0xa000 from vtbar */
3476 drhd = dmar_find_matched_drhd_unit(pdev);
3477 if (WARN_TAINT_ONCE(!drhd || drhd->reg_base_addr - vtbar != 0xa000,
3478 TAINT_FIRMWARE_WORKAROUND,
3479 "BIOS assigned incorrect VT-d unit for Intel(R) QuickData Technology device\n"))
3480 pdev->dev.archdata.iommu = DUMMY_DEVICE_DOMAIN_INFO;
3481}
3482DECLARE_PCI_FIXUP_ENABLE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_INTEL_IOAT_SNB, quirk_ioat_snb_local_iommu);
3483
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003484static void __init init_no_remapping_devices(void)
3485{
3486 struct dmar_drhd_unit *drhd;
David Woodhouse832bd852014-03-07 15:08:36 +00003487 struct device *dev;
Jiang Liub683b232014-02-19 14:07:32 +08003488 int i;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003489
3490 for_each_drhd_unit(drhd) {
3491 if (!drhd->include_all) {
Jiang Liub683b232014-02-19 14:07:32 +08003492 for_each_active_dev_scope(drhd->devices,
3493 drhd->devices_cnt, i, dev)
3494 break;
David Woodhouse832bd852014-03-07 15:08:36 +00003495 /* ignore DMAR unit if no devices exist */
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003496 if (i == drhd->devices_cnt)
3497 drhd->ignored = 1;
3498 }
3499 }
3500
Jiang Liu7c919772014-01-06 14:18:18 +08003501 for_each_active_drhd_unit(drhd) {
Jiang Liu7c919772014-01-06 14:18:18 +08003502 if (drhd->include_all)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003503 continue;
3504
Jiang Liub683b232014-02-19 14:07:32 +08003505 for_each_active_dev_scope(drhd->devices,
3506 drhd->devices_cnt, i, dev)
David Woodhouse832bd852014-03-07 15:08:36 +00003507 if (!dev_is_pci(dev) || !IS_GFX_DEVICE(to_pci_dev(dev)))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003508 break;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003509 if (i < drhd->devices_cnt)
3510 continue;
3511
David Woodhousec0771df2011-10-14 20:59:46 +01003512 /* This IOMMU has *only* gfx devices. Either bypass it or
3513 set the gfx_mapped flag, as appropriate */
3514 if (dmar_map_gfx) {
3515 intel_iommu_gfx_mapped = 1;
3516 } else {
3517 drhd->ignored = 1;
Jiang Liub683b232014-02-19 14:07:32 +08003518 for_each_active_dev_scope(drhd->devices,
3519 drhd->devices_cnt, i, dev)
David Woodhouse832bd852014-03-07 15:08:36 +00003520 dev->archdata.iommu = DUMMY_DEVICE_DOMAIN_INFO;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003521 }
3522 }
3523}
3524
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003525#ifdef CONFIG_SUSPEND
3526static int init_iommu_hw(void)
3527{
3528 struct dmar_drhd_unit *drhd;
3529 struct intel_iommu *iommu = NULL;
3530
3531 for_each_active_iommu(iommu, drhd)
3532 if (iommu->qi)
3533 dmar_reenable_qi(iommu);
3534
Joseph Cihulab7792602011-05-03 00:08:37 -07003535 for_each_iommu(iommu, drhd) {
3536 if (drhd->ignored) {
3537 /*
3538 * we always have to disable PMRs or DMA may fail on
3539 * this device
3540 */
3541 if (force_on)
3542 iommu_disable_protect_mem_regions(iommu);
3543 continue;
3544 }
3545
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003546 iommu_flush_write_buffer(iommu);
3547
3548 iommu_set_root_entry(iommu);
3549
3550 iommu->flush.flush_context(iommu, 0, 0, 0,
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003551 DMA_CCMD_GLOBAL_INVL);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003552 iommu->flush.flush_iotlb(iommu, 0, 0, 0,
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003553 DMA_TLB_GLOBAL_FLUSH);
Joseph Cihulab7792602011-05-03 00:08:37 -07003554 if (iommu_enable_translation(iommu))
3555 return 1;
David Woodhouseb94996c2009-09-19 15:28:12 -07003556 iommu_disable_protect_mem_regions(iommu);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003557 }
3558
3559 return 0;
3560}
3561
3562static void iommu_flush_all(void)
3563{
3564 struct dmar_drhd_unit *drhd;
3565 struct intel_iommu *iommu;
3566
3567 for_each_active_iommu(iommu, drhd) {
3568 iommu->flush.flush_context(iommu, 0, 0, 0,
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003569 DMA_CCMD_GLOBAL_INVL);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003570 iommu->flush.flush_iotlb(iommu, 0, 0, 0,
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003571 DMA_TLB_GLOBAL_FLUSH);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003572 }
3573}
3574
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01003575static int iommu_suspend(void)
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003576{
3577 struct dmar_drhd_unit *drhd;
3578 struct intel_iommu *iommu = NULL;
3579 unsigned long flag;
3580
3581 for_each_active_iommu(iommu, drhd) {
3582 iommu->iommu_state = kzalloc(sizeof(u32) * MAX_SR_DMAR_REGS,
3583 GFP_ATOMIC);
3584 if (!iommu->iommu_state)
3585 goto nomem;
3586 }
3587
3588 iommu_flush_all();
3589
3590 for_each_active_iommu(iommu, drhd) {
3591 iommu_disable_translation(iommu);
3592
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02003593 raw_spin_lock_irqsave(&iommu->register_lock, flag);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003594
3595 iommu->iommu_state[SR_DMAR_FECTL_REG] =
3596 readl(iommu->reg + DMAR_FECTL_REG);
3597 iommu->iommu_state[SR_DMAR_FEDATA_REG] =
3598 readl(iommu->reg + DMAR_FEDATA_REG);
3599 iommu->iommu_state[SR_DMAR_FEADDR_REG] =
3600 readl(iommu->reg + DMAR_FEADDR_REG);
3601 iommu->iommu_state[SR_DMAR_FEUADDR_REG] =
3602 readl(iommu->reg + DMAR_FEUADDR_REG);
3603
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02003604 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003605 }
3606 return 0;
3607
3608nomem:
3609 for_each_active_iommu(iommu, drhd)
3610 kfree(iommu->iommu_state);
3611
3612 return -ENOMEM;
3613}
3614
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01003615static void iommu_resume(void)
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003616{
3617 struct dmar_drhd_unit *drhd;
3618 struct intel_iommu *iommu = NULL;
3619 unsigned long flag;
3620
3621 if (init_iommu_hw()) {
Joseph Cihulab7792602011-05-03 00:08:37 -07003622 if (force_on)
3623 panic("tboot: IOMMU setup failed, DMAR can not resume!\n");
3624 else
3625 WARN(1, "IOMMU setup failed, DMAR can not resume!\n");
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01003626 return;
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003627 }
3628
3629 for_each_active_iommu(iommu, drhd) {
3630
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02003631 raw_spin_lock_irqsave(&iommu->register_lock, flag);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003632
3633 writel(iommu->iommu_state[SR_DMAR_FECTL_REG],
3634 iommu->reg + DMAR_FECTL_REG);
3635 writel(iommu->iommu_state[SR_DMAR_FEDATA_REG],
3636 iommu->reg + DMAR_FEDATA_REG);
3637 writel(iommu->iommu_state[SR_DMAR_FEADDR_REG],
3638 iommu->reg + DMAR_FEADDR_REG);
3639 writel(iommu->iommu_state[SR_DMAR_FEUADDR_REG],
3640 iommu->reg + DMAR_FEUADDR_REG);
3641
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02003642 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003643 }
3644
3645 for_each_active_iommu(iommu, drhd)
3646 kfree(iommu->iommu_state);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003647}
3648
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01003649static struct syscore_ops iommu_syscore_ops = {
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003650 .resume = iommu_resume,
3651 .suspend = iommu_suspend,
3652};
3653
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01003654static void __init init_iommu_pm_ops(void)
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003655{
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01003656 register_syscore_ops(&iommu_syscore_ops);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003657}
3658
3659#else
Rafael J. Wysocki99592ba2011-06-07 21:32:31 +02003660static inline void init_iommu_pm_ops(void) {}
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003661#endif /* CONFIG_PM */
3662
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003663
3664int __init dmar_parse_one_rmrr(struct acpi_dmar_header *header)
3665{
3666 struct acpi_dmar_reserved_memory *rmrr;
3667 struct dmar_rmrr_unit *rmrru;
3668
3669 rmrru = kzalloc(sizeof(*rmrru), GFP_KERNEL);
3670 if (!rmrru)
3671 return -ENOMEM;
3672
3673 rmrru->hdr = header;
3674 rmrr = (struct acpi_dmar_reserved_memory *)header;
3675 rmrru->base_address = rmrr->base_address;
3676 rmrru->end_address = rmrr->end_address;
Jiang Liu2e455282014-02-19 14:07:36 +08003677 rmrru->devices = dmar_alloc_dev_scope((void *)(rmrr + 1),
3678 ((void *)rmrr) + rmrr->header.length,
3679 &rmrru->devices_cnt);
3680 if (rmrru->devices_cnt && rmrru->devices == NULL) {
3681 kfree(rmrru);
3682 return -ENOMEM;
3683 }
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003684
Jiang Liu2e455282014-02-19 14:07:36 +08003685 list_add(&rmrru->list, &dmar_rmrr_units);
3686
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003687 return 0;
3688}
3689
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003690int __init dmar_parse_one_atsr(struct acpi_dmar_header *hdr)
3691{
3692 struct acpi_dmar_atsr *atsr;
3693 struct dmar_atsr_unit *atsru;
3694
3695 atsr = container_of(hdr, struct acpi_dmar_atsr, header);
3696 atsru = kzalloc(sizeof(*atsru), GFP_KERNEL);
3697 if (!atsru)
3698 return -ENOMEM;
3699
3700 atsru->hdr = hdr;
3701 atsru->include_all = atsr->flags & 0x1;
Jiang Liu2e455282014-02-19 14:07:36 +08003702 if (!atsru->include_all) {
3703 atsru->devices = dmar_alloc_dev_scope((void *)(atsr + 1),
3704 (void *)atsr + atsr->header.length,
3705 &atsru->devices_cnt);
3706 if (atsru->devices_cnt && atsru->devices == NULL) {
3707 kfree(atsru);
3708 return -ENOMEM;
3709 }
3710 }
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003711
Jiang Liu0e242612014-02-19 14:07:34 +08003712 list_add_rcu(&atsru->list, &dmar_atsr_units);
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003713
3714 return 0;
3715}
3716
Jiang Liu9bdc5312014-01-06 14:18:27 +08003717static void intel_iommu_free_atsr(struct dmar_atsr_unit *atsru)
3718{
3719 dmar_free_dev_scope(&atsru->devices, &atsru->devices_cnt);
3720 kfree(atsru);
3721}
3722
3723static void intel_iommu_free_dmars(void)
3724{
3725 struct dmar_rmrr_unit *rmrru, *rmrr_n;
3726 struct dmar_atsr_unit *atsru, *atsr_n;
3727
3728 list_for_each_entry_safe(rmrru, rmrr_n, &dmar_rmrr_units, list) {
3729 list_del(&rmrru->list);
3730 dmar_free_dev_scope(&rmrru->devices, &rmrru->devices_cnt);
3731 kfree(rmrru);
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003732 }
3733
Jiang Liu9bdc5312014-01-06 14:18:27 +08003734 list_for_each_entry_safe(atsru, atsr_n, &dmar_atsr_units, list) {
3735 list_del(&atsru->list);
3736 intel_iommu_free_atsr(atsru);
3737 }
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003738}
3739
3740int dmar_find_matched_atsr_unit(struct pci_dev *dev)
3741{
Jiang Liub683b232014-02-19 14:07:32 +08003742 int i, ret = 1;
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003743 struct pci_bus *bus;
David Woodhouse832bd852014-03-07 15:08:36 +00003744 struct pci_dev *bridge = NULL;
3745 struct device *tmp;
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003746 struct acpi_dmar_atsr *atsr;
3747 struct dmar_atsr_unit *atsru;
3748
3749 dev = pci_physfn(dev);
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003750 for (bus = dev->bus; bus; bus = bus->parent) {
Jiang Liub5f82dd2014-02-19 14:07:31 +08003751 bridge = bus->self;
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003752 if (!bridge || !pci_is_pcie(bridge) ||
Yijing Wang62f87c02012-07-24 17:20:03 +08003753 pci_pcie_type(bridge) == PCI_EXP_TYPE_PCI_BRIDGE)
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003754 return 0;
Jiang Liub5f82dd2014-02-19 14:07:31 +08003755 if (pci_pcie_type(bridge) == PCI_EXP_TYPE_ROOT_PORT)
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003756 break;
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003757 }
Jiang Liub5f82dd2014-02-19 14:07:31 +08003758 if (!bridge)
3759 return 0;
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003760
Jiang Liu0e242612014-02-19 14:07:34 +08003761 rcu_read_lock();
Jiang Liub5f82dd2014-02-19 14:07:31 +08003762 list_for_each_entry_rcu(atsru, &dmar_atsr_units, list) {
3763 atsr = container_of(atsru->hdr, struct acpi_dmar_atsr, header);
3764 if (atsr->segment != pci_domain_nr(dev->bus))
3765 continue;
3766
Jiang Liub683b232014-02-19 14:07:32 +08003767 for_each_dev_scope(atsru->devices, atsru->devices_cnt, i, tmp)
David Woodhouse832bd852014-03-07 15:08:36 +00003768 if (tmp == &bridge->dev)
Jiang Liub683b232014-02-19 14:07:32 +08003769 goto out;
Jiang Liub5f82dd2014-02-19 14:07:31 +08003770
3771 if (atsru->include_all)
Jiang Liub683b232014-02-19 14:07:32 +08003772 goto out;
Jiang Liub5f82dd2014-02-19 14:07:31 +08003773 }
Jiang Liub683b232014-02-19 14:07:32 +08003774 ret = 0;
3775out:
Jiang Liu0e242612014-02-19 14:07:34 +08003776 rcu_read_unlock();
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003777
Jiang Liub683b232014-02-19 14:07:32 +08003778 return ret;
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003779}
3780
Jiang Liu59ce0512014-02-19 14:07:35 +08003781int dmar_iommu_notify_scope_dev(struct dmar_pci_notify_info *info)
3782{
3783 int ret = 0;
3784 struct dmar_rmrr_unit *rmrru;
3785 struct dmar_atsr_unit *atsru;
3786 struct acpi_dmar_atsr *atsr;
3787 struct acpi_dmar_reserved_memory *rmrr;
3788
3789 if (!intel_iommu_enabled && system_state != SYSTEM_BOOTING)
3790 return 0;
3791
3792 list_for_each_entry(rmrru, &dmar_rmrr_units, list) {
3793 rmrr = container_of(rmrru->hdr,
3794 struct acpi_dmar_reserved_memory, header);
3795 if (info->event == BUS_NOTIFY_ADD_DEVICE) {
3796 ret = dmar_insert_dev_scope(info, (void *)(rmrr + 1),
3797 ((void *)rmrr) + rmrr->header.length,
3798 rmrr->segment, rmrru->devices,
3799 rmrru->devices_cnt);
3800 if (ret > 0)
3801 break;
3802 else if(ret < 0)
3803 return ret;
3804 } else if (info->event == BUS_NOTIFY_DEL_DEVICE) {
3805 if (dmar_remove_dev_scope(info, rmrr->segment,
3806 rmrru->devices, rmrru->devices_cnt))
3807 break;
3808 }
3809 }
3810
3811 list_for_each_entry(atsru, &dmar_atsr_units, list) {
3812 if (atsru->include_all)
3813 continue;
3814
3815 atsr = container_of(atsru->hdr, struct acpi_dmar_atsr, header);
3816 if (info->event == BUS_NOTIFY_ADD_DEVICE) {
3817 ret = dmar_insert_dev_scope(info, (void *)(atsr + 1),
3818 (void *)atsr + atsr->header.length,
3819 atsr->segment, atsru->devices,
3820 atsru->devices_cnt);
3821 if (ret > 0)
3822 break;
3823 else if(ret < 0)
3824 return ret;
3825 } else if (info->event == BUS_NOTIFY_DEL_DEVICE) {
3826 if (dmar_remove_dev_scope(info, atsr->segment,
3827 atsru->devices, atsru->devices_cnt))
3828 break;
3829 }
3830 }
3831
3832 return 0;
3833}
3834
Fenghua Yu99dcade2009-11-11 07:23:06 -08003835/*
3836 * Here we only respond to action of unbound device from driver.
3837 *
3838 * Added device is not attached to its DMAR domain here yet. That will happen
3839 * when mapping the device to iova.
3840 */
3841static int device_notifier(struct notifier_block *nb,
3842 unsigned long action, void *data)
3843{
3844 struct device *dev = data;
Fenghua Yu99dcade2009-11-11 07:23:06 -08003845 struct dmar_domain *domain;
3846
David Woodhouse3d891942014-03-06 15:59:26 +00003847 if (iommu_dummy(dev))
David Woodhouse44cd6132009-12-02 10:18:30 +00003848 return 0;
3849
Jiang Liu7e7dfab2014-02-19 14:07:23 +08003850 if (action != BUS_NOTIFY_UNBOUND_DRIVER &&
3851 action != BUS_NOTIFY_DEL_DEVICE)
3852 return 0;
3853
David Woodhouse1525a292014-03-06 16:19:30 +00003854 domain = find_domain(dev);
Fenghua Yu99dcade2009-11-11 07:23:06 -08003855 if (!domain)
3856 return 0;
3857
Jiang Liu3a5670e2014-02-19 14:07:33 +08003858 down_read(&dmar_global_lock);
David Woodhousebf9c9ed2014-03-09 16:19:13 -07003859 domain_remove_one_dev_info(domain, dev);
Jiang Liu7e7dfab2014-02-19 14:07:23 +08003860 if (!(domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE) &&
3861 !(domain->flags & DOMAIN_FLAG_STATIC_IDENTITY) &&
3862 list_empty(&domain->devices))
3863 domain_exit(domain);
Jiang Liu3a5670e2014-02-19 14:07:33 +08003864 up_read(&dmar_global_lock);
Alex Williamsona97590e2011-03-04 14:52:16 -07003865
Fenghua Yu99dcade2009-11-11 07:23:06 -08003866 return 0;
3867}
3868
3869static struct notifier_block device_nb = {
3870 .notifier_call = device_notifier,
3871};
3872
Jiang Liu75f05562014-02-19 14:07:37 +08003873static int intel_iommu_memory_notifier(struct notifier_block *nb,
3874 unsigned long val, void *v)
3875{
3876 struct memory_notify *mhp = v;
3877 unsigned long long start, end;
3878 unsigned long start_vpfn, last_vpfn;
3879
3880 switch (val) {
3881 case MEM_GOING_ONLINE:
3882 start = mhp->start_pfn << PAGE_SHIFT;
3883 end = ((mhp->start_pfn + mhp->nr_pages) << PAGE_SHIFT) - 1;
3884 if (iommu_domain_identity_map(si_domain, start, end)) {
3885 pr_warn("dmar: failed to build identity map for [%llx-%llx]\n",
3886 start, end);
3887 return NOTIFY_BAD;
3888 }
3889 break;
3890
3891 case MEM_OFFLINE:
3892 case MEM_CANCEL_ONLINE:
3893 start_vpfn = mm_to_dma_pfn(mhp->start_pfn);
3894 last_vpfn = mm_to_dma_pfn(mhp->start_pfn + mhp->nr_pages - 1);
3895 while (start_vpfn <= last_vpfn) {
3896 struct iova *iova;
3897 struct dmar_drhd_unit *drhd;
3898 struct intel_iommu *iommu;
David Woodhouseea8ea462014-03-05 17:09:32 +00003899 struct page *freelist;
Jiang Liu75f05562014-02-19 14:07:37 +08003900
3901 iova = find_iova(&si_domain->iovad, start_vpfn);
3902 if (iova == NULL) {
3903 pr_debug("dmar: failed get IOVA for PFN %lx\n",
3904 start_vpfn);
3905 break;
3906 }
3907
3908 iova = split_and_remove_iova(&si_domain->iovad, iova,
3909 start_vpfn, last_vpfn);
3910 if (iova == NULL) {
3911 pr_warn("dmar: failed to split IOVA PFN [%lx-%lx]\n",
3912 start_vpfn, last_vpfn);
3913 return NOTIFY_BAD;
3914 }
3915
David Woodhouseea8ea462014-03-05 17:09:32 +00003916 freelist = domain_unmap(si_domain, iova->pfn_lo,
3917 iova->pfn_hi);
3918
Jiang Liu75f05562014-02-19 14:07:37 +08003919 rcu_read_lock();
3920 for_each_active_iommu(iommu, drhd)
3921 iommu_flush_iotlb_psi(iommu, si_domain->id,
3922 iova->pfn_lo,
David Woodhouseea8ea462014-03-05 17:09:32 +00003923 iova->pfn_hi - iova->pfn_lo + 1,
3924 !freelist, 0);
Jiang Liu75f05562014-02-19 14:07:37 +08003925 rcu_read_unlock();
David Woodhouseea8ea462014-03-05 17:09:32 +00003926 dma_free_pagelist(freelist);
Jiang Liu75f05562014-02-19 14:07:37 +08003927
3928 start_vpfn = iova->pfn_hi + 1;
3929 free_iova_mem(iova);
3930 }
3931 break;
3932 }
3933
3934 return NOTIFY_OK;
3935}
3936
3937static struct notifier_block intel_iommu_memory_nb = {
3938 .notifier_call = intel_iommu_memory_notifier,
3939 .priority = 0
3940};
3941
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003942int __init intel_iommu_init(void)
3943{
Jiang Liu9bdc5312014-01-06 14:18:27 +08003944 int ret = -ENODEV;
Takao Indoh3a93c842013-04-23 17:35:03 +09003945 struct dmar_drhd_unit *drhd;
Jiang Liu7c919772014-01-06 14:18:18 +08003946 struct intel_iommu *iommu;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003947
Joseph Cihulaa59b50e2009-06-30 19:31:10 -07003948 /* VT-d is required for a TXT/tboot launch, so enforce that */
3949 force_on = tboot_force_iommu();
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003950
Jiang Liu3a5670e2014-02-19 14:07:33 +08003951 if (iommu_init_mempool()) {
3952 if (force_on)
3953 panic("tboot: Failed to initialize iommu memory\n");
3954 return -ENOMEM;
3955 }
3956
3957 down_write(&dmar_global_lock);
Joseph Cihulaa59b50e2009-06-30 19:31:10 -07003958 if (dmar_table_init()) {
3959 if (force_on)
3960 panic("tboot: Failed to initialize DMAR table\n");
Jiang Liu9bdc5312014-01-06 14:18:27 +08003961 goto out_free_dmar;
Joseph Cihulaa59b50e2009-06-30 19:31:10 -07003962 }
3963
Takao Indoh3a93c842013-04-23 17:35:03 +09003964 /*
3965 * Disable translation if already enabled prior to OS handover.
3966 */
Jiang Liu7c919772014-01-06 14:18:18 +08003967 for_each_active_iommu(iommu, drhd)
Takao Indoh3a93c842013-04-23 17:35:03 +09003968 if (iommu->gcmd & DMA_GCMD_TE)
3969 iommu_disable_translation(iommu);
Takao Indoh3a93c842013-04-23 17:35:03 +09003970
Suresh Siddhac2c72862011-08-23 17:05:19 -07003971 if (dmar_dev_scope_init() < 0) {
Joseph Cihulaa59b50e2009-06-30 19:31:10 -07003972 if (force_on)
3973 panic("tboot: Failed to initialize DMAR device scope\n");
Jiang Liu9bdc5312014-01-06 14:18:27 +08003974 goto out_free_dmar;
Joseph Cihulaa59b50e2009-06-30 19:31:10 -07003975 }
Suresh Siddha1886e8a2008-07-10 11:16:37 -07003976
FUJITA Tomonori75f1cdf2009-11-10 19:46:20 +09003977 if (no_iommu || dmar_disabled)
Jiang Liu9bdc5312014-01-06 14:18:27 +08003978 goto out_free_dmar;
Suresh Siddha2ae21012008-07-10 11:16:43 -07003979
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003980 if (list_empty(&dmar_rmrr_units))
3981 printk(KERN_INFO "DMAR: No RMRR found\n");
3982
3983 if (list_empty(&dmar_atsr_units))
3984 printk(KERN_INFO "DMAR: No ATSR found\n");
3985
Joseph Cihula51a63e62011-03-21 11:04:24 -07003986 if (dmar_init_reserved_ranges()) {
3987 if (force_on)
3988 panic("tboot: Failed to reserve iommu ranges\n");
Jiang Liu3a5670e2014-02-19 14:07:33 +08003989 goto out_free_reserved_range;
Joseph Cihula51a63e62011-03-21 11:04:24 -07003990 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003991
3992 init_no_remapping_devices();
3993
Joseph Cihulab7792602011-05-03 00:08:37 -07003994 ret = init_dmars();
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003995 if (ret) {
Joseph Cihulaa59b50e2009-06-30 19:31:10 -07003996 if (force_on)
3997 panic("tboot: Failed to initialize DMARs\n");
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003998 printk(KERN_ERR "IOMMU: dmar init failed\n");
Jiang Liu9bdc5312014-01-06 14:18:27 +08003999 goto out_free_reserved_range;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07004000 }
Jiang Liu3a5670e2014-02-19 14:07:33 +08004001 up_write(&dmar_global_lock);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07004002 printk(KERN_INFO
4003 "PCI-DMA: Intel(R) Virtualization Technology for Directed I/O\n");
4004
mark gross5e0d2a62008-03-04 15:22:08 -08004005 init_timer(&unmap_timer);
FUJITA Tomonori75f1cdf2009-11-10 19:46:20 +09004006#ifdef CONFIG_SWIOTLB
4007 swiotlb = 0;
4008#endif
David Woodhouse19943b02009-08-04 16:19:20 +01004009 dma_ops = &intel_dma_ops;
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07004010
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01004011 init_iommu_pm_ops();
Joerg Roedela8bcbb0d2008-12-03 15:14:02 +01004012
Joerg Roedel4236d97d2011-09-06 17:56:07 +02004013 bus_set_iommu(&pci_bus_type, &intel_iommu_ops);
Fenghua Yu99dcade2009-11-11 07:23:06 -08004014 bus_register_notifier(&pci_bus_type, &device_nb);
Jiang Liu75f05562014-02-19 14:07:37 +08004015 if (si_domain && !hw_pass_through)
4016 register_memory_notifier(&intel_iommu_memory_nb);
Fenghua Yu99dcade2009-11-11 07:23:06 -08004017
Eugeni Dodonov8bc1f852011-11-23 16:42:14 -02004018 intel_iommu_enabled = 1;
4019
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07004020 return 0;
Jiang Liu9bdc5312014-01-06 14:18:27 +08004021
4022out_free_reserved_range:
4023 put_iova_domain(&reserved_iova_list);
Jiang Liu9bdc5312014-01-06 14:18:27 +08004024out_free_dmar:
4025 intel_iommu_free_dmars();
Jiang Liu3a5670e2014-02-19 14:07:33 +08004026 up_write(&dmar_global_lock);
4027 iommu_exit_mempool();
Jiang Liu9bdc5312014-01-06 14:18:27 +08004028 return ret;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07004029}
Keshavamurthy, Anil Se8204822007-10-21 16:41:55 -07004030
Han, Weidong3199aa62009-02-26 17:31:12 +08004031static void iommu_detach_dependent_devices(struct intel_iommu *iommu,
David Woodhouse0bcb3e22014-03-06 17:12:03 +00004032 struct device *dev)
Han, Weidong3199aa62009-02-26 17:31:12 +08004033{
David Woodhouse0bcb3e22014-03-06 17:12:03 +00004034 struct pci_dev *tmp, *parent, *pdev;
Han, Weidong3199aa62009-02-26 17:31:12 +08004035
David Woodhouse0bcb3e22014-03-06 17:12:03 +00004036 if (!iommu || !dev || !dev_is_pci(dev))
Han, Weidong3199aa62009-02-26 17:31:12 +08004037 return;
4038
David Woodhouse0bcb3e22014-03-06 17:12:03 +00004039 pdev = to_pci_dev(dev);
4040
Han, Weidong3199aa62009-02-26 17:31:12 +08004041 /* dependent device detach */
4042 tmp = pci_find_upstream_pcie_bridge(pdev);
4043 /* Secondary interface's bus number and devfn 0 */
4044 if (tmp) {
4045 parent = pdev->bus->self;
4046 while (parent != tmp) {
4047 iommu_detach_dev(iommu, parent->bus->number,
David Woodhouse276dbf992009-04-04 01:45:37 +01004048 parent->devfn);
Han, Weidong3199aa62009-02-26 17:31:12 +08004049 parent = parent->bus->self;
4050 }
Stefan Assmann45e829e2009-12-03 06:49:24 -05004051 if (pci_is_pcie(tmp)) /* this is a PCIe-to-PCI bridge */
Han, Weidong3199aa62009-02-26 17:31:12 +08004052 iommu_detach_dev(iommu,
4053 tmp->subordinate->number, 0);
4054 else /* this is a legacy PCI bridge */
David Woodhouse276dbf992009-04-04 01:45:37 +01004055 iommu_detach_dev(iommu, tmp->bus->number,
4056 tmp->devfn);
Han, Weidong3199aa62009-02-26 17:31:12 +08004057 }
4058}
4059
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07004060static void domain_remove_one_dev_info(struct dmar_domain *domain,
David Woodhousebf9c9ed2014-03-09 16:19:13 -07004061 struct device *dev)
Weidong Hanc7151a82008-12-08 22:51:37 +08004062{
Yijing Wangbca2b912013-10-31 17:26:04 +08004063 struct device_domain_info *info, *tmp;
Weidong Hanc7151a82008-12-08 22:51:37 +08004064 struct intel_iommu *iommu;
4065 unsigned long flags;
4066 int found = 0;
David Woodhouse156baca2014-03-09 14:00:57 -07004067 u8 bus, devfn;
Weidong Hanc7151a82008-12-08 22:51:37 +08004068
David Woodhousebf9c9ed2014-03-09 16:19:13 -07004069 iommu = device_to_iommu(dev, &bus, &devfn);
Weidong Hanc7151a82008-12-08 22:51:37 +08004070 if (!iommu)
4071 return;
4072
4073 spin_lock_irqsave(&device_domain_lock, flags);
Yijing Wangbca2b912013-10-31 17:26:04 +08004074 list_for_each_entry_safe(info, tmp, &domain->devices, link) {
David Woodhousebf9c9ed2014-03-09 16:19:13 -07004075 if (info->iommu == iommu && info->bus == bus &&
4076 info->devfn == devfn) {
David Woodhouse109b9b02012-05-25 17:43:02 +01004077 unlink_domain_info(info);
Weidong Hanc7151a82008-12-08 22:51:37 +08004078 spin_unlock_irqrestore(&device_domain_lock, flags);
4079
Yu Zhao93a23a72009-05-18 13:51:37 +08004080 iommu_disable_dev_iotlb(info);
Weidong Hanc7151a82008-12-08 22:51:37 +08004081 iommu_detach_dev(iommu, info->bus, info->devfn);
David Woodhousebf9c9ed2014-03-09 16:19:13 -07004082 iommu_detach_dependent_devices(iommu, dev);
Weidong Hanc7151a82008-12-08 22:51:37 +08004083 free_devinfo_mem(info);
4084
4085 spin_lock_irqsave(&device_domain_lock, flags);
4086
4087 if (found)
4088 break;
4089 else
4090 continue;
4091 }
4092
4093 /* if there is no other devices under the same iommu
4094 * owned by this domain, clear this iommu in iommu_bmp
4095 * update iommu count and coherency
4096 */
David Woodhouse8bbc4412014-03-09 13:52:37 -07004097 if (info->iommu == iommu)
Weidong Hanc7151a82008-12-08 22:51:37 +08004098 found = 1;
4099 }
4100
Roland Dreier3e7abe22011-07-20 06:22:21 -07004101 spin_unlock_irqrestore(&device_domain_lock, flags);
4102
Weidong Hanc7151a82008-12-08 22:51:37 +08004103 if (found == 0) {
4104 unsigned long tmp_flags;
4105 spin_lock_irqsave(&domain->iommu_lock, tmp_flags);
Mike Travis1b198bb2012-03-05 15:05:16 -08004106 clear_bit(iommu->seq_id, domain->iommu_bmp);
Weidong Hanc7151a82008-12-08 22:51:37 +08004107 domain->iommu_count--;
Sheng Yang58c610b2009-03-18 15:33:05 +08004108 domain_update_iommu_cap(domain);
Weidong Hanc7151a82008-12-08 22:51:37 +08004109 spin_unlock_irqrestore(&domain->iommu_lock, tmp_flags);
Alex Williamsona97590e2011-03-04 14:52:16 -07004110
Alex Williamson9b4554b2011-05-24 12:19:04 -04004111 if (!(domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE) &&
4112 !(domain->flags & DOMAIN_FLAG_STATIC_IDENTITY)) {
4113 spin_lock_irqsave(&iommu->lock, tmp_flags);
4114 clear_bit(domain->id, iommu->domain_ids);
4115 iommu->domains[domain->id] = NULL;
4116 spin_unlock_irqrestore(&iommu->lock, tmp_flags);
4117 }
Weidong Hanc7151a82008-12-08 22:51:37 +08004118 }
Weidong Hanc7151a82008-12-08 22:51:37 +08004119}
4120
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07004121static int md_domain_init(struct dmar_domain *domain, int guest_width)
Weidong Han5e98c4b2008-12-08 23:03:27 +08004122{
4123 int adjust_width;
4124
4125 init_iova_domain(&domain->iovad, DMA_32BIT_PFN);
Weidong Han5e98c4b2008-12-08 23:03:27 +08004126 domain_reserve_special_ranges(domain);
4127
4128 /* calculate AGAW */
4129 domain->gaw = guest_width;
4130 adjust_width = guestwidth_to_adjustwidth(guest_width);
4131 domain->agaw = width_to_agaw(adjust_width);
4132
Weidong Han5e98c4b2008-12-08 23:03:27 +08004133 domain->iommu_coherency = 0;
Sheng Yangc5b15252009-08-06 13:31:56 +08004134 domain->iommu_snooping = 0;
Youquan Song6dd9a7c2011-05-25 19:13:49 +01004135 domain->iommu_superpage = 0;
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004136 domain->max_addr = 0;
Suresh Siddha4c923d42009-10-02 11:01:24 -07004137 domain->nid = -1;
Weidong Han5e98c4b2008-12-08 23:03:27 +08004138
4139 /* always allocate the top pgd */
Suresh Siddha4c923d42009-10-02 11:01:24 -07004140 domain->pgd = (struct dma_pte *)alloc_pgtable_page(domain->nid);
Weidong Han5e98c4b2008-12-08 23:03:27 +08004141 if (!domain->pgd)
4142 return -ENOMEM;
4143 domain_flush_cache(domain, domain->pgd, PAGE_SIZE);
4144 return 0;
4145}
4146
Joerg Roedel5d450802008-12-03 14:52:32 +01004147static int intel_iommu_domain_init(struct iommu_domain *domain)
Kay, Allen M38717942008-09-09 18:37:29 +03004148{
Joerg Roedel5d450802008-12-03 14:52:32 +01004149 struct dmar_domain *dmar_domain;
Kay, Allen M38717942008-09-09 18:37:29 +03004150
Jiang Liu92d03cc2014-02-19 14:07:28 +08004151 dmar_domain = alloc_domain(true);
Joerg Roedel5d450802008-12-03 14:52:32 +01004152 if (!dmar_domain) {
Kay, Allen M38717942008-09-09 18:37:29 +03004153 printk(KERN_ERR
Joerg Roedel5d450802008-12-03 14:52:32 +01004154 "intel_iommu_domain_init: dmar_domain == NULL\n");
4155 return -ENOMEM;
Kay, Allen M38717942008-09-09 18:37:29 +03004156 }
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07004157 if (md_domain_init(dmar_domain, DEFAULT_DOMAIN_ADDRESS_WIDTH)) {
Kay, Allen M38717942008-09-09 18:37:29 +03004158 printk(KERN_ERR
Joerg Roedel5d450802008-12-03 14:52:32 +01004159 "intel_iommu_domain_init() failed\n");
Jiang Liu92d03cc2014-02-19 14:07:28 +08004160 domain_exit(dmar_domain);
Joerg Roedel5d450802008-12-03 14:52:32 +01004161 return -ENOMEM;
Kay, Allen M38717942008-09-09 18:37:29 +03004162 }
Allen Kay8140a952011-10-14 12:32:17 -07004163 domain_update_iommu_cap(dmar_domain);
Joerg Roedel5d450802008-12-03 14:52:32 +01004164 domain->priv = dmar_domain;
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004165
Joerg Roedel8a0e7152012-01-26 19:40:54 +01004166 domain->geometry.aperture_start = 0;
4167 domain->geometry.aperture_end = __DOMAIN_MAX_ADDR(dmar_domain->gaw);
4168 domain->geometry.force_aperture = true;
4169
Joerg Roedel5d450802008-12-03 14:52:32 +01004170 return 0;
Kay, Allen M38717942008-09-09 18:37:29 +03004171}
Kay, Allen M38717942008-09-09 18:37:29 +03004172
Joerg Roedel5d450802008-12-03 14:52:32 +01004173static void intel_iommu_domain_destroy(struct iommu_domain *domain)
Kay, Allen M38717942008-09-09 18:37:29 +03004174{
Joerg Roedel5d450802008-12-03 14:52:32 +01004175 struct dmar_domain *dmar_domain = domain->priv;
4176
4177 domain->priv = NULL;
Jiang Liu92d03cc2014-02-19 14:07:28 +08004178 domain_exit(dmar_domain);
Kay, Allen M38717942008-09-09 18:37:29 +03004179}
Kay, Allen M38717942008-09-09 18:37:29 +03004180
Joerg Roedel4c5478c2008-12-03 14:58:24 +01004181static int intel_iommu_attach_device(struct iommu_domain *domain,
4182 struct device *dev)
Kay, Allen M38717942008-09-09 18:37:29 +03004183{
Joerg Roedel4c5478c2008-12-03 14:58:24 +01004184 struct dmar_domain *dmar_domain = domain->priv;
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004185 struct intel_iommu *iommu;
4186 int addr_width;
David Woodhouse156baca2014-03-09 14:00:57 -07004187 u8 bus, devfn;
Kay, Allen M38717942008-09-09 18:37:29 +03004188
David Woodhouse7207d8f2014-03-09 16:31:06 -07004189 /* normally dev is not mapped */
4190 if (unlikely(domain_context_mapped(dev))) {
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004191 struct dmar_domain *old_domain;
4192
David Woodhouse1525a292014-03-06 16:19:30 +00004193 old_domain = find_domain(dev);
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004194 if (old_domain) {
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07004195 if (dmar_domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE ||
4196 dmar_domain->flags & DOMAIN_FLAG_STATIC_IDENTITY)
David Woodhousebf9c9ed2014-03-09 16:19:13 -07004197 domain_remove_one_dev_info(old_domain, dev);
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004198 else
4199 domain_remove_dev_info(old_domain);
4200 }
4201 }
4202
David Woodhouse156baca2014-03-09 14:00:57 -07004203 iommu = device_to_iommu(dev, &bus, &devfn);
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004204 if (!iommu)
4205 return -ENODEV;
4206
4207 /* check if this iommu agaw is sufficient for max mapped address */
4208 addr_width = agaw_to_width(iommu->agaw);
Tom Lyona99c47a2010-05-17 08:20:45 +01004209 if (addr_width > cap_mgaw(iommu->cap))
4210 addr_width = cap_mgaw(iommu->cap);
4211
4212 if (dmar_domain->max_addr > (1LL << addr_width)) {
4213 printk(KERN_ERR "%s: iommu width (%d) is not "
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004214 "sufficient for the mapped address (%llx)\n",
Tom Lyona99c47a2010-05-17 08:20:45 +01004215 __func__, addr_width, dmar_domain->max_addr);
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004216 return -EFAULT;
4217 }
Tom Lyona99c47a2010-05-17 08:20:45 +01004218 dmar_domain->gaw = addr_width;
4219
4220 /*
4221 * Knock out extra levels of page tables if necessary
4222 */
4223 while (iommu->agaw < dmar_domain->agaw) {
4224 struct dma_pte *pte;
4225
4226 pte = dmar_domain->pgd;
4227 if (dma_pte_present(pte)) {
Sheng Yang25cbff12010-06-12 19:21:42 +08004228 dmar_domain->pgd = (struct dma_pte *)
4229 phys_to_virt(dma_pte_addr(pte));
Jan Kiszka7a661012010-11-02 08:05:51 +01004230 free_pgtable_page(pte);
Tom Lyona99c47a2010-05-17 08:20:45 +01004231 }
4232 dmar_domain->agaw--;
4233 }
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004234
David Woodhouse5913c9b2014-03-09 16:27:31 -07004235 return domain_add_dev_info(dmar_domain, dev, CONTEXT_TT_MULTI_LEVEL);
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004236}
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004237
Joerg Roedel4c5478c2008-12-03 14:58:24 +01004238static void intel_iommu_detach_device(struct iommu_domain *domain,
4239 struct device *dev)
Kay, Allen M38717942008-09-09 18:37:29 +03004240{
Joerg Roedel4c5478c2008-12-03 14:58:24 +01004241 struct dmar_domain *dmar_domain = domain->priv;
Joerg Roedel4c5478c2008-12-03 14:58:24 +01004242
David Woodhousebf9c9ed2014-03-09 16:19:13 -07004243 domain_remove_one_dev_info(dmar_domain, dev);
Kay, Allen M38717942008-09-09 18:37:29 +03004244}
Kay, Allen M38717942008-09-09 18:37:29 +03004245
Joerg Roedelb146a1c9f2010-01-20 17:17:37 +01004246static int intel_iommu_map(struct iommu_domain *domain,
4247 unsigned long iova, phys_addr_t hpa,
Ohad Ben-Cohen50090652011-11-10 11:32:25 +02004248 size_t size, int iommu_prot)
Kay, Allen M38717942008-09-09 18:37:29 +03004249{
Joerg Roedeldde57a22008-12-03 15:04:09 +01004250 struct dmar_domain *dmar_domain = domain->priv;
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004251 u64 max_addr;
Joerg Roedeldde57a22008-12-03 15:04:09 +01004252 int prot = 0;
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004253 int ret;
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004254
Joerg Roedeldde57a22008-12-03 15:04:09 +01004255 if (iommu_prot & IOMMU_READ)
4256 prot |= DMA_PTE_READ;
4257 if (iommu_prot & IOMMU_WRITE)
4258 prot |= DMA_PTE_WRITE;
Sheng Yang9cf066972009-03-18 15:33:07 +08004259 if ((iommu_prot & IOMMU_CACHE) && dmar_domain->iommu_snooping)
4260 prot |= DMA_PTE_SNP;
Joerg Roedeldde57a22008-12-03 15:04:09 +01004261
David Woodhouse163cc522009-06-28 00:51:17 +01004262 max_addr = iova + size;
Joerg Roedeldde57a22008-12-03 15:04:09 +01004263 if (dmar_domain->max_addr < max_addr) {
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004264 u64 end;
4265
4266 /* check if minimum agaw is sufficient for mapped address */
Tom Lyon8954da12010-05-17 08:19:52 +01004267 end = __DOMAIN_MAX_ADDR(dmar_domain->gaw) + 1;
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004268 if (end < max_addr) {
Tom Lyon8954da12010-05-17 08:19:52 +01004269 printk(KERN_ERR "%s: iommu width (%d) is not "
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004270 "sufficient for the mapped address (%llx)\n",
Tom Lyon8954da12010-05-17 08:19:52 +01004271 __func__, dmar_domain->gaw, max_addr);
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004272 return -EFAULT;
4273 }
Joerg Roedeldde57a22008-12-03 15:04:09 +01004274 dmar_domain->max_addr = max_addr;
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004275 }
David Woodhousead051222009-06-28 14:22:28 +01004276 /* Round up size to next multiple of PAGE_SIZE, if it and
4277 the low bits of hpa would take us onto the next page */
David Woodhouse88cb6a72009-06-28 15:03:06 +01004278 size = aligned_nrpages(hpa, size);
David Woodhousead051222009-06-28 14:22:28 +01004279 ret = domain_pfn_mapping(dmar_domain, iova >> VTD_PAGE_SHIFT,
4280 hpa >> VTD_PAGE_SHIFT, size, prot);
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004281 return ret;
Kay, Allen M38717942008-09-09 18:37:29 +03004282}
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004283
Ohad Ben-Cohen50090652011-11-10 11:32:25 +02004284static size_t intel_iommu_unmap(struct iommu_domain *domain,
David Woodhouseea8ea462014-03-05 17:09:32 +00004285 unsigned long iova, size_t size)
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004286{
Joerg Roedeldde57a22008-12-03 15:04:09 +01004287 struct dmar_domain *dmar_domain = domain->priv;
David Woodhouseea8ea462014-03-05 17:09:32 +00004288 struct page *freelist = NULL;
4289 struct intel_iommu *iommu;
4290 unsigned long start_pfn, last_pfn;
4291 unsigned int npages;
4292 int iommu_id, num, ndomains, level = 0;
Sheng Yang4b99d352009-07-08 11:52:52 +01004293
David Woodhouse5cf0a762014-03-19 16:07:49 +00004294 /* Cope with horrid API which requires us to unmap more than the
4295 size argument if it happens to be a large-page mapping. */
4296 if (!pfn_to_dma_pte(dmar_domain, iova >> VTD_PAGE_SHIFT, &level))
4297 BUG();
4298
4299 if (size < VTD_PAGE_SIZE << level_to_offset_bits(level))
4300 size = VTD_PAGE_SIZE << level_to_offset_bits(level);
4301
David Woodhouseea8ea462014-03-05 17:09:32 +00004302 start_pfn = iova >> VTD_PAGE_SHIFT;
4303 last_pfn = (iova + size - 1) >> VTD_PAGE_SHIFT;
4304
4305 freelist = domain_unmap(dmar_domain, start_pfn, last_pfn);
4306
4307 npages = last_pfn - start_pfn + 1;
4308
4309 for_each_set_bit(iommu_id, dmar_domain->iommu_bmp, g_num_of_iommus) {
4310 iommu = g_iommus[iommu_id];
4311
4312 /*
4313 * find bit position of dmar_domain
4314 */
4315 ndomains = cap_ndoms(iommu->cap);
4316 for_each_set_bit(num, iommu->domain_ids, ndomains) {
4317 if (iommu->domains[num] == dmar_domain)
4318 iommu_flush_iotlb_psi(iommu, num, start_pfn,
4319 npages, !freelist, 0);
4320 }
4321
4322 }
4323
4324 dma_free_pagelist(freelist);
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004325
David Woodhouse163cc522009-06-28 00:51:17 +01004326 if (dmar_domain->max_addr == iova + size)
4327 dmar_domain->max_addr = iova;
Joerg Roedelb146a1c9f2010-01-20 17:17:37 +01004328
David Woodhouse5cf0a762014-03-19 16:07:49 +00004329 return size;
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004330}
Kay, Allen M38717942008-09-09 18:37:29 +03004331
Joerg Roedeld14d6572008-12-03 15:06:57 +01004332static phys_addr_t intel_iommu_iova_to_phys(struct iommu_domain *domain,
Varun Sethibb5547ac2013-03-29 01:23:58 +05304333 dma_addr_t iova)
Kay, Allen M38717942008-09-09 18:37:29 +03004334{
Joerg Roedeld14d6572008-12-03 15:06:57 +01004335 struct dmar_domain *dmar_domain = domain->priv;
Kay, Allen M38717942008-09-09 18:37:29 +03004336 struct dma_pte *pte;
David Woodhouse5cf0a762014-03-19 16:07:49 +00004337 int level = 0;
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004338 u64 phys = 0;
Kay, Allen M38717942008-09-09 18:37:29 +03004339
David Woodhouse5cf0a762014-03-19 16:07:49 +00004340 pte = pfn_to_dma_pte(dmar_domain, iova >> VTD_PAGE_SHIFT, &level);
Kay, Allen M38717942008-09-09 18:37:29 +03004341 if (pte)
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004342 phys = dma_pte_addr(pte);
Kay, Allen M38717942008-09-09 18:37:29 +03004343
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004344 return phys;
Kay, Allen M38717942008-09-09 18:37:29 +03004345}
Joerg Roedela8bcbb0d2008-12-03 15:14:02 +01004346
Sheng Yangdbb9fd82009-03-18 15:33:06 +08004347static int intel_iommu_domain_has_cap(struct iommu_domain *domain,
4348 unsigned long cap)
4349{
4350 struct dmar_domain *dmar_domain = domain->priv;
4351
4352 if (cap == IOMMU_CAP_CACHE_COHERENCY)
4353 return dmar_domain->iommu_snooping;
Tom Lyon323f99c2010-07-02 16:56:14 -04004354 if (cap == IOMMU_CAP_INTR_REMAP)
Suresh Siddha95a02e92012-03-30 11:47:07 -07004355 return irq_remapping_enabled;
Sheng Yangdbb9fd82009-03-18 15:33:06 +08004356
4357 return 0;
4358}
4359
Alex Williamson783f1572012-05-30 14:19:43 -06004360#define REQ_ACS_FLAGS (PCI_ACS_SV | PCI_ACS_RR | PCI_ACS_CR | PCI_ACS_UF)
4361
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004362static int intel_iommu_add_device(struct device *dev)
Alex Williamson70ae6f02011-10-21 15:56:11 -04004363{
4364 struct pci_dev *pdev = to_pci_dev(dev);
Alex Williamson3da4af0a2012-11-13 10:22:03 -07004365 struct pci_dev *bridge, *dma_pdev = NULL;
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004366 struct iommu_group *group;
4367 int ret;
David Woodhouse156baca2014-03-09 14:00:57 -07004368 u8 bus, devfn;
Alex Williamson70ae6f02011-10-21 15:56:11 -04004369
David Woodhouse156baca2014-03-09 14:00:57 -07004370 if (!device_to_iommu(dev, &bus, &devfn))
Alex Williamson70ae6f02011-10-21 15:56:11 -04004371 return -ENODEV;
4372
4373 bridge = pci_find_upstream_pcie_bridge(pdev);
4374 if (bridge) {
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004375 if (pci_is_pcie(bridge))
4376 dma_pdev = pci_get_domain_bus_and_slot(
4377 pci_domain_nr(pdev->bus),
4378 bridge->subordinate->number, 0);
Alex Williamson3da4af0a2012-11-13 10:22:03 -07004379 if (!dma_pdev)
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004380 dma_pdev = pci_dev_get(bridge);
4381 } else
4382 dma_pdev = pci_dev_get(pdev);
4383
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004384 /* Account for quirked devices */
Alex Williamson783f1572012-05-30 14:19:43 -06004385 swap_pci_ref(&dma_pdev, pci_get_dma_source(dma_pdev));
4386
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004387 /*
4388 * If it's a multifunction device that does not support our
Alex Williamsonc14d2692013-05-30 12:39:18 -06004389 * required ACS flags, add to the same group as lowest numbered
4390 * function that also does not suport the required ACS flags.
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004391 */
Alex Williamson783f1572012-05-30 14:19:43 -06004392 if (dma_pdev->multifunction &&
Alex Williamsonc14d2692013-05-30 12:39:18 -06004393 !pci_acs_enabled(dma_pdev, REQ_ACS_FLAGS)) {
4394 u8 i, slot = PCI_SLOT(dma_pdev->devfn);
4395
4396 for (i = 0; i < 8; i++) {
4397 struct pci_dev *tmp;
4398
4399 tmp = pci_get_slot(dma_pdev->bus, PCI_DEVFN(slot, i));
4400 if (!tmp)
4401 continue;
4402
4403 if (!pci_acs_enabled(tmp, REQ_ACS_FLAGS)) {
4404 swap_pci_ref(&dma_pdev, tmp);
4405 break;
4406 }
4407 pci_dev_put(tmp);
4408 }
4409 }
Alex Williamson783f1572012-05-30 14:19:43 -06004410
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004411 /*
4412 * Devices on the root bus go through the iommu. If that's not us,
4413 * find the next upstream device and test ACS up to the root bus.
4414 * Finding the next device may require skipping virtual buses.
4415 */
Alex Williamson783f1572012-05-30 14:19:43 -06004416 while (!pci_is_root_bus(dma_pdev->bus)) {
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004417 struct pci_bus *bus = dma_pdev->bus;
4418
4419 while (!bus->self) {
4420 if (!pci_is_root_bus(bus))
4421 bus = bus->parent;
4422 else
4423 goto root_bus;
4424 }
4425
4426 if (pci_acs_path_enabled(bus->self, NULL, REQ_ACS_FLAGS))
Alex Williamson783f1572012-05-30 14:19:43 -06004427 break;
4428
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004429 swap_pci_ref(&dma_pdev, pci_dev_get(bus->self));
Alex Williamson70ae6f02011-10-21 15:56:11 -04004430 }
4431
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004432root_bus:
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004433 group = iommu_group_get(&dma_pdev->dev);
4434 pci_dev_put(dma_pdev);
4435 if (!group) {
4436 group = iommu_group_alloc();
4437 if (IS_ERR(group))
4438 return PTR_ERR(group);
4439 }
Alex Williamsonbcb71ab2011-10-21 15:56:24 -04004440
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004441 ret = iommu_group_add_device(group, dev);
Alex Williamson70ae6f02011-10-21 15:56:11 -04004442
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004443 iommu_group_put(group);
4444 return ret;
4445}
4446
4447static void intel_iommu_remove_device(struct device *dev)
4448{
4449 iommu_group_remove_device(dev);
Alex Williamson70ae6f02011-10-21 15:56:11 -04004450}
4451
Joerg Roedela8bcbb0d2008-12-03 15:14:02 +01004452static struct iommu_ops intel_iommu_ops = {
4453 .domain_init = intel_iommu_domain_init,
4454 .domain_destroy = intel_iommu_domain_destroy,
4455 .attach_dev = intel_iommu_attach_device,
4456 .detach_dev = intel_iommu_detach_device,
Joerg Roedelb146a1c9f2010-01-20 17:17:37 +01004457 .map = intel_iommu_map,
4458 .unmap = intel_iommu_unmap,
Joerg Roedela8bcbb0d2008-12-03 15:14:02 +01004459 .iova_to_phys = intel_iommu_iova_to_phys,
Sheng Yangdbb9fd82009-03-18 15:33:06 +08004460 .domain_has_cap = intel_iommu_domain_has_cap,
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004461 .add_device = intel_iommu_add_device,
4462 .remove_device = intel_iommu_remove_device,
Ohad Ben-Cohen6d1c56a2011-11-10 11:32:30 +02004463 .pgsize_bitmap = INTEL_IOMMU_PGSIZES,
Joerg Roedela8bcbb0d2008-12-03 15:14:02 +01004464};
David Woodhouse9af88142009-02-13 23:18:03 +00004465
Daniel Vetter94526182013-01-20 23:50:13 +01004466static void quirk_iommu_g4x_gfx(struct pci_dev *dev)
4467{
4468 /* G4x/GM45 integrated gfx dmar support is totally busted. */
4469 printk(KERN_INFO "DMAR: Disabling IOMMU for graphics on this chipset\n");
4470 dmar_map_gfx = 0;
4471}
4472
4473DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2a40, quirk_iommu_g4x_gfx);
4474DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e00, quirk_iommu_g4x_gfx);
4475DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e10, quirk_iommu_g4x_gfx);
4476DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e20, quirk_iommu_g4x_gfx);
4477DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e30, quirk_iommu_g4x_gfx);
4478DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e40, quirk_iommu_g4x_gfx);
4479DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e90, quirk_iommu_g4x_gfx);
4480
Greg Kroah-Hartmand34d6512012-12-21 15:05:21 -08004481static void quirk_iommu_rwbf(struct pci_dev *dev)
David Woodhouse9af88142009-02-13 23:18:03 +00004482{
4483 /*
4484 * Mobile 4 Series Chipset neglects to set RWBF capability,
Daniel Vetter210561f2013-01-21 19:48:59 +01004485 * but needs it. Same seems to hold for the desktop versions.
David Woodhouse9af88142009-02-13 23:18:03 +00004486 */
4487 printk(KERN_INFO "DMAR: Forcing write-buffer flush capability\n");
4488 rwbf_quirk = 1;
4489}
4490
4491DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2a40, quirk_iommu_rwbf);
Daniel Vetter210561f2013-01-21 19:48:59 +01004492DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e00, quirk_iommu_rwbf);
4493DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e10, quirk_iommu_rwbf);
4494DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e20, quirk_iommu_rwbf);
4495DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e30, quirk_iommu_rwbf);
4496DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e40, quirk_iommu_rwbf);
4497DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e90, quirk_iommu_rwbf);
David Woodhousee0fc7e02009-09-30 09:12:17 -07004498
Adam Jacksoneecfd572010-08-25 21:17:34 +01004499#define GGC 0x52
4500#define GGC_MEMORY_SIZE_MASK (0xf << 8)
4501#define GGC_MEMORY_SIZE_NONE (0x0 << 8)
4502#define GGC_MEMORY_SIZE_1M (0x1 << 8)
4503#define GGC_MEMORY_SIZE_2M (0x3 << 8)
4504#define GGC_MEMORY_VT_ENABLED (0x8 << 8)
4505#define GGC_MEMORY_SIZE_2M_VT (0x9 << 8)
4506#define GGC_MEMORY_SIZE_3M_VT (0xa << 8)
4507#define GGC_MEMORY_SIZE_4M_VT (0xb << 8)
4508
Greg Kroah-Hartmand34d6512012-12-21 15:05:21 -08004509static void quirk_calpella_no_shadow_gtt(struct pci_dev *dev)
David Woodhouse9eecabc2010-09-21 22:28:23 +01004510{
4511 unsigned short ggc;
4512
Adam Jacksoneecfd572010-08-25 21:17:34 +01004513 if (pci_read_config_word(dev, GGC, &ggc))
David Woodhouse9eecabc2010-09-21 22:28:23 +01004514 return;
4515
Adam Jacksoneecfd572010-08-25 21:17:34 +01004516 if (!(ggc & GGC_MEMORY_VT_ENABLED)) {
David Woodhouse9eecabc2010-09-21 22:28:23 +01004517 printk(KERN_INFO "DMAR: BIOS has allocated no shadow GTT; disabling IOMMU for graphics\n");
4518 dmar_map_gfx = 0;
David Woodhouse6fbcfb32011-09-25 19:11:14 -07004519 } else if (dmar_map_gfx) {
4520 /* we have to ensure the gfx device is idle before we flush */
4521 printk(KERN_INFO "DMAR: Disabling batched IOTLB flush on Ironlake\n");
4522 intel_iommu_strict = 1;
4523 }
David Woodhouse9eecabc2010-09-21 22:28:23 +01004524}
4525DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x0040, quirk_calpella_no_shadow_gtt);
4526DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x0044, quirk_calpella_no_shadow_gtt);
4527DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x0062, quirk_calpella_no_shadow_gtt);
4528DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x006a, quirk_calpella_no_shadow_gtt);
4529
David Woodhousee0fc7e02009-09-30 09:12:17 -07004530/* On Tylersburg chipsets, some BIOSes have been known to enable the
4531 ISOCH DMAR unit for the Azalia sound device, but not give it any
4532 TLB entries, which causes it to deadlock. Check for that. We do
4533 this in a function called from init_dmars(), instead of in a PCI
4534 quirk, because we don't want to print the obnoxious "BIOS broken"
4535 message if VT-d is actually disabled.
4536*/
4537static void __init check_tylersburg_isoch(void)
4538{
4539 struct pci_dev *pdev;
4540 uint32_t vtisochctrl;
4541
4542 /* If there's no Azalia in the system anyway, forget it. */
4543 pdev = pci_get_device(PCI_VENDOR_ID_INTEL, 0x3a3e, NULL);
4544 if (!pdev)
4545 return;
4546 pci_dev_put(pdev);
4547
4548 /* System Management Registers. Might be hidden, in which case
4549 we can't do the sanity check. But that's OK, because the
4550 known-broken BIOSes _don't_ actually hide it, so far. */
4551 pdev = pci_get_device(PCI_VENDOR_ID_INTEL, 0x342e, NULL);
4552 if (!pdev)
4553 return;
4554
4555 if (pci_read_config_dword(pdev, 0x188, &vtisochctrl)) {
4556 pci_dev_put(pdev);
4557 return;
4558 }
4559
4560 pci_dev_put(pdev);
4561
4562 /* If Azalia DMA is routed to the non-isoch DMAR unit, fine. */
4563 if (vtisochctrl & 1)
4564 return;
4565
4566 /* Drop all bits other than the number of TLB entries */
4567 vtisochctrl &= 0x1c;
4568
4569 /* If we have the recommended number of TLB entries (16), fine. */
4570 if (vtisochctrl == 0x10)
4571 return;
4572
4573 /* Zero TLB entries? You get to ride the short bus to school. */
4574 if (!vtisochctrl) {
4575 WARN(1, "Your BIOS is broken; DMA routed to ISOCH DMAR unit but no TLB space.\n"
4576 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
4577 dmi_get_system_info(DMI_BIOS_VENDOR),
4578 dmi_get_system_info(DMI_BIOS_VERSION),
4579 dmi_get_system_info(DMI_PRODUCT_VERSION));
4580 iommu_identity_mapping |= IDENTMAP_AZALIA;
4581 return;
4582 }
4583
4584 printk(KERN_WARNING "DMAR: Recommended TLB entries for ISOCH unit is 16; your BIOS set %d\n",
4585 vtisochctrl);
4586}