blob: f256ffc02e29df18ce8c43266fafe68b1971beb0 [file] [log] [blame]
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001/*
David Woodhouseea8ea462014-03-05 17:09:32 +00002 * Copyright © 2006-2014 Intel Corporation.
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
David Woodhouseea8ea462014-03-05 17:09:32 +000013 * Authors: David Woodhouse <dwmw2@infradead.org>,
14 * Ashok Raj <ashok.raj@intel.com>,
15 * Shaohua Li <shaohua.li@intel.com>,
16 * Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com>,
17 * Fenghua Yu <fenghua.yu@intel.com>
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070018 */
19
20#include <linux/init.h>
21#include <linux/bitmap.h>
mark gross5e0d2a62008-03-04 15:22:08 -080022#include <linux/debugfs.h>
Paul Gortmaker54485c32011-10-29 10:26:25 -040023#include <linux/export.h>
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070024#include <linux/slab.h>
25#include <linux/irq.h>
26#include <linux/interrupt.h>
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070027#include <linux/spinlock.h>
28#include <linux/pci.h>
29#include <linux/dmar.h>
30#include <linux/dma-mapping.h>
31#include <linux/mempool.h>
Jiang Liu75f05562014-02-19 14:07:37 +080032#include <linux/memory.h>
mark gross5e0d2a62008-03-04 15:22:08 -080033#include <linux/timer.h>
Kay, Allen M38717942008-09-09 18:37:29 +030034#include <linux/iova.h>
Joerg Roedel5d450802008-12-03 14:52:32 +010035#include <linux/iommu.h>
Kay, Allen M38717942008-09-09 18:37:29 +030036#include <linux/intel-iommu.h>
Rafael J. Wysocki134fac32011-03-23 22:16:14 +010037#include <linux/syscore_ops.h>
Shane Wang69575d32009-09-01 18:25:07 -070038#include <linux/tboot.h>
Stephen Rothwelladb2fe02009-08-31 15:24:23 +100039#include <linux/dmi.h>
Joerg Roedel5cdede22011-04-04 15:55:18 +020040#include <linux/pci-ats.h>
Tejun Heo0ee332c2011-12-08 10:22:09 -080041#include <linux/memblock.h>
Suresh Siddha8a8f4222012-03-30 11:47:08 -070042#include <asm/irq_remapping.h>
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070043#include <asm/cacheflush.h>
FUJITA Tomonori46a7fa22008-07-11 10:23:42 +090044#include <asm/iommu.h>
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070045
Joerg Roedel078e1ee2012-09-26 12:44:43 +020046#include "irq_remapping.h"
Varun Sethi61e015a2013-04-23 10:05:24 +053047#include "pci.h"
Joerg Roedel078e1ee2012-09-26 12:44:43 +020048
Fenghua Yu5b6985c2008-10-16 18:02:32 -070049#define ROOT_SIZE VTD_PAGE_SIZE
50#define CONTEXT_SIZE VTD_PAGE_SIZE
51
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070052#define IS_GFX_DEVICE(pdev) ((pdev->class >> 16) == PCI_BASE_CLASS_DISPLAY)
53#define IS_ISA_DEVICE(pdev) ((pdev->class >> 8) == PCI_CLASS_BRIDGE_ISA)
David Woodhousee0fc7e02009-09-30 09:12:17 -070054#define IS_AZALIA(pdev) ((pdev)->vendor == 0x8086 && (pdev)->device == 0x3a3e)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070055
56#define IOAPIC_RANGE_START (0xfee00000)
57#define IOAPIC_RANGE_END (0xfeefffff)
58#define IOVA_START_ADDR (0x1000)
59
60#define DEFAULT_DOMAIN_ADDRESS_WIDTH 48
61
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -070062#define MAX_AGAW_WIDTH 64
Jiang Liu5c645b32014-01-06 14:18:12 +080063#define MAX_AGAW_PFN_WIDTH (MAX_AGAW_WIDTH - VTD_PAGE_SHIFT)
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -070064
David Woodhouse2ebe3152009-09-19 07:34:04 -070065#define __DOMAIN_MAX_PFN(gaw) ((((uint64_t)1) << (gaw-VTD_PAGE_SHIFT)) - 1)
66#define __DOMAIN_MAX_ADDR(gaw) ((((uint64_t)1) << gaw) - 1)
67
68/* We limit DOMAIN_MAX_PFN to fit in an unsigned long, and DOMAIN_MAX_ADDR
69 to match. That way, we can use 'unsigned long' for PFNs with impunity. */
70#define DOMAIN_MAX_PFN(gaw) ((unsigned long) min_t(uint64_t, \
71 __DOMAIN_MAX_PFN(gaw), (unsigned long)-1))
72#define DOMAIN_MAX_ADDR(gaw) (((uint64_t)__DOMAIN_MAX_PFN(gaw)) << VTD_PAGE_SHIFT)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -070073
Mark McLoughlinf27be032008-11-20 15:49:43 +000074#define IOVA_PFN(addr) ((addr) >> PAGE_SHIFT)
Yang Hongyang284901a2009-04-06 19:01:15 -070075#define DMA_32BIT_PFN IOVA_PFN(DMA_BIT_MASK(32))
Yang Hongyang6a355282009-04-06 19:01:13 -070076#define DMA_64BIT_PFN IOVA_PFN(DMA_BIT_MASK(64))
mark gross5e0d2a62008-03-04 15:22:08 -080077
Andrew Mortondf08cdc2010-09-22 13:05:11 -070078/* page table handling */
79#define LEVEL_STRIDE (9)
80#define LEVEL_MASK (((u64)1 << LEVEL_STRIDE) - 1)
81
Ohad Ben-Cohen6d1c56a2011-11-10 11:32:30 +020082/*
83 * This bitmap is used to advertise the page sizes our hardware support
84 * to the IOMMU core, which will then use this information to split
85 * physically contiguous memory regions it is mapping into page sizes
86 * that we support.
87 *
88 * Traditionally the IOMMU core just handed us the mappings directly,
89 * after making sure the size is an order of a 4KiB page and that the
90 * mapping has natural alignment.
91 *
92 * To retain this behavior, we currently advertise that we support
93 * all page sizes that are an order of 4KiB.
94 *
95 * If at some point we'd like to utilize the IOMMU core's new behavior,
96 * we could change this to advertise the real page sizes we support.
97 */
98#define INTEL_IOMMU_PGSIZES (~0xFFFUL)
99
Andrew Mortondf08cdc2010-09-22 13:05:11 -0700100static inline int agaw_to_level(int agaw)
101{
102 return agaw + 2;
103}
104
105static inline int agaw_to_width(int agaw)
106{
Jiang Liu5c645b32014-01-06 14:18:12 +0800107 return min_t(int, 30 + agaw * LEVEL_STRIDE, MAX_AGAW_WIDTH);
Andrew Mortondf08cdc2010-09-22 13:05:11 -0700108}
109
110static inline int width_to_agaw(int width)
111{
Jiang Liu5c645b32014-01-06 14:18:12 +0800112 return DIV_ROUND_UP(width - 30, LEVEL_STRIDE);
Andrew Mortondf08cdc2010-09-22 13:05:11 -0700113}
114
115static inline unsigned int level_to_offset_bits(int level)
116{
117 return (level - 1) * LEVEL_STRIDE;
118}
119
120static inline int pfn_level_offset(unsigned long pfn, int level)
121{
122 return (pfn >> level_to_offset_bits(level)) & LEVEL_MASK;
123}
124
125static inline unsigned long level_mask(int level)
126{
127 return -1UL << level_to_offset_bits(level);
128}
129
130static inline unsigned long level_size(int level)
131{
132 return 1UL << level_to_offset_bits(level);
133}
134
135static inline unsigned long align_to_level(unsigned long pfn, int level)
136{
137 return (pfn + level_size(level) - 1) & level_mask(level);
138}
David Woodhousefd18de52009-05-10 23:57:41 +0100139
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100140static inline unsigned long lvl_to_nr_pages(unsigned int lvl)
141{
Jiang Liu5c645b32014-01-06 14:18:12 +0800142 return 1 << min_t(int, (lvl - 1) * LEVEL_STRIDE, MAX_AGAW_PFN_WIDTH);
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100143}
144
David Woodhousedd4e8312009-06-27 16:21:20 +0100145/* VT-d pages must always be _smaller_ than MM pages. Otherwise things
146 are never going to work. */
147static inline unsigned long dma_to_mm_pfn(unsigned long dma_pfn)
148{
149 return dma_pfn >> (PAGE_SHIFT - VTD_PAGE_SHIFT);
150}
151
152static inline unsigned long mm_to_dma_pfn(unsigned long mm_pfn)
153{
154 return mm_pfn << (PAGE_SHIFT - VTD_PAGE_SHIFT);
155}
156static inline unsigned long page_to_dma_pfn(struct page *pg)
157{
158 return mm_to_dma_pfn(page_to_pfn(pg));
159}
160static inline unsigned long virt_to_dma_pfn(void *p)
161{
162 return page_to_dma_pfn(virt_to_page(p));
163}
164
Weidong Hand9630fe2008-12-08 11:06:32 +0800165/* global iommu list, set NULL for ignored DMAR units */
166static struct intel_iommu **g_iommus;
167
David Woodhousee0fc7e02009-09-30 09:12:17 -0700168static void __init check_tylersburg_isoch(void);
David Woodhouse9af88142009-02-13 23:18:03 +0000169static int rwbf_quirk;
170
Mark McLoughlin46b08e12008-11-20 15:49:44 +0000171/*
Joseph Cihulab7792602011-05-03 00:08:37 -0700172 * set to 1 to panic kernel if can't successfully enable VT-d
173 * (used when kernel is launched w/ TXT)
174 */
175static int force_on = 0;
176
177/*
Mark McLoughlin46b08e12008-11-20 15:49:44 +0000178 * 0: Present
179 * 1-11: Reserved
180 * 12-63: Context Ptr (12 - (haw-1))
181 * 64-127: Reserved
182 */
183struct root_entry {
184 u64 val;
185 u64 rsvd1;
186};
187#define ROOT_ENTRY_NR (VTD_PAGE_SIZE/sizeof(struct root_entry))
188static inline bool root_present(struct root_entry *root)
189{
190 return (root->val & 1);
191}
192static inline void set_root_present(struct root_entry *root)
193{
194 root->val |= 1;
195}
196static inline void set_root_value(struct root_entry *root, unsigned long value)
197{
198 root->val |= value & VTD_PAGE_MASK;
199}
200
201static inline struct context_entry *
202get_context_addr_from_root(struct root_entry *root)
203{
204 return (struct context_entry *)
205 (root_present(root)?phys_to_virt(
206 root->val & VTD_PAGE_MASK) :
207 NULL);
208}
209
Mark McLoughlin7a8fc252008-11-20 15:49:45 +0000210/*
211 * low 64 bits:
212 * 0: present
213 * 1: fault processing disable
214 * 2-3: translation type
215 * 12-63: address space root
216 * high 64 bits:
217 * 0-2: address width
218 * 3-6: aval
219 * 8-23: domain id
220 */
221struct context_entry {
222 u64 lo;
223 u64 hi;
224};
Mark McLoughlin7a8fc252008-11-20 15:49:45 +0000225
Mark McLoughlinc07e7d22008-11-21 16:54:46 +0000226static inline bool context_present(struct context_entry *context)
227{
228 return (context->lo & 1);
229}
230static inline void context_set_present(struct context_entry *context)
231{
232 context->lo |= 1;
233}
234
235static inline void context_set_fault_enable(struct context_entry *context)
236{
237 context->lo &= (((u64)-1) << 2) | 1;
238}
239
Mark McLoughlinc07e7d22008-11-21 16:54:46 +0000240static inline void context_set_translation_type(struct context_entry *context,
241 unsigned long value)
242{
243 context->lo &= (((u64)-1) << 4) | 3;
244 context->lo |= (value & 3) << 2;
245}
246
247static inline void context_set_address_root(struct context_entry *context,
248 unsigned long value)
249{
250 context->lo |= value & VTD_PAGE_MASK;
251}
252
253static inline void context_set_address_width(struct context_entry *context,
254 unsigned long value)
255{
256 context->hi |= value & 7;
257}
258
259static inline void context_set_domain_id(struct context_entry *context,
260 unsigned long value)
261{
262 context->hi |= (value & ((1 << 16) - 1)) << 8;
263}
264
265static inline void context_clear_entry(struct context_entry *context)
266{
267 context->lo = 0;
268 context->hi = 0;
269}
Mark McLoughlin7a8fc252008-11-20 15:49:45 +0000270
Mark McLoughlin622ba122008-11-20 15:49:46 +0000271/*
272 * 0: readable
273 * 1: writable
274 * 2-6: reserved
275 * 7: super page
Sheng Yang9cf06692009-03-18 15:33:07 +0800276 * 8-10: available
277 * 11: snoop behavior
Mark McLoughlin622ba122008-11-20 15:49:46 +0000278 * 12-63: Host physcial address
279 */
280struct dma_pte {
281 u64 val;
282};
Mark McLoughlin622ba122008-11-20 15:49:46 +0000283
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000284static inline void dma_clear_pte(struct dma_pte *pte)
285{
286 pte->val = 0;
287}
288
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000289static inline u64 dma_pte_addr(struct dma_pte *pte)
290{
David Woodhousec85994e2009-07-01 19:21:24 +0100291#ifdef CONFIG_64BIT
292 return pte->val & VTD_PAGE_MASK;
293#else
294 /* Must have a full atomic 64-bit read */
David Woodhouse1a8bd482010-08-10 01:38:53 +0100295 return __cmpxchg64(&pte->val, 0ULL, 0ULL) & VTD_PAGE_MASK;
David Woodhousec85994e2009-07-01 19:21:24 +0100296#endif
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000297}
298
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000299static inline bool dma_pte_present(struct dma_pte *pte)
300{
301 return (pte->val & 3) != 0;
302}
Mark McLoughlin622ba122008-11-20 15:49:46 +0000303
Allen Kay4399c8b2011-10-14 12:32:46 -0700304static inline bool dma_pte_superpage(struct dma_pte *pte)
305{
306 return (pte->val & (1 << 7));
307}
308
David Woodhouse75e6bf92009-07-02 11:21:16 +0100309static inline int first_pte_in_page(struct dma_pte *pte)
310{
311 return !((unsigned long)pte & ~VTD_PAGE_MASK);
312}
313
Fenghua Yu2c2e2c32009-06-19 13:47:29 -0700314/*
315 * This domain is a statically identity mapping domain.
316 * 1. This domain creats a static 1:1 mapping to all usable memory.
317 * 2. It maps to each iommu if successful.
318 * 3. Each iommu mapps to this domain if successful.
319 */
David Woodhouse19943b02009-08-04 16:19:20 +0100320static struct dmar_domain *si_domain;
321static int hw_pass_through = 1;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -0700322
Weidong Han3b5410e2008-12-08 09:17:15 +0800323/* devices under the same p2p bridge are owned in one domain */
Mike Daycdc7b832008-12-12 17:16:30 +0100324#define DOMAIN_FLAG_P2P_MULTIPLE_DEVICES (1 << 0)
Weidong Han3b5410e2008-12-08 09:17:15 +0800325
Weidong Han1ce28fe2008-12-08 16:35:39 +0800326/* domain represents a virtual machine, more than one devices
327 * across iommus may be owned in one domain, e.g. kvm guest.
328 */
329#define DOMAIN_FLAG_VIRTUAL_MACHINE (1 << 1)
330
Fenghua Yu2c2e2c32009-06-19 13:47:29 -0700331/* si_domain contains mulitple devices */
332#define DOMAIN_FLAG_STATIC_IDENTITY (1 << 2)
333
Mike Travis1b198bb2012-03-05 15:05:16 -0800334/* define the limit of IOMMUs supported in each domain */
335#ifdef CONFIG_X86
336# define IOMMU_UNITS_SUPPORTED MAX_IO_APICS
337#else
338# define IOMMU_UNITS_SUPPORTED 64
339#endif
340
Mark McLoughlin99126f72008-11-20 15:49:47 +0000341struct dmar_domain {
342 int id; /* domain id */
Suresh Siddha4c923d42009-10-02 11:01:24 -0700343 int nid; /* node id */
Mike Travis1b198bb2012-03-05 15:05:16 -0800344 DECLARE_BITMAP(iommu_bmp, IOMMU_UNITS_SUPPORTED);
345 /* bitmap of iommus this domain uses*/
Mark McLoughlin99126f72008-11-20 15:49:47 +0000346
347 struct list_head devices; /* all devices' list */
348 struct iova_domain iovad; /* iova's that belong to this domain */
349
350 struct dma_pte *pgd; /* virtual address */
Mark McLoughlin99126f72008-11-20 15:49:47 +0000351 int gaw; /* max guest address width */
352
353 /* adjusted guest address width, 0 is level 2 30-bit */
354 int agaw;
355
Weidong Han3b5410e2008-12-08 09:17:15 +0800356 int flags; /* flags to find out type of domain */
Weidong Han8e6040972008-12-08 15:49:06 +0800357
358 int iommu_coherency;/* indicate coherency of iommu access */
Sheng Yang58c610b2009-03-18 15:33:05 +0800359 int iommu_snooping; /* indicate snooping control feature*/
Weidong Hanc7151a82008-12-08 22:51:37 +0800360 int iommu_count; /* reference count of iommu */
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100361 int iommu_superpage;/* Level of superpages supported:
362 0 == 4KiB (no superpages), 1 == 2MiB,
363 2 == 1GiB, 3 == 512GiB, 4 == 1TiB */
Weidong Hanc7151a82008-12-08 22:51:37 +0800364 spinlock_t iommu_lock; /* protect iommu set in domain */
Weidong Hanfe40f1e2008-12-08 23:10:23 +0800365 u64 max_addr; /* maximum mapped address */
Mark McLoughlin99126f72008-11-20 15:49:47 +0000366};
367
Mark McLoughlina647dac2008-11-20 15:49:48 +0000368/* PCI domain-device relationship */
369struct device_domain_info {
370 struct list_head link; /* link to domain siblings */
371 struct list_head global; /* link to global list */
David Woodhouse276dbf992009-04-04 01:45:37 +0100372 u8 bus; /* PCI bus number */
Mark McLoughlina647dac2008-11-20 15:49:48 +0000373 u8 devfn; /* PCI devfn number */
David Woodhouse0bcb3e22014-03-06 17:12:03 +0000374 struct device *dev; /* it's NULL for PCIe-to-PCI bridge */
Yu Zhao93a23a72009-05-18 13:51:37 +0800375 struct intel_iommu *iommu; /* IOMMU used by this device */
Mark McLoughlina647dac2008-11-20 15:49:48 +0000376 struct dmar_domain *domain; /* pointer to domain */
377};
378
Jiang Liub94e4112014-02-19 14:07:25 +0800379struct dmar_rmrr_unit {
380 struct list_head list; /* list of rmrr units */
381 struct acpi_dmar_header *hdr; /* ACPI header */
382 u64 base_address; /* reserved base address*/
383 u64 end_address; /* reserved end address */
David Woodhouse832bd852014-03-07 15:08:36 +0000384 struct dmar_dev_scope *devices; /* target devices */
Jiang Liub94e4112014-02-19 14:07:25 +0800385 int devices_cnt; /* target device count */
386};
387
388struct dmar_atsr_unit {
389 struct list_head list; /* list of ATSR units */
390 struct acpi_dmar_header *hdr; /* ACPI header */
David Woodhouse832bd852014-03-07 15:08:36 +0000391 struct dmar_dev_scope *devices; /* target devices */
Jiang Liub94e4112014-02-19 14:07:25 +0800392 int devices_cnt; /* target device count */
393 u8 include_all:1; /* include all ports */
394};
395
396static LIST_HEAD(dmar_atsr_units);
397static LIST_HEAD(dmar_rmrr_units);
398
399#define for_each_rmrr_units(rmrr) \
400 list_for_each_entry(rmrr, &dmar_rmrr_units, list)
401
mark gross5e0d2a62008-03-04 15:22:08 -0800402static void flush_unmaps_timeout(unsigned long data);
403
Jiang Liub707cb02014-01-06 14:18:26 +0800404static DEFINE_TIMER(unmap_timer, flush_unmaps_timeout, 0, 0);
mark gross5e0d2a62008-03-04 15:22:08 -0800405
mark gross80b20dd2008-04-18 13:53:58 -0700406#define HIGH_WATER_MARK 250
407struct deferred_flush_tables {
408 int next;
409 struct iova *iova[HIGH_WATER_MARK];
410 struct dmar_domain *domain[HIGH_WATER_MARK];
David Woodhouseea8ea462014-03-05 17:09:32 +0000411 struct page *freelist[HIGH_WATER_MARK];
mark gross80b20dd2008-04-18 13:53:58 -0700412};
413
414static struct deferred_flush_tables *deferred_flush;
415
mark gross5e0d2a62008-03-04 15:22:08 -0800416/* bitmap for indexing intel_iommus */
mark gross5e0d2a62008-03-04 15:22:08 -0800417static int g_num_of_iommus;
418
419static DEFINE_SPINLOCK(async_umap_flush_lock);
420static LIST_HEAD(unmaps_to_do);
421
422static int timer_on;
423static long list_size;
mark gross5e0d2a62008-03-04 15:22:08 -0800424
Jiang Liu92d03cc2014-02-19 14:07:28 +0800425static void domain_exit(struct dmar_domain *domain);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700426static void domain_remove_dev_info(struct dmar_domain *domain);
Jiang Liub94e4112014-02-19 14:07:25 +0800427static void domain_remove_one_dev_info(struct dmar_domain *domain,
David Woodhousebf9c9ed2014-03-09 16:19:13 -0700428 struct device *dev);
Jiang Liu92d03cc2014-02-19 14:07:28 +0800429static void iommu_detach_dependent_devices(struct intel_iommu *iommu,
David Woodhouse0bcb3e22014-03-06 17:12:03 +0000430 struct device *dev);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700431
Suresh Siddhad3f13812011-08-23 17:05:25 -0700432#ifdef CONFIG_INTEL_IOMMU_DEFAULT_ON
Kyle McMartin0cd5c3c2009-02-04 14:29:19 -0800433int dmar_disabled = 0;
434#else
435int dmar_disabled = 1;
Suresh Siddhad3f13812011-08-23 17:05:25 -0700436#endif /*CONFIG_INTEL_IOMMU_DEFAULT_ON*/
Kyle McMartin0cd5c3c2009-02-04 14:29:19 -0800437
Eugeni Dodonov8bc1f852011-11-23 16:42:14 -0200438int intel_iommu_enabled = 0;
439EXPORT_SYMBOL_GPL(intel_iommu_enabled);
440
David Woodhouse2d9e6672010-06-15 10:57:57 +0100441static int dmar_map_gfx = 1;
Keshavamurthy, Anil S7d3b03c2007-10-21 16:41:53 -0700442static int dmar_forcedac;
mark gross5e0d2a62008-03-04 15:22:08 -0800443static int intel_iommu_strict;
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100444static int intel_iommu_superpage = 1;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700445
David Woodhousec0771df2011-10-14 20:59:46 +0100446int intel_iommu_gfx_mapped;
447EXPORT_SYMBOL_GPL(intel_iommu_gfx_mapped);
448
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700449#define DUMMY_DEVICE_DOMAIN_INFO ((struct device_domain_info *)(-1))
450static DEFINE_SPINLOCK(device_domain_lock);
451static LIST_HEAD(device_domain_list);
452
Joerg Roedela8bcbb0d2008-12-03 15:14:02 +0100453static struct iommu_ops intel_iommu_ops;
454
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700455static int __init intel_iommu_setup(char *str)
456{
457 if (!str)
458 return -EINVAL;
459 while (*str) {
Kyle McMartin0cd5c3c2009-02-04 14:29:19 -0800460 if (!strncmp(str, "on", 2)) {
461 dmar_disabled = 0;
462 printk(KERN_INFO "Intel-IOMMU: enabled\n");
463 } else if (!strncmp(str, "off", 3)) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700464 dmar_disabled = 1;
Kyle McMartin0cd5c3c2009-02-04 14:29:19 -0800465 printk(KERN_INFO "Intel-IOMMU: disabled\n");
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700466 } else if (!strncmp(str, "igfx_off", 8)) {
467 dmar_map_gfx = 0;
468 printk(KERN_INFO
469 "Intel-IOMMU: disable GFX device mapping\n");
Keshavamurthy, Anil S7d3b03c2007-10-21 16:41:53 -0700470 } else if (!strncmp(str, "forcedac", 8)) {
mark gross5e0d2a62008-03-04 15:22:08 -0800471 printk(KERN_INFO
Keshavamurthy, Anil S7d3b03c2007-10-21 16:41:53 -0700472 "Intel-IOMMU: Forcing DAC for PCI devices\n");
473 dmar_forcedac = 1;
mark gross5e0d2a62008-03-04 15:22:08 -0800474 } else if (!strncmp(str, "strict", 6)) {
475 printk(KERN_INFO
476 "Intel-IOMMU: disable batched IOTLB flush\n");
477 intel_iommu_strict = 1;
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100478 } else if (!strncmp(str, "sp_off", 6)) {
479 printk(KERN_INFO
480 "Intel-IOMMU: disable supported super page\n");
481 intel_iommu_superpage = 0;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700482 }
483
484 str += strcspn(str, ",");
485 while (*str == ',')
486 str++;
487 }
488 return 0;
489}
490__setup("intel_iommu=", intel_iommu_setup);
491
492static struct kmem_cache *iommu_domain_cache;
493static struct kmem_cache *iommu_devinfo_cache;
494static struct kmem_cache *iommu_iova_cache;
495
Suresh Siddha4c923d42009-10-02 11:01:24 -0700496static inline void *alloc_pgtable_page(int node)
Keshavamurthy, Anil Seb3fa7c2007-10-21 16:41:52 -0700497{
Suresh Siddha4c923d42009-10-02 11:01:24 -0700498 struct page *page;
499 void *vaddr = NULL;
Keshavamurthy, Anil Seb3fa7c2007-10-21 16:41:52 -0700500
Suresh Siddha4c923d42009-10-02 11:01:24 -0700501 page = alloc_pages_node(node, GFP_ATOMIC | __GFP_ZERO, 0);
502 if (page)
503 vaddr = page_address(page);
Keshavamurthy, Anil Seb3fa7c2007-10-21 16:41:52 -0700504 return vaddr;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700505}
506
507static inline void free_pgtable_page(void *vaddr)
508{
509 free_page((unsigned long)vaddr);
510}
511
512static inline void *alloc_domain_mem(void)
513{
KOSAKI Motohiro354bb652009-11-17 16:21:09 +0900514 return kmem_cache_alloc(iommu_domain_cache, GFP_ATOMIC);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700515}
516
Kay, Allen M38717942008-09-09 18:37:29 +0300517static void free_domain_mem(void *vaddr)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700518{
519 kmem_cache_free(iommu_domain_cache, vaddr);
520}
521
522static inline void * alloc_devinfo_mem(void)
523{
KOSAKI Motohiro354bb652009-11-17 16:21:09 +0900524 return kmem_cache_alloc(iommu_devinfo_cache, GFP_ATOMIC);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700525}
526
527static inline void free_devinfo_mem(void *vaddr)
528{
529 kmem_cache_free(iommu_devinfo_cache, vaddr);
530}
531
532struct iova *alloc_iova_mem(void)
533{
KOSAKI Motohiro354bb652009-11-17 16:21:09 +0900534 return kmem_cache_alloc(iommu_iova_cache, GFP_ATOMIC);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700535}
536
537void free_iova_mem(struct iova *iova)
538{
539 kmem_cache_free(iommu_iova_cache, iova);
540}
541
Weidong Han1b573682008-12-08 15:34:06 +0800542
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -0700543static int __iommu_calculate_agaw(struct intel_iommu *iommu, int max_gaw)
Weidong Han1b573682008-12-08 15:34:06 +0800544{
545 unsigned long sagaw;
546 int agaw = -1;
547
548 sagaw = cap_sagaw(iommu->cap);
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -0700549 for (agaw = width_to_agaw(max_gaw);
Weidong Han1b573682008-12-08 15:34:06 +0800550 agaw >= 0; agaw--) {
551 if (test_bit(agaw, &sagaw))
552 break;
553 }
554
555 return agaw;
556}
557
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -0700558/*
559 * Calculate max SAGAW for each iommu.
560 */
561int iommu_calculate_max_sagaw(struct intel_iommu *iommu)
562{
563 return __iommu_calculate_agaw(iommu, MAX_AGAW_WIDTH);
564}
565
566/*
567 * calculate agaw for each iommu.
568 * "SAGAW" may be different across iommus, use a default agaw, and
569 * get a supported less agaw for iommus that don't support the default agaw.
570 */
571int iommu_calculate_agaw(struct intel_iommu *iommu)
572{
573 return __iommu_calculate_agaw(iommu, DEFAULT_DOMAIN_ADDRESS_WIDTH);
574}
575
Fenghua Yu2c2e2c32009-06-19 13:47:29 -0700576/* This functionin only returns single iommu in a domain */
Weidong Han8c11e792008-12-08 15:29:22 +0800577static struct intel_iommu *domain_get_iommu(struct dmar_domain *domain)
578{
579 int iommu_id;
580
Fenghua Yu2c2e2c32009-06-19 13:47:29 -0700581 /* si_domain and vm domain should not get here. */
Weidong Han1ce28fe2008-12-08 16:35:39 +0800582 BUG_ON(domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -0700583 BUG_ON(domain->flags & DOMAIN_FLAG_STATIC_IDENTITY);
Weidong Han1ce28fe2008-12-08 16:35:39 +0800584
Mike Travis1b198bb2012-03-05 15:05:16 -0800585 iommu_id = find_first_bit(domain->iommu_bmp, g_num_of_iommus);
Weidong Han8c11e792008-12-08 15:29:22 +0800586 if (iommu_id < 0 || iommu_id >= g_num_of_iommus)
587 return NULL;
588
589 return g_iommus[iommu_id];
590}
591
Weidong Han8e6040972008-12-08 15:49:06 +0800592static void domain_update_iommu_coherency(struct dmar_domain *domain)
593{
David Woodhoused0501962014-03-11 17:10:29 -0700594 struct dmar_drhd_unit *drhd;
595 struct intel_iommu *iommu;
596 int i, found = 0;
Weidong Han8e6040972008-12-08 15:49:06 +0800597
David Woodhoused0501962014-03-11 17:10:29 -0700598 domain->iommu_coherency = 1;
Weidong Han8e6040972008-12-08 15:49:06 +0800599
Mike Travis1b198bb2012-03-05 15:05:16 -0800600 for_each_set_bit(i, domain->iommu_bmp, g_num_of_iommus) {
David Woodhoused0501962014-03-11 17:10:29 -0700601 found = 1;
Weidong Han8e6040972008-12-08 15:49:06 +0800602 if (!ecap_coherent(g_iommus[i]->ecap)) {
603 domain->iommu_coherency = 0;
604 break;
605 }
Weidong Han8e6040972008-12-08 15:49:06 +0800606 }
David Woodhoused0501962014-03-11 17:10:29 -0700607 if (found)
608 return;
609
610 /* No hardware attached; use lowest common denominator */
611 rcu_read_lock();
612 for_each_active_iommu(iommu, drhd) {
613 if (!ecap_coherent(iommu->ecap)) {
614 domain->iommu_coherency = 0;
615 break;
616 }
617 }
618 rcu_read_unlock();
Weidong Han8e6040972008-12-08 15:49:06 +0800619}
620
Sheng Yang58c610b2009-03-18 15:33:05 +0800621static void domain_update_iommu_snooping(struct dmar_domain *domain)
622{
623 int i;
624
625 domain->iommu_snooping = 1;
626
Mike Travis1b198bb2012-03-05 15:05:16 -0800627 for_each_set_bit(i, domain->iommu_bmp, g_num_of_iommus) {
Sheng Yang58c610b2009-03-18 15:33:05 +0800628 if (!ecap_sc_support(g_iommus[i]->ecap)) {
629 domain->iommu_snooping = 0;
630 break;
631 }
Sheng Yang58c610b2009-03-18 15:33:05 +0800632 }
633}
634
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100635static void domain_update_iommu_superpage(struct dmar_domain *domain)
636{
Allen Kay8140a952011-10-14 12:32:17 -0700637 struct dmar_drhd_unit *drhd;
638 struct intel_iommu *iommu = NULL;
639 int mask = 0xf;
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100640
641 if (!intel_iommu_superpage) {
642 domain->iommu_superpage = 0;
643 return;
644 }
645
Allen Kay8140a952011-10-14 12:32:17 -0700646 /* set iommu_superpage to the smallest common denominator */
Jiang Liu0e242612014-02-19 14:07:34 +0800647 rcu_read_lock();
Allen Kay8140a952011-10-14 12:32:17 -0700648 for_each_active_iommu(iommu, drhd) {
649 mask &= cap_super_page_val(iommu->cap);
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100650 if (!mask) {
651 break;
652 }
653 }
Jiang Liu0e242612014-02-19 14:07:34 +0800654 rcu_read_unlock();
655
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100656 domain->iommu_superpage = fls(mask);
657}
658
Sheng Yang58c610b2009-03-18 15:33:05 +0800659/* Some capabilities may be different across iommus */
660static void domain_update_iommu_cap(struct dmar_domain *domain)
661{
662 domain_update_iommu_coherency(domain);
663 domain_update_iommu_snooping(domain);
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100664 domain_update_iommu_superpage(domain);
Sheng Yang58c610b2009-03-18 15:33:05 +0800665}
666
David Woodhouse156baca2014-03-09 14:00:57 -0700667static struct intel_iommu *device_to_iommu(struct device *dev, u8 *bus, u8 *devfn)
Weidong Hanc7151a82008-12-08 22:51:37 +0800668{
669 struct dmar_drhd_unit *drhd = NULL;
Jiang Liub683b232014-02-19 14:07:32 +0800670 struct intel_iommu *iommu;
David Woodhouse156baca2014-03-09 14:00:57 -0700671 struct device *tmp;
672 struct pci_dev *ptmp, *pdev = NULL;
673 u16 segment;
Weidong Hanc7151a82008-12-08 22:51:37 +0800674 int i;
675
David Woodhouse156baca2014-03-09 14:00:57 -0700676 if (dev_is_pci(dev)) {
677 pdev = to_pci_dev(dev);
678 segment = pci_domain_nr(pdev->bus);
679 } else if (ACPI_COMPANION(dev))
680 dev = &ACPI_COMPANION(dev)->dev;
681
Jiang Liu0e242612014-02-19 14:07:34 +0800682 rcu_read_lock();
Jiang Liub683b232014-02-19 14:07:32 +0800683 for_each_active_iommu(iommu, drhd) {
David Woodhouse156baca2014-03-09 14:00:57 -0700684 if (pdev && segment != drhd->segment)
David Woodhouse276dbf992009-04-04 01:45:37 +0100685 continue;
Weidong Hanc7151a82008-12-08 22:51:37 +0800686
Jiang Liub683b232014-02-19 14:07:32 +0800687 for_each_active_dev_scope(drhd->devices,
David Woodhouse156baca2014-03-09 14:00:57 -0700688 drhd->devices_cnt, i, tmp) {
689 if (tmp == dev) {
690 *bus = drhd->devices[i].bus;
691 *devfn = drhd->devices[i].devfn;
692 goto out;
693 }
694
695 if (!pdev || !dev_is_pci(tmp))
David Woodhouse832bd852014-03-07 15:08:36 +0000696 continue;
David Woodhouse156baca2014-03-09 14:00:57 -0700697
698 ptmp = to_pci_dev(tmp);
699 if (ptmp->subordinate &&
700 ptmp->subordinate->number <= pdev->bus->number &&
701 ptmp->subordinate->busn_res.end >= pdev->bus->number)
702 goto got_pdev;
David Woodhouse924b6232009-04-04 00:39:25 +0100703 }
Weidong Hanc7151a82008-12-08 22:51:37 +0800704
David Woodhouse156baca2014-03-09 14:00:57 -0700705 if (pdev && drhd->include_all) {
706 got_pdev:
707 *bus = pdev->bus->number;
708 *devfn = pdev->devfn;
Jiang Liub683b232014-02-19 14:07:32 +0800709 goto out;
David Woodhouse156baca2014-03-09 14:00:57 -0700710 }
Weidong Hanc7151a82008-12-08 22:51:37 +0800711 }
Jiang Liub683b232014-02-19 14:07:32 +0800712 iommu = NULL;
David Woodhouse156baca2014-03-09 14:00:57 -0700713 out:
Jiang Liu0e242612014-02-19 14:07:34 +0800714 rcu_read_unlock();
Weidong Hanc7151a82008-12-08 22:51:37 +0800715
Jiang Liub683b232014-02-19 14:07:32 +0800716 return iommu;
Weidong Hanc7151a82008-12-08 22:51:37 +0800717}
718
Weidong Han5331fe62008-12-08 23:00:00 +0800719static void domain_flush_cache(struct dmar_domain *domain,
720 void *addr, int size)
721{
722 if (!domain->iommu_coherency)
723 clflush_cache_range(addr, size);
724}
725
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700726/* Gets context entry for a given bus and devfn */
727static struct context_entry * device_to_context_entry(struct intel_iommu *iommu,
728 u8 bus, u8 devfn)
729{
730 struct root_entry *root;
731 struct context_entry *context;
732 unsigned long phy_addr;
733 unsigned long flags;
734
735 spin_lock_irqsave(&iommu->lock, flags);
736 root = &iommu->root_entry[bus];
737 context = get_context_addr_from_root(root);
738 if (!context) {
Suresh Siddha4c923d42009-10-02 11:01:24 -0700739 context = (struct context_entry *)
740 alloc_pgtable_page(iommu->node);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700741 if (!context) {
742 spin_unlock_irqrestore(&iommu->lock, flags);
743 return NULL;
744 }
Fenghua Yu5b6985c2008-10-16 18:02:32 -0700745 __iommu_flush_cache(iommu, (void *)context, CONTEXT_SIZE);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700746 phy_addr = virt_to_phys((void *)context);
747 set_root_value(root, phy_addr);
748 set_root_present(root);
749 __iommu_flush_cache(iommu, root, sizeof(*root));
750 }
751 spin_unlock_irqrestore(&iommu->lock, flags);
752 return &context[devfn];
753}
754
755static int device_context_mapped(struct intel_iommu *iommu, u8 bus, u8 devfn)
756{
757 struct root_entry *root;
758 struct context_entry *context;
759 int ret;
760 unsigned long flags;
761
762 spin_lock_irqsave(&iommu->lock, flags);
763 root = &iommu->root_entry[bus];
764 context = get_context_addr_from_root(root);
765 if (!context) {
766 ret = 0;
767 goto out;
768 }
Mark McLoughlinc07e7d22008-11-21 16:54:46 +0000769 ret = context_present(&context[devfn]);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700770out:
771 spin_unlock_irqrestore(&iommu->lock, flags);
772 return ret;
773}
774
775static void clear_context_table(struct intel_iommu *iommu, u8 bus, u8 devfn)
776{
777 struct root_entry *root;
778 struct context_entry *context;
779 unsigned long flags;
780
781 spin_lock_irqsave(&iommu->lock, flags);
782 root = &iommu->root_entry[bus];
783 context = get_context_addr_from_root(root);
784 if (context) {
Mark McLoughlinc07e7d22008-11-21 16:54:46 +0000785 context_clear_entry(&context[devfn]);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700786 __iommu_flush_cache(iommu, &context[devfn], \
787 sizeof(*context));
788 }
789 spin_unlock_irqrestore(&iommu->lock, flags);
790}
791
792static void free_context_table(struct intel_iommu *iommu)
793{
794 struct root_entry *root;
795 int i;
796 unsigned long flags;
797 struct context_entry *context;
798
799 spin_lock_irqsave(&iommu->lock, flags);
800 if (!iommu->root_entry) {
801 goto out;
802 }
803 for (i = 0; i < ROOT_ENTRY_NR; i++) {
804 root = &iommu->root_entry[i];
805 context = get_context_addr_from_root(root);
806 if (context)
807 free_pgtable_page(context);
808 }
809 free_pgtable_page(iommu->root_entry);
810 iommu->root_entry = NULL;
811out:
812 spin_unlock_irqrestore(&iommu->lock, flags);
813}
814
David Woodhouseb026fd22009-06-28 10:37:25 +0100815static struct dma_pte *pfn_to_dma_pte(struct dmar_domain *domain,
David Woodhouse5cf0a762014-03-19 16:07:49 +0000816 unsigned long pfn, int *target_level)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700817{
David Woodhouseb026fd22009-06-28 10:37:25 +0100818 int addr_width = agaw_to_width(domain->agaw) - VTD_PAGE_SHIFT;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700819 struct dma_pte *parent, *pte = NULL;
820 int level = agaw_to_level(domain->agaw);
Allen Kay4399c8b2011-10-14 12:32:46 -0700821 int offset;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700822
823 BUG_ON(!domain->pgd);
Julian Stecklinaf9423602013-10-09 10:03:52 +0200824
825 if (addr_width < BITS_PER_LONG && pfn >> addr_width)
826 /* Address beyond IOMMU's addressing capabilities. */
827 return NULL;
828
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700829 parent = domain->pgd;
830
David Woodhouse5cf0a762014-03-19 16:07:49 +0000831 while (1) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700832 void *tmp_page;
833
David Woodhouseb026fd22009-06-28 10:37:25 +0100834 offset = pfn_level_offset(pfn, level);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700835 pte = &parent[offset];
David Woodhouse5cf0a762014-03-19 16:07:49 +0000836 if (!*target_level && (dma_pte_superpage(pte) || !dma_pte_present(pte)))
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100837 break;
David Woodhouse5cf0a762014-03-19 16:07:49 +0000838 if (level == *target_level)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700839 break;
840
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000841 if (!dma_pte_present(pte)) {
David Woodhousec85994e2009-07-01 19:21:24 +0100842 uint64_t pteval;
843
Suresh Siddha4c923d42009-10-02 11:01:24 -0700844 tmp_page = alloc_pgtable_page(domain->nid);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700845
David Woodhouse206a73c2009-07-01 19:30:28 +0100846 if (!tmp_page)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700847 return NULL;
David Woodhouse206a73c2009-07-01 19:30:28 +0100848
David Woodhousec85994e2009-07-01 19:21:24 +0100849 domain_flush_cache(domain, tmp_page, VTD_PAGE_SIZE);
Benjamin LaHaise64de5af2009-09-16 21:05:55 -0400850 pteval = ((uint64_t)virt_to_dma_pfn(tmp_page) << VTD_PAGE_SHIFT) | DMA_PTE_READ | DMA_PTE_WRITE;
David Woodhousec85994e2009-07-01 19:21:24 +0100851 if (cmpxchg64(&pte->val, 0ULL, pteval)) {
852 /* Someone else set it while we were thinking; use theirs. */
853 free_pgtable_page(tmp_page);
854 } else {
855 dma_pte_addr(pte);
856 domain_flush_cache(domain, pte, sizeof(*pte));
857 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700858 }
David Woodhouse5cf0a762014-03-19 16:07:49 +0000859 if (level == 1)
860 break;
861
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000862 parent = phys_to_virt(dma_pte_addr(pte));
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700863 level--;
864 }
865
David Woodhouse5cf0a762014-03-19 16:07:49 +0000866 if (!*target_level)
867 *target_level = level;
868
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700869 return pte;
870}
871
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100872
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700873/* return address's pte at specific level */
David Woodhouse90dcfb52009-06-27 17:14:59 +0100874static struct dma_pte *dma_pfn_level_pte(struct dmar_domain *domain,
875 unsigned long pfn,
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100876 int level, int *large_page)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700877{
878 struct dma_pte *parent, *pte = NULL;
879 int total = agaw_to_level(domain->agaw);
880 int offset;
881
882 parent = domain->pgd;
883 while (level <= total) {
David Woodhouse90dcfb52009-06-27 17:14:59 +0100884 offset = pfn_level_offset(pfn, total);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700885 pte = &parent[offset];
886 if (level == total)
887 return pte;
888
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100889 if (!dma_pte_present(pte)) {
890 *large_page = total;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700891 break;
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100892 }
893
894 if (pte->val & DMA_PTE_LARGE_PAGE) {
895 *large_page = total;
896 return pte;
897 }
898
Mark McLoughlin19c239c2008-11-21 16:56:53 +0000899 parent = phys_to_virt(dma_pte_addr(pte));
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700900 total--;
901 }
902 return NULL;
903}
904
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700905/* clear last level pte, a tlb flush should be followed */
David Woodhouse5cf0a762014-03-19 16:07:49 +0000906static void dma_pte_clear_range(struct dmar_domain *domain,
David Woodhouse595badf2009-06-27 22:09:11 +0100907 unsigned long start_pfn,
908 unsigned long last_pfn)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700909{
David Woodhouse04b18e62009-06-27 19:15:01 +0100910 int addr_width = agaw_to_width(domain->agaw) - VTD_PAGE_SHIFT;
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100911 unsigned int large_page = 1;
David Woodhouse310a5ab2009-06-28 18:52:20 +0100912 struct dma_pte *first_pte, *pte;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700913
David Woodhouse04b18e62009-06-27 19:15:01 +0100914 BUG_ON(addr_width < BITS_PER_LONG && start_pfn >> addr_width);
David Woodhouse595badf2009-06-27 22:09:11 +0100915 BUG_ON(addr_width < BITS_PER_LONG && last_pfn >> addr_width);
David Woodhouse59c36282009-09-19 07:36:28 -0700916 BUG_ON(start_pfn > last_pfn);
David Woodhouse66eae842009-06-27 19:00:32 +0100917
David Woodhouse04b18e62009-06-27 19:15:01 +0100918 /* we don't need lock here; nobody else touches the iova range */
David Woodhouse59c36282009-09-19 07:36:28 -0700919 do {
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100920 large_page = 1;
921 first_pte = pte = dma_pfn_level_pte(domain, start_pfn, 1, &large_page);
David Woodhouse310a5ab2009-06-28 18:52:20 +0100922 if (!pte) {
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100923 start_pfn = align_to_level(start_pfn + 1, large_page + 1);
David Woodhouse310a5ab2009-06-28 18:52:20 +0100924 continue;
925 }
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100926 do {
David Woodhouse310a5ab2009-06-28 18:52:20 +0100927 dma_clear_pte(pte);
Youquan Song6dd9a7c2011-05-25 19:13:49 +0100928 start_pfn += lvl_to_nr_pages(large_page);
David Woodhouse310a5ab2009-06-28 18:52:20 +0100929 pte++;
David Woodhouse75e6bf92009-07-02 11:21:16 +0100930 } while (start_pfn <= last_pfn && !first_pte_in_page(pte));
931
David Woodhouse310a5ab2009-06-28 18:52:20 +0100932 domain_flush_cache(domain, first_pte,
933 (void *)pte - (void *)first_pte);
David Woodhouse59c36282009-09-19 07:36:28 -0700934
935 } while (start_pfn && start_pfn <= last_pfn);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700936}
937
Alex Williamson3269ee02013-06-15 10:27:19 -0600938static void dma_pte_free_level(struct dmar_domain *domain, int level,
939 struct dma_pte *pte, unsigned long pfn,
940 unsigned long start_pfn, unsigned long last_pfn)
941{
942 pfn = max(start_pfn, pfn);
943 pte = &pte[pfn_level_offset(pfn, level)];
944
945 do {
946 unsigned long level_pfn;
947 struct dma_pte *level_pte;
948
949 if (!dma_pte_present(pte) || dma_pte_superpage(pte))
950 goto next;
951
952 level_pfn = pfn & level_mask(level - 1);
953 level_pte = phys_to_virt(dma_pte_addr(pte));
954
955 if (level > 2)
956 dma_pte_free_level(domain, level - 1, level_pte,
957 level_pfn, start_pfn, last_pfn);
958
959 /* If range covers entire pagetable, free it */
960 if (!(start_pfn > level_pfn ||
Alex Williamson08336fd2014-01-21 15:48:18 -0800961 last_pfn < level_pfn + level_size(level) - 1)) {
Alex Williamson3269ee02013-06-15 10:27:19 -0600962 dma_clear_pte(pte);
963 domain_flush_cache(domain, pte, sizeof(*pte));
964 free_pgtable_page(level_pte);
965 }
966next:
967 pfn += level_size(level);
968 } while (!first_pte_in_page(++pte) && pfn <= last_pfn);
969}
970
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700971/* free page table pages. last level pte should already be cleared */
972static void dma_pte_free_pagetable(struct dmar_domain *domain,
David Woodhoused794dc92009-06-28 00:27:49 +0100973 unsigned long start_pfn,
974 unsigned long last_pfn)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700975{
David Woodhouse6660c632009-06-27 22:41:00 +0100976 int addr_width = agaw_to_width(domain->agaw) - VTD_PAGE_SHIFT;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700977
David Woodhouse6660c632009-06-27 22:41:00 +0100978 BUG_ON(addr_width < BITS_PER_LONG && start_pfn >> addr_width);
979 BUG_ON(addr_width < BITS_PER_LONG && last_pfn >> addr_width);
David Woodhouse59c36282009-09-19 07:36:28 -0700980 BUG_ON(start_pfn > last_pfn);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700981
David Woodhousef3a0a522009-06-30 03:40:07 +0100982 /* We don't need lock here; nobody else touches the iova range */
Alex Williamson3269ee02013-06-15 10:27:19 -0600983 dma_pte_free_level(domain, agaw_to_level(domain->agaw),
984 domain->pgd, 0, start_pfn, last_pfn);
David Woodhouse6660c632009-06-27 22:41:00 +0100985
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700986 /* free pgd */
David Woodhoused794dc92009-06-28 00:27:49 +0100987 if (start_pfn == 0 && last_pfn == DOMAIN_MAX_PFN(domain->gaw)) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -0700988 free_pgtable_page(domain->pgd);
989 domain->pgd = NULL;
990 }
991}
992
David Woodhouseea8ea462014-03-05 17:09:32 +0000993/* When a page at a given level is being unlinked from its parent, we don't
994 need to *modify* it at all. All we need to do is make a list of all the
995 pages which can be freed just as soon as we've flushed the IOTLB and we
996 know the hardware page-walk will no longer touch them.
997 The 'pte' argument is the *parent* PTE, pointing to the page that is to
998 be freed. */
999static struct page *dma_pte_list_pagetables(struct dmar_domain *domain,
1000 int level, struct dma_pte *pte,
1001 struct page *freelist)
1002{
1003 struct page *pg;
1004
1005 pg = pfn_to_page(dma_pte_addr(pte) >> PAGE_SHIFT);
1006 pg->freelist = freelist;
1007 freelist = pg;
1008
1009 if (level == 1)
1010 return freelist;
1011
Jiang Liuadeb2592014-04-09 10:20:39 +08001012 pte = page_address(pg);
1013 do {
David Woodhouseea8ea462014-03-05 17:09:32 +00001014 if (dma_pte_present(pte) && !dma_pte_superpage(pte))
1015 freelist = dma_pte_list_pagetables(domain, level - 1,
1016 pte, freelist);
Jiang Liuadeb2592014-04-09 10:20:39 +08001017 pte++;
1018 } while (!first_pte_in_page(pte));
David Woodhouseea8ea462014-03-05 17:09:32 +00001019
1020 return freelist;
1021}
1022
1023static struct page *dma_pte_clear_level(struct dmar_domain *domain, int level,
1024 struct dma_pte *pte, unsigned long pfn,
1025 unsigned long start_pfn,
1026 unsigned long last_pfn,
1027 struct page *freelist)
1028{
1029 struct dma_pte *first_pte = NULL, *last_pte = NULL;
1030
1031 pfn = max(start_pfn, pfn);
1032 pte = &pte[pfn_level_offset(pfn, level)];
1033
1034 do {
1035 unsigned long level_pfn;
1036
1037 if (!dma_pte_present(pte))
1038 goto next;
1039
1040 level_pfn = pfn & level_mask(level);
1041
1042 /* If range covers entire pagetable, free it */
1043 if (start_pfn <= level_pfn &&
1044 last_pfn >= level_pfn + level_size(level) - 1) {
1045 /* These suborbinate page tables are going away entirely. Don't
1046 bother to clear them; we're just going to *free* them. */
1047 if (level > 1 && !dma_pte_superpage(pte))
1048 freelist = dma_pte_list_pagetables(domain, level - 1, pte, freelist);
1049
1050 dma_clear_pte(pte);
1051 if (!first_pte)
1052 first_pte = pte;
1053 last_pte = pte;
1054 } else if (level > 1) {
1055 /* Recurse down into a level that isn't *entirely* obsolete */
1056 freelist = dma_pte_clear_level(domain, level - 1,
1057 phys_to_virt(dma_pte_addr(pte)),
1058 level_pfn, start_pfn, last_pfn,
1059 freelist);
1060 }
1061next:
1062 pfn += level_size(level);
1063 } while (!first_pte_in_page(++pte) && pfn <= last_pfn);
1064
1065 if (first_pte)
1066 domain_flush_cache(domain, first_pte,
1067 (void *)++last_pte - (void *)first_pte);
1068
1069 return freelist;
1070}
1071
1072/* We can't just free the pages because the IOMMU may still be walking
1073 the page tables, and may have cached the intermediate levels. The
1074 pages can only be freed after the IOTLB flush has been done. */
1075struct page *domain_unmap(struct dmar_domain *domain,
1076 unsigned long start_pfn,
1077 unsigned long last_pfn)
1078{
1079 int addr_width = agaw_to_width(domain->agaw) - VTD_PAGE_SHIFT;
1080 struct page *freelist = NULL;
1081
1082 BUG_ON(addr_width < BITS_PER_LONG && start_pfn >> addr_width);
1083 BUG_ON(addr_width < BITS_PER_LONG && last_pfn >> addr_width);
1084 BUG_ON(start_pfn > last_pfn);
1085
1086 /* we don't need lock here; nobody else touches the iova range */
1087 freelist = dma_pte_clear_level(domain, agaw_to_level(domain->agaw),
1088 domain->pgd, 0, start_pfn, last_pfn, NULL);
1089
1090 /* free pgd */
1091 if (start_pfn == 0 && last_pfn == DOMAIN_MAX_PFN(domain->gaw)) {
1092 struct page *pgd_page = virt_to_page(domain->pgd);
1093 pgd_page->freelist = freelist;
1094 freelist = pgd_page;
1095
1096 domain->pgd = NULL;
1097 }
1098
1099 return freelist;
1100}
1101
1102void dma_free_pagelist(struct page *freelist)
1103{
1104 struct page *pg;
1105
1106 while ((pg = freelist)) {
1107 freelist = pg->freelist;
1108 free_pgtable_page(page_address(pg));
1109 }
1110}
1111
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001112/* iommu handling */
1113static int iommu_alloc_root_entry(struct intel_iommu *iommu)
1114{
1115 struct root_entry *root;
1116 unsigned long flags;
1117
Suresh Siddha4c923d42009-10-02 11:01:24 -07001118 root = (struct root_entry *)alloc_pgtable_page(iommu->node);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001119 if (!root)
1120 return -ENOMEM;
1121
Fenghua Yu5b6985c2008-10-16 18:02:32 -07001122 __iommu_flush_cache(iommu, root, ROOT_SIZE);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001123
1124 spin_lock_irqsave(&iommu->lock, flags);
1125 iommu->root_entry = root;
1126 spin_unlock_irqrestore(&iommu->lock, flags);
1127
1128 return 0;
1129}
1130
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001131static void iommu_set_root_entry(struct intel_iommu *iommu)
1132{
1133 void *addr;
David Woodhousec416daa2009-05-10 20:30:58 +01001134 u32 sts;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001135 unsigned long flag;
1136
1137 addr = iommu->root_entry;
1138
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001139 raw_spin_lock_irqsave(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001140 dmar_writeq(iommu->reg + DMAR_RTADDR_REG, virt_to_phys(addr));
1141
David Woodhousec416daa2009-05-10 20:30:58 +01001142 writel(iommu->gcmd | DMA_GCMD_SRTP, iommu->reg + DMAR_GCMD_REG);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001143
1144 /* Make sure hardware complete it */
1145 IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG,
David Woodhousec416daa2009-05-10 20:30:58 +01001146 readl, (sts & DMA_GSTS_RTPS), sts);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001147
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001148 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001149}
1150
1151static void iommu_flush_write_buffer(struct intel_iommu *iommu)
1152{
1153 u32 val;
1154 unsigned long flag;
1155
David Woodhouse9af88142009-02-13 23:18:03 +00001156 if (!rwbf_quirk && !cap_rwbf(iommu->cap))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001157 return;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001158
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001159 raw_spin_lock_irqsave(&iommu->register_lock, flag);
David Woodhouse462b60f2009-05-10 20:18:18 +01001160 writel(iommu->gcmd | DMA_GCMD_WBF, iommu->reg + DMAR_GCMD_REG);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001161
1162 /* Make sure hardware complete it */
1163 IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG,
David Woodhousec416daa2009-05-10 20:30:58 +01001164 readl, (!(val & DMA_GSTS_WBFS)), val);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001165
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001166 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001167}
1168
1169/* return value determine if we need a write buffer flush */
David Woodhouse4c25a2c2009-05-10 17:16:06 +01001170static void __iommu_flush_context(struct intel_iommu *iommu,
1171 u16 did, u16 source_id, u8 function_mask,
1172 u64 type)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001173{
1174 u64 val = 0;
1175 unsigned long flag;
1176
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001177 switch (type) {
1178 case DMA_CCMD_GLOBAL_INVL:
1179 val = DMA_CCMD_GLOBAL_INVL;
1180 break;
1181 case DMA_CCMD_DOMAIN_INVL:
1182 val = DMA_CCMD_DOMAIN_INVL|DMA_CCMD_DID(did);
1183 break;
1184 case DMA_CCMD_DEVICE_INVL:
1185 val = DMA_CCMD_DEVICE_INVL|DMA_CCMD_DID(did)
1186 | DMA_CCMD_SID(source_id) | DMA_CCMD_FM(function_mask);
1187 break;
1188 default:
1189 BUG();
1190 }
1191 val |= DMA_CCMD_ICC;
1192
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001193 raw_spin_lock_irqsave(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001194 dmar_writeq(iommu->reg + DMAR_CCMD_REG, val);
1195
1196 /* Make sure hardware complete it */
1197 IOMMU_WAIT_OP(iommu, DMAR_CCMD_REG,
1198 dmar_readq, (!(val & DMA_CCMD_ICC)), val);
1199
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001200 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001201}
1202
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001203/* return value determine if we need a write buffer flush */
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01001204static void __iommu_flush_iotlb(struct intel_iommu *iommu, u16 did,
1205 u64 addr, unsigned int size_order, u64 type)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001206{
1207 int tlb_offset = ecap_iotlb_offset(iommu->ecap);
1208 u64 val = 0, val_iva = 0;
1209 unsigned long flag;
1210
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001211 switch (type) {
1212 case DMA_TLB_GLOBAL_FLUSH:
1213 /* global flush doesn't need set IVA_REG */
1214 val = DMA_TLB_GLOBAL_FLUSH|DMA_TLB_IVT;
1215 break;
1216 case DMA_TLB_DSI_FLUSH:
1217 val = DMA_TLB_DSI_FLUSH|DMA_TLB_IVT|DMA_TLB_DID(did);
1218 break;
1219 case DMA_TLB_PSI_FLUSH:
1220 val = DMA_TLB_PSI_FLUSH|DMA_TLB_IVT|DMA_TLB_DID(did);
David Woodhouseea8ea462014-03-05 17:09:32 +00001221 /* IH bit is passed in as part of address */
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001222 val_iva = size_order | addr;
1223 break;
1224 default:
1225 BUG();
1226 }
1227 /* Note: set drain read/write */
1228#if 0
1229 /*
1230 * This is probably to be super secure.. Looks like we can
1231 * ignore it without any impact.
1232 */
1233 if (cap_read_drain(iommu->cap))
1234 val |= DMA_TLB_READ_DRAIN;
1235#endif
1236 if (cap_write_drain(iommu->cap))
1237 val |= DMA_TLB_WRITE_DRAIN;
1238
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001239 raw_spin_lock_irqsave(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001240 /* Note: Only uses first TLB reg currently */
1241 if (val_iva)
1242 dmar_writeq(iommu->reg + tlb_offset, val_iva);
1243 dmar_writeq(iommu->reg + tlb_offset + 8, val);
1244
1245 /* Make sure hardware complete it */
1246 IOMMU_WAIT_OP(iommu, tlb_offset + 8,
1247 dmar_readq, (!(val & DMA_TLB_IVT)), val);
1248
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001249 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001250
1251 /* check IOTLB invalidation granularity */
1252 if (DMA_TLB_IAIG(val) == 0)
1253 printk(KERN_ERR"IOMMU: flush IOTLB failed\n");
1254 if (DMA_TLB_IAIG(val) != DMA_TLB_IIRG(type))
1255 pr_debug("IOMMU: tlb flush request %Lx, actual %Lx\n",
Fenghua Yu5b6985c2008-10-16 18:02:32 -07001256 (unsigned long long)DMA_TLB_IIRG(type),
1257 (unsigned long long)DMA_TLB_IAIG(val));
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001258}
1259
David Woodhouse64ae8922014-03-09 12:52:30 -07001260static struct device_domain_info *
1261iommu_support_dev_iotlb (struct dmar_domain *domain, struct intel_iommu *iommu,
1262 u8 bus, u8 devfn)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001263{
Yu Zhao93a23a72009-05-18 13:51:37 +08001264 int found = 0;
1265 unsigned long flags;
1266 struct device_domain_info *info;
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001267 struct pci_dev *pdev;
Yu Zhao93a23a72009-05-18 13:51:37 +08001268
1269 if (!ecap_dev_iotlb_support(iommu->ecap))
1270 return NULL;
1271
1272 if (!iommu->qi)
1273 return NULL;
1274
1275 spin_lock_irqsave(&device_domain_lock, flags);
1276 list_for_each_entry(info, &domain->devices, link)
1277 if (info->bus == bus && info->devfn == devfn) {
1278 found = 1;
1279 break;
1280 }
1281 spin_unlock_irqrestore(&device_domain_lock, flags);
1282
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001283 if (!found || !info->dev || !dev_is_pci(info->dev))
Yu Zhao93a23a72009-05-18 13:51:37 +08001284 return NULL;
1285
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001286 pdev = to_pci_dev(info->dev);
1287
1288 if (!pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_ATS))
Yu Zhao93a23a72009-05-18 13:51:37 +08001289 return NULL;
1290
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001291 if (!dmar_find_matched_atsr_unit(pdev))
Yu Zhao93a23a72009-05-18 13:51:37 +08001292 return NULL;
1293
Yu Zhao93a23a72009-05-18 13:51:37 +08001294 return info;
1295}
1296
1297static void iommu_enable_dev_iotlb(struct device_domain_info *info)
1298{
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001299 if (!info || !dev_is_pci(info->dev))
Yu Zhao93a23a72009-05-18 13:51:37 +08001300 return;
1301
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001302 pci_enable_ats(to_pci_dev(info->dev), VTD_PAGE_SHIFT);
Yu Zhao93a23a72009-05-18 13:51:37 +08001303}
1304
1305static void iommu_disable_dev_iotlb(struct device_domain_info *info)
1306{
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001307 if (!info->dev || !dev_is_pci(info->dev) ||
1308 !pci_ats_enabled(to_pci_dev(info->dev)))
Yu Zhao93a23a72009-05-18 13:51:37 +08001309 return;
1310
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001311 pci_disable_ats(to_pci_dev(info->dev));
Yu Zhao93a23a72009-05-18 13:51:37 +08001312}
1313
1314static void iommu_flush_dev_iotlb(struct dmar_domain *domain,
1315 u64 addr, unsigned mask)
1316{
1317 u16 sid, qdep;
1318 unsigned long flags;
1319 struct device_domain_info *info;
1320
1321 spin_lock_irqsave(&device_domain_lock, flags);
1322 list_for_each_entry(info, &domain->devices, link) {
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001323 struct pci_dev *pdev;
1324 if (!info->dev || !dev_is_pci(info->dev))
1325 continue;
1326
1327 pdev = to_pci_dev(info->dev);
1328 if (!pci_ats_enabled(pdev))
Yu Zhao93a23a72009-05-18 13:51:37 +08001329 continue;
1330
1331 sid = info->bus << 8 | info->devfn;
David Woodhouse0bcb3e22014-03-06 17:12:03 +00001332 qdep = pci_ats_queue_depth(pdev);
Yu Zhao93a23a72009-05-18 13:51:37 +08001333 qi_flush_dev_iotlb(info->iommu, sid, qdep, addr, mask);
1334 }
1335 spin_unlock_irqrestore(&device_domain_lock, flags);
1336}
1337
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01001338static void iommu_flush_iotlb_psi(struct intel_iommu *iommu, u16 did,
David Woodhouseea8ea462014-03-05 17:09:32 +00001339 unsigned long pfn, unsigned int pages, int ih, int map)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001340{
Yu Zhao9dd2fe82009-05-18 13:51:36 +08001341 unsigned int mask = ilog2(__roundup_pow_of_two(pages));
David Woodhouse03d6a242009-06-28 15:33:46 +01001342 uint64_t addr = (uint64_t)pfn << VTD_PAGE_SHIFT;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001343
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001344 BUG_ON(pages == 0);
1345
David Woodhouseea8ea462014-03-05 17:09:32 +00001346 if (ih)
1347 ih = 1 << 6;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001348 /*
Yu Zhao9dd2fe82009-05-18 13:51:36 +08001349 * Fallback to domain selective flush if no PSI support or the size is
1350 * too big.
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001351 * PSI requires page size to be 2 ^ x, and the base address is naturally
1352 * aligned to the size
1353 */
Yu Zhao9dd2fe82009-05-18 13:51:36 +08001354 if (!cap_pgsel_inv(iommu->cap) || mask > cap_max_amask_val(iommu->cap))
1355 iommu->flush.flush_iotlb(iommu, did, 0, 0,
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01001356 DMA_TLB_DSI_FLUSH);
Yu Zhao9dd2fe82009-05-18 13:51:36 +08001357 else
David Woodhouseea8ea462014-03-05 17:09:32 +00001358 iommu->flush.flush_iotlb(iommu, did, addr | ih, mask,
Yu Zhao9dd2fe82009-05-18 13:51:36 +08001359 DMA_TLB_PSI_FLUSH);
Yu Zhaobf92df32009-06-29 11:31:45 +08001360
1361 /*
Nadav Amit82653632010-04-01 13:24:40 +03001362 * In caching mode, changes of pages from non-present to present require
1363 * flush. However, device IOTLB doesn't need to be flushed in this case.
Yu Zhaobf92df32009-06-29 11:31:45 +08001364 */
Nadav Amit82653632010-04-01 13:24:40 +03001365 if (!cap_caching_mode(iommu->cap) || !map)
Yu Zhao93a23a72009-05-18 13:51:37 +08001366 iommu_flush_dev_iotlb(iommu->domains[did], addr, mask);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001367}
1368
mark grossf8bab732008-02-08 04:18:38 -08001369static void iommu_disable_protect_mem_regions(struct intel_iommu *iommu)
1370{
1371 u32 pmen;
1372 unsigned long flags;
1373
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001374 raw_spin_lock_irqsave(&iommu->register_lock, flags);
mark grossf8bab732008-02-08 04:18:38 -08001375 pmen = readl(iommu->reg + DMAR_PMEN_REG);
1376 pmen &= ~DMA_PMEN_EPM;
1377 writel(pmen, iommu->reg + DMAR_PMEN_REG);
1378
1379 /* wait for the protected region status bit to clear */
1380 IOMMU_WAIT_OP(iommu, DMAR_PMEN_REG,
1381 readl, !(pmen & DMA_PMEN_PRS), pmen);
1382
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001383 raw_spin_unlock_irqrestore(&iommu->register_lock, flags);
mark grossf8bab732008-02-08 04:18:38 -08001384}
1385
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001386static int iommu_enable_translation(struct intel_iommu *iommu)
1387{
1388 u32 sts;
1389 unsigned long flags;
1390
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001391 raw_spin_lock_irqsave(&iommu->register_lock, flags);
David Woodhousec416daa2009-05-10 20:30:58 +01001392 iommu->gcmd |= DMA_GCMD_TE;
1393 writel(iommu->gcmd, iommu->reg + DMAR_GCMD_REG);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001394
1395 /* Make sure hardware complete it */
1396 IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG,
David Woodhousec416daa2009-05-10 20:30:58 +01001397 readl, (sts & DMA_GSTS_TES), sts);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001398
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001399 raw_spin_unlock_irqrestore(&iommu->register_lock, flags);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001400 return 0;
1401}
1402
1403static int iommu_disable_translation(struct intel_iommu *iommu)
1404{
1405 u32 sts;
1406 unsigned long flag;
1407
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001408 raw_spin_lock_irqsave(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001409 iommu->gcmd &= ~DMA_GCMD_TE;
1410 writel(iommu->gcmd, iommu->reg + DMAR_GCMD_REG);
1411
1412 /* Make sure hardware complete it */
1413 IOMMU_WAIT_OP(iommu, DMAR_GSTS_REG,
David Woodhousec416daa2009-05-10 20:30:58 +01001414 readl, (!(sts & DMA_GSTS_TES)), sts);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001415
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02001416 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001417 return 0;
1418}
1419
Keshavamurthy, Anil S3460a6d2007-10-21 16:41:54 -07001420
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001421static int iommu_init_domains(struct intel_iommu *iommu)
1422{
1423 unsigned long ndomains;
1424 unsigned long nlongs;
1425
1426 ndomains = cap_ndoms(iommu->cap);
Jiang Liu852bdb02014-01-06 14:18:11 +08001427 pr_debug("IOMMU%d: Number of Domains supported <%ld>\n",
1428 iommu->seq_id, ndomains);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001429 nlongs = BITS_TO_LONGS(ndomains);
1430
Donald Dutile94a91b52009-08-20 16:51:34 -04001431 spin_lock_init(&iommu->lock);
1432
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001433 /* TBD: there might be 64K domains,
1434 * consider other allocation for future chip
1435 */
1436 iommu->domain_ids = kcalloc(nlongs, sizeof(unsigned long), GFP_KERNEL);
1437 if (!iommu->domain_ids) {
Jiang Liu852bdb02014-01-06 14:18:11 +08001438 pr_err("IOMMU%d: allocating domain id array failed\n",
1439 iommu->seq_id);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001440 return -ENOMEM;
1441 }
1442 iommu->domains = kcalloc(ndomains, sizeof(struct dmar_domain *),
1443 GFP_KERNEL);
1444 if (!iommu->domains) {
Jiang Liu852bdb02014-01-06 14:18:11 +08001445 pr_err("IOMMU%d: allocating domain array failed\n",
1446 iommu->seq_id);
1447 kfree(iommu->domain_ids);
1448 iommu->domain_ids = NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001449 return -ENOMEM;
1450 }
1451
1452 /*
1453 * if Caching mode is set, then invalid translations are tagged
1454 * with domainid 0. Hence we need to pre-allocate it.
1455 */
1456 if (cap_caching_mode(iommu->cap))
1457 set_bit(0, iommu->domain_ids);
1458 return 0;
1459}
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001460
Jiang Liua868e6b2014-01-06 14:18:20 +08001461static void free_dmar_iommu(struct intel_iommu *iommu)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001462{
1463 struct dmar_domain *domain;
Jiang Liu5ced12a2014-01-06 14:18:22 +08001464 int i, count;
Weidong Hanc7151a82008-12-08 22:51:37 +08001465 unsigned long flags;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001466
Donald Dutile94a91b52009-08-20 16:51:34 -04001467 if ((iommu->domains) && (iommu->domain_ids)) {
Akinobu Mitaa45946a2010-03-11 14:04:08 -08001468 for_each_set_bit(i, iommu->domain_ids, cap_ndoms(iommu->cap)) {
Jiang Liua4eaa862014-02-19 14:07:30 +08001469 /*
1470 * Domain id 0 is reserved for invalid translation
1471 * if hardware supports caching mode.
1472 */
1473 if (cap_caching_mode(iommu->cap) && i == 0)
1474 continue;
1475
Donald Dutile94a91b52009-08-20 16:51:34 -04001476 domain = iommu->domains[i];
1477 clear_bit(i, iommu->domain_ids);
Weidong Hanc7151a82008-12-08 22:51:37 +08001478
Donald Dutile94a91b52009-08-20 16:51:34 -04001479 spin_lock_irqsave(&domain->iommu_lock, flags);
Jiang Liu5ced12a2014-01-06 14:18:22 +08001480 count = --domain->iommu_count;
1481 spin_unlock_irqrestore(&domain->iommu_lock, flags);
Jiang Liu92d03cc2014-02-19 14:07:28 +08001482 if (count == 0)
1483 domain_exit(domain);
Weidong Han5e98c4b2008-12-08 23:03:27 +08001484 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001485 }
1486
1487 if (iommu->gcmd & DMA_GCMD_TE)
1488 iommu_disable_translation(iommu);
1489
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001490 kfree(iommu->domains);
1491 kfree(iommu->domain_ids);
Jiang Liua868e6b2014-01-06 14:18:20 +08001492 iommu->domains = NULL;
1493 iommu->domain_ids = NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001494
Weidong Hand9630fe2008-12-08 11:06:32 +08001495 g_iommus[iommu->seq_id] = NULL;
1496
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001497 /* free context mapping */
1498 free_context_table(iommu);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001499}
1500
Jiang Liu92d03cc2014-02-19 14:07:28 +08001501static struct dmar_domain *alloc_domain(bool vm)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001502{
Jiang Liu92d03cc2014-02-19 14:07:28 +08001503 /* domain id for virtual machine, it won't be set in context */
1504 static atomic_t vm_domid = ATOMIC_INIT(0);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001505 struct dmar_domain *domain;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001506
1507 domain = alloc_domain_mem();
1508 if (!domain)
1509 return NULL;
1510
Suresh Siddha4c923d42009-10-02 11:01:24 -07001511 domain->nid = -1;
Jiang Liu92d03cc2014-02-19 14:07:28 +08001512 domain->iommu_count = 0;
Mike Travis1b198bb2012-03-05 15:05:16 -08001513 memset(domain->iommu_bmp, 0, sizeof(domain->iommu_bmp));
Weidong Hand71a2f32008-12-07 21:13:41 +08001514 domain->flags = 0;
Jiang Liu92d03cc2014-02-19 14:07:28 +08001515 spin_lock_init(&domain->iommu_lock);
1516 INIT_LIST_HEAD(&domain->devices);
1517 if (vm) {
1518 domain->id = atomic_inc_return(&vm_domid);
1519 domain->flags = DOMAIN_FLAG_VIRTUAL_MACHINE;
1520 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001521
1522 return domain;
1523}
1524
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001525static int iommu_attach_domain(struct dmar_domain *domain,
1526 struct intel_iommu *iommu)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001527{
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001528 int num;
1529 unsigned long ndomains;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001530 unsigned long flags;
1531
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001532 ndomains = cap_ndoms(iommu->cap);
Weidong Han8c11e792008-12-08 15:29:22 +08001533
1534 spin_lock_irqsave(&iommu->lock, flags);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001535
1536 num = find_first_zero_bit(iommu->domain_ids, ndomains);
1537 if (num >= ndomains) {
1538 spin_unlock_irqrestore(&iommu->lock, flags);
1539 printk(KERN_ERR "IOMMU: no free domain ids\n");
1540 return -ENOMEM;
1541 }
1542
1543 domain->id = num;
Jiang Liu9ebd6822014-02-19 14:07:29 +08001544 domain->iommu_count++;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001545 set_bit(num, iommu->domain_ids);
Mike Travis1b198bb2012-03-05 15:05:16 -08001546 set_bit(iommu->seq_id, domain->iommu_bmp);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001547 iommu->domains[num] = domain;
1548 spin_unlock_irqrestore(&iommu->lock, flags);
1549
1550 return 0;
1551}
1552
1553static void iommu_detach_domain(struct dmar_domain *domain,
1554 struct intel_iommu *iommu)
1555{
1556 unsigned long flags;
1557 int num, ndomains;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001558
1559 spin_lock_irqsave(&iommu->lock, flags);
1560 ndomains = cap_ndoms(iommu->cap);
Akinobu Mitaa45946a2010-03-11 14:04:08 -08001561 for_each_set_bit(num, iommu->domain_ids, ndomains) {
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001562 if (iommu->domains[num] == domain) {
Jiang Liu92d03cc2014-02-19 14:07:28 +08001563 clear_bit(num, iommu->domain_ids);
1564 iommu->domains[num] = NULL;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001565 break;
1566 }
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001567 }
Weidong Han8c11e792008-12-08 15:29:22 +08001568 spin_unlock_irqrestore(&iommu->lock, flags);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001569}
1570
1571static struct iova_domain reserved_iova_list;
Mark Gross8a443df2008-03-04 14:59:31 -08001572static struct lock_class_key reserved_rbtree_key;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001573
Joseph Cihula51a63e62011-03-21 11:04:24 -07001574static int dmar_init_reserved_ranges(void)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001575{
1576 struct pci_dev *pdev = NULL;
1577 struct iova *iova;
1578 int i;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001579
David Millerf6611972008-02-06 01:36:23 -08001580 init_iova_domain(&reserved_iova_list, DMA_32BIT_PFN);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001581
Mark Gross8a443df2008-03-04 14:59:31 -08001582 lockdep_set_class(&reserved_iova_list.iova_rbtree_lock,
1583 &reserved_rbtree_key);
1584
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001585 /* IOAPIC ranges shouldn't be accessed by DMA */
1586 iova = reserve_iova(&reserved_iova_list, IOVA_PFN(IOAPIC_RANGE_START),
1587 IOVA_PFN(IOAPIC_RANGE_END));
Joseph Cihula51a63e62011-03-21 11:04:24 -07001588 if (!iova) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001589 printk(KERN_ERR "Reserve IOAPIC range failed\n");
Joseph Cihula51a63e62011-03-21 11:04:24 -07001590 return -ENODEV;
1591 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001592
1593 /* Reserve all PCI MMIO to avoid peer-to-peer access */
1594 for_each_pci_dev(pdev) {
1595 struct resource *r;
1596
1597 for (i = 0; i < PCI_NUM_RESOURCES; i++) {
1598 r = &pdev->resource[i];
1599 if (!r->flags || !(r->flags & IORESOURCE_MEM))
1600 continue;
David Woodhouse1a4a4552009-06-28 16:00:42 +01001601 iova = reserve_iova(&reserved_iova_list,
1602 IOVA_PFN(r->start),
1603 IOVA_PFN(r->end));
Joseph Cihula51a63e62011-03-21 11:04:24 -07001604 if (!iova) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001605 printk(KERN_ERR "Reserve iova failed\n");
Joseph Cihula51a63e62011-03-21 11:04:24 -07001606 return -ENODEV;
1607 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001608 }
1609 }
Joseph Cihula51a63e62011-03-21 11:04:24 -07001610 return 0;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001611}
1612
1613static void domain_reserve_special_ranges(struct dmar_domain *domain)
1614{
1615 copy_reserved_iova(&reserved_iova_list, &domain->iovad);
1616}
1617
1618static inline int guestwidth_to_adjustwidth(int gaw)
1619{
1620 int agaw;
1621 int r = (gaw - 12) % 9;
1622
1623 if (r == 0)
1624 agaw = gaw;
1625 else
1626 agaw = gaw + 9 - r;
1627 if (agaw > 64)
1628 agaw = 64;
1629 return agaw;
1630}
1631
1632static int domain_init(struct dmar_domain *domain, int guest_width)
1633{
1634 struct intel_iommu *iommu;
1635 int adjust_width, agaw;
1636 unsigned long sagaw;
1637
David Millerf6611972008-02-06 01:36:23 -08001638 init_iova_domain(&domain->iovad, DMA_32BIT_PFN);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001639 domain_reserve_special_ranges(domain);
1640
1641 /* calculate AGAW */
Weidong Han8c11e792008-12-08 15:29:22 +08001642 iommu = domain_get_iommu(domain);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001643 if (guest_width > cap_mgaw(iommu->cap))
1644 guest_width = cap_mgaw(iommu->cap);
1645 domain->gaw = guest_width;
1646 adjust_width = guestwidth_to_adjustwidth(guest_width);
1647 agaw = width_to_agaw(adjust_width);
1648 sagaw = cap_sagaw(iommu->cap);
1649 if (!test_bit(agaw, &sagaw)) {
1650 /* hardware doesn't support it, choose a bigger one */
1651 pr_debug("IOMMU: hardware doesn't support agaw %d\n", agaw);
1652 agaw = find_next_bit(&sagaw, 5, agaw);
1653 if (agaw >= 5)
1654 return -ENODEV;
1655 }
1656 domain->agaw = agaw;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001657
Weidong Han8e6040972008-12-08 15:49:06 +08001658 if (ecap_coherent(iommu->ecap))
1659 domain->iommu_coherency = 1;
1660 else
1661 domain->iommu_coherency = 0;
1662
Sheng Yang58c610b2009-03-18 15:33:05 +08001663 if (ecap_sc_support(iommu->ecap))
1664 domain->iommu_snooping = 1;
1665 else
1666 domain->iommu_snooping = 0;
1667
David Woodhouse214e39a2014-03-19 10:38:49 +00001668 if (intel_iommu_superpage)
1669 domain->iommu_superpage = fls(cap_super_page_val(iommu->cap));
1670 else
1671 domain->iommu_superpage = 0;
1672
Suresh Siddha4c923d42009-10-02 11:01:24 -07001673 domain->nid = iommu->node;
Weidong Hanc7151a82008-12-08 22:51:37 +08001674
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001675 /* always allocate the top pgd */
Suresh Siddha4c923d42009-10-02 11:01:24 -07001676 domain->pgd = (struct dma_pte *)alloc_pgtable_page(domain->nid);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001677 if (!domain->pgd)
1678 return -ENOMEM;
Fenghua Yu5b6985c2008-10-16 18:02:32 -07001679 __iommu_flush_cache(iommu, domain->pgd, PAGE_SIZE);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001680 return 0;
1681}
1682
1683static void domain_exit(struct dmar_domain *domain)
1684{
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001685 struct dmar_drhd_unit *drhd;
1686 struct intel_iommu *iommu;
David Woodhouseea8ea462014-03-05 17:09:32 +00001687 struct page *freelist = NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001688
1689 /* Domain 0 is reserved, so dont process it */
1690 if (!domain)
1691 return;
1692
Alex Williamson7b668352011-05-24 12:02:41 +01001693 /* Flush any lazy unmaps that may reference this domain */
1694 if (!intel_iommu_strict)
1695 flush_unmaps_timeout(0);
1696
Jiang Liu92d03cc2014-02-19 14:07:28 +08001697 /* remove associated devices */
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001698 domain_remove_dev_info(domain);
Jiang Liu92d03cc2014-02-19 14:07:28 +08001699
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001700 /* destroy iovas */
1701 put_iova_domain(&domain->iovad);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001702
David Woodhouseea8ea462014-03-05 17:09:32 +00001703 freelist = domain_unmap(domain, 0, DOMAIN_MAX_PFN(domain->gaw));
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001704
Jiang Liu92d03cc2014-02-19 14:07:28 +08001705 /* clear attached or cached domains */
Jiang Liu0e242612014-02-19 14:07:34 +08001706 rcu_read_lock();
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001707 for_each_active_iommu(iommu, drhd)
Jiang Liu92d03cc2014-02-19 14:07:28 +08001708 if (domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE ||
1709 test_bit(iommu->seq_id, domain->iommu_bmp))
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001710 iommu_detach_domain(domain, iommu);
Jiang Liu0e242612014-02-19 14:07:34 +08001711 rcu_read_unlock();
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001712
David Woodhouseea8ea462014-03-05 17:09:32 +00001713 dma_free_pagelist(freelist);
1714
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001715 free_domain_mem(domain);
1716}
1717
David Woodhouse64ae8922014-03-09 12:52:30 -07001718static int domain_context_mapping_one(struct dmar_domain *domain,
1719 struct intel_iommu *iommu,
1720 u8 bus, u8 devfn, int translation)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001721{
1722 struct context_entry *context;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001723 unsigned long flags;
Weidong Hanea6606b2008-12-08 23:08:15 +08001724 struct dma_pte *pgd;
1725 unsigned long num;
1726 unsigned long ndomains;
1727 int id;
1728 int agaw;
Yu Zhao93a23a72009-05-18 13:51:37 +08001729 struct device_domain_info *info = NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001730
1731 pr_debug("Set context mapping for %02x:%02x.%d\n",
1732 bus, PCI_SLOT(devfn), PCI_FUNC(devfn));
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001733
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001734 BUG_ON(!domain->pgd);
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001735 BUG_ON(translation != CONTEXT_TT_PASS_THROUGH &&
1736 translation != CONTEXT_TT_MULTI_LEVEL);
Weidong Han5331fe62008-12-08 23:00:00 +08001737
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001738 context = device_to_context_entry(iommu, bus, devfn);
1739 if (!context)
1740 return -ENOMEM;
1741 spin_lock_irqsave(&iommu->lock, flags);
Mark McLoughlinc07e7d22008-11-21 16:54:46 +00001742 if (context_present(context)) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001743 spin_unlock_irqrestore(&iommu->lock, flags);
1744 return 0;
1745 }
1746
Weidong Hanea6606b2008-12-08 23:08:15 +08001747 id = domain->id;
1748 pgd = domain->pgd;
1749
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07001750 if (domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE ||
1751 domain->flags & DOMAIN_FLAG_STATIC_IDENTITY) {
Weidong Hanea6606b2008-12-08 23:08:15 +08001752 int found = 0;
1753
1754 /* find an available domain id for this device in iommu */
1755 ndomains = cap_ndoms(iommu->cap);
Akinobu Mitaa45946a2010-03-11 14:04:08 -08001756 for_each_set_bit(num, iommu->domain_ids, ndomains) {
Weidong Hanea6606b2008-12-08 23:08:15 +08001757 if (iommu->domains[num] == domain) {
1758 id = num;
1759 found = 1;
1760 break;
1761 }
Weidong Hanea6606b2008-12-08 23:08:15 +08001762 }
1763
1764 if (found == 0) {
1765 num = find_first_zero_bit(iommu->domain_ids, ndomains);
1766 if (num >= ndomains) {
1767 spin_unlock_irqrestore(&iommu->lock, flags);
1768 printk(KERN_ERR "IOMMU: no free domain ids\n");
1769 return -EFAULT;
1770 }
1771
1772 set_bit(num, iommu->domain_ids);
1773 iommu->domains[num] = domain;
1774 id = num;
1775 }
1776
1777 /* Skip top levels of page tables for
1778 * iommu which has less agaw than default.
Chris Wright1672af12009-12-02 12:06:34 -08001779 * Unnecessary for PT mode.
Weidong Hanea6606b2008-12-08 23:08:15 +08001780 */
Chris Wright1672af12009-12-02 12:06:34 -08001781 if (translation != CONTEXT_TT_PASS_THROUGH) {
1782 for (agaw = domain->agaw; agaw != iommu->agaw; agaw--) {
1783 pgd = phys_to_virt(dma_pte_addr(pgd));
1784 if (!dma_pte_present(pgd)) {
1785 spin_unlock_irqrestore(&iommu->lock, flags);
1786 return -ENOMEM;
1787 }
Weidong Hanea6606b2008-12-08 23:08:15 +08001788 }
1789 }
1790 }
1791
1792 context_set_domain_id(context, id);
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001793
Yu Zhao93a23a72009-05-18 13:51:37 +08001794 if (translation != CONTEXT_TT_PASS_THROUGH) {
David Woodhouse64ae8922014-03-09 12:52:30 -07001795 info = iommu_support_dev_iotlb(domain, iommu, bus, devfn);
Yu Zhao93a23a72009-05-18 13:51:37 +08001796 translation = info ? CONTEXT_TT_DEV_IOTLB :
1797 CONTEXT_TT_MULTI_LEVEL;
1798 }
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001799 /*
1800 * In pass through mode, AW must be programmed to indicate the largest
1801 * AGAW value supported by hardware. And ASR is ignored by hardware.
1802 */
Yu Zhao93a23a72009-05-18 13:51:37 +08001803 if (unlikely(translation == CONTEXT_TT_PASS_THROUGH))
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001804 context_set_address_width(context, iommu->msagaw);
Yu Zhao93a23a72009-05-18 13:51:37 +08001805 else {
1806 context_set_address_root(context, virt_to_phys(pgd));
1807 context_set_address_width(context, iommu->agaw);
1808 }
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001809
1810 context_set_translation_type(context, translation);
Mark McLoughlinc07e7d22008-11-21 16:54:46 +00001811 context_set_fault_enable(context);
1812 context_set_present(context);
Weidong Han5331fe62008-12-08 23:00:00 +08001813 domain_flush_cache(domain, context, sizeof(*context));
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001814
David Woodhouse4c25a2c2009-05-10 17:16:06 +01001815 /*
1816 * It's a non-present to present mapping. If hardware doesn't cache
1817 * non-present entry we only need to flush the write-buffer. If the
1818 * _does_ cache non-present entries, then it does so in the special
1819 * domain #0, which we have to flush:
1820 */
1821 if (cap_caching_mode(iommu->cap)) {
1822 iommu->flush.flush_context(iommu, 0,
1823 (((u16)bus) << 8) | devfn,
1824 DMA_CCMD_MASK_NOBIT,
1825 DMA_CCMD_DEVICE_INVL);
Nadav Amit82653632010-04-01 13:24:40 +03001826 iommu->flush.flush_iotlb(iommu, domain->id, 0, 0, DMA_TLB_DSI_FLUSH);
David Woodhouse4c25a2c2009-05-10 17:16:06 +01001827 } else {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001828 iommu_flush_write_buffer(iommu);
David Woodhouse4c25a2c2009-05-10 17:16:06 +01001829 }
Yu Zhao93a23a72009-05-18 13:51:37 +08001830 iommu_enable_dev_iotlb(info);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001831 spin_unlock_irqrestore(&iommu->lock, flags);
Weidong Hanc7151a82008-12-08 22:51:37 +08001832
1833 spin_lock_irqsave(&domain->iommu_lock, flags);
Mike Travis1b198bb2012-03-05 15:05:16 -08001834 if (!test_and_set_bit(iommu->seq_id, domain->iommu_bmp)) {
Weidong Hanc7151a82008-12-08 22:51:37 +08001835 domain->iommu_count++;
Suresh Siddha4c923d42009-10-02 11:01:24 -07001836 if (domain->iommu_count == 1)
1837 domain->nid = iommu->node;
Sheng Yang58c610b2009-03-18 15:33:05 +08001838 domain_update_iommu_cap(domain);
Weidong Hanc7151a82008-12-08 22:51:37 +08001839 }
1840 spin_unlock_irqrestore(&domain->iommu_lock, flags);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001841 return 0;
1842}
1843
1844static int
David Woodhousee1f167f2014-03-09 15:24:46 -07001845domain_context_mapping(struct dmar_domain *domain, struct device *dev,
1846 int translation)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001847{
1848 int ret;
David Woodhousee1f167f2014-03-09 15:24:46 -07001849 struct pci_dev *pdev, *tmp, *parent;
David Woodhouse64ae8922014-03-09 12:52:30 -07001850 struct intel_iommu *iommu;
David Woodhouse156baca2014-03-09 14:00:57 -07001851 u8 bus, devfn;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001852
David Woodhousee1f167f2014-03-09 15:24:46 -07001853 iommu = device_to_iommu(dev, &bus, &devfn);
David Woodhouse64ae8922014-03-09 12:52:30 -07001854 if (!iommu)
1855 return -ENODEV;
1856
David Woodhouse156baca2014-03-09 14:00:57 -07001857 ret = domain_context_mapping_one(domain, iommu, bus, devfn,
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001858 translation);
David Woodhousee1f167f2014-03-09 15:24:46 -07001859 if (ret || !dev_is_pci(dev))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001860 return ret;
1861
1862 /* dependent device mapping */
David Woodhousee1f167f2014-03-09 15:24:46 -07001863 pdev = to_pci_dev(dev);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001864 tmp = pci_find_upstream_pcie_bridge(pdev);
1865 if (!tmp)
1866 return 0;
1867 /* Secondary interface's bus number and devfn 0 */
1868 parent = pdev->bus->self;
1869 while (parent != tmp) {
David Woodhouse64ae8922014-03-09 12:52:30 -07001870 ret = domain_context_mapping_one(domain, iommu,
David Woodhouse276dbf992009-04-04 01:45:37 +01001871 parent->bus->number,
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001872 parent->devfn, translation);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001873 if (ret)
1874 return ret;
1875 parent = parent->bus->self;
1876 }
Stefan Assmann45e829e2009-12-03 06:49:24 -05001877 if (pci_is_pcie(tmp)) /* this is a PCIe-to-PCI bridge */
David Woodhouse64ae8922014-03-09 12:52:30 -07001878 return domain_context_mapping_one(domain, iommu,
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001879 tmp->subordinate->number, 0,
1880 translation);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001881 else /* this is a legacy PCI bridge */
David Woodhouse64ae8922014-03-09 12:52:30 -07001882 return domain_context_mapping_one(domain, iommu,
David Woodhouse276dbf992009-04-04 01:45:37 +01001883 tmp->bus->number,
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07001884 tmp->devfn,
1885 translation);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001886}
1887
David Woodhousee1f167f2014-03-09 15:24:46 -07001888static int domain_context_mapped(struct device *dev)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001889{
1890 int ret;
David Woodhousee1f167f2014-03-09 15:24:46 -07001891 struct pci_dev *pdev, *tmp, *parent;
Weidong Han5331fe62008-12-08 23:00:00 +08001892 struct intel_iommu *iommu;
David Woodhouse156baca2014-03-09 14:00:57 -07001893 u8 bus, devfn;
Weidong Han5331fe62008-12-08 23:00:00 +08001894
David Woodhousee1f167f2014-03-09 15:24:46 -07001895 iommu = device_to_iommu(dev, &bus, &devfn);
Weidong Han5331fe62008-12-08 23:00:00 +08001896 if (!iommu)
1897 return -ENODEV;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001898
David Woodhouse156baca2014-03-09 14:00:57 -07001899 ret = device_context_mapped(iommu, bus, devfn);
David Woodhousee1f167f2014-03-09 15:24:46 -07001900 if (!ret || !dev_is_pci(dev))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001901 return ret;
David Woodhousee1f167f2014-03-09 15:24:46 -07001902
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001903 /* dependent device mapping */
David Woodhousee1f167f2014-03-09 15:24:46 -07001904 pdev = to_pci_dev(dev);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001905 tmp = pci_find_upstream_pcie_bridge(pdev);
1906 if (!tmp)
1907 return ret;
1908 /* Secondary interface's bus number and devfn 0 */
1909 parent = pdev->bus->self;
1910 while (parent != tmp) {
Weidong Han8c11e792008-12-08 15:29:22 +08001911 ret = device_context_mapped(iommu, parent->bus->number,
David Woodhouse276dbf992009-04-04 01:45:37 +01001912 parent->devfn);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001913 if (!ret)
1914 return ret;
1915 parent = parent->bus->self;
1916 }
Kenji Kaneshige5f4d91a2009-11-11 14:36:17 +09001917 if (pci_is_pcie(tmp))
David Woodhouse276dbf992009-04-04 01:45:37 +01001918 return device_context_mapped(iommu, tmp->subordinate->number,
1919 0);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001920 else
David Woodhouse276dbf992009-04-04 01:45:37 +01001921 return device_context_mapped(iommu, tmp->bus->number,
1922 tmp->devfn);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07001923}
1924
Fenghua Yuf5329592009-08-04 15:09:37 -07001925/* Returns a number of VTD pages, but aligned to MM page size */
1926static inline unsigned long aligned_nrpages(unsigned long host_addr,
1927 size_t size)
1928{
1929 host_addr &= ~PAGE_MASK;
1930 return PAGE_ALIGN(host_addr + size) >> VTD_PAGE_SHIFT;
1931}
1932
Youquan Song6dd9a7c2011-05-25 19:13:49 +01001933/* Return largest possible superpage level for a given mapping */
1934static inline int hardware_largepage_caps(struct dmar_domain *domain,
1935 unsigned long iov_pfn,
1936 unsigned long phy_pfn,
1937 unsigned long pages)
1938{
1939 int support, level = 1;
1940 unsigned long pfnmerge;
1941
1942 support = domain->iommu_superpage;
1943
1944 /* To use a large page, the virtual *and* physical addresses
1945 must be aligned to 2MiB/1GiB/etc. Lower bits set in either
1946 of them will mean we have to use smaller pages. So just
1947 merge them and check both at once. */
1948 pfnmerge = iov_pfn | phy_pfn;
1949
1950 while (support && !(pfnmerge & ~VTD_STRIDE_MASK)) {
1951 pages >>= VTD_STRIDE_SHIFT;
1952 if (!pages)
1953 break;
1954 pfnmerge >>= VTD_STRIDE_SHIFT;
1955 level++;
1956 support--;
1957 }
1958 return level;
1959}
1960
David Woodhouse9051aa02009-06-29 12:30:54 +01001961static int __domain_mapping(struct dmar_domain *domain, unsigned long iov_pfn,
1962 struct scatterlist *sg, unsigned long phys_pfn,
1963 unsigned long nr_pages, int prot)
David Woodhousee1605492009-06-29 11:17:38 +01001964{
1965 struct dma_pte *first_pte = NULL, *pte = NULL;
David Woodhouse9051aa02009-06-29 12:30:54 +01001966 phys_addr_t uninitialized_var(pteval);
David Woodhousee1605492009-06-29 11:17:38 +01001967 int addr_width = agaw_to_width(domain->agaw) - VTD_PAGE_SHIFT;
David Woodhouse9051aa02009-06-29 12:30:54 +01001968 unsigned long sg_res;
Youquan Song6dd9a7c2011-05-25 19:13:49 +01001969 unsigned int largepage_lvl = 0;
1970 unsigned long lvl_pages = 0;
David Woodhousee1605492009-06-29 11:17:38 +01001971
1972 BUG_ON(addr_width < BITS_PER_LONG && (iov_pfn + nr_pages - 1) >> addr_width);
1973
1974 if ((prot & (DMA_PTE_READ|DMA_PTE_WRITE)) == 0)
1975 return -EINVAL;
1976
1977 prot &= DMA_PTE_READ | DMA_PTE_WRITE | DMA_PTE_SNP;
1978
David Woodhouse9051aa02009-06-29 12:30:54 +01001979 if (sg)
1980 sg_res = 0;
1981 else {
1982 sg_res = nr_pages + 1;
1983 pteval = ((phys_addr_t)phys_pfn << VTD_PAGE_SHIFT) | prot;
1984 }
1985
Youquan Song6dd9a7c2011-05-25 19:13:49 +01001986 while (nr_pages > 0) {
David Woodhousec85994e2009-07-01 19:21:24 +01001987 uint64_t tmp;
1988
David Woodhousee1605492009-06-29 11:17:38 +01001989 if (!sg_res) {
Fenghua Yuf5329592009-08-04 15:09:37 -07001990 sg_res = aligned_nrpages(sg->offset, sg->length);
David Woodhousee1605492009-06-29 11:17:38 +01001991 sg->dma_address = ((dma_addr_t)iov_pfn << VTD_PAGE_SHIFT) + sg->offset;
1992 sg->dma_length = sg->length;
1993 pteval = page_to_phys(sg_page(sg)) | prot;
Youquan Song6dd9a7c2011-05-25 19:13:49 +01001994 phys_pfn = pteval >> VTD_PAGE_SHIFT;
David Woodhousee1605492009-06-29 11:17:38 +01001995 }
Youquan Song6dd9a7c2011-05-25 19:13:49 +01001996
David Woodhousee1605492009-06-29 11:17:38 +01001997 if (!pte) {
Youquan Song6dd9a7c2011-05-25 19:13:49 +01001998 largepage_lvl = hardware_largepage_caps(domain, iov_pfn, phys_pfn, sg_res);
1999
David Woodhouse5cf0a762014-03-19 16:07:49 +00002000 first_pte = pte = pfn_to_dma_pte(domain, iov_pfn, &largepage_lvl);
David Woodhousee1605492009-06-29 11:17:38 +01002001 if (!pte)
2002 return -ENOMEM;
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002003 /* It is large page*/
Woodhouse, David6491d4d2012-12-19 13:25:35 +00002004 if (largepage_lvl > 1) {
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002005 pteval |= DMA_PTE_LARGE_PAGE;
Woodhouse, David6491d4d2012-12-19 13:25:35 +00002006 /* Ensure that old small page tables are removed to make room
2007 for superpage, if they exist. */
2008 dma_pte_clear_range(domain, iov_pfn,
2009 iov_pfn + lvl_to_nr_pages(largepage_lvl) - 1);
2010 dma_pte_free_pagetable(domain, iov_pfn,
2011 iov_pfn + lvl_to_nr_pages(largepage_lvl) - 1);
2012 } else {
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002013 pteval &= ~(uint64_t)DMA_PTE_LARGE_PAGE;
Woodhouse, David6491d4d2012-12-19 13:25:35 +00002014 }
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002015
David Woodhousee1605492009-06-29 11:17:38 +01002016 }
2017 /* We don't need lock here, nobody else
2018 * touches the iova range
2019 */
David Woodhouse7766a3f2009-07-01 20:27:03 +01002020 tmp = cmpxchg64_local(&pte->val, 0ULL, pteval);
David Woodhousec85994e2009-07-01 19:21:24 +01002021 if (tmp) {
David Woodhouse1bf20f02009-06-29 22:06:43 +01002022 static int dumps = 5;
David Woodhousec85994e2009-07-01 19:21:24 +01002023 printk(KERN_CRIT "ERROR: DMA PTE for vPFN 0x%lx already set (to %llx not %llx)\n",
2024 iov_pfn, tmp, (unsigned long long)pteval);
David Woodhouse1bf20f02009-06-29 22:06:43 +01002025 if (dumps) {
2026 dumps--;
2027 debug_dma_dump_mappings(NULL);
2028 }
2029 WARN_ON(1);
2030 }
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002031
2032 lvl_pages = lvl_to_nr_pages(largepage_lvl);
2033
2034 BUG_ON(nr_pages < lvl_pages);
2035 BUG_ON(sg_res < lvl_pages);
2036
2037 nr_pages -= lvl_pages;
2038 iov_pfn += lvl_pages;
2039 phys_pfn += lvl_pages;
2040 pteval += lvl_pages * VTD_PAGE_SIZE;
2041 sg_res -= lvl_pages;
2042
2043 /* If the next PTE would be the first in a new page, then we
2044 need to flush the cache on the entries we've just written.
2045 And then we'll need to recalculate 'pte', so clear it and
2046 let it get set again in the if (!pte) block above.
2047
2048 If we're done (!nr_pages) we need to flush the cache too.
2049
2050 Also if we've been setting superpages, we may need to
2051 recalculate 'pte' and switch back to smaller pages for the
2052 end of the mapping, if the trailing size is not enough to
2053 use another superpage (i.e. sg_res < lvl_pages). */
David Woodhousee1605492009-06-29 11:17:38 +01002054 pte++;
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002055 if (!nr_pages || first_pte_in_page(pte) ||
2056 (largepage_lvl > 1 && sg_res < lvl_pages)) {
David Woodhousee1605492009-06-29 11:17:38 +01002057 domain_flush_cache(domain, first_pte,
2058 (void *)pte - (void *)first_pte);
2059 pte = NULL;
2060 }
Youquan Song6dd9a7c2011-05-25 19:13:49 +01002061
2062 if (!sg_res && nr_pages)
David Woodhousee1605492009-06-29 11:17:38 +01002063 sg = sg_next(sg);
2064 }
2065 return 0;
2066}
2067
David Woodhouse9051aa02009-06-29 12:30:54 +01002068static inline int domain_sg_mapping(struct dmar_domain *domain, unsigned long iov_pfn,
2069 struct scatterlist *sg, unsigned long nr_pages,
2070 int prot)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002071{
David Woodhouse9051aa02009-06-29 12:30:54 +01002072 return __domain_mapping(domain, iov_pfn, sg, 0, nr_pages, prot);
2073}
Fenghua Yu5b6985c2008-10-16 18:02:32 -07002074
David Woodhouse9051aa02009-06-29 12:30:54 +01002075static inline int domain_pfn_mapping(struct dmar_domain *domain, unsigned long iov_pfn,
2076 unsigned long phys_pfn, unsigned long nr_pages,
2077 int prot)
2078{
2079 return __domain_mapping(domain, iov_pfn, NULL, phys_pfn, nr_pages, prot);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002080}
2081
Weidong Hanc7151a82008-12-08 22:51:37 +08002082static void iommu_detach_dev(struct intel_iommu *iommu, u8 bus, u8 devfn)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002083{
Weidong Hanc7151a82008-12-08 22:51:37 +08002084 if (!iommu)
2085 return;
Weidong Han8c11e792008-12-08 15:29:22 +08002086
2087 clear_context_table(iommu, bus, devfn);
2088 iommu->flush.flush_context(iommu, 0, 0, 0,
David Woodhouse4c25a2c2009-05-10 17:16:06 +01002089 DMA_CCMD_GLOBAL_INVL);
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01002090 iommu->flush.flush_iotlb(iommu, 0, 0, 0, DMA_TLB_GLOBAL_FLUSH);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002091}
2092
David Woodhouse109b9b02012-05-25 17:43:02 +01002093static inline void unlink_domain_info(struct device_domain_info *info)
2094{
2095 assert_spin_locked(&device_domain_lock);
2096 list_del(&info->link);
2097 list_del(&info->global);
2098 if (info->dev)
David Woodhouse0bcb3e22014-03-06 17:12:03 +00002099 info->dev->archdata.iommu = NULL;
David Woodhouse109b9b02012-05-25 17:43:02 +01002100}
2101
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002102static void domain_remove_dev_info(struct dmar_domain *domain)
2103{
2104 struct device_domain_info *info;
Jiang Liu92d03cc2014-02-19 14:07:28 +08002105 unsigned long flags, flags2;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002106
2107 spin_lock_irqsave(&device_domain_lock, flags);
2108 while (!list_empty(&domain->devices)) {
2109 info = list_entry(domain->devices.next,
2110 struct device_domain_info, link);
David Woodhouse109b9b02012-05-25 17:43:02 +01002111 unlink_domain_info(info);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002112 spin_unlock_irqrestore(&device_domain_lock, flags);
2113
Yu Zhao93a23a72009-05-18 13:51:37 +08002114 iommu_disable_dev_iotlb(info);
David Woodhouse7c7faa12014-03-09 13:33:06 -07002115 iommu_detach_dev(info->iommu, info->bus, info->devfn);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002116
Jiang Liu92d03cc2014-02-19 14:07:28 +08002117 if (domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE) {
David Woodhouse7c7faa12014-03-09 13:33:06 -07002118 iommu_detach_dependent_devices(info->iommu, info->dev);
Jiang Liu92d03cc2014-02-19 14:07:28 +08002119 /* clear this iommu in iommu_bmp, update iommu count
2120 * and capabilities
2121 */
2122 spin_lock_irqsave(&domain->iommu_lock, flags2);
David Woodhouse7c7faa12014-03-09 13:33:06 -07002123 if (test_and_clear_bit(info->iommu->seq_id,
Jiang Liu92d03cc2014-02-19 14:07:28 +08002124 domain->iommu_bmp)) {
2125 domain->iommu_count--;
2126 domain_update_iommu_cap(domain);
2127 }
2128 spin_unlock_irqrestore(&domain->iommu_lock, flags2);
2129 }
2130
2131 free_devinfo_mem(info);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002132 spin_lock_irqsave(&device_domain_lock, flags);
2133 }
2134 spin_unlock_irqrestore(&device_domain_lock, flags);
2135}
2136
2137/*
2138 * find_domain
David Woodhouse1525a292014-03-06 16:19:30 +00002139 * Note: we use struct device->archdata.iommu stores the info
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002140 */
David Woodhouse1525a292014-03-06 16:19:30 +00002141static struct dmar_domain *find_domain(struct device *dev)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002142{
2143 struct device_domain_info *info;
2144
2145 /* No lock here, assumes no domain exit in normal case */
David Woodhouse1525a292014-03-06 16:19:30 +00002146 info = dev->archdata.iommu;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002147 if (info)
2148 return info->domain;
2149 return NULL;
2150}
2151
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002152static inline struct device_domain_info *
Jiang Liu745f2582014-02-19 14:07:26 +08002153dmar_search_domain_by_dev_info(int segment, int bus, int devfn)
2154{
2155 struct device_domain_info *info;
2156
2157 list_for_each_entry(info, &device_domain_list, global)
David Woodhouse41e80dca2014-03-09 13:55:54 -07002158 if (info->iommu->segment == segment && info->bus == bus &&
Jiang Liu745f2582014-02-19 14:07:26 +08002159 info->devfn == devfn)
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002160 return info;
Jiang Liu745f2582014-02-19 14:07:26 +08002161
2162 return NULL;
2163}
2164
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002165static struct dmar_domain *dmar_insert_dev_info(struct intel_iommu *iommu,
David Woodhouse41e80dca2014-03-09 13:55:54 -07002166 int bus, int devfn,
David Woodhouseb718cd32014-03-09 13:11:33 -07002167 struct device *dev,
2168 struct dmar_domain *domain)
Jiang Liu745f2582014-02-19 14:07:26 +08002169{
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002170 struct dmar_domain *found = NULL;
Jiang Liu745f2582014-02-19 14:07:26 +08002171 struct device_domain_info *info;
2172 unsigned long flags;
2173
2174 info = alloc_devinfo_mem();
2175 if (!info)
David Woodhouseb718cd32014-03-09 13:11:33 -07002176 return NULL;
Jiang Liu745f2582014-02-19 14:07:26 +08002177
Jiang Liu745f2582014-02-19 14:07:26 +08002178 info->bus = bus;
2179 info->devfn = devfn;
2180 info->dev = dev;
2181 info->domain = domain;
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002182 info->iommu = iommu;
Jiang Liu745f2582014-02-19 14:07:26 +08002183 if (!dev)
2184 domain->flags |= DOMAIN_FLAG_P2P_MULTIPLE_DEVICES;
2185
2186 spin_lock_irqsave(&device_domain_lock, flags);
2187 if (dev)
David Woodhouse0bcb3e22014-03-06 17:12:03 +00002188 found = find_domain(dev);
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002189 else {
2190 struct device_domain_info *info2;
David Woodhouse41e80dca2014-03-09 13:55:54 -07002191 info2 = dmar_search_domain_by_dev_info(iommu->segment, bus, devfn);
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002192 if (info2)
2193 found = info2->domain;
2194 }
Jiang Liu745f2582014-02-19 14:07:26 +08002195 if (found) {
2196 spin_unlock_irqrestore(&device_domain_lock, flags);
2197 free_devinfo_mem(info);
David Woodhouseb718cd32014-03-09 13:11:33 -07002198 /* Caller must free the original domain */
2199 return found;
Jiang Liu745f2582014-02-19 14:07:26 +08002200 }
2201
David Woodhouseb718cd32014-03-09 13:11:33 -07002202 list_add(&info->link, &domain->devices);
2203 list_add(&info->global, &device_domain_list);
2204 if (dev)
2205 dev->archdata.iommu = info;
2206 spin_unlock_irqrestore(&device_domain_lock, flags);
2207
2208 return domain;
Jiang Liu745f2582014-02-19 14:07:26 +08002209}
2210
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002211/* domain is initialized */
David Woodhouse146922e2014-03-09 15:44:17 -07002212static struct dmar_domain *get_domain_for_dev(struct device *dev, int gaw)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002213{
Jiang Liue85bb5d2014-02-19 14:07:27 +08002214 struct dmar_domain *domain, *free = NULL;
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002215 struct intel_iommu *iommu = NULL;
2216 struct device_domain_info *info;
David Woodhouse146922e2014-03-09 15:44:17 -07002217 struct pci_dev *dev_tmp = NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002218 unsigned long flags;
David Woodhouse146922e2014-03-09 15:44:17 -07002219 u8 bus, devfn, bridge_bus, bridge_devfn;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002220
David Woodhouse146922e2014-03-09 15:44:17 -07002221 domain = find_domain(dev);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002222 if (domain)
2223 return domain;
2224
David Woodhouse146922e2014-03-09 15:44:17 -07002225 if (dev_is_pci(dev)) {
2226 struct pci_dev *pdev = to_pci_dev(dev);
2227 u16 segment;
David Woodhouse276dbf992009-04-04 01:45:37 +01002228
David Woodhouse146922e2014-03-09 15:44:17 -07002229 segment = pci_domain_nr(pdev->bus);
2230 dev_tmp = pci_find_upstream_pcie_bridge(pdev);
2231 if (dev_tmp) {
2232 if (pci_is_pcie(dev_tmp)) {
2233 bridge_bus = dev_tmp->subordinate->number;
2234 bridge_devfn = 0;
2235 } else {
2236 bridge_bus = dev_tmp->bus->number;
2237 bridge_devfn = dev_tmp->devfn;
2238 }
2239 spin_lock_irqsave(&device_domain_lock, flags);
David Woodhouse9f05d3f2014-04-14 22:01:30 -07002240 info = dmar_search_domain_by_dev_info(segment,
2241 bridge_bus,
2242 bridge_devfn);
David Woodhouse146922e2014-03-09 15:44:17 -07002243 if (info) {
2244 iommu = info->iommu;
2245 domain = info->domain;
2246 }
2247 spin_unlock_irqrestore(&device_domain_lock, flags);
2248 /* pcie-pci bridge already has a domain, uses it */
2249 if (info)
2250 goto found_domain;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002251 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002252 }
2253
David Woodhouse146922e2014-03-09 15:44:17 -07002254 iommu = device_to_iommu(dev, &bus, &devfn);
2255 if (!iommu)
2256 goto error;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002257
David Woodhouse146922e2014-03-09 15:44:17 -07002258 /* Allocate and initialize new domain for the device */
Jiang Liu92d03cc2014-02-19 14:07:28 +08002259 domain = alloc_domain(false);
Jiang Liu745f2582014-02-19 14:07:26 +08002260 if (!domain)
2261 goto error;
2262 if (iommu_attach_domain(domain, iommu)) {
Alex Williamson2fe9723d2011-03-04 14:52:30 -07002263 free_domain_mem(domain);
Dan Carpenter14d40562014-03-28 11:29:50 +03002264 domain = NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002265 goto error;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002266 }
Jiang Liue85bb5d2014-02-19 14:07:27 +08002267 free = domain;
2268 if (domain_init(domain, gaw))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002269 goto error;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002270
2271 /* register pcie-to-pci device */
2272 if (dev_tmp) {
David Woodhouse146922e2014-03-09 15:44:17 -07002273 domain = dmar_insert_dev_info(iommu, bridge_bus, bridge_devfn,
2274 NULL, domain);
David Woodhouseb718cd32014-03-09 13:11:33 -07002275 if (!domain)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002276 goto error;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002277 }
2278
2279found_domain:
David Woodhouse146922e2014-03-09 15:44:17 -07002280 domain = dmar_insert_dev_info(iommu, bus, devfn, dev, domain);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002281error:
David Woodhouseb718cd32014-03-09 13:11:33 -07002282 if (free != domain)
Jiang Liue85bb5d2014-02-19 14:07:27 +08002283 domain_exit(free);
David Woodhouseb718cd32014-03-09 13:11:33 -07002284
2285 return domain;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002286}
2287
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002288static int iommu_identity_mapping;
David Woodhousee0fc7e02009-09-30 09:12:17 -07002289#define IDENTMAP_ALL 1
2290#define IDENTMAP_GFX 2
2291#define IDENTMAP_AZALIA 4
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002292
David Woodhouseb2132032009-06-26 18:50:28 +01002293static int iommu_domain_identity_map(struct dmar_domain *domain,
2294 unsigned long long start,
2295 unsigned long long end)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002296{
David Woodhousec5395d52009-06-28 16:35:56 +01002297 unsigned long first_vpfn = start >> VTD_PAGE_SHIFT;
2298 unsigned long last_vpfn = end >> VTD_PAGE_SHIFT;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002299
David Woodhousec5395d52009-06-28 16:35:56 +01002300 if (!reserve_iova(&domain->iovad, dma_to_mm_pfn(first_vpfn),
2301 dma_to_mm_pfn(last_vpfn))) {
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002302 printk(KERN_ERR "IOMMU: reserve iova failed\n");
David Woodhouseb2132032009-06-26 18:50:28 +01002303 return -ENOMEM;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002304 }
2305
David Woodhousec5395d52009-06-28 16:35:56 +01002306 pr_debug("Mapping reserved region %llx-%llx for domain %d\n",
2307 start, end, domain->id);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002308 /*
2309 * RMRR range might have overlap with physical memory range,
2310 * clear it first
2311 */
David Woodhousec5395d52009-06-28 16:35:56 +01002312 dma_pte_clear_range(domain, first_vpfn, last_vpfn);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002313
David Woodhousec5395d52009-06-28 16:35:56 +01002314 return domain_pfn_mapping(domain, first_vpfn, first_vpfn,
2315 last_vpfn - first_vpfn + 1,
David Woodhouse61df7442009-06-28 11:55:58 +01002316 DMA_PTE_READ|DMA_PTE_WRITE);
David Woodhouseb2132032009-06-26 18:50:28 +01002317}
2318
David Woodhouse0b9d9752014-03-09 15:48:15 -07002319static int iommu_prepare_identity_map(struct device *dev,
David Woodhouseb2132032009-06-26 18:50:28 +01002320 unsigned long long start,
2321 unsigned long long end)
2322{
2323 struct dmar_domain *domain;
2324 int ret;
2325
David Woodhouse0b9d9752014-03-09 15:48:15 -07002326 domain = get_domain_for_dev(dev, DEFAULT_DOMAIN_ADDRESS_WIDTH);
David Woodhouseb2132032009-06-26 18:50:28 +01002327 if (!domain)
2328 return -ENOMEM;
2329
David Woodhouse19943b02009-08-04 16:19:20 +01002330 /* For _hardware_ passthrough, don't bother. But for software
2331 passthrough, we do it anyway -- it may indicate a memory
2332 range which is reserved in E820, so which didn't get set
2333 up to start with in si_domain */
2334 if (domain == si_domain && hw_pass_through) {
2335 printk("Ignoring identity map for HW passthrough device %s [0x%Lx - 0x%Lx]\n",
David Woodhouse0b9d9752014-03-09 15:48:15 -07002336 dev_name(dev), start, end);
David Woodhouse19943b02009-08-04 16:19:20 +01002337 return 0;
2338 }
2339
2340 printk(KERN_INFO
2341 "IOMMU: Setting identity map for device %s [0x%Lx - 0x%Lx]\n",
David Woodhouse0b9d9752014-03-09 15:48:15 -07002342 dev_name(dev), start, end);
David Woodhouse2ff729f2009-08-26 14:25:41 +01002343
David Woodhouse5595b522009-12-02 09:21:55 +00002344 if (end < start) {
2345 WARN(1, "Your BIOS is broken; RMRR ends before it starts!\n"
2346 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
2347 dmi_get_system_info(DMI_BIOS_VENDOR),
2348 dmi_get_system_info(DMI_BIOS_VERSION),
2349 dmi_get_system_info(DMI_PRODUCT_VERSION));
2350 ret = -EIO;
2351 goto error;
2352 }
2353
David Woodhouse2ff729f2009-08-26 14:25:41 +01002354 if (end >> agaw_to_width(domain->agaw)) {
2355 WARN(1, "Your BIOS is broken; RMRR exceeds permitted address width (%d bits)\n"
2356 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
2357 agaw_to_width(domain->agaw),
2358 dmi_get_system_info(DMI_BIOS_VENDOR),
2359 dmi_get_system_info(DMI_BIOS_VERSION),
2360 dmi_get_system_info(DMI_PRODUCT_VERSION));
2361 ret = -EIO;
2362 goto error;
2363 }
David Woodhouse19943b02009-08-04 16:19:20 +01002364
David Woodhouseb2132032009-06-26 18:50:28 +01002365 ret = iommu_domain_identity_map(domain, start, end);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002366 if (ret)
2367 goto error;
2368
2369 /* context entry init */
David Woodhouse0b9d9752014-03-09 15:48:15 -07002370 ret = domain_context_mapping(domain, dev, CONTEXT_TT_MULTI_LEVEL);
David Woodhouseb2132032009-06-26 18:50:28 +01002371 if (ret)
2372 goto error;
2373
2374 return 0;
2375
2376 error:
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002377 domain_exit(domain);
2378 return ret;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002379}
2380
2381static inline int iommu_prepare_rmrr_dev(struct dmar_rmrr_unit *rmrr,
David Woodhouse0b9d9752014-03-09 15:48:15 -07002382 struct device *dev)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002383{
David Woodhouse0b9d9752014-03-09 15:48:15 -07002384 if (dev->archdata.iommu == DUMMY_DEVICE_DOMAIN_INFO)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002385 return 0;
David Woodhouse0b9d9752014-03-09 15:48:15 -07002386 return iommu_prepare_identity_map(dev, rmrr->base_address,
2387 rmrr->end_address);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002388}
2389
Suresh Siddhad3f13812011-08-23 17:05:25 -07002390#ifdef CONFIG_INTEL_IOMMU_FLOPPY_WA
Keshavamurthy, Anil S49a04292007-10-21 16:41:57 -07002391static inline void iommu_prepare_isa(void)
2392{
2393 struct pci_dev *pdev;
2394 int ret;
2395
2396 pdev = pci_get_class(PCI_CLASS_BRIDGE_ISA << 8, NULL);
2397 if (!pdev)
2398 return;
2399
David Woodhousec7ab48d2009-06-26 19:10:36 +01002400 printk(KERN_INFO "IOMMU: Prepare 0-16MiB unity mapping for LPC\n");
David Woodhouse0b9d9752014-03-09 15:48:15 -07002401 ret = iommu_prepare_identity_map(&pdev->dev, 0, 16*1024*1024 - 1);
Keshavamurthy, Anil S49a04292007-10-21 16:41:57 -07002402
2403 if (ret)
David Woodhousec7ab48d2009-06-26 19:10:36 +01002404 printk(KERN_ERR "IOMMU: Failed to create 0-16MiB identity map; "
2405 "floppy might not work\n");
Keshavamurthy, Anil S49a04292007-10-21 16:41:57 -07002406
2407}
2408#else
2409static inline void iommu_prepare_isa(void)
2410{
2411 return;
2412}
Suresh Siddhad3f13812011-08-23 17:05:25 -07002413#endif /* !CONFIG_INTEL_IOMMU_FLPY_WA */
Keshavamurthy, Anil S49a04292007-10-21 16:41:57 -07002414
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002415static int md_domain_init(struct dmar_domain *domain, int guest_width);
David Woodhousec7ab48d2009-06-26 19:10:36 +01002416
Matt Kraai071e1372009-08-23 22:30:22 -07002417static int __init si_domain_init(int hw)
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002418{
2419 struct dmar_drhd_unit *drhd;
2420 struct intel_iommu *iommu;
David Woodhousec7ab48d2009-06-26 19:10:36 +01002421 int nid, ret = 0;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002422
Jiang Liu92d03cc2014-02-19 14:07:28 +08002423 si_domain = alloc_domain(false);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002424 if (!si_domain)
2425 return -EFAULT;
2426
Jiang Liu92d03cc2014-02-19 14:07:28 +08002427 si_domain->flags = DOMAIN_FLAG_STATIC_IDENTITY;
2428
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002429 for_each_active_iommu(iommu, drhd) {
2430 ret = iommu_attach_domain(si_domain, iommu);
2431 if (ret) {
2432 domain_exit(si_domain);
2433 return -EFAULT;
2434 }
2435 }
2436
2437 if (md_domain_init(si_domain, DEFAULT_DOMAIN_ADDRESS_WIDTH)) {
2438 domain_exit(si_domain);
2439 return -EFAULT;
2440 }
2441
Jiang Liu9544c002014-01-06 14:18:13 +08002442 pr_debug("IOMMU: identity mapping domain is domain %d\n",
2443 si_domain->id);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002444
David Woodhouse19943b02009-08-04 16:19:20 +01002445 if (hw)
2446 return 0;
2447
David Woodhousec7ab48d2009-06-26 19:10:36 +01002448 for_each_online_node(nid) {
Tejun Heod4bbf7e2011-11-28 09:46:22 -08002449 unsigned long start_pfn, end_pfn;
2450 int i;
2451
2452 for_each_mem_pfn_range(i, nid, &start_pfn, &end_pfn, NULL) {
2453 ret = iommu_domain_identity_map(si_domain,
2454 PFN_PHYS(start_pfn), PFN_PHYS(end_pfn));
2455 if (ret)
2456 return ret;
2457 }
David Woodhousec7ab48d2009-06-26 19:10:36 +01002458 }
2459
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002460 return 0;
2461}
2462
David Woodhouse9b226622014-03-09 14:03:28 -07002463static int identity_mapping(struct device *dev)
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002464{
2465 struct device_domain_info *info;
2466
2467 if (likely(!iommu_identity_mapping))
2468 return 0;
2469
David Woodhouse9b226622014-03-09 14:03:28 -07002470 info = dev->archdata.iommu;
Mike Traviscb452a42011-05-28 13:15:03 -05002471 if (info && info != DUMMY_DEVICE_DOMAIN_INFO)
2472 return (info->domain == si_domain);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002473
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002474 return 0;
2475}
2476
2477static int domain_add_dev_info(struct dmar_domain *domain,
David Woodhouse5913c9b2014-03-09 16:27:31 -07002478 struct device *dev, int translation)
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002479{
David Woodhouse0ac72662014-03-09 13:19:22 -07002480 struct dmar_domain *ndomain;
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002481 struct intel_iommu *iommu;
David Woodhouse156baca2014-03-09 14:00:57 -07002482 u8 bus, devfn;
David Woodhouse5fe60f42009-08-09 10:53:41 +01002483 int ret;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002484
David Woodhouse5913c9b2014-03-09 16:27:31 -07002485 iommu = device_to_iommu(dev, &bus, &devfn);
David Woodhouse5a8f40e2014-03-09 13:31:18 -07002486 if (!iommu)
2487 return -ENODEV;
2488
David Woodhouse5913c9b2014-03-09 16:27:31 -07002489 ndomain = dmar_insert_dev_info(iommu, bus, devfn, dev, domain);
David Woodhouse0ac72662014-03-09 13:19:22 -07002490 if (ndomain != domain)
2491 return -EBUSY;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002492
David Woodhouse5913c9b2014-03-09 16:27:31 -07002493 ret = domain_context_mapping(domain, dev, translation);
David Woodhousee2ad23d2012-05-25 17:42:54 +01002494 if (ret) {
David Woodhouse5913c9b2014-03-09 16:27:31 -07002495 domain_remove_one_dev_info(domain, dev);
David Woodhousee2ad23d2012-05-25 17:42:54 +01002496 return ret;
2497 }
2498
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002499 return 0;
2500}
2501
David Woodhouse0b9d9752014-03-09 15:48:15 -07002502static bool device_has_rmrr(struct device *dev)
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002503{
2504 struct dmar_rmrr_unit *rmrr;
David Woodhouse832bd852014-03-07 15:08:36 +00002505 struct device *tmp;
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002506 int i;
2507
Jiang Liu0e242612014-02-19 14:07:34 +08002508 rcu_read_lock();
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002509 for_each_rmrr_units(rmrr) {
Jiang Liub683b232014-02-19 14:07:32 +08002510 /*
2511 * Return TRUE if this RMRR contains the device that
2512 * is passed in.
2513 */
2514 for_each_active_dev_scope(rmrr->devices,
2515 rmrr->devices_cnt, i, tmp)
David Woodhouse0b9d9752014-03-09 15:48:15 -07002516 if (tmp == dev) {
Jiang Liu0e242612014-02-19 14:07:34 +08002517 rcu_read_unlock();
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002518 return true;
Jiang Liub683b232014-02-19 14:07:32 +08002519 }
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002520 }
Jiang Liu0e242612014-02-19 14:07:34 +08002521 rcu_read_unlock();
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002522 return false;
2523}
2524
David Woodhouse3bdb2592014-03-09 16:03:08 -07002525static int iommu_should_identity_map(struct device *dev, int startup)
David Woodhouse6941af22009-07-04 18:24:27 +01002526{
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002527
David Woodhouse3bdb2592014-03-09 16:03:08 -07002528 if (dev_is_pci(dev)) {
2529 struct pci_dev *pdev = to_pci_dev(dev);
Tom Mingarelliea2447f2012-11-20 19:43:17 +00002530
David Woodhouse3bdb2592014-03-09 16:03:08 -07002531 /*
2532 * We want to prevent any device associated with an RMRR from
2533 * getting placed into the SI Domain. This is done because
2534 * problems exist when devices are moved in and out of domains
2535 * and their respective RMRR info is lost. We exempt USB devices
2536 * from this process due to their usage of RMRRs that are known
2537 * to not be needed after BIOS hand-off to OS.
2538 */
2539 if (device_has_rmrr(dev) &&
2540 (pdev->class >> 8) != PCI_CLASS_SERIAL_USB)
2541 return 0;
David Woodhousee0fc7e02009-09-30 09:12:17 -07002542
David Woodhouse3bdb2592014-03-09 16:03:08 -07002543 if ((iommu_identity_mapping & IDENTMAP_AZALIA) && IS_AZALIA(pdev))
2544 return 1;
David Woodhousee0fc7e02009-09-30 09:12:17 -07002545
David Woodhouse3bdb2592014-03-09 16:03:08 -07002546 if ((iommu_identity_mapping & IDENTMAP_GFX) && IS_GFX_DEVICE(pdev))
2547 return 1;
2548
2549 if (!(iommu_identity_mapping & IDENTMAP_ALL))
2550 return 0;
2551
2552 /*
2553 * We want to start off with all devices in the 1:1 domain, and
2554 * take them out later if we find they can't access all of memory.
2555 *
2556 * However, we can't do this for PCI devices behind bridges,
2557 * because all PCI devices behind the same bridge will end up
2558 * with the same source-id on their transactions.
2559 *
2560 * Practically speaking, we can't change things around for these
2561 * devices at run-time, because we can't be sure there'll be no
2562 * DMA transactions in flight for any of their siblings.
2563 *
2564 * So PCI devices (unless they're on the root bus) as well as
2565 * their parent PCI-PCI or PCIe-PCI bridges must be left _out_ of
2566 * the 1:1 domain, just in _case_ one of their siblings turns out
2567 * not to be able to map all of memory.
2568 */
2569 if (!pci_is_pcie(pdev)) {
2570 if (!pci_is_root_bus(pdev->bus))
2571 return 0;
2572 if (pdev->class >> 8 == PCI_CLASS_BRIDGE_PCI)
2573 return 0;
2574 } else if (pci_pcie_type(pdev) == PCI_EXP_TYPE_PCI_BRIDGE)
2575 return 0;
2576 } else {
2577 if (device_has_rmrr(dev))
2578 return 0;
2579 }
David Woodhouse6941af22009-07-04 18:24:27 +01002580
David Woodhouse3dfc8132009-07-04 19:11:08 +01002581 /*
David Woodhouse3dfc8132009-07-04 19:11:08 +01002582 * At boot time, we don't yet know if devices will be 64-bit capable.
David Woodhouse3bdb2592014-03-09 16:03:08 -07002583 * Assume that they will — if they turn out not to be, then we can
David Woodhouse3dfc8132009-07-04 19:11:08 +01002584 * take them out of the 1:1 domain later.
2585 */
Chris Wright8fcc5372011-05-28 13:15:02 -05002586 if (!startup) {
2587 /*
2588 * If the device's dma_mask is less than the system's memory
2589 * size then this is not a candidate for identity mapping.
2590 */
David Woodhouse3bdb2592014-03-09 16:03:08 -07002591 u64 dma_mask = *dev->dma_mask;
Chris Wright8fcc5372011-05-28 13:15:02 -05002592
David Woodhouse3bdb2592014-03-09 16:03:08 -07002593 if (dev->coherent_dma_mask &&
2594 dev->coherent_dma_mask < dma_mask)
2595 dma_mask = dev->coherent_dma_mask;
Chris Wright8fcc5372011-05-28 13:15:02 -05002596
David Woodhouse3bdb2592014-03-09 16:03:08 -07002597 return dma_mask >= dma_get_required_mask(dev);
Chris Wright8fcc5372011-05-28 13:15:02 -05002598 }
David Woodhouse6941af22009-07-04 18:24:27 +01002599
2600 return 1;
2601}
2602
David Woodhousecf04eee2014-03-21 16:49:04 +00002603static int __init dev_prepare_static_identity_mapping(struct device *dev, int hw)
2604{
2605 int ret;
2606
2607 if (!iommu_should_identity_map(dev, 1))
2608 return 0;
2609
2610 ret = domain_add_dev_info(si_domain, dev,
2611 hw ? CONTEXT_TT_PASS_THROUGH :
2612 CONTEXT_TT_MULTI_LEVEL);
2613 if (!ret)
2614 pr_info("IOMMU: %s identity mapping for device %s\n",
2615 hw ? "hardware" : "software", dev_name(dev));
2616 else if (ret == -ENODEV)
2617 /* device not associated with an iommu */
2618 ret = 0;
2619
2620 return ret;
2621}
2622
2623
Matt Kraai071e1372009-08-23 22:30:22 -07002624static int __init iommu_prepare_static_identity_mapping(int hw)
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002625{
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002626 struct pci_dev *pdev = NULL;
David Woodhousecf04eee2014-03-21 16:49:04 +00002627 struct dmar_drhd_unit *drhd;
2628 struct intel_iommu *iommu;
2629 struct device *dev;
2630 int i;
2631 int ret = 0;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002632
David Woodhouse19943b02009-08-04 16:19:20 +01002633 ret = si_domain_init(hw);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002634 if (ret)
2635 return -EFAULT;
2636
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002637 for_each_pci_dev(pdev) {
David Woodhousecf04eee2014-03-21 16:49:04 +00002638 ret = dev_prepare_static_identity_mapping(&pdev->dev, hw);
2639 if (ret)
2640 return ret;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002641 }
2642
David Woodhousecf04eee2014-03-21 16:49:04 +00002643 for_each_active_iommu(iommu, drhd)
2644 for_each_active_dev_scope(drhd->devices, drhd->devices_cnt, i, dev) {
2645 struct acpi_device_physical_node *pn;
2646 struct acpi_device *adev;
2647
2648 if (dev->bus != &acpi_bus_type)
2649 continue;
2650
2651 adev= to_acpi_device(dev);
2652 mutex_lock(&adev->physical_node_lock);
2653 list_for_each_entry(pn, &adev->physical_node_list, node) {
2654 ret = dev_prepare_static_identity_mapping(pn->dev, hw);
2655 if (ret)
2656 break;
2657 }
2658 mutex_unlock(&adev->physical_node_lock);
2659 if (ret)
2660 return ret;
2661 }
2662
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002663 return 0;
2664}
2665
Joseph Cihulab7792602011-05-03 00:08:37 -07002666static int __init init_dmars(void)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002667{
2668 struct dmar_drhd_unit *drhd;
2669 struct dmar_rmrr_unit *rmrr;
David Woodhouse832bd852014-03-07 15:08:36 +00002670 struct device *dev;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002671 struct intel_iommu *iommu;
Suresh Siddha9d783ba2009-03-16 17:04:55 -07002672 int i, ret;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002673
2674 /*
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002675 * for each drhd
2676 * allocate root
2677 * initialize and program root entry to not present
2678 * endfor
2679 */
2680 for_each_drhd_unit(drhd) {
mark gross5e0d2a62008-03-04 15:22:08 -08002681 /*
2682 * lock not needed as this is only incremented in the single
2683 * threaded kernel __init code path all other access are read
2684 * only
2685 */
Mike Travis1b198bb2012-03-05 15:05:16 -08002686 if (g_num_of_iommus < IOMMU_UNITS_SUPPORTED) {
2687 g_num_of_iommus++;
2688 continue;
2689 }
2690 printk_once(KERN_ERR "intel-iommu: exceeded %d IOMMUs\n",
2691 IOMMU_UNITS_SUPPORTED);
mark gross5e0d2a62008-03-04 15:22:08 -08002692 }
2693
Weidong Hand9630fe2008-12-08 11:06:32 +08002694 g_iommus = kcalloc(g_num_of_iommus, sizeof(struct intel_iommu *),
2695 GFP_KERNEL);
2696 if (!g_iommus) {
2697 printk(KERN_ERR "Allocating global iommu array failed\n");
2698 ret = -ENOMEM;
2699 goto error;
2700 }
2701
mark gross80b20dd2008-04-18 13:53:58 -07002702 deferred_flush = kzalloc(g_num_of_iommus *
2703 sizeof(struct deferred_flush_tables), GFP_KERNEL);
2704 if (!deferred_flush) {
mark gross5e0d2a62008-03-04 15:22:08 -08002705 ret = -ENOMEM;
Jiang Liu989d51f2014-02-19 14:07:21 +08002706 goto free_g_iommus;
mark gross5e0d2a62008-03-04 15:22:08 -08002707 }
2708
Jiang Liu7c919772014-01-06 14:18:18 +08002709 for_each_active_iommu(iommu, drhd) {
Weidong Hand9630fe2008-12-08 11:06:32 +08002710 g_iommus[iommu->seq_id] = iommu;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002711
Suresh Siddhae61d98d2008-07-10 11:16:35 -07002712 ret = iommu_init_domains(iommu);
2713 if (ret)
Jiang Liu989d51f2014-02-19 14:07:21 +08002714 goto free_iommu;
Suresh Siddhae61d98d2008-07-10 11:16:35 -07002715
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002716 /*
2717 * TBD:
2718 * we could share the same root & context tables
Lucas De Marchi25985ed2011-03-30 22:57:33 -03002719 * among all IOMMU's. Need to Split it later.
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002720 */
2721 ret = iommu_alloc_root_entry(iommu);
2722 if (ret) {
2723 printk(KERN_ERR "IOMMU: allocate root entry failed\n");
Jiang Liu989d51f2014-02-19 14:07:21 +08002724 goto free_iommu;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002725 }
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07002726 if (!ecap_pass_through(iommu->ecap))
David Woodhouse19943b02009-08-04 16:19:20 +01002727 hw_pass_through = 0;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002728 }
2729
Suresh Siddha1531a6a2009-03-16 17:04:57 -07002730 /*
2731 * Start from the sane iommu hardware state.
2732 */
Jiang Liu7c919772014-01-06 14:18:18 +08002733 for_each_active_iommu(iommu, drhd) {
Suresh Siddha1531a6a2009-03-16 17:04:57 -07002734 /*
2735 * If the queued invalidation is already initialized by us
2736 * (for example, while enabling interrupt-remapping) then
2737 * we got the things already rolling from a sane state.
2738 */
2739 if (iommu->qi)
2740 continue;
2741
2742 /*
2743 * Clear any previous faults.
2744 */
2745 dmar_fault(-1, iommu);
2746 /*
2747 * Disable queued invalidation if supported and already enabled
2748 * before OS handover.
2749 */
2750 dmar_disable_qi(iommu);
2751 }
2752
Jiang Liu7c919772014-01-06 14:18:18 +08002753 for_each_active_iommu(iommu, drhd) {
Youquan Songa77b67d2008-10-16 16:31:56 -07002754 if (dmar_enable_qi(iommu)) {
2755 /*
2756 * Queued Invalidate not enabled, use Register Based
2757 * Invalidate
2758 */
2759 iommu->flush.flush_context = __iommu_flush_context;
2760 iommu->flush.flush_iotlb = __iommu_flush_iotlb;
Yinghai Lu680a7522010-04-08 19:58:23 +01002761 printk(KERN_INFO "IOMMU %d 0x%Lx: using Register based "
FUJITA Tomonorib4e0f9e2008-11-19 13:53:42 +09002762 "invalidation\n",
Yinghai Lu680a7522010-04-08 19:58:23 +01002763 iommu->seq_id,
FUJITA Tomonorib4e0f9e2008-11-19 13:53:42 +09002764 (unsigned long long)drhd->reg_base_addr);
Youquan Songa77b67d2008-10-16 16:31:56 -07002765 } else {
2766 iommu->flush.flush_context = qi_flush_context;
2767 iommu->flush.flush_iotlb = qi_flush_iotlb;
Yinghai Lu680a7522010-04-08 19:58:23 +01002768 printk(KERN_INFO "IOMMU %d 0x%Lx: using Queued "
FUJITA Tomonorib4e0f9e2008-11-19 13:53:42 +09002769 "invalidation\n",
Yinghai Lu680a7522010-04-08 19:58:23 +01002770 iommu->seq_id,
FUJITA Tomonorib4e0f9e2008-11-19 13:53:42 +09002771 (unsigned long long)drhd->reg_base_addr);
Youquan Songa77b67d2008-10-16 16:31:56 -07002772 }
2773 }
2774
David Woodhouse19943b02009-08-04 16:19:20 +01002775 if (iommu_pass_through)
David Woodhousee0fc7e02009-09-30 09:12:17 -07002776 iommu_identity_mapping |= IDENTMAP_ALL;
2777
Suresh Siddhad3f13812011-08-23 17:05:25 -07002778#ifdef CONFIG_INTEL_IOMMU_BROKEN_GFX_WA
David Woodhousee0fc7e02009-09-30 09:12:17 -07002779 iommu_identity_mapping |= IDENTMAP_GFX;
David Woodhouse19943b02009-08-04 16:19:20 +01002780#endif
David Woodhousee0fc7e02009-09-30 09:12:17 -07002781
2782 check_tylersburg_isoch();
2783
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07002784 /*
2785 * If pass through is not set or not enabled, setup context entries for
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002786 * identity mappings for rmrr, gfx, and isa and may fall back to static
2787 * identity mapping if iommu_identity_mapping is set.
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07002788 */
David Woodhouse19943b02009-08-04 16:19:20 +01002789 if (iommu_identity_mapping) {
2790 ret = iommu_prepare_static_identity_mapping(hw_pass_through);
2791 if (ret) {
2792 printk(KERN_CRIT "Failed to setup IOMMU pass-through\n");
Jiang Liu989d51f2014-02-19 14:07:21 +08002793 goto free_iommu;
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07002794 }
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07002795 }
David Woodhouse19943b02009-08-04 16:19:20 +01002796 /*
2797 * For each rmrr
2798 * for each dev attached to rmrr
2799 * do
2800 * locate drhd for dev, alloc domain for dev
2801 * allocate free domain
2802 * allocate page table entries for rmrr
2803 * if context not allocated for bus
2804 * allocate and init context
2805 * set present in root table for this bus
2806 * init context with domain, translation etc
2807 * endfor
2808 * endfor
2809 */
2810 printk(KERN_INFO "IOMMU: Setting RMRR:\n");
2811 for_each_rmrr_units(rmrr) {
Jiang Liub683b232014-02-19 14:07:32 +08002812 /* some BIOS lists non-exist devices in DMAR table. */
2813 for_each_active_dev_scope(rmrr->devices, rmrr->devices_cnt,
David Woodhouse832bd852014-03-07 15:08:36 +00002814 i, dev) {
David Woodhouse0b9d9752014-03-09 15:48:15 -07002815 ret = iommu_prepare_rmrr_dev(rmrr, dev);
David Woodhouse19943b02009-08-04 16:19:20 +01002816 if (ret)
2817 printk(KERN_ERR
2818 "IOMMU: mapping reserved region failed\n");
2819 }
2820 }
2821
2822 iommu_prepare_isa();
Keshavamurthy, Anil S49a04292007-10-21 16:41:57 -07002823
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002824 /*
2825 * for each drhd
2826 * enable fault log
2827 * global invalidate context cache
2828 * global invalidate iotlb
2829 * enable translation
2830 */
Jiang Liu7c919772014-01-06 14:18:18 +08002831 for_each_iommu(iommu, drhd) {
Joseph Cihula51a63e62011-03-21 11:04:24 -07002832 if (drhd->ignored) {
2833 /*
2834 * we always have to disable PMRs or DMA may fail on
2835 * this device
2836 */
2837 if (force_on)
Jiang Liu7c919772014-01-06 14:18:18 +08002838 iommu_disable_protect_mem_regions(iommu);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002839 continue;
Joseph Cihula51a63e62011-03-21 11:04:24 -07002840 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002841
2842 iommu_flush_write_buffer(iommu);
2843
Keshavamurthy, Anil S3460a6d2007-10-21 16:41:54 -07002844 ret = dmar_set_interrupt(iommu);
2845 if (ret)
Jiang Liu989d51f2014-02-19 14:07:21 +08002846 goto free_iommu;
Keshavamurthy, Anil S3460a6d2007-10-21 16:41:54 -07002847
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002848 iommu_set_root_entry(iommu);
2849
David Woodhouse4c25a2c2009-05-10 17:16:06 +01002850 iommu->flush.flush_context(iommu, 0, 0, 0, DMA_CCMD_GLOBAL_INVL);
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01002851 iommu->flush.flush_iotlb(iommu, 0, 0, 0, DMA_TLB_GLOBAL_FLUSH);
mark grossf8bab732008-02-08 04:18:38 -08002852
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002853 ret = iommu_enable_translation(iommu);
2854 if (ret)
Jiang Liu989d51f2014-02-19 14:07:21 +08002855 goto free_iommu;
David Woodhouseb94996c2009-09-19 15:28:12 -07002856
2857 iommu_disable_protect_mem_regions(iommu);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002858 }
2859
2860 return 0;
Jiang Liu989d51f2014-02-19 14:07:21 +08002861
2862free_iommu:
Jiang Liu7c919772014-01-06 14:18:18 +08002863 for_each_active_iommu(iommu, drhd)
Jiang Liua868e6b2014-01-06 14:18:20 +08002864 free_dmar_iommu(iommu);
Jiang Liu9bdc5312014-01-06 14:18:27 +08002865 kfree(deferred_flush);
Jiang Liu989d51f2014-02-19 14:07:21 +08002866free_g_iommus:
Weidong Hand9630fe2008-12-08 11:06:32 +08002867 kfree(g_iommus);
Jiang Liu989d51f2014-02-19 14:07:21 +08002868error:
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002869 return ret;
2870}
2871
David Woodhouse5a5e02a2009-07-04 09:35:44 +01002872/* This takes a number of _MM_ pages, not VTD pages */
David Woodhouse875764d2009-06-28 21:20:51 +01002873static struct iova *intel_alloc_iova(struct device *dev,
2874 struct dmar_domain *domain,
2875 unsigned long nrpages, uint64_t dma_mask)
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002876{
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002877 struct iova *iova = NULL;
2878
David Woodhouse875764d2009-06-28 21:20:51 +01002879 /* Restrict dma_mask to the width that the iommu can handle */
2880 dma_mask = min_t(uint64_t, DOMAIN_MAX_ADDR(domain->gaw), dma_mask);
2881
2882 if (!dmar_forcedac && dma_mask > DMA_BIT_MASK(32)) {
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002883 /*
2884 * First try to allocate an io virtual address in
Yang Hongyang284901a2009-04-06 19:01:15 -07002885 * DMA_BIT_MASK(32) and if that fails then try allocating
Joe Perches36098012007-12-17 11:40:11 -08002886 * from higher range
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002887 */
David Woodhouse875764d2009-06-28 21:20:51 +01002888 iova = alloc_iova(&domain->iovad, nrpages,
2889 IOVA_PFN(DMA_BIT_MASK(32)), 1);
2890 if (iova)
2891 return iova;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002892 }
David Woodhouse875764d2009-06-28 21:20:51 +01002893 iova = alloc_iova(&domain->iovad, nrpages, IOVA_PFN(dma_mask), 1);
2894 if (unlikely(!iova)) {
2895 printk(KERN_ERR "Allocating %ld-page iova for %s failed",
David Woodhouse207e3592014-03-09 16:12:32 -07002896 nrpages, dev_name(dev));
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002897 return NULL;
2898 }
2899
2900 return iova;
2901}
2902
David Woodhoused4b709f2014-03-09 16:07:40 -07002903static struct dmar_domain *__get_valid_domain_for_dev(struct device *dev)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002904{
2905 struct dmar_domain *domain;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002906 int ret;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002907
David Woodhoused4b709f2014-03-09 16:07:40 -07002908 domain = get_domain_for_dev(dev, DEFAULT_DOMAIN_ADDRESS_WIDTH);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002909 if (!domain) {
David Woodhoused4b709f2014-03-09 16:07:40 -07002910 printk(KERN_ERR "Allocating domain for %s failed",
2911 dev_name(dev));
Al Viro4fe05bb2007-10-29 04:51:16 +00002912 return NULL;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002913 }
2914
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002915 /* make sure context mapping is ok */
David Woodhoused4b709f2014-03-09 16:07:40 -07002916 if (unlikely(!domain_context_mapped(dev))) {
2917 ret = domain_context_mapping(domain, dev, CONTEXT_TT_MULTI_LEVEL);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002918 if (ret) {
David Woodhoused4b709f2014-03-09 16:07:40 -07002919 printk(KERN_ERR "Domain context map for %s failed",
2920 dev_name(dev));
Al Viro4fe05bb2007-10-29 04:51:16 +00002921 return NULL;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002922 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07002923 }
2924
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002925 return domain;
2926}
2927
David Woodhoused4b709f2014-03-09 16:07:40 -07002928static inline struct dmar_domain *get_valid_domain_for_dev(struct device *dev)
David Woodhouse147202a2009-07-07 19:43:20 +01002929{
2930 struct device_domain_info *info;
2931
2932 /* No lock here, assumes no domain exit in normal case */
David Woodhoused4b709f2014-03-09 16:07:40 -07002933 info = dev->archdata.iommu;
David Woodhouse147202a2009-07-07 19:43:20 +01002934 if (likely(info))
2935 return info->domain;
2936
2937 return __get_valid_domain_for_dev(dev);
2938}
2939
David Woodhouse3d891942014-03-06 15:59:26 +00002940static int iommu_dummy(struct device *dev)
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002941{
David Woodhouse3d891942014-03-06 15:59:26 +00002942 return dev->archdata.iommu == DUMMY_DEVICE_DOMAIN_INFO;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002943}
2944
David Woodhouseecb509e2014-03-09 16:29:55 -07002945/* Check if the dev needs to go through non-identity map and unmap process.*/
David Woodhouse73676832009-07-04 14:08:36 +01002946static int iommu_no_mapping(struct device *dev)
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002947{
2948 int found;
2949
David Woodhouse3d891942014-03-06 15:59:26 +00002950 if (iommu_dummy(dev))
David Woodhouse1e4c64c2009-07-04 10:40:38 +01002951 return 1;
2952
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002953 if (!iommu_identity_mapping)
David Woodhouse1e4c64c2009-07-04 10:40:38 +01002954 return 0;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002955
David Woodhouse9b226622014-03-09 14:03:28 -07002956 found = identity_mapping(dev);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002957 if (found) {
David Woodhouseecb509e2014-03-09 16:29:55 -07002958 if (iommu_should_identity_map(dev, 0))
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002959 return 1;
2960 else {
2961 /*
2962 * 32 bit DMA is removed from si_domain and fall back
2963 * to non-identity mapping.
2964 */
David Woodhousebf9c9ed2014-03-09 16:19:13 -07002965 domain_remove_one_dev_info(si_domain, dev);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002966 printk(KERN_INFO "32bit %s uses non-identity mapping\n",
David Woodhouseecb509e2014-03-09 16:29:55 -07002967 dev_name(dev));
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002968 return 0;
2969 }
2970 } else {
2971 /*
2972 * In case of a detached 64 bit DMA device from vm, the device
2973 * is put into si_domain for identity mapping.
2974 */
David Woodhouseecb509e2014-03-09 16:29:55 -07002975 if (iommu_should_identity_map(dev, 0)) {
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002976 int ret;
David Woodhouse5913c9b2014-03-09 16:27:31 -07002977 ret = domain_add_dev_info(si_domain, dev,
David Woodhouse5fe60f42009-08-09 10:53:41 +01002978 hw_pass_through ?
2979 CONTEXT_TT_PASS_THROUGH :
2980 CONTEXT_TT_MULTI_LEVEL);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002981 if (!ret) {
2982 printk(KERN_INFO "64bit %s uses identity mapping\n",
David Woodhouseecb509e2014-03-09 16:29:55 -07002983 dev_name(dev));
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002984 return 1;
2985 }
2986 }
2987 }
2988
David Woodhouse1e4c64c2009-07-04 10:40:38 +01002989 return 0;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07002990}
2991
David Woodhouse5040a912014-03-09 16:14:00 -07002992static dma_addr_t __intel_map_single(struct device *dev, phys_addr_t paddr,
FUJITA Tomonoribb9e6d62008-10-15 16:08:28 +09002993 size_t size, int dir, u64 dma_mask)
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002994{
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002995 struct dmar_domain *domain;
Fenghua Yu5b6985c2008-10-16 18:02:32 -07002996 phys_addr_t start_paddr;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07002997 struct iova *iova;
2998 int prot = 0;
Ingo Molnar6865f0d2008-04-22 11:09:04 +02002999 int ret;
Weidong Han8c11e792008-12-08 15:29:22 +08003000 struct intel_iommu *iommu;
Fenghua Yu33041ec2009-08-04 15:10:59 -07003001 unsigned long paddr_pfn = paddr >> PAGE_SHIFT;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003002
3003 BUG_ON(dir == DMA_NONE);
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07003004
David Woodhouse5040a912014-03-09 16:14:00 -07003005 if (iommu_no_mapping(dev))
Ingo Molnar6865f0d2008-04-22 11:09:04 +02003006 return paddr;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003007
David Woodhouse5040a912014-03-09 16:14:00 -07003008 domain = get_valid_domain_for_dev(dev);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003009 if (!domain)
3010 return 0;
3011
Weidong Han8c11e792008-12-08 15:29:22 +08003012 iommu = domain_get_iommu(domain);
David Woodhouse88cb6a72009-06-28 15:03:06 +01003013 size = aligned_nrpages(paddr, size);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003014
David Woodhouse5040a912014-03-09 16:14:00 -07003015 iova = intel_alloc_iova(dev, domain, dma_to_mm_pfn(size), dma_mask);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003016 if (!iova)
3017 goto error;
3018
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003019 /*
3020 * Check if DMAR supports zero-length reads on write only
3021 * mappings..
3022 */
3023 if (dir == DMA_TO_DEVICE || dir == DMA_BIDIRECTIONAL || \
Weidong Han8c11e792008-12-08 15:29:22 +08003024 !cap_zlr(iommu->cap))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003025 prot |= DMA_PTE_READ;
3026 if (dir == DMA_FROM_DEVICE || dir == DMA_BIDIRECTIONAL)
3027 prot |= DMA_PTE_WRITE;
3028 /*
Ingo Molnar6865f0d2008-04-22 11:09:04 +02003029 * paddr - (paddr + size) might be partial page, we should map the whole
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003030 * page. Note: if two part of one page are separately mapped, we
Ingo Molnar6865f0d2008-04-22 11:09:04 +02003031 * might have two guest_addr mapping to the same host paddr, but this
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003032 * is not a big problem
3033 */
David Woodhouse0ab36de2009-06-28 14:01:43 +01003034 ret = domain_pfn_mapping(domain, mm_to_dma_pfn(iova->pfn_lo),
Fenghua Yu33041ec2009-08-04 15:10:59 -07003035 mm_to_dma_pfn(paddr_pfn), size, prot);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003036 if (ret)
3037 goto error;
3038
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003039 /* it's a non-present to present mapping. Only flush if caching mode */
3040 if (cap_caching_mode(iommu->cap))
David Woodhouseea8ea462014-03-05 17:09:32 +00003041 iommu_flush_iotlb_psi(iommu, domain->id, mm_to_dma_pfn(iova->pfn_lo), size, 0, 1);
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003042 else
Weidong Han8c11e792008-12-08 15:29:22 +08003043 iommu_flush_write_buffer(iommu);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003044
David Woodhouse03d6a242009-06-28 15:33:46 +01003045 start_paddr = (phys_addr_t)iova->pfn_lo << PAGE_SHIFT;
3046 start_paddr += paddr & ~PAGE_MASK;
3047 return start_paddr;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003048
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003049error:
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003050 if (iova)
3051 __free_iova(&domain->iovad, iova);
David Woodhouse4cf2e752009-02-11 17:23:43 +00003052 printk(KERN_ERR"Device %s request: %zx@%llx dir %d --- failed\n",
David Woodhouse5040a912014-03-09 16:14:00 -07003053 dev_name(dev), size, (unsigned long long)paddr, dir);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003054 return 0;
3055}
3056
FUJITA Tomonoriffbbef52009-01-05 23:47:26 +09003057static dma_addr_t intel_map_page(struct device *dev, struct page *page,
3058 unsigned long offset, size_t size,
3059 enum dma_data_direction dir,
3060 struct dma_attrs *attrs)
FUJITA Tomonoribb9e6d62008-10-15 16:08:28 +09003061{
FUJITA Tomonoriffbbef52009-01-05 23:47:26 +09003062 return __intel_map_single(dev, page_to_phys(page) + offset, size,
David Woodhouse46333e32014-03-10 20:01:21 -07003063 dir, *dev->dma_mask);
FUJITA Tomonoribb9e6d62008-10-15 16:08:28 +09003064}
3065
mark gross5e0d2a62008-03-04 15:22:08 -08003066static void flush_unmaps(void)
3067{
mark gross80b20dd2008-04-18 13:53:58 -07003068 int i, j;
mark gross5e0d2a62008-03-04 15:22:08 -08003069
mark gross5e0d2a62008-03-04 15:22:08 -08003070 timer_on = 0;
3071
3072 /* just flush them all */
3073 for (i = 0; i < g_num_of_iommus; i++) {
Weidong Hana2bb8452008-12-08 11:24:12 +08003074 struct intel_iommu *iommu = g_iommus[i];
3075 if (!iommu)
3076 continue;
Suresh Siddhac42d9f32008-07-10 11:16:36 -07003077
Yu Zhao9dd2fe82009-05-18 13:51:36 +08003078 if (!deferred_flush[i].next)
3079 continue;
3080
Nadav Amit78d5f0f2010-04-08 23:00:41 +03003081 /* In caching mode, global flushes turn emulation expensive */
3082 if (!cap_caching_mode(iommu->cap))
3083 iommu->flush.flush_iotlb(iommu, 0, 0, 0,
Yu Zhao93a23a72009-05-18 13:51:37 +08003084 DMA_TLB_GLOBAL_FLUSH);
Yu Zhao9dd2fe82009-05-18 13:51:36 +08003085 for (j = 0; j < deferred_flush[i].next; j++) {
Yu Zhao93a23a72009-05-18 13:51:37 +08003086 unsigned long mask;
3087 struct iova *iova = deferred_flush[i].iova[j];
Nadav Amit78d5f0f2010-04-08 23:00:41 +03003088 struct dmar_domain *domain = deferred_flush[i].domain[j];
Yu Zhao93a23a72009-05-18 13:51:37 +08003089
Nadav Amit78d5f0f2010-04-08 23:00:41 +03003090 /* On real hardware multiple invalidations are expensive */
3091 if (cap_caching_mode(iommu->cap))
3092 iommu_flush_iotlb_psi(iommu, domain->id,
David Woodhouseea8ea462014-03-05 17:09:32 +00003093 iova->pfn_lo, iova->pfn_hi - iova->pfn_lo + 1,
3094 !deferred_flush[i].freelist[j], 0);
Nadav Amit78d5f0f2010-04-08 23:00:41 +03003095 else {
3096 mask = ilog2(mm_to_dma_pfn(iova->pfn_hi - iova->pfn_lo + 1));
3097 iommu_flush_dev_iotlb(deferred_flush[i].domain[j],
3098 (uint64_t)iova->pfn_lo << PAGE_SHIFT, mask);
3099 }
Yu Zhao93a23a72009-05-18 13:51:37 +08003100 __free_iova(&deferred_flush[i].domain[j]->iovad, iova);
David Woodhouseea8ea462014-03-05 17:09:32 +00003101 if (deferred_flush[i].freelist[j])
3102 dma_free_pagelist(deferred_flush[i].freelist[j]);
mark gross80b20dd2008-04-18 13:53:58 -07003103 }
Yu Zhao9dd2fe82009-05-18 13:51:36 +08003104 deferred_flush[i].next = 0;
mark gross5e0d2a62008-03-04 15:22:08 -08003105 }
3106
mark gross5e0d2a62008-03-04 15:22:08 -08003107 list_size = 0;
mark gross5e0d2a62008-03-04 15:22:08 -08003108}
3109
3110static void flush_unmaps_timeout(unsigned long data)
3111{
mark gross80b20dd2008-04-18 13:53:58 -07003112 unsigned long flags;
3113
3114 spin_lock_irqsave(&async_umap_flush_lock, flags);
mark gross5e0d2a62008-03-04 15:22:08 -08003115 flush_unmaps();
mark gross80b20dd2008-04-18 13:53:58 -07003116 spin_unlock_irqrestore(&async_umap_flush_lock, flags);
mark gross5e0d2a62008-03-04 15:22:08 -08003117}
3118
David Woodhouseea8ea462014-03-05 17:09:32 +00003119static void add_unmap(struct dmar_domain *dom, struct iova *iova, struct page *freelist)
mark gross5e0d2a62008-03-04 15:22:08 -08003120{
3121 unsigned long flags;
mark gross80b20dd2008-04-18 13:53:58 -07003122 int next, iommu_id;
Weidong Han8c11e792008-12-08 15:29:22 +08003123 struct intel_iommu *iommu;
mark gross5e0d2a62008-03-04 15:22:08 -08003124
3125 spin_lock_irqsave(&async_umap_flush_lock, flags);
mark gross80b20dd2008-04-18 13:53:58 -07003126 if (list_size == HIGH_WATER_MARK)
3127 flush_unmaps();
3128
Weidong Han8c11e792008-12-08 15:29:22 +08003129 iommu = domain_get_iommu(dom);
3130 iommu_id = iommu->seq_id;
Suresh Siddhac42d9f32008-07-10 11:16:36 -07003131
mark gross80b20dd2008-04-18 13:53:58 -07003132 next = deferred_flush[iommu_id].next;
3133 deferred_flush[iommu_id].domain[next] = dom;
3134 deferred_flush[iommu_id].iova[next] = iova;
David Woodhouseea8ea462014-03-05 17:09:32 +00003135 deferred_flush[iommu_id].freelist[next] = freelist;
mark gross80b20dd2008-04-18 13:53:58 -07003136 deferred_flush[iommu_id].next++;
mark gross5e0d2a62008-03-04 15:22:08 -08003137
3138 if (!timer_on) {
3139 mod_timer(&unmap_timer, jiffies + msecs_to_jiffies(10));
3140 timer_on = 1;
3141 }
3142 list_size++;
3143 spin_unlock_irqrestore(&async_umap_flush_lock, flags);
3144}
3145
FUJITA Tomonoriffbbef52009-01-05 23:47:26 +09003146static void intel_unmap_page(struct device *dev, dma_addr_t dev_addr,
3147 size_t size, enum dma_data_direction dir,
3148 struct dma_attrs *attrs)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003149{
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003150 struct dmar_domain *domain;
David Woodhoused794dc92009-06-28 00:27:49 +01003151 unsigned long start_pfn, last_pfn;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003152 struct iova *iova;
Weidong Han8c11e792008-12-08 15:29:22 +08003153 struct intel_iommu *iommu;
David Woodhouseea8ea462014-03-05 17:09:32 +00003154 struct page *freelist;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003155
David Woodhouse73676832009-07-04 14:08:36 +01003156 if (iommu_no_mapping(dev))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003157 return;
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07003158
David Woodhouse1525a292014-03-06 16:19:30 +00003159 domain = find_domain(dev);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003160 BUG_ON(!domain);
3161
Weidong Han8c11e792008-12-08 15:29:22 +08003162 iommu = domain_get_iommu(domain);
3163
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003164 iova = find_iova(&domain->iovad, IOVA_PFN(dev_addr));
David Woodhouse85b98272009-07-01 19:27:53 +01003165 if (WARN_ONCE(!iova, "Driver unmaps unmatched page at PFN %llx\n",
3166 (unsigned long long)dev_addr))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003167 return;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003168
David Woodhoused794dc92009-06-28 00:27:49 +01003169 start_pfn = mm_to_dma_pfn(iova->pfn_lo);
3170 last_pfn = mm_to_dma_pfn(iova->pfn_hi + 1) - 1;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003171
David Woodhoused794dc92009-06-28 00:27:49 +01003172 pr_debug("Device %s unmapping: pfn %lx-%lx\n",
David Woodhouse207e3592014-03-09 16:12:32 -07003173 dev_name(dev), start_pfn, last_pfn);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003174
David Woodhouseea8ea462014-03-05 17:09:32 +00003175 freelist = domain_unmap(domain, start_pfn, last_pfn);
David Woodhoused794dc92009-06-28 00:27:49 +01003176
mark gross5e0d2a62008-03-04 15:22:08 -08003177 if (intel_iommu_strict) {
David Woodhouse03d6a242009-06-28 15:33:46 +01003178 iommu_flush_iotlb_psi(iommu, domain->id, start_pfn,
David Woodhouseea8ea462014-03-05 17:09:32 +00003179 last_pfn - start_pfn + 1, !freelist, 0);
mark gross5e0d2a62008-03-04 15:22:08 -08003180 /* free iova */
3181 __free_iova(&domain->iovad, iova);
David Woodhouseea8ea462014-03-05 17:09:32 +00003182 dma_free_pagelist(freelist);
mark gross5e0d2a62008-03-04 15:22:08 -08003183 } else {
David Woodhouseea8ea462014-03-05 17:09:32 +00003184 add_unmap(domain, iova, freelist);
mark gross5e0d2a62008-03-04 15:22:08 -08003185 /*
3186 * queue up the release of the unmap to save the 1/6th of the
3187 * cpu used up by the iotlb flush operation...
3188 */
mark gross5e0d2a62008-03-04 15:22:08 -08003189 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003190}
3191
David Woodhouse5040a912014-03-09 16:14:00 -07003192static void *intel_alloc_coherent(struct device *dev, size_t size,
Andrzej Pietrasiewiczbaa676f2012-03-27 14:28:18 +02003193 dma_addr_t *dma_handle, gfp_t flags,
3194 struct dma_attrs *attrs)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003195{
3196 void *vaddr;
3197 int order;
3198
Fenghua Yu5b6985c2008-10-16 18:02:32 -07003199 size = PAGE_ALIGN(size);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003200 order = get_order(size);
Alex Williamsone8bb9102009-11-04 15:59:34 -07003201
David Woodhouse5040a912014-03-09 16:14:00 -07003202 if (!iommu_no_mapping(dev))
Alex Williamsone8bb9102009-11-04 15:59:34 -07003203 flags &= ~(GFP_DMA | GFP_DMA32);
David Woodhouse5040a912014-03-09 16:14:00 -07003204 else if (dev->coherent_dma_mask < dma_get_required_mask(dev)) {
3205 if (dev->coherent_dma_mask < DMA_BIT_MASK(32))
Alex Williamsone8bb9102009-11-04 15:59:34 -07003206 flags |= GFP_DMA;
3207 else
3208 flags |= GFP_DMA32;
3209 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003210
3211 vaddr = (void *)__get_free_pages(flags, order);
3212 if (!vaddr)
3213 return NULL;
3214 memset(vaddr, 0, size);
3215
David Woodhouse5040a912014-03-09 16:14:00 -07003216 *dma_handle = __intel_map_single(dev, virt_to_bus(vaddr), size,
FUJITA Tomonoribb9e6d62008-10-15 16:08:28 +09003217 DMA_BIDIRECTIONAL,
David Woodhouse5040a912014-03-09 16:14:00 -07003218 dev->coherent_dma_mask);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003219 if (*dma_handle)
3220 return vaddr;
3221 free_pages((unsigned long)vaddr, order);
3222 return NULL;
3223}
3224
David Woodhouse5040a912014-03-09 16:14:00 -07003225static void intel_free_coherent(struct device *dev, size_t size, void *vaddr,
Andrzej Pietrasiewiczbaa676f2012-03-27 14:28:18 +02003226 dma_addr_t dma_handle, struct dma_attrs *attrs)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003227{
3228 int order;
3229
Fenghua Yu5b6985c2008-10-16 18:02:32 -07003230 size = PAGE_ALIGN(size);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003231 order = get_order(size);
3232
David Woodhouse5040a912014-03-09 16:14:00 -07003233 intel_unmap_page(dev, dma_handle, size, DMA_BIDIRECTIONAL, NULL);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003234 free_pages((unsigned long)vaddr, order);
3235}
3236
David Woodhouse5040a912014-03-09 16:14:00 -07003237static void intel_unmap_sg(struct device *dev, struct scatterlist *sglist,
FUJITA Tomonorid7ab5c42009-01-28 21:53:18 +09003238 int nelems, enum dma_data_direction dir,
3239 struct dma_attrs *attrs)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003240{
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003241 struct dmar_domain *domain;
David Woodhoused794dc92009-06-28 00:27:49 +01003242 unsigned long start_pfn, last_pfn;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003243 struct iova *iova;
Weidong Han8c11e792008-12-08 15:29:22 +08003244 struct intel_iommu *iommu;
David Woodhouseea8ea462014-03-05 17:09:32 +00003245 struct page *freelist;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003246
David Woodhouse5040a912014-03-09 16:14:00 -07003247 if (iommu_no_mapping(dev))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003248 return;
3249
David Woodhouse5040a912014-03-09 16:14:00 -07003250 domain = find_domain(dev);
Weidong Han8c11e792008-12-08 15:29:22 +08003251 BUG_ON(!domain);
3252
3253 iommu = domain_get_iommu(domain);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003254
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003255 iova = find_iova(&domain->iovad, IOVA_PFN(sglist[0].dma_address));
David Woodhouse85b98272009-07-01 19:27:53 +01003256 if (WARN_ONCE(!iova, "Driver unmaps unmatched sglist at PFN %llx\n",
3257 (unsigned long long)sglist[0].dma_address))
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003258 return;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003259
David Woodhoused794dc92009-06-28 00:27:49 +01003260 start_pfn = mm_to_dma_pfn(iova->pfn_lo);
3261 last_pfn = mm_to_dma_pfn(iova->pfn_hi + 1) - 1;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003262
David Woodhouseea8ea462014-03-05 17:09:32 +00003263 freelist = domain_unmap(domain, start_pfn, last_pfn);
David Woodhoused794dc92009-06-28 00:27:49 +01003264
David Woodhouseacea0012009-07-14 01:55:11 +01003265 if (intel_iommu_strict) {
3266 iommu_flush_iotlb_psi(iommu, domain->id, start_pfn,
David Woodhouseea8ea462014-03-05 17:09:32 +00003267 last_pfn - start_pfn + 1, !freelist, 0);
David Woodhouseacea0012009-07-14 01:55:11 +01003268 /* free iova */
3269 __free_iova(&domain->iovad, iova);
David Woodhouseea8ea462014-03-05 17:09:32 +00003270 dma_free_pagelist(freelist);
David Woodhouseacea0012009-07-14 01:55:11 +01003271 } else {
David Woodhouseea8ea462014-03-05 17:09:32 +00003272 add_unmap(domain, iova, freelist);
David Woodhouseacea0012009-07-14 01:55:11 +01003273 /*
3274 * queue up the release of the unmap to save the 1/6th of the
3275 * cpu used up by the iotlb flush operation...
3276 */
3277 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003278}
3279
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003280static int intel_nontranslate_map_sg(struct device *hddev,
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003281 struct scatterlist *sglist, int nelems, int dir)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003282{
3283 int i;
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003284 struct scatterlist *sg;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003285
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003286 for_each_sg(sglist, sg, nelems, i) {
FUJITA Tomonori12d4d402007-10-23 09:32:25 +02003287 BUG_ON(!sg_page(sg));
David Woodhouse4cf2e752009-02-11 17:23:43 +00003288 sg->dma_address = page_to_phys(sg_page(sg)) + sg->offset;
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003289 sg->dma_length = sg->length;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003290 }
3291 return nelems;
3292}
3293
David Woodhouse5040a912014-03-09 16:14:00 -07003294static int intel_map_sg(struct device *dev, struct scatterlist *sglist, int nelems,
FUJITA Tomonorid7ab5c42009-01-28 21:53:18 +09003295 enum dma_data_direction dir, struct dma_attrs *attrs)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003296{
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003297 int i;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003298 struct dmar_domain *domain;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003299 size_t size = 0;
3300 int prot = 0;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003301 struct iova *iova = NULL;
3302 int ret;
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003303 struct scatterlist *sg;
David Woodhouseb536d242009-06-28 14:49:31 +01003304 unsigned long start_vpfn;
Weidong Han8c11e792008-12-08 15:29:22 +08003305 struct intel_iommu *iommu;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003306
3307 BUG_ON(dir == DMA_NONE);
David Woodhouse5040a912014-03-09 16:14:00 -07003308 if (iommu_no_mapping(dev))
3309 return intel_nontranslate_map_sg(dev, sglist, nelems, dir);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003310
David Woodhouse5040a912014-03-09 16:14:00 -07003311 domain = get_valid_domain_for_dev(dev);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003312 if (!domain)
3313 return 0;
3314
Weidong Han8c11e792008-12-08 15:29:22 +08003315 iommu = domain_get_iommu(domain);
3316
David Woodhouseb536d242009-06-28 14:49:31 +01003317 for_each_sg(sglist, sg, nelems, i)
David Woodhouse88cb6a72009-06-28 15:03:06 +01003318 size += aligned_nrpages(sg->offset, sg->length);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003319
David Woodhouse5040a912014-03-09 16:14:00 -07003320 iova = intel_alloc_iova(dev, domain, dma_to_mm_pfn(size),
3321 *dev->dma_mask);
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003322 if (!iova) {
FUJITA Tomonoric03ab372007-10-21 16:42:00 -07003323 sglist->dma_length = 0;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003324 return 0;
3325 }
3326
3327 /*
3328 * Check if DMAR supports zero-length reads on write only
3329 * mappings..
3330 */
3331 if (dir == DMA_TO_DEVICE || dir == DMA_BIDIRECTIONAL || \
Weidong Han8c11e792008-12-08 15:29:22 +08003332 !cap_zlr(iommu->cap))
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003333 prot |= DMA_PTE_READ;
3334 if (dir == DMA_FROM_DEVICE || dir == DMA_BIDIRECTIONAL)
3335 prot |= DMA_PTE_WRITE;
3336
David Woodhouseb536d242009-06-28 14:49:31 +01003337 start_vpfn = mm_to_dma_pfn(iova->pfn_lo);
David Woodhousee1605492009-06-29 11:17:38 +01003338
Fenghua Yuf5329592009-08-04 15:09:37 -07003339 ret = domain_sg_mapping(domain, start_vpfn, sglist, size, prot);
David Woodhousee1605492009-06-29 11:17:38 +01003340 if (unlikely(ret)) {
3341 /* clear the page */
3342 dma_pte_clear_range(domain, start_vpfn,
3343 start_vpfn + size - 1);
3344 /* free page tables */
3345 dma_pte_free_pagetable(domain, start_vpfn,
3346 start_vpfn + size - 1);
3347 /* free iova */
3348 __free_iova(&domain->iovad, iova);
3349 return 0;
Keshavamurthy, Anil Sf76aec72007-10-21 16:41:58 -07003350 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003351
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003352 /* it's a non-present to present mapping. Only flush if caching mode */
3353 if (cap_caching_mode(iommu->cap))
David Woodhouseea8ea462014-03-05 17:09:32 +00003354 iommu_flush_iotlb_psi(iommu, domain->id, start_vpfn, size, 0, 1);
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003355 else
Weidong Han8c11e792008-12-08 15:29:22 +08003356 iommu_flush_write_buffer(iommu);
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003357
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003358 return nelems;
3359}
3360
FUJITA Tomonoridfb805e2009-01-28 21:53:17 +09003361static int intel_mapping_error(struct device *dev, dma_addr_t dma_addr)
3362{
3363 return !dma_addr;
3364}
3365
FUJITA Tomonori160c1d82009-01-05 23:59:02 +09003366struct dma_map_ops intel_dma_ops = {
Andrzej Pietrasiewiczbaa676f2012-03-27 14:28:18 +02003367 .alloc = intel_alloc_coherent,
3368 .free = intel_free_coherent,
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003369 .map_sg = intel_map_sg,
3370 .unmap_sg = intel_unmap_sg,
FUJITA Tomonoriffbbef52009-01-05 23:47:26 +09003371 .map_page = intel_map_page,
3372 .unmap_page = intel_unmap_page,
FUJITA Tomonoridfb805e2009-01-28 21:53:17 +09003373 .mapping_error = intel_mapping_error,
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003374};
3375
3376static inline int iommu_domain_cache_init(void)
3377{
3378 int ret = 0;
3379
3380 iommu_domain_cache = kmem_cache_create("iommu_domain",
3381 sizeof(struct dmar_domain),
3382 0,
3383 SLAB_HWCACHE_ALIGN,
3384
3385 NULL);
3386 if (!iommu_domain_cache) {
3387 printk(KERN_ERR "Couldn't create iommu_domain cache\n");
3388 ret = -ENOMEM;
3389 }
3390
3391 return ret;
3392}
3393
3394static inline int iommu_devinfo_cache_init(void)
3395{
3396 int ret = 0;
3397
3398 iommu_devinfo_cache = kmem_cache_create("iommu_devinfo",
3399 sizeof(struct device_domain_info),
3400 0,
3401 SLAB_HWCACHE_ALIGN,
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003402 NULL);
3403 if (!iommu_devinfo_cache) {
3404 printk(KERN_ERR "Couldn't create devinfo cache\n");
3405 ret = -ENOMEM;
3406 }
3407
3408 return ret;
3409}
3410
3411static inline int iommu_iova_cache_init(void)
3412{
3413 int ret = 0;
3414
3415 iommu_iova_cache = kmem_cache_create("iommu_iova",
3416 sizeof(struct iova),
3417 0,
3418 SLAB_HWCACHE_ALIGN,
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003419 NULL);
3420 if (!iommu_iova_cache) {
3421 printk(KERN_ERR "Couldn't create iova cache\n");
3422 ret = -ENOMEM;
3423 }
3424
3425 return ret;
3426}
3427
3428static int __init iommu_init_mempool(void)
3429{
3430 int ret;
3431 ret = iommu_iova_cache_init();
3432 if (ret)
3433 return ret;
3434
3435 ret = iommu_domain_cache_init();
3436 if (ret)
3437 goto domain_error;
3438
3439 ret = iommu_devinfo_cache_init();
3440 if (!ret)
3441 return ret;
3442
3443 kmem_cache_destroy(iommu_domain_cache);
3444domain_error:
3445 kmem_cache_destroy(iommu_iova_cache);
3446
3447 return -ENOMEM;
3448}
3449
3450static void __init iommu_exit_mempool(void)
3451{
3452 kmem_cache_destroy(iommu_devinfo_cache);
3453 kmem_cache_destroy(iommu_domain_cache);
3454 kmem_cache_destroy(iommu_iova_cache);
3455
3456}
3457
Dan Williams556ab452010-07-23 15:47:56 -07003458static void quirk_ioat_snb_local_iommu(struct pci_dev *pdev)
3459{
3460 struct dmar_drhd_unit *drhd;
3461 u32 vtbar;
3462 int rc;
3463
3464 /* We know that this device on this chipset has its own IOMMU.
3465 * If we find it under a different IOMMU, then the BIOS is lying
3466 * to us. Hope that the IOMMU for this device is actually
3467 * disabled, and it needs no translation...
3468 */
3469 rc = pci_bus_read_config_dword(pdev->bus, PCI_DEVFN(0, 0), 0xb0, &vtbar);
3470 if (rc) {
3471 /* "can't" happen */
3472 dev_info(&pdev->dev, "failed to run vt-d quirk\n");
3473 return;
3474 }
3475 vtbar &= 0xffff0000;
3476
3477 /* we know that the this iommu should be at offset 0xa000 from vtbar */
3478 drhd = dmar_find_matched_drhd_unit(pdev);
3479 if (WARN_TAINT_ONCE(!drhd || drhd->reg_base_addr - vtbar != 0xa000,
3480 TAINT_FIRMWARE_WORKAROUND,
3481 "BIOS assigned incorrect VT-d unit for Intel(R) QuickData Technology device\n"))
3482 pdev->dev.archdata.iommu = DUMMY_DEVICE_DOMAIN_INFO;
3483}
3484DECLARE_PCI_FIXUP_ENABLE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_INTEL_IOAT_SNB, quirk_ioat_snb_local_iommu);
3485
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003486static void __init init_no_remapping_devices(void)
3487{
3488 struct dmar_drhd_unit *drhd;
David Woodhouse832bd852014-03-07 15:08:36 +00003489 struct device *dev;
Jiang Liub683b232014-02-19 14:07:32 +08003490 int i;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003491
3492 for_each_drhd_unit(drhd) {
3493 if (!drhd->include_all) {
Jiang Liub683b232014-02-19 14:07:32 +08003494 for_each_active_dev_scope(drhd->devices,
3495 drhd->devices_cnt, i, dev)
3496 break;
David Woodhouse832bd852014-03-07 15:08:36 +00003497 /* ignore DMAR unit if no devices exist */
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003498 if (i == drhd->devices_cnt)
3499 drhd->ignored = 1;
3500 }
3501 }
3502
Jiang Liu7c919772014-01-06 14:18:18 +08003503 for_each_active_drhd_unit(drhd) {
Jiang Liu7c919772014-01-06 14:18:18 +08003504 if (drhd->include_all)
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003505 continue;
3506
Jiang Liub683b232014-02-19 14:07:32 +08003507 for_each_active_dev_scope(drhd->devices,
3508 drhd->devices_cnt, i, dev)
David Woodhouse832bd852014-03-07 15:08:36 +00003509 if (!dev_is_pci(dev) || !IS_GFX_DEVICE(to_pci_dev(dev)))
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003510 break;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003511 if (i < drhd->devices_cnt)
3512 continue;
3513
David Woodhousec0771df2011-10-14 20:59:46 +01003514 /* This IOMMU has *only* gfx devices. Either bypass it or
3515 set the gfx_mapped flag, as appropriate */
3516 if (dmar_map_gfx) {
3517 intel_iommu_gfx_mapped = 1;
3518 } else {
3519 drhd->ignored = 1;
Jiang Liub683b232014-02-19 14:07:32 +08003520 for_each_active_dev_scope(drhd->devices,
3521 drhd->devices_cnt, i, dev)
David Woodhouse832bd852014-03-07 15:08:36 +00003522 dev->archdata.iommu = DUMMY_DEVICE_DOMAIN_INFO;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003523 }
3524 }
3525}
3526
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003527#ifdef CONFIG_SUSPEND
3528static int init_iommu_hw(void)
3529{
3530 struct dmar_drhd_unit *drhd;
3531 struct intel_iommu *iommu = NULL;
3532
3533 for_each_active_iommu(iommu, drhd)
3534 if (iommu->qi)
3535 dmar_reenable_qi(iommu);
3536
Joseph Cihulab7792602011-05-03 00:08:37 -07003537 for_each_iommu(iommu, drhd) {
3538 if (drhd->ignored) {
3539 /*
3540 * we always have to disable PMRs or DMA may fail on
3541 * this device
3542 */
3543 if (force_on)
3544 iommu_disable_protect_mem_regions(iommu);
3545 continue;
3546 }
3547
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003548 iommu_flush_write_buffer(iommu);
3549
3550 iommu_set_root_entry(iommu);
3551
3552 iommu->flush.flush_context(iommu, 0, 0, 0,
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003553 DMA_CCMD_GLOBAL_INVL);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003554 iommu->flush.flush_iotlb(iommu, 0, 0, 0,
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003555 DMA_TLB_GLOBAL_FLUSH);
Joseph Cihulab7792602011-05-03 00:08:37 -07003556 if (iommu_enable_translation(iommu))
3557 return 1;
David Woodhouseb94996c2009-09-19 15:28:12 -07003558 iommu_disable_protect_mem_regions(iommu);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003559 }
3560
3561 return 0;
3562}
3563
3564static void iommu_flush_all(void)
3565{
3566 struct dmar_drhd_unit *drhd;
3567 struct intel_iommu *iommu;
3568
3569 for_each_active_iommu(iommu, drhd) {
3570 iommu->flush.flush_context(iommu, 0, 0, 0,
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003571 DMA_CCMD_GLOBAL_INVL);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003572 iommu->flush.flush_iotlb(iommu, 0, 0, 0,
David Woodhouse1f0ef2a2009-05-10 19:58:49 +01003573 DMA_TLB_GLOBAL_FLUSH);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003574 }
3575}
3576
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01003577static int iommu_suspend(void)
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003578{
3579 struct dmar_drhd_unit *drhd;
3580 struct intel_iommu *iommu = NULL;
3581 unsigned long flag;
3582
3583 for_each_active_iommu(iommu, drhd) {
3584 iommu->iommu_state = kzalloc(sizeof(u32) * MAX_SR_DMAR_REGS,
3585 GFP_ATOMIC);
3586 if (!iommu->iommu_state)
3587 goto nomem;
3588 }
3589
3590 iommu_flush_all();
3591
3592 for_each_active_iommu(iommu, drhd) {
3593 iommu_disable_translation(iommu);
3594
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02003595 raw_spin_lock_irqsave(&iommu->register_lock, flag);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003596
3597 iommu->iommu_state[SR_DMAR_FECTL_REG] =
3598 readl(iommu->reg + DMAR_FECTL_REG);
3599 iommu->iommu_state[SR_DMAR_FEDATA_REG] =
3600 readl(iommu->reg + DMAR_FEDATA_REG);
3601 iommu->iommu_state[SR_DMAR_FEADDR_REG] =
3602 readl(iommu->reg + DMAR_FEADDR_REG);
3603 iommu->iommu_state[SR_DMAR_FEUADDR_REG] =
3604 readl(iommu->reg + DMAR_FEUADDR_REG);
3605
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02003606 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003607 }
3608 return 0;
3609
3610nomem:
3611 for_each_active_iommu(iommu, drhd)
3612 kfree(iommu->iommu_state);
3613
3614 return -ENOMEM;
3615}
3616
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01003617static void iommu_resume(void)
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003618{
3619 struct dmar_drhd_unit *drhd;
3620 struct intel_iommu *iommu = NULL;
3621 unsigned long flag;
3622
3623 if (init_iommu_hw()) {
Joseph Cihulab7792602011-05-03 00:08:37 -07003624 if (force_on)
3625 panic("tboot: IOMMU setup failed, DMAR can not resume!\n");
3626 else
3627 WARN(1, "IOMMU setup failed, DMAR can not resume!\n");
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01003628 return;
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003629 }
3630
3631 for_each_active_iommu(iommu, drhd) {
3632
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02003633 raw_spin_lock_irqsave(&iommu->register_lock, flag);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003634
3635 writel(iommu->iommu_state[SR_DMAR_FECTL_REG],
3636 iommu->reg + DMAR_FECTL_REG);
3637 writel(iommu->iommu_state[SR_DMAR_FEDATA_REG],
3638 iommu->reg + DMAR_FEDATA_REG);
3639 writel(iommu->iommu_state[SR_DMAR_FEADDR_REG],
3640 iommu->reg + DMAR_FEADDR_REG);
3641 writel(iommu->iommu_state[SR_DMAR_FEUADDR_REG],
3642 iommu->reg + DMAR_FEUADDR_REG);
3643
Thomas Gleixner1f5b3c32011-07-19 16:19:51 +02003644 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003645 }
3646
3647 for_each_active_iommu(iommu, drhd)
3648 kfree(iommu->iommu_state);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003649}
3650
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01003651static struct syscore_ops iommu_syscore_ops = {
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003652 .resume = iommu_resume,
3653 .suspend = iommu_suspend,
3654};
3655
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01003656static void __init init_iommu_pm_ops(void)
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003657{
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01003658 register_syscore_ops(&iommu_syscore_ops);
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003659}
3660
3661#else
Rafael J. Wysocki99592ba2011-06-07 21:32:31 +02003662static inline void init_iommu_pm_ops(void) {}
Fenghua Yuf59c7b62009-03-27 14:22:42 -07003663#endif /* CONFIG_PM */
3664
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003665
3666int __init dmar_parse_one_rmrr(struct acpi_dmar_header *header)
3667{
3668 struct acpi_dmar_reserved_memory *rmrr;
3669 struct dmar_rmrr_unit *rmrru;
3670
3671 rmrru = kzalloc(sizeof(*rmrru), GFP_KERNEL);
3672 if (!rmrru)
3673 return -ENOMEM;
3674
3675 rmrru->hdr = header;
3676 rmrr = (struct acpi_dmar_reserved_memory *)header;
3677 rmrru->base_address = rmrr->base_address;
3678 rmrru->end_address = rmrr->end_address;
Jiang Liu2e455282014-02-19 14:07:36 +08003679 rmrru->devices = dmar_alloc_dev_scope((void *)(rmrr + 1),
3680 ((void *)rmrr) + rmrr->header.length,
3681 &rmrru->devices_cnt);
3682 if (rmrru->devices_cnt && rmrru->devices == NULL) {
3683 kfree(rmrru);
3684 return -ENOMEM;
3685 }
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003686
Jiang Liu2e455282014-02-19 14:07:36 +08003687 list_add(&rmrru->list, &dmar_rmrr_units);
3688
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003689 return 0;
3690}
3691
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003692int __init dmar_parse_one_atsr(struct acpi_dmar_header *hdr)
3693{
3694 struct acpi_dmar_atsr *atsr;
3695 struct dmar_atsr_unit *atsru;
3696
3697 atsr = container_of(hdr, struct acpi_dmar_atsr, header);
3698 atsru = kzalloc(sizeof(*atsru), GFP_KERNEL);
3699 if (!atsru)
3700 return -ENOMEM;
3701
3702 atsru->hdr = hdr;
3703 atsru->include_all = atsr->flags & 0x1;
Jiang Liu2e455282014-02-19 14:07:36 +08003704 if (!atsru->include_all) {
3705 atsru->devices = dmar_alloc_dev_scope((void *)(atsr + 1),
3706 (void *)atsr + atsr->header.length,
3707 &atsru->devices_cnt);
3708 if (atsru->devices_cnt && atsru->devices == NULL) {
3709 kfree(atsru);
3710 return -ENOMEM;
3711 }
3712 }
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003713
Jiang Liu0e242612014-02-19 14:07:34 +08003714 list_add_rcu(&atsru->list, &dmar_atsr_units);
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003715
3716 return 0;
3717}
3718
Jiang Liu9bdc5312014-01-06 14:18:27 +08003719static void intel_iommu_free_atsr(struct dmar_atsr_unit *atsru)
3720{
3721 dmar_free_dev_scope(&atsru->devices, &atsru->devices_cnt);
3722 kfree(atsru);
3723}
3724
3725static void intel_iommu_free_dmars(void)
3726{
3727 struct dmar_rmrr_unit *rmrru, *rmrr_n;
3728 struct dmar_atsr_unit *atsru, *atsr_n;
3729
3730 list_for_each_entry_safe(rmrru, rmrr_n, &dmar_rmrr_units, list) {
3731 list_del(&rmrru->list);
3732 dmar_free_dev_scope(&rmrru->devices, &rmrru->devices_cnt);
3733 kfree(rmrru);
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003734 }
3735
Jiang Liu9bdc5312014-01-06 14:18:27 +08003736 list_for_each_entry_safe(atsru, atsr_n, &dmar_atsr_units, list) {
3737 list_del(&atsru->list);
3738 intel_iommu_free_atsr(atsru);
3739 }
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003740}
3741
3742int dmar_find_matched_atsr_unit(struct pci_dev *dev)
3743{
Jiang Liub683b232014-02-19 14:07:32 +08003744 int i, ret = 1;
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003745 struct pci_bus *bus;
David Woodhouse832bd852014-03-07 15:08:36 +00003746 struct pci_dev *bridge = NULL;
3747 struct device *tmp;
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003748 struct acpi_dmar_atsr *atsr;
3749 struct dmar_atsr_unit *atsru;
3750
3751 dev = pci_physfn(dev);
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003752 for (bus = dev->bus; bus; bus = bus->parent) {
Jiang Liub5f82dd2014-02-19 14:07:31 +08003753 bridge = bus->self;
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003754 if (!bridge || !pci_is_pcie(bridge) ||
Yijing Wang62f87c02012-07-24 17:20:03 +08003755 pci_pcie_type(bridge) == PCI_EXP_TYPE_PCI_BRIDGE)
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003756 return 0;
Jiang Liub5f82dd2014-02-19 14:07:31 +08003757 if (pci_pcie_type(bridge) == PCI_EXP_TYPE_ROOT_PORT)
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003758 break;
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003759 }
Jiang Liub5f82dd2014-02-19 14:07:31 +08003760 if (!bridge)
3761 return 0;
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003762
Jiang Liu0e242612014-02-19 14:07:34 +08003763 rcu_read_lock();
Jiang Liub5f82dd2014-02-19 14:07:31 +08003764 list_for_each_entry_rcu(atsru, &dmar_atsr_units, list) {
3765 atsr = container_of(atsru->hdr, struct acpi_dmar_atsr, header);
3766 if (atsr->segment != pci_domain_nr(dev->bus))
3767 continue;
3768
Jiang Liub683b232014-02-19 14:07:32 +08003769 for_each_dev_scope(atsru->devices, atsru->devices_cnt, i, tmp)
David Woodhouse832bd852014-03-07 15:08:36 +00003770 if (tmp == &bridge->dev)
Jiang Liub683b232014-02-19 14:07:32 +08003771 goto out;
Jiang Liub5f82dd2014-02-19 14:07:31 +08003772
3773 if (atsru->include_all)
Jiang Liub683b232014-02-19 14:07:32 +08003774 goto out;
Jiang Liub5f82dd2014-02-19 14:07:31 +08003775 }
Jiang Liub683b232014-02-19 14:07:32 +08003776 ret = 0;
3777out:
Jiang Liu0e242612014-02-19 14:07:34 +08003778 rcu_read_unlock();
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003779
Jiang Liub683b232014-02-19 14:07:32 +08003780 return ret;
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003781}
3782
Jiang Liu59ce0512014-02-19 14:07:35 +08003783int dmar_iommu_notify_scope_dev(struct dmar_pci_notify_info *info)
3784{
3785 int ret = 0;
3786 struct dmar_rmrr_unit *rmrru;
3787 struct dmar_atsr_unit *atsru;
3788 struct acpi_dmar_atsr *atsr;
3789 struct acpi_dmar_reserved_memory *rmrr;
3790
3791 if (!intel_iommu_enabled && system_state != SYSTEM_BOOTING)
3792 return 0;
3793
3794 list_for_each_entry(rmrru, &dmar_rmrr_units, list) {
3795 rmrr = container_of(rmrru->hdr,
3796 struct acpi_dmar_reserved_memory, header);
3797 if (info->event == BUS_NOTIFY_ADD_DEVICE) {
3798 ret = dmar_insert_dev_scope(info, (void *)(rmrr + 1),
3799 ((void *)rmrr) + rmrr->header.length,
3800 rmrr->segment, rmrru->devices,
3801 rmrru->devices_cnt);
3802 if (ret > 0)
3803 break;
3804 else if(ret < 0)
3805 return ret;
3806 } else if (info->event == BUS_NOTIFY_DEL_DEVICE) {
3807 if (dmar_remove_dev_scope(info, rmrr->segment,
3808 rmrru->devices, rmrru->devices_cnt))
3809 break;
3810 }
3811 }
3812
3813 list_for_each_entry(atsru, &dmar_atsr_units, list) {
3814 if (atsru->include_all)
3815 continue;
3816
3817 atsr = container_of(atsru->hdr, struct acpi_dmar_atsr, header);
3818 if (info->event == BUS_NOTIFY_ADD_DEVICE) {
3819 ret = dmar_insert_dev_scope(info, (void *)(atsr + 1),
3820 (void *)atsr + atsr->header.length,
3821 atsr->segment, atsru->devices,
3822 atsru->devices_cnt);
3823 if (ret > 0)
3824 break;
3825 else if(ret < 0)
3826 return ret;
3827 } else if (info->event == BUS_NOTIFY_DEL_DEVICE) {
3828 if (dmar_remove_dev_scope(info, atsr->segment,
3829 atsru->devices, atsru->devices_cnt))
3830 break;
3831 }
3832 }
3833
3834 return 0;
3835}
3836
Fenghua Yu99dcade2009-11-11 07:23:06 -08003837/*
3838 * Here we only respond to action of unbound device from driver.
3839 *
3840 * Added device is not attached to its DMAR domain here yet. That will happen
3841 * when mapping the device to iova.
3842 */
3843static int device_notifier(struct notifier_block *nb,
3844 unsigned long action, void *data)
3845{
3846 struct device *dev = data;
Fenghua Yu99dcade2009-11-11 07:23:06 -08003847 struct dmar_domain *domain;
3848
David Woodhouse3d891942014-03-06 15:59:26 +00003849 if (iommu_dummy(dev))
David Woodhouse44cd6132009-12-02 10:18:30 +00003850 return 0;
3851
Jiang Liu7e7dfab2014-02-19 14:07:23 +08003852 if (action != BUS_NOTIFY_UNBOUND_DRIVER &&
3853 action != BUS_NOTIFY_DEL_DEVICE)
3854 return 0;
3855
David Woodhouse1525a292014-03-06 16:19:30 +00003856 domain = find_domain(dev);
Fenghua Yu99dcade2009-11-11 07:23:06 -08003857 if (!domain)
3858 return 0;
3859
Jiang Liu3a5670e2014-02-19 14:07:33 +08003860 down_read(&dmar_global_lock);
David Woodhousebf9c9ed2014-03-09 16:19:13 -07003861 domain_remove_one_dev_info(domain, dev);
Jiang Liu7e7dfab2014-02-19 14:07:23 +08003862 if (!(domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE) &&
3863 !(domain->flags & DOMAIN_FLAG_STATIC_IDENTITY) &&
3864 list_empty(&domain->devices))
3865 domain_exit(domain);
Jiang Liu3a5670e2014-02-19 14:07:33 +08003866 up_read(&dmar_global_lock);
Alex Williamsona97590e2011-03-04 14:52:16 -07003867
Fenghua Yu99dcade2009-11-11 07:23:06 -08003868 return 0;
3869}
3870
3871static struct notifier_block device_nb = {
3872 .notifier_call = device_notifier,
3873};
3874
Jiang Liu75f05562014-02-19 14:07:37 +08003875static int intel_iommu_memory_notifier(struct notifier_block *nb,
3876 unsigned long val, void *v)
3877{
3878 struct memory_notify *mhp = v;
3879 unsigned long long start, end;
3880 unsigned long start_vpfn, last_vpfn;
3881
3882 switch (val) {
3883 case MEM_GOING_ONLINE:
3884 start = mhp->start_pfn << PAGE_SHIFT;
3885 end = ((mhp->start_pfn + mhp->nr_pages) << PAGE_SHIFT) - 1;
3886 if (iommu_domain_identity_map(si_domain, start, end)) {
3887 pr_warn("dmar: failed to build identity map for [%llx-%llx]\n",
3888 start, end);
3889 return NOTIFY_BAD;
3890 }
3891 break;
3892
3893 case MEM_OFFLINE:
3894 case MEM_CANCEL_ONLINE:
3895 start_vpfn = mm_to_dma_pfn(mhp->start_pfn);
3896 last_vpfn = mm_to_dma_pfn(mhp->start_pfn + mhp->nr_pages - 1);
3897 while (start_vpfn <= last_vpfn) {
3898 struct iova *iova;
3899 struct dmar_drhd_unit *drhd;
3900 struct intel_iommu *iommu;
David Woodhouseea8ea462014-03-05 17:09:32 +00003901 struct page *freelist;
Jiang Liu75f05562014-02-19 14:07:37 +08003902
3903 iova = find_iova(&si_domain->iovad, start_vpfn);
3904 if (iova == NULL) {
3905 pr_debug("dmar: failed get IOVA for PFN %lx\n",
3906 start_vpfn);
3907 break;
3908 }
3909
3910 iova = split_and_remove_iova(&si_domain->iovad, iova,
3911 start_vpfn, last_vpfn);
3912 if (iova == NULL) {
3913 pr_warn("dmar: failed to split IOVA PFN [%lx-%lx]\n",
3914 start_vpfn, last_vpfn);
3915 return NOTIFY_BAD;
3916 }
3917
David Woodhouseea8ea462014-03-05 17:09:32 +00003918 freelist = domain_unmap(si_domain, iova->pfn_lo,
3919 iova->pfn_hi);
3920
Jiang Liu75f05562014-02-19 14:07:37 +08003921 rcu_read_lock();
3922 for_each_active_iommu(iommu, drhd)
3923 iommu_flush_iotlb_psi(iommu, si_domain->id,
3924 iova->pfn_lo,
David Woodhouseea8ea462014-03-05 17:09:32 +00003925 iova->pfn_hi - iova->pfn_lo + 1,
3926 !freelist, 0);
Jiang Liu75f05562014-02-19 14:07:37 +08003927 rcu_read_unlock();
David Woodhouseea8ea462014-03-05 17:09:32 +00003928 dma_free_pagelist(freelist);
Jiang Liu75f05562014-02-19 14:07:37 +08003929
3930 start_vpfn = iova->pfn_hi + 1;
3931 free_iova_mem(iova);
3932 }
3933 break;
3934 }
3935
3936 return NOTIFY_OK;
3937}
3938
3939static struct notifier_block intel_iommu_memory_nb = {
3940 .notifier_call = intel_iommu_memory_notifier,
3941 .priority = 0
3942};
3943
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003944int __init intel_iommu_init(void)
3945{
Jiang Liu9bdc5312014-01-06 14:18:27 +08003946 int ret = -ENODEV;
Takao Indoh3a93c842013-04-23 17:35:03 +09003947 struct dmar_drhd_unit *drhd;
Jiang Liu7c919772014-01-06 14:18:18 +08003948 struct intel_iommu *iommu;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003949
Joseph Cihulaa59b50e2009-06-30 19:31:10 -07003950 /* VT-d is required for a TXT/tboot launch, so enforce that */
3951 force_on = tboot_force_iommu();
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003952
Jiang Liu3a5670e2014-02-19 14:07:33 +08003953 if (iommu_init_mempool()) {
3954 if (force_on)
3955 panic("tboot: Failed to initialize iommu memory\n");
3956 return -ENOMEM;
3957 }
3958
3959 down_write(&dmar_global_lock);
Joseph Cihulaa59b50e2009-06-30 19:31:10 -07003960 if (dmar_table_init()) {
3961 if (force_on)
3962 panic("tboot: Failed to initialize DMAR table\n");
Jiang Liu9bdc5312014-01-06 14:18:27 +08003963 goto out_free_dmar;
Joseph Cihulaa59b50e2009-06-30 19:31:10 -07003964 }
3965
Takao Indoh3a93c842013-04-23 17:35:03 +09003966 /*
3967 * Disable translation if already enabled prior to OS handover.
3968 */
Jiang Liu7c919772014-01-06 14:18:18 +08003969 for_each_active_iommu(iommu, drhd)
Takao Indoh3a93c842013-04-23 17:35:03 +09003970 if (iommu->gcmd & DMA_GCMD_TE)
3971 iommu_disable_translation(iommu);
Takao Indoh3a93c842013-04-23 17:35:03 +09003972
Suresh Siddhac2c72862011-08-23 17:05:19 -07003973 if (dmar_dev_scope_init() < 0) {
Joseph Cihulaa59b50e2009-06-30 19:31:10 -07003974 if (force_on)
3975 panic("tboot: Failed to initialize DMAR device scope\n");
Jiang Liu9bdc5312014-01-06 14:18:27 +08003976 goto out_free_dmar;
Joseph Cihulaa59b50e2009-06-30 19:31:10 -07003977 }
Suresh Siddha1886e8a2008-07-10 11:16:37 -07003978
FUJITA Tomonori75f1cdf2009-11-10 19:46:20 +09003979 if (no_iommu || dmar_disabled)
Jiang Liu9bdc5312014-01-06 14:18:27 +08003980 goto out_free_dmar;
Suresh Siddha2ae21012008-07-10 11:16:43 -07003981
Suresh Siddha318fe7d2011-08-23 17:05:20 -07003982 if (list_empty(&dmar_rmrr_units))
3983 printk(KERN_INFO "DMAR: No RMRR found\n");
3984
3985 if (list_empty(&dmar_atsr_units))
3986 printk(KERN_INFO "DMAR: No ATSR found\n");
3987
Joseph Cihula51a63e62011-03-21 11:04:24 -07003988 if (dmar_init_reserved_ranges()) {
3989 if (force_on)
3990 panic("tboot: Failed to reserve iommu ranges\n");
Jiang Liu3a5670e2014-02-19 14:07:33 +08003991 goto out_free_reserved_range;
Joseph Cihula51a63e62011-03-21 11:04:24 -07003992 }
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003993
3994 init_no_remapping_devices();
3995
Joseph Cihulab7792602011-05-03 00:08:37 -07003996 ret = init_dmars();
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07003997 if (ret) {
Joseph Cihulaa59b50e2009-06-30 19:31:10 -07003998 if (force_on)
3999 panic("tboot: Failed to initialize DMARs\n");
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07004000 printk(KERN_ERR "IOMMU: dmar init failed\n");
Jiang Liu9bdc5312014-01-06 14:18:27 +08004001 goto out_free_reserved_range;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07004002 }
Jiang Liu3a5670e2014-02-19 14:07:33 +08004003 up_write(&dmar_global_lock);
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07004004 printk(KERN_INFO
4005 "PCI-DMA: Intel(R) Virtualization Technology for Directed I/O\n");
4006
mark gross5e0d2a62008-03-04 15:22:08 -08004007 init_timer(&unmap_timer);
FUJITA Tomonori75f1cdf2009-11-10 19:46:20 +09004008#ifdef CONFIG_SWIOTLB
4009 swiotlb = 0;
4010#endif
David Woodhouse19943b02009-08-04 16:19:20 +01004011 dma_ops = &intel_dma_ops;
Fenghua Yu4ed0d3e2009-04-24 17:30:20 -07004012
Rafael J. Wysocki134fac32011-03-23 22:16:14 +01004013 init_iommu_pm_ops();
Joerg Roedela8bcbb0d2008-12-03 15:14:02 +01004014
Joerg Roedel4236d97d2011-09-06 17:56:07 +02004015 bus_set_iommu(&pci_bus_type, &intel_iommu_ops);
Fenghua Yu99dcade2009-11-11 07:23:06 -08004016 bus_register_notifier(&pci_bus_type, &device_nb);
Jiang Liu75f05562014-02-19 14:07:37 +08004017 if (si_domain && !hw_pass_through)
4018 register_memory_notifier(&intel_iommu_memory_nb);
Fenghua Yu99dcade2009-11-11 07:23:06 -08004019
Eugeni Dodonov8bc1f852011-11-23 16:42:14 -02004020 intel_iommu_enabled = 1;
4021
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07004022 return 0;
Jiang Liu9bdc5312014-01-06 14:18:27 +08004023
4024out_free_reserved_range:
4025 put_iova_domain(&reserved_iova_list);
Jiang Liu9bdc5312014-01-06 14:18:27 +08004026out_free_dmar:
4027 intel_iommu_free_dmars();
Jiang Liu3a5670e2014-02-19 14:07:33 +08004028 up_write(&dmar_global_lock);
4029 iommu_exit_mempool();
Jiang Liu9bdc5312014-01-06 14:18:27 +08004030 return ret;
Keshavamurthy, Anil Sba395922007-10-21 16:41:49 -07004031}
Keshavamurthy, Anil Se8204822007-10-21 16:41:55 -07004032
Han, Weidong3199aa62009-02-26 17:31:12 +08004033static void iommu_detach_dependent_devices(struct intel_iommu *iommu,
David Woodhouse0bcb3e22014-03-06 17:12:03 +00004034 struct device *dev)
Han, Weidong3199aa62009-02-26 17:31:12 +08004035{
David Woodhouse0bcb3e22014-03-06 17:12:03 +00004036 struct pci_dev *tmp, *parent, *pdev;
Han, Weidong3199aa62009-02-26 17:31:12 +08004037
David Woodhouse0bcb3e22014-03-06 17:12:03 +00004038 if (!iommu || !dev || !dev_is_pci(dev))
Han, Weidong3199aa62009-02-26 17:31:12 +08004039 return;
4040
David Woodhouse0bcb3e22014-03-06 17:12:03 +00004041 pdev = to_pci_dev(dev);
4042
Han, Weidong3199aa62009-02-26 17:31:12 +08004043 /* dependent device detach */
4044 tmp = pci_find_upstream_pcie_bridge(pdev);
4045 /* Secondary interface's bus number and devfn 0 */
4046 if (tmp) {
4047 parent = pdev->bus->self;
4048 while (parent != tmp) {
4049 iommu_detach_dev(iommu, parent->bus->number,
David Woodhouse276dbf992009-04-04 01:45:37 +01004050 parent->devfn);
Han, Weidong3199aa62009-02-26 17:31:12 +08004051 parent = parent->bus->self;
4052 }
Stefan Assmann45e829e2009-12-03 06:49:24 -05004053 if (pci_is_pcie(tmp)) /* this is a PCIe-to-PCI bridge */
Han, Weidong3199aa62009-02-26 17:31:12 +08004054 iommu_detach_dev(iommu,
4055 tmp->subordinate->number, 0);
4056 else /* this is a legacy PCI bridge */
David Woodhouse276dbf992009-04-04 01:45:37 +01004057 iommu_detach_dev(iommu, tmp->bus->number,
4058 tmp->devfn);
Han, Weidong3199aa62009-02-26 17:31:12 +08004059 }
4060}
4061
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07004062static void domain_remove_one_dev_info(struct dmar_domain *domain,
David Woodhousebf9c9ed2014-03-09 16:19:13 -07004063 struct device *dev)
Weidong Hanc7151a82008-12-08 22:51:37 +08004064{
Yijing Wangbca2b912013-10-31 17:26:04 +08004065 struct device_domain_info *info, *tmp;
Weidong Hanc7151a82008-12-08 22:51:37 +08004066 struct intel_iommu *iommu;
4067 unsigned long flags;
4068 int found = 0;
David Woodhouse156baca2014-03-09 14:00:57 -07004069 u8 bus, devfn;
Weidong Hanc7151a82008-12-08 22:51:37 +08004070
David Woodhousebf9c9ed2014-03-09 16:19:13 -07004071 iommu = device_to_iommu(dev, &bus, &devfn);
Weidong Hanc7151a82008-12-08 22:51:37 +08004072 if (!iommu)
4073 return;
4074
4075 spin_lock_irqsave(&device_domain_lock, flags);
Yijing Wangbca2b912013-10-31 17:26:04 +08004076 list_for_each_entry_safe(info, tmp, &domain->devices, link) {
David Woodhousebf9c9ed2014-03-09 16:19:13 -07004077 if (info->iommu == iommu && info->bus == bus &&
4078 info->devfn == devfn) {
David Woodhouse109b9b02012-05-25 17:43:02 +01004079 unlink_domain_info(info);
Weidong Hanc7151a82008-12-08 22:51:37 +08004080 spin_unlock_irqrestore(&device_domain_lock, flags);
4081
Yu Zhao93a23a72009-05-18 13:51:37 +08004082 iommu_disable_dev_iotlb(info);
Weidong Hanc7151a82008-12-08 22:51:37 +08004083 iommu_detach_dev(iommu, info->bus, info->devfn);
David Woodhousebf9c9ed2014-03-09 16:19:13 -07004084 iommu_detach_dependent_devices(iommu, dev);
Weidong Hanc7151a82008-12-08 22:51:37 +08004085 free_devinfo_mem(info);
4086
4087 spin_lock_irqsave(&device_domain_lock, flags);
4088
4089 if (found)
4090 break;
4091 else
4092 continue;
4093 }
4094
4095 /* if there is no other devices under the same iommu
4096 * owned by this domain, clear this iommu in iommu_bmp
4097 * update iommu count and coherency
4098 */
David Woodhouse8bbc4412014-03-09 13:52:37 -07004099 if (info->iommu == iommu)
Weidong Hanc7151a82008-12-08 22:51:37 +08004100 found = 1;
4101 }
4102
Roland Dreier3e7abe22011-07-20 06:22:21 -07004103 spin_unlock_irqrestore(&device_domain_lock, flags);
4104
Weidong Hanc7151a82008-12-08 22:51:37 +08004105 if (found == 0) {
4106 unsigned long tmp_flags;
4107 spin_lock_irqsave(&domain->iommu_lock, tmp_flags);
Mike Travis1b198bb2012-03-05 15:05:16 -08004108 clear_bit(iommu->seq_id, domain->iommu_bmp);
Weidong Hanc7151a82008-12-08 22:51:37 +08004109 domain->iommu_count--;
Sheng Yang58c610b2009-03-18 15:33:05 +08004110 domain_update_iommu_cap(domain);
Weidong Hanc7151a82008-12-08 22:51:37 +08004111 spin_unlock_irqrestore(&domain->iommu_lock, tmp_flags);
Alex Williamsona97590e2011-03-04 14:52:16 -07004112
Alex Williamson9b4554b2011-05-24 12:19:04 -04004113 if (!(domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE) &&
4114 !(domain->flags & DOMAIN_FLAG_STATIC_IDENTITY)) {
4115 spin_lock_irqsave(&iommu->lock, tmp_flags);
4116 clear_bit(domain->id, iommu->domain_ids);
4117 iommu->domains[domain->id] = NULL;
4118 spin_unlock_irqrestore(&iommu->lock, tmp_flags);
4119 }
Weidong Hanc7151a82008-12-08 22:51:37 +08004120 }
Weidong Hanc7151a82008-12-08 22:51:37 +08004121}
4122
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07004123static int md_domain_init(struct dmar_domain *domain, int guest_width)
Weidong Han5e98c4b2008-12-08 23:03:27 +08004124{
4125 int adjust_width;
4126
4127 init_iova_domain(&domain->iovad, DMA_32BIT_PFN);
Weidong Han5e98c4b2008-12-08 23:03:27 +08004128 domain_reserve_special_ranges(domain);
4129
4130 /* calculate AGAW */
4131 domain->gaw = guest_width;
4132 adjust_width = guestwidth_to_adjustwidth(guest_width);
4133 domain->agaw = width_to_agaw(adjust_width);
4134
Weidong Han5e98c4b2008-12-08 23:03:27 +08004135 domain->iommu_coherency = 0;
Sheng Yangc5b15252009-08-06 13:31:56 +08004136 domain->iommu_snooping = 0;
Youquan Song6dd9a7c2011-05-25 19:13:49 +01004137 domain->iommu_superpage = 0;
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004138 domain->max_addr = 0;
Suresh Siddha4c923d42009-10-02 11:01:24 -07004139 domain->nid = -1;
Weidong Han5e98c4b2008-12-08 23:03:27 +08004140
4141 /* always allocate the top pgd */
Suresh Siddha4c923d42009-10-02 11:01:24 -07004142 domain->pgd = (struct dma_pte *)alloc_pgtable_page(domain->nid);
Weidong Han5e98c4b2008-12-08 23:03:27 +08004143 if (!domain->pgd)
4144 return -ENOMEM;
4145 domain_flush_cache(domain, domain->pgd, PAGE_SIZE);
4146 return 0;
4147}
4148
Joerg Roedel5d450802008-12-03 14:52:32 +01004149static int intel_iommu_domain_init(struct iommu_domain *domain)
Kay, Allen M38717942008-09-09 18:37:29 +03004150{
Joerg Roedel5d450802008-12-03 14:52:32 +01004151 struct dmar_domain *dmar_domain;
Kay, Allen M38717942008-09-09 18:37:29 +03004152
Jiang Liu92d03cc2014-02-19 14:07:28 +08004153 dmar_domain = alloc_domain(true);
Joerg Roedel5d450802008-12-03 14:52:32 +01004154 if (!dmar_domain) {
Kay, Allen M38717942008-09-09 18:37:29 +03004155 printk(KERN_ERR
Joerg Roedel5d450802008-12-03 14:52:32 +01004156 "intel_iommu_domain_init: dmar_domain == NULL\n");
4157 return -ENOMEM;
Kay, Allen M38717942008-09-09 18:37:29 +03004158 }
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07004159 if (md_domain_init(dmar_domain, DEFAULT_DOMAIN_ADDRESS_WIDTH)) {
Kay, Allen M38717942008-09-09 18:37:29 +03004160 printk(KERN_ERR
Joerg Roedel5d450802008-12-03 14:52:32 +01004161 "intel_iommu_domain_init() failed\n");
Jiang Liu92d03cc2014-02-19 14:07:28 +08004162 domain_exit(dmar_domain);
Joerg Roedel5d450802008-12-03 14:52:32 +01004163 return -ENOMEM;
Kay, Allen M38717942008-09-09 18:37:29 +03004164 }
Allen Kay8140a952011-10-14 12:32:17 -07004165 domain_update_iommu_cap(dmar_domain);
Joerg Roedel5d450802008-12-03 14:52:32 +01004166 domain->priv = dmar_domain;
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004167
Joerg Roedel8a0e7152012-01-26 19:40:54 +01004168 domain->geometry.aperture_start = 0;
4169 domain->geometry.aperture_end = __DOMAIN_MAX_ADDR(dmar_domain->gaw);
4170 domain->geometry.force_aperture = true;
4171
Joerg Roedel5d450802008-12-03 14:52:32 +01004172 return 0;
Kay, Allen M38717942008-09-09 18:37:29 +03004173}
Kay, Allen M38717942008-09-09 18:37:29 +03004174
Joerg Roedel5d450802008-12-03 14:52:32 +01004175static void intel_iommu_domain_destroy(struct iommu_domain *domain)
Kay, Allen M38717942008-09-09 18:37:29 +03004176{
Joerg Roedel5d450802008-12-03 14:52:32 +01004177 struct dmar_domain *dmar_domain = domain->priv;
4178
4179 domain->priv = NULL;
Jiang Liu92d03cc2014-02-19 14:07:28 +08004180 domain_exit(dmar_domain);
Kay, Allen M38717942008-09-09 18:37:29 +03004181}
Kay, Allen M38717942008-09-09 18:37:29 +03004182
Joerg Roedel4c5478c2008-12-03 14:58:24 +01004183static int intel_iommu_attach_device(struct iommu_domain *domain,
4184 struct device *dev)
Kay, Allen M38717942008-09-09 18:37:29 +03004185{
Joerg Roedel4c5478c2008-12-03 14:58:24 +01004186 struct dmar_domain *dmar_domain = domain->priv;
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004187 struct intel_iommu *iommu;
4188 int addr_width;
David Woodhouse156baca2014-03-09 14:00:57 -07004189 u8 bus, devfn;
Kay, Allen M38717942008-09-09 18:37:29 +03004190
David Woodhouse7207d8f2014-03-09 16:31:06 -07004191 /* normally dev is not mapped */
4192 if (unlikely(domain_context_mapped(dev))) {
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004193 struct dmar_domain *old_domain;
4194
David Woodhouse1525a292014-03-06 16:19:30 +00004195 old_domain = find_domain(dev);
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004196 if (old_domain) {
Fenghua Yu2c2e2c32009-06-19 13:47:29 -07004197 if (dmar_domain->flags & DOMAIN_FLAG_VIRTUAL_MACHINE ||
4198 dmar_domain->flags & DOMAIN_FLAG_STATIC_IDENTITY)
David Woodhousebf9c9ed2014-03-09 16:19:13 -07004199 domain_remove_one_dev_info(old_domain, dev);
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004200 else
4201 domain_remove_dev_info(old_domain);
4202 }
4203 }
4204
David Woodhouse156baca2014-03-09 14:00:57 -07004205 iommu = device_to_iommu(dev, &bus, &devfn);
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004206 if (!iommu)
4207 return -ENODEV;
4208
4209 /* check if this iommu agaw is sufficient for max mapped address */
4210 addr_width = agaw_to_width(iommu->agaw);
Tom Lyona99c47a2010-05-17 08:20:45 +01004211 if (addr_width > cap_mgaw(iommu->cap))
4212 addr_width = cap_mgaw(iommu->cap);
4213
4214 if (dmar_domain->max_addr > (1LL << addr_width)) {
4215 printk(KERN_ERR "%s: iommu width (%d) is not "
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004216 "sufficient for the mapped address (%llx)\n",
Tom Lyona99c47a2010-05-17 08:20:45 +01004217 __func__, addr_width, dmar_domain->max_addr);
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004218 return -EFAULT;
4219 }
Tom Lyona99c47a2010-05-17 08:20:45 +01004220 dmar_domain->gaw = addr_width;
4221
4222 /*
4223 * Knock out extra levels of page tables if necessary
4224 */
4225 while (iommu->agaw < dmar_domain->agaw) {
4226 struct dma_pte *pte;
4227
4228 pte = dmar_domain->pgd;
4229 if (dma_pte_present(pte)) {
Sheng Yang25cbff12010-06-12 19:21:42 +08004230 dmar_domain->pgd = (struct dma_pte *)
4231 phys_to_virt(dma_pte_addr(pte));
Jan Kiszka7a661012010-11-02 08:05:51 +01004232 free_pgtable_page(pte);
Tom Lyona99c47a2010-05-17 08:20:45 +01004233 }
4234 dmar_domain->agaw--;
4235 }
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004236
David Woodhouse5913c9b2014-03-09 16:27:31 -07004237 return domain_add_dev_info(dmar_domain, dev, CONTEXT_TT_MULTI_LEVEL);
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004238}
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004239
Joerg Roedel4c5478c2008-12-03 14:58:24 +01004240static void intel_iommu_detach_device(struct iommu_domain *domain,
4241 struct device *dev)
Kay, Allen M38717942008-09-09 18:37:29 +03004242{
Joerg Roedel4c5478c2008-12-03 14:58:24 +01004243 struct dmar_domain *dmar_domain = domain->priv;
Joerg Roedel4c5478c2008-12-03 14:58:24 +01004244
David Woodhousebf9c9ed2014-03-09 16:19:13 -07004245 domain_remove_one_dev_info(dmar_domain, dev);
Kay, Allen M38717942008-09-09 18:37:29 +03004246}
Kay, Allen M38717942008-09-09 18:37:29 +03004247
Joerg Roedelb146a1c9f2010-01-20 17:17:37 +01004248static int intel_iommu_map(struct iommu_domain *domain,
4249 unsigned long iova, phys_addr_t hpa,
Ohad Ben-Cohen50090652011-11-10 11:32:25 +02004250 size_t size, int iommu_prot)
Kay, Allen M38717942008-09-09 18:37:29 +03004251{
Joerg Roedeldde57a22008-12-03 15:04:09 +01004252 struct dmar_domain *dmar_domain = domain->priv;
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004253 u64 max_addr;
Joerg Roedeldde57a22008-12-03 15:04:09 +01004254 int prot = 0;
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004255 int ret;
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004256
Joerg Roedeldde57a22008-12-03 15:04:09 +01004257 if (iommu_prot & IOMMU_READ)
4258 prot |= DMA_PTE_READ;
4259 if (iommu_prot & IOMMU_WRITE)
4260 prot |= DMA_PTE_WRITE;
Sheng Yang9cf06692009-03-18 15:33:07 +08004261 if ((iommu_prot & IOMMU_CACHE) && dmar_domain->iommu_snooping)
4262 prot |= DMA_PTE_SNP;
Joerg Roedeldde57a22008-12-03 15:04:09 +01004263
David Woodhouse163cc522009-06-28 00:51:17 +01004264 max_addr = iova + size;
Joerg Roedeldde57a22008-12-03 15:04:09 +01004265 if (dmar_domain->max_addr < max_addr) {
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004266 u64 end;
4267
4268 /* check if minimum agaw is sufficient for mapped address */
Tom Lyon8954da12010-05-17 08:19:52 +01004269 end = __DOMAIN_MAX_ADDR(dmar_domain->gaw) + 1;
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004270 if (end < max_addr) {
Tom Lyon8954da12010-05-17 08:19:52 +01004271 printk(KERN_ERR "%s: iommu width (%d) is not "
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004272 "sufficient for the mapped address (%llx)\n",
Tom Lyon8954da12010-05-17 08:19:52 +01004273 __func__, dmar_domain->gaw, max_addr);
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004274 return -EFAULT;
4275 }
Joerg Roedeldde57a22008-12-03 15:04:09 +01004276 dmar_domain->max_addr = max_addr;
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004277 }
David Woodhousead051222009-06-28 14:22:28 +01004278 /* Round up size to next multiple of PAGE_SIZE, if it and
4279 the low bits of hpa would take us onto the next page */
David Woodhouse88cb6a72009-06-28 15:03:06 +01004280 size = aligned_nrpages(hpa, size);
David Woodhousead051222009-06-28 14:22:28 +01004281 ret = domain_pfn_mapping(dmar_domain, iova >> VTD_PAGE_SHIFT,
4282 hpa >> VTD_PAGE_SHIFT, size, prot);
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004283 return ret;
Kay, Allen M38717942008-09-09 18:37:29 +03004284}
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004285
Ohad Ben-Cohen50090652011-11-10 11:32:25 +02004286static size_t intel_iommu_unmap(struct iommu_domain *domain,
David Woodhouseea8ea462014-03-05 17:09:32 +00004287 unsigned long iova, size_t size)
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004288{
Joerg Roedeldde57a22008-12-03 15:04:09 +01004289 struct dmar_domain *dmar_domain = domain->priv;
David Woodhouseea8ea462014-03-05 17:09:32 +00004290 struct page *freelist = NULL;
4291 struct intel_iommu *iommu;
4292 unsigned long start_pfn, last_pfn;
4293 unsigned int npages;
4294 int iommu_id, num, ndomains, level = 0;
Sheng Yang4b99d352009-07-08 11:52:52 +01004295
David Woodhouse5cf0a762014-03-19 16:07:49 +00004296 /* Cope with horrid API which requires us to unmap more than the
4297 size argument if it happens to be a large-page mapping. */
4298 if (!pfn_to_dma_pte(dmar_domain, iova >> VTD_PAGE_SHIFT, &level))
4299 BUG();
4300
4301 if (size < VTD_PAGE_SIZE << level_to_offset_bits(level))
4302 size = VTD_PAGE_SIZE << level_to_offset_bits(level);
4303
David Woodhouseea8ea462014-03-05 17:09:32 +00004304 start_pfn = iova >> VTD_PAGE_SHIFT;
4305 last_pfn = (iova + size - 1) >> VTD_PAGE_SHIFT;
4306
4307 freelist = domain_unmap(dmar_domain, start_pfn, last_pfn);
4308
4309 npages = last_pfn - start_pfn + 1;
4310
4311 for_each_set_bit(iommu_id, dmar_domain->iommu_bmp, g_num_of_iommus) {
4312 iommu = g_iommus[iommu_id];
4313
4314 /*
4315 * find bit position of dmar_domain
4316 */
4317 ndomains = cap_ndoms(iommu->cap);
4318 for_each_set_bit(num, iommu->domain_ids, ndomains) {
4319 if (iommu->domains[num] == dmar_domain)
4320 iommu_flush_iotlb_psi(iommu, num, start_pfn,
4321 npages, !freelist, 0);
4322 }
4323
4324 }
4325
4326 dma_free_pagelist(freelist);
Weidong Hanfe40f1e2008-12-08 23:10:23 +08004327
David Woodhouse163cc522009-06-28 00:51:17 +01004328 if (dmar_domain->max_addr == iova + size)
4329 dmar_domain->max_addr = iova;
Joerg Roedelb146a1c9f2010-01-20 17:17:37 +01004330
David Woodhouse5cf0a762014-03-19 16:07:49 +00004331 return size;
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004332}
Kay, Allen M38717942008-09-09 18:37:29 +03004333
Joerg Roedeld14d6572008-12-03 15:06:57 +01004334static phys_addr_t intel_iommu_iova_to_phys(struct iommu_domain *domain,
Varun Sethibb5547a2013-03-29 01:23:58 +05304335 dma_addr_t iova)
Kay, Allen M38717942008-09-09 18:37:29 +03004336{
Joerg Roedeld14d6572008-12-03 15:06:57 +01004337 struct dmar_domain *dmar_domain = domain->priv;
Kay, Allen M38717942008-09-09 18:37:29 +03004338 struct dma_pte *pte;
David Woodhouse5cf0a762014-03-19 16:07:49 +00004339 int level = 0;
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004340 u64 phys = 0;
Kay, Allen M38717942008-09-09 18:37:29 +03004341
David Woodhouse5cf0a762014-03-19 16:07:49 +00004342 pte = pfn_to_dma_pte(dmar_domain, iova >> VTD_PAGE_SHIFT, &level);
Kay, Allen M38717942008-09-09 18:37:29 +03004343 if (pte)
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004344 phys = dma_pte_addr(pte);
Kay, Allen M38717942008-09-09 18:37:29 +03004345
Weidong Hanfaa3d6f2008-12-08 23:09:29 +08004346 return phys;
Kay, Allen M38717942008-09-09 18:37:29 +03004347}
Joerg Roedela8bcbb0d2008-12-03 15:14:02 +01004348
Sheng Yangdbb9fd82009-03-18 15:33:06 +08004349static int intel_iommu_domain_has_cap(struct iommu_domain *domain,
4350 unsigned long cap)
4351{
4352 struct dmar_domain *dmar_domain = domain->priv;
4353
4354 if (cap == IOMMU_CAP_CACHE_COHERENCY)
4355 return dmar_domain->iommu_snooping;
Tom Lyon323f99c2010-07-02 16:56:14 -04004356 if (cap == IOMMU_CAP_INTR_REMAP)
Suresh Siddha95a02e92012-03-30 11:47:07 -07004357 return irq_remapping_enabled;
Sheng Yangdbb9fd82009-03-18 15:33:06 +08004358
4359 return 0;
4360}
4361
Alex Williamson783f1572012-05-30 14:19:43 -06004362#define REQ_ACS_FLAGS (PCI_ACS_SV | PCI_ACS_RR | PCI_ACS_CR | PCI_ACS_UF)
4363
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004364static int intel_iommu_add_device(struct device *dev)
Alex Williamson70ae6f02011-10-21 15:56:11 -04004365{
4366 struct pci_dev *pdev = to_pci_dev(dev);
Alex Williamson3da4af02012-11-13 10:22:03 -07004367 struct pci_dev *bridge, *dma_pdev = NULL;
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004368 struct iommu_group *group;
4369 int ret;
David Woodhouse156baca2014-03-09 14:00:57 -07004370 u8 bus, devfn;
Alex Williamson70ae6f02011-10-21 15:56:11 -04004371
David Woodhouse156baca2014-03-09 14:00:57 -07004372 if (!device_to_iommu(dev, &bus, &devfn))
Alex Williamson70ae6f02011-10-21 15:56:11 -04004373 return -ENODEV;
4374
4375 bridge = pci_find_upstream_pcie_bridge(pdev);
4376 if (bridge) {
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004377 if (pci_is_pcie(bridge))
4378 dma_pdev = pci_get_domain_bus_and_slot(
4379 pci_domain_nr(pdev->bus),
4380 bridge->subordinate->number, 0);
Alex Williamson3da4af02012-11-13 10:22:03 -07004381 if (!dma_pdev)
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004382 dma_pdev = pci_dev_get(bridge);
4383 } else
4384 dma_pdev = pci_dev_get(pdev);
4385
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004386 /* Account for quirked devices */
Alex Williamson783f1572012-05-30 14:19:43 -06004387 swap_pci_ref(&dma_pdev, pci_get_dma_source(dma_pdev));
4388
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004389 /*
4390 * If it's a multifunction device that does not support our
Alex Williamsonc14d2692013-05-30 12:39:18 -06004391 * required ACS flags, add to the same group as lowest numbered
4392 * function that also does not suport the required ACS flags.
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004393 */
Alex Williamson783f1572012-05-30 14:19:43 -06004394 if (dma_pdev->multifunction &&
Alex Williamsonc14d2692013-05-30 12:39:18 -06004395 !pci_acs_enabled(dma_pdev, REQ_ACS_FLAGS)) {
4396 u8 i, slot = PCI_SLOT(dma_pdev->devfn);
4397
4398 for (i = 0; i < 8; i++) {
4399 struct pci_dev *tmp;
4400
4401 tmp = pci_get_slot(dma_pdev->bus, PCI_DEVFN(slot, i));
4402 if (!tmp)
4403 continue;
4404
4405 if (!pci_acs_enabled(tmp, REQ_ACS_FLAGS)) {
4406 swap_pci_ref(&dma_pdev, tmp);
4407 break;
4408 }
4409 pci_dev_put(tmp);
4410 }
4411 }
Alex Williamson783f1572012-05-30 14:19:43 -06004412
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004413 /*
4414 * Devices on the root bus go through the iommu. If that's not us,
4415 * find the next upstream device and test ACS up to the root bus.
4416 * Finding the next device may require skipping virtual buses.
4417 */
Alex Williamson783f1572012-05-30 14:19:43 -06004418 while (!pci_is_root_bus(dma_pdev->bus)) {
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004419 struct pci_bus *bus = dma_pdev->bus;
4420
4421 while (!bus->self) {
4422 if (!pci_is_root_bus(bus))
4423 bus = bus->parent;
4424 else
4425 goto root_bus;
4426 }
4427
4428 if (pci_acs_path_enabled(bus->self, NULL, REQ_ACS_FLAGS))
Alex Williamson783f1572012-05-30 14:19:43 -06004429 break;
4430
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004431 swap_pci_ref(&dma_pdev, pci_dev_get(bus->self));
Alex Williamson70ae6f02011-10-21 15:56:11 -04004432 }
4433
Alex Williamsona4ff1fc2012-08-04 12:08:55 -06004434root_bus:
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004435 group = iommu_group_get(&dma_pdev->dev);
4436 pci_dev_put(dma_pdev);
4437 if (!group) {
4438 group = iommu_group_alloc();
4439 if (IS_ERR(group))
4440 return PTR_ERR(group);
4441 }
Alex Williamsonbcb71ab2011-10-21 15:56:24 -04004442
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004443 ret = iommu_group_add_device(group, dev);
Alex Williamson70ae6f02011-10-21 15:56:11 -04004444
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004445 iommu_group_put(group);
4446 return ret;
4447}
4448
4449static void intel_iommu_remove_device(struct device *dev)
4450{
4451 iommu_group_remove_device(dev);
Alex Williamson70ae6f02011-10-21 15:56:11 -04004452}
4453
Joerg Roedela8bcbb0d2008-12-03 15:14:02 +01004454static struct iommu_ops intel_iommu_ops = {
4455 .domain_init = intel_iommu_domain_init,
4456 .domain_destroy = intel_iommu_domain_destroy,
4457 .attach_dev = intel_iommu_attach_device,
4458 .detach_dev = intel_iommu_detach_device,
Joerg Roedelb146a1c9f2010-01-20 17:17:37 +01004459 .map = intel_iommu_map,
4460 .unmap = intel_iommu_unmap,
Joerg Roedela8bcbb0d2008-12-03 15:14:02 +01004461 .iova_to_phys = intel_iommu_iova_to_phys,
Sheng Yangdbb9fd82009-03-18 15:33:06 +08004462 .domain_has_cap = intel_iommu_domain_has_cap,
Alex Williamsonabdfdde2012-05-30 14:19:19 -06004463 .add_device = intel_iommu_add_device,
4464 .remove_device = intel_iommu_remove_device,
Ohad Ben-Cohen6d1c56a2011-11-10 11:32:30 +02004465 .pgsize_bitmap = INTEL_IOMMU_PGSIZES,
Joerg Roedela8bcbb0d2008-12-03 15:14:02 +01004466};
David Woodhouse9af88142009-02-13 23:18:03 +00004467
Daniel Vetter94526182013-01-20 23:50:13 +01004468static void quirk_iommu_g4x_gfx(struct pci_dev *dev)
4469{
4470 /* G4x/GM45 integrated gfx dmar support is totally busted. */
4471 printk(KERN_INFO "DMAR: Disabling IOMMU for graphics on this chipset\n");
4472 dmar_map_gfx = 0;
4473}
4474
4475DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2a40, quirk_iommu_g4x_gfx);
4476DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e00, quirk_iommu_g4x_gfx);
4477DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e10, quirk_iommu_g4x_gfx);
4478DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e20, quirk_iommu_g4x_gfx);
4479DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e30, quirk_iommu_g4x_gfx);
4480DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e40, quirk_iommu_g4x_gfx);
4481DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e90, quirk_iommu_g4x_gfx);
4482
Greg Kroah-Hartmand34d6512012-12-21 15:05:21 -08004483static void quirk_iommu_rwbf(struct pci_dev *dev)
David Woodhouse9af88142009-02-13 23:18:03 +00004484{
4485 /*
4486 * Mobile 4 Series Chipset neglects to set RWBF capability,
Daniel Vetter210561f2013-01-21 19:48:59 +01004487 * but needs it. Same seems to hold for the desktop versions.
David Woodhouse9af88142009-02-13 23:18:03 +00004488 */
4489 printk(KERN_INFO "DMAR: Forcing write-buffer flush capability\n");
4490 rwbf_quirk = 1;
4491}
4492
4493DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2a40, quirk_iommu_rwbf);
Daniel Vetter210561f2013-01-21 19:48:59 +01004494DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e00, quirk_iommu_rwbf);
4495DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e10, quirk_iommu_rwbf);
4496DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e20, quirk_iommu_rwbf);
4497DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e30, quirk_iommu_rwbf);
4498DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e40, quirk_iommu_rwbf);
4499DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x2e90, quirk_iommu_rwbf);
David Woodhousee0fc7e02009-09-30 09:12:17 -07004500
Adam Jacksoneecfd572010-08-25 21:17:34 +01004501#define GGC 0x52
4502#define GGC_MEMORY_SIZE_MASK (0xf << 8)
4503#define GGC_MEMORY_SIZE_NONE (0x0 << 8)
4504#define GGC_MEMORY_SIZE_1M (0x1 << 8)
4505#define GGC_MEMORY_SIZE_2M (0x3 << 8)
4506#define GGC_MEMORY_VT_ENABLED (0x8 << 8)
4507#define GGC_MEMORY_SIZE_2M_VT (0x9 << 8)
4508#define GGC_MEMORY_SIZE_3M_VT (0xa << 8)
4509#define GGC_MEMORY_SIZE_4M_VT (0xb << 8)
4510
Greg Kroah-Hartmand34d6512012-12-21 15:05:21 -08004511static void quirk_calpella_no_shadow_gtt(struct pci_dev *dev)
David Woodhouse9eecabc2010-09-21 22:28:23 +01004512{
4513 unsigned short ggc;
4514
Adam Jacksoneecfd572010-08-25 21:17:34 +01004515 if (pci_read_config_word(dev, GGC, &ggc))
David Woodhouse9eecabc2010-09-21 22:28:23 +01004516 return;
4517
Adam Jacksoneecfd572010-08-25 21:17:34 +01004518 if (!(ggc & GGC_MEMORY_VT_ENABLED)) {
David Woodhouse9eecabc2010-09-21 22:28:23 +01004519 printk(KERN_INFO "DMAR: BIOS has allocated no shadow GTT; disabling IOMMU for graphics\n");
4520 dmar_map_gfx = 0;
David Woodhouse6fbcfb32011-09-25 19:11:14 -07004521 } else if (dmar_map_gfx) {
4522 /* we have to ensure the gfx device is idle before we flush */
4523 printk(KERN_INFO "DMAR: Disabling batched IOTLB flush on Ironlake\n");
4524 intel_iommu_strict = 1;
4525 }
David Woodhouse9eecabc2010-09-21 22:28:23 +01004526}
4527DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x0040, quirk_calpella_no_shadow_gtt);
4528DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x0044, quirk_calpella_no_shadow_gtt);
4529DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x0062, quirk_calpella_no_shadow_gtt);
4530DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x006a, quirk_calpella_no_shadow_gtt);
4531
David Woodhousee0fc7e02009-09-30 09:12:17 -07004532/* On Tylersburg chipsets, some BIOSes have been known to enable the
4533 ISOCH DMAR unit for the Azalia sound device, but not give it any
4534 TLB entries, which causes it to deadlock. Check for that. We do
4535 this in a function called from init_dmars(), instead of in a PCI
4536 quirk, because we don't want to print the obnoxious "BIOS broken"
4537 message if VT-d is actually disabled.
4538*/
4539static void __init check_tylersburg_isoch(void)
4540{
4541 struct pci_dev *pdev;
4542 uint32_t vtisochctrl;
4543
4544 /* If there's no Azalia in the system anyway, forget it. */
4545 pdev = pci_get_device(PCI_VENDOR_ID_INTEL, 0x3a3e, NULL);
4546 if (!pdev)
4547 return;
4548 pci_dev_put(pdev);
4549
4550 /* System Management Registers. Might be hidden, in which case
4551 we can't do the sanity check. But that's OK, because the
4552 known-broken BIOSes _don't_ actually hide it, so far. */
4553 pdev = pci_get_device(PCI_VENDOR_ID_INTEL, 0x342e, NULL);
4554 if (!pdev)
4555 return;
4556
4557 if (pci_read_config_dword(pdev, 0x188, &vtisochctrl)) {
4558 pci_dev_put(pdev);
4559 return;
4560 }
4561
4562 pci_dev_put(pdev);
4563
4564 /* If Azalia DMA is routed to the non-isoch DMAR unit, fine. */
4565 if (vtisochctrl & 1)
4566 return;
4567
4568 /* Drop all bits other than the number of TLB entries */
4569 vtisochctrl &= 0x1c;
4570
4571 /* If we have the recommended number of TLB entries (16), fine. */
4572 if (vtisochctrl == 0x10)
4573 return;
4574
4575 /* Zero TLB entries? You get to ride the short bus to school. */
4576 if (!vtisochctrl) {
4577 WARN(1, "Your BIOS is broken; DMA routed to ISOCH DMAR unit but no TLB space.\n"
4578 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
4579 dmi_get_system_info(DMI_BIOS_VENDOR),
4580 dmi_get_system_info(DMI_BIOS_VERSION),
4581 dmi_get_system_info(DMI_PRODUCT_VERSION));
4582 iommu_identity_mapping |= IDENTMAP_AZALIA;
4583 return;
4584 }
4585
4586 printk(KERN_WARNING "DMAR: Recommended TLB entries for ISOCH unit is 16; your BIOS set %d\n",
4587 vtisochctrl);
4588}