2 * Copyright (c) 2006, Intel Corporation.
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
8 * This program is distributed in the hope it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
13 * You should have received a copy of the GNU General Public License along with
14 * this program; if not, write to the Free Software Foundation, Inc., 59 Temple
15 * Place - Suite 330, Boston, MA 02111-1307 USA.
17 * Copyright (C) 2006-2008 Intel Corporation
18 * Author: Ashok Raj <ashok.raj@intel.com>
19 * Author: Shaohua Li <shaohua.li@intel.com>
20 * Author: Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com>
21 * Author: Fenghua Yu <fenghua.yu@intel.com>
24 #include <linux/init.h>
25 #include <linux/bitmap.h>
26 #include <linux/debugfs.h>
27 #include <linux/export.h>
28 #include <linux/slab.h>
29 #include <linux/irq.h>
30 #include <linux/interrupt.h>
31 #include <linux/spinlock.h>
32 #include <linux/pci.h>
33 #include <linux/dmar.h>
34 #include <linux/dma-mapping.h>
35 #include <linux/mempool.h>
36 #include <linux/timer.h>
37 #include <linux/iova.h>
38 #include <linux/iommu.h>
39 #include <linux/intel-iommu.h>
40 #include <linux/syscore_ops.h>
41 #include <linux/tboot.h>
42 #include <linux/dmi.h>
43 #include <linux/pci-ats.h>
44 #include <linux/memblock.h>
45 #include <asm/cacheflush.h>
46 #include <asm/iommu.h>
48 #define ROOT_SIZE VTD_PAGE_SIZE
49 #define CONTEXT_SIZE VTD_PAGE_SIZE
51 #define IS_GFX_DEVICE(pdev) ((pdev->class >> 16) == PCI_BASE_CLASS_DISPLAY)
52 #define IS_ISA_DEVICE(pdev) ((pdev->class >> 8) == PCI_CLASS_BRIDGE_ISA)
53 #define IS_AZALIA(pdev) ((pdev)->vendor == 0x8086 && (pdev)->device == 0x3a3e)
55 #define IOAPIC_RANGE_START (0xfee00000)
56 #define IOAPIC_RANGE_END (0xfeefffff)
57 #define IOVA_START_ADDR (0x1000)
59 #define DEFAULT_DOMAIN_ADDRESS_WIDTH 48
61 #define MAX_AGAW_WIDTH 64
63 #define __DOMAIN_MAX_PFN(gaw) ((((uint64_t)1) << (gaw-VTD_PAGE_SHIFT)) - 1)
64 #define __DOMAIN_MAX_ADDR(gaw) ((((uint64_t)1) << gaw) - 1)
66 /* We limit DOMAIN_MAX_PFN to fit in an unsigned long, and DOMAIN_MAX_ADDR
67 to match. That way, we can use 'unsigned long' for PFNs with impunity. */
68 #define DOMAIN_MAX_PFN(gaw) ((unsigned long) min_t(uint64_t, \
69 __DOMAIN_MAX_PFN(gaw), (unsigned long)-1))
70 #define DOMAIN_MAX_ADDR(gaw) (((uint64_t)__DOMAIN_MAX_PFN(gaw)) << VTD_PAGE_SHIFT)
72 #define IOVA_PFN(addr) ((addr) >> PAGE_SHIFT)
73 #define DMA_32BIT_PFN IOVA_PFN(DMA_BIT_MASK(32))
74 #define DMA_64BIT_PFN IOVA_PFN(DMA_BIT_MASK(64))
76 /* page table handling */
77 #define LEVEL_STRIDE (9)
78 #define LEVEL_MASK (((u64)1 << LEVEL_STRIDE) - 1)
81 * This bitmap is used to advertise the page sizes our hardware support
82 * to the IOMMU core, which will then use this information to split
83 * physically contiguous memory regions it is mapping into page sizes
86 * Traditionally the IOMMU core just handed us the mappings directly,
87 * after making sure the size is an order of a 4KiB page and that the
88 * mapping has natural alignment.
90 * To retain this behavior, we currently advertise that we support
91 * all page sizes that are an order of 4KiB.
93 * If at some point we'd like to utilize the IOMMU core's new behavior,
94 * we could change this to advertise the real page sizes we support.
96 #define INTEL_IOMMU_PGSIZES (~0xFFFUL)
98 static inline int agaw_to_level(int agaw
)
103 static inline int agaw_to_width(int agaw
)
105 return 30 + agaw
* LEVEL_STRIDE
;
108 static inline int width_to_agaw(int width
)
110 return (width
- 30) / LEVEL_STRIDE
;
113 static inline unsigned int level_to_offset_bits(int level
)
115 return (level
- 1) * LEVEL_STRIDE
;
118 static inline int pfn_level_offset(unsigned long pfn
, int level
)
120 return (pfn
>> level_to_offset_bits(level
)) & LEVEL_MASK
;
123 static inline unsigned long level_mask(int level
)
125 return -1UL << level_to_offset_bits(level
);
128 static inline unsigned long level_size(int level
)
130 return 1UL << level_to_offset_bits(level
);
133 static inline unsigned long align_to_level(unsigned long pfn
, int level
)
135 return (pfn
+ level_size(level
) - 1) & level_mask(level
);
138 static inline unsigned long lvl_to_nr_pages(unsigned int lvl
)
140 return 1 << ((lvl
- 1) * LEVEL_STRIDE
);
143 /* VT-d pages must always be _smaller_ than MM pages. Otherwise things
144 are never going to work. */
145 static inline unsigned long dma_to_mm_pfn(unsigned long dma_pfn
)
147 return dma_pfn
>> (PAGE_SHIFT
- VTD_PAGE_SHIFT
);
150 static inline unsigned long mm_to_dma_pfn(unsigned long mm_pfn
)
152 return mm_pfn
<< (PAGE_SHIFT
- VTD_PAGE_SHIFT
);
154 static inline unsigned long page_to_dma_pfn(struct page
*pg
)
156 return mm_to_dma_pfn(page_to_pfn(pg
));
158 static inline unsigned long virt_to_dma_pfn(void *p
)
160 return page_to_dma_pfn(virt_to_page(p
));
163 /* global iommu list, set NULL for ignored DMAR units */
164 static struct intel_iommu
**g_iommus
;
166 static void __init
check_tylersburg_isoch(void);
167 static int rwbf_quirk
;
170 * set to 1 to panic kernel if can't successfully enable VT-d
171 * (used when kernel is launched w/ TXT)
173 static int force_on
= 0;
178 * 12-63: Context Ptr (12 - (haw-1))
185 #define ROOT_ENTRY_NR (VTD_PAGE_SIZE/sizeof(struct root_entry))
186 static inline bool root_present(struct root_entry
*root
)
188 return (root
->val
& 1);
190 static inline void set_root_present(struct root_entry
*root
)
194 static inline void set_root_value(struct root_entry
*root
, unsigned long value
)
196 root
->val
|= value
& VTD_PAGE_MASK
;
199 static inline struct context_entry
*
200 get_context_addr_from_root(struct root_entry
*root
)
202 return (struct context_entry
*)
203 (root_present(root
)?phys_to_virt(
204 root
->val
& VTD_PAGE_MASK
) :
211 * 1: fault processing disable
212 * 2-3: translation type
213 * 12-63: address space root
219 struct context_entry
{
224 static inline bool context_present(struct context_entry
*context
)
226 return (context
->lo
& 1);
228 static inline void context_set_present(struct context_entry
*context
)
233 static inline void context_set_fault_enable(struct context_entry
*context
)
235 context
->lo
&= (((u64
)-1) << 2) | 1;
238 static inline void context_set_translation_type(struct context_entry
*context
,
241 context
->lo
&= (((u64
)-1) << 4) | 3;
242 context
->lo
|= (value
& 3) << 2;
245 static inline void context_set_address_root(struct context_entry
*context
,
248 context
->lo
|= value
& VTD_PAGE_MASK
;
251 static inline void context_set_address_width(struct context_entry
*context
,
254 context
->hi
|= value
& 7;
257 static inline void context_set_domain_id(struct context_entry
*context
,
260 context
->hi
|= (value
& ((1 << 16) - 1)) << 8;
263 static inline void context_clear_entry(struct context_entry
*context
)
276 * 12-63: Host physcial address
282 static inline void dma_clear_pte(struct dma_pte
*pte
)
287 static inline void dma_set_pte_readable(struct dma_pte
*pte
)
289 pte
->val
|= DMA_PTE_READ
;
292 static inline void dma_set_pte_writable(struct dma_pte
*pte
)
294 pte
->val
|= DMA_PTE_WRITE
;
297 static inline void dma_set_pte_snp(struct dma_pte
*pte
)
299 pte
->val
|= DMA_PTE_SNP
;
302 static inline void dma_set_pte_prot(struct dma_pte
*pte
, unsigned long prot
)
304 pte
->val
= (pte
->val
& ~3) | (prot
& 3);
307 static inline u64
dma_pte_addr(struct dma_pte
*pte
)
310 return pte
->val
& VTD_PAGE_MASK
;
312 /* Must have a full atomic 64-bit read */
313 return __cmpxchg64(&pte
->val
, 0ULL, 0ULL) & VTD_PAGE_MASK
;
317 static inline void dma_set_pte_pfn(struct dma_pte
*pte
, unsigned long pfn
)
319 pte
->val
|= (uint64_t)pfn
<< VTD_PAGE_SHIFT
;
322 static inline bool dma_pte_present(struct dma_pte
*pte
)
324 return (pte
->val
& 3) != 0;
327 static inline bool dma_pte_superpage(struct dma_pte
*pte
)
329 return (pte
->val
& (1 << 7));
332 static inline int first_pte_in_page(struct dma_pte
*pte
)
334 return !((unsigned long)pte
& ~VTD_PAGE_MASK
);
338 * This domain is a statically identity mapping domain.
339 * 1. This domain creats a static 1:1 mapping to all usable memory.
340 * 2. It maps to each iommu if successful.
341 * 3. Each iommu mapps to this domain if successful.
343 static struct dmar_domain
*si_domain
;
344 static int hw_pass_through
= 1;
346 /* devices under the same p2p bridge are owned in one domain */
347 #define DOMAIN_FLAG_P2P_MULTIPLE_DEVICES (1 << 0)
349 /* domain represents a virtual machine, more than one devices
350 * across iommus may be owned in one domain, e.g. kvm guest.
352 #define DOMAIN_FLAG_VIRTUAL_MACHINE (1 << 1)
354 /* si_domain contains mulitple devices */
355 #define DOMAIN_FLAG_STATIC_IDENTITY (1 << 2)
357 /* define the limit of IOMMUs supported in each domain */
359 # define IOMMU_UNITS_SUPPORTED MAX_IO_APICS
361 # define IOMMU_UNITS_SUPPORTED 64
365 int id
; /* domain id */
366 int nid
; /* node id */
367 DECLARE_BITMAP(iommu_bmp
, IOMMU_UNITS_SUPPORTED
);
368 /* bitmap of iommus this domain uses*/
370 struct list_head devices
; /* all devices' list */
371 struct iova_domain iovad
; /* iova's that belong to this domain */
373 struct dma_pte
*pgd
; /* virtual address */
374 int gaw
; /* max guest address width */
376 /* adjusted guest address width, 0 is level 2 30-bit */
379 int flags
; /* flags to find out type of domain */
381 int iommu_coherency
;/* indicate coherency of iommu access */
382 int iommu_snooping
; /* indicate snooping control feature*/
383 int iommu_count
; /* reference count of iommu */
384 int iommu_superpage
;/* Level of superpages supported:
385 0 == 4KiB (no superpages), 1 == 2MiB,
386 2 == 1GiB, 3 == 512GiB, 4 == 1TiB */
387 spinlock_t iommu_lock
; /* protect iommu set in domain */
388 u64 max_addr
; /* maximum mapped address */
391 /* PCI domain-device relationship */
392 struct device_domain_info
{
393 struct list_head link
; /* link to domain siblings */
394 struct list_head global
; /* link to global list */
395 int segment
; /* PCI domain */
396 u8 bus
; /* PCI bus number */
397 u8 devfn
; /* PCI devfn number */
398 struct pci_dev
*dev
; /* it's NULL for PCIe-to-PCI bridge */
399 struct intel_iommu
*iommu
; /* IOMMU used by this device */
400 struct dmar_domain
*domain
; /* pointer to domain */
403 static void flush_unmaps_timeout(unsigned long data
);
405 DEFINE_TIMER(unmap_timer
, flush_unmaps_timeout
, 0, 0);
407 #define HIGH_WATER_MARK 250
408 struct deferred_flush_tables
{
410 struct iova
*iova
[HIGH_WATER_MARK
];
411 struct dmar_domain
*domain
[HIGH_WATER_MARK
];
414 static struct deferred_flush_tables
*deferred_flush
;
416 /* bitmap for indexing intel_iommus */
417 static int g_num_of_iommus
;
419 static DEFINE_SPINLOCK(async_umap_flush_lock
);
420 static LIST_HEAD(unmaps_to_do
);
423 static long list_size
;
425 static void domain_remove_dev_info(struct dmar_domain
*domain
);
427 #ifdef CONFIG_INTEL_IOMMU_DEFAULT_ON
428 int dmar_disabled
= 0;
430 int dmar_disabled
= 1;
431 #endif /*CONFIG_INTEL_IOMMU_DEFAULT_ON*/
433 int intel_iommu_enabled
= 0;
434 EXPORT_SYMBOL_GPL(intel_iommu_enabled
);
436 static int dmar_map_gfx
= 1;
437 static int dmar_forcedac
;
438 static int intel_iommu_strict
;
439 static int intel_iommu_superpage
= 1;
441 int intel_iommu_gfx_mapped
;
442 EXPORT_SYMBOL_GPL(intel_iommu_gfx_mapped
);
444 #define DUMMY_DEVICE_DOMAIN_INFO ((struct device_domain_info *)(-1))
445 static DEFINE_SPINLOCK(device_domain_lock
);
446 static LIST_HEAD(device_domain_list
);
448 static struct iommu_ops intel_iommu_ops
;
450 static int __init
intel_iommu_setup(char *str
)
455 if (!strncmp(str
, "on", 2)) {
457 printk(KERN_INFO
"Intel-IOMMU: enabled\n");
458 } else if (!strncmp(str
, "off", 3)) {
460 printk(KERN_INFO
"Intel-IOMMU: disabled\n");
461 } else if (!strncmp(str
, "igfx_off", 8)) {
464 "Intel-IOMMU: disable GFX device mapping\n");
465 } else if (!strncmp(str
, "forcedac", 8)) {
467 "Intel-IOMMU: Forcing DAC for PCI devices\n");
469 } else if (!strncmp(str
, "strict", 6)) {
471 "Intel-IOMMU: disable batched IOTLB flush\n");
472 intel_iommu_strict
= 1;
473 } else if (!strncmp(str
, "sp_off", 6)) {
475 "Intel-IOMMU: disable supported super page\n");
476 intel_iommu_superpage
= 0;
479 str
+= strcspn(str
, ",");
485 __setup("intel_iommu=", intel_iommu_setup
);
487 static struct kmem_cache
*iommu_domain_cache
;
488 static struct kmem_cache
*iommu_devinfo_cache
;
489 static struct kmem_cache
*iommu_iova_cache
;
491 static inline void *alloc_pgtable_page(int node
)
496 page
= alloc_pages_node(node
, GFP_ATOMIC
| __GFP_ZERO
, 0);
498 vaddr
= page_address(page
);
502 static inline void free_pgtable_page(void *vaddr
)
504 free_page((unsigned long)vaddr
);
507 static inline void *alloc_domain_mem(void)
509 return kmem_cache_alloc(iommu_domain_cache
, GFP_ATOMIC
);
512 static void free_domain_mem(void *vaddr
)
514 kmem_cache_free(iommu_domain_cache
, vaddr
);
517 static inline void * alloc_devinfo_mem(void)
519 return kmem_cache_alloc(iommu_devinfo_cache
, GFP_ATOMIC
);
522 static inline void free_devinfo_mem(void *vaddr
)
524 kmem_cache_free(iommu_devinfo_cache
, vaddr
);
527 struct iova
*alloc_iova_mem(void)
529 return kmem_cache_alloc(iommu_iova_cache
, GFP_ATOMIC
);
532 void free_iova_mem(struct iova
*iova
)
534 kmem_cache_free(iommu_iova_cache
, iova
);
538 static int __iommu_calculate_agaw(struct intel_iommu
*iommu
, int max_gaw
)
543 sagaw
= cap_sagaw(iommu
->cap
);
544 for (agaw
= width_to_agaw(max_gaw
);
546 if (test_bit(agaw
, &sagaw
))
554 * Calculate max SAGAW for each iommu.
556 int iommu_calculate_max_sagaw(struct intel_iommu
*iommu
)
558 return __iommu_calculate_agaw(iommu
, MAX_AGAW_WIDTH
);
562 * calculate agaw for each iommu.
563 * "SAGAW" may be different across iommus, use a default agaw, and
564 * get a supported less agaw for iommus that don't support the default agaw.
566 int iommu_calculate_agaw(struct intel_iommu
*iommu
)
568 return __iommu_calculate_agaw(iommu
, DEFAULT_DOMAIN_ADDRESS_WIDTH
);
571 /* This functionin only returns single iommu in a domain */
572 static struct intel_iommu
*domain_get_iommu(struct dmar_domain
*domain
)
576 /* si_domain and vm domain should not get here. */
577 BUG_ON(domain
->flags
& DOMAIN_FLAG_VIRTUAL_MACHINE
);
578 BUG_ON(domain
->flags
& DOMAIN_FLAG_STATIC_IDENTITY
);
580 iommu_id
= find_first_bit(domain
->iommu_bmp
, g_num_of_iommus
);
581 if (iommu_id
< 0 || iommu_id
>= g_num_of_iommus
)
584 return g_iommus
[iommu_id
];
587 static void domain_update_iommu_coherency(struct dmar_domain
*domain
)
591 i
= find_first_bit(domain
->iommu_bmp
, g_num_of_iommus
);
593 domain
->iommu_coherency
= i
< g_num_of_iommus
? 1 : 0;
595 for_each_set_bit(i
, domain
->iommu_bmp
, g_num_of_iommus
) {
596 if (!ecap_coherent(g_iommus
[i
]->ecap
)) {
597 domain
->iommu_coherency
= 0;
603 static void domain_update_iommu_snooping(struct dmar_domain
*domain
)
607 domain
->iommu_snooping
= 1;
609 for_each_set_bit(i
, domain
->iommu_bmp
, g_num_of_iommus
) {
610 if (!ecap_sc_support(g_iommus
[i
]->ecap
)) {
611 domain
->iommu_snooping
= 0;
617 static void domain_update_iommu_superpage(struct dmar_domain
*domain
)
619 struct dmar_drhd_unit
*drhd
;
620 struct intel_iommu
*iommu
= NULL
;
623 if (!intel_iommu_superpage
) {
624 domain
->iommu_superpage
= 0;
628 /* set iommu_superpage to the smallest common denominator */
629 for_each_active_iommu(iommu
, drhd
) {
630 mask
&= cap_super_page_val(iommu
->cap
);
635 domain
->iommu_superpage
= fls(mask
);
638 /* Some capabilities may be different across iommus */
639 static void domain_update_iommu_cap(struct dmar_domain
*domain
)
641 domain_update_iommu_coherency(domain
);
642 domain_update_iommu_snooping(domain
);
643 domain_update_iommu_superpage(domain
);
646 static struct intel_iommu
*device_to_iommu(int segment
, u8 bus
, u8 devfn
)
648 struct dmar_drhd_unit
*drhd
= NULL
;
651 for_each_drhd_unit(drhd
) {
654 if (segment
!= drhd
->segment
)
657 for (i
= 0; i
< drhd
->devices_cnt
; i
++) {
658 if (drhd
->devices
[i
] &&
659 drhd
->devices
[i
]->bus
->number
== bus
&&
660 drhd
->devices
[i
]->devfn
== devfn
)
662 if (drhd
->devices
[i
] &&
663 drhd
->devices
[i
]->subordinate
&&
664 drhd
->devices
[i
]->subordinate
->number
<= bus
&&
665 drhd
->devices
[i
]->subordinate
->subordinate
>= bus
)
669 if (drhd
->include_all
)
676 static void domain_flush_cache(struct dmar_domain
*domain
,
677 void *addr
, int size
)
679 if (!domain
->iommu_coherency
)
680 clflush_cache_range(addr
, size
);
683 /* Gets context entry for a given bus and devfn */
684 static struct context_entry
* device_to_context_entry(struct intel_iommu
*iommu
,
687 struct root_entry
*root
;
688 struct context_entry
*context
;
689 unsigned long phy_addr
;
692 spin_lock_irqsave(&iommu
->lock
, flags
);
693 root
= &iommu
->root_entry
[bus
];
694 context
= get_context_addr_from_root(root
);
696 context
= (struct context_entry
*)
697 alloc_pgtable_page(iommu
->node
);
699 spin_unlock_irqrestore(&iommu
->lock
, flags
);
702 __iommu_flush_cache(iommu
, (void *)context
, CONTEXT_SIZE
);
703 phy_addr
= virt_to_phys((void *)context
);
704 set_root_value(root
, phy_addr
);
705 set_root_present(root
);
706 __iommu_flush_cache(iommu
, root
, sizeof(*root
));
708 spin_unlock_irqrestore(&iommu
->lock
, flags
);
709 return &context
[devfn
];
712 static int device_context_mapped(struct intel_iommu
*iommu
, u8 bus
, u8 devfn
)
714 struct root_entry
*root
;
715 struct context_entry
*context
;
719 spin_lock_irqsave(&iommu
->lock
, flags
);
720 root
= &iommu
->root_entry
[bus
];
721 context
= get_context_addr_from_root(root
);
726 ret
= context_present(&context
[devfn
]);
728 spin_unlock_irqrestore(&iommu
->lock
, flags
);
732 static void clear_context_table(struct intel_iommu
*iommu
, u8 bus
, u8 devfn
)
734 struct root_entry
*root
;
735 struct context_entry
*context
;
738 spin_lock_irqsave(&iommu
->lock
, flags
);
739 root
= &iommu
->root_entry
[bus
];
740 context
= get_context_addr_from_root(root
);
742 context_clear_entry(&context
[devfn
]);
743 __iommu_flush_cache(iommu
, &context
[devfn
], \
746 spin_unlock_irqrestore(&iommu
->lock
, flags
);
749 static void free_context_table(struct intel_iommu
*iommu
)
751 struct root_entry
*root
;
754 struct context_entry
*context
;
756 spin_lock_irqsave(&iommu
->lock
, flags
);
757 if (!iommu
->root_entry
) {
760 for (i
= 0; i
< ROOT_ENTRY_NR
; i
++) {
761 root
= &iommu
->root_entry
[i
];
762 context
= get_context_addr_from_root(root
);
764 free_pgtable_page(context
);
766 free_pgtable_page(iommu
->root_entry
);
767 iommu
->root_entry
= NULL
;
769 spin_unlock_irqrestore(&iommu
->lock
, flags
);
772 static struct dma_pte
*pfn_to_dma_pte(struct dmar_domain
*domain
,
773 unsigned long pfn
, int target_level
)
775 int addr_width
= agaw_to_width(domain
->agaw
) - VTD_PAGE_SHIFT
;
776 struct dma_pte
*parent
, *pte
= NULL
;
777 int level
= agaw_to_level(domain
->agaw
);
780 BUG_ON(!domain
->pgd
);
782 if (addr_width
< BITS_PER_LONG
&& pfn
>> addr_width
)
783 /* Address beyond IOMMU's addressing capabilities. */
786 parent
= domain
->pgd
;
791 offset
= pfn_level_offset(pfn
, level
);
792 pte
= &parent
[offset
];
793 if (!target_level
&& (dma_pte_superpage(pte
) || !dma_pte_present(pte
)))
795 if (level
== target_level
)
798 if (!dma_pte_present(pte
)) {
801 tmp_page
= alloc_pgtable_page(domain
->nid
);
806 domain_flush_cache(domain
, tmp_page
, VTD_PAGE_SIZE
);
807 pteval
= ((uint64_t)virt_to_dma_pfn(tmp_page
) << VTD_PAGE_SHIFT
) | DMA_PTE_READ
| DMA_PTE_WRITE
;
808 if (cmpxchg64(&pte
->val
, 0ULL, pteval
)) {
809 /* Someone else set it while we were thinking; use theirs. */
810 free_pgtable_page(tmp_page
);
813 domain_flush_cache(domain
, pte
, sizeof(*pte
));
816 parent
= phys_to_virt(dma_pte_addr(pte
));
824 /* return address's pte at specific level */
825 static struct dma_pte
*dma_pfn_level_pte(struct dmar_domain
*domain
,
827 int level
, int *large_page
)
829 struct dma_pte
*parent
, *pte
= NULL
;
830 int total
= agaw_to_level(domain
->agaw
);
833 parent
= domain
->pgd
;
834 while (level
<= total
) {
835 offset
= pfn_level_offset(pfn
, total
);
836 pte
= &parent
[offset
];
840 if (!dma_pte_present(pte
)) {
845 if (pte
->val
& DMA_PTE_LARGE_PAGE
) {
850 parent
= phys_to_virt(dma_pte_addr(pte
));
856 /* clear last level pte, a tlb flush should be followed */
857 static int dma_pte_clear_range(struct dmar_domain
*domain
,
858 unsigned long start_pfn
,
859 unsigned long last_pfn
)
861 int addr_width
= agaw_to_width(domain
->agaw
) - VTD_PAGE_SHIFT
;
862 unsigned int large_page
= 1;
863 struct dma_pte
*first_pte
, *pte
;
866 BUG_ON(addr_width
< BITS_PER_LONG
&& start_pfn
>> addr_width
);
867 BUG_ON(addr_width
< BITS_PER_LONG
&& last_pfn
>> addr_width
);
868 BUG_ON(start_pfn
> last_pfn
);
870 /* we don't need lock here; nobody else touches the iova range */
873 first_pte
= pte
= dma_pfn_level_pte(domain
, start_pfn
, 1, &large_page
);
875 start_pfn
= align_to_level(start_pfn
+ 1, large_page
+ 1);
880 start_pfn
+= lvl_to_nr_pages(large_page
);
882 } while (start_pfn
<= last_pfn
&& !first_pte_in_page(pte
));
884 domain_flush_cache(domain
, first_pte
,
885 (void *)pte
- (void *)first_pte
);
887 } while (start_pfn
&& start_pfn
<= last_pfn
);
889 order
= (large_page
- 1) * 9;
893 static void dma_pte_free_level(struct dmar_domain
*domain
, int level
,
894 struct dma_pte
*pte
, unsigned long pfn
,
895 unsigned long start_pfn
, unsigned long last_pfn
)
897 pfn
= max(start_pfn
, pfn
);
898 pte
= &pte
[pfn_level_offset(pfn
, level
)];
901 unsigned long level_pfn
;
902 struct dma_pte
*level_pte
;
904 if (!dma_pte_present(pte
) || dma_pte_superpage(pte
))
907 level_pfn
= pfn
& level_mask(level
- 1);
908 level_pte
= phys_to_virt(dma_pte_addr(pte
));
911 dma_pte_free_level(domain
, level
- 1, level_pte
,
912 level_pfn
, start_pfn
, last_pfn
);
914 /* If range covers entire pagetable, free it */
915 if (!(start_pfn
> level_pfn
||
916 last_pfn
< level_pfn
+ level_size(level
) - 1)) {
918 domain_flush_cache(domain
, pte
, sizeof(*pte
));
919 free_pgtable_page(level_pte
);
922 pfn
+= level_size(level
);
923 } while (!first_pte_in_page(++pte
) && pfn
<= last_pfn
);
926 /* free page table pages. last level pte should already be cleared */
927 static void dma_pte_free_pagetable(struct dmar_domain
*domain
,
928 unsigned long start_pfn
,
929 unsigned long last_pfn
)
931 int addr_width
= agaw_to_width(domain
->agaw
) - VTD_PAGE_SHIFT
;
933 BUG_ON(addr_width
< BITS_PER_LONG
&& start_pfn
>> addr_width
);
934 BUG_ON(addr_width
< BITS_PER_LONG
&& last_pfn
>> addr_width
);
935 BUG_ON(start_pfn
> last_pfn
);
937 /* We don't need lock here; nobody else touches the iova range */
938 dma_pte_free_level(domain
, agaw_to_level(domain
->agaw
),
939 domain
->pgd
, 0, start_pfn
, last_pfn
);
942 if (start_pfn
== 0 && last_pfn
== DOMAIN_MAX_PFN(domain
->gaw
)) {
943 free_pgtable_page(domain
->pgd
);
949 static int iommu_alloc_root_entry(struct intel_iommu
*iommu
)
951 struct root_entry
*root
;
954 root
= (struct root_entry
*)alloc_pgtable_page(iommu
->node
);
958 __iommu_flush_cache(iommu
, root
, ROOT_SIZE
);
960 spin_lock_irqsave(&iommu
->lock
, flags
);
961 iommu
->root_entry
= root
;
962 spin_unlock_irqrestore(&iommu
->lock
, flags
);
967 static void iommu_set_root_entry(struct intel_iommu
*iommu
)
973 addr
= iommu
->root_entry
;
975 raw_spin_lock_irqsave(&iommu
->register_lock
, flag
);
976 dmar_writeq(iommu
->reg
+ DMAR_RTADDR_REG
, virt_to_phys(addr
));
978 writel(iommu
->gcmd
| DMA_GCMD_SRTP
, iommu
->reg
+ DMAR_GCMD_REG
);
980 /* Make sure hardware complete it */
981 IOMMU_WAIT_OP(iommu
, DMAR_GSTS_REG
,
982 readl
, (sts
& DMA_GSTS_RTPS
), sts
);
984 raw_spin_unlock_irqrestore(&iommu
->register_lock
, flag
);
987 static void iommu_flush_write_buffer(struct intel_iommu
*iommu
)
992 if (!rwbf_quirk
&& !cap_rwbf(iommu
->cap
))
995 raw_spin_lock_irqsave(&iommu
->register_lock
, flag
);
996 writel(iommu
->gcmd
| DMA_GCMD_WBF
, iommu
->reg
+ DMAR_GCMD_REG
);
998 /* Make sure hardware complete it */
999 IOMMU_WAIT_OP(iommu
, DMAR_GSTS_REG
,
1000 readl
, (!(val
& DMA_GSTS_WBFS
)), val
);
1002 raw_spin_unlock_irqrestore(&iommu
->register_lock
, flag
);
1005 /* return value determine if we need a write buffer flush */
1006 static void __iommu_flush_context(struct intel_iommu
*iommu
,
1007 u16 did
, u16 source_id
, u8 function_mask
,
1014 case DMA_CCMD_GLOBAL_INVL
:
1015 val
= DMA_CCMD_GLOBAL_INVL
;
1017 case DMA_CCMD_DOMAIN_INVL
:
1018 val
= DMA_CCMD_DOMAIN_INVL
|DMA_CCMD_DID(did
);
1020 case DMA_CCMD_DEVICE_INVL
:
1021 val
= DMA_CCMD_DEVICE_INVL
|DMA_CCMD_DID(did
)
1022 | DMA_CCMD_SID(source_id
) | DMA_CCMD_FM(function_mask
);
1027 val
|= DMA_CCMD_ICC
;
1029 raw_spin_lock_irqsave(&iommu
->register_lock
, flag
);
1030 dmar_writeq(iommu
->reg
+ DMAR_CCMD_REG
, val
);
1032 /* Make sure hardware complete it */
1033 IOMMU_WAIT_OP(iommu
, DMAR_CCMD_REG
,
1034 dmar_readq
, (!(val
& DMA_CCMD_ICC
)), val
);
1036 raw_spin_unlock_irqrestore(&iommu
->register_lock
, flag
);
1039 /* return value determine if we need a write buffer flush */
1040 static void __iommu_flush_iotlb(struct intel_iommu
*iommu
, u16 did
,
1041 u64 addr
, unsigned int size_order
, u64 type
)
1043 int tlb_offset
= ecap_iotlb_offset(iommu
->ecap
);
1044 u64 val
= 0, val_iva
= 0;
1048 case DMA_TLB_GLOBAL_FLUSH
:
1049 /* global flush doesn't need set IVA_REG */
1050 val
= DMA_TLB_GLOBAL_FLUSH
|DMA_TLB_IVT
;
1052 case DMA_TLB_DSI_FLUSH
:
1053 val
= DMA_TLB_DSI_FLUSH
|DMA_TLB_IVT
|DMA_TLB_DID(did
);
1055 case DMA_TLB_PSI_FLUSH
:
1056 val
= DMA_TLB_PSI_FLUSH
|DMA_TLB_IVT
|DMA_TLB_DID(did
);
1057 /* Note: always flush non-leaf currently */
1058 val_iva
= size_order
| addr
;
1063 /* Note: set drain read/write */
1066 * This is probably to be super secure.. Looks like we can
1067 * ignore it without any impact.
1069 if (cap_read_drain(iommu
->cap
))
1070 val
|= DMA_TLB_READ_DRAIN
;
1072 if (cap_write_drain(iommu
->cap
))
1073 val
|= DMA_TLB_WRITE_DRAIN
;
1075 raw_spin_lock_irqsave(&iommu
->register_lock
, flag
);
1076 /* Note: Only uses first TLB reg currently */
1078 dmar_writeq(iommu
->reg
+ tlb_offset
, val_iva
);
1079 dmar_writeq(iommu
->reg
+ tlb_offset
+ 8, val
);
1081 /* Make sure hardware complete it */
1082 IOMMU_WAIT_OP(iommu
, tlb_offset
+ 8,
1083 dmar_readq
, (!(val
& DMA_TLB_IVT
)), val
);
1085 raw_spin_unlock_irqrestore(&iommu
->register_lock
, flag
);
1087 /* check IOTLB invalidation granularity */
1088 if (DMA_TLB_IAIG(val
) == 0)
1089 printk(KERN_ERR
"IOMMU: flush IOTLB failed\n");
1090 if (DMA_TLB_IAIG(val
) != DMA_TLB_IIRG(type
))
1091 pr_debug("IOMMU: tlb flush request %Lx, actual %Lx\n",
1092 (unsigned long long)DMA_TLB_IIRG(type
),
1093 (unsigned long long)DMA_TLB_IAIG(val
));
1096 static struct device_domain_info
*iommu_support_dev_iotlb(
1097 struct dmar_domain
*domain
, int segment
, u8 bus
, u8 devfn
)
1100 unsigned long flags
;
1101 struct device_domain_info
*info
;
1102 struct intel_iommu
*iommu
= device_to_iommu(segment
, bus
, devfn
);
1104 if (!ecap_dev_iotlb_support(iommu
->ecap
))
1110 spin_lock_irqsave(&device_domain_lock
, flags
);
1111 list_for_each_entry(info
, &domain
->devices
, link
)
1112 if (info
->bus
== bus
&& info
->devfn
== devfn
) {
1116 spin_unlock_irqrestore(&device_domain_lock
, flags
);
1118 if (!found
|| !info
->dev
)
1121 if (!pci_find_ext_capability(info
->dev
, PCI_EXT_CAP_ID_ATS
))
1124 if (!dmar_find_matched_atsr_unit(info
->dev
))
1127 info
->iommu
= iommu
;
1132 static void iommu_enable_dev_iotlb(struct device_domain_info
*info
)
1137 pci_enable_ats(info
->dev
, VTD_PAGE_SHIFT
);
1140 static void iommu_disable_dev_iotlb(struct device_domain_info
*info
)
1142 if (!info
->dev
|| !pci_ats_enabled(info
->dev
))
1145 pci_disable_ats(info
->dev
);
1148 static void iommu_flush_dev_iotlb(struct dmar_domain
*domain
,
1149 u64 addr
, unsigned mask
)
1152 unsigned long flags
;
1153 struct device_domain_info
*info
;
1155 spin_lock_irqsave(&device_domain_lock
, flags
);
1156 list_for_each_entry(info
, &domain
->devices
, link
) {
1157 if (!info
->dev
|| !pci_ats_enabled(info
->dev
))
1160 sid
= info
->bus
<< 8 | info
->devfn
;
1161 qdep
= pci_ats_queue_depth(info
->dev
);
1162 qi_flush_dev_iotlb(info
->iommu
, sid
, qdep
, addr
, mask
);
1164 spin_unlock_irqrestore(&device_domain_lock
, flags
);
1167 static void iommu_flush_iotlb_psi(struct intel_iommu
*iommu
, u16 did
,
1168 unsigned long pfn
, unsigned int pages
, int map
)
1170 unsigned int mask
= ilog2(__roundup_pow_of_two(pages
));
1171 uint64_t addr
= (uint64_t)pfn
<< VTD_PAGE_SHIFT
;
1176 * Fallback to domain selective flush if no PSI support or the size is
1178 * PSI requires page size to be 2 ^ x, and the base address is naturally
1179 * aligned to the size
1181 if (!cap_pgsel_inv(iommu
->cap
) || mask
> cap_max_amask_val(iommu
->cap
))
1182 iommu
->flush
.flush_iotlb(iommu
, did
, 0, 0,
1185 iommu
->flush
.flush_iotlb(iommu
, did
, addr
, mask
,
1189 * In caching mode, changes of pages from non-present to present require
1190 * flush. However, device IOTLB doesn't need to be flushed in this case.
1192 if (!cap_caching_mode(iommu
->cap
) || !map
)
1193 iommu_flush_dev_iotlb(iommu
->domains
[did
], addr
, mask
);
1196 static void iommu_disable_protect_mem_regions(struct intel_iommu
*iommu
)
1199 unsigned long flags
;
1201 raw_spin_lock_irqsave(&iommu
->register_lock
, flags
);
1202 pmen
= readl(iommu
->reg
+ DMAR_PMEN_REG
);
1203 pmen
&= ~DMA_PMEN_EPM
;
1204 writel(pmen
, iommu
->reg
+ DMAR_PMEN_REG
);
1206 /* wait for the protected region status bit to clear */
1207 IOMMU_WAIT_OP(iommu
, DMAR_PMEN_REG
,
1208 readl
, !(pmen
& DMA_PMEN_PRS
), pmen
);
1210 raw_spin_unlock_irqrestore(&iommu
->register_lock
, flags
);
1213 static int iommu_enable_translation(struct intel_iommu
*iommu
)
1216 unsigned long flags
;
1218 raw_spin_lock_irqsave(&iommu
->register_lock
, flags
);
1219 iommu
->gcmd
|= DMA_GCMD_TE
;
1220 writel(iommu
->gcmd
, iommu
->reg
+ DMAR_GCMD_REG
);
1222 /* Make sure hardware complete it */
1223 IOMMU_WAIT_OP(iommu
, DMAR_GSTS_REG
,
1224 readl
, (sts
& DMA_GSTS_TES
), sts
);
1226 raw_spin_unlock_irqrestore(&iommu
->register_lock
, flags
);
1230 static int iommu_disable_translation(struct intel_iommu
*iommu
)
1235 raw_spin_lock_irqsave(&iommu
->register_lock
, flag
);
1236 iommu
->gcmd
&= ~DMA_GCMD_TE
;
1237 writel(iommu
->gcmd
, iommu
->reg
+ DMAR_GCMD_REG
);
1239 /* Make sure hardware complete it */
1240 IOMMU_WAIT_OP(iommu
, DMAR_GSTS_REG
,
1241 readl
, (!(sts
& DMA_GSTS_TES
)), sts
);
1243 raw_spin_unlock_irqrestore(&iommu
->register_lock
, flag
);
1248 static int iommu_init_domains(struct intel_iommu
*iommu
)
1250 unsigned long ndomains
;
1251 unsigned long nlongs
;
1253 ndomains
= cap_ndoms(iommu
->cap
);
1254 pr_debug("IOMMU %d: Number of Domains supported <%ld>\n", iommu
->seq_id
,
1256 nlongs
= BITS_TO_LONGS(ndomains
);
1258 spin_lock_init(&iommu
->lock
);
1260 /* TBD: there might be 64K domains,
1261 * consider other allocation for future chip
1263 iommu
->domain_ids
= kcalloc(nlongs
, sizeof(unsigned long), GFP_KERNEL
);
1264 if (!iommu
->domain_ids
) {
1265 printk(KERN_ERR
"Allocating domain id array failed\n");
1268 iommu
->domains
= kcalloc(ndomains
, sizeof(struct dmar_domain
*),
1270 if (!iommu
->domains
) {
1271 printk(KERN_ERR
"Allocating domain array failed\n");
1276 * if Caching mode is set, then invalid translations are tagged
1277 * with domainid 0. Hence we need to pre-allocate it.
1279 if (cap_caching_mode(iommu
->cap
))
1280 set_bit(0, iommu
->domain_ids
);
1285 static void domain_exit(struct dmar_domain
*domain
);
1286 static void vm_domain_exit(struct dmar_domain
*domain
);
1288 void free_dmar_iommu(struct intel_iommu
*iommu
)
1290 struct dmar_domain
*domain
;
1292 unsigned long flags
;
1294 if ((iommu
->domains
) && (iommu
->domain_ids
)) {
1295 for_each_set_bit(i
, iommu
->domain_ids
, cap_ndoms(iommu
->cap
)) {
1296 domain
= iommu
->domains
[i
];
1297 clear_bit(i
, iommu
->domain_ids
);
1299 spin_lock_irqsave(&domain
->iommu_lock
, flags
);
1300 if (--domain
->iommu_count
== 0) {
1301 if (domain
->flags
& DOMAIN_FLAG_VIRTUAL_MACHINE
)
1302 vm_domain_exit(domain
);
1304 domain_exit(domain
);
1306 spin_unlock_irqrestore(&domain
->iommu_lock
, flags
);
1310 if (iommu
->gcmd
& DMA_GCMD_TE
)
1311 iommu_disable_translation(iommu
);
1314 irq_set_handler_data(iommu
->irq
, NULL
);
1315 /* This will mask the irq */
1316 free_irq(iommu
->irq
, iommu
);
1317 destroy_irq(iommu
->irq
);
1320 kfree(iommu
->domains
);
1321 kfree(iommu
->domain_ids
);
1323 g_iommus
[iommu
->seq_id
] = NULL
;
1325 /* if all iommus are freed, free g_iommus */
1326 for (i
= 0; i
< g_num_of_iommus
; i
++) {
1331 if (i
== g_num_of_iommus
)
1334 /* free context mapping */
1335 free_context_table(iommu
);
1338 static struct dmar_domain
*alloc_domain(void)
1340 struct dmar_domain
*domain
;
1342 domain
= alloc_domain_mem();
1347 memset(domain
->iommu_bmp
, 0, sizeof(domain
->iommu_bmp
));
1353 static int iommu_attach_domain(struct dmar_domain
*domain
,
1354 struct intel_iommu
*iommu
)
1357 unsigned long ndomains
;
1358 unsigned long flags
;
1360 ndomains
= cap_ndoms(iommu
->cap
);
1362 spin_lock_irqsave(&iommu
->lock
, flags
);
1364 num
= find_first_zero_bit(iommu
->domain_ids
, ndomains
);
1365 if (num
>= ndomains
) {
1366 spin_unlock_irqrestore(&iommu
->lock
, flags
);
1367 printk(KERN_ERR
"IOMMU: no free domain ids\n");
1372 set_bit(num
, iommu
->domain_ids
);
1373 set_bit(iommu
->seq_id
, domain
->iommu_bmp
);
1374 iommu
->domains
[num
] = domain
;
1375 spin_unlock_irqrestore(&iommu
->lock
, flags
);
1380 static void iommu_detach_domain(struct dmar_domain
*domain
,
1381 struct intel_iommu
*iommu
)
1383 unsigned long flags
;
1387 spin_lock_irqsave(&iommu
->lock
, flags
);
1388 ndomains
= cap_ndoms(iommu
->cap
);
1389 for_each_set_bit(num
, iommu
->domain_ids
, ndomains
) {
1390 if (iommu
->domains
[num
] == domain
) {
1397 clear_bit(num
, iommu
->domain_ids
);
1398 clear_bit(iommu
->seq_id
, domain
->iommu_bmp
);
1399 iommu
->domains
[num
] = NULL
;
1401 spin_unlock_irqrestore(&iommu
->lock
, flags
);
1404 static struct iova_domain reserved_iova_list
;
1405 static struct lock_class_key reserved_rbtree_key
;
1407 static int dmar_init_reserved_ranges(void)
1409 struct pci_dev
*pdev
= NULL
;
1413 init_iova_domain(&reserved_iova_list
, DMA_32BIT_PFN
);
1415 lockdep_set_class(&reserved_iova_list
.iova_rbtree_lock
,
1416 &reserved_rbtree_key
);
1418 /* IOAPIC ranges shouldn't be accessed by DMA */
1419 iova
= reserve_iova(&reserved_iova_list
, IOVA_PFN(IOAPIC_RANGE_START
),
1420 IOVA_PFN(IOAPIC_RANGE_END
));
1422 printk(KERN_ERR
"Reserve IOAPIC range failed\n");
1426 /* Reserve all PCI MMIO to avoid peer-to-peer access */
1427 for_each_pci_dev(pdev
) {
1430 for (i
= 0; i
< PCI_NUM_RESOURCES
; i
++) {
1431 r
= &pdev
->resource
[i
];
1432 if (!r
->flags
|| !(r
->flags
& IORESOURCE_MEM
))
1434 iova
= reserve_iova(&reserved_iova_list
,
1438 printk(KERN_ERR
"Reserve iova failed\n");
1446 static void domain_reserve_special_ranges(struct dmar_domain
*domain
)
1448 copy_reserved_iova(&reserved_iova_list
, &domain
->iovad
);
1451 static inline int guestwidth_to_adjustwidth(int gaw
)
1454 int r
= (gaw
- 12) % 9;
1465 static int domain_init(struct dmar_domain
*domain
, int guest_width
)
1467 struct intel_iommu
*iommu
;
1468 int adjust_width
, agaw
;
1469 unsigned long sagaw
;
1471 init_iova_domain(&domain
->iovad
, DMA_32BIT_PFN
);
1472 spin_lock_init(&domain
->iommu_lock
);
1474 domain_reserve_special_ranges(domain
);
1476 /* calculate AGAW */
1477 iommu
= domain_get_iommu(domain
);
1478 if (guest_width
> cap_mgaw(iommu
->cap
))
1479 guest_width
= cap_mgaw(iommu
->cap
);
1480 domain
->gaw
= guest_width
;
1481 adjust_width
= guestwidth_to_adjustwidth(guest_width
);
1482 agaw
= width_to_agaw(adjust_width
);
1483 sagaw
= cap_sagaw(iommu
->cap
);
1484 if (!test_bit(agaw
, &sagaw
)) {
1485 /* hardware doesn't support it, choose a bigger one */
1486 pr_debug("IOMMU: hardware doesn't support agaw %d\n", agaw
);
1487 agaw
= find_next_bit(&sagaw
, 5, agaw
);
1491 domain
->agaw
= agaw
;
1492 INIT_LIST_HEAD(&domain
->devices
);
1494 if (ecap_coherent(iommu
->ecap
))
1495 domain
->iommu_coherency
= 1;
1497 domain
->iommu_coherency
= 0;
1499 if (ecap_sc_support(iommu
->ecap
))
1500 domain
->iommu_snooping
= 1;
1502 domain
->iommu_snooping
= 0;
1504 domain
->iommu_superpage
= fls(cap_super_page_val(iommu
->cap
));
1505 domain
->iommu_count
= 1;
1506 domain
->nid
= iommu
->node
;
1508 /* always allocate the top pgd */
1509 domain
->pgd
= (struct dma_pte
*)alloc_pgtable_page(domain
->nid
);
1512 __iommu_flush_cache(iommu
, domain
->pgd
, PAGE_SIZE
);
1516 static void domain_exit(struct dmar_domain
*domain
)
1518 struct dmar_drhd_unit
*drhd
;
1519 struct intel_iommu
*iommu
;
1521 /* Domain 0 is reserved, so dont process it */
1525 /* Flush any lazy unmaps that may reference this domain */
1526 if (!intel_iommu_strict
)
1527 flush_unmaps_timeout(0);
1529 domain_remove_dev_info(domain
);
1531 put_iova_domain(&domain
->iovad
);
1534 dma_pte_clear_range(domain
, 0, DOMAIN_MAX_PFN(domain
->gaw
));
1536 /* free page tables */
1537 dma_pte_free_pagetable(domain
, 0, DOMAIN_MAX_PFN(domain
->gaw
));
1539 for_each_active_iommu(iommu
, drhd
)
1540 if (test_bit(iommu
->seq_id
, domain
->iommu_bmp
))
1541 iommu_detach_domain(domain
, iommu
);
1543 free_domain_mem(domain
);
1546 static int domain_context_mapping_one(struct dmar_domain
*domain
, int segment
,
1547 u8 bus
, u8 devfn
, int translation
)
1549 struct context_entry
*context
;
1550 unsigned long flags
;
1551 struct intel_iommu
*iommu
;
1552 struct dma_pte
*pgd
;
1554 unsigned long ndomains
;
1557 struct device_domain_info
*info
= NULL
;
1559 pr_debug("Set context mapping for %02x:%02x.%d\n",
1560 bus
, PCI_SLOT(devfn
), PCI_FUNC(devfn
));
1562 BUG_ON(!domain
->pgd
);
1563 BUG_ON(translation
!= CONTEXT_TT_PASS_THROUGH
&&
1564 translation
!= CONTEXT_TT_MULTI_LEVEL
);
1566 iommu
= device_to_iommu(segment
, bus
, devfn
);
1570 context
= device_to_context_entry(iommu
, bus
, devfn
);
1573 spin_lock_irqsave(&iommu
->lock
, flags
);
1574 if (context_present(context
)) {
1575 spin_unlock_irqrestore(&iommu
->lock
, flags
);
1582 if (domain
->flags
& DOMAIN_FLAG_VIRTUAL_MACHINE
||
1583 domain
->flags
& DOMAIN_FLAG_STATIC_IDENTITY
) {
1586 /* find an available domain id for this device in iommu */
1587 ndomains
= cap_ndoms(iommu
->cap
);
1588 for_each_set_bit(num
, iommu
->domain_ids
, ndomains
) {
1589 if (iommu
->domains
[num
] == domain
) {
1597 num
= find_first_zero_bit(iommu
->domain_ids
, ndomains
);
1598 if (num
>= ndomains
) {
1599 spin_unlock_irqrestore(&iommu
->lock
, flags
);
1600 printk(KERN_ERR
"IOMMU: no free domain ids\n");
1604 set_bit(num
, iommu
->domain_ids
);
1605 iommu
->domains
[num
] = domain
;
1609 /* Skip top levels of page tables for
1610 * iommu which has less agaw than default.
1611 * Unnecessary for PT mode.
1613 if (translation
!= CONTEXT_TT_PASS_THROUGH
) {
1614 for (agaw
= domain
->agaw
; agaw
!= iommu
->agaw
; agaw
--) {
1615 pgd
= phys_to_virt(dma_pte_addr(pgd
));
1616 if (!dma_pte_present(pgd
)) {
1617 spin_unlock_irqrestore(&iommu
->lock
, flags
);
1624 context_set_domain_id(context
, id
);
1626 if (translation
!= CONTEXT_TT_PASS_THROUGH
) {
1627 info
= iommu_support_dev_iotlb(domain
, segment
, bus
, devfn
);
1628 translation
= info
? CONTEXT_TT_DEV_IOTLB
:
1629 CONTEXT_TT_MULTI_LEVEL
;
1632 * In pass through mode, AW must be programmed to indicate the largest
1633 * AGAW value supported by hardware. And ASR is ignored by hardware.
1635 if (unlikely(translation
== CONTEXT_TT_PASS_THROUGH
))
1636 context_set_address_width(context
, iommu
->msagaw
);
1638 context_set_address_root(context
, virt_to_phys(pgd
));
1639 context_set_address_width(context
, iommu
->agaw
);
1642 context_set_translation_type(context
, translation
);
1643 context_set_fault_enable(context
);
1644 context_set_present(context
);
1645 domain_flush_cache(domain
, context
, sizeof(*context
));
1648 * It's a non-present to present mapping. If hardware doesn't cache
1649 * non-present entry we only need to flush the write-buffer. If the
1650 * _does_ cache non-present entries, then it does so in the special
1651 * domain #0, which we have to flush:
1653 if (cap_caching_mode(iommu
->cap
)) {
1654 iommu
->flush
.flush_context(iommu
, 0,
1655 (((u16
)bus
) << 8) | devfn
,
1656 DMA_CCMD_MASK_NOBIT
,
1657 DMA_CCMD_DEVICE_INVL
);
1658 iommu
->flush
.flush_iotlb(iommu
, domain
->id
, 0, 0, DMA_TLB_DSI_FLUSH
);
1660 iommu_flush_write_buffer(iommu
);
1662 iommu_enable_dev_iotlb(info
);
1663 spin_unlock_irqrestore(&iommu
->lock
, flags
);
1665 spin_lock_irqsave(&domain
->iommu_lock
, flags
);
1666 if (!test_and_set_bit(iommu
->seq_id
, domain
->iommu_bmp
)) {
1667 domain
->iommu_count
++;
1668 if (domain
->iommu_count
== 1)
1669 domain
->nid
= iommu
->node
;
1670 domain_update_iommu_cap(domain
);
1672 spin_unlock_irqrestore(&domain
->iommu_lock
, flags
);
1677 domain_context_mapping(struct dmar_domain
*domain
, struct pci_dev
*pdev
,
1681 struct pci_dev
*tmp
, *parent
;
1683 ret
= domain_context_mapping_one(domain
, pci_domain_nr(pdev
->bus
),
1684 pdev
->bus
->number
, pdev
->devfn
,
1689 /* dependent device mapping */
1690 tmp
= pci_find_upstream_pcie_bridge(pdev
);
1693 /* Secondary interface's bus number and devfn 0 */
1694 parent
= pdev
->bus
->self
;
1695 while (parent
!= tmp
) {
1696 ret
= domain_context_mapping_one(domain
,
1697 pci_domain_nr(parent
->bus
),
1698 parent
->bus
->number
,
1699 parent
->devfn
, translation
);
1702 parent
= parent
->bus
->self
;
1704 if (pci_is_pcie(tmp
)) /* this is a PCIe-to-PCI bridge */
1705 return domain_context_mapping_one(domain
,
1706 pci_domain_nr(tmp
->subordinate
),
1707 tmp
->subordinate
->number
, 0,
1709 else /* this is a legacy PCI bridge */
1710 return domain_context_mapping_one(domain
,
1711 pci_domain_nr(tmp
->bus
),
1717 static int domain_context_mapped(struct pci_dev
*pdev
)
1720 struct pci_dev
*tmp
, *parent
;
1721 struct intel_iommu
*iommu
;
1723 iommu
= device_to_iommu(pci_domain_nr(pdev
->bus
), pdev
->bus
->number
,
1728 ret
= device_context_mapped(iommu
, pdev
->bus
->number
, pdev
->devfn
);
1731 /* dependent device mapping */
1732 tmp
= pci_find_upstream_pcie_bridge(pdev
);
1735 /* Secondary interface's bus number and devfn 0 */
1736 parent
= pdev
->bus
->self
;
1737 while (parent
!= tmp
) {
1738 ret
= device_context_mapped(iommu
, parent
->bus
->number
,
1742 parent
= parent
->bus
->self
;
1744 if (pci_is_pcie(tmp
))
1745 return device_context_mapped(iommu
, tmp
->subordinate
->number
,
1748 return device_context_mapped(iommu
, tmp
->bus
->number
,
1752 /* Returns a number of VTD pages, but aligned to MM page size */
1753 static inline unsigned long aligned_nrpages(unsigned long host_addr
,
1756 host_addr
&= ~PAGE_MASK
;
1757 return PAGE_ALIGN(host_addr
+ size
) >> VTD_PAGE_SHIFT
;
1760 /* Return largest possible superpage level for a given mapping */
1761 static inline int hardware_largepage_caps(struct dmar_domain
*domain
,
1762 unsigned long iov_pfn
,
1763 unsigned long phy_pfn
,
1764 unsigned long pages
)
1766 int support
, level
= 1;
1767 unsigned long pfnmerge
;
1769 support
= domain
->iommu_superpage
;
1771 /* To use a large page, the virtual *and* physical addresses
1772 must be aligned to 2MiB/1GiB/etc. Lower bits set in either
1773 of them will mean we have to use smaller pages. So just
1774 merge them and check both at once. */
1775 pfnmerge
= iov_pfn
| phy_pfn
;
1777 while (support
&& !(pfnmerge
& ~VTD_STRIDE_MASK
)) {
1778 pages
>>= VTD_STRIDE_SHIFT
;
1781 pfnmerge
>>= VTD_STRIDE_SHIFT
;
1788 static int __domain_mapping(struct dmar_domain
*domain
, unsigned long iov_pfn
,
1789 struct scatterlist
*sg
, unsigned long phys_pfn
,
1790 unsigned long nr_pages
, int prot
)
1792 struct dma_pte
*first_pte
= NULL
, *pte
= NULL
;
1793 phys_addr_t
uninitialized_var(pteval
);
1794 int addr_width
= agaw_to_width(domain
->agaw
) - VTD_PAGE_SHIFT
;
1795 unsigned long sg_res
;
1796 unsigned int largepage_lvl
= 0;
1797 unsigned long lvl_pages
= 0;
1799 BUG_ON(addr_width
< BITS_PER_LONG
&& (iov_pfn
+ nr_pages
- 1) >> addr_width
);
1801 if ((prot
& (DMA_PTE_READ
|DMA_PTE_WRITE
)) == 0)
1804 prot
&= DMA_PTE_READ
| DMA_PTE_WRITE
| DMA_PTE_SNP
;
1809 sg_res
= nr_pages
+ 1;
1810 pteval
= ((phys_addr_t
)phys_pfn
<< VTD_PAGE_SHIFT
) | prot
;
1813 while (nr_pages
> 0) {
1817 sg_res
= aligned_nrpages(sg
->offset
, sg
->length
);
1818 sg
->dma_address
= ((dma_addr_t
)iov_pfn
<< VTD_PAGE_SHIFT
) + sg
->offset
;
1819 sg
->dma_length
= sg
->length
;
1820 pteval
= page_to_phys(sg_page(sg
)) | prot
;
1821 phys_pfn
= pteval
>> VTD_PAGE_SHIFT
;
1825 largepage_lvl
= hardware_largepage_caps(domain
, iov_pfn
, phys_pfn
, sg_res
);
1827 first_pte
= pte
= pfn_to_dma_pte(domain
, iov_pfn
, largepage_lvl
);
1830 /* It is large page*/
1831 if (largepage_lvl
> 1) {
1832 pteval
|= DMA_PTE_LARGE_PAGE
;
1833 /* Ensure that old small page tables are removed to make room
1834 for superpage, if they exist. */
1835 dma_pte_clear_range(domain
, iov_pfn
,
1836 iov_pfn
+ lvl_to_nr_pages(largepage_lvl
) - 1);
1837 dma_pte_free_pagetable(domain
, iov_pfn
,
1838 iov_pfn
+ lvl_to_nr_pages(largepage_lvl
) - 1);
1840 pteval
&= ~(uint64_t)DMA_PTE_LARGE_PAGE
;
1844 /* We don't need lock here, nobody else
1845 * touches the iova range
1847 tmp
= cmpxchg64_local(&pte
->val
, 0ULL, pteval
);
1849 static int dumps
= 5;
1850 printk(KERN_CRIT
"ERROR: DMA PTE for vPFN 0x%lx already set (to %llx not %llx)\n",
1851 iov_pfn
, tmp
, (unsigned long long)pteval
);
1854 debug_dma_dump_mappings(NULL
);
1859 lvl_pages
= lvl_to_nr_pages(largepage_lvl
);
1861 BUG_ON(nr_pages
< lvl_pages
);
1862 BUG_ON(sg_res
< lvl_pages
);
1864 nr_pages
-= lvl_pages
;
1865 iov_pfn
+= lvl_pages
;
1866 phys_pfn
+= lvl_pages
;
1867 pteval
+= lvl_pages
* VTD_PAGE_SIZE
;
1868 sg_res
-= lvl_pages
;
1870 /* If the next PTE would be the first in a new page, then we
1871 need to flush the cache on the entries we've just written.
1872 And then we'll need to recalculate 'pte', so clear it and
1873 let it get set again in the if (!pte) block above.
1875 If we're done (!nr_pages) we need to flush the cache too.
1877 Also if we've been setting superpages, we may need to
1878 recalculate 'pte' and switch back to smaller pages for the
1879 end of the mapping, if the trailing size is not enough to
1880 use another superpage (i.e. sg_res < lvl_pages). */
1882 if (!nr_pages
|| first_pte_in_page(pte
) ||
1883 (largepage_lvl
> 1 && sg_res
< lvl_pages
)) {
1884 domain_flush_cache(domain
, first_pte
,
1885 (void *)pte
- (void *)first_pte
);
1889 if (!sg_res
&& nr_pages
)
1895 static inline int domain_sg_mapping(struct dmar_domain
*domain
, unsigned long iov_pfn
,
1896 struct scatterlist
*sg
, unsigned long nr_pages
,
1899 return __domain_mapping(domain
, iov_pfn
, sg
, 0, nr_pages
, prot
);
1902 static inline int domain_pfn_mapping(struct dmar_domain
*domain
, unsigned long iov_pfn
,
1903 unsigned long phys_pfn
, unsigned long nr_pages
,
1906 return __domain_mapping(domain
, iov_pfn
, NULL
, phys_pfn
, nr_pages
, prot
);
1909 static void iommu_detach_dev(struct intel_iommu
*iommu
, u8 bus
, u8 devfn
)
1914 clear_context_table(iommu
, bus
, devfn
);
1915 iommu
->flush
.flush_context(iommu
, 0, 0, 0,
1916 DMA_CCMD_GLOBAL_INVL
);
1917 iommu
->flush
.flush_iotlb(iommu
, 0, 0, 0, DMA_TLB_GLOBAL_FLUSH
);
1920 static void domain_remove_dev_info(struct dmar_domain
*domain
)
1922 struct device_domain_info
*info
;
1923 unsigned long flags
;
1924 struct intel_iommu
*iommu
;
1926 spin_lock_irqsave(&device_domain_lock
, flags
);
1927 while (!list_empty(&domain
->devices
)) {
1928 info
= list_entry(domain
->devices
.next
,
1929 struct device_domain_info
, link
);
1930 list_del(&info
->link
);
1931 list_del(&info
->global
);
1933 info
->dev
->dev
.archdata
.iommu
= NULL
;
1934 spin_unlock_irqrestore(&device_domain_lock
, flags
);
1936 iommu_disable_dev_iotlb(info
);
1937 iommu
= device_to_iommu(info
->segment
, info
->bus
, info
->devfn
);
1938 iommu_detach_dev(iommu
, info
->bus
, info
->devfn
);
1939 free_devinfo_mem(info
);
1941 spin_lock_irqsave(&device_domain_lock
, flags
);
1943 spin_unlock_irqrestore(&device_domain_lock
, flags
);
1948 * Note: we use struct pci_dev->dev.archdata.iommu stores the info
1950 static struct dmar_domain
*
1951 find_domain(struct pci_dev
*pdev
)
1953 struct device_domain_info
*info
;
1955 /* No lock here, assumes no domain exit in normal case */
1956 info
= pdev
->dev
.archdata
.iommu
;
1958 return info
->domain
;
1962 /* domain is initialized */
1963 static struct dmar_domain
*get_domain_for_dev(struct pci_dev
*pdev
, int gaw
)
1965 struct dmar_domain
*domain
, *found
= NULL
;
1966 struct intel_iommu
*iommu
;
1967 struct dmar_drhd_unit
*drhd
;
1968 struct device_domain_info
*info
, *tmp
;
1969 struct pci_dev
*dev_tmp
;
1970 unsigned long flags
;
1971 int bus
= 0, devfn
= 0;
1975 domain
= find_domain(pdev
);
1979 segment
= pci_domain_nr(pdev
->bus
);
1981 dev_tmp
= pci_find_upstream_pcie_bridge(pdev
);
1983 if (pci_is_pcie(dev_tmp
)) {
1984 bus
= dev_tmp
->subordinate
->number
;
1987 bus
= dev_tmp
->bus
->number
;
1988 devfn
= dev_tmp
->devfn
;
1990 spin_lock_irqsave(&device_domain_lock
, flags
);
1991 list_for_each_entry(info
, &device_domain_list
, global
) {
1992 if (info
->segment
== segment
&&
1993 info
->bus
== bus
&& info
->devfn
== devfn
) {
1994 found
= info
->domain
;
1998 spin_unlock_irqrestore(&device_domain_lock
, flags
);
1999 /* pcie-pci bridge already has a domain, uses it */
2006 domain
= alloc_domain();
2010 /* Allocate new domain for the device */
2011 drhd
= dmar_find_matched_drhd_unit(pdev
);
2013 printk(KERN_ERR
"IOMMU: can't find DMAR for device %s\n",
2017 iommu
= drhd
->iommu
;
2019 ret
= iommu_attach_domain(domain
, iommu
);
2021 free_domain_mem(domain
);
2025 if (domain_init(domain
, gaw
)) {
2026 domain_exit(domain
);
2030 /* register pcie-to-pci device */
2032 info
= alloc_devinfo_mem();
2034 domain_exit(domain
);
2037 info
->segment
= segment
;
2039 info
->devfn
= devfn
;
2041 info
->domain
= domain
;
2042 /* This domain is shared by devices under p2p bridge */
2043 domain
->flags
|= DOMAIN_FLAG_P2P_MULTIPLE_DEVICES
;
2045 /* pcie-to-pci bridge already has a domain, uses it */
2047 spin_lock_irqsave(&device_domain_lock
, flags
);
2048 list_for_each_entry(tmp
, &device_domain_list
, global
) {
2049 if (tmp
->segment
== segment
&&
2050 tmp
->bus
== bus
&& tmp
->devfn
== devfn
) {
2051 found
= tmp
->domain
;
2056 spin_unlock_irqrestore(&device_domain_lock
, flags
);
2057 free_devinfo_mem(info
);
2058 domain_exit(domain
);
2061 list_add(&info
->link
, &domain
->devices
);
2062 list_add(&info
->global
, &device_domain_list
);
2063 spin_unlock_irqrestore(&device_domain_lock
, flags
);
2068 info
= alloc_devinfo_mem();
2071 info
->segment
= segment
;
2072 info
->bus
= pdev
->bus
->number
;
2073 info
->devfn
= pdev
->devfn
;
2075 info
->domain
= domain
;
2076 spin_lock_irqsave(&device_domain_lock
, flags
);
2077 /* somebody is fast */
2078 found
= find_domain(pdev
);
2079 if (found
!= NULL
) {
2080 spin_unlock_irqrestore(&device_domain_lock
, flags
);
2081 if (found
!= domain
) {
2082 domain_exit(domain
);
2085 free_devinfo_mem(info
);
2088 list_add(&info
->link
, &domain
->devices
);
2089 list_add(&info
->global
, &device_domain_list
);
2090 pdev
->dev
.archdata
.iommu
= info
;
2091 spin_unlock_irqrestore(&device_domain_lock
, flags
);
2094 /* recheck it here, maybe others set it */
2095 return find_domain(pdev
);
2098 static int iommu_identity_mapping
;
2099 #define IDENTMAP_ALL 1
2100 #define IDENTMAP_GFX 2
2101 #define IDENTMAP_AZALIA 4
2103 static int iommu_domain_identity_map(struct dmar_domain
*domain
,
2104 unsigned long long start
,
2105 unsigned long long end
)
2107 unsigned long first_vpfn
= start
>> VTD_PAGE_SHIFT
;
2108 unsigned long last_vpfn
= end
>> VTD_PAGE_SHIFT
;
2110 if (!reserve_iova(&domain
->iovad
, dma_to_mm_pfn(first_vpfn
),
2111 dma_to_mm_pfn(last_vpfn
))) {
2112 printk(KERN_ERR
"IOMMU: reserve iova failed\n");
2116 pr_debug("Mapping reserved region %llx-%llx for domain %d\n",
2117 start
, end
, domain
->id
);
2119 * RMRR range might have overlap with physical memory range,
2122 dma_pte_clear_range(domain
, first_vpfn
, last_vpfn
);
2124 return domain_pfn_mapping(domain
, first_vpfn
, first_vpfn
,
2125 last_vpfn
- first_vpfn
+ 1,
2126 DMA_PTE_READ
|DMA_PTE_WRITE
);
2129 static int iommu_prepare_identity_map(struct pci_dev
*pdev
,
2130 unsigned long long start
,
2131 unsigned long long end
)
2133 struct dmar_domain
*domain
;
2136 domain
= get_domain_for_dev(pdev
, DEFAULT_DOMAIN_ADDRESS_WIDTH
);
2140 /* For _hardware_ passthrough, don't bother. But for software
2141 passthrough, we do it anyway -- it may indicate a memory
2142 range which is reserved in E820, so which didn't get set
2143 up to start with in si_domain */
2144 if (domain
== si_domain
&& hw_pass_through
) {
2145 printk("Ignoring identity map for HW passthrough device %s [0x%Lx - 0x%Lx]\n",
2146 pci_name(pdev
), start
, end
);
2151 "IOMMU: Setting identity map for device %s [0x%Lx - 0x%Lx]\n",
2152 pci_name(pdev
), start
, end
);
2155 WARN(1, "Your BIOS is broken; RMRR ends before it starts!\n"
2156 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
2157 dmi_get_system_info(DMI_BIOS_VENDOR
),
2158 dmi_get_system_info(DMI_BIOS_VERSION
),
2159 dmi_get_system_info(DMI_PRODUCT_VERSION
));
2164 if (end
>> agaw_to_width(domain
->agaw
)) {
2165 WARN(1, "Your BIOS is broken; RMRR exceeds permitted address width (%d bits)\n"
2166 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
2167 agaw_to_width(domain
->agaw
),
2168 dmi_get_system_info(DMI_BIOS_VENDOR
),
2169 dmi_get_system_info(DMI_BIOS_VERSION
),
2170 dmi_get_system_info(DMI_PRODUCT_VERSION
));
2175 ret
= iommu_domain_identity_map(domain
, start
, end
);
2179 /* context entry init */
2180 ret
= domain_context_mapping(domain
, pdev
, CONTEXT_TT_MULTI_LEVEL
);
2187 domain_exit(domain
);
2191 static inline int iommu_prepare_rmrr_dev(struct dmar_rmrr_unit
*rmrr
,
2192 struct pci_dev
*pdev
)
2194 if (pdev
->dev
.archdata
.iommu
== DUMMY_DEVICE_DOMAIN_INFO
)
2196 return iommu_prepare_identity_map(pdev
, rmrr
->base_address
,
2200 #ifdef CONFIG_INTEL_IOMMU_FLOPPY_WA
2201 static inline void iommu_prepare_isa(void)
2203 struct pci_dev
*pdev
;
2206 pdev
= pci_get_class(PCI_CLASS_BRIDGE_ISA
<< 8, NULL
);
2210 printk(KERN_INFO
"IOMMU: Prepare 0-16MiB unity mapping for LPC\n");
2211 ret
= iommu_prepare_identity_map(pdev
, 0, 16*1024*1024 - 1);
2214 printk(KERN_ERR
"IOMMU: Failed to create 0-16MiB identity map; "
2215 "floppy might not work\n");
2219 static inline void iommu_prepare_isa(void)
2223 #endif /* !CONFIG_INTEL_IOMMU_FLPY_WA */
2225 static int md_domain_init(struct dmar_domain
*domain
, int guest_width
);
2227 static int __init
si_domain_init(int hw
)
2229 struct dmar_drhd_unit
*drhd
;
2230 struct intel_iommu
*iommu
;
2233 si_domain
= alloc_domain();
2237 pr_debug("Identity mapping domain is domain %d\n", si_domain
->id
);
2239 for_each_active_iommu(iommu
, drhd
) {
2240 ret
= iommu_attach_domain(si_domain
, iommu
);
2242 domain_exit(si_domain
);
2247 if (md_domain_init(si_domain
, DEFAULT_DOMAIN_ADDRESS_WIDTH
)) {
2248 domain_exit(si_domain
);
2252 si_domain
->flags
= DOMAIN_FLAG_STATIC_IDENTITY
;
2257 for_each_online_node(nid
) {
2258 unsigned long start_pfn
, end_pfn
;
2261 for_each_mem_pfn_range(i
, nid
, &start_pfn
, &end_pfn
, NULL
) {
2262 ret
= iommu_domain_identity_map(si_domain
,
2263 PFN_PHYS(start_pfn
), PFN_PHYS(end_pfn
));
2272 static void domain_remove_one_dev_info(struct dmar_domain
*domain
,
2273 struct pci_dev
*pdev
);
2274 static int identity_mapping(struct pci_dev
*pdev
)
2276 struct device_domain_info
*info
;
2278 if (likely(!iommu_identity_mapping
))
2281 info
= pdev
->dev
.archdata
.iommu
;
2282 if (info
&& info
!= DUMMY_DEVICE_DOMAIN_INFO
)
2283 return (info
->domain
== si_domain
);
2288 static int domain_add_dev_info(struct dmar_domain
*domain
,
2289 struct pci_dev
*pdev
,
2292 struct device_domain_info
*info
;
2293 unsigned long flags
;
2296 info
= alloc_devinfo_mem();
2300 info
->segment
= pci_domain_nr(pdev
->bus
);
2301 info
->bus
= pdev
->bus
->number
;
2302 info
->devfn
= pdev
->devfn
;
2304 info
->domain
= domain
;
2306 spin_lock_irqsave(&device_domain_lock
, flags
);
2307 list_add(&info
->link
, &domain
->devices
);
2308 list_add(&info
->global
, &device_domain_list
);
2309 pdev
->dev
.archdata
.iommu
= info
;
2310 spin_unlock_irqrestore(&device_domain_lock
, flags
);
2312 ret
= domain_context_mapping(domain
, pdev
, translation
);
2314 spin_lock_irqsave(&device_domain_lock
, flags
);
2315 list_del(&info
->link
);
2316 list_del(&info
->global
);
2317 pdev
->dev
.archdata
.iommu
= NULL
;
2318 spin_unlock_irqrestore(&device_domain_lock
, flags
);
2319 free_devinfo_mem(info
);
2326 static bool device_has_rmrr(struct pci_dev
*dev
)
2328 struct dmar_rmrr_unit
*rmrr
;
2331 for_each_rmrr_units(rmrr
) {
2332 for (i
= 0; i
< rmrr
->devices_cnt
; i
++) {
2334 * Return TRUE if this RMRR contains the device that
2337 if (rmrr
->devices
[i
] == dev
)
2344 static int iommu_should_identity_map(struct pci_dev
*pdev
, int startup
)
2348 * We want to prevent any device associated with an RMRR from
2349 * getting placed into the SI Domain. This is done because
2350 * problems exist when devices are moved in and out of domains
2351 * and their respective RMRR info is lost. We exempt USB devices
2352 * from this process due to their usage of RMRRs that are known
2353 * to not be needed after BIOS hand-off to OS.
2355 if (device_has_rmrr(pdev
) &&
2356 (pdev
->class >> 8) != PCI_CLASS_SERIAL_USB
)
2359 if ((iommu_identity_mapping
& IDENTMAP_AZALIA
) && IS_AZALIA(pdev
))
2362 if ((iommu_identity_mapping
& IDENTMAP_GFX
) && IS_GFX_DEVICE(pdev
))
2365 if (!(iommu_identity_mapping
& IDENTMAP_ALL
))
2369 * We want to start off with all devices in the 1:1 domain, and
2370 * take them out later if we find they can't access all of memory.
2372 * However, we can't do this for PCI devices behind bridges,
2373 * because all PCI devices behind the same bridge will end up
2374 * with the same source-id on their transactions.
2376 * Practically speaking, we can't change things around for these
2377 * devices at run-time, because we can't be sure there'll be no
2378 * DMA transactions in flight for any of their siblings.
2380 * So PCI devices (unless they're on the root bus) as well as
2381 * their parent PCI-PCI or PCIe-PCI bridges must be left _out_ of
2382 * the 1:1 domain, just in _case_ one of their siblings turns out
2383 * not to be able to map all of memory.
2385 if (!pci_is_pcie(pdev
)) {
2386 if (!pci_is_root_bus(pdev
->bus
))
2388 if (pdev
->class >> 8 == PCI_CLASS_BRIDGE_PCI
)
2390 } else if (pdev
->pcie_type
== PCI_EXP_TYPE_PCI_BRIDGE
)
2394 * At boot time, we don't yet know if devices will be 64-bit capable.
2395 * Assume that they will -- if they turn out not to be, then we can
2396 * take them out of the 1:1 domain later.
2400 * If the device's dma_mask is less than the system's memory
2401 * size then this is not a candidate for identity mapping.
2403 u64 dma_mask
= pdev
->dma_mask
;
2405 if (pdev
->dev
.coherent_dma_mask
&&
2406 pdev
->dev
.coherent_dma_mask
< dma_mask
)
2407 dma_mask
= pdev
->dev
.coherent_dma_mask
;
2409 return dma_mask
>= dma_get_required_mask(&pdev
->dev
);
2415 static int __init
iommu_prepare_static_identity_mapping(int hw
)
2417 struct pci_dev
*pdev
= NULL
;
2420 ret
= si_domain_init(hw
);
2424 for_each_pci_dev(pdev
) {
2425 if (iommu_should_identity_map(pdev
, 1)) {
2426 ret
= domain_add_dev_info(si_domain
, pdev
,
2427 hw
? CONTEXT_TT_PASS_THROUGH
:
2428 CONTEXT_TT_MULTI_LEVEL
);
2430 /* device not associated with an iommu */
2435 pr_info("IOMMU: %s identity mapping for device %s\n",
2436 hw
? "hardware" : "software", pci_name(pdev
));
2443 static int __init
init_dmars(void)
2445 struct dmar_drhd_unit
*drhd
;
2446 struct dmar_rmrr_unit
*rmrr
;
2447 struct pci_dev
*pdev
;
2448 struct intel_iommu
*iommu
;
2454 * initialize and program root entry to not present
2457 for_each_drhd_unit(drhd
) {
2459 * lock not needed as this is only incremented in the single
2460 * threaded kernel __init code path all other access are read
2463 if (g_num_of_iommus
< IOMMU_UNITS_SUPPORTED
) {
2467 printk_once(KERN_ERR
"intel-iommu: exceeded %d IOMMUs\n",
2468 IOMMU_UNITS_SUPPORTED
);
2471 g_iommus
= kcalloc(g_num_of_iommus
, sizeof(struct intel_iommu
*),
2474 printk(KERN_ERR
"Allocating global iommu array failed\n");
2479 deferred_flush
= kzalloc(g_num_of_iommus
*
2480 sizeof(struct deferred_flush_tables
), GFP_KERNEL
);
2481 if (!deferred_flush
) {
2486 for_each_drhd_unit(drhd
) {
2490 iommu
= drhd
->iommu
;
2491 g_iommus
[iommu
->seq_id
] = iommu
;
2493 ret
= iommu_init_domains(iommu
);
2499 * we could share the same root & context tables
2500 * among all IOMMU's. Need to Split it later.
2502 ret
= iommu_alloc_root_entry(iommu
);
2504 printk(KERN_ERR
"IOMMU: allocate root entry failed\n");
2507 if (!ecap_pass_through(iommu
->ecap
))
2508 hw_pass_through
= 0;
2512 * Start from the sane iommu hardware state.
2514 for_each_drhd_unit(drhd
) {
2518 iommu
= drhd
->iommu
;
2521 * If the queued invalidation is already initialized by us
2522 * (for example, while enabling interrupt-remapping) then
2523 * we got the things already rolling from a sane state.
2529 * Clear any previous faults.
2531 dmar_fault(-1, iommu
);
2533 * Disable queued invalidation if supported and already enabled
2534 * before OS handover.
2536 dmar_disable_qi(iommu
);
2539 for_each_drhd_unit(drhd
) {
2543 iommu
= drhd
->iommu
;
2545 if (dmar_enable_qi(iommu
)) {
2547 * Queued Invalidate not enabled, use Register Based
2550 iommu
->flush
.flush_context
= __iommu_flush_context
;
2551 iommu
->flush
.flush_iotlb
= __iommu_flush_iotlb
;
2552 printk(KERN_INFO
"IOMMU %d 0x%Lx: using Register based "
2555 (unsigned long long)drhd
->reg_base_addr
);
2557 iommu
->flush
.flush_context
= qi_flush_context
;
2558 iommu
->flush
.flush_iotlb
= qi_flush_iotlb
;
2559 printk(KERN_INFO
"IOMMU %d 0x%Lx: using Queued "
2562 (unsigned long long)drhd
->reg_base_addr
);
2566 if (iommu_pass_through
)
2567 iommu_identity_mapping
|= IDENTMAP_ALL
;
2569 #ifdef CONFIG_INTEL_IOMMU_BROKEN_GFX_WA
2570 iommu_identity_mapping
|= IDENTMAP_GFX
;
2573 check_tylersburg_isoch();
2576 * If pass through is not set or not enabled, setup context entries for
2577 * identity mappings for rmrr, gfx, and isa and may fall back to static
2578 * identity mapping if iommu_identity_mapping is set.
2580 if (iommu_identity_mapping
) {
2581 ret
= iommu_prepare_static_identity_mapping(hw_pass_through
);
2583 printk(KERN_CRIT
"Failed to setup IOMMU pass-through\n");
2589 * for each dev attached to rmrr
2591 * locate drhd for dev, alloc domain for dev
2592 * allocate free domain
2593 * allocate page table entries for rmrr
2594 * if context not allocated for bus
2595 * allocate and init context
2596 * set present in root table for this bus
2597 * init context with domain, translation etc
2601 printk(KERN_INFO
"IOMMU: Setting RMRR:\n");
2602 for_each_rmrr_units(rmrr
) {
2603 for (i
= 0; i
< rmrr
->devices_cnt
; i
++) {
2604 pdev
= rmrr
->devices
[i
];
2606 * some BIOS lists non-exist devices in DMAR
2611 ret
= iommu_prepare_rmrr_dev(rmrr
, pdev
);
2614 "IOMMU: mapping reserved region failed\n");
2618 iommu_prepare_isa();
2623 * global invalidate context cache
2624 * global invalidate iotlb
2625 * enable translation
2627 for_each_drhd_unit(drhd
) {
2628 if (drhd
->ignored
) {
2630 * we always have to disable PMRs or DMA may fail on
2634 iommu_disable_protect_mem_regions(drhd
->iommu
);
2637 iommu
= drhd
->iommu
;
2639 iommu_flush_write_buffer(iommu
);
2641 ret
= dmar_set_interrupt(iommu
);
2645 iommu_set_root_entry(iommu
);
2647 iommu
->flush
.flush_context(iommu
, 0, 0, 0, DMA_CCMD_GLOBAL_INVL
);
2648 iommu
->flush
.flush_iotlb(iommu
, 0, 0, 0, DMA_TLB_GLOBAL_FLUSH
);
2650 ret
= iommu_enable_translation(iommu
);
2654 iommu_disable_protect_mem_regions(iommu
);
2659 for_each_drhd_unit(drhd
) {
2662 iommu
= drhd
->iommu
;
2669 /* This takes a number of _MM_ pages, not VTD pages */
2670 static struct iova
*intel_alloc_iova(struct device
*dev
,
2671 struct dmar_domain
*domain
,
2672 unsigned long nrpages
, uint64_t dma_mask
)
2674 struct pci_dev
*pdev
= to_pci_dev(dev
);
2675 struct iova
*iova
= NULL
;
2677 /* Restrict dma_mask to the width that the iommu can handle */
2678 dma_mask
= min_t(uint64_t, DOMAIN_MAX_ADDR(domain
->gaw
), dma_mask
);
2680 if (!dmar_forcedac
&& dma_mask
> DMA_BIT_MASK(32)) {
2682 * First try to allocate an io virtual address in
2683 * DMA_BIT_MASK(32) and if that fails then try allocating
2686 iova
= alloc_iova(&domain
->iovad
, nrpages
,
2687 IOVA_PFN(DMA_BIT_MASK(32)), 1);
2691 iova
= alloc_iova(&domain
->iovad
, nrpages
, IOVA_PFN(dma_mask
), 1);
2692 if (unlikely(!iova
)) {
2693 printk(KERN_ERR
"Allocating %ld-page iova for %s failed",
2694 nrpages
, pci_name(pdev
));
2701 static struct dmar_domain
*__get_valid_domain_for_dev(struct pci_dev
*pdev
)
2703 struct dmar_domain
*domain
;
2706 domain
= get_domain_for_dev(pdev
,
2707 DEFAULT_DOMAIN_ADDRESS_WIDTH
);
2710 "Allocating domain for %s failed", pci_name(pdev
));
2714 /* make sure context mapping is ok */
2715 if (unlikely(!domain_context_mapped(pdev
))) {
2716 ret
= domain_context_mapping(domain
, pdev
,
2717 CONTEXT_TT_MULTI_LEVEL
);
2720 "Domain context map for %s failed",
2729 static inline struct dmar_domain
*get_valid_domain_for_dev(struct pci_dev
*dev
)
2731 struct device_domain_info
*info
;
2733 /* No lock here, assumes no domain exit in normal case */
2734 info
= dev
->dev
.archdata
.iommu
;
2736 return info
->domain
;
2738 return __get_valid_domain_for_dev(dev
);
2741 static int iommu_dummy(struct pci_dev
*pdev
)
2743 return pdev
->dev
.archdata
.iommu
== DUMMY_DEVICE_DOMAIN_INFO
;
2746 /* Check if the pdev needs to go through non-identity map and unmap process.*/
2747 static int iommu_no_mapping(struct device
*dev
)
2749 struct pci_dev
*pdev
;
2752 if (unlikely(dev
->bus
!= &pci_bus_type
))
2755 pdev
= to_pci_dev(dev
);
2756 if (iommu_dummy(pdev
))
2759 if (!iommu_identity_mapping
)
2762 found
= identity_mapping(pdev
);
2764 if (iommu_should_identity_map(pdev
, 0))
2768 * 32 bit DMA is removed from si_domain and fall back
2769 * to non-identity mapping.
2771 domain_remove_one_dev_info(si_domain
, pdev
);
2772 printk(KERN_INFO
"32bit %s uses non-identity mapping\n",
2778 * In case of a detached 64 bit DMA device from vm, the device
2779 * is put into si_domain for identity mapping.
2781 if (iommu_should_identity_map(pdev
, 0)) {
2783 ret
= domain_add_dev_info(si_domain
, pdev
,
2785 CONTEXT_TT_PASS_THROUGH
:
2786 CONTEXT_TT_MULTI_LEVEL
);
2788 printk(KERN_INFO
"64bit %s uses identity mapping\n",
2798 static dma_addr_t
__intel_map_single(struct device
*hwdev
, phys_addr_t paddr
,
2799 size_t size
, int dir
, u64 dma_mask
)
2801 struct pci_dev
*pdev
= to_pci_dev(hwdev
);
2802 struct dmar_domain
*domain
;
2803 phys_addr_t start_paddr
;
2807 struct intel_iommu
*iommu
;
2808 unsigned long paddr_pfn
= paddr
>> PAGE_SHIFT
;
2810 BUG_ON(dir
== DMA_NONE
);
2812 if (iommu_no_mapping(hwdev
))
2815 domain
= get_valid_domain_for_dev(pdev
);
2819 iommu
= domain_get_iommu(domain
);
2820 size
= aligned_nrpages(paddr
, size
);
2822 iova
= intel_alloc_iova(hwdev
, domain
, dma_to_mm_pfn(size
), dma_mask
);
2827 * Check if DMAR supports zero-length reads on write only
2830 if (dir
== DMA_TO_DEVICE
|| dir
== DMA_BIDIRECTIONAL
|| \
2831 !cap_zlr(iommu
->cap
))
2832 prot
|= DMA_PTE_READ
;
2833 if (dir
== DMA_FROM_DEVICE
|| dir
== DMA_BIDIRECTIONAL
)
2834 prot
|= DMA_PTE_WRITE
;
2836 * paddr - (paddr + size) might be partial page, we should map the whole
2837 * page. Note: if two part of one page are separately mapped, we
2838 * might have two guest_addr mapping to the same host paddr, but this
2839 * is not a big problem
2841 ret
= domain_pfn_mapping(domain
, mm_to_dma_pfn(iova
->pfn_lo
),
2842 mm_to_dma_pfn(paddr_pfn
), size
, prot
);
2846 /* it's a non-present to present mapping. Only flush if caching mode */
2847 if (cap_caching_mode(iommu
->cap
))
2848 iommu_flush_iotlb_psi(iommu
, domain
->id
, mm_to_dma_pfn(iova
->pfn_lo
), size
, 1);
2850 iommu_flush_write_buffer(iommu
);
2852 start_paddr
= (phys_addr_t
)iova
->pfn_lo
<< PAGE_SHIFT
;
2853 start_paddr
+= paddr
& ~PAGE_MASK
;
2858 __free_iova(&domain
->iovad
, iova
);
2859 printk(KERN_ERR
"Device %s request: %zx@%llx dir %d --- failed\n",
2860 pci_name(pdev
), size
, (unsigned long long)paddr
, dir
);
2864 static dma_addr_t
intel_map_page(struct device
*dev
, struct page
*page
,
2865 unsigned long offset
, size_t size
,
2866 enum dma_data_direction dir
,
2867 struct dma_attrs
*attrs
)
2869 return __intel_map_single(dev
, page_to_phys(page
) + offset
, size
,
2870 dir
, to_pci_dev(dev
)->dma_mask
);
2873 static void flush_unmaps(void)
2879 /* just flush them all */
2880 for (i
= 0; i
< g_num_of_iommus
; i
++) {
2881 struct intel_iommu
*iommu
= g_iommus
[i
];
2885 if (!deferred_flush
[i
].next
)
2888 /* In caching mode, global flushes turn emulation expensive */
2889 if (!cap_caching_mode(iommu
->cap
))
2890 iommu
->flush
.flush_iotlb(iommu
, 0, 0, 0,
2891 DMA_TLB_GLOBAL_FLUSH
);
2892 for (j
= 0; j
< deferred_flush
[i
].next
; j
++) {
2894 struct iova
*iova
= deferred_flush
[i
].iova
[j
];
2895 struct dmar_domain
*domain
= deferred_flush
[i
].domain
[j
];
2897 /* On real hardware multiple invalidations are expensive */
2898 if (cap_caching_mode(iommu
->cap
))
2899 iommu_flush_iotlb_psi(iommu
, domain
->id
,
2900 iova
->pfn_lo
, iova
->pfn_hi
- iova
->pfn_lo
+ 1, 0);
2902 mask
= ilog2(mm_to_dma_pfn(iova
->pfn_hi
- iova
->pfn_lo
+ 1));
2903 iommu_flush_dev_iotlb(deferred_flush
[i
].domain
[j
],
2904 (uint64_t)iova
->pfn_lo
<< PAGE_SHIFT
, mask
);
2906 __free_iova(&deferred_flush
[i
].domain
[j
]->iovad
, iova
);
2908 deferred_flush
[i
].next
= 0;
2914 static void flush_unmaps_timeout(unsigned long data
)
2916 unsigned long flags
;
2918 spin_lock_irqsave(&async_umap_flush_lock
, flags
);
2920 spin_unlock_irqrestore(&async_umap_flush_lock
, flags
);
2923 static void add_unmap(struct dmar_domain
*dom
, struct iova
*iova
)
2925 unsigned long flags
;
2927 struct intel_iommu
*iommu
;
2929 spin_lock_irqsave(&async_umap_flush_lock
, flags
);
2930 if (list_size
== HIGH_WATER_MARK
)
2933 iommu
= domain_get_iommu(dom
);
2934 iommu_id
= iommu
->seq_id
;
2936 next
= deferred_flush
[iommu_id
].next
;
2937 deferred_flush
[iommu_id
].domain
[next
] = dom
;
2938 deferred_flush
[iommu_id
].iova
[next
] = iova
;
2939 deferred_flush
[iommu_id
].next
++;
2942 mod_timer(&unmap_timer
, jiffies
+ msecs_to_jiffies(10));
2946 spin_unlock_irqrestore(&async_umap_flush_lock
, flags
);
2949 static void intel_unmap_page(struct device
*dev
, dma_addr_t dev_addr
,
2950 size_t size
, enum dma_data_direction dir
,
2951 struct dma_attrs
*attrs
)
2953 struct pci_dev
*pdev
= to_pci_dev(dev
);
2954 struct dmar_domain
*domain
;
2955 unsigned long start_pfn
, last_pfn
;
2957 struct intel_iommu
*iommu
;
2959 if (iommu_no_mapping(dev
))
2962 domain
= find_domain(pdev
);
2965 iommu
= domain_get_iommu(domain
);
2967 iova
= find_iova(&domain
->iovad
, IOVA_PFN(dev_addr
));
2968 if (WARN_ONCE(!iova
, "Driver unmaps unmatched page at PFN %llx\n",
2969 (unsigned long long)dev_addr
))
2972 start_pfn
= mm_to_dma_pfn(iova
->pfn_lo
);
2973 last_pfn
= mm_to_dma_pfn(iova
->pfn_hi
+ 1) - 1;
2975 pr_debug("Device %s unmapping: pfn %lx-%lx\n",
2976 pci_name(pdev
), start_pfn
, last_pfn
);
2978 /* clear the whole page */
2979 dma_pte_clear_range(domain
, start_pfn
, last_pfn
);
2981 /* free page tables */
2982 dma_pte_free_pagetable(domain
, start_pfn
, last_pfn
);
2984 if (intel_iommu_strict
) {
2985 iommu_flush_iotlb_psi(iommu
, domain
->id
, start_pfn
,
2986 last_pfn
- start_pfn
+ 1, 0);
2988 __free_iova(&domain
->iovad
, iova
);
2990 add_unmap(domain
, iova
);
2992 * queue up the release of the unmap to save the 1/6th of the
2993 * cpu used up by the iotlb flush operation...
2998 static void *intel_alloc_coherent(struct device
*hwdev
, size_t size
,
2999 dma_addr_t
*dma_handle
, gfp_t flags
,
3000 struct dma_attrs
*attrs
)
3005 size
= PAGE_ALIGN(size
);
3006 order
= get_order(size
);
3008 if (!iommu_no_mapping(hwdev
))
3009 flags
&= ~(GFP_DMA
| GFP_DMA32
);
3010 else if (hwdev
->coherent_dma_mask
< dma_get_required_mask(hwdev
)) {
3011 if (hwdev
->coherent_dma_mask
< DMA_BIT_MASK(32))
3017 vaddr
= (void *)__get_free_pages(flags
, order
);
3020 memset(vaddr
, 0, size
);
3022 *dma_handle
= __intel_map_single(hwdev
, virt_to_bus(vaddr
), size
,
3024 hwdev
->coherent_dma_mask
);
3027 free_pages((unsigned long)vaddr
, order
);
3031 static void intel_free_coherent(struct device
*hwdev
, size_t size
, void *vaddr
,
3032 dma_addr_t dma_handle
, struct dma_attrs
*attrs
)
3036 size
= PAGE_ALIGN(size
);
3037 order
= get_order(size
);
3039 intel_unmap_page(hwdev
, dma_handle
, size
, DMA_BIDIRECTIONAL
, NULL
);
3040 free_pages((unsigned long)vaddr
, order
);
3043 static void intel_unmap_sg(struct device
*hwdev
, struct scatterlist
*sglist
,
3044 int nelems
, enum dma_data_direction dir
,
3045 struct dma_attrs
*attrs
)
3047 struct pci_dev
*pdev
= to_pci_dev(hwdev
);
3048 struct dmar_domain
*domain
;
3049 unsigned long start_pfn
, last_pfn
;
3051 struct intel_iommu
*iommu
;
3053 if (iommu_no_mapping(hwdev
))
3056 domain
= find_domain(pdev
);
3059 iommu
= domain_get_iommu(domain
);
3061 iova
= find_iova(&domain
->iovad
, IOVA_PFN(sglist
[0].dma_address
));
3062 if (WARN_ONCE(!iova
, "Driver unmaps unmatched sglist at PFN %llx\n",
3063 (unsigned long long)sglist
[0].dma_address
))
3066 start_pfn
= mm_to_dma_pfn(iova
->pfn_lo
);
3067 last_pfn
= mm_to_dma_pfn(iova
->pfn_hi
+ 1) - 1;
3069 /* clear the whole page */
3070 dma_pte_clear_range(domain
, start_pfn
, last_pfn
);
3072 /* free page tables */
3073 dma_pte_free_pagetable(domain
, start_pfn
, last_pfn
);
3075 if (intel_iommu_strict
) {
3076 iommu_flush_iotlb_psi(iommu
, domain
->id
, start_pfn
,
3077 last_pfn
- start_pfn
+ 1, 0);
3079 __free_iova(&domain
->iovad
, iova
);
3081 add_unmap(domain
, iova
);
3083 * queue up the release of the unmap to save the 1/6th of the
3084 * cpu used up by the iotlb flush operation...
3089 static int intel_nontranslate_map_sg(struct device
*hddev
,
3090 struct scatterlist
*sglist
, int nelems
, int dir
)
3093 struct scatterlist
*sg
;
3095 for_each_sg(sglist
, sg
, nelems
, i
) {
3096 BUG_ON(!sg_page(sg
));
3097 sg
->dma_address
= page_to_phys(sg_page(sg
)) + sg
->offset
;
3098 sg
->dma_length
= sg
->length
;
3103 static int intel_map_sg(struct device
*hwdev
, struct scatterlist
*sglist
, int nelems
,
3104 enum dma_data_direction dir
, struct dma_attrs
*attrs
)
3107 struct pci_dev
*pdev
= to_pci_dev(hwdev
);
3108 struct dmar_domain
*domain
;
3111 struct iova
*iova
= NULL
;
3113 struct scatterlist
*sg
;
3114 unsigned long start_vpfn
;
3115 struct intel_iommu
*iommu
;
3117 BUG_ON(dir
== DMA_NONE
);
3118 if (iommu_no_mapping(hwdev
))
3119 return intel_nontranslate_map_sg(hwdev
, sglist
, nelems
, dir
);
3121 domain
= get_valid_domain_for_dev(pdev
);
3125 iommu
= domain_get_iommu(domain
);
3127 for_each_sg(sglist
, sg
, nelems
, i
)
3128 size
+= aligned_nrpages(sg
->offset
, sg
->length
);
3130 iova
= intel_alloc_iova(hwdev
, domain
, dma_to_mm_pfn(size
),
3133 sglist
->dma_length
= 0;
3138 * Check if DMAR supports zero-length reads on write only
3141 if (dir
== DMA_TO_DEVICE
|| dir
== DMA_BIDIRECTIONAL
|| \
3142 !cap_zlr(iommu
->cap
))
3143 prot
|= DMA_PTE_READ
;
3144 if (dir
== DMA_FROM_DEVICE
|| dir
== DMA_BIDIRECTIONAL
)
3145 prot
|= DMA_PTE_WRITE
;
3147 start_vpfn
= mm_to_dma_pfn(iova
->pfn_lo
);
3149 ret
= domain_sg_mapping(domain
, start_vpfn
, sglist
, size
, prot
);
3150 if (unlikely(ret
)) {
3151 /* clear the page */
3152 dma_pte_clear_range(domain
, start_vpfn
,
3153 start_vpfn
+ size
- 1);
3154 /* free page tables */
3155 dma_pte_free_pagetable(domain
, start_vpfn
,
3156 start_vpfn
+ size
- 1);
3158 __free_iova(&domain
->iovad
, iova
);
3162 /* it's a non-present to present mapping. Only flush if caching mode */
3163 if (cap_caching_mode(iommu
->cap
))
3164 iommu_flush_iotlb_psi(iommu
, domain
->id
, start_vpfn
, size
, 1);
3166 iommu_flush_write_buffer(iommu
);
3171 static int intel_mapping_error(struct device
*dev
, dma_addr_t dma_addr
)
3176 struct dma_map_ops intel_dma_ops
= {
3177 .alloc
= intel_alloc_coherent
,
3178 .free
= intel_free_coherent
,
3179 .map_sg
= intel_map_sg
,
3180 .unmap_sg
= intel_unmap_sg
,
3181 .map_page
= intel_map_page
,
3182 .unmap_page
= intel_unmap_page
,
3183 .mapping_error
= intel_mapping_error
,
3186 static inline int iommu_domain_cache_init(void)
3190 iommu_domain_cache
= kmem_cache_create("iommu_domain",
3191 sizeof(struct dmar_domain
),
3196 if (!iommu_domain_cache
) {
3197 printk(KERN_ERR
"Couldn't create iommu_domain cache\n");
3204 static inline int iommu_devinfo_cache_init(void)
3208 iommu_devinfo_cache
= kmem_cache_create("iommu_devinfo",
3209 sizeof(struct device_domain_info
),
3213 if (!iommu_devinfo_cache
) {
3214 printk(KERN_ERR
"Couldn't create devinfo cache\n");
3221 static inline int iommu_iova_cache_init(void)
3225 iommu_iova_cache
= kmem_cache_create("iommu_iova",
3226 sizeof(struct iova
),
3230 if (!iommu_iova_cache
) {
3231 printk(KERN_ERR
"Couldn't create iova cache\n");
3238 static int __init
iommu_init_mempool(void)
3241 ret
= iommu_iova_cache_init();
3245 ret
= iommu_domain_cache_init();
3249 ret
= iommu_devinfo_cache_init();
3253 kmem_cache_destroy(iommu_domain_cache
);
3255 kmem_cache_destroy(iommu_iova_cache
);
3260 static void __init
iommu_exit_mempool(void)
3262 kmem_cache_destroy(iommu_devinfo_cache
);
3263 kmem_cache_destroy(iommu_domain_cache
);
3264 kmem_cache_destroy(iommu_iova_cache
);
3268 static void quirk_ioat_snb_local_iommu(struct pci_dev
*pdev
)
3270 struct dmar_drhd_unit
*drhd
;
3274 /* We know that this device on this chipset has its own IOMMU.
3275 * If we find it under a different IOMMU, then the BIOS is lying
3276 * to us. Hope that the IOMMU for this device is actually
3277 * disabled, and it needs no translation...
3279 rc
= pci_bus_read_config_dword(pdev
->bus
, PCI_DEVFN(0, 0), 0xb0, &vtbar
);
3281 /* "can't" happen */
3282 dev_info(&pdev
->dev
, "failed to run vt-d quirk\n");
3285 vtbar
&= 0xffff0000;
3287 /* we know that the this iommu should be at offset 0xa000 from vtbar */
3288 drhd
= dmar_find_matched_drhd_unit(pdev
);
3289 if (WARN_TAINT_ONCE(!drhd
|| drhd
->reg_base_addr
- vtbar
!= 0xa000,
3290 TAINT_FIRMWARE_WORKAROUND
,
3291 "BIOS assigned incorrect VT-d unit for Intel(R) QuickData Technology device\n"))
3292 pdev
->dev
.archdata
.iommu
= DUMMY_DEVICE_DOMAIN_INFO
;
3294 DECLARE_PCI_FIXUP_ENABLE(PCI_VENDOR_ID_INTEL
, PCI_DEVICE_ID_INTEL_IOAT_SNB
, quirk_ioat_snb_local_iommu
);
3296 static void __init
init_no_remapping_devices(void)
3298 struct dmar_drhd_unit
*drhd
;
3300 for_each_drhd_unit(drhd
) {
3301 if (!drhd
->include_all
) {
3303 for (i
= 0; i
< drhd
->devices_cnt
; i
++)
3304 if (drhd
->devices
[i
] != NULL
)
3306 /* ignore DMAR unit if no pci devices exist */
3307 if (i
== drhd
->devices_cnt
)
3312 for_each_drhd_unit(drhd
) {
3314 if (drhd
->ignored
|| drhd
->include_all
)
3317 for (i
= 0; i
< drhd
->devices_cnt
; i
++)
3318 if (drhd
->devices
[i
] &&
3319 !IS_GFX_DEVICE(drhd
->devices
[i
]))
3322 if (i
< drhd
->devices_cnt
)
3325 /* This IOMMU has *only* gfx devices. Either bypass it or
3326 set the gfx_mapped flag, as appropriate */
3328 intel_iommu_gfx_mapped
= 1;
3331 for (i
= 0; i
< drhd
->devices_cnt
; i
++) {
3332 if (!drhd
->devices
[i
])
3334 drhd
->devices
[i
]->dev
.archdata
.iommu
= DUMMY_DEVICE_DOMAIN_INFO
;
3340 #ifdef CONFIG_SUSPEND
3341 static int init_iommu_hw(void)
3343 struct dmar_drhd_unit
*drhd
;
3344 struct intel_iommu
*iommu
= NULL
;
3346 for_each_active_iommu(iommu
, drhd
)
3348 dmar_reenable_qi(iommu
);
3350 for_each_iommu(iommu
, drhd
) {
3351 if (drhd
->ignored
) {
3353 * we always have to disable PMRs or DMA may fail on
3357 iommu_disable_protect_mem_regions(iommu
);
3361 iommu_flush_write_buffer(iommu
);
3363 iommu_set_root_entry(iommu
);
3365 iommu
->flush
.flush_context(iommu
, 0, 0, 0,
3366 DMA_CCMD_GLOBAL_INVL
);
3367 iommu
->flush
.flush_iotlb(iommu
, 0, 0, 0,
3368 DMA_TLB_GLOBAL_FLUSH
);
3369 if (iommu_enable_translation(iommu
))
3371 iommu_disable_protect_mem_regions(iommu
);
3377 static void iommu_flush_all(void)
3379 struct dmar_drhd_unit
*drhd
;
3380 struct intel_iommu
*iommu
;
3382 for_each_active_iommu(iommu
, drhd
) {
3383 iommu
->flush
.flush_context(iommu
, 0, 0, 0,
3384 DMA_CCMD_GLOBAL_INVL
);
3385 iommu
->flush
.flush_iotlb(iommu
, 0, 0, 0,
3386 DMA_TLB_GLOBAL_FLUSH
);
3390 static int iommu_suspend(void)
3392 struct dmar_drhd_unit
*drhd
;
3393 struct intel_iommu
*iommu
= NULL
;
3396 for_each_active_iommu(iommu
, drhd
) {
3397 iommu
->iommu_state
= kzalloc(sizeof(u32
) * MAX_SR_DMAR_REGS
,
3399 if (!iommu
->iommu_state
)
3405 for_each_active_iommu(iommu
, drhd
) {
3406 iommu_disable_translation(iommu
);
3408 raw_spin_lock_irqsave(&iommu
->register_lock
, flag
);
3410 iommu
->iommu_state
[SR_DMAR_FECTL_REG
] =
3411 readl(iommu
->reg
+ DMAR_FECTL_REG
);
3412 iommu
->iommu_state
[SR_DMAR_FEDATA_REG
] =
3413 readl(iommu
->reg
+ DMAR_FEDATA_REG
);
3414 iommu
->iommu_state
[SR_DMAR_FEADDR_REG
] =
3415 readl(iommu
->reg
+ DMAR_FEADDR_REG
);
3416 iommu
->iommu_state
[SR_DMAR_FEUADDR_REG
] =
3417 readl(iommu
->reg
+ DMAR_FEUADDR_REG
);
3419 raw_spin_unlock_irqrestore(&iommu
->register_lock
, flag
);
3424 for_each_active_iommu(iommu
, drhd
)
3425 kfree(iommu
->iommu_state
);
3430 static void iommu_resume(void)
3432 struct dmar_drhd_unit
*drhd
;
3433 struct intel_iommu
*iommu
= NULL
;
3436 if (init_iommu_hw()) {
3438 panic("tboot: IOMMU setup failed, DMAR can not resume!\n");
3440 WARN(1, "IOMMU setup failed, DMAR can not resume!\n");
3444 for_each_active_iommu(iommu
, drhd
) {
3446 raw_spin_lock_irqsave(&iommu
->register_lock
, flag
);
3448 writel(iommu
->iommu_state
[SR_DMAR_FECTL_REG
],
3449 iommu
->reg
+ DMAR_FECTL_REG
);
3450 writel(iommu
->iommu_state
[SR_DMAR_FEDATA_REG
],
3451 iommu
->reg
+ DMAR_FEDATA_REG
);
3452 writel(iommu
->iommu_state
[SR_DMAR_FEADDR_REG
],
3453 iommu
->reg
+ DMAR_FEADDR_REG
);
3454 writel(iommu
->iommu_state
[SR_DMAR_FEUADDR_REG
],
3455 iommu
->reg
+ DMAR_FEUADDR_REG
);
3457 raw_spin_unlock_irqrestore(&iommu
->register_lock
, flag
);
3460 for_each_active_iommu(iommu
, drhd
)
3461 kfree(iommu
->iommu_state
);
3464 static struct syscore_ops iommu_syscore_ops
= {
3465 .resume
= iommu_resume
,
3466 .suspend
= iommu_suspend
,
3469 static void __init
init_iommu_pm_ops(void)
3471 register_syscore_ops(&iommu_syscore_ops
);
3475 static inline void init_iommu_pm_ops(void) {}
3476 #endif /* CONFIG_PM */
3478 LIST_HEAD(dmar_rmrr_units
);
3480 static void __init
dmar_register_rmrr_unit(struct dmar_rmrr_unit
*rmrr
)
3482 list_add(&rmrr
->list
, &dmar_rmrr_units
);
3486 int __init
dmar_parse_one_rmrr(struct acpi_dmar_header
*header
)
3488 struct acpi_dmar_reserved_memory
*rmrr
;
3489 struct dmar_rmrr_unit
*rmrru
;
3491 rmrru
= kzalloc(sizeof(*rmrru
), GFP_KERNEL
);
3495 rmrru
->hdr
= header
;
3496 rmrr
= (struct acpi_dmar_reserved_memory
*)header
;
3497 rmrru
->base_address
= rmrr
->base_address
;
3498 rmrru
->end_address
= rmrr
->end_address
;
3500 dmar_register_rmrr_unit(rmrru
);
3505 rmrr_parse_dev(struct dmar_rmrr_unit
*rmrru
)
3507 struct acpi_dmar_reserved_memory
*rmrr
;
3510 rmrr
= (struct acpi_dmar_reserved_memory
*) rmrru
->hdr
;
3511 ret
= dmar_parse_dev_scope((void *)(rmrr
+ 1),
3512 ((void *)rmrr
) + rmrr
->header
.length
,
3513 &rmrru
->devices_cnt
, &rmrru
->devices
, rmrr
->segment
);
3515 if (ret
|| (rmrru
->devices_cnt
== 0)) {
3516 list_del(&rmrru
->list
);
3522 static LIST_HEAD(dmar_atsr_units
);
3524 int __init
dmar_parse_one_atsr(struct acpi_dmar_header
*hdr
)
3526 struct acpi_dmar_atsr
*atsr
;
3527 struct dmar_atsr_unit
*atsru
;
3529 atsr
= container_of(hdr
, struct acpi_dmar_atsr
, header
);
3530 atsru
= kzalloc(sizeof(*atsru
), GFP_KERNEL
);
3535 atsru
->include_all
= atsr
->flags
& 0x1;
3537 list_add(&atsru
->list
, &dmar_atsr_units
);
3542 static int __init
atsr_parse_dev(struct dmar_atsr_unit
*atsru
)
3545 struct acpi_dmar_atsr
*atsr
;
3547 if (atsru
->include_all
)
3550 atsr
= container_of(atsru
->hdr
, struct acpi_dmar_atsr
, header
);
3551 rc
= dmar_parse_dev_scope((void *)(atsr
+ 1),
3552 (void *)atsr
+ atsr
->header
.length
,
3553 &atsru
->devices_cnt
, &atsru
->devices
,
3555 if (rc
|| !atsru
->devices_cnt
) {
3556 list_del(&atsru
->list
);
3563 int dmar_find_matched_atsr_unit(struct pci_dev
*dev
)
3566 struct pci_bus
*bus
;
3567 struct acpi_dmar_atsr
*atsr
;
3568 struct dmar_atsr_unit
*atsru
;
3570 dev
= pci_physfn(dev
);
3572 list_for_each_entry(atsru
, &dmar_atsr_units
, list
) {
3573 atsr
= container_of(atsru
->hdr
, struct acpi_dmar_atsr
, header
);
3574 if (atsr
->segment
== pci_domain_nr(dev
->bus
))
3581 for (bus
= dev
->bus
; bus
; bus
= bus
->parent
) {
3582 struct pci_dev
*bridge
= bus
->self
;
3584 if (!bridge
|| !pci_is_pcie(bridge
) ||
3585 bridge
->pcie_type
== PCI_EXP_TYPE_PCI_BRIDGE
)
3588 if (bridge
->pcie_type
== PCI_EXP_TYPE_ROOT_PORT
) {
3589 for (i
= 0; i
< atsru
->devices_cnt
; i
++)
3590 if (atsru
->devices
[i
] == bridge
)
3596 if (atsru
->include_all
)
3602 int __init
dmar_parse_rmrr_atsr_dev(void)
3604 struct dmar_rmrr_unit
*rmrr
, *rmrr_n
;
3605 struct dmar_atsr_unit
*atsr
, *atsr_n
;
3608 list_for_each_entry_safe(rmrr
, rmrr_n
, &dmar_rmrr_units
, list
) {
3609 ret
= rmrr_parse_dev(rmrr
);
3614 list_for_each_entry_safe(atsr
, atsr_n
, &dmar_atsr_units
, list
) {
3615 ret
= atsr_parse_dev(atsr
);
3624 * Here we only respond to action of unbound device from driver.
3626 * Added device is not attached to its DMAR domain here yet. That will happen
3627 * when mapping the device to iova.
3629 static int device_notifier(struct notifier_block
*nb
,
3630 unsigned long action
, void *data
)
3632 struct device
*dev
= data
;
3633 struct pci_dev
*pdev
= to_pci_dev(dev
);
3634 struct dmar_domain
*domain
;
3636 if (iommu_no_mapping(dev
))
3639 domain
= find_domain(pdev
);
3643 if (action
== BUS_NOTIFY_UNBOUND_DRIVER
&& !iommu_pass_through
) {
3644 domain_remove_one_dev_info(domain
, pdev
);
3646 if (!(domain
->flags
& DOMAIN_FLAG_VIRTUAL_MACHINE
) &&
3647 !(domain
->flags
& DOMAIN_FLAG_STATIC_IDENTITY
) &&
3648 list_empty(&domain
->devices
))
3649 domain_exit(domain
);
3655 static struct notifier_block device_nb
= {
3656 .notifier_call
= device_notifier
,
3659 int __init
intel_iommu_init(void)
3662 struct dmar_drhd_unit
*drhd
;
3664 /* VT-d is required for a TXT/tboot launch, so enforce that */
3665 force_on
= tboot_force_iommu();
3667 if (dmar_table_init()) {
3669 panic("tboot: Failed to initialize DMAR table\n");
3674 * Disable translation if already enabled prior to OS handover.
3676 for_each_drhd_unit(drhd
) {
3677 struct intel_iommu
*iommu
;
3682 iommu
= drhd
->iommu
;
3683 if (iommu
->gcmd
& DMA_GCMD_TE
)
3684 iommu_disable_translation(iommu
);
3687 if (dmar_dev_scope_init() < 0) {
3689 panic("tboot: Failed to initialize DMAR device scope\n");
3693 if (no_iommu
|| dmar_disabled
)
3696 if (iommu_init_mempool()) {
3698 panic("tboot: Failed to initialize iommu memory\n");
3702 if (list_empty(&dmar_rmrr_units
))
3703 printk(KERN_INFO
"DMAR: No RMRR found\n");
3705 if (list_empty(&dmar_atsr_units
))
3706 printk(KERN_INFO
"DMAR: No ATSR found\n");
3708 if (dmar_init_reserved_ranges()) {
3710 panic("tboot: Failed to reserve iommu ranges\n");
3714 init_no_remapping_devices();
3719 panic("tboot: Failed to initialize DMARs\n");
3720 printk(KERN_ERR
"IOMMU: dmar init failed\n");
3721 put_iova_domain(&reserved_iova_list
);
3722 iommu_exit_mempool();
3726 "PCI-DMA: Intel(R) Virtualization Technology for Directed I/O\n");
3728 init_timer(&unmap_timer
);
3729 #ifdef CONFIG_SWIOTLB
3732 dma_ops
= &intel_dma_ops
;
3734 init_iommu_pm_ops();
3736 bus_set_iommu(&pci_bus_type
, &intel_iommu_ops
);
3738 bus_register_notifier(&pci_bus_type
, &device_nb
);
3740 intel_iommu_enabled
= 1;
3745 static void iommu_detach_dependent_devices(struct intel_iommu
*iommu
,
3746 struct pci_dev
*pdev
)
3748 struct pci_dev
*tmp
, *parent
;
3750 if (!iommu
|| !pdev
)
3753 /* dependent device detach */
3754 tmp
= pci_find_upstream_pcie_bridge(pdev
);
3755 /* Secondary interface's bus number and devfn 0 */
3757 parent
= pdev
->bus
->self
;
3758 while (parent
!= tmp
) {
3759 iommu_detach_dev(iommu
, parent
->bus
->number
,
3761 parent
= parent
->bus
->self
;
3763 if (pci_is_pcie(tmp
)) /* this is a PCIe-to-PCI bridge */
3764 iommu_detach_dev(iommu
,
3765 tmp
->subordinate
->number
, 0);
3766 else /* this is a legacy PCI bridge */
3767 iommu_detach_dev(iommu
, tmp
->bus
->number
,
3772 static void domain_remove_one_dev_info(struct dmar_domain
*domain
,
3773 struct pci_dev
*pdev
)
3775 struct device_domain_info
*info
;
3776 struct intel_iommu
*iommu
;
3777 unsigned long flags
;
3779 struct list_head
*entry
, *tmp
;
3781 iommu
= device_to_iommu(pci_domain_nr(pdev
->bus
), pdev
->bus
->number
,
3786 spin_lock_irqsave(&device_domain_lock
, flags
);
3787 list_for_each_safe(entry
, tmp
, &domain
->devices
) {
3788 info
= list_entry(entry
, struct device_domain_info
, link
);
3789 if (info
->segment
== pci_domain_nr(pdev
->bus
) &&
3790 info
->bus
== pdev
->bus
->number
&&
3791 info
->devfn
== pdev
->devfn
) {
3792 list_del(&info
->link
);
3793 list_del(&info
->global
);
3795 info
->dev
->dev
.archdata
.iommu
= NULL
;
3796 spin_unlock_irqrestore(&device_domain_lock
, flags
);
3798 iommu_disable_dev_iotlb(info
);
3799 iommu_detach_dev(iommu
, info
->bus
, info
->devfn
);
3800 iommu_detach_dependent_devices(iommu
, pdev
);
3801 free_devinfo_mem(info
);
3803 spin_lock_irqsave(&device_domain_lock
, flags
);
3811 /* if there is no other devices under the same iommu
3812 * owned by this domain, clear this iommu in iommu_bmp
3813 * update iommu count and coherency
3815 if (iommu
== device_to_iommu(info
->segment
, info
->bus
,
3820 spin_unlock_irqrestore(&device_domain_lock
, flags
);
3823 unsigned long tmp_flags
;
3824 spin_lock_irqsave(&domain
->iommu_lock
, tmp_flags
);
3825 clear_bit(iommu
->seq_id
, domain
->iommu_bmp
);
3826 domain
->iommu_count
--;
3827 domain_update_iommu_cap(domain
);
3828 spin_unlock_irqrestore(&domain
->iommu_lock
, tmp_flags
);
3830 if (!(domain
->flags
& DOMAIN_FLAG_VIRTUAL_MACHINE
) &&
3831 !(domain
->flags
& DOMAIN_FLAG_STATIC_IDENTITY
)) {
3832 spin_lock_irqsave(&iommu
->lock
, tmp_flags
);
3833 clear_bit(domain
->id
, iommu
->domain_ids
);
3834 iommu
->domains
[domain
->id
] = NULL
;
3835 spin_unlock_irqrestore(&iommu
->lock
, tmp_flags
);
3840 static void vm_domain_remove_all_dev_info(struct dmar_domain
*domain
)
3842 struct device_domain_info
*info
;
3843 struct intel_iommu
*iommu
;
3844 unsigned long flags1
, flags2
;
3846 spin_lock_irqsave(&device_domain_lock
, flags1
);
3847 while (!list_empty(&domain
->devices
)) {
3848 info
= list_entry(domain
->devices
.next
,
3849 struct device_domain_info
, link
);
3850 list_del(&info
->link
);
3851 list_del(&info
->global
);
3853 info
->dev
->dev
.archdata
.iommu
= NULL
;
3855 spin_unlock_irqrestore(&device_domain_lock
, flags1
);
3857 iommu_disable_dev_iotlb(info
);
3858 iommu
= device_to_iommu(info
->segment
, info
->bus
, info
->devfn
);
3859 iommu_detach_dev(iommu
, info
->bus
, info
->devfn
);
3860 iommu_detach_dependent_devices(iommu
, info
->dev
);
3862 /* clear this iommu in iommu_bmp, update iommu count
3865 spin_lock_irqsave(&domain
->iommu_lock
, flags2
);
3866 if (test_and_clear_bit(iommu
->seq_id
,
3867 domain
->iommu_bmp
)) {
3868 domain
->iommu_count
--;
3869 domain_update_iommu_cap(domain
);
3871 spin_unlock_irqrestore(&domain
->iommu_lock
, flags2
);
3873 free_devinfo_mem(info
);
3874 spin_lock_irqsave(&device_domain_lock
, flags1
);
3876 spin_unlock_irqrestore(&device_domain_lock
, flags1
);
3879 /* domain id for virtual machine, it won't be set in context */
3880 static unsigned long vm_domid
;
3882 static struct dmar_domain
*iommu_alloc_vm_domain(void)
3884 struct dmar_domain
*domain
;
3886 domain
= alloc_domain_mem();
3890 domain
->id
= vm_domid
++;
3892 memset(domain
->iommu_bmp
, 0, sizeof(domain
->iommu_bmp
));
3893 domain
->flags
= DOMAIN_FLAG_VIRTUAL_MACHINE
;
3898 static int md_domain_init(struct dmar_domain
*domain
, int guest_width
)
3902 init_iova_domain(&domain
->iovad
, DMA_32BIT_PFN
);
3903 spin_lock_init(&domain
->iommu_lock
);
3905 domain_reserve_special_ranges(domain
);
3907 /* calculate AGAW */
3908 domain
->gaw
= guest_width
;
3909 adjust_width
= guestwidth_to_adjustwidth(guest_width
);
3910 domain
->agaw
= width_to_agaw(adjust_width
);
3912 INIT_LIST_HEAD(&domain
->devices
);
3914 domain
->iommu_count
= 0;
3915 domain
->iommu_coherency
= 0;
3916 domain
->iommu_snooping
= 0;
3917 domain
->iommu_superpage
= 0;
3918 domain
->max_addr
= 0;
3921 /* always allocate the top pgd */
3922 domain
->pgd
= (struct dma_pte
*)alloc_pgtable_page(domain
->nid
);
3925 domain_flush_cache(domain
, domain
->pgd
, PAGE_SIZE
);
3929 static void iommu_free_vm_domain(struct dmar_domain
*domain
)
3931 unsigned long flags
;
3932 struct dmar_drhd_unit
*drhd
;
3933 struct intel_iommu
*iommu
;
3935 unsigned long ndomains
;
3937 for_each_drhd_unit(drhd
) {
3940 iommu
= drhd
->iommu
;
3942 ndomains
= cap_ndoms(iommu
->cap
);
3943 for_each_set_bit(i
, iommu
->domain_ids
, ndomains
) {
3944 if (iommu
->domains
[i
] == domain
) {
3945 spin_lock_irqsave(&iommu
->lock
, flags
);
3946 clear_bit(i
, iommu
->domain_ids
);
3947 iommu
->domains
[i
] = NULL
;
3948 spin_unlock_irqrestore(&iommu
->lock
, flags
);
3955 static void vm_domain_exit(struct dmar_domain
*domain
)
3957 /* Domain 0 is reserved, so dont process it */
3961 vm_domain_remove_all_dev_info(domain
);
3963 put_iova_domain(&domain
->iovad
);
3966 dma_pte_clear_range(domain
, 0, DOMAIN_MAX_PFN(domain
->gaw
));
3968 /* free page tables */
3969 dma_pte_free_pagetable(domain
, 0, DOMAIN_MAX_PFN(domain
->gaw
));
3971 iommu_free_vm_domain(domain
);
3972 free_domain_mem(domain
);
3975 static int intel_iommu_domain_init(struct iommu_domain
*domain
)
3977 struct dmar_domain
*dmar_domain
;
3979 dmar_domain
= iommu_alloc_vm_domain();
3982 "intel_iommu_domain_init: dmar_domain == NULL\n");
3985 if (md_domain_init(dmar_domain
, DEFAULT_DOMAIN_ADDRESS_WIDTH
)) {
3987 "intel_iommu_domain_init() failed\n");
3988 vm_domain_exit(dmar_domain
);
3991 domain_update_iommu_cap(dmar_domain
);
3992 domain
->priv
= dmar_domain
;
3997 static void intel_iommu_domain_destroy(struct iommu_domain
*domain
)
3999 struct dmar_domain
*dmar_domain
= domain
->priv
;
4001 domain
->priv
= NULL
;
4002 vm_domain_exit(dmar_domain
);
4005 static int intel_iommu_attach_device(struct iommu_domain
*domain
,
4008 struct dmar_domain
*dmar_domain
= domain
->priv
;
4009 struct pci_dev
*pdev
= to_pci_dev(dev
);
4010 struct intel_iommu
*iommu
;
4013 /* normally pdev is not mapped */
4014 if (unlikely(domain_context_mapped(pdev
))) {
4015 struct dmar_domain
*old_domain
;
4017 old_domain
= find_domain(pdev
);
4019 if (dmar_domain
->flags
& DOMAIN_FLAG_VIRTUAL_MACHINE
||
4020 dmar_domain
->flags
& DOMAIN_FLAG_STATIC_IDENTITY
)
4021 domain_remove_one_dev_info(old_domain
, pdev
);
4023 domain_remove_dev_info(old_domain
);
4027 iommu
= device_to_iommu(pci_domain_nr(pdev
->bus
), pdev
->bus
->number
,
4032 /* check if this iommu agaw is sufficient for max mapped address */
4033 addr_width
= agaw_to_width(iommu
->agaw
);
4034 if (addr_width
> cap_mgaw(iommu
->cap
))
4035 addr_width
= cap_mgaw(iommu
->cap
);
4037 if (dmar_domain
->max_addr
> (1LL << addr_width
)) {
4038 printk(KERN_ERR
"%s: iommu width (%d) is not "
4039 "sufficient for the mapped address (%llx)\n",
4040 __func__
, addr_width
, dmar_domain
->max_addr
);
4043 dmar_domain
->gaw
= addr_width
;
4046 * Knock out extra levels of page tables if necessary
4048 while (iommu
->agaw
< dmar_domain
->agaw
) {
4049 struct dma_pte
*pte
;
4051 pte
= dmar_domain
->pgd
;
4052 if (dma_pte_present(pte
)) {
4053 dmar_domain
->pgd
= (struct dma_pte
*)
4054 phys_to_virt(dma_pte_addr(pte
));
4055 free_pgtable_page(pte
);
4057 dmar_domain
->agaw
--;
4060 return domain_add_dev_info(dmar_domain
, pdev
, CONTEXT_TT_MULTI_LEVEL
);
4063 static void intel_iommu_detach_device(struct iommu_domain
*domain
,
4066 struct dmar_domain
*dmar_domain
= domain
->priv
;
4067 struct pci_dev
*pdev
= to_pci_dev(dev
);
4069 domain_remove_one_dev_info(dmar_domain
, pdev
);
4072 static int intel_iommu_map(struct iommu_domain
*domain
,
4073 unsigned long iova
, phys_addr_t hpa
,
4074 size_t size
, int iommu_prot
)
4076 struct dmar_domain
*dmar_domain
= domain
->priv
;
4081 if (iommu_prot
& IOMMU_READ
)
4082 prot
|= DMA_PTE_READ
;
4083 if (iommu_prot
& IOMMU_WRITE
)
4084 prot
|= DMA_PTE_WRITE
;
4085 if ((iommu_prot
& IOMMU_CACHE
) && dmar_domain
->iommu_snooping
)
4086 prot
|= DMA_PTE_SNP
;
4088 max_addr
= iova
+ size
;
4089 if (dmar_domain
->max_addr
< max_addr
) {
4092 /* check if minimum agaw is sufficient for mapped address */
4093 end
= __DOMAIN_MAX_ADDR(dmar_domain
->gaw
) + 1;
4094 if (end
< max_addr
) {
4095 printk(KERN_ERR
"%s: iommu width (%d) is not "
4096 "sufficient for the mapped address (%llx)\n",
4097 __func__
, dmar_domain
->gaw
, max_addr
);
4100 dmar_domain
->max_addr
= max_addr
;
4102 /* Round up size to next multiple of PAGE_SIZE, if it and
4103 the low bits of hpa would take us onto the next page */
4104 size
= aligned_nrpages(hpa
, size
);
4105 ret
= domain_pfn_mapping(dmar_domain
, iova
>> VTD_PAGE_SHIFT
,
4106 hpa
>> VTD_PAGE_SHIFT
, size
, prot
);
4110 static size_t intel_iommu_unmap(struct iommu_domain
*domain
,
4111 unsigned long iova
, size_t size
)
4113 struct dmar_domain
*dmar_domain
= domain
->priv
;
4116 order
= dma_pte_clear_range(dmar_domain
, iova
>> VTD_PAGE_SHIFT
,
4117 (iova
+ size
- 1) >> VTD_PAGE_SHIFT
);
4119 if (dmar_domain
->max_addr
== iova
+ size
)
4120 dmar_domain
->max_addr
= iova
;
4122 return PAGE_SIZE
<< order
;
4125 static phys_addr_t
intel_iommu_iova_to_phys(struct iommu_domain
*domain
,
4128 struct dmar_domain
*dmar_domain
= domain
->priv
;
4129 struct dma_pte
*pte
;
4132 pte
= pfn_to_dma_pte(dmar_domain
, iova
>> VTD_PAGE_SHIFT
, 0);
4134 phys
= dma_pte_addr(pte
);
4139 static int intel_iommu_domain_has_cap(struct iommu_domain
*domain
,
4142 struct dmar_domain
*dmar_domain
= domain
->priv
;
4144 if (cap
== IOMMU_CAP_CACHE_COHERENCY
)
4145 return dmar_domain
->iommu_snooping
;
4146 if (cap
== IOMMU_CAP_INTR_REMAP
)
4147 return intr_remapping_enabled
;
4153 * Group numbers are arbitrary. Device with the same group number
4154 * indicate the iommu cannot differentiate between them. To avoid
4155 * tracking used groups we just use the seg|bus|devfn of the lowest
4156 * level we're able to differentiate devices
4158 static int intel_iommu_device_group(struct device
*dev
, unsigned int *groupid
)
4160 struct pci_dev
*pdev
= to_pci_dev(dev
);
4161 struct pci_dev
*bridge
;
4171 if (iommu_no_mapping(dev
))
4174 id
.pci
.segment
= pci_domain_nr(pdev
->bus
);
4175 id
.pci
.bus
= pdev
->bus
->number
;
4176 id
.pci
.devfn
= pdev
->devfn
;
4178 if (!device_to_iommu(id
.pci
.segment
, id
.pci
.bus
, id
.pci
.devfn
))
4181 bridge
= pci_find_upstream_pcie_bridge(pdev
);
4183 if (pci_is_pcie(bridge
)) {
4184 id
.pci
.bus
= bridge
->subordinate
->number
;
4187 id
.pci
.bus
= bridge
->bus
->number
;
4188 id
.pci
.devfn
= bridge
->devfn
;
4192 if (!pdev
->is_virtfn
&& iommu_group_mf
)
4193 id
.pci
.devfn
= PCI_DEVFN(PCI_SLOT(id
.pci
.devfn
), 0);
4195 *groupid
= id
.group
;
4200 static struct iommu_ops intel_iommu_ops
= {
4201 .domain_init
= intel_iommu_domain_init
,
4202 .domain_destroy
= intel_iommu_domain_destroy
,
4203 .attach_dev
= intel_iommu_attach_device
,
4204 .detach_dev
= intel_iommu_detach_device
,
4205 .map
= intel_iommu_map
,
4206 .unmap
= intel_iommu_unmap
,
4207 .iova_to_phys
= intel_iommu_iova_to_phys
,
4208 .domain_has_cap
= intel_iommu_domain_has_cap
,
4209 .device_group
= intel_iommu_device_group
,
4210 .pgsize_bitmap
= INTEL_IOMMU_PGSIZES
,
4213 static void __devinit
quirk_iommu_g4x_gfx(struct pci_dev
*dev
)
4215 /* G4x/GM45 integrated gfx dmar support is totally busted. */
4216 printk(KERN_INFO
"DMAR: Disabling IOMMU for graphics on this chipset\n");
4220 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2a40, quirk_iommu_g4x_gfx
);
4221 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2e00, quirk_iommu_g4x_gfx
);
4222 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2e10, quirk_iommu_g4x_gfx
);
4223 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2e20, quirk_iommu_g4x_gfx
);
4224 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2e30, quirk_iommu_g4x_gfx
);
4225 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2e40, quirk_iommu_g4x_gfx
);
4226 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2e90, quirk_iommu_g4x_gfx
);
4228 static void __devinit
quirk_iommu_rwbf(struct pci_dev
*dev
)
4231 * Mobile 4 Series Chipset neglects to set RWBF capability,
4232 * but needs it. Same seems to hold for the desktop versions.
4234 printk(KERN_INFO
"DMAR: Forcing write-buffer flush capability\n");
4238 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2a40, quirk_iommu_rwbf
);
4239 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2e00, quirk_iommu_rwbf
);
4240 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2e10, quirk_iommu_rwbf
);
4241 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2e20, quirk_iommu_rwbf
);
4242 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2e30, quirk_iommu_rwbf
);
4243 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2e40, quirk_iommu_rwbf
);
4244 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x2e90, quirk_iommu_rwbf
);
4247 #define GGC_MEMORY_SIZE_MASK (0xf << 8)
4248 #define GGC_MEMORY_SIZE_NONE (0x0 << 8)
4249 #define GGC_MEMORY_SIZE_1M (0x1 << 8)
4250 #define GGC_MEMORY_SIZE_2M (0x3 << 8)
4251 #define GGC_MEMORY_VT_ENABLED (0x8 << 8)
4252 #define GGC_MEMORY_SIZE_2M_VT (0x9 << 8)
4253 #define GGC_MEMORY_SIZE_3M_VT (0xa << 8)
4254 #define GGC_MEMORY_SIZE_4M_VT (0xb << 8)
4256 static void __devinit
quirk_calpella_no_shadow_gtt(struct pci_dev
*dev
)
4260 if (pci_read_config_word(dev
, GGC
, &ggc
))
4263 if (!(ggc
& GGC_MEMORY_VT_ENABLED
)) {
4264 printk(KERN_INFO
"DMAR: BIOS has allocated no shadow GTT; disabling IOMMU for graphics\n");
4266 } else if (dmar_map_gfx
) {
4267 /* we have to ensure the gfx device is idle before we flush */
4268 printk(KERN_INFO
"DMAR: Disabling batched IOTLB flush on Ironlake\n");
4269 intel_iommu_strict
= 1;
4272 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x0040, quirk_calpella_no_shadow_gtt
);
4273 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x0044, quirk_calpella_no_shadow_gtt
);
4274 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x0062, quirk_calpella_no_shadow_gtt
);
4275 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL
, 0x006a, quirk_calpella_no_shadow_gtt
);
4277 /* On Tylersburg chipsets, some BIOSes have been known to enable the
4278 ISOCH DMAR unit for the Azalia sound device, but not give it any
4279 TLB entries, which causes it to deadlock. Check for that. We do
4280 this in a function called from init_dmars(), instead of in a PCI
4281 quirk, because we don't want to print the obnoxious "BIOS broken"
4282 message if VT-d is actually disabled.
4284 static void __init
check_tylersburg_isoch(void)
4286 struct pci_dev
*pdev
;
4287 uint32_t vtisochctrl
;
4289 /* If there's no Azalia in the system anyway, forget it. */
4290 pdev
= pci_get_device(PCI_VENDOR_ID_INTEL
, 0x3a3e, NULL
);
4295 /* System Management Registers. Might be hidden, in which case
4296 we can't do the sanity check. But that's OK, because the
4297 known-broken BIOSes _don't_ actually hide it, so far. */
4298 pdev
= pci_get_device(PCI_VENDOR_ID_INTEL
, 0x342e, NULL
);
4302 if (pci_read_config_dword(pdev
, 0x188, &vtisochctrl
)) {
4309 /* If Azalia DMA is routed to the non-isoch DMAR unit, fine. */
4310 if (vtisochctrl
& 1)
4313 /* Drop all bits other than the number of TLB entries */
4314 vtisochctrl
&= 0x1c;
4316 /* If we have the recommended number of TLB entries (16), fine. */
4317 if (vtisochctrl
== 0x10)
4320 /* Zero TLB entries? You get to ride the short bus to school. */
4322 WARN(1, "Your BIOS is broken; DMA routed to ISOCH DMAR unit but no TLB space.\n"
4323 "BIOS vendor: %s; Ver: %s; Product Version: %s\n",
4324 dmi_get_system_info(DMI_BIOS_VENDOR
),
4325 dmi_get_system_info(DMI_BIOS_VERSION
),
4326 dmi_get_system_info(DMI_PRODUCT_VERSION
));
4327 iommu_identity_mapping
|= IDENTMAP_AZALIA
;
4331 printk(KERN_WARNING
"DMAR: Recommended TLB entries for ISOCH unit is 16; your BIOS set %d\n",