1. 08 12月, 2009 2 次提交
  2. 05 12月, 2009 1 次提交
    • C
      PCI: add pci_request_acs · 5d990b62
      Chris Wright 提交于
      Commit ae21ee65 "PCI: acs p2p upsteram
      forwarding enabling" doesn't actually enable ACS.
      
      Add a function to pci core to allow an IOMMU to request that ACS
      be enabled.  The existing mechanism of using iommu_found() in the pci
      core to know when ACS should be enabled doesn't actually work due to
      initialization order;  iommu has only been detected not initialized.
      
      Have Intel and AMD IOMMUs request ACS, and Xen does as well during early
      init of dom0.
      
      Cc: Allen Kay <allen.m.kay@intel.com>
      Cc: David Woodhouse <dwmw2@infradead.org>
      Cc: Jeremy Fitzhardinge <jeremy@goop.org>
      Cc: Joerg Roedel <joerg.roedel@amd.com>
      Signed-off-by: NChris Wright <chrisw@sous-sol.org>
      Signed-off-by: NJesse Barnes <jbarnes@virtuousgeek.org>
      5d990b62
  3. 25 11月, 2009 1 次提交
  4. 20 11月, 2009 1 次提交
    • D
      Fix handling of the HP/Acer 'DMAR at zero' BIOS error for machines with <4GiB RAM. · 5854d9c8
      David Woodhouse 提交于
      Commit 86cf898e ("intel-iommu: Check for
      'DMAR at zero' BIOS error earlier.") was supposed to work by pretending
      not to detect an IOMMU if it was actually being reported by the BIOS at
      physical address zero.
      
      However, the intel_iommu_init() function is called unconditionally, as
      are the corresponding functions for other IOMMU hardware.
      
      So the patch only worked if you have RAM above the 4GiB boundary. It
      caused swiotlb to be initialised when no IOMMU was detected during early
      boot, and thus the later IOMMU init would refuse to run.
      
      But if you have less RAM than that, swiotlb wouldn't get set up and the
      IOMMU _would_ still end up being initialised, even though we never
      claimed to detect it.
      
      This patch also sets the dmar_disabled flag when the error is detected
      during the initial detection phase -- so that the later call to
      intel_iommu_init() will return without doing anything, regardless of
      whether swiotlb is used or not.
      Signed-off-by: NDavid Woodhouse <David.Woodhouse@intel.com>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      5854d9c8
  5. 10 11月, 2009 3 次提交
    • F
      x86: Handle HW IOMMU initialization failure gracefully · 75f1cdf1
      FUJITA Tomonori 提交于
      If HW IOMMU initialization fails (Intel VT-d often does this,
      typically due to BIOS bugs), we fall back to nommu. It doesn't
      work for the majority since nowadays we have more than 4GB
      memory so we must use swiotlb instead of nommu.
      
      The problem is that it's too late to initialize swiotlb when HW
      IOMMU initialization fails. We need to allocate swiotlb memory
      earlier from bootmem allocator. Chris explained the issue in
      detail:
      
        http://marc.info/?l=linux-kernel&m=125657444317079&w=2
      
      The current x86 IOMMU initialization sequence is too complicated
      and handling the above issue makes it more hacky.
      
      This patch changes x86 IOMMU initialization sequence to handle
      the above issue cleanly.
      
      The new x86 IOMMU initialization sequence are:
      
      1. we initialize the swiotlb (and setting swiotlb to 1) in the case
         of (max_pfn > MAX_DMA32_PFN && !no_iommu). dma_ops is set to
         swiotlb_dma_ops or nommu_dma_ops. if swiotlb usage is forced by
         the boot option, we finish here.
      
      2. we call the detection functions of all the IOMMUs
      
      3. the detection function sets x86_init.iommu.iommu_init to the
         IOMMU initialization function (so we can avoid calling the
         initialization functions of all the IOMMUs needlessly).
      
      4. if the IOMMU initialization function doesn't need to swiotlb
         then sets swiotlb to zero (e.g. the initialization is
         sucessful).
      
      5. if we find that swiotlb is set to zero, we free swiotlb
         resource.
      Signed-off-by: NFUJITA Tomonori <fujita.tomonori@lab.ntt.co.jp>
      Cc: chrisw@sous-sol.org
      Cc: dwmw2@infradead.org
      Cc: joerg.roedel@amd.com
      Cc: muli@il.ibm.com
      LKML-Reference: <1257849980-22640-10-git-send-email-fujita.tomonori@lab.ntt.co.jp>
      Signed-off-by: NIngo Molnar <mingo@elte.hu>
      75f1cdf1
    • F
      x86: intel-iommu: Convert detect_intel_iommu to use iommu_init hook · 9d5ce73a
      FUJITA Tomonori 提交于
      This changes detect_intel_iommu() to set intel_iommu_init() to
      iommu_init hook if detect_intel_iommu() finds the IOMMU.
      Signed-off-by: NFUJITA Tomonori <fujita.tomonori@lab.ntt.co.jp>
      Cc: chrisw@sous-sol.org
      Cc: dwmw2@infradead.org
      Cc: joerg.roedel@amd.com
      Cc: muli@il.ibm.com
      LKML-Reference: <1257849980-22640-6-git-send-email-fujita.tomonori@lab.ntt.co.jp>
      [ -v2: build fix for the !CONFIG_DMAR case ]
      Signed-off-by: NIngo Molnar <mingo@elte.hu>
      9d5ce73a
    • D
      intel-iommu: Check for 'DMAR at zero' BIOS error earlier. · 86cf898e
      David Woodhouse 提交于
      Chris Wright has some patches which let us fall back to swiotlb nicely
      if IOMMU initialisation fails. But those are a bit much for 2.6.32.
      
      Instead, let's shift the check for the biggest problem, the HP and Acer
      BIOS bug which reports a DMAR at physical address zero. That one can
      actually be checked much earlier -- before we even admit to having
      detected an IOMMU in the first place. So the swiotlb init goes ahead as
      we want.
      Signed-off-by: NDavid Woodhouse <David.Woodhouse@intel.com>
      86cf898e
  6. 07 10月, 2009 1 次提交
  7. 05 10月, 2009 2 次提交
  8. 25 9月, 2009 1 次提交
  9. 24 9月, 2009 1 次提交
  10. 19 9月, 2009 1 次提交
  11. 11 9月, 2009 2 次提交
  12. 02 9月, 2009 1 次提交
  13. 31 8月, 2009 1 次提交
    • T
      pci/dmar: correct off-by-one error in dmar_fault() · 8211a7b5
      Troy Heber 提交于
      DMAR faults are recorded into a ring of "fault recording registers".
      fault_index is a 0-based index into the ring. The code allows the
      0-based fault_index to be equal to the total number of fault registers
      available from the cap_num_fault_regs() macro, which causes access
      beyond the last available register.
      
      Signed-off-by Troy Heber <troy.heber@hp.com>
      Signed-off-by: NDavid Woodhouse <David.Woodhouse@intel.com>
      8211a7b5
  14. 29 8月, 2009 1 次提交
  15. 04 8月, 2009 1 次提交
  16. 22 7月, 2009 1 次提交
    • J
      intel_txt: Force IOMMU on for Intel TXT launch · a59b50e9
      Joseph Cihula 提交于
      The tboot module will DMA protect all of memory in order to ensure the that
      kernel will be able to initialize without compromise (from DMA).  Consequently,
      the kernel must enable Intel Virtualization Technology for Directed I/O
      (VT-d or Intel IOMMU) in order to replace this broad protection with the
      appropriate page-granular protection.  Otherwise DMA devices will be unable
      to read or write from memory and the kernel will eventually panic.
      
      Because runtime IOMMU support is configurable by command line options, this
      patch will force it to be enabled regardless of the options specified, and will
      log a message if it was required to force it on.
      
       dmar.c        |    7 +++++++
       intel-iommu.c |   17 +++++++++++++++--
       2 files changed, 22 insertions(+), 2 deletions(-)
      Signed-off-by: NJoseph Cihula <joseph.cihula@intel.com>
      Signed-off-by: NShane Wang <shane.wang@intel.com>
      Cc: David Woodhouse <dwmw2@infradead.org>
      Signed-off-by: NH. Peter Anvin <hpa@zytor.com>
      a59b50e9
  17. 18 5月, 2009 2 次提交
  18. 14 5月, 2009 1 次提交
  19. 11 5月, 2009 3 次提交
  20. 29 4月, 2009 1 次提交
    • F
      Intel IOMMU Pass Through Support · 4ed0d3e6
      Fenghua Yu 提交于
      The patch adds kernel parameter intel_iommu=pt to set up pass through
      mode in context mapping entry. This disables DMAR in linux kernel; but
      KVM still runs on VT-d and interrupt remapping still works.
      
      In this mode, kernel uses swiotlb for DMA API functions but other VT-d
      functionalities are enabled for KVM. KVM always uses multi level
      translation page table in VT-d. By default, pass though mode is disabled
      in kernel.
      
      This is useful when people don't want to enable VT-d DMAR in kernel but
      still want to use KVM and interrupt remapping for reasons like DMAR
      performance concern or debug purpose.
      Signed-off-by: NFenghua Yu <fenghua.yu@intel.com>
      Acked-by: NWeidong Han <weidong@intel.com>
      Signed-off-by: NDavid Woodhouse <David.Woodhouse@intel.com>
      4ed0d3e6
  21. 11 4月, 2009 1 次提交
  22. 04 4月, 2009 2 次提交
  23. 18 3月, 2009 5 次提交
  24. 14 2月, 2009 1 次提交
    • T
      intel-iommu: fix endless "Unknown DMAR structure type" loop · 084eb960
      Tony Battersby 提交于
      I have a SuperMicro C2SBX motherboard with BIOS revision 1.0b.  With vt-d
      enabled in the BIOS, Linux gets into an endless loop printing
      "DMAR:Unknown DMAR structure type" when booting.  Here is the DMAR ACPI
      table:
      
      DMAR @ 0x7fe86dec
        0000: 44 4d 41 52 98 00 00 00 01 6f 49 6e 74 65 6c 20  DMAR.....oIntel
        0010: 4f 45 4d 44 4d 41 52 20 00 00 04 06 4c 4f 48 52  OEMDMAR ....LOHR
        0020: 01 00 00 00 23 00 00 00 00 00 00 00 00 00 00 00  ....#...........
        0030: 01 00 58 00 00 00 00 00 00 a0 e8 7f 00 00 00 00  ..X.............
        0040: ff ff ef 7f 00 00 00 00 01 08 00 00 00 00 1d 00  ................
        0050: 01 08 00 00 00 00 1d 01 01 08 00 00 00 00 1d 02  ................
        0060: 01 08 00 00 00 00 1d 07 01 08 00 00 00 00 1a 00  ................
        0070: 01 08 00 00 00 00 1a 01 01 08 00 00 00 00 1a 02  ................
        0080: 01 08 00 00 00 00 1a 07 01 08 00 00 00 00 1a 07  ................
        0090: c0 00 68 00 04 10 66 60                          ..h...f`
      
      Here are the messages printed by the kernel:
      
      DMAR:Host address width 36
      DMAR:RMRR base: 0x000000007fe8a000 end: 0x000000007fefffff
      DMAR:Unknown DMAR structure type
      DMAR:Unknown DMAR structure type
      DMAR:Unknown DMAR structure type
      ...
      
      Although I not very familiar with ACPI, to me it looks like struct
      acpi_dmar_header::length == 0x0058 is incorrect, causing
      parse_dmar_table() to look at an invalid offset on the next loop.  This
      offset happens to have struct acpi_dmar_header::length == 0x0000, which
      prevents the loop from ever terminating.  This patch checks for this
      condition and bails out instead of looping forever.
      Signed-off-by: NTony Battersby <tonyb@cybernetics.com>
      Signed-off-by: NAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: NDavid Woodhouse <David.Woodhouse@intel.com>
      084eb960
  25. 11 2月, 2009 1 次提交
  26. 09 2月, 2009 2 次提交