1 // SPDX-License-Identifier: GPL-2.0-only
3 * imr.c -- Intel Isolated Memory Region driver
5 * Copyright(c) 2013 Intel Corporation.
6 * Copyright(c) 2015 Bryan O'Donoghue <pure.logic@nexus-software.ie>
8 * IMR registers define an isolated region of memory that can
9 * be masked to prohibit certain system agents from accessing memory.
10 * When a device behind a masked port performs an access - snooped or
11 * not, an IMR may optionally prevent that transaction from changing
12 * the state of memory or from getting correct data in response to the
15 * Write data will be dropped and reads will return 0xFFFFFFFF, the
16 * system will reset and system BIOS will print out an error message to
17 * inform the user that an IMR has been violated.
19 * This code is based on the Linux MTRR code and reference code from
20 * Intel's Quark BSP EFI, Linux and grub code.
22 * See quark-x1000-datasheet.pdf for register definitions.
23 * http://www.intel.com/content/dam/www/public/us/en/documents/datasheets/quark-x1000-datasheet.pdf
26 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
28 #include <asm-generic/sections.h>
29 #include <asm/cpu_device_id.h>
31 #include <asm/iosf_mbi.h>
32 #include <linux/debugfs.h>
33 #include <linux/init.h>
35 #include <linux/types.h>
44 static struct imr_device imr_dev;
47 * IMR read/write mask control registers.
48 * See quark-x1000-datasheet.pdf sections 12.7.4.5 and 12.7.4.6 for
54 * 23:2 1 KiB aligned lo address
59 * 23:2 1 KiB aligned hi address
62 #define IMR_LOCK BIT(31)
71 #define IMR_NUM_REGS (sizeof(struct imr_regs)/sizeof(u32))
73 #define imr_to_phys(x) ((x) << IMR_SHIFT)
74 #define phys_to_imr(x) ((x) >> IMR_SHIFT)
77 * imr_is_enabled - true if an IMR is enabled false otherwise.
79 * Determines if an IMR is enabled based on address range and read/write
80 * mask. An IMR set with an address range set to zero and a read/write
81 * access mask set to all is considered to be disabled. An IMR in any
82 * other state - for example set to zero but without read/write access
83 * all is considered to be enabled. This definition of disabled is how
84 * firmware switches off an IMR and is maintained in kernel for
87 * @imr: pointer to IMR descriptor.
88 * @return: true if IMR enabled false if disabled.
90 static inline int imr_is_enabled(struct imr_regs *imr)
92 return !(imr->rmask == IMR_READ_ACCESS_ALL &&
93 imr->wmask == IMR_WRITE_ACCESS_ALL &&
94 imr_to_phys(imr->addr_lo) == 0 &&
95 imr_to_phys(imr->addr_hi) == 0);
99 * imr_read - read an IMR at a given index.
101 * Requires caller to hold imr mutex.
103 * @idev: pointer to imr_device structure.
104 * @imr_id: IMR entry to read.
105 * @imr: IMR structure representing address and access masks.
106 * @return: 0 on success or error code passed from mbi_iosf on failure.
108 static int imr_read(struct imr_device *idev, u32 imr_id, struct imr_regs *imr)
110 u32 reg = imr_id * IMR_NUM_REGS + idev->reg_base;
113 ret = iosf_mbi_read(QRK_MBI_UNIT_MM, MBI_REG_READ, reg++, &imr->addr_lo);
117 ret = iosf_mbi_read(QRK_MBI_UNIT_MM, MBI_REG_READ, reg++, &imr->addr_hi);
121 ret = iosf_mbi_read(QRK_MBI_UNIT_MM, MBI_REG_READ, reg++, &imr->rmask);
125 return iosf_mbi_read(QRK_MBI_UNIT_MM, MBI_REG_READ, reg++, &imr->wmask);
129 * imr_write - write an IMR at a given index.
131 * Requires caller to hold imr mutex.
132 * Note lock bits need to be written independently of address bits.
134 * @idev: pointer to imr_device structure.
135 * @imr_id: IMR entry to write.
136 * @imr: IMR structure representing address and access masks.
137 * @return: 0 on success or error code passed from mbi_iosf on failure.
139 static int imr_write(struct imr_device *idev, u32 imr_id, struct imr_regs *imr)
142 u32 reg = imr_id * IMR_NUM_REGS + idev->reg_base;
145 local_irq_save(flags);
147 ret = iosf_mbi_write(QRK_MBI_UNIT_MM, MBI_REG_WRITE, reg++, imr->addr_lo);
151 ret = iosf_mbi_write(QRK_MBI_UNIT_MM, MBI_REG_WRITE, reg++, imr->addr_hi);
155 ret = iosf_mbi_write(QRK_MBI_UNIT_MM, MBI_REG_WRITE, reg++, imr->rmask);
159 ret = iosf_mbi_write(QRK_MBI_UNIT_MM, MBI_REG_WRITE, reg++, imr->wmask);
163 local_irq_restore(flags);
167 * If writing to the IOSF failed then we're in an unknown state,
168 * likely a very bad state. An IMR in an invalid state will almost
169 * certainly lead to a memory access violation.
171 local_irq_restore(flags);
172 WARN(ret, "IOSF-MBI write fail range 0x%08x-0x%08x unreliable\n",
173 imr_to_phys(imr->addr_lo), imr_to_phys(imr->addr_hi) + IMR_MASK);
179 * imr_dbgfs_state_show - print state of IMR registers.
181 * @s: pointer to seq_file for output.
182 * @unused: unused parameter.
183 * @return: 0 on success or error code passed from mbi_iosf on failure.
185 static int imr_dbgfs_state_show(struct seq_file *s, void *unused)
190 struct imr_device *idev = s->private;
195 mutex_lock(&idev->lock);
197 for (i = 0; i < idev->max_imr; i++) {
199 ret = imr_read(idev, i, &imr);
204 * Remember to add IMR_ALIGN bytes to size to indicate the
205 * inherent IMR_ALIGN size bytes contained in the masked away
208 if (imr_is_enabled(&imr)) {
209 base = imr_to_phys(imr.addr_lo);
210 end = imr_to_phys(imr.addr_hi) + IMR_MASK;
211 size = end - base + 1;
217 seq_printf(s, "imr%02i: base=%pa, end=%pa, size=0x%08zx "
218 "rmask=0x%08x, wmask=0x%08x, %s, %s\n", i,
219 &base, &end, size, imr.rmask, imr.wmask,
220 imr_is_enabled(&imr) ? "enabled " : "disabled",
221 imr.addr_lo & IMR_LOCK ? "locked" : "unlocked");
224 mutex_unlock(&idev->lock);
227 DEFINE_SHOW_ATTRIBUTE(imr_dbgfs_state);
230 * imr_debugfs_register - register debugfs hooks.
232 * @idev: pointer to imr_device structure.
234 static void imr_debugfs_register(struct imr_device *idev)
236 debugfs_create_file("imr_state", 0444, NULL, idev,
237 &imr_dbgfs_state_fops);
241 * imr_check_params - check passed address range IMR alignment and non-zero size
243 * @base: base address of intended IMR.
244 * @size: size of intended IMR.
245 * @return: zero on valid range -EINVAL on unaligned base/size.
247 static int imr_check_params(phys_addr_t base, size_t size)
249 if ((base & IMR_MASK) || (size & IMR_MASK)) {
250 pr_err("base %pa size 0x%08zx must align to 1KiB\n",
261 * imr_raw_size - account for the IMR_ALIGN bytes that addr_hi appends.
263 * IMR addr_hi has a built in offset of plus IMR_ALIGN (0x400) bytes from the
264 * value in the register. We need to subtract IMR_ALIGN bytes from input sizes
267 * @size: input size bytes.
268 * @return: reduced size.
270 static inline size_t imr_raw_size(size_t size)
272 return size - IMR_ALIGN;
276 * imr_address_overlap - detects an address overlap.
278 * @addr: address to check against an existing IMR.
279 * @imr: imr being checked.
280 * @return: true for overlap false for no overlap.
282 static inline int imr_address_overlap(phys_addr_t addr, struct imr_regs *imr)
284 return addr >= imr_to_phys(imr->addr_lo) && addr <= imr_to_phys(imr->addr_hi);
288 * imr_add_range - add an Isolated Memory Region.
290 * @base: physical base address of region aligned to 1KiB.
291 * @size: physical size of region in bytes must be aligned to 1KiB.
292 * @read_mask: read access mask.
293 * @write_mask: write access mask.
294 * @return: zero on success or negative value indicating error.
296 int imr_add_range(phys_addr_t base, size_t size,
297 unsigned int rmask, unsigned int wmask)
301 struct imr_device *idev = &imr_dev;
307 if (WARN_ONCE(idev->init == false, "driver not initialized"))
310 ret = imr_check_params(base, size);
314 /* Tweak the size value. */
315 raw_size = imr_raw_size(size);
316 end = base + raw_size;
319 * Check for reserved IMR value common to firmware, kernel and grub
320 * indicating a disabled IMR.
322 imr.addr_lo = phys_to_imr(base);
323 imr.addr_hi = phys_to_imr(end);
326 if (!imr_is_enabled(&imr))
329 mutex_lock(&idev->lock);
332 * Find a free IMR while checking for an existing overlapping range.
333 * Note there's no restriction in silicon to prevent IMR overlaps.
334 * For the sake of simplicity and ease in defining/debugging an IMR
335 * memory map we exclude IMR overlaps.
338 for (i = 0; i < idev->max_imr; i++) {
339 ret = imr_read(idev, i, &imr);
343 /* Find overlap @ base or end of requested range. */
345 if (imr_is_enabled(&imr)) {
346 if (imr_address_overlap(base, &imr))
348 if (imr_address_overlap(end, &imr))
355 /* Error out if we have no free IMR entries. */
361 pr_debug("add %d phys %pa-%pa size %zx mask 0x%08x wmask 0x%08x\n",
362 reg, &base, &end, raw_size, rmask, wmask);
364 /* Enable IMR at specified range and access mask. */
365 imr.addr_lo = phys_to_imr(base);
366 imr.addr_hi = phys_to_imr(end);
370 ret = imr_write(idev, reg, &imr);
373 * In the highly unlikely event iosf_mbi_write failed
374 * attempt to rollback the IMR setup skipping the trapping
375 * of further IOSF write failures.
379 imr.rmask = IMR_READ_ACCESS_ALL;
380 imr.wmask = IMR_WRITE_ACCESS_ALL;
381 imr_write(idev, reg, &imr);
384 mutex_unlock(&idev->lock);
387 EXPORT_SYMBOL_GPL(imr_add_range);
390 * __imr_remove_range - delete an Isolated Memory Region.
392 * This function allows you to delete an IMR by its index specified by reg or
393 * by address range specified by base and size respectively. If you specify an
394 * index on its own the base and size parameters are ignored.
395 * imr_remove_range(0, base, size); delete IMR at index 0 base/size ignored.
396 * imr_remove_range(-1, base, size); delete IMR from base to base+size.
398 * @reg: imr index to remove.
399 * @base: physical base address of region aligned to 1 KiB.
400 * @size: physical size of region in bytes aligned to 1 KiB.
401 * @return: -EINVAL on invalid range or out or range id
402 * -ENODEV if reg is valid but no IMR exists or is locked
405 static int __imr_remove_range(int reg, phys_addr_t base, size_t size)
410 struct imr_device *idev = &imr_dev;
415 if (WARN_ONCE(idev->init == false, "driver not initialized"))
419 * Validate address range if deleting by address, else we are
420 * deleting by index where base and size will be ignored.
423 ret = imr_check_params(base, size);
428 /* Tweak the size value. */
429 raw_size = imr_raw_size(size);
430 end = base + raw_size;
432 mutex_lock(&idev->lock);
435 /* If a specific IMR is given try to use it. */
436 ret = imr_read(idev, reg, &imr);
440 if (!imr_is_enabled(&imr) || imr.addr_lo & IMR_LOCK) {
446 /* Search for match based on address range. */
447 for (i = 0; i < idev->max_imr; i++) {
448 ret = imr_read(idev, i, &imr);
452 if (!imr_is_enabled(&imr) || imr.addr_lo & IMR_LOCK)
455 if ((imr_to_phys(imr.addr_lo) == base) &&
456 (imr_to_phys(imr.addr_hi) == end)) {
469 pr_debug("remove %d phys %pa-%pa size %zx\n", reg, &base, &end, raw_size);
471 /* Tear down the IMR. */
474 imr.rmask = IMR_READ_ACCESS_ALL;
475 imr.wmask = IMR_WRITE_ACCESS_ALL;
477 ret = imr_write(idev, reg, &imr);
480 mutex_unlock(&idev->lock);
485 * imr_remove_range - delete an Isolated Memory Region by address
487 * This function allows you to delete an IMR by an address range specified
488 * by base and size respectively.
489 * imr_remove_range(base, size); delete IMR from base to base+size.
491 * @base: physical base address of region aligned to 1 KiB.
492 * @size: physical size of region in bytes aligned to 1 KiB.
493 * @return: -EINVAL on invalid range or out or range id
494 * -ENODEV if reg is valid but no IMR exists or is locked
497 int imr_remove_range(phys_addr_t base, size_t size)
499 return __imr_remove_range(-1, base, size);
501 EXPORT_SYMBOL_GPL(imr_remove_range);
504 * imr_clear - delete an Isolated Memory Region by index
506 * This function allows you to delete an IMR by an address range specified
507 * by the index of the IMR. Useful for initial sanitization of the IMR
509 * imr_ge(base, size); delete IMR from base to base+size.
511 * @reg: imr index to remove.
512 * @return: -EINVAL on invalid range or out or range id
513 * -ENODEV if reg is valid but no IMR exists or is locked
516 static inline int imr_clear(int reg)
518 return __imr_remove_range(reg, 0, 0);
522 * imr_fixup_memmap - Tear down IMRs used during bootup.
524 * BIOS and Grub both setup IMRs around compressed kernel, initrd memory
525 * that need to be removed before the kernel hands out one of the IMR
526 * encased addresses to a downstream DMA agent such as the SD or Ethernet.
527 * IMRs on Galileo are setup to immediately reset the system on violation.
528 * As a result if you're running a root filesystem from SD - you'll need
529 * the boot-time IMRs torn down or you'll find seemingly random resets when
530 * using your filesystem.
532 * @idev: pointer to imr_device structure.
535 static void __init imr_fixup_memmap(struct imr_device *idev)
537 phys_addr_t base = virt_to_phys(&_text);
538 size_t size = virt_to_phys(&__end_rodata) - base;
539 unsigned long start, end;
543 /* Tear down all existing unlocked IMRs. */
544 for (i = 0; i < idev->max_imr; i++)
547 start = (unsigned long)_text;
548 end = (unsigned long)__end_rodata - 1;
551 * Setup an unlocked IMR around the physical extent of the kernel
552 * from the beginning of the .text secton to the end of the
553 * .rodata section as one physically contiguous block.
555 * We don't round up @size since it is already PAGE_SIZE aligned.
556 * See vmlinux.lds.S for details.
558 ret = imr_add_range(base, size, IMR_CPU, IMR_CPU);
560 pr_err("unable to setup IMR for kernel: %zu KiB (%lx - %lx)\n",
561 size / 1024, start, end);
563 pr_info("protecting kernel .text - .rodata: %zu KiB (%lx - %lx)\n",
564 size / 1024, start, end);
569 static const struct x86_cpu_id imr_ids[] __initconst = {
570 { X86_VENDOR_INTEL, 5, 9 }, /* Intel Quark SoC X1000. */
575 * imr_init - entry point for IMR driver.
577 * return: -ENODEV for no IMR support 0 if good to go.
579 static int __init imr_init(void)
581 struct imr_device *idev = &imr_dev;
583 if (!x86_match_cpu(imr_ids) || !iosf_mbi_available())
586 idev->max_imr = QUARK_X1000_IMR_MAX;
587 idev->reg_base = QUARK_X1000_IMR_REGBASE;
590 mutex_init(&idev->lock);
591 imr_debugfs_register(idev);
592 imr_fixup_memmap(idev);
595 device_initcall(imr_init);