Loading...
1// SPDX-License-Identifier: MIT
2/*
3 * Copyright © 2019 Intel Corporation
4 */
5
6#include <linux/device.h>
7
8#include <drm/drm_drv.h>
9
10#include "i915_drv.h"
11#include "i915_reg.h"
12#include "i915_utils.h"
13
14void add_taint_for_CI(struct drm_i915_private *i915, unsigned int taint)
15{
16 drm_notice(&i915->drm, "CI tainted: %#x by %pS\n",
17 taint, __builtin_return_address(0));
18
19 /* Failures that occur during fault injection testing are expected */
20 if (!i915_error_injected())
21 __add_taint_for_CI(taint);
22}
23
24#if IS_ENABLED(CONFIG_DRM_I915_DEBUG)
25static unsigned int i915_probe_fail_count;
26
27int __i915_inject_probe_error(struct drm_i915_private *i915, int err,
28 const char *func, int line)
29{
30 if (i915_probe_fail_count >= i915_modparams.inject_probe_failure)
31 return 0;
32
33 if (++i915_probe_fail_count < i915_modparams.inject_probe_failure)
34 return 0;
35
36 drm_info(&i915->drm, "Injecting failure %d at checkpoint %u [%s:%d]\n",
37 err, i915_modparams.inject_probe_failure, func, line);
38
39 i915_modparams.inject_probe_failure = 0;
40 return err;
41}
42
43bool i915_error_injected(void)
44{
45 return i915_probe_fail_count && !i915_modparams.inject_probe_failure;
46}
47
48#endif
49
50void cancel_timer(struct timer_list *t)
51{
52 if (!timer_active(t))
53 return;
54
55 del_timer(t);
56 WRITE_ONCE(t->expires, 0);
57}
58
59void set_timer_ms(struct timer_list *t, unsigned long timeout)
60{
61 if (!timeout) {
62 cancel_timer(t);
63 return;
64 }
65
66 timeout = msecs_to_jiffies(timeout);
67
68 /*
69 * Paranoia to make sure the compiler computes the timeout before
70 * loading 'jiffies' as jiffies is volatile and may be updated in
71 * the background by a timer tick. All to reduce the complexity
72 * of the addition and reduce the risk of losing a jiffy.
73 */
74 barrier();
75
76 /* Keep t->expires = 0 reserved to indicate a canceled timer. */
77 mod_timer(t, jiffies + timeout ?: 1);
78}
79
80bool i915_vtd_active(struct drm_i915_private *i915)
81{
82 if (device_iommu_mapped(i915->drm.dev))
83 return true;
84
85 /* Running as a guest, we assume the host is enforcing VT'd */
86 return i915_run_as_guest();
87}
88
89bool i915_direct_stolen_access(struct drm_i915_private *i915)
90{
91 /*
92 * Wa_22018444074
93 *
94 * Access via BAR can hang MTL, go directly to GSM/DSM,
95 * except for VM guests which won't have access to it.
96 *
97 * Normally this would not work but on MTL the system firmware
98 * should have relaxed the access permissions sufficiently.
99 * 0x138914==0x1 indicates that the firmware has done its job.
100 */
101 return IS_METEORLAKE(i915) && !i915_run_as_guest() &&
102 intel_uncore_read(&i915->uncore, MTL_PCODE_STOLEN_ACCESS) == STOLEN_ACCESS_ALLOWED;
103}
1// SPDX-License-Identifier: MIT
2/*
3 * Copyright © 2019 Intel Corporation
4 */
5
6#include <drm/drm_drv.h>
7
8#include "i915_drv.h"
9#include "i915_utils.h"
10
11#define FDO_BUG_MSG "Please file a bug on drm/i915; see " FDO_BUG_URL " for details."
12
13void
14__i915_printk(struct drm_i915_private *dev_priv, const char *level,
15 const char *fmt, ...)
16{
17 static bool shown_bug_once;
18 struct device *kdev = dev_priv->drm.dev;
19 bool is_error = level[1] <= KERN_ERR[1];
20 bool is_debug = level[1] == KERN_DEBUG[1];
21 struct va_format vaf;
22 va_list args;
23
24 if (is_debug && !drm_debug_enabled(DRM_UT_DRIVER))
25 return;
26
27 va_start(args, fmt);
28
29 vaf.fmt = fmt;
30 vaf.va = &args;
31
32 if (is_error)
33 dev_printk(level, kdev, "%pV", &vaf);
34 else
35 dev_printk(level, kdev, "[" DRM_NAME ":%ps] %pV",
36 __builtin_return_address(0), &vaf);
37
38 va_end(args);
39
40 if (is_error && !shown_bug_once) {
41 /*
42 * Ask the user to file a bug report for the error, except
43 * if they may have caused the bug by fiddling with unsafe
44 * module parameters.
45 */
46 if (!test_taint(TAINT_USER))
47 dev_notice(kdev, "%s", FDO_BUG_MSG);
48 shown_bug_once = true;
49 }
50}
51
52void add_taint_for_CI(struct drm_i915_private *i915, unsigned int taint)
53{
54 __i915_printk(i915, KERN_NOTICE, "CI tainted:%#x by %pS\n",
55 taint, (void *)_RET_IP_);
56
57 /* Failures that occur during fault injection testing are expected */
58 if (!i915_error_injected())
59 __add_taint_for_CI(taint);
60}
61
62#if IS_ENABLED(CONFIG_DRM_I915_DEBUG)
63static unsigned int i915_probe_fail_count;
64
65int __i915_inject_probe_error(struct drm_i915_private *i915, int err,
66 const char *func, int line)
67{
68 if (i915_probe_fail_count >= i915_modparams.inject_probe_failure)
69 return 0;
70
71 if (++i915_probe_fail_count < i915_modparams.inject_probe_failure)
72 return 0;
73
74 __i915_printk(i915, KERN_INFO,
75 "Injecting failure %d at checkpoint %u [%s:%d]\n",
76 err, i915_modparams.inject_probe_failure, func, line);
77 i915_modparams.inject_probe_failure = 0;
78 return err;
79}
80
81bool i915_error_injected(void)
82{
83 return i915_probe_fail_count && !i915_modparams.inject_probe_failure;
84}
85
86#endif
87
88void cancel_timer(struct timer_list *t)
89{
90 if (!READ_ONCE(t->expires))
91 return;
92
93 del_timer(t);
94 WRITE_ONCE(t->expires, 0);
95}
96
97void set_timer_ms(struct timer_list *t, unsigned long timeout)
98{
99 if (!timeout) {
100 cancel_timer(t);
101 return;
102 }
103
104 timeout = msecs_to_jiffies(timeout);
105
106 /*
107 * Paranoia to make sure the compiler computes the timeout before
108 * loading 'jiffies' as jiffies is volatile and may be updated in
109 * the background by a timer tick. All to reduce the complexity
110 * of the addition and reduce the risk of losing a jiffie.
111 */
112 barrier();
113
114 /* Keep t->expires = 0 reserved to indicate a canceled timer. */
115 mod_timer(t, jiffies + timeout ?: 1);
116}