// SPDX-License-Identifier: MIT /* * Copyright © 2019 Intel Corporation */ #include #include #include "i915_drv.h" #include "i915_reg.h" #include "i915_utils.h" void add_taint_for_CI(struct drm_i915_private *i915, unsigned int taint) { drm_notice(&i915->drm, "CI tainted: %#x by %pS\n", taint, __builtin_return_address(0)); /* Failures that occur during fault injection testing are expected */ if (!i915_error_injected()) __add_taint_for_CI(taint); } #if IS_ENABLED(CONFIG_DRM_I915_DEBUG) static unsigned int i915_probe_fail_count; int __i915_inject_probe_error(struct drm_i915_private *i915, int err, const char *func, int line) { if (i915_probe_fail_count >= i915_modparams.inject_probe_failure) return 0; if (++i915_probe_fail_count < i915_modparams.inject_probe_failure) return 0; drm_info(&i915->drm, "Injecting failure %d at checkpoint %u [%s:%d]\n", err, i915_modparams.inject_probe_failure, func, line); i915_modparams.inject_probe_failure = 0; return err; } bool i915_error_injected(void) { return i915_probe_fail_count && !i915_modparams.inject_probe_failure; } #endif void cancel_timer(struct timer_list *t) { if (!timer_active(t)) return; del_timer(t); WRITE_ONCE(t->expires, 0); } void set_timer_ms(struct timer_list *t, unsigned long timeout) { if (!timeout) { cancel_timer(t); return; } timeout = msecs_to_jiffies(timeout); /* * Paranoia to make sure the compiler computes the timeout before * loading 'jiffies' as jiffies is volatile and may be updated in * the background by a timer tick. All to reduce the complexity * of the addition and reduce the risk of losing a jiffy. */ barrier(); /* Keep t->expires = 0 reserved to indicate a canceled timer. */ mod_timer(t, jiffies + timeout ?: 1); } bool i915_vtd_active(struct drm_i915_private *i915) { if (device_iommu_mapped(i915->drm.dev)) return true; /* Running as a guest, we assume the host is enforcing VT'd */ return i915_run_as_guest(); } bool i915_direct_stolen_access(struct drm_i915_private *i915) { /* * Wa_22018444074 * * Access via BAR can hang MTL, go directly to GSM/DSM, * except for VM guests which won't have access to it. * * Normally this would not work but on MTL the system firmware * should have relaxed the access permissions sufficiently. * 0x138914==0x1 indicates that the firmware has done its job. */ return IS_METEORLAKE(i915) && !i915_run_as_guest() && intel_uncore_read(&i915->uncore, MTL_PCODE_STOLEN_ACCESS) == STOLEN_ACCESS_ALLOWED; }