2019-05-30 07:57:35 +08:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0-only */
|
2007-10-22 07:41:49 +08:00
|
|
|
/*
|
2015-09-09 18:40:47 +08:00
|
|
|
* Copyright © 2006-2015, Intel Corporation.
|
|
|
|
*
|
|
|
|
* Authors: Ashok Raj <ashok.raj@intel.com>
|
|
|
|
* Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com>
|
|
|
|
* David Woodhouse <David.Woodhouse@intel.com>
|
2007-10-22 07:41:49 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _INTEL_IOMMU_H_
|
|
|
|
#define _INTEL_IOMMU_H_
|
|
|
|
|
|
|
|
#include <linux/types.h>
|
2008-09-09 23:37:29 +08:00
|
|
|
#include <linux/iova.h>
|
2007-10-22 07:41:49 +08:00
|
|
|
#include <linux/io.h>
|
2015-09-09 18:40:47 +08:00
|
|
|
#include <linux/idr.h>
|
|
|
|
#include <linux/mmu_notifier.h>
|
|
|
|
#include <linux/list.h>
|
2017-02-01 20:23:08 +08:00
|
|
|
#include <linux/iommu.h>
|
2017-03-16 22:23:55 +08:00
|
|
|
#include <linux/io-64-nonatomic-lo-hi.h>
|
2018-07-14 15:46:57 +08:00
|
|
|
#include <linux/dmar.h>
|
2020-05-16 14:20:51 +08:00
|
|
|
#include <linux/ioasid.h>
|
2017-03-16 22:23:55 +08:00
|
|
|
|
2008-07-11 02:16:42 +08:00
|
|
|
#include <asm/cacheflush.h>
|
2008-10-17 09:02:32 +08:00
|
|
|
#include <asm/iommu.h>
|
2008-02-06 17:36:23 +08:00
|
|
|
|
2007-10-22 07:41:49 +08:00
|
|
|
/*
|
2018-11-12 14:40:08 +08:00
|
|
|
* VT-d hardware uses 4KiB page size regardless of host page size.
|
2007-10-22 07:41:49 +08:00
|
|
|
*/
|
2018-11-12 14:40:08 +08:00
|
|
|
#define VTD_PAGE_SHIFT (12)
|
|
|
|
#define VTD_PAGE_SIZE (1UL << VTD_PAGE_SHIFT)
|
|
|
|
#define VTD_PAGE_MASK (((u64)-1) << VTD_PAGE_SHIFT)
|
|
|
|
#define VTD_PAGE_ALIGN(addr) (((addr) + VTD_PAGE_SIZE - 1) & VTD_PAGE_MASK)
|
|
|
|
|
|
|
|
#define VTD_STRIDE_SHIFT (9)
|
|
|
|
#define VTD_STRIDE_MASK (((u64)-1) << VTD_STRIDE_SHIFT)
|
|
|
|
|
2020-01-02 08:18:17 +08:00
|
|
|
#define DMA_PTE_READ BIT_ULL(0)
|
|
|
|
#define DMA_PTE_WRITE BIT_ULL(1)
|
|
|
|
#define DMA_PTE_LARGE_PAGE BIT_ULL(7)
|
|
|
|
#define DMA_PTE_SNP BIT_ULL(11)
|
|
|
|
|
|
|
|
#define DMA_FL_PTE_PRESENT BIT_ULL(0)
|
|
|
|
#define DMA_FL_PTE_XD BIT_ULL(63)
|
2018-11-12 14:40:08 +08:00
|
|
|
|
2020-05-16 14:20:46 +08:00
|
|
|
#define ADDR_WIDTH_5LEVEL (57)
|
|
|
|
#define ADDR_WIDTH_4LEVEL (48)
|
|
|
|
|
2018-11-12 14:40:08 +08:00
|
|
|
#define CONTEXT_TT_MULTI_LEVEL 0
|
|
|
|
#define CONTEXT_TT_DEV_IOTLB 1
|
|
|
|
#define CONTEXT_TT_PASS_THROUGH 2
|
2018-12-10 09:59:05 +08:00
|
|
|
#define CONTEXT_PASIDE BIT_ULL(3)
|
2007-10-22 07:41:49 +08:00
|
|
|
|
2018-11-12 14:40:08 +08:00
|
|
|
/*
|
|
|
|
* Intel IOMMU register specification per version 1.0 public spec.
|
|
|
|
*/
|
2007-10-22 07:41:49 +08:00
|
|
|
#define DMAR_VER_REG 0x0 /* Arch version supported by this IOMMU */
|
|
|
|
#define DMAR_CAP_REG 0x8 /* Hardware supported capabilities */
|
|
|
|
#define DMAR_ECAP_REG 0x10 /* Extended capabilities supported */
|
|
|
|
#define DMAR_GCMD_REG 0x18 /* Global command register */
|
|
|
|
#define DMAR_GSTS_REG 0x1c /* Global status register */
|
|
|
|
#define DMAR_RTADDR_REG 0x20 /* Root entry table */
|
|
|
|
#define DMAR_CCMD_REG 0x28 /* Context command reg */
|
|
|
|
#define DMAR_FSTS_REG 0x34 /* Fault Status register */
|
|
|
|
#define DMAR_FECTL_REG 0x38 /* Fault control register */
|
|
|
|
#define DMAR_FEDATA_REG 0x3c /* Fault event interrupt data register */
|
|
|
|
#define DMAR_FEADDR_REG 0x40 /* Fault event interrupt addr register */
|
|
|
|
#define DMAR_FEUADDR_REG 0x44 /* Upper address register */
|
|
|
|
#define DMAR_AFLOG_REG 0x58 /* Advanced Fault control */
|
|
|
|
#define DMAR_PMEN_REG 0x64 /* Enable Protected Memory Region */
|
|
|
|
#define DMAR_PLMBASE_REG 0x68 /* PMRR Low addr */
|
|
|
|
#define DMAR_PLMLIMIT_REG 0x6c /* PMRR low limit */
|
|
|
|
#define DMAR_PHMBASE_REG 0x70 /* pmrr high base addr */
|
|
|
|
#define DMAR_PHMLIMIT_REG 0x78 /* pmrr high limit */
|
2008-07-11 02:16:42 +08:00
|
|
|
#define DMAR_IQH_REG 0x80 /* Invalidation queue head register */
|
|
|
|
#define DMAR_IQT_REG 0x88 /* Invalidation queue tail register */
|
2009-05-18 13:51:35 +08:00
|
|
|
#define DMAR_IQ_SHIFT 4 /* Invalidation queue head/tail shift */
|
2008-07-11 02:16:42 +08:00
|
|
|
#define DMAR_IQA_REG 0x90 /* Invalidation queue addr register */
|
2013-09-13 14:27:32 +08:00
|
|
|
#define DMAR_ICS_REG 0x9c /* Invalidation complete status register */
|
2008-07-11 02:16:43 +08:00
|
|
|
#define DMAR_IRTA_REG 0xb8 /* Interrupt remapping table addr register */
|
2015-10-07 22:37:03 +08:00
|
|
|
#define DMAR_PQH_REG 0xc0 /* Page request queue head register */
|
|
|
|
#define DMAR_PQT_REG 0xc8 /* Page request queue tail register */
|
|
|
|
#define DMAR_PQA_REG 0xd0 /* Page request queue address register */
|
|
|
|
#define DMAR_PRS_REG 0xdc /* Page request status register */
|
|
|
|
#define DMAR_PECTL_REG 0xe0 /* Page request event control register */
|
|
|
|
#define DMAR_PEDATA_REG 0xe4 /* Page request event interrupt data register */
|
|
|
|
#define DMAR_PEADDR_REG 0xe8 /* Page request event interrupt addr register */
|
|
|
|
#define DMAR_PEUADDR_REG 0xec /* Page request event Upper address register */
|
2018-09-12 08:11:37 +08:00
|
|
|
#define DMAR_MTRRCAP_REG 0x100 /* MTRR capability register */
|
|
|
|
#define DMAR_MTRRDEF_REG 0x108 /* MTRR default type register */
|
|
|
|
#define DMAR_MTRR_FIX64K_00000_REG 0x120 /* MTRR Fixed range registers */
|
|
|
|
#define DMAR_MTRR_FIX16K_80000_REG 0x128
|
|
|
|
#define DMAR_MTRR_FIX16K_A0000_REG 0x130
|
|
|
|
#define DMAR_MTRR_FIX4K_C0000_REG 0x138
|
|
|
|
#define DMAR_MTRR_FIX4K_C8000_REG 0x140
|
|
|
|
#define DMAR_MTRR_FIX4K_D0000_REG 0x148
|
|
|
|
#define DMAR_MTRR_FIX4K_D8000_REG 0x150
|
|
|
|
#define DMAR_MTRR_FIX4K_E0000_REG 0x158
|
|
|
|
#define DMAR_MTRR_FIX4K_E8000_REG 0x160
|
|
|
|
#define DMAR_MTRR_FIX4K_F0000_REG 0x168
|
|
|
|
#define DMAR_MTRR_FIX4K_F8000_REG 0x170
|
|
|
|
#define DMAR_MTRR_PHYSBASE0_REG 0x180 /* MTRR Variable range registers */
|
|
|
|
#define DMAR_MTRR_PHYSMASK0_REG 0x188
|
|
|
|
#define DMAR_MTRR_PHYSBASE1_REG 0x190
|
|
|
|
#define DMAR_MTRR_PHYSMASK1_REG 0x198
|
|
|
|
#define DMAR_MTRR_PHYSBASE2_REG 0x1a0
|
|
|
|
#define DMAR_MTRR_PHYSMASK2_REG 0x1a8
|
|
|
|
#define DMAR_MTRR_PHYSBASE3_REG 0x1b0
|
|
|
|
#define DMAR_MTRR_PHYSMASK3_REG 0x1b8
|
|
|
|
#define DMAR_MTRR_PHYSBASE4_REG 0x1c0
|
|
|
|
#define DMAR_MTRR_PHYSMASK4_REG 0x1c8
|
|
|
|
#define DMAR_MTRR_PHYSBASE5_REG 0x1d0
|
|
|
|
#define DMAR_MTRR_PHYSMASK5_REG 0x1d8
|
|
|
|
#define DMAR_MTRR_PHYSBASE6_REG 0x1e0
|
|
|
|
#define DMAR_MTRR_PHYSMASK6_REG 0x1e8
|
|
|
|
#define DMAR_MTRR_PHYSBASE7_REG 0x1f0
|
|
|
|
#define DMAR_MTRR_PHYSMASK7_REG 0x1f8
|
|
|
|
#define DMAR_MTRR_PHYSBASE8_REG 0x200
|
|
|
|
#define DMAR_MTRR_PHYSMASK8_REG 0x208
|
|
|
|
#define DMAR_MTRR_PHYSBASE9_REG 0x210
|
|
|
|
#define DMAR_MTRR_PHYSMASK9_REG 0x218
|
|
|
|
#define DMAR_VCCAP_REG 0xe00 /* Virtual command capability register */
|
|
|
|
#define DMAR_VCMD_REG 0xe10 /* Virtual command register */
|
|
|
|
#define DMAR_VCRSP_REG 0xe20 /* Virtual command response register */
|
2007-10-22 07:41:49 +08:00
|
|
|
|
|
|
|
#define OFFSET_STRIDE (9)
|
2015-10-14 03:48:21 +08:00
|
|
|
|
|
|
|
#define dmar_readq(a) readq(a)
|
|
|
|
#define dmar_writeq(a,v) writeq(v,a)
|
2020-03-10 04:09:46 +08:00
|
|
|
#define dmar_readl(a) readl(a)
|
|
|
|
#define dmar_writel(a, v) writel(v, a)
|
2007-10-22 07:41:49 +08:00
|
|
|
|
|
|
|
#define DMAR_VER_MAJOR(v) (((v) & 0xf0) >> 4)
|
|
|
|
#define DMAR_VER_MINOR(v) ((v) & 0x0f)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Decoding Capability Register
|
|
|
|
*/
|
2017-12-21 03:59:26 +08:00
|
|
|
#define cap_5lp_support(c) (((c) >> 60) & 1)
|
2015-06-09 13:20:34 +08:00
|
|
|
#define cap_pi_support(c) (((c) >> 59) & 1)
|
2017-12-21 03:59:25 +08:00
|
|
|
#define cap_fl1gp_support(c) (((c) >> 56) & 1)
|
2007-10-22 07:41:49 +08:00
|
|
|
#define cap_read_drain(c) (((c) >> 55) & 1)
|
|
|
|
#define cap_write_drain(c) (((c) >> 54) & 1)
|
|
|
|
#define cap_max_amask_val(c) (((c) >> 48) & 0x3f)
|
|
|
|
#define cap_num_fault_regs(c) ((((c) >> 40) & 0xff) + 1)
|
|
|
|
#define cap_pgsel_inv(c) (((c) >> 39) & 1)
|
|
|
|
|
|
|
|
#define cap_super_page_val(c) (((c) >> 34) & 0xf)
|
|
|
|
#define cap_super_offset(c) (((find_first_bit(&cap_super_page_val(c), 4)) \
|
|
|
|
* OFFSET_STRIDE) + 21)
|
|
|
|
|
|
|
|
#define cap_fault_reg_offset(c) ((((c) >> 24) & 0x3ff) * 16)
|
|
|
|
#define cap_max_fault_reg_offset(c) \
|
|
|
|
(cap_fault_reg_offset(c) + cap_num_fault_regs(c) * 16)
|
|
|
|
|
|
|
|
#define cap_zlr(c) (((c) >> 22) & 1)
|
|
|
|
#define cap_isoch(c) (((c) >> 23) & 1)
|
|
|
|
#define cap_mgaw(c) ((((c) >> 16) & 0x3f) + 1)
|
|
|
|
#define cap_sagaw(c) (((c) >> 8) & 0x1f)
|
|
|
|
#define cap_caching_mode(c) (((c) >> 7) & 1)
|
|
|
|
#define cap_phmr(c) (((c) >> 6) & 1)
|
|
|
|
#define cap_plmr(c) (((c) >> 5) & 1)
|
|
|
|
#define cap_rwbf(c) (((c) >> 4) & 1)
|
|
|
|
#define cap_afl(c) (((c) >> 3) & 1)
|
|
|
|
#define cap_ndoms(c) (((unsigned long)1) << (4 + 2 * ((c) & 0x7)))
|
|
|
|
/*
|
|
|
|
* Extended Capability Register
|
|
|
|
*/
|
|
|
|
|
2018-12-10 09:59:00 +08:00
|
|
|
#define ecap_smpwc(e) (((e) >> 48) & 0x1)
|
2018-12-10 09:59:04 +08:00
|
|
|
#define ecap_flts(e) (((e) >> 47) & 0x1)
|
2018-12-10 09:59:00 +08:00
|
|
|
#define ecap_slts(e) (((e) >> 46) & 0x1)
|
2020-05-16 14:20:50 +08:00
|
|
|
#define ecap_vcs(e) (((e) >> 44) & 0x1)
|
2018-12-10 09:58:55 +08:00
|
|
|
#define ecap_smts(e) (((e) >> 43) & 0x1)
|
2018-06-08 00:56:59 +08:00
|
|
|
#define ecap_dit(e) ((e >> 41) & 0x1)
|
2015-06-09 22:06:55 +08:00
|
|
|
#define ecap_pasid(e) ((e >> 40) & 0x1)
|
2015-03-25 23:43:39 +08:00
|
|
|
#define ecap_pss(e) ((e >> 35) & 0x1f)
|
|
|
|
#define ecap_eafs(e) ((e >> 34) & 0x1)
|
|
|
|
#define ecap_nwfs(e) ((e >> 33) & 0x1)
|
|
|
|
#define ecap_srs(e) ((e >> 31) & 0x1)
|
|
|
|
#define ecap_ers(e) ((e >> 30) & 0x1)
|
|
|
|
#define ecap_prs(e) ((e >> 29) & 0x1)
|
2018-07-08 14:23:21 +08:00
|
|
|
#define ecap_broken_pasid(e) ((e >> 28) & 0x1)
|
2015-03-25 23:43:39 +08:00
|
|
|
#define ecap_dis(e) ((e >> 27) & 0x1)
|
|
|
|
#define ecap_nest(e) ((e >> 26) & 0x1)
|
|
|
|
#define ecap_mts(e) ((e >> 25) & 0x1)
|
|
|
|
#define ecap_ecs(e) ((e >> 24) & 0x1)
|
2007-10-22 07:41:49 +08:00
|
|
|
#define ecap_iotlb_offset(e) ((((e) >> 8) & 0x3ff) * 16)
|
2015-02-13 22:25:24 +08:00
|
|
|
#define ecap_max_iotlb_offset(e) (ecap_iotlb_offset(e) + 16)
|
2007-10-22 07:41:49 +08:00
|
|
|
#define ecap_coherent(e) ((e) & 0x1)
|
2008-07-11 02:16:42 +08:00
|
|
|
#define ecap_qis(e) ((e) & 0x2)
|
2009-04-25 08:30:20 +08:00
|
|
|
#define ecap_pass_through(e) ((e >> 6) & 0x1)
|
2008-07-11 02:16:40 +08:00
|
|
|
#define ecap_eim_support(e) ((e >> 4) & 0x1)
|
|
|
|
#define ecap_ir_support(e) ((e >> 3) & 0x1)
|
2009-05-18 13:51:37 +08:00
|
|
|
#define ecap_dev_iotlb_support(e) (((e) >> 2) & 0x1)
|
2008-07-11 02:16:44 +08:00
|
|
|
#define ecap_max_handle_mask(e) ((e >> 20) & 0xf)
|
2009-03-18 15:33:05 +08:00
|
|
|
#define ecap_sc_support(e) ((e >> 7) & 0x1) /* Snooping Control */
|
2007-10-22 07:41:49 +08:00
|
|
|
|
2020-05-16 14:20:51 +08:00
|
|
|
/* Virtual command interface capability */
|
|
|
|
#define vccap_pasid(v) (((v) & DMA_VCS_PAS)) /* PASID allocation */
|
|
|
|
|
2007-10-22 07:41:49 +08:00
|
|
|
/* IOTLB_REG */
|
2008-10-17 07:31:55 +08:00
|
|
|
#define DMA_TLB_FLUSH_GRANU_OFFSET 60
|
2007-10-22 07:41:49 +08:00
|
|
|
#define DMA_TLB_GLOBAL_FLUSH (((u64)1) << 60)
|
|
|
|
#define DMA_TLB_DSI_FLUSH (((u64)2) << 60)
|
|
|
|
#define DMA_TLB_PSI_FLUSH (((u64)3) << 60)
|
2017-01-31 01:39:52 +08:00
|
|
|
#define DMA_TLB_IIRG(type) ((type >> 60) & 3)
|
|
|
|
#define DMA_TLB_IAIG(val) (((val) >> 57) & 3)
|
2007-10-22 07:41:49 +08:00
|
|
|
#define DMA_TLB_READ_DRAIN (((u64)1) << 49)
|
|
|
|
#define DMA_TLB_WRITE_DRAIN (((u64)1) << 48)
|
|
|
|
#define DMA_TLB_DID(id) (((u64)((id) & 0xffff)) << 32)
|
|
|
|
#define DMA_TLB_IVT (((u64)1) << 63)
|
|
|
|
#define DMA_TLB_IH_NONLEAF (((u64)1) << 6)
|
|
|
|
#define DMA_TLB_MAX_SIZE (0x3f)
|
|
|
|
|
2008-07-11 02:16:42 +08:00
|
|
|
/* INVALID_DESC */
|
2008-10-17 07:31:55 +08:00
|
|
|
#define DMA_CCMD_INVL_GRANU_OFFSET 61
|
2017-01-31 01:39:52 +08:00
|
|
|
#define DMA_ID_TLB_GLOBAL_FLUSH (((u64)1) << 4)
|
|
|
|
#define DMA_ID_TLB_DSI_FLUSH (((u64)2) << 4)
|
|
|
|
#define DMA_ID_TLB_PSI_FLUSH (((u64)3) << 4)
|
2008-07-11 02:16:42 +08:00
|
|
|
#define DMA_ID_TLB_READ_DRAIN (((u64)1) << 7)
|
|
|
|
#define DMA_ID_TLB_WRITE_DRAIN (((u64)1) << 6)
|
|
|
|
#define DMA_ID_TLB_DID(id) (((u64)((id & 0xffff) << 16)))
|
|
|
|
#define DMA_ID_TLB_IH_NONLEAF (((u64)1) << 6)
|
|
|
|
#define DMA_ID_TLB_ADDR(addr) (addr)
|
|
|
|
#define DMA_ID_TLB_ADDR_MASK(mask) (mask)
|
|
|
|
|
2008-02-08 20:18:38 +08:00
|
|
|
/* PMEN_REG */
|
|
|
|
#define DMA_PMEN_EPM (((u32)1)<<31)
|
|
|
|
#define DMA_PMEN_PRS (((u32)1)<<0)
|
|
|
|
|
2007-10-22 07:41:49 +08:00
|
|
|
/* GCMD_REG */
|
|
|
|
#define DMA_GCMD_TE (((u32)1) << 31)
|
|
|
|
#define DMA_GCMD_SRTP (((u32)1) << 30)
|
|
|
|
#define DMA_GCMD_SFL (((u32)1) << 29)
|
|
|
|
#define DMA_GCMD_EAFL (((u32)1) << 28)
|
|
|
|
#define DMA_GCMD_WBF (((u32)1) << 27)
|
2008-07-11 02:16:43 +08:00
|
|
|
#define DMA_GCMD_QIE (((u32)1) << 26)
|
|
|
|
#define DMA_GCMD_SIRTP (((u32)1) << 24)
|
|
|
|
#define DMA_GCMD_IRE (((u32) 1) << 25)
|
2009-04-03 17:15:47 +08:00
|
|
|
#define DMA_GCMD_CFI (((u32) 1) << 23)
|
2007-10-22 07:41:49 +08:00
|
|
|
|
|
|
|
/* GSTS_REG */
|
|
|
|
#define DMA_GSTS_TES (((u32)1) << 31)
|
|
|
|
#define DMA_GSTS_RTPS (((u32)1) << 30)
|
|
|
|
#define DMA_GSTS_FLS (((u32)1) << 29)
|
|
|
|
#define DMA_GSTS_AFLS (((u32)1) << 28)
|
|
|
|
#define DMA_GSTS_WBFS (((u32)1) << 27)
|
2008-07-11 02:16:43 +08:00
|
|
|
#define DMA_GSTS_QIES (((u32)1) << 26)
|
|
|
|
#define DMA_GSTS_IRTPS (((u32)1) << 24)
|
|
|
|
#define DMA_GSTS_IRES (((u32)1) << 25)
|
2009-04-03 17:15:47 +08:00
|
|
|
#define DMA_GSTS_CFIS (((u32)1) << 23)
|
2007-10-22 07:41:49 +08:00
|
|
|
|
2015-03-25 23:43:39 +08:00
|
|
|
/* DMA_RTADDR_REG */
|
|
|
|
#define DMA_RTADDR_RTT (((u64)1) << 11)
|
2018-12-10 09:59:03 +08:00
|
|
|
#define DMA_RTADDR_SMT (((u64)1) << 10)
|
2015-03-25 23:43:39 +08:00
|
|
|
|
2007-10-22 07:41:49 +08:00
|
|
|
/* CCMD_REG */
|
|
|
|
#define DMA_CCMD_ICC (((u64)1) << 63)
|
|
|
|
#define DMA_CCMD_GLOBAL_INVL (((u64)1) << 61)
|
|
|
|
#define DMA_CCMD_DOMAIN_INVL (((u64)2) << 61)
|
|
|
|
#define DMA_CCMD_DEVICE_INVL (((u64)3) << 61)
|
|
|
|
#define DMA_CCMD_FM(m) (((u64)((m) & 0x3)) << 32)
|
|
|
|
#define DMA_CCMD_MASK_NOBIT 0
|
|
|
|
#define DMA_CCMD_MASK_1BIT 1
|
|
|
|
#define DMA_CCMD_MASK_2BIT 2
|
|
|
|
#define DMA_CCMD_MASK_3BIT 3
|
|
|
|
#define DMA_CCMD_SID(s) (((u64)((s) & 0xffff)) << 16)
|
|
|
|
#define DMA_CCMD_DID(d) ((u64)((d) & 0xffff))
|
|
|
|
|
|
|
|
/* FECTL_REG */
|
|
|
|
#define DMA_FECTL_IM (((u32)1) << 31)
|
|
|
|
|
|
|
|
/* FSTS_REG */
|
2018-02-13 00:48:21 +08:00
|
|
|
#define DMA_FSTS_PFO (1 << 0) /* Primary Fault Overflow */
|
|
|
|
#define DMA_FSTS_PPF (1 << 1) /* Primary Pending Fault */
|
|
|
|
#define DMA_FSTS_IQE (1 << 4) /* Invalidation Queue Error */
|
|
|
|
#define DMA_FSTS_ICE (1 << 5) /* Invalidation Completion Error */
|
|
|
|
#define DMA_FSTS_ITE (1 << 6) /* Invalidation Time-out Error */
|
|
|
|
#define DMA_FSTS_PRO (1 << 7) /* Page Request Overflow */
|
2007-10-22 07:41:49 +08:00
|
|
|
#define dma_fsts_fault_record_index(s) (((s) >> 8) & 0xff)
|
|
|
|
|
|
|
|
/* FRCD_REG, 32 bits access */
|
|
|
|
#define DMA_FRCD_F (((u32)1) << 31)
|
|
|
|
#define dma_frcd_type(d) ((d >> 30) & 1)
|
|
|
|
#define dma_frcd_fault_reason(c) (c & 0xff)
|
|
|
|
#define dma_frcd_source_id(c) (c & 0xffff)
|
2019-09-07 02:14:02 +08:00
|
|
|
#define dma_frcd_pasid_value(c) (((c) >> 8) & 0xfffff)
|
|
|
|
#define dma_frcd_pasid_present(c) (((c) >> 31) & 1)
|
2008-10-17 09:02:32 +08:00
|
|
|
/* low 64 bit */
|
|
|
|
#define dma_frcd_page_addr(d) (d & (((u64)-1) << PAGE_SHIFT))
|
|
|
|
|
2016-02-15 20:42:38 +08:00
|
|
|
/* PRS_REG */
|
|
|
|
#define DMA_PRS_PPR ((u32)1)
|
2020-05-16 14:20:51 +08:00
|
|
|
#define DMA_VCS_PAS ((u64)1)
|
2016-02-15 20:42:38 +08:00
|
|
|
|
2008-10-17 09:02:32 +08:00
|
|
|
#define IOMMU_WAIT_OP(iommu, offset, op, cond, sts) \
|
|
|
|
do { \
|
|
|
|
cycles_t start_time = get_cycles(); \
|
|
|
|
while (1) { \
|
|
|
|
sts = op(iommu->reg + offset); \
|
|
|
|
if (cond) \
|
|
|
|
break; \
|
2008-07-11 02:16:41 +08:00
|
|
|
if (DMAR_OPERATION_TIMEOUT < (get_cycles() - start_time))\
|
2008-10-17 09:02:32 +08:00
|
|
|
panic("DMAR hardware is malfunctioning\n"); \
|
|
|
|
cpu_relax(); \
|
|
|
|
} \
|
|
|
|
} while (0)
|
2008-07-11 02:16:41 +08:00
|
|
|
|
2008-07-11 02:16:42 +08:00
|
|
|
#define QI_LENGTH 256 /* queue length */
|
|
|
|
|
|
|
|
enum {
|
|
|
|
QI_FREE,
|
|
|
|
QI_IN_USE,
|
2009-05-18 13:51:35 +08:00
|
|
|
QI_DONE,
|
|
|
|
QI_ABORT
|
2008-07-11 02:16:42 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
#define QI_CC_TYPE 0x1
|
|
|
|
#define QI_IOTLB_TYPE 0x2
|
|
|
|
#define QI_DIOTLB_TYPE 0x3
|
|
|
|
#define QI_IEC_TYPE 0x4
|
|
|
|
#define QI_IWD_TYPE 0x5
|
2015-09-09 18:40:47 +08:00
|
|
|
#define QI_EIOTLB_TYPE 0x6
|
|
|
|
#define QI_PC_TYPE 0x7
|
|
|
|
#define QI_DEIOTLB_TYPE 0x8
|
2015-10-08 06:35:18 +08:00
|
|
|
#define QI_PGRP_RESP_TYPE 0x9
|
|
|
|
#define QI_PSTRM_RESP_TYPE 0xa
|
2008-07-11 02:16:42 +08:00
|
|
|
|
|
|
|
#define QI_IEC_SELECTIVE (((u64)1) << 4)
|
|
|
|
#define QI_IEC_IIDEX(idx) (((u64)(idx & 0xffff) << 32))
|
|
|
|
#define QI_IEC_IM(m) (((u64)(m & 0x1f) << 27))
|
|
|
|
|
|
|
|
#define QI_IWD_STATUS_DATA(d) (((u64)d) << 32)
|
|
|
|
#define QI_IWD_STATUS_WRITE (((u64)1) << 5)
|
|
|
|
|
2008-10-17 07:31:55 +08:00
|
|
|
#define QI_IOTLB_DID(did) (((u64)did) << 16)
|
|
|
|
#define QI_IOTLB_DR(dr) (((u64)dr) << 7)
|
|
|
|
#define QI_IOTLB_DW(dw) (((u64)dw) << 6)
|
|
|
|
#define QI_IOTLB_GRAN(gran) (((u64)gran) >> (DMA_TLB_FLUSH_GRANU_OFFSET-4))
|
2008-10-17 09:02:32 +08:00
|
|
|
#define QI_IOTLB_ADDR(addr) (((u64)addr) & VTD_PAGE_MASK)
|
2008-10-17 07:31:55 +08:00
|
|
|
#define QI_IOTLB_IH(ih) (((u64)ih) << 6)
|
2020-05-16 14:20:48 +08:00
|
|
|
#define QI_IOTLB_AM(am) (((u8)am) & 0x3f)
|
2008-10-17 07:31:55 +08:00
|
|
|
|
|
|
|
#define QI_CC_FM(fm) (((u64)fm) << 48)
|
|
|
|
#define QI_CC_SID(sid) (((u64)sid) << 32)
|
|
|
|
#define QI_CC_DID(did) (((u64)did) << 16)
|
|
|
|
#define QI_CC_GRAN(gran) (((u64)gran) >> (DMA_CCMD_INVL_GRANU_OFFSET-4))
|
|
|
|
|
2009-05-18 13:51:35 +08:00
|
|
|
#define QI_DEV_IOTLB_SID(sid) ((u64)((sid) & 0xffff) << 32)
|
|
|
|
#define QI_DEV_IOTLB_QDEP(qdep) (((qdep) & 0x1f) << 16)
|
|
|
|
#define QI_DEV_IOTLB_ADDR(addr) ((u64)(addr) & VTD_PAGE_MASK)
|
2019-11-08 23:58:03 +08:00
|
|
|
#define QI_DEV_IOTLB_PFSID(pfsid) (((u64)(pfsid & 0xf) << 12) | \
|
|
|
|
((u64)((pfsid >> 4) & 0xfff) << 52))
|
2009-05-18 13:51:35 +08:00
|
|
|
#define QI_DEV_IOTLB_SIZE 1
|
|
|
|
#define QI_DEV_IOTLB_MAX_INVS 32
|
|
|
|
|
2015-09-09 18:40:47 +08:00
|
|
|
#define QI_PC_PASID(pasid) (((u64)pasid) << 32)
|
|
|
|
#define QI_PC_DID(did) (((u64)did) << 16)
|
|
|
|
#define QI_PC_GRAN(gran) (((u64)gran) << 4)
|
|
|
|
|
2020-05-16 14:20:48 +08:00
|
|
|
/* PASID cache invalidation granu */
|
|
|
|
#define QI_PC_ALL_PASIDS 0
|
|
|
|
#define QI_PC_PASID_SEL 1
|
2015-09-09 18:40:47 +08:00
|
|
|
|
|
|
|
#define QI_EIOTLB_ADDR(addr) ((u64)(addr) & VTD_PAGE_MASK)
|
|
|
|
#define QI_EIOTLB_IH(ih) (((u64)ih) << 6)
|
2020-05-16 14:20:48 +08:00
|
|
|
#define QI_EIOTLB_AM(am) (((u64)am) & 0x3f)
|
2015-09-09 18:40:47 +08:00
|
|
|
#define QI_EIOTLB_PASID(pasid) (((u64)pasid) << 32)
|
|
|
|
#define QI_EIOTLB_DID(did) (((u64)did) << 16)
|
|
|
|
#define QI_EIOTLB_GRAN(gran) (((u64)gran) << 4)
|
|
|
|
|
2020-05-16 14:20:48 +08:00
|
|
|
/* QI Dev-IOTLB inv granu */
|
|
|
|
#define QI_DEV_IOTLB_GRAN_ALL 1
|
|
|
|
#define QI_DEV_IOTLB_GRAN_PASID_SEL 0
|
|
|
|
|
2015-09-09 18:40:47 +08:00
|
|
|
#define QI_DEV_EIOTLB_ADDR(a) ((u64)(a) & VTD_PAGE_MASK)
|
|
|
|
#define QI_DEV_EIOTLB_SIZE (((u64)1) << 11)
|
|
|
|
#define QI_DEV_EIOTLB_GLOB(g) ((u64)g)
|
|
|
|
#define QI_DEV_EIOTLB_PASID(p) (((u64)p) << 32)
|
2017-01-31 01:39:52 +08:00
|
|
|
#define QI_DEV_EIOTLB_SID(sid) ((u64)((sid) & 0xffff) << 16)
|
|
|
|
#define QI_DEV_EIOTLB_QDEP(qd) ((u64)((qd) & 0x1f) << 4)
|
2019-11-08 23:58:03 +08:00
|
|
|
#define QI_DEV_EIOTLB_PFSID(pfsid) (((u64)(pfsid & 0xf) << 12) | \
|
|
|
|
((u64)((pfsid >> 4) & 0xfff) << 52))
|
2015-09-09 18:40:47 +08:00
|
|
|
#define QI_DEV_EIOTLB_MAX_INVS 32
|
|
|
|
|
2019-01-11 13:04:57 +08:00
|
|
|
/* Page group response descriptor QW0 */
|
2015-10-08 06:35:18 +08:00
|
|
|
#define QI_PGRP_PASID_P(p) (((u64)(p)) << 4)
|
2019-01-11 13:04:57 +08:00
|
|
|
#define QI_PGRP_PDP(p) (((u64)(p)) << 5)
|
|
|
|
#define QI_PGRP_RESP_CODE(res) (((u64)(res)) << 12)
|
|
|
|
#define QI_PGRP_DID(rid) (((u64)(rid)) << 16)
|
|
|
|
#define QI_PGRP_PASID(pasid) (((u64)(pasid)) << 32)
|
|
|
|
|
|
|
|
/* Page group response descriptor QW1 */
|
|
|
|
#define QI_PGRP_LPIG(x) (((u64)(x)) << 2)
|
|
|
|
#define QI_PGRP_IDX(idx) (((u64)(idx)) << 3)
|
2015-10-08 06:35:18 +08:00
|
|
|
|
|
|
|
|
|
|
|
#define QI_RESP_SUCCESS 0x0
|
|
|
|
#define QI_RESP_INVALID 0x1
|
|
|
|
#define QI_RESP_FAILURE 0xf
|
|
|
|
|
2015-09-09 18:40:47 +08:00
|
|
|
#define QI_GRAN_NONG_PASID 2
|
|
|
|
#define QI_GRAN_PSI_PASID 3
|
|
|
|
|
2018-12-10 09:58:58 +08:00
|
|
|
#define qi_shift(iommu) (DMAR_IQ_SHIFT + !!ecap_smts((iommu)->ecap))
|
|
|
|
|
2008-07-11 02:16:42 +08:00
|
|
|
struct qi_desc {
|
2018-12-10 09:58:58 +08:00
|
|
|
u64 qw0;
|
|
|
|
u64 qw1;
|
|
|
|
u64 qw2;
|
|
|
|
u64 qw3;
|
2008-07-11 02:16:42 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
struct q_inval {
|
2011-07-19 23:02:07 +08:00
|
|
|
raw_spinlock_t q_lock;
|
2018-12-10 09:58:58 +08:00
|
|
|
void *desc; /* invalidation queue */
|
2008-07-11 02:16:42 +08:00
|
|
|
int *desc_status; /* desc status */
|
|
|
|
int free_head; /* first free entry */
|
|
|
|
int free_tail; /* last free entry */
|
|
|
|
int free_cnt;
|
|
|
|
};
|
|
|
|
|
2011-08-24 08:05:25 +08:00
|
|
|
#ifdef CONFIG_IRQ_REMAP
|
2008-07-11 02:16:43 +08:00
|
|
|
/* 1MB - maximum possible interrupt remapping table size */
|
|
|
|
#define INTR_REMAP_PAGE_ORDER 8
|
|
|
|
#define INTR_REMAP_TABLE_REG_SIZE 0xf
|
2015-06-12 21:00:21 +08:00
|
|
|
#define INTR_REMAP_TABLE_REG_SIZE_MASK 0xf
|
2008-07-11 02:16:43 +08:00
|
|
|
|
2008-07-11 02:16:44 +08:00
|
|
|
#define INTR_REMAP_TABLE_ENTRIES 65536
|
|
|
|
|
2015-04-13 14:11:32 +08:00
|
|
|
struct irq_domain;
|
|
|
|
|
2008-07-11 02:16:43 +08:00
|
|
|
struct ir_table {
|
|
|
|
struct irte *base;
|
2014-01-06 14:18:08 +08:00
|
|
|
unsigned long *bitmap;
|
2008-07-11 02:16:43 +08:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2008-10-17 07:31:56 +08:00
|
|
|
struct iommu_flush {
|
2009-05-11 00:16:06 +08:00
|
|
|
void (*flush_context)(struct intel_iommu *iommu, u16 did, u16 sid,
|
|
|
|
u8 fm, u64 type);
|
2009-05-11 02:58:49 +08:00
|
|
|
void (*flush_iotlb)(struct intel_iommu *iommu, u16 did, u64 addr,
|
|
|
|
unsigned int size_order, u64 type);
|
2008-10-17 07:31:56 +08:00
|
|
|
};
|
|
|
|
|
2009-03-28 05:22:42 +08:00
|
|
|
enum {
|
|
|
|
SR_DMAR_FECTL_REG,
|
|
|
|
SR_DMAR_FEDATA_REG,
|
|
|
|
SR_DMAR_FEADDR_REG,
|
|
|
|
SR_DMAR_FEUADDR_REG,
|
|
|
|
MAX_SR_DMAR_REGS
|
|
|
|
};
|
|
|
|
|
2015-06-12 16:14:02 +08:00
|
|
|
#define VTD_FLAG_TRANS_PRE_ENABLED (1 << 0)
|
|
|
|
#define VTD_FLAG_IRQ_REMAP_PRE_ENABLED (1 << 1)
|
2020-01-02 08:18:03 +08:00
|
|
|
#define VTD_FLAG_SVM_CAPABLE (1 << 2)
|
2015-06-12 16:14:02 +08:00
|
|
|
|
2019-05-25 07:40:16 +08:00
|
|
|
extern int intel_iommu_sm;
|
2020-01-02 08:18:22 +08:00
|
|
|
extern spinlock_t device_domain_lock;
|
2019-05-25 07:40:16 +08:00
|
|
|
|
|
|
|
#define sm_supported(iommu) (intel_iommu_sm && ecap_smts((iommu)->ecap))
|
|
|
|
#define pasid_supported(iommu) (sm_supported(iommu) && \
|
|
|
|
ecap_pasid((iommu)->ecap))
|
|
|
|
|
2015-03-24 22:54:56 +08:00
|
|
|
struct pasid_entry;
|
|
|
|
struct pasid_state_entry;
|
2015-10-08 06:35:18 +08:00
|
|
|
struct page_req_dsc;
|
2015-03-24 22:54:56 +08:00
|
|
|
|
2018-09-12 08:11:36 +08:00
|
|
|
/*
|
|
|
|
* 0: Present
|
|
|
|
* 1-11: Reserved
|
|
|
|
* 12-63: Context Ptr (12 - (haw-1))
|
|
|
|
* 64-127: Reserved
|
|
|
|
*/
|
|
|
|
struct root_entry {
|
|
|
|
u64 lo;
|
|
|
|
u64 hi;
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* low 64 bits:
|
|
|
|
* 0: present
|
|
|
|
* 1: fault processing disable
|
|
|
|
* 2-3: translation type
|
|
|
|
* 12-63: address space root
|
|
|
|
* high 64 bits:
|
|
|
|
* 0-2: address width
|
|
|
|
* 3-6: aval
|
|
|
|
* 8-23: domain id
|
|
|
|
*/
|
|
|
|
struct context_entry {
|
|
|
|
u64 lo;
|
|
|
|
u64 hi;
|
|
|
|
};
|
|
|
|
|
2020-05-16 14:20:46 +08:00
|
|
|
/* si_domain contains mulitple devices */
|
|
|
|
#define DOMAIN_FLAG_STATIC_IDENTITY BIT(0)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* When VT-d works in the scalable mode, it allows DMA translation to
|
|
|
|
* happen through either first level or second level page table. This
|
|
|
|
* bit marks that the DMA translation for the domain goes through the
|
|
|
|
* first level page table, otherwise, it goes through the second level.
|
|
|
|
*/
|
|
|
|
#define DOMAIN_FLAG_USE_FIRST_LEVEL BIT(1)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Domain represents a virtual machine which demands iommu nested
|
|
|
|
* translation mode support.
|
|
|
|
*/
|
|
|
|
#define DOMAIN_FLAG_NESTING_MODE BIT(2)
|
|
|
|
|
2018-07-14 15:46:57 +08:00
|
|
|
struct dmar_domain {
|
|
|
|
int nid; /* node id */
|
|
|
|
|
|
|
|
unsigned iommu_refcnt[DMAR_UNITS_SUPPORTED];
|
|
|
|
/* Refcount of devices per iommu */
|
|
|
|
|
|
|
|
|
|
|
|
u16 iommu_did[DMAR_UNITS_SUPPORTED];
|
|
|
|
/* Domain ids per IOMMU. Use u16 since
|
|
|
|
* domain ids are 16 bit wide according
|
|
|
|
* to VT-d spec, section 9.3 */
|
2019-03-25 09:30:32 +08:00
|
|
|
unsigned int auxd_refcnt; /* Refcount of auxiliary attaching */
|
2018-07-14 15:46:57 +08:00
|
|
|
|
|
|
|
bool has_iotlb_device;
|
|
|
|
struct list_head devices; /* all devices' list */
|
2019-03-25 09:30:32 +08:00
|
|
|
struct list_head auxd; /* link to device's auxiliary list */
|
2018-07-14 15:46:57 +08:00
|
|
|
struct iova_domain iovad; /* iova's that belong to this domain */
|
|
|
|
|
|
|
|
struct dma_pte *pgd; /* virtual address */
|
|
|
|
int gaw; /* max guest address width */
|
|
|
|
|
|
|
|
/* adjusted guest address width, 0 is level 2 30-bit */
|
|
|
|
int agaw;
|
|
|
|
|
|
|
|
int flags; /* flags to find out type of domain */
|
|
|
|
|
|
|
|
int iommu_coherency;/* indicate coherency of iommu access */
|
|
|
|
int iommu_snooping; /* indicate snooping control feature*/
|
|
|
|
int iommu_count; /* reference count of iommu */
|
|
|
|
int iommu_superpage;/* Level of superpages supported:
|
|
|
|
0 == 4KiB (no superpages), 1 == 2MiB,
|
|
|
|
2 == 1GiB, 3 == 512GiB, 4 == 1TiB */
|
|
|
|
u64 max_addr; /* maximum mapped address */
|
|
|
|
|
2019-03-25 09:30:32 +08:00
|
|
|
int default_pasid; /*
|
|
|
|
* The default pasid used for non-SVM
|
|
|
|
* traffic on mediated devices.
|
|
|
|
*/
|
|
|
|
|
2018-07-14 15:46:57 +08:00
|
|
|
struct iommu_domain domain; /* generic domain data structure for
|
|
|
|
iommu core */
|
|
|
|
};
|
|
|
|
|
2007-10-22 07:41:49 +08:00
|
|
|
struct intel_iommu {
|
|
|
|
void __iomem *reg; /* Pointer to hardware regs, virtual addr */
|
2012-06-05 05:29:02 +08:00
|
|
|
u64 reg_phys; /* physical address of hw register set */
|
|
|
|
u64 reg_size; /* size of hw register set */
|
2007-10-22 07:41:49 +08:00
|
|
|
u64 cap;
|
|
|
|
u64 ecap;
|
2020-05-16 14:20:51 +08:00
|
|
|
u64 vccap;
|
2007-10-22 07:41:49 +08:00
|
|
|
u32 gcmd; /* Holds TE, EAFL. Don't need SRTP, SFL, WBF */
|
2011-07-19 22:19:51 +08:00
|
|
|
raw_spinlock_t register_lock; /* protect register handling */
|
2008-07-11 02:16:36 +08:00
|
|
|
int seq_id; /* sequence id of the iommu */
|
2008-12-08 15:34:06 +08:00
|
|
|
int agaw; /* agaw of this iommu */
|
2009-04-25 08:30:20 +08:00
|
|
|
int msagaw; /* max sagaw of this iommu */
|
2015-10-07 22:37:03 +08:00
|
|
|
unsigned int irq, pr_irq;
|
2014-03-10 04:49:45 +08:00
|
|
|
u16 segment; /* PCI segment# */
|
2009-03-17 08:04:55 +08:00
|
|
|
unsigned char name[13]; /* Device Name */
|
2008-07-11 02:16:35 +08:00
|
|
|
|
2011-08-24 08:05:25 +08:00
|
|
|
#ifdef CONFIG_INTEL_IOMMU
|
2008-07-11 02:16:35 +08:00
|
|
|
unsigned long *domain_ids; /* bitmap of domains */
|
2015-07-21 16:41:21 +08:00
|
|
|
struct dmar_domain ***domains; /* ptr to domains */
|
2008-07-11 02:16:35 +08:00
|
|
|
spinlock_t lock; /* protect context, domain ids */
|
2007-10-22 07:41:49 +08:00
|
|
|
struct root_entry *root_entry; /* virtual address */
|
|
|
|
|
2008-10-17 07:31:56 +08:00
|
|
|
struct iommu_flush flush;
|
2015-03-24 22:54:56 +08:00
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_INTEL_IOMMU_SVM
|
2015-10-08 06:35:18 +08:00
|
|
|
struct page_req_dsc *prq;
|
|
|
|
unsigned char prq_name[16]; /* Name for PRQ interrupt */
|
2020-05-16 14:20:51 +08:00
|
|
|
struct ioasid_allocator_ops pasid_allocator; /* Custom allocator for PASIDs */
|
2008-07-11 02:16:35 +08:00
|
|
|
#endif
|
2008-07-11 02:16:42 +08:00
|
|
|
struct q_inval *qi; /* Queued invalidation info */
|
2009-03-28 05:22:42 +08:00
|
|
|
u32 *iommu_state; /* Store iommu states between suspend and resume.*/
|
|
|
|
|
2011-08-24 08:05:25 +08:00
|
|
|
#ifdef CONFIG_IRQ_REMAP
|
2008-07-11 02:16:43 +08:00
|
|
|
struct ir_table *ir_table; /* Interrupt remapping info */
|
2015-04-13 14:11:32 +08:00
|
|
|
struct irq_domain *ir_domain;
|
|
|
|
struct irq_domain *ir_msi_domain;
|
2008-07-11 02:16:43 +08:00
|
|
|
#endif
|
2017-02-01 20:23:08 +08:00
|
|
|
struct iommu_device iommu; /* IOMMU core code handle */
|
2009-10-03 02:01:21 +08:00
|
|
|
int node;
|
2015-06-12 16:14:02 +08:00
|
|
|
u32 flags; /* Software defined flags */
|
2007-10-22 07:41:49 +08:00
|
|
|
};
|
|
|
|
|
2018-07-14 15:46:57 +08:00
|
|
|
/* PCI domain-device relationship */
|
|
|
|
struct device_domain_info {
|
|
|
|
struct list_head link; /* link to domain siblings */
|
|
|
|
struct list_head global; /* link to global list */
|
2018-07-14 15:46:59 +08:00
|
|
|
struct list_head table; /* link to pasid table */
|
2019-03-25 09:30:32 +08:00
|
|
|
struct list_head auxiliary_domains; /* auxiliary domains
|
|
|
|
* attached to this device
|
|
|
|
*/
|
2018-07-14 15:46:57 +08:00
|
|
|
u8 bus; /* PCI bus number */
|
|
|
|
u8 devfn; /* PCI devfn number */
|
|
|
|
u16 pfsid; /* SRIOV physical function source ID */
|
|
|
|
u8 pasid_supported:3;
|
|
|
|
u8 pasid_enabled:1;
|
|
|
|
u8 pri_supported:1;
|
|
|
|
u8 pri_enabled:1;
|
|
|
|
u8 ats_supported:1;
|
|
|
|
u8 ats_enabled:1;
|
2019-03-25 09:30:30 +08:00
|
|
|
u8 auxd_enabled:1; /* Multiple domains per device */
|
2018-07-14 15:46:57 +08:00
|
|
|
u8 ats_qdep;
|
|
|
|
struct device *dev; /* it's NULL for PCIe-to-PCI bridge */
|
|
|
|
struct intel_iommu *iommu; /* IOMMU used by this device */
|
|
|
|
struct dmar_domain *domain; /* pointer to domain */
|
2018-07-14 15:46:59 +08:00
|
|
|
struct pasid_table *pasid_table; /* pasid table */
|
2018-07-14 15:46:57 +08:00
|
|
|
};
|
|
|
|
|
2008-07-11 02:16:42 +08:00
|
|
|
static inline void __iommu_flush_cache(
|
|
|
|
struct intel_iommu *iommu, void *addr, int size)
|
|
|
|
{
|
|
|
|
if (!ecap_coherent(iommu->ecap))
|
|
|
|
clflush_cache_range(addr, size);
|
|
|
|
}
|
|
|
|
|
2020-05-16 14:20:44 +08:00
|
|
|
/* Convert generic struct iommu_domain to private struct dmar_domain */
|
|
|
|
static inline struct dmar_domain *to_dmar_domain(struct iommu_domain *dom)
|
|
|
|
{
|
|
|
|
return container_of(dom, struct dmar_domain, domain);
|
|
|
|
}
|
|
|
|
|
2018-12-10 09:58:57 +08:00
|
|
|
/*
|
|
|
|
* 0: readable
|
|
|
|
* 1: writable
|
|
|
|
* 2-6: reserved
|
|
|
|
* 7: super page
|
|
|
|
* 8-10: available
|
|
|
|
* 11: snoop behavior
|
|
|
|
* 12-63: Host physcial address
|
|
|
|
*/
|
|
|
|
struct dma_pte {
|
|
|
|
u64 val;
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline void dma_clear_pte(struct dma_pte *pte)
|
|
|
|
{
|
|
|
|
pte->val = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline u64 dma_pte_addr(struct dma_pte *pte)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_64BIT
|
2020-01-02 08:18:17 +08:00
|
|
|
return pte->val & VTD_PAGE_MASK & (~DMA_FL_PTE_XD);
|
2018-12-10 09:58:57 +08:00
|
|
|
#else
|
|
|
|
/* Must have a full atomic 64-bit read */
|
2020-01-02 08:18:17 +08:00
|
|
|
return __cmpxchg64(&pte->val, 0ULL, 0ULL) &
|
|
|
|
VTD_PAGE_MASK & (~DMA_FL_PTE_XD);
|
2018-12-10 09:58:57 +08:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool dma_pte_present(struct dma_pte *pte)
|
|
|
|
{
|
|
|
|
return (pte->val & 3) != 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool dma_pte_superpage(struct dma_pte *pte)
|
|
|
|
{
|
|
|
|
return (pte->val & DMA_PTE_LARGE_PAGE);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int first_pte_in_page(struct dma_pte *pte)
|
|
|
|
{
|
|
|
|
return !((unsigned long)pte & ~VTD_PAGE_MASK);
|
|
|
|
}
|
|
|
|
|
2008-07-11 02:16:35 +08:00
|
|
|
extern struct dmar_drhd_unit * dmar_find_matched_drhd_unit(struct pci_dev *dev);
|
2009-05-18 13:51:34 +08:00
|
|
|
extern int dmar_find_matched_atsr_unit(struct pci_dev *dev);
|
2008-07-11 02:16:35 +08:00
|
|
|
|
2008-07-11 02:16:43 +08:00
|
|
|
extern int dmar_enable_qi(struct intel_iommu *iommu);
|
2009-03-17 08:04:56 +08:00
|
|
|
extern void dmar_disable_qi(struct intel_iommu *iommu);
|
2009-03-28 05:22:42 +08:00
|
|
|
extern int dmar_reenable_qi(struct intel_iommu *iommu);
|
2008-07-11 02:16:43 +08:00
|
|
|
extern void qi_global_iec(struct intel_iommu *iommu);
|
2007-10-22 07:41:55 +08:00
|
|
|
|
2009-05-11 00:16:06 +08:00
|
|
|
extern void qi_flush_context(struct intel_iommu *iommu, u16 did, u16 sid,
|
|
|
|
u8 fm, u64 type);
|
2009-05-11 02:58:49 +08:00
|
|
|
extern void qi_flush_iotlb(struct intel_iommu *iommu, u16 did, u64 addr,
|
|
|
|
unsigned int size_order, u64 type);
|
2018-06-08 00:57:00 +08:00
|
|
|
extern void qi_flush_dev_iotlb(struct intel_iommu *iommu, u16 sid, u16 pfsid,
|
|
|
|
u16 qdep, u64 addr, unsigned mask);
|
2020-05-16 14:20:48 +08:00
|
|
|
|
2020-01-02 08:18:18 +08:00
|
|
|
void qi_flush_piotlb(struct intel_iommu *iommu, u16 did, u32 pasid, u64 addr,
|
|
|
|
unsigned long npages, bool ih);
|
2020-05-16 14:20:48 +08:00
|
|
|
|
|
|
|
void qi_flush_dev_iotlb_pasid(struct intel_iommu *iommu, u16 sid, u16 pfsid,
|
|
|
|
u32 pasid, u16 qdep, u64 addr,
|
|
|
|
unsigned int size_order, u64 granu);
|
|
|
|
void qi_flush_pasid_cache(struct intel_iommu *iommu, u16 did, u64 granu,
|
|
|
|
int pasid);
|
|
|
|
|
2009-01-04 16:28:52 +08:00
|
|
|
extern int qi_submit_sync(struct qi_desc *desc, struct intel_iommu *iommu);
|
2008-09-09 23:37:29 +08:00
|
|
|
|
2009-09-10 00:05:39 +08:00
|
|
|
extern int dmar_ir_support(void);
|
|
|
|
|
2018-07-14 15:46:57 +08:00
|
|
|
void *alloc_pgtable_page(int node);
|
|
|
|
void free_pgtable_page(void *vaddr);
|
|
|
|
struct intel_iommu *domain_get_iommu(struct dmar_domain *domain);
|
2018-07-14 15:46:58 +08:00
|
|
|
int for_each_device_domain(int (*fn)(struct device_domain_info *info,
|
|
|
|
void *data), void *data);
|
2018-12-10 09:59:00 +08:00
|
|
|
void iommu_flush_write_buffer(struct intel_iommu *iommu);
|
2019-03-25 09:30:29 +08:00
|
|
|
int intel_iommu_enable_pasid(struct intel_iommu *iommu, struct device *dev);
|
2020-01-02 08:18:22 +08:00
|
|
|
struct dmar_domain *find_domain(struct device *dev);
|
2020-05-16 14:20:52 +08:00
|
|
|
struct device_domain_info *get_domain_info(struct device *dev);
|
2018-07-14 15:46:57 +08:00
|
|
|
|
2015-09-09 18:40:47 +08:00
|
|
|
#ifdef CONFIG_INTEL_IOMMU_SVM
|
2020-01-02 08:18:03 +08:00
|
|
|
extern void intel_svm_check(struct intel_iommu *iommu);
|
2015-10-08 06:35:18 +08:00
|
|
|
extern int intel_svm_enable_prq(struct intel_iommu *iommu);
|
|
|
|
extern int intel_svm_finish_prq(struct intel_iommu *iommu);
|
2020-05-16 14:20:47 +08:00
|
|
|
int intel_svm_bind_gpasid(struct iommu_domain *domain, struct device *dev,
|
|
|
|
struct iommu_gpasid_bind_data *data);
|
|
|
|
int intel_svm_unbind_gpasid(struct device *dev, int pasid);
|
2020-05-16 14:20:54 +08:00
|
|
|
struct iommu_sva *intel_svm_bind(struct device *dev, struct mm_struct *mm,
|
|
|
|
void *drvdata);
|
|
|
|
void intel_svm_unbind(struct iommu_sva *handle);
|
|
|
|
int intel_svm_get_pasid(struct iommu_sva *handle);
|
2015-10-14 00:18:10 +08:00
|
|
|
struct svm_dev_ops;
|
|
|
|
|
2015-09-09 18:40:47 +08:00
|
|
|
struct intel_svm_dev {
|
|
|
|
struct list_head list;
|
|
|
|
struct rcu_head rcu;
|
|
|
|
struct device *dev;
|
2015-10-14 00:18:10 +08:00
|
|
|
struct svm_dev_ops *ops;
|
2020-05-16 14:20:54 +08:00
|
|
|
struct iommu_sva sva;
|
|
|
|
int pasid;
|
2015-09-09 18:40:47 +08:00
|
|
|
int users;
|
|
|
|
u16 did;
|
|
|
|
u16 dev_iotlb:1;
|
|
|
|
u16 sid, qdep;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct intel_svm {
|
|
|
|
struct mmu_notifier notifier;
|
|
|
|
struct mm_struct *mm;
|
2020-05-16 14:20:47 +08:00
|
|
|
|
2015-09-09 18:40:47 +08:00
|
|
|
struct intel_iommu *iommu;
|
2015-10-15 20:59:14 +08:00
|
|
|
int flags;
|
2015-09-09 18:40:47 +08:00
|
|
|
int pasid;
|
2020-05-16 14:20:47 +08:00
|
|
|
int gpasid; /* In case that guest PASID is different from host PASID */
|
2015-09-09 18:40:47 +08:00
|
|
|
struct list_head devs;
|
2018-07-14 15:46:55 +08:00
|
|
|
struct list_head list;
|
2015-09-09 18:40:47 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
extern struct intel_iommu *intel_svm_device_to_iommu(struct device *dev);
|
2020-01-02 08:18:03 +08:00
|
|
|
#else
|
|
|
|
static inline void intel_svm_check(struct intel_iommu *iommu) {}
|
2015-09-09 18:40:47 +08:00
|
|
|
#endif
|
|
|
|
|
2018-09-12 08:11:38 +08:00
|
|
|
#ifdef CONFIG_INTEL_IOMMU_DEBUGFS
|
|
|
|
void intel_iommu_debugfs_init(void);
|
|
|
|
#else
|
|
|
|
static inline void intel_iommu_debugfs_init(void) {}
|
|
|
|
#endif /* CONFIG_INTEL_IOMMU_DEBUGFS */
|
|
|
|
|
iommu/vt-d: Make use of IOMMU sysfs support
Register our DRHD IOMMUs, cross link devices, and provide a base set
of attributes for the IOMMU. Note that IRQ remapping support parses
the DMAR table very early in boot, well before the iommu_class can
reasonably be setup, so our registration is split between
intel_iommu_init(), which occurs later, and alloc_iommu(), which
typically occurs much earlier, but may happen at any time later
with IOMMU hot-add support.
On a typical desktop system, this provides the following (pruned):
$ find /sys | grep dmar
/sys/devices/virtual/iommu/dmar0
/sys/devices/virtual/iommu/dmar0/devices
/sys/devices/virtual/iommu/dmar0/devices/0000:00:02.0
/sys/devices/virtual/iommu/dmar0/intel-iommu
/sys/devices/virtual/iommu/dmar0/intel-iommu/cap
/sys/devices/virtual/iommu/dmar0/intel-iommu/ecap
/sys/devices/virtual/iommu/dmar0/intel-iommu/address
/sys/devices/virtual/iommu/dmar0/intel-iommu/version
/sys/devices/virtual/iommu/dmar1
/sys/devices/virtual/iommu/dmar1/devices
/sys/devices/virtual/iommu/dmar1/devices/0000:00:00.0
/sys/devices/virtual/iommu/dmar1/devices/0000:00:01.0
/sys/devices/virtual/iommu/dmar1/devices/0000:00:16.0
/sys/devices/virtual/iommu/dmar1/devices/0000:00:1a.0
/sys/devices/virtual/iommu/dmar1/devices/0000:00:1b.0
/sys/devices/virtual/iommu/dmar1/devices/0000:00:1c.0
...
/sys/devices/virtual/iommu/dmar1/intel-iommu
/sys/devices/virtual/iommu/dmar1/intel-iommu/cap
/sys/devices/virtual/iommu/dmar1/intel-iommu/ecap
/sys/devices/virtual/iommu/dmar1/intel-iommu/address
/sys/devices/virtual/iommu/dmar1/intel-iommu/version
/sys/class/iommu/dmar0
/sys/class/iommu/dmar1
(devices also link back to the dmar units)
This makes address, version, capabilities, and extended capabilities
available, just like printed on boot. I've tried not to duplicate
data that can be found in the DMAR table, with the exception of the
address, which provides an easy way to associate the sysfs device with
a DRHD entry in the DMAR. It's tempting to add scopes and RMRR data
here, but the full DMAR table is already exposed under /sys/firmware/
and therefore already provides a way for userspace to learn such
details.
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2014-06-13 06:12:31 +08:00
|
|
|
extern const struct attribute_group *intel_iommu_groups[];
|
2018-09-12 08:11:36 +08:00
|
|
|
bool context_present(struct context_entry *context);
|
|
|
|
struct context_entry *iommu_context_addr(struct intel_iommu *iommu, u8 bus,
|
|
|
|
u8 devfn, int alloc);
|
iommu/vt-d: Make use of IOMMU sysfs support
Register our DRHD IOMMUs, cross link devices, and provide a base set
of attributes for the IOMMU. Note that IRQ remapping support parses
the DMAR table very early in boot, well before the iommu_class can
reasonably be setup, so our registration is split between
intel_iommu_init(), which occurs later, and alloc_iommu(), which
typically occurs much earlier, but may happen at any time later
with IOMMU hot-add support.
On a typical desktop system, this provides the following (pruned):
$ find /sys | grep dmar
/sys/devices/virtual/iommu/dmar0
/sys/devices/virtual/iommu/dmar0/devices
/sys/devices/virtual/iommu/dmar0/devices/0000:00:02.0
/sys/devices/virtual/iommu/dmar0/intel-iommu
/sys/devices/virtual/iommu/dmar0/intel-iommu/cap
/sys/devices/virtual/iommu/dmar0/intel-iommu/ecap
/sys/devices/virtual/iommu/dmar0/intel-iommu/address
/sys/devices/virtual/iommu/dmar0/intel-iommu/version
/sys/devices/virtual/iommu/dmar1
/sys/devices/virtual/iommu/dmar1/devices
/sys/devices/virtual/iommu/dmar1/devices/0000:00:00.0
/sys/devices/virtual/iommu/dmar1/devices/0000:00:01.0
/sys/devices/virtual/iommu/dmar1/devices/0000:00:16.0
/sys/devices/virtual/iommu/dmar1/devices/0000:00:1a.0
/sys/devices/virtual/iommu/dmar1/devices/0000:00:1b.0
/sys/devices/virtual/iommu/dmar1/devices/0000:00:1c.0
...
/sys/devices/virtual/iommu/dmar1/intel-iommu
/sys/devices/virtual/iommu/dmar1/intel-iommu/cap
/sys/devices/virtual/iommu/dmar1/intel-iommu/ecap
/sys/devices/virtual/iommu/dmar1/intel-iommu/address
/sys/devices/virtual/iommu/dmar1/intel-iommu/version
/sys/class/iommu/dmar0
/sys/class/iommu/dmar1
(devices also link back to the dmar units)
This makes address, version, capabilities, and extended capabilities
available, just like printed on boot. I've tried not to duplicate
data that can be found in the DMAR table, with the exception of the
address, which provides an easy way to associate the sysfs device with
a DRHD entry in the DMAR. It's tempting to add scopes and RMRR data
here, but the full DMAR table is already exposed under /sys/firmware/
and therefore already provides a way for userspace to learn such
details.
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2014-06-13 06:12:31 +08:00
|
|
|
|
2018-11-12 14:40:08 +08:00
|
|
|
#ifdef CONFIG_INTEL_IOMMU
|
|
|
|
extern int iommu_calculate_agaw(struct intel_iommu *iommu);
|
|
|
|
extern int iommu_calculate_max_sagaw(struct intel_iommu *iommu);
|
|
|
|
extern int dmar_disabled;
|
|
|
|
extern int intel_iommu_enabled;
|
|
|
|
extern int intel_iommu_tboot_noforce;
|
|
|
|
#else
|
|
|
|
static inline int iommu_calculate_agaw(struct intel_iommu *iommu)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
static inline int iommu_calculate_max_sagaw(struct intel_iommu *iommu)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#define dmar_disabled (1)
|
|
|
|
#define intel_iommu_enabled (0)
|
|
|
|
#endif
|
|
|
|
|
2007-10-22 07:41:49 +08:00
|
|
|
#endif
|