mirror of
https://github.com/torvalds/linux.git
synced 2026-04-18 06:44:00 -04:00
Pull iommu updates from Joerg Roedel:
"Core changes:
- Rust bindings for IO-pgtable code
- IOMMU page allocation debugging support
- Disable ATS during PCI resets
Intel VT-d changes:
- Skip dev-iotlb flush for inaccessible PCIe device
- Flush cache for PASID table before using it
- Use right invalidation method for SVA and NESTED domains
- Ensure atomicity in context and PASID entry updates
AMD-Vi changes:
- Support for nested translations
- Other minor improvements
ARM-SMMU-v2 changes:
- Configure SoC-specific prefetcher settings for Qualcomm's "MDSS"
ARM-SMMU-v3 changes:
- Improve CMDQ locking fairness for pathetically small queue sizes
- Remove tracking of the IAS as this is only relevant for AArch32 and
was causing C_BAD_STE errors
- Add device-tree support for NVIDIA's CMDQV extension
- Allow some hitless transitions for the 'MEV' and 'EATS' STE fields
- Don't disable ATS for nested S1-bypass nested domains
- Additions to the kunit selftests"
* tag 'iommu-updates-v7.0' of git://git.kernel.org/pub/scm/linux/kernel/git/iommu/linux: (54 commits)
iommupt: Always add IOVA range to iotlb_gather in gather_range_pages()
iommu/amd: serialize sequence allocation under concurrent TLB invalidations
iommu/amd: Fix type of type parameter to amd_iommufd_hw_info()
iommu/arm-smmu-v3: Do not set disable_ats unless vSTE is Translate
iommu/arm-smmu-v3-test: Add nested s1bypass/s1dssbypass coverage
iommu/arm-smmu-v3: Mark EATS_TRANS safe when computing the update sequence
iommu/arm-smmu-v3: Mark STE MEV safe when computing the update sequence
iommu/arm-smmu-v3: Add update_safe bits to fix STE update sequence
iommu/arm-smmu-v3: Add device-tree support for CMDQV driver
iommu/tegra241-cmdqv: Decouple driver from ACPI
iommu/arm-smmu-qcom: Restore ACTLR settings for MDSS on sa8775p
iommu/vt-d: Fix race condition during PASID entry replacement
iommu/vt-d: Clear Present bit before tearing down context entry
iommu/vt-d: Clear Present bit before tearing down PASID entry
iommu/vt-d: Flush piotlb for SVM and Nested domain
iommu/vt-d: Flush cache for PASID table before using it
iommu/vt-d: Flush dev-IOTLB only when PCIe device is accessible in scalable mode
iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe device without scalable mode
rust: iommu: fix `srctree` link warning
rust: iommu: fix Rust formatting
...
226 lines
7.0 KiB
C
226 lines
7.0 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/*
|
|
* Copyright (C) 2009-2010 Advanced Micro Devices, Inc.
|
|
* Author: Joerg Roedel <jroedel@suse.de>
|
|
*/
|
|
|
|
#ifndef AMD_IOMMU_H
|
|
#define AMD_IOMMU_H
|
|
|
|
#include <linux/iommu.h>
|
|
|
|
#include "amd_iommu_types.h"
|
|
|
|
irqreturn_t amd_iommu_int_thread(int irq, void *data);
|
|
irqreturn_t amd_iommu_int_thread_evtlog(int irq, void *data);
|
|
irqreturn_t amd_iommu_int_thread_pprlog(int irq, void *data);
|
|
irqreturn_t amd_iommu_int_thread_galog(int irq, void *data);
|
|
void amd_iommu_restart_log(struct amd_iommu *iommu, const char *evt_type,
|
|
u8 cntrl_intr, u8 cntrl_log,
|
|
u32 status_run_mask, u32 status_overflow_mask);
|
|
void amd_iommu_restart_event_logging(struct amd_iommu *iommu);
|
|
void amd_iommu_restart_ga_log(struct amd_iommu *iommu);
|
|
void amd_iommu_restart_ppr_log(struct amd_iommu *iommu);
|
|
void amd_iommu_set_rlookup_table(struct amd_iommu *iommu, u16 devid);
|
|
void iommu_feature_enable(struct amd_iommu *iommu, u8 bit);
|
|
void *__init iommu_alloc_4k_pages(struct amd_iommu *iommu,
|
|
gfp_t gfp, size_t size);
|
|
|
|
#ifdef CONFIG_AMD_IOMMU_DEBUGFS
|
|
void amd_iommu_debugfs_setup(void);
|
|
#else
|
|
static inline void amd_iommu_debugfs_setup(void) {}
|
|
#endif
|
|
|
|
/* Needed for interrupt remapping */
|
|
int amd_iommu_prepare(void);
|
|
int amd_iommu_enable(void);
|
|
void amd_iommu_disable(void);
|
|
int amd_iommu_reenable(int mode);
|
|
int amd_iommu_enable_faulting(unsigned int cpu);
|
|
extern int amd_iommu_guest_ir;
|
|
extern enum protection_domain_mode amd_iommu_pgtable;
|
|
extern int amd_iommu_gpt_level;
|
|
extern u8 amd_iommu_hpt_level;
|
|
extern unsigned long amd_iommu_pgsize_bitmap;
|
|
extern bool amd_iommu_hatdis;
|
|
|
|
/* Protection domain ops */
|
|
void amd_iommu_init_identity_domain(void);
|
|
struct protection_domain *protection_domain_alloc(void);
|
|
struct iommu_domain *amd_iommu_domain_alloc_sva(struct device *dev,
|
|
struct mm_struct *mm);
|
|
void amd_iommu_domain_free(struct iommu_domain *dom);
|
|
int iommu_sva_set_dev_pasid(struct iommu_domain *domain,
|
|
struct device *dev, ioasid_t pasid,
|
|
struct iommu_domain *old);
|
|
void amd_iommu_remove_dev_pasid(struct device *dev, ioasid_t pasid,
|
|
struct iommu_domain *domain);
|
|
|
|
/* SVA/PASID */
|
|
bool amd_iommu_pasid_supported(void);
|
|
|
|
/* IOPF */
|
|
int amd_iommu_iopf_init(struct amd_iommu *iommu);
|
|
void amd_iommu_iopf_uninit(struct amd_iommu *iommu);
|
|
void amd_iommu_page_response(struct device *dev, struct iopf_fault *evt,
|
|
struct iommu_page_response *resp);
|
|
int amd_iommu_iopf_add_device(struct amd_iommu *iommu,
|
|
struct iommu_dev_data *dev_data);
|
|
void amd_iommu_iopf_remove_device(struct amd_iommu *iommu,
|
|
struct iommu_dev_data *dev_data);
|
|
|
|
/* GCR3 setup */
|
|
int amd_iommu_set_gcr3(struct iommu_dev_data *dev_data,
|
|
ioasid_t pasid, unsigned long gcr3);
|
|
int amd_iommu_clear_gcr3(struct iommu_dev_data *dev_data, ioasid_t pasid);
|
|
|
|
/* PPR */
|
|
int __init amd_iommu_alloc_ppr_log(struct amd_iommu *iommu);
|
|
void __init amd_iommu_free_ppr_log(struct amd_iommu *iommu);
|
|
void amd_iommu_enable_ppr_log(struct amd_iommu *iommu);
|
|
void amd_iommu_poll_ppr_log(struct amd_iommu *iommu);
|
|
int amd_iommu_complete_ppr(struct device *dev, u32 pasid, int status, int tag);
|
|
|
|
/*
|
|
* This function flushes all internal caches of
|
|
* the IOMMU used by this driver.
|
|
*/
|
|
void amd_iommu_flush_all_caches(struct amd_iommu *iommu);
|
|
void amd_iommu_domain_flush_pages(struct protection_domain *domain,
|
|
u64 address, size_t size);
|
|
void amd_iommu_dev_flush_pasid_pages(struct iommu_dev_data *dev_data,
|
|
ioasid_t pasid, u64 address, size_t size);
|
|
|
|
#ifdef CONFIG_IRQ_REMAP
|
|
int amd_iommu_create_irq_domain(struct amd_iommu *iommu);
|
|
#else
|
|
static inline int amd_iommu_create_irq_domain(struct amd_iommu *iommu)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
static inline bool is_rd890_iommu(struct pci_dev *pdev)
|
|
{
|
|
return (pdev->vendor == PCI_VENDOR_ID_ATI) &&
|
|
(pdev->device == PCI_DEVICE_ID_RD890_IOMMU);
|
|
}
|
|
|
|
static inline bool check_feature(u64 mask)
|
|
{
|
|
return (amd_iommu_efr & mask);
|
|
}
|
|
|
|
static inline bool check_feature2(u64 mask)
|
|
{
|
|
return (amd_iommu_efr2 & mask);
|
|
}
|
|
|
|
static inline bool amd_iommu_v2_pgtbl_supported(void)
|
|
{
|
|
return (check_feature(FEATURE_GIOSUP) && check_feature(FEATURE_GT));
|
|
}
|
|
|
|
static inline bool amd_iommu_gt_ppr_supported(void)
|
|
{
|
|
return (amd_iommu_v2_pgtbl_supported() &&
|
|
check_feature(FEATURE_PPR) &&
|
|
check_feature(FEATURE_EPHSUP));
|
|
}
|
|
|
|
static inline u64 iommu_virt_to_phys(void *vaddr)
|
|
{
|
|
return (u64)__sme_set(virt_to_phys(vaddr));
|
|
}
|
|
|
|
static inline void *iommu_phys_to_virt(unsigned long paddr)
|
|
{
|
|
return phys_to_virt(__sme_clr(paddr));
|
|
}
|
|
|
|
static inline int get_pci_sbdf_id(struct pci_dev *pdev)
|
|
{
|
|
int seg = pci_domain_nr(pdev->bus);
|
|
u16 devid = pci_dev_id(pdev);
|
|
|
|
return PCI_SEG_DEVID_TO_SBDF(seg, devid);
|
|
}
|
|
|
|
bool amd_iommu_ht_range_ignore(void);
|
|
|
|
/*
|
|
* This must be called after device probe completes. During probe
|
|
* use rlookup_amd_iommu() get the iommu.
|
|
*/
|
|
static inline struct amd_iommu *get_amd_iommu_from_dev(struct device *dev)
|
|
{
|
|
return iommu_get_iommu_dev(dev, struct amd_iommu, iommu);
|
|
}
|
|
|
|
/* This must be called after device probe completes. */
|
|
static inline struct amd_iommu *get_amd_iommu_from_dev_data(struct iommu_dev_data *dev_data)
|
|
{
|
|
return iommu_get_iommu_dev(dev_data->dev, struct amd_iommu, iommu);
|
|
}
|
|
|
|
static inline struct protection_domain *to_pdomain(struct iommu_domain *dom)
|
|
{
|
|
return container_of(dom, struct protection_domain, domain);
|
|
}
|
|
|
|
bool translation_pre_enabled(struct amd_iommu *iommu);
|
|
int __init add_special_device(u8 type, u8 id, u32 *devid, bool cmd_line);
|
|
|
|
int amd_iommu_pdom_id_alloc(void);
|
|
int amd_iommu_pdom_id_reserve(u16 id, gfp_t gfp);
|
|
void amd_iommu_pdom_id_free(int id);
|
|
void amd_iommu_pdom_id_destroy(void);
|
|
|
|
#ifdef CONFIG_DMI
|
|
void amd_iommu_apply_ivrs_quirks(void);
|
|
#else
|
|
static inline void amd_iommu_apply_ivrs_quirks(void) { }
|
|
#endif
|
|
struct dev_table_entry *amd_iommu_get_ivhd_dte_flags(u16 segid, u16 devid);
|
|
|
|
void amd_iommu_domain_set_pgtable(struct protection_domain *domain,
|
|
u64 *root, int mode);
|
|
struct dev_table_entry *get_dev_table(struct amd_iommu *iommu);
|
|
struct iommu_dev_data *search_dev_data(struct amd_iommu *iommu, u16 devid);
|
|
|
|
void amd_iommu_set_dte_v1(struct iommu_dev_data *dev_data,
|
|
struct protection_domain *domain, u16 domid,
|
|
struct pt_iommu_amdv1_hw_info *pt_info,
|
|
struct dev_table_entry *new);
|
|
void amd_iommu_update_dte(struct amd_iommu *iommu,
|
|
struct iommu_dev_data *dev_data,
|
|
struct dev_table_entry *new);
|
|
|
|
static inline void
|
|
amd_iommu_make_clear_dte(struct iommu_dev_data *dev_data, struct dev_table_entry *new)
|
|
{
|
|
struct dev_table_entry *initial_dte;
|
|
struct amd_iommu *iommu = get_amd_iommu_from_dev(dev_data->dev);
|
|
|
|
/* All existing DTE must have V bit set */
|
|
new->data128[0] = DTE_FLAG_V;
|
|
new->data128[1] = 0;
|
|
|
|
/*
|
|
* Restore cached persistent DTE bits, which can be set by information
|
|
* in IVRS table. See set_dev_entry_from_acpi().
|
|
*/
|
|
initial_dte = amd_iommu_get_ivhd_dte_flags(iommu->pci_seg->id, dev_data->devid);
|
|
if (initial_dte) {
|
|
new->data128[0] |= initial_dte->data128[0];
|
|
new->data128[1] |= initial_dte->data128[1];
|
|
}
|
|
}
|
|
|
|
/* NESTED */
|
|
struct iommu_domain *
|
|
amd_iommu_alloc_domain_nested(struct iommufd_viommu *viommu, u32 flags,
|
|
const struct iommu_user_data *user_data);
|
|
#endif /* AMD_IOMMU_H */
|