xref: /linux/drivers/iommu/intel/iommu.h (revision 53564f400572b1b8d9ee5bafb9c226eb1d38600a)
1 /* SPDX-License-Identifier: GPL-2.0-only */
2 /*
3  * Copyright © 2006-2015, Intel Corporation.
4  *
5  * Authors: Ashok Raj <ashok.raj@intel.com>
6  *          Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com>
7  *          David Woodhouse <David.Woodhouse@intel.com>
8  */
9 
10 #ifndef _INTEL_IOMMU_H_
11 #define _INTEL_IOMMU_H_
12 
13 #include <linux/types.h>
14 #include <linux/iova.h>
15 #include <linux/io.h>
16 #include <linux/idr.h>
17 #include <linux/mmu_notifier.h>
18 #include <linux/list.h>
19 #include <linux/iommu.h>
20 #include <linux/io-64-nonatomic-lo-hi.h>
21 #include <linux/dmar.h>
22 #include <linux/bitfield.h>
23 #include <linux/xarray.h>
24 #include <linux/perf_event.h>
25 #include <linux/pci.h>
26 
27 #include <asm/cacheflush.h>
28 #include <asm/iommu.h>
29 #include <uapi/linux/iommufd.h>
30 
31 /*
32  * VT-d hardware uses 4KiB page size regardless of host page size.
33  */
34 #define VTD_PAGE_SHIFT		(12)
35 #define VTD_PAGE_SIZE		(1UL << VTD_PAGE_SHIFT)
36 #define VTD_PAGE_MASK		(((u64)-1) << VTD_PAGE_SHIFT)
37 #define VTD_PAGE_ALIGN(addr)	(((addr) + VTD_PAGE_SIZE - 1) & VTD_PAGE_MASK)
38 
39 #define IOVA_PFN(addr)		((addr) >> PAGE_SHIFT)
40 
41 #define VTD_STRIDE_SHIFT        (9)
42 #define VTD_STRIDE_MASK         (((u64)-1) << VTD_STRIDE_SHIFT)
43 
44 #define DMA_PTE_READ		BIT_ULL(0)
45 #define DMA_PTE_WRITE		BIT_ULL(1)
46 #define DMA_PTE_LARGE_PAGE	BIT_ULL(7)
47 #define DMA_PTE_SNP		BIT_ULL(11)
48 
49 #define DMA_FL_PTE_PRESENT	BIT_ULL(0)
50 #define DMA_FL_PTE_US		BIT_ULL(2)
51 #define DMA_FL_PTE_ACCESS	BIT_ULL(5)
52 #define DMA_FL_PTE_DIRTY	BIT_ULL(6)
53 
54 #define DMA_SL_PTE_DIRTY_BIT	9
55 #define DMA_SL_PTE_DIRTY	BIT_ULL(DMA_SL_PTE_DIRTY_BIT)
56 
57 #define ADDR_WIDTH_5LEVEL	(57)
58 #define ADDR_WIDTH_4LEVEL	(48)
59 
60 #define CONTEXT_TT_MULTI_LEVEL	0
61 #define CONTEXT_TT_DEV_IOTLB	1
62 #define CONTEXT_TT_PASS_THROUGH 2
63 #define CONTEXT_PASIDE		BIT_ULL(3)
64 
65 /*
66  * Intel IOMMU register specification per version 1.0 public spec.
67  */
68 #define	DMAR_VER_REG	0x0	/* Arch version supported by this IOMMU */
69 #define	DMAR_CAP_REG	0x8	/* Hardware supported capabilities */
70 #define	DMAR_ECAP_REG	0x10	/* Extended capabilities supported */
71 #define	DMAR_GCMD_REG	0x18	/* Global command register */
72 #define	DMAR_GSTS_REG	0x1c	/* Global status register */
73 #define	DMAR_RTADDR_REG	0x20	/* Root entry table */
74 #define	DMAR_CCMD_REG	0x28	/* Context command reg */
75 #define	DMAR_FSTS_REG	0x34	/* Fault Status register */
76 #define	DMAR_FECTL_REG	0x38	/* Fault control register */
77 #define	DMAR_FEDATA_REG	0x3c	/* Fault event interrupt data register */
78 #define	DMAR_FEADDR_REG	0x40	/* Fault event interrupt addr register */
79 #define	DMAR_FEUADDR_REG 0x44	/* Upper address register */
80 #define	DMAR_AFLOG_REG	0x58	/* Advanced Fault control */
81 #define	DMAR_PMEN_REG	0x64	/* Enable Protected Memory Region */
82 #define	DMAR_PLMBASE_REG 0x68	/* PMRR Low addr */
83 #define	DMAR_PLMLIMIT_REG 0x6c	/* PMRR low limit */
84 #define	DMAR_PHMBASE_REG 0x70	/* pmrr high base addr */
85 #define	DMAR_PHMLIMIT_REG 0x78	/* pmrr high limit */
86 #define DMAR_IQH_REG	0x80	/* Invalidation queue head register */
87 #define DMAR_IQT_REG	0x88	/* Invalidation queue tail register */
88 #define DMAR_IQ_SHIFT	4	/* Invalidation queue head/tail shift */
89 #define DMAR_IQA_REG	0x90	/* Invalidation queue addr register */
90 #define DMAR_ICS_REG	0x9c	/* Invalidation complete status register */
91 #define DMAR_IQER_REG	0xb0	/* Invalidation queue error record register */
92 #define DMAR_IRTA_REG	0xb8    /* Interrupt remapping table addr register */
93 #define DMAR_PQH_REG	0xc0	/* Page request queue head register */
94 #define DMAR_PQT_REG	0xc8	/* Page request queue tail register */
95 #define DMAR_PQA_REG	0xd0	/* Page request queue address register */
96 #define DMAR_PRS_REG	0xdc	/* Page request status register */
97 #define DMAR_PECTL_REG	0xe0	/* Page request event control register */
98 #define	DMAR_PEDATA_REG	0xe4	/* Page request event interrupt data register */
99 #define	DMAR_PEADDR_REG	0xe8	/* Page request event interrupt addr register */
100 #define	DMAR_PEUADDR_REG 0xec	/* Page request event Upper address register */
101 #define DMAR_MTRRCAP_REG 0x100	/* MTRR capability register */
102 #define DMAR_MTRRDEF_REG 0x108	/* MTRR default type register */
103 #define DMAR_MTRR_FIX64K_00000_REG 0x120 /* MTRR Fixed range registers */
104 #define DMAR_MTRR_FIX16K_80000_REG 0x128
105 #define DMAR_MTRR_FIX16K_A0000_REG 0x130
106 #define DMAR_MTRR_FIX4K_C0000_REG 0x138
107 #define DMAR_MTRR_FIX4K_C8000_REG 0x140
108 #define DMAR_MTRR_FIX4K_D0000_REG 0x148
109 #define DMAR_MTRR_FIX4K_D8000_REG 0x150
110 #define DMAR_MTRR_FIX4K_E0000_REG 0x158
111 #define DMAR_MTRR_FIX4K_E8000_REG 0x160
112 #define DMAR_MTRR_FIX4K_F0000_REG 0x168
113 #define DMAR_MTRR_FIX4K_F8000_REG 0x170
114 #define DMAR_MTRR_PHYSBASE0_REG 0x180 /* MTRR Variable range registers */
115 #define DMAR_MTRR_PHYSMASK0_REG 0x188
116 #define DMAR_MTRR_PHYSBASE1_REG 0x190
117 #define DMAR_MTRR_PHYSMASK1_REG 0x198
118 #define DMAR_MTRR_PHYSBASE2_REG 0x1a0
119 #define DMAR_MTRR_PHYSMASK2_REG 0x1a8
120 #define DMAR_MTRR_PHYSBASE3_REG 0x1b0
121 #define DMAR_MTRR_PHYSMASK3_REG 0x1b8
122 #define DMAR_MTRR_PHYSBASE4_REG 0x1c0
123 #define DMAR_MTRR_PHYSMASK4_REG 0x1c8
124 #define DMAR_MTRR_PHYSBASE5_REG 0x1d0
125 #define DMAR_MTRR_PHYSMASK5_REG 0x1d8
126 #define DMAR_MTRR_PHYSBASE6_REG 0x1e0
127 #define DMAR_MTRR_PHYSMASK6_REG 0x1e8
128 #define DMAR_MTRR_PHYSBASE7_REG 0x1f0
129 #define DMAR_MTRR_PHYSMASK7_REG 0x1f8
130 #define DMAR_MTRR_PHYSBASE8_REG 0x200
131 #define DMAR_MTRR_PHYSMASK8_REG 0x208
132 #define DMAR_MTRR_PHYSBASE9_REG 0x210
133 #define DMAR_MTRR_PHYSMASK9_REG 0x218
134 #define DMAR_PERFCAP_REG	0x300
135 #define DMAR_PERFCFGOFF_REG	0x310
136 #define DMAR_PERFOVFOFF_REG	0x318
137 #define DMAR_PERFCNTROFF_REG	0x31c
138 #define DMAR_PERFINTRSTS_REG	0x324
139 #define DMAR_PERFINTRCTL_REG	0x328
140 #define DMAR_PERFEVNTCAP_REG	0x380
141 #define DMAR_ECMD_REG		0x400
142 #define DMAR_ECEO_REG		0x408
143 #define DMAR_ECRSP_REG		0x410
144 #define DMAR_ECCAP_REG		0x430
145 
146 #define DMAR_IQER_REG_IQEI(reg)		FIELD_GET(GENMASK_ULL(3, 0), reg)
147 #define DMAR_IQER_REG_ITESID(reg)	FIELD_GET(GENMASK_ULL(47, 32), reg)
148 #define DMAR_IQER_REG_ICESID(reg)	FIELD_GET(GENMASK_ULL(63, 48), reg)
149 
150 #define OFFSET_STRIDE		(9)
151 
152 #define dmar_readq(a) readq(a)
153 #define dmar_writeq(a,v) writeq(v,a)
154 #define dmar_readl(a) readl(a)
155 #define dmar_writel(a, v) writel(v, a)
156 
157 #define DMAR_VER_MAJOR(v)		(((v) & 0xf0) >> 4)
158 #define DMAR_VER_MINOR(v)		((v) & 0x0f)
159 
160 /*
161  * Decoding Capability Register
162  */
163 #define cap_esrtps(c)		(((c) >> 63) & 1)
164 #define cap_esirtps(c)		(((c) >> 62) & 1)
165 #define cap_ecmds(c)		(((c) >> 61) & 1)
166 #define cap_fl5lp_support(c)	(((c) >> 60) & 1)
167 #define cap_pi_support(c)	(((c) >> 59) & 1)
168 #define cap_fl1gp_support(c)	(((c) >> 56) & 1)
169 #define cap_read_drain(c)	(((c) >> 55) & 1)
170 #define cap_write_drain(c)	(((c) >> 54) & 1)
171 #define cap_max_amask_val(c)	(((c) >> 48) & 0x3f)
172 #define cap_num_fault_regs(c)	((((c) >> 40) & 0xff) + 1)
173 #define cap_pgsel_inv(c)	(((c) >> 39) & 1)
174 
175 #define cap_super_page_val(c)	(((c) >> 34) & 0xf)
176 #define cap_super_offset(c)	(((find_first_bit(&cap_super_page_val(c), 4)) \
177 					* OFFSET_STRIDE) + 21)
178 
179 #define cap_fault_reg_offset(c)	((((c) >> 24) & 0x3ff) * 16)
180 #define cap_max_fault_reg_offset(c) \
181 	(cap_fault_reg_offset(c) + cap_num_fault_regs(c) * 16)
182 
183 #define cap_zlr(c)		(((c) >> 22) & 1)
184 #define cap_isoch(c)		(((c) >> 23) & 1)
185 #define cap_mgaw(c)		((((c) >> 16) & 0x3f) + 1)
186 #define cap_sagaw(c)		(((c) >> 8) & 0x1f)
187 #define cap_caching_mode(c)	(((c) >> 7) & 1)
188 #define cap_phmr(c)		(((c) >> 6) & 1)
189 #define cap_plmr(c)		(((c) >> 5) & 1)
190 #define cap_rwbf(c)		(((c) >> 4) & 1)
191 #define cap_afl(c)		(((c) >> 3) & 1)
192 #define cap_ndoms(c)		(((unsigned long)1) << (4 + 2 * ((c) & 0x7)))
193 /*
194  * Extended Capability Register
195  */
196 
197 #define ecap_pms(e)		(((e) >> 51) & 0x1)
198 #define ecap_rps(e)		(((e) >> 49) & 0x1)
199 #define ecap_smpwc(e)		(((e) >> 48) & 0x1)
200 #define ecap_flts(e)		(((e) >> 47) & 0x1)
201 #define ecap_slts(e)		(((e) >> 46) & 0x1)
202 #define ecap_slads(e)		(((e) >> 45) & 0x1)
203 #define ecap_smts(e)		(((e) >> 43) & 0x1)
204 #define ecap_dit(e)		(((e) >> 41) & 0x1)
205 #define ecap_pds(e)		(((e) >> 42) & 0x1)
206 #define ecap_pasid(e)		(((e) >> 40) & 0x1)
207 #define ecap_pss(e)		(((e) >> 35) & 0x1f)
208 #define ecap_eafs(e)		(((e) >> 34) & 0x1)
209 #define ecap_nwfs(e)		(((e) >> 33) & 0x1)
210 #define ecap_srs(e)		(((e) >> 31) & 0x1)
211 #define ecap_ers(e)		(((e) >> 30) & 0x1)
212 #define ecap_prs(e)		(((e) >> 29) & 0x1)
213 #define ecap_broken_pasid(e)	(((e) >> 28) & 0x1)
214 #define ecap_dis(e)		(((e) >> 27) & 0x1)
215 #define ecap_nest(e)		(((e) >> 26) & 0x1)
216 #define ecap_mts(e)		(((e) >> 25) & 0x1)
217 #define ecap_iotlb_offset(e) 	((((e) >> 8) & 0x3ff) * 16)
218 #define ecap_max_iotlb_offset(e) (ecap_iotlb_offset(e) + 16)
219 #define ecap_coherent(e)	((e) & 0x1)
220 #define ecap_qis(e)		((e) & 0x2)
221 #define ecap_pass_through(e)	(((e) >> 6) & 0x1)
222 #define ecap_eim_support(e)	(((e) >> 4) & 0x1)
223 #define ecap_ir_support(e)	(((e) >> 3) & 0x1)
224 #define ecap_dev_iotlb_support(e)	(((e) >> 2) & 0x1)
225 #define ecap_max_handle_mask(e) (((e) >> 20) & 0xf)
226 #define ecap_sc_support(e)	(((e) >> 7) & 0x1) /* Snooping Control */
227 
228 /*
229  * Decoding Perf Capability Register
230  */
231 #define pcap_num_cntr(p)	((p) & 0xffff)
232 #define pcap_cntr_width(p)	(((p) >> 16) & 0x7f)
233 #define pcap_num_event_group(p)	(((p) >> 24) & 0x1f)
234 #define pcap_filters_mask(p)	(((p) >> 32) & 0x1f)
235 #define pcap_interrupt(p)	(((p) >> 50) & 0x1)
236 /* The counter stride is calculated as 2 ^ (x+10) bytes */
237 #define pcap_cntr_stride(p)	(1ULL << ((((p) >> 52) & 0x7) + 10))
238 
239 /*
240  * Decoding Perf Event Capability Register
241  */
242 #define pecap_es(p)		((p) & 0xfffffff)
243 
244 /* Virtual command interface capability */
245 #define vccap_pasid(v)		(((v) & DMA_VCS_PAS)) /* PASID allocation */
246 
247 /* IOTLB_REG */
248 #define DMA_TLB_FLUSH_GRANU_OFFSET  60
249 #define DMA_TLB_GLOBAL_FLUSH (((u64)1) << 60)
250 #define DMA_TLB_DSI_FLUSH (((u64)2) << 60)
251 #define DMA_TLB_PSI_FLUSH (((u64)3) << 60)
252 #define DMA_TLB_IIRG(type) ((type >> 60) & 3)
253 #define DMA_TLB_IAIG(val) (((val) >> 57) & 3)
254 #define DMA_TLB_READ_DRAIN (((u64)1) << 49)
255 #define DMA_TLB_WRITE_DRAIN (((u64)1) << 48)
256 #define DMA_TLB_DID(id)	(((u64)((id) & 0xffff)) << 32)
257 #define DMA_TLB_IVT (((u64)1) << 63)
258 #define DMA_TLB_IH_NONLEAF (((u64)1) << 6)
259 #define DMA_TLB_MAX_SIZE (0x3f)
260 
261 /* INVALID_DESC */
262 #define DMA_CCMD_INVL_GRANU_OFFSET  61
263 #define DMA_ID_TLB_GLOBAL_FLUSH	(((u64)1) << 4)
264 #define DMA_ID_TLB_DSI_FLUSH	(((u64)2) << 4)
265 #define DMA_ID_TLB_PSI_FLUSH	(((u64)3) << 4)
266 #define DMA_ID_TLB_READ_DRAIN	(((u64)1) << 7)
267 #define DMA_ID_TLB_WRITE_DRAIN	(((u64)1) << 6)
268 #define DMA_ID_TLB_DID(id)	(((u64)((id & 0xffff) << 16)))
269 #define DMA_ID_TLB_IH_NONLEAF	(((u64)1) << 6)
270 #define DMA_ID_TLB_ADDR(addr)	(addr)
271 #define DMA_ID_TLB_ADDR_MASK(mask)	(mask)
272 
273 /* PMEN_REG */
274 #define DMA_PMEN_EPM (((u32)1)<<31)
275 #define DMA_PMEN_PRS (((u32)1)<<0)
276 
277 /* GCMD_REG */
278 #define DMA_GCMD_TE (((u32)1) << 31)
279 #define DMA_GCMD_SRTP (((u32)1) << 30)
280 #define DMA_GCMD_SFL (((u32)1) << 29)
281 #define DMA_GCMD_EAFL (((u32)1) << 28)
282 #define DMA_GCMD_WBF (((u32)1) << 27)
283 #define DMA_GCMD_QIE (((u32)1) << 26)
284 #define DMA_GCMD_SIRTP (((u32)1) << 24)
285 #define DMA_GCMD_IRE (((u32) 1) << 25)
286 #define DMA_GCMD_CFI (((u32) 1) << 23)
287 
288 /* GSTS_REG */
289 #define DMA_GSTS_TES (((u32)1) << 31)
290 #define DMA_GSTS_RTPS (((u32)1) << 30)
291 #define DMA_GSTS_FLS (((u32)1) << 29)
292 #define DMA_GSTS_AFLS (((u32)1) << 28)
293 #define DMA_GSTS_WBFS (((u32)1) << 27)
294 #define DMA_GSTS_QIES (((u32)1) << 26)
295 #define DMA_GSTS_IRTPS (((u32)1) << 24)
296 #define DMA_GSTS_IRES (((u32)1) << 25)
297 #define DMA_GSTS_CFIS (((u32)1) << 23)
298 
299 /* DMA_RTADDR_REG */
300 #define DMA_RTADDR_SMT (((u64)1) << 10)
301 
302 /* CCMD_REG */
303 #define DMA_CCMD_ICC (((u64)1) << 63)
304 #define DMA_CCMD_GLOBAL_INVL (((u64)1) << 61)
305 #define DMA_CCMD_DOMAIN_INVL (((u64)2) << 61)
306 #define DMA_CCMD_DEVICE_INVL (((u64)3) << 61)
307 #define DMA_CCMD_FM(m) (((u64)((m) & 0x3)) << 32)
308 #define DMA_CCMD_MASK_NOBIT 0
309 #define DMA_CCMD_MASK_1BIT 1
310 #define DMA_CCMD_MASK_2BIT 2
311 #define DMA_CCMD_MASK_3BIT 3
312 #define DMA_CCMD_SID(s) (((u64)((s) & 0xffff)) << 16)
313 #define DMA_CCMD_DID(d) ((u64)((d) & 0xffff))
314 
315 /* ECMD_REG */
316 #define DMA_MAX_NUM_ECMD		256
317 #define DMA_MAX_NUM_ECMDCAP		(DMA_MAX_NUM_ECMD / 64)
318 #define DMA_ECMD_REG_STEP		8
319 #define DMA_ECMD_ENABLE			0xf0
320 #define DMA_ECMD_DISABLE		0xf1
321 #define DMA_ECMD_FREEZE			0xf4
322 #define DMA_ECMD_UNFREEZE		0xf5
323 #define DMA_ECMD_OA_SHIFT		16
324 #define DMA_ECMD_ECRSP_IP		0x1
325 #define DMA_ECMD_ECCAP3			3
326 #define DMA_ECMD_ECCAP3_ECNTS		BIT_ULL(48)
327 #define DMA_ECMD_ECCAP3_DCNTS		BIT_ULL(49)
328 #define DMA_ECMD_ECCAP3_FCNTS		BIT_ULL(52)
329 #define DMA_ECMD_ECCAP3_UFCNTS		BIT_ULL(53)
330 #define DMA_ECMD_ECCAP3_ESSENTIAL	(DMA_ECMD_ECCAP3_ECNTS |	\
331 					 DMA_ECMD_ECCAP3_DCNTS |	\
332 					 DMA_ECMD_ECCAP3_FCNTS |	\
333 					 DMA_ECMD_ECCAP3_UFCNTS)
334 
335 /* FECTL_REG */
336 #define DMA_FECTL_IM (((u32)1) << 31)
337 
338 /* FSTS_REG */
339 #define DMA_FSTS_PFO (1 << 0) /* Primary Fault Overflow */
340 #define DMA_FSTS_PPF (1 << 1) /* Primary Pending Fault */
341 #define DMA_FSTS_IQE (1 << 4) /* Invalidation Queue Error */
342 #define DMA_FSTS_ICE (1 << 5) /* Invalidation Completion Error */
343 #define DMA_FSTS_ITE (1 << 6) /* Invalidation Time-out Error */
344 #define DMA_FSTS_PRO (1 << 7) /* Page Request Overflow */
345 #define dma_fsts_fault_record_index(s) (((s) >> 8) & 0xff)
346 
347 /* FRCD_REG, 32 bits access */
348 #define DMA_FRCD_F (((u32)1) << 31)
349 #define dma_frcd_type(d) ((d >> 30) & 1)
350 #define dma_frcd_fault_reason(c) (c & 0xff)
351 #define dma_frcd_source_id(c) (c & 0xffff)
352 #define dma_frcd_pasid_value(c) (((c) >> 8) & 0xfffff)
353 #define dma_frcd_pasid_present(c) (((c) >> 31) & 1)
354 /* low 64 bit */
355 #define dma_frcd_page_addr(d) (d & (((u64)-1) << PAGE_SHIFT))
356 
357 /* PRS_REG */
358 #define DMA_PRS_PPR	((u32)1)
359 #define DMA_PRS_PRO	((u32)2)
360 
361 #define DMA_VCS_PAS	((u64)1)
362 
363 /* PERFINTRSTS_REG */
364 #define DMA_PERFINTRSTS_PIS	((u32)1)
365 
366 #define IOMMU_WAIT_OP(iommu, offset, op, cond, sts)			\
367 do {									\
368 	cycles_t start_time = get_cycles();				\
369 	while (1) {							\
370 		sts = op(iommu->reg + offset);				\
371 		if (cond)						\
372 			break;						\
373 		if (DMAR_OPERATION_TIMEOUT < (get_cycles() - start_time))\
374 			panic("DMAR hardware is malfunctioning\n");	\
375 		cpu_relax();						\
376 	}								\
377 } while (0)
378 
379 #define QI_LENGTH	256	/* queue length */
380 
381 enum {
382 	QI_FREE,
383 	QI_IN_USE,
384 	QI_DONE,
385 	QI_ABORT
386 };
387 
388 #define QI_CC_TYPE		0x1
389 #define QI_IOTLB_TYPE		0x2
390 #define QI_DIOTLB_TYPE		0x3
391 #define QI_IEC_TYPE		0x4
392 #define QI_IWD_TYPE		0x5
393 #define QI_EIOTLB_TYPE		0x6
394 #define QI_PC_TYPE		0x7
395 #define QI_DEIOTLB_TYPE		0x8
396 #define QI_PGRP_RESP_TYPE	0x9
397 #define QI_PSTRM_RESP_TYPE	0xa
398 
399 #define QI_IEC_SELECTIVE	(((u64)1) << 4)
400 #define QI_IEC_IIDEX(idx)	(((u64)(idx & 0xffff) << 32))
401 #define QI_IEC_IM(m)		(((u64)(m & 0x1f) << 27))
402 
403 #define QI_IWD_STATUS_DATA(d)	(((u64)d) << 32)
404 #define QI_IWD_STATUS_WRITE	(((u64)1) << 5)
405 #define QI_IWD_FENCE		(((u64)1) << 6)
406 #define QI_IWD_PRQ_DRAIN	(((u64)1) << 7)
407 
408 #define QI_IOTLB_DID(did) 	(((u64)did) << 16)
409 #define QI_IOTLB_DR(dr) 	(((u64)dr) << 7)
410 #define QI_IOTLB_DW(dw) 	(((u64)dw) << 6)
411 #define QI_IOTLB_GRAN(gran) 	(((u64)gran) >> (DMA_TLB_FLUSH_GRANU_OFFSET-4))
412 #define QI_IOTLB_ADDR(addr)	(((u64)addr) & VTD_PAGE_MASK)
413 #define QI_IOTLB_IH(ih)		(((u64)ih) << 6)
414 #define QI_IOTLB_AM(am)		(((u8)am) & 0x3f)
415 
416 #define QI_CC_FM(fm)		(((u64)fm) << 48)
417 #define QI_CC_SID(sid)		(((u64)sid) << 32)
418 #define QI_CC_DID(did)		(((u64)did) << 16)
419 #define QI_CC_GRAN(gran)	(((u64)gran) >> (DMA_CCMD_INVL_GRANU_OFFSET-4))
420 
421 #define QI_DEV_IOTLB_SID(sid)	((u64)((sid) & 0xffff) << 32)
422 #define QI_DEV_IOTLB_QDEP(qdep)	(((qdep) & 0x1f) << 16)
423 #define QI_DEV_IOTLB_ADDR(addr)	((u64)(addr) & VTD_PAGE_MASK)
424 #define QI_DEV_IOTLB_PFSID(pfsid) (((u64)(pfsid & 0xf) << 12) | \
425 				   ((u64)((pfsid >> 4) & 0xfff) << 52))
426 #define QI_DEV_IOTLB_SIZE	1
427 #define QI_DEV_IOTLB_MAX_INVS	32
428 
429 #define QI_PC_PASID(pasid)	(((u64)pasid) << 32)
430 #define QI_PC_DID(did)		(((u64)did) << 16)
431 #define QI_PC_GRAN(gran)	(((u64)gran) << 4)
432 
433 /* PASID cache invalidation granu */
434 #define QI_PC_ALL_PASIDS	0
435 #define QI_PC_PASID_SEL		1
436 #define QI_PC_GLOBAL		3
437 
438 #define QI_EIOTLB_ADDR(addr)	((u64)(addr) & VTD_PAGE_MASK)
439 #define QI_EIOTLB_IH(ih)	(((u64)ih) << 6)
440 #define QI_EIOTLB_AM(am)	(((u64)am) & 0x3f)
441 #define QI_EIOTLB_PASID(pasid) 	(((u64)pasid) << 32)
442 #define QI_EIOTLB_DID(did)	(((u64)did) << 16)
443 #define QI_EIOTLB_GRAN(gran) 	(((u64)gran) << 4)
444 
445 /* QI Dev-IOTLB inv granu */
446 #define QI_DEV_IOTLB_GRAN_ALL		1
447 #define QI_DEV_IOTLB_GRAN_PASID_SEL	0
448 
449 #define QI_DEV_EIOTLB_ADDR(a)	((u64)(a) & VTD_PAGE_MASK)
450 #define QI_DEV_EIOTLB_SIZE	(((u64)1) << 11)
451 #define QI_DEV_EIOTLB_PASID(p)	((u64)((p) & 0xfffff) << 32)
452 #define QI_DEV_EIOTLB_SID(sid)	((u64)((sid) & 0xffff) << 16)
453 #define QI_DEV_EIOTLB_QDEP(qd)	((u64)((qd) & 0x1f) << 4)
454 #define QI_DEV_EIOTLB_PFSID(pfsid) (((u64)(pfsid & 0xf) << 12) | \
455 				    ((u64)((pfsid >> 4) & 0xfff) << 52))
456 #define QI_DEV_EIOTLB_MAX_INVS	32
457 
458 /* Page group response descriptor QW0 */
459 #define QI_PGRP_PASID_P(p)	(((u64)(p)) << 4)
460 #define QI_PGRP_RESP_CODE(res)	(((u64)(res)) << 12)
461 #define QI_PGRP_DID(rid)	(((u64)(rid)) << 16)
462 #define QI_PGRP_PASID(pasid)	(((u64)(pasid)) << 32)
463 
464 /* Page group response descriptor QW1 */
465 #define QI_PGRP_LPIG(x)		(((u64)(x)) << 2)
466 #define QI_PGRP_IDX(idx)	(((u64)(idx)) << 3)
467 
468 
469 #define QI_RESP_SUCCESS		0x0
470 #define QI_RESP_INVALID		0x1
471 #define QI_RESP_FAILURE		0xf
472 
473 #define QI_GRAN_NONG_PASID		2
474 #define QI_GRAN_PSI_PASID		3
475 
476 #define qi_shift(iommu)		(DMAR_IQ_SHIFT + !!ecap_smts((iommu)->ecap))
477 
478 struct qi_desc {
479 	u64 qw0;
480 	u64 qw1;
481 	u64 qw2;
482 	u64 qw3;
483 };
484 
485 struct q_inval {
486 	raw_spinlock_t  q_lock;
487 	void		*desc;          /* invalidation queue */
488 	int             *desc_status;   /* desc status */
489 	int             free_head;      /* first free entry */
490 	int             free_tail;      /* last free entry */
491 	int             free_cnt;
492 };
493 
494 /* Page Request Queue depth */
495 #define PRQ_ORDER	4
496 #define PRQ_SIZE	(SZ_4K << PRQ_ORDER)
497 #define PRQ_RING_MASK	(PRQ_SIZE - 0x20)
498 #define PRQ_DEPTH	(PRQ_SIZE >> 5)
499 
500 struct dmar_pci_notify_info;
501 
502 #ifdef CONFIG_IRQ_REMAP
503 #define INTR_REMAP_TABLE_REG_SIZE	0xf
504 #define INTR_REMAP_TABLE_REG_SIZE_MASK  0xf
505 
506 #define INTR_REMAP_TABLE_ENTRIES	65536
507 
508 struct irq_domain;
509 
510 struct ir_table {
511 	struct irte *base;
512 	unsigned long *bitmap;
513 };
514 
515 void intel_irq_remap_add_device(struct dmar_pci_notify_info *info);
516 #else
517 static inline void
intel_irq_remap_add_device(struct dmar_pci_notify_info * info)518 intel_irq_remap_add_device(struct dmar_pci_notify_info *info) { }
519 #endif
520 
521 struct iommu_flush {
522 	void (*flush_context)(struct intel_iommu *iommu, u16 did, u16 sid,
523 			      u8 fm, u64 type);
524 	void (*flush_iotlb)(struct intel_iommu *iommu, u16 did, u64 addr,
525 			    unsigned int size_order, u64 type);
526 };
527 
528 enum {
529 	SR_DMAR_FECTL_REG,
530 	SR_DMAR_FEDATA_REG,
531 	SR_DMAR_FEADDR_REG,
532 	SR_DMAR_FEUADDR_REG,
533 	MAX_SR_DMAR_REGS
534 };
535 
536 #define VTD_FLAG_TRANS_PRE_ENABLED	(1 << 0)
537 #define VTD_FLAG_IRQ_REMAP_PRE_ENABLED	(1 << 1)
538 #define VTD_FLAG_SVM_CAPABLE		(1 << 2)
539 
540 #define sm_supported(iommu)	(intel_iommu_sm && ecap_smts((iommu)->ecap))
541 #define pasid_supported(iommu)	(sm_supported(iommu) &&			\
542 				 ecap_pasid((iommu)->ecap))
543 #define ssads_supported(iommu) (sm_supported(iommu) &&                 \
544 				ecap_slads((iommu)->ecap))
545 #define nested_supported(iommu)	(sm_supported(iommu) &&			\
546 				 ecap_nest((iommu)->ecap))
547 
548 struct pasid_entry;
549 struct pasid_state_entry;
550 struct page_req_dsc;
551 
552 /*
553  * 0: Present
554  * 1-11: Reserved
555  * 12-63: Context Ptr (12 - (haw-1))
556  * 64-127: Reserved
557  */
558 struct root_entry {
559 	u64     lo;
560 	u64     hi;
561 };
562 
563 /*
564  * low 64 bits:
565  * 0: present
566  * 1: fault processing disable
567  * 2-3: translation type
568  * 12-63: address space root
569  * high 64 bits:
570  * 0-2: address width
571  * 3-6: aval
572  * 8-23: domain id
573  */
574 struct context_entry {
575 	u64 lo;
576 	u64 hi;
577 };
578 
579 struct iommu_domain_info {
580 	struct intel_iommu *iommu;
581 	unsigned int refcnt;		/* Refcount of devices per iommu */
582 	u16 did;			/* Domain ids per IOMMU. Use u16 since
583 					 * domain ids are 16 bit wide according
584 					 * to VT-d spec, section 9.3 */
585 };
586 
587 /*
588  * We start simply by using a fixed size for the batched descriptors. This
589  * size is currently sufficient for our needs. Future improvements could
590  * involve dynamically allocating the batch buffer based on actual demand,
591  * allowing us to adjust the batch size for optimal performance in different
592  * scenarios.
593  */
594 #define QI_MAX_BATCHED_DESC_COUNT 16
595 struct qi_batch {
596 	struct qi_desc descs[QI_MAX_BATCHED_DESC_COUNT];
597 	unsigned int index;
598 };
599 
600 struct dmar_domain {
601 	int	nid;			/* node id */
602 	struct xarray iommu_array;	/* Attached IOMMU array */
603 
604 	u8 iommu_coherency: 1;		/* indicate coherency of iommu access */
605 	u8 force_snooping : 1;		/* Create IOPTEs with snoop control */
606 	u8 set_pte_snp:1;
607 	u8 use_first_level:1;		/* DMA translation for the domain goes
608 					 * through the first level page table,
609 					 * otherwise, goes through the second
610 					 * level.
611 					 */
612 	u8 dirty_tracking:1;		/* Dirty tracking is enabled */
613 	u8 nested_parent:1;		/* Has other domains nested on it */
614 	u8 has_mappings:1;		/* Has mappings configured through
615 					 * iommu_map() interface.
616 					 */
617 	u8 iotlb_sync_map:1;		/* Need to flush IOTLB cache or write
618 					 * buffer when creating mappings.
619 					 */
620 
621 	spinlock_t lock;		/* Protect device tracking lists */
622 	struct list_head devices;	/* all devices' list */
623 	struct list_head dev_pasids;	/* all attached pasids */
624 
625 	spinlock_t cache_lock;		/* Protect the cache tag list */
626 	struct list_head cache_tags;	/* Cache tag list */
627 	struct qi_batch *qi_batch;	/* Batched QI descriptors */
628 
629 	int		iommu_superpage;/* Level of superpages supported:
630 					   0 == 4KiB (no superpages), 1 == 2MiB,
631 					   2 == 1GiB, 3 == 512GiB, 4 == 1TiB */
632 	union {
633 		/* DMA remapping domain */
634 		struct {
635 			/* virtual address */
636 			struct dma_pte	*pgd;
637 			/* max guest address width */
638 			int		gaw;
639 			/*
640 			 * adjusted guest address width:
641 			 *   0: level 2 30-bit
642 			 *   1: level 3 39-bit
643 			 *   2: level 4 48-bit
644 			 *   3: level 5 57-bit
645 			 */
646 			int		agaw;
647 			/* maximum mapped address */
648 			u64		max_addr;
649 			/* Protect the s1_domains list */
650 			spinlock_t	s1_lock;
651 			/* Track s1_domains nested on this domain */
652 			struct list_head s1_domains;
653 		};
654 
655 		/* Nested user domain */
656 		struct {
657 			/* parent page table which the user domain is nested on */
658 			struct dmar_domain *s2_domain;
659 			/* page table attributes */
660 			struct iommu_hwpt_vtd_s1 s1_cfg;
661 			/* link to parent domain siblings */
662 			struct list_head s2_link;
663 		};
664 
665 		/* SVA domain */
666 		struct {
667 			struct mmu_notifier notifier;
668 		};
669 	};
670 
671 	struct iommu_domain domain;	/* generic domain data structure for
672 					   iommu core */
673 };
674 
675 /*
676  * In theory, the VT-d 4.0 spec can support up to 2 ^ 16 counters.
677  * But in practice, there are only 14 counters for the existing
678  * platform. Setting the max number of counters to 64 should be good
679  * enough for a long time. Also, supporting more than 64 counters
680  * requires more extras, e.g., extra freeze and overflow registers,
681  * which is not necessary for now.
682  */
683 #define IOMMU_PMU_IDX_MAX		64
684 
685 struct iommu_pmu {
686 	struct intel_iommu	*iommu;
687 	u32			num_cntr;	/* Number of counters */
688 	u32			num_eg;		/* Number of event group */
689 	u32			cntr_width;	/* Counter width */
690 	u32			cntr_stride;	/* Counter Stride */
691 	u32			filter;		/* Bitmask of filter support */
692 	void __iomem		*base;		/* the PerfMon base address */
693 	void __iomem		*cfg_reg;	/* counter configuration base address */
694 	void __iomem		*cntr_reg;	/* counter 0 address*/
695 	void __iomem		*overflow;	/* overflow status register */
696 
697 	u64			*evcap;		/* Indicates all supported events */
698 	u32			**cntr_evcap;	/* Supported events of each counter. */
699 
700 	struct pmu		pmu;
701 	DECLARE_BITMAP(used_mask, IOMMU_PMU_IDX_MAX);
702 	struct perf_event	*event_list[IOMMU_PMU_IDX_MAX];
703 	unsigned char		irq_name[16];
704 };
705 
706 #define IOMMU_IRQ_ID_OFFSET_PRQ		(DMAR_UNITS_SUPPORTED)
707 #define IOMMU_IRQ_ID_OFFSET_PERF	(2 * DMAR_UNITS_SUPPORTED)
708 
709 struct intel_iommu {
710 	void __iomem	*reg; /* Pointer to hardware regs, virtual addr */
711 	u64 		reg_phys; /* physical address of hw register set */
712 	u64		reg_size; /* size of hw register set */
713 	u64		cap;
714 	u64		ecap;
715 	u64		vccap;
716 	u64		ecmdcap[DMA_MAX_NUM_ECMDCAP];
717 	u32		gcmd; /* Holds TE, EAFL. Don't need SRTP, SFL, WBF */
718 	raw_spinlock_t	register_lock; /* protect register handling */
719 	int		seq_id;	/* sequence id of the iommu */
720 	int		agaw; /* agaw of this iommu */
721 	int		msagaw; /* max sagaw of this iommu */
722 	unsigned int	irq, pr_irq, perf_irq;
723 	u16		segment;     /* PCI segment# */
724 	unsigned char	name[16];    /* Device Name */
725 
726 #ifdef CONFIG_INTEL_IOMMU
727 	/* mutex to protect domain_ida */
728 	struct mutex	did_lock;
729 	struct ida	domain_ida; /* domain id allocator */
730 	unsigned long	*copied_tables; /* bitmap of copied tables */
731 	spinlock_t	lock; /* protect context, domain ids */
732 	struct root_entry *root_entry; /* virtual address */
733 
734 	struct iommu_flush flush;
735 #endif
736 	struct page_req_dsc *prq;
737 	unsigned char prq_name[16];    /* Name for PRQ interrupt */
738 	unsigned long prq_seq_number;
739 	struct completion prq_complete;
740 	struct iopf_queue *iopf_queue;
741 	unsigned char iopfq_name[16];
742 	/* Synchronization between fault report and iommu device release. */
743 	struct mutex iopf_lock;
744 	struct q_inval  *qi;            /* Queued invalidation info */
745 	u32 iommu_state[MAX_SR_DMAR_REGS]; /* Store iommu states between suspend and resume.*/
746 
747 	/* rb tree for all probed devices */
748 	struct rb_root device_rbtree;
749 	/* protect the device_rbtree */
750 	spinlock_t device_rbtree_lock;
751 
752 #ifdef CONFIG_IRQ_REMAP
753 	struct ir_table *ir_table;	/* Interrupt remapping info */
754 	struct irq_domain *ir_domain;
755 #endif
756 	struct iommu_device iommu;  /* IOMMU core code handle */
757 	int		node;
758 	u32		flags;      /* Software defined flags */
759 
760 	struct dmar_drhd_unit *drhd;
761 	void *perf_statistic;
762 
763 	struct iommu_pmu *pmu;
764 };
765 
766 /* PCI domain-device relationship */
767 struct device_domain_info {
768 	struct list_head link;	/* link to domain siblings */
769 	u32 segment;		/* PCI segment number */
770 	u8 bus;			/* PCI bus number */
771 	u8 devfn;		/* PCI devfn number */
772 	u16 pfsid;		/* SRIOV physical function source ID */
773 	u8 pasid_supported:3;
774 	u8 pasid_enabled:1;
775 	u8 pri_supported:1;
776 	u8 pri_enabled:1;
777 	u8 ats_supported:1;
778 	u8 ats_enabled:1;
779 	u8 dtlb_extra_inval:1;	/* Quirk for devices need extra flush */
780 	u8 domain_attached:1;	/* Device has domain attached */
781 	u8 ats_qdep;
782 	unsigned int iopf_refcount;
783 	struct device *dev; /* it's NULL for PCIe-to-PCI bridge */
784 	struct intel_iommu *iommu; /* IOMMU used by this device */
785 	struct dmar_domain *domain; /* pointer to domain */
786 	struct pasid_table *pasid_table; /* pasid table */
787 	/* device tracking node(lookup by PCI RID) */
788 	struct rb_node node;
789 #ifdef CONFIG_INTEL_IOMMU_DEBUGFS
790 	struct dentry *debugfs_dentry; /* pointer to device directory dentry */
791 #endif
792 };
793 
794 struct dev_pasid_info {
795 	struct list_head link_domain;	/* link to domain siblings */
796 	struct device *dev;
797 	ioasid_t pasid;
798 #ifdef CONFIG_INTEL_IOMMU_DEBUGFS
799 	struct dentry *debugfs_dentry; /* pointer to pasid directory dentry */
800 #endif
801 };
802 
__iommu_flush_cache(struct intel_iommu * iommu,void * addr,int size)803 static inline void __iommu_flush_cache(
804 	struct intel_iommu *iommu, void *addr, int size)
805 {
806 	if (!ecap_coherent(iommu->ecap))
807 		clflush_cache_range(addr, size);
808 }
809 
810 /* Convert generic struct iommu_domain to private struct dmar_domain */
to_dmar_domain(struct iommu_domain * dom)811 static inline struct dmar_domain *to_dmar_domain(struct iommu_domain *dom)
812 {
813 	return container_of(dom, struct dmar_domain, domain);
814 }
815 
816 /*
817  * Domain ID 0 and 1 are reserved:
818  *
819  * If Caching mode is set, then invalid translations are tagged
820  * with domain-id 0, hence we need to pre-allocate it. We also
821  * use domain-id 0 as a marker for non-allocated domain-id, so
822  * make sure it is not used for a real domain.
823  *
824  * Vt-d spec rev3.0 (section 6.2.3.1) requires that each pasid
825  * entry for first-level or pass-through translation modes should
826  * be programmed with a domain id different from those used for
827  * second-level or nested translation. We reserve a domain id for
828  * this purpose. This domain id is also used for identity domain
829  * in legacy mode.
830  */
831 #define FLPT_DEFAULT_DID		1
832 #define IDA_START_DID			2
833 
834 /* Retrieve the domain ID which has allocated to the domain */
835 static inline u16
domain_id_iommu(struct dmar_domain * domain,struct intel_iommu * iommu)836 domain_id_iommu(struct dmar_domain *domain, struct intel_iommu *iommu)
837 {
838 	struct iommu_domain_info *info =
839 			xa_load(&domain->iommu_array, iommu->seq_id);
840 
841 	return info->did;
842 }
843 
844 static inline u16
iommu_domain_did(struct iommu_domain * domain,struct intel_iommu * iommu)845 iommu_domain_did(struct iommu_domain *domain, struct intel_iommu *iommu)
846 {
847 	if (domain->type == IOMMU_DOMAIN_SVA ||
848 	    domain->type == IOMMU_DOMAIN_IDENTITY)
849 		return FLPT_DEFAULT_DID;
850 	return domain_id_iommu(to_dmar_domain(domain), iommu);
851 }
852 
dev_is_real_dma_subdevice(struct device * dev)853 static inline bool dev_is_real_dma_subdevice(struct device *dev)
854 {
855 	return dev && dev_is_pci(dev) &&
856 	       pci_real_dma_dev(to_pci_dev(dev)) != to_pci_dev(dev);
857 }
858 
859 /*
860  * 0: readable
861  * 1: writable
862  * 2-6: reserved
863  * 7: super page
864  * 8-10: available
865  * 11: snoop behavior
866  * 12-63: Host physical address
867  */
868 struct dma_pte {
869 	u64 val;
870 };
871 
dma_clear_pte(struct dma_pte * pte)872 static inline void dma_clear_pte(struct dma_pte *pte)
873 {
874 	pte->val = 0;
875 }
876 
dma_pte_addr(struct dma_pte * pte)877 static inline u64 dma_pte_addr(struct dma_pte *pte)
878 {
879 #ifdef CONFIG_64BIT
880 	return pte->val & VTD_PAGE_MASK;
881 #else
882 	/* Must have a full atomic 64-bit read */
883 	return  __cmpxchg64(&pte->val, 0ULL, 0ULL) & VTD_PAGE_MASK;
884 #endif
885 }
886 
dma_pte_present(struct dma_pte * pte)887 static inline bool dma_pte_present(struct dma_pte *pte)
888 {
889 	return (pte->val & 3) != 0;
890 }
891 
dma_sl_pte_test_and_clear_dirty(struct dma_pte * pte,unsigned long flags)892 static inline bool dma_sl_pte_test_and_clear_dirty(struct dma_pte *pte,
893 						   unsigned long flags)
894 {
895 	if (flags & IOMMU_DIRTY_NO_CLEAR)
896 		return (pte->val & DMA_SL_PTE_DIRTY) != 0;
897 
898 	return test_and_clear_bit(DMA_SL_PTE_DIRTY_BIT,
899 				  (unsigned long *)&pte->val);
900 }
901 
dma_pte_superpage(struct dma_pte * pte)902 static inline bool dma_pte_superpage(struct dma_pte *pte)
903 {
904 	return (pte->val & DMA_PTE_LARGE_PAGE);
905 }
906 
first_pte_in_page(struct dma_pte * pte)907 static inline bool first_pte_in_page(struct dma_pte *pte)
908 {
909 	return IS_ALIGNED((unsigned long)pte, VTD_PAGE_SIZE);
910 }
911 
nr_pte_to_next_page(struct dma_pte * pte)912 static inline int nr_pte_to_next_page(struct dma_pte *pte)
913 {
914 	return first_pte_in_page(pte) ? BIT_ULL(VTD_STRIDE_SHIFT) :
915 		(struct dma_pte *)ALIGN((unsigned long)pte, VTD_PAGE_SIZE) - pte;
916 }
917 
context_present(struct context_entry * context)918 static inline bool context_present(struct context_entry *context)
919 {
920 	return (context->lo & 1);
921 }
922 
923 #define LEVEL_STRIDE		(9)
924 #define LEVEL_MASK		(((u64)1 << LEVEL_STRIDE) - 1)
925 #define MAX_AGAW_WIDTH		(64)
926 #define MAX_AGAW_PFN_WIDTH	(MAX_AGAW_WIDTH - VTD_PAGE_SHIFT)
927 
agaw_to_level(int agaw)928 static inline int agaw_to_level(int agaw)
929 {
930 	return agaw + 2;
931 }
932 
agaw_to_width(int agaw)933 static inline int agaw_to_width(int agaw)
934 {
935 	return min_t(int, 30 + agaw * LEVEL_STRIDE, MAX_AGAW_WIDTH);
936 }
937 
width_to_agaw(int width)938 static inline int width_to_agaw(int width)
939 {
940 	return DIV_ROUND_UP(width - 30, LEVEL_STRIDE);
941 }
942 
level_to_offset_bits(int level)943 static inline unsigned int level_to_offset_bits(int level)
944 {
945 	return (level - 1) * LEVEL_STRIDE;
946 }
947 
pfn_level_offset(u64 pfn,int level)948 static inline int pfn_level_offset(u64 pfn, int level)
949 {
950 	return (pfn >> level_to_offset_bits(level)) & LEVEL_MASK;
951 }
952 
level_mask(int level)953 static inline u64 level_mask(int level)
954 {
955 	return -1ULL << level_to_offset_bits(level);
956 }
957 
level_size(int level)958 static inline u64 level_size(int level)
959 {
960 	return 1ULL << level_to_offset_bits(level);
961 }
962 
align_to_level(u64 pfn,int level)963 static inline u64 align_to_level(u64 pfn, int level)
964 {
965 	return (pfn + level_size(level) - 1) & level_mask(level);
966 }
967 
lvl_to_nr_pages(unsigned int lvl)968 static inline unsigned long lvl_to_nr_pages(unsigned int lvl)
969 {
970 	return 1UL << min_t(int, (lvl - 1) * LEVEL_STRIDE, MAX_AGAW_PFN_WIDTH);
971 }
972 
context_set_present(struct context_entry * context)973 static inline void context_set_present(struct context_entry *context)
974 {
975 	context->lo |= 1;
976 }
977 
context_set_fault_enable(struct context_entry * context)978 static inline void context_set_fault_enable(struct context_entry *context)
979 {
980 	context->lo &= (((u64)-1) << 2) | 1;
981 }
982 
context_set_translation_type(struct context_entry * context,unsigned long value)983 static inline void context_set_translation_type(struct context_entry *context,
984 						unsigned long value)
985 {
986 	context->lo &= (((u64)-1) << 4) | 3;
987 	context->lo |= (value & 3) << 2;
988 }
989 
context_set_address_root(struct context_entry * context,unsigned long value)990 static inline void context_set_address_root(struct context_entry *context,
991 					    unsigned long value)
992 {
993 	context->lo &= ~VTD_PAGE_MASK;
994 	context->lo |= value & VTD_PAGE_MASK;
995 }
996 
context_set_address_width(struct context_entry * context,unsigned long value)997 static inline void context_set_address_width(struct context_entry *context,
998 					     unsigned long value)
999 {
1000 	context->hi |= value & 7;
1001 }
1002 
context_set_domain_id(struct context_entry * context,unsigned long value)1003 static inline void context_set_domain_id(struct context_entry *context,
1004 					 unsigned long value)
1005 {
1006 	context->hi |= (value & ((1 << 16) - 1)) << 8;
1007 }
1008 
context_set_pasid(struct context_entry * context)1009 static inline void context_set_pasid(struct context_entry *context)
1010 {
1011 	context->lo |= CONTEXT_PASIDE;
1012 }
1013 
context_domain_id(struct context_entry * c)1014 static inline int context_domain_id(struct context_entry *c)
1015 {
1016 	return((c->hi >> 8) & 0xffff);
1017 }
1018 
context_clear_entry(struct context_entry * context)1019 static inline void context_clear_entry(struct context_entry *context)
1020 {
1021 	context->lo = 0;
1022 	context->hi = 0;
1023 }
1024 
1025 #ifdef CONFIG_INTEL_IOMMU
context_copied(struct intel_iommu * iommu,u8 bus,u8 devfn)1026 static inline bool context_copied(struct intel_iommu *iommu, u8 bus, u8 devfn)
1027 {
1028 	if (!iommu->copied_tables)
1029 		return false;
1030 
1031 	return test_bit(((long)bus << 8) | devfn, iommu->copied_tables);
1032 }
1033 
1034 static inline void
set_context_copied(struct intel_iommu * iommu,u8 bus,u8 devfn)1035 set_context_copied(struct intel_iommu *iommu, u8 bus, u8 devfn)
1036 {
1037 	set_bit(((long)bus << 8) | devfn, iommu->copied_tables);
1038 }
1039 
1040 static inline void
clear_context_copied(struct intel_iommu * iommu,u8 bus,u8 devfn)1041 clear_context_copied(struct intel_iommu *iommu, u8 bus, u8 devfn)
1042 {
1043 	clear_bit(((long)bus << 8) | devfn, iommu->copied_tables);
1044 }
1045 #endif /* CONFIG_INTEL_IOMMU */
1046 
1047 /*
1048  * Set the RID_PASID field of a scalable mode context entry. The
1049  * IOMMU hardware will use the PASID value set in this field for
1050  * DMA translations of DMA requests without PASID.
1051  */
1052 static inline void
context_set_sm_rid2pasid(struct context_entry * context,unsigned long pasid)1053 context_set_sm_rid2pasid(struct context_entry *context, unsigned long pasid)
1054 {
1055 	context->hi |= pasid & ((1 << 20) - 1);
1056 }
1057 
1058 /*
1059  * Set the DTE(Device-TLB Enable) field of a scalable mode context
1060  * entry.
1061  */
context_set_sm_dte(struct context_entry * context)1062 static inline void context_set_sm_dte(struct context_entry *context)
1063 {
1064 	context->lo |= BIT_ULL(2);
1065 }
1066 
1067 /*
1068  * Set the PRE(Page Request Enable) field of a scalable mode context
1069  * entry.
1070  */
context_set_sm_pre(struct context_entry * context)1071 static inline void context_set_sm_pre(struct context_entry *context)
1072 {
1073 	context->lo |= BIT_ULL(4);
1074 }
1075 
1076 /*
1077  * Clear the PRE(Page Request Enable) field of a scalable mode context
1078  * entry.
1079  */
context_clear_sm_pre(struct context_entry * context)1080 static inline void context_clear_sm_pre(struct context_entry *context)
1081 {
1082 	context->lo &= ~BIT_ULL(4);
1083 }
1084 
1085 /* Returns a number of VTD pages, but aligned to MM page size */
aligned_nrpages(unsigned long host_addr,size_t size)1086 static inline unsigned long aligned_nrpages(unsigned long host_addr, size_t size)
1087 {
1088 	host_addr &= ~PAGE_MASK;
1089 	return PAGE_ALIGN(host_addr + size) >> VTD_PAGE_SHIFT;
1090 }
1091 
1092 /* Return a size from number of VTD pages. */
nrpages_to_size(unsigned long npages)1093 static inline unsigned long nrpages_to_size(unsigned long npages)
1094 {
1095 	return npages << VTD_PAGE_SHIFT;
1096 }
1097 
qi_desc_iotlb(struct intel_iommu * iommu,u16 did,u64 addr,unsigned int size_order,u64 type,struct qi_desc * desc)1098 static inline void qi_desc_iotlb(struct intel_iommu *iommu, u16 did, u64 addr,
1099 				 unsigned int size_order, u64 type,
1100 				 struct qi_desc *desc)
1101 {
1102 	u8 dw = 0, dr = 0;
1103 	int ih = 0;
1104 
1105 	if (cap_write_drain(iommu->cap))
1106 		dw = 1;
1107 
1108 	if (cap_read_drain(iommu->cap))
1109 		dr = 1;
1110 
1111 	desc->qw0 = QI_IOTLB_DID(did) | QI_IOTLB_DR(dr) | QI_IOTLB_DW(dw)
1112 		| QI_IOTLB_GRAN(type) | QI_IOTLB_TYPE;
1113 	desc->qw1 = QI_IOTLB_ADDR(addr) | QI_IOTLB_IH(ih)
1114 		| QI_IOTLB_AM(size_order);
1115 	desc->qw2 = 0;
1116 	desc->qw3 = 0;
1117 }
1118 
qi_desc_dev_iotlb(u16 sid,u16 pfsid,u16 qdep,u64 addr,unsigned int mask,struct qi_desc * desc)1119 static inline void qi_desc_dev_iotlb(u16 sid, u16 pfsid, u16 qdep, u64 addr,
1120 				     unsigned int mask, struct qi_desc *desc)
1121 {
1122 	if (mask) {
1123 		addr |= (1ULL << (VTD_PAGE_SHIFT + mask - 1)) - 1;
1124 		desc->qw1 = QI_DEV_IOTLB_ADDR(addr) | QI_DEV_IOTLB_SIZE;
1125 	} else {
1126 		desc->qw1 = QI_DEV_IOTLB_ADDR(addr);
1127 	}
1128 
1129 	if (qdep >= QI_DEV_IOTLB_MAX_INVS)
1130 		qdep = 0;
1131 
1132 	desc->qw0 = QI_DEV_IOTLB_SID(sid) | QI_DEV_IOTLB_QDEP(qdep) |
1133 		   QI_DIOTLB_TYPE | QI_DEV_IOTLB_PFSID(pfsid);
1134 	desc->qw2 = 0;
1135 	desc->qw3 = 0;
1136 }
1137 
qi_desc_piotlb(u16 did,u32 pasid,u64 addr,unsigned long npages,bool ih,struct qi_desc * desc)1138 static inline void qi_desc_piotlb(u16 did, u32 pasid, u64 addr,
1139 				  unsigned long npages, bool ih,
1140 				  struct qi_desc *desc)
1141 {
1142 	if (npages == -1) {
1143 		desc->qw0 = QI_EIOTLB_PASID(pasid) |
1144 				QI_EIOTLB_DID(did) |
1145 				QI_EIOTLB_GRAN(QI_GRAN_NONG_PASID) |
1146 				QI_EIOTLB_TYPE;
1147 		desc->qw1 = 0;
1148 	} else {
1149 		int mask = ilog2(__roundup_pow_of_two(npages));
1150 		unsigned long align = (1ULL << (VTD_PAGE_SHIFT + mask));
1151 
1152 		if (WARN_ON_ONCE(!IS_ALIGNED(addr, align)))
1153 			addr = ALIGN_DOWN(addr, align);
1154 
1155 		desc->qw0 = QI_EIOTLB_PASID(pasid) |
1156 				QI_EIOTLB_DID(did) |
1157 				QI_EIOTLB_GRAN(QI_GRAN_PSI_PASID) |
1158 				QI_EIOTLB_TYPE;
1159 		desc->qw1 = QI_EIOTLB_ADDR(addr) |
1160 				QI_EIOTLB_IH(ih) |
1161 				QI_EIOTLB_AM(mask);
1162 	}
1163 }
1164 
qi_desc_dev_iotlb_pasid(u16 sid,u16 pfsid,u32 pasid,u16 qdep,u64 addr,unsigned int size_order,struct qi_desc * desc)1165 static inline void qi_desc_dev_iotlb_pasid(u16 sid, u16 pfsid, u32 pasid,
1166 					   u16 qdep, u64 addr,
1167 					   unsigned int size_order,
1168 					   struct qi_desc *desc)
1169 {
1170 	unsigned long mask = 1UL << (VTD_PAGE_SHIFT + size_order - 1);
1171 
1172 	desc->qw0 = QI_DEV_EIOTLB_PASID(pasid) | QI_DEV_EIOTLB_SID(sid) |
1173 		QI_DEV_EIOTLB_QDEP(qdep) | QI_DEIOTLB_TYPE |
1174 		QI_DEV_IOTLB_PFSID(pfsid);
1175 
1176 	/*
1177 	 * If S bit is 0, we only flush a single page. If S bit is set,
1178 	 * The least significant zero bit indicates the invalidation address
1179 	 * range. VT-d spec 6.5.2.6.
1180 	 * e.g. address bit 12[0] indicates 8KB, 13[0] indicates 16KB.
1181 	 * size order = 0 is PAGE_SIZE 4KB
1182 	 * Max Invs Pending (MIP) is set to 0 for now until we have DIT in
1183 	 * ECAP.
1184 	 */
1185 	if (!IS_ALIGNED(addr, VTD_PAGE_SIZE << size_order))
1186 		pr_warn_ratelimited("Invalidate non-aligned address %llx, order %d\n",
1187 				    addr, size_order);
1188 
1189 	/* Take page address */
1190 	desc->qw1 = QI_DEV_EIOTLB_ADDR(addr);
1191 
1192 	if (size_order) {
1193 		/*
1194 		 * Existing 0s in address below size_order may be the least
1195 		 * significant bit, we must set them to 1s to avoid having
1196 		 * smaller size than desired.
1197 		 */
1198 		desc->qw1 |= GENMASK_ULL(size_order + VTD_PAGE_SHIFT - 1,
1199 					VTD_PAGE_SHIFT);
1200 		/* Clear size_order bit to indicate size */
1201 		desc->qw1 &= ~mask;
1202 		/* Set the S bit to indicate flushing more than 1 page */
1203 		desc->qw1 |= QI_DEV_EIOTLB_SIZE;
1204 	}
1205 }
1206 
1207 /* Convert value to context PASID directory size field coding. */
1208 #define context_pdts(pds)	(((pds) & 0x7) << 9)
1209 
1210 struct dmar_drhd_unit *dmar_find_matched_drhd_unit(struct pci_dev *dev);
1211 
1212 int dmar_enable_qi(struct intel_iommu *iommu);
1213 void dmar_disable_qi(struct intel_iommu *iommu);
1214 int dmar_reenable_qi(struct intel_iommu *iommu);
1215 void qi_global_iec(struct intel_iommu *iommu);
1216 
1217 void qi_flush_context(struct intel_iommu *iommu, u16 did,
1218 		      u16 sid, u8 fm, u64 type);
1219 void qi_flush_iotlb(struct intel_iommu *iommu, u16 did, u64 addr,
1220 		    unsigned int size_order, u64 type);
1221 void qi_flush_dev_iotlb(struct intel_iommu *iommu, u16 sid, u16 pfsid,
1222 			u16 qdep, u64 addr, unsigned mask);
1223 
1224 void qi_flush_piotlb(struct intel_iommu *iommu, u16 did, u32 pasid, u64 addr,
1225 		     unsigned long npages, bool ih);
1226 
1227 void qi_flush_dev_iotlb_pasid(struct intel_iommu *iommu, u16 sid, u16 pfsid,
1228 			      u32 pasid, u16 qdep, u64 addr,
1229 			      unsigned int size_order);
1230 void quirk_extra_dev_tlb_flush(struct device_domain_info *info,
1231 			       unsigned long address, unsigned long pages,
1232 			       u32 pasid, u16 qdep);
1233 void qi_flush_pasid_cache(struct intel_iommu *iommu, u16 did, u64 granu,
1234 			  u32 pasid);
1235 
1236 int qi_submit_sync(struct intel_iommu *iommu, struct qi_desc *desc,
1237 		   unsigned int count, unsigned long options);
1238 
1239 void __iommu_flush_iotlb(struct intel_iommu *iommu, u16 did, u64 addr,
1240 			 unsigned int size_order, u64 type);
1241 /*
1242  * Options used in qi_submit_sync:
1243  * QI_OPT_WAIT_DRAIN - Wait for PRQ drain completion, spec 6.5.2.8.
1244  */
1245 #define QI_OPT_WAIT_DRAIN		BIT(0)
1246 
1247 int domain_attach_iommu(struct dmar_domain *domain, struct intel_iommu *iommu);
1248 void domain_detach_iommu(struct dmar_domain *domain, struct intel_iommu *iommu);
1249 void device_block_translation(struct device *dev);
1250 int paging_domain_compatible(struct iommu_domain *domain, struct device *dev);
1251 
1252 struct dev_pasid_info *
1253 domain_add_dev_pasid(struct iommu_domain *domain,
1254 		     struct device *dev, ioasid_t pasid);
1255 void domain_remove_dev_pasid(struct iommu_domain *domain,
1256 			     struct device *dev, ioasid_t pasid);
1257 
1258 int __domain_setup_first_level(struct intel_iommu *iommu, struct device *dev,
1259 			       ioasid_t pasid, u16 did, phys_addr_t fsptptr,
1260 			       int flags, struct iommu_domain *old);
1261 
1262 int dmar_ir_support(void);
1263 
1264 void iommu_flush_write_buffer(struct intel_iommu *iommu);
1265 struct iommu_domain *
1266 intel_iommu_domain_alloc_nested(struct device *dev, struct iommu_domain *parent,
1267 				u32 flags,
1268 				const struct iommu_user_data *user_data);
1269 struct device *device_rbtree_find(struct intel_iommu *iommu, u16 rid);
1270 
1271 enum cache_tag_type {
1272 	CACHE_TAG_IOTLB,
1273 	CACHE_TAG_DEVTLB,
1274 	CACHE_TAG_NESTING_IOTLB,
1275 	CACHE_TAG_NESTING_DEVTLB,
1276 };
1277 
1278 struct cache_tag {
1279 	struct list_head node;
1280 	enum cache_tag_type type;
1281 	struct intel_iommu *iommu;
1282 	/*
1283 	 * The @dev field represents the location of the cache. For IOTLB, it
1284 	 * resides on the IOMMU hardware. @dev stores the device pointer to
1285 	 * the IOMMU hardware. For DevTLB, it locates in the PCIe endpoint.
1286 	 * @dev stores the device pointer to that endpoint.
1287 	 */
1288 	struct device *dev;
1289 	u16 domain_id;
1290 	ioasid_t pasid;
1291 	unsigned int users;
1292 };
1293 
1294 int cache_tag_assign(struct dmar_domain *domain, u16 did, struct device *dev,
1295 		     ioasid_t pasid, enum cache_tag_type type);
1296 int cache_tag_assign_domain(struct dmar_domain *domain,
1297 			    struct device *dev, ioasid_t pasid);
1298 void cache_tag_unassign_domain(struct dmar_domain *domain,
1299 			       struct device *dev, ioasid_t pasid);
1300 void cache_tag_flush_range(struct dmar_domain *domain, unsigned long start,
1301 			   unsigned long end, int ih);
1302 void cache_tag_flush_all(struct dmar_domain *domain);
1303 void cache_tag_flush_range_np(struct dmar_domain *domain, unsigned long start,
1304 			      unsigned long end);
1305 
1306 void intel_context_flush_no_pasid(struct device_domain_info *info,
1307 				  struct context_entry *context, u16 did);
1308 
1309 int intel_iommu_enable_prq(struct intel_iommu *iommu);
1310 int intel_iommu_finish_prq(struct intel_iommu *iommu);
1311 void intel_iommu_page_response(struct device *dev, struct iopf_fault *evt,
1312 			       struct iommu_page_response *msg);
1313 void intel_iommu_drain_pasid_prq(struct device *dev, u32 pasid);
1314 
1315 int intel_iommu_enable_iopf(struct device *dev);
1316 void intel_iommu_disable_iopf(struct device *dev);
1317 
iopf_for_domain_set(struct iommu_domain * domain,struct device * dev)1318 static inline int iopf_for_domain_set(struct iommu_domain *domain,
1319 				      struct device *dev)
1320 {
1321 	if (!domain || !domain->iopf_handler)
1322 		return 0;
1323 
1324 	return intel_iommu_enable_iopf(dev);
1325 }
1326 
iopf_for_domain_remove(struct iommu_domain * domain,struct device * dev)1327 static inline void iopf_for_domain_remove(struct iommu_domain *domain,
1328 					  struct device *dev)
1329 {
1330 	if (!domain || !domain->iopf_handler)
1331 		return;
1332 
1333 	intel_iommu_disable_iopf(dev);
1334 }
1335 
iopf_for_domain_replace(struct iommu_domain * new,struct iommu_domain * old,struct device * dev)1336 static inline int iopf_for_domain_replace(struct iommu_domain *new,
1337 					  struct iommu_domain *old,
1338 					  struct device *dev)
1339 {
1340 	int ret;
1341 
1342 	ret = iopf_for_domain_set(new, dev);
1343 	if (ret)
1344 		return ret;
1345 
1346 	iopf_for_domain_remove(old, dev);
1347 
1348 	return 0;
1349 }
1350 
1351 #ifdef CONFIG_INTEL_IOMMU_SVM
1352 void intel_svm_check(struct intel_iommu *iommu);
1353 struct iommu_domain *intel_svm_domain_alloc(struct device *dev,
1354 					    struct mm_struct *mm);
1355 #else
intel_svm_check(struct intel_iommu * iommu)1356 static inline void intel_svm_check(struct intel_iommu *iommu) {}
intel_svm_domain_alloc(struct device * dev,struct mm_struct * mm)1357 static inline struct iommu_domain *intel_svm_domain_alloc(struct device *dev,
1358 							  struct mm_struct *mm)
1359 {
1360 	return ERR_PTR(-ENODEV);
1361 }
1362 #endif
1363 
1364 #ifdef CONFIG_INTEL_IOMMU_DEBUGFS
1365 void intel_iommu_debugfs_init(void);
1366 void intel_iommu_debugfs_create_dev(struct device_domain_info *info);
1367 void intel_iommu_debugfs_remove_dev(struct device_domain_info *info);
1368 void intel_iommu_debugfs_create_dev_pasid(struct dev_pasid_info *dev_pasid);
1369 void intel_iommu_debugfs_remove_dev_pasid(struct dev_pasid_info *dev_pasid);
1370 #else
intel_iommu_debugfs_init(void)1371 static inline void intel_iommu_debugfs_init(void) {}
intel_iommu_debugfs_create_dev(struct device_domain_info * info)1372 static inline void intel_iommu_debugfs_create_dev(struct device_domain_info *info) {}
intel_iommu_debugfs_remove_dev(struct device_domain_info * info)1373 static inline void intel_iommu_debugfs_remove_dev(struct device_domain_info *info) {}
intel_iommu_debugfs_create_dev_pasid(struct dev_pasid_info * dev_pasid)1374 static inline void intel_iommu_debugfs_create_dev_pasid(struct dev_pasid_info *dev_pasid) {}
intel_iommu_debugfs_remove_dev_pasid(struct dev_pasid_info * dev_pasid)1375 static inline void intel_iommu_debugfs_remove_dev_pasid(struct dev_pasid_info *dev_pasid) {}
1376 #endif /* CONFIG_INTEL_IOMMU_DEBUGFS */
1377 
1378 extern const struct attribute_group *intel_iommu_groups[];
1379 struct context_entry *iommu_context_addr(struct intel_iommu *iommu, u8 bus,
1380 					 u8 devfn, int alloc);
1381 
1382 extern const struct iommu_ops intel_iommu_ops;
1383 extern const struct iommu_domain_ops intel_fs_paging_domain_ops;
1384 extern const struct iommu_domain_ops intel_ss_paging_domain_ops;
1385 
intel_domain_is_fs_paging(struct dmar_domain * domain)1386 static inline bool intel_domain_is_fs_paging(struct dmar_domain *domain)
1387 {
1388 	return domain->domain.ops == &intel_fs_paging_domain_ops;
1389 }
1390 
intel_domain_is_ss_paging(struct dmar_domain * domain)1391 static inline bool intel_domain_is_ss_paging(struct dmar_domain *domain)
1392 {
1393 	return domain->domain.ops == &intel_ss_paging_domain_ops;
1394 }
1395 
1396 #ifdef CONFIG_INTEL_IOMMU
1397 extern int intel_iommu_sm;
1398 int iommu_calculate_agaw(struct intel_iommu *iommu);
1399 int iommu_calculate_max_sagaw(struct intel_iommu *iommu);
1400 int ecmd_submit_sync(struct intel_iommu *iommu, u8 ecmd, u64 oa, u64 ob);
1401 
ecmd_has_pmu_essential(struct intel_iommu * iommu)1402 static inline bool ecmd_has_pmu_essential(struct intel_iommu *iommu)
1403 {
1404 	return (iommu->ecmdcap[DMA_ECMD_ECCAP3] & DMA_ECMD_ECCAP3_ESSENTIAL) ==
1405 		DMA_ECMD_ECCAP3_ESSENTIAL;
1406 }
1407 
1408 extern int dmar_disabled;
1409 extern int intel_iommu_enabled;
1410 #else
iommu_calculate_agaw(struct intel_iommu * iommu)1411 static inline int iommu_calculate_agaw(struct intel_iommu *iommu)
1412 {
1413 	return 0;
1414 }
iommu_calculate_max_sagaw(struct intel_iommu * iommu)1415 static inline int iommu_calculate_max_sagaw(struct intel_iommu *iommu)
1416 {
1417 	return 0;
1418 }
1419 #define dmar_disabled	(1)
1420 #define intel_iommu_enabled (0)
1421 #define intel_iommu_sm (0)
1422 #endif
1423 
decode_prq_descriptor(char * str,size_t size,u64 dw0,u64 dw1,u64 dw2,u64 dw3)1424 static inline const char *decode_prq_descriptor(char *str, size_t size,
1425 		u64 dw0, u64 dw1, u64 dw2, u64 dw3)
1426 {
1427 	char *buf = str;
1428 	int bytes;
1429 
1430 	bytes = snprintf(buf, size,
1431 			 "rid=0x%llx addr=0x%llx %c%c%c%c%c pasid=0x%llx index=0x%llx",
1432 			 FIELD_GET(GENMASK_ULL(31, 16), dw0),
1433 			 FIELD_GET(GENMASK_ULL(63, 12), dw1),
1434 			 dw1 & BIT_ULL(0) ? 'r' : '-',
1435 			 dw1 & BIT_ULL(1) ? 'w' : '-',
1436 			 dw0 & BIT_ULL(52) ? 'x' : '-',
1437 			 dw0 & BIT_ULL(53) ? 'p' : '-',
1438 			 dw1 & BIT_ULL(2) ? 'l' : '-',
1439 			 FIELD_GET(GENMASK_ULL(51, 32), dw0),
1440 			 FIELD_GET(GENMASK_ULL(11, 3), dw1));
1441 
1442 	/* Private Data */
1443 	if (dw0 & BIT_ULL(9)) {
1444 		size -= bytes;
1445 		buf += bytes;
1446 		snprintf(buf, size, " private=0x%llx/0x%llx\n", dw2, dw3);
1447 	}
1448 
1449 	return str;
1450 }
1451 
1452 #endif
1453