x86/amd-iommu: Add passthrough mode initialization functions
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / arch / x86 / include / asm / amd_iommu_types.h
CommitLineData
8d283c35
JR
1/*
2 * Copyright (C) 2007-2008 Advanced Micro Devices, Inc.
3 * Author: Joerg Roedel <joerg.roedel@amd.com>
4 * Leo Duran <leo.duran@amd.com>
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License version 2 as published
8 * by the Free Software Foundation.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
18 */
19
1965aae3
PA
20#ifndef _ASM_X86_AMD_IOMMU_TYPES_H
21#define _ASM_X86_AMD_IOMMU_TYPES_H
8d283c35
JR
22
23#include <linux/types.h>
24#include <linux/list.h>
25#include <linux/spinlock.h>
26
27/*
28 * some size calculation constants
29 */
83f5aac1 30#define DEV_TABLE_ENTRY_SIZE 32
8d283c35
JR
31#define ALIAS_TABLE_ENTRY_SIZE 2
32#define RLOOKUP_TABLE_ENTRY_SIZE (sizeof(void *))
33
8d283c35
JR
34/* Length of the MMIO region for the AMD IOMMU */
35#define MMIO_REGION_LENGTH 0x4000
36
37/* Capability offsets used by the driver */
38#define MMIO_CAP_HDR_OFFSET 0x00
39#define MMIO_RANGE_OFFSET 0x0c
a80dc3e0 40#define MMIO_MISC_OFFSET 0x10
8d283c35
JR
41
42/* Masks, shifts and macros to parse the device range capability */
43#define MMIO_RANGE_LD_MASK 0xff000000
44#define MMIO_RANGE_FD_MASK 0x00ff0000
45#define MMIO_RANGE_BUS_MASK 0x0000ff00
46#define MMIO_RANGE_LD_SHIFT 24
47#define MMIO_RANGE_FD_SHIFT 16
48#define MMIO_RANGE_BUS_SHIFT 8
49#define MMIO_GET_LD(x) (((x) & MMIO_RANGE_LD_MASK) >> MMIO_RANGE_LD_SHIFT)
50#define MMIO_GET_FD(x) (((x) & MMIO_RANGE_FD_MASK) >> MMIO_RANGE_FD_SHIFT)
51#define MMIO_GET_BUS(x) (((x) & MMIO_RANGE_BUS_MASK) >> MMIO_RANGE_BUS_SHIFT)
a80dc3e0 52#define MMIO_MSI_NUM(x) ((x) & 0x1f)
8d283c35
JR
53
54/* Flag masks for the AMD IOMMU exclusion range */
55#define MMIO_EXCL_ENABLE_MASK 0x01ULL
56#define MMIO_EXCL_ALLOW_MASK 0x02ULL
57
58/* Used offsets into the MMIO space */
59#define MMIO_DEV_TABLE_OFFSET 0x0000
60#define MMIO_CMD_BUF_OFFSET 0x0008
61#define MMIO_EVT_BUF_OFFSET 0x0010
62#define MMIO_CONTROL_OFFSET 0x0018
63#define MMIO_EXCL_BASE_OFFSET 0x0020
64#define MMIO_EXCL_LIMIT_OFFSET 0x0028
65#define MMIO_CMD_HEAD_OFFSET 0x2000
66#define MMIO_CMD_TAIL_OFFSET 0x2008
67#define MMIO_EVT_HEAD_OFFSET 0x2010
68#define MMIO_EVT_TAIL_OFFSET 0x2018
69#define MMIO_STATUS_OFFSET 0x2020
70
519c31ba
JR
71/* MMIO status bits */
72#define MMIO_STATUS_COM_WAIT_INT_MASK 0x04
73
90008ee4
JR
74/* event logging constants */
75#define EVENT_ENTRY_SIZE 0x10
76#define EVENT_TYPE_SHIFT 28
77#define EVENT_TYPE_MASK 0xf
78#define EVENT_TYPE_ILL_DEV 0x1
79#define EVENT_TYPE_IO_FAULT 0x2
80#define EVENT_TYPE_DEV_TAB_ERR 0x3
81#define EVENT_TYPE_PAGE_TAB_ERR 0x4
82#define EVENT_TYPE_ILL_CMD 0x5
83#define EVENT_TYPE_CMD_HARD_ERR 0x6
84#define EVENT_TYPE_IOTLB_INV_TO 0x7
85#define EVENT_TYPE_INV_DEV_REQ 0x8
86#define EVENT_DEVID_MASK 0xffff
87#define EVENT_DEVID_SHIFT 0
88#define EVENT_DOMID_MASK 0xffff
89#define EVENT_DOMID_SHIFT 0
90#define EVENT_FLAGS_MASK 0xfff
91#define EVENT_FLAGS_SHIFT 0x10
92
8d283c35
JR
93/* feature control bits */
94#define CONTROL_IOMMU_EN 0x00ULL
95#define CONTROL_HT_TUN_EN 0x01ULL
96#define CONTROL_EVT_LOG_EN 0x02ULL
97#define CONTROL_EVT_INT_EN 0x03ULL
98#define CONTROL_COMWAIT_EN 0x04ULL
99#define CONTROL_PASSPW_EN 0x08ULL
100#define CONTROL_RESPASSPW_EN 0x09ULL
101#define CONTROL_COHERENT_EN 0x0aULL
102#define CONTROL_ISOC_EN 0x0bULL
103#define CONTROL_CMDBUF_EN 0x0cULL
104#define CONTROL_PPFLOG_EN 0x0dULL
105#define CONTROL_PPFINT_EN 0x0eULL
106
107/* command specific defines */
108#define CMD_COMPL_WAIT 0x01
109#define CMD_INV_DEV_ENTRY 0x02
110#define CMD_INV_IOMMU_PAGES 0x03
111
112#define CMD_COMPL_WAIT_STORE_MASK 0x01
519c31ba 113#define CMD_COMPL_WAIT_INT_MASK 0x02
8d283c35
JR
114#define CMD_INV_IOMMU_PAGES_SIZE_MASK 0x01
115#define CMD_INV_IOMMU_PAGES_PDE_MASK 0x02
116
999ba417
JR
117#define CMD_INV_IOMMU_ALL_PAGES_ADDRESS 0x7fffffffffffffffULL
118
8d283c35
JR
119/* macros and definitions for device table entries */
120#define DEV_ENTRY_VALID 0x00
121#define DEV_ENTRY_TRANSLATION 0x01
122#define DEV_ENTRY_IR 0x3d
123#define DEV_ENTRY_IW 0x3e
9f5f5fb3 124#define DEV_ENTRY_NO_PAGE_FAULT 0x62
8d283c35
JR
125#define DEV_ENTRY_EX 0x67
126#define DEV_ENTRY_SYSMGT1 0x68
127#define DEV_ENTRY_SYSMGT2 0x69
128#define DEV_ENTRY_INIT_PASS 0xb8
129#define DEV_ENTRY_EINT_PASS 0xb9
130#define DEV_ENTRY_NMI_PASS 0xba
131#define DEV_ENTRY_LINT0_PASS 0xbe
132#define DEV_ENTRY_LINT1_PASS 0xbf
38ddf41b
JR
133#define DEV_ENTRY_MODE_MASK 0x07
134#define DEV_ENTRY_MODE_SHIFT 0x09
8d283c35
JR
135
136/* constants to configure the command buffer */
137#define CMD_BUFFER_SIZE 8192
138#define CMD_BUFFER_ENTRIES 512
139#define MMIO_CMD_SIZE_SHIFT 56
140#define MMIO_CMD_SIZE_512 (0x9ULL << MMIO_CMD_SIZE_SHIFT)
141
335503e5
JR
142/* constants for event buffer handling */
143#define EVT_BUFFER_SIZE 8192 /* 512 entries */
144#define EVT_LEN_MASK (0x9ULL << 56)
145
0feae533 146#define PAGE_MODE_NONE 0x00
8d283c35
JR
147#define PAGE_MODE_1_LEVEL 0x01
148#define PAGE_MODE_2_LEVEL 0x02
149#define PAGE_MODE_3_LEVEL 0x03
150
151#define IOMMU_PDE_NL_0 0x000ULL
152#define IOMMU_PDE_NL_1 0x200ULL
153#define IOMMU_PDE_NL_2 0x400ULL
154#define IOMMU_PDE_NL_3 0x600ULL
155
156#define IOMMU_PTE_L2_INDEX(address) (((address) >> 30) & 0x1ffULL)
157#define IOMMU_PTE_L1_INDEX(address) (((address) >> 21) & 0x1ffULL)
158#define IOMMU_PTE_L0_INDEX(address) (((address) >> 12) & 0x1ffULL)
159
160#define IOMMU_MAP_SIZE_L1 (1ULL << 21)
161#define IOMMU_MAP_SIZE_L2 (1ULL << 30)
162#define IOMMU_MAP_SIZE_L3 (1ULL << 39)
163
164#define IOMMU_PTE_P (1ULL << 0)
38ddf41b 165#define IOMMU_PTE_TV (1ULL << 1)
8d283c35
JR
166#define IOMMU_PTE_U (1ULL << 59)
167#define IOMMU_PTE_FC (1ULL << 60)
168#define IOMMU_PTE_IR (1ULL << 61)
169#define IOMMU_PTE_IW (1ULL << 62)
170
171#define IOMMU_L1_PDE(address) \
172 ((address) | IOMMU_PDE_NL_1 | IOMMU_PTE_P | IOMMU_PTE_IR | IOMMU_PTE_IW)
173#define IOMMU_L2_PDE(address) \
174 ((address) | IOMMU_PDE_NL_2 | IOMMU_PTE_P | IOMMU_PTE_IR | IOMMU_PTE_IW)
175
176#define IOMMU_PAGE_MASK (((1ULL << 52) - 1) & ~0xfffULL)
177#define IOMMU_PTE_PRESENT(pte) ((pte) & IOMMU_PTE_P)
178#define IOMMU_PTE_PAGE(pte) (phys_to_virt((pte) & IOMMU_PAGE_MASK))
179#define IOMMU_PTE_MODE(pte) (((pte) >> 9) & 0x07)
180
181#define IOMMU_PROT_MASK 0x03
182#define IOMMU_PROT_IR 0x01
183#define IOMMU_PROT_IW 0x02
184
185/* IOMMU capabilities */
186#define IOMMU_CAP_IOTLB 24
187#define IOMMU_CAP_NPCACHE 26
188
189#define MAX_DOMAIN_ID 65536
190
90008ee4
JR
191/* FIXME: move this macro to <linux/pci.h> */
192#define PCI_BUS(x) (((x) >> 8) & 0xff)
193
9fdb19d6
JR
194/* Protection domain flags */
195#define PD_DMA_OPS_MASK (1UL << 0) /* domain used for dma_ops */
e2dc14a2
JR
196#define PD_DEFAULT_MASK (1UL << 1) /* domain is a default dma_ops
197 domain for an IOMMU */
0feae533
JR
198#define PD_PASSTHROUGH_MASK (1UL << 2) /* domain has no page
199 translation */
200
fefda117
JR
201extern bool amd_iommu_dump;
202#define DUMP_printk(format, arg...) \
203 do { \
204 if (amd_iommu_dump) \
205 printk(KERN_INFO "AMD IOMMU: " format, ## arg); \
206 } while(0);
9fdb19d6 207
3bd22172
JR
208/*
209 * Make iterating over all IOMMUs easier
210 */
211#define for_each_iommu(iommu) \
212 list_for_each_entry((iommu), &amd_iommu_list, list)
213#define for_each_iommu_safe(iommu, next) \
214 list_for_each_entry_safe((iommu), (next), &amd_iommu_list, list)
215
384de729
JR
216#define APERTURE_RANGE_SHIFT 27 /* 128 MB */
217#define APERTURE_RANGE_SIZE (1ULL << APERTURE_RANGE_SHIFT)
218#define APERTURE_RANGE_PAGES (APERTURE_RANGE_SIZE >> PAGE_SHIFT)
219#define APERTURE_MAX_RANGES 32 /* allows 4GB of DMA address space */
220#define APERTURE_RANGE_INDEX(a) ((a) >> APERTURE_RANGE_SHIFT)
221#define APERTURE_PAGE_INDEX(a) (((a) >> 21) & 0x3fULL)
9fdb19d6 222
5694703f
JR
223/*
224 * This structure contains generic data for IOMMU protection domains
225 * independent of their use.
226 */
8d283c35 227struct protection_domain {
9fdb19d6
JR
228 spinlock_t lock; /* mostly used to lock the page table*/
229 u16 id; /* the domain id written to the device table */
230 int mode; /* paging mode (0-6 levels) */
231 u64 *pt_root; /* page table root pointer */
232 unsigned long flags; /* flags to find out type of domain */
863c74eb 233 unsigned dev_cnt; /* devices assigned to this domain */
9fdb19d6 234 void *priv; /* private data */
8d283c35
JR
235};
236
c3239567
JR
237/*
238 * For dynamic growth the aperture size is split into ranges of 128MB of
239 * DMA address space each. This struct represents one such range.
240 */
241struct aperture_range {
242
243 /* address allocation bitmap */
244 unsigned long *bitmap;
245
246 /*
247 * Array of PTE pages for the aperture. In this array we save all the
248 * leaf pages of the domain page table used for the aperture. This way
249 * we don't need to walk the page table to find a specific PTE. We can
250 * just calculate its address in constant time.
251 */
252 u64 *pte_pages[64];
384de729
JR
253
254 unsigned long offset;
c3239567
JR
255};
256
5694703f
JR
257/*
258 * Data container for a dma_ops specific protection domain
259 */
8d283c35
JR
260struct dma_ops_domain {
261 struct list_head list;
5694703f
JR
262
263 /* generic protection domain information */
8d283c35 264 struct protection_domain domain;
5694703f
JR
265
266 /* size of the aperture for the mappings */
8d283c35 267 unsigned long aperture_size;
5694703f
JR
268
269 /* address we start to search for free addresses */
803b8cb4 270 unsigned long next_address;
5694703f 271
c3239567 272 /* address space relevant data */
384de729 273 struct aperture_range *aperture[APERTURE_MAX_RANGES];
1c655773
JR
274
275 /* This will be set to true when TLB needs to be flushed */
276 bool need_flush;
bd60b735
JR
277
278 /*
279 * if this is a preallocated domain, keep the device for which it was
280 * preallocated in this variable
281 */
282 u16 target_dev;
8d283c35
JR
283};
284
5694703f
JR
285/*
286 * Structure where we save information about one hardware AMD IOMMU in the
287 * system.
288 */
8d283c35
JR
289struct amd_iommu {
290 struct list_head list;
5694703f
JR
291
292 /* locks the accesses to the hardware */
8d283c35
JR
293 spinlock_t lock;
294
3eaf28a1
JR
295 /* Pointer to PCI device of this IOMMU */
296 struct pci_dev *dev;
297
5694703f 298 /* physical address of MMIO space */
8d283c35 299 u64 mmio_phys;
5694703f 300 /* virtual address of MMIO space */
8d283c35 301 u8 *mmio_base;
5694703f
JR
302
303 /* capabilities of that IOMMU read from ACPI */
8d283c35 304 u32 cap;
5694703f 305
eac9fbc6
RK
306 /*
307 * Capability pointer. There could be more than one IOMMU per PCI
308 * device function if there are more than one AMD IOMMU capability
309 * pointers.
310 */
311 u16 cap_ptr;
312
ee893c24
JR
313 /* pci domain of this IOMMU */
314 u16 pci_seg;
315
5694703f 316 /* first device this IOMMU handles. read from PCI */
8d283c35 317 u16 first_device;
5694703f 318 /* last device this IOMMU handles. read from PCI */
8d283c35 319 u16 last_device;
5694703f
JR
320
321 /* start of exclusion range of that IOMMU */
8d283c35 322 u64 exclusion_start;
5694703f 323 /* length of exclusion range of that IOMMU */
8d283c35
JR
324 u64 exclusion_length;
325
5694703f 326 /* command buffer virtual address */
8d283c35 327 u8 *cmd_buf;
5694703f 328 /* size of command buffer */
8d283c35
JR
329 u32 cmd_buf_size;
330
335503e5
JR
331 /* size of event buffer */
332 u32 evt_buf_size;
eac9fbc6
RK
333 /* event buffer virtual address */
334 u8 *evt_buf;
a80dc3e0
JR
335 /* MSI number for event interrupt */
336 u16 evt_msi_num;
335503e5 337
a80dc3e0
JR
338 /* true if interrupts for this IOMMU are already enabled */
339 bool int_enabled;
340
eac9fbc6 341 /* if one, we need to send a completion wait command */
0cfd7aa9 342 bool need_sync;
eac9fbc6 343
5694703f 344 /* default dma_ops domain for that IOMMU */
8d283c35
JR
345 struct dma_ops_domain *default_dom;
346};
347
5694703f
JR
348/*
349 * List with all IOMMUs in the system. This list is not locked because it is
350 * only written and read at driver initialization or suspend time
351 */
8d283c35
JR
352extern struct list_head amd_iommu_list;
353
5694703f
JR
354/*
355 * Structure defining one entry in the device table
356 */
8d283c35
JR
357struct dev_table_entry {
358 u32 data[8];
359};
360
5694703f
JR
361/*
362 * One entry for unity mappings parsed out of the ACPI table.
363 */
8d283c35
JR
364struct unity_map_entry {
365 struct list_head list;
5694703f
JR
366
367 /* starting device id this entry is used for (including) */
8d283c35 368 u16 devid_start;
5694703f 369 /* end device id this entry is used for (including) */
8d283c35 370 u16 devid_end;
5694703f
JR
371
372 /* start address to unity map (including) */
8d283c35 373 u64 address_start;
5694703f 374 /* end address to unity map (including) */
8d283c35 375 u64 address_end;
5694703f
JR
376
377 /* required protection */
8d283c35
JR
378 int prot;
379};
380
5694703f
JR
381/*
382 * List of all unity mappings. It is not locked because as runtime it is only
383 * read. It is created at ACPI table parsing time.
384 */
8d283c35
JR
385extern struct list_head amd_iommu_unity_map;
386
5694703f
JR
387/*
388 * Data structures for device handling
389 */
390
391/*
392 * Device table used by hardware. Read and write accesses by software are
393 * locked with the amd_iommu_pd_table lock.
394 */
8d283c35 395extern struct dev_table_entry *amd_iommu_dev_table;
5694703f
JR
396
397/*
398 * Alias table to find requestor ids to device ids. Not locked because only
399 * read on runtime.
400 */
8d283c35 401extern u16 *amd_iommu_alias_table;
5694703f
JR
402
403/*
404 * Reverse lookup table to find the IOMMU which translates a specific device.
405 */
8d283c35
JR
406extern struct amd_iommu **amd_iommu_rlookup_table;
407
5694703f 408/* size of the dma_ops aperture as power of 2 */
8d283c35
JR
409extern unsigned amd_iommu_aperture_order;
410
5694703f 411/* largest PCI device id we expect translation requests for */
8d283c35
JR
412extern u16 amd_iommu_last_bdf;
413
414/* data structures for protection domain handling */
415extern struct protection_domain **amd_iommu_pd_table;
5694703f
JR
416
417/* allocation bitmap for domain ids */
8d283c35
JR
418extern unsigned long *amd_iommu_pd_alloc_bitmap;
419
5694703f 420/* will be 1 if device isolation is enabled */
c226f853 421extern bool amd_iommu_isolate;
8d283c35 422
afa9fdc2
FT
423/*
424 * If true, the addresses will be flushed on unmap time, not when
425 * they are reused
426 */
427extern bool amd_iommu_unmap_flush;
428
d591b0a3
JR
429/* takes bus and device/function and returns the device id
430 * FIXME: should that be in generic PCI code? */
431static inline u16 calc_devid(u8 bus, u8 devfn)
432{
433 return (((u16)bus) << 8) | devfn;
434}
435
a9dddbe0
JR
436#ifdef CONFIG_AMD_IOMMU_STATS
437
438struct __iommu_counter {
439 char *name;
440 struct dentry *dent;
441 u64 value;
442};
443
444#define DECLARE_STATS_COUNTER(nm) \
445 static struct __iommu_counter nm = { \
446 .name = #nm, \
447 }
448
449#define INC_STATS_COUNTER(name) name.value += 1
450#define ADD_STATS_COUNTER(name, x) name.value += (x)
451#define SUB_STATS_COUNTER(name, x) name.value -= (x)
452
453#else /* CONFIG_AMD_IOMMU_STATS */
454
455#define DECLARE_STATS_COUNTER(name)
456#define INC_STATS_COUNTER(name)
457#define ADD_STATS_COUNTER(name, x)
458#define SUB_STATS_COUNTER(name, x)
459
7f26508b
JR
460static inline void amd_iommu_stats_init(void) { }
461
a9dddbe0
JR
462#endif /* CONFIG_AMD_IOMMU_STATS */
463
1965aae3 464#endif /* _ASM_X86_AMD_IOMMU_TYPES_H */