Commit | Line | Data |
---|---|---|
8d283c35 JR |
1 | /* |
2 | * Copyright (C) 2007-2008 Advanced Micro Devices, Inc. | |
3 | * Author: Joerg Roedel <joerg.roedel@amd.com> | |
4 | * Leo Duran <leo.duran@amd.com> | |
5 | * | |
6 | * This program is free software; you can redistribute it and/or modify it | |
7 | * under the terms of the GNU General Public License version 2 as published | |
8 | * by the Free Software Foundation. | |
9 | * | |
10 | * This program is distributed in the hope that it will be useful, | |
11 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
12 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
13 | * GNU General Public License for more details. | |
14 | * | |
15 | * You should have received a copy of the GNU General Public License | |
16 | * along with this program; if not, write to the Free Software | |
17 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | |
18 | */ | |
19 | ||
1965aae3 PA |
20 | #ifndef _ASM_X86_AMD_IOMMU_TYPES_H |
21 | #define _ASM_X86_AMD_IOMMU_TYPES_H | |
8d283c35 JR |
22 | |
23 | #include <linux/types.h> | |
24 | #include <linux/list.h> | |
25 | #include <linux/spinlock.h> | |
26 | ||
27 | /* | |
28 | * some size calculation constants | |
29 | */ | |
83f5aac1 | 30 | #define DEV_TABLE_ENTRY_SIZE 32 |
8d283c35 JR |
31 | #define ALIAS_TABLE_ENTRY_SIZE 2 |
32 | #define RLOOKUP_TABLE_ENTRY_SIZE (sizeof(void *)) | |
33 | ||
8d283c35 JR |
34 | /* Length of the MMIO region for the AMD IOMMU */ |
35 | #define MMIO_REGION_LENGTH 0x4000 | |
36 | ||
37 | /* Capability offsets used by the driver */ | |
38 | #define MMIO_CAP_HDR_OFFSET 0x00 | |
39 | #define MMIO_RANGE_OFFSET 0x0c | |
a80dc3e0 | 40 | #define MMIO_MISC_OFFSET 0x10 |
8d283c35 JR |
41 | |
42 | /* Masks, shifts and macros to parse the device range capability */ | |
43 | #define MMIO_RANGE_LD_MASK 0xff000000 | |
44 | #define MMIO_RANGE_FD_MASK 0x00ff0000 | |
45 | #define MMIO_RANGE_BUS_MASK 0x0000ff00 | |
46 | #define MMIO_RANGE_LD_SHIFT 24 | |
47 | #define MMIO_RANGE_FD_SHIFT 16 | |
48 | #define MMIO_RANGE_BUS_SHIFT 8 | |
49 | #define MMIO_GET_LD(x) (((x) & MMIO_RANGE_LD_MASK) >> MMIO_RANGE_LD_SHIFT) | |
50 | #define MMIO_GET_FD(x) (((x) & MMIO_RANGE_FD_MASK) >> MMIO_RANGE_FD_SHIFT) | |
51 | #define MMIO_GET_BUS(x) (((x) & MMIO_RANGE_BUS_MASK) >> MMIO_RANGE_BUS_SHIFT) | |
a80dc3e0 | 52 | #define MMIO_MSI_NUM(x) ((x) & 0x1f) |
8d283c35 JR |
53 | |
54 | /* Flag masks for the AMD IOMMU exclusion range */ | |
55 | #define MMIO_EXCL_ENABLE_MASK 0x01ULL | |
56 | #define MMIO_EXCL_ALLOW_MASK 0x02ULL | |
57 | ||
58 | /* Used offsets into the MMIO space */ | |
59 | #define MMIO_DEV_TABLE_OFFSET 0x0000 | |
60 | #define MMIO_CMD_BUF_OFFSET 0x0008 | |
61 | #define MMIO_EVT_BUF_OFFSET 0x0010 | |
62 | #define MMIO_CONTROL_OFFSET 0x0018 | |
63 | #define MMIO_EXCL_BASE_OFFSET 0x0020 | |
64 | #define MMIO_EXCL_LIMIT_OFFSET 0x0028 | |
65 | #define MMIO_CMD_HEAD_OFFSET 0x2000 | |
66 | #define MMIO_CMD_TAIL_OFFSET 0x2008 | |
67 | #define MMIO_EVT_HEAD_OFFSET 0x2010 | |
68 | #define MMIO_EVT_TAIL_OFFSET 0x2018 | |
69 | #define MMIO_STATUS_OFFSET 0x2020 | |
70 | ||
519c31ba JR |
71 | /* MMIO status bits */ |
72 | #define MMIO_STATUS_COM_WAIT_INT_MASK 0x04 | |
73 | ||
90008ee4 JR |
74 | /* event logging constants */ |
75 | #define EVENT_ENTRY_SIZE 0x10 | |
76 | #define EVENT_TYPE_SHIFT 28 | |
77 | #define EVENT_TYPE_MASK 0xf | |
78 | #define EVENT_TYPE_ILL_DEV 0x1 | |
79 | #define EVENT_TYPE_IO_FAULT 0x2 | |
80 | #define EVENT_TYPE_DEV_TAB_ERR 0x3 | |
81 | #define EVENT_TYPE_PAGE_TAB_ERR 0x4 | |
82 | #define EVENT_TYPE_ILL_CMD 0x5 | |
83 | #define EVENT_TYPE_CMD_HARD_ERR 0x6 | |
84 | #define EVENT_TYPE_IOTLB_INV_TO 0x7 | |
85 | #define EVENT_TYPE_INV_DEV_REQ 0x8 | |
86 | #define EVENT_DEVID_MASK 0xffff | |
87 | #define EVENT_DEVID_SHIFT 0 | |
88 | #define EVENT_DOMID_MASK 0xffff | |
89 | #define EVENT_DOMID_SHIFT 0 | |
90 | #define EVENT_FLAGS_MASK 0xfff | |
91 | #define EVENT_FLAGS_SHIFT 0x10 | |
92 | ||
8d283c35 JR |
93 | /* feature control bits */ |
94 | #define CONTROL_IOMMU_EN 0x00ULL | |
95 | #define CONTROL_HT_TUN_EN 0x01ULL | |
96 | #define CONTROL_EVT_LOG_EN 0x02ULL | |
97 | #define CONTROL_EVT_INT_EN 0x03ULL | |
98 | #define CONTROL_COMWAIT_EN 0x04ULL | |
99 | #define CONTROL_PASSPW_EN 0x08ULL | |
100 | #define CONTROL_RESPASSPW_EN 0x09ULL | |
101 | #define CONTROL_COHERENT_EN 0x0aULL | |
102 | #define CONTROL_ISOC_EN 0x0bULL | |
103 | #define CONTROL_CMDBUF_EN 0x0cULL | |
104 | #define CONTROL_PPFLOG_EN 0x0dULL | |
105 | #define CONTROL_PPFINT_EN 0x0eULL | |
106 | ||
107 | /* command specific defines */ | |
108 | #define CMD_COMPL_WAIT 0x01 | |
109 | #define CMD_INV_DEV_ENTRY 0x02 | |
110 | #define CMD_INV_IOMMU_PAGES 0x03 | |
111 | ||
112 | #define CMD_COMPL_WAIT_STORE_MASK 0x01 | |
519c31ba | 113 | #define CMD_COMPL_WAIT_INT_MASK 0x02 |
8d283c35 JR |
114 | #define CMD_INV_IOMMU_PAGES_SIZE_MASK 0x01 |
115 | #define CMD_INV_IOMMU_PAGES_PDE_MASK 0x02 | |
116 | ||
999ba417 JR |
117 | #define CMD_INV_IOMMU_ALL_PAGES_ADDRESS 0x7fffffffffffffffULL |
118 | ||
8d283c35 JR |
119 | /* macros and definitions for device table entries */ |
120 | #define DEV_ENTRY_VALID 0x00 | |
121 | #define DEV_ENTRY_TRANSLATION 0x01 | |
122 | #define DEV_ENTRY_IR 0x3d | |
123 | #define DEV_ENTRY_IW 0x3e | |
9f5f5fb3 | 124 | #define DEV_ENTRY_NO_PAGE_FAULT 0x62 |
8d283c35 JR |
125 | #define DEV_ENTRY_EX 0x67 |
126 | #define DEV_ENTRY_SYSMGT1 0x68 | |
127 | #define DEV_ENTRY_SYSMGT2 0x69 | |
128 | #define DEV_ENTRY_INIT_PASS 0xb8 | |
129 | #define DEV_ENTRY_EINT_PASS 0xb9 | |
130 | #define DEV_ENTRY_NMI_PASS 0xba | |
131 | #define DEV_ENTRY_LINT0_PASS 0xbe | |
132 | #define DEV_ENTRY_LINT1_PASS 0xbf | |
38ddf41b JR |
133 | #define DEV_ENTRY_MODE_MASK 0x07 |
134 | #define DEV_ENTRY_MODE_SHIFT 0x09 | |
8d283c35 JR |
135 | |
136 | /* constants to configure the command buffer */ | |
137 | #define CMD_BUFFER_SIZE 8192 | |
138 | #define CMD_BUFFER_ENTRIES 512 | |
139 | #define MMIO_CMD_SIZE_SHIFT 56 | |
140 | #define MMIO_CMD_SIZE_512 (0x9ULL << MMIO_CMD_SIZE_SHIFT) | |
141 | ||
335503e5 JR |
142 | /* constants for event buffer handling */ |
143 | #define EVT_BUFFER_SIZE 8192 /* 512 entries */ | |
144 | #define EVT_LEN_MASK (0x9ULL << 56) | |
145 | ||
8d283c35 JR |
146 | #define PAGE_MODE_1_LEVEL 0x01 |
147 | #define PAGE_MODE_2_LEVEL 0x02 | |
148 | #define PAGE_MODE_3_LEVEL 0x03 | |
9355a081 JR |
149 | #define PAGE_MODE_4_LEVEL 0x04 |
150 | #define PAGE_MODE_5_LEVEL 0x05 | |
151 | #define PAGE_MODE_6_LEVEL 0x06 | |
8d283c35 | 152 | |
9355a081 JR |
153 | #define PM_LEVEL_SHIFT(x) (12 + ((x) * 9)) |
154 | #define PM_LEVEL_SIZE(x) (((x) < 6) ? \ | |
155 | ((1ULL << PM_LEVEL_SHIFT((x))) - 1): \ | |
156 | (0xffffffffffffffffULL)) | |
157 | #define PM_LEVEL_INDEX(x, a) (((a) >> PM_LEVEL_SHIFT((x))) & 0x1ffULL) | |
50020fb6 JR |
158 | #define PM_LEVEL_ENC(x) (((x) << 9) & 0xe00ULL) |
159 | #define PM_LEVEL_PDE(x, a) ((a) | PM_LEVEL_ENC((x)) | \ | |
160 | IOMMU_PTE_P | IOMMU_PTE_IR | IOMMU_PTE_IW) | |
a6b256b4 | 161 | #define PM_PTE_LEVEL(pte) (((pte) >> 9) & 0x7ULL) |
50020fb6 | 162 | |
8d283c35 | 163 | #define IOMMU_PTE_P (1ULL << 0) |
38ddf41b | 164 | #define IOMMU_PTE_TV (1ULL << 1) |
8d283c35 JR |
165 | #define IOMMU_PTE_U (1ULL << 59) |
166 | #define IOMMU_PTE_FC (1ULL << 60) | |
167 | #define IOMMU_PTE_IR (1ULL << 61) | |
168 | #define IOMMU_PTE_IW (1ULL << 62) | |
169 | ||
8d283c35 JR |
170 | #define IOMMU_PAGE_MASK (((1ULL << 52) - 1) & ~0xfffULL) |
171 | #define IOMMU_PTE_PRESENT(pte) ((pte) & IOMMU_PTE_P) | |
172 | #define IOMMU_PTE_PAGE(pte) (phys_to_virt((pte) & IOMMU_PAGE_MASK)) | |
173 | #define IOMMU_PTE_MODE(pte) (((pte) >> 9) & 0x07) | |
174 | ||
175 | #define IOMMU_PROT_MASK 0x03 | |
176 | #define IOMMU_PROT_IR 0x01 | |
177 | #define IOMMU_PROT_IW 0x02 | |
178 | ||
179 | /* IOMMU capabilities */ | |
180 | #define IOMMU_CAP_IOTLB 24 | |
181 | #define IOMMU_CAP_NPCACHE 26 | |
182 | ||
183 | #define MAX_DOMAIN_ID 65536 | |
184 | ||
90008ee4 JR |
185 | /* FIXME: move this macro to <linux/pci.h> */ |
186 | #define PCI_BUS(x) (((x) >> 8) & 0xff) | |
187 | ||
9fdb19d6 JR |
188 | /* Protection domain flags */ |
189 | #define PD_DMA_OPS_MASK (1UL << 0) /* domain used for dma_ops */ | |
e2dc14a2 JR |
190 | #define PD_DEFAULT_MASK (1UL << 1) /* domain is a default dma_ops |
191 | domain for an IOMMU */ | |
fefda117 JR |
192 | extern bool amd_iommu_dump; |
193 | #define DUMP_printk(format, arg...) \ | |
194 | do { \ | |
195 | if (amd_iommu_dump) \ | |
196 | printk(KERN_INFO "AMD IOMMU: " format, ## arg); \ | |
197 | } while(0); | |
9fdb19d6 | 198 | |
3bd22172 JR |
199 | /* |
200 | * Make iterating over all IOMMUs easier | |
201 | */ | |
202 | #define for_each_iommu(iommu) \ | |
203 | list_for_each_entry((iommu), &amd_iommu_list, list) | |
204 | #define for_each_iommu_safe(iommu, next) \ | |
205 | list_for_each_entry_safe((iommu), (next), &amd_iommu_list, list) | |
206 | ||
384de729 JR |
207 | #define APERTURE_RANGE_SHIFT 27 /* 128 MB */ |
208 | #define APERTURE_RANGE_SIZE (1ULL << APERTURE_RANGE_SHIFT) | |
209 | #define APERTURE_RANGE_PAGES (APERTURE_RANGE_SIZE >> PAGE_SHIFT) | |
210 | #define APERTURE_MAX_RANGES 32 /* allows 4GB of DMA address space */ | |
211 | #define APERTURE_RANGE_INDEX(a) ((a) >> APERTURE_RANGE_SHIFT) | |
212 | #define APERTURE_PAGE_INDEX(a) (((a) >> 21) & 0x3fULL) | |
9fdb19d6 | 213 | |
5694703f JR |
214 | /* |
215 | * This structure contains generic data for IOMMU protection domains | |
216 | * independent of their use. | |
217 | */ | |
8d283c35 | 218 | struct protection_domain { |
9fdb19d6 JR |
219 | spinlock_t lock; /* mostly used to lock the page table*/ |
220 | u16 id; /* the domain id written to the device table */ | |
221 | int mode; /* paging mode (0-6 levels) */ | |
222 | u64 *pt_root; /* page table root pointer */ | |
223 | unsigned long flags; /* flags to find out type of domain */ | |
04bfdd84 | 224 | bool updated; /* complete domain flush required */ |
863c74eb | 225 | unsigned dev_cnt; /* devices assigned to this domain */ |
9fdb19d6 | 226 | void *priv; /* private data */ |
8d283c35 JR |
227 | }; |
228 | ||
c3239567 JR |
229 | /* |
230 | * For dynamic growth the aperture size is split into ranges of 128MB of | |
231 | * DMA address space each. This struct represents one such range. | |
232 | */ | |
233 | struct aperture_range { | |
234 | ||
235 | /* address allocation bitmap */ | |
236 | unsigned long *bitmap; | |
237 | ||
238 | /* | |
239 | * Array of PTE pages for the aperture. In this array we save all the | |
240 | * leaf pages of the domain page table used for the aperture. This way | |
241 | * we don't need to walk the page table to find a specific PTE. We can | |
242 | * just calculate its address in constant time. | |
243 | */ | |
244 | u64 *pte_pages[64]; | |
384de729 JR |
245 | |
246 | unsigned long offset; | |
c3239567 JR |
247 | }; |
248 | ||
5694703f JR |
249 | /* |
250 | * Data container for a dma_ops specific protection domain | |
251 | */ | |
8d283c35 JR |
252 | struct dma_ops_domain { |
253 | struct list_head list; | |
5694703f JR |
254 | |
255 | /* generic protection domain information */ | |
8d283c35 | 256 | struct protection_domain domain; |
5694703f JR |
257 | |
258 | /* size of the aperture for the mappings */ | |
8d283c35 | 259 | unsigned long aperture_size; |
5694703f JR |
260 | |
261 | /* address we start to search for free addresses */ | |
803b8cb4 | 262 | unsigned long next_address; |
5694703f | 263 | |
c3239567 | 264 | /* address space relevant data */ |
384de729 | 265 | struct aperture_range *aperture[APERTURE_MAX_RANGES]; |
1c655773 JR |
266 | |
267 | /* This will be set to true when TLB needs to be flushed */ | |
268 | bool need_flush; | |
bd60b735 JR |
269 | |
270 | /* | |
271 | * if this is a preallocated domain, keep the device for which it was | |
272 | * preallocated in this variable | |
273 | */ | |
274 | u16 target_dev; | |
8d283c35 JR |
275 | }; |
276 | ||
5694703f JR |
277 | /* |
278 | * Structure where we save information about one hardware AMD IOMMU in the | |
279 | * system. | |
280 | */ | |
8d283c35 JR |
281 | struct amd_iommu { |
282 | struct list_head list; | |
5694703f JR |
283 | |
284 | /* locks the accesses to the hardware */ | |
8d283c35 JR |
285 | spinlock_t lock; |
286 | ||
3eaf28a1 JR |
287 | /* Pointer to PCI device of this IOMMU */ |
288 | struct pci_dev *dev; | |
289 | ||
5694703f | 290 | /* physical address of MMIO space */ |
8d283c35 | 291 | u64 mmio_phys; |
5694703f | 292 | /* virtual address of MMIO space */ |
8d283c35 | 293 | u8 *mmio_base; |
5694703f JR |
294 | |
295 | /* capabilities of that IOMMU read from ACPI */ | |
8d283c35 | 296 | u32 cap; |
5694703f | 297 | |
eac9fbc6 RK |
298 | /* |
299 | * Capability pointer. There could be more than one IOMMU per PCI | |
300 | * device function if there are more than one AMD IOMMU capability | |
301 | * pointers. | |
302 | */ | |
303 | u16 cap_ptr; | |
304 | ||
ee893c24 JR |
305 | /* pci domain of this IOMMU */ |
306 | u16 pci_seg; | |
307 | ||
5694703f | 308 | /* first device this IOMMU handles. read from PCI */ |
8d283c35 | 309 | u16 first_device; |
5694703f | 310 | /* last device this IOMMU handles. read from PCI */ |
8d283c35 | 311 | u16 last_device; |
5694703f JR |
312 | |
313 | /* start of exclusion range of that IOMMU */ | |
8d283c35 | 314 | u64 exclusion_start; |
5694703f | 315 | /* length of exclusion range of that IOMMU */ |
8d283c35 JR |
316 | u64 exclusion_length; |
317 | ||
5694703f | 318 | /* command buffer virtual address */ |
8d283c35 | 319 | u8 *cmd_buf; |
5694703f | 320 | /* size of command buffer */ |
8d283c35 JR |
321 | u32 cmd_buf_size; |
322 | ||
335503e5 JR |
323 | /* size of event buffer */ |
324 | u32 evt_buf_size; | |
eac9fbc6 RK |
325 | /* event buffer virtual address */ |
326 | u8 *evt_buf; | |
a80dc3e0 JR |
327 | /* MSI number for event interrupt */ |
328 | u16 evt_msi_num; | |
335503e5 | 329 | |
a80dc3e0 JR |
330 | /* true if interrupts for this IOMMU are already enabled */ |
331 | bool int_enabled; | |
332 | ||
eac9fbc6 | 333 | /* if one, we need to send a completion wait command */ |
0cfd7aa9 | 334 | bool need_sync; |
eac9fbc6 | 335 | |
5694703f | 336 | /* default dma_ops domain for that IOMMU */ |
8d283c35 JR |
337 | struct dma_ops_domain *default_dom; |
338 | }; | |
339 | ||
5694703f JR |
340 | /* |
341 | * List with all IOMMUs in the system. This list is not locked because it is | |
342 | * only written and read at driver initialization or suspend time | |
343 | */ | |
8d283c35 JR |
344 | extern struct list_head amd_iommu_list; |
345 | ||
5694703f JR |
346 | /* |
347 | * Structure defining one entry in the device table | |
348 | */ | |
8d283c35 JR |
349 | struct dev_table_entry { |
350 | u32 data[8]; | |
351 | }; | |
352 | ||
5694703f JR |
353 | /* |
354 | * One entry for unity mappings parsed out of the ACPI table. | |
355 | */ | |
8d283c35 JR |
356 | struct unity_map_entry { |
357 | struct list_head list; | |
5694703f JR |
358 | |
359 | /* starting device id this entry is used for (including) */ | |
8d283c35 | 360 | u16 devid_start; |
5694703f | 361 | /* end device id this entry is used for (including) */ |
8d283c35 | 362 | u16 devid_end; |
5694703f JR |
363 | |
364 | /* start address to unity map (including) */ | |
8d283c35 | 365 | u64 address_start; |
5694703f | 366 | /* end address to unity map (including) */ |
8d283c35 | 367 | u64 address_end; |
5694703f JR |
368 | |
369 | /* required protection */ | |
8d283c35 JR |
370 | int prot; |
371 | }; | |
372 | ||
5694703f JR |
373 | /* |
374 | * List of all unity mappings. It is not locked because as runtime it is only | |
375 | * read. It is created at ACPI table parsing time. | |
376 | */ | |
8d283c35 JR |
377 | extern struct list_head amd_iommu_unity_map; |
378 | ||
5694703f JR |
379 | /* |
380 | * Data structures for device handling | |
381 | */ | |
382 | ||
383 | /* | |
384 | * Device table used by hardware. Read and write accesses by software are | |
385 | * locked with the amd_iommu_pd_table lock. | |
386 | */ | |
8d283c35 | 387 | extern struct dev_table_entry *amd_iommu_dev_table; |
5694703f JR |
388 | |
389 | /* | |
390 | * Alias table to find requestor ids to device ids. Not locked because only | |
391 | * read on runtime. | |
392 | */ | |
8d283c35 | 393 | extern u16 *amd_iommu_alias_table; |
5694703f JR |
394 | |
395 | /* | |
396 | * Reverse lookup table to find the IOMMU which translates a specific device. | |
397 | */ | |
8d283c35 JR |
398 | extern struct amd_iommu **amd_iommu_rlookup_table; |
399 | ||
5694703f | 400 | /* size of the dma_ops aperture as power of 2 */ |
8d283c35 JR |
401 | extern unsigned amd_iommu_aperture_order; |
402 | ||
5694703f | 403 | /* largest PCI device id we expect translation requests for */ |
8d283c35 JR |
404 | extern u16 amd_iommu_last_bdf; |
405 | ||
406 | /* data structures for protection domain handling */ | |
407 | extern struct protection_domain **amd_iommu_pd_table; | |
5694703f JR |
408 | |
409 | /* allocation bitmap for domain ids */ | |
8d283c35 JR |
410 | extern unsigned long *amd_iommu_pd_alloc_bitmap; |
411 | ||
5694703f | 412 | /* will be 1 if device isolation is enabled */ |
c226f853 | 413 | extern bool amd_iommu_isolate; |
8d283c35 | 414 | |
afa9fdc2 FT |
415 | /* |
416 | * If true, the addresses will be flushed on unmap time, not when | |
417 | * they are reused | |
418 | */ | |
419 | extern bool amd_iommu_unmap_flush; | |
420 | ||
d591b0a3 JR |
421 | /* takes bus and device/function and returns the device id |
422 | * FIXME: should that be in generic PCI code? */ | |
423 | static inline u16 calc_devid(u8 bus, u8 devfn) | |
424 | { | |
425 | return (((u16)bus) << 8) | devfn; | |
426 | } | |
427 | ||
a9dddbe0 JR |
428 | #ifdef CONFIG_AMD_IOMMU_STATS |
429 | ||
430 | struct __iommu_counter { | |
431 | char *name; | |
432 | struct dentry *dent; | |
433 | u64 value; | |
434 | }; | |
435 | ||
436 | #define DECLARE_STATS_COUNTER(nm) \ | |
437 | static struct __iommu_counter nm = { \ | |
438 | .name = #nm, \ | |
439 | } | |
440 | ||
441 | #define INC_STATS_COUNTER(name) name.value += 1 | |
442 | #define ADD_STATS_COUNTER(name, x) name.value += (x) | |
443 | #define SUB_STATS_COUNTER(name, x) name.value -= (x) | |
444 | ||
445 | #else /* CONFIG_AMD_IOMMU_STATS */ | |
446 | ||
447 | #define DECLARE_STATS_COUNTER(name) | |
448 | #define INC_STATS_COUNTER(name) | |
449 | #define ADD_STATS_COUNTER(name, x) | |
450 | #define SUB_STATS_COUNTER(name, x) | |
451 | ||
7f26508b JR |
452 | static inline void amd_iommu_stats_init(void) { } |
453 | ||
a9dddbe0 JR |
454 | #endif /* CONFIG_AMD_IOMMU_STATS */ |
455 | ||
1965aae3 | 456 | #endif /* _ASM_X86_AMD_IOMMU_TYPES_H */ |