iommu.h 31.8 KB
Newer Older
1
/* SPDX-License-Identifier: GPL-2.0-only */
2 3 4 5 6 7 8 9
/*
 * Copyright (C) 2007-2008 Advanced Micro Devices, Inc.
 * Author: Joerg Roedel <joerg.roedel@amd.com>
 */

#ifndef __LINUX_IOMMU_H
#define __LINUX_IOMMU_H

10 11 12
#include <linux/scatterlist.h>
#include <linux/device.h>
#include <linux/types.h>
13
#include <linux/errno.h>
W
Wang YanQing 已提交
14
#include <linux/err.h>
15
#include <linux/of.h>
16
#include <linux/ioasid.h>
J
Jacob Pan 已提交
17
#include <uapi/linux/iommu.h>
18

19 20 21
#define IOMMU_READ	(1 << 0)
#define IOMMU_WRITE	(1 << 1)
#define IOMMU_CACHE	(1 << 2) /* DMA cache coherency */
22
#define IOMMU_NOEXEC	(1 << 3)
R
Robin Murphy 已提交
23
#define IOMMU_MMIO	(1 << 4) /* e.g. things like MSI doorbells */
24
/*
25 26 27 28 29 30 31
 * Where the bus hardware includes a privilege level as part of its access type
 * markings, and certain devices are capable of issuing transactions marked as
 * either 'supervisor' or 'user', the IOMMU_PRIV flag requests that the other
 * given permission flags only apply to accesses at the higher privilege level,
 * and that unprivileged transactions should have as little access as possible.
 * This would usually imply the same permissions as kernel mappings on the CPU,
 * if the IOMMU page table format is equivalent.
32 33
 */
#define IOMMU_PRIV	(1 << 5)
34

35
struct iommu_ops;
A
Alex Williamson 已提交
36
struct iommu_group;
37
struct bus_type;
38
struct device;
39
struct iommu_domain;
40
struct notifier_block;
41
struct iommu_sva;
J
Jacob Pan 已提交
42
struct iommu_fault_event;
43
struct iommu_dma_cookie;
44 45 46 47 48 49

/* iommu fault flags */
#define IOMMU_FAULT_READ	0x0
#define IOMMU_FAULT_WRITE	0x1

typedef int (*iommu_fault_handler_t)(struct iommu_domain *,
50
			struct device *, unsigned long, int, void *);
J
Jacob Pan 已提交
51
typedef int (*iommu_dev_fault_handler_t)(struct iommu_fault *, void *);
52

53 54 55 56 57 58
struct iommu_domain_geometry {
	dma_addr_t aperture_start; /* First address that can be mapped    */
	dma_addr_t aperture_end;   /* Last address that can be mapped     */
	bool force_aperture;       /* DMA only allowed in mappable range? */
};

59 60 61 62 63
/* Domain feature flags */
#define __IOMMU_DOMAIN_PAGING	(1U << 0)  /* Support for iommu_map/unmap */
#define __IOMMU_DOMAIN_DMA_API	(1U << 1)  /* Domain for use in DMA-API
					      implementation              */
#define __IOMMU_DOMAIN_PT	(1U << 2)  /* Domain is identity mapped   */
64
#define __IOMMU_DOMAIN_DMA_FQ	(1U << 3)  /* DMA-API uses flush queue    */
65 66 67 68 69 70 71 72 73 74 75 76

/*
 * This are the possible domain-types
 *
 *	IOMMU_DOMAIN_BLOCKED	- All DMA is blocked, can be used to isolate
 *				  devices
 *	IOMMU_DOMAIN_IDENTITY	- DMA addresses are system physical addresses
 *	IOMMU_DOMAIN_UNMANAGED	- DMA mappings managed by IOMMU-API user, used
 *				  for VMs
 *	IOMMU_DOMAIN_DMA	- Internally used for DMA-API implementations.
 *				  This flag allows IOMMU drivers to implement
 *				  certain optimizations for these domains
77 78
 *	IOMMU_DOMAIN_DMA_FQ	- As above, but definitely using batched TLB
 *				  invalidation.
79 80 81 82 83 84
 */
#define IOMMU_DOMAIN_BLOCKED	(0U)
#define IOMMU_DOMAIN_IDENTITY	(__IOMMU_DOMAIN_PT)
#define IOMMU_DOMAIN_UNMANAGED	(__IOMMU_DOMAIN_PAGING)
#define IOMMU_DOMAIN_DMA	(__IOMMU_DOMAIN_PAGING |	\
				 __IOMMU_DOMAIN_DMA_API)
85 86 87
#define IOMMU_DOMAIN_DMA_FQ	(__IOMMU_DOMAIN_PAGING |	\
				 __IOMMU_DOMAIN_DMA_API |	\
				 __IOMMU_DOMAIN_DMA_FQ)
88

89
struct iommu_domain {
90
	unsigned type;
91
	const struct iommu_ops *ops;
92
	unsigned long pgsize_bitmap;	/* Bitmap of page sizes in use */
93
	iommu_fault_handler_t handler;
94
	void *handler_token;
95
	struct iommu_domain_geometry geometry;
96
	struct iommu_dma_cookie *iova_cookie;
97 98
};

99 100 101 102 103
static inline bool iommu_is_dma_domain(struct iommu_domain *domain)
{
	return domain->type & __IOMMU_DOMAIN_DMA_API;
}

104 105 106 107
enum iommu_cap {
	IOMMU_CAP_CACHE_COHERENCY,	/* IOMMU can enforce cache coherent DMA
					   transactions */
	IOMMU_CAP_INTR_REMAP,		/* IOMMU supports interrupt isolation */
108
	IOMMU_CAP_NOEXEC,		/* IOMMU_NOEXEC flag */
109
};
S
Sheng Yang 已提交
110

111
/* These are the possible reserved region types */
112 113 114
enum iommu_resv_type {
	/* Memory regions which must be mapped 1:1 at all times */
	IOMMU_RESV_DIRECT,
115 116 117 118 119 120
	/*
	 * Memory regions which are advertised to be 1:1 but are
	 * commonly considered relaxable in some conditions,
	 * for instance in device assignment use case (USB, Graphics)
	 */
	IOMMU_RESV_DIRECT_RELAXABLE,
121 122 123 124 125 126 127
	/* Arbitrary "never map this or give it to a device" address ranges */
	IOMMU_RESV_RESERVED,
	/* Hardware MSI region (untranslated) */
	IOMMU_RESV_MSI,
	/* Software-managed MSI translation window */
	IOMMU_RESV_SW_MSI,
};
128

129
/**
130
 * struct iommu_resv_region - descriptor for a reserved memory region
131 132 133 134
 * @list: Linked list pointers
 * @start: System physical start address of the region
 * @length: Length of the region in bytes
 * @prot: IOMMU Protection flags (READ/WRITE/...)
135
 * @type: Type of the reserved region
136
 */
137
struct iommu_resv_region {
138 139 140 141
	struct list_head	list;
	phys_addr_t		start;
	size_t			length;
	int			prot;
142
	enum iommu_resv_type	type;
143 144
};

145 146 147 148 149 150 151 152 153 154 155 156 157
/**
 * enum iommu_dev_features - Per device IOMMU features
 * @IOMMU_DEV_FEAT_SVA: Shared Virtual Addresses
 * @IOMMU_DEV_FEAT_IOPF: I/O Page Faults such as PRI or Stall. Generally
 *			 enabling %IOMMU_DEV_FEAT_SVA requires
 *			 %IOMMU_DEV_FEAT_IOPF, but some devices manage I/O Page
 *			 Faults themselves instead of relying on the IOMMU. When
 *			 supported, this feature must be enabled before and
 *			 disabled after %IOMMU_DEV_FEAT_SVA.
 *
 * Device drivers query whether a feature is supported using
 * iommu_dev_has_feature(), and enable it using iommu_dev_enable_feature().
 */
158
enum iommu_dev_features {
159 160
	IOMMU_DEV_FEAT_SVA,
	IOMMU_DEV_FEAT_IOPF,
161 162 163 164
};

#define IOMMU_PASID_INVALID	(-1U)

165 166
#ifdef CONFIG_IOMMU_API

167 168 169 170
/**
 * struct iommu_iotlb_gather - Range information for a pending IOTLB flush
 *
 * @start: IOVA representing the start of the range to be flushed
171
 * @end: IOVA representing the end of the range to be flushed (inclusive)
172
 * @pgsize: The interval at which to perform the flush
173 174
 * @freelist: Removed pages to free after sync
 * @queued: Indicates that the flush will be queued
175 176 177
 *
 * This structure is intended to be updated by multiple calls to the
 * ->unmap() function in struct iommu_ops before eventually being passed
178 179 180 181
 * into ->iotlb_sync(). Drivers can add pages to @freelist to be freed after
 * ->iotlb_sync() or ->iotlb_flush_all() have cleared all cached references to
 * them. @queued is set to indicate when ->iotlb_flush_all() will be called
 * later instead of ->iotlb_sync(), so drivers may optimise accordingly.
182 183 184 185 186
 */
struct iommu_iotlb_gather {
	unsigned long		start;
	unsigned long		end;
	size_t			pgsize;
187
	struct list_head	freelist;
188
	bool			queued;
189 190
};

191 192
/**
 * struct iommu_ops - iommu ops and capabilities
193 194 195
 * @capable: check capability
 * @domain_alloc: allocate iommu domain
 * @domain_free: free iommu domain
196 197 198
 * @attach_dev: attach device to an iommu domain
 * @detach_dev: detach device from an iommu domain
 * @map: map a physically contiguous memory region to an iommu domain
199 200
 * @map_pages: map a physically contiguous set of pages of the same size to
 *             an iommu domain.
201
 * @unmap: unmap a physically contiguous memory region from an iommu domain
202
 * @unmap_pages: unmap a number of pages of the same size from an iommu domain
T
Tom Murphy 已提交
203
 * @flush_iotlb_all: Synchronously flush all hardware TLBs for this domain
204
 * @iotlb_sync_map: Sync mappings created recently using @map to the hardware
205
 * @iotlb_sync: Flush all queued ranges from the hardware TLBs and empty flush
206
 *            queue
207
 * @iova_to_phys: translate iova to physical address
208 209 210 211
 * @probe_device: Add device to iommu driver handling
 * @release_device: Remove device from iommu driver handling
 * @probe_finalize: Do final setup work after the device is added to an IOMMU
 *                  group and attached to the groups domain
212
 * @device_group: find iommu group for a particular device
213
 * @enable_nesting: Enable nesting
214
 * @set_pgtable_quirks: Set io page table quirks (IO_PGTABLE_QUIRK_*)
215 216
 * @get_resv_regions: Request list of reserved regions for a device
 * @put_resv_regions: Free list of reserved regions for a device
217
 * @of_xlate: add OF master IDs to iommu grouping
218 219
 * @is_attach_deferred: Check if domain attach should be deferred from iommu
 *                      driver init to device driver init (default no)
220 221 222
 * @dev_has/enable/disable_feat: per device entries to check/enable/disable
 *                               iommu specific features.
 * @dev_feat_enabled: check enabled feature
223 224 225
 * @sva_bind: Bind process address space to device
 * @sva_unbind: Unbind process address space from device
 * @sva_get_pasid: Get PASID associated to a SVA handle
226
 * @page_response: handle page request response
227 228 229 230
 * @def_domain_type: device default domain type, return value:
 *		- IOMMU_DOMAIN_IDENTITY: must use an identity domain
 *		- IOMMU_DOMAIN_DMA: must use a dma domain
 *		- 0: use the default setting
231 232
 * @pgsize_bitmap: bitmap of all possible supported page sizes
 * @owner: Driver module providing these ops
233
 */
234
struct iommu_ops {
235
	bool (*capable)(enum iommu_cap);
236 237

	/* Domain allocation and freeing by the iommu driver */
238
	struct iommu_domain *(*domain_alloc)(unsigned iommu_domain_type);
239 240
	void (*domain_free)(struct iommu_domain *);

241 242
	int (*attach_dev)(struct iommu_domain *domain, struct device *dev);
	void (*detach_dev)(struct iommu_domain *domain, struct device *dev);
243
	int (*map)(struct iommu_domain *domain, unsigned long iova,
244
		   phys_addr_t paddr, size_t size, int prot, gfp_t gfp);
245 246 247
	int (*map_pages)(struct iommu_domain *domain, unsigned long iova,
			 phys_addr_t paddr, size_t pgsize, size_t pgcount,
			 int prot, gfp_t gfp, size_t *mapped);
248
	size_t (*unmap)(struct iommu_domain *domain, unsigned long iova,
249
		     size_t size, struct iommu_iotlb_gather *iotlb_gather);
250 251 252
	size_t (*unmap_pages)(struct iommu_domain *domain, unsigned long iova,
			      size_t pgsize, size_t pgcount,
			      struct iommu_iotlb_gather *iotlb_gather);
253
	void (*flush_iotlb_all)(struct iommu_domain *domain);
254 255
	void (*iotlb_sync_map)(struct iommu_domain *domain, unsigned long iova,
			       size_t size);
256 257
	void (*iotlb_sync)(struct iommu_domain *domain,
			   struct iommu_iotlb_gather *iotlb_gather);
258
	phys_addr_t (*iova_to_phys)(struct iommu_domain *domain, dma_addr_t iova);
259 260 261
	struct iommu_device *(*probe_device)(struct device *dev);
	void (*release_device)(struct device *dev);
	void (*probe_finalize)(struct device *dev);
262
	struct iommu_group *(*device_group)(struct device *dev);
263
	int (*enable_nesting)(struct iommu_domain *domain);
264 265
	int (*set_pgtable_quirks)(struct iommu_domain *domain,
				  unsigned long quirks);
266

267 268 269
	/* Request/Free a list of reserved regions for a device */
	void (*get_resv_regions)(struct device *dev, struct list_head *list);
	void (*put_resv_regions)(struct device *dev, struct list_head *list);
270

271
	int (*of_xlate)(struct device *dev, struct of_phandle_args *args);
272
	bool (*is_attach_deferred)(struct device *dev);
273

274 275 276 277 278 279
	/* Per device IOMMU features */
	bool (*dev_has_feat)(struct device *dev, enum iommu_dev_features f);
	bool (*dev_feat_enabled)(struct device *dev, enum iommu_dev_features f);
	int (*dev_enable_feat)(struct device *dev, enum iommu_dev_features f);
	int (*dev_disable_feat)(struct device *dev, enum iommu_dev_features f);

280 281 282
	struct iommu_sva *(*sva_bind)(struct device *dev, struct mm_struct *mm,
				      void *drvdata);
	void (*sva_unbind)(struct iommu_sva *handle);
283
	u32 (*sva_get_pasid)(struct iommu_sva *handle);
284

285 286 287 288
	int (*page_response)(struct device *dev,
			     struct iommu_fault_event *evt,
			     struct iommu_page_response *msg);

289 290
	int (*def_domain_type)(struct device *dev);

291
	unsigned long pgsize_bitmap;
292
	struct module *owner;
293 294
};

295 296 297 298 299
/**
 * struct iommu_device - IOMMU core representation of one IOMMU hardware
 *			 instance
 * @list: Used by the iommu-core to keep a list of registered iommus
 * @ops: iommu-ops for talking to this iommu
300
 * @dev: struct device for sysfs handling
301 302 303 304
 */
struct iommu_device {
	struct list_head list;
	const struct iommu_ops *ops;
305
	struct fwnode_handle *fwnode;
306
	struct device *dev;
307 308
};

J
Jacob Pan 已提交
309 310 311 312 313 314 315
/**
 * struct iommu_fault_event - Generic fault event
 *
 * Can represent recoverable faults such as a page requests or
 * unrecoverable faults such as DMA or IRQ remapping faults.
 *
 * @fault: fault descriptor
316
 * @list: pending fault event list, used for tracking responses
J
Jacob Pan 已提交
317 318 319
 */
struct iommu_fault_event {
	struct iommu_fault fault;
320
	struct list_head list;
J
Jacob Pan 已提交
321 322 323 324 325 326
};

/**
 * struct iommu_fault_param - per-device IOMMU fault data
 * @handler: Callback function to handle IOMMU faults at device level
 * @data: handler private data
327 328
 * @faults: holds the pending faults which needs response
 * @lock: protect pending faults list
J
Jacob Pan 已提交
329 330 331 332
 */
struct iommu_fault_param {
	iommu_dev_fault_handler_t handler;
	void *data;
333 334
	struct list_head faults;
	struct mutex lock;
J
Jacob Pan 已提交
335 336 337
};

/**
338
 * struct dev_iommu - Collection of per-device IOMMU data
J
Jacob Pan 已提交
339 340
 *
 * @fault_param: IOMMU detected device fault reporting data
341
 * @iopf_param:	 I/O Page Fault queue and data
342
 * @fwspec:	 IOMMU fwspec data
343
 * @iommu_dev:	 IOMMU device this device is linked to
344
 * @priv:	 IOMMU Driver private data
J
Jacob Pan 已提交
345 346 347 348
 *
 * TODO: migrate other per device data pointers under iommu_dev_data, e.g.
 *	struct iommu_group	*iommu_group;
 */
349
struct dev_iommu {
350
	struct mutex lock;
351
	struct iommu_fault_param	*fault_param;
352
	struct iopf_device_param	*iopf_param;
353
	struct iommu_fwspec		*fwspec;
354
	struct iommu_device		*iommu_dev;
355
	void				*priv;
J
Jacob Pan 已提交
356 357
};

358 359 360
int iommu_device_register(struct iommu_device *iommu,
			  const struct iommu_ops *ops,
			  struct device *hwdev);
361
void iommu_device_unregister(struct iommu_device *iommu);
362 363 364 365 366
int  iommu_device_sysfs_add(struct iommu_device *iommu,
			    struct device *parent,
			    const struct attribute_group **groups,
			    const char *fmt, ...) __printf(4, 5);
void iommu_device_sysfs_remove(struct iommu_device *iommu);
367 368
int  iommu_device_link(struct iommu_device   *iommu, struct device *link);
void iommu_device_unlink(struct iommu_device *iommu, struct device *link);
369
int iommu_deferred_attach(struct device *dev, struct iommu_domain *domain);
370

371 372 373 374 375
static inline struct iommu_device *dev_to_iommu_device(struct device *dev)
{
	return (struct iommu_device *)dev_get_drvdata(dev);
}

376 377 378 379
static inline void iommu_iotlb_gather_init(struct iommu_iotlb_gather *gather)
{
	*gather = (struct iommu_iotlb_gather) {
		.start	= ULONG_MAX,
380
		.freelist = LIST_HEAD_INIT(gather->freelist),
381 382 383
	};
}

384 385 386 387 388 389 390 391 392 393 394
static inline const struct iommu_ops *dev_iommu_ops(struct device *dev)
{
	/*
	 * Assume that valid ops must be installed if iommu_probe_device()
	 * has succeeded. The device ops are essentially for internal use
	 * within the IOMMU subsystem itself, so we should be able to trust
	 * ourselves not to misuse the helper.
	 */
	return dev->iommu->iommu_dev->ops;
}

A
Alex Williamson 已提交
395 396 397 398 399 400 401
#define IOMMU_GROUP_NOTIFY_ADD_DEVICE		1 /* Device added */
#define IOMMU_GROUP_NOTIFY_DEL_DEVICE		2 /* Pre Device removed */
#define IOMMU_GROUP_NOTIFY_BIND_DRIVER		3 /* Pre Driver bind */
#define IOMMU_GROUP_NOTIFY_BOUND_DRIVER		4 /* Post Driver bind */
#define IOMMU_GROUP_NOTIFY_UNBIND_DRIVER	5 /* Pre Driver unbind */
#define IOMMU_GROUP_NOTIFY_UNBOUND_DRIVER	6 /* Post Driver unbind */

402
extern int bus_set_iommu(struct bus_type *bus, const struct iommu_ops *ops);
403
extern int bus_iommu_probe(struct bus_type *bus);
404
extern bool iommu_present(struct bus_type *bus);
405
extern bool iommu_capable(struct bus_type *bus, enum iommu_cap cap);
406
extern struct iommu_domain *iommu_domain_alloc(struct bus_type *bus);
407
extern struct iommu_group *iommu_group_get_by_id(int id);
408 409 410 411 412
extern void iommu_domain_free(struct iommu_domain *domain);
extern int iommu_attach_device(struct iommu_domain *domain,
			       struct device *dev);
extern void iommu_detach_device(struct iommu_domain *domain,
				struct device *dev);
413
extern int iommu_sva_unbind_gpasid(struct iommu_domain *domain,
414
				   struct device *dev, ioasid_t pasid);
415
extern struct iommu_domain *iommu_get_domain_for_dev(struct device *dev);
416
extern struct iommu_domain *iommu_get_dma_domain(struct device *dev);
417
extern int iommu_map(struct iommu_domain *domain, unsigned long iova,
418
		     phys_addr_t paddr, size_t size, int prot);
419 420
extern int iommu_map_atomic(struct iommu_domain *domain, unsigned long iova,
			    phys_addr_t paddr, size_t size, int prot);
421
extern size_t iommu_unmap(struct iommu_domain *domain, unsigned long iova,
422 423
			  size_t size);
extern size_t iommu_unmap_fast(struct iommu_domain *domain,
424 425
			       unsigned long iova, size_t size,
			       struct iommu_iotlb_gather *iotlb_gather);
426 427 428 429 430
extern ssize_t iommu_map_sg(struct iommu_domain *domain, unsigned long iova,
		struct scatterlist *sg, unsigned int nents, int prot);
extern ssize_t iommu_map_sg_atomic(struct iommu_domain *domain,
				   unsigned long iova, struct scatterlist *sg,
				   unsigned int nents, int prot);
431
extern phys_addr_t iommu_iova_to_phys(struct iommu_domain *domain, dma_addr_t iova);
432
extern void iommu_set_fault_handler(struct iommu_domain *domain,
433
			iommu_fault_handler_t handler, void *token);
A
Alex Williamson 已提交
434

435 436
extern void iommu_get_resv_regions(struct device *dev, struct list_head *list);
extern void iommu_put_resv_regions(struct device *dev, struct list_head *list);
437 438
extern void generic_iommu_put_resv_regions(struct device *dev,
					   struct list_head *list);
439 440 441
extern void iommu_set_default_passthrough(bool cmd_line);
extern void iommu_set_default_translated(bool cmd_line);
extern bool iommu_default_passthrough(void);
E
Eric Auger 已提交
442
extern struct iommu_resv_region *
443 444
iommu_alloc_resv_region(phys_addr_t start, size_t length, int prot,
			enum iommu_resv_type type);
E
Eric Auger 已提交
445 446
extern int iommu_get_group_resv_regions(struct iommu_group *group,
					struct list_head *head);
447

A
Alex Williamson 已提交
448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463
extern int iommu_attach_group(struct iommu_domain *domain,
			      struct iommu_group *group);
extern void iommu_detach_group(struct iommu_domain *domain,
			       struct iommu_group *group);
extern struct iommu_group *iommu_group_alloc(void);
extern void *iommu_group_get_iommudata(struct iommu_group *group);
extern void iommu_group_set_iommudata(struct iommu_group *group,
				      void *iommu_data,
				      void (*release)(void *iommu_data));
extern int iommu_group_set_name(struct iommu_group *group, const char *name);
extern int iommu_group_add_device(struct iommu_group *group,
				  struct device *dev);
extern void iommu_group_remove_device(struct device *dev);
extern int iommu_group_for_each_dev(struct iommu_group *group, void *data,
				    int (*fn)(struct device *, void *));
extern struct iommu_group *iommu_group_get(struct device *dev);
464
extern struct iommu_group *iommu_group_ref_get(struct iommu_group *group);
A
Alex Williamson 已提交
465 466 467 468 469
extern void iommu_group_put(struct iommu_group *group);
extern int iommu_group_register_notifier(struct iommu_group *group,
					 struct notifier_block *nb);
extern int iommu_group_unregister_notifier(struct iommu_group *group,
					   struct notifier_block *nb);
470 471 472 473 474 475 476 477
extern int iommu_register_device_fault_handler(struct device *dev,
					iommu_dev_fault_handler_t handler,
					void *data);

extern int iommu_unregister_device_fault_handler(struct device *dev);

extern int iommu_report_device_fault(struct device *dev,
				     struct iommu_fault_event *evt);
478 479
extern int iommu_page_response(struct device *dev,
			       struct iommu_page_response *msg);
480

A
Alex Williamson 已提交
481
extern int iommu_group_id(struct iommu_group *group);
482
extern struct iommu_domain *iommu_group_default_domain(struct iommu_group *);
483

484
int iommu_enable_nesting(struct iommu_domain *domain);
485 486
int iommu_set_pgtable_quirks(struct iommu_domain *domain,
		unsigned long quirks);
487

488
void iommu_set_dma_strict(void);
489 490 491

extern int report_iommu_fault(struct iommu_domain *domain, struct device *dev,
			      unsigned long iova, int flags);
492

493
static inline void iommu_flush_iotlb_all(struct iommu_domain *domain)
494 495 496 497 498
{
	if (domain->ops->flush_iotlb_all)
		domain->ops->flush_iotlb_all(domain);
}

499
static inline void iommu_iotlb_sync(struct iommu_domain *domain,
500
				  struct iommu_iotlb_gather *iotlb_gather)
501 502
{
	if (domain->ops->iotlb_sync)
503
		domain->ops->iotlb_sync(domain, iotlb_gather);
504 505

	iommu_iotlb_gather_init(iotlb_gather);
506 507
}

508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529
/**
 * iommu_iotlb_gather_is_disjoint - Checks whether a new range is disjoint
 *
 * @gather: TLB gather data
 * @iova: start of page to invalidate
 * @size: size of page to invalidate
 *
 * Helper for IOMMU drivers to check whether a new range and the gathered range
 * are disjoint. For many IOMMUs, flushing the IOMMU in this case is better
 * than merging the two, which might lead to unnecessary invalidations.
 */
static inline
bool iommu_iotlb_gather_is_disjoint(struct iommu_iotlb_gather *gather,
				    unsigned long iova, size_t size)
{
	unsigned long start = iova, end = start + size - 1;

	return gather->end != 0 &&
		(end + 1 < gather->start || start > gather->end + 1);
}


530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561
/**
 * iommu_iotlb_gather_add_range - Gather for address-based TLB invalidation
 * @gather: TLB gather data
 * @iova: start of page to invalidate
 * @size: size of page to invalidate
 *
 * Helper for IOMMU drivers to build arbitrarily-sized invalidation commands
 * where only the address range matters, and simply minimising intermediate
 * syncs is preferred.
 */
static inline void iommu_iotlb_gather_add_range(struct iommu_iotlb_gather *gather,
						unsigned long iova, size_t size)
{
	unsigned long end = iova + size - 1;

	if (gather->start > iova)
		gather->start = iova;
	if (gather->end < end)
		gather->end = end;
}

/**
 * iommu_iotlb_gather_add_page - Gather for page-based TLB invalidation
 * @domain: IOMMU domain to be invalidated
 * @gather: TLB gather data
 * @iova: start of page to invalidate
 * @size: size of page to invalidate
 *
 * Helper for IOMMU drivers to build invalidation commands based on individual
 * pages, or with page size/table level hints which cannot be gathered if they
 * differ.
 */
562 563 564 565 566 567 568 569 570
static inline void iommu_iotlb_gather_add_page(struct iommu_domain *domain,
					       struct iommu_iotlb_gather *gather,
					       unsigned long iova, size_t size)
{
	/*
	 * If the new page is disjoint from the current range or is mapped at
	 * a different granularity, then sync the TLB so that the gather
	 * structure can be rewritten.
	 */
571 572 573
	if ((gather->pgsize && gather->pgsize != size) ||
	    iommu_iotlb_gather_is_disjoint(gather, iova, size))
		iommu_iotlb_sync(domain, gather);
574

575
	gather->pgsize = size;
576
	iommu_iotlb_gather_add_range(gather, iova, size);
577 578
}

579 580 581
static inline bool iommu_iotlb_gather_queued(struct iommu_iotlb_gather *gather)
{
	return gather && gather->queued;
582 583
}

584 585
/* PCI device grouping function */
extern struct iommu_group *pci_device_group(struct device *dev);
586 587
/* Generic device grouping function */
extern struct iommu_group *generic_device_group(struct device *dev);
588 589
/* FSL-MC device grouping function */
struct iommu_group *fsl_mc_device_group(struct device *dev);
590

R
Robin Murphy 已提交
591 592 593 594
/**
 * struct iommu_fwspec - per-device IOMMU instance data
 * @ops: ops for this device's IOMMU
 * @iommu_fwnode: firmware handle for this device's IOMMU
595
 * @flags: IOMMU_FWSPEC_* flags
R
Robin Murphy 已提交
596 597 598 599 600 601
 * @num_ids: number of associated device IDs
 * @ids: IDs which this device may present to the IOMMU
 */
struct iommu_fwspec {
	const struct iommu_ops	*ops;
	struct fwnode_handle	*iommu_fwnode;
602
	u32			flags;
R
Robin Murphy 已提交
603
	unsigned int		num_ids;
604
	u32			ids[];
R
Robin Murphy 已提交
605 606
};

607 608 609
/* ATS is supported */
#define IOMMU_FWSPEC_PCI_RC_ATS			(1 << 0)

610 611 612 613 614 615 616
/**
 * struct iommu_sva - handle to a device-mm bond
 */
struct iommu_sva {
	struct device			*dev;
};

R
Robin Murphy 已提交
617 618 619 620
int iommu_fwspec_init(struct device *dev, struct fwnode_handle *iommu_fwnode,
		      const struct iommu_ops *ops);
void iommu_fwspec_free(struct device *dev);
int iommu_fwspec_add_ids(struct device *dev, u32 *ids, int num_ids);
621
const struct iommu_ops *iommu_ops_from_fwnode(struct fwnode_handle *fwnode);
R
Robin Murphy 已提交
622

623 624
static inline struct iommu_fwspec *dev_iommu_fwspec_get(struct device *dev)
{
625 626 627 628
	if (dev->iommu)
		return dev->iommu->fwspec;
	else
		return NULL;
629 630 631 632 633
}

static inline void dev_iommu_fwspec_set(struct device *dev,
					struct iommu_fwspec *fwspec)
{
634
	dev->iommu->fwspec = fwspec;
635 636
}

637 638
static inline void *dev_iommu_priv_get(struct device *dev)
{
639 640 641 642
	if (dev->iommu)
		return dev->iommu->priv;
	else
		return NULL;
643 644 645 646
}

static inline void dev_iommu_priv_set(struct device *dev, void *priv)
{
647
	dev->iommu->priv = priv;
648 649
}

650 651 652
int iommu_probe_device(struct device *dev);
void iommu_release_device(struct device *dev);

653 654 655 656
int iommu_dev_enable_feature(struct device *dev, enum iommu_dev_features f);
int iommu_dev_disable_feature(struct device *dev, enum iommu_dev_features f);
bool iommu_dev_feature_enabled(struct device *dev, enum iommu_dev_features f);

657 658 659 660
struct iommu_sva *iommu_sva_bind_device(struct device *dev,
					struct mm_struct *mm,
					void *drvdata);
void iommu_sva_unbind_device(struct iommu_sva *handle);
661
u32 iommu_sva_get_pasid(struct iommu_sva *handle);
662

663 664
#else /* CONFIG_IOMMU_API */

665
struct iommu_ops {};
A
Alex Williamson 已提交
666
struct iommu_group {};
R
Robin Murphy 已提交
667
struct iommu_fwspec {};
668
struct iommu_device {};
J
Jacob Pan 已提交
669
struct iommu_fault_param {};
670
struct iommu_iotlb_gather {};
671

672
static inline bool iommu_present(struct bus_type *bus)
673 674 675 676
{
	return false;
}

677 678 679 680 681
static inline bool iommu_capable(struct bus_type *bus, enum iommu_cap cap)
{
	return false;
}

682
static inline struct iommu_domain *iommu_domain_alloc(struct bus_type *bus)
683 684 685 686
{
	return NULL;
}

687 688 689 690 691
static inline struct iommu_group *iommu_group_get_by_id(int id)
{
	return NULL;
}

692 693 694 695 696 697 698 699 700 701 702 703 704 705 706
static inline void iommu_domain_free(struct iommu_domain *domain)
{
}

static inline int iommu_attach_device(struct iommu_domain *domain,
				      struct device *dev)
{
	return -ENODEV;
}

static inline void iommu_detach_device(struct iommu_domain *domain,
				       struct device *dev)
{
}

707 708 709 710 711
static inline struct iommu_domain *iommu_get_domain_for_dev(struct device *dev)
{
	return NULL;
}

712
static inline int iommu_map(struct iommu_domain *domain, unsigned long iova,
713
			    phys_addr_t paddr, size_t size, int prot)
714 715 716 717
{
	return -ENODEV;
}

718 719 720 721 722 723 724
static inline int iommu_map_atomic(struct iommu_domain *domain,
				   unsigned long iova, phys_addr_t paddr,
				   size_t size, int prot)
{
	return -ENODEV;
}

725 726
static inline size_t iommu_unmap(struct iommu_domain *domain,
				 unsigned long iova, size_t size)
727
{
728
	return 0;
729 730
}

731
static inline size_t iommu_unmap_fast(struct iommu_domain *domain,
732 733
				      unsigned long iova, int gfp_order,
				      struct iommu_iotlb_gather *iotlb_gather)
734
{
735
	return 0;
736 737
}

738 739 740
static inline ssize_t iommu_map_sg(struct iommu_domain *domain,
				   unsigned long iova, struct scatterlist *sg,
				   unsigned int nents, int prot)
O
Olav Haugan 已提交
741
{
742
	return -ENODEV;
O
Olav Haugan 已提交
743 744
}

745
static inline ssize_t iommu_map_sg_atomic(struct iommu_domain *domain,
746 747 748
				  unsigned long iova, struct scatterlist *sg,
				  unsigned int nents, int prot)
{
749
	return -ENODEV;
750 751
}

752
static inline void iommu_flush_iotlb_all(struct iommu_domain *domain)
753 754 755
{
}

756
static inline void iommu_iotlb_sync(struct iommu_domain *domain,
757
				  struct iommu_iotlb_gather *iotlb_gather)
758 759 760
{
}

761
static inline phys_addr_t iommu_iova_to_phys(struct iommu_domain *domain, dma_addr_t iova)
762 763 764 765
{
	return 0;
}

766
static inline void iommu_set_fault_handler(struct iommu_domain *domain,
767
				iommu_fault_handler_t handler, void *token)
768 769 770
{
}

771
static inline void iommu_get_resv_regions(struct device *dev,
772 773 774 775
					struct list_head *list)
{
}

776
static inline void iommu_put_resv_regions(struct device *dev,
777 778 779 780
					struct list_head *list)
{
}

E
Eric Auger 已提交
781 782 783 784 785 786
static inline int iommu_get_group_resv_regions(struct iommu_group *group,
					       struct list_head *head)
{
	return -ENODEV;
}

787 788 789 790 791 792 793 794 795 796 797 798 799
static inline void iommu_set_default_passthrough(bool cmd_line)
{
}

static inline void iommu_set_default_translated(bool cmd_line)
{
}

static inline bool iommu_default_passthrough(void)
{
	return true;
}

800 801
static inline int iommu_attach_group(struct iommu_domain *domain,
				     struct iommu_group *group)
A
Alex Williamson 已提交
802 803 804 805
{
	return -ENODEV;
}

806 807
static inline void iommu_detach_group(struct iommu_domain *domain,
				      struct iommu_group *group)
A
Alex Williamson 已提交
808 809 810
{
}

811
static inline struct iommu_group *iommu_group_alloc(void)
A
Alex Williamson 已提交
812 813 814 815
{
	return ERR_PTR(-ENODEV);
}

816
static inline void *iommu_group_get_iommudata(struct iommu_group *group)
A
Alex Williamson 已提交
817 818 819 820
{
	return NULL;
}

821 822 823
static inline void iommu_group_set_iommudata(struct iommu_group *group,
					     void *iommu_data,
					     void (*release)(void *iommu_data))
A
Alex Williamson 已提交
824 825 826
{
}

827 828
static inline int iommu_group_set_name(struct iommu_group *group,
				       const char *name)
A
Alex Williamson 已提交
829 830 831 832
{
	return -ENODEV;
}

833 834
static inline int iommu_group_add_device(struct iommu_group *group,
					 struct device *dev)
A
Alex Williamson 已提交
835 836 837 838
{
	return -ENODEV;
}

839
static inline void iommu_group_remove_device(struct device *dev)
A
Alex Williamson 已提交
840 841 842
{
}

843 844 845
static inline int iommu_group_for_each_dev(struct iommu_group *group,
					   void *data,
					   int (*fn)(struct device *, void *))
A
Alex Williamson 已提交
846 847 848 849
{
	return -ENODEV;
}

850
static inline struct iommu_group *iommu_group_get(struct device *dev)
A
Alex Williamson 已提交
851 852 853 854
{
	return NULL;
}

855
static inline void iommu_group_put(struct iommu_group *group)
A
Alex Williamson 已提交
856 857 858
{
}

859 860
static inline int iommu_group_register_notifier(struct iommu_group *group,
						struct notifier_block *nb)
861 862 863 864
{
	return -ENODEV;
}

865 866
static inline int iommu_group_unregister_notifier(struct iommu_group *group,
						  struct notifier_block *nb)
A
Alex Williamson 已提交
867 868 869 870
{
	return 0;
}

871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889
static inline
int iommu_register_device_fault_handler(struct device *dev,
					iommu_dev_fault_handler_t handler,
					void *data)
{
	return -ENODEV;
}

static inline int iommu_unregister_device_fault_handler(struct device *dev)
{
	return 0;
}

static inline
int iommu_report_device_fault(struct device *dev, struct iommu_fault_event *evt)
{
	return -ENODEV;
}

890 891 892 893 894 895
static inline int iommu_page_response(struct device *dev,
				      struct iommu_page_response *msg)
{
	return -ENODEV;
}

896
static inline int iommu_group_id(struct iommu_group *group)
A
Alex Williamson 已提交
897 898 899
{
	return -ENODEV;
}
900

901 902
static inline int iommu_set_pgtable_quirks(struct iommu_domain *domain,
		unsigned long quirks)
903
{
904
	return 0;
905 906
}

907 908 909
static inline int iommu_device_register(struct iommu_device *iommu,
					const struct iommu_ops *ops,
					struct device *hwdev)
910
{
911
	return -ENODEV;
912 913
}

914 915 916 917 918
static inline struct iommu_device *dev_to_iommu_device(struct device *dev)
{
	return NULL;
}

919 920 921 922
static inline void iommu_iotlb_gather_init(struct iommu_iotlb_gather *gather)
{
}

923 924 925 926 927 928
static inline void iommu_iotlb_gather_add_page(struct iommu_domain *domain,
					       struct iommu_iotlb_gather *gather,
					       unsigned long iova, size_t size)
{
}

929 930 931 932 933
static inline bool iommu_iotlb_gather_queued(struct iommu_iotlb_gather *gather)
{
	return false;
}

934
static inline void iommu_device_unregister(struct iommu_device *iommu)
935 936 937
{
}

938 939 940 941
static inline int  iommu_device_sysfs_add(struct iommu_device *iommu,
					  struct device *parent,
					  const struct attribute_group **groups,
					  const char *fmt, ...)
942
{
943
	return -ENODEV;
944 945
}

946
static inline void iommu_device_sysfs_remove(struct iommu_device *iommu)
947 948 949
{
}

A
Alex Williamson 已提交
950
static inline int iommu_device_link(struct device *dev, struct device *link)
951 952 953 954
{
	return -EINVAL;
}

A
Alex Williamson 已提交
955
static inline void iommu_device_unlink(struct device *dev, struct device *link)
956 957 958
{
}

R
Robin Murphy 已提交
959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975
static inline int iommu_fwspec_init(struct device *dev,
				    struct fwnode_handle *iommu_fwnode,
				    const struct iommu_ops *ops)
{
	return -ENODEV;
}

static inline void iommu_fwspec_free(struct device *dev)
{
}

static inline int iommu_fwspec_add_ids(struct device *dev, u32 *ids,
				       int num_ids)
{
	return -ENODEV;
}

976
static inline
977
const struct iommu_ops *iommu_ops_from_fwnode(struct fwnode_handle *fwnode)
978 979 980 981
{
	return NULL;
}

982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999
static inline bool
iommu_dev_feature_enabled(struct device *dev, enum iommu_dev_features feat)
{
	return false;
}

static inline int
iommu_dev_enable_feature(struct device *dev, enum iommu_dev_features feat)
{
	return -ENODEV;
}

static inline int
iommu_dev_disable_feature(struct device *dev, enum iommu_dev_features feat)
{
	return -ENODEV;
}

1000 1001 1002 1003 1004 1005 1006 1007 1008 1009
static inline struct iommu_sva *
iommu_sva_bind_device(struct device *dev, struct mm_struct *mm, void *drvdata)
{
	return NULL;
}

static inline void iommu_sva_unbind_device(struct iommu_sva *handle)
{
}

1010
static inline u32 iommu_sva_get_pasid(struct iommu_sva *handle)
1011 1012 1013 1014
{
	return IOMMU_PASID_INVALID;
}

1015 1016 1017 1018
static inline struct iommu_fwspec *dev_iommu_fwspec_get(struct device *dev)
{
	return NULL;
}
1019 1020
#endif /* CONFIG_IOMMU_API */

1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036
/**
 * iommu_map_sgtable - Map the given buffer to the IOMMU domain
 * @domain:	The IOMMU domain to perform the mapping
 * @iova:	The start address to map the buffer
 * @sgt:	The sg_table object describing the buffer
 * @prot:	IOMMU protection bits
 *
 * Creates a mapping at @iova for the buffer described by a scatterlist
 * stored in the given sg_table object in the provided IOMMU domain.
 */
static inline size_t iommu_map_sgtable(struct iommu_domain *domain,
			unsigned long iova, struct sg_table *sgt, int prot)
{
	return iommu_map_sg(domain, iova, sgt->sgl, sgt->orig_nents, prot);
}

1037 1038 1039 1040 1041 1042 1043
#ifdef CONFIG_IOMMU_DEBUGFS
extern	struct dentry *iommu_debugfs_dir;
void iommu_debugfs_setup(void);
#else
static inline void iommu_debugfs_setup(void) {}
#endif

1044
#endif /* __LINUX_IOMMU_H */