mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-26 02:15:23 +07:00
970471914c
Some PCIe devices do not expect a PASID value in PRI Page Responses. If the "PRG Response PASID Required" bit in the PRI capability is zero, then the OS should not set the PASID field. Similarly on Arm SMMU, responses to stall events do not have a PASID. Currently iommu_page_response() systematically checks that the PASID in the page response corresponds to the one in the page request. This can't work with virtualization because a page response coming from a guest OS won't have a PASID if the passed-through device does not require one. Add a flag to page requests that declares whether the corresponding response needs to have a PASID. When this flag isn't set, allow page responses without PASID. Reported-by: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@huawei.com> Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org> Link: https://lore.kernel.org/r/20200616144712.748818-1-jean-philippe@linaro.org Signed-off-by: Joerg Roedel <jroedel@suse.de>
334 lines
11 KiB
C
334 lines
11 KiB
C
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
|
|
/*
|
|
* IOMMU user API definitions
|
|
*/
|
|
|
|
#ifndef _UAPI_IOMMU_H
|
|
#define _UAPI_IOMMU_H
|
|
|
|
#include <linux/types.h>
|
|
|
|
#define IOMMU_FAULT_PERM_READ (1 << 0) /* read */
|
|
#define IOMMU_FAULT_PERM_WRITE (1 << 1) /* write */
|
|
#define IOMMU_FAULT_PERM_EXEC (1 << 2) /* exec */
|
|
#define IOMMU_FAULT_PERM_PRIV (1 << 3) /* privileged */
|
|
|
|
/* Generic fault types, can be expanded IRQ remapping fault */
|
|
enum iommu_fault_type {
|
|
IOMMU_FAULT_DMA_UNRECOV = 1, /* unrecoverable fault */
|
|
IOMMU_FAULT_PAGE_REQ, /* page request fault */
|
|
};
|
|
|
|
enum iommu_fault_reason {
|
|
IOMMU_FAULT_REASON_UNKNOWN = 0,
|
|
|
|
/* Could not access the PASID table (fetch caused external abort) */
|
|
IOMMU_FAULT_REASON_PASID_FETCH,
|
|
|
|
/* PASID entry is invalid or has configuration errors */
|
|
IOMMU_FAULT_REASON_BAD_PASID_ENTRY,
|
|
|
|
/*
|
|
* PASID is out of range (e.g. exceeds the maximum PASID
|
|
* supported by the IOMMU) or disabled.
|
|
*/
|
|
IOMMU_FAULT_REASON_PASID_INVALID,
|
|
|
|
/*
|
|
* An external abort occurred fetching (or updating) a translation
|
|
* table descriptor
|
|
*/
|
|
IOMMU_FAULT_REASON_WALK_EABT,
|
|
|
|
/*
|
|
* Could not access the page table entry (Bad address),
|
|
* actual translation fault
|
|
*/
|
|
IOMMU_FAULT_REASON_PTE_FETCH,
|
|
|
|
/* Protection flag check failed */
|
|
IOMMU_FAULT_REASON_PERMISSION,
|
|
|
|
/* access flag check failed */
|
|
IOMMU_FAULT_REASON_ACCESS,
|
|
|
|
/* Output address of a translation stage caused Address Size fault */
|
|
IOMMU_FAULT_REASON_OOR_ADDRESS,
|
|
};
|
|
|
|
/**
|
|
* struct iommu_fault_unrecoverable - Unrecoverable fault data
|
|
* @reason: reason of the fault, from &enum iommu_fault_reason
|
|
* @flags: parameters of this fault (IOMMU_FAULT_UNRECOV_* values)
|
|
* @pasid: Process Address Space ID
|
|
* @perm: requested permission access using by the incoming transaction
|
|
* (IOMMU_FAULT_PERM_* values)
|
|
* @addr: offending page address
|
|
* @fetch_addr: address that caused a fetch abort, if any
|
|
*/
|
|
struct iommu_fault_unrecoverable {
|
|
__u32 reason;
|
|
#define IOMMU_FAULT_UNRECOV_PASID_VALID (1 << 0)
|
|
#define IOMMU_FAULT_UNRECOV_ADDR_VALID (1 << 1)
|
|
#define IOMMU_FAULT_UNRECOV_FETCH_ADDR_VALID (1 << 2)
|
|
__u32 flags;
|
|
__u32 pasid;
|
|
__u32 perm;
|
|
__u64 addr;
|
|
__u64 fetch_addr;
|
|
};
|
|
|
|
/**
|
|
* struct iommu_fault_page_request - Page Request data
|
|
* @flags: encodes whether the corresponding fields are valid and whether this
|
|
* is the last page in group (IOMMU_FAULT_PAGE_REQUEST_* values).
|
|
* When IOMMU_FAULT_PAGE_RESPONSE_NEEDS_PASID is set, the page response
|
|
* must have the same PASID value as the page request. When it is clear,
|
|
* the page response should not have a PASID.
|
|
* @pasid: Process Address Space ID
|
|
* @grpid: Page Request Group Index
|
|
* @perm: requested page permissions (IOMMU_FAULT_PERM_* values)
|
|
* @addr: page address
|
|
* @private_data: device-specific private information
|
|
*/
|
|
struct iommu_fault_page_request {
|
|
#define IOMMU_FAULT_PAGE_REQUEST_PASID_VALID (1 << 0)
|
|
#define IOMMU_FAULT_PAGE_REQUEST_LAST_PAGE (1 << 1)
|
|
#define IOMMU_FAULT_PAGE_REQUEST_PRIV_DATA (1 << 2)
|
|
#define IOMMU_FAULT_PAGE_RESPONSE_NEEDS_PASID (1 << 3)
|
|
__u32 flags;
|
|
__u32 pasid;
|
|
__u32 grpid;
|
|
__u32 perm;
|
|
__u64 addr;
|
|
__u64 private_data[2];
|
|
};
|
|
|
|
/**
|
|
* struct iommu_fault - Generic fault data
|
|
* @type: fault type from &enum iommu_fault_type
|
|
* @padding: reserved for future use (should be zero)
|
|
* @event: fault event, when @type is %IOMMU_FAULT_DMA_UNRECOV
|
|
* @prm: Page Request message, when @type is %IOMMU_FAULT_PAGE_REQ
|
|
* @padding2: sets the fault size to allow for future extensions
|
|
*/
|
|
struct iommu_fault {
|
|
__u32 type;
|
|
__u32 padding;
|
|
union {
|
|
struct iommu_fault_unrecoverable event;
|
|
struct iommu_fault_page_request prm;
|
|
__u8 padding2[56];
|
|
};
|
|
};
|
|
|
|
/**
|
|
* enum iommu_page_response_code - Return status of fault handlers
|
|
* @IOMMU_PAGE_RESP_SUCCESS: Fault has been handled and the page tables
|
|
* populated, retry the access. This is "Success" in PCI PRI.
|
|
* @IOMMU_PAGE_RESP_FAILURE: General error. Drop all subsequent faults from
|
|
* this device if possible. This is "Response Failure" in PCI PRI.
|
|
* @IOMMU_PAGE_RESP_INVALID: Could not handle this fault, don't retry the
|
|
* access. This is "Invalid Request" in PCI PRI.
|
|
*/
|
|
enum iommu_page_response_code {
|
|
IOMMU_PAGE_RESP_SUCCESS = 0,
|
|
IOMMU_PAGE_RESP_INVALID,
|
|
IOMMU_PAGE_RESP_FAILURE,
|
|
};
|
|
|
|
/**
|
|
* struct iommu_page_response - Generic page response information
|
|
* @version: API version of this structure
|
|
* @flags: encodes whether the corresponding fields are valid
|
|
* (IOMMU_FAULT_PAGE_RESPONSE_* values)
|
|
* @pasid: Process Address Space ID
|
|
* @grpid: Page Request Group Index
|
|
* @code: response code from &enum iommu_page_response_code
|
|
*/
|
|
struct iommu_page_response {
|
|
#define IOMMU_PAGE_RESP_VERSION_1 1
|
|
__u32 version;
|
|
#define IOMMU_PAGE_RESP_PASID_VALID (1 << 0)
|
|
__u32 flags;
|
|
__u32 pasid;
|
|
__u32 grpid;
|
|
__u32 code;
|
|
};
|
|
|
|
/* defines the granularity of the invalidation */
|
|
enum iommu_inv_granularity {
|
|
IOMMU_INV_GRANU_DOMAIN, /* domain-selective invalidation */
|
|
IOMMU_INV_GRANU_PASID, /* PASID-selective invalidation */
|
|
IOMMU_INV_GRANU_ADDR, /* page-selective invalidation */
|
|
IOMMU_INV_GRANU_NR, /* number of invalidation granularities */
|
|
};
|
|
|
|
/**
|
|
* struct iommu_inv_addr_info - Address Selective Invalidation Structure
|
|
*
|
|
* @flags: indicates the granularity of the address-selective invalidation
|
|
* - If the PASID bit is set, the @pasid field is populated and the invalidation
|
|
* relates to cache entries tagged with this PASID and matching the address
|
|
* range.
|
|
* - If ARCHID bit is set, @archid is populated and the invalidation relates
|
|
* to cache entries tagged with this architecture specific ID and matching
|
|
* the address range.
|
|
* - Both PASID and ARCHID can be set as they may tag different caches.
|
|
* - If neither PASID or ARCHID is set, global addr invalidation applies.
|
|
* - The LEAF flag indicates whether only the leaf PTE caching needs to be
|
|
* invalidated and other paging structure caches can be preserved.
|
|
* @pasid: process address space ID
|
|
* @archid: architecture-specific ID
|
|
* @addr: first stage/level input address
|
|
* @granule_size: page/block size of the mapping in bytes
|
|
* @nb_granules: number of contiguous granules to be invalidated
|
|
*/
|
|
struct iommu_inv_addr_info {
|
|
#define IOMMU_INV_ADDR_FLAGS_PASID (1 << 0)
|
|
#define IOMMU_INV_ADDR_FLAGS_ARCHID (1 << 1)
|
|
#define IOMMU_INV_ADDR_FLAGS_LEAF (1 << 2)
|
|
__u32 flags;
|
|
__u32 archid;
|
|
__u64 pasid;
|
|
__u64 addr;
|
|
__u64 granule_size;
|
|
__u64 nb_granules;
|
|
};
|
|
|
|
/**
|
|
* struct iommu_inv_pasid_info - PASID Selective Invalidation Structure
|
|
*
|
|
* @flags: indicates the granularity of the PASID-selective invalidation
|
|
* - If the PASID bit is set, the @pasid field is populated and the invalidation
|
|
* relates to cache entries tagged with this PASID and matching the address
|
|
* range.
|
|
* - If the ARCHID bit is set, the @archid is populated and the invalidation
|
|
* relates to cache entries tagged with this architecture specific ID and
|
|
* matching the address range.
|
|
* - Both PASID and ARCHID can be set as they may tag different caches.
|
|
* - At least one of PASID or ARCHID must be set.
|
|
* @pasid: process address space ID
|
|
* @archid: architecture-specific ID
|
|
*/
|
|
struct iommu_inv_pasid_info {
|
|
#define IOMMU_INV_PASID_FLAGS_PASID (1 << 0)
|
|
#define IOMMU_INV_PASID_FLAGS_ARCHID (1 << 1)
|
|
__u32 flags;
|
|
__u32 archid;
|
|
__u64 pasid;
|
|
};
|
|
|
|
/**
|
|
* struct iommu_cache_invalidate_info - First level/stage invalidation
|
|
* information
|
|
* @version: API version of this structure
|
|
* @cache: bitfield that allows to select which caches to invalidate
|
|
* @granularity: defines the lowest granularity used for the invalidation:
|
|
* domain > PASID > addr
|
|
* @padding: reserved for future use (should be zero)
|
|
* @pasid_info: invalidation data when @granularity is %IOMMU_INV_GRANU_PASID
|
|
* @addr_info: invalidation data when @granularity is %IOMMU_INV_GRANU_ADDR
|
|
*
|
|
* Not all the combinations of cache/granularity are valid:
|
|
*
|
|
* +--------------+---------------+---------------+---------------+
|
|
* | type / | DEV_IOTLB | IOTLB | PASID |
|
|
* | granularity | | | cache |
|
|
* +==============+===============+===============+===============+
|
|
* | DOMAIN | N/A | Y | Y |
|
|
* +--------------+---------------+---------------+---------------+
|
|
* | PASID | Y | Y | Y |
|
|
* +--------------+---------------+---------------+---------------+
|
|
* | ADDR | Y | Y | N/A |
|
|
* +--------------+---------------+---------------+---------------+
|
|
*
|
|
* Invalidations by %IOMMU_INV_GRANU_DOMAIN don't take any argument other than
|
|
* @version and @cache.
|
|
*
|
|
* If multiple cache types are invalidated simultaneously, they all
|
|
* must support the used granularity.
|
|
*/
|
|
struct iommu_cache_invalidate_info {
|
|
#define IOMMU_CACHE_INVALIDATE_INFO_VERSION_1 1
|
|
__u32 version;
|
|
/* IOMMU paging structure cache */
|
|
#define IOMMU_CACHE_INV_TYPE_IOTLB (1 << 0) /* IOMMU IOTLB */
|
|
#define IOMMU_CACHE_INV_TYPE_DEV_IOTLB (1 << 1) /* Device IOTLB */
|
|
#define IOMMU_CACHE_INV_TYPE_PASID (1 << 2) /* PASID cache */
|
|
#define IOMMU_CACHE_INV_TYPE_NR (3)
|
|
__u8 cache;
|
|
__u8 granularity;
|
|
__u8 padding[2];
|
|
union {
|
|
struct iommu_inv_pasid_info pasid_info;
|
|
struct iommu_inv_addr_info addr_info;
|
|
};
|
|
};
|
|
|
|
/**
|
|
* struct iommu_gpasid_bind_data_vtd - Intel VT-d specific data on device and guest
|
|
* SVA binding.
|
|
*
|
|
* @flags: VT-d PASID table entry attributes
|
|
* @pat: Page attribute table data to compute effective memory type
|
|
* @emt: Extended memory type
|
|
*
|
|
* Only guest vIOMMU selectable and effective options are passed down to
|
|
* the host IOMMU.
|
|
*/
|
|
struct iommu_gpasid_bind_data_vtd {
|
|
#define IOMMU_SVA_VTD_GPASID_SRE (1 << 0) /* supervisor request */
|
|
#define IOMMU_SVA_VTD_GPASID_EAFE (1 << 1) /* extended access enable */
|
|
#define IOMMU_SVA_VTD_GPASID_PCD (1 << 2) /* page-level cache disable */
|
|
#define IOMMU_SVA_VTD_GPASID_PWT (1 << 3) /* page-level write through */
|
|
#define IOMMU_SVA_VTD_GPASID_EMTE (1 << 4) /* extended mem type enable */
|
|
#define IOMMU_SVA_VTD_GPASID_CD (1 << 5) /* PASID-level cache disable */
|
|
__u64 flags;
|
|
__u32 pat;
|
|
__u32 emt;
|
|
};
|
|
|
|
#define IOMMU_SVA_VTD_GPASID_MTS_MASK (IOMMU_SVA_VTD_GPASID_CD | \
|
|
IOMMU_SVA_VTD_GPASID_EMTE | \
|
|
IOMMU_SVA_VTD_GPASID_PCD | \
|
|
IOMMU_SVA_VTD_GPASID_PWT)
|
|
|
|
/**
|
|
* struct iommu_gpasid_bind_data - Information about device and guest PASID binding
|
|
* @version: Version of this data structure
|
|
* @format: PASID table entry format
|
|
* @flags: Additional information on guest bind request
|
|
* @gpgd: Guest page directory base of the guest mm to bind
|
|
* @hpasid: Process address space ID used for the guest mm in host IOMMU
|
|
* @gpasid: Process address space ID used for the guest mm in guest IOMMU
|
|
* @addr_width: Guest virtual address width
|
|
* @padding: Reserved for future use (should be zero)
|
|
* @vtd: Intel VT-d specific data
|
|
*
|
|
* Guest to host PASID mapping can be an identity or non-identity, where guest
|
|
* has its own PASID space. For non-identify mapping, guest to host PASID lookup
|
|
* is needed when VM programs guest PASID into an assigned device. VMM may
|
|
* trap such PASID programming then request host IOMMU driver to convert guest
|
|
* PASID to host PASID based on this bind data.
|
|
*/
|
|
struct iommu_gpasid_bind_data {
|
|
#define IOMMU_GPASID_BIND_VERSION_1 1
|
|
__u32 version;
|
|
#define IOMMU_PASID_FORMAT_INTEL_VTD 1
|
|
__u32 format;
|
|
#define IOMMU_SVA_GPASID_VAL (1 << 0) /* guest PASID valid */
|
|
__u64 flags;
|
|
__u64 gpgd;
|
|
__u64 hpasid;
|
|
__u64 gpasid;
|
|
__u32 addr_width;
|
|
__u8 padding[12];
|
|
/* Vendor specific data */
|
|
union {
|
|
struct iommu_gpasid_bind_data_vtd vtd;
|
|
};
|
|
};
|
|
|
|
#endif /* _UAPI_IOMMU_H */
|