@@ -1091,7 +1091,7 @@ static void build_inv_iotlb_pasid(struct iommu_cmd *cmd, u16 devid, u32 pasid,
1091
1091
}
1092
1092
1093
1093
static void build_complete_ppr (struct iommu_cmd * cmd , u16 devid , u32 pasid ,
1094
- int status , int tag , bool gn )
1094
+ int status , int tag , u8 gn )
1095
1095
{
1096
1096
memset (cmd , 0 , sizeof (* cmd ));
1097
1097
@@ -1314,7 +1314,7 @@ static int device_flush_iotlb(struct iommu_dev_data *dev_data,
1314
1314
struct iommu_cmd cmd ;
1315
1315
int qdep ;
1316
1316
1317
- qdep = dev_data -> ats . qdep ;
1317
+ qdep = dev_data -> ats_qdep ;
1318
1318
iommu = rlookup_amd_iommu (dev_data -> dev );
1319
1319
if (!iommu )
1320
1320
return - EINVAL ;
@@ -1365,7 +1365,7 @@ static int device_flush_dte(struct iommu_dev_data *dev_data)
1365
1365
return ret ;
1366
1366
}
1367
1367
1368
- if (dev_data -> ats . enabled )
1368
+ if (dev_data -> ats_enabled )
1369
1369
ret = device_flush_iotlb (dev_data , 0 , ~0UL );
1370
1370
1371
1371
return ret ;
@@ -1398,7 +1398,7 @@ static void __domain_flush_pages(struct protection_domain *domain,
1398
1398
1399
1399
list_for_each_entry (dev_data , & domain -> dev_list , list ) {
1400
1400
1401
- if (!dev_data -> ats . enabled )
1401
+ if (!dev_data -> ats_enabled )
1402
1402
continue ;
1403
1403
1404
1404
ret |= device_flush_iotlb (dev_data , address , size );
@@ -1718,7 +1718,7 @@ static void do_attach(struct iommu_dev_data *dev_data,
1718
1718
iommu = rlookup_amd_iommu (dev_data -> dev );
1719
1719
if (!iommu )
1720
1720
return ;
1721
- ats = dev_data -> ats . enabled ;
1721
+ ats = dev_data -> ats_enabled ;
1722
1722
1723
1723
/* Update data structures */
1724
1724
dev_data -> domain = domain ;
@@ -1856,14 +1856,14 @@ static int attach_device(struct device *dev,
1856
1856
if (pdev_pri_ats_enable (pdev ) != 0 )
1857
1857
goto out ;
1858
1858
1859
- dev_data -> ats . enabled = true ;
1860
- dev_data -> ats . qdep = pci_ats_queue_depth (pdev );
1859
+ dev_data -> ats_enabled = 1 ;
1860
+ dev_data -> ats_qdep = pci_ats_queue_depth (pdev );
1861
1861
dev_data -> pri_tlp = pci_prg_resp_pasid_required (pdev );
1862
1862
}
1863
1863
} else if (amd_iommu_iotlb_sup &&
1864
1864
pci_enable_ats (pdev , PAGE_SHIFT ) == 0 ) {
1865
- dev_data -> ats . enabled = true ;
1866
- dev_data -> ats . qdep = pci_ats_queue_depth (pdev );
1865
+ dev_data -> ats_enabled = 1 ;
1866
+ dev_data -> ats_qdep = pci_ats_queue_depth (pdev );
1867
1867
}
1868
1868
1869
1869
skip_ats_check :
@@ -1920,10 +1920,10 @@ static void detach_device(struct device *dev)
1920
1920
1921
1921
if (domain -> flags & PD_IOMMUV2_MASK && dev_data -> iommu_v2 )
1922
1922
pdev_iommuv2_disable (to_pci_dev (dev ));
1923
- else if (dev_data -> ats . enabled )
1923
+ else if (dev_data -> ats_enabled )
1924
1924
pci_disable_ats (to_pci_dev (dev ));
1925
1925
1926
- dev_data -> ats . enabled = false ;
1926
+ dev_data -> ats_enabled = 0 ;
1927
1927
1928
1928
out :
1929
1929
spin_unlock (& dev_data -> lock );
@@ -2013,7 +2013,7 @@ static void update_device_table(struct protection_domain *domain)
2013
2013
if (!iommu )
2014
2014
continue ;
2015
2015
set_dte_entry (iommu , dev_data -> devid , domain ,
2016
- dev_data -> ats . enabled , dev_data -> iommu_v2 );
2016
+ dev_data -> ats_enabled , dev_data -> iommu_v2 );
2017
2017
clone_aliases (iommu , dev_data -> dev );
2018
2018
}
2019
2019
}
@@ -2612,10 +2612,10 @@ static int __flush_pasid(struct protection_domain *domain, u32 pasid,
2612
2612
There might be non-IOMMUv2 capable devices in an IOMMUv2
2613
2613
* domain.
2614
2614
*/
2615
- if (!dev_data -> ats . enabled )
2615
+ if (!dev_data -> ats_enabled )
2616
2616
continue ;
2617
2617
2618
- qdep = dev_data -> ats . qdep ;
2618
+ qdep = dev_data -> ats_qdep ;
2619
2619
iommu = rlookup_amd_iommu (dev_data -> dev );
2620
2620
if (!iommu )
2621
2621
continue ;
0 commit comments