-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge tag 'iommu-updates-v3.17' of git://git.kernel.org/pub/scm/linux…
…/kernel/git/joro/iommu Pull iommu updates from Joerg Roedel: "This time with: - support for the generic PCI device alias code in x86 IOMMU drivers - a new sysfs interface for IOMMUs - preparations for hotplug support in the Intel IOMMU driver - change the AMD IOMMUv2 driver to not hold references to core data structures like mm_struct or task_struct. Rely on mmu_notifers instead. - removal of the OMAP IOVMM interface, all users of it are converted to DMA-API now - make the struct iommu_ops const everywhere - initial PCI support for the ARM SMMU driver - there is now a generic device tree binding documented for ARM IOMMUs - various fixes and cleanups all over the place Also included are some changes to the OMAP code, which are acked by the maintainer" * tag 'iommu-updates-v3.17' of git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu: (67 commits) devicetree: Add generic IOMMU device tree bindings iommu/vt-d: Fix race setting IRQ CPU affinity while freeing IRQ iommu/amd: Fix 2 typos in comments iommu/amd: Fix device_state reference counting iommu/amd: Remove change_pte mmu_notifier call-back iommu/amd: Don't set pasid_state->mm to NULL in unbind_pasid iommu/exynos: Select ARM_DMA_USE_IOMMU iommu/vt-d: Exclude devices using RMRRs from IOMMU API domains iommu/omap: Remove platform data da_start and da_end fields ARM: omap: Don't set iommu pdata da_start and da_end fields iommu/omap: Remove virtual memory manager iommu/vt-d: Fix issue in computing domain's iommu_snooping flag iommu/vt-d: Introduce helper function iova_size() to improve code readability iommu/vt-d: Introduce helper domain_pfn_within_range() to simplify code iommu/vt-d: Simplify intel_unmap_sg() and kill duplicated code iommu/vt-d: Change iommu_enable/disable_translation to return void iommu/vt-d: Simplify include/linux/dmar.h iommu/vt-d: Avoid freeing virtual machine domain in free_dmar_iommu() iommu/vt-d: Fix possible invalid memory access caused by free_dmar_iommu() iommu/vt-d: Allocate dynamic domain id for virtual domains only ...
- Loading branch information
Showing
41 changed files
with
1,567 additions
and
2,050 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
What: /sys/class/iommu/<iommu>/devices/ | ||
Date: June 2014 | ||
KernelVersion: 3.17 | ||
Contact: Alex Williamson <alex.williamson@redhat.com> | ||
Description: | ||
IOMMU drivers are able to link devices managed by a | ||
given IOMMU here to allow association of IOMMU to | ||
device. | ||
|
||
What: /sys/devices/.../iommu | ||
Date: June 2014 | ||
KernelVersion: 3.17 | ||
Contact: Alex Williamson <alex.williamson@redhat.com> | ||
Description: | ||
IOMMU drivers are able to link the IOMMU for a | ||
given device here to allow association of device to | ||
IOMMU. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
What: /sys/class/iommu/<iommu>/amd-iommu/cap | ||
Date: June 2014 | ||
KernelVersion: 3.17 | ||
Contact: Alex Williamson <alex.williamson@redhat.com> | ||
Description: | ||
IOMMU capability header as documented in the AMD IOMMU | ||
specification. Format: %x | ||
|
||
What: /sys/class/iommu/<iommu>/amd-iommu/features | ||
Date: June 2014 | ||
KernelVersion: 3.17 | ||
Contact: Alex Williamson <alex.williamson@redhat.com> | ||
Description: | ||
Extended features of the IOMMU. Format: %llx |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
What: /sys/class/iommu/<iommu>/intel-iommu/address | ||
Date: June 2014 | ||
KernelVersion: 3.17 | ||
Contact: Alex Williamson <alex.williamson@redhat.com> | ||
Description: | ||
Physical address of the VT-d DRHD for this IOMMU. | ||
Format: %llx. This allows association of a sysfs | ||
intel-iommu with a DMAR DRHD table entry. | ||
|
||
What: /sys/class/iommu/<iommu>/intel-iommu/cap | ||
Date: June 2014 | ||
KernelVersion: 3.17 | ||
Contact: Alex Williamson <alex.williamson@redhat.com> | ||
Description: | ||
The cached hardware capability register value | ||
of this DRHD unit. Format: %llx. | ||
|
||
What: /sys/class/iommu/<iommu>/intel-iommu/ecap | ||
Date: June 2014 | ||
KernelVersion: 3.17 | ||
Contact: Alex Williamson <alex.williamson@redhat.com> | ||
Description: | ||
The cached hardware extended capability register | ||
value of this DRHD unit. Format: %llx. | ||
|
||
What: /sys/class/iommu/<iommu>/intel-iommu/version | ||
Date: June 2014 | ||
KernelVersion: 3.17 | ||
Contact: Alex Williamson <alex.williamson@redhat.com> | ||
Description: | ||
The architecture version as reported from the | ||
VT-d VER_REG. Format: %d:%d, major:minor |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,182 @@ | ||
This document describes the generic device tree binding for IOMMUs and their | ||
master(s). | ||
|
||
|
||
IOMMU device node: | ||
================== | ||
|
||
An IOMMU can provide the following services: | ||
|
||
* Remap address space to allow devices to access physical memory ranges that | ||
they otherwise wouldn't be capable of accessing. | ||
|
||
Example: 32-bit DMA to 64-bit physical addresses | ||
|
||
* Implement scatter-gather at page level granularity so that the device does | ||
not have to. | ||
|
||
* Provide system protection against "rogue" DMA by forcing all accesses to go | ||
through the IOMMU and faulting when encountering accesses to unmapped | ||
address regions. | ||
|
||
* Provide address space isolation between multiple contexts. | ||
|
||
Example: Virtualization | ||
|
||
Device nodes compatible with this binding represent hardware with some of the | ||
above capabilities. | ||
|
||
IOMMUs can be single-master or multiple-master. Single-master IOMMU devices | ||
typically have a fixed association to the master device, whereas multiple- | ||
master IOMMU devices can translate accesses from more than one master. | ||
|
||
The device tree node of the IOMMU device's parent bus must contain a valid | ||
"dma-ranges" property that describes how the physical address space of the | ||
IOMMU maps to memory. An empty "dma-ranges" property means that there is a | ||
1:1 mapping from IOMMU to memory. | ||
|
||
Required properties: | ||
-------------------- | ||
- #iommu-cells: The number of cells in an IOMMU specifier needed to encode an | ||
address. | ||
|
||
The meaning of the IOMMU specifier is defined by the device tree binding of | ||
the specific IOMMU. Below are a few examples of typical use-cases: | ||
|
||
- #iommu-cells = <0>: Single master IOMMU devices are not configurable and | ||
therefore no additional information needs to be encoded in the specifier. | ||
This may also apply to multiple master IOMMU devices that do not allow the | ||
association of masters to be configured. Note that an IOMMU can by design | ||
be multi-master yet only expose a single master in a given configuration. | ||
In such cases the number of cells will usually be 1 as in the next case. | ||
- #iommu-cells = <1>: Multiple master IOMMU devices may need to be configured | ||
in order to enable translation for a given master. In such cases the single | ||
address cell corresponds to the master device's ID. In some cases more than | ||
one cell can be required to represent a single master ID. | ||
- #iommu-cells = <4>: Some IOMMU devices allow the DMA window for masters to | ||
be configured. The first cell of the address in this may contain the master | ||
device's ID for example, while the second cell could contain the start of | ||
the DMA window for the given device. The length of the DMA window is given | ||
by the third and fourth cells. | ||
|
||
Note that these are merely examples and real-world use-cases may use different | ||
definitions to represent their individual needs. Always refer to the specific | ||
IOMMU binding for the exact meaning of the cells that make up the specifier. | ||
|
||
|
||
IOMMU master node: | ||
================== | ||
|
||
Devices that access memory through an IOMMU are called masters. A device can | ||
have multiple master interfaces (to one or more IOMMU devices). | ||
|
||
Required properties: | ||
-------------------- | ||
- iommus: A list of phandle and IOMMU specifier pairs that describe the IOMMU | ||
master interfaces of the device. One entry in the list describes one master | ||
interface of the device. | ||
|
||
When an "iommus" property is specified in a device tree node, the IOMMU will | ||
be used for address translation. If a "dma-ranges" property exists in the | ||
device's parent node it will be ignored. An exception to this rule is if the | ||
referenced IOMMU is disabled, in which case the "dma-ranges" property of the | ||
parent shall take effect. Note that merely disabling a device tree node does | ||
not guarantee that the IOMMU is really disabled since the hardware may not | ||
have a means to turn off translation. But it is invalid in such cases to | ||
disable the IOMMU's device tree node in the first place because it would | ||
prevent any driver from properly setting up the translations. | ||
|
||
|
||
Notes: | ||
====== | ||
|
||
One possible extension to the above is to use an "iommus" property along with | ||
a "dma-ranges" property in a bus device node (such as PCI host bridges). This | ||
can be useful to describe how children on the bus relate to the IOMMU if they | ||
are not explicitly listed in the device tree (e.g. PCI devices). However, the | ||
requirements of that use-case haven't been fully determined yet. Implementing | ||
this is therefore not recommended without further discussion and extension of | ||
this binding. | ||
|
||
|
||
Examples: | ||
========= | ||
|
||
Single-master IOMMU: | ||
-------------------- | ||
|
||
iommu { | ||
#iommu-cells = <0>; | ||
}; | ||
|
||
master { | ||
iommus = <&{/iommu}>; | ||
}; | ||
|
||
Multiple-master IOMMU with fixed associations: | ||
---------------------------------------------- | ||
|
||
/* multiple-master IOMMU */ | ||
iommu { | ||
/* | ||
* Masters are statically associated with this IOMMU and share | ||
* the same address translations because the IOMMU does not | ||
* have sufficient information to distinguish between masters. | ||
* | ||
* Consequently address translation is always on or off for | ||
* all masters at any given point in time. | ||
*/ | ||
#iommu-cells = <0>; | ||
}; | ||
|
||
/* static association with IOMMU */ | ||
master@1 { | ||
reg = <1>; | ||
iommus = <&{/iommu}>; | ||
}; | ||
|
||
/* static association with IOMMU */ | ||
master@2 { | ||
reg = <2>; | ||
iommus = <&{/iommu}>; | ||
}; | ||
|
||
Multiple-master IOMMU: | ||
---------------------- | ||
|
||
iommu { | ||
/* the specifier represents the ID of the master */ | ||
#iommu-cells = <1>; | ||
}; | ||
|
||
master@1 { | ||
/* device has master ID 42 in the IOMMU */ | ||
iommus = <&{/iommu} 42>; | ||
}; | ||
|
||
master@2 { | ||
/* device has master IDs 23 and 24 in the IOMMU */ | ||
iommus = <&{/iommu} 23>, <&{/iommu} 24>; | ||
}; | ||
|
||
Multiple-master IOMMU with configurable DMA window: | ||
--------------------------------------------------- | ||
|
||
/ { | ||
iommu { | ||
/* | ||
* One cell for the master ID and one cell for the | ||
* address of the DMA window. The length of the DMA | ||
* window is encoded in two cells. | ||
* | ||
* The DMA window is the range addressable by the | ||
* master (i.e. the I/O virtual address space). | ||
*/ | ||
#iommu-cells = <4>; | ||
}; | ||
|
||
master { | ||
/* master ID 42, 4 GiB DMA window starting at 0 */ | ||
iommus = <&{/iommu} 42 0 0x1 0x0>; | ||
}; | ||
}; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.