2019-05-19 15:07:45 +03:00
# SPDX-License-Identifier: GPL-2.0-only
2019-01-03 00:16:57 +03:00
# The IOVA library may also be used by non-IOMMU_API users
config IOMMU_IOVA
tristate
2019-10-02 22:42:41 +03:00
# The IOASID library may also be used by non-IOMMU_API users
config IOASID
tristate
2011-06-02 03:48:05 +04:00
# IOMMU_API always gets selected by whoever wants it.
config IOMMU_API
bool
2011-06-02 04:20:08 +04:00
2011-06-14 17:51:54 +04:00
menuconfig IOMMU_SUPPORT
bool "IOMMU Hardware Support"
2015-01-28 17:45:53 +03:00
depends on MMU
2011-06-14 17:51:54 +04:00
default y
2020-06-13 19:50:22 +03:00
help
2011-06-14 17:51:54 +04:00
Say Y here if you want to compile device drivers for IO Memory
Management Units into the kernel. These devices usually allow to
remap DMA requests and/or remap interrupts from other devices on the
system.
if IOMMU_SUPPORT
2014-11-14 20:16:49 +03:00
menu "Generic IOMMU Pagetable Support"
# Selected by the actual pagetable implementations
config IOMMU_IO_PGTABLE
bool
2014-11-14 20:18:23 +03:00
config IOMMU_IO_PGTABLE_LPAE
bool "ARMv7/v8 Long Descriptor Format"
select IOMMU_IO_PGTABLE
2018-04-17 20:49:09 +03:00
depends on ARM || ARM64 || (COMPILE_TEST && !GENERIC_ATOMIC64)
2014-11-14 20:18:23 +03:00
help
Enable support for the ARM long descriptor pagetable format.
This allocator supports 4K/2M/1G, 16K/32M and 64K/512M page
sizes at both stage-1 and stage-2, as well as address spaces
up to 48-bits in size.
2014-11-18 02:31:12 +03:00
config IOMMU_IO_PGTABLE_LPAE_SELFTEST
bool "LPAE selftests"
depends on IOMMU_IO_PGTABLE_LPAE
help
Enable self-tests for LPAE page table allocator. This performs
a series of page-table consistency checks during boot.
If unsure, say N here.
2016-01-26 20:13:13 +03:00
config IOMMU_IO_PGTABLE_ARMV7S
bool "ARMv7/v8 Short Descriptor Format"
select IOMMU_IO_PGTABLE
2018-04-17 20:49:09 +03:00
depends on ARM || ARM64 || COMPILE_TEST
2016-01-26 20:13:13 +03:00
help
Enable support for the ARM Short-descriptor pagetable format.
This supports 32-bit virtual and physical addresses mapped using
2-level tables with 4KB pages/1MB sections, and contiguous entries
for 64KB pages/16MB supersections if indicated by the IOMMU driver.
config IOMMU_IO_PGTABLE_ARMV7S_SELFTEST
bool "ARMv7s selftests"
depends on IOMMU_IO_PGTABLE_ARMV7S
help
Enable self-tests for ARMv7s page table allocator. This performs
a series of page-table consistency checks during boot.
If unsure, say N here.
2014-11-14 20:16:49 +03:00
endmenu
2018-06-13 00:41:21 +03:00
config IOMMU_DEBUGFS
bool "Export IOMMU internals in DebugFS"
depends on DEBUG_FS
help
Allows exposure of IOMMU device internals. This option enables
the use of debugfs by IOMMU drivers as required. Devices can,
at initialization time, cause the IOMMU code to create a top-level
debug/iommu directory, and then populate a subdirectory with
entries as required.
2018-07-20 21:02:23 +03:00
config IOMMU_DEFAULT_PASSTHROUGH
bool "IOMMU passthrough by default"
depends on IOMMU_API
2019-11-21 06:19:30 +03:00
help
2018-07-20 21:02:23 +03:00
Enable passthrough by default, removing the need to pass in
iommu.passthrough=on or iommu=pt through command line. If this
is enabled, you can still disable with iommu.passthrough=off
or iommu=nopt depending on the architecture.
If unsure, say N here.
2012-06-25 15:23:54 +04:00
config OF_IOMMU
2019-11-21 06:19:30 +03:00
def_bool y
depends on OF && IOMMU_API
2012-06-25 15:23:54 +04:00
2015-10-01 22:13:58 +03:00
# IOMMU-agnostic DMA-mapping layer
config IOMMU_DMA
bool
select IOMMU_API
select IOMMU_IOVA
2019-05-01 16:58:19 +03:00
select IRQ_MSI_IOMMU
2016-02-29 14:13:39 +03:00
select NEED_SG_DMA_LENGTH
2015-10-01 22:13:58 +03:00
2013-07-15 08:50:57 +04:00
config FSL_PAMU
bool "Freescale IOMMU support"
2017-08-09 16:00:36 +03:00
depends on PCI
2017-08-09 16:04:47 +03:00
depends on PHYS_64BIT
2016-03-17 07:15:44 +03:00
depends on PPC_E500MC || (COMPILE_TEST && PPC)
2013-07-15 08:50:57 +04:00
select IOMMU_API
select GENERIC_ALLOCATOR
help
Freescale PAMU support. PAMU is the IOMMU present on Freescale QorIQ platforms.
PAMU can authorize memory access, remap the memory address, and remap I/O
transaction types.
2011-06-02 04:20:08 +04:00
# MSM IOMMU support
config MSM_IOMMU
bool "MSM IOMMU Support"
2015-01-20 18:13:33 +03:00
depends on ARM
depends on ARCH_MSM8X60 || ARCH_MSM8960 || COMPILE_TEST
2011-06-02 04:20:08 +04:00
select IOMMU_API
2016-06-13 14:36:06 +03:00
select IOMMU_IO_PGTABLE_ARMV7S
2011-06-02 04:20:08 +04:00
help
Support for the IOMMUs found on certain Qualcomm SOCs.
These IOMMUs allow virtualization of the address space used by most
cores within the multimedia subsystem.
If unsure, say N here.
2011-06-05 19:22:18 +04:00
# AMD IOMMU support
config AMD_IOMMU
bool "AMD IOMMU support"
select SWIOTLB
select PCI_MSI
2011-11-17 20:24:28 +04:00
select PCI_ATS
select PCI_PRI
select PCI_PASID
2011-06-05 19:22:18 +04:00
select IOMMU_API
2016-07-05 12:12:49 +03:00
select IOMMU_IOVA
2019-09-08 19:56:41 +03:00
select IOMMU_DMA
x86, build, pci: Fix PCI_MSI build on !SMP
Commit ebd97be635 ('PCI: remove ARCH_SUPPORTS_MSI kconfig option')
removed the ARCH_SUPPORTS_MSI option which architectures could select
to indicate that they support MSI. Now, all architectures are supposed
to build fine when MSI support is enabled: instead of having the
architecture tell *when* MSI support can be used, it's up to the
architecture code to ensure that MSI support can be enabled.
On x86, commit ebd97be635 removed the following line:
select ARCH_SUPPORTS_MSI if (X86_LOCAL_APIC && X86_IO_APIC)
Which meant that MSI support was only available when the local APIC
and I/O APIC were enabled. While this is always true on SMP or x86-64,
it is not necessarily the case on i386 !SMP.
The below patch makes sure that the local APIC and I/O APIC support is
always enabled when MSI support is enabled. To do so, it:
* Ensures the X86_UP_APIC option is not visible when PCI_MSI is
enabled. This is the option that allows, on UP machines, to enable
or not the APIC support. It is already not visible on SMP systems,
or x86-64 systems, for example. We're simply also making it
invisible on i386 MSI systems.
* Ensures that the X86_LOCAL_APIC and X86_IO_APIC options are 'y'
when PCI_MSI is enabled.
Notice that this change requires a change in drivers/iommu/Kconfig to
avoid a recursive Kconfig dependencey. The AMD_IOMMU option selects
PCI_MSI, but was depending on X86_IO_APIC. This dependency is no
longer needed: as soon as PCI_MSI is selected, the presence of
X86_IO_APIC is guaranteed. Moreover, the AMD_IOMMU already depended on
X86_64, which already guaranteed that X86_IO_APIC was enabled, so this
dependency was anyway redundant.
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
Link: http://lkml.kernel.org/r/1380794354-9079-1-git-send-email-thomas.petazzoni@free-electrons.com
Reported-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Acked-by: Bjorn Helgaas <bhelgaas@google.com>
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
2013-10-03 13:59:14 +04:00
depends on X86_64 && PCI && ACPI
2020-06-13 19:50:22 +03:00
help
2011-06-05 19:22:18 +04:00
With this option you can enable support for AMD IOMMU hardware in
your system. An IOMMU is a hardware component which provides
remapping of DMA memory accesses from devices. With an AMD IOMMU you
2012-04-17 19:01:21 +04:00
can isolate the DMA memory of different devices and protect the
2011-06-05 19:22:18 +04:00
system from misbehaving device drivers or hardware.
You can find out if your system has an AMD IOMMU if you look into
your BIOS for an option to enable it or if you have an IVRS ACPI
table.
2011-11-09 15:31:15 +04:00
config AMD_IOMMU_V2
2013-01-17 06:53:39 +04:00
tristate "AMD IOMMU Version 2 driver"
2014-07-10 14:44:56 +04:00
depends on AMD_IOMMU
2011-11-24 19:21:52 +04:00
select MMU_NOTIFIER
2020-06-13 19:50:22 +03:00
help
2011-11-09 15:31:15 +04:00
This option enables support for the AMD IOMMUv2 features of the IOMMU
hardware. Select this option if you want to use devices that support
2012-04-17 19:01:21 +04:00
the PCI PRI and PASID interface.
2011-11-09 15:31:15 +04:00
2018-06-13 00:41:30 +03:00
config AMD_IOMMU_DEBUGFS
bool "Enable AMD IOMMU internals in DebugFS"
depends on AMD_IOMMU && IOMMU_DEBUGFS
2020-06-13 19:50:22 +03:00
help
2018-06-13 00:41:30 +03:00
!!!WARNING!!! !!!WARNING!!! !!!WARNING!!! !!!WARNING!!!
DO NOT ENABLE THIS OPTION UNLESS YOU REALLY, -REALLY- KNOW WHAT YOU ARE DOING!!!
Exposes AMD IOMMU device internals in DebugFS.
This option is -NOT- intended for production environments, and should
not generally be enabled.
2011-06-10 22:42:27 +04:00
# Intel IOMMU support
2011-08-24 04:05:25 +04:00
config DMAR_TABLE
bool
config INTEL_IOMMU
bool "Support for Intel IOMMU using DMA Remapping Devices"
2019-08-13 10:25:12 +03:00
depends on PCI_MSI && ACPI && (X86 || IA64)
2011-06-10 22:42:27 +04:00
select IOMMU_API
2015-01-12 20:51:13 +03:00
select IOMMU_IOVA
2018-05-09 07:53:49 +03:00
select NEED_DMA_MAP_STATE
2011-08-24 04:05:25 +04:00
select DMAR_TABLE
2019-09-06 09:14:50 +03:00
select SWIOTLB
2020-03-20 07:32:31 +03:00
select IOASID
2011-06-10 22:42:27 +04:00
help
DMA remapping (DMAR) devices support enables independent address
translations for Direct Memory Access (DMA) from devices.
These DMA remapping devices are reported via ACPI tables
and include PCI device scope covered by these DMA
remapping devices.
2018-09-12 03:11:38 +03:00
config INTEL_IOMMU_DEBUGFS
bool "Export Intel IOMMU internals in Debugfs"
depends on INTEL_IOMMU && IOMMU_DEBUGFS
help
!!!WARNING!!!
DO NOT ENABLE THIS OPTION UNLESS YOU REALLY KNOW WHAT YOU ARE DOING!!!
Expose Intel IOMMU internals in Debugfs.
This option is -NOT- intended for production environments, and should
only be enabled for debugging Intel IOMMU.
2015-03-24 17:54:56 +03:00
config INTEL_IOMMU_SVM
bool "Support for Shared Virtual Memory with Intel IOMMU"
2020-06-23 02:13:40 +03:00
depends on INTEL_IOMMU && X86_64
2015-10-12 16:17:37 +03:00
select PCI_PASID
2019-10-09 23:14:05 +03:00
select PCI_PRI
2015-09-09 13:40:47 +03:00
select MMU_NOTIFIER
2020-01-02 03:18:08 +03:00
select IOASID
2015-03-24 17:54:56 +03:00
help
Shared Virtual Memory (SVM) provides a facility for devices
to access DMA resources through process address space by
means of a Process Address Space ID (PASID).
2011-08-24 04:05:25 +04:00
config INTEL_IOMMU_DEFAULT_ON
2011-06-10 22:42:27 +04:00
def_bool y
2011-08-24 04:05:25 +04:00
prompt "Enable Intel DMA Remapping Devices by default"
depends on INTEL_IOMMU
2011-06-10 22:42:27 +04:00
help
Selecting this option will enable a DMAR device at boot time if
one is found. If this option is not selected, DMAR support can
be enabled by passing intel_iommu=on to the kernel.
2011-08-24 04:05:25 +04:00
config INTEL_IOMMU_BROKEN_GFX_WA
2011-06-10 22:42:27 +04:00
bool "Workaround broken graphics drivers (going away soon)"
2011-08-24 04:05:25 +04:00
depends on INTEL_IOMMU && BROKEN && X86
2020-06-13 19:50:22 +03:00
help
2011-06-10 22:42:27 +04:00
Current Graphics drivers tend to use physical address
for DMA and avoid using DMA APIs. Setting this config
option permits the IOMMU driver to set a unity map for
all the OS-visible memory. Hence the driver can continue
to use physical addresses for DMA, at least until this
option is removed in the 2.6.32 kernel.
2011-08-24 04:05:25 +04:00
config INTEL_IOMMU_FLOPPY_WA
2011-06-10 22:42:27 +04:00
def_bool y
2011-08-24 04:05:25 +04:00
depends on INTEL_IOMMU && X86
2020-06-13 19:50:22 +03:00
help
2011-06-10 22:42:27 +04:00
Floppy disk drivers are known to bypass DMA API calls
thereby failing to work when IOMMU is enabled. This
workaround will setup a 1:1 mapping for the first
16MiB to make floppy (an ISA device) work.
2020-01-02 03:18:02 +03:00
config INTEL_IOMMU_SCALABLE_MODE_DEFAULT_ON
bool "Enable Intel IOMMU scalable mode by default"
depends on INTEL_IOMMU
help
Selecting this option will enable by default the scalable mode if
hardware presents the capability. The scalable mode is defined in
VT-d 3.0. The scalable mode capability could be checked by reading
/sys/devices/virtual/iommu/dmar*/intel-iommu/ecap. If this option
is not selected, scalable mode support could also be enabled by
passing intel_iommu=sm_on to the kernel. If not sure, please use
the default value.
2011-08-24 04:05:25 +04:00
config IRQ_REMAP
2013-01-17 06:53:39 +04:00
bool "Support for Interrupt Remapping"
depends on X86_64 && X86_IO_APIC && PCI_MSI && ACPI
2011-08-24 04:05:25 +04:00
select DMAR_TABLE
2020-06-13 19:50:22 +03:00
help
2011-06-10 22:42:27 +04:00
Supports Interrupt remapping for IO-APIC and MSI devices.
To use x2apic mode in the CPU's which support x2APIC enhancements or
to support platforms with CPU's having > 8 bit APIC ID, say Y.
2011-06-14 17:51:54 +04:00
2011-08-16 00:21:41 +04:00
# OMAP IOMMU support
config OMAP_IOMMU
bool "OMAP IOMMU Support"
2015-01-20 18:13:33 +03:00
depends on ARCH_OMAP2PLUS || COMPILE_TEST
2011-08-16 00:21:41 +04:00
select IOMMU_API
2020-06-13 19:50:22 +03:00
help
2014-11-11 11:17:00 +03:00
The OMAP3 media platform drivers depend on iommu support,
if you need them say Y here.
2011-08-16 00:21:41 +04:00
config OMAP_IOMMU_DEBUG
2014-10-23 02:22:30 +04:00
bool "Export OMAP IOMMU internals in DebugFS"
depends on OMAP_IOMMU && DEBUG_FS
2020-06-13 19:50:22 +03:00
help
2014-10-23 02:22:30 +04:00
Select this to see extensive information about
the internal state of OMAP IOMMU in debugfs.
2011-08-16 00:21:41 +04:00
2014-10-23 02:22:30 +04:00
Say N unless you know you need this.
2011-08-16 00:21:41 +04:00
iommu/rockchip: rk3288 iommu driver
The rk3288 has several iommus. Each iommu belongs to a single master
device. There is one device (ISP) that has two slave iommus, but that
case is not yet supported by this driver.
At subsys init, the iommu driver registers itself as the iommu driver for
the platform bus. The master devices find their slave iommus using the
"iommus" field in their devicetree description. Since each slave iommu
belongs to exactly one master, their is no additional data needed at probe
to associate a slave with its master.
An iommu device's power domain, clock and irq are all shared with its
master device, and the master device must be careful to attach from the
iommu only after powering and clocking it (and leave it powered and
clocked before detaching). Because their is no guarantee what the status
of the iommu is at probe, and since the driver does not even know if the
device is powered, we delay requesting its irq until the master device
attaches, at which point we have a guarantee that the device is powered
and clocked and we can reset it and disable its interrupt mask.
An iommu_domain describes a virtual iova address space. Each iommu_domain
has a corresponding page table that lists the mappings from iova to
physical address.
For the rk3288 iommu, the page table has two levels:
The Level 1 "directory_table" has 1024 4-byte dte entries.
Each dte points to a level 2 "page_table".
Each level 2 page_table has 1024 4-byte pte entries.
Each pte points to a 4 KiB page of memory.
An iommu_domain is created when a dma_iommu_mapping is created via
arm_iommu_create_mapping. Master devices can then attach themselves to
this mapping (or attach the mapping to themselves?) by calling
arm_iommu_attach_device(). This in turn instructs the iommu driver to
write the page table's physical address into the slave iommu's "Directory
Table Entry" (DTE) register.
In fact multiple master devices, each with their own slave iommu device,
can all attach to the same mapping. The iommus for these devices will
share the same iommu_domain and therefore point to the same page table.
Thus, the iommu domain maintains a list of iommu devices which are
attached. This driver relies on the iommu core to ensure that all devices
have detached before destroying a domain.
v6: - add .add/remove_device() callbacks.
- parse platform_device device tree nodes for "iommus" property
- store platform device pointer as group iommudata
- Check for existence of iommu group instead of relying on a
dev_get_drvdata() to return NULL for a NULL device.
v7: - fixup some strings.
- In rk_iommu_disable_paging() # and % were reversed.
Signed-off-by: Daniel Kurtz <djkurtz@chromium.org>
Signed-off-by: Simon Xue <xxm@rock-chips.com>
Reviewed-by: Grant Grundler <grundler@chromium.org>
Reviewed-by: Stéphane Marchesin <marcheu@chromium.org>
Tested-by: Heiko Stuebner <heiko@sntech.de>
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2014-11-03 05:53:27 +03:00
config ROCKCHIP_IOMMU
bool "Rockchip IOMMU Support"
2014-11-03 20:16:56 +03:00
depends on ARCH_ROCKCHIP || COMPILE_TEST
iommu/rockchip: rk3288 iommu driver
The rk3288 has several iommus. Each iommu belongs to a single master
device. There is one device (ISP) that has two slave iommus, but that
case is not yet supported by this driver.
At subsys init, the iommu driver registers itself as the iommu driver for
the platform bus. The master devices find their slave iommus using the
"iommus" field in their devicetree description. Since each slave iommu
belongs to exactly one master, their is no additional data needed at probe
to associate a slave with its master.
An iommu device's power domain, clock and irq are all shared with its
master device, and the master device must be careful to attach from the
iommu only after powering and clocking it (and leave it powered and
clocked before detaching). Because their is no guarantee what the status
of the iommu is at probe, and since the driver does not even know if the
device is powered, we delay requesting its irq until the master device
attaches, at which point we have a guarantee that the device is powered
and clocked and we can reset it and disable its interrupt mask.
An iommu_domain describes a virtual iova address space. Each iommu_domain
has a corresponding page table that lists the mappings from iova to
physical address.
For the rk3288 iommu, the page table has two levels:
The Level 1 "directory_table" has 1024 4-byte dte entries.
Each dte points to a level 2 "page_table".
Each level 2 page_table has 1024 4-byte pte entries.
Each pte points to a 4 KiB page of memory.
An iommu_domain is created when a dma_iommu_mapping is created via
arm_iommu_create_mapping. Master devices can then attach themselves to
this mapping (or attach the mapping to themselves?) by calling
arm_iommu_attach_device(). This in turn instructs the iommu driver to
write the page table's physical address into the slave iommu's "Directory
Table Entry" (DTE) register.
In fact multiple master devices, each with their own slave iommu device,
can all attach to the same mapping. The iommus for these devices will
share the same iommu_domain and therefore point to the same page table.
Thus, the iommu domain maintains a list of iommu devices which are
attached. This driver relies on the iommu core to ensure that all devices
have detached before destroying a domain.
v6: - add .add/remove_device() callbacks.
- parse platform_device device tree nodes for "iommus" property
- store platform device pointer as group iommudata
- Check for existence of iommu group instead of relying on a
dev_get_drvdata() to return NULL for a NULL device.
v7: - fixup some strings.
- In rk_iommu_disable_paging() # and % were reversed.
Signed-off-by: Daniel Kurtz <djkurtz@chromium.org>
Signed-off-by: Simon Xue <xxm@rock-chips.com>
Reviewed-by: Grant Grundler <grundler@chromium.org>
Reviewed-by: Stéphane Marchesin <marcheu@chromium.org>
Tested-by: Heiko Stuebner <heiko@sntech.de>
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2014-11-03 05:53:27 +03:00
select IOMMU_API
select ARM_DMA_USE_IOMMU
help
Support for IOMMUs found on Rockchip rk32xx SOCs.
These IOMMUs allow virtualization of the address space used by most
cores within the multimedia subsystem.
Say Y here if you are using a Rockchip SoC that includes an IOMMU
device.
2011-08-16 00:21:41 +04:00
2020-05-13 17:07:22 +03:00
config SUN50I_IOMMU
bool "Allwinner H6 IOMMU Support"
depends on ARCH_SUNXI || COMPILE_TEST
select ARM_DMA_USE_IOMMU
select IOMMU_API
help
Support for the IOMMU introduced in the Allwinner H6 SoCs.
2011-11-16 19:36:37 +04:00
config TEGRA_IOMMU_GART
bool "Tegra GART IOMMU Support"
depends on ARCH_TEGRA_2x_SOC
2018-12-12 23:38:56 +03:00
depends on TEGRA_MC
2011-11-16 19:36:37 +04:00
select IOMMU_API
help
Enables support for remapping discontiguous physical memory
shared with the operating system into contiguous I/O virtual
space through the GART (Graphics Address Relocation Table)
hardware included on Tegra SoCs.
2011-11-17 09:31:31 +04:00
config TEGRA_IOMMU_SMMU
2014-04-16 11:24:44 +04:00
bool "NVIDIA Tegra SMMU Support"
depends on ARCH_TEGRA
depends on TEGRA_AHB
depends on TEGRA_MC
2011-11-17 09:31:31 +04:00
select IOMMU_API
help
2014-04-16 11:24:44 +04:00
This driver supports the IOMMU hardware (SMMU) found on NVIDIA Tegra
2015-03-23 12:45:12 +03:00
SoCs (Tegra30 up to Tegra210).
2011-11-17 09:31:31 +04:00
2012-05-12 00:56:09 +04:00
config EXYNOS_IOMMU
bool "Exynos IOMMU Support"
2020-07-03 19:03:19 +03:00
depends on ARCH_EXYNOS || COMPILE_TEST
2017-07-28 16:19:19 +03:00
depends on !CPU_BIG_ENDIAN # revisit driver if we can enable big-endian ptes
2012-05-12 00:56:09 +04:00
select IOMMU_API
2014-07-04 13:31:08 +04:00
select ARM_DMA_USE_IOMMU
2012-05-12 00:56:09 +04:00
help
2014-05-22 08:20:55 +04:00
Support for the IOMMU (System MMU) of Samsung Exynos application
processor family. This enables H/W multimedia accelerators to see
non-linear physical memory chunks as linear memory in their
address space.
2012-05-12 00:56:09 +04:00
If unsure, say N here.
config EXYNOS_IOMMU_DEBUG
bool "Debugging log for Exynos IOMMU"
depends on EXYNOS_IOMMU
help
Select this to see the detailed log message that shows what
2014-05-22 08:20:55 +04:00
happens in the IOMMU driver.
2012-05-12 00:56:09 +04:00
2014-05-22 08:20:55 +04:00
Say N unless you need kernel log message for IOMMU debugging.
2012-05-12 00:56:09 +04:00
2014-04-02 14:47:37 +04:00
config IPMMU_VMSA
bool "Renesas VMSA-compatible IPMMU"
2017-09-10 23:43:37 +03:00
depends on ARCH_RENESAS || (COMPILE_TEST && !GENERIC_ATOMIC64)
2014-04-02 14:47:37 +04:00
select IOMMU_API
2015-01-20 19:30:04 +03:00
select IOMMU_IO_PGTABLE_LPAE
2014-04-02 14:47:37 +04:00
select ARM_DMA_USE_IOMMU
help
2018-07-25 16:10:29 +03:00
Support for the Renesas VMSA-compatible IPMMU found in the R-Mobile
APE6, R-Car Gen2, and R-Car Gen3 SoCs.
2014-04-02 14:47:37 +04:00
If unsure, say N.
2013-05-21 07:33:09 +04:00
config SPAPR_TCE_IOMMU
bool "sPAPR TCE IOMMU Support"
iommu: spapr_tce: Disable compile testing to fix build on book3s_32 config
Although SPAPR_TCE_IOMMU itself can be compile tested on certain PowerPC
configurations, its presence makes arch/powerpc/kvm/Makefile to select
modules which do not build in such configuration.
The arch/powerpc/kvm/ modules use kvm_arch.spapr_tce_tables which exists
only with CONFIG_PPC_BOOK3S_64. However these modules are selected when
COMPILE_TEST and SPAPR_TCE_IOMMU are chosen leading to build failures:
In file included from arch/powerpc/include/asm/book3s/64/mmu-hash.h:20:0,
from arch/powerpc/kvm/book3s_64_vio_hv.c:22:
arch/powerpc/include/asm/book3s/64/pgtable.h:17:0: error: "_PAGE_EXEC" redefined [-Werror]
#define _PAGE_EXEC 0x00001 /* execute permission */
In file included from arch/powerpc/include/asm/book3s/32/pgtable.h:8:0,
from arch/powerpc/include/asm/book3s/pgtable.h:8,
from arch/powerpc/include/asm/pgtable.h:18,
from include/linux/mm.h:95,
from arch/powerpc/include/asm/io.h:29,
from include/linux/io.h:13,
from include/linux/irq.h:20,
from arch/powerpc/include/asm/hardirq.h:6,
from include/linux/hardirq.h:9,
from include/linux/kvm_host.h:7,
from arch/powerpc/kvm/book3s_64_vio_hv.c:12:
arch/powerpc/include/asm/book3s/32/hash.h:29:0: note: this is the location of the previous definition
#define _PAGE_EXEC 0x200 /* software: exec allowed */
Fixes: e93a1695d7fb ("iommu: Enable compile testing for some of drivers")
Reported-by: Geert Uytterhoeven <geert@linux-m68k.org>
Signed-off-by: Krzysztof Kozlowski <krzk@kernel.org>
Link: https://lore.kernel.org/r/20200414142630.21153-1-krzk@kernel.org
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2020-04-14 17:26:30 +03:00
depends on PPC_POWERNV || PPC_PSERIES
2013-05-21 07:33:09 +04:00
select IOMMU_API
help
Enables bits of IOMMU API required by VFIO. The iommu_ops
is not implemented as it is not necessary for VFIO.
2015-05-27 19:25:59 +03:00
# ARM IOMMU support
2013-06-24 21:31:25 +04:00
config ARM_SMMU
2019-12-19 15:03:51 +03:00
tristate "ARM Ltd. System MMU (SMMU) Support"
2020-07-03 19:03:19 +03:00
depends on ARM64 || ARM || (COMPILE_TEST && !GENERIC_ATOMIC64)
2013-06-24 21:31:25 +04:00
select IOMMU_API
2014-11-14 20:17:54 +03:00
select IOMMU_IO_PGTABLE_LPAE
2013-06-24 21:31:25 +04:00
select ARM_DMA_USE_IOMMU if ARM
help
Support for implementations of the ARM System MMU architecture
2014-11-14 20:17:54 +03:00
versions 1 and 2.
2013-06-24 21:31:25 +04:00
Say Y here if your SoC includes an IOMMU device implementing
the ARM SMMU architecture.
2019-12-19 15:03:51 +03:00
config ARM_SMMU_LEGACY_DT_BINDINGS
bool "Support the legacy \"mmu-masters\" devicetree bindings"
depends on ARM_SMMU=y && OF
help
Support for the badly designed and deprecated "mmu-masters"
devicetree bindings. This allows some DMA masters to attach
to the SMMU but does not provide any support via the DMA API.
If you're lucky, you might be able to get VFIO up and running.
If you say Y here then you'll make me very sad. Instead, say N
and move your firmware to the utopian future that was 2016.
2019-03-01 22:20:17 +03:00
config ARM_SMMU_DISABLE_BYPASS_BY_DEFAULT
bool "Default to disabling bypass on ARM SMMU v1 and v2"
depends on ARM_SMMU
default y
help
Say Y here to (by default) disable bypass streams such that
incoming transactions from devices that are not attached to
an iommu domain will report an abort back to the device and
will not be allowed to pass through the SMMU.
Any old kernels that existed before this KConfig was
introduced would default to _allowing_ bypass (AKA the
equivalent of NO for this config). However the default for
this option is YES because the old behavior is insecure.
There are few reasons to allow unmatched stream bypass, and
even fewer good ones. If saying YES here breaks your board
you should work on fixing your board. This KConfig option
is expected to be removed in the future and we'll simply
hardcode the bypass disable in the code.
NOTE: the kernel command line parameter
'arm-smmu.disable_bypass' will continue to override this
config.
2015-05-27 19:25:59 +03:00
config ARM_SMMU_V3
2019-12-19 15:03:49 +03:00
tristate "ARM Ltd. System MMU Version 3 (SMMUv3) Support"
2016-09-12 19:13:46 +03:00
depends on ARM64
2015-05-27 19:25:59 +03:00
select IOMMU_API
select IOMMU_IO_PGTABLE_LPAE
2015-10-13 20:32:30 +03:00
select GENERIC_MSI_IRQ_DOMAIN
2015-05-27 19:25:59 +03:00
help
Support for implementations of the ARM System MMU architecture
version 3 providing translation support to a PCIe root complex.
Say Y here if your system includes an IOMMU device implementing
the ARM SMMUv3 architecture.
2015-08-27 16:33:03 +03:00
config S390_IOMMU
def_bool y if S390 && PCI
depends on S390 && PCI
select IOMMU_API
help
Support for the IOMMU API for s390 PCI devices.
2017-03-17 06:17:31 +03:00
config S390_CCW_IOMMU
bool "S390 CCW IOMMU Support"
2020-03-03 23:27:51 +03:00
depends on S390 && CCW || COMPILE_TEST
2017-03-17 06:17:31 +03:00
select IOMMU_API
help
Enables bits of IOMMU API required by VFIO. The iommu_ops
is not implemented as it is not necessary for VFIO.
2018-09-26 02:16:19 +03:00
config S390_AP_IOMMU
bool "S390 AP IOMMU Support"
2020-03-03 23:27:51 +03:00
depends on S390 && ZCRYPT || COMPILE_TEST
2018-09-26 02:16:19 +03:00
select IOMMU_API
help
Enables bits of IOMMU API required by VFIO. The iommu_ops
is not implemented as it is not necessary for VFIO.
2016-02-22 20:20:50 +03:00
config MTK_IOMMU
bool "MTK IOMMU Support"
depends on ARCH_MEDIATEK || COMPILE_TEST
2016-02-29 12:19:06 +03:00
select ARM_DMA_USE_IOMMU
2016-02-22 20:20:50 +03:00
select IOMMU_API
select IOMMU_IO_PGTABLE_ARMV7S
select MEMORY
select MTK_SMI
help
Support for the M4U on certain Mediatek SOCs. M4U is MultiMedia
Memory Management Unit. This option enables remapping of DMA memory
accesses for the multimedia subsystem.
If unsure, say N here.
2016-06-08 12:51:00 +03:00
config MTK_IOMMU_V1
bool "MTK IOMMU Version 1 (M4U gen1) Support"
depends on ARM
depends on ARCH_MEDIATEK || COMPILE_TEST
select ARM_DMA_USE_IOMMU
select IOMMU_API
select MEMORY
select MTK_SMI
help
Support for the M4U on certain Mediatek SoCs. M4U generation 1 HW is
Multimedia Memory Managememt Unit. This option enables remapping of
DMA memory accesses for the multimedia subsystem.
if unsure, say N here.
2017-08-09 17:43:04 +03:00
config QCOM_IOMMU
# Note: iommu drivers cannot (yet?) be built as modules
bool "Qualcomm IOMMU Support"
2017-09-10 23:43:37 +03:00
depends on ARCH_QCOM || (COMPILE_TEST && !GENERIC_ATOMIC64)
2017-08-09 17:43:04 +03:00
select IOMMU_API
select IOMMU_IO_PGTABLE_LPAE
select ARM_DMA_USE_IOMMU
help
Support for IOMMU on certain Qualcomm SoCs.
2019-02-27 17:54:04 +03:00
config HYPERV_IOMMU
bool "Hyper-V x2APIC IRQ Handling"
2019-10-17 03:57:03 +03:00
depends on HYPERV && X86
2019-02-27 17:54:04 +03:00
select IOMMU_API
default HYPERV
help
Stub IOMMU driver to handle IRQs as to allow Hyper-V Linux
guests to run with x2APIC mode enabled.
2019-01-15 15:19:57 +03:00
config VIRTIO_IOMMU
2020-02-14 19:38:27 +03:00
tristate "Virtio IOMMU driver"
depends on VIRTIO
2019-01-15 15:19:57 +03:00
depends on ARM64
select IOMMU_API
select INTERVAL_TREE
help
Para-virtualised IOMMU driver with virtio.
Say Y here if you intend to run this kernel as a guest.
2011-06-14 17:51:54 +04:00
endif # IOMMU_SUPPORT