Thomas Gleixner | ec8f24b | 2019-05-19 13:07:45 +0100 | [diff] [blame] | 1 | # SPDX-License-Identifier: GPL-2.0-only |
Sakari Ailus | bd3c2e6 | 2019-01-02 23:16:57 +0200 | [diff] [blame] | 2 | # The IOVA library may also be used by non-IOMMU_API users |
| 3 | config IOMMU_IOVA |
| 4 | tristate |
| 5 | |
Ohad Ben-Cohen | ab493a0 | 2011-06-02 02:48:05 +0300 | [diff] [blame] | 6 | # IOMMU_API always gets selected by whoever wants it. |
| 7 | config IOMMU_API |
| 8 | bool |
Ohad Ben-Cohen | b10f127 | 2011-06-02 03:20:08 +0300 | [diff] [blame] | 9 | |
Joerg Roedel | 68255b6 | 2011-06-14 15:51:54 +0200 | [diff] [blame] | 10 | menuconfig IOMMU_SUPPORT |
| 11 | bool "IOMMU Hardware Support" |
Arnd Bergmann | e5144c9 | 2015-01-28 15:45:53 +0100 | [diff] [blame] | 12 | depends on MMU |
Joerg Roedel | 68255b6 | 2011-06-14 15:51:54 +0200 | [diff] [blame] | 13 | default y |
| 14 | ---help--- |
| 15 | Say Y here if you want to compile device drivers for IO Memory |
| 16 | Management Units into the kernel. These devices usually allow to |
| 17 | remap DMA requests and/or remap interrupts from other devices on the |
| 18 | system. |
| 19 | |
| 20 | if IOMMU_SUPPORT |
| 21 | |
Will Deacon | fdb1d7b | 2014-11-14 17:16:49 +0000 | [diff] [blame] | 22 | menu "Generic IOMMU Pagetable Support" |
| 23 | |
| 24 | # Selected by the actual pagetable implementations |
| 25 | config IOMMU_IO_PGTABLE |
| 26 | bool |
| 27 | |
Will Deacon | e1d3c0f | 2014-11-14 17:18:23 +0000 | [diff] [blame] | 28 | config IOMMU_IO_PGTABLE_LPAE |
| 29 | bool "ARMv7/v8 Long Descriptor Format" |
| 30 | select IOMMU_IO_PGTABLE |
Geert Uytterhoeven | 48e6f76 | 2018-04-17 19:49:09 +0200 | [diff] [blame] | 31 | depends on ARM || ARM64 || (COMPILE_TEST && !GENERIC_ATOMIC64) |
Will Deacon | e1d3c0f | 2014-11-14 17:18:23 +0000 | [diff] [blame] | 32 | help |
| 33 | Enable support for the ARM long descriptor pagetable format. |
| 34 | This allocator supports 4K/2M/1G, 16K/32M and 64K/512M page |
| 35 | sizes at both stage-1 and stage-2, as well as address spaces |
| 36 | up to 48-bits in size. |
| 37 | |
Will Deacon | fe4b991 | 2014-11-17 23:31:12 +0000 | [diff] [blame] | 38 | config IOMMU_IO_PGTABLE_LPAE_SELFTEST |
| 39 | bool "LPAE selftests" |
| 40 | depends on IOMMU_IO_PGTABLE_LPAE |
| 41 | help |
| 42 | Enable self-tests for LPAE page table allocator. This performs |
| 43 | a series of page-table consistency checks during boot. |
| 44 | |
| 45 | If unsure, say N here. |
| 46 | |
Robin Murphy | e5fc975 | 2016-01-26 17:13:13 +0000 | [diff] [blame] | 47 | config IOMMU_IO_PGTABLE_ARMV7S |
| 48 | bool "ARMv7/v8 Short Descriptor Format" |
| 49 | select IOMMU_IO_PGTABLE |
Geert Uytterhoeven | 48e6f76 | 2018-04-17 19:49:09 +0200 | [diff] [blame] | 50 | depends on ARM || ARM64 || COMPILE_TEST |
Robin Murphy | e5fc975 | 2016-01-26 17:13:13 +0000 | [diff] [blame] | 51 | help |
| 52 | Enable support for the ARM Short-descriptor pagetable format. |
| 53 | This supports 32-bit virtual and physical addresses mapped using |
| 54 | 2-level tables with 4KB pages/1MB sections, and contiguous entries |
| 55 | for 64KB pages/16MB supersections if indicated by the IOMMU driver. |
| 56 | |
| 57 | config IOMMU_IO_PGTABLE_ARMV7S_SELFTEST |
| 58 | bool "ARMv7s selftests" |
| 59 | depends on IOMMU_IO_PGTABLE_ARMV7S |
| 60 | help |
| 61 | Enable self-tests for ARMv7s page table allocator. This performs |
| 62 | a series of page-table consistency checks during boot. |
| 63 | |
| 64 | If unsure, say N here. |
| 65 | |
Will Deacon | fdb1d7b | 2014-11-14 17:16:49 +0000 | [diff] [blame] | 66 | endmenu |
| 67 | |
Gary R Hook | bad614b | 2018-06-12 16:41:21 -0500 | [diff] [blame] | 68 | config IOMMU_DEBUGFS |
| 69 | bool "Export IOMMU internals in DebugFS" |
| 70 | depends on DEBUG_FS |
| 71 | help |
| 72 | Allows exposure of IOMMU device internals. This option enables |
| 73 | the use of debugfs by IOMMU drivers as required. Devices can, |
| 74 | at initialization time, cause the IOMMU code to create a top-level |
| 75 | debug/iommu directory, and then populate a subdirectory with |
| 76 | entries as required. |
| 77 | |
Olof Johansson | 58d1131 | 2018-07-20 11:02:23 -0700 | [diff] [blame] | 78 | config IOMMU_DEFAULT_PASSTHROUGH |
| 79 | bool "IOMMU passthrough by default" |
| 80 | depends on IOMMU_API |
| 81 | help |
| 82 | Enable passthrough by default, removing the need to pass in |
| 83 | iommu.passthrough=on or iommu=pt through command line. If this |
| 84 | is enabled, you can still disable with iommu.passthrough=off |
| 85 | or iommu=nopt depending on the architecture. |
| 86 | |
| 87 | If unsure, say N here. |
| 88 | |
Hiroshi Doyu | 4e0ee78 | 2012-06-25 14:23:54 +0300 | [diff] [blame] | 89 | config OF_IOMMU |
| 90 | def_bool y |
Will Deacon | 7eba1d5 | 2014-08-27 16:20:32 +0100 | [diff] [blame] | 91 | depends on OF && IOMMU_API |
Hiroshi Doyu | 4e0ee78 | 2012-06-25 14:23:54 +0300 | [diff] [blame] | 92 | |
Robin Murphy | 0db2e5d | 2015-10-01 20:13:58 +0100 | [diff] [blame] | 93 | # IOMMU-agnostic DMA-mapping layer |
| 94 | config IOMMU_DMA |
| 95 | bool |
Robin Murphy | 0db2e5d | 2015-10-01 20:13:58 +0100 | [diff] [blame] | 96 | select IOMMU_API |
| 97 | select IOMMU_IOVA |
Julien Grall | ece6e6f | 2019-05-01 14:58:19 +0100 | [diff] [blame] | 98 | select IRQ_MSI_IOMMU |
Robin Murphy | 59a68eb | 2016-02-29 11:13:39 +0000 | [diff] [blame] | 99 | select NEED_SG_DMA_LENGTH |
Robin Murphy | 0db2e5d | 2015-10-01 20:13:58 +0100 | [diff] [blame] | 100 | |
Varun Sethi | 695093e | 2013-07-15 10:20:57 +0530 | [diff] [blame] | 101 | config FSL_PAMU |
| 102 | bool "Freescale IOMMU support" |
Joerg Roedel | a4d98fb | 2017-08-09 15:00:36 +0200 | [diff] [blame] | 103 | depends on PCI |
Joerg Roedel | af29d9f | 2017-08-09 15:04:47 +0200 | [diff] [blame] | 104 | depends on PHYS_64BIT |
Andy Fleming | a0d284d | 2016-03-16 23:15:44 -0500 | [diff] [blame] | 105 | depends on PPC_E500MC || (COMPILE_TEST && PPC) |
Varun Sethi | 695093e | 2013-07-15 10:20:57 +0530 | [diff] [blame] | 106 | select IOMMU_API |
| 107 | select GENERIC_ALLOCATOR |
| 108 | help |
| 109 | Freescale PAMU support. PAMU is the IOMMU present on Freescale QorIQ platforms. |
| 110 | PAMU can authorize memory access, remap the memory address, and remap I/O |
| 111 | transaction types. |
| 112 | |
Ohad Ben-Cohen | b10f127 | 2011-06-02 03:20:08 +0300 | [diff] [blame] | 113 | # MSM IOMMU support |
| 114 | config MSM_IOMMU |
| 115 | bool "MSM IOMMU Support" |
Joerg Roedel | 477ab7a | 2015-01-20 16:13:33 +0100 | [diff] [blame] | 116 | depends on ARM |
| 117 | depends on ARCH_MSM8X60 || ARCH_MSM8960 || COMPILE_TEST |
Ohad Ben-Cohen | b10f127 | 2011-06-02 03:20:08 +0300 | [diff] [blame] | 118 | select IOMMU_API |
Sricharan R | c9220fb | 2016-06-13 17:06:06 +0530 | [diff] [blame] | 119 | select IOMMU_IO_PGTABLE_ARMV7S |
Ohad Ben-Cohen | b10f127 | 2011-06-02 03:20:08 +0300 | [diff] [blame] | 120 | help |
| 121 | Support for the IOMMUs found on certain Qualcomm SOCs. |
| 122 | These IOMMUs allow virtualization of the address space used by most |
| 123 | cores within the multimedia subsystem. |
| 124 | |
| 125 | If unsure, say N here. |
| 126 | |
| 127 | config IOMMU_PGTABLES_L2 |
| 128 | def_bool y |
| 129 | depends on MSM_IOMMU && MMU && SMP && CPU_DCACHE_DISABLE=n |
Ohad Ben-Cohen | 29b6841 | 2011-06-05 18:22:18 +0300 | [diff] [blame] | 130 | |
| 131 | # AMD IOMMU support |
| 132 | config AMD_IOMMU |
| 133 | bool "AMD IOMMU support" |
| 134 | select SWIOTLB |
| 135 | select PCI_MSI |
Joerg Roedel | 52815b7 | 2011-11-17 17:24:28 +0100 | [diff] [blame] | 136 | select PCI_ATS |
| 137 | select PCI_PRI |
| 138 | select PCI_PASID |
Ohad Ben-Cohen | 29b6841 | 2011-06-05 18:22:18 +0300 | [diff] [blame] | 139 | select IOMMU_API |
Joerg Roedel | a72c422 | 2016-07-05 11:12:49 +0200 | [diff] [blame] | 140 | select IOMMU_IOVA |
Thomas Petazzoni | 0dbc607 | 2013-10-03 11:59:14 +0200 | [diff] [blame] | 141 | depends on X86_64 && PCI && ACPI |
Ohad Ben-Cohen | 29b6841 | 2011-06-05 18:22:18 +0300 | [diff] [blame] | 142 | ---help--- |
| 143 | With this option you can enable support for AMD IOMMU hardware in |
| 144 | your system. An IOMMU is a hardware component which provides |
| 145 | remapping of DMA memory accesses from devices. With an AMD IOMMU you |
Masanari Iida | 59bf896 | 2012-04-18 00:01:21 +0900 | [diff] [blame] | 146 | can isolate the DMA memory of different devices and protect the |
Ohad Ben-Cohen | 29b6841 | 2011-06-05 18:22:18 +0300 | [diff] [blame] | 147 | system from misbehaving device drivers or hardware. |
| 148 | |
| 149 | You can find out if your system has an AMD IOMMU if you look into |
| 150 | your BIOS for an option to enable it or if you have an IVRS ACPI |
| 151 | table. |
| 152 | |
Joerg Roedel | e3c495c | 2011-11-09 12:31:15 +0100 | [diff] [blame] | 153 | config AMD_IOMMU_V2 |
Kees Cook | a446e21 | 2013-01-16 18:53:39 -0800 | [diff] [blame] | 154 | tristate "AMD IOMMU Version 2 driver" |
Borislav Petkov | e5cac32 | 2014-07-10 12:44:56 +0200 | [diff] [blame] | 155 | depends on AMD_IOMMU |
Joerg Roedel | 8736b2c | 2011-11-24 16:21:52 +0100 | [diff] [blame] | 156 | select MMU_NOTIFIER |
Joerg Roedel | e3c495c | 2011-11-09 12:31:15 +0100 | [diff] [blame] | 157 | ---help--- |
| 158 | This option enables support for the AMD IOMMUv2 features of the IOMMU |
| 159 | hardware. Select this option if you want to use devices that support |
Masanari Iida | 59bf896 | 2012-04-18 00:01:21 +0900 | [diff] [blame] | 160 | the PCI PRI and PASID interface. |
Joerg Roedel | e3c495c | 2011-11-09 12:31:15 +0100 | [diff] [blame] | 161 | |
Gary R Hook | 7d0f5fd | 2018-06-12 16:41:30 -0500 | [diff] [blame] | 162 | config AMD_IOMMU_DEBUGFS |
| 163 | bool "Enable AMD IOMMU internals in DebugFS" |
| 164 | depends on AMD_IOMMU && IOMMU_DEBUGFS |
| 165 | ---help--- |
| 166 | !!!WARNING!!! !!!WARNING!!! !!!WARNING!!! !!!WARNING!!! |
| 167 | |
| 168 | DO NOT ENABLE THIS OPTION UNLESS YOU REALLY, -REALLY- KNOW WHAT YOU ARE DOING!!! |
| 169 | Exposes AMD IOMMU device internals in DebugFS. |
| 170 | |
| 171 | This option is -NOT- intended for production environments, and should |
| 172 | not generally be enabled. |
| 173 | |
Ohad Ben-Cohen | 166e927 | 2011-06-10 21:42:27 +0300 | [diff] [blame] | 174 | # Intel IOMMU support |
Suresh Siddha | d3f1381 | 2011-08-23 17:05:25 -0700 | [diff] [blame] | 175 | config DMAR_TABLE |
| 176 | bool |
| 177 | |
| 178 | config INTEL_IOMMU |
| 179 | bool "Support for Intel IOMMU using DMA Remapping Devices" |
Ohad Ben-Cohen | 166e927 | 2011-06-10 21:42:27 +0300 | [diff] [blame] | 180 | depends on PCI_MSI && ACPI && (X86 || IA64_GENERIC) |
| 181 | select IOMMU_API |
Robin Murphy | 114150d | 2015-01-12 17:51:13 +0000 | [diff] [blame] | 182 | select IOMMU_IOVA |
Christoph Hellwig | f616ab5 | 2018-05-09 06:53:49 +0200 | [diff] [blame] | 183 | select NEED_DMA_MAP_STATE |
Suresh Siddha | d3f1381 | 2011-08-23 17:05:25 -0700 | [diff] [blame] | 184 | select DMAR_TABLE |
Lu Baolu | c5a5dc4 | 2019-09-06 14:14:50 +0800 | [diff] [blame^] | 185 | select SWIOTLB |
Ohad Ben-Cohen | 166e927 | 2011-06-10 21:42:27 +0300 | [diff] [blame] | 186 | help |
| 187 | DMA remapping (DMAR) devices support enables independent address |
| 188 | translations for Direct Memory Access (DMA) from devices. |
| 189 | These DMA remapping devices are reported via ACPI tables |
| 190 | and include PCI device scope covered by these DMA |
| 191 | remapping devices. |
| 192 | |
Sohil Mehta | ee2636b | 2018-09-11 17:11:38 -0700 | [diff] [blame] | 193 | config INTEL_IOMMU_DEBUGFS |
| 194 | bool "Export Intel IOMMU internals in Debugfs" |
| 195 | depends on INTEL_IOMMU && IOMMU_DEBUGFS |
| 196 | help |
| 197 | !!!WARNING!!! |
| 198 | |
| 199 | DO NOT ENABLE THIS OPTION UNLESS YOU REALLY KNOW WHAT YOU ARE DOING!!! |
| 200 | |
| 201 | Expose Intel IOMMU internals in Debugfs. |
| 202 | |
| 203 | This option is -NOT- intended for production environments, and should |
| 204 | only be enabled for debugging Intel IOMMU. |
| 205 | |
David Woodhouse | 8a94ade | 2015-03-24 14:54:56 +0000 | [diff] [blame] | 206 | config INTEL_IOMMU_SVM |
| 207 | bool "Support for Shared Virtual Memory with Intel IOMMU" |
| 208 | depends on INTEL_IOMMU && X86 |
David Woodhouse | b16d0cb | 2015-10-12 14:17:37 +0100 | [diff] [blame] | 209 | select PCI_PASID |
David Woodhouse | 2f26e0a | 2015-09-09 11:40:47 +0100 | [diff] [blame] | 210 | select MMU_NOTIFIER |
David Woodhouse | 8a94ade | 2015-03-24 14:54:56 +0000 | [diff] [blame] | 211 | help |
| 212 | Shared Virtual Memory (SVM) provides a facility for devices |
| 213 | to access DMA resources through process address space by |
| 214 | means of a Process Address Space ID (PASID). |
| 215 | |
Suresh Siddha | d3f1381 | 2011-08-23 17:05:25 -0700 | [diff] [blame] | 216 | config INTEL_IOMMU_DEFAULT_ON |
Ohad Ben-Cohen | 166e927 | 2011-06-10 21:42:27 +0300 | [diff] [blame] | 217 | def_bool y |
Suresh Siddha | d3f1381 | 2011-08-23 17:05:25 -0700 | [diff] [blame] | 218 | prompt "Enable Intel DMA Remapping Devices by default" |
| 219 | depends on INTEL_IOMMU |
Ohad Ben-Cohen | 166e927 | 2011-06-10 21:42:27 +0300 | [diff] [blame] | 220 | help |
| 221 | Selecting this option will enable a DMAR device at boot time if |
| 222 | one is found. If this option is not selected, DMAR support can |
| 223 | be enabled by passing intel_iommu=on to the kernel. |
| 224 | |
Suresh Siddha | d3f1381 | 2011-08-23 17:05:25 -0700 | [diff] [blame] | 225 | config INTEL_IOMMU_BROKEN_GFX_WA |
Ohad Ben-Cohen | 166e927 | 2011-06-10 21:42:27 +0300 | [diff] [blame] | 226 | bool "Workaround broken graphics drivers (going away soon)" |
Suresh Siddha | d3f1381 | 2011-08-23 17:05:25 -0700 | [diff] [blame] | 227 | depends on INTEL_IOMMU && BROKEN && X86 |
Ohad Ben-Cohen | 166e927 | 2011-06-10 21:42:27 +0300 | [diff] [blame] | 228 | ---help--- |
| 229 | Current Graphics drivers tend to use physical address |
| 230 | for DMA and avoid using DMA APIs. Setting this config |
| 231 | option permits the IOMMU driver to set a unity map for |
| 232 | all the OS-visible memory. Hence the driver can continue |
| 233 | to use physical addresses for DMA, at least until this |
| 234 | option is removed in the 2.6.32 kernel. |
| 235 | |
Suresh Siddha | d3f1381 | 2011-08-23 17:05:25 -0700 | [diff] [blame] | 236 | config INTEL_IOMMU_FLOPPY_WA |
Ohad Ben-Cohen | 166e927 | 2011-06-10 21:42:27 +0300 | [diff] [blame] | 237 | def_bool y |
Suresh Siddha | d3f1381 | 2011-08-23 17:05:25 -0700 | [diff] [blame] | 238 | depends on INTEL_IOMMU && X86 |
Ohad Ben-Cohen | 166e927 | 2011-06-10 21:42:27 +0300 | [diff] [blame] | 239 | ---help--- |
| 240 | Floppy disk drivers are known to bypass DMA API calls |
| 241 | thereby failing to work when IOMMU is enabled. This |
| 242 | workaround will setup a 1:1 mapping for the first |
| 243 | 16MiB to make floppy (an ISA device) work. |
| 244 | |
Suresh Siddha | d3f1381 | 2011-08-23 17:05:25 -0700 | [diff] [blame] | 245 | config IRQ_REMAP |
Kees Cook | a446e21 | 2013-01-16 18:53:39 -0800 | [diff] [blame] | 246 | bool "Support for Interrupt Remapping" |
| 247 | depends on X86_64 && X86_IO_APIC && PCI_MSI && ACPI |
Suresh Siddha | d3f1381 | 2011-08-23 17:05:25 -0700 | [diff] [blame] | 248 | select DMAR_TABLE |
Ohad Ben-Cohen | 166e927 | 2011-06-10 21:42:27 +0300 | [diff] [blame] | 249 | ---help--- |
| 250 | Supports Interrupt remapping for IO-APIC and MSI devices. |
| 251 | To use x2apic mode in the CPU's which support x2APIC enhancements or |
| 252 | to support platforms with CPU's having > 8 bit APIC ID, say Y. |
Joerg Roedel | 68255b6 | 2011-06-14 15:51:54 +0200 | [diff] [blame] | 253 | |
Ohad Ben-Cohen | fcf3a6e | 2011-08-15 23:21:41 +0300 | [diff] [blame] | 254 | # OMAP IOMMU support |
| 255 | config OMAP_IOMMU |
| 256 | bool "OMAP IOMMU Support" |
Joerg Roedel | 477ab7a | 2015-01-20 16:13:33 +0100 | [diff] [blame] | 257 | depends on ARM && MMU |
| 258 | depends on ARCH_OMAP2PLUS || COMPILE_TEST |
Ohad Ben-Cohen | fcf3a6e | 2011-08-15 23:21:41 +0300 | [diff] [blame] | 259 | select IOMMU_API |
Gerd Hoffmann | 06b718c | 2014-11-11 09:17:00 +0100 | [diff] [blame] | 260 | ---help--- |
| 261 | The OMAP3 media platform drivers depend on iommu support, |
| 262 | if you need them say Y here. |
Ohad Ben-Cohen | fcf3a6e | 2011-08-15 23:21:41 +0300 | [diff] [blame] | 263 | |
Ohad Ben-Cohen | fcf3a6e | 2011-08-15 23:21:41 +0300 | [diff] [blame] | 264 | config OMAP_IOMMU_DEBUG |
Suman Anna | 61c7535 | 2014-10-22 17:22:30 -0500 | [diff] [blame] | 265 | bool "Export OMAP IOMMU internals in DebugFS" |
| 266 | depends on OMAP_IOMMU && DEBUG_FS |
| 267 | ---help--- |
| 268 | Select this to see extensive information about |
| 269 | the internal state of OMAP IOMMU in debugfs. |
Ohad Ben-Cohen | fcf3a6e | 2011-08-15 23:21:41 +0300 | [diff] [blame] | 270 | |
Suman Anna | 61c7535 | 2014-10-22 17:22:30 -0500 | [diff] [blame] | 271 | Say N unless you know you need this. |
Ohad Ben-Cohen | fcf3a6e | 2011-08-15 23:21:41 +0300 | [diff] [blame] | 272 | |
Daniel Kurtz | c68a292 | 2014-11-03 10:53:27 +0800 | [diff] [blame] | 273 | config ROCKCHIP_IOMMU |
| 274 | bool "Rockchip IOMMU Support" |
Simon Xue | 4f1fcfe | 2017-05-03 17:19:40 +0200 | [diff] [blame] | 275 | depends on ARM || ARM64 |
Joerg Roedel | 1117588 | 2014-11-03 18:16:56 +0100 | [diff] [blame] | 276 | depends on ARCH_ROCKCHIP || COMPILE_TEST |
Daniel Kurtz | c68a292 | 2014-11-03 10:53:27 +0800 | [diff] [blame] | 277 | select IOMMU_API |
| 278 | select ARM_DMA_USE_IOMMU |
| 279 | help |
| 280 | Support for IOMMUs found on Rockchip rk32xx SOCs. |
| 281 | These IOMMUs allow virtualization of the address space used by most |
| 282 | cores within the multimedia subsystem. |
| 283 | Say Y here if you are using a Rockchip SoC that includes an IOMMU |
| 284 | device. |
Ohad Ben-Cohen | ab493a0 | 2011-06-02 02:48:05 +0300 | [diff] [blame] | 285 | |
Hiroshi DOYU | d53e54b | 2011-11-16 17:36:37 +0200 | [diff] [blame] | 286 | config TEGRA_IOMMU_GART |
| 287 | bool "Tegra GART IOMMU Support" |
| 288 | depends on ARCH_TEGRA_2x_SOC |
Dmitry Osipenko | ce2785a | 2018-12-12 23:38:56 +0300 | [diff] [blame] | 289 | depends on TEGRA_MC |
Hiroshi DOYU | d53e54b | 2011-11-16 17:36:37 +0200 | [diff] [blame] | 290 | select IOMMU_API |
| 291 | help |
| 292 | Enables support for remapping discontiguous physical memory |
| 293 | shared with the operating system into contiguous I/O virtual |
| 294 | space through the GART (Graphics Address Relocation Table) |
| 295 | hardware included on Tegra SoCs. |
| 296 | |
Hiroshi DOYU | 7a31f6f | 2011-11-17 07:31:31 +0200 | [diff] [blame] | 297 | config TEGRA_IOMMU_SMMU |
Thierry Reding | 8918465 | 2014-04-16 09:24:44 +0200 | [diff] [blame] | 298 | bool "NVIDIA Tegra SMMU Support" |
| 299 | depends on ARCH_TEGRA |
| 300 | depends on TEGRA_AHB |
| 301 | depends on TEGRA_MC |
Hiroshi DOYU | 7a31f6f | 2011-11-17 07:31:31 +0200 | [diff] [blame] | 302 | select IOMMU_API |
| 303 | help |
Thierry Reding | 8918465 | 2014-04-16 09:24:44 +0200 | [diff] [blame] | 304 | This driver supports the IOMMU hardware (SMMU) found on NVIDIA Tegra |
Thierry Reding | 588c43a | 2015-03-23 10:45:12 +0100 | [diff] [blame] | 305 | SoCs (Tegra30 up to Tegra210). |
Hiroshi DOYU | 7a31f6f | 2011-11-17 07:31:31 +0200 | [diff] [blame] | 306 | |
KyongHo Cho | 2a96536 | 2012-05-12 05:56:09 +0900 | [diff] [blame] | 307 | config EXYNOS_IOMMU |
| 308 | bool "Exynos IOMMU Support" |
Marek Szyprowski | 740a01e | 2016-02-18 15:12:58 +0100 | [diff] [blame] | 309 | depends on ARCH_EXYNOS && MMU |
Arnd Bergmann | db3a7fd | 2017-07-28 15:19:19 +0200 | [diff] [blame] | 310 | depends on !CPU_BIG_ENDIAN # revisit driver if we can enable big-endian ptes |
KyongHo Cho | 2a96536 | 2012-05-12 05:56:09 +0900 | [diff] [blame] | 311 | select IOMMU_API |
Tushar Behera | 4802c1d | 2014-07-04 15:01:08 +0530 | [diff] [blame] | 312 | select ARM_DMA_USE_IOMMU |
KyongHo Cho | 2a96536 | 2012-05-12 05:56:09 +0900 | [diff] [blame] | 313 | help |
Sachin Kamat | 5455d70 | 2014-05-22 09:50:55 +0530 | [diff] [blame] | 314 | Support for the IOMMU (System MMU) of Samsung Exynos application |
| 315 | processor family. This enables H/W multimedia accelerators to see |
| 316 | non-linear physical memory chunks as linear memory in their |
| 317 | address space. |
KyongHo Cho | 2a96536 | 2012-05-12 05:56:09 +0900 | [diff] [blame] | 318 | |
| 319 | If unsure, say N here. |
| 320 | |
| 321 | config EXYNOS_IOMMU_DEBUG |
| 322 | bool "Debugging log for Exynos IOMMU" |
| 323 | depends on EXYNOS_IOMMU |
| 324 | help |
| 325 | Select this to see the detailed log message that shows what |
Sachin Kamat | 5455d70 | 2014-05-22 09:50:55 +0530 | [diff] [blame] | 326 | happens in the IOMMU driver. |
KyongHo Cho | 2a96536 | 2012-05-12 05:56:09 +0900 | [diff] [blame] | 327 | |
Sachin Kamat | 5455d70 | 2014-05-22 09:50:55 +0530 | [diff] [blame] | 328 | Say N unless you need kernel log message for IOMMU debugging. |
KyongHo Cho | 2a96536 | 2012-05-12 05:56:09 +0900 | [diff] [blame] | 329 | |
Laurent Pinchart | d25a2a1 | 2014-04-02 12:47:37 +0200 | [diff] [blame] | 330 | config IPMMU_VMSA |
| 331 | bool "Renesas VMSA-compatible IPMMU" |
Magnus Damm | 3ae4729 | 2017-05-17 19:07:10 +0900 | [diff] [blame] | 332 | depends on ARM || IOMMU_DMA |
Guenter Roeck | a4aaecc | 2017-09-10 13:43:37 -0700 | [diff] [blame] | 333 | depends on ARCH_RENESAS || (COMPILE_TEST && !GENERIC_ATOMIC64) |
Laurent Pinchart | d25a2a1 | 2014-04-02 12:47:37 +0200 | [diff] [blame] | 334 | select IOMMU_API |
Laurent Pinchart | f20ed39 | 2015-01-20 18:30:04 +0200 | [diff] [blame] | 335 | select IOMMU_IO_PGTABLE_LPAE |
Laurent Pinchart | d25a2a1 | 2014-04-02 12:47:37 +0200 | [diff] [blame] | 336 | select ARM_DMA_USE_IOMMU |
| 337 | help |
Geert Uytterhoeven | 15021d3 | 2018-07-25 15:10:29 +0200 | [diff] [blame] | 338 | Support for the Renesas VMSA-compatible IPMMU found in the R-Mobile |
| 339 | APE6, R-Car Gen2, and R-Car Gen3 SoCs. |
Laurent Pinchart | d25a2a1 | 2014-04-02 12:47:37 +0200 | [diff] [blame] | 340 | |
| 341 | If unsure, say N. |
| 342 | |
Alexey Kardashevskiy | 4e13c1a | 2013-05-21 13:33:09 +1000 | [diff] [blame] | 343 | config SPAPR_TCE_IOMMU |
| 344 | bool "sPAPR TCE IOMMU Support" |
Alexey Kardashevskiy | 5b25199 | 2013-05-21 13:33:11 +1000 | [diff] [blame] | 345 | depends on PPC_POWERNV || PPC_PSERIES |
Alexey Kardashevskiy | 4e13c1a | 2013-05-21 13:33:09 +1000 | [diff] [blame] | 346 | select IOMMU_API |
| 347 | help |
| 348 | Enables bits of IOMMU API required by VFIO. The iommu_ops |
| 349 | is not implemented as it is not necessary for VFIO. |
| 350 | |
Will Deacon | 48ec83b | 2015-05-27 17:25:59 +0100 | [diff] [blame] | 351 | # ARM IOMMU support |
Will Deacon | 45ae7cf | 2013-06-24 18:31:25 +0100 | [diff] [blame] | 352 | config ARM_SMMU |
| 353 | bool "ARM Ltd. System MMU (SMMU) Support" |
Joerg Roedel | a20cc76 | 2015-02-04 16:53:44 +0100 | [diff] [blame] | 354 | depends on (ARM64 || ARM) && MMU |
Will Deacon | 45ae7cf | 2013-06-24 18:31:25 +0100 | [diff] [blame] | 355 | select IOMMU_API |
Will Deacon | 518f713 | 2014-11-14 17:17:54 +0000 | [diff] [blame] | 356 | select IOMMU_IO_PGTABLE_LPAE |
Will Deacon | 45ae7cf | 2013-06-24 18:31:25 +0100 | [diff] [blame] | 357 | select ARM_DMA_USE_IOMMU if ARM |
| 358 | help |
| 359 | Support for implementations of the ARM System MMU architecture |
Will Deacon | 518f713 | 2014-11-14 17:17:54 +0000 | [diff] [blame] | 360 | versions 1 and 2. |
Will Deacon | 45ae7cf | 2013-06-24 18:31:25 +0100 | [diff] [blame] | 361 | |
| 362 | Say Y here if your SoC includes an IOMMU device implementing |
| 363 | the ARM SMMU architecture. |
| 364 | |
Douglas Anderson | 954a03b | 2019-03-01 11:20:17 -0800 | [diff] [blame] | 365 | config ARM_SMMU_DISABLE_BYPASS_BY_DEFAULT |
| 366 | bool "Default to disabling bypass on ARM SMMU v1 and v2" |
| 367 | depends on ARM_SMMU |
| 368 | default y |
| 369 | help |
| 370 | Say Y here to (by default) disable bypass streams such that |
| 371 | incoming transactions from devices that are not attached to |
| 372 | an iommu domain will report an abort back to the device and |
| 373 | will not be allowed to pass through the SMMU. |
| 374 | |
| 375 | Any old kernels that existed before this KConfig was |
| 376 | introduced would default to _allowing_ bypass (AKA the |
| 377 | equivalent of NO for this config). However the default for |
| 378 | this option is YES because the old behavior is insecure. |
| 379 | |
| 380 | There are few reasons to allow unmatched stream bypass, and |
| 381 | even fewer good ones. If saying YES here breaks your board |
| 382 | you should work on fixing your board. This KConfig option |
| 383 | is expected to be removed in the future and we'll simply |
| 384 | hardcode the bypass disable in the code. |
| 385 | |
| 386 | NOTE: the kernel command line parameter |
| 387 | 'arm-smmu.disable_bypass' will continue to override this |
| 388 | config. |
| 389 | |
Will Deacon | 48ec83b | 2015-05-27 17:25:59 +0100 | [diff] [blame] | 390 | config ARM_SMMU_V3 |
| 391 | bool "ARM Ltd. System MMU Version 3 (SMMUv3) Support" |
Robin Murphy | 08d4ca2 | 2016-09-12 17:13:46 +0100 | [diff] [blame] | 392 | depends on ARM64 |
Will Deacon | 48ec83b | 2015-05-27 17:25:59 +0100 | [diff] [blame] | 393 | select IOMMU_API |
| 394 | select IOMMU_IO_PGTABLE_LPAE |
Marc Zyngier | 166bdbd | 2015-10-13 18:32:30 +0100 | [diff] [blame] | 395 | select GENERIC_MSI_IRQ_DOMAIN |
Will Deacon | 48ec83b | 2015-05-27 17:25:59 +0100 | [diff] [blame] | 396 | help |
| 397 | Support for implementations of the ARM System MMU architecture |
| 398 | version 3 providing translation support to a PCIe root complex. |
| 399 | |
| 400 | Say Y here if your system includes an IOMMU device implementing |
| 401 | the ARM SMMUv3 architecture. |
| 402 | |
Gerald Schaefer | 8128f23c | 2015-08-27 15:33:03 +0200 | [diff] [blame] | 403 | config S390_IOMMU |
| 404 | def_bool y if S390 && PCI |
| 405 | depends on S390 && PCI |
| 406 | select IOMMU_API |
| 407 | help |
| 408 | Support for the IOMMU API for s390 PCI devices. |
| 409 | |
Dong Jia Shi | 63f1934 | 2017-03-17 04:17:31 +0100 | [diff] [blame] | 410 | config S390_CCW_IOMMU |
| 411 | bool "S390 CCW IOMMU Support" |
| 412 | depends on S390 && CCW |
| 413 | select IOMMU_API |
| 414 | help |
| 415 | Enables bits of IOMMU API required by VFIO. The iommu_ops |
| 416 | is not implemented as it is not necessary for VFIO. |
| 417 | |
Tony Krowiak | 1fde573 | 2018-09-25 19:16:19 -0400 | [diff] [blame] | 418 | config S390_AP_IOMMU |
| 419 | bool "S390 AP IOMMU Support" |
| 420 | depends on S390 && ZCRYPT |
| 421 | select IOMMU_API |
| 422 | help |
| 423 | Enables bits of IOMMU API required by VFIO. The iommu_ops |
| 424 | is not implemented as it is not necessary for VFIO. |
| 425 | |
Yong Wu | 0df4fab | 2016-02-23 01:20:50 +0800 | [diff] [blame] | 426 | config MTK_IOMMU |
| 427 | bool "MTK IOMMU Support" |
| 428 | depends on ARM || ARM64 |
| 429 | depends on ARCH_MEDIATEK || COMPILE_TEST |
Arnd Bergmann | 1928832 | 2016-02-29 10:19:06 +0100 | [diff] [blame] | 430 | select ARM_DMA_USE_IOMMU |
Yong Wu | 0df4fab | 2016-02-23 01:20:50 +0800 | [diff] [blame] | 431 | select IOMMU_API |
| 432 | select IOMMU_DMA |
| 433 | select IOMMU_IO_PGTABLE_ARMV7S |
| 434 | select MEMORY |
| 435 | select MTK_SMI |
| 436 | help |
| 437 | Support for the M4U on certain Mediatek SOCs. M4U is MultiMedia |
| 438 | Memory Management Unit. This option enables remapping of DMA memory |
| 439 | accesses for the multimedia subsystem. |
| 440 | |
| 441 | If unsure, say N here. |
| 442 | |
Honghui Zhang | b17336c | 2016-06-08 17:51:00 +0800 | [diff] [blame] | 443 | config MTK_IOMMU_V1 |
| 444 | bool "MTK IOMMU Version 1 (M4U gen1) Support" |
| 445 | depends on ARM |
| 446 | depends on ARCH_MEDIATEK || COMPILE_TEST |
| 447 | select ARM_DMA_USE_IOMMU |
| 448 | select IOMMU_API |
| 449 | select MEMORY |
| 450 | select MTK_SMI |
Honghui Zhang | b17336c | 2016-06-08 17:51:00 +0800 | [diff] [blame] | 451 | help |
| 452 | Support for the M4U on certain Mediatek SoCs. M4U generation 1 HW is |
| 453 | Multimedia Memory Managememt Unit. This option enables remapping of |
| 454 | DMA memory accesses for the multimedia subsystem. |
| 455 | |
| 456 | if unsure, say N here. |
| 457 | |
Rob Clark | 0ae349a | 2017-08-09 10:43:04 -0400 | [diff] [blame] | 458 | config QCOM_IOMMU |
| 459 | # Note: iommu drivers cannot (yet?) be built as modules |
| 460 | bool "Qualcomm IOMMU Support" |
Guenter Roeck | a4aaecc | 2017-09-10 13:43:37 -0700 | [diff] [blame] | 461 | depends on ARCH_QCOM || (COMPILE_TEST && !GENERIC_ATOMIC64) |
Rob Clark | 0ae349a | 2017-08-09 10:43:04 -0400 | [diff] [blame] | 462 | select IOMMU_API |
| 463 | select IOMMU_IO_PGTABLE_LPAE |
| 464 | select ARM_DMA_USE_IOMMU |
| 465 | help |
| 466 | Support for IOMMU on certain Qualcomm SoCs. |
| 467 | |
Lan Tianyu | 29217a4 | 2019-02-27 22:54:04 +0800 | [diff] [blame] | 468 | config HYPERV_IOMMU |
| 469 | bool "Hyper-V x2APIC IRQ Handling" |
| 470 | depends on HYPERV |
| 471 | select IOMMU_API |
| 472 | default HYPERV |
| 473 | help |
| 474 | Stub IOMMU driver to handle IRQs as to allow Hyper-V Linux |
| 475 | guests to run with x2APIC mode enabled. |
| 476 | |
Jean-Philippe Brucker | edcd69a | 2019-01-15 12:19:57 +0000 | [diff] [blame] | 477 | config VIRTIO_IOMMU |
| 478 | bool "Virtio IOMMU driver" |
| 479 | depends on VIRTIO=y |
| 480 | depends on ARM64 |
| 481 | select IOMMU_API |
| 482 | select INTERVAL_TREE |
| 483 | help |
| 484 | Para-virtualised IOMMU driver with virtio. |
| 485 | |
| 486 | Say Y here if you intend to run this kernel as a guest. |
| 487 | |
Ohad Ben-Cohen | ab493a0 | 2011-06-02 02:48:05 +0300 | [diff] [blame] | 488 | endif # IOMMU_SUPPORT |