2011-06-02 03:48:05 +04:00
|
|
|
obj-$(CONFIG_IOMMU_API) += iommu.o
|
2013-08-15 21:59:23 +04:00
|
|
|
obj-$(CONFIG_IOMMU_API) += iommu-traces.o
|
2014-06-13 02:12:24 +04:00
|
|
|
obj-$(CONFIG_IOMMU_API) += iommu-sysfs.o
|
2015-10-01 22:13:58 +03:00
|
|
|
obj-$(CONFIG_IOMMU_DMA) += dma-iommu.o
|
2014-11-14 20:16:49 +03:00
|
|
|
obj-$(CONFIG_IOMMU_IO_PGTABLE) += io-pgtable.o
|
2014-11-14 20:18:23 +03:00
|
|
|
obj-$(CONFIG_IOMMU_IO_PGTABLE_LPAE) += io-pgtable-arm.o
|
2015-01-12 20:51:13 +03:00
|
|
|
obj-$(CONFIG_IOMMU_IOVA) += iova.o
|
2012-06-25 15:23:54 +04:00
|
|
|
obj-$(CONFIG_OF_IOMMU) += of_iommu.o
|
2011-06-02 04:20:08 +04:00
|
|
|
obj-$(CONFIG_MSM_IOMMU) += msm_iommu.o msm_iommu_dev.o
|
2011-06-14 18:44:25 +04:00
|
|
|
obj-$(CONFIG_AMD_IOMMU) += amd_iommu.o amd_iommu_init.o
|
2011-11-09 15:31:15 +04:00
|
|
|
obj-$(CONFIG_AMD_IOMMU_V2) += amd_iommu_v2.o
|
2013-06-24 21:31:25 +04:00
|
|
|
obj-$(CONFIG_ARM_SMMU) += arm-smmu.o
|
2015-05-27 19:25:59 +03:00
|
|
|
obj-$(CONFIG_ARM_SMMU_V3) += arm-smmu-v3.o
|
2011-08-24 04:05:25 +04:00
|
|
|
obj-$(CONFIG_DMAR_TABLE) += dmar.o
|
2015-01-12 20:51:13 +03:00
|
|
|
obj-$(CONFIG_INTEL_IOMMU) += intel-iommu.o
|
2015-03-24 17:54:56 +03:00
|
|
|
obj-$(CONFIG_INTEL_IOMMU_SVM) += intel-svm.o
|
2014-04-02 14:47:37 +04:00
|
|
|
obj-$(CONFIG_IPMMU_VMSA) += ipmmu-vmsa.o
|
2012-03-30 22:47:08 +04:00
|
|
|
obj-$(CONFIG_IRQ_REMAP) += intel_irq_remapping.o irq_remapping.o
|
2011-08-16 00:21:41 +04:00
|
|
|
obj-$(CONFIG_OMAP_IOMMU) += omap-iommu.o
|
|
|
|
obj-$(CONFIG_OMAP_IOMMU_DEBUG) += omap-iommu-debug.o
|
iommu/rockchip: rk3288 iommu driver
The rk3288 has several iommus. Each iommu belongs to a single master
device. There is one device (ISP) that has two slave iommus, but that
case is not yet supported by this driver.
At subsys init, the iommu driver registers itself as the iommu driver for
the platform bus. The master devices find their slave iommus using the
"iommus" field in their devicetree description. Since each slave iommu
belongs to exactly one master, their is no additional data needed at probe
to associate a slave with its master.
An iommu device's power domain, clock and irq are all shared with its
master device, and the master device must be careful to attach from the
iommu only after powering and clocking it (and leave it powered and
clocked before detaching). Because their is no guarantee what the status
of the iommu is at probe, and since the driver does not even know if the
device is powered, we delay requesting its irq until the master device
attaches, at which point we have a guarantee that the device is powered
and clocked and we can reset it and disable its interrupt mask.
An iommu_domain describes a virtual iova address space. Each iommu_domain
has a corresponding page table that lists the mappings from iova to
physical address.
For the rk3288 iommu, the page table has two levels:
The Level 1 "directory_table" has 1024 4-byte dte entries.
Each dte points to a level 2 "page_table".
Each level 2 page_table has 1024 4-byte pte entries.
Each pte points to a 4 KiB page of memory.
An iommu_domain is created when a dma_iommu_mapping is created via
arm_iommu_create_mapping. Master devices can then attach themselves to
this mapping (or attach the mapping to themselves?) by calling
arm_iommu_attach_device(). This in turn instructs the iommu driver to
write the page table's physical address into the slave iommu's "Directory
Table Entry" (DTE) register.
In fact multiple master devices, each with their own slave iommu device,
can all attach to the same mapping. The iommus for these devices will
share the same iommu_domain and therefore point to the same page table.
Thus, the iommu domain maintains a list of iommu devices which are
attached. This driver relies on the iommu core to ensure that all devices
have detached before destroying a domain.
v6: - add .add/remove_device() callbacks.
- parse platform_device device tree nodes for "iommus" property
- store platform device pointer as group iommudata
- Check for existence of iommu group instead of relying on a
dev_get_drvdata() to return NULL for a NULL device.
v7: - fixup some strings.
- In rk_iommu_disable_paging() # and % were reversed.
Signed-off-by: Daniel Kurtz <djkurtz@chromium.org>
Signed-off-by: Simon Xue <xxm@rock-chips.com>
Reviewed-by: Grant Grundler <grundler@chromium.org>
Reviewed-by: Stéphane Marchesin <marcheu@chromium.org>
Tested-by: Heiko Stuebner <heiko@sntech.de>
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2014-11-03 05:53:27 +03:00
|
|
|
obj-$(CONFIG_ROCKCHIP_IOMMU) += rockchip-iommu.o
|
2011-11-16 19:36:37 +04:00
|
|
|
obj-$(CONFIG_TEGRA_IOMMU_GART) += tegra-gart.o
|
2011-11-17 09:31:31 +04:00
|
|
|
obj-$(CONFIG_TEGRA_IOMMU_SMMU) += tegra-smmu.o
|
2012-05-12 00:56:09 +04:00
|
|
|
obj-$(CONFIG_EXYNOS_IOMMU) += exynos-iommu.o
|
2013-07-15 08:50:57 +04:00
|
|
|
obj-$(CONFIG_FSL_PAMU) += fsl_pamu.o fsl_pamu_domain.o
|
2015-08-27 16:33:03 +03:00
|
|
|
obj-$(CONFIG_S390_IOMMU) += s390-iommu.o
|