blob: 7e04bf5640ae4996debc95319765445906371135 [file] [log] [blame]
Will Deacon45ae7cf2013-06-24 18:31:25 +01001/*
2 * IOMMU API for ARM architected SMMU implementations.
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this program; if not, write to the Free Software
15 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
16 *
17 * Copyright (C) 2013 ARM Limited
18 *
19 * Author: Will Deacon <will.deacon@arm.com>
20 *
21 * This driver currently supports:
22 * - SMMUv1 and v2 implementations
23 * - Stream-matching and stream-indexing
24 * - v7/v8 long-descriptor format
25 * - Non-secure access to the SMMU
Will Deacon45ae7cf2013-06-24 18:31:25 +010026 * - Context fault reporting
27 */
28
29#define pr_fmt(fmt) "arm-smmu: " fmt
30
31#include <linux/delay.h>
32#include <linux/dma-mapping.h>
33#include <linux/err.h>
34#include <linux/interrupt.h>
35#include <linux/io.h>
36#include <linux/iommu.h>
Mitchel Humpherys859a7322014-10-29 21:13:40 +000037#include <linux/iopoll.h>
Will Deacon45ae7cf2013-06-24 18:31:25 +010038#include <linux/module.h>
39#include <linux/of.h>
Robin Murphybae2c2d2015-07-29 19:46:05 +010040#include <linux/of_address.h>
Will Deacona9a1b0b2014-05-01 18:05:08 +010041#include <linux/pci.h>
Will Deacon45ae7cf2013-06-24 18:31:25 +010042#include <linux/platform_device.h>
43#include <linux/slab.h>
44#include <linux/spinlock.h>
45
46#include <linux/amba/bus.h>
47
Will Deacon518f7132014-11-14 17:17:54 +000048#include "io-pgtable.h"
Will Deacon45ae7cf2013-06-24 18:31:25 +010049
50/* Maximum number of stream IDs assigned to a single device */
Andreas Herrmann636e97b2014-01-30 18:18:08 +000051#define MAX_MASTER_STREAMIDS MAX_PHANDLE_ARGS
Will Deacon45ae7cf2013-06-24 18:31:25 +010052
53/* Maximum number of context banks per SMMU */
54#define ARM_SMMU_MAX_CBS 128
55
56/* Maximum number of mapping groups per SMMU */
57#define ARM_SMMU_MAX_SMRS 128
58
Will Deacon45ae7cf2013-06-24 18:31:25 +010059/* SMMU global address space */
60#define ARM_SMMU_GR0(smmu) ((smmu)->base)
Will Deaconc757e852014-07-30 11:33:25 +010061#define ARM_SMMU_GR1(smmu) ((smmu)->base + (1 << (smmu)->pgshift))
Will Deacon45ae7cf2013-06-24 18:31:25 +010062
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +000063/*
64 * SMMU global address space with conditional offset to access secure
65 * aliases of non-secure registers (e.g. nsCR0: 0x400, nsGFSR: 0x448,
66 * nsGFSYNR0: 0x450)
67 */
68#define ARM_SMMU_GR0_NS(smmu) \
69 ((smmu)->base + \
70 ((smmu->options & ARM_SMMU_OPT_SECURE_CFG_ACCESS) \
71 ? 0x400 : 0))
72
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +010073#ifdef CONFIG_64BIT
74#define smmu_writeq writeq_relaxed
75#else
76#define smmu_writeq(reg64, addr) \
77 do { \
78 u64 __val = (reg64); \
79 void __iomem *__addr = (addr); \
80 writel_relaxed(__val >> 32, __addr + 4); \
81 writel_relaxed(__val, __addr); \
82 } while (0)
83#endif
84
Will Deacon45ae7cf2013-06-24 18:31:25 +010085/* Configuration registers */
86#define ARM_SMMU_GR0_sCR0 0x0
87#define sCR0_CLIENTPD (1 << 0)
88#define sCR0_GFRE (1 << 1)
89#define sCR0_GFIE (1 << 2)
90#define sCR0_GCFGFRE (1 << 4)
91#define sCR0_GCFGFIE (1 << 5)
92#define sCR0_USFCFG (1 << 10)
93#define sCR0_VMIDPNE (1 << 11)
94#define sCR0_PTM (1 << 12)
95#define sCR0_FB (1 << 13)
96#define sCR0_BSU_SHIFT 14
97#define sCR0_BSU_MASK 0x3
98
99/* Identification registers */
100#define ARM_SMMU_GR0_ID0 0x20
101#define ARM_SMMU_GR0_ID1 0x24
102#define ARM_SMMU_GR0_ID2 0x28
103#define ARM_SMMU_GR0_ID3 0x2c
104#define ARM_SMMU_GR0_ID4 0x30
105#define ARM_SMMU_GR0_ID5 0x34
106#define ARM_SMMU_GR0_ID6 0x38
107#define ARM_SMMU_GR0_ID7 0x3c
108#define ARM_SMMU_GR0_sGFSR 0x48
109#define ARM_SMMU_GR0_sGFSYNR0 0x50
110#define ARM_SMMU_GR0_sGFSYNR1 0x54
111#define ARM_SMMU_GR0_sGFSYNR2 0x58
Will Deacon45ae7cf2013-06-24 18:31:25 +0100112
113#define ID0_S1TS (1 << 30)
114#define ID0_S2TS (1 << 29)
115#define ID0_NTS (1 << 28)
116#define ID0_SMS (1 << 27)
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000117#define ID0_ATOSNS (1 << 26)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100118#define ID0_CTTW (1 << 14)
119#define ID0_NUMIRPT_SHIFT 16
120#define ID0_NUMIRPT_MASK 0xff
Olav Haugan3c8766d2014-08-22 17:12:32 -0700121#define ID0_NUMSIDB_SHIFT 9
122#define ID0_NUMSIDB_MASK 0xf
Will Deacon45ae7cf2013-06-24 18:31:25 +0100123#define ID0_NUMSMRG_SHIFT 0
124#define ID0_NUMSMRG_MASK 0xff
125
126#define ID1_PAGESIZE (1 << 31)
127#define ID1_NUMPAGENDXB_SHIFT 28
128#define ID1_NUMPAGENDXB_MASK 7
129#define ID1_NUMS2CB_SHIFT 16
130#define ID1_NUMS2CB_MASK 0xff
131#define ID1_NUMCB_SHIFT 0
132#define ID1_NUMCB_MASK 0xff
133
134#define ID2_OAS_SHIFT 4
135#define ID2_OAS_MASK 0xf
136#define ID2_IAS_SHIFT 0
137#define ID2_IAS_MASK 0xf
138#define ID2_UBS_SHIFT 8
139#define ID2_UBS_MASK 0xf
140#define ID2_PTFS_4K (1 << 12)
141#define ID2_PTFS_16K (1 << 13)
142#define ID2_PTFS_64K (1 << 14)
143
Will Deacon45ae7cf2013-06-24 18:31:25 +0100144/* Global TLB invalidation */
Will Deacon45ae7cf2013-06-24 18:31:25 +0100145#define ARM_SMMU_GR0_TLBIVMID 0x64
146#define ARM_SMMU_GR0_TLBIALLNSNH 0x68
147#define ARM_SMMU_GR0_TLBIALLH 0x6c
148#define ARM_SMMU_GR0_sTLBGSYNC 0x70
149#define ARM_SMMU_GR0_sTLBGSTATUS 0x74
150#define sTLBGSTATUS_GSACTIVE (1 << 0)
151#define TLB_LOOP_TIMEOUT 1000000 /* 1s! */
152
153/* Stream mapping registers */
154#define ARM_SMMU_GR0_SMR(n) (0x800 + ((n) << 2))
155#define SMR_VALID (1 << 31)
156#define SMR_MASK_SHIFT 16
157#define SMR_MASK_MASK 0x7fff
158#define SMR_ID_SHIFT 0
159#define SMR_ID_MASK 0x7fff
160
161#define ARM_SMMU_GR0_S2CR(n) (0xc00 + ((n) << 2))
162#define S2CR_CBNDX_SHIFT 0
163#define S2CR_CBNDX_MASK 0xff
164#define S2CR_TYPE_SHIFT 16
165#define S2CR_TYPE_MASK 0x3
166#define S2CR_TYPE_TRANS (0 << S2CR_TYPE_SHIFT)
167#define S2CR_TYPE_BYPASS (1 << S2CR_TYPE_SHIFT)
168#define S2CR_TYPE_FAULT (2 << S2CR_TYPE_SHIFT)
169
170/* Context bank attribute registers */
171#define ARM_SMMU_GR1_CBAR(n) (0x0 + ((n) << 2))
172#define CBAR_VMID_SHIFT 0
173#define CBAR_VMID_MASK 0xff
Will Deacon57ca90f2014-02-06 14:59:05 +0000174#define CBAR_S1_BPSHCFG_SHIFT 8
175#define CBAR_S1_BPSHCFG_MASK 3
176#define CBAR_S1_BPSHCFG_NSH 3
Will Deacon45ae7cf2013-06-24 18:31:25 +0100177#define CBAR_S1_MEMATTR_SHIFT 12
178#define CBAR_S1_MEMATTR_MASK 0xf
179#define CBAR_S1_MEMATTR_WB 0xf
180#define CBAR_TYPE_SHIFT 16
181#define CBAR_TYPE_MASK 0x3
182#define CBAR_TYPE_S2_TRANS (0 << CBAR_TYPE_SHIFT)
183#define CBAR_TYPE_S1_TRANS_S2_BYPASS (1 << CBAR_TYPE_SHIFT)
184#define CBAR_TYPE_S1_TRANS_S2_FAULT (2 << CBAR_TYPE_SHIFT)
185#define CBAR_TYPE_S1_TRANS_S2_TRANS (3 << CBAR_TYPE_SHIFT)
186#define CBAR_IRPTNDX_SHIFT 24
187#define CBAR_IRPTNDX_MASK 0xff
188
189#define ARM_SMMU_GR1_CBA2R(n) (0x800 + ((n) << 2))
190#define CBA2R_RW64_32BIT (0 << 0)
191#define CBA2R_RW64_64BIT (1 << 0)
192
193/* Translation context bank */
194#define ARM_SMMU_CB_BASE(smmu) ((smmu)->base + ((smmu)->size >> 1))
Will Deaconc757e852014-07-30 11:33:25 +0100195#define ARM_SMMU_CB(smmu, n) ((n) * (1 << (smmu)->pgshift))
Will Deacon45ae7cf2013-06-24 18:31:25 +0100196
197#define ARM_SMMU_CB_SCTLR 0x0
198#define ARM_SMMU_CB_RESUME 0x8
199#define ARM_SMMU_CB_TTBCR2 0x10
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100200#define ARM_SMMU_CB_TTBR0 0x20
201#define ARM_SMMU_CB_TTBR1 0x28
Will Deacon45ae7cf2013-06-24 18:31:25 +0100202#define ARM_SMMU_CB_TTBCR 0x30
203#define ARM_SMMU_CB_S1_MAIR0 0x38
Will Deacon518f7132014-11-14 17:17:54 +0000204#define ARM_SMMU_CB_S1_MAIR1 0x3c
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000205#define ARM_SMMU_CB_PAR_LO 0x50
206#define ARM_SMMU_CB_PAR_HI 0x54
Will Deacon45ae7cf2013-06-24 18:31:25 +0100207#define ARM_SMMU_CB_FSR 0x58
208#define ARM_SMMU_CB_FAR_LO 0x60
209#define ARM_SMMU_CB_FAR_HI 0x64
210#define ARM_SMMU_CB_FSYNR0 0x68
Will Deacon518f7132014-11-14 17:17:54 +0000211#define ARM_SMMU_CB_S1_TLBIVA 0x600
Will Deacon1463fe42013-07-31 19:21:27 +0100212#define ARM_SMMU_CB_S1_TLBIASID 0x610
Will Deacon518f7132014-11-14 17:17:54 +0000213#define ARM_SMMU_CB_S1_TLBIVAL 0x620
214#define ARM_SMMU_CB_S2_TLBIIPAS2 0x630
215#define ARM_SMMU_CB_S2_TLBIIPAS2L 0x638
Robin Murphy661d9622015-05-27 17:09:34 +0100216#define ARM_SMMU_CB_ATS1PR 0x800
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000217#define ARM_SMMU_CB_ATSR 0x8f0
Will Deacon45ae7cf2013-06-24 18:31:25 +0100218
219#define SCTLR_S1_ASIDPNE (1 << 12)
220#define SCTLR_CFCFG (1 << 7)
221#define SCTLR_CFIE (1 << 6)
222#define SCTLR_CFRE (1 << 5)
223#define SCTLR_E (1 << 4)
224#define SCTLR_AFE (1 << 2)
225#define SCTLR_TRE (1 << 1)
226#define SCTLR_M (1 << 0)
227#define SCTLR_EAE_SBOP (SCTLR_AFE | SCTLR_TRE)
228
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000229#define CB_PAR_F (1 << 0)
230
231#define ATSR_ACTIVE (1 << 0)
232
Will Deacon45ae7cf2013-06-24 18:31:25 +0100233#define RESUME_RETRY (0 << 0)
234#define RESUME_TERMINATE (1 << 0)
235
Will Deacon45ae7cf2013-06-24 18:31:25 +0100236#define TTBCR2_SEP_SHIFT 15
Will Deacon5dc56162015-05-08 17:44:22 +0100237#define TTBCR2_SEP_UPSTREAM (0x7 << TTBCR2_SEP_SHIFT)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100238
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100239#define TTBRn_ASID_SHIFT 48
Will Deacon45ae7cf2013-06-24 18:31:25 +0100240
241#define FSR_MULTI (1 << 31)
242#define FSR_SS (1 << 30)
243#define FSR_UUT (1 << 8)
244#define FSR_ASF (1 << 7)
245#define FSR_TLBLKF (1 << 6)
246#define FSR_TLBMCF (1 << 5)
247#define FSR_EF (1 << 4)
248#define FSR_PF (1 << 3)
249#define FSR_AFF (1 << 2)
250#define FSR_TF (1 << 1)
251
Mitchel Humpherys29073202014-07-08 09:52:18 -0700252#define FSR_IGN (FSR_AFF | FSR_ASF | \
253 FSR_TLBMCF | FSR_TLBLKF)
254#define FSR_FAULT (FSR_MULTI | FSR_SS | FSR_UUT | \
Will Deaconadaba322013-07-31 19:21:26 +0100255 FSR_EF | FSR_PF | FSR_TF | FSR_IGN)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100256
257#define FSYNR0_WNR (1 << 4)
258
Will Deacon4cf740b2014-07-14 19:47:39 +0100259static int force_stage;
Will Deacone3ce0c92015-05-27 17:09:35 +0100260module_param_named(force_stage, force_stage, int, S_IRUGO);
Will Deacon4cf740b2014-07-14 19:47:39 +0100261MODULE_PARM_DESC(force_stage,
262 "Force SMMU mappings to be installed at a particular stage of translation. A value of '1' or '2' forces the corresponding stage. All other values are ignored (i.e. no stage is forced). Note that selecting a specific stage will disable support for nested translation.");
263
Robin Murphy09360402014-08-28 17:51:59 +0100264enum arm_smmu_arch_version {
265 ARM_SMMU_V1 = 1,
266 ARM_SMMU_V2,
267};
268
Will Deacon45ae7cf2013-06-24 18:31:25 +0100269struct arm_smmu_smr {
270 u8 idx;
271 u16 mask;
272 u16 id;
273};
274
Will Deacona9a1b0b2014-05-01 18:05:08 +0100275struct arm_smmu_master_cfg {
Will Deacon45ae7cf2013-06-24 18:31:25 +0100276 int num_streamids;
277 u16 streamids[MAX_MASTER_STREAMIDS];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100278 struct arm_smmu_smr *smrs;
279};
280
Will Deacona9a1b0b2014-05-01 18:05:08 +0100281struct arm_smmu_master {
282 struct device_node *of_node;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100283 struct rb_node node;
284 struct arm_smmu_master_cfg cfg;
285};
286
Will Deacon45ae7cf2013-06-24 18:31:25 +0100287struct arm_smmu_device {
288 struct device *dev;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100289
290 void __iomem *base;
291 unsigned long size;
Will Deaconc757e852014-07-30 11:33:25 +0100292 unsigned long pgshift;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100293
294#define ARM_SMMU_FEAT_COHERENT_WALK (1 << 0)
295#define ARM_SMMU_FEAT_STREAM_MATCH (1 << 1)
296#define ARM_SMMU_FEAT_TRANS_S1 (1 << 2)
297#define ARM_SMMU_FEAT_TRANS_S2 (1 << 3)
298#define ARM_SMMU_FEAT_TRANS_NESTED (1 << 4)
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000299#define ARM_SMMU_FEAT_TRANS_OPS (1 << 5)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100300 u32 features;
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000301
302#define ARM_SMMU_OPT_SECURE_CFG_ACCESS (1 << 0)
303 u32 options;
Robin Murphy09360402014-08-28 17:51:59 +0100304 enum arm_smmu_arch_version version;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100305
306 u32 num_context_banks;
307 u32 num_s2_context_banks;
308 DECLARE_BITMAP(context_map, ARM_SMMU_MAX_CBS);
309 atomic_t irptndx;
310
311 u32 num_mapping_groups;
312 DECLARE_BITMAP(smr_map, ARM_SMMU_MAX_SMRS);
313
Will Deacon518f7132014-11-14 17:17:54 +0000314 unsigned long va_size;
315 unsigned long ipa_size;
316 unsigned long pa_size;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100317
318 u32 num_global_irqs;
319 u32 num_context_irqs;
320 unsigned int *irqs;
321
Will Deacon45ae7cf2013-06-24 18:31:25 +0100322 struct list_head list;
323 struct rb_root masters;
324};
325
326struct arm_smmu_cfg {
Will Deacon45ae7cf2013-06-24 18:31:25 +0100327 u8 cbndx;
328 u8 irptndx;
329 u32 cbar;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100330};
Dan Carpenterfaea13b72013-08-21 09:33:30 +0100331#define INVALID_IRPTNDX 0xff
Will Deacon45ae7cf2013-06-24 18:31:25 +0100332
Will Deaconecfadb62013-07-31 19:21:28 +0100333#define ARM_SMMU_CB_ASID(cfg) ((cfg)->cbndx)
334#define ARM_SMMU_CB_VMID(cfg) ((cfg)->cbndx + 1)
335
Will Deaconc752ce42014-06-25 22:46:31 +0100336enum arm_smmu_domain_stage {
337 ARM_SMMU_DOMAIN_S1 = 0,
338 ARM_SMMU_DOMAIN_S2,
339 ARM_SMMU_DOMAIN_NESTED,
340};
341
Will Deacon45ae7cf2013-06-24 18:31:25 +0100342struct arm_smmu_domain {
Will Deacon44680ee2014-06-25 11:29:12 +0100343 struct arm_smmu_device *smmu;
Will Deacon518f7132014-11-14 17:17:54 +0000344 struct io_pgtable_ops *pgtbl_ops;
345 spinlock_t pgtbl_lock;
Will Deacon44680ee2014-06-25 11:29:12 +0100346 struct arm_smmu_cfg cfg;
Will Deaconc752ce42014-06-25 22:46:31 +0100347 enum arm_smmu_domain_stage stage;
Will Deacon518f7132014-11-14 17:17:54 +0000348 struct mutex init_mutex; /* Protects smmu pointer */
Joerg Roedel1d672632015-03-26 13:43:10 +0100349 struct iommu_domain domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100350};
351
Will Deacon518f7132014-11-14 17:17:54 +0000352static struct iommu_ops arm_smmu_ops;
353
Will Deacon45ae7cf2013-06-24 18:31:25 +0100354static DEFINE_SPINLOCK(arm_smmu_devices_lock);
355static LIST_HEAD(arm_smmu_devices);
356
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000357struct arm_smmu_option_prop {
358 u32 opt;
359 const char *prop;
360};
361
Mitchel Humpherys29073202014-07-08 09:52:18 -0700362static struct arm_smmu_option_prop arm_smmu_options[] = {
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000363 { ARM_SMMU_OPT_SECURE_CFG_ACCESS, "calxeda,smmu-secure-config-access" },
364 { 0, NULL},
365};
366
Joerg Roedel1d672632015-03-26 13:43:10 +0100367static struct arm_smmu_domain *to_smmu_domain(struct iommu_domain *dom)
368{
369 return container_of(dom, struct arm_smmu_domain, domain);
370}
371
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000372static void parse_driver_options(struct arm_smmu_device *smmu)
373{
374 int i = 0;
Mitchel Humpherys29073202014-07-08 09:52:18 -0700375
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000376 do {
377 if (of_property_read_bool(smmu->dev->of_node,
378 arm_smmu_options[i].prop)) {
379 smmu->options |= arm_smmu_options[i].opt;
380 dev_notice(smmu->dev, "option %s\n",
381 arm_smmu_options[i].prop);
382 }
383 } while (arm_smmu_options[++i].opt);
384}
385
Will Deacon8f68f8e2014-07-15 11:27:08 +0100386static struct device_node *dev_get_dev_node(struct device *dev)
Will Deacona9a1b0b2014-05-01 18:05:08 +0100387{
388 if (dev_is_pci(dev)) {
389 struct pci_bus *bus = to_pci_dev(dev)->bus;
Mitchel Humpherys29073202014-07-08 09:52:18 -0700390
Will Deacona9a1b0b2014-05-01 18:05:08 +0100391 while (!pci_is_root_bus(bus))
392 bus = bus->parent;
Will Deacon8f68f8e2014-07-15 11:27:08 +0100393 return bus->bridge->parent->of_node;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100394 }
395
Will Deacon8f68f8e2014-07-15 11:27:08 +0100396 return dev->of_node;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100397}
398
Will Deacon45ae7cf2013-06-24 18:31:25 +0100399static struct arm_smmu_master *find_smmu_master(struct arm_smmu_device *smmu,
400 struct device_node *dev_node)
401{
402 struct rb_node *node = smmu->masters.rb_node;
403
404 while (node) {
405 struct arm_smmu_master *master;
Mitchel Humpherys29073202014-07-08 09:52:18 -0700406
Will Deacon45ae7cf2013-06-24 18:31:25 +0100407 master = container_of(node, struct arm_smmu_master, node);
408
409 if (dev_node < master->of_node)
410 node = node->rb_left;
411 else if (dev_node > master->of_node)
412 node = node->rb_right;
413 else
414 return master;
415 }
416
417 return NULL;
418}
419
Will Deacona9a1b0b2014-05-01 18:05:08 +0100420static struct arm_smmu_master_cfg *
Will Deacon8f68f8e2014-07-15 11:27:08 +0100421find_smmu_master_cfg(struct device *dev)
Will Deacona9a1b0b2014-05-01 18:05:08 +0100422{
Will Deacon8f68f8e2014-07-15 11:27:08 +0100423 struct arm_smmu_master_cfg *cfg = NULL;
424 struct iommu_group *group = iommu_group_get(dev);
Will Deacona9a1b0b2014-05-01 18:05:08 +0100425
Will Deacon8f68f8e2014-07-15 11:27:08 +0100426 if (group) {
427 cfg = iommu_group_get_iommudata(group);
428 iommu_group_put(group);
429 }
Will Deacona9a1b0b2014-05-01 18:05:08 +0100430
Will Deacon8f68f8e2014-07-15 11:27:08 +0100431 return cfg;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100432}
433
Will Deacon45ae7cf2013-06-24 18:31:25 +0100434static int insert_smmu_master(struct arm_smmu_device *smmu,
435 struct arm_smmu_master *master)
436{
437 struct rb_node **new, *parent;
438
439 new = &smmu->masters.rb_node;
440 parent = NULL;
441 while (*new) {
Mitchel Humpherys29073202014-07-08 09:52:18 -0700442 struct arm_smmu_master *this
443 = container_of(*new, struct arm_smmu_master, node);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100444
445 parent = *new;
446 if (master->of_node < this->of_node)
447 new = &((*new)->rb_left);
448 else if (master->of_node > this->of_node)
449 new = &((*new)->rb_right);
450 else
451 return -EEXIST;
452 }
453
454 rb_link_node(&master->node, parent, new);
455 rb_insert_color(&master->node, &smmu->masters);
456 return 0;
457}
458
459static int register_smmu_master(struct arm_smmu_device *smmu,
460 struct device *dev,
461 struct of_phandle_args *masterspec)
462{
463 int i;
464 struct arm_smmu_master *master;
465
466 master = find_smmu_master(smmu, masterspec->np);
467 if (master) {
468 dev_err(dev,
469 "rejecting multiple registrations for master device %s\n",
470 masterspec->np->name);
471 return -EBUSY;
472 }
473
474 if (masterspec->args_count > MAX_MASTER_STREAMIDS) {
475 dev_err(dev,
476 "reached maximum number (%d) of stream IDs for master device %s\n",
477 MAX_MASTER_STREAMIDS, masterspec->np->name);
478 return -ENOSPC;
479 }
480
481 master = devm_kzalloc(dev, sizeof(*master), GFP_KERNEL);
482 if (!master)
483 return -ENOMEM;
484
Will Deacona9a1b0b2014-05-01 18:05:08 +0100485 master->of_node = masterspec->np;
486 master->cfg.num_streamids = masterspec->args_count;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100487
Olav Haugan3c8766d2014-08-22 17:12:32 -0700488 for (i = 0; i < master->cfg.num_streamids; ++i) {
489 u16 streamid = masterspec->args[i];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100490
Olav Haugan3c8766d2014-08-22 17:12:32 -0700491 if (!(smmu->features & ARM_SMMU_FEAT_STREAM_MATCH) &&
492 (streamid >= smmu->num_mapping_groups)) {
493 dev_err(dev,
494 "stream ID for master device %s greater than maximum allowed (%d)\n",
495 masterspec->np->name, smmu->num_mapping_groups);
496 return -ERANGE;
497 }
498 master->cfg.streamids[i] = streamid;
499 }
Will Deacon45ae7cf2013-06-24 18:31:25 +0100500 return insert_smmu_master(smmu, master);
501}
502
Will Deacon44680ee2014-06-25 11:29:12 +0100503static struct arm_smmu_device *find_smmu_for_device(struct device *dev)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100504{
Will Deacon44680ee2014-06-25 11:29:12 +0100505 struct arm_smmu_device *smmu;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100506 struct arm_smmu_master *master = NULL;
Will Deacon8f68f8e2014-07-15 11:27:08 +0100507 struct device_node *dev_node = dev_get_dev_node(dev);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100508
509 spin_lock(&arm_smmu_devices_lock);
Will Deacon44680ee2014-06-25 11:29:12 +0100510 list_for_each_entry(smmu, &arm_smmu_devices, list) {
Will Deacona9a1b0b2014-05-01 18:05:08 +0100511 master = find_smmu_master(smmu, dev_node);
512 if (master)
513 break;
514 }
Will Deacon45ae7cf2013-06-24 18:31:25 +0100515 spin_unlock(&arm_smmu_devices_lock);
Will Deacon44680ee2014-06-25 11:29:12 +0100516
Will Deacona9a1b0b2014-05-01 18:05:08 +0100517 return master ? smmu : NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100518}
519
520static int __arm_smmu_alloc_bitmap(unsigned long *map, int start, int end)
521{
522 int idx;
523
524 do {
525 idx = find_next_zero_bit(map, end, start);
526 if (idx == end)
527 return -ENOSPC;
528 } while (test_and_set_bit(idx, map));
529
530 return idx;
531}
532
533static void __arm_smmu_free_bitmap(unsigned long *map, int idx)
534{
535 clear_bit(idx, map);
536}
537
538/* Wait for any pending TLB invalidations to complete */
Will Deacon518f7132014-11-14 17:17:54 +0000539static void __arm_smmu_tlb_sync(struct arm_smmu_device *smmu)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100540{
541 int count = 0;
542 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
543
544 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_sTLBGSYNC);
545 while (readl_relaxed(gr0_base + ARM_SMMU_GR0_sTLBGSTATUS)
546 & sTLBGSTATUS_GSACTIVE) {
547 cpu_relax();
548 if (++count == TLB_LOOP_TIMEOUT) {
549 dev_err_ratelimited(smmu->dev,
550 "TLB sync timed out -- SMMU may be deadlocked\n");
551 return;
552 }
553 udelay(1);
554 }
555}
556
Will Deacon518f7132014-11-14 17:17:54 +0000557static void arm_smmu_tlb_sync(void *cookie)
Will Deacon1463fe42013-07-31 19:21:27 +0100558{
Will Deacon518f7132014-11-14 17:17:54 +0000559 struct arm_smmu_domain *smmu_domain = cookie;
560 __arm_smmu_tlb_sync(smmu_domain->smmu);
561}
562
563static void arm_smmu_tlb_inv_context(void *cookie)
564{
565 struct arm_smmu_domain *smmu_domain = cookie;
Will Deacon44680ee2014-06-25 11:29:12 +0100566 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
567 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon1463fe42013-07-31 19:21:27 +0100568 bool stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
Will Deacon518f7132014-11-14 17:17:54 +0000569 void __iomem *base;
Will Deacon1463fe42013-07-31 19:21:27 +0100570
571 if (stage1) {
572 base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deaconecfadb62013-07-31 19:21:28 +0100573 writel_relaxed(ARM_SMMU_CB_ASID(cfg),
574 base + ARM_SMMU_CB_S1_TLBIASID);
Will Deacon1463fe42013-07-31 19:21:27 +0100575 } else {
576 base = ARM_SMMU_GR0(smmu);
Will Deaconecfadb62013-07-31 19:21:28 +0100577 writel_relaxed(ARM_SMMU_CB_VMID(cfg),
578 base + ARM_SMMU_GR0_TLBIVMID);
Will Deacon1463fe42013-07-31 19:21:27 +0100579 }
580
Will Deacon518f7132014-11-14 17:17:54 +0000581 __arm_smmu_tlb_sync(smmu);
Will Deacon1463fe42013-07-31 19:21:27 +0100582}
583
Will Deacon518f7132014-11-14 17:17:54 +0000584static void arm_smmu_tlb_inv_range_nosync(unsigned long iova, size_t size,
Robin Murphy06c610e2015-12-07 18:18:53 +0000585 size_t granule, bool leaf, void *cookie)
Will Deacon518f7132014-11-14 17:17:54 +0000586{
587 struct arm_smmu_domain *smmu_domain = cookie;
588 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
589 struct arm_smmu_device *smmu = smmu_domain->smmu;
590 bool stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
591 void __iomem *reg;
592
593 if (stage1) {
594 reg = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
595 reg += leaf ? ARM_SMMU_CB_S1_TLBIVAL : ARM_SMMU_CB_S1_TLBIVA;
596
597 if (!IS_ENABLED(CONFIG_64BIT) || smmu->version == ARM_SMMU_V1) {
598 iova &= ~12UL;
599 iova |= ARM_SMMU_CB_ASID(cfg);
600 writel_relaxed(iova, reg);
601#ifdef CONFIG_64BIT
602 } else {
603 iova >>= 12;
604 iova |= (u64)ARM_SMMU_CB_ASID(cfg) << 48;
605 writeq_relaxed(iova, reg);
606#endif
607 }
608#ifdef CONFIG_64BIT
609 } else if (smmu->version == ARM_SMMU_V2) {
610 reg = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
611 reg += leaf ? ARM_SMMU_CB_S2_TLBIIPAS2L :
612 ARM_SMMU_CB_S2_TLBIIPAS2;
613 writeq_relaxed(iova >> 12, reg);
614#endif
615 } else {
616 reg = ARM_SMMU_GR0(smmu) + ARM_SMMU_GR0_TLBIVMID;
617 writel_relaxed(ARM_SMMU_CB_VMID(cfg), reg);
618 }
619}
620
Will Deacon518f7132014-11-14 17:17:54 +0000621static struct iommu_gather_ops arm_smmu_gather_ops = {
622 .tlb_flush_all = arm_smmu_tlb_inv_context,
623 .tlb_add_flush = arm_smmu_tlb_inv_range_nosync,
624 .tlb_sync = arm_smmu_tlb_sync,
Will Deacon518f7132014-11-14 17:17:54 +0000625};
626
Will Deacon45ae7cf2013-06-24 18:31:25 +0100627static irqreturn_t arm_smmu_context_fault(int irq, void *dev)
628{
629 int flags, ret;
630 u32 fsr, far, fsynr, resume;
631 unsigned long iova;
632 struct iommu_domain *domain = dev;
Joerg Roedel1d672632015-03-26 13:43:10 +0100633 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon44680ee2014-06-25 11:29:12 +0100634 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
635 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100636 void __iomem *cb_base;
637
Will Deacon44680ee2014-06-25 11:29:12 +0100638 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100639 fsr = readl_relaxed(cb_base + ARM_SMMU_CB_FSR);
640
641 if (!(fsr & FSR_FAULT))
642 return IRQ_NONE;
643
644 if (fsr & FSR_IGN)
645 dev_err_ratelimited(smmu->dev,
Hans Wennborg70c9a7d2014-08-06 05:42:01 +0100646 "Unexpected context fault (fsr 0x%x)\n",
Will Deacon45ae7cf2013-06-24 18:31:25 +0100647 fsr);
648
649 fsynr = readl_relaxed(cb_base + ARM_SMMU_CB_FSYNR0);
650 flags = fsynr & FSYNR0_WNR ? IOMMU_FAULT_WRITE : IOMMU_FAULT_READ;
651
652 far = readl_relaxed(cb_base + ARM_SMMU_CB_FAR_LO);
653 iova = far;
654#ifdef CONFIG_64BIT
655 far = readl_relaxed(cb_base + ARM_SMMU_CB_FAR_HI);
656 iova |= ((unsigned long)far << 32);
657#endif
658
659 if (!report_iommu_fault(domain, smmu->dev, iova, flags)) {
660 ret = IRQ_HANDLED;
661 resume = RESUME_RETRY;
662 } else {
Andreas Herrmann2ef0f032013-10-01 13:39:08 +0100663 dev_err_ratelimited(smmu->dev,
664 "Unhandled context fault: iova=0x%08lx, fsynr=0x%x, cb=%d\n",
Will Deacon44680ee2014-06-25 11:29:12 +0100665 iova, fsynr, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100666 ret = IRQ_NONE;
667 resume = RESUME_TERMINATE;
668 }
669
670 /* Clear the faulting FSR */
671 writel(fsr, cb_base + ARM_SMMU_CB_FSR);
672
673 /* Retry or terminate any stalled transactions */
674 if (fsr & FSR_SS)
675 writel_relaxed(resume, cb_base + ARM_SMMU_CB_RESUME);
676
677 return ret;
678}
679
680static irqreturn_t arm_smmu_global_fault(int irq, void *dev)
681{
682 u32 gfsr, gfsynr0, gfsynr1, gfsynr2;
683 struct arm_smmu_device *smmu = dev;
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000684 void __iomem *gr0_base = ARM_SMMU_GR0_NS(smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100685
686 gfsr = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSR);
687 gfsynr0 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR0);
688 gfsynr1 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR1);
689 gfsynr2 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR2);
690
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000691 if (!gfsr)
692 return IRQ_NONE;
693
Will Deacon45ae7cf2013-06-24 18:31:25 +0100694 dev_err_ratelimited(smmu->dev,
695 "Unexpected global fault, this could be serious\n");
696 dev_err_ratelimited(smmu->dev,
697 "\tGFSR 0x%08x, GFSYNR0 0x%08x, GFSYNR1 0x%08x, GFSYNR2 0x%08x\n",
698 gfsr, gfsynr0, gfsynr1, gfsynr2);
699
700 writel(gfsr, gr0_base + ARM_SMMU_GR0_sGFSR);
Will Deaconadaba322013-07-31 19:21:26 +0100701 return IRQ_HANDLED;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100702}
703
Will Deacon518f7132014-11-14 17:17:54 +0000704static void arm_smmu_init_context_bank(struct arm_smmu_domain *smmu_domain,
705 struct io_pgtable_cfg *pgtbl_cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100706{
707 u32 reg;
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100708 u64 reg64;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100709 bool stage1;
Will Deacon44680ee2014-06-25 11:29:12 +0100710 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
711 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deaconc88ae5d2015-10-13 17:53:24 +0100712 void __iomem *cb_base, *gr1_base;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100713
Will Deacon45ae7cf2013-06-24 18:31:25 +0100714 gr1_base = ARM_SMMU_GR1(smmu);
Will Deacon44680ee2014-06-25 11:29:12 +0100715 stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
716 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100717
Will Deacon4a1c93c2015-03-04 12:21:03 +0000718 if (smmu->version > ARM_SMMU_V1) {
719 /*
720 * CBA2R.
721 * *Must* be initialised before CBAR thanks to VMID16
722 * architectural oversight affected some implementations.
723 */
724#ifdef CONFIG_64BIT
725 reg = CBA2R_RW64_64BIT;
726#else
727 reg = CBA2R_RW64_32BIT;
728#endif
729 writel_relaxed(reg, gr1_base + ARM_SMMU_GR1_CBA2R(cfg->cbndx));
730 }
731
Will Deacon45ae7cf2013-06-24 18:31:25 +0100732 /* CBAR */
Will Deacon44680ee2014-06-25 11:29:12 +0100733 reg = cfg->cbar;
Robin Murphy09360402014-08-28 17:51:59 +0100734 if (smmu->version == ARM_SMMU_V1)
Mitchel Humpherys29073202014-07-08 09:52:18 -0700735 reg |= cfg->irptndx << CBAR_IRPTNDX_SHIFT;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100736
Will Deacon57ca90f2014-02-06 14:59:05 +0000737 /*
738 * Use the weakest shareability/memory types, so they are
739 * overridden by the ttbcr/pte.
740 */
741 if (stage1) {
742 reg |= (CBAR_S1_BPSHCFG_NSH << CBAR_S1_BPSHCFG_SHIFT) |
743 (CBAR_S1_MEMATTR_WB << CBAR_S1_MEMATTR_SHIFT);
744 } else {
Will Deacon44680ee2014-06-25 11:29:12 +0100745 reg |= ARM_SMMU_CB_VMID(cfg) << CBAR_VMID_SHIFT;
Will Deacon57ca90f2014-02-06 14:59:05 +0000746 }
Will Deacon44680ee2014-06-25 11:29:12 +0100747 writel_relaxed(reg, gr1_base + ARM_SMMU_GR1_CBAR(cfg->cbndx));
Will Deacon45ae7cf2013-06-24 18:31:25 +0100748
Will Deacon518f7132014-11-14 17:17:54 +0000749 /* TTBRs */
750 if (stage1) {
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100751 reg64 = pgtbl_cfg->arm_lpae_s1_cfg.ttbr[0];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100752
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100753 reg64 |= ((u64)ARM_SMMU_CB_ASID(cfg)) << TTBRn_ASID_SHIFT;
754 smmu_writeq(reg64, cb_base + ARM_SMMU_CB_TTBR0);
755
756 reg64 = pgtbl_cfg->arm_lpae_s1_cfg.ttbr[1];
757 reg64 |= ((u64)ARM_SMMU_CB_ASID(cfg)) << TTBRn_ASID_SHIFT;
758 smmu_writeq(reg64, cb_base + ARM_SMMU_CB_TTBR1);
Will Deacon518f7132014-11-14 17:17:54 +0000759 } else {
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100760 reg64 = pgtbl_cfg->arm_lpae_s2_cfg.vttbr;
761 smmu_writeq(reg64, cb_base + ARM_SMMU_CB_TTBR0);
Will Deacon518f7132014-11-14 17:17:54 +0000762 }
Will Deacon45ae7cf2013-06-24 18:31:25 +0100763
Will Deacon518f7132014-11-14 17:17:54 +0000764 /* TTBCR */
765 if (stage1) {
766 reg = pgtbl_cfg->arm_lpae_s1_cfg.tcr;
767 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR);
768 if (smmu->version > ARM_SMMU_V1) {
769 reg = pgtbl_cfg->arm_lpae_s1_cfg.tcr >> 32;
Will Deacon5dc56162015-05-08 17:44:22 +0100770 reg |= TTBCR2_SEP_UPSTREAM;
Will Deacon518f7132014-11-14 17:17:54 +0000771 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR2);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100772 }
773 } else {
Will Deacon518f7132014-11-14 17:17:54 +0000774 reg = pgtbl_cfg->arm_lpae_s2_cfg.vtcr;
775 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100776 }
777
Will Deacon518f7132014-11-14 17:17:54 +0000778 /* MAIRs (stage-1 only) */
Will Deacon45ae7cf2013-06-24 18:31:25 +0100779 if (stage1) {
Will Deacon518f7132014-11-14 17:17:54 +0000780 reg = pgtbl_cfg->arm_lpae_s1_cfg.mair[0];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100781 writel_relaxed(reg, cb_base + ARM_SMMU_CB_S1_MAIR0);
Will Deacon518f7132014-11-14 17:17:54 +0000782 reg = pgtbl_cfg->arm_lpae_s1_cfg.mair[1];
783 writel_relaxed(reg, cb_base + ARM_SMMU_CB_S1_MAIR1);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100784 }
785
Will Deacon45ae7cf2013-06-24 18:31:25 +0100786 /* SCTLR */
787 reg = SCTLR_CFCFG | SCTLR_CFIE | SCTLR_CFRE | SCTLR_M | SCTLR_EAE_SBOP;
788 if (stage1)
789 reg |= SCTLR_S1_ASIDPNE;
790#ifdef __BIG_ENDIAN
791 reg |= SCTLR_E;
792#endif
Will Deacon25724842013-08-21 13:49:53 +0100793 writel_relaxed(reg, cb_base + ARM_SMMU_CB_SCTLR);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100794}
795
796static int arm_smmu_init_domain_context(struct iommu_domain *domain,
Will Deacon44680ee2014-06-25 11:29:12 +0100797 struct arm_smmu_device *smmu)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100798{
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100799 int irq, start, ret = 0;
Will Deacon518f7132014-11-14 17:17:54 +0000800 unsigned long ias, oas;
801 struct io_pgtable_ops *pgtbl_ops;
802 struct io_pgtable_cfg pgtbl_cfg;
803 enum io_pgtable_fmt fmt;
Joerg Roedel1d672632015-03-26 13:43:10 +0100804 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon44680ee2014-06-25 11:29:12 +0100805 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100806
Will Deacon518f7132014-11-14 17:17:54 +0000807 mutex_lock(&smmu_domain->init_mutex);
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100808 if (smmu_domain->smmu)
809 goto out_unlock;
810
Will Deaconc752ce42014-06-25 22:46:31 +0100811 /*
812 * Mapping the requested stage onto what we support is surprisingly
813 * complicated, mainly because the spec allows S1+S2 SMMUs without
814 * support for nested translation. That means we end up with the
815 * following table:
816 *
817 * Requested Supported Actual
818 * S1 N S1
819 * S1 S1+S2 S1
820 * S1 S2 S2
821 * S1 S1 S1
822 * N N N
823 * N S1+S2 S2
824 * N S2 S2
825 * N S1 S1
826 *
827 * Note that you can't actually request stage-2 mappings.
828 */
829 if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S1))
830 smmu_domain->stage = ARM_SMMU_DOMAIN_S2;
831 if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S2))
832 smmu_domain->stage = ARM_SMMU_DOMAIN_S1;
833
834 switch (smmu_domain->stage) {
835 case ARM_SMMU_DOMAIN_S1:
836 cfg->cbar = CBAR_TYPE_S1_TRANS_S2_BYPASS;
837 start = smmu->num_s2_context_banks;
Will Deacon518f7132014-11-14 17:17:54 +0000838 ias = smmu->va_size;
839 oas = smmu->ipa_size;
840 if (IS_ENABLED(CONFIG_64BIT))
841 fmt = ARM_64_LPAE_S1;
842 else
843 fmt = ARM_32_LPAE_S1;
Will Deaconc752ce42014-06-25 22:46:31 +0100844 break;
845 case ARM_SMMU_DOMAIN_NESTED:
Will Deacon45ae7cf2013-06-24 18:31:25 +0100846 /*
847 * We will likely want to change this if/when KVM gets
848 * involved.
849 */
Will Deaconc752ce42014-06-25 22:46:31 +0100850 case ARM_SMMU_DOMAIN_S2:
Will Deacon9c5c92e2014-06-25 12:12:41 +0100851 cfg->cbar = CBAR_TYPE_S2_TRANS;
852 start = 0;
Will Deacon518f7132014-11-14 17:17:54 +0000853 ias = smmu->ipa_size;
854 oas = smmu->pa_size;
855 if (IS_ENABLED(CONFIG_64BIT))
856 fmt = ARM_64_LPAE_S2;
857 else
858 fmt = ARM_32_LPAE_S2;
Will Deaconc752ce42014-06-25 22:46:31 +0100859 break;
860 default:
861 ret = -EINVAL;
862 goto out_unlock;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100863 }
864
865 ret = __arm_smmu_alloc_bitmap(smmu->context_map, start,
866 smmu->num_context_banks);
867 if (IS_ERR_VALUE(ret))
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100868 goto out_unlock;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100869
Will Deacon44680ee2014-06-25 11:29:12 +0100870 cfg->cbndx = ret;
Robin Murphy09360402014-08-28 17:51:59 +0100871 if (smmu->version == ARM_SMMU_V1) {
Will Deacon44680ee2014-06-25 11:29:12 +0100872 cfg->irptndx = atomic_inc_return(&smmu->irptndx);
873 cfg->irptndx %= smmu->num_context_irqs;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100874 } else {
Will Deacon44680ee2014-06-25 11:29:12 +0100875 cfg->irptndx = cfg->cbndx;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100876 }
877
Will Deacon518f7132014-11-14 17:17:54 +0000878 pgtbl_cfg = (struct io_pgtable_cfg) {
879 .pgsize_bitmap = arm_smmu_ops.pgsize_bitmap,
880 .ias = ias,
881 .oas = oas,
882 .tlb = &arm_smmu_gather_ops,
Robin Murphy2df7a252015-07-29 19:46:06 +0100883 .iommu_dev = smmu->dev,
Will Deacon518f7132014-11-14 17:17:54 +0000884 };
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100885
Will Deacon518f7132014-11-14 17:17:54 +0000886 smmu_domain->smmu = smmu;
887 pgtbl_ops = alloc_io_pgtable_ops(fmt, &pgtbl_cfg, smmu_domain);
888 if (!pgtbl_ops) {
889 ret = -ENOMEM;
890 goto out_clear_smmu;
891 }
892
893 /* Update our support page sizes to reflect the page table format */
894 arm_smmu_ops.pgsize_bitmap = pgtbl_cfg.pgsize_bitmap;
895
896 /* Initialise the context bank with our page table cfg */
897 arm_smmu_init_context_bank(smmu_domain, &pgtbl_cfg);
898
899 /*
900 * Request context fault interrupt. Do this last to avoid the
901 * handler seeing a half-initialised domain state.
902 */
Will Deacon44680ee2014-06-25 11:29:12 +0100903 irq = smmu->irqs[smmu->num_global_irqs + cfg->irptndx];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100904 ret = request_irq(irq, arm_smmu_context_fault, IRQF_SHARED,
905 "arm-smmu-context-fault", domain);
906 if (IS_ERR_VALUE(ret)) {
907 dev_err(smmu->dev, "failed to request context IRQ %d (%u)\n",
Will Deacon44680ee2014-06-25 11:29:12 +0100908 cfg->irptndx, irq);
909 cfg->irptndx = INVALID_IRPTNDX;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100910 }
911
Will Deacon518f7132014-11-14 17:17:54 +0000912 mutex_unlock(&smmu_domain->init_mutex);
913
914 /* Publish page table ops for map/unmap */
915 smmu_domain->pgtbl_ops = pgtbl_ops;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100916 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100917
Will Deacon518f7132014-11-14 17:17:54 +0000918out_clear_smmu:
919 smmu_domain->smmu = NULL;
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100920out_unlock:
Will Deacon518f7132014-11-14 17:17:54 +0000921 mutex_unlock(&smmu_domain->init_mutex);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100922 return ret;
923}
924
925static void arm_smmu_destroy_domain_context(struct iommu_domain *domain)
926{
Joerg Roedel1d672632015-03-26 13:43:10 +0100927 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon44680ee2014-06-25 11:29:12 +0100928 struct arm_smmu_device *smmu = smmu_domain->smmu;
929 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
Will Deacon1463fe42013-07-31 19:21:27 +0100930 void __iomem *cb_base;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100931 int irq;
932
933 if (!smmu)
934 return;
935
Will Deacon518f7132014-11-14 17:17:54 +0000936 /*
937 * Disable the context bank and free the page tables before freeing
938 * it.
939 */
Will Deacon44680ee2014-06-25 11:29:12 +0100940 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deacon1463fe42013-07-31 19:21:27 +0100941 writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR);
Will Deacon1463fe42013-07-31 19:21:27 +0100942
Will Deacon44680ee2014-06-25 11:29:12 +0100943 if (cfg->irptndx != INVALID_IRPTNDX) {
944 irq = smmu->irqs[smmu->num_global_irqs + cfg->irptndx];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100945 free_irq(irq, domain);
946 }
947
Markus Elfring44830b02015-11-06 18:32:41 +0100948 free_io_pgtable_ops(smmu_domain->pgtbl_ops);
Will Deacon44680ee2014-06-25 11:29:12 +0100949 __arm_smmu_free_bitmap(smmu->context_map, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100950}
951
Joerg Roedel1d672632015-03-26 13:43:10 +0100952static struct iommu_domain *arm_smmu_domain_alloc(unsigned type)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100953{
954 struct arm_smmu_domain *smmu_domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100955
Joerg Roedel1d672632015-03-26 13:43:10 +0100956 if (type != IOMMU_DOMAIN_UNMANAGED)
957 return NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100958 /*
959 * Allocate the domain and initialise some of its data structures.
960 * We can't really do anything meaningful until we've added a
961 * master.
962 */
963 smmu_domain = kzalloc(sizeof(*smmu_domain), GFP_KERNEL);
964 if (!smmu_domain)
Joerg Roedel1d672632015-03-26 13:43:10 +0100965 return NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100966
Will Deacon518f7132014-11-14 17:17:54 +0000967 mutex_init(&smmu_domain->init_mutex);
968 spin_lock_init(&smmu_domain->pgtbl_lock);
Joerg Roedel1d672632015-03-26 13:43:10 +0100969
970 return &smmu_domain->domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100971}
972
Joerg Roedel1d672632015-03-26 13:43:10 +0100973static void arm_smmu_domain_free(struct iommu_domain *domain)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100974{
Joerg Roedel1d672632015-03-26 13:43:10 +0100975 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon1463fe42013-07-31 19:21:27 +0100976
977 /*
978 * Free the domain resources. We assume that all devices have
979 * already been detached.
980 */
Will Deacon45ae7cf2013-06-24 18:31:25 +0100981 arm_smmu_destroy_domain_context(domain);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100982 kfree(smmu_domain);
983}
984
985static int arm_smmu_master_configure_smrs(struct arm_smmu_device *smmu,
Will Deacona9a1b0b2014-05-01 18:05:08 +0100986 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100987{
988 int i;
989 struct arm_smmu_smr *smrs;
990 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
991
992 if (!(smmu->features & ARM_SMMU_FEAT_STREAM_MATCH))
993 return 0;
994
Will Deacona9a1b0b2014-05-01 18:05:08 +0100995 if (cfg->smrs)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100996 return -EEXIST;
997
Mitchel Humpherys29073202014-07-08 09:52:18 -0700998 smrs = kmalloc_array(cfg->num_streamids, sizeof(*smrs), GFP_KERNEL);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100999 if (!smrs) {
Will Deacona9a1b0b2014-05-01 18:05:08 +01001000 dev_err(smmu->dev, "failed to allocate %d SMRs\n",
1001 cfg->num_streamids);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001002 return -ENOMEM;
1003 }
1004
Will Deacon44680ee2014-06-25 11:29:12 +01001005 /* Allocate the SMRs on the SMMU */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001006 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001007 int idx = __arm_smmu_alloc_bitmap(smmu->smr_map, 0,
1008 smmu->num_mapping_groups);
1009 if (IS_ERR_VALUE(idx)) {
1010 dev_err(smmu->dev, "failed to allocate free SMR\n");
1011 goto err_free_smrs;
1012 }
1013
1014 smrs[i] = (struct arm_smmu_smr) {
1015 .idx = idx,
1016 .mask = 0, /* We don't currently share SMRs */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001017 .id = cfg->streamids[i],
Will Deacon45ae7cf2013-06-24 18:31:25 +01001018 };
1019 }
1020
1021 /* It worked! Now, poke the actual hardware */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001022 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001023 u32 reg = SMR_VALID | smrs[i].id << SMR_ID_SHIFT |
1024 smrs[i].mask << SMR_MASK_SHIFT;
1025 writel_relaxed(reg, gr0_base + ARM_SMMU_GR0_SMR(smrs[i].idx));
1026 }
1027
Will Deacona9a1b0b2014-05-01 18:05:08 +01001028 cfg->smrs = smrs;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001029 return 0;
1030
1031err_free_smrs:
1032 while (--i >= 0)
1033 __arm_smmu_free_bitmap(smmu->smr_map, smrs[i].idx);
1034 kfree(smrs);
1035 return -ENOSPC;
1036}
1037
1038static void arm_smmu_master_free_smrs(struct arm_smmu_device *smmu,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001039 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001040{
1041 int i;
1042 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001043 struct arm_smmu_smr *smrs = cfg->smrs;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001044
Will Deacon43b412b2014-07-15 11:22:24 +01001045 if (!smrs)
1046 return;
1047
Will Deacon45ae7cf2013-06-24 18:31:25 +01001048 /* Invalidate the SMRs before freeing back to the allocator */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001049 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001050 u8 idx = smrs[i].idx;
Mitchel Humpherys29073202014-07-08 09:52:18 -07001051
Will Deacon45ae7cf2013-06-24 18:31:25 +01001052 writel_relaxed(~SMR_VALID, gr0_base + ARM_SMMU_GR0_SMR(idx));
1053 __arm_smmu_free_bitmap(smmu->smr_map, idx);
1054 }
1055
Will Deacona9a1b0b2014-05-01 18:05:08 +01001056 cfg->smrs = NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001057 kfree(smrs);
1058}
1059
Will Deacon45ae7cf2013-06-24 18:31:25 +01001060static int arm_smmu_domain_add_master(struct arm_smmu_domain *smmu_domain,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001061 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001062{
1063 int i, ret;
Will Deacon44680ee2014-06-25 11:29:12 +01001064 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001065 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1066
Will Deacon8f68f8e2014-07-15 11:27:08 +01001067 /* Devices in an IOMMU group may already be configured */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001068 ret = arm_smmu_master_configure_smrs(smmu, cfg);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001069 if (ret)
Will Deacon8f68f8e2014-07-15 11:27:08 +01001070 return ret == -EEXIST ? 0 : ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001071
Will Deacona9a1b0b2014-05-01 18:05:08 +01001072 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001073 u32 idx, s2cr;
Mitchel Humpherys29073202014-07-08 09:52:18 -07001074
Will Deacona9a1b0b2014-05-01 18:05:08 +01001075 idx = cfg->smrs ? cfg->smrs[i].idx : cfg->streamids[i];
Kefeng Wang6069d232014-04-18 10:20:48 +08001076 s2cr = S2CR_TYPE_TRANS |
Will Deacon44680ee2014-06-25 11:29:12 +01001077 (smmu_domain->cfg.cbndx << S2CR_CBNDX_SHIFT);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001078 writel_relaxed(s2cr, gr0_base + ARM_SMMU_GR0_S2CR(idx));
1079 }
1080
1081 return 0;
1082}
1083
1084static void arm_smmu_domain_remove_master(struct arm_smmu_domain *smmu_domain,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001085 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001086{
Will Deacon43b412b2014-07-15 11:22:24 +01001087 int i;
Will Deacon44680ee2014-06-25 11:29:12 +01001088 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon43b412b2014-07-15 11:22:24 +01001089 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001090
Will Deacon8f68f8e2014-07-15 11:27:08 +01001091 /* An IOMMU group is torn down by the first device to be removed */
1092 if ((smmu->features & ARM_SMMU_FEAT_STREAM_MATCH) && !cfg->smrs)
1093 return;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001094
1095 /*
1096 * We *must* clear the S2CR first, because freeing the SMR means
1097 * that it can be re-allocated immediately.
1098 */
Will Deacon43b412b2014-07-15 11:22:24 +01001099 for (i = 0; i < cfg->num_streamids; ++i) {
1100 u32 idx = cfg->smrs ? cfg->smrs[i].idx : cfg->streamids[i];
1101
1102 writel_relaxed(S2CR_TYPE_BYPASS,
1103 gr0_base + ARM_SMMU_GR0_S2CR(idx));
1104 }
1105
Will Deacona9a1b0b2014-05-01 18:05:08 +01001106 arm_smmu_master_free_smrs(smmu, cfg);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001107}
1108
1109static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev)
1110{
Mitchel Humpherysa18037b2014-07-30 18:58:13 +01001111 int ret;
Joerg Roedel1d672632015-03-26 13:43:10 +01001112 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon518f7132014-11-14 17:17:54 +00001113 struct arm_smmu_device *smmu;
Will Deacona9a1b0b2014-05-01 18:05:08 +01001114 struct arm_smmu_master_cfg *cfg;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001115
Will Deacon8f68f8e2014-07-15 11:27:08 +01001116 smmu = find_smmu_for_device(dev);
Will Deacon44680ee2014-06-25 11:29:12 +01001117 if (!smmu) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001118 dev_err(dev, "cannot attach to SMMU, is it on the same bus?\n");
1119 return -ENXIO;
1120 }
1121
Will Deacon844e35b2014-07-17 11:23:51 +01001122 if (dev->archdata.iommu) {
1123 dev_err(dev, "already attached to IOMMU domain\n");
1124 return -EEXIST;
1125 }
1126
Will Deacon518f7132014-11-14 17:17:54 +00001127 /* Ensure that the domain is finalised */
1128 ret = arm_smmu_init_domain_context(domain, smmu);
1129 if (IS_ERR_VALUE(ret))
1130 return ret;
1131
Will Deacon45ae7cf2013-06-24 18:31:25 +01001132 /*
Will Deacon44680ee2014-06-25 11:29:12 +01001133 * Sanity check the domain. We don't support domains across
1134 * different SMMUs.
Will Deacon45ae7cf2013-06-24 18:31:25 +01001135 */
Will Deacon518f7132014-11-14 17:17:54 +00001136 if (smmu_domain->smmu != smmu) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001137 dev_err(dev,
1138 "cannot attach to SMMU %s whilst already attached to domain on SMMU %s\n",
Mitchel Humpherysa18037b2014-07-30 18:58:13 +01001139 dev_name(smmu_domain->smmu->dev), dev_name(smmu->dev));
1140 return -EINVAL;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001141 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01001142
1143 /* Looks ok, so add the device to the domain */
Will Deacon8f68f8e2014-07-15 11:27:08 +01001144 cfg = find_smmu_master_cfg(dev);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001145 if (!cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001146 return -ENODEV;
1147
Will Deacon844e35b2014-07-17 11:23:51 +01001148 ret = arm_smmu_domain_add_master(smmu_domain, cfg);
1149 if (!ret)
1150 dev->archdata.iommu = domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001151 return ret;
1152}
1153
1154static void arm_smmu_detach_dev(struct iommu_domain *domain, struct device *dev)
1155{
Joerg Roedel1d672632015-03-26 13:43:10 +01001156 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001157 struct arm_smmu_master_cfg *cfg;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001158
Will Deacon8f68f8e2014-07-15 11:27:08 +01001159 cfg = find_smmu_master_cfg(dev);
Will Deacon844e35b2014-07-17 11:23:51 +01001160 if (!cfg)
1161 return;
1162
1163 dev->archdata.iommu = NULL;
1164 arm_smmu_domain_remove_master(smmu_domain, cfg);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001165}
1166
Will Deacon45ae7cf2013-06-24 18:31:25 +01001167static int arm_smmu_map(struct iommu_domain *domain, unsigned long iova,
Will Deaconb410aed2014-02-20 16:31:06 +00001168 phys_addr_t paddr, size_t size, int prot)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001169{
Will Deacon518f7132014-11-14 17:17:54 +00001170 int ret;
1171 unsigned long flags;
Joerg Roedel1d672632015-03-26 13:43:10 +01001172 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon518f7132014-11-14 17:17:54 +00001173 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001174
Will Deacon518f7132014-11-14 17:17:54 +00001175 if (!ops)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001176 return -ENODEV;
1177
Will Deacon518f7132014-11-14 17:17:54 +00001178 spin_lock_irqsave(&smmu_domain->pgtbl_lock, flags);
1179 ret = ops->map(ops, iova, paddr, size, prot);
1180 spin_unlock_irqrestore(&smmu_domain->pgtbl_lock, flags);
1181 return ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001182}
1183
1184static size_t arm_smmu_unmap(struct iommu_domain *domain, unsigned long iova,
1185 size_t size)
1186{
Will Deacon518f7132014-11-14 17:17:54 +00001187 size_t ret;
1188 unsigned long flags;
Joerg Roedel1d672632015-03-26 13:43:10 +01001189 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon518f7132014-11-14 17:17:54 +00001190 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001191
Will Deacon518f7132014-11-14 17:17:54 +00001192 if (!ops)
1193 return 0;
1194
1195 spin_lock_irqsave(&smmu_domain->pgtbl_lock, flags);
1196 ret = ops->unmap(ops, iova, size);
1197 spin_unlock_irqrestore(&smmu_domain->pgtbl_lock, flags);
1198 return ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001199}
1200
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001201static phys_addr_t arm_smmu_iova_to_phys_hard(struct iommu_domain *domain,
1202 dma_addr_t iova)
1203{
Joerg Roedel1d672632015-03-26 13:43:10 +01001204 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001205 struct arm_smmu_device *smmu = smmu_domain->smmu;
1206 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
1207 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
1208 struct device *dev = smmu->dev;
1209 void __iomem *cb_base;
1210 u32 tmp;
1211 u64 phys;
Robin Murphy661d9622015-05-27 17:09:34 +01001212 unsigned long va;
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001213
1214 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
1215
Robin Murphy661d9622015-05-27 17:09:34 +01001216 /* ATS1 registers can only be written atomically */
1217 va = iova & ~0xfffUL;
Robin Murphy661d9622015-05-27 17:09:34 +01001218 if (smmu->version == ARM_SMMU_V2)
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +01001219 smmu_writeq(va, cb_base + ARM_SMMU_CB_ATS1PR);
Robin Murphy661d9622015-05-27 17:09:34 +01001220 else
Robin Murphy661d9622015-05-27 17:09:34 +01001221 writel_relaxed(va, cb_base + ARM_SMMU_CB_ATS1PR);
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001222
1223 if (readl_poll_timeout_atomic(cb_base + ARM_SMMU_CB_ATSR, tmp,
1224 !(tmp & ATSR_ACTIVE), 5, 50)) {
1225 dev_err(dev,
Fabio Estevam077124c2015-08-18 17:12:24 +01001226 "iova to phys timed out on %pad. Falling back to software table walk.\n",
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001227 &iova);
1228 return ops->iova_to_phys(ops, iova);
1229 }
1230
1231 phys = readl_relaxed(cb_base + ARM_SMMU_CB_PAR_LO);
1232 phys |= ((u64)readl_relaxed(cb_base + ARM_SMMU_CB_PAR_HI)) << 32;
1233
1234 if (phys & CB_PAR_F) {
1235 dev_err(dev, "translation fault!\n");
1236 dev_err(dev, "PAR = 0x%llx\n", phys);
1237 return 0;
1238 }
1239
1240 return (phys & GENMASK_ULL(39, 12)) | (iova & 0xfff);
1241}
1242
Will Deacon45ae7cf2013-06-24 18:31:25 +01001243static phys_addr_t arm_smmu_iova_to_phys(struct iommu_domain *domain,
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001244 dma_addr_t iova)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001245{
Will Deacon518f7132014-11-14 17:17:54 +00001246 phys_addr_t ret;
1247 unsigned long flags;
Joerg Roedel1d672632015-03-26 13:43:10 +01001248 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon518f7132014-11-14 17:17:54 +00001249 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001250
Will Deacon518f7132014-11-14 17:17:54 +00001251 if (!ops)
Will Deacona44a97912013-11-07 18:47:50 +00001252 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001253
Will Deacon518f7132014-11-14 17:17:54 +00001254 spin_lock_irqsave(&smmu_domain->pgtbl_lock, flags);
Baptiste Reynal83a60ed2015-03-04 16:51:06 +01001255 if (smmu_domain->smmu->features & ARM_SMMU_FEAT_TRANS_OPS &&
1256 smmu_domain->stage == ARM_SMMU_DOMAIN_S1) {
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001257 ret = arm_smmu_iova_to_phys_hard(domain, iova);
Baptiste Reynal83a60ed2015-03-04 16:51:06 +01001258 } else {
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001259 ret = ops->iova_to_phys(ops, iova);
Baptiste Reynal83a60ed2015-03-04 16:51:06 +01001260 }
1261
Will Deacon518f7132014-11-14 17:17:54 +00001262 spin_unlock_irqrestore(&smmu_domain->pgtbl_lock, flags);
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001263
Will Deacon518f7132014-11-14 17:17:54 +00001264 return ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001265}
1266
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001267static bool arm_smmu_capable(enum iommu_cap cap)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001268{
Will Deacond0948942014-06-24 17:30:10 +01001269 switch (cap) {
1270 case IOMMU_CAP_CACHE_COHERENCY:
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001271 /*
1272 * Return true here as the SMMU can always send out coherent
1273 * requests.
1274 */
1275 return true;
Will Deacond0948942014-06-24 17:30:10 +01001276 case IOMMU_CAP_INTR_REMAP:
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001277 return true; /* MSIs are just memory writes */
Antonios Motakis0029a8d2014-10-13 14:06:18 +01001278 case IOMMU_CAP_NOEXEC:
1279 return true;
Will Deacond0948942014-06-24 17:30:10 +01001280 default:
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001281 return false;
Will Deacond0948942014-06-24 17:30:10 +01001282 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01001283}
Will Deacon45ae7cf2013-06-24 18:31:25 +01001284
Will Deacona9a1b0b2014-05-01 18:05:08 +01001285static int __arm_smmu_get_pci_sid(struct pci_dev *pdev, u16 alias, void *data)
1286{
1287 *((u16 *)data) = alias;
1288 return 0; /* Continue walking */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001289}
1290
Will Deacon8f68f8e2014-07-15 11:27:08 +01001291static void __arm_smmu_release_pci_iommudata(void *data)
1292{
1293 kfree(data);
1294}
1295
Joerg Roedelaf659932015-10-21 23:51:41 +02001296static int arm_smmu_init_pci_device(struct pci_dev *pdev,
1297 struct iommu_group *group)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001298{
Will Deacon03edb222015-01-19 14:27:33 +00001299 struct arm_smmu_master_cfg *cfg;
Joerg Roedelaf659932015-10-21 23:51:41 +02001300 u16 sid;
1301 int i;
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001302
Will Deacon03edb222015-01-19 14:27:33 +00001303 cfg = iommu_group_get_iommudata(group);
1304 if (!cfg) {
Will Deacona9a1b0b2014-05-01 18:05:08 +01001305 cfg = kzalloc(sizeof(*cfg), GFP_KERNEL);
Joerg Roedelaf659932015-10-21 23:51:41 +02001306 if (!cfg)
1307 return -ENOMEM;
Will Deacona9a1b0b2014-05-01 18:05:08 +01001308
Will Deacon03edb222015-01-19 14:27:33 +00001309 iommu_group_set_iommudata(group, cfg,
1310 __arm_smmu_release_pci_iommudata);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001311 }
1312
Joerg Roedelaf659932015-10-21 23:51:41 +02001313 if (cfg->num_streamids >= MAX_MASTER_STREAMIDS)
1314 return -ENOSPC;
Will Deacona9a1b0b2014-05-01 18:05:08 +01001315
Will Deacon03edb222015-01-19 14:27:33 +00001316 /*
1317 * Assume Stream ID == Requester ID for now.
1318 * We need a way to describe the ID mappings in FDT.
1319 */
1320 pci_for_each_dma_alias(pdev, __arm_smmu_get_pci_sid, &sid);
1321 for (i = 0; i < cfg->num_streamids; ++i)
1322 if (cfg->streamids[i] == sid)
1323 break;
1324
1325 /* Avoid duplicate SIDs, as this can lead to SMR conflicts */
1326 if (i == cfg->num_streamids)
1327 cfg->streamids[cfg->num_streamids++] = sid;
1328
1329 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001330}
1331
Joerg Roedelaf659932015-10-21 23:51:41 +02001332static int arm_smmu_init_platform_device(struct device *dev,
1333 struct iommu_group *group)
Will Deacon03edb222015-01-19 14:27:33 +00001334{
Will Deacon03edb222015-01-19 14:27:33 +00001335 struct arm_smmu_device *smmu = find_smmu_for_device(dev);
Joerg Roedelaf659932015-10-21 23:51:41 +02001336 struct arm_smmu_master *master;
Will Deacon03edb222015-01-19 14:27:33 +00001337
1338 if (!smmu)
1339 return -ENODEV;
1340
1341 master = find_smmu_master(smmu, dev->of_node);
1342 if (!master)
1343 return -ENODEV;
1344
Will Deacon03edb222015-01-19 14:27:33 +00001345 iommu_group_set_iommudata(group, &master->cfg, NULL);
Joerg Roedelaf659932015-10-21 23:51:41 +02001346
1347 return 0;
Will Deacon03edb222015-01-19 14:27:33 +00001348}
1349
1350static int arm_smmu_add_device(struct device *dev)
1351{
Joerg Roedelaf659932015-10-21 23:51:41 +02001352 struct iommu_group *group;
Will Deacon03edb222015-01-19 14:27:33 +00001353
Joerg Roedelaf659932015-10-21 23:51:41 +02001354 group = iommu_group_get_for_dev(dev);
1355 if (IS_ERR(group))
1356 return PTR_ERR(group);
1357
Peng Fan9a4a9d82015-11-20 16:56:18 +08001358 iommu_group_put(group);
Joerg Roedelaf659932015-10-21 23:51:41 +02001359 return 0;
Will Deacon03edb222015-01-19 14:27:33 +00001360}
1361
Will Deacon45ae7cf2013-06-24 18:31:25 +01001362static void arm_smmu_remove_device(struct device *dev)
1363{
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001364 iommu_group_remove_device(dev);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001365}
1366
Joerg Roedelaf659932015-10-21 23:51:41 +02001367static struct iommu_group *arm_smmu_device_group(struct device *dev)
1368{
1369 struct iommu_group *group;
1370 int ret;
1371
1372 if (dev_is_pci(dev))
1373 group = pci_device_group(dev);
1374 else
1375 group = generic_device_group(dev);
1376
1377 if (IS_ERR(group))
1378 return group;
1379
1380 if (dev_is_pci(dev))
1381 ret = arm_smmu_init_pci_device(to_pci_dev(dev), group);
1382 else
1383 ret = arm_smmu_init_platform_device(dev, group);
1384
1385 if (ret) {
1386 iommu_group_put(group);
1387 group = ERR_PTR(ret);
1388 }
1389
1390 return group;
1391}
1392
Will Deaconc752ce42014-06-25 22:46:31 +01001393static int arm_smmu_domain_get_attr(struct iommu_domain *domain,
1394 enum iommu_attr attr, void *data)
1395{
Joerg Roedel1d672632015-03-26 13:43:10 +01001396 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deaconc752ce42014-06-25 22:46:31 +01001397
1398 switch (attr) {
1399 case DOMAIN_ATTR_NESTING:
1400 *(int *)data = (smmu_domain->stage == ARM_SMMU_DOMAIN_NESTED);
1401 return 0;
1402 default:
1403 return -ENODEV;
1404 }
1405}
1406
1407static int arm_smmu_domain_set_attr(struct iommu_domain *domain,
1408 enum iommu_attr attr, void *data)
1409{
Will Deacon518f7132014-11-14 17:17:54 +00001410 int ret = 0;
Joerg Roedel1d672632015-03-26 13:43:10 +01001411 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deaconc752ce42014-06-25 22:46:31 +01001412
Will Deacon518f7132014-11-14 17:17:54 +00001413 mutex_lock(&smmu_domain->init_mutex);
1414
Will Deaconc752ce42014-06-25 22:46:31 +01001415 switch (attr) {
1416 case DOMAIN_ATTR_NESTING:
Will Deacon518f7132014-11-14 17:17:54 +00001417 if (smmu_domain->smmu) {
1418 ret = -EPERM;
1419 goto out_unlock;
1420 }
1421
Will Deaconc752ce42014-06-25 22:46:31 +01001422 if (*(int *)data)
1423 smmu_domain->stage = ARM_SMMU_DOMAIN_NESTED;
1424 else
1425 smmu_domain->stage = ARM_SMMU_DOMAIN_S1;
1426
Will Deacon518f7132014-11-14 17:17:54 +00001427 break;
Will Deaconc752ce42014-06-25 22:46:31 +01001428 default:
Will Deacon518f7132014-11-14 17:17:54 +00001429 ret = -ENODEV;
Will Deaconc752ce42014-06-25 22:46:31 +01001430 }
Will Deacon518f7132014-11-14 17:17:54 +00001431
1432out_unlock:
1433 mutex_unlock(&smmu_domain->init_mutex);
1434 return ret;
Will Deaconc752ce42014-06-25 22:46:31 +01001435}
1436
Will Deacon518f7132014-11-14 17:17:54 +00001437static struct iommu_ops arm_smmu_ops = {
Will Deaconc752ce42014-06-25 22:46:31 +01001438 .capable = arm_smmu_capable,
Joerg Roedel1d672632015-03-26 13:43:10 +01001439 .domain_alloc = arm_smmu_domain_alloc,
1440 .domain_free = arm_smmu_domain_free,
Will Deaconc752ce42014-06-25 22:46:31 +01001441 .attach_dev = arm_smmu_attach_dev,
1442 .detach_dev = arm_smmu_detach_dev,
1443 .map = arm_smmu_map,
1444 .unmap = arm_smmu_unmap,
Joerg Roedel76771c92014-12-02 13:07:13 +01001445 .map_sg = default_iommu_map_sg,
Will Deaconc752ce42014-06-25 22:46:31 +01001446 .iova_to_phys = arm_smmu_iova_to_phys,
1447 .add_device = arm_smmu_add_device,
1448 .remove_device = arm_smmu_remove_device,
Joerg Roedelaf659932015-10-21 23:51:41 +02001449 .device_group = arm_smmu_device_group,
Will Deaconc752ce42014-06-25 22:46:31 +01001450 .domain_get_attr = arm_smmu_domain_get_attr,
1451 .domain_set_attr = arm_smmu_domain_set_attr,
Will Deacon518f7132014-11-14 17:17:54 +00001452 .pgsize_bitmap = -1UL, /* Restricted during device attach */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001453};
1454
1455static void arm_smmu_device_reset(struct arm_smmu_device *smmu)
1456{
1457 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001458 void __iomem *cb_base;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001459 int i = 0;
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001460 u32 reg;
1461
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001462 /* clear global FSR */
1463 reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sGFSR);
1464 writel(reg, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sGFSR);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001465
1466 /* Mark all SMRn as invalid and all S2CRn as bypass */
1467 for (i = 0; i < smmu->num_mapping_groups; ++i) {
Olav Haugan3c8766d2014-08-22 17:12:32 -07001468 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_SMR(i));
Mitchel Humpherys29073202014-07-08 09:52:18 -07001469 writel_relaxed(S2CR_TYPE_BYPASS,
1470 gr0_base + ARM_SMMU_GR0_S2CR(i));
Will Deacon45ae7cf2013-06-24 18:31:25 +01001471 }
1472
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001473 /* Make sure all context banks are disabled and clear CB_FSR */
1474 for (i = 0; i < smmu->num_context_banks; ++i) {
1475 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, i);
1476 writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR);
1477 writel_relaxed(FSR_FAULT, cb_base + ARM_SMMU_CB_FSR);
1478 }
Will Deacon1463fe42013-07-31 19:21:27 +01001479
Will Deacon45ae7cf2013-06-24 18:31:25 +01001480 /* Invalidate the TLB, just in case */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001481 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLH);
1482 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLNSNH);
1483
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001484 reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001485
Will Deacon45ae7cf2013-06-24 18:31:25 +01001486 /* Enable fault reporting */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001487 reg |= (sCR0_GFRE | sCR0_GFIE | sCR0_GCFGFRE | sCR0_GCFGFIE);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001488
1489 /* Disable TLB broadcasting. */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001490 reg |= (sCR0_VMIDPNE | sCR0_PTM);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001491
1492 /* Enable client access, but bypass when no mapping is found */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001493 reg &= ~(sCR0_CLIENTPD | sCR0_USFCFG);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001494
1495 /* Disable forced broadcasting */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001496 reg &= ~sCR0_FB;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001497
1498 /* Don't upgrade barriers */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001499 reg &= ~(sCR0_BSU_MASK << sCR0_BSU_SHIFT);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001500
1501 /* Push the button */
Will Deacon518f7132014-11-14 17:17:54 +00001502 __arm_smmu_tlb_sync(smmu);
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001503 writel(reg, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001504}
1505
1506static int arm_smmu_id_size_to_bits(int size)
1507{
1508 switch (size) {
1509 case 0:
1510 return 32;
1511 case 1:
1512 return 36;
1513 case 2:
1514 return 40;
1515 case 3:
1516 return 42;
1517 case 4:
1518 return 44;
1519 case 5:
1520 default:
1521 return 48;
1522 }
1523}
1524
1525static int arm_smmu_device_cfg_probe(struct arm_smmu_device *smmu)
1526{
1527 unsigned long size;
1528 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1529 u32 id;
Robin Murphybae2c2d2015-07-29 19:46:05 +01001530 bool cttw_dt, cttw_reg;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001531
1532 dev_notice(smmu->dev, "probing hardware configuration...\n");
Will Deacon45ae7cf2013-06-24 18:31:25 +01001533 dev_notice(smmu->dev, "SMMUv%d with:\n", smmu->version);
1534
1535 /* ID0 */
1536 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID0);
Will Deacon4cf740b2014-07-14 19:47:39 +01001537
1538 /* Restrict available stages based on module parameter */
1539 if (force_stage == 1)
1540 id &= ~(ID0_S2TS | ID0_NTS);
1541 else if (force_stage == 2)
1542 id &= ~(ID0_S1TS | ID0_NTS);
1543
Will Deacon45ae7cf2013-06-24 18:31:25 +01001544 if (id & ID0_S1TS) {
1545 smmu->features |= ARM_SMMU_FEAT_TRANS_S1;
1546 dev_notice(smmu->dev, "\tstage 1 translation\n");
1547 }
1548
1549 if (id & ID0_S2TS) {
1550 smmu->features |= ARM_SMMU_FEAT_TRANS_S2;
1551 dev_notice(smmu->dev, "\tstage 2 translation\n");
1552 }
1553
1554 if (id & ID0_NTS) {
1555 smmu->features |= ARM_SMMU_FEAT_TRANS_NESTED;
1556 dev_notice(smmu->dev, "\tnested translation\n");
1557 }
1558
1559 if (!(smmu->features &
Will Deacon4cf740b2014-07-14 19:47:39 +01001560 (ARM_SMMU_FEAT_TRANS_S1 | ARM_SMMU_FEAT_TRANS_S2))) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001561 dev_err(smmu->dev, "\tno translation support!\n");
1562 return -ENODEV;
1563 }
1564
Will Deacond38f0ff2015-06-29 17:47:42 +01001565 if ((id & ID0_S1TS) && ((smmu->version == 1) || !(id & ID0_ATOSNS))) {
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001566 smmu->features |= ARM_SMMU_FEAT_TRANS_OPS;
1567 dev_notice(smmu->dev, "\taddress translation ops\n");
1568 }
1569
Robin Murphybae2c2d2015-07-29 19:46:05 +01001570 /*
1571 * In order for DMA API calls to work properly, we must defer to what
1572 * the DT says about coherency, regardless of what the hardware claims.
1573 * Fortunately, this also opens up a workaround for systems where the
1574 * ID register value has ended up configured incorrectly.
1575 */
1576 cttw_dt = of_dma_is_coherent(smmu->dev->of_node);
1577 cttw_reg = !!(id & ID0_CTTW);
1578 if (cttw_dt)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001579 smmu->features |= ARM_SMMU_FEAT_COHERENT_WALK;
Robin Murphybae2c2d2015-07-29 19:46:05 +01001580 if (cttw_dt || cttw_reg)
1581 dev_notice(smmu->dev, "\t%scoherent table walk\n",
1582 cttw_dt ? "" : "non-");
1583 if (cttw_dt != cttw_reg)
1584 dev_notice(smmu->dev,
1585 "\t(IDR0.CTTW overridden by dma-coherent property)\n");
Will Deacon45ae7cf2013-06-24 18:31:25 +01001586
1587 if (id & ID0_SMS) {
1588 u32 smr, sid, mask;
1589
1590 smmu->features |= ARM_SMMU_FEAT_STREAM_MATCH;
1591 smmu->num_mapping_groups = (id >> ID0_NUMSMRG_SHIFT) &
1592 ID0_NUMSMRG_MASK;
1593 if (smmu->num_mapping_groups == 0) {
1594 dev_err(smmu->dev,
1595 "stream-matching supported, but no SMRs present!\n");
1596 return -ENODEV;
1597 }
1598
1599 smr = SMR_MASK_MASK << SMR_MASK_SHIFT;
1600 smr |= (SMR_ID_MASK << SMR_ID_SHIFT);
1601 writel_relaxed(smr, gr0_base + ARM_SMMU_GR0_SMR(0));
1602 smr = readl_relaxed(gr0_base + ARM_SMMU_GR0_SMR(0));
1603
1604 mask = (smr >> SMR_MASK_SHIFT) & SMR_MASK_MASK;
1605 sid = (smr >> SMR_ID_SHIFT) & SMR_ID_MASK;
1606 if ((mask & sid) != sid) {
1607 dev_err(smmu->dev,
1608 "SMR mask bits (0x%x) insufficient for ID field (0x%x)\n",
1609 mask, sid);
1610 return -ENODEV;
1611 }
1612
1613 dev_notice(smmu->dev,
1614 "\tstream matching with %u register groups, mask 0x%x",
1615 smmu->num_mapping_groups, mask);
Olav Haugan3c8766d2014-08-22 17:12:32 -07001616 } else {
1617 smmu->num_mapping_groups = (id >> ID0_NUMSIDB_SHIFT) &
1618 ID0_NUMSIDB_MASK;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001619 }
1620
1621 /* ID1 */
1622 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID1);
Will Deaconc757e852014-07-30 11:33:25 +01001623 smmu->pgshift = (id & ID1_PAGESIZE) ? 16 : 12;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001624
Andreas Herrmannc55af7f2013-10-01 13:39:06 +01001625 /* Check for size mismatch of SMMU address space from mapped region */
Will Deacon518f7132014-11-14 17:17:54 +00001626 size = 1 << (((id >> ID1_NUMPAGENDXB_SHIFT) & ID1_NUMPAGENDXB_MASK) + 1);
Will Deaconc757e852014-07-30 11:33:25 +01001627 size *= 2 << smmu->pgshift;
Andreas Herrmannc55af7f2013-10-01 13:39:06 +01001628 if (smmu->size != size)
Mitchel Humpherys29073202014-07-08 09:52:18 -07001629 dev_warn(smmu->dev,
1630 "SMMU address space size (0x%lx) differs from mapped region size (0x%lx)!\n",
1631 size, smmu->size);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001632
Will Deacon518f7132014-11-14 17:17:54 +00001633 smmu->num_s2_context_banks = (id >> ID1_NUMS2CB_SHIFT) & ID1_NUMS2CB_MASK;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001634 smmu->num_context_banks = (id >> ID1_NUMCB_SHIFT) & ID1_NUMCB_MASK;
1635 if (smmu->num_s2_context_banks > smmu->num_context_banks) {
1636 dev_err(smmu->dev, "impossible number of S2 context banks!\n");
1637 return -ENODEV;
1638 }
1639 dev_notice(smmu->dev, "\t%u context banks (%u stage-2 only)\n",
1640 smmu->num_context_banks, smmu->num_s2_context_banks);
1641
1642 /* ID2 */
1643 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID2);
1644 size = arm_smmu_id_size_to_bits((id >> ID2_IAS_SHIFT) & ID2_IAS_MASK);
Will Deacon518f7132014-11-14 17:17:54 +00001645 smmu->ipa_size = size;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001646
Will Deacon518f7132014-11-14 17:17:54 +00001647 /* The output mask is also applied for bypass */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001648 size = arm_smmu_id_size_to_bits((id >> ID2_OAS_SHIFT) & ID2_OAS_MASK);
Will Deacon518f7132014-11-14 17:17:54 +00001649 smmu->pa_size = size;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001650
Robin Murphyf1d84542015-03-04 16:41:05 +00001651 /*
1652 * What the page table walker can address actually depends on which
1653 * descriptor format is in use, but since a) we don't know that yet,
1654 * and b) it can vary per context bank, this will have to do...
1655 */
1656 if (dma_set_mask_and_coherent(smmu->dev, DMA_BIT_MASK(size)))
1657 dev_warn(smmu->dev,
1658 "failed to set DMA mask for table walker\n");
1659
Robin Murphy09360402014-08-28 17:51:59 +01001660 if (smmu->version == ARM_SMMU_V1) {
Will Deacon518f7132014-11-14 17:17:54 +00001661 smmu->va_size = smmu->ipa_size;
1662 size = SZ_4K | SZ_2M | SZ_1G;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001663 } else {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001664 size = (id >> ID2_UBS_SHIFT) & ID2_UBS_MASK;
Will Deacon518f7132014-11-14 17:17:54 +00001665 smmu->va_size = arm_smmu_id_size_to_bits(size);
1666#ifndef CONFIG_64BIT
1667 smmu->va_size = min(32UL, smmu->va_size);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001668#endif
Will Deacon518f7132014-11-14 17:17:54 +00001669 size = 0;
1670 if (id & ID2_PTFS_4K)
1671 size |= SZ_4K | SZ_2M | SZ_1G;
1672 if (id & ID2_PTFS_16K)
1673 size |= SZ_16K | SZ_32M;
1674 if (id & ID2_PTFS_64K)
1675 size |= SZ_64K | SZ_512M;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001676 }
1677
Will Deacon518f7132014-11-14 17:17:54 +00001678 arm_smmu_ops.pgsize_bitmap &= size;
1679 dev_notice(smmu->dev, "\tSupported page sizes: 0x%08lx\n", size);
1680
Will Deacon28d60072014-09-01 16:24:48 +01001681 if (smmu->features & ARM_SMMU_FEAT_TRANS_S1)
1682 dev_notice(smmu->dev, "\tStage-1: %lu-bit VA -> %lu-bit IPA\n",
Will Deacon518f7132014-11-14 17:17:54 +00001683 smmu->va_size, smmu->ipa_size);
Will Deacon28d60072014-09-01 16:24:48 +01001684
1685 if (smmu->features & ARM_SMMU_FEAT_TRANS_S2)
1686 dev_notice(smmu->dev, "\tStage-2: %lu-bit IPA -> %lu-bit PA\n",
Will Deacon518f7132014-11-14 17:17:54 +00001687 smmu->ipa_size, smmu->pa_size);
Will Deacon28d60072014-09-01 16:24:48 +01001688
Will Deacon45ae7cf2013-06-24 18:31:25 +01001689 return 0;
1690}
1691
Joerg Roedel09b52692014-10-02 12:24:45 +02001692static const struct of_device_id arm_smmu_of_match[] = {
Robin Murphy09360402014-08-28 17:51:59 +01001693 { .compatible = "arm,smmu-v1", .data = (void *)ARM_SMMU_V1 },
1694 { .compatible = "arm,smmu-v2", .data = (void *)ARM_SMMU_V2 },
1695 { .compatible = "arm,mmu-400", .data = (void *)ARM_SMMU_V1 },
Robin Murphyd3aba042014-08-28 17:52:00 +01001696 { .compatible = "arm,mmu-401", .data = (void *)ARM_SMMU_V1 },
Robin Murphy09360402014-08-28 17:51:59 +01001697 { .compatible = "arm,mmu-500", .data = (void *)ARM_SMMU_V2 },
1698 { },
1699};
1700MODULE_DEVICE_TABLE(of, arm_smmu_of_match);
1701
Will Deacon45ae7cf2013-06-24 18:31:25 +01001702static int arm_smmu_device_dt_probe(struct platform_device *pdev)
1703{
Robin Murphy09360402014-08-28 17:51:59 +01001704 const struct of_device_id *of_id;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001705 struct resource *res;
1706 struct arm_smmu_device *smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001707 struct device *dev = &pdev->dev;
1708 struct rb_node *node;
1709 struct of_phandle_args masterspec;
1710 int num_irqs, i, err;
1711
1712 smmu = devm_kzalloc(dev, sizeof(*smmu), GFP_KERNEL);
1713 if (!smmu) {
1714 dev_err(dev, "failed to allocate arm_smmu_device\n");
1715 return -ENOMEM;
1716 }
1717 smmu->dev = dev;
1718
Robin Murphy09360402014-08-28 17:51:59 +01001719 of_id = of_match_node(arm_smmu_of_match, dev->of_node);
1720 smmu->version = (enum arm_smmu_arch_version)of_id->data;
1721
Will Deacon45ae7cf2013-06-24 18:31:25 +01001722 res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
Julia Lawall8a7f4312013-08-19 12:20:37 +01001723 smmu->base = devm_ioremap_resource(dev, res);
1724 if (IS_ERR(smmu->base))
1725 return PTR_ERR(smmu->base);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001726 smmu->size = resource_size(res);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001727
1728 if (of_property_read_u32(dev->of_node, "#global-interrupts",
1729 &smmu->num_global_irqs)) {
1730 dev_err(dev, "missing #global-interrupts property\n");
1731 return -ENODEV;
1732 }
1733
1734 num_irqs = 0;
1735 while ((res = platform_get_resource(pdev, IORESOURCE_IRQ, num_irqs))) {
1736 num_irqs++;
1737 if (num_irqs > smmu->num_global_irqs)
1738 smmu->num_context_irqs++;
1739 }
1740
Andreas Herrmann44a08de2013-10-01 13:39:07 +01001741 if (!smmu->num_context_irqs) {
1742 dev_err(dev, "found %d interrupts but expected at least %d\n",
1743 num_irqs, smmu->num_global_irqs + 1);
1744 return -ENODEV;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001745 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01001746
1747 smmu->irqs = devm_kzalloc(dev, sizeof(*smmu->irqs) * num_irqs,
1748 GFP_KERNEL);
1749 if (!smmu->irqs) {
1750 dev_err(dev, "failed to allocate %d irqs\n", num_irqs);
1751 return -ENOMEM;
1752 }
1753
1754 for (i = 0; i < num_irqs; ++i) {
1755 int irq = platform_get_irq(pdev, i);
Mitchel Humpherys29073202014-07-08 09:52:18 -07001756
Will Deacon45ae7cf2013-06-24 18:31:25 +01001757 if (irq < 0) {
1758 dev_err(dev, "failed to get irq index %d\n", i);
1759 return -ENODEV;
1760 }
1761 smmu->irqs[i] = irq;
1762 }
1763
Olav Haugan3c8766d2014-08-22 17:12:32 -07001764 err = arm_smmu_device_cfg_probe(smmu);
1765 if (err)
1766 return err;
1767
Will Deacon45ae7cf2013-06-24 18:31:25 +01001768 i = 0;
1769 smmu->masters = RB_ROOT;
1770 while (!of_parse_phandle_with_args(dev->of_node, "mmu-masters",
1771 "#stream-id-cells", i,
1772 &masterspec)) {
1773 err = register_smmu_master(smmu, dev, &masterspec);
1774 if (err) {
1775 dev_err(dev, "failed to add master %s\n",
1776 masterspec.np->name);
1777 goto out_put_masters;
1778 }
1779
1780 i++;
1781 }
1782 dev_notice(dev, "registered %d master devices\n", i);
1783
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001784 parse_driver_options(smmu);
1785
Robin Murphy09360402014-08-28 17:51:59 +01001786 if (smmu->version > ARM_SMMU_V1 &&
Will Deacon45ae7cf2013-06-24 18:31:25 +01001787 smmu->num_context_banks != smmu->num_context_irqs) {
1788 dev_err(dev,
1789 "found only %d context interrupt(s) but %d required\n",
1790 smmu->num_context_irqs, smmu->num_context_banks);
Wei Yongjun89a23cde2013-11-15 09:42:30 +00001791 err = -ENODEV;
Will Deacon44680ee2014-06-25 11:29:12 +01001792 goto out_put_masters;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001793 }
1794
Will Deacon45ae7cf2013-06-24 18:31:25 +01001795 for (i = 0; i < smmu->num_global_irqs; ++i) {
1796 err = request_irq(smmu->irqs[i],
1797 arm_smmu_global_fault,
1798 IRQF_SHARED,
1799 "arm-smmu global fault",
1800 smmu);
1801 if (err) {
1802 dev_err(dev, "failed to request global IRQ %d (%u)\n",
1803 i, smmu->irqs[i]);
1804 goto out_free_irqs;
1805 }
1806 }
1807
1808 INIT_LIST_HEAD(&smmu->list);
1809 spin_lock(&arm_smmu_devices_lock);
1810 list_add(&smmu->list, &arm_smmu_devices);
1811 spin_unlock(&arm_smmu_devices_lock);
Will Deaconfd90cec2013-08-21 13:56:34 +01001812
1813 arm_smmu_device_reset(smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001814 return 0;
1815
1816out_free_irqs:
1817 while (i--)
1818 free_irq(smmu->irqs[i], smmu);
1819
Will Deacon45ae7cf2013-06-24 18:31:25 +01001820out_put_masters:
1821 for (node = rb_first(&smmu->masters); node; node = rb_next(node)) {
Mitchel Humpherys29073202014-07-08 09:52:18 -07001822 struct arm_smmu_master *master
1823 = container_of(node, struct arm_smmu_master, node);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001824 of_node_put(master->of_node);
1825 }
1826
1827 return err;
1828}
1829
1830static int arm_smmu_device_remove(struct platform_device *pdev)
1831{
1832 int i;
1833 struct device *dev = &pdev->dev;
1834 struct arm_smmu_device *curr, *smmu = NULL;
1835 struct rb_node *node;
1836
1837 spin_lock(&arm_smmu_devices_lock);
1838 list_for_each_entry(curr, &arm_smmu_devices, list) {
1839 if (curr->dev == dev) {
1840 smmu = curr;
1841 list_del(&smmu->list);
1842 break;
1843 }
1844 }
1845 spin_unlock(&arm_smmu_devices_lock);
1846
1847 if (!smmu)
1848 return -ENODEV;
1849
Will Deacon45ae7cf2013-06-24 18:31:25 +01001850 for (node = rb_first(&smmu->masters); node; node = rb_next(node)) {
Mitchel Humpherys29073202014-07-08 09:52:18 -07001851 struct arm_smmu_master *master
1852 = container_of(node, struct arm_smmu_master, node);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001853 of_node_put(master->of_node);
1854 }
1855
Will Deaconecfadb62013-07-31 19:21:28 +01001856 if (!bitmap_empty(smmu->context_map, ARM_SMMU_MAX_CBS))
Will Deacon45ae7cf2013-06-24 18:31:25 +01001857 dev_err(dev, "removing device with active domains!\n");
1858
1859 for (i = 0; i < smmu->num_global_irqs; ++i)
1860 free_irq(smmu->irqs[i], smmu);
1861
1862 /* Turn the thing off */
Mitchel Humpherys29073202014-07-08 09:52:18 -07001863 writel(sCR0_CLIENTPD, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001864 return 0;
1865}
1866
Will Deacon45ae7cf2013-06-24 18:31:25 +01001867static struct platform_driver arm_smmu_driver = {
1868 .driver = {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001869 .name = "arm-smmu",
1870 .of_match_table = of_match_ptr(arm_smmu_of_match),
1871 },
1872 .probe = arm_smmu_device_dt_probe,
1873 .remove = arm_smmu_device_remove,
1874};
1875
1876static int __init arm_smmu_init(void)
1877{
Thierry Reding0e7d37a2014-11-07 15:26:18 +00001878 struct device_node *np;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001879 int ret;
1880
Thierry Reding0e7d37a2014-11-07 15:26:18 +00001881 /*
1882 * Play nice with systems that don't have an ARM SMMU by checking that
1883 * an ARM SMMU exists in the system before proceeding with the driver
1884 * and IOMMU bus operation registration.
1885 */
1886 np = of_find_matching_node(NULL, arm_smmu_of_match);
1887 if (!np)
1888 return 0;
1889
1890 of_node_put(np);
1891
Will Deacon45ae7cf2013-06-24 18:31:25 +01001892 ret = platform_driver_register(&arm_smmu_driver);
1893 if (ret)
1894 return ret;
1895
1896 /* Oh, for a proper bus abstraction */
Dan Carpenter6614ee72013-08-21 09:34:20 +01001897 if (!iommu_present(&platform_bus_type))
Will Deacon45ae7cf2013-06-24 18:31:25 +01001898 bus_set_iommu(&platform_bus_type, &arm_smmu_ops);
1899
Will Deacond123cf82014-02-04 22:17:53 +00001900#ifdef CONFIG_ARM_AMBA
Dan Carpenter6614ee72013-08-21 09:34:20 +01001901 if (!iommu_present(&amba_bustype))
Will Deacon45ae7cf2013-06-24 18:31:25 +01001902 bus_set_iommu(&amba_bustype, &arm_smmu_ops);
Will Deacond123cf82014-02-04 22:17:53 +00001903#endif
Will Deacon45ae7cf2013-06-24 18:31:25 +01001904
Will Deacona9a1b0b2014-05-01 18:05:08 +01001905#ifdef CONFIG_PCI
1906 if (!iommu_present(&pci_bus_type))
1907 bus_set_iommu(&pci_bus_type, &arm_smmu_ops);
1908#endif
1909
Will Deacon45ae7cf2013-06-24 18:31:25 +01001910 return 0;
1911}
1912
1913static void __exit arm_smmu_exit(void)
1914{
1915 return platform_driver_unregister(&arm_smmu_driver);
1916}
1917
Andreas Herrmannb1950b22013-10-01 13:39:05 +01001918subsys_initcall(arm_smmu_init);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001919module_exit(arm_smmu_exit);
1920
1921MODULE_DESCRIPTION("IOMMU API for ARM architected SMMU implementations");
1922MODULE_AUTHOR("Will Deacon <will.deacon@arm.com>");
1923MODULE_LICENSE("GPL v2");