blob: 0583ed2f33c00caa1b7aa6ac9319e1c619e37f5b [file] [log] [blame]
Will Deacon45ae7cf2013-06-24 18:31:25 +01001/*
2 * IOMMU API for ARM architected SMMU implementations.
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this program; if not, write to the Free Software
15 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
16 *
17 * Copyright (C) 2013 ARM Limited
18 *
19 * Author: Will Deacon <will.deacon@arm.com>
20 *
21 * This driver currently supports:
22 * - SMMUv1 and v2 implementations
23 * - Stream-matching and stream-indexing
24 * - v7/v8 long-descriptor format
25 * - Non-secure access to the SMMU
Will Deacon45ae7cf2013-06-24 18:31:25 +010026 * - Context fault reporting
27 */
28
29#define pr_fmt(fmt) "arm-smmu: " fmt
30
31#include <linux/delay.h>
32#include <linux/dma-mapping.h>
33#include <linux/err.h>
34#include <linux/interrupt.h>
35#include <linux/io.h>
36#include <linux/iommu.h>
Mitchel Humpherys859a7322014-10-29 21:13:40 +000037#include <linux/iopoll.h>
Will Deacon45ae7cf2013-06-24 18:31:25 +010038#include <linux/module.h>
39#include <linux/of.h>
Robin Murphybae2c2d2015-07-29 19:46:05 +010040#include <linux/of_address.h>
Will Deacona9a1b0b2014-05-01 18:05:08 +010041#include <linux/pci.h>
Will Deacon45ae7cf2013-06-24 18:31:25 +010042#include <linux/platform_device.h>
43#include <linux/slab.h>
44#include <linux/spinlock.h>
45
46#include <linux/amba/bus.h>
47
Will Deacon518f7132014-11-14 17:17:54 +000048#include "io-pgtable.h"
Will Deacon45ae7cf2013-06-24 18:31:25 +010049
50/* Maximum number of stream IDs assigned to a single device */
Andreas Herrmann636e97b2014-01-30 18:18:08 +000051#define MAX_MASTER_STREAMIDS MAX_PHANDLE_ARGS
Will Deacon45ae7cf2013-06-24 18:31:25 +010052
53/* Maximum number of context banks per SMMU */
54#define ARM_SMMU_MAX_CBS 128
55
56/* Maximum number of mapping groups per SMMU */
57#define ARM_SMMU_MAX_SMRS 128
58
Will Deacon45ae7cf2013-06-24 18:31:25 +010059/* SMMU global address space */
60#define ARM_SMMU_GR0(smmu) ((smmu)->base)
Will Deaconc757e852014-07-30 11:33:25 +010061#define ARM_SMMU_GR1(smmu) ((smmu)->base + (1 << (smmu)->pgshift))
Will Deacon45ae7cf2013-06-24 18:31:25 +010062
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +000063/*
64 * SMMU global address space with conditional offset to access secure
65 * aliases of non-secure registers (e.g. nsCR0: 0x400, nsGFSR: 0x448,
66 * nsGFSYNR0: 0x450)
67 */
68#define ARM_SMMU_GR0_NS(smmu) \
69 ((smmu)->base + \
70 ((smmu->options & ARM_SMMU_OPT_SECURE_CFG_ACCESS) \
71 ? 0x400 : 0))
72
Will Deacon45ae7cf2013-06-24 18:31:25 +010073/* Configuration registers */
74#define ARM_SMMU_GR0_sCR0 0x0
75#define sCR0_CLIENTPD (1 << 0)
76#define sCR0_GFRE (1 << 1)
77#define sCR0_GFIE (1 << 2)
78#define sCR0_GCFGFRE (1 << 4)
79#define sCR0_GCFGFIE (1 << 5)
80#define sCR0_USFCFG (1 << 10)
81#define sCR0_VMIDPNE (1 << 11)
82#define sCR0_PTM (1 << 12)
83#define sCR0_FB (1 << 13)
84#define sCR0_BSU_SHIFT 14
85#define sCR0_BSU_MASK 0x3
86
87/* Identification registers */
88#define ARM_SMMU_GR0_ID0 0x20
89#define ARM_SMMU_GR0_ID1 0x24
90#define ARM_SMMU_GR0_ID2 0x28
91#define ARM_SMMU_GR0_ID3 0x2c
92#define ARM_SMMU_GR0_ID4 0x30
93#define ARM_SMMU_GR0_ID5 0x34
94#define ARM_SMMU_GR0_ID6 0x38
95#define ARM_SMMU_GR0_ID7 0x3c
96#define ARM_SMMU_GR0_sGFSR 0x48
97#define ARM_SMMU_GR0_sGFSYNR0 0x50
98#define ARM_SMMU_GR0_sGFSYNR1 0x54
99#define ARM_SMMU_GR0_sGFSYNR2 0x58
Will Deacon45ae7cf2013-06-24 18:31:25 +0100100
101#define ID0_S1TS (1 << 30)
102#define ID0_S2TS (1 << 29)
103#define ID0_NTS (1 << 28)
104#define ID0_SMS (1 << 27)
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000105#define ID0_ATOSNS (1 << 26)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100106#define ID0_CTTW (1 << 14)
107#define ID0_NUMIRPT_SHIFT 16
108#define ID0_NUMIRPT_MASK 0xff
Olav Haugan3c8766d2014-08-22 17:12:32 -0700109#define ID0_NUMSIDB_SHIFT 9
110#define ID0_NUMSIDB_MASK 0xf
Will Deacon45ae7cf2013-06-24 18:31:25 +0100111#define ID0_NUMSMRG_SHIFT 0
112#define ID0_NUMSMRG_MASK 0xff
113
114#define ID1_PAGESIZE (1 << 31)
115#define ID1_NUMPAGENDXB_SHIFT 28
116#define ID1_NUMPAGENDXB_MASK 7
117#define ID1_NUMS2CB_SHIFT 16
118#define ID1_NUMS2CB_MASK 0xff
119#define ID1_NUMCB_SHIFT 0
120#define ID1_NUMCB_MASK 0xff
121
122#define ID2_OAS_SHIFT 4
123#define ID2_OAS_MASK 0xf
124#define ID2_IAS_SHIFT 0
125#define ID2_IAS_MASK 0xf
126#define ID2_UBS_SHIFT 8
127#define ID2_UBS_MASK 0xf
128#define ID2_PTFS_4K (1 << 12)
129#define ID2_PTFS_16K (1 << 13)
130#define ID2_PTFS_64K (1 << 14)
131
Will Deacon45ae7cf2013-06-24 18:31:25 +0100132/* Global TLB invalidation */
Will Deacon45ae7cf2013-06-24 18:31:25 +0100133#define ARM_SMMU_GR0_TLBIVMID 0x64
134#define ARM_SMMU_GR0_TLBIALLNSNH 0x68
135#define ARM_SMMU_GR0_TLBIALLH 0x6c
136#define ARM_SMMU_GR0_sTLBGSYNC 0x70
137#define ARM_SMMU_GR0_sTLBGSTATUS 0x74
138#define sTLBGSTATUS_GSACTIVE (1 << 0)
139#define TLB_LOOP_TIMEOUT 1000000 /* 1s! */
140
141/* Stream mapping registers */
142#define ARM_SMMU_GR0_SMR(n) (0x800 + ((n) << 2))
143#define SMR_VALID (1 << 31)
144#define SMR_MASK_SHIFT 16
145#define SMR_MASK_MASK 0x7fff
146#define SMR_ID_SHIFT 0
147#define SMR_ID_MASK 0x7fff
148
149#define ARM_SMMU_GR0_S2CR(n) (0xc00 + ((n) << 2))
150#define S2CR_CBNDX_SHIFT 0
151#define S2CR_CBNDX_MASK 0xff
152#define S2CR_TYPE_SHIFT 16
153#define S2CR_TYPE_MASK 0x3
154#define S2CR_TYPE_TRANS (0 << S2CR_TYPE_SHIFT)
155#define S2CR_TYPE_BYPASS (1 << S2CR_TYPE_SHIFT)
156#define S2CR_TYPE_FAULT (2 << S2CR_TYPE_SHIFT)
157
158/* Context bank attribute registers */
159#define ARM_SMMU_GR1_CBAR(n) (0x0 + ((n) << 2))
160#define CBAR_VMID_SHIFT 0
161#define CBAR_VMID_MASK 0xff
Will Deacon57ca90f2014-02-06 14:59:05 +0000162#define CBAR_S1_BPSHCFG_SHIFT 8
163#define CBAR_S1_BPSHCFG_MASK 3
164#define CBAR_S1_BPSHCFG_NSH 3
Will Deacon45ae7cf2013-06-24 18:31:25 +0100165#define CBAR_S1_MEMATTR_SHIFT 12
166#define CBAR_S1_MEMATTR_MASK 0xf
167#define CBAR_S1_MEMATTR_WB 0xf
168#define CBAR_TYPE_SHIFT 16
169#define CBAR_TYPE_MASK 0x3
170#define CBAR_TYPE_S2_TRANS (0 << CBAR_TYPE_SHIFT)
171#define CBAR_TYPE_S1_TRANS_S2_BYPASS (1 << CBAR_TYPE_SHIFT)
172#define CBAR_TYPE_S1_TRANS_S2_FAULT (2 << CBAR_TYPE_SHIFT)
173#define CBAR_TYPE_S1_TRANS_S2_TRANS (3 << CBAR_TYPE_SHIFT)
174#define CBAR_IRPTNDX_SHIFT 24
175#define CBAR_IRPTNDX_MASK 0xff
176
177#define ARM_SMMU_GR1_CBA2R(n) (0x800 + ((n) << 2))
178#define CBA2R_RW64_32BIT (0 << 0)
179#define CBA2R_RW64_64BIT (1 << 0)
180
181/* Translation context bank */
182#define ARM_SMMU_CB_BASE(smmu) ((smmu)->base + ((smmu)->size >> 1))
Will Deaconc757e852014-07-30 11:33:25 +0100183#define ARM_SMMU_CB(smmu, n) ((n) * (1 << (smmu)->pgshift))
Will Deacon45ae7cf2013-06-24 18:31:25 +0100184
185#define ARM_SMMU_CB_SCTLR 0x0
186#define ARM_SMMU_CB_RESUME 0x8
187#define ARM_SMMU_CB_TTBCR2 0x10
188#define ARM_SMMU_CB_TTBR0_LO 0x20
189#define ARM_SMMU_CB_TTBR0_HI 0x24
Will Deacon518f7132014-11-14 17:17:54 +0000190#define ARM_SMMU_CB_TTBR1_LO 0x28
191#define ARM_SMMU_CB_TTBR1_HI 0x2c
Will Deacon45ae7cf2013-06-24 18:31:25 +0100192#define ARM_SMMU_CB_TTBCR 0x30
193#define ARM_SMMU_CB_S1_MAIR0 0x38
Will Deacon518f7132014-11-14 17:17:54 +0000194#define ARM_SMMU_CB_S1_MAIR1 0x3c
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000195#define ARM_SMMU_CB_PAR_LO 0x50
196#define ARM_SMMU_CB_PAR_HI 0x54
Will Deacon45ae7cf2013-06-24 18:31:25 +0100197#define ARM_SMMU_CB_FSR 0x58
198#define ARM_SMMU_CB_FAR_LO 0x60
199#define ARM_SMMU_CB_FAR_HI 0x64
200#define ARM_SMMU_CB_FSYNR0 0x68
Will Deacon518f7132014-11-14 17:17:54 +0000201#define ARM_SMMU_CB_S1_TLBIVA 0x600
Will Deacon1463fe42013-07-31 19:21:27 +0100202#define ARM_SMMU_CB_S1_TLBIASID 0x610
Will Deacon518f7132014-11-14 17:17:54 +0000203#define ARM_SMMU_CB_S1_TLBIVAL 0x620
204#define ARM_SMMU_CB_S2_TLBIIPAS2 0x630
205#define ARM_SMMU_CB_S2_TLBIIPAS2L 0x638
Robin Murphy661d9622015-05-27 17:09:34 +0100206#define ARM_SMMU_CB_ATS1PR 0x800
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000207#define ARM_SMMU_CB_ATSR 0x8f0
Will Deacon45ae7cf2013-06-24 18:31:25 +0100208
209#define SCTLR_S1_ASIDPNE (1 << 12)
210#define SCTLR_CFCFG (1 << 7)
211#define SCTLR_CFIE (1 << 6)
212#define SCTLR_CFRE (1 << 5)
213#define SCTLR_E (1 << 4)
214#define SCTLR_AFE (1 << 2)
215#define SCTLR_TRE (1 << 1)
216#define SCTLR_M (1 << 0)
217#define SCTLR_EAE_SBOP (SCTLR_AFE | SCTLR_TRE)
218
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000219#define CB_PAR_F (1 << 0)
220
221#define ATSR_ACTIVE (1 << 0)
222
Will Deacon45ae7cf2013-06-24 18:31:25 +0100223#define RESUME_RETRY (0 << 0)
224#define RESUME_TERMINATE (1 << 0)
225
Will Deacon45ae7cf2013-06-24 18:31:25 +0100226#define TTBCR2_SEP_SHIFT 15
Will Deacon5dc56162015-05-08 17:44:22 +0100227#define TTBCR2_SEP_UPSTREAM (0x7 << TTBCR2_SEP_SHIFT)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100228
Will Deacon518f7132014-11-14 17:17:54 +0000229#define TTBRn_HI_ASID_SHIFT 16
Will Deacon45ae7cf2013-06-24 18:31:25 +0100230
231#define FSR_MULTI (1 << 31)
232#define FSR_SS (1 << 30)
233#define FSR_UUT (1 << 8)
234#define FSR_ASF (1 << 7)
235#define FSR_TLBLKF (1 << 6)
236#define FSR_TLBMCF (1 << 5)
237#define FSR_EF (1 << 4)
238#define FSR_PF (1 << 3)
239#define FSR_AFF (1 << 2)
240#define FSR_TF (1 << 1)
241
Mitchel Humpherys29073202014-07-08 09:52:18 -0700242#define FSR_IGN (FSR_AFF | FSR_ASF | \
243 FSR_TLBMCF | FSR_TLBLKF)
244#define FSR_FAULT (FSR_MULTI | FSR_SS | FSR_UUT | \
Will Deaconadaba322013-07-31 19:21:26 +0100245 FSR_EF | FSR_PF | FSR_TF | FSR_IGN)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100246
247#define FSYNR0_WNR (1 << 4)
248
Will Deacon4cf740b2014-07-14 19:47:39 +0100249static int force_stage;
Will Deacone3ce0c92015-05-27 17:09:35 +0100250module_param_named(force_stage, force_stage, int, S_IRUGO);
Will Deacon4cf740b2014-07-14 19:47:39 +0100251MODULE_PARM_DESC(force_stage,
252 "Force SMMU mappings to be installed at a particular stage of translation. A value of '1' or '2' forces the corresponding stage. All other values are ignored (i.e. no stage is forced). Note that selecting a specific stage will disable support for nested translation.");
253
Robin Murphy09360402014-08-28 17:51:59 +0100254enum arm_smmu_arch_version {
255 ARM_SMMU_V1 = 1,
256 ARM_SMMU_V2,
257};
258
Will Deacon45ae7cf2013-06-24 18:31:25 +0100259struct arm_smmu_smr {
260 u8 idx;
261 u16 mask;
262 u16 id;
263};
264
Will Deacona9a1b0b2014-05-01 18:05:08 +0100265struct arm_smmu_master_cfg {
Will Deacon45ae7cf2013-06-24 18:31:25 +0100266 int num_streamids;
267 u16 streamids[MAX_MASTER_STREAMIDS];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100268 struct arm_smmu_smr *smrs;
269};
270
Will Deacona9a1b0b2014-05-01 18:05:08 +0100271struct arm_smmu_master {
272 struct device_node *of_node;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100273 struct rb_node node;
274 struct arm_smmu_master_cfg cfg;
275};
276
Will Deacon45ae7cf2013-06-24 18:31:25 +0100277struct arm_smmu_device {
278 struct device *dev;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100279
280 void __iomem *base;
281 unsigned long size;
Will Deaconc757e852014-07-30 11:33:25 +0100282 unsigned long pgshift;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100283
284#define ARM_SMMU_FEAT_COHERENT_WALK (1 << 0)
285#define ARM_SMMU_FEAT_STREAM_MATCH (1 << 1)
286#define ARM_SMMU_FEAT_TRANS_S1 (1 << 2)
287#define ARM_SMMU_FEAT_TRANS_S2 (1 << 3)
288#define ARM_SMMU_FEAT_TRANS_NESTED (1 << 4)
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000289#define ARM_SMMU_FEAT_TRANS_OPS (1 << 5)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100290 u32 features;
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000291
292#define ARM_SMMU_OPT_SECURE_CFG_ACCESS (1 << 0)
293 u32 options;
Robin Murphy09360402014-08-28 17:51:59 +0100294 enum arm_smmu_arch_version version;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100295
296 u32 num_context_banks;
297 u32 num_s2_context_banks;
298 DECLARE_BITMAP(context_map, ARM_SMMU_MAX_CBS);
299 atomic_t irptndx;
300
301 u32 num_mapping_groups;
302 DECLARE_BITMAP(smr_map, ARM_SMMU_MAX_SMRS);
303
Will Deacon518f7132014-11-14 17:17:54 +0000304 unsigned long va_size;
305 unsigned long ipa_size;
306 unsigned long pa_size;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100307
308 u32 num_global_irqs;
309 u32 num_context_irqs;
310 unsigned int *irqs;
311
Will Deacon45ae7cf2013-06-24 18:31:25 +0100312 struct list_head list;
313 struct rb_root masters;
314};
315
316struct arm_smmu_cfg {
Will Deacon45ae7cf2013-06-24 18:31:25 +0100317 u8 cbndx;
318 u8 irptndx;
319 u32 cbar;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100320};
Dan Carpenterfaea13b72013-08-21 09:33:30 +0100321#define INVALID_IRPTNDX 0xff
Will Deacon45ae7cf2013-06-24 18:31:25 +0100322
Will Deaconecfadb62013-07-31 19:21:28 +0100323#define ARM_SMMU_CB_ASID(cfg) ((cfg)->cbndx)
324#define ARM_SMMU_CB_VMID(cfg) ((cfg)->cbndx + 1)
325
Will Deaconc752ce42014-06-25 22:46:31 +0100326enum arm_smmu_domain_stage {
327 ARM_SMMU_DOMAIN_S1 = 0,
328 ARM_SMMU_DOMAIN_S2,
329 ARM_SMMU_DOMAIN_NESTED,
330};
331
Will Deacon45ae7cf2013-06-24 18:31:25 +0100332struct arm_smmu_domain {
Will Deacon44680ee2014-06-25 11:29:12 +0100333 struct arm_smmu_device *smmu;
Will Deacon518f7132014-11-14 17:17:54 +0000334 struct io_pgtable_ops *pgtbl_ops;
335 spinlock_t pgtbl_lock;
Will Deacon44680ee2014-06-25 11:29:12 +0100336 struct arm_smmu_cfg cfg;
Will Deaconc752ce42014-06-25 22:46:31 +0100337 enum arm_smmu_domain_stage stage;
Will Deacon518f7132014-11-14 17:17:54 +0000338 struct mutex init_mutex; /* Protects smmu pointer */
Joerg Roedel1d672632015-03-26 13:43:10 +0100339 struct iommu_domain domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100340};
341
Will Deacon518f7132014-11-14 17:17:54 +0000342static struct iommu_ops arm_smmu_ops;
343
Will Deacon45ae7cf2013-06-24 18:31:25 +0100344static DEFINE_SPINLOCK(arm_smmu_devices_lock);
345static LIST_HEAD(arm_smmu_devices);
346
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000347struct arm_smmu_option_prop {
348 u32 opt;
349 const char *prop;
350};
351
Mitchel Humpherys29073202014-07-08 09:52:18 -0700352static struct arm_smmu_option_prop arm_smmu_options[] = {
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000353 { ARM_SMMU_OPT_SECURE_CFG_ACCESS, "calxeda,smmu-secure-config-access" },
354 { 0, NULL},
355};
356
Joerg Roedel1d672632015-03-26 13:43:10 +0100357static struct arm_smmu_domain *to_smmu_domain(struct iommu_domain *dom)
358{
359 return container_of(dom, struct arm_smmu_domain, domain);
360}
361
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000362static void parse_driver_options(struct arm_smmu_device *smmu)
363{
364 int i = 0;
Mitchel Humpherys29073202014-07-08 09:52:18 -0700365
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000366 do {
367 if (of_property_read_bool(smmu->dev->of_node,
368 arm_smmu_options[i].prop)) {
369 smmu->options |= arm_smmu_options[i].opt;
370 dev_notice(smmu->dev, "option %s\n",
371 arm_smmu_options[i].prop);
372 }
373 } while (arm_smmu_options[++i].opt);
374}
375
Will Deacon8f68f8e2014-07-15 11:27:08 +0100376static struct device_node *dev_get_dev_node(struct device *dev)
Will Deacona9a1b0b2014-05-01 18:05:08 +0100377{
378 if (dev_is_pci(dev)) {
379 struct pci_bus *bus = to_pci_dev(dev)->bus;
Mitchel Humpherys29073202014-07-08 09:52:18 -0700380
Will Deacona9a1b0b2014-05-01 18:05:08 +0100381 while (!pci_is_root_bus(bus))
382 bus = bus->parent;
Will Deacon8f68f8e2014-07-15 11:27:08 +0100383 return bus->bridge->parent->of_node;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100384 }
385
Will Deacon8f68f8e2014-07-15 11:27:08 +0100386 return dev->of_node;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100387}
388
Will Deacon45ae7cf2013-06-24 18:31:25 +0100389static struct arm_smmu_master *find_smmu_master(struct arm_smmu_device *smmu,
390 struct device_node *dev_node)
391{
392 struct rb_node *node = smmu->masters.rb_node;
393
394 while (node) {
395 struct arm_smmu_master *master;
Mitchel Humpherys29073202014-07-08 09:52:18 -0700396
Will Deacon45ae7cf2013-06-24 18:31:25 +0100397 master = container_of(node, struct arm_smmu_master, node);
398
399 if (dev_node < master->of_node)
400 node = node->rb_left;
401 else if (dev_node > master->of_node)
402 node = node->rb_right;
403 else
404 return master;
405 }
406
407 return NULL;
408}
409
Will Deacona9a1b0b2014-05-01 18:05:08 +0100410static struct arm_smmu_master_cfg *
Will Deacon8f68f8e2014-07-15 11:27:08 +0100411find_smmu_master_cfg(struct device *dev)
Will Deacona9a1b0b2014-05-01 18:05:08 +0100412{
Will Deacon8f68f8e2014-07-15 11:27:08 +0100413 struct arm_smmu_master_cfg *cfg = NULL;
414 struct iommu_group *group = iommu_group_get(dev);
Will Deacona9a1b0b2014-05-01 18:05:08 +0100415
Will Deacon8f68f8e2014-07-15 11:27:08 +0100416 if (group) {
417 cfg = iommu_group_get_iommudata(group);
418 iommu_group_put(group);
419 }
Will Deacona9a1b0b2014-05-01 18:05:08 +0100420
Will Deacon8f68f8e2014-07-15 11:27:08 +0100421 return cfg;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100422}
423
Will Deacon45ae7cf2013-06-24 18:31:25 +0100424static int insert_smmu_master(struct arm_smmu_device *smmu,
425 struct arm_smmu_master *master)
426{
427 struct rb_node **new, *parent;
428
429 new = &smmu->masters.rb_node;
430 parent = NULL;
431 while (*new) {
Mitchel Humpherys29073202014-07-08 09:52:18 -0700432 struct arm_smmu_master *this
433 = container_of(*new, struct arm_smmu_master, node);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100434
435 parent = *new;
436 if (master->of_node < this->of_node)
437 new = &((*new)->rb_left);
438 else if (master->of_node > this->of_node)
439 new = &((*new)->rb_right);
440 else
441 return -EEXIST;
442 }
443
444 rb_link_node(&master->node, parent, new);
445 rb_insert_color(&master->node, &smmu->masters);
446 return 0;
447}
448
449static int register_smmu_master(struct arm_smmu_device *smmu,
450 struct device *dev,
451 struct of_phandle_args *masterspec)
452{
453 int i;
454 struct arm_smmu_master *master;
455
456 master = find_smmu_master(smmu, masterspec->np);
457 if (master) {
458 dev_err(dev,
459 "rejecting multiple registrations for master device %s\n",
460 masterspec->np->name);
461 return -EBUSY;
462 }
463
464 if (masterspec->args_count > MAX_MASTER_STREAMIDS) {
465 dev_err(dev,
466 "reached maximum number (%d) of stream IDs for master device %s\n",
467 MAX_MASTER_STREAMIDS, masterspec->np->name);
468 return -ENOSPC;
469 }
470
471 master = devm_kzalloc(dev, sizeof(*master), GFP_KERNEL);
472 if (!master)
473 return -ENOMEM;
474
Will Deacona9a1b0b2014-05-01 18:05:08 +0100475 master->of_node = masterspec->np;
476 master->cfg.num_streamids = masterspec->args_count;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100477
Olav Haugan3c8766d2014-08-22 17:12:32 -0700478 for (i = 0; i < master->cfg.num_streamids; ++i) {
479 u16 streamid = masterspec->args[i];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100480
Olav Haugan3c8766d2014-08-22 17:12:32 -0700481 if (!(smmu->features & ARM_SMMU_FEAT_STREAM_MATCH) &&
482 (streamid >= smmu->num_mapping_groups)) {
483 dev_err(dev,
484 "stream ID for master device %s greater than maximum allowed (%d)\n",
485 masterspec->np->name, smmu->num_mapping_groups);
486 return -ERANGE;
487 }
488 master->cfg.streamids[i] = streamid;
489 }
Will Deacon45ae7cf2013-06-24 18:31:25 +0100490 return insert_smmu_master(smmu, master);
491}
492
Will Deacon44680ee2014-06-25 11:29:12 +0100493static struct arm_smmu_device *find_smmu_for_device(struct device *dev)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100494{
Will Deacon44680ee2014-06-25 11:29:12 +0100495 struct arm_smmu_device *smmu;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100496 struct arm_smmu_master *master = NULL;
Will Deacon8f68f8e2014-07-15 11:27:08 +0100497 struct device_node *dev_node = dev_get_dev_node(dev);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100498
499 spin_lock(&arm_smmu_devices_lock);
Will Deacon44680ee2014-06-25 11:29:12 +0100500 list_for_each_entry(smmu, &arm_smmu_devices, list) {
Will Deacona9a1b0b2014-05-01 18:05:08 +0100501 master = find_smmu_master(smmu, dev_node);
502 if (master)
503 break;
504 }
Will Deacon45ae7cf2013-06-24 18:31:25 +0100505 spin_unlock(&arm_smmu_devices_lock);
Will Deacon44680ee2014-06-25 11:29:12 +0100506
Will Deacona9a1b0b2014-05-01 18:05:08 +0100507 return master ? smmu : NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100508}
509
510static int __arm_smmu_alloc_bitmap(unsigned long *map, int start, int end)
511{
512 int idx;
513
514 do {
515 idx = find_next_zero_bit(map, end, start);
516 if (idx == end)
517 return -ENOSPC;
518 } while (test_and_set_bit(idx, map));
519
520 return idx;
521}
522
523static void __arm_smmu_free_bitmap(unsigned long *map, int idx)
524{
525 clear_bit(idx, map);
526}
527
528/* Wait for any pending TLB invalidations to complete */
Will Deacon518f7132014-11-14 17:17:54 +0000529static void __arm_smmu_tlb_sync(struct arm_smmu_device *smmu)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100530{
531 int count = 0;
532 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
533
534 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_sTLBGSYNC);
535 while (readl_relaxed(gr0_base + ARM_SMMU_GR0_sTLBGSTATUS)
536 & sTLBGSTATUS_GSACTIVE) {
537 cpu_relax();
538 if (++count == TLB_LOOP_TIMEOUT) {
539 dev_err_ratelimited(smmu->dev,
540 "TLB sync timed out -- SMMU may be deadlocked\n");
541 return;
542 }
543 udelay(1);
544 }
545}
546
Will Deacon518f7132014-11-14 17:17:54 +0000547static void arm_smmu_tlb_sync(void *cookie)
Will Deacon1463fe42013-07-31 19:21:27 +0100548{
Will Deacon518f7132014-11-14 17:17:54 +0000549 struct arm_smmu_domain *smmu_domain = cookie;
550 __arm_smmu_tlb_sync(smmu_domain->smmu);
551}
552
553static void arm_smmu_tlb_inv_context(void *cookie)
554{
555 struct arm_smmu_domain *smmu_domain = cookie;
Will Deacon44680ee2014-06-25 11:29:12 +0100556 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
557 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon1463fe42013-07-31 19:21:27 +0100558 bool stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
Will Deacon518f7132014-11-14 17:17:54 +0000559 void __iomem *base;
Will Deacon1463fe42013-07-31 19:21:27 +0100560
561 if (stage1) {
562 base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deaconecfadb62013-07-31 19:21:28 +0100563 writel_relaxed(ARM_SMMU_CB_ASID(cfg),
564 base + ARM_SMMU_CB_S1_TLBIASID);
Will Deacon1463fe42013-07-31 19:21:27 +0100565 } else {
566 base = ARM_SMMU_GR0(smmu);
Will Deaconecfadb62013-07-31 19:21:28 +0100567 writel_relaxed(ARM_SMMU_CB_VMID(cfg),
568 base + ARM_SMMU_GR0_TLBIVMID);
Will Deacon1463fe42013-07-31 19:21:27 +0100569 }
570
Will Deacon518f7132014-11-14 17:17:54 +0000571 __arm_smmu_tlb_sync(smmu);
Will Deacon1463fe42013-07-31 19:21:27 +0100572}
573
Will Deacon518f7132014-11-14 17:17:54 +0000574static void arm_smmu_tlb_inv_range_nosync(unsigned long iova, size_t size,
575 bool leaf, void *cookie)
576{
577 struct arm_smmu_domain *smmu_domain = cookie;
578 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
579 struct arm_smmu_device *smmu = smmu_domain->smmu;
580 bool stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
581 void __iomem *reg;
582
583 if (stage1) {
584 reg = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
585 reg += leaf ? ARM_SMMU_CB_S1_TLBIVAL : ARM_SMMU_CB_S1_TLBIVA;
586
587 if (!IS_ENABLED(CONFIG_64BIT) || smmu->version == ARM_SMMU_V1) {
588 iova &= ~12UL;
589 iova |= ARM_SMMU_CB_ASID(cfg);
590 writel_relaxed(iova, reg);
591#ifdef CONFIG_64BIT
592 } else {
593 iova >>= 12;
594 iova |= (u64)ARM_SMMU_CB_ASID(cfg) << 48;
595 writeq_relaxed(iova, reg);
596#endif
597 }
598#ifdef CONFIG_64BIT
599 } else if (smmu->version == ARM_SMMU_V2) {
600 reg = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
601 reg += leaf ? ARM_SMMU_CB_S2_TLBIIPAS2L :
602 ARM_SMMU_CB_S2_TLBIIPAS2;
603 writeq_relaxed(iova >> 12, reg);
604#endif
605 } else {
606 reg = ARM_SMMU_GR0(smmu) + ARM_SMMU_GR0_TLBIVMID;
607 writel_relaxed(ARM_SMMU_CB_VMID(cfg), reg);
608 }
609}
610
611static void arm_smmu_flush_pgtable(void *addr, size_t size, void *cookie)
612{
613 struct arm_smmu_domain *smmu_domain = cookie;
614 struct arm_smmu_device *smmu = smmu_domain->smmu;
615 unsigned long offset = (unsigned long)addr & ~PAGE_MASK;
616
617
618 /* Ensure new page tables are visible to the hardware walker */
619 if (smmu->features & ARM_SMMU_FEAT_COHERENT_WALK) {
620 dsb(ishst);
621 } else {
622 /*
623 * If the SMMU can't walk tables in the CPU caches, treat them
624 * like non-coherent DMA since we need to flush the new entries
625 * all the way out to memory. There's no possibility of
626 * recursion here as the SMMU table walker will not be wired
627 * through another SMMU.
628 */
629 dma_map_page(smmu->dev, virt_to_page(addr), offset, size,
630 DMA_TO_DEVICE);
631 }
632}
633
634static struct iommu_gather_ops arm_smmu_gather_ops = {
635 .tlb_flush_all = arm_smmu_tlb_inv_context,
636 .tlb_add_flush = arm_smmu_tlb_inv_range_nosync,
637 .tlb_sync = arm_smmu_tlb_sync,
638 .flush_pgtable = arm_smmu_flush_pgtable,
639};
640
Will Deacon45ae7cf2013-06-24 18:31:25 +0100641static irqreturn_t arm_smmu_context_fault(int irq, void *dev)
642{
643 int flags, ret;
644 u32 fsr, far, fsynr, resume;
645 unsigned long iova;
646 struct iommu_domain *domain = dev;
Joerg Roedel1d672632015-03-26 13:43:10 +0100647 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon44680ee2014-06-25 11:29:12 +0100648 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
649 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100650 void __iomem *cb_base;
651
Will Deacon44680ee2014-06-25 11:29:12 +0100652 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100653 fsr = readl_relaxed(cb_base + ARM_SMMU_CB_FSR);
654
655 if (!(fsr & FSR_FAULT))
656 return IRQ_NONE;
657
658 if (fsr & FSR_IGN)
659 dev_err_ratelimited(smmu->dev,
Hans Wennborg70c9a7d2014-08-06 05:42:01 +0100660 "Unexpected context fault (fsr 0x%x)\n",
Will Deacon45ae7cf2013-06-24 18:31:25 +0100661 fsr);
662
663 fsynr = readl_relaxed(cb_base + ARM_SMMU_CB_FSYNR0);
664 flags = fsynr & FSYNR0_WNR ? IOMMU_FAULT_WRITE : IOMMU_FAULT_READ;
665
666 far = readl_relaxed(cb_base + ARM_SMMU_CB_FAR_LO);
667 iova = far;
668#ifdef CONFIG_64BIT
669 far = readl_relaxed(cb_base + ARM_SMMU_CB_FAR_HI);
670 iova |= ((unsigned long)far << 32);
671#endif
672
673 if (!report_iommu_fault(domain, smmu->dev, iova, flags)) {
674 ret = IRQ_HANDLED;
675 resume = RESUME_RETRY;
676 } else {
Andreas Herrmann2ef0f032013-10-01 13:39:08 +0100677 dev_err_ratelimited(smmu->dev,
678 "Unhandled context fault: iova=0x%08lx, fsynr=0x%x, cb=%d\n",
Will Deacon44680ee2014-06-25 11:29:12 +0100679 iova, fsynr, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100680 ret = IRQ_NONE;
681 resume = RESUME_TERMINATE;
682 }
683
684 /* Clear the faulting FSR */
685 writel(fsr, cb_base + ARM_SMMU_CB_FSR);
686
687 /* Retry or terminate any stalled transactions */
688 if (fsr & FSR_SS)
689 writel_relaxed(resume, cb_base + ARM_SMMU_CB_RESUME);
690
691 return ret;
692}
693
694static irqreturn_t arm_smmu_global_fault(int irq, void *dev)
695{
696 u32 gfsr, gfsynr0, gfsynr1, gfsynr2;
697 struct arm_smmu_device *smmu = dev;
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000698 void __iomem *gr0_base = ARM_SMMU_GR0_NS(smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100699
700 gfsr = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSR);
701 gfsynr0 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR0);
702 gfsynr1 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR1);
703 gfsynr2 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR2);
704
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000705 if (!gfsr)
706 return IRQ_NONE;
707
Will Deacon45ae7cf2013-06-24 18:31:25 +0100708 dev_err_ratelimited(smmu->dev,
709 "Unexpected global fault, this could be serious\n");
710 dev_err_ratelimited(smmu->dev,
711 "\tGFSR 0x%08x, GFSYNR0 0x%08x, GFSYNR1 0x%08x, GFSYNR2 0x%08x\n",
712 gfsr, gfsynr0, gfsynr1, gfsynr2);
713
714 writel(gfsr, gr0_base + ARM_SMMU_GR0_sGFSR);
Will Deaconadaba322013-07-31 19:21:26 +0100715 return IRQ_HANDLED;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100716}
717
Will Deacon518f7132014-11-14 17:17:54 +0000718static void arm_smmu_init_context_bank(struct arm_smmu_domain *smmu_domain,
719 struct io_pgtable_cfg *pgtbl_cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100720{
721 u32 reg;
722 bool stage1;
Will Deacon44680ee2014-06-25 11:29:12 +0100723 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
724 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100725 void __iomem *cb_base, *gr0_base, *gr1_base;
726
727 gr0_base = ARM_SMMU_GR0(smmu);
728 gr1_base = ARM_SMMU_GR1(smmu);
Will Deacon44680ee2014-06-25 11:29:12 +0100729 stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
730 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100731
Will Deacon4a1c93c2015-03-04 12:21:03 +0000732 if (smmu->version > ARM_SMMU_V1) {
733 /*
734 * CBA2R.
735 * *Must* be initialised before CBAR thanks to VMID16
736 * architectural oversight affected some implementations.
737 */
738#ifdef CONFIG_64BIT
739 reg = CBA2R_RW64_64BIT;
740#else
741 reg = CBA2R_RW64_32BIT;
742#endif
743 writel_relaxed(reg, gr1_base + ARM_SMMU_GR1_CBA2R(cfg->cbndx));
744 }
745
Will Deacon45ae7cf2013-06-24 18:31:25 +0100746 /* CBAR */
Will Deacon44680ee2014-06-25 11:29:12 +0100747 reg = cfg->cbar;
Robin Murphy09360402014-08-28 17:51:59 +0100748 if (smmu->version == ARM_SMMU_V1)
Mitchel Humpherys29073202014-07-08 09:52:18 -0700749 reg |= cfg->irptndx << CBAR_IRPTNDX_SHIFT;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100750
Will Deacon57ca90f2014-02-06 14:59:05 +0000751 /*
752 * Use the weakest shareability/memory types, so they are
753 * overridden by the ttbcr/pte.
754 */
755 if (stage1) {
756 reg |= (CBAR_S1_BPSHCFG_NSH << CBAR_S1_BPSHCFG_SHIFT) |
757 (CBAR_S1_MEMATTR_WB << CBAR_S1_MEMATTR_SHIFT);
758 } else {
Will Deacon44680ee2014-06-25 11:29:12 +0100759 reg |= ARM_SMMU_CB_VMID(cfg) << CBAR_VMID_SHIFT;
Will Deacon57ca90f2014-02-06 14:59:05 +0000760 }
Will Deacon44680ee2014-06-25 11:29:12 +0100761 writel_relaxed(reg, gr1_base + ARM_SMMU_GR1_CBAR(cfg->cbndx));
Will Deacon45ae7cf2013-06-24 18:31:25 +0100762
Will Deacon518f7132014-11-14 17:17:54 +0000763 /* TTBRs */
764 if (stage1) {
765 reg = pgtbl_cfg->arm_lpae_s1_cfg.ttbr[0];
766 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBR0_LO);
767 reg = pgtbl_cfg->arm_lpae_s1_cfg.ttbr[0] >> 32;
Will Deacon44680ee2014-06-25 11:29:12 +0100768 reg |= ARM_SMMU_CB_ASID(cfg) << TTBRn_HI_ASID_SHIFT;
Will Deacon518f7132014-11-14 17:17:54 +0000769 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBR0_HI);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100770
Will Deacon518f7132014-11-14 17:17:54 +0000771 reg = pgtbl_cfg->arm_lpae_s1_cfg.ttbr[1];
772 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBR1_LO);
773 reg = pgtbl_cfg->arm_lpae_s1_cfg.ttbr[1] >> 32;
774 reg |= ARM_SMMU_CB_ASID(cfg) << TTBRn_HI_ASID_SHIFT;
775 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBR1_HI);
776 } else {
777 reg = pgtbl_cfg->arm_lpae_s2_cfg.vttbr;
778 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBR0_LO);
779 reg = pgtbl_cfg->arm_lpae_s2_cfg.vttbr >> 32;
780 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBR0_HI);
781 }
Will Deacon45ae7cf2013-06-24 18:31:25 +0100782
Will Deacon518f7132014-11-14 17:17:54 +0000783 /* TTBCR */
784 if (stage1) {
785 reg = pgtbl_cfg->arm_lpae_s1_cfg.tcr;
786 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR);
787 if (smmu->version > ARM_SMMU_V1) {
788 reg = pgtbl_cfg->arm_lpae_s1_cfg.tcr >> 32;
Will Deacon5dc56162015-05-08 17:44:22 +0100789 reg |= TTBCR2_SEP_UPSTREAM;
Will Deacon518f7132014-11-14 17:17:54 +0000790 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR2);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100791 }
792 } else {
Will Deacon518f7132014-11-14 17:17:54 +0000793 reg = pgtbl_cfg->arm_lpae_s2_cfg.vtcr;
794 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100795 }
796
Will Deacon518f7132014-11-14 17:17:54 +0000797 /* MAIRs (stage-1 only) */
Will Deacon45ae7cf2013-06-24 18:31:25 +0100798 if (stage1) {
Will Deacon518f7132014-11-14 17:17:54 +0000799 reg = pgtbl_cfg->arm_lpae_s1_cfg.mair[0];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100800 writel_relaxed(reg, cb_base + ARM_SMMU_CB_S1_MAIR0);
Will Deacon518f7132014-11-14 17:17:54 +0000801 reg = pgtbl_cfg->arm_lpae_s1_cfg.mair[1];
802 writel_relaxed(reg, cb_base + ARM_SMMU_CB_S1_MAIR1);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100803 }
804
Will Deacon45ae7cf2013-06-24 18:31:25 +0100805 /* SCTLR */
806 reg = SCTLR_CFCFG | SCTLR_CFIE | SCTLR_CFRE | SCTLR_M | SCTLR_EAE_SBOP;
807 if (stage1)
808 reg |= SCTLR_S1_ASIDPNE;
809#ifdef __BIG_ENDIAN
810 reg |= SCTLR_E;
811#endif
Will Deacon25724842013-08-21 13:49:53 +0100812 writel_relaxed(reg, cb_base + ARM_SMMU_CB_SCTLR);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100813}
814
815static int arm_smmu_init_domain_context(struct iommu_domain *domain,
Will Deacon44680ee2014-06-25 11:29:12 +0100816 struct arm_smmu_device *smmu)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100817{
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100818 int irq, start, ret = 0;
Will Deacon518f7132014-11-14 17:17:54 +0000819 unsigned long ias, oas;
820 struct io_pgtable_ops *pgtbl_ops;
821 struct io_pgtable_cfg pgtbl_cfg;
822 enum io_pgtable_fmt fmt;
Joerg Roedel1d672632015-03-26 13:43:10 +0100823 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon44680ee2014-06-25 11:29:12 +0100824 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100825
Will Deacon518f7132014-11-14 17:17:54 +0000826 mutex_lock(&smmu_domain->init_mutex);
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100827 if (smmu_domain->smmu)
828 goto out_unlock;
829
Will Deaconc752ce42014-06-25 22:46:31 +0100830 /*
831 * Mapping the requested stage onto what we support is surprisingly
832 * complicated, mainly because the spec allows S1+S2 SMMUs without
833 * support for nested translation. That means we end up with the
834 * following table:
835 *
836 * Requested Supported Actual
837 * S1 N S1
838 * S1 S1+S2 S1
839 * S1 S2 S2
840 * S1 S1 S1
841 * N N N
842 * N S1+S2 S2
843 * N S2 S2
844 * N S1 S1
845 *
846 * Note that you can't actually request stage-2 mappings.
847 */
848 if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S1))
849 smmu_domain->stage = ARM_SMMU_DOMAIN_S2;
850 if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S2))
851 smmu_domain->stage = ARM_SMMU_DOMAIN_S1;
852
853 switch (smmu_domain->stage) {
854 case ARM_SMMU_DOMAIN_S1:
855 cfg->cbar = CBAR_TYPE_S1_TRANS_S2_BYPASS;
856 start = smmu->num_s2_context_banks;
Will Deacon518f7132014-11-14 17:17:54 +0000857 ias = smmu->va_size;
858 oas = smmu->ipa_size;
859 if (IS_ENABLED(CONFIG_64BIT))
860 fmt = ARM_64_LPAE_S1;
861 else
862 fmt = ARM_32_LPAE_S1;
Will Deaconc752ce42014-06-25 22:46:31 +0100863 break;
864 case ARM_SMMU_DOMAIN_NESTED:
Will Deacon45ae7cf2013-06-24 18:31:25 +0100865 /*
866 * We will likely want to change this if/when KVM gets
867 * involved.
868 */
Will Deaconc752ce42014-06-25 22:46:31 +0100869 case ARM_SMMU_DOMAIN_S2:
Will Deacon9c5c92e2014-06-25 12:12:41 +0100870 cfg->cbar = CBAR_TYPE_S2_TRANS;
871 start = 0;
Will Deacon518f7132014-11-14 17:17:54 +0000872 ias = smmu->ipa_size;
873 oas = smmu->pa_size;
874 if (IS_ENABLED(CONFIG_64BIT))
875 fmt = ARM_64_LPAE_S2;
876 else
877 fmt = ARM_32_LPAE_S2;
Will Deaconc752ce42014-06-25 22:46:31 +0100878 break;
879 default:
880 ret = -EINVAL;
881 goto out_unlock;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100882 }
883
884 ret = __arm_smmu_alloc_bitmap(smmu->context_map, start,
885 smmu->num_context_banks);
886 if (IS_ERR_VALUE(ret))
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100887 goto out_unlock;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100888
Will Deacon44680ee2014-06-25 11:29:12 +0100889 cfg->cbndx = ret;
Robin Murphy09360402014-08-28 17:51:59 +0100890 if (smmu->version == ARM_SMMU_V1) {
Will Deacon44680ee2014-06-25 11:29:12 +0100891 cfg->irptndx = atomic_inc_return(&smmu->irptndx);
892 cfg->irptndx %= smmu->num_context_irqs;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100893 } else {
Will Deacon44680ee2014-06-25 11:29:12 +0100894 cfg->irptndx = cfg->cbndx;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100895 }
896
Will Deacon518f7132014-11-14 17:17:54 +0000897 pgtbl_cfg = (struct io_pgtable_cfg) {
898 .pgsize_bitmap = arm_smmu_ops.pgsize_bitmap,
899 .ias = ias,
900 .oas = oas,
901 .tlb = &arm_smmu_gather_ops,
902 };
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100903
Will Deacon518f7132014-11-14 17:17:54 +0000904 smmu_domain->smmu = smmu;
905 pgtbl_ops = alloc_io_pgtable_ops(fmt, &pgtbl_cfg, smmu_domain);
906 if (!pgtbl_ops) {
907 ret = -ENOMEM;
908 goto out_clear_smmu;
909 }
910
911 /* Update our support page sizes to reflect the page table format */
912 arm_smmu_ops.pgsize_bitmap = pgtbl_cfg.pgsize_bitmap;
913
914 /* Initialise the context bank with our page table cfg */
915 arm_smmu_init_context_bank(smmu_domain, &pgtbl_cfg);
916
917 /*
918 * Request context fault interrupt. Do this last to avoid the
919 * handler seeing a half-initialised domain state.
920 */
Will Deacon44680ee2014-06-25 11:29:12 +0100921 irq = smmu->irqs[smmu->num_global_irqs + cfg->irptndx];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100922 ret = request_irq(irq, arm_smmu_context_fault, IRQF_SHARED,
923 "arm-smmu-context-fault", domain);
924 if (IS_ERR_VALUE(ret)) {
925 dev_err(smmu->dev, "failed to request context IRQ %d (%u)\n",
Will Deacon44680ee2014-06-25 11:29:12 +0100926 cfg->irptndx, irq);
927 cfg->irptndx = INVALID_IRPTNDX;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100928 }
929
Will Deacon518f7132014-11-14 17:17:54 +0000930 mutex_unlock(&smmu_domain->init_mutex);
931
932 /* Publish page table ops for map/unmap */
933 smmu_domain->pgtbl_ops = pgtbl_ops;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100934 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100935
Will Deacon518f7132014-11-14 17:17:54 +0000936out_clear_smmu:
937 smmu_domain->smmu = NULL;
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100938out_unlock:
Will Deacon518f7132014-11-14 17:17:54 +0000939 mutex_unlock(&smmu_domain->init_mutex);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100940 return ret;
941}
942
943static void arm_smmu_destroy_domain_context(struct iommu_domain *domain)
944{
Joerg Roedel1d672632015-03-26 13:43:10 +0100945 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon44680ee2014-06-25 11:29:12 +0100946 struct arm_smmu_device *smmu = smmu_domain->smmu;
947 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
Will Deacon1463fe42013-07-31 19:21:27 +0100948 void __iomem *cb_base;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100949 int irq;
950
951 if (!smmu)
952 return;
953
Will Deacon518f7132014-11-14 17:17:54 +0000954 /*
955 * Disable the context bank and free the page tables before freeing
956 * it.
957 */
Will Deacon44680ee2014-06-25 11:29:12 +0100958 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deacon1463fe42013-07-31 19:21:27 +0100959 writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR);
Will Deacon1463fe42013-07-31 19:21:27 +0100960
Will Deacon44680ee2014-06-25 11:29:12 +0100961 if (cfg->irptndx != INVALID_IRPTNDX) {
962 irq = smmu->irqs[smmu->num_global_irqs + cfg->irptndx];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100963 free_irq(irq, domain);
964 }
965
Will Deacon518f7132014-11-14 17:17:54 +0000966 if (smmu_domain->pgtbl_ops)
967 free_io_pgtable_ops(smmu_domain->pgtbl_ops);
968
Will Deacon44680ee2014-06-25 11:29:12 +0100969 __arm_smmu_free_bitmap(smmu->context_map, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100970}
971
Joerg Roedel1d672632015-03-26 13:43:10 +0100972static struct iommu_domain *arm_smmu_domain_alloc(unsigned type)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100973{
974 struct arm_smmu_domain *smmu_domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100975
Joerg Roedel1d672632015-03-26 13:43:10 +0100976 if (type != IOMMU_DOMAIN_UNMANAGED)
977 return NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100978 /*
979 * Allocate the domain and initialise some of its data structures.
980 * We can't really do anything meaningful until we've added a
981 * master.
982 */
983 smmu_domain = kzalloc(sizeof(*smmu_domain), GFP_KERNEL);
984 if (!smmu_domain)
Joerg Roedel1d672632015-03-26 13:43:10 +0100985 return NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100986
Will Deacon518f7132014-11-14 17:17:54 +0000987 mutex_init(&smmu_domain->init_mutex);
988 spin_lock_init(&smmu_domain->pgtbl_lock);
Joerg Roedel1d672632015-03-26 13:43:10 +0100989
990 return &smmu_domain->domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100991}
992
Joerg Roedel1d672632015-03-26 13:43:10 +0100993static void arm_smmu_domain_free(struct iommu_domain *domain)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100994{
Joerg Roedel1d672632015-03-26 13:43:10 +0100995 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon1463fe42013-07-31 19:21:27 +0100996
997 /*
998 * Free the domain resources. We assume that all devices have
999 * already been detached.
1000 */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001001 arm_smmu_destroy_domain_context(domain);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001002 kfree(smmu_domain);
1003}
1004
1005static int arm_smmu_master_configure_smrs(struct arm_smmu_device *smmu,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001006 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001007{
1008 int i;
1009 struct arm_smmu_smr *smrs;
1010 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1011
1012 if (!(smmu->features & ARM_SMMU_FEAT_STREAM_MATCH))
1013 return 0;
1014
Will Deacona9a1b0b2014-05-01 18:05:08 +01001015 if (cfg->smrs)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001016 return -EEXIST;
1017
Mitchel Humpherys29073202014-07-08 09:52:18 -07001018 smrs = kmalloc_array(cfg->num_streamids, sizeof(*smrs), GFP_KERNEL);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001019 if (!smrs) {
Will Deacona9a1b0b2014-05-01 18:05:08 +01001020 dev_err(smmu->dev, "failed to allocate %d SMRs\n",
1021 cfg->num_streamids);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001022 return -ENOMEM;
1023 }
1024
Will Deacon44680ee2014-06-25 11:29:12 +01001025 /* Allocate the SMRs on the SMMU */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001026 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001027 int idx = __arm_smmu_alloc_bitmap(smmu->smr_map, 0,
1028 smmu->num_mapping_groups);
1029 if (IS_ERR_VALUE(idx)) {
1030 dev_err(smmu->dev, "failed to allocate free SMR\n");
1031 goto err_free_smrs;
1032 }
1033
1034 smrs[i] = (struct arm_smmu_smr) {
1035 .idx = idx,
1036 .mask = 0, /* We don't currently share SMRs */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001037 .id = cfg->streamids[i],
Will Deacon45ae7cf2013-06-24 18:31:25 +01001038 };
1039 }
1040
1041 /* It worked! Now, poke the actual hardware */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001042 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001043 u32 reg = SMR_VALID | smrs[i].id << SMR_ID_SHIFT |
1044 smrs[i].mask << SMR_MASK_SHIFT;
1045 writel_relaxed(reg, gr0_base + ARM_SMMU_GR0_SMR(smrs[i].idx));
1046 }
1047
Will Deacona9a1b0b2014-05-01 18:05:08 +01001048 cfg->smrs = smrs;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001049 return 0;
1050
1051err_free_smrs:
1052 while (--i >= 0)
1053 __arm_smmu_free_bitmap(smmu->smr_map, smrs[i].idx);
1054 kfree(smrs);
1055 return -ENOSPC;
1056}
1057
1058static void arm_smmu_master_free_smrs(struct arm_smmu_device *smmu,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001059 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001060{
1061 int i;
1062 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001063 struct arm_smmu_smr *smrs = cfg->smrs;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001064
Will Deacon43b412b2014-07-15 11:22:24 +01001065 if (!smrs)
1066 return;
1067
Will Deacon45ae7cf2013-06-24 18:31:25 +01001068 /* Invalidate the SMRs before freeing back to the allocator */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001069 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001070 u8 idx = smrs[i].idx;
Mitchel Humpherys29073202014-07-08 09:52:18 -07001071
Will Deacon45ae7cf2013-06-24 18:31:25 +01001072 writel_relaxed(~SMR_VALID, gr0_base + ARM_SMMU_GR0_SMR(idx));
1073 __arm_smmu_free_bitmap(smmu->smr_map, idx);
1074 }
1075
Will Deacona9a1b0b2014-05-01 18:05:08 +01001076 cfg->smrs = NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001077 kfree(smrs);
1078}
1079
Will Deacon45ae7cf2013-06-24 18:31:25 +01001080static int arm_smmu_domain_add_master(struct arm_smmu_domain *smmu_domain,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001081 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001082{
1083 int i, ret;
Will Deacon44680ee2014-06-25 11:29:12 +01001084 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001085 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1086
Will Deacon8f68f8e2014-07-15 11:27:08 +01001087 /* Devices in an IOMMU group may already be configured */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001088 ret = arm_smmu_master_configure_smrs(smmu, cfg);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001089 if (ret)
Will Deacon8f68f8e2014-07-15 11:27:08 +01001090 return ret == -EEXIST ? 0 : ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001091
Will Deacona9a1b0b2014-05-01 18:05:08 +01001092 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001093 u32 idx, s2cr;
Mitchel Humpherys29073202014-07-08 09:52:18 -07001094
Will Deacona9a1b0b2014-05-01 18:05:08 +01001095 idx = cfg->smrs ? cfg->smrs[i].idx : cfg->streamids[i];
Kefeng Wang6069d232014-04-18 10:20:48 +08001096 s2cr = S2CR_TYPE_TRANS |
Will Deacon44680ee2014-06-25 11:29:12 +01001097 (smmu_domain->cfg.cbndx << S2CR_CBNDX_SHIFT);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001098 writel_relaxed(s2cr, gr0_base + ARM_SMMU_GR0_S2CR(idx));
1099 }
1100
1101 return 0;
1102}
1103
1104static void arm_smmu_domain_remove_master(struct arm_smmu_domain *smmu_domain,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001105 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001106{
Will Deacon43b412b2014-07-15 11:22:24 +01001107 int i;
Will Deacon44680ee2014-06-25 11:29:12 +01001108 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon43b412b2014-07-15 11:22:24 +01001109 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001110
Will Deacon8f68f8e2014-07-15 11:27:08 +01001111 /* An IOMMU group is torn down by the first device to be removed */
1112 if ((smmu->features & ARM_SMMU_FEAT_STREAM_MATCH) && !cfg->smrs)
1113 return;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001114
1115 /*
1116 * We *must* clear the S2CR first, because freeing the SMR means
1117 * that it can be re-allocated immediately.
1118 */
Will Deacon43b412b2014-07-15 11:22:24 +01001119 for (i = 0; i < cfg->num_streamids; ++i) {
1120 u32 idx = cfg->smrs ? cfg->smrs[i].idx : cfg->streamids[i];
1121
1122 writel_relaxed(S2CR_TYPE_BYPASS,
1123 gr0_base + ARM_SMMU_GR0_S2CR(idx));
1124 }
1125
Will Deacona9a1b0b2014-05-01 18:05:08 +01001126 arm_smmu_master_free_smrs(smmu, cfg);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001127}
1128
1129static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev)
1130{
Mitchel Humpherysa18037b2014-07-30 18:58:13 +01001131 int ret;
Joerg Roedel1d672632015-03-26 13:43:10 +01001132 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon518f7132014-11-14 17:17:54 +00001133 struct arm_smmu_device *smmu;
Will Deacona9a1b0b2014-05-01 18:05:08 +01001134 struct arm_smmu_master_cfg *cfg;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001135
Will Deacon8f68f8e2014-07-15 11:27:08 +01001136 smmu = find_smmu_for_device(dev);
Will Deacon44680ee2014-06-25 11:29:12 +01001137 if (!smmu) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001138 dev_err(dev, "cannot attach to SMMU, is it on the same bus?\n");
1139 return -ENXIO;
1140 }
1141
Will Deacon844e35b2014-07-17 11:23:51 +01001142 if (dev->archdata.iommu) {
1143 dev_err(dev, "already attached to IOMMU domain\n");
1144 return -EEXIST;
1145 }
1146
Will Deacon518f7132014-11-14 17:17:54 +00001147 /* Ensure that the domain is finalised */
1148 ret = arm_smmu_init_domain_context(domain, smmu);
1149 if (IS_ERR_VALUE(ret))
1150 return ret;
1151
Will Deacon45ae7cf2013-06-24 18:31:25 +01001152 /*
Will Deacon44680ee2014-06-25 11:29:12 +01001153 * Sanity check the domain. We don't support domains across
1154 * different SMMUs.
Will Deacon45ae7cf2013-06-24 18:31:25 +01001155 */
Will Deacon518f7132014-11-14 17:17:54 +00001156 if (smmu_domain->smmu != smmu) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001157 dev_err(dev,
1158 "cannot attach to SMMU %s whilst already attached to domain on SMMU %s\n",
Mitchel Humpherysa18037b2014-07-30 18:58:13 +01001159 dev_name(smmu_domain->smmu->dev), dev_name(smmu->dev));
1160 return -EINVAL;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001161 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01001162
1163 /* Looks ok, so add the device to the domain */
Will Deacon8f68f8e2014-07-15 11:27:08 +01001164 cfg = find_smmu_master_cfg(dev);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001165 if (!cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001166 return -ENODEV;
1167
Will Deacon844e35b2014-07-17 11:23:51 +01001168 ret = arm_smmu_domain_add_master(smmu_domain, cfg);
1169 if (!ret)
1170 dev->archdata.iommu = domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001171 return ret;
1172}
1173
1174static void arm_smmu_detach_dev(struct iommu_domain *domain, struct device *dev)
1175{
Joerg Roedel1d672632015-03-26 13:43:10 +01001176 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001177 struct arm_smmu_master_cfg *cfg;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001178
Will Deacon8f68f8e2014-07-15 11:27:08 +01001179 cfg = find_smmu_master_cfg(dev);
Will Deacon844e35b2014-07-17 11:23:51 +01001180 if (!cfg)
1181 return;
1182
1183 dev->archdata.iommu = NULL;
1184 arm_smmu_domain_remove_master(smmu_domain, cfg);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001185}
1186
Will Deacon45ae7cf2013-06-24 18:31:25 +01001187static int arm_smmu_map(struct iommu_domain *domain, unsigned long iova,
Will Deaconb410aed2014-02-20 16:31:06 +00001188 phys_addr_t paddr, size_t size, int prot)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001189{
Will Deacon518f7132014-11-14 17:17:54 +00001190 int ret;
1191 unsigned long flags;
Joerg Roedel1d672632015-03-26 13:43:10 +01001192 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon518f7132014-11-14 17:17:54 +00001193 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001194
Will Deacon518f7132014-11-14 17:17:54 +00001195 if (!ops)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001196 return -ENODEV;
1197
Will Deacon518f7132014-11-14 17:17:54 +00001198 spin_lock_irqsave(&smmu_domain->pgtbl_lock, flags);
1199 ret = ops->map(ops, iova, paddr, size, prot);
1200 spin_unlock_irqrestore(&smmu_domain->pgtbl_lock, flags);
1201 return ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001202}
1203
1204static size_t arm_smmu_unmap(struct iommu_domain *domain, unsigned long iova,
1205 size_t size)
1206{
Will Deacon518f7132014-11-14 17:17:54 +00001207 size_t ret;
1208 unsigned long flags;
Joerg Roedel1d672632015-03-26 13:43:10 +01001209 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon518f7132014-11-14 17:17:54 +00001210 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001211
Will Deacon518f7132014-11-14 17:17:54 +00001212 if (!ops)
1213 return 0;
1214
1215 spin_lock_irqsave(&smmu_domain->pgtbl_lock, flags);
1216 ret = ops->unmap(ops, iova, size);
1217 spin_unlock_irqrestore(&smmu_domain->pgtbl_lock, flags);
1218 return ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001219}
1220
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001221static phys_addr_t arm_smmu_iova_to_phys_hard(struct iommu_domain *domain,
1222 dma_addr_t iova)
1223{
Joerg Roedel1d672632015-03-26 13:43:10 +01001224 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001225 struct arm_smmu_device *smmu = smmu_domain->smmu;
1226 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
1227 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
1228 struct device *dev = smmu->dev;
1229 void __iomem *cb_base;
1230 u32 tmp;
1231 u64 phys;
Robin Murphy661d9622015-05-27 17:09:34 +01001232 unsigned long va;
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001233
1234 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
1235
Robin Murphy661d9622015-05-27 17:09:34 +01001236 /* ATS1 registers can only be written atomically */
1237 va = iova & ~0xfffUL;
1238#ifdef CONFIG_64BIT
1239 if (smmu->version == ARM_SMMU_V2)
1240 writeq_relaxed(va, cb_base + ARM_SMMU_CB_ATS1PR);
1241 else
1242#endif
1243 writel_relaxed(va, cb_base + ARM_SMMU_CB_ATS1PR);
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001244
1245 if (readl_poll_timeout_atomic(cb_base + ARM_SMMU_CB_ATSR, tmp,
1246 !(tmp & ATSR_ACTIVE), 5, 50)) {
1247 dev_err(dev,
1248 "iova to phys timed out on 0x%pad. Falling back to software table walk.\n",
1249 &iova);
1250 return ops->iova_to_phys(ops, iova);
1251 }
1252
1253 phys = readl_relaxed(cb_base + ARM_SMMU_CB_PAR_LO);
1254 phys |= ((u64)readl_relaxed(cb_base + ARM_SMMU_CB_PAR_HI)) << 32;
1255
1256 if (phys & CB_PAR_F) {
1257 dev_err(dev, "translation fault!\n");
1258 dev_err(dev, "PAR = 0x%llx\n", phys);
1259 return 0;
1260 }
1261
1262 return (phys & GENMASK_ULL(39, 12)) | (iova & 0xfff);
1263}
1264
Will Deacon45ae7cf2013-06-24 18:31:25 +01001265static phys_addr_t arm_smmu_iova_to_phys(struct iommu_domain *domain,
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001266 dma_addr_t iova)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001267{
Will Deacon518f7132014-11-14 17:17:54 +00001268 phys_addr_t ret;
1269 unsigned long flags;
Joerg Roedel1d672632015-03-26 13:43:10 +01001270 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon518f7132014-11-14 17:17:54 +00001271 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001272
Will Deacon518f7132014-11-14 17:17:54 +00001273 if (!ops)
Will Deacona44a97912013-11-07 18:47:50 +00001274 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001275
Will Deacon518f7132014-11-14 17:17:54 +00001276 spin_lock_irqsave(&smmu_domain->pgtbl_lock, flags);
Baptiste Reynal83a60ed2015-03-04 16:51:06 +01001277 if (smmu_domain->smmu->features & ARM_SMMU_FEAT_TRANS_OPS &&
1278 smmu_domain->stage == ARM_SMMU_DOMAIN_S1) {
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001279 ret = arm_smmu_iova_to_phys_hard(domain, iova);
Baptiste Reynal83a60ed2015-03-04 16:51:06 +01001280 } else {
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001281 ret = ops->iova_to_phys(ops, iova);
Baptiste Reynal83a60ed2015-03-04 16:51:06 +01001282 }
1283
Will Deacon518f7132014-11-14 17:17:54 +00001284 spin_unlock_irqrestore(&smmu_domain->pgtbl_lock, flags);
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001285
Will Deacon518f7132014-11-14 17:17:54 +00001286 return ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001287}
1288
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001289static bool arm_smmu_capable(enum iommu_cap cap)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001290{
Will Deacond0948942014-06-24 17:30:10 +01001291 switch (cap) {
1292 case IOMMU_CAP_CACHE_COHERENCY:
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001293 /*
1294 * Return true here as the SMMU can always send out coherent
1295 * requests.
1296 */
1297 return true;
Will Deacond0948942014-06-24 17:30:10 +01001298 case IOMMU_CAP_INTR_REMAP:
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001299 return true; /* MSIs are just memory writes */
Antonios Motakis0029a8d2014-10-13 14:06:18 +01001300 case IOMMU_CAP_NOEXEC:
1301 return true;
Will Deacond0948942014-06-24 17:30:10 +01001302 default:
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001303 return false;
Will Deacond0948942014-06-24 17:30:10 +01001304 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01001305}
Will Deacon45ae7cf2013-06-24 18:31:25 +01001306
Will Deacona9a1b0b2014-05-01 18:05:08 +01001307static int __arm_smmu_get_pci_sid(struct pci_dev *pdev, u16 alias, void *data)
1308{
1309 *((u16 *)data) = alias;
1310 return 0; /* Continue walking */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001311}
1312
Will Deacon8f68f8e2014-07-15 11:27:08 +01001313static void __arm_smmu_release_pci_iommudata(void *data)
1314{
1315 kfree(data);
1316}
1317
Will Deacon03edb222015-01-19 14:27:33 +00001318static int arm_smmu_add_pci_device(struct pci_dev *pdev)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001319{
Will Deacon03edb222015-01-19 14:27:33 +00001320 int i, ret;
1321 u16 sid;
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001322 struct iommu_group *group;
Will Deacon03edb222015-01-19 14:27:33 +00001323 struct arm_smmu_master_cfg *cfg;
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001324
Will Deacon03edb222015-01-19 14:27:33 +00001325 group = iommu_group_get_for_dev(&pdev->dev);
1326 if (IS_ERR(group))
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001327 return PTR_ERR(group);
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001328
Will Deacon03edb222015-01-19 14:27:33 +00001329 cfg = iommu_group_get_iommudata(group);
1330 if (!cfg) {
Will Deacona9a1b0b2014-05-01 18:05:08 +01001331 cfg = kzalloc(sizeof(*cfg), GFP_KERNEL);
1332 if (!cfg) {
1333 ret = -ENOMEM;
1334 goto out_put_group;
1335 }
1336
Will Deacon03edb222015-01-19 14:27:33 +00001337 iommu_group_set_iommudata(group, cfg,
1338 __arm_smmu_release_pci_iommudata);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001339 }
1340
Will Deacon03edb222015-01-19 14:27:33 +00001341 if (cfg->num_streamids >= MAX_MASTER_STREAMIDS) {
1342 ret = -ENOSPC;
1343 goto out_put_group;
1344 }
Will Deacona9a1b0b2014-05-01 18:05:08 +01001345
Will Deacon03edb222015-01-19 14:27:33 +00001346 /*
1347 * Assume Stream ID == Requester ID for now.
1348 * We need a way to describe the ID mappings in FDT.
1349 */
1350 pci_for_each_dma_alias(pdev, __arm_smmu_get_pci_sid, &sid);
1351 for (i = 0; i < cfg->num_streamids; ++i)
1352 if (cfg->streamids[i] == sid)
1353 break;
1354
1355 /* Avoid duplicate SIDs, as this can lead to SMR conflicts */
1356 if (i == cfg->num_streamids)
1357 cfg->streamids[cfg->num_streamids++] = sid;
1358
1359 return 0;
Will Deacona9a1b0b2014-05-01 18:05:08 +01001360out_put_group:
1361 iommu_group_put(group);
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001362 return ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001363}
1364
Will Deacon03edb222015-01-19 14:27:33 +00001365static int arm_smmu_add_platform_device(struct device *dev)
1366{
1367 struct iommu_group *group;
1368 struct arm_smmu_master *master;
1369 struct arm_smmu_device *smmu = find_smmu_for_device(dev);
1370
1371 if (!smmu)
1372 return -ENODEV;
1373
1374 master = find_smmu_master(smmu, dev->of_node);
1375 if (!master)
1376 return -ENODEV;
1377
1378 /* No automatic group creation for platform devices */
1379 group = iommu_group_alloc();
1380 if (IS_ERR(group))
1381 return PTR_ERR(group);
1382
1383 iommu_group_set_iommudata(group, &master->cfg, NULL);
1384 return iommu_group_add_device(group, dev);
1385}
1386
1387static int arm_smmu_add_device(struct device *dev)
1388{
1389 if (dev_is_pci(dev))
1390 return arm_smmu_add_pci_device(to_pci_dev(dev));
1391
1392 return arm_smmu_add_platform_device(dev);
1393}
1394
Will Deacon45ae7cf2013-06-24 18:31:25 +01001395static void arm_smmu_remove_device(struct device *dev)
1396{
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001397 iommu_group_remove_device(dev);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001398}
1399
Will Deaconc752ce42014-06-25 22:46:31 +01001400static int arm_smmu_domain_get_attr(struct iommu_domain *domain,
1401 enum iommu_attr attr, void *data)
1402{
Joerg Roedel1d672632015-03-26 13:43:10 +01001403 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deaconc752ce42014-06-25 22:46:31 +01001404
1405 switch (attr) {
1406 case DOMAIN_ATTR_NESTING:
1407 *(int *)data = (smmu_domain->stage == ARM_SMMU_DOMAIN_NESTED);
1408 return 0;
1409 default:
1410 return -ENODEV;
1411 }
1412}
1413
1414static int arm_smmu_domain_set_attr(struct iommu_domain *domain,
1415 enum iommu_attr attr, void *data)
1416{
Will Deacon518f7132014-11-14 17:17:54 +00001417 int ret = 0;
Joerg Roedel1d672632015-03-26 13:43:10 +01001418 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deaconc752ce42014-06-25 22:46:31 +01001419
Will Deacon518f7132014-11-14 17:17:54 +00001420 mutex_lock(&smmu_domain->init_mutex);
1421
Will Deaconc752ce42014-06-25 22:46:31 +01001422 switch (attr) {
1423 case DOMAIN_ATTR_NESTING:
Will Deacon518f7132014-11-14 17:17:54 +00001424 if (smmu_domain->smmu) {
1425 ret = -EPERM;
1426 goto out_unlock;
1427 }
1428
Will Deaconc752ce42014-06-25 22:46:31 +01001429 if (*(int *)data)
1430 smmu_domain->stage = ARM_SMMU_DOMAIN_NESTED;
1431 else
1432 smmu_domain->stage = ARM_SMMU_DOMAIN_S1;
1433
Will Deacon518f7132014-11-14 17:17:54 +00001434 break;
Will Deaconc752ce42014-06-25 22:46:31 +01001435 default:
Will Deacon518f7132014-11-14 17:17:54 +00001436 ret = -ENODEV;
Will Deaconc752ce42014-06-25 22:46:31 +01001437 }
Will Deacon518f7132014-11-14 17:17:54 +00001438
1439out_unlock:
1440 mutex_unlock(&smmu_domain->init_mutex);
1441 return ret;
Will Deaconc752ce42014-06-25 22:46:31 +01001442}
1443
Will Deacon518f7132014-11-14 17:17:54 +00001444static struct iommu_ops arm_smmu_ops = {
Will Deaconc752ce42014-06-25 22:46:31 +01001445 .capable = arm_smmu_capable,
Joerg Roedel1d672632015-03-26 13:43:10 +01001446 .domain_alloc = arm_smmu_domain_alloc,
1447 .domain_free = arm_smmu_domain_free,
Will Deaconc752ce42014-06-25 22:46:31 +01001448 .attach_dev = arm_smmu_attach_dev,
1449 .detach_dev = arm_smmu_detach_dev,
1450 .map = arm_smmu_map,
1451 .unmap = arm_smmu_unmap,
Joerg Roedel76771c92014-12-02 13:07:13 +01001452 .map_sg = default_iommu_map_sg,
Will Deaconc752ce42014-06-25 22:46:31 +01001453 .iova_to_phys = arm_smmu_iova_to_phys,
1454 .add_device = arm_smmu_add_device,
1455 .remove_device = arm_smmu_remove_device,
1456 .domain_get_attr = arm_smmu_domain_get_attr,
1457 .domain_set_attr = arm_smmu_domain_set_attr,
Will Deacon518f7132014-11-14 17:17:54 +00001458 .pgsize_bitmap = -1UL, /* Restricted during device attach */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001459};
1460
1461static void arm_smmu_device_reset(struct arm_smmu_device *smmu)
1462{
1463 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001464 void __iomem *cb_base;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001465 int i = 0;
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001466 u32 reg;
1467
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001468 /* clear global FSR */
1469 reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sGFSR);
1470 writel(reg, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sGFSR);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001471
1472 /* Mark all SMRn as invalid and all S2CRn as bypass */
1473 for (i = 0; i < smmu->num_mapping_groups; ++i) {
Olav Haugan3c8766d2014-08-22 17:12:32 -07001474 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_SMR(i));
Mitchel Humpherys29073202014-07-08 09:52:18 -07001475 writel_relaxed(S2CR_TYPE_BYPASS,
1476 gr0_base + ARM_SMMU_GR0_S2CR(i));
Will Deacon45ae7cf2013-06-24 18:31:25 +01001477 }
1478
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001479 /* Make sure all context banks are disabled and clear CB_FSR */
1480 for (i = 0; i < smmu->num_context_banks; ++i) {
1481 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, i);
1482 writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR);
1483 writel_relaxed(FSR_FAULT, cb_base + ARM_SMMU_CB_FSR);
1484 }
Will Deacon1463fe42013-07-31 19:21:27 +01001485
Will Deacon45ae7cf2013-06-24 18:31:25 +01001486 /* Invalidate the TLB, just in case */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001487 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLH);
1488 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLNSNH);
1489
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001490 reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001491
Will Deacon45ae7cf2013-06-24 18:31:25 +01001492 /* Enable fault reporting */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001493 reg |= (sCR0_GFRE | sCR0_GFIE | sCR0_GCFGFRE | sCR0_GCFGFIE);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001494
1495 /* Disable TLB broadcasting. */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001496 reg |= (sCR0_VMIDPNE | sCR0_PTM);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001497
1498 /* Enable client access, but bypass when no mapping is found */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001499 reg &= ~(sCR0_CLIENTPD | sCR0_USFCFG);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001500
1501 /* Disable forced broadcasting */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001502 reg &= ~sCR0_FB;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001503
1504 /* Don't upgrade barriers */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001505 reg &= ~(sCR0_BSU_MASK << sCR0_BSU_SHIFT);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001506
1507 /* Push the button */
Will Deacon518f7132014-11-14 17:17:54 +00001508 __arm_smmu_tlb_sync(smmu);
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001509 writel(reg, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001510}
1511
1512static int arm_smmu_id_size_to_bits(int size)
1513{
1514 switch (size) {
1515 case 0:
1516 return 32;
1517 case 1:
1518 return 36;
1519 case 2:
1520 return 40;
1521 case 3:
1522 return 42;
1523 case 4:
1524 return 44;
1525 case 5:
1526 default:
1527 return 48;
1528 }
1529}
1530
1531static int arm_smmu_device_cfg_probe(struct arm_smmu_device *smmu)
1532{
1533 unsigned long size;
1534 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1535 u32 id;
Robin Murphybae2c2d2015-07-29 19:46:05 +01001536 bool cttw_dt, cttw_reg;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001537
1538 dev_notice(smmu->dev, "probing hardware configuration...\n");
Will Deacon45ae7cf2013-06-24 18:31:25 +01001539 dev_notice(smmu->dev, "SMMUv%d with:\n", smmu->version);
1540
1541 /* ID0 */
1542 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID0);
Will Deacon4cf740b2014-07-14 19:47:39 +01001543
1544 /* Restrict available stages based on module parameter */
1545 if (force_stage == 1)
1546 id &= ~(ID0_S2TS | ID0_NTS);
1547 else if (force_stage == 2)
1548 id &= ~(ID0_S1TS | ID0_NTS);
1549
Will Deacon45ae7cf2013-06-24 18:31:25 +01001550 if (id & ID0_S1TS) {
1551 smmu->features |= ARM_SMMU_FEAT_TRANS_S1;
1552 dev_notice(smmu->dev, "\tstage 1 translation\n");
1553 }
1554
1555 if (id & ID0_S2TS) {
1556 smmu->features |= ARM_SMMU_FEAT_TRANS_S2;
1557 dev_notice(smmu->dev, "\tstage 2 translation\n");
1558 }
1559
1560 if (id & ID0_NTS) {
1561 smmu->features |= ARM_SMMU_FEAT_TRANS_NESTED;
1562 dev_notice(smmu->dev, "\tnested translation\n");
1563 }
1564
1565 if (!(smmu->features &
Will Deacon4cf740b2014-07-14 19:47:39 +01001566 (ARM_SMMU_FEAT_TRANS_S1 | ARM_SMMU_FEAT_TRANS_S2))) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001567 dev_err(smmu->dev, "\tno translation support!\n");
1568 return -ENODEV;
1569 }
1570
Will Deacond38f0ff2015-06-29 17:47:42 +01001571 if ((id & ID0_S1TS) && ((smmu->version == 1) || !(id & ID0_ATOSNS))) {
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001572 smmu->features |= ARM_SMMU_FEAT_TRANS_OPS;
1573 dev_notice(smmu->dev, "\taddress translation ops\n");
1574 }
1575
Robin Murphybae2c2d2015-07-29 19:46:05 +01001576 /*
1577 * In order for DMA API calls to work properly, we must defer to what
1578 * the DT says about coherency, regardless of what the hardware claims.
1579 * Fortunately, this also opens up a workaround for systems where the
1580 * ID register value has ended up configured incorrectly.
1581 */
1582 cttw_dt = of_dma_is_coherent(smmu->dev->of_node);
1583 cttw_reg = !!(id & ID0_CTTW);
1584 if (cttw_dt)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001585 smmu->features |= ARM_SMMU_FEAT_COHERENT_WALK;
Robin Murphybae2c2d2015-07-29 19:46:05 +01001586 if (cttw_dt || cttw_reg)
1587 dev_notice(smmu->dev, "\t%scoherent table walk\n",
1588 cttw_dt ? "" : "non-");
1589 if (cttw_dt != cttw_reg)
1590 dev_notice(smmu->dev,
1591 "\t(IDR0.CTTW overridden by dma-coherent property)\n");
Will Deacon45ae7cf2013-06-24 18:31:25 +01001592
1593 if (id & ID0_SMS) {
1594 u32 smr, sid, mask;
1595
1596 smmu->features |= ARM_SMMU_FEAT_STREAM_MATCH;
1597 smmu->num_mapping_groups = (id >> ID0_NUMSMRG_SHIFT) &
1598 ID0_NUMSMRG_MASK;
1599 if (smmu->num_mapping_groups == 0) {
1600 dev_err(smmu->dev,
1601 "stream-matching supported, but no SMRs present!\n");
1602 return -ENODEV;
1603 }
1604
1605 smr = SMR_MASK_MASK << SMR_MASK_SHIFT;
1606 smr |= (SMR_ID_MASK << SMR_ID_SHIFT);
1607 writel_relaxed(smr, gr0_base + ARM_SMMU_GR0_SMR(0));
1608 smr = readl_relaxed(gr0_base + ARM_SMMU_GR0_SMR(0));
1609
1610 mask = (smr >> SMR_MASK_SHIFT) & SMR_MASK_MASK;
1611 sid = (smr >> SMR_ID_SHIFT) & SMR_ID_MASK;
1612 if ((mask & sid) != sid) {
1613 dev_err(smmu->dev,
1614 "SMR mask bits (0x%x) insufficient for ID field (0x%x)\n",
1615 mask, sid);
1616 return -ENODEV;
1617 }
1618
1619 dev_notice(smmu->dev,
1620 "\tstream matching with %u register groups, mask 0x%x",
1621 smmu->num_mapping_groups, mask);
Olav Haugan3c8766d2014-08-22 17:12:32 -07001622 } else {
1623 smmu->num_mapping_groups = (id >> ID0_NUMSIDB_SHIFT) &
1624 ID0_NUMSIDB_MASK;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001625 }
1626
1627 /* ID1 */
1628 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID1);
Will Deaconc757e852014-07-30 11:33:25 +01001629 smmu->pgshift = (id & ID1_PAGESIZE) ? 16 : 12;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001630
Andreas Herrmannc55af7f2013-10-01 13:39:06 +01001631 /* Check for size mismatch of SMMU address space from mapped region */
Will Deacon518f7132014-11-14 17:17:54 +00001632 size = 1 << (((id >> ID1_NUMPAGENDXB_SHIFT) & ID1_NUMPAGENDXB_MASK) + 1);
Will Deaconc757e852014-07-30 11:33:25 +01001633 size *= 2 << smmu->pgshift;
Andreas Herrmannc55af7f2013-10-01 13:39:06 +01001634 if (smmu->size != size)
Mitchel Humpherys29073202014-07-08 09:52:18 -07001635 dev_warn(smmu->dev,
1636 "SMMU address space size (0x%lx) differs from mapped region size (0x%lx)!\n",
1637 size, smmu->size);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001638
Will Deacon518f7132014-11-14 17:17:54 +00001639 smmu->num_s2_context_banks = (id >> ID1_NUMS2CB_SHIFT) & ID1_NUMS2CB_MASK;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001640 smmu->num_context_banks = (id >> ID1_NUMCB_SHIFT) & ID1_NUMCB_MASK;
1641 if (smmu->num_s2_context_banks > smmu->num_context_banks) {
1642 dev_err(smmu->dev, "impossible number of S2 context banks!\n");
1643 return -ENODEV;
1644 }
1645 dev_notice(smmu->dev, "\t%u context banks (%u stage-2 only)\n",
1646 smmu->num_context_banks, smmu->num_s2_context_banks);
1647
1648 /* ID2 */
1649 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID2);
1650 size = arm_smmu_id_size_to_bits((id >> ID2_IAS_SHIFT) & ID2_IAS_MASK);
Will Deacon518f7132014-11-14 17:17:54 +00001651 smmu->ipa_size = size;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001652
Will Deacon518f7132014-11-14 17:17:54 +00001653 /* The output mask is also applied for bypass */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001654 size = arm_smmu_id_size_to_bits((id >> ID2_OAS_SHIFT) & ID2_OAS_MASK);
Will Deacon518f7132014-11-14 17:17:54 +00001655 smmu->pa_size = size;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001656
Robin Murphyf1d84542015-03-04 16:41:05 +00001657 /*
1658 * What the page table walker can address actually depends on which
1659 * descriptor format is in use, but since a) we don't know that yet,
1660 * and b) it can vary per context bank, this will have to do...
1661 */
1662 if (dma_set_mask_and_coherent(smmu->dev, DMA_BIT_MASK(size)))
1663 dev_warn(smmu->dev,
1664 "failed to set DMA mask for table walker\n");
1665
Robin Murphy09360402014-08-28 17:51:59 +01001666 if (smmu->version == ARM_SMMU_V1) {
Will Deacon518f7132014-11-14 17:17:54 +00001667 smmu->va_size = smmu->ipa_size;
1668 size = SZ_4K | SZ_2M | SZ_1G;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001669 } else {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001670 size = (id >> ID2_UBS_SHIFT) & ID2_UBS_MASK;
Will Deacon518f7132014-11-14 17:17:54 +00001671 smmu->va_size = arm_smmu_id_size_to_bits(size);
1672#ifndef CONFIG_64BIT
1673 smmu->va_size = min(32UL, smmu->va_size);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001674#endif
Will Deacon518f7132014-11-14 17:17:54 +00001675 size = 0;
1676 if (id & ID2_PTFS_4K)
1677 size |= SZ_4K | SZ_2M | SZ_1G;
1678 if (id & ID2_PTFS_16K)
1679 size |= SZ_16K | SZ_32M;
1680 if (id & ID2_PTFS_64K)
1681 size |= SZ_64K | SZ_512M;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001682 }
1683
Will Deacon518f7132014-11-14 17:17:54 +00001684 arm_smmu_ops.pgsize_bitmap &= size;
1685 dev_notice(smmu->dev, "\tSupported page sizes: 0x%08lx\n", size);
1686
Will Deacon28d60072014-09-01 16:24:48 +01001687 if (smmu->features & ARM_SMMU_FEAT_TRANS_S1)
1688 dev_notice(smmu->dev, "\tStage-1: %lu-bit VA -> %lu-bit IPA\n",
Will Deacon518f7132014-11-14 17:17:54 +00001689 smmu->va_size, smmu->ipa_size);
Will Deacon28d60072014-09-01 16:24:48 +01001690
1691 if (smmu->features & ARM_SMMU_FEAT_TRANS_S2)
1692 dev_notice(smmu->dev, "\tStage-2: %lu-bit IPA -> %lu-bit PA\n",
Will Deacon518f7132014-11-14 17:17:54 +00001693 smmu->ipa_size, smmu->pa_size);
Will Deacon28d60072014-09-01 16:24:48 +01001694
Will Deacon45ae7cf2013-06-24 18:31:25 +01001695 return 0;
1696}
1697
Joerg Roedel09b52692014-10-02 12:24:45 +02001698static const struct of_device_id arm_smmu_of_match[] = {
Robin Murphy09360402014-08-28 17:51:59 +01001699 { .compatible = "arm,smmu-v1", .data = (void *)ARM_SMMU_V1 },
1700 { .compatible = "arm,smmu-v2", .data = (void *)ARM_SMMU_V2 },
1701 { .compatible = "arm,mmu-400", .data = (void *)ARM_SMMU_V1 },
Robin Murphyd3aba042014-08-28 17:52:00 +01001702 { .compatible = "arm,mmu-401", .data = (void *)ARM_SMMU_V1 },
Robin Murphy09360402014-08-28 17:51:59 +01001703 { .compatible = "arm,mmu-500", .data = (void *)ARM_SMMU_V2 },
1704 { },
1705};
1706MODULE_DEVICE_TABLE(of, arm_smmu_of_match);
1707
Will Deacon45ae7cf2013-06-24 18:31:25 +01001708static int arm_smmu_device_dt_probe(struct platform_device *pdev)
1709{
Robin Murphy09360402014-08-28 17:51:59 +01001710 const struct of_device_id *of_id;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001711 struct resource *res;
1712 struct arm_smmu_device *smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001713 struct device *dev = &pdev->dev;
1714 struct rb_node *node;
1715 struct of_phandle_args masterspec;
1716 int num_irqs, i, err;
1717
1718 smmu = devm_kzalloc(dev, sizeof(*smmu), GFP_KERNEL);
1719 if (!smmu) {
1720 dev_err(dev, "failed to allocate arm_smmu_device\n");
1721 return -ENOMEM;
1722 }
1723 smmu->dev = dev;
1724
Robin Murphy09360402014-08-28 17:51:59 +01001725 of_id = of_match_node(arm_smmu_of_match, dev->of_node);
1726 smmu->version = (enum arm_smmu_arch_version)of_id->data;
1727
Will Deacon45ae7cf2013-06-24 18:31:25 +01001728 res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
Julia Lawall8a7f4312013-08-19 12:20:37 +01001729 smmu->base = devm_ioremap_resource(dev, res);
1730 if (IS_ERR(smmu->base))
1731 return PTR_ERR(smmu->base);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001732 smmu->size = resource_size(res);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001733
1734 if (of_property_read_u32(dev->of_node, "#global-interrupts",
1735 &smmu->num_global_irqs)) {
1736 dev_err(dev, "missing #global-interrupts property\n");
1737 return -ENODEV;
1738 }
1739
1740 num_irqs = 0;
1741 while ((res = platform_get_resource(pdev, IORESOURCE_IRQ, num_irqs))) {
1742 num_irqs++;
1743 if (num_irqs > smmu->num_global_irqs)
1744 smmu->num_context_irqs++;
1745 }
1746
Andreas Herrmann44a08de2013-10-01 13:39:07 +01001747 if (!smmu->num_context_irqs) {
1748 dev_err(dev, "found %d interrupts but expected at least %d\n",
1749 num_irqs, smmu->num_global_irqs + 1);
1750 return -ENODEV;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001751 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01001752
1753 smmu->irqs = devm_kzalloc(dev, sizeof(*smmu->irqs) * num_irqs,
1754 GFP_KERNEL);
1755 if (!smmu->irqs) {
1756 dev_err(dev, "failed to allocate %d irqs\n", num_irqs);
1757 return -ENOMEM;
1758 }
1759
1760 for (i = 0; i < num_irqs; ++i) {
1761 int irq = platform_get_irq(pdev, i);
Mitchel Humpherys29073202014-07-08 09:52:18 -07001762
Will Deacon45ae7cf2013-06-24 18:31:25 +01001763 if (irq < 0) {
1764 dev_err(dev, "failed to get irq index %d\n", i);
1765 return -ENODEV;
1766 }
1767 smmu->irqs[i] = irq;
1768 }
1769
Olav Haugan3c8766d2014-08-22 17:12:32 -07001770 err = arm_smmu_device_cfg_probe(smmu);
1771 if (err)
1772 return err;
1773
Will Deacon45ae7cf2013-06-24 18:31:25 +01001774 i = 0;
1775 smmu->masters = RB_ROOT;
1776 while (!of_parse_phandle_with_args(dev->of_node, "mmu-masters",
1777 "#stream-id-cells", i,
1778 &masterspec)) {
1779 err = register_smmu_master(smmu, dev, &masterspec);
1780 if (err) {
1781 dev_err(dev, "failed to add master %s\n",
1782 masterspec.np->name);
1783 goto out_put_masters;
1784 }
1785
1786 i++;
1787 }
1788 dev_notice(dev, "registered %d master devices\n", i);
1789
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001790 parse_driver_options(smmu);
1791
Robin Murphy09360402014-08-28 17:51:59 +01001792 if (smmu->version > ARM_SMMU_V1 &&
Will Deacon45ae7cf2013-06-24 18:31:25 +01001793 smmu->num_context_banks != smmu->num_context_irqs) {
1794 dev_err(dev,
1795 "found only %d context interrupt(s) but %d required\n",
1796 smmu->num_context_irqs, smmu->num_context_banks);
Wei Yongjun89a23cde2013-11-15 09:42:30 +00001797 err = -ENODEV;
Will Deacon44680ee2014-06-25 11:29:12 +01001798 goto out_put_masters;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001799 }
1800
Will Deacon45ae7cf2013-06-24 18:31:25 +01001801 for (i = 0; i < smmu->num_global_irqs; ++i) {
1802 err = request_irq(smmu->irqs[i],
1803 arm_smmu_global_fault,
1804 IRQF_SHARED,
1805 "arm-smmu global fault",
1806 smmu);
1807 if (err) {
1808 dev_err(dev, "failed to request global IRQ %d (%u)\n",
1809 i, smmu->irqs[i]);
1810 goto out_free_irqs;
1811 }
1812 }
1813
1814 INIT_LIST_HEAD(&smmu->list);
1815 spin_lock(&arm_smmu_devices_lock);
1816 list_add(&smmu->list, &arm_smmu_devices);
1817 spin_unlock(&arm_smmu_devices_lock);
Will Deaconfd90cec2013-08-21 13:56:34 +01001818
1819 arm_smmu_device_reset(smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001820 return 0;
1821
1822out_free_irqs:
1823 while (i--)
1824 free_irq(smmu->irqs[i], smmu);
1825
Will Deacon45ae7cf2013-06-24 18:31:25 +01001826out_put_masters:
1827 for (node = rb_first(&smmu->masters); node; node = rb_next(node)) {
Mitchel Humpherys29073202014-07-08 09:52:18 -07001828 struct arm_smmu_master *master
1829 = container_of(node, struct arm_smmu_master, node);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001830 of_node_put(master->of_node);
1831 }
1832
1833 return err;
1834}
1835
1836static int arm_smmu_device_remove(struct platform_device *pdev)
1837{
1838 int i;
1839 struct device *dev = &pdev->dev;
1840 struct arm_smmu_device *curr, *smmu = NULL;
1841 struct rb_node *node;
1842
1843 spin_lock(&arm_smmu_devices_lock);
1844 list_for_each_entry(curr, &arm_smmu_devices, list) {
1845 if (curr->dev == dev) {
1846 smmu = curr;
1847 list_del(&smmu->list);
1848 break;
1849 }
1850 }
1851 spin_unlock(&arm_smmu_devices_lock);
1852
1853 if (!smmu)
1854 return -ENODEV;
1855
Will Deacon45ae7cf2013-06-24 18:31:25 +01001856 for (node = rb_first(&smmu->masters); node; node = rb_next(node)) {
Mitchel Humpherys29073202014-07-08 09:52:18 -07001857 struct arm_smmu_master *master
1858 = container_of(node, struct arm_smmu_master, node);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001859 of_node_put(master->of_node);
1860 }
1861
Will Deaconecfadb62013-07-31 19:21:28 +01001862 if (!bitmap_empty(smmu->context_map, ARM_SMMU_MAX_CBS))
Will Deacon45ae7cf2013-06-24 18:31:25 +01001863 dev_err(dev, "removing device with active domains!\n");
1864
1865 for (i = 0; i < smmu->num_global_irqs; ++i)
1866 free_irq(smmu->irqs[i], smmu);
1867
1868 /* Turn the thing off */
Mitchel Humpherys29073202014-07-08 09:52:18 -07001869 writel(sCR0_CLIENTPD, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001870 return 0;
1871}
1872
Will Deacon45ae7cf2013-06-24 18:31:25 +01001873static struct platform_driver arm_smmu_driver = {
1874 .driver = {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001875 .name = "arm-smmu",
1876 .of_match_table = of_match_ptr(arm_smmu_of_match),
1877 },
1878 .probe = arm_smmu_device_dt_probe,
1879 .remove = arm_smmu_device_remove,
1880};
1881
1882static int __init arm_smmu_init(void)
1883{
Thierry Reding0e7d37a2014-11-07 15:26:18 +00001884 struct device_node *np;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001885 int ret;
1886
Thierry Reding0e7d37a2014-11-07 15:26:18 +00001887 /*
1888 * Play nice with systems that don't have an ARM SMMU by checking that
1889 * an ARM SMMU exists in the system before proceeding with the driver
1890 * and IOMMU bus operation registration.
1891 */
1892 np = of_find_matching_node(NULL, arm_smmu_of_match);
1893 if (!np)
1894 return 0;
1895
1896 of_node_put(np);
1897
Will Deacon45ae7cf2013-06-24 18:31:25 +01001898 ret = platform_driver_register(&arm_smmu_driver);
1899 if (ret)
1900 return ret;
1901
1902 /* Oh, for a proper bus abstraction */
Dan Carpenter6614ee72013-08-21 09:34:20 +01001903 if (!iommu_present(&platform_bus_type))
Will Deacon45ae7cf2013-06-24 18:31:25 +01001904 bus_set_iommu(&platform_bus_type, &arm_smmu_ops);
1905
Will Deacond123cf82014-02-04 22:17:53 +00001906#ifdef CONFIG_ARM_AMBA
Dan Carpenter6614ee72013-08-21 09:34:20 +01001907 if (!iommu_present(&amba_bustype))
Will Deacon45ae7cf2013-06-24 18:31:25 +01001908 bus_set_iommu(&amba_bustype, &arm_smmu_ops);
Will Deacond123cf82014-02-04 22:17:53 +00001909#endif
Will Deacon45ae7cf2013-06-24 18:31:25 +01001910
Will Deacona9a1b0b2014-05-01 18:05:08 +01001911#ifdef CONFIG_PCI
1912 if (!iommu_present(&pci_bus_type))
1913 bus_set_iommu(&pci_bus_type, &arm_smmu_ops);
1914#endif
1915
Will Deacon45ae7cf2013-06-24 18:31:25 +01001916 return 0;
1917}
1918
1919static void __exit arm_smmu_exit(void)
1920{
1921 return platform_driver_unregister(&arm_smmu_driver);
1922}
1923
Andreas Herrmannb1950b22013-10-01 13:39:05 +01001924subsys_initcall(arm_smmu_init);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001925module_exit(arm_smmu_exit);
1926
1927MODULE_DESCRIPTION("IOMMU API for ARM architected SMMU implementations");
1928MODULE_AUTHOR("Will Deacon <will.deacon@arm.com>");
1929MODULE_LICENSE("GPL v2");