blob: d8bc20a0efb9841be34594f4122ad1907333227e [file] [log] [blame]
Will Deacon45ae7cf2013-06-24 18:31:25 +01001/*
2 * IOMMU API for ARM architected SMMU implementations.
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this program; if not, write to the Free Software
15 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
16 *
17 * Copyright (C) 2013 ARM Limited
18 *
19 * Author: Will Deacon <will.deacon@arm.com>
20 *
21 * This driver currently supports:
22 * - SMMUv1 and v2 implementations
23 * - Stream-matching and stream-indexing
24 * - v7/v8 long-descriptor format
25 * - Non-secure access to the SMMU
Will Deacon45ae7cf2013-06-24 18:31:25 +010026 * - Context fault reporting
27 */
28
29#define pr_fmt(fmt) "arm-smmu: " fmt
30
31#include <linux/delay.h>
Robin Murphy9adb9592016-01-26 18:06:36 +000032#include <linux/dma-iommu.h>
Will Deacon45ae7cf2013-06-24 18:31:25 +010033#include <linux/dma-mapping.h>
34#include <linux/err.h>
35#include <linux/interrupt.h>
36#include <linux/io.h>
37#include <linux/iommu.h>
Mitchel Humpherys859a7322014-10-29 21:13:40 +000038#include <linux/iopoll.h>
Will Deacon45ae7cf2013-06-24 18:31:25 +010039#include <linux/module.h>
40#include <linux/of.h>
Robin Murphybae2c2d2015-07-29 19:46:05 +010041#include <linux/of_address.h>
Will Deacona9a1b0b2014-05-01 18:05:08 +010042#include <linux/pci.h>
Will Deacon45ae7cf2013-06-24 18:31:25 +010043#include <linux/platform_device.h>
44#include <linux/slab.h>
45#include <linux/spinlock.h>
46
47#include <linux/amba/bus.h>
48
Will Deacon518f7132014-11-14 17:17:54 +000049#include "io-pgtable.h"
Will Deacon45ae7cf2013-06-24 18:31:25 +010050
51/* Maximum number of stream IDs assigned to a single device */
Andreas Herrmann636e97b2014-01-30 18:18:08 +000052#define MAX_MASTER_STREAMIDS MAX_PHANDLE_ARGS
Will Deacon45ae7cf2013-06-24 18:31:25 +010053
54/* Maximum number of context banks per SMMU */
55#define ARM_SMMU_MAX_CBS 128
56
57/* Maximum number of mapping groups per SMMU */
58#define ARM_SMMU_MAX_SMRS 128
59
Will Deacon45ae7cf2013-06-24 18:31:25 +010060/* SMMU global address space */
61#define ARM_SMMU_GR0(smmu) ((smmu)->base)
Will Deaconc757e852014-07-30 11:33:25 +010062#define ARM_SMMU_GR1(smmu) ((smmu)->base + (1 << (smmu)->pgshift))
Will Deacon45ae7cf2013-06-24 18:31:25 +010063
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +000064/*
65 * SMMU global address space with conditional offset to access secure
66 * aliases of non-secure registers (e.g. nsCR0: 0x400, nsGFSR: 0x448,
67 * nsGFSYNR0: 0x450)
68 */
69#define ARM_SMMU_GR0_NS(smmu) \
70 ((smmu)->base + \
71 ((smmu->options & ARM_SMMU_OPT_SECURE_CFG_ACCESS) \
72 ? 0x400 : 0))
73
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +010074#ifdef CONFIG_64BIT
75#define smmu_writeq writeq_relaxed
76#else
77#define smmu_writeq(reg64, addr) \
78 do { \
79 u64 __val = (reg64); \
80 void __iomem *__addr = (addr); \
81 writel_relaxed(__val >> 32, __addr + 4); \
82 writel_relaxed(__val, __addr); \
83 } while (0)
84#endif
85
Will Deacon45ae7cf2013-06-24 18:31:25 +010086/* Configuration registers */
87#define ARM_SMMU_GR0_sCR0 0x0
88#define sCR0_CLIENTPD (1 << 0)
89#define sCR0_GFRE (1 << 1)
90#define sCR0_GFIE (1 << 2)
91#define sCR0_GCFGFRE (1 << 4)
92#define sCR0_GCFGFIE (1 << 5)
93#define sCR0_USFCFG (1 << 10)
94#define sCR0_VMIDPNE (1 << 11)
95#define sCR0_PTM (1 << 12)
96#define sCR0_FB (1 << 13)
Tirumalesh Chalamarla4e3e9b62016-02-23 10:19:00 -080097#define sCR0_VMID16EN (1 << 31)
Will Deacon45ae7cf2013-06-24 18:31:25 +010098#define sCR0_BSU_SHIFT 14
99#define sCR0_BSU_MASK 0x3
100
101/* Identification registers */
102#define ARM_SMMU_GR0_ID0 0x20
103#define ARM_SMMU_GR0_ID1 0x24
104#define ARM_SMMU_GR0_ID2 0x28
105#define ARM_SMMU_GR0_ID3 0x2c
106#define ARM_SMMU_GR0_ID4 0x30
107#define ARM_SMMU_GR0_ID5 0x34
108#define ARM_SMMU_GR0_ID6 0x38
109#define ARM_SMMU_GR0_ID7 0x3c
110#define ARM_SMMU_GR0_sGFSR 0x48
111#define ARM_SMMU_GR0_sGFSYNR0 0x50
112#define ARM_SMMU_GR0_sGFSYNR1 0x54
113#define ARM_SMMU_GR0_sGFSYNR2 0x58
Will Deacon45ae7cf2013-06-24 18:31:25 +0100114
115#define ID0_S1TS (1 << 30)
116#define ID0_S2TS (1 << 29)
117#define ID0_NTS (1 << 28)
118#define ID0_SMS (1 << 27)
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000119#define ID0_ATOSNS (1 << 26)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100120#define ID0_CTTW (1 << 14)
121#define ID0_NUMIRPT_SHIFT 16
122#define ID0_NUMIRPT_MASK 0xff
Olav Haugan3c8766d2014-08-22 17:12:32 -0700123#define ID0_NUMSIDB_SHIFT 9
124#define ID0_NUMSIDB_MASK 0xf
Will Deacon45ae7cf2013-06-24 18:31:25 +0100125#define ID0_NUMSMRG_SHIFT 0
126#define ID0_NUMSMRG_MASK 0xff
127
128#define ID1_PAGESIZE (1 << 31)
129#define ID1_NUMPAGENDXB_SHIFT 28
130#define ID1_NUMPAGENDXB_MASK 7
131#define ID1_NUMS2CB_SHIFT 16
132#define ID1_NUMS2CB_MASK 0xff
133#define ID1_NUMCB_SHIFT 0
134#define ID1_NUMCB_MASK 0xff
135
136#define ID2_OAS_SHIFT 4
137#define ID2_OAS_MASK 0xf
138#define ID2_IAS_SHIFT 0
139#define ID2_IAS_MASK 0xf
140#define ID2_UBS_SHIFT 8
141#define ID2_UBS_MASK 0xf
142#define ID2_PTFS_4K (1 << 12)
143#define ID2_PTFS_16K (1 << 13)
144#define ID2_PTFS_64K (1 << 14)
Tirumalesh Chalamarla4e3e9b62016-02-23 10:19:00 -0800145#define ID2_VMID16 (1 << 15)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100146
Will Deacon45ae7cf2013-06-24 18:31:25 +0100147/* Global TLB invalidation */
Will Deacon45ae7cf2013-06-24 18:31:25 +0100148#define ARM_SMMU_GR0_TLBIVMID 0x64
149#define ARM_SMMU_GR0_TLBIALLNSNH 0x68
150#define ARM_SMMU_GR0_TLBIALLH 0x6c
151#define ARM_SMMU_GR0_sTLBGSYNC 0x70
152#define ARM_SMMU_GR0_sTLBGSTATUS 0x74
153#define sTLBGSTATUS_GSACTIVE (1 << 0)
154#define TLB_LOOP_TIMEOUT 1000000 /* 1s! */
155
156/* Stream mapping registers */
157#define ARM_SMMU_GR0_SMR(n) (0x800 + ((n) << 2))
158#define SMR_VALID (1 << 31)
159#define SMR_MASK_SHIFT 16
160#define SMR_MASK_MASK 0x7fff
161#define SMR_ID_SHIFT 0
162#define SMR_ID_MASK 0x7fff
163
164#define ARM_SMMU_GR0_S2CR(n) (0xc00 + ((n) << 2))
165#define S2CR_CBNDX_SHIFT 0
166#define S2CR_CBNDX_MASK 0xff
167#define S2CR_TYPE_SHIFT 16
168#define S2CR_TYPE_MASK 0x3
169#define S2CR_TYPE_TRANS (0 << S2CR_TYPE_SHIFT)
170#define S2CR_TYPE_BYPASS (1 << S2CR_TYPE_SHIFT)
171#define S2CR_TYPE_FAULT (2 << S2CR_TYPE_SHIFT)
172
Robin Murphyd3461802016-01-26 18:06:34 +0000173#define S2CR_PRIVCFG_SHIFT 24
174#define S2CR_PRIVCFG_UNPRIV (2 << S2CR_PRIVCFG_SHIFT)
175
Will Deacon45ae7cf2013-06-24 18:31:25 +0100176/* Context bank attribute registers */
177#define ARM_SMMU_GR1_CBAR(n) (0x0 + ((n) << 2))
178#define CBAR_VMID_SHIFT 0
179#define CBAR_VMID_MASK 0xff
Will Deacon57ca90f2014-02-06 14:59:05 +0000180#define CBAR_S1_BPSHCFG_SHIFT 8
181#define CBAR_S1_BPSHCFG_MASK 3
182#define CBAR_S1_BPSHCFG_NSH 3
Will Deacon45ae7cf2013-06-24 18:31:25 +0100183#define CBAR_S1_MEMATTR_SHIFT 12
184#define CBAR_S1_MEMATTR_MASK 0xf
185#define CBAR_S1_MEMATTR_WB 0xf
186#define CBAR_TYPE_SHIFT 16
187#define CBAR_TYPE_MASK 0x3
188#define CBAR_TYPE_S2_TRANS (0 << CBAR_TYPE_SHIFT)
189#define CBAR_TYPE_S1_TRANS_S2_BYPASS (1 << CBAR_TYPE_SHIFT)
190#define CBAR_TYPE_S1_TRANS_S2_FAULT (2 << CBAR_TYPE_SHIFT)
191#define CBAR_TYPE_S1_TRANS_S2_TRANS (3 << CBAR_TYPE_SHIFT)
192#define CBAR_IRPTNDX_SHIFT 24
193#define CBAR_IRPTNDX_MASK 0xff
194
195#define ARM_SMMU_GR1_CBA2R(n) (0x800 + ((n) << 2))
196#define CBA2R_RW64_32BIT (0 << 0)
197#define CBA2R_RW64_64BIT (1 << 0)
Tirumalesh Chalamarla4e3e9b62016-02-23 10:19:00 -0800198#define CBA2R_VMID_SHIFT 16
199#define CBA2R_VMID_MASK 0xffff
Will Deacon45ae7cf2013-06-24 18:31:25 +0100200
201/* Translation context bank */
202#define ARM_SMMU_CB_BASE(smmu) ((smmu)->base + ((smmu)->size >> 1))
Will Deaconc757e852014-07-30 11:33:25 +0100203#define ARM_SMMU_CB(smmu, n) ((n) * (1 << (smmu)->pgshift))
Will Deacon45ae7cf2013-06-24 18:31:25 +0100204
205#define ARM_SMMU_CB_SCTLR 0x0
206#define ARM_SMMU_CB_RESUME 0x8
207#define ARM_SMMU_CB_TTBCR2 0x10
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100208#define ARM_SMMU_CB_TTBR0 0x20
209#define ARM_SMMU_CB_TTBR1 0x28
Will Deacon45ae7cf2013-06-24 18:31:25 +0100210#define ARM_SMMU_CB_TTBCR 0x30
211#define ARM_SMMU_CB_S1_MAIR0 0x38
Will Deacon518f7132014-11-14 17:17:54 +0000212#define ARM_SMMU_CB_S1_MAIR1 0x3c
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000213#define ARM_SMMU_CB_PAR_LO 0x50
214#define ARM_SMMU_CB_PAR_HI 0x54
Will Deacon45ae7cf2013-06-24 18:31:25 +0100215#define ARM_SMMU_CB_FSR 0x58
216#define ARM_SMMU_CB_FAR_LO 0x60
217#define ARM_SMMU_CB_FAR_HI 0x64
218#define ARM_SMMU_CB_FSYNR0 0x68
Will Deacon518f7132014-11-14 17:17:54 +0000219#define ARM_SMMU_CB_S1_TLBIVA 0x600
Will Deacon1463fe42013-07-31 19:21:27 +0100220#define ARM_SMMU_CB_S1_TLBIASID 0x610
Will Deacon518f7132014-11-14 17:17:54 +0000221#define ARM_SMMU_CB_S1_TLBIVAL 0x620
222#define ARM_SMMU_CB_S2_TLBIIPAS2 0x630
223#define ARM_SMMU_CB_S2_TLBIIPAS2L 0x638
Robin Murphy661d9622015-05-27 17:09:34 +0100224#define ARM_SMMU_CB_ATS1PR 0x800
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000225#define ARM_SMMU_CB_ATSR 0x8f0
Will Deacon45ae7cf2013-06-24 18:31:25 +0100226
227#define SCTLR_S1_ASIDPNE (1 << 12)
228#define SCTLR_CFCFG (1 << 7)
229#define SCTLR_CFIE (1 << 6)
230#define SCTLR_CFRE (1 << 5)
231#define SCTLR_E (1 << 4)
232#define SCTLR_AFE (1 << 2)
233#define SCTLR_TRE (1 << 1)
234#define SCTLR_M (1 << 0)
235#define SCTLR_EAE_SBOP (SCTLR_AFE | SCTLR_TRE)
236
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000237#define CB_PAR_F (1 << 0)
238
239#define ATSR_ACTIVE (1 << 0)
240
Will Deacon45ae7cf2013-06-24 18:31:25 +0100241#define RESUME_RETRY (0 << 0)
242#define RESUME_TERMINATE (1 << 0)
243
Will Deacon45ae7cf2013-06-24 18:31:25 +0100244#define TTBCR2_SEP_SHIFT 15
Will Deacon5dc56162015-05-08 17:44:22 +0100245#define TTBCR2_SEP_UPSTREAM (0x7 << TTBCR2_SEP_SHIFT)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100246
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100247#define TTBRn_ASID_SHIFT 48
Will Deacon45ae7cf2013-06-24 18:31:25 +0100248
249#define FSR_MULTI (1 << 31)
250#define FSR_SS (1 << 30)
251#define FSR_UUT (1 << 8)
252#define FSR_ASF (1 << 7)
253#define FSR_TLBLKF (1 << 6)
254#define FSR_TLBMCF (1 << 5)
255#define FSR_EF (1 << 4)
256#define FSR_PF (1 << 3)
257#define FSR_AFF (1 << 2)
258#define FSR_TF (1 << 1)
259
Mitchel Humpherys29073202014-07-08 09:52:18 -0700260#define FSR_IGN (FSR_AFF | FSR_ASF | \
261 FSR_TLBMCF | FSR_TLBLKF)
262#define FSR_FAULT (FSR_MULTI | FSR_SS | FSR_UUT | \
Will Deaconadaba322013-07-31 19:21:26 +0100263 FSR_EF | FSR_PF | FSR_TF | FSR_IGN)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100264
265#define FSYNR0_WNR (1 << 4)
266
Will Deacon4cf740b2014-07-14 19:47:39 +0100267static int force_stage;
Robin Murphy25a1c962016-02-10 14:25:33 +0000268module_param(force_stage, int, S_IRUGO);
Will Deacon4cf740b2014-07-14 19:47:39 +0100269MODULE_PARM_DESC(force_stage,
270 "Force SMMU mappings to be installed at a particular stage of translation. A value of '1' or '2' forces the corresponding stage. All other values are ignored (i.e. no stage is forced). Note that selecting a specific stage will disable support for nested translation.");
Robin Murphy25a1c962016-02-10 14:25:33 +0000271static bool disable_bypass;
272module_param(disable_bypass, bool, S_IRUGO);
273MODULE_PARM_DESC(disable_bypass,
274 "Disable bypass streams such that incoming transactions from devices that are not attached to an iommu domain will report an abort back to the device and will not be allowed to pass through the SMMU.");
Will Deacon4cf740b2014-07-14 19:47:39 +0100275
Robin Murphy09360402014-08-28 17:51:59 +0100276enum arm_smmu_arch_version {
277 ARM_SMMU_V1 = 1,
278 ARM_SMMU_V2,
279};
280
Robin Murphy67b65a32016-04-13 18:12:57 +0100281enum arm_smmu_implementation {
282 GENERIC_SMMU,
Robin Murphye086d912016-04-13 18:12:58 +0100283 CAVIUM_SMMUV2,
Robin Murphy67b65a32016-04-13 18:12:57 +0100284};
285
Will Deacon45ae7cf2013-06-24 18:31:25 +0100286struct arm_smmu_smr {
287 u8 idx;
288 u16 mask;
289 u16 id;
290};
291
Will Deacona9a1b0b2014-05-01 18:05:08 +0100292struct arm_smmu_master_cfg {
Will Deacon45ae7cf2013-06-24 18:31:25 +0100293 int num_streamids;
294 u16 streamids[MAX_MASTER_STREAMIDS];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100295 struct arm_smmu_smr *smrs;
296};
297
Will Deacona9a1b0b2014-05-01 18:05:08 +0100298struct arm_smmu_master {
299 struct device_node *of_node;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100300 struct rb_node node;
301 struct arm_smmu_master_cfg cfg;
302};
303
Will Deacon45ae7cf2013-06-24 18:31:25 +0100304struct arm_smmu_device {
305 struct device *dev;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100306
307 void __iomem *base;
308 unsigned long size;
Will Deaconc757e852014-07-30 11:33:25 +0100309 unsigned long pgshift;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100310
311#define ARM_SMMU_FEAT_COHERENT_WALK (1 << 0)
312#define ARM_SMMU_FEAT_STREAM_MATCH (1 << 1)
313#define ARM_SMMU_FEAT_TRANS_S1 (1 << 2)
314#define ARM_SMMU_FEAT_TRANS_S2 (1 << 3)
315#define ARM_SMMU_FEAT_TRANS_NESTED (1 << 4)
Mitchel Humpherys859a7322014-10-29 21:13:40 +0000316#define ARM_SMMU_FEAT_TRANS_OPS (1 << 5)
Tirumalesh Chalamarla4e3e9b62016-02-23 10:19:00 -0800317#define ARM_SMMU_FEAT_VMID16 (1 << 6)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100318 u32 features;
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000319
320#define ARM_SMMU_OPT_SECURE_CFG_ACCESS (1 << 0)
321 u32 options;
Robin Murphy09360402014-08-28 17:51:59 +0100322 enum arm_smmu_arch_version version;
Robin Murphy67b65a32016-04-13 18:12:57 +0100323 enum arm_smmu_implementation model;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100324
325 u32 num_context_banks;
326 u32 num_s2_context_banks;
327 DECLARE_BITMAP(context_map, ARM_SMMU_MAX_CBS);
328 atomic_t irptndx;
329
330 u32 num_mapping_groups;
331 DECLARE_BITMAP(smr_map, ARM_SMMU_MAX_SMRS);
332
Will Deacon518f7132014-11-14 17:17:54 +0000333 unsigned long va_size;
334 unsigned long ipa_size;
335 unsigned long pa_size;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100336
337 u32 num_global_irqs;
338 u32 num_context_irqs;
339 unsigned int *irqs;
340
Will Deacon45ae7cf2013-06-24 18:31:25 +0100341 struct list_head list;
342 struct rb_root masters;
Tirumalesh Chalamarla1bd37a62016-03-04 13:56:09 -0800343
344 u32 cavium_id_base; /* Specific to Cavium */
Will Deacon45ae7cf2013-06-24 18:31:25 +0100345};
346
347struct arm_smmu_cfg {
Will Deacon45ae7cf2013-06-24 18:31:25 +0100348 u8 cbndx;
349 u8 irptndx;
350 u32 cbar;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100351};
Dan Carpenterfaea13b72013-08-21 09:33:30 +0100352#define INVALID_IRPTNDX 0xff
Will Deacon45ae7cf2013-06-24 18:31:25 +0100353
Tirumalesh Chalamarla1bd37a62016-03-04 13:56:09 -0800354#define ARM_SMMU_CB_ASID(smmu, cfg) ((u16)(smmu)->cavium_id_base + (cfg)->cbndx)
355#define ARM_SMMU_CB_VMID(smmu, cfg) ((u16)(smmu)->cavium_id_base + (cfg)->cbndx + 1)
Will Deaconecfadb62013-07-31 19:21:28 +0100356
Will Deaconc752ce42014-06-25 22:46:31 +0100357enum arm_smmu_domain_stage {
358 ARM_SMMU_DOMAIN_S1 = 0,
359 ARM_SMMU_DOMAIN_S2,
360 ARM_SMMU_DOMAIN_NESTED,
361};
362
Will Deacon45ae7cf2013-06-24 18:31:25 +0100363struct arm_smmu_domain {
Will Deacon44680ee2014-06-25 11:29:12 +0100364 struct arm_smmu_device *smmu;
Will Deacon518f7132014-11-14 17:17:54 +0000365 struct io_pgtable_ops *pgtbl_ops;
366 spinlock_t pgtbl_lock;
Will Deacon44680ee2014-06-25 11:29:12 +0100367 struct arm_smmu_cfg cfg;
Will Deaconc752ce42014-06-25 22:46:31 +0100368 enum arm_smmu_domain_stage stage;
Will Deacon518f7132014-11-14 17:17:54 +0000369 struct mutex init_mutex; /* Protects smmu pointer */
Joerg Roedel1d672632015-03-26 13:43:10 +0100370 struct iommu_domain domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100371};
372
Will Deacon518f7132014-11-14 17:17:54 +0000373static struct iommu_ops arm_smmu_ops;
374
Will Deacon45ae7cf2013-06-24 18:31:25 +0100375static DEFINE_SPINLOCK(arm_smmu_devices_lock);
376static LIST_HEAD(arm_smmu_devices);
377
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000378struct arm_smmu_option_prop {
379 u32 opt;
380 const char *prop;
381};
382
Tirumalesh Chalamarla1bd37a62016-03-04 13:56:09 -0800383static atomic_t cavium_smmu_context_count = ATOMIC_INIT(0);
384
Mitchel Humpherys29073202014-07-08 09:52:18 -0700385static struct arm_smmu_option_prop arm_smmu_options[] = {
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000386 { ARM_SMMU_OPT_SECURE_CFG_ACCESS, "calxeda,smmu-secure-config-access" },
387 { 0, NULL},
388};
389
Joerg Roedel1d672632015-03-26 13:43:10 +0100390static struct arm_smmu_domain *to_smmu_domain(struct iommu_domain *dom)
391{
392 return container_of(dom, struct arm_smmu_domain, domain);
393}
394
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000395static void parse_driver_options(struct arm_smmu_device *smmu)
396{
397 int i = 0;
Mitchel Humpherys29073202014-07-08 09:52:18 -0700398
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000399 do {
400 if (of_property_read_bool(smmu->dev->of_node,
401 arm_smmu_options[i].prop)) {
402 smmu->options |= arm_smmu_options[i].opt;
403 dev_notice(smmu->dev, "option %s\n",
404 arm_smmu_options[i].prop);
405 }
406 } while (arm_smmu_options[++i].opt);
407}
408
Will Deacon8f68f8e2014-07-15 11:27:08 +0100409static struct device_node *dev_get_dev_node(struct device *dev)
Will Deacona9a1b0b2014-05-01 18:05:08 +0100410{
411 if (dev_is_pci(dev)) {
412 struct pci_bus *bus = to_pci_dev(dev)->bus;
Mitchel Humpherys29073202014-07-08 09:52:18 -0700413
Will Deacona9a1b0b2014-05-01 18:05:08 +0100414 while (!pci_is_root_bus(bus))
415 bus = bus->parent;
Will Deacon8f68f8e2014-07-15 11:27:08 +0100416 return bus->bridge->parent->of_node;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100417 }
418
Will Deacon8f68f8e2014-07-15 11:27:08 +0100419 return dev->of_node;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100420}
421
Will Deacon45ae7cf2013-06-24 18:31:25 +0100422static struct arm_smmu_master *find_smmu_master(struct arm_smmu_device *smmu,
423 struct device_node *dev_node)
424{
425 struct rb_node *node = smmu->masters.rb_node;
426
427 while (node) {
428 struct arm_smmu_master *master;
Mitchel Humpherys29073202014-07-08 09:52:18 -0700429
Will Deacon45ae7cf2013-06-24 18:31:25 +0100430 master = container_of(node, struct arm_smmu_master, node);
431
432 if (dev_node < master->of_node)
433 node = node->rb_left;
434 else if (dev_node > master->of_node)
435 node = node->rb_right;
436 else
437 return master;
438 }
439
440 return NULL;
441}
442
Will Deacona9a1b0b2014-05-01 18:05:08 +0100443static struct arm_smmu_master_cfg *
Will Deacon8f68f8e2014-07-15 11:27:08 +0100444find_smmu_master_cfg(struct device *dev)
Will Deacona9a1b0b2014-05-01 18:05:08 +0100445{
Will Deacon8f68f8e2014-07-15 11:27:08 +0100446 struct arm_smmu_master_cfg *cfg = NULL;
447 struct iommu_group *group = iommu_group_get(dev);
Will Deacona9a1b0b2014-05-01 18:05:08 +0100448
Will Deacon8f68f8e2014-07-15 11:27:08 +0100449 if (group) {
450 cfg = iommu_group_get_iommudata(group);
451 iommu_group_put(group);
452 }
Will Deacona9a1b0b2014-05-01 18:05:08 +0100453
Will Deacon8f68f8e2014-07-15 11:27:08 +0100454 return cfg;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100455}
456
Will Deacon45ae7cf2013-06-24 18:31:25 +0100457static int insert_smmu_master(struct arm_smmu_device *smmu,
458 struct arm_smmu_master *master)
459{
460 struct rb_node **new, *parent;
461
462 new = &smmu->masters.rb_node;
463 parent = NULL;
464 while (*new) {
Mitchel Humpherys29073202014-07-08 09:52:18 -0700465 struct arm_smmu_master *this
466 = container_of(*new, struct arm_smmu_master, node);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100467
468 parent = *new;
469 if (master->of_node < this->of_node)
470 new = &((*new)->rb_left);
471 else if (master->of_node > this->of_node)
472 new = &((*new)->rb_right);
473 else
474 return -EEXIST;
475 }
476
477 rb_link_node(&master->node, parent, new);
478 rb_insert_color(&master->node, &smmu->masters);
479 return 0;
480}
481
482static int register_smmu_master(struct arm_smmu_device *smmu,
483 struct device *dev,
484 struct of_phandle_args *masterspec)
485{
486 int i;
487 struct arm_smmu_master *master;
488
489 master = find_smmu_master(smmu, masterspec->np);
490 if (master) {
491 dev_err(dev,
492 "rejecting multiple registrations for master device %s\n",
493 masterspec->np->name);
494 return -EBUSY;
495 }
496
497 if (masterspec->args_count > MAX_MASTER_STREAMIDS) {
498 dev_err(dev,
499 "reached maximum number (%d) of stream IDs for master device %s\n",
500 MAX_MASTER_STREAMIDS, masterspec->np->name);
501 return -ENOSPC;
502 }
503
504 master = devm_kzalloc(dev, sizeof(*master), GFP_KERNEL);
505 if (!master)
506 return -ENOMEM;
507
Will Deacona9a1b0b2014-05-01 18:05:08 +0100508 master->of_node = masterspec->np;
509 master->cfg.num_streamids = masterspec->args_count;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100510
Olav Haugan3c8766d2014-08-22 17:12:32 -0700511 for (i = 0; i < master->cfg.num_streamids; ++i) {
512 u16 streamid = masterspec->args[i];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100513
Olav Haugan3c8766d2014-08-22 17:12:32 -0700514 if (!(smmu->features & ARM_SMMU_FEAT_STREAM_MATCH) &&
515 (streamid >= smmu->num_mapping_groups)) {
516 dev_err(dev,
517 "stream ID for master device %s greater than maximum allowed (%d)\n",
518 masterspec->np->name, smmu->num_mapping_groups);
519 return -ERANGE;
520 }
521 master->cfg.streamids[i] = streamid;
522 }
Will Deacon45ae7cf2013-06-24 18:31:25 +0100523 return insert_smmu_master(smmu, master);
524}
525
Will Deacon44680ee2014-06-25 11:29:12 +0100526static struct arm_smmu_device *find_smmu_for_device(struct device *dev)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100527{
Will Deacon44680ee2014-06-25 11:29:12 +0100528 struct arm_smmu_device *smmu;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100529 struct arm_smmu_master *master = NULL;
Will Deacon8f68f8e2014-07-15 11:27:08 +0100530 struct device_node *dev_node = dev_get_dev_node(dev);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100531
532 spin_lock(&arm_smmu_devices_lock);
Will Deacon44680ee2014-06-25 11:29:12 +0100533 list_for_each_entry(smmu, &arm_smmu_devices, list) {
Will Deacona9a1b0b2014-05-01 18:05:08 +0100534 master = find_smmu_master(smmu, dev_node);
535 if (master)
536 break;
537 }
Will Deacon45ae7cf2013-06-24 18:31:25 +0100538 spin_unlock(&arm_smmu_devices_lock);
Will Deacon44680ee2014-06-25 11:29:12 +0100539
Will Deacona9a1b0b2014-05-01 18:05:08 +0100540 return master ? smmu : NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100541}
542
543static int __arm_smmu_alloc_bitmap(unsigned long *map, int start, int end)
544{
545 int idx;
546
547 do {
548 idx = find_next_zero_bit(map, end, start);
549 if (idx == end)
550 return -ENOSPC;
551 } while (test_and_set_bit(idx, map));
552
553 return idx;
554}
555
556static void __arm_smmu_free_bitmap(unsigned long *map, int idx)
557{
558 clear_bit(idx, map);
559}
560
561/* Wait for any pending TLB invalidations to complete */
Will Deacon518f7132014-11-14 17:17:54 +0000562static void __arm_smmu_tlb_sync(struct arm_smmu_device *smmu)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100563{
564 int count = 0;
565 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
566
567 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_sTLBGSYNC);
568 while (readl_relaxed(gr0_base + ARM_SMMU_GR0_sTLBGSTATUS)
569 & sTLBGSTATUS_GSACTIVE) {
570 cpu_relax();
571 if (++count == TLB_LOOP_TIMEOUT) {
572 dev_err_ratelimited(smmu->dev,
573 "TLB sync timed out -- SMMU may be deadlocked\n");
574 return;
575 }
576 udelay(1);
577 }
578}
579
Will Deacon518f7132014-11-14 17:17:54 +0000580static void arm_smmu_tlb_sync(void *cookie)
Will Deacon1463fe42013-07-31 19:21:27 +0100581{
Will Deacon518f7132014-11-14 17:17:54 +0000582 struct arm_smmu_domain *smmu_domain = cookie;
583 __arm_smmu_tlb_sync(smmu_domain->smmu);
584}
585
586static void arm_smmu_tlb_inv_context(void *cookie)
587{
588 struct arm_smmu_domain *smmu_domain = cookie;
Will Deacon44680ee2014-06-25 11:29:12 +0100589 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
590 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon1463fe42013-07-31 19:21:27 +0100591 bool stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
Will Deacon518f7132014-11-14 17:17:54 +0000592 void __iomem *base;
Will Deacon1463fe42013-07-31 19:21:27 +0100593
594 if (stage1) {
595 base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Tirumalesh Chalamarla1bd37a62016-03-04 13:56:09 -0800596 writel_relaxed(ARM_SMMU_CB_ASID(smmu, cfg),
Will Deaconecfadb62013-07-31 19:21:28 +0100597 base + ARM_SMMU_CB_S1_TLBIASID);
Will Deacon1463fe42013-07-31 19:21:27 +0100598 } else {
599 base = ARM_SMMU_GR0(smmu);
Tirumalesh Chalamarla1bd37a62016-03-04 13:56:09 -0800600 writel_relaxed(ARM_SMMU_CB_VMID(smmu, cfg),
Will Deaconecfadb62013-07-31 19:21:28 +0100601 base + ARM_SMMU_GR0_TLBIVMID);
Will Deacon1463fe42013-07-31 19:21:27 +0100602 }
603
Will Deacon518f7132014-11-14 17:17:54 +0000604 __arm_smmu_tlb_sync(smmu);
Will Deacon1463fe42013-07-31 19:21:27 +0100605}
606
Will Deacon518f7132014-11-14 17:17:54 +0000607static void arm_smmu_tlb_inv_range_nosync(unsigned long iova, size_t size,
Robin Murphy06c610e2015-12-07 18:18:53 +0000608 size_t granule, bool leaf, void *cookie)
Will Deacon518f7132014-11-14 17:17:54 +0000609{
610 struct arm_smmu_domain *smmu_domain = cookie;
611 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
612 struct arm_smmu_device *smmu = smmu_domain->smmu;
613 bool stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
614 void __iomem *reg;
615
616 if (stage1) {
617 reg = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
618 reg += leaf ? ARM_SMMU_CB_S1_TLBIVAL : ARM_SMMU_CB_S1_TLBIVA;
619
620 if (!IS_ENABLED(CONFIG_64BIT) || smmu->version == ARM_SMMU_V1) {
621 iova &= ~12UL;
Tirumalesh Chalamarla1bd37a62016-03-04 13:56:09 -0800622 iova |= ARM_SMMU_CB_ASID(smmu, cfg);
Robin Murphy75df1382015-12-07 18:18:52 +0000623 do {
624 writel_relaxed(iova, reg);
625 iova += granule;
626 } while (size -= granule);
Will Deacon518f7132014-11-14 17:17:54 +0000627#ifdef CONFIG_64BIT
628 } else {
629 iova >>= 12;
Tirumalesh Chalamarla1bd37a62016-03-04 13:56:09 -0800630 iova |= (u64)ARM_SMMU_CB_ASID(smmu, cfg) << 48;
Robin Murphy75df1382015-12-07 18:18:52 +0000631 do {
632 writeq_relaxed(iova, reg);
633 iova += granule >> 12;
634 } while (size -= granule);
Will Deacon518f7132014-11-14 17:17:54 +0000635#endif
636 }
637#ifdef CONFIG_64BIT
638 } else if (smmu->version == ARM_SMMU_V2) {
639 reg = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
640 reg += leaf ? ARM_SMMU_CB_S2_TLBIIPAS2L :
641 ARM_SMMU_CB_S2_TLBIIPAS2;
Robin Murphy75df1382015-12-07 18:18:52 +0000642 iova >>= 12;
643 do {
644 writeq_relaxed(iova, reg);
645 iova += granule >> 12;
646 } while (size -= granule);
Will Deacon518f7132014-11-14 17:17:54 +0000647#endif
648 } else {
649 reg = ARM_SMMU_GR0(smmu) + ARM_SMMU_GR0_TLBIVMID;
Tirumalesh Chalamarla1bd37a62016-03-04 13:56:09 -0800650 writel_relaxed(ARM_SMMU_CB_VMID(smmu, cfg), reg);
Will Deacon518f7132014-11-14 17:17:54 +0000651 }
652}
653
Will Deacon518f7132014-11-14 17:17:54 +0000654static struct iommu_gather_ops arm_smmu_gather_ops = {
655 .tlb_flush_all = arm_smmu_tlb_inv_context,
656 .tlb_add_flush = arm_smmu_tlb_inv_range_nosync,
657 .tlb_sync = arm_smmu_tlb_sync,
Will Deacon518f7132014-11-14 17:17:54 +0000658};
659
Will Deacon45ae7cf2013-06-24 18:31:25 +0100660static irqreturn_t arm_smmu_context_fault(int irq, void *dev)
661{
662 int flags, ret;
663 u32 fsr, far, fsynr, resume;
664 unsigned long iova;
665 struct iommu_domain *domain = dev;
Joerg Roedel1d672632015-03-26 13:43:10 +0100666 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon44680ee2014-06-25 11:29:12 +0100667 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
668 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100669 void __iomem *cb_base;
670
Will Deacon44680ee2014-06-25 11:29:12 +0100671 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100672 fsr = readl_relaxed(cb_base + ARM_SMMU_CB_FSR);
673
674 if (!(fsr & FSR_FAULT))
675 return IRQ_NONE;
676
677 if (fsr & FSR_IGN)
678 dev_err_ratelimited(smmu->dev,
Hans Wennborg70c9a7d2014-08-06 05:42:01 +0100679 "Unexpected context fault (fsr 0x%x)\n",
Will Deacon45ae7cf2013-06-24 18:31:25 +0100680 fsr);
681
682 fsynr = readl_relaxed(cb_base + ARM_SMMU_CB_FSYNR0);
683 flags = fsynr & FSYNR0_WNR ? IOMMU_FAULT_WRITE : IOMMU_FAULT_READ;
684
685 far = readl_relaxed(cb_base + ARM_SMMU_CB_FAR_LO);
686 iova = far;
687#ifdef CONFIG_64BIT
688 far = readl_relaxed(cb_base + ARM_SMMU_CB_FAR_HI);
689 iova |= ((unsigned long)far << 32);
690#endif
691
692 if (!report_iommu_fault(domain, smmu->dev, iova, flags)) {
693 ret = IRQ_HANDLED;
694 resume = RESUME_RETRY;
695 } else {
Andreas Herrmann2ef0f032013-10-01 13:39:08 +0100696 dev_err_ratelimited(smmu->dev,
697 "Unhandled context fault: iova=0x%08lx, fsynr=0x%x, cb=%d\n",
Will Deacon44680ee2014-06-25 11:29:12 +0100698 iova, fsynr, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100699 ret = IRQ_NONE;
700 resume = RESUME_TERMINATE;
701 }
702
703 /* Clear the faulting FSR */
704 writel(fsr, cb_base + ARM_SMMU_CB_FSR);
705
706 /* Retry or terminate any stalled transactions */
707 if (fsr & FSR_SS)
708 writel_relaxed(resume, cb_base + ARM_SMMU_CB_RESUME);
709
710 return ret;
711}
712
713static irqreturn_t arm_smmu_global_fault(int irq, void *dev)
714{
715 u32 gfsr, gfsynr0, gfsynr1, gfsynr2;
716 struct arm_smmu_device *smmu = dev;
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000717 void __iomem *gr0_base = ARM_SMMU_GR0_NS(smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100718
719 gfsr = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSR);
720 gfsynr0 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR0);
721 gfsynr1 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR1);
722 gfsynr2 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR2);
723
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000724 if (!gfsr)
725 return IRQ_NONE;
726
Will Deacon45ae7cf2013-06-24 18:31:25 +0100727 dev_err_ratelimited(smmu->dev,
728 "Unexpected global fault, this could be serious\n");
729 dev_err_ratelimited(smmu->dev,
730 "\tGFSR 0x%08x, GFSYNR0 0x%08x, GFSYNR1 0x%08x, GFSYNR2 0x%08x\n",
731 gfsr, gfsynr0, gfsynr1, gfsynr2);
732
733 writel(gfsr, gr0_base + ARM_SMMU_GR0_sGFSR);
Will Deaconadaba322013-07-31 19:21:26 +0100734 return IRQ_HANDLED;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100735}
736
Will Deacon518f7132014-11-14 17:17:54 +0000737static void arm_smmu_init_context_bank(struct arm_smmu_domain *smmu_domain,
738 struct io_pgtable_cfg *pgtbl_cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100739{
740 u32 reg;
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100741 u64 reg64;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100742 bool stage1;
Will Deacon44680ee2014-06-25 11:29:12 +0100743 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
744 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deaconc88ae5d2015-10-13 17:53:24 +0100745 void __iomem *cb_base, *gr1_base;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100746
Will Deacon45ae7cf2013-06-24 18:31:25 +0100747 gr1_base = ARM_SMMU_GR1(smmu);
Will Deacon44680ee2014-06-25 11:29:12 +0100748 stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
749 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100750
Will Deacon4a1c93c2015-03-04 12:21:03 +0000751 if (smmu->version > ARM_SMMU_V1) {
Will Deacon4a1c93c2015-03-04 12:21:03 +0000752#ifdef CONFIG_64BIT
753 reg = CBA2R_RW64_64BIT;
754#else
755 reg = CBA2R_RW64_32BIT;
756#endif
Tirumalesh Chalamarla4e3e9b62016-02-23 10:19:00 -0800757 /* 16-bit VMIDs live in CBA2R */
758 if (smmu->features & ARM_SMMU_FEAT_VMID16)
Tirumalesh Chalamarla1bd37a62016-03-04 13:56:09 -0800759 reg |= ARM_SMMU_CB_VMID(smmu, cfg) << CBA2R_VMID_SHIFT;
Tirumalesh Chalamarla4e3e9b62016-02-23 10:19:00 -0800760
Will Deacon4a1c93c2015-03-04 12:21:03 +0000761 writel_relaxed(reg, gr1_base + ARM_SMMU_GR1_CBA2R(cfg->cbndx));
762 }
763
Will Deacon45ae7cf2013-06-24 18:31:25 +0100764 /* CBAR */
Will Deacon44680ee2014-06-25 11:29:12 +0100765 reg = cfg->cbar;
Robin Murphy09360402014-08-28 17:51:59 +0100766 if (smmu->version == ARM_SMMU_V1)
Mitchel Humpherys29073202014-07-08 09:52:18 -0700767 reg |= cfg->irptndx << CBAR_IRPTNDX_SHIFT;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100768
Will Deacon57ca90f2014-02-06 14:59:05 +0000769 /*
770 * Use the weakest shareability/memory types, so they are
771 * overridden by the ttbcr/pte.
772 */
773 if (stage1) {
774 reg |= (CBAR_S1_BPSHCFG_NSH << CBAR_S1_BPSHCFG_SHIFT) |
775 (CBAR_S1_MEMATTR_WB << CBAR_S1_MEMATTR_SHIFT);
Tirumalesh Chalamarla4e3e9b62016-02-23 10:19:00 -0800776 } else if (!(smmu->features & ARM_SMMU_FEAT_VMID16)) {
777 /* 8-bit VMIDs live in CBAR */
Tirumalesh Chalamarla1bd37a62016-03-04 13:56:09 -0800778 reg |= ARM_SMMU_CB_VMID(smmu, cfg) << CBAR_VMID_SHIFT;
Will Deacon57ca90f2014-02-06 14:59:05 +0000779 }
Will Deacon44680ee2014-06-25 11:29:12 +0100780 writel_relaxed(reg, gr1_base + ARM_SMMU_GR1_CBAR(cfg->cbndx));
Will Deacon45ae7cf2013-06-24 18:31:25 +0100781
Will Deacon518f7132014-11-14 17:17:54 +0000782 /* TTBRs */
783 if (stage1) {
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100784 reg64 = pgtbl_cfg->arm_lpae_s1_cfg.ttbr[0];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100785
Tirumalesh Chalamarla1bd37a62016-03-04 13:56:09 -0800786 reg64 |= ((u64)ARM_SMMU_CB_ASID(smmu, cfg)) << TTBRn_ASID_SHIFT;
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100787 smmu_writeq(reg64, cb_base + ARM_SMMU_CB_TTBR0);
788
789 reg64 = pgtbl_cfg->arm_lpae_s1_cfg.ttbr[1];
Tirumalesh Chalamarla1bd37a62016-03-04 13:56:09 -0800790 reg64 |= ((u64)ARM_SMMU_CB_ASID(smmu, cfg)) << TTBRn_ASID_SHIFT;
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100791 smmu_writeq(reg64, cb_base + ARM_SMMU_CB_TTBR1);
Will Deacon518f7132014-11-14 17:17:54 +0000792 } else {
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +0100793 reg64 = pgtbl_cfg->arm_lpae_s2_cfg.vttbr;
794 smmu_writeq(reg64, cb_base + ARM_SMMU_CB_TTBR0);
Will Deacon518f7132014-11-14 17:17:54 +0000795 }
Will Deacon45ae7cf2013-06-24 18:31:25 +0100796
Will Deacon518f7132014-11-14 17:17:54 +0000797 /* TTBCR */
798 if (stage1) {
799 reg = pgtbl_cfg->arm_lpae_s1_cfg.tcr;
800 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR);
801 if (smmu->version > ARM_SMMU_V1) {
802 reg = pgtbl_cfg->arm_lpae_s1_cfg.tcr >> 32;
Will Deacon5dc56162015-05-08 17:44:22 +0100803 reg |= TTBCR2_SEP_UPSTREAM;
Will Deacon518f7132014-11-14 17:17:54 +0000804 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR2);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100805 }
806 } else {
Will Deacon518f7132014-11-14 17:17:54 +0000807 reg = pgtbl_cfg->arm_lpae_s2_cfg.vtcr;
808 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100809 }
810
Will Deacon518f7132014-11-14 17:17:54 +0000811 /* MAIRs (stage-1 only) */
Will Deacon45ae7cf2013-06-24 18:31:25 +0100812 if (stage1) {
Will Deacon518f7132014-11-14 17:17:54 +0000813 reg = pgtbl_cfg->arm_lpae_s1_cfg.mair[0];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100814 writel_relaxed(reg, cb_base + ARM_SMMU_CB_S1_MAIR0);
Will Deacon518f7132014-11-14 17:17:54 +0000815 reg = pgtbl_cfg->arm_lpae_s1_cfg.mair[1];
816 writel_relaxed(reg, cb_base + ARM_SMMU_CB_S1_MAIR1);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100817 }
818
Will Deacon45ae7cf2013-06-24 18:31:25 +0100819 /* SCTLR */
820 reg = SCTLR_CFCFG | SCTLR_CFIE | SCTLR_CFRE | SCTLR_M | SCTLR_EAE_SBOP;
821 if (stage1)
822 reg |= SCTLR_S1_ASIDPNE;
823#ifdef __BIG_ENDIAN
824 reg |= SCTLR_E;
825#endif
Will Deacon25724842013-08-21 13:49:53 +0100826 writel_relaxed(reg, cb_base + ARM_SMMU_CB_SCTLR);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100827}
828
829static int arm_smmu_init_domain_context(struct iommu_domain *domain,
Will Deacon44680ee2014-06-25 11:29:12 +0100830 struct arm_smmu_device *smmu)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100831{
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100832 int irq, start, ret = 0;
Will Deacon518f7132014-11-14 17:17:54 +0000833 unsigned long ias, oas;
834 struct io_pgtable_ops *pgtbl_ops;
835 struct io_pgtable_cfg pgtbl_cfg;
836 enum io_pgtable_fmt fmt;
Joerg Roedel1d672632015-03-26 13:43:10 +0100837 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon44680ee2014-06-25 11:29:12 +0100838 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100839
Will Deacon518f7132014-11-14 17:17:54 +0000840 mutex_lock(&smmu_domain->init_mutex);
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100841 if (smmu_domain->smmu)
842 goto out_unlock;
843
Will Deaconc752ce42014-06-25 22:46:31 +0100844 /*
845 * Mapping the requested stage onto what we support is surprisingly
846 * complicated, mainly because the spec allows S1+S2 SMMUs without
847 * support for nested translation. That means we end up with the
848 * following table:
849 *
850 * Requested Supported Actual
851 * S1 N S1
852 * S1 S1+S2 S1
853 * S1 S2 S2
854 * S1 S1 S1
855 * N N N
856 * N S1+S2 S2
857 * N S2 S2
858 * N S1 S1
859 *
860 * Note that you can't actually request stage-2 mappings.
861 */
862 if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S1))
863 smmu_domain->stage = ARM_SMMU_DOMAIN_S2;
864 if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S2))
865 smmu_domain->stage = ARM_SMMU_DOMAIN_S1;
866
867 switch (smmu_domain->stage) {
868 case ARM_SMMU_DOMAIN_S1:
869 cfg->cbar = CBAR_TYPE_S1_TRANS_S2_BYPASS;
870 start = smmu->num_s2_context_banks;
Will Deacon518f7132014-11-14 17:17:54 +0000871 ias = smmu->va_size;
872 oas = smmu->ipa_size;
873 if (IS_ENABLED(CONFIG_64BIT))
874 fmt = ARM_64_LPAE_S1;
875 else
876 fmt = ARM_32_LPAE_S1;
Will Deaconc752ce42014-06-25 22:46:31 +0100877 break;
878 case ARM_SMMU_DOMAIN_NESTED:
Will Deacon45ae7cf2013-06-24 18:31:25 +0100879 /*
880 * We will likely want to change this if/when KVM gets
881 * involved.
882 */
Will Deaconc752ce42014-06-25 22:46:31 +0100883 case ARM_SMMU_DOMAIN_S2:
Will Deacon9c5c92e2014-06-25 12:12:41 +0100884 cfg->cbar = CBAR_TYPE_S2_TRANS;
885 start = 0;
Will Deacon518f7132014-11-14 17:17:54 +0000886 ias = smmu->ipa_size;
887 oas = smmu->pa_size;
888 if (IS_ENABLED(CONFIG_64BIT))
889 fmt = ARM_64_LPAE_S2;
890 else
891 fmt = ARM_32_LPAE_S2;
Will Deaconc752ce42014-06-25 22:46:31 +0100892 break;
893 default:
894 ret = -EINVAL;
895 goto out_unlock;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100896 }
897
898 ret = __arm_smmu_alloc_bitmap(smmu->context_map, start,
899 smmu->num_context_banks);
900 if (IS_ERR_VALUE(ret))
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100901 goto out_unlock;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100902
Will Deacon44680ee2014-06-25 11:29:12 +0100903 cfg->cbndx = ret;
Robin Murphy09360402014-08-28 17:51:59 +0100904 if (smmu->version == ARM_SMMU_V1) {
Will Deacon44680ee2014-06-25 11:29:12 +0100905 cfg->irptndx = atomic_inc_return(&smmu->irptndx);
906 cfg->irptndx %= smmu->num_context_irqs;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100907 } else {
Will Deacon44680ee2014-06-25 11:29:12 +0100908 cfg->irptndx = cfg->cbndx;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100909 }
910
Will Deacon518f7132014-11-14 17:17:54 +0000911 pgtbl_cfg = (struct io_pgtable_cfg) {
912 .pgsize_bitmap = arm_smmu_ops.pgsize_bitmap,
913 .ias = ias,
914 .oas = oas,
915 .tlb = &arm_smmu_gather_ops,
Robin Murphy2df7a252015-07-29 19:46:06 +0100916 .iommu_dev = smmu->dev,
Will Deacon518f7132014-11-14 17:17:54 +0000917 };
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100918
Will Deacon518f7132014-11-14 17:17:54 +0000919 smmu_domain->smmu = smmu;
920 pgtbl_ops = alloc_io_pgtable_ops(fmt, &pgtbl_cfg, smmu_domain);
921 if (!pgtbl_ops) {
922 ret = -ENOMEM;
923 goto out_clear_smmu;
924 }
925
926 /* Update our support page sizes to reflect the page table format */
927 arm_smmu_ops.pgsize_bitmap = pgtbl_cfg.pgsize_bitmap;
928
929 /* Initialise the context bank with our page table cfg */
930 arm_smmu_init_context_bank(smmu_domain, &pgtbl_cfg);
931
932 /*
933 * Request context fault interrupt. Do this last to avoid the
934 * handler seeing a half-initialised domain state.
935 */
Will Deacon44680ee2014-06-25 11:29:12 +0100936 irq = smmu->irqs[smmu->num_global_irqs + cfg->irptndx];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100937 ret = request_irq(irq, arm_smmu_context_fault, IRQF_SHARED,
938 "arm-smmu-context-fault", domain);
939 if (IS_ERR_VALUE(ret)) {
940 dev_err(smmu->dev, "failed to request context IRQ %d (%u)\n",
Will Deacon44680ee2014-06-25 11:29:12 +0100941 cfg->irptndx, irq);
942 cfg->irptndx = INVALID_IRPTNDX;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100943 }
944
Will Deacon518f7132014-11-14 17:17:54 +0000945 mutex_unlock(&smmu_domain->init_mutex);
946
947 /* Publish page table ops for map/unmap */
948 smmu_domain->pgtbl_ops = pgtbl_ops;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100949 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100950
Will Deacon518f7132014-11-14 17:17:54 +0000951out_clear_smmu:
952 smmu_domain->smmu = NULL;
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100953out_unlock:
Will Deacon518f7132014-11-14 17:17:54 +0000954 mutex_unlock(&smmu_domain->init_mutex);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100955 return ret;
956}
957
958static void arm_smmu_destroy_domain_context(struct iommu_domain *domain)
959{
Joerg Roedel1d672632015-03-26 13:43:10 +0100960 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon44680ee2014-06-25 11:29:12 +0100961 struct arm_smmu_device *smmu = smmu_domain->smmu;
962 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
Will Deacon1463fe42013-07-31 19:21:27 +0100963 void __iomem *cb_base;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100964 int irq;
965
966 if (!smmu)
967 return;
968
Will Deacon518f7132014-11-14 17:17:54 +0000969 /*
970 * Disable the context bank and free the page tables before freeing
971 * it.
972 */
Will Deacon44680ee2014-06-25 11:29:12 +0100973 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deacon1463fe42013-07-31 19:21:27 +0100974 writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR);
Will Deacon1463fe42013-07-31 19:21:27 +0100975
Will Deacon44680ee2014-06-25 11:29:12 +0100976 if (cfg->irptndx != INVALID_IRPTNDX) {
977 irq = smmu->irqs[smmu->num_global_irqs + cfg->irptndx];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100978 free_irq(irq, domain);
979 }
980
Markus Elfring44830b02015-11-06 18:32:41 +0100981 free_io_pgtable_ops(smmu_domain->pgtbl_ops);
Will Deacon44680ee2014-06-25 11:29:12 +0100982 __arm_smmu_free_bitmap(smmu->context_map, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100983}
984
Joerg Roedel1d672632015-03-26 13:43:10 +0100985static struct iommu_domain *arm_smmu_domain_alloc(unsigned type)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100986{
987 struct arm_smmu_domain *smmu_domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100988
Robin Murphy9adb9592016-01-26 18:06:36 +0000989 if (type != IOMMU_DOMAIN_UNMANAGED && type != IOMMU_DOMAIN_DMA)
Joerg Roedel1d672632015-03-26 13:43:10 +0100990 return NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100991 /*
992 * Allocate the domain and initialise some of its data structures.
993 * We can't really do anything meaningful until we've added a
994 * master.
995 */
996 smmu_domain = kzalloc(sizeof(*smmu_domain), GFP_KERNEL);
997 if (!smmu_domain)
Joerg Roedel1d672632015-03-26 13:43:10 +0100998 return NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100999
Robin Murphy9adb9592016-01-26 18:06:36 +00001000 if (type == IOMMU_DOMAIN_DMA &&
1001 iommu_get_dma_cookie(&smmu_domain->domain)) {
1002 kfree(smmu_domain);
1003 return NULL;
1004 }
1005
Will Deacon518f7132014-11-14 17:17:54 +00001006 mutex_init(&smmu_domain->init_mutex);
1007 spin_lock_init(&smmu_domain->pgtbl_lock);
Joerg Roedel1d672632015-03-26 13:43:10 +01001008
1009 return &smmu_domain->domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001010}
1011
Joerg Roedel1d672632015-03-26 13:43:10 +01001012static void arm_smmu_domain_free(struct iommu_domain *domain)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001013{
Joerg Roedel1d672632015-03-26 13:43:10 +01001014 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon1463fe42013-07-31 19:21:27 +01001015
1016 /*
1017 * Free the domain resources. We assume that all devices have
1018 * already been detached.
1019 */
Robin Murphy9adb9592016-01-26 18:06:36 +00001020 iommu_put_dma_cookie(domain);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001021 arm_smmu_destroy_domain_context(domain);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001022 kfree(smmu_domain);
1023}
1024
1025static int arm_smmu_master_configure_smrs(struct arm_smmu_device *smmu,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001026 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001027{
1028 int i;
1029 struct arm_smmu_smr *smrs;
1030 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1031
1032 if (!(smmu->features & ARM_SMMU_FEAT_STREAM_MATCH))
1033 return 0;
1034
Will Deacona9a1b0b2014-05-01 18:05:08 +01001035 if (cfg->smrs)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001036 return -EEXIST;
1037
Mitchel Humpherys29073202014-07-08 09:52:18 -07001038 smrs = kmalloc_array(cfg->num_streamids, sizeof(*smrs), GFP_KERNEL);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001039 if (!smrs) {
Will Deacona9a1b0b2014-05-01 18:05:08 +01001040 dev_err(smmu->dev, "failed to allocate %d SMRs\n",
1041 cfg->num_streamids);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001042 return -ENOMEM;
1043 }
1044
Will Deacon44680ee2014-06-25 11:29:12 +01001045 /* Allocate the SMRs on the SMMU */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001046 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001047 int idx = __arm_smmu_alloc_bitmap(smmu->smr_map, 0,
1048 smmu->num_mapping_groups);
1049 if (IS_ERR_VALUE(idx)) {
1050 dev_err(smmu->dev, "failed to allocate free SMR\n");
1051 goto err_free_smrs;
1052 }
1053
1054 smrs[i] = (struct arm_smmu_smr) {
1055 .idx = idx,
1056 .mask = 0, /* We don't currently share SMRs */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001057 .id = cfg->streamids[i],
Will Deacon45ae7cf2013-06-24 18:31:25 +01001058 };
1059 }
1060
1061 /* It worked! Now, poke the actual hardware */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001062 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001063 u32 reg = SMR_VALID | smrs[i].id << SMR_ID_SHIFT |
1064 smrs[i].mask << SMR_MASK_SHIFT;
1065 writel_relaxed(reg, gr0_base + ARM_SMMU_GR0_SMR(smrs[i].idx));
1066 }
1067
Will Deacona9a1b0b2014-05-01 18:05:08 +01001068 cfg->smrs = smrs;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001069 return 0;
1070
1071err_free_smrs:
1072 while (--i >= 0)
1073 __arm_smmu_free_bitmap(smmu->smr_map, smrs[i].idx);
1074 kfree(smrs);
1075 return -ENOSPC;
1076}
1077
1078static void arm_smmu_master_free_smrs(struct arm_smmu_device *smmu,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001079 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001080{
1081 int i;
1082 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001083 struct arm_smmu_smr *smrs = cfg->smrs;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001084
Will Deacon43b412b2014-07-15 11:22:24 +01001085 if (!smrs)
1086 return;
1087
Will Deacon45ae7cf2013-06-24 18:31:25 +01001088 /* Invalidate the SMRs before freeing back to the allocator */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001089 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001090 u8 idx = smrs[i].idx;
Mitchel Humpherys29073202014-07-08 09:52:18 -07001091
Will Deacon45ae7cf2013-06-24 18:31:25 +01001092 writel_relaxed(~SMR_VALID, gr0_base + ARM_SMMU_GR0_SMR(idx));
1093 __arm_smmu_free_bitmap(smmu->smr_map, idx);
1094 }
1095
Will Deacona9a1b0b2014-05-01 18:05:08 +01001096 cfg->smrs = NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001097 kfree(smrs);
1098}
1099
Will Deacon45ae7cf2013-06-24 18:31:25 +01001100static int arm_smmu_domain_add_master(struct arm_smmu_domain *smmu_domain,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001101 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001102{
1103 int i, ret;
Will Deacon44680ee2014-06-25 11:29:12 +01001104 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001105 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1106
Will Deacon8f68f8e2014-07-15 11:27:08 +01001107 /* Devices in an IOMMU group may already be configured */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001108 ret = arm_smmu_master_configure_smrs(smmu, cfg);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001109 if (ret)
Will Deacon8f68f8e2014-07-15 11:27:08 +01001110 return ret == -EEXIST ? 0 : ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001111
Will Deaconcbf82772016-02-18 12:05:57 +00001112 /*
1113 * FIXME: This won't be needed once we have IOMMU-backed DMA ops
1114 * for all devices behind the SMMU.
1115 */
1116 if (smmu_domain->domain.type == IOMMU_DOMAIN_DMA)
1117 return 0;
1118
Will Deacona9a1b0b2014-05-01 18:05:08 +01001119 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001120 u32 idx, s2cr;
Mitchel Humpherys29073202014-07-08 09:52:18 -07001121
Will Deacona9a1b0b2014-05-01 18:05:08 +01001122 idx = cfg->smrs ? cfg->smrs[i].idx : cfg->streamids[i];
Robin Murphyd3461802016-01-26 18:06:34 +00001123 s2cr = S2CR_TYPE_TRANS | S2CR_PRIVCFG_UNPRIV |
Will Deacon44680ee2014-06-25 11:29:12 +01001124 (smmu_domain->cfg.cbndx << S2CR_CBNDX_SHIFT);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001125 writel_relaxed(s2cr, gr0_base + ARM_SMMU_GR0_S2CR(idx));
1126 }
1127
1128 return 0;
1129}
1130
1131static void arm_smmu_domain_remove_master(struct arm_smmu_domain *smmu_domain,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001132 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001133{
Will Deacon43b412b2014-07-15 11:22:24 +01001134 int i;
Will Deacon44680ee2014-06-25 11:29:12 +01001135 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon43b412b2014-07-15 11:22:24 +01001136 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001137
Will Deacon8f68f8e2014-07-15 11:27:08 +01001138 /* An IOMMU group is torn down by the first device to be removed */
1139 if ((smmu->features & ARM_SMMU_FEAT_STREAM_MATCH) && !cfg->smrs)
1140 return;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001141
1142 /*
1143 * We *must* clear the S2CR first, because freeing the SMR means
1144 * that it can be re-allocated immediately.
1145 */
Will Deacon43b412b2014-07-15 11:22:24 +01001146 for (i = 0; i < cfg->num_streamids; ++i) {
1147 u32 idx = cfg->smrs ? cfg->smrs[i].idx : cfg->streamids[i];
Robin Murphy25a1c962016-02-10 14:25:33 +00001148 u32 reg = disable_bypass ? S2CR_TYPE_FAULT : S2CR_TYPE_BYPASS;
Will Deacon43b412b2014-07-15 11:22:24 +01001149
Robin Murphy25a1c962016-02-10 14:25:33 +00001150 writel_relaxed(reg, gr0_base + ARM_SMMU_GR0_S2CR(idx));
Will Deacon43b412b2014-07-15 11:22:24 +01001151 }
1152
Will Deacona9a1b0b2014-05-01 18:05:08 +01001153 arm_smmu_master_free_smrs(smmu, cfg);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001154}
1155
Will Deaconbc7f2ce2016-02-17 17:41:57 +00001156static void arm_smmu_detach_dev(struct device *dev,
1157 struct arm_smmu_master_cfg *cfg)
1158{
1159 struct iommu_domain *domain = dev->archdata.iommu;
1160 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
1161
1162 dev->archdata.iommu = NULL;
1163 arm_smmu_domain_remove_master(smmu_domain, cfg);
1164}
1165
Will Deacon45ae7cf2013-06-24 18:31:25 +01001166static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev)
1167{
Mitchel Humpherysa18037b2014-07-30 18:58:13 +01001168 int ret;
Joerg Roedel1d672632015-03-26 13:43:10 +01001169 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon518f7132014-11-14 17:17:54 +00001170 struct arm_smmu_device *smmu;
Will Deacona9a1b0b2014-05-01 18:05:08 +01001171 struct arm_smmu_master_cfg *cfg;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001172
Will Deacon8f68f8e2014-07-15 11:27:08 +01001173 smmu = find_smmu_for_device(dev);
Will Deacon44680ee2014-06-25 11:29:12 +01001174 if (!smmu) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001175 dev_err(dev, "cannot attach to SMMU, is it on the same bus?\n");
1176 return -ENXIO;
1177 }
1178
Will Deacon518f7132014-11-14 17:17:54 +00001179 /* Ensure that the domain is finalised */
1180 ret = arm_smmu_init_domain_context(domain, smmu);
1181 if (IS_ERR_VALUE(ret))
1182 return ret;
1183
Will Deacon45ae7cf2013-06-24 18:31:25 +01001184 /*
Will Deacon44680ee2014-06-25 11:29:12 +01001185 * Sanity check the domain. We don't support domains across
1186 * different SMMUs.
Will Deacon45ae7cf2013-06-24 18:31:25 +01001187 */
Will Deacon518f7132014-11-14 17:17:54 +00001188 if (smmu_domain->smmu != smmu) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001189 dev_err(dev,
1190 "cannot attach to SMMU %s whilst already attached to domain on SMMU %s\n",
Mitchel Humpherysa18037b2014-07-30 18:58:13 +01001191 dev_name(smmu_domain->smmu->dev), dev_name(smmu->dev));
1192 return -EINVAL;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001193 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01001194
1195 /* Looks ok, so add the device to the domain */
Will Deacon8f68f8e2014-07-15 11:27:08 +01001196 cfg = find_smmu_master_cfg(dev);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001197 if (!cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001198 return -ENODEV;
1199
Will Deaconbc7f2ce2016-02-17 17:41:57 +00001200 /* Detach the dev from its current domain */
1201 if (dev->archdata.iommu)
1202 arm_smmu_detach_dev(dev, cfg);
1203
Will Deacon844e35b2014-07-17 11:23:51 +01001204 ret = arm_smmu_domain_add_master(smmu_domain, cfg);
1205 if (!ret)
1206 dev->archdata.iommu = domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001207 return ret;
1208}
1209
Will Deacon45ae7cf2013-06-24 18:31:25 +01001210static int arm_smmu_map(struct iommu_domain *domain, unsigned long iova,
Will Deaconb410aed2014-02-20 16:31:06 +00001211 phys_addr_t paddr, size_t size, int prot)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001212{
Will Deacon518f7132014-11-14 17:17:54 +00001213 int ret;
1214 unsigned long flags;
Joerg Roedel1d672632015-03-26 13:43:10 +01001215 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon518f7132014-11-14 17:17:54 +00001216 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001217
Will Deacon518f7132014-11-14 17:17:54 +00001218 if (!ops)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001219 return -ENODEV;
1220
Will Deacon518f7132014-11-14 17:17:54 +00001221 spin_lock_irqsave(&smmu_domain->pgtbl_lock, flags);
1222 ret = ops->map(ops, iova, paddr, size, prot);
1223 spin_unlock_irqrestore(&smmu_domain->pgtbl_lock, flags);
1224 return ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001225}
1226
1227static size_t arm_smmu_unmap(struct iommu_domain *domain, unsigned long iova,
1228 size_t size)
1229{
Will Deacon518f7132014-11-14 17:17:54 +00001230 size_t ret;
1231 unsigned long flags;
Joerg Roedel1d672632015-03-26 13:43:10 +01001232 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon518f7132014-11-14 17:17:54 +00001233 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001234
Will Deacon518f7132014-11-14 17:17:54 +00001235 if (!ops)
1236 return 0;
1237
1238 spin_lock_irqsave(&smmu_domain->pgtbl_lock, flags);
1239 ret = ops->unmap(ops, iova, size);
1240 spin_unlock_irqrestore(&smmu_domain->pgtbl_lock, flags);
1241 return ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001242}
1243
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001244static phys_addr_t arm_smmu_iova_to_phys_hard(struct iommu_domain *domain,
1245 dma_addr_t iova)
1246{
Joerg Roedel1d672632015-03-26 13:43:10 +01001247 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001248 struct arm_smmu_device *smmu = smmu_domain->smmu;
1249 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
1250 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
1251 struct device *dev = smmu->dev;
1252 void __iomem *cb_base;
1253 u32 tmp;
1254 u64 phys;
Robin Murphy661d9622015-05-27 17:09:34 +01001255 unsigned long va;
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001256
1257 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
1258
Robin Murphy661d9622015-05-27 17:09:34 +01001259 /* ATS1 registers can only be written atomically */
1260 va = iova & ~0xfffUL;
Robin Murphy661d9622015-05-27 17:09:34 +01001261 if (smmu->version == ARM_SMMU_V2)
Tirumalesh Chalamarla668b4ad2015-08-19 00:40:30 +01001262 smmu_writeq(va, cb_base + ARM_SMMU_CB_ATS1PR);
Robin Murphy661d9622015-05-27 17:09:34 +01001263 else
Robin Murphy661d9622015-05-27 17:09:34 +01001264 writel_relaxed(va, cb_base + ARM_SMMU_CB_ATS1PR);
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001265
1266 if (readl_poll_timeout_atomic(cb_base + ARM_SMMU_CB_ATSR, tmp,
1267 !(tmp & ATSR_ACTIVE), 5, 50)) {
1268 dev_err(dev,
Fabio Estevam077124c2015-08-18 17:12:24 +01001269 "iova to phys timed out on %pad. Falling back to software table walk.\n",
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001270 &iova);
1271 return ops->iova_to_phys(ops, iova);
1272 }
1273
1274 phys = readl_relaxed(cb_base + ARM_SMMU_CB_PAR_LO);
1275 phys |= ((u64)readl_relaxed(cb_base + ARM_SMMU_CB_PAR_HI)) << 32;
1276
1277 if (phys & CB_PAR_F) {
1278 dev_err(dev, "translation fault!\n");
1279 dev_err(dev, "PAR = 0x%llx\n", phys);
1280 return 0;
1281 }
1282
1283 return (phys & GENMASK_ULL(39, 12)) | (iova & 0xfff);
1284}
1285
Will Deacon45ae7cf2013-06-24 18:31:25 +01001286static phys_addr_t arm_smmu_iova_to_phys(struct iommu_domain *domain,
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001287 dma_addr_t iova)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001288{
Will Deacon518f7132014-11-14 17:17:54 +00001289 phys_addr_t ret;
1290 unsigned long flags;
Joerg Roedel1d672632015-03-26 13:43:10 +01001291 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deacon518f7132014-11-14 17:17:54 +00001292 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001293
Will Deacon518f7132014-11-14 17:17:54 +00001294 if (!ops)
Will Deacona44a97912013-11-07 18:47:50 +00001295 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001296
Will Deacon518f7132014-11-14 17:17:54 +00001297 spin_lock_irqsave(&smmu_domain->pgtbl_lock, flags);
Baptiste Reynal83a60ed2015-03-04 16:51:06 +01001298 if (smmu_domain->smmu->features & ARM_SMMU_FEAT_TRANS_OPS &&
1299 smmu_domain->stage == ARM_SMMU_DOMAIN_S1) {
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001300 ret = arm_smmu_iova_to_phys_hard(domain, iova);
Baptiste Reynal83a60ed2015-03-04 16:51:06 +01001301 } else {
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001302 ret = ops->iova_to_phys(ops, iova);
Baptiste Reynal83a60ed2015-03-04 16:51:06 +01001303 }
1304
Will Deacon518f7132014-11-14 17:17:54 +00001305 spin_unlock_irqrestore(&smmu_domain->pgtbl_lock, flags);
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001306
Will Deacon518f7132014-11-14 17:17:54 +00001307 return ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001308}
1309
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001310static bool arm_smmu_capable(enum iommu_cap cap)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001311{
Will Deacond0948942014-06-24 17:30:10 +01001312 switch (cap) {
1313 case IOMMU_CAP_CACHE_COHERENCY:
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001314 /*
1315 * Return true here as the SMMU can always send out coherent
1316 * requests.
1317 */
1318 return true;
Will Deacond0948942014-06-24 17:30:10 +01001319 case IOMMU_CAP_INTR_REMAP:
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001320 return true; /* MSIs are just memory writes */
Antonios Motakis0029a8d2014-10-13 14:06:18 +01001321 case IOMMU_CAP_NOEXEC:
1322 return true;
Will Deacond0948942014-06-24 17:30:10 +01001323 default:
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001324 return false;
Will Deacond0948942014-06-24 17:30:10 +01001325 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01001326}
Will Deacon45ae7cf2013-06-24 18:31:25 +01001327
Will Deacona9a1b0b2014-05-01 18:05:08 +01001328static int __arm_smmu_get_pci_sid(struct pci_dev *pdev, u16 alias, void *data)
1329{
1330 *((u16 *)data) = alias;
1331 return 0; /* Continue walking */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001332}
1333
Will Deacon8f68f8e2014-07-15 11:27:08 +01001334static void __arm_smmu_release_pci_iommudata(void *data)
1335{
1336 kfree(data);
1337}
1338
Joerg Roedelaf659932015-10-21 23:51:41 +02001339static int arm_smmu_init_pci_device(struct pci_dev *pdev,
1340 struct iommu_group *group)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001341{
Will Deacon03edb222015-01-19 14:27:33 +00001342 struct arm_smmu_master_cfg *cfg;
Joerg Roedelaf659932015-10-21 23:51:41 +02001343 u16 sid;
1344 int i;
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001345
Will Deacon03edb222015-01-19 14:27:33 +00001346 cfg = iommu_group_get_iommudata(group);
1347 if (!cfg) {
Will Deacona9a1b0b2014-05-01 18:05:08 +01001348 cfg = kzalloc(sizeof(*cfg), GFP_KERNEL);
Joerg Roedelaf659932015-10-21 23:51:41 +02001349 if (!cfg)
1350 return -ENOMEM;
Will Deacona9a1b0b2014-05-01 18:05:08 +01001351
Will Deacon03edb222015-01-19 14:27:33 +00001352 iommu_group_set_iommudata(group, cfg,
1353 __arm_smmu_release_pci_iommudata);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001354 }
1355
Joerg Roedelaf659932015-10-21 23:51:41 +02001356 if (cfg->num_streamids >= MAX_MASTER_STREAMIDS)
1357 return -ENOSPC;
Will Deacona9a1b0b2014-05-01 18:05:08 +01001358
Will Deacon03edb222015-01-19 14:27:33 +00001359 /*
1360 * Assume Stream ID == Requester ID for now.
1361 * We need a way to describe the ID mappings in FDT.
1362 */
1363 pci_for_each_dma_alias(pdev, __arm_smmu_get_pci_sid, &sid);
1364 for (i = 0; i < cfg->num_streamids; ++i)
1365 if (cfg->streamids[i] == sid)
1366 break;
1367
1368 /* Avoid duplicate SIDs, as this can lead to SMR conflicts */
1369 if (i == cfg->num_streamids)
1370 cfg->streamids[cfg->num_streamids++] = sid;
1371
1372 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001373}
1374
Joerg Roedelaf659932015-10-21 23:51:41 +02001375static int arm_smmu_init_platform_device(struct device *dev,
1376 struct iommu_group *group)
Will Deacon03edb222015-01-19 14:27:33 +00001377{
Will Deacon03edb222015-01-19 14:27:33 +00001378 struct arm_smmu_device *smmu = find_smmu_for_device(dev);
Joerg Roedelaf659932015-10-21 23:51:41 +02001379 struct arm_smmu_master *master;
Will Deacon03edb222015-01-19 14:27:33 +00001380
1381 if (!smmu)
1382 return -ENODEV;
1383
1384 master = find_smmu_master(smmu, dev->of_node);
1385 if (!master)
1386 return -ENODEV;
1387
Will Deacon03edb222015-01-19 14:27:33 +00001388 iommu_group_set_iommudata(group, &master->cfg, NULL);
Joerg Roedelaf659932015-10-21 23:51:41 +02001389
1390 return 0;
Will Deacon03edb222015-01-19 14:27:33 +00001391}
1392
1393static int arm_smmu_add_device(struct device *dev)
1394{
Joerg Roedelaf659932015-10-21 23:51:41 +02001395 struct iommu_group *group;
Will Deacon03edb222015-01-19 14:27:33 +00001396
Joerg Roedelaf659932015-10-21 23:51:41 +02001397 group = iommu_group_get_for_dev(dev);
1398 if (IS_ERR(group))
1399 return PTR_ERR(group);
1400
Peng Fan9a4a9d82015-11-20 16:56:18 +08001401 iommu_group_put(group);
Joerg Roedelaf659932015-10-21 23:51:41 +02001402 return 0;
Will Deacon03edb222015-01-19 14:27:33 +00001403}
1404
Will Deacon45ae7cf2013-06-24 18:31:25 +01001405static void arm_smmu_remove_device(struct device *dev)
1406{
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001407 iommu_group_remove_device(dev);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001408}
1409
Joerg Roedelaf659932015-10-21 23:51:41 +02001410static struct iommu_group *arm_smmu_device_group(struct device *dev)
1411{
1412 struct iommu_group *group;
1413 int ret;
1414
1415 if (dev_is_pci(dev))
1416 group = pci_device_group(dev);
1417 else
1418 group = generic_device_group(dev);
1419
1420 if (IS_ERR(group))
1421 return group;
1422
1423 if (dev_is_pci(dev))
1424 ret = arm_smmu_init_pci_device(to_pci_dev(dev), group);
1425 else
1426 ret = arm_smmu_init_platform_device(dev, group);
1427
1428 if (ret) {
1429 iommu_group_put(group);
1430 group = ERR_PTR(ret);
1431 }
1432
1433 return group;
1434}
1435
Will Deaconc752ce42014-06-25 22:46:31 +01001436static int arm_smmu_domain_get_attr(struct iommu_domain *domain,
1437 enum iommu_attr attr, void *data)
1438{
Joerg Roedel1d672632015-03-26 13:43:10 +01001439 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deaconc752ce42014-06-25 22:46:31 +01001440
1441 switch (attr) {
1442 case DOMAIN_ATTR_NESTING:
1443 *(int *)data = (smmu_domain->stage == ARM_SMMU_DOMAIN_NESTED);
1444 return 0;
1445 default:
1446 return -ENODEV;
1447 }
1448}
1449
1450static int arm_smmu_domain_set_attr(struct iommu_domain *domain,
1451 enum iommu_attr attr, void *data)
1452{
Will Deacon518f7132014-11-14 17:17:54 +00001453 int ret = 0;
Joerg Roedel1d672632015-03-26 13:43:10 +01001454 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
Will Deaconc752ce42014-06-25 22:46:31 +01001455
Will Deacon518f7132014-11-14 17:17:54 +00001456 mutex_lock(&smmu_domain->init_mutex);
1457
Will Deaconc752ce42014-06-25 22:46:31 +01001458 switch (attr) {
1459 case DOMAIN_ATTR_NESTING:
Will Deacon518f7132014-11-14 17:17:54 +00001460 if (smmu_domain->smmu) {
1461 ret = -EPERM;
1462 goto out_unlock;
1463 }
1464
Will Deaconc752ce42014-06-25 22:46:31 +01001465 if (*(int *)data)
1466 smmu_domain->stage = ARM_SMMU_DOMAIN_NESTED;
1467 else
1468 smmu_domain->stage = ARM_SMMU_DOMAIN_S1;
1469
Will Deacon518f7132014-11-14 17:17:54 +00001470 break;
Will Deaconc752ce42014-06-25 22:46:31 +01001471 default:
Will Deacon518f7132014-11-14 17:17:54 +00001472 ret = -ENODEV;
Will Deaconc752ce42014-06-25 22:46:31 +01001473 }
Will Deacon518f7132014-11-14 17:17:54 +00001474
1475out_unlock:
1476 mutex_unlock(&smmu_domain->init_mutex);
1477 return ret;
Will Deaconc752ce42014-06-25 22:46:31 +01001478}
1479
Will Deacon518f7132014-11-14 17:17:54 +00001480static struct iommu_ops arm_smmu_ops = {
Will Deaconc752ce42014-06-25 22:46:31 +01001481 .capable = arm_smmu_capable,
Joerg Roedel1d672632015-03-26 13:43:10 +01001482 .domain_alloc = arm_smmu_domain_alloc,
1483 .domain_free = arm_smmu_domain_free,
Will Deaconc752ce42014-06-25 22:46:31 +01001484 .attach_dev = arm_smmu_attach_dev,
Will Deaconc752ce42014-06-25 22:46:31 +01001485 .map = arm_smmu_map,
1486 .unmap = arm_smmu_unmap,
Joerg Roedel76771c92014-12-02 13:07:13 +01001487 .map_sg = default_iommu_map_sg,
Will Deaconc752ce42014-06-25 22:46:31 +01001488 .iova_to_phys = arm_smmu_iova_to_phys,
1489 .add_device = arm_smmu_add_device,
1490 .remove_device = arm_smmu_remove_device,
Joerg Roedelaf659932015-10-21 23:51:41 +02001491 .device_group = arm_smmu_device_group,
Will Deaconc752ce42014-06-25 22:46:31 +01001492 .domain_get_attr = arm_smmu_domain_get_attr,
1493 .domain_set_attr = arm_smmu_domain_set_attr,
Will Deacon518f7132014-11-14 17:17:54 +00001494 .pgsize_bitmap = -1UL, /* Restricted during device attach */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001495};
1496
1497static void arm_smmu_device_reset(struct arm_smmu_device *smmu)
1498{
1499 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001500 void __iomem *cb_base;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001501 int i = 0;
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001502 u32 reg;
1503
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001504 /* clear global FSR */
1505 reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sGFSR);
1506 writel(reg, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sGFSR);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001507
Robin Murphy25a1c962016-02-10 14:25:33 +00001508 /* Mark all SMRn as invalid and all S2CRn as bypass unless overridden */
1509 reg = disable_bypass ? S2CR_TYPE_FAULT : S2CR_TYPE_BYPASS;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001510 for (i = 0; i < smmu->num_mapping_groups; ++i) {
Olav Haugan3c8766d2014-08-22 17:12:32 -07001511 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_SMR(i));
Robin Murphy25a1c962016-02-10 14:25:33 +00001512 writel_relaxed(reg, gr0_base + ARM_SMMU_GR0_S2CR(i));
Will Deacon45ae7cf2013-06-24 18:31:25 +01001513 }
1514
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001515 /* Make sure all context banks are disabled and clear CB_FSR */
1516 for (i = 0; i < smmu->num_context_banks; ++i) {
1517 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, i);
1518 writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR);
1519 writel_relaxed(FSR_FAULT, cb_base + ARM_SMMU_CB_FSR);
1520 }
Will Deacon1463fe42013-07-31 19:21:27 +01001521
Will Deacon45ae7cf2013-06-24 18:31:25 +01001522 /* Invalidate the TLB, just in case */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001523 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLH);
1524 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLNSNH);
1525
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001526 reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001527
Will Deacon45ae7cf2013-06-24 18:31:25 +01001528 /* Enable fault reporting */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001529 reg |= (sCR0_GFRE | sCR0_GFIE | sCR0_GCFGFRE | sCR0_GCFGFIE);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001530
1531 /* Disable TLB broadcasting. */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001532 reg |= (sCR0_VMIDPNE | sCR0_PTM);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001533
Robin Murphy25a1c962016-02-10 14:25:33 +00001534 /* Enable client access, handling unmatched streams as appropriate */
1535 reg &= ~sCR0_CLIENTPD;
1536 if (disable_bypass)
1537 reg |= sCR0_USFCFG;
1538 else
1539 reg &= ~sCR0_USFCFG;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001540
1541 /* Disable forced broadcasting */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001542 reg &= ~sCR0_FB;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001543
1544 /* Don't upgrade barriers */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001545 reg &= ~(sCR0_BSU_MASK << sCR0_BSU_SHIFT);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001546
Tirumalesh Chalamarla4e3e9b62016-02-23 10:19:00 -08001547 if (smmu->features & ARM_SMMU_FEAT_VMID16)
1548 reg |= sCR0_VMID16EN;
1549
Will Deacon45ae7cf2013-06-24 18:31:25 +01001550 /* Push the button */
Will Deacon518f7132014-11-14 17:17:54 +00001551 __arm_smmu_tlb_sync(smmu);
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001552 writel(reg, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001553}
1554
1555static int arm_smmu_id_size_to_bits(int size)
1556{
1557 switch (size) {
1558 case 0:
1559 return 32;
1560 case 1:
1561 return 36;
1562 case 2:
1563 return 40;
1564 case 3:
1565 return 42;
1566 case 4:
1567 return 44;
1568 case 5:
1569 default:
1570 return 48;
1571 }
1572}
1573
1574static int arm_smmu_device_cfg_probe(struct arm_smmu_device *smmu)
1575{
1576 unsigned long size;
1577 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1578 u32 id;
Robin Murphybae2c2d2015-07-29 19:46:05 +01001579 bool cttw_dt, cttw_reg;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001580
1581 dev_notice(smmu->dev, "probing hardware configuration...\n");
Will Deacon45ae7cf2013-06-24 18:31:25 +01001582 dev_notice(smmu->dev, "SMMUv%d with:\n", smmu->version);
1583
1584 /* ID0 */
1585 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID0);
Will Deacon4cf740b2014-07-14 19:47:39 +01001586
1587 /* Restrict available stages based on module parameter */
1588 if (force_stage == 1)
1589 id &= ~(ID0_S2TS | ID0_NTS);
1590 else if (force_stage == 2)
1591 id &= ~(ID0_S1TS | ID0_NTS);
1592
Will Deacon45ae7cf2013-06-24 18:31:25 +01001593 if (id & ID0_S1TS) {
1594 smmu->features |= ARM_SMMU_FEAT_TRANS_S1;
1595 dev_notice(smmu->dev, "\tstage 1 translation\n");
1596 }
1597
1598 if (id & ID0_S2TS) {
1599 smmu->features |= ARM_SMMU_FEAT_TRANS_S2;
1600 dev_notice(smmu->dev, "\tstage 2 translation\n");
1601 }
1602
1603 if (id & ID0_NTS) {
1604 smmu->features |= ARM_SMMU_FEAT_TRANS_NESTED;
1605 dev_notice(smmu->dev, "\tnested translation\n");
1606 }
1607
1608 if (!(smmu->features &
Will Deacon4cf740b2014-07-14 19:47:39 +01001609 (ARM_SMMU_FEAT_TRANS_S1 | ARM_SMMU_FEAT_TRANS_S2))) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001610 dev_err(smmu->dev, "\tno translation support!\n");
1611 return -ENODEV;
1612 }
1613
Will Deacond38f0ff2015-06-29 17:47:42 +01001614 if ((id & ID0_S1TS) && ((smmu->version == 1) || !(id & ID0_ATOSNS))) {
Mitchel Humpherys859a7322014-10-29 21:13:40 +00001615 smmu->features |= ARM_SMMU_FEAT_TRANS_OPS;
1616 dev_notice(smmu->dev, "\taddress translation ops\n");
1617 }
1618
Robin Murphybae2c2d2015-07-29 19:46:05 +01001619 /*
1620 * In order for DMA API calls to work properly, we must defer to what
1621 * the DT says about coherency, regardless of what the hardware claims.
1622 * Fortunately, this also opens up a workaround for systems where the
1623 * ID register value has ended up configured incorrectly.
1624 */
1625 cttw_dt = of_dma_is_coherent(smmu->dev->of_node);
1626 cttw_reg = !!(id & ID0_CTTW);
1627 if (cttw_dt)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001628 smmu->features |= ARM_SMMU_FEAT_COHERENT_WALK;
Robin Murphybae2c2d2015-07-29 19:46:05 +01001629 if (cttw_dt || cttw_reg)
1630 dev_notice(smmu->dev, "\t%scoherent table walk\n",
1631 cttw_dt ? "" : "non-");
1632 if (cttw_dt != cttw_reg)
1633 dev_notice(smmu->dev,
1634 "\t(IDR0.CTTW overridden by dma-coherent property)\n");
Will Deacon45ae7cf2013-06-24 18:31:25 +01001635
1636 if (id & ID0_SMS) {
1637 u32 smr, sid, mask;
1638
1639 smmu->features |= ARM_SMMU_FEAT_STREAM_MATCH;
1640 smmu->num_mapping_groups = (id >> ID0_NUMSMRG_SHIFT) &
1641 ID0_NUMSMRG_MASK;
1642 if (smmu->num_mapping_groups == 0) {
1643 dev_err(smmu->dev,
1644 "stream-matching supported, but no SMRs present!\n");
1645 return -ENODEV;
1646 }
1647
1648 smr = SMR_MASK_MASK << SMR_MASK_SHIFT;
1649 smr |= (SMR_ID_MASK << SMR_ID_SHIFT);
1650 writel_relaxed(smr, gr0_base + ARM_SMMU_GR0_SMR(0));
1651 smr = readl_relaxed(gr0_base + ARM_SMMU_GR0_SMR(0));
1652
1653 mask = (smr >> SMR_MASK_SHIFT) & SMR_MASK_MASK;
1654 sid = (smr >> SMR_ID_SHIFT) & SMR_ID_MASK;
1655 if ((mask & sid) != sid) {
1656 dev_err(smmu->dev,
1657 "SMR mask bits (0x%x) insufficient for ID field (0x%x)\n",
1658 mask, sid);
1659 return -ENODEV;
1660 }
1661
1662 dev_notice(smmu->dev,
1663 "\tstream matching with %u register groups, mask 0x%x",
1664 smmu->num_mapping_groups, mask);
Olav Haugan3c8766d2014-08-22 17:12:32 -07001665 } else {
1666 smmu->num_mapping_groups = (id >> ID0_NUMSIDB_SHIFT) &
1667 ID0_NUMSIDB_MASK;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001668 }
1669
1670 /* ID1 */
1671 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID1);
Will Deaconc757e852014-07-30 11:33:25 +01001672 smmu->pgshift = (id & ID1_PAGESIZE) ? 16 : 12;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001673
Andreas Herrmannc55af7f2013-10-01 13:39:06 +01001674 /* Check for size mismatch of SMMU address space from mapped region */
Will Deacon518f7132014-11-14 17:17:54 +00001675 size = 1 << (((id >> ID1_NUMPAGENDXB_SHIFT) & ID1_NUMPAGENDXB_MASK) + 1);
Will Deaconc757e852014-07-30 11:33:25 +01001676 size *= 2 << smmu->pgshift;
Andreas Herrmannc55af7f2013-10-01 13:39:06 +01001677 if (smmu->size != size)
Mitchel Humpherys29073202014-07-08 09:52:18 -07001678 dev_warn(smmu->dev,
1679 "SMMU address space size (0x%lx) differs from mapped region size (0x%lx)!\n",
1680 size, smmu->size);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001681
Will Deacon518f7132014-11-14 17:17:54 +00001682 smmu->num_s2_context_banks = (id >> ID1_NUMS2CB_SHIFT) & ID1_NUMS2CB_MASK;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001683 smmu->num_context_banks = (id >> ID1_NUMCB_SHIFT) & ID1_NUMCB_MASK;
1684 if (smmu->num_s2_context_banks > smmu->num_context_banks) {
1685 dev_err(smmu->dev, "impossible number of S2 context banks!\n");
1686 return -ENODEV;
1687 }
1688 dev_notice(smmu->dev, "\t%u context banks (%u stage-2 only)\n",
1689 smmu->num_context_banks, smmu->num_s2_context_banks);
Robin Murphye086d912016-04-13 18:12:58 +01001690 /*
1691 * Cavium CN88xx erratum #27704.
1692 * Ensure ASID and VMID allocation is unique across all SMMUs in
1693 * the system.
1694 */
1695 if (smmu->model == CAVIUM_SMMUV2) {
1696 smmu->cavium_id_base =
1697 atomic_add_return(smmu->num_context_banks,
1698 &cavium_smmu_context_count);
1699 smmu->cavium_id_base -= smmu->num_context_banks;
1700 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01001701
1702 /* ID2 */
1703 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID2);
1704 size = arm_smmu_id_size_to_bits((id >> ID2_IAS_SHIFT) & ID2_IAS_MASK);
Will Deacon518f7132014-11-14 17:17:54 +00001705 smmu->ipa_size = size;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001706
Will Deacon518f7132014-11-14 17:17:54 +00001707 /* The output mask is also applied for bypass */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001708 size = arm_smmu_id_size_to_bits((id >> ID2_OAS_SHIFT) & ID2_OAS_MASK);
Will Deacon518f7132014-11-14 17:17:54 +00001709 smmu->pa_size = size;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001710
Tirumalesh Chalamarla4e3e9b62016-02-23 10:19:00 -08001711 if (id & ID2_VMID16)
1712 smmu->features |= ARM_SMMU_FEAT_VMID16;
1713
Robin Murphyf1d84542015-03-04 16:41:05 +00001714 /*
1715 * What the page table walker can address actually depends on which
1716 * descriptor format is in use, but since a) we don't know that yet,
1717 * and b) it can vary per context bank, this will have to do...
1718 */
1719 if (dma_set_mask_and_coherent(smmu->dev, DMA_BIT_MASK(size)))
1720 dev_warn(smmu->dev,
1721 "failed to set DMA mask for table walker\n");
1722
Robin Murphy09360402014-08-28 17:51:59 +01001723 if (smmu->version == ARM_SMMU_V1) {
Will Deacon518f7132014-11-14 17:17:54 +00001724 smmu->va_size = smmu->ipa_size;
1725 size = SZ_4K | SZ_2M | SZ_1G;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001726 } else {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001727 size = (id >> ID2_UBS_SHIFT) & ID2_UBS_MASK;
Will Deacon518f7132014-11-14 17:17:54 +00001728 smmu->va_size = arm_smmu_id_size_to_bits(size);
1729#ifndef CONFIG_64BIT
1730 smmu->va_size = min(32UL, smmu->va_size);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001731#endif
Will Deacon518f7132014-11-14 17:17:54 +00001732 size = 0;
1733 if (id & ID2_PTFS_4K)
1734 size |= SZ_4K | SZ_2M | SZ_1G;
1735 if (id & ID2_PTFS_16K)
1736 size |= SZ_16K | SZ_32M;
1737 if (id & ID2_PTFS_64K)
1738 size |= SZ_64K | SZ_512M;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001739 }
1740
Will Deacon518f7132014-11-14 17:17:54 +00001741 arm_smmu_ops.pgsize_bitmap &= size;
1742 dev_notice(smmu->dev, "\tSupported page sizes: 0x%08lx\n", size);
1743
Will Deacon28d60072014-09-01 16:24:48 +01001744 if (smmu->features & ARM_SMMU_FEAT_TRANS_S1)
1745 dev_notice(smmu->dev, "\tStage-1: %lu-bit VA -> %lu-bit IPA\n",
Will Deacon518f7132014-11-14 17:17:54 +00001746 smmu->va_size, smmu->ipa_size);
Will Deacon28d60072014-09-01 16:24:48 +01001747
1748 if (smmu->features & ARM_SMMU_FEAT_TRANS_S2)
1749 dev_notice(smmu->dev, "\tStage-2: %lu-bit IPA -> %lu-bit PA\n",
Will Deacon518f7132014-11-14 17:17:54 +00001750 smmu->ipa_size, smmu->pa_size);
Will Deacon28d60072014-09-01 16:24:48 +01001751
Will Deacon45ae7cf2013-06-24 18:31:25 +01001752 return 0;
1753}
1754
Robin Murphy67b65a32016-04-13 18:12:57 +01001755struct arm_smmu_match_data {
1756 enum arm_smmu_arch_version version;
1757 enum arm_smmu_implementation model;
1758};
1759
1760#define ARM_SMMU_MATCH_DATA(name, ver, imp) \
1761static struct arm_smmu_match_data name = { .version = ver, .model = imp }
1762
1763ARM_SMMU_MATCH_DATA(smmu_generic_v1, ARM_SMMU_V1, GENERIC_SMMU);
1764ARM_SMMU_MATCH_DATA(smmu_generic_v2, ARM_SMMU_V2, GENERIC_SMMU);
Robin Murphye086d912016-04-13 18:12:58 +01001765ARM_SMMU_MATCH_DATA(cavium_smmuv2, ARM_SMMU_V2, CAVIUM_SMMUV2);
Robin Murphy67b65a32016-04-13 18:12:57 +01001766
Joerg Roedel09b52692014-10-02 12:24:45 +02001767static const struct of_device_id arm_smmu_of_match[] = {
Robin Murphy67b65a32016-04-13 18:12:57 +01001768 { .compatible = "arm,smmu-v1", .data = &smmu_generic_v1 },
1769 { .compatible = "arm,smmu-v2", .data = &smmu_generic_v2 },
1770 { .compatible = "arm,mmu-400", .data = &smmu_generic_v1 },
1771 { .compatible = "arm,mmu-401", .data = &smmu_generic_v1 },
1772 { .compatible = "arm,mmu-500", .data = &smmu_generic_v2 },
Robin Murphye086d912016-04-13 18:12:58 +01001773 { .compatible = "cavium,smmu-v2", .data = &cavium_smmuv2 },
Robin Murphy09360402014-08-28 17:51:59 +01001774 { },
1775};
1776MODULE_DEVICE_TABLE(of, arm_smmu_of_match);
1777
Will Deacon45ae7cf2013-06-24 18:31:25 +01001778static int arm_smmu_device_dt_probe(struct platform_device *pdev)
1779{
Robin Murphy09360402014-08-28 17:51:59 +01001780 const struct of_device_id *of_id;
Robin Murphy67b65a32016-04-13 18:12:57 +01001781 const struct arm_smmu_match_data *data;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001782 struct resource *res;
1783 struct arm_smmu_device *smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001784 struct device *dev = &pdev->dev;
1785 struct rb_node *node;
1786 struct of_phandle_args masterspec;
1787 int num_irqs, i, err;
1788
1789 smmu = devm_kzalloc(dev, sizeof(*smmu), GFP_KERNEL);
1790 if (!smmu) {
1791 dev_err(dev, "failed to allocate arm_smmu_device\n");
1792 return -ENOMEM;
1793 }
1794 smmu->dev = dev;
1795
Robin Murphy09360402014-08-28 17:51:59 +01001796 of_id = of_match_node(arm_smmu_of_match, dev->of_node);
Robin Murphy67b65a32016-04-13 18:12:57 +01001797 data = of_id->data;
1798 smmu->version = data->version;
1799 smmu->model = data->model;
Robin Murphy09360402014-08-28 17:51:59 +01001800
Will Deacon45ae7cf2013-06-24 18:31:25 +01001801 res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
Julia Lawall8a7f4312013-08-19 12:20:37 +01001802 smmu->base = devm_ioremap_resource(dev, res);
1803 if (IS_ERR(smmu->base))
1804 return PTR_ERR(smmu->base);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001805 smmu->size = resource_size(res);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001806
1807 if (of_property_read_u32(dev->of_node, "#global-interrupts",
1808 &smmu->num_global_irqs)) {
1809 dev_err(dev, "missing #global-interrupts property\n");
1810 return -ENODEV;
1811 }
1812
1813 num_irqs = 0;
1814 while ((res = platform_get_resource(pdev, IORESOURCE_IRQ, num_irqs))) {
1815 num_irqs++;
1816 if (num_irqs > smmu->num_global_irqs)
1817 smmu->num_context_irqs++;
1818 }
1819
Andreas Herrmann44a08de2013-10-01 13:39:07 +01001820 if (!smmu->num_context_irqs) {
1821 dev_err(dev, "found %d interrupts but expected at least %d\n",
1822 num_irqs, smmu->num_global_irqs + 1);
1823 return -ENODEV;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001824 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01001825
1826 smmu->irqs = devm_kzalloc(dev, sizeof(*smmu->irqs) * num_irqs,
1827 GFP_KERNEL);
1828 if (!smmu->irqs) {
1829 dev_err(dev, "failed to allocate %d irqs\n", num_irqs);
1830 return -ENOMEM;
1831 }
1832
1833 for (i = 0; i < num_irqs; ++i) {
1834 int irq = platform_get_irq(pdev, i);
Mitchel Humpherys29073202014-07-08 09:52:18 -07001835
Will Deacon45ae7cf2013-06-24 18:31:25 +01001836 if (irq < 0) {
1837 dev_err(dev, "failed to get irq index %d\n", i);
1838 return -ENODEV;
1839 }
1840 smmu->irqs[i] = irq;
1841 }
1842
Olav Haugan3c8766d2014-08-22 17:12:32 -07001843 err = arm_smmu_device_cfg_probe(smmu);
1844 if (err)
1845 return err;
1846
Will Deacon45ae7cf2013-06-24 18:31:25 +01001847 i = 0;
1848 smmu->masters = RB_ROOT;
1849 while (!of_parse_phandle_with_args(dev->of_node, "mmu-masters",
1850 "#stream-id-cells", i,
1851 &masterspec)) {
1852 err = register_smmu_master(smmu, dev, &masterspec);
1853 if (err) {
1854 dev_err(dev, "failed to add master %s\n",
1855 masterspec.np->name);
1856 goto out_put_masters;
1857 }
1858
1859 i++;
1860 }
1861 dev_notice(dev, "registered %d master devices\n", i);
1862
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001863 parse_driver_options(smmu);
1864
Robin Murphy09360402014-08-28 17:51:59 +01001865 if (smmu->version > ARM_SMMU_V1 &&
Will Deacon45ae7cf2013-06-24 18:31:25 +01001866 smmu->num_context_banks != smmu->num_context_irqs) {
1867 dev_err(dev,
1868 "found only %d context interrupt(s) but %d required\n",
1869 smmu->num_context_irqs, smmu->num_context_banks);
Wei Yongjun89a23cde2013-11-15 09:42:30 +00001870 err = -ENODEV;
Will Deacon44680ee2014-06-25 11:29:12 +01001871 goto out_put_masters;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001872 }
1873
Will Deacon45ae7cf2013-06-24 18:31:25 +01001874 for (i = 0; i < smmu->num_global_irqs; ++i) {
1875 err = request_irq(smmu->irqs[i],
1876 arm_smmu_global_fault,
1877 IRQF_SHARED,
1878 "arm-smmu global fault",
1879 smmu);
1880 if (err) {
1881 dev_err(dev, "failed to request global IRQ %d (%u)\n",
1882 i, smmu->irqs[i]);
1883 goto out_free_irqs;
1884 }
1885 }
1886
1887 INIT_LIST_HEAD(&smmu->list);
1888 spin_lock(&arm_smmu_devices_lock);
1889 list_add(&smmu->list, &arm_smmu_devices);
1890 spin_unlock(&arm_smmu_devices_lock);
Will Deaconfd90cec2013-08-21 13:56:34 +01001891
1892 arm_smmu_device_reset(smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001893 return 0;
1894
1895out_free_irqs:
1896 while (i--)
1897 free_irq(smmu->irqs[i], smmu);
1898
Will Deacon45ae7cf2013-06-24 18:31:25 +01001899out_put_masters:
1900 for (node = rb_first(&smmu->masters); node; node = rb_next(node)) {
Mitchel Humpherys29073202014-07-08 09:52:18 -07001901 struct arm_smmu_master *master
1902 = container_of(node, struct arm_smmu_master, node);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001903 of_node_put(master->of_node);
1904 }
1905
1906 return err;
1907}
1908
1909static int arm_smmu_device_remove(struct platform_device *pdev)
1910{
1911 int i;
1912 struct device *dev = &pdev->dev;
1913 struct arm_smmu_device *curr, *smmu = NULL;
1914 struct rb_node *node;
1915
1916 spin_lock(&arm_smmu_devices_lock);
1917 list_for_each_entry(curr, &arm_smmu_devices, list) {
1918 if (curr->dev == dev) {
1919 smmu = curr;
1920 list_del(&smmu->list);
1921 break;
1922 }
1923 }
1924 spin_unlock(&arm_smmu_devices_lock);
1925
1926 if (!smmu)
1927 return -ENODEV;
1928
Will Deacon45ae7cf2013-06-24 18:31:25 +01001929 for (node = rb_first(&smmu->masters); node; node = rb_next(node)) {
Mitchel Humpherys29073202014-07-08 09:52:18 -07001930 struct arm_smmu_master *master
1931 = container_of(node, struct arm_smmu_master, node);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001932 of_node_put(master->of_node);
1933 }
1934
Will Deaconecfadb62013-07-31 19:21:28 +01001935 if (!bitmap_empty(smmu->context_map, ARM_SMMU_MAX_CBS))
Will Deacon45ae7cf2013-06-24 18:31:25 +01001936 dev_err(dev, "removing device with active domains!\n");
1937
1938 for (i = 0; i < smmu->num_global_irqs; ++i)
1939 free_irq(smmu->irqs[i], smmu);
1940
1941 /* Turn the thing off */
Mitchel Humpherys29073202014-07-08 09:52:18 -07001942 writel(sCR0_CLIENTPD, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001943 return 0;
1944}
1945
Will Deacon45ae7cf2013-06-24 18:31:25 +01001946static struct platform_driver arm_smmu_driver = {
1947 .driver = {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001948 .name = "arm-smmu",
1949 .of_match_table = of_match_ptr(arm_smmu_of_match),
1950 },
1951 .probe = arm_smmu_device_dt_probe,
1952 .remove = arm_smmu_device_remove,
1953};
1954
1955static int __init arm_smmu_init(void)
1956{
Thierry Reding0e7d37a2014-11-07 15:26:18 +00001957 struct device_node *np;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001958 int ret;
1959
Thierry Reding0e7d37a2014-11-07 15:26:18 +00001960 /*
1961 * Play nice with systems that don't have an ARM SMMU by checking that
1962 * an ARM SMMU exists in the system before proceeding with the driver
1963 * and IOMMU bus operation registration.
1964 */
1965 np = of_find_matching_node(NULL, arm_smmu_of_match);
1966 if (!np)
1967 return 0;
1968
1969 of_node_put(np);
1970
Will Deacon45ae7cf2013-06-24 18:31:25 +01001971 ret = platform_driver_register(&arm_smmu_driver);
1972 if (ret)
1973 return ret;
1974
1975 /* Oh, for a proper bus abstraction */
Dan Carpenter6614ee72013-08-21 09:34:20 +01001976 if (!iommu_present(&platform_bus_type))
Will Deacon45ae7cf2013-06-24 18:31:25 +01001977 bus_set_iommu(&platform_bus_type, &arm_smmu_ops);
1978
Will Deacond123cf82014-02-04 22:17:53 +00001979#ifdef CONFIG_ARM_AMBA
Dan Carpenter6614ee72013-08-21 09:34:20 +01001980 if (!iommu_present(&amba_bustype))
Will Deacon45ae7cf2013-06-24 18:31:25 +01001981 bus_set_iommu(&amba_bustype, &arm_smmu_ops);
Will Deacond123cf82014-02-04 22:17:53 +00001982#endif
Will Deacon45ae7cf2013-06-24 18:31:25 +01001983
Will Deacona9a1b0b2014-05-01 18:05:08 +01001984#ifdef CONFIG_PCI
1985 if (!iommu_present(&pci_bus_type))
1986 bus_set_iommu(&pci_bus_type, &arm_smmu_ops);
1987#endif
1988
Will Deacon45ae7cf2013-06-24 18:31:25 +01001989 return 0;
1990}
1991
1992static void __exit arm_smmu_exit(void)
1993{
1994 return platform_driver_unregister(&arm_smmu_driver);
1995}
1996
Andreas Herrmannb1950b22013-10-01 13:39:05 +01001997subsys_initcall(arm_smmu_init);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001998module_exit(arm_smmu_exit);
1999
2000MODULE_DESCRIPTION("IOMMU API for ARM architected SMMU implementations");
2001MODULE_AUTHOR("Will Deacon <will.deacon@arm.com>");
2002MODULE_LICENSE("GPL v2");