blob: 6cd47b75286f98d8cf8220378cca4aa32610f6dd [file] [log] [blame]
Will Deacon45ae7cf2013-06-24 18:31:25 +01001/*
2 * IOMMU API for ARM architected SMMU implementations.
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this program; if not, write to the Free Software
15 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
16 *
17 * Copyright (C) 2013 ARM Limited
18 *
19 * Author: Will Deacon <will.deacon@arm.com>
20 *
21 * This driver currently supports:
22 * - SMMUv1 and v2 implementations
23 * - Stream-matching and stream-indexing
24 * - v7/v8 long-descriptor format
25 * - Non-secure access to the SMMU
26 * - 4k and 64k pages, with contiguous pte hints.
Will Deacon28d60072014-09-01 16:24:48 +010027 * - Up to 48-bit addressing (dependent on VA_BITS)
Will Deacon45ae7cf2013-06-24 18:31:25 +010028 * - Context fault reporting
29 */
30
31#define pr_fmt(fmt) "arm-smmu: " fmt
32
33#include <linux/delay.h>
34#include <linux/dma-mapping.h>
35#include <linux/err.h>
36#include <linux/interrupt.h>
37#include <linux/io.h>
38#include <linux/iommu.h>
39#include <linux/mm.h>
40#include <linux/module.h>
41#include <linux/of.h>
Will Deacona9a1b0b2014-05-01 18:05:08 +010042#include <linux/pci.h>
Will Deacon45ae7cf2013-06-24 18:31:25 +010043#include <linux/platform_device.h>
44#include <linux/slab.h>
45#include <linux/spinlock.h>
46
47#include <linux/amba/bus.h>
48
49#include <asm/pgalloc.h>
50
51/* Maximum number of stream IDs assigned to a single device */
Andreas Herrmann636e97b2014-01-30 18:18:08 +000052#define MAX_MASTER_STREAMIDS MAX_PHANDLE_ARGS
Will Deacon45ae7cf2013-06-24 18:31:25 +010053
54/* Maximum number of context banks per SMMU */
55#define ARM_SMMU_MAX_CBS 128
56
57/* Maximum number of mapping groups per SMMU */
58#define ARM_SMMU_MAX_SMRS 128
59
Will Deacon45ae7cf2013-06-24 18:31:25 +010060/* SMMU global address space */
61#define ARM_SMMU_GR0(smmu) ((smmu)->base)
Will Deaconc757e852014-07-30 11:33:25 +010062#define ARM_SMMU_GR1(smmu) ((smmu)->base + (1 << (smmu)->pgshift))
Will Deacon45ae7cf2013-06-24 18:31:25 +010063
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +000064/*
65 * SMMU global address space with conditional offset to access secure
66 * aliases of non-secure registers (e.g. nsCR0: 0x400, nsGFSR: 0x448,
67 * nsGFSYNR0: 0x450)
68 */
69#define ARM_SMMU_GR0_NS(smmu) \
70 ((smmu)->base + \
71 ((smmu->options & ARM_SMMU_OPT_SECURE_CFG_ACCESS) \
72 ? 0x400 : 0))
73
Will Deacon45ae7cf2013-06-24 18:31:25 +010074/* Page table bits */
Will Deaconcf2d45b2013-11-05 16:32:00 +000075#define ARM_SMMU_PTE_XN (((pteval_t)3) << 53)
Will Deacon45ae7cf2013-06-24 18:31:25 +010076#define ARM_SMMU_PTE_CONT (((pteval_t)1) << 52)
77#define ARM_SMMU_PTE_AF (((pteval_t)1) << 10)
78#define ARM_SMMU_PTE_SH_NS (((pteval_t)0) << 8)
79#define ARM_SMMU_PTE_SH_OS (((pteval_t)2) << 8)
80#define ARM_SMMU_PTE_SH_IS (((pteval_t)3) << 8)
Will Deaconcf2d45b2013-11-05 16:32:00 +000081#define ARM_SMMU_PTE_PAGE (((pteval_t)3) << 0)
Will Deacon45ae7cf2013-06-24 18:31:25 +010082
83#if PAGE_SIZE == SZ_4K
84#define ARM_SMMU_PTE_CONT_ENTRIES 16
85#elif PAGE_SIZE == SZ_64K
86#define ARM_SMMU_PTE_CONT_ENTRIES 32
87#else
88#define ARM_SMMU_PTE_CONT_ENTRIES 1
89#endif
90
91#define ARM_SMMU_PTE_CONT_SIZE (PAGE_SIZE * ARM_SMMU_PTE_CONT_ENTRIES)
92#define ARM_SMMU_PTE_CONT_MASK (~(ARM_SMMU_PTE_CONT_SIZE - 1))
Will Deacon45ae7cf2013-06-24 18:31:25 +010093
94/* Stage-1 PTE */
95#define ARM_SMMU_PTE_AP_UNPRIV (((pteval_t)1) << 6)
96#define ARM_SMMU_PTE_AP_RDONLY (((pteval_t)2) << 6)
97#define ARM_SMMU_PTE_ATTRINDX_SHIFT 2
Will Deacon1463fe42013-07-31 19:21:27 +010098#define ARM_SMMU_PTE_nG (((pteval_t)1) << 11)
Will Deacon45ae7cf2013-06-24 18:31:25 +010099
100/* Stage-2 PTE */
101#define ARM_SMMU_PTE_HAP_FAULT (((pteval_t)0) << 6)
102#define ARM_SMMU_PTE_HAP_READ (((pteval_t)1) << 6)
103#define ARM_SMMU_PTE_HAP_WRITE (((pteval_t)2) << 6)
104#define ARM_SMMU_PTE_MEMATTR_OIWB (((pteval_t)0xf) << 2)
105#define ARM_SMMU_PTE_MEMATTR_NC (((pteval_t)0x5) << 2)
106#define ARM_SMMU_PTE_MEMATTR_DEV (((pteval_t)0x1) << 2)
107
108/* Configuration registers */
109#define ARM_SMMU_GR0_sCR0 0x0
110#define sCR0_CLIENTPD (1 << 0)
111#define sCR0_GFRE (1 << 1)
112#define sCR0_GFIE (1 << 2)
113#define sCR0_GCFGFRE (1 << 4)
114#define sCR0_GCFGFIE (1 << 5)
115#define sCR0_USFCFG (1 << 10)
116#define sCR0_VMIDPNE (1 << 11)
117#define sCR0_PTM (1 << 12)
118#define sCR0_FB (1 << 13)
119#define sCR0_BSU_SHIFT 14
120#define sCR0_BSU_MASK 0x3
121
122/* Identification registers */
123#define ARM_SMMU_GR0_ID0 0x20
124#define ARM_SMMU_GR0_ID1 0x24
125#define ARM_SMMU_GR0_ID2 0x28
126#define ARM_SMMU_GR0_ID3 0x2c
127#define ARM_SMMU_GR0_ID4 0x30
128#define ARM_SMMU_GR0_ID5 0x34
129#define ARM_SMMU_GR0_ID6 0x38
130#define ARM_SMMU_GR0_ID7 0x3c
131#define ARM_SMMU_GR0_sGFSR 0x48
132#define ARM_SMMU_GR0_sGFSYNR0 0x50
133#define ARM_SMMU_GR0_sGFSYNR1 0x54
134#define ARM_SMMU_GR0_sGFSYNR2 0x58
135#define ARM_SMMU_GR0_PIDR0 0xfe0
136#define ARM_SMMU_GR0_PIDR1 0xfe4
137#define ARM_SMMU_GR0_PIDR2 0xfe8
138
139#define ID0_S1TS (1 << 30)
140#define ID0_S2TS (1 << 29)
141#define ID0_NTS (1 << 28)
142#define ID0_SMS (1 << 27)
143#define ID0_PTFS_SHIFT 24
144#define ID0_PTFS_MASK 0x2
145#define ID0_PTFS_V8_ONLY 0x2
146#define ID0_CTTW (1 << 14)
147#define ID0_NUMIRPT_SHIFT 16
148#define ID0_NUMIRPT_MASK 0xff
Olav Haugan3c8766d2014-08-22 17:12:32 -0700149#define ID0_NUMSIDB_SHIFT 9
150#define ID0_NUMSIDB_MASK 0xf
Will Deacon45ae7cf2013-06-24 18:31:25 +0100151#define ID0_NUMSMRG_SHIFT 0
152#define ID0_NUMSMRG_MASK 0xff
153
154#define ID1_PAGESIZE (1 << 31)
155#define ID1_NUMPAGENDXB_SHIFT 28
156#define ID1_NUMPAGENDXB_MASK 7
157#define ID1_NUMS2CB_SHIFT 16
158#define ID1_NUMS2CB_MASK 0xff
159#define ID1_NUMCB_SHIFT 0
160#define ID1_NUMCB_MASK 0xff
161
162#define ID2_OAS_SHIFT 4
163#define ID2_OAS_MASK 0xf
164#define ID2_IAS_SHIFT 0
165#define ID2_IAS_MASK 0xf
166#define ID2_UBS_SHIFT 8
167#define ID2_UBS_MASK 0xf
168#define ID2_PTFS_4K (1 << 12)
169#define ID2_PTFS_16K (1 << 13)
170#define ID2_PTFS_64K (1 << 14)
171
172#define PIDR2_ARCH_SHIFT 4
173#define PIDR2_ARCH_MASK 0xf
174
175/* Global TLB invalidation */
176#define ARM_SMMU_GR0_STLBIALL 0x60
177#define ARM_SMMU_GR0_TLBIVMID 0x64
178#define ARM_SMMU_GR0_TLBIALLNSNH 0x68
179#define ARM_SMMU_GR0_TLBIALLH 0x6c
180#define ARM_SMMU_GR0_sTLBGSYNC 0x70
181#define ARM_SMMU_GR0_sTLBGSTATUS 0x74
182#define sTLBGSTATUS_GSACTIVE (1 << 0)
183#define TLB_LOOP_TIMEOUT 1000000 /* 1s! */
184
185/* Stream mapping registers */
186#define ARM_SMMU_GR0_SMR(n) (0x800 + ((n) << 2))
187#define SMR_VALID (1 << 31)
188#define SMR_MASK_SHIFT 16
189#define SMR_MASK_MASK 0x7fff
190#define SMR_ID_SHIFT 0
191#define SMR_ID_MASK 0x7fff
192
193#define ARM_SMMU_GR0_S2CR(n) (0xc00 + ((n) << 2))
194#define S2CR_CBNDX_SHIFT 0
195#define S2CR_CBNDX_MASK 0xff
196#define S2CR_TYPE_SHIFT 16
197#define S2CR_TYPE_MASK 0x3
198#define S2CR_TYPE_TRANS (0 << S2CR_TYPE_SHIFT)
199#define S2CR_TYPE_BYPASS (1 << S2CR_TYPE_SHIFT)
200#define S2CR_TYPE_FAULT (2 << S2CR_TYPE_SHIFT)
201
202/* Context bank attribute registers */
203#define ARM_SMMU_GR1_CBAR(n) (0x0 + ((n) << 2))
204#define CBAR_VMID_SHIFT 0
205#define CBAR_VMID_MASK 0xff
Will Deacon57ca90f2014-02-06 14:59:05 +0000206#define CBAR_S1_BPSHCFG_SHIFT 8
207#define CBAR_S1_BPSHCFG_MASK 3
208#define CBAR_S1_BPSHCFG_NSH 3
Will Deacon45ae7cf2013-06-24 18:31:25 +0100209#define CBAR_S1_MEMATTR_SHIFT 12
210#define CBAR_S1_MEMATTR_MASK 0xf
211#define CBAR_S1_MEMATTR_WB 0xf
212#define CBAR_TYPE_SHIFT 16
213#define CBAR_TYPE_MASK 0x3
214#define CBAR_TYPE_S2_TRANS (0 << CBAR_TYPE_SHIFT)
215#define CBAR_TYPE_S1_TRANS_S2_BYPASS (1 << CBAR_TYPE_SHIFT)
216#define CBAR_TYPE_S1_TRANS_S2_FAULT (2 << CBAR_TYPE_SHIFT)
217#define CBAR_TYPE_S1_TRANS_S2_TRANS (3 << CBAR_TYPE_SHIFT)
218#define CBAR_IRPTNDX_SHIFT 24
219#define CBAR_IRPTNDX_MASK 0xff
220
221#define ARM_SMMU_GR1_CBA2R(n) (0x800 + ((n) << 2))
222#define CBA2R_RW64_32BIT (0 << 0)
223#define CBA2R_RW64_64BIT (1 << 0)
224
225/* Translation context bank */
226#define ARM_SMMU_CB_BASE(smmu) ((smmu)->base + ((smmu)->size >> 1))
Will Deaconc757e852014-07-30 11:33:25 +0100227#define ARM_SMMU_CB(smmu, n) ((n) * (1 << (smmu)->pgshift))
Will Deacon45ae7cf2013-06-24 18:31:25 +0100228
229#define ARM_SMMU_CB_SCTLR 0x0
230#define ARM_SMMU_CB_RESUME 0x8
231#define ARM_SMMU_CB_TTBCR2 0x10
232#define ARM_SMMU_CB_TTBR0_LO 0x20
233#define ARM_SMMU_CB_TTBR0_HI 0x24
234#define ARM_SMMU_CB_TTBCR 0x30
235#define ARM_SMMU_CB_S1_MAIR0 0x38
236#define ARM_SMMU_CB_FSR 0x58
237#define ARM_SMMU_CB_FAR_LO 0x60
238#define ARM_SMMU_CB_FAR_HI 0x64
239#define ARM_SMMU_CB_FSYNR0 0x68
Will Deacon1463fe42013-07-31 19:21:27 +0100240#define ARM_SMMU_CB_S1_TLBIASID 0x610
Will Deacon45ae7cf2013-06-24 18:31:25 +0100241
242#define SCTLR_S1_ASIDPNE (1 << 12)
243#define SCTLR_CFCFG (1 << 7)
244#define SCTLR_CFIE (1 << 6)
245#define SCTLR_CFRE (1 << 5)
246#define SCTLR_E (1 << 4)
247#define SCTLR_AFE (1 << 2)
248#define SCTLR_TRE (1 << 1)
249#define SCTLR_M (1 << 0)
250#define SCTLR_EAE_SBOP (SCTLR_AFE | SCTLR_TRE)
251
252#define RESUME_RETRY (0 << 0)
253#define RESUME_TERMINATE (1 << 0)
254
255#define TTBCR_EAE (1 << 31)
256
257#define TTBCR_PASIZE_SHIFT 16
258#define TTBCR_PASIZE_MASK 0x7
259
260#define TTBCR_TG0_4K (0 << 14)
261#define TTBCR_TG0_64K (1 << 14)
262
263#define TTBCR_SH0_SHIFT 12
264#define TTBCR_SH0_MASK 0x3
265#define TTBCR_SH_NS 0
266#define TTBCR_SH_OS 2
267#define TTBCR_SH_IS 3
268
269#define TTBCR_ORGN0_SHIFT 10
270#define TTBCR_IRGN0_SHIFT 8
271#define TTBCR_RGN_MASK 0x3
272#define TTBCR_RGN_NC 0
273#define TTBCR_RGN_WBWA 1
274#define TTBCR_RGN_WT 2
275#define TTBCR_RGN_WB 3
276
277#define TTBCR_SL0_SHIFT 6
278#define TTBCR_SL0_MASK 0x3
279#define TTBCR_SL0_LVL_2 0
280#define TTBCR_SL0_LVL_1 1
281
282#define TTBCR_T1SZ_SHIFT 16
283#define TTBCR_T0SZ_SHIFT 0
284#define TTBCR_SZ_MASK 0xf
285
286#define TTBCR2_SEP_SHIFT 15
287#define TTBCR2_SEP_MASK 0x7
288
289#define TTBCR2_PASIZE_SHIFT 0
290#define TTBCR2_PASIZE_MASK 0x7
291
292/* Common definitions for PASize and SEP fields */
293#define TTBCR2_ADDR_32 0
294#define TTBCR2_ADDR_36 1
295#define TTBCR2_ADDR_40 2
296#define TTBCR2_ADDR_42 3
297#define TTBCR2_ADDR_44 4
298#define TTBCR2_ADDR_48 5
299
Will Deacon1463fe42013-07-31 19:21:27 +0100300#define TTBRn_HI_ASID_SHIFT 16
301
Will Deacon45ae7cf2013-06-24 18:31:25 +0100302#define MAIR_ATTR_SHIFT(n) ((n) << 3)
303#define MAIR_ATTR_MASK 0xff
304#define MAIR_ATTR_DEVICE 0x04
305#define MAIR_ATTR_NC 0x44
306#define MAIR_ATTR_WBRWA 0xff
307#define MAIR_ATTR_IDX_NC 0
308#define MAIR_ATTR_IDX_CACHE 1
309#define MAIR_ATTR_IDX_DEV 2
310
311#define FSR_MULTI (1 << 31)
312#define FSR_SS (1 << 30)
313#define FSR_UUT (1 << 8)
314#define FSR_ASF (1 << 7)
315#define FSR_TLBLKF (1 << 6)
316#define FSR_TLBMCF (1 << 5)
317#define FSR_EF (1 << 4)
318#define FSR_PF (1 << 3)
319#define FSR_AFF (1 << 2)
320#define FSR_TF (1 << 1)
321
Mitchel Humpherys29073202014-07-08 09:52:18 -0700322#define FSR_IGN (FSR_AFF | FSR_ASF | \
323 FSR_TLBMCF | FSR_TLBLKF)
324#define FSR_FAULT (FSR_MULTI | FSR_SS | FSR_UUT | \
Will Deaconadaba322013-07-31 19:21:26 +0100325 FSR_EF | FSR_PF | FSR_TF | FSR_IGN)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100326
327#define FSYNR0_WNR (1 << 4)
328
Will Deacon4cf740b2014-07-14 19:47:39 +0100329static int force_stage;
330module_param_named(force_stage, force_stage, int, S_IRUGO | S_IWUSR);
331MODULE_PARM_DESC(force_stage,
332 "Force SMMU mappings to be installed at a particular stage of translation. A value of '1' or '2' forces the corresponding stage. All other values are ignored (i.e. no stage is forced). Note that selecting a specific stage will disable support for nested translation.");
333
Robin Murphy09360402014-08-28 17:51:59 +0100334enum arm_smmu_arch_version {
335 ARM_SMMU_V1 = 1,
336 ARM_SMMU_V2,
337};
338
Will Deacon45ae7cf2013-06-24 18:31:25 +0100339struct arm_smmu_smr {
340 u8 idx;
341 u16 mask;
342 u16 id;
343};
344
Will Deacona9a1b0b2014-05-01 18:05:08 +0100345struct arm_smmu_master_cfg {
Will Deacon45ae7cf2013-06-24 18:31:25 +0100346 int num_streamids;
347 u16 streamids[MAX_MASTER_STREAMIDS];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100348 struct arm_smmu_smr *smrs;
349};
350
Will Deacona9a1b0b2014-05-01 18:05:08 +0100351struct arm_smmu_master {
352 struct device_node *of_node;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100353 struct rb_node node;
354 struct arm_smmu_master_cfg cfg;
355};
356
Will Deacon45ae7cf2013-06-24 18:31:25 +0100357struct arm_smmu_device {
358 struct device *dev;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100359
360 void __iomem *base;
361 unsigned long size;
Will Deaconc757e852014-07-30 11:33:25 +0100362 unsigned long pgshift;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100363
364#define ARM_SMMU_FEAT_COHERENT_WALK (1 << 0)
365#define ARM_SMMU_FEAT_STREAM_MATCH (1 << 1)
366#define ARM_SMMU_FEAT_TRANS_S1 (1 << 2)
367#define ARM_SMMU_FEAT_TRANS_S2 (1 << 3)
368#define ARM_SMMU_FEAT_TRANS_NESTED (1 << 4)
369 u32 features;
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000370
371#define ARM_SMMU_OPT_SECURE_CFG_ACCESS (1 << 0)
372 u32 options;
Robin Murphy09360402014-08-28 17:51:59 +0100373 enum arm_smmu_arch_version version;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100374
375 u32 num_context_banks;
376 u32 num_s2_context_banks;
377 DECLARE_BITMAP(context_map, ARM_SMMU_MAX_CBS);
378 atomic_t irptndx;
379
380 u32 num_mapping_groups;
381 DECLARE_BITMAP(smr_map, ARM_SMMU_MAX_SMRS);
382
Will Deacon28d60072014-09-01 16:24:48 +0100383 unsigned long s1_input_size;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100384 unsigned long s1_output_size;
Will Deacon28d60072014-09-01 16:24:48 +0100385 unsigned long s2_input_size;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100386 unsigned long s2_output_size;
387
388 u32 num_global_irqs;
389 u32 num_context_irqs;
390 unsigned int *irqs;
391
Will Deacon45ae7cf2013-06-24 18:31:25 +0100392 struct list_head list;
393 struct rb_root masters;
394};
395
396struct arm_smmu_cfg {
Will Deacon45ae7cf2013-06-24 18:31:25 +0100397 u8 cbndx;
398 u8 irptndx;
399 u32 cbar;
400 pgd_t *pgd;
401};
Dan Carpenterfaea13b72013-08-21 09:33:30 +0100402#define INVALID_IRPTNDX 0xff
Will Deacon45ae7cf2013-06-24 18:31:25 +0100403
Will Deaconecfadb62013-07-31 19:21:28 +0100404#define ARM_SMMU_CB_ASID(cfg) ((cfg)->cbndx)
405#define ARM_SMMU_CB_VMID(cfg) ((cfg)->cbndx + 1)
406
Will Deaconc752ce42014-06-25 22:46:31 +0100407enum arm_smmu_domain_stage {
408 ARM_SMMU_DOMAIN_S1 = 0,
409 ARM_SMMU_DOMAIN_S2,
410 ARM_SMMU_DOMAIN_NESTED,
411};
412
Will Deacon45ae7cf2013-06-24 18:31:25 +0100413struct arm_smmu_domain {
Will Deacon44680ee2014-06-25 11:29:12 +0100414 struct arm_smmu_device *smmu;
415 struct arm_smmu_cfg cfg;
Will Deaconc752ce42014-06-25 22:46:31 +0100416 enum arm_smmu_domain_stage stage;
Will Deaconc9d09e22014-02-04 22:12:42 +0000417 spinlock_t lock;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100418};
419
420static DEFINE_SPINLOCK(arm_smmu_devices_lock);
421static LIST_HEAD(arm_smmu_devices);
422
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000423struct arm_smmu_option_prop {
424 u32 opt;
425 const char *prop;
426};
427
Mitchel Humpherys29073202014-07-08 09:52:18 -0700428static struct arm_smmu_option_prop arm_smmu_options[] = {
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000429 { ARM_SMMU_OPT_SECURE_CFG_ACCESS, "calxeda,smmu-secure-config-access" },
430 { 0, NULL},
431};
432
433static void parse_driver_options(struct arm_smmu_device *smmu)
434{
435 int i = 0;
Mitchel Humpherys29073202014-07-08 09:52:18 -0700436
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000437 do {
438 if (of_property_read_bool(smmu->dev->of_node,
439 arm_smmu_options[i].prop)) {
440 smmu->options |= arm_smmu_options[i].opt;
441 dev_notice(smmu->dev, "option %s\n",
442 arm_smmu_options[i].prop);
443 }
444 } while (arm_smmu_options[++i].opt);
445}
446
Will Deacon8f68f8e2014-07-15 11:27:08 +0100447static struct device_node *dev_get_dev_node(struct device *dev)
Will Deacona9a1b0b2014-05-01 18:05:08 +0100448{
449 if (dev_is_pci(dev)) {
450 struct pci_bus *bus = to_pci_dev(dev)->bus;
Mitchel Humpherys29073202014-07-08 09:52:18 -0700451
Will Deacona9a1b0b2014-05-01 18:05:08 +0100452 while (!pci_is_root_bus(bus))
453 bus = bus->parent;
Will Deacon8f68f8e2014-07-15 11:27:08 +0100454 return bus->bridge->parent->of_node;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100455 }
456
Will Deacon8f68f8e2014-07-15 11:27:08 +0100457 return dev->of_node;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100458}
459
Will Deacon45ae7cf2013-06-24 18:31:25 +0100460static struct arm_smmu_master *find_smmu_master(struct arm_smmu_device *smmu,
461 struct device_node *dev_node)
462{
463 struct rb_node *node = smmu->masters.rb_node;
464
465 while (node) {
466 struct arm_smmu_master *master;
Mitchel Humpherys29073202014-07-08 09:52:18 -0700467
Will Deacon45ae7cf2013-06-24 18:31:25 +0100468 master = container_of(node, struct arm_smmu_master, node);
469
470 if (dev_node < master->of_node)
471 node = node->rb_left;
472 else if (dev_node > master->of_node)
473 node = node->rb_right;
474 else
475 return master;
476 }
477
478 return NULL;
479}
480
Will Deacona9a1b0b2014-05-01 18:05:08 +0100481static struct arm_smmu_master_cfg *
Will Deacon8f68f8e2014-07-15 11:27:08 +0100482find_smmu_master_cfg(struct device *dev)
Will Deacona9a1b0b2014-05-01 18:05:08 +0100483{
Will Deacon8f68f8e2014-07-15 11:27:08 +0100484 struct arm_smmu_master_cfg *cfg = NULL;
485 struct iommu_group *group = iommu_group_get(dev);
Will Deacona9a1b0b2014-05-01 18:05:08 +0100486
Will Deacon8f68f8e2014-07-15 11:27:08 +0100487 if (group) {
488 cfg = iommu_group_get_iommudata(group);
489 iommu_group_put(group);
490 }
Will Deacona9a1b0b2014-05-01 18:05:08 +0100491
Will Deacon8f68f8e2014-07-15 11:27:08 +0100492 return cfg;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100493}
494
Will Deacon45ae7cf2013-06-24 18:31:25 +0100495static int insert_smmu_master(struct arm_smmu_device *smmu,
496 struct arm_smmu_master *master)
497{
498 struct rb_node **new, *parent;
499
500 new = &smmu->masters.rb_node;
501 parent = NULL;
502 while (*new) {
Mitchel Humpherys29073202014-07-08 09:52:18 -0700503 struct arm_smmu_master *this
504 = container_of(*new, struct arm_smmu_master, node);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100505
506 parent = *new;
507 if (master->of_node < this->of_node)
508 new = &((*new)->rb_left);
509 else if (master->of_node > this->of_node)
510 new = &((*new)->rb_right);
511 else
512 return -EEXIST;
513 }
514
515 rb_link_node(&master->node, parent, new);
516 rb_insert_color(&master->node, &smmu->masters);
517 return 0;
518}
519
520static int register_smmu_master(struct arm_smmu_device *smmu,
521 struct device *dev,
522 struct of_phandle_args *masterspec)
523{
524 int i;
525 struct arm_smmu_master *master;
526
527 master = find_smmu_master(smmu, masterspec->np);
528 if (master) {
529 dev_err(dev,
530 "rejecting multiple registrations for master device %s\n",
531 masterspec->np->name);
532 return -EBUSY;
533 }
534
535 if (masterspec->args_count > MAX_MASTER_STREAMIDS) {
536 dev_err(dev,
537 "reached maximum number (%d) of stream IDs for master device %s\n",
538 MAX_MASTER_STREAMIDS, masterspec->np->name);
539 return -ENOSPC;
540 }
541
542 master = devm_kzalloc(dev, sizeof(*master), GFP_KERNEL);
543 if (!master)
544 return -ENOMEM;
545
Will Deacona9a1b0b2014-05-01 18:05:08 +0100546 master->of_node = masterspec->np;
547 master->cfg.num_streamids = masterspec->args_count;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100548
Olav Haugan3c8766d2014-08-22 17:12:32 -0700549 for (i = 0; i < master->cfg.num_streamids; ++i) {
550 u16 streamid = masterspec->args[i];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100551
Olav Haugan3c8766d2014-08-22 17:12:32 -0700552 if (!(smmu->features & ARM_SMMU_FEAT_STREAM_MATCH) &&
553 (streamid >= smmu->num_mapping_groups)) {
554 dev_err(dev,
555 "stream ID for master device %s greater than maximum allowed (%d)\n",
556 masterspec->np->name, smmu->num_mapping_groups);
557 return -ERANGE;
558 }
559 master->cfg.streamids[i] = streamid;
560 }
Will Deacon45ae7cf2013-06-24 18:31:25 +0100561 return insert_smmu_master(smmu, master);
562}
563
Will Deacon44680ee2014-06-25 11:29:12 +0100564static struct arm_smmu_device *find_smmu_for_device(struct device *dev)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100565{
Will Deacon44680ee2014-06-25 11:29:12 +0100566 struct arm_smmu_device *smmu;
Will Deacona9a1b0b2014-05-01 18:05:08 +0100567 struct arm_smmu_master *master = NULL;
Will Deacon8f68f8e2014-07-15 11:27:08 +0100568 struct device_node *dev_node = dev_get_dev_node(dev);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100569
570 spin_lock(&arm_smmu_devices_lock);
Will Deacon44680ee2014-06-25 11:29:12 +0100571 list_for_each_entry(smmu, &arm_smmu_devices, list) {
Will Deacona9a1b0b2014-05-01 18:05:08 +0100572 master = find_smmu_master(smmu, dev_node);
573 if (master)
574 break;
575 }
Will Deacon45ae7cf2013-06-24 18:31:25 +0100576 spin_unlock(&arm_smmu_devices_lock);
Will Deacon44680ee2014-06-25 11:29:12 +0100577
Will Deacona9a1b0b2014-05-01 18:05:08 +0100578 return master ? smmu : NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100579}
580
581static int __arm_smmu_alloc_bitmap(unsigned long *map, int start, int end)
582{
583 int idx;
584
585 do {
586 idx = find_next_zero_bit(map, end, start);
587 if (idx == end)
588 return -ENOSPC;
589 } while (test_and_set_bit(idx, map));
590
591 return idx;
592}
593
594static void __arm_smmu_free_bitmap(unsigned long *map, int idx)
595{
596 clear_bit(idx, map);
597}
598
599/* Wait for any pending TLB invalidations to complete */
600static void arm_smmu_tlb_sync(struct arm_smmu_device *smmu)
601{
602 int count = 0;
603 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
604
605 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_sTLBGSYNC);
606 while (readl_relaxed(gr0_base + ARM_SMMU_GR0_sTLBGSTATUS)
607 & sTLBGSTATUS_GSACTIVE) {
608 cpu_relax();
609 if (++count == TLB_LOOP_TIMEOUT) {
610 dev_err_ratelimited(smmu->dev,
611 "TLB sync timed out -- SMMU may be deadlocked\n");
612 return;
613 }
614 udelay(1);
615 }
616}
617
Will Deacon44680ee2014-06-25 11:29:12 +0100618static void arm_smmu_tlb_inv_context(struct arm_smmu_domain *smmu_domain)
Will Deacon1463fe42013-07-31 19:21:27 +0100619{
Will Deacon44680ee2014-06-25 11:29:12 +0100620 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
621 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon1463fe42013-07-31 19:21:27 +0100622 void __iomem *base = ARM_SMMU_GR0(smmu);
623 bool stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
624
625 if (stage1) {
626 base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deaconecfadb62013-07-31 19:21:28 +0100627 writel_relaxed(ARM_SMMU_CB_ASID(cfg),
628 base + ARM_SMMU_CB_S1_TLBIASID);
Will Deacon1463fe42013-07-31 19:21:27 +0100629 } else {
630 base = ARM_SMMU_GR0(smmu);
Will Deaconecfadb62013-07-31 19:21:28 +0100631 writel_relaxed(ARM_SMMU_CB_VMID(cfg),
632 base + ARM_SMMU_GR0_TLBIVMID);
Will Deacon1463fe42013-07-31 19:21:27 +0100633 }
634
635 arm_smmu_tlb_sync(smmu);
636}
637
Will Deacon45ae7cf2013-06-24 18:31:25 +0100638static irqreturn_t arm_smmu_context_fault(int irq, void *dev)
639{
640 int flags, ret;
641 u32 fsr, far, fsynr, resume;
642 unsigned long iova;
643 struct iommu_domain *domain = dev;
644 struct arm_smmu_domain *smmu_domain = domain->priv;
Will Deacon44680ee2014-06-25 11:29:12 +0100645 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
646 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100647 void __iomem *cb_base;
648
Will Deacon44680ee2014-06-25 11:29:12 +0100649 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100650 fsr = readl_relaxed(cb_base + ARM_SMMU_CB_FSR);
651
652 if (!(fsr & FSR_FAULT))
653 return IRQ_NONE;
654
655 if (fsr & FSR_IGN)
656 dev_err_ratelimited(smmu->dev,
Hans Wennborg70c9a7d2014-08-06 05:42:01 +0100657 "Unexpected context fault (fsr 0x%x)\n",
Will Deacon45ae7cf2013-06-24 18:31:25 +0100658 fsr);
659
660 fsynr = readl_relaxed(cb_base + ARM_SMMU_CB_FSYNR0);
661 flags = fsynr & FSYNR0_WNR ? IOMMU_FAULT_WRITE : IOMMU_FAULT_READ;
662
663 far = readl_relaxed(cb_base + ARM_SMMU_CB_FAR_LO);
664 iova = far;
665#ifdef CONFIG_64BIT
666 far = readl_relaxed(cb_base + ARM_SMMU_CB_FAR_HI);
667 iova |= ((unsigned long)far << 32);
668#endif
669
670 if (!report_iommu_fault(domain, smmu->dev, iova, flags)) {
671 ret = IRQ_HANDLED;
672 resume = RESUME_RETRY;
673 } else {
Andreas Herrmann2ef0f032013-10-01 13:39:08 +0100674 dev_err_ratelimited(smmu->dev,
675 "Unhandled context fault: iova=0x%08lx, fsynr=0x%x, cb=%d\n",
Will Deacon44680ee2014-06-25 11:29:12 +0100676 iova, fsynr, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100677 ret = IRQ_NONE;
678 resume = RESUME_TERMINATE;
679 }
680
681 /* Clear the faulting FSR */
682 writel(fsr, cb_base + ARM_SMMU_CB_FSR);
683
684 /* Retry or terminate any stalled transactions */
685 if (fsr & FSR_SS)
686 writel_relaxed(resume, cb_base + ARM_SMMU_CB_RESUME);
687
688 return ret;
689}
690
691static irqreturn_t arm_smmu_global_fault(int irq, void *dev)
692{
693 u32 gfsr, gfsynr0, gfsynr1, gfsynr2;
694 struct arm_smmu_device *smmu = dev;
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000695 void __iomem *gr0_base = ARM_SMMU_GR0_NS(smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100696
697 gfsr = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSR);
698 gfsynr0 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR0);
699 gfsynr1 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR1);
700 gfsynr2 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR2);
701
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +0000702 if (!gfsr)
703 return IRQ_NONE;
704
Will Deacon45ae7cf2013-06-24 18:31:25 +0100705 dev_err_ratelimited(smmu->dev,
706 "Unexpected global fault, this could be serious\n");
707 dev_err_ratelimited(smmu->dev,
708 "\tGFSR 0x%08x, GFSYNR0 0x%08x, GFSYNR1 0x%08x, GFSYNR2 0x%08x\n",
709 gfsr, gfsynr0, gfsynr1, gfsynr2);
710
711 writel(gfsr, gr0_base + ARM_SMMU_GR0_sGFSR);
Will Deaconadaba322013-07-31 19:21:26 +0100712 return IRQ_HANDLED;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100713}
714
Will Deacon6dd35f42014-02-05 17:49:34 +0000715static void arm_smmu_flush_pgtable(struct arm_smmu_device *smmu, void *addr,
716 size_t size)
717{
718 unsigned long offset = (unsigned long)addr & ~PAGE_MASK;
719
720
721 /* Ensure new page tables are visible to the hardware walker */
722 if (smmu->features & ARM_SMMU_FEAT_COHERENT_WALK) {
Will Deacon3aa80ea2014-02-05 23:35:47 +0000723 dsb(ishst);
Will Deacon6dd35f42014-02-05 17:49:34 +0000724 } else {
725 /*
726 * If the SMMU can't walk tables in the CPU caches, treat them
727 * like non-coherent DMA since we need to flush the new entries
728 * all the way out to memory. There's no possibility of
729 * recursion here as the SMMU table walker will not be wired
730 * through another SMMU.
731 */
732 dma_map_page(smmu->dev, virt_to_page(addr), offset, size,
733 DMA_TO_DEVICE);
734 }
735}
736
Will Deacon45ae7cf2013-06-24 18:31:25 +0100737static void arm_smmu_init_context_bank(struct arm_smmu_domain *smmu_domain)
738{
739 u32 reg;
740 bool stage1;
Will Deacon44680ee2014-06-25 11:29:12 +0100741 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
742 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100743 void __iomem *cb_base, *gr0_base, *gr1_base;
744
745 gr0_base = ARM_SMMU_GR0(smmu);
746 gr1_base = ARM_SMMU_GR1(smmu);
Will Deacon44680ee2014-06-25 11:29:12 +0100747 stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
748 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100749
750 /* CBAR */
Will Deacon44680ee2014-06-25 11:29:12 +0100751 reg = cfg->cbar;
Robin Murphy09360402014-08-28 17:51:59 +0100752 if (smmu->version == ARM_SMMU_V1)
Mitchel Humpherys29073202014-07-08 09:52:18 -0700753 reg |= cfg->irptndx << CBAR_IRPTNDX_SHIFT;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100754
Will Deacon57ca90f2014-02-06 14:59:05 +0000755 /*
756 * Use the weakest shareability/memory types, so they are
757 * overridden by the ttbcr/pte.
758 */
759 if (stage1) {
760 reg |= (CBAR_S1_BPSHCFG_NSH << CBAR_S1_BPSHCFG_SHIFT) |
761 (CBAR_S1_MEMATTR_WB << CBAR_S1_MEMATTR_SHIFT);
762 } else {
Will Deacon44680ee2014-06-25 11:29:12 +0100763 reg |= ARM_SMMU_CB_VMID(cfg) << CBAR_VMID_SHIFT;
Will Deacon57ca90f2014-02-06 14:59:05 +0000764 }
Will Deacon44680ee2014-06-25 11:29:12 +0100765 writel_relaxed(reg, gr1_base + ARM_SMMU_GR1_CBAR(cfg->cbndx));
Will Deacon45ae7cf2013-06-24 18:31:25 +0100766
Robin Murphy09360402014-08-28 17:51:59 +0100767 if (smmu->version > ARM_SMMU_V1) {
Will Deacon45ae7cf2013-06-24 18:31:25 +0100768 /* CBA2R */
769#ifdef CONFIG_64BIT
770 reg = CBA2R_RW64_64BIT;
771#else
772 reg = CBA2R_RW64_32BIT;
773#endif
774 writel_relaxed(reg,
Will Deacon44680ee2014-06-25 11:29:12 +0100775 gr1_base + ARM_SMMU_GR1_CBA2R(cfg->cbndx));
Will Deacon45ae7cf2013-06-24 18:31:25 +0100776
777 /* TTBCR2 */
Will Deacon28d60072014-09-01 16:24:48 +0100778 switch (smmu->s1_input_size) {
Will Deacon45ae7cf2013-06-24 18:31:25 +0100779 case 32:
780 reg = (TTBCR2_ADDR_32 << TTBCR2_SEP_SHIFT);
781 break;
782 case 36:
783 reg = (TTBCR2_ADDR_36 << TTBCR2_SEP_SHIFT);
784 break;
785 case 39:
Will Deacon4d09d992014-07-23 13:20:43 +0100786 case 40:
Will Deacon45ae7cf2013-06-24 18:31:25 +0100787 reg = (TTBCR2_ADDR_40 << TTBCR2_SEP_SHIFT);
788 break;
789 case 42:
790 reg = (TTBCR2_ADDR_42 << TTBCR2_SEP_SHIFT);
791 break;
792 case 44:
793 reg = (TTBCR2_ADDR_44 << TTBCR2_SEP_SHIFT);
794 break;
795 case 48:
796 reg = (TTBCR2_ADDR_48 << TTBCR2_SEP_SHIFT);
797 break;
798 }
799
800 switch (smmu->s1_output_size) {
801 case 32:
802 reg |= (TTBCR2_ADDR_32 << TTBCR2_PASIZE_SHIFT);
803 break;
804 case 36:
805 reg |= (TTBCR2_ADDR_36 << TTBCR2_PASIZE_SHIFT);
806 break;
807 case 39:
Will Deacon4d09d992014-07-23 13:20:43 +0100808 case 40:
Will Deacon45ae7cf2013-06-24 18:31:25 +0100809 reg |= (TTBCR2_ADDR_40 << TTBCR2_PASIZE_SHIFT);
810 break;
811 case 42:
812 reg |= (TTBCR2_ADDR_42 << TTBCR2_PASIZE_SHIFT);
813 break;
814 case 44:
815 reg |= (TTBCR2_ADDR_44 << TTBCR2_PASIZE_SHIFT);
816 break;
817 case 48:
818 reg |= (TTBCR2_ADDR_48 << TTBCR2_PASIZE_SHIFT);
819 break;
820 }
821
822 if (stage1)
823 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR2);
824 }
825
826 /* TTBR0 */
Will Deacon44680ee2014-06-25 11:29:12 +0100827 arm_smmu_flush_pgtable(smmu, cfg->pgd,
Will Deacon6dd35f42014-02-05 17:49:34 +0000828 PTRS_PER_PGD * sizeof(pgd_t));
Will Deacon44680ee2014-06-25 11:29:12 +0100829 reg = __pa(cfg->pgd);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100830 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBR0_LO);
Will Deacon44680ee2014-06-25 11:29:12 +0100831 reg = (phys_addr_t)__pa(cfg->pgd) >> 32;
Will Deacon1463fe42013-07-31 19:21:27 +0100832 if (stage1)
Will Deacon44680ee2014-06-25 11:29:12 +0100833 reg |= ARM_SMMU_CB_ASID(cfg) << TTBRn_HI_ASID_SHIFT;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100834 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBR0_HI);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100835
836 /*
837 * TTBCR
838 * We use long descriptor, with inner-shareable WBWA tables in TTBR0.
839 */
Robin Murphy09360402014-08-28 17:51:59 +0100840 if (smmu->version > ARM_SMMU_V1) {
Will Deacon45ae7cf2013-06-24 18:31:25 +0100841 if (PAGE_SIZE == SZ_4K)
842 reg = TTBCR_TG0_4K;
843 else
844 reg = TTBCR_TG0_64K;
845
846 if (!stage1) {
Will Deacon28d60072014-09-01 16:24:48 +0100847 reg |= (64 - smmu->s2_input_size) << TTBCR_T0SZ_SHIFT;
Will Deacona65217a2014-06-24 18:26:26 +0100848
Will Deacon45ae7cf2013-06-24 18:31:25 +0100849 switch (smmu->s2_output_size) {
850 case 32:
851 reg |= (TTBCR2_ADDR_32 << TTBCR_PASIZE_SHIFT);
852 break;
853 case 36:
854 reg |= (TTBCR2_ADDR_36 << TTBCR_PASIZE_SHIFT);
855 break;
856 case 40:
857 reg |= (TTBCR2_ADDR_40 << TTBCR_PASIZE_SHIFT);
858 break;
859 case 42:
860 reg |= (TTBCR2_ADDR_42 << TTBCR_PASIZE_SHIFT);
861 break;
862 case 44:
863 reg |= (TTBCR2_ADDR_44 << TTBCR_PASIZE_SHIFT);
864 break;
865 case 48:
866 reg |= (TTBCR2_ADDR_48 << TTBCR_PASIZE_SHIFT);
867 break;
868 }
869 } else {
Will Deacon28d60072014-09-01 16:24:48 +0100870 reg |= (64 - smmu->s1_input_size) << TTBCR_T0SZ_SHIFT;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100871 }
872 } else {
873 reg = 0;
874 }
875
876 reg |= TTBCR_EAE |
877 (TTBCR_SH_IS << TTBCR_SH0_SHIFT) |
878 (TTBCR_RGN_WBWA << TTBCR_ORGN0_SHIFT) |
Olav Haugan1fc870c2014-08-04 19:01:02 +0100879 (TTBCR_RGN_WBWA << TTBCR_IRGN0_SHIFT);
880
881 if (!stage1)
882 reg |= (TTBCR_SL0_LVL_1 << TTBCR_SL0_SHIFT);
883
Will Deacon45ae7cf2013-06-24 18:31:25 +0100884 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR);
885
886 /* MAIR0 (stage-1 only) */
887 if (stage1) {
888 reg = (MAIR_ATTR_NC << MAIR_ATTR_SHIFT(MAIR_ATTR_IDX_NC)) |
889 (MAIR_ATTR_WBRWA << MAIR_ATTR_SHIFT(MAIR_ATTR_IDX_CACHE)) |
890 (MAIR_ATTR_DEVICE << MAIR_ATTR_SHIFT(MAIR_ATTR_IDX_DEV));
891 writel_relaxed(reg, cb_base + ARM_SMMU_CB_S1_MAIR0);
892 }
893
Will Deacon45ae7cf2013-06-24 18:31:25 +0100894 /* SCTLR */
895 reg = SCTLR_CFCFG | SCTLR_CFIE | SCTLR_CFRE | SCTLR_M | SCTLR_EAE_SBOP;
896 if (stage1)
897 reg |= SCTLR_S1_ASIDPNE;
898#ifdef __BIG_ENDIAN
899 reg |= SCTLR_E;
900#endif
Will Deacon25724842013-08-21 13:49:53 +0100901 writel_relaxed(reg, cb_base + ARM_SMMU_CB_SCTLR);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100902}
903
904static int arm_smmu_init_domain_context(struct iommu_domain *domain,
Will Deacon44680ee2014-06-25 11:29:12 +0100905 struct arm_smmu_device *smmu)
Will Deacon45ae7cf2013-06-24 18:31:25 +0100906{
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100907 int irq, start, ret = 0;
908 unsigned long flags;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100909 struct arm_smmu_domain *smmu_domain = domain->priv;
Will Deacon44680ee2014-06-25 11:29:12 +0100910 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100911
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100912 spin_lock_irqsave(&smmu_domain->lock, flags);
913 if (smmu_domain->smmu)
914 goto out_unlock;
915
Will Deaconc752ce42014-06-25 22:46:31 +0100916 /*
917 * Mapping the requested stage onto what we support is surprisingly
918 * complicated, mainly because the spec allows S1+S2 SMMUs without
919 * support for nested translation. That means we end up with the
920 * following table:
921 *
922 * Requested Supported Actual
923 * S1 N S1
924 * S1 S1+S2 S1
925 * S1 S2 S2
926 * S1 S1 S1
927 * N N N
928 * N S1+S2 S2
929 * N S2 S2
930 * N S1 S1
931 *
932 * Note that you can't actually request stage-2 mappings.
933 */
934 if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S1))
935 smmu_domain->stage = ARM_SMMU_DOMAIN_S2;
936 if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S2))
937 smmu_domain->stage = ARM_SMMU_DOMAIN_S1;
938
939 switch (smmu_domain->stage) {
940 case ARM_SMMU_DOMAIN_S1:
941 cfg->cbar = CBAR_TYPE_S1_TRANS_S2_BYPASS;
942 start = smmu->num_s2_context_banks;
943 break;
944 case ARM_SMMU_DOMAIN_NESTED:
Will Deacon45ae7cf2013-06-24 18:31:25 +0100945 /*
946 * We will likely want to change this if/when KVM gets
947 * involved.
948 */
Will Deaconc752ce42014-06-25 22:46:31 +0100949 case ARM_SMMU_DOMAIN_S2:
Will Deacon9c5c92e2014-06-25 12:12:41 +0100950 cfg->cbar = CBAR_TYPE_S2_TRANS;
951 start = 0;
Will Deaconc752ce42014-06-25 22:46:31 +0100952 break;
953 default:
954 ret = -EINVAL;
955 goto out_unlock;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100956 }
957
958 ret = __arm_smmu_alloc_bitmap(smmu->context_map, start,
959 smmu->num_context_banks);
960 if (IS_ERR_VALUE(ret))
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100961 goto out_unlock;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100962
Will Deacon44680ee2014-06-25 11:29:12 +0100963 cfg->cbndx = ret;
Robin Murphy09360402014-08-28 17:51:59 +0100964 if (smmu->version == ARM_SMMU_V1) {
Will Deacon44680ee2014-06-25 11:29:12 +0100965 cfg->irptndx = atomic_inc_return(&smmu->irptndx);
966 cfg->irptndx %= smmu->num_context_irqs;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100967 } else {
Will Deacon44680ee2014-06-25 11:29:12 +0100968 cfg->irptndx = cfg->cbndx;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100969 }
970
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100971 ACCESS_ONCE(smmu_domain->smmu) = smmu;
972 arm_smmu_init_context_bank(smmu_domain);
973 spin_unlock_irqrestore(&smmu_domain->lock, flags);
974
Will Deacon44680ee2014-06-25 11:29:12 +0100975 irq = smmu->irqs[smmu->num_global_irqs + cfg->irptndx];
Will Deacon45ae7cf2013-06-24 18:31:25 +0100976 ret = request_irq(irq, arm_smmu_context_fault, IRQF_SHARED,
977 "arm-smmu-context-fault", domain);
978 if (IS_ERR_VALUE(ret)) {
979 dev_err(smmu->dev, "failed to request context IRQ %d (%u)\n",
Will Deacon44680ee2014-06-25 11:29:12 +0100980 cfg->irptndx, irq);
981 cfg->irptndx = INVALID_IRPTNDX;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100982 }
983
Will Deacona9a1b0b2014-05-01 18:05:08 +0100984 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100985
Mitchel Humpherysa18037b2014-07-30 18:58:13 +0100986out_unlock:
987 spin_unlock_irqrestore(&smmu_domain->lock, flags);
Will Deacon45ae7cf2013-06-24 18:31:25 +0100988 return ret;
989}
990
991static void arm_smmu_destroy_domain_context(struct iommu_domain *domain)
992{
993 struct arm_smmu_domain *smmu_domain = domain->priv;
Will Deacon44680ee2014-06-25 11:29:12 +0100994 struct arm_smmu_device *smmu = smmu_domain->smmu;
995 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
Will Deacon1463fe42013-07-31 19:21:27 +0100996 void __iomem *cb_base;
Will Deacon45ae7cf2013-06-24 18:31:25 +0100997 int irq;
998
999 if (!smmu)
1000 return;
1001
Will Deacon1463fe42013-07-31 19:21:27 +01001002 /* Disable the context bank and nuke the TLB before freeing it. */
Will Deacon44680ee2014-06-25 11:29:12 +01001003 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
Will Deacon1463fe42013-07-31 19:21:27 +01001004 writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR);
Will Deacon44680ee2014-06-25 11:29:12 +01001005 arm_smmu_tlb_inv_context(smmu_domain);
Will Deacon1463fe42013-07-31 19:21:27 +01001006
Will Deacon44680ee2014-06-25 11:29:12 +01001007 if (cfg->irptndx != INVALID_IRPTNDX) {
1008 irq = smmu->irqs[smmu->num_global_irqs + cfg->irptndx];
Will Deacon45ae7cf2013-06-24 18:31:25 +01001009 free_irq(irq, domain);
1010 }
1011
Will Deacon44680ee2014-06-25 11:29:12 +01001012 __arm_smmu_free_bitmap(smmu->context_map, cfg->cbndx);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001013}
1014
1015static int arm_smmu_domain_init(struct iommu_domain *domain)
1016{
1017 struct arm_smmu_domain *smmu_domain;
1018 pgd_t *pgd;
1019
1020 /*
1021 * Allocate the domain and initialise some of its data structures.
1022 * We can't really do anything meaningful until we've added a
1023 * master.
1024 */
1025 smmu_domain = kzalloc(sizeof(*smmu_domain), GFP_KERNEL);
1026 if (!smmu_domain)
1027 return -ENOMEM;
1028
Mitchel Humpherys29073202014-07-08 09:52:18 -07001029 pgd = kcalloc(PTRS_PER_PGD, sizeof(pgd_t), GFP_KERNEL);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001030 if (!pgd)
1031 goto out_free_domain;
Will Deacon44680ee2014-06-25 11:29:12 +01001032 smmu_domain->cfg.pgd = pgd;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001033
Will Deaconc9d09e22014-02-04 22:12:42 +00001034 spin_lock_init(&smmu_domain->lock);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001035 domain->priv = smmu_domain;
1036 return 0;
1037
1038out_free_domain:
1039 kfree(smmu_domain);
1040 return -ENOMEM;
1041}
1042
1043static void arm_smmu_free_ptes(pmd_t *pmd)
1044{
1045 pgtable_t table = pmd_pgtable(*pmd);
Mitchel Humpherys29073202014-07-08 09:52:18 -07001046
Will Deacon45ae7cf2013-06-24 18:31:25 +01001047 __free_page(table);
1048}
1049
1050static void arm_smmu_free_pmds(pud_t *pud)
1051{
1052 int i;
1053 pmd_t *pmd, *pmd_base = pmd_offset(pud, 0);
1054
1055 pmd = pmd_base;
1056 for (i = 0; i < PTRS_PER_PMD; ++i) {
1057 if (pmd_none(*pmd))
1058 continue;
1059
1060 arm_smmu_free_ptes(pmd);
1061 pmd++;
1062 }
1063
1064 pmd_free(NULL, pmd_base);
1065}
1066
1067static void arm_smmu_free_puds(pgd_t *pgd)
1068{
1069 int i;
1070 pud_t *pud, *pud_base = pud_offset(pgd, 0);
1071
1072 pud = pud_base;
1073 for (i = 0; i < PTRS_PER_PUD; ++i) {
1074 if (pud_none(*pud))
1075 continue;
1076
1077 arm_smmu_free_pmds(pud);
1078 pud++;
1079 }
1080
1081 pud_free(NULL, pud_base);
1082}
1083
1084static void arm_smmu_free_pgtables(struct arm_smmu_domain *smmu_domain)
1085{
1086 int i;
Will Deacon44680ee2014-06-25 11:29:12 +01001087 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
1088 pgd_t *pgd, *pgd_base = cfg->pgd;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001089
1090 /*
1091 * Recursively free the page tables for this domain. We don't
Will Deacon34fb4b32014-02-26 11:14:37 +00001092 * care about speculative TLB filling because the tables should
1093 * not be active in any context bank at this point (SCTLR.M is 0).
Will Deacon45ae7cf2013-06-24 18:31:25 +01001094 */
1095 pgd = pgd_base;
1096 for (i = 0; i < PTRS_PER_PGD; ++i) {
1097 if (pgd_none(*pgd))
1098 continue;
1099 arm_smmu_free_puds(pgd);
1100 pgd++;
1101 }
1102
1103 kfree(pgd_base);
1104}
1105
1106static void arm_smmu_domain_destroy(struct iommu_domain *domain)
1107{
1108 struct arm_smmu_domain *smmu_domain = domain->priv;
Will Deacon1463fe42013-07-31 19:21:27 +01001109
1110 /*
1111 * Free the domain resources. We assume that all devices have
1112 * already been detached.
1113 */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001114 arm_smmu_destroy_domain_context(domain);
1115 arm_smmu_free_pgtables(smmu_domain);
1116 kfree(smmu_domain);
1117}
1118
1119static int arm_smmu_master_configure_smrs(struct arm_smmu_device *smmu,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001120 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001121{
1122 int i;
1123 struct arm_smmu_smr *smrs;
1124 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1125
1126 if (!(smmu->features & ARM_SMMU_FEAT_STREAM_MATCH))
1127 return 0;
1128
Will Deacona9a1b0b2014-05-01 18:05:08 +01001129 if (cfg->smrs)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001130 return -EEXIST;
1131
Mitchel Humpherys29073202014-07-08 09:52:18 -07001132 smrs = kmalloc_array(cfg->num_streamids, sizeof(*smrs), GFP_KERNEL);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001133 if (!smrs) {
Will Deacona9a1b0b2014-05-01 18:05:08 +01001134 dev_err(smmu->dev, "failed to allocate %d SMRs\n",
1135 cfg->num_streamids);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001136 return -ENOMEM;
1137 }
1138
Will Deacon44680ee2014-06-25 11:29:12 +01001139 /* Allocate the SMRs on the SMMU */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001140 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001141 int idx = __arm_smmu_alloc_bitmap(smmu->smr_map, 0,
1142 smmu->num_mapping_groups);
1143 if (IS_ERR_VALUE(idx)) {
1144 dev_err(smmu->dev, "failed to allocate free SMR\n");
1145 goto err_free_smrs;
1146 }
1147
1148 smrs[i] = (struct arm_smmu_smr) {
1149 .idx = idx,
1150 .mask = 0, /* We don't currently share SMRs */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001151 .id = cfg->streamids[i],
Will Deacon45ae7cf2013-06-24 18:31:25 +01001152 };
1153 }
1154
1155 /* It worked! Now, poke the actual hardware */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001156 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001157 u32 reg = SMR_VALID | smrs[i].id << SMR_ID_SHIFT |
1158 smrs[i].mask << SMR_MASK_SHIFT;
1159 writel_relaxed(reg, gr0_base + ARM_SMMU_GR0_SMR(smrs[i].idx));
1160 }
1161
Will Deacona9a1b0b2014-05-01 18:05:08 +01001162 cfg->smrs = smrs;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001163 return 0;
1164
1165err_free_smrs:
1166 while (--i >= 0)
1167 __arm_smmu_free_bitmap(smmu->smr_map, smrs[i].idx);
1168 kfree(smrs);
1169 return -ENOSPC;
1170}
1171
1172static void arm_smmu_master_free_smrs(struct arm_smmu_device *smmu,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001173 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001174{
1175 int i;
1176 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001177 struct arm_smmu_smr *smrs = cfg->smrs;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001178
Will Deacon43b412b2014-07-15 11:22:24 +01001179 if (!smrs)
1180 return;
1181
Will Deacon45ae7cf2013-06-24 18:31:25 +01001182 /* Invalidate the SMRs before freeing back to the allocator */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001183 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001184 u8 idx = smrs[i].idx;
Mitchel Humpherys29073202014-07-08 09:52:18 -07001185
Will Deacon45ae7cf2013-06-24 18:31:25 +01001186 writel_relaxed(~SMR_VALID, gr0_base + ARM_SMMU_GR0_SMR(idx));
1187 __arm_smmu_free_bitmap(smmu->smr_map, idx);
1188 }
1189
Will Deacona9a1b0b2014-05-01 18:05:08 +01001190 cfg->smrs = NULL;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001191 kfree(smrs);
1192}
1193
Will Deacon45ae7cf2013-06-24 18:31:25 +01001194static int arm_smmu_domain_add_master(struct arm_smmu_domain *smmu_domain,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001195 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001196{
1197 int i, ret;
Will Deacon44680ee2014-06-25 11:29:12 +01001198 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001199 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1200
Will Deacon8f68f8e2014-07-15 11:27:08 +01001201 /* Devices in an IOMMU group may already be configured */
Will Deacona9a1b0b2014-05-01 18:05:08 +01001202 ret = arm_smmu_master_configure_smrs(smmu, cfg);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001203 if (ret)
Will Deacon8f68f8e2014-07-15 11:27:08 +01001204 return ret == -EEXIST ? 0 : ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001205
Will Deacona9a1b0b2014-05-01 18:05:08 +01001206 for (i = 0; i < cfg->num_streamids; ++i) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001207 u32 idx, s2cr;
Mitchel Humpherys29073202014-07-08 09:52:18 -07001208
Will Deacona9a1b0b2014-05-01 18:05:08 +01001209 idx = cfg->smrs ? cfg->smrs[i].idx : cfg->streamids[i];
Kefeng Wang6069d232014-04-18 10:20:48 +08001210 s2cr = S2CR_TYPE_TRANS |
Will Deacon44680ee2014-06-25 11:29:12 +01001211 (smmu_domain->cfg.cbndx << S2CR_CBNDX_SHIFT);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001212 writel_relaxed(s2cr, gr0_base + ARM_SMMU_GR0_S2CR(idx));
1213 }
1214
1215 return 0;
1216}
1217
1218static void arm_smmu_domain_remove_master(struct arm_smmu_domain *smmu_domain,
Will Deacona9a1b0b2014-05-01 18:05:08 +01001219 struct arm_smmu_master_cfg *cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001220{
Will Deacon43b412b2014-07-15 11:22:24 +01001221 int i;
Will Deacon44680ee2014-06-25 11:29:12 +01001222 struct arm_smmu_device *smmu = smmu_domain->smmu;
Will Deacon43b412b2014-07-15 11:22:24 +01001223 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001224
Will Deacon8f68f8e2014-07-15 11:27:08 +01001225 /* An IOMMU group is torn down by the first device to be removed */
1226 if ((smmu->features & ARM_SMMU_FEAT_STREAM_MATCH) && !cfg->smrs)
1227 return;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001228
1229 /*
1230 * We *must* clear the S2CR first, because freeing the SMR means
1231 * that it can be re-allocated immediately.
1232 */
Will Deacon43b412b2014-07-15 11:22:24 +01001233 for (i = 0; i < cfg->num_streamids; ++i) {
1234 u32 idx = cfg->smrs ? cfg->smrs[i].idx : cfg->streamids[i];
1235
1236 writel_relaxed(S2CR_TYPE_BYPASS,
1237 gr0_base + ARM_SMMU_GR0_S2CR(idx));
1238 }
1239
Will Deacona9a1b0b2014-05-01 18:05:08 +01001240 arm_smmu_master_free_smrs(smmu, cfg);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001241}
1242
1243static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev)
1244{
Mitchel Humpherysa18037b2014-07-30 18:58:13 +01001245 int ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001246 struct arm_smmu_domain *smmu_domain = domain->priv;
Mitchel Humpherysa18037b2014-07-30 18:58:13 +01001247 struct arm_smmu_device *smmu, *dom_smmu;
Will Deacona9a1b0b2014-05-01 18:05:08 +01001248 struct arm_smmu_master_cfg *cfg;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001249
Will Deacon8f68f8e2014-07-15 11:27:08 +01001250 smmu = find_smmu_for_device(dev);
Will Deacon44680ee2014-06-25 11:29:12 +01001251 if (!smmu) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001252 dev_err(dev, "cannot attach to SMMU, is it on the same bus?\n");
1253 return -ENXIO;
1254 }
1255
Will Deacon844e35b2014-07-17 11:23:51 +01001256 if (dev->archdata.iommu) {
1257 dev_err(dev, "already attached to IOMMU domain\n");
1258 return -EEXIST;
1259 }
1260
Will Deacon45ae7cf2013-06-24 18:31:25 +01001261 /*
Will Deacon44680ee2014-06-25 11:29:12 +01001262 * Sanity check the domain. We don't support domains across
1263 * different SMMUs.
Will Deacon45ae7cf2013-06-24 18:31:25 +01001264 */
Mitchel Humpherysa18037b2014-07-30 18:58:13 +01001265 dom_smmu = ACCESS_ONCE(smmu_domain->smmu);
1266 if (!dom_smmu) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001267 /* Now that we have a master, we can finalise the domain */
Will Deacon44680ee2014-06-25 11:29:12 +01001268 ret = arm_smmu_init_domain_context(domain, smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001269 if (IS_ERR_VALUE(ret))
Mitchel Humpherysa18037b2014-07-30 18:58:13 +01001270 return ret;
1271
1272 dom_smmu = smmu_domain->smmu;
1273 }
1274
1275 if (dom_smmu != smmu) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001276 dev_err(dev,
1277 "cannot attach to SMMU %s whilst already attached to domain on SMMU %s\n",
Mitchel Humpherysa18037b2014-07-30 18:58:13 +01001278 dev_name(smmu_domain->smmu->dev), dev_name(smmu->dev));
1279 return -EINVAL;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001280 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01001281
1282 /* Looks ok, so add the device to the domain */
Will Deacon8f68f8e2014-07-15 11:27:08 +01001283 cfg = find_smmu_master_cfg(dev);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001284 if (!cfg)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001285 return -ENODEV;
1286
Will Deacon844e35b2014-07-17 11:23:51 +01001287 ret = arm_smmu_domain_add_master(smmu_domain, cfg);
1288 if (!ret)
1289 dev->archdata.iommu = domain;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001290 return ret;
1291}
1292
1293static void arm_smmu_detach_dev(struct iommu_domain *domain, struct device *dev)
1294{
1295 struct arm_smmu_domain *smmu_domain = domain->priv;
Will Deacona9a1b0b2014-05-01 18:05:08 +01001296 struct arm_smmu_master_cfg *cfg;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001297
Will Deacon8f68f8e2014-07-15 11:27:08 +01001298 cfg = find_smmu_master_cfg(dev);
Will Deacon844e35b2014-07-17 11:23:51 +01001299 if (!cfg)
1300 return;
1301
1302 dev->archdata.iommu = NULL;
1303 arm_smmu_domain_remove_master(smmu_domain, cfg);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001304}
1305
Will Deacon45ae7cf2013-06-24 18:31:25 +01001306static bool arm_smmu_pte_is_contiguous_range(unsigned long addr,
1307 unsigned long end)
1308{
1309 return !(addr & ~ARM_SMMU_PTE_CONT_MASK) &&
1310 (addr + ARM_SMMU_PTE_CONT_SIZE <= end);
1311}
1312
1313static int arm_smmu_alloc_init_pte(struct arm_smmu_device *smmu, pmd_t *pmd,
1314 unsigned long addr, unsigned long end,
Will Deaconb410aed2014-02-20 16:31:06 +00001315 unsigned long pfn, int prot, int stage)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001316{
1317 pte_t *pte, *start;
Antonios Motakisa720b412014-10-13 14:06:16 +01001318 pteval_t pteval = ARM_SMMU_PTE_PAGE | ARM_SMMU_PTE_AF;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001319
1320 if (pmd_none(*pmd)) {
1321 /* Allocate a new set of tables */
Will Deaconc9d09e22014-02-04 22:12:42 +00001322 pgtable_t table = alloc_page(GFP_ATOMIC|__GFP_ZERO);
Mitchel Humpherys29073202014-07-08 09:52:18 -07001323
Will Deacon45ae7cf2013-06-24 18:31:25 +01001324 if (!table)
1325 return -ENOMEM;
1326
Will Deacon6dd35f42014-02-05 17:49:34 +00001327 arm_smmu_flush_pgtable(smmu, page_address(table), PAGE_SIZE);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001328 pmd_populate(NULL, pmd, table);
1329 arm_smmu_flush_pgtable(smmu, pmd, sizeof(*pmd));
1330 }
1331
1332 if (stage == 1) {
Will Deacon1463fe42013-07-31 19:21:27 +01001333 pteval |= ARM_SMMU_PTE_AP_UNPRIV | ARM_SMMU_PTE_nG;
Will Deaconb410aed2014-02-20 16:31:06 +00001334 if (!(prot & IOMMU_WRITE) && (prot & IOMMU_READ))
Will Deacon45ae7cf2013-06-24 18:31:25 +01001335 pteval |= ARM_SMMU_PTE_AP_RDONLY;
1336
Will Deaconb410aed2014-02-20 16:31:06 +00001337 if (prot & IOMMU_CACHE)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001338 pteval |= (MAIR_ATTR_IDX_CACHE <<
1339 ARM_SMMU_PTE_ATTRINDX_SHIFT);
1340 } else {
1341 pteval |= ARM_SMMU_PTE_HAP_FAULT;
Will Deaconb410aed2014-02-20 16:31:06 +00001342 if (prot & IOMMU_READ)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001343 pteval |= ARM_SMMU_PTE_HAP_READ;
Will Deaconb410aed2014-02-20 16:31:06 +00001344 if (prot & IOMMU_WRITE)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001345 pteval |= ARM_SMMU_PTE_HAP_WRITE;
Will Deaconb410aed2014-02-20 16:31:06 +00001346 if (prot & IOMMU_CACHE)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001347 pteval |= ARM_SMMU_PTE_MEMATTR_OIWB;
1348 else
1349 pteval |= ARM_SMMU_PTE_MEMATTR_NC;
1350 }
1351
Antonios Motakisa720b412014-10-13 14:06:16 +01001352 if (prot & IOMMU_NOEXEC)
1353 pteval |= ARM_SMMU_PTE_XN;
1354
Will Deacon45ae7cf2013-06-24 18:31:25 +01001355 /* If no access, create a faulting entry to avoid TLB fills */
Antonios Motakisa720b412014-10-13 14:06:16 +01001356 if (!(prot & (IOMMU_READ | IOMMU_WRITE)))
Will Deacon45ae7cf2013-06-24 18:31:25 +01001357 pteval &= ~ARM_SMMU_PTE_PAGE;
1358
1359 pteval |= ARM_SMMU_PTE_SH_IS;
1360 start = pmd_page_vaddr(*pmd) + pte_index(addr);
1361 pte = start;
1362
1363 /*
1364 * Install the page table entries. This is fairly complicated
1365 * since we attempt to make use of the contiguous hint in the
1366 * ptes where possible. The contiguous hint indicates a series
1367 * of ARM_SMMU_PTE_CONT_ENTRIES ptes mapping a physically
1368 * contiguous region with the following constraints:
1369 *
1370 * - The region start is aligned to ARM_SMMU_PTE_CONT_SIZE
1371 * - Each pte in the region has the contiguous hint bit set
1372 *
1373 * This complicates unmapping (also handled by this code, when
1374 * neither IOMMU_READ or IOMMU_WRITE are set) because it is
1375 * possible, yet highly unlikely, that a client may unmap only
1376 * part of a contiguous range. This requires clearing of the
1377 * contiguous hint bits in the range before installing the new
1378 * faulting entries.
1379 *
1380 * Note that re-mapping an address range without first unmapping
1381 * it is not supported, so TLB invalidation is not required here
1382 * and is instead performed at unmap and domain-init time.
1383 */
1384 do {
1385 int i = 1;
Mitchel Humpherys29073202014-07-08 09:52:18 -07001386
Will Deacon45ae7cf2013-06-24 18:31:25 +01001387 pteval &= ~ARM_SMMU_PTE_CONT;
1388
1389 if (arm_smmu_pte_is_contiguous_range(addr, end)) {
1390 i = ARM_SMMU_PTE_CONT_ENTRIES;
1391 pteval |= ARM_SMMU_PTE_CONT;
1392 } else if (pte_val(*pte) &
1393 (ARM_SMMU_PTE_CONT | ARM_SMMU_PTE_PAGE)) {
1394 int j;
1395 pte_t *cont_start;
1396 unsigned long idx = pte_index(addr);
1397
1398 idx &= ~(ARM_SMMU_PTE_CONT_ENTRIES - 1);
1399 cont_start = pmd_page_vaddr(*pmd) + idx;
1400 for (j = 0; j < ARM_SMMU_PTE_CONT_ENTRIES; ++j)
Mitchel Humpherys29073202014-07-08 09:52:18 -07001401 pte_val(*(cont_start + j)) &=
1402 ~ARM_SMMU_PTE_CONT;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001403
1404 arm_smmu_flush_pgtable(smmu, cont_start,
1405 sizeof(*pte) *
1406 ARM_SMMU_PTE_CONT_ENTRIES);
1407 }
1408
1409 do {
1410 *pte = pfn_pte(pfn, __pgprot(pteval));
1411 } while (pte++, pfn++, addr += PAGE_SIZE, --i);
1412 } while (addr != end);
1413
1414 arm_smmu_flush_pgtable(smmu, start, sizeof(*pte) * (pte - start));
1415 return 0;
1416}
1417
1418static int arm_smmu_alloc_init_pmd(struct arm_smmu_device *smmu, pud_t *pud,
1419 unsigned long addr, unsigned long end,
Will Deaconb410aed2014-02-20 16:31:06 +00001420 phys_addr_t phys, int prot, int stage)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001421{
1422 int ret;
1423 pmd_t *pmd;
1424 unsigned long next, pfn = __phys_to_pfn(phys);
1425
1426#ifndef __PAGETABLE_PMD_FOLDED
1427 if (pud_none(*pud)) {
Will Deaconc9d09e22014-02-04 22:12:42 +00001428 pmd = (pmd_t *)get_zeroed_page(GFP_ATOMIC);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001429 if (!pmd)
1430 return -ENOMEM;
Yifan Zhang97a64422014-01-03 12:01:26 +00001431
Will Deacon6dd35f42014-02-05 17:49:34 +00001432 arm_smmu_flush_pgtable(smmu, pmd, PAGE_SIZE);
Yifan Zhang97a64422014-01-03 12:01:26 +00001433 pud_populate(NULL, pud, pmd);
1434 arm_smmu_flush_pgtable(smmu, pud, sizeof(*pud));
1435
1436 pmd += pmd_index(addr);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001437 } else
1438#endif
1439 pmd = pmd_offset(pud, addr);
1440
1441 do {
1442 next = pmd_addr_end(addr, end);
Bin Wangaca1bc42014-03-21 10:06:07 +00001443 ret = arm_smmu_alloc_init_pte(smmu, pmd, addr, next, pfn,
Will Deaconb410aed2014-02-20 16:31:06 +00001444 prot, stage);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001445 phys += next - addr;
Mitchel Humpherysccd359f2014-09-19 22:58:42 +01001446 pfn = __phys_to_pfn(phys);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001447 } while (pmd++, addr = next, addr < end);
1448
1449 return ret;
1450}
1451
1452static int arm_smmu_alloc_init_pud(struct arm_smmu_device *smmu, pgd_t *pgd,
1453 unsigned long addr, unsigned long end,
Will Deaconb410aed2014-02-20 16:31:06 +00001454 phys_addr_t phys, int prot, int stage)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001455{
1456 int ret = 0;
1457 pud_t *pud;
1458 unsigned long next;
1459
1460#ifndef __PAGETABLE_PUD_FOLDED
1461 if (pgd_none(*pgd)) {
Will Deaconc9d09e22014-02-04 22:12:42 +00001462 pud = (pud_t *)get_zeroed_page(GFP_ATOMIC);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001463 if (!pud)
1464 return -ENOMEM;
Yifan Zhang97a64422014-01-03 12:01:26 +00001465
Will Deacon6dd35f42014-02-05 17:49:34 +00001466 arm_smmu_flush_pgtable(smmu, pud, PAGE_SIZE);
Yifan Zhang97a64422014-01-03 12:01:26 +00001467 pgd_populate(NULL, pgd, pud);
1468 arm_smmu_flush_pgtable(smmu, pgd, sizeof(*pgd));
1469
1470 pud += pud_index(addr);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001471 } else
1472#endif
1473 pud = pud_offset(pgd, addr);
1474
1475 do {
1476 next = pud_addr_end(addr, end);
1477 ret = arm_smmu_alloc_init_pmd(smmu, pud, addr, next, phys,
Will Deaconb410aed2014-02-20 16:31:06 +00001478 prot, stage);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001479 phys += next - addr;
1480 } while (pud++, addr = next, addr < end);
1481
1482 return ret;
1483}
1484
1485static int arm_smmu_handle_mapping(struct arm_smmu_domain *smmu_domain,
1486 unsigned long iova, phys_addr_t paddr,
Will Deaconb410aed2014-02-20 16:31:06 +00001487 size_t size, int prot)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001488{
1489 int ret, stage;
1490 unsigned long end;
1491 phys_addr_t input_mask, output_mask;
Will Deacon44680ee2014-06-25 11:29:12 +01001492 struct arm_smmu_device *smmu = smmu_domain->smmu;
1493 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
1494 pgd_t *pgd = cfg->pgd;
Will Deaconb410aed2014-02-20 16:31:06 +00001495 unsigned long flags;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001496
Will Deacon44680ee2014-06-25 11:29:12 +01001497 if (cfg->cbar == CBAR_TYPE_S2_TRANS) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001498 stage = 2;
Will Deacon28d60072014-09-01 16:24:48 +01001499 input_mask = (1ULL << smmu->s2_input_size) - 1;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001500 output_mask = (1ULL << smmu->s2_output_size) - 1;
1501 } else {
1502 stage = 1;
Will Deacon28d60072014-09-01 16:24:48 +01001503 input_mask = (1ULL << smmu->s1_input_size) - 1;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001504 output_mask = (1ULL << smmu->s1_output_size) - 1;
1505 }
1506
1507 if (!pgd)
1508 return -EINVAL;
1509
1510 if (size & ~PAGE_MASK)
1511 return -EINVAL;
1512
Will Deacon45ae7cf2013-06-24 18:31:25 +01001513 if ((phys_addr_t)iova & ~input_mask)
1514 return -ERANGE;
1515
1516 if (paddr & ~output_mask)
1517 return -ERANGE;
1518
Will Deaconb410aed2014-02-20 16:31:06 +00001519 spin_lock_irqsave(&smmu_domain->lock, flags);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001520 pgd += pgd_index(iova);
1521 end = iova + size;
1522 do {
1523 unsigned long next = pgd_addr_end(iova, end);
1524
1525 ret = arm_smmu_alloc_init_pud(smmu, pgd, iova, next, paddr,
Will Deaconb410aed2014-02-20 16:31:06 +00001526 prot, stage);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001527 if (ret)
1528 goto out_unlock;
1529
1530 paddr += next - iova;
1531 iova = next;
1532 } while (pgd++, iova != end);
1533
1534out_unlock:
Will Deaconb410aed2014-02-20 16:31:06 +00001535 spin_unlock_irqrestore(&smmu_domain->lock, flags);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001536
Will Deacon45ae7cf2013-06-24 18:31:25 +01001537 return ret;
1538}
1539
1540static int arm_smmu_map(struct iommu_domain *domain, unsigned long iova,
Will Deaconb410aed2014-02-20 16:31:06 +00001541 phys_addr_t paddr, size_t size, int prot)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001542{
1543 struct arm_smmu_domain *smmu_domain = domain->priv;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001544
Will Deacon5552ecd2013-11-08 15:08:06 +00001545 if (!smmu_domain)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001546 return -ENODEV;
1547
Will Deaconb410aed2014-02-20 16:31:06 +00001548 return arm_smmu_handle_mapping(smmu_domain, iova, paddr, size, prot);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001549}
1550
1551static size_t arm_smmu_unmap(struct iommu_domain *domain, unsigned long iova,
1552 size_t size)
1553{
1554 int ret;
1555 struct arm_smmu_domain *smmu_domain = domain->priv;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001556
1557 ret = arm_smmu_handle_mapping(smmu_domain, iova, 0, size, 0);
Will Deacon44680ee2014-06-25 11:29:12 +01001558 arm_smmu_tlb_inv_context(smmu_domain);
Laurent Pinchart16c50dc2014-02-28 15:37:10 +00001559 return ret ? 0 : size;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001560}
1561
1562static phys_addr_t arm_smmu_iova_to_phys(struct iommu_domain *domain,
1563 dma_addr_t iova)
1564{
Will Deacona44a9792013-11-07 18:47:50 +00001565 pgd_t *pgdp, pgd;
1566 pud_t pud;
1567 pmd_t pmd;
1568 pte_t pte;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001569 struct arm_smmu_domain *smmu_domain = domain->priv;
Will Deacon44680ee2014-06-25 11:29:12 +01001570 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001571
Will Deacon44680ee2014-06-25 11:29:12 +01001572 pgdp = cfg->pgd;
Will Deacona44a9792013-11-07 18:47:50 +00001573 if (!pgdp)
1574 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001575
Will Deacona44a9792013-11-07 18:47:50 +00001576 pgd = *(pgdp + pgd_index(iova));
1577 if (pgd_none(pgd))
1578 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001579
Will Deacona44a9792013-11-07 18:47:50 +00001580 pud = *pud_offset(&pgd, iova);
1581 if (pud_none(pud))
1582 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001583
Will Deacona44a9792013-11-07 18:47:50 +00001584 pmd = *pmd_offset(&pud, iova);
1585 if (pmd_none(pmd))
1586 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001587
Will Deacona44a9792013-11-07 18:47:50 +00001588 pte = *(pmd_page_vaddr(pmd) + pte_index(iova));
Will Deacon45ae7cf2013-06-24 18:31:25 +01001589 if (pte_none(pte))
Will Deacona44a9792013-11-07 18:47:50 +00001590 return 0;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001591
Will Deacona44a9792013-11-07 18:47:50 +00001592 return __pfn_to_phys(pte_pfn(pte)) | (iova & ~PAGE_MASK);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001593}
1594
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001595static bool arm_smmu_capable(enum iommu_cap cap)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001596{
Will Deacond0948942014-06-24 17:30:10 +01001597 switch (cap) {
1598 case IOMMU_CAP_CACHE_COHERENCY:
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001599 /*
1600 * Return true here as the SMMU can always send out coherent
1601 * requests.
1602 */
1603 return true;
Will Deacond0948942014-06-24 17:30:10 +01001604 case IOMMU_CAP_INTR_REMAP:
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001605 return true; /* MSIs are just memory writes */
Antonios Motakis0029a8d2014-10-13 14:06:18 +01001606 case IOMMU_CAP_NOEXEC:
1607 return true;
Will Deacond0948942014-06-24 17:30:10 +01001608 default:
Joerg Roedel1fd0c772014-09-05 10:49:34 +02001609 return false;
Will Deacond0948942014-06-24 17:30:10 +01001610 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01001611}
Will Deacon45ae7cf2013-06-24 18:31:25 +01001612
Will Deacona9a1b0b2014-05-01 18:05:08 +01001613static int __arm_smmu_get_pci_sid(struct pci_dev *pdev, u16 alias, void *data)
1614{
1615 *((u16 *)data) = alias;
1616 return 0; /* Continue walking */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001617}
1618
Will Deacon8f68f8e2014-07-15 11:27:08 +01001619static void __arm_smmu_release_pci_iommudata(void *data)
1620{
1621 kfree(data);
1622}
1623
Will Deacon45ae7cf2013-06-24 18:31:25 +01001624static int arm_smmu_add_device(struct device *dev)
1625{
Will Deacona9a1b0b2014-05-01 18:05:08 +01001626 struct arm_smmu_device *smmu;
Will Deacon8f68f8e2014-07-15 11:27:08 +01001627 struct arm_smmu_master_cfg *cfg;
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001628 struct iommu_group *group;
Will Deacon8f68f8e2014-07-15 11:27:08 +01001629 void (*releasefn)(void *) = NULL;
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001630 int ret;
1631
Will Deacon44680ee2014-06-25 11:29:12 +01001632 smmu = find_smmu_for_device(dev);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001633 if (!smmu)
Will Deacon45ae7cf2013-06-24 18:31:25 +01001634 return -ENODEV;
1635
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001636 group = iommu_group_alloc();
1637 if (IS_ERR(group)) {
1638 dev_err(dev, "Failed to allocate IOMMU group\n");
1639 return PTR_ERR(group);
1640 }
1641
Will Deacona9a1b0b2014-05-01 18:05:08 +01001642 if (dev_is_pci(dev)) {
Will Deacona9a1b0b2014-05-01 18:05:08 +01001643 struct pci_dev *pdev = to_pci_dev(dev);
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001644
Will Deacona9a1b0b2014-05-01 18:05:08 +01001645 cfg = kzalloc(sizeof(*cfg), GFP_KERNEL);
1646 if (!cfg) {
1647 ret = -ENOMEM;
1648 goto out_put_group;
1649 }
1650
1651 cfg->num_streamids = 1;
1652 /*
1653 * Assume Stream ID == Requester ID for now.
1654 * We need a way to describe the ID mappings in FDT.
1655 */
1656 pci_for_each_dma_alias(pdev, __arm_smmu_get_pci_sid,
1657 &cfg->streamids[0]);
Will Deacon8f68f8e2014-07-15 11:27:08 +01001658 releasefn = __arm_smmu_release_pci_iommudata;
Will Deacona9a1b0b2014-05-01 18:05:08 +01001659 } else {
Will Deacon8f68f8e2014-07-15 11:27:08 +01001660 struct arm_smmu_master *master;
1661
1662 master = find_smmu_master(smmu, dev->of_node);
1663 if (!master) {
1664 ret = -ENODEV;
1665 goto out_put_group;
1666 }
1667
1668 cfg = &master->cfg;
Will Deacona9a1b0b2014-05-01 18:05:08 +01001669 }
1670
Will Deacon8f68f8e2014-07-15 11:27:08 +01001671 iommu_group_set_iommudata(group, cfg, releasefn);
Will Deacona9a1b0b2014-05-01 18:05:08 +01001672 ret = iommu_group_add_device(group, dev);
1673
1674out_put_group:
1675 iommu_group_put(group);
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001676 return ret;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001677}
1678
1679static void arm_smmu_remove_device(struct device *dev)
1680{
Antonios Motakis5fc63a72013-10-18 16:08:29 +01001681 iommu_group_remove_device(dev);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001682}
1683
Will Deaconc752ce42014-06-25 22:46:31 +01001684static int arm_smmu_domain_get_attr(struct iommu_domain *domain,
1685 enum iommu_attr attr, void *data)
1686{
1687 struct arm_smmu_domain *smmu_domain = domain->priv;
1688
1689 switch (attr) {
1690 case DOMAIN_ATTR_NESTING:
1691 *(int *)data = (smmu_domain->stage == ARM_SMMU_DOMAIN_NESTED);
1692 return 0;
1693 default:
1694 return -ENODEV;
1695 }
1696}
1697
1698static int arm_smmu_domain_set_attr(struct iommu_domain *domain,
1699 enum iommu_attr attr, void *data)
1700{
1701 struct arm_smmu_domain *smmu_domain = domain->priv;
1702
1703 switch (attr) {
1704 case DOMAIN_ATTR_NESTING:
1705 if (smmu_domain->smmu)
1706 return -EPERM;
1707 if (*(int *)data)
1708 smmu_domain->stage = ARM_SMMU_DOMAIN_NESTED;
1709 else
1710 smmu_domain->stage = ARM_SMMU_DOMAIN_S1;
1711
1712 return 0;
1713 default:
1714 return -ENODEV;
1715 }
1716}
1717
Thierry Redingb22f6432014-06-27 09:03:12 +02001718static const struct iommu_ops arm_smmu_ops = {
Will Deaconc752ce42014-06-25 22:46:31 +01001719 .capable = arm_smmu_capable,
1720 .domain_init = arm_smmu_domain_init,
1721 .domain_destroy = arm_smmu_domain_destroy,
1722 .attach_dev = arm_smmu_attach_dev,
1723 .detach_dev = arm_smmu_detach_dev,
1724 .map = arm_smmu_map,
1725 .unmap = arm_smmu_unmap,
Joerg Roedel76771c92014-12-02 13:07:13 +01001726 .map_sg = default_iommu_map_sg,
Will Deaconc752ce42014-06-25 22:46:31 +01001727 .iova_to_phys = arm_smmu_iova_to_phys,
1728 .add_device = arm_smmu_add_device,
1729 .remove_device = arm_smmu_remove_device,
1730 .domain_get_attr = arm_smmu_domain_get_attr,
1731 .domain_set_attr = arm_smmu_domain_set_attr,
1732 .pgsize_bitmap = (SECTION_SIZE |
1733 ARM_SMMU_PTE_CONT_SIZE |
1734 PAGE_SIZE),
Will Deacon45ae7cf2013-06-24 18:31:25 +01001735};
1736
1737static void arm_smmu_device_reset(struct arm_smmu_device *smmu)
1738{
1739 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001740 void __iomem *cb_base;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001741 int i = 0;
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001742 u32 reg;
1743
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001744 /* clear global FSR */
1745 reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sGFSR);
1746 writel(reg, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sGFSR);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001747
1748 /* Mark all SMRn as invalid and all S2CRn as bypass */
1749 for (i = 0; i < smmu->num_mapping_groups; ++i) {
Olav Haugan3c8766d2014-08-22 17:12:32 -07001750 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_SMR(i));
Mitchel Humpherys29073202014-07-08 09:52:18 -07001751 writel_relaxed(S2CR_TYPE_BYPASS,
1752 gr0_base + ARM_SMMU_GR0_S2CR(i));
Will Deacon45ae7cf2013-06-24 18:31:25 +01001753 }
1754
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001755 /* Make sure all context banks are disabled and clear CB_FSR */
1756 for (i = 0; i < smmu->num_context_banks; ++i) {
1757 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, i);
1758 writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR);
1759 writel_relaxed(FSR_FAULT, cb_base + ARM_SMMU_CB_FSR);
1760 }
Will Deacon1463fe42013-07-31 19:21:27 +01001761
Will Deacon45ae7cf2013-06-24 18:31:25 +01001762 /* Invalidate the TLB, just in case */
1763 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_STLBIALL);
1764 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLH);
1765 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLNSNH);
1766
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001767 reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001768
Will Deacon45ae7cf2013-06-24 18:31:25 +01001769 /* Enable fault reporting */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001770 reg |= (sCR0_GFRE | sCR0_GFIE | sCR0_GCFGFRE | sCR0_GCFGFIE);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001771
1772 /* Disable TLB broadcasting. */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001773 reg |= (sCR0_VMIDPNE | sCR0_PTM);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001774
1775 /* Enable client access, but bypass when no mapping is found */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001776 reg &= ~(sCR0_CLIENTPD | sCR0_USFCFG);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001777
1778 /* Disable forced broadcasting */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001779 reg &= ~sCR0_FB;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001780
1781 /* Don't upgrade barriers */
Andreas Herrmann659db6f2013-10-01 13:39:09 +01001782 reg &= ~(sCR0_BSU_MASK << sCR0_BSU_SHIFT);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001783
1784 /* Push the button */
1785 arm_smmu_tlb_sync(smmu);
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00001786 writel(reg, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001787}
1788
1789static int arm_smmu_id_size_to_bits(int size)
1790{
1791 switch (size) {
1792 case 0:
1793 return 32;
1794 case 1:
1795 return 36;
1796 case 2:
1797 return 40;
1798 case 3:
1799 return 42;
1800 case 4:
1801 return 44;
1802 case 5:
1803 default:
1804 return 48;
1805 }
1806}
1807
1808static int arm_smmu_device_cfg_probe(struct arm_smmu_device *smmu)
1809{
1810 unsigned long size;
1811 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1812 u32 id;
1813
1814 dev_notice(smmu->dev, "probing hardware configuration...\n");
Will Deacon45ae7cf2013-06-24 18:31:25 +01001815 dev_notice(smmu->dev, "SMMUv%d with:\n", smmu->version);
1816
1817 /* ID0 */
1818 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID0);
1819#ifndef CONFIG_64BIT
1820 if (((id >> ID0_PTFS_SHIFT) & ID0_PTFS_MASK) == ID0_PTFS_V8_ONLY) {
1821 dev_err(smmu->dev, "\tno v7 descriptor support!\n");
1822 return -ENODEV;
1823 }
1824#endif
Will Deacon4cf740b2014-07-14 19:47:39 +01001825
1826 /* Restrict available stages based on module parameter */
1827 if (force_stage == 1)
1828 id &= ~(ID0_S2TS | ID0_NTS);
1829 else if (force_stage == 2)
1830 id &= ~(ID0_S1TS | ID0_NTS);
1831
Will Deacon45ae7cf2013-06-24 18:31:25 +01001832 if (id & ID0_S1TS) {
1833 smmu->features |= ARM_SMMU_FEAT_TRANS_S1;
1834 dev_notice(smmu->dev, "\tstage 1 translation\n");
1835 }
1836
1837 if (id & ID0_S2TS) {
1838 smmu->features |= ARM_SMMU_FEAT_TRANS_S2;
1839 dev_notice(smmu->dev, "\tstage 2 translation\n");
1840 }
1841
1842 if (id & ID0_NTS) {
1843 smmu->features |= ARM_SMMU_FEAT_TRANS_NESTED;
1844 dev_notice(smmu->dev, "\tnested translation\n");
1845 }
1846
1847 if (!(smmu->features &
Will Deacon4cf740b2014-07-14 19:47:39 +01001848 (ARM_SMMU_FEAT_TRANS_S1 | ARM_SMMU_FEAT_TRANS_S2))) {
Will Deacon45ae7cf2013-06-24 18:31:25 +01001849 dev_err(smmu->dev, "\tno translation support!\n");
1850 return -ENODEV;
1851 }
1852
1853 if (id & ID0_CTTW) {
1854 smmu->features |= ARM_SMMU_FEAT_COHERENT_WALK;
1855 dev_notice(smmu->dev, "\tcoherent table walk\n");
1856 }
1857
1858 if (id & ID0_SMS) {
1859 u32 smr, sid, mask;
1860
1861 smmu->features |= ARM_SMMU_FEAT_STREAM_MATCH;
1862 smmu->num_mapping_groups = (id >> ID0_NUMSMRG_SHIFT) &
1863 ID0_NUMSMRG_MASK;
1864 if (smmu->num_mapping_groups == 0) {
1865 dev_err(smmu->dev,
1866 "stream-matching supported, but no SMRs present!\n");
1867 return -ENODEV;
1868 }
1869
1870 smr = SMR_MASK_MASK << SMR_MASK_SHIFT;
1871 smr |= (SMR_ID_MASK << SMR_ID_SHIFT);
1872 writel_relaxed(smr, gr0_base + ARM_SMMU_GR0_SMR(0));
1873 smr = readl_relaxed(gr0_base + ARM_SMMU_GR0_SMR(0));
1874
1875 mask = (smr >> SMR_MASK_SHIFT) & SMR_MASK_MASK;
1876 sid = (smr >> SMR_ID_SHIFT) & SMR_ID_MASK;
1877 if ((mask & sid) != sid) {
1878 dev_err(smmu->dev,
1879 "SMR mask bits (0x%x) insufficient for ID field (0x%x)\n",
1880 mask, sid);
1881 return -ENODEV;
1882 }
1883
1884 dev_notice(smmu->dev,
1885 "\tstream matching with %u register groups, mask 0x%x",
1886 smmu->num_mapping_groups, mask);
Olav Haugan3c8766d2014-08-22 17:12:32 -07001887 } else {
1888 smmu->num_mapping_groups = (id >> ID0_NUMSIDB_SHIFT) &
1889 ID0_NUMSIDB_MASK;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001890 }
1891
1892 /* ID1 */
1893 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID1);
Will Deaconc757e852014-07-30 11:33:25 +01001894 smmu->pgshift = (id & ID1_PAGESIZE) ? 16 : 12;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001895
Andreas Herrmannc55af7f2013-10-01 13:39:06 +01001896 /* Check for size mismatch of SMMU address space from mapped region */
Mitchel Humpherys29073202014-07-08 09:52:18 -07001897 size = 1 <<
1898 (((id >> ID1_NUMPAGENDXB_SHIFT) & ID1_NUMPAGENDXB_MASK) + 1);
Will Deaconc757e852014-07-30 11:33:25 +01001899 size *= 2 << smmu->pgshift;
Andreas Herrmannc55af7f2013-10-01 13:39:06 +01001900 if (smmu->size != size)
Mitchel Humpherys29073202014-07-08 09:52:18 -07001901 dev_warn(smmu->dev,
1902 "SMMU address space size (0x%lx) differs from mapped region size (0x%lx)!\n",
1903 size, smmu->size);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001904
1905 smmu->num_s2_context_banks = (id >> ID1_NUMS2CB_SHIFT) &
1906 ID1_NUMS2CB_MASK;
1907 smmu->num_context_banks = (id >> ID1_NUMCB_SHIFT) & ID1_NUMCB_MASK;
1908 if (smmu->num_s2_context_banks > smmu->num_context_banks) {
1909 dev_err(smmu->dev, "impossible number of S2 context banks!\n");
1910 return -ENODEV;
1911 }
1912 dev_notice(smmu->dev, "\t%u context banks (%u stage-2 only)\n",
1913 smmu->num_context_banks, smmu->num_s2_context_banks);
1914
1915 /* ID2 */
1916 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID2);
1917 size = arm_smmu_id_size_to_bits((id >> ID2_IAS_SHIFT) & ID2_IAS_MASK);
Will Deacon28d60072014-09-01 16:24:48 +01001918 smmu->s1_output_size = min_t(unsigned long, PHYS_MASK_SHIFT, size);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001919
Will Deacon28d60072014-09-01 16:24:48 +01001920 /* Stage-2 input size limited due to pgd allocation (PTRS_PER_PGD) */
Will Deacon45ae7cf2013-06-24 18:31:25 +01001921#ifdef CONFIG_64BIT
Will Deacon28d60072014-09-01 16:24:48 +01001922 smmu->s2_input_size = min_t(unsigned long, VA_BITS, size);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001923#else
Will Deacon28d60072014-09-01 16:24:48 +01001924 smmu->s2_input_size = min(32UL, size);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001925#endif
1926
1927 /* The stage-2 output mask is also applied for bypass */
1928 size = arm_smmu_id_size_to_bits((id >> ID2_OAS_SHIFT) & ID2_OAS_MASK);
Mitchel Humpherys29073202014-07-08 09:52:18 -07001929 smmu->s2_output_size = min_t(unsigned long, PHYS_MASK_SHIFT, size);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001930
Robin Murphy09360402014-08-28 17:51:59 +01001931 if (smmu->version == ARM_SMMU_V1) {
Will Deacon28d60072014-09-01 16:24:48 +01001932 smmu->s1_input_size = 32;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001933 } else {
1934#ifdef CONFIG_64BIT
1935 size = (id >> ID2_UBS_SHIFT) & ID2_UBS_MASK;
Will Deacon06f983d2013-11-05 15:55:04 +00001936 size = min(VA_BITS, arm_smmu_id_size_to_bits(size));
Will Deacon45ae7cf2013-06-24 18:31:25 +01001937#else
1938 size = 32;
1939#endif
Will Deacon28d60072014-09-01 16:24:48 +01001940 smmu->s1_input_size = size;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001941
1942 if ((PAGE_SIZE == SZ_4K && !(id & ID2_PTFS_4K)) ||
1943 (PAGE_SIZE == SZ_64K && !(id & ID2_PTFS_64K)) ||
1944 (PAGE_SIZE != SZ_4K && PAGE_SIZE != SZ_64K)) {
1945 dev_err(smmu->dev, "CPU page size 0x%lx unsupported\n",
1946 PAGE_SIZE);
1947 return -ENODEV;
1948 }
1949 }
1950
Will Deacon28d60072014-09-01 16:24:48 +01001951 if (smmu->features & ARM_SMMU_FEAT_TRANS_S1)
1952 dev_notice(smmu->dev, "\tStage-1: %lu-bit VA -> %lu-bit IPA\n",
1953 smmu->s1_input_size, smmu->s1_output_size);
1954
1955 if (smmu->features & ARM_SMMU_FEAT_TRANS_S2)
1956 dev_notice(smmu->dev, "\tStage-2: %lu-bit IPA -> %lu-bit PA\n",
1957 smmu->s2_input_size, smmu->s2_output_size);
1958
Will Deacon45ae7cf2013-06-24 18:31:25 +01001959 return 0;
1960}
1961
Joerg Roedel09b52692014-10-02 12:24:45 +02001962static const struct of_device_id arm_smmu_of_match[] = {
Robin Murphy09360402014-08-28 17:51:59 +01001963 { .compatible = "arm,smmu-v1", .data = (void *)ARM_SMMU_V1 },
1964 { .compatible = "arm,smmu-v2", .data = (void *)ARM_SMMU_V2 },
1965 { .compatible = "arm,mmu-400", .data = (void *)ARM_SMMU_V1 },
Robin Murphyd3aba042014-08-28 17:52:00 +01001966 { .compatible = "arm,mmu-401", .data = (void *)ARM_SMMU_V1 },
Robin Murphy09360402014-08-28 17:51:59 +01001967 { .compatible = "arm,mmu-500", .data = (void *)ARM_SMMU_V2 },
1968 { },
1969};
1970MODULE_DEVICE_TABLE(of, arm_smmu_of_match);
1971
Will Deacon45ae7cf2013-06-24 18:31:25 +01001972static int arm_smmu_device_dt_probe(struct platform_device *pdev)
1973{
Robin Murphy09360402014-08-28 17:51:59 +01001974 const struct of_device_id *of_id;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001975 struct resource *res;
1976 struct arm_smmu_device *smmu;
Will Deacon45ae7cf2013-06-24 18:31:25 +01001977 struct device *dev = &pdev->dev;
1978 struct rb_node *node;
1979 struct of_phandle_args masterspec;
1980 int num_irqs, i, err;
1981
1982 smmu = devm_kzalloc(dev, sizeof(*smmu), GFP_KERNEL);
1983 if (!smmu) {
1984 dev_err(dev, "failed to allocate arm_smmu_device\n");
1985 return -ENOMEM;
1986 }
1987 smmu->dev = dev;
1988
Robin Murphy09360402014-08-28 17:51:59 +01001989 of_id = of_match_node(arm_smmu_of_match, dev->of_node);
1990 smmu->version = (enum arm_smmu_arch_version)of_id->data;
1991
Will Deacon45ae7cf2013-06-24 18:31:25 +01001992 res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
Julia Lawall8a7f4312013-08-19 12:20:37 +01001993 smmu->base = devm_ioremap_resource(dev, res);
1994 if (IS_ERR(smmu->base))
1995 return PTR_ERR(smmu->base);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001996 smmu->size = resource_size(res);
Will Deacon45ae7cf2013-06-24 18:31:25 +01001997
1998 if (of_property_read_u32(dev->of_node, "#global-interrupts",
1999 &smmu->num_global_irqs)) {
2000 dev_err(dev, "missing #global-interrupts property\n");
2001 return -ENODEV;
2002 }
2003
2004 num_irqs = 0;
2005 while ((res = platform_get_resource(pdev, IORESOURCE_IRQ, num_irqs))) {
2006 num_irqs++;
2007 if (num_irqs > smmu->num_global_irqs)
2008 smmu->num_context_irqs++;
2009 }
2010
Andreas Herrmann44a08de2013-10-01 13:39:07 +01002011 if (!smmu->num_context_irqs) {
2012 dev_err(dev, "found %d interrupts but expected at least %d\n",
2013 num_irqs, smmu->num_global_irqs + 1);
2014 return -ENODEV;
Will Deacon45ae7cf2013-06-24 18:31:25 +01002015 }
Will Deacon45ae7cf2013-06-24 18:31:25 +01002016
2017 smmu->irqs = devm_kzalloc(dev, sizeof(*smmu->irqs) * num_irqs,
2018 GFP_KERNEL);
2019 if (!smmu->irqs) {
2020 dev_err(dev, "failed to allocate %d irqs\n", num_irqs);
2021 return -ENOMEM;
2022 }
2023
2024 for (i = 0; i < num_irqs; ++i) {
2025 int irq = platform_get_irq(pdev, i);
Mitchel Humpherys29073202014-07-08 09:52:18 -07002026
Will Deacon45ae7cf2013-06-24 18:31:25 +01002027 if (irq < 0) {
2028 dev_err(dev, "failed to get irq index %d\n", i);
2029 return -ENODEV;
2030 }
2031 smmu->irqs[i] = irq;
2032 }
2033
Olav Haugan3c8766d2014-08-22 17:12:32 -07002034 err = arm_smmu_device_cfg_probe(smmu);
2035 if (err)
2036 return err;
2037
Will Deacon45ae7cf2013-06-24 18:31:25 +01002038 i = 0;
2039 smmu->masters = RB_ROOT;
2040 while (!of_parse_phandle_with_args(dev->of_node, "mmu-masters",
2041 "#stream-id-cells", i,
2042 &masterspec)) {
2043 err = register_smmu_master(smmu, dev, &masterspec);
2044 if (err) {
2045 dev_err(dev, "failed to add master %s\n",
2046 masterspec.np->name);
2047 goto out_put_masters;
2048 }
2049
2050 i++;
2051 }
2052 dev_notice(dev, "registered %d master devices\n", i);
2053
Andreas Herrmann3a5df8f2014-01-30 18:18:04 +00002054 parse_driver_options(smmu);
2055
Robin Murphy09360402014-08-28 17:51:59 +01002056 if (smmu->version > ARM_SMMU_V1 &&
Will Deacon45ae7cf2013-06-24 18:31:25 +01002057 smmu->num_context_banks != smmu->num_context_irqs) {
2058 dev_err(dev,
2059 "found only %d context interrupt(s) but %d required\n",
2060 smmu->num_context_irqs, smmu->num_context_banks);
Wei Yongjun89a23cd2013-11-15 09:42:30 +00002061 err = -ENODEV;
Will Deacon44680ee2014-06-25 11:29:12 +01002062 goto out_put_masters;
Will Deacon45ae7cf2013-06-24 18:31:25 +01002063 }
2064
Will Deacon45ae7cf2013-06-24 18:31:25 +01002065 for (i = 0; i < smmu->num_global_irqs; ++i) {
2066 err = request_irq(smmu->irqs[i],
2067 arm_smmu_global_fault,
2068 IRQF_SHARED,
2069 "arm-smmu global fault",
2070 smmu);
2071 if (err) {
2072 dev_err(dev, "failed to request global IRQ %d (%u)\n",
2073 i, smmu->irqs[i]);
2074 goto out_free_irqs;
2075 }
2076 }
2077
2078 INIT_LIST_HEAD(&smmu->list);
2079 spin_lock(&arm_smmu_devices_lock);
2080 list_add(&smmu->list, &arm_smmu_devices);
2081 spin_unlock(&arm_smmu_devices_lock);
Will Deaconfd90cec2013-08-21 13:56:34 +01002082
2083 arm_smmu_device_reset(smmu);
Will Deacon45ae7cf2013-06-24 18:31:25 +01002084 return 0;
2085
2086out_free_irqs:
2087 while (i--)
2088 free_irq(smmu->irqs[i], smmu);
2089
Will Deacon45ae7cf2013-06-24 18:31:25 +01002090out_put_masters:
2091 for (node = rb_first(&smmu->masters); node; node = rb_next(node)) {
Mitchel Humpherys29073202014-07-08 09:52:18 -07002092 struct arm_smmu_master *master
2093 = container_of(node, struct arm_smmu_master, node);
Will Deacon45ae7cf2013-06-24 18:31:25 +01002094 of_node_put(master->of_node);
2095 }
2096
2097 return err;
2098}
2099
2100static int arm_smmu_device_remove(struct platform_device *pdev)
2101{
2102 int i;
2103 struct device *dev = &pdev->dev;
2104 struct arm_smmu_device *curr, *smmu = NULL;
2105 struct rb_node *node;
2106
2107 spin_lock(&arm_smmu_devices_lock);
2108 list_for_each_entry(curr, &arm_smmu_devices, list) {
2109 if (curr->dev == dev) {
2110 smmu = curr;
2111 list_del(&smmu->list);
2112 break;
2113 }
2114 }
2115 spin_unlock(&arm_smmu_devices_lock);
2116
2117 if (!smmu)
2118 return -ENODEV;
2119
Will Deacon45ae7cf2013-06-24 18:31:25 +01002120 for (node = rb_first(&smmu->masters); node; node = rb_next(node)) {
Mitchel Humpherys29073202014-07-08 09:52:18 -07002121 struct arm_smmu_master *master
2122 = container_of(node, struct arm_smmu_master, node);
Will Deacon45ae7cf2013-06-24 18:31:25 +01002123 of_node_put(master->of_node);
2124 }
2125
Will Deaconecfadb62013-07-31 19:21:28 +01002126 if (!bitmap_empty(smmu->context_map, ARM_SMMU_MAX_CBS))
Will Deacon45ae7cf2013-06-24 18:31:25 +01002127 dev_err(dev, "removing device with active domains!\n");
2128
2129 for (i = 0; i < smmu->num_global_irqs; ++i)
2130 free_irq(smmu->irqs[i], smmu);
2131
2132 /* Turn the thing off */
Mitchel Humpherys29073202014-07-08 09:52:18 -07002133 writel(sCR0_CLIENTPD, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
Will Deacon45ae7cf2013-06-24 18:31:25 +01002134 return 0;
2135}
2136
Will Deacon45ae7cf2013-06-24 18:31:25 +01002137static struct platform_driver arm_smmu_driver = {
2138 .driver = {
Will Deacon45ae7cf2013-06-24 18:31:25 +01002139 .name = "arm-smmu",
2140 .of_match_table = of_match_ptr(arm_smmu_of_match),
2141 },
2142 .probe = arm_smmu_device_dt_probe,
2143 .remove = arm_smmu_device_remove,
2144};
2145
2146static int __init arm_smmu_init(void)
2147{
Thierry Reding0e7d37a2014-11-07 15:26:18 +00002148 struct device_node *np;
Will Deacon45ae7cf2013-06-24 18:31:25 +01002149 int ret;
2150
Thierry Reding0e7d37a2014-11-07 15:26:18 +00002151 /*
2152 * Play nice with systems that don't have an ARM SMMU by checking that
2153 * an ARM SMMU exists in the system before proceeding with the driver
2154 * and IOMMU bus operation registration.
2155 */
2156 np = of_find_matching_node(NULL, arm_smmu_of_match);
2157 if (!np)
2158 return 0;
2159
2160 of_node_put(np);
2161
Will Deacon45ae7cf2013-06-24 18:31:25 +01002162 ret = platform_driver_register(&arm_smmu_driver);
2163 if (ret)
2164 return ret;
2165
2166 /* Oh, for a proper bus abstraction */
Dan Carpenter6614ee72013-08-21 09:34:20 +01002167 if (!iommu_present(&platform_bus_type))
Will Deacon45ae7cf2013-06-24 18:31:25 +01002168 bus_set_iommu(&platform_bus_type, &arm_smmu_ops);
2169
Will Deacond123cf82014-02-04 22:17:53 +00002170#ifdef CONFIG_ARM_AMBA
Dan Carpenter6614ee72013-08-21 09:34:20 +01002171 if (!iommu_present(&amba_bustype))
Will Deacon45ae7cf2013-06-24 18:31:25 +01002172 bus_set_iommu(&amba_bustype, &arm_smmu_ops);
Will Deacond123cf82014-02-04 22:17:53 +00002173#endif
Will Deacon45ae7cf2013-06-24 18:31:25 +01002174
Will Deacona9a1b0b2014-05-01 18:05:08 +01002175#ifdef CONFIG_PCI
2176 if (!iommu_present(&pci_bus_type))
2177 bus_set_iommu(&pci_bus_type, &arm_smmu_ops);
2178#endif
2179
Will Deacon45ae7cf2013-06-24 18:31:25 +01002180 return 0;
2181}
2182
2183static void __exit arm_smmu_exit(void)
2184{
2185 return platform_driver_unregister(&arm_smmu_driver);
2186}
2187
Andreas Herrmannb1950b22013-10-01 13:39:05 +01002188subsys_initcall(arm_smmu_init);
Will Deacon45ae7cf2013-06-24 18:31:25 +01002189module_exit(arm_smmu_exit);
2190
2191MODULE_DESCRIPTION("IOMMU API for ARM architected SMMU implementations");
2192MODULE_AUTHOR("Will Deacon <will.deacon@arm.com>");
2193MODULE_LICENSE("GPL v2");