blob: 5ca6fd9d09fd54b85afa7a22145d81a7a4b62b85 [file] [log] [blame]
Olav Hauganf3782732013-01-11 11:23:30 -08001/* Copyright (c) 2012-2013, The Linux Foundation. All rights reserved.
Laura Abbott0d135652012-10-04 12:59:03 -07002 *
3 * This program is free software; you can redistribute it and/or modify
4 * it under the terms of the GNU General Public License version 2 and
5 * only version 2 as published by the Free Software Foundation.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 */
12
13#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
14#include <linux/kernel.h>
15#include <linux/module.h>
16#include <linux/platform_device.h>
17#include <linux/errno.h>
18#include <linux/io.h>
19#include <linux/interrupt.h>
20#include <linux/list.h>
21#include <linux/mutex.h>
22#include <linux/slab.h>
23#include <linux/iommu.h>
24#include <linux/clk.h>
25#include <linux/scatterlist.h>
26#include <linux/of.h>
27#include <linux/of_device.h>
Michael Bohan1834e7f2013-01-18 17:16:38 -080028#include <linux/kmemleak.h>
Laura Abbott0d135652012-10-04 12:59:03 -070029
30#include <asm/sizes.h>
31
Olav Haugan64ffdf32013-01-24 17:20:24 -080032#include <mach/iommu_perfmon.h>
Olav Haugane6d01ef2013-01-25 16:55:44 -080033#include <mach/iommu_hw-v1.h>
Olav Haugan090614f2013-03-22 12:14:18 -070034#include <mach/msm_iommu_priv.h>
Laura Abbott0d135652012-10-04 12:59:03 -070035#include <mach/iommu.h>
36#include <mach/scm.h>
37
38/* bitmap of the page sizes currently supported */
39#define MSM_IOMMU_PGSIZES (SZ_4K | SZ_64K | SZ_1M | SZ_16M)
40
41#define IOMMU_SECURE_CFG 2
42#define IOMMU_SECURE_PTBL_SIZE 3
43#define IOMMU_SECURE_PTBL_INIT 4
44#define IOMMU_SECURE_MAP 6
45#define IOMMU_SECURE_UNMAP 7
46
47static DEFINE_MUTEX(msm_iommu_lock);
48
Laura Abbott0d135652012-10-04 12:59:03 -070049struct msm_scm_paddr_list {
50 unsigned int list;
51 unsigned int list_size;
52 unsigned int size;
53};
54
55struct msm_scm_mapping_info {
56 unsigned int id;
57 unsigned int ctx_id;
58 unsigned int va;
59 unsigned int size;
60};
61
62struct msm_scm_map_req {
63 struct msm_scm_paddr_list plist;
64 struct msm_scm_mapping_info info;
65};
66
67static int msm_iommu_sec_ptbl_init(void)
68{
69 struct device_node *np;
70 struct msm_scm_ptbl_init {
71 unsigned int paddr;
72 unsigned int size;
73 unsigned int spare;
74 } pinit;
75 unsigned int *buf;
Mitchel Humpherys637cc532012-12-12 16:50:58 -080076 int psize[2] = {0, 0};
Laura Abbott0d135652012-10-04 12:59:03 -070077 unsigned int spare;
Mitchel Humpherys637cc532012-12-12 16:50:58 -080078 int ret, ptbl_ret = 0;
Laura Abbott0d135652012-10-04 12:59:03 -070079
Olav Haugan0e22c482013-01-28 17:39:36 -080080 for_each_compatible_node(np, NULL, "qcom,msm-smmu-v1")
Laura Abbott0d135652012-10-04 12:59:03 -070081 if (of_find_property(np, "qcom,iommu-secure-id", NULL))
82 break;
83
84 if (!np)
85 return 0;
86
87 of_node_put(np);
Syed Rameez Mustafa6ab6af32013-03-18 12:53:11 -070088 ret = scm_call(SCM_SVC_MP, IOMMU_SECURE_PTBL_SIZE, &spare,
Laura Abbott0d135652012-10-04 12:59:03 -070089 sizeof(spare), psize, sizeof(psize));
90 if (ret) {
91 pr_err("scm call IOMMU_SECURE_PTBL_SIZE failed\n");
92 goto fail;
93 }
94
95 if (psize[1]) {
96 pr_err("scm call IOMMU_SECURE_PTBL_SIZE failed\n");
97 goto fail;
98 }
99
100 buf = kmalloc(psize[0], GFP_KERNEL);
101 if (!buf) {
102 pr_err("%s: Failed to allocate %d bytes for PTBL\n",
103 __func__, psize[0]);
104 ret = -ENOMEM;
105 goto fail;
106 }
107
108 pinit.paddr = virt_to_phys(buf);
109 pinit.size = psize[0];
110
Syed Rameez Mustafa6ab6af32013-03-18 12:53:11 -0700111 ret = scm_call(SCM_SVC_MP, IOMMU_SECURE_PTBL_INIT, &pinit,
Laura Abbott0d135652012-10-04 12:59:03 -0700112 sizeof(pinit), &ptbl_ret, sizeof(ptbl_ret));
113 if (ret) {
114 pr_err("scm call IOMMU_SECURE_PTBL_INIT failed\n");
115 goto fail_mem;
116 }
117 if (ptbl_ret) {
118 pr_err("scm call IOMMU_SECURE_PTBL_INIT extended ret fail\n");
119 goto fail_mem;
120 }
121
Michael Bohan1834e7f2013-01-18 17:16:38 -0800122 kmemleak_not_leak(buf);
123
Laura Abbott0d135652012-10-04 12:59:03 -0700124 return 0;
125
126fail_mem:
127 kfree(buf);
128fail:
129 return ret;
130}
131
Laura Abbottf4daa692012-10-10 19:31:53 -0700132int msm_iommu_sec_program_iommu(int sec_id)
Laura Abbott0d135652012-10-04 12:59:03 -0700133{
134 struct msm_scm_sec_cfg {
135 unsigned int id;
136 unsigned int spare;
137 } cfg;
Mitchel Humpherys637cc532012-12-12 16:50:58 -0800138 int ret, scm_ret = 0;
Laura Abbott0d135652012-10-04 12:59:03 -0700139
140 cfg.id = sec_id;
141
Syed Rameez Mustafa6ab6af32013-03-18 12:53:11 -0700142 ret = scm_call(SCM_SVC_MP, IOMMU_SECURE_CFG, &cfg, sizeof(cfg),
Laura Abbott0d135652012-10-04 12:59:03 -0700143 &scm_ret, sizeof(scm_ret));
144 if (ret || scm_ret) {
145 pr_err("scm call IOMMU_SECURE_CFG failed\n");
146 return ret ? ret : -EINVAL;
147 }
148
149 return ret;
150}
151
152static int msm_iommu_sec_ptbl_map(struct msm_iommu_drvdata *iommu_drvdata,
153 struct msm_iommu_ctx_drvdata *ctx_drvdata,
154 unsigned long va, phys_addr_t pa, size_t len)
155{
156 struct msm_scm_map_req map;
157 int ret = 0;
158
159 map.plist.list = virt_to_phys(&pa);
160 map.plist.list_size = 1;
161 map.plist.size = len;
162 map.info.id = iommu_drvdata->sec_id;
163 map.info.ctx_id = ctx_drvdata->num;
164 map.info.va = va;
165 map.info.size = len;
166
Syed Rameez Mustafa6ab6af32013-03-18 12:53:11 -0700167 if (scm_call(SCM_SVC_MP, IOMMU_SECURE_MAP, &map, sizeof(map), &ret,
Laura Abbott0d135652012-10-04 12:59:03 -0700168 sizeof(ret)))
169 return -EINVAL;
170 if (ret)
171 return -EINVAL;
172
173 return 0;
174}
175
176static unsigned int get_phys_addr(struct scatterlist *sg)
177{
178 /*
179 * Try sg_dma_address first so that we can
180 * map carveout regions that do not have a
181 * struct page associated with them.
182 */
183 unsigned int pa = sg_dma_address(sg);
184 if (pa == 0)
185 pa = sg_phys(sg);
186 return pa;
187}
188
189static int msm_iommu_sec_ptbl_map_range(struct msm_iommu_drvdata *iommu_drvdata,
190 struct msm_iommu_ctx_drvdata *ctx_drvdata,
191 unsigned long va, struct scatterlist *sg, size_t len)
192{
193 struct scatterlist *sgiter;
194 struct msm_scm_map_req map;
195 unsigned int *pa_list = 0;
196 unsigned int pa, cnt;
197 unsigned int offset = 0, chunk_offset = 0;
198 int ret, scm_ret;
199
200 map.info.id = iommu_drvdata->sec_id;
201 map.info.ctx_id = ctx_drvdata->num;
202 map.info.va = va;
203 map.info.size = len;
204
205 if (sg->length == len) {
206 pa = get_phys_addr(sg);
207 map.plist.list = virt_to_phys(&pa);
208 map.plist.list_size = 1;
209 map.plist.size = len;
210 } else {
211 sgiter = sg;
212 cnt = sg->length / SZ_1M;
213 while ((sgiter = sg_next(sgiter)))
214 cnt += sgiter->length / SZ_1M;
215
216 pa_list = kmalloc(cnt * sizeof(*pa_list), GFP_KERNEL);
217 if (!pa_list)
218 return -ENOMEM;
219
220 sgiter = sg;
221 cnt = 0;
222 pa = get_phys_addr(sgiter);
223 while (offset < len) {
224 pa += chunk_offset;
225 pa_list[cnt] = pa;
226 chunk_offset += SZ_1M;
227 offset += SZ_1M;
228 cnt++;
229
230 if (chunk_offset >= sgiter->length && offset < len) {
231 chunk_offset = 0;
232 sgiter = sg_next(sgiter);
233 pa = get_phys_addr(sgiter);
234 }
235 }
236
237 map.plist.list = virt_to_phys(pa_list);
238 map.plist.list_size = cnt;
239 map.plist.size = SZ_1M;
240 }
241
Syed Rameez Mustafa6ab6af32013-03-18 12:53:11 -0700242 ret = scm_call(SCM_SVC_MP, IOMMU_SECURE_MAP, &map, sizeof(map),
Laura Abbott0d135652012-10-04 12:59:03 -0700243 &scm_ret, sizeof(scm_ret));
244 kfree(pa_list);
245 return ret;
246}
247
248static int msm_iommu_sec_ptbl_unmap(struct msm_iommu_drvdata *iommu_drvdata,
249 struct msm_iommu_ctx_drvdata *ctx_drvdata,
250 unsigned long va, size_t len)
251{
252 struct msm_scm_mapping_info mi;
253 int ret, scm_ret;
254
255 mi.id = iommu_drvdata->sec_id;
256 mi.ctx_id = ctx_drvdata->num;
257 mi.va = va;
258 mi.size = len;
259
Syed Rameez Mustafa6ab6af32013-03-18 12:53:11 -0700260 ret = scm_call(SCM_SVC_MP, IOMMU_SECURE_UNMAP, &mi, sizeof(mi),
Laura Abbott0d135652012-10-04 12:59:03 -0700261 &scm_ret, sizeof(scm_ret));
262 return ret;
263}
264
265static int __enable_clocks(struct msm_iommu_drvdata *drvdata)
266{
267 int ret;
268
269 ret = clk_prepare_enable(drvdata->pclk);
270 if (ret)
271 goto fail;
272
273 ret = clk_prepare_enable(drvdata->clk);
274 if (ret)
275 clk_disable_unprepare(drvdata->pclk);
276
277 if (drvdata->aclk) {
278 ret = clk_prepare_enable(drvdata->aclk);
279 if (ret) {
280 clk_disable_unprepare(drvdata->clk);
281 clk_disable_unprepare(drvdata->pclk);
282 }
283 }
284fail:
285 return ret;
286}
287
288static void __disable_clocks(struct msm_iommu_drvdata *drvdata)
289{
290 if (drvdata->aclk)
291 clk_disable_unprepare(drvdata->aclk);
292 clk_disable_unprepare(drvdata->clk);
293 clk_disable_unprepare(drvdata->pclk);
294}
295
296static int msm_iommu_domain_init(struct iommu_domain *domain, int flags)
297{
Olav Haugan090614f2013-03-22 12:14:18 -0700298 struct msm_iommu_priv *priv;
Laura Abbott0d135652012-10-04 12:59:03 -0700299
300 priv = kzalloc(sizeof(*priv), GFP_KERNEL);
301 if (!priv)
302 return -ENOMEM;
303
304 INIT_LIST_HEAD(&priv->list_attached);
305 domain->priv = priv;
306 return 0;
307}
308
309static void msm_iommu_domain_destroy(struct iommu_domain *domain)
310{
Olav Haugan090614f2013-03-22 12:14:18 -0700311 struct msm_iommu_priv *priv;
Laura Abbott0d135652012-10-04 12:59:03 -0700312
313 mutex_lock(&msm_iommu_lock);
314 priv = domain->priv;
315 domain->priv = NULL;
316
317 kfree(priv);
318 mutex_unlock(&msm_iommu_lock);
319}
320
321static int msm_iommu_attach_dev(struct iommu_domain *domain, struct device *dev)
322{
Olav Haugan090614f2013-03-22 12:14:18 -0700323 struct msm_iommu_priv *priv;
Laura Abbott0d135652012-10-04 12:59:03 -0700324 struct msm_iommu_drvdata *iommu_drvdata;
325 struct msm_iommu_ctx_drvdata *ctx_drvdata;
326 struct msm_iommu_ctx_drvdata *tmp_drvdata;
327 int ret = 0;
328
329 mutex_lock(&msm_iommu_lock);
330
331 priv = domain->priv;
332 if (!priv || !dev) {
333 ret = -EINVAL;
334 goto fail;
335 }
336
337 iommu_drvdata = dev_get_drvdata(dev->parent);
338 ctx_drvdata = dev_get_drvdata(dev);
339 if (!iommu_drvdata || !ctx_drvdata) {
340 ret = -EINVAL;
341 goto fail;
342 }
343
344 if (!list_empty(&ctx_drvdata->attached_elm)) {
345 ret = -EBUSY;
346 goto fail;
347 }
348
349 list_for_each_entry(tmp_drvdata, &priv->list_attached, attached_elm)
350 if (tmp_drvdata == ctx_drvdata) {
351 ret = -EBUSY;
352 goto fail;
353 }
354
355 ret = regulator_enable(iommu_drvdata->gdsc);
356 if (ret)
357 goto fail;
358
Olav Haugane3885392013-03-06 16:22:53 -0800359 /* We can only do this once */
360 if (!iommu_drvdata->ctx_attach_count) {
361 ret = __enable_clocks(iommu_drvdata);
362 if (ret) {
363 regulator_disable(iommu_drvdata->gdsc);
364 goto fail;
365 }
Laura Abbott0d135652012-10-04 12:59:03 -0700366
Olav Haugane3885392013-03-06 16:22:53 -0800367 ret = msm_iommu_sec_program_iommu(iommu_drvdata->sec_id);
Olav Haugance2eab92013-02-07 12:59:18 -0800368
Olav Haugane3885392013-03-06 16:22:53 -0800369 /* bfb settings are always programmed by HLOS */
370 program_iommu_bfb_settings(iommu_drvdata->base,
371 iommu_drvdata->bfb_settings);
Olav Hauganf3782732013-01-11 11:23:30 -0800372
Olav Haugane3885392013-03-06 16:22:53 -0800373 __disable_clocks(iommu_drvdata);
374 if (ret) {
375 regulator_disable(iommu_drvdata->gdsc);
376 goto fail;
377 }
Laura Abbott0d135652012-10-04 12:59:03 -0700378 }
379
380 list_add(&(ctx_drvdata->attached_elm), &priv->list_attached);
381 ctx_drvdata->attached_domain = domain;
Olav Haugane3885392013-03-06 16:22:53 -0800382 ++iommu_drvdata->ctx_attach_count;
Laura Abbott0d135652012-10-04 12:59:03 -0700383
Olav Haugan64ffdf32013-01-24 17:20:24 -0800384 mutex_unlock(&msm_iommu_lock);
385
386 msm_iommu_attached(dev->parent);
387 return ret;
Laura Abbott0d135652012-10-04 12:59:03 -0700388fail:
389 mutex_unlock(&msm_iommu_lock);
390 return ret;
391}
392
393static void msm_iommu_detach_dev(struct iommu_domain *domain,
394 struct device *dev)
395{
396 struct msm_iommu_drvdata *iommu_drvdata;
397 struct msm_iommu_ctx_drvdata *ctx_drvdata;
398
Olav Haugan64ffdf32013-01-24 17:20:24 -0800399 msm_iommu_detached(dev->parent);
400
Laura Abbott0d135652012-10-04 12:59:03 -0700401 mutex_lock(&msm_iommu_lock);
402 if (!dev)
403 goto fail;
404
405 iommu_drvdata = dev_get_drvdata(dev->parent);
406 ctx_drvdata = dev_get_drvdata(dev);
407 if (!iommu_drvdata || !ctx_drvdata || !ctx_drvdata->attached_domain)
408 goto fail;
409
410 list_del_init(&ctx_drvdata->attached_elm);
411 ctx_drvdata->attached_domain = NULL;
412
413 regulator_disable(iommu_drvdata->gdsc);
Olav Haugane3885392013-03-06 16:22:53 -0800414 BUG_ON(iommu_drvdata->ctx_attach_count == 0);
415 --iommu_drvdata->ctx_attach_count;
Laura Abbott0d135652012-10-04 12:59:03 -0700416fail:
417 mutex_unlock(&msm_iommu_lock);
418}
419
420static int get_drvdata(struct iommu_domain *domain,
421 struct msm_iommu_drvdata **iommu_drvdata,
422 struct msm_iommu_ctx_drvdata **ctx_drvdata)
423{
Olav Haugan090614f2013-03-22 12:14:18 -0700424 struct msm_iommu_priv *priv = domain->priv;
Laura Abbott0d135652012-10-04 12:59:03 -0700425 struct msm_iommu_ctx_drvdata *ctx;
426
427 list_for_each_entry(ctx, &priv->list_attached, attached_elm) {
428 if (ctx->attached_domain == domain)
429 break;
430 }
431
432 if (ctx->attached_domain != domain)
433 return -EINVAL;
434
435 *ctx_drvdata = ctx;
436 *iommu_drvdata = dev_get_drvdata(ctx->pdev->dev.parent);
437 return 0;
438}
439
440static int msm_iommu_map(struct iommu_domain *domain, unsigned long va,
441 phys_addr_t pa, size_t len, int prot)
442{
443 struct msm_iommu_drvdata *iommu_drvdata;
444 struct msm_iommu_ctx_drvdata *ctx_drvdata;
445 int ret = 0;
446
447 mutex_lock(&msm_iommu_lock);
448
449 ret = get_drvdata(domain, &iommu_drvdata, &ctx_drvdata);
450 if (ret)
451 goto fail;
452
453 ret = msm_iommu_sec_ptbl_map(iommu_drvdata, ctx_drvdata,
454 va, pa, len);
455fail:
456 mutex_unlock(&msm_iommu_lock);
457 return ret;
458}
459
460static size_t msm_iommu_unmap(struct iommu_domain *domain, unsigned long va,
461 size_t len)
462{
463 struct msm_iommu_drvdata *iommu_drvdata;
464 struct msm_iommu_ctx_drvdata *ctx_drvdata;
465 int ret = -ENODEV;
466
467 mutex_lock(&msm_iommu_lock);
468
469 ret = get_drvdata(domain, &iommu_drvdata, &ctx_drvdata);
470 if (ret)
471 goto fail;
472
473 ret = msm_iommu_sec_ptbl_unmap(iommu_drvdata, ctx_drvdata,
474 va, len);
475fail:
476 mutex_unlock(&msm_iommu_lock);
477
478 /* the IOMMU API requires us to return how many bytes were unmapped */
479 len = ret ? 0 : len;
480 return len;
481}
482
483static int msm_iommu_map_range(struct iommu_domain *domain, unsigned int va,
484 struct scatterlist *sg, unsigned int len,
485 int prot)
486{
487 int ret;
488 struct msm_iommu_drvdata *iommu_drvdata;
489 struct msm_iommu_ctx_drvdata *ctx_drvdata;
490
491 mutex_lock(&msm_iommu_lock);
492
493 ret = get_drvdata(domain, &iommu_drvdata, &ctx_drvdata);
494 if (ret)
495 goto fail;
496 ret = msm_iommu_sec_ptbl_map_range(iommu_drvdata, ctx_drvdata,
497 va, sg, len);
498fail:
499 mutex_unlock(&msm_iommu_lock);
500 return ret;
501}
502
503
504static int msm_iommu_unmap_range(struct iommu_domain *domain, unsigned int va,
505 unsigned int len)
506{
507 struct msm_iommu_drvdata *iommu_drvdata;
508 struct msm_iommu_ctx_drvdata *ctx_drvdata;
509 int ret;
510
511 mutex_lock(&msm_iommu_lock);
512
513 ret = get_drvdata(domain, &iommu_drvdata, &ctx_drvdata);
514 if (ret)
515 goto fail;
516
517 ret = msm_iommu_sec_ptbl_unmap(iommu_drvdata, ctx_drvdata, va, len);
518
519fail:
520 mutex_unlock(&msm_iommu_lock);
521 return 0;
522}
523
524static phys_addr_t msm_iommu_iova_to_phys(struct iommu_domain *domain,
525 unsigned long va)
526{
527 return 0;
528}
529
530static int msm_iommu_domain_has_cap(struct iommu_domain *domain,
531 unsigned long cap)
532{
533 return 0;
534}
535
536static phys_addr_t msm_iommu_get_pt_base_addr(struct iommu_domain *domain)
537{
538 return 0;
539}
540
541static struct iommu_ops msm_iommu_ops = {
542 .domain_init = msm_iommu_domain_init,
543 .domain_destroy = msm_iommu_domain_destroy,
544 .attach_dev = msm_iommu_attach_dev,
545 .detach_dev = msm_iommu_detach_dev,
546 .map = msm_iommu_map,
547 .unmap = msm_iommu_unmap,
548 .map_range = msm_iommu_map_range,
549 .unmap_range = msm_iommu_unmap_range,
550 .iova_to_phys = msm_iommu_iova_to_phys,
551 .domain_has_cap = msm_iommu_domain_has_cap,
552 .get_pt_base_addr = msm_iommu_get_pt_base_addr,
553 .pgsize_bitmap = MSM_IOMMU_PGSIZES,
554};
555
556static int __init msm_iommu_sec_init(void)
557{
558 int ret;
559
560 ret = bus_register(&msm_iommu_sec_bus_type);
561 if (ret)
562 goto fail;
563
564 bus_set_iommu(&msm_iommu_sec_bus_type, &msm_iommu_ops);
565 ret = msm_iommu_sec_ptbl_init();
566fail:
567 return ret;
568}
569
570subsys_initcall(msm_iommu_sec_init);
571
572MODULE_LICENSE("GPL v2");
573MODULE_DESCRIPTION("MSM SMMU Secure Driver");