]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/iommu/arm-smmu.c
Merge tag 'for-linus-20170825' of git://git.infradead.org/linux-mtd
[mirror_ubuntu-artful-kernel.git] / drivers / iommu / arm-smmu.c
CommitLineData
45ae7cff
WD
1/*
2 * IOMMU API for ARM architected SMMU implementations.
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this program; if not, write to the Free Software
15 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
16 *
17 * Copyright (C) 2013 ARM Limited
18 *
19 * Author: Will Deacon <will.deacon@arm.com>
20 *
21 * This driver currently supports:
22 * - SMMUv1 and v2 implementations
23 * - Stream-matching and stream-indexing
24 * - v7/v8 long-descriptor format
25 * - Non-secure access to the SMMU
45ae7cff 26 * - Context fault reporting
dc0eaa4e 27 * - Extended Stream ID (16 bit)
45ae7cff
WD
28 */
29
30#define pr_fmt(fmt) "arm-smmu: " fmt
31
d6fcd3b1
LP
32#include <linux/acpi.h>
33#include <linux/acpi_iort.h>
1f3d5ca4 34#include <linux/atomic.h>
45ae7cff 35#include <linux/delay.h>
9adb9594 36#include <linux/dma-iommu.h>
45ae7cff
WD
37#include <linux/dma-mapping.h>
38#include <linux/err.h>
39#include <linux/interrupt.h>
40#include <linux/io.h>
f9a05f05 41#include <linux/io-64-nonatomic-hi-lo.h>
45ae7cff 42#include <linux/iommu.h>
859a732e 43#include <linux/iopoll.h>
45ae7cff
WD
44#include <linux/module.h>
45#include <linux/of.h>
bae2c2d4 46#include <linux/of_address.h>
d6fc5d97 47#include <linux/of_device.h>
adfec2e7 48#include <linux/of_iommu.h>
a9a1b0b5 49#include <linux/pci.h>
45ae7cff
WD
50#include <linux/platform_device.h>
51#include <linux/slab.h>
52#include <linux/spinlock.h>
53
54#include <linux/amba/bus.h>
55
518f7136 56#include "io-pgtable.h"
45ae7cff 57
45ae7cff
WD
58/* Maximum number of context banks per SMMU */
59#define ARM_SMMU_MAX_CBS 128
60
45ae7cff
WD
61/* SMMU global address space */
62#define ARM_SMMU_GR0(smmu) ((smmu)->base)
c757e852 63#define ARM_SMMU_GR1(smmu) ((smmu)->base + (1 << (smmu)->pgshift))
45ae7cff 64
3a5df8ff
AH
65/*
66 * SMMU global address space with conditional offset to access secure
67 * aliases of non-secure registers (e.g. nsCR0: 0x400, nsGFSR: 0x448,
68 * nsGFSYNR0: 0x450)
69 */
70#define ARM_SMMU_GR0_NS(smmu) \
71 ((smmu)->base + \
72 ((smmu->options & ARM_SMMU_OPT_SECURE_CFG_ACCESS) \
73 ? 0x400 : 0))
74
f9a05f05
RM
75/*
76 * Some 64-bit registers only make sense to write atomically, but in such
77 * cases all the data relevant to AArch32 formats lies within the lower word,
78 * therefore this actually makes more sense than it might first appear.
79 */
668b4ada 80#ifdef CONFIG_64BIT
f9a05f05 81#define smmu_write_atomic_lq writeq_relaxed
668b4ada 82#else
f9a05f05 83#define smmu_write_atomic_lq writel_relaxed
668b4ada
TC
84#endif
85
45ae7cff
WD
86/* Configuration registers */
87#define ARM_SMMU_GR0_sCR0 0x0
88#define sCR0_CLIENTPD (1 << 0)
89#define sCR0_GFRE (1 << 1)
90#define sCR0_GFIE (1 << 2)
dc0eaa4e 91#define sCR0_EXIDENABLE (1 << 3)
45ae7cff
WD
92#define sCR0_GCFGFRE (1 << 4)
93#define sCR0_GCFGFIE (1 << 5)
94#define sCR0_USFCFG (1 << 10)
95#define sCR0_VMIDPNE (1 << 11)
96#define sCR0_PTM (1 << 12)
97#define sCR0_FB (1 << 13)
4e3e9b69 98#define sCR0_VMID16EN (1 << 31)
45ae7cff
WD
99#define sCR0_BSU_SHIFT 14
100#define sCR0_BSU_MASK 0x3
101
3ca3712a
PF
102/* Auxiliary Configuration register */
103#define ARM_SMMU_GR0_sACR 0x10
104
45ae7cff
WD
105/* Identification registers */
106#define ARM_SMMU_GR0_ID0 0x20
107#define ARM_SMMU_GR0_ID1 0x24
108#define ARM_SMMU_GR0_ID2 0x28
109#define ARM_SMMU_GR0_ID3 0x2c
110#define ARM_SMMU_GR0_ID4 0x30
111#define ARM_SMMU_GR0_ID5 0x34
112#define ARM_SMMU_GR0_ID6 0x38
113#define ARM_SMMU_GR0_ID7 0x3c
114#define ARM_SMMU_GR0_sGFSR 0x48
115#define ARM_SMMU_GR0_sGFSYNR0 0x50
116#define ARM_SMMU_GR0_sGFSYNR1 0x54
117#define ARM_SMMU_GR0_sGFSYNR2 0x58
45ae7cff
WD
118
119#define ID0_S1TS (1 << 30)
120#define ID0_S2TS (1 << 29)
121#define ID0_NTS (1 << 28)
122#define ID0_SMS (1 << 27)
859a732e 123#define ID0_ATOSNS (1 << 26)
7602b871
RM
124#define ID0_PTFS_NO_AARCH32 (1 << 25)
125#define ID0_PTFS_NO_AARCH32S (1 << 24)
45ae7cff
WD
126#define ID0_CTTW (1 << 14)
127#define ID0_NUMIRPT_SHIFT 16
128#define ID0_NUMIRPT_MASK 0xff
3c8766d0
OH
129#define ID0_NUMSIDB_SHIFT 9
130#define ID0_NUMSIDB_MASK 0xf
dc0eaa4e 131#define ID0_EXIDS (1 << 8)
45ae7cff
WD
132#define ID0_NUMSMRG_SHIFT 0
133#define ID0_NUMSMRG_MASK 0xff
134
135#define ID1_PAGESIZE (1 << 31)
136#define ID1_NUMPAGENDXB_SHIFT 28
137#define ID1_NUMPAGENDXB_MASK 7
138#define ID1_NUMS2CB_SHIFT 16
139#define ID1_NUMS2CB_MASK 0xff
140#define ID1_NUMCB_SHIFT 0
141#define ID1_NUMCB_MASK 0xff
142
143#define ID2_OAS_SHIFT 4
144#define ID2_OAS_MASK 0xf
145#define ID2_IAS_SHIFT 0
146#define ID2_IAS_MASK 0xf
147#define ID2_UBS_SHIFT 8
148#define ID2_UBS_MASK 0xf
149#define ID2_PTFS_4K (1 << 12)
150#define ID2_PTFS_16K (1 << 13)
151#define ID2_PTFS_64K (1 << 14)
4e3e9b69 152#define ID2_VMID16 (1 << 15)
45ae7cff 153
3ca3712a
PF
154#define ID7_MAJOR_SHIFT 4
155#define ID7_MAJOR_MASK 0xf
45ae7cff 156
45ae7cff 157/* Global TLB invalidation */
45ae7cff
WD
158#define ARM_SMMU_GR0_TLBIVMID 0x64
159#define ARM_SMMU_GR0_TLBIALLNSNH 0x68
160#define ARM_SMMU_GR0_TLBIALLH 0x6c
161#define ARM_SMMU_GR0_sTLBGSYNC 0x70
162#define ARM_SMMU_GR0_sTLBGSTATUS 0x74
163#define sTLBGSTATUS_GSACTIVE (1 << 0)
164#define TLB_LOOP_TIMEOUT 1000000 /* 1s! */
8513c893 165#define TLB_SPIN_COUNT 10
45ae7cff
WD
166
167/* Stream mapping registers */
168#define ARM_SMMU_GR0_SMR(n) (0x800 + ((n) << 2))
169#define SMR_VALID (1 << 31)
170#define SMR_MASK_SHIFT 16
45ae7cff 171#define SMR_ID_SHIFT 0
45ae7cff
WD
172
173#define ARM_SMMU_GR0_S2CR(n) (0xc00 + ((n) << 2))
174#define S2CR_CBNDX_SHIFT 0
175#define S2CR_CBNDX_MASK 0xff
dc0eaa4e 176#define S2CR_EXIDVALID (1 << 10)
45ae7cff
WD
177#define S2CR_TYPE_SHIFT 16
178#define S2CR_TYPE_MASK 0x3
8e8b203e
RM
179enum arm_smmu_s2cr_type {
180 S2CR_TYPE_TRANS,
181 S2CR_TYPE_BYPASS,
182 S2CR_TYPE_FAULT,
183};
45ae7cff 184
d346180e 185#define S2CR_PRIVCFG_SHIFT 24
8e8b203e
RM
186#define S2CR_PRIVCFG_MASK 0x3
187enum arm_smmu_s2cr_privcfg {
188 S2CR_PRIVCFG_DEFAULT,
189 S2CR_PRIVCFG_DIPAN,
190 S2CR_PRIVCFG_UNPRIV,
191 S2CR_PRIVCFG_PRIV,
192};
d346180e 193
45ae7cff
WD
194/* Context bank attribute registers */
195#define ARM_SMMU_GR1_CBAR(n) (0x0 + ((n) << 2))
196#define CBAR_VMID_SHIFT 0
197#define CBAR_VMID_MASK 0xff
57ca90f6
WD
198#define CBAR_S1_BPSHCFG_SHIFT 8
199#define CBAR_S1_BPSHCFG_MASK 3
200#define CBAR_S1_BPSHCFG_NSH 3
45ae7cff
WD
201#define CBAR_S1_MEMATTR_SHIFT 12
202#define CBAR_S1_MEMATTR_MASK 0xf
203#define CBAR_S1_MEMATTR_WB 0xf
204#define CBAR_TYPE_SHIFT 16
205#define CBAR_TYPE_MASK 0x3
206#define CBAR_TYPE_S2_TRANS (0 << CBAR_TYPE_SHIFT)
207#define CBAR_TYPE_S1_TRANS_S2_BYPASS (1 << CBAR_TYPE_SHIFT)
208#define CBAR_TYPE_S1_TRANS_S2_FAULT (2 << CBAR_TYPE_SHIFT)
209#define CBAR_TYPE_S1_TRANS_S2_TRANS (3 << CBAR_TYPE_SHIFT)
210#define CBAR_IRPTNDX_SHIFT 24
211#define CBAR_IRPTNDX_MASK 0xff
212
213#define ARM_SMMU_GR1_CBA2R(n) (0x800 + ((n) << 2))
214#define CBA2R_RW64_32BIT (0 << 0)
215#define CBA2R_RW64_64BIT (1 << 0)
4e3e9b69
TC
216#define CBA2R_VMID_SHIFT 16
217#define CBA2R_VMID_MASK 0xffff
45ae7cff
WD
218
219/* Translation context bank */
452107c7 220#define ARM_SMMU_CB(smmu, n) ((smmu)->cb_base + ((n) << (smmu)->pgshift))
45ae7cff
WD
221
222#define ARM_SMMU_CB_SCTLR 0x0
f0cfffc4 223#define ARM_SMMU_CB_ACTLR 0x4
45ae7cff
WD
224#define ARM_SMMU_CB_RESUME 0x8
225#define ARM_SMMU_CB_TTBCR2 0x10
668b4ada
TC
226#define ARM_SMMU_CB_TTBR0 0x20
227#define ARM_SMMU_CB_TTBR1 0x28
45ae7cff 228#define ARM_SMMU_CB_TTBCR 0x30
6070529b 229#define ARM_SMMU_CB_CONTEXTIDR 0x34
45ae7cff 230#define ARM_SMMU_CB_S1_MAIR0 0x38
518f7136 231#define ARM_SMMU_CB_S1_MAIR1 0x3c
f9a05f05 232#define ARM_SMMU_CB_PAR 0x50
45ae7cff 233#define ARM_SMMU_CB_FSR 0x58
f9a05f05 234#define ARM_SMMU_CB_FAR 0x60
45ae7cff 235#define ARM_SMMU_CB_FSYNR0 0x68
518f7136 236#define ARM_SMMU_CB_S1_TLBIVA 0x600
1463fe44 237#define ARM_SMMU_CB_S1_TLBIASID 0x610
518f7136
WD
238#define ARM_SMMU_CB_S1_TLBIVAL 0x620
239#define ARM_SMMU_CB_S2_TLBIIPAS2 0x630
240#define ARM_SMMU_CB_S2_TLBIIPAS2L 0x638
11febfca
RM
241#define ARM_SMMU_CB_TLBSYNC 0x7f0
242#define ARM_SMMU_CB_TLBSTATUS 0x7f4
661d962f 243#define ARM_SMMU_CB_ATS1PR 0x800
859a732e 244#define ARM_SMMU_CB_ATSR 0x8f0
45ae7cff
WD
245
246#define SCTLR_S1_ASIDPNE (1 << 12)
247#define SCTLR_CFCFG (1 << 7)
248#define SCTLR_CFIE (1 << 6)
249#define SCTLR_CFRE (1 << 5)
250#define SCTLR_E (1 << 4)
251#define SCTLR_AFE (1 << 2)
252#define SCTLR_TRE (1 << 1)
253#define SCTLR_M (1 << 0)
45ae7cff 254
f0cfffc4
RM
255#define ARM_MMU500_ACTLR_CPRE (1 << 1)
256
3ca3712a 257#define ARM_MMU500_ACR_CACHE_LOCK (1 << 26)
6eb18d4a 258#define ARM_MMU500_ACR_SMTNMB_TLBEN (1 << 8)
3ca3712a 259
859a732e
MH
260#define CB_PAR_F (1 << 0)
261
262#define ATSR_ACTIVE (1 << 0)
263
45ae7cff
WD
264#define RESUME_RETRY (0 << 0)
265#define RESUME_TERMINATE (1 << 0)
266
45ae7cff 267#define TTBCR2_SEP_SHIFT 15
5dc5616e 268#define TTBCR2_SEP_UPSTREAM (0x7 << TTBCR2_SEP_SHIFT)
3677a649 269#define TTBCR2_AS (1 << 4)
45ae7cff 270
668b4ada 271#define TTBRn_ASID_SHIFT 48
45ae7cff
WD
272
273#define FSR_MULTI (1 << 31)
274#define FSR_SS (1 << 30)
275#define FSR_UUT (1 << 8)
276#define FSR_ASF (1 << 7)
277#define FSR_TLBLKF (1 << 6)
278#define FSR_TLBMCF (1 << 5)
279#define FSR_EF (1 << 4)
280#define FSR_PF (1 << 3)
281#define FSR_AFF (1 << 2)
282#define FSR_TF (1 << 1)
283
2907320d
MH
284#define FSR_IGN (FSR_AFF | FSR_ASF | \
285 FSR_TLBMCF | FSR_TLBLKF)
286#define FSR_FAULT (FSR_MULTI | FSR_SS | FSR_UUT | \
adaba320 287 FSR_EF | FSR_PF | FSR_TF | FSR_IGN)
45ae7cff
WD
288
289#define FSYNR0_WNR (1 << 4)
290
f3ebee80
EA
291#define MSI_IOVA_BASE 0x8000000
292#define MSI_IOVA_LENGTH 0x100000
293
4cf740b0 294static int force_stage;
25a1c96c 295module_param(force_stage, int, S_IRUGO);
4cf740b0
WD
296MODULE_PARM_DESC(force_stage,
297 "Force SMMU mappings to be installed at a particular stage of translation. A value of '1' or '2' forces the corresponding stage. All other values are ignored (i.e. no stage is forced). Note that selecting a specific stage will disable support for nested translation.");
25a1c96c
RM
298static bool disable_bypass;
299module_param(disable_bypass, bool, S_IRUGO);
300MODULE_PARM_DESC(disable_bypass,
301 "Disable bypass streams such that incoming transactions from devices that are not attached to an iommu domain will report an abort back to the device and will not be allowed to pass through the SMMU.");
4cf740b0 302
09360403 303enum arm_smmu_arch_version {
b7862e35
RM
304 ARM_SMMU_V1,
305 ARM_SMMU_V1_64K,
09360403
RM
306 ARM_SMMU_V2,
307};
308
67b65a3f
RM
309enum arm_smmu_implementation {
310 GENERIC_SMMU,
f0cfffc4 311 ARM_MMU500,
e086d912 312 CAVIUM_SMMUV2,
67b65a3f
RM
313};
314
84c24379
RM
315/* Until ACPICA headers cover IORT rev. C */
316#ifndef ACPI_IORT_SMMU_CORELINK_MMU401
317#define ACPI_IORT_SMMU_CORELINK_MMU401 0x4
318#endif
319#ifndef ACPI_IORT_SMMU_CAVIUM_THUNDERX
320#define ACPI_IORT_SMMU_CAVIUM_THUNDERX 0x5
321#endif
322
8e8b203e 323struct arm_smmu_s2cr {
588888a7
RM
324 struct iommu_group *group;
325 int count;
8e8b203e
RM
326 enum arm_smmu_s2cr_type type;
327 enum arm_smmu_s2cr_privcfg privcfg;
328 u8 cbndx;
329};
330
331#define s2cr_init_val (struct arm_smmu_s2cr){ \
332 .type = disable_bypass ? S2CR_TYPE_FAULT : S2CR_TYPE_BYPASS, \
333}
334
45ae7cff 335struct arm_smmu_smr {
45ae7cff
WD
336 u16 mask;
337 u16 id;
1f3d5ca4 338 bool valid;
45ae7cff
WD
339};
340
a9a1b0b5 341struct arm_smmu_master_cfg {
f80cd885 342 struct arm_smmu_device *smmu;
adfec2e7 343 s16 smendx[];
45ae7cff 344};
1f3d5ca4 345#define INVALID_SMENDX -1
adfec2e7
RM
346#define __fwspec_cfg(fw) ((struct arm_smmu_master_cfg *)fw->iommu_priv)
347#define fwspec_smmu(fw) (__fwspec_cfg(fw)->smmu)
8c82d6ec
RM
348#define fwspec_smendx(fw, i) \
349 (i >= fw->num_ids ? INVALID_SMENDX : __fwspec_cfg(fw)->smendx[i])
adfec2e7 350#define for_each_cfg_sme(fw, i, idx) \
8c82d6ec 351 for (i = 0; idx = fwspec_smendx(fw, i), i < fw->num_ids; ++i)
45ae7cff
WD
352
353struct arm_smmu_device {
354 struct device *dev;
45ae7cff
WD
355
356 void __iomem *base;
452107c7 357 void __iomem *cb_base;
c757e852 358 unsigned long pgshift;
45ae7cff
WD
359
360#define ARM_SMMU_FEAT_COHERENT_WALK (1 << 0)
361#define ARM_SMMU_FEAT_STREAM_MATCH (1 << 1)
362#define ARM_SMMU_FEAT_TRANS_S1 (1 << 2)
363#define ARM_SMMU_FEAT_TRANS_S2 (1 << 3)
364#define ARM_SMMU_FEAT_TRANS_NESTED (1 << 4)
859a732e 365#define ARM_SMMU_FEAT_TRANS_OPS (1 << 5)
4e3e9b69 366#define ARM_SMMU_FEAT_VMID16 (1 << 6)
7602b871
RM
367#define ARM_SMMU_FEAT_FMT_AARCH64_4K (1 << 7)
368#define ARM_SMMU_FEAT_FMT_AARCH64_16K (1 << 8)
369#define ARM_SMMU_FEAT_FMT_AARCH64_64K (1 << 9)
370#define ARM_SMMU_FEAT_FMT_AARCH32_L (1 << 10)
371#define ARM_SMMU_FEAT_FMT_AARCH32_S (1 << 11)
dc0eaa4e 372#define ARM_SMMU_FEAT_EXIDS (1 << 12)
45ae7cff 373 u32 features;
3a5df8ff
AH
374
375#define ARM_SMMU_OPT_SECURE_CFG_ACCESS (1 << 0)
376 u32 options;
09360403 377 enum arm_smmu_arch_version version;
67b65a3f 378 enum arm_smmu_implementation model;
45ae7cff
WD
379
380 u32 num_context_banks;
381 u32 num_s2_context_banks;
382 DECLARE_BITMAP(context_map, ARM_SMMU_MAX_CBS);
383 atomic_t irptndx;
384
385 u32 num_mapping_groups;
21174240
RM
386 u16 streamid_mask;
387 u16 smr_mask_mask;
1f3d5ca4 388 struct arm_smmu_smr *smrs;
8e8b203e 389 struct arm_smmu_s2cr *s2crs;
588888a7 390 struct mutex stream_map_mutex;
45ae7cff 391
518f7136
WD
392 unsigned long va_size;
393 unsigned long ipa_size;
394 unsigned long pa_size;
d5466357 395 unsigned long pgsize_bitmap;
45ae7cff
WD
396
397 u32 num_global_irqs;
398 u32 num_context_irqs;
399 unsigned int *irqs;
400
1bd37a68 401 u32 cavium_id_base; /* Specific to Cavium */
9648cbc9 402
8e517e76
WD
403 spinlock_t global_sync_lock;
404
9648cbc9
JR
405 /* IOMMU core code handle */
406 struct iommu_device iommu;
45ae7cff
WD
407};
408
7602b871
RM
409enum arm_smmu_context_fmt {
410 ARM_SMMU_CTX_FMT_NONE,
411 ARM_SMMU_CTX_FMT_AARCH64,
412 ARM_SMMU_CTX_FMT_AARCH32_L,
413 ARM_SMMU_CTX_FMT_AARCH32_S,
45ae7cff
WD
414};
415
416struct arm_smmu_cfg {
45ae7cff
WD
417 u8 cbndx;
418 u8 irptndx;
280b683c
RM
419 union {
420 u16 asid;
421 u16 vmid;
422 };
45ae7cff 423 u32 cbar;
7602b871 424 enum arm_smmu_context_fmt fmt;
45ae7cff 425};
faea13b7 426#define INVALID_IRPTNDX 0xff
45ae7cff 427
c752ce45
WD
428enum arm_smmu_domain_stage {
429 ARM_SMMU_DOMAIN_S1 = 0,
430 ARM_SMMU_DOMAIN_S2,
431 ARM_SMMU_DOMAIN_NESTED,
61bc6711 432 ARM_SMMU_DOMAIN_BYPASS,
c752ce45
WD
433};
434
45ae7cff 435struct arm_smmu_domain {
44680eed 436 struct arm_smmu_device *smmu;
518f7136 437 struct io_pgtable_ops *pgtbl_ops;
44680eed 438 struct arm_smmu_cfg cfg;
c752ce45 439 enum arm_smmu_domain_stage stage;
518f7136 440 struct mutex init_mutex; /* Protects smmu pointer */
8e517e76 441 spinlock_t cb_lock; /* Serialises ATS1* ops and TLB syncs */
1d672638 442 struct iommu_domain domain;
45ae7cff
WD
443};
444
3a5df8ff
AH
445struct arm_smmu_option_prop {
446 u32 opt;
447 const char *prop;
448};
449
1bd37a68
TC
450static atomic_t cavium_smmu_context_count = ATOMIC_INIT(0);
451
021bb842
RM
452static bool using_legacy_binding, using_generic_binding;
453
2907320d 454static struct arm_smmu_option_prop arm_smmu_options[] = {
3a5df8ff
AH
455 { ARM_SMMU_OPT_SECURE_CFG_ACCESS, "calxeda,smmu-secure-config-access" },
456 { 0, NULL},
457};
458
1d672638
JR
459static struct arm_smmu_domain *to_smmu_domain(struct iommu_domain *dom)
460{
461 return container_of(dom, struct arm_smmu_domain, domain);
462}
463
3a5df8ff
AH
464static void parse_driver_options(struct arm_smmu_device *smmu)
465{
466 int i = 0;
2907320d 467
3a5df8ff
AH
468 do {
469 if (of_property_read_bool(smmu->dev->of_node,
470 arm_smmu_options[i].prop)) {
471 smmu->options |= arm_smmu_options[i].opt;
472 dev_notice(smmu->dev, "option %s\n",
473 arm_smmu_options[i].prop);
474 }
475 } while (arm_smmu_options[++i].opt);
476}
477
8f68f8e2 478static struct device_node *dev_get_dev_node(struct device *dev)
a9a1b0b5
WD
479{
480 if (dev_is_pci(dev)) {
481 struct pci_bus *bus = to_pci_dev(dev)->bus;
2907320d 482
a9a1b0b5
WD
483 while (!pci_is_root_bus(bus))
484 bus = bus->parent;
f80cd885 485 return of_node_get(bus->bridge->parent->of_node);
a9a1b0b5
WD
486 }
487
f80cd885 488 return of_node_get(dev->of_node);
a9a1b0b5
WD
489}
490
f80cd885 491static int __arm_smmu_get_pci_sid(struct pci_dev *pdev, u16 alias, void *data)
45ae7cff 492{
f80cd885
RM
493 *((__be32 *)data) = cpu_to_be32(alias);
494 return 0; /* Continue walking */
45ae7cff
WD
495}
496
f80cd885 497static int __find_legacy_master_phandle(struct device *dev, void *data)
a9a1b0b5 498{
f80cd885
RM
499 struct of_phandle_iterator *it = *(void **)data;
500 struct device_node *np = it->node;
501 int err;
502
503 of_for_each_phandle(it, err, dev->of_node, "mmu-masters",
504 "#stream-id-cells", 0)
505 if (it->node == np) {
506 *(void **)data = dev;
507 return 1;
508 }
509 it->node = np;
510 return err == -ENOENT ? 0 : err;
a9a1b0b5
WD
511}
512
d6fc5d97 513static struct platform_driver arm_smmu_driver;
adfec2e7 514static struct iommu_ops arm_smmu_ops;
d6fc5d97 515
adfec2e7
RM
516static int arm_smmu_register_legacy_master(struct device *dev,
517 struct arm_smmu_device **smmu)
45ae7cff 518{
adfec2e7 519 struct device *smmu_dev;
f80cd885
RM
520 struct device_node *np;
521 struct of_phandle_iterator it;
522 void *data = &it;
adfec2e7 523 u32 *sids;
f80cd885
RM
524 __be32 pci_sid;
525 int err;
45ae7cff 526
f80cd885
RM
527 np = dev_get_dev_node(dev);
528 if (!np || !of_find_property(np, "#stream-id-cells", NULL)) {
529 of_node_put(np);
530 return -ENODEV;
531 }
45ae7cff 532
f80cd885 533 it.node = np;
d6fc5d97
RM
534 err = driver_for_each_device(&arm_smmu_driver.driver, NULL, &data,
535 __find_legacy_master_phandle);
adfec2e7 536 smmu_dev = data;
f80cd885
RM
537 of_node_put(np);
538 if (err == 0)
539 return -ENODEV;
540 if (err < 0)
541 return err;
45ae7cff 542
f80cd885
RM
543 if (dev_is_pci(dev)) {
544 /* "mmu-masters" assumes Stream ID == Requester ID */
545 pci_for_each_dma_alias(to_pci_dev(dev), __arm_smmu_get_pci_sid,
546 &pci_sid);
547 it.cur = &pci_sid;
548 it.cur_count = 1;
549 }
45ae7cff 550
adfec2e7
RM
551 err = iommu_fwspec_init(dev, &smmu_dev->of_node->fwnode,
552 &arm_smmu_ops);
553 if (err)
554 return err;
45ae7cff 555
adfec2e7
RM
556 sids = kcalloc(it.cur_count, sizeof(*sids), GFP_KERNEL);
557 if (!sids)
558 return -ENOMEM;
44680eed 559
adfec2e7
RM
560 *smmu = dev_get_drvdata(smmu_dev);
561 of_phandle_iterator_args(&it, sids, it.cur_count);
562 err = iommu_fwspec_add_ids(dev, sids, it.cur_count);
563 kfree(sids);
564 return err;
45ae7cff
WD
565}
566
567static int __arm_smmu_alloc_bitmap(unsigned long *map, int start, int end)
568{
569 int idx;
570
571 do {
572 idx = find_next_zero_bit(map, end, start);
573 if (idx == end)
574 return -ENOSPC;
575 } while (test_and_set_bit(idx, map));
576
577 return idx;
578}
579
580static void __arm_smmu_free_bitmap(unsigned long *map, int idx)
581{
582 clear_bit(idx, map);
583}
584
585/* Wait for any pending TLB invalidations to complete */
11febfca
RM
586static void __arm_smmu_tlb_sync(struct arm_smmu_device *smmu,
587 void __iomem *sync, void __iomem *status)
45ae7cff 588{
8513c893 589 unsigned int spin_cnt, delay;
45ae7cff 590
11febfca 591 writel_relaxed(0, sync);
8513c893
RM
592 for (delay = 1; delay < TLB_LOOP_TIMEOUT; delay *= 2) {
593 for (spin_cnt = TLB_SPIN_COUNT; spin_cnt > 0; spin_cnt--) {
594 if (!(readl_relaxed(status) & sTLBGSTATUS_GSACTIVE))
595 return;
596 cpu_relax();
45ae7cff 597 }
8513c893 598 udelay(delay);
45ae7cff 599 }
8513c893
RM
600 dev_err_ratelimited(smmu->dev,
601 "TLB sync timed out -- SMMU may be deadlocked\n");
45ae7cff
WD
602}
603
11febfca
RM
604static void arm_smmu_tlb_sync_global(struct arm_smmu_device *smmu)
605{
606 void __iomem *base = ARM_SMMU_GR0(smmu);
8e517e76 607 unsigned long flags;
11febfca 608
8e517e76 609 spin_lock_irqsave(&smmu->global_sync_lock, flags);
11febfca
RM
610 __arm_smmu_tlb_sync(smmu, base + ARM_SMMU_GR0_sTLBGSYNC,
611 base + ARM_SMMU_GR0_sTLBGSTATUS);
8e517e76 612 spin_unlock_irqrestore(&smmu->global_sync_lock, flags);
11febfca
RM
613}
614
615static void arm_smmu_tlb_sync_context(void *cookie)
518f7136
WD
616{
617 struct arm_smmu_domain *smmu_domain = cookie;
11febfca
RM
618 struct arm_smmu_device *smmu = smmu_domain->smmu;
619 void __iomem *base = ARM_SMMU_CB(smmu, smmu_domain->cfg.cbndx);
8e517e76 620 unsigned long flags;
11febfca 621
8e517e76 622 spin_lock_irqsave(&smmu_domain->cb_lock, flags);
11febfca
RM
623 __arm_smmu_tlb_sync(smmu, base + ARM_SMMU_CB_TLBSYNC,
624 base + ARM_SMMU_CB_TLBSTATUS);
8e517e76 625 spin_unlock_irqrestore(&smmu_domain->cb_lock, flags);
518f7136
WD
626}
627
11febfca 628static void arm_smmu_tlb_sync_vmid(void *cookie)
518f7136
WD
629{
630 struct arm_smmu_domain *smmu_domain = cookie;
11febfca
RM
631
632 arm_smmu_tlb_sync_global(smmu_domain->smmu);
518f7136
WD
633}
634
11febfca 635static void arm_smmu_tlb_inv_context_s1(void *cookie)
1463fe44 636{
518f7136 637 struct arm_smmu_domain *smmu_domain = cookie;
44680eed 638 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
11febfca 639 void __iomem *base = ARM_SMMU_CB(smmu_domain->smmu, cfg->cbndx);
1463fe44 640
11febfca
RM
641 writel_relaxed(cfg->asid, base + ARM_SMMU_CB_S1_TLBIASID);
642 arm_smmu_tlb_sync_context(cookie);
643}
1463fe44 644
11febfca
RM
645static void arm_smmu_tlb_inv_context_s2(void *cookie)
646{
647 struct arm_smmu_domain *smmu_domain = cookie;
648 struct arm_smmu_device *smmu = smmu_domain->smmu;
649 void __iomem *base = ARM_SMMU_GR0(smmu);
1463fe44 650
11febfca
RM
651 writel_relaxed(smmu_domain->cfg.vmid, base + ARM_SMMU_GR0_TLBIVMID);
652 arm_smmu_tlb_sync_global(smmu);
518f7136
WD
653}
654
655static void arm_smmu_tlb_inv_range_nosync(unsigned long iova, size_t size,
06c610e8 656 size_t granule, bool leaf, void *cookie)
518f7136
WD
657{
658 struct arm_smmu_domain *smmu_domain = cookie;
659 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
518f7136 660 bool stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
11febfca 661 void __iomem *reg = ARM_SMMU_CB(smmu_domain->smmu, cfg->cbndx);
518f7136
WD
662
663 if (stage1) {
518f7136
WD
664 reg += leaf ? ARM_SMMU_CB_S1_TLBIVAL : ARM_SMMU_CB_S1_TLBIVA;
665
7602b871 666 if (cfg->fmt != ARM_SMMU_CTX_FMT_AARCH64) {
518f7136 667 iova &= ~12UL;
280b683c 668 iova |= cfg->asid;
75df1386
RM
669 do {
670 writel_relaxed(iova, reg);
671 iova += granule;
672 } while (size -= granule);
518f7136
WD
673 } else {
674 iova >>= 12;
280b683c 675 iova |= (u64)cfg->asid << 48;
75df1386
RM
676 do {
677 writeq_relaxed(iova, reg);
678 iova += granule >> 12;
679 } while (size -= granule);
518f7136 680 }
11febfca 681 } else {
518f7136
WD
682 reg += leaf ? ARM_SMMU_CB_S2_TLBIIPAS2L :
683 ARM_SMMU_CB_S2_TLBIIPAS2;
75df1386
RM
684 iova >>= 12;
685 do {
f9a05f05 686 smmu_write_atomic_lq(iova, reg);
75df1386
RM
687 iova += granule >> 12;
688 } while (size -= granule);
518f7136
WD
689 }
690}
691
11febfca
RM
692/*
693 * On MMU-401 at least, the cost of firing off multiple TLBIVMIDs appears
694 * almost negligible, but the benefit of getting the first one in as far ahead
695 * of the sync as possible is significant, hence we don't just make this a
696 * no-op and set .tlb_sync to arm_smmu_inv_context_s2() as you might think.
697 */
698static void arm_smmu_tlb_inv_vmid_nosync(unsigned long iova, size_t size,
699 size_t granule, bool leaf, void *cookie)
700{
701 struct arm_smmu_domain *smmu_domain = cookie;
702 void __iomem *base = ARM_SMMU_GR0(smmu_domain->smmu);
703
704 writel_relaxed(smmu_domain->cfg.vmid, base + ARM_SMMU_GR0_TLBIVMID);
705}
706
707static const struct iommu_gather_ops arm_smmu_s1_tlb_ops = {
708 .tlb_flush_all = arm_smmu_tlb_inv_context_s1,
518f7136 709 .tlb_add_flush = arm_smmu_tlb_inv_range_nosync,
11febfca
RM
710 .tlb_sync = arm_smmu_tlb_sync_context,
711};
712
713static const struct iommu_gather_ops arm_smmu_s2_tlb_ops_v2 = {
714 .tlb_flush_all = arm_smmu_tlb_inv_context_s2,
518f7136 715 .tlb_add_flush = arm_smmu_tlb_inv_range_nosync,
11febfca
RM
716 .tlb_sync = arm_smmu_tlb_sync_context,
717};
718
719static const struct iommu_gather_ops arm_smmu_s2_tlb_ops_v1 = {
720 .tlb_flush_all = arm_smmu_tlb_inv_context_s2,
721 .tlb_add_flush = arm_smmu_tlb_inv_vmid_nosync,
722 .tlb_sync = arm_smmu_tlb_sync_vmid,
518f7136
WD
723};
724
45ae7cff
WD
725static irqreturn_t arm_smmu_context_fault(int irq, void *dev)
726{
3714ce1d 727 u32 fsr, fsynr;
45ae7cff
WD
728 unsigned long iova;
729 struct iommu_domain *domain = dev;
1d672638 730 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
44680eed
WD
731 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
732 struct arm_smmu_device *smmu = smmu_domain->smmu;
45ae7cff
WD
733 void __iomem *cb_base;
734
452107c7 735 cb_base = ARM_SMMU_CB(smmu, cfg->cbndx);
45ae7cff
WD
736 fsr = readl_relaxed(cb_base + ARM_SMMU_CB_FSR);
737
738 if (!(fsr & FSR_FAULT))
739 return IRQ_NONE;
740
45ae7cff 741 fsynr = readl_relaxed(cb_base + ARM_SMMU_CB_FSYNR0);
f9a05f05 742 iova = readq_relaxed(cb_base + ARM_SMMU_CB_FAR);
45ae7cff 743
3714ce1d
WD
744 dev_err_ratelimited(smmu->dev,
745 "Unhandled context fault: fsr=0x%x, iova=0x%08lx, fsynr=0x%x, cb=%d\n",
746 fsr, iova, fsynr, cfg->cbndx);
45ae7cff 747
3714ce1d
WD
748 writel(fsr, cb_base + ARM_SMMU_CB_FSR);
749 return IRQ_HANDLED;
45ae7cff
WD
750}
751
752static irqreturn_t arm_smmu_global_fault(int irq, void *dev)
753{
754 u32 gfsr, gfsynr0, gfsynr1, gfsynr2;
755 struct arm_smmu_device *smmu = dev;
3a5df8ff 756 void __iomem *gr0_base = ARM_SMMU_GR0_NS(smmu);
45ae7cff
WD
757
758 gfsr = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSR);
759 gfsynr0 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR0);
760 gfsynr1 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR1);
761 gfsynr2 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR2);
762
3a5df8ff
AH
763 if (!gfsr)
764 return IRQ_NONE;
765
45ae7cff
WD
766 dev_err_ratelimited(smmu->dev,
767 "Unexpected global fault, this could be serious\n");
768 dev_err_ratelimited(smmu->dev,
769 "\tGFSR 0x%08x, GFSYNR0 0x%08x, GFSYNR1 0x%08x, GFSYNR2 0x%08x\n",
770 gfsr, gfsynr0, gfsynr1, gfsynr2);
771
772 writel(gfsr, gr0_base + ARM_SMMU_GR0_sGFSR);
adaba320 773 return IRQ_HANDLED;
45ae7cff
WD
774}
775
518f7136
WD
776static void arm_smmu_init_context_bank(struct arm_smmu_domain *smmu_domain,
777 struct io_pgtable_cfg *pgtbl_cfg)
45ae7cff 778{
6070529b 779 u32 reg, reg2;
668b4ada 780 u64 reg64;
45ae7cff 781 bool stage1;
44680eed
WD
782 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
783 struct arm_smmu_device *smmu = smmu_domain->smmu;
c88ae5de 784 void __iomem *cb_base, *gr1_base;
45ae7cff 785
45ae7cff 786 gr1_base = ARM_SMMU_GR1(smmu);
44680eed 787 stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
452107c7 788 cb_base = ARM_SMMU_CB(smmu, cfg->cbndx);
45ae7cff 789
4a1c93cb 790 if (smmu->version > ARM_SMMU_V1) {
7602b871
RM
791 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH64)
792 reg = CBA2R_RW64_64BIT;
793 else
794 reg = CBA2R_RW64_32BIT;
4e3e9b69
TC
795 /* 16-bit VMIDs live in CBA2R */
796 if (smmu->features & ARM_SMMU_FEAT_VMID16)
280b683c 797 reg |= cfg->vmid << CBA2R_VMID_SHIFT;
4e3e9b69 798
4a1c93cb
WD
799 writel_relaxed(reg, gr1_base + ARM_SMMU_GR1_CBA2R(cfg->cbndx));
800 }
801
45ae7cff 802 /* CBAR */
44680eed 803 reg = cfg->cbar;
b7862e35 804 if (smmu->version < ARM_SMMU_V2)
2907320d 805 reg |= cfg->irptndx << CBAR_IRPTNDX_SHIFT;
45ae7cff 806
57ca90f6
WD
807 /*
808 * Use the weakest shareability/memory types, so they are
809 * overridden by the ttbcr/pte.
810 */
811 if (stage1) {
812 reg |= (CBAR_S1_BPSHCFG_NSH << CBAR_S1_BPSHCFG_SHIFT) |
813 (CBAR_S1_MEMATTR_WB << CBAR_S1_MEMATTR_SHIFT);
4e3e9b69
TC
814 } else if (!(smmu->features & ARM_SMMU_FEAT_VMID16)) {
815 /* 8-bit VMIDs live in CBAR */
280b683c 816 reg |= cfg->vmid << CBAR_VMID_SHIFT;
57ca90f6 817 }
44680eed 818 writel_relaxed(reg, gr1_base + ARM_SMMU_GR1_CBAR(cfg->cbndx));
45ae7cff 819
125458ab
SG
820 /*
821 * TTBCR
822 * We must write this before the TTBRs, since it determines the
823 * access behaviour of some fields (in particular, ASID[15:8]).
824 */
518f7136 825 if (stage1) {
6070529b
RM
826 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH32_S) {
827 reg = pgtbl_cfg->arm_v7s_cfg.tcr;
828 reg2 = 0;
829 } else {
830 reg = pgtbl_cfg->arm_lpae_s1_cfg.tcr;
831 reg2 = pgtbl_cfg->arm_lpae_s1_cfg.tcr >> 32;
832 reg2 |= TTBCR2_SEP_UPSTREAM;
3677a649
TN
833 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH64)
834 reg2 |= TTBCR2_AS;
45ae7cff 835 }
6070529b
RM
836 if (smmu->version > ARM_SMMU_V1)
837 writel_relaxed(reg2, cb_base + ARM_SMMU_CB_TTBCR2);
45ae7cff 838 } else {
518f7136 839 reg = pgtbl_cfg->arm_lpae_s2_cfg.vtcr;
45ae7cff 840 }
6070529b 841 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR);
45ae7cff 842
518f7136
WD
843 /* TTBRs */
844 if (stage1) {
6070529b
RM
845 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH32_S) {
846 reg = pgtbl_cfg->arm_v7s_cfg.ttbr[0];
847 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBR0);
848 reg = pgtbl_cfg->arm_v7s_cfg.ttbr[1];
849 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBR1);
280b683c 850 writel_relaxed(cfg->asid, cb_base + ARM_SMMU_CB_CONTEXTIDR);
6070529b
RM
851 } else {
852 reg64 = pgtbl_cfg->arm_lpae_s1_cfg.ttbr[0];
280b683c 853 reg64 |= (u64)cfg->asid << TTBRn_ASID_SHIFT;
6070529b
RM
854 writeq_relaxed(reg64, cb_base + ARM_SMMU_CB_TTBR0);
855 reg64 = pgtbl_cfg->arm_lpae_s1_cfg.ttbr[1];
280b683c 856 reg64 |= (u64)cfg->asid << TTBRn_ASID_SHIFT;
6070529b
RM
857 writeq_relaxed(reg64, cb_base + ARM_SMMU_CB_TTBR1);
858 }
518f7136 859 } else {
668b4ada 860 reg64 = pgtbl_cfg->arm_lpae_s2_cfg.vttbr;
f9a05f05 861 writeq_relaxed(reg64, cb_base + ARM_SMMU_CB_TTBR0);
518f7136 862 }
a65217a4 863
518f7136 864 /* MAIRs (stage-1 only) */
45ae7cff 865 if (stage1) {
6070529b
RM
866 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH32_S) {
867 reg = pgtbl_cfg->arm_v7s_cfg.prrr;
868 reg2 = pgtbl_cfg->arm_v7s_cfg.nmrr;
869 } else {
870 reg = pgtbl_cfg->arm_lpae_s1_cfg.mair[0];
871 reg2 = pgtbl_cfg->arm_lpae_s1_cfg.mair[1];
872 }
45ae7cff 873 writel_relaxed(reg, cb_base + ARM_SMMU_CB_S1_MAIR0);
6070529b 874 writel_relaxed(reg2, cb_base + ARM_SMMU_CB_S1_MAIR1);
45ae7cff
WD
875 }
876
45ae7cff 877 /* SCTLR */
6070529b 878 reg = SCTLR_CFIE | SCTLR_CFRE | SCTLR_AFE | SCTLR_TRE | SCTLR_M;
45ae7cff
WD
879 if (stage1)
880 reg |= SCTLR_S1_ASIDPNE;
881#ifdef __BIG_ENDIAN
882 reg |= SCTLR_E;
883#endif
25724841 884 writel_relaxed(reg, cb_base + ARM_SMMU_CB_SCTLR);
45ae7cff
WD
885}
886
887static int arm_smmu_init_domain_context(struct iommu_domain *domain,
44680eed 888 struct arm_smmu_device *smmu)
45ae7cff 889{
a18037b2 890 int irq, start, ret = 0;
518f7136
WD
891 unsigned long ias, oas;
892 struct io_pgtable_ops *pgtbl_ops;
893 struct io_pgtable_cfg pgtbl_cfg;
894 enum io_pgtable_fmt fmt;
1d672638 895 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
44680eed 896 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
11febfca 897 const struct iommu_gather_ops *tlb_ops;
45ae7cff 898
518f7136 899 mutex_lock(&smmu_domain->init_mutex);
a18037b2
MH
900 if (smmu_domain->smmu)
901 goto out_unlock;
902
61bc6711
WD
903 if (domain->type == IOMMU_DOMAIN_IDENTITY) {
904 smmu_domain->stage = ARM_SMMU_DOMAIN_BYPASS;
905 smmu_domain->smmu = smmu;
906 goto out_unlock;
907 }
908
c752ce45
WD
909 /*
910 * Mapping the requested stage onto what we support is surprisingly
911 * complicated, mainly because the spec allows S1+S2 SMMUs without
912 * support for nested translation. That means we end up with the
913 * following table:
914 *
915 * Requested Supported Actual
916 * S1 N S1
917 * S1 S1+S2 S1
918 * S1 S2 S2
919 * S1 S1 S1
920 * N N N
921 * N S1+S2 S2
922 * N S2 S2
923 * N S1 S1
924 *
925 * Note that you can't actually request stage-2 mappings.
926 */
927 if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S1))
928 smmu_domain->stage = ARM_SMMU_DOMAIN_S2;
929 if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S2))
930 smmu_domain->stage = ARM_SMMU_DOMAIN_S1;
931
7602b871
RM
932 /*
933 * Choosing a suitable context format is even more fiddly. Until we
934 * grow some way for the caller to express a preference, and/or move
935 * the decision into the io-pgtable code where it arguably belongs,
936 * just aim for the closest thing to the rest of the system, and hope
937 * that the hardware isn't esoteric enough that we can't assume AArch64
938 * support to be a superset of AArch32 support...
939 */
940 if (smmu->features & ARM_SMMU_FEAT_FMT_AARCH32_L)
941 cfg->fmt = ARM_SMMU_CTX_FMT_AARCH32_L;
6070529b
RM
942 if (IS_ENABLED(CONFIG_IOMMU_IO_PGTABLE_ARMV7S) &&
943 !IS_ENABLED(CONFIG_64BIT) && !IS_ENABLED(CONFIG_ARM_LPAE) &&
944 (smmu->features & ARM_SMMU_FEAT_FMT_AARCH32_S) &&
945 (smmu_domain->stage == ARM_SMMU_DOMAIN_S1))
946 cfg->fmt = ARM_SMMU_CTX_FMT_AARCH32_S;
7602b871
RM
947 if ((IS_ENABLED(CONFIG_64BIT) || cfg->fmt == ARM_SMMU_CTX_FMT_NONE) &&
948 (smmu->features & (ARM_SMMU_FEAT_FMT_AARCH64_64K |
949 ARM_SMMU_FEAT_FMT_AARCH64_16K |
950 ARM_SMMU_FEAT_FMT_AARCH64_4K)))
951 cfg->fmt = ARM_SMMU_CTX_FMT_AARCH64;
952
953 if (cfg->fmt == ARM_SMMU_CTX_FMT_NONE) {
954 ret = -EINVAL;
955 goto out_unlock;
956 }
957
c752ce45
WD
958 switch (smmu_domain->stage) {
959 case ARM_SMMU_DOMAIN_S1:
960 cfg->cbar = CBAR_TYPE_S1_TRANS_S2_BYPASS;
961 start = smmu->num_s2_context_banks;
518f7136
WD
962 ias = smmu->va_size;
963 oas = smmu->ipa_size;
7602b871 964 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH64) {
518f7136 965 fmt = ARM_64_LPAE_S1;
6070529b 966 } else if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH32_L) {
518f7136 967 fmt = ARM_32_LPAE_S1;
7602b871
RM
968 ias = min(ias, 32UL);
969 oas = min(oas, 40UL);
6070529b
RM
970 } else {
971 fmt = ARM_V7S;
972 ias = min(ias, 32UL);
973 oas = min(oas, 32UL);
7602b871 974 }
11febfca 975 tlb_ops = &arm_smmu_s1_tlb_ops;
c752ce45
WD
976 break;
977 case ARM_SMMU_DOMAIN_NESTED:
45ae7cff
WD
978 /*
979 * We will likely want to change this if/when KVM gets
980 * involved.
981 */
c752ce45 982 case ARM_SMMU_DOMAIN_S2:
9c5c92e3
WD
983 cfg->cbar = CBAR_TYPE_S2_TRANS;
984 start = 0;
518f7136
WD
985 ias = smmu->ipa_size;
986 oas = smmu->pa_size;
7602b871 987 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH64) {
518f7136 988 fmt = ARM_64_LPAE_S2;
7602b871 989 } else {
518f7136 990 fmt = ARM_32_LPAE_S2;
7602b871
RM
991 ias = min(ias, 40UL);
992 oas = min(oas, 40UL);
993 }
11febfca
RM
994 if (smmu->version == ARM_SMMU_V2)
995 tlb_ops = &arm_smmu_s2_tlb_ops_v2;
996 else
997 tlb_ops = &arm_smmu_s2_tlb_ops_v1;
c752ce45
WD
998 break;
999 default:
1000 ret = -EINVAL;
1001 goto out_unlock;
45ae7cff 1002 }
45ae7cff
WD
1003 ret = __arm_smmu_alloc_bitmap(smmu->context_map, start,
1004 smmu->num_context_banks);
287980e4 1005 if (ret < 0)
a18037b2 1006 goto out_unlock;
45ae7cff 1007
44680eed 1008 cfg->cbndx = ret;
b7862e35 1009 if (smmu->version < ARM_SMMU_V2) {
44680eed
WD
1010 cfg->irptndx = atomic_inc_return(&smmu->irptndx);
1011 cfg->irptndx %= smmu->num_context_irqs;
45ae7cff 1012 } else {
44680eed 1013 cfg->irptndx = cfg->cbndx;
45ae7cff
WD
1014 }
1015
280b683c
RM
1016 if (smmu_domain->stage == ARM_SMMU_DOMAIN_S2)
1017 cfg->vmid = cfg->cbndx + 1 + smmu->cavium_id_base;
1018 else
1019 cfg->asid = cfg->cbndx + smmu->cavium_id_base;
1020
518f7136 1021 pgtbl_cfg = (struct io_pgtable_cfg) {
d5466357 1022 .pgsize_bitmap = smmu->pgsize_bitmap,
518f7136
WD
1023 .ias = ias,
1024 .oas = oas,
11febfca 1025 .tlb = tlb_ops,
2df7a25c 1026 .iommu_dev = smmu->dev,
518f7136
WD
1027 };
1028
81b3c252
RM
1029 if (smmu->features & ARM_SMMU_FEAT_COHERENT_WALK)
1030 pgtbl_cfg.quirks = IO_PGTABLE_QUIRK_NO_DMA;
1031
518f7136
WD
1032 smmu_domain->smmu = smmu;
1033 pgtbl_ops = alloc_io_pgtable_ops(fmt, &pgtbl_cfg, smmu_domain);
1034 if (!pgtbl_ops) {
1035 ret = -ENOMEM;
1036 goto out_clear_smmu;
1037 }
1038
d5466357
RM
1039 /* Update the domain's page sizes to reflect the page table format */
1040 domain->pgsize_bitmap = pgtbl_cfg.pgsize_bitmap;
455eb7d3
RM
1041 domain->geometry.aperture_end = (1UL << ias) - 1;
1042 domain->geometry.force_aperture = true;
a18037b2 1043
518f7136
WD
1044 /* Initialise the context bank with our page table cfg */
1045 arm_smmu_init_context_bank(smmu_domain, &pgtbl_cfg);
1046
1047 /*
1048 * Request context fault interrupt. Do this last to avoid the
1049 * handler seeing a half-initialised domain state.
1050 */
44680eed 1051 irq = smmu->irqs[smmu->num_global_irqs + cfg->irptndx];
bee14004
PF
1052 ret = devm_request_irq(smmu->dev, irq, arm_smmu_context_fault,
1053 IRQF_SHARED, "arm-smmu-context-fault", domain);
287980e4 1054 if (ret < 0) {
45ae7cff 1055 dev_err(smmu->dev, "failed to request context IRQ %d (%u)\n",
44680eed
WD
1056 cfg->irptndx, irq);
1057 cfg->irptndx = INVALID_IRPTNDX;
45ae7cff
WD
1058 }
1059
518f7136
WD
1060 mutex_unlock(&smmu_domain->init_mutex);
1061
1062 /* Publish page table ops for map/unmap */
1063 smmu_domain->pgtbl_ops = pgtbl_ops;
a9a1b0b5 1064 return 0;
45ae7cff 1065
518f7136
WD
1066out_clear_smmu:
1067 smmu_domain->smmu = NULL;
a18037b2 1068out_unlock:
518f7136 1069 mutex_unlock(&smmu_domain->init_mutex);
45ae7cff
WD
1070 return ret;
1071}
1072
1073static void arm_smmu_destroy_domain_context(struct iommu_domain *domain)
1074{
1d672638 1075 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
44680eed
WD
1076 struct arm_smmu_device *smmu = smmu_domain->smmu;
1077 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
1463fe44 1078 void __iomem *cb_base;
45ae7cff
WD
1079 int irq;
1080
61bc6711 1081 if (!smmu || domain->type == IOMMU_DOMAIN_IDENTITY)
45ae7cff
WD
1082 return;
1083
518f7136
WD
1084 /*
1085 * Disable the context bank and free the page tables before freeing
1086 * it.
1087 */
452107c7 1088 cb_base = ARM_SMMU_CB(smmu, cfg->cbndx);
1463fe44 1089 writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR);
1463fe44 1090
44680eed
WD
1091 if (cfg->irptndx != INVALID_IRPTNDX) {
1092 irq = smmu->irqs[smmu->num_global_irqs + cfg->irptndx];
bee14004 1093 devm_free_irq(smmu->dev, irq, domain);
45ae7cff
WD
1094 }
1095
44830b0c 1096 free_io_pgtable_ops(smmu_domain->pgtbl_ops);
44680eed 1097 __arm_smmu_free_bitmap(smmu->context_map, cfg->cbndx);
45ae7cff
WD
1098}
1099
1d672638 1100static struct iommu_domain *arm_smmu_domain_alloc(unsigned type)
45ae7cff
WD
1101{
1102 struct arm_smmu_domain *smmu_domain;
45ae7cff 1103
61bc6711
WD
1104 if (type != IOMMU_DOMAIN_UNMANAGED &&
1105 type != IOMMU_DOMAIN_DMA &&
1106 type != IOMMU_DOMAIN_IDENTITY)
1d672638 1107 return NULL;
45ae7cff
WD
1108 /*
1109 * Allocate the domain and initialise some of its data structures.
1110 * We can't really do anything meaningful until we've added a
1111 * master.
1112 */
1113 smmu_domain = kzalloc(sizeof(*smmu_domain), GFP_KERNEL);
1114 if (!smmu_domain)
1d672638 1115 return NULL;
45ae7cff 1116
021bb842
RM
1117 if (type == IOMMU_DOMAIN_DMA && (using_legacy_binding ||
1118 iommu_get_dma_cookie(&smmu_domain->domain))) {
9adb9594
RM
1119 kfree(smmu_domain);
1120 return NULL;
1121 }
1122
518f7136 1123 mutex_init(&smmu_domain->init_mutex);
523d7423 1124 spin_lock_init(&smmu_domain->cb_lock);
1d672638
JR
1125
1126 return &smmu_domain->domain;
45ae7cff
WD
1127}
1128
1d672638 1129static void arm_smmu_domain_free(struct iommu_domain *domain)
45ae7cff 1130{
1d672638 1131 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
1463fe44
WD
1132
1133 /*
1134 * Free the domain resources. We assume that all devices have
1135 * already been detached.
1136 */
9adb9594 1137 iommu_put_dma_cookie(domain);
45ae7cff 1138 arm_smmu_destroy_domain_context(domain);
45ae7cff
WD
1139 kfree(smmu_domain);
1140}
1141
1f3d5ca4
RM
1142static void arm_smmu_write_smr(struct arm_smmu_device *smmu, int idx)
1143{
1144 struct arm_smmu_smr *smr = smmu->smrs + idx;
f80cd885 1145 u32 reg = smr->id << SMR_ID_SHIFT | smr->mask << SMR_MASK_SHIFT;
1f3d5ca4 1146
dc0eaa4e 1147 if (!(smmu->features & ARM_SMMU_FEAT_EXIDS) && smr->valid)
1f3d5ca4
RM
1148 reg |= SMR_VALID;
1149 writel_relaxed(reg, ARM_SMMU_GR0(smmu) + ARM_SMMU_GR0_SMR(idx));
1150}
1151
8e8b203e
RM
1152static void arm_smmu_write_s2cr(struct arm_smmu_device *smmu, int idx)
1153{
1154 struct arm_smmu_s2cr *s2cr = smmu->s2crs + idx;
1155 u32 reg = (s2cr->type & S2CR_TYPE_MASK) << S2CR_TYPE_SHIFT |
1156 (s2cr->cbndx & S2CR_CBNDX_MASK) << S2CR_CBNDX_SHIFT |
1157 (s2cr->privcfg & S2CR_PRIVCFG_MASK) << S2CR_PRIVCFG_SHIFT;
1158
dc0eaa4e
AM
1159 if (smmu->features & ARM_SMMU_FEAT_EXIDS && smmu->smrs &&
1160 smmu->smrs[idx].valid)
1161 reg |= S2CR_EXIDVALID;
8e8b203e
RM
1162 writel_relaxed(reg, ARM_SMMU_GR0(smmu) + ARM_SMMU_GR0_S2CR(idx));
1163}
1164
1165static void arm_smmu_write_sme(struct arm_smmu_device *smmu, int idx)
1166{
1167 arm_smmu_write_s2cr(smmu, idx);
1168 if (smmu->smrs)
1169 arm_smmu_write_smr(smmu, idx);
1170}
1171
dc0eaa4e
AM
1172/*
1173 * The width of SMR's mask field depends on sCR0_EXIDENABLE, so this function
1174 * should be called after sCR0 is written.
1175 */
1176static void arm_smmu_test_smr_masks(struct arm_smmu_device *smmu)
1177{
1178 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1179 u32 smr;
1180
1181 if (!smmu->smrs)
1182 return;
1183
1184 /*
1185 * SMR.ID bits may not be preserved if the corresponding MASK
1186 * bits are set, so check each one separately. We can reject
1187 * masters later if they try to claim IDs outside these masks.
1188 */
1189 smr = smmu->streamid_mask << SMR_ID_SHIFT;
1190 writel_relaxed(smr, gr0_base + ARM_SMMU_GR0_SMR(0));
1191 smr = readl_relaxed(gr0_base + ARM_SMMU_GR0_SMR(0));
1192 smmu->streamid_mask = smr >> SMR_ID_SHIFT;
1193
1194 smr = smmu->streamid_mask << SMR_MASK_SHIFT;
1195 writel_relaxed(smr, gr0_base + ARM_SMMU_GR0_SMR(0));
1196 smr = readl_relaxed(gr0_base + ARM_SMMU_GR0_SMR(0));
1197 smmu->smr_mask_mask = smr >> SMR_MASK_SHIFT;
1198}
1199
588888a7 1200static int arm_smmu_find_sme(struct arm_smmu_device *smmu, u16 id, u16 mask)
1f3d5ca4
RM
1201{
1202 struct arm_smmu_smr *smrs = smmu->smrs;
588888a7 1203 int i, free_idx = -ENOSPC;
1f3d5ca4 1204
588888a7
RM
1205 /* Stream indexing is blissfully easy */
1206 if (!smrs)
1207 return id;
1208
1209 /* Validating SMRs is... less so */
1210 for (i = 0; i < smmu->num_mapping_groups; ++i) {
1211 if (!smrs[i].valid) {
1212 /*
1213 * Note the first free entry we come across, which
1214 * we'll claim in the end if nothing else matches.
1215 */
1216 if (free_idx < 0)
1217 free_idx = i;
1f3d5ca4
RM
1218 continue;
1219 }
588888a7
RM
1220 /*
1221 * If the new entry is _entirely_ matched by an existing entry,
1222 * then reuse that, with the guarantee that there also cannot
1223 * be any subsequent conflicting entries. In normal use we'd
1224 * expect simply identical entries for this case, but there's
1225 * no harm in accommodating the generalisation.
1226 */
1227 if ((mask & smrs[i].mask) == mask &&
1228 !((id ^ smrs[i].id) & ~smrs[i].mask))
1229 return i;
1230 /*
1231 * If the new entry has any other overlap with an existing one,
1232 * though, then there always exists at least one stream ID
1233 * which would cause a conflict, and we can't allow that risk.
1234 */
1235 if (!((id ^ smrs[i].id) & ~(smrs[i].mask | mask)))
1236 return -EINVAL;
1237 }
1f3d5ca4 1238
588888a7
RM
1239 return free_idx;
1240}
1241
1242static bool arm_smmu_free_sme(struct arm_smmu_device *smmu, int idx)
1243{
1244 if (--smmu->s2crs[idx].count)
1245 return false;
1246
1247 smmu->s2crs[idx] = s2cr_init_val;
1248 if (smmu->smrs)
1249 smmu->smrs[idx].valid = false;
1250
1251 return true;
1252}
1253
1254static int arm_smmu_master_alloc_smes(struct device *dev)
1255{
adfec2e7
RM
1256 struct iommu_fwspec *fwspec = dev->iommu_fwspec;
1257 struct arm_smmu_master_cfg *cfg = fwspec->iommu_priv;
588888a7
RM
1258 struct arm_smmu_device *smmu = cfg->smmu;
1259 struct arm_smmu_smr *smrs = smmu->smrs;
1260 struct iommu_group *group;
1261 int i, idx, ret;
1262
1263 mutex_lock(&smmu->stream_map_mutex);
1264 /* Figure out a viable stream map entry allocation */
adfec2e7 1265 for_each_cfg_sme(fwspec, i, idx) {
021bb842
RM
1266 u16 sid = fwspec->ids[i];
1267 u16 mask = fwspec->ids[i] >> SMR_MASK_SHIFT;
1268
588888a7
RM
1269 if (idx != INVALID_SMENDX) {
1270 ret = -EEXIST;
1271 goto out_err;
45ae7cff
WD
1272 }
1273
021bb842 1274 ret = arm_smmu_find_sme(smmu, sid, mask);
588888a7
RM
1275 if (ret < 0)
1276 goto out_err;
1277
1278 idx = ret;
1279 if (smrs && smmu->s2crs[idx].count == 0) {
021bb842
RM
1280 smrs[idx].id = sid;
1281 smrs[idx].mask = mask;
588888a7
RM
1282 smrs[idx].valid = true;
1283 }
1284 smmu->s2crs[idx].count++;
1285 cfg->smendx[i] = (s16)idx;
45ae7cff
WD
1286 }
1287
588888a7
RM
1288 group = iommu_group_get_for_dev(dev);
1289 if (!group)
1290 group = ERR_PTR(-ENOMEM);
1291 if (IS_ERR(group)) {
1292 ret = PTR_ERR(group);
1293 goto out_err;
1294 }
1295 iommu_group_put(group);
1f3d5ca4 1296
45ae7cff 1297 /* It worked! Now, poke the actual hardware */
adfec2e7 1298 for_each_cfg_sme(fwspec, i, idx) {
588888a7
RM
1299 arm_smmu_write_sme(smmu, idx);
1300 smmu->s2crs[idx].group = group;
1301 }
45ae7cff 1302
588888a7 1303 mutex_unlock(&smmu->stream_map_mutex);
45ae7cff
WD
1304 return 0;
1305
588888a7 1306out_err:
1f3d5ca4 1307 while (i--) {
588888a7 1308 arm_smmu_free_sme(smmu, cfg->smendx[i]);
1f3d5ca4
RM
1309 cfg->smendx[i] = INVALID_SMENDX;
1310 }
588888a7
RM
1311 mutex_unlock(&smmu->stream_map_mutex);
1312 return ret;
45ae7cff
WD
1313}
1314
adfec2e7 1315static void arm_smmu_master_free_smes(struct iommu_fwspec *fwspec)
45ae7cff 1316{
adfec2e7
RM
1317 struct arm_smmu_device *smmu = fwspec_smmu(fwspec);
1318 struct arm_smmu_master_cfg *cfg = fwspec->iommu_priv;
d3097e39 1319 int i, idx;
43b412be 1320
588888a7 1321 mutex_lock(&smmu->stream_map_mutex);
adfec2e7 1322 for_each_cfg_sme(fwspec, i, idx) {
588888a7
RM
1323 if (arm_smmu_free_sme(smmu, idx))
1324 arm_smmu_write_sme(smmu, idx);
1f3d5ca4 1325 cfg->smendx[i] = INVALID_SMENDX;
45ae7cff 1326 }
588888a7 1327 mutex_unlock(&smmu->stream_map_mutex);
45ae7cff
WD
1328}
1329
45ae7cff 1330static int arm_smmu_domain_add_master(struct arm_smmu_domain *smmu_domain,
adfec2e7 1331 struct iommu_fwspec *fwspec)
45ae7cff 1332{
44680eed 1333 struct arm_smmu_device *smmu = smmu_domain->smmu;
8e8b203e 1334 struct arm_smmu_s2cr *s2cr = smmu->s2crs;
8e8b203e 1335 u8 cbndx = smmu_domain->cfg.cbndx;
61bc6711 1336 enum arm_smmu_s2cr_type type;
588888a7 1337 int i, idx;
45ae7cff 1338
61bc6711
WD
1339 if (smmu_domain->stage == ARM_SMMU_DOMAIN_BYPASS)
1340 type = S2CR_TYPE_BYPASS;
1341 else
1342 type = S2CR_TYPE_TRANS;
1343
adfec2e7 1344 for_each_cfg_sme(fwspec, i, idx) {
8e8b203e 1345 if (type == s2cr[idx].type && cbndx == s2cr[idx].cbndx)
588888a7 1346 continue;
1f3d5ca4 1347
8e8b203e 1348 s2cr[idx].type = type;
e1989807 1349 s2cr[idx].privcfg = S2CR_PRIVCFG_DEFAULT;
8e8b203e
RM
1350 s2cr[idx].cbndx = cbndx;
1351 arm_smmu_write_s2cr(smmu, idx);
43b412be 1352 }
8e8b203e 1353 return 0;
bc7f2ce0
WD
1354}
1355
45ae7cff
WD
1356static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev)
1357{
a18037b2 1358 int ret;
adfec2e7
RM
1359 struct iommu_fwspec *fwspec = dev->iommu_fwspec;
1360 struct arm_smmu_device *smmu;
1d672638 1361 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
45ae7cff 1362
adfec2e7 1363 if (!fwspec || fwspec->ops != &arm_smmu_ops) {
45ae7cff
WD
1364 dev_err(dev, "cannot attach to SMMU, is it on the same bus?\n");
1365 return -ENXIO;
1366 }
1367
fba4f8e5
RM
1368 /*
1369 * FIXME: The arch/arm DMA API code tries to attach devices to its own
1370 * domains between of_xlate() and add_device() - we have no way to cope
1371 * with that, so until ARM gets converted to rely on groups and default
1372 * domains, just say no (but more politely than by dereferencing NULL).
1373 * This should be at least a WARN_ON once that's sorted.
1374 */
1375 if (!fwspec->iommu_priv)
1376 return -ENODEV;
1377
adfec2e7 1378 smmu = fwspec_smmu(fwspec);
518f7136 1379 /* Ensure that the domain is finalised */
adfec2e7 1380 ret = arm_smmu_init_domain_context(domain, smmu);
287980e4 1381 if (ret < 0)
518f7136
WD
1382 return ret;
1383
45ae7cff 1384 /*
44680eed
WD
1385 * Sanity check the domain. We don't support domains across
1386 * different SMMUs.
45ae7cff 1387 */
adfec2e7 1388 if (smmu_domain->smmu != smmu) {
45ae7cff
WD
1389 dev_err(dev,
1390 "cannot attach to SMMU %s whilst already attached to domain on SMMU %s\n",
adfec2e7 1391 dev_name(smmu_domain->smmu->dev), dev_name(smmu->dev));
a18037b2 1392 return -EINVAL;
45ae7cff 1393 }
45ae7cff
WD
1394
1395 /* Looks ok, so add the device to the domain */
adfec2e7 1396 return arm_smmu_domain_add_master(smmu_domain, fwspec);
45ae7cff
WD
1397}
1398
45ae7cff 1399static int arm_smmu_map(struct iommu_domain *domain, unsigned long iova,
b410aed9 1400 phys_addr_t paddr, size_t size, int prot)
45ae7cff 1401{
523d7423 1402 struct io_pgtable_ops *ops = to_smmu_domain(domain)->pgtbl_ops;
45ae7cff 1403
518f7136 1404 if (!ops)
45ae7cff
WD
1405 return -ENODEV;
1406
523d7423 1407 return ops->map(ops, iova, paddr, size, prot);
45ae7cff
WD
1408}
1409
1410static size_t arm_smmu_unmap(struct iommu_domain *domain, unsigned long iova,
1411 size_t size)
1412{
523d7423 1413 struct io_pgtable_ops *ops = to_smmu_domain(domain)->pgtbl_ops;
45ae7cff 1414
518f7136
WD
1415 if (!ops)
1416 return 0;
1417
523d7423 1418 return ops->unmap(ops, iova, size);
45ae7cff
WD
1419}
1420
859a732e
MH
1421static phys_addr_t arm_smmu_iova_to_phys_hard(struct iommu_domain *domain,
1422 dma_addr_t iova)
1423{
1d672638 1424 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
859a732e
MH
1425 struct arm_smmu_device *smmu = smmu_domain->smmu;
1426 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
1427 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
1428 struct device *dev = smmu->dev;
1429 void __iomem *cb_base;
1430 u32 tmp;
1431 u64 phys;
523d7423 1432 unsigned long va, flags;
859a732e 1433
452107c7 1434 cb_base = ARM_SMMU_CB(smmu, cfg->cbndx);
859a732e 1435
523d7423 1436 spin_lock_irqsave(&smmu_domain->cb_lock, flags);
661d962f
RM
1437 /* ATS1 registers can only be written atomically */
1438 va = iova & ~0xfffUL;
661d962f 1439 if (smmu->version == ARM_SMMU_V2)
f9a05f05
RM
1440 smmu_write_atomic_lq(va, cb_base + ARM_SMMU_CB_ATS1PR);
1441 else /* Register is only 32-bit in v1 */
661d962f 1442 writel_relaxed(va, cb_base + ARM_SMMU_CB_ATS1PR);
859a732e
MH
1443
1444 if (readl_poll_timeout_atomic(cb_base + ARM_SMMU_CB_ATSR, tmp,
1445 !(tmp & ATSR_ACTIVE), 5, 50)) {
523d7423 1446 spin_unlock_irqrestore(&smmu_domain->cb_lock, flags);
859a732e 1447 dev_err(dev,
077124c9 1448 "iova to phys timed out on %pad. Falling back to software table walk.\n",
859a732e
MH
1449 &iova);
1450 return ops->iova_to_phys(ops, iova);
1451 }
1452
f9a05f05 1453 phys = readq_relaxed(cb_base + ARM_SMMU_CB_PAR);
523d7423 1454 spin_unlock_irqrestore(&smmu_domain->cb_lock, flags);
859a732e
MH
1455 if (phys & CB_PAR_F) {
1456 dev_err(dev, "translation fault!\n");
1457 dev_err(dev, "PAR = 0x%llx\n", phys);
1458 return 0;
1459 }
1460
1461 return (phys & GENMASK_ULL(39, 12)) | (iova & 0xfff);
1462}
1463
45ae7cff 1464static phys_addr_t arm_smmu_iova_to_phys(struct iommu_domain *domain,
859a732e 1465 dma_addr_t iova)
45ae7cff 1466{
1d672638 1467 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
523d7423 1468 struct io_pgtable_ops *ops = smmu_domain->pgtbl_ops;
45ae7cff 1469
bdf95923
SG
1470 if (domain->type == IOMMU_DOMAIN_IDENTITY)
1471 return iova;
1472
518f7136 1473 if (!ops)
a44a9791 1474 return 0;
45ae7cff 1475
83a60ed8 1476 if (smmu_domain->smmu->features & ARM_SMMU_FEAT_TRANS_OPS &&
523d7423
RM
1477 smmu_domain->stage == ARM_SMMU_DOMAIN_S1)
1478 return arm_smmu_iova_to_phys_hard(domain, iova);
859a732e 1479
523d7423 1480 return ops->iova_to_phys(ops, iova);
45ae7cff
WD
1481}
1482
1fd0c775 1483static bool arm_smmu_capable(enum iommu_cap cap)
45ae7cff 1484{
d0948945
WD
1485 switch (cap) {
1486 case IOMMU_CAP_CACHE_COHERENCY:
1fd0c775
JR
1487 /*
1488 * Return true here as the SMMU can always send out coherent
1489 * requests.
1490 */
1491 return true;
0029a8dd
AM
1492 case IOMMU_CAP_NOEXEC:
1493 return true;
d0948945 1494 default:
1fd0c775 1495 return false;
d0948945 1496 }
45ae7cff 1497}
45ae7cff 1498
021bb842
RM
1499static int arm_smmu_match_node(struct device *dev, void *data)
1500{
ce9babe5 1501 return dev->fwnode == data;
021bb842
RM
1502}
1503
ce9babe5
LP
1504static
1505struct arm_smmu_device *arm_smmu_get_by_fwnode(struct fwnode_handle *fwnode)
021bb842
RM
1506{
1507 struct device *dev = driver_find_device(&arm_smmu_driver.driver, NULL,
ce9babe5 1508 fwnode, arm_smmu_match_node);
021bb842
RM
1509 put_device(dev);
1510 return dev ? dev_get_drvdata(dev) : NULL;
1511}
1512
f80cd885 1513static int arm_smmu_add_device(struct device *dev)
45ae7cff 1514{
adfec2e7 1515 struct arm_smmu_device *smmu;
03edb226 1516 struct arm_smmu_master_cfg *cfg;
021bb842 1517 struct iommu_fwspec *fwspec = dev->iommu_fwspec;
f80cd885 1518 int i, ret;
8f68f8e2 1519
021bb842
RM
1520 if (using_legacy_binding) {
1521 ret = arm_smmu_register_legacy_master(dev, &smmu);
a7990c64
AS
1522
1523 /*
1524 * If dev->iommu_fwspec is initally NULL, arm_smmu_register_legacy_master()
1525 * will allocate/initialise a new one. Thus we need to update fwspec for
1526 * later use.
1527 */
1528 fwspec = dev->iommu_fwspec;
021bb842
RM
1529 if (ret)
1530 goto out_free;
3c117b54 1531 } else if (fwspec && fwspec->ops == &arm_smmu_ops) {
ce9babe5 1532 smmu = arm_smmu_get_by_fwnode(fwspec->iommu_fwnode);
021bb842
RM
1533 } else {
1534 return -ENODEV;
1535 }
a9a1b0b5 1536
f80cd885 1537 ret = -EINVAL;
adfec2e7
RM
1538 for (i = 0; i < fwspec->num_ids; i++) {
1539 u16 sid = fwspec->ids[i];
021bb842 1540 u16 mask = fwspec->ids[i] >> SMR_MASK_SHIFT;
03edb226 1541
adfec2e7 1542 if (sid & ~smmu->streamid_mask) {
f80cd885 1543 dev_err(dev, "stream ID 0x%x out of range for SMMU (0x%x)\n",
021bb842
RM
1544 sid, smmu->streamid_mask);
1545 goto out_free;
1546 }
1547 if (mask & ~smmu->smr_mask_mask) {
1548 dev_err(dev, "SMR mask 0x%x out of range for SMMU (0x%x)\n",
6323f474 1549 mask, smmu->smr_mask_mask);
f80cd885
RM
1550 goto out_free;
1551 }
1f3d5ca4 1552 }
5fc63a7c 1553
adfec2e7
RM
1554 ret = -ENOMEM;
1555 cfg = kzalloc(offsetof(struct arm_smmu_master_cfg, smendx[i]),
1556 GFP_KERNEL);
1557 if (!cfg)
1558 goto out_free;
1559
1560 cfg->smmu = smmu;
1561 fwspec->iommu_priv = cfg;
1562 while (i--)
1563 cfg->smendx[i] = INVALID_SMENDX;
1564
588888a7 1565 ret = arm_smmu_master_alloc_smes(dev);
adfec2e7 1566 if (ret)
c54451a5 1567 goto out_cfg_free;
adfec2e7 1568
9648cbc9
JR
1569 iommu_device_link(&smmu->iommu, dev);
1570
adfec2e7 1571 return 0;
f80cd885 1572
c54451a5
VG
1573out_cfg_free:
1574 kfree(cfg);
f80cd885 1575out_free:
adfec2e7 1576 iommu_fwspec_free(dev);
f80cd885 1577 return ret;
03edb226
WD
1578}
1579
45ae7cff
WD
1580static void arm_smmu_remove_device(struct device *dev)
1581{
adfec2e7 1582 struct iommu_fwspec *fwspec = dev->iommu_fwspec;
9648cbc9
JR
1583 struct arm_smmu_master_cfg *cfg;
1584 struct arm_smmu_device *smmu;
1585
8e8b203e 1586
adfec2e7 1587 if (!fwspec || fwspec->ops != &arm_smmu_ops)
f80cd885 1588 return;
8e8b203e 1589
9648cbc9
JR
1590 cfg = fwspec->iommu_priv;
1591 smmu = cfg->smmu;
1592
1593 iommu_device_unlink(&smmu->iommu, dev);
adfec2e7 1594 arm_smmu_master_free_smes(fwspec);
5fc63a7c 1595 iommu_group_remove_device(dev);
adfec2e7
RM
1596 kfree(fwspec->iommu_priv);
1597 iommu_fwspec_free(dev);
45ae7cff
WD
1598}
1599
af659932
JR
1600static struct iommu_group *arm_smmu_device_group(struct device *dev)
1601{
adfec2e7
RM
1602 struct iommu_fwspec *fwspec = dev->iommu_fwspec;
1603 struct arm_smmu_device *smmu = fwspec_smmu(fwspec);
588888a7
RM
1604 struct iommu_group *group = NULL;
1605 int i, idx;
1606
adfec2e7 1607 for_each_cfg_sme(fwspec, i, idx) {
588888a7
RM
1608 if (group && smmu->s2crs[idx].group &&
1609 group != smmu->s2crs[idx].group)
1610 return ERR_PTR(-EINVAL);
1611
1612 group = smmu->s2crs[idx].group;
1613 }
1614
1615 if (group)
e1b44cbe 1616 return iommu_group_ref_get(group);
af659932
JR
1617
1618 if (dev_is_pci(dev))
1619 group = pci_device_group(dev);
1620 else
1621 group = generic_device_group(dev);
1622
af659932
JR
1623 return group;
1624}
1625
c752ce45
WD
1626static int arm_smmu_domain_get_attr(struct iommu_domain *domain,
1627 enum iommu_attr attr, void *data)
1628{
1d672638 1629 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
c752ce45 1630
0834cc28
WD
1631 if (domain->type != IOMMU_DOMAIN_UNMANAGED)
1632 return -EINVAL;
1633
c752ce45
WD
1634 switch (attr) {
1635 case DOMAIN_ATTR_NESTING:
1636 *(int *)data = (smmu_domain->stage == ARM_SMMU_DOMAIN_NESTED);
1637 return 0;
1638 default:
1639 return -ENODEV;
1640 }
1641}
1642
1643static int arm_smmu_domain_set_attr(struct iommu_domain *domain,
1644 enum iommu_attr attr, void *data)
1645{
518f7136 1646 int ret = 0;
1d672638 1647 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
c752ce45 1648
0834cc28
WD
1649 if (domain->type != IOMMU_DOMAIN_UNMANAGED)
1650 return -EINVAL;
1651
518f7136
WD
1652 mutex_lock(&smmu_domain->init_mutex);
1653
c752ce45
WD
1654 switch (attr) {
1655 case DOMAIN_ATTR_NESTING:
518f7136
WD
1656 if (smmu_domain->smmu) {
1657 ret = -EPERM;
1658 goto out_unlock;
1659 }
1660
c752ce45
WD
1661 if (*(int *)data)
1662 smmu_domain->stage = ARM_SMMU_DOMAIN_NESTED;
1663 else
1664 smmu_domain->stage = ARM_SMMU_DOMAIN_S1;
1665
518f7136 1666 break;
c752ce45 1667 default:
518f7136 1668 ret = -ENODEV;
c752ce45 1669 }
518f7136
WD
1670
1671out_unlock:
1672 mutex_unlock(&smmu_domain->init_mutex);
1673 return ret;
c752ce45
WD
1674}
1675
021bb842
RM
1676static int arm_smmu_of_xlate(struct device *dev, struct of_phandle_args *args)
1677{
56fbf600 1678 u32 mask, fwid = 0;
021bb842
RM
1679
1680 if (args->args_count > 0)
1681 fwid |= (u16)args->args[0];
1682
1683 if (args->args_count > 1)
1684 fwid |= (u16)args->args[1] << SMR_MASK_SHIFT;
56fbf600
RM
1685 else if (!of_property_read_u32(args->np, "stream-match-mask", &mask))
1686 fwid |= (u16)mask << SMR_MASK_SHIFT;
021bb842
RM
1687
1688 return iommu_fwspec_add_ids(dev, &fwid, 1);
1689}
1690
f3ebee80
EA
1691static void arm_smmu_get_resv_regions(struct device *dev,
1692 struct list_head *head)
1693{
1694 struct iommu_resv_region *region;
1695 int prot = IOMMU_WRITE | IOMMU_NOEXEC | IOMMU_MMIO;
1696
1697 region = iommu_alloc_resv_region(MSI_IOVA_BASE, MSI_IOVA_LENGTH,
9d3a4de4 1698 prot, IOMMU_RESV_SW_MSI);
f3ebee80
EA
1699 if (!region)
1700 return;
1701
1702 list_add_tail(&region->list, head);
273df963
RM
1703
1704 iommu_dma_get_resv_regions(dev, head);
f3ebee80
EA
1705}
1706
1707static void arm_smmu_put_resv_regions(struct device *dev,
1708 struct list_head *head)
1709{
1710 struct iommu_resv_region *entry, *next;
1711
1712 list_for_each_entry_safe(entry, next, head, list)
1713 kfree(entry);
1714}
1715
518f7136 1716static struct iommu_ops arm_smmu_ops = {
c752ce45 1717 .capable = arm_smmu_capable,
1d672638
JR
1718 .domain_alloc = arm_smmu_domain_alloc,
1719 .domain_free = arm_smmu_domain_free,
c752ce45 1720 .attach_dev = arm_smmu_attach_dev,
c752ce45
WD
1721 .map = arm_smmu_map,
1722 .unmap = arm_smmu_unmap,
76771c93 1723 .map_sg = default_iommu_map_sg,
c752ce45
WD
1724 .iova_to_phys = arm_smmu_iova_to_phys,
1725 .add_device = arm_smmu_add_device,
1726 .remove_device = arm_smmu_remove_device,
af659932 1727 .device_group = arm_smmu_device_group,
c752ce45
WD
1728 .domain_get_attr = arm_smmu_domain_get_attr,
1729 .domain_set_attr = arm_smmu_domain_set_attr,
021bb842 1730 .of_xlate = arm_smmu_of_xlate,
f3ebee80
EA
1731 .get_resv_regions = arm_smmu_get_resv_regions,
1732 .put_resv_regions = arm_smmu_put_resv_regions,
518f7136 1733 .pgsize_bitmap = -1UL, /* Restricted during device attach */
45ae7cff
WD
1734};
1735
1736static void arm_smmu_device_reset(struct arm_smmu_device *smmu)
1737{
1738 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
659db6f6 1739 void __iomem *cb_base;
1f3d5ca4 1740 int i;
3ca3712a 1741 u32 reg, major;
659db6f6 1742
3a5df8ff
AH
1743 /* clear global FSR */
1744 reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sGFSR);
1745 writel(reg, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sGFSR);
45ae7cff 1746
1f3d5ca4
RM
1747 /*
1748 * Reset stream mapping groups: Initial values mark all SMRn as
1749 * invalid and all S2CRn as bypass unless overridden.
1750 */
8e8b203e
RM
1751 for (i = 0; i < smmu->num_mapping_groups; ++i)
1752 arm_smmu_write_sme(smmu, i);
45ae7cff 1753
6eb18d4a
NG
1754 if (smmu->model == ARM_MMU500) {
1755 /*
1756 * Before clearing ARM_MMU500_ACTLR_CPRE, need to
1757 * clear CACHE_LOCK bit of ACR first. And, CACHE_LOCK
1758 * bit is only present in MMU-500r2 onwards.
1759 */
1760 reg = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID7);
1761 major = (reg >> ID7_MAJOR_SHIFT) & ID7_MAJOR_MASK;
3ca3712a 1762 reg = readl_relaxed(gr0_base + ARM_SMMU_GR0_sACR);
6eb18d4a
NG
1763 if (major >= 2)
1764 reg &= ~ARM_MMU500_ACR_CACHE_LOCK;
1765 /*
1766 * Allow unmatched Stream IDs to allocate bypass
1767 * TLB entries for reduced latency.
1768 */
1769 reg |= ARM_MMU500_ACR_SMTNMB_TLBEN;
3ca3712a
PF
1770 writel_relaxed(reg, gr0_base + ARM_SMMU_GR0_sACR);
1771 }
1772
659db6f6
AH
1773 /* Make sure all context banks are disabled and clear CB_FSR */
1774 for (i = 0; i < smmu->num_context_banks; ++i) {
452107c7 1775 cb_base = ARM_SMMU_CB(smmu, i);
659db6f6
AH
1776 writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR);
1777 writel_relaxed(FSR_FAULT, cb_base + ARM_SMMU_CB_FSR);
f0cfffc4
RM
1778 /*
1779 * Disable MMU-500's not-particularly-beneficial next-page
1780 * prefetcher for the sake of errata #841119 and #826419.
1781 */
1782 if (smmu->model == ARM_MMU500) {
1783 reg = readl_relaxed(cb_base + ARM_SMMU_CB_ACTLR);
1784 reg &= ~ARM_MMU500_ACTLR_CPRE;
1785 writel_relaxed(reg, cb_base + ARM_SMMU_CB_ACTLR);
1786 }
659db6f6 1787 }
1463fe44 1788
45ae7cff 1789 /* Invalidate the TLB, just in case */
45ae7cff
WD
1790 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLH);
1791 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLNSNH);
1792
3a5df8ff 1793 reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
659db6f6 1794
45ae7cff 1795 /* Enable fault reporting */
659db6f6 1796 reg |= (sCR0_GFRE | sCR0_GFIE | sCR0_GCFGFRE | sCR0_GCFGFIE);
45ae7cff
WD
1797
1798 /* Disable TLB broadcasting. */
659db6f6 1799 reg |= (sCR0_VMIDPNE | sCR0_PTM);
45ae7cff 1800
25a1c96c
RM
1801 /* Enable client access, handling unmatched streams as appropriate */
1802 reg &= ~sCR0_CLIENTPD;
1803 if (disable_bypass)
1804 reg |= sCR0_USFCFG;
1805 else
1806 reg &= ~sCR0_USFCFG;
45ae7cff
WD
1807
1808 /* Disable forced broadcasting */
659db6f6 1809 reg &= ~sCR0_FB;
45ae7cff
WD
1810
1811 /* Don't upgrade barriers */
659db6f6 1812 reg &= ~(sCR0_BSU_MASK << sCR0_BSU_SHIFT);
45ae7cff 1813
4e3e9b69
TC
1814 if (smmu->features & ARM_SMMU_FEAT_VMID16)
1815 reg |= sCR0_VMID16EN;
1816
dc0eaa4e
AM
1817 if (smmu->features & ARM_SMMU_FEAT_EXIDS)
1818 reg |= sCR0_EXIDENABLE;
1819
45ae7cff 1820 /* Push the button */
11febfca 1821 arm_smmu_tlb_sync_global(smmu);
3a5df8ff 1822 writel(reg, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
45ae7cff
WD
1823}
1824
1825static int arm_smmu_id_size_to_bits(int size)
1826{
1827 switch (size) {
1828 case 0:
1829 return 32;
1830 case 1:
1831 return 36;
1832 case 2:
1833 return 40;
1834 case 3:
1835 return 42;
1836 case 4:
1837 return 44;
1838 case 5:
1839 default:
1840 return 48;
1841 }
1842}
1843
1844static int arm_smmu_device_cfg_probe(struct arm_smmu_device *smmu)
1845{
1846 unsigned long size;
1847 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1848 u32 id;
bbb8a184 1849 bool cttw_reg, cttw_fw = smmu->features & ARM_SMMU_FEAT_COHERENT_WALK;
8e8b203e 1850 int i;
45ae7cff
WD
1851
1852 dev_notice(smmu->dev, "probing hardware configuration...\n");
b7862e35
RM
1853 dev_notice(smmu->dev, "SMMUv%d with:\n",
1854 smmu->version == ARM_SMMU_V2 ? 2 : 1);
45ae7cff
WD
1855
1856 /* ID0 */
1857 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID0);
4cf740b0
WD
1858
1859 /* Restrict available stages based on module parameter */
1860 if (force_stage == 1)
1861 id &= ~(ID0_S2TS | ID0_NTS);
1862 else if (force_stage == 2)
1863 id &= ~(ID0_S1TS | ID0_NTS);
1864
45ae7cff
WD
1865 if (id & ID0_S1TS) {
1866 smmu->features |= ARM_SMMU_FEAT_TRANS_S1;
1867 dev_notice(smmu->dev, "\tstage 1 translation\n");
1868 }
1869
1870 if (id & ID0_S2TS) {
1871 smmu->features |= ARM_SMMU_FEAT_TRANS_S2;
1872 dev_notice(smmu->dev, "\tstage 2 translation\n");
1873 }
1874
1875 if (id & ID0_NTS) {
1876 smmu->features |= ARM_SMMU_FEAT_TRANS_NESTED;
1877 dev_notice(smmu->dev, "\tnested translation\n");
1878 }
1879
1880 if (!(smmu->features &
4cf740b0 1881 (ARM_SMMU_FEAT_TRANS_S1 | ARM_SMMU_FEAT_TRANS_S2))) {
45ae7cff
WD
1882 dev_err(smmu->dev, "\tno translation support!\n");
1883 return -ENODEV;
1884 }
1885
b7862e35
RM
1886 if ((id & ID0_S1TS) &&
1887 ((smmu->version < ARM_SMMU_V2) || !(id & ID0_ATOSNS))) {
859a732e
MH
1888 smmu->features |= ARM_SMMU_FEAT_TRANS_OPS;
1889 dev_notice(smmu->dev, "\taddress translation ops\n");
1890 }
1891
bae2c2d4
RM
1892 /*
1893 * In order for DMA API calls to work properly, we must defer to what
bbb8a184 1894 * the FW says about coherency, regardless of what the hardware claims.
bae2c2d4
RM
1895 * Fortunately, this also opens up a workaround for systems where the
1896 * ID register value has ended up configured incorrectly.
1897 */
bae2c2d4 1898 cttw_reg = !!(id & ID0_CTTW);
bbb8a184 1899 if (cttw_fw || cttw_reg)
bae2c2d4 1900 dev_notice(smmu->dev, "\t%scoherent table walk\n",
bbb8a184
LP
1901 cttw_fw ? "" : "non-");
1902 if (cttw_fw != cttw_reg)
bae2c2d4 1903 dev_notice(smmu->dev,
bbb8a184 1904 "\t(IDR0.CTTW overridden by FW configuration)\n");
45ae7cff 1905
21174240 1906 /* Max. number of entries we have for stream matching/indexing */
dc0eaa4e
AM
1907 if (smmu->version == ARM_SMMU_V2 && id & ID0_EXIDS) {
1908 smmu->features |= ARM_SMMU_FEAT_EXIDS;
1909 size = 1 << 16;
1910 } else {
1911 size = 1 << ((id >> ID0_NUMSIDB_SHIFT) & ID0_NUMSIDB_MASK);
1912 }
21174240 1913 smmu->streamid_mask = size - 1;
45ae7cff 1914 if (id & ID0_SMS) {
45ae7cff 1915 smmu->features |= ARM_SMMU_FEAT_STREAM_MATCH;
21174240
RM
1916 size = (id >> ID0_NUMSMRG_SHIFT) & ID0_NUMSMRG_MASK;
1917 if (size == 0) {
45ae7cff
WD
1918 dev_err(smmu->dev,
1919 "stream-matching supported, but no SMRs present!\n");
1920 return -ENODEV;
1921 }
1922
1f3d5ca4
RM
1923 /* Zero-initialised to mark as invalid */
1924 smmu->smrs = devm_kcalloc(smmu->dev, size, sizeof(*smmu->smrs),
1925 GFP_KERNEL);
1926 if (!smmu->smrs)
1927 return -ENOMEM;
1928
45ae7cff 1929 dev_notice(smmu->dev,
dc0eaa4e 1930 "\tstream matching with %lu register groups", size);
45ae7cff 1931 }
8e8b203e
RM
1932 /* s2cr->type == 0 means translation, so initialise explicitly */
1933 smmu->s2crs = devm_kmalloc_array(smmu->dev, size, sizeof(*smmu->s2crs),
1934 GFP_KERNEL);
1935 if (!smmu->s2crs)
1936 return -ENOMEM;
1937 for (i = 0; i < size; i++)
1938 smmu->s2crs[i] = s2cr_init_val;
1939
21174240 1940 smmu->num_mapping_groups = size;
588888a7 1941 mutex_init(&smmu->stream_map_mutex);
8e517e76 1942 spin_lock_init(&smmu->global_sync_lock);
45ae7cff 1943
7602b871
RM
1944 if (smmu->version < ARM_SMMU_V2 || !(id & ID0_PTFS_NO_AARCH32)) {
1945 smmu->features |= ARM_SMMU_FEAT_FMT_AARCH32_L;
1946 if (!(id & ID0_PTFS_NO_AARCH32S))
1947 smmu->features |= ARM_SMMU_FEAT_FMT_AARCH32_S;
1948 }
1949
45ae7cff
WD
1950 /* ID1 */
1951 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID1);
c757e852 1952 smmu->pgshift = (id & ID1_PAGESIZE) ? 16 : 12;
45ae7cff 1953
c55af7f7 1954 /* Check for size mismatch of SMMU address space from mapped region */
518f7136 1955 size = 1 << (((id >> ID1_NUMPAGENDXB_SHIFT) & ID1_NUMPAGENDXB_MASK) + 1);
452107c7
RM
1956 size <<= smmu->pgshift;
1957 if (smmu->cb_base != gr0_base + size)
2907320d 1958 dev_warn(smmu->dev,
452107c7
RM
1959 "SMMU address space size (0x%lx) differs from mapped region size (0x%tx)!\n",
1960 size * 2, (smmu->cb_base - gr0_base) * 2);
45ae7cff 1961
518f7136 1962 smmu->num_s2_context_banks = (id >> ID1_NUMS2CB_SHIFT) & ID1_NUMS2CB_MASK;
45ae7cff
WD
1963 smmu->num_context_banks = (id >> ID1_NUMCB_SHIFT) & ID1_NUMCB_MASK;
1964 if (smmu->num_s2_context_banks > smmu->num_context_banks) {
1965 dev_err(smmu->dev, "impossible number of S2 context banks!\n");
1966 return -ENODEV;
1967 }
1968 dev_notice(smmu->dev, "\t%u context banks (%u stage-2 only)\n",
1969 smmu->num_context_banks, smmu->num_s2_context_banks);
e086d912
RM
1970 /*
1971 * Cavium CN88xx erratum #27704.
1972 * Ensure ASID and VMID allocation is unique across all SMMUs in
1973 * the system.
1974 */
1975 if (smmu->model == CAVIUM_SMMUV2) {
1976 smmu->cavium_id_base =
1977 atomic_add_return(smmu->num_context_banks,
1978 &cavium_smmu_context_count);
1979 smmu->cavium_id_base -= smmu->num_context_banks;
53c35dce 1980 dev_notice(smmu->dev, "\tenabling workaround for Cavium erratum 27704\n");
e086d912 1981 }
45ae7cff
WD
1982
1983 /* ID2 */
1984 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID2);
1985 size = arm_smmu_id_size_to_bits((id >> ID2_IAS_SHIFT) & ID2_IAS_MASK);
518f7136 1986 smmu->ipa_size = size;
45ae7cff 1987
518f7136 1988 /* The output mask is also applied for bypass */
45ae7cff 1989 size = arm_smmu_id_size_to_bits((id >> ID2_OAS_SHIFT) & ID2_OAS_MASK);
518f7136 1990 smmu->pa_size = size;
45ae7cff 1991
4e3e9b69
TC
1992 if (id & ID2_VMID16)
1993 smmu->features |= ARM_SMMU_FEAT_VMID16;
1994
f1d84548
RM
1995 /*
1996 * What the page table walker can address actually depends on which
1997 * descriptor format is in use, but since a) we don't know that yet,
1998 * and b) it can vary per context bank, this will have to do...
1999 */
2000 if (dma_set_mask_and_coherent(smmu->dev, DMA_BIT_MASK(size)))
2001 dev_warn(smmu->dev,
2002 "failed to set DMA mask for table walker\n");
2003
b7862e35 2004 if (smmu->version < ARM_SMMU_V2) {
518f7136 2005 smmu->va_size = smmu->ipa_size;
b7862e35
RM
2006 if (smmu->version == ARM_SMMU_V1_64K)
2007 smmu->features |= ARM_SMMU_FEAT_FMT_AARCH64_64K;
45ae7cff 2008 } else {
45ae7cff 2009 size = (id >> ID2_UBS_SHIFT) & ID2_UBS_MASK;
518f7136 2010 smmu->va_size = arm_smmu_id_size_to_bits(size);
518f7136 2011 if (id & ID2_PTFS_4K)
7602b871 2012 smmu->features |= ARM_SMMU_FEAT_FMT_AARCH64_4K;
518f7136 2013 if (id & ID2_PTFS_16K)
7602b871 2014 smmu->features |= ARM_SMMU_FEAT_FMT_AARCH64_16K;
518f7136 2015 if (id & ID2_PTFS_64K)
7602b871 2016 smmu->features |= ARM_SMMU_FEAT_FMT_AARCH64_64K;
45ae7cff
WD
2017 }
2018
7602b871 2019 /* Now we've corralled the various formats, what'll it do? */
7602b871 2020 if (smmu->features & ARM_SMMU_FEAT_FMT_AARCH32_S)
d5466357 2021 smmu->pgsize_bitmap |= SZ_4K | SZ_64K | SZ_1M | SZ_16M;
7602b871
RM
2022 if (smmu->features &
2023 (ARM_SMMU_FEAT_FMT_AARCH32_L | ARM_SMMU_FEAT_FMT_AARCH64_4K))
d5466357 2024 smmu->pgsize_bitmap |= SZ_4K | SZ_2M | SZ_1G;
7602b871 2025 if (smmu->features & ARM_SMMU_FEAT_FMT_AARCH64_16K)
d5466357 2026 smmu->pgsize_bitmap |= SZ_16K | SZ_32M;
7602b871 2027 if (smmu->features & ARM_SMMU_FEAT_FMT_AARCH64_64K)
d5466357
RM
2028 smmu->pgsize_bitmap |= SZ_64K | SZ_512M;
2029
2030 if (arm_smmu_ops.pgsize_bitmap == -1UL)
2031 arm_smmu_ops.pgsize_bitmap = smmu->pgsize_bitmap;
2032 else
2033 arm_smmu_ops.pgsize_bitmap |= smmu->pgsize_bitmap;
2034 dev_notice(smmu->dev, "\tSupported page sizes: 0x%08lx\n",
2035 smmu->pgsize_bitmap);
7602b871 2036
518f7136 2037
28d6007b
WD
2038 if (smmu->features & ARM_SMMU_FEAT_TRANS_S1)
2039 dev_notice(smmu->dev, "\tStage-1: %lu-bit VA -> %lu-bit IPA\n",
518f7136 2040 smmu->va_size, smmu->ipa_size);
28d6007b
WD
2041
2042 if (smmu->features & ARM_SMMU_FEAT_TRANS_S2)
2043 dev_notice(smmu->dev, "\tStage-2: %lu-bit IPA -> %lu-bit PA\n",
518f7136 2044 smmu->ipa_size, smmu->pa_size);
28d6007b 2045
45ae7cff
WD
2046 return 0;
2047}
2048
67b65a3f
RM
2049struct arm_smmu_match_data {
2050 enum arm_smmu_arch_version version;
2051 enum arm_smmu_implementation model;
2052};
2053
2054#define ARM_SMMU_MATCH_DATA(name, ver, imp) \
2055static struct arm_smmu_match_data name = { .version = ver, .model = imp }
2056
2057ARM_SMMU_MATCH_DATA(smmu_generic_v1, ARM_SMMU_V1, GENERIC_SMMU);
2058ARM_SMMU_MATCH_DATA(smmu_generic_v2, ARM_SMMU_V2, GENERIC_SMMU);
b7862e35 2059ARM_SMMU_MATCH_DATA(arm_mmu401, ARM_SMMU_V1_64K, GENERIC_SMMU);
f0cfffc4 2060ARM_SMMU_MATCH_DATA(arm_mmu500, ARM_SMMU_V2, ARM_MMU500);
e086d912 2061ARM_SMMU_MATCH_DATA(cavium_smmuv2, ARM_SMMU_V2, CAVIUM_SMMUV2);
67b65a3f 2062
09b5269a 2063static const struct of_device_id arm_smmu_of_match[] = {
67b65a3f
RM
2064 { .compatible = "arm,smmu-v1", .data = &smmu_generic_v1 },
2065 { .compatible = "arm,smmu-v2", .data = &smmu_generic_v2 },
2066 { .compatible = "arm,mmu-400", .data = &smmu_generic_v1 },
b7862e35 2067 { .compatible = "arm,mmu-401", .data = &arm_mmu401 },
f0cfffc4 2068 { .compatible = "arm,mmu-500", .data = &arm_mmu500 },
e086d912 2069 { .compatible = "cavium,smmu-v2", .data = &cavium_smmuv2 },
09360403
RM
2070 { },
2071};
2072MODULE_DEVICE_TABLE(of, arm_smmu_of_match);
2073
d6fcd3b1
LP
2074#ifdef CONFIG_ACPI
2075static int acpi_smmu_get_data(u32 model, struct arm_smmu_device *smmu)
2076{
2077 int ret = 0;
2078
2079 switch (model) {
2080 case ACPI_IORT_SMMU_V1:
2081 case ACPI_IORT_SMMU_CORELINK_MMU400:
2082 smmu->version = ARM_SMMU_V1;
2083 smmu->model = GENERIC_SMMU;
2084 break;
84c24379
RM
2085 case ACPI_IORT_SMMU_CORELINK_MMU401:
2086 smmu->version = ARM_SMMU_V1_64K;
2087 smmu->model = GENERIC_SMMU;
2088 break;
d6fcd3b1
LP
2089 case ACPI_IORT_SMMU_V2:
2090 smmu->version = ARM_SMMU_V2;
2091 smmu->model = GENERIC_SMMU;
2092 break;
2093 case ACPI_IORT_SMMU_CORELINK_MMU500:
2094 smmu->version = ARM_SMMU_V2;
2095 smmu->model = ARM_MMU500;
2096 break;
84c24379
RM
2097 case ACPI_IORT_SMMU_CAVIUM_THUNDERX:
2098 smmu->version = ARM_SMMU_V2;
2099 smmu->model = CAVIUM_SMMUV2;
2100 break;
d6fcd3b1
LP
2101 default:
2102 ret = -ENODEV;
2103 }
2104
2105 return ret;
2106}
2107
2108static int arm_smmu_device_acpi_probe(struct platform_device *pdev,
2109 struct arm_smmu_device *smmu)
2110{
2111 struct device *dev = smmu->dev;
2112 struct acpi_iort_node *node =
2113 *(struct acpi_iort_node **)dev_get_platdata(dev);
2114 struct acpi_iort_smmu *iort_smmu;
2115 int ret;
2116
2117 /* Retrieve SMMU1/2 specific data */
2118 iort_smmu = (struct acpi_iort_smmu *)node->node_data;
2119
2120 ret = acpi_smmu_get_data(iort_smmu->model, smmu);
2121 if (ret < 0)
2122 return ret;
2123
2124 /* Ignore the configuration access interrupt */
2125 smmu->num_global_irqs = 1;
2126
2127 if (iort_smmu->flags & ACPI_IORT_SMMU_COHERENT_WALK)
2128 smmu->features |= ARM_SMMU_FEAT_COHERENT_WALK;
2129
2130 return 0;
2131}
2132#else
2133static inline int arm_smmu_device_acpi_probe(struct platform_device *pdev,
2134 struct arm_smmu_device *smmu)
2135{
2136 return -ENODEV;
2137}
2138#endif
2139
bbb8a184
LP
2140static int arm_smmu_device_dt_probe(struct platform_device *pdev,
2141 struct arm_smmu_device *smmu)
45ae7cff 2142{
67b65a3f 2143 const struct arm_smmu_match_data *data;
45ae7cff 2144 struct device *dev = &pdev->dev;
021bb842
RM
2145 bool legacy_binding;
2146
bbb8a184
LP
2147 if (of_property_read_u32(dev->of_node, "#global-interrupts",
2148 &smmu->num_global_irqs)) {
2149 dev_err(dev, "missing #global-interrupts property\n");
2150 return -ENODEV;
2151 }
2152
2153 data = of_device_get_match_data(dev);
2154 smmu->version = data->version;
2155 smmu->model = data->model;
2156
2157 parse_driver_options(smmu);
2158
021bb842
RM
2159 legacy_binding = of_find_property(dev->of_node, "mmu-masters", NULL);
2160 if (legacy_binding && !using_generic_binding) {
2161 if (!using_legacy_binding)
2162 pr_notice("deprecated \"mmu-masters\" DT property in use; DMA API support unavailable\n");
2163 using_legacy_binding = true;
2164 } else if (!legacy_binding && !using_legacy_binding) {
2165 using_generic_binding = true;
2166 } else {
2167 dev_err(dev, "not probing due to mismatched DT properties\n");
2168 return -ENODEV;
2169 }
45ae7cff 2170
bbb8a184
LP
2171 if (of_dma_is_coherent(dev->of_node))
2172 smmu->features |= ARM_SMMU_FEAT_COHERENT_WALK;
2173
2174 return 0;
2175}
2176
f6810c15
RM
2177static void arm_smmu_bus_init(void)
2178{
2179 /* Oh, for a proper bus abstraction */
2180 if (!iommu_present(&platform_bus_type))
2181 bus_set_iommu(&platform_bus_type, &arm_smmu_ops);
2182#ifdef CONFIG_ARM_AMBA
2183 if (!iommu_present(&amba_bustype))
2184 bus_set_iommu(&amba_bustype, &arm_smmu_ops);
2185#endif
2186#ifdef CONFIG_PCI
2187 if (!iommu_present(&pci_bus_type)) {
2188 pci_request_acs();
2189 bus_set_iommu(&pci_bus_type, &arm_smmu_ops);
2190 }
2191#endif
2192}
2193
bbb8a184
LP
2194static int arm_smmu_device_probe(struct platform_device *pdev)
2195{
2196 struct resource *res;
9648cbc9 2197 resource_size_t ioaddr;
bbb8a184
LP
2198 struct arm_smmu_device *smmu;
2199 struct device *dev = &pdev->dev;
2200 int num_irqs, i, err;
2201
45ae7cff
WD
2202 smmu = devm_kzalloc(dev, sizeof(*smmu), GFP_KERNEL);
2203 if (!smmu) {
2204 dev_err(dev, "failed to allocate arm_smmu_device\n");
2205 return -ENOMEM;
2206 }
2207 smmu->dev = dev;
2208
d6fcd3b1
LP
2209 if (dev->of_node)
2210 err = arm_smmu_device_dt_probe(pdev, smmu);
2211 else
2212 err = arm_smmu_device_acpi_probe(pdev, smmu);
2213
bbb8a184
LP
2214 if (err)
2215 return err;
09360403 2216
45ae7cff 2217 res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
9648cbc9 2218 ioaddr = res->start;
8a7f4312
JL
2219 smmu->base = devm_ioremap_resource(dev, res);
2220 if (IS_ERR(smmu->base))
2221 return PTR_ERR(smmu->base);
452107c7 2222 smmu->cb_base = smmu->base + resource_size(res) / 2;
45ae7cff 2223
45ae7cff
WD
2224 num_irqs = 0;
2225 while ((res = platform_get_resource(pdev, IORESOURCE_IRQ, num_irqs))) {
2226 num_irqs++;
2227 if (num_irqs > smmu->num_global_irqs)
2228 smmu->num_context_irqs++;
2229 }
2230
44a08de2
AH
2231 if (!smmu->num_context_irqs) {
2232 dev_err(dev, "found %d interrupts but expected at least %d\n",
2233 num_irqs, smmu->num_global_irqs + 1);
2234 return -ENODEV;
45ae7cff 2235 }
45ae7cff
WD
2236
2237 smmu->irqs = devm_kzalloc(dev, sizeof(*smmu->irqs) * num_irqs,
2238 GFP_KERNEL);
2239 if (!smmu->irqs) {
2240 dev_err(dev, "failed to allocate %d irqs\n", num_irqs);
2241 return -ENOMEM;
2242 }
2243
2244 for (i = 0; i < num_irqs; ++i) {
2245 int irq = platform_get_irq(pdev, i);
2907320d 2246
45ae7cff
WD
2247 if (irq < 0) {
2248 dev_err(dev, "failed to get irq index %d\n", i);
2249 return -ENODEV;
2250 }
2251 smmu->irqs[i] = irq;
2252 }
2253
3c8766d0
OH
2254 err = arm_smmu_device_cfg_probe(smmu);
2255 if (err)
2256 return err;
2257
b7862e35 2258 if (smmu->version == ARM_SMMU_V2 &&
45ae7cff
WD
2259 smmu->num_context_banks != smmu->num_context_irqs) {
2260 dev_err(dev,
2261 "found only %d context interrupt(s) but %d required\n",
2262 smmu->num_context_irqs, smmu->num_context_banks);
f80cd885 2263 return -ENODEV;
45ae7cff
WD
2264 }
2265
45ae7cff 2266 for (i = 0; i < smmu->num_global_irqs; ++i) {
bee14004
PF
2267 err = devm_request_irq(smmu->dev, smmu->irqs[i],
2268 arm_smmu_global_fault,
2269 IRQF_SHARED,
2270 "arm-smmu global fault",
2271 smmu);
45ae7cff
WD
2272 if (err) {
2273 dev_err(dev, "failed to request global IRQ %d (%u)\n",
2274 i, smmu->irqs[i]);
f80cd885 2275 return err;
45ae7cff
WD
2276 }
2277 }
2278
9648cbc9
JR
2279 err = iommu_device_sysfs_add(&smmu->iommu, smmu->dev, NULL,
2280 "smmu.%pa", &ioaddr);
2281 if (err) {
2282 dev_err(dev, "Failed to register iommu in sysfs\n");
2283 return err;
2284 }
2285
2286 iommu_device_set_ops(&smmu->iommu, &arm_smmu_ops);
2287 iommu_device_set_fwnode(&smmu->iommu, dev->fwnode);
2288
2289 err = iommu_device_register(&smmu->iommu);
2290 if (err) {
2291 dev_err(dev, "Failed to register iommu\n");
2292 return err;
2293 }
2294
d6fc5d97 2295 platform_set_drvdata(pdev, smmu);
fd90cecb 2296 arm_smmu_device_reset(smmu);
dc0eaa4e 2297 arm_smmu_test_smr_masks(smmu);
021bb842 2298
f6810c15
RM
2299 /*
2300 * For ACPI and generic DT bindings, an SMMU will be probed before
2301 * any device which might need it, so we want the bus ops in place
2302 * ready to handle default domain setup as soon as any SMMU exists.
2303 */
2304 if (!using_legacy_binding)
2305 arm_smmu_bus_init();
2306
45ae7cff 2307 return 0;
45ae7cff
WD
2308}
2309
f6810c15
RM
2310/*
2311 * With the legacy DT binding in play, though, we have no guarantees about
2312 * probe order, but then we're also not doing default domains, so we can
2313 * delay setting bus ops until we're sure every possible SMMU is ready,
2314 * and that way ensure that no add_device() calls get missed.
2315 */
2316static int arm_smmu_legacy_bus_init(void)
2317{
2318 if (using_legacy_binding)
2319 arm_smmu_bus_init();
45ae7cff 2320 return 0;
45ae7cff 2321}
f6810c15 2322device_initcall_sync(arm_smmu_legacy_bus_init);
45ae7cff
WD
2323
2324static int arm_smmu_device_remove(struct platform_device *pdev)
2325{
d6fc5d97 2326 struct arm_smmu_device *smmu = platform_get_drvdata(pdev);
45ae7cff
WD
2327
2328 if (!smmu)
2329 return -ENODEV;
2330
ecfadb6e 2331 if (!bitmap_empty(smmu->context_map, ARM_SMMU_MAX_CBS))
d6fc5d97 2332 dev_err(&pdev->dev, "removing device with active domains!\n");
45ae7cff 2333
45ae7cff 2334 /* Turn the thing off */
2907320d 2335 writel(sCR0_CLIENTPD, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
45ae7cff
WD
2336 return 0;
2337}
2338
45ae7cff
WD
2339static struct platform_driver arm_smmu_driver = {
2340 .driver = {
45ae7cff
WD
2341 .name = "arm-smmu",
2342 .of_match_table = of_match_ptr(arm_smmu_of_match),
2343 },
bbb8a184 2344 .probe = arm_smmu_device_probe,
45ae7cff
WD
2345 .remove = arm_smmu_device_remove,
2346};
f6810c15
RM
2347module_platform_driver(arm_smmu_driver);
2348
2349IOMMU_OF_DECLARE(arm_smmuv1, "arm,smmu-v1", NULL);
2350IOMMU_OF_DECLARE(arm_smmuv2, "arm,smmu-v2", NULL);
2351IOMMU_OF_DECLARE(arm_mmu400, "arm,mmu-400", NULL);
2352IOMMU_OF_DECLARE(arm_mmu401, "arm,mmu-401", NULL);
2353IOMMU_OF_DECLARE(arm_mmu500, "arm,mmu-500", NULL);
2354IOMMU_OF_DECLARE(cavium_smmuv2, "cavium,smmu-v2", NULL);
d6fcd3b1 2355
45ae7cff
WD
2356MODULE_DESCRIPTION("IOMMU API for ARM architected SMMU implementations");
2357MODULE_AUTHOR("Will Deacon <will.deacon@arm.com>");
2358MODULE_LICENSE("GPL v2");