xref: /openbmc/linux/drivers/gpu/drm/msm/msm_iommu.c (revision bceddc2cb581dffc94370517f7eedbd9aa16c74b)
1caab277bSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-only
2871d812aSRob Clark /*
3871d812aSRob Clark  * Copyright (C) 2013 Red Hat
4871d812aSRob Clark  * Author: Rob Clark <robdclark@gmail.com>
5871d812aSRob Clark  */
6871d812aSRob Clark 
7b145c6e6SJordan Crouse #include <linux/adreno-smmu-priv.h>
8b145c6e6SJordan Crouse #include <linux/io-pgtable.h>
9871d812aSRob Clark #include "msm_drv.h"
10871d812aSRob Clark #include "msm_mmu.h"
11871d812aSRob Clark 
12871d812aSRob Clark struct msm_iommu {
13871d812aSRob Clark 	struct msm_mmu base;
14871d812aSRob Clark 	struct iommu_domain *domain;
15b145c6e6SJordan Crouse 	atomic_t pagetables;
16871d812aSRob Clark };
17b145c6e6SJordan Crouse 
18871d812aSRob Clark #define to_msm_iommu(x) container_of(x, struct msm_iommu, base)
19871d812aSRob Clark 
20b145c6e6SJordan Crouse struct msm_iommu_pagetable {
21b145c6e6SJordan Crouse 	struct msm_mmu base;
22b145c6e6SJordan Crouse 	struct msm_mmu *parent;
23b145c6e6SJordan Crouse 	struct io_pgtable_ops *pgtbl_ops;
24b145c6e6SJordan Crouse 	phys_addr_t ttbr;
25b145c6e6SJordan Crouse 	u32 asid;
26b145c6e6SJordan Crouse };
27b145c6e6SJordan Crouse static struct msm_iommu_pagetable *to_pagetable(struct msm_mmu *mmu)
28b145c6e6SJordan Crouse {
29b145c6e6SJordan Crouse 	return container_of(mmu, struct msm_iommu_pagetable, base);
30b145c6e6SJordan Crouse }
31b145c6e6SJordan Crouse 
32b145c6e6SJordan Crouse static int msm_iommu_pagetable_unmap(struct msm_mmu *mmu, u64 iova,
33b145c6e6SJordan Crouse 		size_t size)
34b145c6e6SJordan Crouse {
35b145c6e6SJordan Crouse 	struct msm_iommu_pagetable *pagetable = to_pagetable(mmu);
36b145c6e6SJordan Crouse 	struct io_pgtable_ops *ops = pagetable->pgtbl_ops;
37b145c6e6SJordan Crouse 	size_t unmapped = 0;
38b145c6e6SJordan Crouse 
39b145c6e6SJordan Crouse 	/* Unmap the block one page at a time */
40b145c6e6SJordan Crouse 	while (size) {
41b145c6e6SJordan Crouse 		unmapped += ops->unmap(ops, iova, 4096, NULL);
42b145c6e6SJordan Crouse 		iova += 4096;
43b145c6e6SJordan Crouse 		size -= 4096;
44b145c6e6SJordan Crouse 	}
45b145c6e6SJordan Crouse 
4693b694d0SLinus Torvalds 	iommu_flush_iotlb_all(to_msm_iommu(pagetable->parent)->domain);
47b145c6e6SJordan Crouse 
48b145c6e6SJordan Crouse 	return (unmapped == size) ? 0 : -EINVAL;
49b145c6e6SJordan Crouse }
50b145c6e6SJordan Crouse 
51b145c6e6SJordan Crouse static int msm_iommu_pagetable_map(struct msm_mmu *mmu, u64 iova,
52b145c6e6SJordan Crouse 		struct sg_table *sgt, size_t len, int prot)
53b145c6e6SJordan Crouse {
54b145c6e6SJordan Crouse 	struct msm_iommu_pagetable *pagetable = to_pagetable(mmu);
55b145c6e6SJordan Crouse 	struct io_pgtable_ops *ops = pagetable->pgtbl_ops;
56b145c6e6SJordan Crouse 	struct scatterlist *sg;
57b145c6e6SJordan Crouse 	size_t mapped = 0;
58b145c6e6SJordan Crouse 	u64 addr = iova;
59b145c6e6SJordan Crouse 	unsigned int i;
60b145c6e6SJordan Crouse 
61b145c6e6SJordan Crouse 	for_each_sg(sgt->sgl, sg, sgt->nents, i) {
62b145c6e6SJordan Crouse 		size_t size = sg->length;
63b145c6e6SJordan Crouse 		phys_addr_t phys = sg_phys(sg);
64b145c6e6SJordan Crouse 
65b145c6e6SJordan Crouse 		/* Map the block one page at a time */
66b145c6e6SJordan Crouse 		while (size) {
67b145c6e6SJordan Crouse 			if (ops->map(ops, addr, phys, 4096, prot, GFP_KERNEL)) {
68b145c6e6SJordan Crouse 				msm_iommu_pagetable_unmap(mmu, iova, mapped);
69b145c6e6SJordan Crouse 				return -EINVAL;
70b145c6e6SJordan Crouse 			}
71b145c6e6SJordan Crouse 
72b145c6e6SJordan Crouse 			phys += 4096;
73b145c6e6SJordan Crouse 			addr += 4096;
74b145c6e6SJordan Crouse 			size -= 4096;
75b145c6e6SJordan Crouse 			mapped += 4096;
76b145c6e6SJordan Crouse 		}
77b145c6e6SJordan Crouse 	}
78b145c6e6SJordan Crouse 
79b145c6e6SJordan Crouse 	return 0;
80b145c6e6SJordan Crouse }
81b145c6e6SJordan Crouse 
82b145c6e6SJordan Crouse static void msm_iommu_pagetable_destroy(struct msm_mmu *mmu)
83b145c6e6SJordan Crouse {
84b145c6e6SJordan Crouse 	struct msm_iommu_pagetable *pagetable = to_pagetable(mmu);
85b145c6e6SJordan Crouse 	struct msm_iommu *iommu = to_msm_iommu(pagetable->parent);
86b145c6e6SJordan Crouse 	struct adreno_smmu_priv *adreno_smmu =
87b145c6e6SJordan Crouse 		dev_get_drvdata(pagetable->parent->dev);
88b145c6e6SJordan Crouse 
89b145c6e6SJordan Crouse 	/*
90b145c6e6SJordan Crouse 	 * If this is the last attached pagetable for the parent,
91b145c6e6SJordan Crouse 	 * disable TTBR0 in the arm-smmu driver
92b145c6e6SJordan Crouse 	 */
93b145c6e6SJordan Crouse 	if (atomic_dec_return(&iommu->pagetables) == 0)
94b145c6e6SJordan Crouse 		adreno_smmu->set_ttbr0_cfg(adreno_smmu->cookie, NULL);
95b145c6e6SJordan Crouse 
96b145c6e6SJordan Crouse 	free_io_pgtable_ops(pagetable->pgtbl_ops);
97b145c6e6SJordan Crouse 	kfree(pagetable);
98b145c6e6SJordan Crouse }
99b145c6e6SJordan Crouse 
100b145c6e6SJordan Crouse int msm_iommu_pagetable_params(struct msm_mmu *mmu,
101b145c6e6SJordan Crouse 		phys_addr_t *ttbr, int *asid)
102b145c6e6SJordan Crouse {
103b145c6e6SJordan Crouse 	struct msm_iommu_pagetable *pagetable;
104b145c6e6SJordan Crouse 
105b145c6e6SJordan Crouse 	if (mmu->type != MSM_MMU_IOMMU_PAGETABLE)
106b145c6e6SJordan Crouse 		return -EINVAL;
107b145c6e6SJordan Crouse 
108b145c6e6SJordan Crouse 	pagetable = to_pagetable(mmu);
109b145c6e6SJordan Crouse 
110b145c6e6SJordan Crouse 	if (ttbr)
111b145c6e6SJordan Crouse 		*ttbr = pagetable->ttbr;
112b145c6e6SJordan Crouse 
113b145c6e6SJordan Crouse 	if (asid)
114b145c6e6SJordan Crouse 		*asid = pagetable->asid;
115b145c6e6SJordan Crouse 
116b145c6e6SJordan Crouse 	return 0;
117b145c6e6SJordan Crouse }
118b145c6e6SJordan Crouse 
119b145c6e6SJordan Crouse static const struct msm_mmu_funcs pagetable_funcs = {
120b145c6e6SJordan Crouse 		.map = msm_iommu_pagetable_map,
121b145c6e6SJordan Crouse 		.unmap = msm_iommu_pagetable_unmap,
122b145c6e6SJordan Crouse 		.destroy = msm_iommu_pagetable_destroy,
123b145c6e6SJordan Crouse };
124b145c6e6SJordan Crouse 
125b145c6e6SJordan Crouse static void msm_iommu_tlb_flush_all(void *cookie)
126b145c6e6SJordan Crouse {
127b145c6e6SJordan Crouse }
128b145c6e6SJordan Crouse 
129b145c6e6SJordan Crouse static void msm_iommu_tlb_flush_walk(unsigned long iova, size_t size,
130b145c6e6SJordan Crouse 		size_t granule, void *cookie)
131b145c6e6SJordan Crouse {
132b145c6e6SJordan Crouse }
133b145c6e6SJordan Crouse 
134b145c6e6SJordan Crouse static void msm_iommu_tlb_add_page(struct iommu_iotlb_gather *gather,
135b145c6e6SJordan Crouse 		unsigned long iova, size_t granule, void *cookie)
136b145c6e6SJordan Crouse {
137b145c6e6SJordan Crouse }
138b145c6e6SJordan Crouse 
139b145c6e6SJordan Crouse static const struct iommu_flush_ops null_tlb_ops = {
140b145c6e6SJordan Crouse 	.tlb_flush_all = msm_iommu_tlb_flush_all,
141b145c6e6SJordan Crouse 	.tlb_flush_walk = msm_iommu_tlb_flush_walk,
142b145c6e6SJordan Crouse 	.tlb_add_page = msm_iommu_tlb_add_page,
143b145c6e6SJordan Crouse };
144b145c6e6SJordan Crouse 
145*bceddc2cSRob Clark static int msm_fault_handler(struct iommu_domain *domain, struct device *dev,
146*bceddc2cSRob Clark 		unsigned long iova, int flags, void *arg);
147*bceddc2cSRob Clark 
148b145c6e6SJordan Crouse struct msm_mmu *msm_iommu_pagetable_create(struct msm_mmu *parent)
149b145c6e6SJordan Crouse {
150b145c6e6SJordan Crouse 	struct adreno_smmu_priv *adreno_smmu = dev_get_drvdata(parent->dev);
151b145c6e6SJordan Crouse 	struct msm_iommu *iommu = to_msm_iommu(parent);
152b145c6e6SJordan Crouse 	struct msm_iommu_pagetable *pagetable;
153b145c6e6SJordan Crouse 	const struct io_pgtable_cfg *ttbr1_cfg = NULL;
154b145c6e6SJordan Crouse 	struct io_pgtable_cfg ttbr0_cfg;
155b145c6e6SJordan Crouse 	int ret;
156b145c6e6SJordan Crouse 
157b145c6e6SJordan Crouse 	/* Get the pagetable configuration from the domain */
158b145c6e6SJordan Crouse 	if (adreno_smmu->cookie)
159b145c6e6SJordan Crouse 		ttbr1_cfg = adreno_smmu->get_ttbr1_cfg(adreno_smmu->cookie);
160b145c6e6SJordan Crouse 	if (!ttbr1_cfg)
161b145c6e6SJordan Crouse 		return ERR_PTR(-ENODEV);
162b145c6e6SJordan Crouse 
163*bceddc2cSRob Clark 	/*
164*bceddc2cSRob Clark 	 * Defer setting the fault handler until we have a valid adreno_smmu
165*bceddc2cSRob Clark 	 * to avoid accidentially installing a GPU specific fault handler for
166*bceddc2cSRob Clark 	 * the display's iommu
167*bceddc2cSRob Clark 	 */
168*bceddc2cSRob Clark 	iommu_set_fault_handler(iommu->domain, msm_fault_handler, iommu);
169*bceddc2cSRob Clark 
170b145c6e6SJordan Crouse 	pagetable = kzalloc(sizeof(*pagetable), GFP_KERNEL);
171b145c6e6SJordan Crouse 	if (!pagetable)
172b145c6e6SJordan Crouse 		return ERR_PTR(-ENOMEM);
173b145c6e6SJordan Crouse 
174b145c6e6SJordan Crouse 	msm_mmu_init(&pagetable->base, parent->dev, &pagetable_funcs,
175b145c6e6SJordan Crouse 		MSM_MMU_IOMMU_PAGETABLE);
176b145c6e6SJordan Crouse 
177b145c6e6SJordan Crouse 	/* Clone the TTBR1 cfg as starting point for TTBR0 cfg: */
178b145c6e6SJordan Crouse 	ttbr0_cfg = *ttbr1_cfg;
179b145c6e6SJordan Crouse 
180b145c6e6SJordan Crouse 	/* The incoming cfg will have the TTBR1 quirk enabled */
181b145c6e6SJordan Crouse 	ttbr0_cfg.quirks &= ~IO_PGTABLE_QUIRK_ARM_TTBR1;
182b145c6e6SJordan Crouse 	ttbr0_cfg.tlb = &null_tlb_ops;
183b145c6e6SJordan Crouse 
184b145c6e6SJordan Crouse 	pagetable->pgtbl_ops = alloc_io_pgtable_ops(ARM_64_LPAE_S1,
185b145c6e6SJordan Crouse 		&ttbr0_cfg, iommu->domain);
186b145c6e6SJordan Crouse 
187b145c6e6SJordan Crouse 	if (!pagetable->pgtbl_ops) {
188b145c6e6SJordan Crouse 		kfree(pagetable);
189b145c6e6SJordan Crouse 		return ERR_PTR(-ENOMEM);
190b145c6e6SJordan Crouse 	}
191b145c6e6SJordan Crouse 
192b145c6e6SJordan Crouse 	/*
193b145c6e6SJordan Crouse 	 * If this is the first pagetable that we've allocated, send it back to
194b145c6e6SJordan Crouse 	 * the arm-smmu driver as a trigger to set up TTBR0
195b145c6e6SJordan Crouse 	 */
196b145c6e6SJordan Crouse 	if (atomic_inc_return(&iommu->pagetables) == 1) {
197e25e92e0SRob Clark 		/* Enable stall on iommu fault: */
198e25e92e0SRob Clark 		adreno_smmu->set_stall(adreno_smmu->cookie, true);
199e25e92e0SRob Clark 
200b145c6e6SJordan Crouse 		ret = adreno_smmu->set_ttbr0_cfg(adreno_smmu->cookie, &ttbr0_cfg);
201b145c6e6SJordan Crouse 		if (ret) {
202b145c6e6SJordan Crouse 			free_io_pgtable_ops(pagetable->pgtbl_ops);
203b145c6e6SJordan Crouse 			kfree(pagetable);
204b145c6e6SJordan Crouse 			return ERR_PTR(ret);
205b145c6e6SJordan Crouse 		}
206b145c6e6SJordan Crouse 	}
207b145c6e6SJordan Crouse 
208b145c6e6SJordan Crouse 	/* Needed later for TLB flush */
209b145c6e6SJordan Crouse 	pagetable->parent = parent;
210b145c6e6SJordan Crouse 	pagetable->ttbr = ttbr0_cfg.arm_lpae_s1_cfg.ttbr;
211b145c6e6SJordan Crouse 
212b145c6e6SJordan Crouse 	/*
213b145c6e6SJordan Crouse 	 * TODO we would like each set of page tables to have a unique ASID
21493b694d0SLinus Torvalds 	 * to optimize TLB invalidation.  But iommu_flush_iotlb_all() will
215b145c6e6SJordan Crouse 	 * end up flushing the ASID used for TTBR1 pagetables, which is not
216b145c6e6SJordan Crouse 	 * what we want.  So for now just use the same ASID as TTBR1.
217b145c6e6SJordan Crouse 	 */
218b145c6e6SJordan Crouse 	pagetable->asid = 0;
219b145c6e6SJordan Crouse 
220b145c6e6SJordan Crouse 	return &pagetable->base;
221b145c6e6SJordan Crouse }
222b145c6e6SJordan Crouse 
2237f8036b7SRob Clark static int msm_fault_handler(struct iommu_domain *domain, struct device *dev,
224871d812aSRob Clark 		unsigned long iova, int flags, void *arg)
225871d812aSRob Clark {
2267f8036b7SRob Clark 	struct msm_iommu *iommu = arg;
2272a574cc0SJordan Crouse 	struct adreno_smmu_priv *adreno_smmu = dev_get_drvdata(iommu->base.dev);
2282a574cc0SJordan Crouse 	struct adreno_smmu_fault_info info, *ptr = NULL;
2292a574cc0SJordan Crouse 
2302a574cc0SJordan Crouse 	if (adreno_smmu->get_fault_info) {
2312a574cc0SJordan Crouse 		adreno_smmu->get_fault_info(adreno_smmu->cookie, &info);
2322a574cc0SJordan Crouse 		ptr = &info;
2332a574cc0SJordan Crouse 	}
2342a574cc0SJordan Crouse 
2357f8036b7SRob Clark 	if (iommu->base.handler)
2362a574cc0SJordan Crouse 		return iommu->base.handler(iommu->base.arg, iova, flags, ptr);
2372a574cc0SJordan Crouse 
238bdad5c53SJordan Crouse 	pr_warn_ratelimited("*** fault: iova=%16lx, flags=%d\n", iova, flags);
2396814dbf9SRob Clark 	return 0;
240871d812aSRob Clark }
241871d812aSRob Clark 
242e25e92e0SRob Clark static void msm_iommu_resume_translation(struct msm_mmu *mmu)
243e25e92e0SRob Clark {
244e25e92e0SRob Clark 	struct adreno_smmu_priv *adreno_smmu = dev_get_drvdata(mmu->dev);
245e25e92e0SRob Clark 
246e25e92e0SRob Clark 	adreno_smmu->resume_translation(adreno_smmu->cookie, true);
247e25e92e0SRob Clark }
248e25e92e0SRob Clark 
24953bf7f7aSDrew Davenport static void msm_iommu_detach(struct msm_mmu *mmu)
25087e956e9SStephane Viau {
25187e956e9SStephane Viau 	struct msm_iommu *iommu = to_msm_iommu(mmu);
252cc692726SRob Clark 
253944fc36cSRob Clark 	iommu_detach_device(iommu->domain, mmu->dev);
25487e956e9SStephane Viau }
25587e956e9SStephane Viau 
25678babc16SRob Clark static int msm_iommu_map(struct msm_mmu *mmu, uint64_t iova,
257fb212ad6SJordan Crouse 		struct sg_table *sgt, size_t len, int prot)
258871d812aSRob Clark {
259871d812aSRob Clark 	struct msm_iommu *iommu = to_msm_iommu(mmu);
260f9000049SRob Clark 	size_t ret;
261871d812aSRob Clark 
262e3c64c72SJordan Crouse 	/* The arm-smmu driver expects the addresses to be sign extended */
263e3c64c72SJordan Crouse 	if (iova & BIT_ULL(48))
264e3c64c72SJordan Crouse 		iova |= GENMASK_ULL(63, 49);
265e3c64c72SJordan Crouse 
2667690a33fSMarek Szyprowski 	ret = iommu_map_sgtable(iommu->domain, iova, sgt, prot);
267098336deSWen Yang 	WARN_ON(!ret);
268871d812aSRob Clark 
269f9000049SRob Clark 	return (ret == len) ? 0 : -EINVAL;
270871d812aSRob Clark }
271871d812aSRob Clark 
272fb212ad6SJordan Crouse static int msm_iommu_unmap(struct msm_mmu *mmu, uint64_t iova, size_t len)
273871d812aSRob Clark {
274871d812aSRob Clark 	struct msm_iommu *iommu = to_msm_iommu(mmu);
275871d812aSRob Clark 
276e3c64c72SJordan Crouse 	if (iova & BIT_ULL(48))
277e3c64c72SJordan Crouse 		iova |= GENMASK_ULL(63, 49);
278e3c64c72SJordan Crouse 
279f9000049SRob Clark 	iommu_unmap(iommu->domain, iova, len);
280871d812aSRob Clark 
281871d812aSRob Clark 	return 0;
282871d812aSRob Clark }
283871d812aSRob Clark 
284871d812aSRob Clark static void msm_iommu_destroy(struct msm_mmu *mmu)
285871d812aSRob Clark {
286871d812aSRob Clark 	struct msm_iommu *iommu = to_msm_iommu(mmu);
287871d812aSRob Clark 	iommu_domain_free(iommu->domain);
288871d812aSRob Clark 	kfree(iommu);
289871d812aSRob Clark }
290871d812aSRob Clark 
291871d812aSRob Clark static const struct msm_mmu_funcs funcs = {
29287e956e9SStephane Viau 		.detach = msm_iommu_detach,
293871d812aSRob Clark 		.map = msm_iommu_map,
294871d812aSRob Clark 		.unmap = msm_iommu_unmap,
295871d812aSRob Clark 		.destroy = msm_iommu_destroy,
296e25e92e0SRob Clark 		.resume_translation = msm_iommu_resume_translation,
297871d812aSRob Clark };
298871d812aSRob Clark 
299944fc36cSRob Clark struct msm_mmu *msm_iommu_new(struct device *dev, struct iommu_domain *domain)
300871d812aSRob Clark {
301871d812aSRob Clark 	struct msm_iommu *iommu;
30252da6d51SJordan Crouse 	int ret;
303871d812aSRob Clark 
304ccac7ce3SJordan Crouse 	if (!domain)
305ccac7ce3SJordan Crouse 		return ERR_PTR(-ENODEV);
306ccac7ce3SJordan Crouse 
307871d812aSRob Clark 	iommu = kzalloc(sizeof(*iommu), GFP_KERNEL);
308871d812aSRob Clark 	if (!iommu)
309871d812aSRob Clark 		return ERR_PTR(-ENOMEM);
310871d812aSRob Clark 
311871d812aSRob Clark 	iommu->domain = domain;
312b145c6e6SJordan Crouse 	msm_mmu_init(&iommu->base, dev, &funcs, MSM_MMU_IOMMU);
313871d812aSRob Clark 
314b145c6e6SJordan Crouse 	atomic_set(&iommu->pagetables, 0);
315b145c6e6SJordan Crouse 
31652da6d51SJordan Crouse 	ret = iommu_attach_device(iommu->domain, dev);
31752da6d51SJordan Crouse 	if (ret) {
31852da6d51SJordan Crouse 		kfree(iommu);
31952da6d51SJordan Crouse 		return ERR_PTR(ret);
32052da6d51SJordan Crouse 	}
32152da6d51SJordan Crouse 
322871d812aSRob Clark 	return &iommu->base;
323871d812aSRob Clark }
324