xref: /openbmc/linux/drivers/gpu/drm/msm/msm_iommu.c (revision e25e92e08e32c6bf63a968929d232f13dcf9938c)
1caab277bSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-only
2871d812aSRob Clark /*
3871d812aSRob Clark  * Copyright (C) 2013 Red Hat
4871d812aSRob Clark  * Author: Rob Clark <robdclark@gmail.com>
5871d812aSRob Clark  */
6871d812aSRob Clark 
7b145c6e6SJordan Crouse #include <linux/adreno-smmu-priv.h>
8b145c6e6SJordan Crouse #include <linux/io-pgtable.h>
9871d812aSRob Clark #include "msm_drv.h"
10871d812aSRob Clark #include "msm_mmu.h"
11871d812aSRob Clark 
12871d812aSRob Clark struct msm_iommu {
13871d812aSRob Clark 	struct msm_mmu base;
14871d812aSRob Clark 	struct iommu_domain *domain;
15b145c6e6SJordan Crouse 	atomic_t pagetables;
16871d812aSRob Clark };
17b145c6e6SJordan Crouse 
18871d812aSRob Clark #define to_msm_iommu(x) container_of(x, struct msm_iommu, base)
19871d812aSRob Clark 
20b145c6e6SJordan Crouse struct msm_iommu_pagetable {
21b145c6e6SJordan Crouse 	struct msm_mmu base;
22b145c6e6SJordan Crouse 	struct msm_mmu *parent;
23b145c6e6SJordan Crouse 	struct io_pgtable_ops *pgtbl_ops;
24b145c6e6SJordan Crouse 	phys_addr_t ttbr;
25b145c6e6SJordan Crouse 	u32 asid;
26b145c6e6SJordan Crouse };
27b145c6e6SJordan Crouse static struct msm_iommu_pagetable *to_pagetable(struct msm_mmu *mmu)
28b145c6e6SJordan Crouse {
29b145c6e6SJordan Crouse 	return container_of(mmu, struct msm_iommu_pagetable, base);
30b145c6e6SJordan Crouse }
31b145c6e6SJordan Crouse 
32b145c6e6SJordan Crouse static int msm_iommu_pagetable_unmap(struct msm_mmu *mmu, u64 iova,
33b145c6e6SJordan Crouse 		size_t size)
34b145c6e6SJordan Crouse {
35b145c6e6SJordan Crouse 	struct msm_iommu_pagetable *pagetable = to_pagetable(mmu);
36b145c6e6SJordan Crouse 	struct io_pgtable_ops *ops = pagetable->pgtbl_ops;
37b145c6e6SJordan Crouse 	size_t unmapped = 0;
38b145c6e6SJordan Crouse 
39b145c6e6SJordan Crouse 	/* Unmap the block one page at a time */
40b145c6e6SJordan Crouse 	while (size) {
41b145c6e6SJordan Crouse 		unmapped += ops->unmap(ops, iova, 4096, NULL);
42b145c6e6SJordan Crouse 		iova += 4096;
43b145c6e6SJordan Crouse 		size -= 4096;
44b145c6e6SJordan Crouse 	}
45b145c6e6SJordan Crouse 
4693b694d0SLinus Torvalds 	iommu_flush_iotlb_all(to_msm_iommu(pagetable->parent)->domain);
47b145c6e6SJordan Crouse 
48b145c6e6SJordan Crouse 	return (unmapped == size) ? 0 : -EINVAL;
49b145c6e6SJordan Crouse }
50b145c6e6SJordan Crouse 
51b145c6e6SJordan Crouse static int msm_iommu_pagetable_map(struct msm_mmu *mmu, u64 iova,
52b145c6e6SJordan Crouse 		struct sg_table *sgt, size_t len, int prot)
53b145c6e6SJordan Crouse {
54b145c6e6SJordan Crouse 	struct msm_iommu_pagetable *pagetable = to_pagetable(mmu);
55b145c6e6SJordan Crouse 	struct io_pgtable_ops *ops = pagetable->pgtbl_ops;
56b145c6e6SJordan Crouse 	struct scatterlist *sg;
57b145c6e6SJordan Crouse 	size_t mapped = 0;
58b145c6e6SJordan Crouse 	u64 addr = iova;
59b145c6e6SJordan Crouse 	unsigned int i;
60b145c6e6SJordan Crouse 
61b145c6e6SJordan Crouse 	for_each_sg(sgt->sgl, sg, sgt->nents, i) {
62b145c6e6SJordan Crouse 		size_t size = sg->length;
63b145c6e6SJordan Crouse 		phys_addr_t phys = sg_phys(sg);
64b145c6e6SJordan Crouse 
65b145c6e6SJordan Crouse 		/* Map the block one page at a time */
66b145c6e6SJordan Crouse 		while (size) {
67b145c6e6SJordan Crouse 			if (ops->map(ops, addr, phys, 4096, prot, GFP_KERNEL)) {
68b145c6e6SJordan Crouse 				msm_iommu_pagetable_unmap(mmu, iova, mapped);
69b145c6e6SJordan Crouse 				return -EINVAL;
70b145c6e6SJordan Crouse 			}
71b145c6e6SJordan Crouse 
72b145c6e6SJordan Crouse 			phys += 4096;
73b145c6e6SJordan Crouse 			addr += 4096;
74b145c6e6SJordan Crouse 			size -= 4096;
75b145c6e6SJordan Crouse 			mapped += 4096;
76b145c6e6SJordan Crouse 		}
77b145c6e6SJordan Crouse 	}
78b145c6e6SJordan Crouse 
79b145c6e6SJordan Crouse 	return 0;
80b145c6e6SJordan Crouse }
81b145c6e6SJordan Crouse 
82b145c6e6SJordan Crouse static void msm_iommu_pagetable_destroy(struct msm_mmu *mmu)
83b145c6e6SJordan Crouse {
84b145c6e6SJordan Crouse 	struct msm_iommu_pagetable *pagetable = to_pagetable(mmu);
85b145c6e6SJordan Crouse 	struct msm_iommu *iommu = to_msm_iommu(pagetable->parent);
86b145c6e6SJordan Crouse 	struct adreno_smmu_priv *adreno_smmu =
87b145c6e6SJordan Crouse 		dev_get_drvdata(pagetable->parent->dev);
88b145c6e6SJordan Crouse 
89b145c6e6SJordan Crouse 	/*
90b145c6e6SJordan Crouse 	 * If this is the last attached pagetable for the parent,
91b145c6e6SJordan Crouse 	 * disable TTBR0 in the arm-smmu driver
92b145c6e6SJordan Crouse 	 */
93b145c6e6SJordan Crouse 	if (atomic_dec_return(&iommu->pagetables) == 0)
94b145c6e6SJordan Crouse 		adreno_smmu->set_ttbr0_cfg(adreno_smmu->cookie, NULL);
95b145c6e6SJordan Crouse 
96b145c6e6SJordan Crouse 	free_io_pgtable_ops(pagetable->pgtbl_ops);
97b145c6e6SJordan Crouse 	kfree(pagetable);
98b145c6e6SJordan Crouse }
99b145c6e6SJordan Crouse 
100b145c6e6SJordan Crouse int msm_iommu_pagetable_params(struct msm_mmu *mmu,
101b145c6e6SJordan Crouse 		phys_addr_t *ttbr, int *asid)
102b145c6e6SJordan Crouse {
103b145c6e6SJordan Crouse 	struct msm_iommu_pagetable *pagetable;
104b145c6e6SJordan Crouse 
105b145c6e6SJordan Crouse 	if (mmu->type != MSM_MMU_IOMMU_PAGETABLE)
106b145c6e6SJordan Crouse 		return -EINVAL;
107b145c6e6SJordan Crouse 
108b145c6e6SJordan Crouse 	pagetable = to_pagetable(mmu);
109b145c6e6SJordan Crouse 
110b145c6e6SJordan Crouse 	if (ttbr)
111b145c6e6SJordan Crouse 		*ttbr = pagetable->ttbr;
112b145c6e6SJordan Crouse 
113b145c6e6SJordan Crouse 	if (asid)
114b145c6e6SJordan Crouse 		*asid = pagetable->asid;
115b145c6e6SJordan Crouse 
116b145c6e6SJordan Crouse 	return 0;
117b145c6e6SJordan Crouse }
118b145c6e6SJordan Crouse 
119b145c6e6SJordan Crouse static const struct msm_mmu_funcs pagetable_funcs = {
120b145c6e6SJordan Crouse 		.map = msm_iommu_pagetable_map,
121b145c6e6SJordan Crouse 		.unmap = msm_iommu_pagetable_unmap,
122b145c6e6SJordan Crouse 		.destroy = msm_iommu_pagetable_destroy,
123b145c6e6SJordan Crouse };
124b145c6e6SJordan Crouse 
125b145c6e6SJordan Crouse static void msm_iommu_tlb_flush_all(void *cookie)
126b145c6e6SJordan Crouse {
127b145c6e6SJordan Crouse }
128b145c6e6SJordan Crouse 
129b145c6e6SJordan Crouse static void msm_iommu_tlb_flush_walk(unsigned long iova, size_t size,
130b145c6e6SJordan Crouse 		size_t granule, void *cookie)
131b145c6e6SJordan Crouse {
132b145c6e6SJordan Crouse }
133b145c6e6SJordan Crouse 
134b145c6e6SJordan Crouse static void msm_iommu_tlb_add_page(struct iommu_iotlb_gather *gather,
135b145c6e6SJordan Crouse 		unsigned long iova, size_t granule, void *cookie)
136b145c6e6SJordan Crouse {
137b145c6e6SJordan Crouse }
138b145c6e6SJordan Crouse 
139b145c6e6SJordan Crouse static const struct iommu_flush_ops null_tlb_ops = {
140b145c6e6SJordan Crouse 	.tlb_flush_all = msm_iommu_tlb_flush_all,
141b145c6e6SJordan Crouse 	.tlb_flush_walk = msm_iommu_tlb_flush_walk,
142b145c6e6SJordan Crouse 	.tlb_add_page = msm_iommu_tlb_add_page,
143b145c6e6SJordan Crouse };
144b145c6e6SJordan Crouse 
145b145c6e6SJordan Crouse struct msm_mmu *msm_iommu_pagetable_create(struct msm_mmu *parent)
146b145c6e6SJordan Crouse {
147b145c6e6SJordan Crouse 	struct adreno_smmu_priv *adreno_smmu = dev_get_drvdata(parent->dev);
148b145c6e6SJordan Crouse 	struct msm_iommu *iommu = to_msm_iommu(parent);
149b145c6e6SJordan Crouse 	struct msm_iommu_pagetable *pagetable;
150b145c6e6SJordan Crouse 	const struct io_pgtable_cfg *ttbr1_cfg = NULL;
151b145c6e6SJordan Crouse 	struct io_pgtable_cfg ttbr0_cfg;
152b145c6e6SJordan Crouse 	int ret;
153b145c6e6SJordan Crouse 
154b145c6e6SJordan Crouse 	/* Get the pagetable configuration from the domain */
155b145c6e6SJordan Crouse 	if (adreno_smmu->cookie)
156b145c6e6SJordan Crouse 		ttbr1_cfg = adreno_smmu->get_ttbr1_cfg(adreno_smmu->cookie);
157b145c6e6SJordan Crouse 	if (!ttbr1_cfg)
158b145c6e6SJordan Crouse 		return ERR_PTR(-ENODEV);
159b145c6e6SJordan Crouse 
160b145c6e6SJordan Crouse 	pagetable = kzalloc(sizeof(*pagetable), GFP_KERNEL);
161b145c6e6SJordan Crouse 	if (!pagetable)
162b145c6e6SJordan Crouse 		return ERR_PTR(-ENOMEM);
163b145c6e6SJordan Crouse 
164b145c6e6SJordan Crouse 	msm_mmu_init(&pagetable->base, parent->dev, &pagetable_funcs,
165b145c6e6SJordan Crouse 		MSM_MMU_IOMMU_PAGETABLE);
166b145c6e6SJordan Crouse 
167b145c6e6SJordan Crouse 	/* Clone the TTBR1 cfg as starting point for TTBR0 cfg: */
168b145c6e6SJordan Crouse 	ttbr0_cfg = *ttbr1_cfg;
169b145c6e6SJordan Crouse 
170b145c6e6SJordan Crouse 	/* The incoming cfg will have the TTBR1 quirk enabled */
171b145c6e6SJordan Crouse 	ttbr0_cfg.quirks &= ~IO_PGTABLE_QUIRK_ARM_TTBR1;
172b145c6e6SJordan Crouse 	ttbr0_cfg.tlb = &null_tlb_ops;
173b145c6e6SJordan Crouse 
174b145c6e6SJordan Crouse 	pagetable->pgtbl_ops = alloc_io_pgtable_ops(ARM_64_LPAE_S1,
175b145c6e6SJordan Crouse 		&ttbr0_cfg, iommu->domain);
176b145c6e6SJordan Crouse 
177b145c6e6SJordan Crouse 	if (!pagetable->pgtbl_ops) {
178b145c6e6SJordan Crouse 		kfree(pagetable);
179b145c6e6SJordan Crouse 		return ERR_PTR(-ENOMEM);
180b145c6e6SJordan Crouse 	}
181b145c6e6SJordan Crouse 
182b145c6e6SJordan Crouse 	/*
183b145c6e6SJordan Crouse 	 * If this is the first pagetable that we've allocated, send it back to
184b145c6e6SJordan Crouse 	 * the arm-smmu driver as a trigger to set up TTBR0
185b145c6e6SJordan Crouse 	 */
186b145c6e6SJordan Crouse 	if (atomic_inc_return(&iommu->pagetables) == 1) {
187*e25e92e0SRob Clark 		/* Enable stall on iommu fault: */
188*e25e92e0SRob Clark 		adreno_smmu->set_stall(adreno_smmu->cookie, true);
189*e25e92e0SRob Clark 
190b145c6e6SJordan Crouse 		ret = adreno_smmu->set_ttbr0_cfg(adreno_smmu->cookie, &ttbr0_cfg);
191b145c6e6SJordan Crouse 		if (ret) {
192b145c6e6SJordan Crouse 			free_io_pgtable_ops(pagetable->pgtbl_ops);
193b145c6e6SJordan Crouse 			kfree(pagetable);
194b145c6e6SJordan Crouse 			return ERR_PTR(ret);
195b145c6e6SJordan Crouse 		}
196b145c6e6SJordan Crouse 	}
197b145c6e6SJordan Crouse 
198b145c6e6SJordan Crouse 	/* Needed later for TLB flush */
199b145c6e6SJordan Crouse 	pagetable->parent = parent;
200b145c6e6SJordan Crouse 	pagetable->ttbr = ttbr0_cfg.arm_lpae_s1_cfg.ttbr;
201b145c6e6SJordan Crouse 
202b145c6e6SJordan Crouse 	/*
203b145c6e6SJordan Crouse 	 * TODO we would like each set of page tables to have a unique ASID
20493b694d0SLinus Torvalds 	 * to optimize TLB invalidation.  But iommu_flush_iotlb_all() will
205b145c6e6SJordan Crouse 	 * end up flushing the ASID used for TTBR1 pagetables, which is not
206b145c6e6SJordan Crouse 	 * what we want.  So for now just use the same ASID as TTBR1.
207b145c6e6SJordan Crouse 	 */
208b145c6e6SJordan Crouse 	pagetable->asid = 0;
209b145c6e6SJordan Crouse 
210b145c6e6SJordan Crouse 	return &pagetable->base;
211b145c6e6SJordan Crouse }
212b145c6e6SJordan Crouse 
2137f8036b7SRob Clark static int msm_fault_handler(struct iommu_domain *domain, struct device *dev,
214871d812aSRob Clark 		unsigned long iova, int flags, void *arg)
215871d812aSRob Clark {
2167f8036b7SRob Clark 	struct msm_iommu *iommu = arg;
2172a574cc0SJordan Crouse 	struct adreno_smmu_priv *adreno_smmu = dev_get_drvdata(iommu->base.dev);
2182a574cc0SJordan Crouse 	struct adreno_smmu_fault_info info, *ptr = NULL;
2192a574cc0SJordan Crouse 
2202a574cc0SJordan Crouse 	if (adreno_smmu->get_fault_info) {
2212a574cc0SJordan Crouse 		adreno_smmu->get_fault_info(adreno_smmu->cookie, &info);
2222a574cc0SJordan Crouse 		ptr = &info;
2232a574cc0SJordan Crouse 	}
2242a574cc0SJordan Crouse 
2257f8036b7SRob Clark 	if (iommu->base.handler)
2262a574cc0SJordan Crouse 		return iommu->base.handler(iommu->base.arg, iova, flags, ptr);
2272a574cc0SJordan Crouse 
228bdad5c53SJordan Crouse 	pr_warn_ratelimited("*** fault: iova=%16lx, flags=%d\n", iova, flags);
2296814dbf9SRob Clark 	return 0;
230871d812aSRob Clark }
231871d812aSRob Clark 
232*e25e92e0SRob Clark static void msm_iommu_resume_translation(struct msm_mmu *mmu)
233*e25e92e0SRob Clark {
234*e25e92e0SRob Clark 	struct adreno_smmu_priv *adreno_smmu = dev_get_drvdata(mmu->dev);
235*e25e92e0SRob Clark 
236*e25e92e0SRob Clark 	adreno_smmu->resume_translation(adreno_smmu->cookie, true);
237*e25e92e0SRob Clark }
238*e25e92e0SRob Clark 
23953bf7f7aSDrew Davenport static void msm_iommu_detach(struct msm_mmu *mmu)
24087e956e9SStephane Viau {
24187e956e9SStephane Viau 	struct msm_iommu *iommu = to_msm_iommu(mmu);
242cc692726SRob Clark 
243944fc36cSRob Clark 	iommu_detach_device(iommu->domain, mmu->dev);
24487e956e9SStephane Viau }
24587e956e9SStephane Viau 
24678babc16SRob Clark static int msm_iommu_map(struct msm_mmu *mmu, uint64_t iova,
247fb212ad6SJordan Crouse 		struct sg_table *sgt, size_t len, int prot)
248871d812aSRob Clark {
249871d812aSRob Clark 	struct msm_iommu *iommu = to_msm_iommu(mmu);
250f9000049SRob Clark 	size_t ret;
251871d812aSRob Clark 
252e3c64c72SJordan Crouse 	/* The arm-smmu driver expects the addresses to be sign extended */
253e3c64c72SJordan Crouse 	if (iova & BIT_ULL(48))
254e3c64c72SJordan Crouse 		iova |= GENMASK_ULL(63, 49);
255e3c64c72SJordan Crouse 
2567690a33fSMarek Szyprowski 	ret = iommu_map_sgtable(iommu->domain, iova, sgt, prot);
257098336deSWen Yang 	WARN_ON(!ret);
258871d812aSRob Clark 
259f9000049SRob Clark 	return (ret == len) ? 0 : -EINVAL;
260871d812aSRob Clark }
261871d812aSRob Clark 
262fb212ad6SJordan Crouse static int msm_iommu_unmap(struct msm_mmu *mmu, uint64_t iova, size_t len)
263871d812aSRob Clark {
264871d812aSRob Clark 	struct msm_iommu *iommu = to_msm_iommu(mmu);
265871d812aSRob Clark 
266e3c64c72SJordan Crouse 	if (iova & BIT_ULL(48))
267e3c64c72SJordan Crouse 		iova |= GENMASK_ULL(63, 49);
268e3c64c72SJordan Crouse 
269f9000049SRob Clark 	iommu_unmap(iommu->domain, iova, len);
270871d812aSRob Clark 
271871d812aSRob Clark 	return 0;
272871d812aSRob Clark }
273871d812aSRob Clark 
274871d812aSRob Clark static void msm_iommu_destroy(struct msm_mmu *mmu)
275871d812aSRob Clark {
276871d812aSRob Clark 	struct msm_iommu *iommu = to_msm_iommu(mmu);
277871d812aSRob Clark 	iommu_domain_free(iommu->domain);
278871d812aSRob Clark 	kfree(iommu);
279871d812aSRob Clark }
280871d812aSRob Clark 
281871d812aSRob Clark static const struct msm_mmu_funcs funcs = {
28287e956e9SStephane Viau 		.detach = msm_iommu_detach,
283871d812aSRob Clark 		.map = msm_iommu_map,
284871d812aSRob Clark 		.unmap = msm_iommu_unmap,
285871d812aSRob Clark 		.destroy = msm_iommu_destroy,
286*e25e92e0SRob Clark 		.resume_translation = msm_iommu_resume_translation,
287871d812aSRob Clark };
288871d812aSRob Clark 
289944fc36cSRob Clark struct msm_mmu *msm_iommu_new(struct device *dev, struct iommu_domain *domain)
290871d812aSRob Clark {
291871d812aSRob Clark 	struct msm_iommu *iommu;
29252da6d51SJordan Crouse 	int ret;
293871d812aSRob Clark 
294ccac7ce3SJordan Crouse 	if (!domain)
295ccac7ce3SJordan Crouse 		return ERR_PTR(-ENODEV);
296ccac7ce3SJordan Crouse 
297871d812aSRob Clark 	iommu = kzalloc(sizeof(*iommu), GFP_KERNEL);
298871d812aSRob Clark 	if (!iommu)
299871d812aSRob Clark 		return ERR_PTR(-ENOMEM);
300871d812aSRob Clark 
301871d812aSRob Clark 	iommu->domain = domain;
302b145c6e6SJordan Crouse 	msm_mmu_init(&iommu->base, dev, &funcs, MSM_MMU_IOMMU);
3037f8036b7SRob Clark 	iommu_set_fault_handler(domain, msm_fault_handler, iommu);
304871d812aSRob Clark 
305b145c6e6SJordan Crouse 	atomic_set(&iommu->pagetables, 0);
306b145c6e6SJordan Crouse 
30752da6d51SJordan Crouse 	ret = iommu_attach_device(iommu->domain, dev);
30852da6d51SJordan Crouse 	if (ret) {
30952da6d51SJordan Crouse 		kfree(iommu);
31052da6d51SJordan Crouse 		return ERR_PTR(ret);
31152da6d51SJordan Crouse 	}
31252da6d51SJordan Crouse 
313871d812aSRob Clark 	return &iommu->base;
314871d812aSRob Clark }
315