1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Copyright (C) 2013 Red Hat 4 * Author: Rob Clark <robdclark@gmail.com> 5 */ 6 7 #include <linux/adreno-smmu-priv.h> 8 #include <linux/io-pgtable.h> 9 #include "msm_drv.h" 10 #include "msm_mmu.h" 11 12 struct msm_iommu { 13 struct msm_mmu base; 14 struct iommu_domain *domain; 15 atomic_t pagetables; 16 }; 17 18 #define to_msm_iommu(x) container_of(x, struct msm_iommu, base) 19 20 struct msm_iommu_pagetable { 21 struct msm_mmu base; 22 struct msm_mmu *parent; 23 struct io_pgtable_ops *pgtbl_ops; 24 phys_addr_t ttbr; 25 u32 asid; 26 }; 27 static struct msm_iommu_pagetable *to_pagetable(struct msm_mmu *mmu) 28 { 29 return container_of(mmu, struct msm_iommu_pagetable, base); 30 } 31 32 static int msm_iommu_pagetable_unmap(struct msm_mmu *mmu, u64 iova, 33 size_t size) 34 { 35 struct msm_iommu_pagetable *pagetable = to_pagetable(mmu); 36 struct io_pgtable_ops *ops = pagetable->pgtbl_ops; 37 size_t unmapped = 0; 38 39 /* Unmap the block one page at a time */ 40 while (size) { 41 unmapped += ops->unmap(ops, iova, 4096, NULL); 42 iova += 4096; 43 size -= 4096; 44 } 45 46 iommu_flush_iotlb_all(to_msm_iommu(pagetable->parent)->domain); 47 48 return (unmapped == size) ? 0 : -EINVAL; 49 } 50 51 static int msm_iommu_pagetable_map(struct msm_mmu *mmu, u64 iova, 52 struct sg_table *sgt, size_t len, int prot) 53 { 54 struct msm_iommu_pagetable *pagetable = to_pagetable(mmu); 55 struct io_pgtable_ops *ops = pagetable->pgtbl_ops; 56 struct scatterlist *sg; 57 size_t mapped = 0; 58 u64 addr = iova; 59 unsigned int i; 60 61 for_each_sg(sgt->sgl, sg, sgt->nents, i) { 62 size_t size = sg->length; 63 phys_addr_t phys = sg_phys(sg); 64 65 /* Map the block one page at a time */ 66 while (size) { 67 if (ops->map(ops, addr, phys, 4096, prot, GFP_KERNEL)) { 68 msm_iommu_pagetable_unmap(mmu, iova, mapped); 69 return -EINVAL; 70 } 71 72 phys += 4096; 73 addr += 4096; 74 size -= 4096; 75 mapped += 4096; 76 } 77 } 78 79 return 0; 80 } 81 82 static void msm_iommu_pagetable_destroy(struct msm_mmu *mmu) 83 { 84 struct msm_iommu_pagetable *pagetable = to_pagetable(mmu); 85 struct msm_iommu *iommu = to_msm_iommu(pagetable->parent); 86 struct adreno_smmu_priv *adreno_smmu = 87 dev_get_drvdata(pagetable->parent->dev); 88 89 /* 90 * If this is the last attached pagetable for the parent, 91 * disable TTBR0 in the arm-smmu driver 92 */ 93 if (atomic_dec_return(&iommu->pagetables) == 0) 94 adreno_smmu->set_ttbr0_cfg(adreno_smmu->cookie, NULL); 95 96 free_io_pgtable_ops(pagetable->pgtbl_ops); 97 kfree(pagetable); 98 } 99 100 int msm_iommu_pagetable_params(struct msm_mmu *mmu, 101 phys_addr_t *ttbr, int *asid) 102 { 103 struct msm_iommu_pagetable *pagetable; 104 105 if (mmu->type != MSM_MMU_IOMMU_PAGETABLE) 106 return -EINVAL; 107 108 pagetable = to_pagetable(mmu); 109 110 if (ttbr) 111 *ttbr = pagetable->ttbr; 112 113 if (asid) 114 *asid = pagetable->asid; 115 116 return 0; 117 } 118 119 static const struct msm_mmu_funcs pagetable_funcs = { 120 .map = msm_iommu_pagetable_map, 121 .unmap = msm_iommu_pagetable_unmap, 122 .destroy = msm_iommu_pagetable_destroy, 123 }; 124 125 static void msm_iommu_tlb_flush_all(void *cookie) 126 { 127 } 128 129 static void msm_iommu_tlb_flush_walk(unsigned long iova, size_t size, 130 size_t granule, void *cookie) 131 { 132 } 133 134 static void msm_iommu_tlb_add_page(struct iommu_iotlb_gather *gather, 135 unsigned long iova, size_t granule, void *cookie) 136 { 137 } 138 139 static const struct iommu_flush_ops null_tlb_ops = { 140 .tlb_flush_all = msm_iommu_tlb_flush_all, 141 .tlb_flush_walk = msm_iommu_tlb_flush_walk, 142 .tlb_add_page = msm_iommu_tlb_add_page, 143 }; 144 145 struct msm_mmu *msm_iommu_pagetable_create(struct msm_mmu *parent) 146 { 147 struct adreno_smmu_priv *adreno_smmu = dev_get_drvdata(parent->dev); 148 struct msm_iommu *iommu = to_msm_iommu(parent); 149 struct msm_iommu_pagetable *pagetable; 150 const struct io_pgtable_cfg *ttbr1_cfg = NULL; 151 struct io_pgtable_cfg ttbr0_cfg; 152 int ret; 153 154 /* Get the pagetable configuration from the domain */ 155 if (adreno_smmu->cookie) 156 ttbr1_cfg = adreno_smmu->get_ttbr1_cfg(adreno_smmu->cookie); 157 if (!ttbr1_cfg) 158 return ERR_PTR(-ENODEV); 159 160 pagetable = kzalloc(sizeof(*pagetable), GFP_KERNEL); 161 if (!pagetable) 162 return ERR_PTR(-ENOMEM); 163 164 msm_mmu_init(&pagetable->base, parent->dev, &pagetable_funcs, 165 MSM_MMU_IOMMU_PAGETABLE); 166 167 /* Clone the TTBR1 cfg as starting point for TTBR0 cfg: */ 168 ttbr0_cfg = *ttbr1_cfg; 169 170 /* The incoming cfg will have the TTBR1 quirk enabled */ 171 ttbr0_cfg.quirks &= ~IO_PGTABLE_QUIRK_ARM_TTBR1; 172 ttbr0_cfg.tlb = &null_tlb_ops; 173 174 pagetable->pgtbl_ops = alloc_io_pgtable_ops(ARM_64_LPAE_S1, 175 &ttbr0_cfg, iommu->domain); 176 177 if (!pagetable->pgtbl_ops) { 178 kfree(pagetable); 179 return ERR_PTR(-ENOMEM); 180 } 181 182 /* 183 * If this is the first pagetable that we've allocated, send it back to 184 * the arm-smmu driver as a trigger to set up TTBR0 185 */ 186 if (atomic_inc_return(&iommu->pagetables) == 1) { 187 /* Enable stall on iommu fault: */ 188 adreno_smmu->set_stall(adreno_smmu->cookie, true); 189 190 ret = adreno_smmu->set_ttbr0_cfg(adreno_smmu->cookie, &ttbr0_cfg); 191 if (ret) { 192 free_io_pgtable_ops(pagetable->pgtbl_ops); 193 kfree(pagetable); 194 return ERR_PTR(ret); 195 } 196 } 197 198 /* Needed later for TLB flush */ 199 pagetable->parent = parent; 200 pagetable->ttbr = ttbr0_cfg.arm_lpae_s1_cfg.ttbr; 201 202 /* 203 * TODO we would like each set of page tables to have a unique ASID 204 * to optimize TLB invalidation. But iommu_flush_iotlb_all() will 205 * end up flushing the ASID used for TTBR1 pagetables, which is not 206 * what we want. So for now just use the same ASID as TTBR1. 207 */ 208 pagetable->asid = 0; 209 210 return &pagetable->base; 211 } 212 213 static int msm_fault_handler(struct iommu_domain *domain, struct device *dev, 214 unsigned long iova, int flags, void *arg) 215 { 216 struct msm_iommu *iommu = arg; 217 struct adreno_smmu_priv *adreno_smmu = dev_get_drvdata(iommu->base.dev); 218 struct adreno_smmu_fault_info info, *ptr = NULL; 219 220 if (adreno_smmu->get_fault_info) { 221 adreno_smmu->get_fault_info(adreno_smmu->cookie, &info); 222 ptr = &info; 223 } 224 225 if (iommu->base.handler) 226 return iommu->base.handler(iommu->base.arg, iova, flags, ptr); 227 228 pr_warn_ratelimited("*** fault: iova=%16lx, flags=%d\n", iova, flags); 229 return 0; 230 } 231 232 static void msm_iommu_resume_translation(struct msm_mmu *mmu) 233 { 234 struct adreno_smmu_priv *adreno_smmu = dev_get_drvdata(mmu->dev); 235 236 adreno_smmu->resume_translation(adreno_smmu->cookie, true); 237 } 238 239 static void msm_iommu_detach(struct msm_mmu *mmu) 240 { 241 struct msm_iommu *iommu = to_msm_iommu(mmu); 242 243 iommu_detach_device(iommu->domain, mmu->dev); 244 } 245 246 static int msm_iommu_map(struct msm_mmu *mmu, uint64_t iova, 247 struct sg_table *sgt, size_t len, int prot) 248 { 249 struct msm_iommu *iommu = to_msm_iommu(mmu); 250 size_t ret; 251 252 /* The arm-smmu driver expects the addresses to be sign extended */ 253 if (iova & BIT_ULL(48)) 254 iova |= GENMASK_ULL(63, 49); 255 256 ret = iommu_map_sgtable(iommu->domain, iova, sgt, prot); 257 WARN_ON(!ret); 258 259 return (ret == len) ? 0 : -EINVAL; 260 } 261 262 static int msm_iommu_unmap(struct msm_mmu *mmu, uint64_t iova, size_t len) 263 { 264 struct msm_iommu *iommu = to_msm_iommu(mmu); 265 266 if (iova & BIT_ULL(48)) 267 iova |= GENMASK_ULL(63, 49); 268 269 iommu_unmap(iommu->domain, iova, len); 270 271 return 0; 272 } 273 274 static void msm_iommu_destroy(struct msm_mmu *mmu) 275 { 276 struct msm_iommu *iommu = to_msm_iommu(mmu); 277 iommu_domain_free(iommu->domain); 278 kfree(iommu); 279 } 280 281 static const struct msm_mmu_funcs funcs = { 282 .detach = msm_iommu_detach, 283 .map = msm_iommu_map, 284 .unmap = msm_iommu_unmap, 285 .destroy = msm_iommu_destroy, 286 .resume_translation = msm_iommu_resume_translation, 287 }; 288 289 struct msm_mmu *msm_iommu_new(struct device *dev, struct iommu_domain *domain) 290 { 291 struct msm_iommu *iommu; 292 int ret; 293 294 if (!domain) 295 return ERR_PTR(-ENODEV); 296 297 iommu = kzalloc(sizeof(*iommu), GFP_KERNEL); 298 if (!iommu) 299 return ERR_PTR(-ENOMEM); 300 301 iommu->domain = domain; 302 msm_mmu_init(&iommu->base, dev, &funcs, MSM_MMU_IOMMU); 303 iommu_set_fault_handler(domain, msm_fault_handler, iommu); 304 305 atomic_set(&iommu->pagetables, 0); 306 307 ret = iommu_attach_device(iommu->domain, dev); 308 if (ret) { 309 kfree(iommu); 310 return ERR_PTR(ret); 311 } 312 313 return &iommu->base; 314 } 315