]> git.ipfire.org Git - thirdparty/kernel/stable.git/blame - drivers/iommu/arm-smmu.c
iommu/arm-smmu: Wire up generic configuration support
[thirdparty/kernel/stable.git] / drivers / iommu / arm-smmu.c
CommitLineData
45ae7cff
WD
1/*
2 * IOMMU API for ARM architected SMMU implementations.
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this program; if not, write to the Free Software
15 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
16 *
17 * Copyright (C) 2013 ARM Limited
18 *
19 * Author: Will Deacon <will.deacon@arm.com>
20 *
21 * This driver currently supports:
22 * - SMMUv1 and v2 implementations
23 * - Stream-matching and stream-indexing
24 * - v7/v8 long-descriptor format
25 * - Non-secure access to the SMMU
45ae7cff
WD
26 * - Context fault reporting
27 */
28
29#define pr_fmt(fmt) "arm-smmu: " fmt
30
1f3d5ca4 31#include <linux/atomic.h>
45ae7cff 32#include <linux/delay.h>
9adb9594 33#include <linux/dma-iommu.h>
45ae7cff
WD
34#include <linux/dma-mapping.h>
35#include <linux/err.h>
36#include <linux/interrupt.h>
37#include <linux/io.h>
f9a05f05 38#include <linux/io-64-nonatomic-hi-lo.h>
45ae7cff 39#include <linux/iommu.h>
859a732e 40#include <linux/iopoll.h>
45ae7cff
WD
41#include <linux/module.h>
42#include <linux/of.h>
bae2c2d4 43#include <linux/of_address.h>
d6fc5d97 44#include <linux/of_device.h>
adfec2e7 45#include <linux/of_iommu.h>
a9a1b0b5 46#include <linux/pci.h>
45ae7cff
WD
47#include <linux/platform_device.h>
48#include <linux/slab.h>
49#include <linux/spinlock.h>
50
51#include <linux/amba/bus.h>
52
518f7136 53#include "io-pgtable.h"
45ae7cff 54
45ae7cff
WD
55/* Maximum number of context banks per SMMU */
56#define ARM_SMMU_MAX_CBS 128
57
45ae7cff
WD
58/* SMMU global address space */
59#define ARM_SMMU_GR0(smmu) ((smmu)->base)
c757e852 60#define ARM_SMMU_GR1(smmu) ((smmu)->base + (1 << (smmu)->pgshift))
45ae7cff 61
3a5df8ff
AH
62/*
63 * SMMU global address space with conditional offset to access secure
64 * aliases of non-secure registers (e.g. nsCR0: 0x400, nsGFSR: 0x448,
65 * nsGFSYNR0: 0x450)
66 */
67#define ARM_SMMU_GR0_NS(smmu) \
68 ((smmu)->base + \
69 ((smmu->options & ARM_SMMU_OPT_SECURE_CFG_ACCESS) \
70 ? 0x400 : 0))
71
f9a05f05
RM
72/*
73 * Some 64-bit registers only make sense to write atomically, but in such
74 * cases all the data relevant to AArch32 formats lies within the lower word,
75 * therefore this actually makes more sense than it might first appear.
76 */
668b4ada 77#ifdef CONFIG_64BIT
f9a05f05 78#define smmu_write_atomic_lq writeq_relaxed
668b4ada 79#else
f9a05f05 80#define smmu_write_atomic_lq writel_relaxed
668b4ada
TC
81#endif
82
45ae7cff
WD
83/* Configuration registers */
84#define ARM_SMMU_GR0_sCR0 0x0
85#define sCR0_CLIENTPD (1 << 0)
86#define sCR0_GFRE (1 << 1)
87#define sCR0_GFIE (1 << 2)
88#define sCR0_GCFGFRE (1 << 4)
89#define sCR0_GCFGFIE (1 << 5)
90#define sCR0_USFCFG (1 << 10)
91#define sCR0_VMIDPNE (1 << 11)
92#define sCR0_PTM (1 << 12)
93#define sCR0_FB (1 << 13)
4e3e9b69 94#define sCR0_VMID16EN (1 << 31)
45ae7cff
WD
95#define sCR0_BSU_SHIFT 14
96#define sCR0_BSU_MASK 0x3
97
3ca3712a
PF
98/* Auxiliary Configuration register */
99#define ARM_SMMU_GR0_sACR 0x10
100
45ae7cff
WD
101/* Identification registers */
102#define ARM_SMMU_GR0_ID0 0x20
103#define ARM_SMMU_GR0_ID1 0x24
104#define ARM_SMMU_GR0_ID2 0x28
105#define ARM_SMMU_GR0_ID3 0x2c
106#define ARM_SMMU_GR0_ID4 0x30
107#define ARM_SMMU_GR0_ID5 0x34
108#define ARM_SMMU_GR0_ID6 0x38
109#define ARM_SMMU_GR0_ID7 0x3c
110#define ARM_SMMU_GR0_sGFSR 0x48
111#define ARM_SMMU_GR0_sGFSYNR0 0x50
112#define ARM_SMMU_GR0_sGFSYNR1 0x54
113#define ARM_SMMU_GR0_sGFSYNR2 0x58
45ae7cff
WD
114
115#define ID0_S1TS (1 << 30)
116#define ID0_S2TS (1 << 29)
117#define ID0_NTS (1 << 28)
118#define ID0_SMS (1 << 27)
859a732e 119#define ID0_ATOSNS (1 << 26)
7602b871
RM
120#define ID0_PTFS_NO_AARCH32 (1 << 25)
121#define ID0_PTFS_NO_AARCH32S (1 << 24)
45ae7cff
WD
122#define ID0_CTTW (1 << 14)
123#define ID0_NUMIRPT_SHIFT 16
124#define ID0_NUMIRPT_MASK 0xff
3c8766d0
OH
125#define ID0_NUMSIDB_SHIFT 9
126#define ID0_NUMSIDB_MASK 0xf
45ae7cff
WD
127#define ID0_NUMSMRG_SHIFT 0
128#define ID0_NUMSMRG_MASK 0xff
129
130#define ID1_PAGESIZE (1 << 31)
131#define ID1_NUMPAGENDXB_SHIFT 28
132#define ID1_NUMPAGENDXB_MASK 7
133#define ID1_NUMS2CB_SHIFT 16
134#define ID1_NUMS2CB_MASK 0xff
135#define ID1_NUMCB_SHIFT 0
136#define ID1_NUMCB_MASK 0xff
137
138#define ID2_OAS_SHIFT 4
139#define ID2_OAS_MASK 0xf
140#define ID2_IAS_SHIFT 0
141#define ID2_IAS_MASK 0xf
142#define ID2_UBS_SHIFT 8
143#define ID2_UBS_MASK 0xf
144#define ID2_PTFS_4K (1 << 12)
145#define ID2_PTFS_16K (1 << 13)
146#define ID2_PTFS_64K (1 << 14)
4e3e9b69 147#define ID2_VMID16 (1 << 15)
45ae7cff 148
3ca3712a
PF
149#define ID7_MAJOR_SHIFT 4
150#define ID7_MAJOR_MASK 0xf
45ae7cff 151
45ae7cff 152/* Global TLB invalidation */
45ae7cff
WD
153#define ARM_SMMU_GR0_TLBIVMID 0x64
154#define ARM_SMMU_GR0_TLBIALLNSNH 0x68
155#define ARM_SMMU_GR0_TLBIALLH 0x6c
156#define ARM_SMMU_GR0_sTLBGSYNC 0x70
157#define ARM_SMMU_GR0_sTLBGSTATUS 0x74
158#define sTLBGSTATUS_GSACTIVE (1 << 0)
159#define TLB_LOOP_TIMEOUT 1000000 /* 1s! */
160
161/* Stream mapping registers */
162#define ARM_SMMU_GR0_SMR(n) (0x800 + ((n) << 2))
163#define SMR_VALID (1 << 31)
164#define SMR_MASK_SHIFT 16
45ae7cff 165#define SMR_ID_SHIFT 0
45ae7cff
WD
166
167#define ARM_SMMU_GR0_S2CR(n) (0xc00 + ((n) << 2))
168#define S2CR_CBNDX_SHIFT 0
169#define S2CR_CBNDX_MASK 0xff
170#define S2CR_TYPE_SHIFT 16
171#define S2CR_TYPE_MASK 0x3
8e8b203e
RM
172enum arm_smmu_s2cr_type {
173 S2CR_TYPE_TRANS,
174 S2CR_TYPE_BYPASS,
175 S2CR_TYPE_FAULT,
176};
45ae7cff 177
d346180e 178#define S2CR_PRIVCFG_SHIFT 24
8e8b203e
RM
179#define S2CR_PRIVCFG_MASK 0x3
180enum arm_smmu_s2cr_privcfg {
181 S2CR_PRIVCFG_DEFAULT,
182 S2CR_PRIVCFG_DIPAN,
183 S2CR_PRIVCFG_UNPRIV,
184 S2CR_PRIVCFG_PRIV,
185};
d346180e 186
45ae7cff
WD
187/* Context bank attribute registers */
188#define ARM_SMMU_GR1_CBAR(n) (0x0 + ((n) << 2))
189#define CBAR_VMID_SHIFT 0
190#define CBAR_VMID_MASK 0xff
57ca90f6
WD
191#define CBAR_S1_BPSHCFG_SHIFT 8
192#define CBAR_S1_BPSHCFG_MASK 3
193#define CBAR_S1_BPSHCFG_NSH 3
45ae7cff
WD
194#define CBAR_S1_MEMATTR_SHIFT 12
195#define CBAR_S1_MEMATTR_MASK 0xf
196#define CBAR_S1_MEMATTR_WB 0xf
197#define CBAR_TYPE_SHIFT 16
198#define CBAR_TYPE_MASK 0x3
199#define CBAR_TYPE_S2_TRANS (0 << CBAR_TYPE_SHIFT)
200#define CBAR_TYPE_S1_TRANS_S2_BYPASS (1 << CBAR_TYPE_SHIFT)
201#define CBAR_TYPE_S1_TRANS_S2_FAULT (2 << CBAR_TYPE_SHIFT)
202#define CBAR_TYPE_S1_TRANS_S2_TRANS (3 << CBAR_TYPE_SHIFT)
203#define CBAR_IRPTNDX_SHIFT 24
204#define CBAR_IRPTNDX_MASK 0xff
205
206#define ARM_SMMU_GR1_CBA2R(n) (0x800 + ((n) << 2))
207#define CBA2R_RW64_32BIT (0 << 0)
208#define CBA2R_RW64_64BIT (1 << 0)
4e3e9b69
TC
209#define CBA2R_VMID_SHIFT 16
210#define CBA2R_VMID_MASK 0xffff
45ae7cff
WD
211
212/* Translation context bank */
213#define ARM_SMMU_CB_BASE(smmu) ((smmu)->base + ((smmu)->size >> 1))
c757e852 214#define ARM_SMMU_CB(smmu, n) ((n) * (1 << (smmu)->pgshift))
45ae7cff
WD
215
216#define ARM_SMMU_CB_SCTLR 0x0
f0cfffc4 217#define ARM_SMMU_CB_ACTLR 0x4
45ae7cff
WD
218#define ARM_SMMU_CB_RESUME 0x8
219#define ARM_SMMU_CB_TTBCR2 0x10
668b4ada
TC
220#define ARM_SMMU_CB_TTBR0 0x20
221#define ARM_SMMU_CB_TTBR1 0x28
45ae7cff 222#define ARM_SMMU_CB_TTBCR 0x30
6070529b 223#define ARM_SMMU_CB_CONTEXTIDR 0x34
45ae7cff 224#define ARM_SMMU_CB_S1_MAIR0 0x38
518f7136 225#define ARM_SMMU_CB_S1_MAIR1 0x3c
f9a05f05 226#define ARM_SMMU_CB_PAR 0x50
45ae7cff 227#define ARM_SMMU_CB_FSR 0x58
f9a05f05 228#define ARM_SMMU_CB_FAR 0x60
45ae7cff 229#define ARM_SMMU_CB_FSYNR0 0x68
518f7136 230#define ARM_SMMU_CB_S1_TLBIVA 0x600
1463fe44 231#define ARM_SMMU_CB_S1_TLBIASID 0x610
518f7136
WD
232#define ARM_SMMU_CB_S1_TLBIVAL 0x620
233#define ARM_SMMU_CB_S2_TLBIIPAS2 0x630
234#define ARM_SMMU_CB_S2_TLBIIPAS2L 0x638
661d962f 235#define ARM_SMMU_CB_ATS1PR 0x800
859a732e 236#define ARM_SMMU_CB_ATSR 0x8f0
45ae7cff
WD
237
238#define SCTLR_S1_ASIDPNE (1 << 12)
239#define SCTLR_CFCFG (1 << 7)
240#define SCTLR_CFIE (1 << 6)
241#define SCTLR_CFRE (1 << 5)
242#define SCTLR_E (1 << 4)
243#define SCTLR_AFE (1 << 2)
244#define SCTLR_TRE (1 << 1)
245#define SCTLR_M (1 << 0)
45ae7cff 246
f0cfffc4
RM
247#define ARM_MMU500_ACTLR_CPRE (1 << 1)
248
3ca3712a
PF
249#define ARM_MMU500_ACR_CACHE_LOCK (1 << 26)
250
859a732e
MH
251#define CB_PAR_F (1 << 0)
252
253#define ATSR_ACTIVE (1 << 0)
254
45ae7cff
WD
255#define RESUME_RETRY (0 << 0)
256#define RESUME_TERMINATE (1 << 0)
257
45ae7cff 258#define TTBCR2_SEP_SHIFT 15
5dc5616e 259#define TTBCR2_SEP_UPSTREAM (0x7 << TTBCR2_SEP_SHIFT)
45ae7cff 260
668b4ada 261#define TTBRn_ASID_SHIFT 48
45ae7cff
WD
262
263#define FSR_MULTI (1 << 31)
264#define FSR_SS (1 << 30)
265#define FSR_UUT (1 << 8)
266#define FSR_ASF (1 << 7)
267#define FSR_TLBLKF (1 << 6)
268#define FSR_TLBMCF (1 << 5)
269#define FSR_EF (1 << 4)
270#define FSR_PF (1 << 3)
271#define FSR_AFF (1 << 2)
272#define FSR_TF (1 << 1)
273
2907320d
MH
274#define FSR_IGN (FSR_AFF | FSR_ASF | \
275 FSR_TLBMCF | FSR_TLBLKF)
276#define FSR_FAULT (FSR_MULTI | FSR_SS | FSR_UUT | \
adaba320 277 FSR_EF | FSR_PF | FSR_TF | FSR_IGN)
45ae7cff
WD
278
279#define FSYNR0_WNR (1 << 4)
280
4cf740b0 281static int force_stage;
25a1c96c 282module_param(force_stage, int, S_IRUGO);
4cf740b0
WD
283MODULE_PARM_DESC(force_stage,
284 "Force SMMU mappings to be installed at a particular stage of translation. A value of '1' or '2' forces the corresponding stage. All other values are ignored (i.e. no stage is forced). Note that selecting a specific stage will disable support for nested translation.");
25a1c96c
RM
285static bool disable_bypass;
286module_param(disable_bypass, bool, S_IRUGO);
287MODULE_PARM_DESC(disable_bypass,
288 "Disable bypass streams such that incoming transactions from devices that are not attached to an iommu domain will report an abort back to the device and will not be allowed to pass through the SMMU.");
4cf740b0 289
09360403 290enum arm_smmu_arch_version {
b7862e35
RM
291 ARM_SMMU_V1,
292 ARM_SMMU_V1_64K,
09360403
RM
293 ARM_SMMU_V2,
294};
295
67b65a3f
RM
296enum arm_smmu_implementation {
297 GENERIC_SMMU,
f0cfffc4 298 ARM_MMU500,
e086d912 299 CAVIUM_SMMUV2,
67b65a3f
RM
300};
301
8e8b203e 302struct arm_smmu_s2cr {
588888a7
RM
303 struct iommu_group *group;
304 int count;
8e8b203e
RM
305 enum arm_smmu_s2cr_type type;
306 enum arm_smmu_s2cr_privcfg privcfg;
307 u8 cbndx;
308};
309
310#define s2cr_init_val (struct arm_smmu_s2cr){ \
311 .type = disable_bypass ? S2CR_TYPE_FAULT : S2CR_TYPE_BYPASS, \
312}
313
45ae7cff 314struct arm_smmu_smr {
45ae7cff
WD
315 u16 mask;
316 u16 id;
1f3d5ca4 317 bool valid;
45ae7cff
WD
318};
319
a9a1b0b5 320struct arm_smmu_master_cfg {
f80cd885 321 struct arm_smmu_device *smmu;
adfec2e7 322 s16 smendx[];
45ae7cff 323};
1f3d5ca4 324#define INVALID_SMENDX -1
adfec2e7
RM
325#define __fwspec_cfg(fw) ((struct arm_smmu_master_cfg *)fw->iommu_priv)
326#define fwspec_smmu(fw) (__fwspec_cfg(fw)->smmu)
327#define for_each_cfg_sme(fw, i, idx) \
328 for (i = 0; idx = __fwspec_cfg(fw)->smendx[i], i < fw->num_ids; ++i)
45ae7cff
WD
329
330struct arm_smmu_device {
331 struct device *dev;
45ae7cff
WD
332
333 void __iomem *base;
334 unsigned long size;
c757e852 335 unsigned long pgshift;
45ae7cff
WD
336
337#define ARM_SMMU_FEAT_COHERENT_WALK (1 << 0)
338#define ARM_SMMU_FEAT_STREAM_MATCH (1 << 1)
339#define ARM_SMMU_FEAT_TRANS_S1 (1 << 2)
340#define ARM_SMMU_FEAT_TRANS_S2 (1 << 3)
341#define ARM_SMMU_FEAT_TRANS_NESTED (1 << 4)
859a732e 342#define ARM_SMMU_FEAT_TRANS_OPS (1 << 5)
4e3e9b69 343#define ARM_SMMU_FEAT_VMID16 (1 << 6)
7602b871
RM
344#define ARM_SMMU_FEAT_FMT_AARCH64_4K (1 << 7)
345#define ARM_SMMU_FEAT_FMT_AARCH64_16K (1 << 8)
346#define ARM_SMMU_FEAT_FMT_AARCH64_64K (1 << 9)
347#define ARM_SMMU_FEAT_FMT_AARCH32_L (1 << 10)
348#define ARM_SMMU_FEAT_FMT_AARCH32_S (1 << 11)
45ae7cff 349 u32 features;
3a5df8ff
AH
350
351#define ARM_SMMU_OPT_SECURE_CFG_ACCESS (1 << 0)
352 u32 options;
09360403 353 enum arm_smmu_arch_version version;
67b65a3f 354 enum arm_smmu_implementation model;
45ae7cff
WD
355
356 u32 num_context_banks;
357 u32 num_s2_context_banks;
358 DECLARE_BITMAP(context_map, ARM_SMMU_MAX_CBS);
359 atomic_t irptndx;
360
361 u32 num_mapping_groups;
21174240
RM
362 u16 streamid_mask;
363 u16 smr_mask_mask;
1f3d5ca4 364 struct arm_smmu_smr *smrs;
8e8b203e 365 struct arm_smmu_s2cr *s2crs;
588888a7 366 struct mutex stream_map_mutex;
45ae7cff 367
518f7136
WD
368 unsigned long va_size;
369 unsigned long ipa_size;
370 unsigned long pa_size;
d5466357 371 unsigned long pgsize_bitmap;
45ae7cff
WD
372
373 u32 num_global_irqs;
374 u32 num_context_irqs;
375 unsigned int *irqs;
376
1bd37a68 377 u32 cavium_id_base; /* Specific to Cavium */
45ae7cff
WD
378};
379
7602b871
RM
380enum arm_smmu_context_fmt {
381 ARM_SMMU_CTX_FMT_NONE,
382 ARM_SMMU_CTX_FMT_AARCH64,
383 ARM_SMMU_CTX_FMT_AARCH32_L,
384 ARM_SMMU_CTX_FMT_AARCH32_S,
45ae7cff
WD
385};
386
387struct arm_smmu_cfg {
45ae7cff
WD
388 u8 cbndx;
389 u8 irptndx;
390 u32 cbar;
7602b871 391 enum arm_smmu_context_fmt fmt;
45ae7cff 392};
faea13b7 393#define INVALID_IRPTNDX 0xff
45ae7cff 394
1bd37a68
TC
395#define ARM_SMMU_CB_ASID(smmu, cfg) ((u16)(smmu)->cavium_id_base + (cfg)->cbndx)
396#define ARM_SMMU_CB_VMID(smmu, cfg) ((u16)(smmu)->cavium_id_base + (cfg)->cbndx + 1)
ecfadb6e 397
c752ce45
WD
398enum arm_smmu_domain_stage {
399 ARM_SMMU_DOMAIN_S1 = 0,
400 ARM_SMMU_DOMAIN_S2,
401 ARM_SMMU_DOMAIN_NESTED,
402};
403
45ae7cff 404struct arm_smmu_domain {
44680eed 405 struct arm_smmu_device *smmu;
518f7136
WD
406 struct io_pgtable_ops *pgtbl_ops;
407 spinlock_t pgtbl_lock;
44680eed 408 struct arm_smmu_cfg cfg;
c752ce45 409 enum arm_smmu_domain_stage stage;
518f7136 410 struct mutex init_mutex; /* Protects smmu pointer */
1d672638 411 struct iommu_domain domain;
45ae7cff
WD
412};
413
3a5df8ff
AH
414struct arm_smmu_option_prop {
415 u32 opt;
416 const char *prop;
417};
418
1bd37a68
TC
419static atomic_t cavium_smmu_context_count = ATOMIC_INIT(0);
420
021bb842
RM
421static bool using_legacy_binding, using_generic_binding;
422
2907320d 423static struct arm_smmu_option_prop arm_smmu_options[] = {
3a5df8ff
AH
424 { ARM_SMMU_OPT_SECURE_CFG_ACCESS, "calxeda,smmu-secure-config-access" },
425 { 0, NULL},
426};
427
1d672638
JR
428static struct arm_smmu_domain *to_smmu_domain(struct iommu_domain *dom)
429{
430 return container_of(dom, struct arm_smmu_domain, domain);
431}
432
3a5df8ff
AH
433static void parse_driver_options(struct arm_smmu_device *smmu)
434{
435 int i = 0;
2907320d 436
3a5df8ff
AH
437 do {
438 if (of_property_read_bool(smmu->dev->of_node,
439 arm_smmu_options[i].prop)) {
440 smmu->options |= arm_smmu_options[i].opt;
441 dev_notice(smmu->dev, "option %s\n",
442 arm_smmu_options[i].prop);
443 }
444 } while (arm_smmu_options[++i].opt);
445}
446
8f68f8e2 447static struct device_node *dev_get_dev_node(struct device *dev)
a9a1b0b5
WD
448{
449 if (dev_is_pci(dev)) {
450 struct pci_bus *bus = to_pci_dev(dev)->bus;
2907320d 451
a9a1b0b5
WD
452 while (!pci_is_root_bus(bus))
453 bus = bus->parent;
f80cd885 454 return of_node_get(bus->bridge->parent->of_node);
a9a1b0b5
WD
455 }
456
f80cd885 457 return of_node_get(dev->of_node);
a9a1b0b5
WD
458}
459
f80cd885 460static int __arm_smmu_get_pci_sid(struct pci_dev *pdev, u16 alias, void *data)
45ae7cff 461{
f80cd885
RM
462 *((__be32 *)data) = cpu_to_be32(alias);
463 return 0; /* Continue walking */
45ae7cff
WD
464}
465
f80cd885 466static int __find_legacy_master_phandle(struct device *dev, void *data)
a9a1b0b5 467{
f80cd885
RM
468 struct of_phandle_iterator *it = *(void **)data;
469 struct device_node *np = it->node;
470 int err;
471
472 of_for_each_phandle(it, err, dev->of_node, "mmu-masters",
473 "#stream-id-cells", 0)
474 if (it->node == np) {
475 *(void **)data = dev;
476 return 1;
477 }
478 it->node = np;
479 return err == -ENOENT ? 0 : err;
a9a1b0b5
WD
480}
481
d6fc5d97 482static struct platform_driver arm_smmu_driver;
adfec2e7 483static struct iommu_ops arm_smmu_ops;
d6fc5d97 484
adfec2e7
RM
485static int arm_smmu_register_legacy_master(struct device *dev,
486 struct arm_smmu_device **smmu)
45ae7cff 487{
adfec2e7 488 struct device *smmu_dev;
f80cd885
RM
489 struct device_node *np;
490 struct of_phandle_iterator it;
491 void *data = &it;
adfec2e7 492 u32 *sids;
f80cd885
RM
493 __be32 pci_sid;
494 int err;
45ae7cff 495
f80cd885
RM
496 np = dev_get_dev_node(dev);
497 if (!np || !of_find_property(np, "#stream-id-cells", NULL)) {
498 of_node_put(np);
499 return -ENODEV;
500 }
45ae7cff 501
f80cd885 502 it.node = np;
d6fc5d97
RM
503 err = driver_for_each_device(&arm_smmu_driver.driver, NULL, &data,
504 __find_legacy_master_phandle);
adfec2e7 505 smmu_dev = data;
f80cd885
RM
506 of_node_put(np);
507 if (err == 0)
508 return -ENODEV;
509 if (err < 0)
510 return err;
45ae7cff 511
f80cd885
RM
512 if (dev_is_pci(dev)) {
513 /* "mmu-masters" assumes Stream ID == Requester ID */
514 pci_for_each_dma_alias(to_pci_dev(dev), __arm_smmu_get_pci_sid,
515 &pci_sid);
516 it.cur = &pci_sid;
517 it.cur_count = 1;
518 }
45ae7cff 519
adfec2e7
RM
520 err = iommu_fwspec_init(dev, &smmu_dev->of_node->fwnode,
521 &arm_smmu_ops);
522 if (err)
523 return err;
45ae7cff 524
adfec2e7
RM
525 sids = kcalloc(it.cur_count, sizeof(*sids), GFP_KERNEL);
526 if (!sids)
527 return -ENOMEM;
44680eed 528
adfec2e7
RM
529 *smmu = dev_get_drvdata(smmu_dev);
530 of_phandle_iterator_args(&it, sids, it.cur_count);
531 err = iommu_fwspec_add_ids(dev, sids, it.cur_count);
532 kfree(sids);
533 return err;
45ae7cff
WD
534}
535
536static int __arm_smmu_alloc_bitmap(unsigned long *map, int start, int end)
537{
538 int idx;
539
540 do {
541 idx = find_next_zero_bit(map, end, start);
542 if (idx == end)
543 return -ENOSPC;
544 } while (test_and_set_bit(idx, map));
545
546 return idx;
547}
548
549static void __arm_smmu_free_bitmap(unsigned long *map, int idx)
550{
551 clear_bit(idx, map);
552}
553
554/* Wait for any pending TLB invalidations to complete */
518f7136 555static void __arm_smmu_tlb_sync(struct arm_smmu_device *smmu)
45ae7cff
WD
556{
557 int count = 0;
558 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
559
560 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_sTLBGSYNC);
561 while (readl_relaxed(gr0_base + ARM_SMMU_GR0_sTLBGSTATUS)
562 & sTLBGSTATUS_GSACTIVE) {
563 cpu_relax();
564 if (++count == TLB_LOOP_TIMEOUT) {
565 dev_err_ratelimited(smmu->dev,
566 "TLB sync timed out -- SMMU may be deadlocked\n");
567 return;
568 }
569 udelay(1);
570 }
571}
572
518f7136
WD
573static void arm_smmu_tlb_sync(void *cookie)
574{
575 struct arm_smmu_domain *smmu_domain = cookie;
576 __arm_smmu_tlb_sync(smmu_domain->smmu);
577}
578
579static void arm_smmu_tlb_inv_context(void *cookie)
1463fe44 580{
518f7136 581 struct arm_smmu_domain *smmu_domain = cookie;
44680eed
WD
582 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
583 struct arm_smmu_device *smmu = smmu_domain->smmu;
1463fe44 584 bool stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
518f7136 585 void __iomem *base;
1463fe44
WD
586
587 if (stage1) {
588 base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
1bd37a68 589 writel_relaxed(ARM_SMMU_CB_ASID(smmu, cfg),
ecfadb6e 590 base + ARM_SMMU_CB_S1_TLBIASID);
1463fe44
WD
591 } else {
592 base = ARM_SMMU_GR0(smmu);
1bd37a68 593 writel_relaxed(ARM_SMMU_CB_VMID(smmu, cfg),
ecfadb6e 594 base + ARM_SMMU_GR0_TLBIVMID);
1463fe44
WD
595 }
596
518f7136
WD
597 __arm_smmu_tlb_sync(smmu);
598}
599
600static void arm_smmu_tlb_inv_range_nosync(unsigned long iova, size_t size,
06c610e8 601 size_t granule, bool leaf, void *cookie)
518f7136
WD
602{
603 struct arm_smmu_domain *smmu_domain = cookie;
604 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
605 struct arm_smmu_device *smmu = smmu_domain->smmu;
606 bool stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
607 void __iomem *reg;
608
609 if (stage1) {
610 reg = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
611 reg += leaf ? ARM_SMMU_CB_S1_TLBIVAL : ARM_SMMU_CB_S1_TLBIVA;
612
7602b871 613 if (cfg->fmt != ARM_SMMU_CTX_FMT_AARCH64) {
518f7136 614 iova &= ~12UL;
1bd37a68 615 iova |= ARM_SMMU_CB_ASID(smmu, cfg);
75df1386
RM
616 do {
617 writel_relaxed(iova, reg);
618 iova += granule;
619 } while (size -= granule);
518f7136
WD
620 } else {
621 iova >>= 12;
1bd37a68 622 iova |= (u64)ARM_SMMU_CB_ASID(smmu, cfg) << 48;
75df1386
RM
623 do {
624 writeq_relaxed(iova, reg);
625 iova += granule >> 12;
626 } while (size -= granule);
518f7136 627 }
518f7136
WD
628 } else if (smmu->version == ARM_SMMU_V2) {
629 reg = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
630 reg += leaf ? ARM_SMMU_CB_S2_TLBIIPAS2L :
631 ARM_SMMU_CB_S2_TLBIIPAS2;
75df1386
RM
632 iova >>= 12;
633 do {
f9a05f05 634 smmu_write_atomic_lq(iova, reg);
75df1386
RM
635 iova += granule >> 12;
636 } while (size -= granule);
518f7136
WD
637 } else {
638 reg = ARM_SMMU_GR0(smmu) + ARM_SMMU_GR0_TLBIVMID;
1bd37a68 639 writel_relaxed(ARM_SMMU_CB_VMID(smmu, cfg), reg);
518f7136
WD
640 }
641}
642
518f7136
WD
643static struct iommu_gather_ops arm_smmu_gather_ops = {
644 .tlb_flush_all = arm_smmu_tlb_inv_context,
645 .tlb_add_flush = arm_smmu_tlb_inv_range_nosync,
646 .tlb_sync = arm_smmu_tlb_sync,
518f7136
WD
647};
648
45ae7cff
WD
649static irqreturn_t arm_smmu_context_fault(int irq, void *dev)
650{
3714ce1d 651 u32 fsr, fsynr;
45ae7cff
WD
652 unsigned long iova;
653 struct iommu_domain *domain = dev;
1d672638 654 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
44680eed
WD
655 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
656 struct arm_smmu_device *smmu = smmu_domain->smmu;
45ae7cff
WD
657 void __iomem *cb_base;
658
44680eed 659 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
45ae7cff
WD
660 fsr = readl_relaxed(cb_base + ARM_SMMU_CB_FSR);
661
662 if (!(fsr & FSR_FAULT))
663 return IRQ_NONE;
664
45ae7cff 665 fsynr = readl_relaxed(cb_base + ARM_SMMU_CB_FSYNR0);
f9a05f05 666 iova = readq_relaxed(cb_base + ARM_SMMU_CB_FAR);
45ae7cff 667
3714ce1d
WD
668 dev_err_ratelimited(smmu->dev,
669 "Unhandled context fault: fsr=0x%x, iova=0x%08lx, fsynr=0x%x, cb=%d\n",
670 fsr, iova, fsynr, cfg->cbndx);
45ae7cff 671
3714ce1d
WD
672 writel(fsr, cb_base + ARM_SMMU_CB_FSR);
673 return IRQ_HANDLED;
45ae7cff
WD
674}
675
676static irqreturn_t arm_smmu_global_fault(int irq, void *dev)
677{
678 u32 gfsr, gfsynr0, gfsynr1, gfsynr2;
679 struct arm_smmu_device *smmu = dev;
3a5df8ff 680 void __iomem *gr0_base = ARM_SMMU_GR0_NS(smmu);
45ae7cff
WD
681
682 gfsr = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSR);
683 gfsynr0 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR0);
684 gfsynr1 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR1);
685 gfsynr2 = readl_relaxed(gr0_base + ARM_SMMU_GR0_sGFSYNR2);
686
3a5df8ff
AH
687 if (!gfsr)
688 return IRQ_NONE;
689
45ae7cff
WD
690 dev_err_ratelimited(smmu->dev,
691 "Unexpected global fault, this could be serious\n");
692 dev_err_ratelimited(smmu->dev,
693 "\tGFSR 0x%08x, GFSYNR0 0x%08x, GFSYNR1 0x%08x, GFSYNR2 0x%08x\n",
694 gfsr, gfsynr0, gfsynr1, gfsynr2);
695
696 writel(gfsr, gr0_base + ARM_SMMU_GR0_sGFSR);
adaba320 697 return IRQ_HANDLED;
45ae7cff
WD
698}
699
518f7136
WD
700static void arm_smmu_init_context_bank(struct arm_smmu_domain *smmu_domain,
701 struct io_pgtable_cfg *pgtbl_cfg)
45ae7cff 702{
6070529b 703 u32 reg, reg2;
668b4ada 704 u64 reg64;
45ae7cff 705 bool stage1;
44680eed
WD
706 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
707 struct arm_smmu_device *smmu = smmu_domain->smmu;
c88ae5de 708 void __iomem *cb_base, *gr1_base;
45ae7cff 709
45ae7cff 710 gr1_base = ARM_SMMU_GR1(smmu);
44680eed
WD
711 stage1 = cfg->cbar != CBAR_TYPE_S2_TRANS;
712 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
45ae7cff 713
4a1c93cb 714 if (smmu->version > ARM_SMMU_V1) {
7602b871
RM
715 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH64)
716 reg = CBA2R_RW64_64BIT;
717 else
718 reg = CBA2R_RW64_32BIT;
4e3e9b69
TC
719 /* 16-bit VMIDs live in CBA2R */
720 if (smmu->features & ARM_SMMU_FEAT_VMID16)
1bd37a68 721 reg |= ARM_SMMU_CB_VMID(smmu, cfg) << CBA2R_VMID_SHIFT;
4e3e9b69 722
4a1c93cb
WD
723 writel_relaxed(reg, gr1_base + ARM_SMMU_GR1_CBA2R(cfg->cbndx));
724 }
725
45ae7cff 726 /* CBAR */
44680eed 727 reg = cfg->cbar;
b7862e35 728 if (smmu->version < ARM_SMMU_V2)
2907320d 729 reg |= cfg->irptndx << CBAR_IRPTNDX_SHIFT;
45ae7cff 730
57ca90f6
WD
731 /*
732 * Use the weakest shareability/memory types, so they are
733 * overridden by the ttbcr/pte.
734 */
735 if (stage1) {
736 reg |= (CBAR_S1_BPSHCFG_NSH << CBAR_S1_BPSHCFG_SHIFT) |
737 (CBAR_S1_MEMATTR_WB << CBAR_S1_MEMATTR_SHIFT);
4e3e9b69
TC
738 } else if (!(smmu->features & ARM_SMMU_FEAT_VMID16)) {
739 /* 8-bit VMIDs live in CBAR */
1bd37a68 740 reg |= ARM_SMMU_CB_VMID(smmu, cfg) << CBAR_VMID_SHIFT;
57ca90f6 741 }
44680eed 742 writel_relaxed(reg, gr1_base + ARM_SMMU_GR1_CBAR(cfg->cbndx));
45ae7cff 743
518f7136
WD
744 /* TTBRs */
745 if (stage1) {
6070529b
RM
746 u16 asid = ARM_SMMU_CB_ASID(smmu, cfg);
747
748 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH32_S) {
749 reg = pgtbl_cfg->arm_v7s_cfg.ttbr[0];
750 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBR0);
751 reg = pgtbl_cfg->arm_v7s_cfg.ttbr[1];
752 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBR1);
753 writel_relaxed(asid, cb_base + ARM_SMMU_CB_CONTEXTIDR);
754 } else {
755 reg64 = pgtbl_cfg->arm_lpae_s1_cfg.ttbr[0];
756 reg64 |= (u64)asid << TTBRn_ASID_SHIFT;
757 writeq_relaxed(reg64, cb_base + ARM_SMMU_CB_TTBR0);
758 reg64 = pgtbl_cfg->arm_lpae_s1_cfg.ttbr[1];
759 reg64 |= (u64)asid << TTBRn_ASID_SHIFT;
760 writeq_relaxed(reg64, cb_base + ARM_SMMU_CB_TTBR1);
761 }
518f7136 762 } else {
668b4ada 763 reg64 = pgtbl_cfg->arm_lpae_s2_cfg.vttbr;
f9a05f05 764 writeq_relaxed(reg64, cb_base + ARM_SMMU_CB_TTBR0);
518f7136 765 }
a65217a4 766
518f7136
WD
767 /* TTBCR */
768 if (stage1) {
6070529b
RM
769 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH32_S) {
770 reg = pgtbl_cfg->arm_v7s_cfg.tcr;
771 reg2 = 0;
772 } else {
773 reg = pgtbl_cfg->arm_lpae_s1_cfg.tcr;
774 reg2 = pgtbl_cfg->arm_lpae_s1_cfg.tcr >> 32;
775 reg2 |= TTBCR2_SEP_UPSTREAM;
45ae7cff 776 }
6070529b
RM
777 if (smmu->version > ARM_SMMU_V1)
778 writel_relaxed(reg2, cb_base + ARM_SMMU_CB_TTBCR2);
45ae7cff 779 } else {
518f7136 780 reg = pgtbl_cfg->arm_lpae_s2_cfg.vtcr;
45ae7cff 781 }
6070529b 782 writel_relaxed(reg, cb_base + ARM_SMMU_CB_TTBCR);
45ae7cff 783
518f7136 784 /* MAIRs (stage-1 only) */
45ae7cff 785 if (stage1) {
6070529b
RM
786 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH32_S) {
787 reg = pgtbl_cfg->arm_v7s_cfg.prrr;
788 reg2 = pgtbl_cfg->arm_v7s_cfg.nmrr;
789 } else {
790 reg = pgtbl_cfg->arm_lpae_s1_cfg.mair[0];
791 reg2 = pgtbl_cfg->arm_lpae_s1_cfg.mair[1];
792 }
45ae7cff 793 writel_relaxed(reg, cb_base + ARM_SMMU_CB_S1_MAIR0);
6070529b 794 writel_relaxed(reg2, cb_base + ARM_SMMU_CB_S1_MAIR1);
45ae7cff
WD
795 }
796
45ae7cff 797 /* SCTLR */
6070529b 798 reg = SCTLR_CFIE | SCTLR_CFRE | SCTLR_AFE | SCTLR_TRE | SCTLR_M;
45ae7cff
WD
799 if (stage1)
800 reg |= SCTLR_S1_ASIDPNE;
801#ifdef __BIG_ENDIAN
802 reg |= SCTLR_E;
803#endif
25724841 804 writel_relaxed(reg, cb_base + ARM_SMMU_CB_SCTLR);
45ae7cff
WD
805}
806
807static int arm_smmu_init_domain_context(struct iommu_domain *domain,
44680eed 808 struct arm_smmu_device *smmu)
45ae7cff 809{
a18037b2 810 int irq, start, ret = 0;
518f7136
WD
811 unsigned long ias, oas;
812 struct io_pgtable_ops *pgtbl_ops;
813 struct io_pgtable_cfg pgtbl_cfg;
814 enum io_pgtable_fmt fmt;
1d672638 815 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
44680eed 816 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
45ae7cff 817
518f7136 818 mutex_lock(&smmu_domain->init_mutex);
a18037b2
MH
819 if (smmu_domain->smmu)
820 goto out_unlock;
821
c752ce45
WD
822 /*
823 * Mapping the requested stage onto what we support is surprisingly
824 * complicated, mainly because the spec allows S1+S2 SMMUs without
825 * support for nested translation. That means we end up with the
826 * following table:
827 *
828 * Requested Supported Actual
829 * S1 N S1
830 * S1 S1+S2 S1
831 * S1 S2 S2
832 * S1 S1 S1
833 * N N N
834 * N S1+S2 S2
835 * N S2 S2
836 * N S1 S1
837 *
838 * Note that you can't actually request stage-2 mappings.
839 */
840 if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S1))
841 smmu_domain->stage = ARM_SMMU_DOMAIN_S2;
842 if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S2))
843 smmu_domain->stage = ARM_SMMU_DOMAIN_S1;
844
7602b871
RM
845 /*
846 * Choosing a suitable context format is even more fiddly. Until we
847 * grow some way for the caller to express a preference, and/or move
848 * the decision into the io-pgtable code where it arguably belongs,
849 * just aim for the closest thing to the rest of the system, and hope
850 * that the hardware isn't esoteric enough that we can't assume AArch64
851 * support to be a superset of AArch32 support...
852 */
853 if (smmu->features & ARM_SMMU_FEAT_FMT_AARCH32_L)
854 cfg->fmt = ARM_SMMU_CTX_FMT_AARCH32_L;
6070529b
RM
855 if (IS_ENABLED(CONFIG_IOMMU_IO_PGTABLE_ARMV7S) &&
856 !IS_ENABLED(CONFIG_64BIT) && !IS_ENABLED(CONFIG_ARM_LPAE) &&
857 (smmu->features & ARM_SMMU_FEAT_FMT_AARCH32_S) &&
858 (smmu_domain->stage == ARM_SMMU_DOMAIN_S1))
859 cfg->fmt = ARM_SMMU_CTX_FMT_AARCH32_S;
7602b871
RM
860 if ((IS_ENABLED(CONFIG_64BIT) || cfg->fmt == ARM_SMMU_CTX_FMT_NONE) &&
861 (smmu->features & (ARM_SMMU_FEAT_FMT_AARCH64_64K |
862 ARM_SMMU_FEAT_FMT_AARCH64_16K |
863 ARM_SMMU_FEAT_FMT_AARCH64_4K)))
864 cfg->fmt = ARM_SMMU_CTX_FMT_AARCH64;
865
866 if (cfg->fmt == ARM_SMMU_CTX_FMT_NONE) {
867 ret = -EINVAL;
868 goto out_unlock;
869 }
870
c752ce45
WD
871 switch (smmu_domain->stage) {
872 case ARM_SMMU_DOMAIN_S1:
873 cfg->cbar = CBAR_TYPE_S1_TRANS_S2_BYPASS;
874 start = smmu->num_s2_context_banks;
518f7136
WD
875 ias = smmu->va_size;
876 oas = smmu->ipa_size;
7602b871 877 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH64) {
518f7136 878 fmt = ARM_64_LPAE_S1;
6070529b 879 } else if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH32_L) {
518f7136 880 fmt = ARM_32_LPAE_S1;
7602b871
RM
881 ias = min(ias, 32UL);
882 oas = min(oas, 40UL);
6070529b
RM
883 } else {
884 fmt = ARM_V7S;
885 ias = min(ias, 32UL);
886 oas = min(oas, 32UL);
7602b871 887 }
c752ce45
WD
888 break;
889 case ARM_SMMU_DOMAIN_NESTED:
45ae7cff
WD
890 /*
891 * We will likely want to change this if/when KVM gets
892 * involved.
893 */
c752ce45 894 case ARM_SMMU_DOMAIN_S2:
9c5c92e3
WD
895 cfg->cbar = CBAR_TYPE_S2_TRANS;
896 start = 0;
518f7136
WD
897 ias = smmu->ipa_size;
898 oas = smmu->pa_size;
7602b871 899 if (cfg->fmt == ARM_SMMU_CTX_FMT_AARCH64) {
518f7136 900 fmt = ARM_64_LPAE_S2;
7602b871 901 } else {
518f7136 902 fmt = ARM_32_LPAE_S2;
7602b871
RM
903 ias = min(ias, 40UL);
904 oas = min(oas, 40UL);
905 }
c752ce45
WD
906 break;
907 default:
908 ret = -EINVAL;
909 goto out_unlock;
45ae7cff
WD
910 }
911
912 ret = __arm_smmu_alloc_bitmap(smmu->context_map, start,
913 smmu->num_context_banks);
287980e4 914 if (ret < 0)
a18037b2 915 goto out_unlock;
45ae7cff 916
44680eed 917 cfg->cbndx = ret;
b7862e35 918 if (smmu->version < ARM_SMMU_V2) {
44680eed
WD
919 cfg->irptndx = atomic_inc_return(&smmu->irptndx);
920 cfg->irptndx %= smmu->num_context_irqs;
45ae7cff 921 } else {
44680eed 922 cfg->irptndx = cfg->cbndx;
45ae7cff
WD
923 }
924
518f7136 925 pgtbl_cfg = (struct io_pgtable_cfg) {
d5466357 926 .pgsize_bitmap = smmu->pgsize_bitmap,
518f7136
WD
927 .ias = ias,
928 .oas = oas,
929 .tlb = &arm_smmu_gather_ops,
2df7a25c 930 .iommu_dev = smmu->dev,
518f7136
WD
931 };
932
933 smmu_domain->smmu = smmu;
934 pgtbl_ops = alloc_io_pgtable_ops(fmt, &pgtbl_cfg, smmu_domain);
935 if (!pgtbl_ops) {
936 ret = -ENOMEM;
937 goto out_clear_smmu;
938 }
939
d5466357
RM
940 /* Update the domain's page sizes to reflect the page table format */
941 domain->pgsize_bitmap = pgtbl_cfg.pgsize_bitmap;
a18037b2 942
518f7136
WD
943 /* Initialise the context bank with our page table cfg */
944 arm_smmu_init_context_bank(smmu_domain, &pgtbl_cfg);
945
946 /*
947 * Request context fault interrupt. Do this last to avoid the
948 * handler seeing a half-initialised domain state.
949 */
44680eed 950 irq = smmu->irqs[smmu->num_global_irqs + cfg->irptndx];
bee14004
PF
951 ret = devm_request_irq(smmu->dev, irq, arm_smmu_context_fault,
952 IRQF_SHARED, "arm-smmu-context-fault", domain);
287980e4 953 if (ret < 0) {
45ae7cff 954 dev_err(smmu->dev, "failed to request context IRQ %d (%u)\n",
44680eed
WD
955 cfg->irptndx, irq);
956 cfg->irptndx = INVALID_IRPTNDX;
45ae7cff
WD
957 }
958
518f7136
WD
959 mutex_unlock(&smmu_domain->init_mutex);
960
961 /* Publish page table ops for map/unmap */
962 smmu_domain->pgtbl_ops = pgtbl_ops;
a9a1b0b5 963 return 0;
45ae7cff 964
518f7136
WD
965out_clear_smmu:
966 smmu_domain->smmu = NULL;
a18037b2 967out_unlock:
518f7136 968 mutex_unlock(&smmu_domain->init_mutex);
45ae7cff
WD
969 return ret;
970}
971
972static void arm_smmu_destroy_domain_context(struct iommu_domain *domain)
973{
1d672638 974 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
44680eed
WD
975 struct arm_smmu_device *smmu = smmu_domain->smmu;
976 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
1463fe44 977 void __iomem *cb_base;
45ae7cff
WD
978 int irq;
979
021bb842 980 if (!smmu)
45ae7cff
WD
981 return;
982
518f7136
WD
983 /*
984 * Disable the context bank and free the page tables before freeing
985 * it.
986 */
44680eed 987 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
1463fe44 988 writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR);
1463fe44 989
44680eed
WD
990 if (cfg->irptndx != INVALID_IRPTNDX) {
991 irq = smmu->irqs[smmu->num_global_irqs + cfg->irptndx];
bee14004 992 devm_free_irq(smmu->dev, irq, domain);
45ae7cff
WD
993 }
994
44830b0c 995 free_io_pgtable_ops(smmu_domain->pgtbl_ops);
44680eed 996 __arm_smmu_free_bitmap(smmu->context_map, cfg->cbndx);
45ae7cff
WD
997}
998
1d672638 999static struct iommu_domain *arm_smmu_domain_alloc(unsigned type)
45ae7cff
WD
1000{
1001 struct arm_smmu_domain *smmu_domain;
45ae7cff 1002
9adb9594 1003 if (type != IOMMU_DOMAIN_UNMANAGED && type != IOMMU_DOMAIN_DMA)
1d672638 1004 return NULL;
45ae7cff
WD
1005 /*
1006 * Allocate the domain and initialise some of its data structures.
1007 * We can't really do anything meaningful until we've added a
1008 * master.
1009 */
1010 smmu_domain = kzalloc(sizeof(*smmu_domain), GFP_KERNEL);
1011 if (!smmu_domain)
1d672638 1012 return NULL;
45ae7cff 1013
021bb842
RM
1014 if (type == IOMMU_DOMAIN_DMA && (using_legacy_binding ||
1015 iommu_get_dma_cookie(&smmu_domain->domain))) {
9adb9594
RM
1016 kfree(smmu_domain);
1017 return NULL;
1018 }
1019
518f7136
WD
1020 mutex_init(&smmu_domain->init_mutex);
1021 spin_lock_init(&smmu_domain->pgtbl_lock);
1d672638
JR
1022
1023 return &smmu_domain->domain;
45ae7cff
WD
1024}
1025
1d672638 1026static void arm_smmu_domain_free(struct iommu_domain *domain)
45ae7cff 1027{
1d672638 1028 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
1463fe44
WD
1029
1030 /*
1031 * Free the domain resources. We assume that all devices have
1032 * already been detached.
1033 */
9adb9594 1034 iommu_put_dma_cookie(domain);
45ae7cff 1035 arm_smmu_destroy_domain_context(domain);
45ae7cff
WD
1036 kfree(smmu_domain);
1037}
1038
1f3d5ca4
RM
1039static void arm_smmu_write_smr(struct arm_smmu_device *smmu, int idx)
1040{
1041 struct arm_smmu_smr *smr = smmu->smrs + idx;
f80cd885 1042 u32 reg = smr->id << SMR_ID_SHIFT | smr->mask << SMR_MASK_SHIFT;
1f3d5ca4
RM
1043
1044 if (smr->valid)
1045 reg |= SMR_VALID;
1046 writel_relaxed(reg, ARM_SMMU_GR0(smmu) + ARM_SMMU_GR0_SMR(idx));
1047}
1048
8e8b203e
RM
1049static void arm_smmu_write_s2cr(struct arm_smmu_device *smmu, int idx)
1050{
1051 struct arm_smmu_s2cr *s2cr = smmu->s2crs + idx;
1052 u32 reg = (s2cr->type & S2CR_TYPE_MASK) << S2CR_TYPE_SHIFT |
1053 (s2cr->cbndx & S2CR_CBNDX_MASK) << S2CR_CBNDX_SHIFT |
1054 (s2cr->privcfg & S2CR_PRIVCFG_MASK) << S2CR_PRIVCFG_SHIFT;
1055
1056 writel_relaxed(reg, ARM_SMMU_GR0(smmu) + ARM_SMMU_GR0_S2CR(idx));
1057}
1058
1059static void arm_smmu_write_sme(struct arm_smmu_device *smmu, int idx)
1060{
1061 arm_smmu_write_s2cr(smmu, idx);
1062 if (smmu->smrs)
1063 arm_smmu_write_smr(smmu, idx);
1064}
1065
588888a7 1066static int arm_smmu_find_sme(struct arm_smmu_device *smmu, u16 id, u16 mask)
1f3d5ca4
RM
1067{
1068 struct arm_smmu_smr *smrs = smmu->smrs;
588888a7 1069 int i, free_idx = -ENOSPC;
1f3d5ca4 1070
588888a7
RM
1071 /* Stream indexing is blissfully easy */
1072 if (!smrs)
1073 return id;
1074
1075 /* Validating SMRs is... less so */
1076 for (i = 0; i < smmu->num_mapping_groups; ++i) {
1077 if (!smrs[i].valid) {
1078 /*
1079 * Note the first free entry we come across, which
1080 * we'll claim in the end if nothing else matches.
1081 */
1082 if (free_idx < 0)
1083 free_idx = i;
1f3d5ca4
RM
1084 continue;
1085 }
588888a7
RM
1086 /*
1087 * If the new entry is _entirely_ matched by an existing entry,
1088 * then reuse that, with the guarantee that there also cannot
1089 * be any subsequent conflicting entries. In normal use we'd
1090 * expect simply identical entries for this case, but there's
1091 * no harm in accommodating the generalisation.
1092 */
1093 if ((mask & smrs[i].mask) == mask &&
1094 !((id ^ smrs[i].id) & ~smrs[i].mask))
1095 return i;
1096 /*
1097 * If the new entry has any other overlap with an existing one,
1098 * though, then there always exists at least one stream ID
1099 * which would cause a conflict, and we can't allow that risk.
1100 */
1101 if (!((id ^ smrs[i].id) & ~(smrs[i].mask | mask)))
1102 return -EINVAL;
1103 }
1f3d5ca4 1104
588888a7
RM
1105 return free_idx;
1106}
1107
1108static bool arm_smmu_free_sme(struct arm_smmu_device *smmu, int idx)
1109{
1110 if (--smmu->s2crs[idx].count)
1111 return false;
1112
1113 smmu->s2crs[idx] = s2cr_init_val;
1114 if (smmu->smrs)
1115 smmu->smrs[idx].valid = false;
1116
1117 return true;
1118}
1119
1120static int arm_smmu_master_alloc_smes(struct device *dev)
1121{
adfec2e7
RM
1122 struct iommu_fwspec *fwspec = dev->iommu_fwspec;
1123 struct arm_smmu_master_cfg *cfg = fwspec->iommu_priv;
588888a7
RM
1124 struct arm_smmu_device *smmu = cfg->smmu;
1125 struct arm_smmu_smr *smrs = smmu->smrs;
1126 struct iommu_group *group;
1127 int i, idx, ret;
1128
1129 mutex_lock(&smmu->stream_map_mutex);
1130 /* Figure out a viable stream map entry allocation */
adfec2e7 1131 for_each_cfg_sme(fwspec, i, idx) {
021bb842
RM
1132 u16 sid = fwspec->ids[i];
1133 u16 mask = fwspec->ids[i] >> SMR_MASK_SHIFT;
1134
588888a7
RM
1135 if (idx != INVALID_SMENDX) {
1136 ret = -EEXIST;
1137 goto out_err;
45ae7cff
WD
1138 }
1139
021bb842 1140 ret = arm_smmu_find_sme(smmu, sid, mask);
588888a7
RM
1141 if (ret < 0)
1142 goto out_err;
1143
1144 idx = ret;
1145 if (smrs && smmu->s2crs[idx].count == 0) {
021bb842
RM
1146 smrs[idx].id = sid;
1147 smrs[idx].mask = mask;
588888a7
RM
1148 smrs[idx].valid = true;
1149 }
1150 smmu->s2crs[idx].count++;
1151 cfg->smendx[i] = (s16)idx;
45ae7cff
WD
1152 }
1153
588888a7
RM
1154 group = iommu_group_get_for_dev(dev);
1155 if (!group)
1156 group = ERR_PTR(-ENOMEM);
1157 if (IS_ERR(group)) {
1158 ret = PTR_ERR(group);
1159 goto out_err;
1160 }
1161 iommu_group_put(group);
1f3d5ca4 1162
45ae7cff 1163 /* It worked! Now, poke the actual hardware */
adfec2e7 1164 for_each_cfg_sme(fwspec, i, idx) {
588888a7
RM
1165 arm_smmu_write_sme(smmu, idx);
1166 smmu->s2crs[idx].group = group;
1167 }
45ae7cff 1168
588888a7 1169 mutex_unlock(&smmu->stream_map_mutex);
45ae7cff
WD
1170 return 0;
1171
588888a7 1172out_err:
1f3d5ca4 1173 while (i--) {
588888a7 1174 arm_smmu_free_sme(smmu, cfg->smendx[i]);
1f3d5ca4
RM
1175 cfg->smendx[i] = INVALID_SMENDX;
1176 }
588888a7
RM
1177 mutex_unlock(&smmu->stream_map_mutex);
1178 return ret;
45ae7cff
WD
1179}
1180
adfec2e7 1181static void arm_smmu_master_free_smes(struct iommu_fwspec *fwspec)
45ae7cff 1182{
adfec2e7
RM
1183 struct arm_smmu_device *smmu = fwspec_smmu(fwspec);
1184 struct arm_smmu_master_cfg *cfg = fwspec->iommu_priv;
d3097e39 1185 int i, idx;
43b412be 1186
588888a7 1187 mutex_lock(&smmu->stream_map_mutex);
adfec2e7 1188 for_each_cfg_sme(fwspec, i, idx) {
588888a7
RM
1189 if (arm_smmu_free_sme(smmu, idx))
1190 arm_smmu_write_sme(smmu, idx);
1f3d5ca4 1191 cfg->smendx[i] = INVALID_SMENDX;
45ae7cff 1192 }
588888a7 1193 mutex_unlock(&smmu->stream_map_mutex);
45ae7cff
WD
1194}
1195
45ae7cff 1196static int arm_smmu_domain_add_master(struct arm_smmu_domain *smmu_domain,
adfec2e7 1197 struct iommu_fwspec *fwspec)
45ae7cff 1198{
44680eed 1199 struct arm_smmu_device *smmu = smmu_domain->smmu;
8e8b203e
RM
1200 struct arm_smmu_s2cr *s2cr = smmu->s2crs;
1201 enum arm_smmu_s2cr_type type = S2CR_TYPE_TRANS;
1202 u8 cbndx = smmu_domain->cfg.cbndx;
588888a7 1203 int i, idx;
45ae7cff 1204
adfec2e7 1205 for_each_cfg_sme(fwspec, i, idx) {
8e8b203e 1206 if (type == s2cr[idx].type && cbndx == s2cr[idx].cbndx)
588888a7 1207 continue;
1f3d5ca4 1208
8e8b203e
RM
1209 s2cr[idx].type = type;
1210 s2cr[idx].privcfg = S2CR_PRIVCFG_UNPRIV;
1211 s2cr[idx].cbndx = cbndx;
1212 arm_smmu_write_s2cr(smmu, idx);
43b412be 1213 }
8e8b203e 1214 return 0;
bc7f2ce0
WD
1215}
1216
45ae7cff
WD
1217static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev)
1218{
a18037b2 1219 int ret;
adfec2e7
RM
1220 struct iommu_fwspec *fwspec = dev->iommu_fwspec;
1221 struct arm_smmu_device *smmu;
1d672638 1222 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
45ae7cff 1223
adfec2e7 1224 if (!fwspec || fwspec->ops != &arm_smmu_ops) {
45ae7cff
WD
1225 dev_err(dev, "cannot attach to SMMU, is it on the same bus?\n");
1226 return -ENXIO;
1227 }
1228
adfec2e7 1229 smmu = fwspec_smmu(fwspec);
518f7136 1230 /* Ensure that the domain is finalised */
adfec2e7 1231 ret = arm_smmu_init_domain_context(domain, smmu);
287980e4 1232 if (ret < 0)
518f7136
WD
1233 return ret;
1234
45ae7cff 1235 /*
44680eed
WD
1236 * Sanity check the domain. We don't support domains across
1237 * different SMMUs.
45ae7cff 1238 */
adfec2e7 1239 if (smmu_domain->smmu != smmu) {
45ae7cff
WD
1240 dev_err(dev,
1241 "cannot attach to SMMU %s whilst already attached to domain on SMMU %s\n",
adfec2e7 1242 dev_name(smmu_domain->smmu->dev), dev_name(smmu->dev));
a18037b2 1243 return -EINVAL;
45ae7cff 1244 }
45ae7cff
WD
1245
1246 /* Looks ok, so add the device to the domain */
adfec2e7 1247 return arm_smmu_domain_add_master(smmu_domain, fwspec);
45ae7cff
WD
1248}
1249
45ae7cff 1250static int arm_smmu_map(struct iommu_domain *domain, unsigned long iova,
b410aed9 1251 phys_addr_t paddr, size_t size, int prot)
45ae7cff 1252{
518f7136
WD
1253 int ret;
1254 unsigned long flags;
1d672638 1255 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
518f7136 1256 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
45ae7cff 1257
518f7136 1258 if (!ops)
45ae7cff
WD
1259 return -ENODEV;
1260
518f7136
WD
1261 spin_lock_irqsave(&smmu_domain->pgtbl_lock, flags);
1262 ret = ops->map(ops, iova, paddr, size, prot);
1263 spin_unlock_irqrestore(&smmu_domain->pgtbl_lock, flags);
1264 return ret;
45ae7cff
WD
1265}
1266
1267static size_t arm_smmu_unmap(struct iommu_domain *domain, unsigned long iova,
1268 size_t size)
1269{
518f7136
WD
1270 size_t ret;
1271 unsigned long flags;
1d672638 1272 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
518f7136 1273 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
45ae7cff 1274
518f7136
WD
1275 if (!ops)
1276 return 0;
1277
1278 spin_lock_irqsave(&smmu_domain->pgtbl_lock, flags);
1279 ret = ops->unmap(ops, iova, size);
1280 spin_unlock_irqrestore(&smmu_domain->pgtbl_lock, flags);
1281 return ret;
45ae7cff
WD
1282}
1283
859a732e
MH
1284static phys_addr_t arm_smmu_iova_to_phys_hard(struct iommu_domain *domain,
1285 dma_addr_t iova)
1286{
1d672638 1287 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
859a732e
MH
1288 struct arm_smmu_device *smmu = smmu_domain->smmu;
1289 struct arm_smmu_cfg *cfg = &smmu_domain->cfg;
1290 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
1291 struct device *dev = smmu->dev;
1292 void __iomem *cb_base;
1293 u32 tmp;
1294 u64 phys;
661d962f 1295 unsigned long va;
859a732e
MH
1296
1297 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, cfg->cbndx);
1298
661d962f
RM
1299 /* ATS1 registers can only be written atomically */
1300 va = iova & ~0xfffUL;
661d962f 1301 if (smmu->version == ARM_SMMU_V2)
f9a05f05
RM
1302 smmu_write_atomic_lq(va, cb_base + ARM_SMMU_CB_ATS1PR);
1303 else /* Register is only 32-bit in v1 */
661d962f 1304 writel_relaxed(va, cb_base + ARM_SMMU_CB_ATS1PR);
859a732e
MH
1305
1306 if (readl_poll_timeout_atomic(cb_base + ARM_SMMU_CB_ATSR, tmp,
1307 !(tmp & ATSR_ACTIVE), 5, 50)) {
1308 dev_err(dev,
077124c9 1309 "iova to phys timed out on %pad. Falling back to software table walk.\n",
859a732e
MH
1310 &iova);
1311 return ops->iova_to_phys(ops, iova);
1312 }
1313
f9a05f05 1314 phys = readq_relaxed(cb_base + ARM_SMMU_CB_PAR);
859a732e
MH
1315 if (phys & CB_PAR_F) {
1316 dev_err(dev, "translation fault!\n");
1317 dev_err(dev, "PAR = 0x%llx\n", phys);
1318 return 0;
1319 }
1320
1321 return (phys & GENMASK_ULL(39, 12)) | (iova & 0xfff);
1322}
1323
45ae7cff 1324static phys_addr_t arm_smmu_iova_to_phys(struct iommu_domain *domain,
859a732e 1325 dma_addr_t iova)
45ae7cff 1326{
518f7136
WD
1327 phys_addr_t ret;
1328 unsigned long flags;
1d672638 1329 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
518f7136 1330 struct io_pgtable_ops *ops= smmu_domain->pgtbl_ops;
45ae7cff 1331
518f7136 1332 if (!ops)
a44a9791 1333 return 0;
45ae7cff 1334
518f7136 1335 spin_lock_irqsave(&smmu_domain->pgtbl_lock, flags);
83a60ed8
BR
1336 if (smmu_domain->smmu->features & ARM_SMMU_FEAT_TRANS_OPS &&
1337 smmu_domain->stage == ARM_SMMU_DOMAIN_S1) {
859a732e 1338 ret = arm_smmu_iova_to_phys_hard(domain, iova);
83a60ed8 1339 } else {
859a732e 1340 ret = ops->iova_to_phys(ops, iova);
83a60ed8
BR
1341 }
1342
518f7136 1343 spin_unlock_irqrestore(&smmu_domain->pgtbl_lock, flags);
859a732e 1344
518f7136 1345 return ret;
45ae7cff
WD
1346}
1347
1fd0c775 1348static bool arm_smmu_capable(enum iommu_cap cap)
45ae7cff 1349{
d0948945
WD
1350 switch (cap) {
1351 case IOMMU_CAP_CACHE_COHERENCY:
1fd0c775
JR
1352 /*
1353 * Return true here as the SMMU can always send out coherent
1354 * requests.
1355 */
1356 return true;
d0948945 1357 case IOMMU_CAP_INTR_REMAP:
1fd0c775 1358 return true; /* MSIs are just memory writes */
0029a8dd
AM
1359 case IOMMU_CAP_NOEXEC:
1360 return true;
d0948945 1361 default:
1fd0c775 1362 return false;
d0948945 1363 }
45ae7cff 1364}
45ae7cff 1365
021bb842
RM
1366static int arm_smmu_match_node(struct device *dev, void *data)
1367{
1368 return dev->of_node == data;
1369}
1370
1371static struct arm_smmu_device *arm_smmu_get_by_node(struct device_node *np)
1372{
1373 struct device *dev = driver_find_device(&arm_smmu_driver.driver, NULL,
1374 np, arm_smmu_match_node);
1375 put_device(dev);
1376 return dev ? dev_get_drvdata(dev) : NULL;
1377}
1378
f80cd885 1379static int arm_smmu_add_device(struct device *dev)
45ae7cff 1380{
adfec2e7 1381 struct arm_smmu_device *smmu;
03edb226 1382 struct arm_smmu_master_cfg *cfg;
021bb842 1383 struct iommu_fwspec *fwspec = dev->iommu_fwspec;
f80cd885 1384 int i, ret;
8f68f8e2 1385
021bb842
RM
1386 if (using_legacy_binding) {
1387 ret = arm_smmu_register_legacy_master(dev, &smmu);
1388 fwspec = dev->iommu_fwspec;
1389 if (ret)
1390 goto out_free;
1391 } else if (fwspec) {
1392 smmu = arm_smmu_get_by_node(to_of_node(fwspec->iommu_fwnode));
1393 } else {
1394 return -ENODEV;
1395 }
a9a1b0b5 1396
f80cd885 1397 ret = -EINVAL;
adfec2e7
RM
1398 for (i = 0; i < fwspec->num_ids; i++) {
1399 u16 sid = fwspec->ids[i];
021bb842 1400 u16 mask = fwspec->ids[i] >> SMR_MASK_SHIFT;
03edb226 1401
adfec2e7 1402 if (sid & ~smmu->streamid_mask) {
f80cd885 1403 dev_err(dev, "stream ID 0x%x out of range for SMMU (0x%x)\n",
021bb842
RM
1404 sid, smmu->streamid_mask);
1405 goto out_free;
1406 }
1407 if (mask & ~smmu->smr_mask_mask) {
1408 dev_err(dev, "SMR mask 0x%x out of range for SMMU (0x%x)\n",
1409 sid, smmu->smr_mask_mask);
f80cd885
RM
1410 goto out_free;
1411 }
1f3d5ca4 1412 }
5fc63a7c 1413
adfec2e7
RM
1414 ret = -ENOMEM;
1415 cfg = kzalloc(offsetof(struct arm_smmu_master_cfg, smendx[i]),
1416 GFP_KERNEL);
1417 if (!cfg)
1418 goto out_free;
1419
1420 cfg->smmu = smmu;
1421 fwspec->iommu_priv = cfg;
1422 while (i--)
1423 cfg->smendx[i] = INVALID_SMENDX;
1424
588888a7 1425 ret = arm_smmu_master_alloc_smes(dev);
adfec2e7
RM
1426 if (ret)
1427 goto out_free;
1428
1429 return 0;
f80cd885
RM
1430
1431out_free:
adfec2e7
RM
1432 if (fwspec)
1433 kfree(fwspec->iommu_priv);
1434 iommu_fwspec_free(dev);
f80cd885 1435 return ret;
03edb226
WD
1436}
1437
45ae7cff
WD
1438static void arm_smmu_remove_device(struct device *dev)
1439{
adfec2e7 1440 struct iommu_fwspec *fwspec = dev->iommu_fwspec;
8e8b203e 1441
adfec2e7 1442 if (!fwspec || fwspec->ops != &arm_smmu_ops)
f80cd885 1443 return;
8e8b203e 1444
adfec2e7 1445 arm_smmu_master_free_smes(fwspec);
5fc63a7c 1446 iommu_group_remove_device(dev);
adfec2e7
RM
1447 kfree(fwspec->iommu_priv);
1448 iommu_fwspec_free(dev);
45ae7cff
WD
1449}
1450
af659932
JR
1451static struct iommu_group *arm_smmu_device_group(struct device *dev)
1452{
adfec2e7
RM
1453 struct iommu_fwspec *fwspec = dev->iommu_fwspec;
1454 struct arm_smmu_device *smmu = fwspec_smmu(fwspec);
588888a7
RM
1455 struct iommu_group *group = NULL;
1456 int i, idx;
1457
adfec2e7 1458 for_each_cfg_sme(fwspec, i, idx) {
588888a7
RM
1459 if (group && smmu->s2crs[idx].group &&
1460 group != smmu->s2crs[idx].group)
1461 return ERR_PTR(-EINVAL);
1462
1463 group = smmu->s2crs[idx].group;
1464 }
1465
1466 if (group)
1467 return group;
af659932
JR
1468
1469 if (dev_is_pci(dev))
1470 group = pci_device_group(dev);
1471 else
1472 group = generic_device_group(dev);
1473
af659932
JR
1474 return group;
1475}
1476
c752ce45
WD
1477static int arm_smmu_domain_get_attr(struct iommu_domain *domain,
1478 enum iommu_attr attr, void *data)
1479{
1d672638 1480 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
c752ce45
WD
1481
1482 switch (attr) {
1483 case DOMAIN_ATTR_NESTING:
1484 *(int *)data = (smmu_domain->stage == ARM_SMMU_DOMAIN_NESTED);
1485 return 0;
1486 default:
1487 return -ENODEV;
1488 }
1489}
1490
1491static int arm_smmu_domain_set_attr(struct iommu_domain *domain,
1492 enum iommu_attr attr, void *data)
1493{
518f7136 1494 int ret = 0;
1d672638 1495 struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
c752ce45 1496
518f7136
WD
1497 mutex_lock(&smmu_domain->init_mutex);
1498
c752ce45
WD
1499 switch (attr) {
1500 case DOMAIN_ATTR_NESTING:
518f7136
WD
1501 if (smmu_domain->smmu) {
1502 ret = -EPERM;
1503 goto out_unlock;
1504 }
1505
c752ce45
WD
1506 if (*(int *)data)
1507 smmu_domain->stage = ARM_SMMU_DOMAIN_NESTED;
1508 else
1509 smmu_domain->stage = ARM_SMMU_DOMAIN_S1;
1510
518f7136 1511 break;
c752ce45 1512 default:
518f7136 1513 ret = -ENODEV;
c752ce45 1514 }
518f7136
WD
1515
1516out_unlock:
1517 mutex_unlock(&smmu_domain->init_mutex);
1518 return ret;
c752ce45
WD
1519}
1520
021bb842
RM
1521static int arm_smmu_of_xlate(struct device *dev, struct of_phandle_args *args)
1522{
1523 u32 fwid = 0;
1524
1525 if (args->args_count > 0)
1526 fwid |= (u16)args->args[0];
1527
1528 if (args->args_count > 1)
1529 fwid |= (u16)args->args[1] << SMR_MASK_SHIFT;
1530
1531 return iommu_fwspec_add_ids(dev, &fwid, 1);
1532}
1533
518f7136 1534static struct iommu_ops arm_smmu_ops = {
c752ce45 1535 .capable = arm_smmu_capable,
1d672638
JR
1536 .domain_alloc = arm_smmu_domain_alloc,
1537 .domain_free = arm_smmu_domain_free,
c752ce45 1538 .attach_dev = arm_smmu_attach_dev,
c752ce45
WD
1539 .map = arm_smmu_map,
1540 .unmap = arm_smmu_unmap,
76771c93 1541 .map_sg = default_iommu_map_sg,
c752ce45
WD
1542 .iova_to_phys = arm_smmu_iova_to_phys,
1543 .add_device = arm_smmu_add_device,
1544 .remove_device = arm_smmu_remove_device,
af659932 1545 .device_group = arm_smmu_device_group,
c752ce45
WD
1546 .domain_get_attr = arm_smmu_domain_get_attr,
1547 .domain_set_attr = arm_smmu_domain_set_attr,
021bb842 1548 .of_xlate = arm_smmu_of_xlate,
518f7136 1549 .pgsize_bitmap = -1UL, /* Restricted during device attach */
45ae7cff
WD
1550};
1551
1552static void arm_smmu_device_reset(struct arm_smmu_device *smmu)
1553{
1554 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
659db6f6 1555 void __iomem *cb_base;
1f3d5ca4 1556 int i;
3ca3712a 1557 u32 reg, major;
659db6f6 1558
3a5df8ff
AH
1559 /* clear global FSR */
1560 reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sGFSR);
1561 writel(reg, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sGFSR);
45ae7cff 1562
1f3d5ca4
RM
1563 /*
1564 * Reset stream mapping groups: Initial values mark all SMRn as
1565 * invalid and all S2CRn as bypass unless overridden.
1566 */
8e8b203e
RM
1567 for (i = 0; i < smmu->num_mapping_groups; ++i)
1568 arm_smmu_write_sme(smmu, i);
45ae7cff 1569
3ca3712a
PF
1570 /*
1571 * Before clearing ARM_MMU500_ACTLR_CPRE, need to
1572 * clear CACHE_LOCK bit of ACR first. And, CACHE_LOCK
1573 * bit is only present in MMU-500r2 onwards.
1574 */
1575 reg = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID7);
1576 major = (reg >> ID7_MAJOR_SHIFT) & ID7_MAJOR_MASK;
1577 if ((smmu->model == ARM_MMU500) && (major >= 2)) {
1578 reg = readl_relaxed(gr0_base + ARM_SMMU_GR0_sACR);
1579 reg &= ~ARM_MMU500_ACR_CACHE_LOCK;
1580 writel_relaxed(reg, gr0_base + ARM_SMMU_GR0_sACR);
1581 }
1582
659db6f6
AH
1583 /* Make sure all context banks are disabled and clear CB_FSR */
1584 for (i = 0; i < smmu->num_context_banks; ++i) {
1585 cb_base = ARM_SMMU_CB_BASE(smmu) + ARM_SMMU_CB(smmu, i);
1586 writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR);
1587 writel_relaxed(FSR_FAULT, cb_base + ARM_SMMU_CB_FSR);
f0cfffc4
RM
1588 /*
1589 * Disable MMU-500's not-particularly-beneficial next-page
1590 * prefetcher for the sake of errata #841119 and #826419.
1591 */
1592 if (smmu->model == ARM_MMU500) {
1593 reg = readl_relaxed(cb_base + ARM_SMMU_CB_ACTLR);
1594 reg &= ~ARM_MMU500_ACTLR_CPRE;
1595 writel_relaxed(reg, cb_base + ARM_SMMU_CB_ACTLR);
1596 }
659db6f6 1597 }
1463fe44 1598
45ae7cff 1599 /* Invalidate the TLB, just in case */
45ae7cff
WD
1600 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLH);
1601 writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLNSNH);
1602
3a5df8ff 1603 reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
659db6f6 1604
45ae7cff 1605 /* Enable fault reporting */
659db6f6 1606 reg |= (sCR0_GFRE | sCR0_GFIE | sCR0_GCFGFRE | sCR0_GCFGFIE);
45ae7cff
WD
1607
1608 /* Disable TLB broadcasting. */
659db6f6 1609 reg |= (sCR0_VMIDPNE | sCR0_PTM);
45ae7cff 1610
25a1c96c
RM
1611 /* Enable client access, handling unmatched streams as appropriate */
1612 reg &= ~sCR0_CLIENTPD;
1613 if (disable_bypass)
1614 reg |= sCR0_USFCFG;
1615 else
1616 reg &= ~sCR0_USFCFG;
45ae7cff
WD
1617
1618 /* Disable forced broadcasting */
659db6f6 1619 reg &= ~sCR0_FB;
45ae7cff
WD
1620
1621 /* Don't upgrade barriers */
659db6f6 1622 reg &= ~(sCR0_BSU_MASK << sCR0_BSU_SHIFT);
45ae7cff 1623
4e3e9b69
TC
1624 if (smmu->features & ARM_SMMU_FEAT_VMID16)
1625 reg |= sCR0_VMID16EN;
1626
45ae7cff 1627 /* Push the button */
518f7136 1628 __arm_smmu_tlb_sync(smmu);
3a5df8ff 1629 writel(reg, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
45ae7cff
WD
1630}
1631
1632static int arm_smmu_id_size_to_bits(int size)
1633{
1634 switch (size) {
1635 case 0:
1636 return 32;
1637 case 1:
1638 return 36;
1639 case 2:
1640 return 40;
1641 case 3:
1642 return 42;
1643 case 4:
1644 return 44;
1645 case 5:
1646 default:
1647 return 48;
1648 }
1649}
1650
1651static int arm_smmu_device_cfg_probe(struct arm_smmu_device *smmu)
1652{
1653 unsigned long size;
1654 void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
1655 u32 id;
bae2c2d4 1656 bool cttw_dt, cttw_reg;
8e8b203e 1657 int i;
45ae7cff
WD
1658
1659 dev_notice(smmu->dev, "probing hardware configuration...\n");
b7862e35
RM
1660 dev_notice(smmu->dev, "SMMUv%d with:\n",
1661 smmu->version == ARM_SMMU_V2 ? 2 : 1);
45ae7cff
WD
1662
1663 /* ID0 */
1664 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID0);
4cf740b0
WD
1665
1666 /* Restrict available stages based on module parameter */
1667 if (force_stage == 1)
1668 id &= ~(ID0_S2TS | ID0_NTS);
1669 else if (force_stage == 2)
1670 id &= ~(ID0_S1TS | ID0_NTS);
1671
45ae7cff
WD
1672 if (id & ID0_S1TS) {
1673 smmu->features |= ARM_SMMU_FEAT_TRANS_S1;
1674 dev_notice(smmu->dev, "\tstage 1 translation\n");
1675 }
1676
1677 if (id & ID0_S2TS) {
1678 smmu->features |= ARM_SMMU_FEAT_TRANS_S2;
1679 dev_notice(smmu->dev, "\tstage 2 translation\n");
1680 }
1681
1682 if (id & ID0_NTS) {
1683 smmu->features |= ARM_SMMU_FEAT_TRANS_NESTED;
1684 dev_notice(smmu->dev, "\tnested translation\n");
1685 }
1686
1687 if (!(smmu->features &
4cf740b0 1688 (ARM_SMMU_FEAT_TRANS_S1 | ARM_SMMU_FEAT_TRANS_S2))) {
45ae7cff
WD
1689 dev_err(smmu->dev, "\tno translation support!\n");
1690 return -ENODEV;
1691 }
1692
b7862e35
RM
1693 if ((id & ID0_S1TS) &&
1694 ((smmu->version < ARM_SMMU_V2) || !(id & ID0_ATOSNS))) {
859a732e
MH
1695 smmu->features |= ARM_SMMU_FEAT_TRANS_OPS;
1696 dev_notice(smmu->dev, "\taddress translation ops\n");
1697 }
1698
bae2c2d4
RM
1699 /*
1700 * In order for DMA API calls to work properly, we must defer to what
1701 * the DT says about coherency, regardless of what the hardware claims.
1702 * Fortunately, this also opens up a workaround for systems where the
1703 * ID register value has ended up configured incorrectly.
1704 */
1705 cttw_dt = of_dma_is_coherent(smmu->dev->of_node);
1706 cttw_reg = !!(id & ID0_CTTW);
1707 if (cttw_dt)
45ae7cff 1708 smmu->features |= ARM_SMMU_FEAT_COHERENT_WALK;
bae2c2d4
RM
1709 if (cttw_dt || cttw_reg)
1710 dev_notice(smmu->dev, "\t%scoherent table walk\n",
1711 cttw_dt ? "" : "non-");
1712 if (cttw_dt != cttw_reg)
1713 dev_notice(smmu->dev,
1714 "\t(IDR0.CTTW overridden by dma-coherent property)\n");
45ae7cff 1715
21174240
RM
1716 /* Max. number of entries we have for stream matching/indexing */
1717 size = 1 << ((id >> ID0_NUMSIDB_SHIFT) & ID0_NUMSIDB_MASK);
1718 smmu->streamid_mask = size - 1;
45ae7cff 1719 if (id & ID0_SMS) {
21174240 1720 u32 smr;
45ae7cff
WD
1721
1722 smmu->features |= ARM_SMMU_FEAT_STREAM_MATCH;
21174240
RM
1723 size = (id >> ID0_NUMSMRG_SHIFT) & ID0_NUMSMRG_MASK;
1724 if (size == 0) {
45ae7cff
WD
1725 dev_err(smmu->dev,
1726 "stream-matching supported, but no SMRs present!\n");
1727 return -ENODEV;
1728 }
1729
21174240
RM
1730 /*
1731 * SMR.ID bits may not be preserved if the corresponding MASK
1732 * bits are set, so check each one separately. We can reject
1733 * masters later if they try to claim IDs outside these masks.
1734 */
1735 smr = smmu->streamid_mask << SMR_ID_SHIFT;
45ae7cff
WD
1736 writel_relaxed(smr, gr0_base + ARM_SMMU_GR0_SMR(0));
1737 smr = readl_relaxed(gr0_base + ARM_SMMU_GR0_SMR(0));
21174240 1738 smmu->streamid_mask = smr >> SMR_ID_SHIFT;
45ae7cff 1739
21174240
RM
1740 smr = smmu->streamid_mask << SMR_MASK_SHIFT;
1741 writel_relaxed(smr, gr0_base + ARM_SMMU_GR0_SMR(0));
1742 smr = readl_relaxed(gr0_base + ARM_SMMU_GR0_SMR(0));
1743 smmu->smr_mask_mask = smr >> SMR_MASK_SHIFT;
45ae7cff 1744
1f3d5ca4
RM
1745 /* Zero-initialised to mark as invalid */
1746 smmu->smrs = devm_kcalloc(smmu->dev, size, sizeof(*smmu->smrs),
1747 GFP_KERNEL);
1748 if (!smmu->smrs)
1749 return -ENOMEM;
1750
45ae7cff 1751 dev_notice(smmu->dev,
21174240
RM
1752 "\tstream matching with %lu register groups, mask 0x%x",
1753 size, smmu->smr_mask_mask);
45ae7cff 1754 }
8e8b203e
RM
1755 /* s2cr->type == 0 means translation, so initialise explicitly */
1756 smmu->s2crs = devm_kmalloc_array(smmu->dev, size, sizeof(*smmu->s2crs),
1757 GFP_KERNEL);
1758 if (!smmu->s2crs)
1759 return -ENOMEM;
1760 for (i = 0; i < size; i++)
1761 smmu->s2crs[i] = s2cr_init_val;
1762
21174240 1763 smmu->num_mapping_groups = size;
588888a7 1764 mutex_init(&smmu->stream_map_mutex);
45ae7cff 1765
7602b871
RM
1766 if (smmu->version < ARM_SMMU_V2 || !(id & ID0_PTFS_NO_AARCH32)) {
1767 smmu->features |= ARM_SMMU_FEAT_FMT_AARCH32_L;
1768 if (!(id & ID0_PTFS_NO_AARCH32S))
1769 smmu->features |= ARM_SMMU_FEAT_FMT_AARCH32_S;
1770 }
1771
45ae7cff
WD
1772 /* ID1 */
1773 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID1);
c757e852 1774 smmu->pgshift = (id & ID1_PAGESIZE) ? 16 : 12;
45ae7cff 1775
c55af7f7 1776 /* Check for size mismatch of SMMU address space from mapped region */
518f7136 1777 size = 1 << (((id >> ID1_NUMPAGENDXB_SHIFT) & ID1_NUMPAGENDXB_MASK) + 1);
c757e852 1778 size *= 2 << smmu->pgshift;
c55af7f7 1779 if (smmu->size != size)
2907320d
MH
1780 dev_warn(smmu->dev,
1781 "SMMU address space size (0x%lx) differs from mapped region size (0x%lx)!\n",
1782 size, smmu->size);
45ae7cff 1783
518f7136 1784 smmu->num_s2_context_banks = (id >> ID1_NUMS2CB_SHIFT) & ID1_NUMS2CB_MASK;
45ae7cff
WD
1785 smmu->num_context_banks = (id >> ID1_NUMCB_SHIFT) & ID1_NUMCB_MASK;
1786 if (smmu->num_s2_context_banks > smmu->num_context_banks) {
1787 dev_err(smmu->dev, "impossible number of S2 context banks!\n");
1788 return -ENODEV;
1789 }
1790 dev_notice(smmu->dev, "\t%u context banks (%u stage-2 only)\n",
1791 smmu->num_context_banks, smmu->num_s2_context_banks);
e086d912
RM
1792 /*
1793 * Cavium CN88xx erratum #27704.
1794 * Ensure ASID and VMID allocation is unique across all SMMUs in
1795 * the system.
1796 */
1797 if (smmu->model == CAVIUM_SMMUV2) {
1798 smmu->cavium_id_base =
1799 atomic_add_return(smmu->num_context_banks,
1800 &cavium_smmu_context_count);
1801 smmu->cavium_id_base -= smmu->num_context_banks;
1802 }
45ae7cff
WD
1803
1804 /* ID2 */
1805 id = readl_relaxed(gr0_base + ARM_SMMU_GR0_ID2);
1806 size = arm_smmu_id_size_to_bits((id >> ID2_IAS_SHIFT) & ID2_IAS_MASK);
518f7136 1807 smmu->ipa_size = size;
45ae7cff 1808
518f7136 1809 /* The output mask is also applied for bypass */
45ae7cff 1810 size = arm_smmu_id_size_to_bits((id >> ID2_OAS_SHIFT) & ID2_OAS_MASK);
518f7136 1811 smmu->pa_size = size;
45ae7cff 1812
4e3e9b69
TC
1813 if (id & ID2_VMID16)
1814 smmu->features |= ARM_SMMU_FEAT_VMID16;
1815
f1d84548
RM
1816 /*
1817 * What the page table walker can address actually depends on which
1818 * descriptor format is in use, but since a) we don't know that yet,
1819 * and b) it can vary per context bank, this will have to do...
1820 */
1821 if (dma_set_mask_and_coherent(smmu->dev, DMA_BIT_MASK(size)))
1822 dev_warn(smmu->dev,
1823 "failed to set DMA mask for table walker\n");
1824
b7862e35 1825 if (smmu->version < ARM_SMMU_V2) {
518f7136 1826 smmu->va_size = smmu->ipa_size;
b7862e35
RM
1827 if (smmu->version == ARM_SMMU_V1_64K)
1828 smmu->features |= ARM_SMMU_FEAT_FMT_AARCH64_64K;
45ae7cff 1829 } else {
45ae7cff 1830 size = (id >> ID2_UBS_SHIFT) & ID2_UBS_MASK;
518f7136 1831 smmu->va_size = arm_smmu_id_size_to_bits(size);
518f7136 1832 if (id & ID2_PTFS_4K)
7602b871 1833 smmu->features |= ARM_SMMU_FEAT_FMT_AARCH64_4K;
518f7136 1834 if (id & ID2_PTFS_16K)
7602b871 1835 smmu->features |= ARM_SMMU_FEAT_FMT_AARCH64_16K;
518f7136 1836 if (id & ID2_PTFS_64K)
7602b871 1837 smmu->features |= ARM_SMMU_FEAT_FMT_AARCH64_64K;
45ae7cff
WD
1838 }
1839
7602b871 1840 /* Now we've corralled the various formats, what'll it do? */
7602b871 1841 if (smmu->features & ARM_SMMU_FEAT_FMT_AARCH32_S)
d5466357 1842 smmu->pgsize_bitmap |= SZ_4K | SZ_64K | SZ_1M | SZ_16M;
7602b871
RM
1843 if (smmu->features &
1844 (ARM_SMMU_FEAT_FMT_AARCH32_L | ARM_SMMU_FEAT_FMT_AARCH64_4K))
d5466357 1845 smmu->pgsize_bitmap |= SZ_4K | SZ_2M | SZ_1G;
7602b871 1846 if (smmu->features & ARM_SMMU_FEAT_FMT_AARCH64_16K)
d5466357 1847 smmu->pgsize_bitmap |= SZ_16K | SZ_32M;
7602b871 1848 if (smmu->features & ARM_SMMU_FEAT_FMT_AARCH64_64K)
d5466357
RM
1849 smmu->pgsize_bitmap |= SZ_64K | SZ_512M;
1850
1851 if (arm_smmu_ops.pgsize_bitmap == -1UL)
1852 arm_smmu_ops.pgsize_bitmap = smmu->pgsize_bitmap;
1853 else
1854 arm_smmu_ops.pgsize_bitmap |= smmu->pgsize_bitmap;
1855 dev_notice(smmu->dev, "\tSupported page sizes: 0x%08lx\n",
1856 smmu->pgsize_bitmap);
7602b871 1857
518f7136 1858
28d6007b
WD
1859 if (smmu->features & ARM_SMMU_FEAT_TRANS_S1)
1860 dev_notice(smmu->dev, "\tStage-1: %lu-bit VA -> %lu-bit IPA\n",
518f7136 1861 smmu->va_size, smmu->ipa_size);
28d6007b
WD
1862
1863 if (smmu->features & ARM_SMMU_FEAT_TRANS_S2)
1864 dev_notice(smmu->dev, "\tStage-2: %lu-bit IPA -> %lu-bit PA\n",
518f7136 1865 smmu->ipa_size, smmu->pa_size);
28d6007b 1866
45ae7cff
WD
1867 return 0;
1868}
1869
67b65a3f
RM
1870struct arm_smmu_match_data {
1871 enum arm_smmu_arch_version version;
1872 enum arm_smmu_implementation model;
1873};
1874
1875#define ARM_SMMU_MATCH_DATA(name, ver, imp) \
1876static struct arm_smmu_match_data name = { .version = ver, .model = imp }
1877
1878ARM_SMMU_MATCH_DATA(smmu_generic_v1, ARM_SMMU_V1, GENERIC_SMMU);
1879ARM_SMMU_MATCH_DATA(smmu_generic_v2, ARM_SMMU_V2, GENERIC_SMMU);
b7862e35 1880ARM_SMMU_MATCH_DATA(arm_mmu401, ARM_SMMU_V1_64K, GENERIC_SMMU);
f0cfffc4 1881ARM_SMMU_MATCH_DATA(arm_mmu500, ARM_SMMU_V2, ARM_MMU500);
e086d912 1882ARM_SMMU_MATCH_DATA(cavium_smmuv2, ARM_SMMU_V2, CAVIUM_SMMUV2);
67b65a3f 1883
09b5269a 1884static const struct of_device_id arm_smmu_of_match[] = {
67b65a3f
RM
1885 { .compatible = "arm,smmu-v1", .data = &smmu_generic_v1 },
1886 { .compatible = "arm,smmu-v2", .data = &smmu_generic_v2 },
1887 { .compatible = "arm,mmu-400", .data = &smmu_generic_v1 },
b7862e35 1888 { .compatible = "arm,mmu-401", .data = &arm_mmu401 },
f0cfffc4 1889 { .compatible = "arm,mmu-500", .data = &arm_mmu500 },
e086d912 1890 { .compatible = "cavium,smmu-v2", .data = &cavium_smmuv2 },
09360403
RM
1891 { },
1892};
1893MODULE_DEVICE_TABLE(of, arm_smmu_of_match);
1894
45ae7cff
WD
1895static int arm_smmu_device_dt_probe(struct platform_device *pdev)
1896{
67b65a3f 1897 const struct arm_smmu_match_data *data;
45ae7cff
WD
1898 struct resource *res;
1899 struct arm_smmu_device *smmu;
45ae7cff 1900 struct device *dev = &pdev->dev;
45ae7cff 1901 int num_irqs, i, err;
021bb842
RM
1902 bool legacy_binding;
1903
1904 legacy_binding = of_find_property(dev->of_node, "mmu-masters", NULL);
1905 if (legacy_binding && !using_generic_binding) {
1906 if (!using_legacy_binding)
1907 pr_notice("deprecated \"mmu-masters\" DT property in use; DMA API support unavailable\n");
1908 using_legacy_binding = true;
1909 } else if (!legacy_binding && !using_legacy_binding) {
1910 using_generic_binding = true;
1911 } else {
1912 dev_err(dev, "not probing due to mismatched DT properties\n");
1913 return -ENODEV;
1914 }
45ae7cff
WD
1915
1916 smmu = devm_kzalloc(dev, sizeof(*smmu), GFP_KERNEL);
1917 if (!smmu) {
1918 dev_err(dev, "failed to allocate arm_smmu_device\n");
1919 return -ENOMEM;
1920 }
1921 smmu->dev = dev;
1922
d6fc5d97 1923 data = of_device_get_match_data(dev);
67b65a3f
RM
1924 smmu->version = data->version;
1925 smmu->model = data->model;
09360403 1926
45ae7cff 1927 res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
8a7f4312
JL
1928 smmu->base = devm_ioremap_resource(dev, res);
1929 if (IS_ERR(smmu->base))
1930 return PTR_ERR(smmu->base);
45ae7cff 1931 smmu->size = resource_size(res);
45ae7cff
WD
1932
1933 if (of_property_read_u32(dev->of_node, "#global-interrupts",
1934 &smmu->num_global_irqs)) {
1935 dev_err(dev, "missing #global-interrupts property\n");
1936 return -ENODEV;
1937 }
1938
1939 num_irqs = 0;
1940 while ((res = platform_get_resource(pdev, IORESOURCE_IRQ, num_irqs))) {
1941 num_irqs++;
1942 if (num_irqs > smmu->num_global_irqs)
1943 smmu->num_context_irqs++;
1944 }
1945
44a08de2
AH
1946 if (!smmu->num_context_irqs) {
1947 dev_err(dev, "found %d interrupts but expected at least %d\n",
1948 num_irqs, smmu->num_global_irqs + 1);
1949 return -ENODEV;
45ae7cff 1950 }
45ae7cff
WD
1951
1952 smmu->irqs = devm_kzalloc(dev, sizeof(*smmu->irqs) * num_irqs,
1953 GFP_KERNEL);
1954 if (!smmu->irqs) {
1955 dev_err(dev, "failed to allocate %d irqs\n", num_irqs);
1956 return -ENOMEM;
1957 }
1958
1959 for (i = 0; i < num_irqs; ++i) {
1960 int irq = platform_get_irq(pdev, i);
2907320d 1961
45ae7cff
WD
1962 if (irq < 0) {
1963 dev_err(dev, "failed to get irq index %d\n", i);
1964 return -ENODEV;
1965 }
1966 smmu->irqs[i] = irq;
1967 }
1968
3c8766d0
OH
1969 err = arm_smmu_device_cfg_probe(smmu);
1970 if (err)
1971 return err;
1972
3a5df8ff
AH
1973 parse_driver_options(smmu);
1974
b7862e35 1975 if (smmu->version == ARM_SMMU_V2 &&
45ae7cff
WD
1976 smmu->num_context_banks != smmu->num_context_irqs) {
1977 dev_err(dev,
1978 "found only %d context interrupt(s) but %d required\n",
1979 smmu->num_context_irqs, smmu->num_context_banks);
f80cd885 1980 return -ENODEV;
45ae7cff
WD
1981 }
1982
45ae7cff 1983 for (i = 0; i < smmu->num_global_irqs; ++i) {
bee14004
PF
1984 err = devm_request_irq(smmu->dev, smmu->irqs[i],
1985 arm_smmu_global_fault,
1986 IRQF_SHARED,
1987 "arm-smmu global fault",
1988 smmu);
45ae7cff
WD
1989 if (err) {
1990 dev_err(dev, "failed to request global IRQ %d (%u)\n",
1991 i, smmu->irqs[i]);
f80cd885 1992 return err;
45ae7cff
WD
1993 }
1994 }
1995
adfec2e7 1996 of_iommu_set_ops(dev->of_node, &arm_smmu_ops);
d6fc5d97 1997 platform_set_drvdata(pdev, smmu);
fd90cecb 1998 arm_smmu_device_reset(smmu);
021bb842
RM
1999
2000 /* Oh, for a proper bus abstraction */
2001 if (!iommu_present(&platform_bus_type))
2002 bus_set_iommu(&platform_bus_type, &arm_smmu_ops);
2003#ifdef CONFIG_ARM_AMBA
2004 if (!iommu_present(&amba_bustype))
2005 bus_set_iommu(&amba_bustype, &arm_smmu_ops);
2006#endif
2007#ifdef CONFIG_PCI
2008 if (!iommu_present(&pci_bus_type)) {
2009 pci_request_acs();
2010 bus_set_iommu(&pci_bus_type, &arm_smmu_ops);
2011 }
2012#endif
45ae7cff 2013 return 0;
45ae7cff
WD
2014}
2015
2016static int arm_smmu_device_remove(struct platform_device *pdev)
2017{
d6fc5d97 2018 struct arm_smmu_device *smmu = platform_get_drvdata(pdev);
45ae7cff
WD
2019
2020 if (!smmu)
2021 return -ENODEV;
2022
ecfadb6e 2023 if (!bitmap_empty(smmu->context_map, ARM_SMMU_MAX_CBS))
d6fc5d97 2024 dev_err(&pdev->dev, "removing device with active domains!\n");
45ae7cff 2025
45ae7cff 2026 /* Turn the thing off */
2907320d 2027 writel(sCR0_CLIENTPD, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);
45ae7cff
WD
2028 return 0;
2029}
2030
45ae7cff
WD
2031static struct platform_driver arm_smmu_driver = {
2032 .driver = {
45ae7cff
WD
2033 .name = "arm-smmu",
2034 .of_match_table = of_match_ptr(arm_smmu_of_match),
2035 },
2036 .probe = arm_smmu_device_dt_probe,
2037 .remove = arm_smmu_device_remove,
2038};
2039
2040static int __init arm_smmu_init(void)
2041{
021bb842
RM
2042 static bool registered;
2043 int ret = 0;
45ae7cff 2044
021bb842
RM
2045 if (!registered) {
2046 ret = platform_driver_register(&arm_smmu_driver);
2047 registered = !ret;
112c898b 2048 }
021bb842 2049 return ret;
45ae7cff
WD
2050}
2051
2052static void __exit arm_smmu_exit(void)
2053{
2054 return platform_driver_unregister(&arm_smmu_driver);
2055}
2056
b1950b27 2057subsys_initcall(arm_smmu_init);
45ae7cff
WD
2058module_exit(arm_smmu_exit);
2059
021bb842
RM
2060static int __init arm_smmu_of_init(struct device_node *np)
2061{
2062 int ret = arm_smmu_init();
2063
2064 if (ret)
2065 return ret;
2066
2067 if (!of_platform_device_create(np, NULL, platform_bus_type.dev_root))
2068 return -ENODEV;
2069
2070 return 0;
2071}
2072IOMMU_OF_DECLARE(arm_smmuv1, "arm,smmu-v1", arm_smmu_of_init);
2073IOMMU_OF_DECLARE(arm_smmuv2, "arm,smmu-v2", arm_smmu_of_init);
2074IOMMU_OF_DECLARE(arm_mmu400, "arm,mmu-400", arm_smmu_of_init);
2075IOMMU_OF_DECLARE(arm_mmu401, "arm,mmu-401", arm_smmu_of_init);
2076IOMMU_OF_DECLARE(arm_mmu500, "arm,mmu-500", arm_smmu_of_init);
2077IOMMU_OF_DECLARE(cavium_smmuv2, "cavium,smmu-v2", arm_smmu_of_init);
2078
45ae7cff
WD
2079MODULE_DESCRIPTION("IOMMU API for ARM architected SMMU implementations");
2080MODULE_AUTHOR("Will Deacon <will.deacon@arm.com>");
2081MODULE_LICENSE("GPL v2");