iommu.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597
  1. /* Copyright (c) 2010, Code Aurora Forum. All rights reserved.
  2. *
  3. * This program is free software; you can redistribute it and/or modify
  4. * it under the terms of the GNU General Public License version 2 and
  5. * only version 2 as published by the Free Software Foundation.
  6. *
  7. * This program is distributed in the hope that it will be useful,
  8. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. * GNU General Public License for more details.
  11. *
  12. * You should have received a copy of the GNU General Public License
  13. * along with this program; if not, write to the Free Software
  14. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
  15. * 02110-1301, USA.
  16. */
  17. #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  18. #include <linux/kernel.h>
  19. #include <linux/module.h>
  20. #include <linux/platform_device.h>
  21. #include <linux/errno.h>
  22. #include <linux/io.h>
  23. #include <linux/interrupt.h>
  24. #include <linux/list.h>
  25. #include <linux/spinlock.h>
  26. #include <linux/slab.h>
  27. #include <linux/iommu.h>
  28. #include <asm/cacheflush.h>
  29. #include <asm/sizes.h>
  30. #include <mach/iommu_hw-8xxx.h>
  31. #include <mach/iommu.h>
  32. DEFINE_SPINLOCK(msm_iommu_lock);
  33. struct msm_priv {
  34. unsigned long *pgtable;
  35. struct list_head list_attached;
  36. };
  37. static void __flush_iotlb(struct iommu_domain *domain)
  38. {
  39. struct msm_priv *priv = domain->priv;
  40. struct msm_iommu_drvdata *iommu_drvdata;
  41. struct msm_iommu_ctx_drvdata *ctx_drvdata;
  42. #ifndef CONFIG_IOMMU_PGTABLES_L2
  43. unsigned long *fl_table = priv->pgtable;
  44. int i;
  45. dmac_flush_range(fl_table, fl_table + SZ_16K);
  46. for (i = 0; i < NUM_FL_PTE; i++)
  47. if ((fl_table[i] & 0x03) == FL_TYPE_TABLE) {
  48. void *sl_table = __va(fl_table[i] & FL_BASE_MASK);
  49. dmac_flush_range(sl_table, sl_table + SZ_4K);
  50. }
  51. #endif
  52. list_for_each_entry(ctx_drvdata, &priv->list_attached, attached_elm) {
  53. if (!ctx_drvdata->pdev || !ctx_drvdata->pdev->dev.parent)
  54. BUG();
  55. iommu_drvdata = dev_get_drvdata(ctx_drvdata->pdev->dev.parent);
  56. SET_CTX_TLBIALL(iommu_drvdata->base, ctx_drvdata->num, 0);
  57. }
  58. }
  59. static void __reset_context(void __iomem *base, int ctx)
  60. {
  61. SET_BPRCOSH(base, ctx, 0);
  62. SET_BPRCISH(base, ctx, 0);
  63. SET_BPRCNSH(base, ctx, 0);
  64. SET_BPSHCFG(base, ctx, 0);
  65. SET_BPMTCFG(base, ctx, 0);
  66. SET_ACTLR(base, ctx, 0);
  67. SET_SCTLR(base, ctx, 0);
  68. SET_FSRRESTORE(base, ctx, 0);
  69. SET_TTBR0(base, ctx, 0);
  70. SET_TTBR1(base, ctx, 0);
  71. SET_TTBCR(base, ctx, 0);
  72. SET_BFBCR(base, ctx, 0);
  73. SET_PAR(base, ctx, 0);
  74. SET_FAR(base, ctx, 0);
  75. SET_CTX_TLBIALL(base, ctx, 0);
  76. SET_TLBFLPTER(base, ctx, 0);
  77. SET_TLBSLPTER(base, ctx, 0);
  78. SET_TLBLKCR(base, ctx, 0);
  79. SET_PRRR(base, ctx, 0);
  80. SET_NMRR(base, ctx, 0);
  81. SET_CONTEXTIDR(base, ctx, 0);
  82. }
  83. static void __program_context(void __iomem *base, int ctx, phys_addr_t pgtable)
  84. {
  85. __reset_context(base, ctx);
  86. /* Set up HTW mode */
  87. /* TLB miss configuration: perform HTW on miss */
  88. SET_TLBMCFG(base, ctx, 0x3);
  89. /* V2P configuration: HTW for access */
  90. SET_V2PCFG(base, ctx, 0x3);
  91. SET_TTBCR(base, ctx, 0);
  92. SET_TTBR0_PA(base, ctx, (pgtable >> 14));
  93. /* Invalidate the TLB for this context */
  94. SET_CTX_TLBIALL(base, ctx, 0);
  95. /* Set interrupt number to "secure" interrupt */
  96. SET_IRPTNDX(base, ctx, 0);
  97. /* Enable context fault interrupt */
  98. SET_CFEIE(base, ctx, 1);
  99. /* Stall access on a context fault and let the handler deal with it */
  100. SET_CFCFG(base, ctx, 1);
  101. /* Redirect all cacheable requests to L2 slave port. */
  102. SET_RCISH(base, ctx, 1);
  103. SET_RCOSH(base, ctx, 1);
  104. SET_RCNSH(base, ctx, 1);
  105. /* Turn on TEX Remap */
  106. SET_TRE(base, ctx, 1);
  107. /* Do not configure PRRR / NMRR on the IOMMU for now. We will assume
  108. * TEX class 0 for everything until attributes are properly worked out
  109. */
  110. SET_PRRR(base, ctx, 0);
  111. SET_NMRR(base, ctx, 0);
  112. /* Turn on BFB prefetch */
  113. SET_BFBDFE(base, ctx, 1);
  114. #ifdef CONFIG_IOMMU_PGTABLES_L2
  115. /* Configure page tables as inner-cacheable and shareable to reduce
  116. * the TLB miss penalty.
  117. */
  118. SET_TTBR0_SH(base, ctx, 1);
  119. SET_TTBR1_SH(base, ctx, 1);
  120. SET_TTBR0_NOS(base, ctx, 1);
  121. SET_TTBR1_NOS(base, ctx, 1);
  122. SET_TTBR0_IRGNH(base, ctx, 0); /* WB, WA */
  123. SET_TTBR0_IRGNL(base, ctx, 1);
  124. SET_TTBR1_IRGNH(base, ctx, 0); /* WB, WA */
  125. SET_TTBR1_IRGNL(base, ctx, 1);
  126. SET_TTBR0_ORGN(base, ctx, 1); /* WB, WA */
  127. SET_TTBR1_ORGN(base, ctx, 1); /* WB, WA */
  128. #endif
  129. /* Enable the MMU */
  130. SET_M(base, ctx, 1);
  131. }
  132. static int msm_iommu_domain_init(struct iommu_domain *domain)
  133. {
  134. struct msm_priv *priv = kzalloc(sizeof(*priv), GFP_KERNEL);
  135. if (!priv)
  136. goto fail_nomem;
  137. INIT_LIST_HEAD(&priv->list_attached);
  138. priv->pgtable = (unsigned long *)__get_free_pages(GFP_KERNEL,
  139. get_order(SZ_16K));
  140. if (!priv->pgtable)
  141. goto fail_nomem;
  142. memset(priv->pgtable, 0, SZ_16K);
  143. domain->priv = priv;
  144. return 0;
  145. fail_nomem:
  146. kfree(priv);
  147. return -ENOMEM;
  148. }
  149. static void msm_iommu_domain_destroy(struct iommu_domain *domain)
  150. {
  151. struct msm_priv *priv;
  152. unsigned long flags;
  153. unsigned long *fl_table;
  154. int i;
  155. spin_lock_irqsave(&msm_iommu_lock, flags);
  156. priv = domain->priv;
  157. domain->priv = NULL;
  158. if (priv) {
  159. fl_table = priv->pgtable;
  160. for (i = 0; i < NUM_FL_PTE; i++)
  161. if ((fl_table[i] & 0x03) == FL_TYPE_TABLE)
  162. free_page((unsigned long) __va(((fl_table[i]) &
  163. FL_BASE_MASK)));
  164. free_pages((unsigned long)priv->pgtable, get_order(SZ_16K));
  165. priv->pgtable = NULL;
  166. }
  167. kfree(priv);
  168. spin_unlock_irqrestore(&msm_iommu_lock, flags);
  169. }
  170. static int msm_iommu_attach_dev(struct iommu_domain *domain, struct device *dev)
  171. {
  172. struct msm_priv *priv;
  173. struct msm_iommu_ctx_dev *ctx_dev;
  174. struct msm_iommu_drvdata *iommu_drvdata;
  175. struct msm_iommu_ctx_drvdata *ctx_drvdata;
  176. struct msm_iommu_ctx_drvdata *tmp_drvdata;
  177. int ret = 0;
  178. unsigned long flags;
  179. spin_lock_irqsave(&msm_iommu_lock, flags);
  180. priv = domain->priv;
  181. if (!priv || !dev) {
  182. ret = -EINVAL;
  183. goto fail;
  184. }
  185. iommu_drvdata = dev_get_drvdata(dev->parent);
  186. ctx_drvdata = dev_get_drvdata(dev);
  187. ctx_dev = dev->platform_data;
  188. if (!iommu_drvdata || !ctx_drvdata || !ctx_dev) {
  189. ret = -EINVAL;
  190. goto fail;
  191. }
  192. list_for_each_entry(tmp_drvdata, &priv->list_attached, attached_elm)
  193. if (tmp_drvdata == ctx_drvdata) {
  194. ret = -EBUSY;
  195. goto fail;
  196. }
  197. __program_context(iommu_drvdata->base, ctx_dev->num,
  198. __pa(priv->pgtable));
  199. list_add(&(ctx_drvdata->attached_elm), &priv->list_attached);
  200. __flush_iotlb(domain);
  201. fail:
  202. spin_unlock_irqrestore(&msm_iommu_lock, flags);
  203. return ret;
  204. }
  205. static void msm_iommu_detach_dev(struct iommu_domain *domain,
  206. struct device *dev)
  207. {
  208. struct msm_priv *priv;
  209. struct msm_iommu_ctx_dev *ctx_dev;
  210. struct msm_iommu_drvdata *iommu_drvdata;
  211. struct msm_iommu_ctx_drvdata *ctx_drvdata;
  212. unsigned long flags;
  213. spin_lock_irqsave(&msm_iommu_lock, flags);
  214. priv = domain->priv;
  215. if (!priv || !dev)
  216. goto fail;
  217. iommu_drvdata = dev_get_drvdata(dev->parent);
  218. ctx_drvdata = dev_get_drvdata(dev);
  219. ctx_dev = dev->platform_data;
  220. if (!iommu_drvdata || !ctx_drvdata || !ctx_dev)
  221. goto fail;
  222. __flush_iotlb(domain);
  223. __reset_context(iommu_drvdata->base, ctx_dev->num);
  224. list_del_init(&ctx_drvdata->attached_elm);
  225. fail:
  226. spin_unlock_irqrestore(&msm_iommu_lock, flags);
  227. }
  228. static int msm_iommu_map(struct iommu_domain *domain, unsigned long va,
  229. phys_addr_t pa, int order, int prot)
  230. {
  231. struct msm_priv *priv;
  232. unsigned long flags;
  233. unsigned long *fl_table;
  234. unsigned long *fl_pte;
  235. unsigned long fl_offset;
  236. unsigned long *sl_table;
  237. unsigned long *sl_pte;
  238. unsigned long sl_offset;
  239. size_t len = 0x1000UL << order;
  240. int ret = 0;
  241. spin_lock_irqsave(&msm_iommu_lock, flags);
  242. priv = domain->priv;
  243. if (!priv) {
  244. ret = -EINVAL;
  245. goto fail;
  246. }
  247. fl_table = priv->pgtable;
  248. if (len != SZ_16M && len != SZ_1M &&
  249. len != SZ_64K && len != SZ_4K) {
  250. pr_debug("Bad size: %d\n", len);
  251. ret = -EINVAL;
  252. goto fail;
  253. }
  254. if (!fl_table) {
  255. pr_debug("Null page table\n");
  256. ret = -EINVAL;
  257. goto fail;
  258. }
  259. fl_offset = FL_OFFSET(va); /* Upper 12 bits */
  260. fl_pte = fl_table + fl_offset; /* int pointers, 4 bytes */
  261. if (len == SZ_16M) {
  262. int i = 0;
  263. for (i = 0; i < 16; i++)
  264. *(fl_pte+i) = (pa & 0xFF000000) | FL_SUPERSECTION |
  265. FL_AP_READ | FL_AP_WRITE | FL_TYPE_SECT |
  266. FL_SHARED;
  267. }
  268. if (len == SZ_1M)
  269. *fl_pte = (pa & 0xFFF00000) | FL_AP_READ | FL_AP_WRITE |
  270. FL_TYPE_SECT | FL_SHARED;
  271. /* Need a 2nd level table */
  272. if ((len == SZ_4K || len == SZ_64K) && (*fl_pte) == 0) {
  273. unsigned long *sl;
  274. sl = (unsigned long *) __get_free_pages(GFP_KERNEL,
  275. get_order(SZ_4K));
  276. if (!sl) {
  277. pr_debug("Could not allocate second level table\n");
  278. ret = -ENOMEM;
  279. goto fail;
  280. }
  281. memset(sl, 0, SZ_4K);
  282. *fl_pte = ((((int)__pa(sl)) & FL_BASE_MASK) | FL_TYPE_TABLE);
  283. }
  284. sl_table = (unsigned long *) __va(((*fl_pte) & FL_BASE_MASK));
  285. sl_offset = SL_OFFSET(va);
  286. sl_pte = sl_table + sl_offset;
  287. if (len == SZ_4K)
  288. *sl_pte = (pa & SL_BASE_MASK_SMALL) | SL_AP0 | SL_AP1 |
  289. SL_SHARED | SL_TYPE_SMALL;
  290. if (len == SZ_64K) {
  291. int i;
  292. for (i = 0; i < 16; i++)
  293. *(sl_pte+i) = (pa & SL_BASE_MASK_LARGE) | SL_AP0 |
  294. SL_AP1 | SL_SHARED | SL_TYPE_LARGE;
  295. }
  296. __flush_iotlb(domain);
  297. fail:
  298. spin_unlock_irqrestore(&msm_iommu_lock, flags);
  299. return ret;
  300. }
  301. static int msm_iommu_unmap(struct iommu_domain *domain, unsigned long va,
  302. int order)
  303. {
  304. struct msm_priv *priv;
  305. unsigned long flags;
  306. unsigned long *fl_table;
  307. unsigned long *fl_pte;
  308. unsigned long fl_offset;
  309. unsigned long *sl_table;
  310. unsigned long *sl_pte;
  311. unsigned long sl_offset;
  312. size_t len = 0x1000UL << order;
  313. int i, ret = 0;
  314. spin_lock_irqsave(&msm_iommu_lock, flags);
  315. priv = domain->priv;
  316. if (!priv) {
  317. ret = -ENODEV;
  318. goto fail;
  319. }
  320. fl_table = priv->pgtable;
  321. if (len != SZ_16M && len != SZ_1M &&
  322. len != SZ_64K && len != SZ_4K) {
  323. pr_debug("Bad length: %d\n", len);
  324. ret = -EINVAL;
  325. goto fail;
  326. }
  327. if (!fl_table) {
  328. pr_debug("Null page table\n");
  329. ret = -EINVAL;
  330. goto fail;
  331. }
  332. fl_offset = FL_OFFSET(va); /* Upper 12 bits */
  333. fl_pte = fl_table + fl_offset; /* int pointers, 4 bytes */
  334. if (*fl_pte == 0) {
  335. pr_debug("First level PTE is 0\n");
  336. ret = -ENODEV;
  337. goto fail;
  338. }
  339. /* Unmap supersection */
  340. if (len == SZ_16M)
  341. for (i = 0; i < 16; i++)
  342. *(fl_pte+i) = 0;
  343. if (len == SZ_1M)
  344. *fl_pte = 0;
  345. sl_table = (unsigned long *) __va(((*fl_pte) & FL_BASE_MASK));
  346. sl_offset = SL_OFFSET(va);
  347. sl_pte = sl_table + sl_offset;
  348. if (len == SZ_64K) {
  349. for (i = 0; i < 16; i++)
  350. *(sl_pte+i) = 0;
  351. }
  352. if (len == SZ_4K)
  353. *sl_pte = 0;
  354. if (len == SZ_4K || len == SZ_64K) {
  355. int used = 0;
  356. for (i = 0; i < NUM_SL_PTE; i++)
  357. if (sl_table[i])
  358. used = 1;
  359. if (!used) {
  360. free_page((unsigned long)sl_table);
  361. *fl_pte = 0;
  362. }
  363. }
  364. __flush_iotlb(domain);
  365. fail:
  366. spin_unlock_irqrestore(&msm_iommu_lock, flags);
  367. return ret;
  368. }
  369. static phys_addr_t msm_iommu_iova_to_phys(struct iommu_domain *domain,
  370. unsigned long va)
  371. {
  372. struct msm_priv *priv;
  373. struct msm_iommu_drvdata *iommu_drvdata;
  374. struct msm_iommu_ctx_drvdata *ctx_drvdata;
  375. unsigned int par;
  376. unsigned long flags;
  377. void __iomem *base;
  378. phys_addr_t ret = 0;
  379. int ctx;
  380. spin_lock_irqsave(&msm_iommu_lock, flags);
  381. priv = domain->priv;
  382. if (list_empty(&priv->list_attached))
  383. goto fail;
  384. ctx_drvdata = list_entry(priv->list_attached.next,
  385. struct msm_iommu_ctx_drvdata, attached_elm);
  386. iommu_drvdata = dev_get_drvdata(ctx_drvdata->pdev->dev.parent);
  387. base = iommu_drvdata->base;
  388. ctx = ctx_drvdata->num;
  389. /* Invalidate context TLB */
  390. SET_CTX_TLBIALL(base, ctx, 0);
  391. SET_V2PPR_VA(base, ctx, va >> V2Pxx_VA_SHIFT);
  392. if (GET_FAULT(base, ctx))
  393. goto fail;
  394. par = GET_PAR(base, ctx);
  395. /* We are dealing with a supersection */
  396. if (GET_NOFAULT_SS(base, ctx))
  397. ret = (par & 0xFF000000) | (va & 0x00FFFFFF);
  398. else /* Upper 20 bits from PAR, lower 12 from VA */
  399. ret = (par & 0xFFFFF000) | (va & 0x00000FFF);
  400. fail:
  401. spin_unlock_irqrestore(&msm_iommu_lock, flags);
  402. return ret;
  403. }
  404. static int msm_iommu_domain_has_cap(struct iommu_domain *domain,
  405. unsigned long cap)
  406. {
  407. return 0;
  408. }
  409. static void print_ctx_regs(void __iomem *base, int ctx)
  410. {
  411. unsigned int fsr = GET_FSR(base, ctx);
  412. pr_err("FAR = %08x PAR = %08x\n",
  413. GET_FAR(base, ctx), GET_PAR(base, ctx));
  414. pr_err("FSR = %08x [%s%s%s%s%s%s%s%s%s%s]\n", fsr,
  415. (fsr & 0x02) ? "TF " : "",
  416. (fsr & 0x04) ? "AFF " : "",
  417. (fsr & 0x08) ? "APF " : "",
  418. (fsr & 0x10) ? "TLBMF " : "",
  419. (fsr & 0x20) ? "HTWDEEF " : "",
  420. (fsr & 0x40) ? "HTWSEEF " : "",
  421. (fsr & 0x80) ? "MHF " : "",
  422. (fsr & 0x10000) ? "SL " : "",
  423. (fsr & 0x40000000) ? "SS " : "",
  424. (fsr & 0x80000000) ? "MULTI " : "");
  425. pr_err("FSYNR0 = %08x FSYNR1 = %08x\n",
  426. GET_FSYNR0(base, ctx), GET_FSYNR1(base, ctx));
  427. pr_err("TTBR0 = %08x TTBR1 = %08x\n",
  428. GET_TTBR0(base, ctx), GET_TTBR1(base, ctx));
  429. pr_err("SCTLR = %08x ACTLR = %08x\n",
  430. GET_SCTLR(base, ctx), GET_ACTLR(base, ctx));
  431. pr_err("PRRR = %08x NMRR = %08x\n",
  432. GET_PRRR(base, ctx), GET_NMRR(base, ctx));
  433. }
  434. irqreturn_t msm_iommu_fault_handler(int irq, void *dev_id)
  435. {
  436. struct msm_iommu_drvdata *drvdata = dev_id;
  437. void __iomem *base;
  438. unsigned int fsr = 0;
  439. int ncb = 0, i = 0;
  440. spin_lock(&msm_iommu_lock);
  441. if (!drvdata) {
  442. pr_err("Invalid device ID in context interrupt handler\n");
  443. goto fail;
  444. }
  445. base = drvdata->base;
  446. pr_err("===== WOAH! =====\n");
  447. pr_err("Unexpected IOMMU page fault!\n");
  448. pr_err("base = %08x\n", (unsigned int) base);
  449. ncb = GET_NCB(base)+1;
  450. for (i = 0; i < ncb; i++) {
  451. fsr = GET_FSR(base, i);
  452. if (fsr) {
  453. pr_err("Fault occurred in context %d.\n", i);
  454. pr_err("Interesting registers:\n");
  455. print_ctx_regs(base, i);
  456. SET_FSR(base, i, 0x4000000F);
  457. }
  458. }
  459. fail:
  460. spin_unlock(&msm_iommu_lock);
  461. return 0;
  462. }
  463. static struct iommu_ops msm_iommu_ops = {
  464. .domain_init = msm_iommu_domain_init,
  465. .domain_destroy = msm_iommu_domain_destroy,
  466. .attach_dev = msm_iommu_attach_dev,
  467. .detach_dev = msm_iommu_detach_dev,
  468. .map = msm_iommu_map,
  469. .unmap = msm_iommu_unmap,
  470. .iova_to_phys = msm_iommu_iova_to_phys,
  471. .domain_has_cap = msm_iommu_domain_has_cap
  472. };
  473. static int msm_iommu_init(void)
  474. {
  475. register_iommu(&msm_iommu_ops);
  476. return 0;
  477. }
  478. subsys_initcall(msm_iommu_init);
  479. MODULE_LICENSE("GPL v2");
  480. MODULE_AUTHOR("Stepan Moskovchenko <stepanm@codeaurora.org>");