2019-06-04 01:11:33 -07:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2011-11-16 22:31:31 -07:00
|
|
|
/*
|
2014-04-16 00:24:44 -07:00
|
|
|
* Copyright (C) 2011-2014 NVIDIA CORPORATION. All rights reserved.
|
2011-11-16 22:31:31 -07:00
|
|
|
*/
|
|
|
|
|
2015-03-27 03:07:27 -07:00
|
|
|
#include <linux/bitops.h>
|
2015-01-23 01:49:25 -07:00
|
|
|
#include <linux/debugfs.h>
|
2013-01-21 03:09:06 -07:00
|
|
|
#include <linux/err.h>
|
2011-11-16 22:31:31 -07:00
|
|
|
#include <linux/iommu.h>
|
2014-04-16 00:24:44 -07:00
|
|
|
#include <linux/kernel.h>
|
2012-06-25 04:23:55 -07:00
|
|
|
#include <linux/of.h>
|
2023-07-14 10:46:39 -07:00
|
|
|
#include <linux/of_platform.h>
|
2020-11-25 03:10:13 -07:00
|
|
|
#include <linux/pci.h>
|
2014-04-16 00:24:44 -07:00
|
|
|
#include <linux/platform_device.h>
|
|
|
|
#include <linux/slab.h>
|
2020-09-01 13:37:30 -07:00
|
|
|
#include <linux/spinlock.h>
|
2017-04-26 06:46:20 -07:00
|
|
|
#include <linux/dma-mapping.h>
|
2014-07-17 04:17:24 -07:00
|
|
|
|
|
|
|
#include <soc/tegra/ahb.h>
|
2014-04-16 00:24:44 -07:00
|
|
|
#include <soc/tegra/mc.h>
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2024-04-12 17:25:20 -07:00
|
|
|
#include "iommu-pages.h"
|
|
|
|
|
2017-10-12 07:19:16 -07:00
|
|
|
struct tegra_smmu_group {
|
|
|
|
struct list_head list;
|
2020-08-06 08:54:04 -07:00
|
|
|
struct tegra_smmu *smmu;
|
2017-10-12 07:19:16 -07:00
|
|
|
const struct tegra_smmu_group_soc *soc;
|
|
|
|
struct iommu_group *group;
|
2020-09-11 00:16:43 -07:00
|
|
|
unsigned int swgroup;
|
2017-10-12 07:19:16 -07:00
|
|
|
};
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
struct tegra_smmu {
|
|
|
|
void __iomem *regs;
|
|
|
|
struct device *dev;
|
2012-09-04 15:36:15 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
struct tegra_mc *mc;
|
|
|
|
const struct tegra_smmu_soc *soc;
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2017-10-12 07:19:16 -07:00
|
|
|
struct list_head groups;
|
|
|
|
|
2015-03-27 03:07:27 -07:00
|
|
|
unsigned long pfn_mask;
|
2015-08-06 05:20:31 -07:00
|
|
|
unsigned long tlb_mask;
|
2015-03-27 03:07:27 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
unsigned long *asids;
|
|
|
|
struct mutex lock;
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
struct list_head list;
|
2015-01-23 01:49:25 -07:00
|
|
|
|
|
|
|
struct dentry *debugfs;
|
2017-08-09 08:41:52 -07:00
|
|
|
|
|
|
|
struct iommu_device iommu; /* IOMMU Core code handle */
|
2011-11-16 22:31:31 -07:00
|
|
|
};
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
struct tegra_smmu_as {
|
2015-03-26 05:43:12 -07:00
|
|
|
struct iommu_domain domain;
|
2014-04-16 00:24:44 -07:00
|
|
|
struct tegra_smmu *smmu;
|
|
|
|
unsigned int use_count;
|
2020-09-01 13:37:30 -07:00
|
|
|
spinlock_t lock;
|
2015-07-27 05:29:31 -07:00
|
|
|
u32 *count;
|
2015-07-27 05:29:26 -07:00
|
|
|
struct page **pts;
|
2014-04-16 00:24:44 -07:00
|
|
|
struct page *pd;
|
2015-07-27 05:29:52 -07:00
|
|
|
dma_addr_t pd_dma;
|
2014-04-16 00:24:44 -07:00
|
|
|
unsigned id;
|
|
|
|
u32 attr;
|
2011-11-16 22:31:31 -07:00
|
|
|
};
|
|
|
|
|
2015-03-26 05:43:12 -07:00
|
|
|
static struct tegra_smmu_as *to_smmu_as(struct iommu_domain *dom)
|
|
|
|
{
|
|
|
|
return container_of(dom, struct tegra_smmu_as, domain);
|
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static inline void smmu_writel(struct tegra_smmu *smmu, u32 value,
|
|
|
|
unsigned long offset)
|
|
|
|
{
|
|
|
|
writel(value, smmu->regs + offset);
|
|
|
|
}
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static inline u32 smmu_readl(struct tegra_smmu *smmu, unsigned long offset)
|
|
|
|
{
|
|
|
|
return readl(smmu->regs + offset);
|
|
|
|
}
|
2012-09-14 09:22:00 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_CONFIG 0x010
|
|
|
|
#define SMMU_CONFIG_ENABLE (1 << 0)
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_TLB_CONFIG 0x14
|
|
|
|
#define SMMU_TLB_CONFIG_HIT_UNDER_MISS (1 << 29)
|
|
|
|
#define SMMU_TLB_CONFIG_ROUND_ROBIN_ARBITRATION (1 << 28)
|
2015-08-06 05:20:31 -07:00
|
|
|
#define SMMU_TLB_CONFIG_ACTIVE_LINES(smmu) \
|
|
|
|
((smmu)->soc->num_tlb_lines & (smmu)->tlb_mask)
|
2012-06-25 04:23:55 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_PTC_CONFIG 0x18
|
|
|
|
#define SMMU_PTC_CONFIG_ENABLE (1 << 29)
|
|
|
|
#define SMMU_PTC_CONFIG_REQ_LIMIT(x) (((x) & 0x0f) << 24)
|
|
|
|
#define SMMU_PTC_CONFIG_INDEX_MAP(x) ((x) & 0x3f)
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_PTB_ASID 0x01c
|
|
|
|
#define SMMU_PTB_ASID_VALUE(x) ((x) & 0x7f)
|
2012-06-25 04:23:56 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_PTB_DATA 0x020
|
2015-07-27 05:29:52 -07:00
|
|
|
#define SMMU_PTB_DATA_VALUE(dma, attr) ((dma) >> 12 | (attr))
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
#define SMMU_MK_PDE(dma, attr) ((dma) >> SMMU_PTE_SHIFT | (attr))
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_TLB_FLUSH 0x030
|
|
|
|
#define SMMU_TLB_FLUSH_VA_MATCH_ALL (0 << 0)
|
|
|
|
#define SMMU_TLB_FLUSH_VA_MATCH_SECTION (2 << 0)
|
|
|
|
#define SMMU_TLB_FLUSH_VA_MATCH_GROUP (3 << 0)
|
|
|
|
#define SMMU_TLB_FLUSH_VA_SECTION(addr) ((((addr) & 0xffc00000) >> 12) | \
|
|
|
|
SMMU_TLB_FLUSH_VA_MATCH_SECTION)
|
|
|
|
#define SMMU_TLB_FLUSH_VA_GROUP(addr) ((((addr) & 0xffffc000) >> 12) | \
|
|
|
|
SMMU_TLB_FLUSH_VA_MATCH_GROUP)
|
|
|
|
#define SMMU_TLB_FLUSH_ASID_MATCH (1 << 31)
|
2013-01-31 01:14:10 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_PTC_FLUSH 0x034
|
|
|
|
#define SMMU_PTC_FLUSH_TYPE_ALL (0 << 0)
|
|
|
|
#define SMMU_PTC_FLUSH_TYPE_ADR (1 << 0)
|
2013-01-31 01:14:10 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_PTC_FLUSH_HI 0x9b8
|
|
|
|
#define SMMU_PTC_FLUSH_HI_MASK 0x3
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
/* per-SWGROUP SMMU_*_ASID register */
|
|
|
|
#define SMMU_ASID_ENABLE (1 << 31)
|
|
|
|
#define SMMU_ASID_MASK 0x7f
|
|
|
|
#define SMMU_ASID_VALUE(x) ((x) & SMMU_ASID_MASK)
|
2013-01-31 01:14:10 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
/* page table definitions */
|
|
|
|
#define SMMU_NUM_PDE 1024
|
|
|
|
#define SMMU_NUM_PTE 1024
|
2013-01-31 01:14:10 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_SIZE_PD (SMMU_NUM_PDE * 4)
|
|
|
|
#define SMMU_SIZE_PT (SMMU_NUM_PTE * 4)
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_PDE_SHIFT 22
|
|
|
|
#define SMMU_PTE_SHIFT 12
|
2013-02-04 12:40:58 -07:00
|
|
|
|
2020-09-11 00:16:41 -07:00
|
|
|
#define SMMU_PAGE_MASK (~(SMMU_SIZE_PT-1))
|
|
|
|
#define SMMU_OFFSET_IN_PAGE(x) ((unsigned long)(x) & ~SMMU_PAGE_MASK)
|
|
|
|
#define SMMU_PFN_PHYS(x) ((phys_addr_t)(x) << SMMU_PTE_SHIFT)
|
|
|
|
#define SMMU_PHYS_PFN(x) ((unsigned long)((x) >> SMMU_PTE_SHIFT))
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_PD_READABLE (1 << 31)
|
|
|
|
#define SMMU_PD_WRITABLE (1 << 30)
|
|
|
|
#define SMMU_PD_NONSECURE (1 << 29)
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_PDE_READABLE (1 << 31)
|
|
|
|
#define SMMU_PDE_WRITABLE (1 << 30)
|
|
|
|
#define SMMU_PDE_NONSECURE (1 << 29)
|
|
|
|
#define SMMU_PDE_NEXT (1 << 28)
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_PTE_READABLE (1 << 31)
|
|
|
|
#define SMMU_PTE_WRITABLE (1 << 30)
|
|
|
|
#define SMMU_PTE_NONSECURE (1 << 29)
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
#define SMMU_PDE_ATTR (SMMU_PDE_READABLE | SMMU_PDE_WRITABLE | \
|
|
|
|
SMMU_PDE_NONSECURE)
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2015-07-27 05:29:16 -07:00
|
|
|
static unsigned int iova_pd_index(unsigned long iova)
|
|
|
|
{
|
|
|
|
return (iova >> SMMU_PDE_SHIFT) & (SMMU_NUM_PDE - 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned int iova_pt_index(unsigned long iova)
|
|
|
|
{
|
|
|
|
return (iova >> SMMU_PTE_SHIFT) & (SMMU_NUM_PTE - 1);
|
|
|
|
}
|
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
static bool smmu_dma_addr_valid(struct tegra_smmu *smmu, dma_addr_t addr)
|
2015-07-27 05:29:36 -07:00
|
|
|
{
|
2015-07-27 05:29:52 -07:00
|
|
|
addr >>= 12;
|
|
|
|
return (addr & smmu->pfn_mask) == addr;
|
|
|
|
}
|
2015-07-27 05:29:36 -07:00
|
|
|
|
2019-10-16 04:50:26 -07:00
|
|
|
static dma_addr_t smmu_pde_to_dma(struct tegra_smmu *smmu, u32 pde)
|
2015-07-27 05:29:52 -07:00
|
|
|
{
|
2019-10-16 04:50:26 -07:00
|
|
|
return (dma_addr_t)(pde & smmu->pfn_mask) << 12;
|
2015-07-27 05:29:36 -07:00
|
|
|
}
|
|
|
|
|
2015-07-27 05:29:41 -07:00
|
|
|
static void smmu_flush_ptc_all(struct tegra_smmu *smmu)
|
|
|
|
{
|
|
|
|
smmu_writel(smmu, SMMU_PTC_FLUSH_TYPE_ALL, SMMU_PTC_FLUSH);
|
|
|
|
}
|
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
static inline void smmu_flush_ptc(struct tegra_smmu *smmu, dma_addr_t dma,
|
2014-04-16 00:24:44 -07:00
|
|
|
unsigned long offset)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2014-04-16 00:24:44 -07:00
|
|
|
u32 value;
|
|
|
|
|
2015-07-27 05:29:41 -07:00
|
|
|
offset &= ~(smmu->mc->soc->atom_size - 1);
|
2014-04-16 00:24:44 -07:00
|
|
|
|
2015-07-27 05:29:41 -07:00
|
|
|
if (smmu->mc->soc->num_address_bits > 32) {
|
2015-07-27 05:29:52 -07:00
|
|
|
#ifdef CONFIG_ARCH_DMA_ADDR_T_64BIT
|
|
|
|
value = (dma >> 32) & SMMU_PTC_FLUSH_HI_MASK;
|
2014-04-16 00:24:44 -07:00
|
|
|
#else
|
2015-07-27 05:29:41 -07:00
|
|
|
value = 0;
|
2014-04-16 00:24:44 -07:00
|
|
|
#endif
|
2015-07-27 05:29:41 -07:00
|
|
|
smmu_writel(smmu, value, SMMU_PTC_FLUSH_HI);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
2014-04-16 00:24:44 -07:00
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
value = (dma + offset) | SMMU_PTC_FLUSH_TYPE_ADR;
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu_writel(smmu, value, SMMU_PTC_FLUSH);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static inline void smmu_flush_tlb(struct tegra_smmu *smmu)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu_writel(smmu, SMMU_TLB_FLUSH_VA_MATCH_ALL, SMMU_TLB_FLUSH);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static inline void smmu_flush_tlb_asid(struct tegra_smmu *smmu,
|
|
|
|
unsigned long asid)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2014-04-16 00:24:44 -07:00
|
|
|
u32 value;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2019-03-06 15:50:07 -07:00
|
|
|
if (smmu->soc->num_asids == 4)
|
|
|
|
value = (asid & 0x3) << 29;
|
|
|
|
else
|
|
|
|
value = (asid & 0x7f) << 24;
|
|
|
|
|
|
|
|
value |= SMMU_TLB_FLUSH_ASID_MATCH | SMMU_TLB_FLUSH_VA_MATCH_ALL;
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu_writel(smmu, value, SMMU_TLB_FLUSH);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static inline void smmu_flush_tlb_section(struct tegra_smmu *smmu,
|
|
|
|
unsigned long asid,
|
|
|
|
unsigned long iova)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2014-04-16 00:24:44 -07:00
|
|
|
u32 value;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2019-03-06 15:50:07 -07:00
|
|
|
if (smmu->soc->num_asids == 4)
|
|
|
|
value = (asid & 0x3) << 29;
|
|
|
|
else
|
|
|
|
value = (asid & 0x7f) << 24;
|
|
|
|
|
|
|
|
value |= SMMU_TLB_FLUSH_ASID_MATCH | SMMU_TLB_FLUSH_VA_SECTION(iova);
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu_writel(smmu, value, SMMU_TLB_FLUSH);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static inline void smmu_flush_tlb_group(struct tegra_smmu *smmu,
|
|
|
|
unsigned long asid,
|
|
|
|
unsigned long iova)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2014-04-16 00:24:44 -07:00
|
|
|
u32 value;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2019-03-06 15:50:07 -07:00
|
|
|
if (smmu->soc->num_asids == 4)
|
|
|
|
value = (asid & 0x3) << 29;
|
|
|
|
else
|
|
|
|
value = (asid & 0x7f) << 24;
|
|
|
|
|
|
|
|
value |= SMMU_TLB_FLUSH_ASID_MATCH | SMMU_TLB_FLUSH_VA_GROUP(iova);
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu_writel(smmu, value, SMMU_TLB_FLUSH);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static inline void smmu_flush(struct tegra_smmu *smmu)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2019-10-16 04:50:24 -07:00
|
|
|
smmu_readl(smmu, SMMU_PTB_ASID);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static int tegra_smmu_alloc_asid(struct tegra_smmu *smmu, unsigned int *idp)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2014-04-16 00:24:44 -07:00
|
|
|
unsigned long id;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
id = find_first_zero_bit(smmu->asids, smmu->soc->num_asids);
|
2020-11-25 03:10:10 -07:00
|
|
|
if (id >= smmu->soc->num_asids)
|
2014-04-16 00:24:44 -07:00
|
|
|
return -ENOSPC;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
set_bit(id, smmu->asids);
|
|
|
|
*idp = id;
|
|
|
|
|
|
|
|
return 0;
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static void tegra_smmu_free_asid(struct tegra_smmu *smmu, unsigned int id)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2014-04-16 00:24:44 -07:00
|
|
|
clear_bit(id, smmu->asids);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
2014-04-16 00:24:44 -07:00
|
|
|
|
2023-09-13 06:43:56 -07:00
|
|
|
static struct iommu_domain *tegra_smmu_domain_alloc_paging(struct device *dev)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2014-04-16 00:24:44 -07:00
|
|
|
struct tegra_smmu_as *as;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
as = kzalloc(sizeof(*as), GFP_KERNEL);
|
|
|
|
if (!as)
|
2015-03-26 05:43:12 -07:00
|
|
|
return NULL;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
as->attr = SMMU_PD_READABLE | SMMU_PD_WRITABLE | SMMU_PD_NONSECURE;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2024-04-12 17:25:20 -07:00
|
|
|
as->pd = __iommu_alloc_pages(GFP_KERNEL | __GFP_DMA, 0);
|
2014-04-16 00:24:44 -07:00
|
|
|
if (!as->pd) {
|
|
|
|
kfree(as);
|
2015-03-26 05:43:12 -07:00
|
|
|
return NULL;
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
2012-07-02 04:26:38 -07:00
|
|
|
|
2015-07-27 05:29:31 -07:00
|
|
|
as->count = kcalloc(SMMU_NUM_PDE, sizeof(u32), GFP_KERNEL);
|
2014-04-16 00:24:44 -07:00
|
|
|
if (!as->count) {
|
2024-04-12 17:25:20 -07:00
|
|
|
__iommu_free_pages(as->pd, 0);
|
2014-04-16 00:24:44 -07:00
|
|
|
kfree(as);
|
2015-03-26 05:43:12 -07:00
|
|
|
return NULL;
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
2012-07-02 04:26:38 -07:00
|
|
|
|
2015-07-27 05:29:26 -07:00
|
|
|
as->pts = kcalloc(SMMU_NUM_PDE, sizeof(*as->pts), GFP_KERNEL);
|
|
|
|
if (!as->pts) {
|
2015-07-27 05:29:31 -07:00
|
|
|
kfree(as->count);
|
2024-04-12 17:25:20 -07:00
|
|
|
__iommu_free_pages(as->pd, 0);
|
2015-07-27 05:29:26 -07:00
|
|
|
kfree(as);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2020-09-01 13:37:30 -07:00
|
|
|
spin_lock_init(&as->lock);
|
|
|
|
|
2015-03-27 03:07:25 -07:00
|
|
|
/* setup aperture */
|
2015-04-02 04:33:19 -07:00
|
|
|
as->domain.geometry.aperture_start = 0;
|
|
|
|
as->domain.geometry.aperture_end = 0xffffffff;
|
|
|
|
as->domain.geometry.force_aperture = true;
|
2012-07-17 02:47:14 -07:00
|
|
|
|
2015-03-26 05:43:12 -07:00
|
|
|
return &as->domain;
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2015-03-26 05:43:12 -07:00
|
|
|
static void tegra_smmu_domain_free(struct iommu_domain *domain)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2015-03-26 05:43:12 -07:00
|
|
|
struct tegra_smmu_as *as = to_smmu_as(domain);
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
/* TODO: free page directory and page tables */
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2019-03-06 15:50:08 -07:00
|
|
|
WARN_ON_ONCE(as->use_count);
|
|
|
|
kfree(as->count);
|
|
|
|
kfree(as->pts);
|
2014-04-16 00:24:44 -07:00
|
|
|
kfree(as);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static const struct tegra_smmu_swgroup *
|
|
|
|
tegra_smmu_find_swgroup(struct tegra_smmu *smmu, unsigned int swgroup)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2014-04-16 00:24:44 -07:00
|
|
|
const struct tegra_smmu_swgroup *group = NULL;
|
|
|
|
unsigned int i;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
for (i = 0; i < smmu->soc->num_swgroups; i++) {
|
|
|
|
if (smmu->soc->swgroups[i].swgroup == swgroup) {
|
|
|
|
group = &smmu->soc->swgroups[i];
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
return group;
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static void tegra_smmu_enable(struct tegra_smmu *smmu, unsigned int swgroup,
|
|
|
|
unsigned int asid)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2014-04-16 00:24:44 -07:00
|
|
|
const struct tegra_smmu_swgroup *group;
|
|
|
|
unsigned int i;
|
|
|
|
u32 value;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2019-10-16 04:50:25 -07:00
|
|
|
group = tegra_smmu_find_swgroup(smmu, swgroup);
|
|
|
|
if (group) {
|
|
|
|
value = smmu_readl(smmu, group->reg);
|
|
|
|
value &= ~SMMU_ASID_MASK;
|
|
|
|
value |= SMMU_ASID_VALUE(asid);
|
|
|
|
value |= SMMU_ASID_ENABLE;
|
|
|
|
smmu_writel(smmu, value, group->reg);
|
|
|
|
} else {
|
|
|
|
pr_warn("%s group from swgroup %u not found\n", __func__,
|
|
|
|
swgroup);
|
|
|
|
/* No point moving ahead if group was not found */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
for (i = 0; i < smmu->soc->num_clients; i++) {
|
|
|
|
const struct tegra_mc_client *client = &smmu->soc->clients[i];
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
if (client->swgroup != swgroup)
|
|
|
|
continue;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2021-06-02 09:32:51 -07:00
|
|
|
value = smmu_readl(smmu, client->regs.smmu.reg);
|
|
|
|
value |= BIT(client->regs.smmu.bit);
|
|
|
|
smmu_writel(smmu, value, client->regs.smmu.reg);
|
2014-04-16 00:24:44 -07:00
|
|
|
}
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static void tegra_smmu_disable(struct tegra_smmu *smmu, unsigned int swgroup,
|
|
|
|
unsigned int asid)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2014-04-16 00:24:44 -07:00
|
|
|
const struct tegra_smmu_swgroup *group;
|
|
|
|
unsigned int i;
|
|
|
|
u32 value;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
group = tegra_smmu_find_swgroup(smmu, swgroup);
|
|
|
|
if (group) {
|
|
|
|
value = smmu_readl(smmu, group->reg);
|
|
|
|
value &= ~SMMU_ASID_MASK;
|
|
|
|
value |= SMMU_ASID_VALUE(asid);
|
|
|
|
value &= ~SMMU_ASID_ENABLE;
|
|
|
|
smmu_writel(smmu, value, group->reg);
|
|
|
|
}
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
for (i = 0; i < smmu->soc->num_clients; i++) {
|
|
|
|
const struct tegra_mc_client *client = &smmu->soc->clients[i];
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
if (client->swgroup != swgroup)
|
|
|
|
continue;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2021-06-02 09:32:51 -07:00
|
|
|
value = smmu_readl(smmu, client->regs.smmu.reg);
|
|
|
|
value &= ~BIT(client->regs.smmu.bit);
|
|
|
|
smmu_writel(smmu, value, client->regs.smmu.reg);
|
2014-04-16 00:24:44 -07:00
|
|
|
}
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static int tegra_smmu_as_prepare(struct tegra_smmu *smmu,
|
|
|
|
struct tegra_smmu_as *as)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2014-04-16 00:24:44 -07:00
|
|
|
u32 value;
|
2020-11-25 03:10:10 -07:00
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
mutex_lock(&smmu->lock);
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
if (as->use_count > 0) {
|
|
|
|
as->use_count++;
|
2020-11-25 03:10:10 -07:00
|
|
|
goto unlock;
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
as->pd_dma = dma_map_page(smmu->dev, as->pd, 0, SMMU_SIZE_PD,
|
|
|
|
DMA_TO_DEVICE);
|
2020-11-25 03:10:10 -07:00
|
|
|
if (dma_mapping_error(smmu->dev, as->pd_dma)) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto unlock;
|
|
|
|
}
|
2015-07-27 05:29:52 -07:00
|
|
|
|
|
|
|
/* We can't handle 64-bit DMA addresses */
|
|
|
|
if (!smmu_dma_addr_valid(smmu, as->pd_dma)) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto err_unmap;
|
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
err = tegra_smmu_alloc_asid(smmu, &as->id);
|
|
|
|
if (err < 0)
|
2015-07-27 05:29:52 -07:00
|
|
|
goto err_unmap;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
smmu_flush_ptc(smmu, as->pd_dma, 0);
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu_flush_tlb_asid(smmu, as->id);
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu_writel(smmu, as->id & 0x7f, SMMU_PTB_ASID);
|
2015-07-27 05:29:52 -07:00
|
|
|
value = SMMU_PTB_DATA_VALUE(as->pd_dma, as->attr);
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu_writel(smmu, value, SMMU_PTB_DATA);
|
|
|
|
smmu_flush(smmu);
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
as->smmu = smmu;
|
|
|
|
as->use_count++;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2020-11-25 03:10:10 -07:00
|
|
|
mutex_unlock(&smmu->lock);
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
return 0;
|
2015-07-27 05:29:52 -07:00
|
|
|
|
|
|
|
err_unmap:
|
|
|
|
dma_unmap_page(smmu->dev, as->pd_dma, SMMU_SIZE_PD, DMA_TO_DEVICE);
|
2020-11-25 03:10:10 -07:00
|
|
|
unlock:
|
|
|
|
mutex_unlock(&smmu->lock);
|
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
return err;
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static void tegra_smmu_as_unprepare(struct tegra_smmu *smmu,
|
|
|
|
struct tegra_smmu_as *as)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2020-11-25 03:10:10 -07:00
|
|
|
mutex_lock(&smmu->lock);
|
|
|
|
|
|
|
|
if (--as->use_count > 0) {
|
|
|
|
mutex_unlock(&smmu->lock);
|
2014-04-16 00:24:44 -07:00
|
|
|
return;
|
2020-11-25 03:10:10 -07:00
|
|
|
}
|
2014-04-16 00:24:44 -07:00
|
|
|
|
|
|
|
tegra_smmu_free_asid(smmu, as->id);
|
2015-07-27 05:29:52 -07:00
|
|
|
|
|
|
|
dma_unmap_page(smmu->dev, as->pd_dma, SMMU_SIZE_PD, DMA_TO_DEVICE);
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
as->smmu = NULL;
|
2020-11-25 03:10:10 -07:00
|
|
|
|
|
|
|
mutex_unlock(&smmu->lock);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static int tegra_smmu_attach_dev(struct iommu_domain *domain,
|
|
|
|
struct device *dev)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2020-11-25 03:10:11 -07:00
|
|
|
struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev);
|
2020-06-25 06:08:29 -07:00
|
|
|
struct tegra_smmu *smmu = dev_iommu_priv_get(dev);
|
2015-03-26 05:43:12 -07:00
|
|
|
struct tegra_smmu_as *as = to_smmu_as(domain);
|
2020-11-25 03:10:11 -07:00
|
|
|
unsigned int index;
|
|
|
|
int err;
|
2012-07-29 22:39:18 -07:00
|
|
|
|
2020-11-25 03:10:11 -07:00
|
|
|
if (!fwspec)
|
|
|
|
return -ENOENT;
|
2012-07-29 22:39:18 -07:00
|
|
|
|
2020-11-25 03:10:11 -07:00
|
|
|
for (index = 0; index < fwspec->num_ids; index++) {
|
2014-04-16 00:24:44 -07:00
|
|
|
err = tegra_smmu_as_prepare(smmu, as);
|
2020-11-25 03:10:11 -07:00
|
|
|
if (err)
|
|
|
|
goto disable;
|
2014-04-16 00:24:44 -07:00
|
|
|
|
2020-11-25 03:10:11 -07:00
|
|
|
tegra_smmu_enable(smmu, fwspec->ids[index], as->id);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
if (index == 0)
|
|
|
|
return -ENODEV;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
return 0;
|
2020-11-25 03:10:11 -07:00
|
|
|
|
|
|
|
disable:
|
|
|
|
while (index--) {
|
|
|
|
tegra_smmu_disable(smmu, fwspec->ids[index], as->id);
|
|
|
|
tegra_smmu_as_unprepare(smmu, as);
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
2014-04-16 00:24:44 -07:00
|
|
|
}
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2023-09-13 06:43:44 -07:00
|
|
|
static int tegra_smmu_identity_attach(struct iommu_domain *identity_domain,
|
|
|
|
struct device *dev)
|
2014-04-16 00:24:44 -07:00
|
|
|
{
|
2023-01-09 19:54:06 -07:00
|
|
|
struct iommu_domain *domain = iommu_get_domain_for_dev(dev);
|
2020-11-25 03:10:11 -07:00
|
|
|
struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev);
|
2023-09-13 06:43:44 -07:00
|
|
|
struct tegra_smmu_as *as;
|
|
|
|
struct tegra_smmu *smmu;
|
2020-11-25 03:10:11 -07:00
|
|
|
unsigned int index;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2020-11-25 03:10:11 -07:00
|
|
|
if (!fwspec)
|
2023-09-13 06:43:44 -07:00
|
|
|
return -ENODEV;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2023-09-13 06:43:44 -07:00
|
|
|
if (domain == identity_domain || !domain)
|
|
|
|
return 0;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2023-09-13 06:43:44 -07:00
|
|
|
as = to_smmu_as(domain);
|
|
|
|
smmu = as->smmu;
|
2020-11-25 03:10:11 -07:00
|
|
|
for (index = 0; index < fwspec->num_ids; index++) {
|
|
|
|
tegra_smmu_disable(smmu, fwspec->ids[index], as->id);
|
2014-04-16 00:24:44 -07:00
|
|
|
tegra_smmu_as_unprepare(smmu, as);
|
|
|
|
}
|
2023-09-13 06:43:44 -07:00
|
|
|
return 0;
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2023-09-13 06:43:44 -07:00
|
|
|
static struct iommu_domain_ops tegra_smmu_identity_ops = {
|
|
|
|
.attach_dev = tegra_smmu_identity_attach,
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct iommu_domain tegra_smmu_identity_domain = {
|
|
|
|
.type = IOMMU_DOMAIN_IDENTITY,
|
|
|
|
.ops = &tegra_smmu_identity_ops,
|
|
|
|
};
|
|
|
|
|
2015-07-27 05:30:12 -07:00
|
|
|
static void tegra_smmu_set_pde(struct tegra_smmu_as *as, unsigned long iova,
|
|
|
|
u32 value)
|
|
|
|
{
|
|
|
|
unsigned int pd_index = iova_pd_index(iova);
|
|
|
|
struct tegra_smmu *smmu = as->smmu;
|
|
|
|
u32 *pd = page_address(as->pd);
|
|
|
|
unsigned long offset = pd_index * sizeof(*pd);
|
|
|
|
|
|
|
|
/* Set the page directory entry first */
|
|
|
|
pd[pd_index] = value;
|
|
|
|
|
|
|
|
/* The flush the page directory entry from caches */
|
|
|
|
dma_sync_single_range_for_device(smmu->dev, as->pd_dma, offset,
|
|
|
|
sizeof(*pd), DMA_TO_DEVICE);
|
|
|
|
|
|
|
|
/* And flush the iommu */
|
|
|
|
smmu_flush_ptc(smmu, as->pd_dma, offset);
|
|
|
|
smmu_flush_tlb_section(smmu, as->id, iova);
|
|
|
|
smmu_flush(smmu);
|
|
|
|
}
|
|
|
|
|
2015-07-27 05:29:21 -07:00
|
|
|
static u32 *tegra_smmu_pte_offset(struct page *pt_page, unsigned long iova)
|
|
|
|
{
|
|
|
|
u32 *pt = page_address(pt_page);
|
|
|
|
|
|
|
|
return pt + iova_pt_index(iova);
|
|
|
|
}
|
|
|
|
|
|
|
|
static u32 *tegra_smmu_pte_lookup(struct tegra_smmu_as *as, unsigned long iova,
|
2015-07-27 05:29:52 -07:00
|
|
|
dma_addr_t *dmap)
|
2015-07-27 05:29:21 -07:00
|
|
|
{
|
|
|
|
unsigned int pd_index = iova_pd_index(iova);
|
2019-10-16 04:50:26 -07:00
|
|
|
struct tegra_smmu *smmu = as->smmu;
|
2015-07-27 05:29:21 -07:00
|
|
|
struct page *pt_page;
|
2015-07-27 05:29:52 -07:00
|
|
|
u32 *pd;
|
2015-07-27 05:29:21 -07:00
|
|
|
|
2015-07-27 05:29:26 -07:00
|
|
|
pt_page = as->pts[pd_index];
|
|
|
|
if (!pt_page)
|
2015-07-27 05:29:21 -07:00
|
|
|
return NULL;
|
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
pd = page_address(as->pd);
|
2019-10-16 04:50:26 -07:00
|
|
|
*dmap = smmu_pde_to_dma(smmu, pd[pd_index]);
|
2015-07-27 05:29:21 -07:00
|
|
|
|
|
|
|
return tegra_smmu_pte_offset(pt_page, iova);
|
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static u32 *as_get_pte(struct tegra_smmu_as *as, dma_addr_t iova,
|
2020-09-01 13:37:30 -07:00
|
|
|
dma_addr_t *dmap, struct page *page)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
2015-07-27 05:29:16 -07:00
|
|
|
unsigned int pde = iova_pd_index(iova);
|
2014-04-16 00:24:44 -07:00
|
|
|
struct tegra_smmu *smmu = as->smmu;
|
|
|
|
|
2015-07-27 05:29:26 -07:00
|
|
|
if (!as->pts[pde]) {
|
2015-07-27 05:29:52 -07:00
|
|
|
dma_addr_t dma;
|
|
|
|
|
|
|
|
dma = dma_map_page(smmu->dev, page, 0, SMMU_SIZE_PT,
|
|
|
|
DMA_TO_DEVICE);
|
|
|
|
if (dma_mapping_error(smmu->dev, dma)) {
|
2024-04-12 17:25:20 -07:00
|
|
|
__iommu_free_pages(page, 0);
|
2015-07-27 05:29:52 -07:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!smmu_dma_addr_valid(smmu, dma)) {
|
|
|
|
dma_unmap_page(smmu->dev, dma, SMMU_SIZE_PT,
|
|
|
|
DMA_TO_DEVICE);
|
2024-04-12 17:25:20 -07:00
|
|
|
__iommu_free_pages(page, 0);
|
2015-07-27 05:29:52 -07:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2015-07-27 05:29:26 -07:00
|
|
|
as->pts[pde] = page;
|
|
|
|
|
2015-07-27 05:30:12 -07:00
|
|
|
tegra_smmu_set_pde(as, iova, SMMU_MK_PDE(dma, SMMU_PDE_ATTR |
|
|
|
|
SMMU_PDE_NEXT));
|
2015-07-27 05:29:52 -07:00
|
|
|
|
|
|
|
*dmap = dma;
|
2014-04-16 00:24:44 -07:00
|
|
|
} else {
|
2015-07-27 05:30:12 -07:00
|
|
|
u32 *pd = page_address(as->pd);
|
|
|
|
|
2019-10-16 04:50:26 -07:00
|
|
|
*dmap = smmu_pde_to_dma(smmu, pd[pde]);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2015-08-06 05:56:39 -07:00
|
|
|
return tegra_smmu_pte_offset(as->pts[pde], iova);
|
|
|
|
}
|
2015-07-27 05:29:21 -07:00
|
|
|
|
2015-08-06 05:56:39 -07:00
|
|
|
static void tegra_smmu_pte_get_use(struct tegra_smmu_as *as, unsigned long iova)
|
|
|
|
{
|
|
|
|
unsigned int pd_index = iova_pd_index(iova);
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2015-08-06 05:56:39 -07:00
|
|
|
as->count[pd_index]++;
|
2014-04-16 00:24:44 -07:00
|
|
|
}
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2015-07-27 05:29:05 -07:00
|
|
|
static void tegra_smmu_pte_put_use(struct tegra_smmu_as *as, unsigned long iova)
|
2012-08-02 01:46:40 -07:00
|
|
|
{
|
2015-07-27 05:29:16 -07:00
|
|
|
unsigned int pde = iova_pd_index(iova);
|
2015-07-27 05:29:26 -07:00
|
|
|
struct page *page = as->pts[pde];
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
/*
|
|
|
|
* When no entries in this page table are used anymore, return the
|
|
|
|
* memory page to the system.
|
|
|
|
*/
|
2015-07-27 05:29:31 -07:00
|
|
|
if (--as->count[pde] == 0) {
|
2015-07-27 05:30:12 -07:00
|
|
|
struct tegra_smmu *smmu = as->smmu;
|
|
|
|
u32 *pd = page_address(as->pd);
|
2019-10-16 04:50:26 -07:00
|
|
|
dma_addr_t pte_dma = smmu_pde_to_dma(smmu, pd[pde]);
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2015-07-27 05:30:12 -07:00
|
|
|
tegra_smmu_set_pde(as, iova, 0);
|
2015-07-27 05:29:05 -07:00
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
dma_unmap_page(smmu->dev, pte_dma, SMMU_SIZE_PT, DMA_TO_DEVICE);
|
2024-04-12 17:25:20 -07:00
|
|
|
__iommu_free_pages(page, 0);
|
2015-07-27 05:29:26 -07:00
|
|
|
as->pts[pde] = NULL;
|
2012-08-02 01:46:40 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-27 05:29:10 -07:00
|
|
|
static void tegra_smmu_set_pte(struct tegra_smmu_as *as, unsigned long iova,
|
2015-07-27 05:29:52 -07:00
|
|
|
u32 *pte, dma_addr_t pte_dma, u32 val)
|
2015-07-27 05:29:10 -07:00
|
|
|
{
|
|
|
|
struct tegra_smmu *smmu = as->smmu;
|
2020-09-11 00:16:41 -07:00
|
|
|
unsigned long offset = SMMU_OFFSET_IN_PAGE(pte);
|
2015-07-27 05:29:10 -07:00
|
|
|
|
|
|
|
*pte = val;
|
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
dma_sync_single_range_for_device(smmu->dev, pte_dma, offset,
|
|
|
|
4, DMA_TO_DEVICE);
|
|
|
|
smmu_flush_ptc(smmu, pte_dma, offset);
|
2015-07-27 05:29:10 -07:00
|
|
|
smmu_flush_tlb_group(smmu, as->id, iova);
|
|
|
|
smmu_flush(smmu);
|
|
|
|
}
|
|
|
|
|
2020-09-01 13:37:30 -07:00
|
|
|
static struct page *as_get_pde_page(struct tegra_smmu_as *as,
|
|
|
|
unsigned long iova, gfp_t gfp,
|
|
|
|
unsigned long *flags)
|
|
|
|
{
|
|
|
|
unsigned int pde = iova_pd_index(iova);
|
|
|
|
struct page *page = as->pts[pde];
|
|
|
|
|
|
|
|
/* at first check whether allocation needs to be done at all */
|
|
|
|
if (page)
|
|
|
|
return page;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* In order to prevent exhaustion of the atomic memory pool, we
|
|
|
|
* allocate page in a sleeping context if GFP flags permit. Hence
|
|
|
|
* spinlock needs to be unlocked and re-locked after allocation.
|
|
|
|
*/
|
2023-01-13 04:12:17 -07:00
|
|
|
if (gfpflags_allow_blocking(gfp))
|
2020-09-01 13:37:30 -07:00
|
|
|
spin_unlock_irqrestore(&as->lock, *flags);
|
|
|
|
|
2024-04-12 17:25:20 -07:00
|
|
|
page = __iommu_alloc_pages(gfp | __GFP_DMA, 0);
|
2020-09-01 13:37:30 -07:00
|
|
|
|
2023-01-13 04:12:17 -07:00
|
|
|
if (gfpflags_allow_blocking(gfp))
|
2020-09-01 13:37:30 -07:00
|
|
|
spin_lock_irqsave(&as->lock, *flags);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* In a case of blocking allocation, a concurrent mapping may win
|
|
|
|
* the PDE allocation. In this case the allocated page isn't needed
|
|
|
|
* if allocation succeeded and the allocation failure isn't fatal.
|
|
|
|
*/
|
|
|
|
if (as->pts[pde]) {
|
|
|
|
if (page)
|
2024-04-12 17:25:20 -07:00
|
|
|
__iommu_free_pages(page, 0);
|
2020-09-01 13:37:30 -07:00
|
|
|
|
|
|
|
page = as->pts[pde];
|
|
|
|
}
|
|
|
|
|
|
|
|
return page;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
__tegra_smmu_map(struct iommu_domain *domain, unsigned long iova,
|
|
|
|
phys_addr_t paddr, size_t size, int prot, gfp_t gfp,
|
|
|
|
unsigned long *flags)
|
2012-08-02 01:46:40 -07:00
|
|
|
{
|
2015-03-26 05:43:12 -07:00
|
|
|
struct tegra_smmu_as *as = to_smmu_as(domain);
|
2015-07-27 05:29:52 -07:00
|
|
|
dma_addr_t pte_dma;
|
2020-09-01 13:37:30 -07:00
|
|
|
struct page *page;
|
2019-03-06 15:50:09 -07:00
|
|
|
u32 pte_attrs;
|
2014-04-16 00:24:44 -07:00
|
|
|
u32 *pte;
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2020-09-01 13:37:30 -07:00
|
|
|
page = as_get_pde_page(as, iova, gfp, flags);
|
|
|
|
if (!page)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
pte = as_get_pte(as, iova, &pte_dma, page);
|
2014-04-16 00:24:44 -07:00
|
|
|
if (!pte)
|
|
|
|
return -ENOMEM;
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2015-08-06 05:56:39 -07:00
|
|
|
/* If we aren't overwriting a pre-existing entry, increment use */
|
|
|
|
if (*pte == 0)
|
|
|
|
tegra_smmu_pte_get_use(as, iova);
|
|
|
|
|
2019-03-06 15:50:09 -07:00
|
|
|
pte_attrs = SMMU_PTE_NONSECURE;
|
|
|
|
|
|
|
|
if (prot & IOMMU_READ)
|
|
|
|
pte_attrs |= SMMU_PTE_READABLE;
|
|
|
|
|
|
|
|
if (prot & IOMMU_WRITE)
|
|
|
|
pte_attrs |= SMMU_PTE_WRITABLE;
|
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
tegra_smmu_set_pte(as, iova, pte, pte_dma,
|
2020-09-11 00:16:41 -07:00
|
|
|
SMMU_PHYS_PFN(paddr) | pte_attrs);
|
2012-08-02 01:46:40 -07:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-09-01 13:37:30 -07:00
|
|
|
static size_t
|
|
|
|
__tegra_smmu_unmap(struct iommu_domain *domain, unsigned long iova,
|
|
|
|
size_t size, struct iommu_iotlb_gather *gather)
|
2012-08-02 01:46:40 -07:00
|
|
|
{
|
2015-03-26 05:43:12 -07:00
|
|
|
struct tegra_smmu_as *as = to_smmu_as(domain);
|
2015-07-27 05:29:52 -07:00
|
|
|
dma_addr_t pte_dma;
|
2014-04-16 00:24:44 -07:00
|
|
|
u32 *pte;
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
pte = tegra_smmu_pte_lookup(as, iova, &pte_dma);
|
2015-07-27 05:29:05 -07:00
|
|
|
if (!pte || !*pte)
|
2014-04-16 00:24:44 -07:00
|
|
|
return 0;
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
tegra_smmu_set_pte(as, iova, pte, pte_dma, 0);
|
2015-07-27 05:29:05 -07:00
|
|
|
tegra_smmu_pte_put_use(as, iova);
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
return size;
|
2012-08-02 01:46:40 -07:00
|
|
|
}
|
|
|
|
|
2020-09-01 13:37:30 -07:00
|
|
|
static int tegra_smmu_map(struct iommu_domain *domain, unsigned long iova,
|
2023-09-12 09:18:42 -07:00
|
|
|
phys_addr_t paddr, size_t size, size_t count,
|
|
|
|
int prot, gfp_t gfp, size_t *mapped)
|
2020-09-01 13:37:30 -07:00
|
|
|
{
|
|
|
|
struct tegra_smmu_as *as = to_smmu_as(domain);
|
|
|
|
unsigned long flags;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&as->lock, flags);
|
|
|
|
ret = __tegra_smmu_map(domain, iova, paddr, size, prot, gfp, &flags);
|
|
|
|
spin_unlock_irqrestore(&as->lock, flags);
|
|
|
|
|
2023-09-12 09:18:42 -07:00
|
|
|
if (!ret)
|
|
|
|
*mapped = size;
|
|
|
|
|
2020-09-01 13:37:30 -07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static size_t tegra_smmu_unmap(struct iommu_domain *domain, unsigned long iova,
|
2023-09-12 09:18:42 -07:00
|
|
|
size_t size, size_t count, struct iommu_iotlb_gather *gather)
|
2020-09-01 13:37:30 -07:00
|
|
|
{
|
|
|
|
struct tegra_smmu_as *as = to_smmu_as(domain);
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&as->lock, flags);
|
|
|
|
size = __tegra_smmu_unmap(domain, iova, size, gather);
|
|
|
|
spin_unlock_irqrestore(&as->lock, flags);
|
|
|
|
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static phys_addr_t tegra_smmu_iova_to_phys(struct iommu_domain *domain,
|
|
|
|
dma_addr_t iova)
|
2012-08-02 01:46:40 -07:00
|
|
|
{
|
2015-03-26 05:43:12 -07:00
|
|
|
struct tegra_smmu_as *as = to_smmu_as(domain);
|
2014-04-16 00:24:44 -07:00
|
|
|
unsigned long pfn;
|
2015-07-27 05:29:52 -07:00
|
|
|
dma_addr_t pte_dma;
|
2014-04-16 00:24:44 -07:00
|
|
|
u32 *pte;
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2015-07-27 05:29:52 -07:00
|
|
|
pte = tegra_smmu_pte_lookup(as, iova, &pte_dma);
|
2015-07-27 05:29:00 -07:00
|
|
|
if (!pte || !*pte)
|
|
|
|
return 0;
|
|
|
|
|
2015-03-27 03:07:27 -07:00
|
|
|
pfn = *pte & as->smmu->pfn_mask;
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2020-09-11 00:16:42 -07:00
|
|
|
return SMMU_PFN_PHYS(pfn) + SMMU_OFFSET_IN_PAGE(iova);
|
2012-08-02 01:46:40 -07:00
|
|
|
}
|
|
|
|
|
iommu/tegra-smmu: Fix mc errors on tegra124-nyan
Commit 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
removed certain hack in the tegra_smmu_probe() by relying on IOMMU core to
of_xlate SMMU's SID per device, so as to get rid of tegra_smmu_find() and
tegra_smmu_configure() that are typically done in the IOMMU core also.
This approach works for both existing devices that have DT nodes and other
devices (like PCI device) that don't exist in DT, on Tegra210 and Tegra3
upon testing. However, Page Fault errors are reported on tegra124-Nyan:
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
EMEM address decode error (SMMU translation error [--S])
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
Page fault (SMMU translation error [--S])
After debugging, I found that the mentioned commit changed some function
callback sequence of tegra-smmu's, resulting in enabling SMMU for display
client before display driver gets initialized. I couldn't reproduce exact
same issue on Tegra210 as Tegra124 (arm-32) differs at arch-level code.
Actually this Page Fault is a known issue, as on most of Tegra platforms,
display gets enabled by the bootloader for the splash screen feature, so
it keeps filling the framebuffer memory. A proper fix to this issue is to
1:1 linear map the framebuffer memory to IOVA space so the SMMU will have
the same address as the physical address in its page table. Yet, Thierry
has been working on the solution above for a year, and it hasn't merged.
Therefore, let's partially revert the mentioned commit to fix the errors.
The reason why we do a partial revert here is that we can still set priv
in ->of_xlate() callback for PCI devices. Meanwhile, devices existing in
DT, like display, will go through tegra_smmu_configure() at the stage of
bus_set_iommu() when SMMU gets probed(), as what it did before we merged
the mentioned commit.
Once we have the linear map solution for framebuffer memory, this change
can be cleaned away.
[Big thank to Guillaume who reported and helped debugging/verification]
Fixes: 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
Reported-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Signed-off-by: Nicolin Chen <nicoleotsuka@gmail.com>
Tested-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Acked-by: Thierry Reding <treding@nvidia.com>
Link: https://lore.kernel.org/r/20210218220702.1962-1-nicoleotsuka@gmail.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2021-02-18 15:07:02 -07:00
|
|
|
static struct tegra_smmu *tegra_smmu_find(struct device_node *np)
|
|
|
|
{
|
|
|
|
struct platform_device *pdev;
|
|
|
|
struct tegra_mc *mc;
|
|
|
|
|
|
|
|
pdev = of_find_device_by_node(np);
|
|
|
|
if (!pdev)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
mc = platform_get_drvdata(pdev);
|
2022-01-07 01:09:11 -07:00
|
|
|
if (!mc) {
|
|
|
|
put_device(&pdev->dev);
|
iommu/tegra-smmu: Fix mc errors on tegra124-nyan
Commit 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
removed certain hack in the tegra_smmu_probe() by relying on IOMMU core to
of_xlate SMMU's SID per device, so as to get rid of tegra_smmu_find() and
tegra_smmu_configure() that are typically done in the IOMMU core also.
This approach works for both existing devices that have DT nodes and other
devices (like PCI device) that don't exist in DT, on Tegra210 and Tegra3
upon testing. However, Page Fault errors are reported on tegra124-Nyan:
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
EMEM address decode error (SMMU translation error [--S])
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
Page fault (SMMU translation error [--S])
After debugging, I found that the mentioned commit changed some function
callback sequence of tegra-smmu's, resulting in enabling SMMU for display
client before display driver gets initialized. I couldn't reproduce exact
same issue on Tegra210 as Tegra124 (arm-32) differs at arch-level code.
Actually this Page Fault is a known issue, as on most of Tegra platforms,
display gets enabled by the bootloader for the splash screen feature, so
it keeps filling the framebuffer memory. A proper fix to this issue is to
1:1 linear map the framebuffer memory to IOVA space so the SMMU will have
the same address as the physical address in its page table. Yet, Thierry
has been working on the solution above for a year, and it hasn't merged.
Therefore, let's partially revert the mentioned commit to fix the errors.
The reason why we do a partial revert here is that we can still set priv
in ->of_xlate() callback for PCI devices. Meanwhile, devices existing in
DT, like display, will go through tegra_smmu_configure() at the stage of
bus_set_iommu() when SMMU gets probed(), as what it did before we merged
the mentioned commit.
Once we have the linear map solution for framebuffer memory, this change
can be cleaned away.
[Big thank to Guillaume who reported and helped debugging/verification]
Fixes: 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
Reported-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Signed-off-by: Nicolin Chen <nicoleotsuka@gmail.com>
Tested-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Acked-by: Thierry Reding <treding@nvidia.com>
Link: https://lore.kernel.org/r/20210218220702.1962-1-nicoleotsuka@gmail.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2021-02-18 15:07:02 -07:00
|
|
|
return NULL;
|
2022-01-07 01:09:11 -07:00
|
|
|
}
|
iommu/tegra-smmu: Fix mc errors on tegra124-nyan
Commit 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
removed certain hack in the tegra_smmu_probe() by relying on IOMMU core to
of_xlate SMMU's SID per device, so as to get rid of tegra_smmu_find() and
tegra_smmu_configure() that are typically done in the IOMMU core also.
This approach works for both existing devices that have DT nodes and other
devices (like PCI device) that don't exist in DT, on Tegra210 and Tegra3
upon testing. However, Page Fault errors are reported on tegra124-Nyan:
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
EMEM address decode error (SMMU translation error [--S])
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
Page fault (SMMU translation error [--S])
After debugging, I found that the mentioned commit changed some function
callback sequence of tegra-smmu's, resulting in enabling SMMU for display
client before display driver gets initialized. I couldn't reproduce exact
same issue on Tegra210 as Tegra124 (arm-32) differs at arch-level code.
Actually this Page Fault is a known issue, as on most of Tegra platforms,
display gets enabled by the bootloader for the splash screen feature, so
it keeps filling the framebuffer memory. A proper fix to this issue is to
1:1 linear map the framebuffer memory to IOVA space so the SMMU will have
the same address as the physical address in its page table. Yet, Thierry
has been working on the solution above for a year, and it hasn't merged.
Therefore, let's partially revert the mentioned commit to fix the errors.
The reason why we do a partial revert here is that we can still set priv
in ->of_xlate() callback for PCI devices. Meanwhile, devices existing in
DT, like display, will go through tegra_smmu_configure() at the stage of
bus_set_iommu() when SMMU gets probed(), as what it did before we merged
the mentioned commit.
Once we have the linear map solution for framebuffer memory, this change
can be cleaned away.
[Big thank to Guillaume who reported and helped debugging/verification]
Fixes: 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
Reported-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Signed-off-by: Nicolin Chen <nicoleotsuka@gmail.com>
Tested-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Acked-by: Thierry Reding <treding@nvidia.com>
Link: https://lore.kernel.org/r/20210218220702.1962-1-nicoleotsuka@gmail.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2021-02-18 15:07:02 -07:00
|
|
|
|
|
|
|
return mc->smmu;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int tegra_smmu_configure(struct tegra_smmu *smmu, struct device *dev,
|
2024-02-16 07:40:25 -07:00
|
|
|
const struct of_phandle_args *args)
|
iommu/tegra-smmu: Fix mc errors on tegra124-nyan
Commit 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
removed certain hack in the tegra_smmu_probe() by relying on IOMMU core to
of_xlate SMMU's SID per device, so as to get rid of tegra_smmu_find() and
tegra_smmu_configure() that are typically done in the IOMMU core also.
This approach works for both existing devices that have DT nodes and other
devices (like PCI device) that don't exist in DT, on Tegra210 and Tegra3
upon testing. However, Page Fault errors are reported on tegra124-Nyan:
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
EMEM address decode error (SMMU translation error [--S])
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
Page fault (SMMU translation error [--S])
After debugging, I found that the mentioned commit changed some function
callback sequence of tegra-smmu's, resulting in enabling SMMU for display
client before display driver gets initialized. I couldn't reproduce exact
same issue on Tegra210 as Tegra124 (arm-32) differs at arch-level code.
Actually this Page Fault is a known issue, as on most of Tegra platforms,
display gets enabled by the bootloader for the splash screen feature, so
it keeps filling the framebuffer memory. A proper fix to this issue is to
1:1 linear map the framebuffer memory to IOVA space so the SMMU will have
the same address as the physical address in its page table. Yet, Thierry
has been working on the solution above for a year, and it hasn't merged.
Therefore, let's partially revert the mentioned commit to fix the errors.
The reason why we do a partial revert here is that we can still set priv
in ->of_xlate() callback for PCI devices. Meanwhile, devices existing in
DT, like display, will go through tegra_smmu_configure() at the stage of
bus_set_iommu() when SMMU gets probed(), as what it did before we merged
the mentioned commit.
Once we have the linear map solution for framebuffer memory, this change
can be cleaned away.
[Big thank to Guillaume who reported and helped debugging/verification]
Fixes: 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
Reported-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Signed-off-by: Nicolin Chen <nicoleotsuka@gmail.com>
Tested-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Acked-by: Thierry Reding <treding@nvidia.com>
Link: https://lore.kernel.org/r/20210218220702.1962-1-nicoleotsuka@gmail.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2021-02-18 15:07:02 -07:00
|
|
|
{
|
|
|
|
const struct iommu_ops *ops = smmu->iommu.ops;
|
|
|
|
int err;
|
|
|
|
|
2024-07-12 08:55:43 -07:00
|
|
|
err = iommu_fwspec_init(dev, dev_fwnode(smmu->dev));
|
iommu/tegra-smmu: Fix mc errors on tegra124-nyan
Commit 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
removed certain hack in the tegra_smmu_probe() by relying on IOMMU core to
of_xlate SMMU's SID per device, so as to get rid of tegra_smmu_find() and
tegra_smmu_configure() that are typically done in the IOMMU core also.
This approach works for both existing devices that have DT nodes and other
devices (like PCI device) that don't exist in DT, on Tegra210 and Tegra3
upon testing. However, Page Fault errors are reported on tegra124-Nyan:
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
EMEM address decode error (SMMU translation error [--S])
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
Page fault (SMMU translation error [--S])
After debugging, I found that the mentioned commit changed some function
callback sequence of tegra-smmu's, resulting in enabling SMMU for display
client before display driver gets initialized. I couldn't reproduce exact
same issue on Tegra210 as Tegra124 (arm-32) differs at arch-level code.
Actually this Page Fault is a known issue, as on most of Tegra platforms,
display gets enabled by the bootloader for the splash screen feature, so
it keeps filling the framebuffer memory. A proper fix to this issue is to
1:1 linear map the framebuffer memory to IOVA space so the SMMU will have
the same address as the physical address in its page table. Yet, Thierry
has been working on the solution above for a year, and it hasn't merged.
Therefore, let's partially revert the mentioned commit to fix the errors.
The reason why we do a partial revert here is that we can still set priv
in ->of_xlate() callback for PCI devices. Meanwhile, devices existing in
DT, like display, will go through tegra_smmu_configure() at the stage of
bus_set_iommu() when SMMU gets probed(), as what it did before we merged
the mentioned commit.
Once we have the linear map solution for framebuffer memory, this change
can be cleaned away.
[Big thank to Guillaume who reported and helped debugging/verification]
Fixes: 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
Reported-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Signed-off-by: Nicolin Chen <nicoleotsuka@gmail.com>
Tested-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Acked-by: Thierry Reding <treding@nvidia.com>
Link: https://lore.kernel.org/r/20210218220702.1962-1-nicoleotsuka@gmail.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2021-02-18 15:07:02 -07:00
|
|
|
if (err < 0) {
|
|
|
|
dev_err(dev, "failed to initialize fwspec: %d\n", err);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = ops->of_xlate(dev, args);
|
|
|
|
if (err < 0) {
|
|
|
|
dev_err(dev, "failed to parse SW group ID: %d\n", err);
|
|
|
|
iommu_fwspec_free(dev);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-04-29 06:37:04 -07:00
|
|
|
static struct iommu_device *tegra_smmu_probe_device(struct device *dev)
|
2011-11-16 22:31:31 -07:00
|
|
|
{
|
iommu/tegra-smmu: Fix mc errors on tegra124-nyan
Commit 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
removed certain hack in the tegra_smmu_probe() by relying on IOMMU core to
of_xlate SMMU's SID per device, so as to get rid of tegra_smmu_find() and
tegra_smmu_configure() that are typically done in the IOMMU core also.
This approach works for both existing devices that have DT nodes and other
devices (like PCI device) that don't exist in DT, on Tegra210 and Tegra3
upon testing. However, Page Fault errors are reported on tegra124-Nyan:
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
EMEM address decode error (SMMU translation error [--S])
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
Page fault (SMMU translation error [--S])
After debugging, I found that the mentioned commit changed some function
callback sequence of tegra-smmu's, resulting in enabling SMMU for display
client before display driver gets initialized. I couldn't reproduce exact
same issue on Tegra210 as Tegra124 (arm-32) differs at arch-level code.
Actually this Page Fault is a known issue, as on most of Tegra platforms,
display gets enabled by the bootloader for the splash screen feature, so
it keeps filling the framebuffer memory. A proper fix to this issue is to
1:1 linear map the framebuffer memory to IOVA space so the SMMU will have
the same address as the physical address in its page table. Yet, Thierry
has been working on the solution above for a year, and it hasn't merged.
Therefore, let's partially revert the mentioned commit to fix the errors.
The reason why we do a partial revert here is that we can still set priv
in ->of_xlate() callback for PCI devices. Meanwhile, devices existing in
DT, like display, will go through tegra_smmu_configure() at the stage of
bus_set_iommu() when SMMU gets probed(), as what it did before we merged
the mentioned commit.
Once we have the linear map solution for framebuffer memory, this change
can be cleaned away.
[Big thank to Guillaume who reported and helped debugging/verification]
Fixes: 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
Reported-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Signed-off-by: Nicolin Chen <nicoleotsuka@gmail.com>
Tested-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Acked-by: Thierry Reding <treding@nvidia.com>
Link: https://lore.kernel.org/r/20210218220702.1962-1-nicoleotsuka@gmail.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2021-02-18 15:07:02 -07:00
|
|
|
struct device_node *np = dev->of_node;
|
|
|
|
struct tegra_smmu *smmu = NULL;
|
|
|
|
struct of_phandle_args args;
|
|
|
|
unsigned int index = 0;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
while (of_parse_phandle_with_args(np, "iommus", "#iommu-cells", index,
|
|
|
|
&args) == 0) {
|
|
|
|
smmu = tegra_smmu_find(args.np);
|
|
|
|
if (smmu) {
|
|
|
|
err = tegra_smmu_configure(smmu, dev, &args);
|
2014-04-16 00:24:44 -07:00
|
|
|
|
2021-03-12 08:54:39 -07:00
|
|
|
if (err < 0) {
|
|
|
|
of_node_put(args.np);
|
iommu/tegra-smmu: Fix mc errors on tegra124-nyan
Commit 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
removed certain hack in the tegra_smmu_probe() by relying on IOMMU core to
of_xlate SMMU's SID per device, so as to get rid of tegra_smmu_find() and
tegra_smmu_configure() that are typically done in the IOMMU core also.
This approach works for both existing devices that have DT nodes and other
devices (like PCI device) that don't exist in DT, on Tegra210 and Tegra3
upon testing. However, Page Fault errors are reported on tegra124-Nyan:
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
EMEM address decode error (SMMU translation error [--S])
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
Page fault (SMMU translation error [--S])
After debugging, I found that the mentioned commit changed some function
callback sequence of tegra-smmu's, resulting in enabling SMMU for display
client before display driver gets initialized. I couldn't reproduce exact
same issue on Tegra210 as Tegra124 (arm-32) differs at arch-level code.
Actually this Page Fault is a known issue, as on most of Tegra platforms,
display gets enabled by the bootloader for the splash screen feature, so
it keeps filling the framebuffer memory. A proper fix to this issue is to
1:1 linear map the framebuffer memory to IOVA space so the SMMU will have
the same address as the physical address in its page table. Yet, Thierry
has been working on the solution above for a year, and it hasn't merged.
Therefore, let's partially revert the mentioned commit to fix the errors.
The reason why we do a partial revert here is that we can still set priv
in ->of_xlate() callback for PCI devices. Meanwhile, devices existing in
DT, like display, will go through tegra_smmu_configure() at the stage of
bus_set_iommu() when SMMU gets probed(), as what it did before we merged
the mentioned commit.
Once we have the linear map solution for framebuffer memory, this change
can be cleaned away.
[Big thank to Guillaume who reported and helped debugging/verification]
Fixes: 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
Reported-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Signed-off-by: Nicolin Chen <nicoleotsuka@gmail.com>
Tested-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Acked-by: Thierry Reding <treding@nvidia.com>
Link: https://lore.kernel.org/r/20210218220702.1962-1-nicoleotsuka@gmail.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2021-02-18 15:07:02 -07:00
|
|
|
return ERR_PTR(err);
|
2021-03-12 08:54:39 -07:00
|
|
|
}
|
iommu/tegra-smmu: Fix mc errors on tegra124-nyan
Commit 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
removed certain hack in the tegra_smmu_probe() by relying on IOMMU core to
of_xlate SMMU's SID per device, so as to get rid of tegra_smmu_find() and
tegra_smmu_configure() that are typically done in the IOMMU core also.
This approach works for both existing devices that have DT nodes and other
devices (like PCI device) that don't exist in DT, on Tegra210 and Tegra3
upon testing. However, Page Fault errors are reported on tegra124-Nyan:
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
EMEM address decode error (SMMU translation error [--S])
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
Page fault (SMMU translation error [--S])
After debugging, I found that the mentioned commit changed some function
callback sequence of tegra-smmu's, resulting in enabling SMMU for display
client before display driver gets initialized. I couldn't reproduce exact
same issue on Tegra210 as Tegra124 (arm-32) differs at arch-level code.
Actually this Page Fault is a known issue, as on most of Tegra platforms,
display gets enabled by the bootloader for the splash screen feature, so
it keeps filling the framebuffer memory. A proper fix to this issue is to
1:1 linear map the framebuffer memory to IOVA space so the SMMU will have
the same address as the physical address in its page table. Yet, Thierry
has been working on the solution above for a year, and it hasn't merged.
Therefore, let's partially revert the mentioned commit to fix the errors.
The reason why we do a partial revert here is that we can still set priv
in ->of_xlate() callback for PCI devices. Meanwhile, devices existing in
DT, like display, will go through tegra_smmu_configure() at the stage of
bus_set_iommu() when SMMU gets probed(), as what it did before we merged
the mentioned commit.
Once we have the linear map solution for framebuffer memory, this change
can be cleaned away.
[Big thank to Guillaume who reported and helped debugging/verification]
Fixes: 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
Reported-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Signed-off-by: Nicolin Chen <nicoleotsuka@gmail.com>
Tested-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Acked-by: Thierry Reding <treding@nvidia.com>
Link: https://lore.kernel.org/r/20210218220702.1962-1-nicoleotsuka@gmail.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2021-02-18 15:07:02 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
of_node_put(args.np);
|
|
|
|
index++;
|
|
|
|
}
|
|
|
|
|
|
|
|
smmu = dev_iommu_priv_get(dev);
|
2017-10-12 07:19:16 -07:00
|
|
|
if (!smmu)
|
2020-04-29 06:37:04 -07:00
|
|
|
return ERR_PTR(-ENODEV);
|
2017-07-21 05:12:36 -07:00
|
|
|
|
2020-04-29 06:37:04 -07:00
|
|
|
return &smmu->iommu;
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
|
|
|
|
2017-10-12 07:19:16 -07:00
|
|
|
static const struct tegra_smmu_group_soc *
|
|
|
|
tegra_smmu_find_group(struct tegra_smmu *smmu, unsigned int swgroup)
|
|
|
|
{
|
|
|
|
unsigned int i, j;
|
|
|
|
|
|
|
|
for (i = 0; i < smmu->soc->num_groups; i++)
|
|
|
|
for (j = 0; j < smmu->soc->groups[i].num_swgroups; j++)
|
|
|
|
if (smmu->soc->groups[i].swgroups[j] == swgroup)
|
|
|
|
return &smmu->soc->groups[i];
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2020-08-06 08:54:04 -07:00
|
|
|
static void tegra_smmu_group_release(void *iommu_data)
|
|
|
|
{
|
|
|
|
struct tegra_smmu_group *group = iommu_data;
|
|
|
|
struct tegra_smmu *smmu = group->smmu;
|
|
|
|
|
|
|
|
mutex_lock(&smmu->lock);
|
|
|
|
list_del(&group->list);
|
|
|
|
mutex_unlock(&smmu->lock);
|
|
|
|
}
|
|
|
|
|
2020-11-25 03:10:09 -07:00
|
|
|
static struct iommu_group *tegra_smmu_device_group(struct device *dev)
|
2017-10-12 07:19:16 -07:00
|
|
|
{
|
2020-11-25 03:10:09 -07:00
|
|
|
struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev);
|
|
|
|
struct tegra_smmu *smmu = dev_iommu_priv_get(dev);
|
2017-10-12 07:19:16 -07:00
|
|
|
const struct tegra_smmu_group_soc *soc;
|
2020-11-25 03:10:09 -07:00
|
|
|
unsigned int swgroup = fwspec->ids[0];
|
2017-10-12 07:19:16 -07:00
|
|
|
struct tegra_smmu_group *group;
|
2020-08-06 08:54:03 -07:00
|
|
|
struct iommu_group *grp;
|
2017-10-12 07:19:16 -07:00
|
|
|
|
2020-09-11 00:16:43 -07:00
|
|
|
/* Find group_soc associating with swgroup */
|
2017-10-12 07:19:16 -07:00
|
|
|
soc = tegra_smmu_find_group(smmu, swgroup);
|
|
|
|
|
|
|
|
mutex_lock(&smmu->lock);
|
|
|
|
|
2020-09-11 00:16:43 -07:00
|
|
|
/* Find existing iommu_group associating with swgroup or group_soc */
|
2017-10-12 07:19:16 -07:00
|
|
|
list_for_each_entry(group, &smmu->groups, list)
|
2020-09-11 00:16:43 -07:00
|
|
|
if ((group->swgroup == swgroup) || (soc && group->soc == soc)) {
|
2020-08-06 08:54:03 -07:00
|
|
|
grp = iommu_group_ref_get(group->group);
|
2017-10-12 07:19:16 -07:00
|
|
|
mutex_unlock(&smmu->lock);
|
2020-08-06 08:54:03 -07:00
|
|
|
return grp;
|
2017-10-12 07:19:16 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
group = devm_kzalloc(smmu->dev, sizeof(*group), GFP_KERNEL);
|
|
|
|
if (!group) {
|
|
|
|
mutex_unlock(&smmu->lock);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
INIT_LIST_HEAD(&group->list);
|
2020-09-11 00:16:43 -07:00
|
|
|
group->swgroup = swgroup;
|
2020-08-06 08:54:04 -07:00
|
|
|
group->smmu = smmu;
|
2017-10-12 07:19:16 -07:00
|
|
|
group->soc = soc;
|
|
|
|
|
2020-11-25 03:10:13 -07:00
|
|
|
if (dev_is_pci(dev))
|
|
|
|
group->group = pci_device_group(dev);
|
|
|
|
else
|
|
|
|
group->group = generic_device_group(dev);
|
|
|
|
|
2017-12-19 20:06:09 -07:00
|
|
|
if (IS_ERR(group->group)) {
|
2017-10-12 07:19:16 -07:00
|
|
|
devm_kfree(smmu->dev, group);
|
|
|
|
mutex_unlock(&smmu->lock);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2020-08-06 08:54:04 -07:00
|
|
|
iommu_group_set_iommudata(group->group, group, tegra_smmu_group_release);
|
2020-09-11 00:16:43 -07:00
|
|
|
if (soc)
|
|
|
|
iommu_group_set_name(group->group, soc->name);
|
2017-10-12 07:19:16 -07:00
|
|
|
list_add_tail(&group->list, &smmu->groups);
|
|
|
|
mutex_unlock(&smmu->lock);
|
|
|
|
|
|
|
|
return group->group;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int tegra_smmu_of_xlate(struct device *dev,
|
2024-02-16 07:40:25 -07:00
|
|
|
const struct of_phandle_args *args)
|
2017-10-12 07:19:16 -07:00
|
|
|
{
|
iommu/tegra-smmu: Rework tegra_smmu_probe_device()
The bus_set_iommu() in tegra_smmu_probe() enumerates all clients
to call in tegra_smmu_probe_device() where each client searches
its DT node for smmu pointer and swgroup ID, so as to configure
an fwspec. But this requires a valid smmu pointer even before mc
and smmu drivers are probed. So in tegra_smmu_probe() we added a
line of code to fill mc->smmu, marking "a bit of a hack".
This works for most of clients in the DTB, however, doesn't work
for a client that doesn't exist in DTB, a PCI device for example.
Actually, if we return ERR_PTR(-ENODEV) in ->probe_device() when
it's called from bus_set_iommu(), iommu core will let everything
carry on. Then when a client gets probed, of_iommu_configure() in
iommu core will search DTB for swgroup ID and call ->of_xlate()
to prepare an fwspec, similar to tegra_smmu_probe_device() and
tegra_smmu_configure(). Then it'll call tegra_smmu_probe_device()
again, and this time we shall return smmu->iommu pointer properly.
So we can get rid of tegra_smmu_find() and tegra_smmu_configure()
along with DT polling code by letting the iommu core handle every
thing, except a problem that we search iommus property in DTB not
only for swgroup ID but also for mc node to get mc->smmu pointer
to call dev_iommu_priv_set() and return the smmu->iommu pointer.
So we'll need to find another way to get smmu pointer.
Referencing the implementation of sun50i-iommu driver, of_xlate()
has client's dev pointer, mc node and swgroup ID. This means that
we can call dev_iommu_priv_set() in of_xlate() instead, so we can
simply get smmu pointer in ->probe_device().
This patch reworks tegra_smmu_probe_device() by:
1) Removing mc->smmu hack in tegra_smmu_probe() so as to return
ERR_PTR(-ENODEV) in tegra_smmu_probe_device() during stage of
tegra_smmu_probe/tegra_mc_probe().
2) Moving dev_iommu_priv_set() to of_xlate() so we can get smmu
pointer in tegra_smmu_probe_device() to replace DTB polling.
3) Removing tegra_smmu_configure() accordingly since iommu core
takes care of it.
This also fixes a problem that previously we could add clients to
iommu groups before iommu core initializes its default domain:
ubuntu@jetson:~$ dmesg | grep iommu
platform 50000000.host1x: Adding to iommu group 1
platform 57000000.gpu: Adding to iommu group 2
iommu: Default domain type: Translated
platform 54200000.dc: Adding to iommu group 3
platform 54240000.dc: Adding to iommu group 3
platform 54340000.vic: Adding to iommu group 4
Though it works fine with IOMMU_DOMAIN_UNMANAGED, but will have
warnings if switching to IOMMU_DOMAIN_DMA:
iommu: Failed to allocate default IOMMU domain of type 0 for
group (null) - Falling back to IOMMU_DOMAIN_DMA
iommu: Failed to allocate default IOMMU domain of type 0 for
group (null) - Falling back to IOMMU_DOMAIN_DMA
Now, bypassing the first probe_device() call from bus_set_iommu()
fixes the sequence:
ubuntu@jetson:~$ dmesg | grep iommu
iommu: Default domain type: Translated
tegra-host1x 50000000.host1x: Adding to iommu group 0
tegra-dc 54200000.dc: Adding to iommu group 1
tegra-dc 54240000.dc: Adding to iommu group 1
tegra-vic 54340000.vic: Adding to iommu group 2
nouveau 57000000.gpu: Adding to iommu group 3
Note that dmesg log above is testing with IOMMU_DOMAIN_UNMANAGED.
Signed-off-by: Nicolin Chen <nicoleotsuka@gmail.com>
Tested-by: Dmitry Osipenko <digetx@gmail.com>
Reviewed-by: Dmitry Osipenko <digetx@gmail.com>
Acked-by: Thierry Reding <treding@nvidia.com>
Link: https://lore.kernel.org/r/20201125101013.14953-5-nicoleotsuka@gmail.com
Signed-off-by: Will Deacon <will@kernel.org>
2020-11-25 03:10:12 -07:00
|
|
|
struct platform_device *iommu_pdev = of_find_device_by_node(args->np);
|
|
|
|
struct tegra_mc *mc = platform_get_drvdata(iommu_pdev);
|
2017-10-12 07:19:16 -07:00
|
|
|
u32 id = args->args[0];
|
|
|
|
|
iommu/tegra-smmu: Rework tegra_smmu_probe_device()
The bus_set_iommu() in tegra_smmu_probe() enumerates all clients
to call in tegra_smmu_probe_device() where each client searches
its DT node for smmu pointer and swgroup ID, so as to configure
an fwspec. But this requires a valid smmu pointer even before mc
and smmu drivers are probed. So in tegra_smmu_probe() we added a
line of code to fill mc->smmu, marking "a bit of a hack".
This works for most of clients in the DTB, however, doesn't work
for a client that doesn't exist in DTB, a PCI device for example.
Actually, if we return ERR_PTR(-ENODEV) in ->probe_device() when
it's called from bus_set_iommu(), iommu core will let everything
carry on. Then when a client gets probed, of_iommu_configure() in
iommu core will search DTB for swgroup ID and call ->of_xlate()
to prepare an fwspec, similar to tegra_smmu_probe_device() and
tegra_smmu_configure(). Then it'll call tegra_smmu_probe_device()
again, and this time we shall return smmu->iommu pointer properly.
So we can get rid of tegra_smmu_find() and tegra_smmu_configure()
along with DT polling code by letting the iommu core handle every
thing, except a problem that we search iommus property in DTB not
only for swgroup ID but also for mc node to get mc->smmu pointer
to call dev_iommu_priv_set() and return the smmu->iommu pointer.
So we'll need to find another way to get smmu pointer.
Referencing the implementation of sun50i-iommu driver, of_xlate()
has client's dev pointer, mc node and swgroup ID. This means that
we can call dev_iommu_priv_set() in of_xlate() instead, so we can
simply get smmu pointer in ->probe_device().
This patch reworks tegra_smmu_probe_device() by:
1) Removing mc->smmu hack in tegra_smmu_probe() so as to return
ERR_PTR(-ENODEV) in tegra_smmu_probe_device() during stage of
tegra_smmu_probe/tegra_mc_probe().
2) Moving dev_iommu_priv_set() to of_xlate() so we can get smmu
pointer in tegra_smmu_probe_device() to replace DTB polling.
3) Removing tegra_smmu_configure() accordingly since iommu core
takes care of it.
This also fixes a problem that previously we could add clients to
iommu groups before iommu core initializes its default domain:
ubuntu@jetson:~$ dmesg | grep iommu
platform 50000000.host1x: Adding to iommu group 1
platform 57000000.gpu: Adding to iommu group 2
iommu: Default domain type: Translated
platform 54200000.dc: Adding to iommu group 3
platform 54240000.dc: Adding to iommu group 3
platform 54340000.vic: Adding to iommu group 4
Though it works fine with IOMMU_DOMAIN_UNMANAGED, but will have
warnings if switching to IOMMU_DOMAIN_DMA:
iommu: Failed to allocate default IOMMU domain of type 0 for
group (null) - Falling back to IOMMU_DOMAIN_DMA
iommu: Failed to allocate default IOMMU domain of type 0 for
group (null) - Falling back to IOMMU_DOMAIN_DMA
Now, bypassing the first probe_device() call from bus_set_iommu()
fixes the sequence:
ubuntu@jetson:~$ dmesg | grep iommu
iommu: Default domain type: Translated
tegra-host1x 50000000.host1x: Adding to iommu group 0
tegra-dc 54200000.dc: Adding to iommu group 1
tegra-dc 54240000.dc: Adding to iommu group 1
tegra-vic 54340000.vic: Adding to iommu group 2
nouveau 57000000.gpu: Adding to iommu group 3
Note that dmesg log above is testing with IOMMU_DOMAIN_UNMANAGED.
Signed-off-by: Nicolin Chen <nicoleotsuka@gmail.com>
Tested-by: Dmitry Osipenko <digetx@gmail.com>
Reviewed-by: Dmitry Osipenko <digetx@gmail.com>
Acked-by: Thierry Reding <treding@nvidia.com>
Link: https://lore.kernel.org/r/20201125101013.14953-5-nicoleotsuka@gmail.com
Signed-off-by: Will Deacon <will@kernel.org>
2020-11-25 03:10:12 -07:00
|
|
|
/*
|
|
|
|
* Note: we are here releasing the reference of &iommu_pdev->dev, which
|
|
|
|
* is mc->dev. Although some functions in tegra_smmu_ops may keep using
|
|
|
|
* its private data beyond this point, it's still safe to do so because
|
|
|
|
* the SMMU parent device is the same as the MC, so the reference count
|
|
|
|
* isn't strictly necessary.
|
|
|
|
*/
|
|
|
|
put_device(&iommu_pdev->dev);
|
|
|
|
|
|
|
|
dev_iommu_priv_set(dev, mc->smmu);
|
|
|
|
|
2017-10-12 07:19:16 -07:00
|
|
|
return iommu_fwspec_add_ids(dev, &id, 1);
|
|
|
|
}
|
|
|
|
|
2023-09-13 06:43:44 -07:00
|
|
|
static int tegra_smmu_def_domain_type(struct device *dev)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* FIXME: For now we want to run all translation in IDENTITY mode, due
|
|
|
|
* to some device quirks. Better would be to just quirk the troubled
|
|
|
|
* devices.
|
|
|
|
*/
|
|
|
|
return IOMMU_DOMAIN_IDENTITY;
|
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static const struct iommu_ops tegra_smmu_ops = {
|
2023-09-13 06:43:44 -07:00
|
|
|
.identity_domain = &tegra_smmu_identity_domain,
|
|
|
|
.def_domain_type = &tegra_smmu_def_domain_type,
|
2023-09-13 06:43:56 -07:00
|
|
|
.domain_alloc_paging = tegra_smmu_domain_alloc_paging,
|
2020-04-29 06:37:04 -07:00
|
|
|
.probe_device = tegra_smmu_probe_device,
|
2017-10-12 07:19:16 -07:00
|
|
|
.device_group = tegra_smmu_device_group,
|
|
|
|
.of_xlate = tegra_smmu_of_xlate,
|
2014-04-16 00:24:44 -07:00
|
|
|
.pgsize_bitmap = SZ_4K,
|
2022-02-15 19:52:49 -07:00
|
|
|
.default_domain_ops = &(const struct iommu_domain_ops) {
|
|
|
|
.attach_dev = tegra_smmu_attach_dev,
|
2023-09-12 09:18:42 -07:00
|
|
|
.map_pages = tegra_smmu_map,
|
|
|
|
.unmap_pages = tegra_smmu_unmap,
|
2022-02-15 19:52:49 -07:00
|
|
|
.iova_to_phys = tegra_smmu_iova_to_phys,
|
|
|
|
.free = tegra_smmu_domain_free,
|
|
|
|
}
|
2014-04-16 00:24:44 -07:00
|
|
|
};
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
static void tegra_smmu_ahb_enable(void)
|
|
|
|
{
|
|
|
|
static const struct of_device_id ahb_match[] = {
|
|
|
|
{ .compatible = "nvidia,tegra30-ahb", },
|
|
|
|
{ }
|
|
|
|
};
|
|
|
|
struct device_node *ahb;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
ahb = of_find_matching_node(NULL, ahb_match);
|
|
|
|
if (ahb) {
|
|
|
|
tegra_ahb_enable_smmu(ahb);
|
|
|
|
of_node_put(ahb);
|
2011-11-16 22:31:31 -07:00
|
|
|
}
|
2014-04-16 00:24:44 -07:00
|
|
|
}
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2015-01-23 01:49:25 -07:00
|
|
|
static int tegra_smmu_swgroups_show(struct seq_file *s, void *data)
|
|
|
|
{
|
|
|
|
struct tegra_smmu *smmu = s->private;
|
|
|
|
unsigned int i;
|
|
|
|
u32 value;
|
|
|
|
|
|
|
|
seq_printf(s, "swgroup enabled ASID\n");
|
|
|
|
seq_printf(s, "------------------------\n");
|
|
|
|
|
|
|
|
for (i = 0; i < smmu->soc->num_swgroups; i++) {
|
|
|
|
const struct tegra_smmu_swgroup *group = &smmu->soc->swgroups[i];
|
|
|
|
const char *status;
|
|
|
|
unsigned int asid;
|
|
|
|
|
|
|
|
value = smmu_readl(smmu, group->reg);
|
|
|
|
|
|
|
|
if (value & SMMU_ASID_ENABLE)
|
|
|
|
status = "yes";
|
|
|
|
else
|
|
|
|
status = "no";
|
|
|
|
|
|
|
|
asid = value & SMMU_ASID_MASK;
|
|
|
|
|
|
|
|
seq_printf(s, "%-9s %-7s %#04x\n", group->name, status,
|
|
|
|
asid);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-11-22 06:30:47 -07:00
|
|
|
DEFINE_SHOW_ATTRIBUTE(tegra_smmu_swgroups);
|
2015-01-23 01:49:25 -07:00
|
|
|
|
|
|
|
static int tegra_smmu_clients_show(struct seq_file *s, void *data)
|
|
|
|
{
|
|
|
|
struct tegra_smmu *smmu = s->private;
|
|
|
|
unsigned int i;
|
|
|
|
u32 value;
|
|
|
|
|
|
|
|
seq_printf(s, "client enabled\n");
|
|
|
|
seq_printf(s, "--------------------\n");
|
|
|
|
|
|
|
|
for (i = 0; i < smmu->soc->num_clients; i++) {
|
|
|
|
const struct tegra_mc_client *client = &smmu->soc->clients[i];
|
|
|
|
const char *status;
|
|
|
|
|
2021-06-02 09:32:51 -07:00
|
|
|
value = smmu_readl(smmu, client->regs.smmu.reg);
|
2015-01-23 01:49:25 -07:00
|
|
|
|
2021-06-02 09:32:51 -07:00
|
|
|
if (value & BIT(client->regs.smmu.bit))
|
2015-01-23 01:49:25 -07:00
|
|
|
status = "yes";
|
|
|
|
else
|
|
|
|
status = "no";
|
|
|
|
|
|
|
|
seq_printf(s, "%-12s %s\n", client->name, status);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-11-22 06:30:47 -07:00
|
|
|
DEFINE_SHOW_ATTRIBUTE(tegra_smmu_clients);
|
2015-01-23 01:49:25 -07:00
|
|
|
|
|
|
|
static void tegra_smmu_debugfs_init(struct tegra_smmu *smmu)
|
|
|
|
{
|
|
|
|
smmu->debugfs = debugfs_create_dir("smmu", NULL);
|
|
|
|
|
|
|
|
debugfs_create_file("swgroups", S_IRUGO, smmu->debugfs, smmu,
|
|
|
|
&tegra_smmu_swgroups_fops);
|
|
|
|
debugfs_create_file("clients", S_IRUGO, smmu->debugfs, smmu,
|
|
|
|
&tegra_smmu_clients_fops);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void tegra_smmu_debugfs_exit(struct tegra_smmu *smmu)
|
|
|
|
{
|
|
|
|
debugfs_remove_recursive(smmu->debugfs);
|
|
|
|
}
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
struct tegra_smmu *tegra_smmu_probe(struct device *dev,
|
|
|
|
const struct tegra_smmu_soc *soc,
|
|
|
|
struct tegra_mc *mc)
|
|
|
|
{
|
|
|
|
struct tegra_smmu *smmu;
|
|
|
|
u32 value;
|
|
|
|
int err;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu = devm_kzalloc(dev, sizeof(*smmu), GFP_KERNEL);
|
|
|
|
if (!smmu)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
2012-06-25 04:23:55 -07:00
|
|
|
|
iommu/tegra-smmu: Fix mc errors on tegra124-nyan
Commit 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
removed certain hack in the tegra_smmu_probe() by relying on IOMMU core to
of_xlate SMMU's SID per device, so as to get rid of tegra_smmu_find() and
tegra_smmu_configure() that are typically done in the IOMMU core also.
This approach works for both existing devices that have DT nodes and other
devices (like PCI device) that don't exist in DT, on Tegra210 and Tegra3
upon testing. However, Page Fault errors are reported on tegra124-Nyan:
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
EMEM address decode error (SMMU translation error [--S])
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
Page fault (SMMU translation error [--S])
After debugging, I found that the mentioned commit changed some function
callback sequence of tegra-smmu's, resulting in enabling SMMU for display
client before display driver gets initialized. I couldn't reproduce exact
same issue on Tegra210 as Tegra124 (arm-32) differs at arch-level code.
Actually this Page Fault is a known issue, as on most of Tegra platforms,
display gets enabled by the bootloader for the splash screen feature, so
it keeps filling the framebuffer memory. A proper fix to this issue is to
1:1 linear map the framebuffer memory to IOVA space so the SMMU will have
the same address as the physical address in its page table. Yet, Thierry
has been working on the solution above for a year, and it hasn't merged.
Therefore, let's partially revert the mentioned commit to fix the errors.
The reason why we do a partial revert here is that we can still set priv
in ->of_xlate() callback for PCI devices. Meanwhile, devices existing in
DT, like display, will go through tegra_smmu_configure() at the stage of
bus_set_iommu() when SMMU gets probed(), as what it did before we merged
the mentioned commit.
Once we have the linear map solution for framebuffer memory, this change
can be cleaned away.
[Big thank to Guillaume who reported and helped debugging/verification]
Fixes: 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
Reported-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Signed-off-by: Nicolin Chen <nicoleotsuka@gmail.com>
Tested-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Acked-by: Thierry Reding <treding@nvidia.com>
Link: https://lore.kernel.org/r/20210218220702.1962-1-nicoleotsuka@gmail.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2021-02-18 15:07:02 -07:00
|
|
|
/*
|
|
|
|
* This is a bit of a hack. Ideally we'd want to simply return this
|
2022-08-15 09:20:15 -07:00
|
|
|
* value. However iommu_device_register() will attempt to add
|
|
|
|
* all devices to the IOMMU before we get that far. In order
|
iommu/tegra-smmu: Fix mc errors on tegra124-nyan
Commit 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
removed certain hack in the tegra_smmu_probe() by relying on IOMMU core to
of_xlate SMMU's SID per device, so as to get rid of tegra_smmu_find() and
tegra_smmu_configure() that are typically done in the IOMMU core also.
This approach works for both existing devices that have DT nodes and other
devices (like PCI device) that don't exist in DT, on Tegra210 and Tegra3
upon testing. However, Page Fault errors are reported on tegra124-Nyan:
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
EMEM address decode error (SMMU translation error [--S])
tegra-mc 70019000.memory-controller: display0a: read @0xfe056b40:
Page fault (SMMU translation error [--S])
After debugging, I found that the mentioned commit changed some function
callback sequence of tegra-smmu's, resulting in enabling SMMU for display
client before display driver gets initialized. I couldn't reproduce exact
same issue on Tegra210 as Tegra124 (arm-32) differs at arch-level code.
Actually this Page Fault is a known issue, as on most of Tegra platforms,
display gets enabled by the bootloader for the splash screen feature, so
it keeps filling the framebuffer memory. A proper fix to this issue is to
1:1 linear map the framebuffer memory to IOVA space so the SMMU will have
the same address as the physical address in its page table. Yet, Thierry
has been working on the solution above for a year, and it hasn't merged.
Therefore, let's partially revert the mentioned commit to fix the errors.
The reason why we do a partial revert here is that we can still set priv
in ->of_xlate() callback for PCI devices. Meanwhile, devices existing in
DT, like display, will go through tegra_smmu_configure() at the stage of
bus_set_iommu() when SMMU gets probed(), as what it did before we merged
the mentioned commit.
Once we have the linear map solution for framebuffer memory, this change
can be cleaned away.
[Big thank to Guillaume who reported and helped debugging/verification]
Fixes: 25938c73cd79 ("iommu/tegra-smmu: Rework tegra_smmu_probe_device()")
Reported-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Signed-off-by: Nicolin Chen <nicoleotsuka@gmail.com>
Tested-by: Guillaume Tucker <guillaume.tucker@collabora.com>
Acked-by: Thierry Reding <treding@nvidia.com>
Link: https://lore.kernel.org/r/20210218220702.1962-1-nicoleotsuka@gmail.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
2021-02-18 15:07:02 -07:00
|
|
|
* not to rely on global variables to track the IOMMU instance, we
|
|
|
|
* set it here so that it can be looked up from the .probe_device()
|
|
|
|
* callback via the IOMMU device's .drvdata field.
|
|
|
|
*/
|
|
|
|
mc->smmu = smmu;
|
|
|
|
|
2021-09-26 06:07:18 -07:00
|
|
|
smmu->asids = devm_bitmap_zalloc(dev, soc->num_asids, GFP_KERNEL);
|
2014-04-16 00:24:44 -07:00
|
|
|
if (!smmu->asids)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2017-10-12 07:19:16 -07:00
|
|
|
INIT_LIST_HEAD(&smmu->groups);
|
2014-04-16 00:24:44 -07:00
|
|
|
mutex_init(&smmu->lock);
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu->regs = mc->regs;
|
|
|
|
smmu->soc = soc;
|
|
|
|
smmu->dev = dev;
|
|
|
|
smmu->mc = mc;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2020-09-11 00:16:41 -07:00
|
|
|
smmu->pfn_mask =
|
|
|
|
BIT_MASK(mc->soc->num_address_bits - SMMU_PTE_SHIFT) - 1;
|
2015-03-27 03:07:27 -07:00
|
|
|
dev_dbg(dev, "address bits: %u, PFN mask: %#lx\n",
|
|
|
|
mc->soc->num_address_bits, smmu->pfn_mask);
|
2020-09-17 04:31:54 -07:00
|
|
|
smmu->tlb_mask = (1 << fls(smmu->soc->num_tlb_lines)) - 1;
|
2015-08-06 05:20:31 -07:00
|
|
|
dev_dbg(dev, "TLB lines: %u, mask: %#lx\n", smmu->soc->num_tlb_lines,
|
|
|
|
smmu->tlb_mask);
|
2015-03-27 03:07:27 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
value = SMMU_PTC_CONFIG_ENABLE | SMMU_PTC_CONFIG_INDEX_MAP(0x3f);
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
if (soc->supports_request_limit)
|
|
|
|
value |= SMMU_PTC_CONFIG_REQ_LIMIT(8);
|
2012-08-02 01:46:40 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu_writel(smmu, value, SMMU_PTC_CONFIG);
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
value = SMMU_TLB_CONFIG_HIT_UNDER_MISS |
|
2015-08-06 05:20:31 -07:00
|
|
|
SMMU_TLB_CONFIG_ACTIVE_LINES(smmu);
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
if (soc->supports_round_robin_arbitration)
|
|
|
|
value |= SMMU_TLB_CONFIG_ROUND_ROBIN_ARBITRATION;
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu_writel(smmu, value, SMMU_TLB_CONFIG);
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2015-07-27 05:29:41 -07:00
|
|
|
smmu_flush_ptc_all(smmu);
|
2014-04-16 00:24:44 -07:00
|
|
|
smmu_flush_tlb(smmu);
|
|
|
|
smmu_writel(smmu, SMMU_CONFIG_ENABLE, SMMU_CONFIG);
|
|
|
|
smmu_flush(smmu);
|
|
|
|
|
|
|
|
tegra_smmu_ahb_enable();
|
2011-11-16 22:31:31 -07:00
|
|
|
|
2017-08-09 08:41:52 -07:00
|
|
|
err = iommu_device_sysfs_add(&smmu->iommu, dev, NULL, dev_name(dev));
|
|
|
|
if (err)
|
|
|
|
return ERR_PTR(err);
|
|
|
|
|
2021-04-01 06:56:26 -07:00
|
|
|
err = iommu_device_register(&smmu->iommu, &tegra_smmu_ops, dev);
|
2022-08-15 09:20:15 -07:00
|
|
|
if (err) {
|
|
|
|
iommu_device_sysfs_remove(&smmu->iommu);
|
|
|
|
return ERR_PTR(err);
|
|
|
|
}
|
2017-08-30 06:06:43 -07:00
|
|
|
|
2015-01-23 01:49:25 -07:00
|
|
|
if (IS_ENABLED(CONFIG_DEBUG_FS))
|
|
|
|
tegra_smmu_debugfs_init(smmu);
|
|
|
|
|
2014-04-16 00:24:44 -07:00
|
|
|
return smmu;
|
|
|
|
}
|
2015-01-23 01:49:25 -07:00
|
|
|
|
|
|
|
void tegra_smmu_remove(struct tegra_smmu *smmu)
|
|
|
|
{
|
2017-08-09 08:41:52 -07:00
|
|
|
iommu_device_unregister(&smmu->iommu);
|
|
|
|
iommu_device_sysfs_remove(&smmu->iommu);
|
|
|
|
|
2015-01-23 01:49:25 -07:00
|
|
|
if (IS_ENABLED(CONFIG_DEBUG_FS))
|
|
|
|
tegra_smmu_debugfs_exit(smmu);
|
|
|
|
}
|