blob: 1e5fb46baccb53abd81fe0814a8c74163953aa93 [file] [log] [blame]
xjb04a4022021-11-25 15:01:52 +08001/*
2 * Copyright (c) 2015-2016 MediaTek Inc.
3 * Author: Yong Wu <yong.wu@mediatek.com>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 */
14#include <linux/bootmem.h>
15#include <linux/bug.h>
16#include <linux/clk.h>
17#include <linux/component.h>
18#include <linux/device.h>
19#include <linux/dma-iommu.h>
20#include <linux/err.h>
21#include <linux/interrupt.h>
22#include <linux/io.h>
23#include <linux/iommu.h>
24#include <linux/iopoll.h>
25#include <linux/list.h>
26#include <linux/of_address.h>
27#include <linux/of_iommu.h>
28#include <linux/of_irq.h>
29#include <linux/of_platform.h>
30#include <linux/platform_device.h>
31#include <linux/slab.h>
32#include <linux/spinlock.h>
33#include <asm/barrier.h>
34#include <soc/mediatek/smi.h>
35
36#include "mtk_iommu.h"
37
38#define REG_MMU_PT_BASE_ADDR 0x000
39#define MMU_PT_ADDR_MASK GENMASK(31, 7)
40
41#define REG_MMU_INVALIDATE 0x020
42#define F_ALL_INVLD 0x2
43#define F_MMU_INV_RANGE 0x1
44
45#define REG_MMU_INVLD_START_A 0x024
46#define REG_MMU_INVLD_END_A 0x028
47
48#define REG_MMU_INV_SEL 0x038
49#define REG_MMU_INV_SEL_MT6779 0x02c
50#define F_INVLD_EN0 BIT(0)
51#define F_INVLD_EN1 BIT(1)
52
53#define REG_MMU_STANDARD_AXI_MODE 0x048
54
55#define REG_MMU_MISC_CRTL_MT6779 0x048
56#define REG_MMU_STANDARD_AXI_MODE_MT6779 (BIT(3) | BIT(19))
57#define REG_MMU_COHERENCE_EN (BIT(0) | BIT(16))
58#define REG_MMU_IN_ORDER_WR_EN (BIT(1) | BIT(17))
59#define F_MMU_HALF_ENTRY_MODE_L (BIT(5) | BIT(21))
60#define F_MMU_BLOCKING_MODE_L (BIT(4) | BIT(20))
61
62#define REG_MMU_DCM_DIS 0x050
63
64#define REG_MMU_WR_LEN 0x054
65#define F_MMU_WR_THROT_DIS (BIT(5) | BIT(21))
66
67#define REG_MMU_CTRL_REG 0x110
68#define F_MMU_TF_PROT_TO_PROGRAM_ADDR (2 << 4)
69#define F_MMU_PREFETCH_RT_REPLACE_MOD BIT(4)
70#define F_MMU_TF_PROT_TO_PROGRAM_ADDR_MT8173 (2 << 5)
71
72#define REG_MMU_IVRP_PADDR 0x114
73
74#define REG_MMU_VLD_PA_RNG 0x118
75#define F_MMU_VLD_PA_RNG(EA, SA) (((EA) << 8) | (SA))
76
77#define REG_MMU_INT_CONTROL0 0x120
78#define F_L2_MULIT_HIT_EN BIT(0)
79#define F_TABLE_WALK_FAULT_INT_EN BIT(1)
80#define F_PREETCH_FIFO_OVERFLOW_INT_EN BIT(2)
81#define F_MISS_FIFO_OVERFLOW_INT_EN BIT(3)
82#define F_PREFETCH_FIFO_ERR_INT_EN BIT(5)
83#define F_MISS_FIFO_ERR_INT_EN BIT(6)
84#define F_INT_CLR_BIT BIT(12)
85
86#define REG_MMU_INT_MAIN_CONTROL 0x124
87 /* mmu0 | mmu1 */
88#define F_INT_TRANSLATION_FAULT (BIT(0) | BIT(7))
89#define F_INT_MAIN_MULTI_HIT_FAULT (BIT(1) | BIT(8))
90#define F_INT_INVALID_PA_FAULT (BIT(2) | BIT(9))
91#define F_INT_ENTRY_REPLACEMENT_FAULT (BIT(3) | BIT(10))
92#define F_INT_TLB_MISS_FAULT (BIT(4) | BIT(11))
93#define F_INT_MISS_TRANSACTION_FIFO_FAULT (BIT(5) | BIT(12))
94#define F_INT_PRETETCH_TRANSATION_FIFO_FAULT (BIT(6) | BIT(13))
95
96#define REG_MMU_CPE_DONE 0x12C
97
98#define REG_MMU_FAULT_ST1 0x134
99#define F_REG_MMU0_FAULT_MASK GENMASK(6, 0)
100#define F_REG_MMU1_FAULT_MASK GENMASK(13, 7)
101
102#define REG_MMU0_FAULT_VA 0x13c
103#define F_MMU_FAULT_VA_WRITE_BIT BIT(1)
104#define F_MMU_FAULT_VA_LAYER_BIT BIT(0)
105
106#define REG_MMU0_INVLD_PA 0x140
107#define REG_MMU1_FAULT_VA 0x144
108#define REG_MMU1_INVLD_PA 0x148
109#define REG_MMU0_INT_ID 0x150
110#define REG_MMU1_INT_ID 0x154
111#define F_MMU_INT_ID_COMM_ID(a) (((a) >> 9) & 0x7)
112#define F_MMU_INT_ID_SUB_COMM_ID(a) (((a) >> 7) & 0x3)
113#define F_MMU_INT_ID_LARB_ID(a) (((a) >> 7) & 0x7)
114#define F_MMU_INT_ID_PORT_ID(a) (((a) >> 2) & 0x1f)
115#define F_MMU_INT_ID_COMM_APU_ID(a) ((a) & 0x3)
116#define F_MMU_INT_ID_SUB_APU_ID(a) (((a) >> 2) & 0x3)
117
118#define MTK_PROTECT_PA_ALIGN 256
119
120/*
121 * Get the local arbiter ID and the portid within the larb arbiter
122 * from mtk_m4u_id which is defined by MTK_M4U_ID.
123 */
124#define MTK_M4U_TO_LARB(id) (((id) >> 5) & 0xf)
125#define MTK_M4U_TO_PORT(id) ((id) & 0x1f)
126
127struct mtk_iommu_domain {
128 spinlock_t pgtlock; /* lock for page table */
129
130 struct io_pgtable_cfg cfg;
131 struct io_pgtable_ops *iop;
132
133 struct iommu_domain domain;
134};
135
136struct mtk_iommu_resv_iova_region {
137 dma_addr_t iova_base;
138 size_t iova_size;
139 enum iommu_resv_type type;
140};
141
142static const struct iommu_ops mtk_iommu_ops;
143
144/*
145 * In M4U 4GB mode, the physical address is remapped as below:
146 * CPU PA -> M4U HW PA
147 * 0x4000_0000 0x1_4000_0000 (Add bit32)
148 * 0x8000_0000 0x1_8000_0000 ...
149 * 0xc000_0000 0x1_c000_0000 ...
150 * 0x1_0000_0000 0x1_0000_0000 (No change)
151 *
152 * Thus, We always add BIT32 in the iommu_map and disable BIT32 if PA is >=
153 * 0x1_4000_0000 in the iova_to_phys.
154 */
155#define MTK_IOMMU_4GB_MODE_PA_140000000 0x140000000UL
156
157static LIST_HEAD(m4ulist); /* List all the M4U HWs */
158
159#define for_each_m4u(data) list_for_each_entry(data, &m4ulist, list)
160
161/*
162 * There may be 1 or 2 M4U HWs, But we always expect they are in the same domain
163 * for the performance.
164 *
165 * Here always return the mtk_iommu_data of the first probed M4U where the
166 * iommu domain information is recorded.
167 */
168static struct mtk_iommu_data *mtk_iommu_get_m4u_data(void)
169{
170 struct mtk_iommu_data *data;
171
172 for_each_m4u(data)
173 return data;
174
175 return NULL;
176}
177
178static struct mtk_iommu_domain *to_mtk_domain(struct iommu_domain *dom)
179{
180 return container_of(dom, struct mtk_iommu_domain, domain);
181}
182
183static void mtk_iommu_tlb_flush_all(void *cookie)
184{
185 struct mtk_iommu_data *data = cookie;
186
187 for_each_m4u(data) {
188 writel_relaxed(F_INVLD_EN1 | F_INVLD_EN0,
189 data->base + data->plat_data->inv_sel_reg);
190 writel_relaxed(F_ALL_INVLD, data->base + REG_MMU_INVALIDATE);
191 wmb(); /* Make sure the tlb flush all done */
192 }
193}
194
195static void mtk_iommu_tlb_add_flush_nosync(unsigned long iova, size_t size,
196 size_t granule, bool leaf,
197 void *cookie)
198{
199 struct mtk_iommu_data *data = cookie;
200
201 for_each_m4u(data) {
202 writel_relaxed(F_INVLD_EN1 | F_INVLD_EN0,
203 data->base + data->plat_data->inv_sel_reg);
204
205 writel_relaxed(iova, data->base + REG_MMU_INVLD_START_A);
206 writel_relaxed(iova + size - 1,
207 data->base + REG_MMU_INVLD_END_A);
208 writel(F_MMU_INV_RANGE, data->base + REG_MMU_INVALIDATE);
209 data->tlb_flush_active = true;
210 }
211}
212
213static void mtk_iommu_tlb_sync(void *cookie)
214{
215 struct mtk_iommu_data *data = cookie;
216 int ret;
217 u32 tmp;
218
219 for_each_m4u(data) {
220 /* Avoid timing out if there's nothing to wait for */
221 if (!data->tlb_flush_active)
222 return;
223
224 ret = readl_poll_timeout_atomic(data->base + REG_MMU_CPE_DONE,
225 tmp, tmp != 0, 10, 1000);
226 if (ret) {
227 dev_warn(data->dev,
228 "Partial TLB flush timed out, falling back to full flush\n");
229 mtk_iommu_tlb_flush_all(cookie);
230 }
231 /* Clear the CPE status */
232 writel_relaxed(0, data->base + REG_MMU_CPE_DONE);
233 data->tlb_flush_active = false;
234 }
235}
236
237static const struct iommu_gather_ops mtk_iommu_gather_ops = {
238 .tlb_flush_all = mtk_iommu_tlb_flush_all,
239 .tlb_add_flush = mtk_iommu_tlb_add_flush_nosync,
240 .tlb_sync = mtk_iommu_tlb_sync,
241};
242
243static irqreturn_t mtk_iommu_isr(int irq, void *dev_id)
244{
245 struct mtk_iommu_data *data = dev_id;
246 struct mtk_iommu_domain *dom = data->m4u_dom;
247 u32 int_state, regval, fault_iova, fault_pa;
248 unsigned int fault_larb, fault_port, sub_comm = 0;
249 bool layer, write;
250
251 /* Read error info from registers */
252 int_state = readl_relaxed(data->base + REG_MMU_FAULT_ST1);
253 if (int_state & F_REG_MMU0_FAULT_MASK) {
254 regval = readl_relaxed(data->base + REG_MMU0_INT_ID);
255 fault_iova = readl_relaxed(data->base + REG_MMU0_FAULT_VA);
256 fault_pa = readl_relaxed(data->base + REG_MMU0_INVLD_PA);
257 } else {
258 regval = readl_relaxed(data->base + REG_MMU1_INT_ID);
259 fault_iova = readl_relaxed(data->base + REG_MMU1_FAULT_VA);
260 fault_pa = readl_relaxed(data->base + REG_MMU1_INVLD_PA);
261 }
262 layer = fault_iova & F_MMU_FAULT_VA_LAYER_BIT;
263 write = fault_iova & F_MMU_FAULT_VA_WRITE_BIT;
264 fault_port = F_MMU_INT_ID_PORT_ID(regval);
265 if (data->plat_data->has_sub_comm[data->m4u_id]) {
266 /* m4u1 is VPU in mt6779.*/
267 if (data->m4u_id && data->plat_data->m4u_plat == M4U_MT6779) {
268 fault_larb = F_MMU_INT_ID_COMM_APU_ID(regval);
269 sub_comm = F_MMU_INT_ID_SUB_APU_ID(regval);
270 fault_port = 0; /* for mt6779 APU ID is irregular */
271 } else {
272 fault_larb = F_MMU_INT_ID_COMM_ID(regval);
273 sub_comm = F_MMU_INT_ID_SUB_COMM_ID(regval);
274 }
275 } else {
276 fault_larb = F_MMU_INT_ID_LARB_ID(regval);
277 }
278
279 fault_larb = data->plat_data->larbid_remap[data->m4u_id][fault_larb];
280
281 if (report_iommu_fault(&dom->domain, data->dev, fault_iova,
282 write ? IOMMU_FAULT_WRITE : IOMMU_FAULT_READ)) {
283 dev_err_ratelimited(
284 data->dev,
285 "fault type=0x%x iova=0x%x pa=0x%x larb=%d sub_comm=%d port=%d regval=0x%x layer=%d %s\n",
286 int_state, fault_iova, fault_pa, fault_larb,
287 sub_comm, fault_port, regval,
288 layer, write ? "write" : "read");
289 }
290
291 /* Interrupt clear */
292 regval = readl_relaxed(data->base + REG_MMU_INT_CONTROL0);
293 regval |= F_INT_CLR_BIT;
294 writel_relaxed(regval, data->base + REG_MMU_INT_CONTROL0);
295
296 mtk_iommu_tlb_flush_all(data);
297
298 return IRQ_HANDLED;
299}
300
301static void mtk_iommu_config(struct mtk_iommu_data *data,
302 struct device *dev, bool enable)
303{
304 struct mtk_smi_larb_iommu *larb_mmu;
305 unsigned int larbid, portid;
306 struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev);
307 struct device_link *link;
308 int i;
309
310 for (i = 0; i < fwspec->num_ids; ++i) {
311 larbid = MTK_M4U_TO_LARB(fwspec->ids[i]);
312 portid = MTK_M4U_TO_PORT(fwspec->ids[i]);
313 larb_mmu = &data->smi_imu.larb_imu[larbid];
314
315 dev_dbg(dev, "%s iommu port: %d\n",
316 enable ? "enable" : "disable", portid);
317
318 if (enable) {
319 larb_mmu->mmu |= MTK_SMI_MMU_EN(portid);
320 /* Link the consumer with the larb device(supplier) */
321 link = device_link_add(dev, larb_mmu->dev,
322 DL_FLAG_PM_RUNTIME |
323 DL_FLAG_AUTOREMOVE_CONSUMER);
324 if (!link) {
325 dev_err(dev, "Unable to link %s\n",
326 dev_name(larb_mmu->dev));
327 return;
328 }
329 } else {
330 larb_mmu->mmu &= ~MTK_SMI_MMU_EN(portid);
331 }
332 }
333}
334
335static int mtk_iommu_domain_finalise(struct mtk_iommu_domain *dom)
336{
337 struct mtk_iommu_data *data = mtk_iommu_get_m4u_data();
338
339 spin_lock_init(&dom->pgtlock);
340
341 dom->cfg = (struct io_pgtable_cfg) {
342 .quirks = IO_PGTABLE_QUIRK_ARM_NS |
343 IO_PGTABLE_QUIRK_NO_PERMS |
344 IO_PGTABLE_QUIRK_TLBI_ON_MAP |
345 IO_PGTABLE_QUIRK_ARM_MTK_4GB,
346 .pgsize_bitmap = mtk_iommu_ops.pgsize_bitmap,
347 .ias = 32,
348 .oas = 32,
349 .tlb = &mtk_iommu_gather_ops,
350 .iommu_dev = data->dev,
351 };
352
353 dom->iop = alloc_io_pgtable_ops(ARM_V7S, &dom->cfg, data);
354 if (!dom->iop) {
355 dev_err(data->dev, "Failed to alloc io pgtable\n");
356 return -EINVAL;
357 }
358
359 /* Update our support page sizes bitmap */
360 dom->domain.pgsize_bitmap = dom->cfg.pgsize_bitmap;
361 return 0;
362}
363
364static struct iommu_domain *mtk_iommu_domain_alloc(unsigned type)
365{
366 struct mtk_iommu_domain *dom;
367
368 if (type != IOMMU_DOMAIN_DMA)
369 return NULL;
370
371 dom = kzalloc(sizeof(*dom), GFP_KERNEL);
372 if (!dom)
373 return NULL;
374
375 if (iommu_get_dma_cookie(&dom->domain))
376 goto free_dom;
377
378 if (mtk_iommu_domain_finalise(dom))
379 goto put_dma_cookie;
380
381 dom->domain.geometry.aperture_start = 0;
382 dom->domain.geometry.aperture_end = DMA_BIT_MASK(32);
383 dom->domain.geometry.force_aperture = true;
384
385 return &dom->domain;
386
387put_dma_cookie:
388 iommu_put_dma_cookie(&dom->domain);
389free_dom:
390 kfree(dom);
391 return NULL;
392}
393
394static void mtk_iommu_domain_free(struct iommu_domain *domain)
395{
396 struct mtk_iommu_domain *dom = to_mtk_domain(domain);
397
398 free_io_pgtable_ops(dom->iop);
399 iommu_put_dma_cookie(domain);
400 kfree(to_mtk_domain(domain));
401}
402
403static int mtk_iommu_attach_device(struct iommu_domain *domain,
404 struct device *dev)
405{
406 struct mtk_iommu_domain *dom = to_mtk_domain(domain);
407 struct mtk_iommu_data *data = dev_iommu_fwspec_get(dev)->iommu_priv;
408
409 if (!data)
410 return -ENODEV;
411
412 /* Update the pgtable base address register of the M4U HW */
413 if (!data->m4u_dom) {
414 data->m4u_dom = dom;
415 writel(dom->cfg.arm_v7s_cfg.ttbr[0] & MMU_PT_ADDR_MASK,
416 data->base + REG_MMU_PT_BASE_ADDR);
417 }
418
419 mtk_iommu_config(data, dev, true);
420 return 0;
421}
422
423static void mtk_iommu_detach_device(struct iommu_domain *domain,
424 struct device *dev)
425{
426 struct mtk_iommu_data *data = dev_iommu_fwspec_get(dev)->iommu_priv;
427
428 if (!data)
429 return;
430
431 mtk_iommu_config(data, dev, false);
432}
433
434static int mtk_iommu_map(struct iommu_domain *domain, unsigned long iova,
435 phys_addr_t paddr, size_t size, int prot)
436{
437 struct mtk_iommu_domain *dom = to_mtk_domain(domain);
438 struct mtk_iommu_data *data = mtk_iommu_get_m4u_data();
439 unsigned long flags;
440 int ret;
441
442 /* The "4GB mode" M4U physically can not use the lower remap of Dram. */
443 if (data->plat_data->has_4gb_mode && data->dram_is_4gb)
444 paddr |= BIT_ULL(32);
445
446 spin_lock_irqsave(&dom->pgtlock, flags);
447 ret = dom->iop->map(dom->iop, iova, paddr, size, prot);
448 spin_unlock_irqrestore(&dom->pgtlock, flags);
449
450 return ret;
451}
452
453static size_t mtk_iommu_unmap(struct iommu_domain *domain,
454 unsigned long iova, size_t size)
455{
456 struct mtk_iommu_domain *dom = to_mtk_domain(domain);
457 unsigned long flags;
458 size_t unmapsz;
459
460 spin_lock_irqsave(&dom->pgtlock, flags);
461 unmapsz = dom->iop->unmap(dom->iop, iova, size);
462 spin_unlock_irqrestore(&dom->pgtlock, flags);
463
464 return unmapsz;
465}
466
467static void mtk_iommu_iotlb_sync(struct iommu_domain *domain)
468{
469 mtk_iommu_tlb_flush_all(mtk_iommu_get_m4u_data());
470}
471
472static phys_addr_t mtk_iommu_iova_to_phys(struct iommu_domain *domain,
473 dma_addr_t iova)
474{
475 struct mtk_iommu_domain *dom = to_mtk_domain(domain);
476 struct mtk_iommu_data *data = mtk_iommu_get_m4u_data();
477 unsigned long flags;
478 phys_addr_t pa;
479
480 spin_lock_irqsave(&dom->pgtlock, flags);
481 pa = dom->iop->iova_to_phys(dom->iop, iova);
482 spin_unlock_irqrestore(&dom->pgtlock, flags);
483
484 if (data->plat_data->has_4gb_mode && data->dram_is_4gb &&
485 pa >= MTK_IOMMU_4GB_MODE_PA_140000000)
486 pa &= ~BIT_ULL(32);
487
488 return pa;
489}
490
491static int mtk_iommu_add_device(struct device *dev)
492{
493 struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev);
494 struct mtk_iommu_data *data;
495 struct iommu_group *group;
496
497 if (!fwspec || fwspec->ops != &mtk_iommu_ops)
498 return -ENODEV; /* Not a iommu client device */
499
500 data = fwspec->iommu_priv;
501 iommu_device_link(&data->iommu, dev);
502
503 group = iommu_group_get_for_dev(dev);
504 if (IS_ERR(group))
505 return PTR_ERR(group);
506
507 iommu_group_put(group);
508 return 0;
509}
510
511static void mtk_iommu_remove_device(struct device *dev)
512{
513 struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev);
514 struct mtk_iommu_data *data;
515
516 if (!fwspec || fwspec->ops != &mtk_iommu_ops)
517 return;
518
519 data = fwspec->iommu_priv;
520 iommu_device_unlink(&data->iommu, dev);
521
522 iommu_group_remove_device(dev);
523 iommu_fwspec_free(dev);
524}
525
526static struct iommu_group *mtk_iommu_device_group(struct device *dev)
527{
528 struct mtk_iommu_data *data = mtk_iommu_get_m4u_data();
529
530 if (!data)
531 return ERR_PTR(-ENODEV);
532
533 /* All the client devices are in the same m4u iommu-group */
534 if (!data->m4u_group) {
535 data->m4u_group = iommu_group_alloc();
536 if (IS_ERR(data->m4u_group))
537 dev_err(dev, "Failed to allocate M4U IOMMU group\n");
538 } else {
539 iommu_group_ref_get(data->m4u_group);
540 }
541 return data->m4u_group;
542}
543
544static int mtk_iommu_of_xlate(struct device *dev, struct of_phandle_args *args)
545{
546 struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev);
547 struct platform_device *m4updev;
548
549 if (args->args_count != 1) {
550 dev_err(dev, "invalid #iommu-cells(%d) property for IOMMU\n",
551 args->args_count);
552 return -EINVAL;
553 }
554
555 if (!fwspec->iommu_priv) {
556 /* Get the m4u device */
557 m4updev = of_find_device_by_node(args->np);
558 if (WARN_ON(!m4updev))
559 return -EINVAL;
560
561 fwspec->iommu_priv = platform_get_drvdata(m4updev);
562 }
563
564 return iommu_fwspec_add_ids(dev, args->args, 1);
565}
566
567#ifdef CONFIG_ARM64
568/* reserve/dir-map iova region for arm64 evb */
569static void mtk_iommu_get_resv_regions(struct device *dev,
570 struct list_head *head)
571{
572 struct mtk_iommu_data *data = mtk_iommu_get_m4u_data();
573 unsigned int i, total_cnt = data->plat_data->resv_cnt;
574 const struct mtk_iommu_resv_iova_region *resv_data;
575 struct iommu_resv_region *region;
576 unsigned long base = 0;
577 size_t size = 0;
578 int prot = IOMMU_WRITE | IOMMU_READ;
579
580 resv_data = data->plat_data->resv_region;
581
582 for (i = 0; i < total_cnt; i++) {
583 size = 0;
584 if (resv_data[i].iova_size) {
585 base = (unsigned long)resv_data[i].iova_base;
586 size = resv_data[i].iova_size;
587 }
588 if (!size)
589 continue;
590
591 region = iommu_alloc_resv_region(base, size, prot,
592 resv_data[i].type);
593 if (!region)
594 return;
595
596 list_add_tail(&region->list, head);
597
598 dev_dbg(data->dev, "%s iova 0x%x ~ 0x%x\n",
599 (resv_data[i].type == IOMMU_RESV_DIRECT) ? "dm" : "rsv",
600 (unsigned int)base, (unsigned int)(base + size - 1));
601 }
602}
603
604static void mtk_iommu_put_resv_regions(struct device *dev,
605 struct list_head *head)
606{
607 struct iommu_resv_region *entry, *next;
608
609 list_for_each_entry_safe(entry, next, head, list)
610 kfree(entry);
611}
612#endif
613
614static const struct iommu_ops mtk_iommu_ops = {
615 .domain_alloc = mtk_iommu_domain_alloc,
616 .domain_free = mtk_iommu_domain_free,
617 .attach_dev = mtk_iommu_attach_device,
618 .detach_dev = mtk_iommu_detach_device,
619 .map = mtk_iommu_map,
620 .unmap = mtk_iommu_unmap,
621 .flush_iotlb_all = mtk_iommu_iotlb_sync,
622 .iotlb_sync = mtk_iommu_iotlb_sync,
623 .iova_to_phys = mtk_iommu_iova_to_phys,
624 .add_device = mtk_iommu_add_device,
625 .remove_device = mtk_iommu_remove_device,
626 .device_group = mtk_iommu_device_group,
627 .of_xlate = mtk_iommu_of_xlate,
628#ifdef CONFIG_ARM64
629 .get_resv_regions = mtk_iommu_get_resv_regions,
630 .put_resv_regions = mtk_iommu_put_resv_regions,
631#endif
632 .pgsize_bitmap = SZ_4K | SZ_64K | SZ_1M | SZ_16M,
633};
634
635static int mtk_iommu_hw_init(const struct mtk_iommu_data *data)
636{
637 u32 regval;
638 int ret;
639
640 ret = clk_prepare_enable(data->bclk);
641 if (ret) {
642 dev_err(data->dev, "Failed to enable iommu bclk(%d)\n", ret);
643 return ret;
644 }
645
646 regval = readl_relaxed(data->base + REG_MMU_CTRL_REG);
647 if (data->plat_data->m4u_plat == M4U_MT8173)
648 regval |= F_MMU_PREFETCH_RT_REPLACE_MOD |
649 F_MMU_TF_PROT_TO_PROGRAM_ADDR_MT8173;
650 else
651 regval |= F_MMU_TF_PROT_TO_PROGRAM_ADDR;
652 writel_relaxed(regval, data->base + REG_MMU_CTRL_REG);
653
654 regval = F_L2_MULIT_HIT_EN |
655 F_TABLE_WALK_FAULT_INT_EN |
656 F_PREETCH_FIFO_OVERFLOW_INT_EN |
657 F_MISS_FIFO_OVERFLOW_INT_EN |
658 F_PREFETCH_FIFO_ERR_INT_EN |
659 F_MISS_FIFO_ERR_INT_EN;
660 writel_relaxed(regval, data->base + REG_MMU_INT_CONTROL0);
661
662 regval = F_INT_TRANSLATION_FAULT |
663 F_INT_MAIN_MULTI_HIT_FAULT |
664 F_INT_INVALID_PA_FAULT |
665 F_INT_ENTRY_REPLACEMENT_FAULT |
666 F_INT_TLB_MISS_FAULT |
667 F_INT_MISS_TRANSACTION_FIFO_FAULT |
668 F_INT_PRETETCH_TRANSATION_FIFO_FAULT;
669 writel_relaxed(regval, data->base + REG_MMU_INT_MAIN_CONTROL);
670
671 if (data->plat_data->m4u_plat == M4U_MT8173)
672 regval = (data->protect_base >> 1) | (data->dram_is_4gb << 31);
673 else
674 regval = lower_32_bits(data->protect_base) |
675 upper_32_bits(data->protect_base);
676 writel_relaxed(regval, data->base + REG_MMU_IVRP_PADDR);
677
678 if (data->dram_is_4gb && data->plat_data->has_vld_pa_rng) {
679 /*
680 * If 4GB mode is enabled, the validate PA range is from
681 * 0x1_0000_0000 to 0x1_ffff_ffff. here record bit[32:30].
682 */
683 regval = F_MMU_VLD_PA_RNG(7, 4);
684 writel_relaxed(regval, data->base + REG_MMU_VLD_PA_RNG);
685 }
686 writel_relaxed(0, data->base + REG_MMU_DCM_DIS);
687
688 if (data->plat_data->reset_axi)
689 writel_relaxed(0, data->base + REG_MMU_STANDARD_AXI_MODE);
690
691 if (data->plat_data->has_wr_len) {
692 /* write command throttling mode */
693 regval = readl_relaxed(data->base + REG_MMU_WR_LEN);
694 regval &= ~F_MMU_WR_THROT_DIS;
695 writel_relaxed(regval, data->base + REG_MMU_WR_LEN);
696 }
697 /* special settings for mmu0 (multimedia iommu) */
698 if (data->plat_data->has_misc_ctrl[data->m4u_id]) {
699 regval = readl_relaxed(data->base + REG_MMU_MISC_CRTL_MT6779);
700 /* non-standard AXI mode */
701 regval &= ~REG_MMU_STANDARD_AXI_MODE_MT6779;
702 writel_relaxed(regval, data->base + REG_MMU_MISC_CRTL_MT6779);
703 }
704
705 if (devm_request_irq(data->dev, data->irq, mtk_iommu_isr, 0,
706 dev_name(data->dev), (void *)data)) {
707 writel_relaxed(0, data->base + REG_MMU_PT_BASE_ADDR);
708 clk_disable_unprepare(data->bclk);
709 dev_err(data->dev, "Failed @ IRQ-%d Request\n", data->irq);
710 return -ENODEV;
711 }
712
713 return 0;
714}
715
716static const struct component_master_ops mtk_iommu_com_ops = {
717 .bind = mtk_iommu_bind,
718 .unbind = mtk_iommu_unbind,
719};
720
721static int mtk_iommu_probe(struct platform_device *pdev)
722{
723 struct mtk_iommu_data *data;
724 struct device *dev = &pdev->dev;
725 struct resource *res;
726 resource_size_t ioaddr;
727 struct component_match *match = NULL;
728 void *protect;
729 int i, larb_nr, ret;
730
731 data = devm_kzalloc(dev, sizeof(*data), GFP_KERNEL);
732 if (!data)
733 return -ENOMEM;
734 data->dev = dev;
735 data->plat_data = of_device_get_match_data(dev);
736
737 /* Protect memory. HW will access here while translation fault.*/
738 protect = devm_kzalloc(dev, MTK_PROTECT_PA_ALIGN * 2, GFP_KERNEL);
739 if (!protect)
740 return -ENOMEM;
741 data->protect_base = ALIGN(virt_to_phys(protect), MTK_PROTECT_PA_ALIGN);
742
743 /* Whether the current dram is 4GB. */
744 data->dram_is_4gb = !!(max_pfn > (BIT_ULL(32) >> PAGE_SHIFT));
745
746 res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
747 data->base = devm_ioremap_resource(dev, res);
748 if (IS_ERR(data->base))
749 return PTR_ERR(data->base);
750 ioaddr = res->start;
751
752 data->irq = platform_get_irq(pdev, 0);
753 if (data->irq < 0)
754 return data->irq;
755
756 if (data->plat_data->has_bclk) {
757 data->bclk = devm_clk_get(dev, "bclk");
758 if (IS_ERR(data->bclk))
759 return PTR_ERR(data->bclk);
760 }
761
762 larb_nr = of_count_phandle_with_args(dev->of_node,
763 "mediatek,larbs", NULL);
764 if (larb_nr < 0)
765 return larb_nr;
766
767 for (i = 0; i < larb_nr; i++) {
768 struct device_node *larbnode;
769 struct platform_device *plarbdev;
770 u32 id;
771
772 larbnode = of_parse_phandle(dev->of_node, "mediatek,larbs", i);
773 if (!larbnode)
774 return -EINVAL;
775
776 if (!of_device_is_available(larbnode))
777 continue;
778
779 ret = of_property_read_u32(larbnode, "mediatek,larb-id", &id);
780 if (ret)/* The id is consecutive if there is no this property */
781 id = i;
782
783 plarbdev = of_find_device_by_node(larbnode);
784 if (!plarbdev || !plarbdev->dev.driver)
785 return -EPROBE_DEFER;
786 data->smi_imu.larb_imu[id].dev = &plarbdev->dev;
787
788 if (data->plat_data->m4u1_mask == (1 << id))
789 data->m4u_id = 1;
790
791 component_match_add_release(dev, &match, release_of,
792 compare_of, larbnode);
793 }
794
795 platform_set_drvdata(pdev, data);
796
797 ret = mtk_iommu_hw_init(data);
798 if (ret)
799 return ret;
800
801 ret = iommu_device_sysfs_add(&data->iommu, dev, NULL,
802 "mtk-iommu.%pa", &ioaddr);
803 if (ret)
804 return ret;
805
806 iommu_device_set_ops(&data->iommu, &mtk_iommu_ops);
807 iommu_device_set_fwnode(&data->iommu, &pdev->dev.of_node->fwnode);
808
809 ret = iommu_device_register(&data->iommu);
810 if (ret)
811 return ret;
812
813 list_add_tail(&data->list, &m4ulist);
814
815 if (!iommu_present(&platform_bus_type))
816 bus_set_iommu(&platform_bus_type, &mtk_iommu_ops);
817
818 return component_master_add_with_match(dev, &mtk_iommu_com_ops, match);
819}
820
821static void mtk_iommu_shutdown(struct platform_device *pdev)
822{
823 struct mtk_iommu_data *data = platform_get_drvdata(pdev);
824
825 iommu_device_sysfs_remove(&data->iommu);
826 iommu_device_unregister(&data->iommu);
827
828 if (iommu_present(&platform_bus_type))
829 bus_set_iommu(&platform_bus_type, NULL);
830
831 clk_disable_unprepare(data->bclk);
832 devm_free_irq(&pdev->dev, data->irq, data);
833 component_master_del(&pdev->dev, &mtk_iommu_com_ops);
834}
835
836static int __maybe_unused mtk_iommu_suspend(struct device *dev)
837{
838 struct mtk_iommu_data *data = dev_get_drvdata(dev);
839 struct mtk_iommu_suspend_reg *reg = &data->reg;
840 void __iomem *base = data->base;
841
842 reg->wr_len = readl_relaxed(base + REG_MMU_WR_LEN);
843 reg->standard_axi_mode = readl_relaxed(base +
844 REG_MMU_STANDARD_AXI_MODE);
845 reg->dcm_dis = readl_relaxed(base + REG_MMU_DCM_DIS);
846 reg->ctrl_reg = readl_relaxed(base + REG_MMU_CTRL_REG);
847 reg->int_control0 = readl_relaxed(base + REG_MMU_INT_CONTROL0);
848 reg->int_main_control = readl_relaxed(base + REG_MMU_INT_MAIN_CONTROL);
849 reg->ivrp_paddr = readl_relaxed(base + REG_MMU_IVRP_PADDR);
850 reg->vld_pa_rng = readl_relaxed(base + REG_MMU_VLD_PA_RNG);
851 clk_disable_unprepare(data->bclk);
852 return 0;
853}
854
855static int __maybe_unused mtk_iommu_resume(struct device *dev)
856{
857 struct mtk_iommu_data *data = dev_get_drvdata(dev);
858 struct mtk_iommu_suspend_reg *reg = &data->reg;
859 struct mtk_iommu_domain *m4u_dom = data->m4u_dom;
860 void __iomem *base = data->base;
861 int ret;
862
863 ret = clk_prepare_enable(data->bclk);
864 if (ret) {
865 dev_err(data->dev, "Failed to enable clk(%d) in resume\n", ret);
866 return ret;
867 }
868 writel_relaxed(reg->wr_len, base + REG_MMU_WR_LEN);
869 writel_relaxed(reg->standard_axi_mode,
870 base + REG_MMU_STANDARD_AXI_MODE);
871 writel_relaxed(reg->dcm_dis, base + REG_MMU_DCM_DIS);
872 writel_relaxed(reg->ctrl_reg, base + REG_MMU_CTRL_REG);
873 writel_relaxed(reg->int_control0, base + REG_MMU_INT_CONTROL0);
874 writel_relaxed(reg->int_main_control, base + REG_MMU_INT_MAIN_CONTROL);
875 writel_relaxed(reg->ivrp_paddr, base + REG_MMU_IVRP_PADDR);
876 writel_relaxed(reg->vld_pa_rng, base + REG_MMU_VLD_PA_RNG);
877 if (m4u_dom)
878 writel(m4u_dom->cfg.arm_v7s_cfg.ttbr[0] & MMU_PT_ADDR_MASK,
879 base + REG_MMU_PT_BASE_ADDR);
880 return 0;
881}
882
883static const struct dev_pm_ops mtk_iommu_pm_ops = {
884 SET_NOIRQ_SYSTEM_SLEEP_PM_OPS(mtk_iommu_suspend, mtk_iommu_resume)
885};
886
887static const struct mtk_iommu_resv_iova_region mt2712_iommu_rsv_list[] = {
888#ifdef CONFIG_MTK_TINYSYS_SCP_SUPPORT
889 { .iova_base = 0x4d000000UL, /* FastRVC */
890 .iova_size = 0x8000000,
891 .type = IOMMU_RESV_DIRECT,
892 },
893#endif
894};
895
896static const struct mtk_iommu_resv_iova_region mt6779_iommu_rsv_list[] = {
897 { .iova_base = 0x40000000, /* CCU */
898 .iova_size = 0x8000000,
899 .type = IOMMU_RESV_RESERVED,
900 },
901 { .iova_base = 0x7da00000, /* VPU/MDLA */
902 .iova_size = 0x2700000,
903 .type = IOMMU_RESV_RESERVED,
904 },
905};
906
907static const struct mtk_iommu_plat_data mt2712_data = {
908 .m4u_plat = M4U_MT2712,
909 .has_4gb_mode = true,
910#ifdef CONFIG_MTK_TINYSYS_SCP_SUPPORT
911 .resv_cnt = ARRAY_SIZE(mt2712_iommu_rsv_list),
912 .resv_region = mt2712_iommu_rsv_list,
913#endif
914 .has_bclk = true,
915 .has_vld_pa_rng = true,
916 .larbid_remap[0] = {0, 1, 2, 3},
917 .larbid_remap[1] = {4, 5, 7, 8, 9},
918 .inv_sel_reg = REG_MMU_INV_SEL,
919 .m4u1_mask = BIT(4),
920};
921
922static const struct mtk_iommu_plat_data mt6779_data = {
923 .m4u_plat = M4U_MT6779,
924 .resv_cnt = ARRAY_SIZE(mt6779_iommu_rsv_list),
925 .resv_region = mt6779_iommu_rsv_list,
926 .larbid_remap[0] = {0, 1, 2, 3, 5, 7, 10, 9},
927 /* vp6a, vp6b, mdla/core2, mdla/edmc*/
928 .larbid_remap[1] = {2, 0, 3, 1},
929 .has_sub_comm = {true, true},
930 .has_wr_len = true,
931 .has_misc_ctrl = {true, false},
932 .inv_sel_reg = REG_MMU_INV_SEL_MT6779,
933 .m4u1_mask = BIT(6),
934};
935
936static const struct mtk_iommu_plat_data mt8173_data = {
937 .m4u_plat = M4U_MT8173,
938 .has_4gb_mode = true,
939 .has_bclk = true,
940 .reset_axi = true,
941 .larbid_remap[0] = {0, 1, 2, 3, 4, 5}, /* Linear mapping. */
942 .inv_sel_reg = REG_MMU_INV_SEL,
943};
944
945static const struct mtk_iommu_plat_data mt8183_data = {
946 .m4u_plat = M4U_MT8183,
947 .reset_axi = true,
948 .larbid_remap[0] = {0, 4, 5, 6, 7, 2, 3, 1},
949 .inv_sel_reg = REG_MMU_INV_SEL,
950};
951
952static const struct of_device_id mtk_iommu_of_ids[] = {
953 { .compatible = "mediatek,mt2712-m4u", .data = &mt2712_data},
954 { .compatible = "mediatek,mt6779-m4u", .data = &mt6779_data},
955 { .compatible = "mediatek,mt8173-m4u", .data = &mt8173_data},
956 { .compatible = "mediatek,mt8183-m4u", .data = &mt8183_data},
957 {}
958};
959
960static struct platform_driver mtk_iommu_driver = {
961 .probe = mtk_iommu_probe,
962 .shutdown = mtk_iommu_shutdown,
963 .driver = {
964 .name = "mtk-iommu",
965 .of_match_table = of_match_ptr(mtk_iommu_of_ids),
966 .pm = &mtk_iommu_pm_ops,
967 }
968};
969builtin_platform_driver(mtk_iommu_driver);