mtk_iommu.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759
  1. /*
  2. * Copyright (c) 2015-2016 MediaTek Inc.
  3. * Author: Yong Wu <yong.wu@mediatek.com>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. */
  14. #include <linux/bootmem.h>
  15. #include <linux/bug.h>
  16. #include <linux/clk.h>
  17. #include <linux/component.h>
  18. #include <linux/device.h>
  19. #include <linux/dma-iommu.h>
  20. #include <linux/err.h>
  21. #include <linux/interrupt.h>
  22. #include <linux/io.h>
  23. #include <linux/iommu.h>
  24. #include <linux/iopoll.h>
  25. #include <linux/list.h>
  26. #include <linux/of_address.h>
  27. #include <linux/of_iommu.h>
  28. #include <linux/of_irq.h>
  29. #include <linux/of_platform.h>
  30. #include <linux/platform_device.h>
  31. #include <linux/slab.h>
  32. #include <linux/spinlock.h>
  33. #include <asm/barrier.h>
  34. #include <soc/mediatek/smi.h>
  35. #include "mtk_iommu.h"
  36. #define REG_MMU_PT_BASE_ADDR 0x000
  37. #define REG_MMU_INVALIDATE 0x020
  38. #define F_ALL_INVLD 0x2
  39. #define F_MMU_INV_RANGE 0x1
  40. #define REG_MMU_INVLD_START_A 0x024
  41. #define REG_MMU_INVLD_END_A 0x028
  42. #define REG_MMU_INV_SEL 0x038
  43. #define F_INVLD_EN0 BIT(0)
  44. #define F_INVLD_EN1 BIT(1)
  45. #define REG_MMU_STANDARD_AXI_MODE 0x048
  46. #define REG_MMU_DCM_DIS 0x050
  47. #define REG_MMU_CTRL_REG 0x110
  48. #define F_MMU_PREFETCH_RT_REPLACE_MOD BIT(4)
  49. #define F_MMU_TF_PROTECT_SEL_SHIFT(data) \
  50. ((data)->m4u_plat == M4U_MT2712 ? 4 : 5)
  51. /* It's named by F_MMU_TF_PROT_SEL in mt2712. */
  52. #define F_MMU_TF_PROTECT_SEL(prot, data) \
  53. (((prot) & 0x3) << F_MMU_TF_PROTECT_SEL_SHIFT(data))
  54. #define REG_MMU_IVRP_PADDR 0x114
  55. #define F_MMU_IVRP_PA_SET(pa, ext) (((pa) >> 1) | ((!!(ext)) << 31))
  56. #define REG_MMU_VLD_PA_RNG 0x118
  57. #define F_MMU_VLD_PA_RNG(EA, SA) (((EA) << 8) | (SA))
  58. #define REG_MMU_INT_CONTROL0 0x120
  59. #define F_L2_MULIT_HIT_EN BIT(0)
  60. #define F_TABLE_WALK_FAULT_INT_EN BIT(1)
  61. #define F_PREETCH_FIFO_OVERFLOW_INT_EN BIT(2)
  62. #define F_MISS_FIFO_OVERFLOW_INT_EN BIT(3)
  63. #define F_PREFETCH_FIFO_ERR_INT_EN BIT(5)
  64. #define F_MISS_FIFO_ERR_INT_EN BIT(6)
  65. #define F_INT_CLR_BIT BIT(12)
  66. #define REG_MMU_INT_MAIN_CONTROL 0x124
  67. #define F_INT_TRANSLATION_FAULT BIT(0)
  68. #define F_INT_MAIN_MULTI_HIT_FAULT BIT(1)
  69. #define F_INT_INVALID_PA_FAULT BIT(2)
  70. #define F_INT_ENTRY_REPLACEMENT_FAULT BIT(3)
  71. #define F_INT_TLB_MISS_FAULT BIT(4)
  72. #define F_INT_MISS_TRANSACTION_FIFO_FAULT BIT(5)
  73. #define F_INT_PRETETCH_TRANSATION_FIFO_FAULT BIT(6)
  74. #define REG_MMU_CPE_DONE 0x12C
  75. #define REG_MMU_FAULT_ST1 0x134
  76. #define REG_MMU_FAULT_VA 0x13c
  77. #define F_MMU_FAULT_VA_WRITE_BIT BIT(1)
  78. #define F_MMU_FAULT_VA_LAYER_BIT BIT(0)
  79. #define REG_MMU_INVLD_PA 0x140
  80. #define REG_MMU_INT_ID 0x150
  81. #define F_MMU0_INT_ID_LARB_ID(a) (((a) >> 7) & 0x7)
  82. #define F_MMU0_INT_ID_PORT_ID(a) (((a) >> 2) & 0x1f)
  83. #define MTK_PROTECT_PA_ALIGN 128
  84. /*
  85. * Get the local arbiter ID and the portid within the larb arbiter
  86. * from mtk_m4u_id which is defined by MTK_M4U_ID.
  87. */
  88. #define MTK_M4U_TO_LARB(id) (((id) >> 5) & 0xf)
  89. #define MTK_M4U_TO_PORT(id) ((id) & 0x1f)
  90. struct mtk_iommu_domain {
  91. spinlock_t pgtlock; /* lock for page table */
  92. struct io_pgtable_cfg cfg;
  93. struct io_pgtable_ops *iop;
  94. struct iommu_domain domain;
  95. };
  96. static struct iommu_ops mtk_iommu_ops;
  97. static LIST_HEAD(m4ulist); /* List all the M4U HWs */
  98. #define for_each_m4u(data) list_for_each_entry(data, &m4ulist, list)
  99. /*
  100. * There may be 1 or 2 M4U HWs, But we always expect they are in the same domain
  101. * for the performance.
  102. *
  103. * Here always return the mtk_iommu_data of the first probed M4U where the
  104. * iommu domain information is recorded.
  105. */
  106. static struct mtk_iommu_data *mtk_iommu_get_m4u_data(void)
  107. {
  108. struct mtk_iommu_data *data;
  109. for_each_m4u(data)
  110. return data;
  111. return NULL;
  112. }
  113. static struct mtk_iommu_domain *to_mtk_domain(struct iommu_domain *dom)
  114. {
  115. return container_of(dom, struct mtk_iommu_domain, domain);
  116. }
  117. static void mtk_iommu_tlb_flush_all(void *cookie)
  118. {
  119. struct mtk_iommu_data *data = cookie;
  120. for_each_m4u(data) {
  121. writel_relaxed(F_INVLD_EN1 | F_INVLD_EN0,
  122. data->base + REG_MMU_INV_SEL);
  123. writel_relaxed(F_ALL_INVLD, data->base + REG_MMU_INVALIDATE);
  124. wmb(); /* Make sure the tlb flush all done */
  125. }
  126. }
  127. static void mtk_iommu_tlb_add_flush_nosync(unsigned long iova, size_t size,
  128. size_t granule, bool leaf,
  129. void *cookie)
  130. {
  131. struct mtk_iommu_data *data = cookie;
  132. for_each_m4u(data) {
  133. writel_relaxed(F_INVLD_EN1 | F_INVLD_EN0,
  134. data->base + REG_MMU_INV_SEL);
  135. writel_relaxed(iova, data->base + REG_MMU_INVLD_START_A);
  136. writel_relaxed(iova + size - 1,
  137. data->base + REG_MMU_INVLD_END_A);
  138. writel_relaxed(F_MMU_INV_RANGE,
  139. data->base + REG_MMU_INVALIDATE);
  140. data->tlb_flush_active = true;
  141. }
  142. }
  143. static void mtk_iommu_tlb_sync(void *cookie)
  144. {
  145. struct mtk_iommu_data *data = cookie;
  146. int ret;
  147. u32 tmp;
  148. for_each_m4u(data) {
  149. /* Avoid timing out if there's nothing to wait for */
  150. if (!data->tlb_flush_active)
  151. return;
  152. ret = readl_poll_timeout_atomic(data->base + REG_MMU_CPE_DONE,
  153. tmp, tmp != 0, 10, 100000);
  154. if (ret) {
  155. dev_warn(data->dev,
  156. "Partial TLB flush timed out, falling back to full flush\n");
  157. mtk_iommu_tlb_flush_all(cookie);
  158. }
  159. /* Clear the CPE status */
  160. writel_relaxed(0, data->base + REG_MMU_CPE_DONE);
  161. data->tlb_flush_active = false;
  162. }
  163. }
  164. static const struct iommu_gather_ops mtk_iommu_gather_ops = {
  165. .tlb_flush_all = mtk_iommu_tlb_flush_all,
  166. .tlb_add_flush = mtk_iommu_tlb_add_flush_nosync,
  167. .tlb_sync = mtk_iommu_tlb_sync,
  168. };
  169. static irqreturn_t mtk_iommu_isr(int irq, void *dev_id)
  170. {
  171. struct mtk_iommu_data *data = dev_id;
  172. struct mtk_iommu_domain *dom = data->m4u_dom;
  173. u32 int_state, regval, fault_iova, fault_pa;
  174. unsigned int fault_larb, fault_port;
  175. bool layer, write;
  176. /* Read error info from registers */
  177. int_state = readl_relaxed(data->base + REG_MMU_FAULT_ST1);
  178. fault_iova = readl_relaxed(data->base + REG_MMU_FAULT_VA);
  179. layer = fault_iova & F_MMU_FAULT_VA_LAYER_BIT;
  180. write = fault_iova & F_MMU_FAULT_VA_WRITE_BIT;
  181. fault_pa = readl_relaxed(data->base + REG_MMU_INVLD_PA);
  182. regval = readl_relaxed(data->base + REG_MMU_INT_ID);
  183. fault_larb = F_MMU0_INT_ID_LARB_ID(regval);
  184. fault_port = F_MMU0_INT_ID_PORT_ID(regval);
  185. if (report_iommu_fault(&dom->domain, data->dev, fault_iova,
  186. write ? IOMMU_FAULT_WRITE : IOMMU_FAULT_READ)) {
  187. dev_err_ratelimited(
  188. data->dev,
  189. "fault type=0x%x iova=0x%x pa=0x%x larb=%d port=%d layer=%d %s\n",
  190. int_state, fault_iova, fault_pa, fault_larb, fault_port,
  191. layer, write ? "write" : "read");
  192. }
  193. /* Interrupt clear */
  194. regval = readl_relaxed(data->base + REG_MMU_INT_CONTROL0);
  195. regval |= F_INT_CLR_BIT;
  196. writel_relaxed(regval, data->base + REG_MMU_INT_CONTROL0);
  197. mtk_iommu_tlb_flush_all(data);
  198. return IRQ_HANDLED;
  199. }
  200. static void mtk_iommu_config(struct mtk_iommu_data *data,
  201. struct device *dev, bool enable)
  202. {
  203. struct mtk_smi_larb_iommu *larb_mmu;
  204. unsigned int larbid, portid;
  205. struct iommu_fwspec *fwspec = dev->iommu_fwspec;
  206. int i;
  207. for (i = 0; i < fwspec->num_ids; ++i) {
  208. larbid = MTK_M4U_TO_LARB(fwspec->ids[i]);
  209. portid = MTK_M4U_TO_PORT(fwspec->ids[i]);
  210. larb_mmu = &data->smi_imu.larb_imu[larbid];
  211. dev_dbg(dev, "%s iommu port: %d\n",
  212. enable ? "enable" : "disable", portid);
  213. if (enable)
  214. larb_mmu->mmu |= MTK_SMI_MMU_EN(portid);
  215. else
  216. larb_mmu->mmu &= ~MTK_SMI_MMU_EN(portid);
  217. }
  218. }
  219. static int mtk_iommu_domain_finalise(struct mtk_iommu_domain *dom)
  220. {
  221. struct mtk_iommu_data *data = mtk_iommu_get_m4u_data();
  222. spin_lock_init(&dom->pgtlock);
  223. dom->cfg = (struct io_pgtable_cfg) {
  224. .quirks = IO_PGTABLE_QUIRK_ARM_NS |
  225. IO_PGTABLE_QUIRK_NO_PERMS |
  226. IO_PGTABLE_QUIRK_TLBI_ON_MAP,
  227. .pgsize_bitmap = mtk_iommu_ops.pgsize_bitmap,
  228. .ias = 32,
  229. .oas = 32,
  230. .tlb = &mtk_iommu_gather_ops,
  231. .iommu_dev = data->dev,
  232. };
  233. if (data->enable_4GB)
  234. dom->cfg.quirks |= IO_PGTABLE_QUIRK_ARM_MTK_4GB;
  235. dom->iop = alloc_io_pgtable_ops(ARM_V7S, &dom->cfg, data);
  236. if (!dom->iop) {
  237. dev_err(data->dev, "Failed to alloc io pgtable\n");
  238. return -EINVAL;
  239. }
  240. /* Update our support page sizes bitmap */
  241. dom->domain.pgsize_bitmap = dom->cfg.pgsize_bitmap;
  242. return 0;
  243. }
  244. static struct iommu_domain *mtk_iommu_domain_alloc(unsigned type)
  245. {
  246. struct mtk_iommu_domain *dom;
  247. if (type != IOMMU_DOMAIN_DMA)
  248. return NULL;
  249. dom = kzalloc(sizeof(*dom), GFP_KERNEL);
  250. if (!dom)
  251. return NULL;
  252. if (iommu_get_dma_cookie(&dom->domain))
  253. goto free_dom;
  254. if (mtk_iommu_domain_finalise(dom))
  255. goto put_dma_cookie;
  256. dom->domain.geometry.aperture_start = 0;
  257. dom->domain.geometry.aperture_end = DMA_BIT_MASK(32);
  258. dom->domain.geometry.force_aperture = true;
  259. return &dom->domain;
  260. put_dma_cookie:
  261. iommu_put_dma_cookie(&dom->domain);
  262. free_dom:
  263. kfree(dom);
  264. return NULL;
  265. }
  266. static void mtk_iommu_domain_free(struct iommu_domain *domain)
  267. {
  268. struct mtk_iommu_domain *dom = to_mtk_domain(domain);
  269. free_io_pgtable_ops(dom->iop);
  270. iommu_put_dma_cookie(domain);
  271. kfree(to_mtk_domain(domain));
  272. }
  273. static int mtk_iommu_attach_device(struct iommu_domain *domain,
  274. struct device *dev)
  275. {
  276. struct mtk_iommu_domain *dom = to_mtk_domain(domain);
  277. struct mtk_iommu_data *data = dev->iommu_fwspec->iommu_priv;
  278. if (!data)
  279. return -ENODEV;
  280. /* Update the pgtable base address register of the M4U HW */
  281. if (!data->m4u_dom) {
  282. data->m4u_dom = dom;
  283. writel(dom->cfg.arm_v7s_cfg.ttbr[0],
  284. data->base + REG_MMU_PT_BASE_ADDR);
  285. }
  286. mtk_iommu_config(data, dev, true);
  287. return 0;
  288. }
  289. static void mtk_iommu_detach_device(struct iommu_domain *domain,
  290. struct device *dev)
  291. {
  292. struct mtk_iommu_data *data = dev->iommu_fwspec->iommu_priv;
  293. if (!data)
  294. return;
  295. mtk_iommu_config(data, dev, false);
  296. }
  297. static int mtk_iommu_map(struct iommu_domain *domain, unsigned long iova,
  298. phys_addr_t paddr, size_t size, int prot)
  299. {
  300. struct mtk_iommu_domain *dom = to_mtk_domain(domain);
  301. unsigned long flags;
  302. int ret;
  303. spin_lock_irqsave(&dom->pgtlock, flags);
  304. ret = dom->iop->map(dom->iop, iova, paddr & DMA_BIT_MASK(32),
  305. size, prot);
  306. spin_unlock_irqrestore(&dom->pgtlock, flags);
  307. return ret;
  308. }
  309. static size_t mtk_iommu_unmap(struct iommu_domain *domain,
  310. unsigned long iova, size_t size)
  311. {
  312. struct mtk_iommu_domain *dom = to_mtk_domain(domain);
  313. unsigned long flags;
  314. size_t unmapsz;
  315. spin_lock_irqsave(&dom->pgtlock, flags);
  316. unmapsz = dom->iop->unmap(dom->iop, iova, size);
  317. spin_unlock_irqrestore(&dom->pgtlock, flags);
  318. return unmapsz;
  319. }
  320. static void mtk_iommu_iotlb_sync(struct iommu_domain *domain)
  321. {
  322. mtk_iommu_tlb_sync(mtk_iommu_get_m4u_data());
  323. }
  324. static phys_addr_t mtk_iommu_iova_to_phys(struct iommu_domain *domain,
  325. dma_addr_t iova)
  326. {
  327. struct mtk_iommu_domain *dom = to_mtk_domain(domain);
  328. struct mtk_iommu_data *data = mtk_iommu_get_m4u_data();
  329. unsigned long flags;
  330. phys_addr_t pa;
  331. spin_lock_irqsave(&dom->pgtlock, flags);
  332. pa = dom->iop->iova_to_phys(dom->iop, iova);
  333. spin_unlock_irqrestore(&dom->pgtlock, flags);
  334. if (data->enable_4GB)
  335. pa |= BIT_ULL(32);
  336. return pa;
  337. }
  338. static int mtk_iommu_add_device(struct device *dev)
  339. {
  340. struct mtk_iommu_data *data;
  341. struct iommu_group *group;
  342. if (!dev->iommu_fwspec || dev->iommu_fwspec->ops != &mtk_iommu_ops)
  343. return -ENODEV; /* Not a iommu client device */
  344. data = dev->iommu_fwspec->iommu_priv;
  345. iommu_device_link(&data->iommu, dev);
  346. group = iommu_group_get_for_dev(dev);
  347. if (IS_ERR(group))
  348. return PTR_ERR(group);
  349. iommu_group_put(group);
  350. return 0;
  351. }
  352. static void mtk_iommu_remove_device(struct device *dev)
  353. {
  354. struct mtk_iommu_data *data;
  355. if (!dev->iommu_fwspec || dev->iommu_fwspec->ops != &mtk_iommu_ops)
  356. return;
  357. data = dev->iommu_fwspec->iommu_priv;
  358. iommu_device_unlink(&data->iommu, dev);
  359. iommu_group_remove_device(dev);
  360. iommu_fwspec_free(dev);
  361. }
  362. static struct iommu_group *mtk_iommu_device_group(struct device *dev)
  363. {
  364. struct mtk_iommu_data *data = mtk_iommu_get_m4u_data();
  365. if (!data)
  366. return ERR_PTR(-ENODEV);
  367. /* All the client devices are in the same m4u iommu-group */
  368. if (!data->m4u_group) {
  369. data->m4u_group = iommu_group_alloc();
  370. if (IS_ERR(data->m4u_group))
  371. dev_err(dev, "Failed to allocate M4U IOMMU group\n");
  372. } else {
  373. iommu_group_ref_get(data->m4u_group);
  374. }
  375. return data->m4u_group;
  376. }
  377. static int mtk_iommu_of_xlate(struct device *dev, struct of_phandle_args *args)
  378. {
  379. struct platform_device *m4updev;
  380. if (args->args_count != 1) {
  381. dev_err(dev, "invalid #iommu-cells(%d) property for IOMMU\n",
  382. args->args_count);
  383. return -EINVAL;
  384. }
  385. if (!dev->iommu_fwspec->iommu_priv) {
  386. /* Get the m4u device */
  387. m4updev = of_find_device_by_node(args->np);
  388. if (WARN_ON(!m4updev))
  389. return -EINVAL;
  390. dev->iommu_fwspec->iommu_priv = platform_get_drvdata(m4updev);
  391. }
  392. return iommu_fwspec_add_ids(dev, args->args, 1);
  393. }
  394. static struct iommu_ops mtk_iommu_ops = {
  395. .domain_alloc = mtk_iommu_domain_alloc,
  396. .domain_free = mtk_iommu_domain_free,
  397. .attach_dev = mtk_iommu_attach_device,
  398. .detach_dev = mtk_iommu_detach_device,
  399. .map = mtk_iommu_map,
  400. .unmap = mtk_iommu_unmap,
  401. .map_sg = default_iommu_map_sg,
  402. .flush_iotlb_all = mtk_iommu_iotlb_sync,
  403. .iotlb_sync = mtk_iommu_iotlb_sync,
  404. .iova_to_phys = mtk_iommu_iova_to_phys,
  405. .add_device = mtk_iommu_add_device,
  406. .remove_device = mtk_iommu_remove_device,
  407. .device_group = mtk_iommu_device_group,
  408. .of_xlate = mtk_iommu_of_xlate,
  409. .pgsize_bitmap = SZ_4K | SZ_64K | SZ_1M | SZ_16M,
  410. };
  411. static int mtk_iommu_hw_init(const struct mtk_iommu_data *data)
  412. {
  413. u32 regval;
  414. int ret;
  415. ret = clk_prepare_enable(data->bclk);
  416. if (ret) {
  417. dev_err(data->dev, "Failed to enable iommu bclk(%d)\n", ret);
  418. return ret;
  419. }
  420. regval = F_MMU_TF_PROTECT_SEL(2, data);
  421. if (data->m4u_plat == M4U_MT8173)
  422. regval |= F_MMU_PREFETCH_RT_REPLACE_MOD;
  423. writel_relaxed(regval, data->base + REG_MMU_CTRL_REG);
  424. regval = F_L2_MULIT_HIT_EN |
  425. F_TABLE_WALK_FAULT_INT_EN |
  426. F_PREETCH_FIFO_OVERFLOW_INT_EN |
  427. F_MISS_FIFO_OVERFLOW_INT_EN |
  428. F_PREFETCH_FIFO_ERR_INT_EN |
  429. F_MISS_FIFO_ERR_INT_EN;
  430. writel_relaxed(regval, data->base + REG_MMU_INT_CONTROL0);
  431. regval = F_INT_TRANSLATION_FAULT |
  432. F_INT_MAIN_MULTI_HIT_FAULT |
  433. F_INT_INVALID_PA_FAULT |
  434. F_INT_ENTRY_REPLACEMENT_FAULT |
  435. F_INT_TLB_MISS_FAULT |
  436. F_INT_MISS_TRANSACTION_FIFO_FAULT |
  437. F_INT_PRETETCH_TRANSATION_FIFO_FAULT;
  438. writel_relaxed(regval, data->base + REG_MMU_INT_MAIN_CONTROL);
  439. writel_relaxed(F_MMU_IVRP_PA_SET(data->protect_base, data->enable_4GB),
  440. data->base + REG_MMU_IVRP_PADDR);
  441. if (data->enable_4GB && data->m4u_plat != M4U_MT8173) {
  442. /*
  443. * If 4GB mode is enabled, the validate PA range is from
  444. * 0x1_0000_0000 to 0x1_ffff_ffff. here record bit[32:30].
  445. */
  446. regval = F_MMU_VLD_PA_RNG(7, 4);
  447. writel_relaxed(regval, data->base + REG_MMU_VLD_PA_RNG);
  448. }
  449. writel_relaxed(0, data->base + REG_MMU_DCM_DIS);
  450. /* It's MISC control register whose default value is ok except mt8173.*/
  451. if (data->m4u_plat == M4U_MT8173)
  452. writel_relaxed(0, data->base + REG_MMU_STANDARD_AXI_MODE);
  453. if (devm_request_irq(data->dev, data->irq, mtk_iommu_isr, 0,
  454. dev_name(data->dev), (void *)data)) {
  455. writel_relaxed(0, data->base + REG_MMU_PT_BASE_ADDR);
  456. clk_disable_unprepare(data->bclk);
  457. dev_err(data->dev, "Failed @ IRQ-%d Request\n", data->irq);
  458. return -ENODEV;
  459. }
  460. return 0;
  461. }
  462. static const struct component_master_ops mtk_iommu_com_ops = {
  463. .bind = mtk_iommu_bind,
  464. .unbind = mtk_iommu_unbind,
  465. };
  466. static int mtk_iommu_probe(struct platform_device *pdev)
  467. {
  468. struct mtk_iommu_data *data;
  469. struct device *dev = &pdev->dev;
  470. struct resource *res;
  471. resource_size_t ioaddr;
  472. struct component_match *match = NULL;
  473. void *protect;
  474. int i, larb_nr, ret;
  475. data = devm_kzalloc(dev, sizeof(*data), GFP_KERNEL);
  476. if (!data)
  477. return -ENOMEM;
  478. data->dev = dev;
  479. data->m4u_plat = (enum mtk_iommu_plat)of_device_get_match_data(dev);
  480. /* Protect memory. HW will access here while translation fault.*/
  481. protect = devm_kzalloc(dev, MTK_PROTECT_PA_ALIGN * 2, GFP_KERNEL);
  482. if (!protect)
  483. return -ENOMEM;
  484. data->protect_base = ALIGN(virt_to_phys(protect), MTK_PROTECT_PA_ALIGN);
  485. /* Whether the current dram is over 4GB */
  486. data->enable_4GB = !!(max_pfn > (BIT_ULL(32) >> PAGE_SHIFT));
  487. res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
  488. data->base = devm_ioremap_resource(dev, res);
  489. if (IS_ERR(data->base))
  490. return PTR_ERR(data->base);
  491. ioaddr = res->start;
  492. data->irq = platform_get_irq(pdev, 0);
  493. if (data->irq < 0)
  494. return data->irq;
  495. data->bclk = devm_clk_get(dev, "bclk");
  496. if (IS_ERR(data->bclk))
  497. return PTR_ERR(data->bclk);
  498. larb_nr = of_count_phandle_with_args(dev->of_node,
  499. "mediatek,larbs", NULL);
  500. if (larb_nr < 0)
  501. return larb_nr;
  502. data->smi_imu.larb_nr = larb_nr;
  503. for (i = 0; i < larb_nr; i++) {
  504. struct device_node *larbnode;
  505. struct platform_device *plarbdev;
  506. u32 id;
  507. larbnode = of_parse_phandle(dev->of_node, "mediatek,larbs", i);
  508. if (!larbnode)
  509. return -EINVAL;
  510. if (!of_device_is_available(larbnode))
  511. continue;
  512. ret = of_property_read_u32(larbnode, "mediatek,larb-id", &id);
  513. if (ret)/* The id is consecutive if there is no this property */
  514. id = i;
  515. plarbdev = of_find_device_by_node(larbnode);
  516. if (!plarbdev)
  517. return -EPROBE_DEFER;
  518. data->smi_imu.larb_imu[id].dev = &plarbdev->dev;
  519. component_match_add_release(dev, &match, release_of,
  520. compare_of, larbnode);
  521. }
  522. platform_set_drvdata(pdev, data);
  523. ret = mtk_iommu_hw_init(data);
  524. if (ret)
  525. return ret;
  526. ret = iommu_device_sysfs_add(&data->iommu, dev, NULL,
  527. "mtk-iommu.%pa", &ioaddr);
  528. if (ret)
  529. return ret;
  530. iommu_device_set_ops(&data->iommu, &mtk_iommu_ops);
  531. iommu_device_set_fwnode(&data->iommu, &pdev->dev.of_node->fwnode);
  532. ret = iommu_device_register(&data->iommu);
  533. if (ret)
  534. return ret;
  535. list_add_tail(&data->list, &m4ulist);
  536. if (!iommu_present(&platform_bus_type))
  537. bus_set_iommu(&platform_bus_type, &mtk_iommu_ops);
  538. return component_master_add_with_match(dev, &mtk_iommu_com_ops, match);
  539. }
  540. static int mtk_iommu_remove(struct platform_device *pdev)
  541. {
  542. struct mtk_iommu_data *data = platform_get_drvdata(pdev);
  543. iommu_device_sysfs_remove(&data->iommu);
  544. iommu_device_unregister(&data->iommu);
  545. if (iommu_present(&platform_bus_type))
  546. bus_set_iommu(&platform_bus_type, NULL);
  547. clk_disable_unprepare(data->bclk);
  548. devm_free_irq(&pdev->dev, data->irq, data);
  549. component_master_del(&pdev->dev, &mtk_iommu_com_ops);
  550. return 0;
  551. }
  552. static int __maybe_unused mtk_iommu_suspend(struct device *dev)
  553. {
  554. struct mtk_iommu_data *data = dev_get_drvdata(dev);
  555. struct mtk_iommu_suspend_reg *reg = &data->reg;
  556. void __iomem *base = data->base;
  557. reg->standard_axi_mode = readl_relaxed(base +
  558. REG_MMU_STANDARD_AXI_MODE);
  559. reg->dcm_dis = readl_relaxed(base + REG_MMU_DCM_DIS);
  560. reg->ctrl_reg = readl_relaxed(base + REG_MMU_CTRL_REG);
  561. reg->int_control0 = readl_relaxed(base + REG_MMU_INT_CONTROL0);
  562. reg->int_main_control = readl_relaxed(base + REG_MMU_INT_MAIN_CONTROL);
  563. clk_disable_unprepare(data->bclk);
  564. return 0;
  565. }
  566. static int __maybe_unused mtk_iommu_resume(struct device *dev)
  567. {
  568. struct mtk_iommu_data *data = dev_get_drvdata(dev);
  569. struct mtk_iommu_suspend_reg *reg = &data->reg;
  570. void __iomem *base = data->base;
  571. int ret;
  572. ret = clk_prepare_enable(data->bclk);
  573. if (ret) {
  574. dev_err(data->dev, "Failed to enable clk(%d) in resume\n", ret);
  575. return ret;
  576. }
  577. writel_relaxed(reg->standard_axi_mode,
  578. base + REG_MMU_STANDARD_AXI_MODE);
  579. writel_relaxed(reg->dcm_dis, base + REG_MMU_DCM_DIS);
  580. writel_relaxed(reg->ctrl_reg, base + REG_MMU_CTRL_REG);
  581. writel_relaxed(reg->int_control0, base + REG_MMU_INT_CONTROL0);
  582. writel_relaxed(reg->int_main_control, base + REG_MMU_INT_MAIN_CONTROL);
  583. writel_relaxed(F_MMU_IVRP_PA_SET(data->protect_base, data->enable_4GB),
  584. base + REG_MMU_IVRP_PADDR);
  585. if (data->m4u_dom)
  586. writel(data->m4u_dom->cfg.arm_v7s_cfg.ttbr[0],
  587. base + REG_MMU_PT_BASE_ADDR);
  588. return 0;
  589. }
  590. static const struct dev_pm_ops mtk_iommu_pm_ops = {
  591. SET_NOIRQ_SYSTEM_SLEEP_PM_OPS(mtk_iommu_suspend, mtk_iommu_resume)
  592. };
  593. static const struct of_device_id mtk_iommu_of_ids[] = {
  594. { .compatible = "mediatek,mt2712-m4u", .data = (void *)M4U_MT2712},
  595. { .compatible = "mediatek,mt8173-m4u", .data = (void *)M4U_MT8173},
  596. {}
  597. };
  598. static struct platform_driver mtk_iommu_driver = {
  599. .probe = mtk_iommu_probe,
  600. .remove = mtk_iommu_remove,
  601. .driver = {
  602. .name = "mtk-iommu",
  603. .of_match_table = of_match_ptr(mtk_iommu_of_ids),
  604. .pm = &mtk_iommu_pm_ops,
  605. }
  606. };
  607. static int __init mtk_iommu_init(void)
  608. {
  609. int ret;
  610. ret = platform_driver_register(&mtk_iommu_driver);
  611. if (ret != 0)
  612. pr_err("Failed to register MTK IOMMU driver\n");
  613. return ret;
  614. }
  615. subsys_initcall(mtk_iommu_init)