162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Implementation of the IOMMU SVA API for the ARM SMMUv3 462306a36Sopenharmony_ci */ 562306a36Sopenharmony_ci 662306a36Sopenharmony_ci#include <linux/mm.h> 762306a36Sopenharmony_ci#include <linux/mmu_context.h> 862306a36Sopenharmony_ci#include <linux/mmu_notifier.h> 962306a36Sopenharmony_ci#include <linux/sched/mm.h> 1062306a36Sopenharmony_ci#include <linux/slab.h> 1162306a36Sopenharmony_ci 1262306a36Sopenharmony_ci#include "arm-smmu-v3.h" 1362306a36Sopenharmony_ci#include "../../iommu-sva.h" 1462306a36Sopenharmony_ci#include "../../io-pgtable-arm.h" 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_cistruct arm_smmu_mmu_notifier { 1762306a36Sopenharmony_ci struct mmu_notifier mn; 1862306a36Sopenharmony_ci struct arm_smmu_ctx_desc *cd; 1962306a36Sopenharmony_ci bool cleared; 2062306a36Sopenharmony_ci refcount_t refs; 2162306a36Sopenharmony_ci struct list_head list; 2262306a36Sopenharmony_ci struct arm_smmu_domain *domain; 2362306a36Sopenharmony_ci}; 2462306a36Sopenharmony_ci 2562306a36Sopenharmony_ci#define mn_to_smmu(mn) container_of(mn, struct arm_smmu_mmu_notifier, mn) 2662306a36Sopenharmony_ci 2762306a36Sopenharmony_cistruct arm_smmu_bond { 2862306a36Sopenharmony_ci struct iommu_sva sva; 2962306a36Sopenharmony_ci struct mm_struct *mm; 3062306a36Sopenharmony_ci struct arm_smmu_mmu_notifier *smmu_mn; 3162306a36Sopenharmony_ci struct list_head list; 3262306a36Sopenharmony_ci refcount_t refs; 3362306a36Sopenharmony_ci}; 3462306a36Sopenharmony_ci 3562306a36Sopenharmony_ci#define sva_to_bond(handle) \ 3662306a36Sopenharmony_ci container_of(handle, struct arm_smmu_bond, sva) 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_cistatic DEFINE_MUTEX(sva_lock); 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_ci/* 4162306a36Sopenharmony_ci * Check if the CPU ASID is available on the SMMU side. If a private context 4262306a36Sopenharmony_ci * descriptor is using it, try to replace it. 4362306a36Sopenharmony_ci */ 4462306a36Sopenharmony_cistatic struct arm_smmu_ctx_desc * 4562306a36Sopenharmony_ciarm_smmu_share_asid(struct mm_struct *mm, u16 asid) 4662306a36Sopenharmony_ci{ 4762306a36Sopenharmony_ci int ret; 4862306a36Sopenharmony_ci u32 new_asid; 4962306a36Sopenharmony_ci struct arm_smmu_ctx_desc *cd; 5062306a36Sopenharmony_ci struct arm_smmu_device *smmu; 5162306a36Sopenharmony_ci struct arm_smmu_domain *smmu_domain; 5262306a36Sopenharmony_ci 5362306a36Sopenharmony_ci cd = xa_load(&arm_smmu_asid_xa, asid); 5462306a36Sopenharmony_ci if (!cd) 5562306a36Sopenharmony_ci return NULL; 5662306a36Sopenharmony_ci 5762306a36Sopenharmony_ci if (cd->mm) { 5862306a36Sopenharmony_ci if (WARN_ON(cd->mm != mm)) 5962306a36Sopenharmony_ci return ERR_PTR(-EINVAL); 6062306a36Sopenharmony_ci /* All devices bound to this mm use the same cd struct. */ 6162306a36Sopenharmony_ci refcount_inc(&cd->refs); 6262306a36Sopenharmony_ci return cd; 6362306a36Sopenharmony_ci } 6462306a36Sopenharmony_ci 6562306a36Sopenharmony_ci smmu_domain = container_of(cd, struct arm_smmu_domain, s1_cfg.cd); 6662306a36Sopenharmony_ci smmu = smmu_domain->smmu; 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci ret = xa_alloc(&arm_smmu_asid_xa, &new_asid, cd, 6962306a36Sopenharmony_ci XA_LIMIT(1, (1 << smmu->asid_bits) - 1), GFP_KERNEL); 7062306a36Sopenharmony_ci if (ret) 7162306a36Sopenharmony_ci return ERR_PTR(-ENOSPC); 7262306a36Sopenharmony_ci /* 7362306a36Sopenharmony_ci * Race with unmap: TLB invalidations will start targeting the new ASID, 7462306a36Sopenharmony_ci * which isn't assigned yet. We'll do an invalidate-all on the old ASID 7562306a36Sopenharmony_ci * later, so it doesn't matter. 7662306a36Sopenharmony_ci */ 7762306a36Sopenharmony_ci cd->asid = new_asid; 7862306a36Sopenharmony_ci /* 7962306a36Sopenharmony_ci * Update ASID and invalidate CD in all associated masters. There will 8062306a36Sopenharmony_ci * be some overlap between use of both ASIDs, until we invalidate the 8162306a36Sopenharmony_ci * TLB. 8262306a36Sopenharmony_ci */ 8362306a36Sopenharmony_ci arm_smmu_write_ctx_desc(smmu_domain, IOMMU_NO_PASID, cd); 8462306a36Sopenharmony_ci 8562306a36Sopenharmony_ci /* Invalidate TLB entries previously associated with that context */ 8662306a36Sopenharmony_ci arm_smmu_tlb_inv_asid(smmu, asid); 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci xa_erase(&arm_smmu_asid_xa, asid); 8962306a36Sopenharmony_ci return NULL; 9062306a36Sopenharmony_ci} 9162306a36Sopenharmony_ci 9262306a36Sopenharmony_cistatic struct arm_smmu_ctx_desc *arm_smmu_alloc_shared_cd(struct mm_struct *mm) 9362306a36Sopenharmony_ci{ 9462306a36Sopenharmony_ci u16 asid; 9562306a36Sopenharmony_ci int err = 0; 9662306a36Sopenharmony_ci u64 tcr, par, reg; 9762306a36Sopenharmony_ci struct arm_smmu_ctx_desc *cd; 9862306a36Sopenharmony_ci struct arm_smmu_ctx_desc *ret = NULL; 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_ci /* Don't free the mm until we release the ASID */ 10162306a36Sopenharmony_ci mmgrab(mm); 10262306a36Sopenharmony_ci 10362306a36Sopenharmony_ci asid = arm64_mm_context_get(mm); 10462306a36Sopenharmony_ci if (!asid) { 10562306a36Sopenharmony_ci err = -ESRCH; 10662306a36Sopenharmony_ci goto out_drop_mm; 10762306a36Sopenharmony_ci } 10862306a36Sopenharmony_ci 10962306a36Sopenharmony_ci cd = kzalloc(sizeof(*cd), GFP_KERNEL); 11062306a36Sopenharmony_ci if (!cd) { 11162306a36Sopenharmony_ci err = -ENOMEM; 11262306a36Sopenharmony_ci goto out_put_context; 11362306a36Sopenharmony_ci } 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_ci refcount_set(&cd->refs, 1); 11662306a36Sopenharmony_ci 11762306a36Sopenharmony_ci mutex_lock(&arm_smmu_asid_lock); 11862306a36Sopenharmony_ci ret = arm_smmu_share_asid(mm, asid); 11962306a36Sopenharmony_ci if (ret) { 12062306a36Sopenharmony_ci mutex_unlock(&arm_smmu_asid_lock); 12162306a36Sopenharmony_ci goto out_free_cd; 12262306a36Sopenharmony_ci } 12362306a36Sopenharmony_ci 12462306a36Sopenharmony_ci err = xa_insert(&arm_smmu_asid_xa, asid, cd, GFP_KERNEL); 12562306a36Sopenharmony_ci mutex_unlock(&arm_smmu_asid_lock); 12662306a36Sopenharmony_ci 12762306a36Sopenharmony_ci if (err) 12862306a36Sopenharmony_ci goto out_free_asid; 12962306a36Sopenharmony_ci 13062306a36Sopenharmony_ci tcr = FIELD_PREP(CTXDESC_CD_0_TCR_T0SZ, 64ULL - vabits_actual) | 13162306a36Sopenharmony_ci FIELD_PREP(CTXDESC_CD_0_TCR_IRGN0, ARM_LPAE_TCR_RGN_WBWA) | 13262306a36Sopenharmony_ci FIELD_PREP(CTXDESC_CD_0_TCR_ORGN0, ARM_LPAE_TCR_RGN_WBWA) | 13362306a36Sopenharmony_ci FIELD_PREP(CTXDESC_CD_0_TCR_SH0, ARM_LPAE_TCR_SH_IS) | 13462306a36Sopenharmony_ci CTXDESC_CD_0_TCR_EPD1 | CTXDESC_CD_0_AA64; 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_ci switch (PAGE_SIZE) { 13762306a36Sopenharmony_ci case SZ_4K: 13862306a36Sopenharmony_ci tcr |= FIELD_PREP(CTXDESC_CD_0_TCR_TG0, ARM_LPAE_TCR_TG0_4K); 13962306a36Sopenharmony_ci break; 14062306a36Sopenharmony_ci case SZ_16K: 14162306a36Sopenharmony_ci tcr |= FIELD_PREP(CTXDESC_CD_0_TCR_TG0, ARM_LPAE_TCR_TG0_16K); 14262306a36Sopenharmony_ci break; 14362306a36Sopenharmony_ci case SZ_64K: 14462306a36Sopenharmony_ci tcr |= FIELD_PREP(CTXDESC_CD_0_TCR_TG0, ARM_LPAE_TCR_TG0_64K); 14562306a36Sopenharmony_ci break; 14662306a36Sopenharmony_ci default: 14762306a36Sopenharmony_ci WARN_ON(1); 14862306a36Sopenharmony_ci err = -EINVAL; 14962306a36Sopenharmony_ci goto out_free_asid; 15062306a36Sopenharmony_ci } 15162306a36Sopenharmony_ci 15262306a36Sopenharmony_ci reg = read_sanitised_ftr_reg(SYS_ID_AA64MMFR0_EL1); 15362306a36Sopenharmony_ci par = cpuid_feature_extract_unsigned_field(reg, ID_AA64MMFR0_EL1_PARANGE_SHIFT); 15462306a36Sopenharmony_ci tcr |= FIELD_PREP(CTXDESC_CD_0_TCR_IPS, par); 15562306a36Sopenharmony_ci 15662306a36Sopenharmony_ci cd->ttbr = virt_to_phys(mm->pgd); 15762306a36Sopenharmony_ci cd->tcr = tcr; 15862306a36Sopenharmony_ci /* 15962306a36Sopenharmony_ci * MAIR value is pretty much constant and global, so we can just get it 16062306a36Sopenharmony_ci * from the current CPU register 16162306a36Sopenharmony_ci */ 16262306a36Sopenharmony_ci cd->mair = read_sysreg(mair_el1); 16362306a36Sopenharmony_ci cd->asid = asid; 16462306a36Sopenharmony_ci cd->mm = mm; 16562306a36Sopenharmony_ci 16662306a36Sopenharmony_ci return cd; 16762306a36Sopenharmony_ci 16862306a36Sopenharmony_ciout_free_asid: 16962306a36Sopenharmony_ci arm_smmu_free_asid(cd); 17062306a36Sopenharmony_ciout_free_cd: 17162306a36Sopenharmony_ci kfree(cd); 17262306a36Sopenharmony_ciout_put_context: 17362306a36Sopenharmony_ci arm64_mm_context_put(mm); 17462306a36Sopenharmony_ciout_drop_mm: 17562306a36Sopenharmony_ci mmdrop(mm); 17662306a36Sopenharmony_ci return err < 0 ? ERR_PTR(err) : ret; 17762306a36Sopenharmony_ci} 17862306a36Sopenharmony_ci 17962306a36Sopenharmony_cistatic void arm_smmu_free_shared_cd(struct arm_smmu_ctx_desc *cd) 18062306a36Sopenharmony_ci{ 18162306a36Sopenharmony_ci if (arm_smmu_free_asid(cd)) { 18262306a36Sopenharmony_ci /* Unpin ASID */ 18362306a36Sopenharmony_ci arm64_mm_context_put(cd->mm); 18462306a36Sopenharmony_ci mmdrop(cd->mm); 18562306a36Sopenharmony_ci kfree(cd); 18662306a36Sopenharmony_ci } 18762306a36Sopenharmony_ci} 18862306a36Sopenharmony_ci 18962306a36Sopenharmony_ci/* 19062306a36Sopenharmony_ci * Cloned from the MAX_TLBI_OPS in arch/arm64/include/asm/tlbflush.h, this 19162306a36Sopenharmony_ci * is used as a threshold to replace per-page TLBI commands to issue in the 19262306a36Sopenharmony_ci * command queue with an address-space TLBI command, when SMMU w/o a range 19362306a36Sopenharmony_ci * invalidation feature handles too many per-page TLBI commands, which will 19462306a36Sopenharmony_ci * otherwise result in a soft lockup. 19562306a36Sopenharmony_ci */ 19662306a36Sopenharmony_ci#define CMDQ_MAX_TLBI_OPS (1 << (PAGE_SHIFT - 3)) 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_cistatic void arm_smmu_mm_arch_invalidate_secondary_tlbs(struct mmu_notifier *mn, 19962306a36Sopenharmony_ci struct mm_struct *mm, 20062306a36Sopenharmony_ci unsigned long start, 20162306a36Sopenharmony_ci unsigned long end) 20262306a36Sopenharmony_ci{ 20362306a36Sopenharmony_ci struct arm_smmu_mmu_notifier *smmu_mn = mn_to_smmu(mn); 20462306a36Sopenharmony_ci struct arm_smmu_domain *smmu_domain = smmu_mn->domain; 20562306a36Sopenharmony_ci size_t size; 20662306a36Sopenharmony_ci 20762306a36Sopenharmony_ci /* 20862306a36Sopenharmony_ci * The mm_types defines vm_end as the first byte after the end address, 20962306a36Sopenharmony_ci * different from IOMMU subsystem using the last address of an address 21062306a36Sopenharmony_ci * range. So do a simple translation here by calculating size correctly. 21162306a36Sopenharmony_ci */ 21262306a36Sopenharmony_ci size = end - start; 21362306a36Sopenharmony_ci if (!(smmu_domain->smmu->features & ARM_SMMU_FEAT_RANGE_INV)) { 21462306a36Sopenharmony_ci if (size >= CMDQ_MAX_TLBI_OPS * PAGE_SIZE) 21562306a36Sopenharmony_ci size = 0; 21662306a36Sopenharmony_ci } else { 21762306a36Sopenharmony_ci if (size == ULONG_MAX) 21862306a36Sopenharmony_ci size = 0; 21962306a36Sopenharmony_ci } 22062306a36Sopenharmony_ci 22162306a36Sopenharmony_ci if (!(smmu_domain->smmu->features & ARM_SMMU_FEAT_BTM)) { 22262306a36Sopenharmony_ci if (!size) 22362306a36Sopenharmony_ci arm_smmu_tlb_inv_asid(smmu_domain->smmu, 22462306a36Sopenharmony_ci smmu_mn->cd->asid); 22562306a36Sopenharmony_ci else 22662306a36Sopenharmony_ci arm_smmu_tlb_inv_range_asid(start, size, 22762306a36Sopenharmony_ci smmu_mn->cd->asid, 22862306a36Sopenharmony_ci PAGE_SIZE, false, 22962306a36Sopenharmony_ci smmu_domain); 23062306a36Sopenharmony_ci } 23162306a36Sopenharmony_ci 23262306a36Sopenharmony_ci arm_smmu_atc_inv_domain(smmu_domain, mm->pasid, start, size); 23362306a36Sopenharmony_ci} 23462306a36Sopenharmony_ci 23562306a36Sopenharmony_cistatic void arm_smmu_mm_release(struct mmu_notifier *mn, struct mm_struct *mm) 23662306a36Sopenharmony_ci{ 23762306a36Sopenharmony_ci struct arm_smmu_mmu_notifier *smmu_mn = mn_to_smmu(mn); 23862306a36Sopenharmony_ci struct arm_smmu_domain *smmu_domain = smmu_mn->domain; 23962306a36Sopenharmony_ci 24062306a36Sopenharmony_ci mutex_lock(&sva_lock); 24162306a36Sopenharmony_ci if (smmu_mn->cleared) { 24262306a36Sopenharmony_ci mutex_unlock(&sva_lock); 24362306a36Sopenharmony_ci return; 24462306a36Sopenharmony_ci } 24562306a36Sopenharmony_ci 24662306a36Sopenharmony_ci /* 24762306a36Sopenharmony_ci * DMA may still be running. Keep the cd valid to avoid C_BAD_CD events, 24862306a36Sopenharmony_ci * but disable translation. 24962306a36Sopenharmony_ci */ 25062306a36Sopenharmony_ci arm_smmu_write_ctx_desc(smmu_domain, mm->pasid, &quiet_cd); 25162306a36Sopenharmony_ci 25262306a36Sopenharmony_ci arm_smmu_tlb_inv_asid(smmu_domain->smmu, smmu_mn->cd->asid); 25362306a36Sopenharmony_ci arm_smmu_atc_inv_domain(smmu_domain, mm->pasid, 0, 0); 25462306a36Sopenharmony_ci 25562306a36Sopenharmony_ci smmu_mn->cleared = true; 25662306a36Sopenharmony_ci mutex_unlock(&sva_lock); 25762306a36Sopenharmony_ci} 25862306a36Sopenharmony_ci 25962306a36Sopenharmony_cistatic void arm_smmu_mmu_notifier_free(struct mmu_notifier *mn) 26062306a36Sopenharmony_ci{ 26162306a36Sopenharmony_ci kfree(mn_to_smmu(mn)); 26262306a36Sopenharmony_ci} 26362306a36Sopenharmony_ci 26462306a36Sopenharmony_cistatic const struct mmu_notifier_ops arm_smmu_mmu_notifier_ops = { 26562306a36Sopenharmony_ci .arch_invalidate_secondary_tlbs = arm_smmu_mm_arch_invalidate_secondary_tlbs, 26662306a36Sopenharmony_ci .release = arm_smmu_mm_release, 26762306a36Sopenharmony_ci .free_notifier = arm_smmu_mmu_notifier_free, 26862306a36Sopenharmony_ci}; 26962306a36Sopenharmony_ci 27062306a36Sopenharmony_ci/* Allocate or get existing MMU notifier for this {domain, mm} pair */ 27162306a36Sopenharmony_cistatic struct arm_smmu_mmu_notifier * 27262306a36Sopenharmony_ciarm_smmu_mmu_notifier_get(struct arm_smmu_domain *smmu_domain, 27362306a36Sopenharmony_ci struct mm_struct *mm) 27462306a36Sopenharmony_ci{ 27562306a36Sopenharmony_ci int ret; 27662306a36Sopenharmony_ci struct arm_smmu_ctx_desc *cd; 27762306a36Sopenharmony_ci struct arm_smmu_mmu_notifier *smmu_mn; 27862306a36Sopenharmony_ci 27962306a36Sopenharmony_ci list_for_each_entry(smmu_mn, &smmu_domain->mmu_notifiers, list) { 28062306a36Sopenharmony_ci if (smmu_mn->mn.mm == mm) { 28162306a36Sopenharmony_ci refcount_inc(&smmu_mn->refs); 28262306a36Sopenharmony_ci return smmu_mn; 28362306a36Sopenharmony_ci } 28462306a36Sopenharmony_ci } 28562306a36Sopenharmony_ci 28662306a36Sopenharmony_ci cd = arm_smmu_alloc_shared_cd(mm); 28762306a36Sopenharmony_ci if (IS_ERR(cd)) 28862306a36Sopenharmony_ci return ERR_CAST(cd); 28962306a36Sopenharmony_ci 29062306a36Sopenharmony_ci smmu_mn = kzalloc(sizeof(*smmu_mn), GFP_KERNEL); 29162306a36Sopenharmony_ci if (!smmu_mn) { 29262306a36Sopenharmony_ci ret = -ENOMEM; 29362306a36Sopenharmony_ci goto err_free_cd; 29462306a36Sopenharmony_ci } 29562306a36Sopenharmony_ci 29662306a36Sopenharmony_ci refcount_set(&smmu_mn->refs, 1); 29762306a36Sopenharmony_ci smmu_mn->cd = cd; 29862306a36Sopenharmony_ci smmu_mn->domain = smmu_domain; 29962306a36Sopenharmony_ci smmu_mn->mn.ops = &arm_smmu_mmu_notifier_ops; 30062306a36Sopenharmony_ci 30162306a36Sopenharmony_ci ret = mmu_notifier_register(&smmu_mn->mn, mm); 30262306a36Sopenharmony_ci if (ret) { 30362306a36Sopenharmony_ci kfree(smmu_mn); 30462306a36Sopenharmony_ci goto err_free_cd; 30562306a36Sopenharmony_ci } 30662306a36Sopenharmony_ci 30762306a36Sopenharmony_ci ret = arm_smmu_write_ctx_desc(smmu_domain, mm->pasid, cd); 30862306a36Sopenharmony_ci if (ret) 30962306a36Sopenharmony_ci goto err_put_notifier; 31062306a36Sopenharmony_ci 31162306a36Sopenharmony_ci list_add(&smmu_mn->list, &smmu_domain->mmu_notifiers); 31262306a36Sopenharmony_ci return smmu_mn; 31362306a36Sopenharmony_ci 31462306a36Sopenharmony_cierr_put_notifier: 31562306a36Sopenharmony_ci /* Frees smmu_mn */ 31662306a36Sopenharmony_ci mmu_notifier_put(&smmu_mn->mn); 31762306a36Sopenharmony_cierr_free_cd: 31862306a36Sopenharmony_ci arm_smmu_free_shared_cd(cd); 31962306a36Sopenharmony_ci return ERR_PTR(ret); 32062306a36Sopenharmony_ci} 32162306a36Sopenharmony_ci 32262306a36Sopenharmony_cistatic void arm_smmu_mmu_notifier_put(struct arm_smmu_mmu_notifier *smmu_mn) 32362306a36Sopenharmony_ci{ 32462306a36Sopenharmony_ci struct mm_struct *mm = smmu_mn->mn.mm; 32562306a36Sopenharmony_ci struct arm_smmu_ctx_desc *cd = smmu_mn->cd; 32662306a36Sopenharmony_ci struct arm_smmu_domain *smmu_domain = smmu_mn->domain; 32762306a36Sopenharmony_ci 32862306a36Sopenharmony_ci if (!refcount_dec_and_test(&smmu_mn->refs)) 32962306a36Sopenharmony_ci return; 33062306a36Sopenharmony_ci 33162306a36Sopenharmony_ci list_del(&smmu_mn->list); 33262306a36Sopenharmony_ci arm_smmu_write_ctx_desc(smmu_domain, mm->pasid, NULL); 33362306a36Sopenharmony_ci 33462306a36Sopenharmony_ci /* 33562306a36Sopenharmony_ci * If we went through clear(), we've already invalidated, and no 33662306a36Sopenharmony_ci * new TLB entry can have been formed. 33762306a36Sopenharmony_ci */ 33862306a36Sopenharmony_ci if (!smmu_mn->cleared) { 33962306a36Sopenharmony_ci arm_smmu_tlb_inv_asid(smmu_domain->smmu, cd->asid); 34062306a36Sopenharmony_ci arm_smmu_atc_inv_domain(smmu_domain, mm->pasid, 0, 0); 34162306a36Sopenharmony_ci } 34262306a36Sopenharmony_ci 34362306a36Sopenharmony_ci /* Frees smmu_mn */ 34462306a36Sopenharmony_ci mmu_notifier_put(&smmu_mn->mn); 34562306a36Sopenharmony_ci arm_smmu_free_shared_cd(cd); 34662306a36Sopenharmony_ci} 34762306a36Sopenharmony_ci 34862306a36Sopenharmony_cistatic struct iommu_sva * 34962306a36Sopenharmony_ci__arm_smmu_sva_bind(struct device *dev, struct mm_struct *mm) 35062306a36Sopenharmony_ci{ 35162306a36Sopenharmony_ci int ret; 35262306a36Sopenharmony_ci struct arm_smmu_bond *bond; 35362306a36Sopenharmony_ci struct arm_smmu_master *master = dev_iommu_priv_get(dev); 35462306a36Sopenharmony_ci struct iommu_domain *domain = iommu_get_domain_for_dev(dev); 35562306a36Sopenharmony_ci struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain); 35662306a36Sopenharmony_ci 35762306a36Sopenharmony_ci if (!master || !master->sva_enabled) 35862306a36Sopenharmony_ci return ERR_PTR(-ENODEV); 35962306a36Sopenharmony_ci 36062306a36Sopenharmony_ci /* If bind() was already called for this {dev, mm} pair, reuse it. */ 36162306a36Sopenharmony_ci list_for_each_entry(bond, &master->bonds, list) { 36262306a36Sopenharmony_ci if (bond->mm == mm) { 36362306a36Sopenharmony_ci refcount_inc(&bond->refs); 36462306a36Sopenharmony_ci return &bond->sva; 36562306a36Sopenharmony_ci } 36662306a36Sopenharmony_ci } 36762306a36Sopenharmony_ci 36862306a36Sopenharmony_ci bond = kzalloc(sizeof(*bond), GFP_KERNEL); 36962306a36Sopenharmony_ci if (!bond) 37062306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 37162306a36Sopenharmony_ci 37262306a36Sopenharmony_ci bond->mm = mm; 37362306a36Sopenharmony_ci bond->sva.dev = dev; 37462306a36Sopenharmony_ci refcount_set(&bond->refs, 1); 37562306a36Sopenharmony_ci 37662306a36Sopenharmony_ci bond->smmu_mn = arm_smmu_mmu_notifier_get(smmu_domain, mm); 37762306a36Sopenharmony_ci if (IS_ERR(bond->smmu_mn)) { 37862306a36Sopenharmony_ci ret = PTR_ERR(bond->smmu_mn); 37962306a36Sopenharmony_ci goto err_free_bond; 38062306a36Sopenharmony_ci } 38162306a36Sopenharmony_ci 38262306a36Sopenharmony_ci list_add(&bond->list, &master->bonds); 38362306a36Sopenharmony_ci return &bond->sva; 38462306a36Sopenharmony_ci 38562306a36Sopenharmony_cierr_free_bond: 38662306a36Sopenharmony_ci kfree(bond); 38762306a36Sopenharmony_ci return ERR_PTR(ret); 38862306a36Sopenharmony_ci} 38962306a36Sopenharmony_ci 39062306a36Sopenharmony_cibool arm_smmu_sva_supported(struct arm_smmu_device *smmu) 39162306a36Sopenharmony_ci{ 39262306a36Sopenharmony_ci unsigned long reg, fld; 39362306a36Sopenharmony_ci unsigned long oas; 39462306a36Sopenharmony_ci unsigned long asid_bits; 39562306a36Sopenharmony_ci u32 feat_mask = ARM_SMMU_FEAT_COHERENCY; 39662306a36Sopenharmony_ci 39762306a36Sopenharmony_ci if (vabits_actual == 52) 39862306a36Sopenharmony_ci feat_mask |= ARM_SMMU_FEAT_VAX; 39962306a36Sopenharmony_ci 40062306a36Sopenharmony_ci if ((smmu->features & feat_mask) != feat_mask) 40162306a36Sopenharmony_ci return false; 40262306a36Sopenharmony_ci 40362306a36Sopenharmony_ci if (!(smmu->pgsize_bitmap & PAGE_SIZE)) 40462306a36Sopenharmony_ci return false; 40562306a36Sopenharmony_ci 40662306a36Sopenharmony_ci /* 40762306a36Sopenharmony_ci * Get the smallest PA size of all CPUs (sanitized by cpufeature). We're 40862306a36Sopenharmony_ci * not even pretending to support AArch32 here. Abort if the MMU outputs 40962306a36Sopenharmony_ci * addresses larger than what we support. 41062306a36Sopenharmony_ci */ 41162306a36Sopenharmony_ci reg = read_sanitised_ftr_reg(SYS_ID_AA64MMFR0_EL1); 41262306a36Sopenharmony_ci fld = cpuid_feature_extract_unsigned_field(reg, ID_AA64MMFR0_EL1_PARANGE_SHIFT); 41362306a36Sopenharmony_ci oas = id_aa64mmfr0_parange_to_phys_shift(fld); 41462306a36Sopenharmony_ci if (smmu->oas < oas) 41562306a36Sopenharmony_ci return false; 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_ci /* We can support bigger ASIDs than the CPU, but not smaller */ 41862306a36Sopenharmony_ci fld = cpuid_feature_extract_unsigned_field(reg, ID_AA64MMFR0_EL1_ASIDBITS_SHIFT); 41962306a36Sopenharmony_ci asid_bits = fld ? 16 : 8; 42062306a36Sopenharmony_ci if (smmu->asid_bits < asid_bits) 42162306a36Sopenharmony_ci return false; 42262306a36Sopenharmony_ci 42362306a36Sopenharmony_ci /* 42462306a36Sopenharmony_ci * See max_pinned_asids in arch/arm64/mm/context.c. The following is 42562306a36Sopenharmony_ci * generally the maximum number of bindable processes. 42662306a36Sopenharmony_ci */ 42762306a36Sopenharmony_ci if (arm64_kernel_unmapped_at_el0()) 42862306a36Sopenharmony_ci asid_bits--; 42962306a36Sopenharmony_ci dev_dbg(smmu->dev, "%d shared contexts\n", (1 << asid_bits) - 43062306a36Sopenharmony_ci num_possible_cpus() - 2); 43162306a36Sopenharmony_ci 43262306a36Sopenharmony_ci return true; 43362306a36Sopenharmony_ci} 43462306a36Sopenharmony_ci 43562306a36Sopenharmony_cibool arm_smmu_master_iopf_supported(struct arm_smmu_master *master) 43662306a36Sopenharmony_ci{ 43762306a36Sopenharmony_ci /* We're not keeping track of SIDs in fault events */ 43862306a36Sopenharmony_ci if (master->num_streams != 1) 43962306a36Sopenharmony_ci return false; 44062306a36Sopenharmony_ci 44162306a36Sopenharmony_ci return master->stall_enabled; 44262306a36Sopenharmony_ci} 44362306a36Sopenharmony_ci 44462306a36Sopenharmony_cibool arm_smmu_master_sva_supported(struct arm_smmu_master *master) 44562306a36Sopenharmony_ci{ 44662306a36Sopenharmony_ci if (!(master->smmu->features & ARM_SMMU_FEAT_SVA)) 44762306a36Sopenharmony_ci return false; 44862306a36Sopenharmony_ci 44962306a36Sopenharmony_ci /* SSID support is mandatory for the moment */ 45062306a36Sopenharmony_ci return master->ssid_bits; 45162306a36Sopenharmony_ci} 45262306a36Sopenharmony_ci 45362306a36Sopenharmony_cibool arm_smmu_master_sva_enabled(struct arm_smmu_master *master) 45462306a36Sopenharmony_ci{ 45562306a36Sopenharmony_ci bool enabled; 45662306a36Sopenharmony_ci 45762306a36Sopenharmony_ci mutex_lock(&sva_lock); 45862306a36Sopenharmony_ci enabled = master->sva_enabled; 45962306a36Sopenharmony_ci mutex_unlock(&sva_lock); 46062306a36Sopenharmony_ci return enabled; 46162306a36Sopenharmony_ci} 46262306a36Sopenharmony_ci 46362306a36Sopenharmony_cistatic int arm_smmu_master_sva_enable_iopf(struct arm_smmu_master *master) 46462306a36Sopenharmony_ci{ 46562306a36Sopenharmony_ci int ret; 46662306a36Sopenharmony_ci struct device *dev = master->dev; 46762306a36Sopenharmony_ci 46862306a36Sopenharmony_ci /* 46962306a36Sopenharmony_ci * Drivers for devices supporting PRI or stall should enable IOPF first. 47062306a36Sopenharmony_ci * Others have device-specific fault handlers and don't need IOPF. 47162306a36Sopenharmony_ci */ 47262306a36Sopenharmony_ci if (!arm_smmu_master_iopf_supported(master)) 47362306a36Sopenharmony_ci return 0; 47462306a36Sopenharmony_ci 47562306a36Sopenharmony_ci if (!master->iopf_enabled) 47662306a36Sopenharmony_ci return -EINVAL; 47762306a36Sopenharmony_ci 47862306a36Sopenharmony_ci ret = iopf_queue_add_device(master->smmu->evtq.iopf, dev); 47962306a36Sopenharmony_ci if (ret) 48062306a36Sopenharmony_ci return ret; 48162306a36Sopenharmony_ci 48262306a36Sopenharmony_ci ret = iommu_register_device_fault_handler(dev, iommu_queue_iopf, dev); 48362306a36Sopenharmony_ci if (ret) { 48462306a36Sopenharmony_ci iopf_queue_remove_device(master->smmu->evtq.iopf, dev); 48562306a36Sopenharmony_ci return ret; 48662306a36Sopenharmony_ci } 48762306a36Sopenharmony_ci return 0; 48862306a36Sopenharmony_ci} 48962306a36Sopenharmony_ci 49062306a36Sopenharmony_cistatic void arm_smmu_master_sva_disable_iopf(struct arm_smmu_master *master) 49162306a36Sopenharmony_ci{ 49262306a36Sopenharmony_ci struct device *dev = master->dev; 49362306a36Sopenharmony_ci 49462306a36Sopenharmony_ci if (!master->iopf_enabled) 49562306a36Sopenharmony_ci return; 49662306a36Sopenharmony_ci 49762306a36Sopenharmony_ci iommu_unregister_device_fault_handler(dev); 49862306a36Sopenharmony_ci iopf_queue_remove_device(master->smmu->evtq.iopf, dev); 49962306a36Sopenharmony_ci} 50062306a36Sopenharmony_ci 50162306a36Sopenharmony_ciint arm_smmu_master_enable_sva(struct arm_smmu_master *master) 50262306a36Sopenharmony_ci{ 50362306a36Sopenharmony_ci int ret; 50462306a36Sopenharmony_ci 50562306a36Sopenharmony_ci mutex_lock(&sva_lock); 50662306a36Sopenharmony_ci ret = arm_smmu_master_sva_enable_iopf(master); 50762306a36Sopenharmony_ci if (!ret) 50862306a36Sopenharmony_ci master->sva_enabled = true; 50962306a36Sopenharmony_ci mutex_unlock(&sva_lock); 51062306a36Sopenharmony_ci 51162306a36Sopenharmony_ci return ret; 51262306a36Sopenharmony_ci} 51362306a36Sopenharmony_ci 51462306a36Sopenharmony_ciint arm_smmu_master_disable_sva(struct arm_smmu_master *master) 51562306a36Sopenharmony_ci{ 51662306a36Sopenharmony_ci mutex_lock(&sva_lock); 51762306a36Sopenharmony_ci if (!list_empty(&master->bonds)) { 51862306a36Sopenharmony_ci dev_err(master->dev, "cannot disable SVA, device is bound\n"); 51962306a36Sopenharmony_ci mutex_unlock(&sva_lock); 52062306a36Sopenharmony_ci return -EBUSY; 52162306a36Sopenharmony_ci } 52262306a36Sopenharmony_ci arm_smmu_master_sva_disable_iopf(master); 52362306a36Sopenharmony_ci master->sva_enabled = false; 52462306a36Sopenharmony_ci mutex_unlock(&sva_lock); 52562306a36Sopenharmony_ci 52662306a36Sopenharmony_ci return 0; 52762306a36Sopenharmony_ci} 52862306a36Sopenharmony_ci 52962306a36Sopenharmony_civoid arm_smmu_sva_notifier_synchronize(void) 53062306a36Sopenharmony_ci{ 53162306a36Sopenharmony_ci /* 53262306a36Sopenharmony_ci * Some MMU notifiers may still be waiting to be freed, using 53362306a36Sopenharmony_ci * arm_smmu_mmu_notifier_free(). Wait for them. 53462306a36Sopenharmony_ci */ 53562306a36Sopenharmony_ci mmu_notifier_synchronize(); 53662306a36Sopenharmony_ci} 53762306a36Sopenharmony_ci 53862306a36Sopenharmony_civoid arm_smmu_sva_remove_dev_pasid(struct iommu_domain *domain, 53962306a36Sopenharmony_ci struct device *dev, ioasid_t id) 54062306a36Sopenharmony_ci{ 54162306a36Sopenharmony_ci struct mm_struct *mm = domain->mm; 54262306a36Sopenharmony_ci struct arm_smmu_bond *bond = NULL, *t; 54362306a36Sopenharmony_ci struct arm_smmu_master *master = dev_iommu_priv_get(dev); 54462306a36Sopenharmony_ci 54562306a36Sopenharmony_ci mutex_lock(&sva_lock); 54662306a36Sopenharmony_ci list_for_each_entry(t, &master->bonds, list) { 54762306a36Sopenharmony_ci if (t->mm == mm) { 54862306a36Sopenharmony_ci bond = t; 54962306a36Sopenharmony_ci break; 55062306a36Sopenharmony_ci } 55162306a36Sopenharmony_ci } 55262306a36Sopenharmony_ci 55362306a36Sopenharmony_ci if (!WARN_ON(!bond) && refcount_dec_and_test(&bond->refs)) { 55462306a36Sopenharmony_ci list_del(&bond->list); 55562306a36Sopenharmony_ci arm_smmu_mmu_notifier_put(bond->smmu_mn); 55662306a36Sopenharmony_ci kfree(bond); 55762306a36Sopenharmony_ci } 55862306a36Sopenharmony_ci mutex_unlock(&sva_lock); 55962306a36Sopenharmony_ci} 56062306a36Sopenharmony_ci 56162306a36Sopenharmony_cistatic int arm_smmu_sva_set_dev_pasid(struct iommu_domain *domain, 56262306a36Sopenharmony_ci struct device *dev, ioasid_t id) 56362306a36Sopenharmony_ci{ 56462306a36Sopenharmony_ci int ret = 0; 56562306a36Sopenharmony_ci struct iommu_sva *handle; 56662306a36Sopenharmony_ci struct mm_struct *mm = domain->mm; 56762306a36Sopenharmony_ci 56862306a36Sopenharmony_ci mutex_lock(&sva_lock); 56962306a36Sopenharmony_ci handle = __arm_smmu_sva_bind(dev, mm); 57062306a36Sopenharmony_ci if (IS_ERR(handle)) 57162306a36Sopenharmony_ci ret = PTR_ERR(handle); 57262306a36Sopenharmony_ci mutex_unlock(&sva_lock); 57362306a36Sopenharmony_ci 57462306a36Sopenharmony_ci return ret; 57562306a36Sopenharmony_ci} 57662306a36Sopenharmony_ci 57762306a36Sopenharmony_cistatic void arm_smmu_sva_domain_free(struct iommu_domain *domain) 57862306a36Sopenharmony_ci{ 57962306a36Sopenharmony_ci kfree(domain); 58062306a36Sopenharmony_ci} 58162306a36Sopenharmony_ci 58262306a36Sopenharmony_cistatic const struct iommu_domain_ops arm_smmu_sva_domain_ops = { 58362306a36Sopenharmony_ci .set_dev_pasid = arm_smmu_sva_set_dev_pasid, 58462306a36Sopenharmony_ci .free = arm_smmu_sva_domain_free 58562306a36Sopenharmony_ci}; 58662306a36Sopenharmony_ci 58762306a36Sopenharmony_cistruct iommu_domain *arm_smmu_sva_domain_alloc(void) 58862306a36Sopenharmony_ci{ 58962306a36Sopenharmony_ci struct iommu_domain *domain; 59062306a36Sopenharmony_ci 59162306a36Sopenharmony_ci domain = kzalloc(sizeof(*domain), GFP_KERNEL); 59262306a36Sopenharmony_ci if (!domain) 59362306a36Sopenharmony_ci return NULL; 59462306a36Sopenharmony_ci domain->ops = &arm_smmu_sva_domain_ops; 59562306a36Sopenharmony_ci 59662306a36Sopenharmony_ci return domain; 59762306a36Sopenharmony_ci} 598