can: kvaser_usb_leaf: Fix TX queue out of sync after restart
[linux-block.git] / drivers / firmware / stratix10-svc.c
CommitLineData
7ca5ce89
RG
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * Copyright (C) 2017-2018, Intel Corporation
4 */
5
6#include <linux/completion.h>
7#include <linux/delay.h>
8#include <linux/genalloc.h>
9#include <linux/io.h>
10#include <linux/kfifo.h>
11#include <linux/kthread.h>
12#include <linux/module.h>
13#include <linux/mutex.h>
14#include <linux/of.h>
15#include <linux/of_platform.h>
16#include <linux/platform_device.h>
17#include <linux/slab.h>
18#include <linux/spinlock.h>
19#include <linux/firmware/intel/stratix10-smc.h>
20#include <linux/firmware/intel/stratix10-svc-client.h>
21#include <linux/types.h>
22
23/**
24 * SVC_NUM_DATA_IN_FIFO - number of struct stratix10_svc_data in the FIFO
25 *
26 * SVC_NUM_CHANNEL - number of channel supported by service layer driver
27 *
28 * FPGA_CONFIG_DATA_CLAIM_TIMEOUT_MS - claim back the submitted buffer(s)
29 * from the secure world for FPGA manager to reuse, or to free the buffer(s)
30 * when all bit-stream data had be send.
31 *
32 * FPGA_CONFIG_STATUS_TIMEOUT_SEC - poll the FPGA configuration status,
33 * service layer will return error to FPGA manager when timeout occurs,
34 * timeout is set to 30 seconds (30 * 1000) at Intel Stratix10 SoC.
35 */
36#define SVC_NUM_DATA_IN_FIFO 32
e6281c26 37#define SVC_NUM_CHANNEL 3
7ca5ce89
RG
38#define FPGA_CONFIG_DATA_CLAIM_TIMEOUT_MS 200
39#define FPGA_CONFIG_STATUS_TIMEOUT_SEC 30
40
b5dc75c9
RG
41/* stratix10 service layer clients */
42#define STRATIX10_RSU "stratix10-rsu"
e6281c26 43#define INTEL_FCS "intel-fcs"
b5dc75c9 44
7ca5ce89
RG
45typedef void (svc_invoke_fn)(unsigned long, unsigned long, unsigned long,
46 unsigned long, unsigned long, unsigned long,
47 unsigned long, unsigned long,
48 struct arm_smccc_res *);
49struct stratix10_svc_chan;
50
b5dc75c9
RG
51/**
52 * struct stratix10_svc - svc private data
53 * @stratix10_svc_rsu: pointer to stratix10 RSU device
54 */
55struct stratix10_svc {
56 struct platform_device *stratix10_svc_rsu;
e6281c26 57 struct platform_device *intel_svc_fcs;
b5dc75c9
RG
58};
59
7ca5ce89
RG
60/**
61 * struct stratix10_svc_sh_memory - service shared memory structure
62 * @sync_complete: state for a completion
63 * @addr: physical address of shared memory block
64 * @size: size of shared memory block
65 * @invoke_fn: function to issue secure monitor or hypervisor call
66 *
67 * This struct is used to save physical address and size of shared memory
68 * block. The shared memory blocked is allocated by secure monitor software
69 * at secure world.
70 *
71 * Service layer driver uses the physical address and size to create a memory
72 * pool, then allocates data buffer from that memory pool for service client.
73 */
74struct stratix10_svc_sh_memory {
75 struct completion sync_complete;
76 unsigned long addr;
77 unsigned long size;
78 svc_invoke_fn *invoke_fn;
79};
80
81/**
82 * struct stratix10_svc_data_mem - service memory structure
83 * @vaddr: virtual address
84 * @paddr: physical address
85 * @size: size of memory
86 * @node: link list head node
87 *
88 * This struct is used in a list that keeps track of buffers which have
89 * been allocated or freed from the memory pool. Service layer driver also
90 * uses this struct to transfer physical address to virtual address.
91 */
92struct stratix10_svc_data_mem {
93 void *vaddr;
94 phys_addr_t paddr;
95 size_t size;
96 struct list_head node;
97};
98
99/**
100 * struct stratix10_svc_data - service data structure
101 * @chan: service channel
4a4709d4
ATS
102 * @paddr: physical address of to be processed payload
103 * @size: to be processed playload size
104 * @paddr_output: physical address of processed payload
105 * @size_output: processed payload size
7ca5ce89
RG
106 * @command: service command requested by client
107 * @flag: configuration type (full or partial)
108 * @arg: args to be passed via registers and not physically mapped buffers
109 *
110 * This struct is used in service FIFO for inter-process communication.
111 */
112struct stratix10_svc_data {
113 struct stratix10_svc_chan *chan;
114 phys_addr_t paddr;
115 size_t size;
4a4709d4
ATS
116 phys_addr_t paddr_output;
117 size_t size_output;
7ca5ce89
RG
118 u32 command;
119 u32 flag;
120 u64 arg[3];
121};
122
123/**
124 * struct stratix10_svc_controller - service controller
125 * @dev: device
126 * @chans: array of service channels
127 * @num_chans: number of channels in 'chans' array
128 * @num_active_client: number of active service client
129 * @node: list management
130 * @genpool: memory pool pointing to the memory region
131 * @task: pointer to the thread task which handles SMC or HVC call
132 * @svc_fifo: a queue for storing service message data
133 * @complete_status: state for completion
134 * @svc_fifo_lock: protect access to service message data queue
135 * @invoke_fn: function to issue secure monitor call or hypervisor call
136 *
137 * This struct is used to create communication channels for service clients, to
138 * handle secure monitor or hypervisor call.
139 */
140struct stratix10_svc_controller {
141 struct device *dev;
142 struct stratix10_svc_chan *chans;
143 int num_chans;
144 int num_active_client;
145 struct list_head node;
146 struct gen_pool *genpool;
147 struct task_struct *task;
148 struct kfifo svc_fifo;
149 struct completion complete_status;
150 spinlock_t svc_fifo_lock;
151 svc_invoke_fn *invoke_fn;
152};
153
154/**
155 * struct stratix10_svc_chan - service communication channel
156 * @ctrl: pointer to service controller which is the provider of this channel
157 * @scl: pointer to service client which owns the channel
158 * @name: service client name associated with the channel
159 * @lock: protect access to the channel
160 *
161 * This struct is used by service client to communicate with service layer, each
162 * service client has its own channel created by service controller.
163 */
164struct stratix10_svc_chan {
165 struct stratix10_svc_controller *ctrl;
166 struct stratix10_svc_client *scl;
167 char *name;
168 spinlock_t lock;
169};
170
171static LIST_HEAD(svc_ctrl);
172static LIST_HEAD(svc_data_mem);
173
174/**
175 * svc_pa_to_va() - translate physical address to virtual address
176 * @addr: to be translated physical address
177 *
178 * Return: valid virtual address or NULL if the provided physical
179 * address doesn't exist.
180 */
181static void *svc_pa_to_va(unsigned long addr)
182{
183 struct stratix10_svc_data_mem *pmem;
184
185 pr_debug("claim back P-addr=0x%016x\n", (unsigned int)addr);
186 list_for_each_entry(pmem, &svc_data_mem, node)
187 if (pmem->paddr == addr)
188 return pmem->vaddr;
189
190 /* physical address is not found */
191 return NULL;
192}
193
194/**
195 * svc_thread_cmd_data_claim() - claim back buffer from the secure world
196 * @ctrl: pointer to service layer controller
197 * @p_data: pointer to service data structure
198 * @cb_data: pointer to callback data structure to service client
199 *
200 * Claim back the submitted buffers from the secure world and pass buffer
201 * back to service client (FPGA manager, etc) for reuse.
202 */
203static void svc_thread_cmd_data_claim(struct stratix10_svc_controller *ctrl,
204 struct stratix10_svc_data *p_data,
205 struct stratix10_svc_cb_data *cb_data)
206{
207 struct arm_smccc_res res;
208 unsigned long timeout;
209
210 reinit_completion(&ctrl->complete_status);
211 timeout = msecs_to_jiffies(FPGA_CONFIG_DATA_CLAIM_TIMEOUT_MS);
212
213 pr_debug("%s: claim back the submitted buffer\n", __func__);
214 do {
215 ctrl->invoke_fn(INTEL_SIP_SMC_FPGA_CONFIG_COMPLETED_WRITE,
216 0, 0, 0, 0, 0, 0, 0, &res);
217
218 if (res.a0 == INTEL_SIP_SMC_STATUS_OK) {
219 if (!res.a1) {
220 complete(&ctrl->complete_status);
221 break;
222 }
7536ad8d 223 cb_data->status = BIT(SVC_STATUS_BUFFER_DONE);
7ca5ce89
RG
224 cb_data->kaddr1 = svc_pa_to_va(res.a1);
225 cb_data->kaddr2 = (res.a2) ?
226 svc_pa_to_va(res.a2) : NULL;
227 cb_data->kaddr3 = (res.a3) ?
228 svc_pa_to_va(res.a3) : NULL;
229 p_data->chan->scl->receive_cb(p_data->chan->scl,
230 cb_data);
231 } else {
232 pr_debug("%s: secure world busy, polling again\n",
233 __func__);
234 }
235 } while (res.a0 == INTEL_SIP_SMC_STATUS_OK ||
7536ad8d 236 res.a0 == INTEL_SIP_SMC_STATUS_BUSY ||
7ca5ce89
RG
237 wait_for_completion_timeout(&ctrl->complete_status, timeout));
238}
239
240/**
241 * svc_thread_cmd_config_status() - check configuration status
242 * @ctrl: pointer to service layer controller
243 * @p_data: pointer to service data structure
244 * @cb_data: pointer to callback data structure to service client
245 *
246 * Check whether the secure firmware at secure world has finished the FPGA
247 * configuration, and then inform FPGA manager the configuration status.
248 */
249static void svc_thread_cmd_config_status(struct stratix10_svc_controller *ctrl,
250 struct stratix10_svc_data *p_data,
251 struct stratix10_svc_cb_data *cb_data)
252{
253 struct arm_smccc_res res;
254 int count_in_sec;
79b93625 255 unsigned long a0, a1, a2;
7ca5ce89
RG
256
257 cb_data->kaddr1 = NULL;
258 cb_data->kaddr2 = NULL;
259 cb_data->kaddr3 = NULL;
7536ad8d 260 cb_data->status = BIT(SVC_STATUS_ERROR);
7ca5ce89
RG
261
262 pr_debug("%s: polling config status\n", __func__);
263
79b93625
ATS
264 a0 = INTEL_SIP_SMC_FPGA_CONFIG_ISDONE;
265 a1 = (unsigned long)p_data->paddr;
266 a2 = (unsigned long)p_data->size;
267
268 if (p_data->command == COMMAND_POLL_SERVICE_STATUS)
269 a0 = INTEL_SIP_SMC_SERVICE_COMPLETED;
270
7ca5ce89
RG
271 count_in_sec = FPGA_CONFIG_STATUS_TIMEOUT_SEC;
272 while (count_in_sec) {
79b93625 273 ctrl->invoke_fn(a0, a1, a2, 0, 0, 0, 0, 0, &res);
7ca5ce89 274 if ((res.a0 == INTEL_SIP_SMC_STATUS_OK) ||
79b93625
ATS
275 (res.a0 == INTEL_SIP_SMC_STATUS_ERROR) ||
276 (res.a0 == INTEL_SIP_SMC_STATUS_REJECTED))
7ca5ce89
RG
277 break;
278
279 /*
79b93625 280 * request is still in progress, wait one second then
7ca5ce89
RG
281 * poll again
282 */
283 msleep(1000);
284 count_in_sec--;
03ddd2eb 285 }
7ca5ce89 286
79b93625
ATS
287 if (!count_in_sec) {
288 pr_err("%s: poll status timeout\n", __func__);
289 cb_data->status = BIT(SVC_STATUS_BUSY);
290 } else if (res.a0 == INTEL_SIP_SMC_STATUS_OK) {
7536ad8d 291 cb_data->status = BIT(SVC_STATUS_COMPLETED);
79b93625
ATS
292 cb_data->kaddr2 = (res.a2) ?
293 svc_pa_to_va(res.a2) : NULL;
294 cb_data->kaddr3 = (res.a3) ? &res.a3 : NULL;
295 } else {
296 pr_err("%s: poll status error\n", __func__);
297 cb_data->kaddr1 = &res.a1;
298 cb_data->kaddr2 = (res.a2) ?
299 svc_pa_to_va(res.a2) : NULL;
300 cb_data->kaddr3 = (res.a3) ? &res.a3 : NULL;
301 cb_data->status = BIT(SVC_STATUS_ERROR);
302 }
7ca5ce89
RG
303
304 p_data->chan->scl->receive_cb(p_data->chan->scl, cb_data);
305}
306
307/**
308 * svc_thread_recv_status_ok() - handle the successful status
309 * @p_data: pointer to service data structure
310 * @cb_data: pointer to callback data structure to service client
311 * @res: result from SMC or HVC call
312 *
6b50d882 313 * Send back the correspond status to the service clients.
7ca5ce89
RG
314 */
315static void svc_thread_recv_status_ok(struct stratix10_svc_data *p_data,
316 struct stratix10_svc_cb_data *cb_data,
317 struct arm_smccc_res res)
318{
319 cb_data->kaddr1 = NULL;
320 cb_data->kaddr2 = NULL;
321 cb_data->kaddr3 = NULL;
322
323 switch (p_data->command) {
324 case COMMAND_RECONFIG:
7536ad8d
RG
325 case COMMAND_RSU_UPDATE:
326 case COMMAND_RSU_NOTIFY:
4a4709d4
ATS
327 case COMMAND_FCS_REQUEST_SERVICE:
328 case COMMAND_FCS_SEND_CERTIFICATE:
329 case COMMAND_FCS_DATA_ENCRYPTION:
330 case COMMAND_FCS_DATA_DECRYPTION:
7536ad8d 331 cb_data->status = BIT(SVC_STATUS_OK);
7ca5ce89
RG
332 break;
333 case COMMAND_RECONFIG_DATA_SUBMIT:
7536ad8d 334 cb_data->status = BIT(SVC_STATUS_BUFFER_SUBMITTED);
7ca5ce89
RG
335 break;
336 case COMMAND_RECONFIG_STATUS:
7536ad8d 337 cb_data->status = BIT(SVC_STATUS_COMPLETED);
b5dc75c9
RG
338 break;
339 case COMMAND_RSU_RETRY:
bf0e5bf6 340 case COMMAND_RSU_MAX_RETRY:
1b4394c5 341 case COMMAND_RSU_DCMF_STATUS:
085a8844 342 case COMMAND_FIRMWARE_VERSION:
7536ad8d 343 cb_data->status = BIT(SVC_STATUS_OK);
b5dc75c9 344 cb_data->kaddr1 = &res.a1;
6b50d882 345 break;
7935e899
ATS
346 case COMMAND_SMC_SVC_VERSION:
347 cb_data->status = BIT(SVC_STATUS_OK);
348 cb_data->kaddr1 = &res.a1;
349 cb_data->kaddr2 = &res.a2;
350 break;
bf0e5bf6
RG
351 case COMMAND_RSU_DCMF_VERSION:
352 cb_data->status = BIT(SVC_STATUS_OK);
353 cb_data->kaddr1 = &res.a1;
354 cb_data->kaddr2 = &res.a2;
355 break;
4a4709d4
ATS
356 case COMMAND_FCS_RANDOM_NUMBER_GEN:
357 case COMMAND_FCS_GET_PROVISION_DATA:
358 case COMMAND_POLL_SERVICE_STATUS:
359 cb_data->status = BIT(SVC_STATUS_OK);
360 cb_data->kaddr1 = &res.a1;
361 cb_data->kaddr2 = svc_pa_to_va(res.a2);
362 cb_data->kaddr3 = &res.a3;
363 break;
7ca5ce89
RG
364 default:
365 pr_warn("it shouldn't happen\n");
366 break;
367 }
368
369 pr_debug("%s: call receive_cb\n", __func__);
370 p_data->chan->scl->receive_cb(p_data->chan->scl, cb_data);
371}
372
373/**
374 * svc_normal_to_secure_thread() - the function to run in the kthread
375 * @data: data pointer for kthread function
376 *
377 * Service layer driver creates stratix10_svc_smc_hvc_call kthread on CPU
378 * node 0, its function stratix10_svc_secure_call_thread is used to handle
379 * SMC or HVC calls between kernel driver and secure monitor software.
380 *
381 * Return: 0 for success or -ENOMEM on error.
382 */
383static int svc_normal_to_secure_thread(void *data)
384{
385 struct stratix10_svc_controller
386 *ctrl = (struct stratix10_svc_controller *)data;
387 struct stratix10_svc_data *pdata;
388 struct stratix10_svc_cb_data *cbdata;
389 struct arm_smccc_res res;
4a4709d4 390 unsigned long a0, a1, a2, a3, a4, a5, a6, a7;
7ca5ce89
RG
391 int ret_fifo = 0;
392
393 pdata = kmalloc(sizeof(*pdata), GFP_KERNEL);
394 if (!pdata)
395 return -ENOMEM;
396
397 cbdata = kmalloc(sizeof(*cbdata), GFP_KERNEL);
398 if (!cbdata) {
399 kfree(pdata);
400 return -ENOMEM;
401 }
402
403 /* default set, to remove build warning */
404 a0 = INTEL_SIP_SMC_FPGA_CONFIG_LOOPBACK;
405 a1 = 0;
406 a2 = 0;
4a4709d4
ATS
407 a3 = 0;
408 a4 = 0;
409 a5 = 0;
410 a6 = 0;
411 a7 = 0;
7ca5ce89
RG
412
413 pr_debug("smc_hvc_shm_thread is running\n");
414
415 while (!kthread_should_stop()) {
416 ret_fifo = kfifo_out_spinlocked(&ctrl->svc_fifo,
417 pdata, sizeof(*pdata),
418 &ctrl->svc_fifo_lock);
419
420 if (!ret_fifo)
421 continue;
422
423 pr_debug("get from FIFO pa=0x%016x, command=%u, size=%u\n",
424 (unsigned int)pdata->paddr, pdata->command,
425 (unsigned int)pdata->size);
426
427 switch (pdata->command) {
428 case COMMAND_RECONFIG_DATA_CLAIM:
429 svc_thread_cmd_data_claim(ctrl, pdata, cbdata);
430 continue;
431 case COMMAND_RECONFIG:
432 a0 = INTEL_SIP_SMC_FPGA_CONFIG_START;
433 pr_debug("conf_type=%u\n", (unsigned int)pdata->flag);
434 a1 = pdata->flag;
435 a2 = 0;
436 break;
437 case COMMAND_RECONFIG_DATA_SUBMIT:
438 a0 = INTEL_SIP_SMC_FPGA_CONFIG_WRITE;
439 a1 = (unsigned long)pdata->paddr;
440 a2 = (unsigned long)pdata->size;
441 break;
442 case COMMAND_RECONFIG_STATUS:
443 a0 = INTEL_SIP_SMC_FPGA_CONFIG_ISDONE;
444 a1 = 0;
445 a2 = 0;
446 break;
6b50d882
RG
447 case COMMAND_RSU_STATUS:
448 a0 = INTEL_SIP_SMC_RSU_STATUS;
449 a1 = 0;
450 a2 = 0;
451 break;
452 case COMMAND_RSU_UPDATE:
453 a0 = INTEL_SIP_SMC_RSU_UPDATE;
454 a1 = pdata->arg[0];
455 a2 = 0;
456 break;
b5dc75c9
RG
457 case COMMAND_RSU_NOTIFY:
458 a0 = INTEL_SIP_SMC_RSU_NOTIFY;
459 a1 = pdata->arg[0];
460 a2 = 0;
461 break;
462 case COMMAND_RSU_RETRY:
463 a0 = INTEL_SIP_SMC_RSU_RETRY_COUNTER;
464 a1 = 0;
465 a2 = 0;
466 break;
bf0e5bf6
RG
467 case COMMAND_RSU_MAX_RETRY:
468 a0 = INTEL_SIP_SMC_RSU_MAX_RETRY;
469 a1 = 0;
470 a2 = 0;
471 break;
472 case COMMAND_RSU_DCMF_VERSION:
473 a0 = INTEL_SIP_SMC_RSU_DCMF_VERSION;
474 a1 = 0;
475 a2 = 0;
476 break;
085a8844
RG
477 case COMMAND_FIRMWARE_VERSION:
478 a0 = INTEL_SIP_SMC_FIRMWARE_VERSION;
479 a1 = 0;
480 a2 = 0;
481 break;
4a4709d4
ATS
482
483 /* for FCS */
484 case COMMAND_FCS_DATA_ENCRYPTION:
485 a0 = INTEL_SIP_SMC_FCS_CRYPTION;
486 a1 = 1;
487 a2 = (unsigned long)pdata->paddr;
488 a3 = (unsigned long)pdata->size;
489 a4 = (unsigned long)pdata->paddr_output;
490 a5 = (unsigned long)pdata->size_output;
491 break;
492 case COMMAND_FCS_DATA_DECRYPTION:
493 a0 = INTEL_SIP_SMC_FCS_CRYPTION;
494 a1 = 0;
495 a2 = (unsigned long)pdata->paddr;
496 a3 = (unsigned long)pdata->size;
497 a4 = (unsigned long)pdata->paddr_output;
498 a5 = (unsigned long)pdata->size_output;
499 break;
500 case COMMAND_FCS_RANDOM_NUMBER_GEN:
501 a0 = INTEL_SIP_SMC_FCS_RANDOM_NUMBER;
502 a1 = (unsigned long)pdata->paddr;
503 a2 = 0;
504 break;
505 case COMMAND_FCS_REQUEST_SERVICE:
506 a0 = INTEL_SIP_SMC_FCS_SERVICE_REQUEST;
507 a1 = (unsigned long)pdata->paddr;
508 a2 = (unsigned long)pdata->size;
509 break;
510 case COMMAND_FCS_SEND_CERTIFICATE:
511 a0 = INTEL_SIP_SMC_FCS_SEND_CERTIFICATE;
512 a1 = (unsigned long)pdata->paddr;
513 a2 = (unsigned long)pdata->size;
514 break;
515 case COMMAND_FCS_GET_PROVISION_DATA:
516 a0 = INTEL_SIP_SMC_FCS_GET_PROVISION_DATA;
517 a1 = (unsigned long)pdata->paddr;
518 a2 = 0;
519 break;
520
79b93625
ATS
521 /* for polling */
522 case COMMAND_POLL_SERVICE_STATUS:
523 a0 = INTEL_SIP_SMC_SERVICE_COMPLETED;
524 a1 = (unsigned long)pdata->paddr;
525 a2 = (unsigned long)pdata->size;
79b93625 526 break;
1b4394c5
KJL
527 case COMMAND_RSU_DCMF_STATUS:
528 a0 = INTEL_SIP_SMC_RSU_DCMF_STATUS;
529 a1 = 0;
530 a2 = 0;
531 break;
7935e899
ATS
532 case COMMAND_SMC_SVC_VERSION:
533 a0 = INTEL_SIP_SMC_SVC_VERSION;
534 a1 = 0;
535 a2 = 0;
536 break;
7ca5ce89
RG
537 default:
538 pr_warn("it shouldn't happen\n");
539 break;
540 }
541 pr_debug("%s: before SMC call -- a0=0x%016x a1=0x%016x",
4a4709d4
ATS
542 __func__,
543 (unsigned int)a0,
544 (unsigned int)a1);
7ca5ce89 545 pr_debug(" a2=0x%016x\n", (unsigned int)a2);
4a4709d4
ATS
546 pr_debug(" a3=0x%016x\n", (unsigned int)a3);
547 pr_debug(" a4=0x%016x\n", (unsigned int)a4);
548 pr_debug(" a5=0x%016x\n", (unsigned int)a5);
549 ctrl->invoke_fn(a0, a1, a2, a3, a4, a5, a6, a7, &res);
7ca5ce89
RG
550
551 pr_debug("%s: after SMC call -- res.a0=0x%016x",
552 __func__, (unsigned int)res.a0);
553 pr_debug(" res.a1=0x%016x, res.a2=0x%016x",
554 (unsigned int)res.a1, (unsigned int)res.a2);
555 pr_debug(" res.a3=0x%016x\n", (unsigned int)res.a3);
556
6b50d882
RG
557 if (pdata->command == COMMAND_RSU_STATUS) {
558 if (res.a0 == INTEL_SIP_SMC_RSU_ERROR)
7536ad8d 559 cbdata->status = BIT(SVC_STATUS_ERROR);
6b50d882 560 else
7536ad8d 561 cbdata->status = BIT(SVC_STATUS_OK);
6b50d882
RG
562
563 cbdata->kaddr1 = &res;
564 cbdata->kaddr2 = NULL;
565 cbdata->kaddr3 = NULL;
566 pdata->chan->scl->receive_cb(pdata->chan->scl, cbdata);
567 continue;
568 }
569
7ca5ce89
RG
570 switch (res.a0) {
571 case INTEL_SIP_SMC_STATUS_OK:
572 svc_thread_recv_status_ok(pdata, cbdata, res);
573 break;
7536ad8d 574 case INTEL_SIP_SMC_STATUS_BUSY:
7ca5ce89
RG
575 switch (pdata->command) {
576 case COMMAND_RECONFIG_DATA_SUBMIT:
577 svc_thread_cmd_data_claim(ctrl,
578 pdata, cbdata);
579 break;
580 case COMMAND_RECONFIG_STATUS:
79b93625 581 case COMMAND_POLL_SERVICE_STATUS:
7ca5ce89
RG
582 svc_thread_cmd_config_status(ctrl,
583 pdata, cbdata);
584 break;
585 default:
586 pr_warn("it shouldn't happen\n");
587 break;
588 }
589 break;
7536ad8d 590 case INTEL_SIP_SMC_STATUS_REJECTED:
7ca5ce89 591 pr_debug("%s: STATUS_REJECTED\n", __func__);
4a4709d4
ATS
592 /* for FCS */
593 switch (pdata->command) {
594 case COMMAND_FCS_REQUEST_SERVICE:
595 case COMMAND_FCS_SEND_CERTIFICATE:
596 case COMMAND_FCS_GET_PROVISION_DATA:
597 case COMMAND_FCS_DATA_ENCRYPTION:
598 case COMMAND_FCS_DATA_DECRYPTION:
599 case COMMAND_FCS_RANDOM_NUMBER_GEN:
600 cbdata->status = BIT(SVC_STATUS_INVALID_PARAM);
601 cbdata->kaddr1 = NULL;
602 cbdata->kaddr2 = NULL;
603 cbdata->kaddr3 = NULL;
604 pdata->chan->scl->receive_cb(pdata->chan->scl,
605 cbdata);
606 break;
607 }
7ca5ce89 608 break;
7536ad8d 609 case INTEL_SIP_SMC_STATUS_ERROR:
b5dc75c9 610 case INTEL_SIP_SMC_RSU_ERROR:
7ca5ce89 611 pr_err("%s: STATUS_ERROR\n", __func__);
7536ad8d 612 cbdata->status = BIT(SVC_STATUS_ERROR);
b850b7a8 613 cbdata->kaddr1 = &res.a1;
1b4394c5
KJL
614 cbdata->kaddr2 = (res.a2) ?
615 svc_pa_to_va(res.a2) : NULL;
616 cbdata->kaddr3 = (res.a3) ? &res.a3 : NULL;
7ca5ce89
RG
617 pdata->chan->scl->receive_cb(pdata->chan->scl, cbdata);
618 break;
619 default:
e9cb0497
RG
620 pr_warn("Secure firmware doesn't support...\n");
621
622 /*
623 * be compatible with older version firmware which
1b4394c5 624 * doesn't support newer RSU commands
e9cb0497 625 */
1b4394c5
KJL
626 if ((pdata->command != COMMAND_RSU_UPDATE) &&
627 (pdata->command != COMMAND_RSU_STATUS)) {
e9cb0497 628 cbdata->status =
7536ad8d 629 BIT(SVC_STATUS_NO_SUPPORT);
e9cb0497
RG
630 cbdata->kaddr1 = NULL;
631 cbdata->kaddr2 = NULL;
632 cbdata->kaddr3 = NULL;
633 pdata->chan->scl->receive_cb(
634 pdata->chan->scl, cbdata);
635 }
7ca5ce89 636 break;
e9cb0497 637
7ca5ce89 638 }
03ddd2eb 639 }
7ca5ce89
RG
640
641 kfree(cbdata);
642 kfree(pdata);
643
644 return 0;
645}
646
647/**
648 * svc_normal_to_secure_shm_thread() - the function to run in the kthread
649 * @data: data pointer for kthread function
650 *
651 * Service layer driver creates stratix10_svc_smc_hvc_shm kthread on CPU
652 * node 0, its function stratix10_svc_secure_shm_thread is used to query the
653 * physical address of memory block reserved by secure monitor software at
654 * secure world.
655 *
111e7049 656 * svc_normal_to_secure_shm_thread() terminates directly since it is a
7ca5ce89
RG
657 * standlone thread for which no one will call kthread_stop() or return when
658 * 'kthread_should_stop()' is true.
659 */
660static int svc_normal_to_secure_shm_thread(void *data)
661{
662 struct stratix10_svc_sh_memory
663 *sh_mem = (struct stratix10_svc_sh_memory *)data;
664 struct arm_smccc_res res;
665
666 /* SMC or HVC call to get shared memory info from secure world */
667 sh_mem->invoke_fn(INTEL_SIP_SMC_FPGA_CONFIG_GET_MEM,
668 0, 0, 0, 0, 0, 0, 0, &res);
669 if (res.a0 == INTEL_SIP_SMC_STATUS_OK) {
670 sh_mem->addr = res.a1;
671 sh_mem->size = res.a2;
672 } else {
673 pr_err("%s: after SMC call -- res.a0=0x%016x", __func__,
674 (unsigned int)res.a0);
675 sh_mem->addr = 0;
676 sh_mem->size = 0;
677 }
678
679 complete(&sh_mem->sync_complete);
111e7049 680 return 0;
7ca5ce89
RG
681}
682
683/**
684 * svc_get_sh_memory() - get memory block reserved by secure monitor SW
685 * @pdev: pointer to service layer device
686 * @sh_memory: pointer to service shared memory structure
687 *
688 * Return: zero for successfully getting the physical address of memory block
689 * reserved by secure monitor software, or negative value on error.
690 */
691static int svc_get_sh_memory(struct platform_device *pdev,
692 struct stratix10_svc_sh_memory *sh_memory)
693{
694 struct device *dev = &pdev->dev;
695 struct task_struct *sh_memory_task;
696 unsigned int cpu = 0;
697
698 init_completion(&sh_memory->sync_complete);
699
700 /* smc or hvc call happens on cpu 0 bound kthread */
701 sh_memory_task = kthread_create_on_node(svc_normal_to_secure_shm_thread,
702 (void *)sh_memory,
703 cpu_to_node(cpu),
704 "svc_smc_hvc_shm_thread");
705 if (IS_ERR(sh_memory_task)) {
706 dev_err(dev, "fail to create stratix10_svc_smc_shm_thread\n");
707 return -EINVAL;
708 }
709
710 wake_up_process(sh_memory_task);
711
712 if (!wait_for_completion_timeout(&sh_memory->sync_complete, 10 * HZ)) {
713 dev_err(dev,
714 "timeout to get sh-memory paras from secure world\n");
715 return -ETIMEDOUT;
716 }
717
718 if (!sh_memory->addr || !sh_memory->size) {
719 dev_err(dev,
b5dc75c9 720 "failed to get shared memory info from secure world\n");
7ca5ce89
RG
721 return -ENOMEM;
722 }
723
724 dev_dbg(dev, "SM software provides paddr: 0x%016x, size: 0x%08x\n",
725 (unsigned int)sh_memory->addr,
726 (unsigned int)sh_memory->size);
727
728 return 0;
729}
730
731/**
732 * svc_create_memory_pool() - create a memory pool from reserved memory block
733 * @pdev: pointer to service layer device
734 * @sh_memory: pointer to service shared memory structure
735 *
736 * Return: pool allocated from reserved memory block or ERR_PTR() on error.
737 */
738static struct gen_pool *
739svc_create_memory_pool(struct platform_device *pdev,
740 struct stratix10_svc_sh_memory *sh_memory)
741{
742 struct device *dev = &pdev->dev;
743 struct gen_pool *genpool;
744 unsigned long vaddr;
745 phys_addr_t paddr;
746 size_t size;
747 phys_addr_t begin;
748 phys_addr_t end;
749 void *va;
750 size_t page_mask = PAGE_SIZE - 1;
751 int min_alloc_order = 3;
752 int ret;
753
754 begin = roundup(sh_memory->addr, PAGE_SIZE);
755 end = rounddown(sh_memory->addr + sh_memory->size, PAGE_SIZE);
756 paddr = begin;
757 size = end - begin;
758 va = memremap(paddr, size, MEMREMAP_WC);
759 if (!va) {
760 dev_err(dev, "fail to remap shared memory\n");
761 return ERR_PTR(-EINVAL);
762 }
763 vaddr = (unsigned long)va;
764 dev_dbg(dev,
765 "reserved memory vaddr: %p, paddr: 0x%16x size: 0x%8x\n",
766 va, (unsigned int)paddr, (unsigned int)size);
767 if ((vaddr & page_mask) || (paddr & page_mask) ||
768 (size & page_mask)) {
769 dev_err(dev, "page is not aligned\n");
770 return ERR_PTR(-EINVAL);
771 }
772 genpool = gen_pool_create(min_alloc_order, -1);
773 if (!genpool) {
774 dev_err(dev, "fail to create genpool\n");
775 return ERR_PTR(-ENOMEM);
776 }
777 gen_pool_set_algo(genpool, gen_pool_best_fit, NULL);
778 ret = gen_pool_add_virt(genpool, vaddr, paddr, size, -1);
779 if (ret) {
780 dev_err(dev, "fail to add memory chunk to the pool\n");
781 gen_pool_destroy(genpool);
782 return ERR_PTR(ret);
783 }
784
785 return genpool;
786}
787
788/**
789 * svc_smccc_smc() - secure monitor call between normal and secure world
790 * @a0: argument passed in registers 0
791 * @a1: argument passed in registers 1
792 * @a2: argument passed in registers 2
793 * @a3: argument passed in registers 3
794 * @a4: argument passed in registers 4
795 * @a5: argument passed in registers 5
796 * @a6: argument passed in registers 6
797 * @a7: argument passed in registers 7
798 * @res: result values from register 0 to 3
799 */
800static void svc_smccc_smc(unsigned long a0, unsigned long a1,
801 unsigned long a2, unsigned long a3,
802 unsigned long a4, unsigned long a5,
803 unsigned long a6, unsigned long a7,
804 struct arm_smccc_res *res)
805{
806 arm_smccc_smc(a0, a1, a2, a3, a4, a5, a6, a7, res);
807}
808
809/**
810 * svc_smccc_hvc() - hypervisor call between normal and secure world
811 * @a0: argument passed in registers 0
812 * @a1: argument passed in registers 1
813 * @a2: argument passed in registers 2
814 * @a3: argument passed in registers 3
815 * @a4: argument passed in registers 4
816 * @a5: argument passed in registers 5
817 * @a6: argument passed in registers 6
818 * @a7: argument passed in registers 7
819 * @res: result values from register 0 to 3
820 */
821static void svc_smccc_hvc(unsigned long a0, unsigned long a1,
822 unsigned long a2, unsigned long a3,
823 unsigned long a4, unsigned long a5,
824 unsigned long a6, unsigned long a7,
825 struct arm_smccc_res *res)
826{
827 arm_smccc_hvc(a0, a1, a2, a3, a4, a5, a6, a7, res);
828}
829
830/**
831 * get_invoke_func() - invoke SMC or HVC call
832 * @dev: pointer to device
833 *
834 * Return: function pointer to svc_smccc_smc or svc_smccc_hvc.
835 */
836static svc_invoke_fn *get_invoke_func(struct device *dev)
837{
838 const char *method;
839
840 if (of_property_read_string(dev->of_node, "method", &method)) {
841 dev_warn(dev, "missing \"method\" property\n");
842 return ERR_PTR(-ENXIO);
843 }
844
845 if (!strcmp(method, "smc"))
846 return svc_smccc_smc;
847 if (!strcmp(method, "hvc"))
848 return svc_smccc_hvc;
849
850 dev_warn(dev, "invalid \"method\" property: %s\n", method);
851
852 return ERR_PTR(-EINVAL);
853}
854
855/**
856 * stratix10_svc_request_channel_byname() - request a service channel
857 * @client: pointer to service client
858 * @name: service client name
859 *
860 * This function is used by service client to request a service channel.
861 *
862 * Return: a pointer to channel assigned to the client on success,
863 * or ERR_PTR() on error.
864 */
865struct stratix10_svc_chan *stratix10_svc_request_channel_byname(
866 struct stratix10_svc_client *client, const char *name)
867{
868 struct device *dev = client->dev;
869 struct stratix10_svc_controller *controller;
870 struct stratix10_svc_chan *chan = NULL;
871 unsigned long flag;
872 int i;
873
874 /* if probe was called after client's, or error on probe */
875 if (list_empty(&svc_ctrl))
876 return ERR_PTR(-EPROBE_DEFER);
877
878 controller = list_first_entry(&svc_ctrl,
879 struct stratix10_svc_controller, node);
880 for (i = 0; i < SVC_NUM_CHANNEL; i++) {
881 if (!strcmp(controller->chans[i].name, name)) {
882 chan = &controller->chans[i];
883 break;
884 }
885 }
886
887 /* if there was no channel match */
888 if (i == SVC_NUM_CHANNEL) {
889 dev_err(dev, "%s: channel not allocated\n", __func__);
890 return ERR_PTR(-EINVAL);
891 }
892
893 if (chan->scl || !try_module_get(controller->dev->driver->owner)) {
894 dev_dbg(dev, "%s: svc not free\n", __func__);
895 return ERR_PTR(-EBUSY);
896 }
897
898 spin_lock_irqsave(&chan->lock, flag);
899 chan->scl = client;
900 chan->ctrl->num_active_client++;
901 spin_unlock_irqrestore(&chan->lock, flag);
902
903 return chan;
904}
905EXPORT_SYMBOL_GPL(stratix10_svc_request_channel_byname);
906
907/**
908 * stratix10_svc_free_channel() - free service channel
909 * @chan: service channel to be freed
910 *
911 * This function is used by service client to free a service channel.
912 */
913void stratix10_svc_free_channel(struct stratix10_svc_chan *chan)
914{
915 unsigned long flag;
916
917 spin_lock_irqsave(&chan->lock, flag);
918 chan->scl = NULL;
919 chan->ctrl->num_active_client--;
920 module_put(chan->ctrl->dev->driver->owner);
921 spin_unlock_irqrestore(&chan->lock, flag);
922}
923EXPORT_SYMBOL_GPL(stratix10_svc_free_channel);
924
925/**
926 * stratix10_svc_send() - send a message data to the remote
927 * @chan: service channel assigned to the client
928 * @msg: message data to be sent, in the format of
929 * "struct stratix10_svc_client_msg"
930 *
931 * This function is used by service client to add a message to the service
932 * layer driver's queue for being sent to the secure world.
933 *
934 * Return: 0 for success, -ENOMEM or -ENOBUFS on error.
935 */
936int stratix10_svc_send(struct stratix10_svc_chan *chan, void *msg)
937{
938 struct stratix10_svc_client_msg
939 *p_msg = (struct stratix10_svc_client_msg *)msg;
940 struct stratix10_svc_data_mem *p_mem;
941 struct stratix10_svc_data *p_data;
942 int ret = 0;
943 unsigned int cpu = 0;
944
945 p_data = kzalloc(sizeof(*p_data), GFP_KERNEL);
946 if (!p_data)
947 return -ENOMEM;
948
949 /* first client will create kernel thread */
950 if (!chan->ctrl->task) {
951 chan->ctrl->task =
952 kthread_create_on_node(svc_normal_to_secure_thread,
953 (void *)chan->ctrl,
954 cpu_to_node(cpu),
955 "svc_smc_hvc_thread");
956 if (IS_ERR(chan->ctrl->task)) {
957 dev_err(chan->ctrl->dev,
b5dc75c9 958 "failed to create svc_smc_hvc_thread\n");
7ca5ce89
RG
959 kfree(p_data);
960 return -EINVAL;
961 }
962 kthread_bind(chan->ctrl->task, cpu);
963 wake_up_process(chan->ctrl->task);
964 }
965
966 pr_debug("%s: sent P-va=%p, P-com=%x, P-size=%u\n", __func__,
967 p_msg->payload, p_msg->command,
968 (unsigned int)p_msg->payload_length);
969
970 if (list_empty(&svc_data_mem)) {
971 if (p_msg->command == COMMAND_RECONFIG) {
972 struct stratix10_svc_command_config_type *ct =
973 (struct stratix10_svc_command_config_type *)
974 p_msg->payload;
975 p_data->flag = ct->flags;
976 }
977 } else {
978 list_for_each_entry(p_mem, &svc_data_mem, node)
979 if (p_mem->vaddr == p_msg->payload) {
980 p_data->paddr = p_mem->paddr;
4a4709d4 981 p_data->size = p_msg->payload_length;
7ca5ce89
RG
982 break;
983 }
4a4709d4
ATS
984 if (p_msg->payload_output) {
985 list_for_each_entry(p_mem, &svc_data_mem, node)
986 if (p_mem->vaddr == p_msg->payload_output) {
987 p_data->paddr_output =
988 p_mem->paddr;
989 p_data->size_output =
990 p_msg->payload_length_output;
991 break;
992 }
993 }
7ca5ce89
RG
994 }
995
996 p_data->command = p_msg->command;
997 p_data->arg[0] = p_msg->arg[0];
998 p_data->arg[1] = p_msg->arg[1];
999 p_data->arg[2] = p_msg->arg[2];
1000 p_data->size = p_msg->payload_length;
1001 p_data->chan = chan;
1002 pr_debug("%s: put to FIFO pa=0x%016x, cmd=%x, size=%u\n", __func__,
1003 (unsigned int)p_data->paddr, p_data->command,
1004 (unsigned int)p_data->size);
1005 ret = kfifo_in_spinlocked(&chan->ctrl->svc_fifo, p_data,
1006 sizeof(*p_data),
1007 &chan->ctrl->svc_fifo_lock);
1008
1009 kfree(p_data);
1010
1011 if (!ret)
1012 return -ENOBUFS;
1013
1014 return 0;
1015}
1016EXPORT_SYMBOL_GPL(stratix10_svc_send);
1017
1018/**
1019 * stratix10_svc_done() - complete service request transactions
1020 * @chan: service channel assigned to the client
1021 *
1022 * This function should be called when client has finished its request
1023 * or there is an error in the request process. It allows the service layer
1024 * to stop the running thread to have maximize savings in kernel resources.
1025 */
1026void stratix10_svc_done(struct stratix10_svc_chan *chan)
1027{
1028 /* stop thread when thread is running AND only one active client */
1029 if (chan->ctrl->task && chan->ctrl->num_active_client <= 1) {
1030 pr_debug("svc_smc_hvc_shm_thread is stopped\n");
1031 kthread_stop(chan->ctrl->task);
1032 chan->ctrl->task = NULL;
1033 }
1034}
1035EXPORT_SYMBOL_GPL(stratix10_svc_done);
1036
1037/**
1038 * stratix10_svc_allocate_memory() - allocate memory
1039 * @chan: service channel assigned to the client
1040 * @size: memory size requested by a specific service client
1041 *
1042 * Service layer allocates the requested number of bytes buffer from the
1043 * memory pool, service client uses this function to get allocated buffers.
1044 *
1045 * Return: address of allocated memory on success, or ERR_PTR() on error.
1046 */
1047void *stratix10_svc_allocate_memory(struct stratix10_svc_chan *chan,
1048 size_t size)
1049{
1050 struct stratix10_svc_data_mem *pmem;
1051 unsigned long va;
1052 phys_addr_t pa;
1053 struct gen_pool *genpool = chan->ctrl->genpool;
1054 size_t s = roundup(size, 1 << genpool->min_alloc_order);
1055
1056 pmem = devm_kzalloc(chan->ctrl->dev, sizeof(*pmem), GFP_KERNEL);
1057 if (!pmem)
1058 return ERR_PTR(-ENOMEM);
1059
1060 va = gen_pool_alloc(genpool, s);
1061 if (!va)
1062 return ERR_PTR(-ENOMEM);
1063
1064 memset((void *)va, 0, s);
1065 pa = gen_pool_virt_to_phys(genpool, va);
1066
1067 pmem->vaddr = (void *)va;
1068 pmem->paddr = pa;
1069 pmem->size = s;
1070 list_add_tail(&pmem->node, &svc_data_mem);
1071 pr_debug("%s: va=%p, pa=0x%016x\n", __func__,
1072 pmem->vaddr, (unsigned int)pmem->paddr);
1073
1074 return (void *)va;
1075}
1076EXPORT_SYMBOL_GPL(stratix10_svc_allocate_memory);
1077
1078/**
1079 * stratix10_svc_free_memory() - free allocated memory
1080 * @chan: service channel assigned to the client
1081 * @kaddr: memory to be freed
1082 *
1083 * This function is used by service client to free allocated buffers.
1084 */
1085void stratix10_svc_free_memory(struct stratix10_svc_chan *chan, void *kaddr)
1086{
1087 struct stratix10_svc_data_mem *pmem;
7ca5ce89
RG
1088
1089 list_for_each_entry(pmem, &svc_data_mem, node)
1090 if (pmem->vaddr == kaddr) {
5a0793ac
XT
1091 gen_pool_free(chan->ctrl->genpool,
1092 (unsigned long)kaddr, pmem->size);
1093 pmem->vaddr = NULL;
1094 list_del(&pmem->node);
1095 return;
7ca5ce89
RG
1096 }
1097
5a0793ac 1098 list_del(&svc_data_mem);
7ca5ce89
RG
1099}
1100EXPORT_SYMBOL_GPL(stratix10_svc_free_memory);
1101
1102static const struct of_device_id stratix10_svc_drv_match[] = {
1103 {.compatible = "intel,stratix10-svc"},
f276d3ea 1104 {.compatible = "intel,agilex-svc"},
7ca5ce89
RG
1105 {},
1106};
1107
1108static int stratix10_svc_drv_probe(struct platform_device *pdev)
1109{
1110 struct device *dev = &pdev->dev;
1111 struct stratix10_svc_controller *controller;
1112 struct stratix10_svc_chan *chans;
1113 struct gen_pool *genpool;
1114 struct stratix10_svc_sh_memory *sh_memory;
b5dc75c9
RG
1115 struct stratix10_svc *svc;
1116
7ca5ce89
RG
1117 svc_invoke_fn *invoke_fn;
1118 size_t fifo_size;
1119 int ret;
1120
1121 /* get SMC or HVC function */
1122 invoke_fn = get_invoke_func(dev);
1123 if (IS_ERR(invoke_fn))
1124 return -EINVAL;
1125
1126 sh_memory = devm_kzalloc(dev, sizeof(*sh_memory), GFP_KERNEL);
1127 if (!sh_memory)
1128 return -ENOMEM;
1129
1130 sh_memory->invoke_fn = invoke_fn;
1131 ret = svc_get_sh_memory(pdev, sh_memory);
1132 if (ret)
1133 return ret;
1134
1135 genpool = svc_create_memory_pool(pdev, sh_memory);
1136 if (!genpool)
1137 return -ENOMEM;
1138
1139 /* allocate service controller and supporting channel */
1140 controller = devm_kzalloc(dev, sizeof(*controller), GFP_KERNEL);
1141 if (!controller)
1142 return -ENOMEM;
1143
1144 chans = devm_kmalloc_array(dev, SVC_NUM_CHANNEL,
1145 sizeof(*chans), GFP_KERNEL | __GFP_ZERO);
1146 if (!chans)
1147 return -ENOMEM;
1148
1149 controller->dev = dev;
1150 controller->num_chans = SVC_NUM_CHANNEL;
1151 controller->num_active_client = 0;
1152 controller->chans = chans;
1153 controller->genpool = genpool;
1154 controller->task = NULL;
1155 controller->invoke_fn = invoke_fn;
1156 init_completion(&controller->complete_status);
1157
1158 fifo_size = sizeof(struct stratix10_svc_data) * SVC_NUM_DATA_IN_FIFO;
1159 ret = kfifo_alloc(&controller->svc_fifo, fifo_size, GFP_KERNEL);
1160 if (ret) {
b5dc75c9 1161 dev_err(dev, "failed to allocate FIFO\n");
7ca5ce89
RG
1162 return ret;
1163 }
1164 spin_lock_init(&controller->svc_fifo_lock);
1165
1166 chans[0].scl = NULL;
1167 chans[0].ctrl = controller;
1168 chans[0].name = SVC_CLIENT_FPGA;
1169 spin_lock_init(&chans[0].lock);
1170
6b50d882
RG
1171 chans[1].scl = NULL;
1172 chans[1].ctrl = controller;
1173 chans[1].name = SVC_CLIENT_RSU;
1174 spin_lock_init(&chans[1].lock);
1175
e6281c26
ATS
1176 chans[2].scl = NULL;
1177 chans[2].ctrl = controller;
1178 chans[2].name = SVC_CLIENT_FCS;
1179 spin_lock_init(&chans[2].lock);
1180
7ca5ce89
RG
1181 list_add_tail(&controller->node, &svc_ctrl);
1182 platform_set_drvdata(pdev, controller);
1183
b5dc75c9
RG
1184 /* add svc client device(s) */
1185 svc = devm_kzalloc(dev, sizeof(*svc), GFP_KERNEL);
d99247f9
CJ
1186 if (!svc) {
1187 ret = -ENOMEM;
1188 goto err_free_kfifo;
1189 }
b5dc75c9
RG
1190
1191 svc->stratix10_svc_rsu = platform_device_alloc(STRATIX10_RSU, 0);
1192 if (!svc->stratix10_svc_rsu) {
1193 dev_err(dev, "failed to allocate %s device\n", STRATIX10_RSU);
d99247f9
CJ
1194 ret = -ENOMEM;
1195 goto err_free_kfifo;
b5dc75c9
RG
1196 }
1197
1198 ret = platform_device_add(svc->stratix10_svc_rsu);
e6281c26
ATS
1199 if (ret) {
1200 platform_device_put(svc->stratix10_svc_rsu);
1201 return ret;
1202 }
1203
1204 svc->intel_svc_fcs = platform_device_alloc(INTEL_FCS, 1);
1205 if (!svc->intel_svc_fcs) {
1206 dev_err(dev, "failed to allocate %s device\n", INTEL_FCS);
1207 return -ENOMEM;
1208 }
1209
1210 ret = platform_device_add(svc->intel_svc_fcs);
1211 if (ret) {
1212 platform_device_put(svc->intel_svc_fcs);
1213 return ret;
1214 }
d99247f9 1215
b5dc75c9
RG
1216 dev_set_drvdata(dev, svc);
1217
7ca5ce89
RG
1218 pr_info("Intel Service Layer Driver Initialized\n");
1219
d99247f9
CJ
1220 return 0;
1221
d99247f9
CJ
1222err_free_kfifo:
1223 kfifo_free(&controller->svc_fifo);
7ca5ce89
RG
1224 return ret;
1225}
1226
1227static int stratix10_svc_drv_remove(struct platform_device *pdev)
1228{
b5dc75c9 1229 struct stratix10_svc *svc = dev_get_drvdata(&pdev->dev);
7ca5ce89
RG
1230 struct stratix10_svc_controller *ctrl = platform_get_drvdata(pdev);
1231
e6281c26 1232 platform_device_unregister(svc->intel_svc_fcs);
b5dc75c9
RG
1233 platform_device_unregister(svc->stratix10_svc_rsu);
1234
7ca5ce89
RG
1235 kfifo_free(&ctrl->svc_fifo);
1236 if (ctrl->task) {
1237 kthread_stop(ctrl->task);
1238 ctrl->task = NULL;
1239 }
1240 if (ctrl->genpool)
1241 gen_pool_destroy(ctrl->genpool);
1242 list_del(&ctrl->node);
1243
1244 return 0;
1245}
1246
1247static struct platform_driver stratix10_svc_driver = {
1248 .probe = stratix10_svc_drv_probe,
1249 .remove = stratix10_svc_drv_remove,
1250 .driver = {
1251 .name = "stratix10-svc",
1252 .of_match_table = stratix10_svc_drv_match,
1253 },
1254};
1255
1256static int __init stratix10_svc_init(void)
1257{
1258 struct device_node *fw_np;
1259 struct device_node *np;
1260 int ret;
1261
1262 fw_np = of_find_node_by_name(NULL, "firmware");
1263 if (!fw_np)
1264 return -ENODEV;
1265
1266 np = of_find_matching_node(fw_np, stratix10_svc_drv_match);
b5058483 1267 if (!np)
7ca5ce89 1268 return -ENODEV;
7ca5ce89
RG
1269
1270 of_node_put(np);
1271 ret = of_platform_populate(fw_np, stratix10_svc_drv_match, NULL, NULL);
7ca5ce89
RG
1272 if (ret)
1273 return ret;
1274
1275 return platform_driver_register(&stratix10_svc_driver);
1276}
1277
1278static void __exit stratix10_svc_exit(void)
1279{
1280 return platform_driver_unregister(&stratix10_svc_driver);
1281}
1282
1283subsys_initcall(stratix10_svc_init);
1284module_exit(stratix10_svc_exit);
1285
1286MODULE_LICENSE("GPL v2");
1287MODULE_DESCRIPTION("Intel Stratix10 Service Layer Driver");
1288MODULE_AUTHOR("Richard Gong <richard.gong@intel.com>");
1289MODULE_ALIAS("platform:stratix10-svc");