bus: fsl-mc: export device types present on the bus
[linux-2.6-block.git] / drivers / firmware / stratix10-svc.c
CommitLineData
7ca5ce89
RG
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * Copyright (C) 2017-2018, Intel Corporation
4 */
5
6#include <linux/completion.h>
7#include <linux/delay.h>
8#include <linux/genalloc.h>
9#include <linux/io.h>
10#include <linux/kfifo.h>
11#include <linux/kthread.h>
12#include <linux/module.h>
13#include <linux/mutex.h>
14#include <linux/of.h>
15#include <linux/of_platform.h>
16#include <linux/platform_device.h>
17#include <linux/slab.h>
18#include <linux/spinlock.h>
19#include <linux/firmware/intel/stratix10-smc.h>
20#include <linux/firmware/intel/stratix10-svc-client.h>
21#include <linux/types.h>
22
23/**
24 * SVC_NUM_DATA_IN_FIFO - number of struct stratix10_svc_data in the FIFO
25 *
26 * SVC_NUM_CHANNEL - number of channel supported by service layer driver
27 *
28 * FPGA_CONFIG_DATA_CLAIM_TIMEOUT_MS - claim back the submitted buffer(s)
29 * from the secure world for FPGA manager to reuse, or to free the buffer(s)
30 * when all bit-stream data had be send.
31 *
32 * FPGA_CONFIG_STATUS_TIMEOUT_SEC - poll the FPGA configuration status,
33 * service layer will return error to FPGA manager when timeout occurs,
34 * timeout is set to 30 seconds (30 * 1000) at Intel Stratix10 SoC.
35 */
36#define SVC_NUM_DATA_IN_FIFO 32
6b50d882 37#define SVC_NUM_CHANNEL 2
7ca5ce89
RG
38#define FPGA_CONFIG_DATA_CLAIM_TIMEOUT_MS 200
39#define FPGA_CONFIG_STATUS_TIMEOUT_SEC 30
40
b5dc75c9
RG
41/* stratix10 service layer clients */
42#define STRATIX10_RSU "stratix10-rsu"
43
7ca5ce89
RG
44typedef void (svc_invoke_fn)(unsigned long, unsigned long, unsigned long,
45 unsigned long, unsigned long, unsigned long,
46 unsigned long, unsigned long,
47 struct arm_smccc_res *);
48struct stratix10_svc_chan;
49
b5dc75c9
RG
50/**
51 * struct stratix10_svc - svc private data
52 * @stratix10_svc_rsu: pointer to stratix10 RSU device
53 */
54struct stratix10_svc {
55 struct platform_device *stratix10_svc_rsu;
56};
57
7ca5ce89
RG
58/**
59 * struct stratix10_svc_sh_memory - service shared memory structure
60 * @sync_complete: state for a completion
61 * @addr: physical address of shared memory block
62 * @size: size of shared memory block
63 * @invoke_fn: function to issue secure monitor or hypervisor call
64 *
65 * This struct is used to save physical address and size of shared memory
66 * block. The shared memory blocked is allocated by secure monitor software
67 * at secure world.
68 *
69 * Service layer driver uses the physical address and size to create a memory
70 * pool, then allocates data buffer from that memory pool for service client.
71 */
72struct stratix10_svc_sh_memory {
73 struct completion sync_complete;
74 unsigned long addr;
75 unsigned long size;
76 svc_invoke_fn *invoke_fn;
77};
78
79/**
80 * struct stratix10_svc_data_mem - service memory structure
81 * @vaddr: virtual address
82 * @paddr: physical address
83 * @size: size of memory
84 * @node: link list head node
85 *
86 * This struct is used in a list that keeps track of buffers which have
87 * been allocated or freed from the memory pool. Service layer driver also
88 * uses this struct to transfer physical address to virtual address.
89 */
90struct stratix10_svc_data_mem {
91 void *vaddr;
92 phys_addr_t paddr;
93 size_t size;
94 struct list_head node;
95};
96
97/**
98 * struct stratix10_svc_data - service data structure
99 * @chan: service channel
100 * @paddr: playload physical address
101 * @size: playload size
102 * @command: service command requested by client
103 * @flag: configuration type (full or partial)
104 * @arg: args to be passed via registers and not physically mapped buffers
105 *
106 * This struct is used in service FIFO for inter-process communication.
107 */
108struct stratix10_svc_data {
109 struct stratix10_svc_chan *chan;
110 phys_addr_t paddr;
111 size_t size;
112 u32 command;
113 u32 flag;
114 u64 arg[3];
115};
116
117/**
118 * struct stratix10_svc_controller - service controller
119 * @dev: device
120 * @chans: array of service channels
121 * @num_chans: number of channels in 'chans' array
122 * @num_active_client: number of active service client
123 * @node: list management
124 * @genpool: memory pool pointing to the memory region
125 * @task: pointer to the thread task which handles SMC or HVC call
126 * @svc_fifo: a queue for storing service message data
127 * @complete_status: state for completion
128 * @svc_fifo_lock: protect access to service message data queue
129 * @invoke_fn: function to issue secure monitor call or hypervisor call
130 *
131 * This struct is used to create communication channels for service clients, to
132 * handle secure monitor or hypervisor call.
133 */
134struct stratix10_svc_controller {
135 struct device *dev;
136 struct stratix10_svc_chan *chans;
137 int num_chans;
138 int num_active_client;
139 struct list_head node;
140 struct gen_pool *genpool;
141 struct task_struct *task;
142 struct kfifo svc_fifo;
143 struct completion complete_status;
144 spinlock_t svc_fifo_lock;
145 svc_invoke_fn *invoke_fn;
146};
147
148/**
149 * struct stratix10_svc_chan - service communication channel
150 * @ctrl: pointer to service controller which is the provider of this channel
151 * @scl: pointer to service client which owns the channel
152 * @name: service client name associated with the channel
153 * @lock: protect access to the channel
154 *
155 * This struct is used by service client to communicate with service layer, each
156 * service client has its own channel created by service controller.
157 */
158struct stratix10_svc_chan {
159 struct stratix10_svc_controller *ctrl;
160 struct stratix10_svc_client *scl;
161 char *name;
162 spinlock_t lock;
163};
164
165static LIST_HEAD(svc_ctrl);
166static LIST_HEAD(svc_data_mem);
167
168/**
169 * svc_pa_to_va() - translate physical address to virtual address
170 * @addr: to be translated physical address
171 *
172 * Return: valid virtual address or NULL if the provided physical
173 * address doesn't exist.
174 */
175static void *svc_pa_to_va(unsigned long addr)
176{
177 struct stratix10_svc_data_mem *pmem;
178
179 pr_debug("claim back P-addr=0x%016x\n", (unsigned int)addr);
180 list_for_each_entry(pmem, &svc_data_mem, node)
181 if (pmem->paddr == addr)
182 return pmem->vaddr;
183
184 /* physical address is not found */
185 return NULL;
186}
187
188/**
189 * svc_thread_cmd_data_claim() - claim back buffer from the secure world
190 * @ctrl: pointer to service layer controller
191 * @p_data: pointer to service data structure
192 * @cb_data: pointer to callback data structure to service client
193 *
194 * Claim back the submitted buffers from the secure world and pass buffer
195 * back to service client (FPGA manager, etc) for reuse.
196 */
197static void svc_thread_cmd_data_claim(struct stratix10_svc_controller *ctrl,
198 struct stratix10_svc_data *p_data,
199 struct stratix10_svc_cb_data *cb_data)
200{
201 struct arm_smccc_res res;
202 unsigned long timeout;
203
204 reinit_completion(&ctrl->complete_status);
205 timeout = msecs_to_jiffies(FPGA_CONFIG_DATA_CLAIM_TIMEOUT_MS);
206
207 pr_debug("%s: claim back the submitted buffer\n", __func__);
208 do {
209 ctrl->invoke_fn(INTEL_SIP_SMC_FPGA_CONFIG_COMPLETED_WRITE,
210 0, 0, 0, 0, 0, 0, 0, &res);
211
212 if (res.a0 == INTEL_SIP_SMC_STATUS_OK) {
213 if (!res.a1) {
214 complete(&ctrl->complete_status);
215 break;
216 }
217 cb_data->status = BIT(SVC_STATUS_RECONFIG_BUFFER_DONE);
218 cb_data->kaddr1 = svc_pa_to_va(res.a1);
219 cb_data->kaddr2 = (res.a2) ?
220 svc_pa_to_va(res.a2) : NULL;
221 cb_data->kaddr3 = (res.a3) ?
222 svc_pa_to_va(res.a3) : NULL;
223 p_data->chan->scl->receive_cb(p_data->chan->scl,
224 cb_data);
225 } else {
226 pr_debug("%s: secure world busy, polling again\n",
227 __func__);
228 }
229 } while (res.a0 == INTEL_SIP_SMC_STATUS_OK ||
230 res.a0 == INTEL_SIP_SMC_FPGA_CONFIG_STATUS_BUSY ||
231 wait_for_completion_timeout(&ctrl->complete_status, timeout));
232}
233
234/**
235 * svc_thread_cmd_config_status() - check configuration status
236 * @ctrl: pointer to service layer controller
237 * @p_data: pointer to service data structure
238 * @cb_data: pointer to callback data structure to service client
239 *
240 * Check whether the secure firmware at secure world has finished the FPGA
241 * configuration, and then inform FPGA manager the configuration status.
242 */
243static void svc_thread_cmd_config_status(struct stratix10_svc_controller *ctrl,
244 struct stratix10_svc_data *p_data,
245 struct stratix10_svc_cb_data *cb_data)
246{
247 struct arm_smccc_res res;
248 int count_in_sec;
249
250 cb_data->kaddr1 = NULL;
251 cb_data->kaddr2 = NULL;
252 cb_data->kaddr3 = NULL;
253 cb_data->status = BIT(SVC_STATUS_RECONFIG_ERROR);
254
255 pr_debug("%s: polling config status\n", __func__);
256
257 count_in_sec = FPGA_CONFIG_STATUS_TIMEOUT_SEC;
258 while (count_in_sec) {
259 ctrl->invoke_fn(INTEL_SIP_SMC_FPGA_CONFIG_ISDONE,
260 0, 0, 0, 0, 0, 0, 0, &res);
261 if ((res.a0 == INTEL_SIP_SMC_STATUS_OK) ||
262 (res.a0 == INTEL_SIP_SMC_FPGA_CONFIG_STATUS_ERROR))
263 break;
264
265 /*
266 * configuration is still in progress, wait one second then
267 * poll again
268 */
269 msleep(1000);
270 count_in_sec--;
271 };
272
273 if (res.a0 == INTEL_SIP_SMC_STATUS_OK && count_in_sec)
274 cb_data->status = BIT(SVC_STATUS_RECONFIG_COMPLETED);
275
276 p_data->chan->scl->receive_cb(p_data->chan->scl, cb_data);
277}
278
279/**
280 * svc_thread_recv_status_ok() - handle the successful status
281 * @p_data: pointer to service data structure
282 * @cb_data: pointer to callback data structure to service client
283 * @res: result from SMC or HVC call
284 *
6b50d882 285 * Send back the correspond status to the service clients.
7ca5ce89
RG
286 */
287static void svc_thread_recv_status_ok(struct stratix10_svc_data *p_data,
288 struct stratix10_svc_cb_data *cb_data,
289 struct arm_smccc_res res)
290{
291 cb_data->kaddr1 = NULL;
292 cb_data->kaddr2 = NULL;
293 cb_data->kaddr3 = NULL;
294
295 switch (p_data->command) {
296 case COMMAND_RECONFIG:
297 cb_data->status = BIT(SVC_STATUS_RECONFIG_REQUEST_OK);
298 break;
299 case COMMAND_RECONFIG_DATA_SUBMIT:
300 cb_data->status = BIT(SVC_STATUS_RECONFIG_BUFFER_SUBMITTED);
301 break;
302 case COMMAND_NOOP:
303 cb_data->status = BIT(SVC_STATUS_RECONFIG_BUFFER_SUBMITTED);
304 cb_data->kaddr1 = svc_pa_to_va(res.a1);
305 break;
306 case COMMAND_RECONFIG_STATUS:
307 cb_data->status = BIT(SVC_STATUS_RECONFIG_COMPLETED);
308 break;
6b50d882 309 case COMMAND_RSU_UPDATE:
b5dc75c9
RG
310 case COMMAND_RSU_NOTIFY:
311 cb_data->status = BIT(SVC_STATUS_RSU_OK);
312 break;
313 case COMMAND_RSU_RETRY:
6b50d882 314 cb_data->status = BIT(SVC_STATUS_RSU_OK);
b5dc75c9 315 cb_data->kaddr1 = &res.a1;
6b50d882 316 break;
7ca5ce89
RG
317 default:
318 pr_warn("it shouldn't happen\n");
319 break;
320 }
321
322 pr_debug("%s: call receive_cb\n", __func__);
323 p_data->chan->scl->receive_cb(p_data->chan->scl, cb_data);
324}
325
326/**
327 * svc_normal_to_secure_thread() - the function to run in the kthread
328 * @data: data pointer for kthread function
329 *
330 * Service layer driver creates stratix10_svc_smc_hvc_call kthread on CPU
331 * node 0, its function stratix10_svc_secure_call_thread is used to handle
332 * SMC or HVC calls between kernel driver and secure monitor software.
333 *
334 * Return: 0 for success or -ENOMEM on error.
335 */
336static int svc_normal_to_secure_thread(void *data)
337{
338 struct stratix10_svc_controller
339 *ctrl = (struct stratix10_svc_controller *)data;
340 struct stratix10_svc_data *pdata;
341 struct stratix10_svc_cb_data *cbdata;
342 struct arm_smccc_res res;
343 unsigned long a0, a1, a2;
344 int ret_fifo = 0;
345
346 pdata = kmalloc(sizeof(*pdata), GFP_KERNEL);
347 if (!pdata)
348 return -ENOMEM;
349
350 cbdata = kmalloc(sizeof(*cbdata), GFP_KERNEL);
351 if (!cbdata) {
352 kfree(pdata);
353 return -ENOMEM;
354 }
355
356 /* default set, to remove build warning */
357 a0 = INTEL_SIP_SMC_FPGA_CONFIG_LOOPBACK;
358 a1 = 0;
359 a2 = 0;
360
361 pr_debug("smc_hvc_shm_thread is running\n");
362
363 while (!kthread_should_stop()) {
364 ret_fifo = kfifo_out_spinlocked(&ctrl->svc_fifo,
365 pdata, sizeof(*pdata),
366 &ctrl->svc_fifo_lock);
367
368 if (!ret_fifo)
369 continue;
370
371 pr_debug("get from FIFO pa=0x%016x, command=%u, size=%u\n",
372 (unsigned int)pdata->paddr, pdata->command,
373 (unsigned int)pdata->size);
374
375 switch (pdata->command) {
376 case COMMAND_RECONFIG_DATA_CLAIM:
377 svc_thread_cmd_data_claim(ctrl, pdata, cbdata);
378 continue;
379 case COMMAND_RECONFIG:
380 a0 = INTEL_SIP_SMC_FPGA_CONFIG_START;
381 pr_debug("conf_type=%u\n", (unsigned int)pdata->flag);
382 a1 = pdata->flag;
383 a2 = 0;
384 break;
385 case COMMAND_RECONFIG_DATA_SUBMIT:
386 a0 = INTEL_SIP_SMC_FPGA_CONFIG_WRITE;
387 a1 = (unsigned long)pdata->paddr;
388 a2 = (unsigned long)pdata->size;
389 break;
390 case COMMAND_RECONFIG_STATUS:
391 a0 = INTEL_SIP_SMC_FPGA_CONFIG_ISDONE;
392 a1 = 0;
393 a2 = 0;
394 break;
6b50d882
RG
395 case COMMAND_RSU_STATUS:
396 a0 = INTEL_SIP_SMC_RSU_STATUS;
397 a1 = 0;
398 a2 = 0;
399 break;
400 case COMMAND_RSU_UPDATE:
401 a0 = INTEL_SIP_SMC_RSU_UPDATE;
402 a1 = pdata->arg[0];
403 a2 = 0;
404 break;
b5dc75c9
RG
405 case COMMAND_RSU_NOTIFY:
406 a0 = INTEL_SIP_SMC_RSU_NOTIFY;
407 a1 = pdata->arg[0];
408 a2 = 0;
409 break;
410 case COMMAND_RSU_RETRY:
411 a0 = INTEL_SIP_SMC_RSU_RETRY_COUNTER;
412 a1 = 0;
413 a2 = 0;
414 break;
7ca5ce89
RG
415 default:
416 pr_warn("it shouldn't happen\n");
417 break;
418 }
419 pr_debug("%s: before SMC call -- a0=0x%016x a1=0x%016x",
420 __func__, (unsigned int)a0, (unsigned int)a1);
421 pr_debug(" a2=0x%016x\n", (unsigned int)a2);
422
423 ctrl->invoke_fn(a0, a1, a2, 0, 0, 0, 0, 0, &res);
424
425 pr_debug("%s: after SMC call -- res.a0=0x%016x",
426 __func__, (unsigned int)res.a0);
427 pr_debug(" res.a1=0x%016x, res.a2=0x%016x",
428 (unsigned int)res.a1, (unsigned int)res.a2);
429 pr_debug(" res.a3=0x%016x\n", (unsigned int)res.a3);
430
6b50d882
RG
431 if (pdata->command == COMMAND_RSU_STATUS) {
432 if (res.a0 == INTEL_SIP_SMC_RSU_ERROR)
433 cbdata->status = BIT(SVC_STATUS_RSU_ERROR);
434 else
435 cbdata->status = BIT(SVC_STATUS_RSU_OK);
436
437 cbdata->kaddr1 = &res;
438 cbdata->kaddr2 = NULL;
439 cbdata->kaddr3 = NULL;
440 pdata->chan->scl->receive_cb(pdata->chan->scl, cbdata);
441 continue;
442 }
443
7ca5ce89
RG
444 switch (res.a0) {
445 case INTEL_SIP_SMC_STATUS_OK:
446 svc_thread_recv_status_ok(pdata, cbdata, res);
447 break;
448 case INTEL_SIP_SMC_FPGA_CONFIG_STATUS_BUSY:
449 switch (pdata->command) {
450 case COMMAND_RECONFIG_DATA_SUBMIT:
451 svc_thread_cmd_data_claim(ctrl,
452 pdata, cbdata);
453 break;
454 case COMMAND_RECONFIG_STATUS:
455 svc_thread_cmd_config_status(ctrl,
456 pdata, cbdata);
457 break;
458 default:
459 pr_warn("it shouldn't happen\n");
460 break;
461 }
462 break;
463 case INTEL_SIP_SMC_FPGA_CONFIG_STATUS_REJECTED:
464 pr_debug("%s: STATUS_REJECTED\n", __func__);
465 break;
466 case INTEL_SIP_SMC_FPGA_CONFIG_STATUS_ERROR:
b5dc75c9 467 case INTEL_SIP_SMC_RSU_ERROR:
7ca5ce89 468 pr_err("%s: STATUS_ERROR\n", __func__);
b5dc75c9
RG
469 switch (pdata->command) {
470 /* for FPGA mgr */
471 case COMMAND_RECONFIG_DATA_CLAIM:
472 case COMMAND_RECONFIG:
473 case COMMAND_RECONFIG_DATA_SUBMIT:
474 case COMMAND_RECONFIG_STATUS:
475 cbdata->status =
476 BIT(SVC_STATUS_RECONFIG_ERROR);
477 break;
478
479 /* for RSU */
480 case COMMAND_RSU_STATUS:
481 case COMMAND_RSU_UPDATE:
482 case COMMAND_RSU_NOTIFY:
483 case COMMAND_RSU_RETRY:
484 cbdata->status =
485 BIT(SVC_STATUS_RSU_ERROR);
486 break;
487 }
488
7ca5ce89
RG
489 cbdata->status = BIT(SVC_STATUS_RECONFIG_ERROR);
490 cbdata->kaddr1 = NULL;
491 cbdata->kaddr2 = NULL;
492 cbdata->kaddr3 = NULL;
493 pdata->chan->scl->receive_cb(pdata->chan->scl, cbdata);
494 break;
495 default:
496 pr_warn("it shouldn't happen\n");
497 break;
498 }
499 };
500
501 kfree(cbdata);
502 kfree(pdata);
503
504 return 0;
505}
506
507/**
508 * svc_normal_to_secure_shm_thread() - the function to run in the kthread
509 * @data: data pointer for kthread function
510 *
511 * Service layer driver creates stratix10_svc_smc_hvc_shm kthread on CPU
512 * node 0, its function stratix10_svc_secure_shm_thread is used to query the
513 * physical address of memory block reserved by secure monitor software at
514 * secure world.
515 *
516 * svc_normal_to_secure_shm_thread() calls do_exit() directly since it is a
517 * standlone thread for which no one will call kthread_stop() or return when
518 * 'kthread_should_stop()' is true.
519 */
520static int svc_normal_to_secure_shm_thread(void *data)
521{
522 struct stratix10_svc_sh_memory
523 *sh_mem = (struct stratix10_svc_sh_memory *)data;
524 struct arm_smccc_res res;
525
526 /* SMC or HVC call to get shared memory info from secure world */
527 sh_mem->invoke_fn(INTEL_SIP_SMC_FPGA_CONFIG_GET_MEM,
528 0, 0, 0, 0, 0, 0, 0, &res);
529 if (res.a0 == INTEL_SIP_SMC_STATUS_OK) {
530 sh_mem->addr = res.a1;
531 sh_mem->size = res.a2;
532 } else {
533 pr_err("%s: after SMC call -- res.a0=0x%016x", __func__,
534 (unsigned int)res.a0);
535 sh_mem->addr = 0;
536 sh_mem->size = 0;
537 }
538
539 complete(&sh_mem->sync_complete);
540 do_exit(0);
541}
542
543/**
544 * svc_get_sh_memory() - get memory block reserved by secure monitor SW
545 * @pdev: pointer to service layer device
546 * @sh_memory: pointer to service shared memory structure
547 *
548 * Return: zero for successfully getting the physical address of memory block
549 * reserved by secure monitor software, or negative value on error.
550 */
551static int svc_get_sh_memory(struct platform_device *pdev,
552 struct stratix10_svc_sh_memory *sh_memory)
553{
554 struct device *dev = &pdev->dev;
555 struct task_struct *sh_memory_task;
556 unsigned int cpu = 0;
557
558 init_completion(&sh_memory->sync_complete);
559
560 /* smc or hvc call happens on cpu 0 bound kthread */
561 sh_memory_task = kthread_create_on_node(svc_normal_to_secure_shm_thread,
562 (void *)sh_memory,
563 cpu_to_node(cpu),
564 "svc_smc_hvc_shm_thread");
565 if (IS_ERR(sh_memory_task)) {
566 dev_err(dev, "fail to create stratix10_svc_smc_shm_thread\n");
567 return -EINVAL;
568 }
569
570 wake_up_process(sh_memory_task);
571
572 if (!wait_for_completion_timeout(&sh_memory->sync_complete, 10 * HZ)) {
573 dev_err(dev,
574 "timeout to get sh-memory paras from secure world\n");
575 return -ETIMEDOUT;
576 }
577
578 if (!sh_memory->addr || !sh_memory->size) {
579 dev_err(dev,
b5dc75c9 580 "failed to get shared memory info from secure world\n");
7ca5ce89
RG
581 return -ENOMEM;
582 }
583
584 dev_dbg(dev, "SM software provides paddr: 0x%016x, size: 0x%08x\n",
585 (unsigned int)sh_memory->addr,
586 (unsigned int)sh_memory->size);
587
588 return 0;
589}
590
591/**
592 * svc_create_memory_pool() - create a memory pool from reserved memory block
593 * @pdev: pointer to service layer device
594 * @sh_memory: pointer to service shared memory structure
595 *
596 * Return: pool allocated from reserved memory block or ERR_PTR() on error.
597 */
598static struct gen_pool *
599svc_create_memory_pool(struct platform_device *pdev,
600 struct stratix10_svc_sh_memory *sh_memory)
601{
602 struct device *dev = &pdev->dev;
603 struct gen_pool *genpool;
604 unsigned long vaddr;
605 phys_addr_t paddr;
606 size_t size;
607 phys_addr_t begin;
608 phys_addr_t end;
609 void *va;
610 size_t page_mask = PAGE_SIZE - 1;
611 int min_alloc_order = 3;
612 int ret;
613
614 begin = roundup(sh_memory->addr, PAGE_SIZE);
615 end = rounddown(sh_memory->addr + sh_memory->size, PAGE_SIZE);
616 paddr = begin;
617 size = end - begin;
618 va = memremap(paddr, size, MEMREMAP_WC);
619 if (!va) {
620 dev_err(dev, "fail to remap shared memory\n");
621 return ERR_PTR(-EINVAL);
622 }
623 vaddr = (unsigned long)va;
624 dev_dbg(dev,
625 "reserved memory vaddr: %p, paddr: 0x%16x size: 0x%8x\n",
626 va, (unsigned int)paddr, (unsigned int)size);
627 if ((vaddr & page_mask) || (paddr & page_mask) ||
628 (size & page_mask)) {
629 dev_err(dev, "page is not aligned\n");
630 return ERR_PTR(-EINVAL);
631 }
632 genpool = gen_pool_create(min_alloc_order, -1);
633 if (!genpool) {
634 dev_err(dev, "fail to create genpool\n");
635 return ERR_PTR(-ENOMEM);
636 }
637 gen_pool_set_algo(genpool, gen_pool_best_fit, NULL);
638 ret = gen_pool_add_virt(genpool, vaddr, paddr, size, -1);
639 if (ret) {
640 dev_err(dev, "fail to add memory chunk to the pool\n");
641 gen_pool_destroy(genpool);
642 return ERR_PTR(ret);
643 }
644
645 return genpool;
646}
647
648/**
649 * svc_smccc_smc() - secure monitor call between normal and secure world
650 * @a0: argument passed in registers 0
651 * @a1: argument passed in registers 1
652 * @a2: argument passed in registers 2
653 * @a3: argument passed in registers 3
654 * @a4: argument passed in registers 4
655 * @a5: argument passed in registers 5
656 * @a6: argument passed in registers 6
657 * @a7: argument passed in registers 7
658 * @res: result values from register 0 to 3
659 */
660static void svc_smccc_smc(unsigned long a0, unsigned long a1,
661 unsigned long a2, unsigned long a3,
662 unsigned long a4, unsigned long a5,
663 unsigned long a6, unsigned long a7,
664 struct arm_smccc_res *res)
665{
666 arm_smccc_smc(a0, a1, a2, a3, a4, a5, a6, a7, res);
667}
668
669/**
670 * svc_smccc_hvc() - hypervisor call between normal and secure world
671 * @a0: argument passed in registers 0
672 * @a1: argument passed in registers 1
673 * @a2: argument passed in registers 2
674 * @a3: argument passed in registers 3
675 * @a4: argument passed in registers 4
676 * @a5: argument passed in registers 5
677 * @a6: argument passed in registers 6
678 * @a7: argument passed in registers 7
679 * @res: result values from register 0 to 3
680 */
681static void svc_smccc_hvc(unsigned long a0, unsigned long a1,
682 unsigned long a2, unsigned long a3,
683 unsigned long a4, unsigned long a5,
684 unsigned long a6, unsigned long a7,
685 struct arm_smccc_res *res)
686{
687 arm_smccc_hvc(a0, a1, a2, a3, a4, a5, a6, a7, res);
688}
689
690/**
691 * get_invoke_func() - invoke SMC or HVC call
692 * @dev: pointer to device
693 *
694 * Return: function pointer to svc_smccc_smc or svc_smccc_hvc.
695 */
696static svc_invoke_fn *get_invoke_func(struct device *dev)
697{
698 const char *method;
699
700 if (of_property_read_string(dev->of_node, "method", &method)) {
701 dev_warn(dev, "missing \"method\" property\n");
702 return ERR_PTR(-ENXIO);
703 }
704
705 if (!strcmp(method, "smc"))
706 return svc_smccc_smc;
707 if (!strcmp(method, "hvc"))
708 return svc_smccc_hvc;
709
710 dev_warn(dev, "invalid \"method\" property: %s\n", method);
711
712 return ERR_PTR(-EINVAL);
713}
714
715/**
716 * stratix10_svc_request_channel_byname() - request a service channel
717 * @client: pointer to service client
718 * @name: service client name
719 *
720 * This function is used by service client to request a service channel.
721 *
722 * Return: a pointer to channel assigned to the client on success,
723 * or ERR_PTR() on error.
724 */
725struct stratix10_svc_chan *stratix10_svc_request_channel_byname(
726 struct stratix10_svc_client *client, const char *name)
727{
728 struct device *dev = client->dev;
729 struct stratix10_svc_controller *controller;
730 struct stratix10_svc_chan *chan = NULL;
731 unsigned long flag;
732 int i;
733
734 /* if probe was called after client's, or error on probe */
735 if (list_empty(&svc_ctrl))
736 return ERR_PTR(-EPROBE_DEFER);
737
738 controller = list_first_entry(&svc_ctrl,
739 struct stratix10_svc_controller, node);
740 for (i = 0; i < SVC_NUM_CHANNEL; i++) {
741 if (!strcmp(controller->chans[i].name, name)) {
742 chan = &controller->chans[i];
743 break;
744 }
745 }
746
747 /* if there was no channel match */
748 if (i == SVC_NUM_CHANNEL) {
749 dev_err(dev, "%s: channel not allocated\n", __func__);
750 return ERR_PTR(-EINVAL);
751 }
752
753 if (chan->scl || !try_module_get(controller->dev->driver->owner)) {
754 dev_dbg(dev, "%s: svc not free\n", __func__);
755 return ERR_PTR(-EBUSY);
756 }
757
758 spin_lock_irqsave(&chan->lock, flag);
759 chan->scl = client;
760 chan->ctrl->num_active_client++;
761 spin_unlock_irqrestore(&chan->lock, flag);
762
763 return chan;
764}
765EXPORT_SYMBOL_GPL(stratix10_svc_request_channel_byname);
766
767/**
768 * stratix10_svc_free_channel() - free service channel
769 * @chan: service channel to be freed
770 *
771 * This function is used by service client to free a service channel.
772 */
773void stratix10_svc_free_channel(struct stratix10_svc_chan *chan)
774{
775 unsigned long flag;
776
777 spin_lock_irqsave(&chan->lock, flag);
778 chan->scl = NULL;
779 chan->ctrl->num_active_client--;
780 module_put(chan->ctrl->dev->driver->owner);
781 spin_unlock_irqrestore(&chan->lock, flag);
782}
783EXPORT_SYMBOL_GPL(stratix10_svc_free_channel);
784
785/**
786 * stratix10_svc_send() - send a message data to the remote
787 * @chan: service channel assigned to the client
788 * @msg: message data to be sent, in the format of
789 * "struct stratix10_svc_client_msg"
790 *
791 * This function is used by service client to add a message to the service
792 * layer driver's queue for being sent to the secure world.
793 *
794 * Return: 0 for success, -ENOMEM or -ENOBUFS on error.
795 */
796int stratix10_svc_send(struct stratix10_svc_chan *chan, void *msg)
797{
798 struct stratix10_svc_client_msg
799 *p_msg = (struct stratix10_svc_client_msg *)msg;
800 struct stratix10_svc_data_mem *p_mem;
801 struct stratix10_svc_data *p_data;
802 int ret = 0;
803 unsigned int cpu = 0;
804
805 p_data = kzalloc(sizeof(*p_data), GFP_KERNEL);
806 if (!p_data)
807 return -ENOMEM;
808
809 /* first client will create kernel thread */
810 if (!chan->ctrl->task) {
811 chan->ctrl->task =
812 kthread_create_on_node(svc_normal_to_secure_thread,
813 (void *)chan->ctrl,
814 cpu_to_node(cpu),
815 "svc_smc_hvc_thread");
816 if (IS_ERR(chan->ctrl->task)) {
817 dev_err(chan->ctrl->dev,
b5dc75c9 818 "failed to create svc_smc_hvc_thread\n");
7ca5ce89
RG
819 kfree(p_data);
820 return -EINVAL;
821 }
822 kthread_bind(chan->ctrl->task, cpu);
823 wake_up_process(chan->ctrl->task);
824 }
825
826 pr_debug("%s: sent P-va=%p, P-com=%x, P-size=%u\n", __func__,
827 p_msg->payload, p_msg->command,
828 (unsigned int)p_msg->payload_length);
829
830 if (list_empty(&svc_data_mem)) {
831 if (p_msg->command == COMMAND_RECONFIG) {
832 struct stratix10_svc_command_config_type *ct =
833 (struct stratix10_svc_command_config_type *)
834 p_msg->payload;
835 p_data->flag = ct->flags;
836 }
837 } else {
838 list_for_each_entry(p_mem, &svc_data_mem, node)
839 if (p_mem->vaddr == p_msg->payload) {
840 p_data->paddr = p_mem->paddr;
841 break;
842 }
843 }
844
845 p_data->command = p_msg->command;
846 p_data->arg[0] = p_msg->arg[0];
847 p_data->arg[1] = p_msg->arg[1];
848 p_data->arg[2] = p_msg->arg[2];
849 p_data->size = p_msg->payload_length;
850 p_data->chan = chan;
851 pr_debug("%s: put to FIFO pa=0x%016x, cmd=%x, size=%u\n", __func__,
852 (unsigned int)p_data->paddr, p_data->command,
853 (unsigned int)p_data->size);
854 ret = kfifo_in_spinlocked(&chan->ctrl->svc_fifo, p_data,
855 sizeof(*p_data),
856 &chan->ctrl->svc_fifo_lock);
857
858 kfree(p_data);
859
860 if (!ret)
861 return -ENOBUFS;
862
863 return 0;
864}
865EXPORT_SYMBOL_GPL(stratix10_svc_send);
866
867/**
868 * stratix10_svc_done() - complete service request transactions
869 * @chan: service channel assigned to the client
870 *
871 * This function should be called when client has finished its request
872 * or there is an error in the request process. It allows the service layer
873 * to stop the running thread to have maximize savings in kernel resources.
874 */
875void stratix10_svc_done(struct stratix10_svc_chan *chan)
876{
877 /* stop thread when thread is running AND only one active client */
878 if (chan->ctrl->task && chan->ctrl->num_active_client <= 1) {
879 pr_debug("svc_smc_hvc_shm_thread is stopped\n");
880 kthread_stop(chan->ctrl->task);
881 chan->ctrl->task = NULL;
882 }
883}
884EXPORT_SYMBOL_GPL(stratix10_svc_done);
885
886/**
887 * stratix10_svc_allocate_memory() - allocate memory
888 * @chan: service channel assigned to the client
889 * @size: memory size requested by a specific service client
890 *
891 * Service layer allocates the requested number of bytes buffer from the
892 * memory pool, service client uses this function to get allocated buffers.
893 *
894 * Return: address of allocated memory on success, or ERR_PTR() on error.
895 */
896void *stratix10_svc_allocate_memory(struct stratix10_svc_chan *chan,
897 size_t size)
898{
899 struct stratix10_svc_data_mem *pmem;
900 unsigned long va;
901 phys_addr_t pa;
902 struct gen_pool *genpool = chan->ctrl->genpool;
903 size_t s = roundup(size, 1 << genpool->min_alloc_order);
904
905 pmem = devm_kzalloc(chan->ctrl->dev, sizeof(*pmem), GFP_KERNEL);
906 if (!pmem)
907 return ERR_PTR(-ENOMEM);
908
909 va = gen_pool_alloc(genpool, s);
910 if (!va)
911 return ERR_PTR(-ENOMEM);
912
913 memset((void *)va, 0, s);
914 pa = gen_pool_virt_to_phys(genpool, va);
915
916 pmem->vaddr = (void *)va;
917 pmem->paddr = pa;
918 pmem->size = s;
919 list_add_tail(&pmem->node, &svc_data_mem);
920 pr_debug("%s: va=%p, pa=0x%016x\n", __func__,
921 pmem->vaddr, (unsigned int)pmem->paddr);
922
923 return (void *)va;
924}
925EXPORT_SYMBOL_GPL(stratix10_svc_allocate_memory);
926
927/**
928 * stratix10_svc_free_memory() - free allocated memory
929 * @chan: service channel assigned to the client
930 * @kaddr: memory to be freed
931 *
932 * This function is used by service client to free allocated buffers.
933 */
934void stratix10_svc_free_memory(struct stratix10_svc_chan *chan, void *kaddr)
935{
936 struct stratix10_svc_data_mem *pmem;
937 size_t size = 0;
938
939 list_for_each_entry(pmem, &svc_data_mem, node)
940 if (pmem->vaddr == kaddr) {
941 size = pmem->size;
942 break;
943 }
944
945 gen_pool_free(chan->ctrl->genpool, (unsigned long)kaddr, size);
946 pmem->vaddr = NULL;
947 list_del(&pmem->node);
948}
949EXPORT_SYMBOL_GPL(stratix10_svc_free_memory);
950
951static const struct of_device_id stratix10_svc_drv_match[] = {
952 {.compatible = "intel,stratix10-svc"},
953 {},
954};
955
956static int stratix10_svc_drv_probe(struct platform_device *pdev)
957{
958 struct device *dev = &pdev->dev;
959 struct stratix10_svc_controller *controller;
960 struct stratix10_svc_chan *chans;
961 struct gen_pool *genpool;
962 struct stratix10_svc_sh_memory *sh_memory;
b5dc75c9
RG
963 struct stratix10_svc *svc;
964
7ca5ce89
RG
965 svc_invoke_fn *invoke_fn;
966 size_t fifo_size;
967 int ret;
968
969 /* get SMC or HVC function */
970 invoke_fn = get_invoke_func(dev);
971 if (IS_ERR(invoke_fn))
972 return -EINVAL;
973
974 sh_memory = devm_kzalloc(dev, sizeof(*sh_memory), GFP_KERNEL);
975 if (!sh_memory)
976 return -ENOMEM;
977
978 sh_memory->invoke_fn = invoke_fn;
979 ret = svc_get_sh_memory(pdev, sh_memory);
980 if (ret)
981 return ret;
982
983 genpool = svc_create_memory_pool(pdev, sh_memory);
984 if (!genpool)
985 return -ENOMEM;
986
987 /* allocate service controller and supporting channel */
988 controller = devm_kzalloc(dev, sizeof(*controller), GFP_KERNEL);
989 if (!controller)
990 return -ENOMEM;
991
992 chans = devm_kmalloc_array(dev, SVC_NUM_CHANNEL,
993 sizeof(*chans), GFP_KERNEL | __GFP_ZERO);
994 if (!chans)
995 return -ENOMEM;
996
997 controller->dev = dev;
998 controller->num_chans = SVC_NUM_CHANNEL;
999 controller->num_active_client = 0;
1000 controller->chans = chans;
1001 controller->genpool = genpool;
1002 controller->task = NULL;
1003 controller->invoke_fn = invoke_fn;
1004 init_completion(&controller->complete_status);
1005
1006 fifo_size = sizeof(struct stratix10_svc_data) * SVC_NUM_DATA_IN_FIFO;
1007 ret = kfifo_alloc(&controller->svc_fifo, fifo_size, GFP_KERNEL);
1008 if (ret) {
b5dc75c9 1009 dev_err(dev, "failed to allocate FIFO\n");
7ca5ce89
RG
1010 return ret;
1011 }
1012 spin_lock_init(&controller->svc_fifo_lock);
1013
1014 chans[0].scl = NULL;
1015 chans[0].ctrl = controller;
1016 chans[0].name = SVC_CLIENT_FPGA;
1017 spin_lock_init(&chans[0].lock);
1018
6b50d882
RG
1019 chans[1].scl = NULL;
1020 chans[1].ctrl = controller;
1021 chans[1].name = SVC_CLIENT_RSU;
1022 spin_lock_init(&chans[1].lock);
1023
7ca5ce89
RG
1024 list_add_tail(&controller->node, &svc_ctrl);
1025 platform_set_drvdata(pdev, controller);
1026
b5dc75c9
RG
1027 /* add svc client device(s) */
1028 svc = devm_kzalloc(dev, sizeof(*svc), GFP_KERNEL);
1029 if (!svc)
1030 return -ENOMEM;
1031
1032 svc->stratix10_svc_rsu = platform_device_alloc(STRATIX10_RSU, 0);
1033 if (!svc->stratix10_svc_rsu) {
1034 dev_err(dev, "failed to allocate %s device\n", STRATIX10_RSU);
1035 return -ENOMEM;
1036 }
1037
1038 ret = platform_device_add(svc->stratix10_svc_rsu);
1039 if (ret) {
1040 platform_device_put(svc->stratix10_svc_rsu);
1041 return ret;
1042 }
1043 dev_set_drvdata(dev, svc);
1044
7ca5ce89
RG
1045 pr_info("Intel Service Layer Driver Initialized\n");
1046
1047 return ret;
1048}
1049
1050static int stratix10_svc_drv_remove(struct platform_device *pdev)
1051{
b5dc75c9 1052 struct stratix10_svc *svc = dev_get_drvdata(&pdev->dev);
7ca5ce89
RG
1053 struct stratix10_svc_controller *ctrl = platform_get_drvdata(pdev);
1054
b5dc75c9
RG
1055 platform_device_unregister(svc->stratix10_svc_rsu);
1056
7ca5ce89
RG
1057 kfifo_free(&ctrl->svc_fifo);
1058 if (ctrl->task) {
1059 kthread_stop(ctrl->task);
1060 ctrl->task = NULL;
1061 }
1062 if (ctrl->genpool)
1063 gen_pool_destroy(ctrl->genpool);
1064 list_del(&ctrl->node);
1065
1066 return 0;
1067}
1068
1069static struct platform_driver stratix10_svc_driver = {
1070 .probe = stratix10_svc_drv_probe,
1071 .remove = stratix10_svc_drv_remove,
1072 .driver = {
1073 .name = "stratix10-svc",
1074 .of_match_table = stratix10_svc_drv_match,
1075 },
1076};
1077
1078static int __init stratix10_svc_init(void)
1079{
1080 struct device_node *fw_np;
1081 struct device_node *np;
1082 int ret;
1083
1084 fw_np = of_find_node_by_name(NULL, "firmware");
1085 if (!fw_np)
1086 return -ENODEV;
1087
1088 np = of_find_matching_node(fw_np, stratix10_svc_drv_match);
b5058483 1089 if (!np)
7ca5ce89 1090 return -ENODEV;
7ca5ce89
RG
1091
1092 of_node_put(np);
1093 ret = of_platform_populate(fw_np, stratix10_svc_drv_match, NULL, NULL);
7ca5ce89
RG
1094 if (ret)
1095 return ret;
1096
1097 return platform_driver_register(&stratix10_svc_driver);
1098}
1099
1100static void __exit stratix10_svc_exit(void)
1101{
1102 return platform_driver_unregister(&stratix10_svc_driver);
1103}
1104
1105subsys_initcall(stratix10_svc_init);
1106module_exit(stratix10_svc_exit);
1107
1108MODULE_LICENSE("GPL v2");
1109MODULE_DESCRIPTION("Intel Stratix10 Service Layer Driver");
1110MODULE_AUTHOR("Richard Gong <richard.gong@intel.com>");
1111MODULE_ALIAS("platform:stratix10-svc");