Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp1922226ybx; Sat, 2 Nov 2019 08:48:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqyDovdslpPQ6z84pwcLbayzIhtWRUYClc3j7i3PN///ELmQnsyrLEpTNqo5+UMToSjLwQ/4 X-Received: by 2002:a50:97af:: with SMTP id e44mr19254121edb.3.1572709690672; Sat, 02 Nov 2019 08:48:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572709690; cv=none; d=google.com; s=arc-20160816; b=RY24CyItv0lcyxpj2dHdpKXxXG8uRfPYb6yNzOklHeKtAZILDAkMNNK6jG+4glqcsB Mzx2hK6EDVUT1cQHdhWZ3lnDO9+L2gjG49ZSu1J6LG6j9Q2oheEHt6vS0yyyyqPonV2d Ki1SJ4KG48yq5LPhwtXxROuD9JiQnZ2minUqiJrdao8wirWUL5araU5CxuvpSHJFYbRe /zAWARDJgD372/t2i6jUErJrnMOJQWP/rPvSp7ksWnnCTWkxelTtU3lBJGBdWHxxPT7A 8jGMYctIazQES8CmMvOwl2OMk1jpTXEK0se2vsvZFwm5p6eJoFSeI89ru4aAKtEQKS4G kYpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=/mLuVIjBGN9C/gmNmh+XuUlavsahcHDeH6Y/owYS8Yc=; b=uHfBdPlyybVI+4OV0b4s+lJgQax8XxPdsaHbsxiknnZjXOtnZjUZDHCIj8x/Gn1x3k PU41f1KZ6hF+HwJyye8N6Vx4jxCMY8AEWcbxhLGUv5DXtag9RWZcPWwlFz2vUDrC5efM fxAuPxZhVymrrYVG972KAEy3C6PbJO1/juFvy0QQgPQategKydCOe6umBFbvi/i6zEBb rgmHBhZCHtmeTUj32KgP8FLWOD/6IxSozk3li+zbSISUuoeEUURfUjAdtkn0NOgEStk+ 3vy1VfpVa4RHPaW8KRoOGgYBJo0cyetkWkrTKyhSkkJvrYh3EFav6ekhsXl9Ontz9b8K gumg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=ezAxr4zy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u8si3276461edb.57.2019.11.02.08.47.46; Sat, 02 Nov 2019 08:48:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=ezAxr4zy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726985AbfKBPoF (ORCPT + 99 others); Sat, 2 Nov 2019 11:44:05 -0400 Received: from mail-pf1-f195.google.com ([209.85.210.195]:32879 "EHLO mail-pf1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726440AbfKBPoE (ORCPT ); Sat, 2 Nov 2019 11:44:04 -0400 Received: by mail-pf1-f195.google.com with SMTP id c184so9052761pfb.0; Sat, 02 Nov 2019 08:44:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=/mLuVIjBGN9C/gmNmh+XuUlavsahcHDeH6Y/owYS8Yc=; b=ezAxr4zytvGneNoOxzPOl/LzxBBVOiePWdGVZ1Jb6xqFtIgAOuKJEAV5DRau/KocUf 8p6XkoGaM6umZgT6E/ihS1MBpExdXR+TScYyICk3FS4WfPtLk53uJfXaYYaA3ZHtVr21 JSAnm0fVBQNoJwCeryYhc+hhgrrKkUgUQm7kxJr+RUniHZ/eKnwwQvAg3RK0MRdnKjO2 T0g3zrNRHZKVcoFocRaOMYWDZYKZOQjM8K6puHVM5hQ8gpqLYZoUfyay9sg9vv/nfRxw iUv+cpAL20F6+ItY9EazCTGD1iXtzhsyXc6yQHshI5YYp8rv2LRhJ1YEqP80qP6EjKJ3 nCVw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to:user-agent; bh=/mLuVIjBGN9C/gmNmh+XuUlavsahcHDeH6Y/owYS8Yc=; b=t6MTdduMdVjp1G5b3IYb2OlHI3Rx+yQ2/t4puDZe10mbiRNJF3vejIpal3MF1E62Fg 1c3f/3woOD2nfzt1vkptq/4scDeMLgQeZJz67Wr3gmL0lHS+4mYYD0Rp8e8Hl14iSIWO RnTSDQg6xQ2cCINTeCacx9g6e4eAslIeDhKKZiLTKSgzX2d3pTjJgJqRHn3Jcovf1wqH pSmxiQPvoAlpKO40nL9l4jz14g+7MYIjFuM3yz98yknJlb26Yqi8oKVViGlmmzoCcAb4 a+7FUvuhbp8GTnalGGdPebwlP2ACdpnQ8W51PMMiwKaScmxm+VHFeOzpPkcr++k8ZlRu voIQ== X-Gm-Message-State: APjAAAVPRPVuCcmTjGdEaamD/1Mfxix2k6ECmDTvwRr26xp39y8o7eTt SC+jvwx6J9IR0oCYlJKli90= X-Received: by 2002:a65:6492:: with SMTP id e18mr20725988pgv.111.1572709442272; Sat, 02 Nov 2019 08:44:02 -0700 (PDT) Received: from localhost ([2600:1700:e321:62f0:329c:23ff:fee3:9d7c]) by smtp.gmail.com with ESMTPSA id 10sm10678107pgs.11.2019.11.02.08.44.01 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Sat, 02 Nov 2019 08:44:01 -0700 (PDT) Date: Sat, 2 Nov 2019 08:44:00 -0700 From: Guenter Roeck To: Xingyu Chen Cc: Wim Van Sebroeck , Kevin Hilman , Neil Armstrong , Rob Herring , Jerome Brunet , Qianggui Song , Jianxin Pan , Jian Hu , linux-watchdog@vger.kernel.org, linux-amlogic@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3 3/4] watchdog: add meson secure watchdog driver Message-ID: <20191102154400.GA17593@roeck-us.net> References: <1571983984-11771-1-git-send-email-xingyu.chen@amlogic.com> <1571983984-11771-4-git-send-email-xingyu.chen@amlogic.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1571983984-11771-4-git-send-email-xingyu.chen@amlogic.com> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 25, 2019 at 02:13:03PM +0800, Xingyu Chen wrote: > The watchdog controller on the Meson-A/C series SoCs is moved to secure > world, watchdog operation needs to be done in secure EL3 mode via ATF, > Non-secure world can call SMC instruction to trap to AFT for watchdog > operation. > > Signed-off-by: Xingyu Chen For my reference: Reviewed-by: Guenter Roeck Note to self and Wim: Do not apply until instantiation issues are resolved. > --- > drivers/watchdog/Kconfig | 16 ++++ > drivers/watchdog/Makefile | 1 + > drivers/watchdog/meson_sec_wdt.c | 187 +++++++++++++++++++++++++++++++++++++++ > 3 files changed, 204 insertions(+) > create mode 100644 drivers/watchdog/meson_sec_wdt.c > > diff --git a/drivers/watchdog/Kconfig b/drivers/watchdog/Kconfig > index 58e7c10..e305fba 100644 > --- a/drivers/watchdog/Kconfig > +++ b/drivers/watchdog/Kconfig > @@ -826,6 +826,22 @@ config MESON_GXBB_WATCHDOG > To compile this driver as a module, choose M here: the > module will be called meson_gxbb_wdt. > > +config MESON_SEC_WATCHDOG > + tristate "Amlogic Meson Secure watchdog support" > + depends on MESON_SM > + select WATCHDOG_CORE > + help > + The watchdog controller on the Meson-A/C series SoCs is moved to > + secure world, watchdog operation needs to be done in secure EL3 > + mode via ATF, non-secure world can call SMC instruction to trap > + to ATF for the watchdog operation. > + > + Say Y here if watchdog controller on Meson SoCs is located in > + secure world. > + > + To compile this driver as a module, choose M here: the > + module will be called meson_sec_wdt. > + > config MESON_WATCHDOG > tristate "Amlogic Meson SoCs watchdog support" > depends on ARCH_MESON || COMPILE_TEST > diff --git a/drivers/watchdog/Makefile b/drivers/watchdog/Makefile > index 2ee352b..5e6b73d 100644 > --- a/drivers/watchdog/Makefile > +++ b/drivers/watchdog/Makefile > @@ -78,6 +78,7 @@ obj-$(CONFIG_QCOM_WDT) += qcom-wdt.o > obj-$(CONFIG_BCM_KONA_WDT) += bcm_kona_wdt.o > obj-$(CONFIG_TEGRA_WATCHDOG) += tegra_wdt.o > obj-$(CONFIG_MESON_GXBB_WATCHDOG) += meson_gxbb_wdt.o > +obj-$(CONFIG_MESON_SEC_WATCHDOG) += meson_sec_wdt.o > obj-$(CONFIG_MESON_WATCHDOG) += meson_wdt.o > obj-$(CONFIG_MEDIATEK_WATCHDOG) += mtk_wdt.o > obj-$(CONFIG_DIGICOLOR_WATCHDOG) += digicolor_wdt.o > diff --git a/drivers/watchdog/meson_sec_wdt.c b/drivers/watchdog/meson_sec_wdt.c > new file mode 100644 > index 00000000..a20657d > --- /dev/null > +++ b/drivers/watchdog/meson_sec_wdt.c > @@ -0,0 +1,187 @@ > +// SPDX-License-Identifier: (GPL-2.0+ OR MIT) > +/* > + * Copyright (c) 2019 Amlogic, Inc. All rights reserved. > + * Author: Xingyu Chen > + * > + */ > +#include > +#include > +#include > +#include > +#include > +#include > +#include > + > +#define MESON_SIP_WDT_DISABLE 0x1 > +#define MESON_SIP_WDT_ENABLE 0x2 > +#define MESON_SIP_WDT_PING 0x3 > +#define MESON_SIP_WDT_INIT 0x4 > +#define MESON_SIP_WDT_RESETNOW 0x5 > +#define MESON_SIP_WDT_SETTIMEOUT 0x6 > +#define MESON_SIP_WDT_GETTIMELEFT 0x7 > + > +#define DEFAULT_TIMEOUT 30 /* seconds */ > + > +/* > + * Watchdog timer tick is set to 1ms in secfw side, and tick count is > + * stored in the bit[16-31] of WATCHDOG_CNT register, so the maximum > + * timeout value is 0xffff ms. > + */ > +#define MAX_TIMEOUT_MS 0xFFFF > + > +struct meson_sec_wdt { > + struct watchdog_device wdt_dev; > + struct meson_sm_firmware *fw; > +}; > + > +static int meson_sec_wdt_start(struct watchdog_device *wdt_dev) > +{ > + struct meson_sec_wdt *data = watchdog_get_drvdata(wdt_dev); > + > + return meson_sm_call(data->fw, SM_WATCHDOG_OPS, NULL, > + MESON_SIP_WDT_ENABLE, 0, 0, 0, 0); > +} > + > +static int meson_sec_wdt_stop(struct watchdog_device *wdt_dev) > +{ > + struct meson_sec_wdt *data = watchdog_get_drvdata(wdt_dev); > + > + return meson_sm_call(data->fw, SM_WATCHDOG_OPS, NULL, > + MESON_SIP_WDT_DISABLE, 0, 0, 0, 0); > +} > + > +static int meson_sec_wdt_ping(struct watchdog_device *wdt_dev) > +{ > + struct meson_sec_wdt *data = watchdog_get_drvdata(wdt_dev); > + > + return meson_sm_call(data->fw, SM_WATCHDOG_OPS, NULL, > + MESON_SIP_WDT_PING, 0, 0, 0, 0); > +} > + > +static int meson_sec_wdt_set_timeout(struct watchdog_device *wdt_dev, > + unsigned int timeout) > +{ > + struct meson_sec_wdt *data = watchdog_get_drvdata(wdt_dev); > + > + wdt_dev->timeout = timeout; > + > + return meson_sm_call(data->fw, SM_WATCHDOG_OPS, NULL, > + MESON_SIP_WDT_SETTIMEOUT, > + wdt_dev->timeout, 0, 0, 0); > +} > + > +static unsigned int meson_sec_wdt_get_timeleft(struct watchdog_device *wdt_dev) > +{ > + int ret; > + unsigned int timeleft; > + struct meson_sec_wdt *data = watchdog_get_drvdata(wdt_dev); > + > + ret = meson_sm_call(data->fw, SM_WATCHDOG_OPS, &timeleft, > + MESON_SIP_WDT_GETTIMELEFT, 0, 0, 0, 0); > + > + if (ret) > + return 0; > + > + return timeleft; > +} > + > +static const struct watchdog_ops meson_sec_wdt_ops = { > + .start = meson_sec_wdt_start, > + .stop = meson_sec_wdt_stop, > + .ping = meson_sec_wdt_ping, > + .set_timeout = meson_sec_wdt_set_timeout, > + .get_timeleft = meson_sec_wdt_get_timeleft, > +}; > + > +static const struct watchdog_info meson_sec_wdt_info = { > + .identity = "Meson Secure Watchdog Timer", > + .options = WDIOF_SETTIMEOUT | WDIOF_KEEPALIVEPING | WDIOF_MAGICCLOSE, > +}; > + > +static int __maybe_unused meson_sec_wdt_resume(struct device *dev) > +{ > + struct meson_sec_wdt *data = dev_get_drvdata(dev); > + > + if (watchdog_active(&data->wdt_dev)) > + return meson_sec_wdt_start(&data->wdt_dev); > + > + return 0; > +} > + > +static int __maybe_unused meson_sec_wdt_suspend(struct device *dev) > +{ > + struct meson_sec_wdt *data = dev_get_drvdata(dev); > + > + if (watchdog_active(&data->wdt_dev)) > + return meson_sec_wdt_stop(&data->wdt_dev); > + > + return 0; > +} > + > +static const struct dev_pm_ops meson_sec_wdt_pm_ops = { > + SET_SYSTEM_SLEEP_PM_OPS(meson_sec_wdt_suspend, meson_sec_wdt_resume) > +}; > + > +static const struct of_device_id meson_sec_wdt_dt_ids[] = { > + { .compatible = "amlogic,meson-sec-wdt", }, > + { /* sentinel */ }, > +}; > +MODULE_DEVICE_TABLE(of, meson_sec_wdt_dt_ids); > + > +static int meson_sec_wdt_probe(struct platform_device *pdev) > +{ > + struct device *dev = &pdev->dev; > + struct meson_sec_wdt *data; > + struct device_node *sm_np; > + int ret; > + > + data = devm_kzalloc(dev, sizeof(*data), GFP_KERNEL); > + if (!data) > + return -ENOMEM; > + > + sm_np = of_parse_phandle(pdev->dev.of_node, "secure-monitor", 0); > + if (!sm_np) { > + dev_err(&pdev->dev, "no secure-monitor node\n"); > + return -EINVAL; > + } > + > + data->fw = meson_sm_get(sm_np); > + of_node_put(sm_np); > + if (!data->fw) > + return -EPROBE_DEFER; > + > + platform_set_drvdata(pdev, data); > + > + data->wdt_dev.parent = dev; > + data->wdt_dev.info = &meson_sec_wdt_info; > + data->wdt_dev.ops = &meson_sec_wdt_ops; > + data->wdt_dev.max_hw_heartbeat_ms = MAX_TIMEOUT_MS; > + data->wdt_dev.min_timeout = 1; > + data->wdt_dev.timeout = DEFAULT_TIMEOUT; > + watchdog_set_drvdata(&data->wdt_dev, data); > + > + ret = meson_sm_call(data->fw, SM_WATCHDOG_OPS, NULL, > + MESON_SIP_WDT_INIT, > + data->wdt_dev.timeout, 0, 0, 0); > + if (ret) > + return ret; > + > + watchdog_stop_on_reboot(&data->wdt_dev); > + > + return devm_watchdog_register_device(dev, &data->wdt_dev); > +} > + > +static struct platform_driver meson_sec_wdt_driver = { > + .probe = meson_sec_wdt_probe, > + .driver = { > + .name = "meson-sec-wdt", > + .pm = &meson_sec_wdt_pm_ops, > + .of_match_table = meson_sec_wdt_dt_ids, > + }, > +}; > + > +module_platform_driver(meson_sec_wdt_driver); > + > +MODULE_AUTHOR("Xingyu Chen "); > +MODULE_DESCRIPTION("Amlogic Secure Watchdog Timer Driver"); > +MODULE_LICENSE("Dual MIT/GPL");