Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp594337ybh; Wed, 15 Jul 2020 09:59:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzkhqzgFGbXlHhgl78oDxF3zgq1HhOaCKzreNT+bCEJZ+OqzywzB7jrIU501Bt706T3HS4D X-Received: by 2002:a17:906:a449:: with SMTP id cb9mr9719281ejb.115.1594832368555; Wed, 15 Jul 2020 09:59:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594832368; cv=none; d=google.com; s=arc-20160816; b=qVaD+j13K2d+Z55iyS4bsg3ZWeKXpKFATltzpnCYX+WZjUNxoaAjnjmRMMQFUFT7hr +nFNYo2sg8zsw9k74mKdVgUfFTLPWvnVP785tW4icwtK5wN8qK6rQR78huo9kuWiPnDa Cj+iPuZSxRPKaErugc3Q3LzIrtiSgk4B+s1ZR8bOprEEdUdRSy1YrHDVvhtnMd6Pouhf mmyopdtWB4/+Gx7eKH7gvBe50bwT2BiDX1LWF/hEWAbevDu11C/l49PwyRILcx+cPYWR Pc7eOdTeVq811gv3PZeNzUOfbgwpCW7p8fSKRMsbOHHlyQpUkWcZfpXn2IiseAVX4Gue egmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=VMi/cfIIENwsIMdD30B49jfjOU+px/hqAnuJnuiPC+4=; b=tUezBbK5NK4n1NNQSaQRsTVvOmKNdLrtBin6lS5Ls15I4z1F/Q3kK9or/2JNUJ7Oao vXx0sanSs4ikuD+uW3PWTfditIPubDmVe07JG/RtstvGV/YJBuP6P0q2GwHz/pIzg6Dj z82XNrDJq1EsyTUJqbaz7Nr6L5G81g3NE0qlpA9HZfbeDf0xqw4hdu/6F+c2xjFQcyk8 oaVvjii2c/gVecN09Hp9RYm9qglzGi/HsC0FnUlWtEr+e3r6/nKwOf9GBq42xImkJIGi 7dLX2tOiRJG8eA2WxbiBLYKcvKuyBzRQN/RLUcYYbC4BlqqIbM8w9BoMi73WYUJxlvz6 mQ8A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n3si1546903edv.602.2020.07.15.09.59.04; Wed, 15 Jul 2020 09:59:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726568AbgGOQzj (ORCPT + 99 others); Wed, 15 Jul 2020 12:55:39 -0400 Received: from mga06.intel.com ([134.134.136.31]:11291 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726398AbgGOQzi (ORCPT ); Wed, 15 Jul 2020 12:55:38 -0400 IronPort-SDR: JQVSSCdXJz8jJ+sz4xq8uADUXECZa5JVlR8+/zpGDk6PS+fLKXvc8XVRfWymY0wDPbMgDbpIBg LkU/gbcn+bbg== X-IronPort-AV: E=McAfee;i="6000,8403,9683"; a="210739342" X-IronPort-AV: E=Sophos;i="5.75,355,1589266800"; d="scan'208";a="210739342" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Jul 2020 09:55:37 -0700 IronPort-SDR: rkodu1XP7wuy8dfyVNQJEuNahLyq+9htGYJkoVrhNOfDjjKvoCstQOxLeh8qkedwgCfd1nMWKJ Ug0fHuHHx09A== X-IronPort-AV: E=Sophos;i="5.75,355,1589266800"; d="scan'208";a="430192750" Received: from bellalan-mobl2.ger.corp.intel.com (HELO dalessan-mobl1.ir.intel.com) ([10.251.85.12]) by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Jul 2020 09:55:34 -0700 From: Daniele Alessandrelli To: Sudeep Holla , linux-arm-kernel@lists.infradead.org Cc: Daniele Alessandrelli , Peng Fan , "Paul J. Murphy" , "Paul J. Murphy" , linux-kernel@vger.kernel.org Subject: [PATCH] firmware: arm_scmi: Pass shmem address to SMCCC call Date: Wed, 15 Jul 2020 17:55:18 +0100 Message-Id: <20200715165518.57558-1-daniele.alessandrelli@linux.intel.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Daniele Alessandrelli Currently, when SMC/HVC is used as transport, the base address of the shared memory used for communication is not passed to the SMCCC call. This means that such an address must be hard-coded into the bootloader. In order to increase flexibility and allow the memory layout to be changed without modifying the bootloader, this patch adds the shared memory base address to the a1 argument of the SMCCC call. On the Secure Monitor side, the service call implementation can therefore read the a1 argument in order to know the location of the shared memory to use. This change is backward compatible to existing service call implementations as long as they don't check for a1 to be zero. Signed-off-by: Daniele Alessandrelli Signed-off-by: Paul J. Murphy --- drivers/firmware/arm_scmi/smc.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/firmware/arm_scmi/smc.c b/drivers/firmware/arm_scmi/smc.c index 49bc4b0e8428..aef3a58f8266 100644 --- a/drivers/firmware/arm_scmi/smc.c +++ b/drivers/firmware/arm_scmi/smc.c @@ -21,12 +21,14 @@ * * @cinfo: SCMI channel info * @shmem: Transmit/Receive shared memory area + * @shmem_paddr: Physical address of shmem * @func_id: smc/hvc call function id */ struct scmi_smc { struct scmi_chan_info *cinfo; struct scmi_shared_mem __iomem *shmem; + resource_size_t shmem_paddr; struct mutex shmem_lock; u32 func_id; }; @@ -73,6 +75,7 @@ static int smc_chan_setup(struct scmi_chan_info *cinfo, struct device *dev, dev_err(dev, "failed to ioremap SCMI Tx shared memory\n"); return -EADDRNOTAVAIL; } + scmi_info->shmem_paddr = res.start; ret = of_property_read_u32(dev->of_node, "arm,smc-id", &func_id); if (ret < 0) @@ -109,7 +112,8 @@ static int smc_send_message(struct scmi_chan_info *cinfo, shmem_tx_prepare(scmi_info->shmem, xfer); - arm_smccc_1_1_invoke(scmi_info->func_id, 0, 0, 0, 0, 0, 0, 0, &res); + arm_smccc_1_1_invoke(scmi_info->func_id, scmi_info->shmem_paddr, 0, 0, + 0, 0, 0, 0, &res); scmi_rx_callback(scmi_info->cinfo, shmem_read_header(scmi_info->shmem)); mutex_unlock(&scmi_info->shmem_lock); -- 2.26.2