Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1358312pxf; Fri, 2 Apr 2021 08:22:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzCJeAXFICYTkKJ9Z6FCsrAxeOKA7/vDKZcMc8BG9+ukCncJ8gWiwEr0yFv24tp1mhknRgk X-Received: by 2002:a05:6402:b07:: with SMTP id bm7mr733500edb.82.1617376938548; Fri, 02 Apr 2021 08:22:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617376938; cv=none; d=google.com; s=arc-20160816; b=aQUkX8md8qGlS10Tupy7KbzSRb/tYTBroflBh8lpQU4PE1zJn/RtDbz8nY1+uYD2Jj llJzd99TfZw1NyjGoqRzz4S5ELiUykJmgdQw7SPsgS4XDD3ruCZ19zpPVhpfHM/MY9O3 iYwxcCEPzCha/GGO14dOuRx8CHHagYMyz7yu40HXKazvFykCm9CAsrVXMcDP429YNnU5 nZX1S6cGhUUbCh9TzOXWIiTPscsDOqJjGN5xIW+14vJpw/ZsfDktqXAsh9ci62Use9qM XejmrQSsgtL0lY+62XRFODfgxhyE4ZGGuE0JEg/Ogae5LYTXXrUwZ3HwtBQTWkqDSW08 0o/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=5gT+OiV+px1B+59Pm6F30uiphDYSR4ngMXF0g4Z0zn8=; b=DMvdZVp/nehMthM1pZoSwIKkoTMuucfLUGS3FE9j2hbeNBgvqSfs6HJcKz9BkpnnAA UBA1fc46EePRnX7f8LalnzheODmyEGlA6Ie7h385eq+nVWjEp5mExJrUKzXIyCYd1pAu UD03BFim3UCBwPKgdxI4joQ4rWG15AQja4ZhIE4NkrhqXz/hudSR6KiB3DstHXEmAPxb qarBxSNwyph0pQUyslLUNvxldB0ar+StiBRsWu5I9iPi1b2eK21D/cuOR0dxQa2o8IFp WiqRF27kk3h6VNaSlQA/xJ3aPkkbsDkB6j7KGOeaDVG2aCZ2hO3jetm8vwaqcTlorxco 0g6A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j9si6822300edw.509.2021.04.02.08.21.55; Fri, 02 Apr 2021 08:22:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235961AbhDBPV3 (ORCPT + 99 others); Fri, 2 Apr 2021 11:21:29 -0400 Received: from mga17.intel.com ([192.55.52.151]:15433 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235448AbhDBPV2 (ORCPT ); Fri, 2 Apr 2021 11:21:28 -0400 IronPort-SDR: kOyxMcU5m0Z8npv+tebQquceT/36D7fDc/uYFVoMynPgAgpNIqFGcNkf8x8+0nEl12tfXtvcLM yvDylvoDPOiw== X-IronPort-AV: E=McAfee;i="6000,8403,9942"; a="172517988" X-IronPort-AV: E=Sophos;i="5.81,300,1610438400"; d="scan'208";a="172517988" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Apr 2021 08:21:26 -0700 IronPort-SDR: iTc0WdDPYCIJ56Fs8Ej3JM3UsZQG4la470WB1fiIkEiuD7bF9E9xdidYC1rui0B2ZtJfCvHVZ+ 2ZUgnqbWJi/Q== X-IronPort-AV: E=Sophos;i="5.81,300,1610438400"; d="scan'208";a="419698816" Received: from twinkler-lnx.jer.intel.com ([10.12.91.138]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Apr 2021 08:21:23 -0700 From: Tomas Winkler To: Rajneesh Bhardwaj , David E Box , Hans de Goede , Mark Gross Cc: platform-driver-x86@vger.kernel.org, linux-kernel@vger.kernel.org, Tamar Mashiah , Andy Shevchenko , Tomas Winkler Subject: [PATCH v4] platform/x86: intel_pmc_core: export platform global_reset via sysfs. Date: Fri, 2 Apr 2021 18:21:13 +0300 Message-Id: <20210402152113.1191796-1-tomas.winkler@intel.com> X-Mailer: git-send-email 2.26.3 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tamar Mashiah During PCH (platform/board) manufacturing process a global reset has to be induced in order for configuration changes take the effect upon following platform reset. This setting was commonly done by accessing PMC registers via /dev/mem but due to security concern /dev/mem access is much restricted, hence the reason for exposing this setting via dedicated sysfs interface. To prevent post manufacturing abuse the register is protected by hardware locking. The register in MMIO space is defined for Cannon Lake and newer PCHs. Cc: David E Box Reviewed-by: Andy Shevchenko Signed-off-by: Tamar Mashiah Signed-off-by: Tomas Winkler --- 2: 1. Add locking for reading the ET3 register (Andy) 2. Fix few style issues (Andy) V3: 1. Resend v4: 1. Fix return statement (Andy) 2. Specify manufacturing process (Enrico) .../ABI/testing/sysfs-platform-intel-pmc | 11 +++ MAINTAINERS | 1 + drivers/platform/x86/intel_pmc_core.c | 97 +++++++++++++++++++ drivers/platform/x86/intel_pmc_core.h | 6 ++ 4 files changed, 115 insertions(+) create mode 100644 Documentation/ABI/testing/sysfs-platform-intel-pmc diff --git a/Documentation/ABI/testing/sysfs-platform-intel-pmc b/Documentation/ABI/testing/sysfs-platform-intel-pmc new file mode 100644 index 000000000000..7ce00e77fbcd --- /dev/null +++ b/Documentation/ABI/testing/sysfs-platform-intel-pmc @@ -0,0 +1,11 @@ +What: /sys/devices/platform//global_reset +Date: Apr 2021 +KernelVersion: 5.13 +Contact: "Tomas Winkler" +Description: + Display global reset setting bits for PMC. + * bit 31 - global reset is locked + * bit 20 - global reset is set + Writing bit 20 value to the global_reset will induce + a platform global reset upon consequent platform reset. + in case the register is not locked. diff --git a/MAINTAINERS b/MAINTAINERS index 04f68e0cda64..618676eba8c8 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -9166,6 +9166,7 @@ M: Rajneesh Bhardwaj M: David E Box L: platform-driver-x86@vger.kernel.org S: Maintained +F: Documentation/ABI/testing/sysfs-platform-intel-pmc F: drivers/platform/x86/intel_pmc_core* INTEL PMIC GPIO DRIVERS diff --git a/drivers/platform/x86/intel_pmc_core.c b/drivers/platform/x86/intel_pmc_core.c index ee2f757515b0..8afc198550a4 100644 --- a/drivers/platform/x86/intel_pmc_core.c +++ b/drivers/platform/x86/intel_pmc_core.c @@ -401,6 +401,7 @@ static const struct pmc_reg_map cnp_reg_map = { .pm_cfg_offset = CNP_PMC_PM_CFG_OFFSET, .pm_read_disable_bit = CNP_PMC_READ_DISABLE_BIT, .ltr_ignore_max = CNP_NUM_IP_IGN_ALLOWED, + .etr3_offset = ETR3_OFFSET, }; static const struct pmc_reg_map icl_reg_map = { @@ -418,6 +419,7 @@ static const struct pmc_reg_map icl_reg_map = { .pm_cfg_offset = CNP_PMC_PM_CFG_OFFSET, .pm_read_disable_bit = CNP_PMC_READ_DISABLE_BIT, .ltr_ignore_max = ICL_NUM_IP_IGN_ALLOWED, + .etr3_offset = ETR3_OFFSET, }; static const struct pmc_bit_map tgl_clocksource_status_map[] = { @@ -585,6 +587,7 @@ static const struct pmc_reg_map tgl_reg_map = { .lpm_sts = tgl_lpm_maps, .lpm_status_offset = TGL_LPM_STATUS_OFFSET, .lpm_live_status_offset = TGL_LPM_LIVE_STATUS_OFFSET, + .etr3_offset = ETR3_OFFSET, }; static inline u32 pmc_core_reg_read(struct pmc_dev *pmcdev, int reg_offset) @@ -603,6 +606,99 @@ static inline u64 pmc_core_adjust_slp_s0_step(struct pmc_dev *pmcdev, u32 value) return (u64)value * pmcdev->map->slp_s0_res_counter_step; } +static int set_global_reset(struct pmc_dev *pmcdev) +{ + const struct pmc_reg_map *map = pmcdev->map; + u32 reg; + int err; + + if (!map->etr3_offset) + return -EOPNOTSUPP; + + mutex_lock(&pmcdev->lock); + + /* check if CF9 is locked */ + reg = pmc_core_reg_read(pmcdev, map->etr3_offset); + if (reg & ETR3_CF9LOCK) { + err = -EACCES; + goto out_unlock; + } + + /* write CF9 global reset bit */ + reg |= ETR3_CF9GR; + pmc_core_reg_write(pmcdev, map->etr3_offset, reg); + + reg = pmc_core_reg_read(pmcdev, map->etr3_offset); + if (!(reg & ETR3_CF9GR)) { + err = -EIO; + goto out_unlock; + } + + err = 0; + +out_unlock: + mutex_unlock(&pmcdev->lock); + return err; +} + +static ssize_t global_reset_show(struct device *dev, + struct device_attribute *attr, char *buf) +{ + struct pmc_dev *pmcdev = dev_get_drvdata(dev); + const struct pmc_reg_map *map = pmcdev->map; + u32 reg; + + if (!map->etr3_offset) + return -EOPNOTSUPP; + + mutex_lock(&pmcdev->lock); + + reg = pmc_core_reg_read(pmcdev, map->etr3_offset); + reg &= ETR3_CF9GR | ETR3_CF9LOCK; + + mutex_unlock(&pmcdev->lock); + + return sysfs_emit(buf, "0x%08x", reg); +} + +static ssize_t global_reset_store(struct device *dev, + struct device_attribute *attr, + const char *buf, size_t len) +{ + struct pmc_dev *pmcdev = dev_get_drvdata(dev); + int err; + u32 reg; + + err = kstrtouint(buf, 16, ®); + if (err) + return err; + + /* allow only CF9 writes */ + if (reg != ETR3_CF9GR) + return -EINVAL; + + err = set_global_reset(pmcdev); + if (err) + return err; + + return len; +} +static DEVICE_ATTR_RW(global_reset); + +static struct attribute *pmc_attrs[] = { + &dev_attr_global_reset.attr, + NULL +}; + +static const struct attribute_group pmc_attr_group = { + .attrs = pmc_attrs, +}; + +static const struct attribute_group *pmc_dev_groups[] = { + &pmc_attr_group, + NULL +}; + static int pmc_core_dev_state_get(void *data, u64 *val) { struct pmc_dev *pmcdev = data; @@ -1364,6 +1460,7 @@ static struct platform_driver pmc_core_driver = { .name = "intel_pmc_core", .acpi_match_table = ACPI_PTR(pmc_core_acpi_ids), .pm = &pmc_core_pm_ops, + .dev_groups = pmc_dev_groups, }, .probe = pmc_core_probe, .remove = pmc_core_remove, diff --git a/drivers/platform/x86/intel_pmc_core.h b/drivers/platform/x86/intel_pmc_core.h index f33cd2c34835..98ebdfe57138 100644 --- a/drivers/platform/x86/intel_pmc_core.h +++ b/drivers/platform/x86/intel_pmc_core.h @@ -200,6 +200,11 @@ enum ppfear_regs { #define TGL_LPM_STATUS_OFFSET 0x1C3C #define TGL_LPM_LIVE_STATUS_OFFSET 0x1C5C +/* Extended Test Mode Register 3 (CNL and later) */ +#define ETR3_OFFSET 0x1048 +#define ETR3_CF9GR BIT(20) +#define ETR3_CF9LOCK BIT(31) + const char *tgl_lpm_modes[] = { "S0i2.0", "S0i2.1", @@ -263,6 +268,7 @@ struct pmc_reg_map { const u32 lpm_residency_offset; const u32 lpm_status_offset; const u32 lpm_live_status_offset; + const u32 etr3_offset; }; /** -- 2.26.3