Received: by 2002:ab2:5c0e:0:b0:1ef:a325:1205 with SMTP id i14csp210584lqk; Thu, 14 Mar 2024 00:11:27 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXHaudTno82isyGbflhpEDPWiXecMH86siA0p3Es6AxEYyvBL9oyfsIiBSUHKzSo1E4pPj5Jc56G6dp5nB8PNpIBvTPsaBu3XYi6VXPag== X-Google-Smtp-Source: AGHT+IGGnPQtOHLejZqPQr47zCPMUHznDGihXVKyarmrH9cfkPh83/4sgTAKInUt1OOe1P5yyXuN X-Received: by 2002:a17:907:c088:b0:a43:f66a:17f7 with SMTP id st8-20020a170907c08800b00a43f66a17f7mr634656ejc.19.1710400286912; Thu, 14 Mar 2024 00:11:26 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1710400286; cv=pass; d=google.com; s=arc-20160816; b=EE78LAc7BtRizIUrGFjCOA+o8/EEwjjbEppAqsQmLMPyOU4UczCqLimQ89mADJjz1w e22DSjTqj4kL9jsJ7PBIg2jGnKEFdTLE9RSOsPJvpyq9lfRT5o0ee70wkE6IBez3rH+e EFg0WalWG+8CRiDD2IFiUycXs9qUuqNclPWeXsnohLcGSQSKelZ1Yq8SaWY9y/xGMAGI 3u6pjfatqKMYK0VouwYVWjqHIj+7xtA8fsDwK9uSaTug2FWG9kTQ09T2EZM6Wx7mSsKS A+jhCKl2EH0JiTsGLSJjpHW57NUIvVZA6xaoMage7MuePz1/QxwFsBjBWa4PXKBrSNC/ 162g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=XJS0GcG/B3Tz+QSMIy9rmol6bfuVb5L21j5t2XiU+ek=; fh=mhXHKnPRBPTLeaKiu7kiNYBE05qcNJ+/2XipVy1FTuI=; b=IODSCWNmQZWPZeB9rf2DvuLsQHbZ5UOFmc4nO1FMWoqljO31KljJMGSvlgcpAwNBOh 31/KoA8JG9JE2ho3+lruPNMD7XcDM5mOXSe5TE/fewRxcMegvyEDigYttHbfjOhLkKj0 gcg8JNI7RLZISKaWbjMAEO9cE4ILovUYMGPxeYHvHwHwVezlo3L7x94IbeN5V6IKxd/Q DkpzKj7ZFWqwYNq0qcubcH9bQJS7JhZB++2IhQYgMj8497p1P/mg1QqY2Tt+Zu1HmryS ckWULmhvzX3kHNFujfcZPW9Y0hCMLskT2Rmg3c1zk2l3XPTnU7tacSMsJY3B/FxPYRuL 9v3g==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@lexina.in header.s=dkim header.b=e90wd5Js; arc=pass (i=1 spf=pass spfdomain=lexina.in dkim=pass dkdomain=lexina.in dmarc=pass fromdomain=lexina.in); spf=pass (google.com: domain of linux-kernel+bounces-102916-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-102916-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=lexina.in Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id f19-20020a170906085300b00a45ad94663csi430404ejd.121.2024.03.14.00.11.26 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Mar 2024 00:11:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-102916-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@lexina.in header.s=dkim header.b=e90wd5Js; arc=pass (i=1 spf=pass spfdomain=lexina.in dkim=pass dkdomain=lexina.in dmarc=pass fromdomain=lexina.in); spf=pass (google.com: domain of linux-kernel+bounces-102916-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-102916-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=lexina.in Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 756481F236E4 for ; Thu, 14 Mar 2024 07:11:26 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C0B53125C9; Thu, 14 Mar 2024 07:11:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=lexina.in header.i=@lexina.in header.b="e90wd5Js" Received: from mx.msync.work (mx.msync.work [62.182.159.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A1CA1FC02 for ; Thu, 14 Mar 2024 07:10:57 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=62.182.159.68 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710400259; cv=none; b=UuM9y1qrjwNnPRqr6ZK4+hahgfte14voCNWIDViq3ydEsRTY7fk0LmqVvOKXuaAx27sVj+fWc8IbVQyH4TCNuzHwF1eLzDF3eqqU80/xink3Jed0vpkdvS2C53ovG1PxvZx8T6Dc+/jvPQVpD1FQhrquNHQ7qCAtN+9f4LHGBSA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710400259; c=relaxed/simple; bh=sMorw6lmCH1gSQQR7nWmKOdqMqCZ99zhc4X/hEKtn7E=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=dl7cr4UK/GNzf9UmU0HSb+xM0OiNjgxPor9s4M3vlsM5/40kKBumorwcjYwBkO1lptszQc/UmeBBcVYOVbMpVAE7kyDCb92tqpjDjlpTMY3WeSBcycU5EubO4D5TzPl3VP7xMkMBga6CNbAAQkJQq2jaWXQng4EiVoz6oIvIg+g= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=lexina.in; spf=pass smtp.mailfrom=lexina.in; dkim=pass (2048-bit key) header.d=lexina.in header.i=@lexina.in header.b=e90wd5Js; arc=none smtp.client-ip=62.182.159.68 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=lexina.in Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=lexina.in Received: from [127.0.0.1] (localhost [127.0.0.1]) by localhost (Mailerdaemon) with ESMTPSA id 0BD6611E88C; Thu, 14 Mar 2024 07:04:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lexina.in; s=dkim; t=1710399888; h=from:subject:date:message-id:to:cc:mime-version: content-transfer-encoding:in-reply-to:references; bh=XJS0GcG/B3Tz+QSMIy9rmol6bfuVb5L21j5t2XiU+ek=; b=e90wd5JssdoKc0+IQ5SwXsd/xAdnmvWDzLdso+WxAPcsvnbKFaWyo2FoNq3hJlBZbHLKQr yeyUJHMHBWw5QjCkDY0RstZnMSrXz8FRl82m+X2DqPU+bdjNIBVLIJAeLmEbmBhRQFLGay LMDluoAFcNyMRjy35zEf4DGowvO3Nj6nLthJw1D7BHPYy6vk2jPJCzLx1s+LYJ5/ea/+eo 59lzOl8sS4ylv8irTxTpCZeXgbLUmMc9knTJ1JUiSIezs6y9HVNZQMiVOBWNniXH879/Dh lf2g5b8X2i0eWwnY4DkOUVNInP2nosjLOEaSHvzyeg5xg51S+7EC0odgnD5qfg== From: Viacheslav Bocharov To: Neil Armstrong , Kevin Hilman , Jerome Brunet , Martin Blumenstingl , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-amlogic@lists.infradead.org Cc: Rob Herring , Krzysztof Kozlowski Subject: [PATCH v3 2/4] soc: amlogic: meson-gx-socinfo-sm: Add Amlogic secure-monitor SoC Information driver Date: Thu, 14 Mar 2024 09:59:52 +0300 Message-ID: <20240314070433.4151931-3-adeep@lexina.in> X-Mailer: git-send-email 2.43.2 In-Reply-To: <20240314070433.4151931-1-adeep@lexina.in> References: <20240314070433.4151931-1-adeep@lexina.in> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Last-TLS-Session-Version: TLSv1.3 Amlogic SoCs have a SoC information secure-monitor call for SoC type, package type, revision information and chipid. This patchs adds support for secure-monitor call decoding and exposing with the SoC bus infrastructure in addition to the previous SoC Information driver. Signed-off-by: Viacheslav Bocharov --- drivers/soc/amlogic/Kconfig | 10 ++ drivers/soc/amlogic/Makefile | 1 + drivers/soc/amlogic/meson-gx-socinfo-sm.c | 192 ++++++++++++++++++++++ 3 files changed, 203 insertions(+) create mode 100644 drivers/soc/amlogic/meson-gx-socinfo-sm.c diff --git a/drivers/soc/amlogic/Kconfig b/drivers/soc/amlogic/Kconfig index d08e398bdad4..82fc77ca3b4b 100644 --- a/drivers/soc/amlogic/Kconfig +++ b/drivers/soc/amlogic/Kconfig @@ -26,6 +26,16 @@ config MESON_GX_SOCINFO Say yes to support decoding of Amlogic Meson GX SoC family information about the type, package and version. +config MESON_GX_SOCINFO_SM + bool "Amlogic Meson GX SoC Information driver via Secure Monitor" + depends on (ARM64 && ARCH_MESON || COMPILE_TEST) && MESON_SM=y + default ARCH_MESON && MESON_SM + select SOC_BUS + help + Say yes to support decoding of Amlogic Meson GX SoC family + information about the type, package and version via secure + monitor call. + config MESON_MX_SOCINFO bool "Amlogic Meson MX SoC Information driver" depends on (ARM && ARCH_MESON) || COMPILE_TEST diff --git a/drivers/soc/amlogic/Makefile b/drivers/soc/amlogic/Makefile index c25f835e6a26..45d9d6f5904c 100644 --- a/drivers/soc/amlogic/Makefile +++ b/drivers/soc/amlogic/Makefile @@ -2,4 +2,5 @@ obj-$(CONFIG_MESON_CANVAS) += meson-canvas.o obj-$(CONFIG_MESON_CLK_MEASURE) += meson-clk-measure.o obj-$(CONFIG_MESON_GX_SOCINFO) += meson-gx-socinfo.o +obj-$(CONFIG_MESON_GX_SOCINFO_SM) += meson-gx-socinfo-sm.o obj-$(CONFIG_MESON_MX_SOCINFO) += meson-mx-socinfo.o diff --git a/drivers/soc/amlogic/meson-gx-socinfo-sm.c b/drivers/soc/amlogic/meson-gx-socinfo-sm.c new file mode 100644 index 000000000000..e30e1d2feb61 --- /dev/null +++ b/drivers/soc/amlogic/meson-gx-socinfo-sm.c @@ -0,0 +1,192 @@ +// SPDX-License-Identifier: GPL-2.0+ +/* + * Copyright (c) 2017 BayLibre, SAS + * Copyright (c) 2024 JetHome + * Author: Neil Armstrong + * Author: Viacheslav Bocharov + * + */ + +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include + +#include "meson-gx-socinfo-internal.h" + +static char *socinfo_get_chipid(struct device *dev, struct meson_sm_firmware *fw, + union meson_cpu_id *socinfo) +{ + char *buf; + struct meson_sm_chip_id *id_buf; + int ret; + + id_buf = devm_kzalloc(dev, sizeof(struct meson_sm_chip_id)+1, GFP_KERNEL); + if (!id_buf) + return NULL; + + ret = meson_sm_call_read(fw, id_buf, sizeof(struct meson_sm_chip_id), SM_GET_CHIP_ID, + 2, 0, 0, 0, 0); + if (ret < 0) { + kfree(id_buf); + return NULL; + } + dev_info(dev, "got sm version call %i\n", id_buf->version); + + if (id_buf->version != 2) { + + u8 tmp; + /** + * Legacy 12-byte chip ID read out, transform data + * to expected order format + */ + memmove((void *)&id_buf->serial, (void *)&id_buf->cpu_id, 12); + for (int i = 0; i < 6; i++) { + tmp = id_buf->serial[i]; + id_buf->serial[i] = id_buf->serial[11 - i]; + id_buf->serial[11 - i] = tmp; + } + id_buf->cpu_id.v2.major_id = socinfo->v1.major_id; + id_buf->cpu_id.v2.pack_id = socinfo->v1.pack_id; + id_buf->cpu_id.v2.chip_rev = socinfo->v1.chip_rev; + id_buf->cpu_id.v2.reserved = socinfo->v1.reserved; + id_buf->cpu_id.v2.layout_ver = socinfo->v1.layout_ver; + } else { + /** + * rewrite socinfo from regmap with value from secure monitor call + */ + socinfo->v1.major_id = id_buf->cpu_id.v2.major_id; + socinfo->v1.pack_id = id_buf->cpu_id.v2.pack_id; + socinfo->v1.chip_rev = id_buf->cpu_id.v2.chip_rev; + socinfo->v1.reserved = id_buf->cpu_id.v2.reserved; + socinfo->v1.layout_ver = id_buf->cpu_id.v2.layout_ver; + } + + buf = kasprintf(GFP_KERNEL, "%4phN%12phN", &(id_buf->cpu_id), &(id_buf->serial)); + + kfree(id_buf); + + return buf; +} + +static int meson_gx_socinfo_sm_probe(struct platform_device *pdev) +{ + struct soc_device_attribute *soc_dev_attr; + struct soc_device *soc_dev; + struct device_node *sm_np; + struct meson_sm_firmware *fw; + struct regmap *regmap; + union meson_cpu_id socinfo; + struct device *dev; + int ret; + + /* check if chip-id is available */ + if (!of_property_read_bool(pdev->dev.of_node, "amlogic,has-chip-id")) + return -ENODEV; + + /* node should be a syscon */ + regmap = syscon_node_to_regmap(pdev->dev.of_node); + if (IS_ERR(regmap)) { + dev_err(&pdev->dev, "failed to get regmap\n"); + return -ENODEV; + } + + sm_np = of_parse_phandle(pdev->dev.of_node, "secure-monitor", 0); + if (!sm_np) { + dev_err(&pdev->dev, "no secure-monitor node found\n"); + return -ENODEV; + } + + fw = meson_sm_get(sm_np); + of_node_put(sm_np); + if (!fw) { + dev_info(&pdev->dev, "secure-monitor device not ready, probe later\n"); + return -EPROBE_DEFER; + } + + ret = regmap_read(regmap, AO_SEC_SOCINFO_OFFSET, &socinfo.raw); + if (ret < 0) + return ret; + + if (!socinfo.raw) { + dev_err(&pdev->dev, "invalid regmap chipid value\n"); + return -EINVAL; + } + + soc_dev_attr = devm_kzalloc(&pdev->dev, sizeof(*soc_dev_attr), + GFP_KERNEL); + if (!soc_dev_attr) + return -ENOMEM; + + soc_dev_attr->serial_number = socinfo_get_chipid(&pdev->dev, fw, &socinfo); + + soc_dev_attr->family = "Amlogic Meson"; + soc_dev_attr->revision = kasprintf(GFP_KERNEL, "%x:%x - %x:%x", + socinfo.v1.major_id, + socinfo.v1.chip_rev, + socinfo.v1.pack_id, + (socinfo.v1.reserved<<4) + socinfo.v1.layout_ver); + soc_dev_attr->soc_id = kasprintf(GFP_KERNEL, "%s (%s)", + socinfo_v1_to_soc_id(socinfo), + socinfo_v1_to_package_id(socinfo)); + + soc_dev = soc_device_register(soc_dev_attr); + + + if (IS_ERR(soc_dev)) { + kfree(soc_dev_attr->revision); + kfree_const(soc_dev_attr->soc_id); + kfree(soc_dev_attr); + return PTR_ERR(soc_dev); + } + + dev = soc_device_to_device(soc_dev); + platform_set_drvdata(pdev, soc_dev); + + dev_info(dev, "Amlogic Meson %s Revision %x:%x (%x:%x) Detected (SM)\n", + soc_dev_attr->soc_id, + socinfo.v1.major_id, + socinfo.v1.chip_rev, + socinfo.v1.pack_id, + (socinfo.v1.reserved<<4) + socinfo.v1.layout_ver); + + return PTR_ERR_OR_ZERO(dev); +} + + +static int meson_gx_socinfo_sm_remove(struct platform_device *pdev) +{ + struct soc_device *soc_dev = platform_get_drvdata(pdev); + + soc_device_unregister(soc_dev); + return 0; +} + +static const struct of_device_id meson_gx_socinfo_match[] = { + { .compatible = "amlogic,meson-gx-ao-secure", }, + { /* sentinel */ }, +}; +MODULE_DEVICE_TABLE(of, meson_gx_socinfo_match); + +static struct platform_driver meson_gx_socinfo_driver = { + .probe = meson_gx_socinfo_sm_probe, + .remove = meson_gx_socinfo_sm_remove, + .driver = { + .name = "meson-gx-socinfo-sm", + .of_match_table = meson_gx_socinfo_match, + }, +}; + + +module_platform_driver(meson_gx_socinfo_driver); + +MODULE_AUTHOR("Viacheslav Bocharov "); +MODULE_DESCRIPTION("Amlogic Meson GX SOC SM driver"); +MODULE_LICENSE("GPL"); -- 2.43.2