[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <78f363ba-6647-f711-57bf-e48f770118a0@xilinx.com>
Date: Thu, 17 Aug 2017 08:57:59 +0200
From: Michal Simek <michal.simek@...inx.com>
To: Mark Rutland <mark.rutland@....com>,
Michal Simek <michal.simek@...inx.com>
CC: <linux-arm-kernel@...ts.infradead.org>,
Arnd Bergmann <arnd@...db.de>, <edgar.iglesias@...inx.com>,
Rob Herring <robh@...nel.org>, <monstr@...str.eu>,
Lorenzo Pieralisi <lorenzo.pieralisi@....com>,
Kevin Hilman <khilman@...libre.com>,
Kevin Brodsky <kevin.brodsky@....com>,
<linux-kernel@...r.kernel.org>, Jean Delvare <jdelvare@...e.de>,
Nishanth Menon <nm@...com>, Tero Kristo <t-kristo@...com>,
Carlo Caione <carlo@...lessm.com>,
Sudeep Holla <sudeep.holla@....com>,
Olof Johansson <olof@...om.net>,
"Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>,
Thierry Reding <treding@...dia.com>,
Sören Brinkmann <soren.brinkmann@...inx.com>
Subject: Re: [PATCHv2 3/3] soc: xilinx: zynqmp: Add firmware interface
On 16.8.2017 17:58, Mark Rutland wrote:
> On Wed, Aug 16, 2017 at 02:24:58PM +0200, Michal Simek wrote:
>> This patch is adding communication layer with firmware.
>
> Which is used for what, exactly?
pinctrl, fpga manager, nvmem driver, clock, serdes phy and reset drivers.
> There are no users of this API introduced in this series.
But this driver need to come first because they depend on this.
If you want to look at that drivers please take a look at
https://github.com/Xilinx/linux-xlnx
>
>> The most of request are coming thought ATF to PMUFW (platform management
>> unit).
>
> [...]
>
>> +/**
>> + * get_set_conduit_method - Choose SMC or HVC based communication
>> + * @np: Pointer to the device_node structure
>> + *
>> + * Use SMC or HVC-based functions to communicate with EL2/EL3
>> + */
>> +static void get_set_conduit_method(struct device_node *np)
>> +{
>> + const char *method;
>> + struct device *dev;
>> +
>> + dev = container_of(&np, struct device, of_node);
>> +
>> + if (of_property_read_string(np, "method", &method)) {
>> + dev_warn(dev, "%s Missing \"method\" property - defaulting to smc\n",
>> + __func__);
>> + do_fw_call = do_fw_call_smc;
>> + return;
>> + }
>
> This is a mandatory property. Don't guess if it's not present.
Fixed in next version
>
> [...]
>
>> +/**
>> + * zynqmp_pm_reset_assert - Request setting of reset (1 - assert, 0 - release)
>> + * @reset: Reset to be configured
>> + * @assert_flag: Flag stating should reset be asserted (1) or
>> + * released (0)
>> + *
>> + * Return: Returns status, either success or error+reason
>> + */
>> +int zynqmp_pm_reset_assert(const enum zynqmp_pm_reset reset,
>> + const enum zynqmp_pm_reset_action assert_flag)
>> +{
>> + return invoke_pm_fn(RESET_ASSERT, reset, assert_flag, 0, 0, NULL);
>> +}
>> +EXPORT_SYMBOL_GPL(zynqmp_pm_reset_assert);
>
> Where is the reset nr expected to come from?
>
> Nothing in this series defined bindings for those.
Numbers will be the part of reset driver binding but numbers are coming
from DT.
This is the usage.
serdes: zynqmp_phy@...00000 {
compatible = "xlnx,zynqmp-psgtr";
status = "disabled";
reg = <0x0 0xfd400000 0x0 0x40000>,
<0x0 0xfd3d0000 0x0 0x1000>,
<0x0 0xff5e0000 0x0 0x1000>;
reg-names = "serdes", "siou", "lpd";
nvmem-cells = <&soc_revision>;
nvmem-cell-names = "soc_revision";
resets = <&rst 16>, <&rst 59>, <&rst 60>,
<&rst 61>, <&rst 62>, <&rst 63>,
<&rst 64>, <&rst 3>, <&rst 29>,
<&rst 30>, <&rst 31>, <&rst 32>;
reset-names = "sata_rst", "usb0_crst", "usb1_crst",
"usb0_hibrst", "usb1_hibrst", "usb0_apbrst",
"usb1_apbrst", "dp_rst", "gem0_rst",
"gem1_rst", "gem2_rst", "gem3_rst";
lane0: lane0 {
#phy-cells = <4>;
};
lane1: lane1 {
#phy-cells = <4>;
};
lane2: lane2 {
#phy-cells = <4>;
};
lane3: lane3 {
#phy-cells = <4>;
};
};
If you think that this shouldn't be the part of this patch, I can remove
this part and send it as the part of reset driver.
>
>> +/**
>> + * zynqmp_pm_mmio_write - Perform write to protected mmio
>> + * @address: Address to write to
>> + * @mask: Mask to apply
>> + * @value: Value to write
>> + *
>> + * This function provides access to PM-related control registers
>> + * that may not be directly accessible by a particular PU.
>> + *
>> + * Return: Returns status, either success or error+reason
>> + */
>> +int zynqmp_pm_mmio_write(const u32 address,
>> + const u32 mask,
>> + const u32 value)
>> +{
>> + return invoke_pm_fn(MMIO_WRITE, address, mask, value, 0, NULL);
>> +}
>> +EXPORT_SYMBOL_GPL(zynqmp_pm_mmio_write);
>> +
>> +/**
>> + * zynqmp_pm_mmio_read - Read value from protected mmio
>> + * @address: Address to write to
>> + * @value: Value to read
>> + *
>> + * This function provides access to PM-related control registers
>> + * that may not be directly accessible by a particular PU.
>> + *
>> + * Return: Returns status, either success or error+reason
>> + */
>> +int zynqmp_pm_mmio_read(const u32 address, u32 *value)
>> +{
>> + u32 ret_payload[PAYLOAD_ARG_CNT];
>> +
>> + if (!value)
>> + return -EINVAL;
>> +
>> + invoke_pm_fn(MMIO_READ, address, 0, 0, 0, ret_payload);
>> + *value = ret_payload[1];
>> +
>> + return zynqmp_pm_ret_code((enum pm_ret_status)ret_payload[0]);
>> +}
>> +EXPORT_SYMBOL_GPL(zynqmp_pm_mmio_read);
>
> I guess these are to secure memory?
yep.
>
> How are these safe?
>
> What validation is done on the secure side?
firmware is limiting access based on system setup.
>
>> +
>> +/**
>> + * zynqmp_pm_fpga_load - Perform the fpga load
>> + * @address: Address to write to
>> + * @size: pl bitstream size
>> + * @flags:
>> + * BIT(0) - Bit-stream type.
>> + * 0 - Full Bit-stream.
>> + * 1 - Partial Bit-stream.
>> + * BIT(1) - Authentication.
>> + * 1 - Enable.
>> + * 0 - Disable.
>> + * BIT(2) - Encryption.
>> + * 1 - Enable.
>> + * 0 - Disable.
>> + * NOTE -
>> + * The current implementation supports only Full Bit-stream.
>> + *
>> + * This function provides access to xilfpga library to transfer
>> + * the required bitstream into PL.
>> + *
>> + * Return: Returns status, either success or error+reason
>> + */
>> +int zynqmp_pm_fpga_load(const u64 address, const u32 size, const u32 flags)
>> +{
>> + return invoke_pm_fn(FPGA_LOAD, (u32)address,
>> + ((u32)(address >> 32)), size, flags, NULL);
>> +}
>> +EXPORT_SYMBOL_GPL(zynqmp_pm_fpga_load);
>
> What space is the address in?
>
> *which* FPGA instance is this? Surely this needs to be linked to a node
> in the DT by some means?
>
> [...]
It is the same case as reset functions above. If you think that this
should be the part of fpga series I am happy to remove this part for
this patch.
https://github.com/Xilinx/linux-xlnx/blob/master/drivers/fpga/zynqmp-fpga.c
>
>> +static int __init zynqmp_plat_init(void)
>> +{
>> + struct device_node *np;
>> + int ret = 0;
>> +
>> + np = of_find_compatible_node(NULL, NULL, "xlnx,zynqmp");
>> + if (!np)
>> + return 0;
>> + of_node_put(np);
>> +
>> + /* We're running on a ZynqMP machine, the PM node is mandatory. */
>> + np = of_find_compatible_node(NULL, NULL, "xlnx,zynqmp-pm");
>> + if (!np)
>> + panic("%s: pm node not found\n", __func__);
>
> NAK to this panic(). It breaks existing DTBs.
Ok. I have fixed this.
>
> [...]
>
>> +enum pm_api_id {
>> + /* Miscellaneous API functions: */
>> + GET_API_VERSION = 1,
>> + SET_CONFIGURATION,
>> + GET_NODE_STATUS,
>> + GET_OPERATING_CHARACTERISTIC,
>> + REGISTER_NOTIFIER,
>> + /* API for suspending of PUs: */
>> + REQUEST_SUSPEND,
>> + SELF_SUSPEND,
>> + FORCE_POWERDOWN,
>> + ABORT_SUSPEND,
>> + REQUEST_WAKEUP,
>> + SET_WAKEUP_SOURCE,
>> + SYSTEM_SHUTDOWN,
>
> What are these? They sound like they overlap with PSCI.
PM guys can comment this more than I but AFAIK PSCI is not providing
enough functionality for our chip that's why additional things needs to
be done. I can remove them as is above with reset/fpga stuff.
Thanks,
Michal
Powered by blists - more mailing lists