From patchwork Tue Dec 12 10:36:38 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Suma Hegde X-Patchwork-Id: 13488896 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="usnKUiyv" Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2040.outbound.protection.outlook.com [40.107.93.40]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E51D2AB for ; Tue, 12 Dec 2023 02:38:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=e/I5sM4KimSvTq8Z9JKy23Leqw7ZZWBk5zGqq4XIJ1/7OubLqLOyCOsRbqhtg1UlMrIr4KkGbFd9Krg4MC5TELMwdqEypqmaA+MT61Q5ySWELjQUS8/0NM/RY6Y+z/Y5vFezK4ul/NqhUikEkSOBS9ulzsaKS+yGCN9V5L/p1yIWu8rXHqFYJmqtFKb2KMDK6t2r8CmbKBnUDREjepUTX6ONqePQyyiyZWupnzqSGrl45eTyr3OlrfB4iY9QngtdBSzok+E9tGJfPLTnKU0/nKtuQHDK3jm3jqds2bf8NNQOlOwCj/O4RqUo6tYuxK93A02xjXR4geIqqEbs0XqjOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RzMRaKwal9Y1bx2pck1Nge67ntym25TsqHqCyKbhax4=; b=mO2hFQlXJJEninfakp7EKpXv+ULcMYCQ9D2T6i2FEtSXPmNj3kUFu61QcRcTGORilEprPKJQ/K8JJbAHXN9St3PcUyL2SxnJoDuTvmYkyR/tzjKb4Si4OdxPT9ahVvBv8EcB9d3/4NT/YBRunBCKXRk0ESh6CnDVr9jrYsU4UUh7zOInyq1ra1VicZCKfrG2dlz+ah0pV/S/9jqlKJXjtKggvZPSU7EhM3ziMwJ6HJKjXadMDlGONp+PdJ+LP/ncCJFSgJn7UdUWlXSLhROPMcSJ7OlO1zgWtQCZxf+PuiB8MmxwSFtuRNDSjNa6uO+wjs50ClUv/gQOkrQErHQ/IA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RzMRaKwal9Y1bx2pck1Nge67ntym25TsqHqCyKbhax4=; b=usnKUiyvailz0ugArKTaa1CC9V+BFTIpBI608poQD0GSREfGRLSq4KeizZe8ZQGU2X2Fu7hnild2rsvEGKVU5+h3DS1Oc7ZjSEf5FptaT0mFCs6dwZ+GcoWi0zvDwp9rjuwFN0KVH2nquzxOmwq7uqM8Rq8fgTP++OE7Yh/wS/4= Received: from CY5PR13CA0009.namprd13.prod.outlook.com (2603:10b6:930::33) by SJ0PR12MB6989.namprd12.prod.outlook.com (2603:10b6:a03:448::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7091.26; Tue, 12 Dec 2023 10:38:38 +0000 Received: from CY4PEPF0000EE3A.namprd03.prod.outlook.com (2603:10b6:930:0:cafe::f1) by CY5PR13CA0009.outlook.office365.com (2603:10b6:930::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7091.26 via Frontend Transport; Tue, 12 Dec 2023 10:38:38 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by CY4PEPF0000EE3A.mail.protection.outlook.com (10.167.242.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7091.18 via Frontend Transport; Tue, 12 Dec 2023 10:38:38 +0000 Received: from amd.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.34; Tue, 12 Dec 2023 04:38:32 -0600 From: Suma Hegde To: CC: , , Suma Hegde , Naveen Krishna Chatradhi Subject: [PATCH 1/7] platform/x86: Move hsmp_test to probe Date: Tue, 12 Dec 2023 10:36:38 +0000 Message-ID: <20231212103644.768460-2-suma.hegde@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20231212103644.768460-1-suma.hegde@amd.com> References: <20231212103644.768460-1-suma.hegde@amd.com> Precedence: bulk X-Mailing-List: platform-driver-x86@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-ClientProxiedBy: SATLEXMB04.amd.com (10.181.40.145) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CY4PEPF0000EE3A:EE_|SJ0PR12MB6989:EE_ X-MS-Office365-Filtering-Correlation-Id: 273e157f-581f-4e57-303d-08dbfafe8031 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230031)(4636009)(136003)(376002)(396003)(346002)(39860400002)(230922051799003)(64100799003)(186009)(1800799012)(451199024)(82310400011)(36840700001)(40470700004)(46966006)(40460700003)(1076003)(2616005)(26005)(336012)(16526019)(7696005)(426003)(8676002)(8936002)(4326008)(316002)(86362001)(40480700001)(44832011)(478600001)(70586007)(70206006)(6916009)(54906003)(5660300002)(36860700001)(81166007)(83380400001)(356005)(47076005)(82740400003)(2906002)(41300700001)(36756003)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Dec 2023 10:38:38.1464 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 273e157f-581f-4e57-303d-08dbfafe8031 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CY4PEPF0000EE3A.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR12MB6989 This is in advance to supporting ACPI based probe. In case of non-ACPI driver, hsmp_test() can be performed either in plat init() or in probe(). however, in case of ACPI probing, hsmp_test() cannot be called in init(), as the mailbox reg offsets and base addresses are read from ACPI table in the probe(). Hence, move hsmp_test() to probe as preparation for ACPI support. Also use hsmp_send_message() directly in hsmp_test() as the semaphore is already initialized in probe. Signed-off-by: Suma Hegde Co-developed-by: Naveen Krishna Chatradhi Signed-off-by: Naveen Krishna Chatradhi Reviewed-by: Hans de Goede --- drivers/platform/x86/amd/hsmp.c | 30 +++++++++++------------------- 1 file changed, 11 insertions(+), 19 deletions(-) diff --git a/drivers/platform/x86/amd/hsmp.c b/drivers/platform/x86/amd/hsmp.c index b55d80e29139..3c17b488f4f8 100644 --- a/drivers/platform/x86/amd/hsmp.c +++ b/drivers/platform/x86/amd/hsmp.c @@ -244,12 +244,7 @@ EXPORT_SYMBOL_GPL(hsmp_send_message); static int hsmp_test(u16 sock_ind, u32 value) { struct hsmp_message msg = { 0 }; - struct amd_northbridge *nb; - int ret = -ENODEV; - - nb = node_to_amd_nb(sock_ind); - if (!nb || !nb->root) - return ret; + int ret; /* * Test the hsmp port by performing TEST command. The test message @@ -261,7 +256,7 @@ static int hsmp_test(u16 sock_ind, u32 value) msg.args[0] = value; msg.sock_ind = sock_ind; - ret = __hsmp_send_message(nb->root, &msg); + ret = hsmp_send_message(&msg); if (ret) return ret; @@ -504,6 +499,15 @@ static int hsmp_pltdrv_probe(struct platform_device *pdev) for (i = 0; i < plat_dev.num_sockets; i++) { sema_init(&plat_dev.sock[i].hsmp_sem, 1); plat_dev.sock[i].sock_ind = i; + + /* Test the hsmp interface on each socket */ + ret = hsmp_test(i, 0xDEADBEEF); + if (ret) { + pr_err("HSMP test message failed on Fam:%x model:%x\n", + boot_cpu_data.x86, boot_cpu_data.x86_model); + pr_err("Is HSMP disabled in BIOS ?\n"); + return ret; + } } plat_dev.hsmp_device.name = HSMP_CDEV_NAME; @@ -544,7 +548,6 @@ static struct platform_device *amd_hsmp_platdev; static int __init hsmp_plt_init(void) { int ret = -ENODEV; - int i; if (boot_cpu_data.x86_vendor != X86_VENDOR_AMD || boot_cpu_data.x86 < 0x19) { pr_err("HSMP is not supported on Family:%x model:%x\n", @@ -560,17 +563,6 @@ static int __init hsmp_plt_init(void) if (plat_dev.num_sockets == 0) return ret; - /* Test the hsmp interface on each socket */ - for (i = 0; i < plat_dev.num_sockets; i++) { - ret = hsmp_test(i, 0xDEADBEEF); - if (ret) { - pr_err("HSMP test message failed on Fam:%x model:%x\n", - boot_cpu_data.x86, boot_cpu_data.x86_model); - pr_err("Is HSMP disabled in BIOS ?\n"); - return ret; - } - } - ret = platform_driver_register(&amd_hsmp_driver); if (ret) return ret; From patchwork Tue Dec 12 10:36:39 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Suma Hegde X-Patchwork-Id: 13488897 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="udY35Tri" Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2071.outbound.protection.outlook.com [40.107.220.71]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 897F89F for ; Tue, 12 Dec 2023 02:38:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ej8iQtH+JbmGSyrhbXt22bLoNgL3B5X6Db5TJH/W+jPwXThW5pFPxY8r7n4VzeFBbYI9vkW15Lnj1/c+ycRZGz7Zh1hpsQSH/lbJ5o+gsoAdwIIlKB3Vgacznmi+FHNBC5CGDIG3xyJsF/0iQSwPJZ0GI1kuRCSW40PSZLIpf4NEVvKUqepvqWO0oIzyjrqqBo7O+Xo2wXAtxmA0ALal6o3UKF0FNdgGTLiKl0cFTk2N6REzJYdiOA8++KhpaszBg5HN8bHrV7DeEwtlokpStUMAURzuNWvnQK0i4LuVqF1I3chDRa5AKN0OxqPQg1+5TqLrcOrKubSvTTQ36Q+GIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=V1N9Fq8XjPtuGZLbqTd8oxLVcVQA1kA+IZLu/4tPVQo=; b=PEG8j39ufSO+yHyskG7+XmPaRAVejvPEo5FC0/OCvjM/FjjmVMPcWoRIADwVqBs4TR9NZoezSW4aJDy0a16i6Oh74lmSrTJuyCAz/2UqAkDMDWJYwsjYFilBjInHEb+RSrmXGs3n8ARwRpkzar1cwRp+v0muFaiIHOhAOJ8MOv8Y6iv6BKltObr8urJULnsWvxTkmZZsAjuo4iM5kRJgvpquegot2KLMA4qAXkNBPTQgS3KfLmjduMXGijVBpw9tQjv3qFHN5HOGYf13Rl9sn5S4kpTha/20xJzh7YP9iLy7tspIOTnAvj3iek0xdGY/sWY2qptkDoLxOuoYsOcZ3A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=V1N9Fq8XjPtuGZLbqTd8oxLVcVQA1kA+IZLu/4tPVQo=; b=udY35TriINAp+1v7KfNMJA7x/LRABcGT8LPh3q0jtLwLE3EtyxivZoRjzZ6jl9MsAkhhFb8QdgtstPASKKKENXNYH89PKse+cavZb0I4Qu6S3Z4eokpkyojBQ3TquU3fnSAOteaRRtg7a6D+dyMoO0BBB2T10lkiWU+rWOcGWxs= Received: from CY5PR13CA0009.namprd13.prod.outlook.com (2603:10b6:930::33) by MN0PR12MB5955.namprd12.prod.outlook.com (2603:10b6:208:37e::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7091.26; Tue, 12 Dec 2023 10:38:39 +0000 Received: from CY4PEPF0000EE3A.namprd03.prod.outlook.com (2603:10b6:930:0:cafe::f1) by CY5PR13CA0009.outlook.office365.com (2603:10b6:930::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7091.26 via Frontend Transport; Tue, 12 Dec 2023 10:38:39 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by CY4PEPF0000EE3A.mail.protection.outlook.com (10.167.242.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7091.18 via Frontend Transport; Tue, 12 Dec 2023 10:38:39 +0000 Received: from amd.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.34; Tue, 12 Dec 2023 04:38:34 -0600 From: Suma Hegde To: CC: , , Suma Hegde , Naveen Krishna Chatradhi Subject: [PATCH 2/7] platform/x86: Cache pci_dev in struct hsmp_socket Date: Tue, 12 Dec 2023 10:36:39 +0000 Message-ID: <20231212103644.768460-3-suma.hegde@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20231212103644.768460-1-suma.hegde@amd.com> References: <20231212103644.768460-1-suma.hegde@amd.com> Precedence: bulk X-Mailing-List: platform-driver-x86@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-ClientProxiedBy: SATLEXMB04.amd.com (10.181.40.145) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CY4PEPF0000EE3A:EE_|MN0PR12MB5955:EE_ X-MS-Office365-Filtering-Correlation-Id: f9b0b998-2e16-4276-3d79-08dbfafe80c0 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230031)(4636009)(396003)(136003)(39860400002)(376002)(346002)(230922051799003)(82310400011)(186009)(64100799003)(451199024)(1800799012)(36840700001)(40470700004)(46966006)(40480700001)(40460700003)(70586007)(70206006)(82740400003)(81166007)(356005)(86362001)(36756003)(36860700001)(47076005)(83380400001)(26005)(336012)(426003)(16526019)(1076003)(2616005)(7696005)(2906002)(316002)(54906003)(6916009)(478600001)(5660300002)(4326008)(8936002)(8676002)(44832011)(41300700001)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Dec 2023 10:38:39.0682 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f9b0b998-2e16-4276-3d79-08dbfafe80c0 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CY4PEPF0000EE3A.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN0PR12MB5955 Cache pci_dev obj during probe as part of struct hsmp_socket and use in amd_hsmp_rdwr(). This change will make it easier to support both non-ACPI and ACPI devices. Also add a check for sock_index agsint number of sockets in the hsmp_send_message(). Signed-off-by: Suma Hegde Co-developed-by: Naveen Krishna Chatradhi Signed-off-by: Naveen Krishna Chatradhi Reviewed-by: Hans de Goede --- drivers/platform/x86/amd/hsmp.c | 43 +++++++++++++++++++-------------- 1 file changed, 25 insertions(+), 18 deletions(-) diff --git a/drivers/platform/x86/amd/hsmp.c b/drivers/platform/x86/amd/hsmp.c index 3c17b488f4f8..62a274c84f25 100644 --- a/drivers/platform/x86/amd/hsmp.c +++ b/drivers/platform/x86/amd/hsmp.c @@ -58,6 +58,7 @@ struct hsmp_socket { void __iomem *metric_tbl_addr; struct semaphore hsmp_sem; char name[HSMP_ATTR_GRP_NAME_SIZE]; + struct pci_dev *root; u16 sock_ind; }; @@ -71,17 +72,20 @@ struct hsmp_plat_device { static struct hsmp_plat_device plat_dev; -static int amd_hsmp_rdwr(struct pci_dev *root, u32 address, +static int amd_hsmp_rdwr(struct hsmp_socket *sock, u32 address, u32 *value, bool write) { int ret; - ret = pci_write_config_dword(root, HSMP_INDEX_REG, address); + if (!sock->root) + return -ENODEV; + + ret = pci_write_config_dword(sock->root, HSMP_INDEX_REG, address); if (ret) return ret; - ret = (write ? pci_write_config_dword(root, HSMP_DATA_REG, *value) - : pci_read_config_dword(root, HSMP_DATA_REG, value)); + ret = (write ? pci_write_config_dword(sock->root, HSMP_DATA_REG, *value) + : pci_read_config_dword(sock->root, HSMP_DATA_REG, value)); return ret; } @@ -95,7 +99,7 @@ static int amd_hsmp_rdwr(struct pci_dev *root, u32 address, * Returns 0 for success and populates the requested number of arguments. * Returns a negative error code for failure. */ -static int __hsmp_send_message(struct pci_dev *root, struct hsmp_message *msg) +static int __hsmp_send_message(struct hsmp_socket *sock, struct hsmp_message *msg) { unsigned long timeout, short_sleep; u32 mbox_status; @@ -104,7 +108,7 @@ static int __hsmp_send_message(struct pci_dev *root, struct hsmp_message *msg) /* Clear the status register */ mbox_status = HSMP_STATUS_NOT_READY; - ret = amd_hsmp_rdwr(root, SMN_HSMP_MSG_RESP, &mbox_status, HSMP_WR); + ret = amd_hsmp_rdwr(sock, SMN_HSMP_MSG_RESP, &mbox_status, HSMP_WR); if (ret) { pr_err("Error %d clearing mailbox status register\n", ret); return ret; @@ -113,7 +117,7 @@ static int __hsmp_send_message(struct pci_dev *root, struct hsmp_message *msg) index = 0; /* Write any message arguments */ while (index < msg->num_args) { - ret = amd_hsmp_rdwr(root, SMN_HSMP_MSG_DATA + (index << 2), + ret = amd_hsmp_rdwr(sock, SMN_HSMP_MSG_DATA + (index << 2), &msg->args[index], HSMP_WR); if (ret) { pr_err("Error %d writing message argument %d\n", ret, index); @@ -123,7 +127,7 @@ static int __hsmp_send_message(struct pci_dev *root, struct hsmp_message *msg) } /* Write the message ID which starts the operation */ - ret = amd_hsmp_rdwr(root, SMN_HSMP_MSG_ID, &msg->msg_id, HSMP_WR); + ret = amd_hsmp_rdwr(sock, SMN_HSMP_MSG_ID, &msg->msg_id, HSMP_WR); if (ret) { pr_err("Error %d writing message ID %u\n", ret, msg->msg_id); return ret; @@ -140,7 +144,7 @@ static int __hsmp_send_message(struct pci_dev *root, struct hsmp_message *msg) timeout = jiffies + msecs_to_jiffies(HSMP_MSG_TIMEOUT); while (time_before(jiffies, timeout)) { - ret = amd_hsmp_rdwr(root, SMN_HSMP_MSG_RESP, &mbox_status, HSMP_RD); + ret = amd_hsmp_rdwr(sock, SMN_HSMP_MSG_RESP, &mbox_status, HSMP_RD); if (ret) { pr_err("Error %d reading mailbox status\n", ret); return ret; @@ -175,7 +179,7 @@ static int __hsmp_send_message(struct pci_dev *root, struct hsmp_message *msg) */ index = 0; while (index < msg->response_sz) { - ret = amd_hsmp_rdwr(root, SMN_HSMP_MSG_DATA + (index << 2), + ret = amd_hsmp_rdwr(sock, SMN_HSMP_MSG_DATA + (index << 2), &msg->args[index], HSMP_RD); if (ret) { pr_err("Error %d reading response %u for message ID:%u\n", @@ -208,21 +212,20 @@ static int validate_message(struct hsmp_message *msg) int hsmp_send_message(struct hsmp_message *msg) { - struct hsmp_socket *sock = &plat_dev.sock[msg->sock_ind]; - struct amd_northbridge *nb; + struct hsmp_socket *sock; int ret; if (!msg) return -EINVAL; - - nb = node_to_amd_nb(msg->sock_ind); - if (!nb || !nb->root) - return -ENODEV; - ret = validate_message(msg); if (ret) return ret; + if (!plat_dev.sock || msg->sock_ind >= plat_dev.num_sockets) + return -ENODEV; + sock = &plat_dev.sock[msg->sock_ind]; + if (!sock) + return -ENODEV; /* * The time taken by smu operation to complete is between * 10us to 1ms. Sometime it may take more time. @@ -233,7 +236,7 @@ int hsmp_send_message(struct hsmp_message *msg) if (ret < 0) return ret; - ret = __hsmp_send_message(nb->root, msg); + ret = __hsmp_send_message(sock, msg); up(&sock->hsmp_sem); @@ -500,6 +503,10 @@ static int hsmp_pltdrv_probe(struct platform_device *pdev) sema_init(&plat_dev.sock[i].hsmp_sem, 1); plat_dev.sock[i].sock_ind = i; + if (!node_to_amd_nb(i)) + return -ENODEV; + plat_dev.sock[i].root = node_to_amd_nb(i)->root; + /* Test the hsmp interface on each socket */ ret = hsmp_test(i, 0xDEADBEEF); if (ret) { From patchwork Tue Dec 12 10:36:40 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Suma Hegde X-Patchwork-Id: 13488898 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="h3ao1Xjt" Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2041.outbound.protection.outlook.com [40.107.236.41]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1454AA0 for ; Tue, 12 Dec 2023 02:38:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fKhwYrzo8FAo8y7kgvGn7ajnPIcuGz83rEql0zQt8j5a43oJdaM6YTVkQSO/yj6kAiKHPCotrkbwXIkwDVFAPkQur8/mWgh5m5OZl2/p4vUSD8vQeHBkQ2Fi5jS9NwIED4o2TFzM1EZPrdzomrYcMbKQLL1A3YHxE+pwdomhDcdH0qms57oWdjjMlAl7ntlPUQOqEQwnQeyvsIBkHZ+nstm2dU0Jq5kT6foyA+Mkp1ov53lVQTQVyqOKj0MVgAAel7dBgtXt209+ULchxz+VCVuV3zWtgSaIqON6JgaL687wyUWgxJO9V3MMBkbG54w8Q8KoHJRI9FEEobrEsn1lQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=shd0/zDhJTyZvVbgs09L5nKRb3lzIDUPU8Xbl4Snxq0=; b=G9y8kCr7YvIS/T01MSIxdQMBRge7ZD9PMIDQ7eNria9skC8b77ADyW25O/G37t1g/ws1pBoU11FdDtWDZGGDM2kY0djSqz1Ivw9RN2F0Mbbyfsxbf/rLa/qhmqsORCP77TgKoIVglXxkCD0tnvMUDRXBPFmVWCsq7w7kafWa80XQVVcrBRdV0uZb0ms9wguFwyyBKDpAA2Ot0BZgNL2B0A+wXM1iWOq5FIuKp6ix7p6/nbvhY9AGE8LylWO4gk9CeadvEgpylYPSmZrQZL8Qx5uWLhoHWATDZAhNm7wXD0BaeT/j0ZOJ+v62A2Ca7XyUHc4ynH5D3Px1D6RRADROtA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=shd0/zDhJTyZvVbgs09L5nKRb3lzIDUPU8Xbl4Snxq0=; b=h3ao1Xjtjt0uBI4RYF6J9VtRWzGVzAXF/jFBkCNQEaFfnFMJqu49Y9n6s33i57VJhFTKhzLLBgks5ZZ8PkvbKOQy0o/gym8qOd9+TD871JU5OTEZcNs+Sgxg0jeXUUnJiXchVKK+q/bq4jXbzS5+FgI5gnUDrAlkegIP5O7RLE4= Received: from DM5PR07CA0096.namprd07.prod.outlook.com (2603:10b6:4:ae::25) by DS0PR12MB8501.namprd12.prod.outlook.com (2603:10b6:8:15d::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7091.26; Tue, 12 Dec 2023 10:38:55 +0000 Received: from CY4PEPF0000EE3C.namprd03.prod.outlook.com (2603:10b6:4:ae:cafe::e7) by DM5PR07CA0096.outlook.office365.com (2603:10b6:4:ae::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7068.33 via Frontend Transport; Tue, 12 Dec 2023 10:38:55 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by CY4PEPF0000EE3C.mail.protection.outlook.com (10.167.242.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7091.26 via Frontend Transport; Tue, 12 Dec 2023 10:38:55 +0000 Received: from amd.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.34; Tue, 12 Dec 2023 04:38:36 -0600 From: Suma Hegde To: CC: , , Suma Hegde , Naveen Krishna Chatradhi Subject: [PATCH 3/7] platform/x86: Create static func to handle platdev Date: Tue, 12 Dec 2023 10:36:40 +0000 Message-ID: <20231212103644.768460-4-suma.hegde@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20231212103644.768460-1-suma.hegde@amd.com> References: <20231212103644.768460-1-suma.hegde@amd.com> Precedence: bulk X-Mailing-List: platform-driver-x86@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-ClientProxiedBy: SATLEXMB04.amd.com (10.181.40.145) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CY4PEPF0000EE3C:EE_|DS0PR12MB8501:EE_ X-MS-Office365-Filtering-Correlation-Id: d607ebfd-7839-4b7f-a09e-08dbfafe8a8c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230031)(4636009)(136003)(376002)(39860400002)(346002)(396003)(230922051799003)(186009)(64100799003)(82310400011)(451199024)(1800799012)(40470700004)(36840700001)(46966006)(40480700001)(40460700003)(70586007)(70206006)(6916009)(54906003)(82740400003)(81166007)(356005)(36756003)(86362001)(36860700001)(47076005)(83380400001)(426003)(16526019)(336012)(26005)(2616005)(1076003)(7696005)(2906002)(316002)(6666004)(5660300002)(4326008)(478600001)(44832011)(8936002)(8676002)(41300700001)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Dec 2023 10:38:55.5228 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: d607ebfd-7839-4b7f-a09e-08dbfafe8a8c X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CY4PEPF0000EE3C.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB8501 Create a static function and call platform device alloc and add device, which will simplify handling acpi and plat device probing. Signed-off-by: Suma Hegde Co-developed-by: Naveen Krishna Chatradhi Signed-off-by: Naveen Krishna Chatradhi Reviewed-by: Hans de Goede --- drivers/platform/x86/amd/hsmp.c | 33 ++++++++++++++++++--------------- 1 file changed, 18 insertions(+), 15 deletions(-) diff --git a/drivers/platform/x86/amd/hsmp.c b/drivers/platform/x86/amd/hsmp.c index 62a274c84f25..f0db7a480ace 100644 --- a/drivers/platform/x86/amd/hsmp.c +++ b/drivers/platform/x86/amd/hsmp.c @@ -552,6 +552,21 @@ static struct platform_driver amd_hsmp_driver = { static struct platform_device *amd_hsmp_platdev; +static int hsmp_plat_dev_register(void) +{ + int ret; + + amd_hsmp_platdev = platform_device_alloc(DRIVER_NAME, -1); + if (!amd_hsmp_platdev) + return -ENOMEM; + + ret = platform_device_add(amd_hsmp_platdev); + if (ret) + platform_device_put(amd_hsmp_platdev); + + return ret; +} + static int __init hsmp_plt_init(void) { int ret = -ENODEV; @@ -574,22 +589,10 @@ static int __init hsmp_plt_init(void) if (ret) return ret; - amd_hsmp_platdev = platform_device_alloc(DRIVER_NAME, PLATFORM_DEVID_NONE); - if (!amd_hsmp_platdev) { - ret = -ENOMEM; - goto drv_unregister; - } - - ret = platform_device_add(amd_hsmp_platdev); - if (ret) { - platform_device_put(amd_hsmp_platdev); - goto drv_unregister; - } - - return 0; + ret = hsmp_plat_dev_register(); + if (ret) + platform_driver_unregister(&amd_hsmp_driver); -drv_unregister: - platform_driver_unregister(&amd_hsmp_driver); return ret; } From patchwork Tue Dec 12 10:36:41 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Suma Hegde X-Patchwork-Id: 13488901 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="H3c8wsGk" Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2068.outbound.protection.outlook.com [40.107.93.68]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 788C1AC for ; Tue, 12 Dec 2023 02:39:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Qw4/jGpPfqY+z3wjTPhQvGyJOXGAlCXUcTn8MKMnoopVUzqIoM1xQbfvYV/pzRZx0PKV/e19oSYTO12GYWnQ3OWeOUEUOHIoOkFWVo8+f8OkBXKdmQtg77PkrVdd40QIc15FVvkjRBUb2Kaz5AzenMbqxbLdHyYujMiqvhPUZf5ch024JOlsF0yRigqjK9W20ud/yQg1v+LLOKyVfx96QOqTp1bW++3e+Zc8Odj/0i0U7/03Lf/BfegRo9U3OlUKUFEnigk0SEbg/s57DLGFLcvfrk4muPxBZ2jVXJ3COEAKhvpWNsPbb4QqedeMt7BF/4tSiufdeeyQ6XsZgd4hug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=p0RdTmrBKYP28EXXuoYkGqs2CxWd7khMarlFoNMH9TQ=; b=cONzG1HO5XfGaCVcav1bSVIVm34Br6SCl5bfocW3u8pZ6gvShP7j84XxfKIWDF0xAam9QiY9SIhuhJ9UPaC8U9sxcQYPUF05MYPw4f0dvceOsfi8qytfZPAnjtM7ZEn6CP+7kbD9S4dkuarkVR0eg07e5hb4NARaX57YijwUAHJ0T6v7PuvUSidXVVbFK6JkHgwLlIqxKzkCA5qDseP7Q9IYKb67j9SubtpenYZefanQeA2Wd34buC51zCpHJlOnSS5occJkC6zSy9N+Bi4Ep7O6JbgyXXL92q5AJR1+DBRKrF9dK5v57i1WHFic24nRNseqok5C5t2M0B89e1oFmg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=p0RdTmrBKYP28EXXuoYkGqs2CxWd7khMarlFoNMH9TQ=; b=H3c8wsGkMQKUEXOaN28TTzFweWvBrnAQfw2k6STa4fSlp+PSovFunbOq+v5J88mokQbpiNxxzw74EaSAsQgpQXW4PCUvdwidVB8QsGA0TGgWkcc1Nx/F/g1VbDxhdNY8Fh7vnXHR8O+d3jGHpx87kTjqyoD8n9z0xwuC+rFZG6M= Received: from CYZPR11CA0018.namprd11.prod.outlook.com (2603:10b6:930:8d::27) by SA3PR12MB7901.namprd12.prod.outlook.com (2603:10b6:806:306::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7068.33; Tue, 12 Dec 2023 10:38:57 +0000 Received: from CY4PEPF0000EE3A.namprd03.prod.outlook.com (2603:10b6:930:8d:cafe::71) by CYZPR11CA0018.outlook.office365.com (2603:10b6:930:8d::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7091.26 via Frontend Transport; Tue, 12 Dec 2023 10:38:56 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by CY4PEPF0000EE3A.mail.protection.outlook.com (10.167.242.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7091.18 via Frontend Transport; Tue, 12 Dec 2023 10:38:56 +0000 Received: from amd.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.34; Tue, 12 Dec 2023 04:38:38 -0600 From: Suma Hegde To: CC: , , Suma Hegde , Naveen Krishna Chatradhi Subject: [PATCH 4/7] platform/x86: Define a struct to hold mailbox regs Date: Tue, 12 Dec 2023 10:36:41 +0000 Message-ID: <20231212103644.768460-5-suma.hegde@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20231212103644.768460-1-suma.hegde@amd.com> References: <20231212103644.768460-1-suma.hegde@amd.com> Precedence: bulk X-Mailing-List: platform-driver-x86@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-ClientProxiedBy: SATLEXMB04.amd.com (10.181.40.145) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CY4PEPF0000EE3A:EE_|SA3PR12MB7901:EE_ X-MS-Office365-Filtering-Correlation-Id: 9a5c7060-1270-4c5b-fbca-08dbfafe8b43 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: nFM/nmkqof1WdxmTgibaB1un4eHf1apsaMtIb9nXDtExK4Qb25z9eEE6G9ctUA7gwmrIsbnKlSuu33kxM1sEQ1so019uRS8q34QwA/0AfLCEiCN8+qlARDeh8a3ADKHQNa+h+U2nHL79vm36BJYG+e4QPxJyjJmfSqZTx+E6Vya7PrLXRPnd95T+zI08HBSCYdX5N4XjqA60oOSOc4e98bE8EcN8uR2QQRgXhqY0lSP5wi7u6RWLLYW+587/WwhCcEPvQbrHXzSUklWNOqcld6R6XSYSAg7tzeupGsawM5JkQGtoWwaLDDHkJm0VKkSKqOK2I31N16EPfy+8y70PouiPvVs8CzNdibJo5h7mXrO8WY7JtoZ0CtfYzzwCvYra/aC/a8wZLndoX7DFQkovACTZ2+3s3Fo5yevGCxULgMPu23MicIvCkMlMiY5y6uG1SoaGkYWv5KFUiycuomyI535IDQnJiItssxRJpP7UxCi4l5tIf/1gb6/Jyafd5OkJJetFQUg1V1fktx5pDri65ZyEb8ZwJLhgbSj8IwQeRC2vJHoBP0cmhTETZdCG5+N97YTYBCpQv6S2UABlY5Pl4fBrtY6VLThwcOVr/E/d/8MWf9Ts7ssGEOH/9yQQLZd2M4P/brCSbcIupsZFFqr+GzzXWLv1uM3q/s+8muAUduaZENRCNaxWySeCJho3+7SnQQNeMzDsDdYGHIkSJbS1nwUvuyNG+V0iIXn29JVfSR0v7A0F3HVOFBDRBL0NdJvGYWY96J8JbQr+NwfOi2jdMA== X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230031)(4636009)(346002)(396003)(136003)(39860400002)(376002)(230922051799003)(64100799003)(1800799012)(82310400011)(451199024)(186009)(40470700004)(46966006)(36840700001)(6666004)(7696005)(2906002)(54906003)(70206006)(70586007)(81166007)(356005)(86362001)(36756003)(6916009)(15650500001)(8676002)(8936002)(4326008)(316002)(44832011)(5660300002)(40460700003)(478600001)(40480700001)(41300700001)(36860700001)(26005)(82740400003)(16526019)(1076003)(2616005)(336012)(83380400001)(426003)(47076005)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Dec 2023 10:38:56.7245 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 9a5c7060-1270-4c5b-fbca-08dbfafe8b43 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CY4PEPF0000EE3A.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA3PR12MB7901 Define struct hsmp_mbaddr_info with register offsets and populate them during probe, which avoids the usage of macros in core functions. During ACPI probe, the same fields can be populated from ACPI table. Also move plat dev init to a static function. Signed-off-by: Suma Hegde Co-developed-by: Naveen Krishna Chatradhi Signed-off-by: Naveen Krishna Chatradhi --- drivers/platform/x86/amd/hsmp.c | 80 ++++++++++++++++++++++----------- 1 file changed, 54 insertions(+), 26 deletions(-) diff --git a/drivers/platform/x86/amd/hsmp.c b/drivers/platform/x86/amd/hsmp.c index f0db7a480ace..44b15c1fab6a 100644 --- a/drivers/platform/x86/amd/hsmp.c +++ b/drivers/platform/x86/amd/hsmp.c @@ -40,9 +40,10 @@ * register into the SMN_INDEX register, and reads/writes the SMN_DATA reg. * Below are required SMN address for HSMP Mailbox register offsets in SMU address space */ -#define SMN_HSMP_MSG_ID 0x3B10534 -#define SMN_HSMP_MSG_RESP 0x3B10980 -#define SMN_HSMP_MSG_DATA 0x3B109E0 +#define SMN_HSMP_BASE 0x3B00000 +#define SMN_HSMP_MSG_ID 0x0010534 +#define SMN_HSMP_MSG_RESP 0x0010980 +#define SMN_HSMP_MSG_DATA 0x00109E0 #define HSMP_INDEX_REG 0xc4 #define HSMP_DATA_REG 0xc8 @@ -53,8 +54,17 @@ #define HSMP_ATTR_GRP_NAME_SIZE 10 +struct hsmp_mbaddr_info { + u32 base_addr; + u32 msg_id_off; + u32 msg_resp_off; + u32 msg_arg_off; + u32 size; +}; + struct hsmp_socket { struct bin_attribute hsmp_attr; + struct hsmp_mbaddr_info mbinfo; void __iomem *metric_tbl_addr; struct semaphore hsmp_sem; char name[HSMP_ATTR_GRP_NAME_SIZE]; @@ -72,7 +82,7 @@ struct hsmp_plat_device { static struct hsmp_plat_device plat_dev; -static int amd_hsmp_rdwr(struct hsmp_socket *sock, u32 address, +static int amd_hsmp_rdwr(struct hsmp_socket *sock, u32 offset, u32 *value, bool write) { int ret; @@ -80,7 +90,8 @@ static int amd_hsmp_rdwr(struct hsmp_socket *sock, u32 address, if (!sock->root) return -ENODEV; - ret = pci_write_config_dword(sock->root, HSMP_INDEX_REG, address); + ret = pci_write_config_dword(sock->root, HSMP_INDEX_REG, + sock->mbinfo.base_addr + offset); if (ret) return ret; @@ -101,14 +112,17 @@ static int amd_hsmp_rdwr(struct hsmp_socket *sock, u32 address, */ static int __hsmp_send_message(struct hsmp_socket *sock, struct hsmp_message *msg) { + struct hsmp_mbaddr_info *mbinfo; unsigned long timeout, short_sleep; u32 mbox_status; u32 index; int ret; + mbinfo = &sock->mbinfo; + /* Clear the status register */ mbox_status = HSMP_STATUS_NOT_READY; - ret = amd_hsmp_rdwr(sock, SMN_HSMP_MSG_RESP, &mbox_status, HSMP_WR); + ret = amd_hsmp_rdwr(sock, mbinfo->msg_resp_off, &mbox_status, HSMP_WR); if (ret) { pr_err("Error %d clearing mailbox status register\n", ret); return ret; @@ -117,7 +131,7 @@ static int __hsmp_send_message(struct hsmp_socket *sock, struct hsmp_message *ms index = 0; /* Write any message arguments */ while (index < msg->num_args) { - ret = amd_hsmp_rdwr(sock, SMN_HSMP_MSG_DATA + (index << 2), + ret = amd_hsmp_rdwr(sock, mbinfo->msg_arg_off + (index << 2), &msg->args[index], HSMP_WR); if (ret) { pr_err("Error %d writing message argument %d\n", ret, index); @@ -127,7 +141,7 @@ static int __hsmp_send_message(struct hsmp_socket *sock, struct hsmp_message *ms } /* Write the message ID which starts the operation */ - ret = amd_hsmp_rdwr(sock, SMN_HSMP_MSG_ID, &msg->msg_id, HSMP_WR); + ret = amd_hsmp_rdwr(sock, mbinfo->msg_id_off, &msg->msg_id, HSMP_WR); if (ret) { pr_err("Error %d writing message ID %u\n", ret, msg->msg_id); return ret; @@ -144,7 +158,7 @@ static int __hsmp_send_message(struct hsmp_socket *sock, struct hsmp_message *ms timeout = jiffies + msecs_to_jiffies(HSMP_MSG_TIMEOUT); while (time_before(jiffies, timeout)) { - ret = amd_hsmp_rdwr(sock, SMN_HSMP_MSG_RESP, &mbox_status, HSMP_RD); + ret = amd_hsmp_rdwr(sock, mbinfo->msg_resp_off, &mbox_status, HSMP_RD); if (ret) { pr_err("Error %d reading mailbox status\n", ret); return ret; @@ -179,7 +193,7 @@ static int __hsmp_send_message(struct hsmp_socket *sock, struct hsmp_message *ms */ index = 0; while (index < msg->response_sz) { - ret = amd_hsmp_rdwr(sock, SMN_HSMP_MSG_DATA + (index << 2), + ret = amd_hsmp_rdwr(sock, mbinfo->msg_arg_off + (index << 2), &msg->args[index], HSMP_RD); if (ret) { pr_err("Error %d reading response %u for message ID:%u\n", @@ -488,9 +502,28 @@ static int hsmp_cache_proto_ver(void) return ret; } +static int initialize_platdev(void) +{ + int i; + + for (i = 0; i < plat_dev.num_sockets; i++) { + if (!node_to_amd_nb(i)) + return -ENODEV; + plat_dev.sock[i].root = node_to_amd_nb(i)->root; + plat_dev.sock[i].sock_ind = i; + plat_dev.sock[i].mbinfo.base_addr = SMN_HSMP_BASE; + plat_dev.sock[i].mbinfo.msg_id_off = SMN_HSMP_MSG_ID; + plat_dev.sock[i].mbinfo.msg_resp_off = SMN_HSMP_MSG_RESP; + plat_dev.sock[i].mbinfo.msg_arg_off = SMN_HSMP_MSG_DATA; + sema_init(&plat_dev.sock[i].hsmp_sem, 1); + } + + return 0; +} + static int hsmp_pltdrv_probe(struct platform_device *pdev) { - int ret, i; + int ret; plat_dev.sock = devm_kzalloc(&pdev->dev, (plat_dev.num_sockets * sizeof(struct hsmp_socket)), @@ -499,22 +532,17 @@ static int hsmp_pltdrv_probe(struct platform_device *pdev) return -ENOMEM; plat_dev.dev = &pdev->dev; - for (i = 0; i < plat_dev.num_sockets; i++) { - sema_init(&plat_dev.sock[i].hsmp_sem, 1); - plat_dev.sock[i].sock_ind = i; - - if (!node_to_amd_nb(i)) - return -ENODEV; - plat_dev.sock[i].root = node_to_amd_nb(i)->root; + ret = initialize_platdev(); + if (ret) + return ret; - /* Test the hsmp interface on each socket */ - ret = hsmp_test(i, 0xDEADBEEF); - if (ret) { - pr_err("HSMP test message failed on Fam:%x model:%x\n", - boot_cpu_data.x86, boot_cpu_data.x86_model); - pr_err("Is HSMP disabled in BIOS ?\n"); - return ret; - } + /* Test the hsmp interface */ + ret = hsmp_test(0, 0xDEADBEEF); + if (ret) { + pr_err("HSMP test message failed on Fam:%x model:%x\n", + boot_cpu_data.x86, boot_cpu_data.x86_model); + pr_err("Is HSMP disabled in BIOS ?\n"); + return ret; } plat_dev.hsmp_device.name = HSMP_CDEV_NAME; From patchwork Tue Dec 12 10:36:42 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Suma Hegde X-Patchwork-Id: 13488899 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="Pb1nPf4h" Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12on2070.outbound.protection.outlook.com [40.107.243.70]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5A987A7 for ; Tue, 12 Dec 2023 02:38:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UqObomHi8juW/dWoiceowgyjxrJTLFGsBeNQfLOGoSsmz0YTN2n15JnxX7aCWveQblrRY94x175TqZJsnnBUBgSqVTWCRomWFdwD/h2O7yfocUZ0vpMycfphay+nA7f9Rf1UrR+ssQE4cQgpQS+ZtZ1VAZEJW+1N5s42Y5CUOO30n4sMpJBcU/VusXuuLIOE3SKzSkVuVlF8s9dY0k2ZlMTeykrjPZq6qgfNI+32BHnzPZl4G/+8K6juGX0RDhR+hUAi4OKyAZhS53Jiar5Fx+bODC/rIUpEod5ZX7sNakO4gMoV8LmshjMiNdO0ErWjmMdvP+PwYftc1lVVotxrQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hBshEIKabNvKeNpsup35CUV8g2X8p4hN2OMHJmgK6ns=; b=HcIrjq2lkFx0z4LpwMmIa1iFW+KBmbEgvHhrRzR7PKgphgrcG35stDS53kaU339kFn55jkTquzoVSyCLoiotBfmlj+1S35tp/VIFAzy7vqpylFSy3Ur85I8l6i1/FiQWClHEbA4KM/xJQKtjqRm2ltDQbSqImnUxBZM9HN+okVD+JdOPHaXxkeHrwdROGdjsPH3hXzsMfbRNA1F0he7buMI5n+Ashd8mVXr8/UkCzoPnhm1i+jrgQ3MmNeNGNfgyURWqZr3UwtB5pDKmel5MooU0w3BTMuyttCM8kRqGWKJ0flusfQVkvmKOfOlx+QhHChxoaeWvkVZt1vG9YF2wQA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hBshEIKabNvKeNpsup35CUV8g2X8p4hN2OMHJmgK6ns=; b=Pb1nPf4hxBUC54U/nWtC4c9gLoV26UReK1gdMpMgf3QtSKzgM0qHQVV5j5K4oFqAFSx9ung0gpuMQPxmMSf7cCH9BcT7xe6bRJWb8t3c7UfWjFlkbL6QDrx+8uMQRsfhKV7GxeJVkwdTomFJdEqV0z4Wz/NzkEvuh7avWA7raDE= Received: from DM5PR07CA0113.namprd07.prod.outlook.com (2603:10b6:4:ae::42) by DM6PR12MB4896.namprd12.prod.outlook.com (2603:10b6:5:1b6::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7091.26; Tue, 12 Dec 2023 10:38:57 +0000 Received: from CY4PEPF0000EE3C.namprd03.prod.outlook.com (2603:10b6:4:ae:cafe::14) by DM5PR07CA0113.outlook.office365.com (2603:10b6:4:ae::42) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7068.33 via Frontend Transport; Tue, 12 Dec 2023 10:38:57 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by CY4PEPF0000EE3C.mail.protection.outlook.com (10.167.242.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7091.26 via Frontend Transport; Tue, 12 Dec 2023 10:38:56 +0000 Received: from amd.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.34; Tue, 12 Dec 2023 04:38:40 -0600 From: Suma Hegde To: CC: , , Suma Hegde , Naveen Krishna Chatradhi Subject: [PATCH 5/7] platform/x86: Move dev from platdev to hsmp_socket Date: Tue, 12 Dec 2023 10:36:42 +0000 Message-ID: <20231212103644.768460-6-suma.hegde@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20231212103644.768460-1-suma.hegde@amd.com> References: <20231212103644.768460-1-suma.hegde@amd.com> Precedence: bulk X-Mailing-List: platform-driver-x86@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-ClientProxiedBy: SATLEXMB04.amd.com (10.181.40.145) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CY4PEPF0000EE3C:EE_|DM6PR12MB4896:EE_ X-MS-Office365-Filtering-Correlation-Id: ddde69f7-8c79-4691-f871-08dbfafe8b67 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230031)(4636009)(396003)(136003)(39860400002)(376002)(346002)(230922051799003)(82310400011)(186009)(64100799003)(451199024)(1800799012)(36840700001)(40470700004)(46966006)(40480700001)(40460700003)(70586007)(70206006)(82740400003)(81166007)(356005)(86362001)(36756003)(36860700001)(47076005)(83380400001)(26005)(336012)(426003)(16526019)(1076003)(2616005)(7696005)(2906002)(316002)(54906003)(6916009)(478600001)(5660300002)(4326008)(8936002)(8676002)(44832011)(41300700001)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Dec 2023 10:38:56.9447 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: ddde69f7-8c79-4691-f871-08dbfafe8b67 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CY4PEPF0000EE3C.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR12MB4896 On an ACPI enabled platforms the probe is called for each socket and the struct dev is different for each socket. This change will help in handling both ACPI and non-ACPI platforms. Also change pr_err to dev_err API. Signed-off-by: Suma Hegde Co-developed-by: Naveen Krishna Chatradhi Signed-off-by: Naveen Krishna Chatradhi Reviewed-by: Hans de Goede --- drivers/platform/x86/amd/hsmp.c | 42 +++++++++++++++++---------------- 1 file changed, 22 insertions(+), 20 deletions(-) diff --git a/drivers/platform/x86/amd/hsmp.c b/drivers/platform/x86/amd/hsmp.c index 44b15c1fab6a..87af1ad5c645 100644 --- a/drivers/platform/x86/amd/hsmp.c +++ b/drivers/platform/x86/amd/hsmp.c @@ -69,13 +69,13 @@ struct hsmp_socket { struct semaphore hsmp_sem; char name[HSMP_ATTR_GRP_NAME_SIZE]; struct pci_dev *root; + struct device *dev; u16 sock_ind; }; struct hsmp_plat_device { struct miscdevice hsmp_device; struct hsmp_socket *sock; - struct device *dev; u32 proto_ver; u16 num_sockets; }; @@ -279,8 +279,9 @@ static int hsmp_test(u16 sock_ind, u32 value) /* Check the response value */ if (msg.args[0] != (value + 1)) { - pr_err("Socket %d test message failed, Expected 0x%08X, received 0x%08X\n", - sock_ind, (value + 1), msg.args[0]); + dev_err(plat_dev.sock[sock_ind].dev, + "Socket %d test message failed, Expected 0x%08X, received 0x%08X\n", + sock_ind, (value + 1), msg.args[0]); return -EBADE; } @@ -359,12 +360,12 @@ static ssize_t hsmp_metric_tbl_read(struct file *filp, struct kobject *kobj, /* Do not support lseek(), reads entire metric table */ if (count < bin_attr->size) { - dev_err(plat_dev.dev, "Wrong buffer size\n"); + dev_err(sock->dev, "Wrong buffer size\n"); return -EINVAL; } if (!sock) { - dev_err(plat_dev.dev, "Failed to read attribute private data\n"); + dev_err(sock->dev, "Failed to read attribute private data\n"); return -EINVAL; } @@ -400,13 +401,13 @@ static int hsmp_get_tbl_dram_base(u16 sock_ind) */ dram_addr = msg.args[0] | ((u64)(msg.args[1]) << 32); if (!dram_addr) { - dev_err(plat_dev.dev, "Invalid DRAM address for metric table\n"); + dev_err(sock->dev, "Invalid DRAM address for metric table\n"); return -ENOMEM; } - sock->metric_tbl_addr = devm_ioremap(plat_dev.dev, dram_addr, + sock->metric_tbl_addr = devm_ioremap(sock->dev, dram_addr, sizeof(struct hsmp_metric_table)); if (!sock->metric_tbl_addr) { - dev_err(plat_dev.dev, "Failed to ioremap metric table addr\n"); + dev_err(sock->dev, "Failed to ioremap metric table addr\n"); return -ENOMEM; } return 0; @@ -454,14 +455,15 @@ static int hsmp_create_sysfs_interface(void) if (WARN_ON(plat_dev.num_sockets > U8_MAX)) return -ERANGE; - hsmp_attr_grps = devm_kzalloc(plat_dev.dev, sizeof(struct attribute_group *) * + hsmp_attr_grps = devm_kzalloc(plat_dev.sock[0].dev, sizeof(struct attribute_group *) * (plat_dev.num_sockets + 1), GFP_KERNEL); if (!hsmp_attr_grps) return -ENOMEM; /* Create a sysfs directory for each socket */ for (i = 0; i < plat_dev.num_sockets; i++) { - attr_grp = devm_kzalloc(plat_dev.dev, sizeof(struct attribute_group), GFP_KERNEL); + attr_grp = devm_kzalloc(plat_dev.sock[i].dev, sizeof(struct attribute_group), + GFP_KERNEL); if (!attr_grp) return -ENOMEM; @@ -469,7 +471,7 @@ static int hsmp_create_sysfs_interface(void) attr_grp->name = plat_dev.sock[i].name; /* Null terminated list of attributes */ - hsmp_bin_attrs = devm_kzalloc(plat_dev.dev, sizeof(struct bin_attribute *) * + hsmp_bin_attrs = devm_kzalloc(plat_dev.sock[i].dev, sizeof(struct bin_attribute *) * (NUM_HSMP_ATTRS + 1), GFP_KERNEL); if (!hsmp_bin_attrs) return -ENOMEM; @@ -483,7 +485,7 @@ static int hsmp_create_sysfs_interface(void) if (ret) return ret; } - return devm_device_add_groups(plat_dev.dev, hsmp_attr_grps); + return devm_device_add_groups(plat_dev.sock[0].dev, hsmp_attr_grps); } static int hsmp_cache_proto_ver(void) @@ -502,7 +504,7 @@ static int hsmp_cache_proto_ver(void) return ret; } -static int initialize_platdev(void) +static int initialize_platdev(struct device *dev) { int i; @@ -511,6 +513,7 @@ static int initialize_platdev(void) return -ENODEV; plat_dev.sock[i].root = node_to_amd_nb(i)->root; plat_dev.sock[i].sock_ind = i; + plat_dev.sock[i].dev = dev; plat_dev.sock[i].mbinfo.base_addr = SMN_HSMP_BASE; plat_dev.sock[i].mbinfo.msg_id_off = SMN_HSMP_MSG_ID; plat_dev.sock[i].mbinfo.msg_resp_off = SMN_HSMP_MSG_RESP; @@ -530,18 +533,17 @@ static int hsmp_pltdrv_probe(struct platform_device *pdev) GFP_KERNEL); if (!plat_dev.sock) return -ENOMEM; - plat_dev.dev = &pdev->dev; - ret = initialize_platdev(); + ret = initialize_platdev(&pdev->dev); if (ret) return ret; /* Test the hsmp interface */ ret = hsmp_test(0, 0xDEADBEEF); if (ret) { - pr_err("HSMP test message failed on Fam:%x model:%x\n", - boot_cpu_data.x86, boot_cpu_data.x86_model); - pr_err("Is HSMP disabled in BIOS ?\n"); + dev_err(&pdev->dev, "HSMP test message failed on Fam:%x model:%x\n", + boot_cpu_data.x86, boot_cpu_data.x86_model); + dev_err(&pdev->dev, "Is HSMP disabled in BIOS ?\n"); return ret; } @@ -554,13 +556,13 @@ static int hsmp_pltdrv_probe(struct platform_device *pdev) ret = hsmp_cache_proto_ver(); if (ret) { - dev_err(plat_dev.dev, "Failed to read HSMP protocol version\n"); + dev_err(&pdev->dev, "Failed to read HSMP protocol version\n"); return ret; } ret = hsmp_create_sysfs_interface(); if (ret) - dev_err(plat_dev.dev, "Failed to create HSMP sysfs interface\n"); + dev_err(&pdev->dev, "Failed to create HSMP sysfs interface\n"); return misc_register(&plat_dev.hsmp_device); } From patchwork Tue Dec 12 10:36:43 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Suma Hegde X-Patchwork-Id: 13488900 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="HRvU/ulz" Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2040.outbound.protection.outlook.com [40.107.236.40]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DCB1CAB for ; Tue, 12 Dec 2023 02:38:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=f09RDWapHBsyPJpEwAFJhMNJPYk7oflOlRf4K9nZYnOA775oERhx8yGmVjFiuTXF8jqyK2D2wtwlze+WZwgx86c/A4Quh97Vn0NufLbz8NRliL3Ns76/2UL8I7m0MKMuNyxjk7DMtAZMT2re/DZ6XEET3PMgZ9YR0hPkYtTMj6pMKUCZEySrXVmh4mL/BXmRGci9CxOpRPSwv68Aa3T/GHBu8Ci83KqDno+Npnfe4ZbDtZo8VFtZJm72KPRud7fdvnc6rHrPh5i62E+urDPOONKbJox8t8eOegYg4LrKaKcUQSDkIp9reWgR4Q7KuMEthHEuQbo7szoqX96rLjrjZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UwePveouisU+RiAcyJwFVZR+vR4X1ymy2oNpg7skZtY=; b=FUK4q4Mbj6unYg1ir1XQhfuJfIqIT0Fco4msgkCKhfky43Z+zZaA17JJqGSZ7qNalRQxDIfbJQyoNyzoQwFgeLVDwJRwLpBeSnkoS7mfg4/GuTKBUha5ivS6n4Miz3ocB3mMwg8Tdv/EQBq09DV8MP2/x4FYwVjDLXGxJK3YYrnr14XEsx9WrZ7o7MrrAnw8Tk0Sg9WyCcnlwUOTNnQdMami4dvcM4RqASebaejIceWNK9ASwnyhElYbVc/yx1biyi4FSqV/3sXrEU/Jgf59z1ylxSwQnjqHnkogY7dy4F9PSW1GpXkeIERmFOG+hm/3AK5TnABRHfkTANkRBj4q7g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UwePveouisU+RiAcyJwFVZR+vR4X1ymy2oNpg7skZtY=; b=HRvU/ulzwFJcLO9Hu17TJPeE92PjXXy13cVYTrNwBa4XD27JgZJajyHeOq6NJcKPJ/jeYvl/FPbaQcfJHX0v63VcQrsye4xTk/2ti1ZDsS3xiQSb5k/58G35j1VEO1sLlF1VI2Lw3UBmVOClwSLCC1YseYKmVTM6Iytx7y2VRkk= Received: from DS7PR07CA0004.namprd07.prod.outlook.com (2603:10b6:5:3af::13) by SA0PR12MB4431.namprd12.prod.outlook.com (2603:10b6:806:95::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7068.33; Tue, 12 Dec 2023 10:38:57 +0000 Received: from CY4PEPF0000EE3F.namprd03.prod.outlook.com (2603:10b6:5:3af:cafe::a6) by DS7PR07CA0004.outlook.office365.com (2603:10b6:5:3af::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7068.33 via Frontend Transport; Tue, 12 Dec 2023 10:38:57 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by CY4PEPF0000EE3F.mail.protection.outlook.com (10.167.242.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7091.18 via Frontend Transport; Tue, 12 Dec 2023 10:38:57 +0000 Received: from amd.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.34; Tue, 12 Dec 2023 04:38:54 -0600 From: Suma Hegde To: CC: , , Suma Hegde , Naveen Krishna Chatradhi Subject: [PATCH 6/7] platform/x86: Convert to ACPI based probing Date: Tue, 12 Dec 2023 10:36:43 +0000 Message-ID: <20231212103644.768460-7-suma.hegde@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20231212103644.768460-1-suma.hegde@amd.com> References: <20231212103644.768460-1-suma.hegde@amd.com> Precedence: bulk X-Mailing-List: platform-driver-x86@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-ClientProxiedBy: SATLEXMB04.amd.com (10.181.40.145) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CY4PEPF0000EE3F:EE_|SA0PR12MB4431:EE_ X-MS-Office365-Filtering-Correlation-Id: df8d2c3a-f5b8-4c34-714e-08dbfafe8b81 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230031)(4636009)(376002)(346002)(396003)(39860400002)(136003)(230922051799003)(451199024)(1800799012)(186009)(82310400011)(64100799003)(40470700004)(36840700001)(46966006)(83380400001)(2906002)(82740400003)(41300700001)(356005)(478600001)(81166007)(86362001)(426003)(54906003)(6916009)(70206006)(70586007)(40480700001)(30864003)(316002)(6666004)(7696005)(8676002)(8936002)(4326008)(40460700003)(44832011)(36756003)(47076005)(1076003)(36860700001)(5660300002)(16526019)(26005)(2616005)(336012)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Dec 2023 10:38:57.1116 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: df8d2c3a-f5b8-4c34-714e-08dbfafe8b81 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CY4PEPF0000EE3F.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR12MB4431 ACPI table provides mailbox base address and register offset information. The base address is provided as part of CRS method and mailbox offsets are provided through DSD table. Sockets are differentiated by UIDs. Signed-off-by: Suma Hegde Co-developed-by: Naveen Krishna Chatradhi Signed-off-by: Naveen Krishna Chatradhi --- drivers/platform/x86/amd/hsmp.c | 304 +++++++++++++++++++++++++++++--- 1 file changed, 276 insertions(+), 28 deletions(-) diff --git a/drivers/platform/x86/amd/hsmp.c b/drivers/platform/x86/amd/hsmp.c index 87af1ad5c645..82bd4189cbd3 100644 --- a/drivers/platform/x86/amd/hsmp.c +++ b/drivers/platform/x86/amd/hsmp.c @@ -18,9 +18,11 @@ #include #include #include +#include #define DRIVER_NAME "amd_hsmp" -#define DRIVER_VERSION "2.0" +#define DRIVER_VERSION "2.2" +#define ACPI_HSMP_DEVICE_HID "AMDI0097" /* HSMP Status / Error codes */ #define HSMP_STATUS_NOT_READY 0x00 @@ -54,6 +56,11 @@ #define HSMP_ATTR_GRP_NAME_SIZE 10 +/* These are the strings specified in ACPI table */ +#define MSG_IDOFF_STR "MsgIdOffset" +#define MSG_ARGOFF_STR "MsgArgOffset" +#define MSG_RESPOFF_STR "MsgRspOffset" + struct hsmp_mbaddr_info { u32 base_addr; u32 msg_id_off; @@ -66,6 +73,7 @@ struct hsmp_socket { struct bin_attribute hsmp_attr; struct hsmp_mbaddr_info mbinfo; void __iomem *metric_tbl_addr; + void __iomem *virt_base_addr; struct semaphore hsmp_sem; char name[HSMP_ATTR_GRP_NAME_SIZE]; struct pci_dev *root; @@ -78,12 +86,14 @@ struct hsmp_plat_device { struct hsmp_socket *sock; u32 proto_ver; u16 num_sockets; + bool is_acpi_device; + bool is_probed; }; static struct hsmp_plat_device plat_dev; -static int amd_hsmp_rdwr(struct hsmp_socket *sock, u32 offset, - u32 *value, bool write) +static int amd_hsmp_pci_rdwr(struct hsmp_socket *sock, u32 offset, + u32 *value, bool write) { int ret; @@ -101,8 +111,23 @@ static int amd_hsmp_rdwr(struct hsmp_socket *sock, u32 offset, return ret; } +static int amd_hsmp_rdwr(struct hsmp_socket *sock, u32 offset, + u32 *value, bool write) +{ + if (!plat_dev.is_acpi_device) + return amd_hsmp_pci_rdwr(sock, offset, value, write); + + if (write) + iowrite32(*value, sock->virt_base_addr + offset); + else + *value = ioread32(sock->virt_base_addr + offset); + + return 0; +} + /* - * Send a message to the HSMP port via PCI-e config space registers. + * Send a message to the HSMP port via PCI-e config space registers + * or by writing to MMIO space. * * The caller is expected to zero out any unused arguments. * If a response is expected, the number of response words should be greater than 0. @@ -451,6 +476,9 @@ static int hsmp_create_sysfs_interface(void) int ret; u16 i; + if (plat_dev.is_acpi_device) + return 0; + /* String formatting is currently limited to u8 sockets */ if (WARN_ON(plat_dev.num_sockets > U8_MAX)) return -ERANGE; @@ -488,13 +516,181 @@ static int hsmp_create_sysfs_interface(void) return devm_device_add_groups(plat_dev.sock[0].dev, hsmp_attr_grps); } -static int hsmp_cache_proto_ver(void) +/* This is the UUID used for HSMP */ +static const guid_t acpi_hsmp_uuid = GUID_INIT(0xb74d619d, 0x5707, 0x48bd, + 0xa6, 0x9f, 0x4e, 0xa2, + 0x87, 0x1f, 0xc2, 0xf6); + +static inline bool is_acpi_hsmp_uuid(union acpi_object *obj) +{ + if (obj->type == ACPI_TYPE_BUFFER && obj->buffer.length == 16) + return guid_equal((guid_t *)obj->buffer.pointer, &acpi_hsmp_uuid); + + return false; +} + +static inline int hsmp_get_uid(struct device *dev, u16 *sock_ind) +{ + char *uid; + + /* + * UID (ID00, ID01..IDXX) is used for differentiating sockets, + * read it and strip the "ID" part of it and convert the remaining + * bytes to integer. + */ + uid = acpi_device_uid(ACPI_COMPANION(dev)); + + return kstrtou16((uid + 2), 10, sock_ind); +} + +static acpi_status hsmp_resource(struct acpi_resource *res, void *data) +{ + struct hsmp_socket *sock = data; + struct resource r; + + switch (res->type) { + case ACPI_RESOURCE_TYPE_FIXED_MEMORY32: + if (!acpi_dev_resource_memory(res, &r)) + return AE_ERROR; + sock->mbinfo.base_addr = r.start; + sock->mbinfo.size = r.end - r.start + 1; + if (!r.start || !r.end || !(r.flags & IORESOURCE_MEM_WRITEABLE)) + return AE_ERROR; + break; + case ACPI_RESOURCE_TYPE_END_TAG: + break; + default: + return AE_ERROR; + } + + return AE_OK; +} + +static int hsmp_read_acpi_dsd(struct hsmp_socket *sock) +{ + struct acpi_buffer buf = { ACPI_ALLOCATE_BUFFER, NULL }; + union acpi_object *guid, *mailbox_package; + union acpi_object *dsd; + acpi_status status; + int ret = 0; + int j; + + status = acpi_evaluate_object_typed(ACPI_HANDLE(sock->dev), "_DSD", NULL, + &buf, ACPI_TYPE_PACKAGE); + if (ACPI_FAILURE(status)) { + dev_err(sock->dev, "Failed to read mailbox reg offsets from DSD table, err: %s\n", + acpi_format_exception(status)); + return -EINVAL; + } + + dsd = buf.pointer; + + /* HSMP _DSD property should contain 2 objects. + * 1. guid which is an acpi object of type ACPI_TYPE_BUFFER + * 2. mailbox which is an acpi object of type ACPI_TYPE_PACKAGE + * This mailbox object contains 3 more acpi objects of type + * ACPI_TYPE_PACKAGE for holding msgid, msgresp, msgarg offsets + * these packages inturn contain 2 acpi objects of type + * ACPI_TYPE_STRING and ACPI_TYPE_INTEGER + */ + if (dsd->type != ACPI_TYPE_PACKAGE || dsd->package.count != 2) { + ret = -EINVAL; + goto free_buf; + } + + guid = &dsd->package.elements[0]; + mailbox_package = &dsd->package.elements[1]; + if (!is_acpi_hsmp_uuid(guid) || mailbox_package->type != ACPI_TYPE_PACKAGE) { + dev_err(sock->dev, "Invalid hsmp _DSD table data\n"); + ret = -EINVAL; + goto free_buf; + } + + for (j = 0; j < mailbox_package->package.count; j++) { + union acpi_object *msgobj, *msgstr, *msgint; + + msgobj = &mailbox_package->package.elements[j]; + msgstr = &msgobj->package.elements[0]; + msgint = &msgobj->package.elements[1]; + + /* package should have 1 string and 1 integer object */ + if (msgobj->type != ACPI_TYPE_PACKAGE || + msgstr->type != ACPI_TYPE_STRING || + msgint->type != ACPI_TYPE_INTEGER) { + ret = -EINVAL; + goto free_buf; + } + + if (!strncmp(msgstr->string.pointer, MSG_IDOFF_STR, + msgstr->string.length)) { + sock->mbinfo.msg_id_off = msgint->integer.value; + } else if (!strncmp(msgstr->string.pointer, MSG_RESPOFF_STR, + msgstr->string.length)) { + sock->mbinfo.msg_resp_off = msgint->integer.value; + } else if (!strncmp(msgstr->string.pointer, MSG_ARGOFF_STR, + msgstr->string.length)) { + sock->mbinfo.msg_arg_off = msgint->integer.value; + } else { + ret = -EINVAL; + goto free_buf; + } + } + +free_buf: + ACPI_FREE(buf.pointer); + return ret; +} + +static int hsmp_read_acpi_crs(struct hsmp_socket *sock) +{ + acpi_status status; + + status = acpi_walk_resources(ACPI_HANDLE(sock->dev), METHOD_NAME__CRS, + hsmp_resource, sock); + if (ACPI_FAILURE(status)) { + dev_err(sock->dev, "Failed to look up MP1 base address from CRS method, err: %s\n", + acpi_format_exception(status)); + return -EINVAL; + } + /* The mapped region should be un cached */ + sock->virt_base_addr = devm_ioremap_uc(sock->dev, sock->mbinfo.base_addr, + sock->mbinfo.size); + if (!sock->virt_base_addr) { + dev_err(sock->dev, "Failed to ioremap MP1 base address\n"); + return -ENOMEM; + } + + return 0; +} + +/* Parse the ACPI table to read the data */ +static int hsmp_parse_acpi_table(struct device *dev, u16 sock_ind) +{ + struct hsmp_socket *sock = &plat_dev.sock[sock_ind]; + int ret; + + sock->sock_ind = sock_ind; + sock->dev = dev; + plat_dev.is_acpi_device = true; + + sema_init(&sock->hsmp_sem, 1); + + /* Read MP1 base address from CRS method */ + ret = hsmp_read_acpi_crs(sock); + if (ret) + return ret; + + /* Read mailbox offsets from DSD table */ + return hsmp_read_acpi_dsd(sock); +} + +static int hsmp_cache_proto_ver(u16 sock_ind) { struct hsmp_message msg = { 0 }; int ret; msg.msg_id = HSMP_GET_PROTO_VER; - msg.sock_ind = 0; + msg.sock_ind = sock_ind; msg.response_sz = hsmp_msg_desc_table[HSMP_GET_PROTO_VER].response_sz; ret = hsmp_send_message(&msg); @@ -524,22 +720,55 @@ static int initialize_platdev(struct device *dev) return 0; } +static const struct acpi_device_id amd_hsmp_acpi_ids[] = { + {ACPI_HSMP_DEVICE_HID, 0}, + {} +}; +MODULE_DEVICE_TABLE(acpi, amd_hsmp_acpi_ids); + static int hsmp_pltdrv_probe(struct platform_device *pdev) { + struct acpi_device *adev; + u16 sock_ind = 0; int ret; - plat_dev.sock = devm_kzalloc(&pdev->dev, - (plat_dev.num_sockets * sizeof(struct hsmp_socket)), - GFP_KERNEL); - if (!plat_dev.sock) - return -ENOMEM; + /* + * On ACPI supported BIOS, there is an ACPI HSMP device added for + * each socket, so the per socket probing, but the memory allocated for + * sockets should be contiguous to access it as an array, + * Hence allocate memory for all the sockets at once instead of allocating + * on each probe. + */ + if (!plat_dev.is_probed) { + plat_dev.sock = devm_kzalloc(&pdev->dev, + (plat_dev.num_sockets * sizeof(struct hsmp_socket)), + GFP_KERNEL); + if (!plat_dev.sock) + return -ENOMEM; + } - ret = initialize_platdev(&pdev->dev); - if (ret) - return ret; + adev = ACPI_COMPANION(&pdev->dev); + if (adev && !acpi_match_device_ids(adev, amd_hsmp_acpi_ids)) { + ret = hsmp_get_uid(&pdev->dev, &sock_ind); + if (ret) + return ret; + if (sock_ind >= plat_dev.num_sockets) + return -EINVAL; + ret = hsmp_parse_acpi_table(&pdev->dev, sock_ind); + if (ret) { + dev_err(&pdev->dev, "Failed to parse ACPI table\n"); + return ret; + } + } else { + ret = initialize_platdev(&pdev->dev); + if (ret) { + dev_err(&pdev->dev, "Failed to init HSMP mailbox\n"); + return ret; + } + } /* Test the hsmp interface */ - ret = hsmp_test(0, 0xDEADBEEF); + ret = hsmp_test(sock_ind, 0xDEADBEEF); if (ret) { dev_err(&pdev->dev, "HSMP test message failed on Fam:%x model:%x\n", boot_cpu_data.x86, boot_cpu_data.x86_model); @@ -547,14 +776,7 @@ static int hsmp_pltdrv_probe(struct platform_device *pdev) return ret; } - plat_dev.hsmp_device.name = HSMP_CDEV_NAME; - plat_dev.hsmp_device.minor = MISC_DYNAMIC_MINOR; - plat_dev.hsmp_device.fops = &hsmp_fops; - plat_dev.hsmp_device.parent = &pdev->dev; - plat_dev.hsmp_device.nodename = HSMP_DEVNODE_NAME; - plat_dev.hsmp_device.mode = 0644; - - ret = hsmp_cache_proto_ver(); + ret = hsmp_cache_proto_ver(sock_ind); if (ret) { dev_err(&pdev->dev, "Failed to read HSMP protocol version\n"); return ret; @@ -564,12 +786,35 @@ static int hsmp_pltdrv_probe(struct platform_device *pdev) if (ret) dev_err(&pdev->dev, "Failed to create HSMP sysfs interface\n"); - return misc_register(&plat_dev.hsmp_device); + if (!plat_dev.is_probed) { + plat_dev.hsmp_device.name = HSMP_CDEV_NAME; + plat_dev.hsmp_device.minor = MISC_DYNAMIC_MINOR; + plat_dev.hsmp_device.fops = &hsmp_fops; + plat_dev.hsmp_device.parent = &pdev->dev; + plat_dev.hsmp_device.nodename = HSMP_DEVNODE_NAME; + plat_dev.hsmp_device.mode = 0644; + + ret = misc_register(&plat_dev.hsmp_device); + if (ret) + return ret; + + plat_dev.is_probed = true; + } + + return 0; + } static void hsmp_pltdrv_remove(struct platform_device *pdev) { - misc_deregister(&plat_dev.hsmp_device); + /* + * We register only one misc_device even on multi socket system. + * So, deregister should happen only once. + */ + if (plat_dev.is_probed) { + misc_deregister(&plat_dev.hsmp_device); + plat_dev.is_probed = false; + } } static struct platform_driver amd_hsmp_driver = { @@ -577,6 +822,7 @@ static struct platform_driver amd_hsmp_driver = { .remove_new = hsmp_pltdrv_remove, .driver = { .name = DRIVER_NAME, + .acpi_match_table = amd_hsmp_acpi_ids, }, }; @@ -619,9 +865,11 @@ static int __init hsmp_plt_init(void) if (ret) return ret; - ret = hsmp_plat_dev_register(); - if (ret) - platform_driver_unregister(&amd_hsmp_driver); + if (!plat_dev.is_acpi_device) { + ret = hsmp_plat_dev_register(); + if (ret) + platform_driver_unregister(&amd_hsmp_driver); + } return ret; }