162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * OMAP Secure API infrastructure.
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Copyright (C) 2011 Texas Instruments, Inc.
662306a36Sopenharmony_ci *	Santosh Shilimkar <santosh.shilimkar@ti.com>
762306a36Sopenharmony_ci * Copyright (C) 2012 Ivaylo Dimitrov <freemangordon@abv.bg>
862306a36Sopenharmony_ci * Copyright (C) 2013 Pali Rohár <pali@kernel.org>
962306a36Sopenharmony_ci */
1062306a36Sopenharmony_ci
1162306a36Sopenharmony_ci#include <linux/arm-smccc.h>
1262306a36Sopenharmony_ci#include <linux/cpu_pm.h>
1362306a36Sopenharmony_ci#include <linux/kernel.h>
1462306a36Sopenharmony_ci#include <linux/init.h>
1562306a36Sopenharmony_ci#include <linux/io.h>
1662306a36Sopenharmony_ci#include <linux/memblock.h>
1762306a36Sopenharmony_ci#include <linux/of.h>
1862306a36Sopenharmony_ci
1962306a36Sopenharmony_ci#include <asm/cacheflush.h>
2062306a36Sopenharmony_ci#include <asm/memblock.h>
2162306a36Sopenharmony_ci
2262306a36Sopenharmony_ci#include "common.h"
2362306a36Sopenharmony_ci#include "omap-secure.h"
2462306a36Sopenharmony_ci#include "soc.h"
2562306a36Sopenharmony_ci
2662306a36Sopenharmony_cistatic phys_addr_t omap_secure_memblock_base;
2762306a36Sopenharmony_ci
2862306a36Sopenharmony_cibool optee_available;
2962306a36Sopenharmony_ci
3062306a36Sopenharmony_ci#define OMAP_SIP_SMC_STD_CALL_VAL(func_num) \
3162306a36Sopenharmony_ci	ARM_SMCCC_CALL_VAL(ARM_SMCCC_STD_CALL, ARM_SMCCC_SMC_32, \
3262306a36Sopenharmony_ci	ARM_SMCCC_OWNER_SIP, (func_num))
3362306a36Sopenharmony_ci
3462306a36Sopenharmony_cistatic void __init omap_optee_init_check(void)
3562306a36Sopenharmony_ci{
3662306a36Sopenharmony_ci	struct device_node *np;
3762306a36Sopenharmony_ci
3862306a36Sopenharmony_ci	/*
3962306a36Sopenharmony_ci	 * We only check that the OP-TEE node is present and available. The
4062306a36Sopenharmony_ci	 * OP-TEE kernel driver is not needed for the type of interaction made
4162306a36Sopenharmony_ci	 * with OP-TEE here so the driver's status is not checked.
4262306a36Sopenharmony_ci	 */
4362306a36Sopenharmony_ci	np = of_find_node_by_path("/firmware/optee");
4462306a36Sopenharmony_ci	if (np && of_device_is_available(np))
4562306a36Sopenharmony_ci		optee_available = true;
4662306a36Sopenharmony_ci	of_node_put(np);
4762306a36Sopenharmony_ci}
4862306a36Sopenharmony_ci
4962306a36Sopenharmony_ci/**
5062306a36Sopenharmony_ci * omap_sec_dispatcher: Routine to dispatch low power secure
5162306a36Sopenharmony_ci * service routines
5262306a36Sopenharmony_ci * @idx: The HAL API index
5362306a36Sopenharmony_ci * @flag: The flag indicating criticality of operation
5462306a36Sopenharmony_ci * @nargs: Number of valid arguments out of four.
5562306a36Sopenharmony_ci * @arg1, arg2, arg3 args4: Parameters passed to secure API
5662306a36Sopenharmony_ci *
5762306a36Sopenharmony_ci * Return the non-zero error value on failure.
5862306a36Sopenharmony_ci */
5962306a36Sopenharmony_ciu32 omap_secure_dispatcher(u32 idx, u32 flag, u32 nargs, u32 arg1, u32 arg2,
6062306a36Sopenharmony_ci							 u32 arg3, u32 arg4)
6162306a36Sopenharmony_ci{
6262306a36Sopenharmony_ci	static u32 buf[NR_CPUS][5];
6362306a36Sopenharmony_ci	u32 *param;
6462306a36Sopenharmony_ci	int cpu;
6562306a36Sopenharmony_ci	u32 ret;
6662306a36Sopenharmony_ci
6762306a36Sopenharmony_ci	cpu = get_cpu();
6862306a36Sopenharmony_ci	param = buf[cpu];
6962306a36Sopenharmony_ci
7062306a36Sopenharmony_ci	param[0] = nargs;
7162306a36Sopenharmony_ci	param[1] = arg1;
7262306a36Sopenharmony_ci	param[2] = arg2;
7362306a36Sopenharmony_ci	param[3] = arg3;
7462306a36Sopenharmony_ci	param[4] = arg4;
7562306a36Sopenharmony_ci
7662306a36Sopenharmony_ci	/*
7762306a36Sopenharmony_ci	 * Secure API needs physical address
7862306a36Sopenharmony_ci	 * pointer for the parameters
7962306a36Sopenharmony_ci	 */
8062306a36Sopenharmony_ci	flush_cache_all();
8162306a36Sopenharmony_ci	outer_clean_range(__pa(param), __pa(param + 5));
8262306a36Sopenharmony_ci	ret = omap_smc2(idx, flag, __pa(param));
8362306a36Sopenharmony_ci
8462306a36Sopenharmony_ci	put_cpu();
8562306a36Sopenharmony_ci
8662306a36Sopenharmony_ci	return ret;
8762306a36Sopenharmony_ci}
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_civoid omap_smccc_smc(u32 fn, u32 arg)
9062306a36Sopenharmony_ci{
9162306a36Sopenharmony_ci	struct arm_smccc_res res;
9262306a36Sopenharmony_ci
9362306a36Sopenharmony_ci	arm_smccc_smc(OMAP_SIP_SMC_STD_CALL_VAL(fn), arg,
9462306a36Sopenharmony_ci		      0, 0, 0, 0, 0, 0, &res);
9562306a36Sopenharmony_ci	WARN(res.a0, "Secure function call 0x%08x failed\n", fn);
9662306a36Sopenharmony_ci}
9762306a36Sopenharmony_ci
9862306a36Sopenharmony_civoid omap_smc1(u32 fn, u32 arg)
9962306a36Sopenharmony_ci{
10062306a36Sopenharmony_ci	/*
10162306a36Sopenharmony_ci	 * If this platform has OP-TEE installed we use ARM SMC calls
10262306a36Sopenharmony_ci	 * otherwise fall back to the OMAP ROM style calls.
10362306a36Sopenharmony_ci	 */
10462306a36Sopenharmony_ci	if (optee_available)
10562306a36Sopenharmony_ci		omap_smccc_smc(fn, arg);
10662306a36Sopenharmony_ci	else
10762306a36Sopenharmony_ci		_omap_smc1(fn, arg);
10862306a36Sopenharmony_ci}
10962306a36Sopenharmony_ci
11062306a36Sopenharmony_ci/* Allocate the memory to save secure ram */
11162306a36Sopenharmony_ciint __init omap_secure_ram_reserve_memblock(void)
11262306a36Sopenharmony_ci{
11362306a36Sopenharmony_ci	u32 size = OMAP_SECURE_RAM_STORAGE;
11462306a36Sopenharmony_ci
11562306a36Sopenharmony_ci	size = ALIGN(size, SECTION_SIZE);
11662306a36Sopenharmony_ci	omap_secure_memblock_base = arm_memblock_steal(size, SECTION_SIZE);
11762306a36Sopenharmony_ci
11862306a36Sopenharmony_ci	return 0;
11962306a36Sopenharmony_ci}
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_ci#if defined(CONFIG_ARCH_OMAP3) && defined(CONFIG_PM)
12262306a36Sopenharmony_ciu32 omap3_save_secure_ram(void *addr, int size)
12362306a36Sopenharmony_ci{
12462306a36Sopenharmony_ci	static u32 param[5];
12562306a36Sopenharmony_ci	u32 ret;
12662306a36Sopenharmony_ci
12762306a36Sopenharmony_ci	if (size != OMAP3_SAVE_SECURE_RAM_SZ)
12862306a36Sopenharmony_ci		return OMAP3_SAVE_SECURE_RAM_SZ;
12962306a36Sopenharmony_ci
13062306a36Sopenharmony_ci	param[0] = 4;		/* Number of arguments */
13162306a36Sopenharmony_ci	param[1] = __pa(addr);	/* Physical address for saving */
13262306a36Sopenharmony_ci	param[2] = 0;
13362306a36Sopenharmony_ci	param[3] = 1;
13462306a36Sopenharmony_ci	param[4] = 1;
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci	ret = save_secure_ram_context(__pa(param));
13762306a36Sopenharmony_ci
13862306a36Sopenharmony_ci	return ret;
13962306a36Sopenharmony_ci}
14062306a36Sopenharmony_ci#endif
14162306a36Sopenharmony_ci
14262306a36Sopenharmony_ci/**
14362306a36Sopenharmony_ci * rx51_secure_dispatcher: Routine to dispatch secure PPA API calls
14462306a36Sopenharmony_ci * @idx: The PPA API index
14562306a36Sopenharmony_ci * @process: Process ID
14662306a36Sopenharmony_ci * @flag: The flag indicating criticality of operation
14762306a36Sopenharmony_ci * @nargs: Number of valid arguments out of four.
14862306a36Sopenharmony_ci * @arg1, arg2, arg3 args4: Parameters passed to secure API
14962306a36Sopenharmony_ci *
15062306a36Sopenharmony_ci * Return the non-zero error value on failure.
15162306a36Sopenharmony_ci *
15262306a36Sopenharmony_ci * NOTE: rx51_secure_dispatcher differs from omap_secure_dispatcher because
15362306a36Sopenharmony_ci *       it calling omap_smc3() instead omap_smc2() and param[0] is nargs+1
15462306a36Sopenharmony_ci */
15562306a36Sopenharmony_cistatic u32 rx51_secure_dispatcher(u32 idx, u32 process, u32 flag, u32 nargs,
15662306a36Sopenharmony_ci			   u32 arg1, u32 arg2, u32 arg3, u32 arg4)
15762306a36Sopenharmony_ci{
15862306a36Sopenharmony_ci	static u32 param[5];
15962306a36Sopenharmony_ci	u32 ret;
16062306a36Sopenharmony_ci
16162306a36Sopenharmony_ci	param[0] = nargs+1; /* RX-51 needs number of arguments + 1 */
16262306a36Sopenharmony_ci	param[1] = arg1;
16362306a36Sopenharmony_ci	param[2] = arg2;
16462306a36Sopenharmony_ci	param[3] = arg3;
16562306a36Sopenharmony_ci	param[4] = arg4;
16662306a36Sopenharmony_ci
16762306a36Sopenharmony_ci	/*
16862306a36Sopenharmony_ci	 * Secure API needs physical address
16962306a36Sopenharmony_ci	 * pointer for the parameters
17062306a36Sopenharmony_ci	 */
17162306a36Sopenharmony_ci	local_irq_disable();
17262306a36Sopenharmony_ci	local_fiq_disable();
17362306a36Sopenharmony_ci	flush_cache_all();
17462306a36Sopenharmony_ci	outer_clean_range(__pa(param), __pa(param + 5));
17562306a36Sopenharmony_ci	ret = omap_smc3(idx, process, flag, __pa(param));
17662306a36Sopenharmony_ci	flush_cache_all();
17762306a36Sopenharmony_ci	local_fiq_enable();
17862306a36Sopenharmony_ci	local_irq_enable();
17962306a36Sopenharmony_ci
18062306a36Sopenharmony_ci	return ret;
18162306a36Sopenharmony_ci}
18262306a36Sopenharmony_ci
18362306a36Sopenharmony_ci/**
18462306a36Sopenharmony_ci * rx51_secure_update_aux_cr: Routine to modify the contents of Auxiliary Control Register
18562306a36Sopenharmony_ci *  @set_bits: bits to set in ACR
18662306a36Sopenharmony_ci *  @clr_bits: bits to clear in ACR
18762306a36Sopenharmony_ci *
18862306a36Sopenharmony_ci * Return the non-zero error value on failure.
18962306a36Sopenharmony_ci*/
19062306a36Sopenharmony_ciu32 rx51_secure_update_aux_cr(u32 set_bits, u32 clear_bits)
19162306a36Sopenharmony_ci{
19262306a36Sopenharmony_ci	u32 acr;
19362306a36Sopenharmony_ci
19462306a36Sopenharmony_ci	/* Read ACR */
19562306a36Sopenharmony_ci	asm volatile ("mrc p15, 0, %0, c1, c0, 1" : "=r" (acr));
19662306a36Sopenharmony_ci	acr &= ~clear_bits;
19762306a36Sopenharmony_ci	acr |= set_bits;
19862306a36Sopenharmony_ci
19962306a36Sopenharmony_ci	return rx51_secure_dispatcher(RX51_PPA_WRITE_ACR,
20062306a36Sopenharmony_ci				      0,
20162306a36Sopenharmony_ci				      FLAG_START_CRITICAL,
20262306a36Sopenharmony_ci				      1, acr, 0, 0, 0);
20362306a36Sopenharmony_ci}
20462306a36Sopenharmony_ci
20562306a36Sopenharmony_ci/**
20662306a36Sopenharmony_ci * rx51_secure_rng_call: Routine for HW random generator
20762306a36Sopenharmony_ci */
20862306a36Sopenharmony_ciu32 rx51_secure_rng_call(u32 ptr, u32 count, u32 flag)
20962306a36Sopenharmony_ci{
21062306a36Sopenharmony_ci	return rx51_secure_dispatcher(RX51_PPA_HWRNG,
21162306a36Sopenharmony_ci				      0,
21262306a36Sopenharmony_ci				      NO_FLAG,
21362306a36Sopenharmony_ci				      3, ptr, count, flag, 0);
21462306a36Sopenharmony_ci}
21562306a36Sopenharmony_ci
21662306a36Sopenharmony_civoid __init omap_secure_init(void)
21762306a36Sopenharmony_ci{
21862306a36Sopenharmony_ci	omap_optee_init_check();
21962306a36Sopenharmony_ci}
22062306a36Sopenharmony_ci
22162306a36Sopenharmony_ci/*
22262306a36Sopenharmony_ci * Dummy dispatcher call after core OSWR and MPU off. Updates the ROM return
22362306a36Sopenharmony_ci * address after MMU has been re-enabled after CPU1 has been woken up again.
22462306a36Sopenharmony_ci * Otherwise the ROM code will attempt to use the earlier physical return
22562306a36Sopenharmony_ci * address that got set with MMU off when waking up CPU1. Only used on secure
22662306a36Sopenharmony_ci * devices.
22762306a36Sopenharmony_ci */
22862306a36Sopenharmony_cistatic int cpu_notifier(struct notifier_block *nb, unsigned long cmd, void *v)
22962306a36Sopenharmony_ci{
23062306a36Sopenharmony_ci	switch (cmd) {
23162306a36Sopenharmony_ci	case CPU_CLUSTER_PM_EXIT:
23262306a36Sopenharmony_ci		omap_secure_dispatcher(OMAP4_PPA_SERVICE_0,
23362306a36Sopenharmony_ci				       FLAG_START_CRITICAL,
23462306a36Sopenharmony_ci				       0, 0, 0, 0, 0);
23562306a36Sopenharmony_ci		break;
23662306a36Sopenharmony_ci	default:
23762306a36Sopenharmony_ci		break;
23862306a36Sopenharmony_ci	}
23962306a36Sopenharmony_ci
24062306a36Sopenharmony_ci	return NOTIFY_OK;
24162306a36Sopenharmony_ci}
24262306a36Sopenharmony_ci
24362306a36Sopenharmony_cistatic struct notifier_block secure_notifier_block = {
24462306a36Sopenharmony_ci	.notifier_call = cpu_notifier,
24562306a36Sopenharmony_ci};
24662306a36Sopenharmony_ci
24762306a36Sopenharmony_cistatic int __init secure_pm_init(void)
24862306a36Sopenharmony_ci{
24962306a36Sopenharmony_ci	if (omap_type() == OMAP2_DEVICE_TYPE_GP || !soc_is_omap44xx())
25062306a36Sopenharmony_ci		return 0;
25162306a36Sopenharmony_ci
25262306a36Sopenharmony_ci	cpu_pm_register_notifier(&secure_notifier_block);
25362306a36Sopenharmony_ci
25462306a36Sopenharmony_ci	return 0;
25562306a36Sopenharmony_ci}
25662306a36Sopenharmony_ciomap_arch_initcall(secure_pm_init);
257