162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * OMAP Secure API infrastructure. 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (C) 2011 Texas Instruments, Inc. 662306a36Sopenharmony_ci * Santosh Shilimkar <santosh.shilimkar@ti.com> 762306a36Sopenharmony_ci * Copyright (C) 2012 Ivaylo Dimitrov <freemangordon@abv.bg> 862306a36Sopenharmony_ci * Copyright (C) 2013 Pali Rohár <pali@kernel.org> 962306a36Sopenharmony_ci */ 1062306a36Sopenharmony_ci 1162306a36Sopenharmony_ci#include <linux/arm-smccc.h> 1262306a36Sopenharmony_ci#include <linux/cpu_pm.h> 1362306a36Sopenharmony_ci#include <linux/kernel.h> 1462306a36Sopenharmony_ci#include <linux/init.h> 1562306a36Sopenharmony_ci#include <linux/io.h> 1662306a36Sopenharmony_ci#include <linux/memblock.h> 1762306a36Sopenharmony_ci#include <linux/of.h> 1862306a36Sopenharmony_ci 1962306a36Sopenharmony_ci#include <asm/cacheflush.h> 2062306a36Sopenharmony_ci#include <asm/memblock.h> 2162306a36Sopenharmony_ci 2262306a36Sopenharmony_ci#include "common.h" 2362306a36Sopenharmony_ci#include "omap-secure.h" 2462306a36Sopenharmony_ci#include "soc.h" 2562306a36Sopenharmony_ci 2662306a36Sopenharmony_cistatic phys_addr_t omap_secure_memblock_base; 2762306a36Sopenharmony_ci 2862306a36Sopenharmony_cibool optee_available; 2962306a36Sopenharmony_ci 3062306a36Sopenharmony_ci#define OMAP_SIP_SMC_STD_CALL_VAL(func_num) \ 3162306a36Sopenharmony_ci ARM_SMCCC_CALL_VAL(ARM_SMCCC_STD_CALL, ARM_SMCCC_SMC_32, \ 3262306a36Sopenharmony_ci ARM_SMCCC_OWNER_SIP, (func_num)) 3362306a36Sopenharmony_ci 3462306a36Sopenharmony_cistatic void __init omap_optee_init_check(void) 3562306a36Sopenharmony_ci{ 3662306a36Sopenharmony_ci struct device_node *np; 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_ci /* 3962306a36Sopenharmony_ci * We only check that the OP-TEE node is present and available. The 4062306a36Sopenharmony_ci * OP-TEE kernel driver is not needed for the type of interaction made 4162306a36Sopenharmony_ci * with OP-TEE here so the driver's status is not checked. 4262306a36Sopenharmony_ci */ 4362306a36Sopenharmony_ci np = of_find_node_by_path("/firmware/optee"); 4462306a36Sopenharmony_ci if (np && of_device_is_available(np)) 4562306a36Sopenharmony_ci optee_available = true; 4662306a36Sopenharmony_ci of_node_put(np); 4762306a36Sopenharmony_ci} 4862306a36Sopenharmony_ci 4962306a36Sopenharmony_ci/** 5062306a36Sopenharmony_ci * omap_sec_dispatcher: Routine to dispatch low power secure 5162306a36Sopenharmony_ci * service routines 5262306a36Sopenharmony_ci * @idx: The HAL API index 5362306a36Sopenharmony_ci * @flag: The flag indicating criticality of operation 5462306a36Sopenharmony_ci * @nargs: Number of valid arguments out of four. 5562306a36Sopenharmony_ci * @arg1, arg2, arg3 args4: Parameters passed to secure API 5662306a36Sopenharmony_ci * 5762306a36Sopenharmony_ci * Return the non-zero error value on failure. 5862306a36Sopenharmony_ci */ 5962306a36Sopenharmony_ciu32 omap_secure_dispatcher(u32 idx, u32 flag, u32 nargs, u32 arg1, u32 arg2, 6062306a36Sopenharmony_ci u32 arg3, u32 arg4) 6162306a36Sopenharmony_ci{ 6262306a36Sopenharmony_ci static u32 buf[NR_CPUS][5]; 6362306a36Sopenharmony_ci u32 *param; 6462306a36Sopenharmony_ci int cpu; 6562306a36Sopenharmony_ci u32 ret; 6662306a36Sopenharmony_ci 6762306a36Sopenharmony_ci cpu = get_cpu(); 6862306a36Sopenharmony_ci param = buf[cpu]; 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_ci param[0] = nargs; 7162306a36Sopenharmony_ci param[1] = arg1; 7262306a36Sopenharmony_ci param[2] = arg2; 7362306a36Sopenharmony_ci param[3] = arg3; 7462306a36Sopenharmony_ci param[4] = arg4; 7562306a36Sopenharmony_ci 7662306a36Sopenharmony_ci /* 7762306a36Sopenharmony_ci * Secure API needs physical address 7862306a36Sopenharmony_ci * pointer for the parameters 7962306a36Sopenharmony_ci */ 8062306a36Sopenharmony_ci flush_cache_all(); 8162306a36Sopenharmony_ci outer_clean_range(__pa(param), __pa(param + 5)); 8262306a36Sopenharmony_ci ret = omap_smc2(idx, flag, __pa(param)); 8362306a36Sopenharmony_ci 8462306a36Sopenharmony_ci put_cpu(); 8562306a36Sopenharmony_ci 8662306a36Sopenharmony_ci return ret; 8762306a36Sopenharmony_ci} 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_civoid omap_smccc_smc(u32 fn, u32 arg) 9062306a36Sopenharmony_ci{ 9162306a36Sopenharmony_ci struct arm_smccc_res res; 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci arm_smccc_smc(OMAP_SIP_SMC_STD_CALL_VAL(fn), arg, 9462306a36Sopenharmony_ci 0, 0, 0, 0, 0, 0, &res); 9562306a36Sopenharmony_ci WARN(res.a0, "Secure function call 0x%08x failed\n", fn); 9662306a36Sopenharmony_ci} 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_civoid omap_smc1(u32 fn, u32 arg) 9962306a36Sopenharmony_ci{ 10062306a36Sopenharmony_ci /* 10162306a36Sopenharmony_ci * If this platform has OP-TEE installed we use ARM SMC calls 10262306a36Sopenharmony_ci * otherwise fall back to the OMAP ROM style calls. 10362306a36Sopenharmony_ci */ 10462306a36Sopenharmony_ci if (optee_available) 10562306a36Sopenharmony_ci omap_smccc_smc(fn, arg); 10662306a36Sopenharmony_ci else 10762306a36Sopenharmony_ci _omap_smc1(fn, arg); 10862306a36Sopenharmony_ci} 10962306a36Sopenharmony_ci 11062306a36Sopenharmony_ci/* Allocate the memory to save secure ram */ 11162306a36Sopenharmony_ciint __init omap_secure_ram_reserve_memblock(void) 11262306a36Sopenharmony_ci{ 11362306a36Sopenharmony_ci u32 size = OMAP_SECURE_RAM_STORAGE; 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_ci size = ALIGN(size, SECTION_SIZE); 11662306a36Sopenharmony_ci omap_secure_memblock_base = arm_memblock_steal(size, SECTION_SIZE); 11762306a36Sopenharmony_ci 11862306a36Sopenharmony_ci return 0; 11962306a36Sopenharmony_ci} 12062306a36Sopenharmony_ci 12162306a36Sopenharmony_ci#if defined(CONFIG_ARCH_OMAP3) && defined(CONFIG_PM) 12262306a36Sopenharmony_ciu32 omap3_save_secure_ram(void *addr, int size) 12362306a36Sopenharmony_ci{ 12462306a36Sopenharmony_ci static u32 param[5]; 12562306a36Sopenharmony_ci u32 ret; 12662306a36Sopenharmony_ci 12762306a36Sopenharmony_ci if (size != OMAP3_SAVE_SECURE_RAM_SZ) 12862306a36Sopenharmony_ci return OMAP3_SAVE_SECURE_RAM_SZ; 12962306a36Sopenharmony_ci 13062306a36Sopenharmony_ci param[0] = 4; /* Number of arguments */ 13162306a36Sopenharmony_ci param[1] = __pa(addr); /* Physical address for saving */ 13262306a36Sopenharmony_ci param[2] = 0; 13362306a36Sopenharmony_ci param[3] = 1; 13462306a36Sopenharmony_ci param[4] = 1; 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_ci ret = save_secure_ram_context(__pa(param)); 13762306a36Sopenharmony_ci 13862306a36Sopenharmony_ci return ret; 13962306a36Sopenharmony_ci} 14062306a36Sopenharmony_ci#endif 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci/** 14362306a36Sopenharmony_ci * rx51_secure_dispatcher: Routine to dispatch secure PPA API calls 14462306a36Sopenharmony_ci * @idx: The PPA API index 14562306a36Sopenharmony_ci * @process: Process ID 14662306a36Sopenharmony_ci * @flag: The flag indicating criticality of operation 14762306a36Sopenharmony_ci * @nargs: Number of valid arguments out of four. 14862306a36Sopenharmony_ci * @arg1, arg2, arg3 args4: Parameters passed to secure API 14962306a36Sopenharmony_ci * 15062306a36Sopenharmony_ci * Return the non-zero error value on failure. 15162306a36Sopenharmony_ci * 15262306a36Sopenharmony_ci * NOTE: rx51_secure_dispatcher differs from omap_secure_dispatcher because 15362306a36Sopenharmony_ci * it calling omap_smc3() instead omap_smc2() and param[0] is nargs+1 15462306a36Sopenharmony_ci */ 15562306a36Sopenharmony_cistatic u32 rx51_secure_dispatcher(u32 idx, u32 process, u32 flag, u32 nargs, 15662306a36Sopenharmony_ci u32 arg1, u32 arg2, u32 arg3, u32 arg4) 15762306a36Sopenharmony_ci{ 15862306a36Sopenharmony_ci static u32 param[5]; 15962306a36Sopenharmony_ci u32 ret; 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_ci param[0] = nargs+1; /* RX-51 needs number of arguments + 1 */ 16262306a36Sopenharmony_ci param[1] = arg1; 16362306a36Sopenharmony_ci param[2] = arg2; 16462306a36Sopenharmony_ci param[3] = arg3; 16562306a36Sopenharmony_ci param[4] = arg4; 16662306a36Sopenharmony_ci 16762306a36Sopenharmony_ci /* 16862306a36Sopenharmony_ci * Secure API needs physical address 16962306a36Sopenharmony_ci * pointer for the parameters 17062306a36Sopenharmony_ci */ 17162306a36Sopenharmony_ci local_irq_disable(); 17262306a36Sopenharmony_ci local_fiq_disable(); 17362306a36Sopenharmony_ci flush_cache_all(); 17462306a36Sopenharmony_ci outer_clean_range(__pa(param), __pa(param + 5)); 17562306a36Sopenharmony_ci ret = omap_smc3(idx, process, flag, __pa(param)); 17662306a36Sopenharmony_ci flush_cache_all(); 17762306a36Sopenharmony_ci local_fiq_enable(); 17862306a36Sopenharmony_ci local_irq_enable(); 17962306a36Sopenharmony_ci 18062306a36Sopenharmony_ci return ret; 18162306a36Sopenharmony_ci} 18262306a36Sopenharmony_ci 18362306a36Sopenharmony_ci/** 18462306a36Sopenharmony_ci * rx51_secure_update_aux_cr: Routine to modify the contents of Auxiliary Control Register 18562306a36Sopenharmony_ci * @set_bits: bits to set in ACR 18662306a36Sopenharmony_ci * @clr_bits: bits to clear in ACR 18762306a36Sopenharmony_ci * 18862306a36Sopenharmony_ci * Return the non-zero error value on failure. 18962306a36Sopenharmony_ci*/ 19062306a36Sopenharmony_ciu32 rx51_secure_update_aux_cr(u32 set_bits, u32 clear_bits) 19162306a36Sopenharmony_ci{ 19262306a36Sopenharmony_ci u32 acr; 19362306a36Sopenharmony_ci 19462306a36Sopenharmony_ci /* Read ACR */ 19562306a36Sopenharmony_ci asm volatile ("mrc p15, 0, %0, c1, c0, 1" : "=r" (acr)); 19662306a36Sopenharmony_ci acr &= ~clear_bits; 19762306a36Sopenharmony_ci acr |= set_bits; 19862306a36Sopenharmony_ci 19962306a36Sopenharmony_ci return rx51_secure_dispatcher(RX51_PPA_WRITE_ACR, 20062306a36Sopenharmony_ci 0, 20162306a36Sopenharmony_ci FLAG_START_CRITICAL, 20262306a36Sopenharmony_ci 1, acr, 0, 0, 0); 20362306a36Sopenharmony_ci} 20462306a36Sopenharmony_ci 20562306a36Sopenharmony_ci/** 20662306a36Sopenharmony_ci * rx51_secure_rng_call: Routine for HW random generator 20762306a36Sopenharmony_ci */ 20862306a36Sopenharmony_ciu32 rx51_secure_rng_call(u32 ptr, u32 count, u32 flag) 20962306a36Sopenharmony_ci{ 21062306a36Sopenharmony_ci return rx51_secure_dispatcher(RX51_PPA_HWRNG, 21162306a36Sopenharmony_ci 0, 21262306a36Sopenharmony_ci NO_FLAG, 21362306a36Sopenharmony_ci 3, ptr, count, flag, 0); 21462306a36Sopenharmony_ci} 21562306a36Sopenharmony_ci 21662306a36Sopenharmony_civoid __init omap_secure_init(void) 21762306a36Sopenharmony_ci{ 21862306a36Sopenharmony_ci omap_optee_init_check(); 21962306a36Sopenharmony_ci} 22062306a36Sopenharmony_ci 22162306a36Sopenharmony_ci/* 22262306a36Sopenharmony_ci * Dummy dispatcher call after core OSWR and MPU off. Updates the ROM return 22362306a36Sopenharmony_ci * address after MMU has been re-enabled after CPU1 has been woken up again. 22462306a36Sopenharmony_ci * Otherwise the ROM code will attempt to use the earlier physical return 22562306a36Sopenharmony_ci * address that got set with MMU off when waking up CPU1. Only used on secure 22662306a36Sopenharmony_ci * devices. 22762306a36Sopenharmony_ci */ 22862306a36Sopenharmony_cistatic int cpu_notifier(struct notifier_block *nb, unsigned long cmd, void *v) 22962306a36Sopenharmony_ci{ 23062306a36Sopenharmony_ci switch (cmd) { 23162306a36Sopenharmony_ci case CPU_CLUSTER_PM_EXIT: 23262306a36Sopenharmony_ci omap_secure_dispatcher(OMAP4_PPA_SERVICE_0, 23362306a36Sopenharmony_ci FLAG_START_CRITICAL, 23462306a36Sopenharmony_ci 0, 0, 0, 0, 0); 23562306a36Sopenharmony_ci break; 23662306a36Sopenharmony_ci default: 23762306a36Sopenharmony_ci break; 23862306a36Sopenharmony_ci } 23962306a36Sopenharmony_ci 24062306a36Sopenharmony_ci return NOTIFY_OK; 24162306a36Sopenharmony_ci} 24262306a36Sopenharmony_ci 24362306a36Sopenharmony_cistatic struct notifier_block secure_notifier_block = { 24462306a36Sopenharmony_ci .notifier_call = cpu_notifier, 24562306a36Sopenharmony_ci}; 24662306a36Sopenharmony_ci 24762306a36Sopenharmony_cistatic int __init secure_pm_init(void) 24862306a36Sopenharmony_ci{ 24962306a36Sopenharmony_ci if (omap_type() == OMAP2_DEVICE_TYPE_GP || !soc_is_omap44xx()) 25062306a36Sopenharmony_ci return 0; 25162306a36Sopenharmony_ci 25262306a36Sopenharmony_ci cpu_pm_register_notifier(&secure_notifier_block); 25362306a36Sopenharmony_ci 25462306a36Sopenharmony_ci return 0; 25562306a36Sopenharmony_ci} 25662306a36Sopenharmony_ciomap_arch_initcall(secure_pm_init); 257