Loading...
1/*
2 * OMAP Secure API infrastructure.
3 *
4 * Copyright (C) 2011 Texas Instruments, Inc.
5 * Santosh Shilimkar <santosh.shilimkar@ti.com>
6 *
7 *
8 * This program is free software,you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
11 */
12
13#include <linux/kernel.h>
14#include <linux/init.h>
15#include <linux/io.h>
16#include <linux/memblock.h>
17
18#include <asm/cacheflush.h>
19#include <asm/memblock.h>
20
21#include <plat/omap-secure.h>
22#include <mach/omap-secure.h>
23
24static phys_addr_t omap_secure_memblock_base;
25
26/**
27 * omap_sec_dispatcher: Routine to dispatch low power secure
28 * service routines
29 * @idx: The HAL API index
30 * @flag: The flag indicating criticality of operation
31 * @nargs: Number of valid arguments out of four.
32 * @arg1, arg2, arg3 args4: Parameters passed to secure API
33 *
34 * Return the non-zero error value on failure.
35 */
36u32 omap_secure_dispatcher(u32 idx, u32 flag, u32 nargs, u32 arg1, u32 arg2,
37 u32 arg3, u32 arg4)
38{
39 u32 ret;
40 u32 param[5];
41
42 param[0] = nargs;
43 param[1] = arg1;
44 param[2] = arg2;
45 param[3] = arg3;
46 param[4] = arg4;
47
48 /*
49 * Secure API needs physical address
50 * pointer for the parameters
51 */
52 flush_cache_all();
53 outer_clean_range(__pa(param), __pa(param + 5));
54 ret = omap_smc2(idx, flag, __pa(param));
55
56 return ret;
57}
58
59/* Allocate the memory to save secure ram */
60int __init omap_secure_ram_reserve_memblock(void)
61{
62 u32 size = OMAP_SECURE_RAM_STORAGE;
63
64 size = ALIGN(size, SZ_1M);
65 omap_secure_memblock_base = arm_memblock_steal(size, SZ_1M);
66
67 return 0;
68}
69
70phys_addr_t omap_secure_ram_mempool_base(void)
71{
72 return omap_secure_memblock_base;
73}
1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * OMAP Secure API infrastructure.
4 *
5 * Copyright (C) 2011 Texas Instruments, Inc.
6 * Santosh Shilimkar <santosh.shilimkar@ti.com>
7 * Copyright (C) 2012 Ivaylo Dimitrov <freemangordon@abv.bg>
8 * Copyright (C) 2013 Pali Rohár <pali@kernel.org>
9 */
10
11#include <linux/arm-smccc.h>
12#include <linux/cpu_pm.h>
13#include <linux/kernel.h>
14#include <linux/init.h>
15#include <linux/io.h>
16#include <linux/memblock.h>
17#include <linux/of.h>
18
19#include <asm/cacheflush.h>
20#include <asm/memblock.h>
21
22#include "common.h"
23#include "omap-secure.h"
24#include "soc.h"
25
26static phys_addr_t omap_secure_memblock_base;
27
28bool optee_available;
29
30#define OMAP_SIP_SMC_STD_CALL_VAL(func_num) \
31 ARM_SMCCC_CALL_VAL(ARM_SMCCC_STD_CALL, ARM_SMCCC_SMC_32, \
32 ARM_SMCCC_OWNER_SIP, (func_num))
33
34static void __init omap_optee_init_check(void)
35{
36 struct device_node *np;
37
38 /*
39 * We only check that the OP-TEE node is present and available. The
40 * OP-TEE kernel driver is not needed for the type of interaction made
41 * with OP-TEE here so the driver's status is not checked.
42 */
43 np = of_find_node_by_path("/firmware/optee");
44 if (np && of_device_is_available(np))
45 optee_available = true;
46 of_node_put(np);
47}
48
49/**
50 * omap_sec_dispatcher: Routine to dispatch low power secure
51 * service routines
52 * @idx: The HAL API index
53 * @flag: The flag indicating criticality of operation
54 * @nargs: Number of valid arguments out of four.
55 * @arg1, arg2, arg3 args4: Parameters passed to secure API
56 *
57 * Return the non-zero error value on failure.
58 */
59u32 omap_secure_dispatcher(u32 idx, u32 flag, u32 nargs, u32 arg1, u32 arg2,
60 u32 arg3, u32 arg4)
61{
62 static u32 buf[NR_CPUS][5];
63 u32 *param;
64 int cpu;
65 u32 ret;
66
67 cpu = get_cpu();
68 param = buf[cpu];
69
70 param[0] = nargs;
71 param[1] = arg1;
72 param[2] = arg2;
73 param[3] = arg3;
74 param[4] = arg4;
75
76 /*
77 * Secure API needs physical address
78 * pointer for the parameters
79 */
80 flush_cache_all();
81 outer_clean_range(__pa(param), __pa(param + 5));
82 ret = omap_smc2(idx, flag, __pa(param));
83
84 put_cpu();
85
86 return ret;
87}
88
89void omap_smccc_smc(u32 fn, u32 arg)
90{
91 struct arm_smccc_res res;
92
93 arm_smccc_smc(OMAP_SIP_SMC_STD_CALL_VAL(fn), arg,
94 0, 0, 0, 0, 0, 0, &res);
95 WARN(res.a0, "Secure function call 0x%08x failed\n", fn);
96}
97
98void omap_smc1(u32 fn, u32 arg)
99{
100 /*
101 * If this platform has OP-TEE installed we use ARM SMC calls
102 * otherwise fall back to the OMAP ROM style calls.
103 */
104 if (optee_available)
105 omap_smccc_smc(fn, arg);
106 else
107 _omap_smc1(fn, arg);
108}
109
110/* Allocate the memory to save secure ram */
111int __init omap_secure_ram_reserve_memblock(void)
112{
113 u32 size = OMAP_SECURE_RAM_STORAGE;
114
115 size = ALIGN(size, SECTION_SIZE);
116 omap_secure_memblock_base = arm_memblock_steal(size, SECTION_SIZE);
117
118 return 0;
119}
120
121phys_addr_t omap_secure_ram_mempool_base(void)
122{
123 return omap_secure_memblock_base;
124}
125
126#if defined(CONFIG_ARCH_OMAP3) && defined(CONFIG_PM)
127u32 omap3_save_secure_ram(void *addr, int size)
128{
129 static u32 param[5];
130 u32 ret;
131
132 if (size != OMAP3_SAVE_SECURE_RAM_SZ)
133 return OMAP3_SAVE_SECURE_RAM_SZ;
134
135 param[0] = 4; /* Number of arguments */
136 param[1] = __pa(addr); /* Physical address for saving */
137 param[2] = 0;
138 param[3] = 1;
139 param[4] = 1;
140
141 ret = save_secure_ram_context(__pa(param));
142
143 return ret;
144}
145#endif
146
147/**
148 * rx51_secure_dispatcher: Routine to dispatch secure PPA API calls
149 * @idx: The PPA API index
150 * @process: Process ID
151 * @flag: The flag indicating criticality of operation
152 * @nargs: Number of valid arguments out of four.
153 * @arg1, arg2, arg3 args4: Parameters passed to secure API
154 *
155 * Return the non-zero error value on failure.
156 *
157 * NOTE: rx51_secure_dispatcher differs from omap_secure_dispatcher because
158 * it calling omap_smc3() instead omap_smc2() and param[0] is nargs+1
159 */
160u32 rx51_secure_dispatcher(u32 idx, u32 process, u32 flag, u32 nargs,
161 u32 arg1, u32 arg2, u32 arg3, u32 arg4)
162{
163 static u32 param[5];
164 u32 ret;
165
166 param[0] = nargs+1; /* RX-51 needs number of arguments + 1 */
167 param[1] = arg1;
168 param[2] = arg2;
169 param[3] = arg3;
170 param[4] = arg4;
171
172 /*
173 * Secure API needs physical address
174 * pointer for the parameters
175 */
176 local_irq_disable();
177 local_fiq_disable();
178 flush_cache_all();
179 outer_clean_range(__pa(param), __pa(param + 5));
180 ret = omap_smc3(idx, process, flag, __pa(param));
181 flush_cache_all();
182 local_fiq_enable();
183 local_irq_enable();
184
185 return ret;
186}
187
188/**
189 * rx51_secure_update_aux_cr: Routine to modify the contents of Auxiliary Control Register
190 * @set_bits: bits to set in ACR
191 * @clr_bits: bits to clear in ACR
192 *
193 * Return the non-zero error value on failure.
194*/
195u32 rx51_secure_update_aux_cr(u32 set_bits, u32 clear_bits)
196{
197 u32 acr;
198
199 /* Read ACR */
200 asm volatile ("mrc p15, 0, %0, c1, c0, 1" : "=r" (acr));
201 acr &= ~clear_bits;
202 acr |= set_bits;
203
204 return rx51_secure_dispatcher(RX51_PPA_WRITE_ACR,
205 0,
206 FLAG_START_CRITICAL,
207 1, acr, 0, 0, 0);
208}
209
210/**
211 * rx51_secure_rng_call: Routine for HW random generator
212 */
213u32 rx51_secure_rng_call(u32 ptr, u32 count, u32 flag)
214{
215 return rx51_secure_dispatcher(RX51_PPA_HWRNG,
216 0,
217 NO_FLAG,
218 3, ptr, count, flag, 0);
219}
220
221void __init omap_secure_init(void)
222{
223 omap_optee_init_check();
224}
225
226/*
227 * Dummy dispatcher call after core OSWR and MPU off. Updates the ROM return
228 * address after MMU has been re-enabled after CPU1 has been woken up again.
229 * Otherwise the ROM code will attempt to use the earlier physical return
230 * address that got set with MMU off when waking up CPU1. Only used on secure
231 * devices.
232 */
233static int cpu_notifier(struct notifier_block *nb, unsigned long cmd, void *v)
234{
235 switch (cmd) {
236 case CPU_CLUSTER_PM_EXIT:
237 omap_secure_dispatcher(OMAP4_PPA_SERVICE_0,
238 FLAG_START_CRITICAL,
239 0, 0, 0, 0, 0);
240 break;
241 default:
242 break;
243 }
244
245 return NOTIFY_OK;
246}
247
248static struct notifier_block secure_notifier_block = {
249 .notifier_call = cpu_notifier,
250};
251
252static int __init secure_pm_init(void)
253{
254 if (omap_type() == OMAP2_DEVICE_TYPE_GP || !soc_is_omap44xx())
255 return 0;
256
257 cpu_pm_register_notifier(&secure_notifier_block);
258
259 return 0;
260}
261omap_arch_initcall(secure_pm_init);