221 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			221 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			C
		
	
	
	
| // SPDX-License-Identifier: GPL-2.0+
 | |
| /*
 | |
|  * (C) Copyright 2016 Beniamino Galvani <b.galvani@gmail.com>
 | |
|  *
 | |
|  * Secure monitor calls.
 | |
|  */
 | |
| 
 | |
| #include <common.h>
 | |
| #include <command.h>
 | |
| #include <env.h>
 | |
| #include <log.h>
 | |
| #include <asm/arch/sm.h>
 | |
| #include <asm/cache.h>
 | |
| #include <asm/global_data.h>
 | |
| #include <asm/ptrace.h>
 | |
| #include <linux/bitops.h>
 | |
| #include <linux/err.h>
 | |
| #include <linux/kernel.h>
 | |
| #include <dm.h>
 | |
| #include <linux/bitfield.h>
 | |
| #include <regmap.h>
 | |
| #include <syscon.h>
 | |
| 
 | |
| #define FN_GET_SHARE_MEM_INPUT_BASE	0x82000020
 | |
| #define FN_GET_SHARE_MEM_OUTPUT_BASE	0x82000021
 | |
| #define FN_EFUSE_READ			0x82000030
 | |
| #define FN_EFUSE_WRITE			0x82000031
 | |
| #define FN_CHIP_ID			0x82000044
 | |
| 
 | |
| static void *shmem_input;
 | |
| static void *shmem_output;
 | |
| 
 | |
| static void meson_init_shmem(void)
 | |
| {
 | |
| 	struct pt_regs regs;
 | |
| 
 | |
| 	if (shmem_input && shmem_output)
 | |
| 		return;
 | |
| 
 | |
| 	regs.regs[0] = FN_GET_SHARE_MEM_INPUT_BASE;
 | |
| 	smc_call(®s);
 | |
| 	shmem_input = (void *)regs.regs[0];
 | |
| 
 | |
| 	regs.regs[0] = FN_GET_SHARE_MEM_OUTPUT_BASE;
 | |
| 	smc_call(®s);
 | |
| 	shmem_output = (void *)regs.regs[0];
 | |
| 
 | |
| 	debug("Secure Monitor shmem: 0x%p 0x%p\n", shmem_input, shmem_output);
 | |
| }
 | |
| 
 | |
| ssize_t meson_sm_read_efuse(uintptr_t offset, void *buffer, size_t size)
 | |
| {
 | |
| 	struct pt_regs regs;
 | |
| 
 | |
| 	meson_init_shmem();
 | |
| 
 | |
| 	regs.regs[0] = FN_EFUSE_READ;
 | |
| 	regs.regs[1] = offset;
 | |
| 	regs.regs[2] = size;
 | |
| 
 | |
| 	smc_call(®s);
 | |
| 
 | |
| 	if (regs.regs[0] == 0)
 | |
| 		return -1;
 | |
| 
 | |
| 	memcpy(buffer, shmem_output, min(size, regs.regs[0]));
 | |
| 
 | |
| 	return regs.regs[0];
 | |
| }
 | |
| 
 | |
| #define SM_CHIP_ID_LENGTH	119
 | |
| #define SM_CHIP_ID_OFFSET	4
 | |
| #define SM_CHIP_ID_SIZE		12
 | |
| 
 | |
| int meson_sm_get_serial(void *buffer, size_t size)
 | |
| {
 | |
| 	struct pt_regs regs;
 | |
| 
 | |
| 	meson_init_shmem();
 | |
| 
 | |
| 	regs.regs[0] = FN_CHIP_ID;
 | |
| 	regs.regs[1] = 0;
 | |
| 	regs.regs[2] = 0;
 | |
| 
 | |
| 	smc_call(®s);
 | |
| 
 | |
| 	memcpy(buffer, shmem_output + SM_CHIP_ID_OFFSET,
 | |
| 	       min_t(size_t, size, SM_CHIP_ID_SIZE));
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| #define AO_SEC_SD_CFG15		0xfc
 | |
| #define REBOOT_REASON_MASK	GENMASK(15, 12)
 | |
| 
 | |
| int meson_sm_get_reboot_reason(void)
 | |
| {
 | |
| 	struct regmap *regmap;
 | |
| 	int nodeoffset;
 | |
| 	ofnode node;
 | |
| 	unsigned int reason;
 | |
| 
 | |
| 	/* find the offset of compatible node */
 | |
| 	nodeoffset = fdt_node_offset_by_compatible(gd->fdt_blob, -1,
 | |
| 						   "amlogic,meson-gx-ao-secure");
 | |
| 	if (nodeoffset < 0) {
 | |
| 		printf("%s: failed to get amlogic,meson-gx-ao-secure\n",
 | |
| 		       __func__);
 | |
| 		return -ENODEV;
 | |
| 	}
 | |
| 
 | |
| 	/* get regmap from the syscon node */
 | |
| 	node = offset_to_ofnode(nodeoffset);
 | |
| 	regmap = syscon_node_to_regmap(node);
 | |
| 	if (IS_ERR(regmap)) {
 | |
| 		printf("%s: failed to get regmap\n", __func__);
 | |
| 		return -EINVAL;
 | |
| 	}
 | |
| 
 | |
| 	regmap_read(regmap, AO_SEC_SD_CFG15, &reason);
 | |
| 
 | |
| 	/* The SMC call is not used, we directly use AO_SEC_SD_CFG15 */
 | |
| 	return FIELD_GET(REBOOT_REASON_MASK, reason);
 | |
| }
 | |
| 
 | |
| static int do_sm_serial(struct cmd_tbl *cmdtp, int flag, int argc,
 | |
| 			char *const argv[])
 | |
| {
 | |
| 	ulong address;
 | |
| 	int ret;
 | |
| 
 | |
| 	if (argc < 2)
 | |
| 		return CMD_RET_USAGE;
 | |
| 
 | |
| 	address = simple_strtoul(argv[1], NULL, 0);
 | |
| 
 | |
| 	ret = meson_sm_get_serial((void *)address, SM_CHIP_ID_SIZE);
 | |
| 	if (ret)
 | |
| 		return CMD_RET_FAILURE;
 | |
| 
 | |
| 	return CMD_RET_SUCCESS;
 | |
| }
 | |
| 
 | |
| #define MAX_REBOOT_REASONS 14
 | |
| 
 | |
| static const char *reboot_reasons[MAX_REBOOT_REASONS] = {
 | |
| 	[REBOOT_REASON_COLD] = "cold_boot",
 | |
| 	[REBOOT_REASON_NORMAL] = "normal",
 | |
| 	[REBOOT_REASON_RECOVERY] = "recovery",
 | |
| 	[REBOOT_REASON_UPDATE] = "update",
 | |
| 	[REBOOT_REASON_FASTBOOT] = "fastboot",
 | |
| 	[REBOOT_REASON_SUSPEND_OFF] = "suspend_off",
 | |
| 	[REBOOT_REASON_HIBERNATE] = "hibernate",
 | |
| 	[REBOOT_REASON_BOOTLOADER] = "bootloader",
 | |
| 	[REBOOT_REASON_SHUTDOWN_REBOOT] = "shutdown_reboot",
 | |
| 	[REBOOT_REASON_RPMBP] = "rpmbp",
 | |
| 	[REBOOT_REASON_CRASH_DUMP] = "crash_dump",
 | |
| 	[REBOOT_REASON_KERNEL_PANIC] = "kernel_panic",
 | |
| 	[REBOOT_REASON_WATCHDOG_REBOOT] = "watchdog_reboot",
 | |
| };
 | |
| 
 | |
| static int do_sm_reboot_reason(struct cmd_tbl *cmdtp, int flag, int argc,
 | |
| 			       char *const argv[])
 | |
| {
 | |
| 	const char *reason_str;
 | |
| 	char *destarg = NULL;
 | |
| 	int reason;
 | |
| 
 | |
| 	if (argc > 1)
 | |
| 		destarg = argv[1];
 | |
| 
 | |
| 	reason = meson_sm_get_reboot_reason();
 | |
| 	if (reason < 0)
 | |
| 		return CMD_RET_FAILURE;
 | |
| 
 | |
| 	if (reason >= MAX_REBOOT_REASONS ||
 | |
| 	    !reboot_reasons[reason])
 | |
| 		reason_str = "unknown";
 | |
| 	else
 | |
| 		reason_str = reboot_reasons[reason];
 | |
| 
 | |
| 	if (destarg)
 | |
| 		env_set(destarg, reason_str);
 | |
| 	else
 | |
| 		printf("reboot reason: %s (%x)\n", reason_str, reason);
 | |
| 
 | |
| 	return CMD_RET_SUCCESS;
 | |
| }
 | |
| 
 | |
| static struct cmd_tbl cmd_sm_sub[] = {
 | |
| 	U_BOOT_CMD_MKENT(serial, 2, 1, do_sm_serial, "", ""),
 | |
| 	U_BOOT_CMD_MKENT(reboot_reason, 1, 1, do_sm_reboot_reason, "", ""),
 | |
| };
 | |
| 
 | |
| static int do_sm(struct cmd_tbl *cmdtp, int flag, int argc,
 | |
| 		 char *const argv[])
 | |
| {
 | |
| 	struct cmd_tbl *c;
 | |
| 
 | |
| 	if (argc < 2)
 | |
| 		return CMD_RET_USAGE;
 | |
| 
 | |
| 	/* Strip off leading 'sm' command argument */
 | |
| 	argc--;
 | |
| 	argv++;
 | |
| 
 | |
| 	c = find_cmd_tbl(argv[0], &cmd_sm_sub[0], ARRAY_SIZE(cmd_sm_sub));
 | |
| 
 | |
| 	if (c)
 | |
| 		return c->cmd(cmdtp, flag, argc, argv);
 | |
| 	else
 | |
| 		return CMD_RET_USAGE;
 | |
| }
 | |
| 
 | |
| U_BOOT_CMD(
 | |
| 	sm, 5, 0, do_sm,
 | |
| 	"Secure Monitor Control",
 | |
| 	"serial <address> - read chip unique id to memory address\n"
 | |
| 	"sm reboot_reason [name] - get reboot reason and store to to environment"
 | |
| );
 |