mirror of
https://source.denx.de/u-boot/u-boot.git
synced 2025-08-14 19:26:58 +02:00
Patch introduces: * chip_id API - useful for various things, but used now for device_id (did) generation as mentioned in [1] on our private board code. Our device_id is calculated by means of permutations of chip_id value. * new SoCs (a1, s4, etc) are usually coming with the support of chip_id v2 right away, whereas secure monitors on old SoCs (like axg, g12b, g12a, etc) may support only chip_id v1. Chip_id API handles both cases * meson_sm_get_serial() is described via chip_id API. Links: [1] https://lore.kernel.org/linux-arm-kernel/202311242104.RjBPI3uI-lkp@intel.com/T/#m630fbeea6a6e7d531290b5c0af205af4fb979757 Signed-off-by: Viacheslav Bocharov <adeep@lexina.in> Co-developed-by: Arseniy Krasnov <avkrasnov@salutedevices.com> Signed-off-by: Arseniy Krasnov <avkrasnov@salutedevices.com> Signed-off-by: Evgeny Bachinin <EABachinin@salutedevices.com> Link: https://lore.kernel.org/r/20250210-meson_chip_id_all_vers-v1-3-b98f8b6880b8@salutedevices.com Signed-off-by: Neil Armstrong <neil.armstrong@linaro.org>
259 lines
6.1 KiB
C
259 lines
6.1 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/*
|
|
* (C) Copyright 2016 Beniamino Galvani <b.galvani@gmail.com>
|
|
*
|
|
* Secure monitor calls.
|
|
*/
|
|
|
|
#include <dm.h>
|
|
#include <log.h>
|
|
#include <regmap.h>
|
|
#include <sm.h>
|
|
#include <syscon.h>
|
|
#include <asm/arch/boot.h>
|
|
#include <asm/arch/sm.h>
|
|
#include <asm/cache.h>
|
|
#include <asm/global_data.h>
|
|
#include <asm/ptrace.h>
|
|
#include <linux/bitops.h>
|
|
#include <linux/compiler_attributes.h>
|
|
#include <linux/err.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/bitfield.h>
|
|
#include <meson/sm.h>
|
|
|
|
static inline struct udevice *meson_get_sm_device(void)
|
|
{
|
|
struct udevice *dev;
|
|
int err;
|
|
|
|
err = uclass_first_device_err(UCLASS_SM, &dev);
|
|
if (err) {
|
|
pr_err("Mesom SM device not found\n");
|
|
return ERR_PTR(err);
|
|
}
|
|
|
|
return dev;
|
|
}
|
|
|
|
ssize_t meson_sm_read_efuse(uintptr_t offset, void *buffer, size_t size)
|
|
{
|
|
struct udevice *dev;
|
|
struct pt_regs regs = { 0 };
|
|
int err;
|
|
|
|
dev = meson_get_sm_device();
|
|
if (IS_ERR(dev))
|
|
return PTR_ERR(dev);
|
|
|
|
regs.regs[1] = offset;
|
|
regs.regs[2] = size;
|
|
|
|
err = sm_call_read(dev, buffer, size,
|
|
MESON_SMC_CMD_EFUSE_READ, ®s);
|
|
if (err < 0)
|
|
pr_err("Failed to read efuse memory (%d)\n", err);
|
|
|
|
return err;
|
|
}
|
|
|
|
ssize_t meson_sm_write_efuse(uintptr_t offset, void *buffer, size_t size)
|
|
{
|
|
struct udevice *dev;
|
|
struct pt_regs regs = { 0 };
|
|
int err;
|
|
|
|
dev = meson_get_sm_device();
|
|
if (IS_ERR(dev))
|
|
return PTR_ERR(dev);
|
|
|
|
regs.regs[1] = offset;
|
|
regs.regs[2] = size;
|
|
|
|
err = sm_call_write(dev, buffer, size,
|
|
MESON_SMC_CMD_EFUSE_WRITE, ®s);
|
|
if (err < 0)
|
|
pr_err("Failed to write efuse memory (%d)\n", err);
|
|
|
|
return err;
|
|
}
|
|
|
|
/*
|
|
* Helps to handle two flavors of cpu_id layouts:
|
|
*
|
|
* - in-register view (value read from cpu_id reg, a.k.a. socinfo):
|
|
* +-----------+------------+------------+------------+
|
|
* | family_id | package_id | chip_rev | layout_rev |
|
|
* +-----------+------------+------------+------------+
|
|
* | 31 24 | 23 16 | 15 8 | 7 0 |
|
|
* +-----------+------------+------------+------------+
|
|
*
|
|
* - in-efuse view (value, residing inside efuse/shmem data usually for
|
|
* chip_id v2. Chip_id v1 does not contain cpu_id value inside efuse
|
|
* data (i.e. in chip_id_efuse)):
|
|
* +-----------+------------+------------+------------+
|
|
* | family_id | chip_rev | package_id | layout_rev |
|
|
* +-----------+------------+------------+------------+
|
|
* | 31 24 | 23 16 | 15 8 | 7 0 |
|
|
* +-----------+------------+------------+------------+
|
|
*/
|
|
enum {
|
|
/* In-register view of cpu_id */
|
|
CPU_ID_REG_MAJOR, /* 31-24 bits */
|
|
CPU_ID_REG_PACK, /* 23-16 bits */
|
|
CPU_ID_REG_MINOR, /* 15-8 bits */
|
|
CPU_ID_REG_MISC, /* 7-0 bits */
|
|
|
|
/* In-efuse view of cpu_id */
|
|
CPU_ID_MAJOR = CPU_ID_REG_MAJOR,
|
|
CPU_ID_PACK = CPU_ID_REG_MINOR,
|
|
CPU_ID_MINOR = CPU_ID_REG_PACK,
|
|
CPU_ID_MISC = CPU_ID_REG_MISC,
|
|
};
|
|
|
|
/*
|
|
* This is a beginning chunk of the whole efuse storage area, containing
|
|
* data related to chip_id only
|
|
*/
|
|
struct chip_id_efuse {
|
|
u32 version;
|
|
u8 raw[MESON_CHIP_ID_SZ]; /* payload */
|
|
} __packed;
|
|
|
|
static void meson_sm_serial_reverse(u8 serial[SM_SERIAL_SIZE])
|
|
{
|
|
for (int i = 0; i < SM_SERIAL_SIZE / 2; i++) {
|
|
int k = SM_SERIAL_SIZE - 1 - i;
|
|
|
|
swap(serial[i], serial[k]);
|
|
}
|
|
}
|
|
|
|
int meson_sm_get_chip_id(struct meson_sm_chip_id *chip_id)
|
|
{
|
|
struct udevice *dev;
|
|
union meson_cpu_id socinfo;
|
|
struct pt_regs regs = { 0 };
|
|
struct chip_id_efuse chip_id_efuse;
|
|
int err;
|
|
|
|
dev = meson_get_sm_device();
|
|
if (IS_ERR(dev))
|
|
return PTR_ERR(dev);
|
|
|
|
/*
|
|
* Request v2. If not supported by secure monitor, then v1 should be
|
|
* returned.
|
|
*/
|
|
regs.regs[1] = 2;
|
|
|
|
err = sm_call_read(dev, &chip_id_efuse, sizeof(chip_id_efuse),
|
|
MESON_SMC_CMD_CHIP_ID_GET, ®s);
|
|
if (err < 0) {
|
|
pr_err("Failed to read chip_id (%d)\n", err);
|
|
return err;
|
|
}
|
|
|
|
if (chip_id_efuse.version == 2) {
|
|
memcpy((u8 *)chip_id, chip_id_efuse.raw,
|
|
sizeof(struct meson_sm_chip_id));
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Legacy chip_id (v1) read out, transform data
|
|
* to expected order format (little-endian)
|
|
*/
|
|
memcpy(chip_id->serial, chip_id_efuse.raw, sizeof(chip_id->serial));
|
|
meson_sm_serial_reverse(chip_id->serial);
|
|
|
|
socinfo.val = meson_get_socinfo();
|
|
if (!socinfo.val)
|
|
return -ENODEV;
|
|
|
|
chip_id->cpu_id = (union meson_cpu_id){
|
|
.raw[CPU_ID_MAJOR] = socinfo.raw[CPU_ID_REG_MAJOR],
|
|
.raw[CPU_ID_PACK] = socinfo.raw[CPU_ID_REG_PACK],
|
|
.raw[CPU_ID_MINOR] = socinfo.raw[CPU_ID_REG_MINOR],
|
|
.raw[CPU_ID_MISC] = socinfo.raw[CPU_ID_REG_MISC],
|
|
};
|
|
|
|
return 0;
|
|
}
|
|
|
|
int meson_sm_get_serial(void *buffer, size_t size)
|
|
{
|
|
struct meson_sm_chip_id chip_id;
|
|
int ret;
|
|
|
|
if (size < SM_SERIAL_SIZE)
|
|
return -EINVAL;
|
|
|
|
ret = meson_sm_get_chip_id(&chip_id);
|
|
if (ret)
|
|
return ret;
|
|
|
|
/*
|
|
* The order of serial inside chip_id and serial which function must
|
|
* return does not match: stick here to big-endian for backward
|
|
* compatibility.
|
|
*/
|
|
meson_sm_serial_reverse(chip_id.serial);
|
|
memcpy(buffer, chip_id.serial, sizeof(chip_id.serial));
|
|
return ret;
|
|
}
|
|
|
|
#define AO_SEC_SD_CFG15 0xfc
|
|
#define REBOOT_REASON_MASK GENMASK(15, 12)
|
|
|
|
int meson_sm_get_reboot_reason(void)
|
|
{
|
|
struct regmap *regmap;
|
|
int nodeoffset;
|
|
ofnode node;
|
|
unsigned int reason;
|
|
|
|
/* find the offset of compatible node */
|
|
nodeoffset = fdt_node_offset_by_compatible(gd->fdt_blob, -1,
|
|
"amlogic,meson-gx-ao-secure");
|
|
if (nodeoffset < 0) {
|
|
printf("%s: failed to get amlogic,meson-gx-ao-secure\n",
|
|
__func__);
|
|
return -ENODEV;
|
|
}
|
|
|
|
/* get regmap from the syscon node */
|
|
node = offset_to_ofnode(nodeoffset);
|
|
regmap = syscon_node_to_regmap(node);
|
|
if (IS_ERR(regmap)) {
|
|
printf("%s: failed to get regmap\n", __func__);
|
|
return -EINVAL;
|
|
}
|
|
|
|
regmap_read(regmap, AO_SEC_SD_CFG15, &reason);
|
|
|
|
/* The SMC call is not used, we directly use AO_SEC_SD_CFG15 */
|
|
return FIELD_GET(REBOOT_REASON_MASK, reason);
|
|
}
|
|
|
|
int meson_sm_pwrdm_set(size_t index, int cmd)
|
|
{
|
|
struct udevice *dev;
|
|
struct pt_regs regs = { 0 };
|
|
int err;
|
|
|
|
dev = meson_get_sm_device();
|
|
if (IS_ERR(dev))
|
|
return PTR_ERR(dev);
|
|
|
|
regs.regs[1] = index;
|
|
regs.regs[2] = cmd;
|
|
|
|
err = sm_call(dev, MESON_SMC_CMD_PWRDM_SET, NULL, ®s);
|
|
if (err)
|
|
pr_err("Failed to %s power domain ind=%zu (%d)\n", cmd == PWRDM_ON ?
|
|
"enable" : "disable", index, err);
|
|
|
|
return err;
|
|
}
|