123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216 |
- // SPDX-License-Identifier: GPL-2.0+
- /*
- * (C) Copyright 2016 Beniamino Galvani <b.galvani@gmail.com>
- *
- * Secure monitor calls.
- */
- #include <common.h>
- #include <command.h>
- #include <env.h>
- #include <asm/arch/sm.h>
- #include <asm/cache.h>
- #include <linux/err.h>
- #include <linux/kernel.h>
- #include <dm.h>
- #include <linux/bitfield.h>
- #include <regmap.h>
- #include <syscon.h>
- #define FN_GET_SHARE_MEM_INPUT_BASE 0x82000020
- #define FN_GET_SHARE_MEM_OUTPUT_BASE 0x82000021
- #define FN_EFUSE_READ 0x82000030
- #define FN_EFUSE_WRITE 0x82000031
- #define FN_CHIP_ID 0x82000044
- static void *shmem_input;
- static void *shmem_output;
- static void meson_init_shmem(void)
- {
- struct pt_regs regs;
- if (shmem_input && shmem_output)
- return;
- regs.regs[0] = FN_GET_SHARE_MEM_INPUT_BASE;
- smc_call(®s);
- shmem_input = (void *)regs.regs[0];
- regs.regs[0] = FN_GET_SHARE_MEM_OUTPUT_BASE;
- smc_call(®s);
- shmem_output = (void *)regs.regs[0];
- debug("Secure Monitor shmem: 0x%p 0x%p\n", shmem_input, shmem_output);
- }
- ssize_t meson_sm_read_efuse(uintptr_t offset, void *buffer, size_t size)
- {
- struct pt_regs regs;
- meson_init_shmem();
- regs.regs[0] = FN_EFUSE_READ;
- regs.regs[1] = offset;
- regs.regs[2] = size;
- smc_call(®s);
- if (regs.regs[0] == 0)
- return -1;
- memcpy(buffer, shmem_output, min(size, regs.regs[0]));
- return regs.regs[0];
- }
- #define SM_CHIP_ID_LENGTH 119
- #define SM_CHIP_ID_OFFSET 4
- #define SM_CHIP_ID_SIZE 12
- int meson_sm_get_serial(void *buffer, size_t size)
- {
- struct pt_regs regs;
- meson_init_shmem();
- regs.regs[0] = FN_CHIP_ID;
- regs.regs[1] = 0;
- regs.regs[2] = 0;
- smc_call(®s);
- memcpy(buffer, shmem_output + SM_CHIP_ID_OFFSET,
- min_t(size_t, size, SM_CHIP_ID_SIZE));
- return 0;
- }
- #define AO_SEC_SD_CFG15 0xfc
- #define REBOOT_REASON_MASK GENMASK(15, 12)
- int meson_sm_get_reboot_reason(void)
- {
- struct regmap *regmap;
- int nodeoffset;
- ofnode node;
- unsigned int reason;
- /* find the offset of compatible node */
- nodeoffset = fdt_node_offset_by_compatible(gd->fdt_blob, -1,
- "amlogic,meson-gx-ao-secure");
- if (nodeoffset < 0) {
- printf("%s: failed to get amlogic,meson-gx-ao-secure\n",
- __func__);
- return -ENODEV;
- }
- /* get regmap from the syscon node */
- node = offset_to_ofnode(nodeoffset);
- regmap = syscon_node_to_regmap(node);
- if (IS_ERR(regmap)) {
- printf("%s: failed to get regmap\n", __func__);
- return -EINVAL;
- }
- regmap_read(regmap, AO_SEC_SD_CFG15, &reason);
- /* The SMC call is not used, we directly use AO_SEC_SD_CFG15 */
- return FIELD_GET(REBOOT_REASON_MASK, reason);
- }
- static int do_sm_serial(struct cmd_tbl *cmdtp, int flag, int argc,
- char *const argv[])
- {
- ulong address;
- int ret;
- if (argc < 2)
- return CMD_RET_USAGE;
- address = simple_strtoul(argv[1], NULL, 0);
- ret = meson_sm_get_serial((void *)address, SM_CHIP_ID_SIZE);
- if (ret)
- return CMD_RET_FAILURE;
- return CMD_RET_SUCCESS;
- }
- #define MAX_REBOOT_REASONS 14
- static const char *reboot_reasons[MAX_REBOOT_REASONS] = {
- [REBOOT_REASON_COLD] = "cold_boot",
- [REBOOT_REASON_NORMAL] = "normal",
- [REBOOT_REASON_RECOVERY] = "recovery",
- [REBOOT_REASON_UPDATE] = "update",
- [REBOOT_REASON_FASTBOOT] = "fastboot",
- [REBOOT_REASON_SUSPEND_OFF] = "suspend_off",
- [REBOOT_REASON_HIBERNATE] = "hibernate",
- [REBOOT_REASON_BOOTLOADER] = "bootloader",
- [REBOOT_REASON_SHUTDOWN_REBOOT] = "shutdown_reboot",
- [REBOOT_REASON_RPMBP] = "rpmbp",
- [REBOOT_REASON_CRASH_DUMP] = "crash_dump",
- [REBOOT_REASON_KERNEL_PANIC] = "kernel_panic",
- [REBOOT_REASON_WATCHDOG_REBOOT] = "watchdog_reboot",
- };
- static int do_sm_reboot_reason(struct cmd_tbl *cmdtp, int flag, int argc,
- char *const argv[])
- {
- const char *reason_str;
- char *destarg = NULL;
- int reason;
- if (argc > 1)
- destarg = argv[1];
- reason = meson_sm_get_reboot_reason();
- if (reason < 0)
- return CMD_RET_FAILURE;
- if (reason >= MAX_REBOOT_REASONS ||
- !reboot_reasons[reason])
- reason_str = "unknown";
- else
- reason_str = reboot_reasons[reason];
- if (destarg)
- env_set(destarg, reason_str);
- else
- printf("reboot reason: %s (%x)\n", reason_str, reason);
- return CMD_RET_SUCCESS;
- }
- static struct cmd_tbl cmd_sm_sub[] = {
- U_BOOT_CMD_MKENT(serial, 2, 1, do_sm_serial, "", ""),
- U_BOOT_CMD_MKENT(reboot_reason, 1, 1, do_sm_reboot_reason, "", ""),
- };
- static int do_sm(struct cmd_tbl *cmdtp, int flag, int argc,
- char *const argv[])
- {
- struct cmd_tbl *c;
- if (argc < 2)
- return CMD_RET_USAGE;
- /* Strip off leading 'sm' command argument */
- argc--;
- argv++;
- c = find_cmd_tbl(argv[0], &cmd_sm_sub[0], ARRAY_SIZE(cmd_sm_sub));
- if (c)
- return c->cmd(cmdtp, flag, argc, argv);
- else
- return CMD_RET_USAGE;
- }
- U_BOOT_CMD(
- sm, 5, 0, do_sm,
- "Secure Monitor Control",
- "serial <address> - read chip unique id to memory address\n"
- "sm reboot_reason [name] - get reboot reason and store to to environment"
- );
|