// SPDX-License-Identifier: GPL-2.0+ /* * (C) Copyright 2016 Beniamino Galvani <b.galvani@gmail.com> * * Secure monitor calls. */ #include <common.h> #include <log.h> #include <asm/arch/sm.h> #include <asm/cache.h> #include <asm/global_data.h> #include <asm/ptrace.h> #include <linux/bitops.h> #include <linux/err.h> #include <linux/kernel.h> #include <dm.h> #include <linux/bitfield.h> #include <regmap.h> #include <syscon.h> #define FN_GET_SHARE_MEM_INPUT_BASE 0x82000020 #define FN_GET_SHARE_MEM_OUTPUT_BASE 0x82000021 #define FN_EFUSE_READ 0x82000030 #define FN_EFUSE_WRITE 0x82000031 #define FN_CHIP_ID 0x82000044 static void *shmem_input; static void *shmem_output; static void meson_init_shmem(void) { struct pt_regs regs; if (shmem_input && shmem_output) return; regs.regs[0] = FN_GET_SHARE_MEM_INPUT_BASE; smc_call(®s); shmem_input = (void *)regs.regs[0]; regs.regs[0] = FN_GET_SHARE_MEM_OUTPUT_BASE; smc_call(®s); shmem_output = (void *)regs.regs[0]; debug("Secure Monitor shmem: 0x%p 0x%p\n", shmem_input, shmem_output); } ssize_t meson_sm_read_efuse(uintptr_t offset, void *buffer, size_t size) { struct pt_regs regs; meson_init_shmem(); regs.regs[0] = FN_EFUSE_READ; regs.regs[1] = offset; regs.regs[2] = size; smc_call(®s); if (regs.regs[0] == 0) return -1; memcpy(buffer, shmem_output, min(size, regs.regs[0])); return regs.regs[0]; } ssize_t meson_sm_write_efuse(uintptr_t offset, void *buffer, size_t size) { struct pt_regs regs; meson_init_shmem(); memcpy(shmem_input, buffer, size); regs.regs[0] = FN_EFUSE_WRITE; regs.regs[1] = offset; regs.regs[2] = size; smc_call(®s); return regs.regs[0]; } #define SM_CHIP_ID_LENGTH 119 #define SM_CHIP_ID_OFFSET 4 #define SM_CHIP_ID_SIZE 12 int meson_sm_get_serial(void *buffer, size_t size) { struct pt_regs regs; meson_init_shmem(); regs.regs[0] = FN_CHIP_ID; regs.regs[1] = 0; regs.regs[2] = 0; smc_call(®s); memcpy(buffer, shmem_output + SM_CHIP_ID_OFFSET, min_t(size_t, size, SM_CHIP_ID_SIZE)); return 0; } #define AO_SEC_SD_CFG15 0xfc #define REBOOT_REASON_MASK GENMASK(15, 12) int meson_sm_get_reboot_reason(void) { struct regmap *regmap; int nodeoffset; ofnode node; unsigned int reason; /* find the offset of compatible node */ nodeoffset = fdt_node_offset_by_compatible(gd->fdt_blob, -1, "amlogic,meson-gx-ao-secure"); if (nodeoffset < 0) { printf("%s: failed to get amlogic,meson-gx-ao-secure\n", __func__); return -ENODEV; } /* get regmap from the syscon node */ node = offset_to_ofnode(nodeoffset); regmap = syscon_node_to_regmap(node); if (IS_ERR(regmap)) { printf("%s: failed to get regmap\n", __func__); return -EINVAL; } regmap_read(regmap, AO_SEC_SD_CFG15, &reason); /* The SMC call is not used, we directly use AO_SEC_SD_CFG15 */ return FIELD_GET(REBOOT_REASON_MASK, reason); }