blob: 37d038423f297a752b1349a1ca38f5cdf1618573 [file] [log] [blame]
Soren Brinkmann76fcae32016-03-06 20:16:27 -08001/*
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +05302 * Copyright (c) 2013-2020, ARM Limited and Contributors. All rights reserved.
Rajan Vaja566b2f92022-08-31 12:54:38 +02003 * Copyright (c) 2019-2022, Xilinx, Inc. All rights reserved.
4 * Copyright (c) 2022, Advanced Micro Devices, Inc. All rights reserved.
Soren Brinkmann76fcae32016-03-06 20:16:27 -08005 *
dp-armfa3cf0b2017-05-03 09:38:09 +01006 * SPDX-License-Identifier: BSD-3-Clause
Soren Brinkmann76fcae32016-03-06 20:16:27 -08007 */
8
Jolly Shah259afe52019-01-09 12:37:57 -08009
Isla Mitchelle3631462017-07-14 10:46:32 +010010#include <arch_helpers.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000011#include <lib/bakery_lock.h>
12#include <lib/mmio.h>
Jolly Shahc2583ab2019-01-08 11:31:49 -080013#include <ipi.h>
Jolly Shah4c172372019-01-08 11:21:29 -080014#include <plat_ipi.h>
Jolly Shah0bfd7002019-01-08 11:10:47 -080015#include <plat_private.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000016#include <plat/common/platform.h>
17
Rajan Vaja566b2f92022-08-31 12:54:38 +020018#include "pm_defs.h"
Isla Mitchelle3631462017-07-14 10:46:32 +010019#include "pm_ipi.h"
Soren Brinkmann76fcae32016-03-06 20:16:27 -080020
HariBabu Gattem9f9db612022-09-15 22:35:11 -070021#define ERROR_CODE_MASK (0xFFFFU)
HariBabu Gattemaa811712022-10-07 00:07:49 -070022#define PM_OFFSET (0U)
Ravi Patel65123712020-11-23 04:19:08 -080023
Stefan Krsmanovicc5e9f662016-05-20 15:51:08 +020024DEFINE_BAKERY_LOCK(pm_secure_lock);
Soren Brinkmann76fcae32016-03-06 20:16:27 -080025
Soren Brinkmann76fcae32016-03-06 20:16:27 -080026/**
Jolly Shah9bb628d2019-01-07 12:53:32 -080027 * pm_ipi_init() - Initialize IPI peripheral for communication with
28 * remote processor
Soren Brinkmann76fcae32016-03-06 20:16:27 -080029 *
Wendy Liang328105c2017-10-03 23:21:11 -070030 * @proc Pointer to the processor who is initiating request
Soren Brinkmann76fcae32016-03-06 20:16:27 -080031 * @return On success, the initialization function must return 0.
32 * Any other return value will cause the framework to ignore
33 * the service
34 *
Soren Brinkmann76fcae32016-03-06 20:16:27 -080035 * Called from pm_setup initialization function
36 */
HariBabu Gattemaa811712022-10-07 00:07:49 -070037void pm_ipi_init(const struct pm_proc *proc)
Soren Brinkmann76fcae32016-03-06 20:16:27 -080038{
39 bakery_lock_init(&pm_secure_lock);
Jolly Shah36c930b2019-01-07 12:51:40 -080040 ipi_mb_open(proc->ipi->local_ipi_id, proc->ipi->remote_ipi_id);
Soren Brinkmann76fcae32016-03-06 20:16:27 -080041}
42
43/**
Jolly Shah9bb628d2019-01-07 12:53:32 -080044 * pm_ipi_send_common() - Sends IPI request to the remote processor
Soren Brinkmann76fcae32016-03-06 20:16:27 -080045 * @proc Pointer to the processor who is initiating request
46 * @payload API id and call arguments to be written in IPI buffer
47 *
48 * Send an IPI request to the power controller. Caller needs to hold
49 * the 'pm_secure_lock' lock.
50 *
51 * @return Returns status, either success or error+reason
52 */
53static enum pm_ret_status pm_ipi_send_common(const struct pm_proc *proc,
Tejas Patelaf4b10e2018-02-09 02:42:59 -080054 uint32_t payload[PAYLOAD_ARG_CNT],
55 uint32_t is_blocking)
Soren Brinkmann76fcae32016-03-06 20:16:27 -080056{
HariBabu Gattemaa811712022-10-07 00:07:49 -070057 uint32_t offset = PM_OFFSET;
Soren Brinkmann76fcae32016-03-06 20:16:27 -080058 uintptr_t buffer_base = proc->ipi->buffer_base +
Jolly Shah9bb628d2019-01-07 12:53:32 -080059 IPI_BUFFER_TARGET_REMOTE_OFFSET +
Soren Brinkmann76fcae32016-03-06 20:16:27 -080060 IPI_BUFFER_REQ_OFFSET;
Venkatesh Yadav Abbarapubfa2a2a2021-02-19 01:40:14 -070061#if IPI_CRC_CHECK
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +053062 payload[PAYLOAD_CRC_POS] = calculate_crc(payload, IPI_W0_TO_W6_SIZE);
63#endif
Soren Brinkmann76fcae32016-03-06 20:16:27 -080064
Soren Brinkmann76fcae32016-03-06 20:16:27 -080065 /* Write payload into IPI buffer */
66 for (size_t i = 0; i < PAYLOAD_ARG_CNT; i++) {
67 mmio_write_32(buffer_base + offset, payload[i]);
68 offset += PAYLOAD_ARG_SIZE;
69 }
Tejas Patelaf4b10e2018-02-09 02:42:59 -080070
Jolly Shah9bb628d2019-01-07 12:53:32 -080071 /* Generate IPI to remote processor */
Venkatesh Yadav Abbarapuefa1d322021-08-04 21:33:15 -060072 ipi_mb_notify(proc->ipi->local_ipi_id, proc->ipi->remote_ipi_id,
Tejas Patelaf4b10e2018-02-09 02:42:59 -080073 is_blocking);
Soren Brinkmann76fcae32016-03-06 20:16:27 -080074
Venkatesh Yadav Abbarapuefa1d322021-08-04 21:33:15 -060075 return PM_RET_SUCCESS;
Soren Brinkmann76fcae32016-03-06 20:16:27 -080076}
77
78/**
Jolly Shah9bb628d2019-01-07 12:53:32 -080079 * pm_ipi_send_non_blocking() - Sends IPI request to the remote processor
80 * without blocking notification
Tejas Patelaf4b10e2018-02-09 02:42:59 -080081 * @proc Pointer to the processor who is initiating request
82 * @payload API id and call arguments to be written in IPI buffer
83 *
84 * Send an IPI request to the power controller.
85 *
86 * @return Returns status, either success or error+reason
87 */
88enum pm_ret_status pm_ipi_send_non_blocking(const struct pm_proc *proc,
89 uint32_t payload[PAYLOAD_ARG_CNT])
90{
91 enum pm_ret_status ret;
92
93 bakery_lock_get(&pm_secure_lock);
94
95 ret = pm_ipi_send_common(proc, payload, IPI_NON_BLOCKING);
96
97 bakery_lock_release(&pm_secure_lock);
98
99 return ret;
100}
101
102/**
Jolly Shah9bb628d2019-01-07 12:53:32 -0800103 * pm_ipi_send() - Sends IPI request to the remote processor
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800104 * @proc Pointer to the processor who is initiating request
105 * @payload API id and call arguments to be written in IPI buffer
106 *
107 * Send an IPI request to the power controller.
108 *
109 * @return Returns status, either success or error+reason
110 */
111enum pm_ret_status pm_ipi_send(const struct pm_proc *proc,
112 uint32_t payload[PAYLOAD_ARG_CNT])
113{
114 enum pm_ret_status ret;
115
116 bakery_lock_get(&pm_secure_lock);
117
Tejas Patelaf4b10e2018-02-09 02:42:59 -0800118 ret = pm_ipi_send_common(proc, payload, IPI_BLOCKING);
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800119
120 bakery_lock_release(&pm_secure_lock);
121
122 return ret;
123}
124
125
126/**
Jolly Shah9bb628d2019-01-07 12:53:32 -0800127 * pm_ipi_buff_read() - Reads IPI response after remote processor has handled
128 * interrupt
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800129 * @proc Pointer to the processor who is waiting and reading response
Soren Brinkmannd6c9e032016-09-22 11:35:47 -0700130 * @value Used to return value from IPI buffer element (optional)
131 * @count Number of values to return in @value
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800132 *
133 * @return Returns status, either success or error+reason
134 */
135static enum pm_ret_status pm_ipi_buff_read(const struct pm_proc *proc,
Venkatesh Yadav Abbarapue7c45382022-05-19 14:49:49 +0530136 uint32_t *value, size_t count)
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800137{
Soren Brinkmannd6c9e032016-09-22 11:35:47 -0700138 size_t i;
Naman Trivedi Manojbhaic0dfba82023-03-07 12:41:11 +0530139 enum pm_ret_status ret;
Venkatesh Yadav Abbarapubfa2a2a2021-02-19 01:40:14 -0700140#if IPI_CRC_CHECK
Naman Trivedi Manojbhaic0dfba82023-03-07 12:41:11 +0530141 uint32_t *payload_ptr = value;
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530142 size_t j;
Venkatesh Yadav Abbarapue7c45382022-05-19 14:49:49 +0530143 uint32_t response_payload[PAYLOAD_ARG_CNT];
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530144#endif
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800145 uintptr_t buffer_base = proc->ipi->buffer_base +
Jolly Shah9bb628d2019-01-07 12:53:32 -0800146 IPI_BUFFER_TARGET_REMOTE_OFFSET +
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800147 IPI_BUFFER_RESP_OFFSET;
148
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800149 /*
150 * Read response from IPI buffer
151 * buf-0: success or error+reason
152 * buf-1: value
153 * buf-2: unused
154 * buf-3: unused
155 */
Soren Brinkmannd6c9e032016-09-22 11:35:47 -0700156 for (i = 1; i <= count; i++) {
157 *value = mmio_read_32(buffer_base + (i * PAYLOAD_ARG_SIZE));
158 value++;
159 }
Naman Trivedi Manojbhaic0dfba82023-03-07 12:41:11 +0530160
161 ret = mmio_read_32(buffer_base);
Venkatesh Yadav Abbarapubfa2a2a2021-02-19 01:40:14 -0700162#if IPI_CRC_CHECK
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530163 for (j = 0; j < PAYLOAD_ARG_CNT; j++) {
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530164 response_payload[j] = mmio_read_32(buffer_base +
165 (j * PAYLOAD_ARG_SIZE));
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530166 }
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530167
168 if (response_payload[PAYLOAD_CRC_POS] !=
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530169 calculate_crc(response_payload, IPI_W0_TO_W6_SIZE)) {
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530170 NOTICE("ERROR in CRC response payload value:0x%x\n",
171 response_payload[PAYLOAD_CRC_POS]);
Naman Trivedi Manojbhaic0dfba82023-03-07 12:41:11 +0530172 ret = PM_RET_ERROR_INVALID_CRC;
173 /* Payload data is invalid as CRC validation failed
174 * Clear the payload to avoid leakage of data to upper layers
175 */
176 memset(payload_ptr, 0, count);
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530177 }
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530178#endif
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800179
Naman Trivedi Manojbhaic0dfba82023-03-07 12:41:11 +0530180 return ret;
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800181}
182
183/**
Naman Patele9756422023-02-15 01:01:21 -0800184 * pm_ipi_buff_read_callb() - Callback function that reads value from
185 * ipi response buffer
186 * @value Used to return value from IPI buffer element
Soren Brinkmann84f0af42016-09-30 14:24:25 -0700187 * @count Number of values to return in @value
188 *
Naman Patele9756422023-02-15 01:01:21 -0800189 * This callback function fills requested data in @value from ipi response
190 * buffer.
Naman Trivedi Manojbhaibeec83f2023-03-07 12:41:12 +0530191 * @return Returns status, either success or error
Soren Brinkmann84f0af42016-09-30 14:24:25 -0700192 */
Naman Trivedi Manojbhaibeec83f2023-03-07 12:41:12 +0530193enum pm_ret_status pm_ipi_buff_read_callb(uint32_t *value, size_t count)
Soren Brinkmann84f0af42016-09-30 14:24:25 -0700194{
195 size_t i;
Venkatesh Yadav Abbarapubfa2a2a2021-02-19 01:40:14 -0700196#if IPI_CRC_CHECK
Naman Trivedi Manojbhaibeec83f2023-03-07 12:41:12 +0530197 uint32_t *payload_ptr = value;
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530198 size_t j;
HariBabu Gattemaa811712022-10-07 00:07:49 -0700199 unsigned int response_payload[PAYLOAD_ARG_CNT] = {0};
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530200#endif
Jolly Shah9bb628d2019-01-07 12:53:32 -0800201 uintptr_t buffer_base = IPI_BUFFER_REMOTE_BASE +
202 IPI_BUFFER_TARGET_LOCAL_OFFSET +
Soren Brinkmann84f0af42016-09-30 14:24:25 -0700203 IPI_BUFFER_REQ_OFFSET;
Naman Trivedi Manojbhaibeec83f2023-03-07 12:41:12 +0530204 enum pm_ret_status ret = PM_RET_SUCCESS;
Soren Brinkmann84f0af42016-09-30 14:24:25 -0700205
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530206 if (count > IPI_BUFFER_MAX_WORDS) {
Soren Brinkmann84f0af42016-09-30 14:24:25 -0700207 count = IPI_BUFFER_MAX_WORDS;
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530208 }
Soren Brinkmann84f0af42016-09-30 14:24:25 -0700209
210 for (i = 0; i <= count; i++) {
211 *value = mmio_read_32(buffer_base + (i * PAYLOAD_ARG_SIZE));
212 value++;
213 }
Venkatesh Yadav Abbarapubfa2a2a2021-02-19 01:40:14 -0700214#if IPI_CRC_CHECK
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530215 for (j = 0; j < PAYLOAD_ARG_CNT; j++) {
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530216 response_payload[j] = mmio_read_32(buffer_base +
217 (j * PAYLOAD_ARG_SIZE));
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530218 }
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530219
220 if (response_payload[PAYLOAD_CRC_POS] !=
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530221 calculate_crc(response_payload, IPI_W0_TO_W6_SIZE)) {
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530222 NOTICE("ERROR in CRC response payload value:0x%x\n",
223 response_payload[PAYLOAD_CRC_POS]);
Naman Trivedi Manojbhaibeec83f2023-03-07 12:41:12 +0530224 ret = PM_RET_ERROR_INVALID_CRC;
225 /* Payload data is invalid as CRC validation failed
226 * Clear the payload to avoid leakage of data to upper layers
227 */
228 memset(payload_ptr, 0, count);
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530229 }
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530230#endif
Naman Trivedi Manojbhaibeec83f2023-03-07 12:41:12 +0530231 return ret;
Soren Brinkmann84f0af42016-09-30 14:24:25 -0700232}
233
234/**
Jolly Shah9bb628d2019-01-07 12:53:32 -0800235 * pm_ipi_send_sync() - Sends IPI request to the remote processor
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800236 * @proc Pointer to the processor who is initiating request
237 * @payload API id and call arguments to be written in IPI buffer
Soren Brinkmannd6c9e032016-09-22 11:35:47 -0700238 * @value Used to return value from IPI buffer element (optional)
239 * @count Number of values to return in @value
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800240 *
241 * Send an IPI request to the power controller and wait for it to be handled.
242 *
243 * @return Returns status, either success or error+reason and, optionally,
244 * @value
245 */
246enum pm_ret_status pm_ipi_send_sync(const struct pm_proc *proc,
247 uint32_t payload[PAYLOAD_ARG_CNT],
Venkatesh Yadav Abbarapue7c45382022-05-19 14:49:49 +0530248 uint32_t *value, size_t count)
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800249{
250 enum pm_ret_status ret;
251
252 bakery_lock_get(&pm_secure_lock);
253
Tejas Patelaf4b10e2018-02-09 02:42:59 -0800254 ret = pm_ipi_send_common(proc, payload, IPI_BLOCKING);
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530255 if (ret != PM_RET_SUCCESS) {
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800256 goto unlock;
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530257 }
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800258
Ravi Patel65123712020-11-23 04:19:08 -0800259 ret = ERROR_CODE_MASK & (pm_ipi_buff_read(proc, value, count));
Soren Brinkmann76fcae32016-03-06 20:16:27 -0800260
261unlock:
262 bakery_lock_release(&pm_secure_lock);
263
264 return ret;
265}
Soren Brinkmanna1b0a902016-09-30 11:30:21 -0700266
Wendy Liang328105c2017-10-03 23:21:11 -0700267void pm_ipi_irq_enable(const struct pm_proc *proc)
Soren Brinkmanna1b0a902016-09-30 11:30:21 -0700268{
Jolly Shah36c930b2019-01-07 12:51:40 -0800269 ipi_mb_enable_irq(proc->ipi->local_ipi_id, proc->ipi->remote_ipi_id);
Soren Brinkmanna1b0a902016-09-30 11:30:21 -0700270}
Soren Brinkmann84f0af42016-09-30 14:24:25 -0700271
Wendy Liang328105c2017-10-03 23:21:11 -0700272void pm_ipi_irq_clear(const struct pm_proc *proc)
Soren Brinkmann84f0af42016-09-30 14:24:25 -0700273{
Jolly Shah36c930b2019-01-07 12:51:40 -0800274 ipi_mb_ack(proc->ipi->local_ipi_id, proc->ipi->remote_ipi_id);
Soren Brinkmann84f0af42016-09-30 14:24:25 -0700275}
Jolly Shah259afe52019-01-09 12:37:57 -0800276
277uint32_t pm_ipi_irq_status(const struct pm_proc *proc)
278{
Venkatesh Yadav Abbarapue7c45382022-05-19 14:49:49 +0530279 int32_t ret;
Jolly Shah259afe52019-01-09 12:37:57 -0800280
281 ret = ipi_mb_enquire_status(proc->ipi->local_ipi_id,
282 proc->ipi->remote_ipi_id);
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530283 if (ret & IPI_MB_STATUS_RECV_PENDING) {
Jolly Shah259afe52019-01-09 12:37:57 -0800284 return 1;
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530285 } else {
Jolly Shah259afe52019-01-09 12:37:57 -0800286 return 0;
Venkatesh Yadav Abbarapu987fad32022-04-29 13:52:00 +0530287 }
Jolly Shah259afe52019-01-09 12:37:57 -0800288}
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530289
Venkatesh Yadav Abbarapubfa2a2a2021-02-19 01:40:14 -0700290#if IPI_CRC_CHECK
Venkatesh Yadav Abbarapu28b77592022-04-11 09:25:44 +0530291uint32_t calculate_crc(uint32_t payload[PAYLOAD_ARG_CNT], uint32_t bufsize)
Venkatesh Yadav Abbarapu35a8be92019-04-04 14:23:32 +0530292{
293 uint32_t crcinit = CRC_INIT_VALUE;
294 uint32_t order = CRC_ORDER;
295 uint32_t polynom = CRC_POLYNOM;
296 uint32_t i, j, c, bit, datain, crcmask, crchighbit;
297 uint32_t crc = crcinit;
298
299 crcmask = ((uint32_t)((1U << (order - 1U)) - 1U) << 1U) | 1U;
300 crchighbit = (uint32_t)(1U << (order - 1U));
301
302 for (i = 0U; i < bufsize; i++) {
303 datain = mmio_read_8((unsigned long)payload + i);
304 c = datain;
305 j = 0x80U;
306 while (j != 0U) {
307 bit = crc & crchighbit;
308 crc <<= 1U;
309 if (0U != (c & j))
310 bit ^= crchighbit;
311 if (bit != 0U)
312 crc ^= polynom;
313 j >>= 1U;
314 }
315 crc &= crcmask;
316 }
317 return crc;
318}
319#endif