blob: e9ad1305b8587d61955669be1f4c897b6aedf312 [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Dan Handleye83b0ca2014-01-14 18:17:09 +00002 * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
31#include <arch.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010032#include <asm_macros.S>
Dan Handley2bd4ef22014-04-09 13:14:54 +010033#include <psci.h>
Achin Guptae1aa5162014-06-26 09:58:52 +010034#include <xlat_tables.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010035
36 .globl psci_aff_on_finish_entry
37 .globl psci_aff_suspend_finish_entry
38 .globl __psci_cpu_off
39 .globl __psci_cpu_suspend
Achin Gupta42c52802014-05-09 19:32:25 +010040 .globl psci_power_down_wfi
Achin Gupta4f6ad662013-10-25 09:08:21 +010041
Achin Gupta4f6ad662013-10-25 09:08:21 +010042 /* -----------------------------------------------------
43 * This cpu has been physically powered up. Depending
44 * upon whether it was resumed from suspend or simply
45 * turned on, call the common power on finisher with
46 * the handlers (chosen depending upon original state).
Achin Gupta4f6ad662013-10-25 09:08:21 +010047 * -----------------------------------------------------
48 */
Andrew Thoelke38bde412014-03-18 13:46:55 +000049func psci_aff_on_finish_entry
Achin Gupta4f6ad662013-10-25 09:08:21 +010050 adr x23, psci_afflvl_on_finishers
51 b psci_aff_common_finish_entry
52
53psci_aff_suspend_finish_entry:
54 adr x23, psci_afflvl_suspend_finishers
55
56psci_aff_common_finish_entry:
Achin Gupta9f098352014-07-18 18:38:28 +010057#if !RESET_TO_BL31
58 /* ---------------------------------------------
59 * Enable the instruction cache, stack pointer
60 * and data access alignment checks. Also, set
61 * the EL3 exception endianess to little-endian.
62 * It can be assumed that BL3-1 entrypoint code
63 * will do this when RESET_TO_BL31 is set. The
64 * same assumption cannot be made when another
65 * boot loader executes before BL3-1 in the warm
66 * boot path e.g. BL1.
67 * ---------------------------------------------
68 */
69 mov x1, #(SCTLR_I_BIT | SCTLR_A_BIT | SCTLR_SA_BIT)
70 mrs x0, sctlr_el3
71 orr x0, x0, x1
72 msr sctlr_el3, x0
73 isb
74#endif
75
Achin Guptab739f222014-01-18 16:50:09 +000076 /* ---------------------------------------------
Andrew Thoelke8c28fe02014-06-02 11:40:35 +010077 * Initialise the pcpu cache pointer for the CPU
78 * ---------------------------------------------
79 */
80 bl init_cpu_data_ptr
81
82 /* ---------------------------------------------
Andrew Thoelke4d2d5532014-06-02 12:38:12 +010083 * Set the exception vectors
Achin Guptab739f222014-01-18 16:50:09 +000084 * ---------------------------------------------
85 */
Andrew Thoelke4d2d5532014-06-02 12:38:12 +010086 adr x0, runtime_exceptions
Achin Guptab739f222014-01-18 16:50:09 +000087 msr vbar_el3, x0
88 isb
89
Jeenu Viswambharancaa84932014-02-06 10:36:15 +000090 /* ---------------------------------------------
91 * Use SP_EL0 for the C runtime stack.
92 * ---------------------------------------------
93 */
94 msr spsel, #0
Jeenu Viswambharancaa84932014-02-06 10:36:15 +000095
Achin Guptae1aa5162014-06-26 09:58:52 +010096 /* --------------------------------------------
97 * Give ourselves a stack whose memory will be
98 * marked as Normal-IS-WBWA when the MMU is
99 * enabled.
100 * --------------------------------------------
101 */
Andrew Thoelkef977ed82014-04-28 12:32:02 +0100102 mrs x0, mpidr_el1
Achin Guptae1aa5162014-06-26 09:58:52 +0100103 bl platform_set_stack
104
105 /* --------------------------------------------
106 * Enable the MMU with the DCache disabled. It
107 * is safe to use stacks allocated in normal
108 * memory as a result. All memory accesses are
109 * marked nGnRnE when the MMU is disabled. So
110 * all the stack writes will make it to memory.
111 * All memory accesses are marked Non-cacheable
112 * when the MMU is enabled but D$ is disabled.
113 * So used stack memory is guaranteed to be
114 * visible immediately after the MMU is enabled
115 * Enabling the DCache at the same time as the
116 * MMU can lead to speculatively fetched and
117 * possibly stale stack memory being read from
118 * other caches. This can lead to coherency
119 * issues.
120 * --------------------------------------------
121 */
122 mov x0, #DISABLE_DCACHE
123 bl bl31_plat_enable_mmu
Achin Gupta4f6ad662013-10-25 09:08:21 +0100124
125 /* ---------------------------------------------
126 * Call the finishers starting from affinity
127 * level 0.
128 * ---------------------------------------------
129 */
Andrew Thoelkef977ed82014-04-28 12:32:02 +0100130 mrs x0, mpidr_el1
Achin Guptaa45e3972013-12-05 15:10:48 +0000131 bl get_power_on_target_afflvl
132 cmp x0, xzr
133 b.lt _panic
Andrew Thoelke2bc07852014-06-09 12:44:21 +0100134 mov x2, x23
135 mov x1, x0
136 mov x0, #MPIDR_AFFLVL0
137 bl psci_afflvl_power_on_finish
Achin Gupta4f6ad662013-10-25 09:08:21 +0100138
Jeenu Viswambharancaa84932014-02-06 10:36:15 +0000139 b el3_exit
Achin Gupta4f6ad662013-10-25 09:08:21 +0100140_panic:
141 b _panic
142
Achin Gupta42c52802014-05-09 19:32:25 +0100143 /* --------------------------------------------
144 * This function is called to indicate to the
145 * power controller that it is safe to power
146 * down this cpu. It should not exit the wfi
147 * and will be released from reset upon power
148 * up. 'wfi_spill' is used to catch erroneous
149 * exits from wfi.
150 * --------------------------------------------
151 */
152func psci_power_down_wfi
Andrew Thoelke42e75a72014-04-28 12:28:39 +0100153 dsb sy // ensure write buffer empty
Achin Gupta4f6ad662013-10-25 09:08:21 +0100154 wfi
155wfi_spill:
156 b wfi_spill
157