blob: 1773fae205c9e1f92269bf1ff39ce5045639552e [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001/* SPDX-License-Identifier: GPL-2.0+ */
Andre Przywarae776fd22013-09-19 18:06:40 +02002/*
Andre Przywara8de142c2013-09-19 18:06:45 +02003 * code for switching cores into non-secure state and into HYP mode
Andre Przywarae776fd22013-09-19 18:06:40 +02004 *
5 * Copyright (c) 2013 Andre Przywara <andre.przywara@linaro.org>
Andre Przywarae776fd22013-09-19 18:06:40 +02006 */
7
8#include <config.h>
Andre Przywaradd5e8da2013-09-19 18:06:41 +02009#include <linux/linkage.h>
10#include <asm/gic.h>
11#include <asm/armv7.h>
Marc Zyngier855ca662014-07-12 14:24:03 +010012#include <asm/proc-armv/ptrace.h>
Andre Przywaradd5e8da2013-09-19 18:06:41 +020013
14.arch_extension sec
Andre Przywara8de142c2013-09-19 18:06:45 +020015.arch_extension virt
Andre Przywarae776fd22013-09-19 18:06:40 +020016
Marc Zyngier855ca662014-07-12 14:24:03 +010017 .pushsection ._secure.text, "ax"
18
Masahiro Yamada92bd4ac2013-10-07 11:46:56 +090019 .align 5
Andre Przywara8de142c2013-09-19 18:06:45 +020020/* the vector table for secure state and HYP mode */
Andre Przywarae776fd22013-09-19 18:06:40 +020021_monitor_vectors:
22 .word 0 /* reset */
23 .word 0 /* undef */
24 adr pc, _secure_monitor
25 .word 0
26 .word 0
Marc Zyngier855ca662014-07-12 14:24:03 +010027 .word 0
Andre Przywarae776fd22013-09-19 18:06:40 +020028 .word 0
29 .word 0
Andre Przywarae776fd22013-09-19 18:06:40 +020030
Marc Zyngier855ca662014-07-12 14:24:03 +010031.macro is_cpu_virt_capable tmp
32 mrc p15, 0, \tmp, c0, c1, 1 @ read ID_PFR1
33 and \tmp, \tmp, #CPUID_ARM_VIRT_MASK @ mask virtualization bits
34 cmp \tmp, #(1 << CPUID_ARM_VIRT_SHIFT)
35.endm
36
Andre Przywarae776fd22013-09-19 18:06:40 +020037/*
38 * secure monitor handler
Bin Meng75574052016-02-05 19:30:11 -080039 * U-Boot calls this "software interrupt" in start.S
Andre Przywarae776fd22013-09-19 18:06:40 +020040 * This is executed on a "smc" instruction, we use a "smc #0" to switch
41 * to non-secure state.
Marc Zyngier855ca662014-07-12 14:24:03 +010042 * r0, r1, r2: passed to the callee
43 * ip: target PC
Andre Przywarae776fd22013-09-19 18:06:40 +020044 */
Andre Przywarae776fd22013-09-19 18:06:40 +020045_secure_monitor:
Marc Zyngier03a12012014-07-12 14:24:05 +010046#ifdef CONFIG_ARMV7_PSCI
47 ldr r5, =_psci_vectors @ Switch to the next monitor
48 mcr p15, 0, r5, c12, c0, 1
49 isb
50
Chen-Yu Tsai70617c72016-06-19 12:38:31 +080051 @ Obtain a secure stack
52 bl psci_stack_setup
53
54 @ Configure the PSCI backend
55 push {r0, r1, r2, ip}
Marc Zyngier03a12012014-07-12 14:24:05 +010056 bl psci_arch_init
Chen-Yu Tsai70617c72016-06-19 12:38:31 +080057 pop {r0, r1, r2, ip}
Marc Zyngier03a12012014-07-12 14:24:05 +010058#endif
59
Ian Campbell363e4242015-09-29 10:27:09 +010060#ifdef CONFIG_ARM_ERRATA_773022
61 mrc p15, 0, r5, c1, c0, 1
62 orr r5, r5, #(1 << 1)
63 mcr p15, 0, r5, c1, c0, 1
64 isb
65#endif
66
67#ifdef CONFIG_ARM_ERRATA_774769
68 mrc p15, 0, r5, c1, c0, 1
69 orr r5, r5, #(1 << 25)
70 mcr p15, 0, r5, c1, c0, 1
71 isb
72#endif
73
Marc Zyngier855ca662014-07-12 14:24:03 +010074 mrc p15, 0, r5, c1, c1, 0 @ read SCR
Marc Zyngier03a12012014-07-12 14:24:05 +010075 bic r5, r5, #0x4a @ clear IRQ, EA, nET bits
Marc Zyngier855ca662014-07-12 14:24:03 +010076 orr r5, r5, #0x31 @ enable NS, AW, FW bits
Marc Zyngier03a12012014-07-12 14:24:05 +010077 @ FIQ preserved for secure mode
Marc Zyngier855ca662014-07-12 14:24:03 +010078 mov r6, #SVC_MODE @ default mode is SVC
79 is_cpu_virt_capable r4
Marc Zyngier4cd832b2014-07-12 14:24:00 +010080#ifdef CONFIG_ARMV7_VIRT
Marc Zyngier855ca662014-07-12 14:24:03 +010081 orreq r5, r5, #0x100 @ allow HVC instruction
82 moveq r6, #HYP_MODE @ Enter the kernel as HYP
Mark Kettenis6e2f8f12018-06-15 23:47:11 +020083 mrseq r3, sp_svc
84 msreq sp_hyp, r3 @ migrate SP
Andre Przywara8de142c2013-09-19 18:06:45 +020085#endif
86
Marc Zyngier855ca662014-07-12 14:24:03 +010087 mcr p15, 0, r5, c1, c1, 0 @ write SCR (with NS bit set)
Marc Zyngiere9195772014-07-12 14:23:59 +010088 isb
Andre Przywarae776fd22013-09-19 18:06:40 +020089
Marc Zyngier4cd832b2014-07-12 14:24:00 +010090 bne 1f
Andre Przywara8de142c2013-09-19 18:06:45 +020091
Marc Zyngier4cd832b2014-07-12 14:24:00 +010092 @ Reset CNTVOFF to 0 before leaving monitor mode
Marc Zyngier855ca662014-07-12 14:24:03 +010093 mrc p15, 0, r4, c0, c1, 1 @ read ID_PFR1
94 ands r4, r4, #CPUID_ARM_GENTIMER_MASK @ test arch timer bits
95 movne r4, #0
96 mcrrne p15, 4, r4, r4, c14 @ Reset CNTVOFF to zero
Marc Zyngier4cd832b2014-07-12 14:24:00 +0100971:
Marc Zyngier855ca662014-07-12 14:24:03 +010098 mov lr, ip
99 mov ip, #(F_BIT | I_BIT | A_BIT) @ Set A, I and F
100 tst lr, #1 @ Check for Thumb PC
101 orrne ip, ip, #T_BIT @ Set T if Thumb
102 orr ip, ip, r6 @ Slot target mode in
103 msr spsr_cxfs, ip @ Set full SPSR
104 movs pc, lr @ ERET to non-secure
105
106ENTRY(_do_nonsec_entry)
107 mov ip, r0
108 mov r0, r1
109 mov r1, r2
110 mov r2, r3
111 smc #0
112ENDPROC(_do_nonsec_entry)
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200113
Marc Zyngier855ca662014-07-12 14:24:03 +0100114.macro get_cbar_addr addr
115#ifdef CONFIG_ARM_GIC_BASE_ADDRESS
116 ldr \addr, =CONFIG_ARM_GIC_BASE_ADDRESS
117#else
118 mrc p15, 4, \addr, c15, c0, 0 @ read CBAR
119 bfc \addr, #0, #15 @ clear reserved bits
120#endif
121.endm
122
123.macro get_gicd_addr addr
124 get_cbar_addr \addr
125 add \addr, \addr, #GIC_DIST_OFFSET @ GIC dist i/f offset
126.endm
Andre Przywara8de142c2013-09-19 18:06:45 +0200127
Marc Zyngier855ca662014-07-12 14:24:03 +0100128.macro get_gicc_addr addr, tmp
129 get_cbar_addr \addr
130 is_cpu_virt_capable \tmp
131 movne \tmp, #GIC_CPU_OFFSET_A9 @ GIC CPU offset for A9
132 moveq \tmp, #GIC_CPU_OFFSET_A15 @ GIC CPU offset for A15/A7
133 add \addr, \addr, \tmp
134.endm
135
136#ifndef CONFIG_ARMV7_PSCI
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200137/*
Andre Przywaradbbe1962013-09-19 18:06:44 +0200138 * Secondary CPUs start here and call the code for the core specific parts
139 * of the non-secure and HYP mode transition. The GIC distributor specific
140 * code has already been executed by a C function before.
141 * Then they go back to wfi and wait to be woken up by the kernel again.
142 */
143ENTRY(_smp_pen)
Marc Zyngier855ca662014-07-12 14:24:03 +0100144 cpsid i
145 cpsid f
Andre Przywaradbbe1962013-09-19 18:06:44 +0200146
147 bl _nonsec_init
Andre Przywaradbbe1962013-09-19 18:06:44 +0200148
149 adr r0, _smp_pen @ do not use this address again
150 b smp_waitloop @ wait for IPIs, board specific
151ENDPROC(_smp_pen)
Marc Zyngier855ca662014-07-12 14:24:03 +0100152#endif
Andre Przywaradbbe1962013-09-19 18:06:44 +0200153
154/*
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200155 * Switch a core to non-secure state.
156 *
157 * 1. initialize the GIC per-core interface
158 * 2. allow coprocessor access in non-secure modes
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200159 *
160 * Called from smp_pen by secondary cores and directly by the BSP.
161 * Do not assume that the stack is available and only use registers
162 * r0-r3 and r12.
163 *
164 * PERIPHBASE is used to get the GIC address. This could be 40 bits long,
165 * though, but we check this in C before calling this function.
166 */
167ENTRY(_nonsec_init)
Marc Zyngier855ca662014-07-12 14:24:03 +0100168 get_gicd_addr r3
169
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200170 mvn r1, #0 @ all bits to 1
171 str r1, [r3, #GICD_IGROUPRn] @ allow private interrupts
172
Marc Zyngier855ca662014-07-12 14:24:03 +0100173 get_gicc_addr r3, r1
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200174
Marc Zyngier855ca662014-07-12 14:24:03 +0100175 mov r1, #3 @ Enable both groups
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200176 str r1, [r3, #GICC_CTLR] @ and clear all other bits
177 mov r1, #0xff
178 str r1, [r3, #GICC_PMR] @ set priority mask register
179
Marc Zyngier855ca662014-07-12 14:24:03 +0100180 mrc p15, 0, r0, c1, c1, 2
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200181 movw r1, #0x3fff
Marc Zyngier855ca662014-07-12 14:24:03 +0100182 movt r1, #0x0004
183 orr r0, r0, r1
184 mcr p15, 0, r0, c1, c1, 2 @ NSACR = all copros to non-sec
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200185
186/* The CNTFRQ register of the generic timer needs to be
187 * programmed in secure state. Some primary bootloaders / firmware
188 * omit this, so if the frequency is provided in the configuration,
189 * we do this here instead.
190 * But first check if we have the generic timer.
191 */
Andre Przywara70c78932017-02-16 01:20:19 +0000192#ifdef COUNTER_FREQUENCY
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200193 mrc p15, 0, r0, c0, c1, 1 @ read ID_PFR1
194 and r0, r0, #CPUID_ARM_GENTIMER_MASK @ mask arch timer bits
195 cmp r0, #(1 << CPUID_ARM_GENTIMER_SHIFT)
Andre Przywara70c78932017-02-16 01:20:19 +0000196 ldreq r1, =COUNTER_FREQUENCY
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200197 mcreq p15, 0, r1, c14, c0, 0 @ write CNTFRQ
198#endif
199
200 adr r1, _monitor_vectors
201 mcr p15, 0, r1, c12, c0, 1 @ set MVBAR to secure vectors
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200202 isb
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200203
204 mov r0, r3 @ return GICC address
Andre Przywaradd5e8da2013-09-19 18:06:41 +0200205 bx lr
206ENDPROC(_nonsec_init)
Andre Przywaradbbe1962013-09-19 18:06:44 +0200207
208#ifdef CONFIG_SMP_PEN_ADDR
209/* void __weak smp_waitloop(unsigned previous_address); */
210ENTRY(smp_waitloop)
211 wfi
212 ldr r1, =CONFIG_SMP_PEN_ADDR @ load start address
213 ldr r1, [r1]
Xiubo Li9d946422014-11-21 17:40:54 +0800214#ifdef CONFIG_PEN_ADDR_BIG_ENDIAN
215 rev r1, r1
216#endif
Andre Przywaradbbe1962013-09-19 18:06:44 +0200217 cmp r0, r1 @ make sure we dont execute this code
218 beq smp_waitloop @ again (due to a spurious wakeup)
Marc Zyngier855ca662014-07-12 14:24:03 +0100219 mov r0, r1
220 b _do_nonsec_entry
Andre Przywaradbbe1962013-09-19 18:06:44 +0200221ENDPROC(smp_waitloop)
222.weak smp_waitloop
223#endif
Andre Przywara8de142c2013-09-19 18:06:45 +0200224
Marc Zyngier855ca662014-07-12 14:24:03 +0100225 .popsection