Andre Przywara | 45b940d | 2013-09-19 18:06:40 +0200 | [diff] [blame] | 1 | /* |
Andre Przywara | d429688 | 2013-09-19 18:06:45 +0200 | [diff] [blame] | 2 | * code for switching cores into non-secure state and into HYP mode |
Andre Przywara | 45b940d | 2013-09-19 18:06:40 +0200 | [diff] [blame] | 3 | * |
| 4 | * Copyright (c) 2013 Andre Przywara <andre.przywara@linaro.org> |
| 5 | * |
Andre Przywara | f833e79 | 2013-10-07 10:56:51 +0200 | [diff] [blame] | 6 | * SPDX-License-Identifier: GPL-2.0+ |
Andre Przywara | 45b940d | 2013-09-19 18:06:40 +0200 | [diff] [blame] | 7 | */ |
| 8 | |
| 9 | #include <config.h> |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 10 | #include <linux/linkage.h> |
| 11 | #include <asm/gic.h> |
| 12 | #include <asm/armv7.h> |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 13 | #include <asm/proc-armv/ptrace.h> |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 14 | |
| 15 | .arch_extension sec |
Andre Przywara | d429688 | 2013-09-19 18:06:45 +0200 | [diff] [blame] | 16 | .arch_extension virt |
Andre Przywara | 45b940d | 2013-09-19 18:06:40 +0200 | [diff] [blame] | 17 | |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 18 | .pushsection ._secure.text, "ax" |
| 19 | |
Masahiro Yamada | 3064d59 | 2013-10-07 11:46:56 +0900 | [diff] [blame] | 20 | .align 5 |
Andre Przywara | d429688 | 2013-09-19 18:06:45 +0200 | [diff] [blame] | 21 | /* the vector table for secure state and HYP mode */ |
Andre Przywara | 45b940d | 2013-09-19 18:06:40 +0200 | [diff] [blame] | 22 | _monitor_vectors: |
| 23 | .word 0 /* reset */ |
| 24 | .word 0 /* undef */ |
| 25 | adr pc, _secure_monitor |
| 26 | .word 0 |
| 27 | .word 0 |
Andre Przywara | 45b940d | 2013-09-19 18:06:40 +0200 | [diff] [blame] | 28 | .word 0 |
| 29 | .word 0 |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 30 | .word 0 |
| 31 | |
| 32 | .macro is_cpu_virt_capable tmp |
| 33 | mrc p15, 0, \tmp, c0, c1, 1 @ read ID_PFR1 |
| 34 | and \tmp, \tmp, #CPUID_ARM_VIRT_MASK @ mask virtualization bits |
| 35 | cmp \tmp, #(1 << CPUID_ARM_VIRT_SHIFT) |
| 36 | .endm |
Andre Przywara | 45b940d | 2013-09-19 18:06:40 +0200 | [diff] [blame] | 37 | |
| 38 | /* |
| 39 | * secure monitor handler |
| 40 | * U-boot calls this "software interrupt" in start.S |
| 41 | * This is executed on a "smc" instruction, we use a "smc #0" to switch |
| 42 | * to non-secure state. |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 43 | * r0, r1, r2: passed to the callee |
| 44 | * ip: target PC |
Andre Przywara | 45b940d | 2013-09-19 18:06:40 +0200 | [diff] [blame] | 45 | */ |
Andre Przywara | 45b940d | 2013-09-19 18:06:40 +0200 | [diff] [blame] | 46 | _secure_monitor: |
Marc Zyngier | 38510a4 | 2014-07-12 14:24:05 +0100 | [diff] [blame] | 47 | #ifdef CONFIG_ARMV7_PSCI |
| 48 | ldr r5, =_psci_vectors @ Switch to the next monitor |
| 49 | mcr p15, 0, r5, c12, c0, 1 |
| 50 | isb |
Andre Przywara | 45b940d | 2013-09-19 18:06:40 +0200 | [diff] [blame] | 51 | |
Marc Zyngier | 38510a4 | 2014-07-12 14:24:05 +0100 | [diff] [blame] | 52 | @ Obtain a secure stack, and configure the PSCI backend |
| 53 | bl psci_arch_init |
| 54 | #endif |
| 55 | |
| 56 | mrc p15, 0, r5, c1, c1, 0 @ read SCR |
| 57 | bic r5, r5, #0x4a @ clear IRQ, EA, nET bits |
| 58 | orr r5, r5, #0x31 @ enable NS, AW, FW bits |
| 59 | @ FIQ preserved for secure mode |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 60 | mov r6, #SVC_MODE @ default mode is SVC |
| 61 | is_cpu_virt_capable r4 |
Marc Zyngier | 64fd44d | 2014-07-12 14:24:00 +0100 | [diff] [blame] | 62 | #ifdef CONFIG_ARMV7_VIRT |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 63 | orreq r5, r5, #0x100 @ allow HVC instruction |
| 64 | moveq r6, #HYP_MODE @ Enter the kernel as HYP |
Andre Przywara | d429688 | 2013-09-19 18:06:45 +0200 | [diff] [blame] | 65 | #endif |
| 66 | |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 67 | mcr p15, 0, r5, c1, c1, 0 @ write SCR (with NS bit set) |
Marc Zyngier | 800c835 | 2014-07-12 14:23:59 +0100 | [diff] [blame] | 68 | isb |
Andre Przywara | 45b940d | 2013-09-19 18:06:40 +0200 | [diff] [blame] | 69 | |
Marc Zyngier | 64fd44d | 2014-07-12 14:24:00 +0100 | [diff] [blame] | 70 | bne 1f |
Andre Przywara | d429688 | 2013-09-19 18:06:45 +0200 | [diff] [blame] | 71 | |
Marc Zyngier | 64fd44d | 2014-07-12 14:24:00 +0100 | [diff] [blame] | 72 | @ Reset CNTVOFF to 0 before leaving monitor mode |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 73 | mrc p15, 0, r4, c0, c1, 1 @ read ID_PFR1 |
| 74 | ands r4, r4, #CPUID_ARM_GENTIMER_MASK @ test arch timer bits |
| 75 | movne r4, #0 |
| 76 | mcrrne p15, 4, r4, r4, c14 @ Reset CNTVOFF to zero |
Marc Zyngier | 64fd44d | 2014-07-12 14:24:00 +0100 | [diff] [blame] | 77 | 1: |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 78 | mov lr, ip |
| 79 | mov ip, #(F_BIT | I_BIT | A_BIT) @ Set A, I and F |
| 80 | tst lr, #1 @ Check for Thumb PC |
| 81 | orrne ip, ip, #T_BIT @ Set T if Thumb |
| 82 | orr ip, ip, r6 @ Slot target mode in |
| 83 | msr spsr_cxfs, ip @ Set full SPSR |
| 84 | movs pc, lr @ ERET to non-secure |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 85 | |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 86 | ENTRY(_do_nonsec_entry) |
| 87 | mov ip, r0 |
| 88 | mov r0, r1 |
| 89 | mov r1, r2 |
| 90 | mov r2, r3 |
| 91 | smc #0 |
| 92 | ENDPROC(_do_nonsec_entry) |
Andre Przywara | d429688 | 2013-09-19 18:06:45 +0200 | [diff] [blame] | 93 | |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 94 | .macro get_cbar_addr addr |
| 95 | #ifdef CONFIG_ARM_GIC_BASE_ADDRESS |
| 96 | ldr \addr, =CONFIG_ARM_GIC_BASE_ADDRESS |
| 97 | #else |
| 98 | mrc p15, 4, \addr, c15, c0, 0 @ read CBAR |
| 99 | bfc \addr, #0, #15 @ clear reserved bits |
| 100 | #endif |
| 101 | .endm |
| 102 | |
| 103 | .macro get_gicd_addr addr |
| 104 | get_cbar_addr \addr |
| 105 | add \addr, \addr, #GIC_DIST_OFFSET @ GIC dist i/f offset |
| 106 | .endm |
| 107 | |
| 108 | .macro get_gicc_addr addr, tmp |
| 109 | get_cbar_addr \addr |
| 110 | is_cpu_virt_capable \tmp |
| 111 | movne \tmp, #GIC_CPU_OFFSET_A9 @ GIC CPU offset for A9 |
| 112 | moveq \tmp, #GIC_CPU_OFFSET_A15 @ GIC CPU offset for A15/A7 |
| 113 | add \addr, \addr, \tmp |
| 114 | .endm |
| 115 | |
| 116 | #ifndef CONFIG_ARMV7_PSCI |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 117 | /* |
Andre Przywara | ba6a169 | 2013-09-19 18:06:44 +0200 | [diff] [blame] | 118 | * Secondary CPUs start here and call the code for the core specific parts |
| 119 | * of the non-secure and HYP mode transition. The GIC distributor specific |
| 120 | * code has already been executed by a C function before. |
| 121 | * Then they go back to wfi and wait to be woken up by the kernel again. |
| 122 | */ |
| 123 | ENTRY(_smp_pen) |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 124 | cpsid i |
| 125 | cpsid f |
Andre Przywara | ba6a169 | 2013-09-19 18:06:44 +0200 | [diff] [blame] | 126 | |
| 127 | bl _nonsec_init |
Andre Przywara | ba6a169 | 2013-09-19 18:06:44 +0200 | [diff] [blame] | 128 | |
| 129 | adr r0, _smp_pen @ do not use this address again |
| 130 | b smp_waitloop @ wait for IPIs, board specific |
| 131 | ENDPROC(_smp_pen) |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 132 | #endif |
Andre Przywara | ba6a169 | 2013-09-19 18:06:44 +0200 | [diff] [blame] | 133 | |
| 134 | /* |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 135 | * Switch a core to non-secure state. |
| 136 | * |
| 137 | * 1. initialize the GIC per-core interface |
| 138 | * 2. allow coprocessor access in non-secure modes |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 139 | * |
| 140 | * Called from smp_pen by secondary cores and directly by the BSP. |
| 141 | * Do not assume that the stack is available and only use registers |
| 142 | * r0-r3 and r12. |
| 143 | * |
| 144 | * PERIPHBASE is used to get the GIC address. This could be 40 bits long, |
| 145 | * though, but we check this in C before calling this function. |
| 146 | */ |
| 147 | ENTRY(_nonsec_init) |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 148 | get_gicd_addr r3 |
| 149 | |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 150 | mvn r1, #0 @ all bits to 1 |
| 151 | str r1, [r3, #GICD_IGROUPRn] @ allow private interrupts |
| 152 | |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 153 | get_gicc_addr r3, r1 |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 154 | |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 155 | mov r1, #3 @ Enable both groups |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 156 | str r1, [r3, #GICC_CTLR] @ and clear all other bits |
| 157 | mov r1, #0xff |
| 158 | str r1, [r3, #GICC_PMR] @ set priority mask register |
| 159 | |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 160 | mrc p15, 0, r0, c1, c1, 2 |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 161 | movw r1, #0x3fff |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 162 | movt r1, #0x0004 |
| 163 | orr r0, r0, r1 |
| 164 | mcr p15, 0, r0, c1, c1, 2 @ NSACR = all copros to non-sec |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 165 | |
| 166 | /* The CNTFRQ register of the generic timer needs to be |
| 167 | * programmed in secure state. Some primary bootloaders / firmware |
| 168 | * omit this, so if the frequency is provided in the configuration, |
| 169 | * we do this here instead. |
| 170 | * But first check if we have the generic timer. |
| 171 | */ |
| 172 | #ifdef CONFIG_SYS_CLK_FREQ |
| 173 | mrc p15, 0, r0, c0, c1, 1 @ read ID_PFR1 |
| 174 | and r0, r0, #CPUID_ARM_GENTIMER_MASK @ mask arch timer bits |
| 175 | cmp r0, #(1 << CPUID_ARM_GENTIMER_SHIFT) |
| 176 | ldreq r1, =CONFIG_SYS_CLK_FREQ |
| 177 | mcreq p15, 0, r1, c14, c0, 0 @ write CNTFRQ |
| 178 | #endif |
| 179 | |
| 180 | adr r1, _monitor_vectors |
| 181 | mcr p15, 0, r1, c12, c0, 1 @ set MVBAR to secure vectors |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 182 | isb |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 183 | |
| 184 | mov r0, r3 @ return GICC address |
Andre Przywara | 16212b5 | 2013-09-19 18:06:41 +0200 | [diff] [blame] | 185 | bx lr |
| 186 | ENDPROC(_nonsec_init) |
Andre Przywara | ba6a169 | 2013-09-19 18:06:44 +0200 | [diff] [blame] | 187 | |
| 188 | #ifdef CONFIG_SMP_PEN_ADDR |
| 189 | /* void __weak smp_waitloop(unsigned previous_address); */ |
| 190 | ENTRY(smp_waitloop) |
| 191 | wfi |
| 192 | ldr r1, =CONFIG_SMP_PEN_ADDR @ load start address |
| 193 | ldr r1, [r1] |
| 194 | cmp r0, r1 @ make sure we dont execute this code |
| 195 | beq smp_waitloop @ again (due to a spurious wakeup) |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 196 | mov r0, r1 |
| 197 | b _do_nonsec_entry |
Andre Przywara | ba6a169 | 2013-09-19 18:06:44 +0200 | [diff] [blame] | 198 | ENDPROC(smp_waitloop) |
| 199 | .weak smp_waitloop |
| 200 | #endif |
Andre Przywara | d429688 | 2013-09-19 18:06:45 +0200 | [diff] [blame] | 201 | |
Marc Zyngier | f510aea | 2014-07-12 14:24:03 +0100 | [diff] [blame] | 202 | .popsection |