blob: b7563edbe6bc0d81891abdd47f62f85b5a1be663 [file] [log] [blame]
Andre Przywara45b940d2013-09-19 18:06:40 +02001/*
Andre Przywarad4296882013-09-19 18:06:45 +02002 * code for switching cores into non-secure state and into HYP mode
Andre Przywara45b940d2013-09-19 18:06:40 +02003 *
4 * Copyright (c) 2013 Andre Przywara <andre.przywara@linaro.org>
5 *
Andre Przywaraf833e792013-10-07 10:56:51 +02006 * SPDX-License-Identifier: GPL-2.0+
Andre Przywara45b940d2013-09-19 18:06:40 +02007 */
8
9#include <config.h>
Andre Przywara16212b52013-09-19 18:06:41 +020010#include <linux/linkage.h>
11#include <asm/gic.h>
12#include <asm/armv7.h>
Marc Zyngierf510aea2014-07-12 14:24:03 +010013#include <asm/proc-armv/ptrace.h>
Andre Przywara16212b52013-09-19 18:06:41 +020014
15.arch_extension sec
Andre Przywarad4296882013-09-19 18:06:45 +020016.arch_extension virt
Andre Przywara45b940d2013-09-19 18:06:40 +020017
Marc Zyngierf510aea2014-07-12 14:24:03 +010018 .pushsection ._secure.text, "ax"
19
Masahiro Yamada3064d592013-10-07 11:46:56 +090020 .align 5
Andre Przywarad4296882013-09-19 18:06:45 +020021/* the vector table for secure state and HYP mode */
Andre Przywara45b940d2013-09-19 18:06:40 +020022_monitor_vectors:
23 .word 0 /* reset */
24 .word 0 /* undef */
25 adr pc, _secure_monitor
26 .word 0
27 .word 0
Andre Przywara45b940d2013-09-19 18:06:40 +020028 .word 0
29 .word 0
Marc Zyngierf510aea2014-07-12 14:24:03 +010030 .word 0
31
32.macro is_cpu_virt_capable tmp
33 mrc p15, 0, \tmp, c0, c1, 1 @ read ID_PFR1
34 and \tmp, \tmp, #CPUID_ARM_VIRT_MASK @ mask virtualization bits
35 cmp \tmp, #(1 << CPUID_ARM_VIRT_SHIFT)
36.endm
Andre Przywara45b940d2013-09-19 18:06:40 +020037
38/*
39 * secure monitor handler
Bin Menga1875592016-02-05 19:30:11 -080040 * U-Boot calls this "software interrupt" in start.S
Andre Przywara45b940d2013-09-19 18:06:40 +020041 * This is executed on a "smc" instruction, we use a "smc #0" to switch
42 * to non-secure state.
Marc Zyngierf510aea2014-07-12 14:24:03 +010043 * r0, r1, r2: passed to the callee
44 * ip: target PC
Andre Przywara45b940d2013-09-19 18:06:40 +020045 */
Andre Przywara45b940d2013-09-19 18:06:40 +020046_secure_monitor:
Marc Zyngier38510a42014-07-12 14:24:05 +010047#ifdef CONFIG_ARMV7_PSCI
48 ldr r5, =_psci_vectors @ Switch to the next monitor
49 mcr p15, 0, r5, c12, c0, 1
50 isb
Andre Przywara45b940d2013-09-19 18:06:40 +020051
Marc Zyngier38510a42014-07-12 14:24:05 +010052 @ Obtain a secure stack, and configure the PSCI backend
53 bl psci_arch_init
54#endif
55
Ian Campbelle392b922015-09-29 10:27:09 +010056#ifdef CONFIG_ARM_ERRATA_773022
57 mrc p15, 0, r5, c1, c0, 1
58 orr r5, r5, #(1 << 1)
59 mcr p15, 0, r5, c1, c0, 1
60 isb
61#endif
62
63#ifdef CONFIG_ARM_ERRATA_774769
64 mrc p15, 0, r5, c1, c0, 1
65 orr r5, r5, #(1 << 25)
66 mcr p15, 0, r5, c1, c0, 1
67 isb
68#endif
69
Marc Zyngier38510a42014-07-12 14:24:05 +010070 mrc p15, 0, r5, c1, c1, 0 @ read SCR
71 bic r5, r5, #0x4a @ clear IRQ, EA, nET bits
72 orr r5, r5, #0x31 @ enable NS, AW, FW bits
73 @ FIQ preserved for secure mode
Marc Zyngierf510aea2014-07-12 14:24:03 +010074 mov r6, #SVC_MODE @ default mode is SVC
75 is_cpu_virt_capable r4
Marc Zyngier64fd44d2014-07-12 14:24:00 +010076#ifdef CONFIG_ARMV7_VIRT
Marc Zyngierf510aea2014-07-12 14:24:03 +010077 orreq r5, r5, #0x100 @ allow HVC instruction
78 moveq r6, #HYP_MODE @ Enter the kernel as HYP
Andre Przywarad4296882013-09-19 18:06:45 +020079#endif
80
Marc Zyngierf510aea2014-07-12 14:24:03 +010081 mcr p15, 0, r5, c1, c1, 0 @ write SCR (with NS bit set)
Marc Zyngier800c8352014-07-12 14:23:59 +010082 isb
Andre Przywara45b940d2013-09-19 18:06:40 +020083
Marc Zyngier64fd44d2014-07-12 14:24:00 +010084 bne 1f
Andre Przywarad4296882013-09-19 18:06:45 +020085
Marc Zyngier64fd44d2014-07-12 14:24:00 +010086 @ Reset CNTVOFF to 0 before leaving monitor mode
Marc Zyngierf510aea2014-07-12 14:24:03 +010087 mrc p15, 0, r4, c0, c1, 1 @ read ID_PFR1
88 ands r4, r4, #CPUID_ARM_GENTIMER_MASK @ test arch timer bits
89 movne r4, #0
90 mcrrne p15, 4, r4, r4, c14 @ Reset CNTVOFF to zero
Marc Zyngier64fd44d2014-07-12 14:24:00 +0100911:
Marc Zyngierf510aea2014-07-12 14:24:03 +010092 mov lr, ip
93 mov ip, #(F_BIT | I_BIT | A_BIT) @ Set A, I and F
94 tst lr, #1 @ Check for Thumb PC
95 orrne ip, ip, #T_BIT @ Set T if Thumb
96 orr ip, ip, r6 @ Slot target mode in
97 msr spsr_cxfs, ip @ Set full SPSR
98 movs pc, lr @ ERET to non-secure
Andre Przywara16212b52013-09-19 18:06:41 +020099
Marc Zyngierf510aea2014-07-12 14:24:03 +0100100ENTRY(_do_nonsec_entry)
101 mov ip, r0
102 mov r0, r1
103 mov r1, r2
104 mov r2, r3
105 smc #0
106ENDPROC(_do_nonsec_entry)
Andre Przywarad4296882013-09-19 18:06:45 +0200107
Marc Zyngierf510aea2014-07-12 14:24:03 +0100108.macro get_cbar_addr addr
109#ifdef CONFIG_ARM_GIC_BASE_ADDRESS
110 ldr \addr, =CONFIG_ARM_GIC_BASE_ADDRESS
111#else
112 mrc p15, 4, \addr, c15, c0, 0 @ read CBAR
113 bfc \addr, #0, #15 @ clear reserved bits
114#endif
115.endm
116
117.macro get_gicd_addr addr
118 get_cbar_addr \addr
119 add \addr, \addr, #GIC_DIST_OFFSET @ GIC dist i/f offset
120.endm
121
122.macro get_gicc_addr addr, tmp
123 get_cbar_addr \addr
124 is_cpu_virt_capable \tmp
125 movne \tmp, #GIC_CPU_OFFSET_A9 @ GIC CPU offset for A9
126 moveq \tmp, #GIC_CPU_OFFSET_A15 @ GIC CPU offset for A15/A7
127 add \addr, \addr, \tmp
128.endm
129
130#ifndef CONFIG_ARMV7_PSCI
Andre Przywara16212b52013-09-19 18:06:41 +0200131/*
Andre Przywaraba6a1692013-09-19 18:06:44 +0200132 * Secondary CPUs start here and call the code for the core specific parts
133 * of the non-secure and HYP mode transition. The GIC distributor specific
134 * code has already been executed by a C function before.
135 * Then they go back to wfi and wait to be woken up by the kernel again.
136 */
137ENTRY(_smp_pen)
Marc Zyngierf510aea2014-07-12 14:24:03 +0100138 cpsid i
139 cpsid f
Andre Przywaraba6a1692013-09-19 18:06:44 +0200140
141 bl _nonsec_init
Andre Przywaraba6a1692013-09-19 18:06:44 +0200142
143 adr r0, _smp_pen @ do not use this address again
144 b smp_waitloop @ wait for IPIs, board specific
145ENDPROC(_smp_pen)
Marc Zyngierf510aea2014-07-12 14:24:03 +0100146#endif
Andre Przywaraba6a1692013-09-19 18:06:44 +0200147
148/*
Andre Przywara16212b52013-09-19 18:06:41 +0200149 * Switch a core to non-secure state.
150 *
151 * 1. initialize the GIC per-core interface
152 * 2. allow coprocessor access in non-secure modes
Andre Przywara16212b52013-09-19 18:06:41 +0200153 *
154 * Called from smp_pen by secondary cores and directly by the BSP.
155 * Do not assume that the stack is available and only use registers
156 * r0-r3 and r12.
157 *
158 * PERIPHBASE is used to get the GIC address. This could be 40 bits long,
159 * though, but we check this in C before calling this function.
160 */
161ENTRY(_nonsec_init)
Marc Zyngierf510aea2014-07-12 14:24:03 +0100162 get_gicd_addr r3
163
Andre Przywara16212b52013-09-19 18:06:41 +0200164 mvn r1, #0 @ all bits to 1
165 str r1, [r3, #GICD_IGROUPRn] @ allow private interrupts
166
Marc Zyngierf510aea2014-07-12 14:24:03 +0100167 get_gicc_addr r3, r1
Andre Przywara16212b52013-09-19 18:06:41 +0200168
Marc Zyngierf510aea2014-07-12 14:24:03 +0100169 mov r1, #3 @ Enable both groups
Andre Przywara16212b52013-09-19 18:06:41 +0200170 str r1, [r3, #GICC_CTLR] @ and clear all other bits
171 mov r1, #0xff
172 str r1, [r3, #GICC_PMR] @ set priority mask register
173
Marc Zyngierf510aea2014-07-12 14:24:03 +0100174 mrc p15, 0, r0, c1, c1, 2
Andre Przywara16212b52013-09-19 18:06:41 +0200175 movw r1, #0x3fff
Marc Zyngierf510aea2014-07-12 14:24:03 +0100176 movt r1, #0x0004
177 orr r0, r0, r1
178 mcr p15, 0, r0, c1, c1, 2 @ NSACR = all copros to non-sec
Andre Przywara16212b52013-09-19 18:06:41 +0200179
180/* The CNTFRQ register of the generic timer needs to be
181 * programmed in secure state. Some primary bootloaders / firmware
182 * omit this, so if the frequency is provided in the configuration,
183 * we do this here instead.
184 * But first check if we have the generic timer.
185 */
Xiubo Li73a1cb22014-11-21 17:40:55 +0800186#ifdef CONFIG_TIMER_CLK_FREQ
Andre Przywara16212b52013-09-19 18:06:41 +0200187 mrc p15, 0, r0, c0, c1, 1 @ read ID_PFR1
188 and r0, r0, #CPUID_ARM_GENTIMER_MASK @ mask arch timer bits
189 cmp r0, #(1 << CPUID_ARM_GENTIMER_SHIFT)
Xiubo Li73a1cb22014-11-21 17:40:55 +0800190 ldreq r1, =CONFIG_TIMER_CLK_FREQ
Andre Przywara16212b52013-09-19 18:06:41 +0200191 mcreq p15, 0, r1, c14, c0, 0 @ write CNTFRQ
192#endif
193
194 adr r1, _monitor_vectors
195 mcr p15, 0, r1, c12, c0, 1 @ set MVBAR to secure vectors
Andre Przywara16212b52013-09-19 18:06:41 +0200196 isb
Andre Przywara16212b52013-09-19 18:06:41 +0200197
198 mov r0, r3 @ return GICC address
Andre Przywara16212b52013-09-19 18:06:41 +0200199 bx lr
200ENDPROC(_nonsec_init)
Andre Przywaraba6a1692013-09-19 18:06:44 +0200201
202#ifdef CONFIG_SMP_PEN_ADDR
203/* void __weak smp_waitloop(unsigned previous_address); */
204ENTRY(smp_waitloop)
205 wfi
206 ldr r1, =CONFIG_SMP_PEN_ADDR @ load start address
207 ldr r1, [r1]
Xiubo Lib8e5c7f2014-11-21 17:40:54 +0800208#ifdef CONFIG_PEN_ADDR_BIG_ENDIAN
209 rev r1, r1
210#endif
Andre Przywaraba6a1692013-09-19 18:06:44 +0200211 cmp r0, r1 @ make sure we dont execute this code
212 beq smp_waitloop @ again (due to a spurious wakeup)
Marc Zyngierf510aea2014-07-12 14:24:03 +0100213 mov r0, r1
214 b _do_nonsec_entry
Andre Przywaraba6a1692013-09-19 18:06:44 +0200215ENDPROC(smp_waitloop)
216.weak smp_waitloop
217#endif
Andre Przywarad4296882013-09-19 18:06:45 +0200218
Marc Zyngierf510aea2014-07-12 14:24:03 +0100219 .popsection