123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219 |
- /*
- * Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
- *
- * SPDX-License-Identifier: BSD-3-Clause
- */
- #include <assert.h>
- #include <string.h>
- #include <platform_def.h>
- #include <arch_helpers.h>
- #include <common/debug.h>
- #include <sq_common.h>
- #include "sq_mhu.h"
- #include "sq_scpi.h"
- #define SCPI_SHARED_MEM_SCP_TO_AP PLAT_SQ_SCP_COM_SHARED_MEM_BASE
- #define SCPI_SHARED_MEM_AP_TO_SCP (PLAT_SQ_SCP_COM_SHARED_MEM_BASE \
- + 0x100)
- #define SCPI_CMD_HEADER_AP_TO_SCP \
- ((scpi_cmd_t *) SCPI_SHARED_MEM_AP_TO_SCP)
- #define SCPI_CMD_PAYLOAD_AP_TO_SCP \
- ((void *) (SCPI_SHARED_MEM_AP_TO_SCP + sizeof(scpi_cmd_t)))
- /* ID of the MHU slot used for the SCPI protocol */
- #define SCPI_MHU_SLOT_ID 0
- static void scpi_secure_message_start(void)
- {
- mhu_secure_message_start(SCPI_MHU_SLOT_ID);
- }
- static void scpi_secure_message_send(size_t payload_size)
- {
- /*
- * Ensure that any write to the SCPI payload area is seen by SCP before
- * we write to the MHU register. If these 2 writes were reordered by
- * the CPU then SCP would read stale payload data
- */
- dmbst();
- mhu_secure_message_send(SCPI_MHU_SLOT_ID);
- }
- static void scpi_secure_message_receive(scpi_cmd_t *cmd)
- {
- uint32_t mhu_status;
- assert(cmd != NULL);
- mhu_status = mhu_secure_message_wait();
- /* Expect an SCPI message, reject any other protocol */
- if (mhu_status != (1 << SCPI_MHU_SLOT_ID)) {
- ERROR("MHU: Unexpected protocol (MHU status: 0x%x)\n",
- mhu_status);
- panic();
- }
- /*
- * Ensure that any read to the SCPI payload area is done after reading
- * the MHU register. If these 2 reads were reordered then the CPU would
- * read invalid payload data
- */
- dmbld();
- memcpy(cmd, (void *) SCPI_SHARED_MEM_SCP_TO_AP, sizeof(*cmd));
- }
- static void scpi_secure_message_end(void)
- {
- mhu_secure_message_end(SCPI_MHU_SLOT_ID);
- }
- int scpi_wait_ready(void)
- {
- scpi_cmd_t scpi_cmd;
- scpi_status_t status = SCP_OK;
- VERBOSE("Waiting for SCP_READY command...\n");
- /* Get a message from the SCP */
- scpi_secure_message_start();
- scpi_secure_message_receive(&scpi_cmd);
- scpi_secure_message_end();
- /* We are expecting 'SCP Ready', produce correct error if it's not */
- if (scpi_cmd.id != SCPI_CMD_SCP_READY) {
- ERROR("Unexpected SCP command: expected command #%u,"
- "got command #%u\n", SCPI_CMD_SCP_READY, scpi_cmd.id);
- status = SCP_E_SUPPORT;
- } else if (scpi_cmd.size != 0) {
- ERROR("SCP_READY command has incorrect size: expected 0,"
- "got %u\n", scpi_cmd.size);
- status = SCP_E_SIZE;
- }
- VERBOSE("Sending response for SCP_READY command\n");
- /*
- * Send our response back to SCP.
- * We are using the same SCPI header, just update the status field.
- */
- scpi_cmd.status = status;
- scpi_secure_message_start();
- memcpy((void *) SCPI_SHARED_MEM_AP_TO_SCP, &scpi_cmd, sizeof(scpi_cmd));
- scpi_secure_message_send(0);
- scpi_secure_message_end();
- return status == SCP_OK ? 0 : -1;
- }
- void scpi_set_sq_power_state(unsigned int mpidr, scpi_power_state_t cpu_state,
- scpi_power_state_t cluster_state, scpi_power_state_t sq_state)
- {
- scpi_cmd_t *cmd;
- uint32_t state = 0;
- uint32_t *payload_addr;
- state |= mpidr & 0x0f; /* CPU ID */
- state |= (mpidr & 0xf00) >> 4; /* Cluster ID */
- state |= cpu_state << 8;
- state |= cluster_state << 12;
- state |= sq_state << 16;
- scpi_secure_message_start();
- /* Populate the command header */
- cmd = SCPI_CMD_HEADER_AP_TO_SCP;
- cmd->id = SCPI_CMD_SET_POWER_STATE;
- cmd->set = SCPI_SET_NORMAL;
- cmd->sender = 0;
- cmd->size = sizeof(state);
- /* Populate the command payload */
- payload_addr = SCPI_CMD_PAYLOAD_AP_TO_SCP;
- *payload_addr = state;
- scpi_secure_message_send(sizeof(state));
- /*
- * SCP does not reply to this command in order to avoid MHU interrupts
- * from the sender, which could interfere with its power state request.
- */
- scpi_secure_message_end();
- }
- uint32_t scpi_sys_power_state(scpi_system_state_t system_state)
- {
- scpi_cmd_t *cmd;
- uint8_t *payload_addr;
- scpi_cmd_t response;
- scpi_secure_message_start();
- /* Populate the command header */
- cmd = SCPI_CMD_HEADER_AP_TO_SCP;
- cmd->id = SCPI_CMD_SYS_POWER_STATE;
- cmd->set = 0;
- cmd->sender = 0;
- cmd->size = sizeof(*payload_addr);
- /* Populate the command payload */
- payload_addr = SCPI_CMD_PAYLOAD_AP_TO_SCP;
- *payload_addr = system_state & 0xff;
- scpi_secure_message_send(sizeof(*payload_addr));
- scpi_secure_message_receive(&response);
- scpi_secure_message_end();
- return response.status;
- }
- uint32_t scpi_get_draminfo(struct draminfo *info)
- {
- scpi_cmd_t *cmd;
- struct {
- scpi_cmd_t cmd;
- struct draminfo info;
- } response;
- uint32_t mhu_status;
- scpi_secure_message_start();
- /* Populate the command header */
- cmd = SCPI_CMD_HEADER_AP_TO_SCP;
- cmd->id = SCPI_CMD_GET_DRAMINFO;
- cmd->set = SCPI_SET_EXTENDED;
- cmd->sender = 0;
- cmd->size = 0;
- scpi_secure_message_send(0);
- mhu_status = mhu_secure_message_wait();
- /* Expect an SCPI message, reject any other protocol */
- if (mhu_status != (1 << SCPI_MHU_SLOT_ID)) {
- ERROR("MHU: Unexpected protocol (MHU status: 0x%x)\n",
- mhu_status);
- panic();
- }
- /*
- * Ensure that any read to the SCPI payload area is done after reading
- * the MHU register. If these 2 reads were reordered then the CPU would
- * read invalid payload data
- */
- dmbld();
- memcpy(&response, (void *)SCPI_SHARED_MEM_SCP_TO_AP, sizeof(response));
- scpi_secure_message_end();
- if (response.cmd.status == SCP_OK)
- *info = response.info;
- return response.cmd.status;
- }
|