> -----Original Message-----
> From: Lim, Elly Siew Chin <elly.siew.chin....@intel.com>
> Sent: Friday, December 18, 2020 11:29 AM
> To: u-boot@lists.denx.de
> Cc: Marek Vasut <ma...@denx.de>; Tan, Ley Foon
> <ley.foon....@intel.com>; See, Chin Liang <chin.liang....@intel.com>;
> Simon Goldschmidt <simon.k.r.goldschm...@gmail.com>; Chee, Tien Fong
> <tien.fong.c...@intel.com>; Westergreen, Dalon
> <dalon.westergr...@intel.com>; Simon Glass <s...@chromium.org>; Gan,
> Yau Wai <yau.wai....@intel.com>; Lim, Elly Siew Chin
> <elly.siew.chin....@intel.com>
> Subject: [v4 07/17] arm: socfpga: Add secure register access helper functions
> for SoC 64bits
> 
> These secure register access functions allow U-Boot proper running at EL2
> (non-secure) to access System Manager's secure registers by calling the ATF's
> PSCI runtime services (EL3/secure).
> 
> Signed-off-by: Siew Chin Lim <elly.siew.chin....@intel.com>
> ---
>  arch/arm/mach-socfpga/Makefile                     |  1 +
>  .../mach-socfpga/include/mach/secure_reg_helper.h  | 19 ++++++
>  arch/arm/mach-socfpga/secure_reg_helper.c          | 73
> ++++++++++++++++++++++
>  3 files changed, 93 insertions(+)
>  create mode 100644 arch/arm/mach-
> socfpga/include/mach/secure_reg_helper.h
>  create mode 100644 arch/arm/mach-socfpga/secure_reg_helper.c
> 
> diff --git a/arch/arm/mach-socfpga/Makefile b/arch/arm/mach-
> socfpga/Makefile index 0b05283a7a..82b681d870 100644
> --- a/arch/arm/mach-socfpga/Makefile
> +++ b/arch/arm/mach-socfpga/Makefile
> @@ -73,6 +73,7 @@ obj-y       += firewall.o
>  obj-y        += spl_agilex.o
>  endif
>  else
> +obj-$(CONFIG_SPL_ATF) += secure_reg_helper.o
>  obj-$(CONFIG_SPL_ATF) += smc_api.o
>  endif
> 
> diff --git a/arch/arm/mach-socfpga/include/mach/secure_reg_helper.h
> b/arch/arm/mach-socfpga/include/mach/secure_reg_helper.h
> new file mode 100644
> index 0000000000..f959e6f802
> --- /dev/null
> +++ b/arch/arm/mach-socfpga/include/mach/secure_reg_helper.h
> @@ -0,0 +1,19 @@
> +/* SPDX-License-Identifier: GPL-2.0
> + *
> + * Copyright (C) 2020 Intel Corporation <www.intel.com>
> + *
> + */
> +
> +#ifndef      _SECURE_REG_HELPER_H_
> +#define      _SECURE_REG_HELPER_H_
> +
> +#define SOCFPGA_SECURE_REG_SYSMGR_SOC64_SDMMC 1 #define
> +SOCFPGA_SECURE_REG_SYSMGR_SOC64_EMAC0 2 #define
> +SOCFPGA_SECURE_REG_SYSMGR_SOC64_EMAC1 3 #define
> +SOCFPGA_SECURE_REG_SYSMGR_SOC64_EMAC2 4
> +
> +u32 socfpga_secure_reg_read32(u32 id);
> +void socfpga_secure_reg_write32(u32 val, u32 id); void
> +socfpga_secure_reg_update32(u32 id, u32 mask, u32 val);
> +
> +#endif /* _SECURE_REG_HELPER_H_ */
> diff --git a/arch/arm/mach-socfpga/secure_reg_helper.c b/arch/arm/mach-
> socfpga/secure_reg_helper.c
> new file mode 100644
> index 0000000000..286f597617
> --- /dev/null
> +++ b/arch/arm/mach-socfpga/secure_reg_helper.c
> @@ -0,0 +1,73 @@
> +// SPDX-License-Identifier: GPL-2.0
> +/*
> + * Copyright (C) 2020 Intel Corporation <www.intel.com>
> + *
> + */
> +
> +#include <common.h>
> +#include <hang.h>
> +#include <asm/io.h>
> +#include <asm/system.h>
> +#include <asm/arch/misc.h>
> +#include <asm/arch/secure_reg_helper.h> #include <asm/arch/smc_api.h>
> +#include <asm/arch/system_manager.h> #include <linux/intel-smc.h>
> +
> +phys_addr_t socfpga_secure_convert_reg_id_to_addr(u32 id) {
> +     switch (id) {
> +     case SOCFPGA_SECURE_REG_SYSMGR_SOC64_SDMMC:
> +             return socfpga_get_sysmgr_addr() +
> SYSMGR_SOC64_SDMMC;
> +     case SOCFPGA_SECURE_REG_SYSMGR_SOC64_EMAC0:
> +             return socfpga_get_sysmgr_addr() +
> SYSMGR_SOC64_EMAC0;
> +     case SOCFPGA_SECURE_REG_SYSMGR_SOC64_EMAC1:
> +             return socfpga_get_sysmgr_addr() +
> SYSMGR_SOC64_EMAC1;
> +     case SOCFPGA_SECURE_REG_SYSMGR_SOC64_EMAC2:
> +             return socfpga_get_sysmgr_addr() +
> SYSMGR_SOC64_EMAC2;
> +     default:
> +             hang();
Don't hang the system when error. Same for functions below.


> +     }
> +}
> +
> +u32 socfpga_secure_reg_read32(u32 id)
> +{
> +     int ret;
> +     u64 ret_arg;
> +     u64 args[1];
> +     phys_addr_t reg_addr = socfpga_secure_convert_reg_id_to_addr(id);
> +
> +     args[0] = (u64)reg_addr;
> +     ret = invoke_smc(INTEL_SIP_SMC_REG_READ, args, 1, &ret_arg, 1);
> +     if (ret)
> +             hang();
> +
> +     return ret_arg;
> +}
> +
> +void socfpga_secure_reg_write32(u32 val, u32 id) {
> +     int ret;
> +     u64 args[2];
> +     phys_addr_t reg_addr = socfpga_secure_convert_reg_id_to_addr(id);
> +
> +     args[0] = (u64)reg_addr;
> +     args[1] = val;
> +     ret = invoke_smc(INTEL_SIP_SMC_REG_WRITE, args, 2, NULL, 0);
> +     if (ret)
> +             hang();
> +}
> +
> +void socfpga_secure_reg_update32(u32 id, u32 mask, u32 val) {
> +     int ret;
> +     u64 args[3];
> +     phys_addr_t reg_addr = socfpga_secure_convert_reg_id_to_addr(id);
> +
> +     args[0] = (u64)reg_addr;
> +     args[1] = mask;
> +     args[2] = val;
> +     ret = invoke_smc(INTEL_SIP_SMC_REG_UPDATE, args, 3, NULL, 0);
> +     if (ret)
> +             hang();
> +}
> --
> 2.13.0

Regards
Ley Foon

Reply via email to