blob: 3597ee22242cc6b9a435f9ab9d5f4877607a4de5 [file] [log] [blame]
Tom Rini83d290c2018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
gaurav ranafe783782015-02-27 09:44:22 +05302/*
3 * Copyright 2015 Freescale Semiconductor, Inc.
gaurav ranafe783782015-02-27 09:44:22 +05304 */
5
6#include <common.h>
7#include <fsl_sec_mon.h>
Simon Glassc05ed002020-05-10 11:40:11 -06008#include <linux/delay.h>
gaurav ranafe783782015-02-27 09:44:22 +05309
Sumit Gargb2597322016-08-31 08:54:15 -040010static u32 get_sec_mon_state(void)
gaurav ranafe783782015-02-27 09:44:22 +053011{
12 struct ccsr_sec_mon_regs *sec_mon_regs = (void *)
Tom Rini65cc0e22022-11-16 13:10:41 -050013 (CFG_SYS_SEC_MON_ADDR);
Sumit Gargb2597322016-08-31 08:54:15 -040014 return sec_mon_in32(&sec_mon_regs->hp_stat) & HPSR_SSM_ST_MASK;
15}
16
17static int set_sec_mon_state_non_sec(void)
18{
19 u32 sts;
gaurav ranafe783782015-02-27 09:44:22 +053020 int timeout = 10;
Sumit Gargb2597322016-08-31 08:54:15 -040021 struct ccsr_sec_mon_regs *sec_mon_regs = (void *)
Tom Rini65cc0e22022-11-16 13:10:41 -050022 (CFG_SYS_SEC_MON_ADDR);
gaurav ranafe783782015-02-27 09:44:22 +053023
Sumit Gargb2597322016-08-31 08:54:15 -040024 sts = get_sec_mon_state();
gaurav ranafe783782015-02-27 09:44:22 +053025
Sumit Gargb2597322016-08-31 08:54:15 -040026 switch (sts) {
27 /*
28 * If initial state is check or Non-Secure, then set the Software
29 * Security Violation Bit and transition to Non-Secure State.
30 */
31 case HPSR_SSM_ST_CHECK:
32 printf("SEC_MON state transitioning to Non Secure.\n");
33 sec_mon_setbits32(&sec_mon_regs->hp_com, HPCOMR_SW_SV);
gaurav ranafe783782015-02-27 09:44:22 +053034
Sumit Gargb2597322016-08-31 08:54:15 -040035 /* polling loop till SEC_MON is in Non Secure state */
36 while (timeout) {
37 sts = get_sec_mon_state();
gaurav ranafe783782015-02-27 09:44:22 +053038
Sumit Gargb2597322016-08-31 08:54:15 -040039 if ((sts & HPSR_SSM_ST_MASK) ==
40 HPSR_SSM_ST_NON_SECURE)
41 break;
gaurav ranafe783782015-02-27 09:44:22 +053042
Sumit Gargb2597322016-08-31 08:54:15 -040043 udelay(10);
44 timeout--;
45 }
gaurav ranafe783782015-02-27 09:44:22 +053046
Sumit Gargb2597322016-08-31 08:54:15 -040047 if (timeout == 0) {
48 printf("SEC_MON state transition timeout.\n");
49 return -1;
50 }
51 break;
gaurav ranafe783782015-02-27 09:44:22 +053052
Sumit Gargb2597322016-08-31 08:54:15 -040053 /*
54 * If initial state is Trusted, Secure or Soft-Fail, then first set
55 * the Software Security Violation Bit and transition to Soft-Fail
56 * State.
57 */
58 case HPSR_SSM_ST_TRUST:
59 case HPSR_SSM_ST_SECURE:
60 case HPSR_SSM_ST_SOFT_FAIL:
61 printf("SEC_MON state transitioning to Soft Fail.\n");
62 sec_mon_setbits32(&sec_mon_regs->hp_com, HPCOMR_SW_SV);
gaurav ranafe783782015-02-27 09:44:22 +053063
Sumit Gargb2597322016-08-31 08:54:15 -040064 /* polling loop till SEC_MON is in Soft-Fail state */
65 while (timeout) {
66 sts = get_sec_mon_state();
67
68 if ((sts & HPSR_SSM_ST_MASK) ==
69 HPSR_SSM_ST_SOFT_FAIL)
70 break;
71
72 udelay(10);
73 timeout--;
74 }
75
76 if (timeout == 0) {
77 printf("SEC_MON state transition timeout.\n");
78 return -1;
79 }
80
81 timeout = 10;
82
83 /*
84 * If SSM Soft Fail to Non-Secure State Transition
85 * disable is not set, then set SSM_ST bit and
86 * transition to Non-Secure State.
87 */
88 if ((sec_mon_in32(&sec_mon_regs->hp_com) &
89 HPCOMR_SSM_SFNS_DIS) == 0) {
gaurav ranafe783782015-02-27 09:44:22 +053090 printf("SEC_MON state transitioning to Non Secure.\n");
91 sec_mon_setbits32(&sec_mon_regs->hp_com, HPCOMR_SSM_ST);
92
Sumit Gargb2597322016-08-31 08:54:15 -040093 /* polling loop till SEC_MON is in Non Secure*/
94 while (timeout) {
95 sts = get_sec_mon_state();
gaurav ranafe783782015-02-27 09:44:22 +053096
Sumit Gargb2597322016-08-31 08:54:15 -040097 if ((sts & HPSR_SSM_ST_MASK) ==
98 HPSR_SSM_ST_NON_SECURE)
99 break;
gaurav ranafe783782015-02-27 09:44:22 +0530100
Sumit Gargb2597322016-08-31 08:54:15 -0400101 udelay(10);
102 timeout--;
gaurav ranafe783782015-02-27 09:44:22 +0530103 }
104
105 if (timeout == 0) {
106 printf("SEC_MON state transition timeout.\n");
107 return -1;
108 }
gaurav ranafe783782015-02-27 09:44:22 +0530109 }
Sumit Gargb2597322016-08-31 08:54:15 -0400110 break;
111 default:
112 printf("SEC_MON already in Non Secure state.\n");
113 return 0;
114 }
115 return 0;
116}
gaurav ranafe783782015-02-27 09:44:22 +0530117
Sumit Gargb2597322016-08-31 08:54:15 -0400118static int set_sec_mon_state_soft_fail(void)
119{
120 u32 sts;
121 int timeout = 10;
122 struct ccsr_sec_mon_regs *sec_mon_regs = (void *)
Tom Rini65cc0e22022-11-16 13:10:41 -0500123 (CFG_SYS_SEC_MON_ADDR);
gaurav ranafe783782015-02-27 09:44:22 +0530124
Sumit Gargb2597322016-08-31 08:54:15 -0400125 printf("SEC_MON state transitioning to Soft Fail.\n");
126 sec_mon_setbits32(&sec_mon_regs->hp_com, HPCOMR_SW_FSV);
gaurav ranafe783782015-02-27 09:44:22 +0530127
Sumit Gargb2597322016-08-31 08:54:15 -0400128 /* polling loop till SEC_MON is in Soft-Fail state */
129 while (timeout) {
130 sts = get_sec_mon_state();
gaurav ranafe783782015-02-27 09:44:22 +0530131
Sumit Gargb2597322016-08-31 08:54:15 -0400132 if ((sts & HPSR_SSM_ST_MASK) ==
133 HPSR_SSM_ST_SOFT_FAIL)
gaurav ranafe783782015-02-27 09:44:22 +0530134 break;
Sumit Gargb2597322016-08-31 08:54:15 -0400135
136 udelay(10);
137 timeout--;
gaurav ranafe783782015-02-27 09:44:22 +0530138 }
139
Sumit Gargb2597322016-08-31 08:54:15 -0400140 if (timeout == 0) {
141 printf("SEC_MON state transition timeout.\n");
142 return -1;
143 }
gaurav ranafe783782015-02-27 09:44:22 +0530144 return 0;
145}
Sumit Gargb2597322016-08-31 08:54:15 -0400146
147int set_sec_mon_state(u32 state)
148{
149 int ret = -1;
150
151 switch (state) {
152 case HPSR_SSM_ST_NON_SECURE:
153 ret = set_sec_mon_state_non_sec();
154 break;
155 case HPSR_SSM_ST_SOFT_FAIL:
156 ret = set_sec_mon_state_soft_fail();
157 break;
158 default:
159 printf("SEC_MON state transition not supported.\n");
160 return 0;
161 }
162
163 return ret;
164}