From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from magratgarlick.emantor.de ([78.46.208.201]) by bombadil.infradead.org with esmtps (Exim 4.92 #3 (Red Hat Linux)) id 1huZDv-00043W-L7 for barebox@lists.infradead.org; Mon, 05 Aug 2019 09:24:13 +0000 From: Rouven Czerwinski Date: Mon, 5 Aug 2019 11:23:41 +0200 Message-Id: <03ea3dc20571d075cee01127c189e4db4e2a36f9.1564997015.git-series.r.czerwinski@pengutronix.de> In-Reply-To: References: MIME-Version: 1.0 List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "barebox" Errors-To: barebox-bounces+u.kleine-koenig=pengutronix.de@lists.infradead.org Subject: [PATCH v2 02/16] i.MX: HABv4: implement interface for i.MX8MQ To: barebox@lists.infradead.org Cc: Rouven Czerwinski The HAB interface for i.MX8MQ only implements the retrieval of status and events. The SoC status is retrieved using the TF-A SIP API found in the downstream imx TF-A. After calling into the TF-A the passed data structures need to be invalidated, since otherwise the cached zero value is used. Currently the TF-A report event call only supports FAILURE events. Testing the TF-A with other event types resulted in a freeze in the bootrom code, which was not investigated further. We instead walk the memory containing the events and retrieve the events ourselves. They are exposed using the same API. Signed-off-by: Rouven Czerwinski --- drivers/hab/hab.c | 2 +- drivers/hab/habv4.c | 109 +++++++++++++++++++++++++++++++++++++++++++++- 2 files changed, 110 insertions(+), 1 deletion(-) diff --git a/drivers/hab/hab.c b/drivers/hab/hab.c index 03bb65e..a346e01 100644 --- a/drivers/hab/hab.c +++ b/drivers/hab/hab.c @@ -217,7 +217,7 @@ static struct imx_hab_ops *imx_get_hab_ops(void) if (IS_ENABLED(CONFIG_HABV3) && (cpu_is_mx25() || cpu_is_mx35())) tmp = &imx_hab_ops_iim; - else if (IS_ENABLED(CONFIG_HABV4) && cpu_is_mx6()) + else if (IS_ENABLED(CONFIG_HABV4) && (cpu_is_mx6() || cpu_is_mx8mq())) tmp = &imx_hab_ops_ocotp; else return NULL; diff --git a/drivers/hab/habv4.c b/drivers/hab/habv4.c index b11cf7b..0bfd652 100644 --- a/drivers/hab/habv4.c +++ b/drivers/hab/habv4.c @@ -22,8 +22,11 @@ #include #include #include +#include +#include #include +#include #define HABV4_RVT_IMX28 0xffff8af8 #define HABV4_RVT_IMX6_OLD 0x00000094 @@ -177,6 +180,85 @@ struct habv4_rvt { void (*failsafe)(void); } __packed; +#define FSL_SIP_HAB 0xC2000007 +#define FSL_SIP_HAB_AUTHENTICATE 0x00 +#define FSL_SIP_HAB_ENTRY 0x01 +#define FSL_SIP_HAB_EXIT 0x02 +#define FSL_SIP_HAB_REPORT_EVENT 0x03 +#define FSL_SIP_HAB_REPORT_STATUS 0x04 +#define FSL_SIP_HAB_FAILSAFE 0x05 +#define FSL_SIP_HAB_CHECK_TARGET 0x06 + +static enum hab_status hab_sip_report_status(enum hab_config *config, + enum hab_state *state) +{ + struct arm_smccc_res res; + + arm_smccc_smc(FSL_SIP_HAB, FSL_SIP_HAB_REPORT_STATUS, + (unsigned long) config, + (unsigned long) state, 0, 0, 0, 0, &res); + if (state) + v8_inv_dcache_range((unsigned long) state, + (unsigned long)state + sizeof(*config)); + if (config) + v8_inv_dcache_range((unsigned long) config, + (unsigned long)config + sizeof(*state)); + return (enum hab_status)res.a0; +} + +static enum hab_status imx8_read_sram_events(enum hab_status status, + uint32_t index, void *event, + uint32_t *bytes) +{ + struct hab_event_record *events[10]; + int num_events = 0; + char *sram = (char *)0x9061c0; + int i = 0; + int internal_index = 0; + char *end = 0; + struct hab_event_record *search; + + /* + * AN12263 HABv4 Guidelines and Recommendations + * recommends the address and size, however errors are usually contained + * within the first bytes. Scan only the first few bytes to rule out + * lots of false positives. + */ + end = sram + 0x1a0; + + while (sram < end) { + if (*sram == 0xdb) { + search = (void *)sram; + sram = sram + be16_to_cpu(search->hdr.len); + events[num_events] = search; + num_events++; + } else { + sram++; + } + } + while (i < num_events) { + if (events[i]->status == status) { + if (internal_index == index) { + *bytes = sizeof(struct hab_event_record) + + be16_to_cpu(events[i]->hdr.len); + if (event) + memcpy(event, events[i], *bytes); + return HAB_STATUS_SUCCESS; + } else { + internal_index++; + } + } + i++; + } + return HAB_STATUS_FAILURE; +} + +struct habv4_rvt hab_smc_ops = { + .header = { .tag = 0xdd }, + .report_event = imx8_read_sram_events, + .report_status = hab_sip_report_status, +}; + static const char *habv4_get_status_str(enum hab_status status) { switch (status) { @@ -509,6 +591,33 @@ int imx6_hab_get_status(void) return -EINVAL; } +static int imx8_hab_get_status(void) +{ + return habv4_get_status(&hab_smc_ops); +} + +static int init_imx8_hab_get_status(void) +{ + if (!cpu_is_mx8mq()) + /* can happen in multi-image builds and is not an error */ + return 0; + + /* + * Nobody will check the return value if there were HAB errors, but the + * initcall will fail spectaculously with a strange error message. + */ + imx8_hab_get_status(); + + return 0; +} + +/* + * + * + * + */ +postmmu_initcall(init_imx8_hab_get_status); + static int init_imx6_hab_get_status(void) { if (!cpu_is_mx6()) -- git-series 0.9.1 _______________________________________________ barebox mailing list barebox@lists.infradead.org http://lists.infradead.org/mailman/listinfo/barebox