mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-18 10:34:19 +00:00

To be able to further restrict the memory access for the Arm(R) Ethos(TM)-N NPU, separate read-only and read/write NSAIDs for the non-protected and protected memory have been added to the Juno platform's TZMP1 TZC configuration for the NPU. The platform definition has been updated accordingly and the NPU driver will now only give read/write access to the streams that require it. Signed-off-by: Mikael Olsson <mikael.olsson@arm.com> Change-Id: I5a173500fc1943a5cd406a3b379e1f1f554eeda6
597 lines
16 KiB
C
597 lines
16 KiB
C
/*
|
|
* Copyright (c) 2021-2023, Arm Limited. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <stdint.h>
|
|
#include <stdbool.h>
|
|
|
|
#include <common/debug.h>
|
|
#include <common/runtime_svc.h>
|
|
#include <drivers/arm/ethosn.h>
|
|
#include <drivers/delay_timer.h>
|
|
#include <lib/mmio.h>
|
|
#include <lib/utils_def.h>
|
|
#include <plat/arm/common/fconf_ethosn_getter.h>
|
|
|
|
#include <platform_def.h>
|
|
|
|
#if ARM_ETHOSN_NPU_TZMP1
|
|
#include "ethosn_big_fw.h"
|
|
#endif
|
|
|
|
/*
|
|
* Number of Arm(R) Ethos(TM)-N NPU (NPU) devices available
|
|
*/
|
|
#define ETHOSN_NUM_DEVICES \
|
|
FCONF_GET_PROPERTY(hw_config, ethosn_config, num_devices)
|
|
|
|
#define ETHOSN_GET_DEVICE(dev_idx) \
|
|
FCONF_GET_PROPERTY(hw_config, ethosn_device, dev_idx)
|
|
|
|
/* NPU core sec registry address */
|
|
#define ETHOSN_CORE_SEC_REG(core_addr, reg_offset) \
|
|
(core_addr + reg_offset)
|
|
|
|
#define ETHOSN_FW_VA_BASE 0x20000000UL
|
|
#define ETHOSN_WORKING_DATA_VA_BASE 0x40000000UL
|
|
#define ETHOSN_COMMAND_STREAM_VA_BASE 0x60000000UL
|
|
|
|
/* Reset timeout in us */
|
|
#define ETHOSN_RESET_TIMEOUT_US U(10 * 1000 * 1000)
|
|
#define ETHOSN_RESET_WAIT_US U(1)
|
|
|
|
#define ETHOSN_AUX_FEAT_LEVEL_IRQ U(0x1)
|
|
#define ETHOSN_AUX_FEAT_STASHING U(0x2)
|
|
|
|
#define SEC_AUXCTLR_REG U(0x0024)
|
|
#define SEC_AUXCTLR_VAL U(0x80)
|
|
#define SEC_AUXCTLR_LEVEL_IRQ_VAL U(0x04)
|
|
#define SEC_AUXCTLR_STASHING_VAL U(0xA5000000)
|
|
|
|
#define SEC_DEL_REG U(0x0004)
|
|
#if ARM_ETHOSN_NPU_TZMP1
|
|
#define SEC_DEL_VAL U(0x808)
|
|
#else
|
|
#define SEC_DEL_VAL U(0x80C)
|
|
#endif
|
|
#define SEC_DEL_EXCC_MASK U(0x20)
|
|
|
|
#define SEC_SECCTLR_REG U(0x0010)
|
|
/* Set bit[10] = 1 to workaround erratum 2838783 */
|
|
#define SEC_SECCTLR_VAL U(0x403)
|
|
|
|
#define SEC_DEL_ADDR_EXT_REG U(0x201C)
|
|
#define SEC_DEL_ADDR_EXT_VAL U(0x1)
|
|
|
|
#define SEC_SYSCTRL0_REG U(0x0018)
|
|
#define SEC_SYSCTRL0_CPU_WAIT U(1)
|
|
#define SEC_SYSCTRL0_SLEEPING U(1U << 4)
|
|
#define SEC_SYSCTRL0_INITVTOR_MASK U(0x1FFFFF80)
|
|
#define SEC_SYSCTRL0_SOFT_RESET U(3U << 29)
|
|
#define SEC_SYSCTRL0_HARD_RESET U(1U << 31)
|
|
|
|
#define SEC_SYSCTRL1_REG U(0x001C)
|
|
#define SEC_SYSCTRL1_VAL U(0x180110)
|
|
|
|
#define SEC_NSAID_REG_BASE U(0x3004)
|
|
#define SEC_NSAID_OFFSET U(0x1000)
|
|
|
|
#define SEC_MMUSID_REG_BASE U(0x3008)
|
|
#define SEC_MMUSID_OFFSET U(0x1000)
|
|
|
|
#define SEC_ADDR_EXT_REG_BASE U(0x3018)
|
|
#define SEC_ADDR_EXT_OFFSET U(0x1000)
|
|
#define SEC_ADDR_EXT_SHIFT U(0x14)
|
|
#define SEC_ADDR_EXT_MASK U(0x1FFFFE00)
|
|
|
|
#define SEC_ATTR_CTLR_REG_BASE U(0x3010)
|
|
#define SEC_ATTR_CTLR_OFFSET U(0x1000)
|
|
#define SEC_ATTR_CTLR_NUM U(9)
|
|
#define SEC_ATTR_CTLR_VAL U(0x1)
|
|
|
|
#define SEC_NPU_ID_REG U(0xF000)
|
|
#define SEC_NPU_ID_ARCH_VER_SHIFT U(0X10)
|
|
|
|
#define FIRMWARE_STREAM_INDEX U(0x0)
|
|
#define WORKING_STREAM_INDEX U(0x1)
|
|
#define PLE_STREAM_INDEX U(0x4)
|
|
#define INPUT_STREAM_INDEX U(0x6)
|
|
#define INTERMEDIATE_STREAM_INDEX U(0x7)
|
|
#define OUTPUT_STREAM_INDEX U(0x8)
|
|
|
|
#define TO_EXTEND_ADDR(addr) \
|
|
((addr >> SEC_ADDR_EXT_SHIFT) & SEC_ADDR_EXT_MASK)
|
|
|
|
#if ARM_ETHOSN_NPU_TZMP1
|
|
CASSERT(ARM_ETHOSN_NPU_FW_IMAGE_BASE > 0U, assert_ethosn_invalid_fw_image_base);
|
|
static const struct ethosn_big_fw *big_fw;
|
|
|
|
#define FW_INITVTOR_ADDR(big_fw) \
|
|
((ETHOSN_FW_VA_BASE + big_fw->vector_table_offset) & \
|
|
SEC_SYSCTRL0_INITVTOR_MASK)
|
|
|
|
#define SYSCTRL0_INITVTOR_ADDR(value) \
|
|
(value & SEC_SYSCTRL0_INITVTOR_MASK)
|
|
|
|
#endif
|
|
|
|
static bool ethosn_get_device_and_core(uintptr_t core_addr,
|
|
const struct ethosn_device_t **dev_match,
|
|
const struct ethosn_core_t **core_match)
|
|
{
|
|
uint32_t dev_idx;
|
|
uint32_t core_idx;
|
|
|
|
for (dev_idx = 0U; dev_idx < ETHOSN_NUM_DEVICES; ++dev_idx) {
|
|
const struct ethosn_device_t *dev = ETHOSN_GET_DEVICE(dev_idx);
|
|
|
|
for (core_idx = 0U; core_idx < dev->num_cores; ++core_idx) {
|
|
const struct ethosn_core_t *core = &(dev->cores[core_idx]);
|
|
|
|
if (core->addr == core_addr) {
|
|
*dev_match = dev;
|
|
*core_match = core;
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
|
|
WARN("ETHOSN: Unknown core address given to SMC call.\n");
|
|
return false;
|
|
}
|
|
|
|
#if ARM_ETHOSN_NPU_TZMP1
|
|
static uint32_t ethosn_core_read_arch_version(uintptr_t core_addr)
|
|
{
|
|
uint32_t npu_id = mmio_read_32(ETHOSN_CORE_SEC_REG(core_addr,
|
|
SEC_NPU_ID_REG));
|
|
|
|
return (npu_id >> SEC_NPU_ID_ARCH_VER_SHIFT);
|
|
}
|
|
|
|
static void ethosn_configure_stream_nsaid(const struct ethosn_core_t *core,
|
|
bool is_protected)
|
|
{
|
|
size_t i;
|
|
uint32_t streams[9] = {[0 ... 8] = ARM_ETHOSN_NPU_NS_RO_DATA_NSAID};
|
|
|
|
streams[FIRMWARE_STREAM_INDEX] = ARM_ETHOSN_NPU_PROT_FW_NSAID;
|
|
streams[PLE_STREAM_INDEX] = ARM_ETHOSN_NPU_PROT_FW_NSAID;
|
|
|
|
streams[WORKING_STREAM_INDEX] = ARM_ETHOSN_NPU_NS_RW_DATA_NSAID;
|
|
|
|
if (is_protected) {
|
|
streams[INPUT_STREAM_INDEX] = ARM_ETHOSN_NPU_PROT_RO_DATA_NSAID;
|
|
streams[INTERMEDIATE_STREAM_INDEX] =
|
|
ARM_ETHOSN_NPU_PROT_RW_DATA_NSAID;
|
|
streams[OUTPUT_STREAM_INDEX] = ARM_ETHOSN_NPU_PROT_RW_DATA_NSAID;
|
|
} else {
|
|
streams[INPUT_STREAM_INDEX] = ARM_ETHOSN_NPU_NS_RO_DATA_NSAID;
|
|
streams[INTERMEDIATE_STREAM_INDEX] =
|
|
ARM_ETHOSN_NPU_NS_RW_DATA_NSAID;
|
|
streams[OUTPUT_STREAM_INDEX] = ARM_ETHOSN_NPU_NS_RW_DATA_NSAID;
|
|
}
|
|
|
|
for (i = 0U; i < ARRAY_SIZE(streams); ++i) {
|
|
const uintptr_t reg_addr = SEC_NSAID_REG_BASE +
|
|
(SEC_NSAID_OFFSET * i);
|
|
mmio_write_32(ETHOSN_CORE_SEC_REG(core->addr, reg_addr),
|
|
streams[i]);
|
|
}
|
|
}
|
|
|
|
static void ethosn_configure_vector_table(uintptr_t core_addr)
|
|
{
|
|
mmio_setbits_32(ETHOSN_CORE_SEC_REG(core_addr, SEC_SYSCTRL0_REG),
|
|
FW_INITVTOR_ADDR(big_fw));
|
|
}
|
|
|
|
#endif
|
|
|
|
static void ethosn_configure_events(uintptr_t core_addr)
|
|
{
|
|
mmio_write_32(ETHOSN_CORE_SEC_REG(core_addr, SEC_SYSCTRL1_REG), SEC_SYSCTRL1_VAL);
|
|
}
|
|
|
|
static bool ethosn_configure_aux_features(const struct ethosn_device_t *device,
|
|
uintptr_t core_addr,
|
|
uint32_t features)
|
|
{
|
|
uint32_t val = SEC_AUXCTLR_VAL;
|
|
|
|
if (features & ETHOSN_AUX_FEAT_LEVEL_IRQ) {
|
|
val |= SEC_AUXCTLR_LEVEL_IRQ_VAL;
|
|
}
|
|
|
|
if (features & ETHOSN_AUX_FEAT_STASHING) {
|
|
/* Stashing can't be used with reserved memory */
|
|
if (device->has_reserved_memory) {
|
|
return false;
|
|
}
|
|
|
|
val |= SEC_AUXCTLR_STASHING_VAL;
|
|
}
|
|
|
|
mmio_setbits_32(ETHOSN_CORE_SEC_REG(core_addr, SEC_AUXCTLR_REG), val);
|
|
|
|
return true;
|
|
}
|
|
|
|
static void ethosn_configure_smmu_streams(const struct ethosn_device_t *device,
|
|
const struct ethosn_core_t *core,
|
|
uint32_t asset_alloc_idx)
|
|
{
|
|
const struct ethosn_main_allocator_t *main_alloc =
|
|
&(core->main_allocator);
|
|
const struct ethosn_asset_allocator_t *asset_alloc =
|
|
&(device->asset_allocators[asset_alloc_idx]);
|
|
const uint32_t streams[9] = {
|
|
main_alloc->firmware.stream_id,
|
|
main_alloc->working_data.stream_id,
|
|
asset_alloc->command_stream.stream_id,
|
|
0U, /* Not used*/
|
|
main_alloc->firmware.stream_id,
|
|
asset_alloc->weight_data.stream_id,
|
|
asset_alloc->buffer_data.stream_id,
|
|
asset_alloc->intermediate_data.stream_id,
|
|
asset_alloc->buffer_data.stream_id
|
|
};
|
|
size_t i;
|
|
|
|
for (i = 0U; i < ARRAY_SIZE(streams); ++i) {
|
|
const uintptr_t reg_addr = SEC_MMUSID_REG_BASE +
|
|
(SEC_MMUSID_OFFSET * i);
|
|
mmio_write_32(ETHOSN_CORE_SEC_REG(core->addr, reg_addr),
|
|
streams[i]);
|
|
}
|
|
}
|
|
|
|
static void ethosn_configure_stream_addr_extends(const struct ethosn_device_t *device,
|
|
uintptr_t core_addr)
|
|
{
|
|
uint32_t addr_extends[3] = { 0 };
|
|
size_t i;
|
|
|
|
if (device->has_reserved_memory) {
|
|
const uint32_t addr = TO_EXTEND_ADDR(device->reserved_memory_addr);
|
|
|
|
addr_extends[0] = addr;
|
|
addr_extends[1] = addr;
|
|
addr_extends[2] = addr;
|
|
} else {
|
|
addr_extends[0] = TO_EXTEND_ADDR(ETHOSN_FW_VA_BASE);
|
|
addr_extends[1] = TO_EXTEND_ADDR(ETHOSN_WORKING_DATA_VA_BASE);
|
|
addr_extends[2] = TO_EXTEND_ADDR(ETHOSN_COMMAND_STREAM_VA_BASE);
|
|
}
|
|
|
|
for (i = 0U; i < ARRAY_SIZE(addr_extends); ++i) {
|
|
const uintptr_t reg_addr = SEC_ADDR_EXT_REG_BASE +
|
|
(SEC_ADDR_EXT_OFFSET * i);
|
|
mmio_write_32(ETHOSN_CORE_SEC_REG(core_addr, reg_addr),
|
|
addr_extends[i]);
|
|
}
|
|
}
|
|
|
|
static void ethosn_configure_stream_attr_ctlr(uintptr_t core_addr)
|
|
{
|
|
size_t i;
|
|
|
|
for (i = 0U; i < SEC_ATTR_CTLR_NUM; ++i) {
|
|
const uintptr_t reg_addr = SEC_ATTR_CTLR_REG_BASE +
|
|
(SEC_ATTR_CTLR_OFFSET * i);
|
|
mmio_write_32(ETHOSN_CORE_SEC_REG(core_addr, reg_addr),
|
|
SEC_ATTR_CTLR_VAL);
|
|
}
|
|
}
|
|
|
|
static void ethosn_delegate_to_ns(uintptr_t core_addr)
|
|
{
|
|
mmio_setbits_32(ETHOSN_CORE_SEC_REG(core_addr, SEC_SECCTLR_REG),
|
|
SEC_SECCTLR_VAL);
|
|
|
|
mmio_setbits_32(ETHOSN_CORE_SEC_REG(core_addr, SEC_DEL_REG),
|
|
SEC_DEL_VAL);
|
|
|
|
mmio_setbits_32(ETHOSN_CORE_SEC_REG(core_addr, SEC_DEL_ADDR_EXT_REG),
|
|
SEC_DEL_ADDR_EXT_VAL);
|
|
}
|
|
|
|
static int ethosn_is_sec(uintptr_t core_addr)
|
|
{
|
|
if ((mmio_read_32(ETHOSN_CORE_SEC_REG(core_addr, SEC_DEL_REG))
|
|
& SEC_DEL_EXCC_MASK) != 0U) {
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int ethosn_core_is_sleeping(uintptr_t core_addr)
|
|
{
|
|
const uintptr_t sysctrl0_reg =
|
|
ETHOSN_CORE_SEC_REG(core_addr, SEC_SYSCTRL0_REG);
|
|
const uint32_t sleeping_mask = SEC_SYSCTRL0_SLEEPING;
|
|
|
|
return ((mmio_read_32(sysctrl0_reg) & sleeping_mask) == sleeping_mask);
|
|
}
|
|
|
|
static bool ethosn_core_reset(uintptr_t core_addr, bool hard_reset)
|
|
{
|
|
unsigned int timeout;
|
|
const uintptr_t sysctrl0_reg =
|
|
ETHOSN_CORE_SEC_REG(core_addr, SEC_SYSCTRL0_REG);
|
|
const uint32_t reset_val = hard_reset ? SEC_SYSCTRL0_HARD_RESET :
|
|
SEC_SYSCTRL0_SOFT_RESET;
|
|
|
|
mmio_write_32(sysctrl0_reg, reset_val);
|
|
|
|
/* Wait for reset to complete */
|
|
for (timeout = 0U; timeout < ETHOSN_RESET_TIMEOUT_US;
|
|
timeout += ETHOSN_RESET_WAIT_US) {
|
|
|
|
if ((mmio_read_32(sysctrl0_reg) & reset_val) == 0U) {
|
|
break;
|
|
}
|
|
|
|
udelay(ETHOSN_RESET_WAIT_US);
|
|
}
|
|
|
|
return timeout < ETHOSN_RESET_TIMEOUT_US;
|
|
}
|
|
|
|
static int ethosn_core_boot_fw(uintptr_t core_addr)
|
|
{
|
|
#if ARM_ETHOSN_NPU_TZMP1
|
|
const uintptr_t sysctrl0_reg = ETHOSN_CORE_SEC_REG(core_addr, SEC_SYSCTRL0_REG);
|
|
const uint32_t sysctrl0_val = mmio_read_32(sysctrl0_reg);
|
|
const bool waiting = (sysctrl0_val & SEC_SYSCTRL0_CPU_WAIT);
|
|
|
|
if (!waiting) {
|
|
WARN("ETHOSN: Firmware is already running.\n");
|
|
return ETHOSN_INVALID_STATE;
|
|
}
|
|
|
|
if (SYSCTRL0_INITVTOR_ADDR(sysctrl0_val) != FW_INITVTOR_ADDR(big_fw)) {
|
|
WARN("ETHOSN: Unknown vector table won't boot firmware.\n");
|
|
return ETHOSN_INVALID_CONFIGURATION;
|
|
}
|
|
|
|
mmio_clrbits_32(sysctrl0_reg, SEC_SYSCTRL0_CPU_WAIT);
|
|
|
|
return ETHOSN_SUCCESS;
|
|
#else
|
|
return ETHOSN_NOT_SUPPORTED;
|
|
#endif
|
|
}
|
|
|
|
static int ethosn_core_full_reset(const struct ethosn_device_t *device,
|
|
const struct ethosn_core_t *core,
|
|
bool hard_reset,
|
|
u_register_t asset_alloc_idx,
|
|
u_register_t is_protected,
|
|
u_register_t aux_features)
|
|
{
|
|
if (!device->has_reserved_memory &&
|
|
asset_alloc_idx >= device->num_allocators) {
|
|
WARN("ETHOSN: Unknown asset allocator index given to SMC call.\n");
|
|
return ETHOSN_UNKNOWN_ALLOCATOR_IDX;
|
|
}
|
|
|
|
if (!ethosn_core_reset(core->addr, hard_reset)) {
|
|
return ETHOSN_FAILURE;
|
|
}
|
|
|
|
if (!ethosn_configure_aux_features(device, core->addr, aux_features)) {
|
|
return ETHOSN_INVALID_CONFIGURATION;
|
|
}
|
|
|
|
ethosn_configure_events(core->addr);
|
|
|
|
if (!device->has_reserved_memory) {
|
|
ethosn_configure_smmu_streams(device, core, asset_alloc_idx);
|
|
|
|
#if ARM_ETHOSN_NPU_TZMP1
|
|
ethosn_configure_stream_nsaid(core, is_protected);
|
|
#endif
|
|
}
|
|
|
|
ethosn_configure_stream_addr_extends(device, core->addr);
|
|
ethosn_configure_stream_attr_ctlr(core->addr);
|
|
|
|
#if ARM_ETHOSN_NPU_TZMP1
|
|
ethosn_configure_vector_table(core->addr);
|
|
#endif
|
|
|
|
ethosn_delegate_to_ns(core->addr);
|
|
|
|
return ETHOSN_SUCCESS;
|
|
}
|
|
|
|
static uintptr_t ethosn_smc_core_reset_handler(const struct ethosn_device_t *device,
|
|
const struct ethosn_core_t *core,
|
|
bool hard_reset,
|
|
u_register_t asset_alloc_idx,
|
|
u_register_t reset_type,
|
|
u_register_t is_protected,
|
|
u_register_t aux_features,
|
|
void *handle)
|
|
{
|
|
int ret;
|
|
|
|
switch (reset_type) {
|
|
case ETHOSN_RESET_TYPE_FULL:
|
|
ret = ethosn_core_full_reset(device, core, hard_reset,
|
|
asset_alloc_idx, is_protected,
|
|
aux_features);
|
|
break;
|
|
case ETHOSN_RESET_TYPE_HALT:
|
|
ret = ethosn_core_reset(core->addr, hard_reset) ? ETHOSN_SUCCESS : ETHOSN_FAILURE;
|
|
break;
|
|
default:
|
|
WARN("ETHOSN: Invalid reset type given to SMC call.\n");
|
|
ret = ETHOSN_INVALID_PARAMETER;
|
|
break;
|
|
}
|
|
|
|
SMC_RET1(handle, ret);
|
|
}
|
|
|
|
static uintptr_t ethosn_smc_core_handler(uint32_t fid,
|
|
u_register_t core_addr,
|
|
u_register_t asset_alloc_idx,
|
|
u_register_t reset_type,
|
|
u_register_t is_protected,
|
|
u_register_t aux_features,
|
|
void *handle)
|
|
{
|
|
bool hard_reset = false;
|
|
const struct ethosn_device_t *device = NULL;
|
|
const struct ethosn_core_t *core = NULL;
|
|
|
|
if (!ethosn_get_device_and_core(core_addr, &device, &core)) {
|
|
SMC_RET1(handle, ETHOSN_UNKNOWN_CORE_ADDRESS);
|
|
}
|
|
|
|
switch (fid) {
|
|
case ETHOSN_FNUM_IS_SEC:
|
|
SMC_RET1(handle, ethosn_is_sec(core->addr));
|
|
case ETHOSN_FNUM_IS_SLEEPING:
|
|
SMC_RET1(handle, ethosn_core_is_sleeping(core->addr));
|
|
case ETHOSN_FNUM_HARD_RESET:
|
|
hard_reset = true;
|
|
/* Fallthrough */
|
|
case ETHOSN_FNUM_SOFT_RESET:
|
|
return ethosn_smc_core_reset_handler(device, core,
|
|
hard_reset,
|
|
asset_alloc_idx,
|
|
reset_type,
|
|
is_protected,
|
|
aux_features,
|
|
handle);
|
|
case ETHOSN_FNUM_BOOT_FW:
|
|
SMC_RET1(handle, ethosn_core_boot_fw(core->addr));
|
|
default:
|
|
WARN("ETHOSN: Unimplemented SMC call: 0x%x\n", fid);
|
|
SMC_RET1(handle, SMC_UNK);
|
|
}
|
|
}
|
|
|
|
static uintptr_t ethosn_smc_fw_prop_handler(u_register_t fw_property,
|
|
void *handle)
|
|
{
|
|
#if ARM_ETHOSN_NPU_TZMP1
|
|
switch (fw_property) {
|
|
case ETHOSN_FW_PROP_VERSION:
|
|
SMC_RET4(handle, ETHOSN_SUCCESS,
|
|
big_fw->fw_ver_major,
|
|
big_fw->fw_ver_minor,
|
|
big_fw->fw_ver_patch);
|
|
case ETHOSN_FW_PROP_MEM_INFO:
|
|
SMC_RET3(handle, ETHOSN_SUCCESS,
|
|
((void *)big_fw) + big_fw->offset,
|
|
big_fw->size);
|
|
case ETHOSN_FW_PROP_OFFSETS:
|
|
SMC_RET3(handle, ETHOSN_SUCCESS,
|
|
big_fw->ple_offset,
|
|
big_fw->unpriv_stack_offset);
|
|
case ETHOSN_FW_PROP_VA_MAP:
|
|
SMC_RET4(handle, ETHOSN_SUCCESS,
|
|
ETHOSN_FW_VA_BASE,
|
|
ETHOSN_WORKING_DATA_VA_BASE,
|
|
ETHOSN_COMMAND_STREAM_VA_BASE);
|
|
default:
|
|
WARN("ETHOSN: Unknown firmware property\n");
|
|
SMC_RET1(handle, ETHOSN_INVALID_PARAMETER);
|
|
}
|
|
#else
|
|
SMC_RET1(handle, ETHOSN_NOT_SUPPORTED);
|
|
#endif
|
|
}
|
|
|
|
uintptr_t ethosn_smc_handler(uint32_t smc_fid,
|
|
u_register_t x1,
|
|
u_register_t x2,
|
|
u_register_t x3,
|
|
u_register_t x4,
|
|
void *cookie,
|
|
void *handle,
|
|
u_register_t flags)
|
|
{
|
|
const uint32_t fid = smc_fid & FUNCID_NUM_MASK;
|
|
|
|
/* Only SiP fast calls are expected */
|
|
if ((GET_SMC_TYPE(smc_fid) != SMC_TYPE_FAST) ||
|
|
(GET_SMC_OEN(smc_fid) != OEN_SIP_START)) {
|
|
SMC_RET1(handle, SMC_UNK);
|
|
}
|
|
|
|
/* Truncate parameters to 32-bits for SMC32 */
|
|
if (GET_SMC_CC(smc_fid) == SMC_32) {
|
|
x1 &= 0xFFFFFFFF;
|
|
x2 &= 0xFFFFFFFF;
|
|
x3 &= 0xFFFFFFFF;
|
|
x4 &= 0xFFFFFFFF;
|
|
}
|
|
|
|
if (!is_ethosn_fid(smc_fid) || (fid > ETHOSN_FNUM_BOOT_FW)) {
|
|
WARN("ETHOSN: Unknown SMC call: 0x%x\n", smc_fid);
|
|
SMC_RET1(handle, SMC_UNK);
|
|
}
|
|
|
|
switch (fid) {
|
|
case ETHOSN_FNUM_VERSION:
|
|
SMC_RET2(handle, ETHOSN_VERSION_MAJOR, ETHOSN_VERSION_MINOR);
|
|
case ETHOSN_FNUM_GET_FW_PROP:
|
|
return ethosn_smc_fw_prop_handler(x1, handle);
|
|
}
|
|
|
|
return ethosn_smc_core_handler(fid, x1, x2, x3, x4,
|
|
SMC_GET_GP(handle, CTX_GPREG_X5),
|
|
handle);
|
|
}
|
|
|
|
int ethosn_smc_setup(void)
|
|
{
|
|
#if ARM_ETHOSN_NPU_TZMP1
|
|
struct ethosn_device_t *dev;
|
|
uint32_t arch_ver;
|
|
#endif
|
|
|
|
if (ETHOSN_NUM_DEVICES == 0U) {
|
|
ERROR("ETHOSN: No NPU found\n");
|
|
return ETHOSN_FAILURE;
|
|
}
|
|
|
|
#if ARM_ETHOSN_NPU_TZMP1
|
|
|
|
/* Only one NPU core is supported in the TZMP1 setup */
|
|
if ((ETHOSN_NUM_DEVICES != 1U) ||
|
|
(ETHOSN_GET_DEVICE(0U)->num_cores != 1U)) {
|
|
ERROR("ETHOSN: TZMP1 doesn't support multiple NPU cores\n");
|
|
return ETHOSN_FAILURE;
|
|
}
|
|
|
|
dev = ETHOSN_GET_DEVICE(0U);
|
|
if (dev->has_reserved_memory) {
|
|
ERROR("ETHOSN: TZMP1 doesn't support using reserved memory\n");
|
|
return ETHOSN_FAILURE;
|
|
}
|
|
|
|
arch_ver = ethosn_core_read_arch_version(dev->cores[0U].addr);
|
|
big_fw = (struct ethosn_big_fw *)ARM_ETHOSN_NPU_FW_IMAGE_BASE;
|
|
|
|
if (!ethosn_big_fw_verify_header(big_fw, arch_ver)) {
|
|
return ETHOSN_FAILURE;
|
|
}
|
|
|
|
NOTICE("ETHOSN: TZMP1 setup succeeded with firmware version %u.%u.%u\n",
|
|
big_fw->fw_ver_major, big_fw->fw_ver_minor,
|
|
big_fw->fw_ver_patch);
|
|
#else
|
|
NOTICE("ETHOSN: Setup succeeded\n");
|
|
#endif
|
|
|
|
return 0;
|
|
}
|