xref: /rk3399_ARM-atf/plat/nvidia/tegra/soc/t194/drivers/se/se.c (revision 735e9a0e124a6f17c08a9f9cff3e3c5b7c9f6da0)
1f1f72019SOlivier Deprez /*
2f1f72019SOlivier Deprez  * Copyright (c) 2020, ARM Limited and Contributors. All rights reserved.
3d11f5e05Ssteven kao  * Copyright (c) 2019-2020, NVIDIA CORPORATION. All rights reserved.
46eb3c188SSteven Kao  *
56eb3c188SSteven Kao  * SPDX-License-Identifier: BSD-3-Clause
66eb3c188SSteven Kao  */
76eb3c188SSteven Kao 
86eb3c188SSteven Kao #include <assert.h>
96eb3c188SSteven Kao #include <errno.h>
106eb3c188SSteven Kao #include <stdbool.h>
116eb3c188SSteven Kao 
126eb3c188SSteven Kao #include <arch_helpers.h>
13d11f5e05Ssteven kao #include <bpmp_ipc.h>
146eb3c188SSteven Kao #include <common/debug.h>
156eb3c188SSteven Kao #include <drivers/delay_timer.h>
166eb3c188SSteven Kao #include <lib/mmio.h>
176eb3c188SSteven Kao #include <lib/psci/psci.h>
188d4107f0SVarun Wadekar #include <se.h>
196eb3c188SSteven Kao #include <tegra_platform.h>
206eb3c188SSteven Kao 
216eb3c188SSteven Kao #include "se_private.h"
226eb3c188SSteven Kao 
236eb3c188SSteven Kao /*******************************************************************************
246eb3c188SSteven Kao  * Constants and Macros
256eb3c188SSteven Kao  ******************************************************************************/
266eb3c188SSteven Kao #define ERR_STATUS_SW_CLEAR		U(0xFFFFFFFF)
276eb3c188SSteven Kao #define INT_STATUS_SW_CLEAR		U(0xFFFFFFFF)
28*3d1cac96SVarun Wadekar #define MAX_TIMEOUT_MS			U(1000)	/* Max. timeout of 1s */
296eb3c188SSteven Kao #define NUM_SE_REGS_TO_SAVE		U(4)
306eb3c188SSteven Kao 
31029dd14eSJeetesh Burman #define BYTES_IN_WORD			U(4)
32029dd14eSJeetesh Burman #define SHA256_MAX_HASH_RESULT		U(7)
33029dd14eSJeetesh Burman #define SHA256_DST_SIZE			U(32)
34029dd14eSJeetesh Burman #define SHA_FIRST_OP			U(1)
35029dd14eSJeetesh Burman #define MAX_SHA_ENGINE_CHUNK_SIZE	U(0xFFFFFF)
36029dd14eSJeetesh Burman #define SHA256_MSG_LENGTH_ONETIME	U(0xFFFF)
37029dd14eSJeetesh Burman 
386eb3c188SSteven Kao /*******************************************************************************
396eb3c188SSteven Kao  * Data structure and global variables
406eb3c188SSteven Kao  ******************************************************************************/
416eb3c188SSteven Kao static uint32_t se_regs[NUM_SE_REGS_TO_SAVE];
426eb3c188SSteven Kao 
436eb3c188SSteven Kao /*
446eb3c188SSteven Kao  * Check that SE operation has completed after kickoff.
456eb3c188SSteven Kao  *
466eb3c188SSteven Kao  * This function is invoked after an SE operation has been started,
476eb3c188SSteven Kao  * and it checks the following conditions:
486eb3c188SSteven Kao  *
496eb3c188SSteven Kao  * 1. SE_STATUS = IDLE
506eb3c188SSteven Kao  * 2. AHB bus data transfer is complete.
516eb3c188SSteven Kao  * 3. SE_ERR_STATUS is clean.
526eb3c188SSteven Kao  */
tegra_se_is_operation_complete(void)536eb3c188SSteven Kao static bool tegra_se_is_operation_complete(void)
546eb3c188SSteven Kao {
556eb3c188SSteven Kao 	uint32_t val = 0, timeout = 0, sha_status, aes_status;
566eb3c188SSteven Kao 	int32_t ret = 0;
576eb3c188SSteven Kao 	bool se_is_busy, txn_has_errors, txn_successful;
586eb3c188SSteven Kao 
596eb3c188SSteven Kao 	/*
606eb3c188SSteven Kao 	 * Poll the status register to check if the operation
616eb3c188SSteven Kao 	 * completed.
626eb3c188SSteven Kao 	 */
636eb3c188SSteven Kao 	do {
646eb3c188SSteven Kao 		val = tegra_se_read_32(CTX_SAVE_AUTO_STATUS);
658d4107f0SVarun Wadekar 		se_is_busy = ((val & CTX_SAVE_AUTO_SE_BUSY) != 0U);
666eb3c188SSteven Kao 
676eb3c188SSteven Kao 		/* sleep until SE finishes */
686eb3c188SSteven Kao 		if (se_is_busy) {
696eb3c188SSteven Kao 			mdelay(1);
706eb3c188SSteven Kao 			timeout++;
716eb3c188SSteven Kao 		}
726eb3c188SSteven Kao 
736eb3c188SSteven Kao 	} while (se_is_busy && (timeout < MAX_TIMEOUT_MS));
746eb3c188SSteven Kao 
756eb3c188SSteven Kao 	/* any transaction errors? */
766eb3c188SSteven Kao 	txn_has_errors = (tegra_se_read_32(SHA_ERR_STATUS) != 0U) ||
776eb3c188SSteven Kao 			 (tegra_se_read_32(AES0_ERR_STATUS) != 0U);
786eb3c188SSteven Kao 
796eb3c188SSteven Kao 	/* transaction successful? */
806eb3c188SSteven Kao 	sha_status = tegra_se_read_32(SHA_INT_STATUS) & SHA_SE_OP_DONE;
816eb3c188SSteven Kao 	aes_status = tegra_se_read_32(AES0_INT_STATUS) & AES0_SE_OP_DONE;
826eb3c188SSteven Kao 	txn_successful = (sha_status == SHA_SE_OP_DONE) &&
836eb3c188SSteven Kao 			 (aes_status == AES0_SE_OP_DONE);
846eb3c188SSteven Kao 
856eb3c188SSteven Kao 	if ((timeout == MAX_TIMEOUT_MS) || txn_has_errors || !txn_successful) {
866eb3c188SSteven Kao 		ERROR("%s: Atomic context save operation failed!\n",
876eb3c188SSteven Kao 				__func__);
886eb3c188SSteven Kao 		ret = -ECANCELED;
896eb3c188SSteven Kao 	}
906eb3c188SSteven Kao 
916eb3c188SSteven Kao 	return (ret == 0);
926eb3c188SSteven Kao }
936eb3c188SSteven Kao 
946eb3c188SSteven Kao /*
956eb3c188SSteven Kao  * Wait for SE engine to be idle and clear any pending interrupts, before
966eb3c188SSteven Kao  * starting the next SE operation.
976eb3c188SSteven Kao  */
tegra_se_is_ready(void)986eb3c188SSteven Kao static bool tegra_se_is_ready(void)
996eb3c188SSteven Kao {
1006eb3c188SSteven Kao 	int32_t ret = 0;
1016eb3c188SSteven Kao 	uint32_t val = 0, timeout = 0;
1026eb3c188SSteven Kao 	bool se_is_ready;
1036eb3c188SSteven Kao 
1046eb3c188SSteven Kao 	/* Wait for previous operation to finish */
1056eb3c188SSteven Kao 	do {
1066eb3c188SSteven Kao 		val = tegra_se_read_32(CTX_SAVE_AUTO_STATUS);
1076eb3c188SSteven Kao 		se_is_ready = (val == CTX_SAVE_AUTO_SE_READY);
1086eb3c188SSteven Kao 
1096eb3c188SSteven Kao 		/* sleep until SE is ready */
1106eb3c188SSteven Kao 		if (!se_is_ready) {
1116eb3c188SSteven Kao 			mdelay(1);
1126eb3c188SSteven Kao 			timeout++;
1136eb3c188SSteven Kao 		}
1146eb3c188SSteven Kao 
1156eb3c188SSteven Kao 	} while (!se_is_ready && (timeout < MAX_TIMEOUT_MS));
1166eb3c188SSteven Kao 
1176eb3c188SSteven Kao 	if (timeout == MAX_TIMEOUT_MS) {
1186eb3c188SSteven Kao 		ERROR("%s: SE is not ready!\n", __func__);
1196eb3c188SSteven Kao 		ret = -ETIMEDOUT;
1206eb3c188SSteven Kao 	}
1216eb3c188SSteven Kao 
1226eb3c188SSteven Kao 	/* Clear any pending interrupts from previous operation */
1236eb3c188SSteven Kao 	tegra_se_write_32(AES0_INT_STATUS, INT_STATUS_SW_CLEAR);
1246eb3c188SSteven Kao 	tegra_se_write_32(AES1_INT_STATUS, INT_STATUS_SW_CLEAR);
1256eb3c188SSteven Kao 	tegra_se_write_32(RSA_INT_STATUS, INT_STATUS_SW_CLEAR);
1266eb3c188SSteven Kao 	tegra_se_write_32(SHA_INT_STATUS, INT_STATUS_SW_CLEAR);
1276eb3c188SSteven Kao 
1286eb3c188SSteven Kao 	/* Clear error status for each engine seen from current port */
1296eb3c188SSteven Kao 	tegra_se_write_32(AES0_ERR_STATUS, ERR_STATUS_SW_CLEAR);
1306eb3c188SSteven Kao 	tegra_se_write_32(AES1_ERR_STATUS, ERR_STATUS_SW_CLEAR);
1316eb3c188SSteven Kao 	tegra_se_write_32(RSA_ERR_STATUS, ERR_STATUS_SW_CLEAR);
1326eb3c188SSteven Kao 	tegra_se_write_32(SHA_ERR_STATUS, ERR_STATUS_SW_CLEAR);
1336eb3c188SSteven Kao 
1346eb3c188SSteven Kao 	return (ret == 0);
1356eb3c188SSteven Kao }
1366eb3c188SSteven Kao 
1376eb3c188SSteven Kao /*
1386eb3c188SSteven Kao  * During System Suspend, this handler triggers the hardware context
1396eb3c188SSteven Kao  * save operation.
1406eb3c188SSteven Kao  */
tegra_se_save_context(void)1416eb3c188SSteven Kao static int32_t tegra_se_save_context(void)
1426eb3c188SSteven Kao {
1436eb3c188SSteven Kao 	int32_t ret = -ECANCELED;
1446eb3c188SSteven Kao 
1456eb3c188SSteven Kao 	/*
1466eb3c188SSteven Kao 	 * 1. Ensure all SE Driver including RNG1/PKA1 are shut down.
1476eb3c188SSteven Kao 	 *    TSEC/R5s are powergated/idle. All tasks on SE1~SE4, RNG1,
1486eb3c188SSteven Kao 	 *    PKA1 are wrapped up. SE0 is ready for use.
1496eb3c188SSteven Kao 	 * 2. Clear interrupt/error in SE0 status register.
1506eb3c188SSteven Kao 	 * 3. Scrub SE0 register to avoid false failure for illegal
1516eb3c188SSteven Kao 	 *    configuration. Probably not needed, dependent on HW
1526eb3c188SSteven Kao 	 *    implementation.
1536eb3c188SSteven Kao 	 * 4. Check SE is ready for HW CTX_SAVE by polling
1546eb3c188SSteven Kao 	 *    SE_CTX_SAVE_AUTO_STATUS.SE_READY.
1556eb3c188SSteven Kao 	 *
1566eb3c188SSteven Kao 	 *    Steps 1-4 are executed by tegra_se_is_ready().
1576eb3c188SSteven Kao 	 *
1586eb3c188SSteven Kao 	 * 5. Issue context save command.
1596eb3c188SSteven Kao 	 * 6. Check SE is busy with CTX_SAVE, the command in step5 was not
1606eb3c188SSteven Kao 	 *    dropped for ongoing traffic in any of SE port/engine.
1616eb3c188SSteven Kao 	 * 7. Poll SE register or wait for SE APB interrupt for task completion
1626eb3c188SSteven Kao 	 *    a. Polling: Read SE_CTX_SAVE_AUTO_STATUS.BUSY till it reports IDLE
1636eb3c188SSteven Kao 	 *    b. Interrupt: After receiving interrupt from SE APB, read
1646eb3c188SSteven Kao 	 *       SE_CTX_SAVE_AUTO_STATUS.BUSY till it reports IDLE.
1656eb3c188SSteven Kao 	 * 8. Check AES0 and SHA ERR_STATUS to ensure no error case.
1666eb3c188SSteven Kao 	 * 9. Check AES0 and SHA INT_STATUS to ensure operation has successfully
1676eb3c188SSteven Kao 	 *    completed.
1686eb3c188SSteven Kao 	 *
1696eb3c188SSteven Kao 	 *    Steps 6-9 are executed by tegra_se_is_operation_complete().
1706eb3c188SSteven Kao 	 */
1716eb3c188SSteven Kao 	if (tegra_se_is_ready()) {
1726eb3c188SSteven Kao 
1736eb3c188SSteven Kao 		/* Issue context save command */
1746eb3c188SSteven Kao 		tegra_se_write_32(AES0_OPERATION, SE_OP_CTX_SAVE);
1756eb3c188SSteven Kao 
1766eb3c188SSteven Kao 		/* Wait for operation to finish */
1776eb3c188SSteven Kao 		if (tegra_se_is_operation_complete()) {
1786eb3c188SSteven Kao 			ret = 0;
1796eb3c188SSteven Kao 		}
1806eb3c188SSteven Kao 	}
1816eb3c188SSteven Kao 
1826eb3c188SSteven Kao 	return ret;
1836eb3c188SSteven Kao }
1846eb3c188SSteven Kao 
1856eb3c188SSteven Kao /*
186029dd14eSJeetesh Burman  * Check that SE operation has completed after kickoff
187029dd14eSJeetesh Burman  * This function is invoked after an SE operation has been started,
188029dd14eSJeetesh Burman  * and it checks the following conditions:
189029dd14eSJeetesh Burman  * 1. SE0_INT_STATUS = SE0_OP_DONE
190029dd14eSJeetesh Burman  * 2. SE0_STATUS = IDLE
191029dd14eSJeetesh Burman  * 3. SE0_ERR_STATUS is clean.
192029dd14eSJeetesh Burman  */
tegra_se_sha256_hash_operation_complete(void)193029dd14eSJeetesh Burman static int32_t tegra_se_sha256_hash_operation_complete(void)
194029dd14eSJeetesh Burman {
195029dd14eSJeetesh Burman 	uint32_t val = 0U;
196029dd14eSJeetesh Burman 
197029dd14eSJeetesh Burman 	/* Poll the SE interrupt register to ensure H/W operation complete */
198029dd14eSJeetesh Burman 	val = tegra_se_read_32(SE0_INT_STATUS_REG_OFFSET);
199029dd14eSJeetesh Burman 	while (SE0_INT_OP_DONE(val) == SE0_INT_OP_DONE_CLEAR) {
200029dd14eSJeetesh Burman 		val = tegra_se_read_32(SE0_INT_STATUS_REG_OFFSET);
201029dd14eSJeetesh Burman 		if (SE0_INT_OP_DONE(val) != SE0_INT_OP_DONE_CLEAR) {
202029dd14eSJeetesh Burman 			break;
203029dd14eSJeetesh Burman 		}
204029dd14eSJeetesh Burman 	}
205029dd14eSJeetesh Burman 
206029dd14eSJeetesh Burman 	/* Poll the SE status idle to ensure H/W operation complete */
207029dd14eSJeetesh Burman 	val = tegra_se_read_32(SE0_SHA_STATUS_0);
208029dd14eSJeetesh Burman 	while (val != SE0_SHA_STATUS_IDLE) {
209029dd14eSJeetesh Burman 		val = tegra_se_read_32(SE0_SHA_STATUS_0);
210029dd14eSJeetesh Burman 		if (val == SE0_SHA_STATUS_IDLE) {
211029dd14eSJeetesh Burman 			break;
212029dd14eSJeetesh Burman 		}
213029dd14eSJeetesh Burman 	}
214029dd14eSJeetesh Burman 
215029dd14eSJeetesh Burman 	/* Ensure that no errors are thrown during operation */
216029dd14eSJeetesh Burman 	val = tegra_se_read_32(SE0_ERR_STATUS_REG_OFFSET);
217029dd14eSJeetesh Burman 	if (val != 0U) {
218029dd14eSJeetesh Burman 		ERROR("%s: error during SE operation! 0x%x", __func__,
219029dd14eSJeetesh Burman 				val);
220029dd14eSJeetesh Burman 		return -ENOTSUP;
221029dd14eSJeetesh Burman 	}
222029dd14eSJeetesh Burman 
223029dd14eSJeetesh Burman 	return 0;
224029dd14eSJeetesh Burman }
225029dd14eSJeetesh Burman 
226029dd14eSJeetesh Burman /*
227029dd14eSJeetesh Burman  * Security engine primitive normal operations
228029dd14eSJeetesh Burman  */
tegra_se_start_normal_operation(uint64_t src_addr,uint32_t nbytes,uint32_t last_buf,uint32_t src_len_inbytes)229029dd14eSJeetesh Burman static int32_t tegra_se_start_normal_operation(uint64_t src_addr,
230029dd14eSJeetesh Burman 		uint32_t nbytes, uint32_t last_buf, uint32_t src_len_inbytes)
231029dd14eSJeetesh Burman {
232029dd14eSJeetesh Burman 	uint32_t val = 0U;
233029dd14eSJeetesh Burman 	uint32_t src_in_lo;
234029dd14eSJeetesh Burman 	uint32_t src_in_msb;
235029dd14eSJeetesh Burman 	uint32_t src_in_hi;
236029dd14eSJeetesh Burman 	int32_t ret = 0;
237029dd14eSJeetesh Burman 
238029dd14eSJeetesh Burman 	if ((src_addr == 0ULL) || (nbytes == 0U))
239029dd14eSJeetesh Burman 		return -EINVAL;
240029dd14eSJeetesh Burman 
241029dd14eSJeetesh Burman 	src_in_lo = (uint32_t)src_addr;
242029dd14eSJeetesh Burman 	src_in_msb = (uint32_t)((src_addr >> 32U) & 0xFFU);
243029dd14eSJeetesh Burman 	src_in_hi = ((src_in_msb << SE0_IN_HI_ADDR_HI_0_MSB_SHIFT) |
244029dd14eSJeetesh Burman 				(nbytes & MAX_SHA_ENGINE_CHUNK_SIZE));
245029dd14eSJeetesh Burman 
246029dd14eSJeetesh Burman 	/* set SRC_IN_ADDR_LO and SRC_IN_ADDR_HI*/
247029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_IN_ADDR, src_in_lo);
248029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_IN_HI_ADDR_HI, src_in_hi);
249029dd14eSJeetesh Burman 
250029dd14eSJeetesh Burman 	val = tegra_se_read_32(SE0_INT_STATUS_REG_OFFSET);
251029dd14eSJeetesh Burman 	if (val > 0U) {
252029dd14eSJeetesh Burman 		tegra_se_write_32(SE0_INT_STATUS_REG_OFFSET, 0x0U);
253029dd14eSJeetesh Burman 	}
254029dd14eSJeetesh Burman 
255029dd14eSJeetesh Burman 	/* Enable SHA interrupt for SE0 Operation */
256029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SHA_INT_ENABLE, 0x1aU);
257029dd14eSJeetesh Burman 
258029dd14eSJeetesh Burman 	/* flush to DRAM for SE to use the updated contents */
259029dd14eSJeetesh Burman 	flush_dcache_range(src_addr, src_len_inbytes);
260029dd14eSJeetesh Burman 
261029dd14eSJeetesh Burman 	/* Start SHA256 operation */
262029dd14eSJeetesh Burman 	if (last_buf == 1U) {
263029dd14eSJeetesh Burman 		tegra_se_write_32(SE0_OPERATION_REG_OFFSET, SE0_OP_START |
264029dd14eSJeetesh Burman 				SE0_UNIT_OPERATION_PKT_LASTBUF_FIELD);
265029dd14eSJeetesh Burman 	} else {
266029dd14eSJeetesh Burman 		tegra_se_write_32(SE0_OPERATION_REG_OFFSET, SE0_OP_START);
267029dd14eSJeetesh Burman 	}
268029dd14eSJeetesh Burman 
269029dd14eSJeetesh Burman 	return ret;
270029dd14eSJeetesh Burman }
271029dd14eSJeetesh Burman 
tegra_se_calculate_sha256_hash(uint64_t src_addr,uint32_t src_len_inbyte)272029dd14eSJeetesh Burman static int32_t tegra_se_calculate_sha256_hash(uint64_t src_addr,
273029dd14eSJeetesh Burman 						uint32_t src_len_inbyte)
274029dd14eSJeetesh Burman {
275029dd14eSJeetesh Burman 	uint32_t val, last_buf, i;
276029dd14eSJeetesh Burman 	int32_t ret = 0;
277029dd14eSJeetesh Burman 	uint32_t operations;
278029dd14eSJeetesh Burman 	uint64_t src_len_inbits;
279029dd14eSJeetesh Burman 	uint32_t len_bits_msb;
280029dd14eSJeetesh Burman 	uint32_t len_bits_lsb;
281029dd14eSJeetesh Burman 	uint32_t number_of_operations, max_bytes, bytes_left, remaining_bytes;
282029dd14eSJeetesh Burman 
283029dd14eSJeetesh Burman 	if (src_len_inbyte > MAX_SHA_ENGINE_CHUNK_SIZE) {
284029dd14eSJeetesh Burman 		ERROR("SHA input chunk size too big: 0x%x\n", src_len_inbyte);
285029dd14eSJeetesh Burman 		return -EINVAL;
286029dd14eSJeetesh Burman 	}
287029dd14eSJeetesh Burman 
288029dd14eSJeetesh Burman 	if (src_addr == 0ULL) {
289029dd14eSJeetesh Burman 		return -EINVAL;
290029dd14eSJeetesh Burman 	}
291029dd14eSJeetesh Burman 
292029dd14eSJeetesh Burman 	/* number of bytes per operation */
293029dd14eSJeetesh Burman 	max_bytes = (SHA256_HASH_SIZE_BYTES * SHA256_MSG_LENGTH_ONETIME);
294029dd14eSJeetesh Burman 
295029dd14eSJeetesh Burman 	src_len_inbits = (uint32_t)(src_len_inbyte * 8U);
296029dd14eSJeetesh Burman 	len_bits_msb = (uint32_t)(src_len_inbits >> 32U);
297029dd14eSJeetesh Burman 	len_bits_lsb = (uint32_t)src_len_inbits;
298029dd14eSJeetesh Burman 
299029dd14eSJeetesh Burman 	/* program SE0_CONFIG for SHA256 operation */
300029dd14eSJeetesh Burman 	val =  (uint32_t)(SE0_CONFIG_ENC_ALG_SHA | SE0_CONFIG_ENC_MODE_SHA256 |
301029dd14eSJeetesh Burman 		SE0_CONFIG_DEC_ALG_NOP | SE0_CONFIG_DST_HASHREG);
302029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SHA_CONFIG, val);
303029dd14eSJeetesh Burman 
304029dd14eSJeetesh Burman 	/* set SE0_SHA_MSG_LENGTH registers */
305029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SHA_MSG_LENGTH_0, len_bits_lsb);
306029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SHA_MSG_LEFT_0, len_bits_lsb);
307029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SHA_MSG_LENGTH_1, len_bits_msb);
308029dd14eSJeetesh Burman 
309029dd14eSJeetesh Burman 	/* zero out unused SE0_SHA_MSG_LENGTH and SE0_SHA_MSG_LEFT */
310029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SHA_MSG_LENGTH_2, 0U);
311029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SHA_MSG_LENGTH_3, 0U);
312029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SHA_MSG_LEFT_1, 0U);
313029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SHA_MSG_LEFT_2, 0U);
314029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SHA_MSG_LEFT_3, 0U);
315029dd14eSJeetesh Burman 
316029dd14eSJeetesh Burman 	number_of_operations = (src_len_inbyte / max_bytes);
317029dd14eSJeetesh Burman 	remaining_bytes = (src_len_inbyte % max_bytes);
318029dd14eSJeetesh Burman 	if (remaining_bytes > 0U) {
319029dd14eSJeetesh Burman 		number_of_operations += 1U;
320029dd14eSJeetesh Burman 	}
321029dd14eSJeetesh Burman 
322029dd14eSJeetesh Burman 	/*
323029dd14eSJeetesh Burman 	 * 1. Operations == 1:	program SE0_SHA_TASK register to initiate SHA256
324029dd14eSJeetesh Burman 	 *			hash generation by setting
325029dd14eSJeetesh Burman 	 *			1(SE0_SHA_CONFIG_HW_INIT_HASH) to SE0_SHA_TASK
326029dd14eSJeetesh Burman 	 *			and start SHA256-normal operation.
327029dd14eSJeetesh Burman 	 * 2. 1 < Operations < number_of_operations: program SE0_SHA_TASK to
328029dd14eSJeetesh Burman 	 *			0(SE0_SHA_CONFIG_HW_INIT_HASH_DISABLE) to load
329029dd14eSJeetesh Burman 	 *			intermediate SHA256 digest result from
330029dd14eSJeetesh Burman 	 *			HASH_RESULT register to continue SHA256
331029dd14eSJeetesh Burman 	 *			generation and start SHA256-normal operation.
332029dd14eSJeetesh Burman 	 * 3. Operations == number_of_operations: continue with step 2 and set
333029dd14eSJeetesh Burman 	 *			max_bytes to bytes_left to process final
334029dd14eSJeetesh Burman 	 *			hash-result generation and start SHA256-normal
335029dd14eSJeetesh Burman 	 *			operation.
336029dd14eSJeetesh Burman 	 */
337029dd14eSJeetesh Burman 	bytes_left = src_len_inbyte;
338029dd14eSJeetesh Burman 	for (operations = 1U; operations <= number_of_operations;
339029dd14eSJeetesh Burman 								operations++) {
340029dd14eSJeetesh Burman 		if (operations == SHA_FIRST_OP) {
341029dd14eSJeetesh Burman 			val = SE0_SHA_CONFIG_HW_INIT_HASH;
342029dd14eSJeetesh Burman 		} else {
343029dd14eSJeetesh Burman 			/* Load intermediate SHA digest result to
344029dd14eSJeetesh Burman 			 * SHA:HASH_RESULT(0..7) to continue the SHA
345029dd14eSJeetesh Burman 			 * calculation and tell the SHA engine to use it.
346029dd14eSJeetesh Burman 			 */
347029dd14eSJeetesh Burman 			for (i = 0U; (i / BYTES_IN_WORD) <=
348029dd14eSJeetesh Burman 				SHA256_MAX_HASH_RESULT; i += BYTES_IN_WORD) {
349029dd14eSJeetesh Burman 				val = tegra_se_read_32(SE0_SHA_HASH_RESULT_0 +
350029dd14eSJeetesh Burman 									i);
351029dd14eSJeetesh Burman 				tegra_se_write_32(SE0_SHA_HASH_RESULT_0 + i,
352029dd14eSJeetesh Burman 									val);
353029dd14eSJeetesh Burman 			}
354029dd14eSJeetesh Burman 			val = SE0_SHA_CONFIG_HW_INIT_HASH_DISABLE;
355029dd14eSJeetesh Burman 			if (len_bits_lsb <= (max_bytes * 8U)) {
356029dd14eSJeetesh Burman 				len_bits_lsb = (remaining_bytes * 8U);
357029dd14eSJeetesh Burman 			} else {
358029dd14eSJeetesh Burman 				len_bits_lsb -= (max_bytes * 8U);
359029dd14eSJeetesh Burman 			}
360029dd14eSJeetesh Burman 			tegra_se_write_32(SE0_SHA_MSG_LEFT_0, len_bits_lsb);
361029dd14eSJeetesh Burman 		}
362029dd14eSJeetesh Burman 		tegra_se_write_32(SE0_SHA_TASK_CONFIG, val);
363029dd14eSJeetesh Burman 
364029dd14eSJeetesh Burman 		max_bytes = (SHA256_HASH_SIZE_BYTES *
365029dd14eSJeetesh Burman 						SHA256_MSG_LENGTH_ONETIME);
366029dd14eSJeetesh Burman 		if (bytes_left < max_bytes) {
367029dd14eSJeetesh Burman 			max_bytes = bytes_left;
368029dd14eSJeetesh Burman 			last_buf = 1U;
369029dd14eSJeetesh Burman 		} else {
370029dd14eSJeetesh Burman 			bytes_left = bytes_left - max_bytes;
371029dd14eSJeetesh Burman 			last_buf = 0U;
372029dd14eSJeetesh Burman 		}
373029dd14eSJeetesh Burman 		/* start operation */
374029dd14eSJeetesh Burman 		ret = tegra_se_start_normal_operation(src_addr, max_bytes,
375029dd14eSJeetesh Burman 					last_buf, src_len_inbyte);
376029dd14eSJeetesh Burman 		if (ret != 0) {
377029dd14eSJeetesh Burman 			ERROR("Error during SE operation! 0x%x", ret);
378029dd14eSJeetesh Burman 			return -EINVAL;
379029dd14eSJeetesh Burman 		}
380029dd14eSJeetesh Burman 	}
381029dd14eSJeetesh Burman 
382029dd14eSJeetesh Burman 	return ret;
383029dd14eSJeetesh Burman }
384029dd14eSJeetesh Burman 
tegra_se_save_sha256_pmc_scratch(void)385029dd14eSJeetesh Burman static int32_t tegra_se_save_sha256_pmc_scratch(void)
386029dd14eSJeetesh Burman {
387029dd14eSJeetesh Burman 	uint32_t val = 0U, hash_offset = 0U, scratch_offset = 0U;
388029dd14eSJeetesh Burman 	int32_t ret;
389029dd14eSJeetesh Burman 
390029dd14eSJeetesh Burman 	/* Check SE0 operation status */
391029dd14eSJeetesh Burman 	ret = tegra_se_sha256_hash_operation_complete();
392029dd14eSJeetesh Burman 	if (ret != 0) {
393029dd14eSJeetesh Burman 		ERROR("SE operation complete Failed! 0x%x", ret);
394029dd14eSJeetesh Burman 		return ret;
395029dd14eSJeetesh Burman 	}
396029dd14eSJeetesh Burman 
397029dd14eSJeetesh Burman 	for (scratch_offset = SECURE_SCRATCH_TZDRAM_SHA256_HASH_START;
398029dd14eSJeetesh Burman 			scratch_offset <= SECURE_SCRATCH_TZDRAM_SHA256_HASH_END;
399029dd14eSJeetesh Burman 					scratch_offset += BYTES_IN_WORD) {
400029dd14eSJeetesh Burman 		val = tegra_se_read_32(SE0_SHA_HASH_RESULT_0 + hash_offset);
401029dd14eSJeetesh Burman 		mmio_write_32((uint32_t)(TEGRA_SCRATCH_BASE + scratch_offset),
402029dd14eSJeetesh Burman 									val);
403029dd14eSJeetesh Burman 		hash_offset += BYTES_IN_WORD;
404029dd14eSJeetesh Burman 	}
405029dd14eSJeetesh Burman 	return 0;
406029dd14eSJeetesh Burman }
407029dd14eSJeetesh Burman 
408029dd14eSJeetesh Burman /*
409029dd14eSJeetesh Burman  * Handler to generate SHA256 and save HASH-result to pmc-scratch register
410029dd14eSJeetesh Burman  */
tegra_se_calculate_save_sha256(uint64_t src_addr,uint32_t src_len_inbyte)411029dd14eSJeetesh Burman int32_t tegra_se_calculate_save_sha256(uint64_t src_addr,
412029dd14eSJeetesh Burman 						uint32_t src_len_inbyte)
413029dd14eSJeetesh Burman {
414029dd14eSJeetesh Burman 	uint32_t security;
415029dd14eSJeetesh Burman 	int32_t val = 0;
416029dd14eSJeetesh Burman 
417029dd14eSJeetesh Burman 	/* Set SE_SOFT_SETTINGS=SE_SECURE to prevent NS process to change SE
418029dd14eSJeetesh Burman 	 * registers.
419029dd14eSJeetesh Burman 	 */
420029dd14eSJeetesh Burman 	security = tegra_se_read_32(SE0_SECURITY);
421029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SECURITY, security | SE0_SECURITY_SE_SOFT_SETTING);
422029dd14eSJeetesh Burman 
423029dd14eSJeetesh Burman 	/* Bootrom enable IN_ID bit in SE0_SHA_GSCID_0 register during SC7-exit, causing
424029dd14eSJeetesh Burman 	 * SE0 ignores SE0 operation, and therefore failure of 2nd iteration of SC7 cycle.
425029dd14eSJeetesh Burman 	 */
426029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SHA_GSCID_0, 0x0U);
427029dd14eSJeetesh Burman 
428029dd14eSJeetesh Burman 	/* Calculate SHA256 of BL31 */
429029dd14eSJeetesh Burman 	val = tegra_se_calculate_sha256_hash(src_addr, src_len_inbyte);
430029dd14eSJeetesh Burman 	if (val != 0) {
431029dd14eSJeetesh Burman 		ERROR("%s: SHA256 generation failed\n", __func__);
432029dd14eSJeetesh Burman 		return val;
433029dd14eSJeetesh Burman 	}
434029dd14eSJeetesh Burman 
435029dd14eSJeetesh Burman 	/*
436029dd14eSJeetesh Burman 	 * Reset SE_SECURE to previous value.
437029dd14eSJeetesh Burman 	 */
438029dd14eSJeetesh Burman 	tegra_se_write_32(SE0_SECURITY, security);
439029dd14eSJeetesh Burman 
440029dd14eSJeetesh Burman 	/* copy sha256_dst to PMC Scratch register */
441029dd14eSJeetesh Burman 	val = tegra_se_save_sha256_pmc_scratch();
442029dd14eSJeetesh Burman 	if (val != 0) {
443029dd14eSJeetesh Burman 		ERROR("%s: SE0 status Error.\n", __func__);
444029dd14eSJeetesh Burman 	}
445029dd14eSJeetesh Burman 
446029dd14eSJeetesh Burman 	return val;
447029dd14eSJeetesh Burman }
448029dd14eSJeetesh Burman 
449029dd14eSJeetesh Burman /*
4506eb3c188SSteven Kao  * Handler to power down the SE hardware blocks - SE, RNG1 and PKA1. This
4516eb3c188SSteven Kao  * needs to be called only during System Suspend.
4526eb3c188SSteven Kao  */
tegra_se_suspend(void)4536eb3c188SSteven Kao int32_t tegra_se_suspend(void)
4546eb3c188SSteven Kao {
4556eb3c188SSteven Kao 	int32_t ret = 0;
4566eb3c188SSteven Kao 
457d11f5e05Ssteven kao 	/* initialise communication channel with BPMP */
458d11f5e05Ssteven kao 	assert(tegra_bpmp_ipc_init() == 0);
459d11f5e05Ssteven kao 
460d11f5e05Ssteven kao 	/* Enable SE clock before SE context save */
461e9044480SVarun Wadekar 	ret = tegra_bpmp_ipc_enable_clock(TEGRA194_CLK_SE);
4628d4107f0SVarun Wadekar 	assert(ret == 0);
463d11f5e05Ssteven kao 
4646eb3c188SSteven Kao 	/* save SE registers */
4656eb3c188SSteven Kao 	se_regs[0] = mmio_read_32(TEGRA_SE0_BASE + SE0_MUTEX_WATCHDOG_NS_LIMIT);
4666eb3c188SSteven Kao 	se_regs[1] = mmio_read_32(TEGRA_SE0_BASE + SE0_AES0_ENTROPY_SRC_AGE_CTRL);
4676eb3c188SSteven Kao 	se_regs[2] = mmio_read_32(TEGRA_RNG1_BASE + RNG1_MUTEX_WATCHDOG_NS_LIMIT);
4686eb3c188SSteven Kao 	se_regs[3] = mmio_read_32(TEGRA_PKA1_BASE + PKA1_MUTEX_WATCHDOG_NS_LIMIT);
4696eb3c188SSteven Kao 
4706eb3c188SSteven Kao 	/* Save SE context. The BootROM restores it during System Resume */
4716eb3c188SSteven Kao 	ret = tegra_se_save_context();
4726eb3c188SSteven Kao 	if (ret != 0) {
4736eb3c188SSteven Kao 		ERROR("%s: context save failed (%d)\n", __func__, ret);
4746eb3c188SSteven Kao 	}
4756eb3c188SSteven Kao 
476d11f5e05Ssteven kao 	/* Disable SE clock after SE context save */
477e9044480SVarun Wadekar 	ret = tegra_bpmp_ipc_disable_clock(TEGRA194_CLK_SE);
4788d4107f0SVarun Wadekar 	assert(ret == 0);
479d11f5e05Ssteven kao 
4806eb3c188SSteven Kao 	return ret;
4816eb3c188SSteven Kao }
4826eb3c188SSteven Kao 
4836eb3c188SSteven Kao /*
4846eb3c188SSteven Kao  * Handler to power up the SE hardware block(s) during System Resume.
4856eb3c188SSteven Kao  */
tegra_se_resume(void)4866eb3c188SSteven Kao void tegra_se_resume(void)
4876eb3c188SSteven Kao {
4888d4107f0SVarun Wadekar 	int32_t ret = 0;
4898d4107f0SVarun Wadekar 
490d11f5e05Ssteven kao 	/* initialise communication channel with BPMP */
491d11f5e05Ssteven kao 	assert(tegra_bpmp_ipc_init() == 0);
492d11f5e05Ssteven kao 
493d11f5e05Ssteven kao 	/* Enable SE clock before SE context restore */
494e9044480SVarun Wadekar 	ret = tegra_bpmp_ipc_enable_clock(TEGRA194_CLK_SE);
4958d4107f0SVarun Wadekar 	assert(ret == 0);
496d11f5e05Ssteven kao 
4976eb3c188SSteven Kao 	/*
4986eb3c188SSteven Kao 	 * When TZ takes over after System Resume, TZ should first reconfigure
4996eb3c188SSteven Kao 	 * SE_MUTEX_WATCHDOG_NS_LIMIT, PKA1_MUTEX_WATCHDOG_NS_LIMIT,
5006eb3c188SSteven Kao 	 * RNG1_MUTEX_WATCHDOG_NS_LIMIT and SE_ENTROPY_SRC_AGE_CTRL before
5016eb3c188SSteven Kao 	 * other operations.
5026eb3c188SSteven Kao 	 */
5036eb3c188SSteven Kao 	mmio_write_32(TEGRA_SE0_BASE + SE0_MUTEX_WATCHDOG_NS_LIMIT, se_regs[0]);
5046eb3c188SSteven Kao 	mmio_write_32(TEGRA_SE0_BASE + SE0_AES0_ENTROPY_SRC_AGE_CTRL, se_regs[1]);
5056eb3c188SSteven Kao 	mmio_write_32(TEGRA_RNG1_BASE + RNG1_MUTEX_WATCHDOG_NS_LIMIT, se_regs[2]);
5066eb3c188SSteven Kao 	mmio_write_32(TEGRA_PKA1_BASE + PKA1_MUTEX_WATCHDOG_NS_LIMIT, se_regs[3]);
507d11f5e05Ssteven kao 
508d11f5e05Ssteven kao 	/* Disable SE clock after SE context restore */
509e9044480SVarun Wadekar 	ret = tegra_bpmp_ipc_disable_clock(TEGRA194_CLK_SE);
5108d4107f0SVarun Wadekar 	assert(ret == 0);
5116eb3c188SSteven Kao }
512