2 * Copyright (c) 2014-2018, ARM Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
10 #include <arch_helpers.h>
11 #include <common/debug.h>
12 #include <lib/utils.h>
13 #include <plat/common/platform.h>
17 #include "../mhu/css_mhu.h"
20 #define SCPI_SHARED_MEM_SCP_TO_AP PLAT_CSS_SCP_COM_SHARED_MEM_BASE
21 #define SCPI_SHARED_MEM_AP_TO_SCP (PLAT_CSS_SCP_COM_SHARED_MEM_BASE \
24 /* Header and payload addresses for commands from AP to SCP */
25 #define SCPI_CMD_HEADER_AP_TO_SCP \
26 ((scpi_cmd_t *) SCPI_SHARED_MEM_AP_TO_SCP)
27 #define SCPI_CMD_PAYLOAD_AP_TO_SCP \
28 ((void *) (SCPI_SHARED_MEM_AP_TO_SCP + sizeof(scpi_cmd_t)))
30 /* Header and payload addresses for responses from SCP to AP */
31 #define SCPI_RES_HEADER_SCP_TO_AP \
32 ((scpi_cmd_t *) SCPI_SHARED_MEM_SCP_TO_AP)
33 #define SCPI_RES_PAYLOAD_SCP_TO_AP \
34 ((void *) (SCPI_SHARED_MEM_SCP_TO_AP + sizeof(scpi_cmd_t)))
36 /* ID of the MHU slot used for the SCPI protocol */
37 #define SCPI_MHU_SLOT_ID 0
39 static void scpi_secure_message_start(void)
41 mhu_secure_message_start(SCPI_MHU_SLOT_ID
);
44 static void scpi_secure_message_send(size_t payload_size
)
47 * Ensure that any write to the SCPI payload area is seen by SCP before
48 * we write to the MHU register. If these 2 writes were reordered by
49 * the CPU then SCP would read stale payload data
53 mhu_secure_message_send(SCPI_MHU_SLOT_ID
);
56 static void scpi_secure_message_receive(scpi_cmd_t
*cmd
)
62 mhu_status
= mhu_secure_message_wait();
64 /* Expect an SCPI message, reject any other protocol */
65 if (mhu_status
!= (1 << SCPI_MHU_SLOT_ID
)) {
66 ERROR("MHU: Unexpected protocol (MHU status: 0x%x)\n",
72 * Ensure that any read to the SCPI payload area is done after reading
73 * the MHU register. If these 2 reads were reordered then the CPU would
74 * read invalid payload data
78 memcpy(cmd
, (void *) SCPI_SHARED_MEM_SCP_TO_AP
, sizeof(*cmd
));
81 static void scpi_secure_message_end(void)
83 mhu_secure_message_end(SCPI_MHU_SLOT_ID
);
86 int scpi_wait_ready(void)
90 VERBOSE("Waiting for SCP_READY command...\n");
92 /* Get a message from the SCP */
93 scpi_secure_message_start();
94 scpi_secure_message_receive(&scpi_cmd
);
95 scpi_secure_message_end();
97 /* We are expecting 'SCP Ready', produce correct error if it's not */
98 scpi_status_t status
= SCP_OK
;
99 if (scpi_cmd
.id
!= SCPI_CMD_SCP_READY
) {
100 ERROR("Unexpected SCP command: expected command #%u, got command #%u\n",
101 SCPI_CMD_SCP_READY
, scpi_cmd
.id
);
102 status
= SCP_E_SUPPORT
;
103 } else if (scpi_cmd
.size
!= 0) {
104 ERROR("SCP_READY command has incorrect size: expected 0, got %u\n",
109 VERBOSE("Sending response for SCP_READY command\n");
112 * Send our response back to SCP.
113 * We are using the same SCPI header, just update the status field.
115 scpi_cmd
.status
= status
;
116 scpi_secure_message_start();
117 memcpy((void *) SCPI_SHARED_MEM_AP_TO_SCP
, &scpi_cmd
, sizeof(scpi_cmd
));
118 scpi_secure_message_send(0);
119 scpi_secure_message_end();
121 return status
== SCP_OK
? 0 : -1;
124 void scpi_set_css_power_state(unsigned int mpidr
,
125 scpi_power_state_t cpu_state
, scpi_power_state_t cluster_state
,
126 scpi_power_state_t css_state
)
130 uint32_t *payload_addr
;
134 * The current SCPI driver only caters for single-threaded platforms.
135 * Hence we ignore the thread ID (which is always 0) for such platforms.
137 state
|= (mpidr
>> MPIDR_AFF1_SHIFT
) & 0x0f; /* CPU ID */
138 state
|= ((mpidr
>> MPIDR_AFF2_SHIFT
) & 0x0f) << 4; /* Cluster ID */
140 state
|= mpidr
& 0x0f; /* CPU ID */
141 state
|= (mpidr
& 0xf00) >> 4; /* Cluster ID */
142 #endif /* ARM_PLAT_MT */
144 state
|= cpu_state
<< 8;
145 state
|= cluster_state
<< 12;
146 state
|= css_state
<< 16;
148 scpi_secure_message_start();
150 /* Populate the command header */
151 cmd
= SCPI_CMD_HEADER_AP_TO_SCP
;
152 cmd
->id
= SCPI_CMD_SET_CSS_POWER_STATE
;
153 cmd
->set
= SCPI_SET_NORMAL
;
155 cmd
->size
= sizeof(state
);
156 /* Populate the command payload */
157 payload_addr
= SCPI_CMD_PAYLOAD_AP_TO_SCP
;
158 *payload_addr
= state
;
159 scpi_secure_message_send(sizeof(state
));
161 * SCP does not reply to this command in order to avoid MHU interrupts
162 * from the sender, which could interfere with its power state request.
165 scpi_secure_message_end();
169 * Query and obtain CSS power state from SCP.
171 * In response to the query, SCP returns power states of all CPUs in all
172 * clusters of the system. The returned response is then filtered based on the
173 * supplied MPIDR. Power states of requested cluster and CPUs within are updated
174 * via. supplied non-NULL pointer arguments.
176 * Returns 0 on success, or -1 on errors.
178 int scpi_get_css_power_state(unsigned int mpidr
, unsigned int *cpu_state_p
,
179 unsigned int *cluster_state_p
)
183 int power_state
, cpu
, cluster
, rc
= -1;
186 * Extract CPU and cluster membership of the given MPIDR. SCPI caters
187 * for only up to 0xf clusters, and 8 CPUs per cluster
191 * The current SCPI driver only caters for single-threaded platforms.
192 * Hence we ignore the thread ID (which is always 0) for such platforms.
194 cpu
= (mpidr
>> MPIDR_AFF1_SHIFT
) & MPIDR_AFFLVL_MASK
;
195 cluster
= (mpidr
>> MPIDR_AFF2_SHIFT
) & MPIDR_AFFLVL_MASK
;
197 cpu
= mpidr
& MPIDR_AFFLVL_MASK
;
198 cluster
= (mpidr
>> MPIDR_AFF1_SHIFT
) & MPIDR_AFFLVL_MASK
;
199 #endif /* ARM_PLAT_MT */
200 if (cpu
>= 8 || cluster
>= 0xf)
203 scpi_secure_message_start();
205 /* Populate request headers */
206 zeromem(SCPI_CMD_HEADER_AP_TO_SCP
, sizeof(*cmd
));
207 cmd
= SCPI_CMD_HEADER_AP_TO_SCP
;
208 cmd
->id
= SCPI_CMD_GET_CSS_POWER_STATE
;
211 * Send message and wait for SCP's response
213 scpi_secure_message_send(0);
214 scpi_secure_message_receive(&response
);
216 if (response
.status
!= SCP_OK
)
219 /* Validate SCP response */
220 if (!CHECK_RESPONSE(response
, cluster
))
223 /* Extract power states for required cluster */
224 power_state
= *(((uint16_t *) SCPI_RES_PAYLOAD_SCP_TO_AP
) + cluster
);
225 if (CLUSTER_ID(power_state
) != cluster
)
228 /* Update power state via. pointers */
230 *cluster_state_p
= CLUSTER_POWER_STATE(power_state
);
232 *cpu_state_p
= CPU_POWER_STATE(power_state
);
236 scpi_secure_message_end();
240 uint32_t scpi_sys_power_state(scpi_system_state_t system_state
)
243 uint8_t *payload_addr
;
246 scpi_secure_message_start();
248 /* Populate the command header */
249 cmd
= SCPI_CMD_HEADER_AP_TO_SCP
;
250 cmd
->id
= SCPI_CMD_SYS_POWER_STATE
;
253 cmd
->size
= sizeof(*payload_addr
);
254 /* Populate the command payload */
255 payload_addr
= SCPI_CMD_PAYLOAD_AP_TO_SCP
;
256 *payload_addr
= system_state
& 0xff;
257 scpi_secure_message_send(sizeof(*payload_addr
));
259 scpi_secure_message_receive(&response
);
261 scpi_secure_message_end();
263 return response
.status
;