694 lines
14 KiB
C
694 lines
14 KiB
C
/*
|
|
* Copyright (c) 2015-2020, ARM Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <assert.h>
|
|
|
|
#include <libfdt.h>
|
|
|
|
#include <platform_def.h>
|
|
|
|
#include <arch_helpers.h>
|
|
#include <drivers/arm/gicv2.h>
|
|
#include <drivers/st/stm32_iwdg.h>
|
|
#include <drivers/st/stm32mp_dummy_regulator.h>
|
|
#include <drivers/st/stm32mp_pmic.h>
|
|
#include <drivers/st/stm32mp_regulator.h>
|
|
#include <drivers/st/stm32mp_reset.h>
|
|
#include <lib/mmio.h>
|
|
#include <lib/xlat_tables/xlat_tables_v2.h>
|
|
#include <plat/common/platform.h>
|
|
|
|
/* Internal layout of the 32bit OTP word board_id */
|
|
#define BOARD_ID_BOARD_NB_MASK GENMASK(31, 16)
|
|
#define BOARD_ID_BOARD_NB_SHIFT 16
|
|
#define BOARD_ID_VARCPN_MASK GENMASK(15, 12)
|
|
#define BOARD_ID_VARCPN_SHIFT 12
|
|
#define BOARD_ID_REVISION_MASK GENMASK(11, 8)
|
|
#define BOARD_ID_REVISION_SHIFT 8
|
|
#define BOARD_ID_VARFG_MASK GENMASK(7, 4)
|
|
#define BOARD_ID_VARFG_SHIFT 4
|
|
#define BOARD_ID_BOM_MASK GENMASK(3, 0)
|
|
|
|
#define BOARD_ID2NB(_id) (((_id) & BOARD_ID_BOARD_NB_MASK) >> \
|
|
BOARD_ID_BOARD_NB_SHIFT)
|
|
#define BOARD_ID2VARCPN(_id) (((_id) & BOARD_ID_VARCPN_MASK) >> \
|
|
BOARD_ID_VARCPN_SHIFT)
|
|
#define BOARD_ID2REV(_id) (((_id) & BOARD_ID_REVISION_MASK) >> \
|
|
BOARD_ID_REVISION_SHIFT)
|
|
#define BOARD_ID2VARFG(_id) (((_id) & BOARD_ID_VARFG_MASK) >> \
|
|
BOARD_ID_VARFG_SHIFT)
|
|
#define BOARD_ID2BOM(_id) ((_id) & BOARD_ID_BOM_MASK)
|
|
|
|
#if defined(IMAGE_BL2)
|
|
#define MAP_SEC_SYSRAM MAP_REGION_FLAT(STM32MP_SYSRAM_BASE, \
|
|
STM32MP_SYSRAM_SIZE, \
|
|
MT_MEMORY | \
|
|
MT_RW | \
|
|
MT_SECURE | \
|
|
MT_EXECUTE_NEVER)
|
|
#elif defined(IMAGE_BL32)
|
|
#define MAP_SEC_SYSRAM MAP_REGION_FLAT(STM32MP_SEC_SYSRAM_BASE, \
|
|
STM32MP_SEC_SYSRAM_SIZE, \
|
|
MT_MEMORY | \
|
|
MT_RW | \
|
|
MT_SECURE | \
|
|
MT_EXECUTE_NEVER)
|
|
|
|
/* Non-secure SYSRAM is used a uncached memory for SCMI message transfer */
|
|
#define MAP_NS_SYSRAM MAP_REGION_FLAT(STM32MP_NS_SYSRAM_BASE, \
|
|
STM32MP_NS_SYSRAM_SIZE, \
|
|
MT_DEVICE | \
|
|
MT_RW | \
|
|
MT_NS | \
|
|
MT_EXECUTE_NEVER)
|
|
#endif
|
|
|
|
#define MAP_SRAM_MCU MAP_REGION_FLAT(STM32MP_SRAM_MCU_BASE, \
|
|
STM32MP_SRAM_MCU_SIZE, \
|
|
MT_MEMORY | \
|
|
MT_RW | \
|
|
MT_NS | \
|
|
MT_EXECUTE_NEVER)
|
|
|
|
#define MAP_RETRAM MAP_REGION_FLAT(STM32MP_RETRAM_BASE, \
|
|
STM32MP_RETRAM_SIZE, \
|
|
MT_MEMORY | \
|
|
MT_RW | \
|
|
MT_NS | \
|
|
MT_EXECUTE_NEVER)
|
|
|
|
#define MAP_DEVICE1 MAP_REGION_FLAT(STM32MP1_DEVICE1_BASE, \
|
|
STM32MP1_DEVICE1_SIZE, \
|
|
MT_DEVICE | \
|
|
MT_RW | \
|
|
MT_SECURE | \
|
|
MT_EXECUTE_NEVER)
|
|
|
|
#define MAP_DEVICE2 MAP_REGION_FLAT(STM32MP1_DEVICE2_BASE, \
|
|
STM32MP1_DEVICE2_SIZE, \
|
|
MT_DEVICE | \
|
|
MT_RW | \
|
|
MT_SECURE | \
|
|
MT_EXECUTE_NEVER)
|
|
|
|
#if defined(IMAGE_BL2)
|
|
static const mmap_region_t stm32mp1_mmap[] = {
|
|
MAP_SEC_SYSRAM,
|
|
#if STM32MP_USB_PROGRAMMER
|
|
MAP_SRAM_MCU,
|
|
#endif
|
|
MAP_DEVICE1,
|
|
MAP_DEVICE2,
|
|
{0}
|
|
};
|
|
#endif
|
|
#if defined(IMAGE_BL32)
|
|
static const mmap_region_t stm32mp1_mmap[] = {
|
|
MAP_SEC_SYSRAM,
|
|
MAP_NS_SYSRAM,
|
|
MAP_DEVICE1,
|
|
MAP_DEVICE2,
|
|
{0}
|
|
};
|
|
#endif
|
|
|
|
void configure_mmu(void)
|
|
{
|
|
#ifndef MMU_OFF
|
|
unsigned int flags = 0;
|
|
|
|
mmap_add(stm32mp1_mmap);
|
|
init_xlat_tables();
|
|
#ifdef DCACHE_OFF
|
|
flags |= DISABLE_DCACHE;
|
|
#endif
|
|
enable_mmu_svc_mon(flags);
|
|
#endif
|
|
}
|
|
|
|
#if STM32MP_UART_PROGRAMMER
|
|
/*
|
|
* UART Management
|
|
*/
|
|
static const uintptr_t stm32mp1_uart_addresses[8] = {
|
|
USART1_BASE,
|
|
USART2_BASE,
|
|
USART3_BASE,
|
|
UART4_BASE,
|
|
UART5_BASE,
|
|
USART6_BASE,
|
|
UART7_BASE,
|
|
UART8_BASE,
|
|
};
|
|
|
|
uintptr_t get_uart_address(uint32_t instance_nb)
|
|
{
|
|
if (!instance_nb || instance_nb > ARRAY_SIZE(stm32mp1_uart_addresses))
|
|
return 0;
|
|
|
|
return stm32mp1_uart_addresses[instance_nb - 1];
|
|
}
|
|
#endif
|
|
|
|
#define ARM_CNTXCTL_IMASK BIT(1)
|
|
|
|
void stm32mp_mask_timer(void)
|
|
{
|
|
/* Mask timer interrupts */
|
|
write_cntp_ctl(read_cntp_ctl() | ARM_CNTXCTL_IMASK);
|
|
write_cntv_ctl(read_cntv_ctl() | ARM_CNTXCTL_IMASK);
|
|
}
|
|
|
|
void __dead2 stm32mp_wait_cpu_reset(void)
|
|
{
|
|
uint32_t id;
|
|
|
|
dcsw_op_all(DC_OP_CISW);
|
|
write_sctlr(read_sctlr() & ~SCTLR_C_BIT);
|
|
dcsw_op_all(DC_OP_CISW);
|
|
__asm__("clrex");
|
|
|
|
dsb();
|
|
isb();
|
|
|
|
for ( ; ; ) {
|
|
do {
|
|
id = plat_ic_get_pending_interrupt_id();
|
|
|
|
if (id <= MAX_SPI_ID) {
|
|
gicv2_end_of_interrupt(id);
|
|
|
|
plat_ic_disable_interrupt(id);
|
|
}
|
|
} while (id <= MAX_SPI_ID);
|
|
|
|
wfi();
|
|
}
|
|
}
|
|
|
|
/*
|
|
* tzc_source_ip contains the TZC transaction source IPs that need to be reset
|
|
* before a C-A7 subsystem is reset (i.e. independent reset):
|
|
* - C-A7 subsystem is reset separately later in the sequence,
|
|
* - C-M4 subsystem is not concerned here,
|
|
* - DAP is excluded for debug purpose,
|
|
* - IPs are stored with their ETZPC IDs (STM32MP1_ETZPC_MAX_ID if not
|
|
* applicable) because some of them need to be reset only if they are not
|
|
* configured in MCU isolation mode inside ETZPC device tree.
|
|
*/
|
|
struct tzc_source_ip {
|
|
uint32_t reset_id;
|
|
uint32_t clock_id;
|
|
uint32_t decprot_id;
|
|
};
|
|
|
|
#define _TZC_FIXED(res, clk) \
|
|
{ \
|
|
.reset_id = (res), \
|
|
.clock_id = (clk), \
|
|
.decprot_id = STM32MP1_ETZPC_MAX_ID, \
|
|
}
|
|
|
|
#define _TZC_COND(res, clk, decprot) \
|
|
{ \
|
|
.reset_id = (res), \
|
|
.clock_id = (clk), \
|
|
.decprot_id = (decprot), \
|
|
}
|
|
|
|
static const struct tzc_source_ip tzc_source_ip[] = {
|
|
_TZC_FIXED(LTDC_R, LTDC_PX),
|
|
_TZC_FIXED(GPU_R, GPU),
|
|
_TZC_FIXED(USBH_R, USBH),
|
|
_TZC_FIXED(SDMMC1_R, SDMMC1_K),
|
|
_TZC_FIXED(SDMMC2_R, SDMMC2_K),
|
|
_TZC_FIXED(MDMA_R, MDMA),
|
|
_TZC_COND(USBO_R, USBO_K, STM32MP1_ETZPC_OTG_ID),
|
|
_TZC_COND(SDMMC3_R, SDMMC3_K, STM32MP1_ETZPC_SDMMC3_ID),
|
|
_TZC_COND(ETHMAC_R, ETHMAC, STM32MP1_ETZPC_ETH_ID),
|
|
_TZC_COND(DMA1_R, DMA1, STM32MP1_ETZPC_DMA1_ID),
|
|
_TZC_COND(DMA2_R, DMA2, STM32MP1_ETZPC_DMA2_ID),
|
|
};
|
|
|
|
#define TIMEOUT_US_1MS U(1000)
|
|
|
|
void __dead2 stm32mp_plat_reset(int cpu)
|
|
{
|
|
uint32_t reg = RCC_MP_GRSTCSETR_MPUP0RST;
|
|
uint32_t id;
|
|
|
|
/* Mask timer interrupts */
|
|
stm32mp_mask_timer();
|
|
|
|
for (id = 0U; id < ARRAY_SIZE(tzc_source_ip); id++) {
|
|
if ((!stm32mp_clk_is_enabled(tzc_source_ip[id].clock_id)) ||
|
|
((tzc_source_ip[id].decprot_id != STM32MP1_ETZPC_MAX_ID) &&
|
|
(etzpc_get_decprot(tzc_source_ip[id].decprot_id) ==
|
|
TZPC_DECPROT_MCU_ISOLATION))) {
|
|
continue;
|
|
}
|
|
|
|
if (tzc_source_ip[id].reset_id != GPU_R) {
|
|
uint32_t reset = tzc_source_ip[id].reset_id;
|
|
|
|
if (stm32mp_reset_assert_to(reset, TIMEOUT_US_1MS)) {
|
|
panic();
|
|
}
|
|
if (stm32mp_reset_deassert_to(reset, TIMEOUT_US_1MS)) {
|
|
panic();
|
|
}
|
|
} else {
|
|
/* GPU reset automatically cleared by hardware */
|
|
mmio_setbits_32(stm32mp_rcc_base() + RCC_AHB6RSTSETR,
|
|
RCC_AHB6RSTSETR_GPURST);
|
|
}
|
|
}
|
|
|
|
if (!stm32mp_is_single_core()) {
|
|
unsigned int sec_cpu = (cpu == STM32MP_PRIMARY_CPU) ?
|
|
STM32MP_SECONDARY_CPU : STM32MP_PRIMARY_CPU;
|
|
|
|
gicv2_raise_sgi(ARM_IRQ_SEC_SGI_1, sec_cpu);
|
|
reg |= RCC_MP_GRSTCSETR_MPUP1RST;
|
|
}
|
|
|
|
do {
|
|
id = plat_ic_get_pending_interrupt_id();
|
|
|
|
if (id <= MAX_SPI_ID) {
|
|
gicv2_end_of_interrupt(id);
|
|
|
|
plat_ic_disable_interrupt(id);
|
|
}
|
|
} while (id <= MAX_SPI_ID);
|
|
|
|
mmio_write_32(stm32mp_rcc_base() + RCC_MP_GRSTCSETR, reg);
|
|
|
|
stm32mp_wait_cpu_reset();
|
|
}
|
|
|
|
unsigned long stm32_get_gpio_bank_clock(unsigned int bank)
|
|
{
|
|
if (bank == GPIO_BANK_Z) {
|
|
return GPIOZ;
|
|
}
|
|
|
|
assert(GPIO_BANK_A == 0 && bank <= GPIO_BANK_K);
|
|
|
|
return GPIOA + (bank - GPIO_BANK_A);
|
|
}
|
|
|
|
int stm32_get_otp_index(const char *otp_name, uint32_t *otp_idx,
|
|
uint32_t *otp_len)
|
|
{
|
|
assert(otp_name != NULL);
|
|
assert(otp_idx != NULL);
|
|
|
|
if (bsec_find_otp_name_in_dt(otp_name, otp_idx, otp_len) != BSEC_OK) {
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int stm32_get_otp_value(const char *otp_name, uint32_t *otp_val)
|
|
{
|
|
uint32_t otp_idx;
|
|
|
|
assert(otp_name != NULL);
|
|
assert(otp_val != NULL);
|
|
|
|
if (stm32_get_otp_index(otp_name, &otp_idx, NULL) != 0) {
|
|
return -1;
|
|
}
|
|
|
|
if (stm32_get_otp_value_from_idx(otp_idx, otp_val) != 0) {
|
|
ERROR("BSEC: %s Read Error\n", otp_name);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int stm32_get_otp_value_from_idx(const uint32_t otp_idx, uint32_t *otp_val)
|
|
{
|
|
int ret = BSEC_NOT_SUPPORTED;
|
|
|
|
assert(otp_val != NULL);
|
|
|
|
#if defined(IMAGE_BL2)
|
|
ret = bsec_shadow_read_otp(otp_val, otp_idx);
|
|
#elif defined(IMAGE_BL32)
|
|
ret = bsec_read_otp(otp_val, otp_idx);
|
|
#else
|
|
#error "Not supported"
|
|
#endif
|
|
if (ret != BSEC_OK) {
|
|
ERROR("BSEC: idx=%d Read Error\n", otp_idx);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static uint32_t get_part_number(void)
|
|
{
|
|
static uint32_t part_number;
|
|
uint32_t dev_id;
|
|
|
|
if (part_number != 0U) {
|
|
return part_number;
|
|
}
|
|
|
|
if (stm32mp1_dbgmcu_get_chip_dev_id(&dev_id) < 0) {
|
|
INFO("Use default chip ID, debug disabled\n");
|
|
dev_id = STM32MP1_CHIP_ID;
|
|
}
|
|
|
|
if (stm32_get_otp_value(PART_NUMBER_OTP, &part_number) != 0) {
|
|
panic();
|
|
}
|
|
|
|
part_number = (part_number & PART_NUMBER_OTP_PART_MASK) >>
|
|
PART_NUMBER_OTP_PART_SHIFT;
|
|
|
|
part_number |= dev_id << 16;
|
|
|
|
return part_number;
|
|
}
|
|
|
|
static uint32_t get_cpu_package(void)
|
|
{
|
|
uint32_t package;
|
|
|
|
if (stm32_get_otp_value(PACKAGE_OTP, &package) != 0) {
|
|
panic();
|
|
}
|
|
|
|
package = (package & PACKAGE_OTP_PKG_MASK) >>
|
|
PACKAGE_OTP_PKG_SHIFT;
|
|
|
|
return package;
|
|
}
|
|
|
|
bool stm32mp_supports_cpu_opp(uint32_t opp_id)
|
|
{
|
|
uint32_t id;
|
|
|
|
switch (opp_id) {
|
|
case PLAT_OPP_ID1:
|
|
case PLAT_OPP_ID2:
|
|
id = opp_id;
|
|
break;
|
|
default:
|
|
return false;
|
|
}
|
|
|
|
switch (get_part_number()) {
|
|
case STM32MP157F_PART_NB:
|
|
case STM32MP157D_PART_NB:
|
|
case STM32MP153F_PART_NB:
|
|
case STM32MP153D_PART_NB:
|
|
case STM32MP151F_PART_NB:
|
|
case STM32MP151D_PART_NB:
|
|
return true;
|
|
default:
|
|
return id == PLAT_OPP_ID1;
|
|
}
|
|
}
|
|
|
|
void stm32mp_print_cpuinfo(void)
|
|
{
|
|
const char *cpu_s, *cpu_r, *pkg;
|
|
uint32_t chip_dev_id;
|
|
int ret;
|
|
|
|
/* MPUs Part Numbers */
|
|
switch (get_part_number()) {
|
|
case STM32MP157C_PART_NB:
|
|
cpu_s = "157C";
|
|
break;
|
|
case STM32MP157A_PART_NB:
|
|
cpu_s = "157A";
|
|
break;
|
|
case STM32MP153C_PART_NB:
|
|
cpu_s = "153C";
|
|
break;
|
|
case STM32MP153A_PART_NB:
|
|
cpu_s = "153A";
|
|
break;
|
|
case STM32MP151C_PART_NB:
|
|
cpu_s = "151C";
|
|
break;
|
|
case STM32MP151A_PART_NB:
|
|
cpu_s = "151A";
|
|
break;
|
|
case STM32MP157F_PART_NB:
|
|
cpu_s = "157F";
|
|
break;
|
|
case STM32MP157D_PART_NB:
|
|
cpu_s = "157D";
|
|
break;
|
|
case STM32MP153F_PART_NB:
|
|
cpu_s = "153F";
|
|
break;
|
|
case STM32MP153D_PART_NB:
|
|
cpu_s = "153D";
|
|
break;
|
|
case STM32MP151F_PART_NB:
|
|
cpu_s = "151F";
|
|
break;
|
|
case STM32MP151D_PART_NB:
|
|
cpu_s = "151D";
|
|
break;
|
|
default:
|
|
cpu_s = "????";
|
|
break;
|
|
}
|
|
|
|
/* Package */
|
|
switch (get_cpu_package()) {
|
|
case PKG_AA_LFBGA448:
|
|
pkg = "AA";
|
|
break;
|
|
case PKG_AB_LFBGA354:
|
|
pkg = "AB";
|
|
break;
|
|
case PKG_AC_TFBGA361:
|
|
pkg = "AC";
|
|
break;
|
|
case PKG_AD_TFBGA257:
|
|
pkg = "AD";
|
|
break;
|
|
default:
|
|
pkg = "??";
|
|
break;
|
|
}
|
|
|
|
/* REVISION */
|
|
ret = stm32mp1_dbgmcu_get_chip_version(&chip_dev_id);
|
|
if (ret < 0) {
|
|
INFO("Cannot get CPU version, debug disabled\n");
|
|
}
|
|
|
|
switch (chip_dev_id) {
|
|
case STM32MP1_REV_B:
|
|
cpu_r = "B";
|
|
break;
|
|
case STM32MP1_REV_Z:
|
|
cpu_r = "Z";
|
|
break;
|
|
default:
|
|
cpu_r = "?";
|
|
break;
|
|
}
|
|
|
|
NOTICE("CPU: STM32MP%s%s Rev.%s\n", cpu_s, pkg, cpu_r);
|
|
}
|
|
|
|
void stm32mp_print_boardinfo(void)
|
|
{
|
|
uint32_t board_id = 0;
|
|
|
|
if (stm32_get_otp_value(BOARD_ID_OTP, &board_id) != 0) {
|
|
return;
|
|
}
|
|
|
|
if (board_id != 0U) {
|
|
char rev[2];
|
|
|
|
rev[0] = BOARD_ID2REV(board_id) - 1 + 'A';
|
|
rev[1] = '\0';
|
|
NOTICE("Board: MB%04x Var%d.%d Rev.%s-%02d\n",
|
|
BOARD_ID2NB(board_id),
|
|
BOARD_ID2VARCPN(board_id),
|
|
BOARD_ID2VARFG(board_id),
|
|
rev,
|
|
BOARD_ID2BOM(board_id));
|
|
}
|
|
}
|
|
|
|
/* Return true when SoC provides a single Cortex-A7 core, and false otherwise */
|
|
bool stm32mp_is_single_core(void)
|
|
{
|
|
switch (get_part_number()) {
|
|
case STM32MP151A_PART_NB:
|
|
case STM32MP151C_PART_NB:
|
|
case STM32MP151D_PART_NB:
|
|
case STM32MP151F_PART_NB:
|
|
return true;
|
|
default:
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/* Return true when device is in closed state */
|
|
bool stm32mp_is_closed_device(void)
|
|
{
|
|
uint32_t value;
|
|
|
|
if (stm32_get_otp_value(CFG0_OTP, &value) != 0) {
|
|
return true;
|
|
}
|
|
|
|
return (value & CFG0_CLOSED_DEVICE) == CFG0_CLOSED_DEVICE;
|
|
}
|
|
|
|
/* Return true when device supports secure boot */
|
|
bool stm32mp_is_auth_supported(void)
|
|
{
|
|
switch (get_part_number()) {
|
|
case STM32MP151C_PART_NB:
|
|
case STM32MP151F_PART_NB:
|
|
case STM32MP153C_PART_NB:
|
|
case STM32MP153F_PART_NB:
|
|
case STM32MP157C_PART_NB:
|
|
case STM32MP157F_PART_NB:
|
|
return true;
|
|
default:
|
|
return false;
|
|
}
|
|
}
|
|
|
|
uint32_t stm32_iwdg_get_instance(uintptr_t base)
|
|
{
|
|
switch (base) {
|
|
case IWDG1_BASE:
|
|
return IWDG1_INST;
|
|
case IWDG2_BASE:
|
|
return IWDG2_INST;
|
|
default:
|
|
panic();
|
|
}
|
|
}
|
|
|
|
uint32_t stm32_iwdg_get_otp_config(uint32_t iwdg_inst)
|
|
{
|
|
uint32_t iwdg_cfg = 0U;
|
|
uint32_t otp_value;
|
|
|
|
if (stm32_get_otp_value(HW2_OTP, &otp_value) != 0) {
|
|
panic();
|
|
}
|
|
|
|
if ((otp_value & BIT(iwdg_inst + HW2_OTP_IWDG_HW_POS)) != 0U) {
|
|
iwdg_cfg |= IWDG_HW_ENABLED;
|
|
}
|
|
|
|
if ((otp_value & BIT(iwdg_inst + HW2_OTP_IWDG_FZ_STOP_POS)) != 0U) {
|
|
iwdg_cfg |= IWDG_DISABLE_ON_STOP;
|
|
}
|
|
|
|
if ((otp_value & BIT(iwdg_inst + HW2_OTP_IWDG_FZ_STANDBY_POS)) != 0U) {
|
|
iwdg_cfg |= IWDG_DISABLE_ON_STANDBY;
|
|
}
|
|
|
|
return iwdg_cfg;
|
|
}
|
|
|
|
#if defined(IMAGE_BL2)
|
|
uint32_t stm32_iwdg_shadow_update(uint32_t iwdg_inst, uint32_t flags)
|
|
{
|
|
uint32_t otp_value;
|
|
uint32_t otp;
|
|
uint32_t result;
|
|
|
|
if (stm32_get_otp_index(HW2_OTP, &otp, NULL) != 0) {
|
|
panic();
|
|
}
|
|
|
|
if (stm32_get_otp_value(HW2_OTP, &otp_value) != 0) {
|
|
panic();
|
|
}
|
|
|
|
if ((flags & IWDG_DISABLE_ON_STOP) != 0) {
|
|
otp_value |= BIT(iwdg_inst + HW2_OTP_IWDG_FZ_STOP_POS);
|
|
}
|
|
|
|
if ((flags & IWDG_DISABLE_ON_STANDBY) != 0) {
|
|
otp_value |= BIT(iwdg_inst + HW2_OTP_IWDG_FZ_STANDBY_POS);
|
|
}
|
|
|
|
result = bsec_write_otp(otp_value, otp);
|
|
if (result != BSEC_OK) {
|
|
return result;
|
|
}
|
|
|
|
/* Sticky lock OTP_IWDG (read and write) */
|
|
if ((bsec_set_sr_lock(otp) != BSEC_OK) ||
|
|
(bsec_set_sw_lock(otp) != BSEC_OK)) {
|
|
return BSEC_LOCK_FAIL;
|
|
}
|
|
|
|
return BSEC_OK;
|
|
}
|
|
#endif
|
|
|
|
/*
|
|
* This function allows to split bindings between platform and ETZPC
|
|
* HW mapping. If this conversion was done at driver level, the driver
|
|
* should include all supported platform bindings. ETZPC may be used on
|
|
* other platforms.
|
|
*/
|
|
enum etzpc_decprot_attributes stm32mp_etzpc_binding2decprot(uint32_t mode)
|
|
{
|
|
switch (mode) {
|
|
case DECPROT_S_RW:
|
|
return TZPC_DECPROT_S_RW;
|
|
case DECPROT_NS_R_S_W:
|
|
return TZPC_DECPROT_NS_R_S_W;
|
|
case DECPROT_MCU_ISOLATION:
|
|
return TZPC_DECPROT_MCU_ISOLATION;
|
|
case DECPROT_NS_RW:
|
|
return TZPC_DECPROT_NS_RW;
|
|
default:
|
|
panic();
|
|
}
|
|
}
|
|
|
|
int plat_bind_regulator(struct stm32mp_regulator *regu)
|
|
{
|
|
void *fdt;
|
|
int regu_node;
|
|
|
|
if (fdt_get_address(&fdt) == 0) {
|
|
return false;
|
|
}
|
|
|
|
if ((dt_pmic_status() > 0) && is_pmic_regulator(regu)) {
|
|
bind_pmic_regulator(regu);
|
|
} else {
|
|
bind_dummy_regulator(regu);
|
|
}
|
|
|
|
regu_node = fdt_node_offset_by_phandle(fdt, regu->id);
|
|
if (fdt_getprop(fdt, regu_node, "regulator-always-on", NULL) != NULL) {
|
|
regu->always_on = true;
|
|
}
|
|
|
|
return 0;
|
|
}
|