psci_on.c 7.67 KB
Newer Older
1
/*
2
 * Copyright (c) 2013-2020, ARM Limited and Contributors. All rights reserved.
3
 *
dp-arm's avatar
dp-arm committed
4
 * SPDX-License-Identifier: BSD-3-Clause
5
6
7
8
 */

#include <assert.h>
#include <stddef.h>
9
10
11
12
13
14
15
16
17

#include <arch.h>
#include <arch_helpers.h>
#include <common/bl_common.h>
#include <common/debug.h>
#include <lib/el3_runtime/context_mgmt.h>
#include <lib/el3_runtime/pubsub_events.h>
#include <plat/common/platform.h>

18
19
#include "psci_private.h"

20
21
22
/*
 * Helper functions for the CPU level spinlocks
 */
23
static inline void psci_spin_lock_cpu(unsigned int idx)
24
25
26
27
{
	spin_lock(&psci_cpu_pd_nodes[idx].cpu_lock);
}

28
static inline void psci_spin_unlock_cpu(unsigned int idx)
29
30
31
32
{
	spin_unlock(&psci_cpu_pd_nodes[idx].cpu_lock);
}

33
34
35
36
/*******************************************************************************
 * This function checks whether a cpu which has been requested to be turned on
 * is OFF to begin with.
 ******************************************************************************/
37
static int cpu_on_validate_state(aff_info_state_t aff_state)
38
{
39
	if (aff_state == AFF_STATE_ON)
40
41
		return PSCI_E_ALREADY_ON;

42
	if (aff_state == AFF_STATE_ON_PENDING)
43
44
		return PSCI_E_ON_PENDING;

45
	assert(aff_state == AFF_STATE_OFF);
46
47
48
49
50
	return PSCI_E_SUCCESS;
}

/*******************************************************************************
 * Generic handler which is called to physically power on a cpu identified by
51
52
53
54
 * its mpidr. It performs the generic, architectural, platform setup and state
 * management to power on the target cpu e.g. it will ensure that
 * enough information is stashed for it to resume execution in the non-secure
 * security state.
55
 *
56
 * The state of all the relevant power domains are changed after calling the
57
 * platform handler as it can return error.
58
 ******************************************************************************/
59
int psci_cpu_on_start(u_register_t target_cpu,
60
		      const entry_point_info_t *ep)
61
62
{
	int rc;
63
	aff_info_state_t target_aff_state;
64
65
	int ret = plat_core_pos_by_mpidr(target_cpu);
	unsigned int target_idx = (unsigned int)ret;
66

67
	/* Calling function must supply valid input arguments */
68
	assert(ret >= 0);
69
70
	assert(ep != NULL);

71

72
73
74
75
	/*
	 * This function must only be called on platforms where the
	 * CPU_ON platform hooks have been implemented.
	 */
76
77
	assert((psci_plat_pm_ops->pwr_domain_on != NULL) &&
	       (psci_plat_pm_ops->pwr_domain_on_finish != NULL));
78

79
80
	/* Protect against multiple CPUs trying to turn ON the same target CPU */
	psci_spin_lock_cpu(target_idx);
81
82
83
84

	/*
	 * Generic management: Ensure that the cpu is off to be
	 * turned on.
85
86
87
88
89
90
91
92
93
94
95
96
	 * Perform cache maintanence ahead of reading the target CPU state to
	 * ensure that the data is not stale.
	 * There is a theoretical edge case where the cache may contain stale
	 * data for the target CPU data - this can occur under the following
	 * conditions:
	 * - the target CPU is in another cluster from the current
	 * - the target CPU was the last CPU to shutdown on its cluster
	 * - the cluster was removed from coherency as part of the CPU shutdown
	 *
	 * In this case the cache maintenace that was performed as part of the
	 * target CPUs shutdown was not seen by the current CPU's cluster. And
	 * so the cache may contain stale data for the target CPU.
97
	 */
98
	flush_cpu_data_by_index(target_idx,
99
				psci_svc_cpu_data.aff_info_state);
100
	rc = cpu_on_validate_state(psci_get_aff_info_state_by_idx(target_idx));
101
102
103
104
105
106
107
108
	if (rc != PSCI_E_SUCCESS)
		goto exit;

	/*
	 * Call the cpu on handler registered by the Secure Payload Dispatcher
	 * to let it do any bookeeping. If the handler encounters an error, it's
	 * expected to assert within
	 */
109
	if ((psci_spd_pm != NULL) && (psci_spd_pm->svc_on != NULL))
110
111
112
		psci_spd_pm->svc_on(target_cpu);

	/*
113
	 * Set the Affinity info state of the target cpu to ON_PENDING.
114
115
	 * Flush aff_info_state as it will be accessed with caches
	 * turned OFF.
116
	 */
117
	psci_set_aff_info_state_by_idx(target_idx, AFF_STATE_ON_PENDING);
118
	flush_cpu_data_by_index(target_idx,
119
				psci_svc_cpu_data.aff_info_state);
120
121
122
123
124
125
126
127
128
129
130

	/*
	 * The cache line invalidation by the target CPU after setting the
	 * state to OFF (see psci_do_cpu_off()), could cause the update to
	 * aff_info_state to be invalidated. Retry the update if the target
	 * CPU aff_info_state is not ON_PENDING.
	 */
	target_aff_state = psci_get_aff_info_state_by_idx(target_idx);
	if (target_aff_state != AFF_STATE_ON_PENDING) {
		assert(target_aff_state == AFF_STATE_OFF);
		psci_set_aff_info_state_by_idx(target_idx, AFF_STATE_ON_PENDING);
131
		flush_cpu_data_by_index(target_idx,
132
					psci_svc_cpu_data.aff_info_state);
133

134
135
		assert(psci_get_aff_info_state_by_idx(target_idx) ==
		       AFF_STATE_ON_PENDING);
136
	}
137
138
139
140
141
142
143
144
145

	/*
	 * Perform generic, architecture and platform specific handling.
	 */
	/*
	 * Plat. management: Give the platform the current state
	 * of the target cpu to allow it to perform the necessary
	 * steps to power on.
	 */
146
	rc = psci_plat_pm_ops->pwr_domain_on(target_cpu);
147
	assert((rc == PSCI_E_SUCCESS) || (rc == PSCI_E_INTERN_FAIL));
148
149
150

	if (rc == PSCI_E_SUCCESS)
		/* Store the re-entry information for the non-secure world. */
151
		cm_init_context_by_index(target_idx, ep);
152
	else {
153
		/* Restore the state on error. */
154
		psci_set_aff_info_state_by_idx(target_idx, AFF_STATE_OFF);
155
		flush_cpu_data_by_index(target_idx,
156
					psci_svc_cpu_data.aff_info_state);
157
	}
158

159
exit:
160
	psci_spin_unlock_cpu(target_idx);
161
162
163
164
	return rc;
}

/*******************************************************************************
165
 * The following function finish an earlier power on request. They
166
167
 * are called by the common finisher routine in psci_common.c. The `state_info`
 * is the psci_power_state from which this CPU has woken up from.
168
 ******************************************************************************/
169
void psci_cpu_on_finish(unsigned int cpu_idx, const psci_power_state_t *state_info)
170
171
172
173
174
175
176
{
	/*
	 * Plat. management: Perform the platform specific actions
	 * for this cpu e.g. enabling the gic or zeroing the mailbox
	 * register. The actual state of this cpu has already been
	 * changed.
	 */
177
	psci_plat_pm_ops->pwr_domain_on_finish(state_info);
178

179
#if !(HW_ASSISTED_COHERENCY || WARMBOOT_ENABLE_DCACHE_EARLY)
180
181
182
183
	/*
	 * Arch. management: Enable data cache and manage stack memory
	 */
	psci_do_pwrup_cache_maintenance();
184
#endif
185

186
187
188
189
190
191
192
193
	/*
	 * Plat. management: Perform any platform specific actions which
	 * can only be done with the cpu and the cluster guaranteed to
	 * be coherent.
	 */
	if (psci_plat_pm_ops->pwr_domain_on_finish_late != NULL)
		psci_plat_pm_ops->pwr_domain_on_finish_late(state_info);

194
195
196
197
198
	/*
	 * All the platform specific actions for turning this cpu
	 * on have completed. Perform enough arch.initialization
	 * to run in the non-secure address space.
	 */
Soby Mathew's avatar
Soby Mathew committed
199
	psci_arch_setup();
200

201
202
203
204
205
206
207
208
209
	/*
	 * Lock the CPU spin lock to make sure that the context initialization
	 * is done. Since the lock is only used in this function to create
	 * a synchronization point with cpu_on_start(), it can be released
	 * immediately.
	 */
	psci_spin_lock_cpu(cpu_idx);
	psci_spin_unlock_cpu(cpu_idx);

210
211
212
	/* Ensure we have been explicitly woken up by another cpu */
	assert(psci_get_aff_info_state() == AFF_STATE_ON_PENDING);

213
214
215
216
217
	/*
	 * Call the cpu on finish handler registered by the Secure Payload
	 * Dispatcher to let it do any bookeeping. If the handler encounters an
	 * error, it's expected to assert within
	 */
218
	if ((psci_spd_pm != NULL) && (psci_spd_pm->svc_on_finish != NULL))
219
220
		psci_spd_pm->svc_on_finish(0);

221
222
	PUBLISH_EVENT(psci_cpu_on_finish);

223
224
225
226
	/* Populate the mpidr field within the cpu node array */
	/* This needs to be done only once */
	psci_cpu_pd_nodes[cpu_idx].mpidr = read_mpidr() & MPIDR_AFFINITY_MASK;

227
228
229
230
231
232
233
	/*
	 * Generic management: Now we just need to retrieve the
	 * information that we had stashed away during the cpu_on
	 * call to set this cpu on its way.
	 */
	cm_prepare_el3_exit(NON_SECURE);
}