1 // SPDX-License-Identifier: GPL-2.0
3 * (C) Copyright 2018 Xilinx, Inc.
4 * Siva Durga Prasad Paladugu <siva.durga.paladugu@xilinx.com>
10 #include <asm/arch/hardware.h>
11 #include <asm/arch/sys_proto.h>
14 static int do_zynqmp_verify_secure(cmd_tbl_t *cmdtp, int flag, int argc,
18 u32 len, src_lo, src_hi;
23 u32 ret_payload[PAYLOAD_ARG_CNT];
28 src_addr = simple_strtoull(argv[2], NULL, 16);
29 len = simple_strtoul(argv[3], NULL, 16);
32 key_ptr = (uint8_t *)(uintptr_t)simple_strtoull(argv[4],
35 if ((ulong)src_addr != ALIGN((ulong)src_addr,
36 CONFIG_SYS_CACHELINE_SIZE)) {
37 printf("Failed: source address not aligned:%lx\n",
42 src_lo = lower_32_bits((ulong)src_addr);
43 src_hi = upper_32_bits((ulong)src_addr);
44 flush_dcache_range((ulong)src_addr, (ulong)(src_addr + len));
47 key_lo = lower_32_bits((ulong)key_ptr);
48 key_hi = upper_32_bits((ulong)key_ptr);
49 flush_dcache_range((ulong)key_ptr,
50 (ulong)(key_ptr + KEY_PTR_LEN));
53 ret = invoke_smc(ZYNQMP_SIP_SVC_PM_SECURE_IMG_LOAD, src_lo, src_hi,
54 key_lo, key_hi, ret_payload);
56 printf("Failed: secure op status:0x%x\n", ret);
58 addr = (u64)ret_payload[1] << 32 | ret_payload[2];
59 printf("Verified image at 0x%llx\n", addr);
60 env_set_hex("zynqmp_verified_img_addr", addr);
66 static int do_zynqmp_mmio_read(cmd_tbl_t *cmdtp, int flag, int argc,
72 if (argc != cmdtp->maxargs)
75 addr = simple_strtoul(argv[2], NULL, 16);
77 ret = zynqmp_mmio_read(addr, &read_val);
79 printf("mmio read value at 0x%x = 0x%x\n",
82 printf("Failed: mmio read\n");
87 static int do_zynqmp_mmio_write(cmd_tbl_t *cmdtp, int flag, int argc,
93 if (argc != cmdtp->maxargs)
96 addr = simple_strtoul(argv[2], NULL, 16);
97 mask = simple_strtoul(argv[3], NULL, 16);
98 val = simple_strtoul(argv[4], NULL, 16);
100 ret = zynqmp_mmio_write(addr, mask, val);
102 printf("Failed: mmio write\n");
107 #ifdef CONFIG_DEFINE_TCM_OCM_MMAP
108 static int do_zynqmp_tcm_init(cmd_tbl_t *cmdtp, int flag, int argc,
113 if (argc != cmdtp->maxargs)
114 return CMD_RET_USAGE;
116 mode = simple_strtoul(argv[2], NULL, 16);
117 if (mode != TCM_LOCK && mode != TCM_SPLIT) {
118 printf("Mode should be either 0(lock)/1(split)\n");
119 return CMD_RET_FAILURE;
126 return CMD_RET_SUCCESS;
130 static cmd_tbl_t cmd_zynqmp_sub[] = {
131 U_BOOT_CMD_MKENT(secure, 5, 0, do_zynqmp_verify_secure, "", ""),
132 U_BOOT_CMD_MKENT(mmio_read, 3, 0, do_zynqmp_mmio_read, "", ""),
133 U_BOOT_CMD_MKENT(mmio_write, 5, 0, do_zynqmp_mmio_write, "", ""),
134 #ifdef CONFIG_DEFINE_TCM_OCM_MMAP
135 U_BOOT_CMD_MKENT(tcminit, 3, 0, do_zynqmp_tcm_init, "", ""),
140 * do_zynqmp - Handle the "zynqmp" command-line command
141 * @cmdtp: Command data struct pointer
142 * @flag: Command flag
143 * @argc: Command-line argument count
144 * @argv: Array of command-line arguments
146 * Processes the zynqmp specific commands
148 * Return: return 0 on success and CMD_RET_USAGE incase of misuse and error
150 static int do_zynqmp(cmd_tbl_t *cmdtp, int flag, int argc,
156 return CMD_RET_USAGE;
158 c = find_cmd_tbl(argv[1], &cmd_zynqmp_sub[0],
159 ARRAY_SIZE(cmd_zynqmp_sub));
162 return c->cmd(c, flag, argc, argv);
164 return CMD_RET_USAGE;
167 /***************************************************/
168 #ifdef CONFIG_SYS_LONGHELP
169 static char zynqmp_help_text[] =
170 "secure src len [key_addr] - verifies secure images of $len bytes\n"
171 " long at address $src. Optional key_addr\n"
172 " can be specified if user key needs to\n"
173 " be used for decryption\n"
174 "zynqmp mmio_read address - read from address\n"
175 "zynqmp mmio_write address mask value - write value after masking to\n"
177 #ifdef CONFIG_DEFINE_TCM_OCM_MMAP
178 "zynqmp tcminit mode - Initialize the TCM with zeros. TCM needs to be\n"
179 " initialized before accessing to avoid ECC\n"
180 " errors. mode specifies in which mode TCM has\n"
181 " to be initialized. Supported modes will be\n"
182 " lock(0)/split(1)\n"
188 zynqmp, 5, 1, do_zynqmp,