xref: /rk3399_ARM-atf/drivers/renesas/common/io/io_rcar.c (revision 993d809cc115ce23dd2df1df19dc8bb548cc19cd)
12ddb5575SBiju Das /*
22ddb5575SBiju Das  * Copyright (c) 2015-2021, Renesas Electronics Corporation. All rights reserved.
32ddb5575SBiju Das  *
42ddb5575SBiju Das  * SPDX-License-Identifier: BSD-3-Clause
52ddb5575SBiju Das  */
62ddb5575SBiju Das 
72ddb5575SBiju Das #include <errno.h>
82ddb5575SBiju Das #include <stdint.h>
92ddb5575SBiju Das #include <string.h>
102ddb5575SBiju Das 
112ddb5575SBiju Das #include <arch_helpers.h>
122ddb5575SBiju Das #include <common/bl_common.h>
132ddb5575SBiju Das #include <common/debug.h>
142ddb5575SBiju Das #include <drivers/auth/auth_mod.h>
152ddb5575SBiju Das #include <drivers/io/io_driver.h>
162ddb5575SBiju Das #include <drivers/io/io_storage.h>
172ddb5575SBiju Das #include <lib/mmio.h>
182ddb5575SBiju Das #include <plat/common/platform.h>
192ddb5575SBiju Das #include <tools_share/firmware_image_package.h>
202ddb5575SBiju Das #include <tools_share/uuid.h>
212ddb5575SBiju Das 
222ddb5575SBiju Das #include "io_rcar.h"
232ddb5575SBiju Das #include "io_common.h"
242ddb5575SBiju Das #include "io_private.h"
252ddb5575SBiju Das #include <platform_def.h>
262ddb5575SBiju Das 
272ddb5575SBiju Das extern int32_t plat_get_drv_source(uint32_t id, uintptr_t *dev,
282ddb5575SBiju Das 				   uintptr_t *image_spec);
292ddb5575SBiju Das 
302ddb5575SBiju Das static int32_t rcar_dev_open(const uintptr_t dev_spec __attribute__ ((unused)),
312ddb5575SBiju Das 			     io_dev_info_t **dev_info);
322ddb5575SBiju Das static int32_t rcar_dev_close(io_dev_info_t *dev_info);
332ddb5575SBiju Das 
342ddb5575SBiju Das typedef struct {
352ddb5575SBiju Das 	const int32_t name;
362ddb5575SBiju Das 	const uint32_t offset;
372ddb5575SBiju Das 	const uint32_t attr;
382ddb5575SBiju Das } plat_rcar_name_offset_t;
392ddb5575SBiju Das 
402ddb5575SBiju Das typedef struct {
412ddb5575SBiju Das 	/*
422ddb5575SBiju Das 	 * Put position above the struct to allow {0} on static init.
432ddb5575SBiju Das 	 * It is a workaround for a known bug in GCC
442ddb5575SBiju Das 	 * http://gcc.gnu.org/bugzilla/show_bug.cgi?id=53119
452ddb5575SBiju Das 	 */
462ddb5575SBiju Das 	uint32_t position;
472ddb5575SBiju Das 	uint32_t no_load;
482ddb5575SBiju Das 	uintptr_t offset;
492ddb5575SBiju Das 	uint32_t size;
502ddb5575SBiju Das 	uintptr_t dst;
512ddb5575SBiju Das 	uintptr_t partition;	/* for eMMC */
522ddb5575SBiju Das 	/* RCAR_EMMC_PARTITION_BOOT_0 */
532ddb5575SBiju Das 	/* RCAR_EMMC_PARTITION_BOOT_1 */
542ddb5575SBiju Das 	/* RCAR_EMMC_PARTITION_USER   */
552ddb5575SBiju Das } file_state_t;
562ddb5575SBiju Das 
572ddb5575SBiju Das #define RCAR_GET_FLASH_ADR(a, b)	((uint32_t)((0x40000U * (a)) + (b)))
582ddb5575SBiju Das #define RCAR_ATTR_SET_CALCADDR(a)	((a) & 0xF)
592ddb5575SBiju Das #define RCAR_ATTR_SET_ISNOLOAD(a)	(((a) & 0x1) << 16U)
602ddb5575SBiju Das #define RCAR_ATTR_SET_CERTOFF(a)	(((a) & 0xF) << 8U)
612ddb5575SBiju Das #define RCAR_ATTR_SET_ALL(a, b, c)	((uint32_t)(RCAR_ATTR_SET_CALCADDR(a) |\
622ddb5575SBiju Das 					RCAR_ATTR_SET_ISNOLOAD(b) |\
632ddb5575SBiju Das 					RCAR_ATTR_SET_CERTOFF(c)))
642ddb5575SBiju Das 
652ddb5575SBiju Das #define RCAR_ATTR_GET_CALCADDR(a)	((a) & 0xFU)
662ddb5575SBiju Das #define RCAR_ATTR_GET_ISNOLOAD(a)	(((a) >> 16) & 0x1U)
672ddb5575SBiju Das #define RCAR_ATTR_GET_CERTOFF(a)	((uint32_t)(((a) >> 8) & 0xFU))
682ddb5575SBiju Das 
692ddb5575SBiju Das #define RCAR_MAX_BL3X_IMAGE		(8U)
702ddb5575SBiju Das #define RCAR_SECTOR6_CERT_OFFSET	(0x400U)
712ddb5575SBiju Das #define RCAR_SDRAM_certESS		(0x43F00000U)
722ddb5575SBiju Das #define RCAR_CERT_SIZE			(0x800U)
732ddb5575SBiju Das #define RCAR_CERT_INFO_SIZE_OFFSET	(0x264U)
742ddb5575SBiju Das #define RCAR_CERT_INFO_DST_OFFSET	(0x154U)
752ddb5575SBiju Das #define RCAR_CERT_INFO_SIZE_OFFSET1	(0x364U)
762ddb5575SBiju Das #define RCAR_CERT_INFO_DST_OFFSET1	(0x1D4U)
772ddb5575SBiju Das #define RCAR_CERT_INFO_SIZE_OFFSET2	(0x464U)
782ddb5575SBiju Das #define RCAR_CERT_INFO_DST_OFFSET2	(0x254U)
792ddb5575SBiju Das #define RCAR_CERT_LOAD			(1U)
802ddb5575SBiju Das 
812ddb5575SBiju Das #define RCAR_FLASH_CERT_HEADER		RCAR_GET_FLASH_ADR(6U, 0U)
822ddb5575SBiju Das #define RCAR_EMMC_CERT_HEADER		(0x00030000U)
832ddb5575SBiju Das 
842ddb5575SBiju Das #define RCAR_COUNT_LOAD_BL33		(2U)
852ddb5575SBiju Das #define RCAR_COUNT_LOAD_BL33X		(3U)
862ddb5575SBiju Das 
872ddb5575SBiju Das static const plat_rcar_name_offset_t name_offset[] = {
882ddb5575SBiju Das 	{BL31_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(0, 0, 0)},
892ddb5575SBiju Das 
902ddb5575SBiju Das 	/* BL3-2 is optional in the platform */
912ddb5575SBiju Das 	{BL32_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(1, 0, 1)},
922ddb5575SBiju Das 	{BL33_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(2, 0, 2)},
932ddb5575SBiju Das 	{BL332_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(3, 0, 3)},
942ddb5575SBiju Das 	{BL333_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(4, 0, 4)},
952ddb5575SBiju Das 	{BL334_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(5, 0, 5)},
962ddb5575SBiju Das 	{BL335_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(6, 0, 6)},
972ddb5575SBiju Das 	{BL336_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(7, 0, 7)},
982ddb5575SBiju Das 	{BL337_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(8, 0, 8)},
992ddb5575SBiju Das 	{BL338_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(9, 0, 9)},
1002ddb5575SBiju Das };
1012ddb5575SBiju Das 
1022ddb5575SBiju Das #if TRUSTED_BOARD_BOOT
1032ddb5575SBiju Das static const plat_rcar_name_offset_t cert_offset[] = {
1042ddb5575SBiju Das 	/* Certificates */
1052ddb5575SBiju Das 	{TRUSTED_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
1062ddb5575SBiju Das 	{SOC_FW_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
1072ddb5575SBiju Das 	{TRUSTED_OS_FW_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
1082ddb5575SBiju Das 	{NON_TRUSTED_FW_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
1092ddb5575SBiju Das 	{SOC_FW_CONTENT_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
1102ddb5575SBiju Das 	{TRUSTED_OS_FW_CONTENT_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 1)},
1112ddb5575SBiju Das 	{NON_TRUSTED_FW_CONTENT_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 2)},
1122ddb5575SBiju Das 	{BL332_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 3)},
1132ddb5575SBiju Das 	{BL333_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 4)},
1142ddb5575SBiju Das 	{BL334_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 5)},
1152ddb5575SBiju Das 	{BL335_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 6)},
1162ddb5575SBiju Das 	{BL336_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 7)},
1172ddb5575SBiju Das 	{BL337_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 8)},
1182ddb5575SBiju Das 	{BL338_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 9)},
1192ddb5575SBiju Das };
1202ddb5575SBiju Das #endif /* TRUSTED_BOARD_BOOT */
1212ddb5575SBiju Das 
1222ddb5575SBiju Das static file_state_t current_file = { 0 };
1232ddb5575SBiju Das 
1242ddb5575SBiju Das static uintptr_t rcar_handle, rcar_spec;
1252ddb5575SBiju Das static uint64_t rcar_image_header[RCAR_MAX_BL3X_IMAGE + 2U] = { 0U };
1262ddb5575SBiju Das static uint64_t rcar_image_header_prttn[RCAR_MAX_BL3X_IMAGE + 2U] = { 0U };
1272ddb5575SBiju Das static uint64_t rcar_image_number = { 0U };
1282ddb5575SBiju Das static uint32_t rcar_cert_load = { 0U };
1292ddb5575SBiju Das 
1302ddb5575SBiju Das static io_type_t device_type_rcar(void)
1312ddb5575SBiju Das {
1322ddb5575SBiju Das 	return IO_TYPE_FIRMWARE_IMAGE_PACKAGE;
1332ddb5575SBiju Das }
1342ddb5575SBiju Das 
1352ddb5575SBiju Das int32_t rcar_get_certificate(const int32_t name, uint32_t *cert)
1362ddb5575SBiju Das {
1372ddb5575SBiju Das #if TRUSTED_BOARD_BOOT
1382ddb5575SBiju Das 	int32_t i;
1392ddb5575SBiju Das 
1402ddb5575SBiju Das 	for (i = 0; i < ARRAY_SIZE(cert_offset); i++) {
1412ddb5575SBiju Das 		if (name != cert_offset[i].name) {
1422ddb5575SBiju Das 			continue;
1432ddb5575SBiju Das 		}
1442ddb5575SBiju Das 
1452ddb5575SBiju Das 		*cert = RCAR_CERT_SIZE;
1462ddb5575SBiju Das 		*cert *= RCAR_ATTR_GET_CERTOFF(cert_offset[i].attr);
1472ddb5575SBiju Das 		*cert += RCAR_SDRAM_certESS;
1482ddb5575SBiju Das 		return 0;
1492ddb5575SBiju Das 	}
1502ddb5575SBiju Das #endif
1512ddb5575SBiju Das 	return -EINVAL;
1522ddb5575SBiju Das }
1532ddb5575SBiju Das 
154*993d809cSMarek Vasut #define MFISBTSTSR			(0xE6260604U)
155*993d809cSMarek Vasut #define MFISBTSTSR_BOOT_PARTITION	(0x00000010U)
156*993d809cSMarek Vasut 
1572ddb5575SBiju Das static int32_t file_to_offset(const int32_t name, uintptr_t *offset,
1582ddb5575SBiju Das 			      uint32_t *cert, uint32_t *no_load,
1592ddb5575SBiju Das 			      uintptr_t *partition)
1602ddb5575SBiju Das {
1612ddb5575SBiju Das 	uint32_t addr;
1622ddb5575SBiju Das 	int32_t i;
1632ddb5575SBiju Das 
1642ddb5575SBiju Das 	for (i = 0; i < ARRAY_SIZE(name_offset); i++) {
1652ddb5575SBiju Das 		if (name != name_offset[i].name) {
1662ddb5575SBiju Das 			continue;
1672ddb5575SBiju Das 		}
1682ddb5575SBiju Das 
1692ddb5575SBiju Das 		addr = RCAR_ATTR_GET_CALCADDR(name_offset[i].attr);
1702ddb5575SBiju Das 		if (rcar_image_number + 2U < addr) {
1712ddb5575SBiju Das 			continue;
1722ddb5575SBiju Das 		}
1732ddb5575SBiju Das 
1742ddb5575SBiju Das 		*offset = rcar_image_header[addr];
175*993d809cSMarek Vasut 
176*993d809cSMarek Vasut 		if (mmio_read_32(MFISBTSTSR) & MFISBTSTSR_BOOT_PARTITION)
177*993d809cSMarek Vasut 			*offset += 0x800000;
1782ddb5575SBiju Das 		*cert = RCAR_CERT_SIZE;
1792ddb5575SBiju Das 		*cert *= RCAR_ATTR_GET_CERTOFF(name_offset[i].attr);
1802ddb5575SBiju Das 		*cert += RCAR_SDRAM_certESS;
1812ddb5575SBiju Das 		*no_load = RCAR_ATTR_GET_ISNOLOAD(name_offset[i].attr);
1822ddb5575SBiju Das 		*partition = rcar_image_header_prttn[addr];
1832ddb5575SBiju Das 		return IO_SUCCESS;
1842ddb5575SBiju Das 	}
1852ddb5575SBiju Das 
1862ddb5575SBiju Das #if TRUSTED_BOARD_BOOT
1872ddb5575SBiju Das 	for (i = 0; i < ARRAY_SIZE(cert_offset); i++) {
1882ddb5575SBiju Das 		if (name != cert_offset[i].name) {
1892ddb5575SBiju Das 			continue;
1902ddb5575SBiju Das 		}
1912ddb5575SBiju Das 
1922ddb5575SBiju Das 		*no_load = RCAR_ATTR_GET_ISNOLOAD(cert_offset[i].attr);
1932ddb5575SBiju Das 		*partition = 0U;
1942ddb5575SBiju Das 		*offset = 0U;
1952ddb5575SBiju Das 		*cert = 0U;
1962ddb5575SBiju Das 		return IO_SUCCESS;
1972ddb5575SBiju Das 	}
1982ddb5575SBiju Das #endif
1992ddb5575SBiju Das 	return -EINVAL;
2002ddb5575SBiju Das }
2012ddb5575SBiju Das 
2022ddb5575SBiju Das #define RCAR_BOOT_KEY_CERT_NEW	(0xE6300F00U)
2032ddb5575SBiju Das #define	RCAR_CERT_MAGIC_NUM	(0xE291F358U)
2042ddb5575SBiju Das 
2052ddb5575SBiju Das void rcar_read_certificate(uint64_t cert, uint32_t *len, uintptr_t *dst)
2062ddb5575SBiju Das {
2072ddb5575SBiju Das 	uint32_t seed, val, info_1, info_2;
2082ddb5575SBiju Das 	uintptr_t size, dsth, dstl;
2092ddb5575SBiju Das 
2102ddb5575SBiju Das 	cert &= 0xFFFFFFFFU;
2112ddb5575SBiju Das 
2122ddb5575SBiju Das 	seed = mmio_read_32(RCAR_BOOT_KEY_CERT_NEW);
2132ddb5575SBiju Das 	val = mmio_read_32(RCAR_BOOT_KEY_CERT_NEW + 0xC);
2142ddb5575SBiju Das 	info_1 = (val >> 18) & 0x3U;
2152ddb5575SBiju Das 	val = mmio_read_32(cert + 0xC);
2162ddb5575SBiju Das 	info_2 = (val >> 21) & 0x3;
2172ddb5575SBiju Das 
2182ddb5575SBiju Das 	if (seed == RCAR_CERT_MAGIC_NUM) {
2192ddb5575SBiju Das 		if (info_1 != 1) {
2202ddb5575SBiju Das 			ERROR("BL2: Cert is invalid.\n");
2212ddb5575SBiju Das 			*dst = 0;
2222ddb5575SBiju Das 			*len = 0;
2232ddb5575SBiju Das 			return;
2242ddb5575SBiju Das 		}
2252ddb5575SBiju Das 
2262ddb5575SBiju Das 		if (info_2 > 2) {
2272ddb5575SBiju Das 			ERROR("BL2: Cert is invalid.\n");
2282ddb5575SBiju Das 			*dst = 0;
2292ddb5575SBiju Das 			*len = 0;
2302ddb5575SBiju Das 			return;
2312ddb5575SBiju Das 		}
2322ddb5575SBiju Das 
2332ddb5575SBiju Das 		switch (info_2) {
2342ddb5575SBiju Das 		case 2:
2352ddb5575SBiju Das 			size = cert + RCAR_CERT_INFO_SIZE_OFFSET2;
2362ddb5575SBiju Das 			dstl = cert + RCAR_CERT_INFO_DST_OFFSET2;
2372ddb5575SBiju Das 			break;
2382ddb5575SBiju Das 		case 1:
2392ddb5575SBiju Das 			size = cert + RCAR_CERT_INFO_SIZE_OFFSET1;
2402ddb5575SBiju Das 			dstl = cert + RCAR_CERT_INFO_DST_OFFSET1;
2412ddb5575SBiju Das 			break;
2422ddb5575SBiju Das 		case 0:
2432ddb5575SBiju Das 			size = cert + RCAR_CERT_INFO_SIZE_OFFSET;
2442ddb5575SBiju Das 			dstl = cert + RCAR_CERT_INFO_DST_OFFSET;
2452ddb5575SBiju Das 			break;
2462ddb5575SBiju Das 		}
2472ddb5575SBiju Das 
2482ddb5575SBiju Das 		*len = mmio_read_32(size) * 4U;
2492ddb5575SBiju Das 		dsth = dstl + 4U;
2502ddb5575SBiju Das 		*dst = ((uintptr_t) mmio_read_32(dsth) << 32) +
2512ddb5575SBiju Das 		    ((uintptr_t) mmio_read_32(dstl));
2522ddb5575SBiju Das 		return;
2532ddb5575SBiju Das 	}
2542ddb5575SBiju Das 
2552ddb5575SBiju Das 	size = cert + RCAR_CERT_INFO_SIZE_OFFSET;
2562ddb5575SBiju Das 	*len = mmio_read_32(size) * 4U;
2572ddb5575SBiju Das 	dstl = cert + RCAR_CERT_INFO_DST_OFFSET;
2582ddb5575SBiju Das 	dsth = dstl + 4U;
2592ddb5575SBiju Das 	*dst = ((uintptr_t) mmio_read_32(dsth) << 32) +
2602ddb5575SBiju Das 	    ((uintptr_t) mmio_read_32(dstl));
2612ddb5575SBiju Das }
2622ddb5575SBiju Das 
2632ddb5575SBiju Das static int32_t check_load_area(uintptr_t dst, uintptr_t len)
2642ddb5575SBiju Das {
2652ddb5575SBiju Das 	uint32_t legacy = dst + len <= UINT32_MAX - 1 ? 1 : 0;
2662ddb5575SBiju Das 	uintptr_t dram_start, dram_end;
2672ddb5575SBiju Das 	uintptr_t prot_start, prot_end;
2682ddb5575SBiju Das 	int32_t result = IO_SUCCESS;
2692ddb5575SBiju Das 
2702ddb5575SBiju Das 	dram_start = legacy ? DRAM1_BASE : DRAM_40BIT_BASE;
2712ddb5575SBiju Das 
2722ddb5575SBiju Das 	dram_end = legacy ? DRAM1_BASE + DRAM1_SIZE :
2732ddb5575SBiju Das 	    DRAM_40BIT_BASE + DRAM_40BIT_SIZE;
2742ddb5575SBiju Das 
2752ddb5575SBiju Das 	prot_start = legacy ? DRAM_PROTECTED_BASE : DRAM_40BIT_PROTECTED_BASE;
2762ddb5575SBiju Das 
2772ddb5575SBiju Das 	prot_end = prot_start + DRAM_PROTECTED_SIZE;
2782ddb5575SBiju Das 
2792ddb5575SBiju Das 	if (dst < dram_start || dst > dram_end - len) {
2802ddb5575SBiju Das 		ERROR("BL2: dst address is on the protected area.\n");
2812ddb5575SBiju Das 		result = IO_FAIL;
2822ddb5575SBiju Das 		goto done;
2832ddb5575SBiju Das 	}
2842ddb5575SBiju Das 
2852ddb5575SBiju Das 	/* load image is within SDRAM protected area */
2862ddb5575SBiju Das 	if (dst >= prot_start && dst < prot_end) {
2872ddb5575SBiju Das 		ERROR("BL2: dst address is on the protected area.\n");
2882ddb5575SBiju Das 		result = IO_FAIL;
2892ddb5575SBiju Das 	}
2902ddb5575SBiju Das 
2912ddb5575SBiju Das 	if (dst < prot_start && dst > prot_start - len) {
2922ddb5575SBiju Das 		ERROR("BL2: loaded data is on the protected area.\n");
2932ddb5575SBiju Das 		result = IO_FAIL;
2942ddb5575SBiju Das 	}
2952ddb5575SBiju Das done:
2962ddb5575SBiju Das 	if (result == IO_FAIL) {
2972ddb5575SBiju Das 		ERROR("BL2: Out of range : dst=0x%lx len=0x%lx\n", dst, len);
2982ddb5575SBiju Das 	}
2992ddb5575SBiju Das 
3002ddb5575SBiju Das 	return result;
3012ddb5575SBiju Das }
3022ddb5575SBiju Das 
3032ddb5575SBiju Das static int32_t load_bl33x(void)
3042ddb5575SBiju Das {
3052ddb5575SBiju Das 	static int32_t loaded = IO_NOT_SUPPORTED;
3062ddb5575SBiju Das 	uintptr_t dst, partition, handle;
3072ddb5575SBiju Das 	uint32_t noload, cert, len, i;
3082ddb5575SBiju Das 	uintptr_t offset;
3092ddb5575SBiju Das 	int32_t rc;
3102ddb5575SBiju Das 	size_t cnt;
3112ddb5575SBiju Das 	const int32_t img[] = {
3122ddb5575SBiju Das 		BL33_IMAGE_ID,
3132ddb5575SBiju Das 		BL332_IMAGE_ID,
3142ddb5575SBiju Das 		BL333_IMAGE_ID,
3152ddb5575SBiju Das 		BL334_IMAGE_ID,
3162ddb5575SBiju Das 		BL335_IMAGE_ID,
3172ddb5575SBiju Das 		BL336_IMAGE_ID,
3182ddb5575SBiju Das 		BL337_IMAGE_ID,
3192ddb5575SBiju Das 		BL338_IMAGE_ID
3202ddb5575SBiju Das 	};
3212ddb5575SBiju Das 
3222ddb5575SBiju Das 	if (loaded != IO_NOT_SUPPORTED) {
3232ddb5575SBiju Das 		return loaded;
3242ddb5575SBiju Das 	}
3252ddb5575SBiju Das 
3262ddb5575SBiju Das 	for (i = 1; i < rcar_image_number; i++) {
3272ddb5575SBiju Das 		rc = file_to_offset(img[i], &offset, &cert, &noload,
3282ddb5575SBiju Das 				    &partition);
3292ddb5575SBiju Das 		if (rc != IO_SUCCESS) {
3302ddb5575SBiju Das 			WARN("%s: failed to get offset\n", __func__);
3312ddb5575SBiju Das 			loaded = IO_FAIL;
3322ddb5575SBiju Das 			return loaded;
3332ddb5575SBiju Das 		}
3342ddb5575SBiju Das 
3352ddb5575SBiju Das 		rcar_read_certificate((uint64_t) cert, &len, &dst);
3362ddb5575SBiju Das 		((io_drv_spec_t *) rcar_spec)->partition = partition;
3372ddb5575SBiju Das 
3382ddb5575SBiju Das 		rc = io_open(rcar_handle, rcar_spec, &handle);
3392ddb5575SBiju Das 		if (rc != IO_SUCCESS) {
3402ddb5575SBiju Das 			WARN("%s: Failed to open FIP (%i)\n", __func__, rc);
3412ddb5575SBiju Das 			loaded = IO_FAIL;
3422ddb5575SBiju Das 			return loaded;
3432ddb5575SBiju Das 		}
3442ddb5575SBiju Das 
3452ddb5575SBiju Das 		rc = io_seek(handle, IO_SEEK_SET, offset);
3462ddb5575SBiju Das 		if (rc != IO_SUCCESS) {
3472ddb5575SBiju Das 			WARN("%s: failed to seek\n", __func__);
3482ddb5575SBiju Das 			loaded = IO_FAIL;
3492ddb5575SBiju Das 			return loaded;
3502ddb5575SBiju Das 		}
3512ddb5575SBiju Das 
3522ddb5575SBiju Das 		rc = check_load_area(dst, len);
3532ddb5575SBiju Das 		if (rc != IO_SUCCESS) {
3542ddb5575SBiju Das 			WARN("%s: check load area\n", __func__);
3552ddb5575SBiju Das 			loaded = IO_FAIL;
3562ddb5575SBiju Das 			return loaded;
3572ddb5575SBiju Das 		}
3582ddb5575SBiju Das 
3592ddb5575SBiju Das 		rc = io_read(handle, dst, len, &cnt);
3602ddb5575SBiju Das 		if (rc != IO_SUCCESS) {
3612ddb5575SBiju Das 			WARN("%s: failed to read\n", __func__);
3622ddb5575SBiju Das 			loaded = IO_FAIL;
3632ddb5575SBiju Das 			return loaded;
3642ddb5575SBiju Das 		}
3652ddb5575SBiju Das #if TRUSTED_BOARD_BOOT
3662ddb5575SBiju Das 		rc = auth_mod_verify_img(img[i], (void *)dst, len);
3672ddb5575SBiju Das 		if (rc != 0) {
3682ddb5575SBiju Das 			memset((void *)dst, 0x00, len);
3692ddb5575SBiju Das 			loaded = IO_FAIL;
3702ddb5575SBiju Das 			return loaded;
3712ddb5575SBiju Das 		}
3722ddb5575SBiju Das #endif
3732ddb5575SBiju Das 		io_close(handle);
3742ddb5575SBiju Das 	}
3752ddb5575SBiju Das 
3762ddb5575SBiju Das 	loaded = IO_SUCCESS;
3772ddb5575SBiju Das 
3782ddb5575SBiju Das 	return loaded;
3792ddb5575SBiju Das }
3802ddb5575SBiju Das 
3812ddb5575SBiju Das static int32_t rcar_dev_init(io_dev_info_t *dev_info, const uintptr_t name)
3822ddb5575SBiju Das {
3832ddb5575SBiju Das 	uint64_t header[64] __aligned(FLASH_TRANS_SIZE_UNIT) = {0UL};
3842ddb5575SBiju Das 	uintptr_t handle;
3852ddb5575SBiju Das 	ssize_t offset;
3862ddb5575SBiju Das 	uint32_t i;
3872ddb5575SBiju Das 	int32_t rc;
3882ddb5575SBiju Das 	size_t cnt;
3892ddb5575SBiju Das 
3902ddb5575SBiju Das 	/* Obtain a reference to the image by querying the platform layer */
3912ddb5575SBiju Das 	rc = plat_get_drv_source(name, &rcar_handle, &rcar_spec);
3922ddb5575SBiju Das 	if (rc != IO_SUCCESS) {
3932ddb5575SBiju Das 		WARN("Failed to obtain reference to img %ld (%i)\n", name, rc);
3942ddb5575SBiju Das 		return IO_FAIL;
3952ddb5575SBiju Das 	}
3962ddb5575SBiju Das 
3972ddb5575SBiju Das 	if (rcar_cert_load == RCAR_CERT_LOAD) {
3982ddb5575SBiju Das 		return IO_SUCCESS;
3992ddb5575SBiju Das 	}
4002ddb5575SBiju Das 
4012ddb5575SBiju Das 	rc = io_open(rcar_handle, rcar_spec, &handle);
4022ddb5575SBiju Das 	if (rc != IO_SUCCESS) {
4032ddb5575SBiju Das 		WARN("Failed to access img %ld (%i)\n", name, rc);
4042ddb5575SBiju Das 		return IO_FAIL;
4052ddb5575SBiju Das 	}
4062ddb5575SBiju Das 
4072ddb5575SBiju Das 	/*
4082ddb5575SBiju Das 	 * get start address list
4092ddb5575SBiju Das 	 * [0] address num
4102ddb5575SBiju Das 	 * [1] BL33-1 image address
4112ddb5575SBiju Das 	 * [2] BL33-2 image address
4122ddb5575SBiju Das 	 * [3] BL33-3 image address
4132ddb5575SBiju Das 	 * [4] BL33-4 image address
4142ddb5575SBiju Das 	 * [5] BL33-5 image address
4152ddb5575SBiju Das 	 * [6] BL33-6 image address
4162ddb5575SBiju Das 	 * [7] BL33-7 image address
4172ddb5575SBiju Das 	 * [8] BL33-8 image address
4182ddb5575SBiju Das 	 */
4192ddb5575SBiju Das 	offset = name == EMMC_DEV_ID ? RCAR_EMMC_CERT_HEADER :
4202ddb5575SBiju Das 	    RCAR_FLASH_CERT_HEADER;
4212ddb5575SBiju Das 	rc = io_seek(handle, IO_SEEK_SET, offset);
4222ddb5575SBiju Das 	if (rc != IO_SUCCESS) {
4232ddb5575SBiju Das 		WARN("Firmware Image Package header failed to seek\n");
4242ddb5575SBiju Das 		goto error;
4252ddb5575SBiju Das 	}
4262ddb5575SBiju Das #if RCAR_BL2_DCACHE == 1
4272ddb5575SBiju Das 	inv_dcache_range((uint64_t) header, sizeof(header));
4282ddb5575SBiju Das #endif
4292ddb5575SBiju Das 	rc = io_read(handle, (uintptr_t) &header, sizeof(header), &cnt);
4302ddb5575SBiju Das 	if (rc != IO_SUCCESS) {
4312ddb5575SBiju Das 		WARN("Firmware Image Package header failed to read\n");
4322ddb5575SBiju Das 		goto error;
4332ddb5575SBiju Das 	}
4342ddb5575SBiju Das 
4352ddb5575SBiju Das 	rcar_image_number = header[0];
4362ddb5575SBiju Das 	for (i = 0; i < rcar_image_number + 2; i++) {
4372ddb5575SBiju Das 		rcar_image_header[i] = header[i * 2 + 1];
4382ddb5575SBiju Das 		rcar_image_header_prttn[i] = header[i * 2 + 2];
4392ddb5575SBiju Das 	}
4402ddb5575SBiju Das 
4412ddb5575SBiju Das 	if (rcar_image_number == 0 || rcar_image_number > RCAR_MAX_BL3X_IMAGE) {
4422ddb5575SBiju Das 		WARN("Firmware Image Package header check failed.\n");
4432ddb5575SBiju Das 		goto error;
4442ddb5575SBiju Das 	}
4452ddb5575SBiju Das 
4462ddb5575SBiju Das 	rc = io_seek(handle, IO_SEEK_SET, offset + RCAR_SECTOR6_CERT_OFFSET);
4472ddb5575SBiju Das 	if (rc != IO_SUCCESS) {
4482ddb5575SBiju Das 		WARN("Firmware Image Package header failed to seek cert\n");
4492ddb5575SBiju Das 		goto error;
4502ddb5575SBiju Das 	}
4512ddb5575SBiju Das #if RCAR_BL2_DCACHE == 1
4522ddb5575SBiju Das 	inv_dcache_range(RCAR_SDRAM_certESS,
4532ddb5575SBiju Das 			 RCAR_CERT_SIZE * (2 + rcar_image_number));
4542ddb5575SBiju Das #endif
4552ddb5575SBiju Das 	rc = io_read(handle, RCAR_SDRAM_certESS,
4562ddb5575SBiju Das 		     RCAR_CERT_SIZE * (2 + rcar_image_number), &cnt);
4572ddb5575SBiju Das 	if (rc != IO_SUCCESS) {
4582ddb5575SBiju Das 		WARN("cert file read error.\n");
4592ddb5575SBiju Das 		goto error;
4602ddb5575SBiju Das 	}
4612ddb5575SBiju Das 
4622ddb5575SBiju Das 	rcar_cert_load = RCAR_CERT_LOAD;
4632ddb5575SBiju Das error:
4642ddb5575SBiju Das 
4652ddb5575SBiju Das 	if (rc != IO_SUCCESS) {
4662ddb5575SBiju Das 		rc = IO_FAIL;
4672ddb5575SBiju Das 	}
4682ddb5575SBiju Das 
4692ddb5575SBiju Das 	io_close(handle);
4702ddb5575SBiju Das 
4712ddb5575SBiju Das 	return rc;
4722ddb5575SBiju Das 
4732ddb5575SBiju Das }
4742ddb5575SBiju Das 
4752ddb5575SBiju Das static int32_t rcar_file_open(io_dev_info_t *info, const uintptr_t file_spec,
4762ddb5575SBiju Das 			      io_entity_t *entity)
4772ddb5575SBiju Das {
4782ddb5575SBiju Das 	const io_drv_spec_t *spec = (io_drv_spec_t *) file_spec;
4792ddb5575SBiju Das 	uintptr_t partition, offset, dst;
4802ddb5575SBiju Das 	uint32_t noload, cert, len;
4812ddb5575SBiju Das 	int32_t rc;
4822ddb5575SBiju Das 
4832ddb5575SBiju Das 	/*
4842ddb5575SBiju Das 	 * Only one file open at a time. We need to  track state (ie, file
4852ddb5575SBiju Das 	 * cursor position). Since the header lives at offset zero, this entry
4862ddb5575SBiju Das 	 * should never be zero in an active file.
4872ddb5575SBiju Das 	 * Once the system supports dynamic memory allocation we will allow more
4882ddb5575SBiju Das 	 * than one open file at a time.
4892ddb5575SBiju Das 	 */
4902ddb5575SBiju Das 	if (current_file.offset != 0U) {
4912ddb5575SBiju Das 		WARN("%s: Only one open file at a time.\n", __func__);
4922ddb5575SBiju Das 		return IO_RESOURCES_EXHAUSTED;
4932ddb5575SBiju Das 	}
4942ddb5575SBiju Das 
4952ddb5575SBiju Das 	rc = file_to_offset(spec->offset, &offset, &cert, &noload, &partition);
4962ddb5575SBiju Das 	if (rc != IO_SUCCESS) {
4972ddb5575SBiju Das 		WARN("Failed to open file name %ld (%i)\n", spec->offset, rc);
4982ddb5575SBiju Das 		return IO_FAIL;
4992ddb5575SBiju Das 	}
5002ddb5575SBiju Das 
5012ddb5575SBiju Das 	if (noload != 0U) {
5022ddb5575SBiju Das 		current_file.offset = 1;
5032ddb5575SBiju Das 		current_file.dst = 0;
5042ddb5575SBiju Das 		current_file.size = 1;
5052ddb5575SBiju Das 		current_file.position = 0;
5062ddb5575SBiju Das 		current_file.no_load = noload;
5072ddb5575SBiju Das 		current_file.partition = 0;
5082ddb5575SBiju Das 		entity->info = (uintptr_t) &current_file;
5092ddb5575SBiju Das 
5102ddb5575SBiju Das 		return IO_SUCCESS;
5112ddb5575SBiju Das 	}
5122ddb5575SBiju Das 
5132ddb5575SBiju Das 	rcar_read_certificate((uint64_t) cert, &len, &dst);
5142ddb5575SBiju Das 
5152ddb5575SBiju Das 	/* Baylibre: HACK */
5162ddb5575SBiju Das 	if (spec->offset == BL31_IMAGE_ID && len < RCAR_TRUSTED_SRAM_SIZE) {
5172ddb5575SBiju Das 		WARN("%s,%s\n", "r-car ignoring the BL31 size from certificate",
5182ddb5575SBiju Das 		     "using RCAR_TRUSTED_SRAM_SIZE instead");
5192ddb5575SBiju Das 		len = RCAR_TRUSTED_SRAM_SIZE;
5202ddb5575SBiju Das 	}
5212ddb5575SBiju Das 
5222ddb5575SBiju Das 	current_file.partition = partition;
5232ddb5575SBiju Das 	current_file.no_load = noload;
5242ddb5575SBiju Das 	current_file.offset = offset;
5252ddb5575SBiju Das 	current_file.position = 0;
5262ddb5575SBiju Das 	current_file.size = len;
5272ddb5575SBiju Das 	current_file.dst = dst;
5282ddb5575SBiju Das 	entity->info = (uintptr_t) &current_file;
5292ddb5575SBiju Das 
5302ddb5575SBiju Das 	return IO_SUCCESS;
5312ddb5575SBiju Das }
5322ddb5575SBiju Das 
5332ddb5575SBiju Das static int32_t rcar_file_len(io_entity_t *entity, size_t *length)
5342ddb5575SBiju Das {
5352ddb5575SBiju Das 	*length = ((file_state_t *) entity->info)->size;
5362ddb5575SBiju Das 
5372ddb5575SBiju Das 	NOTICE("%s: len: 0x%08lx\n", __func__, *length);
5382ddb5575SBiju Das 
5392ddb5575SBiju Das 	return IO_SUCCESS;
5402ddb5575SBiju Das }
5412ddb5575SBiju Das 
5422ddb5575SBiju Das static int32_t rcar_file_read(io_entity_t *entity, uintptr_t buffer,
5432ddb5575SBiju Das 			      size_t length, size_t *cnt)
5442ddb5575SBiju Das {
5452ddb5575SBiju Das 	file_state_t *fp = (file_state_t *) entity->info;
5462ddb5575SBiju Das 	ssize_t offset = fp->offset + fp->position;
5472ddb5575SBiju Das 	uintptr_t handle;
5482ddb5575SBiju Das 	int32_t rc;
5492ddb5575SBiju Das 
5502ddb5575SBiju Das #ifdef SPD_NONE
5512ddb5575SBiju Das 	static uint32_t load_bl33x_counter = 1;
5522ddb5575SBiju Das #else
5532ddb5575SBiju Das 	static uint32_t load_bl33x_counter;
5542ddb5575SBiju Das #endif
5552ddb5575SBiju Das 	if (current_file.no_load != 0U) {
5562ddb5575SBiju Das 		*cnt = length;
5572ddb5575SBiju Das 		return IO_SUCCESS;
5582ddb5575SBiju Das 	}
5592ddb5575SBiju Das 
5602ddb5575SBiju Das 	((io_drv_spec_t *) rcar_spec)->partition = fp->partition;
5612ddb5575SBiju Das 
5622ddb5575SBiju Das 	rc = io_open(rcar_handle, rcar_spec, &handle);
5632ddb5575SBiju Das 	if (rc != IO_SUCCESS) {
5642ddb5575SBiju Das 		WARN("Failed to open FIP (%i)\n", rc);
5652ddb5575SBiju Das 		return IO_FAIL;
5662ddb5575SBiju Das 	}
5672ddb5575SBiju Das 
5682ddb5575SBiju Das 	rc = io_seek(handle, IO_SEEK_SET, offset);
5692ddb5575SBiju Das 	if (rc != IO_SUCCESS) {
5702ddb5575SBiju Das 		WARN("%s: failed to seek\n", __func__);
5712ddb5575SBiju Das 		goto error;
5722ddb5575SBiju Das 	}
5732ddb5575SBiju Das 
5742ddb5575SBiju Das 	if (load_bl33x_counter == RCAR_COUNT_LOAD_BL33) {
5752ddb5575SBiju Das 		rc = check_load_area(buffer, length);
5762ddb5575SBiju Das 		if (rc != IO_SUCCESS) {
5772ddb5575SBiju Das 			WARN("%s: load area err\n", __func__);
5782ddb5575SBiju Das 			goto error;
5792ddb5575SBiju Das 		}
5802ddb5575SBiju Das 	}
5812ddb5575SBiju Das 
5822ddb5575SBiju Das 	rc = io_read(handle, buffer, length, cnt);
5832ddb5575SBiju Das 	if (rc != IO_SUCCESS) {
5842ddb5575SBiju Das 		WARN("Failed to read payload (%i)\n", rc);
5852ddb5575SBiju Das 		goto error;
5862ddb5575SBiju Das 	}
5872ddb5575SBiju Das 
5882ddb5575SBiju Das 	fp->position += *cnt;
5892ddb5575SBiju Das 	io_close(handle);
5902ddb5575SBiju Das 
5912ddb5575SBiju Das 	load_bl33x_counter += 1;
5922ddb5575SBiju Das 	if (load_bl33x_counter == RCAR_COUNT_LOAD_BL33X) {
5932ddb5575SBiju Das 		return load_bl33x();
5942ddb5575SBiju Das 	}
5952ddb5575SBiju Das 
5962ddb5575SBiju Das 	return IO_SUCCESS;
5972ddb5575SBiju Das error:
5982ddb5575SBiju Das 	io_close(handle);
5992ddb5575SBiju Das 	return IO_FAIL;
6002ddb5575SBiju Das }
6012ddb5575SBiju Das 
6022ddb5575SBiju Das static int32_t rcar_file_close(io_entity_t *entity)
6032ddb5575SBiju Das {
6042ddb5575SBiju Das 	if (current_file.offset != 0U) {
6052ddb5575SBiju Das 		memset(&current_file, 0, sizeof(current_file));
6062ddb5575SBiju Das 	}
6072ddb5575SBiju Das 
6082ddb5575SBiju Das 	entity->info = 0U;
6092ddb5575SBiju Das 
6102ddb5575SBiju Das 	return IO_SUCCESS;
6112ddb5575SBiju Das }
6122ddb5575SBiju Das 
6132ddb5575SBiju Das static const io_dev_funcs_t rcar_dev_funcs = {
6142ddb5575SBiju Das 	.type = &device_type_rcar,
6152ddb5575SBiju Das 	.open = &rcar_file_open,
6162ddb5575SBiju Das 	.seek = NULL,
6172ddb5575SBiju Das 	.size = &rcar_file_len,
6182ddb5575SBiju Das 	.read = &rcar_file_read,
6192ddb5575SBiju Das 	.write = NULL,
6202ddb5575SBiju Das 	.close = &rcar_file_close,
6212ddb5575SBiju Das 	.dev_init = &rcar_dev_init,
6222ddb5575SBiju Das 	.dev_close = &rcar_dev_close,
6232ddb5575SBiju Das };
6242ddb5575SBiju Das 
6252ddb5575SBiju Das static const io_dev_info_t rcar_dev_info = {
6262ddb5575SBiju Das 	.funcs = &rcar_dev_funcs,
6272ddb5575SBiju Das 	.info = (uintptr_t) 0
6282ddb5575SBiju Das };
6292ddb5575SBiju Das 
6302ddb5575SBiju Das static const io_dev_connector_t rcar_dev_connector = {
6312ddb5575SBiju Das 	.dev_open = &rcar_dev_open
6322ddb5575SBiju Das };
6332ddb5575SBiju Das 
6342ddb5575SBiju Das static int32_t rcar_dev_open(const uintptr_t dev_spec __attribute__ ((unused)),
6352ddb5575SBiju Das 			     io_dev_info_t **dev_info)
6362ddb5575SBiju Das {
6372ddb5575SBiju Das 	*dev_info = (io_dev_info_t *) &rcar_dev_info;
6382ddb5575SBiju Das 
6392ddb5575SBiju Das 	return IO_SUCCESS;
6402ddb5575SBiju Das }
6412ddb5575SBiju Das 
6422ddb5575SBiju Das static int32_t rcar_dev_close(io_dev_info_t *dev_info)
6432ddb5575SBiju Das {
6442ddb5575SBiju Das 	rcar_handle = 0;
6452ddb5575SBiju Das 	rcar_spec = 0;
6462ddb5575SBiju Das 
6472ddb5575SBiju Das 	return IO_SUCCESS;
6482ddb5575SBiju Das }
6492ddb5575SBiju Das 
6502ddb5575SBiju Das int32_t rcar_register_io_dev(const io_dev_connector_t **dev_con)
6512ddb5575SBiju Das {
6522ddb5575SBiju Das 	int32_t result;
6532ddb5575SBiju Das 
6542ddb5575SBiju Das 	result = io_register_device(&rcar_dev_info);
6552ddb5575SBiju Das 	if (result == IO_SUCCESS) {
6562ddb5575SBiju Das 		*dev_con = &rcar_dev_connector;
6572ddb5575SBiju Das 	}
6582ddb5575SBiju Das 
6592ddb5575SBiju Das 	return result;
6602ddb5575SBiju Das }
661