108b167e9SHaojian Zhuang /* 2a628b1abSHaojian Zhuang * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved. 308b167e9SHaojian Zhuang * 408b167e9SHaojian Zhuang * SPDX-License-Identifier: BSD-3-Clause 508b167e9SHaojian Zhuang */ 608b167e9SHaojian Zhuang 708b167e9SHaojian Zhuang #include <arch_helpers.h> 808b167e9SHaojian Zhuang #include <assert.h> 908b167e9SHaojian Zhuang #include <bl_common.h> 1008b167e9SHaojian Zhuang #include <console.h> 1108b167e9SHaojian Zhuang #include <debug.h> 1208b167e9SHaojian Zhuang #include <dw_mmc.h> 1308b167e9SHaojian Zhuang #include <emmc.h> 1408b167e9SHaojian Zhuang #include <errno.h> 1508b167e9SHaojian Zhuang #include <hi6220.h> 16*4368ae07SMichael Brandl #include <hikey_def.h> 17*4368ae07SMichael Brandl #include <hikey_layout.h> 1808b167e9SHaojian Zhuang #include <mmio.h> 1908b167e9SHaojian Zhuang #include <platform.h> 2008b167e9SHaojian Zhuang #include <string.h> 2108b167e9SHaojian Zhuang #include <tbbr/tbbr_img_desc.h> 2208b167e9SHaojian Zhuang 2308b167e9SHaojian Zhuang #include "../../bl1/bl1_private.h" 2408b167e9SHaojian Zhuang #include "hikey_private.h" 2508b167e9SHaojian Zhuang 2608b167e9SHaojian Zhuang /* 2708b167e9SHaojian Zhuang * Declarations of linker defined symbols which will help us find the layout 2808b167e9SHaojian Zhuang * of trusted RAM 2908b167e9SHaojian Zhuang */ 3008b167e9SHaojian Zhuang extern unsigned long __COHERENT_RAM_START__; 3108b167e9SHaojian Zhuang extern unsigned long __COHERENT_RAM_END__; 3208b167e9SHaojian Zhuang 3308b167e9SHaojian Zhuang /* 3408b167e9SHaojian Zhuang * The next 2 constants identify the extents of the coherent memory region. 3508b167e9SHaojian Zhuang * These addresses are used by the MMU setup code and therefore they must be 3608b167e9SHaojian Zhuang * page-aligned. It is the responsibility of the linker script to ensure that 3708b167e9SHaojian Zhuang * __COHERENT_RAM_START__ and __COHERENT_RAM_END__ linker symbols refer to 3808b167e9SHaojian Zhuang * page-aligned addresses. 3908b167e9SHaojian Zhuang */ 4008b167e9SHaojian Zhuang #define BL1_COHERENT_RAM_BASE (unsigned long)(&__COHERENT_RAM_START__) 4108b167e9SHaojian Zhuang #define BL1_COHERENT_RAM_LIMIT (unsigned long)(&__COHERENT_RAM_END__) 4208b167e9SHaojian Zhuang 4308b167e9SHaojian Zhuang /* Data structure which holds the extents of the trusted RAM for BL1 */ 4408b167e9SHaojian Zhuang static meminfo_t bl1_tzram_layout; 4508b167e9SHaojian Zhuang 4608b167e9SHaojian Zhuang enum { 4708b167e9SHaojian Zhuang BOOT_NORMAL = 0, 4808b167e9SHaojian Zhuang BOOT_USB_DOWNLOAD, 4908b167e9SHaojian Zhuang BOOT_UART_DOWNLOAD, 5008b167e9SHaojian Zhuang }; 5108b167e9SHaojian Zhuang 5208b167e9SHaojian Zhuang meminfo_t *bl1_plat_sec_mem_layout(void) 5308b167e9SHaojian Zhuang { 5408b167e9SHaojian Zhuang return &bl1_tzram_layout; 5508b167e9SHaojian Zhuang } 5608b167e9SHaojian Zhuang 572de0c5ccSVictor Chong /******************************************************************************* 582de0c5ccSVictor Chong * Function that takes a memory layout into which BL2 has been loaded and 592de0c5ccSVictor Chong * populates a new memory layout for BL2 that ensures that BL1's data sections 602de0c5ccSVictor Chong * resident in secure RAM are not visible to BL2. 612de0c5ccSVictor Chong ******************************************************************************/ 622de0c5ccSVictor Chong void bl1_init_bl2_mem_layout(const meminfo_t *bl1_mem_layout, 632de0c5ccSVictor Chong meminfo_t *bl2_mem_layout) 642de0c5ccSVictor Chong { 652de0c5ccSVictor Chong 662de0c5ccSVictor Chong assert(bl1_mem_layout != NULL); 672de0c5ccSVictor Chong assert(bl2_mem_layout != NULL); 682de0c5ccSVictor Chong 692de0c5ccSVictor Chong /* 702de0c5ccSVictor Chong * Cannot remove BL1 RW data from the scope of memory visible to BL2 712de0c5ccSVictor Chong * like arm platforms because they overlap in hikey 722de0c5ccSVictor Chong */ 732de0c5ccSVictor Chong bl2_mem_layout->total_base = BL2_BASE; 742de0c5ccSVictor Chong bl2_mem_layout->total_size = BL32_SRAM_LIMIT - BL2_BASE; 752de0c5ccSVictor Chong 762de0c5ccSVictor Chong flush_dcache_range((unsigned long)bl2_mem_layout, sizeof(meminfo_t)); 772de0c5ccSVictor Chong } 782de0c5ccSVictor Chong 7908b167e9SHaojian Zhuang /* 8008b167e9SHaojian Zhuang * Perform any BL1 specific platform actions. 8108b167e9SHaojian Zhuang */ 8208b167e9SHaojian Zhuang void bl1_early_platform_setup(void) 8308b167e9SHaojian Zhuang { 8408b167e9SHaojian Zhuang /* Initialize the console to provide early debug support */ 8508b167e9SHaojian Zhuang console_init(CONSOLE_BASE, PL011_UART_CLK_IN_HZ, PL011_BAUDRATE); 8608b167e9SHaojian Zhuang 8708b167e9SHaojian Zhuang /* Allow BL1 to see the whole Trusted RAM */ 8808b167e9SHaojian Zhuang bl1_tzram_layout.total_base = BL1_RW_BASE; 8908b167e9SHaojian Zhuang bl1_tzram_layout.total_size = BL1_RW_SIZE; 9008b167e9SHaojian Zhuang 9108b167e9SHaojian Zhuang INFO("BL1: 0x%lx - 0x%lx [size = %lu]\n", BL1_RAM_BASE, BL1_RAM_LIMIT, 922de0c5ccSVictor Chong BL1_RAM_LIMIT - BL1_RAM_BASE); /* bl1_size */ 9308b167e9SHaojian Zhuang } 9408b167e9SHaojian Zhuang 9508b167e9SHaojian Zhuang /* 9608b167e9SHaojian Zhuang * Perform the very early platform specific architecture setup here. At the 9708b167e9SHaojian Zhuang * moment this only does basic initialization. Later architectural setup 9808b167e9SHaojian Zhuang * (bl1_arch_setup()) does not do anything platform specific. 9908b167e9SHaojian Zhuang */ 10008b167e9SHaojian Zhuang void bl1_plat_arch_setup(void) 10108b167e9SHaojian Zhuang { 10208b167e9SHaojian Zhuang hikey_init_mmu_el3(bl1_tzram_layout.total_base, 10308b167e9SHaojian Zhuang bl1_tzram_layout.total_size, 10408b167e9SHaojian Zhuang BL1_RO_BASE, 10508b167e9SHaojian Zhuang BL1_RO_LIMIT, 10608b167e9SHaojian Zhuang BL1_COHERENT_RAM_BASE, 10708b167e9SHaojian Zhuang BL1_COHERENT_RAM_LIMIT); 10808b167e9SHaojian Zhuang } 10908b167e9SHaojian Zhuang 11008b167e9SHaojian Zhuang /* 11108b167e9SHaojian Zhuang * Function which will perform any remaining platform-specific setup that can 11208b167e9SHaojian Zhuang * occur after the MMU and data cache have been enabled. 11308b167e9SHaojian Zhuang */ 11408b167e9SHaojian Zhuang void bl1_platform_setup(void) 11508b167e9SHaojian Zhuang { 11608b167e9SHaojian Zhuang dw_mmc_params_t params; 11708b167e9SHaojian Zhuang 11808b167e9SHaojian Zhuang assert((HIKEY_BL1_MMC_DESC_BASE >= SRAM_BASE) && 11908b167e9SHaojian Zhuang ((SRAM_BASE + SRAM_SIZE) >= 12008b167e9SHaojian Zhuang (HIKEY_BL1_MMC_DATA_BASE + HIKEY_BL1_MMC_DATA_SIZE))); 12108b167e9SHaojian Zhuang hikey_sp804_init(); 12208b167e9SHaojian Zhuang hikey_gpio_init(); 12308b167e9SHaojian Zhuang hikey_pmussi_init(); 12408b167e9SHaojian Zhuang hikey_hi6553_init(); 12508b167e9SHaojian Zhuang 126454748fcSHaojian Zhuang hikey_rtc_init(); 127454748fcSHaojian Zhuang 12808b167e9SHaojian Zhuang hikey_mmc_pll_init(); 12908b167e9SHaojian Zhuang 13008b167e9SHaojian Zhuang memset(¶ms, 0, sizeof(dw_mmc_params_t)); 13108b167e9SHaojian Zhuang params.reg_base = DWMMC0_BASE; 13208b167e9SHaojian Zhuang params.desc_base = HIKEY_BL1_MMC_DESC_BASE; 13308b167e9SHaojian Zhuang params.desc_size = 1 << 20; 13408b167e9SHaojian Zhuang params.clk_rate = 24 * 1000 * 1000; 13508b167e9SHaojian Zhuang params.bus_width = EMMC_BUS_WIDTH_8; 13608b167e9SHaojian Zhuang params.flags = EMMC_FLAG_CMD23; 13708b167e9SHaojian Zhuang dw_mmc_init(¶ms); 13808b167e9SHaojian Zhuang 13908b167e9SHaojian Zhuang hikey_io_setup(); 14008b167e9SHaojian Zhuang } 14108b167e9SHaojian Zhuang 14208b167e9SHaojian Zhuang /* 14308b167e9SHaojian Zhuang * The following function checks if Firmware update is needed, 14408b167e9SHaojian Zhuang * by checking if TOC in FIP image is valid or not. 14508b167e9SHaojian Zhuang */ 14608b167e9SHaojian Zhuang unsigned int bl1_plat_get_next_image_id(void) 14708b167e9SHaojian Zhuang { 14808b167e9SHaojian Zhuang int32_t boot_mode; 14908b167e9SHaojian Zhuang unsigned int ret; 15008b167e9SHaojian Zhuang 15108b167e9SHaojian Zhuang boot_mode = mmio_read_32(ONCHIPROM_PARAM_BASE); 15208b167e9SHaojian Zhuang switch (boot_mode) { 15308b167e9SHaojian Zhuang case BOOT_USB_DOWNLOAD: 15408b167e9SHaojian Zhuang case BOOT_UART_DOWNLOAD: 15508b167e9SHaojian Zhuang ret = NS_BL1U_IMAGE_ID; 15608b167e9SHaojian Zhuang break; 15708b167e9SHaojian Zhuang default: 15808b167e9SHaojian Zhuang WARN("Invalid boot mode is found:%d\n", boot_mode); 15908b167e9SHaojian Zhuang panic(); 16008b167e9SHaojian Zhuang } 16108b167e9SHaojian Zhuang return ret; 16208b167e9SHaojian Zhuang } 16308b167e9SHaojian Zhuang 16408b167e9SHaojian Zhuang image_desc_t *bl1_plat_get_image_desc(unsigned int image_id) 16508b167e9SHaojian Zhuang { 16608b167e9SHaojian Zhuang unsigned int index = 0; 16708b167e9SHaojian Zhuang 16808b167e9SHaojian Zhuang while (bl1_tbbr_image_descs[index].image_id != INVALID_IMAGE_ID) { 16908b167e9SHaojian Zhuang if (bl1_tbbr_image_descs[index].image_id == image_id) 17008b167e9SHaojian Zhuang return &bl1_tbbr_image_descs[index]; 17108b167e9SHaojian Zhuang 17208b167e9SHaojian Zhuang index++; 17308b167e9SHaojian Zhuang } 17408b167e9SHaojian Zhuang 17508b167e9SHaojian Zhuang return NULL; 17608b167e9SHaojian Zhuang } 17708b167e9SHaojian Zhuang 17808b167e9SHaojian Zhuang void bl1_plat_set_ep_info(unsigned int image_id, 17908b167e9SHaojian Zhuang entry_point_info_t *ep_info) 18008b167e9SHaojian Zhuang { 18184b589c9SHaojian Zhuang uint64_t data = 0; 18208b167e9SHaojian Zhuang 18308b167e9SHaojian Zhuang if (image_id == BL2_IMAGE_ID) 184a628b1abSHaojian Zhuang panic(); 18508b167e9SHaojian Zhuang inv_dcache_range(NS_BL1U_BASE, NS_BL1U_SIZE); 18608b167e9SHaojian Zhuang __asm__ volatile ("mrs %0, cpacr_el1" : "=r"(data)); 18708b167e9SHaojian Zhuang do { 18808b167e9SHaojian Zhuang data |= 3 << 20; 18908b167e9SHaojian Zhuang __asm__ volatile ("msr cpacr_el1, %0" : : "r"(data)); 19008b167e9SHaojian Zhuang __asm__ volatile ("mrs %0, cpacr_el1" : "=r"(data)); 19108b167e9SHaojian Zhuang } while ((data & (3 << 20)) != (3 << 20)); 19284b589c9SHaojian Zhuang INFO("cpacr_el1:0x%lx\n", data); 19308b167e9SHaojian Zhuang 19408b167e9SHaojian Zhuang ep_info->args.arg0 = 0xffff & read_mpidr(); 19508b167e9SHaojian Zhuang ep_info->spsr = SPSR_64(MODE_EL1, MODE_SP_ELX, 19608b167e9SHaojian Zhuang DISABLE_ALL_EXCEPTIONS); 19708b167e9SHaojian Zhuang } 198