xref: /rk3399_ARM-atf/plat/hisilicon/hikey/hikey_bl1_setup.c (revision 9f85f9e3796f1c351bbc4c8436dc66d83c140b71)
108b167e9SHaojian Zhuang /*
2a628b1abSHaojian Zhuang  * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
308b167e9SHaojian Zhuang  *
408b167e9SHaojian Zhuang  * SPDX-License-Identifier: BSD-3-Clause
508b167e9SHaojian Zhuang  */
608b167e9SHaojian Zhuang 
708b167e9SHaojian Zhuang #include <arch_helpers.h>
808b167e9SHaojian Zhuang #include <assert.h>
908b167e9SHaojian Zhuang #include <bl_common.h>
1008b167e9SHaojian Zhuang #include <console.h>
1108b167e9SHaojian Zhuang #include <debug.h>
1208b167e9SHaojian Zhuang #include <dw_mmc.h>
1308b167e9SHaojian Zhuang #include <emmc.h>
1408b167e9SHaojian Zhuang #include <errno.h>
1508b167e9SHaojian Zhuang #include <hi6220.h>
1608b167e9SHaojian Zhuang #include <mmio.h>
1708b167e9SHaojian Zhuang #include <platform.h>
1808b167e9SHaojian Zhuang #include <platform_def.h>
1908b167e9SHaojian Zhuang #include <string.h>
2008b167e9SHaojian Zhuang #include <tbbr/tbbr_img_desc.h>
2108b167e9SHaojian Zhuang 
2208b167e9SHaojian Zhuang #include "../../bl1/bl1_private.h"
2308b167e9SHaojian Zhuang #include "hikey_def.h"
2408b167e9SHaojian Zhuang #include "hikey_private.h"
2508b167e9SHaojian Zhuang 
2608b167e9SHaojian Zhuang /* Data structure which holds the extents of the trusted RAM for BL1 */
2708b167e9SHaojian Zhuang static meminfo_t bl1_tzram_layout;
2808b167e9SHaojian Zhuang 
2908b167e9SHaojian Zhuang enum {
3008b167e9SHaojian Zhuang 	BOOT_NORMAL = 0,
3108b167e9SHaojian Zhuang 	BOOT_USB_DOWNLOAD,
3208b167e9SHaojian Zhuang 	BOOT_UART_DOWNLOAD,
3308b167e9SHaojian Zhuang };
3408b167e9SHaojian Zhuang 
3508b167e9SHaojian Zhuang meminfo_t *bl1_plat_sec_mem_layout(void)
3608b167e9SHaojian Zhuang {
3708b167e9SHaojian Zhuang 	return &bl1_tzram_layout;
3808b167e9SHaojian Zhuang }
3908b167e9SHaojian Zhuang 
402de0c5ccSVictor Chong /*******************************************************************************
412de0c5ccSVictor Chong  * Function that takes a memory layout into which BL2 has been loaded and
422de0c5ccSVictor Chong  * populates a new memory layout for BL2 that ensures that BL1's data sections
432de0c5ccSVictor Chong  * resident in secure RAM are not visible to BL2.
442de0c5ccSVictor Chong  ******************************************************************************/
452de0c5ccSVictor Chong void bl1_init_bl2_mem_layout(const meminfo_t *bl1_mem_layout,
462de0c5ccSVictor Chong 			     meminfo_t *bl2_mem_layout)
472de0c5ccSVictor Chong {
482de0c5ccSVictor Chong 
492de0c5ccSVictor Chong 	assert(bl1_mem_layout != NULL);
502de0c5ccSVictor Chong 	assert(bl2_mem_layout != NULL);
512de0c5ccSVictor Chong 
522de0c5ccSVictor Chong 	/*
532de0c5ccSVictor Chong 	 * Cannot remove BL1 RW data from the scope of memory visible to BL2
542de0c5ccSVictor Chong 	 * like arm platforms because they overlap in hikey
552de0c5ccSVictor Chong 	 */
562de0c5ccSVictor Chong 	bl2_mem_layout->total_base = BL2_BASE;
572de0c5ccSVictor Chong 	bl2_mem_layout->total_size = BL32_SRAM_LIMIT - BL2_BASE;
582de0c5ccSVictor Chong 
592de0c5ccSVictor Chong 	flush_dcache_range((unsigned long)bl2_mem_layout, sizeof(meminfo_t));
602de0c5ccSVictor Chong }
612de0c5ccSVictor Chong 
6208b167e9SHaojian Zhuang /*
6308b167e9SHaojian Zhuang  * Perform any BL1 specific platform actions.
6408b167e9SHaojian Zhuang  */
6508b167e9SHaojian Zhuang void bl1_early_platform_setup(void)
6608b167e9SHaojian Zhuang {
6708b167e9SHaojian Zhuang 	/* Initialize the console to provide early debug support */
6808b167e9SHaojian Zhuang 	console_init(CONSOLE_BASE, PL011_UART_CLK_IN_HZ, PL011_BAUDRATE);
6908b167e9SHaojian Zhuang 
7008b167e9SHaojian Zhuang 	/* Allow BL1 to see the whole Trusted RAM */
7108b167e9SHaojian Zhuang 	bl1_tzram_layout.total_base = BL1_RW_BASE;
7208b167e9SHaojian Zhuang 	bl1_tzram_layout.total_size = BL1_RW_SIZE;
7308b167e9SHaojian Zhuang 
7408b167e9SHaojian Zhuang 	INFO("BL1: 0x%lx - 0x%lx [size = %lu]\n", BL1_RAM_BASE, BL1_RAM_LIMIT,
752de0c5ccSVictor Chong 	     BL1_RAM_LIMIT - BL1_RAM_BASE); /* bl1_size */
7608b167e9SHaojian Zhuang }
7708b167e9SHaojian Zhuang 
7808b167e9SHaojian Zhuang /*
7908b167e9SHaojian Zhuang  * Perform the very early platform specific architecture setup here. At the
8008b167e9SHaojian Zhuang  * moment this only does basic initialization. Later architectural setup
8108b167e9SHaojian Zhuang  * (bl1_arch_setup()) does not do anything platform specific.
8208b167e9SHaojian Zhuang  */
8308b167e9SHaojian Zhuang void bl1_plat_arch_setup(void)
8408b167e9SHaojian Zhuang {
8508b167e9SHaojian Zhuang 	hikey_init_mmu_el3(bl1_tzram_layout.total_base,
8608b167e9SHaojian Zhuang 			   bl1_tzram_layout.total_size,
8708b167e9SHaojian Zhuang 			   BL1_RO_BASE,
8808b167e9SHaojian Zhuang 			   BL1_RO_LIMIT,
89*9f85f9e3SJoel Hutton 			   BL_COHERENT_RAM_BASE,
90*9f85f9e3SJoel Hutton 			   BL_COHERENT_RAM_END);
9108b167e9SHaojian Zhuang }
9208b167e9SHaojian Zhuang 
9308b167e9SHaojian Zhuang /*
9408b167e9SHaojian Zhuang  * Function which will perform any remaining platform-specific setup that can
9508b167e9SHaojian Zhuang  * occur after the MMU and data cache have been enabled.
9608b167e9SHaojian Zhuang  */
9708b167e9SHaojian Zhuang void bl1_platform_setup(void)
9808b167e9SHaojian Zhuang {
9908b167e9SHaojian Zhuang 	dw_mmc_params_t params;
10008b167e9SHaojian Zhuang 
10108b167e9SHaojian Zhuang 	assert((HIKEY_BL1_MMC_DESC_BASE >= SRAM_BASE) &&
10208b167e9SHaojian Zhuang 	       ((SRAM_BASE + SRAM_SIZE) >=
10308b167e9SHaojian Zhuang 		(HIKEY_BL1_MMC_DATA_BASE + HIKEY_BL1_MMC_DATA_SIZE)));
10408b167e9SHaojian Zhuang 	hikey_sp804_init();
10508b167e9SHaojian Zhuang 	hikey_gpio_init();
10608b167e9SHaojian Zhuang 	hikey_pmussi_init();
10708b167e9SHaojian Zhuang 	hikey_hi6553_init();
10808b167e9SHaojian Zhuang 
109454748fcSHaojian Zhuang 	hikey_rtc_init();
110454748fcSHaojian Zhuang 
11108b167e9SHaojian Zhuang 	hikey_mmc_pll_init();
11208b167e9SHaojian Zhuang 
11308b167e9SHaojian Zhuang 	memset(&params, 0, sizeof(dw_mmc_params_t));
11408b167e9SHaojian Zhuang 	params.reg_base = DWMMC0_BASE;
11508b167e9SHaojian Zhuang 	params.desc_base = HIKEY_BL1_MMC_DESC_BASE;
11608b167e9SHaojian Zhuang 	params.desc_size = 1 << 20;
11708b167e9SHaojian Zhuang 	params.clk_rate = 24 * 1000 * 1000;
11808b167e9SHaojian Zhuang 	params.bus_width = EMMC_BUS_WIDTH_8;
11908b167e9SHaojian Zhuang 	params.flags = EMMC_FLAG_CMD23;
12008b167e9SHaojian Zhuang 	dw_mmc_init(&params);
12108b167e9SHaojian Zhuang 
12208b167e9SHaojian Zhuang 	hikey_io_setup();
12308b167e9SHaojian Zhuang }
12408b167e9SHaojian Zhuang 
12508b167e9SHaojian Zhuang /*
12608b167e9SHaojian Zhuang  * The following function checks if Firmware update is needed,
12708b167e9SHaojian Zhuang  * by checking if TOC in FIP image is valid or not.
12808b167e9SHaojian Zhuang  */
12908b167e9SHaojian Zhuang unsigned int bl1_plat_get_next_image_id(void)
13008b167e9SHaojian Zhuang {
13108b167e9SHaojian Zhuang 	int32_t boot_mode;
13208b167e9SHaojian Zhuang 	unsigned int ret;
13308b167e9SHaojian Zhuang 
13408b167e9SHaojian Zhuang 	boot_mode = mmio_read_32(ONCHIPROM_PARAM_BASE);
13508b167e9SHaojian Zhuang 	switch (boot_mode) {
13608b167e9SHaojian Zhuang 	case BOOT_USB_DOWNLOAD:
13708b167e9SHaojian Zhuang 	case BOOT_UART_DOWNLOAD:
13808b167e9SHaojian Zhuang 		ret = NS_BL1U_IMAGE_ID;
13908b167e9SHaojian Zhuang 		break;
14008b167e9SHaojian Zhuang 	default:
14108b167e9SHaojian Zhuang 		WARN("Invalid boot mode is found:%d\n", boot_mode);
14208b167e9SHaojian Zhuang 		panic();
14308b167e9SHaojian Zhuang 	}
14408b167e9SHaojian Zhuang 	return ret;
14508b167e9SHaojian Zhuang }
14608b167e9SHaojian Zhuang 
14708b167e9SHaojian Zhuang image_desc_t *bl1_plat_get_image_desc(unsigned int image_id)
14808b167e9SHaojian Zhuang {
14908b167e9SHaojian Zhuang 	unsigned int index = 0;
15008b167e9SHaojian Zhuang 
15108b167e9SHaojian Zhuang 	while (bl1_tbbr_image_descs[index].image_id != INVALID_IMAGE_ID) {
15208b167e9SHaojian Zhuang 		if (bl1_tbbr_image_descs[index].image_id == image_id)
15308b167e9SHaojian Zhuang 			return &bl1_tbbr_image_descs[index];
15408b167e9SHaojian Zhuang 
15508b167e9SHaojian Zhuang 		index++;
15608b167e9SHaojian Zhuang 	}
15708b167e9SHaojian Zhuang 
15808b167e9SHaojian Zhuang 	return NULL;
15908b167e9SHaojian Zhuang }
16008b167e9SHaojian Zhuang 
16108b167e9SHaojian Zhuang void bl1_plat_set_ep_info(unsigned int image_id,
16208b167e9SHaojian Zhuang 		entry_point_info_t *ep_info)
16308b167e9SHaojian Zhuang {
16484b589c9SHaojian Zhuang 	uint64_t data = 0;
16508b167e9SHaojian Zhuang 
16608b167e9SHaojian Zhuang 	if (image_id == BL2_IMAGE_ID)
167a628b1abSHaojian Zhuang 		panic();
16808b167e9SHaojian Zhuang 	inv_dcache_range(NS_BL1U_BASE, NS_BL1U_SIZE);
16908b167e9SHaojian Zhuang 	__asm__ volatile ("mrs	%0, cpacr_el1" : "=r"(data));
17008b167e9SHaojian Zhuang 	do {
17108b167e9SHaojian Zhuang 		data |= 3 << 20;
17208b167e9SHaojian Zhuang 		__asm__ volatile ("msr	cpacr_el1, %0" : : "r"(data));
17308b167e9SHaojian Zhuang 		__asm__ volatile ("mrs	%0, cpacr_el1" : "=r"(data));
17408b167e9SHaojian Zhuang 	} while ((data & (3 << 20)) != (3 << 20));
17584b589c9SHaojian Zhuang 	INFO("cpacr_el1:0x%lx\n", data);
17608b167e9SHaojian Zhuang 
17708b167e9SHaojian Zhuang 	ep_info->args.arg0 = 0xffff & read_mpidr();
17808b167e9SHaojian Zhuang 	ep_info->spsr = SPSR_64(MODE_EL1, MODE_SP_ELX,
17908b167e9SHaojian Zhuang 				DISABLE_ALL_EXCEPTIONS);
18008b167e9SHaojian Zhuang }
181