108b167e9SHaojian Zhuang /* 2a628b1abSHaojian Zhuang * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved. 308b167e9SHaojian Zhuang * 408b167e9SHaojian Zhuang * SPDX-License-Identifier: BSD-3-Clause 508b167e9SHaojian Zhuang */ 608b167e9SHaojian Zhuang 708b167e9SHaojian Zhuang #include <arch_helpers.h> 808b167e9SHaojian Zhuang #include <assert.h> 908b167e9SHaojian Zhuang #include <bl_common.h> 1008b167e9SHaojian Zhuang #include <console.h> 1108b167e9SHaojian Zhuang #include <debug.h> 1208b167e9SHaojian Zhuang #include <dw_mmc.h> 1308b167e9SHaojian Zhuang #include <emmc.h> 1408b167e9SHaojian Zhuang #include <errno.h> 1508b167e9SHaojian Zhuang #include <hi6220.h> 1608b167e9SHaojian Zhuang #include <mmio.h> 1708b167e9SHaojian Zhuang #include <platform.h> 1808b167e9SHaojian Zhuang #include <platform_def.h> 1908b167e9SHaojian Zhuang #include <string.h> 2008b167e9SHaojian Zhuang #include <tbbr/tbbr_img_desc.h> 2108b167e9SHaojian Zhuang 2208b167e9SHaojian Zhuang #include "../../bl1/bl1_private.h" 2308b167e9SHaojian Zhuang #include "hikey_def.h" 2408b167e9SHaojian Zhuang #include "hikey_private.h" 2508b167e9SHaojian Zhuang 2608b167e9SHaojian Zhuang /* Data structure which holds the extents of the trusted RAM for BL1 */ 2708b167e9SHaojian Zhuang static meminfo_t bl1_tzram_layout; 2808b167e9SHaojian Zhuang 2908b167e9SHaojian Zhuang enum { 3008b167e9SHaojian Zhuang BOOT_NORMAL = 0, 3108b167e9SHaojian Zhuang BOOT_USB_DOWNLOAD, 3208b167e9SHaojian Zhuang BOOT_UART_DOWNLOAD, 3308b167e9SHaojian Zhuang }; 3408b167e9SHaojian Zhuang 3508b167e9SHaojian Zhuang meminfo_t *bl1_plat_sec_mem_layout(void) 3608b167e9SHaojian Zhuang { 3708b167e9SHaojian Zhuang return &bl1_tzram_layout; 3808b167e9SHaojian Zhuang } 3908b167e9SHaojian Zhuang 402de0c5ccSVictor Chong /******************************************************************************* 412de0c5ccSVictor Chong * Function that takes a memory layout into which BL2 has been loaded and 422de0c5ccSVictor Chong * populates a new memory layout for BL2 that ensures that BL1's data sections 432de0c5ccSVictor Chong * resident in secure RAM are not visible to BL2. 442de0c5ccSVictor Chong ******************************************************************************/ 452de0c5ccSVictor Chong void bl1_init_bl2_mem_layout(const meminfo_t *bl1_mem_layout, 462de0c5ccSVictor Chong meminfo_t *bl2_mem_layout) 472de0c5ccSVictor Chong { 482de0c5ccSVictor Chong 492de0c5ccSVictor Chong assert(bl1_mem_layout != NULL); 502de0c5ccSVictor Chong assert(bl2_mem_layout != NULL); 512de0c5ccSVictor Chong 522de0c5ccSVictor Chong /* 532de0c5ccSVictor Chong * Cannot remove BL1 RW data from the scope of memory visible to BL2 542de0c5ccSVictor Chong * like arm platforms because they overlap in hikey 552de0c5ccSVictor Chong */ 562de0c5ccSVictor Chong bl2_mem_layout->total_base = BL2_BASE; 572de0c5ccSVictor Chong bl2_mem_layout->total_size = BL32_SRAM_LIMIT - BL2_BASE; 582de0c5ccSVictor Chong 592de0c5ccSVictor Chong flush_dcache_range((unsigned long)bl2_mem_layout, sizeof(meminfo_t)); 602de0c5ccSVictor Chong } 612de0c5ccSVictor Chong 6208b167e9SHaojian Zhuang /* 6308b167e9SHaojian Zhuang * Perform any BL1 specific platform actions. 6408b167e9SHaojian Zhuang */ 6508b167e9SHaojian Zhuang void bl1_early_platform_setup(void) 6608b167e9SHaojian Zhuang { 6708b167e9SHaojian Zhuang /* Initialize the console to provide early debug support */ 6808b167e9SHaojian Zhuang console_init(CONSOLE_BASE, PL011_UART_CLK_IN_HZ, PL011_BAUDRATE); 6908b167e9SHaojian Zhuang 7008b167e9SHaojian Zhuang /* Allow BL1 to see the whole Trusted RAM */ 7108b167e9SHaojian Zhuang bl1_tzram_layout.total_base = BL1_RW_BASE; 7208b167e9SHaojian Zhuang bl1_tzram_layout.total_size = BL1_RW_SIZE; 7308b167e9SHaojian Zhuang 7408b167e9SHaojian Zhuang INFO("BL1: 0x%lx - 0x%lx [size = %lu]\n", BL1_RAM_BASE, BL1_RAM_LIMIT, 752de0c5ccSVictor Chong BL1_RAM_LIMIT - BL1_RAM_BASE); /* bl1_size */ 7608b167e9SHaojian Zhuang } 7708b167e9SHaojian Zhuang 7808b167e9SHaojian Zhuang /* 7908b167e9SHaojian Zhuang * Perform the very early platform specific architecture setup here. At the 8008b167e9SHaojian Zhuang * moment this only does basic initialization. Later architectural setup 8108b167e9SHaojian Zhuang * (bl1_arch_setup()) does not do anything platform specific. 8208b167e9SHaojian Zhuang */ 8308b167e9SHaojian Zhuang void bl1_plat_arch_setup(void) 8408b167e9SHaojian Zhuang { 8508b167e9SHaojian Zhuang hikey_init_mmu_el3(bl1_tzram_layout.total_base, 8608b167e9SHaojian Zhuang bl1_tzram_layout.total_size, 8708b167e9SHaojian Zhuang BL1_RO_BASE, 8808b167e9SHaojian Zhuang BL1_RO_LIMIT, 89*9f85f9e3SJoel Hutton BL_COHERENT_RAM_BASE, 90*9f85f9e3SJoel Hutton BL_COHERENT_RAM_END); 9108b167e9SHaojian Zhuang } 9208b167e9SHaojian Zhuang 9308b167e9SHaojian Zhuang /* 9408b167e9SHaojian Zhuang * Function which will perform any remaining platform-specific setup that can 9508b167e9SHaojian Zhuang * occur after the MMU and data cache have been enabled. 9608b167e9SHaojian Zhuang */ 9708b167e9SHaojian Zhuang void bl1_platform_setup(void) 9808b167e9SHaojian Zhuang { 9908b167e9SHaojian Zhuang dw_mmc_params_t params; 10008b167e9SHaojian Zhuang 10108b167e9SHaojian Zhuang assert((HIKEY_BL1_MMC_DESC_BASE >= SRAM_BASE) && 10208b167e9SHaojian Zhuang ((SRAM_BASE + SRAM_SIZE) >= 10308b167e9SHaojian Zhuang (HIKEY_BL1_MMC_DATA_BASE + HIKEY_BL1_MMC_DATA_SIZE))); 10408b167e9SHaojian Zhuang hikey_sp804_init(); 10508b167e9SHaojian Zhuang hikey_gpio_init(); 10608b167e9SHaojian Zhuang hikey_pmussi_init(); 10708b167e9SHaojian Zhuang hikey_hi6553_init(); 10808b167e9SHaojian Zhuang 109454748fcSHaojian Zhuang hikey_rtc_init(); 110454748fcSHaojian Zhuang 11108b167e9SHaojian Zhuang hikey_mmc_pll_init(); 11208b167e9SHaojian Zhuang 11308b167e9SHaojian Zhuang memset(¶ms, 0, sizeof(dw_mmc_params_t)); 11408b167e9SHaojian Zhuang params.reg_base = DWMMC0_BASE; 11508b167e9SHaojian Zhuang params.desc_base = HIKEY_BL1_MMC_DESC_BASE; 11608b167e9SHaojian Zhuang params.desc_size = 1 << 20; 11708b167e9SHaojian Zhuang params.clk_rate = 24 * 1000 * 1000; 11808b167e9SHaojian Zhuang params.bus_width = EMMC_BUS_WIDTH_8; 11908b167e9SHaojian Zhuang params.flags = EMMC_FLAG_CMD23; 12008b167e9SHaojian Zhuang dw_mmc_init(¶ms); 12108b167e9SHaojian Zhuang 12208b167e9SHaojian Zhuang hikey_io_setup(); 12308b167e9SHaojian Zhuang } 12408b167e9SHaojian Zhuang 12508b167e9SHaojian Zhuang /* 12608b167e9SHaojian Zhuang * The following function checks if Firmware update is needed, 12708b167e9SHaojian Zhuang * by checking if TOC in FIP image is valid or not. 12808b167e9SHaojian Zhuang */ 12908b167e9SHaojian Zhuang unsigned int bl1_plat_get_next_image_id(void) 13008b167e9SHaojian Zhuang { 13108b167e9SHaojian Zhuang int32_t boot_mode; 13208b167e9SHaojian Zhuang unsigned int ret; 13308b167e9SHaojian Zhuang 13408b167e9SHaojian Zhuang boot_mode = mmio_read_32(ONCHIPROM_PARAM_BASE); 13508b167e9SHaojian Zhuang switch (boot_mode) { 13608b167e9SHaojian Zhuang case BOOT_USB_DOWNLOAD: 13708b167e9SHaojian Zhuang case BOOT_UART_DOWNLOAD: 13808b167e9SHaojian Zhuang ret = NS_BL1U_IMAGE_ID; 13908b167e9SHaojian Zhuang break; 14008b167e9SHaojian Zhuang default: 14108b167e9SHaojian Zhuang WARN("Invalid boot mode is found:%d\n", boot_mode); 14208b167e9SHaojian Zhuang panic(); 14308b167e9SHaojian Zhuang } 14408b167e9SHaojian Zhuang return ret; 14508b167e9SHaojian Zhuang } 14608b167e9SHaojian Zhuang 14708b167e9SHaojian Zhuang image_desc_t *bl1_plat_get_image_desc(unsigned int image_id) 14808b167e9SHaojian Zhuang { 14908b167e9SHaojian Zhuang unsigned int index = 0; 15008b167e9SHaojian Zhuang 15108b167e9SHaojian Zhuang while (bl1_tbbr_image_descs[index].image_id != INVALID_IMAGE_ID) { 15208b167e9SHaojian Zhuang if (bl1_tbbr_image_descs[index].image_id == image_id) 15308b167e9SHaojian Zhuang return &bl1_tbbr_image_descs[index]; 15408b167e9SHaojian Zhuang 15508b167e9SHaojian Zhuang index++; 15608b167e9SHaojian Zhuang } 15708b167e9SHaojian Zhuang 15808b167e9SHaojian Zhuang return NULL; 15908b167e9SHaojian Zhuang } 16008b167e9SHaojian Zhuang 16108b167e9SHaojian Zhuang void bl1_plat_set_ep_info(unsigned int image_id, 16208b167e9SHaojian Zhuang entry_point_info_t *ep_info) 16308b167e9SHaojian Zhuang { 16484b589c9SHaojian Zhuang uint64_t data = 0; 16508b167e9SHaojian Zhuang 16608b167e9SHaojian Zhuang if (image_id == BL2_IMAGE_ID) 167a628b1abSHaojian Zhuang panic(); 16808b167e9SHaojian Zhuang inv_dcache_range(NS_BL1U_BASE, NS_BL1U_SIZE); 16908b167e9SHaojian Zhuang __asm__ volatile ("mrs %0, cpacr_el1" : "=r"(data)); 17008b167e9SHaojian Zhuang do { 17108b167e9SHaojian Zhuang data |= 3 << 20; 17208b167e9SHaojian Zhuang __asm__ volatile ("msr cpacr_el1, %0" : : "r"(data)); 17308b167e9SHaojian Zhuang __asm__ volatile ("mrs %0, cpacr_el1" : "=r"(data)); 17408b167e9SHaojian Zhuang } while ((data & (3 << 20)) != (3 << 20)); 17584b589c9SHaojian Zhuang INFO("cpacr_el1:0x%lx\n", data); 17608b167e9SHaojian Zhuang 17708b167e9SHaojian Zhuang ep_info->args.arg0 = 0xffff & read_mpidr(); 17808b167e9SHaojian Zhuang ep_info->spsr = SPSR_64(MODE_EL1, MODE_SP_ELX, 17908b167e9SHaojian Zhuang DISABLE_ALL_EXCEPTIONS); 18008b167e9SHaojian Zhuang } 181