1179f82a2SJacky Bai /* 2d76f012eSJacky Bai * Copyright (c) 2019-2022 ARM Limited and Contributors. All rights reserved. 3179f82a2SJacky Bai * 4179f82a2SJacky Bai * SPDX-License-Identifier: BSD-3-Clause 5179f82a2SJacky Bai */ 6179f82a2SJacky Bai 7179f82a2SJacky Bai #include <assert.h> 8179f82a2SJacky Bai #include <stdbool.h> 9179f82a2SJacky Bai 10179f82a2SJacky Bai #include <platform_def.h> 11179f82a2SJacky Bai 12179f82a2SJacky Bai #include <arch_helpers.h> 13179f82a2SJacky Bai #include <common/bl_common.h> 14179f82a2SJacky Bai #include <common/debug.h> 15179f82a2SJacky Bai #include <context.h> 16179f82a2SJacky Bai #include <drivers/arm/tzc380.h> 17179f82a2SJacky Bai #include <drivers/console.h> 18179f82a2SJacky Bai #include <drivers/generic_delay_timer.h> 19179f82a2SJacky Bai #include <lib/el3_runtime/context_mgmt.h> 20179f82a2SJacky Bai #include <lib/mmio.h> 214f8d5b01SJi Luo #include <lib/xlat_tables/xlat_tables_v2.h> 22179f82a2SJacky Bai #include <plat/common/platform.h> 23179f82a2SJacky Bai 24b7abf485SJacky Bai #include <dram.h> 25179f82a2SJacky Bai #include <gpc.h> 26ac166f64SJacky Bai #include <imx_aipstz.h> 27179f82a2SJacky Bai #include <imx_uart.h> 283d660799SJacky Bai #include <imx_rdc.h> 292502709fSJacky Bai #include <imx8m_caam.h> 30df730d94SMarco Felsch #include <imx8m_ccm.h> 310a76495bSJacky Bai #include <imx8m_csu.h> 328d150c95SMarco Felsch #include <imx8m_snvs.h> 33179f82a2SJacky Bai #include <plat_imx8.h> 34179f82a2SJacky Bai 35ff3acfe3SJi Luo #define TRUSTY_PARAMS_LEN_BYTES (4096*2) 36ff3acfe3SJi Luo 375941f372SAndrey Zhizhikin /* 385941f372SAndrey Zhizhikin * Note: DRAM region is mapped with entire size available and uses MT_RW 395941f372SAndrey Zhizhikin * attributes. 405941f372SAndrey Zhizhikin * See details in docs/plat/imx8m.rst "High Assurance Boot (HABv4)" section 415941f372SAndrey Zhizhikin * for explanation of this mapping scheme. 425941f372SAndrey Zhizhikin */ 43179f82a2SJacky Bai static const mmap_region_t imx_mmap[] = { 44179f82a2SJacky Bai MAP_REGION_FLAT(IMX_GIC_BASE, IMX_GIC_SIZE, MT_DEVICE | MT_RW), 45179f82a2SJacky Bai MAP_REGION_FLAT(IMX_AIPS_BASE, IMX_AIPS_SIZE, MT_DEVICE | MT_RW), /* AIPS map */ 46b7abf485SJacky Bai MAP_REGION_FLAT(OCRAM_S_BASE, OCRAM_S_SIZE, MT_DEVICE | MT_RW), /* OCRAM_S */ 47b7abf485SJacky Bai MAP_REGION_FLAT(IMX_DDRPHY_BASE, IMX_DDR_IPS_SIZE, MT_DEVICE | MT_RW), /* DDRMIX */ 4844dea544SJacky Bai MAP_REGION_FLAT(IMX_VPUMIX_BASE, IMX_VPUMIX_SIZE, MT_DEVICE | MT_RW), /* VPUMIX */ 495941f372SAndrey Zhizhikin MAP_REGION_FLAT(IMX_CAAM_RAM_BASE, IMX_CAAM_RAM_SIZE, MT_MEMORY | MT_RW), /* CAMM RAM */ 505941f372SAndrey Zhizhikin MAP_REGION_FLAT(IMX_NS_OCRAM_BASE, IMX_NS_OCRAM_SIZE, MT_MEMORY | MT_RW), /* NS OCRAM */ 515941f372SAndrey Zhizhikin MAP_REGION_FLAT(IMX_ROM_BASE, IMX_ROM_SIZE, MT_MEMORY | MT_RO), /* ROM code */ 525941f372SAndrey Zhizhikin MAP_REGION_FLAT(IMX_DRAM_BASE, IMX_DRAM_SIZE, MT_MEMORY | MT_RW | MT_NS), /* DRAM */ 53179f82a2SJacky Bai {0}, 54179f82a2SJacky Bai }; 55179f82a2SJacky Bai 56ac166f64SJacky Bai static const struct aipstz_cfg aipstz[] = { 57ac166f64SJacky Bai {IMX_AIPSTZ1, 0x77777777, 0x77777777, .opacr = {0x0, 0x0, 0x0, 0x0, 0x0}, }, 58ac166f64SJacky Bai {IMX_AIPSTZ2, 0x77777777, 0x77777777, .opacr = {0x0, 0x0, 0x0, 0x0, 0x0}, }, 59ac166f64SJacky Bai {IMX_AIPSTZ3, 0x77777777, 0x77777777, .opacr = {0x0, 0x0, 0x0, 0x0, 0x0}, }, 60ac166f64SJacky Bai {IMX_AIPSTZ4, 0x77777777, 0x77777777, .opacr = {0x0, 0x0, 0x0, 0x0, 0x0}, }, 61ac166f64SJacky Bai {0}, 62ac166f64SJacky Bai }; 63ac166f64SJacky Bai 643d660799SJacky Bai static const struct imx_rdc_cfg rdc[] = { 653d660799SJacky Bai /* Master domain assignment */ 66d76f012eSJacky Bai RDC_MDAn(RDC_MDA_M4, DID1), 673d660799SJacky Bai 683d660799SJacky Bai /* peripherals domain permission */ 69d76f012eSJacky Bai RDC_PDAPn(RDC_PDAP_UART4, D1R | D1W), 70d76f012eSJacky Bai RDC_PDAPn(RDC_PDAP_UART2, D0R | D0W), 713d660799SJacky Bai 723d660799SJacky Bai /* memory region */ 733d660799SJacky Bai 743d660799SJacky Bai /* Sentinel */ 753d660799SJacky Bai {0}, 763d660799SJacky Bai }; 773d660799SJacky Bai 780a76495bSJacky Bai static const struct imx_csu_cfg csu_cfg[] = { 790a76495bSJacky Bai /* peripherals csl setting */ 80*1156c763SStefan Kerkmann CSU_CSLx(CSU_CSL_RDC, CSU_SEC_LEVEL_3, LOCKED), 81*1156c763SStefan Kerkmann CSU_CSLx(CSU_CSL_TZASC, CSU_SEC_LEVEL_5, LOCKED), 82*1156c763SStefan Kerkmann CSU_CSLx(CSU_CSL_CSU, CSU_SEC_LEVEL_5, LOCKED), 830a76495bSJacky Bai 840a76495bSJacky Bai /* master HP0~1 */ 850a76495bSJacky Bai 860a76495bSJacky Bai /* SA setting */ 87f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_M4, NON_SEC_ACCESS, LOCKED), 88f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_SDMA1, NON_SEC_ACCESS, LOCKED), 89f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_PCIE_CTRL1, NON_SEC_ACCESS, LOCKED), 90f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_USB1, NON_SEC_ACCESS, LOCKED), 91f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_USB2, NON_SEC_ACCESS, LOCKED), 92f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_VPU, NON_SEC_ACCESS, LOCKED), 93f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_GPU, NON_SEC_ACCESS, LOCKED), 94f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_APBHDMA, NON_SEC_ACCESS, LOCKED), 95f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_ENET, NON_SEC_ACCESS, LOCKED), 96f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_USDHC1, NON_SEC_ACCESS, LOCKED), 97f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_USDHC2, NON_SEC_ACCESS, LOCKED), 98f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_USDHC3, NON_SEC_ACCESS, LOCKED), 99f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_HUGO, NON_SEC_ACCESS, LOCKED), 100f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_DAP, NON_SEC_ACCESS, LOCKED), 101f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_SDMA2, NON_SEC_ACCESS, LOCKED), 102f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_SDMA3, NON_SEC_ACCESS, LOCKED), 103f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_LCDIF, NON_SEC_ACCESS, LOCKED), 104f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_CSI, NON_SEC_ACCESS, LOCKED), 1050a76495bSJacky Bai 1060a76495bSJacky Bai /* HP control setting */ 1070a76495bSJacky Bai 1080a76495bSJacky Bai /* Sentinel */ 1090a76495bSJacky Bai {0} 1100a76495bSJacky Bai }; 1110a76495bSJacky Bai 112179f82a2SJacky Bai static entry_point_info_t bl32_image_ep_info; 113179f82a2SJacky Bai static entry_point_info_t bl33_image_ep_info; 114179f82a2SJacky Bai 115179f82a2SJacky Bai /* get SPSR for BL33 entry */ 116179f82a2SJacky Bai static uint32_t get_spsr_for_bl33_entry(void) 117179f82a2SJacky Bai { 118179f82a2SJacky Bai unsigned long el_status; 119179f82a2SJacky Bai unsigned long mode; 120179f82a2SJacky Bai uint32_t spsr; 121179f82a2SJacky Bai 122179f82a2SJacky Bai /* figure out what mode we enter the non-secure world */ 123179f82a2SJacky Bai el_status = read_id_aa64pfr0_el1() >> ID_AA64PFR0_EL2_SHIFT; 124179f82a2SJacky Bai el_status &= ID_AA64PFR0_ELX_MASK; 125179f82a2SJacky Bai 126179f82a2SJacky Bai mode = (el_status) ? MODE_EL2 : MODE_EL1; 127179f82a2SJacky Bai 128179f82a2SJacky Bai spsr = SPSR_64(mode, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS); 129179f82a2SJacky Bai return spsr; 130179f82a2SJacky Bai } 131179f82a2SJacky Bai 132179f82a2SJacky Bai void bl31_tzc380_setup(void) 133179f82a2SJacky Bai { 134179f82a2SJacky Bai unsigned int val; 135179f82a2SJacky Bai 136179f82a2SJacky Bai val = mmio_read_32(IMX_IOMUX_GPR_BASE + 0x28); 137179f82a2SJacky Bai if ((val & GPR_TZASC_EN) != GPR_TZASC_EN) 138179f82a2SJacky Bai return; 139179f82a2SJacky Bai 140179f82a2SJacky Bai tzc380_init(IMX_TZASC_BASE); 141179f82a2SJacky Bai 142179f82a2SJacky Bai /* 143179f82a2SJacky Bai * Need to substact offset 0x40000000 from CPU address when 144179f82a2SJacky Bai * programming tzasc region for i.mx8mm. 145179f82a2SJacky Bai */ 146179f82a2SJacky Bai 147179f82a2SJacky Bai /* Enable 1G-5G S/NS RW */ 148179f82a2SJacky Bai tzc380_configure_region(0, 0x00000000, TZC_ATTR_REGION_SIZE(TZC_REGION_SIZE_4G) | 149179f82a2SJacky Bai TZC_ATTR_REGION_EN_MASK | TZC_ATTR_SP_ALL); 150179f82a2SJacky Bai } 151179f82a2SJacky Bai 152179f82a2SJacky Bai void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, 153179f82a2SJacky Bai u_register_t arg2, u_register_t arg3) 154179f82a2SJacky Bai { 155101f0702SMarco Felsch unsigned int console_base = IMX_BOOT_UART_BASE; 156d7873bcdSAndre Przywara static console_t console; 157179f82a2SJacky Bai int i; 158179f82a2SJacky Bai 159179f82a2SJacky Bai /* Enable CSU NS access permission */ 160179f82a2SJacky Bai for (i = 0; i < 64; i++) { 161179f82a2SJacky Bai mmio_write_32(IMX_CSU_BASE + i * 4, 0x00ff00ff); 162179f82a2SJacky Bai } 163179f82a2SJacky Bai 164ac166f64SJacky Bai imx_aipstz_init(aipstz); 165179f82a2SJacky Bai 1663d660799SJacky Bai imx_rdc_init(rdc); 1673d660799SJacky Bai 1680a76495bSJacky Bai imx_csu_init(csu_cfg); 1690a76495bSJacky Bai 170df730d94SMarco Felsch if (console_base == 0U) { 171df730d94SMarco Felsch console_base = imx8m_uart_get_base(); 172df730d94SMarco Felsch } 173df730d94SMarco Felsch 174df730d94SMarco Felsch console_imx_uart_register(console_base, IMX_BOOT_UART_CLK_IN_HZ, 175179f82a2SJacky Bai IMX_CONSOLE_BAUDRATE, &console); 176179f82a2SJacky Bai /* This console is only used for boot stage */ 177d7873bcdSAndre Przywara console_set_scope(&console, CONSOLE_FLAG_BOOT); 178179f82a2SJacky Bai 179901d74b2SAndrey Zhizhikin imx8m_caam_init(); 180901d74b2SAndrey Zhizhikin 181179f82a2SJacky Bai /* 182179f82a2SJacky Bai * tell BL3-1 where the non-secure software image is located 183179f82a2SJacky Bai * and the entry state information. 184179f82a2SJacky Bai */ 185179f82a2SJacky Bai bl33_image_ep_info.pc = PLAT_NS_IMAGE_OFFSET; 186179f82a2SJacky Bai bl33_image_ep_info.spsr = get_spsr_for_bl33_entry(); 187179f82a2SJacky Bai SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE); 188179f82a2SJacky Bai 189ff3acfe3SJi Luo #if defined(SPD_opteed) || defined(SPD_trusty) 190abb6fee6SJacky Bai /* Populate entry point information for BL32 */ 191abb6fee6SJacky Bai SET_PARAM_HEAD(&bl32_image_ep_info, PARAM_EP, VERSION_1, 0); 192abb6fee6SJacky Bai SET_SECURITY_STATE(bl32_image_ep_info.h.attr, SECURE); 193abb6fee6SJacky Bai bl32_image_ep_info.pc = BL32_BASE; 194abb6fee6SJacky Bai bl32_image_ep_info.spsr = 0; 195abb6fee6SJacky Bai 196abb6fee6SJacky Bai /* Pass TEE base and size to bl33 */ 197abb6fee6SJacky Bai bl33_image_ep_info.args.arg1 = BL32_BASE; 198abb6fee6SJacky Bai bl33_image_ep_info.args.arg2 = BL32_SIZE; 1999d0eed11SSilvano di Ninno 2009d0eed11SSilvano di Ninno #ifdef SPD_trusty 2019d0eed11SSilvano di Ninno bl32_image_ep_info.args.arg0 = BL32_SIZE; 2029d0eed11SSilvano di Ninno bl32_image_ep_info.args.arg1 = BL32_BASE; 2039d0eed11SSilvano di Ninno #else 2049d0eed11SSilvano di Ninno /* Make sure memory is clean */ 2059d0eed11SSilvano di Ninno mmio_write_32(BL32_FDT_OVERLAY_ADDR, 0); 2069d0eed11SSilvano di Ninno bl33_image_ep_info.args.arg3 = BL32_FDT_OVERLAY_ADDR; 2079d0eed11SSilvano di Ninno bl32_image_ep_info.args.arg3 = BL32_FDT_OVERLAY_ADDR; 2089d0eed11SSilvano di Ninno #endif 209abb6fee6SJacky Bai #endif 210abb6fee6SJacky Bai 2118d150c95SMarco Felsch #if !defined(SPD_opteed) && !defined(SPD_trusty) 2128d150c95SMarco Felsch enable_snvs_privileged_access(); 2138d150c95SMarco Felsch #endif 2148d150c95SMarco Felsch 215179f82a2SJacky Bai bl31_tzc380_setup(); 216179f82a2SJacky Bai } 217179f82a2SJacky Bai 218686a5bc8SMarco Felsch #define MAP_BL31_TOTAL \ 219a8e6a2c8SMarco Felsch MAP_REGION_FLAT(BL31_START, BL31_SIZE, MT_MEMORY | MT_RW | MT_SECURE) 220686a5bc8SMarco Felsch #define MAP_BL31_RO \ 221686a5bc8SMarco Felsch MAP_REGION_FLAT(BL_CODE_BASE, BL_CODE_END - BL_CODE_BASE, MT_MEMORY | MT_RO | MT_SECURE) 222686a5bc8SMarco Felsch #define MAP_COHERENT_MEM \ 223686a5bc8SMarco Felsch MAP_REGION_FLAT(BL_COHERENT_RAM_BASE, BL_COHERENT_RAM_END - BL_COHERENT_RAM_BASE, \ 224686a5bc8SMarco Felsch MT_DEVICE | MT_RW | MT_SECURE) 225686a5bc8SMarco Felsch #define MAP_BL32_TOTAL \ 226686a5bc8SMarco Felsch MAP_REGION_FLAT(BL32_BASE, BL32_SIZE, MT_MEMORY | MT_RW) 227686a5bc8SMarco Felsch 228179f82a2SJacky Bai void bl31_plat_arch_setup(void) 229179f82a2SJacky Bai { 230686a5bc8SMarco Felsch const mmap_region_t bl_regions[] = { 231686a5bc8SMarco Felsch MAP_BL31_TOTAL, 232686a5bc8SMarco Felsch MAP_BL31_RO, 233179f82a2SJacky Bai #if USE_COHERENT_MEM 234686a5bc8SMarco Felsch MAP_COHERENT_MEM, 235179f82a2SJacky Bai #endif 2364827613cSMarco Felsch #if defined(SPD_opteed) || defined(SPD_trusty) 237ff3acfe3SJi Luo /* Map TEE memory */ 238686a5bc8SMarco Felsch MAP_BL32_TOTAL, 2394827613cSMarco Felsch #endif 240686a5bc8SMarco Felsch {0} 241686a5bc8SMarco Felsch }; 242ff3acfe3SJi Luo 2430b727248SMarco Felsch setup_page_tables(bl_regions, imx_mmap); 244179f82a2SJacky Bai enable_mmu_el3(0); 245179f82a2SJacky Bai } 246179f82a2SJacky Bai 247179f82a2SJacky Bai void bl31_platform_setup(void) 248179f82a2SJacky Bai { 249179f82a2SJacky Bai generic_delay_timer_init(); 250179f82a2SJacky Bai 251179f82a2SJacky Bai /* select the CKIL source to 32K OSC */ 252179f82a2SJacky Bai mmio_write_32(IMX_ANAMIX_BASE + ANAMIX_MISC_CTL, 0x1); 253179f82a2SJacky Bai 254b7abf485SJacky Bai /* Init the dram info */ 255b7abf485SJacky Bai dram_info_init(SAVED_DRAM_TIMING_BASE); 256b7abf485SJacky Bai 257179f82a2SJacky Bai plat_gic_driver_init(); 258179f82a2SJacky Bai plat_gic_init(); 259179f82a2SJacky Bai 260179f82a2SJacky Bai imx_gpc_init(); 261179f82a2SJacky Bai } 262179f82a2SJacky Bai 263179f82a2SJacky Bai entry_point_info_t *bl31_plat_get_next_image_ep_info(unsigned int type) 264179f82a2SJacky Bai { 265179f82a2SJacky Bai if (type == NON_SECURE) 266179f82a2SJacky Bai return &bl33_image_ep_info; 267179f82a2SJacky Bai if (type == SECURE) 268179f82a2SJacky Bai return &bl32_image_ep_info; 269179f82a2SJacky Bai 270179f82a2SJacky Bai return NULL; 271179f82a2SJacky Bai } 272179f82a2SJacky Bai 273179f82a2SJacky Bai unsigned int plat_get_syscnt_freq2(void) 274179f82a2SJacky Bai { 275179f82a2SJacky Bai return COUNTER_FREQUENCY; 276179f82a2SJacky Bai } 277ff3acfe3SJi Luo 278ff3acfe3SJi Luo #ifdef SPD_trusty 279ff3acfe3SJi Luo void plat_trusty_set_boot_args(aapcs64_params_t *args) 280ff3acfe3SJi Luo { 281ff3acfe3SJi Luo args->arg0 = BL32_SIZE; 282ff3acfe3SJi Luo args->arg1 = BL32_BASE; 283ff3acfe3SJi Luo args->arg2 = TRUSTY_PARAMS_LEN_BYTES; 284ff3acfe3SJi Luo } 285ff3acfe3SJi Luo #endif 286