1179f82a2SJacky Bai /* 2d76f012eSJacky Bai * Copyright (c) 2019-2022 ARM Limited and Contributors. All rights reserved. 3179f82a2SJacky Bai * 4179f82a2SJacky Bai * SPDX-License-Identifier: BSD-3-Clause 5179f82a2SJacky Bai */ 6179f82a2SJacky Bai 7179f82a2SJacky Bai #include <assert.h> 8179f82a2SJacky Bai #include <stdbool.h> 9179f82a2SJacky Bai 10179f82a2SJacky Bai #include <platform_def.h> 11179f82a2SJacky Bai 12179f82a2SJacky Bai #include <arch_helpers.h> 13179f82a2SJacky Bai #include <common/bl_common.h> 14179f82a2SJacky Bai #include <common/debug.h> 15179f82a2SJacky Bai #include <context.h> 16179f82a2SJacky Bai #include <drivers/arm/tzc380.h> 17179f82a2SJacky Bai #include <drivers/console.h> 18179f82a2SJacky Bai #include <drivers/generic_delay_timer.h> 19179f82a2SJacky Bai #include <lib/el3_runtime/context_mgmt.h> 20179f82a2SJacky Bai #include <lib/mmio.h> 214f8d5b01SJi Luo #include <lib/xlat_tables/xlat_tables_v2.h> 22179f82a2SJacky Bai #include <plat/common/platform.h> 23179f82a2SJacky Bai 24b7abf485SJacky Bai #include <dram.h> 25179f82a2SJacky Bai #include <gpc.h> 26ac166f64SJacky Bai #include <imx_aipstz.h> 27179f82a2SJacky Bai #include <imx_uart.h> 283d660799SJacky Bai #include <imx_rdc.h> 292502709fSJacky Bai #include <imx8m_caam.h> 30df730d94SMarco Felsch #include <imx8m_ccm.h> 310a76495bSJacky Bai #include <imx8m_csu.h> 328d150c95SMarco Felsch #include <imx8m_snvs.h> 33179f82a2SJacky Bai #include <plat_imx8.h> 34179f82a2SJacky Bai 35ff3acfe3SJi Luo #define TRUSTY_PARAMS_LEN_BYTES (4096*2) 36ff3acfe3SJi Luo 375941f372SAndrey Zhizhikin /* 385941f372SAndrey Zhizhikin * Note: DRAM region is mapped with entire size available and uses MT_RW 395941f372SAndrey Zhizhikin * attributes. 405941f372SAndrey Zhizhikin * See details in docs/plat/imx8m.rst "High Assurance Boot (HABv4)" section 415941f372SAndrey Zhizhikin * for explanation of this mapping scheme. 425941f372SAndrey Zhizhikin */ 43179f82a2SJacky Bai static const mmap_region_t imx_mmap[] = { 44179f82a2SJacky Bai MAP_REGION_FLAT(IMX_GIC_BASE, IMX_GIC_SIZE, MT_DEVICE | MT_RW), 45179f82a2SJacky Bai MAP_REGION_FLAT(IMX_AIPS_BASE, IMX_AIPS_SIZE, MT_DEVICE | MT_RW), /* AIPS map */ 46b7abf485SJacky Bai MAP_REGION_FLAT(OCRAM_S_BASE, OCRAM_S_SIZE, MT_DEVICE | MT_RW), /* OCRAM_S */ 47b7abf485SJacky Bai MAP_REGION_FLAT(IMX_DDRPHY_BASE, IMX_DDR_IPS_SIZE, MT_DEVICE | MT_RW), /* DDRMIX */ 4844dea544SJacky Bai MAP_REGION_FLAT(IMX_VPUMIX_BASE, IMX_VPUMIX_SIZE, MT_DEVICE | MT_RW), /* VPUMIX */ 495941f372SAndrey Zhizhikin MAP_REGION_FLAT(IMX_CAAM_RAM_BASE, IMX_CAAM_RAM_SIZE, MT_MEMORY | MT_RW), /* CAMM RAM */ 505941f372SAndrey Zhizhikin MAP_REGION_FLAT(IMX_NS_OCRAM_BASE, IMX_NS_OCRAM_SIZE, MT_MEMORY | MT_RW), /* NS OCRAM */ 515941f372SAndrey Zhizhikin MAP_REGION_FLAT(IMX_ROM_BASE, IMX_ROM_SIZE, MT_MEMORY | MT_RO), /* ROM code */ 525941f372SAndrey Zhizhikin MAP_REGION_FLAT(IMX_DRAM_BASE, IMX_DRAM_SIZE, MT_MEMORY | MT_RW | MT_NS), /* DRAM */ 53179f82a2SJacky Bai {0}, 54179f82a2SJacky Bai }; 55179f82a2SJacky Bai 56ac166f64SJacky Bai static const struct aipstz_cfg aipstz[] = { 57ac166f64SJacky Bai {IMX_AIPSTZ1, 0x77777777, 0x77777777, .opacr = {0x0, 0x0, 0x0, 0x0, 0x0}, }, 58ac166f64SJacky Bai {IMX_AIPSTZ2, 0x77777777, 0x77777777, .opacr = {0x0, 0x0, 0x0, 0x0, 0x0}, }, 59ac166f64SJacky Bai {IMX_AIPSTZ3, 0x77777777, 0x77777777, .opacr = {0x0, 0x0, 0x0, 0x0, 0x0}, }, 60ac166f64SJacky Bai {IMX_AIPSTZ4, 0x77777777, 0x77777777, .opacr = {0x0, 0x0, 0x0, 0x0, 0x0}, }, 61ac166f64SJacky Bai {0}, 62ac166f64SJacky Bai }; 63ac166f64SJacky Bai 643d660799SJacky Bai static const struct imx_rdc_cfg rdc[] = { 653d660799SJacky Bai /* Master domain assignment */ 66d76f012eSJacky Bai RDC_MDAn(RDC_MDA_M4, DID1), 673d660799SJacky Bai 683d660799SJacky Bai /* peripherals domain permission */ 69d76f012eSJacky Bai RDC_PDAPn(RDC_PDAP_UART4, D1R | D1W), 70d76f012eSJacky Bai RDC_PDAPn(RDC_PDAP_UART2, D0R | D0W), 713d660799SJacky Bai 723d660799SJacky Bai /* memory region */ 733d660799SJacky Bai 743d660799SJacky Bai /* Sentinel */ 753d660799SJacky Bai {0}, 763d660799SJacky Bai }; 773d660799SJacky Bai 780a76495bSJacky Bai static const struct imx_csu_cfg csu_cfg[] = { 790a76495bSJacky Bai /* peripherals csl setting */ 800a76495bSJacky Bai CSU_CSLx(0x1, CSU_SEC_LEVEL_0, UNLOCKED), 810a76495bSJacky Bai 820a76495bSJacky Bai /* master HP0~1 */ 830a76495bSJacky Bai 840a76495bSJacky Bai /* SA setting */ 85*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_M4, NON_SEC_ACCESS, LOCKED), 86*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_SDMA1, NON_SEC_ACCESS, LOCKED), 87*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_PCIE_CTRL1, NON_SEC_ACCESS, LOCKED), 88*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_USB1, NON_SEC_ACCESS, LOCKED), 89*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_USB2, NON_SEC_ACCESS, LOCKED), 90*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_VPU, NON_SEC_ACCESS, LOCKED), 91*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_GPU, NON_SEC_ACCESS, LOCKED), 92*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_APBHDMA, NON_SEC_ACCESS, LOCKED), 93*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_ENET, NON_SEC_ACCESS, LOCKED), 94*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_USDHC1, NON_SEC_ACCESS, LOCKED), 95*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_USDHC2, NON_SEC_ACCESS, LOCKED), 96*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_USDHC3, NON_SEC_ACCESS, LOCKED), 97*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_HUGO, NON_SEC_ACCESS, LOCKED), 98*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_DAP, NON_SEC_ACCESS, LOCKED), 99*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_SDMA2, NON_SEC_ACCESS, LOCKED), 100*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_SDMA3, NON_SEC_ACCESS, LOCKED), 101*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_LCDIF, NON_SEC_ACCESS, LOCKED), 102*f4b11e59SStefan Kerkmann CSU_SA(CSU_SA_CSI, NON_SEC_ACCESS, LOCKED), 1030a76495bSJacky Bai 1040a76495bSJacky Bai /* HP control setting */ 1050a76495bSJacky Bai 1060a76495bSJacky Bai /* Sentinel */ 1070a76495bSJacky Bai {0} 1080a76495bSJacky Bai }; 1090a76495bSJacky Bai 110179f82a2SJacky Bai static entry_point_info_t bl32_image_ep_info; 111179f82a2SJacky Bai static entry_point_info_t bl33_image_ep_info; 112179f82a2SJacky Bai 113179f82a2SJacky Bai /* get SPSR for BL33 entry */ 114179f82a2SJacky Bai static uint32_t get_spsr_for_bl33_entry(void) 115179f82a2SJacky Bai { 116179f82a2SJacky Bai unsigned long el_status; 117179f82a2SJacky Bai unsigned long mode; 118179f82a2SJacky Bai uint32_t spsr; 119179f82a2SJacky Bai 120179f82a2SJacky Bai /* figure out what mode we enter the non-secure world */ 121179f82a2SJacky Bai el_status = read_id_aa64pfr0_el1() >> ID_AA64PFR0_EL2_SHIFT; 122179f82a2SJacky Bai el_status &= ID_AA64PFR0_ELX_MASK; 123179f82a2SJacky Bai 124179f82a2SJacky Bai mode = (el_status) ? MODE_EL2 : MODE_EL1; 125179f82a2SJacky Bai 126179f82a2SJacky Bai spsr = SPSR_64(mode, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS); 127179f82a2SJacky Bai return spsr; 128179f82a2SJacky Bai } 129179f82a2SJacky Bai 130179f82a2SJacky Bai void bl31_tzc380_setup(void) 131179f82a2SJacky Bai { 132179f82a2SJacky Bai unsigned int val; 133179f82a2SJacky Bai 134179f82a2SJacky Bai val = mmio_read_32(IMX_IOMUX_GPR_BASE + 0x28); 135179f82a2SJacky Bai if ((val & GPR_TZASC_EN) != GPR_TZASC_EN) 136179f82a2SJacky Bai return; 137179f82a2SJacky Bai 138179f82a2SJacky Bai tzc380_init(IMX_TZASC_BASE); 139179f82a2SJacky Bai 140179f82a2SJacky Bai /* 141179f82a2SJacky Bai * Need to substact offset 0x40000000 from CPU address when 142179f82a2SJacky Bai * programming tzasc region for i.mx8mm. 143179f82a2SJacky Bai */ 144179f82a2SJacky Bai 145179f82a2SJacky Bai /* Enable 1G-5G S/NS RW */ 146179f82a2SJacky Bai tzc380_configure_region(0, 0x00000000, TZC_ATTR_REGION_SIZE(TZC_REGION_SIZE_4G) | 147179f82a2SJacky Bai TZC_ATTR_REGION_EN_MASK | TZC_ATTR_SP_ALL); 148179f82a2SJacky Bai } 149179f82a2SJacky Bai 150179f82a2SJacky Bai void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, 151179f82a2SJacky Bai u_register_t arg2, u_register_t arg3) 152179f82a2SJacky Bai { 153101f0702SMarco Felsch unsigned int console_base = IMX_BOOT_UART_BASE; 154d7873bcdSAndre Przywara static console_t console; 155179f82a2SJacky Bai int i; 156179f82a2SJacky Bai 157179f82a2SJacky Bai /* Enable CSU NS access permission */ 158179f82a2SJacky Bai for (i = 0; i < 64; i++) { 159179f82a2SJacky Bai mmio_write_32(IMX_CSU_BASE + i * 4, 0x00ff00ff); 160179f82a2SJacky Bai } 161179f82a2SJacky Bai 162ac166f64SJacky Bai imx_aipstz_init(aipstz); 163179f82a2SJacky Bai 1643d660799SJacky Bai imx_rdc_init(rdc); 1653d660799SJacky Bai 1660a76495bSJacky Bai imx_csu_init(csu_cfg); 1670a76495bSJacky Bai 168df730d94SMarco Felsch if (console_base == 0U) { 169df730d94SMarco Felsch console_base = imx8m_uart_get_base(); 170df730d94SMarco Felsch } 171df730d94SMarco Felsch 172df730d94SMarco Felsch console_imx_uart_register(console_base, IMX_BOOT_UART_CLK_IN_HZ, 173179f82a2SJacky Bai IMX_CONSOLE_BAUDRATE, &console); 174179f82a2SJacky Bai /* This console is only used for boot stage */ 175d7873bcdSAndre Przywara console_set_scope(&console, CONSOLE_FLAG_BOOT); 176179f82a2SJacky Bai 177901d74b2SAndrey Zhizhikin imx8m_caam_init(); 178901d74b2SAndrey Zhizhikin 179179f82a2SJacky Bai /* 180179f82a2SJacky Bai * tell BL3-1 where the non-secure software image is located 181179f82a2SJacky Bai * and the entry state information. 182179f82a2SJacky Bai */ 183179f82a2SJacky Bai bl33_image_ep_info.pc = PLAT_NS_IMAGE_OFFSET; 184179f82a2SJacky Bai bl33_image_ep_info.spsr = get_spsr_for_bl33_entry(); 185179f82a2SJacky Bai SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE); 186179f82a2SJacky Bai 187ff3acfe3SJi Luo #if defined(SPD_opteed) || defined(SPD_trusty) 188abb6fee6SJacky Bai /* Populate entry point information for BL32 */ 189abb6fee6SJacky Bai SET_PARAM_HEAD(&bl32_image_ep_info, PARAM_EP, VERSION_1, 0); 190abb6fee6SJacky Bai SET_SECURITY_STATE(bl32_image_ep_info.h.attr, SECURE); 191abb6fee6SJacky Bai bl32_image_ep_info.pc = BL32_BASE; 192abb6fee6SJacky Bai bl32_image_ep_info.spsr = 0; 193abb6fee6SJacky Bai 194abb6fee6SJacky Bai /* Pass TEE base and size to bl33 */ 195abb6fee6SJacky Bai bl33_image_ep_info.args.arg1 = BL32_BASE; 196abb6fee6SJacky Bai bl33_image_ep_info.args.arg2 = BL32_SIZE; 1979d0eed11SSilvano di Ninno 1989d0eed11SSilvano di Ninno #ifdef SPD_trusty 1999d0eed11SSilvano di Ninno bl32_image_ep_info.args.arg0 = BL32_SIZE; 2009d0eed11SSilvano di Ninno bl32_image_ep_info.args.arg1 = BL32_BASE; 2019d0eed11SSilvano di Ninno #else 2029d0eed11SSilvano di Ninno /* Make sure memory is clean */ 2039d0eed11SSilvano di Ninno mmio_write_32(BL32_FDT_OVERLAY_ADDR, 0); 2049d0eed11SSilvano di Ninno bl33_image_ep_info.args.arg3 = BL32_FDT_OVERLAY_ADDR; 2059d0eed11SSilvano di Ninno bl32_image_ep_info.args.arg3 = BL32_FDT_OVERLAY_ADDR; 2069d0eed11SSilvano di Ninno #endif 207abb6fee6SJacky Bai #endif 208abb6fee6SJacky Bai 2098d150c95SMarco Felsch #if !defined(SPD_opteed) && !defined(SPD_trusty) 2108d150c95SMarco Felsch enable_snvs_privileged_access(); 2118d150c95SMarco Felsch #endif 2128d150c95SMarco Felsch 213179f82a2SJacky Bai bl31_tzc380_setup(); 214179f82a2SJacky Bai } 215179f82a2SJacky Bai 216686a5bc8SMarco Felsch #define MAP_BL31_TOTAL \ 217a8e6a2c8SMarco Felsch MAP_REGION_FLAT(BL31_START, BL31_SIZE, MT_MEMORY | MT_RW | MT_SECURE) 218686a5bc8SMarco Felsch #define MAP_BL31_RO \ 219686a5bc8SMarco Felsch MAP_REGION_FLAT(BL_CODE_BASE, BL_CODE_END - BL_CODE_BASE, MT_MEMORY | MT_RO | MT_SECURE) 220686a5bc8SMarco Felsch #define MAP_COHERENT_MEM \ 221686a5bc8SMarco Felsch MAP_REGION_FLAT(BL_COHERENT_RAM_BASE, BL_COHERENT_RAM_END - BL_COHERENT_RAM_BASE, \ 222686a5bc8SMarco Felsch MT_DEVICE | MT_RW | MT_SECURE) 223686a5bc8SMarco Felsch #define MAP_BL32_TOTAL \ 224686a5bc8SMarco Felsch MAP_REGION_FLAT(BL32_BASE, BL32_SIZE, MT_MEMORY | MT_RW) 225686a5bc8SMarco Felsch 226179f82a2SJacky Bai void bl31_plat_arch_setup(void) 227179f82a2SJacky Bai { 228686a5bc8SMarco Felsch const mmap_region_t bl_regions[] = { 229686a5bc8SMarco Felsch MAP_BL31_TOTAL, 230686a5bc8SMarco Felsch MAP_BL31_RO, 231179f82a2SJacky Bai #if USE_COHERENT_MEM 232686a5bc8SMarco Felsch MAP_COHERENT_MEM, 233179f82a2SJacky Bai #endif 2344827613cSMarco Felsch #if defined(SPD_opteed) || defined(SPD_trusty) 235ff3acfe3SJi Luo /* Map TEE memory */ 236686a5bc8SMarco Felsch MAP_BL32_TOTAL, 2374827613cSMarco Felsch #endif 238686a5bc8SMarco Felsch {0} 239686a5bc8SMarco Felsch }; 240ff3acfe3SJi Luo 2410b727248SMarco Felsch setup_page_tables(bl_regions, imx_mmap); 242179f82a2SJacky Bai enable_mmu_el3(0); 243179f82a2SJacky Bai } 244179f82a2SJacky Bai 245179f82a2SJacky Bai void bl31_platform_setup(void) 246179f82a2SJacky Bai { 247179f82a2SJacky Bai generic_delay_timer_init(); 248179f82a2SJacky Bai 249179f82a2SJacky Bai /* select the CKIL source to 32K OSC */ 250179f82a2SJacky Bai mmio_write_32(IMX_ANAMIX_BASE + ANAMIX_MISC_CTL, 0x1); 251179f82a2SJacky Bai 252b7abf485SJacky Bai /* Init the dram info */ 253b7abf485SJacky Bai dram_info_init(SAVED_DRAM_TIMING_BASE); 254b7abf485SJacky Bai 255179f82a2SJacky Bai plat_gic_driver_init(); 256179f82a2SJacky Bai plat_gic_init(); 257179f82a2SJacky Bai 258179f82a2SJacky Bai imx_gpc_init(); 259179f82a2SJacky Bai } 260179f82a2SJacky Bai 261179f82a2SJacky Bai entry_point_info_t *bl31_plat_get_next_image_ep_info(unsigned int type) 262179f82a2SJacky Bai { 263179f82a2SJacky Bai if (type == NON_SECURE) 264179f82a2SJacky Bai return &bl33_image_ep_info; 265179f82a2SJacky Bai if (type == SECURE) 266179f82a2SJacky Bai return &bl32_image_ep_info; 267179f82a2SJacky Bai 268179f82a2SJacky Bai return NULL; 269179f82a2SJacky Bai } 270179f82a2SJacky Bai 271179f82a2SJacky Bai unsigned int plat_get_syscnt_freq2(void) 272179f82a2SJacky Bai { 273179f82a2SJacky Bai return COUNTER_FREQUENCY; 274179f82a2SJacky Bai } 275ff3acfe3SJi Luo 276ff3acfe3SJi Luo #ifdef SPD_trusty 277ff3acfe3SJi Luo void plat_trusty_set_boot_args(aapcs64_params_t *args) 278ff3acfe3SJi Luo { 279ff3acfe3SJi Luo args->arg0 = BL32_SIZE; 280ff3acfe3SJi Luo args->arg1 = BL32_BASE; 281ff3acfe3SJi Luo args->arg2 = TRUSTY_PARAMS_LEN_BYTES; 282ff3acfe3SJi Luo } 283ff3acfe3SJi Luo #endif 284