xref: /rk3399_ARM-atf/plat/nvidia/tegra/common/tegra_bl31_setup.c (revision a10d3632acbd1135648f07c2a998cba8c5c77cfd)
1 /*
2  * Copyright (c) 2015-2016, ARM Limited and Contributors. All rights reserved.
3  *
4  * Redistribution and use in source and binary forms, with or without
5  * modification, are permitted provided that the following conditions are met:
6  *
7  * Redistributions of source code must retain the above copyright notice, this
8  * list of conditions and the following disclaimer.
9  *
10  * Redistributions in binary form must reproduce the above copyright notice,
11  * this list of conditions and the following disclaimer in the documentation
12  * and/or other materials provided with the distribution.
13  *
14  * Neither the name of ARM nor the names of its contributors may be used
15  * to endorse or promote products derived from this software without specific
16  * prior written permission.
17  *
18  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28  * POSSIBILITY OF SUCH DAMAGE.
29  */
30 
31 #include <arch.h>
32 #include <arch_helpers.h>
33 #include <assert.h>
34 #include <bl31.h>
35 #include <bl_common.h>
36 #include <console.h>
37 #include <cortex_a57.h>
38 #include <cortex_a53.h>
39 #include <debug.h>
40 #include <denver.h>
41 #include <errno.h>
42 #include <memctrl.h>
43 #include <mmio.h>
44 #include <platform.h>
45 #include <platform_def.h>
46 #include <stddef.h>
47 #include <tegra_def.h>
48 #include <tegra_private.h>
49 
50 /*******************************************************************************
51  * Declarations of linker defined symbols which will help us find the layout
52  * of trusted SRAM
53  ******************************************************************************/
54 extern unsigned long __RO_START__;
55 extern unsigned long __RO_END__;
56 extern unsigned long __BL31_END__;
57 
58 extern uint64_t tegra_bl31_phys_base;
59 extern uint64_t tegra_console_base;
60 
61 /*
62  * The next 3 constants identify the extents of the code, RO data region and the
63  * limit of the BL3-1 image.  These addresses are used by the MMU setup code and
64  * therefore they must be page-aligned.  It is the responsibility of the linker
65  * script to ensure that __RO_START__, __RO_END__ & __BL31_END__ linker symbols
66  * refer to page-aligned addresses.
67  */
68 #define BL31_RO_BASE (unsigned long)(&__RO_START__)
69 #define BL31_RO_LIMIT (unsigned long)(&__RO_END__)
70 #define BL31_END (unsigned long)(&__BL31_END__)
71 
72 static entry_point_info_t bl33_image_ep_info, bl32_image_ep_info;
73 static plat_params_from_bl2_t plat_bl31_params_from_bl2 = {
74 	.tzdram_size = (uint64_t)TZDRAM_SIZE
75 };
76 
77 /*******************************************************************************
78  * This variable holds the non-secure image entry address
79  ******************************************************************************/
80 extern uint64_t ns_image_entrypoint;
81 
82 /*******************************************************************************
83  * Return a pointer to the 'entry_point_info' structure of the next image for
84  * security state specified. BL33 corresponds to the non-secure image type
85  * while BL32 corresponds to the secure image type.
86  ******************************************************************************/
87 entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
88 {
89 	if (type == NON_SECURE)
90 		return &bl33_image_ep_info;
91 
92 	if (type == SECURE)
93 		return &bl32_image_ep_info;
94 
95 	return NULL;
96 }
97 
98 /*******************************************************************************
99  * Return a pointer to the 'plat_params_from_bl2_t' structure. The BL2 image
100  * passes this platform specific information.
101  ******************************************************************************/
102 plat_params_from_bl2_t *bl31_get_plat_params(void)
103 {
104 	return &plat_bl31_params_from_bl2;
105 }
106 
107 /*******************************************************************************
108  * Perform any BL31 specific platform actions. Populate the BL33 and BL32 image
109  * info.
110  ******************************************************************************/
111 void bl31_early_platform_setup(bl31_params_t *from_bl2,
112 				void *plat_params_from_bl2)
113 {
114 	plat_params_from_bl2_t *plat_params =
115 		(plat_params_from_bl2_t *)plat_params_from_bl2;
116 #if DEBUG
117 	int impl = (read_midr() >> MIDR_IMPL_SHIFT) & MIDR_IMPL_MASK;
118 #endif
119 
120 	/*
121 	 * Copy BL3-3, BL3-2 entry point information.
122 	 * They are stored in Secure RAM, in BL2's address space.
123 	 */
124 	assert(from_bl2->bl33_ep_info);
125 	bl33_image_ep_info = *from_bl2->bl33_ep_info;
126 
127 	if (from_bl2->bl32_ep_info)
128 		bl32_image_ep_info = *from_bl2->bl32_ep_info;
129 
130 	/*
131 	 * Parse platform specific parameters - TZDRAM aperture base and size
132 	 */
133 	assert(plat_params);
134 	plat_bl31_params_from_bl2.tzdram_base = plat_params->tzdram_base;
135 	plat_bl31_params_from_bl2.tzdram_size = plat_params->tzdram_size;
136 	plat_bl31_params_from_bl2.uart_id = plat_params->uart_id;
137 
138 	/*
139 	 * Get the base address of the UART controller to be used for the
140 	 * console
141 	 */
142 	assert(plat_params->uart_id);
143 	tegra_console_base = plat_get_console_from_id(plat_params->uart_id);
144 
145 	/*
146 	 * Configure the UART port to be used as the console
147 	 */
148 	assert(tegra_console_base);
149 	console_init(tegra_console_base, TEGRA_BOOT_UART_CLK_IN_HZ,
150 		TEGRA_CONSOLE_BAUDRATE);
151 
152 	/* Initialise crash console */
153 	plat_crash_console_init();
154 
155 	INFO("BL3-1: Boot CPU: %s Processor [%lx]\n", (impl == DENVER_IMPL) ?
156 		"Denver" : "ARM", read_mpidr());
157 }
158 
159 /*******************************************************************************
160  * Initialize the gic, configure the SCR.
161  ******************************************************************************/
162 void bl31_platform_setup(void)
163 {
164 	uint32_t tmp_reg;
165 
166 	/*
167 	 * Initialize delay timer
168 	 */
169 	tegra_delay_timer_init();
170 
171 	/*
172 	 * Setup secondary CPU POR infrastructure.
173 	 */
174 	plat_secondary_setup();
175 
176 	/*
177 	 * Initial Memory Controller configuration.
178 	 */
179 	tegra_memctrl_setup();
180 
181 	/*
182 	 * Do initial security configuration to allow DRAM/device access.
183 	 */
184 	tegra_memctrl_tzdram_setup(plat_bl31_params_from_bl2.tzdram_base,
185 			plat_bl31_params_from_bl2.tzdram_size);
186 
187 	/*
188 	 * Set up the TZRAM memory aperture to allow only secure world
189 	 * access
190 	 */
191 	tegra_memctrl_tzram_setup(TEGRA_TZRAM_BASE, TEGRA_TZRAM_SIZE);
192 
193 	/* Set the next EL to be AArch64 */
194 	tmp_reg = SCR_RES1_BITS | SCR_RW_BIT;
195 	write_scr(tmp_reg);
196 
197 	/* Initialize the gic cpu and distributor interfaces */
198 	tegra_gic_setup();
199 
200 	INFO("BL3-1: Tegra platform setup complete\n");
201 }
202 
203 /*******************************************************************************
204  * Perform any BL3-1 platform runtime setup prior to BL3-1 cold boot exit
205  ******************************************************************************/
206 void bl31_plat_runtime_setup(void)
207 {
208 	/* Initialize the runtime console */
209 	console_init(tegra_console_base, TEGRA_BOOT_UART_CLK_IN_HZ,
210 		TEGRA_CONSOLE_BAUDRATE);
211 }
212 
213 /*******************************************************************************
214  * Perform the very early platform specific architectural setup here. At the
215  * moment this only intializes the mmu in a quick and dirty way.
216  ******************************************************************************/
217 void bl31_plat_arch_setup(void)
218 {
219 	unsigned long bl31_base_pa = tegra_bl31_phys_base;
220 	unsigned long total_base = bl31_base_pa;
221 	unsigned long total_size = BL32_BASE - BL31_RO_BASE;
222 	unsigned long ro_start = bl31_base_pa;
223 	unsigned long ro_size = BL31_RO_LIMIT - BL31_RO_BASE;
224 	const mmap_region_t *plat_mmio_map = NULL;
225 #if USE_COHERENT_MEM
226 	unsigned long coh_start, coh_size;
227 #endif
228 	plat_params_from_bl2_t *params_from_bl2 = bl31_get_plat_params();
229 
230 	/* add memory regions */
231 	mmap_add_region(total_base, total_base,
232 			total_size,
233 			MT_MEMORY | MT_RW | MT_SECURE);
234 	mmap_add_region(ro_start, ro_start,
235 			ro_size,
236 			MT_MEMORY | MT_RO | MT_SECURE);
237 
238 	/* map TZDRAM used by BL31 as coherent memory */
239 	if (TEGRA_TZRAM_BASE == tegra_bl31_phys_base) {
240 		mmap_add_region(params_from_bl2->tzdram_base,
241 				params_from_bl2->tzdram_base,
242 				BL31_SIZE,
243 				MT_DEVICE | MT_RW | MT_SECURE);
244 	}
245 
246 #if USE_COHERENT_MEM
247 	coh_start = total_base + (BL_COHERENT_RAM_BASE - BL31_RO_BASE);
248 	coh_size = BL_COHERENT_RAM_END - BL_COHERENT_RAM_BASE;
249 
250 	mmap_add_region(coh_start, coh_start,
251 			coh_size,
252 			MT_DEVICE | MT_RW | MT_SECURE);
253 #endif
254 
255 	/* add MMIO space */
256 	plat_mmio_map = plat_get_mmio_map();
257 	if (plat_mmio_map)
258 		mmap_add(plat_mmio_map);
259 	else
260 		WARN("MMIO map not available\n");
261 
262 	/* set up translation tables */
263 	init_xlat_tables();
264 
265 	/* enable the MMU */
266 	enable_mmu_el3(0);
267 
268 	INFO("BL3-1: Tegra: MMU enabled\n");
269 }
270 
271 /*******************************************************************************
272  * Check if the given NS DRAM range is valid
273  ******************************************************************************/
274 int bl31_check_ns_address(uint64_t base, uint64_t size_in_bytes)
275 {
276 	uint64_t end = base + size_in_bytes - 1;
277 
278 	/*
279 	 * Check if the NS DRAM address is valid
280 	 */
281 	if ((base < TEGRA_DRAM_BASE) || (end > TEGRA_DRAM_END) ||
282 	    (base >= end)) {
283 		ERROR("NS address is out-of-bounds!\n");
284 		return -EFAULT;
285 	}
286 
287 	/*
288 	 * TZDRAM aperture contains the BL31 and BL32 images, so we need
289 	 * to check if the NS DRAM range overlaps the TZDRAM aperture.
290 	 */
291 	if ((base < TZDRAM_END) && (end > tegra_bl31_phys_base)) {
292 		ERROR("NS address overlaps TZDRAM!\n");
293 		return -ENOTSUP;
294 	}
295 
296 	/* valid NS address */
297 	return 0;
298 }
299