| /* |
| * Copyright (c) 2017-2023, Arm Limited and Contributors. All rights reserved. |
| * |
| * SPDX-License-Identifier: BSD-3-Clause |
| */ |
| |
| #include <assert.h> |
| #include <errno.h> |
| |
| #include <platform_def.h> |
| |
| #include <arch_helpers.h> |
| #include <bl31/interrupt_mgmt.h> |
| #include <common/bl_common.h> |
| #include <common/debug.h> |
| #include <common/interrupt_props.h> |
| #include <drivers/arm/cci.h> |
| #include <drivers/arm/gicv2.h> |
| #include <drivers/arm/pl011.h> |
| #include <drivers/console.h> |
| #include <drivers/generic_delay_timer.h> |
| #include <lib/mmio.h> |
| #include <lib/xlat_tables/xlat_tables_v2.h> |
| #include <plat/common/platform.h> |
| #include <services/el3_spmc_ffa_memory.h> |
| |
| #include <hi3660.h> |
| #include <hisi_ipc.h> |
| #include "hikey960_def.h" |
| #include "hikey960_private.h" |
| |
| static entry_point_info_t bl32_ep_info; |
| static entry_point_info_t bl33_ep_info; |
| static console_t console; |
| |
| /* fastboot serial number consumed by Kinibi SPD/LP for gpd.tee.deviceID. */ |
| uint64_t fastboot_serno; |
| |
| /****************************************************************************** |
| * On a GICv2 system, the Group 1 secure interrupts are treated as Group 0 |
| * interrupts. |
| *****************************************************************************/ |
| static const interrupt_prop_t g0_interrupt_props[] = { |
| INTR_PROP_DESC(IRQ_SEC_PHY_TIMER, GIC_HIGHEST_SEC_PRIORITY, |
| GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), |
| INTR_PROP_DESC(IRQ_SEC_SGI_0, GIC_HIGHEST_SEC_PRIORITY, |
| GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), |
| }; |
| |
| const gicv2_driver_data_t hikey960_gic_data = { |
| .gicd_base = GICD_REG_BASE, |
| .gicc_base = GICC_REG_BASE, |
| .interrupt_props = g0_interrupt_props, |
| .interrupt_props_num = ARRAY_SIZE(g0_interrupt_props), |
| }; |
| |
| static const int cci_map[] = { |
| CCI400_SL_IFACE3_CLUSTER_IX, |
| CCI400_SL_IFACE4_CLUSTER_IX |
| }; |
| |
| entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type) |
| { |
| entry_point_info_t *next_image_info; |
| |
| next_image_info = (type == NON_SECURE) ? &bl33_ep_info : &bl32_ep_info; |
| |
| /* None of the images on this platform can have 0x0 as the entrypoint */ |
| if (next_image_info->pc) |
| return next_image_info; |
| return NULL; |
| } |
| |
| void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, |
| u_register_t arg2, u_register_t arg3) |
| { |
| unsigned int id, uart_base; |
| void *from_bl2; |
| plat_params_from_bl2_t *plat_params_from_bl2 = (plat_params_from_bl2_t *) arg1; |
| |
| from_bl2 = (void *) arg0; |
| |
| generic_delay_timer_init(); |
| hikey960_read_boardid(&id); |
| if (id == 5300) |
| uart_base = PL011_UART5_BASE; |
| else |
| uart_base = PL011_UART6_BASE; |
| |
| /* Initialize the console to provide early debug support */ |
| console_pl011_register(uart_base, PL011_UART_CLK_IN_HZ, |
| PL011_BAUDRATE, &console); |
| |
| /* Initialize CCI driver */ |
| cci_init(CCI400_REG_BASE, cci_map, ARRAY_SIZE(cci_map)); |
| cci_enable_snoop_dvm_reqs(MPIDR_AFFLVL1_VAL(read_mpidr_el1())); |
| |
| /* Fastboot serial number passed from BL2 as a platform parameter */ |
| fastboot_serno = plat_params_from_bl2->fastboot_serno; |
| INFO("BL31: fastboot_serno %lx\n", fastboot_serno); |
| |
| /* |
| * Check params passed from BL2 should not be NULL, |
| */ |
| bl_params_t *params_from_bl2 = (bl_params_t *)from_bl2; |
| assert(params_from_bl2 != NULL); |
| assert(params_from_bl2->h.type == PARAM_BL_PARAMS); |
| assert(params_from_bl2->h.version >= VERSION_2); |
| |
| bl_params_node_t *bl_params = params_from_bl2->head; |
| |
| /* |
| * Copy BL33 and BL32 (if present), entry point information. |
| * They are stored in Secure RAM, in BL2's address space. |
| */ |
| while (bl_params) { |
| if (bl_params->image_id == BL32_IMAGE_ID) |
| bl32_ep_info = *bl_params->ep_info; |
| |
| if (bl_params->image_id == BL33_IMAGE_ID) |
| bl33_ep_info = *bl_params->ep_info; |
| |
| bl_params = bl_params->next_params_info; |
| } |
| |
| if (bl33_ep_info.pc == 0) |
| panic(); |
| } |
| |
| void bl31_plat_arch_setup(void) |
| { |
| #if SPMC_AT_EL3 |
| mmap_add_region(DDR2_SEC_BASE, DDR2_SEC_BASE, DDR2_SEC_SIZE, |
| MT_MEMORY | MT_RW | MT_SECURE); |
| #endif |
| |
| hikey960_init_mmu_el3(BL31_BASE, |
| BL31_LIMIT - BL31_BASE, |
| BL_CODE_BASE, |
| BL_CODE_END, |
| BL_COHERENT_RAM_BASE, |
| BL_COHERENT_RAM_END); |
| } |
| |
| static void hikey960_edma_init(void) |
| { |
| int i; |
| uint32_t non_secure; |
| |
| non_secure = EDMAC_SEC_CTRL_INTR_SEC | EDMAC_SEC_CTRL_GLOBAL_SEC; |
| mmio_write_32(EDMAC_SEC_CTRL, non_secure); |
| |
| /* Channel 0 is reserved for LPM3, keep secure */ |
| for (i = 1; i < EDMAC_CHANNEL_NUMS; i++) { |
| mmio_write_32(EDMAC_AXI_CONF(i), (1 << 6) | (1 << 18)); |
| } |
| } |
| |
| static void hikey960_iomcu_dma_init(void) |
| { |
| int i; |
| uint32_t non_secure; |
| |
| non_secure = IOMCU_DMAC_SEC_CTRL_INTR_SEC | IOMCU_DMAC_SEC_CTRL_GLOBAL_SEC; |
| mmio_write_32(IOMCU_DMAC_SEC_CTRL, non_secure); |
| |
| /* channels 0-3 are reserved */ |
| for (i = 4; i < IOMCU_DMAC_CHANNEL_NUMS; i++) { |
| mmio_write_32(IOMCU_DMAC_AXI_CONF(i), IOMCU_DMAC_AXI_CONF_ARPROT_NS | |
| IOMCU_DMAC_AXI_CONF_AWPROT_NS); |
| } |
| } |
| |
| #if SPMC_AT_EL3 |
| /* |
| * On the hikey960 platform when using the EL3 SPMC implementation allocate the |
| * datastore for tracking shared memory descriptors in the RAM2 DRAM section |
| * to ensure sufficient storage can be allocated. |
| * Provide an implementation of the accessor method to allow the datastore |
| * details to be retrieved by the SPMC. |
| * The SPMC will take care of initializing the memory region. |
| */ |
| |
| #define SPMC_SHARED_MEMORY_OBJ_SIZE (512 * 1024) |
| |
| __section(".ram2_region") uint8_t plat_spmc_shmem_datastore[SPMC_SHARED_MEMORY_OBJ_SIZE]; |
| |
| int plat_spmc_shmem_datastore_get(uint8_t **datastore, size_t *size) |
| { |
| *datastore = plat_spmc_shmem_datastore; |
| *size = SPMC_SHARED_MEMORY_OBJ_SIZE; |
| return 0; |
| } |
| |
| /* |
| * Add dummy implementations of memory management related platform hooks. |
| * These can be used to implement platform specific functionality to support |
| * a memory sharing/lending operation. |
| * |
| * Note: The hooks must be located as part of the initial share request and |
| * final reclaim to prevent order dependencies with operations that may take |
| * place in the normal world without visibility of the SPMC. |
| */ |
| int plat_spmc_shmem_begin(struct ffa_mtd *desc) |
| { |
| return 0; |
| } |
| |
| int plat_spmc_shmem_reclaim(struct ffa_mtd *desc) |
| { |
| return 0; |
| } |
| |
| #endif |
| |
| void bl31_platform_setup(void) |
| { |
| /* Initialize the GIC driver, cpu and distributor interfaces */ |
| gicv2_driver_init(&hikey960_gic_data); |
| gicv2_distif_init(); |
| gicv2_pcpu_distif_init(); |
| gicv2_cpuif_enable(); |
| |
| hikey960_edma_init(); |
| hikey960_iomcu_dma_init(); |
| hikey960_gpio_init(); |
| |
| hisi_ipc_init(); |
| } |
| |
| #ifdef SPD_none |
| static uint64_t hikey_debug_fiq_handler(uint32_t id, |
| uint32_t flags, |
| void *handle, |
| void *cookie) |
| { |
| int intr, intr_raw; |
| |
| /* Acknowledge interrupt */ |
| intr_raw = plat_ic_acknowledge_interrupt(); |
| intr = plat_ic_get_interrupt_id(intr_raw); |
| ERROR("Invalid interrupt: intr=%d\n", intr); |
| console_flush(); |
| panic(); |
| |
| return 0; |
| } |
| #elif defined(SPD_spmd) && (SPMD_SPM_AT_SEL2 == 1) |
| /* |
| * A dummy implementation of the platform handler for Group0 secure interrupt. |
| */ |
| int plat_spmd_handle_group0_interrupt(uint32_t intid) |
| { |
| (void)intid; |
| return -1; |
| } |
| #endif |
| |
| void bl31_plat_runtime_setup(void) |
| { |
| #ifdef SPD_none |
| uint32_t flags; |
| int32_t rc; |
| |
| flags = 0; |
| set_interrupt_rm_flag(flags, NON_SECURE); |
| rc = register_interrupt_type_handler(INTR_TYPE_S_EL1, |
| hikey_debug_fiq_handler, |
| flags); |
| if (rc != 0) |
| panic(); |
| #endif |
| } |