blob: d1519147409bceea75d1295cd35063297aaf3c56 [file] [log] [blame]
Masahiro Yamada574388c2016-09-03 11:37:40 +09001/*
Masahiro Yamadae44b8c62020-01-17 13:46:02 +09002 * Copyright (c) 2017-2020, ARM Limited and Contributors. All rights reserved.
Masahiro Yamada574388c2016-09-03 11:37:40 +09003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <assert.h>
8#include <errno.h>
Antonio Nino Diaz4b32e622018-08-16 16:52:57 +01009#include <stdint.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000010
11#include <platform_def.h>
12
13#include <drivers/io/io_block.h>
14#include <drivers/io/io_driver.h>
15#include <drivers/io/io_fip.h>
16#include <drivers/io/io_memmap.h>
17#include <lib/utils_def.h>
18#include <lib/xlat_tables/xlat_tables_v2.h>
19#include <tools_share/firmware_image_package.h>
Masahiro Yamada574388c2016-09-03 11:37:40 +090020
21#include "uniphier.h"
22
Masahiro Yamadadb72b0c2018-02-02 15:55:13 +090023#define UNIPHIER_ROM_REGION_BASE 0x00000000ULL
24#define UNIPHIER_ROM_REGION_SIZE 0x10000000ULL
Masahiro Yamada574388c2016-09-03 11:37:40 +090025
Masahiro Yamadadb72b0c2018-02-02 15:55:13 +090026#define UNIPHIER_OCM_REGION_BASE 0x30000000ULL
27#define UNIPHIER_OCM_REGION_SIZE 0x00040000ULL
Masahiro Yamada8f642922018-01-30 19:30:39 +090028
Masahiro Yamada229e2112020-01-17 13:46:13 +090029#define UNIPHIER_BLOCK_BUF_BASE 0x84200000UL
30#define UNIPHIER_BLOCK_BUF_SIZE 0x00100000UL
31
Masahiro Yamada574388c2016-09-03 11:37:40 +090032static const io_dev_connector_t *uniphier_fip_dev_con;
33static uintptr_t uniphier_fip_dev_handle;
34
35static const io_dev_connector_t *uniphier_backend_dev_con;
36static uintptr_t uniphier_backend_dev_handle;
37
38static io_block_spec_t uniphier_fip_spec = {
39 /* .offset will be set by the io_setup func */
40 .length = 0x00200000,
41};
42
43static const io_uuid_spec_t uniphier_bl2_spec = {
44 .uuid = UUID_TRUSTED_BOOT_FIRMWARE_BL2,
45};
46
47static const io_uuid_spec_t uniphier_scp_spec = {
48 .uuid = UUID_SCP_FIRMWARE_SCP_BL2,
49};
50
51static const io_uuid_spec_t uniphier_bl31_spec = {
52 .uuid = UUID_EL3_RUNTIME_FIRMWARE_BL31,
53};
54
55static const io_uuid_spec_t uniphier_bl32_spec = {
56 .uuid = UUID_SECURE_PAYLOAD_BL32,
57};
58
59static const io_uuid_spec_t uniphier_bl33_spec = {
60 .uuid = UUID_NON_TRUSTED_FIRMWARE_BL33,
61};
62
63#if TRUSTED_BOARD_BOOT
64static const io_uuid_spec_t uniphier_tb_fw_cert_spec = {
65 .uuid = UUID_TRUSTED_BOOT_FW_CERT,
66};
67
68static const io_uuid_spec_t uniphier_trusted_key_cert_spec = {
69 .uuid = UUID_TRUSTED_KEY_CERT,
70};
71
72static const io_uuid_spec_t uniphier_scp_fw_key_cert_spec = {
73 .uuid = UUID_SCP_FW_KEY_CERT,
74};
75
76static const io_uuid_spec_t uniphier_soc_fw_key_cert_spec = {
77 .uuid = UUID_SOC_FW_KEY_CERT,
78};
79
80static const io_uuid_spec_t uniphier_tos_fw_key_cert_spec = {
81 .uuid = UUID_TRUSTED_OS_FW_KEY_CERT,
82};
83
84static const io_uuid_spec_t uniphier_nt_fw_key_cert_spec = {
85 .uuid = UUID_NON_TRUSTED_FW_KEY_CERT,
86};
87
88static const io_uuid_spec_t uniphier_scp_fw_cert_spec = {
89 .uuid = UUID_SCP_FW_CONTENT_CERT,
90};
91
92static const io_uuid_spec_t uniphier_soc_fw_cert_spec = {
93 .uuid = UUID_SOC_FW_CONTENT_CERT,
94};
95
96static const io_uuid_spec_t uniphier_tos_fw_cert_spec = {
97 .uuid = UUID_TRUSTED_OS_FW_CONTENT_CERT,
98};
99
100static const io_uuid_spec_t uniphier_nt_fw_cert_spec = {
101 .uuid = UUID_NON_TRUSTED_FW_CONTENT_CERT,
102};
103#endif /* TRUSTED_BOARD_BOOT */
104
105struct uniphier_io_policy {
106 uintptr_t *dev_handle;
107 uintptr_t image_spec;
108 uintptr_t init_params;
109};
110
111static const struct uniphier_io_policy uniphier_io_policies[] = {
112 [FIP_IMAGE_ID] = {
113 .dev_handle = &uniphier_backend_dev_handle,
114 .image_spec = (uintptr_t)&uniphier_fip_spec,
115 },
116 [BL2_IMAGE_ID] = {
117 .dev_handle = &uniphier_fip_dev_handle,
118 .image_spec = (uintptr_t)&uniphier_bl2_spec,
119 .init_params = FIP_IMAGE_ID,
120 },
121 [SCP_BL2_IMAGE_ID] = {
122 .dev_handle = &uniphier_fip_dev_handle,
123 .image_spec = (uintptr_t)&uniphier_scp_spec,
124 .init_params = FIP_IMAGE_ID,
125 },
126 [BL31_IMAGE_ID] = {
127 .dev_handle = &uniphier_fip_dev_handle,
128 .image_spec = (uintptr_t)&uniphier_bl31_spec,
129 .init_params = FIP_IMAGE_ID,
130 },
131 [BL32_IMAGE_ID] = {
132 .dev_handle = &uniphier_fip_dev_handle,
133 .image_spec = (uintptr_t)&uniphier_bl32_spec,
134 .init_params = FIP_IMAGE_ID,
135 },
136 [BL33_IMAGE_ID] = {
137 .dev_handle = &uniphier_fip_dev_handle,
138 .image_spec = (uintptr_t)&uniphier_bl33_spec,
139 .init_params = FIP_IMAGE_ID,
140 },
141#if TRUSTED_BOARD_BOOT
142 [TRUSTED_BOOT_FW_CERT_ID] = {
143 .dev_handle = &uniphier_fip_dev_handle,
144 .image_spec = (uintptr_t)&uniphier_tb_fw_cert_spec,
145 .init_params = FIP_IMAGE_ID,
146 },
147 [TRUSTED_KEY_CERT_ID] = {
148 .dev_handle = &uniphier_fip_dev_handle,
149 .image_spec = (uintptr_t)&uniphier_trusted_key_cert_spec,
150 .init_params = FIP_IMAGE_ID,
151 },
152 [SCP_FW_KEY_CERT_ID] = {
153 .dev_handle = &uniphier_fip_dev_handle,
154 .image_spec = (uintptr_t)&uniphier_scp_fw_key_cert_spec,
155 .init_params = FIP_IMAGE_ID,
156 },
157 [SOC_FW_KEY_CERT_ID] = {
158 .dev_handle = &uniphier_fip_dev_handle,
159 .image_spec = (uintptr_t)&uniphier_soc_fw_key_cert_spec,
160 .init_params = FIP_IMAGE_ID,
161 },
162 [TRUSTED_OS_FW_KEY_CERT_ID] = {
163 .dev_handle = &uniphier_fip_dev_handle,
164 .image_spec = (uintptr_t)&uniphier_tos_fw_key_cert_spec,
165 .init_params = FIP_IMAGE_ID,
166 },
167 [NON_TRUSTED_FW_KEY_CERT_ID] = {
168 .dev_handle = &uniphier_fip_dev_handle,
169 .image_spec = (uintptr_t)&uniphier_nt_fw_key_cert_spec,
170 .init_params = FIP_IMAGE_ID,
171 },
172 [SCP_FW_CONTENT_CERT_ID] = {
173 .dev_handle = &uniphier_fip_dev_handle,
174 .image_spec = (uintptr_t)&uniphier_scp_fw_cert_spec,
175 .init_params = FIP_IMAGE_ID,
176 },
177 [SOC_FW_CONTENT_CERT_ID] = {
178 .dev_handle = &uniphier_fip_dev_handle,
179 .image_spec = (uintptr_t)&uniphier_soc_fw_cert_spec,
180 .init_params = FIP_IMAGE_ID,
181 },
182 [TRUSTED_OS_FW_CONTENT_CERT_ID] = {
183 .dev_handle = &uniphier_fip_dev_handle,
184 .image_spec = (uintptr_t)&uniphier_tos_fw_cert_spec,
185 .init_params = FIP_IMAGE_ID,
186 },
187 [NON_TRUSTED_FW_CONTENT_CERT_ID] = {
188 .dev_handle = &uniphier_fip_dev_handle,
189 .image_spec = (uintptr_t)&uniphier_nt_fw_cert_spec,
190 .init_params = FIP_IMAGE_ID,
191 },
192#endif
193};
194
Masahiro Yamada229e2112020-01-17 13:46:13 +0900195static int uniphier_io_block_setup(size_t fip_offset,
196 struct io_block_dev_spec *block_dev_spec,
197 size_t buffer_offset)
Masahiro Yamada574388c2016-09-03 11:37:40 +0900198{
199 int ret;
200
201 uniphier_fip_spec.offset = fip_offset;
202
Masahiro Yamada229e2112020-01-17 13:46:13 +0900203 block_dev_spec->buffer.offset = buffer_offset;
204 block_dev_spec->buffer.length = UNIPHIER_BLOCK_BUF_SIZE;
205
206 ret = mmap_add_dynamic_region(block_dev_spec->buffer.offset,
207 block_dev_spec->buffer.offset,
208 block_dev_spec->buffer.length,
Masahiro Yamadae44b8c62020-01-17 13:46:02 +0900209 MT_MEMORY | MT_RW | MT_NS);
210 if (ret)
211 return ret;
212
Masahiro Yamada574388c2016-09-03 11:37:40 +0900213 ret = register_io_dev_block(&uniphier_backend_dev_con);
214 if (ret)
215 return ret;
216
Masahiro Yamada229e2112020-01-17 13:46:13 +0900217 return io_dev_open(uniphier_backend_dev_con, (uintptr_t)block_dev_spec,
Masahiro Yamada574388c2016-09-03 11:37:40 +0900218 &uniphier_backend_dev_handle);
219}
220
221static int uniphier_io_memmap_setup(size_t fip_offset)
222{
223 int ret;
224
225 uniphier_fip_spec.offset = fip_offset;
226
227 ret = mmap_add_dynamic_region(fip_offset, fip_offset,
228 uniphier_fip_spec.length,
229 MT_RO_DATA | MT_SECURE);
230 if (ret)
231 return ret;
232
233 ret = register_io_dev_memmap(&uniphier_backend_dev_con);
234 if (ret)
235 return ret;
236
237 return io_dev_open(uniphier_backend_dev_con, 0,
238 &uniphier_backend_dev_handle);
239}
240
241static int uniphier_io_fip_setup(void)
242{
243 int ret;
244
245 ret = register_io_dev_fip(&uniphier_fip_dev_con);
246 if (ret)
247 return ret;
248
249 return io_dev_open(uniphier_fip_dev_con, 0, &uniphier_fip_dev_handle);
250}
251
Masahiro Yamada229e2112020-01-17 13:46:13 +0900252static int uniphier_io_emmc_setup(unsigned int soc_id, size_t buffer_offset)
Masahiro Yamada574388c2016-09-03 11:37:40 +0900253{
Masahiro Yamada229e2112020-01-17 13:46:13 +0900254 struct io_block_dev_spec *block_dev_spec;
Masahiro Yamada574388c2016-09-03 11:37:40 +0900255 int ret;
256
257 ret = uniphier_emmc_init(&block_dev_spec);
258 if (ret)
259 return ret;
260
Masahiro Yamada229e2112020-01-17 13:46:13 +0900261 return uniphier_io_block_setup(0x20000, block_dev_spec, buffer_offset);
Masahiro Yamada574388c2016-09-03 11:37:40 +0900262}
263
Masahiro Yamada229e2112020-01-17 13:46:13 +0900264static int uniphier_io_nand_setup(unsigned int soc_id, size_t buffer_offset)
Masahiro Yamada574388c2016-09-03 11:37:40 +0900265{
Masahiro Yamada229e2112020-01-17 13:46:13 +0900266 struct io_block_dev_spec *block_dev_spec;
Masahiro Yamada574388c2016-09-03 11:37:40 +0900267 int ret;
268
269 ret = uniphier_nand_init(&block_dev_spec);
270 if (ret)
271 return ret;
272
Masahiro Yamada229e2112020-01-17 13:46:13 +0900273 return uniphier_io_block_setup(0x20000, block_dev_spec, buffer_offset);
Masahiro Yamada574388c2016-09-03 11:37:40 +0900274}
275
Masahiro Yamada229e2112020-01-17 13:46:13 +0900276static int uniphier_io_nor_setup(unsigned int soc_id, size_t buffer_offset)
Masahiro Yamada574388c2016-09-03 11:37:40 +0900277{
278 return uniphier_io_memmap_setup(0x70000);
279}
280
Masahiro Yamada229e2112020-01-17 13:46:13 +0900281static int uniphier_io_usb_setup(unsigned int soc_id, size_t buffer_offset)
Masahiro Yamada574388c2016-09-03 11:37:40 +0900282{
Masahiro Yamada229e2112020-01-17 13:46:13 +0900283 struct io_block_dev_spec *block_dev_spec;
Masahiro Yamada574388c2016-09-03 11:37:40 +0900284 int ret;
285
286 /* use ROM API for loading images from USB storage */
287 ret = mmap_add_dynamic_region(UNIPHIER_ROM_REGION_BASE,
288 UNIPHIER_ROM_REGION_BASE,
289 UNIPHIER_ROM_REGION_SIZE,
290 MT_CODE | MT_SECURE);
291 if (ret)
292 return ret;
293
Masahiro Yamada8f642922018-01-30 19:30:39 +0900294 /*
295 * on-chip SRAM region: should be DEVICE attribute because the USB
296 * load functions provided by the ROM use this memory region as a work
297 * area, but do not cater to cache coherency.
298 */
299 ret = mmap_add_dynamic_region(UNIPHIER_OCM_REGION_BASE,
300 UNIPHIER_OCM_REGION_BASE,
301 UNIPHIER_OCM_REGION_SIZE,
302 MT_DEVICE | MT_RW | MT_SECURE);
303 if (ret)
304 return ret;
305
Masahiro Yamada574388c2016-09-03 11:37:40 +0900306 ret = uniphier_usb_init(soc_id, &block_dev_spec);
307 if (ret)
308 return ret;
309
Masahiro Yamada229e2112020-01-17 13:46:13 +0900310 return uniphier_io_block_setup(0x20000, block_dev_spec, buffer_offset);
Masahiro Yamada574388c2016-09-03 11:37:40 +0900311}
312
Masahiro Yamada229e2112020-01-17 13:46:13 +0900313static int (* const uniphier_io_setup_table[])(unsigned int, size_t) = {
Masahiro Yamada574388c2016-09-03 11:37:40 +0900314 [UNIPHIER_BOOT_DEVICE_EMMC] = uniphier_io_emmc_setup,
315 [UNIPHIER_BOOT_DEVICE_NAND] = uniphier_io_nand_setup,
316 [UNIPHIER_BOOT_DEVICE_NOR] = uniphier_io_nor_setup,
317 [UNIPHIER_BOOT_DEVICE_USB] = uniphier_io_usb_setup,
318};
319
320int uniphier_io_setup(unsigned int soc_id)
321{
Masahiro Yamada229e2112020-01-17 13:46:13 +0900322 int (*io_setup)(unsigned int soc_id, size_t buffer_offset);
Masahiro Yamada574388c2016-09-03 11:37:40 +0900323 unsigned int boot_dev;
324 int ret;
325
326 boot_dev = uniphier_get_boot_device(soc_id);
327 if (boot_dev == UNIPHIER_BOOT_DEVICE_RSV)
328 return -EINVAL;
329
330 io_setup = uniphier_io_setup_table[boot_dev];
Masahiro Yamada229e2112020-01-17 13:46:13 +0900331 ret = io_setup(soc_id, UNIPHIER_BLOCK_BUF_BASE);
Masahiro Yamada574388c2016-09-03 11:37:40 +0900332 if (ret)
333 return ret;
334
335 ret = uniphier_io_fip_setup();
336 if (ret)
337 return ret;
338
339 return 0;
340}
341
342int plat_get_image_source(unsigned int image_id, uintptr_t *dev_handle,
343 uintptr_t *image_spec)
344{
345 uintptr_t init_params;
346
347 assert(image_id < ARRAY_SIZE(uniphier_io_policies));
348
Masahiro Yamada501b88b2019-07-26 20:04:28 +0900349 *dev_handle = *uniphier_io_policies[image_id].dev_handle;
Masahiro Yamada574388c2016-09-03 11:37:40 +0900350 *image_spec = uniphier_io_policies[image_id].image_spec;
351 init_params = uniphier_io_policies[image_id].init_params;
352
353 return io_dev_init(*dev_handle, init_params);
354}