blob: 20bb7527e2b0767480ea06c30d6238dae42dd23b [file] [log] [blame]
Haojian Zhuang934ae712017-05-24 08:47:49 +08001/*
Haojian Zhuang3bd94382018-01-28 23:33:02 +08002 * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
Haojian Zhuang934ae712017-05-24 08:47:49 +08003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <arch_helpers.h>
8#include <assert.h>
9#include <bl_common.h>
10#include <console.h>
11#include <debug.h>
Victor Chong2d9a42d2017-08-17 15:21:10 +090012#include <desc_image_load.h>
Haojian Zhuang934ae712017-05-24 08:47:49 +080013#include <dw_mmc.h>
14#include <emmc.h>
15#include <errno.h>
16#include <hi6220.h>
17#include <hisi_mcu.h>
18#include <hisi_sram_map.h>
19#include <mmio.h>
Victor Chong7d787f52017-08-16 13:53:56 +090020#ifdef SPD_opteed
21#include <optee_utils.h>
22#endif
Haojian Zhuangb755da32018-01-25 16:10:14 +080023#include <platform.h>
Haojian Zhuang934ae712017-05-24 08:47:49 +080024#include <platform_def.h>
Haojian Zhuang934ae712017-05-24 08:47:49 +080025#include <string.h>
26
27#include "hikey_def.h"
28#include "hikey_private.h"
29
30/*
31 * The next 2 constants identify the extents of the code & RO data region.
32 * These addresses are used by the MMU setup code and therefore they must be
33 * page-aligned. It is the responsibility of the linker script to ensure that
34 * __RO_START__ and __RO_END__ linker symbols refer to page-aligned addresses.
35 */
36#define BL2_RO_BASE (unsigned long)(&__RO_START__)
37#define BL2_RO_LIMIT (unsigned long)(&__RO_END__)
38
Haojian Zhuangb755da32018-01-25 16:10:14 +080039#define BL2_RW_BASE (BL2_RO_LIMIT)
40
Haojian Zhuang934ae712017-05-24 08:47:49 +080041/*
42 * The next 2 constants identify the extents of the coherent memory region.
43 * These addresses are used by the MMU setup code and therefore they must be
44 * page-aligned. It is the responsibility of the linker script to ensure that
45 * __COHERENT_RAM_START__ and __COHERENT_RAM_END__ linker symbols refer to
46 * page-aligned addresses.
47 */
48#define BL2_COHERENT_RAM_BASE (unsigned long)(&__COHERENT_RAM_START__)
49#define BL2_COHERENT_RAM_LIMIT (unsigned long)(&__COHERENT_RAM_END__)
50
Haojian Zhuangb755da32018-01-25 16:10:14 +080051static meminfo_t bl2_el3_tzram_layout;
52
53enum {
54 BOOT_MODE_RECOVERY = 0,
55 BOOT_MODE_NORMAL,
56 BOOT_MODE_MASK = 1,
57};
Haojian Zhuang934ae712017-05-24 08:47:49 +080058
Victor Chong2d9a42d2017-08-17 15:21:10 +090059/*******************************************************************************
60 * Transfer SCP_BL2 from Trusted RAM using the SCP Download protocol.
61 * Return 0 on success, -1 otherwise.
62 ******************************************************************************/
Victor Chong2d9a42d2017-08-17 15:21:10 +090063int plat_hikey_bl2_handle_scp_bl2(image_info_t *scp_bl2_image_info)
Haojian Zhuang934ae712017-05-24 08:47:49 +080064{
65 /* Enable MCU SRAM */
66 hisi_mcu_enable_sram();
67
68 /* Load MCU binary into SRAM */
69 hisi_mcu_load_image(scp_bl2_image_info->image_base,
70 scp_bl2_image_info->image_size);
71 /* Let MCU running */
72 hisi_mcu_start_run();
73
74 INFO("%s: MCU PC is at 0x%x\n",
75 __func__, mmio_read_32(AO_SC_MCU_SUBSYS_STAT2));
76 INFO("%s: AO_SC_PERIPH_CLKSTAT4 is 0x%x\n",
77 __func__, mmio_read_32(AO_SC_PERIPH_CLKSTAT4));
78 return 0;
79}
80
Victor Chong2d9a42d2017-08-17 15:21:10 +090081/*******************************************************************************
82 * Gets SPSR for BL32 entry
83 ******************************************************************************/
84uint32_t hikey_get_spsr_for_bl32_entry(void)
85{
86 /*
87 * The Secure Payload Dispatcher service is responsible for
88 * setting the SPSR prior to entry into the BL3-2 image.
89 */
90 return 0;
91}
92
93/*******************************************************************************
94 * Gets SPSR for BL33 entry
95 ******************************************************************************/
96#ifndef AARCH32
97uint32_t hikey_get_spsr_for_bl33_entry(void)
98{
99 unsigned int mode;
100 uint32_t spsr;
101
102 /* Figure out what mode we enter the non-secure world in */
103 mode = EL_IMPLEMENTED(2) ? MODE_EL2 : MODE_EL1;
104
105 /*
106 * TODO: Consider the possibility of specifying the SPSR in
107 * the FIP ToC and allowing the platform to have a say as
108 * well.
109 */
110 spsr = SPSR_64(mode, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS);
111 return spsr;
112}
113#else
114uint32_t hikey_get_spsr_for_bl33_entry(void)
115{
116 unsigned int hyp_status, mode, spsr;
117
118 hyp_status = GET_VIRT_EXT(read_id_pfr1());
119
120 mode = (hyp_status) ? MODE32_hyp : MODE32_svc;
121
122 /*
123 * TODO: Consider the possibility of specifying the SPSR in
124 * the FIP ToC and allowing the platform to have a say as
125 * well.
126 */
127 spsr = SPSR_MODE32(mode, plat_get_ns_image_entrypoint() & 0x1,
128 SPSR_E_LITTLE, DISABLE_ALL_EXCEPTIONS);
129 return spsr;
130}
131#endif /* AARCH32 */
132
Victor Chong2d9a42d2017-08-17 15:21:10 +0900133int hikey_bl2_handle_post_image_load(unsigned int image_id)
134{
135 int err = 0;
136 bl_mem_params_node_t *bl_mem_params = get_bl_mem_params_node(image_id);
Victor Chong7d787f52017-08-16 13:53:56 +0900137#ifdef SPD_opteed
138 bl_mem_params_node_t *pager_mem_params = NULL;
139 bl_mem_params_node_t *paged_mem_params = NULL;
140#endif
Victor Chong2d9a42d2017-08-17 15:21:10 +0900141 assert(bl_mem_params);
142
143 switch (image_id) {
144#ifdef AARCH64
145 case BL32_IMAGE_ID:
Victor Chong7d787f52017-08-16 13:53:56 +0900146#ifdef SPD_opteed
147 pager_mem_params = get_bl_mem_params_node(BL32_EXTRA1_IMAGE_ID);
148 assert(pager_mem_params);
149
150 paged_mem_params = get_bl_mem_params_node(BL32_EXTRA2_IMAGE_ID);
151 assert(paged_mem_params);
152
153 err = parse_optee_header(&bl_mem_params->ep_info,
154 &pager_mem_params->image_info,
155 &paged_mem_params->image_info);
156 if (err != 0) {
157 WARN("OPTEE header parse error.\n");
158 }
159#endif
Victor Chong2d9a42d2017-08-17 15:21:10 +0900160 bl_mem_params->ep_info.spsr = hikey_get_spsr_for_bl32_entry();
161 break;
162#endif
163
164 case BL33_IMAGE_ID:
165 /* BL33 expects to receive the primary CPU MPID (through r0) */
166 bl_mem_params->ep_info.args.arg0 = 0xffff & read_mpidr();
167 bl_mem_params->ep_info.spsr = hikey_get_spsr_for_bl33_entry();
168 break;
169
170#ifdef SCP_BL2_BASE
171 case SCP_BL2_IMAGE_ID:
172 /* The subsequent handling of SCP_BL2 is platform specific */
173 err = plat_hikey_bl2_handle_scp_bl2(&bl_mem_params->image_info);
174 if (err) {
175 WARN("Failure in platform-specific handling of SCP_BL2 image.\n");
176 }
177 break;
178#endif
179 }
180
181 return err;
182}
183
184/*******************************************************************************
185 * This function can be used by the platforms to update/use image
186 * information for given `image_id`.
187 ******************************************************************************/
188int bl2_plat_handle_post_image_load(unsigned int image_id)
189{
190 return hikey_bl2_handle_post_image_load(image_id);
191}
Haojian Zhuang934ae712017-05-24 08:47:49 +0800192
193static void reset_dwmmc_clk(void)
194{
195 unsigned int data;
196
197 /* disable mmc0 bus clock */
198 mmio_write_32(PERI_SC_PERIPH_CLKDIS0, PERI_CLK0_MMC0);
199 do {
200 data = mmio_read_32(PERI_SC_PERIPH_CLKSTAT0);
201 } while (data & PERI_CLK0_MMC0);
202 /* enable mmc0 bus clock */
203 mmio_write_32(PERI_SC_PERIPH_CLKEN0, PERI_CLK0_MMC0);
204 do {
205 data = mmio_read_32(PERI_SC_PERIPH_CLKSTAT0);
206 } while (!(data & PERI_CLK0_MMC0));
207 /* reset mmc0 clock domain */
208 mmio_write_32(PERI_SC_PERIPH_RSTEN0, PERI_RST0_MMC0);
209
210 /* bypass mmc0 clock phase */
211 data = mmio_read_32(PERI_SC_PERIPH_CTRL2);
212 data |= 3;
213 mmio_write_32(PERI_SC_PERIPH_CTRL2, data);
214
215 /* disable low power */
216 data = mmio_read_32(PERI_SC_PERIPH_CTRL13);
217 data |= 1 << 3;
218 mmio_write_32(PERI_SC_PERIPH_CTRL13, data);
219 do {
220 data = mmio_read_32(PERI_SC_PERIPH_RSTSTAT0);
221 } while (!(data & PERI_RST0_MMC0));
222
223 /* unreset mmc0 clock domain */
224 mmio_write_32(PERI_SC_PERIPH_RSTDIS0, PERI_RST0_MMC0);
225 do {
226 data = mmio_read_32(PERI_SC_PERIPH_RSTSTAT0);
227 } while (data & PERI_RST0_MMC0);
228}
229
230static void hikey_boardid_init(void)
231{
232 u_register_t midr;
233
234 midr = read_midr();
235 mmio_write_32(MEMORY_AXI_CHIP_ADDR, midr);
236 INFO("[BDID] [%x] midr: 0x%x\n", MEMORY_AXI_CHIP_ADDR,
237 (unsigned int)midr);
238
239 mmio_write_32(MEMORY_AXI_BOARD_TYPE_ADDR, 0);
240 mmio_write_32(MEMORY_AXI_BOARD_ID_ADDR, 0x2b);
241
242 mmio_write_32(ACPU_ARM64_FLAGA, 0x1234);
243 mmio_write_32(ACPU_ARM64_FLAGB, 0x5678);
244}
245
246static void hikey_sd_init(void)
247{
248 /* switch pinmux to SD */
249 mmio_write_32(IOMG_SD_CLK, IOMG_MUX_FUNC0);
250 mmio_write_32(IOMG_SD_CMD, IOMG_MUX_FUNC0);
251 mmio_write_32(IOMG_SD_DATA0, IOMG_MUX_FUNC0);
252 mmio_write_32(IOMG_SD_DATA1, IOMG_MUX_FUNC0);
253 mmio_write_32(IOMG_SD_DATA2, IOMG_MUX_FUNC0);
254 mmio_write_32(IOMG_SD_DATA3, IOMG_MUX_FUNC0);
255
256 mmio_write_32(IOCG_SD_CLK, IOCG_INPUT_16MA);
257 mmio_write_32(IOCG_SD_CMD, IOCG_INPUT_12MA);
258 mmio_write_32(IOCG_SD_DATA0, IOCG_INPUT_12MA);
259 mmio_write_32(IOCG_SD_DATA1, IOCG_INPUT_12MA);
260 mmio_write_32(IOCG_SD_DATA2, IOCG_INPUT_12MA);
261 mmio_write_32(IOCG_SD_DATA3, IOCG_INPUT_12MA);
262
263 /* set SD Card detect as nopull */
264 mmio_write_32(IOCG_GPIO8, 0);
265}
266
267static void hikey_jumper_init(void)
268{
269 /* set jumper detect as nopull */
270 mmio_write_32(IOCG_GPIO24, 0);
271 /* set jumper detect as GPIO */
272 mmio_write_32(IOMG_GPIO24, IOMG_MUX_FUNC0);
273}
274
Haojian Zhuangb755da32018-01-25 16:10:14 +0800275void bl2_el3_early_platform_setup(u_register_t arg1, u_register_t arg2,
276 u_register_t arg3, u_register_t arg4)
277{
Haojian Zhuang934ae712017-05-24 08:47:49 +0800278 /* Initialize the console to provide early debug support */
279 console_init(CONSOLE_BASE, PL011_UART_CLK_IN_HZ, PL011_BAUDRATE);
Haojian Zhuangb755da32018-01-25 16:10:14 +0800280 /*
281 * Allow BL2 to see the whole Trusted RAM.
282 */
283 bl2_el3_tzram_layout.total_base = BL2_RW_BASE;
284 bl2_el3_tzram_layout.total_size = BL31_LIMIT - BL2_RW_BASE;
285}
Haojian Zhuang934ae712017-05-24 08:47:49 +0800286
Haojian Zhuangb755da32018-01-25 16:10:14 +0800287void bl2_el3_plat_arch_setup(void)
288{
289 hikey_init_mmu_el3(bl2_el3_tzram_layout.total_base,
290 bl2_el3_tzram_layout.total_size,
291 BL2_RO_BASE,
292 BL2_RO_LIMIT,
293 BL2_COHERENT_RAM_BASE,
294 BL2_COHERENT_RAM_LIMIT);
295}
Haojian Zhuang934ae712017-05-24 08:47:49 +0800296
Haojian Zhuangb755da32018-01-25 16:10:14 +0800297void bl2_platform_setup(void)
298{
299 dw_mmc_params_t params;
Haojian Zhuang934ae712017-05-24 08:47:49 +0800300
Haojian Zhuangb755da32018-01-25 16:10:14 +0800301 hikey_sp804_init();
302 hikey_gpio_init();
303 hikey_pmussi_init();
304 hikey_hi6553_init();
305
Haojian Zhuang934ae712017-05-24 08:47:49 +0800306 dsb();
307 hikey_ddr_init();
Haojian Zhuangb755da32018-01-25 16:10:14 +0800308 hikey_security_setup();
309
310 /* Clear SRAM since it'll be used by MCU right now. */
311 memset((void *)SRAM_BASE, 0, SRAM_SIZE);
312 clean_dcache_range(SRAM_BASE, SRAM_SIZE);
Haojian Zhuang934ae712017-05-24 08:47:49 +0800313
314 hikey_boardid_init();
315 init_acpu_dvfs();
Haojian Zhuangb755da32018-01-25 16:10:14 +0800316 hikey_rtc_init();
Haojian Zhuang934ae712017-05-24 08:47:49 +0800317 hikey_sd_init();
318 hikey_jumper_init();
319
Haojian Zhuangb755da32018-01-25 16:10:14 +0800320 hikey_mmc_pll_init();
321
Haojian Zhuang934ae712017-05-24 08:47:49 +0800322 reset_dwmmc_clk();
323 memset(&params, 0, sizeof(dw_mmc_params_t));
324 params.reg_base = DWMMC0_BASE;
325 params.desc_base = HIKEY_MMC_DESC_BASE;
326 params.desc_size = 1 << 20;
327 params.clk_rate = 24 * 1000 * 1000;
328 params.bus_width = EMMC_BUS_WIDTH_8;
329 params.flags = EMMC_FLAG_CMD23;
330 dw_mmc_init(&params);
331
332 hikey_io_setup();
333}