blob: daaaeab26cc3dedecdbdc239dff680d36dbd6f36 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Hou Zhiqiang00787862016-06-28 20:18:14 +08002/*
3 * Copyright 2016 NXP Semiconductor, Inc.
Hou Zhiqiang00787862016-06-28 20:18:14 +08004 */
5#include <common.h>
Hou Zhiqiangc697bd12017-03-17 16:12:32 +08006#include <malloc.h>
Hou Zhiqiang00787862016-06-28 20:18:14 +08007#include <config.h>
8#include <errno.h>
Simon Glass274e0b02020-05-10 11:39:56 -06009#include <asm/cache.h>
Hou Zhiqiang00787862016-06-28 20:18:14 +080010#include <asm/system.h>
11#include <asm/types.h>
12#include <asm/arch/soc.h>
13#ifdef CONFIG_FSL_LSCH3
14#include <asm/arch/immap_lsch3.h>
15#elif defined(CONFIG_FSL_LSCH2)
16#include <asm/arch/immap_lsch2.h>
17#endif
18#ifdef CONFIG_ARMV8_SEC_FIRMWARE_SUPPORT
19#include <asm/armv8/sec_firmware.h>
20#endif
Sumit Garge0f9e9b2016-09-01 12:56:44 -040021#ifdef CONFIG_CHAIN_OF_TRUST
22#include <fsl_validate.h>
23#endif
Hou Zhiqiang00787862016-06-28 20:18:14 +080024
Hou Zhiqiangc697bd12017-03-17 16:12:32 +080025#ifdef CONFIG_SYS_LS_PPA_FW_IN_NAND
26#include <nand.h>
27#elif defined(CONFIG_SYS_LS_PPA_FW_IN_MMC)
28#include <mmc.h>
29#endif
30
31DECLARE_GLOBAL_DATA_PTR;
32
Hou Zhiqiang00787862016-06-28 20:18:14 +080033int ppa_init(void)
34{
York Sune6b871e2017-05-15 08:51:59 -070035 unsigned int el = current_el();
Hou Zhiqiangc697bd12017-03-17 16:12:32 +080036 void *ppa_fit_addr;
Hou Zhiqiang00787862016-06-28 20:18:14 +080037 u32 *boot_loc_ptr_l, *boot_loc_ptr_h;
Sumit Gargb6fa55e2017-09-01 13:55:01 +053038 u32 *loadable_l, *loadable_h;
Hou Zhiqiang00787862016-06-28 20:18:14 +080039 int ret;
40
Sumit Garge0f9e9b2016-09-01 12:56:44 -040041#ifdef CONFIG_CHAIN_OF_TRUST
Sumit Garg22a66f82017-04-20 05:09:12 +053042 uintptr_t ppa_esbc_hdr = 0;
Sumit Garge0f9e9b2016-09-01 12:56:44 -040043 uintptr_t ppa_img_addr = 0;
Sumit Garg22a66f82017-04-20 05:09:12 +053044#if defined(CONFIG_SYS_LS_PPA_FW_IN_MMC) || \
45 defined(CONFIG_SYS_LS_PPA_FW_IN_NAND)
46 void *ppa_hdr_ddr;
47#endif
Sumit Garge0f9e9b2016-09-01 12:56:44 -040048#endif
49
York Sune6b871e2017-05-15 08:51:59 -070050 /* Skip if running at lower exception level */
51 if (el < 3) {
52 debug("Skipping PPA init, running at EL%d\n", el);
53 return 0;
54 }
55
Hou Zhiqiang7f83a5f2016-07-29 19:26:34 +080056#ifdef CONFIG_SYS_LS_PPA_FW_IN_XIP
Hou Zhiqiang00787862016-06-28 20:18:14 +080057 ppa_fit_addr = (void *)CONFIG_SYS_LS_PPA_FW_ADDR;
Hou Zhiqiangc697bd12017-03-17 16:12:32 +080058 debug("%s: PPA image load from XIP\n", __func__);
Sumit Garg22a66f82017-04-20 05:09:12 +053059#ifdef CONFIG_CHAIN_OF_TRUST
60 ppa_esbc_hdr = CONFIG_SYS_LS_PPA_ESBC_ADDR;
61#endif
Hou Zhiqiangc697bd12017-03-17 16:12:32 +080062#else /* !CONFIG_SYS_LS_PPA_FW_IN_XIP */
63 size_t fw_length, fdt_header_len = sizeof(struct fdt_header);
64
65 /* Copy PPA image from MMC/SD/NAND to allocated memory */
66#ifdef CONFIG_SYS_LS_PPA_FW_IN_MMC
67 struct mmc *mmc;
68 int dev = CONFIG_SYS_MMC_ENV_DEV;
69 struct fdt_header *fitp;
70 u32 cnt;
Sumit Garg22a66f82017-04-20 05:09:12 +053071 u32 blk;
Hou Zhiqiangc697bd12017-03-17 16:12:32 +080072
73 debug("%s: PPA image load from eMMC/SD\n", __func__);
74
75 ret = mmc_initialize(gd->bd);
76 if (ret) {
77 printf("%s: mmc_initialize() failed\n", __func__);
78 return ret;
79 }
80 mmc = find_mmc_device(dev);
81 if (!mmc) {
82 printf("PPA: MMC cannot find device for PPA firmware\n");
83 return -ENODEV;
84 }
85
86 ret = mmc_init(mmc);
87 if (ret) {
88 printf("%s: mmc_init() failed\n", __func__);
89 return ret;
90 }
91
92 fitp = malloc(roundup(fdt_header_len, 512));
93 if (!fitp) {
94 printf("PPA: malloc failed for FIT header(size 0x%zx)\n",
95 roundup(fdt_header_len, 512));
96 return -ENOMEM;
97 }
98
Sumit Garg22a66f82017-04-20 05:09:12 +053099 blk = CONFIG_SYS_LS_PPA_FW_ADDR / 512;
Hou Zhiqiangc697bd12017-03-17 16:12:32 +0800100 cnt = DIV_ROUND_UP(fdt_header_len, 512);
101 debug("%s: MMC read PPA FIT header: dev # %u, block # %u, count %u\n",
102 __func__, dev, blk, cnt);
Yinbo Zhu45c20bd2018-09-25 14:47:06 +0800103 ret = blk_dread(mmc_get_blk_desc(mmc), blk, cnt, fitp);
Hou Zhiqiangc697bd12017-03-17 16:12:32 +0800104 if (ret != cnt) {
105 free(fitp);
106 printf("MMC/SD read of PPA FIT header at offset 0x%x failed\n",
107 CONFIG_SYS_LS_PPA_FW_ADDR);
108 return -EIO;
109 }
110
Hou Zhiqiangc697bd12017-03-17 16:12:32 +0800111 ret = fdt_check_header(fitp);
112 if (ret) {
113 free(fitp);
114 printf("%s: fdt_check_header() failed\n", __func__);
115 return ret;
116 }
Sumit Garg22a66f82017-04-20 05:09:12 +0530117
118#ifdef CONFIG_CHAIN_OF_TRUST
119 ppa_hdr_ddr = malloc(CONFIG_LS_PPA_ESBC_HDR_SIZE);
120 if (!ppa_hdr_ddr) {
121 printf("PPA: malloc failed for PPA header\n");
122 return -ENOMEM;
123 }
124
125 blk = CONFIG_SYS_LS_PPA_ESBC_ADDR >> 9;
126 cnt = DIV_ROUND_UP(CONFIG_LS_PPA_ESBC_HDR_SIZE, 512);
Yinbo Zhu45c20bd2018-09-25 14:47:06 +0800127 ret = blk_dread(mmc_get_blk_desc(mmc), blk, cnt, ppa_hdr_ddr);
Sumit Garg22a66f82017-04-20 05:09:12 +0530128 if (ret != cnt) {
129 free(ppa_hdr_ddr);
130 printf("MMC/SD read of PPA header failed\n");
131 return -EIO;
132 }
133 debug("Read PPA header to 0x%p\n", ppa_hdr_ddr);
134
Sumit Garg22a66f82017-04-20 05:09:12 +0530135 ppa_esbc_hdr = (uintptr_t)ppa_hdr_ddr;
136#endif
Hou Zhiqiangc697bd12017-03-17 16:12:32 +0800137
138 fw_length = fdt_totalsize(fitp);
139 free(fitp);
140
141 fw_length = roundup(fw_length, 512);
142 ppa_fit_addr = malloc(fw_length);
143 if (!ppa_fit_addr) {
144 printf("PPA: malloc failed for PPA image(size 0x%zx)\n",
145 fw_length);
146 return -ENOMEM;
147 }
148
Sumit Garg22a66f82017-04-20 05:09:12 +0530149 blk = CONFIG_SYS_LS_PPA_FW_ADDR / 512;
Hou Zhiqiangc697bd12017-03-17 16:12:32 +0800150 cnt = DIV_ROUND_UP(fw_length, 512);
151 debug("%s: MMC read PPA FIT image: dev # %u, block # %u, count %u\n",
152 __func__, dev, blk, cnt);
Yinbo Zhu45c20bd2018-09-25 14:47:06 +0800153 ret = blk_dread(mmc_get_blk_desc(mmc), blk, cnt, ppa_fit_addr);
Hou Zhiqiangc697bd12017-03-17 16:12:32 +0800154 if (ret != cnt) {
155 free(ppa_fit_addr);
156 printf("MMC/SD read of PPA FIT header at offset 0x%x failed\n",
157 CONFIG_SYS_LS_PPA_FW_ADDR);
158 return -EIO;
159 }
160
Hou Zhiqiangc697bd12017-03-17 16:12:32 +0800161#elif defined(CONFIG_SYS_LS_PPA_FW_IN_NAND)
162 struct fdt_header fit;
163
164 debug("%s: PPA image load from NAND\n", __func__);
165
166 nand_init();
Grygorii Strashko3f243552017-06-26 19:13:07 -0500167 ret = nand_read(get_nand_dev_by_index(0),
168 (loff_t)CONFIG_SYS_LS_PPA_FW_ADDR,
169 &fdt_header_len, (u_char *)&fit);
Hou Zhiqiangc697bd12017-03-17 16:12:32 +0800170 if (ret == -EUCLEAN) {
171 printf("NAND read of PPA FIT header at offset 0x%x failed\n",
172 CONFIG_SYS_LS_PPA_FW_ADDR);
173 return -EIO;
174 }
175
176 ret = fdt_check_header(&fit);
177 if (ret) {
178 printf("%s: fdt_check_header() failed\n", __func__);
179 return ret;
180 }
181
Sumit Garg22a66f82017-04-20 05:09:12 +0530182#ifdef CONFIG_CHAIN_OF_TRUST
183 ppa_hdr_ddr = malloc(CONFIG_LS_PPA_ESBC_HDR_SIZE);
184 if (!ppa_hdr_ddr) {
185 printf("PPA: malloc failed for PPA header\n");
186 return -ENOMEM;
187 }
188
189 fw_length = CONFIG_LS_PPA_ESBC_HDR_SIZE;
190
Grygorii Strashko3f243552017-06-26 19:13:07 -0500191 ret = nand_read(get_nand_dev_by_index(0),
192 (loff_t)CONFIG_SYS_LS_PPA_ESBC_ADDR,
193 &fw_length, (u_char *)ppa_hdr_ddr);
Sumit Garg22a66f82017-04-20 05:09:12 +0530194 if (ret == -EUCLEAN) {
195 free(ppa_hdr_ddr);
196 printf("NAND read of PPA firmware at offset 0x%x failed\n",
197 CONFIG_SYS_LS_PPA_FW_ADDR);
198 return -EIO;
199 }
200 debug("Read PPA header to 0x%p\n", ppa_hdr_ddr);
201
Sumit Garg22a66f82017-04-20 05:09:12 +0530202 ppa_esbc_hdr = (uintptr_t)ppa_hdr_ddr;
203#endif
204
Hou Zhiqiangc697bd12017-03-17 16:12:32 +0800205 fw_length = fdt_totalsize(&fit);
206
207 ppa_fit_addr = malloc(fw_length);
208 if (!ppa_fit_addr) {
209 printf("PPA: malloc failed for PPA image(size 0x%zx)\n",
210 fw_length);
211 return -ENOMEM;
212 }
213
Grygorii Strashko3f243552017-06-26 19:13:07 -0500214 ret = nand_read(get_nand_dev_by_index(0),
215 (loff_t)CONFIG_SYS_LS_PPA_FW_ADDR,
216 &fw_length, (u_char *)ppa_fit_addr);
Hou Zhiqiangc697bd12017-03-17 16:12:32 +0800217 if (ret == -EUCLEAN) {
218 free(ppa_fit_addr);
219 printf("NAND read of PPA firmware at offset 0x%x failed\n",
220 CONFIG_SYS_LS_PPA_FW_ADDR);
221 return -EIO;
222 }
Hou Zhiqiang00787862016-06-28 20:18:14 +0800223#else
224#error "No CONFIG_SYS_LS_PPA_FW_IN_xxx defined"
225#endif
226
Hou Zhiqiangc697bd12017-03-17 16:12:32 +0800227#endif
228
Sumit Garge0f9e9b2016-09-01 12:56:44 -0400229#ifdef CONFIG_CHAIN_OF_TRUST
230 ppa_img_addr = (uintptr_t)ppa_fit_addr;
231 if (fsl_check_boot_mode_secure() != 0) {
Sumit Garg22a66f82017-04-20 05:09:12 +0530232 /*
233 * In case of failure in validation, fsl_secboot_validate
234 * would not return back in case of Production environment
235 * with ITS=1. In Development environment (ITS=0 and
236 * SB_EN=1), the function may return back in case of
237 * non-fatal failures.
238 */
Sumit Garge0f9e9b2016-09-01 12:56:44 -0400239 ret = fsl_secboot_validate(ppa_esbc_hdr,
Vinitha Pillai-B57223a4b3ded2017-03-23 13:48:14 +0530240 PPA_KEY_HASH,
Sumit Garge0f9e9b2016-09-01 12:56:44 -0400241 &ppa_img_addr);
242 if (ret != 0)
Sumit Gargb6fa55e2017-09-01 13:55:01 +0530243 printf("SEC firmware(s) validation failed\n");
Sumit Garge0f9e9b2016-09-01 12:56:44 -0400244 else
Sumit Gargb6fa55e2017-09-01 13:55:01 +0530245 printf("SEC firmware(s) validation Successful\n");
Sumit Garge0f9e9b2016-09-01 12:56:44 -0400246 }
Sumit Garg22a66f82017-04-20 05:09:12 +0530247#if defined(CONFIG_SYS_LS_PPA_FW_IN_MMC) || \
248 defined(CONFIG_SYS_LS_PPA_FW_IN_NAND)
249 free(ppa_hdr_ddr);
250#endif
Sumit Garge0f9e9b2016-09-01 12:56:44 -0400251#endif
252
Hou Zhiqiang00787862016-06-28 20:18:14 +0800253#ifdef CONFIG_FSL_LSCH3
254 struct ccsr_gur __iomem *gur = (void *)(CONFIG_SYS_FSL_GUTS_ADDR);
255 boot_loc_ptr_l = &gur->bootlocptrl;
256 boot_loc_ptr_h = &gur->bootlocptrh;
Sumit Gargb6fa55e2017-09-01 13:55:01 +0530257
258 /* Assign addresses to loadable ptrs */
259 loadable_l = &gur->scratchrw[4];
260 loadable_h = &gur->scratchrw[5];
Hou Zhiqiang00787862016-06-28 20:18:14 +0800261#elif defined(CONFIG_FSL_LSCH2)
262 struct ccsr_scfg __iomem *scfg = (void *)(CONFIG_SYS_FSL_SCFG_ADDR);
263 boot_loc_ptr_l = &scfg->scratchrw[1];
264 boot_loc_ptr_h = &scfg->scratchrw[0];
Sumit Gargb6fa55e2017-09-01 13:55:01 +0530265
266 /* Assign addresses to loadable ptrs */
267 loadable_l = &scfg->scratchrw[2];
268 loadable_h = &scfg->scratchrw[3];
Hou Zhiqiang00787862016-06-28 20:18:14 +0800269#endif
270
271 debug("fsl-ppa: boot_loc_ptr_l = 0x%p, boot_loc_ptr_h =0x%p\n",
272 boot_loc_ptr_l, boot_loc_ptr_h);
Sumit Gargb6fa55e2017-09-01 13:55:01 +0530273 ret = sec_firmware_init(ppa_fit_addr, boot_loc_ptr_l, boot_loc_ptr_h,
274 loadable_l, loadable_h);
Hou Zhiqiang00787862016-06-28 20:18:14 +0800275
Hou Zhiqiangc697bd12017-03-17 16:12:32 +0800276#if defined(CONFIG_SYS_LS_PPA_FW_IN_MMC) || \
277 defined(CONFIG_SYS_LS_PPA_FW_IN_NAND)
278 free(ppa_fit_addr);
279#endif
280
Hou Zhiqiang00787862016-06-28 20:18:14 +0800281 return ret;
282}