mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-03 18:10:13 +00:00
bd6a247593
K3 GP devices allows booting the secure binaries on them by bypassing
the x509 header on them.
ATF and OPTEE firewalling required the rproc_load to be called before
authentication. This change caused the failure for GP devices that
strips off the headers. The boot vector had been set before the headers
were stripped off causing the runtime stripping to fail and stripping
becoming in-effective.
Separate out the secure binary check on GP/HS devices so that the
boot_vector could be stripped before calling rproc_load. This allows
keeping the authentication later when the cluster is on along with
allowing the stripping of the binaries in case of gp devices.
Fixes: 1e00e9be62
("arm: mach-k3: common: re-locate authentication for atf/optee")
Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
667 lines
16 KiB
C
667 lines
16 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/*
|
|
* K3: Common Architecture initialization
|
|
*
|
|
* Copyright (C) 2018 Texas Instruments Incorporated - http://www.ti.com/
|
|
* Lokesh Vutla <lokeshvutla@ti.com>
|
|
*/
|
|
|
|
#include <common.h>
|
|
#include <cpu_func.h>
|
|
#include <image.h>
|
|
#include <init.h>
|
|
#include <log.h>
|
|
#include <spl.h>
|
|
#include <asm/global_data.h>
|
|
#include "common.h"
|
|
#include <dm.h>
|
|
#include <remoteproc.h>
|
|
#include <asm/cache.h>
|
|
#include <linux/soc/ti/ti_sci_protocol.h>
|
|
#include <fdt_support.h>
|
|
#include <asm/hardware.h>
|
|
#include <asm/io.h>
|
|
#include <fs_loader.h>
|
|
#include <fs.h>
|
|
#include <env.h>
|
|
#include <elf.h>
|
|
#include <soc.h>
|
|
|
|
#if IS_ENABLED(CONFIG_SYS_K3_SPL_ATF)
|
|
enum {
|
|
IMAGE_ID_ATF,
|
|
IMAGE_ID_OPTEE,
|
|
IMAGE_ID_SPL,
|
|
IMAGE_ID_DM_FW,
|
|
IMAGE_AMT,
|
|
};
|
|
|
|
#if CONFIG_IS_ENABLED(FIT_IMAGE_POST_PROCESS)
|
|
static const char *image_os_match[IMAGE_AMT] = {
|
|
"arm-trusted-firmware",
|
|
"tee",
|
|
"U-Boot",
|
|
"DM",
|
|
};
|
|
#endif
|
|
|
|
static struct image_info fit_image_info[IMAGE_AMT];
|
|
#endif
|
|
|
|
struct ti_sci_handle *get_ti_sci_handle(void)
|
|
{
|
|
struct udevice *dev;
|
|
int ret;
|
|
|
|
ret = uclass_get_device_by_driver(UCLASS_FIRMWARE,
|
|
DM_DRIVER_GET(ti_sci), &dev);
|
|
if (ret)
|
|
panic("Failed to get SYSFW (%d)\n", ret);
|
|
|
|
return (struct ti_sci_handle *)ti_sci_get_handle_from_sysfw(dev);
|
|
}
|
|
|
|
void k3_sysfw_print_ver(void)
|
|
{
|
|
struct ti_sci_handle *ti_sci = get_ti_sci_handle();
|
|
char fw_desc[sizeof(ti_sci->version.firmware_description) + 1];
|
|
|
|
/*
|
|
* Output System Firmware version info. Note that since the
|
|
* 'firmware_description' field is not guaranteed to be zero-
|
|
* terminated we manually add a \0 terminator if needed. Further
|
|
* note that we intentionally no longer rely on the extended
|
|
* printf() formatter '%.*s' to not having to require a more
|
|
* full-featured printf() implementation.
|
|
*/
|
|
strncpy(fw_desc, ti_sci->version.firmware_description,
|
|
sizeof(ti_sci->version.firmware_description));
|
|
fw_desc[sizeof(fw_desc) - 1] = '\0';
|
|
|
|
printf("SYSFW ABI: %d.%d (firmware rev 0x%04x '%s')\n",
|
|
ti_sci->version.abi_major, ti_sci->version.abi_minor,
|
|
ti_sci->version.firmware_revision, fw_desc);
|
|
}
|
|
|
|
void mmr_unlock(phys_addr_t base, u32 partition)
|
|
{
|
|
/* Translate the base address */
|
|
phys_addr_t part_base = base + partition * CTRL_MMR0_PARTITION_SIZE;
|
|
|
|
/* Unlock the requested partition if locked using two-step sequence */
|
|
writel(CTRLMMR_LOCK_KICK0_UNLOCK_VAL, part_base + CTRLMMR_LOCK_KICK0);
|
|
writel(CTRLMMR_LOCK_KICK1_UNLOCK_VAL, part_base + CTRLMMR_LOCK_KICK1);
|
|
}
|
|
|
|
bool is_rom_loaded_sysfw(struct rom_extended_boot_data *data)
|
|
{
|
|
if (strncmp(data->header, K3_ROM_BOOT_HEADER_MAGIC, 7))
|
|
return false;
|
|
|
|
return data->num_components > 1;
|
|
}
|
|
|
|
DECLARE_GLOBAL_DATA_PTR;
|
|
|
|
#ifdef CONFIG_K3_EARLY_CONS
|
|
int early_console_init(void)
|
|
{
|
|
struct udevice *dev;
|
|
int ret;
|
|
|
|
gd->baudrate = CONFIG_BAUDRATE;
|
|
|
|
ret = uclass_get_device_by_seq(UCLASS_SERIAL, CONFIG_K3_EARLY_CONS_IDX,
|
|
&dev);
|
|
if (ret) {
|
|
printf("Error getting serial dev for early console! (%d)\n",
|
|
ret);
|
|
return ret;
|
|
}
|
|
|
|
gd->cur_serial_dev = dev;
|
|
gd->flags |= GD_FLG_SERIAL_READY;
|
|
gd->have_console = 1;
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#if IS_ENABLED(CONFIG_SYS_K3_SPL_ATF)
|
|
|
|
void init_env(void)
|
|
{
|
|
#ifdef CONFIG_SPL_ENV_SUPPORT
|
|
char *part;
|
|
|
|
env_init();
|
|
env_relocate();
|
|
switch (spl_boot_device()) {
|
|
case BOOT_DEVICE_MMC2:
|
|
part = env_get("bootpart");
|
|
env_set("storage_interface", "mmc");
|
|
env_set("fw_dev_part", part);
|
|
break;
|
|
case BOOT_DEVICE_SPI:
|
|
env_set("storage_interface", "ubi");
|
|
env_set("fw_ubi_mtdpart", "UBI");
|
|
env_set("fw_ubi_volume", "UBI0");
|
|
break;
|
|
default:
|
|
printf("%s from device %u not supported!\n",
|
|
__func__, spl_boot_device());
|
|
return;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
int load_firmware(char *name_fw, char *name_loadaddr, u32 *loadaddr)
|
|
{
|
|
struct udevice *fsdev;
|
|
char *name = NULL;
|
|
int size = 0;
|
|
|
|
if (!IS_ENABLED(CONFIG_FS_LOADER))
|
|
return 0;
|
|
|
|
*loadaddr = 0;
|
|
#ifdef CONFIG_SPL_ENV_SUPPORT
|
|
switch (spl_boot_device()) {
|
|
case BOOT_DEVICE_MMC2:
|
|
name = env_get(name_fw);
|
|
*loadaddr = env_get_hex(name_loadaddr, *loadaddr);
|
|
break;
|
|
default:
|
|
printf("Loading rproc fw image from device %u not supported!\n",
|
|
spl_boot_device());
|
|
return 0;
|
|
}
|
|
#endif
|
|
if (!*loadaddr)
|
|
return 0;
|
|
|
|
if (!get_fs_loader(&fsdev)) {
|
|
size = request_firmware_into_buf(fsdev, name, (void *)*loadaddr,
|
|
0, 0);
|
|
}
|
|
|
|
return size;
|
|
}
|
|
|
|
void release_resources_for_core_shutdown(void)
|
|
{
|
|
struct ti_sci_handle *ti_sci = get_ti_sci_handle();
|
|
struct ti_sci_dev_ops *dev_ops = &ti_sci->ops.dev_ops;
|
|
struct ti_sci_proc_ops *proc_ops = &ti_sci->ops.proc_ops;
|
|
int ret;
|
|
u32 i;
|
|
|
|
/* Iterate through list of devices to put (shutdown) */
|
|
for (i = 0; i < ARRAY_SIZE(put_device_ids); i++) {
|
|
u32 id = put_device_ids[i];
|
|
|
|
ret = dev_ops->put_device(ti_sci, id);
|
|
if (ret)
|
|
panic("Failed to put device %u (%d)\n", id, ret);
|
|
}
|
|
|
|
/* Iterate through list of cores to put (shutdown) */
|
|
for (i = 0; i < ARRAY_SIZE(put_core_ids); i++) {
|
|
u32 id = put_core_ids[i];
|
|
|
|
/*
|
|
* Queue up the core shutdown request. Note that this call
|
|
* needs to be followed up by an actual invocation of an WFE
|
|
* or WFI CPU instruction.
|
|
*/
|
|
ret = proc_ops->proc_shutdown_no_wait(ti_sci, id);
|
|
if (ret)
|
|
panic("Failed sending core %u shutdown message (%d)\n",
|
|
id, ret);
|
|
}
|
|
}
|
|
|
|
void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
|
|
{
|
|
typedef void __noreturn (*image_entry_noargs_t)(void);
|
|
struct ti_sci_handle *ti_sci = get_ti_sci_handle();
|
|
u32 loadaddr = 0;
|
|
int ret, size = 0, shut_cpu = 0;
|
|
|
|
/* Release all the exclusive devices held by SPL before starting ATF */
|
|
ti_sci->ops.dev_ops.release_exclusive_devices(ti_sci);
|
|
|
|
ret = rproc_init();
|
|
if (ret)
|
|
panic("rproc failed to be initialized (%d)\n", ret);
|
|
|
|
init_env();
|
|
|
|
if (!fit_image_info[IMAGE_ID_DM_FW].image_start) {
|
|
size = load_firmware("name_mcur5f0_0fw", "addr_mcur5f0_0load",
|
|
&loadaddr);
|
|
}
|
|
|
|
/*
|
|
* It is assumed that remoteproc device 1 is the corresponding
|
|
* Cortex-A core which runs ATF. Make sure DT reflects the same.
|
|
*/
|
|
if (!fit_image_info[IMAGE_ID_ATF].image_start)
|
|
fit_image_info[IMAGE_ID_ATF].image_start =
|
|
spl_image->entry_point;
|
|
|
|
ret = rproc_load(1, fit_image_info[IMAGE_ID_ATF].image_start, 0x200);
|
|
if (ret)
|
|
panic("%s: ATF failed to load on rproc (%d)\n", __func__, ret);
|
|
|
|
#if (CONFIG_IS_ENABLED(FIT_IMAGE_POST_PROCESS) && IS_ENABLED(CONFIG_SYS_K3_SPL_ATF))
|
|
/* Authenticate ATF */
|
|
void *image_addr = (void *)fit_image_info[IMAGE_ID_ATF].image_start;
|
|
|
|
debug("%s: Authenticating image: addr=%lx, size=%ld, os=%s\n", __func__,
|
|
fit_image_info[IMAGE_ID_ATF].image_start,
|
|
fit_image_info[IMAGE_ID_ATF].image_len,
|
|
image_os_match[IMAGE_ID_ATF]);
|
|
|
|
ti_secure_image_post_process(&image_addr,
|
|
(size_t *)&fit_image_info[IMAGE_ID_ATF].image_len);
|
|
|
|
/* Authenticate OPTEE */
|
|
image_addr = (void *)fit_image_info[IMAGE_ID_OPTEE].image_start;
|
|
|
|
debug("%s: Authenticating image: addr=%lx, size=%ld, os=%s\n", __func__,
|
|
fit_image_info[IMAGE_ID_OPTEE].image_start,
|
|
fit_image_info[IMAGE_ID_OPTEE].image_len,
|
|
image_os_match[IMAGE_ID_OPTEE]);
|
|
|
|
ti_secure_image_post_process(&image_addr,
|
|
(size_t *)&fit_image_info[IMAGE_ID_OPTEE].image_len);
|
|
|
|
#endif
|
|
|
|
if (!fit_image_info[IMAGE_ID_DM_FW].image_len &&
|
|
!(size > 0 && valid_elf_image(loadaddr))) {
|
|
shut_cpu = 1;
|
|
goto start_arm64;
|
|
}
|
|
|
|
if (!fit_image_info[IMAGE_ID_DM_FW].image_start) {
|
|
loadaddr = load_elf_image_phdr(loadaddr);
|
|
} else {
|
|
loadaddr = fit_image_info[IMAGE_ID_DM_FW].image_start;
|
|
if (valid_elf_image(loadaddr))
|
|
loadaddr = load_elf_image_phdr(loadaddr);
|
|
}
|
|
|
|
debug("%s: jumping to address %x\n", __func__, loadaddr);
|
|
|
|
start_arm64:
|
|
/* Add an extra newline to differentiate the ATF logs from SPL */
|
|
printf("Starting ATF on ARM64 core...\n\n");
|
|
|
|
ret = rproc_start(1);
|
|
if (ret)
|
|
panic("%s: ATF failed to start on rproc (%d)\n", __func__, ret);
|
|
|
|
if (shut_cpu) {
|
|
debug("Shutting down...\n");
|
|
release_resources_for_core_shutdown();
|
|
|
|
while (1)
|
|
asm volatile("wfe");
|
|
}
|
|
image_entry_noargs_t image_entry = (image_entry_noargs_t)loadaddr;
|
|
|
|
image_entry();
|
|
}
|
|
#endif
|
|
|
|
#if CONFIG_IS_ENABLED(FIT_IMAGE_POST_PROCESS)
|
|
void board_fit_image_post_process(const void *fit, int node, void **p_image,
|
|
size_t *p_size)
|
|
{
|
|
#if IS_ENABLED(CONFIG_SYS_K3_SPL_ATF)
|
|
int len;
|
|
int i;
|
|
const char *os;
|
|
u32 addr;
|
|
|
|
os = fdt_getprop(fit, node, "os", &len);
|
|
addr = fdt_getprop_u32_default_node(fit, node, 0, "entry", -1);
|
|
|
|
debug("%s: processing image: addr=%x, size=%d, os=%s\n", __func__,
|
|
addr, *p_size, os);
|
|
|
|
for (i = 0; i < IMAGE_AMT; i++) {
|
|
if (!strcmp(os, image_os_match[i])) {
|
|
fit_image_info[i].image_start = addr;
|
|
fit_image_info[i].image_len = *p_size;
|
|
debug("%s: matched image for ID %d\n", __func__, i);
|
|
break;
|
|
}
|
|
}
|
|
/*
|
|
* Only DM and the DTBs are being authenticated here,
|
|
* rest will be authenticated when A72 cluster is up
|
|
*/
|
|
if ((i != IMAGE_ID_ATF) && (i != IMAGE_ID_OPTEE))
|
|
#endif
|
|
{
|
|
ti_secure_image_check_binary(p_image, p_size);
|
|
ti_secure_image_post_process(p_image, p_size);
|
|
}
|
|
#if IS_ENABLED(CONFIG_SYS_K3_SPL_ATF)
|
|
else
|
|
ti_secure_image_check_binary(p_image, p_size);
|
|
#endif
|
|
}
|
|
#endif
|
|
|
|
#if defined(CONFIG_OF_LIBFDT)
|
|
int fdt_fixup_msmc_ram(void *blob, char *parent_path, char *node_name)
|
|
{
|
|
u64 msmc_start = 0, msmc_end = 0, msmc_size, reg[2];
|
|
struct ti_sci_handle *ti_sci = get_ti_sci_handle();
|
|
int ret, node, subnode, len, prev_node;
|
|
u32 range[4], addr, size;
|
|
const fdt32_t *sub_reg;
|
|
|
|
ti_sci->ops.core_ops.query_msmc(ti_sci, &msmc_start, &msmc_end);
|
|
msmc_size = msmc_end - msmc_start + 1;
|
|
debug("%s: msmc_start = 0x%llx, msmc_size = 0x%llx\n", __func__,
|
|
msmc_start, msmc_size);
|
|
|
|
/* find or create "msmc_sram node */
|
|
ret = fdt_path_offset(blob, parent_path);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
node = fdt_find_or_add_subnode(blob, ret, node_name);
|
|
if (node < 0)
|
|
return node;
|
|
|
|
ret = fdt_setprop_string(blob, node, "compatible", "mmio-sram");
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
reg[0] = cpu_to_fdt64(msmc_start);
|
|
reg[1] = cpu_to_fdt64(msmc_size);
|
|
ret = fdt_setprop(blob, node, "reg", reg, sizeof(reg));
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
fdt_setprop_cell(blob, node, "#address-cells", 1);
|
|
fdt_setprop_cell(blob, node, "#size-cells", 1);
|
|
|
|
range[0] = 0;
|
|
range[1] = cpu_to_fdt32(msmc_start >> 32);
|
|
range[2] = cpu_to_fdt32(msmc_start & 0xffffffff);
|
|
range[3] = cpu_to_fdt32(msmc_size);
|
|
ret = fdt_setprop(blob, node, "ranges", range, sizeof(range));
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
subnode = fdt_first_subnode(blob, node);
|
|
prev_node = 0;
|
|
|
|
/* Look for invalid subnodes and delete them */
|
|
while (subnode >= 0) {
|
|
sub_reg = fdt_getprop(blob, subnode, "reg", &len);
|
|
addr = fdt_read_number(sub_reg, 1);
|
|
sub_reg++;
|
|
size = fdt_read_number(sub_reg, 1);
|
|
debug("%s: subnode = %d, addr = 0x%x. size = 0x%x\n", __func__,
|
|
subnode, addr, size);
|
|
if (addr + size > msmc_size ||
|
|
!strncmp(fdt_get_name(blob, subnode, &len), "sysfw", 5) ||
|
|
!strncmp(fdt_get_name(blob, subnode, &len), "l3cache", 7)) {
|
|
fdt_del_node(blob, subnode);
|
|
debug("%s: deleting subnode %d\n", __func__, subnode);
|
|
if (!prev_node)
|
|
subnode = fdt_first_subnode(blob, node);
|
|
else
|
|
subnode = fdt_next_subnode(blob, prev_node);
|
|
} else {
|
|
prev_node = subnode;
|
|
subnode = fdt_next_subnode(blob, prev_node);
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
#if defined(CONFIG_OF_SYSTEM_SETUP)
|
|
int ft_system_setup(void *blob, struct bd_info *bd)
|
|
{
|
|
int ret;
|
|
|
|
ret = fdt_fixup_msmc_ram(blob, "/bus@100000", "sram@70000000");
|
|
if (ret < 0)
|
|
ret = fdt_fixup_msmc_ram(blob, "/interconnect@100000",
|
|
"sram@70000000");
|
|
if (ret)
|
|
printf("%s: fixing up msmc ram failed %d\n", __func__, ret);
|
|
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
#endif
|
|
|
|
#ifndef CONFIG_SYSRESET
|
|
void reset_cpu(void)
|
|
{
|
|
}
|
|
#endif
|
|
|
|
enum k3_device_type get_device_type(void)
|
|
{
|
|
u32 sys_status = readl(K3_SEC_MGR_SYS_STATUS);
|
|
|
|
u32 sys_dev_type = (sys_status & SYS_STATUS_DEV_TYPE_MASK) >>
|
|
SYS_STATUS_DEV_TYPE_SHIFT;
|
|
|
|
u32 sys_sub_type = (sys_status & SYS_STATUS_SUB_TYPE_MASK) >>
|
|
SYS_STATUS_SUB_TYPE_SHIFT;
|
|
|
|
switch (sys_dev_type) {
|
|
case SYS_STATUS_DEV_TYPE_GP:
|
|
return K3_DEVICE_TYPE_GP;
|
|
case SYS_STATUS_DEV_TYPE_TEST:
|
|
return K3_DEVICE_TYPE_TEST;
|
|
case SYS_STATUS_DEV_TYPE_EMU:
|
|
return K3_DEVICE_TYPE_EMU;
|
|
case SYS_STATUS_DEV_TYPE_HS:
|
|
if (sys_sub_type == SYS_STATUS_SUB_TYPE_VAL_FS)
|
|
return K3_DEVICE_TYPE_HS_FS;
|
|
else
|
|
return K3_DEVICE_TYPE_HS_SE;
|
|
default:
|
|
return K3_DEVICE_TYPE_BAD;
|
|
}
|
|
}
|
|
|
|
#if defined(CONFIG_DISPLAY_CPUINFO)
|
|
static const char *get_device_type_name(void)
|
|
{
|
|
enum k3_device_type type = get_device_type();
|
|
|
|
switch (type) {
|
|
case K3_DEVICE_TYPE_GP:
|
|
return "GP";
|
|
case K3_DEVICE_TYPE_TEST:
|
|
return "TEST";
|
|
case K3_DEVICE_TYPE_EMU:
|
|
return "EMU";
|
|
case K3_DEVICE_TYPE_HS_FS:
|
|
return "HS-FS";
|
|
case K3_DEVICE_TYPE_HS_SE:
|
|
return "HS-SE";
|
|
default:
|
|
return "BAD";
|
|
}
|
|
}
|
|
|
|
int print_cpuinfo(void)
|
|
{
|
|
struct udevice *soc;
|
|
char name[64];
|
|
int ret;
|
|
|
|
printf("SoC: ");
|
|
|
|
ret = soc_get(&soc);
|
|
if (ret) {
|
|
printf("UNKNOWN\n");
|
|
return 0;
|
|
}
|
|
|
|
ret = soc_get_family(soc, name, 64);
|
|
if (!ret) {
|
|
printf("%s ", name);
|
|
}
|
|
|
|
ret = soc_get_revision(soc, name, 64);
|
|
if (!ret) {
|
|
printf("%s ", name);
|
|
}
|
|
|
|
printf("%s\n", get_device_type_name());
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#ifdef CONFIG_ARM64
|
|
void board_prep_linux(struct bootm_headers *images)
|
|
{
|
|
debug("Linux kernel Image start = 0x%lx end = 0x%lx\n",
|
|
images->os.start, images->os.end);
|
|
__asm_flush_dcache_range(images->os.start,
|
|
ROUND(images->os.end,
|
|
CONFIG_SYS_CACHELINE_SIZE));
|
|
}
|
|
#endif
|
|
|
|
#ifdef CONFIG_CPU_V7R
|
|
void disable_linefill_optimization(void)
|
|
{
|
|
u32 actlr;
|
|
|
|
/*
|
|
* On K3 devices there are 2 conditions where R5F can deadlock:
|
|
* 1.When software is performing series of store operations to
|
|
* cacheable write back/write allocate memory region and later
|
|
* on software execute barrier operation (DSB or DMB). R5F may
|
|
* hang at the barrier instruction.
|
|
* 2.When software is performing a mix of load and store operations
|
|
* within a tight loop and store operations are all writing to
|
|
* cacheable write back/write allocates memory regions, R5F may
|
|
* hang at one of the load instruction.
|
|
*
|
|
* To avoid the above two conditions disable linefill optimization
|
|
* inside Cortex R5F.
|
|
*/
|
|
asm("mrc p15, 0, %0, c1, c0, 1" : "=r" (actlr));
|
|
actlr |= (1 << 13); /* Set DLFO bit */
|
|
asm("mcr p15, 0, %0, c1, c0, 1" : : "r" (actlr));
|
|
}
|
|
#endif
|
|
|
|
void remove_fwl_configs(struct fwl_data *fwl_data, size_t fwl_data_size)
|
|
{
|
|
struct ti_sci_msg_fwl_region region;
|
|
struct ti_sci_fwl_ops *fwl_ops;
|
|
struct ti_sci_handle *ti_sci;
|
|
size_t i, j;
|
|
|
|
ti_sci = get_ti_sci_handle();
|
|
fwl_ops = &ti_sci->ops.fwl_ops;
|
|
for (i = 0; i < fwl_data_size; i++) {
|
|
for (j = 0; j < fwl_data[i].regions; j++) {
|
|
region.fwl_id = fwl_data[i].fwl_id;
|
|
region.region = j;
|
|
region.n_permission_regs = 3;
|
|
|
|
fwl_ops->get_fwl_region(ti_sci, ®ion);
|
|
|
|
/* Don't disable the background regions */
|
|
if (region.control != 0 &&
|
|
((region.control & K3_BACKGROUND_FIREWALL_BIT) ==
|
|
0)) {
|
|
pr_debug("Attempting to disable firewall %5d (%25s)\n",
|
|
region.fwl_id, fwl_data[i].name);
|
|
region.control = 0;
|
|
|
|
if (fwl_ops->set_fwl_region(ti_sci, ®ion))
|
|
pr_err("Could not disable firewall %5d (%25s)\n",
|
|
region.fwl_id, fwl_data[i].name);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
void spl_enable_dcache(void)
|
|
{
|
|
#if !(defined(CONFIG_SYS_ICACHE_OFF) && defined(CONFIG_SYS_DCACHE_OFF))
|
|
phys_addr_t ram_top = CFG_SYS_SDRAM_BASE;
|
|
|
|
dram_init();
|
|
|
|
/* reserve TLB table */
|
|
gd->arch.tlb_size = PGTABLE_SIZE;
|
|
|
|
ram_top += get_effective_memsize();
|
|
/* keep ram_top in the 32-bit address space */
|
|
if (ram_top >= 0x100000000)
|
|
ram_top = (phys_addr_t) 0x100000000;
|
|
|
|
gd->arch.tlb_addr = ram_top - gd->arch.tlb_size;
|
|
debug("TLB table from %08lx to %08lx\n", gd->arch.tlb_addr,
|
|
gd->arch.tlb_addr + gd->arch.tlb_size);
|
|
|
|
dcache_enable();
|
|
#endif
|
|
}
|
|
|
|
#if !(defined(CONFIG_SYS_ICACHE_OFF) && defined(CONFIG_SYS_DCACHE_OFF))
|
|
void spl_board_prepare_for_boot(void)
|
|
{
|
|
dcache_disable();
|
|
}
|
|
|
|
void spl_board_prepare_for_linux(void)
|
|
{
|
|
dcache_disable();
|
|
}
|
|
#endif
|
|
|
|
int misc_init_r(void)
|
|
{
|
|
if (IS_ENABLED(CONFIG_TI_AM65_CPSW_NUSS)) {
|
|
struct udevice *dev;
|
|
int ret;
|
|
|
|
ret = uclass_get_device_by_driver(UCLASS_MISC,
|
|
DM_DRIVER_GET(am65_cpsw_nuss),
|
|
&dev);
|
|
if (ret)
|
|
printf("Failed to probe am65_cpsw_nuss driver\n");
|
|
}
|
|
|
|
/* Default FIT boot on HS-SE devices */
|
|
if (get_device_type() == K3_DEVICE_TYPE_HS_SE)
|
|
env_set("boot_fit", "1");
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* do_board_detect() - Detect board description
|
|
*
|
|
* Function to detect board description. This is expected to be
|
|
* overridden in the SoC family board file where desired.
|
|
*/
|
|
void __weak do_board_detect(void)
|
|
{
|
|
}
|