• Heiko Stuebner's avatar
    rockchip: make miniloader ddr_parameter handling optional · df5a9683
    Heiko Stuebner authored
    
    Transfering the regions of ddr memory to additionally protect is very much
    specific to some rockchip internal first stage bootloader and doesn't get
    used in either mainline uboot or even Rockchip's published vendor uboot
    sources.
    
    This results in a big error
        ERROR:   over or zero region, nr=0, max=10
    getting emitted on every boot for most users and such a message coming
    from early firmware might actually confuse developers working with the
    system.
    
    As this mechanism seems to be only be used by Rockchip's internal miniloader
    hide it behind a build conditional, so it doesn't confuse people too much.
    Signed-off-by: default avatarHeiko Stuebner <heiko.stuebner@theobroma-systems.com>
    Change-Id: I52c02decc60fd431ea78c7486cad5bac82bdbfbe
    df5a9683
secure.c 2.9 KB
/*
 * Copyright (c) 2019, ARM Limited and Contributors. All rights reserved.
 *
 * SPDX-License-Identifier: BSD-3-Clause
 */

#include <assert.h>
#include <ddr_parameter.h>
#include <plat_private.h>
#include <secure.h>
#include <px30_def.h>

/**
 * There are 8 regions for DDR security control
 * @rgn - the DDR regions 0 ~ 7 which are can be configured.
 * @st - start address to set as secure
 * @sz - length of area to set as secure
 * The internal unit is megabytes, so memory areas need to be aligned
 * to megabyte borders.
 */
static void secure_ddr_region(uint32_t rgn,
			      uintptr_t st, size_t sz)
{
	uintptr_t ed = st + sz;
	uintptr_t st_mb, ed_mb;
	uint32_t val;

	assert(rgn <= 7);
	assert(st < ed);

	/* check aligned 1MB */
	assert(st % SIZE_M(1) == 0);
	assert(ed % SIZE_M(1) == 0);

	st_mb = st / SIZE_M(1);
	ed_mb = ed / SIZE_M(1);

	/* map top and base */
	mmio_write_32(FIREWALL_DDR_BASE +
		      FIREWALL_DDR_FW_DDR_RGN(rgn),
		      RG_MAP_SECURE(ed_mb, st_mb));

	/* enable secure */
	val = mmio_read_32(FIREWALL_DDR_BASE + FIREWALL_DDR_FW_DDR_CON_REG);
	val |= BIT(rgn);
	mmio_write_32(FIREWALL_DDR_BASE +
		      FIREWALL_DDR_FW_DDR_CON_REG, val);
}

void secure_timer_init(void)
{
	mmio_write_32(STIMER_CHN_BASE(1) + TIMER_CONTROL_REG,
		      TIMER_DIS);

	mmio_write_32(STIMER_CHN_BASE(1) + TIMER_LOAD_COUNT0, 0xffffffff);
	mmio_write_32(STIMER_CHN_BASE(1) + TIMER_LOAD_COUNT1, 0xffffffff);

	/* auto reload & enable the timer */
	mmio_write_32(STIMER_CHN_BASE(1) + TIMER_CONTROL_REG,
		      TIMER_EN | TIMER_FMODE);
}

void sgrf_init(void)
{
#ifdef PLAT_RK_SECURE_DDR_MINILOADER
	uint32_t i;
	struct param_ddr_usage usg;

	/* general secure regions */
	usg = ddr_region_usage_parse(DDR_PARAM_BASE,
				     PLAT_MAX_DDR_CAPACITY_MB);

	/* region-0 for TF-A, region-1 for optional OP-TEE */
	assert(usg.s_nr < 7);

	for (i = 0; i < usg.s_nr; i++)
		secure_ddr_region(7 - i, usg.s_top[i], usg.s_base[i]);
#endif

	/* secure the trustzone ram */
	secure_ddr_region(0, TZRAM_BASE, TZRAM_SIZE);

	/* set all slave ip into no-secure, except stimer */
	mmio_write_32(SGRF_BASE + SGRF_SOC_CON(4), SGRF_SLV_S_ALL_NS);
	mmio_write_32(SGRF_BASE + SGRF_SOC_CON(5), SGRF_SLV_S_ALL_NS);
	mmio_write_32(SGRF_BASE + SGRF_SOC_CON(6), SGRF_SLV_S_ALL_NS);
	mmio_write_32(SGRF_BASE + SGRF_SOC_CON(7), SGRF_SLV_S_ALL_NS);
	mmio_write_32(SGRF_BASE + SGRF_SOC_CON(8), 0x00030000);

	/* set master crypto to no-secure, dcf to secure */
	mmio_write_32(SGRF_BASE + SGRF_SOC_CON(3), 0x000f0003);

	/* set DMAC into no-secure */
	mmio_write_32(SGRF_BASE + SGRF_DMAC_CON(0), DMA_IRQ_BOOT_NS);
	mmio_write_32(SGRF_BASE + SGRF_DMAC_CON(1), DMA_PERI_CH_NS_15_0);
	mmio_write_32(SGRF_BASE + SGRF_DMAC_CON(2), DMA_PERI_CH_NS_19_16);
	mmio_write_32(SGRF_BASE + SGRF_DMAC_CON(3), DMA_MANAGER_BOOT_NS);

	/* soft reset dma before use */
	mmio_write_32(SGRF_BASE + SGRF_SOC_CON(1), DMA_SOFTRST_REQ);
	udelay(5);
	mmio_write_32(SGRF_BASE + SGRF_SOC_CON(1), DMA_SOFTRST_RLS);
}