]> git.ipfire.org Git - people/ms/u-boot.git/blob - arch/arm/cpu/armv7/omap5/fdt.c
mx35: adjust default environment for flea3 board
[people/ms/u-boot.git] / arch / arm / cpu / armv7 / omap5 / fdt.c
1 /*
2 * Copyright 2016 Texas Instruments, Inc.
3 *
4 * SPDX-License-Identifier: GPL-2.0+
5 */
6
7 #include <common.h>
8 #include <libfdt.h>
9 #include <fdt_support.h>
10 #include <malloc.h>
11
12 #include <asm/omap_common.h>
13 #include <asm/arch-omap5/sys_proto.h>
14
15 #ifdef CONFIG_TI_SECURE_DEVICE
16
17 /* Give zero values if not already defined */
18 #ifndef TI_OMAP5_SECURE_BOOT_RESV_SRAM_SZ
19 #define TI_OMAP5_SECURE_BOOT_RESV_SRAM_SZ (0)
20 #endif
21 #ifndef CONFIG_SECURE_RUNTIME_RESV_SRAM_SZ
22 #define CONFIG_SECURE_RUNTIME_RESV_SRAM_SZ (0)
23 #endif
24
25 static u32 hs_irq_skip[] = {
26 8, /* Secure violation reporting interrupt */
27 15, /* One interrupt for SDMA by secure world */
28 118 /* One interrupt for Crypto DMA by secure world */
29 };
30
31 static int ft_hs_fixup_crossbar(void *fdt, bd_t *bd)
32 {
33 const char *path;
34 int offs;
35 int ret;
36 int len, i, old_cnt, new_cnt;
37 u32 *temp;
38 const u32 *p_data;
39
40 /*
41 * Increase the size of the fdt
42 * so we have some breathing room
43 */
44 ret = fdt_increase_size(fdt, 512);
45 if (ret < 0) {
46 printf("Could not increase size of device tree: %s\n",
47 fdt_strerror(ret));
48 return ret;
49 }
50
51 /* Reserve IRQs that are used/needed by secure world */
52 path = "/ocp/crossbar";
53 offs = fdt_path_offset(fdt, path);
54 if (offs < 0) {
55 debug("Node %s not found.\n", path);
56 return 0;
57 }
58
59 /* Get current entries */
60 p_data = fdt_getprop(fdt, offs, "ti,irqs-skip", &len);
61 if (p_data)
62 old_cnt = len / sizeof(u32);
63 else
64 old_cnt = 0;
65
66 new_cnt = sizeof(hs_irq_skip) /
67 sizeof(hs_irq_skip[0]);
68
69 /* Create new/updated skip list for HS parts */
70 temp = malloc(sizeof(u32) * (old_cnt + new_cnt));
71 for (i = 0; i < new_cnt; i++)
72 temp[i] = cpu_to_fdt32(hs_irq_skip[i]);
73 for (i = 0; i < old_cnt; i++)
74 temp[i + new_cnt] = p_data[i];
75
76 /* Blow away old data and set new data */
77 fdt_delprop(fdt, offs, "ti,irqs-skip");
78 ret = fdt_setprop(fdt, offs, "ti,irqs-skip",
79 temp,
80 (old_cnt + new_cnt) * sizeof(u32));
81 free(temp);
82
83 /* Check if the update worked */
84 if (ret < 0) {
85 printf("Could not add ti,irqs-skip property to node %s: %s\n",
86 path, fdt_strerror(ret));
87 return ret;
88 }
89
90 return 0;
91 }
92
93 static int ft_hs_disable_rng(void *fdt, bd_t *bd)
94 {
95 const char *path;
96 int offs;
97 int ret;
98
99 /* Make HW RNG reserved for secure world use */
100 path = "/ocp/rng";
101 offs = fdt_path_offset(fdt, path);
102 if (offs < 0) {
103 debug("Node %s not found.\n", path);
104 return 0;
105 }
106 ret = fdt_setprop_string(fdt, offs,
107 "status", "disabled");
108 if (ret < 0) {
109 printf("Could not add status property to node %s: %s\n",
110 path, fdt_strerror(ret));
111 return ret;
112 }
113 return 0;
114 }
115
116 #if ((TI_OMAP5_SECURE_BOOT_RESV_SRAM_SZ != 0) || \
117 (CONFIG_SECURE_RUNTIME_RESV_SRAM_SZ != 0))
118 static int ft_hs_fixup_sram(void *fdt, bd_t *bd)
119 {
120 const char *path;
121 int offs;
122 int ret;
123 u32 temp[2];
124
125 /*
126 * Update SRAM reservations on secure devices. The OCMC RAM
127 * is always reserved for secure use from the start of that
128 * memory region
129 */
130 path = "/ocp/ocmcram@40300000/sram-hs";
131 offs = fdt_path_offset(fdt, path);
132 if (offs < 0) {
133 debug("Node %s not found.\n", path);
134 return 0;
135 }
136
137 /* relative start offset */
138 temp[0] = cpu_to_fdt32(0);
139 /* reservation size */
140 temp[1] = cpu_to_fdt32(max(TI_OMAP5_SECURE_BOOT_RESV_SRAM_SZ,
141 CONFIG_SECURE_RUNTIME_RESV_SRAM_SZ));
142 fdt_delprop(fdt, offs, "reg");
143 ret = fdt_setprop(fdt, offs, "reg", temp, 2 * sizeof(u32));
144 if (ret < 0) {
145 printf("Could not add reg property to node %s: %s\n",
146 path, fdt_strerror(ret));
147 return ret;
148 }
149
150 return 0;
151 }
152 #else
153 static int ft_hs_fixup_sram(void *fdt, bd_t *bd) { return 0; }
154 #endif
155
156 #if (CONFIG_TI_SECURE_EMIF_TOTAL_REGION_SIZE != 0)
157 static int ft_hs_fixup_dram(void *fdt, bd_t *bd)
158 {
159 const char *path, *subpath;
160 int offs;
161 u32 sec_mem_start = CONFIG_TI_SECURE_EMIF_REGION_START;
162 u32 sec_mem_size = CONFIG_TI_SECURE_EMIF_TOTAL_REGION_SIZE;
163 fdt64_t temp[2];
164
165 /* If start address is zero, place at end of DRAM */
166 if (0 == sec_mem_start)
167 sec_mem_start =
168 (CONFIG_SYS_SDRAM_BASE +
169 (omap_sdram_size() - sec_mem_size));
170
171 /* Delete any original secure_reserved node */
172 path = "/reserved-memory/secure_reserved";
173 offs = fdt_path_offset(fdt, path);
174 if (offs >= 0)
175 fdt_del_node(fdt, offs);
176
177 /* Add new secure_reserved node */
178 path = "/reserved-memory";
179 offs = fdt_path_offset(fdt, path);
180 if (offs < 0) {
181 debug("Node %s not found\n", path);
182 path = "/";
183 subpath = "reserved-memory";
184 fdt_path_offset(fdt, path);
185 offs = fdt_add_subnode(fdt, offs, subpath);
186 if (offs < 0) {
187 printf("Could not create %s%s node.\n", path, subpath);
188 return 1;
189 }
190 path = "/reserved-memory";
191 offs = fdt_path_offset(fdt, path);
192 }
193
194 subpath = "secure_reserved";
195 offs = fdt_add_subnode(fdt, offs, subpath);
196 if (offs < 0) {
197 printf("Could not create %s%s node.\n", path, subpath);
198 return 1;
199 }
200
201 temp[0] = cpu_to_fdt64(((u64)sec_mem_start));
202 temp[1] = cpu_to_fdt64(((u64)sec_mem_size));
203 fdt_setprop_string(fdt, offs, "compatible",
204 "ti,dra7-secure-memory");
205 fdt_setprop_string(fdt, offs, "status", "okay");
206 fdt_setprop(fdt, offs, "no-map", NULL, 0);
207 fdt_setprop(fdt, offs, "reg", temp, sizeof(temp));
208
209 return 0;
210 }
211 #else
212 static int ft_hs_fixup_dram(void *fdt, bd_t *bd) { return 0; }
213 #endif
214
215 static void ft_hs_fixups(void *fdt, bd_t *bd)
216 {
217 /* Check we are running on an HS/EMU device type */
218 if (GP_DEVICE != get_device_type()) {
219 if ((ft_hs_fixup_crossbar(fdt, bd) == 0) &&
220 (ft_hs_disable_rng(fdt, bd) == 0) &&
221 (ft_hs_fixup_sram(fdt, bd) == 0) &&
222 (ft_hs_fixup_dram(fdt, bd) == 0))
223 return;
224 } else {
225 printf("ERROR: Incorrect device type (GP) detected!");
226 }
227 /* Fixup failed or wrong device type */
228 hang();
229 }
230 #else
231 static void ft_hs_fixups(void *fdt, bd_t *bd)
232 {
233 }
234 #endif /* #ifdef CONFIG_TI_SECURE_DEVICE */
235
236 /*
237 * Place for general cpu/SoC FDT fixups. Board specific
238 * fixups should remain in the board files which is where
239 * this function should be called from.
240 */
241 void ft_cpu_setup(void *fdt, bd_t *bd)
242 {
243 ft_hs_fixups(fdt, bd);
244 }