xref: /openbmc/u-boot/arch/arm/mach-imx/spl.c (revision 57ade079)
1 // SPDX-License-Identifier: GPL-2.0+
2 /*
3  * Copyright (C) 2014 Gateworks Corporation
4  * Copyright (C) 2011-2012 Freescale Semiconductor, Inc.
5  *
6  * Author: Tim Harvey <tharvey@gateworks.com>
7  */
8 
9 #include <common.h>
10 #include <asm/io.h>
11 #include <asm/arch/imx-regs.h>
12 #include <asm/arch/sys_proto.h>
13 #include <asm/spl.h>
14 #include <spl.h>
15 #include <asm/mach-imx/hab.h>
16 #include <asm/mach-imx/boot_mode.h>
17 #include <g_dnl.h>
18 
19 DECLARE_GLOBAL_DATA_PTR;
20 
21 #if defined(CONFIG_MX6)
22 /* determine boot device from SRC_SBMR1 (BOOT_CFG[4:1]) or SRC_GPR9 register */
23 u32 spl_boot_device(void)
24 {
25 	unsigned int bmode = readl(&src_base->sbmr2);
26 	u32 reg = imx6_src_get_boot_mode();
27 
28 	/*
29 	 * Check for BMODE if serial downloader is enabled
30 	 * BOOT_MODE - see IMX6DQRM Table 8-1
31 	 */
32 	if (((bmode >> 24) & 0x03) == 0x01) /* Serial Downloader */
33 		return BOOT_DEVICE_BOARD;
34 
35 	/*
36 	 * The above method does not detect that the boot ROM used
37 	 * serial downloader in case the boot ROM decided to use the
38 	 * serial downloader as a fall back (primary boot source failed).
39 	 *
40 	 * Infer that the boot ROM used the USB serial downloader by
41 	 * checking whether the USB PHY is currently active... This
42 	 * assumes that SPL did not (yet) initialize the USB PHY...
43 	 */
44 	if (is_usbotg_phy_active())
45 		return BOOT_DEVICE_BOARD;
46 
47 	/* BOOT_CFG1[7:4] - see IMX6DQRM Table 8-8 */
48 	switch ((reg & IMX6_BMODE_MASK) >> IMX6_BMODE_SHIFT) {
49 	 /* EIM: See 8.5.1, Table 8-9 */
50 	case IMX6_BMODE_EMI:
51 		/* BOOT_CFG1[3]: NOR/OneNAND Selection */
52 		switch ((reg & IMX6_BMODE_EMI_MASK) >> IMX6_BMODE_EMI_SHIFT) {
53 		case IMX6_BMODE_ONENAND:
54 			return BOOT_DEVICE_ONENAND;
55 		case IMX6_BMODE_NOR:
56 			return BOOT_DEVICE_NOR;
57 		break;
58 		}
59 	/* Reserved: Used to force Serial Downloader */
60 	case IMX6_BMODE_RESERVED:
61 		return BOOT_DEVICE_BOARD;
62 	/* SATA: See 8.5.4, Table 8-20 */
63 #if !defined(CONFIG_MX6UL) && !defined(CONFIG_MX6ULL)
64 	case IMX6_BMODE_SATA:
65 		return BOOT_DEVICE_SATA;
66 #endif
67 	/* Serial ROM: See 8.5.5.1, Table 8-22 */
68 	case IMX6_BMODE_SERIAL_ROM:
69 		/* BOOT_CFG4[2:0] */
70 		switch ((reg & IMX6_BMODE_SERIAL_ROM_MASK) >>
71 			IMX6_BMODE_SERIAL_ROM_SHIFT) {
72 		case IMX6_BMODE_ECSPI1:
73 		case IMX6_BMODE_ECSPI2:
74 		case IMX6_BMODE_ECSPI3:
75 		case IMX6_BMODE_ECSPI4:
76 		case IMX6_BMODE_ECSPI5:
77 			return BOOT_DEVICE_SPI;
78 		case IMX6_BMODE_I2C1:
79 		case IMX6_BMODE_I2C2:
80 		case IMX6_BMODE_I2C3:
81 			return BOOT_DEVICE_I2C;
82 		}
83 		break;
84 	/* SD/eSD: 8.5.3, Table 8-15  */
85 	case IMX6_BMODE_SD:
86 	case IMX6_BMODE_ESD:
87 		return BOOT_DEVICE_MMC1;
88 	/* MMC/eMMC: 8.5.3 */
89 	case IMX6_BMODE_MMC:
90 	case IMX6_BMODE_EMMC:
91 		return BOOT_DEVICE_MMC1;
92 	/* NAND Flash: 8.5.2, Table 8-10 */
93 	case IMX6_BMODE_NAND_MIN ... IMX6_BMODE_NAND_MAX:
94 		return BOOT_DEVICE_NAND;
95 	}
96 	return BOOT_DEVICE_NONE;
97 }
98 
99 #elif defined(CONFIG_MX7) || defined(CONFIG_IMX8M) || defined(CONFIG_IMX8)
100 /* Translate iMX7/i.MX8M boot device to the SPL boot device enumeration */
101 u32 spl_boot_device(void)
102 {
103 #if defined(CONFIG_MX7)
104 	unsigned int bmode = readl(&src_base->sbmr2);
105 
106 	/*
107 	 * Check for BMODE if serial downloader is enabled
108 	 * BOOT_MODE - see IMX7DRM Table 6-24
109 	 */
110 	if (((bmode >> 24) & 0x03) == 0x01) /* Serial Downloader */
111 		return BOOT_DEVICE_BOARD;
112 
113 	/*
114 	 * The above method does not detect that the boot ROM used
115 	 * serial downloader in case the boot ROM decided to use the
116 	 * serial downloader as a fall back (primary boot source failed).
117 	 *
118 	 * Infer that the boot ROM used the USB serial downloader by
119 	 * checking whether the USB PHY is currently active... This
120 	 * assumes that SPL did not (yet) initialize the USB PHY...
121 	 */
122 	if (is_boot_from_usb())
123 		return BOOT_DEVICE_BOARD;
124 #endif
125 
126 	enum boot_device boot_device_spl = get_boot_device();
127 
128 	switch (boot_device_spl) {
129 #if defined(CONFIG_MX7)
130 	case SD1_BOOT:
131 	case MMC1_BOOT:
132 	case SD2_BOOT:
133 	case MMC2_BOOT:
134 	case SD3_BOOT:
135 	case MMC3_BOOT:
136 		return BOOT_DEVICE_MMC1;
137 #elif defined(CONFIG_IMX8)
138 	case MMC1_BOOT:
139 		return BOOT_DEVICE_MMC1;
140 	case SD2_BOOT:
141 		return BOOT_DEVICE_MMC2_2;
142 	case SD3_BOOT:
143 		return BOOT_DEVICE_MMC1;
144 	case FLEXSPI_BOOT:
145 		return BOOT_DEVICE_SPI;
146 #elif defined(CONFIG_IMX8M)
147 	case SD1_BOOT:
148 	case MMC1_BOOT:
149 		return BOOT_DEVICE_MMC1;
150 	case SD2_BOOT:
151 	case MMC2_BOOT:
152 		return BOOT_DEVICE_MMC2;
153 #endif
154 	case NAND_BOOT:
155 		return BOOT_DEVICE_NAND;
156 	case SPI_NOR_BOOT:
157 		return BOOT_DEVICE_SPI;
158 	case USB_BOOT:
159 		return BOOT_DEVICE_USB;
160 	default:
161 		return BOOT_DEVICE_NONE;
162 	}
163 }
164 #endif /* CONFIG_MX7 || CONFIG_IMX8M || CONFIG_IMX8 */
165 
166 #ifdef CONFIG_SPL_USB_GADGET
167 int g_dnl_bind_fixup(struct usb_device_descriptor *dev, const char *name)
168 {
169 	put_unaligned(CONFIG_USB_GADGET_PRODUCT_NUM + 0xfff, &dev->idProduct);
170 
171 	return 0;
172 }
173 #endif
174 
175 #if defined(CONFIG_SPL_MMC_SUPPORT)
176 /* called from spl_mmc to see type of boot mode for storage (RAW or FAT) */
177 u32 spl_boot_mode(const u32 boot_device)
178 {
179 	switch (spl_boot_device()) {
180 	/* for MMC return either RAW or FAT mode */
181 	case BOOT_DEVICE_MMC1:
182 	case BOOT_DEVICE_MMC2:
183 	case BOOT_DEVICE_MMC2_2:
184 #if defined(CONFIG_SPL_FS_FAT)
185 		return MMCSD_MODE_FS;
186 #elif defined(CONFIG_SUPPORT_EMMC_BOOT)
187 		return MMCSD_MODE_EMMCBOOT;
188 #else
189 		return MMCSD_MODE_RAW;
190 #endif
191 		break;
192 	default:
193 		puts("spl: ERROR:  unsupported device\n");
194 		hang();
195 	}
196 }
197 #endif
198 
199 #if defined(CONFIG_SECURE_BOOT)
200 
201 /*
202  * +------------+  0x0 (DDR_UIMAGE_START) -
203  * |   Header   |                          |
204  * +------------+  0x40                    |
205  * |            |                          |
206  * |            |                          |
207  * |            |                          |
208  * |            |                          |
209  * | Image Data |                          |
210  * .            |                          |
211  * .            |                           > Stuff to be authenticated ----+
212  * .            |                          |                                |
213  * |            |                          |                                |
214  * |            |                          |                                |
215  * +------------+                          |                                |
216  * |            |                          |                                |
217  * | Fill Data  |                          |                                |
218  * |            |                          |                                |
219  * +------------+ Align to ALIGN_SIZE      |                                |
220  * |    IVT     |                          |                                |
221  * +------------+ + IVT_SIZE              -                                 |
222  * |            |                                                           |
223  * |  CSF DATA  | <---------------------------------------------------------+
224  * |            |
225  * +------------+
226  * |            |
227  * | Fill Data  |
228  * |            |
229  * +------------+ + CSF_PAD_SIZE
230  */
231 
232 __weak void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
233 {
234 	typedef void __noreturn (*image_entry_noargs_t)(void);
235 	uint32_t offset;
236 
237 	image_entry_noargs_t image_entry =
238 		(image_entry_noargs_t)(unsigned long)spl_image->entry_point;
239 
240 	debug("image entry point: 0x%lX\n", spl_image->entry_point);
241 
242 	if (spl_image->flags & SPL_FIT_FOUND) {
243 		image_entry();
244 	} else {
245 		/*
246 		 * HAB looks for the CSF at the end of the authenticated
247 		 * data therefore, we need to subtract the size of the
248 		 * CSF from the actual filesize
249 		 */
250 		offset = spl_image->size - CONFIG_CSF_SIZE;
251 		if (!imx_hab_authenticate_image(spl_image->load_addr,
252 						offset + IVT_SIZE +
253 						CSF_PAD_SIZE, offset)) {
254 			image_entry();
255 		} else {
256 			puts("spl: ERROR:  image authentication fail\n");
257 			hang();
258 		}
259 	}
260 }
261 
262 ulong board_spl_fit_size_align(ulong size)
263 {
264 	/*
265 	 * HAB authenticate_image requests the IVT offset is
266 	 * aligned to 0x1000
267 	 */
268 
269 	size = ALIGN(size, 0x1000);
270 	size += CONFIG_CSF_SIZE;
271 
272 	return size;
273 }
274 
275 void board_spl_fit_post_load(ulong load_addr, size_t length)
276 {
277 	u32 offset = length - CONFIG_CSF_SIZE;
278 
279 	if (imx_hab_authenticate_image(load_addr,
280 				       offset + IVT_SIZE + CSF_PAD_SIZE,
281 				       offset)) {
282 		puts("spl: ERROR:  image authentication unsuccessful\n");
283 		hang();
284 	}
285 }
286 
287 #endif
288 
289 #if defined(CONFIG_MX6) && defined(CONFIG_SPL_OS_BOOT)
290 int dram_init_banksize(void)
291 {
292 	gd->bd->bi_dram[0].start = CONFIG_SYS_SDRAM_BASE;
293 	gd->bd->bi_dram[0].size = imx_ddr_size();
294 
295 	return 0;
296 }
297 #endif
298