blob: 11d7b995392fc1ded7cf22b34a425f86bf09cc37 [file] [log] [blame]
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +02001/*
Max Shvetsov103e0562021-02-04 16:58:31 +00002 * Copyright (c) 2018-2021, Arm Limited. All rights reserved.
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +02003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <assert.h>
Antonio Nino Diaz43ef3932018-07-03 14:39:47 +01008#include <errno.h>
J-Alves9f6f0142020-06-17 15:37:59 +01009#include <debug.h>
Max Shvetsov103e0562021-02-04 16:58:31 +000010
11#include <cactus_platform_def.h>
12#include <cactus_test_cmds.h>
J-Alves9f6f0142020-06-17 15:37:59 +010013#include <drivers/arm/pl011.h>
14#include <drivers/console.h>
J-Alves9f6f0142020-06-17 15:37:59 +010015#include <lib/aarch64/arch_helpers.h>
16#include <lib/xlat_tables/xlat_mmu_helpers.h>
17#include <lib/xlat_tables/xlat_tables_v2.h>
Max Shvetsov103e0562021-02-04 16:58:31 +000018#include <plat_arm.h>
19#include <plat/common/platform.h>
20#include <platform_def.h>
J-Alves5aecd982020-06-11 10:25:33 +010021#include <sp_helpers.h>
J-Alves9f6f0142020-06-17 15:37:59 +010022#include <std_svc.h>
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010023
Max Shvetsov103e0562021-02-04 16:58:31 +000024#include "cactus_def.h"
25#include "cactus_tests.h"
26#include "cactus.h"
J-Alves63cdaa72020-10-08 17:22:45 +010027
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +020028/* Host machine information injected by the build system in the ELF file. */
29extern const char build_message[];
30extern const char version_string[];
31
J-Alvesd8edeed2020-11-18 10:48:12 +000032/* Memory section to be used for memory share operations */
33static __aligned(PAGE_SIZE) uint8_t share_page[PAGE_SIZE];
34
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010035/*
36 *
37 * Message loop function
38 * Notice we cannot use regular print functions because this serves to both
39 * "primary" and "secondary" VMs. Secondary VM cannot access UART directly
40 * but rather through Hafnium print hypercall.
41 *
42 */
J-Alves63cdaa72020-10-08 17:22:45 +010043static void __dead2 message_loop(ffa_vm_id_t vm_id, struct mailbox_buffers *mb)
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010044{
J-Alves7581c382020-05-07 18:34:20 +010045 smc_ret_values ffa_ret;
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010046 uint32_t sp_response;
J-Alves63cdaa72020-10-08 17:22:45 +010047 ffa_vm_id_t source;
J-Alvesda6ac322020-11-09 15:45:30 +000048 ffa_vm_id_t destination;
J-Alves1d203f12020-11-11 11:38:49 +000049 uint64_t cactus_cmd;
50
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010051 /*
J-Alves63cdaa72020-10-08 17:22:45 +010052 * This initial wait call is necessary to inform SPMD that
53 * SP initialization has completed. It blocks until receiving
54 * a direct message request.
55 */
56
J-Alves7581c382020-05-07 18:34:20 +010057 ffa_ret = ffa_msg_wait();
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010058
59 for (;;) {
J-Alves6cb21d92021-01-07 15:18:12 +000060 VERBOSE("Woke up with func id: %x\n", ffa_func_id(ffa_ret));
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010061
J-Alves6cb21d92021-01-07 15:18:12 +000062 if (ffa_func_id(ffa_ret) == FFA_ERROR) {
63 ERROR("Error: %x\n", ffa_error_code(ffa_ret));
J-Alvesda6ac322020-11-09 15:45:30 +000064 break;
65 }
66
J-Alves6cb21d92021-01-07 15:18:12 +000067 if (ffa_func_id(ffa_ret) != FFA_MSG_SEND_DIRECT_REQ_SMC32 &&
68 ffa_func_id(ffa_ret) != FFA_MSG_SEND_DIRECT_REQ_SMC64) {
69 ERROR("%s(%u) unknown func id 0x%x\n",
70 __func__, vm_id, ffa_func_id(ffa_ret));
Olivier Deprez73d81cf2020-09-15 16:57:00 +020071 break;
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010072 }
73
J-Alves6cb21d92021-01-07 15:18:12 +000074 destination = ffa_dir_msg_dest(ffa_ret);
J-Alvesda6ac322020-11-09 15:45:30 +000075
J-Alves6cb21d92021-01-07 15:18:12 +000076 source = ffa_dir_msg_source(ffa_ret);
J-Alvesda6ac322020-11-09 15:45:30 +000077
78 if (destination != vm_id) {
J-Alves6cb21d92021-01-07 15:18:12 +000079 ERROR("%s(%u) invalid vm id 0x%x\n",
80 __func__, vm_id, destination);
Olivier Deprez73d81cf2020-09-15 16:57:00 +020081 break;
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010082 }
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010083
J-Alves63cdaa72020-10-08 17:22:45 +010084 PRINT_CMD(ffa_ret);
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010085
J-Alves53392012020-11-18 14:51:57 +000086 cactus_cmd = cactus_get_cmd(ffa_ret);
J-Alves1d203f12020-11-11 11:38:49 +000087
88 switch (cactus_cmd) {
J-Alvesb9085f82020-12-07 10:57:28 +000089 case CACTUS_MEM_SEND_CMD:
J-Alves63cdaa72020-10-08 17:22:45 +010090 ffa_memory_management_test(
91 mb, vm_id, source,
J-Alves53392012020-11-18 14:51:57 +000092 cactus_req_mem_send_get_mem_func(
93 ffa_ret),
94 cactus_mem_send_get_handle(ffa_ret));
J-Alves63cdaa72020-10-08 17:22:45 +010095
96 /*
97 * If execution gets to this point means all operations
98 * with memory retrieval went well, as such replying
99 */
J-Alves53392012020-11-18 14:51:57 +0000100 ffa_ret = cactus_success_resp(vm_id, source);
J-Alves63cdaa72020-10-08 17:22:45 +0100101 break;
J-Alvesd8edeed2020-11-18 10:48:12 +0000102 case CACTUS_REQ_MEM_SEND_CMD:
103 {
104 uint32_t mem_func =
J-Alves53392012020-11-18 14:51:57 +0000105 cactus_req_mem_send_get_mem_func(ffa_ret);
J-Alvesd8edeed2020-11-18 10:48:12 +0000106 ffa_vm_id_t receiver =
J-Alves53392012020-11-18 14:51:57 +0000107 cactus_req_mem_send_get_receiver(ffa_ret);
J-Alvesd8edeed2020-11-18 10:48:12 +0000108 ffa_memory_handle_t handle;
J-Alvesda6ac322020-11-09 15:45:30 +0000109
J-Alvesd8edeed2020-11-18 10:48:12 +0000110 VERBOSE("%x requested to send memory to %x (func: %x)\n",
111 source, receiver, mem_func);
112
113 const struct ffa_memory_region_constituent
114 constituents[] = {
115 {(void *)share_page, 1, 0}
116 };
117
118 const uint32_t constituents_count = (
119 sizeof(constituents) /
120 sizeof(constituents[0])
121 );
122
123 handle = ffa_memory_init_and_send(
124 (struct ffa_memory_region *)mb->send, PAGE_SIZE,
125 vm_id, receiver, constituents,
126 constituents_count, mem_func);
127
128 /*
129 * If returned an invalid handle, we should break the
130 * test.
131 */
132 expect(handle != FFA_MEMORY_HANDLE_INVALID, true);
133
J-Alves53392012020-11-18 14:51:57 +0000134 ffa_ret = cactus_mem_send_cmd(vm_id, receiver, mem_func,
135 handle);
J-Alvesd8edeed2020-11-18 10:48:12 +0000136
J-Alves6cb21d92021-01-07 15:18:12 +0000137 if (ffa_func_id(ffa_ret) !=
138 FFA_MSG_SEND_DIRECT_RESP_SMC32) {
139 ERROR("Failed to send message. error: %x\n",
140 ffa_error_code(ffa_ret));
J-Alves53392012020-11-18 14:51:57 +0000141 ffa_ret = cactus_error_resp(vm_id, source);
J-Alvesd8edeed2020-11-18 10:48:12 +0000142 break;
143 }
144
145 /* If anything went bad on the receiver's end. */
J-Alves53392012020-11-18 14:51:57 +0000146 if (cactus_get_response(ffa_ret) == CACTUS_ERROR) {
J-Alvesd8edeed2020-11-18 10:48:12 +0000147 ERROR("Received error from receiver!\n");
J-Alves53392012020-11-18 14:51:57 +0000148 ffa_ret = cactus_error_resp(vm_id, source);
J-Alvesd8edeed2020-11-18 10:48:12 +0000149 break;
150 }
151
152 if (mem_func != FFA_MEM_DONATE_SMC32) {
153 /*
154 * Do a memory reclaim only if the mem_func
155 * regards to memory share or lend operations,
156 * as with a donate the owner is permanently
157 * given up access to the memory region.
158 */
159 if (ffa_mem_reclaim(handle, 0)
160 .ret0 == FFA_ERROR) {
161 ERROR("Failed to reclaim memory!\n");
J-Alves53392012020-11-18 14:51:57 +0000162 ffa_ret = cactus_error_resp(vm_id,
J-Alvesd8edeed2020-11-18 10:48:12 +0000163 source);
164 break;
165 }
166
167 /**
168 * Read Content that has been written to memory
169 * to validate access to memory segment has been
170 * reestablished, and receiver made use of
171 * memory region.
172 */
173 #if (LOG_LEVEL >= LOG_LEVEL_VERBOSE)
174 uint32_t *ptr =
175 (uint32_t *)constituents
176 ->address;
177 VERBOSE("Memory contents after receiver"
178 " SP's use:\n");
179 for (unsigned int i = 0U; i < 5U; i++)
180 VERBOSE(" %u: %x\n", i,
181 ptr[i]);
182 #endif
183 }
184
J-Alves53392012020-11-18 14:51:57 +0000185 ffa_ret = cactus_success_resp(vm_id, source);
186 break;
J-Alvesd8edeed2020-11-18 10:48:12 +0000187 }
J-Alvesda6ac322020-11-09 15:45:30 +0000188 case CACTUS_ECHO_CMD:
189 {
J-Alves53392012020-11-18 14:51:57 +0000190 uint64_t echo_val = cactus_echo_get_val(ffa_ret);
J-Alvesda6ac322020-11-09 15:45:30 +0000191
J-Alves6cb21d92021-01-07 15:18:12 +0000192 VERBOSE("Received echo at %x, value %llx from %x.\n",
193 destination, echo_val, source);
194 ffa_ret = cactus_response(destination, source, echo_val);
J-Alvesda6ac322020-11-09 15:45:30 +0000195 break;
196 }
197 case CACTUS_REQ_ECHO_CMD:
198 {
199 ffa_vm_id_t echo_dest =
J-Alves53392012020-11-18 14:51:57 +0000200 cactus_req_echo_get_echo_dest(ffa_ret);
201 uint64_t echo_val = cactus_echo_get_val(ffa_ret);
J-Alvesda6ac322020-11-09 15:45:30 +0000202 bool success = true;
203
204 VERBOSE("%x requested to send echo to %x, value %llx\n",
205 source, echo_dest, echo_val);
206
J-Alves53392012020-11-18 14:51:57 +0000207 ffa_ret = cactus_echo_send_cmd(vm_id, echo_dest,
J-Alvesda6ac322020-11-09 15:45:30 +0000208 echo_val);
209
J-Alves6cb21d92021-01-07 15:18:12 +0000210 if (ffa_func_id(ffa_ret) !=
211 FFA_MSG_SEND_DIRECT_RESP_SMC32) {
212 ERROR("Failed to send message. error: %x\n",
213 ffa_error_code(ffa_ret));
J-Alvesda6ac322020-11-09 15:45:30 +0000214 success = false;
215 }
216
J-Alves53392012020-11-18 14:51:57 +0000217 if (cactus_get_response(ffa_ret) != echo_val) {
J-Alvesda6ac322020-11-09 15:45:30 +0000218 ERROR("Echo Failed!\n");
219 success = false;
220 }
221
J-Alves53392012020-11-18 14:51:57 +0000222 ffa_ret = success ? cactus_success_resp(vm_id, source) :
223 cactus_error_resp(vm_id, source);
J-Alvesda6ac322020-11-09 15:45:30 +0000224 break;
225 }
J-Alves1d203f12020-11-11 11:38:49 +0000226 case CACTUS_DEADLOCK_CMD:
227 case CACTUS_REQ_DEADLOCK_CMD:
228 {
229 ffa_vm_id_t deadlock_dest =
J-Alves53392012020-11-18 14:51:57 +0000230 cactus_deadlock_get_next_dest(ffa_ret);
J-Alves1d203f12020-11-11 11:38:49 +0000231 ffa_vm_id_t deadlock_next_dest = source;
232
233 if (cactus_cmd == CACTUS_DEADLOCK_CMD) {
234 VERBOSE("%x is creating deadlock. next: %x\n",
235 source, deadlock_dest);
236 } else if (cactus_cmd == CACTUS_REQ_DEADLOCK_CMD) {
237 VERBOSE(
238 "%x requested deadlock with %x and %x\n",
239 source, deadlock_dest, deadlock_next_dest);
240
241 deadlock_next_dest =
J-Alves53392012020-11-18 14:51:57 +0000242 cactus_deadlock_get_next_dest2(ffa_ret);
J-Alves1d203f12020-11-11 11:38:49 +0000243 }
244
J-Alves53392012020-11-18 14:51:57 +0000245 ffa_ret = cactus_deadlock_send_cmd(vm_id, deadlock_dest,
J-Alves1d203f12020-11-11 11:38:49 +0000246 deadlock_next_dest);
247
248 /*
249 * Should be true for the last partition to attempt
250 * an FF-A direct message, to the first partition.
251 */
252 bool is_deadlock_detected =
J-Alves6cb21d92021-01-07 15:18:12 +0000253 (ffa_func_id(ffa_ret) == FFA_ERROR) &&
254 (ffa_error_code(ffa_ret) == FFA_ERROR_BUSY);
J-Alves1d203f12020-11-11 11:38:49 +0000255
256 /*
257 * Should be true after the deadlock has been detected
258 * and after the first response has been sent down the
259 * request chain.
260 */
261 bool is_returning_from_deadlock =
J-Alves6cb21d92021-01-07 15:18:12 +0000262 (ffa_func_id(ffa_ret) ==
263 FFA_MSG_SEND_DIRECT_RESP_SMC32)
J-Alves53392012020-11-18 14:51:57 +0000264 &&
265 (cactus_get_response(ffa_ret) == CACTUS_SUCCESS);
J-Alves1d203f12020-11-11 11:38:49 +0000266
267 if (is_deadlock_detected) {
J-Alves6cb21d92021-01-07 15:18:12 +0000268 NOTICE("Attempting dealock but got error %x\n",
269 ffa_error_code(ffa_ret));
J-Alves1d203f12020-11-11 11:38:49 +0000270 }
271
272 if (is_deadlock_detected ||
273 is_returning_from_deadlock) {
274 /*
275 * This is not the partition, that would have
276 * created the deadlock. As such, reply back
277 * to the partitions.
278 */
J-Alves53392012020-11-18 14:51:57 +0000279 ffa_ret = cactus_success_resp(vm_id, source);
J-Alves1d203f12020-11-11 11:38:49 +0000280 break;
281 }
282
283 /* Shouldn't get to this point */
284 ERROR("Deadlock test went wrong!\n");
J-Alves53392012020-11-18 14:51:57 +0000285 ffa_ret = cactus_error_resp(vm_id, source);
J-Alves1d203f12020-11-11 11:38:49 +0000286 break;
287 }
Olivier Deprez881b1992020-12-01 15:34:34 +0100288 case CACTUS_REQ_SIMD_FILL_CMD:
289 fill_simd_vectors();
290 ffa_ret = cactus_success_resp(vm_id, source);
291 break;
J-Alves63cdaa72020-10-08 17:22:45 +0100292 default:
293 /*
294 * Currently direct message test is handled here.
295 * TODO: create a case within the switch case
296 * For the sake of testing, add the vm id to the
297 * received message.
298 */
J-Alves63cdaa72020-10-08 17:22:45 +0100299 sp_response = ffa_ret.ret3 | vm_id;
Olivier Deprezaed7f082020-11-04 15:11:59 +0100300 VERBOSE("Replying with direct message response: %x\n", sp_response);
J-Alves63cdaa72020-10-08 17:22:45 +0100301 ffa_ret = ffa_msg_send_direct_resp(vm_id,
302 HYP_ID,
303 sp_response);
304
305 break;
306 }
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100307 }
Olivier Deprez73d81cf2020-09-15 16:57:00 +0200308
309 panic();
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100310}
311
312static const mmap_region_t cactus_mmap[] __attribute__((used)) = {
Arunachalam Ganapathy51be1fe2020-09-22 13:25:21 +0100313 /* PLAT_ARM_DEVICE0 area includes UART2 necessary to console */
314 MAP_REGION_FLAT(PLAT_ARM_DEVICE0_BASE, PLAT_ARM_DEVICE0_SIZE,
315 MT_DEVICE | MT_RW),
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100316 {0}
317};
318
Manish Pandey26c6f812020-04-30 11:43:00 +0100319static void cactus_print_memory_layout(unsigned int vm_id)
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200320{
Olivier Deprezaed7f082020-11-04 15:11:59 +0100321 INFO("Secure Partition memory layout:\n");
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200322
Olivier Deprezaed7f082020-11-04 15:11:59 +0100323 INFO(" Text region : %p - %p\n",
Antonio Nino Diaz1486f3b2018-06-26 10:30:10 +0100324 (void *)CACTUS_TEXT_START, (void *)CACTUS_TEXT_END);
Manish Pandey26c6f812020-04-30 11:43:00 +0100325
Olivier Deprezaed7f082020-11-04 15:11:59 +0100326 INFO(" Read-only data region : %p - %p\n",
Antonio Nino Diaz1486f3b2018-06-26 10:30:10 +0100327 (void *)CACTUS_RODATA_START, (void *)CACTUS_RODATA_END);
Manish Pandey26c6f812020-04-30 11:43:00 +0100328
Olivier Deprezaed7f082020-11-04 15:11:59 +0100329 INFO(" Data region : %p - %p\n",
Antonio Nino Diaz1486f3b2018-06-26 10:30:10 +0100330 (void *)CACTUS_DATA_START, (void *)CACTUS_DATA_END);
Manish Pandey26c6f812020-04-30 11:43:00 +0100331
Olivier Deprezaed7f082020-11-04 15:11:59 +0100332 INFO(" BSS region : %p - %p\n",
Antonio Nino Diaz1486f3b2018-06-26 10:30:10 +0100333 (void *)CACTUS_BSS_START, (void *)CACTUS_BSS_END);
Manish Pandey26c6f812020-04-30 11:43:00 +0100334
Olivier Deprezaed7f082020-11-04 15:11:59 +0100335 INFO(" RX : %p - %p\n",
Max Shvetsovc32f4782020-06-23 09:41:15 +0100336 (void *)get_sp_rx_start(vm_id),
337 (void *)get_sp_rx_end(vm_id));
Manish Pandey26c6f812020-04-30 11:43:00 +0100338
Olivier Deprezaed7f082020-11-04 15:11:59 +0100339 INFO(" TX : %p - %p\n",
Max Shvetsovc32f4782020-06-23 09:41:15 +0100340 (void *)get_sp_tx_start(vm_id),
341 (void *)get_sp_tx_end(vm_id));
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200342}
343
Manish Pandey26c6f812020-04-30 11:43:00 +0100344static void cactus_plat_configure_mmu(unsigned int vm_id)
Antonio Nino Diaz43ef3932018-07-03 14:39:47 +0100345{
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100346 mmap_add_region(CACTUS_TEXT_START,
347 CACTUS_TEXT_START,
348 CACTUS_TEXT_END - CACTUS_TEXT_START,
349 MT_CODE);
350 mmap_add_region(CACTUS_RODATA_START,
351 CACTUS_RODATA_START,
352 CACTUS_RODATA_END - CACTUS_RODATA_START,
353 MT_RO_DATA);
354 mmap_add_region(CACTUS_DATA_START,
355 CACTUS_DATA_START,
356 CACTUS_DATA_END - CACTUS_DATA_START,
357 MT_RW_DATA);
358 mmap_add_region(CACTUS_BSS_START,
359 CACTUS_BSS_START,
360 CACTUS_BSS_END - CACTUS_BSS_START,
361 MT_RW_DATA);
Antonio Nino Diaz43ef3932018-07-03 14:39:47 +0100362
Max Shvetsovc32f4782020-06-23 09:41:15 +0100363 mmap_add_region(get_sp_rx_start(vm_id),
364 get_sp_rx_start(vm_id),
Manish Pandey26c6f812020-04-30 11:43:00 +0100365 (CACTUS_RX_TX_SIZE / 2),
366 MT_RO_DATA);
367
Max Shvetsovc32f4782020-06-23 09:41:15 +0100368 mmap_add_region(get_sp_tx_start(vm_id),
369 get_sp_tx_start(vm_id),
Manish Pandey26c6f812020-04-30 11:43:00 +0100370 (CACTUS_RX_TX_SIZE / 2),
371 MT_RW_DATA);
372
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100373 mmap_add(cactus_mmap);
374 init_xlat_tables();
Antonio Nino Diaz43ef3932018-07-03 14:39:47 +0100375}
376
Olivier Deprez458d5532020-06-09 17:56:20 +0200377int tftf_irq_handler_dispatcher(void)
378{
379 ERROR("%s\n", __func__);
380
381 return 0;
382}
383
Antonio Nino Diaz1486f3b2018-06-26 10:30:10 +0100384void __dead2 cactus_main(void)
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200385{
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100386 assert(IS_IN_EL1() != 0);
387
Max Shvetsovc32f4782020-06-23 09:41:15 +0100388 struct mailbox_buffers mb;
J-Alvesda6ac322020-11-09 15:45:30 +0000389
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100390 /* Clear BSS */
391 memset((void *)CACTUS_BSS_START,
392 0, CACTUS_BSS_END - CACTUS_BSS_START);
393
J-Alves7581c382020-05-07 18:34:20 +0100394 /* Get current FFA id */
395 smc_ret_values ffa_id_ret = ffa_id_get();
J-Alves6cb21d92021-01-07 15:18:12 +0000396 if (ffa_func_id(ffa_id_ret) != FFA_SUCCESS_SMC32) {
J-Alves7581c382020-05-07 18:34:20 +0100397 ERROR("FFA_ID_GET failed.\n");
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100398 panic();
399 }
400
J-Alves7581c382020-05-07 18:34:20 +0100401 ffa_vm_id_t ffa_id = ffa_id_ret.ret2 & 0xffff;
Max Shvetsovc32f4782020-06-23 09:41:15 +0100402 mb.send = (void *) get_sp_tx_start(ffa_id);
403 mb.recv = (void *) get_sp_rx_start(ffa_id);
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100404
Manish Pandey26c6f812020-04-30 11:43:00 +0100405 /* Configure and enable Stage-1 MMU, enable D-Cache */
406 cactus_plat_configure_mmu(ffa_id);
407 enable_mmu_el1(0);
408
J-Alves7581c382020-05-07 18:34:20 +0100409 if (ffa_id == SPM_VM_ID_FIRST) {
Arunachalam Ganapathy51be1fe2020-09-22 13:25:21 +0100410 console_init(CACTUS_PL011_UART_BASE,
411 CACTUS_PL011_UART_CLK_IN_HZ,
412 PL011_BAUDRATE);
Manish Pandey29495372020-04-09 15:19:26 +0100413
414 set_putc_impl(PL011_AS_STDOUT);
415
416 NOTICE("Booting Primary Cactus Secure Partition\n%s\n%s\n",
417 build_message, version_string);
Manish Pandey29495372020-04-09 15:19:26 +0100418 } else {
J-Alves83ede9b2020-11-02 17:37:19 +0000419 smc_ret_values ret;
Manish Pandey29495372020-04-09 15:19:26 +0100420 set_putc_impl(HVC_CALL_AS_STDOUT);
421
Olivier Deprezaed7f082020-11-04 15:11:59 +0100422 NOTICE("Booting Secondary Cactus Secure Partition (ID: %x)\n%s\n%s\n",
Ruari Phippsbd0a7e42020-07-17 16:42:21 +0100423 ffa_id, build_message, version_string);
424
Olivier Deprez0be4abe2020-08-04 11:26:13 +0200425 if (ffa_id == (SPM_VM_ID_FIRST + 2)) {
Olivier Deprezaed7f082020-11-04 15:11:59 +0100426 VERBOSE("Mapping RXTX Region\n");
J-Alves83ede9b2020-11-02 17:37:19 +0000427 CONFIGURE_AND_MAP_MAILBOX(mb, PAGE_SIZE, ret);
J-Alves6cb21d92021-01-07 15:18:12 +0000428 if (ffa_func_id(ret) != FFA_SUCCESS_SMC32) {
J-Alves83ede9b2020-11-02 17:37:19 +0000429 ERROR(
J-Alves6cb21d92021-01-07 15:18:12 +0000430 "Failed to map RXTX buffers. Error: %x\n",
431 ffa_error_code(ret));
Ruari Phippsbd0a7e42020-07-17 16:42:21 +0100432 panic();
433 }
Ruari Phippsbd0a7e42020-07-17 16:42:21 +0100434 }
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100435 }
Manish Pandey26c6f812020-04-30 11:43:00 +0100436
Olivier Deprezaed7f082020-11-04 15:11:59 +0100437 INFO("FF-A id: %x\n", ffa_id);
Manish Pandey26c6f812020-04-30 11:43:00 +0100438 cactus_print_memory_layout(ffa_id);
439
J-Alves9f6f0142020-06-17 15:37:59 +0100440 /* Invoking Tests */
Max Shvetsovc32f4782020-06-23 09:41:15 +0100441 ffa_tests(&mb);
J-Alves9f6f0142020-06-17 15:37:59 +0100442
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100443 /* End up to message loop */
J-Alves63cdaa72020-10-08 17:22:45 +0100444 message_loop(ffa_id, &mb);
Antonio Nino Diaz43ef3932018-07-03 14:39:47 +0100445
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100446 /* Not reached */
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200447}