blob: 16ab3d74575e56a64c5feb9842d6c5297db7ea8a [file] [log] [blame]
Dan Handleyb4315302015-03-19 18:58:55 +00001/*
Soby Mathew0c306cc2018-01-10 15:59:31 +00002 * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved.
Dan Handleyb4315302015-03-19 18:58:55 +00003 *
dp-arm82cb2c12017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handleyb4315302015-03-19 18:58:55 +00005 */
6
7#include <arch.h>
8#include <arch_helpers.h>
9#include <arm_def.h>
Dan Handleyb4315302015-03-19 18:58:55 +000010#include <assert.h>
11#include <bl_common.h>
Dan Handleyb4315302015-03-19 18:58:55 +000012#include <console.h>
Yatharth Kochara8aa7fe2016-09-13 17:07:57 +010013#include <debug.h>
Dan Handleyb4315302015-03-19 18:58:55 +000014#include <mmio.h>
15#include <plat_arm.h>
16#include <platform.h>
Jeenu Viswambharan0b9ce902018-02-06 12:21:39 +000017#include <ras.h>
Dan Handleyb4315302015-03-19 18:58:55 +000018
Soby Mathew4c0d0392016-06-16 14:52:04 +010019#define BL31_END (uintptr_t)(&__BL31_END__)
Dan Handleyb4315302015-03-19 18:58:55 +000020
Dan Handleyb4315302015-03-19 18:58:55 +000021/*
22 * Placeholder variables for copying the arguments that have been passed to
Juan Castillod1786372015-12-14 09:35:25 +000023 * BL31 from BL2.
Dan Handleyb4315302015-03-19 18:58:55 +000024 */
25static entry_point_info_t bl32_image_ep_info;
26static entry_point_info_t bl33_image_ep_info;
27
28
29/* Weak definitions may be overridden in specific ARM standard platform */
Soby Mathew0c306cc2018-01-10 15:59:31 +000030#pragma weak bl31_early_platform_setup2
Dan Handleyb4315302015-03-19 18:58:55 +000031#pragma weak bl31_platform_setup
32#pragma weak bl31_plat_arch_setup
33#pragma weak bl31_plat_get_next_image_ep_info
Dan Handleyb4315302015-03-19 18:58:55 +000034
35
36/*******************************************************************************
37 * Return a pointer to the 'entry_point_info' structure of the next image for the
Juan Castillod1786372015-12-14 09:35:25 +000038 * security state specified. BL33 corresponds to the non-secure image type
39 * while BL32 corresponds to the secure image type. A NULL pointer is returned
Dan Handleyb4315302015-03-19 18:58:55 +000040 * if the image does not exist.
41 ******************************************************************************/
42entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
43{
44 entry_point_info_t *next_image_info;
45
46 assert(sec_state_is_valid(type));
47 next_image_info = (type == NON_SECURE)
48 ? &bl33_image_ep_info : &bl32_image_ep_info;
49 /*
50 * None of the images on the ARM development platforms can have 0x0
51 * as the entrypoint
52 */
53 if (next_image_info->pc)
54 return next_image_info;
55 else
56 return NULL;
57}
58
59/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +000060 * Perform any BL31 early platform setup common to ARM standard platforms.
Dan Handleyb4315302015-03-19 18:58:55 +000061 * Here is an opportunity to copy parameters passed by the calling EL (S-EL1
62 * in BL2 & S-EL3 in BL1) before they are lost (potentially). This needs to be
63 * done before the MMU is initialized so that the memory layout can be used
64 * while creating page tables. BL2 has flushed this information to memory, so
65 * we are guaranteed to pick up good data.
66 ******************************************************************************/
Yatharth Kochara8aa7fe2016-09-13 17:07:57 +010067#if LOAD_IMAGE_V2
Soby Mathew0c306cc2018-01-10 15:59:31 +000068void arm_bl31_early_platform_setup(void *from_bl2, uintptr_t soc_fw_config,
69 uintptr_t hw_config, void *plat_params_from_bl2)
Yatharth Kochara8aa7fe2016-09-13 17:07:57 +010070#else
Soby Mathew0c306cc2018-01-10 15:59:31 +000071void arm_bl31_early_platform_setup(bl31_params_t *from_bl2, uintptr_t soc_fw_config,
72 uintptr_t hw_config, void *plat_params_from_bl2)
Yatharth Kochara8aa7fe2016-09-13 17:07:57 +010073#endif
Dan Handleyb4315302015-03-19 18:58:55 +000074{
75 /* Initialize the console to provide early debug support */
76 console_init(PLAT_ARM_BOOT_UART_BASE, PLAT_ARM_BOOT_UART_CLK_IN_HZ,
77 ARM_CONSOLE_BAUDRATE);
78
79#if RESET_TO_BL31
Juan Castillod1786372015-12-14 09:35:25 +000080 /* There are no parameters from BL2 if BL31 is a reset vector */
Dan Handleyb4315302015-03-19 18:58:55 +000081 assert(from_bl2 == NULL);
82 assert(plat_params_from_bl2 == NULL);
83
Juan Castillo5ea8aa72015-11-06 10:01:37 +000084#ifdef BL32_BASE
Juan Castillod1786372015-12-14 09:35:25 +000085 /* Populate entry point information for BL32 */
Dan Handleyb4315302015-03-19 18:58:55 +000086 SET_PARAM_HEAD(&bl32_image_ep_info,
87 PARAM_EP,
88 VERSION_1,
89 0);
90 SET_SECURITY_STATE(bl32_image_ep_info.h.attr, SECURE);
91 bl32_image_ep_info.pc = BL32_BASE;
92 bl32_image_ep_info.spsr = arm_get_spsr_for_bl32_entry();
Juan Castillo5ea8aa72015-11-06 10:01:37 +000093#endif /* BL32_BASE */
Dan Handleyb4315302015-03-19 18:58:55 +000094
Juan Castillod1786372015-12-14 09:35:25 +000095 /* Populate entry point information for BL33 */
Dan Handleyb4315302015-03-19 18:58:55 +000096 SET_PARAM_HEAD(&bl33_image_ep_info,
97 PARAM_EP,
98 VERSION_1,
99 0);
100 /*
Juan Castillod1786372015-12-14 09:35:25 +0000101 * Tell BL31 where the non-trusted software image
Dan Handleyb4315302015-03-19 18:58:55 +0000102 * is located and the entry state information
103 */
104 bl33_image_ep_info.pc = plat_get_ns_image_entrypoint();
Soby Mathew48ac1df2016-05-09 17:20:10 +0100105
Dan Handleyb4315302015-03-19 18:58:55 +0000106 bl33_image_ep_info.spsr = arm_get_spsr_for_bl33_entry();
107 SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE);
108
Yatharth Kochara8aa7fe2016-09-13 17:07:57 +0100109#else /* RESET_TO_BL31 */
110
Dan Handleyb4315302015-03-19 18:58:55 +0000111 /*
112 * In debug builds, we pass a special value in 'plat_params_from_bl2'
Juan Castillod1786372015-12-14 09:35:25 +0000113 * to verify platform parameters from BL2 to BL31.
Dan Handleyb4315302015-03-19 18:58:55 +0000114 * In release builds, it's not used.
115 */
116 assert(((unsigned long long)plat_params_from_bl2) ==
117 ARM_BL31_PLAT_PARAM_VAL);
118
Yatharth Kochara8aa7fe2016-09-13 17:07:57 +0100119# if LOAD_IMAGE_V2
120 /*
121 * Check params passed from BL2 should not be NULL,
122 */
123 bl_params_t *params_from_bl2 = (bl_params_t *)from_bl2;
124 assert(params_from_bl2 != NULL);
125 assert(params_from_bl2->h.type == PARAM_BL_PARAMS);
126 assert(params_from_bl2->h.version >= VERSION_2);
127
128 bl_params_node_t *bl_params = params_from_bl2->head;
129
130 /*
131 * Copy BL33 and BL32 (if present), entry point information.
132 * They are stored in Secure RAM, in BL2's address space.
133 */
134 while (bl_params) {
135 if (bl_params->image_id == BL32_IMAGE_ID)
136 bl32_image_ep_info = *bl_params->ep_info;
137
138 if (bl_params->image_id == BL33_IMAGE_ID)
139 bl33_image_ep_info = *bl_params->ep_info;
140
141 bl_params = bl_params->next_params_info;
142 }
143
144 if (bl33_image_ep_info.pc == 0)
145 panic();
146
147# else /* LOAD_IMAGE_V2 */
148
149 /*
150 * Check params passed from BL2 should not be NULL,
151 */
152 assert(from_bl2 != NULL);
153 assert(from_bl2->h.type == PARAM_BL31);
154 assert(from_bl2->h.version >= VERSION_1);
155
Soby Mathew0c306cc2018-01-10 15:59:31 +0000156 /* Dynamic Config is not supported for LOAD_IMAGE_V1 */
157 assert(soc_fw_config == 0);
158 assert(hw_config == 0);
159
Dan Handleyb4315302015-03-19 18:58:55 +0000160 /*
Juan Castillod1786372015-12-14 09:35:25 +0000161 * Copy BL32 (if populated by BL2) and BL33 entry point information.
Dan Handleyb4315302015-03-19 18:58:55 +0000162 * They are stored in Secure RAM, in BL2's address space.
163 */
Juan Castillo5ea8aa72015-11-06 10:01:37 +0000164 if (from_bl2->bl32_ep_info)
165 bl32_image_ep_info = *from_bl2->bl32_ep_info;
Dan Handleyb4315302015-03-19 18:58:55 +0000166 bl33_image_ep_info = *from_bl2->bl33_ep_info;
Yatharth Kochara8aa7fe2016-09-13 17:07:57 +0100167
168# endif /* LOAD_IMAGE_V2 */
169#endif /* RESET_TO_BL31 */
Dan Handleyb4315302015-03-19 18:58:55 +0000170}
171
Soby Mathew0c306cc2018-01-10 15:59:31 +0000172void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
173 u_register_t arg2, u_register_t arg3)
Dan Handleyb4315302015-03-19 18:58:55 +0000174{
Soby Mathew0c306cc2018-01-10 15:59:31 +0000175 arm_bl31_early_platform_setup((void *)arg0, arg1, arg2, (void *)arg3);
Dan Handleyb4315302015-03-19 18:58:55 +0000176
177 /*
Vikram Kanigiri6355f232016-02-15 11:54:14 +0000178 * Initialize Interconnect for this cluster during cold boot.
Dan Handleyb4315302015-03-19 18:58:55 +0000179 * No need for locks as no other CPU is active.
180 */
Vikram Kanigiri6355f232016-02-15 11:54:14 +0000181 plat_arm_interconnect_init();
Sandrine Bailleuxa6695272015-05-14 14:13:05 +0100182
Dan Handleyb4315302015-03-19 18:58:55 +0000183 /*
Vikram Kanigiri6355f232016-02-15 11:54:14 +0000184 * Enable Interconnect coherency for the primary CPU's cluster.
Sandrine Bailleuxa6695272015-05-14 14:13:05 +0100185 * Earlier bootloader stages might already do this (e.g. Trusted
186 * Firmware's BL1 does it) but we can't assume so. There is no harm in
187 * executing this code twice anyway.
Dan Handleyb4315302015-03-19 18:58:55 +0000188 * Platform specific PSCI code will enable coherency for other
189 * clusters.
190 */
Vikram Kanigiri6355f232016-02-15 11:54:14 +0000191 plat_arm_interconnect_enter_coherency();
Dan Handleyb4315302015-03-19 18:58:55 +0000192}
193
194/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000195 * Perform any BL31 platform setup common to ARM standard platforms
Dan Handleyb4315302015-03-19 18:58:55 +0000196 ******************************************************************************/
197void arm_bl31_platform_setup(void)
198{
Achin Gupta27573c52015-11-03 14:18:34 +0000199 /* Initialize the GIC driver, cpu and distributor interfaces */
200 plat_arm_gic_driver_init();
Dan Handleyb4315302015-03-19 18:58:55 +0000201 plat_arm_gic_init();
Dan Handleyb4315302015-03-19 18:58:55 +0000202
203#if RESET_TO_BL31
204 /*
205 * Do initial security configuration to allow DRAM/device access
206 * (if earlier BL has not already done so).
207 */
208 plat_arm_security_setup();
209
210#endif /* RESET_TO_BL31 */
211
212 /* Enable and initialize the System level generic timer */
213 mmio_write_32(ARM_SYS_CNTCTL_BASE + CNTCR_OFF,
214 CNTCR_FCREQ(0) | CNTCR_EN);
215
216 /* Allow access to the System counter timer module */
Soby Mathewc1bb8a02015-10-12 17:32:29 +0100217 arm_configure_sys_timer();
Dan Handleyb4315302015-03-19 18:58:55 +0000218
219 /* Initialize power controller before setting up topology */
220 plat_arm_pwrc_setup();
Jeenu Viswambharan0b9ce902018-02-06 12:21:39 +0000221
222#if RAS_EXTENSION
223 ras_init();
224#endif
Dan Handleyb4315302015-03-19 18:58:55 +0000225}
226
Soby Mathew080225d2015-12-09 11:38:43 +0000227/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000228 * Perform any BL31 platform runtime setup prior to BL31 exit common to ARM
Soby Mathew080225d2015-12-09 11:38:43 +0000229 * standard platforms
230 ******************************************************************************/
231void arm_bl31_plat_runtime_setup(void)
232{
233 /* Initialize the runtime console */
234 console_init(PLAT_ARM_BL31_RUN_UART_BASE, PLAT_ARM_BL31_RUN_UART_CLK_IN_HZ,
235 ARM_CONSOLE_BAUDRATE);
236}
237
Dan Handleyb4315302015-03-19 18:58:55 +0000238void bl31_platform_setup(void)
239{
240 arm_bl31_platform_setup();
241}
242
Soby Mathew080225d2015-12-09 11:38:43 +0000243void bl31_plat_runtime_setup(void)
244{
245 arm_bl31_plat_runtime_setup();
246}
247
Dan Handleyb4315302015-03-19 18:58:55 +0000248/*******************************************************************************
Sandrine Bailleuxb5fa6562016-05-18 16:11:47 +0100249 * Perform the very early platform specific architectural setup shared between
250 * ARM standard platforms. This only does basic initialization. Later
251 * architectural setup (bl31_arch_setup()) does not do anything platform
252 * specific.
Dan Handleyb4315302015-03-19 18:58:55 +0000253 ******************************************************************************/
254void arm_bl31_plat_arch_setup(void)
255{
Sandrine Bailleux0af559a2016-07-08 14:38:16 +0100256 arm_setup_page_tables(BL31_BASE,
257 BL31_END - BL31_BASE,
258 BL_CODE_BASE,
Masahiro Yamadaecdc8982017-01-18 02:10:08 +0900259 BL_CODE_END,
Sandrine Bailleux0af559a2016-07-08 14:38:16 +0100260 BL_RO_DATA_BASE,
Masahiro Yamadaecdc8982017-01-18 02:10:08 +0900261 BL_RO_DATA_END
Dan Handleyb4315302015-03-19 18:58:55 +0000262#if USE_COHERENT_MEM
Masahiro Yamada47497052016-12-28 16:11:41 +0900263 , BL_COHERENT_RAM_BASE,
264 BL_COHERENT_RAM_END
Dan Handleyb4315302015-03-19 18:58:55 +0000265#endif
266 );
Sandrine Bailleuxb5fa6562016-05-18 16:11:47 +0100267 enable_mmu_el3(0);
Dan Handleyb4315302015-03-19 18:58:55 +0000268}
269
270void bl31_plat_arch_setup(void)
271{
272 arm_bl31_plat_arch_setup();
273}