| /* |
| * Copyright (c) 2015-2016, ARM Limited and Contributors. All rights reserved. |
| * |
| * SPDX-License-Identifier: BSD-3-Clause |
| */ |
| |
| #include <arch.h> |
| #include <arch_helpers.h> |
| #include <assert.h> |
| #include <bl_common.h> |
| #include <console.h> |
| #include <platform_def.h> |
| #include "qemu_private.h" |
| |
| /******************************************************************************* |
| * Declarations of linker defined symbols which will tell us where BL1 lives |
| * in Trusted RAM |
| ******************************************************************************/ |
| extern uint64_t __BL1_RAM_START__; |
| extern uint64_t __BL1_RAM_END__; |
| #define BL1_RAM_BASE (uint64_t)(&__BL1_RAM_START__) |
| #define BL1_RAM_LIMIT (uint64_t)(&__BL1_RAM_END__) |
| |
| /* Data structure which holds the extents of the trusted SRAM for BL1*/ |
| static meminfo_t bl1_tzram_layout; |
| |
| |
| meminfo_t *bl1_plat_sec_mem_layout(void) |
| { |
| return &bl1_tzram_layout; |
| } |
| |
| /******************************************************************************* |
| * Perform any BL1 specific platform actions. |
| ******************************************************************************/ |
| void bl1_early_platform_setup(void) |
| { |
| /* Initialize the console to provide early debug support */ |
| console_init(PLAT_QEMU_BOOT_UART_BASE, PLAT_QEMU_BOOT_UART_CLK_IN_HZ, |
| PLAT_QEMU_CONSOLE_BAUDRATE); |
| |
| /* Allow BL1 to see the whole Trusted RAM */ |
| bl1_tzram_layout.total_base = BL_RAM_BASE; |
| bl1_tzram_layout.total_size = BL_RAM_SIZE; |
| |
| #if !LOAD_IMAGE_V2 |
| /* Calculate how much RAM BL1 is using and how much remains free */ |
| bl1_tzram_layout.free_base = BL_RAM_BASE; |
| bl1_tzram_layout.free_size = BL_RAM_SIZE; |
| reserve_mem(&bl1_tzram_layout.free_base, &bl1_tzram_layout.free_size, |
| BL1_RAM_BASE, BL1_RAM_LIMIT - BL1_RAM_BASE); |
| #endif /* !LOAD_IMAGE_V2 */ |
| } |
| |
| /****************************************************************************** |
| * Perform the very early platform specific architecture setup. This only |
| * does basic initialization. Later architectural setup (bl1_arch_setup()) |
| * does not do anything platform specific. |
| *****************************************************************************/ |
| void bl1_plat_arch_setup(void) |
| { |
| qemu_configure_mmu_el3(bl1_tzram_layout.total_base, |
| bl1_tzram_layout.total_size, |
| BL1_RO_BASE, BL1_RO_LIMIT, |
| BL_COHERENT_RAM_BASE, BL_COHERENT_RAM_END); |
| } |
| |
| void bl1_platform_setup(void) |
| { |
| plat_qemu_io_setup(); |
| } |
| |
| #if !LOAD_IMAGE_V2 |
| /******************************************************************************* |
| * Function that takes a memory layout into which BL2 has been loaded and |
| * populates a new memory layout for BL2 that ensures that BL1's data sections |
| * resident in secure RAM are not visible to BL2. |
| ******************************************************************************/ |
| void bl1_init_bl2_mem_layout(const meminfo_t *bl1_mem_layout, |
| meminfo_t *bl2_mem_layout) |
| { |
| const size_t bl1_size = BL1_RAM_LIMIT - BL1_RAM_BASE; |
| |
| assert(bl1_mem_layout != NULL); |
| assert(bl2_mem_layout != NULL); |
| |
| /* Check that BL1's memory is lying outside of the free memory */ |
| assert((BL1_RAM_LIMIT <= bl1_mem_layout->free_base) || |
| (BL1_RAM_BASE >= (bl1_mem_layout->free_base + |
| bl1_mem_layout->free_size))); |
| |
| /* Remove BL1 RW data from the scope of memory visible to BL2 */ |
| *bl2_mem_layout = *bl1_mem_layout; |
| reserve_mem(&bl2_mem_layout->total_base, |
| &bl2_mem_layout->total_size, |
| BL1_RAM_BASE, |
| bl1_size); |
| |
| flush_dcache_range((unsigned long)bl2_mem_layout, sizeof(meminfo_t)); |
| } |
| |
| /******************************************************************************* |
| * Before calling this function BL2 is loaded in memory and its entrypoint |
| * is set by load_image. This is a placeholder for the platform to change |
| * the entrypoint of BL2 and set SPSR and security state. |
| * On ARM standard platforms we only set the security state of the entrypoint |
| ******************************************************************************/ |
| void bl1_plat_set_bl2_ep_info(image_info_t *bl2_image, |
| entry_point_info_t *bl2_ep) |
| { |
| SET_SECURITY_STATE(bl2_ep->h.attr, SECURE); |
| bl2_ep->spsr = SPSR_64(MODE_EL1, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS); |
| } |
| #endif /* !LOAD_IMAGE_V2 */ |