blob: 6a7c0c808ea7cf45a26d360634d55181d4001264 [file] [log] [blame]
laurenw-arm7c7b1982020-10-21 13:34:40 -05001/*
2 * Copyright (c) 2021, ARM Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
Gary Morrison3d7f6542021-01-27 13:08:47 -06007/* Use the xlat_tables_v2 data structures: */
8#define XLAT_TABLES_LIB_V2 1
9
laurenw-arm7c7b1982020-10-21 13:34:40 -050010#include <assert.h>
11
12#include <bl1/bl1.h>
13#include <common/tbbr/tbbr_img_def.h>
14#include <drivers/arm/sp805.h>
laurenw-arm56f1e3e2021-03-03 14:19:38 -060015#include <lib/fconf/fconf.h>
16#include <lib/fconf/fconf_dyn_cfg_getter.h>
Manish Pandeye2a6b352021-10-04 13:38:56 +010017#include <lib/xlat_mpu/xlat_mpu.h>
laurenw-arm7c7b1982020-10-21 13:34:40 -050018
19#include "fvp_r_private.h"
20#include <plat/arm/common/arm_config.h>
21#include <plat/arm/common/arm_def.h>
22#include <plat/arm/common/plat_arm.h>
23#include <plat/common/platform.h>
Gary Morrison3d7f6542021-01-27 13:08:47 -060024#include <platform_def.h>
25
26#define MAP_BL1_TOTAL MAP_REGION_FLAT( \
27 bl1_tzram_layout.total_base, \
28 bl1_tzram_layout.total_size, \
29 MT_MEMORY | MT_RW | MT_SECURE)
30/*
31 * If SEPARATE_CODE_AND_RODATA=1 we define a region for each section
32 * otherwise one region is defined containing both
33 */
34#if SEPARATE_CODE_AND_RODATA
35#define MAP_BL1_RO MAP_REGION_FLAT( \
36 BL_CODE_BASE, \
37 BL1_CODE_END - BL_CODE_BASE, \
38 MT_CODE | MT_SECURE), \
39 MAP_REGION_FLAT( \
40 BL1_RO_DATA_BASE, \
41 BL1_RO_DATA_END \
42 - BL_RO_DATA_BASE, \
43 MT_RO_DATA | MT_SECURE)
44#else
45#define MAP_BL1_RO MAP_REGION_FLAT( \
46 BL_CODE_BASE, \
47 BL1_CODE_END - BL_CODE_BASE, \
48 MT_CODE | MT_SECURE)
49#endif
50
51/* Data structure which holds the extents of the trusted SRAM for BL1*/
52static meminfo_t bl1_tzram_layout;
53
54struct meminfo *bl1_plat_sec_mem_layout(void)
55{
56 return &bl1_tzram_layout;
57}
58
59void arm_bl1_early_platform_setup(void)
60{
61
62#if !ARM_DISABLE_TRUSTED_WDOG
63 /* Enable watchdog */
64 plat_arm_secure_wdt_start();
65#endif
66
67 /* Initialize the console to provide early debug support */
68 arm_console_boot_init();
69
70 /* Allow BL1 to see the whole Trusted RAM */
71 bl1_tzram_layout.total_base = ARM_BL_RAM_BASE;
72 bl1_tzram_layout.total_size = ARM_BL_RAM_SIZE;
73}
laurenw-arm7c7b1982020-10-21 13:34:40 -050074
laurenw-arm56f1e3e2021-03-03 14:19:38 -060075/* Boolean variable to hold condition whether firmware update needed or not */
76static bool is_fwu_needed;
77
laurenw-arm7c7b1982020-10-21 13:34:40 -050078/*******************************************************************************
79 * Perform any BL1 specific platform actions.
80 ******************************************************************************/
81void bl1_early_platform_setup(void)
82{
83 arm_bl1_early_platform_setup();
84
85 /* Initialize the platform config for future decision making */
86 fvp_config_setup();
87
88 /*
89 * Initialize Interconnect for this cluster during cold boot.
90 * No need for locks as no other CPU is active.
91 */
92 fvp_interconnect_init();
93 /*
94 * Enable coherency in Interconnect for the primary CPU's cluster.
95 */
96 fvp_interconnect_enable();
97}
98
Gary Morrison3d7f6542021-01-27 13:08:47 -060099void arm_bl1_plat_arch_setup(void)
100{
101 const mmap_region_t bl_regions[] = {
102 MAP_BL1_TOTAL,
103 MAP_BL1_RO,
104#if USE_ROMLIB
105 ARM_MAP_ROMLIB_CODE,
106 ARM_MAP_ROMLIB_DATA,
107#endif
Gary Morrison3d7f6542021-01-27 13:08:47 -0600108 /* DRAM1_region: */
Elyes Haouas183638f2023-02-13 10:05:41 +0100109 MAP_REGION_FLAT(
110 PLAT_ARM_DRAM1_BASE,
111 PLAT_ARM_DRAM1_SIZE,
112 MT_MEMORY | MT_SECURE | MT_EXECUTE
Gary Morrison3d7f6542021-01-27 13:08:47 -0600113 | MT_RW | MT_NON_CACHEABLE),
114 /* NULL terminator: */
115 {0}
116 };
117
118 setup_page_tables(bl_regions, plat_arm_get_mmap());
119 enable_mpu_el2(0);
120
121 arm_setup_romlib();
122}
123
laurenw-arm7c7b1982020-10-21 13:34:40 -0500124void plat_arm_secure_wdt_start(void)
125{
126 sp805_start(ARM_SP805_TWDG_BASE, ARM_TWDG_LOAD_VAL);
127}
128
129void plat_arm_secure_wdt_stop(void)
130{
131 sp805_stop(ARM_SP805_TWDG_BASE);
132}
133
laurenw-arm56f1e3e2021-03-03 14:19:38 -0600134/*
135 * Perform the platform specific architecture setup shared between
136 * ARM standard platforms.
137 */
138void arm_bl1_platform_setup(void)
139{
laurenw-arm56f1e3e2021-03-03 14:19:38 -0600140 uint32_t fw_config_max_size;
141
142 /* Initialise the IO layer and register platform IO devices */
143 plat_arm_io_setup();
144
145 /* Check if we need FWU before further processing */
146 is_fwu_needed = plat_arm_bl1_fwu_needed();
147 if (is_fwu_needed) {
148 ERROR("Skip platform setup as FWU detected\n");
149 return;
150 }
151
152 /* Set global DTB info for fixed fw_config information */
153 fw_config_max_size = ARM_FW_CONFIG_LIMIT - ARM_FW_CONFIG_BASE;
Manish V Badarkheddf3abb2022-04-22 10:05:53 +0100154 set_config_info(ARM_FW_CONFIG_BASE, ~0UL, fw_config_max_size,
155 FW_CONFIG_ID);
laurenw-arm56f1e3e2021-03-03 14:19:38 -0600156
Manish Pandeyfe7c7132021-10-13 13:29:06 +0100157 assert(bl1_plat_get_image_desc(BL33_IMAGE_ID) != NULL);
laurenw-arm56f1e3e2021-03-03 14:19:38 -0600158
159 /*
160 * Allow access to the System counter timer module and program
161 * counter frequency for non secure images during FWU
162 */
163#ifdef ARM_SYS_TIMCTL_BASE
164 arm_configure_sys_timer();
165#endif
166#if (ARM_ARCH_MAJOR > 7) || defined(ARMV7_SUPPORTS_GENERIC_TIMER)
167 write_cntfrq_el0(plat_get_syscnt_freq2());
168#endif
169}
170
laurenw-arm7c7b1982020-10-21 13:34:40 -0500171void bl1_platform_setup(void)
172{
173 arm_bl1_platform_setup();
174
175 /* Initialize System level generic or SP804 timer */
176 fvp_timer_init();
177}
178
179__dead2 void bl1_plat_fwu_done(void *client_cookie, void *reserved)
180{
181 /* Setup the watchdog to reset the system as soon as possible */
182 sp805_refresh(ARM_SP805_TWDG_BASE, 1U);
183
184 while (true) {
185 wfi();
186 }
187}
laurenw-arm56f1e3e2021-03-03 14:19:38 -0600188
189unsigned int bl1_plat_get_next_image_id(void)
190{
191 return is_fwu_needed ? NS_BL1U_IMAGE_ID : BL33_IMAGE_ID;
192}
193
194/*
195 * Returns BL33 image details.
196 */
197struct image_desc *bl1_plat_get_image_desc(unsigned int image_id)
198{
199 static image_desc_t bl33_img_desc = BL33_IMAGE_DESC;
200
201 return &bl33_img_desc;
202}
203
204/*
205 * This function populates the default arguments to BL33.
206 * The BL33 memory layout structure is allocated and the
207 * calculated layout is populated in arg1 to BL33.
208 */
209int bl1_plat_handle_post_image_load(unsigned int image_id)
210{
211 meminfo_t *bl33_secram_layout;
212 meminfo_t *bl1_secram_layout;
213 image_desc_t *image_desc;
214 entry_point_info_t *ep_info;
215
216 if (image_id != BL33_IMAGE_ID) {
217 return 0;
218 }
219 /* Get the image descriptor */
220 image_desc = bl1_plat_get_image_desc(BL33_IMAGE_ID);
221 assert(image_desc != NULL);
222
223 /* Get the entry point info */
224 ep_info = &image_desc->ep_info;
225
226 /* Find out how much free trusted ram remains after BL1 load */
227 bl1_secram_layout = bl1_plat_sec_mem_layout();
228
229 /*
230 * Create a new layout of memory for BL33 as seen by BL1 i.e.
231 * tell it the amount of total and free memory available.
232 * This layout is created at the first free address visible
233 * to BL33. BL33 will read the memory layout before using its
234 * memory for other purposes.
235 */
236 bl33_secram_layout = (meminfo_t *) bl1_secram_layout->total_base;
237
238 bl1_calc_bl2_mem_layout(bl1_secram_layout, bl33_secram_layout);
239
240 ep_info->args.arg1 = (uintptr_t)bl33_secram_layout;
241
242 VERBOSE("BL1: BL3 memory layout address = %p\n",
243 (void *) bl33_secram_layout);
244 return 0;
245}