blob: 4b421d71ab776794f670cc2dcd613d31bb5aaf56 [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Dan Handleye83b0ca2014-01-14 18:17:09 +00002 * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
Achin Gupta4f6ad662013-10-25 09:08:21 +010031#include <arch_helpers.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010032#include <assert.h>
33#include <bl_common.h>
Sandrine Bailleuxe3060e22014-06-13 14:48:18 +010034#include <debug.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010035#include <console.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010036#include <mmio.h>
37#include <platform.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010038#include <platform_def.h>
Sandrine Bailleux467d0572014-06-24 14:02:34 +010039#include "../../bl1/bl1_private.h"
Dan Handleyed6ff952014-05-14 17:44:19 +010040#include "fvp_def.h"
41#include "fvp_private.h"
Achin Gupta4f6ad662013-10-25 09:08:21 +010042
Soby Mathew2ae20432015-01-08 18:02:44 +000043#if USE_COHERENT_MEM
Achin Gupta4f6ad662013-10-25 09:08:21 +010044/*******************************************************************************
45 * Declarations of linker defined symbols which will help us find the layout
46 * of trusted SRAM
47 ******************************************************************************/
Sandrine Bailleux8d69a032013-11-27 09:38:52 +000048extern unsigned long __COHERENT_RAM_START__;
49extern unsigned long __COHERENT_RAM_END__;
Achin Gupta4f6ad662013-10-25 09:08:21 +010050
Sandrine Bailleux8d69a032013-11-27 09:38:52 +000051/*
52 * The next 2 constants identify the extents of the coherent memory region.
53 * These addresses are used by the MMU setup code and therefore they must be
54 * page-aligned. It is the responsibility of the linker script to ensure that
55 * __COHERENT_RAM_START__ and __COHERENT_RAM_END__ linker symbols refer to
56 * page-aligned addresses.
57 */
58#define BL1_COHERENT_RAM_BASE (unsigned long)(&__COHERENT_RAM_START__)
59#define BL1_COHERENT_RAM_LIMIT (unsigned long)(&__COHERENT_RAM_END__)
Soby Mathew2ae20432015-01-08 18:02:44 +000060#endif
Achin Gupta4f6ad662013-10-25 09:08:21 +010061
Achin Gupta4f6ad662013-10-25 09:08:21 +010062/* Data structure which holds the extents of the trusted SRAM for BL1*/
Dan Handleye2712bc2014-04-10 15:37:22 +010063static meminfo_t bl1_tzram_layout;
Achin Gupta4f6ad662013-10-25 09:08:21 +010064
Dan Handleye2712bc2014-04-10 15:37:22 +010065meminfo_t *bl1_plat_sec_mem_layout(void)
Achin Gupta4f6ad662013-10-25 09:08:21 +010066{
Sandrine Bailleuxee12f6f2013-11-28 14:55:58 +000067 return &bl1_tzram_layout;
Achin Gupta4f6ad662013-10-25 09:08:21 +010068}
69
70/*******************************************************************************
71 * Perform any BL1 specific platform actions.
72 ******************************************************************************/
73void bl1_early_platform_setup(void)
74{
Sandrine Bailleuxe3060e22014-06-13 14:48:18 +010075 const size_t bl1_size = BL1_RAM_LIMIT - BL1_RAM_BASE;
Achin Gupta4f6ad662013-10-25 09:08:21 +010076
Vikram Kanigiri3684abf2014-03-27 14:33:15 +000077 /* Initialize the console to provide early debug support */
Soby Mathew69817f72014-07-14 15:43:21 +010078 console_init(PL011_UART0_BASE, PL011_UART0_CLK_IN_HZ, PL011_BAUDRATE);
Vikram Kanigiri3684abf2014-03-27 14:33:15 +000079
Sandrine Bailleuxe3060e22014-06-13 14:48:18 +010080 /* Allow BL1 to see the whole Trusted RAM */
Juan Castillo0c70c572014-08-12 13:04:43 +010081 bl1_tzram_layout.total_base = FVP_TRUSTED_SRAM_BASE;
82 bl1_tzram_layout.total_size = FVP_TRUSTED_SRAM_SIZE;
Achin Gupta4f6ad662013-10-25 09:08:21 +010083
Sandrine Bailleuxe3060e22014-06-13 14:48:18 +010084 /* Calculate how much RAM BL1 is using and how much remains free */
Juan Castillo0c70c572014-08-12 13:04:43 +010085 bl1_tzram_layout.free_base = FVP_TRUSTED_SRAM_BASE;
86 bl1_tzram_layout.free_size = FVP_TRUSTED_SRAM_SIZE;
Sandrine Bailleuxe3060e22014-06-13 14:48:18 +010087 reserve_mem(&bl1_tzram_layout.free_base,
88 &bl1_tzram_layout.free_size,
89 BL1_RAM_BASE,
90 bl1_size);
91
Harry Liebel30affd52013-10-30 17:41:48 +000092 /* Initialize the platform config for future decision making */
Dan Handleyea451572014-05-15 14:53:30 +010093 fvp_config_setup();
Achin Gupta4f6ad662013-10-25 09:08:21 +010094}
95
96/*******************************************************************************
97 * Function which will evaluate how much of the trusted ram has been gobbled
98 * up by BL1 and return the base and size of whats available for loading BL2.
99 * Its called after coherency and the MMU have been turned on.
100 ******************************************************************************/
101void bl1_platform_setup(void)
102{
James Morrissey9d72b4e2014-02-10 17:04:32 +0000103 /* Initialise the IO layer and register platform IO devices */
Dan Handleyea451572014-05-15 14:53:30 +0100104 fvp_io_setup();
Achin Gupta4f6ad662013-10-25 09:08:21 +0100105}
106
James Morrissey9d72b4e2014-02-10 17:04:32 +0000107
Achin Gupta4f6ad662013-10-25 09:08:21 +0100108/*******************************************************************************
109 * Perform the very early platform specific architecture setup here. At the
Harry Liebel30affd52013-10-30 17:41:48 +0000110 * moment this only does basic initialization. Later architectural setup
111 * (bl1_arch_setup()) does not do anything platform specific.
Achin Gupta4f6ad662013-10-25 09:08:21 +0100112 ******************************************************************************/
113void bl1_plat_arch_setup(void)
114{
Dan Handleybe234f92014-08-04 16:11:15 +0100115 fvp_cci_init();
116 fvp_cci_enable();
Harry Liebel30affd52013-10-30 17:41:48 +0000117
Dan Handleyea451572014-05-15 14:53:30 +0100118 fvp_configure_mmu_el3(bl1_tzram_layout.total_base,
119 bl1_tzram_layout.total_size,
Juan Castillo0c70c572014-08-12 13:04:43 +0100120 BL1_RO_BASE,
Soby Mathew2ae20432015-01-08 18:02:44 +0000121 BL1_RO_LIMIT
122#if USE_COHERENT_MEM
123 , BL1_COHERENT_RAM_BASE,
124 BL1_COHERENT_RAM_LIMIT
125#endif
126 );
Achin Gupta4f6ad662013-10-25 09:08:21 +0100127}
Vikram Kanigirida567432014-04-15 18:08:08 +0100128
129
130/*******************************************************************************
131 * Before calling this function BL2 is loaded in memory and its entrypoint
132 * is set by load_image. This is a placeholder for the platform to change
133 * the entrypoint of BL2 and set SPSR and security state.
134 * On FVP we are only setting the security state, entrypoint
135 ******************************************************************************/
136void bl1_plat_set_bl2_ep_info(image_info_t *bl2_image,
137 entry_point_info_t *bl2_ep)
138{
139 SET_SECURITY_STATE(bl2_ep->h.attr, SECURE);
140 bl2_ep->spsr = SPSR_64(MODE_EL1, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS);
141}