blob: 4e16e3b5ef2b41d8be812e84c1664652a77bd978 [file] [log] [blame]
Dan Handley9df48042015-03-19 18:58:55 +00001/*
Soby Mathew7d5a2e72018-01-10 15:59:31 +00002 * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved.
Dan Handley9df48042015-03-19 18:58:55 +00003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handley9df48042015-03-19 18:58:55 +00005 */
6
7#include <arch.h>
8#include <arch_helpers.h>
9#include <arm_def.h>
Dan Handley9df48042015-03-19 18:58:55 +000010#include <assert.h>
11#include <bl_common.h>
Dan Handley9df48042015-03-19 18:58:55 +000012#include <console.h>
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010013#include <debug.h>
Dan Handley9df48042015-03-19 18:58:55 +000014#include <mmio.h>
15#include <plat_arm.h>
16#include <platform.h>
Jeenu Viswambharana5b5b8d2018-02-06 12:21:39 +000017#include <ras.h>
Dan Handley9df48042015-03-19 18:58:55 +000018
Dan Handley9df48042015-03-19 18:58:55 +000019/*
20 * Placeholder variables for copying the arguments that have been passed to
Juan Castillo7d199412015-12-14 09:35:25 +000021 * BL31 from BL2.
Dan Handley9df48042015-03-19 18:58:55 +000022 */
23static entry_point_info_t bl32_image_ep_info;
24static entry_point_info_t bl33_image_ep_info;
25
Soby Mathewaf14b462018-06-01 16:53:38 +010026/*
27 * Check that BL31_BASE is above ARM_TB_FW_CONFIG_LIMIT. The reserved page
28 * is required for SOC_FW_CONFIG/TOS_FW_CONFIG passed from BL2.
29 */
30CASSERT(BL31_BASE >= ARM_TB_FW_CONFIG_LIMIT, assert_bl31_base_overflows);
Dan Handley9df48042015-03-19 18:58:55 +000031
32/* Weak definitions may be overridden in specific ARM standard platform */
Soby Mathew7d5a2e72018-01-10 15:59:31 +000033#pragma weak bl31_early_platform_setup2
Dan Handley9df48042015-03-19 18:58:55 +000034#pragma weak bl31_platform_setup
35#pragma weak bl31_plat_arch_setup
36#pragma weak bl31_plat_get_next_image_ep_info
Dan Handley9df48042015-03-19 18:58:55 +000037
Daniel Boulby45a2c9e2018-07-06 16:54:44 +010038#define MAP_BL31_TOTAL MAP_REGION_FLAT( \
39 BL31_BASE, \
40 BL31_END - BL31_BASE, \
41 MT_MEMORY | MT_RW | MT_SECURE)
Dan Handley9df48042015-03-19 18:58:55 +000042
43/*******************************************************************************
44 * Return a pointer to the 'entry_point_info' structure of the next image for the
Juan Castillo7d199412015-12-14 09:35:25 +000045 * security state specified. BL33 corresponds to the non-secure image type
46 * while BL32 corresponds to the secure image type. A NULL pointer is returned
Dan Handley9df48042015-03-19 18:58:55 +000047 * if the image does not exist.
48 ******************************************************************************/
Sandrine Bailleuxb3b6e222018-07-11 12:44:22 +020049struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type)
Dan Handley9df48042015-03-19 18:58:55 +000050{
51 entry_point_info_t *next_image_info;
52
53 assert(sec_state_is_valid(type));
54 next_image_info = (type == NON_SECURE)
55 ? &bl33_image_ep_info : &bl32_image_ep_info;
56 /*
57 * None of the images on the ARM development platforms can have 0x0
58 * as the entrypoint
59 */
60 if (next_image_info->pc)
61 return next_image_info;
62 else
63 return NULL;
64}
65
66/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +000067 * Perform any BL31 early platform setup common to ARM standard platforms.
Dan Handley9df48042015-03-19 18:58:55 +000068 * Here is an opportunity to copy parameters passed by the calling EL (S-EL1
69 * in BL2 & S-EL3 in BL1) before they are lost (potentially). This needs to be
70 * done before the MMU is initialized so that the memory layout can be used
71 * while creating page tables. BL2 has flushed this information to memory, so
72 * we are guaranteed to pick up good data.
73 ******************************************************************************/
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010074#if LOAD_IMAGE_V2
Soby Mathew7d5a2e72018-01-10 15:59:31 +000075void arm_bl31_early_platform_setup(void *from_bl2, uintptr_t soc_fw_config,
76 uintptr_t hw_config, void *plat_params_from_bl2)
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010077#else
Soby Mathew7d5a2e72018-01-10 15:59:31 +000078void arm_bl31_early_platform_setup(bl31_params_t *from_bl2, uintptr_t soc_fw_config,
79 uintptr_t hw_config, void *plat_params_from_bl2)
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010080#endif
Dan Handley9df48042015-03-19 18:58:55 +000081{
82 /* Initialize the console to provide early debug support */
Antonio Nino Diaz23ede6a2018-06-19 09:29:36 +010083 arm_console_boot_init();
Dan Handley9df48042015-03-19 18:58:55 +000084
85#if RESET_TO_BL31
Juan Castillo7d199412015-12-14 09:35:25 +000086 /* There are no parameters from BL2 if BL31 is a reset vector */
Dan Handley9df48042015-03-19 18:58:55 +000087 assert(from_bl2 == NULL);
88 assert(plat_params_from_bl2 == NULL);
89
Antonio Nino Diazd9166ac2018-05-11 11:15:10 +010090# ifdef BL32_BASE
Juan Castillo7d199412015-12-14 09:35:25 +000091 /* Populate entry point information for BL32 */
Dan Handley9df48042015-03-19 18:58:55 +000092 SET_PARAM_HEAD(&bl32_image_ep_info,
93 PARAM_EP,
94 VERSION_1,
95 0);
96 SET_SECURITY_STATE(bl32_image_ep_info.h.attr, SECURE);
97 bl32_image_ep_info.pc = BL32_BASE;
98 bl32_image_ep_info.spsr = arm_get_spsr_for_bl32_entry();
Antonio Nino Diazd9166ac2018-05-11 11:15:10 +010099# endif /* BL32_BASE */
Dan Handley9df48042015-03-19 18:58:55 +0000100
Juan Castillo7d199412015-12-14 09:35:25 +0000101 /* Populate entry point information for BL33 */
Dan Handley9df48042015-03-19 18:58:55 +0000102 SET_PARAM_HEAD(&bl33_image_ep_info,
103 PARAM_EP,
104 VERSION_1,
105 0);
106 /*
Juan Castillo7d199412015-12-14 09:35:25 +0000107 * Tell BL31 where the non-trusted software image
Dan Handley9df48042015-03-19 18:58:55 +0000108 * is located and the entry state information
109 */
110 bl33_image_ep_info.pc = plat_get_ns_image_entrypoint();
Soby Mathew4876ae32016-05-09 17:20:10 +0100111
Dan Handley9df48042015-03-19 18:58:55 +0000112 bl33_image_ep_info.spsr = arm_get_spsr_for_bl33_entry();
113 SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE);
114
Antonio Nino Diazd9166ac2018-05-11 11:15:10 +0100115# if ARM_LINUX_KERNEL_AS_BL33
116 /*
117 * According to the file ``Documentation/arm64/booting.txt`` of the
118 * Linux kernel tree, Linux expects the physical address of the device
119 * tree blob (DTB) in x0, while x1-x3 are reserved for future use and
120 * must be 0.
121 */
122 bl33_image_ep_info.args.arg0 = (u_register_t)ARM_PRELOADED_DTB_BASE;
123 bl33_image_ep_info.args.arg1 = 0U;
124 bl33_image_ep_info.args.arg2 = 0U;
125 bl33_image_ep_info.args.arg3 = 0U;
126# endif
127
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100128#else /* RESET_TO_BL31 */
129
Dan Handley9df48042015-03-19 18:58:55 +0000130 /*
131 * In debug builds, we pass a special value in 'plat_params_from_bl2'
Juan Castillo7d199412015-12-14 09:35:25 +0000132 * to verify platform parameters from BL2 to BL31.
Dan Handley9df48042015-03-19 18:58:55 +0000133 * In release builds, it's not used.
134 */
135 assert(((unsigned long long)plat_params_from_bl2) ==
136 ARM_BL31_PLAT_PARAM_VAL);
137
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100138# if LOAD_IMAGE_V2
139 /*
140 * Check params passed from BL2 should not be NULL,
141 */
142 bl_params_t *params_from_bl2 = (bl_params_t *)from_bl2;
143 assert(params_from_bl2 != NULL);
144 assert(params_from_bl2->h.type == PARAM_BL_PARAMS);
145 assert(params_from_bl2->h.version >= VERSION_2);
146
147 bl_params_node_t *bl_params = params_from_bl2->head;
148
149 /*
150 * Copy BL33 and BL32 (if present), entry point information.
151 * They are stored in Secure RAM, in BL2's address space.
152 */
Antonio Nino Diaze0b757d2018-08-24 16:30:29 +0100153 while (bl_params != NULL) {
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100154 if (bl_params->image_id == BL32_IMAGE_ID)
155 bl32_image_ep_info = *bl_params->ep_info;
156
157 if (bl_params->image_id == BL33_IMAGE_ID)
158 bl33_image_ep_info = *bl_params->ep_info;
159
160 bl_params = bl_params->next_params_info;
161 }
162
Antonio Nino Diaze0b757d2018-08-24 16:30:29 +0100163 if (bl33_image_ep_info.pc == 0U)
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100164 panic();
165
166# else /* LOAD_IMAGE_V2 */
167
168 /*
169 * Check params passed from BL2 should not be NULL,
170 */
171 assert(from_bl2 != NULL);
172 assert(from_bl2->h.type == PARAM_BL31);
173 assert(from_bl2->h.version >= VERSION_1);
174
Soby Mathew7d5a2e72018-01-10 15:59:31 +0000175 /* Dynamic Config is not supported for LOAD_IMAGE_V1 */
Antonio Nino Diaze0b757d2018-08-24 16:30:29 +0100176 assert(soc_fw_config == 0U);
177 assert(hw_config == 0U);
Soby Mathew7d5a2e72018-01-10 15:59:31 +0000178
Dan Handley9df48042015-03-19 18:58:55 +0000179 /*
Juan Castillo7d199412015-12-14 09:35:25 +0000180 * Copy BL32 (if populated by BL2) and BL33 entry point information.
Dan Handley9df48042015-03-19 18:58:55 +0000181 * They are stored in Secure RAM, in BL2's address space.
182 */
Juan Castillo456deef2015-11-06 10:01:37 +0000183 if (from_bl2->bl32_ep_info)
184 bl32_image_ep_info = *from_bl2->bl32_ep_info;
Dan Handley9df48042015-03-19 18:58:55 +0000185 bl33_image_ep_info = *from_bl2->bl33_ep_info;
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100186
187# endif /* LOAD_IMAGE_V2 */
188#endif /* RESET_TO_BL31 */
Dan Handley9df48042015-03-19 18:58:55 +0000189}
190
Soby Mathew7d5a2e72018-01-10 15:59:31 +0000191void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
192 u_register_t arg2, u_register_t arg3)
Dan Handley9df48042015-03-19 18:58:55 +0000193{
Soby Mathew7d5a2e72018-01-10 15:59:31 +0000194 arm_bl31_early_platform_setup((void *)arg0, arg1, arg2, (void *)arg3);
Dan Handley9df48042015-03-19 18:58:55 +0000195
196 /*
Vikram Kanigirifbb13012016-02-15 11:54:14 +0000197 * Initialize Interconnect for this cluster during cold boot.
Dan Handley9df48042015-03-19 18:58:55 +0000198 * No need for locks as no other CPU is active.
199 */
Vikram Kanigirifbb13012016-02-15 11:54:14 +0000200 plat_arm_interconnect_init();
Sandrine Bailleuxda797f62015-05-14 14:13:05 +0100201
Dan Handley9df48042015-03-19 18:58:55 +0000202 /*
Vikram Kanigirifbb13012016-02-15 11:54:14 +0000203 * Enable Interconnect coherency for the primary CPU's cluster.
Sandrine Bailleuxda797f62015-05-14 14:13:05 +0100204 * Earlier bootloader stages might already do this (e.g. Trusted
205 * Firmware's BL1 does it) but we can't assume so. There is no harm in
206 * executing this code twice anyway.
Dan Handley9df48042015-03-19 18:58:55 +0000207 * Platform specific PSCI code will enable coherency for other
208 * clusters.
209 */
Vikram Kanigirifbb13012016-02-15 11:54:14 +0000210 plat_arm_interconnect_enter_coherency();
Dan Handley9df48042015-03-19 18:58:55 +0000211}
212
213/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000214 * Perform any BL31 platform setup common to ARM standard platforms
Dan Handley9df48042015-03-19 18:58:55 +0000215 ******************************************************************************/
216void arm_bl31_platform_setup(void)
217{
Achin Gupta1fa7eb62015-11-03 14:18:34 +0000218 /* Initialize the GIC driver, cpu and distributor interfaces */
219 plat_arm_gic_driver_init();
Dan Handley9df48042015-03-19 18:58:55 +0000220 plat_arm_gic_init();
Dan Handley9df48042015-03-19 18:58:55 +0000221
222#if RESET_TO_BL31
223 /*
224 * Do initial security configuration to allow DRAM/device access
225 * (if earlier BL has not already done so).
226 */
227 plat_arm_security_setup();
228
Roberto Vargas550eb082018-01-05 16:00:05 +0000229#if defined(PLAT_ARM_MEM_PROT_ADDR)
230 arm_nor_psci_do_dyn_mem_protect();
231#endif /* PLAT_ARM_MEM_PROT_ADDR */
232
Dan Handley9df48042015-03-19 18:58:55 +0000233#endif /* RESET_TO_BL31 */
234
235 /* Enable and initialize the System level generic timer */
236 mmio_write_32(ARM_SYS_CNTCTL_BASE + CNTCR_OFF,
Antonio Nino Diaze0b757d2018-08-24 16:30:29 +0100237 CNTCR_FCREQ(0U) | CNTCR_EN);
Dan Handley9df48042015-03-19 18:58:55 +0000238
239 /* Allow access to the System counter timer module */
Soby Mathew61e8d0b2015-10-12 17:32:29 +0100240 arm_configure_sys_timer();
Dan Handley9df48042015-03-19 18:58:55 +0000241
242 /* Initialize power controller before setting up topology */
243 plat_arm_pwrc_setup();
Jeenu Viswambharana5b5b8d2018-02-06 12:21:39 +0000244
245#if RAS_EXTENSION
246 ras_init();
247#endif
Dan Handley9df48042015-03-19 18:58:55 +0000248}
249
Soby Mathew2fd66be2015-12-09 11:38:43 +0000250/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000251 * Perform any BL31 platform runtime setup prior to BL31 exit common to ARM
Soby Mathew2fd66be2015-12-09 11:38:43 +0000252 * standard platforms
Antonio Nino Diaz23ede6a2018-06-19 09:29:36 +0100253 * Perform BL31 platform setup
Soby Mathew2fd66be2015-12-09 11:38:43 +0000254 ******************************************************************************/
255void arm_bl31_plat_runtime_setup(void)
256{
Antonio Nino Diaz23ede6a2018-06-19 09:29:36 +0100257#if MULTI_CONSOLE_API
258 console_switch_state(CONSOLE_FLAG_RUNTIME);
259#else
260 console_uninit();
261#endif
262
Soby Mathew2fd66be2015-12-09 11:38:43 +0000263 /* Initialize the runtime console */
Antonio Nino Diaz23ede6a2018-06-19 09:29:36 +0100264 arm_console_runtime_init();
Soby Mathew2fd66be2015-12-09 11:38:43 +0000265}
266
Dan Handley9df48042015-03-19 18:58:55 +0000267void bl31_platform_setup(void)
268{
269 arm_bl31_platform_setup();
270}
271
Soby Mathew2fd66be2015-12-09 11:38:43 +0000272void bl31_plat_runtime_setup(void)
273{
274 arm_bl31_plat_runtime_setup();
275}
276
Dan Handley9df48042015-03-19 18:58:55 +0000277/*******************************************************************************
Sandrine Bailleux4a1267a2016-05-18 16:11:47 +0100278 * Perform the very early platform specific architectural setup shared between
279 * ARM standard platforms. This only does basic initialization. Later
280 * architectural setup (bl31_arch_setup()) does not do anything platform
281 * specific.
Dan Handley9df48042015-03-19 18:58:55 +0000282 ******************************************************************************/
283void arm_bl31_plat_arch_setup(void)
284{
Daniel Boulby45a2c9e2018-07-06 16:54:44 +0100285
Roberto Vargase3adc372018-05-23 09:27:06 +0100286#define ARM_MAP_BL_ROMLIB MAP_REGION_FLAT( \
287 BL31_BASE, \
288 BL31_END - BL31_BASE, \
289 MT_MEMORY | MT_RW | MT_SECURE)
290
Daniel Boulby45a2c9e2018-07-06 16:54:44 +0100291 const mmap_region_t bl_regions[] = {
292 MAP_BL31_TOTAL,
Daniel Boulby4e97abd2018-07-16 14:09:15 +0100293 ARM_MAP_BL_RO,
Roberto Vargase3adc372018-05-23 09:27:06 +0100294#if USE_ROMLIB
295 ARM_MAP_ROMLIB_CODE,
296 ARM_MAP_ROMLIB_DATA,
297#endif
Dan Handley9df48042015-03-19 18:58:55 +0000298#if USE_COHERENT_MEM
Daniel Boulby45a2c9e2018-07-06 16:54:44 +0100299 ARM_MAP_BL_COHERENT_RAM,
Dan Handley9df48042015-03-19 18:58:55 +0000300#endif
Daniel Boulby45a2c9e2018-07-06 16:54:44 +0100301 {0}
302 };
303
304 arm_setup_page_tables(bl_regions, plat_arm_get_mmap());
305
Sandrine Bailleux4a1267a2016-05-18 16:11:47 +0100306 enable_mmu_el3(0);
Roberto Vargase3adc372018-05-23 09:27:06 +0100307
308 arm_setup_romlib();
Dan Handley9df48042015-03-19 18:58:55 +0000309}
310
311void bl31_plat_arch_setup(void)
312{
313 arm_bl31_plat_arch_setup();
314}