blob: 5b98079bc7cf789c09286b39a1c64b43e21d1f7c [file] [log] [blame]
Etienne Carriere911de8c2018-02-02 13:23:22 +01001/*
2 * Copyright (c) 2017, ARM Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <arch_helpers.h>
Etienne Carriere911de8c2018-02-02 13:23:22 +01008#include <assert.h>
9#include <bl_common.h>
10#include <console.h>
11#include <debug.h>
12#include <gic_common.h>
13#include <gicv2.h>
14#include <mmio.h>
15#include <platform.h>
16#include <platform_def.h>
17#include <string.h>
18#include <xlat_tables.h>
19#include "../qemu_private.h"
20
21#if RESET_TO_SP_MIN
22#error qemu does not support RESET_TO_SP_MIN
23#endif
24
25static entry_point_info_t bl33_image_ep_info;
26
27/*
28 * The next 3 constants identify the extents of the code, RO data region and the
29 * limit of the BL3-1 image. These addresses are used by the MMU setup code and
30 * therefore they must be page-aligned. It is the responsibility of the linker
31 * script to ensure that __RO_START__, __RO_END__ & __BL31_END__ linker symbols
32 * refer to page-aligned addresses.
33 */
34#define BL32_RO_BASE (unsigned long)(&__RO_START__)
35#define BL32_RO_LIMIT (unsigned long)(&__RO_END__)
36#define BL32_END (unsigned long)(&__BL32_END__)
37
38#if USE_COHERENT_MEM
39/*
40 * The next 2 constants identify the extents of the coherent memory region.
41 * These addresses are used by the MMU setup code and therefore they must be
42 * page-aligned. It is the responsibility of the linker script to ensure that
43 * __COHERENT_RAM_START__ and __COHERENT_RAM_END__ linker symbols
44 * refer to page-aligned addresses.
45 */
46#define BL32_COHERENT_RAM_BASE (unsigned long)(&__COHERENT_RAM_START__)
47#define BL32_COHERENT_RAM_LIMIT (unsigned long)(&__COHERENT_RAM_END__)
48#endif
49
50/******************************************************************************
51 * On a GICv2 system, the Group 1 secure interrupts are treated as Group 0
52 * interrupts.
53 *****************************************************************************/
54#define PLATFORM_G1S_PROPS(grp) \
55 INTR_PROP_DESC(QEMU_IRQ_SEC_SGI_0, GIC_HIGHEST_SEC_PRIORITY, \
56 grp, GIC_INTR_CFG_LEVEL), \
57 INTR_PROP_DESC(QEMU_IRQ_SEC_SGI_1, GIC_HIGHEST_SEC_PRIORITY, \
58 grp, GIC_INTR_CFG_LEVEL), \
59 INTR_PROP_DESC(QEMU_IRQ_SEC_SGI_2, GIC_HIGHEST_SEC_PRIORITY, \
60 grp, GIC_INTR_CFG_LEVEL), \
61 INTR_PROP_DESC(QEMU_IRQ_SEC_SGI_3, GIC_HIGHEST_SEC_PRIORITY, \
62 grp, GIC_INTR_CFG_LEVEL), \
63 INTR_PROP_DESC(QEMU_IRQ_SEC_SGI_4, GIC_HIGHEST_SEC_PRIORITY, \
64 grp, GIC_INTR_CFG_LEVEL), \
65 INTR_PROP_DESC(QEMU_IRQ_SEC_SGI_5, GIC_HIGHEST_SEC_PRIORITY, \
66 grp, GIC_INTR_CFG_LEVEL), \
67 INTR_PROP_DESC(QEMU_IRQ_SEC_SGI_6, GIC_HIGHEST_SEC_PRIORITY, \
68 grp, GIC_INTR_CFG_LEVEL), \
69 INTR_PROP_DESC(QEMU_IRQ_SEC_SGI_7, GIC_HIGHEST_SEC_PRIORITY, \
70 grp, GIC_INTR_CFG_LEVEL)
71
72#define PLATFORM_G0_PROPS(grp)
73
74static const interrupt_prop_t stih410_interrupt_props[] = {
75 PLATFORM_G1S_PROPS(GICV2_INTR_GROUP0),
76 PLATFORM_G0_PROPS(GICV2_INTR_GROUP0)
77};
78
79static unsigned int target_mask_array[PLATFORM_CORE_COUNT];
80
81static const struct gicv2_driver_data plat_gicv2_driver_data = {
82 .gicd_base = GICD_BASE,
83 .gicc_base = GICC_BASE,
84 .interrupt_props = stih410_interrupt_props,
85 .interrupt_props_num = ARRAY_SIZE(stih410_interrupt_props),
86 .target_masks = target_mask_array,
87 .target_masks_num = ARRAY_SIZE(target_mask_array),
88};
89
90/*******************************************************************************
91 * Return a pointer to the 'entry_point_info' structure of the next image for
92 * the security state specified. BL33 corresponds to the non-secure image type
93 * while BL32 corresponds to the secure image type. A NULL pointer is returned
94 * if the image does not exist.
95 ******************************************************************************/
96entry_point_info_t *sp_min_plat_get_bl33_ep_info(void)
97{
98 entry_point_info_t *next_image_info = &bl33_image_ep_info;
99
100 /*
101 * None of the images on the ARM development platforms can have 0x0
102 * as the entrypoint
103 */
104 if (next_image_info->pc)
105 return next_image_info;
106 else
107 return NULL;
108}
109
Antonio Nino Diaz099b0b12018-09-26 09:29:45 +0100110void sp_min_early_platform_setup2(u_register_t arg0, u_register_t arg1,
111 u_register_t arg2, u_register_t arg3)
Etienne Carriere911de8c2018-02-02 13:23:22 +0100112{
Antonio Nino Diaz099b0b12018-09-26 09:29:45 +0100113 bl_params_t *params_from_bl2 = (bl_params_t *)arg0;
Etienne Carriere911de8c2018-02-02 13:23:22 +0100114
115 /* Initialize the console to provide early debug support */
116 console_init(PLAT_QEMU_BOOT_UART_BASE, PLAT_QEMU_BOOT_UART_CLK_IN_HZ,
117 PLAT_QEMU_CONSOLE_BAUDRATE);
118
119 ERROR("qemu sp_min, console init\n");
120 /*
121 * Check params passed from BL2
122 */
123 assert(params_from_bl2);
124 assert(params_from_bl2->h.type == PARAM_BL_PARAMS);
125 assert(params_from_bl2->h.version >= VERSION_2);
126
127 bl_params_node_t *bl_params = params_from_bl2->head;
128
129 /*
130 * Copy BL33 entry point information from BL2's address space.
131 */
132 while (bl_params) {
133 if (bl_params->image_id == BL33_IMAGE_ID)
134 bl33_image_ep_info = *bl_params->ep_info;
135
136 bl_params = bl_params->next_params_info;
137 }
138
139 if (!bl33_image_ep_info.pc)
140 panic();
141}
142
143void sp_min_plat_arch_setup(void)
144{
Antonio Nino Diaz099b0b12018-09-26 09:29:45 +0100145 qemu_configure_mmu_svc_mon(BL32_RO_BASE, BL32_END - BL32_RO_BASE,
Etienne Carriere911de8c2018-02-02 13:23:22 +0100146 BL32_RO_BASE, BL32_RO_LIMIT,
147 BL_COHERENT_RAM_BASE, BL_COHERENT_RAM_END);
148
149}
150
151void sp_min_platform_setup(void)
152{
153 /* Initialize the gic cpu and distributor interfaces */
154 gicv2_driver_init(&plat_gicv2_driver_data);
155 gicv2_distif_init();
156 gicv2_pcpu_distif_init();
157 gicv2_cpuif_enable();
158}
159
160unsigned int plat_get_syscnt_freq2(void)
161{
162 return SYS_COUNTER_FREQ_IN_TICKS;
163}
164
165void sp_min_plat_fiq_handler(uint32_t id)
166{
167 VERBOSE("[sp_min] interrupt #%d\n", id);
168}