blob: d3e182cac5e463d81712d2bdf3367be4bea3a7c6 [file] [log] [blame]
Michal Simekef8f5592015-06-15 14:22:50 +02001/*
2 * Copyright (c) 2014-2016, ARM Limited and Contributors. All rights reserved.
3 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Michal Simekef8f5592015-06-15 14:22:50 +02005 */
6
7#include <arch_helpers.h>
8#include <assert.h>
9#include <debug.h>
10#include <mmio.h>
11#include "zynqmp_def.h"
Siva Durga Prasad Paladugu8f499722018-05-17 15:17:46 +053012#include "zynqmp_private.h"
Michal Simekef8f5592015-06-15 14:22:50 +020013
14/*
15 * ATFHandoffParams
16 * Parameter bitfield encoding
17 * -----------------------------------------------------------------------------
18 * Exec State 0 0 -> Aarch64, 1-> Aarch32
Soren Brinkmann8bcd3052016-05-29 09:48:26 -070019 * endianness 1 0 -> LE, 1 -> BE
Michal Simekef8f5592015-06-15 14:22:50 +020020 * secure (TZ) 2 0 -> Non secure, 1 -> secure
21 * EL 3:4 00 -> EL0, 01 -> EL1, 10 -> EL2, 11 -> EL3
22 * CPU# 5:6 00 -> A53_0, 01 -> A53_1, 10 -> A53_2, 11 -> A53_3
23 */
24
25#define FSBL_FLAGS_ESTATE_SHIFT 0
26#define FSBL_FLAGS_ESTATE_MASK (1 << FSBL_FLAGS_ESTATE_SHIFT)
27#define FSBL_FLAGS_ESTATE_A64 0
28#define FSBL_FLAGS_ESTATE_A32 1
29
30#define FSBL_FLAGS_ENDIAN_SHIFT 1
31#define FSBL_FLAGS_ENDIAN_MASK (1 << FSBL_FLAGS_ENDIAN_SHIFT)
32#define FSBL_FLAGS_ENDIAN_LE 0
33#define FSBL_FLAGS_ENDIAN_BE 1
34
35#define FSBL_FLAGS_TZ_SHIFT 2
36#define FSBL_FLAGS_TZ_MASK (1 << FSBL_FLAGS_TZ_SHIFT)
37#define FSBL_FLAGS_NON_SECURE 0
38#define FSBL_FLAGS_SECURE 1
39
40#define FSBL_FLAGS_EL_SHIFT 3
41#define FSBL_FLAGS_EL_MASK (3 << FSBL_FLAGS_EL_SHIFT)
42#define FSBL_FLAGS_EL0 0
43#define FSBL_FLAGS_EL1 1
44#define FSBL_FLAGS_EL2 2
45#define FSBL_FLAGS_EL3 3
46
47#define FSBL_FLAGS_CPU_SHIFT 5
48#define FSBL_FLAGS_CPU_MASK (3 << FSBL_FLAGS_CPU_SHIFT)
49#define FSBL_FLAGS_A53_0 0
50#define FSBL_FLAGS_A53_1 1
51#define FSBL_FLAGS_A53_2 2
52#define FSBL_FLAGS_A53_3 3
53
54#define FSBL_MAX_PARTITIONS 8
55
56/* Structure corresponding to each partition entry */
57struct xfsbl_partition {
58 uint64_t entry_point;
59 uint64_t flags;
60};
61
62/* Structure for handoff parameters to ARM Trusted Firmware (ATF) */
63struct xfsbl_atf_handoff_params {
64 uint8_t magic[4];
65 uint32_t num_entries;
66 struct xfsbl_partition partition[FSBL_MAX_PARTITIONS];
67};
68
69/**
70 * @partition: Pointer to partition struct
71 *
72 * Get the target CPU for @partition.
73 *
74 * Return: FSBL_FLAGS_A53_0, FSBL_FLAGS_A53_1, FSBL_FLAGS_A53_2 or FSBL_FLAGS_A53_3
75 */
76static int get_fsbl_cpu(const struct xfsbl_partition *partition)
77{
78 uint64_t flags = partition->flags & FSBL_FLAGS_CPU_MASK;
79
80 return flags >> FSBL_FLAGS_CPU_SHIFT;
81}
82
83/**
84 * @partition: Pointer to partition struct
85 *
86 * Get the target exception level for @partition.
87 *
88 * Return: FSBL_FLAGS_EL0, FSBL_FLAGS_EL1, FSBL_FLAGS_EL2 or FSBL_FLAGS_EL3
89 */
90static int get_fsbl_el(const struct xfsbl_partition *partition)
91{
92 uint64_t flags = partition->flags & FSBL_FLAGS_EL_MASK;
93
Soren Brinkmanndeba2af2016-05-29 09:48:44 -070094 return flags >> FSBL_FLAGS_EL_SHIFT;
Michal Simekef8f5592015-06-15 14:22:50 +020095}
96
97/**
98 * @partition: Pointer to partition struct
99 *
100 * Get the target security state for @partition.
101 *
102 * Return: FSBL_FLAGS_NON_SECURE or FSBL_FLAGS_SECURE
103 */
104static int get_fsbl_ss(const struct xfsbl_partition *partition)
105{
106 uint64_t flags = partition->flags & FSBL_FLAGS_TZ_MASK;
107
108 return flags >> FSBL_FLAGS_TZ_SHIFT;
109}
110
111/**
112 * @partition: Pointer to partition struct
113 *
Soren Brinkmann8bcd3052016-05-29 09:48:26 -0700114 * Get the target endianness for @partition.
Michal Simekef8f5592015-06-15 14:22:50 +0200115 *
116 * Return: SPSR_E_LITTLE or SPSR_E_BIG
117 */
118static int get_fsbl_endian(const struct xfsbl_partition *partition)
119{
120 uint64_t flags = partition->flags & FSBL_FLAGS_ENDIAN_MASK;
121
122 flags >>= FSBL_FLAGS_ENDIAN_SHIFT;
123
124 if (flags == FSBL_FLAGS_ENDIAN_BE)
125 return SPSR_E_BIG;
126 else
127 return SPSR_E_LITTLE;
128}
129
130/**
131 * @partition: Pointer to partition struct
132 *
133 * Get the target execution state for @partition.
134 *
135 * Return: FSBL_FLAGS_ESTATE_A32 or FSBL_FLAGS_ESTATE_A64
136 */
137static int get_fsbl_estate(const struct xfsbl_partition *partition)
138{
139 uint64_t flags = partition->flags & FSBL_FLAGS_ESTATE_MASK;
140
141 return flags >> FSBL_FLAGS_ESTATE_SHIFT;
142}
143
144/**
145 * Populates the bl32 and bl33 image info structures
146 * @bl32: BL32 image info structure
147 * @bl33: BL33 image info structure
148 *
149 * Process the handoff paramters from the FSBL and populate the BL32 and BL33
150 * image info structures accordingly.
Siva Durga Prasad Paladugu8f499722018-05-17 15:17:46 +0530151 *
152 * Return: Return the status of the handoff. The value will be from the
153 * fsbl_handoff enum.
Michal Simekef8f5592015-06-15 14:22:50 +0200154 */
Siva Durga Prasad Paladugu8f499722018-05-17 15:17:46 +0530155enum fsbl_handoff fsbl_atf_handover(entry_point_info_t *bl32, entry_point_info_t *bl33)
Michal Simekef8f5592015-06-15 14:22:50 +0200156{
157 uint64_t atf_handoff_addr;
158 const struct xfsbl_atf_handoff_params *ATFHandoffParams;
159
160 atf_handoff_addr = mmio_read_32(PMU_GLOBAL_GEN_STORAGE6);
161 assert((atf_handoff_addr < BL31_BASE) ||
162 (atf_handoff_addr > (uint64_t)&__BL31_END__));
163 if (!atf_handoff_addr) {
Alistair Francisb8d474f2017-11-30 16:21:21 -0800164 WARN("BL31: No ATF handoff structure passed\n");
Siva Durga Prasad Paladugu8f499722018-05-17 15:17:46 +0530165 return FSBL_HANDOFF_NO_STRUCT;
Michal Simekef8f5592015-06-15 14:22:50 +0200166 }
167
168 ATFHandoffParams = (struct xfsbl_atf_handoff_params *)atf_handoff_addr;
169 if ((ATFHandoffParams->magic[0] != 'X') ||
170 (ATFHandoffParams->magic[1] != 'L') ||
171 (ATFHandoffParams->magic[2] != 'N') ||
172 (ATFHandoffParams->magic[3] != 'X')) {
Masahiro Yamadae93a0f42018-02-02 15:09:36 +0900173 ERROR("BL31: invalid ATF handoff structure at %llx\n",
Michal Simekef8f5592015-06-15 14:22:50 +0200174 atf_handoff_addr);
Siva Durga Prasad Paladugu8f499722018-05-17 15:17:46 +0530175 return FSBL_HANDOFF_INVAL_STRUCT;
Michal Simekef8f5592015-06-15 14:22:50 +0200176 }
177
Masahiro Yamadae93a0f42018-02-02 15:09:36 +0900178 VERBOSE("BL31: ATF handoff params at:0x%llx, entries:%u\n",
Michal Simekef8f5592015-06-15 14:22:50 +0200179 atf_handoff_addr, ATFHandoffParams->num_entries);
180 if (ATFHandoffParams->num_entries > FSBL_MAX_PARTITIONS) {
181 ERROR("BL31: ATF handoff params: too many partitions (%u/%u)\n",
182 ATFHandoffParams->num_entries, FSBL_MAX_PARTITIONS);
Siva Durga Prasad Paladugu8f499722018-05-17 15:17:46 +0530183 return FSBL_HANDOFF_TOO_MANY_PARTS;
Michal Simekef8f5592015-06-15 14:22:50 +0200184 }
185
186 /*
187 * we loop over all passed entries but only populate two image structs
188 * (bl32, bl33). I.e. the last applicable images in the handoff
189 * structure will be used for the hand off
190 */
191 for (size_t i = 0; i < ATFHandoffParams->num_entries; i++) {
192 entry_point_info_t *image;
193 int target_estate, target_secure;
Soren Brinkmann8bcd3052016-05-29 09:48:26 -0700194 int target_cpu, target_endianness, target_el;
Michal Simekef8f5592015-06-15 14:22:50 +0200195
Masahiro Yamadae93a0f42018-02-02 15:09:36 +0900196 VERBOSE("BL31: %zd: entry:0x%llx, flags:0x%llx\n", i,
Michal Simekef8f5592015-06-15 14:22:50 +0200197 ATFHandoffParams->partition[i].entry_point,
198 ATFHandoffParams->partition[i].flags);
199
200 target_cpu = get_fsbl_cpu(&ATFHandoffParams->partition[i]);
201 if (target_cpu != FSBL_FLAGS_A53_0) {
202 WARN("BL31: invalid target CPU (%i)\n", target_cpu);
203 continue;
204 }
205
206 target_el = get_fsbl_el(&ATFHandoffParams->partition[i]);
207 if ((target_el == FSBL_FLAGS_EL3) ||
208 (target_el == FSBL_FLAGS_EL0)) {
209 WARN("BL31: invalid exception level (%i)\n", target_el);
210 continue;
211 }
212
213 target_secure = get_fsbl_ss(&ATFHandoffParams->partition[i]);
214 if (target_secure == FSBL_FLAGS_SECURE &&
215 target_el == FSBL_FLAGS_EL2) {
216 WARN("BL31: invalid security state (%i) for exception level (%i)\n",
217 target_secure, target_el);
218 continue;
219 }
220
221 target_estate = get_fsbl_estate(&ATFHandoffParams->partition[i]);
Soren Brinkmann8bcd3052016-05-29 09:48:26 -0700222 target_endianness = get_fsbl_endian(&ATFHandoffParams->partition[i]);
Michal Simekef8f5592015-06-15 14:22:50 +0200223
224 if (target_secure == FSBL_FLAGS_SECURE) {
225 image = bl32;
226
227 if (target_estate == FSBL_FLAGS_ESTATE_A32)
228 bl32->spsr = SPSR_MODE32(MODE32_svc, SPSR_T_ARM,
Soren Brinkmann8bcd3052016-05-29 09:48:26 -0700229 target_endianness,
Michal Simekef8f5592015-06-15 14:22:50 +0200230 DISABLE_ALL_EXCEPTIONS);
231 else
232 bl32->spsr = SPSR_64(MODE_EL1, MODE_SP_ELX,
233 DISABLE_ALL_EXCEPTIONS);
234 } else {
235 image = bl33;
236
237 if (target_estate == FSBL_FLAGS_ESTATE_A32) {
238 if (target_el == FSBL_FLAGS_EL2)
239 target_el = MODE32_hyp;
240 else
241 target_el = MODE32_sys;
242
243 bl33->spsr = SPSR_MODE32(target_el, SPSR_T_ARM,
Soren Brinkmann8bcd3052016-05-29 09:48:26 -0700244 target_endianness,
Michal Simekef8f5592015-06-15 14:22:50 +0200245 DISABLE_ALL_EXCEPTIONS);
246 } else {
247 if (target_el == FSBL_FLAGS_EL2)
248 target_el = MODE_EL2;
249 else
250 target_el = MODE_EL1;
251
252 bl33->spsr = SPSR_64(target_el, MODE_SP_ELX,
253 DISABLE_ALL_EXCEPTIONS);
254 }
255 }
256
Masahiro Yamadae93a0f42018-02-02 15:09:36 +0900257 VERBOSE("Setting up %s entry point to:%llx, el:%x\n",
Michal Simekef8f5592015-06-15 14:22:50 +0200258 target_secure == FSBL_FLAGS_SECURE ? "BL32" : "BL33",
259 ATFHandoffParams->partition[i].entry_point,
260 target_el);
261 image->pc = ATFHandoffParams->partition[i].entry_point;
262
Soren Brinkmann8bcd3052016-05-29 09:48:26 -0700263 if (target_endianness == SPSR_E_BIG)
Michal Simekef8f5592015-06-15 14:22:50 +0200264 EP_SET_EE(image->h.attr, EP_EE_BIG);
265 else
266 EP_SET_EE(image->h.attr, EP_EE_LITTLE);
267 }
Siva Durga Prasad Paladugu8f499722018-05-17 15:17:46 +0530268
269 return FSBL_HANDOFF_SUCCESS;
Michal Simekef8f5592015-06-15 14:22:50 +0200270}