blob: 60d96233dd0aaf957351a88c7ad814e4210dc8ab [file] [log] [blame]
Jens Wiklander52c798e2015-12-07 14:37:10 +01001/*
Douglas Raillarda8954fc2017-01-26 15:54:44 +00002 * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved.
Jens Wiklander52c798e2015-12-07 14:37:10 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Jens Wiklander52c798e2015-12-07 14:37:10 +01005 */
6#include <arch_helpers.h>
Fu Weic2f78442017-05-27 21:21:42 +08007#include <assert.h>
Jens Wiklander52c798e2015-12-07 14:37:10 +01008#include <bl_common.h>
9#include <console.h>
10#include <debug.h>
Fu Weic2f78442017-05-27 21:21:42 +080011#include <desc_image_load.h>
Jens Wiklander0acbaaa2017-08-24 13:16:26 +020012#ifdef SPD_opteed
13#include <optee_utils.h>
14#endif
Jens Wiklander52c798e2015-12-07 14:37:10 +010015#include <libfdt.h>
16#include <platform_def.h>
Jens Wiklander52c798e2015-12-07 14:37:10 +010017#include <string.h>
Douglas Raillarda8954fc2017-01-26 15:54:44 +000018#include <utils.h>
Isla Mitchelle3631462017-07-14 10:46:32 +010019#include "qemu_private.h"
Jens Wiklander52c798e2015-12-07 14:37:10 +010020
21/*
22 * The next 2 constants identify the extents of the code & RO data region.
23 * These addresses are used by the MMU setup code and therefore they must be
24 * page-aligned. It is the responsibility of the linker script to ensure that
25 * __RO_START__ and __RO_END__ linker symbols refer to page-aligned addresses.
26 */
27#define BL2_RO_BASE (unsigned long)(&__RO_START__)
28#define BL2_RO_LIMIT (unsigned long)(&__RO_END__)
29
Fu Weic2f78442017-05-27 21:21:42 +080030/* Data structure which holds the extents of the trusted SRAM for BL2 */
31static meminfo_t bl2_tzram_layout __aligned(CACHE_WRITEBACK_GRANULE);
32
33#if !LOAD_IMAGE_V2
Jens Wiklander52c798e2015-12-07 14:37:10 +010034/*******************************************************************************
35 * This structure represents the superset of information that is passed to
36 * BL3-1, e.g. while passing control to it from BL2, bl31_params
37 * and other platform specific params
38 ******************************************************************************/
39typedef struct bl2_to_bl31_params_mem {
40 bl31_params_t bl31_params;
41 image_info_t bl31_image_info;
42 image_info_t bl32_image_info;
43 image_info_t bl33_image_info;
44 entry_point_info_t bl33_ep_info;
45 entry_point_info_t bl32_ep_info;
46 entry_point_info_t bl31_ep_info;
47} bl2_to_bl31_params_mem_t;
48
49
50static bl2_to_bl31_params_mem_t bl31_params_mem;
51
Jens Wiklander52c798e2015-12-07 14:37:10 +010052
53meminfo_t *bl2_plat_sec_mem_layout(void)
54{
55 return &bl2_tzram_layout;
56}
57
58/*******************************************************************************
59 * This function assigns a pointer to the memory that the platform has kept
60 * aside to pass platform specific and trusted firmware related information
61 * to BL31. This memory is allocated by allocating memory to
62 * bl2_to_bl31_params_mem_t structure which is a superset of all the
63 * structure whose information is passed to BL31
64 * NOTE: This function should be called only once and should be done
65 * before generating params to BL31
66 ******************************************************************************/
67bl31_params_t *bl2_plat_get_bl31_params(void)
68{
69 bl31_params_t *bl2_to_bl31_params;
70
71 /*
72 * Initialise the memory for all the arguments that needs to
73 * be passed to BL3-1
74 */
Douglas Raillarda8954fc2017-01-26 15:54:44 +000075 zeromem(&bl31_params_mem, sizeof(bl2_to_bl31_params_mem_t));
Jens Wiklander52c798e2015-12-07 14:37:10 +010076
77 /* Assign memory for TF related information */
78 bl2_to_bl31_params = &bl31_params_mem.bl31_params;
79 SET_PARAM_HEAD(bl2_to_bl31_params, PARAM_BL31, VERSION_1, 0);
80
81 /* Fill BL3-1 related information */
82 bl2_to_bl31_params->bl31_image_info = &bl31_params_mem.bl31_image_info;
83 SET_PARAM_HEAD(bl2_to_bl31_params->bl31_image_info, PARAM_IMAGE_BINARY,
84 VERSION_1, 0);
85
86 /* Fill BL3-2 related information */
87 bl2_to_bl31_params->bl32_ep_info = &bl31_params_mem.bl32_ep_info;
88 SET_PARAM_HEAD(bl2_to_bl31_params->bl32_ep_info, PARAM_EP,
89 VERSION_1, 0);
90 bl2_to_bl31_params->bl32_image_info = &bl31_params_mem.bl32_image_info;
91 SET_PARAM_HEAD(bl2_to_bl31_params->bl32_image_info, PARAM_IMAGE_BINARY,
92 VERSION_1, 0);
93
94 /* Fill BL3-3 related information */
95 bl2_to_bl31_params->bl33_ep_info = &bl31_params_mem.bl33_ep_info;
96 SET_PARAM_HEAD(bl2_to_bl31_params->bl33_ep_info,
97 PARAM_EP, VERSION_1, 0);
98
99 /* BL3-3 expects to receive the primary CPU MPID (through x0) */
100 bl2_to_bl31_params->bl33_ep_info->args.arg0 = 0xffff & read_mpidr();
101
102 bl2_to_bl31_params->bl33_image_info = &bl31_params_mem.bl33_image_info;
103 SET_PARAM_HEAD(bl2_to_bl31_params->bl33_image_info, PARAM_IMAGE_BINARY,
104 VERSION_1, 0);
105
106 return bl2_to_bl31_params;
107}
108
109/* Flush the TF params and the TF plat params */
110void bl2_plat_flush_bl31_params(void)
111{
112 flush_dcache_range((unsigned long)&bl31_params_mem,
113 sizeof(bl2_to_bl31_params_mem_t));
114}
115
116/*******************************************************************************
117 * This function returns a pointer to the shared memory that the platform
118 * has kept to point to entry point information of BL31 to BL2
119 ******************************************************************************/
120struct entry_point_info *bl2_plat_get_bl31_ep_info(void)
121{
122#if DEBUG
123 bl31_params_mem.bl31_ep_info.args.arg1 = QEMU_BL31_PLAT_PARAM_VAL;
124#endif
125
126 return &bl31_params_mem.bl31_ep_info;
127}
Fu Weic2f78442017-05-27 21:21:42 +0800128#endif /* !LOAD_IMAGE_V2 */
Jens Wiklander52c798e2015-12-07 14:37:10 +0100129
130
131
132void bl2_early_platform_setup(meminfo_t *mem_layout)
133{
134 /* Initialize the console to provide early debug support */
135 console_init(PLAT_QEMU_BOOT_UART_BASE, PLAT_QEMU_BOOT_UART_CLK_IN_HZ,
136 PLAT_QEMU_CONSOLE_BAUDRATE);
137
138 /* Setup the BL2 memory layout */
139 bl2_tzram_layout = *mem_layout;
140
141 plat_qemu_io_setup();
142}
143
144static void security_setup(void)
145{
146 /*
147 * This is where a TrustZone address space controller and other
148 * security related peripherals, would be configured.
149 */
150}
151
152static void update_dt(void)
153{
154 int ret;
155 void *fdt = (void *)(uintptr_t)PLAT_QEMU_DT_BASE;
156
157 ret = fdt_open_into(fdt, fdt, PLAT_QEMU_DT_MAX_SIZE);
158 if (ret < 0) {
159 ERROR("Invalid Device Tree at %p: error %d\n", fdt, ret);
160 return;
161 }
162
163 if (dt_add_psci_node(fdt)) {
164 ERROR("Failed to add PSCI Device Tree node\n");
165 return;
166 }
167
168 if (dt_add_psci_cpu_enable_methods(fdt)) {
169 ERROR("Failed to add PSCI cpu enable methods in Device Tree\n");
170 return;
171 }
172
173 ret = fdt_pack(fdt);
174 if (ret < 0)
175 ERROR("Failed to pack Device Tree at %p: error %d\n", fdt, ret);
176}
177
178void bl2_platform_setup(void)
179{
180 security_setup();
181 update_dt();
182
183 /* TODO Initialize timer */
184}
185
186void bl2_plat_arch_setup(void)
187{
188 qemu_configure_mmu_el1(bl2_tzram_layout.total_base,
189 bl2_tzram_layout.total_size,
190 BL2_RO_BASE, BL2_RO_LIMIT,
Masahiro Yamada0fac5af2016-12-28 16:11:41 +0900191 BL_COHERENT_RAM_BASE, BL_COHERENT_RAM_END);
Jens Wiklander52c798e2015-12-07 14:37:10 +0100192}
193
194/*******************************************************************************
195 * Gets SPSR for BL32 entry
196 ******************************************************************************/
197static uint32_t qemu_get_spsr_for_bl32_entry(void)
198{
199 /*
200 * The Secure Payload Dispatcher service is responsible for
201 * setting the SPSR prior to entry into the BL3-2 image.
202 */
203 return 0;
204}
205
206/*******************************************************************************
207 * Gets SPSR for BL33 entry
208 ******************************************************************************/
209static uint32_t qemu_get_spsr_for_bl33_entry(void)
210{
Jens Wiklander52c798e2015-12-07 14:37:10 +0100211 unsigned int mode;
212 uint32_t spsr;
213
214 /* Figure out what mode we enter the non-secure world in */
Jeenu Viswambharan2a9b8822017-02-21 14:40:44 +0000215 mode = EL_IMPLEMENTED(2) ? MODE_EL2 : MODE_EL1;
Jens Wiklander52c798e2015-12-07 14:37:10 +0100216
217 /*
218 * TODO: Consider the possibility of specifying the SPSR in
219 * the FIP ToC and allowing the platform to have a say as
220 * well.
221 */
222 spsr = SPSR_64(mode, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS);
223 return spsr;
224}
225
Fu Weic2f78442017-05-27 21:21:42 +0800226#if LOAD_IMAGE_V2
227static int qemu_bl2_handle_post_image_load(unsigned int image_id)
228{
229 int err = 0;
230 bl_mem_params_node_t *bl_mem_params = get_bl_mem_params_node(image_id);
Jens Wiklander0acbaaa2017-08-24 13:16:26 +0200231#ifdef SPD_opteed
232 bl_mem_params_node_t *pager_mem_params = NULL;
233 bl_mem_params_node_t *paged_mem_params = NULL;
234#endif
Fu Weic2f78442017-05-27 21:21:42 +0800235
236 assert(bl_mem_params);
237
238 switch (image_id) {
239# ifdef AARCH64
240 case BL32_IMAGE_ID:
Jens Wiklander0acbaaa2017-08-24 13:16:26 +0200241#ifdef SPD_opteed
242 pager_mem_params = get_bl_mem_params_node(BL32_EXTRA1_IMAGE_ID);
243 assert(pager_mem_params);
244
245 paged_mem_params = get_bl_mem_params_node(BL32_EXTRA2_IMAGE_ID);
246 assert(paged_mem_params);
247
248 err = parse_optee_header(&bl_mem_params->ep_info,
249 &pager_mem_params->image_info,
250 &paged_mem_params->image_info);
251 if (err != 0) {
252 WARN("OPTEE header parse error.\n");
253 }
254
255 /*
256 * OP-TEE expect to receive DTB address in x2.
257 * This will be copied into x2 by dispatcher.
258 */
259 bl_mem_params->ep_info.args.arg3 = PLAT_QEMU_DT_BASE;
260#endif
Fu Weic2f78442017-05-27 21:21:42 +0800261 bl_mem_params->ep_info.spsr = qemu_get_spsr_for_bl32_entry();
262 break;
263# endif
264 case BL33_IMAGE_ID:
265 /* BL33 expects to receive the primary CPU MPID (through r0) */
266 bl_mem_params->ep_info.args.arg0 = 0xffff & read_mpidr();
267 bl_mem_params->ep_info.spsr = qemu_get_spsr_for_bl33_entry();
268 break;
269 }
270
271 return err;
272}
273
274/*******************************************************************************
275 * This function can be used by the platforms to update/use image
276 * information for given `image_id`.
277 ******************************************************************************/
278int bl2_plat_handle_post_image_load(unsigned int image_id)
279{
280 return qemu_bl2_handle_post_image_load(image_id);
281}
282
283#else /* LOAD_IMAGE_V2 */
284
Jens Wiklander52c798e2015-12-07 14:37:10 +0100285/*******************************************************************************
286 * Before calling this function BL3-1 is loaded in memory and its entrypoint
287 * is set by load_image. This is a placeholder for the platform to change
288 * the entrypoint of BL3-1 and set SPSR and security state.
289 * On ARM standard platforms we only set the security state of the entrypoint
290 ******************************************************************************/
291void bl2_plat_set_bl31_ep_info(image_info_t *bl31_image_info,
292 entry_point_info_t *bl31_ep_info)
293{
294 SET_SECURITY_STATE(bl31_ep_info->h.attr, SECURE);
295 bl31_ep_info->spsr = SPSR_64(MODE_EL3, MODE_SP_ELX,
296 DISABLE_ALL_EXCEPTIONS);
297}
298
299/*******************************************************************************
300 * Before calling this function BL3-2 is loaded in memory and its entrypoint
301 * is set by load_image. This is a placeholder for the platform to change
302 * the entrypoint of BL3-2 and set SPSR and security state.
303 * On ARM standard platforms we only set the security state of the entrypoint
304 ******************************************************************************/
305void bl2_plat_set_bl32_ep_info(image_info_t *bl32_image_info,
306 entry_point_info_t *bl32_ep_info)
307{
308 SET_SECURITY_STATE(bl32_ep_info->h.attr, SECURE);
309 bl32_ep_info->spsr = qemu_get_spsr_for_bl32_entry();
310}
311
312/*******************************************************************************
313 * Before calling this function BL3-3 is loaded in memory and its entrypoint
314 * is set by load_image. This is a placeholder for the platform to change
315 * the entrypoint of BL3-3 and set SPSR and security state.
316 * On ARM standard platforms we only set the security state of the entrypoint
317 ******************************************************************************/
318void bl2_plat_set_bl33_ep_info(image_info_t *image,
319 entry_point_info_t *bl33_ep_info)
320{
321
322 SET_SECURITY_STATE(bl33_ep_info->h.attr, NON_SECURE);
323 bl33_ep_info->spsr = qemu_get_spsr_for_bl33_entry();
324}
325
326/*******************************************************************************
327 * Populate the extents of memory available for loading BL32
328 ******************************************************************************/
329void bl2_plat_get_bl32_meminfo(meminfo_t *bl32_meminfo)
330{
331 /*
332 * Populate the extents of memory available for loading BL32.
333 */
334 bl32_meminfo->total_base = BL32_BASE;
335 bl32_meminfo->free_base = BL32_BASE;
336 bl32_meminfo->total_size = (BL32_MEM_BASE + BL32_MEM_SIZE) - BL32_BASE;
337 bl32_meminfo->free_size = (BL32_MEM_BASE + BL32_MEM_SIZE) - BL32_BASE;
338}
339
340/*******************************************************************************
341 * Populate the extents of memory available for loading BL33
342 ******************************************************************************/
343void bl2_plat_get_bl33_meminfo(meminfo_t *bl33_meminfo)
344{
345 bl33_meminfo->total_base = NS_DRAM0_BASE;
346 bl33_meminfo->total_size = NS_DRAM0_SIZE;
347 bl33_meminfo->free_base = NS_DRAM0_BASE;
348 bl33_meminfo->free_size = NS_DRAM0_SIZE;
349}
Fu Weic2f78442017-05-27 21:21:42 +0800350#endif /* !LOAD_IMAGE_V2 */
Jens Wiklander52c798e2015-12-07 14:37:10 +0100351
352unsigned long plat_get_ns_image_entrypoint(void)
353{
354 return NS_IMAGE_OFFSET;
355}