blob: 79a4b6b4b60ac1b1ff14301f0b189f54a0a2109d [file] [log] [blame]
Soby Mathew7b754182016-07-11 14:15:27 +01001/*
2 * Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
3 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Soby Mathew7b754182016-07-11 14:15:27 +01005 */
6
7#include <assert.h>
8#include <console.h>
Yatharth Kochar1c16a4c2016-06-30 14:50:58 +01009#include <debug.h>
Soby Mathew7b754182016-07-11 14:15:27 +010010#include <mmio.h>
11#include <plat_arm.h>
12#include <platform.h>
13#include <platform_def.h>
14#include <platform_sp_min.h>
15
16#define BL32_END (uintptr_t)(&__BL32_END__)
17
Soby Mathew7b754182016-07-11 14:15:27 +010018static entry_point_info_t bl33_image_ep_info;
19
20/* Weak definitions may be overridden in specific ARM standard platform */
21#pragma weak sp_min_early_platform_setup
22#pragma weak sp_min_platform_setup
23#pragma weak sp_min_plat_arch_setup
24
Soby Mathew7b754182016-07-11 14:15:27 +010025
26/*******************************************************************************
27 * Return a pointer to the 'entry_point_info' structure of the next image for the
28 * security state specified. BL33 corresponds to the non-secure image type
29 * while BL32 corresponds to the secure image type. A NULL pointer is returned
30 * if the image does not exist.
31 ******************************************************************************/
32entry_point_info_t *sp_min_plat_get_bl33_ep_info(void)
33{
34 entry_point_info_t *next_image_info;
35
36 next_image_info = &bl33_image_ep_info;
37
38 /*
39 * None of the images on the ARM development platforms can have 0x0
40 * as the entrypoint
41 */
42 if (next_image_info->pc)
43 return next_image_info;
44 else
45 return NULL;
46}
47
48/*******************************************************************************
Yatharth Kochar1c16a4c2016-06-30 14:50:58 +010049 * Perform early platform setup.
Soby Mathew7b754182016-07-11 14:15:27 +010050 ******************************************************************************/
Yatharth Kochar1c16a4c2016-06-30 14:50:58 +010051void arm_sp_min_early_platform_setup(void *from_bl2,
52 void *plat_params_from_bl2)
Soby Mathew7b754182016-07-11 14:15:27 +010053{
54 /* Initialize the console to provide early debug support */
55 console_init(PLAT_ARM_BOOT_UART_BASE, PLAT_ARM_BOOT_UART_CLK_IN_HZ,
56 ARM_CONSOLE_BAUDRATE);
57
Yatharth Kochar1c16a4c2016-06-30 14:50:58 +010058#if RESET_TO_SP_MIN
59 /* There are no parameters from BL2 if SP_MIN is a reset vector */
60 assert(from_bl2 == NULL);
61 assert(plat_params_from_bl2 == NULL);
62
Soby Mathew7b754182016-07-11 14:15:27 +010063 /* Populate entry point information for BL33 */
64 SET_PARAM_HEAD(&bl33_image_ep_info,
65 PARAM_EP,
66 VERSION_1,
67 0);
68 /*
69 * Tell SP_MIN where the non-trusted software image
70 * is located and the entry state information
71 */
Soby Mathew7b754182016-07-11 14:15:27 +010072 bl33_image_ep_info.pc = plat_get_ns_image_entrypoint();
Soby Mathew7b754182016-07-11 14:15:27 +010073 bl33_image_ep_info.spsr = arm_get_spsr_for_bl33_entry();
74 SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE);
Yatharth Kochar1c16a4c2016-06-30 14:50:58 +010075
76#else /* RESET_TO_SP_MIN */
77
78 /*
79 * Check params passed from BL2 should not be NULL,
80 */
81 bl_params_t *params_from_bl2 = (bl_params_t *)from_bl2;
82 assert(params_from_bl2 != NULL);
83 assert(params_from_bl2->h.type == PARAM_BL_PARAMS);
84 assert(params_from_bl2->h.version >= VERSION_2);
85
86 bl_params_node_t *bl_params = params_from_bl2->head;
87
88 /*
89 * Copy BL33 entry point information.
90 * They are stored in Secure RAM, in BL2's address space.
91 */
92 while (bl_params) {
93 if (bl_params->image_id == BL33_IMAGE_ID) {
94 bl33_image_ep_info = *bl_params->ep_info;
95 break;
96 }
97
98 bl_params = bl_params->next_params_info;
99 }
100
101 if (bl33_image_ep_info.pc == 0)
102 panic();
103
104#endif /* RESET_TO_SP_MIN */
105
Soby Mathew7b754182016-07-11 14:15:27 +0100106}
107
Yatharth Kochar1c16a4c2016-06-30 14:50:58 +0100108void sp_min_early_platform_setup(void *from_bl2,
109 void *plat_params_from_bl2)
Soby Mathew7b754182016-07-11 14:15:27 +0100110{
Yatharth Kochar1c16a4c2016-06-30 14:50:58 +0100111 arm_sp_min_early_platform_setup(from_bl2, plat_params_from_bl2);
Soby Mathew7b754182016-07-11 14:15:27 +0100112
113 /*
114 * Initialize Interconnect for this cluster during cold boot.
115 * No need for locks as no other CPU is active.
116 */
117 plat_arm_interconnect_init();
118
119 /*
120 * Enable Interconnect coherency for the primary CPU's cluster.
121 * Earlier bootloader stages might already do this (e.g. Trusted
122 * Firmware's BL1 does it) but we can't assume so. There is no harm in
123 * executing this code twice anyway.
124 * Platform specific PSCI code will enable coherency for other
125 * clusters.
126 */
127 plat_arm_interconnect_enter_coherency();
128}
129
130/*******************************************************************************
131 * Perform platform specific setup for SP_MIN
132 ******************************************************************************/
133void sp_min_platform_setup(void)
134{
135 /* Initialize the GIC driver, cpu and distributor interfaces */
136 plat_arm_gic_driver_init();
137 plat_arm_gic_init();
138
139 /*
140 * Do initial security configuration to allow DRAM/device access
141 * (if earlier BL has not already done so).
Soby Mathew7b754182016-07-11 14:15:27 +0100142 */
Yatharth Kochar1c16a4c2016-06-30 14:50:58 +0100143#if RESET_TO_SP_MIN
Soby Mathew7b754182016-07-11 14:15:27 +0100144 plat_arm_security_setup();
Yatharth Kochar1c16a4c2016-06-30 14:50:58 +0100145#endif
Soby Mathew7b754182016-07-11 14:15:27 +0100146
147 /* Enable and initialize the System level generic timer */
148 mmio_write_32(ARM_SYS_CNTCTL_BASE + CNTCR_OFF,
149 CNTCR_FCREQ(0) | CNTCR_EN);
150
151 /* Allow access to the System counter timer module */
152 arm_configure_sys_timer();
153
154 /* Initialize power controller before setting up topology */
155 plat_arm_pwrc_setup();
156}
157
158/*******************************************************************************
159 * Perform the very early platform specific architectural setup here. At the
160 * moment this only initializes the MMU
161 ******************************************************************************/
162void sp_min_plat_arch_setup(void)
163{
164
165 arm_setup_page_tables(BL32_BASE,
166 (BL32_END - BL32_BASE),
167 BL_CODE_BASE,
Masahiro Yamada51bef612017-01-18 02:10:08 +0900168 BL_CODE_END,
Soby Mathew7b754182016-07-11 14:15:27 +0100169 BL_RO_DATA_BASE,
Masahiro Yamada51bef612017-01-18 02:10:08 +0900170 BL_RO_DATA_END
Soby Mathew7b754182016-07-11 14:15:27 +0100171#if USE_COHERENT_MEM
Masahiro Yamada0fac5af2016-12-28 16:11:41 +0900172 , BL_COHERENT_RAM_BASE,
173 BL_COHERENT_RAM_END
Soby Mathew7b754182016-07-11 14:15:27 +0100174#endif
175 );
176
177 enable_mmu_secure(0);
178}