Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 1 | /* |
Rakshit Goyal | 731413c | 2024-04-29 11:03:20 +0530 | [diff] [blame] | 2 | * Copyright (c) 2015-2025, Arm Limited and Contributors. All rights reserved. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 3 | * |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 5 | */ |
| 6 | |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 7 | #include <assert.h> |
| 8 | |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 9 | #include <arch.h> |
Rakshit Goyal | 8bd3895 | 2024-09-25 11:49:12 +0530 | [diff] [blame] | 10 | #include <arch_features.h> |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 11 | #include <arch_helpers.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 12 | #include <common/bl_common.h> |
| 13 | #include <common/debug.h> |
| 14 | #include <drivers/console.h> |
Ambroise Vincent | 9660dc1 | 2019-07-12 13:47:03 +0100 | [diff] [blame] | 15 | #include <lib/debugfs.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 16 | #include <lib/extensions/ras.h> |
Harrison Mutai | 91ce7c9 | 2023-12-01 15:50:00 +0000 | [diff] [blame] | 17 | #include <lib/fconf/fconf.h> |
johpow01 | 9d13402 | 2021-06-16 17:57:28 -0500 | [diff] [blame] | 18 | #include <lib/gpt_rme/gpt_rme.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 19 | #include <lib/mmio.h> |
Harrison Mutai | 91ce7c9 | 2023-12-01 15:50:00 +0000 | [diff] [blame] | 20 | #if TRANSFER_LIST |
| 21 | #include <lib/transfer_list.h> |
| 22 | #endif |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 23 | #include <lib/xlat_tables/xlat_tables_compat.h> |
Antonio Nino Diaz | bd7b740 | 2019-01-25 14:30:04 +0000 | [diff] [blame] | 24 | #include <plat/arm/common/plat_arm.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 25 | #include <plat/common/platform.h> |
Antonio Nino Diaz | a320ecd | 2019-01-15 14:19:50 +0000 | [diff] [blame] | 26 | #include <platform_def.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 27 | |
Harrison Mutai | de61e20 | 2024-09-23 11:15:12 +0000 | [diff] [blame] | 28 | struct transfer_list_header *secure_tl; |
| 29 | struct transfer_list_header *ns_tl __unused; |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 30 | |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 31 | /* |
| 32 | * Placeholder variables for copying the arguments that have been passed to |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 33 | * BL31 from BL2. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 34 | */ |
| 35 | static entry_point_info_t bl32_image_ep_info; |
| 36 | static entry_point_info_t bl33_image_ep_info; |
AlexeiFedorov | 46881f7 | 2025-01-24 15:53:50 +0000 | [diff] [blame] | 37 | |
Zelalem Aweke | 96c0bab | 2021-07-11 18:39:39 -0500 | [diff] [blame] | 38 | #if ENABLE_RME |
| 39 | static entry_point_info_t rmm_image_ep_info; |
AlexeiFedorov | 46881f7 | 2025-01-24 15:53:50 +0000 | [diff] [blame] | 40 | #if (RME_GPT_BITLOCK_BLOCK == 0) |
| 41 | #define BITLOCK_BASE UL(0) |
| 42 | #define BITLOCK_SIZE UL(0) |
| 43 | #else |
| 44 | /* |
| 45 | * Number of bitlock_t entries in bitlocks array for PLAT_ARM_PPS |
| 46 | * with RME_GPT_BITLOCK_BLOCK * 512MB per bitlock. |
| 47 | */ |
| 48 | #if (PLAT_ARM_PPS > (RME_GPT_BITLOCK_BLOCK * SZ_512M * UL(8))) |
| 49 | #define BITLOCKS_NUM (PLAT_ARM_PPS) / \ |
| 50 | (RME_GPT_BITLOCK_BLOCK * SZ_512M * UL(8)) |
| 51 | #else |
| 52 | #define BITLOCKS_NUM U(1) |
Zelalem Aweke | 96c0bab | 2021-07-11 18:39:39 -0500 | [diff] [blame] | 53 | #endif |
AlexeiFedorov | 46881f7 | 2025-01-24 15:53:50 +0000 | [diff] [blame] | 54 | /* |
| 55 | * Bitlocks array |
| 56 | */ |
| 57 | static bitlock_t gpt_bitlock[BITLOCKS_NUM]; |
| 58 | #define BITLOCK_BASE (uintptr_t)gpt_bitlock |
| 59 | #define BITLOCK_SIZE sizeof(gpt_bitlock) |
| 60 | #endif /* RME_GPT_BITLOCK_BLOCK */ |
| 61 | #endif /* ENABLE_RME */ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 62 | |
Soby Mathew | 7823d9e | 2018-10-14 08:13:44 +0100 | [diff] [blame] | 63 | #if !RESET_TO_BL31 |
Soby Mathew | af14b46 | 2018-06-01 16:53:38 +0100 | [diff] [blame] | 64 | /* |
Manish V Badarkhe | 1da211a | 2020-05-31 10:17:59 +0100 | [diff] [blame] | 65 | * Check that BL31_BASE is above ARM_FW_CONFIG_LIMIT. The reserved page |
Soby Mathew | af14b46 | 2018-06-01 16:53:38 +0100 | [diff] [blame] | 66 | * is required for SOC_FW_CONFIG/TOS_FW_CONFIG passed from BL2. |
| 67 | */ |
Harrison Mutai | 91ce7c9 | 2023-12-01 15:50:00 +0000 | [diff] [blame] | 68 | #if TRANSFER_LIST |
| 69 | CASSERT(BL31_BASE >= PLAT_ARM_EL3_FW_HANDOFF_LIMIT, assert_bl31_base_overflows); |
| 70 | #else |
Manish V Badarkhe | 1da211a | 2020-05-31 10:17:59 +0100 | [diff] [blame] | 71 | CASSERT(BL31_BASE >= ARM_FW_CONFIG_LIMIT, assert_bl31_base_overflows); |
Harrison Mutai | 91ce7c9 | 2023-12-01 15:50:00 +0000 | [diff] [blame] | 72 | #endif /* TRANSFER_LIST */ |
| 73 | #endif /* RESET_TO_BL31 */ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 74 | |
| 75 | /* Weak definitions may be overridden in specific ARM standard platform */ |
Soby Mathew | 7d5a2e7 | 2018-01-10 15:59:31 +0000 | [diff] [blame] | 76 | #pragma weak bl31_early_platform_setup2 |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 77 | #pragma weak bl31_platform_setup |
| 78 | #pragma weak bl31_plat_arch_setup |
| 79 | #pragma weak bl31_plat_get_next_image_ep_info |
Madhukar Pappireddy | e108df2 | 2023-03-22 15:40:40 -0500 | [diff] [blame] | 80 | #pragma weak bl31_plat_runtime_setup |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 81 | |
Daniel Boulby | b1b058d | 2018-09-18 11:52:49 +0100 | [diff] [blame] | 82 | #define MAP_BL31_TOTAL MAP_REGION_FLAT( \ |
Soby Mathew | 7823d9e | 2018-10-14 08:13:44 +0100 | [diff] [blame] | 83 | BL31_START, \ |
| 84 | BL31_END - BL31_START, \ |
Zelalem Aweke | 65e9263 | 2021-07-12 22:33:55 -0500 | [diff] [blame] | 85 | MT_MEMORY | MT_RW | EL3_PAS) |
Daniel Boulby | b1b058d | 2018-09-18 11:52:49 +0100 | [diff] [blame] | 86 | #if RECLAIM_INIT_CODE |
| 87 | IMPORT_SYM(unsigned long, __INIT_CODE_START__, BL_INIT_CODE_BASE); |
Alexei Fedorov | 2a0c36f | 2020-07-21 17:07:45 +0100 | [diff] [blame] | 88 | IMPORT_SYM(unsigned long, __INIT_CODE_END__, BL_CODE_END_UNALIGNED); |
David Horstmann | 8f15ca3 | 2020-10-14 15:17:49 +0100 | [diff] [blame] | 89 | IMPORT_SYM(unsigned long, __STACKS_END__, BL_STACKS_END_UNALIGNED); |
Alexei Fedorov | 2a0c36f | 2020-07-21 17:07:45 +0100 | [diff] [blame] | 90 | |
| 91 | #define BL_INIT_CODE_END ((BL_CODE_END_UNALIGNED + PAGE_SIZE - 1) & \ |
| 92 | ~(PAGE_SIZE - 1)) |
David Horstmann | 8f15ca3 | 2020-10-14 15:17:49 +0100 | [diff] [blame] | 93 | #define BL_STACKS_END ((BL_STACKS_END_UNALIGNED + PAGE_SIZE - 1) & \ |
| 94 | ~(PAGE_SIZE - 1)) |
Daniel Boulby | b1b058d | 2018-09-18 11:52:49 +0100 | [diff] [blame] | 95 | |
| 96 | #define MAP_BL_INIT_CODE MAP_REGION_FLAT( \ |
| 97 | BL_INIT_CODE_BASE, \ |
| 98 | BL_INIT_CODE_END \ |
| 99 | - BL_INIT_CODE_BASE, \ |
Zelalem Aweke | 65e9263 | 2021-07-12 22:33:55 -0500 | [diff] [blame] | 100 | MT_CODE | EL3_PAS) |
Daniel Boulby | b1b058d | 2018-09-18 11:52:49 +0100 | [diff] [blame] | 101 | #endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 102 | |
Madhukar Pappireddy | d741944 | 2020-01-27 15:38:26 -0600 | [diff] [blame] | 103 | #if SEPARATE_NOBITS_REGION |
| 104 | #define MAP_BL31_NOBITS MAP_REGION_FLAT( \ |
| 105 | BL31_NOBITS_BASE, \ |
| 106 | BL31_NOBITS_LIMIT \ |
| 107 | - BL31_NOBITS_BASE, \ |
Zelalem Aweke | 65e9263 | 2021-07-12 22:33:55 -0500 | [diff] [blame] | 108 | MT_MEMORY | MT_RW | EL3_PAS) |
Madhukar Pappireddy | d741944 | 2020-01-27 15:38:26 -0600 | [diff] [blame] | 109 | |
| 110 | #endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 111 | /******************************************************************************* |
| 112 | * Return a pointer to the 'entry_point_info' structure of the next image for the |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 113 | * security state specified. BL33 corresponds to the non-secure image type |
| 114 | * while BL32 corresponds to the secure image type. A NULL pointer is returned |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 115 | * if the image does not exist. |
| 116 | ******************************************************************************/ |
Sandrine Bailleux | b3b6e22 | 2018-07-11 12:44:22 +0200 | [diff] [blame] | 117 | struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type) |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 118 | { |
| 119 | entry_point_info_t *next_image_info; |
| 120 | |
| 121 | assert(sec_state_is_valid(type)); |
Zelalem Aweke | 96c0bab | 2021-07-11 18:39:39 -0500 | [diff] [blame] | 122 | if (type == NON_SECURE) { |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 123 | #if TRANSFER_LIST && !RESET_TO_BL31 |
| 124 | next_image_info = transfer_list_set_handoff_args( |
| 125 | ns_tl, &bl33_image_ep_info); |
| 126 | #else |
Zelalem Aweke | 96c0bab | 2021-07-11 18:39:39 -0500 | [diff] [blame] | 127 | next_image_info = &bl33_image_ep_info; |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 128 | #endif |
Zelalem Aweke | 96c0bab | 2021-07-11 18:39:39 -0500 | [diff] [blame] | 129 | } |
| 130 | #if ENABLE_RME |
| 131 | else if (type == REALM) { |
| 132 | next_image_info = &rmm_image_ep_info; |
| 133 | } |
| 134 | #endif |
| 135 | else { |
| 136 | next_image_info = &bl32_image_ep_info; |
| 137 | } |
| 138 | |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 139 | /* |
| 140 | * None of the images on the ARM development platforms can have 0x0 |
| 141 | * as the entrypoint |
| 142 | */ |
| 143 | if (next_image_info->pc) |
| 144 | return next_image_info; |
| 145 | else |
| 146 | return NULL; |
| 147 | } |
| 148 | |
| 149 | /******************************************************************************* |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 150 | * Perform any BL31 early platform setup common to ARM standard platforms. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 151 | * Here is an opportunity to copy parameters passed by the calling EL (S-EL1 |
John Tsichritzis | d653d33 | 2018-09-14 10:34:57 +0100 | [diff] [blame] | 152 | * in BL2 & EL3 in BL1) before they are lost (potentially). This needs to be |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 153 | * done before the MMU is initialized so that the memory layout can be used |
| 154 | * while creating page tables. BL2 has flushed this information to memory, so |
| 155 | * we are guaranteed to pick up good data. |
| 156 | ******************************************************************************/ |
Harrison Mutai | 91ce7c9 | 2023-12-01 15:50:00 +0000 | [diff] [blame] | 157 | #if TRANSFER_LIST |
| 158 | void __init arm_bl31_early_platform_setup(u_register_t arg0, u_register_t arg1, |
| 159 | u_register_t arg2, u_register_t arg3) |
| 160 | { |
Harrison Mutai | 403bdbd | 2024-05-02 12:40:20 +0000 | [diff] [blame] | 161 | #if RESET_TO_BL31 |
| 162 | /* Populate entry point information for BL33 */ |
| 163 | SET_PARAM_HEAD(&bl33_image_ep_info, PARAM_EP, VERSION_1, 0); |
| 164 | /* |
| 165 | * Tell BL31 where the non-trusted software image |
| 166 | * is located and the entry state information |
| 167 | */ |
| 168 | bl33_image_ep_info.pc = plat_get_ns_image_entrypoint(); |
| 169 | |
| 170 | bl33_image_ep_info.spsr = arm_get_spsr_for_bl33_entry(); |
| 171 | SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE); |
| 172 | |
Harrison Mutai | 36d971a | 2024-08-28 13:27:19 +0000 | [diff] [blame] | 173 | bl33_image_ep_info.args.arg0 = PLAT_ARM_TRANSFER_LIST_DTB_OFFSET; |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 174 | bl33_image_ep_info.args.arg1 = |
| 175 | TRANSFER_LIST_HANDOFF_X1_VALUE(REGISTER_CONVENTION_VERSION); |
Harrison Mutai | 403bdbd | 2024-05-02 12:40:20 +0000 | [diff] [blame] | 176 | bl33_image_ep_info.args.arg3 = FW_NS_HANDOFF_BASE; |
| 177 | #else |
Harrison Mutai | 91ce7c9 | 2023-12-01 15:50:00 +0000 | [diff] [blame] | 178 | struct transfer_list_entry *te = NULL; |
| 179 | struct entry_point_info *ep; |
| 180 | |
| 181 | secure_tl = (struct transfer_list_header *)arg3; |
| 182 | |
| 183 | /* |
| 184 | * Populate the global entry point structures used to execute subsequent |
| 185 | * images. |
| 186 | */ |
| 187 | while ((te = transfer_list_next(secure_tl, te)) != NULL) { |
| 188 | ep = transfer_list_entry_data(te); |
| 189 | |
| 190 | if (te->tag_id == TL_TAG_EXEC_EP_INFO64) { |
| 191 | switch (GET_SECURITY_STATE(ep->h.attr)) { |
| 192 | case NON_SECURE: |
| 193 | bl33_image_ep_info = *ep; |
| 194 | break; |
| 195 | #if ENABLE_RME |
| 196 | case REALM: |
| 197 | rmm_image_ep_info = *ep; |
| 198 | break; |
| 199 | #endif |
| 200 | case SECURE: |
| 201 | bl32_image_ep_info = *ep; |
| 202 | break; |
| 203 | default: |
| 204 | ERROR("Unrecognized Image Security State %lu\n", |
| 205 | GET_SECURITY_STATE(ep->h.attr)); |
| 206 | panic(); |
| 207 | } |
| 208 | } |
| 209 | } |
Harrison Mutai | 403bdbd | 2024-05-02 12:40:20 +0000 | [diff] [blame] | 210 | #endif /* RESET_TO_BL31 */ |
Harrison Mutai | 91ce7c9 | 2023-12-01 15:50:00 +0000 | [diff] [blame] | 211 | } |
| 212 | #else |
Daniel Boulby | f45a4bb | 2018-09-18 13:26:03 +0100 | [diff] [blame] | 213 | void __init arm_bl31_early_platform_setup(void *from_bl2, uintptr_t soc_fw_config, |
Soby Mathew | 7d5a2e7 | 2018-01-10 15:59:31 +0000 | [diff] [blame] | 214 | uintptr_t hw_config, void *plat_params_from_bl2) |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 215 | { |
| 216 | /* Initialize the console to provide early debug support */ |
Antonio Nino Diaz | 23ede6a | 2018-06-19 09:29:36 +0100 | [diff] [blame] | 217 | arm_console_boot_init(); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 218 | |
| 219 | #if RESET_TO_BL31 |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 220 | /* There are no parameters from BL2 if BL31 is a reset vector */ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 221 | assert(from_bl2 == NULL); |
| 222 | assert(plat_params_from_bl2 == NULL); |
| 223 | |
Antonio Nino Diaz | d9166ac | 2018-05-11 11:15:10 +0100 | [diff] [blame] | 224 | # ifdef BL32_BASE |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 225 | /* Populate entry point information for BL32 */ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 226 | SET_PARAM_HEAD(&bl32_image_ep_info, |
| 227 | PARAM_EP, |
| 228 | VERSION_1, |
| 229 | 0); |
| 230 | SET_SECURITY_STATE(bl32_image_ep_info.h.attr, SECURE); |
| 231 | bl32_image_ep_info.pc = BL32_BASE; |
| 232 | bl32_image_ep_info.spsr = arm_get_spsr_for_bl32_entry(); |
Manish Pandey | 18a0c3e | 2020-07-16 00:38:59 +0100 | [diff] [blame] | 233 | |
| 234 | #if defined(SPD_spmd) |
Rakshit Goyal | 731413c | 2024-04-29 11:03:20 +0530 | [diff] [blame] | 235 | bl32_image_ep_info.args.arg0 = ARM_SPMC_MANIFEST_BASE; |
Manish Pandey | 18a0c3e | 2020-07-16 00:38:59 +0100 | [diff] [blame] | 236 | #endif |
| 237 | |
Antonio Nino Diaz | d9166ac | 2018-05-11 11:15:10 +0100 | [diff] [blame] | 238 | # endif /* BL32_BASE */ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 239 | |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 240 | /* Populate entry point information for BL33 */ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 241 | SET_PARAM_HEAD(&bl33_image_ep_info, |
| 242 | PARAM_EP, |
| 243 | VERSION_1, |
| 244 | 0); |
| 245 | /* |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 246 | * Tell BL31 where the non-trusted software image |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 247 | * is located and the entry state information |
| 248 | */ |
| 249 | bl33_image_ep_info.pc = plat_get_ns_image_entrypoint(); |
Soby Mathew | 4876ae3 | 2016-05-09 17:20:10 +0100 | [diff] [blame] | 250 | |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 251 | bl33_image_ep_info.spsr = arm_get_spsr_for_bl33_entry(); |
| 252 | SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE); |
| 253 | |
Javier Almansa Sobrino | 7176a77 | 2021-11-24 18:37:37 +0000 | [diff] [blame] | 254 | #if ENABLE_RME |
| 255 | /* |
| 256 | * Populate entry point information for RMM. |
| 257 | * Only PC needs to be set as other fields are determined by RMMD. |
| 258 | */ |
| 259 | rmm_image_ep_info.pc = RMM_BASE; |
| 260 | #endif /* ENABLE_RME */ |
| 261 | |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 262 | #else /* RESET_TO_BL31 */ |
| 263 | |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 264 | /* |
| 265 | * In debug builds, we pass a special value in 'plat_params_from_bl2' |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 266 | * to verify platform parameters from BL2 to BL31. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 267 | * In release builds, it's not used. |
| 268 | */ |
| 269 | assert(((unsigned long long)plat_params_from_bl2) == |
| 270 | ARM_BL31_PLAT_PARAM_VAL); |
| 271 | |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 272 | /* |
| 273 | * Check params passed from BL2 should not be NULL, |
| 274 | */ |
| 275 | bl_params_t *params_from_bl2 = (bl_params_t *)from_bl2; |
| 276 | assert(params_from_bl2 != NULL); |
| 277 | assert(params_from_bl2->h.type == PARAM_BL_PARAMS); |
| 278 | assert(params_from_bl2->h.version >= VERSION_2); |
| 279 | |
| 280 | bl_params_node_t *bl_params = params_from_bl2->head; |
| 281 | |
| 282 | /* |
Zelalem Aweke | 96c0bab | 2021-07-11 18:39:39 -0500 | [diff] [blame] | 283 | * Copy BL33, BL32 and RMM (if present), entry point information. |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 284 | * They are stored in Secure RAM, in BL2's address space. |
| 285 | */ |
Antonio Nino Diaz | e0b757d | 2018-08-24 16:30:29 +0100 | [diff] [blame] | 286 | while (bl_params != NULL) { |
Zelalem Aweke | 96c0bab | 2021-07-11 18:39:39 -0500 | [diff] [blame] | 287 | if (bl_params->image_id == BL32_IMAGE_ID) { |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 288 | bl32_image_ep_info = *bl_params->ep_info; |
Manish V Badarkhe | d9f45e8 | 2023-11-08 09:30:18 +0000 | [diff] [blame] | 289 | #if SPMC_AT_EL3 |
Nishant Sharma | 5389d97 | 2023-10-13 11:22:08 +0100 | [diff] [blame] | 290 | /* |
| 291 | * Populate the BL32 image base, size and max limit in |
| 292 | * the entry point information, since there is no |
| 293 | * platform function to retrieve them in generic |
| 294 | * code. We choose arg2, arg3 and arg4 since the generic |
| 295 | * code uses arg1 for stashing the SP manifest size. The |
| 296 | * SPMC setup uses these arguments to update SP manifest |
| 297 | * with actual SP's base address and it size. |
| 298 | */ |
| 299 | bl32_image_ep_info.args.arg2 = |
| 300 | bl_params->image_info->image_base; |
| 301 | bl32_image_ep_info.args.arg3 = |
| 302 | bl_params->image_info->image_size; |
| 303 | bl32_image_ep_info.args.arg4 = |
| 304 | bl_params->image_info->image_base + |
| 305 | bl_params->image_info->image_max_size; |
| 306 | #endif |
Zelalem Aweke | 96c0bab | 2021-07-11 18:39:39 -0500 | [diff] [blame] | 307 | } |
| 308 | #if ENABLE_RME |
| 309 | else if (bl_params->image_id == RMM_IMAGE_ID) { |
| 310 | rmm_image_ep_info = *bl_params->ep_info; |
| 311 | } |
| 312 | #endif |
| 313 | else if (bl_params->image_id == BL33_IMAGE_ID) { |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 314 | bl33_image_ep_info = *bl_params->ep_info; |
Zelalem Aweke | 96c0bab | 2021-07-11 18:39:39 -0500 | [diff] [blame] | 315 | } |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 316 | |
| 317 | bl_params = bl_params->next_params_info; |
| 318 | } |
| 319 | |
Antonio Nino Diaz | e0b757d | 2018-08-24 16:30:29 +0100 | [diff] [blame] | 320 | if (bl33_image_ep_info.pc == 0U) |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 321 | panic(); |
Zelalem Aweke | 96c0bab | 2021-07-11 18:39:39 -0500 | [diff] [blame] | 322 | #if ENABLE_RME |
| 323 | if (rmm_image_ep_info.pc == 0U) |
| 324 | panic(); |
| 325 | #endif |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 326 | #endif /* RESET_TO_BL31 */ |
Andre Przywara | 0f58c8a | 2021-02-08 17:40:17 +0000 | [diff] [blame] | 327 | |
| 328 | # if ARM_LINUX_KERNEL_AS_BL33 |
| 329 | /* |
| 330 | * According to the file ``Documentation/arm64/booting.txt`` of the |
| 331 | * Linux kernel tree, Linux expects the physical address of the device |
| 332 | * tree blob (DTB) in x0, while x1-x3 are reserved for future use and |
| 333 | * must be 0. |
Olivier Deprez | 735ac78 | 2021-10-20 15:17:07 +0200 | [diff] [blame] | 334 | * Repurpose the option to load Hafnium hypervisor in the normal world. |
| 335 | * It expects its manifest address in x0. This is essentially the linux |
| 336 | * dts (passed to the primary VM) by adding 'hypervisor' and chosen |
| 337 | * nodes specifying the Hypervisor configuration. |
Andre Przywara | 0f58c8a | 2021-02-08 17:40:17 +0000 | [diff] [blame] | 338 | */ |
Zelalem Aweke | 1e8e3fd | 2021-07-26 21:39:05 -0500 | [diff] [blame] | 339 | #if RESET_TO_BL31 |
Andre Przywara | 0f58c8a | 2021-02-08 17:40:17 +0000 | [diff] [blame] | 340 | bl33_image_ep_info.args.arg0 = (u_register_t)ARM_PRELOADED_DTB_BASE; |
Zelalem Aweke | 1e8e3fd | 2021-07-26 21:39:05 -0500 | [diff] [blame] | 341 | #else |
| 342 | bl33_image_ep_info.args.arg0 = (u_register_t)hw_config; |
| 343 | #endif |
Andre Przywara | 0f58c8a | 2021-02-08 17:40:17 +0000 | [diff] [blame] | 344 | bl33_image_ep_info.args.arg1 = 0U; |
| 345 | bl33_image_ep_info.args.arg2 = 0U; |
| 346 | bl33_image_ep_info.args.arg3 = 0U; |
| 347 | # endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 348 | } |
Harrison Mutai | 91ce7c9 | 2023-12-01 15:50:00 +0000 | [diff] [blame] | 349 | #endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 350 | |
Soby Mathew | 7d5a2e7 | 2018-01-10 15:59:31 +0000 | [diff] [blame] | 351 | void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, |
| 352 | u_register_t arg2, u_register_t arg3) |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 353 | { |
Harrison Mutai | 91ce7c9 | 2023-12-01 15:50:00 +0000 | [diff] [blame] | 354 | #if TRANSFER_LIST |
| 355 | arm_bl31_early_platform_setup(arg0, arg1, arg2, arg3); |
| 356 | #else |
Soby Mathew | 7d5a2e7 | 2018-01-10 15:59:31 +0000 | [diff] [blame] | 357 | arm_bl31_early_platform_setup((void *)arg0, arg1, arg2, (void *)arg3); |
Harrison Mutai | 91ce7c9 | 2023-12-01 15:50:00 +0000 | [diff] [blame] | 358 | #endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 359 | |
| 360 | /* |
Vikram Kanigiri | fbb1301 | 2016-02-15 11:54:14 +0000 | [diff] [blame] | 361 | * Initialize Interconnect for this cluster during cold boot. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 362 | * No need for locks as no other CPU is active. |
| 363 | */ |
Vikram Kanigiri | fbb1301 | 2016-02-15 11:54:14 +0000 | [diff] [blame] | 364 | plat_arm_interconnect_init(); |
Sandrine Bailleux | da797f6 | 2015-05-14 14:13:05 +0100 | [diff] [blame] | 365 | |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 366 | /* |
Vikram Kanigiri | fbb1301 | 2016-02-15 11:54:14 +0000 | [diff] [blame] | 367 | * Enable Interconnect coherency for the primary CPU's cluster. |
Sandrine Bailleux | da797f6 | 2015-05-14 14:13:05 +0100 | [diff] [blame] | 368 | * Earlier bootloader stages might already do this (e.g. Trusted |
| 369 | * Firmware's BL1 does it) but we can't assume so. There is no harm in |
| 370 | * executing this code twice anyway. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 371 | * Platform specific PSCI code will enable coherency for other |
| 372 | * clusters. |
| 373 | */ |
Vikram Kanigiri | fbb1301 | 2016-02-15 11:54:14 +0000 | [diff] [blame] | 374 | plat_arm_interconnect_enter_coherency(); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 375 | } |
| 376 | |
| 377 | /******************************************************************************* |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 378 | * Perform any BL31 platform setup common to ARM standard platforms |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 379 | ******************************************************************************/ |
| 380 | void arm_bl31_platform_setup(void) |
| 381 | { |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 382 | struct transfer_list_entry *te __unused; |
| 383 | |
| 384 | #if TRANSFER_LIST && !RESET_TO_BL31 |
Harrison Mutai | cf6ee0f | 2024-12-23 16:18:58 +0000 | [diff] [blame^] | 385 | ns_tl = transfer_list_init((void *)FW_NS_HANDOFF_BASE, |
| 386 | PLAT_ARM_FW_HANDOFF_SIZE); |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 387 | if (ns_tl == NULL) { |
Harrison Mutai | de61e20 | 2024-09-23 11:15:12 +0000 | [diff] [blame] | 388 | ERROR("Non-secure transfer list initialisation failed!\n"); |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 389 | panic(); |
| 390 | } |
Harrison Mutai | de61e20 | 2024-09-23 11:15:12 +0000 | [diff] [blame] | 391 | /* BL31 may modify the HW_CONFIG so defer copying it until later. */ |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 392 | te = transfer_list_find(secure_tl, TL_TAG_FDT); |
| 393 | assert(te != NULL); |
| 394 | |
Harrison Mutai | d4b887f | 2024-10-07 12:58:54 +0000 | [diff] [blame] | 395 | /* |
| 396 | * A pre-existing assumption is that FCONF is unsupported w/ RESET_TO_BL2 and |
| 397 | * RESET_TO_BL31. In the case of RESET_TO_BL31 this makes sense because there |
| 398 | * isn't a prior stage to load the device tree, but the reasoning for RESET_TO_BL2 is |
| 399 | * less clear. For the moment hardware properties that would normally be |
| 400 | * derived from the DT are statically defined. |
| 401 | */ |
| 402 | #if !RESET_TO_BL2 |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 403 | fconf_populate("HW_CONFIG", (uintptr_t)transfer_list_entry_data(te)); |
Harrison Mutai | d4b887f | 2024-10-07 12:58:54 +0000 | [diff] [blame] | 404 | #endif |
| 405 | |
| 406 | te = transfer_list_add(ns_tl, TL_TAG_FDT, te->data_size, |
| 407 | transfer_list_entry_data(te)); |
| 408 | assert(te != NULL); |
Harrison Mutai | d1a0f85 | 2024-11-11 13:41:05 +0000 | [diff] [blame] | 409 | #endif /* TRANSFER_LIST && !RESET_TO_BL31 */ |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 410 | |
Achin Gupta | 1fa7eb6 | 2015-11-03 14:18:34 +0000 | [diff] [blame] | 411 | /* Initialize the GIC driver, cpu and distributor interfaces */ |
| 412 | plat_arm_gic_driver_init(); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 413 | plat_arm_gic_init(); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 414 | |
| 415 | #if RESET_TO_BL31 |
| 416 | /* |
| 417 | * Do initial security configuration to allow DRAM/device access |
| 418 | * (if earlier BL has not already done so). |
| 419 | */ |
| 420 | plat_arm_security_setup(); |
| 421 | |
Roberto Vargas | 550eb08 | 2018-01-05 16:00:05 +0000 | [diff] [blame] | 422 | #if defined(PLAT_ARM_MEM_PROT_ADDR) |
| 423 | arm_nor_psci_do_dyn_mem_protect(); |
| 424 | #endif /* PLAT_ARM_MEM_PROT_ADDR */ |
| 425 | |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 426 | #endif /* RESET_TO_BL31 */ |
| 427 | |
| 428 | /* Enable and initialize the System level generic timer */ |
| 429 | mmio_write_32(ARM_SYS_CNTCTL_BASE + CNTCR_OFF, |
Antonio Nino Diaz | e0b757d | 2018-08-24 16:30:29 +0100 | [diff] [blame] | 430 | CNTCR_FCREQ(0U) | CNTCR_EN); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 431 | |
| 432 | /* Allow access to the System counter timer module */ |
Soby Mathew | 61e8d0b | 2015-10-12 17:32:29 +0100 | [diff] [blame] | 433 | arm_configure_sys_timer(); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 434 | |
| 435 | /* Initialize power controller before setting up topology */ |
| 436 | plat_arm_pwrc_setup(); |
Jeenu Viswambharan | a5b5b8d | 2018-02-06 12:21:39 +0000 | [diff] [blame] | 437 | |
Manish Pandey | f90a73c | 2023-10-10 15:42:19 +0100 | [diff] [blame] | 438 | #if ENABLE_FEAT_RAS && FFH_SUPPORT |
Jeenu Viswambharan | a5b5b8d | 2018-02-06 12:21:39 +0000 | [diff] [blame] | 439 | ras_init(); |
| 440 | #endif |
Ambroise Vincent | 9660dc1 | 2019-07-12 13:47:03 +0100 | [diff] [blame] | 441 | |
| 442 | #if USE_DEBUGFS |
| 443 | debugfs_init(); |
| 444 | #endif /* USE_DEBUGFS */ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 445 | } |
| 446 | |
Soby Mathew | 2fd66be | 2015-12-09 11:38:43 +0000 | [diff] [blame] | 447 | /******************************************************************************* |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 448 | * Perform any BL31 platform runtime setup prior to BL31 exit common to ARM |
Soby Mathew | 2fd66be | 2015-12-09 11:38:43 +0000 | [diff] [blame] | 449 | * standard platforms |
| 450 | ******************************************************************************/ |
| 451 | void arm_bl31_plat_runtime_setup(void) |
| 452 | { |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 453 | struct transfer_list_entry *te __unused; |
Soby Mathew | 2fd66be | 2015-12-09 11:38:43 +0000 | [diff] [blame] | 454 | /* Initialize the runtime console */ |
Antonio Nino Diaz | 23ede6a | 2018-06-19 09:29:36 +0100 | [diff] [blame] | 455 | arm_console_runtime_init(); |
Petre-Ionut Tudor | e5a6fef | 2019-11-07 15:18:03 +0000 | [diff] [blame] | 456 | |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 457 | #if TRANSFER_LIST && !RESET_TO_BL31 |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 458 | /* |
| 459 | * We assume BL31 has added all TE's required by BL33 at this stage, ensure |
| 460 | * that data is visible to all observers by performing a flush operation, so |
| 461 | * they can access the updated data even if caching is not enabled. |
| 462 | */ |
| 463 | flush_dcache_range((uintptr_t)ns_tl, ns_tl->size); |
Harrison Mutai | d1a0f85 | 2024-11-11 13:41:05 +0000 | [diff] [blame] | 464 | #endif /* TRANSFER_LIST && !RESET_TO_BL31 */ |
Harrison Mutai | 32a5dbc | 2024-07-12 14:23:02 +0000 | [diff] [blame] | 465 | |
Daniel Boulby | b1b058d | 2018-09-18 11:52:49 +0100 | [diff] [blame] | 466 | #if RECLAIM_INIT_CODE |
| 467 | arm_free_init_memory(); |
| 468 | #endif |
Petre-Ionut Tudor | e5a6fef | 2019-11-07 15:18:03 +0000 | [diff] [blame] | 469 | |
| 470 | #if PLAT_RO_XLAT_TABLES |
| 471 | arm_xlat_make_tables_readonly(); |
| 472 | #endif |
Soby Mathew | 2fd66be | 2015-12-09 11:38:43 +0000 | [diff] [blame] | 473 | } |
| 474 | |
Daniel Boulby | b1b058d | 2018-09-18 11:52:49 +0100 | [diff] [blame] | 475 | #if RECLAIM_INIT_CODE |
| 476 | /* |
David Horstmann | 8f15ca3 | 2020-10-14 15:17:49 +0100 | [diff] [blame] | 477 | * Make memory for image boot time code RW to reclaim it as stack for the |
| 478 | * secondary cores, or RO where it cannot be reclaimed: |
| 479 | * |
| 480 | * |-------- INIT SECTION --------| |
| 481 | * ----------------------------------------- |
| 482 | * | CORE 0 | CORE 1 | CORE 2 | EXTRA | |
| 483 | * | STACK | STACK | STACK | SPACE | |
| 484 | * ----------------------------------------- |
| 485 | * <-------------------> <------> |
| 486 | * MAKE RW AND XN MAKE |
| 487 | * FOR STACKS RO AND XN |
Daniel Boulby | b1b058d | 2018-09-18 11:52:49 +0100 | [diff] [blame] | 488 | */ |
| 489 | void arm_free_init_memory(void) |
| 490 | { |
David Horstmann | 8f15ca3 | 2020-10-14 15:17:49 +0100 | [diff] [blame] | 491 | int ret = 0; |
| 492 | |
| 493 | if (BL_STACKS_END < BL_INIT_CODE_END) { |
| 494 | /* Reclaim some of the init section as stack if possible. */ |
| 495 | if (BL_INIT_CODE_BASE < BL_STACKS_END) { |
| 496 | ret |= xlat_change_mem_attributes(BL_INIT_CODE_BASE, |
| 497 | BL_STACKS_END - BL_INIT_CODE_BASE, |
| 498 | MT_RW_DATA); |
| 499 | } |
| 500 | /* Make the rest of the init section read-only. */ |
| 501 | ret |= xlat_change_mem_attributes(BL_STACKS_END, |
| 502 | BL_INIT_CODE_END - BL_STACKS_END, |
| 503 | MT_RO_DATA); |
| 504 | } else { |
| 505 | /* The stacks cover the init section, so reclaim it all. */ |
| 506 | ret |= xlat_change_mem_attributes(BL_INIT_CODE_BASE, |
Daniel Boulby | b1b058d | 2018-09-18 11:52:49 +0100 | [diff] [blame] | 507 | BL_INIT_CODE_END - BL_INIT_CODE_BASE, |
| 508 | MT_RW_DATA); |
David Horstmann | 8f15ca3 | 2020-10-14 15:17:49 +0100 | [diff] [blame] | 509 | } |
Daniel Boulby | b1b058d | 2018-09-18 11:52:49 +0100 | [diff] [blame] | 510 | |
| 511 | if (ret != 0) { |
| 512 | ERROR("Could not reclaim initialization code"); |
| 513 | panic(); |
| 514 | } |
| 515 | } |
| 516 | #endif |
| 517 | |
Daniel Boulby | f45a4bb | 2018-09-18 13:26:03 +0100 | [diff] [blame] | 518 | void __init bl31_platform_setup(void) |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 519 | { |
| 520 | arm_bl31_platform_setup(); |
| 521 | } |
| 522 | |
Soby Mathew | 2fd66be | 2015-12-09 11:38:43 +0000 | [diff] [blame] | 523 | void bl31_plat_runtime_setup(void) |
| 524 | { |
| 525 | arm_bl31_plat_runtime_setup(); |
| 526 | } |
| 527 | |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 528 | /******************************************************************************* |
Sandrine Bailleux | 4a1267a | 2016-05-18 16:11:47 +0100 | [diff] [blame] | 529 | * Perform the very early platform specific architectural setup shared between |
| 530 | * ARM standard platforms. This only does basic initialization. Later |
| 531 | * architectural setup (bl31_arch_setup()) does not do anything platform |
| 532 | * specific. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 533 | ******************************************************************************/ |
Daniel Boulby | f45a4bb | 2018-09-18 13:26:03 +0100 | [diff] [blame] | 534 | void __init arm_bl31_plat_arch_setup(void) |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 535 | { |
Daniel Boulby | 45a2c9e | 2018-07-06 16:54:44 +0100 | [diff] [blame] | 536 | const mmap_region_t bl_regions[] = { |
| 537 | MAP_BL31_TOTAL, |
Zelalem Aweke | c43c563 | 2021-07-12 23:41:05 -0500 | [diff] [blame] | 538 | #if ENABLE_RME |
| 539 | ARM_MAP_L0_GPT_REGION, |
| 540 | #endif |
Daniel Boulby | b1b058d | 2018-09-18 11:52:49 +0100 | [diff] [blame] | 541 | #if RECLAIM_INIT_CODE |
| 542 | MAP_BL_INIT_CODE, |
| 543 | #endif |
Madhukar Pappireddy | d741944 | 2020-01-27 15:38:26 -0600 | [diff] [blame] | 544 | #if SEPARATE_NOBITS_REGION |
| 545 | MAP_BL31_NOBITS, |
| 546 | #endif |
Daniel Boulby | 4e97abd | 2018-07-16 14:09:15 +0100 | [diff] [blame] | 547 | ARM_MAP_BL_RO, |
Roberto Vargas | e3adc37 | 2018-05-23 09:27:06 +0100 | [diff] [blame] | 548 | #if USE_ROMLIB |
| 549 | ARM_MAP_ROMLIB_CODE, |
| 550 | ARM_MAP_ROMLIB_DATA, |
| 551 | #endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 552 | #if USE_COHERENT_MEM |
Daniel Boulby | 45a2c9e | 2018-07-06 16:54:44 +0100 | [diff] [blame] | 553 | ARM_MAP_BL_COHERENT_RAM, |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 554 | #endif |
Daniel Boulby | 45a2c9e | 2018-07-06 16:54:44 +0100 | [diff] [blame] | 555 | {0} |
| 556 | }; |
| 557 | |
Roberto Vargas | 344ff02 | 2018-10-19 16:44:18 +0100 | [diff] [blame] | 558 | setup_page_tables(bl_regions, plat_arm_get_mmap()); |
Daniel Boulby | 45a2c9e | 2018-07-06 16:54:44 +0100 | [diff] [blame] | 559 | |
Sandrine Bailleux | 4a1267a | 2016-05-18 16:11:47 +0100 | [diff] [blame] | 560 | enable_mmu_el3(0); |
Roberto Vargas | e3adc37 | 2018-05-23 09:27:06 +0100 | [diff] [blame] | 561 | |
johpow01 | 9d13402 | 2021-06-16 17:57:28 -0500 | [diff] [blame] | 562 | #if ENABLE_RME |
Rakshit Goyal | 8bd3895 | 2024-09-25 11:49:12 +0530 | [diff] [blame] | 563 | #if RESET_TO_BL31 |
| 564 | /* initialize GPT only when RME is enabled. */ |
| 565 | assert(is_feat_rme_present()); |
| 566 | |
| 567 | /* Initialise and enable granule protection after MMU. */ |
| 568 | arm_gpt_setup(); |
| 569 | #endif /* RESET_TO_BL31 */ |
johpow01 | 9d13402 | 2021-06-16 17:57:28 -0500 | [diff] [blame] | 570 | /* |
| 571 | * Initialise Granule Protection library and enable GPC for the primary |
| 572 | * processor. The tables have already been initialized by a previous BL |
| 573 | * stage, so there is no need to provide any PAS here. This function |
| 574 | * sets up pointers to those tables. |
| 575 | */ |
AlexeiFedorov | 46881f7 | 2025-01-24 15:53:50 +0000 | [diff] [blame] | 576 | if (gpt_runtime_init(BITLOCK_BASE, BITLOCK_SIZE) < 0) { |
johpow01 | 9d13402 | 2021-06-16 17:57:28 -0500 | [diff] [blame] | 577 | ERROR("gpt_runtime_init() failed!\n"); |
| 578 | panic(); |
| 579 | } |
| 580 | #endif /* ENABLE_RME */ |
| 581 | |
Roberto Vargas | e3adc37 | 2018-05-23 09:27:06 +0100 | [diff] [blame] | 582 | arm_setup_romlib(); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 583 | } |
| 584 | |
Daniel Boulby | f45a4bb | 2018-09-18 13:26:03 +0100 | [diff] [blame] | 585 | void __init bl31_plat_arch_setup(void) |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 586 | { |
| 587 | arm_bl31_plat_arch_setup(); |
| 588 | } |