blob: 9a7153b77429463739f1a4ed047b3c5d0013db21 [file] [log] [blame]
Sheetal Tigadoli13680c92019-12-13 10:39:06 +05301/*
2 * Copyright (c) 2019-2020, ARM Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <assert.h>
8#include <string.h>
9
10#include <arch_helpers.h>
11#include <common/bl_common.h>
12#include <common/debug.h>
13#include <common/desc_image_load.h>
14#include <drivers/arm/sp804_delay_timer.h>
15#include <lib/mmio.h>
16
17#include <bcm_console.h>
18#include <platform_def.h>
19#include <plat/brcm/common/plat_brcm.h>
20
21/* Data structure which holds the extents of the trusted SRAM for BL2 */
22static meminfo_t bl2_tzram_layout __aligned(CACHE_WRITEBACK_GRANULE);
23
24/* Weak definitions may be overridden in specific BRCM platform */
25#pragma weak plat_bcm_bl2_platform_setup
26#pragma weak plat_bcm_bl2_plat_arch_setup
27#pragma weak plat_bcm_security_setup
28#pragma weak plat_bcm_bl2_plat_handle_scp_bl2
29#pragma weak plat_bcm_bl2_early_platform_setup
30
31void plat_bcm_bl2_early_platform_setup(void)
32{
33}
34
35void plat_bcm_bl2_platform_setup(void)
36{
37}
38
39void plat_bcm_bl2_plat_arch_setup(void)
40{
41}
42
43void plat_bcm_security_setup(void)
44{
45}
46
47void bcm_bl2_early_platform_setup(uintptr_t tb_fw_config,
48 meminfo_t *mem_layout)
49{
50 /* Initialize the console to provide early debug support */
51 bcm_console_boot_init();
52
53 /* Setup the BL2 memory layout */
54 bl2_tzram_layout = *mem_layout;
55
56 /* Initialise the IO layer and register platform IO devices */
57 plat_brcm_io_setup();
58
59 /* Log HW reset event */
60 INFO("RESET: 0x%x\n",
61 mmio_read_32(CRMU_RESET_EVENT_LOG));
62}
63
64void bl2_early_platform_setup2(u_register_t arg0, u_register_t arg1,
65 u_register_t arg2, u_register_t arg3)
66{
67 /* SoC specific setup */
68 plat_bcm_bl2_early_platform_setup();
69
70 /* Initialize delay timer driver using SP804 dual timer 0 */
71 sp804_timer_init(SP804_TIMER0_BASE,
72 SP804_TIMER0_CLKMULT, SP804_TIMER0_CLKDIV);
73
74 /* BRCM platforms generic setup */
75 bcm_bl2_early_platform_setup((uintptr_t)arg0, (meminfo_t *)arg1);
76}
77
78/*
79 * Perform Broadcom platform setup.
80 */
81void bcm_bl2_platform_setup(void)
82{
83 /* Initialize the secure environment */
84 plat_bcm_security_setup();
85}
86
87void bl2_platform_setup(void)
88{
89 bcm_bl2_platform_setup();
90 plat_bcm_bl2_platform_setup();
91}
92
93/*******************************************************************************
94 * Perform the very early platform specific architectural setup here. At the
95 * moment this is only initializes the mmu in a quick and dirty way.
96 ******************************************************************************/
97void bcm_bl2_plat_arch_setup(void)
98{
99#ifndef MMU_DISABLED
100 if (!(read_sctlr_el1() & SCTLR_M_BIT)) {
101 const mmap_region_t bl_regions[] = {
102 MAP_REGION_FLAT(bl2_tzram_layout.total_base,
103 bl2_tzram_layout.total_size,
104 MT_MEMORY | MT_RW | MT_SECURE),
105 MAP_REGION_FLAT(BL_CODE_BASE,
106 BL_CODE_END - BL_CODE_BASE,
107 MT_CODE | MT_SECURE),
108 MAP_REGION_FLAT(BL_RO_DATA_BASE,
109 BL_RO_DATA_END - BL_RO_DATA_BASE,
110 MT_RO_DATA | MT_SECURE),
111#if USE_COHERENT_MEM
112 MAP_REGION_FLAT(BL_COHERENT_RAM_BASE,
113 BL_COHERENT_RAM_END -
114 BL_COHERENT_RAM_BASE,
115 MT_DEVICE | MT_RW | MT_SECURE),
116#endif
117 {0}
118 };
119
120 setup_page_tables(bl_regions, plat_brcm_get_mmap());
121 enable_mmu_el1(0);
122 }
123#endif
124}
125
126void bl2_plat_arch_setup(void)
127{
128#ifdef ENA_MMU_BEFORE_DDR_INIT
129 /*
130 * Once MMU is enabled before DDR, MEMORY TESTS
131 * get affected as read/write transaction might occures from
132 * caches. So For running memory test, one should not set this
133 * flag.
134 */
135 bcm_bl2_plat_arch_setup();
136 plat_bcm_bl2_plat_arch_setup();
137#else
138 plat_bcm_bl2_plat_arch_setup();
139 bcm_bl2_plat_arch_setup();
140#endif
141}
142
143int bcm_bl2_handle_post_image_load(unsigned int image_id)
144{
145 int err = 0;
146
147 bl_mem_params_node_t *bl_mem_params = get_bl_mem_params_node(image_id);
148
149 assert(bl_mem_params);
150
151 switch (image_id) {
152 case BL32_IMAGE_ID:
153 bl_mem_params->ep_info.spsr = brcm_get_spsr_for_bl32_entry();
154 break;
155
156 case BL33_IMAGE_ID:
157 /* BL33 expects to receive the primary CPU MPID (through r0) */
158 bl_mem_params->ep_info.args.arg0 = 0xffff & read_mpidr();
159 bl_mem_params->ep_info.spsr = brcm_get_spsr_for_bl33_entry();
160 break;
161
162#ifdef SCP_BL2_BASE
163 case SCP_BL2_IMAGE_ID:
164 /* The subsequent handling of SCP_BL2 is platform specific */
165 err = bcm_bl2_handle_scp_bl2(&bl_mem_params->image_info);
166 if (err)
167 WARN("Failure in platform-specific handling of SCP_BL2 image.\n");
168 break;
169#endif
170 default:
171 /* Do nothing in default case */
172 break;
173 }
174
175 return err;
176}
177
178/*******************************************************************************
179 * This function can be used by the platforms to update/use image
180 * information for given `image_id`.
181 ******************************************************************************/
182int bcm_bl2_plat_handle_post_image_load(unsigned int image_id)
183{
184 return bcm_bl2_handle_post_image_load(image_id);
185}
186
187int bl2_plat_handle_post_image_load(unsigned int image_id)
188{
189 return bcm_bl2_plat_handle_post_image_load(image_id);
190}
191
192#ifdef SCP_BL2_BASE
193int plat_bcm_bl2_plat_handle_scp_bl2(image_info_t *scp_bl2_image_info)
194{
195 return 0;
196}
197
198int bcm_bl2_handle_scp_bl2(image_info_t *scp_bl2_image_info)
199{
200 return plat_bcm_bl2_plat_handle_scp_bl2(scp_bl2_image_info);
201}
202#endif