1afd241e7SCarlo Caione /* 2afd241e7SCarlo Caione * Copyright (c) 2020, ARM Limited and Contributors. All rights reserved. 3afd241e7SCarlo Caione * 4afd241e7SCarlo Caione * SPDX-License-Identifier: BSD-3-Clause 5afd241e7SCarlo Caione */ 6afd241e7SCarlo Caione 7afd241e7SCarlo Caione #include <assert.h> 8afd241e7SCarlo Caione #include <common/bl_common.h> 9afd241e7SCarlo Caione #include <common/interrupt_props.h> 10afd241e7SCarlo Caione #include <drivers/arm/gicv2.h> 11afd241e7SCarlo Caione #include <lib/mmio.h> 12afd241e7SCarlo Caione #include <lib/xlat_tables/xlat_mmu_helpers.h> 13afd241e7SCarlo Caione #include <plat/common/platform.h> 14afd241e7SCarlo Caione #include <platform_def.h> 15afd241e7SCarlo Caione 16afd241e7SCarlo Caione #include "aml_private.h" 17afd241e7SCarlo Caione 18afd241e7SCarlo Caione /* 19afd241e7SCarlo Caione * Placeholder variables for copying the arguments that have been passed to 20afd241e7SCarlo Caione * BL31 from BL2. 21afd241e7SCarlo Caione */ 22afd241e7SCarlo Caione static entry_point_info_t bl32_image_ep_info; 23afd241e7SCarlo Caione static entry_point_info_t bl33_image_ep_info; 24afd241e7SCarlo Caione static image_info_t bl30_image_info; 25afd241e7SCarlo Caione static image_info_t bl301_image_info; 26afd241e7SCarlo Caione 27afd241e7SCarlo Caione /******************************************************************************* 28afd241e7SCarlo Caione * Return a pointer to the 'entry_point_info' structure of the next image for 29afd241e7SCarlo Caione * the security state specified. BL33 corresponds to the non-secure image type 30afd241e7SCarlo Caione * while BL32 corresponds to the secure image type. A NULL pointer is returned 31afd241e7SCarlo Caione * if the image does not exist. 32afd241e7SCarlo Caione ******************************************************************************/ 33afd241e7SCarlo Caione entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type) 34afd241e7SCarlo Caione { 35afd241e7SCarlo Caione entry_point_info_t *next_image_info; 36afd241e7SCarlo Caione 37afd241e7SCarlo Caione next_image_info = (type == NON_SECURE) ? 38afd241e7SCarlo Caione &bl33_image_ep_info : &bl32_image_ep_info; 39afd241e7SCarlo Caione 40afd241e7SCarlo Caione /* None of the images can have 0x0 as the entrypoint. */ 41afd241e7SCarlo Caione if (next_image_info->pc != 0U) 42afd241e7SCarlo Caione return next_image_info; 43afd241e7SCarlo Caione 44afd241e7SCarlo Caione return NULL; 45afd241e7SCarlo Caione } 46afd241e7SCarlo Caione 47afd241e7SCarlo Caione /******************************************************************************* 48afd241e7SCarlo Caione * Perform any BL31 early platform setup. Here is an opportunity to copy 49afd241e7SCarlo Caione * parameters passed by the calling EL (S-EL1 in BL2 & S-EL3 in BL1) before 50afd241e7SCarlo Caione * they are lost (potentially). This needs to be done before the MMU is 51afd241e7SCarlo Caione * initialized so that the memory layout can be used while creating page 52afd241e7SCarlo Caione * tables. BL2 has flushed this information to memory, so we are guaranteed 53afd241e7SCarlo Caione * to pick up good data. 54afd241e7SCarlo Caione ******************************************************************************/ 55afd241e7SCarlo Caione struct axg_bl31_param { 56afd241e7SCarlo Caione param_header_t h; 57afd241e7SCarlo Caione image_info_t *bl31_image_info; 58afd241e7SCarlo Caione entry_point_info_t *bl32_ep_info; 59afd241e7SCarlo Caione image_info_t *bl32_image_info; 60afd241e7SCarlo Caione entry_point_info_t *bl33_ep_info; 61afd241e7SCarlo Caione image_info_t *bl33_image_info; 62afd241e7SCarlo Caione image_info_t *scp_image_info[]; 63afd241e7SCarlo Caione }; 64afd241e7SCarlo Caione 65afd241e7SCarlo Caione void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, 66afd241e7SCarlo Caione u_register_t arg2, u_register_t arg3) 67afd241e7SCarlo Caione { 68afd241e7SCarlo Caione struct axg_bl31_param *from_bl2; 69afd241e7SCarlo Caione 70afd241e7SCarlo Caione /* Initialize the console to provide early debug support */ 71afd241e7SCarlo Caione aml_console_init(); 72afd241e7SCarlo Caione 73afd241e7SCarlo Caione from_bl2 = (struct axg_bl31_param *)arg0; 74afd241e7SCarlo Caione 75afd241e7SCarlo Caione /* Check params passed from BL2 are not NULL. */ 76afd241e7SCarlo Caione assert(from_bl2 != NULL); 77afd241e7SCarlo Caione assert(from_bl2->h.type == PARAM_BL31); 78afd241e7SCarlo Caione assert(from_bl2->h.version >= VERSION_1); 79afd241e7SCarlo Caione 80afd241e7SCarlo Caione /* 81afd241e7SCarlo Caione * Copy BL32 and BL33 entry point information. It is stored in Secure 82afd241e7SCarlo Caione * RAM, in BL2's address space. 83afd241e7SCarlo Caione */ 84afd241e7SCarlo Caione bl32_image_ep_info = *from_bl2->bl32_ep_info; 85afd241e7SCarlo Caione bl33_image_ep_info = *from_bl2->bl33_ep_info; 86afd241e7SCarlo Caione 87*72d2535aSCarlo Caione #if AML_USE_ATOS 88*72d2535aSCarlo Caione /* 89*72d2535aSCarlo Caione * BL2 is unconditionally setting 0 (OPTEE_AARCH64) in arg0 even when 90*72d2535aSCarlo Caione * the BL32 image is 32bit (OPTEE_AARCH32). This is causing the boot to 91*72d2535aSCarlo Caione * hang when ATOS (32bit Amlogic BL32 binary-only TEE OS) is used. 92*72d2535aSCarlo Caione * 93*72d2535aSCarlo Caione * Hardcode to OPTEE_AARCH32 / MODE_RW_32. 94*72d2535aSCarlo Caione */ 95*72d2535aSCarlo Caione bl32_image_ep_info.args.arg0 = MODE_RW_32; 96*72d2535aSCarlo Caione #endif 97*72d2535aSCarlo Caione 98afd241e7SCarlo Caione if (bl33_image_ep_info.pc == 0U) { 99afd241e7SCarlo Caione ERROR("BL31: BL33 entrypoint not obtained from BL2\n"); 100afd241e7SCarlo Caione panic(); 101afd241e7SCarlo Caione } 102afd241e7SCarlo Caione 103afd241e7SCarlo Caione bl30_image_info = *from_bl2->scp_image_info[0]; 104afd241e7SCarlo Caione bl301_image_info = *from_bl2->scp_image_info[1]; 105afd241e7SCarlo Caione } 106afd241e7SCarlo Caione 107afd241e7SCarlo Caione void bl31_plat_arch_setup(void) 108afd241e7SCarlo Caione { 109afd241e7SCarlo Caione aml_setup_page_tables(); 110afd241e7SCarlo Caione 111afd241e7SCarlo Caione enable_mmu_el3(0); 112afd241e7SCarlo Caione } 113afd241e7SCarlo Caione 114afd241e7SCarlo Caione static inline bool axg_scp_ready(void) 115afd241e7SCarlo Caione { 116afd241e7SCarlo Caione return AML_AO_RTI_SCP_IS_READY(mmio_read_32(AML_AO_RTI_SCP_STAT)); 117afd241e7SCarlo Caione } 118afd241e7SCarlo Caione 119afd241e7SCarlo Caione static inline void axg_scp_boot(void) 120afd241e7SCarlo Caione { 121afd241e7SCarlo Caione aml_scpi_upload_scp_fw(bl30_image_info.image_base, 122afd241e7SCarlo Caione bl30_image_info.image_size, 0); 123afd241e7SCarlo Caione aml_scpi_upload_scp_fw(bl301_image_info.image_base, 124afd241e7SCarlo Caione bl301_image_info.image_size, 1); 125afd241e7SCarlo Caione while (!axg_scp_ready()) 126afd241e7SCarlo Caione ; 127afd241e7SCarlo Caione } 128afd241e7SCarlo Caione 129afd241e7SCarlo Caione /******************************************************************************* 130afd241e7SCarlo Caione * GICv2 driver setup information 131afd241e7SCarlo Caione ******************************************************************************/ 132afd241e7SCarlo Caione static const interrupt_prop_t axg_interrupt_props[] = { 133afd241e7SCarlo Caione INTR_PROP_DESC(IRQ_SEC_PHY_TIMER, GIC_HIGHEST_SEC_PRIORITY, 134afd241e7SCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 135afd241e7SCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_0, GIC_HIGHEST_SEC_PRIORITY, 136afd241e7SCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 137afd241e7SCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_1, GIC_HIGHEST_SEC_PRIORITY, 138afd241e7SCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 139afd241e7SCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_2, GIC_HIGHEST_SEC_PRIORITY, 140afd241e7SCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 141afd241e7SCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_3, GIC_HIGHEST_SEC_PRIORITY, 142afd241e7SCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 143afd241e7SCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_4, GIC_HIGHEST_SEC_PRIORITY, 144afd241e7SCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 145afd241e7SCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_5, GIC_HIGHEST_SEC_PRIORITY, 146afd241e7SCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 147afd241e7SCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_6, GIC_HIGHEST_SEC_PRIORITY, 148afd241e7SCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 149afd241e7SCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_7, GIC_HIGHEST_SEC_PRIORITY, 150afd241e7SCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL) 151afd241e7SCarlo Caione }; 152afd241e7SCarlo Caione 153afd241e7SCarlo Caione static const gicv2_driver_data_t axg_gic_data = { 154afd241e7SCarlo Caione .gicd_base = AML_GICD_BASE, 155afd241e7SCarlo Caione .gicc_base = AML_GICC_BASE, 156afd241e7SCarlo Caione .interrupt_props = axg_interrupt_props, 157afd241e7SCarlo Caione .interrupt_props_num = ARRAY_SIZE(axg_interrupt_props) 158afd241e7SCarlo Caione }; 159afd241e7SCarlo Caione 160afd241e7SCarlo Caione void bl31_platform_setup(void) 161afd241e7SCarlo Caione { 162afd241e7SCarlo Caione aml_mhu_secure_init(); 163afd241e7SCarlo Caione 164afd241e7SCarlo Caione gicv2_driver_init(&axg_gic_data); 165afd241e7SCarlo Caione gicv2_distif_init(); 166afd241e7SCarlo Caione gicv2_pcpu_distif_init(); 167afd241e7SCarlo Caione gicv2_cpuif_enable(); 168afd241e7SCarlo Caione 169afd241e7SCarlo Caione axg_scp_boot(); 170afd241e7SCarlo Caione } 171