1*cdb8c52fSCarlo Caione /* 2*cdb8c52fSCarlo Caione * Copyright (c) 2019, ARM Limited and Contributors. All rights reserved. 3*cdb8c52fSCarlo Caione * 4*cdb8c52fSCarlo Caione * SPDX-License-Identifier: BSD-3-Clause 5*cdb8c52fSCarlo Caione */ 6*cdb8c52fSCarlo Caione 7*cdb8c52fSCarlo Caione #include <assert.h> 8*cdb8c52fSCarlo Caione #include <common/bl_common.h> 9*cdb8c52fSCarlo Caione #include <common/interrupt_props.h> 10*cdb8c52fSCarlo Caione #include <drivers/arm/gicv2.h> 11*cdb8c52fSCarlo Caione #include <lib/mmio.h> 12*cdb8c52fSCarlo Caione #include <lib/xlat_tables/xlat_mmu_helpers.h> 13*cdb8c52fSCarlo Caione #include <plat/common/platform.h> 14*cdb8c52fSCarlo Caione #include <platform_def.h> 15*cdb8c52fSCarlo Caione 16*cdb8c52fSCarlo Caione #include "aml_private.h" 17*cdb8c52fSCarlo Caione 18*cdb8c52fSCarlo Caione /* 19*cdb8c52fSCarlo Caione * Placeholder variables for copying the arguments that have been passed to 20*cdb8c52fSCarlo Caione * BL31 from BL2. 21*cdb8c52fSCarlo Caione */ 22*cdb8c52fSCarlo Caione static entry_point_info_t bl32_image_ep_info; 23*cdb8c52fSCarlo Caione static entry_point_info_t bl33_image_ep_info; 24*cdb8c52fSCarlo Caione static image_info_t bl30_image_info; 25*cdb8c52fSCarlo Caione static image_info_t bl301_image_info; 26*cdb8c52fSCarlo Caione 27*cdb8c52fSCarlo Caione /******************************************************************************* 28*cdb8c52fSCarlo Caione * Return a pointer to the 'entry_point_info' structure of the next image for 29*cdb8c52fSCarlo Caione * the security state specified. BL33 corresponds to the non-secure image type 30*cdb8c52fSCarlo Caione * while BL32 corresponds to the secure image type. A NULL pointer is returned 31*cdb8c52fSCarlo Caione * if the image does not exist. 32*cdb8c52fSCarlo Caione ******************************************************************************/ 33*cdb8c52fSCarlo Caione entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type) 34*cdb8c52fSCarlo Caione { 35*cdb8c52fSCarlo Caione entry_point_info_t *next_image_info; 36*cdb8c52fSCarlo Caione 37*cdb8c52fSCarlo Caione next_image_info = (type == NON_SECURE) ? 38*cdb8c52fSCarlo Caione &bl33_image_ep_info : &bl32_image_ep_info; 39*cdb8c52fSCarlo Caione 40*cdb8c52fSCarlo Caione /* None of the images can have 0x0 as the entrypoint. */ 41*cdb8c52fSCarlo Caione if (next_image_info->pc != 0U) 42*cdb8c52fSCarlo Caione return next_image_info; 43*cdb8c52fSCarlo Caione 44*cdb8c52fSCarlo Caione return NULL; 45*cdb8c52fSCarlo Caione } 46*cdb8c52fSCarlo Caione 47*cdb8c52fSCarlo Caione /******************************************************************************* 48*cdb8c52fSCarlo Caione * Perform any BL31 early platform setup. Here is an opportunity to copy 49*cdb8c52fSCarlo Caione * parameters passed by the calling EL (S-EL1 in BL2 & S-EL3 in BL1) before 50*cdb8c52fSCarlo Caione * they are lost (potentially). This needs to be done before the MMU is 51*cdb8c52fSCarlo Caione * initialized so that the memory layout can be used while creating page 52*cdb8c52fSCarlo Caione * tables. BL2 has flushed this information to memory, so we are guaranteed 53*cdb8c52fSCarlo Caione * to pick up good data. 54*cdb8c52fSCarlo Caione ******************************************************************************/ 55*cdb8c52fSCarlo Caione struct g12a_bl31_param { 56*cdb8c52fSCarlo Caione param_header_t h; 57*cdb8c52fSCarlo Caione image_info_t *bl31_image_info; 58*cdb8c52fSCarlo Caione entry_point_info_t *bl32_ep_info; 59*cdb8c52fSCarlo Caione image_info_t *bl32_image_info; 60*cdb8c52fSCarlo Caione entry_point_info_t *bl33_ep_info; 61*cdb8c52fSCarlo Caione image_info_t *bl33_image_info; 62*cdb8c52fSCarlo Caione image_info_t *scp_image_info[]; 63*cdb8c52fSCarlo Caione }; 64*cdb8c52fSCarlo Caione 65*cdb8c52fSCarlo Caione void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, 66*cdb8c52fSCarlo Caione u_register_t arg2, u_register_t arg3) 67*cdb8c52fSCarlo Caione { 68*cdb8c52fSCarlo Caione struct g12a_bl31_param *from_bl2; 69*cdb8c52fSCarlo Caione 70*cdb8c52fSCarlo Caione /* Initialize the console to provide early debug support */ 71*cdb8c52fSCarlo Caione aml_console_init(); 72*cdb8c52fSCarlo Caione 73*cdb8c52fSCarlo Caione from_bl2 = (struct g12a_bl31_param *)arg0; 74*cdb8c52fSCarlo Caione 75*cdb8c52fSCarlo Caione /* Check params passed from BL2 are not NULL. */ 76*cdb8c52fSCarlo Caione assert(from_bl2 != NULL); 77*cdb8c52fSCarlo Caione assert(from_bl2->h.type == PARAM_BL31); 78*cdb8c52fSCarlo Caione assert(from_bl2->h.version >= VERSION_1); 79*cdb8c52fSCarlo Caione 80*cdb8c52fSCarlo Caione /* 81*cdb8c52fSCarlo Caione * Copy BL32 and BL33 entry point information. It is stored in Secure 82*cdb8c52fSCarlo Caione * RAM, in BL2's address space. 83*cdb8c52fSCarlo Caione */ 84*cdb8c52fSCarlo Caione bl32_image_ep_info = *from_bl2->bl32_ep_info; 85*cdb8c52fSCarlo Caione bl33_image_ep_info = *from_bl2->bl33_ep_info; 86*cdb8c52fSCarlo Caione 87*cdb8c52fSCarlo Caione if (bl33_image_ep_info.pc == 0U) { 88*cdb8c52fSCarlo Caione ERROR("BL31: BL33 entrypoint not obtained from BL2\n"); 89*cdb8c52fSCarlo Caione panic(); 90*cdb8c52fSCarlo Caione } 91*cdb8c52fSCarlo Caione 92*cdb8c52fSCarlo Caione bl30_image_info = *from_bl2->scp_image_info[0]; 93*cdb8c52fSCarlo Caione bl301_image_info = *from_bl2->scp_image_info[1]; 94*cdb8c52fSCarlo Caione } 95*cdb8c52fSCarlo Caione 96*cdb8c52fSCarlo Caione void bl31_plat_arch_setup(void) 97*cdb8c52fSCarlo Caione { 98*cdb8c52fSCarlo Caione aml_setup_page_tables(); 99*cdb8c52fSCarlo Caione 100*cdb8c52fSCarlo Caione enable_mmu_el3(0); 101*cdb8c52fSCarlo Caione } 102*cdb8c52fSCarlo Caione 103*cdb8c52fSCarlo Caione /******************************************************************************* 104*cdb8c52fSCarlo Caione * GICv2 driver setup information 105*cdb8c52fSCarlo Caione ******************************************************************************/ 106*cdb8c52fSCarlo Caione static const interrupt_prop_t g12a_interrupt_props[] = { 107*cdb8c52fSCarlo Caione INTR_PROP_DESC(IRQ_SEC_PHY_TIMER, GIC_HIGHEST_SEC_PRIORITY, 108*cdb8c52fSCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 109*cdb8c52fSCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_0, GIC_HIGHEST_SEC_PRIORITY, 110*cdb8c52fSCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 111*cdb8c52fSCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_1, GIC_HIGHEST_SEC_PRIORITY, 112*cdb8c52fSCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 113*cdb8c52fSCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_2, GIC_HIGHEST_SEC_PRIORITY, 114*cdb8c52fSCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 115*cdb8c52fSCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_3, GIC_HIGHEST_SEC_PRIORITY, 116*cdb8c52fSCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 117*cdb8c52fSCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_4, GIC_HIGHEST_SEC_PRIORITY, 118*cdb8c52fSCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 119*cdb8c52fSCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_5, GIC_HIGHEST_SEC_PRIORITY, 120*cdb8c52fSCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 121*cdb8c52fSCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_6, GIC_HIGHEST_SEC_PRIORITY, 122*cdb8c52fSCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL), 123*cdb8c52fSCarlo Caione INTR_PROP_DESC(IRQ_SEC_SGI_7, GIC_HIGHEST_SEC_PRIORITY, 124*cdb8c52fSCarlo Caione GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL) 125*cdb8c52fSCarlo Caione }; 126*cdb8c52fSCarlo Caione 127*cdb8c52fSCarlo Caione static const gicv2_driver_data_t g12a_gic_data = { 128*cdb8c52fSCarlo Caione .gicd_base = AML_GICD_BASE, 129*cdb8c52fSCarlo Caione .gicc_base = AML_GICC_BASE, 130*cdb8c52fSCarlo Caione .interrupt_props = g12a_interrupt_props, 131*cdb8c52fSCarlo Caione .interrupt_props_num = ARRAY_SIZE(g12a_interrupt_props) 132*cdb8c52fSCarlo Caione }; 133*cdb8c52fSCarlo Caione 134*cdb8c52fSCarlo Caione void bl31_platform_setup(void) 135*cdb8c52fSCarlo Caione { 136*cdb8c52fSCarlo Caione aml_mhu_secure_init(); 137*cdb8c52fSCarlo Caione 138*cdb8c52fSCarlo Caione gicv2_driver_init(&g12a_gic_data); 139*cdb8c52fSCarlo Caione gicv2_distif_init(); 140*cdb8c52fSCarlo Caione gicv2_pcpu_distif_init(); 141*cdb8c52fSCarlo Caione gicv2_cpuif_enable(); 142*cdb8c52fSCarlo Caione } 143