xref: /rk3399_ARM-atf/plat/arm/board/fvp/fvp_common.c (revision 44639ab73e43e0b79da834dff8c85266d68e5066)
13e4b8fdcSSoby Mathew /*
288c51c3fSManish V Badarkhe  * Copyright (c) 2013-2022, Arm Limited and Contributors. All rights reserved.
33e4b8fdcSSoby Mathew  *
482cb2c1aSdp-arm  * SPDX-License-Identifier: BSD-3-Clause
53e4b8fdcSSoby Mathew  */
63e4b8fdcSSoby Mathew 
709d40e0eSAntonio Nino Diaz #include <assert.h>
809d40e0eSAntonio Nino Diaz 
909d40e0eSAntonio Nino Diaz #include <common/debug.h>
1009d40e0eSAntonio Nino Diaz #include <drivers/arm/cci.h>
1109d40e0eSAntonio Nino Diaz #include <drivers/arm/ccn.h>
1209d40e0eSAntonio Nino Diaz #include <drivers/arm/gicv2.h>
131b597c22SAlexei Fedorov #include <drivers/arm/sp804_delay_timer.h>
141b597c22SAlexei Fedorov #include <drivers/generic_delay_timer.h>
1509d40e0eSAntonio Nino Diaz #include <lib/mmio.h>
16ed9653ffSManish V Badarkhe #include <lib/smccc.h>
1709d40e0eSAntonio Nino Diaz #include <lib/xlat_tables/xlat_tables_compat.h>
18234bc7f8SAntonio Nino Diaz #include <platform_def.h>
19ed9653ffSManish V Badarkhe #include <services/arm_arch_svc.h>
209d9ae976SOlivier Deprez #if SPM_MM
21aeaa225cSPaul Beesley #include <services/spm_mm_partition.h>
229d9ae976SOlivier Deprez #endif
2309d40e0eSAntonio Nino Diaz 
24ed9653ffSManish V Badarkhe #include <plat/arm/common/arm_config.h>
25ed9653ffSManish V Badarkhe #include <plat/arm/common/plat_arm.h>
26ed9653ffSManish V Badarkhe #include <plat/common/platform.h>
27ed9653ffSManish V Badarkhe 
281af540efSRoberto Vargas #include "fvp_private.h"
293e4b8fdcSSoby Mathew 
303e4b8fdcSSoby Mathew /* Defines for GIC Driver build time selection */
313e4b8fdcSSoby Mathew #define FVP_GICV2		1
323e4b8fdcSSoby Mathew #define FVP_GICV3		2
333e4b8fdcSSoby Mathew 
343e4b8fdcSSoby Mathew /*******************************************************************************
353e4b8fdcSSoby Mathew  * arm_config holds the characteristics of the differences between the three FVP
363e4b8fdcSSoby Mathew  * platforms (Base, A53_A57 & Foundation). It will be populated during cold boot
373e4b8fdcSSoby Mathew  * at each boot stage by the primary before enabling the MMU (to allow
383e4b8fdcSSoby Mathew  * interconnect configuration) & used thereafter. Each BL will have its own copy
393e4b8fdcSSoby Mathew  * to allow independent operation.
403e4b8fdcSSoby Mathew  ******************************************************************************/
413e4b8fdcSSoby Mathew arm_config_t arm_config;
423e4b8fdcSSoby Mathew 
433e4b8fdcSSoby Mathew #define MAP_DEVICE0	MAP_REGION_FLAT(DEVICE0_BASE,			\
443e4b8fdcSSoby Mathew 					DEVICE0_SIZE,			\
453e4b8fdcSSoby Mathew 					MT_DEVICE | MT_RW | MT_SECURE)
463e4b8fdcSSoby Mathew 
473e4b8fdcSSoby Mathew #define MAP_DEVICE1	MAP_REGION_FLAT(DEVICE1_BASE,			\
483e4b8fdcSSoby Mathew 					DEVICE1_SIZE,			\
493e4b8fdcSSoby Mathew 					MT_DEVICE | MT_RW | MT_SECURE)
503e4b8fdcSSoby Mathew 
51f98630fbSManish V Badarkhe #if FVP_GICR_REGION_PROTECTION
52f98630fbSManish V Badarkhe #define MAP_GICD_MEM	MAP_REGION_FLAT(BASE_GICD_BASE,			\
53f98630fbSManish V Badarkhe 					BASE_GICD_SIZE,			\
54f98630fbSManish V Badarkhe 					MT_DEVICE | MT_RW | MT_SECURE)
55f98630fbSManish V Badarkhe 
56f98630fbSManish V Badarkhe /* Map all core's redistributor memory as read-only. After boots up,
57f98630fbSManish V Badarkhe  * per-core map its redistributor memory as read-write */
58f98630fbSManish V Badarkhe #define MAP_GICR_MEM	MAP_REGION_FLAT(BASE_GICR_BASE,			\
59f98630fbSManish V Badarkhe 					(BASE_GICR_SIZE * PLATFORM_CORE_COUNT),\
60f98630fbSManish V Badarkhe 					MT_DEVICE | MT_RO | MT_SECURE)
61f98630fbSManish V Badarkhe #endif /* FVP_GICR_REGION_PROTECTION */
62f98630fbSManish V Badarkhe 
63284c3d67SSandrine Bailleux /*
64284c3d67SSandrine Bailleux  * Need to be mapped with write permissions in order to set a new non-volatile
65284c3d67SSandrine Bailleux  * counter value.
66284c3d67SSandrine Bailleux  */
673e4b8fdcSSoby Mathew #define MAP_DEVICE2	MAP_REGION_FLAT(DEVICE2_BASE,			\
683e4b8fdcSSoby Mathew 					DEVICE2_SIZE,			\
69fe7de035SAntonio Nino Diaz 					MT_DEVICE | MT_RW | MT_SECURE)
703e4b8fdcSSoby Mathew 
713e4b8fdcSSoby Mathew /*
72b5fa6563SSandrine Bailleux  * Table of memory regions for various BL stages to map using the MMU.
730916c38dSRoberto Vargas  * This doesn't include Trusted SRAM as setup_page_tables() already takes care
740916c38dSRoberto Vargas  * of mapping it.
753e4b8fdcSSoby Mathew  */
763d8256b2SMasahiro Yamada #ifdef IMAGE_BL1
773e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = {
783e4b8fdcSSoby Mathew 	ARM_MAP_SHARED_RAM,
7979d8be3cSManish V Badarkhe 	V2M_MAP_FLASH0_RO,
803e4b8fdcSSoby Mathew 	V2M_MAP_IOFPGA,
813e4b8fdcSSoby Mathew 	MAP_DEVICE0,
82e0cea783SManish V Badarkhe #if FVP_INTERCONNECT_DRIVER == FVP_CCN
833e4b8fdcSSoby Mathew 	MAP_DEVICE1,
84e0cea783SManish V Badarkhe #endif
853e4b8fdcSSoby Mathew #if TRUSTED_BOARD_BOOT
86284c3d67SSandrine Bailleux 	/* To access the Root of Trust Public Key registers. */
87284c3d67SSandrine Bailleux 	MAP_DEVICE2,
88284c3d67SSandrine Bailleux 	/* Map DRAM to authenticate NS_BL2U image. */
893e4b8fdcSSoby Mathew 	ARM_MAP_NS_DRAM1,
903e4b8fdcSSoby Mathew #endif
913e4b8fdcSSoby Mathew 	{0}
923e4b8fdcSSoby Mathew };
933e4b8fdcSSoby Mathew #endif
943d8256b2SMasahiro Yamada #ifdef IMAGE_BL2
953e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = {
963e4b8fdcSSoby Mathew 	ARM_MAP_SHARED_RAM,
973e4b8fdcSSoby Mathew 	V2M_MAP_FLASH0_RW,
983e4b8fdcSSoby Mathew 	V2M_MAP_IOFPGA,
993e4b8fdcSSoby Mathew 	MAP_DEVICE0,
100e0cea783SManish V Badarkhe #if FVP_INTERCONNECT_DRIVER == FVP_CCN
1013e4b8fdcSSoby Mathew 	MAP_DEVICE1,
102e0cea783SManish V Badarkhe #endif
1033e4b8fdcSSoby Mathew 	ARM_MAP_NS_DRAM1,
104402b3cf8SJulius Werner #ifdef __aarch64__
105b09ba056SRoberto Vargas 	ARM_MAP_DRAM2,
106b09ba056SRoberto Vargas #endif
10739f0b86aSManish V Badarkhe 	/*
10839f0b86aSManish V Badarkhe 	 * Required to load HW_CONFIG, SPMC and SPs to trusted DRAM.
10939f0b86aSManish V Badarkhe 	 */
11064758c97SAchin Gupta 	ARM_MAP_TRUSTED_DRAM,
111c8720729SZelalem Aweke #if ENABLE_RME
112c8720729SZelalem Aweke 	ARM_MAP_RMM_DRAM,
113c8720729SZelalem Aweke 	ARM_MAP_GPT_L1_DRAM,
114c8720729SZelalem Aweke #endif /* ENABLE_RME */
1153eb2d672SSandrine Bailleux #ifdef SPD_tspd
1163e4b8fdcSSoby Mathew 	ARM_MAP_TSP_SEC_MEM,
1173eb2d672SSandrine Bailleux #endif
118284c3d67SSandrine Bailleux #if TRUSTED_BOARD_BOOT
119284c3d67SSandrine Bailleux 	/* To access the Root of Trust Public Key registers. */
120284c3d67SSandrine Bailleux 	MAP_DEVICE2,
121ba597da7SJohn Tsichritzis #endif /* TRUSTED_BOARD_BOOT */
12288c51c3fSManish V Badarkhe 
12388c51c3fSManish V Badarkhe #if CRYPTO_SUPPORT && !BL2_AT_EL3
12488c51c3fSManish V Badarkhe 	/*
12588c51c3fSManish V Badarkhe 	 * To access shared the Mbed TLS heap while booting the
12688c51c3fSManish V Badarkhe 	 * system with Crypto support
12788c51c3fSManish V Badarkhe 	 */
12888c51c3fSManish V Badarkhe 	ARM_MAP_BL1_RW,
12988c51c3fSManish V Badarkhe #endif /* CRYPTO_SUPPORT && !BL2_AT_EL3 */
130*44639ab7SMarc Bonnici #if SPM_MM || SPMC_AT_EL3
131e29efeb1SAntonio Nino Diaz 	ARM_SP_IMAGE_MMAP,
132e29efeb1SAntonio Nino Diaz #endif
1333e4b8fdcSSoby Mathew #if ARM_BL31_IN_DRAM
1343e4b8fdcSSoby Mathew 	ARM_MAP_BL31_SEC_DRAM,
1353e4b8fdcSSoby Mathew #endif
136810d9213SJens Wiklander #ifdef SPD_opteed
137b3ba6fdaSSoby Mathew 	ARM_MAP_OPTEE_CORE_MEM,
138810d9213SJens Wiklander 	ARM_OPTEE_PAGEABLE_LOAD_MEM,
139810d9213SJens Wiklander #endif
1403e4b8fdcSSoby Mathew 	{0}
1413e4b8fdcSSoby Mathew };
1423e4b8fdcSSoby Mathew #endif
1433d8256b2SMasahiro Yamada #ifdef IMAGE_BL2U
1443e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = {
1453e4b8fdcSSoby Mathew 	MAP_DEVICE0,
1463e4b8fdcSSoby Mathew 	V2M_MAP_IOFPGA,
1473e4b8fdcSSoby Mathew 	{0}
1483e4b8fdcSSoby Mathew };
1493e4b8fdcSSoby Mathew #endif
1503d8256b2SMasahiro Yamada #ifdef IMAGE_BL31
1513e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = {
1523e4b8fdcSSoby Mathew 	ARM_MAP_SHARED_RAM,
153992f091bSAmbroise Vincent #if USE_DEBUGFS
154992f091bSAmbroise Vincent 	/* Required by devfip, can be removed if devfip is not used */
155992f091bSAmbroise Vincent 	V2M_MAP_FLASH0_RW,
156992f091bSAmbroise Vincent #endif /* USE_DEBUGFS */
157e35a3fb5SSoby Mathew 	ARM_MAP_EL3_TZC_DRAM,
1583e4b8fdcSSoby Mathew 	V2M_MAP_IOFPGA,
1593e4b8fdcSSoby Mathew 	MAP_DEVICE0,
160f98630fbSManish V Badarkhe #if FVP_GICR_REGION_PROTECTION
161f98630fbSManish V Badarkhe 	MAP_GICD_MEM,
162f98630fbSManish V Badarkhe 	MAP_GICR_MEM,
163f98630fbSManish V Badarkhe #else
1643e4b8fdcSSoby Mathew 	MAP_DEVICE1,
165f98630fbSManish V Badarkhe #endif /* FVP_GICR_REGION_PROTECTION */
166f145403cSRoberto Vargas 	ARM_V2M_MAP_MEM_PROTECT,
1673f3c341aSPaul Beesley #if SPM_MM
168e29efeb1SAntonio Nino Diaz 	ARM_SPM_BUF_EL3_MMAP,
169e29efeb1SAntonio Nino Diaz #endif
170c8720729SZelalem Aweke #if ENABLE_RME
171c8720729SZelalem Aweke 	ARM_MAP_GPT_L1_DRAM,
172c8720729SZelalem Aweke #endif
1733e4b8fdcSSoby Mathew 	{0}
1743e4b8fdcSSoby Mathew };
175e29efeb1SAntonio Nino Diaz 
1763f3c341aSPaul Beesley #if defined(IMAGE_BL31) && SPM_MM
177e29efeb1SAntonio Nino Diaz const mmap_region_t plat_arm_secure_partition_mmap[] = {
178e29efeb1SAntonio Nino Diaz 	V2M_MAP_IOFPGA_EL0, /* for the UART */
179c4fa1739SSandrine Bailleux 	MAP_REGION_FLAT(DEVICE0_BASE,				\
180c4fa1739SSandrine Bailleux 			DEVICE0_SIZE,				\
181c4fa1739SSandrine Bailleux 			MT_DEVICE | MT_RO | MT_SECURE | MT_USER),
182e29efeb1SAntonio Nino Diaz 	ARM_SP_IMAGE_MMAP,
183e29efeb1SAntonio Nino Diaz 	ARM_SP_IMAGE_NS_BUF_MMAP,
184e29efeb1SAntonio Nino Diaz 	ARM_SP_IMAGE_RW_MMAP,
185e29efeb1SAntonio Nino Diaz 	ARM_SPM_BUF_EL0_MMAP,
186e29efeb1SAntonio Nino Diaz 	{0}
187e29efeb1SAntonio Nino Diaz };
188e29efeb1SAntonio Nino Diaz #endif
1893e4b8fdcSSoby Mathew #endif
1903d8256b2SMasahiro Yamada #ifdef IMAGE_BL32
1913e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = {
192402b3cf8SJulius Werner #ifndef __aarch64__
193877cf3ffSSoby Mathew 	ARM_MAP_SHARED_RAM,
194950c6956SJoel Hutton 	ARM_V2M_MAP_MEM_PROTECT,
195877cf3ffSSoby Mathew #endif
1963e4b8fdcSSoby Mathew 	V2M_MAP_IOFPGA,
1973e4b8fdcSSoby Mathew 	MAP_DEVICE0,
1983e4b8fdcSSoby Mathew 	MAP_DEVICE1,
1993e4b8fdcSSoby Mathew 	{0}
2003e4b8fdcSSoby Mathew };
2013e4b8fdcSSoby Mathew #endif
2023e4b8fdcSSoby Mathew 
2039d870b79SZelalem Aweke #ifdef IMAGE_RMM
2049d870b79SZelalem Aweke const mmap_region_t plat_arm_mmap[] = {
2059d870b79SZelalem Aweke 	V2M_MAP_IOFPGA,
2069d870b79SZelalem Aweke 	MAP_DEVICE0,
2079d870b79SZelalem Aweke 	MAP_DEVICE1,
2089d870b79SZelalem Aweke 	{0}
2099d870b79SZelalem Aweke };
2109d870b79SZelalem Aweke #endif
2119d870b79SZelalem Aweke 
2123e4b8fdcSSoby Mathew ARM_CASSERT_MMAP
2133e4b8fdcSSoby Mathew 
214955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER != FVP_CCN
215955242d8SJeenu Viswambharan static const int fvp_cci400_map[] = {
216955242d8SJeenu Viswambharan 	PLAT_FVP_CCI400_CLUS0_SL_PORT,
217955242d8SJeenu Viswambharan 	PLAT_FVP_CCI400_CLUS1_SL_PORT,
218955242d8SJeenu Viswambharan };
219955242d8SJeenu Viswambharan 
220955242d8SJeenu Viswambharan static const int fvp_cci5xx_map[] = {
221955242d8SJeenu Viswambharan 	PLAT_FVP_CCI5XX_CLUS0_SL_PORT,
222955242d8SJeenu Viswambharan 	PLAT_FVP_CCI5XX_CLUS1_SL_PORT,
223955242d8SJeenu Viswambharan };
224955242d8SJeenu Viswambharan 
225955242d8SJeenu Viswambharan static unsigned int get_interconnect_master(void)
226955242d8SJeenu Viswambharan {
227955242d8SJeenu Viswambharan 	unsigned int master;
228955242d8SJeenu Viswambharan 	u_register_t mpidr;
229955242d8SJeenu Viswambharan 
230955242d8SJeenu Viswambharan 	mpidr = read_mpidr_el1();
231583e0791SAntonio Nino Diaz 	master = ((arm_config.flags & ARM_CONFIG_FVP_SHIFTED_AFF) != 0U) ?
232955242d8SJeenu Viswambharan 		MPIDR_AFFLVL2_VAL(mpidr) : MPIDR_AFFLVL1_VAL(mpidr);
233955242d8SJeenu Viswambharan 
234955242d8SJeenu Viswambharan 	assert(master < FVP_CLUSTER_COUNT);
235955242d8SJeenu Viswambharan 	return master;
236955242d8SJeenu Viswambharan }
237955242d8SJeenu Viswambharan #endif
2383e4b8fdcSSoby Mathew 
2393f3c341aSPaul Beesley #if defined(IMAGE_BL31) && SPM_MM
240e29efeb1SAntonio Nino Diaz /*
241e29efeb1SAntonio Nino Diaz  * Boot information passed to a secure partition during initialisation. Linear
242e29efeb1SAntonio Nino Diaz  * indices in MP information will be filled at runtime.
243e29efeb1SAntonio Nino Diaz  */
244aeaa225cSPaul Beesley static spm_mm_mp_info_t sp_mp_info[] = {
245e29efeb1SAntonio Nino Diaz 	[0] = {0x80000000, 0},
246e29efeb1SAntonio Nino Diaz 	[1] = {0x80000001, 0},
247e29efeb1SAntonio Nino Diaz 	[2] = {0x80000002, 0},
248e29efeb1SAntonio Nino Diaz 	[3] = {0x80000003, 0},
249e29efeb1SAntonio Nino Diaz 	[4] = {0x80000100, 0},
250e29efeb1SAntonio Nino Diaz 	[5] = {0x80000101, 0},
251e29efeb1SAntonio Nino Diaz 	[6] = {0x80000102, 0},
252e29efeb1SAntonio Nino Diaz 	[7] = {0x80000103, 0},
253e29efeb1SAntonio Nino Diaz };
254e29efeb1SAntonio Nino Diaz 
255aeaa225cSPaul Beesley const spm_mm_boot_info_t plat_arm_secure_partition_boot_info = {
256e29efeb1SAntonio Nino Diaz 	.h.type              = PARAM_SP_IMAGE_BOOT_INFO,
257e29efeb1SAntonio Nino Diaz 	.h.version           = VERSION_1,
258aeaa225cSPaul Beesley 	.h.size              = sizeof(spm_mm_boot_info_t),
259e29efeb1SAntonio Nino Diaz 	.h.attr              = 0,
260e29efeb1SAntonio Nino Diaz 	.sp_mem_base         = ARM_SP_IMAGE_BASE,
261e29efeb1SAntonio Nino Diaz 	.sp_mem_limit        = ARM_SP_IMAGE_LIMIT,
262e29efeb1SAntonio Nino Diaz 	.sp_image_base       = ARM_SP_IMAGE_BASE,
263e29efeb1SAntonio Nino Diaz 	.sp_stack_base       = PLAT_SP_IMAGE_STACK_BASE,
264e29efeb1SAntonio Nino Diaz 	.sp_heap_base        = ARM_SP_IMAGE_HEAP_BASE,
2650560efb9SArd Biesheuvel 	.sp_ns_comm_buf_base = PLAT_SP_IMAGE_NS_BUF_BASE,
266e29efeb1SAntonio Nino Diaz 	.sp_shared_buf_base  = PLAT_SPM_BUF_BASE,
267e29efeb1SAntonio Nino Diaz 	.sp_image_size       = ARM_SP_IMAGE_SIZE,
268e29efeb1SAntonio Nino Diaz 	.sp_pcpu_stack_size  = PLAT_SP_IMAGE_STACK_PCPU_SIZE,
269e29efeb1SAntonio Nino Diaz 	.sp_heap_size        = ARM_SP_IMAGE_HEAP_SIZE,
2700560efb9SArd Biesheuvel 	.sp_ns_comm_buf_size = PLAT_SP_IMAGE_NS_BUF_SIZE,
271e29efeb1SAntonio Nino Diaz 	.sp_shared_buf_size  = PLAT_SPM_BUF_SIZE,
272e29efeb1SAntonio Nino Diaz 	.num_sp_mem_regions  = ARM_SP_IMAGE_NUM_MEM_REGIONS,
273e29efeb1SAntonio Nino Diaz 	.num_cpus            = PLATFORM_CORE_COUNT,
274e29efeb1SAntonio Nino Diaz 	.mp_info             = &sp_mp_info[0],
275e29efeb1SAntonio Nino Diaz };
276e29efeb1SAntonio Nino Diaz 
277e29efeb1SAntonio Nino Diaz const struct mmap_region *plat_get_secure_partition_mmap(void *cookie)
278e29efeb1SAntonio Nino Diaz {
279e29efeb1SAntonio Nino Diaz 	return plat_arm_secure_partition_mmap;
280e29efeb1SAntonio Nino Diaz }
281e29efeb1SAntonio Nino Diaz 
282aeaa225cSPaul Beesley const struct spm_mm_boot_info *plat_get_secure_partition_boot_info(
283e29efeb1SAntonio Nino Diaz 		void *cookie)
284e29efeb1SAntonio Nino Diaz {
285e29efeb1SAntonio Nino Diaz 	return &plat_arm_secure_partition_boot_info;
286e29efeb1SAntonio Nino Diaz }
287e29efeb1SAntonio Nino Diaz #endif
288e29efeb1SAntonio Nino Diaz 
2893e4b8fdcSSoby Mathew /*******************************************************************************
2903e4b8fdcSSoby Mathew  * A single boot loader stack is expected to work on both the Foundation FVP
2913e4b8fdcSSoby Mathew  * models and the two flavours of the Base FVP models (AEMv8 & Cortex). The
2923e4b8fdcSSoby Mathew  * SYS_ID register provides a mechanism for detecting the differences between
2933e4b8fdcSSoby Mathew  * these platforms. This information is stored in a per-BL array to allow the
2943e4b8fdcSSoby Mathew  * code to take the correct path.Per BL platform configuration.
2953e4b8fdcSSoby Mathew  ******************************************************************************/
2964d010d0dSDaniel Boulby void __init fvp_config_setup(void)
2973e4b8fdcSSoby Mathew {
2983e4b8fdcSSoby Mathew 	unsigned int rev, hbi, bld, arch, sys_id;
2993e4b8fdcSSoby Mathew 
3003e4b8fdcSSoby Mathew 	sys_id = mmio_read_32(V2M_SYSREGS_BASE + V2M_SYS_ID);
3013e4b8fdcSSoby Mathew 	rev = (sys_id >> V2M_SYS_ID_REV_SHIFT) & V2M_SYS_ID_REV_MASK;
3023e4b8fdcSSoby Mathew 	hbi = (sys_id >> V2M_SYS_ID_HBI_SHIFT) & V2M_SYS_ID_HBI_MASK;
3033e4b8fdcSSoby Mathew 	bld = (sys_id >> V2M_SYS_ID_BLD_SHIFT) & V2M_SYS_ID_BLD_MASK;
3043e4b8fdcSSoby Mathew 	arch = (sys_id >> V2M_SYS_ID_ARCH_SHIFT) & V2M_SYS_ID_ARCH_MASK;
3053e4b8fdcSSoby Mathew 
3063e4b8fdcSSoby Mathew 	if (arch != ARCH_MODEL) {
3073e4b8fdcSSoby Mathew 		ERROR("This firmware is for FVP models\n");
3083e4b8fdcSSoby Mathew 		panic();
3093e4b8fdcSSoby Mathew 	}
3103e4b8fdcSSoby Mathew 
3113e4b8fdcSSoby Mathew 	/*
3123e4b8fdcSSoby Mathew 	 * The build field in the SYS_ID tells which variant of the GIC
3133e4b8fdcSSoby Mathew 	 * memory is implemented by the model.
3143e4b8fdcSSoby Mathew 	 */
3153e4b8fdcSSoby Mathew 	switch (bld) {
3163e4b8fdcSSoby Mathew 	case BLD_GIC_VE_MMAP:
31721a3973dSSoby Mathew 		ERROR("Legacy Versatile Express memory map for GIC peripheral"
31821a3973dSSoby Mathew 				" is not supported\n");
3193e4b8fdcSSoby Mathew 		panic();
3203e4b8fdcSSoby Mathew 		break;
3213e4b8fdcSSoby Mathew 	case BLD_GIC_A53A57_MMAP:
3223e4b8fdcSSoby Mathew 		break;
3233e4b8fdcSSoby Mathew 	default:
3243e4b8fdcSSoby Mathew 		ERROR("Unsupported board build %x\n", bld);
3253e4b8fdcSSoby Mathew 		panic();
3263e4b8fdcSSoby Mathew 	}
3273e4b8fdcSSoby Mathew 
3283e4b8fdcSSoby Mathew 	/*
3293e4b8fdcSSoby Mathew 	 * The hbi field in the SYS_ID is 0x020 for the Base FVP & 0x010
3303e4b8fdcSSoby Mathew 	 * for the Foundation FVP.
3313e4b8fdcSSoby Mathew 	 */
3323e4b8fdcSSoby Mathew 	switch (hbi) {
3333e4b8fdcSSoby Mathew 	case HBI_FOUNDATION_FVP:
3343e4b8fdcSSoby Mathew 		arm_config.flags = 0;
3353e4b8fdcSSoby Mathew 
3363e4b8fdcSSoby Mathew 		/*
3373e4b8fdcSSoby Mathew 		 * Check for supported revisions of Foundation FVP
3383e4b8fdcSSoby Mathew 		 * Allow future revisions to run but emit warning diagnostic
3393e4b8fdcSSoby Mathew 		 */
3403e4b8fdcSSoby Mathew 		switch (rev) {
3413e4b8fdcSSoby Mathew 		case REV_FOUNDATION_FVP_V2_0:
3423e4b8fdcSSoby Mathew 		case REV_FOUNDATION_FVP_V2_1:
3433e4b8fdcSSoby Mathew 		case REV_FOUNDATION_FVP_v9_1:
3444faa4a1dSSandrine Bailleux 		case REV_FOUNDATION_FVP_v9_6:
3453e4b8fdcSSoby Mathew 			break;
3463e4b8fdcSSoby Mathew 		default:
3473e4b8fdcSSoby Mathew 			WARN("Unrecognized Foundation FVP revision %x\n", rev);
3483e4b8fdcSSoby Mathew 			break;
3493e4b8fdcSSoby Mathew 		}
3503e4b8fdcSSoby Mathew 		break;
3513e4b8fdcSSoby Mathew 	case HBI_BASE_FVP:
352955242d8SJeenu Viswambharan 		arm_config.flags |= (ARM_CONFIG_BASE_MMAP | ARM_CONFIG_HAS_TZC);
3533e4b8fdcSSoby Mathew 
3543e4b8fdcSSoby Mathew 		/*
3553e4b8fdcSSoby Mathew 		 * Check for supported revisions
3563e4b8fdcSSoby Mathew 		 * Allow future revisions to run but emit warning diagnostic
3573e4b8fdcSSoby Mathew 		 */
3583e4b8fdcSSoby Mathew 		switch (rev) {
3593e4b8fdcSSoby Mathew 		case REV_BASE_FVP_V0:
360955242d8SJeenu Viswambharan 			arm_config.flags |= ARM_CONFIG_FVP_HAS_CCI400;
361955242d8SJeenu Viswambharan 			break;
362955242d8SJeenu Viswambharan 		case REV_BASE_FVP_REVC:
3638431635bSIsla Mitchell 			arm_config.flags |= (ARM_CONFIG_FVP_HAS_SMMUV3 |
364955242d8SJeenu Viswambharan 					ARM_CONFIG_FVP_HAS_CCI5XX);
3653e4b8fdcSSoby Mathew 			break;
3663e4b8fdcSSoby Mathew 		default:
3673e4b8fdcSSoby Mathew 			WARN("Unrecognized Base FVP revision %x\n", rev);
3683e4b8fdcSSoby Mathew 			break;
3693e4b8fdcSSoby Mathew 		}
3703e4b8fdcSSoby Mathew 		break;
3713e4b8fdcSSoby Mathew 	default:
3723e4b8fdcSSoby Mathew 		ERROR("Unsupported board HBI number 0x%x\n", hbi);
3733e4b8fdcSSoby Mathew 		panic();
3743e4b8fdcSSoby Mathew 	}
3758431635bSIsla Mitchell 
3768431635bSIsla Mitchell 	/*
3778431635bSIsla Mitchell 	 * We assume that the presence of MT bit, and therefore shifted
3788431635bSIsla Mitchell 	 * affinities, is uniform across the platform: either all CPUs, or no
3798431635bSIsla Mitchell 	 * CPUs implement it.
3808431635bSIsla Mitchell 	 */
381583e0791SAntonio Nino Diaz 	if ((read_mpidr_el1() & MPIDR_MT_MASK) != 0U)
3828431635bSIsla Mitchell 		arm_config.flags |= ARM_CONFIG_FVP_SHIFTED_AFF;
3833e4b8fdcSSoby Mathew }
3843e4b8fdcSSoby Mathew 
3853e4b8fdcSSoby Mathew 
3864d010d0dSDaniel Boulby void __init fvp_interconnect_init(void)
3873e4b8fdcSSoby Mathew {
38871237876SSoby Mathew #if FVP_INTERCONNECT_DRIVER == FVP_CCN
38971237876SSoby Mathew 	if (ccn_get_part0_id(PLAT_ARM_CCN_BASE) != CCN_502_PART0_ID) {
390583e0791SAntonio Nino Diaz 		ERROR("Unrecognized CCN variant detected. Only CCN-502 is supported");
39171237876SSoby Mathew 		panic();
39271237876SSoby Mathew 	}
393955242d8SJeenu Viswambharan 
3943e4b8fdcSSoby Mathew 	plat_arm_interconnect_init();
395955242d8SJeenu Viswambharan #else
396583e0791SAntonio Nino Diaz 	uintptr_t cci_base = 0U;
397583e0791SAntonio Nino Diaz 	const int *cci_map = NULL;
398583e0791SAntonio Nino Diaz 	unsigned int map_size = 0U;
399955242d8SJeenu Viswambharan 
400955242d8SJeenu Viswambharan 	/* Initialize the right interconnect */
401583e0791SAntonio Nino Diaz 	if ((arm_config.flags & ARM_CONFIG_FVP_HAS_CCI5XX) != 0U) {
402955242d8SJeenu Viswambharan 		cci_base = PLAT_FVP_CCI5XX_BASE;
403955242d8SJeenu Viswambharan 		cci_map = fvp_cci5xx_map;
404955242d8SJeenu Viswambharan 		map_size = ARRAY_SIZE(fvp_cci5xx_map);
405583e0791SAntonio Nino Diaz 	} else if ((arm_config.flags & ARM_CONFIG_FVP_HAS_CCI400) != 0U) {
406955242d8SJeenu Viswambharan 		cci_base = PLAT_FVP_CCI400_BASE;
407955242d8SJeenu Viswambharan 		cci_map = fvp_cci400_map;
408955242d8SJeenu Viswambharan 		map_size = ARRAY_SIZE(fvp_cci400_map);
409583e0791SAntonio Nino Diaz 	} else {
410583e0791SAntonio Nino Diaz 		return;
411955242d8SJeenu Viswambharan 	}
412955242d8SJeenu Viswambharan 
413583e0791SAntonio Nino Diaz 	assert(cci_base != 0U);
414583e0791SAntonio Nino Diaz 	assert(cci_map != NULL);
415955242d8SJeenu Viswambharan 	cci_init(cci_base, cci_map, map_size);
416955242d8SJeenu Viswambharan #endif
41771237876SSoby Mathew }
4183e4b8fdcSSoby Mathew 
4193e4b8fdcSSoby Mathew void fvp_interconnect_enable(void)
4203e4b8fdcSSoby Mathew {
421955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER == FVP_CCN
4223e4b8fdcSSoby Mathew 	plat_arm_interconnect_enter_coherency();
423955242d8SJeenu Viswambharan #else
424955242d8SJeenu Viswambharan 	unsigned int master;
425955242d8SJeenu Viswambharan 
426583e0791SAntonio Nino Diaz 	if ((arm_config.flags & (ARM_CONFIG_FVP_HAS_CCI400 |
427583e0791SAntonio Nino Diaz 				 ARM_CONFIG_FVP_HAS_CCI5XX)) != 0U) {
428955242d8SJeenu Viswambharan 		master = get_interconnect_master();
429955242d8SJeenu Viswambharan 		cci_enable_snoop_dvm_reqs(master);
430955242d8SJeenu Viswambharan 	}
431955242d8SJeenu Viswambharan #endif
4323e4b8fdcSSoby Mathew }
4333e4b8fdcSSoby Mathew 
4343e4b8fdcSSoby Mathew void fvp_interconnect_disable(void)
4353e4b8fdcSSoby Mathew {
436955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER == FVP_CCN
4373e4b8fdcSSoby Mathew 	plat_arm_interconnect_exit_coherency();
438955242d8SJeenu Viswambharan #else
439955242d8SJeenu Viswambharan 	unsigned int master;
440955242d8SJeenu Viswambharan 
441583e0791SAntonio Nino Diaz 	if ((arm_config.flags & (ARM_CONFIG_FVP_HAS_CCI400 |
442583e0791SAntonio Nino Diaz 				 ARM_CONFIG_FVP_HAS_CCI5XX)) != 0U) {
443955242d8SJeenu Viswambharan 		master = get_interconnect_master();
444955242d8SJeenu Viswambharan 		cci_disable_snoop_dvm_reqs(master);
445955242d8SJeenu Viswambharan 	}
446955242d8SJeenu Viswambharan #endif
4473e4b8fdcSSoby Mathew }
448ba597da7SJohn Tsichritzis 
44988c51c3fSManish V Badarkhe #if CRYPTO_SUPPORT
450ba597da7SJohn Tsichritzis int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size)
451ba597da7SJohn Tsichritzis {
452ba597da7SJohn Tsichritzis 	assert(heap_addr != NULL);
453ba597da7SJohn Tsichritzis 	assert(heap_size != NULL);
454ba597da7SJohn Tsichritzis 
455ba597da7SJohn Tsichritzis 	return arm_get_mbedtls_heap(heap_addr, heap_size);
456ba597da7SJohn Tsichritzis }
45788c51c3fSManish V Badarkhe #endif /* CRYPTO_SUPPORT */
4581b597c22SAlexei Fedorov 
4591b597c22SAlexei Fedorov void fvp_timer_init(void)
4601b597c22SAlexei Fedorov {
461fddfb3baSMadhukar Pappireddy #if USE_SP804_TIMER
4621b597c22SAlexei Fedorov 	/* Enable the clock override for SP804 timer 0, which means that no
4631b597c22SAlexei Fedorov 	 * clock dividers are applied and the raw (35MHz) clock will be used.
4641b597c22SAlexei Fedorov 	 */
4651b597c22SAlexei Fedorov 	mmio_write_32(V2M_SP810_BASE, FVP_SP810_CTRL_TIM0_OV);
4661b597c22SAlexei Fedorov 
4671b597c22SAlexei Fedorov 	/* Initialize delay timer driver using SP804 dual timer 0 */
4681b597c22SAlexei Fedorov 	sp804_timer_init(V2M_SP804_TIMER0_BASE,
4691b597c22SAlexei Fedorov 			SP804_TIMER_CLKMULT, SP804_TIMER_CLKDIV);
4701b597c22SAlexei Fedorov #else
4711b597c22SAlexei Fedorov 	generic_delay_timer_init();
4721b597c22SAlexei Fedorov 
4731b597c22SAlexei Fedorov 	/* Enable System level generic timer */
4741b597c22SAlexei Fedorov 	mmio_write_32(ARM_SYS_CNTCTL_BASE + CNTCR_OFF,
4751b597c22SAlexei Fedorov 			CNTCR_FCREQ(0U) | CNTCR_EN);
476fddfb3baSMadhukar Pappireddy #endif /* USE_SP804_TIMER */
4771b597c22SAlexei Fedorov }
478ed9653ffSManish V Badarkhe 
479ed9653ffSManish V Badarkhe /*****************************************************************************
480ed9653ffSManish V Badarkhe  * plat_is_smccc_feature_available() - This function checks whether SMCCC
481ed9653ffSManish V Badarkhe  *                                     feature is availabile for platform.
482ed9653ffSManish V Badarkhe  * @fid: SMCCC function id
483ed9653ffSManish V Badarkhe  *
484ed9653ffSManish V Badarkhe  * Return SMC_ARCH_CALL_SUCCESS if SMCCC feature is available and
485ed9653ffSManish V Badarkhe  * SMC_ARCH_CALL_NOT_SUPPORTED otherwise.
486ed9653ffSManish V Badarkhe  *****************************************************************************/
487ed9653ffSManish V Badarkhe int32_t plat_is_smccc_feature_available(u_register_t fid)
488ed9653ffSManish V Badarkhe {
489ed9653ffSManish V Badarkhe 	switch (fid) {
490ed9653ffSManish V Badarkhe 	case SMCCC_ARCH_SOC_ID:
491ed9653ffSManish V Badarkhe 		return SMC_ARCH_CALL_SUCCESS;
492ed9653ffSManish V Badarkhe 	default:
493ed9653ffSManish V Badarkhe 		return SMC_ARCH_CALL_NOT_SUPPORTED;
494ed9653ffSManish V Badarkhe 	}
495ed9653ffSManish V Badarkhe }
496ed9653ffSManish V Badarkhe 
497ed9653ffSManish V Badarkhe /* Get SOC version */
498ed9653ffSManish V Badarkhe int32_t plat_get_soc_version(void)
499ed9653ffSManish V Badarkhe {
500ed9653ffSManish V Badarkhe 	return (int32_t)
501dfff4686SYann Gautier 		(SOC_ID_SET_JEP_106(ARM_SOC_CONTINUATION_CODE,
502dfff4686SYann Gautier 				    ARM_SOC_IDENTIFICATION_CODE) |
503dfff4686SYann Gautier 		 (FVP_SOC_ID & SOC_ID_IMPL_DEF_MASK));
504ed9653ffSManish V Badarkhe }
505ed9653ffSManish V Badarkhe 
506ed9653ffSManish V Badarkhe /* Get SOC revision */
507ed9653ffSManish V Badarkhe int32_t plat_get_soc_revision(void)
508ed9653ffSManish V Badarkhe {
509ed9653ffSManish V Badarkhe 	unsigned int sys_id;
510ed9653ffSManish V Badarkhe 
511ed9653ffSManish V Badarkhe 	sys_id = mmio_read_32(V2M_SYSREGS_BASE + V2M_SYS_ID);
512dfff4686SYann Gautier 	return (int32_t)(((sys_id >> V2M_SYS_ID_REV_SHIFT) &
513dfff4686SYann Gautier 			  V2M_SYS_ID_REV_MASK) & SOC_ID_REV_MASK);
514ed9653ffSManish V Badarkhe }
515