13e4b8fdcSSoby Mathew /* 2*86e4859aSRohit Mathew * Copyright (c) 2013-2024, Arm Limited and Contributors. All rights reserved. 33e4b8fdcSSoby Mathew * 482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause 53e4b8fdcSSoby Mathew */ 63e4b8fdcSSoby Mathew 709d40e0eSAntonio Nino Diaz #include <assert.h> 809d40e0eSAntonio Nino Diaz 909d40e0eSAntonio Nino Diaz #include <common/debug.h> 1009d40e0eSAntonio Nino Diaz #include <drivers/arm/cci.h> 1109d40e0eSAntonio Nino Diaz #include <drivers/arm/ccn.h> 1209d40e0eSAntonio Nino Diaz #include <drivers/arm/gicv2.h> 131b597c22SAlexei Fedorov #include <drivers/arm/sp804_delay_timer.h> 141b597c22SAlexei Fedorov #include <drivers/generic_delay_timer.h> 1582685904SAlexeiFedorov #include <fconf_hw_config_getter.h> 1609d40e0eSAntonio Nino Diaz #include <lib/mmio.h> 17ed9653ffSManish V Badarkhe #include <lib/smccc.h> 1809d40e0eSAntonio Nino Diaz #include <lib/xlat_tables/xlat_tables_compat.h> 19234bc7f8SAntonio Nino Diaz #include <platform_def.h> 20ed9653ffSManish V Badarkhe #include <services/arm_arch_svc.h> 211d0ca40eSJavier Almansa Sobrino #include <services/rmm_core_manifest.h> 229d9ae976SOlivier Deprez #if SPM_MM 23aeaa225cSPaul Beesley #include <services/spm_mm_partition.h> 249d9ae976SOlivier Deprez #endif 2509d40e0eSAntonio Nino Diaz 26ed9653ffSManish V Badarkhe #include <plat/arm/common/arm_config.h> 27ed9653ffSManish V Badarkhe #include <plat/arm/common/plat_arm.h> 28ed9653ffSManish V Badarkhe #include <plat/common/platform.h> 29ed9653ffSManish V Badarkhe 301af540efSRoberto Vargas #include "fvp_private.h" 313e4b8fdcSSoby Mathew 323e4b8fdcSSoby Mathew /* Defines for GIC Driver build time selection */ 333e4b8fdcSSoby Mathew #define FVP_GICV2 1 343e4b8fdcSSoby Mathew #define FVP_GICV3 2 353e4b8fdcSSoby Mathew 363e4b8fdcSSoby Mathew /******************************************************************************* 373e4b8fdcSSoby Mathew * arm_config holds the characteristics of the differences between the three FVP 383e4b8fdcSSoby Mathew * platforms (Base, A53_A57 & Foundation). It will be populated during cold boot 393e4b8fdcSSoby Mathew * at each boot stage by the primary before enabling the MMU (to allow 403e4b8fdcSSoby Mathew * interconnect configuration) & used thereafter. Each BL will have its own copy 413e4b8fdcSSoby Mathew * to allow independent operation. 423e4b8fdcSSoby Mathew ******************************************************************************/ 433e4b8fdcSSoby Mathew arm_config_t arm_config; 443e4b8fdcSSoby Mathew 453e4b8fdcSSoby Mathew #define MAP_DEVICE0 MAP_REGION_FLAT(DEVICE0_BASE, \ 463e4b8fdcSSoby Mathew DEVICE0_SIZE, \ 473e4b8fdcSSoby Mathew MT_DEVICE | MT_RW | MT_SECURE) 483e4b8fdcSSoby Mathew 493e4b8fdcSSoby Mathew #define MAP_DEVICE1 MAP_REGION_FLAT(DEVICE1_BASE, \ 503e4b8fdcSSoby Mathew DEVICE1_SIZE, \ 513e4b8fdcSSoby Mathew MT_DEVICE | MT_RW | MT_SECURE) 523e4b8fdcSSoby Mathew 53f98630fbSManish V Badarkhe #if FVP_GICR_REGION_PROTECTION 54f98630fbSManish V Badarkhe #define MAP_GICD_MEM MAP_REGION_FLAT(BASE_GICD_BASE, \ 55f98630fbSManish V Badarkhe BASE_GICD_SIZE, \ 56f98630fbSManish V Badarkhe MT_DEVICE | MT_RW | MT_SECURE) 57f98630fbSManish V Badarkhe 58f98630fbSManish V Badarkhe /* Map all core's redistributor memory as read-only. After boots up, 59f98630fbSManish V Badarkhe * per-core map its redistributor memory as read-write */ 60f98630fbSManish V Badarkhe #define MAP_GICR_MEM MAP_REGION_FLAT(BASE_GICR_BASE, \ 61f98630fbSManish V Badarkhe (BASE_GICR_SIZE * PLATFORM_CORE_COUNT),\ 62f98630fbSManish V Badarkhe MT_DEVICE | MT_RO | MT_SECURE) 63f98630fbSManish V Badarkhe #endif /* FVP_GICR_REGION_PROTECTION */ 64f98630fbSManish V Badarkhe 65284c3d67SSandrine Bailleux /* 66284c3d67SSandrine Bailleux * Need to be mapped with write permissions in order to set a new non-volatile 67284c3d67SSandrine Bailleux * counter value. 68284c3d67SSandrine Bailleux */ 693e4b8fdcSSoby Mathew #define MAP_DEVICE2 MAP_REGION_FLAT(DEVICE2_BASE, \ 703e4b8fdcSSoby Mathew DEVICE2_SIZE, \ 71fe7de035SAntonio Nino Diaz MT_DEVICE | MT_RW | MT_SECURE) 723e4b8fdcSSoby Mathew 7394c90ac8SHarrison Mutai #if TRANSFER_LIST 7494c90ac8SHarrison Mutai #ifdef FW_NS_HANDOFF_BASE 7594c90ac8SHarrison Mutai #define MAP_FW_NS_HANDOFF MAP_REGION_FLAT(FW_NS_HANDOFF_BASE, \ 7694c90ac8SHarrison Mutai FW_HANDOFF_SIZE, \ 7794c90ac8SHarrison Mutai MT_MEMORY | MT_RW | MT_NS) 7894c90ac8SHarrison Mutai #endif 7994c90ac8SHarrison Mutai #endif 8094c90ac8SHarrison Mutai 813e4b8fdcSSoby Mathew /* 82b5fa6563SSandrine Bailleux * Table of memory regions for various BL stages to map using the MMU. 830916c38dSRoberto Vargas * This doesn't include Trusted SRAM as setup_page_tables() already takes care 840916c38dSRoberto Vargas * of mapping it. 853e4b8fdcSSoby Mathew */ 863d8256b2SMasahiro Yamada #ifdef IMAGE_BL1 873e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 883e4b8fdcSSoby Mathew ARM_MAP_SHARED_RAM, 8979d8be3cSManish V Badarkhe V2M_MAP_FLASH0_RO, 903e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 913e4b8fdcSSoby Mathew MAP_DEVICE0, 92e0cea783SManish V Badarkhe #if FVP_INTERCONNECT_DRIVER == FVP_CCN 933e4b8fdcSSoby Mathew MAP_DEVICE1, 94e0cea783SManish V Badarkhe #endif 953e4b8fdcSSoby Mathew #if TRUSTED_BOARD_BOOT 96284c3d67SSandrine Bailleux /* To access the Root of Trust Public Key registers. */ 97284c3d67SSandrine Bailleux MAP_DEVICE2, 98284c3d67SSandrine Bailleux /* Map DRAM to authenticate NS_BL2U image. */ 993e4b8fdcSSoby Mathew ARM_MAP_NS_DRAM1, 1003e4b8fdcSSoby Mathew #endif 1013e4b8fdcSSoby Mathew {0} 1023e4b8fdcSSoby Mathew }; 1033e4b8fdcSSoby Mathew #endif 1043d8256b2SMasahiro Yamada #ifdef IMAGE_BL2 1053e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 1063e4b8fdcSSoby Mathew ARM_MAP_SHARED_RAM, 1073e4b8fdcSSoby Mathew V2M_MAP_FLASH0_RW, 1083e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 1093e4b8fdcSSoby Mathew MAP_DEVICE0, 110e0cea783SManish V Badarkhe #if FVP_INTERCONNECT_DRIVER == FVP_CCN 1113e4b8fdcSSoby Mathew MAP_DEVICE1, 112e0cea783SManish V Badarkhe #endif 1133e4b8fdcSSoby Mathew ARM_MAP_NS_DRAM1, 114402b3cf8SJulius Werner #ifdef __aarch64__ 115b09ba056SRoberto Vargas ARM_MAP_DRAM2, 116b09ba056SRoberto Vargas #endif 11739f0b86aSManish V Badarkhe /* 11839f0b86aSManish V Badarkhe * Required to load HW_CONFIG, SPMC and SPs to trusted DRAM. 11939f0b86aSManish V Badarkhe */ 12064758c97SAchin Gupta ARM_MAP_TRUSTED_DRAM, 1216b2e961fSManish V Badarkhe 1226b2e961fSManish V Badarkhe /* 1236b2e961fSManish V Badarkhe * Required to load Event Log in TZC secured memory 1246b2e961fSManish V Badarkhe */ 1256b2e961fSManish V Badarkhe #if MEASURED_BOOT && (defined(SPD_tspd) || defined(SPD_opteed) || \ 1266b2e961fSManish V Badarkhe defined(SPD_spmd)) 1276b2e961fSManish V Badarkhe ARM_MAP_EVENT_LOG_DRAM1, 1286b2e961fSManish V Badarkhe #endif /* MEASURED_BOOT && (SPD_tspd || SPD_opteed || SPD_spmd) */ 1296b2e961fSManish V Badarkhe 130c8720729SZelalem Aweke #if ENABLE_RME 131c8720729SZelalem Aweke ARM_MAP_RMM_DRAM, 132c8720729SZelalem Aweke ARM_MAP_GPT_L1_DRAM, 133c8720729SZelalem Aweke #endif /* ENABLE_RME */ 1343eb2d672SSandrine Bailleux #ifdef SPD_tspd 1353e4b8fdcSSoby Mathew ARM_MAP_TSP_SEC_MEM, 1363eb2d672SSandrine Bailleux #endif 137284c3d67SSandrine Bailleux #if TRUSTED_BOARD_BOOT 138284c3d67SSandrine Bailleux /* To access the Root of Trust Public Key registers. */ 139284c3d67SSandrine Bailleux MAP_DEVICE2, 140ba597da7SJohn Tsichritzis #endif /* TRUSTED_BOARD_BOOT */ 14188c51c3fSManish V Badarkhe 14242d4d3baSArvind Ram Prakash #if CRYPTO_SUPPORT && !RESET_TO_BL2 14388c51c3fSManish V Badarkhe /* 14488c51c3fSManish V Badarkhe * To access shared the Mbed TLS heap while booting the 14588c51c3fSManish V Badarkhe * system with Crypto support 14688c51c3fSManish V Badarkhe */ 14788c51c3fSManish V Badarkhe ARM_MAP_BL1_RW, 14842d4d3baSArvind Ram Prakash #endif /* CRYPTO_SUPPORT && !RESET_TO_BL2 */ 14944639ab7SMarc Bonnici #if SPM_MM || SPMC_AT_EL3 150e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_MMAP, 151e29efeb1SAntonio Nino Diaz #endif 1523e4b8fdcSSoby Mathew #if ARM_BL31_IN_DRAM 1533e4b8fdcSSoby Mathew ARM_MAP_BL31_SEC_DRAM, 1543e4b8fdcSSoby Mathew #endif 155810d9213SJens Wiklander #ifdef SPD_opteed 156b3ba6fdaSSoby Mathew ARM_MAP_OPTEE_CORE_MEM, 157810d9213SJens Wiklander ARM_OPTEE_PAGEABLE_LOAD_MEM, 158810d9213SJens Wiklander #endif 1593e4b8fdcSSoby Mathew {0} 1603e4b8fdcSSoby Mathew }; 1613e4b8fdcSSoby Mathew #endif 1623d8256b2SMasahiro Yamada #ifdef IMAGE_BL2U 1633e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 1643e4b8fdcSSoby Mathew MAP_DEVICE0, 1653e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 1663e4b8fdcSSoby Mathew {0} 1673e4b8fdcSSoby Mathew }; 1683e4b8fdcSSoby Mathew #endif 1693d8256b2SMasahiro Yamada #ifdef IMAGE_BL31 1703e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 1713e4b8fdcSSoby Mathew ARM_MAP_SHARED_RAM, 172992f091bSAmbroise Vincent #if USE_DEBUGFS 173992f091bSAmbroise Vincent /* Required by devfip, can be removed if devfip is not used */ 174992f091bSAmbroise Vincent V2M_MAP_FLASH0_RW, 175992f091bSAmbroise Vincent #endif /* USE_DEBUGFS */ 176e35a3fb5SSoby Mathew ARM_MAP_EL3_TZC_DRAM, 1773e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 1783e4b8fdcSSoby Mathew MAP_DEVICE0, 179f98630fbSManish V Badarkhe #if FVP_GICR_REGION_PROTECTION 180f98630fbSManish V Badarkhe MAP_GICD_MEM, 181f98630fbSManish V Badarkhe MAP_GICR_MEM, 182f98630fbSManish V Badarkhe #else 1833e4b8fdcSSoby Mathew MAP_DEVICE1, 184f98630fbSManish V Badarkhe #endif /* FVP_GICR_REGION_PROTECTION */ 185f145403cSRoberto Vargas ARM_V2M_MAP_MEM_PROTECT, 1863f3c341aSPaul Beesley #if SPM_MM 187e29efeb1SAntonio Nino Diaz ARM_SPM_BUF_EL3_MMAP, 188e29efeb1SAntonio Nino Diaz #endif 189c8720729SZelalem Aweke #if ENABLE_RME 190c8720729SZelalem Aweke ARM_MAP_GPT_L1_DRAM, 1918c980a4aSJavier Almansa Sobrino ARM_MAP_EL3_RMM_SHARED_MEM, 192c8720729SZelalem Aweke #endif 19394c90ac8SHarrison Mutai #ifdef MAP_FW_NS_HANDOFF 19494c90ac8SHarrison Mutai MAP_FW_NS_HANDOFF, 19594c90ac8SHarrison Mutai #endif 1963e4b8fdcSSoby Mathew {0} 1973e4b8fdcSSoby Mathew }; 198e29efeb1SAntonio Nino Diaz 1993f3c341aSPaul Beesley #if defined(IMAGE_BL31) && SPM_MM 200e29efeb1SAntonio Nino Diaz const mmap_region_t plat_arm_secure_partition_mmap[] = { 201e29efeb1SAntonio Nino Diaz V2M_MAP_IOFPGA_EL0, /* for the UART */ 2029a90d720SElyes Haouas MAP_REGION_FLAT(DEVICE0_BASE, 2039a90d720SElyes Haouas DEVICE0_SIZE, 204c4fa1739SSandrine Bailleux MT_DEVICE | MT_RO | MT_SECURE | MT_USER), 205e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_MMAP, 206e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_NS_BUF_MMAP, 207e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_RW_MMAP, 208e29efeb1SAntonio Nino Diaz ARM_SPM_BUF_EL0_MMAP, 209e29efeb1SAntonio Nino Diaz {0} 210e29efeb1SAntonio Nino Diaz }; 211e29efeb1SAntonio Nino Diaz #endif 2123e4b8fdcSSoby Mathew #endif 2133d8256b2SMasahiro Yamada #ifdef IMAGE_BL32 2143e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 215402b3cf8SJulius Werner #ifndef __aarch64__ 216877cf3ffSSoby Mathew ARM_MAP_SHARED_RAM, 217950c6956SJoel Hutton ARM_V2M_MAP_MEM_PROTECT, 218877cf3ffSSoby Mathew #endif 2193e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 2203e4b8fdcSSoby Mathew MAP_DEVICE0, 2213e4b8fdcSSoby Mathew MAP_DEVICE1, 2223e4b8fdcSSoby Mathew {0} 2233e4b8fdcSSoby Mathew }; 2243e4b8fdcSSoby Mathew #endif 2253e4b8fdcSSoby Mathew 2269d870b79SZelalem Aweke #ifdef IMAGE_RMM 2279d870b79SZelalem Aweke const mmap_region_t plat_arm_mmap[] = { 2289d870b79SZelalem Aweke V2M_MAP_IOFPGA, 2299d870b79SZelalem Aweke MAP_DEVICE0, 2309d870b79SZelalem Aweke MAP_DEVICE1, 2319d870b79SZelalem Aweke {0} 2329d870b79SZelalem Aweke }; 2339d870b79SZelalem Aweke #endif 2349d870b79SZelalem Aweke 2353e4b8fdcSSoby Mathew ARM_CASSERT_MMAP 2363e4b8fdcSSoby Mathew 237955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER != FVP_CCN 238955242d8SJeenu Viswambharan static const int fvp_cci400_map[] = { 239955242d8SJeenu Viswambharan PLAT_FVP_CCI400_CLUS0_SL_PORT, 240955242d8SJeenu Viswambharan PLAT_FVP_CCI400_CLUS1_SL_PORT, 241955242d8SJeenu Viswambharan }; 242955242d8SJeenu Viswambharan 243955242d8SJeenu Viswambharan static const int fvp_cci5xx_map[] = { 244955242d8SJeenu Viswambharan PLAT_FVP_CCI5XX_CLUS0_SL_PORT, 245955242d8SJeenu Viswambharan PLAT_FVP_CCI5XX_CLUS1_SL_PORT, 246955242d8SJeenu Viswambharan }; 247955242d8SJeenu Viswambharan 248955242d8SJeenu Viswambharan static unsigned int get_interconnect_master(void) 249955242d8SJeenu Viswambharan { 250955242d8SJeenu Viswambharan unsigned int master; 251955242d8SJeenu Viswambharan u_register_t mpidr; 252955242d8SJeenu Viswambharan 253955242d8SJeenu Viswambharan mpidr = read_mpidr_el1(); 254583e0791SAntonio Nino Diaz master = ((arm_config.flags & ARM_CONFIG_FVP_SHIFTED_AFF) != 0U) ? 255955242d8SJeenu Viswambharan MPIDR_AFFLVL2_VAL(mpidr) : MPIDR_AFFLVL1_VAL(mpidr); 256955242d8SJeenu Viswambharan 257955242d8SJeenu Viswambharan assert(master < FVP_CLUSTER_COUNT); 258955242d8SJeenu Viswambharan return master; 259955242d8SJeenu Viswambharan } 260955242d8SJeenu Viswambharan #endif 2613e4b8fdcSSoby Mathew 2623f3c341aSPaul Beesley #if defined(IMAGE_BL31) && SPM_MM 263e29efeb1SAntonio Nino Diaz /* 264e29efeb1SAntonio Nino Diaz * Boot information passed to a secure partition during initialisation. Linear 265e29efeb1SAntonio Nino Diaz * indices in MP information will be filled at runtime. 266e29efeb1SAntonio Nino Diaz */ 267aeaa225cSPaul Beesley static spm_mm_mp_info_t sp_mp_info[] = { 268e29efeb1SAntonio Nino Diaz [0] = {0x80000000, 0}, 269e29efeb1SAntonio Nino Diaz [1] = {0x80000001, 0}, 270e29efeb1SAntonio Nino Diaz [2] = {0x80000002, 0}, 271e29efeb1SAntonio Nino Diaz [3] = {0x80000003, 0}, 272e29efeb1SAntonio Nino Diaz [4] = {0x80000100, 0}, 273e29efeb1SAntonio Nino Diaz [5] = {0x80000101, 0}, 274e29efeb1SAntonio Nino Diaz [6] = {0x80000102, 0}, 275e29efeb1SAntonio Nino Diaz [7] = {0x80000103, 0}, 276e29efeb1SAntonio Nino Diaz }; 277e29efeb1SAntonio Nino Diaz 278aeaa225cSPaul Beesley const spm_mm_boot_info_t plat_arm_secure_partition_boot_info = { 279e29efeb1SAntonio Nino Diaz .h.type = PARAM_SP_IMAGE_BOOT_INFO, 280e29efeb1SAntonio Nino Diaz .h.version = VERSION_1, 281aeaa225cSPaul Beesley .h.size = sizeof(spm_mm_boot_info_t), 282e29efeb1SAntonio Nino Diaz .h.attr = 0, 283e29efeb1SAntonio Nino Diaz .sp_mem_base = ARM_SP_IMAGE_BASE, 284e29efeb1SAntonio Nino Diaz .sp_mem_limit = ARM_SP_IMAGE_LIMIT, 285e29efeb1SAntonio Nino Diaz .sp_image_base = ARM_SP_IMAGE_BASE, 286e29efeb1SAntonio Nino Diaz .sp_stack_base = PLAT_SP_IMAGE_STACK_BASE, 287e29efeb1SAntonio Nino Diaz .sp_heap_base = ARM_SP_IMAGE_HEAP_BASE, 2880560efb9SArd Biesheuvel .sp_ns_comm_buf_base = PLAT_SP_IMAGE_NS_BUF_BASE, 289e29efeb1SAntonio Nino Diaz .sp_shared_buf_base = PLAT_SPM_BUF_BASE, 290e29efeb1SAntonio Nino Diaz .sp_image_size = ARM_SP_IMAGE_SIZE, 291e29efeb1SAntonio Nino Diaz .sp_pcpu_stack_size = PLAT_SP_IMAGE_STACK_PCPU_SIZE, 292e29efeb1SAntonio Nino Diaz .sp_heap_size = ARM_SP_IMAGE_HEAP_SIZE, 2930560efb9SArd Biesheuvel .sp_ns_comm_buf_size = PLAT_SP_IMAGE_NS_BUF_SIZE, 294e29efeb1SAntonio Nino Diaz .sp_shared_buf_size = PLAT_SPM_BUF_SIZE, 295e29efeb1SAntonio Nino Diaz .num_sp_mem_regions = ARM_SP_IMAGE_NUM_MEM_REGIONS, 296e29efeb1SAntonio Nino Diaz .num_cpus = PLATFORM_CORE_COUNT, 297e29efeb1SAntonio Nino Diaz .mp_info = &sp_mp_info[0], 298e29efeb1SAntonio Nino Diaz }; 299e29efeb1SAntonio Nino Diaz 300e29efeb1SAntonio Nino Diaz const struct mmap_region *plat_get_secure_partition_mmap(void *cookie) 301e29efeb1SAntonio Nino Diaz { 302e29efeb1SAntonio Nino Diaz return plat_arm_secure_partition_mmap; 303e29efeb1SAntonio Nino Diaz } 304e29efeb1SAntonio Nino Diaz 305aeaa225cSPaul Beesley const struct spm_mm_boot_info *plat_get_secure_partition_boot_info( 306e29efeb1SAntonio Nino Diaz void *cookie) 307e29efeb1SAntonio Nino Diaz { 308e29efeb1SAntonio Nino Diaz return &plat_arm_secure_partition_boot_info; 309e29efeb1SAntonio Nino Diaz } 310e29efeb1SAntonio Nino Diaz #endif 311e29efeb1SAntonio Nino Diaz 3123e4b8fdcSSoby Mathew /******************************************************************************* 3133e4b8fdcSSoby Mathew * A single boot loader stack is expected to work on both the Foundation FVP 3143e4b8fdcSSoby Mathew * models and the two flavours of the Base FVP models (AEMv8 & Cortex). The 3153e4b8fdcSSoby Mathew * SYS_ID register provides a mechanism for detecting the differences between 3163e4b8fdcSSoby Mathew * these platforms. This information is stored in a per-BL array to allow the 3173e4b8fdcSSoby Mathew * code to take the correct path.Per BL platform configuration. 3183e4b8fdcSSoby Mathew ******************************************************************************/ 3194d010d0dSDaniel Boulby void __init fvp_config_setup(void) 3203e4b8fdcSSoby Mathew { 3213e4b8fdcSSoby Mathew unsigned int rev, hbi, bld, arch, sys_id; 3223e4b8fdcSSoby Mathew 3233e4b8fdcSSoby Mathew sys_id = mmio_read_32(V2M_SYSREGS_BASE + V2M_SYS_ID); 3243e4b8fdcSSoby Mathew rev = (sys_id >> V2M_SYS_ID_REV_SHIFT) & V2M_SYS_ID_REV_MASK; 3253e4b8fdcSSoby Mathew hbi = (sys_id >> V2M_SYS_ID_HBI_SHIFT) & V2M_SYS_ID_HBI_MASK; 3263e4b8fdcSSoby Mathew bld = (sys_id >> V2M_SYS_ID_BLD_SHIFT) & V2M_SYS_ID_BLD_MASK; 3273e4b8fdcSSoby Mathew arch = (sys_id >> V2M_SYS_ID_ARCH_SHIFT) & V2M_SYS_ID_ARCH_MASK; 3283e4b8fdcSSoby Mathew 3293e4b8fdcSSoby Mathew if (arch != ARCH_MODEL) { 3303e4b8fdcSSoby Mathew ERROR("This firmware is for FVP models\n"); 3313e4b8fdcSSoby Mathew panic(); 3323e4b8fdcSSoby Mathew } 3333e4b8fdcSSoby Mathew 3343e4b8fdcSSoby Mathew /* 3353e4b8fdcSSoby Mathew * The build field in the SYS_ID tells which variant of the GIC 3363e4b8fdcSSoby Mathew * memory is implemented by the model. 3373e4b8fdcSSoby Mathew */ 3383e4b8fdcSSoby Mathew switch (bld) { 3393e4b8fdcSSoby Mathew case BLD_GIC_VE_MMAP: 34021a3973dSSoby Mathew ERROR("Legacy Versatile Express memory map for GIC peripheral" 34121a3973dSSoby Mathew " is not supported\n"); 3423e4b8fdcSSoby Mathew panic(); 3433e4b8fdcSSoby Mathew break; 3443e4b8fdcSSoby Mathew case BLD_GIC_A53A57_MMAP: 3453e4b8fdcSSoby Mathew break; 3463e4b8fdcSSoby Mathew default: 3473e4b8fdcSSoby Mathew ERROR("Unsupported board build %x\n", bld); 3483e4b8fdcSSoby Mathew panic(); 3493e4b8fdcSSoby Mathew } 3503e4b8fdcSSoby Mathew 3513e4b8fdcSSoby Mathew /* 3523e4b8fdcSSoby Mathew * The hbi field in the SYS_ID is 0x020 for the Base FVP & 0x010 3533e4b8fdcSSoby Mathew * for the Foundation FVP. 3543e4b8fdcSSoby Mathew */ 3553e4b8fdcSSoby Mathew switch (hbi) { 3563e4b8fdcSSoby Mathew case HBI_FOUNDATION_FVP: 3573e4b8fdcSSoby Mathew arm_config.flags = 0; 3583e4b8fdcSSoby Mathew 3593e4b8fdcSSoby Mathew /* 3603e4b8fdcSSoby Mathew * Check for supported revisions of Foundation FVP 3613e4b8fdcSSoby Mathew * Allow future revisions to run but emit warning diagnostic 3623e4b8fdcSSoby Mathew */ 3633e4b8fdcSSoby Mathew switch (rev) { 3643e4b8fdcSSoby Mathew case REV_FOUNDATION_FVP_V2_0: 3653e4b8fdcSSoby Mathew case REV_FOUNDATION_FVP_V2_1: 3663e4b8fdcSSoby Mathew case REV_FOUNDATION_FVP_v9_1: 3674faa4a1dSSandrine Bailleux case REV_FOUNDATION_FVP_v9_6: 3683e4b8fdcSSoby Mathew break; 3693e4b8fdcSSoby Mathew default: 3703e4b8fdcSSoby Mathew WARN("Unrecognized Foundation FVP revision %x\n", rev); 3713e4b8fdcSSoby Mathew break; 3723e4b8fdcSSoby Mathew } 3733e4b8fdcSSoby Mathew break; 3743e4b8fdcSSoby Mathew case HBI_BASE_FVP: 375955242d8SJeenu Viswambharan arm_config.flags |= (ARM_CONFIG_BASE_MMAP | ARM_CONFIG_HAS_TZC); 3763e4b8fdcSSoby Mathew 3773e4b8fdcSSoby Mathew /* 3783e4b8fdcSSoby Mathew * Check for supported revisions 3793e4b8fdcSSoby Mathew * Allow future revisions to run but emit warning diagnostic 3803e4b8fdcSSoby Mathew */ 3813e4b8fdcSSoby Mathew switch (rev) { 3823e4b8fdcSSoby Mathew case REV_BASE_FVP_V0: 383955242d8SJeenu Viswambharan arm_config.flags |= ARM_CONFIG_FVP_HAS_CCI400; 384955242d8SJeenu Viswambharan break; 385955242d8SJeenu Viswambharan case REV_BASE_FVP_REVC: 3868431635bSIsla Mitchell arm_config.flags |= (ARM_CONFIG_FVP_HAS_SMMUV3 | 387955242d8SJeenu Viswambharan ARM_CONFIG_FVP_HAS_CCI5XX); 3883e4b8fdcSSoby Mathew break; 3893e4b8fdcSSoby Mathew default: 3903e4b8fdcSSoby Mathew WARN("Unrecognized Base FVP revision %x\n", rev); 3913e4b8fdcSSoby Mathew break; 3923e4b8fdcSSoby Mathew } 3933e4b8fdcSSoby Mathew break; 3943e4b8fdcSSoby Mathew default: 3953e4b8fdcSSoby Mathew ERROR("Unsupported board HBI number 0x%x\n", hbi); 3963e4b8fdcSSoby Mathew panic(); 3973e4b8fdcSSoby Mathew } 3988431635bSIsla Mitchell 3998431635bSIsla Mitchell /* 4008431635bSIsla Mitchell * We assume that the presence of MT bit, and therefore shifted 4018431635bSIsla Mitchell * affinities, is uniform across the platform: either all CPUs, or no 4028431635bSIsla Mitchell * CPUs implement it. 4038431635bSIsla Mitchell */ 404583e0791SAntonio Nino Diaz if ((read_mpidr_el1() & MPIDR_MT_MASK) != 0U) 4058431635bSIsla Mitchell arm_config.flags |= ARM_CONFIG_FVP_SHIFTED_AFF; 4063e4b8fdcSSoby Mathew } 4073e4b8fdcSSoby Mathew 4083e4b8fdcSSoby Mathew 4094d010d0dSDaniel Boulby void __init fvp_interconnect_init(void) 4103e4b8fdcSSoby Mathew { 41171237876SSoby Mathew #if FVP_INTERCONNECT_DRIVER == FVP_CCN 41271237876SSoby Mathew if (ccn_get_part0_id(PLAT_ARM_CCN_BASE) != CCN_502_PART0_ID) { 413583e0791SAntonio Nino Diaz ERROR("Unrecognized CCN variant detected. Only CCN-502 is supported"); 41471237876SSoby Mathew panic(); 41571237876SSoby Mathew } 416955242d8SJeenu Viswambharan 4173e4b8fdcSSoby Mathew plat_arm_interconnect_init(); 418955242d8SJeenu Viswambharan #else 419583e0791SAntonio Nino Diaz uintptr_t cci_base = 0U; 420583e0791SAntonio Nino Diaz const int *cci_map = NULL; 421583e0791SAntonio Nino Diaz unsigned int map_size = 0U; 422955242d8SJeenu Viswambharan 423955242d8SJeenu Viswambharan /* Initialize the right interconnect */ 424583e0791SAntonio Nino Diaz if ((arm_config.flags & ARM_CONFIG_FVP_HAS_CCI5XX) != 0U) { 425955242d8SJeenu Viswambharan cci_base = PLAT_FVP_CCI5XX_BASE; 426955242d8SJeenu Viswambharan cci_map = fvp_cci5xx_map; 427955242d8SJeenu Viswambharan map_size = ARRAY_SIZE(fvp_cci5xx_map); 428583e0791SAntonio Nino Diaz } else if ((arm_config.flags & ARM_CONFIG_FVP_HAS_CCI400) != 0U) { 429955242d8SJeenu Viswambharan cci_base = PLAT_FVP_CCI400_BASE; 430955242d8SJeenu Viswambharan cci_map = fvp_cci400_map; 431955242d8SJeenu Viswambharan map_size = ARRAY_SIZE(fvp_cci400_map); 432583e0791SAntonio Nino Diaz } else { 433583e0791SAntonio Nino Diaz return; 434955242d8SJeenu Viswambharan } 435955242d8SJeenu Viswambharan 436583e0791SAntonio Nino Diaz assert(cci_base != 0U); 437583e0791SAntonio Nino Diaz assert(cci_map != NULL); 438955242d8SJeenu Viswambharan cci_init(cci_base, cci_map, map_size); 439955242d8SJeenu Viswambharan #endif 44071237876SSoby Mathew } 4413e4b8fdcSSoby Mathew 4423e4b8fdcSSoby Mathew void fvp_interconnect_enable(void) 4433e4b8fdcSSoby Mathew { 444955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER == FVP_CCN 4453e4b8fdcSSoby Mathew plat_arm_interconnect_enter_coherency(); 446955242d8SJeenu Viswambharan #else 447955242d8SJeenu Viswambharan unsigned int master; 448955242d8SJeenu Viswambharan 449583e0791SAntonio Nino Diaz if ((arm_config.flags & (ARM_CONFIG_FVP_HAS_CCI400 | 450583e0791SAntonio Nino Diaz ARM_CONFIG_FVP_HAS_CCI5XX)) != 0U) { 451955242d8SJeenu Viswambharan master = get_interconnect_master(); 452955242d8SJeenu Viswambharan cci_enable_snoop_dvm_reqs(master); 453955242d8SJeenu Viswambharan } 454955242d8SJeenu Viswambharan #endif 4553e4b8fdcSSoby Mathew } 4563e4b8fdcSSoby Mathew 4573e4b8fdcSSoby Mathew void fvp_interconnect_disable(void) 4583e4b8fdcSSoby Mathew { 459955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER == FVP_CCN 4603e4b8fdcSSoby Mathew plat_arm_interconnect_exit_coherency(); 461955242d8SJeenu Viswambharan #else 462955242d8SJeenu Viswambharan unsigned int master; 463955242d8SJeenu Viswambharan 464583e0791SAntonio Nino Diaz if ((arm_config.flags & (ARM_CONFIG_FVP_HAS_CCI400 | 465583e0791SAntonio Nino Diaz ARM_CONFIG_FVP_HAS_CCI5XX)) != 0U) { 466955242d8SJeenu Viswambharan master = get_interconnect_master(); 467955242d8SJeenu Viswambharan cci_disable_snoop_dvm_reqs(master); 468955242d8SJeenu Viswambharan } 469955242d8SJeenu Viswambharan #endif 4703e4b8fdcSSoby Mathew } 471ba597da7SJohn Tsichritzis 47288c51c3fSManish V Badarkhe #if CRYPTO_SUPPORT 473ba597da7SJohn Tsichritzis int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size) 474ba597da7SJohn Tsichritzis { 475ba597da7SJohn Tsichritzis assert(heap_addr != NULL); 476ba597da7SJohn Tsichritzis assert(heap_size != NULL); 477ba597da7SJohn Tsichritzis 478ba597da7SJohn Tsichritzis return arm_get_mbedtls_heap(heap_addr, heap_size); 479ba597da7SJohn Tsichritzis } 48088c51c3fSManish V Badarkhe #endif /* CRYPTO_SUPPORT */ 4811b597c22SAlexei Fedorov 4821b597c22SAlexei Fedorov void fvp_timer_init(void) 4831b597c22SAlexei Fedorov { 484fddfb3baSMadhukar Pappireddy #if USE_SP804_TIMER 4851b597c22SAlexei Fedorov /* Enable the clock override for SP804 timer 0, which means that no 4861b597c22SAlexei Fedorov * clock dividers are applied and the raw (35MHz) clock will be used. 4871b597c22SAlexei Fedorov */ 4881b597c22SAlexei Fedorov mmio_write_32(V2M_SP810_BASE, FVP_SP810_CTRL_TIM0_OV); 4891b597c22SAlexei Fedorov 4901b597c22SAlexei Fedorov /* Initialize delay timer driver using SP804 dual timer 0 */ 4911b597c22SAlexei Fedorov sp804_timer_init(V2M_SP804_TIMER0_BASE, 4921b597c22SAlexei Fedorov SP804_TIMER_CLKMULT, SP804_TIMER_CLKDIV); 4931b597c22SAlexei Fedorov #else 4941b597c22SAlexei Fedorov generic_delay_timer_init(); 4951b597c22SAlexei Fedorov 4961b597c22SAlexei Fedorov /* Enable System level generic timer */ 4971b597c22SAlexei Fedorov mmio_write_32(ARM_SYS_CNTCTL_BASE + CNTCR_OFF, 4981b597c22SAlexei Fedorov CNTCR_FCREQ(0U) | CNTCR_EN); 499fddfb3baSMadhukar Pappireddy #endif /* USE_SP804_TIMER */ 5001b597c22SAlexei Fedorov } 501ed9653ffSManish V Badarkhe 502ed9653ffSManish V Badarkhe /***************************************************************************** 503ed9653ffSManish V Badarkhe * plat_is_smccc_feature_available() - This function checks whether SMCCC 504ed9653ffSManish V Badarkhe * feature is availabile for platform. 505ed9653ffSManish V Badarkhe * @fid: SMCCC function id 506ed9653ffSManish V Badarkhe * 507ed9653ffSManish V Badarkhe * Return SMC_ARCH_CALL_SUCCESS if SMCCC feature is available and 508ed9653ffSManish V Badarkhe * SMC_ARCH_CALL_NOT_SUPPORTED otherwise. 509ed9653ffSManish V Badarkhe *****************************************************************************/ 510ed9653ffSManish V Badarkhe int32_t plat_is_smccc_feature_available(u_register_t fid) 511ed9653ffSManish V Badarkhe { 512ed9653ffSManish V Badarkhe switch (fid) { 513ed9653ffSManish V Badarkhe case SMCCC_ARCH_SOC_ID: 514ed9653ffSManish V Badarkhe return SMC_ARCH_CALL_SUCCESS; 515ed9653ffSManish V Badarkhe default: 516ed9653ffSManish V Badarkhe return SMC_ARCH_CALL_NOT_SUPPORTED; 517ed9653ffSManish V Badarkhe } 518ed9653ffSManish V Badarkhe } 519ed9653ffSManish V Badarkhe 520ed9653ffSManish V Badarkhe /* Get SOC version */ 521ed9653ffSManish V Badarkhe int32_t plat_get_soc_version(void) 522ed9653ffSManish V Badarkhe { 523ed9653ffSManish V Badarkhe return (int32_t) 524dfff4686SYann Gautier (SOC_ID_SET_JEP_106(ARM_SOC_CONTINUATION_CODE, 525dfff4686SYann Gautier ARM_SOC_IDENTIFICATION_CODE) | 526dfff4686SYann Gautier (FVP_SOC_ID & SOC_ID_IMPL_DEF_MASK)); 527ed9653ffSManish V Badarkhe } 528ed9653ffSManish V Badarkhe 529ed9653ffSManish V Badarkhe /* Get SOC revision */ 530ed9653ffSManish V Badarkhe int32_t plat_get_soc_revision(void) 531ed9653ffSManish V Badarkhe { 532ed9653ffSManish V Badarkhe unsigned int sys_id; 533ed9653ffSManish V Badarkhe 534ed9653ffSManish V Badarkhe sys_id = mmio_read_32(V2M_SYSREGS_BASE + V2M_SYS_ID); 535dfff4686SYann Gautier return (int32_t)(((sys_id >> V2M_SYS_ID_REV_SHIFT) & 536dfff4686SYann Gautier V2M_SYS_ID_REV_MASK) & SOC_ID_REV_MASK); 537ed9653ffSManish V Badarkhe } 5388c980a4aSJavier Almansa Sobrino 5398c980a4aSJavier Almansa Sobrino #if ENABLE_RME 5408c980a4aSJavier Almansa Sobrino /* 5418c980a4aSJavier Almansa Sobrino * Get a pointer to the RMM-EL3 Shared buffer and return it 5428c980a4aSJavier Almansa Sobrino * through the pointer passed as parameter. 5438c980a4aSJavier Almansa Sobrino * 5448c980a4aSJavier Almansa Sobrino * This function returns the size of the shared buffer. 5458c980a4aSJavier Almansa Sobrino */ 5468c980a4aSJavier Almansa Sobrino size_t plat_rmmd_get_el3_rmm_shared_mem(uintptr_t *shared) 5478c980a4aSJavier Almansa Sobrino { 5488c980a4aSJavier Almansa Sobrino *shared = (uintptr_t)RMM_SHARED_BASE; 5498c980a4aSJavier Almansa Sobrino 5508c980a4aSJavier Almansa Sobrino return (size_t)RMM_SHARED_SIZE; 5518c980a4aSJavier Almansa Sobrino } 5521d0ca40eSJavier Almansa Sobrino 553a97bfa5fSAlexeiFedorov int plat_rmmd_load_manifest(struct rmm_manifest *manifest) 5541d0ca40eSJavier Almansa Sobrino { 55582685904SAlexeiFedorov uint64_t checksum, num_banks; 55682685904SAlexeiFedorov struct ns_dram_bank *bank_ptr; 557a97bfa5fSAlexeiFedorov 5581d0ca40eSJavier Almansa Sobrino assert(manifest != NULL); 5591d0ca40eSJavier Almansa Sobrino 56082685904SAlexeiFedorov /* Get number of DRAM banks */ 56182685904SAlexeiFedorov num_banks = FCONF_GET_PROPERTY(hw_config, dram_layout, num_banks); 56282685904SAlexeiFedorov assert(num_banks <= ARM_DRAM_NUM_BANKS); 56382685904SAlexeiFedorov 5641d0ca40eSJavier Almansa Sobrino manifest->version = RMMD_MANIFEST_VERSION; 565dc0ca64eSJavier Almansa Sobrino manifest->padding = 0U; /* RES0 */ 5661d0ca40eSJavier Almansa Sobrino manifest->plat_data = (uintptr_t)NULL; 56782685904SAlexeiFedorov manifest->plat_dram.num_banks = num_banks; 568a97bfa5fSAlexeiFedorov 56982685904SAlexeiFedorov /* 57082685904SAlexeiFedorov * Array ns_dram_banks[] follows ns_dram_info structure: 57182685904SAlexeiFedorov * 57282685904SAlexeiFedorov * +-----------------------------------+ 57382685904SAlexeiFedorov * | offset | field | comment | 57482685904SAlexeiFedorov * +----------+-----------+------------+ 57582685904SAlexeiFedorov * | 0 | version | 0x00000002 | 57682685904SAlexeiFedorov * +----------+-----------+------------+ 57782685904SAlexeiFedorov * | 4 | padding | 0x00000000 | 57882685904SAlexeiFedorov * +----------+-----------+------------+ 57982685904SAlexeiFedorov * | 8 | plat_data | NULL | 58082685904SAlexeiFedorov * +----------+-----------+------------+ 58182685904SAlexeiFedorov * | 16 | num_banks | | 58282685904SAlexeiFedorov * +----------+-----------+ | 58382685904SAlexeiFedorov * | 24 | banks | plat_dram | 58482685904SAlexeiFedorov * +----------+-----------+ | 58582685904SAlexeiFedorov * | 32 | checksum | | 58682685904SAlexeiFedorov * +----------+-----------+------------+ 58782685904SAlexeiFedorov * | 40 | base 0 | | 58882685904SAlexeiFedorov * +----------+-----------+ bank[0] | 58982685904SAlexeiFedorov * | 48 | size 0 | | 59082685904SAlexeiFedorov * +----------+-----------+------------+ 59182685904SAlexeiFedorov * | 56 | base 1 | | 59282685904SAlexeiFedorov * +----------+-----------+ bank[1] | 59382685904SAlexeiFedorov * | 64 | size 1 | | 59482685904SAlexeiFedorov * +----------+-----------+------------+ 59582685904SAlexeiFedorov */ 59682685904SAlexeiFedorov bank_ptr = (struct ns_dram_bank *) 59782685904SAlexeiFedorov ((uintptr_t)&manifest->plat_dram.checksum + 59882685904SAlexeiFedorov sizeof(manifest->plat_dram.checksum)); 599a97bfa5fSAlexeiFedorov 60082685904SAlexeiFedorov manifest->plat_dram.banks = bank_ptr; 601a97bfa5fSAlexeiFedorov 602a97bfa5fSAlexeiFedorov /* Calculate checksum of plat_dram structure */ 60382685904SAlexeiFedorov checksum = num_banks + (uint64_t)bank_ptr; 604a97bfa5fSAlexeiFedorov 60582685904SAlexeiFedorov /* Store FVP DRAM banks data in Boot Manifest */ 60682685904SAlexeiFedorov for (unsigned long i = 0UL; i < num_banks; i++) { 60782685904SAlexeiFedorov uintptr_t base = FCONF_GET_PROPERTY(hw_config, dram_layout, dram_bank[i].base); 60882685904SAlexeiFedorov uint64_t size = FCONF_GET_PROPERTY(hw_config, dram_layout, dram_bank[i].size); 60982685904SAlexeiFedorov 61082685904SAlexeiFedorov bank_ptr[i].base = base; 61182685904SAlexeiFedorov bank_ptr[i].size = size; 61282685904SAlexeiFedorov 61382685904SAlexeiFedorov /* Update checksum */ 61482685904SAlexeiFedorov checksum += base + size; 615a97bfa5fSAlexeiFedorov } 616a97bfa5fSAlexeiFedorov 617a97bfa5fSAlexeiFedorov /* Checksum must be 0 */ 61882685904SAlexeiFedorov manifest->plat_dram.checksum = ~checksum + 1UL; 6191d0ca40eSJavier Almansa Sobrino 6201d0ca40eSJavier Almansa Sobrino return 0; 6211d0ca40eSJavier Almansa Sobrino } 622a97bfa5fSAlexeiFedorov #endif /* ENABLE_RME */ 623