13e4b8fdcSSoby Mathew /* 282685904SAlexeiFedorov * Copyright (c) 2013-2023, Arm Limited and Contributors. All rights reserved. 33e4b8fdcSSoby Mathew * 482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause 53e4b8fdcSSoby Mathew */ 63e4b8fdcSSoby Mathew 709d40e0eSAntonio Nino Diaz #include <assert.h> 809d40e0eSAntonio Nino Diaz 909d40e0eSAntonio Nino Diaz #include <common/debug.h> 1009d40e0eSAntonio Nino Diaz #include <drivers/arm/cci.h> 1109d40e0eSAntonio Nino Diaz #include <drivers/arm/ccn.h> 1209d40e0eSAntonio Nino Diaz #include <drivers/arm/gicv2.h> 131b597c22SAlexei Fedorov #include <drivers/arm/sp804_delay_timer.h> 141b597c22SAlexei Fedorov #include <drivers/generic_delay_timer.h> 1582685904SAlexeiFedorov #include <fconf_hw_config_getter.h> 1609d40e0eSAntonio Nino Diaz #include <lib/mmio.h> 17ed9653ffSManish V Badarkhe #include <lib/smccc.h> 1809d40e0eSAntonio Nino Diaz #include <lib/xlat_tables/xlat_tables_compat.h> 19234bc7f8SAntonio Nino Diaz #include <platform_def.h> 20ed9653ffSManish V Badarkhe #include <services/arm_arch_svc.h> 211d0ca40eSJavier Almansa Sobrino #include <services/rmm_core_manifest.h> 229d9ae976SOlivier Deprez #if SPM_MM 23aeaa225cSPaul Beesley #include <services/spm_mm_partition.h> 249d9ae976SOlivier Deprez #endif 2509d40e0eSAntonio Nino Diaz 26ed9653ffSManish V Badarkhe #include <plat/arm/common/arm_config.h> 27a97bfa5fSAlexeiFedorov #include <plat/arm/common/arm_pas_def.h> 28ed9653ffSManish V Badarkhe #include <plat/arm/common/plat_arm.h> 29ed9653ffSManish V Badarkhe #include <plat/common/platform.h> 30ed9653ffSManish V Badarkhe 311af540efSRoberto Vargas #include "fvp_private.h" 323e4b8fdcSSoby Mathew 333e4b8fdcSSoby Mathew /* Defines for GIC Driver build time selection */ 343e4b8fdcSSoby Mathew #define FVP_GICV2 1 353e4b8fdcSSoby Mathew #define FVP_GICV3 2 363e4b8fdcSSoby Mathew 373e4b8fdcSSoby Mathew /******************************************************************************* 383e4b8fdcSSoby Mathew * arm_config holds the characteristics of the differences between the three FVP 393e4b8fdcSSoby Mathew * platforms (Base, A53_A57 & Foundation). It will be populated during cold boot 403e4b8fdcSSoby Mathew * at each boot stage by the primary before enabling the MMU (to allow 413e4b8fdcSSoby Mathew * interconnect configuration) & used thereafter. Each BL will have its own copy 423e4b8fdcSSoby Mathew * to allow independent operation. 433e4b8fdcSSoby Mathew ******************************************************************************/ 443e4b8fdcSSoby Mathew arm_config_t arm_config; 453e4b8fdcSSoby Mathew 463e4b8fdcSSoby Mathew #define MAP_DEVICE0 MAP_REGION_FLAT(DEVICE0_BASE, \ 473e4b8fdcSSoby Mathew DEVICE0_SIZE, \ 483e4b8fdcSSoby Mathew MT_DEVICE | MT_RW | MT_SECURE) 493e4b8fdcSSoby Mathew 503e4b8fdcSSoby Mathew #define MAP_DEVICE1 MAP_REGION_FLAT(DEVICE1_BASE, \ 513e4b8fdcSSoby Mathew DEVICE1_SIZE, \ 523e4b8fdcSSoby Mathew MT_DEVICE | MT_RW | MT_SECURE) 533e4b8fdcSSoby Mathew 54f98630fbSManish V Badarkhe #if FVP_GICR_REGION_PROTECTION 55f98630fbSManish V Badarkhe #define MAP_GICD_MEM MAP_REGION_FLAT(BASE_GICD_BASE, \ 56f98630fbSManish V Badarkhe BASE_GICD_SIZE, \ 57f98630fbSManish V Badarkhe MT_DEVICE | MT_RW | MT_SECURE) 58f98630fbSManish V Badarkhe 59f98630fbSManish V Badarkhe /* Map all core's redistributor memory as read-only. After boots up, 60f98630fbSManish V Badarkhe * per-core map its redistributor memory as read-write */ 61f98630fbSManish V Badarkhe #define MAP_GICR_MEM MAP_REGION_FLAT(BASE_GICR_BASE, \ 62f98630fbSManish V Badarkhe (BASE_GICR_SIZE * PLATFORM_CORE_COUNT),\ 63f98630fbSManish V Badarkhe MT_DEVICE | MT_RO | MT_SECURE) 64f98630fbSManish V Badarkhe #endif /* FVP_GICR_REGION_PROTECTION */ 65f98630fbSManish V Badarkhe 66284c3d67SSandrine Bailleux /* 67284c3d67SSandrine Bailleux * Need to be mapped with write permissions in order to set a new non-volatile 68284c3d67SSandrine Bailleux * counter value. 69284c3d67SSandrine Bailleux */ 703e4b8fdcSSoby Mathew #define MAP_DEVICE2 MAP_REGION_FLAT(DEVICE2_BASE, \ 713e4b8fdcSSoby Mathew DEVICE2_SIZE, \ 72fe7de035SAntonio Nino Diaz MT_DEVICE | MT_RW | MT_SECURE) 733e4b8fdcSSoby Mathew 74*94c90ac8SHarrison Mutai #if TRANSFER_LIST 75*94c90ac8SHarrison Mutai #ifdef FW_NS_HANDOFF_BASE 76*94c90ac8SHarrison Mutai #define MAP_FW_NS_HANDOFF MAP_REGION_FLAT(FW_NS_HANDOFF_BASE, \ 77*94c90ac8SHarrison Mutai FW_HANDOFF_SIZE, \ 78*94c90ac8SHarrison Mutai MT_MEMORY | MT_RW | MT_NS) 79*94c90ac8SHarrison Mutai #endif 80*94c90ac8SHarrison Mutai #endif 81*94c90ac8SHarrison Mutai 823e4b8fdcSSoby Mathew /* 83b5fa6563SSandrine Bailleux * Table of memory regions for various BL stages to map using the MMU. 840916c38dSRoberto Vargas * This doesn't include Trusted SRAM as setup_page_tables() already takes care 850916c38dSRoberto Vargas * of mapping it. 863e4b8fdcSSoby Mathew */ 873d8256b2SMasahiro Yamada #ifdef IMAGE_BL1 883e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 893e4b8fdcSSoby Mathew ARM_MAP_SHARED_RAM, 9079d8be3cSManish V Badarkhe V2M_MAP_FLASH0_RO, 913e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 923e4b8fdcSSoby Mathew MAP_DEVICE0, 93e0cea783SManish V Badarkhe #if FVP_INTERCONNECT_DRIVER == FVP_CCN 943e4b8fdcSSoby Mathew MAP_DEVICE1, 95e0cea783SManish V Badarkhe #endif 963e4b8fdcSSoby Mathew #if TRUSTED_BOARD_BOOT 97284c3d67SSandrine Bailleux /* To access the Root of Trust Public Key registers. */ 98284c3d67SSandrine Bailleux MAP_DEVICE2, 99284c3d67SSandrine Bailleux /* Map DRAM to authenticate NS_BL2U image. */ 1003e4b8fdcSSoby Mathew ARM_MAP_NS_DRAM1, 1013e4b8fdcSSoby Mathew #endif 1023e4b8fdcSSoby Mathew {0} 1033e4b8fdcSSoby Mathew }; 1043e4b8fdcSSoby Mathew #endif 1053d8256b2SMasahiro Yamada #ifdef IMAGE_BL2 1063e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 1073e4b8fdcSSoby Mathew ARM_MAP_SHARED_RAM, 1083e4b8fdcSSoby Mathew V2M_MAP_FLASH0_RW, 1093e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 1103e4b8fdcSSoby Mathew MAP_DEVICE0, 111e0cea783SManish V Badarkhe #if FVP_INTERCONNECT_DRIVER == FVP_CCN 1123e4b8fdcSSoby Mathew MAP_DEVICE1, 113e0cea783SManish V Badarkhe #endif 1143e4b8fdcSSoby Mathew ARM_MAP_NS_DRAM1, 115402b3cf8SJulius Werner #ifdef __aarch64__ 116b09ba056SRoberto Vargas ARM_MAP_DRAM2, 117b09ba056SRoberto Vargas #endif 11839f0b86aSManish V Badarkhe /* 11939f0b86aSManish V Badarkhe * Required to load HW_CONFIG, SPMC and SPs to trusted DRAM. 12039f0b86aSManish V Badarkhe */ 12164758c97SAchin Gupta ARM_MAP_TRUSTED_DRAM, 1226b2e961fSManish V Badarkhe 1236b2e961fSManish V Badarkhe /* 1246b2e961fSManish V Badarkhe * Required to load Event Log in TZC secured memory 1256b2e961fSManish V Badarkhe */ 1266b2e961fSManish V Badarkhe #if MEASURED_BOOT && (defined(SPD_tspd) || defined(SPD_opteed) || \ 1276b2e961fSManish V Badarkhe defined(SPD_spmd)) 1286b2e961fSManish V Badarkhe ARM_MAP_EVENT_LOG_DRAM1, 1296b2e961fSManish V Badarkhe #endif /* MEASURED_BOOT && (SPD_tspd || SPD_opteed || SPD_spmd) */ 1306b2e961fSManish V Badarkhe 131c8720729SZelalem Aweke #if ENABLE_RME 132c8720729SZelalem Aweke ARM_MAP_RMM_DRAM, 133c8720729SZelalem Aweke ARM_MAP_GPT_L1_DRAM, 134c8720729SZelalem Aweke #endif /* ENABLE_RME */ 1353eb2d672SSandrine Bailleux #ifdef SPD_tspd 1363e4b8fdcSSoby Mathew ARM_MAP_TSP_SEC_MEM, 1373eb2d672SSandrine Bailleux #endif 138284c3d67SSandrine Bailleux #if TRUSTED_BOARD_BOOT 139284c3d67SSandrine Bailleux /* To access the Root of Trust Public Key registers. */ 140284c3d67SSandrine Bailleux MAP_DEVICE2, 141ba597da7SJohn Tsichritzis #endif /* TRUSTED_BOARD_BOOT */ 14288c51c3fSManish V Badarkhe 14342d4d3baSArvind Ram Prakash #if CRYPTO_SUPPORT && !RESET_TO_BL2 14488c51c3fSManish V Badarkhe /* 14588c51c3fSManish V Badarkhe * To access shared the Mbed TLS heap while booting the 14688c51c3fSManish V Badarkhe * system with Crypto support 14788c51c3fSManish V Badarkhe */ 14888c51c3fSManish V Badarkhe ARM_MAP_BL1_RW, 14942d4d3baSArvind Ram Prakash #endif /* CRYPTO_SUPPORT && !RESET_TO_BL2 */ 15044639ab7SMarc Bonnici #if SPM_MM || SPMC_AT_EL3 151e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_MMAP, 152e29efeb1SAntonio Nino Diaz #endif 1533e4b8fdcSSoby Mathew #if ARM_BL31_IN_DRAM 1543e4b8fdcSSoby Mathew ARM_MAP_BL31_SEC_DRAM, 1553e4b8fdcSSoby Mathew #endif 156810d9213SJens Wiklander #ifdef SPD_opteed 157b3ba6fdaSSoby Mathew ARM_MAP_OPTEE_CORE_MEM, 158810d9213SJens Wiklander ARM_OPTEE_PAGEABLE_LOAD_MEM, 159810d9213SJens Wiklander #endif 1603e4b8fdcSSoby Mathew {0} 1613e4b8fdcSSoby Mathew }; 1623e4b8fdcSSoby Mathew #endif 1633d8256b2SMasahiro Yamada #ifdef IMAGE_BL2U 1643e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 1653e4b8fdcSSoby Mathew MAP_DEVICE0, 1663e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 1673e4b8fdcSSoby Mathew {0} 1683e4b8fdcSSoby Mathew }; 1693e4b8fdcSSoby Mathew #endif 1703d8256b2SMasahiro Yamada #ifdef IMAGE_BL31 1713e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 1723e4b8fdcSSoby Mathew ARM_MAP_SHARED_RAM, 173992f091bSAmbroise Vincent #if USE_DEBUGFS 174992f091bSAmbroise Vincent /* Required by devfip, can be removed if devfip is not used */ 175992f091bSAmbroise Vincent V2M_MAP_FLASH0_RW, 176992f091bSAmbroise Vincent #endif /* USE_DEBUGFS */ 177e35a3fb5SSoby Mathew ARM_MAP_EL3_TZC_DRAM, 1783e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 1793e4b8fdcSSoby Mathew MAP_DEVICE0, 180f98630fbSManish V Badarkhe #if FVP_GICR_REGION_PROTECTION 181f98630fbSManish V Badarkhe MAP_GICD_MEM, 182f98630fbSManish V Badarkhe MAP_GICR_MEM, 183f98630fbSManish V Badarkhe #else 1843e4b8fdcSSoby Mathew MAP_DEVICE1, 185f98630fbSManish V Badarkhe #endif /* FVP_GICR_REGION_PROTECTION */ 186f145403cSRoberto Vargas ARM_V2M_MAP_MEM_PROTECT, 1873f3c341aSPaul Beesley #if SPM_MM 188e29efeb1SAntonio Nino Diaz ARM_SPM_BUF_EL3_MMAP, 189e29efeb1SAntonio Nino Diaz #endif 190c8720729SZelalem Aweke #if ENABLE_RME 191c8720729SZelalem Aweke ARM_MAP_GPT_L1_DRAM, 1928c980a4aSJavier Almansa Sobrino ARM_MAP_EL3_RMM_SHARED_MEM, 193c8720729SZelalem Aweke #endif 194*94c90ac8SHarrison Mutai #ifdef MAP_FW_NS_HANDOFF 195*94c90ac8SHarrison Mutai MAP_FW_NS_HANDOFF, 196*94c90ac8SHarrison Mutai #endif 1973e4b8fdcSSoby Mathew {0} 1983e4b8fdcSSoby Mathew }; 199e29efeb1SAntonio Nino Diaz 2003f3c341aSPaul Beesley #if defined(IMAGE_BL31) && SPM_MM 201e29efeb1SAntonio Nino Diaz const mmap_region_t plat_arm_secure_partition_mmap[] = { 202e29efeb1SAntonio Nino Diaz V2M_MAP_IOFPGA_EL0, /* for the UART */ 2039a90d720SElyes Haouas MAP_REGION_FLAT(DEVICE0_BASE, 2049a90d720SElyes Haouas DEVICE0_SIZE, 205c4fa1739SSandrine Bailleux MT_DEVICE | MT_RO | MT_SECURE | MT_USER), 206e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_MMAP, 207e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_NS_BUF_MMAP, 208e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_RW_MMAP, 209e29efeb1SAntonio Nino Diaz ARM_SPM_BUF_EL0_MMAP, 210e29efeb1SAntonio Nino Diaz {0} 211e29efeb1SAntonio Nino Diaz }; 212e29efeb1SAntonio Nino Diaz #endif 2133e4b8fdcSSoby Mathew #endif 2143d8256b2SMasahiro Yamada #ifdef IMAGE_BL32 2153e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 216402b3cf8SJulius Werner #ifndef __aarch64__ 217877cf3ffSSoby Mathew ARM_MAP_SHARED_RAM, 218950c6956SJoel Hutton ARM_V2M_MAP_MEM_PROTECT, 219877cf3ffSSoby Mathew #endif 2203e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 2213e4b8fdcSSoby Mathew MAP_DEVICE0, 2223e4b8fdcSSoby Mathew MAP_DEVICE1, 2233e4b8fdcSSoby Mathew {0} 2243e4b8fdcSSoby Mathew }; 2253e4b8fdcSSoby Mathew #endif 2263e4b8fdcSSoby Mathew 2279d870b79SZelalem Aweke #ifdef IMAGE_RMM 2289d870b79SZelalem Aweke const mmap_region_t plat_arm_mmap[] = { 2299d870b79SZelalem Aweke V2M_MAP_IOFPGA, 2309d870b79SZelalem Aweke MAP_DEVICE0, 2319d870b79SZelalem Aweke MAP_DEVICE1, 2329d870b79SZelalem Aweke {0} 2339d870b79SZelalem Aweke }; 2349d870b79SZelalem Aweke #endif 2359d870b79SZelalem Aweke 2363e4b8fdcSSoby Mathew ARM_CASSERT_MMAP 2373e4b8fdcSSoby Mathew 238955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER != FVP_CCN 239955242d8SJeenu Viswambharan static const int fvp_cci400_map[] = { 240955242d8SJeenu Viswambharan PLAT_FVP_CCI400_CLUS0_SL_PORT, 241955242d8SJeenu Viswambharan PLAT_FVP_CCI400_CLUS1_SL_PORT, 242955242d8SJeenu Viswambharan }; 243955242d8SJeenu Viswambharan 244955242d8SJeenu Viswambharan static const int fvp_cci5xx_map[] = { 245955242d8SJeenu Viswambharan PLAT_FVP_CCI5XX_CLUS0_SL_PORT, 246955242d8SJeenu Viswambharan PLAT_FVP_CCI5XX_CLUS1_SL_PORT, 247955242d8SJeenu Viswambharan }; 248955242d8SJeenu Viswambharan 249955242d8SJeenu Viswambharan static unsigned int get_interconnect_master(void) 250955242d8SJeenu Viswambharan { 251955242d8SJeenu Viswambharan unsigned int master; 252955242d8SJeenu Viswambharan u_register_t mpidr; 253955242d8SJeenu Viswambharan 254955242d8SJeenu Viswambharan mpidr = read_mpidr_el1(); 255583e0791SAntonio Nino Diaz master = ((arm_config.flags & ARM_CONFIG_FVP_SHIFTED_AFF) != 0U) ? 256955242d8SJeenu Viswambharan MPIDR_AFFLVL2_VAL(mpidr) : MPIDR_AFFLVL1_VAL(mpidr); 257955242d8SJeenu Viswambharan 258955242d8SJeenu Viswambharan assert(master < FVP_CLUSTER_COUNT); 259955242d8SJeenu Viswambharan return master; 260955242d8SJeenu Viswambharan } 261955242d8SJeenu Viswambharan #endif 2623e4b8fdcSSoby Mathew 2633f3c341aSPaul Beesley #if defined(IMAGE_BL31) && SPM_MM 264e29efeb1SAntonio Nino Diaz /* 265e29efeb1SAntonio Nino Diaz * Boot information passed to a secure partition during initialisation. Linear 266e29efeb1SAntonio Nino Diaz * indices in MP information will be filled at runtime. 267e29efeb1SAntonio Nino Diaz */ 268aeaa225cSPaul Beesley static spm_mm_mp_info_t sp_mp_info[] = { 269e29efeb1SAntonio Nino Diaz [0] = {0x80000000, 0}, 270e29efeb1SAntonio Nino Diaz [1] = {0x80000001, 0}, 271e29efeb1SAntonio Nino Diaz [2] = {0x80000002, 0}, 272e29efeb1SAntonio Nino Diaz [3] = {0x80000003, 0}, 273e29efeb1SAntonio Nino Diaz [4] = {0x80000100, 0}, 274e29efeb1SAntonio Nino Diaz [5] = {0x80000101, 0}, 275e29efeb1SAntonio Nino Diaz [6] = {0x80000102, 0}, 276e29efeb1SAntonio Nino Diaz [7] = {0x80000103, 0}, 277e29efeb1SAntonio Nino Diaz }; 278e29efeb1SAntonio Nino Diaz 279aeaa225cSPaul Beesley const spm_mm_boot_info_t plat_arm_secure_partition_boot_info = { 280e29efeb1SAntonio Nino Diaz .h.type = PARAM_SP_IMAGE_BOOT_INFO, 281e29efeb1SAntonio Nino Diaz .h.version = VERSION_1, 282aeaa225cSPaul Beesley .h.size = sizeof(spm_mm_boot_info_t), 283e29efeb1SAntonio Nino Diaz .h.attr = 0, 284e29efeb1SAntonio Nino Diaz .sp_mem_base = ARM_SP_IMAGE_BASE, 285e29efeb1SAntonio Nino Diaz .sp_mem_limit = ARM_SP_IMAGE_LIMIT, 286e29efeb1SAntonio Nino Diaz .sp_image_base = ARM_SP_IMAGE_BASE, 287e29efeb1SAntonio Nino Diaz .sp_stack_base = PLAT_SP_IMAGE_STACK_BASE, 288e29efeb1SAntonio Nino Diaz .sp_heap_base = ARM_SP_IMAGE_HEAP_BASE, 2890560efb9SArd Biesheuvel .sp_ns_comm_buf_base = PLAT_SP_IMAGE_NS_BUF_BASE, 290e29efeb1SAntonio Nino Diaz .sp_shared_buf_base = PLAT_SPM_BUF_BASE, 291e29efeb1SAntonio Nino Diaz .sp_image_size = ARM_SP_IMAGE_SIZE, 292e29efeb1SAntonio Nino Diaz .sp_pcpu_stack_size = PLAT_SP_IMAGE_STACK_PCPU_SIZE, 293e29efeb1SAntonio Nino Diaz .sp_heap_size = ARM_SP_IMAGE_HEAP_SIZE, 2940560efb9SArd Biesheuvel .sp_ns_comm_buf_size = PLAT_SP_IMAGE_NS_BUF_SIZE, 295e29efeb1SAntonio Nino Diaz .sp_shared_buf_size = PLAT_SPM_BUF_SIZE, 296e29efeb1SAntonio Nino Diaz .num_sp_mem_regions = ARM_SP_IMAGE_NUM_MEM_REGIONS, 297e29efeb1SAntonio Nino Diaz .num_cpus = PLATFORM_CORE_COUNT, 298e29efeb1SAntonio Nino Diaz .mp_info = &sp_mp_info[0], 299e29efeb1SAntonio Nino Diaz }; 300e29efeb1SAntonio Nino Diaz 301e29efeb1SAntonio Nino Diaz const struct mmap_region *plat_get_secure_partition_mmap(void *cookie) 302e29efeb1SAntonio Nino Diaz { 303e29efeb1SAntonio Nino Diaz return plat_arm_secure_partition_mmap; 304e29efeb1SAntonio Nino Diaz } 305e29efeb1SAntonio Nino Diaz 306aeaa225cSPaul Beesley const struct spm_mm_boot_info *plat_get_secure_partition_boot_info( 307e29efeb1SAntonio Nino Diaz void *cookie) 308e29efeb1SAntonio Nino Diaz { 309e29efeb1SAntonio Nino Diaz return &plat_arm_secure_partition_boot_info; 310e29efeb1SAntonio Nino Diaz } 311e29efeb1SAntonio Nino Diaz #endif 312e29efeb1SAntonio Nino Diaz 3133e4b8fdcSSoby Mathew /******************************************************************************* 3143e4b8fdcSSoby Mathew * A single boot loader stack is expected to work on both the Foundation FVP 3153e4b8fdcSSoby Mathew * models and the two flavours of the Base FVP models (AEMv8 & Cortex). The 3163e4b8fdcSSoby Mathew * SYS_ID register provides a mechanism for detecting the differences between 3173e4b8fdcSSoby Mathew * these platforms. This information is stored in a per-BL array to allow the 3183e4b8fdcSSoby Mathew * code to take the correct path.Per BL platform configuration. 3193e4b8fdcSSoby Mathew ******************************************************************************/ 3204d010d0dSDaniel Boulby void __init fvp_config_setup(void) 3213e4b8fdcSSoby Mathew { 3223e4b8fdcSSoby Mathew unsigned int rev, hbi, bld, arch, sys_id; 3233e4b8fdcSSoby Mathew 3243e4b8fdcSSoby Mathew sys_id = mmio_read_32(V2M_SYSREGS_BASE + V2M_SYS_ID); 3253e4b8fdcSSoby Mathew rev = (sys_id >> V2M_SYS_ID_REV_SHIFT) & V2M_SYS_ID_REV_MASK; 3263e4b8fdcSSoby Mathew hbi = (sys_id >> V2M_SYS_ID_HBI_SHIFT) & V2M_SYS_ID_HBI_MASK; 3273e4b8fdcSSoby Mathew bld = (sys_id >> V2M_SYS_ID_BLD_SHIFT) & V2M_SYS_ID_BLD_MASK; 3283e4b8fdcSSoby Mathew arch = (sys_id >> V2M_SYS_ID_ARCH_SHIFT) & V2M_SYS_ID_ARCH_MASK; 3293e4b8fdcSSoby Mathew 3303e4b8fdcSSoby Mathew if (arch != ARCH_MODEL) { 3313e4b8fdcSSoby Mathew ERROR("This firmware is for FVP models\n"); 3323e4b8fdcSSoby Mathew panic(); 3333e4b8fdcSSoby Mathew } 3343e4b8fdcSSoby Mathew 3353e4b8fdcSSoby Mathew /* 3363e4b8fdcSSoby Mathew * The build field in the SYS_ID tells which variant of the GIC 3373e4b8fdcSSoby Mathew * memory is implemented by the model. 3383e4b8fdcSSoby Mathew */ 3393e4b8fdcSSoby Mathew switch (bld) { 3403e4b8fdcSSoby Mathew case BLD_GIC_VE_MMAP: 34121a3973dSSoby Mathew ERROR("Legacy Versatile Express memory map for GIC peripheral" 34221a3973dSSoby Mathew " is not supported\n"); 3433e4b8fdcSSoby Mathew panic(); 3443e4b8fdcSSoby Mathew break; 3453e4b8fdcSSoby Mathew case BLD_GIC_A53A57_MMAP: 3463e4b8fdcSSoby Mathew break; 3473e4b8fdcSSoby Mathew default: 3483e4b8fdcSSoby Mathew ERROR("Unsupported board build %x\n", bld); 3493e4b8fdcSSoby Mathew panic(); 3503e4b8fdcSSoby Mathew } 3513e4b8fdcSSoby Mathew 3523e4b8fdcSSoby Mathew /* 3533e4b8fdcSSoby Mathew * The hbi field in the SYS_ID is 0x020 for the Base FVP & 0x010 3543e4b8fdcSSoby Mathew * for the Foundation FVP. 3553e4b8fdcSSoby Mathew */ 3563e4b8fdcSSoby Mathew switch (hbi) { 3573e4b8fdcSSoby Mathew case HBI_FOUNDATION_FVP: 3583e4b8fdcSSoby Mathew arm_config.flags = 0; 3593e4b8fdcSSoby Mathew 3603e4b8fdcSSoby Mathew /* 3613e4b8fdcSSoby Mathew * Check for supported revisions of Foundation FVP 3623e4b8fdcSSoby Mathew * Allow future revisions to run but emit warning diagnostic 3633e4b8fdcSSoby Mathew */ 3643e4b8fdcSSoby Mathew switch (rev) { 3653e4b8fdcSSoby Mathew case REV_FOUNDATION_FVP_V2_0: 3663e4b8fdcSSoby Mathew case REV_FOUNDATION_FVP_V2_1: 3673e4b8fdcSSoby Mathew case REV_FOUNDATION_FVP_v9_1: 3684faa4a1dSSandrine Bailleux case REV_FOUNDATION_FVP_v9_6: 3693e4b8fdcSSoby Mathew break; 3703e4b8fdcSSoby Mathew default: 3713e4b8fdcSSoby Mathew WARN("Unrecognized Foundation FVP revision %x\n", rev); 3723e4b8fdcSSoby Mathew break; 3733e4b8fdcSSoby Mathew } 3743e4b8fdcSSoby Mathew break; 3753e4b8fdcSSoby Mathew case HBI_BASE_FVP: 376955242d8SJeenu Viswambharan arm_config.flags |= (ARM_CONFIG_BASE_MMAP | ARM_CONFIG_HAS_TZC); 3773e4b8fdcSSoby Mathew 3783e4b8fdcSSoby Mathew /* 3793e4b8fdcSSoby Mathew * Check for supported revisions 3803e4b8fdcSSoby Mathew * Allow future revisions to run but emit warning diagnostic 3813e4b8fdcSSoby Mathew */ 3823e4b8fdcSSoby Mathew switch (rev) { 3833e4b8fdcSSoby Mathew case REV_BASE_FVP_V0: 384955242d8SJeenu Viswambharan arm_config.flags |= ARM_CONFIG_FVP_HAS_CCI400; 385955242d8SJeenu Viswambharan break; 386955242d8SJeenu Viswambharan case REV_BASE_FVP_REVC: 3878431635bSIsla Mitchell arm_config.flags |= (ARM_CONFIG_FVP_HAS_SMMUV3 | 388955242d8SJeenu Viswambharan ARM_CONFIG_FVP_HAS_CCI5XX); 3893e4b8fdcSSoby Mathew break; 3903e4b8fdcSSoby Mathew default: 3913e4b8fdcSSoby Mathew WARN("Unrecognized Base FVP revision %x\n", rev); 3923e4b8fdcSSoby Mathew break; 3933e4b8fdcSSoby Mathew } 3943e4b8fdcSSoby Mathew break; 3953e4b8fdcSSoby Mathew default: 3963e4b8fdcSSoby Mathew ERROR("Unsupported board HBI number 0x%x\n", hbi); 3973e4b8fdcSSoby Mathew panic(); 3983e4b8fdcSSoby Mathew } 3998431635bSIsla Mitchell 4008431635bSIsla Mitchell /* 4018431635bSIsla Mitchell * We assume that the presence of MT bit, and therefore shifted 4028431635bSIsla Mitchell * affinities, is uniform across the platform: either all CPUs, or no 4038431635bSIsla Mitchell * CPUs implement it. 4048431635bSIsla Mitchell */ 405583e0791SAntonio Nino Diaz if ((read_mpidr_el1() & MPIDR_MT_MASK) != 0U) 4068431635bSIsla Mitchell arm_config.flags |= ARM_CONFIG_FVP_SHIFTED_AFF; 4073e4b8fdcSSoby Mathew } 4083e4b8fdcSSoby Mathew 4093e4b8fdcSSoby Mathew 4104d010d0dSDaniel Boulby void __init fvp_interconnect_init(void) 4113e4b8fdcSSoby Mathew { 41271237876SSoby Mathew #if FVP_INTERCONNECT_DRIVER == FVP_CCN 41371237876SSoby Mathew if (ccn_get_part0_id(PLAT_ARM_CCN_BASE) != CCN_502_PART0_ID) { 414583e0791SAntonio Nino Diaz ERROR("Unrecognized CCN variant detected. Only CCN-502 is supported"); 41571237876SSoby Mathew panic(); 41671237876SSoby Mathew } 417955242d8SJeenu Viswambharan 4183e4b8fdcSSoby Mathew plat_arm_interconnect_init(); 419955242d8SJeenu Viswambharan #else 420583e0791SAntonio Nino Diaz uintptr_t cci_base = 0U; 421583e0791SAntonio Nino Diaz const int *cci_map = NULL; 422583e0791SAntonio Nino Diaz unsigned int map_size = 0U; 423955242d8SJeenu Viswambharan 424955242d8SJeenu Viswambharan /* Initialize the right interconnect */ 425583e0791SAntonio Nino Diaz if ((arm_config.flags & ARM_CONFIG_FVP_HAS_CCI5XX) != 0U) { 426955242d8SJeenu Viswambharan cci_base = PLAT_FVP_CCI5XX_BASE; 427955242d8SJeenu Viswambharan cci_map = fvp_cci5xx_map; 428955242d8SJeenu Viswambharan map_size = ARRAY_SIZE(fvp_cci5xx_map); 429583e0791SAntonio Nino Diaz } else if ((arm_config.flags & ARM_CONFIG_FVP_HAS_CCI400) != 0U) { 430955242d8SJeenu Viswambharan cci_base = PLAT_FVP_CCI400_BASE; 431955242d8SJeenu Viswambharan cci_map = fvp_cci400_map; 432955242d8SJeenu Viswambharan map_size = ARRAY_SIZE(fvp_cci400_map); 433583e0791SAntonio Nino Diaz } else { 434583e0791SAntonio Nino Diaz return; 435955242d8SJeenu Viswambharan } 436955242d8SJeenu Viswambharan 437583e0791SAntonio Nino Diaz assert(cci_base != 0U); 438583e0791SAntonio Nino Diaz assert(cci_map != NULL); 439955242d8SJeenu Viswambharan cci_init(cci_base, cci_map, map_size); 440955242d8SJeenu Viswambharan #endif 44171237876SSoby Mathew } 4423e4b8fdcSSoby Mathew 4433e4b8fdcSSoby Mathew void fvp_interconnect_enable(void) 4443e4b8fdcSSoby Mathew { 445955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER == FVP_CCN 4463e4b8fdcSSoby Mathew plat_arm_interconnect_enter_coherency(); 447955242d8SJeenu Viswambharan #else 448955242d8SJeenu Viswambharan unsigned int master; 449955242d8SJeenu Viswambharan 450583e0791SAntonio Nino Diaz if ((arm_config.flags & (ARM_CONFIG_FVP_HAS_CCI400 | 451583e0791SAntonio Nino Diaz ARM_CONFIG_FVP_HAS_CCI5XX)) != 0U) { 452955242d8SJeenu Viswambharan master = get_interconnect_master(); 453955242d8SJeenu Viswambharan cci_enable_snoop_dvm_reqs(master); 454955242d8SJeenu Viswambharan } 455955242d8SJeenu Viswambharan #endif 4563e4b8fdcSSoby Mathew } 4573e4b8fdcSSoby Mathew 4583e4b8fdcSSoby Mathew void fvp_interconnect_disable(void) 4593e4b8fdcSSoby Mathew { 460955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER == FVP_CCN 4613e4b8fdcSSoby Mathew plat_arm_interconnect_exit_coherency(); 462955242d8SJeenu Viswambharan #else 463955242d8SJeenu Viswambharan unsigned int master; 464955242d8SJeenu Viswambharan 465583e0791SAntonio Nino Diaz if ((arm_config.flags & (ARM_CONFIG_FVP_HAS_CCI400 | 466583e0791SAntonio Nino Diaz ARM_CONFIG_FVP_HAS_CCI5XX)) != 0U) { 467955242d8SJeenu Viswambharan master = get_interconnect_master(); 468955242d8SJeenu Viswambharan cci_disable_snoop_dvm_reqs(master); 469955242d8SJeenu Viswambharan } 470955242d8SJeenu Viswambharan #endif 4713e4b8fdcSSoby Mathew } 472ba597da7SJohn Tsichritzis 47388c51c3fSManish V Badarkhe #if CRYPTO_SUPPORT 474ba597da7SJohn Tsichritzis int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size) 475ba597da7SJohn Tsichritzis { 476ba597da7SJohn Tsichritzis assert(heap_addr != NULL); 477ba597da7SJohn Tsichritzis assert(heap_size != NULL); 478ba597da7SJohn Tsichritzis 479ba597da7SJohn Tsichritzis return arm_get_mbedtls_heap(heap_addr, heap_size); 480ba597da7SJohn Tsichritzis } 48188c51c3fSManish V Badarkhe #endif /* CRYPTO_SUPPORT */ 4821b597c22SAlexei Fedorov 4831b597c22SAlexei Fedorov void fvp_timer_init(void) 4841b597c22SAlexei Fedorov { 485fddfb3baSMadhukar Pappireddy #if USE_SP804_TIMER 4861b597c22SAlexei Fedorov /* Enable the clock override for SP804 timer 0, which means that no 4871b597c22SAlexei Fedorov * clock dividers are applied and the raw (35MHz) clock will be used. 4881b597c22SAlexei Fedorov */ 4891b597c22SAlexei Fedorov mmio_write_32(V2M_SP810_BASE, FVP_SP810_CTRL_TIM0_OV); 4901b597c22SAlexei Fedorov 4911b597c22SAlexei Fedorov /* Initialize delay timer driver using SP804 dual timer 0 */ 4921b597c22SAlexei Fedorov sp804_timer_init(V2M_SP804_TIMER0_BASE, 4931b597c22SAlexei Fedorov SP804_TIMER_CLKMULT, SP804_TIMER_CLKDIV); 4941b597c22SAlexei Fedorov #else 4951b597c22SAlexei Fedorov generic_delay_timer_init(); 4961b597c22SAlexei Fedorov 4971b597c22SAlexei Fedorov /* Enable System level generic timer */ 4981b597c22SAlexei Fedorov mmio_write_32(ARM_SYS_CNTCTL_BASE + CNTCR_OFF, 4991b597c22SAlexei Fedorov CNTCR_FCREQ(0U) | CNTCR_EN); 500fddfb3baSMadhukar Pappireddy #endif /* USE_SP804_TIMER */ 5011b597c22SAlexei Fedorov } 502ed9653ffSManish V Badarkhe 503ed9653ffSManish V Badarkhe /***************************************************************************** 504ed9653ffSManish V Badarkhe * plat_is_smccc_feature_available() - This function checks whether SMCCC 505ed9653ffSManish V Badarkhe * feature is availabile for platform. 506ed9653ffSManish V Badarkhe * @fid: SMCCC function id 507ed9653ffSManish V Badarkhe * 508ed9653ffSManish V Badarkhe * Return SMC_ARCH_CALL_SUCCESS if SMCCC feature is available and 509ed9653ffSManish V Badarkhe * SMC_ARCH_CALL_NOT_SUPPORTED otherwise. 510ed9653ffSManish V Badarkhe *****************************************************************************/ 511ed9653ffSManish V Badarkhe int32_t plat_is_smccc_feature_available(u_register_t fid) 512ed9653ffSManish V Badarkhe { 513ed9653ffSManish V Badarkhe switch (fid) { 514ed9653ffSManish V Badarkhe case SMCCC_ARCH_SOC_ID: 515ed9653ffSManish V Badarkhe return SMC_ARCH_CALL_SUCCESS; 516ed9653ffSManish V Badarkhe default: 517ed9653ffSManish V Badarkhe return SMC_ARCH_CALL_NOT_SUPPORTED; 518ed9653ffSManish V Badarkhe } 519ed9653ffSManish V Badarkhe } 520ed9653ffSManish V Badarkhe 521ed9653ffSManish V Badarkhe /* Get SOC version */ 522ed9653ffSManish V Badarkhe int32_t plat_get_soc_version(void) 523ed9653ffSManish V Badarkhe { 524ed9653ffSManish V Badarkhe return (int32_t) 525dfff4686SYann Gautier (SOC_ID_SET_JEP_106(ARM_SOC_CONTINUATION_CODE, 526dfff4686SYann Gautier ARM_SOC_IDENTIFICATION_CODE) | 527dfff4686SYann Gautier (FVP_SOC_ID & SOC_ID_IMPL_DEF_MASK)); 528ed9653ffSManish V Badarkhe } 529ed9653ffSManish V Badarkhe 530ed9653ffSManish V Badarkhe /* Get SOC revision */ 531ed9653ffSManish V Badarkhe int32_t plat_get_soc_revision(void) 532ed9653ffSManish V Badarkhe { 533ed9653ffSManish V Badarkhe unsigned int sys_id; 534ed9653ffSManish V Badarkhe 535ed9653ffSManish V Badarkhe sys_id = mmio_read_32(V2M_SYSREGS_BASE + V2M_SYS_ID); 536dfff4686SYann Gautier return (int32_t)(((sys_id >> V2M_SYS_ID_REV_SHIFT) & 537dfff4686SYann Gautier V2M_SYS_ID_REV_MASK) & SOC_ID_REV_MASK); 538ed9653ffSManish V Badarkhe } 5398c980a4aSJavier Almansa Sobrino 5408c980a4aSJavier Almansa Sobrino #if ENABLE_RME 5418c980a4aSJavier Almansa Sobrino /* 5428c980a4aSJavier Almansa Sobrino * Get a pointer to the RMM-EL3 Shared buffer and return it 5438c980a4aSJavier Almansa Sobrino * through the pointer passed as parameter. 5448c980a4aSJavier Almansa Sobrino * 5458c980a4aSJavier Almansa Sobrino * This function returns the size of the shared buffer. 5468c980a4aSJavier Almansa Sobrino */ 5478c980a4aSJavier Almansa Sobrino size_t plat_rmmd_get_el3_rmm_shared_mem(uintptr_t *shared) 5488c980a4aSJavier Almansa Sobrino { 5498c980a4aSJavier Almansa Sobrino *shared = (uintptr_t)RMM_SHARED_BASE; 5508c980a4aSJavier Almansa Sobrino 5518c980a4aSJavier Almansa Sobrino return (size_t)RMM_SHARED_SIZE; 5528c980a4aSJavier Almansa Sobrino } 5531d0ca40eSJavier Almansa Sobrino 554a97bfa5fSAlexeiFedorov int plat_rmmd_load_manifest(struct rmm_manifest *manifest) 5551d0ca40eSJavier Almansa Sobrino { 55682685904SAlexeiFedorov uint64_t checksum, num_banks; 55782685904SAlexeiFedorov struct ns_dram_bank *bank_ptr; 558a97bfa5fSAlexeiFedorov 5591d0ca40eSJavier Almansa Sobrino assert(manifest != NULL); 5601d0ca40eSJavier Almansa Sobrino 56182685904SAlexeiFedorov /* Get number of DRAM banks */ 56282685904SAlexeiFedorov num_banks = FCONF_GET_PROPERTY(hw_config, dram_layout, num_banks); 56382685904SAlexeiFedorov assert(num_banks <= ARM_DRAM_NUM_BANKS); 56482685904SAlexeiFedorov 5651d0ca40eSJavier Almansa Sobrino manifest->version = RMMD_MANIFEST_VERSION; 566dc0ca64eSJavier Almansa Sobrino manifest->padding = 0U; /* RES0 */ 5671d0ca40eSJavier Almansa Sobrino manifest->plat_data = (uintptr_t)NULL; 56882685904SAlexeiFedorov manifest->plat_dram.num_banks = num_banks; 569a97bfa5fSAlexeiFedorov 57082685904SAlexeiFedorov /* 57182685904SAlexeiFedorov * Array ns_dram_banks[] follows ns_dram_info structure: 57282685904SAlexeiFedorov * 57382685904SAlexeiFedorov * +-----------------------------------+ 57482685904SAlexeiFedorov * | offset | field | comment | 57582685904SAlexeiFedorov * +----------+-----------+------------+ 57682685904SAlexeiFedorov * | 0 | version | 0x00000002 | 57782685904SAlexeiFedorov * +----------+-----------+------------+ 57882685904SAlexeiFedorov * | 4 | padding | 0x00000000 | 57982685904SAlexeiFedorov * +----------+-----------+------------+ 58082685904SAlexeiFedorov * | 8 | plat_data | NULL | 58182685904SAlexeiFedorov * +----------+-----------+------------+ 58282685904SAlexeiFedorov * | 16 | num_banks | | 58382685904SAlexeiFedorov * +----------+-----------+ | 58482685904SAlexeiFedorov * | 24 | banks | plat_dram | 58582685904SAlexeiFedorov * +----------+-----------+ | 58682685904SAlexeiFedorov * | 32 | checksum | | 58782685904SAlexeiFedorov * +----------+-----------+------------+ 58882685904SAlexeiFedorov * | 40 | base 0 | | 58982685904SAlexeiFedorov * +----------+-----------+ bank[0] | 59082685904SAlexeiFedorov * | 48 | size 0 | | 59182685904SAlexeiFedorov * +----------+-----------+------------+ 59282685904SAlexeiFedorov * | 56 | base 1 | | 59382685904SAlexeiFedorov * +----------+-----------+ bank[1] | 59482685904SAlexeiFedorov * | 64 | size 1 | | 59582685904SAlexeiFedorov * +----------+-----------+------------+ 59682685904SAlexeiFedorov */ 59782685904SAlexeiFedorov bank_ptr = (struct ns_dram_bank *) 59882685904SAlexeiFedorov ((uintptr_t)&manifest->plat_dram.checksum + 59982685904SAlexeiFedorov sizeof(manifest->plat_dram.checksum)); 600a97bfa5fSAlexeiFedorov 60182685904SAlexeiFedorov manifest->plat_dram.banks = bank_ptr; 602a97bfa5fSAlexeiFedorov 603a97bfa5fSAlexeiFedorov /* Calculate checksum of plat_dram structure */ 60482685904SAlexeiFedorov checksum = num_banks + (uint64_t)bank_ptr; 605a97bfa5fSAlexeiFedorov 60682685904SAlexeiFedorov /* Store FVP DRAM banks data in Boot Manifest */ 60782685904SAlexeiFedorov for (unsigned long i = 0UL; i < num_banks; i++) { 60882685904SAlexeiFedorov uintptr_t base = FCONF_GET_PROPERTY(hw_config, dram_layout, dram_bank[i].base); 60982685904SAlexeiFedorov uint64_t size = FCONF_GET_PROPERTY(hw_config, dram_layout, dram_bank[i].size); 61082685904SAlexeiFedorov 61182685904SAlexeiFedorov bank_ptr[i].base = base; 61282685904SAlexeiFedorov bank_ptr[i].size = size; 61382685904SAlexeiFedorov 61482685904SAlexeiFedorov /* Update checksum */ 61582685904SAlexeiFedorov checksum += base + size; 616a97bfa5fSAlexeiFedorov } 617a97bfa5fSAlexeiFedorov 618a97bfa5fSAlexeiFedorov /* Checksum must be 0 */ 61982685904SAlexeiFedorov manifest->plat_dram.checksum = ~checksum + 1UL; 6201d0ca40eSJavier Almansa Sobrino 6211d0ca40eSJavier Almansa Sobrino return 0; 6221d0ca40eSJavier Almansa Sobrino } 623a97bfa5fSAlexeiFedorov #endif /* ENABLE_RME */ 624