13e4b8fdcSSoby Mathew /* 288c51c3fSManish V Badarkhe * Copyright (c) 2013-2022, Arm Limited and Contributors. All rights reserved. 33e4b8fdcSSoby Mathew * 482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause 53e4b8fdcSSoby Mathew */ 63e4b8fdcSSoby Mathew 709d40e0eSAntonio Nino Diaz #include <assert.h> 809d40e0eSAntonio Nino Diaz 909d40e0eSAntonio Nino Diaz #include <common/debug.h> 1009d40e0eSAntonio Nino Diaz #include <drivers/arm/cci.h> 1109d40e0eSAntonio Nino Diaz #include <drivers/arm/ccn.h> 1209d40e0eSAntonio Nino Diaz #include <drivers/arm/gicv2.h> 131b597c22SAlexei Fedorov #include <drivers/arm/sp804_delay_timer.h> 141b597c22SAlexei Fedorov #include <drivers/generic_delay_timer.h> 1509d40e0eSAntonio Nino Diaz #include <lib/mmio.h> 16ed9653ffSManish V Badarkhe #include <lib/smccc.h> 1709d40e0eSAntonio Nino Diaz #include <lib/xlat_tables/xlat_tables_compat.h> 18234bc7f8SAntonio Nino Diaz #include <platform_def.h> 19ed9653ffSManish V Badarkhe #include <services/arm_arch_svc.h> 201d0ca40eSJavier Almansa Sobrino #include <services/rmm_core_manifest.h> 219d9ae976SOlivier Deprez #if SPM_MM 22aeaa225cSPaul Beesley #include <services/spm_mm_partition.h> 239d9ae976SOlivier Deprez #endif 2409d40e0eSAntonio Nino Diaz 25ed9653ffSManish V Badarkhe #include <plat/arm/common/arm_config.h> 26*a97bfa5fSAlexeiFedorov #include <plat/arm/common/arm_pas_def.h> 27ed9653ffSManish V Badarkhe #include <plat/arm/common/plat_arm.h> 28ed9653ffSManish V Badarkhe #include <plat/common/platform.h> 29ed9653ffSManish V Badarkhe 301af540efSRoberto Vargas #include "fvp_private.h" 313e4b8fdcSSoby Mathew 323e4b8fdcSSoby Mathew /* Defines for GIC Driver build time selection */ 333e4b8fdcSSoby Mathew #define FVP_GICV2 1 343e4b8fdcSSoby Mathew #define FVP_GICV3 2 353e4b8fdcSSoby Mathew 363e4b8fdcSSoby Mathew /******************************************************************************* 373e4b8fdcSSoby Mathew * arm_config holds the characteristics of the differences between the three FVP 383e4b8fdcSSoby Mathew * platforms (Base, A53_A57 & Foundation). It will be populated during cold boot 393e4b8fdcSSoby Mathew * at each boot stage by the primary before enabling the MMU (to allow 403e4b8fdcSSoby Mathew * interconnect configuration) & used thereafter. Each BL will have its own copy 413e4b8fdcSSoby Mathew * to allow independent operation. 423e4b8fdcSSoby Mathew ******************************************************************************/ 433e4b8fdcSSoby Mathew arm_config_t arm_config; 443e4b8fdcSSoby Mathew 453e4b8fdcSSoby Mathew #define MAP_DEVICE0 MAP_REGION_FLAT(DEVICE0_BASE, \ 463e4b8fdcSSoby Mathew DEVICE0_SIZE, \ 473e4b8fdcSSoby Mathew MT_DEVICE | MT_RW | MT_SECURE) 483e4b8fdcSSoby Mathew 493e4b8fdcSSoby Mathew #define MAP_DEVICE1 MAP_REGION_FLAT(DEVICE1_BASE, \ 503e4b8fdcSSoby Mathew DEVICE1_SIZE, \ 513e4b8fdcSSoby Mathew MT_DEVICE | MT_RW | MT_SECURE) 523e4b8fdcSSoby Mathew 53f98630fbSManish V Badarkhe #if FVP_GICR_REGION_PROTECTION 54f98630fbSManish V Badarkhe #define MAP_GICD_MEM MAP_REGION_FLAT(BASE_GICD_BASE, \ 55f98630fbSManish V Badarkhe BASE_GICD_SIZE, \ 56f98630fbSManish V Badarkhe MT_DEVICE | MT_RW | MT_SECURE) 57f98630fbSManish V Badarkhe 58f98630fbSManish V Badarkhe /* Map all core's redistributor memory as read-only. After boots up, 59f98630fbSManish V Badarkhe * per-core map its redistributor memory as read-write */ 60f98630fbSManish V Badarkhe #define MAP_GICR_MEM MAP_REGION_FLAT(BASE_GICR_BASE, \ 61f98630fbSManish V Badarkhe (BASE_GICR_SIZE * PLATFORM_CORE_COUNT),\ 62f98630fbSManish V Badarkhe MT_DEVICE | MT_RO | MT_SECURE) 63f98630fbSManish V Badarkhe #endif /* FVP_GICR_REGION_PROTECTION */ 64f98630fbSManish V Badarkhe 65284c3d67SSandrine Bailleux /* 66284c3d67SSandrine Bailleux * Need to be mapped with write permissions in order to set a new non-volatile 67284c3d67SSandrine Bailleux * counter value. 68284c3d67SSandrine Bailleux */ 693e4b8fdcSSoby Mathew #define MAP_DEVICE2 MAP_REGION_FLAT(DEVICE2_BASE, \ 703e4b8fdcSSoby Mathew DEVICE2_SIZE, \ 71fe7de035SAntonio Nino Diaz MT_DEVICE | MT_RW | MT_SECURE) 723e4b8fdcSSoby Mathew 733e4b8fdcSSoby Mathew /* 74b5fa6563SSandrine Bailleux * Table of memory regions for various BL stages to map using the MMU. 750916c38dSRoberto Vargas * This doesn't include Trusted SRAM as setup_page_tables() already takes care 760916c38dSRoberto Vargas * of mapping it. 773e4b8fdcSSoby Mathew */ 783d8256b2SMasahiro Yamada #ifdef IMAGE_BL1 793e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 803e4b8fdcSSoby Mathew ARM_MAP_SHARED_RAM, 8179d8be3cSManish V Badarkhe V2M_MAP_FLASH0_RO, 823e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 833e4b8fdcSSoby Mathew MAP_DEVICE0, 84e0cea783SManish V Badarkhe #if FVP_INTERCONNECT_DRIVER == FVP_CCN 853e4b8fdcSSoby Mathew MAP_DEVICE1, 86e0cea783SManish V Badarkhe #endif 873e4b8fdcSSoby Mathew #if TRUSTED_BOARD_BOOT 88284c3d67SSandrine Bailleux /* To access the Root of Trust Public Key registers. */ 89284c3d67SSandrine Bailleux MAP_DEVICE2, 90284c3d67SSandrine Bailleux /* Map DRAM to authenticate NS_BL2U image. */ 913e4b8fdcSSoby Mathew ARM_MAP_NS_DRAM1, 923e4b8fdcSSoby Mathew #endif 933e4b8fdcSSoby Mathew {0} 943e4b8fdcSSoby Mathew }; 953e4b8fdcSSoby Mathew #endif 963d8256b2SMasahiro Yamada #ifdef IMAGE_BL2 973e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 983e4b8fdcSSoby Mathew ARM_MAP_SHARED_RAM, 993e4b8fdcSSoby Mathew V2M_MAP_FLASH0_RW, 1003e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 1013e4b8fdcSSoby Mathew MAP_DEVICE0, 102e0cea783SManish V Badarkhe #if FVP_INTERCONNECT_DRIVER == FVP_CCN 1033e4b8fdcSSoby Mathew MAP_DEVICE1, 104e0cea783SManish V Badarkhe #endif 1053e4b8fdcSSoby Mathew ARM_MAP_NS_DRAM1, 106402b3cf8SJulius Werner #ifdef __aarch64__ 107b09ba056SRoberto Vargas ARM_MAP_DRAM2, 108b09ba056SRoberto Vargas #endif 10939f0b86aSManish V Badarkhe /* 11039f0b86aSManish V Badarkhe * Required to load HW_CONFIG, SPMC and SPs to trusted DRAM. 11139f0b86aSManish V Badarkhe */ 11264758c97SAchin Gupta ARM_MAP_TRUSTED_DRAM, 113c8720729SZelalem Aweke #if ENABLE_RME 114c8720729SZelalem Aweke ARM_MAP_RMM_DRAM, 115c8720729SZelalem Aweke ARM_MAP_GPT_L1_DRAM, 116c8720729SZelalem Aweke #endif /* ENABLE_RME */ 1173eb2d672SSandrine Bailleux #ifdef SPD_tspd 1183e4b8fdcSSoby Mathew ARM_MAP_TSP_SEC_MEM, 1193eb2d672SSandrine Bailleux #endif 120284c3d67SSandrine Bailleux #if TRUSTED_BOARD_BOOT 121284c3d67SSandrine Bailleux /* To access the Root of Trust Public Key registers. */ 122284c3d67SSandrine Bailleux MAP_DEVICE2, 123ba597da7SJohn Tsichritzis #endif /* TRUSTED_BOARD_BOOT */ 12488c51c3fSManish V Badarkhe 12588c51c3fSManish V Badarkhe #if CRYPTO_SUPPORT && !BL2_AT_EL3 12688c51c3fSManish V Badarkhe /* 12788c51c3fSManish V Badarkhe * To access shared the Mbed TLS heap while booting the 12888c51c3fSManish V Badarkhe * system with Crypto support 12988c51c3fSManish V Badarkhe */ 13088c51c3fSManish V Badarkhe ARM_MAP_BL1_RW, 13188c51c3fSManish V Badarkhe #endif /* CRYPTO_SUPPORT && !BL2_AT_EL3 */ 13244639ab7SMarc Bonnici #if SPM_MM || SPMC_AT_EL3 133e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_MMAP, 134e29efeb1SAntonio Nino Diaz #endif 1353e4b8fdcSSoby Mathew #if ARM_BL31_IN_DRAM 1363e4b8fdcSSoby Mathew ARM_MAP_BL31_SEC_DRAM, 1373e4b8fdcSSoby Mathew #endif 138810d9213SJens Wiklander #ifdef SPD_opteed 139b3ba6fdaSSoby Mathew ARM_MAP_OPTEE_CORE_MEM, 140810d9213SJens Wiklander ARM_OPTEE_PAGEABLE_LOAD_MEM, 141810d9213SJens Wiklander #endif 1423e4b8fdcSSoby Mathew {0} 1433e4b8fdcSSoby Mathew }; 1443e4b8fdcSSoby Mathew #endif 1453d8256b2SMasahiro Yamada #ifdef IMAGE_BL2U 1463e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 1473e4b8fdcSSoby Mathew MAP_DEVICE0, 1483e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 1493e4b8fdcSSoby Mathew {0} 1503e4b8fdcSSoby Mathew }; 1513e4b8fdcSSoby Mathew #endif 1523d8256b2SMasahiro Yamada #ifdef IMAGE_BL31 1533e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 1543e4b8fdcSSoby Mathew ARM_MAP_SHARED_RAM, 155992f091bSAmbroise Vincent #if USE_DEBUGFS 156992f091bSAmbroise Vincent /* Required by devfip, can be removed if devfip is not used */ 157992f091bSAmbroise Vincent V2M_MAP_FLASH0_RW, 158992f091bSAmbroise Vincent #endif /* USE_DEBUGFS */ 159e35a3fb5SSoby Mathew ARM_MAP_EL3_TZC_DRAM, 1603e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 1613e4b8fdcSSoby Mathew MAP_DEVICE0, 162f98630fbSManish V Badarkhe #if FVP_GICR_REGION_PROTECTION 163f98630fbSManish V Badarkhe MAP_GICD_MEM, 164f98630fbSManish V Badarkhe MAP_GICR_MEM, 165f98630fbSManish V Badarkhe #else 1663e4b8fdcSSoby Mathew MAP_DEVICE1, 167f98630fbSManish V Badarkhe #endif /* FVP_GICR_REGION_PROTECTION */ 168f145403cSRoberto Vargas ARM_V2M_MAP_MEM_PROTECT, 1693f3c341aSPaul Beesley #if SPM_MM 170e29efeb1SAntonio Nino Diaz ARM_SPM_BUF_EL3_MMAP, 171e29efeb1SAntonio Nino Diaz #endif 172c8720729SZelalem Aweke #if ENABLE_RME 173c8720729SZelalem Aweke ARM_MAP_GPT_L1_DRAM, 1748c980a4aSJavier Almansa Sobrino ARM_MAP_EL3_RMM_SHARED_MEM, 175c8720729SZelalem Aweke #endif 1763e4b8fdcSSoby Mathew {0} 1773e4b8fdcSSoby Mathew }; 178e29efeb1SAntonio Nino Diaz 1793f3c341aSPaul Beesley #if defined(IMAGE_BL31) && SPM_MM 180e29efeb1SAntonio Nino Diaz const mmap_region_t plat_arm_secure_partition_mmap[] = { 181e29efeb1SAntonio Nino Diaz V2M_MAP_IOFPGA_EL0, /* for the UART */ 182c4fa1739SSandrine Bailleux MAP_REGION_FLAT(DEVICE0_BASE, \ 183c4fa1739SSandrine Bailleux DEVICE0_SIZE, \ 184c4fa1739SSandrine Bailleux MT_DEVICE | MT_RO | MT_SECURE | MT_USER), 185e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_MMAP, 186e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_NS_BUF_MMAP, 187e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_RW_MMAP, 188e29efeb1SAntonio Nino Diaz ARM_SPM_BUF_EL0_MMAP, 189e29efeb1SAntonio Nino Diaz {0} 190e29efeb1SAntonio Nino Diaz }; 191e29efeb1SAntonio Nino Diaz #endif 1923e4b8fdcSSoby Mathew #endif 1933d8256b2SMasahiro Yamada #ifdef IMAGE_BL32 1943e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = { 195402b3cf8SJulius Werner #ifndef __aarch64__ 196877cf3ffSSoby Mathew ARM_MAP_SHARED_RAM, 197950c6956SJoel Hutton ARM_V2M_MAP_MEM_PROTECT, 198877cf3ffSSoby Mathew #endif 1993e4b8fdcSSoby Mathew V2M_MAP_IOFPGA, 2003e4b8fdcSSoby Mathew MAP_DEVICE0, 2013e4b8fdcSSoby Mathew MAP_DEVICE1, 2023e4b8fdcSSoby Mathew {0} 2033e4b8fdcSSoby Mathew }; 2043e4b8fdcSSoby Mathew #endif 2053e4b8fdcSSoby Mathew 2069d870b79SZelalem Aweke #ifdef IMAGE_RMM 2079d870b79SZelalem Aweke const mmap_region_t plat_arm_mmap[] = { 2089d870b79SZelalem Aweke V2M_MAP_IOFPGA, 2099d870b79SZelalem Aweke MAP_DEVICE0, 2109d870b79SZelalem Aweke MAP_DEVICE1, 2119d870b79SZelalem Aweke {0} 2129d870b79SZelalem Aweke }; 2139d870b79SZelalem Aweke #endif 2149d870b79SZelalem Aweke 2153e4b8fdcSSoby Mathew ARM_CASSERT_MMAP 2163e4b8fdcSSoby Mathew 217955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER != FVP_CCN 218955242d8SJeenu Viswambharan static const int fvp_cci400_map[] = { 219955242d8SJeenu Viswambharan PLAT_FVP_CCI400_CLUS0_SL_PORT, 220955242d8SJeenu Viswambharan PLAT_FVP_CCI400_CLUS1_SL_PORT, 221955242d8SJeenu Viswambharan }; 222955242d8SJeenu Viswambharan 223955242d8SJeenu Viswambharan static const int fvp_cci5xx_map[] = { 224955242d8SJeenu Viswambharan PLAT_FVP_CCI5XX_CLUS0_SL_PORT, 225955242d8SJeenu Viswambharan PLAT_FVP_CCI5XX_CLUS1_SL_PORT, 226955242d8SJeenu Viswambharan }; 227955242d8SJeenu Viswambharan 228955242d8SJeenu Viswambharan static unsigned int get_interconnect_master(void) 229955242d8SJeenu Viswambharan { 230955242d8SJeenu Viswambharan unsigned int master; 231955242d8SJeenu Viswambharan u_register_t mpidr; 232955242d8SJeenu Viswambharan 233955242d8SJeenu Viswambharan mpidr = read_mpidr_el1(); 234583e0791SAntonio Nino Diaz master = ((arm_config.flags & ARM_CONFIG_FVP_SHIFTED_AFF) != 0U) ? 235955242d8SJeenu Viswambharan MPIDR_AFFLVL2_VAL(mpidr) : MPIDR_AFFLVL1_VAL(mpidr); 236955242d8SJeenu Viswambharan 237955242d8SJeenu Viswambharan assert(master < FVP_CLUSTER_COUNT); 238955242d8SJeenu Viswambharan return master; 239955242d8SJeenu Viswambharan } 240955242d8SJeenu Viswambharan #endif 2413e4b8fdcSSoby Mathew 2423f3c341aSPaul Beesley #if defined(IMAGE_BL31) && SPM_MM 243e29efeb1SAntonio Nino Diaz /* 244e29efeb1SAntonio Nino Diaz * Boot information passed to a secure partition during initialisation. Linear 245e29efeb1SAntonio Nino Diaz * indices in MP information will be filled at runtime. 246e29efeb1SAntonio Nino Diaz */ 247aeaa225cSPaul Beesley static spm_mm_mp_info_t sp_mp_info[] = { 248e29efeb1SAntonio Nino Diaz [0] = {0x80000000, 0}, 249e29efeb1SAntonio Nino Diaz [1] = {0x80000001, 0}, 250e29efeb1SAntonio Nino Diaz [2] = {0x80000002, 0}, 251e29efeb1SAntonio Nino Diaz [3] = {0x80000003, 0}, 252e29efeb1SAntonio Nino Diaz [4] = {0x80000100, 0}, 253e29efeb1SAntonio Nino Diaz [5] = {0x80000101, 0}, 254e29efeb1SAntonio Nino Diaz [6] = {0x80000102, 0}, 255e29efeb1SAntonio Nino Diaz [7] = {0x80000103, 0}, 256e29efeb1SAntonio Nino Diaz }; 257e29efeb1SAntonio Nino Diaz 258aeaa225cSPaul Beesley const spm_mm_boot_info_t plat_arm_secure_partition_boot_info = { 259e29efeb1SAntonio Nino Diaz .h.type = PARAM_SP_IMAGE_BOOT_INFO, 260e29efeb1SAntonio Nino Diaz .h.version = VERSION_1, 261aeaa225cSPaul Beesley .h.size = sizeof(spm_mm_boot_info_t), 262e29efeb1SAntonio Nino Diaz .h.attr = 0, 263e29efeb1SAntonio Nino Diaz .sp_mem_base = ARM_SP_IMAGE_BASE, 264e29efeb1SAntonio Nino Diaz .sp_mem_limit = ARM_SP_IMAGE_LIMIT, 265e29efeb1SAntonio Nino Diaz .sp_image_base = ARM_SP_IMAGE_BASE, 266e29efeb1SAntonio Nino Diaz .sp_stack_base = PLAT_SP_IMAGE_STACK_BASE, 267e29efeb1SAntonio Nino Diaz .sp_heap_base = ARM_SP_IMAGE_HEAP_BASE, 2680560efb9SArd Biesheuvel .sp_ns_comm_buf_base = PLAT_SP_IMAGE_NS_BUF_BASE, 269e29efeb1SAntonio Nino Diaz .sp_shared_buf_base = PLAT_SPM_BUF_BASE, 270e29efeb1SAntonio Nino Diaz .sp_image_size = ARM_SP_IMAGE_SIZE, 271e29efeb1SAntonio Nino Diaz .sp_pcpu_stack_size = PLAT_SP_IMAGE_STACK_PCPU_SIZE, 272e29efeb1SAntonio Nino Diaz .sp_heap_size = ARM_SP_IMAGE_HEAP_SIZE, 2730560efb9SArd Biesheuvel .sp_ns_comm_buf_size = PLAT_SP_IMAGE_NS_BUF_SIZE, 274e29efeb1SAntonio Nino Diaz .sp_shared_buf_size = PLAT_SPM_BUF_SIZE, 275e29efeb1SAntonio Nino Diaz .num_sp_mem_regions = ARM_SP_IMAGE_NUM_MEM_REGIONS, 276e29efeb1SAntonio Nino Diaz .num_cpus = PLATFORM_CORE_COUNT, 277e29efeb1SAntonio Nino Diaz .mp_info = &sp_mp_info[0], 278e29efeb1SAntonio Nino Diaz }; 279e29efeb1SAntonio Nino Diaz 280e29efeb1SAntonio Nino Diaz const struct mmap_region *plat_get_secure_partition_mmap(void *cookie) 281e29efeb1SAntonio Nino Diaz { 282e29efeb1SAntonio Nino Diaz return plat_arm_secure_partition_mmap; 283e29efeb1SAntonio Nino Diaz } 284e29efeb1SAntonio Nino Diaz 285aeaa225cSPaul Beesley const struct spm_mm_boot_info *plat_get_secure_partition_boot_info( 286e29efeb1SAntonio Nino Diaz void *cookie) 287e29efeb1SAntonio Nino Diaz { 288e29efeb1SAntonio Nino Diaz return &plat_arm_secure_partition_boot_info; 289e29efeb1SAntonio Nino Diaz } 290e29efeb1SAntonio Nino Diaz #endif 291e29efeb1SAntonio Nino Diaz 2923e4b8fdcSSoby Mathew /******************************************************************************* 2933e4b8fdcSSoby Mathew * A single boot loader stack is expected to work on both the Foundation FVP 2943e4b8fdcSSoby Mathew * models and the two flavours of the Base FVP models (AEMv8 & Cortex). The 2953e4b8fdcSSoby Mathew * SYS_ID register provides a mechanism for detecting the differences between 2963e4b8fdcSSoby Mathew * these platforms. This information is stored in a per-BL array to allow the 2973e4b8fdcSSoby Mathew * code to take the correct path.Per BL platform configuration. 2983e4b8fdcSSoby Mathew ******************************************************************************/ 2994d010d0dSDaniel Boulby void __init fvp_config_setup(void) 3003e4b8fdcSSoby Mathew { 3013e4b8fdcSSoby Mathew unsigned int rev, hbi, bld, arch, sys_id; 3023e4b8fdcSSoby Mathew 3033e4b8fdcSSoby Mathew sys_id = mmio_read_32(V2M_SYSREGS_BASE + V2M_SYS_ID); 3043e4b8fdcSSoby Mathew rev = (sys_id >> V2M_SYS_ID_REV_SHIFT) & V2M_SYS_ID_REV_MASK; 3053e4b8fdcSSoby Mathew hbi = (sys_id >> V2M_SYS_ID_HBI_SHIFT) & V2M_SYS_ID_HBI_MASK; 3063e4b8fdcSSoby Mathew bld = (sys_id >> V2M_SYS_ID_BLD_SHIFT) & V2M_SYS_ID_BLD_MASK; 3073e4b8fdcSSoby Mathew arch = (sys_id >> V2M_SYS_ID_ARCH_SHIFT) & V2M_SYS_ID_ARCH_MASK; 3083e4b8fdcSSoby Mathew 3093e4b8fdcSSoby Mathew if (arch != ARCH_MODEL) { 3103e4b8fdcSSoby Mathew ERROR("This firmware is for FVP models\n"); 3113e4b8fdcSSoby Mathew panic(); 3123e4b8fdcSSoby Mathew } 3133e4b8fdcSSoby Mathew 3143e4b8fdcSSoby Mathew /* 3153e4b8fdcSSoby Mathew * The build field in the SYS_ID tells which variant of the GIC 3163e4b8fdcSSoby Mathew * memory is implemented by the model. 3173e4b8fdcSSoby Mathew */ 3183e4b8fdcSSoby Mathew switch (bld) { 3193e4b8fdcSSoby Mathew case BLD_GIC_VE_MMAP: 32021a3973dSSoby Mathew ERROR("Legacy Versatile Express memory map for GIC peripheral" 32121a3973dSSoby Mathew " is not supported\n"); 3223e4b8fdcSSoby Mathew panic(); 3233e4b8fdcSSoby Mathew break; 3243e4b8fdcSSoby Mathew case BLD_GIC_A53A57_MMAP: 3253e4b8fdcSSoby Mathew break; 3263e4b8fdcSSoby Mathew default: 3273e4b8fdcSSoby Mathew ERROR("Unsupported board build %x\n", bld); 3283e4b8fdcSSoby Mathew panic(); 3293e4b8fdcSSoby Mathew } 3303e4b8fdcSSoby Mathew 3313e4b8fdcSSoby Mathew /* 3323e4b8fdcSSoby Mathew * The hbi field in the SYS_ID is 0x020 for the Base FVP & 0x010 3333e4b8fdcSSoby Mathew * for the Foundation FVP. 3343e4b8fdcSSoby Mathew */ 3353e4b8fdcSSoby Mathew switch (hbi) { 3363e4b8fdcSSoby Mathew case HBI_FOUNDATION_FVP: 3373e4b8fdcSSoby Mathew arm_config.flags = 0; 3383e4b8fdcSSoby Mathew 3393e4b8fdcSSoby Mathew /* 3403e4b8fdcSSoby Mathew * Check for supported revisions of Foundation FVP 3413e4b8fdcSSoby Mathew * Allow future revisions to run but emit warning diagnostic 3423e4b8fdcSSoby Mathew */ 3433e4b8fdcSSoby Mathew switch (rev) { 3443e4b8fdcSSoby Mathew case REV_FOUNDATION_FVP_V2_0: 3453e4b8fdcSSoby Mathew case REV_FOUNDATION_FVP_V2_1: 3463e4b8fdcSSoby Mathew case REV_FOUNDATION_FVP_v9_1: 3474faa4a1dSSandrine Bailleux case REV_FOUNDATION_FVP_v9_6: 3483e4b8fdcSSoby Mathew break; 3493e4b8fdcSSoby Mathew default: 3503e4b8fdcSSoby Mathew WARN("Unrecognized Foundation FVP revision %x\n", rev); 3513e4b8fdcSSoby Mathew break; 3523e4b8fdcSSoby Mathew } 3533e4b8fdcSSoby Mathew break; 3543e4b8fdcSSoby Mathew case HBI_BASE_FVP: 355955242d8SJeenu Viswambharan arm_config.flags |= (ARM_CONFIG_BASE_MMAP | ARM_CONFIG_HAS_TZC); 3563e4b8fdcSSoby Mathew 3573e4b8fdcSSoby Mathew /* 3583e4b8fdcSSoby Mathew * Check for supported revisions 3593e4b8fdcSSoby Mathew * Allow future revisions to run but emit warning diagnostic 3603e4b8fdcSSoby Mathew */ 3613e4b8fdcSSoby Mathew switch (rev) { 3623e4b8fdcSSoby Mathew case REV_BASE_FVP_V0: 363955242d8SJeenu Viswambharan arm_config.flags |= ARM_CONFIG_FVP_HAS_CCI400; 364955242d8SJeenu Viswambharan break; 365955242d8SJeenu Viswambharan case REV_BASE_FVP_REVC: 3668431635bSIsla Mitchell arm_config.flags |= (ARM_CONFIG_FVP_HAS_SMMUV3 | 367955242d8SJeenu Viswambharan ARM_CONFIG_FVP_HAS_CCI5XX); 3683e4b8fdcSSoby Mathew break; 3693e4b8fdcSSoby Mathew default: 3703e4b8fdcSSoby Mathew WARN("Unrecognized Base FVP revision %x\n", rev); 3713e4b8fdcSSoby Mathew break; 3723e4b8fdcSSoby Mathew } 3733e4b8fdcSSoby Mathew break; 3743e4b8fdcSSoby Mathew default: 3753e4b8fdcSSoby Mathew ERROR("Unsupported board HBI number 0x%x\n", hbi); 3763e4b8fdcSSoby Mathew panic(); 3773e4b8fdcSSoby Mathew } 3788431635bSIsla Mitchell 3798431635bSIsla Mitchell /* 3808431635bSIsla Mitchell * We assume that the presence of MT bit, and therefore shifted 3818431635bSIsla Mitchell * affinities, is uniform across the platform: either all CPUs, or no 3828431635bSIsla Mitchell * CPUs implement it. 3838431635bSIsla Mitchell */ 384583e0791SAntonio Nino Diaz if ((read_mpidr_el1() & MPIDR_MT_MASK) != 0U) 3858431635bSIsla Mitchell arm_config.flags |= ARM_CONFIG_FVP_SHIFTED_AFF; 3863e4b8fdcSSoby Mathew } 3873e4b8fdcSSoby Mathew 3883e4b8fdcSSoby Mathew 3894d010d0dSDaniel Boulby void __init fvp_interconnect_init(void) 3903e4b8fdcSSoby Mathew { 39171237876SSoby Mathew #if FVP_INTERCONNECT_DRIVER == FVP_CCN 39271237876SSoby Mathew if (ccn_get_part0_id(PLAT_ARM_CCN_BASE) != CCN_502_PART0_ID) { 393583e0791SAntonio Nino Diaz ERROR("Unrecognized CCN variant detected. Only CCN-502 is supported"); 39471237876SSoby Mathew panic(); 39571237876SSoby Mathew } 396955242d8SJeenu Viswambharan 3973e4b8fdcSSoby Mathew plat_arm_interconnect_init(); 398955242d8SJeenu Viswambharan #else 399583e0791SAntonio Nino Diaz uintptr_t cci_base = 0U; 400583e0791SAntonio Nino Diaz const int *cci_map = NULL; 401583e0791SAntonio Nino Diaz unsigned int map_size = 0U; 402955242d8SJeenu Viswambharan 403955242d8SJeenu Viswambharan /* Initialize the right interconnect */ 404583e0791SAntonio Nino Diaz if ((arm_config.flags & ARM_CONFIG_FVP_HAS_CCI5XX) != 0U) { 405955242d8SJeenu Viswambharan cci_base = PLAT_FVP_CCI5XX_BASE; 406955242d8SJeenu Viswambharan cci_map = fvp_cci5xx_map; 407955242d8SJeenu Viswambharan map_size = ARRAY_SIZE(fvp_cci5xx_map); 408583e0791SAntonio Nino Diaz } else if ((arm_config.flags & ARM_CONFIG_FVP_HAS_CCI400) != 0U) { 409955242d8SJeenu Viswambharan cci_base = PLAT_FVP_CCI400_BASE; 410955242d8SJeenu Viswambharan cci_map = fvp_cci400_map; 411955242d8SJeenu Viswambharan map_size = ARRAY_SIZE(fvp_cci400_map); 412583e0791SAntonio Nino Diaz } else { 413583e0791SAntonio Nino Diaz return; 414955242d8SJeenu Viswambharan } 415955242d8SJeenu Viswambharan 416583e0791SAntonio Nino Diaz assert(cci_base != 0U); 417583e0791SAntonio Nino Diaz assert(cci_map != NULL); 418955242d8SJeenu Viswambharan cci_init(cci_base, cci_map, map_size); 419955242d8SJeenu Viswambharan #endif 42071237876SSoby Mathew } 4213e4b8fdcSSoby Mathew 4223e4b8fdcSSoby Mathew void fvp_interconnect_enable(void) 4233e4b8fdcSSoby Mathew { 424955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER == FVP_CCN 4253e4b8fdcSSoby Mathew plat_arm_interconnect_enter_coherency(); 426955242d8SJeenu Viswambharan #else 427955242d8SJeenu Viswambharan unsigned int master; 428955242d8SJeenu Viswambharan 429583e0791SAntonio Nino Diaz if ((arm_config.flags & (ARM_CONFIG_FVP_HAS_CCI400 | 430583e0791SAntonio Nino Diaz ARM_CONFIG_FVP_HAS_CCI5XX)) != 0U) { 431955242d8SJeenu Viswambharan master = get_interconnect_master(); 432955242d8SJeenu Viswambharan cci_enable_snoop_dvm_reqs(master); 433955242d8SJeenu Viswambharan } 434955242d8SJeenu Viswambharan #endif 4353e4b8fdcSSoby Mathew } 4363e4b8fdcSSoby Mathew 4373e4b8fdcSSoby Mathew void fvp_interconnect_disable(void) 4383e4b8fdcSSoby Mathew { 439955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER == FVP_CCN 4403e4b8fdcSSoby Mathew plat_arm_interconnect_exit_coherency(); 441955242d8SJeenu Viswambharan #else 442955242d8SJeenu Viswambharan unsigned int master; 443955242d8SJeenu Viswambharan 444583e0791SAntonio Nino Diaz if ((arm_config.flags & (ARM_CONFIG_FVP_HAS_CCI400 | 445583e0791SAntonio Nino Diaz ARM_CONFIG_FVP_HAS_CCI5XX)) != 0U) { 446955242d8SJeenu Viswambharan master = get_interconnect_master(); 447955242d8SJeenu Viswambharan cci_disable_snoop_dvm_reqs(master); 448955242d8SJeenu Viswambharan } 449955242d8SJeenu Viswambharan #endif 4503e4b8fdcSSoby Mathew } 451ba597da7SJohn Tsichritzis 45288c51c3fSManish V Badarkhe #if CRYPTO_SUPPORT 453ba597da7SJohn Tsichritzis int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size) 454ba597da7SJohn Tsichritzis { 455ba597da7SJohn Tsichritzis assert(heap_addr != NULL); 456ba597da7SJohn Tsichritzis assert(heap_size != NULL); 457ba597da7SJohn Tsichritzis 458ba597da7SJohn Tsichritzis return arm_get_mbedtls_heap(heap_addr, heap_size); 459ba597da7SJohn Tsichritzis } 46088c51c3fSManish V Badarkhe #endif /* CRYPTO_SUPPORT */ 4611b597c22SAlexei Fedorov 4621b597c22SAlexei Fedorov void fvp_timer_init(void) 4631b597c22SAlexei Fedorov { 464fddfb3baSMadhukar Pappireddy #if USE_SP804_TIMER 4651b597c22SAlexei Fedorov /* Enable the clock override for SP804 timer 0, which means that no 4661b597c22SAlexei Fedorov * clock dividers are applied and the raw (35MHz) clock will be used. 4671b597c22SAlexei Fedorov */ 4681b597c22SAlexei Fedorov mmio_write_32(V2M_SP810_BASE, FVP_SP810_CTRL_TIM0_OV); 4691b597c22SAlexei Fedorov 4701b597c22SAlexei Fedorov /* Initialize delay timer driver using SP804 dual timer 0 */ 4711b597c22SAlexei Fedorov sp804_timer_init(V2M_SP804_TIMER0_BASE, 4721b597c22SAlexei Fedorov SP804_TIMER_CLKMULT, SP804_TIMER_CLKDIV); 4731b597c22SAlexei Fedorov #else 4741b597c22SAlexei Fedorov generic_delay_timer_init(); 4751b597c22SAlexei Fedorov 4761b597c22SAlexei Fedorov /* Enable System level generic timer */ 4771b597c22SAlexei Fedorov mmio_write_32(ARM_SYS_CNTCTL_BASE + CNTCR_OFF, 4781b597c22SAlexei Fedorov CNTCR_FCREQ(0U) | CNTCR_EN); 479fddfb3baSMadhukar Pappireddy #endif /* USE_SP804_TIMER */ 4801b597c22SAlexei Fedorov } 481ed9653ffSManish V Badarkhe 482ed9653ffSManish V Badarkhe /***************************************************************************** 483ed9653ffSManish V Badarkhe * plat_is_smccc_feature_available() - This function checks whether SMCCC 484ed9653ffSManish V Badarkhe * feature is availabile for platform. 485ed9653ffSManish V Badarkhe * @fid: SMCCC function id 486ed9653ffSManish V Badarkhe * 487ed9653ffSManish V Badarkhe * Return SMC_ARCH_CALL_SUCCESS if SMCCC feature is available and 488ed9653ffSManish V Badarkhe * SMC_ARCH_CALL_NOT_SUPPORTED otherwise. 489ed9653ffSManish V Badarkhe *****************************************************************************/ 490ed9653ffSManish V Badarkhe int32_t plat_is_smccc_feature_available(u_register_t fid) 491ed9653ffSManish V Badarkhe { 492ed9653ffSManish V Badarkhe switch (fid) { 493ed9653ffSManish V Badarkhe case SMCCC_ARCH_SOC_ID: 494ed9653ffSManish V Badarkhe return SMC_ARCH_CALL_SUCCESS; 495ed9653ffSManish V Badarkhe default: 496ed9653ffSManish V Badarkhe return SMC_ARCH_CALL_NOT_SUPPORTED; 497ed9653ffSManish V Badarkhe } 498ed9653ffSManish V Badarkhe } 499ed9653ffSManish V Badarkhe 500ed9653ffSManish V Badarkhe /* Get SOC version */ 501ed9653ffSManish V Badarkhe int32_t plat_get_soc_version(void) 502ed9653ffSManish V Badarkhe { 503ed9653ffSManish V Badarkhe return (int32_t) 504dfff4686SYann Gautier (SOC_ID_SET_JEP_106(ARM_SOC_CONTINUATION_CODE, 505dfff4686SYann Gautier ARM_SOC_IDENTIFICATION_CODE) | 506dfff4686SYann Gautier (FVP_SOC_ID & SOC_ID_IMPL_DEF_MASK)); 507ed9653ffSManish V Badarkhe } 508ed9653ffSManish V Badarkhe 509ed9653ffSManish V Badarkhe /* Get SOC revision */ 510ed9653ffSManish V Badarkhe int32_t plat_get_soc_revision(void) 511ed9653ffSManish V Badarkhe { 512ed9653ffSManish V Badarkhe unsigned int sys_id; 513ed9653ffSManish V Badarkhe 514ed9653ffSManish V Badarkhe sys_id = mmio_read_32(V2M_SYSREGS_BASE + V2M_SYS_ID); 515dfff4686SYann Gautier return (int32_t)(((sys_id >> V2M_SYS_ID_REV_SHIFT) & 516dfff4686SYann Gautier V2M_SYS_ID_REV_MASK) & SOC_ID_REV_MASK); 517ed9653ffSManish V Badarkhe } 5188c980a4aSJavier Almansa Sobrino 5198c980a4aSJavier Almansa Sobrino #if ENABLE_RME 5208c980a4aSJavier Almansa Sobrino /* 5218c980a4aSJavier Almansa Sobrino * Get a pointer to the RMM-EL3 Shared buffer and return it 5228c980a4aSJavier Almansa Sobrino * through the pointer passed as parameter. 5238c980a4aSJavier Almansa Sobrino * 5248c980a4aSJavier Almansa Sobrino * This function returns the size of the shared buffer. 5258c980a4aSJavier Almansa Sobrino */ 5268c980a4aSJavier Almansa Sobrino size_t plat_rmmd_get_el3_rmm_shared_mem(uintptr_t *shared) 5278c980a4aSJavier Almansa Sobrino { 5288c980a4aSJavier Almansa Sobrino *shared = (uintptr_t)RMM_SHARED_BASE; 5298c980a4aSJavier Almansa Sobrino 5308c980a4aSJavier Almansa Sobrino return (size_t)RMM_SHARED_SIZE; 5318c980a4aSJavier Almansa Sobrino } 5321d0ca40eSJavier Almansa Sobrino 533*a97bfa5fSAlexeiFedorov CASSERT(ARM_DRAM_BANKS_NUM == 2UL, ARM_DRAM_BANKS_NUM_mismatch); 534*a97bfa5fSAlexeiFedorov 535*a97bfa5fSAlexeiFedorov /* FVP DRAM banks */ 536*a97bfa5fSAlexeiFedorov const struct dram_bank fvp_dram_banks[ARM_DRAM_BANKS_NUM] = { 537*a97bfa5fSAlexeiFedorov {ARM_PAS_2_BASE, ARM_PAS_2_SIZE}, 538*a97bfa5fSAlexeiFedorov {ARM_PAS_4_BASE, ARM_PAS_4_SIZE} 539*a97bfa5fSAlexeiFedorov }; 540*a97bfa5fSAlexeiFedorov 541*a97bfa5fSAlexeiFedorov int plat_rmmd_load_manifest(struct rmm_manifest *manifest) 5421d0ca40eSJavier Almansa Sobrino { 543*a97bfa5fSAlexeiFedorov uint64_t check_sum; 544*a97bfa5fSAlexeiFedorov struct dram_bank *bank_ptr; 545*a97bfa5fSAlexeiFedorov 5461d0ca40eSJavier Almansa Sobrino assert(manifest != NULL); 5471d0ca40eSJavier Almansa Sobrino 5481d0ca40eSJavier Almansa Sobrino manifest->version = RMMD_MANIFEST_VERSION; 549dc0ca64eSJavier Almansa Sobrino manifest->padding = 0U; /* RES0 */ 5501d0ca40eSJavier Almansa Sobrino manifest->plat_data = (uintptr_t)NULL; 551*a97bfa5fSAlexeiFedorov manifest->plat_dram.banks_num = ARM_DRAM_BANKS_NUM; 552*a97bfa5fSAlexeiFedorov 553*a97bfa5fSAlexeiFedorov /* Array dram_banks[] follows dram_info structure */ 554*a97bfa5fSAlexeiFedorov bank_ptr = (struct dram_bank *) 555*a97bfa5fSAlexeiFedorov ((uintptr_t)&manifest->plat_dram.check_sum + 556*a97bfa5fSAlexeiFedorov sizeof(manifest->plat_dram.check_sum)); 557*a97bfa5fSAlexeiFedorov 558*a97bfa5fSAlexeiFedorov manifest->plat_dram.dram_data = bank_ptr; 559*a97bfa5fSAlexeiFedorov 560*a97bfa5fSAlexeiFedorov /* Copy FVP DRAM banks data to Boot Manifest */ 561*a97bfa5fSAlexeiFedorov (void)memcpy((void *)bank_ptr, &fvp_dram_banks, sizeof(fvp_dram_banks)); 562*a97bfa5fSAlexeiFedorov 563*a97bfa5fSAlexeiFedorov /* Calculate check sum of plat_dram structure */ 564*a97bfa5fSAlexeiFedorov check_sum = ARM_DRAM_BANKS_NUM + (uint64_t)bank_ptr; 565*a97bfa5fSAlexeiFedorov 566*a97bfa5fSAlexeiFedorov for (unsigned long i = 0UL; i < ARM_DRAM_BANKS_NUM; i++) { 567*a97bfa5fSAlexeiFedorov check_sum += bank_ptr[i].base + bank_ptr[i].size; 568*a97bfa5fSAlexeiFedorov } 569*a97bfa5fSAlexeiFedorov 570*a97bfa5fSAlexeiFedorov /* Check sum must be 0 */ 571*a97bfa5fSAlexeiFedorov manifest->plat_dram.check_sum = ~check_sum + 1UL; 5721d0ca40eSJavier Almansa Sobrino 5731d0ca40eSJavier Almansa Sobrino return 0; 5741d0ca40eSJavier Almansa Sobrino } 575*a97bfa5fSAlexeiFedorov #endif /* ENABLE_RME */ 576