xref: /rk3399_ARM-atf/plat/arm/board/fvp/fvp_common.c (revision a97bfa5ff18b2682e3b9c528cbd5fb16ceec3393)
13e4b8fdcSSoby Mathew /*
288c51c3fSManish V Badarkhe  * Copyright (c) 2013-2022, Arm Limited and Contributors. All rights reserved.
33e4b8fdcSSoby Mathew  *
482cb2c1aSdp-arm  * SPDX-License-Identifier: BSD-3-Clause
53e4b8fdcSSoby Mathew  */
63e4b8fdcSSoby Mathew 
709d40e0eSAntonio Nino Diaz #include <assert.h>
809d40e0eSAntonio Nino Diaz 
909d40e0eSAntonio Nino Diaz #include <common/debug.h>
1009d40e0eSAntonio Nino Diaz #include <drivers/arm/cci.h>
1109d40e0eSAntonio Nino Diaz #include <drivers/arm/ccn.h>
1209d40e0eSAntonio Nino Diaz #include <drivers/arm/gicv2.h>
131b597c22SAlexei Fedorov #include <drivers/arm/sp804_delay_timer.h>
141b597c22SAlexei Fedorov #include <drivers/generic_delay_timer.h>
1509d40e0eSAntonio Nino Diaz #include <lib/mmio.h>
16ed9653ffSManish V Badarkhe #include <lib/smccc.h>
1709d40e0eSAntonio Nino Diaz #include <lib/xlat_tables/xlat_tables_compat.h>
18234bc7f8SAntonio Nino Diaz #include <platform_def.h>
19ed9653ffSManish V Badarkhe #include <services/arm_arch_svc.h>
201d0ca40eSJavier Almansa Sobrino #include <services/rmm_core_manifest.h>
219d9ae976SOlivier Deprez #if SPM_MM
22aeaa225cSPaul Beesley #include <services/spm_mm_partition.h>
239d9ae976SOlivier Deprez #endif
2409d40e0eSAntonio Nino Diaz 
25ed9653ffSManish V Badarkhe #include <plat/arm/common/arm_config.h>
26*a97bfa5fSAlexeiFedorov #include <plat/arm/common/arm_pas_def.h>
27ed9653ffSManish V Badarkhe #include <plat/arm/common/plat_arm.h>
28ed9653ffSManish V Badarkhe #include <plat/common/platform.h>
29ed9653ffSManish V Badarkhe 
301af540efSRoberto Vargas #include "fvp_private.h"
313e4b8fdcSSoby Mathew 
323e4b8fdcSSoby Mathew /* Defines for GIC Driver build time selection */
333e4b8fdcSSoby Mathew #define FVP_GICV2		1
343e4b8fdcSSoby Mathew #define FVP_GICV3		2
353e4b8fdcSSoby Mathew 
363e4b8fdcSSoby Mathew /*******************************************************************************
373e4b8fdcSSoby Mathew  * arm_config holds the characteristics of the differences between the three FVP
383e4b8fdcSSoby Mathew  * platforms (Base, A53_A57 & Foundation). It will be populated during cold boot
393e4b8fdcSSoby Mathew  * at each boot stage by the primary before enabling the MMU (to allow
403e4b8fdcSSoby Mathew  * interconnect configuration) & used thereafter. Each BL will have its own copy
413e4b8fdcSSoby Mathew  * to allow independent operation.
423e4b8fdcSSoby Mathew  ******************************************************************************/
433e4b8fdcSSoby Mathew arm_config_t arm_config;
443e4b8fdcSSoby Mathew 
453e4b8fdcSSoby Mathew #define MAP_DEVICE0	MAP_REGION_FLAT(DEVICE0_BASE,			\
463e4b8fdcSSoby Mathew 					DEVICE0_SIZE,			\
473e4b8fdcSSoby Mathew 					MT_DEVICE | MT_RW | MT_SECURE)
483e4b8fdcSSoby Mathew 
493e4b8fdcSSoby Mathew #define MAP_DEVICE1	MAP_REGION_FLAT(DEVICE1_BASE,			\
503e4b8fdcSSoby Mathew 					DEVICE1_SIZE,			\
513e4b8fdcSSoby Mathew 					MT_DEVICE | MT_RW | MT_SECURE)
523e4b8fdcSSoby Mathew 
53f98630fbSManish V Badarkhe #if FVP_GICR_REGION_PROTECTION
54f98630fbSManish V Badarkhe #define MAP_GICD_MEM	MAP_REGION_FLAT(BASE_GICD_BASE,			\
55f98630fbSManish V Badarkhe 					BASE_GICD_SIZE,			\
56f98630fbSManish V Badarkhe 					MT_DEVICE | MT_RW | MT_SECURE)
57f98630fbSManish V Badarkhe 
58f98630fbSManish V Badarkhe /* Map all core's redistributor memory as read-only. After boots up,
59f98630fbSManish V Badarkhe  * per-core map its redistributor memory as read-write */
60f98630fbSManish V Badarkhe #define MAP_GICR_MEM	MAP_REGION_FLAT(BASE_GICR_BASE,			\
61f98630fbSManish V Badarkhe 					(BASE_GICR_SIZE * PLATFORM_CORE_COUNT),\
62f98630fbSManish V Badarkhe 					MT_DEVICE | MT_RO | MT_SECURE)
63f98630fbSManish V Badarkhe #endif /* FVP_GICR_REGION_PROTECTION */
64f98630fbSManish V Badarkhe 
65284c3d67SSandrine Bailleux /*
66284c3d67SSandrine Bailleux  * Need to be mapped with write permissions in order to set a new non-volatile
67284c3d67SSandrine Bailleux  * counter value.
68284c3d67SSandrine Bailleux  */
693e4b8fdcSSoby Mathew #define MAP_DEVICE2	MAP_REGION_FLAT(DEVICE2_BASE,			\
703e4b8fdcSSoby Mathew 					DEVICE2_SIZE,			\
71fe7de035SAntonio Nino Diaz 					MT_DEVICE | MT_RW | MT_SECURE)
723e4b8fdcSSoby Mathew 
733e4b8fdcSSoby Mathew /*
74b5fa6563SSandrine Bailleux  * Table of memory regions for various BL stages to map using the MMU.
750916c38dSRoberto Vargas  * This doesn't include Trusted SRAM as setup_page_tables() already takes care
760916c38dSRoberto Vargas  * of mapping it.
773e4b8fdcSSoby Mathew  */
783d8256b2SMasahiro Yamada #ifdef IMAGE_BL1
793e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = {
803e4b8fdcSSoby Mathew 	ARM_MAP_SHARED_RAM,
8179d8be3cSManish V Badarkhe 	V2M_MAP_FLASH0_RO,
823e4b8fdcSSoby Mathew 	V2M_MAP_IOFPGA,
833e4b8fdcSSoby Mathew 	MAP_DEVICE0,
84e0cea783SManish V Badarkhe #if FVP_INTERCONNECT_DRIVER == FVP_CCN
853e4b8fdcSSoby Mathew 	MAP_DEVICE1,
86e0cea783SManish V Badarkhe #endif
873e4b8fdcSSoby Mathew #if TRUSTED_BOARD_BOOT
88284c3d67SSandrine Bailleux 	/* To access the Root of Trust Public Key registers. */
89284c3d67SSandrine Bailleux 	MAP_DEVICE2,
90284c3d67SSandrine Bailleux 	/* Map DRAM to authenticate NS_BL2U image. */
913e4b8fdcSSoby Mathew 	ARM_MAP_NS_DRAM1,
923e4b8fdcSSoby Mathew #endif
933e4b8fdcSSoby Mathew 	{0}
943e4b8fdcSSoby Mathew };
953e4b8fdcSSoby Mathew #endif
963d8256b2SMasahiro Yamada #ifdef IMAGE_BL2
973e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = {
983e4b8fdcSSoby Mathew 	ARM_MAP_SHARED_RAM,
993e4b8fdcSSoby Mathew 	V2M_MAP_FLASH0_RW,
1003e4b8fdcSSoby Mathew 	V2M_MAP_IOFPGA,
1013e4b8fdcSSoby Mathew 	MAP_DEVICE0,
102e0cea783SManish V Badarkhe #if FVP_INTERCONNECT_DRIVER == FVP_CCN
1033e4b8fdcSSoby Mathew 	MAP_DEVICE1,
104e0cea783SManish V Badarkhe #endif
1053e4b8fdcSSoby Mathew 	ARM_MAP_NS_DRAM1,
106402b3cf8SJulius Werner #ifdef __aarch64__
107b09ba056SRoberto Vargas 	ARM_MAP_DRAM2,
108b09ba056SRoberto Vargas #endif
10939f0b86aSManish V Badarkhe 	/*
11039f0b86aSManish V Badarkhe 	 * Required to load HW_CONFIG, SPMC and SPs to trusted DRAM.
11139f0b86aSManish V Badarkhe 	 */
11264758c97SAchin Gupta 	ARM_MAP_TRUSTED_DRAM,
113c8720729SZelalem Aweke #if ENABLE_RME
114c8720729SZelalem Aweke 	ARM_MAP_RMM_DRAM,
115c8720729SZelalem Aweke 	ARM_MAP_GPT_L1_DRAM,
116c8720729SZelalem Aweke #endif /* ENABLE_RME */
1173eb2d672SSandrine Bailleux #ifdef SPD_tspd
1183e4b8fdcSSoby Mathew 	ARM_MAP_TSP_SEC_MEM,
1193eb2d672SSandrine Bailleux #endif
120284c3d67SSandrine Bailleux #if TRUSTED_BOARD_BOOT
121284c3d67SSandrine Bailleux 	/* To access the Root of Trust Public Key registers. */
122284c3d67SSandrine Bailleux 	MAP_DEVICE2,
123ba597da7SJohn Tsichritzis #endif /* TRUSTED_BOARD_BOOT */
12488c51c3fSManish V Badarkhe 
12588c51c3fSManish V Badarkhe #if CRYPTO_SUPPORT && !BL2_AT_EL3
12688c51c3fSManish V Badarkhe 	/*
12788c51c3fSManish V Badarkhe 	 * To access shared the Mbed TLS heap while booting the
12888c51c3fSManish V Badarkhe 	 * system with Crypto support
12988c51c3fSManish V Badarkhe 	 */
13088c51c3fSManish V Badarkhe 	ARM_MAP_BL1_RW,
13188c51c3fSManish V Badarkhe #endif /* CRYPTO_SUPPORT && !BL2_AT_EL3 */
13244639ab7SMarc Bonnici #if SPM_MM || SPMC_AT_EL3
133e29efeb1SAntonio Nino Diaz 	ARM_SP_IMAGE_MMAP,
134e29efeb1SAntonio Nino Diaz #endif
1353e4b8fdcSSoby Mathew #if ARM_BL31_IN_DRAM
1363e4b8fdcSSoby Mathew 	ARM_MAP_BL31_SEC_DRAM,
1373e4b8fdcSSoby Mathew #endif
138810d9213SJens Wiklander #ifdef SPD_opteed
139b3ba6fdaSSoby Mathew 	ARM_MAP_OPTEE_CORE_MEM,
140810d9213SJens Wiklander 	ARM_OPTEE_PAGEABLE_LOAD_MEM,
141810d9213SJens Wiklander #endif
1423e4b8fdcSSoby Mathew 	{0}
1433e4b8fdcSSoby Mathew };
1443e4b8fdcSSoby Mathew #endif
1453d8256b2SMasahiro Yamada #ifdef IMAGE_BL2U
1463e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = {
1473e4b8fdcSSoby Mathew 	MAP_DEVICE0,
1483e4b8fdcSSoby Mathew 	V2M_MAP_IOFPGA,
1493e4b8fdcSSoby Mathew 	{0}
1503e4b8fdcSSoby Mathew };
1513e4b8fdcSSoby Mathew #endif
1523d8256b2SMasahiro Yamada #ifdef IMAGE_BL31
1533e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = {
1543e4b8fdcSSoby Mathew 	ARM_MAP_SHARED_RAM,
155992f091bSAmbroise Vincent #if USE_DEBUGFS
156992f091bSAmbroise Vincent 	/* Required by devfip, can be removed if devfip is not used */
157992f091bSAmbroise Vincent 	V2M_MAP_FLASH0_RW,
158992f091bSAmbroise Vincent #endif /* USE_DEBUGFS */
159e35a3fb5SSoby Mathew 	ARM_MAP_EL3_TZC_DRAM,
1603e4b8fdcSSoby Mathew 	V2M_MAP_IOFPGA,
1613e4b8fdcSSoby Mathew 	MAP_DEVICE0,
162f98630fbSManish V Badarkhe #if FVP_GICR_REGION_PROTECTION
163f98630fbSManish V Badarkhe 	MAP_GICD_MEM,
164f98630fbSManish V Badarkhe 	MAP_GICR_MEM,
165f98630fbSManish V Badarkhe #else
1663e4b8fdcSSoby Mathew 	MAP_DEVICE1,
167f98630fbSManish V Badarkhe #endif /* FVP_GICR_REGION_PROTECTION */
168f145403cSRoberto Vargas 	ARM_V2M_MAP_MEM_PROTECT,
1693f3c341aSPaul Beesley #if SPM_MM
170e29efeb1SAntonio Nino Diaz 	ARM_SPM_BUF_EL3_MMAP,
171e29efeb1SAntonio Nino Diaz #endif
172c8720729SZelalem Aweke #if ENABLE_RME
173c8720729SZelalem Aweke 	ARM_MAP_GPT_L1_DRAM,
1748c980a4aSJavier Almansa Sobrino 	ARM_MAP_EL3_RMM_SHARED_MEM,
175c8720729SZelalem Aweke #endif
1763e4b8fdcSSoby Mathew 	{0}
1773e4b8fdcSSoby Mathew };
178e29efeb1SAntonio Nino Diaz 
1793f3c341aSPaul Beesley #if defined(IMAGE_BL31) && SPM_MM
180e29efeb1SAntonio Nino Diaz const mmap_region_t plat_arm_secure_partition_mmap[] = {
181e29efeb1SAntonio Nino Diaz 	V2M_MAP_IOFPGA_EL0, /* for the UART */
182c4fa1739SSandrine Bailleux 	MAP_REGION_FLAT(DEVICE0_BASE,				\
183c4fa1739SSandrine Bailleux 			DEVICE0_SIZE,				\
184c4fa1739SSandrine Bailleux 			MT_DEVICE | MT_RO | MT_SECURE | MT_USER),
185e29efeb1SAntonio Nino Diaz 	ARM_SP_IMAGE_MMAP,
186e29efeb1SAntonio Nino Diaz 	ARM_SP_IMAGE_NS_BUF_MMAP,
187e29efeb1SAntonio Nino Diaz 	ARM_SP_IMAGE_RW_MMAP,
188e29efeb1SAntonio Nino Diaz 	ARM_SPM_BUF_EL0_MMAP,
189e29efeb1SAntonio Nino Diaz 	{0}
190e29efeb1SAntonio Nino Diaz };
191e29efeb1SAntonio Nino Diaz #endif
1923e4b8fdcSSoby Mathew #endif
1933d8256b2SMasahiro Yamada #ifdef IMAGE_BL32
1943e4b8fdcSSoby Mathew const mmap_region_t plat_arm_mmap[] = {
195402b3cf8SJulius Werner #ifndef __aarch64__
196877cf3ffSSoby Mathew 	ARM_MAP_SHARED_RAM,
197950c6956SJoel Hutton 	ARM_V2M_MAP_MEM_PROTECT,
198877cf3ffSSoby Mathew #endif
1993e4b8fdcSSoby Mathew 	V2M_MAP_IOFPGA,
2003e4b8fdcSSoby Mathew 	MAP_DEVICE0,
2013e4b8fdcSSoby Mathew 	MAP_DEVICE1,
2023e4b8fdcSSoby Mathew 	{0}
2033e4b8fdcSSoby Mathew };
2043e4b8fdcSSoby Mathew #endif
2053e4b8fdcSSoby Mathew 
2069d870b79SZelalem Aweke #ifdef IMAGE_RMM
2079d870b79SZelalem Aweke const mmap_region_t plat_arm_mmap[] = {
2089d870b79SZelalem Aweke 	V2M_MAP_IOFPGA,
2099d870b79SZelalem Aweke 	MAP_DEVICE0,
2109d870b79SZelalem Aweke 	MAP_DEVICE1,
2119d870b79SZelalem Aweke 	{0}
2129d870b79SZelalem Aweke };
2139d870b79SZelalem Aweke #endif
2149d870b79SZelalem Aweke 
2153e4b8fdcSSoby Mathew ARM_CASSERT_MMAP
2163e4b8fdcSSoby Mathew 
217955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER != FVP_CCN
218955242d8SJeenu Viswambharan static const int fvp_cci400_map[] = {
219955242d8SJeenu Viswambharan 	PLAT_FVP_CCI400_CLUS0_SL_PORT,
220955242d8SJeenu Viswambharan 	PLAT_FVP_CCI400_CLUS1_SL_PORT,
221955242d8SJeenu Viswambharan };
222955242d8SJeenu Viswambharan 
223955242d8SJeenu Viswambharan static const int fvp_cci5xx_map[] = {
224955242d8SJeenu Viswambharan 	PLAT_FVP_CCI5XX_CLUS0_SL_PORT,
225955242d8SJeenu Viswambharan 	PLAT_FVP_CCI5XX_CLUS1_SL_PORT,
226955242d8SJeenu Viswambharan };
227955242d8SJeenu Viswambharan 
228955242d8SJeenu Viswambharan static unsigned int get_interconnect_master(void)
229955242d8SJeenu Viswambharan {
230955242d8SJeenu Viswambharan 	unsigned int master;
231955242d8SJeenu Viswambharan 	u_register_t mpidr;
232955242d8SJeenu Viswambharan 
233955242d8SJeenu Viswambharan 	mpidr = read_mpidr_el1();
234583e0791SAntonio Nino Diaz 	master = ((arm_config.flags & ARM_CONFIG_FVP_SHIFTED_AFF) != 0U) ?
235955242d8SJeenu Viswambharan 		MPIDR_AFFLVL2_VAL(mpidr) : MPIDR_AFFLVL1_VAL(mpidr);
236955242d8SJeenu Viswambharan 
237955242d8SJeenu Viswambharan 	assert(master < FVP_CLUSTER_COUNT);
238955242d8SJeenu Viswambharan 	return master;
239955242d8SJeenu Viswambharan }
240955242d8SJeenu Viswambharan #endif
2413e4b8fdcSSoby Mathew 
2423f3c341aSPaul Beesley #if defined(IMAGE_BL31) && SPM_MM
243e29efeb1SAntonio Nino Diaz /*
244e29efeb1SAntonio Nino Diaz  * Boot information passed to a secure partition during initialisation. Linear
245e29efeb1SAntonio Nino Diaz  * indices in MP information will be filled at runtime.
246e29efeb1SAntonio Nino Diaz  */
247aeaa225cSPaul Beesley static spm_mm_mp_info_t sp_mp_info[] = {
248e29efeb1SAntonio Nino Diaz 	[0] = {0x80000000, 0},
249e29efeb1SAntonio Nino Diaz 	[1] = {0x80000001, 0},
250e29efeb1SAntonio Nino Diaz 	[2] = {0x80000002, 0},
251e29efeb1SAntonio Nino Diaz 	[3] = {0x80000003, 0},
252e29efeb1SAntonio Nino Diaz 	[4] = {0x80000100, 0},
253e29efeb1SAntonio Nino Diaz 	[5] = {0x80000101, 0},
254e29efeb1SAntonio Nino Diaz 	[6] = {0x80000102, 0},
255e29efeb1SAntonio Nino Diaz 	[7] = {0x80000103, 0},
256e29efeb1SAntonio Nino Diaz };
257e29efeb1SAntonio Nino Diaz 
258aeaa225cSPaul Beesley const spm_mm_boot_info_t plat_arm_secure_partition_boot_info = {
259e29efeb1SAntonio Nino Diaz 	.h.type              = PARAM_SP_IMAGE_BOOT_INFO,
260e29efeb1SAntonio Nino Diaz 	.h.version           = VERSION_1,
261aeaa225cSPaul Beesley 	.h.size              = sizeof(spm_mm_boot_info_t),
262e29efeb1SAntonio Nino Diaz 	.h.attr              = 0,
263e29efeb1SAntonio Nino Diaz 	.sp_mem_base         = ARM_SP_IMAGE_BASE,
264e29efeb1SAntonio Nino Diaz 	.sp_mem_limit        = ARM_SP_IMAGE_LIMIT,
265e29efeb1SAntonio Nino Diaz 	.sp_image_base       = ARM_SP_IMAGE_BASE,
266e29efeb1SAntonio Nino Diaz 	.sp_stack_base       = PLAT_SP_IMAGE_STACK_BASE,
267e29efeb1SAntonio Nino Diaz 	.sp_heap_base        = ARM_SP_IMAGE_HEAP_BASE,
2680560efb9SArd Biesheuvel 	.sp_ns_comm_buf_base = PLAT_SP_IMAGE_NS_BUF_BASE,
269e29efeb1SAntonio Nino Diaz 	.sp_shared_buf_base  = PLAT_SPM_BUF_BASE,
270e29efeb1SAntonio Nino Diaz 	.sp_image_size       = ARM_SP_IMAGE_SIZE,
271e29efeb1SAntonio Nino Diaz 	.sp_pcpu_stack_size  = PLAT_SP_IMAGE_STACK_PCPU_SIZE,
272e29efeb1SAntonio Nino Diaz 	.sp_heap_size        = ARM_SP_IMAGE_HEAP_SIZE,
2730560efb9SArd Biesheuvel 	.sp_ns_comm_buf_size = PLAT_SP_IMAGE_NS_BUF_SIZE,
274e29efeb1SAntonio Nino Diaz 	.sp_shared_buf_size  = PLAT_SPM_BUF_SIZE,
275e29efeb1SAntonio Nino Diaz 	.num_sp_mem_regions  = ARM_SP_IMAGE_NUM_MEM_REGIONS,
276e29efeb1SAntonio Nino Diaz 	.num_cpus            = PLATFORM_CORE_COUNT,
277e29efeb1SAntonio Nino Diaz 	.mp_info             = &sp_mp_info[0],
278e29efeb1SAntonio Nino Diaz };
279e29efeb1SAntonio Nino Diaz 
280e29efeb1SAntonio Nino Diaz const struct mmap_region *plat_get_secure_partition_mmap(void *cookie)
281e29efeb1SAntonio Nino Diaz {
282e29efeb1SAntonio Nino Diaz 	return plat_arm_secure_partition_mmap;
283e29efeb1SAntonio Nino Diaz }
284e29efeb1SAntonio Nino Diaz 
285aeaa225cSPaul Beesley const struct spm_mm_boot_info *plat_get_secure_partition_boot_info(
286e29efeb1SAntonio Nino Diaz 		void *cookie)
287e29efeb1SAntonio Nino Diaz {
288e29efeb1SAntonio Nino Diaz 	return &plat_arm_secure_partition_boot_info;
289e29efeb1SAntonio Nino Diaz }
290e29efeb1SAntonio Nino Diaz #endif
291e29efeb1SAntonio Nino Diaz 
2923e4b8fdcSSoby Mathew /*******************************************************************************
2933e4b8fdcSSoby Mathew  * A single boot loader stack is expected to work on both the Foundation FVP
2943e4b8fdcSSoby Mathew  * models and the two flavours of the Base FVP models (AEMv8 & Cortex). The
2953e4b8fdcSSoby Mathew  * SYS_ID register provides a mechanism for detecting the differences between
2963e4b8fdcSSoby Mathew  * these platforms. This information is stored in a per-BL array to allow the
2973e4b8fdcSSoby Mathew  * code to take the correct path.Per BL platform configuration.
2983e4b8fdcSSoby Mathew  ******************************************************************************/
2994d010d0dSDaniel Boulby void __init fvp_config_setup(void)
3003e4b8fdcSSoby Mathew {
3013e4b8fdcSSoby Mathew 	unsigned int rev, hbi, bld, arch, sys_id;
3023e4b8fdcSSoby Mathew 
3033e4b8fdcSSoby Mathew 	sys_id = mmio_read_32(V2M_SYSREGS_BASE + V2M_SYS_ID);
3043e4b8fdcSSoby Mathew 	rev = (sys_id >> V2M_SYS_ID_REV_SHIFT) & V2M_SYS_ID_REV_MASK;
3053e4b8fdcSSoby Mathew 	hbi = (sys_id >> V2M_SYS_ID_HBI_SHIFT) & V2M_SYS_ID_HBI_MASK;
3063e4b8fdcSSoby Mathew 	bld = (sys_id >> V2M_SYS_ID_BLD_SHIFT) & V2M_SYS_ID_BLD_MASK;
3073e4b8fdcSSoby Mathew 	arch = (sys_id >> V2M_SYS_ID_ARCH_SHIFT) & V2M_SYS_ID_ARCH_MASK;
3083e4b8fdcSSoby Mathew 
3093e4b8fdcSSoby Mathew 	if (arch != ARCH_MODEL) {
3103e4b8fdcSSoby Mathew 		ERROR("This firmware is for FVP models\n");
3113e4b8fdcSSoby Mathew 		panic();
3123e4b8fdcSSoby Mathew 	}
3133e4b8fdcSSoby Mathew 
3143e4b8fdcSSoby Mathew 	/*
3153e4b8fdcSSoby Mathew 	 * The build field in the SYS_ID tells which variant of the GIC
3163e4b8fdcSSoby Mathew 	 * memory is implemented by the model.
3173e4b8fdcSSoby Mathew 	 */
3183e4b8fdcSSoby Mathew 	switch (bld) {
3193e4b8fdcSSoby Mathew 	case BLD_GIC_VE_MMAP:
32021a3973dSSoby Mathew 		ERROR("Legacy Versatile Express memory map for GIC peripheral"
32121a3973dSSoby Mathew 				" is not supported\n");
3223e4b8fdcSSoby Mathew 		panic();
3233e4b8fdcSSoby Mathew 		break;
3243e4b8fdcSSoby Mathew 	case BLD_GIC_A53A57_MMAP:
3253e4b8fdcSSoby Mathew 		break;
3263e4b8fdcSSoby Mathew 	default:
3273e4b8fdcSSoby Mathew 		ERROR("Unsupported board build %x\n", bld);
3283e4b8fdcSSoby Mathew 		panic();
3293e4b8fdcSSoby Mathew 	}
3303e4b8fdcSSoby Mathew 
3313e4b8fdcSSoby Mathew 	/*
3323e4b8fdcSSoby Mathew 	 * The hbi field in the SYS_ID is 0x020 for the Base FVP & 0x010
3333e4b8fdcSSoby Mathew 	 * for the Foundation FVP.
3343e4b8fdcSSoby Mathew 	 */
3353e4b8fdcSSoby Mathew 	switch (hbi) {
3363e4b8fdcSSoby Mathew 	case HBI_FOUNDATION_FVP:
3373e4b8fdcSSoby Mathew 		arm_config.flags = 0;
3383e4b8fdcSSoby Mathew 
3393e4b8fdcSSoby Mathew 		/*
3403e4b8fdcSSoby Mathew 		 * Check for supported revisions of Foundation FVP
3413e4b8fdcSSoby Mathew 		 * Allow future revisions to run but emit warning diagnostic
3423e4b8fdcSSoby Mathew 		 */
3433e4b8fdcSSoby Mathew 		switch (rev) {
3443e4b8fdcSSoby Mathew 		case REV_FOUNDATION_FVP_V2_0:
3453e4b8fdcSSoby Mathew 		case REV_FOUNDATION_FVP_V2_1:
3463e4b8fdcSSoby Mathew 		case REV_FOUNDATION_FVP_v9_1:
3474faa4a1dSSandrine Bailleux 		case REV_FOUNDATION_FVP_v9_6:
3483e4b8fdcSSoby Mathew 			break;
3493e4b8fdcSSoby Mathew 		default:
3503e4b8fdcSSoby Mathew 			WARN("Unrecognized Foundation FVP revision %x\n", rev);
3513e4b8fdcSSoby Mathew 			break;
3523e4b8fdcSSoby Mathew 		}
3533e4b8fdcSSoby Mathew 		break;
3543e4b8fdcSSoby Mathew 	case HBI_BASE_FVP:
355955242d8SJeenu Viswambharan 		arm_config.flags |= (ARM_CONFIG_BASE_MMAP | ARM_CONFIG_HAS_TZC);
3563e4b8fdcSSoby Mathew 
3573e4b8fdcSSoby Mathew 		/*
3583e4b8fdcSSoby Mathew 		 * Check for supported revisions
3593e4b8fdcSSoby Mathew 		 * Allow future revisions to run but emit warning diagnostic
3603e4b8fdcSSoby Mathew 		 */
3613e4b8fdcSSoby Mathew 		switch (rev) {
3623e4b8fdcSSoby Mathew 		case REV_BASE_FVP_V0:
363955242d8SJeenu Viswambharan 			arm_config.flags |= ARM_CONFIG_FVP_HAS_CCI400;
364955242d8SJeenu Viswambharan 			break;
365955242d8SJeenu Viswambharan 		case REV_BASE_FVP_REVC:
3668431635bSIsla Mitchell 			arm_config.flags |= (ARM_CONFIG_FVP_HAS_SMMUV3 |
367955242d8SJeenu Viswambharan 					ARM_CONFIG_FVP_HAS_CCI5XX);
3683e4b8fdcSSoby Mathew 			break;
3693e4b8fdcSSoby Mathew 		default:
3703e4b8fdcSSoby Mathew 			WARN("Unrecognized Base FVP revision %x\n", rev);
3713e4b8fdcSSoby Mathew 			break;
3723e4b8fdcSSoby Mathew 		}
3733e4b8fdcSSoby Mathew 		break;
3743e4b8fdcSSoby Mathew 	default:
3753e4b8fdcSSoby Mathew 		ERROR("Unsupported board HBI number 0x%x\n", hbi);
3763e4b8fdcSSoby Mathew 		panic();
3773e4b8fdcSSoby Mathew 	}
3788431635bSIsla Mitchell 
3798431635bSIsla Mitchell 	/*
3808431635bSIsla Mitchell 	 * We assume that the presence of MT bit, and therefore shifted
3818431635bSIsla Mitchell 	 * affinities, is uniform across the platform: either all CPUs, or no
3828431635bSIsla Mitchell 	 * CPUs implement it.
3838431635bSIsla Mitchell 	 */
384583e0791SAntonio Nino Diaz 	if ((read_mpidr_el1() & MPIDR_MT_MASK) != 0U)
3858431635bSIsla Mitchell 		arm_config.flags |= ARM_CONFIG_FVP_SHIFTED_AFF;
3863e4b8fdcSSoby Mathew }
3873e4b8fdcSSoby Mathew 
3883e4b8fdcSSoby Mathew 
3894d010d0dSDaniel Boulby void __init fvp_interconnect_init(void)
3903e4b8fdcSSoby Mathew {
39171237876SSoby Mathew #if FVP_INTERCONNECT_DRIVER == FVP_CCN
39271237876SSoby Mathew 	if (ccn_get_part0_id(PLAT_ARM_CCN_BASE) != CCN_502_PART0_ID) {
393583e0791SAntonio Nino Diaz 		ERROR("Unrecognized CCN variant detected. Only CCN-502 is supported");
39471237876SSoby Mathew 		panic();
39571237876SSoby Mathew 	}
396955242d8SJeenu Viswambharan 
3973e4b8fdcSSoby Mathew 	plat_arm_interconnect_init();
398955242d8SJeenu Viswambharan #else
399583e0791SAntonio Nino Diaz 	uintptr_t cci_base = 0U;
400583e0791SAntonio Nino Diaz 	const int *cci_map = NULL;
401583e0791SAntonio Nino Diaz 	unsigned int map_size = 0U;
402955242d8SJeenu Viswambharan 
403955242d8SJeenu Viswambharan 	/* Initialize the right interconnect */
404583e0791SAntonio Nino Diaz 	if ((arm_config.flags & ARM_CONFIG_FVP_HAS_CCI5XX) != 0U) {
405955242d8SJeenu Viswambharan 		cci_base = PLAT_FVP_CCI5XX_BASE;
406955242d8SJeenu Viswambharan 		cci_map = fvp_cci5xx_map;
407955242d8SJeenu Viswambharan 		map_size = ARRAY_SIZE(fvp_cci5xx_map);
408583e0791SAntonio Nino Diaz 	} else if ((arm_config.flags & ARM_CONFIG_FVP_HAS_CCI400) != 0U) {
409955242d8SJeenu Viswambharan 		cci_base = PLAT_FVP_CCI400_BASE;
410955242d8SJeenu Viswambharan 		cci_map = fvp_cci400_map;
411955242d8SJeenu Viswambharan 		map_size = ARRAY_SIZE(fvp_cci400_map);
412583e0791SAntonio Nino Diaz 	} else {
413583e0791SAntonio Nino Diaz 		return;
414955242d8SJeenu Viswambharan 	}
415955242d8SJeenu Viswambharan 
416583e0791SAntonio Nino Diaz 	assert(cci_base != 0U);
417583e0791SAntonio Nino Diaz 	assert(cci_map != NULL);
418955242d8SJeenu Viswambharan 	cci_init(cci_base, cci_map, map_size);
419955242d8SJeenu Viswambharan #endif
42071237876SSoby Mathew }
4213e4b8fdcSSoby Mathew 
4223e4b8fdcSSoby Mathew void fvp_interconnect_enable(void)
4233e4b8fdcSSoby Mathew {
424955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER == FVP_CCN
4253e4b8fdcSSoby Mathew 	plat_arm_interconnect_enter_coherency();
426955242d8SJeenu Viswambharan #else
427955242d8SJeenu Viswambharan 	unsigned int master;
428955242d8SJeenu Viswambharan 
429583e0791SAntonio Nino Diaz 	if ((arm_config.flags & (ARM_CONFIG_FVP_HAS_CCI400 |
430583e0791SAntonio Nino Diaz 				 ARM_CONFIG_FVP_HAS_CCI5XX)) != 0U) {
431955242d8SJeenu Viswambharan 		master = get_interconnect_master();
432955242d8SJeenu Viswambharan 		cci_enable_snoop_dvm_reqs(master);
433955242d8SJeenu Viswambharan 	}
434955242d8SJeenu Viswambharan #endif
4353e4b8fdcSSoby Mathew }
4363e4b8fdcSSoby Mathew 
4373e4b8fdcSSoby Mathew void fvp_interconnect_disable(void)
4383e4b8fdcSSoby Mathew {
439955242d8SJeenu Viswambharan #if FVP_INTERCONNECT_DRIVER == FVP_CCN
4403e4b8fdcSSoby Mathew 	plat_arm_interconnect_exit_coherency();
441955242d8SJeenu Viswambharan #else
442955242d8SJeenu Viswambharan 	unsigned int master;
443955242d8SJeenu Viswambharan 
444583e0791SAntonio Nino Diaz 	if ((arm_config.flags & (ARM_CONFIG_FVP_HAS_CCI400 |
445583e0791SAntonio Nino Diaz 				 ARM_CONFIG_FVP_HAS_CCI5XX)) != 0U) {
446955242d8SJeenu Viswambharan 		master = get_interconnect_master();
447955242d8SJeenu Viswambharan 		cci_disable_snoop_dvm_reqs(master);
448955242d8SJeenu Viswambharan 	}
449955242d8SJeenu Viswambharan #endif
4503e4b8fdcSSoby Mathew }
451ba597da7SJohn Tsichritzis 
45288c51c3fSManish V Badarkhe #if CRYPTO_SUPPORT
453ba597da7SJohn Tsichritzis int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size)
454ba597da7SJohn Tsichritzis {
455ba597da7SJohn Tsichritzis 	assert(heap_addr != NULL);
456ba597da7SJohn Tsichritzis 	assert(heap_size != NULL);
457ba597da7SJohn Tsichritzis 
458ba597da7SJohn Tsichritzis 	return arm_get_mbedtls_heap(heap_addr, heap_size);
459ba597da7SJohn Tsichritzis }
46088c51c3fSManish V Badarkhe #endif /* CRYPTO_SUPPORT */
4611b597c22SAlexei Fedorov 
4621b597c22SAlexei Fedorov void fvp_timer_init(void)
4631b597c22SAlexei Fedorov {
464fddfb3baSMadhukar Pappireddy #if USE_SP804_TIMER
4651b597c22SAlexei Fedorov 	/* Enable the clock override for SP804 timer 0, which means that no
4661b597c22SAlexei Fedorov 	 * clock dividers are applied and the raw (35MHz) clock will be used.
4671b597c22SAlexei Fedorov 	 */
4681b597c22SAlexei Fedorov 	mmio_write_32(V2M_SP810_BASE, FVP_SP810_CTRL_TIM0_OV);
4691b597c22SAlexei Fedorov 
4701b597c22SAlexei Fedorov 	/* Initialize delay timer driver using SP804 dual timer 0 */
4711b597c22SAlexei Fedorov 	sp804_timer_init(V2M_SP804_TIMER0_BASE,
4721b597c22SAlexei Fedorov 			SP804_TIMER_CLKMULT, SP804_TIMER_CLKDIV);
4731b597c22SAlexei Fedorov #else
4741b597c22SAlexei Fedorov 	generic_delay_timer_init();
4751b597c22SAlexei Fedorov 
4761b597c22SAlexei Fedorov 	/* Enable System level generic timer */
4771b597c22SAlexei Fedorov 	mmio_write_32(ARM_SYS_CNTCTL_BASE + CNTCR_OFF,
4781b597c22SAlexei Fedorov 			CNTCR_FCREQ(0U) | CNTCR_EN);
479fddfb3baSMadhukar Pappireddy #endif /* USE_SP804_TIMER */
4801b597c22SAlexei Fedorov }
481ed9653ffSManish V Badarkhe 
482ed9653ffSManish V Badarkhe /*****************************************************************************
483ed9653ffSManish V Badarkhe  * plat_is_smccc_feature_available() - This function checks whether SMCCC
484ed9653ffSManish V Badarkhe  *                                     feature is availabile for platform.
485ed9653ffSManish V Badarkhe  * @fid: SMCCC function id
486ed9653ffSManish V Badarkhe  *
487ed9653ffSManish V Badarkhe  * Return SMC_ARCH_CALL_SUCCESS if SMCCC feature is available and
488ed9653ffSManish V Badarkhe  * SMC_ARCH_CALL_NOT_SUPPORTED otherwise.
489ed9653ffSManish V Badarkhe  *****************************************************************************/
490ed9653ffSManish V Badarkhe int32_t plat_is_smccc_feature_available(u_register_t fid)
491ed9653ffSManish V Badarkhe {
492ed9653ffSManish V Badarkhe 	switch (fid) {
493ed9653ffSManish V Badarkhe 	case SMCCC_ARCH_SOC_ID:
494ed9653ffSManish V Badarkhe 		return SMC_ARCH_CALL_SUCCESS;
495ed9653ffSManish V Badarkhe 	default:
496ed9653ffSManish V Badarkhe 		return SMC_ARCH_CALL_NOT_SUPPORTED;
497ed9653ffSManish V Badarkhe 	}
498ed9653ffSManish V Badarkhe }
499ed9653ffSManish V Badarkhe 
500ed9653ffSManish V Badarkhe /* Get SOC version */
501ed9653ffSManish V Badarkhe int32_t plat_get_soc_version(void)
502ed9653ffSManish V Badarkhe {
503ed9653ffSManish V Badarkhe 	return (int32_t)
504dfff4686SYann Gautier 		(SOC_ID_SET_JEP_106(ARM_SOC_CONTINUATION_CODE,
505dfff4686SYann Gautier 				    ARM_SOC_IDENTIFICATION_CODE) |
506dfff4686SYann Gautier 		 (FVP_SOC_ID & SOC_ID_IMPL_DEF_MASK));
507ed9653ffSManish V Badarkhe }
508ed9653ffSManish V Badarkhe 
509ed9653ffSManish V Badarkhe /* Get SOC revision */
510ed9653ffSManish V Badarkhe int32_t plat_get_soc_revision(void)
511ed9653ffSManish V Badarkhe {
512ed9653ffSManish V Badarkhe 	unsigned int sys_id;
513ed9653ffSManish V Badarkhe 
514ed9653ffSManish V Badarkhe 	sys_id = mmio_read_32(V2M_SYSREGS_BASE + V2M_SYS_ID);
515dfff4686SYann Gautier 	return (int32_t)(((sys_id >> V2M_SYS_ID_REV_SHIFT) &
516dfff4686SYann Gautier 			  V2M_SYS_ID_REV_MASK) & SOC_ID_REV_MASK);
517ed9653ffSManish V Badarkhe }
5188c980a4aSJavier Almansa Sobrino 
5198c980a4aSJavier Almansa Sobrino #if ENABLE_RME
5208c980a4aSJavier Almansa Sobrino /*
5218c980a4aSJavier Almansa Sobrino  * Get a pointer to the RMM-EL3 Shared buffer and return it
5228c980a4aSJavier Almansa Sobrino  * through the pointer passed as parameter.
5238c980a4aSJavier Almansa Sobrino  *
5248c980a4aSJavier Almansa Sobrino  * This function returns the size of the shared buffer.
5258c980a4aSJavier Almansa Sobrino  */
5268c980a4aSJavier Almansa Sobrino size_t plat_rmmd_get_el3_rmm_shared_mem(uintptr_t *shared)
5278c980a4aSJavier Almansa Sobrino {
5288c980a4aSJavier Almansa Sobrino 	*shared = (uintptr_t)RMM_SHARED_BASE;
5298c980a4aSJavier Almansa Sobrino 
5308c980a4aSJavier Almansa Sobrino 	return (size_t)RMM_SHARED_SIZE;
5318c980a4aSJavier Almansa Sobrino }
5321d0ca40eSJavier Almansa Sobrino 
533*a97bfa5fSAlexeiFedorov CASSERT(ARM_DRAM_BANKS_NUM == 2UL, ARM_DRAM_BANKS_NUM_mismatch);
534*a97bfa5fSAlexeiFedorov 
535*a97bfa5fSAlexeiFedorov /* FVP DRAM banks */
536*a97bfa5fSAlexeiFedorov const struct dram_bank fvp_dram_banks[ARM_DRAM_BANKS_NUM] = {
537*a97bfa5fSAlexeiFedorov 	{ARM_PAS_2_BASE, ARM_PAS_2_SIZE},
538*a97bfa5fSAlexeiFedorov 	{ARM_PAS_4_BASE, ARM_PAS_4_SIZE}
539*a97bfa5fSAlexeiFedorov };
540*a97bfa5fSAlexeiFedorov 
541*a97bfa5fSAlexeiFedorov int plat_rmmd_load_manifest(struct rmm_manifest *manifest)
5421d0ca40eSJavier Almansa Sobrino {
543*a97bfa5fSAlexeiFedorov 	uint64_t check_sum;
544*a97bfa5fSAlexeiFedorov 	struct dram_bank *bank_ptr;
545*a97bfa5fSAlexeiFedorov 
5461d0ca40eSJavier Almansa Sobrino 	assert(manifest != NULL);
5471d0ca40eSJavier Almansa Sobrino 
5481d0ca40eSJavier Almansa Sobrino 	manifest->version = RMMD_MANIFEST_VERSION;
549dc0ca64eSJavier Almansa Sobrino 	manifest->padding = 0U; /* RES0 */
5501d0ca40eSJavier Almansa Sobrino 	manifest->plat_data = (uintptr_t)NULL;
551*a97bfa5fSAlexeiFedorov 	manifest->plat_dram.banks_num = ARM_DRAM_BANKS_NUM;
552*a97bfa5fSAlexeiFedorov 
553*a97bfa5fSAlexeiFedorov 	/* Array dram_banks[] follows dram_info structure */
554*a97bfa5fSAlexeiFedorov 	bank_ptr = (struct dram_bank *)
555*a97bfa5fSAlexeiFedorov 			((uintptr_t)&manifest->plat_dram.check_sum +
556*a97bfa5fSAlexeiFedorov 			sizeof(manifest->plat_dram.check_sum));
557*a97bfa5fSAlexeiFedorov 
558*a97bfa5fSAlexeiFedorov 	manifest->plat_dram.dram_data = bank_ptr;
559*a97bfa5fSAlexeiFedorov 
560*a97bfa5fSAlexeiFedorov 	/* Copy FVP DRAM banks data to Boot Manifest */
561*a97bfa5fSAlexeiFedorov 	(void)memcpy((void *)bank_ptr, &fvp_dram_banks, sizeof(fvp_dram_banks));
562*a97bfa5fSAlexeiFedorov 
563*a97bfa5fSAlexeiFedorov 	/* Calculate check sum of plat_dram structure */
564*a97bfa5fSAlexeiFedorov 	check_sum = ARM_DRAM_BANKS_NUM + (uint64_t)bank_ptr;
565*a97bfa5fSAlexeiFedorov 
566*a97bfa5fSAlexeiFedorov 	for (unsigned long i = 0UL; i < ARM_DRAM_BANKS_NUM; i++) {
567*a97bfa5fSAlexeiFedorov 		check_sum += bank_ptr[i].base + bank_ptr[i].size;
568*a97bfa5fSAlexeiFedorov 	}
569*a97bfa5fSAlexeiFedorov 
570*a97bfa5fSAlexeiFedorov 	/* Check sum must be 0 */
571*a97bfa5fSAlexeiFedorov 	manifest->plat_dram.check_sum = ~check_sum + 1UL;
5721d0ca40eSJavier Almansa Sobrino 
5731d0ca40eSJavier Almansa Sobrino 	return 0;
5741d0ca40eSJavier Almansa Sobrino }
575*a97bfa5fSAlexeiFedorov #endif	/* ENABLE_RME */
576