xref: /rk3399_ARM-atf/plat/arm/common/arm_bl1_setup.c (revision 4c117f6c49330682cabdbf6d082e7c02dd32e84b)
1b4315306SDan Handley /*
2b4315306SDan Handley  * Copyright (c) 2015, ARM Limited and Contributors. All rights reserved.
3b4315306SDan Handley  *
4b4315306SDan Handley  * Redistribution and use in source and binary forms, with or without
5b4315306SDan Handley  * modification, are permitted provided that the following conditions are met:
6b4315306SDan Handley  *
7b4315306SDan Handley  * Redistributions of source code must retain the above copyright notice, this
8b4315306SDan Handley  * list of conditions and the following disclaimer.
9b4315306SDan Handley  *
10b4315306SDan Handley  * Redistributions in binary form must reproduce the above copyright notice,
11b4315306SDan Handley  * this list of conditions and the following disclaimer in the documentation
12b4315306SDan Handley  * and/or other materials provided with the distribution.
13b4315306SDan Handley  *
14b4315306SDan Handley  * Neither the name of ARM nor the names of its contributors may be used
15b4315306SDan Handley  * to endorse or promote products derived from this software without specific
16b4315306SDan Handley  * prior written permission.
17b4315306SDan Handley  *
18b4315306SDan Handley  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19b4315306SDan Handley  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20b4315306SDan Handley  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21b4315306SDan Handley  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22b4315306SDan Handley  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23b4315306SDan Handley  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24b4315306SDan Handley  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25b4315306SDan Handley  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26b4315306SDan Handley  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27b4315306SDan Handley  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28b4315306SDan Handley  * POSSIBILITY OF SUCH DAMAGE.
29b4315306SDan Handley  */
30b4315306SDan Handley 
31b4315306SDan Handley #include <arch.h>
32b4315306SDan Handley #include <arm_def.h>
33b4315306SDan Handley #include <bl_common.h>
34b4315306SDan Handley #include <cci.h>
35b4315306SDan Handley #include <console.h>
36b4315306SDan Handley #include <platform_def.h>
37b4315306SDan Handley #include <plat_arm.h>
383ae8a360SSandrine Bailleux #include "../../../bl1/bl1_private.h"
39b4315306SDan Handley 
40b4315306SDan Handley 
41b4315306SDan Handley #if USE_COHERENT_MEM
42b4315306SDan Handley /*
43b4315306SDan Handley  * The next 2 constants identify the extents of the coherent memory region.
44b4315306SDan Handley  * These addresses are used by the MMU setup code and therefore they must be
45b4315306SDan Handley  * page-aligned.  It is the responsibility of the linker script to ensure that
46b4315306SDan Handley  * __COHERENT_RAM_START__ and __COHERENT_RAM_END__ linker symbols refer to
47b4315306SDan Handley  * page-aligned addresses.
48b4315306SDan Handley  */
49b4315306SDan Handley #define BL1_COHERENT_RAM_BASE (unsigned long)(&__COHERENT_RAM_START__)
50b4315306SDan Handley #define BL1_COHERENT_RAM_LIMIT (unsigned long)(&__COHERENT_RAM_END__)
51b4315306SDan Handley #endif
52b4315306SDan Handley 
53b4315306SDan Handley 
54b4315306SDan Handley /* Weak definitions may be overridden in specific ARM standard platform */
55b4315306SDan Handley #pragma weak bl1_early_platform_setup
56b4315306SDan Handley #pragma weak bl1_plat_arch_setup
57b4315306SDan Handley #pragma weak bl1_platform_setup
58b4315306SDan Handley #pragma weak bl1_plat_sec_mem_layout
59b4315306SDan Handley #pragma weak bl1_plat_set_bl2_ep_info
60b4315306SDan Handley 
61b4315306SDan Handley 
62b4315306SDan Handley /* Data structure which holds the extents of the trusted SRAM for BL1*/
63b4315306SDan Handley static meminfo_t bl1_tzram_layout;
64b4315306SDan Handley 
65b4315306SDan Handley meminfo_t *bl1_plat_sec_mem_layout(void)
66b4315306SDan Handley {
67b4315306SDan Handley 	return &bl1_tzram_layout;
68b4315306SDan Handley }
69b4315306SDan Handley 
70b4315306SDan Handley /*******************************************************************************
71b4315306SDan Handley  * BL1 specific platform actions shared between ARM standard platforms.
72b4315306SDan Handley  ******************************************************************************/
73b4315306SDan Handley void arm_bl1_early_platform_setup(void)
74b4315306SDan Handley {
75b4315306SDan Handley 	const size_t bl1_size = BL1_RAM_LIMIT - BL1_RAM_BASE;
76b4315306SDan Handley 
77b4315306SDan Handley 	/* Initialize the console to provide early debug support */
78b4315306SDan Handley 	console_init(PLAT_ARM_BOOT_UART_BASE, PLAT_ARM_BOOT_UART_CLK_IN_HZ,
79b4315306SDan Handley 			ARM_CONSOLE_BAUDRATE);
80b4315306SDan Handley 
81b4315306SDan Handley 	/* Allow BL1 to see the whole Trusted RAM */
82b4315306SDan Handley 	bl1_tzram_layout.total_base = ARM_BL_RAM_BASE;
83b4315306SDan Handley 	bl1_tzram_layout.total_size = ARM_BL_RAM_SIZE;
84b4315306SDan Handley 
85b4315306SDan Handley 	/* Calculate how much RAM BL1 is using and how much remains free */
86b4315306SDan Handley 	bl1_tzram_layout.free_base = ARM_BL_RAM_BASE;
87b4315306SDan Handley 	bl1_tzram_layout.free_size = ARM_BL_RAM_SIZE;
88b4315306SDan Handley 	reserve_mem(&bl1_tzram_layout.free_base,
89b4315306SDan Handley 		    &bl1_tzram_layout.free_size,
90b4315306SDan Handley 		    BL1_RAM_BASE,
91b4315306SDan Handley 		    bl1_size);
92b4315306SDan Handley }
93b4315306SDan Handley 
94b4315306SDan Handley void bl1_early_platform_setup(void)
95b4315306SDan Handley {
96b4315306SDan Handley 	arm_bl1_early_platform_setup();
97b4315306SDan Handley 
98b4315306SDan Handley 	/*
99b4315306SDan Handley 	 * Initialize CCI for this cluster during cold boot.
100b4315306SDan Handley 	 * No need for locks as no other CPU is active.
101b4315306SDan Handley 	 */
102b4315306SDan Handley 	arm_cci_init();
103b4315306SDan Handley 	/*
104b4315306SDan Handley 	 * Enable CCI coherency for the primary CPU's cluster.
105b4315306SDan Handley 	 */
106b4315306SDan Handley 	cci_enable_snoop_dvm_reqs(MPIDR_AFFLVL1_VAL(read_mpidr()));
107b4315306SDan Handley }
108b4315306SDan Handley 
109b4315306SDan Handley /******************************************************************************
110b4315306SDan Handley  * Perform the very early platform specific architecture setup shared between
111b4315306SDan Handley  * ARM standard platforms. This only does basic initialization. Later
112b4315306SDan Handley  * architectural setup (bl1_arch_setup()) does not do anything platform
113b4315306SDan Handley  * specific.
114b4315306SDan Handley  *****************************************************************************/
115b4315306SDan Handley void arm_bl1_plat_arch_setup(void)
116b4315306SDan Handley {
117b4315306SDan Handley 	arm_configure_mmu_el3(bl1_tzram_layout.total_base,
118b4315306SDan Handley 			      bl1_tzram_layout.total_size,
119b4315306SDan Handley 			      BL1_RO_BASE,
120b4315306SDan Handley 			      BL1_RO_LIMIT
121b4315306SDan Handley #if USE_COHERENT_MEM
122b4315306SDan Handley 			      , BL1_COHERENT_RAM_BASE,
123b4315306SDan Handley 			      BL1_COHERENT_RAM_LIMIT
124b4315306SDan Handley #endif
125b4315306SDan Handley 			     );
126b4315306SDan Handley }
127b4315306SDan Handley 
128b4315306SDan Handley void bl1_plat_arch_setup(void)
129b4315306SDan Handley {
130b4315306SDan Handley 	arm_bl1_plat_arch_setup();
131b4315306SDan Handley }
132b4315306SDan Handley 
133b4315306SDan Handley /*
134b4315306SDan Handley  * Perform the platform specific architecture setup shared between
135b4315306SDan Handley  * ARM standard platforms.
136b4315306SDan Handley  */
137b4315306SDan Handley void arm_bl1_platform_setup(void)
138b4315306SDan Handley {
139b4315306SDan Handley 	/* Initialise the IO layer and register platform IO devices */
140b4315306SDan Handley 	plat_arm_io_setup();
141b4315306SDan Handley }
142b4315306SDan Handley 
143b4315306SDan Handley void bl1_platform_setup(void)
144b4315306SDan Handley {
145b4315306SDan Handley 	arm_bl1_platform_setup();
146b4315306SDan Handley }
147b4315306SDan Handley 
148*4c117f6cSSandrine Bailleux void bl1_plat_prepare_exit(entry_point_info_t *ep_info)
149*4c117f6cSSandrine Bailleux {
150*4c117f6cSSandrine Bailleux #ifdef EL3_PAYLOAD_BASE
151*4c117f6cSSandrine Bailleux 	/*
152*4c117f6cSSandrine Bailleux 	 * Program the EL3 payload's entry point address into the CPUs mailbox
153*4c117f6cSSandrine Bailleux 	 * in order to release secondary CPUs from their holding pen and make
154*4c117f6cSSandrine Bailleux 	 * them jump there.
155*4c117f6cSSandrine Bailleux 	 */
156*4c117f6cSSandrine Bailleux 	arm_program_trusted_mailbox(ep_info->pc);
157*4c117f6cSSandrine Bailleux 	dsbsy();
158*4c117f6cSSandrine Bailleux 	sev();
159*4c117f6cSSandrine Bailleux #endif
160*4c117f6cSSandrine Bailleux }
161*4c117f6cSSandrine Bailleux 
162b4315306SDan Handley /*******************************************************************************
163b4315306SDan Handley  * Before calling this function BL2 is loaded in memory and its entrypoint
164b4315306SDan Handley  * is set by load_image. This is a placeholder for the platform to change
165b4315306SDan Handley  * the entrypoint of BL2 and set SPSR and security state.
166b4315306SDan Handley  * On ARM standard platforms we only set the security state of the entrypoint
167b4315306SDan Handley  ******************************************************************************/
168b4315306SDan Handley void bl1_plat_set_bl2_ep_info(image_info_t *bl2_image,
169b4315306SDan Handley 				entry_point_info_t *bl2_ep)
170b4315306SDan Handley {
171b4315306SDan Handley 	SET_SECURITY_STATE(bl2_ep->h.attr, SECURE);
172b4315306SDan Handley 	bl2_ep->spsr = SPSR_64(MODE_EL1, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS);
173b4315306SDan Handley }
174