1b4315306SDan Handley /* 2b4315306SDan Handley * Copyright (c) 2015, ARM Limited and Contributors. All rights reserved. 3b4315306SDan Handley * 4b4315306SDan Handley * Redistribution and use in source and binary forms, with or without 5b4315306SDan Handley * modification, are permitted provided that the following conditions are met: 6b4315306SDan Handley * 7b4315306SDan Handley * Redistributions of source code must retain the above copyright notice, this 8b4315306SDan Handley * list of conditions and the following disclaimer. 9b4315306SDan Handley * 10b4315306SDan Handley * Redistributions in binary form must reproduce the above copyright notice, 11b4315306SDan Handley * this list of conditions and the following disclaimer in the documentation 12b4315306SDan Handley * and/or other materials provided with the distribution. 13b4315306SDan Handley * 14b4315306SDan Handley * Neither the name of ARM nor the names of its contributors may be used 15b4315306SDan Handley * to endorse or promote products derived from this software without specific 16b4315306SDan Handley * prior written permission. 17b4315306SDan Handley * 18b4315306SDan Handley * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 19b4315306SDan Handley * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20b4315306SDan Handley * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21b4315306SDan Handley * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 22b4315306SDan Handley * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 23b4315306SDan Handley * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 24b4315306SDan Handley * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 25b4315306SDan Handley * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 26b4315306SDan Handley * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 27b4315306SDan Handley * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 28b4315306SDan Handley * POSSIBILITY OF SUCH DAMAGE. 29b4315306SDan Handley */ 30b4315306SDan Handley 31b4315306SDan Handley #include <arch.h> 32b4315306SDan Handley #include <arm_def.h> 33b4315306SDan Handley #include <bl_common.h> 34b4315306SDan Handley #include <cci.h> 35b4315306SDan Handley #include <console.h> 36b4315306SDan Handley #include <platform_def.h> 37b4315306SDan Handley #include <plat_arm.h> 383ae8a360SSandrine Bailleux #include "../../../bl1/bl1_private.h" 39b4315306SDan Handley 40b4315306SDan Handley 41b4315306SDan Handley #if USE_COHERENT_MEM 42b4315306SDan Handley /* 43b4315306SDan Handley * The next 2 constants identify the extents of the coherent memory region. 44b4315306SDan Handley * These addresses are used by the MMU setup code and therefore they must be 45b4315306SDan Handley * page-aligned. It is the responsibility of the linker script to ensure that 46b4315306SDan Handley * __COHERENT_RAM_START__ and __COHERENT_RAM_END__ linker symbols refer to 47b4315306SDan Handley * page-aligned addresses. 48b4315306SDan Handley */ 49b4315306SDan Handley #define BL1_COHERENT_RAM_BASE (unsigned long)(&__COHERENT_RAM_START__) 50b4315306SDan Handley #define BL1_COHERENT_RAM_LIMIT (unsigned long)(&__COHERENT_RAM_END__) 51b4315306SDan Handley #endif 52b4315306SDan Handley 53b4315306SDan Handley 54b4315306SDan Handley /* Weak definitions may be overridden in specific ARM standard platform */ 55b4315306SDan Handley #pragma weak bl1_early_platform_setup 56b4315306SDan Handley #pragma weak bl1_plat_arch_setup 57b4315306SDan Handley #pragma weak bl1_platform_setup 58b4315306SDan Handley #pragma weak bl1_plat_sec_mem_layout 59b4315306SDan Handley #pragma weak bl1_plat_set_bl2_ep_info 60b4315306SDan Handley 61b4315306SDan Handley 62b4315306SDan Handley /* Data structure which holds the extents of the trusted SRAM for BL1*/ 63b4315306SDan Handley static meminfo_t bl1_tzram_layout; 64b4315306SDan Handley 65b4315306SDan Handley meminfo_t *bl1_plat_sec_mem_layout(void) 66b4315306SDan Handley { 67b4315306SDan Handley return &bl1_tzram_layout; 68b4315306SDan Handley } 69b4315306SDan Handley 70b4315306SDan Handley /******************************************************************************* 71b4315306SDan Handley * BL1 specific platform actions shared between ARM standard platforms. 72b4315306SDan Handley ******************************************************************************/ 73b4315306SDan Handley void arm_bl1_early_platform_setup(void) 74b4315306SDan Handley { 75b4315306SDan Handley const size_t bl1_size = BL1_RAM_LIMIT - BL1_RAM_BASE; 76b4315306SDan Handley 77b4315306SDan Handley /* Initialize the console to provide early debug support */ 78b4315306SDan Handley console_init(PLAT_ARM_BOOT_UART_BASE, PLAT_ARM_BOOT_UART_CLK_IN_HZ, 79b4315306SDan Handley ARM_CONSOLE_BAUDRATE); 80b4315306SDan Handley 81b4315306SDan Handley /* Allow BL1 to see the whole Trusted RAM */ 82b4315306SDan Handley bl1_tzram_layout.total_base = ARM_BL_RAM_BASE; 83b4315306SDan Handley bl1_tzram_layout.total_size = ARM_BL_RAM_SIZE; 84b4315306SDan Handley 85b4315306SDan Handley /* Calculate how much RAM BL1 is using and how much remains free */ 86b4315306SDan Handley bl1_tzram_layout.free_base = ARM_BL_RAM_BASE; 87b4315306SDan Handley bl1_tzram_layout.free_size = ARM_BL_RAM_SIZE; 88b4315306SDan Handley reserve_mem(&bl1_tzram_layout.free_base, 89b4315306SDan Handley &bl1_tzram_layout.free_size, 90b4315306SDan Handley BL1_RAM_BASE, 91b4315306SDan Handley bl1_size); 92b4315306SDan Handley } 93b4315306SDan Handley 94b4315306SDan Handley void bl1_early_platform_setup(void) 95b4315306SDan Handley { 96b4315306SDan Handley arm_bl1_early_platform_setup(); 97b4315306SDan Handley 98b4315306SDan Handley /* 99b4315306SDan Handley * Initialize CCI for this cluster during cold boot. 100b4315306SDan Handley * No need for locks as no other CPU is active. 101b4315306SDan Handley */ 102b4315306SDan Handley arm_cci_init(); 103b4315306SDan Handley /* 104b4315306SDan Handley * Enable CCI coherency for the primary CPU's cluster. 105b4315306SDan Handley */ 106b4315306SDan Handley cci_enable_snoop_dvm_reqs(MPIDR_AFFLVL1_VAL(read_mpidr())); 107b4315306SDan Handley } 108b4315306SDan Handley 109b4315306SDan Handley /****************************************************************************** 110b4315306SDan Handley * Perform the very early platform specific architecture setup shared between 111b4315306SDan Handley * ARM standard platforms. This only does basic initialization. Later 112b4315306SDan Handley * architectural setup (bl1_arch_setup()) does not do anything platform 113b4315306SDan Handley * specific. 114b4315306SDan Handley *****************************************************************************/ 115b4315306SDan Handley void arm_bl1_plat_arch_setup(void) 116b4315306SDan Handley { 117b4315306SDan Handley arm_configure_mmu_el3(bl1_tzram_layout.total_base, 118b4315306SDan Handley bl1_tzram_layout.total_size, 119b4315306SDan Handley BL1_RO_BASE, 120b4315306SDan Handley BL1_RO_LIMIT 121b4315306SDan Handley #if USE_COHERENT_MEM 122b4315306SDan Handley , BL1_COHERENT_RAM_BASE, 123b4315306SDan Handley BL1_COHERENT_RAM_LIMIT 124b4315306SDan Handley #endif 125b4315306SDan Handley ); 126b4315306SDan Handley } 127b4315306SDan Handley 128b4315306SDan Handley void bl1_plat_arch_setup(void) 129b4315306SDan Handley { 130b4315306SDan Handley arm_bl1_plat_arch_setup(); 131b4315306SDan Handley } 132b4315306SDan Handley 133b4315306SDan Handley /* 134b4315306SDan Handley * Perform the platform specific architecture setup shared between 135b4315306SDan Handley * ARM standard platforms. 136b4315306SDan Handley */ 137b4315306SDan Handley void arm_bl1_platform_setup(void) 138b4315306SDan Handley { 139b4315306SDan Handley /* Initialise the IO layer and register platform IO devices */ 140b4315306SDan Handley plat_arm_io_setup(); 141b4315306SDan Handley } 142b4315306SDan Handley 143b4315306SDan Handley void bl1_platform_setup(void) 144b4315306SDan Handley { 145b4315306SDan Handley arm_bl1_platform_setup(); 146b4315306SDan Handley } 147b4315306SDan Handley 148*4c117f6cSSandrine Bailleux void bl1_plat_prepare_exit(entry_point_info_t *ep_info) 149*4c117f6cSSandrine Bailleux { 150*4c117f6cSSandrine Bailleux #ifdef EL3_PAYLOAD_BASE 151*4c117f6cSSandrine Bailleux /* 152*4c117f6cSSandrine Bailleux * Program the EL3 payload's entry point address into the CPUs mailbox 153*4c117f6cSSandrine Bailleux * in order to release secondary CPUs from their holding pen and make 154*4c117f6cSSandrine Bailleux * them jump there. 155*4c117f6cSSandrine Bailleux */ 156*4c117f6cSSandrine Bailleux arm_program_trusted_mailbox(ep_info->pc); 157*4c117f6cSSandrine Bailleux dsbsy(); 158*4c117f6cSSandrine Bailleux sev(); 159*4c117f6cSSandrine Bailleux #endif 160*4c117f6cSSandrine Bailleux } 161*4c117f6cSSandrine Bailleux 162b4315306SDan Handley /******************************************************************************* 163b4315306SDan Handley * Before calling this function BL2 is loaded in memory and its entrypoint 164b4315306SDan Handley * is set by load_image. This is a placeholder for the platform to change 165b4315306SDan Handley * the entrypoint of BL2 and set SPSR and security state. 166b4315306SDan Handley * On ARM standard platforms we only set the security state of the entrypoint 167b4315306SDan Handley ******************************************************************************/ 168b4315306SDan Handley void bl1_plat_set_bl2_ep_info(image_info_t *bl2_image, 169b4315306SDan Handley entry_point_info_t *bl2_ep) 170b4315306SDan Handley { 171b4315306SDan Handley SET_SECURITY_STATE(bl2_ep->h.attr, SECURE); 172b4315306SDan Handley bl2_ep->spsr = SPSR_64(MODE_EL1, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS); 173b4315306SDan Handley } 174