xref: /rk3399_ARM-atf/plat/arm/common/arm_common.c (revision 2a1cdee4f5e6fe0b90399e442075880acad1869e)
1bc149bfcSSoby Mathew /*
27f2d23d9SManoj Kumar  * Copyright (c) 2015-2021, ARM Limited and Contributors. All rights reserved.
3bc149bfcSSoby Mathew  *
482cb2c1aSdp-arm  * SPDX-License-Identifier: BSD-3-Clause
5bc149bfcSSoby Mathew  */
609d40e0eSAntonio Nino Diaz 
709d40e0eSAntonio Nino Diaz #include <assert.h>
809d40e0eSAntonio Nino Diaz 
909d40e0eSAntonio Nino Diaz #include <platform_def.h>
1009d40e0eSAntonio Nino Diaz 
11bc149bfcSSoby Mathew #include <arch.h>
12bc149bfcSSoby Mathew #include <arch_helpers.h>
1309d40e0eSAntonio Nino Diaz #include <common/debug.h>
1409d40e0eSAntonio Nino Diaz #include <common/romlib.h>
1509d40e0eSAntonio Nino Diaz #include <lib/mmio.h>
16c7bacd40SManish V Badarkhe #include <lib/smccc.h>
1709d40e0eSAntonio Nino Diaz #include <lib/xlat_tables/xlat_tables_compat.h>
18c7bacd40SManish V Badarkhe #include <services/arm_arch_svc.h>
19bd9344f6SAntonio Nino Diaz #include <plat/arm/common/plat_arm.h>
2009d40e0eSAntonio Nino Diaz #include <plat/common/platform.h>
2109d40e0eSAntonio Nino Diaz 
22bc149bfcSSoby Mathew /* Weak definitions may be overridden in specific ARM standard platform */
23bc149bfcSSoby Mathew #pragma weak plat_get_ns_image_entrypoint
24bc149bfcSSoby Mathew #pragma weak plat_arm_get_mmap
25bc149bfcSSoby Mathew 
26bc149bfcSSoby Mathew /* Conditionally provide a weak definition of plat_get_syscnt_freq2 to avoid
27bc149bfcSSoby Mathew  * conflicts with the definition in plat/common. */
28bc149bfcSSoby Mathew #pragma weak plat_get_syscnt_freq2
29bc149bfcSSoby Mathew 
300e753437SManish V Badarkhe /* Get ARM SOC-ID */
310e753437SManish V Badarkhe #pragma weak plat_arm_get_soc_id
320e753437SManish V Badarkhe 
3360e8f3cfSPetre-Ionut Tudor /*******************************************************************************
3460e8f3cfSPetre-Ionut Tudor  * Changes the memory attributes for the region of mapped memory where the BL
3560e8f3cfSPetre-Ionut Tudor  * image's translation tables are located such that the tables will have
3660e8f3cfSPetre-Ionut Tudor  * read-only permissions.
3760e8f3cfSPetre-Ionut Tudor  ******************************************************************************/
3860e8f3cfSPetre-Ionut Tudor #if PLAT_RO_XLAT_TABLES
3960e8f3cfSPetre-Ionut Tudor void arm_xlat_make_tables_readonly(void)
4060e8f3cfSPetre-Ionut Tudor {
4160e8f3cfSPetre-Ionut Tudor 	int rc = xlat_make_tables_readonly();
4260e8f3cfSPetre-Ionut Tudor 
4360e8f3cfSPetre-Ionut Tudor 	if (rc != 0) {
4460e8f3cfSPetre-Ionut Tudor 		ERROR("Failed to make translation tables read-only at EL%u.\n",
4560e8f3cfSPetre-Ionut Tudor 		      get_current_el());
4660e8f3cfSPetre-Ionut Tudor 		panic();
4760e8f3cfSPetre-Ionut Tudor 	}
4860e8f3cfSPetre-Ionut Tudor 
4960e8f3cfSPetre-Ionut Tudor 	INFO("Translation tables are now read-only at EL%u.\n",
5060e8f3cfSPetre-Ionut Tudor 	     get_current_el());
5160e8f3cfSPetre-Ionut Tudor }
5260e8f3cfSPetre-Ionut Tudor #endif
531eb735d7SRoberto Vargas 
541eb735d7SRoberto Vargas void arm_setup_romlib(void)
551eb735d7SRoberto Vargas {
561eb735d7SRoberto Vargas #if USE_ROMLIB
571eb735d7SRoberto Vargas 	if (!rom_lib_init(ROMLIB_VERSION))
581eb735d7SRoberto Vargas 		panic();
591eb735d7SRoberto Vargas #endif
601eb735d7SRoberto Vargas }
611eb735d7SRoberto Vargas 
62bc149bfcSSoby Mathew uintptr_t plat_get_ns_image_entrypoint(void)
63bc149bfcSSoby Mathew {
6448ac1df9SSoby Mathew #ifdef PRELOADED_BL33_BASE
6548ac1df9SSoby Mathew 	return PRELOADED_BL33_BASE;
6648ac1df9SSoby Mathew #else
67ece6fd2dSSandrine Bailleux 	return PLAT_ARM_NS_IMAGE_BASE;
6848ac1df9SSoby Mathew #endif
69bc149bfcSSoby Mathew }
70bc149bfcSSoby Mathew 
71bc149bfcSSoby Mathew /*******************************************************************************
72bc149bfcSSoby Mathew  * Gets SPSR for BL32 entry
73bc149bfcSSoby Mathew  ******************************************************************************/
74bc149bfcSSoby Mathew uint32_t arm_get_spsr_for_bl32_entry(void)
75bc149bfcSSoby Mathew {
76bc149bfcSSoby Mathew 	/*
77bc149bfcSSoby Mathew 	 * The Secure Payload Dispatcher service is responsible for
78bc149bfcSSoby Mathew 	 * setting the SPSR prior to entry into the BL32 image.
79bc149bfcSSoby Mathew 	 */
80bc149bfcSSoby Mathew 	return 0;
81bc149bfcSSoby Mathew }
82bc149bfcSSoby Mathew 
83bc149bfcSSoby Mathew /*******************************************************************************
84bc149bfcSSoby Mathew  * Gets SPSR for BL33 entry
85bc149bfcSSoby Mathew  ******************************************************************************/
86402b3cf8SJulius Werner #ifdef __aarch64__
87bc149bfcSSoby Mathew uint32_t arm_get_spsr_for_bl33_entry(void)
88bc149bfcSSoby Mathew {
89bc149bfcSSoby Mathew 	unsigned int mode;
90bc149bfcSSoby Mathew 	uint32_t spsr;
91bc149bfcSSoby Mathew 
92bc149bfcSSoby Mathew 	/* Figure out what mode we enter the non-secure world in */
93a0fee747SAntonio Nino Diaz 	mode = (el_implemented(2) != EL_IMPL_NONE) ? MODE_EL2 : MODE_EL1;
94bc149bfcSSoby Mathew 
95bc149bfcSSoby Mathew 	/*
96bc149bfcSSoby Mathew 	 * TODO: Consider the possibility of specifying the SPSR in
97bc149bfcSSoby Mathew 	 * the FIP ToC and allowing the platform to have a say as
98bc149bfcSSoby Mathew 	 * well.
99bc149bfcSSoby Mathew 	 */
100d7b5f408SJimmy Brisson 	spsr = SPSR_64((uint64_t)mode, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS);
101bc149bfcSSoby Mathew 	return spsr;
102bc149bfcSSoby Mathew }
103877cf3ffSSoby Mathew #else
104877cf3ffSSoby Mathew /*******************************************************************************
105877cf3ffSSoby Mathew  * Gets SPSR for BL33 entry
106877cf3ffSSoby Mathew  ******************************************************************************/
107877cf3ffSSoby Mathew uint32_t arm_get_spsr_for_bl33_entry(void)
108877cf3ffSSoby Mathew {
109877cf3ffSSoby Mathew 	unsigned int hyp_status, mode, spsr;
110877cf3ffSSoby Mathew 
111877cf3ffSSoby Mathew 	hyp_status = GET_VIRT_EXT(read_id_pfr1());
112877cf3ffSSoby Mathew 
113877cf3ffSSoby Mathew 	mode = (hyp_status) ? MODE32_hyp : MODE32_svc;
114877cf3ffSSoby Mathew 
115877cf3ffSSoby Mathew 	/*
116877cf3ffSSoby Mathew 	 * TODO: Consider the possibility of specifying the SPSR in
117877cf3ffSSoby Mathew 	 * the FIP ToC and allowing the platform to have a say as
118877cf3ffSSoby Mathew 	 * well.
119877cf3ffSSoby Mathew 	 */
120877cf3ffSSoby Mathew 	spsr = SPSR_MODE32(mode, plat_get_ns_image_entrypoint() & 0x1,
121877cf3ffSSoby Mathew 			SPSR_E_LITTLE, DISABLE_ALL_EXCEPTIONS);
122877cf3ffSSoby Mathew 	return spsr;
123877cf3ffSSoby Mathew }
124402b3cf8SJulius Werner #endif /* __aarch64__ */
125bc149bfcSSoby Mathew 
126bc149bfcSSoby Mathew /*******************************************************************************
127bc149bfcSSoby Mathew  * Configures access to the system counter timer module.
128bc149bfcSSoby Mathew  ******************************************************************************/
129bc149bfcSSoby Mathew #ifdef ARM_SYS_TIMCTL_BASE
130bc149bfcSSoby Mathew void arm_configure_sys_timer(void)
131bc149bfcSSoby Mathew {
132bc149bfcSSoby Mathew 	unsigned int reg_val;
133bc149bfcSSoby Mathew 
134342d6220SSoby Mathew 	/* Read the frequency of the system counter */
135342d6220SSoby Mathew 	unsigned int freq_val = plat_get_syscnt_freq2();
136342d6220SSoby Mathew 
137bc149bfcSSoby Mathew #if ARM_CONFIG_CNTACR
138583e0791SAntonio Nino Diaz 	reg_val = (1U << CNTACR_RPCT_SHIFT) | (1U << CNTACR_RVCT_SHIFT);
139583e0791SAntonio Nino Diaz 	reg_val |= (1U << CNTACR_RFRQ_SHIFT) | (1U << CNTACR_RVOFF_SHIFT);
140583e0791SAntonio Nino Diaz 	reg_val |= (1U << CNTACR_RWVT_SHIFT) | (1U << CNTACR_RWPT_SHIFT);
141bc149bfcSSoby Mathew 	mmio_write_32(ARM_SYS_TIMCTL_BASE + CNTACR_BASE(PLAT_ARM_NSTIMER_FRAME_ID), reg_val);
142bc149bfcSSoby Mathew #endif /* ARM_CONFIG_CNTACR */
143bc149bfcSSoby Mathew 
144583e0791SAntonio Nino Diaz 	reg_val = (1U << CNTNSAR_NS_SHIFT(PLAT_ARM_NSTIMER_FRAME_ID));
145bc149bfcSSoby Mathew 	mmio_write_32(ARM_SYS_TIMCTL_BASE + CNTNSAR, reg_val);
146342d6220SSoby Mathew 
147342d6220SSoby Mathew 	/*
148342d6220SSoby Mathew 	 * Initialize CNTFRQ register in CNTCTLBase frame. The CNTFRQ
149342d6220SSoby Mathew 	 * system register initialized during psci_arch_setup() is different
150342d6220SSoby Mathew 	 * from this and has to be updated independently.
151342d6220SSoby Mathew 	 */
152342d6220SSoby Mathew 	mmio_write_32(ARM_SYS_TIMCTL_BASE + CNTCTLBASE_CNTFRQ, freq_val);
153342d6220SSoby Mathew 
1547f2d23d9SManoj Kumar #if defined(PLAT_juno) || defined(PLAT_n1sdp) || defined(PLAT_morello)
155342d6220SSoby Mathew 	/*
156342d6220SSoby Mathew 	 * Initialize CNTFRQ register in Non-secure CNTBase frame.
1577f2d23d9SManoj Kumar 	 * This is required for Juno, N1SDP and Morello because they do not
158603b372eSSami Mujawar 	 * follow ARM ARM in that the value updated in CNTFRQ is not
159603b372eSSami Mujawar 	 * reflected in CNTBASEN_CNTFRQ. Hence update the value manually.
160342d6220SSoby Mathew 	 */
161932b3ae2SAntonio Nino Diaz 	mmio_write_32(ARM_SYS_CNT_BASE_NS + CNTBASEN_CNTFRQ, freq_val);
162342d6220SSoby Mathew #endif
163bc149bfcSSoby Mathew }
164bc149bfcSSoby Mathew #endif /* ARM_SYS_TIMCTL_BASE */
165bc149bfcSSoby Mathew 
166bc149bfcSSoby Mathew /*******************************************************************************
167bc149bfcSSoby Mathew  * Returns ARM platform specific memory map regions.
168bc149bfcSSoby Mathew  ******************************************************************************/
169bc149bfcSSoby Mathew const mmap_region_t *plat_arm_get_mmap(void)
170bc149bfcSSoby Mathew {
171bc149bfcSSoby Mathew 	return plat_arm_mmap;
172bc149bfcSSoby Mathew }
173bc149bfcSSoby Mathew 
174bc149bfcSSoby Mathew #ifdef ARM_SYS_CNTCTL_BASE
175bc149bfcSSoby Mathew 
176bc149bfcSSoby Mathew unsigned int plat_get_syscnt_freq2(void)
177bc149bfcSSoby Mathew {
178bc149bfcSSoby Mathew 	unsigned int counter_base_frequency;
179bc149bfcSSoby Mathew 
180bc149bfcSSoby Mathew 	/* Read the frequency from Frequency modes table */
181bc149bfcSSoby Mathew 	counter_base_frequency = mmio_read_32(ARM_SYS_CNTCTL_BASE + CNTFID_OFF);
182bc149bfcSSoby Mathew 
183bc149bfcSSoby Mathew 	/* The first entry of the frequency modes table must not be 0 */
184583e0791SAntonio Nino Diaz 	if (counter_base_frequency == 0U)
185bc149bfcSSoby Mathew 		panic();
186bc149bfcSSoby Mathew 
187bc149bfcSSoby Mathew 	return counter_base_frequency;
188bc149bfcSSoby Mathew }
189bc149bfcSSoby Mathew 
190bc149bfcSSoby Mathew #endif /* ARM_SYS_CNTCTL_BASE */
191781f4aacSJeenu Viswambharan 
192781f4aacSJeenu Viswambharan #if SDEI_SUPPORT
193781f4aacSJeenu Viswambharan /*
194781f4aacSJeenu Viswambharan  * Translate SDEI entry point to PA, and perform standard ARM entry point
195781f4aacSJeenu Viswambharan  * validation on it.
196781f4aacSJeenu Viswambharan  */
197781f4aacSJeenu Viswambharan int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode)
198781f4aacSJeenu Viswambharan {
199781f4aacSJeenu Viswambharan 	uint64_t par, pa;
200f1be00daSLouis Mayencourt 	u_register_t scr_el3;
201781f4aacSJeenu Viswambharan 
202781f4aacSJeenu Viswambharan 	/* Doing Non-secure address translation requires SCR_EL3.NS set */
203781f4aacSJeenu Viswambharan 	scr_el3 = read_scr_el3();
204781f4aacSJeenu Viswambharan 	write_scr_el3(scr_el3 | SCR_NS_BIT);
205781f4aacSJeenu Viswambharan 	isb();
206781f4aacSJeenu Viswambharan 
207781f4aacSJeenu Viswambharan 	assert((client_mode == MODE_EL2) || (client_mode == MODE_EL1));
208781f4aacSJeenu Viswambharan 	if (client_mode == MODE_EL2) {
209781f4aacSJeenu Viswambharan 		/*
210781f4aacSJeenu Viswambharan 		 * Translate entry point to Physical Address using the EL2
211781f4aacSJeenu Viswambharan 		 * translation regime.
212781f4aacSJeenu Viswambharan 		 */
213781f4aacSJeenu Viswambharan 		ats1e2r(ep);
214781f4aacSJeenu Viswambharan 	} else {
215781f4aacSJeenu Viswambharan 		/*
216781f4aacSJeenu Viswambharan 		 * Translate entry point to Physical Address using the EL1&0
217781f4aacSJeenu Viswambharan 		 * translation regime, including stage 2.
218781f4aacSJeenu Viswambharan 		 */
21986ba5853SManish V Badarkhe 		AT(ats12e1r, ep);
220781f4aacSJeenu Viswambharan 	}
221781f4aacSJeenu Viswambharan 	isb();
222781f4aacSJeenu Viswambharan 	par = read_par_el1();
223781f4aacSJeenu Viswambharan 
224781f4aacSJeenu Viswambharan 	/* Restore original SCRL_EL3 */
225781f4aacSJeenu Viswambharan 	write_scr_el3(scr_el3);
226781f4aacSJeenu Viswambharan 	isb();
227781f4aacSJeenu Viswambharan 
228781f4aacSJeenu Viswambharan 	/* If the translation resulted in fault, return failure */
229781f4aacSJeenu Viswambharan 	if ((par & PAR_F_MASK) != 0)
230781f4aacSJeenu Viswambharan 		return -1;
231781f4aacSJeenu Viswambharan 
232781f4aacSJeenu Viswambharan 	/* Extract Physical Address from PAR */
233781f4aacSJeenu Viswambharan 	pa = (par & (PAR_ADDR_MASK << PAR_ADDR_SHIFT));
234781f4aacSJeenu Viswambharan 
235781f4aacSJeenu Viswambharan 	/* Perform NS entry point validation on the physical address */
236781f4aacSJeenu Viswambharan 	return arm_validate_ns_entrypoint(pa);
237781f4aacSJeenu Viswambharan }
238781f4aacSJeenu Viswambharan #endif
2390e753437SManish V Badarkhe 
240*2a1cdee4Sjohpow01 const mmap_region_t *plat_get_addr_mmap(void)
241*2a1cdee4Sjohpow01 {
242*2a1cdee4Sjohpow01 	return plat_arm_mmap;
243*2a1cdee4Sjohpow01 }
244