xref: /rk3399_ARM-atf/plat/arm/common/arm_common.c (revision bd9344f670a46125cdd8949ded75be124f34d587)
1bc149bfcSSoby Mathew /*
21af540efSRoberto Vargas  * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved.
3bc149bfcSSoby Mathew  *
482cb2c1aSdp-arm  * SPDX-License-Identifier: BSD-3-Clause
5bc149bfcSSoby Mathew  */
609d40e0eSAntonio Nino Diaz 
709d40e0eSAntonio Nino Diaz #include <assert.h>
809d40e0eSAntonio Nino Diaz 
909d40e0eSAntonio Nino Diaz #include <platform_def.h>
1009d40e0eSAntonio Nino Diaz 
11bc149bfcSSoby Mathew #include <arch.h>
12bc149bfcSSoby Mathew #include <arch_helpers.h>
1309d40e0eSAntonio Nino Diaz #include <common/debug.h>
1409d40e0eSAntonio Nino Diaz #include <common/romlib.h>
1509d40e0eSAntonio Nino Diaz #include <lib/mmio.h>
1609d40e0eSAntonio Nino Diaz #include <lib/xlat_tables/xlat_tables_compat.h>
17*bd9344f6SAntonio Nino Diaz #include <plat/arm/common/plat_arm.h>
1809d40e0eSAntonio Nino Diaz #include <plat/common/platform.h>
1909d40e0eSAntonio Nino Diaz #include <services/secure_partition.h>
2009d40e0eSAntonio Nino Diaz 
21bc149bfcSSoby Mathew /* Weak definitions may be overridden in specific ARM standard platform */
22bc149bfcSSoby Mathew #pragma weak plat_get_ns_image_entrypoint
23bc149bfcSSoby Mathew #pragma weak plat_arm_get_mmap
24bc149bfcSSoby Mathew 
25bc149bfcSSoby Mathew /* Conditionally provide a weak definition of plat_get_syscnt_freq2 to avoid
26bc149bfcSSoby Mathew  * conflicts with the definition in plat/common. */
27bc149bfcSSoby Mathew #pragma weak plat_get_syscnt_freq2
28bc149bfcSSoby Mathew 
291eb735d7SRoberto Vargas 
301eb735d7SRoberto Vargas void arm_setup_romlib(void)
311eb735d7SRoberto Vargas {
321eb735d7SRoberto Vargas #if USE_ROMLIB
331eb735d7SRoberto Vargas 	if (!rom_lib_init(ROMLIB_VERSION))
341eb735d7SRoberto Vargas 		panic();
351eb735d7SRoberto Vargas #endif
361eb735d7SRoberto Vargas }
371eb735d7SRoberto Vargas 
38bc149bfcSSoby Mathew uintptr_t plat_get_ns_image_entrypoint(void)
39bc149bfcSSoby Mathew {
4048ac1df9SSoby Mathew #ifdef PRELOADED_BL33_BASE
4148ac1df9SSoby Mathew 	return PRELOADED_BL33_BASE;
4248ac1df9SSoby Mathew #else
43bc149bfcSSoby Mathew 	return PLAT_ARM_NS_IMAGE_OFFSET;
4448ac1df9SSoby Mathew #endif
45bc149bfcSSoby Mathew }
46bc149bfcSSoby Mathew 
47bc149bfcSSoby Mathew /*******************************************************************************
48bc149bfcSSoby Mathew  * Gets SPSR for BL32 entry
49bc149bfcSSoby Mathew  ******************************************************************************/
50bc149bfcSSoby Mathew uint32_t arm_get_spsr_for_bl32_entry(void)
51bc149bfcSSoby Mathew {
52bc149bfcSSoby Mathew 	/*
53bc149bfcSSoby Mathew 	 * The Secure Payload Dispatcher service is responsible for
54bc149bfcSSoby Mathew 	 * setting the SPSR prior to entry into the BL32 image.
55bc149bfcSSoby Mathew 	 */
56bc149bfcSSoby Mathew 	return 0;
57bc149bfcSSoby Mathew }
58bc149bfcSSoby Mathew 
59bc149bfcSSoby Mathew /*******************************************************************************
60bc149bfcSSoby Mathew  * Gets SPSR for BL33 entry
61bc149bfcSSoby Mathew  ******************************************************************************/
62877cf3ffSSoby Mathew #ifndef AARCH32
63bc149bfcSSoby Mathew uint32_t arm_get_spsr_for_bl33_entry(void)
64bc149bfcSSoby Mathew {
65bc149bfcSSoby Mathew 	unsigned int mode;
66bc149bfcSSoby Mathew 	uint32_t spsr;
67bc149bfcSSoby Mathew 
68bc149bfcSSoby Mathew 	/* Figure out what mode we enter the non-secure world in */
69a0fee747SAntonio Nino Diaz 	mode = (el_implemented(2) != EL_IMPL_NONE) ? MODE_EL2 : MODE_EL1;
70bc149bfcSSoby Mathew 
71bc149bfcSSoby Mathew 	/*
72bc149bfcSSoby Mathew 	 * TODO: Consider the possibility of specifying the SPSR in
73bc149bfcSSoby Mathew 	 * the FIP ToC and allowing the platform to have a say as
74bc149bfcSSoby Mathew 	 * well.
75bc149bfcSSoby Mathew 	 */
76bc149bfcSSoby Mathew 	spsr = SPSR_64(mode, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS);
77bc149bfcSSoby Mathew 	return spsr;
78bc149bfcSSoby Mathew }
79877cf3ffSSoby Mathew #else
80877cf3ffSSoby Mathew /*******************************************************************************
81877cf3ffSSoby Mathew  * Gets SPSR for BL33 entry
82877cf3ffSSoby Mathew  ******************************************************************************/
83877cf3ffSSoby Mathew uint32_t arm_get_spsr_for_bl33_entry(void)
84877cf3ffSSoby Mathew {
85877cf3ffSSoby Mathew 	unsigned int hyp_status, mode, spsr;
86877cf3ffSSoby Mathew 
87877cf3ffSSoby Mathew 	hyp_status = GET_VIRT_EXT(read_id_pfr1());
88877cf3ffSSoby Mathew 
89877cf3ffSSoby Mathew 	mode = (hyp_status) ? MODE32_hyp : MODE32_svc;
90877cf3ffSSoby Mathew 
91877cf3ffSSoby Mathew 	/*
92877cf3ffSSoby Mathew 	 * TODO: Consider the possibility of specifying the SPSR in
93877cf3ffSSoby Mathew 	 * the FIP ToC and allowing the platform to have a say as
94877cf3ffSSoby Mathew 	 * well.
95877cf3ffSSoby Mathew 	 */
96877cf3ffSSoby Mathew 	spsr = SPSR_MODE32(mode, plat_get_ns_image_entrypoint() & 0x1,
97877cf3ffSSoby Mathew 			SPSR_E_LITTLE, DISABLE_ALL_EXCEPTIONS);
98877cf3ffSSoby Mathew 	return spsr;
99877cf3ffSSoby Mathew }
100877cf3ffSSoby Mathew #endif /* AARCH32 */
101bc149bfcSSoby Mathew 
102bc149bfcSSoby Mathew /*******************************************************************************
103bc149bfcSSoby Mathew  * Configures access to the system counter timer module.
104bc149bfcSSoby Mathew  ******************************************************************************/
105bc149bfcSSoby Mathew #ifdef ARM_SYS_TIMCTL_BASE
106bc149bfcSSoby Mathew void arm_configure_sys_timer(void)
107bc149bfcSSoby Mathew {
108bc149bfcSSoby Mathew 	unsigned int reg_val;
109bc149bfcSSoby Mathew 
110342d6220SSoby Mathew 	/* Read the frequency of the system counter */
111342d6220SSoby Mathew 	unsigned int freq_val = plat_get_syscnt_freq2();
112342d6220SSoby Mathew 
113bc149bfcSSoby Mathew #if ARM_CONFIG_CNTACR
114583e0791SAntonio Nino Diaz 	reg_val = (1U << CNTACR_RPCT_SHIFT) | (1U << CNTACR_RVCT_SHIFT);
115583e0791SAntonio Nino Diaz 	reg_val |= (1U << CNTACR_RFRQ_SHIFT) | (1U << CNTACR_RVOFF_SHIFT);
116583e0791SAntonio Nino Diaz 	reg_val |= (1U << CNTACR_RWVT_SHIFT) | (1U << CNTACR_RWPT_SHIFT);
117bc149bfcSSoby Mathew 	mmio_write_32(ARM_SYS_TIMCTL_BASE + CNTACR_BASE(PLAT_ARM_NSTIMER_FRAME_ID), reg_val);
118bc149bfcSSoby Mathew #endif /* ARM_CONFIG_CNTACR */
119bc149bfcSSoby Mathew 
120583e0791SAntonio Nino Diaz 	reg_val = (1U << CNTNSAR_NS_SHIFT(PLAT_ARM_NSTIMER_FRAME_ID));
121bc149bfcSSoby Mathew 	mmio_write_32(ARM_SYS_TIMCTL_BASE + CNTNSAR, reg_val);
122342d6220SSoby Mathew 
123342d6220SSoby Mathew 	/*
124342d6220SSoby Mathew 	 * Initialize CNTFRQ register in CNTCTLBase frame. The CNTFRQ
125342d6220SSoby Mathew 	 * system register initialized during psci_arch_setup() is different
126342d6220SSoby Mathew 	 * from this and has to be updated independently.
127342d6220SSoby Mathew 	 */
128342d6220SSoby Mathew 	mmio_write_32(ARM_SYS_TIMCTL_BASE + CNTCTLBASE_CNTFRQ, freq_val);
129342d6220SSoby Mathew 
130342d6220SSoby Mathew #ifdef PLAT_juno
131342d6220SSoby Mathew 	/*
132342d6220SSoby Mathew 	 * Initialize CNTFRQ register in Non-secure CNTBase frame.
133342d6220SSoby Mathew 	 * This is only required for Juno, because it doesn't follow ARM ARM
134932b3ae2SAntonio Nino Diaz 	 * in that the value updated in CNTFRQ is not reflected in
135932b3ae2SAntonio Nino Diaz 	 * CNTBASEN_CNTFRQ. Hence update the value manually.
136342d6220SSoby Mathew 	 */
137932b3ae2SAntonio Nino Diaz 	mmio_write_32(ARM_SYS_CNT_BASE_NS + CNTBASEN_CNTFRQ, freq_val);
138342d6220SSoby Mathew #endif
139bc149bfcSSoby Mathew }
140bc149bfcSSoby Mathew #endif /* ARM_SYS_TIMCTL_BASE */
141bc149bfcSSoby Mathew 
142bc149bfcSSoby Mathew /*******************************************************************************
143bc149bfcSSoby Mathew  * Returns ARM platform specific memory map regions.
144bc149bfcSSoby Mathew  ******************************************************************************/
145bc149bfcSSoby Mathew const mmap_region_t *plat_arm_get_mmap(void)
146bc149bfcSSoby Mathew {
147bc149bfcSSoby Mathew 	return plat_arm_mmap;
148bc149bfcSSoby Mathew }
149bc149bfcSSoby Mathew 
150bc149bfcSSoby Mathew #ifdef ARM_SYS_CNTCTL_BASE
151bc149bfcSSoby Mathew 
152bc149bfcSSoby Mathew unsigned int plat_get_syscnt_freq2(void)
153bc149bfcSSoby Mathew {
154bc149bfcSSoby Mathew 	unsigned int counter_base_frequency;
155bc149bfcSSoby Mathew 
156bc149bfcSSoby Mathew 	/* Read the frequency from Frequency modes table */
157bc149bfcSSoby Mathew 	counter_base_frequency = mmio_read_32(ARM_SYS_CNTCTL_BASE + CNTFID_OFF);
158bc149bfcSSoby Mathew 
159bc149bfcSSoby Mathew 	/* The first entry of the frequency modes table must not be 0 */
160583e0791SAntonio Nino Diaz 	if (counter_base_frequency == 0U)
161bc149bfcSSoby Mathew 		panic();
162bc149bfcSSoby Mathew 
163bc149bfcSSoby Mathew 	return counter_base_frequency;
164bc149bfcSSoby Mathew }
165bc149bfcSSoby Mathew 
166bc149bfcSSoby Mathew #endif /* ARM_SYS_CNTCTL_BASE */
167781f4aacSJeenu Viswambharan 
168781f4aacSJeenu Viswambharan #if SDEI_SUPPORT
169781f4aacSJeenu Viswambharan /*
170781f4aacSJeenu Viswambharan  * Translate SDEI entry point to PA, and perform standard ARM entry point
171781f4aacSJeenu Viswambharan  * validation on it.
172781f4aacSJeenu Viswambharan  */
173781f4aacSJeenu Viswambharan int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode)
174781f4aacSJeenu Viswambharan {
175781f4aacSJeenu Viswambharan 	uint64_t par, pa;
176781f4aacSJeenu Viswambharan 	uint32_t scr_el3;
177781f4aacSJeenu Viswambharan 
178781f4aacSJeenu Viswambharan 	/* Doing Non-secure address translation requires SCR_EL3.NS set */
179781f4aacSJeenu Viswambharan 	scr_el3 = read_scr_el3();
180781f4aacSJeenu Viswambharan 	write_scr_el3(scr_el3 | SCR_NS_BIT);
181781f4aacSJeenu Viswambharan 	isb();
182781f4aacSJeenu Viswambharan 
183781f4aacSJeenu Viswambharan 	assert((client_mode == MODE_EL2) || (client_mode == MODE_EL1));
184781f4aacSJeenu Viswambharan 	if (client_mode == MODE_EL2) {
185781f4aacSJeenu Viswambharan 		/*
186781f4aacSJeenu Viswambharan 		 * Translate entry point to Physical Address using the EL2
187781f4aacSJeenu Viswambharan 		 * translation regime.
188781f4aacSJeenu Viswambharan 		 */
189781f4aacSJeenu Viswambharan 		ats1e2r(ep);
190781f4aacSJeenu Viswambharan 	} else {
191781f4aacSJeenu Viswambharan 		/*
192781f4aacSJeenu Viswambharan 		 * Translate entry point to Physical Address using the EL1&0
193781f4aacSJeenu Viswambharan 		 * translation regime, including stage 2.
194781f4aacSJeenu Viswambharan 		 */
195781f4aacSJeenu Viswambharan 		ats12e1r(ep);
196781f4aacSJeenu Viswambharan 	}
197781f4aacSJeenu Viswambharan 	isb();
198781f4aacSJeenu Viswambharan 	par = read_par_el1();
199781f4aacSJeenu Viswambharan 
200781f4aacSJeenu Viswambharan 	/* Restore original SCRL_EL3 */
201781f4aacSJeenu Viswambharan 	write_scr_el3(scr_el3);
202781f4aacSJeenu Viswambharan 	isb();
203781f4aacSJeenu Viswambharan 
204781f4aacSJeenu Viswambharan 	/* If the translation resulted in fault, return failure */
205781f4aacSJeenu Viswambharan 	if ((par & PAR_F_MASK) != 0)
206781f4aacSJeenu Viswambharan 		return -1;
207781f4aacSJeenu Viswambharan 
208781f4aacSJeenu Viswambharan 	/* Extract Physical Address from PAR */
209781f4aacSJeenu Viswambharan 	pa = (par & (PAR_ADDR_MASK << PAR_ADDR_SHIFT));
210781f4aacSJeenu Viswambharan 
211781f4aacSJeenu Viswambharan 	/* Perform NS entry point validation on the physical address */
212781f4aacSJeenu Viswambharan 	return arm_validate_ns_entrypoint(pa);
213781f4aacSJeenu Viswambharan }
214781f4aacSJeenu Viswambharan #endif
215