1301d27d9SRadoslaw Biernacki /* 2*7f9ef161SHarrison Mutai * Copyright (c) 2015-2025, Arm Limited and Contributors. All rights reserved. 3301d27d9SRadoslaw Biernacki * 4301d27d9SRadoslaw Biernacki * SPDX-License-Identifier: BSD-3-Clause 5301d27d9SRadoslaw Biernacki */ 6301d27d9SRadoslaw Biernacki 7301d27d9SRadoslaw Biernacki #include <assert.h> 8301d27d9SRadoslaw Biernacki 9301d27d9SRadoslaw Biernacki #include <common/bl_common.h> 10ffb07b04SMaxim Uvarov #include <drivers/arm/pl061_gpio.h> 116cd113feSJean-Philippe Brucker #include <lib/gpt_rme/gpt_rme.h> 12*7f9ef161SHarrison Mutai #if TRANSFER_LIST 13305825b4SRaymond Mao #include <lib/transfer_list.h> 14*7f9ef161SHarrison Mutai #endif 15301d27d9SRadoslaw Biernacki #include <plat/common/platform.h> 1672d47829SJean-Philippe Brucker #if ENABLE_RME 17d079d65dSMathieu Poirier #ifdef PLAT_qemu 1872d47829SJean-Philippe Brucker #include <qemu_pas_def.h> 19d079d65dSMathieu Poirier #elif PLAT_qemu_sbsa 20d079d65dSMathieu Poirier #include <qemu_sbsa_pas_def.h> 21d079d65dSMathieu Poirier #endif /* PLAT_qemu */ 22d079d65dSMathieu Poirier #endif /* ENABLE_RME */ 236d59413bSMathieu Poirier #ifdef PLAT_qemu_sbsa 246d59413bSMathieu Poirier #include <sbsa_platform.h> 256d59413bSMathieu Poirier #endif 26301d27d9SRadoslaw Biernacki 27301d27d9SRadoslaw Biernacki #include "qemu_private.h" 28301d27d9SRadoslaw Biernacki 29a12cb77cSChen Baozi #define MAP_BL31_TOTAL MAP_REGION_FLAT( \ 30a12cb77cSChen Baozi BL31_BASE, \ 31a12cb77cSChen Baozi BL31_END - BL31_BASE, \ 32a12cb77cSChen Baozi MT_MEMORY | MT_RW | EL3_PAS) 33a12cb77cSChen Baozi #define MAP_BL31_RO MAP_REGION_FLAT( \ 34a12cb77cSChen Baozi BL_CODE_BASE, \ 35a12cb77cSChen Baozi BL_CODE_END - BL_CODE_BASE, \ 36a12cb77cSChen Baozi MT_CODE | EL3_PAS), \ 37a12cb77cSChen Baozi MAP_REGION_FLAT( \ 38a12cb77cSChen Baozi BL_RO_DATA_BASE, \ 39a12cb77cSChen Baozi BL_RO_DATA_END \ 40a12cb77cSChen Baozi - BL_RO_DATA_BASE, \ 41a12cb77cSChen Baozi MT_RO_DATA | EL3_PAS) 42a12cb77cSChen Baozi 43af994ae8SChen Baozi #if USE_COHERENT_MEM 44a12cb77cSChen Baozi #define MAP_BL_COHERENT_RAM MAP_REGION_FLAT( \ 45a12cb77cSChen Baozi BL_COHERENT_RAM_BASE, \ 46a12cb77cSChen Baozi BL_COHERENT_RAM_END \ 47a12cb77cSChen Baozi - BL_COHERENT_RAM_BASE, \ 48a12cb77cSChen Baozi MT_DEVICE | MT_RW | EL3_PAS) 49af994ae8SChen Baozi #endif 50a12cb77cSChen Baozi 51a32a77f9SJean-Philippe Brucker #if ENABLE_RME 52a32a77f9SJean-Philippe Brucker #if (RME_GPT_BITLOCK_BLOCK == 0) 53a32a77f9SJean-Philippe Brucker #define BITLOCK_BASE UL(0) 54a32a77f9SJean-Philippe Brucker #define BITLOCK_SIZE UL(0) 55a32a77f9SJean-Philippe Brucker #else 56a32a77f9SJean-Philippe Brucker 57a32a77f9SJean-Philippe Brucker /* 58a32a77f9SJean-Philippe Brucker * Number of bitlock_t entries in the gpt_bitlock array for this platform's 59a32a77f9SJean-Philippe Brucker * Protected Physical Size. One 8-bit bitlock_t entry covers 60a32a77f9SJean-Philippe Brucker * 8 * RME_GPT_BITLOCK_BLOCK * 512MB. 61a32a77f9SJean-Philippe Brucker */ 62a32a77f9SJean-Philippe Brucker #if (PLAT_QEMU_PPS > (RME_GPT_BITLOCK_BLOCK * SZ_512M * UL(8))) 63a32a77f9SJean-Philippe Brucker #define BITLOCKS_NUM (PLAT_QEMU_PPS / \ 64a32a77f9SJean-Philippe Brucker (RME_GPT_BITLOCK_BLOCK * SZ_512M * UL(8))) 65a32a77f9SJean-Philippe Brucker #else 66a32a77f9SJean-Philippe Brucker #define BITLOCKS_NUM 1 67a32a77f9SJean-Philippe Brucker #endif 68a32a77f9SJean-Philippe Brucker 69a32a77f9SJean-Philippe Brucker static bitlock_t gpt_bitlock[BITLOCKS_NUM]; 70a32a77f9SJean-Philippe Brucker #define BITLOCK_BASE (uintptr_t)gpt_bitlock 71a32a77f9SJean-Philippe Brucker #define BITLOCK_SIZE sizeof(gpt_bitlock) 72a32a77f9SJean-Philippe Brucker #endif /* RME_GPT_BITLOCK_BLOCK */ 73a32a77f9SJean-Philippe Brucker #endif /* ENABLE_RME */ 74a32a77f9SJean-Philippe Brucker 75301d27d9SRadoslaw Biernacki /* 76301d27d9SRadoslaw Biernacki * Placeholder variables for copying the arguments that have been passed to 77301d27d9SRadoslaw Biernacki * BL3-1 from BL2. 78301d27d9SRadoslaw Biernacki */ 79301d27d9SRadoslaw Biernacki static entry_point_info_t bl32_image_ep_info; 80301d27d9SRadoslaw Biernacki static entry_point_info_t bl33_image_ep_info; 818ffe0b2eSJean-Philippe Brucker #if ENABLE_RME 828ffe0b2eSJean-Philippe Brucker static entry_point_info_t rmm_image_ep_info; 838ffe0b2eSJean-Philippe Brucker #endif 84*7f9ef161SHarrison Mutai static struct transfer_list_header __maybe_unused *bl31_tl; 85301d27d9SRadoslaw Biernacki 86301d27d9SRadoslaw Biernacki /******************************************************************************* 87301d27d9SRadoslaw Biernacki * Perform any BL3-1 early platform setup. Here is an opportunity to copy 88301d27d9SRadoslaw Biernacki * parameters passed by the calling EL (S-EL1 in BL2 & EL3 in BL1) before 89301d27d9SRadoslaw Biernacki * they are lost (potentially). This needs to be done before the MMU is 90301d27d9SRadoslaw Biernacki * initialized so that the memory layout can be used while creating page 91301d27d9SRadoslaw Biernacki * tables. BL2 has flushed this information to memory, so we are guaranteed 92301d27d9SRadoslaw Biernacki * to pick up good data. 93301d27d9SRadoslaw Biernacki ******************************************************************************/ 94301d27d9SRadoslaw Biernacki void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, 95301d27d9SRadoslaw Biernacki u_register_t arg2, u_register_t arg3) 96301d27d9SRadoslaw Biernacki { 97*7f9ef161SHarrison Mutai bool __maybe_unused is64 = false; 98*7f9ef161SHarrison Mutai uint64_t __maybe_unused hval; 997ad6775bSRaymond Mao 100301d27d9SRadoslaw Biernacki /* Initialize the console to provide early debug support */ 101301d27d9SRadoslaw Biernacki qemu_console_init(); 102301d27d9SRadoslaw Biernacki 103c681d02cSMarcin Juszkiewicz /* Platform names have to be lowercase. */ 104c681d02cSMarcin Juszkiewicz #ifdef PLAT_qemu_sbsa 1056d59413bSMathieu Poirier sbsa_platform_init(); 106c681d02cSMarcin Juszkiewicz #endif 107c681d02cSMarcin Juszkiewicz 108301d27d9SRadoslaw Biernacki /* 109301d27d9SRadoslaw Biernacki * Check params passed from BL2 110301d27d9SRadoslaw Biernacki */ 111301d27d9SRadoslaw Biernacki bl_params_t *params_from_bl2 = (bl_params_t *)arg0; 112301d27d9SRadoslaw Biernacki 113301d27d9SRadoslaw Biernacki assert(params_from_bl2); 114301d27d9SRadoslaw Biernacki assert(params_from_bl2->h.type == PARAM_BL_PARAMS); 115301d27d9SRadoslaw Biernacki assert(params_from_bl2->h.version >= VERSION_2); 116301d27d9SRadoslaw Biernacki 117301d27d9SRadoslaw Biernacki bl_params_node_t *bl_params = params_from_bl2->head; 118301d27d9SRadoslaw Biernacki 119301d27d9SRadoslaw Biernacki /* 1208ffe0b2eSJean-Philippe Brucker * Copy BL33, BL32 and RMM (if present), entry point information. 121301d27d9SRadoslaw Biernacki * They are stored in Secure RAM, in BL2's address space. 122301d27d9SRadoslaw Biernacki */ 123301d27d9SRadoslaw Biernacki while (bl_params) { 124*7f9ef161SHarrison Mutai #if defined(__aarch64__) && TRANSFER_LIST 1257ad6775bSRaymond Mao if (bl_params->image_id == BL31_IMAGE_ID && 1267ad6775bSRaymond Mao GET_RW(bl_params->ep_info->spsr) == MODE_RW_64) 1277ad6775bSRaymond Mao is64 = true; 128*7f9ef161SHarrison Mutai #endif /* defined(__aarch64__) && TRANSFER_LIST */ 129301d27d9SRadoslaw Biernacki if (bl_params->image_id == BL32_IMAGE_ID) 130301d27d9SRadoslaw Biernacki bl32_image_ep_info = *bl_params->ep_info; 131301d27d9SRadoslaw Biernacki 1328ffe0b2eSJean-Philippe Brucker #if ENABLE_RME 1338ffe0b2eSJean-Philippe Brucker if (bl_params->image_id == RMM_IMAGE_ID) 1348ffe0b2eSJean-Philippe Brucker rmm_image_ep_info = *bl_params->ep_info; 1358ffe0b2eSJean-Philippe Brucker #endif 1368ffe0b2eSJean-Philippe Brucker 137301d27d9SRadoslaw Biernacki if (bl_params->image_id == BL33_IMAGE_ID) 138301d27d9SRadoslaw Biernacki bl33_image_ep_info = *bl_params->ep_info; 139301d27d9SRadoslaw Biernacki 140301d27d9SRadoslaw Biernacki bl_params = bl_params->next_params_info; 141301d27d9SRadoslaw Biernacki } 142301d27d9SRadoslaw Biernacki 143301d27d9SRadoslaw Biernacki if (!bl33_image_ep_info.pc) 144301d27d9SRadoslaw Biernacki panic(); 1458ffe0b2eSJean-Philippe Brucker #if ENABLE_RME 1468ffe0b2eSJean-Philippe Brucker if (!rmm_image_ep_info.pc) 1478ffe0b2eSJean-Philippe Brucker panic(); 1488ffe0b2eSJean-Philippe Brucker #endif 149305825b4SRaymond Mao 150*7f9ef161SHarrison Mutai #if TRANSFER_LIST 151*7f9ef161SHarrison Mutai if (!transfer_list_check_header((void *)arg3)) 1527ad6775bSRaymond Mao return; 1537ad6775bSRaymond Mao 1547ad6775bSRaymond Mao if (is64) 1557ad6775bSRaymond Mao hval = TRANSFER_LIST_HANDOFF_X1_VALUE(REGISTER_CONVENTION_VERSION); 1567ad6775bSRaymond Mao else 1577ad6775bSRaymond Mao hval = TRANSFER_LIST_HANDOFF_R1_VALUE(REGISTER_CONVENTION_VERSION); 1587ad6775bSRaymond Mao 1597ad6775bSRaymond Mao if (arg1 != hval) 1607ad6775bSRaymond Mao return; 161*7f9ef161SHarrison Mutai #endif 1627ad6775bSRaymond Mao 163305825b4SRaymond Mao bl31_tl = (void *)arg3; /* saved TL address from BL2 */ 164305825b4SRaymond Mao } 165301d27d9SRadoslaw Biernacki 16672d47829SJean-Philippe Brucker #if ENABLE_RME 167d079d65dSMathieu Poirier #if PLAT_qemu 16872d47829SJean-Philippe Brucker /* 16972d47829SJean-Philippe Brucker * The GPT library might modify the gpt regions structure to optimize 17072d47829SJean-Philippe Brucker * the layout, so the array cannot be constant. 17172d47829SJean-Philippe Brucker */ 172d079d65dSMathieu Poirier static pas_region_t pas_regions[] = { 17372d47829SJean-Philippe Brucker QEMU_PAS_ROOT, 17472d47829SJean-Philippe Brucker QEMU_PAS_SECURE, 17572d47829SJean-Philippe Brucker QEMU_PAS_GPTS, 17672d47829SJean-Philippe Brucker QEMU_PAS_NS0, 17772d47829SJean-Philippe Brucker QEMU_PAS_REALM, 17872d47829SJean-Philippe Brucker QEMU_PAS_NS1, 17972d47829SJean-Philippe Brucker }; 18072d47829SJean-Philippe Brucker 181d079d65dSMathieu Poirier static inline void bl31_adjust_pas_regions(void) {} 182d079d65dSMathieu Poirier #elif PLAT_qemu_sbsa 183d079d65dSMathieu Poirier /* 184d079d65dSMathieu Poirier * The GPT library might modify the gpt regions structure to optimize 185d079d65dSMathieu Poirier * the layout, so the array cannot be constant. 186d079d65dSMathieu Poirier */ 187d079d65dSMathieu Poirier static pas_region_t pas_regions[] = { 188d079d65dSMathieu Poirier QEMU_PAS_ROOT, 189d079d65dSMathieu Poirier QEMU_PAS_SECURE, 190d079d65dSMathieu Poirier QEMU_PAS_GPTS, 191d079d65dSMathieu Poirier QEMU_PAS_REALM, 192d079d65dSMathieu Poirier QEMU_PAS_NS0, 193d079d65dSMathieu Poirier }; 194d079d65dSMathieu Poirier 195d079d65dSMathieu Poirier static void bl31_adjust_pas_regions(void) 196d079d65dSMathieu Poirier { 197d079d65dSMathieu Poirier uint64_t base_addr = 0, total_size = 0; 198d079d65dSMathieu Poirier struct platform_memory_data data; 199d079d65dSMathieu Poirier uint32_t node; 200d079d65dSMathieu Poirier 201d079d65dSMathieu Poirier /* 202d079d65dSMathieu Poirier * The amount of memory supported by the SBSA platform is dynamic 203d079d65dSMathieu Poirier * and dependent on user input. Since the configuration of the GPT 204d079d65dSMathieu Poirier * needs to reflect the system memory, QEMU_PAS_NS0 needs to be set 205d079d65dSMathieu Poirier * based on the information found in the device tree. 206d079d65dSMathieu Poirier */ 207d079d65dSMathieu Poirier 208d079d65dSMathieu Poirier for (node = 0; node < sbsa_platform_num_memnodes(); node++) { 209d079d65dSMathieu Poirier data = sbsa_platform_memory_node(node); 210d079d65dSMathieu Poirier 211d079d65dSMathieu Poirier if (data.nodeid == 0) { 212d079d65dSMathieu Poirier base_addr = data.addr_base; 213d079d65dSMathieu Poirier } 214d079d65dSMathieu Poirier 215d079d65dSMathieu Poirier total_size += data.addr_size; 216d079d65dSMathieu Poirier } 217d079d65dSMathieu Poirier 218d079d65dSMathieu Poirier /* Index '4' correspond to QEMU_PAS_NS0, see pas_regions[] above */ 219d079d65dSMathieu Poirier pas_regions[4].base_pa = base_addr; 220d079d65dSMathieu Poirier pas_regions[4].size = total_size; 221d079d65dSMathieu Poirier } 222d079d65dSMathieu Poirier #endif /* PLAT_qemu */ 223d079d65dSMathieu Poirier 224d079d65dSMathieu Poirier static void bl31_plat_gpt_setup(void) 225d079d65dSMathieu Poirier { 22672d47829SJean-Philippe Brucker /* 22772d47829SJean-Philippe Brucker * Initialize entire protected space to GPT_GPI_ANY. With each L0 entry 22872d47829SJean-Philippe Brucker * covering 1GB (currently the only supported option), then covering 22972d47829SJean-Philippe Brucker * 256TB of RAM (48-bit PA) would require a 2MB L0 region. At the 23072d47829SJean-Philippe Brucker * moment we use a 8KB table, which covers 1TB of RAM (40-bit PA). 23172d47829SJean-Philippe Brucker */ 232a32a77f9SJean-Philippe Brucker if (gpt_init_l0_tables(PLAT_QEMU_GPCCR_PPS, PLAT_QEMU_L0_GPT_BASE, 233a32a77f9SJean-Philippe Brucker PLAT_QEMU_L0_GPT_SIZE) < 0) { 23472d47829SJean-Philippe Brucker ERROR("gpt_init_l0_tables() failed!\n"); 23572d47829SJean-Philippe Brucker panic(); 23672d47829SJean-Philippe Brucker } 23772d47829SJean-Philippe Brucker 238d079d65dSMathieu Poirier bl31_adjust_pas_regions(); 239d079d65dSMathieu Poirier 24072d47829SJean-Philippe Brucker /* Carve out defined PAS ranges. */ 24172d47829SJean-Philippe Brucker if (gpt_init_pas_l1_tables(GPCCR_PGS_4K, 24272d47829SJean-Philippe Brucker PLAT_QEMU_L1_GPT_BASE, 24372d47829SJean-Philippe Brucker PLAT_QEMU_L1_GPT_SIZE, 24472d47829SJean-Philippe Brucker pas_regions, 24572d47829SJean-Philippe Brucker (unsigned int)(sizeof(pas_regions) / 24672d47829SJean-Philippe Brucker sizeof(pas_region_t))) < 0) { 24772d47829SJean-Philippe Brucker ERROR("gpt_init_pas_l1_tables() failed!\n"); 24872d47829SJean-Philippe Brucker panic(); 24972d47829SJean-Philippe Brucker } 25072d47829SJean-Philippe Brucker 25172d47829SJean-Philippe Brucker INFO("Enabling Granule Protection Checks\n"); 25272d47829SJean-Philippe Brucker if (gpt_enable() < 0) { 25372d47829SJean-Philippe Brucker ERROR("gpt_enable() failed!\n"); 25472d47829SJean-Philippe Brucker panic(); 25572d47829SJean-Philippe Brucker } 25672d47829SJean-Philippe Brucker } 25772d47829SJean-Philippe Brucker #endif 25872d47829SJean-Philippe Brucker 259301d27d9SRadoslaw Biernacki void bl31_plat_arch_setup(void) 260301d27d9SRadoslaw Biernacki { 261a12cb77cSChen Baozi const mmap_region_t bl_regions[] = { 262a12cb77cSChen Baozi MAP_BL31_TOTAL, 263a12cb77cSChen Baozi MAP_BL31_RO, 264af994ae8SChen Baozi #if USE_COHERENT_MEM 265a12cb77cSChen Baozi MAP_BL_COHERENT_RAM, 266af994ae8SChen Baozi #endif 267cd75693fSJean-Philippe Brucker #if ENABLE_RME 268cd75693fSJean-Philippe Brucker MAP_GPT_L0_REGION, 269cd75693fSJean-Philippe Brucker MAP_GPT_L1_REGION, 270cd75693fSJean-Philippe Brucker MAP_RMM_SHARED_MEM, 271cd75693fSJean-Philippe Brucker #endif 272a12cb77cSChen Baozi {0} 273a12cb77cSChen Baozi }; 274a12cb77cSChen Baozi 275a12cb77cSChen Baozi setup_page_tables(bl_regions, plat_qemu_get_mmap()); 276a12cb77cSChen Baozi 277a12cb77cSChen Baozi enable_mmu_el3(0); 2786cd113feSJean-Philippe Brucker 2796cd113feSJean-Philippe Brucker #if ENABLE_RME 28072d47829SJean-Philippe Brucker /* Initialise and enable granule protection after MMU. */ 28172d47829SJean-Philippe Brucker bl31_plat_gpt_setup(); 28272d47829SJean-Philippe Brucker 2836cd113feSJean-Philippe Brucker /* 2846cd113feSJean-Philippe Brucker * Initialise Granule Protection library and enable GPC for the primary 2856cd113feSJean-Philippe Brucker * processor. The tables have already been initialized by a previous BL 2866cd113feSJean-Philippe Brucker * stage, so there is no need to provide any PAS here. This function 2876cd113feSJean-Philippe Brucker * sets up pointers to those tables. 2886cd113feSJean-Philippe Brucker */ 289a32a77f9SJean-Philippe Brucker if (gpt_runtime_init(BITLOCK_BASE, BITLOCK_SIZE) < 0) { 2906cd113feSJean-Philippe Brucker ERROR("gpt_runtime_init() failed!\n"); 2916cd113feSJean-Philippe Brucker panic(); 2926cd113feSJean-Philippe Brucker } 2936cd113feSJean-Philippe Brucker #endif /* ENABLE_RME */ 2946cd113feSJean-Philippe Brucker 295301d27d9SRadoslaw Biernacki } 296301d27d9SRadoslaw Biernacki 297ffb07b04SMaxim Uvarov static void qemu_gpio_init(void) 298ffb07b04SMaxim Uvarov { 299ffb07b04SMaxim Uvarov #ifdef SECURE_GPIO_BASE 300ffb07b04SMaxim Uvarov pl061_gpio_init(); 301ffb07b04SMaxim Uvarov pl061_gpio_register(SECURE_GPIO_BASE, 0); 302ffb07b04SMaxim Uvarov #endif 303ffb07b04SMaxim Uvarov } 304ffb07b04SMaxim Uvarov 305301d27d9SRadoslaw Biernacki void bl31_platform_setup(void) 306301d27d9SRadoslaw Biernacki { 307301d27d9SRadoslaw Biernacki plat_qemu_gic_init(); 308ffb07b04SMaxim Uvarov qemu_gpio_init(); 309301d27d9SRadoslaw Biernacki } 310301d27d9SRadoslaw Biernacki 311301d27d9SRadoslaw Biernacki unsigned int plat_get_syscnt_freq2(void) 312301d27d9SRadoslaw Biernacki { 3135436047aSMarcin Juszkiewicz return read_cntfrq_el0(); 314301d27d9SRadoslaw Biernacki } 315301d27d9SRadoslaw Biernacki 316301d27d9SRadoslaw Biernacki /******************************************************************************* 317301d27d9SRadoslaw Biernacki * Return a pointer to the 'entry_point_info' structure of the next image 318301d27d9SRadoslaw Biernacki * for the security state specified. BL3-3 corresponds to the non-secure 319301d27d9SRadoslaw Biernacki * image type while BL3-2 corresponds to the secure image type. A NULL 320301d27d9SRadoslaw Biernacki * pointer is returned if the image does not exist. 321301d27d9SRadoslaw Biernacki ******************************************************************************/ 322301d27d9SRadoslaw Biernacki entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type) 323301d27d9SRadoslaw Biernacki { 324301d27d9SRadoslaw Biernacki entry_point_info_t *next_image_info; 325301d27d9SRadoslaw Biernacki 326301d27d9SRadoslaw Biernacki assert(sec_state_is_valid(type)); 3278ffe0b2eSJean-Philippe Brucker if (type == NON_SECURE) { 3288ffe0b2eSJean-Philippe Brucker next_image_info = &bl33_image_ep_info; 3298ffe0b2eSJean-Philippe Brucker } 3308ffe0b2eSJean-Philippe Brucker #if ENABLE_RME 3318ffe0b2eSJean-Philippe Brucker else if (type == REALM) { 3328ffe0b2eSJean-Philippe Brucker next_image_info = &rmm_image_ep_info; 3338ffe0b2eSJean-Philippe Brucker } 3348ffe0b2eSJean-Philippe Brucker #endif 3358ffe0b2eSJean-Philippe Brucker else { 3368ffe0b2eSJean-Philippe Brucker next_image_info = &bl32_image_ep_info; 3378ffe0b2eSJean-Philippe Brucker } 3388ffe0b2eSJean-Philippe Brucker 339301d27d9SRadoslaw Biernacki /* 340301d27d9SRadoslaw Biernacki * None of the images on the ARM development platforms can have 0x0 341301d27d9SRadoslaw Biernacki * as the entrypoint 342301d27d9SRadoslaw Biernacki */ 343301d27d9SRadoslaw Biernacki if (next_image_info->pc) 344301d27d9SRadoslaw Biernacki return next_image_info; 345301d27d9SRadoslaw Biernacki else 346301d27d9SRadoslaw Biernacki return NULL; 347301d27d9SRadoslaw Biernacki } 348305825b4SRaymond Mao 349305825b4SRaymond Mao void bl31_plat_runtime_setup(void) 350305825b4SRaymond Mao { 351305825b4SRaymond Mao #if TRANSFER_LIST 352305825b4SRaymond Mao if (bl31_tl) { 353305825b4SRaymond Mao /* 354cc58f08fSRaymond Mao * Relocate the TL from S to NS memory before EL3 exit 355305825b4SRaymond Mao * to reflect all changes in TL done by BL32 356305825b4SRaymond Mao */ 357cc58f08fSRaymond Mao if (!transfer_list_relocate(bl31_tl, (void *)FW_NS_HANDOFF_BASE, 358cc58f08fSRaymond Mao bl31_tl->max_size)) 359cc58f08fSRaymond Mao ERROR("Relocate TL to NS memory failed\n"); 360305825b4SRaymond Mao } 361305825b4SRaymond Mao #endif 362c09aa4ffSJens Wiklander 363c09aa4ffSJens Wiklander console_flush(); 364c09aa4ffSJens Wiklander console_switch_state(CONSOLE_FLAG_RUNTIME); 365305825b4SRaymond Mao } 366