xref: /rk3399_ARM-atf/plat/qemu/common/qemu_bl31_setup.c (revision a32a77f9c7567141556a823c0b9d4d5488c95722)
1301d27d9SRadoslaw Biernacki /*
2cd75693fSJean-Philippe Brucker  * Copyright (c) 2015-2024, Arm Limited and Contributors. All rights reserved.
3301d27d9SRadoslaw Biernacki  *
4301d27d9SRadoslaw Biernacki  * SPDX-License-Identifier: BSD-3-Clause
5301d27d9SRadoslaw Biernacki  */
6301d27d9SRadoslaw Biernacki 
7301d27d9SRadoslaw Biernacki #include <assert.h>
8301d27d9SRadoslaw Biernacki 
9301d27d9SRadoslaw Biernacki #include <common/bl_common.h>
10ffb07b04SMaxim Uvarov #include <drivers/arm/pl061_gpio.h>
116cd113feSJean-Philippe Brucker #include <lib/gpt_rme/gpt_rme.h>
12305825b4SRaymond Mao #include <lib/transfer_list.h>
13301d27d9SRadoslaw Biernacki #include <plat/common/platform.h>
1472d47829SJean-Philippe Brucker #if ENABLE_RME
15d079d65dSMathieu Poirier #ifdef PLAT_qemu
1672d47829SJean-Philippe Brucker #include <qemu_pas_def.h>
17d079d65dSMathieu Poirier #elif PLAT_qemu_sbsa
18d079d65dSMathieu Poirier #include <qemu_sbsa_pas_def.h>
19d079d65dSMathieu Poirier #endif /* PLAT_qemu */
20d079d65dSMathieu Poirier #endif /* ENABLE_RME */
216d59413bSMathieu Poirier #ifdef PLAT_qemu_sbsa
226d59413bSMathieu Poirier #include <sbsa_platform.h>
236d59413bSMathieu Poirier #endif
24301d27d9SRadoslaw Biernacki 
25301d27d9SRadoslaw Biernacki #include "qemu_private.h"
26301d27d9SRadoslaw Biernacki 
27a12cb77cSChen Baozi #define MAP_BL31_TOTAL		MAP_REGION_FLAT(			\
28a12cb77cSChen Baozi 					BL31_BASE,			\
29a12cb77cSChen Baozi 					BL31_END - BL31_BASE,		\
30a12cb77cSChen Baozi 					MT_MEMORY | MT_RW | EL3_PAS)
31a12cb77cSChen Baozi #define MAP_BL31_RO		MAP_REGION_FLAT(			\
32a12cb77cSChen Baozi 					BL_CODE_BASE,			\
33a12cb77cSChen Baozi 					BL_CODE_END - BL_CODE_BASE,	\
34a12cb77cSChen Baozi 					MT_CODE | EL3_PAS),		\
35a12cb77cSChen Baozi 				MAP_REGION_FLAT(			\
36a12cb77cSChen Baozi 					BL_RO_DATA_BASE,		\
37a12cb77cSChen Baozi 					BL_RO_DATA_END			\
38a12cb77cSChen Baozi 						- BL_RO_DATA_BASE,	\
39a12cb77cSChen Baozi 					MT_RO_DATA | EL3_PAS)
40a12cb77cSChen Baozi 
41af994ae8SChen Baozi #if USE_COHERENT_MEM
42a12cb77cSChen Baozi #define MAP_BL_COHERENT_RAM	MAP_REGION_FLAT(			\
43a12cb77cSChen Baozi 					BL_COHERENT_RAM_BASE,		\
44a12cb77cSChen Baozi 					BL_COHERENT_RAM_END		\
45a12cb77cSChen Baozi 						- BL_COHERENT_RAM_BASE,	\
46a12cb77cSChen Baozi 					MT_DEVICE | MT_RW | EL3_PAS)
47af994ae8SChen Baozi #endif
48a12cb77cSChen Baozi 
49*a32a77f9SJean-Philippe Brucker #if ENABLE_RME
50*a32a77f9SJean-Philippe Brucker #if (RME_GPT_BITLOCK_BLOCK == 0)
51*a32a77f9SJean-Philippe Brucker #define BITLOCK_BASE	UL(0)
52*a32a77f9SJean-Philippe Brucker #define BITLOCK_SIZE	UL(0)
53*a32a77f9SJean-Philippe Brucker #else
54*a32a77f9SJean-Philippe Brucker 
55*a32a77f9SJean-Philippe Brucker /*
56*a32a77f9SJean-Philippe Brucker  * Number of bitlock_t entries in the gpt_bitlock array for this platform's
57*a32a77f9SJean-Philippe Brucker  * Protected Physical Size. One 8-bit bitlock_t entry covers
58*a32a77f9SJean-Philippe Brucker  * 8 * RME_GPT_BITLOCK_BLOCK * 512MB.
59*a32a77f9SJean-Philippe Brucker  */
60*a32a77f9SJean-Philippe Brucker #if (PLAT_QEMU_PPS > (RME_GPT_BITLOCK_BLOCK * SZ_512M * UL(8)))
61*a32a77f9SJean-Philippe Brucker #define BITLOCKS_NUM	(PLAT_QEMU_PPS /	\
62*a32a77f9SJean-Philippe Brucker 			(RME_GPT_BITLOCK_BLOCK * SZ_512M * UL(8)))
63*a32a77f9SJean-Philippe Brucker #else
64*a32a77f9SJean-Philippe Brucker #define BITLOCKS_NUM	1
65*a32a77f9SJean-Philippe Brucker #endif
66*a32a77f9SJean-Philippe Brucker 
67*a32a77f9SJean-Philippe Brucker static bitlock_t gpt_bitlock[BITLOCKS_NUM];
68*a32a77f9SJean-Philippe Brucker #define BITLOCK_BASE	(uintptr_t)gpt_bitlock
69*a32a77f9SJean-Philippe Brucker #define BITLOCK_SIZE	sizeof(gpt_bitlock)
70*a32a77f9SJean-Philippe Brucker #endif /* RME_GPT_BITLOCK_BLOCK */
71*a32a77f9SJean-Philippe Brucker #endif /* ENABLE_RME */
72*a32a77f9SJean-Philippe Brucker 
73301d27d9SRadoslaw Biernacki /*
74301d27d9SRadoslaw Biernacki  * Placeholder variables for copying the arguments that have been passed to
75301d27d9SRadoslaw Biernacki  * BL3-1 from BL2.
76301d27d9SRadoslaw Biernacki  */
77301d27d9SRadoslaw Biernacki static entry_point_info_t bl32_image_ep_info;
78301d27d9SRadoslaw Biernacki static entry_point_info_t bl33_image_ep_info;
798ffe0b2eSJean-Philippe Brucker #if ENABLE_RME
808ffe0b2eSJean-Philippe Brucker static entry_point_info_t rmm_image_ep_info;
818ffe0b2eSJean-Philippe Brucker #endif
82305825b4SRaymond Mao static struct transfer_list_header *bl31_tl;
83301d27d9SRadoslaw Biernacki 
84301d27d9SRadoslaw Biernacki /*******************************************************************************
85301d27d9SRadoslaw Biernacki  * Perform any BL3-1 early platform setup.  Here is an opportunity to copy
86301d27d9SRadoslaw Biernacki  * parameters passed by the calling EL (S-EL1 in BL2 & EL3 in BL1) before
87301d27d9SRadoslaw Biernacki  * they are lost (potentially). This needs to be done before the MMU is
88301d27d9SRadoslaw Biernacki  * initialized so that the memory layout can be used while creating page
89301d27d9SRadoslaw Biernacki  * tables. BL2 has flushed this information to memory, so we are guaranteed
90301d27d9SRadoslaw Biernacki  * to pick up good data.
91301d27d9SRadoslaw Biernacki  ******************************************************************************/
92301d27d9SRadoslaw Biernacki void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
93301d27d9SRadoslaw Biernacki 				u_register_t arg2, u_register_t arg3)
94301d27d9SRadoslaw Biernacki {
957ad6775bSRaymond Mao 	bool is64 = false;
967ad6775bSRaymond Mao 	uint64_t hval;
977ad6775bSRaymond Mao 
98301d27d9SRadoslaw Biernacki 	/* Initialize the console to provide early debug support */
99301d27d9SRadoslaw Biernacki 	qemu_console_init();
100301d27d9SRadoslaw Biernacki 
101c681d02cSMarcin Juszkiewicz /* Platform names have to be lowercase. */
102c681d02cSMarcin Juszkiewicz #ifdef PLAT_qemu_sbsa
1036d59413bSMathieu Poirier 	sbsa_platform_init();
104c681d02cSMarcin Juszkiewicz #endif
105c681d02cSMarcin Juszkiewicz 
106301d27d9SRadoslaw Biernacki 	/*
107301d27d9SRadoslaw Biernacki 	 * Check params passed from BL2
108301d27d9SRadoslaw Biernacki 	 */
109301d27d9SRadoslaw Biernacki 	bl_params_t *params_from_bl2 = (bl_params_t *)arg0;
110301d27d9SRadoslaw Biernacki 
111301d27d9SRadoslaw Biernacki 	assert(params_from_bl2);
112301d27d9SRadoslaw Biernacki 	assert(params_from_bl2->h.type == PARAM_BL_PARAMS);
113301d27d9SRadoslaw Biernacki 	assert(params_from_bl2->h.version >= VERSION_2);
114301d27d9SRadoslaw Biernacki 
115301d27d9SRadoslaw Biernacki 	bl_params_node_t *bl_params = params_from_bl2->head;
116301d27d9SRadoslaw Biernacki 
117301d27d9SRadoslaw Biernacki 	/*
1188ffe0b2eSJean-Philippe Brucker 	 * Copy BL33, BL32 and RMM (if present), entry point information.
119301d27d9SRadoslaw Biernacki 	 * They are stored in Secure RAM, in BL2's address space.
120301d27d9SRadoslaw Biernacki 	 */
121301d27d9SRadoslaw Biernacki 	while (bl_params) {
1227ad6775bSRaymond Mao #ifdef __aarch64__
1237ad6775bSRaymond Mao 		if (bl_params->image_id == BL31_IMAGE_ID &&
1247ad6775bSRaymond Mao 		    GET_RW(bl_params->ep_info->spsr) == MODE_RW_64)
1257ad6775bSRaymond Mao 			is64 = true;
1267ad6775bSRaymond Mao #endif
127301d27d9SRadoslaw Biernacki 		if (bl_params->image_id == BL32_IMAGE_ID)
128301d27d9SRadoslaw Biernacki 			bl32_image_ep_info = *bl_params->ep_info;
129301d27d9SRadoslaw Biernacki 
1308ffe0b2eSJean-Philippe Brucker #if ENABLE_RME
1318ffe0b2eSJean-Philippe Brucker 		if (bl_params->image_id == RMM_IMAGE_ID)
1328ffe0b2eSJean-Philippe Brucker 			rmm_image_ep_info = *bl_params->ep_info;
1338ffe0b2eSJean-Philippe Brucker #endif
1348ffe0b2eSJean-Philippe Brucker 
135301d27d9SRadoslaw Biernacki 		if (bl_params->image_id == BL33_IMAGE_ID)
136301d27d9SRadoslaw Biernacki 			bl33_image_ep_info = *bl_params->ep_info;
137301d27d9SRadoslaw Biernacki 
138301d27d9SRadoslaw Biernacki 		bl_params = bl_params->next_params_info;
139301d27d9SRadoslaw Biernacki 	}
140301d27d9SRadoslaw Biernacki 
141301d27d9SRadoslaw Biernacki 	if (!bl33_image_ep_info.pc)
142301d27d9SRadoslaw Biernacki 		panic();
1438ffe0b2eSJean-Philippe Brucker #if ENABLE_RME
1448ffe0b2eSJean-Philippe Brucker 	if (!rmm_image_ep_info.pc)
1458ffe0b2eSJean-Philippe Brucker 		panic();
1468ffe0b2eSJean-Philippe Brucker #endif
147305825b4SRaymond Mao 
1487ad6775bSRaymond Mao 	if (!TRANSFER_LIST ||
1497ad6775bSRaymond Mao 	    !transfer_list_check_header((void *)arg3))
1507ad6775bSRaymond Mao 		return;
1517ad6775bSRaymond Mao 
1527ad6775bSRaymond Mao 	if (is64)
1537ad6775bSRaymond Mao 		hval = TRANSFER_LIST_HANDOFF_X1_VALUE(REGISTER_CONVENTION_VERSION);
1547ad6775bSRaymond Mao 	else
1557ad6775bSRaymond Mao 		hval = TRANSFER_LIST_HANDOFF_R1_VALUE(REGISTER_CONVENTION_VERSION);
1567ad6775bSRaymond Mao 
1577ad6775bSRaymond Mao 	if (arg1 != hval)
1587ad6775bSRaymond Mao 		return;
1597ad6775bSRaymond Mao 
160305825b4SRaymond Mao 	bl31_tl = (void *)arg3; /* saved TL address from BL2 */
161305825b4SRaymond Mao }
162301d27d9SRadoslaw Biernacki 
16372d47829SJean-Philippe Brucker #if ENABLE_RME
164d079d65dSMathieu Poirier #if PLAT_qemu
16572d47829SJean-Philippe Brucker /*
16672d47829SJean-Philippe Brucker  * The GPT library might modify the gpt regions structure to optimize
16772d47829SJean-Philippe Brucker  * the layout, so the array cannot be constant.
16872d47829SJean-Philippe Brucker  */
169d079d65dSMathieu Poirier static pas_region_t pas_regions[] = {
17072d47829SJean-Philippe Brucker 	QEMU_PAS_ROOT,
17172d47829SJean-Philippe Brucker 	QEMU_PAS_SECURE,
17272d47829SJean-Philippe Brucker 	QEMU_PAS_GPTS,
17372d47829SJean-Philippe Brucker 	QEMU_PAS_NS0,
17472d47829SJean-Philippe Brucker 	QEMU_PAS_REALM,
17572d47829SJean-Philippe Brucker 	QEMU_PAS_NS1,
17672d47829SJean-Philippe Brucker };
17772d47829SJean-Philippe Brucker 
178d079d65dSMathieu Poirier static inline void bl31_adjust_pas_regions(void) {}
179d079d65dSMathieu Poirier #elif PLAT_qemu_sbsa
180d079d65dSMathieu Poirier /*
181d079d65dSMathieu Poirier  * The GPT library might modify the gpt regions structure to optimize
182d079d65dSMathieu Poirier  * the layout, so the array cannot be constant.
183d079d65dSMathieu Poirier  */
184d079d65dSMathieu Poirier static pas_region_t pas_regions[] = {
185d079d65dSMathieu Poirier 	QEMU_PAS_ROOT,
186d079d65dSMathieu Poirier 	QEMU_PAS_SECURE,
187d079d65dSMathieu Poirier 	QEMU_PAS_GPTS,
188d079d65dSMathieu Poirier 	QEMU_PAS_REALM,
189d079d65dSMathieu Poirier 	QEMU_PAS_NS0,
190d079d65dSMathieu Poirier };
191d079d65dSMathieu Poirier 
192d079d65dSMathieu Poirier static void bl31_adjust_pas_regions(void)
193d079d65dSMathieu Poirier {
194d079d65dSMathieu Poirier 	uint64_t base_addr = 0, total_size = 0;
195d079d65dSMathieu Poirier 	struct platform_memory_data data;
196d079d65dSMathieu Poirier 	uint32_t node;
197d079d65dSMathieu Poirier 
198d079d65dSMathieu Poirier 	/*
199d079d65dSMathieu Poirier 	 * The amount of memory supported by the SBSA platform is dynamic
200d079d65dSMathieu Poirier 	 * and dependent on user input.  Since the configuration of the GPT
201d079d65dSMathieu Poirier 	 * needs to reflect the system memory, QEMU_PAS_NS0 needs to be set
202d079d65dSMathieu Poirier 	 * based on the information found in the device tree.
203d079d65dSMathieu Poirier 	 */
204d079d65dSMathieu Poirier 
205d079d65dSMathieu Poirier 	for (node = 0; node < sbsa_platform_num_memnodes(); node++) {
206d079d65dSMathieu Poirier 		data = sbsa_platform_memory_node(node);
207d079d65dSMathieu Poirier 
208d079d65dSMathieu Poirier 		if (data.nodeid == 0) {
209d079d65dSMathieu Poirier 			base_addr = data.addr_base;
210d079d65dSMathieu Poirier 		}
211d079d65dSMathieu Poirier 
212d079d65dSMathieu Poirier 		total_size += data.addr_size;
213d079d65dSMathieu Poirier 	}
214d079d65dSMathieu Poirier 
215d079d65dSMathieu Poirier 	 /* Index '4' correspond to QEMU_PAS_NS0, see pas_regions[] above */
216d079d65dSMathieu Poirier 	pas_regions[4].base_pa = base_addr;
217d079d65dSMathieu Poirier 	pas_regions[4].size = total_size;
218d079d65dSMathieu Poirier }
219d079d65dSMathieu Poirier #endif /* PLAT_qemu */
220d079d65dSMathieu Poirier 
221d079d65dSMathieu Poirier static void bl31_plat_gpt_setup(void)
222d079d65dSMathieu Poirier {
22372d47829SJean-Philippe Brucker 	/*
22472d47829SJean-Philippe Brucker 	 * Initialize entire protected space to GPT_GPI_ANY. With each L0 entry
22572d47829SJean-Philippe Brucker 	 * covering 1GB (currently the only supported option), then covering
22672d47829SJean-Philippe Brucker 	 * 256TB of RAM (48-bit PA) would require a 2MB L0 region. At the
22772d47829SJean-Philippe Brucker 	 * moment we use a 8KB table, which covers 1TB of RAM (40-bit PA).
22872d47829SJean-Philippe Brucker 	 */
229*a32a77f9SJean-Philippe Brucker 	if (gpt_init_l0_tables(PLAT_QEMU_GPCCR_PPS, PLAT_QEMU_L0_GPT_BASE,
230*a32a77f9SJean-Philippe Brucker 			       PLAT_QEMU_L0_GPT_SIZE) < 0) {
23172d47829SJean-Philippe Brucker 		ERROR("gpt_init_l0_tables() failed!\n");
23272d47829SJean-Philippe Brucker 		panic();
23372d47829SJean-Philippe Brucker 	}
23472d47829SJean-Philippe Brucker 
235d079d65dSMathieu Poirier 	bl31_adjust_pas_regions();
236d079d65dSMathieu Poirier 
23772d47829SJean-Philippe Brucker 	/* Carve out defined PAS ranges. */
23872d47829SJean-Philippe Brucker 	if (gpt_init_pas_l1_tables(GPCCR_PGS_4K,
23972d47829SJean-Philippe Brucker 				   PLAT_QEMU_L1_GPT_BASE,
24072d47829SJean-Philippe Brucker 				   PLAT_QEMU_L1_GPT_SIZE,
24172d47829SJean-Philippe Brucker 				   pas_regions,
24272d47829SJean-Philippe Brucker 				   (unsigned int)(sizeof(pas_regions) /
24372d47829SJean-Philippe Brucker 						  sizeof(pas_region_t))) < 0) {
24472d47829SJean-Philippe Brucker 		ERROR("gpt_init_pas_l1_tables() failed!\n");
24572d47829SJean-Philippe Brucker 		panic();
24672d47829SJean-Philippe Brucker 	}
24772d47829SJean-Philippe Brucker 
24872d47829SJean-Philippe Brucker 	INFO("Enabling Granule Protection Checks\n");
24972d47829SJean-Philippe Brucker 	if (gpt_enable() < 0) {
25072d47829SJean-Philippe Brucker 		ERROR("gpt_enable() failed!\n");
25172d47829SJean-Philippe Brucker 		panic();
25272d47829SJean-Philippe Brucker 	}
25372d47829SJean-Philippe Brucker }
25472d47829SJean-Philippe Brucker #endif
25572d47829SJean-Philippe Brucker 
256301d27d9SRadoslaw Biernacki void bl31_plat_arch_setup(void)
257301d27d9SRadoslaw Biernacki {
258a12cb77cSChen Baozi 	const mmap_region_t bl_regions[] = {
259a12cb77cSChen Baozi 		MAP_BL31_TOTAL,
260a12cb77cSChen Baozi 		MAP_BL31_RO,
261af994ae8SChen Baozi #if USE_COHERENT_MEM
262a12cb77cSChen Baozi 		MAP_BL_COHERENT_RAM,
263af994ae8SChen Baozi #endif
264cd75693fSJean-Philippe Brucker #if ENABLE_RME
265cd75693fSJean-Philippe Brucker 		MAP_GPT_L0_REGION,
266cd75693fSJean-Philippe Brucker 		MAP_GPT_L1_REGION,
267cd75693fSJean-Philippe Brucker 		MAP_RMM_SHARED_MEM,
268cd75693fSJean-Philippe Brucker #endif
269a12cb77cSChen Baozi 		{0}
270a12cb77cSChen Baozi 	};
271a12cb77cSChen Baozi 
272a12cb77cSChen Baozi 	setup_page_tables(bl_regions, plat_qemu_get_mmap());
273a12cb77cSChen Baozi 
274a12cb77cSChen Baozi 	enable_mmu_el3(0);
2756cd113feSJean-Philippe Brucker 
2766cd113feSJean-Philippe Brucker #if ENABLE_RME
27772d47829SJean-Philippe Brucker 	/* Initialise and enable granule protection after MMU. */
27872d47829SJean-Philippe Brucker 	bl31_plat_gpt_setup();
27972d47829SJean-Philippe Brucker 
2806cd113feSJean-Philippe Brucker 	/*
2816cd113feSJean-Philippe Brucker 	 * Initialise Granule Protection library and enable GPC for the primary
2826cd113feSJean-Philippe Brucker 	 * processor. The tables have already been initialized by a previous BL
2836cd113feSJean-Philippe Brucker 	 * stage, so there is no need to provide any PAS here. This function
2846cd113feSJean-Philippe Brucker 	 * sets up pointers to those tables.
2856cd113feSJean-Philippe Brucker 	 */
286*a32a77f9SJean-Philippe Brucker 	if (gpt_runtime_init(BITLOCK_BASE, BITLOCK_SIZE) < 0) {
2876cd113feSJean-Philippe Brucker 		ERROR("gpt_runtime_init() failed!\n");
2886cd113feSJean-Philippe Brucker 		panic();
2896cd113feSJean-Philippe Brucker 	}
2906cd113feSJean-Philippe Brucker #endif /* ENABLE_RME */
2916cd113feSJean-Philippe Brucker 
292301d27d9SRadoslaw Biernacki }
293301d27d9SRadoslaw Biernacki 
294ffb07b04SMaxim Uvarov static void qemu_gpio_init(void)
295ffb07b04SMaxim Uvarov {
296ffb07b04SMaxim Uvarov #ifdef SECURE_GPIO_BASE
297ffb07b04SMaxim Uvarov 	pl061_gpio_init();
298ffb07b04SMaxim Uvarov 	pl061_gpio_register(SECURE_GPIO_BASE, 0);
299ffb07b04SMaxim Uvarov #endif
300ffb07b04SMaxim Uvarov }
301ffb07b04SMaxim Uvarov 
302301d27d9SRadoslaw Biernacki void bl31_platform_setup(void)
303301d27d9SRadoslaw Biernacki {
304301d27d9SRadoslaw Biernacki 	plat_qemu_gic_init();
305ffb07b04SMaxim Uvarov 	qemu_gpio_init();
306301d27d9SRadoslaw Biernacki }
307301d27d9SRadoslaw Biernacki 
308301d27d9SRadoslaw Biernacki unsigned int plat_get_syscnt_freq2(void)
309301d27d9SRadoslaw Biernacki {
3105436047aSMarcin Juszkiewicz 	return read_cntfrq_el0();
311301d27d9SRadoslaw Biernacki }
312301d27d9SRadoslaw Biernacki 
313301d27d9SRadoslaw Biernacki /*******************************************************************************
314301d27d9SRadoslaw Biernacki  * Return a pointer to the 'entry_point_info' structure of the next image
315301d27d9SRadoslaw Biernacki  * for the security state specified. BL3-3 corresponds to the non-secure
316301d27d9SRadoslaw Biernacki  * image type while BL3-2 corresponds to the secure image type. A NULL
317301d27d9SRadoslaw Biernacki  * pointer is returned if the image does not exist.
318301d27d9SRadoslaw Biernacki  ******************************************************************************/
319301d27d9SRadoslaw Biernacki entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
320301d27d9SRadoslaw Biernacki {
321301d27d9SRadoslaw Biernacki 	entry_point_info_t *next_image_info;
322301d27d9SRadoslaw Biernacki 
323301d27d9SRadoslaw Biernacki 	assert(sec_state_is_valid(type));
3248ffe0b2eSJean-Philippe Brucker 	if (type == NON_SECURE) {
3258ffe0b2eSJean-Philippe Brucker 		next_image_info = &bl33_image_ep_info;
3268ffe0b2eSJean-Philippe Brucker 	}
3278ffe0b2eSJean-Philippe Brucker #if ENABLE_RME
3288ffe0b2eSJean-Philippe Brucker 	else if (type == REALM) {
3298ffe0b2eSJean-Philippe Brucker 		next_image_info = &rmm_image_ep_info;
3308ffe0b2eSJean-Philippe Brucker 	}
3318ffe0b2eSJean-Philippe Brucker #endif
3328ffe0b2eSJean-Philippe Brucker 	else {
3338ffe0b2eSJean-Philippe Brucker 		next_image_info =  &bl32_image_ep_info;
3348ffe0b2eSJean-Philippe Brucker 	}
3358ffe0b2eSJean-Philippe Brucker 
336301d27d9SRadoslaw Biernacki 	/*
337301d27d9SRadoslaw Biernacki 	 * None of the images on the ARM development platforms can have 0x0
338301d27d9SRadoslaw Biernacki 	 * as the entrypoint
339301d27d9SRadoslaw Biernacki 	 */
340301d27d9SRadoslaw Biernacki 	if (next_image_info->pc)
341301d27d9SRadoslaw Biernacki 		return next_image_info;
342301d27d9SRadoslaw Biernacki 	else
343301d27d9SRadoslaw Biernacki 		return NULL;
344301d27d9SRadoslaw Biernacki }
345305825b4SRaymond Mao 
346305825b4SRaymond Mao void bl31_plat_runtime_setup(void)
347305825b4SRaymond Mao {
348305825b4SRaymond Mao #if TRANSFER_LIST
349305825b4SRaymond Mao 	if (bl31_tl) {
350305825b4SRaymond Mao 		/*
351cc58f08fSRaymond Mao 		 * Relocate the TL from S to NS memory before EL3 exit
352305825b4SRaymond Mao 		 * to reflect all changes in TL done by BL32
353305825b4SRaymond Mao 		 */
354cc58f08fSRaymond Mao 		if (!transfer_list_relocate(bl31_tl, (void *)FW_NS_HANDOFF_BASE,
355cc58f08fSRaymond Mao 					    bl31_tl->max_size))
356cc58f08fSRaymond Mao 			ERROR("Relocate TL to NS memory failed\n");
357305825b4SRaymond Mao 	}
358305825b4SRaymond Mao #endif
359c09aa4ffSJens Wiklander 
360c09aa4ffSJens Wiklander 	console_flush();
361c09aa4ffSJens Wiklander 	console_switch_state(CONSOLE_FLAG_RUNTIME);
362305825b4SRaymond Mao }
363