xref: /rk3399_ARM-atf/plat/qemu/common/qemu_bl31_setup.c (revision d079d65d420d0f9edd4aa64b27305fc6537095da)
1301d27d9SRadoslaw Biernacki /*
2cd75693fSJean-Philippe Brucker  * Copyright (c) 2015-2024, Arm Limited and Contributors. All rights reserved.
3301d27d9SRadoslaw Biernacki  *
4301d27d9SRadoslaw Biernacki  * SPDX-License-Identifier: BSD-3-Clause
5301d27d9SRadoslaw Biernacki  */
6301d27d9SRadoslaw Biernacki 
7301d27d9SRadoslaw Biernacki #include <assert.h>
8301d27d9SRadoslaw Biernacki 
9301d27d9SRadoslaw Biernacki #include <common/bl_common.h>
10ffb07b04SMaxim Uvarov #include <drivers/arm/pl061_gpio.h>
116cd113feSJean-Philippe Brucker #include <lib/gpt_rme/gpt_rme.h>
12305825b4SRaymond Mao #include <lib/transfer_list.h>
13301d27d9SRadoslaw Biernacki #include <plat/common/platform.h>
1472d47829SJean-Philippe Brucker #if ENABLE_RME
15*d079d65dSMathieu Poirier #ifdef PLAT_qemu
1672d47829SJean-Philippe Brucker #include <qemu_pas_def.h>
17*d079d65dSMathieu Poirier #elif PLAT_qemu_sbsa
18*d079d65dSMathieu Poirier #include <qemu_sbsa_pas_def.h>
19*d079d65dSMathieu Poirier #endif /* PLAT_qemu */
20*d079d65dSMathieu Poirier #endif /* ENABLE_RME */
216d59413bSMathieu Poirier #ifdef PLAT_qemu_sbsa
226d59413bSMathieu Poirier #include <sbsa_platform.h>
236d59413bSMathieu Poirier #endif
24301d27d9SRadoslaw Biernacki 
25301d27d9SRadoslaw Biernacki #include "qemu_private.h"
26301d27d9SRadoslaw Biernacki 
27a12cb77cSChen Baozi #define MAP_BL31_TOTAL		MAP_REGION_FLAT(			\
28a12cb77cSChen Baozi 					BL31_BASE,			\
29a12cb77cSChen Baozi 					BL31_END - BL31_BASE,		\
30a12cb77cSChen Baozi 					MT_MEMORY | MT_RW | EL3_PAS)
31a12cb77cSChen Baozi #define MAP_BL31_RO		MAP_REGION_FLAT(			\
32a12cb77cSChen Baozi 					BL_CODE_BASE,			\
33a12cb77cSChen Baozi 					BL_CODE_END - BL_CODE_BASE,	\
34a12cb77cSChen Baozi 					MT_CODE | EL3_PAS),		\
35a12cb77cSChen Baozi 				MAP_REGION_FLAT(			\
36a12cb77cSChen Baozi 					BL_RO_DATA_BASE,		\
37a12cb77cSChen Baozi 					BL_RO_DATA_END			\
38a12cb77cSChen Baozi 						- BL_RO_DATA_BASE,	\
39a12cb77cSChen Baozi 					MT_RO_DATA | EL3_PAS)
40a12cb77cSChen Baozi 
41af994ae8SChen Baozi #if USE_COHERENT_MEM
42a12cb77cSChen Baozi #define MAP_BL_COHERENT_RAM	MAP_REGION_FLAT(			\
43a12cb77cSChen Baozi 					BL_COHERENT_RAM_BASE,		\
44a12cb77cSChen Baozi 					BL_COHERENT_RAM_END		\
45a12cb77cSChen Baozi 						- BL_COHERENT_RAM_BASE,	\
46a12cb77cSChen Baozi 					MT_DEVICE | MT_RW | EL3_PAS)
47af994ae8SChen Baozi #endif
48a12cb77cSChen Baozi 
49301d27d9SRadoslaw Biernacki /*
50301d27d9SRadoslaw Biernacki  * Placeholder variables for copying the arguments that have been passed to
51301d27d9SRadoslaw Biernacki  * BL3-1 from BL2.
52301d27d9SRadoslaw Biernacki  */
53301d27d9SRadoslaw Biernacki static entry_point_info_t bl32_image_ep_info;
54301d27d9SRadoslaw Biernacki static entry_point_info_t bl33_image_ep_info;
558ffe0b2eSJean-Philippe Brucker #if ENABLE_RME
568ffe0b2eSJean-Philippe Brucker static entry_point_info_t rmm_image_ep_info;
578ffe0b2eSJean-Philippe Brucker #endif
58305825b4SRaymond Mao static struct transfer_list_header *bl31_tl;
59301d27d9SRadoslaw Biernacki 
60301d27d9SRadoslaw Biernacki /*******************************************************************************
61301d27d9SRadoslaw Biernacki  * Perform any BL3-1 early platform setup.  Here is an opportunity to copy
62301d27d9SRadoslaw Biernacki  * parameters passed by the calling EL (S-EL1 in BL2 & EL3 in BL1) before
63301d27d9SRadoslaw Biernacki  * they are lost (potentially). This needs to be done before the MMU is
64301d27d9SRadoslaw Biernacki  * initialized so that the memory layout can be used while creating page
65301d27d9SRadoslaw Biernacki  * tables. BL2 has flushed this information to memory, so we are guaranteed
66301d27d9SRadoslaw Biernacki  * to pick up good data.
67301d27d9SRadoslaw Biernacki  ******************************************************************************/
68301d27d9SRadoslaw Biernacki void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
69301d27d9SRadoslaw Biernacki 				u_register_t arg2, u_register_t arg3)
70301d27d9SRadoslaw Biernacki {
71301d27d9SRadoslaw Biernacki 	/* Initialize the console to provide early debug support */
72301d27d9SRadoslaw Biernacki 	qemu_console_init();
73301d27d9SRadoslaw Biernacki 
74c681d02cSMarcin Juszkiewicz /* Platform names have to be lowercase. */
75c681d02cSMarcin Juszkiewicz #ifdef PLAT_qemu_sbsa
766d59413bSMathieu Poirier 	sbsa_platform_init();
77c681d02cSMarcin Juszkiewicz #endif
78c681d02cSMarcin Juszkiewicz 
79301d27d9SRadoslaw Biernacki 	/*
80301d27d9SRadoslaw Biernacki 	 * Check params passed from BL2
81301d27d9SRadoslaw Biernacki 	 */
82301d27d9SRadoslaw Biernacki 	bl_params_t *params_from_bl2 = (bl_params_t *)arg0;
83301d27d9SRadoslaw Biernacki 
84301d27d9SRadoslaw Biernacki 	assert(params_from_bl2);
85301d27d9SRadoslaw Biernacki 	assert(params_from_bl2->h.type == PARAM_BL_PARAMS);
86301d27d9SRadoslaw Biernacki 	assert(params_from_bl2->h.version >= VERSION_2);
87301d27d9SRadoslaw Biernacki 
88301d27d9SRadoslaw Biernacki 	bl_params_node_t *bl_params = params_from_bl2->head;
89301d27d9SRadoslaw Biernacki 
90301d27d9SRadoslaw Biernacki 	/*
918ffe0b2eSJean-Philippe Brucker 	 * Copy BL33, BL32 and RMM (if present), entry point information.
92301d27d9SRadoslaw Biernacki 	 * They are stored in Secure RAM, in BL2's address space.
93301d27d9SRadoslaw Biernacki 	 */
94301d27d9SRadoslaw Biernacki 	while (bl_params) {
95301d27d9SRadoslaw Biernacki 		if (bl_params->image_id == BL32_IMAGE_ID)
96301d27d9SRadoslaw Biernacki 			bl32_image_ep_info = *bl_params->ep_info;
97301d27d9SRadoslaw Biernacki 
988ffe0b2eSJean-Philippe Brucker #if ENABLE_RME
998ffe0b2eSJean-Philippe Brucker 		if (bl_params->image_id == RMM_IMAGE_ID)
1008ffe0b2eSJean-Philippe Brucker 			rmm_image_ep_info = *bl_params->ep_info;
1018ffe0b2eSJean-Philippe Brucker #endif
1028ffe0b2eSJean-Philippe Brucker 
103301d27d9SRadoslaw Biernacki 		if (bl_params->image_id == BL33_IMAGE_ID)
104301d27d9SRadoslaw Biernacki 			bl33_image_ep_info = *bl_params->ep_info;
105301d27d9SRadoslaw Biernacki 
106301d27d9SRadoslaw Biernacki 		bl_params = bl_params->next_params_info;
107301d27d9SRadoslaw Biernacki 	}
108301d27d9SRadoslaw Biernacki 
109301d27d9SRadoslaw Biernacki 	if (!bl33_image_ep_info.pc)
110301d27d9SRadoslaw Biernacki 		panic();
1118ffe0b2eSJean-Philippe Brucker #if ENABLE_RME
1128ffe0b2eSJean-Philippe Brucker 	if (!rmm_image_ep_info.pc)
1138ffe0b2eSJean-Philippe Brucker 		panic();
1148ffe0b2eSJean-Philippe Brucker #endif
115305825b4SRaymond Mao 
116305825b4SRaymond Mao 	if (TRANSFER_LIST && arg1 == (TRANSFER_LIST_SIGNATURE |
117305825b4SRaymond Mao 				      REGISTER_CONVENTION_VERSION_MASK) &&
118305825b4SRaymond Mao 	    transfer_list_check_header((void *)arg3) != TL_OPS_NON) {
119305825b4SRaymond Mao 		bl31_tl = (void *)arg3; /* saved TL address from BL2 */
120305825b4SRaymond Mao 	}
121301d27d9SRadoslaw Biernacki }
122301d27d9SRadoslaw Biernacki 
12372d47829SJean-Philippe Brucker #if ENABLE_RME
124*d079d65dSMathieu Poirier #if PLAT_qemu
12572d47829SJean-Philippe Brucker /*
12672d47829SJean-Philippe Brucker  * The GPT library might modify the gpt regions structure to optimize
12772d47829SJean-Philippe Brucker  * the layout, so the array cannot be constant.
12872d47829SJean-Philippe Brucker  */
129*d079d65dSMathieu Poirier static pas_region_t pas_regions[] = {
13072d47829SJean-Philippe Brucker 	QEMU_PAS_ROOT,
13172d47829SJean-Philippe Brucker 	QEMU_PAS_SECURE,
13272d47829SJean-Philippe Brucker 	QEMU_PAS_GPTS,
13372d47829SJean-Philippe Brucker 	QEMU_PAS_NS0,
13472d47829SJean-Philippe Brucker 	QEMU_PAS_REALM,
13572d47829SJean-Philippe Brucker 	QEMU_PAS_NS1,
13672d47829SJean-Philippe Brucker };
13772d47829SJean-Philippe Brucker 
138*d079d65dSMathieu Poirier static inline void bl31_adjust_pas_regions(void) {}
139*d079d65dSMathieu Poirier #elif PLAT_qemu_sbsa
140*d079d65dSMathieu Poirier /*
141*d079d65dSMathieu Poirier  * The GPT library might modify the gpt regions structure to optimize
142*d079d65dSMathieu Poirier  * the layout, so the array cannot be constant.
143*d079d65dSMathieu Poirier  */
144*d079d65dSMathieu Poirier static pas_region_t pas_regions[] = {
145*d079d65dSMathieu Poirier 	QEMU_PAS_ROOT,
146*d079d65dSMathieu Poirier 	QEMU_PAS_SECURE,
147*d079d65dSMathieu Poirier 	QEMU_PAS_GPTS,
148*d079d65dSMathieu Poirier 	QEMU_PAS_REALM,
149*d079d65dSMathieu Poirier 	QEMU_PAS_NS0,
150*d079d65dSMathieu Poirier };
151*d079d65dSMathieu Poirier 
152*d079d65dSMathieu Poirier static void bl31_adjust_pas_regions(void)
153*d079d65dSMathieu Poirier {
154*d079d65dSMathieu Poirier 	uint64_t base_addr = 0, total_size = 0;
155*d079d65dSMathieu Poirier 	struct platform_memory_data data;
156*d079d65dSMathieu Poirier 	uint32_t node;
157*d079d65dSMathieu Poirier 
158*d079d65dSMathieu Poirier 	/*
159*d079d65dSMathieu Poirier 	 * The amount of memory supported by the SBSA platform is dynamic
160*d079d65dSMathieu Poirier 	 * and dependent on user input.  Since the configuration of the GPT
161*d079d65dSMathieu Poirier 	 * needs to reflect the system memory, QEMU_PAS_NS0 needs to be set
162*d079d65dSMathieu Poirier 	 * based on the information found in the device tree.
163*d079d65dSMathieu Poirier 	 */
164*d079d65dSMathieu Poirier 
165*d079d65dSMathieu Poirier 	for (node = 0; node < sbsa_platform_num_memnodes(); node++) {
166*d079d65dSMathieu Poirier 		data = sbsa_platform_memory_node(node);
167*d079d65dSMathieu Poirier 
168*d079d65dSMathieu Poirier 		if (data.nodeid == 0) {
169*d079d65dSMathieu Poirier 			base_addr = data.addr_base;
170*d079d65dSMathieu Poirier 		}
171*d079d65dSMathieu Poirier 
172*d079d65dSMathieu Poirier 		total_size += data.addr_size;
173*d079d65dSMathieu Poirier 	}
174*d079d65dSMathieu Poirier 
175*d079d65dSMathieu Poirier 	 /* Index '4' correspond to QEMU_PAS_NS0, see pas_regions[] above */
176*d079d65dSMathieu Poirier 	pas_regions[4].base_pa = base_addr;
177*d079d65dSMathieu Poirier 	pas_regions[4].size = total_size;
178*d079d65dSMathieu Poirier }
179*d079d65dSMathieu Poirier #endif /* PLAT_qemu */
180*d079d65dSMathieu Poirier 
181*d079d65dSMathieu Poirier static void bl31_plat_gpt_setup(void)
182*d079d65dSMathieu Poirier {
18372d47829SJean-Philippe Brucker 	/*
18472d47829SJean-Philippe Brucker 	 * Initialize entire protected space to GPT_GPI_ANY. With each L0 entry
18572d47829SJean-Philippe Brucker 	 * covering 1GB (currently the only supported option), then covering
18672d47829SJean-Philippe Brucker 	 * 256TB of RAM (48-bit PA) would require a 2MB L0 region. At the
18772d47829SJean-Philippe Brucker 	 * moment we use a 8KB table, which covers 1TB of RAM (40-bit PA).
18872d47829SJean-Philippe Brucker 	 */
1897b015e12SMathieu Poirier 	if (gpt_init_l0_tables(PLATFORM_GPCCR_PPS, PLAT_QEMU_L0_GPT_BASE,
19072d47829SJean-Philippe Brucker 			       PLAT_QEMU_L0_GPT_SIZE +
19172d47829SJean-Philippe Brucker 			       PLAT_QEMU_GPT_BITLOCK_SIZE) < 0) {
19272d47829SJean-Philippe Brucker 		ERROR("gpt_init_l0_tables() failed!\n");
19372d47829SJean-Philippe Brucker 		panic();
19472d47829SJean-Philippe Brucker 	}
19572d47829SJean-Philippe Brucker 
196*d079d65dSMathieu Poirier 	bl31_adjust_pas_regions();
197*d079d65dSMathieu Poirier 
19872d47829SJean-Philippe Brucker 	/* Carve out defined PAS ranges. */
19972d47829SJean-Philippe Brucker 	if (gpt_init_pas_l1_tables(GPCCR_PGS_4K,
20072d47829SJean-Philippe Brucker 				   PLAT_QEMU_L1_GPT_BASE,
20172d47829SJean-Philippe Brucker 				   PLAT_QEMU_L1_GPT_SIZE,
20272d47829SJean-Philippe Brucker 				   pas_regions,
20372d47829SJean-Philippe Brucker 				   (unsigned int)(sizeof(pas_regions) /
20472d47829SJean-Philippe Brucker 						  sizeof(pas_region_t))) < 0) {
20572d47829SJean-Philippe Brucker 		ERROR("gpt_init_pas_l1_tables() failed!\n");
20672d47829SJean-Philippe Brucker 		panic();
20772d47829SJean-Philippe Brucker 	}
20872d47829SJean-Philippe Brucker 
20972d47829SJean-Philippe Brucker 	INFO("Enabling Granule Protection Checks\n");
21072d47829SJean-Philippe Brucker 	if (gpt_enable() < 0) {
21172d47829SJean-Philippe Brucker 		ERROR("gpt_enable() failed!\n");
21272d47829SJean-Philippe Brucker 		panic();
21372d47829SJean-Philippe Brucker 	}
21472d47829SJean-Philippe Brucker }
21572d47829SJean-Philippe Brucker #endif
21672d47829SJean-Philippe Brucker 
217301d27d9SRadoslaw Biernacki void bl31_plat_arch_setup(void)
218301d27d9SRadoslaw Biernacki {
219a12cb77cSChen Baozi 	const mmap_region_t bl_regions[] = {
220a12cb77cSChen Baozi 		MAP_BL31_TOTAL,
221a12cb77cSChen Baozi 		MAP_BL31_RO,
222af994ae8SChen Baozi #if USE_COHERENT_MEM
223a12cb77cSChen Baozi 		MAP_BL_COHERENT_RAM,
224af994ae8SChen Baozi #endif
225cd75693fSJean-Philippe Brucker #if ENABLE_RME
226cd75693fSJean-Philippe Brucker 		MAP_GPT_L0_REGION,
227cd75693fSJean-Philippe Brucker 		MAP_GPT_L1_REGION,
228cd75693fSJean-Philippe Brucker 		MAP_RMM_SHARED_MEM,
229cd75693fSJean-Philippe Brucker #endif
230a12cb77cSChen Baozi 		{0}
231a12cb77cSChen Baozi 	};
232a12cb77cSChen Baozi 
233a12cb77cSChen Baozi 	setup_page_tables(bl_regions, plat_qemu_get_mmap());
234a12cb77cSChen Baozi 
235a12cb77cSChen Baozi 	enable_mmu_el3(0);
2366cd113feSJean-Philippe Brucker 
2376cd113feSJean-Philippe Brucker #if ENABLE_RME
23872d47829SJean-Philippe Brucker 	/* Initialise and enable granule protection after MMU. */
23972d47829SJean-Philippe Brucker 	bl31_plat_gpt_setup();
24072d47829SJean-Philippe Brucker 
2416cd113feSJean-Philippe Brucker 	/*
2426cd113feSJean-Philippe Brucker 	 * Initialise Granule Protection library and enable GPC for the primary
2436cd113feSJean-Philippe Brucker 	 * processor. The tables have already been initialized by a previous BL
2446cd113feSJean-Philippe Brucker 	 * stage, so there is no need to provide any PAS here. This function
2456cd113feSJean-Philippe Brucker 	 * sets up pointers to those tables.
2466cd113feSJean-Philippe Brucker 	 */
2476cd113feSJean-Philippe Brucker 	if (gpt_runtime_init() < 0) {
2486cd113feSJean-Philippe Brucker 		ERROR("gpt_runtime_init() failed!\n");
2496cd113feSJean-Philippe Brucker 		panic();
2506cd113feSJean-Philippe Brucker 	}
2516cd113feSJean-Philippe Brucker #endif /* ENABLE_RME */
2526cd113feSJean-Philippe Brucker 
253301d27d9SRadoslaw Biernacki }
254301d27d9SRadoslaw Biernacki 
255ffb07b04SMaxim Uvarov static void qemu_gpio_init(void)
256ffb07b04SMaxim Uvarov {
257ffb07b04SMaxim Uvarov #ifdef SECURE_GPIO_BASE
258ffb07b04SMaxim Uvarov 	pl061_gpio_init();
259ffb07b04SMaxim Uvarov 	pl061_gpio_register(SECURE_GPIO_BASE, 0);
260ffb07b04SMaxim Uvarov #endif
261ffb07b04SMaxim Uvarov }
262ffb07b04SMaxim Uvarov 
263301d27d9SRadoslaw Biernacki void bl31_platform_setup(void)
264301d27d9SRadoslaw Biernacki {
265301d27d9SRadoslaw Biernacki 	plat_qemu_gic_init();
266ffb07b04SMaxim Uvarov 	qemu_gpio_init();
267301d27d9SRadoslaw Biernacki }
268301d27d9SRadoslaw Biernacki 
269301d27d9SRadoslaw Biernacki unsigned int plat_get_syscnt_freq2(void)
270301d27d9SRadoslaw Biernacki {
2715436047aSMarcin Juszkiewicz 	return read_cntfrq_el0();
272301d27d9SRadoslaw Biernacki }
273301d27d9SRadoslaw Biernacki 
274301d27d9SRadoslaw Biernacki /*******************************************************************************
275301d27d9SRadoslaw Biernacki  * Return a pointer to the 'entry_point_info' structure of the next image
276301d27d9SRadoslaw Biernacki  * for the security state specified. BL3-3 corresponds to the non-secure
277301d27d9SRadoslaw Biernacki  * image type while BL3-2 corresponds to the secure image type. A NULL
278301d27d9SRadoslaw Biernacki  * pointer is returned if the image does not exist.
279301d27d9SRadoslaw Biernacki  ******************************************************************************/
280301d27d9SRadoslaw Biernacki entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
281301d27d9SRadoslaw Biernacki {
282301d27d9SRadoslaw Biernacki 	entry_point_info_t *next_image_info;
283301d27d9SRadoslaw Biernacki 
284301d27d9SRadoslaw Biernacki 	assert(sec_state_is_valid(type));
2858ffe0b2eSJean-Philippe Brucker 	if (type == NON_SECURE) {
2868ffe0b2eSJean-Philippe Brucker 		next_image_info = &bl33_image_ep_info;
2878ffe0b2eSJean-Philippe Brucker 	}
2888ffe0b2eSJean-Philippe Brucker #if ENABLE_RME
2898ffe0b2eSJean-Philippe Brucker 	else if (type == REALM) {
2908ffe0b2eSJean-Philippe Brucker 		next_image_info = &rmm_image_ep_info;
2918ffe0b2eSJean-Philippe Brucker 	}
2928ffe0b2eSJean-Philippe Brucker #endif
2938ffe0b2eSJean-Philippe Brucker 	else {
2948ffe0b2eSJean-Philippe Brucker 		next_image_info =  &bl32_image_ep_info;
2958ffe0b2eSJean-Philippe Brucker 	}
2968ffe0b2eSJean-Philippe Brucker 
297301d27d9SRadoslaw Biernacki 	/*
298301d27d9SRadoslaw Biernacki 	 * None of the images on the ARM development platforms can have 0x0
299301d27d9SRadoslaw Biernacki 	 * as the entrypoint
300301d27d9SRadoslaw Biernacki 	 */
301301d27d9SRadoslaw Biernacki 	if (next_image_info->pc)
302301d27d9SRadoslaw Biernacki 		return next_image_info;
303301d27d9SRadoslaw Biernacki 	else
304301d27d9SRadoslaw Biernacki 		return NULL;
305301d27d9SRadoslaw Biernacki }
306305825b4SRaymond Mao 
307305825b4SRaymond Mao void bl31_plat_runtime_setup(void)
308305825b4SRaymond Mao {
309305825b4SRaymond Mao #if TRANSFER_LIST
310305825b4SRaymond Mao 	if (bl31_tl) {
311305825b4SRaymond Mao 		/*
312305825b4SRaymond Mao 		 * update the TL from S to NS memory before jump to BL33
313305825b4SRaymond Mao 		 * to reflect all changes in TL done by BL32
314305825b4SRaymond Mao 		 */
315305825b4SRaymond Mao 		memcpy((void *)FW_NS_HANDOFF_BASE, bl31_tl, bl31_tl->max_size);
316305825b4SRaymond Mao 	}
317305825b4SRaymond Mao #endif
318c09aa4ffSJens Wiklander 
319c09aa4ffSJens Wiklander 	console_flush();
320c09aa4ffSJens Wiklander 	console_switch_state(CONSOLE_FLAG_RUNTIME);
321305825b4SRaymond Mao }
322