1301d27d9SRadoslaw Biernacki /*
27f9ef161SHarrison Mutai * Copyright (c) 2015-2025, Arm Limited and Contributors. All rights reserved.
3301d27d9SRadoslaw Biernacki *
4301d27d9SRadoslaw Biernacki * SPDX-License-Identifier: BSD-3-Clause
5301d27d9SRadoslaw Biernacki */
6301d27d9SRadoslaw Biernacki
7301d27d9SRadoslaw Biernacki #include <assert.h>
8301d27d9SRadoslaw Biernacki
9301d27d9SRadoslaw Biernacki #include <common/bl_common.h>
10ffb07b04SMaxim Uvarov #include <drivers/arm/pl061_gpio.h>
116cd113feSJean-Philippe Brucker #include <lib/gpt_rme/gpt_rme.h>
127f9ef161SHarrison Mutai #if TRANSFER_LIST
13*b5d0740eSHarrison Mutai #include <transfer_list.h>
147f9ef161SHarrison Mutai #endif
15301d27d9SRadoslaw Biernacki #include <plat/common/platform.h>
1672d47829SJean-Philippe Brucker #if ENABLE_RME
17d079d65dSMathieu Poirier #ifdef PLAT_qemu
1872d47829SJean-Philippe Brucker #include <qemu_pas_def.h>
19d079d65dSMathieu Poirier #elif PLAT_qemu_sbsa
20d079d65dSMathieu Poirier #include <qemu_sbsa_pas_def.h>
21d079d65dSMathieu Poirier #endif /* PLAT_qemu */
22d079d65dSMathieu Poirier #endif /* ENABLE_RME */
236d59413bSMathieu Poirier #ifdef PLAT_qemu_sbsa
246d59413bSMathieu Poirier #include <sbsa_platform.h>
256d59413bSMathieu Poirier #endif
26301d27d9SRadoslaw Biernacki
27301d27d9SRadoslaw Biernacki #include "qemu_private.h"
28301d27d9SRadoslaw Biernacki
29a12cb77cSChen Baozi #define MAP_BL31_TOTAL MAP_REGION_FLAT( \
30a12cb77cSChen Baozi BL31_BASE, \
31a12cb77cSChen Baozi BL31_END - BL31_BASE, \
32a12cb77cSChen Baozi MT_MEMORY | MT_RW | EL3_PAS)
33a12cb77cSChen Baozi #define MAP_BL31_RO MAP_REGION_FLAT( \
34a12cb77cSChen Baozi BL_CODE_BASE, \
35a12cb77cSChen Baozi BL_CODE_END - BL_CODE_BASE, \
36a12cb77cSChen Baozi MT_CODE | EL3_PAS), \
37a12cb77cSChen Baozi MAP_REGION_FLAT( \
38a12cb77cSChen Baozi BL_RO_DATA_BASE, \
39a12cb77cSChen Baozi BL_RO_DATA_END \
40a12cb77cSChen Baozi - BL_RO_DATA_BASE, \
41a12cb77cSChen Baozi MT_RO_DATA | EL3_PAS)
42a12cb77cSChen Baozi
43af994ae8SChen Baozi #if USE_COHERENT_MEM
44a12cb77cSChen Baozi #define MAP_BL_COHERENT_RAM MAP_REGION_FLAT( \
45a12cb77cSChen Baozi BL_COHERENT_RAM_BASE, \
46a12cb77cSChen Baozi BL_COHERENT_RAM_END \
47a12cb77cSChen Baozi - BL_COHERENT_RAM_BASE, \
48a12cb77cSChen Baozi MT_DEVICE | MT_RW | EL3_PAS)
49af994ae8SChen Baozi #endif
50a12cb77cSChen Baozi
51a32a77f9SJean-Philippe Brucker #if ENABLE_RME
52a32a77f9SJean-Philippe Brucker #if (RME_GPT_BITLOCK_BLOCK == 0)
53a32a77f9SJean-Philippe Brucker #define BITLOCK_BASE UL(0)
54a32a77f9SJean-Philippe Brucker #define BITLOCK_SIZE UL(0)
55a32a77f9SJean-Philippe Brucker #else
56a32a77f9SJean-Philippe Brucker
57a32a77f9SJean-Philippe Brucker /*
58a32a77f9SJean-Philippe Brucker * Number of bitlock_t entries in the gpt_bitlock array for this platform's
59a32a77f9SJean-Philippe Brucker * Protected Physical Size. One 8-bit bitlock_t entry covers
60a32a77f9SJean-Philippe Brucker * 8 * RME_GPT_BITLOCK_BLOCK * 512MB.
61a32a77f9SJean-Philippe Brucker */
62a32a77f9SJean-Philippe Brucker #if (PLAT_QEMU_PPS > (RME_GPT_BITLOCK_BLOCK * SZ_512M * UL(8)))
63a32a77f9SJean-Philippe Brucker #define BITLOCKS_NUM (PLAT_QEMU_PPS / \
64a32a77f9SJean-Philippe Brucker (RME_GPT_BITLOCK_BLOCK * SZ_512M * UL(8)))
65a32a77f9SJean-Philippe Brucker #else
66a32a77f9SJean-Philippe Brucker #define BITLOCKS_NUM 1
67a32a77f9SJean-Philippe Brucker #endif
68a32a77f9SJean-Philippe Brucker
69a32a77f9SJean-Philippe Brucker static bitlock_t gpt_bitlock[BITLOCKS_NUM];
70a32a77f9SJean-Philippe Brucker #define BITLOCK_BASE (uintptr_t)gpt_bitlock
71a32a77f9SJean-Philippe Brucker #define BITLOCK_SIZE sizeof(gpt_bitlock)
72a32a77f9SJean-Philippe Brucker #endif /* RME_GPT_BITLOCK_BLOCK */
73a32a77f9SJean-Philippe Brucker #endif /* ENABLE_RME */
74a32a77f9SJean-Philippe Brucker
75301d27d9SRadoslaw Biernacki /*
76301d27d9SRadoslaw Biernacki * Placeholder variables for copying the arguments that have been passed to
77301d27d9SRadoslaw Biernacki * BL3-1 from BL2.
78301d27d9SRadoslaw Biernacki */
79301d27d9SRadoslaw Biernacki static entry_point_info_t bl32_image_ep_info;
80301d27d9SRadoslaw Biernacki static entry_point_info_t bl33_image_ep_info;
818ffe0b2eSJean-Philippe Brucker #if ENABLE_RME
828ffe0b2eSJean-Philippe Brucker static entry_point_info_t rmm_image_ep_info;
838ffe0b2eSJean-Philippe Brucker #endif
847f9ef161SHarrison Mutai static struct transfer_list_header __maybe_unused *bl31_tl;
85301d27d9SRadoslaw Biernacki
86301d27d9SRadoslaw Biernacki /*******************************************************************************
87301d27d9SRadoslaw Biernacki * Perform any BL3-1 early platform setup. Here is an opportunity to copy
88301d27d9SRadoslaw Biernacki * parameters passed by the calling EL (S-EL1 in BL2 & EL3 in BL1) before
89301d27d9SRadoslaw Biernacki * they are lost (potentially). This needs to be done before the MMU is
90301d27d9SRadoslaw Biernacki * initialized so that the memory layout can be used while creating page
91301d27d9SRadoslaw Biernacki * tables. BL2 has flushed this information to memory, so we are guaranteed
92301d27d9SRadoslaw Biernacki * to pick up good data.
93301d27d9SRadoslaw Biernacki ******************************************************************************/
bl31_early_platform_setup2(u_register_t arg0,u_register_t arg1,u_register_t arg2,u_register_t arg3)94301d27d9SRadoslaw Biernacki void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
95301d27d9SRadoslaw Biernacki u_register_t arg2, u_register_t arg3)
96301d27d9SRadoslaw Biernacki {
977f9ef161SHarrison Mutai bool __maybe_unused is64 = false;
987f9ef161SHarrison Mutai uint64_t __maybe_unused hval;
997ad6775bSRaymond Mao
100301d27d9SRadoslaw Biernacki /* Initialize the console to provide early debug support */
101301d27d9SRadoslaw Biernacki qemu_console_init();
102301d27d9SRadoslaw Biernacki
103c681d02cSMarcin Juszkiewicz /* Platform names have to be lowercase. */
104c681d02cSMarcin Juszkiewicz #ifdef PLAT_qemu_sbsa
1056d59413bSMathieu Poirier sbsa_platform_init();
106c681d02cSMarcin Juszkiewicz #endif
107c681d02cSMarcin Juszkiewicz
108301d27d9SRadoslaw Biernacki /*
109301d27d9SRadoslaw Biernacki * Check params passed from BL2
110301d27d9SRadoslaw Biernacki */
111301d27d9SRadoslaw Biernacki bl_params_t *params_from_bl2 = (bl_params_t *)arg0;
112301d27d9SRadoslaw Biernacki
113301d27d9SRadoslaw Biernacki assert(params_from_bl2);
114301d27d9SRadoslaw Biernacki assert(params_from_bl2->h.type == PARAM_BL_PARAMS);
115301d27d9SRadoslaw Biernacki assert(params_from_bl2->h.version >= VERSION_2);
116301d27d9SRadoslaw Biernacki
117301d27d9SRadoslaw Biernacki bl_params_node_t *bl_params = params_from_bl2->head;
118301d27d9SRadoslaw Biernacki
119301d27d9SRadoslaw Biernacki /*
1208ffe0b2eSJean-Philippe Brucker * Copy BL33, BL32 and RMM (if present), entry point information.
121301d27d9SRadoslaw Biernacki * They are stored in Secure RAM, in BL2's address space.
122301d27d9SRadoslaw Biernacki */
123301d27d9SRadoslaw Biernacki while (bl_params) {
1247f9ef161SHarrison Mutai #if defined(__aarch64__) && TRANSFER_LIST
1257ad6775bSRaymond Mao if (bl_params->image_id == BL31_IMAGE_ID &&
1267ad6775bSRaymond Mao GET_RW(bl_params->ep_info->spsr) == MODE_RW_64)
1277ad6775bSRaymond Mao is64 = true;
1287f9ef161SHarrison Mutai #endif /* defined(__aarch64__) && TRANSFER_LIST */
129301d27d9SRadoslaw Biernacki if (bl_params->image_id == BL32_IMAGE_ID)
130301d27d9SRadoslaw Biernacki bl32_image_ep_info = *bl_params->ep_info;
131301d27d9SRadoslaw Biernacki
1328ffe0b2eSJean-Philippe Brucker #if ENABLE_RME
1338ffe0b2eSJean-Philippe Brucker if (bl_params->image_id == RMM_IMAGE_ID)
1348ffe0b2eSJean-Philippe Brucker rmm_image_ep_info = *bl_params->ep_info;
1358ffe0b2eSJean-Philippe Brucker #endif
1368ffe0b2eSJean-Philippe Brucker
137301d27d9SRadoslaw Biernacki if (bl_params->image_id == BL33_IMAGE_ID)
138301d27d9SRadoslaw Biernacki bl33_image_ep_info = *bl_params->ep_info;
139301d27d9SRadoslaw Biernacki
140301d27d9SRadoslaw Biernacki bl_params = bl_params->next_params_info;
141301d27d9SRadoslaw Biernacki }
142301d27d9SRadoslaw Biernacki
143301d27d9SRadoslaw Biernacki if (!bl33_image_ep_info.pc)
144301d27d9SRadoslaw Biernacki panic();
1458ffe0b2eSJean-Philippe Brucker #if ENABLE_RME
1468ffe0b2eSJean-Philippe Brucker if (!rmm_image_ep_info.pc)
1478ffe0b2eSJean-Philippe Brucker panic();
1488ffe0b2eSJean-Philippe Brucker #endif
149305825b4SRaymond Mao
1507f9ef161SHarrison Mutai #if TRANSFER_LIST
1517f9ef161SHarrison Mutai if (!transfer_list_check_header((void *)arg3))
1527ad6775bSRaymond Mao return;
1537ad6775bSRaymond Mao
1547ad6775bSRaymond Mao if (is64)
1557ad6775bSRaymond Mao hval = TRANSFER_LIST_HANDOFF_X1_VALUE(REGISTER_CONVENTION_VERSION);
1567ad6775bSRaymond Mao else
1577ad6775bSRaymond Mao hval = TRANSFER_LIST_HANDOFF_R1_VALUE(REGISTER_CONVENTION_VERSION);
1587ad6775bSRaymond Mao
1597ad6775bSRaymond Mao if (arg1 != hval)
1607ad6775bSRaymond Mao return;
1617f9ef161SHarrison Mutai #endif
1627ad6775bSRaymond Mao
163305825b4SRaymond Mao bl31_tl = (void *)arg3; /* saved TL address from BL2 */
164305825b4SRaymond Mao }
165301d27d9SRadoslaw Biernacki
16672d47829SJean-Philippe Brucker #if ENABLE_RME
167d079d65dSMathieu Poirier #if PLAT_qemu
16872d47829SJean-Philippe Brucker /*
16972d47829SJean-Philippe Brucker * The GPT library might modify the gpt regions structure to optimize
17072d47829SJean-Philippe Brucker * the layout, so the array cannot be constant.
17172d47829SJean-Philippe Brucker */
172d079d65dSMathieu Poirier static pas_region_t pas_regions[] = {
17372d47829SJean-Philippe Brucker QEMU_PAS_ROOT,
17472d47829SJean-Philippe Brucker QEMU_PAS_SECURE,
17572d47829SJean-Philippe Brucker QEMU_PAS_GPTS,
17672d47829SJean-Philippe Brucker QEMU_PAS_NS0,
17772d47829SJean-Philippe Brucker QEMU_PAS_REALM,
17872d47829SJean-Philippe Brucker QEMU_PAS_NS1,
17972d47829SJean-Philippe Brucker };
18072d47829SJean-Philippe Brucker
bl31_adjust_pas_regions(void)181d079d65dSMathieu Poirier static inline void bl31_adjust_pas_regions(void) {}
182d079d65dSMathieu Poirier #elif PLAT_qemu_sbsa
183d079d65dSMathieu Poirier /*
184d079d65dSMathieu Poirier * The GPT library might modify the gpt regions structure to optimize
185d079d65dSMathieu Poirier * the layout, so the array cannot be constant.
186d079d65dSMathieu Poirier */
187d079d65dSMathieu Poirier static pas_region_t pas_regions[] = {
188d079d65dSMathieu Poirier QEMU_PAS_ROOT,
189d079d65dSMathieu Poirier QEMU_PAS_SECURE,
190d079d65dSMathieu Poirier QEMU_PAS_GPTS,
191d079d65dSMathieu Poirier QEMU_PAS_REALM,
192d079d65dSMathieu Poirier QEMU_PAS_NS0,
193d079d65dSMathieu Poirier };
194d079d65dSMathieu Poirier
bl31_adjust_pas_regions(void)195d079d65dSMathieu Poirier static void bl31_adjust_pas_regions(void)
196d079d65dSMathieu Poirier {
197d079d65dSMathieu Poirier uint64_t base_addr = 0, total_size = 0;
198d079d65dSMathieu Poirier struct platform_memory_data data;
199d079d65dSMathieu Poirier uint32_t node;
200d079d65dSMathieu Poirier
201d079d65dSMathieu Poirier /*
202d079d65dSMathieu Poirier * The amount of memory supported by the SBSA platform is dynamic
203d079d65dSMathieu Poirier * and dependent on user input. Since the configuration of the GPT
204d079d65dSMathieu Poirier * needs to reflect the system memory, QEMU_PAS_NS0 needs to be set
205d079d65dSMathieu Poirier * based on the information found in the device tree.
206d079d65dSMathieu Poirier */
207d079d65dSMathieu Poirier
208d079d65dSMathieu Poirier for (node = 0; node < sbsa_platform_num_memnodes(); node++) {
209d079d65dSMathieu Poirier data = sbsa_platform_memory_node(node);
210d079d65dSMathieu Poirier
211d079d65dSMathieu Poirier if (data.nodeid == 0) {
212d079d65dSMathieu Poirier base_addr = data.addr_base;
213d079d65dSMathieu Poirier }
214d079d65dSMathieu Poirier
215d079d65dSMathieu Poirier total_size += data.addr_size;
216d079d65dSMathieu Poirier }
217d079d65dSMathieu Poirier
218d079d65dSMathieu Poirier /* Index '4' correspond to QEMU_PAS_NS0, see pas_regions[] above */
219d079d65dSMathieu Poirier pas_regions[4].base_pa = base_addr;
220d079d65dSMathieu Poirier pas_regions[4].size = total_size;
221d079d65dSMathieu Poirier }
222d079d65dSMathieu Poirier #endif /* PLAT_qemu */
223d079d65dSMathieu Poirier
bl31_plat_gpt_setup(void)224d079d65dSMathieu Poirier static void bl31_plat_gpt_setup(void)
225d079d65dSMathieu Poirier {
22672d47829SJean-Philippe Brucker /*
22772d47829SJean-Philippe Brucker * Initialize entire protected space to GPT_GPI_ANY. With each L0 entry
22872d47829SJean-Philippe Brucker * covering 1GB (currently the only supported option), then covering
22972d47829SJean-Philippe Brucker * 256TB of RAM (48-bit PA) would require a 2MB L0 region. At the
23072d47829SJean-Philippe Brucker * moment we use a 8KB table, which covers 1TB of RAM (40-bit PA).
23172d47829SJean-Philippe Brucker */
232a32a77f9SJean-Philippe Brucker if (gpt_init_l0_tables(PLAT_QEMU_GPCCR_PPS, PLAT_QEMU_L0_GPT_BASE,
233a32a77f9SJean-Philippe Brucker PLAT_QEMU_L0_GPT_SIZE) < 0) {
23472d47829SJean-Philippe Brucker ERROR("gpt_init_l0_tables() failed!\n");
23572d47829SJean-Philippe Brucker panic();
23672d47829SJean-Philippe Brucker }
23772d47829SJean-Philippe Brucker
238d079d65dSMathieu Poirier bl31_adjust_pas_regions();
239d079d65dSMathieu Poirier
24072d47829SJean-Philippe Brucker /* Carve out defined PAS ranges. */
24172d47829SJean-Philippe Brucker if (gpt_init_pas_l1_tables(GPCCR_PGS_4K,
24272d47829SJean-Philippe Brucker PLAT_QEMU_L1_GPT_BASE,
24372d47829SJean-Philippe Brucker PLAT_QEMU_L1_GPT_SIZE,
24472d47829SJean-Philippe Brucker pas_regions,
24572d47829SJean-Philippe Brucker (unsigned int)(sizeof(pas_regions) /
24672d47829SJean-Philippe Brucker sizeof(pas_region_t))) < 0) {
24772d47829SJean-Philippe Brucker ERROR("gpt_init_pas_l1_tables() failed!\n");
24872d47829SJean-Philippe Brucker panic();
24972d47829SJean-Philippe Brucker }
25072d47829SJean-Philippe Brucker
25172d47829SJean-Philippe Brucker INFO("Enabling Granule Protection Checks\n");
25272d47829SJean-Philippe Brucker if (gpt_enable() < 0) {
25372d47829SJean-Philippe Brucker ERROR("gpt_enable() failed!\n");
25472d47829SJean-Philippe Brucker panic();
25572d47829SJean-Philippe Brucker }
25672d47829SJean-Philippe Brucker }
25772d47829SJean-Philippe Brucker #endif
25872d47829SJean-Philippe Brucker
bl31_plat_arch_setup(void)259301d27d9SRadoslaw Biernacki void bl31_plat_arch_setup(void)
260301d27d9SRadoslaw Biernacki {
261a12cb77cSChen Baozi const mmap_region_t bl_regions[] = {
262a12cb77cSChen Baozi MAP_BL31_TOTAL,
263a12cb77cSChen Baozi MAP_BL31_RO,
264af994ae8SChen Baozi #if USE_COHERENT_MEM
265a12cb77cSChen Baozi MAP_BL_COHERENT_RAM,
266af994ae8SChen Baozi #endif
267cd75693fSJean-Philippe Brucker #if ENABLE_RME
268cd75693fSJean-Philippe Brucker MAP_GPT_L0_REGION,
269cd75693fSJean-Philippe Brucker MAP_GPT_L1_REGION,
270cd75693fSJean-Philippe Brucker MAP_RMM_SHARED_MEM,
271cd75693fSJean-Philippe Brucker #endif
272a12cb77cSChen Baozi {0}
273a12cb77cSChen Baozi };
274a12cb77cSChen Baozi
275a12cb77cSChen Baozi setup_page_tables(bl_regions, plat_qemu_get_mmap());
276a12cb77cSChen Baozi
277a12cb77cSChen Baozi enable_mmu_el3(0);
2786cd113feSJean-Philippe Brucker
2796cd113feSJean-Philippe Brucker #if ENABLE_RME
28072d47829SJean-Philippe Brucker /* Initialise and enable granule protection after MMU. */
28172d47829SJean-Philippe Brucker bl31_plat_gpt_setup();
28272d47829SJean-Philippe Brucker
2836cd113feSJean-Philippe Brucker /*
2846cd113feSJean-Philippe Brucker * Initialise Granule Protection library and enable GPC for the primary
2856cd113feSJean-Philippe Brucker * processor. The tables have already been initialized by a previous BL
2866cd113feSJean-Philippe Brucker * stage, so there is no need to provide any PAS here. This function
2876cd113feSJean-Philippe Brucker * sets up pointers to those tables.
2886cd113feSJean-Philippe Brucker */
289a32a77f9SJean-Philippe Brucker if (gpt_runtime_init(BITLOCK_BASE, BITLOCK_SIZE) < 0) {
2906cd113feSJean-Philippe Brucker ERROR("gpt_runtime_init() failed!\n");
2916cd113feSJean-Philippe Brucker panic();
2926cd113feSJean-Philippe Brucker }
2936cd113feSJean-Philippe Brucker #endif /* ENABLE_RME */
2946cd113feSJean-Philippe Brucker
295301d27d9SRadoslaw Biernacki }
296301d27d9SRadoslaw Biernacki
qemu_gpio_init(void)297ffb07b04SMaxim Uvarov static void qemu_gpio_init(void)
298ffb07b04SMaxim Uvarov {
299ffb07b04SMaxim Uvarov #ifdef SECURE_GPIO_BASE
300ffb07b04SMaxim Uvarov pl061_gpio_init();
301ffb07b04SMaxim Uvarov pl061_gpio_register(SECURE_GPIO_BASE, 0);
302ffb07b04SMaxim Uvarov #endif
303ffb07b04SMaxim Uvarov }
304ffb07b04SMaxim Uvarov
bl31_platform_setup(void)305301d27d9SRadoslaw Biernacki void bl31_platform_setup(void)
306301d27d9SRadoslaw Biernacki {
307301d27d9SRadoslaw Biernacki plat_qemu_gic_init();
308ffb07b04SMaxim Uvarov qemu_gpio_init();
309301d27d9SRadoslaw Biernacki }
310301d27d9SRadoslaw Biernacki
plat_get_syscnt_freq2(void)311301d27d9SRadoslaw Biernacki unsigned int plat_get_syscnt_freq2(void)
312301d27d9SRadoslaw Biernacki {
3135436047aSMarcin Juszkiewicz return read_cntfrq_el0();
314301d27d9SRadoslaw Biernacki }
315301d27d9SRadoslaw Biernacki
316301d27d9SRadoslaw Biernacki /*******************************************************************************
317301d27d9SRadoslaw Biernacki * Return a pointer to the 'entry_point_info' structure of the next image
318301d27d9SRadoslaw Biernacki * for the security state specified. BL3-3 corresponds to the non-secure
319301d27d9SRadoslaw Biernacki * image type while BL3-2 corresponds to the secure image type. A NULL
320301d27d9SRadoslaw Biernacki * pointer is returned if the image does not exist.
321301d27d9SRadoslaw Biernacki ******************************************************************************/
bl31_plat_get_next_image_ep_info(uint32_t type)322301d27d9SRadoslaw Biernacki entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
323301d27d9SRadoslaw Biernacki {
324301d27d9SRadoslaw Biernacki entry_point_info_t *next_image_info;
325301d27d9SRadoslaw Biernacki
326301d27d9SRadoslaw Biernacki assert(sec_state_is_valid(type));
3278ffe0b2eSJean-Philippe Brucker if (type == NON_SECURE) {
3288ffe0b2eSJean-Philippe Brucker next_image_info = &bl33_image_ep_info;
3298ffe0b2eSJean-Philippe Brucker }
3308ffe0b2eSJean-Philippe Brucker #if ENABLE_RME
3318ffe0b2eSJean-Philippe Brucker else if (type == REALM) {
3328ffe0b2eSJean-Philippe Brucker next_image_info = &rmm_image_ep_info;
3338ffe0b2eSJean-Philippe Brucker }
3348ffe0b2eSJean-Philippe Brucker #endif
3358ffe0b2eSJean-Philippe Brucker else {
3368ffe0b2eSJean-Philippe Brucker next_image_info = &bl32_image_ep_info;
3378ffe0b2eSJean-Philippe Brucker }
3388ffe0b2eSJean-Philippe Brucker
339301d27d9SRadoslaw Biernacki /*
340301d27d9SRadoslaw Biernacki * None of the images on the ARM development platforms can have 0x0
341301d27d9SRadoslaw Biernacki * as the entrypoint
342301d27d9SRadoslaw Biernacki */
343301d27d9SRadoslaw Biernacki if (next_image_info->pc)
344301d27d9SRadoslaw Biernacki return next_image_info;
345301d27d9SRadoslaw Biernacki else
346301d27d9SRadoslaw Biernacki return NULL;
347301d27d9SRadoslaw Biernacki }
348305825b4SRaymond Mao
bl31_plat_runtime_setup(void)349305825b4SRaymond Mao void bl31_plat_runtime_setup(void)
350305825b4SRaymond Mao {
351305825b4SRaymond Mao #if TRANSFER_LIST
352305825b4SRaymond Mao if (bl31_tl) {
353305825b4SRaymond Mao /*
354cc58f08fSRaymond Mao * Relocate the TL from S to NS memory before EL3 exit
355305825b4SRaymond Mao * to reflect all changes in TL done by BL32
356305825b4SRaymond Mao */
357cc58f08fSRaymond Mao if (!transfer_list_relocate(bl31_tl, (void *)FW_NS_HANDOFF_BASE,
358cc58f08fSRaymond Mao bl31_tl->max_size))
359cc58f08fSRaymond Mao ERROR("Relocate TL to NS memory failed\n");
360305825b4SRaymond Mao }
361305825b4SRaymond Mao #endif
362c09aa4ffSJens Wiklander
363c09aa4ffSJens Wiklander console_flush();
364c09aa4ffSJens Wiklander console_switch_state(CONSOLE_FLAG_RUNTIME);
365305825b4SRaymond Mao }
366