1c35d59a3SSumit Garg /* 28855e52eSAntonio Nino Diaz * Copyright (c) 2018-2019, ARM Limited and Contributors. All rights reserved. 3c35d59a3SSumit Garg * 4c35d59a3SSumit Garg * SPDX-License-Identifier: BSD-3-Clause 5c35d59a3SSumit Garg */ 6c35d59a3SSumit Garg 709d40e0eSAntonio Nino Diaz #include <assert.h> 809d40e0eSAntonio Nino Diaz 909d40e0eSAntonio Nino Diaz #include <platform_def.h> 1009d40e0eSAntonio Nino Diaz 11c35d59a3SSumit Garg #include <arch.h> 12c35d59a3SSumit Garg #include <arch_helpers.h> 1309d40e0eSAntonio Nino Diaz #include <common/bl_common.h> 1409d40e0eSAntonio Nino Diaz #include <common/debug.h> 1509d40e0eSAntonio Nino Diaz #include <drivers/arm/pl011.h> 1609d40e0eSAntonio Nino Diaz #include <lib/mmio.h> 170eb275c9SSumit Garg #include <sq_common.h> 18c35d59a3SSumit Garg 1967b40070SSumit Garg static console_pl011_t console; 205e5cfc21SSumit Garg static entry_point_info_t bl32_image_ep_info; 215e5cfc21SSumit Garg static entry_point_info_t bl33_image_ep_info; 225e5cfc21SSumit Garg 23434454a2SArd Biesheuvel IMPORT_SYM(uintptr_t, __SPM_SHIM_EXCEPTIONS_START__, SPM_SHIM_EXCEPTIONS_START); 24434454a2SArd Biesheuvel IMPORT_SYM(uintptr_t, __SPM_SHIM_EXCEPTIONS_END__, SPM_SHIM_EXCEPTIONS_END); 25434454a2SArd Biesheuvel IMPORT_SYM(uintptr_t, __SPM_SHIM_EXCEPTIONS_LMA__, SPM_SHIM_EXCEPTIONS_LMA); 26434454a2SArd Biesheuvel 275e5cfc21SSumit Garg entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type) 285e5cfc21SSumit Garg { 295e5cfc21SSumit Garg assert(sec_state_is_valid(type)); 305e5cfc21SSumit Garg return type == NON_SECURE ? &bl33_image_ep_info : &bl32_image_ep_info; 315e5cfc21SSumit Garg } 325e5cfc21SSumit Garg 335e5cfc21SSumit Garg /******************************************************************************* 345e5cfc21SSumit Garg * Gets SPSR for BL32 entry 355e5cfc21SSumit Garg ******************************************************************************/ 365e5cfc21SSumit Garg uint32_t sq_get_spsr_for_bl32_entry(void) 375e5cfc21SSumit Garg { 385e5cfc21SSumit Garg /* 395e5cfc21SSumit Garg * The Secure Payload Dispatcher service is responsible for 405e5cfc21SSumit Garg * setting the SPSR prior to entry into the BL32 image. 415e5cfc21SSumit Garg */ 425e5cfc21SSumit Garg return 0; 435e5cfc21SSumit Garg } 445e5cfc21SSumit Garg 455e5cfc21SSumit Garg /******************************************************************************* 465e5cfc21SSumit Garg * Gets SPSR for BL33 entry 475e5cfc21SSumit Garg ******************************************************************************/ 485e5cfc21SSumit Garg uint32_t sq_get_spsr_for_bl33_entry(void) 495e5cfc21SSumit Garg { 505e5cfc21SSumit Garg unsigned long el_status; 515e5cfc21SSumit Garg unsigned int mode; 525e5cfc21SSumit Garg uint32_t spsr; 535e5cfc21SSumit Garg 545e5cfc21SSumit Garg /* Figure out what mode we enter the non-secure world in */ 555e5cfc21SSumit Garg el_status = read_id_aa64pfr0_el1() >> ID_AA64PFR0_EL2_SHIFT; 565e5cfc21SSumit Garg el_status &= ID_AA64PFR0_ELX_MASK; 575e5cfc21SSumit Garg 585e5cfc21SSumit Garg mode = (el_status) ? MODE_EL2 : MODE_EL1; 595e5cfc21SSumit Garg 605e5cfc21SSumit Garg spsr = SPSR_64(mode, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS); 615e5cfc21SSumit Garg return spsr; 625e5cfc21SSumit Garg } 6367b40070SSumit Garg 64ce1f43acSAntonio Nino Diaz void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, 65ce1f43acSAntonio Nino Diaz u_register_t arg2, u_register_t arg3) 66c35d59a3SSumit Garg { 6767b40070SSumit Garg /* Initialize the console to provide early debug support */ 6867b40070SSumit Garg (void)console_pl011_register(PLAT_SQ_BOOT_UART_BASE, 6967b40070SSumit Garg PLAT_SQ_BOOT_UART_CLK_IN_HZ, 7067b40070SSumit Garg SQ_CONSOLE_BAUDRATE, &console); 7167b40070SSumit Garg 7267b40070SSumit Garg console_set_scope(&console.console, CONSOLE_FLAG_BOOT | 7367b40070SSumit Garg CONSOLE_FLAG_RUNTIME); 7467b40070SSumit Garg 75c35d59a3SSumit Garg /* There are no parameters from BL2 if BL31 is a reset vector */ 76ce1f43acSAntonio Nino Diaz assert(arg0 == 0U); 77ce1f43acSAntonio Nino Diaz assert(arg1 == 0U); 785e5cfc21SSumit Garg 796cb2a397SSumit Garg /* Initialize power controller before setting up topology */ 806cb2a397SSumit Garg plat_sq_pwrc_setup(); 816cb2a397SSumit Garg 82e373b6a2SArd Biesheuvel #ifdef SPD_opteed 836cb2a397SSumit Garg struct draminfo di = {0}; 846cb2a397SSumit Garg 85*b67d2029SMasahisa Kojima sq_scp_get_draminfo(&di); 866cb2a397SSumit Garg 876cb2a397SSumit Garg /* 886cb2a397SSumit Garg * Check if OP-TEE has been loaded in Secure RAM allocated 896cb2a397SSumit Garg * from DRAM1 region 906cb2a397SSumit Garg */ 916cb2a397SSumit Garg if ((di.base1 + di.size1) <= BL32_BASE) { 926cb2a397SSumit Garg NOTICE("OP-TEE has been loaded by SCP firmware\n"); 935e5cfc21SSumit Garg /* Populate entry point information for BL32 */ 945e5cfc21SSumit Garg SET_PARAM_HEAD(&bl32_image_ep_info, 955e5cfc21SSumit Garg PARAM_EP, 965e5cfc21SSumit Garg VERSION_1, 975e5cfc21SSumit Garg 0); 985e5cfc21SSumit Garg SET_SECURITY_STATE(bl32_image_ep_info.h.attr, SECURE); 995e5cfc21SSumit Garg bl32_image_ep_info.pc = BL32_BASE; 1005e5cfc21SSumit Garg bl32_image_ep_info.spsr = sq_get_spsr_for_bl32_entry(); 1016cb2a397SSumit Garg } else { 1026cb2a397SSumit Garg NOTICE("OP-TEE has not been loaded by SCP firmware\n"); 1036cb2a397SSumit Garg } 104e373b6a2SArd Biesheuvel #endif /* SPD_opteed */ 1055e5cfc21SSumit Garg 1065e5cfc21SSumit Garg /* Populate entry point information for BL33 */ 1075e5cfc21SSumit Garg SET_PARAM_HEAD(&bl33_image_ep_info, 1085e5cfc21SSumit Garg PARAM_EP, 1095e5cfc21SSumit Garg VERSION_1, 1105e5cfc21SSumit Garg 0); 1115e5cfc21SSumit Garg /* 1125e5cfc21SSumit Garg * Tell BL31 where the non-trusted software image 1135e5cfc21SSumit Garg * is located and the entry state information 1145e5cfc21SSumit Garg */ 1155e5cfc21SSumit Garg bl33_image_ep_info.pc = PRELOADED_BL33_BASE; 1165e5cfc21SSumit Garg bl33_image_ep_info.spsr = sq_get_spsr_for_bl33_entry(); 1175e5cfc21SSumit Garg SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE); 118c35d59a3SSumit Garg } 119c35d59a3SSumit Garg 1205931fdacSSumit Garg static void sq_configure_sys_timer(void) 1215931fdacSSumit Garg { 1225931fdacSSumit Garg unsigned int reg_val; 1235931fdacSSumit Garg 1245931fdacSSumit Garg reg_val = (1 << CNTACR_RPCT_SHIFT) | (1 << CNTACR_RVCT_SHIFT); 1255931fdacSSumit Garg reg_val |= (1 << CNTACR_RFRQ_SHIFT) | (1 << CNTACR_RVOFF_SHIFT); 1265931fdacSSumit Garg reg_val |= (1 << CNTACR_RWVT_SHIFT) | (1 << CNTACR_RWPT_SHIFT); 1275931fdacSSumit Garg mmio_write_32(SQ_SYS_TIMCTL_BASE + 1285931fdacSSumit Garg CNTACR_BASE(PLAT_SQ_NSTIMER_FRAME_ID), reg_val); 1295931fdacSSumit Garg 1305931fdacSSumit Garg reg_val = (1 << CNTNSAR_NS_SHIFT(PLAT_SQ_NSTIMER_FRAME_ID)); 1315931fdacSSumit Garg mmio_write_32(SQ_SYS_TIMCTL_BASE + CNTNSAR, reg_val); 1325931fdacSSumit Garg } 1335931fdacSSumit Garg 134c35d59a3SSumit Garg void bl31_platform_setup(void) 135c35d59a3SSumit Garg { 1360eb275c9SSumit Garg /* Initialize the CCN interconnect */ 1370eb275c9SSumit Garg plat_sq_interconnect_init(); 1380eb275c9SSumit Garg plat_sq_interconnect_enter_coherency(); 139b529799fSSumit Garg 140b529799fSSumit Garg /* Initialize the GIC driver, cpu and distributor interfaces */ 141b529799fSSumit Garg sq_gic_driver_init(); 142b529799fSSumit Garg sq_gic_init(); 1435931fdacSSumit Garg 1445931fdacSSumit Garg /* Enable and initialize the System level generic timer */ 1455931fdacSSumit Garg mmio_write_32(SQ_SYS_CNTCTL_BASE + CNTCR_OFF, 146c9512bcaSAntonio Nino Diaz CNTCR_FCREQ(0U) | CNTCR_EN); 1475931fdacSSumit Garg 1485931fdacSSumit Garg /* Allow access to the System counter timer module */ 1495931fdacSSumit Garg sq_configure_sys_timer(); 150c35d59a3SSumit Garg } 151c35d59a3SSumit Garg 152c35d59a3SSumit Garg void bl31_plat_runtime_setup(void) 153c35d59a3SSumit Garg { 154cfe19f85SArd Biesheuvel struct draminfo *di = (struct draminfo *)(unsigned long)DRAMINFO_BASE; 155cfe19f85SArd Biesheuvel 156*b67d2029SMasahisa Kojima sq_scp_get_draminfo(di); 157c35d59a3SSumit Garg } 158c35d59a3SSumit Garg 159c35d59a3SSumit Garg void bl31_plat_arch_setup(void) 160c35d59a3SSumit Garg { 161434454a2SArd Biesheuvel static const mmap_region_t secure_partition_mmap[] = { 1628855e52eSAntonio Nino Diaz #if ENABLE_SPM && SPM_MM 163434454a2SArd Biesheuvel MAP_REGION_FLAT(PLAT_SPM_BUF_BASE, 164434454a2SArd Biesheuvel PLAT_SPM_BUF_SIZE, 165434454a2SArd Biesheuvel MT_RW_DATA | MT_SECURE), 166434454a2SArd Biesheuvel MAP_REGION_FLAT(PLAT_SQ_SP_PRIV_BASE, 167434454a2SArd Biesheuvel PLAT_SQ_SP_PRIV_SIZE, 168434454a2SArd Biesheuvel MT_RW_DATA | MT_SECURE), 169434454a2SArd Biesheuvel #endif 170434454a2SArd Biesheuvel {0}, 171434454a2SArd Biesheuvel }; 172434454a2SArd Biesheuvel 173434454a2SArd Biesheuvel sq_mmap_setup(BL31_BASE, BL31_SIZE, secure_partition_mmap); 1748cd37d7bSSumit Garg enable_mmu_el3(XLAT_TABLE_NC); 175434454a2SArd Biesheuvel 1768855e52eSAntonio Nino Diaz #if ENABLE_SPM && SPM_MM 177434454a2SArd Biesheuvel memcpy((void *)SPM_SHIM_EXCEPTIONS_START, 178434454a2SArd Biesheuvel (void *)SPM_SHIM_EXCEPTIONS_LMA, 179434454a2SArd Biesheuvel (uintptr_t)SPM_SHIM_EXCEPTIONS_END - 180434454a2SArd Biesheuvel (uintptr_t)SPM_SHIM_EXCEPTIONS_START); 181434454a2SArd Biesheuvel #endif 1828cd37d7bSSumit Garg } 1838cd37d7bSSumit Garg 1848cd37d7bSSumit Garg void bl31_plat_enable_mmu(uint32_t flags) 1858cd37d7bSSumit Garg { 1868cd37d7bSSumit Garg enable_mmu_el3(flags | XLAT_TABLE_NC); 187c35d59a3SSumit Garg } 1885931fdacSSumit Garg 1895931fdacSSumit Garg unsigned int plat_get_syscnt_freq2(void) 1905931fdacSSumit Garg { 1915931fdacSSumit Garg unsigned int counter_base_frequency; 1925931fdacSSumit Garg 1935931fdacSSumit Garg /* Read the frequency from Frequency modes table */ 1945931fdacSSumit Garg counter_base_frequency = mmio_read_32(SQ_SYS_CNTCTL_BASE + CNTFID_OFF); 1955931fdacSSumit Garg 1965931fdacSSumit Garg /* The first entry of the frequency modes table must not be 0 */ 1975931fdacSSumit Garg if (counter_base_frequency == 0) 1985931fdacSSumit Garg panic(); 1995931fdacSSumit Garg 2005931fdacSSumit Garg return counter_base_frequency; 2015931fdacSSumit Garg } 202