1c35d59a3SSumit Garg /* 28855e52eSAntonio Nino Diaz * Copyright (c) 2018-2019, ARM Limited and Contributors. All rights reserved. 3c35d59a3SSumit Garg * 4c35d59a3SSumit Garg * SPDX-License-Identifier: BSD-3-Clause 5c35d59a3SSumit Garg */ 6c35d59a3SSumit Garg 709d40e0eSAntonio Nino Diaz #include <assert.h> 809d40e0eSAntonio Nino Diaz 909d40e0eSAntonio Nino Diaz #include <platform_def.h> 1009d40e0eSAntonio Nino Diaz 11c35d59a3SSumit Garg #include <arch.h> 12c35d59a3SSumit Garg #include <arch_helpers.h> 1309d40e0eSAntonio Nino Diaz #include <common/bl_common.h> 1409d40e0eSAntonio Nino Diaz #include <common/debug.h> 1509d40e0eSAntonio Nino Diaz #include <drivers/arm/pl011.h> 1609d40e0eSAntonio Nino Diaz #include <lib/mmio.h> 170eb275c9SSumit Garg #include <sq_common.h> 18c35d59a3SSumit Garg 19*f695e1e0SAndre Przywara static console_t console; 205e5cfc21SSumit Garg static entry_point_info_t bl32_image_ep_info; 215e5cfc21SSumit Garg static entry_point_info_t bl33_image_ep_info; 225e5cfc21SSumit Garg 23434454a2SArd Biesheuvel IMPORT_SYM(uintptr_t, __SPM_SHIM_EXCEPTIONS_START__, SPM_SHIM_EXCEPTIONS_START); 24434454a2SArd Biesheuvel IMPORT_SYM(uintptr_t, __SPM_SHIM_EXCEPTIONS_END__, SPM_SHIM_EXCEPTIONS_END); 25434454a2SArd Biesheuvel IMPORT_SYM(uintptr_t, __SPM_SHIM_EXCEPTIONS_LMA__, SPM_SHIM_EXCEPTIONS_LMA); 26434454a2SArd Biesheuvel 275e5cfc21SSumit Garg entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type) 285e5cfc21SSumit Garg { 295e5cfc21SSumit Garg assert(sec_state_is_valid(type)); 305e5cfc21SSumit Garg return type == NON_SECURE ? &bl33_image_ep_info : &bl32_image_ep_info; 315e5cfc21SSumit Garg } 325e5cfc21SSumit Garg 335e5cfc21SSumit Garg /******************************************************************************* 345e5cfc21SSumit Garg * Gets SPSR for BL32 entry 355e5cfc21SSumit Garg ******************************************************************************/ 365e5cfc21SSumit Garg uint32_t sq_get_spsr_for_bl32_entry(void) 375e5cfc21SSumit Garg { 385e5cfc21SSumit Garg /* 395e5cfc21SSumit Garg * The Secure Payload Dispatcher service is responsible for 405e5cfc21SSumit Garg * setting the SPSR prior to entry into the BL32 image. 415e5cfc21SSumit Garg */ 425e5cfc21SSumit Garg return 0; 435e5cfc21SSumit Garg } 445e5cfc21SSumit Garg 455e5cfc21SSumit Garg /******************************************************************************* 465e5cfc21SSumit Garg * Gets SPSR for BL33 entry 475e5cfc21SSumit Garg ******************************************************************************/ 485e5cfc21SSumit Garg uint32_t sq_get_spsr_for_bl33_entry(void) 495e5cfc21SSumit Garg { 505e5cfc21SSumit Garg unsigned long el_status; 515e5cfc21SSumit Garg unsigned int mode; 525e5cfc21SSumit Garg uint32_t spsr; 535e5cfc21SSumit Garg 545e5cfc21SSumit Garg /* Figure out what mode we enter the non-secure world in */ 555e5cfc21SSumit Garg el_status = read_id_aa64pfr0_el1() >> ID_AA64PFR0_EL2_SHIFT; 565e5cfc21SSumit Garg el_status &= ID_AA64PFR0_ELX_MASK; 575e5cfc21SSumit Garg 585e5cfc21SSumit Garg mode = (el_status) ? MODE_EL2 : MODE_EL1; 595e5cfc21SSumit Garg 605e5cfc21SSumit Garg spsr = SPSR_64(mode, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS); 615e5cfc21SSumit Garg return spsr; 625e5cfc21SSumit Garg } 6367b40070SSumit Garg 64ce1f43acSAntonio Nino Diaz void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, 65ce1f43acSAntonio Nino Diaz u_register_t arg2, u_register_t arg3) 66c35d59a3SSumit Garg { 6767b40070SSumit Garg /* Initialize the console to provide early debug support */ 6867b40070SSumit Garg (void)console_pl011_register(PLAT_SQ_BOOT_UART_BASE, 6967b40070SSumit Garg PLAT_SQ_BOOT_UART_CLK_IN_HZ, 7067b40070SSumit Garg SQ_CONSOLE_BAUDRATE, &console); 7167b40070SSumit Garg 72*f695e1e0SAndre Przywara console_set_scope(&console, CONSOLE_FLAG_BOOT | CONSOLE_FLAG_RUNTIME); 7367b40070SSumit Garg 74c35d59a3SSumit Garg /* There are no parameters from BL2 if BL31 is a reset vector */ 75ce1f43acSAntonio Nino Diaz assert(arg0 == 0U); 76ce1f43acSAntonio Nino Diaz assert(arg1 == 0U); 775e5cfc21SSumit Garg 786cb2a397SSumit Garg /* Initialize power controller before setting up topology */ 796cb2a397SSumit Garg plat_sq_pwrc_setup(); 806cb2a397SSumit Garg 81e373b6a2SArd Biesheuvel #ifdef SPD_opteed 826cb2a397SSumit Garg struct draminfo di = {0}; 836cb2a397SSumit Garg 84b67d2029SMasahisa Kojima sq_scp_get_draminfo(&di); 856cb2a397SSumit Garg 866cb2a397SSumit Garg /* 876cb2a397SSumit Garg * Check if OP-TEE has been loaded in Secure RAM allocated 886cb2a397SSumit Garg * from DRAM1 region 896cb2a397SSumit Garg */ 906cb2a397SSumit Garg if ((di.base1 + di.size1) <= BL32_BASE) { 916cb2a397SSumit Garg NOTICE("OP-TEE has been loaded by SCP firmware\n"); 925e5cfc21SSumit Garg /* Populate entry point information for BL32 */ 935e5cfc21SSumit Garg SET_PARAM_HEAD(&bl32_image_ep_info, 945e5cfc21SSumit Garg PARAM_EP, 955e5cfc21SSumit Garg VERSION_1, 965e5cfc21SSumit Garg 0); 975e5cfc21SSumit Garg SET_SECURITY_STATE(bl32_image_ep_info.h.attr, SECURE); 985e5cfc21SSumit Garg bl32_image_ep_info.pc = BL32_BASE; 995e5cfc21SSumit Garg bl32_image_ep_info.spsr = sq_get_spsr_for_bl32_entry(); 1006cb2a397SSumit Garg } else { 1016cb2a397SSumit Garg NOTICE("OP-TEE has not been loaded by SCP firmware\n"); 1026cb2a397SSumit Garg } 103e373b6a2SArd Biesheuvel #endif /* SPD_opteed */ 1045e5cfc21SSumit Garg 1055e5cfc21SSumit Garg /* Populate entry point information for BL33 */ 1065e5cfc21SSumit Garg SET_PARAM_HEAD(&bl33_image_ep_info, 1075e5cfc21SSumit Garg PARAM_EP, 1085e5cfc21SSumit Garg VERSION_1, 1095e5cfc21SSumit Garg 0); 1105e5cfc21SSumit Garg /* 1115e5cfc21SSumit Garg * Tell BL31 where the non-trusted software image 1125e5cfc21SSumit Garg * is located and the entry state information 1135e5cfc21SSumit Garg */ 1145e5cfc21SSumit Garg bl33_image_ep_info.pc = PRELOADED_BL33_BASE; 1155e5cfc21SSumit Garg bl33_image_ep_info.spsr = sq_get_spsr_for_bl33_entry(); 1165e5cfc21SSumit Garg SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE); 117c35d59a3SSumit Garg } 118c35d59a3SSumit Garg 1195931fdacSSumit Garg static void sq_configure_sys_timer(void) 1205931fdacSSumit Garg { 1215931fdacSSumit Garg unsigned int reg_val; 1225931fdacSSumit Garg 1235931fdacSSumit Garg reg_val = (1 << CNTACR_RPCT_SHIFT) | (1 << CNTACR_RVCT_SHIFT); 1245931fdacSSumit Garg reg_val |= (1 << CNTACR_RFRQ_SHIFT) | (1 << CNTACR_RVOFF_SHIFT); 1255931fdacSSumit Garg reg_val |= (1 << CNTACR_RWVT_SHIFT) | (1 << CNTACR_RWPT_SHIFT); 1265931fdacSSumit Garg mmio_write_32(SQ_SYS_TIMCTL_BASE + 1275931fdacSSumit Garg CNTACR_BASE(PLAT_SQ_NSTIMER_FRAME_ID), reg_val); 1285931fdacSSumit Garg 1295931fdacSSumit Garg reg_val = (1 << CNTNSAR_NS_SHIFT(PLAT_SQ_NSTIMER_FRAME_ID)); 1305931fdacSSumit Garg mmio_write_32(SQ_SYS_TIMCTL_BASE + CNTNSAR, reg_val); 1315931fdacSSumit Garg } 1325931fdacSSumit Garg 133c35d59a3SSumit Garg void bl31_platform_setup(void) 134c35d59a3SSumit Garg { 1350eb275c9SSumit Garg /* Initialize the CCN interconnect */ 1360eb275c9SSumit Garg plat_sq_interconnect_init(); 1370eb275c9SSumit Garg plat_sq_interconnect_enter_coherency(); 138b529799fSSumit Garg 139b529799fSSumit Garg /* Initialize the GIC driver, cpu and distributor interfaces */ 140b529799fSSumit Garg sq_gic_driver_init(); 141b529799fSSumit Garg sq_gic_init(); 1425931fdacSSumit Garg 1435931fdacSSumit Garg /* Enable and initialize the System level generic timer */ 1445931fdacSSumit Garg mmio_write_32(SQ_SYS_CNTCTL_BASE + CNTCR_OFF, 145c9512bcaSAntonio Nino Diaz CNTCR_FCREQ(0U) | CNTCR_EN); 1465931fdacSSumit Garg 1475931fdacSSumit Garg /* Allow access to the System counter timer module */ 1485931fdacSSumit Garg sq_configure_sys_timer(); 149c35d59a3SSumit Garg } 150c35d59a3SSumit Garg 151c35d59a3SSumit Garg void bl31_plat_runtime_setup(void) 152c35d59a3SSumit Garg { 153cfe19f85SArd Biesheuvel struct draminfo *di = (struct draminfo *)(unsigned long)DRAMINFO_BASE; 154cfe19f85SArd Biesheuvel 155b67d2029SMasahisa Kojima sq_scp_get_draminfo(di); 156c35d59a3SSumit Garg } 157c35d59a3SSumit Garg 158c35d59a3SSumit Garg void bl31_plat_arch_setup(void) 159c35d59a3SSumit Garg { 160434454a2SArd Biesheuvel static const mmap_region_t secure_partition_mmap[] = { 1613f3c341aSPaul Beesley #if SPM_MM 162434454a2SArd Biesheuvel MAP_REGION_FLAT(PLAT_SPM_BUF_BASE, 163434454a2SArd Biesheuvel PLAT_SPM_BUF_SIZE, 164434454a2SArd Biesheuvel MT_RW_DATA | MT_SECURE), 165434454a2SArd Biesheuvel MAP_REGION_FLAT(PLAT_SQ_SP_PRIV_BASE, 166434454a2SArd Biesheuvel PLAT_SQ_SP_PRIV_SIZE, 167434454a2SArd Biesheuvel MT_RW_DATA | MT_SECURE), 168434454a2SArd Biesheuvel #endif 169434454a2SArd Biesheuvel {0}, 170434454a2SArd Biesheuvel }; 171434454a2SArd Biesheuvel 172434454a2SArd Biesheuvel sq_mmap_setup(BL31_BASE, BL31_SIZE, secure_partition_mmap); 1738cd37d7bSSumit Garg enable_mmu_el3(XLAT_TABLE_NC); 174434454a2SArd Biesheuvel 1753f3c341aSPaul Beesley #if SPM_MM 176434454a2SArd Biesheuvel memcpy((void *)SPM_SHIM_EXCEPTIONS_START, 177434454a2SArd Biesheuvel (void *)SPM_SHIM_EXCEPTIONS_LMA, 178434454a2SArd Biesheuvel (uintptr_t)SPM_SHIM_EXCEPTIONS_END - 179434454a2SArd Biesheuvel (uintptr_t)SPM_SHIM_EXCEPTIONS_START); 180434454a2SArd Biesheuvel #endif 1818cd37d7bSSumit Garg } 1828cd37d7bSSumit Garg 1838cd37d7bSSumit Garg void bl31_plat_enable_mmu(uint32_t flags) 1848cd37d7bSSumit Garg { 1858cd37d7bSSumit Garg enable_mmu_el3(flags | XLAT_TABLE_NC); 186c35d59a3SSumit Garg } 1875931fdacSSumit Garg 1885931fdacSSumit Garg unsigned int plat_get_syscnt_freq2(void) 1895931fdacSSumit Garg { 1905931fdacSSumit Garg unsigned int counter_base_frequency; 1915931fdacSSumit Garg 1925931fdacSSumit Garg /* Read the frequency from Frequency modes table */ 1935931fdacSSumit Garg counter_base_frequency = mmio_read_32(SQ_SYS_CNTCTL_BASE + CNTFID_OFF); 1945931fdacSSumit Garg 1955931fdacSSumit Garg /* The first entry of the frequency modes table must not be 0 */ 1965931fdacSSumit Garg if (counter_base_frequency == 0) 1975931fdacSSumit Garg panic(); 1985931fdacSSumit Garg 1995931fdacSSumit Garg return counter_base_frequency; 2005931fdacSSumit Garg } 201