1f91c3cb1SSiva Durga Prasad Paladugu /* 2*0b25f404SVenkatesh Yadav Abbarapu * Copyright (c) 2018-2021, ARM Limited and Contributors. All rights reserved. 3f91c3cb1SSiva Durga Prasad Paladugu * 4f91c3cb1SSiva Durga Prasad Paladugu * SPDX-License-Identifier: BSD-3-Clause 5f91c3cb1SSiva Durga Prasad Paladugu */ 6f91c3cb1SSiva Durga Prasad Paladugu 7f91c3cb1SSiva Durga Prasad Paladugu #include <assert.h> 8f91c3cb1SSiva Durga Prasad Paladugu #include <errno.h> 95a8ffeabSTejas Patel #include <plat_arm.h> 10d4821739STejas Patel #include <plat_private.h> 1109d40e0eSAntonio Nino Diaz #include <bl31/bl31.h> 1209d40e0eSAntonio Nino Diaz #include <common/bl_common.h> 1309d40e0eSAntonio Nino Diaz #include <common/debug.h> 14*0b25f404SVenkatesh Yadav Abbarapu #include <drivers/arm/dcc.h> 1509d40e0eSAntonio Nino Diaz #include <drivers/arm/pl011.h> 1609d40e0eSAntonio Nino Diaz #include <drivers/console.h> 1731ce893eSVenkatesh Yadav Abbarapu #include <lib/mmio.h> 1809d40e0eSAntonio Nino Diaz #include <lib/xlat_tables/xlat_tables.h> 1909d40e0eSAntonio Nino Diaz #include <plat/common/platform.h> 2031ce893eSVenkatesh Yadav Abbarapu #include <versal_def.h> 2131ce893eSVenkatesh Yadav Abbarapu #include <plat_private.h> 2231ce893eSVenkatesh Yadav Abbarapu #include <plat_startup.h> 2309d40e0eSAntonio Nino Diaz 24f91c3cb1SSiva Durga Prasad Paladugu static entry_point_info_t bl32_image_ep_info; 25f91c3cb1SSiva Durga Prasad Paladugu static entry_point_info_t bl33_image_ep_info; 26f91c3cb1SSiva Durga Prasad Paladugu 27f91c3cb1SSiva Durga Prasad Paladugu /* 28f91c3cb1SSiva Durga Prasad Paladugu * Return a pointer to the 'entry_point_info' structure of the next image for 29f91c3cb1SSiva Durga Prasad Paladugu * the security state specified. BL33 corresponds to the non-secure image type 30f91c3cb1SSiva Durga Prasad Paladugu * while BL32 corresponds to the secure image type. A NULL pointer is returned 31f91c3cb1SSiva Durga Prasad Paladugu * if the image does not exist. 32f91c3cb1SSiva Durga Prasad Paladugu */ 33f91c3cb1SSiva Durga Prasad Paladugu entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type) 34f91c3cb1SSiva Durga Prasad Paladugu { 35f91c3cb1SSiva Durga Prasad Paladugu assert(sec_state_is_valid(type)); 36f91c3cb1SSiva Durga Prasad Paladugu 37e43258faSVenkatesh Yadav Abbarapu if (type == NON_SECURE) { 38f91c3cb1SSiva Durga Prasad Paladugu return &bl33_image_ep_info; 39e43258faSVenkatesh Yadav Abbarapu } 40f91c3cb1SSiva Durga Prasad Paladugu 41f91c3cb1SSiva Durga Prasad Paladugu return &bl32_image_ep_info; 42f91c3cb1SSiva Durga Prasad Paladugu } 43f91c3cb1SSiva Durga Prasad Paladugu 44f91c3cb1SSiva Durga Prasad Paladugu /* 4531ce893eSVenkatesh Yadav Abbarapu * Set the build time defaults,if we can't find any config data. 4631ce893eSVenkatesh Yadav Abbarapu */ 4731ce893eSVenkatesh Yadav Abbarapu static inline void bl31_set_default_config(void) 4831ce893eSVenkatesh Yadav Abbarapu { 4931ce893eSVenkatesh Yadav Abbarapu bl32_image_ep_info.pc = BL32_BASE; 5031ce893eSVenkatesh Yadav Abbarapu bl32_image_ep_info.spsr = arm_get_spsr_for_bl32_entry(); 5131ce893eSVenkatesh Yadav Abbarapu bl33_image_ep_info.pc = plat_get_ns_image_entrypoint(); 5231ce893eSVenkatesh Yadav Abbarapu bl33_image_ep_info.spsr = SPSR_64(MODE_EL2, MODE_SP_ELX, 5331ce893eSVenkatesh Yadav Abbarapu DISABLE_ALL_EXCEPTIONS); 5431ce893eSVenkatesh Yadav Abbarapu } 5531ce893eSVenkatesh Yadav Abbarapu 5631ce893eSVenkatesh Yadav Abbarapu /* 57f91c3cb1SSiva Durga Prasad Paladugu * Perform any BL31 specific platform actions. Here is an opportunity to copy 58f91c3cb1SSiva Durga Prasad Paladugu * parameters passed by the calling EL (S-EL1 in BL2 & S-EL3 in BL1) before they 59f91c3cb1SSiva Durga Prasad Paladugu * are lost (potentially). This needs to be done before the MMU is initialized 60f91c3cb1SSiva Durga Prasad Paladugu * so that the memory layout can be used while creating page tables. 61f91c3cb1SSiva Durga Prasad Paladugu */ 62f91c3cb1SSiva Durga Prasad Paladugu void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, 63f91c3cb1SSiva Durga Prasad Paladugu u_register_t arg2, u_register_t arg3) 64f91c3cb1SSiva Durga Prasad Paladugu { 6531ce893eSVenkatesh Yadav Abbarapu uint64_t atf_handoff_addr; 66f91c3cb1SSiva Durga Prasad Paladugu 67*0b25f404SVenkatesh Yadav Abbarapu if (VERSAL_CONSOLE_IS(pl011)) { 68*0b25f404SVenkatesh Yadav Abbarapu static console_t versal_runtime_console; 69f91c3cb1SSiva Durga Prasad Paladugu /* Initialize the console to provide early debug support */ 70f91c3cb1SSiva Durga Prasad Paladugu int rc = console_pl011_register(VERSAL_UART_BASE, 71f91c3cb1SSiva Durga Prasad Paladugu VERSAL_UART_CLOCK, 72f91c3cb1SSiva Durga Prasad Paladugu VERSAL_UART_BAUDRATE, 73f91c3cb1SSiva Durga Prasad Paladugu &versal_runtime_console); 74e43258faSVenkatesh Yadav Abbarapu if (rc == 0) { 75f91c3cb1SSiva Durga Prasad Paladugu panic(); 76e43258faSVenkatesh Yadav Abbarapu } 77f91c3cb1SSiva Durga Prasad Paladugu 78f695e1e0SAndre Przywara console_set_scope(&versal_runtime_console, CONSOLE_FLAG_BOOT | 79f91c3cb1SSiva Durga Prasad Paladugu CONSOLE_FLAG_RUNTIME); 80*0b25f404SVenkatesh Yadav Abbarapu } else if (VERSAL_CONSOLE_IS(dcc)) { 81*0b25f404SVenkatesh Yadav Abbarapu /* Initialize the dcc console for debug */ 82*0b25f404SVenkatesh Yadav Abbarapu int rc = console_dcc_register(); 83*0b25f404SVenkatesh Yadav Abbarapu if (rc == 0) { 84*0b25f404SVenkatesh Yadav Abbarapu panic(); 85*0b25f404SVenkatesh Yadav Abbarapu } 86*0b25f404SVenkatesh Yadav Abbarapu } 87f91c3cb1SSiva Durga Prasad Paladugu /* Initialize the platform config for future decision making */ 88f91c3cb1SSiva Durga Prasad Paladugu versal_config_setup(); 89f91c3cb1SSiva Durga Prasad Paladugu /* There are no parameters from BL2 if BL31 is a reset vector */ 90f91c3cb1SSiva Durga Prasad Paladugu assert(arg0 == 0U); 91f91c3cb1SSiva Durga Prasad Paladugu assert(arg1 == 0U); 92f91c3cb1SSiva Durga Prasad Paladugu 93f91c3cb1SSiva Durga Prasad Paladugu /* 94f91c3cb1SSiva Durga Prasad Paladugu * Do initial security configuration to allow DRAM/device access. On 95f91c3cb1SSiva Durga Prasad Paladugu * Base VERSAL only DRAM security is programmable (via TrustZone), but 96f91c3cb1SSiva Durga Prasad Paladugu * other platforms might have more programmable security devices 97f91c3cb1SSiva Durga Prasad Paladugu * present. 98f91c3cb1SSiva Durga Prasad Paladugu */ 99f91c3cb1SSiva Durga Prasad Paladugu 100f91c3cb1SSiva Durga Prasad Paladugu /* Populate common information for BL32 and BL33 */ 101f91c3cb1SSiva Durga Prasad Paladugu SET_PARAM_HEAD(&bl32_image_ep_info, PARAM_EP, VERSION_1, 0); 102f91c3cb1SSiva Durga Prasad Paladugu SET_SECURITY_STATE(bl32_image_ep_info.h.attr, SECURE); 103f91c3cb1SSiva Durga Prasad Paladugu SET_PARAM_HEAD(&bl33_image_ep_info, PARAM_EP, VERSION_1, 0); 104f91c3cb1SSiva Durga Prasad Paladugu SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE); 105f91c3cb1SSiva Durga Prasad Paladugu 10631ce893eSVenkatesh Yadav Abbarapu atf_handoff_addr = mmio_read_32(PMC_GLOBAL_GLOB_GEN_STORAGE4); 10731ce893eSVenkatesh Yadav Abbarapu enum fsbl_handoff ret = fsbl_atf_handover(&bl32_image_ep_info, 10831ce893eSVenkatesh Yadav Abbarapu &bl33_image_ep_info, 10931ce893eSVenkatesh Yadav Abbarapu atf_handoff_addr); 110abf27efaSVenkatesh Yadav Abbarapu if (ret == FSBL_HANDOFF_NO_STRUCT || ret == FSBL_HANDOFF_INVAL_STRUCT) { 11131ce893eSVenkatesh Yadav Abbarapu bl31_set_default_config(); 11231ce893eSVenkatesh Yadav Abbarapu } else if (ret != FSBL_HANDOFF_SUCCESS) { 11331ce893eSVenkatesh Yadav Abbarapu panic(); 11431ce893eSVenkatesh Yadav Abbarapu } 115f91c3cb1SSiva Durga Prasad Paladugu 116f91c3cb1SSiva Durga Prasad Paladugu NOTICE("BL31: Secure code at 0x%lx\n", bl32_image_ep_info.pc); 117f91c3cb1SSiva Durga Prasad Paladugu NOTICE("BL31: Non secure code at 0x%lx\n", bl33_image_ep_info.pc); 118f91c3cb1SSiva Durga Prasad Paladugu } 119f91c3cb1SSiva Durga Prasad Paladugu 120f91c3cb1SSiva Durga Prasad Paladugu void bl31_platform_setup(void) 121f91c3cb1SSiva Durga Prasad Paladugu { 122f91c3cb1SSiva Durga Prasad Paladugu /* Initialize the gic cpu and distributor interfaces */ 123f91c3cb1SSiva Durga Prasad Paladugu plat_versal_gic_driver_init(); 124f91c3cb1SSiva Durga Prasad Paladugu plat_versal_gic_init(); 125f91c3cb1SSiva Durga Prasad Paladugu } 126f91c3cb1SSiva Durga Prasad Paladugu 127f91c3cb1SSiva Durga Prasad Paladugu void bl31_plat_runtime_setup(void) 128f91c3cb1SSiva Durga Prasad Paladugu { 129f91c3cb1SSiva Durga Prasad Paladugu } 130f91c3cb1SSiva Durga Prasad Paladugu 131f91c3cb1SSiva Durga Prasad Paladugu /* 132f91c3cb1SSiva Durga Prasad Paladugu * Perform the very early platform specific architectural setup here. 133f91c3cb1SSiva Durga Prasad Paladugu */ 134f91c3cb1SSiva Durga Prasad Paladugu void bl31_plat_arch_setup(void) 135f91c3cb1SSiva Durga Prasad Paladugu { 1365a8ffeabSTejas Patel plat_arm_interconnect_init(); 1375a8ffeabSTejas Patel plat_arm_interconnect_enter_coherency(); 1385a8ffeabSTejas Patel 139f91c3cb1SSiva Durga Prasad Paladugu const mmap_region_t bl_regions[] = { 140f91c3cb1SSiva Durga Prasad Paladugu MAP_REGION_FLAT(BL31_BASE, BL31_END - BL31_BASE, 141f91c3cb1SSiva Durga Prasad Paladugu MT_MEMORY | MT_RW | MT_SECURE), 142f91c3cb1SSiva Durga Prasad Paladugu MAP_REGION_FLAT(BL_CODE_BASE, BL_CODE_END - BL_CODE_BASE, 143f91c3cb1SSiva Durga Prasad Paladugu MT_CODE | MT_SECURE), 144f91c3cb1SSiva Durga Prasad Paladugu MAP_REGION_FLAT(BL_RO_DATA_BASE, BL_RO_DATA_END - BL_RO_DATA_BASE, 145f91c3cb1SSiva Durga Prasad Paladugu MT_RO_DATA | MT_SECURE), 146f91c3cb1SSiva Durga Prasad Paladugu MAP_REGION_FLAT(BL_COHERENT_RAM_BASE, 147f91c3cb1SSiva Durga Prasad Paladugu BL_COHERENT_RAM_END - BL_COHERENT_RAM_BASE, 148f91c3cb1SSiva Durga Prasad Paladugu MT_DEVICE | MT_RW | MT_SECURE), 149f91c3cb1SSiva Durga Prasad Paladugu {0} 150f91c3cb1SSiva Durga Prasad Paladugu }; 151f91c3cb1SSiva Durga Prasad Paladugu 152f91c3cb1SSiva Durga Prasad Paladugu setup_page_tables(bl_regions, plat_versal_get_mmap()); 153f91c3cb1SSiva Durga Prasad Paladugu enable_mmu_el3(0); 154f91c3cb1SSiva Durga Prasad Paladugu } 155