mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-16 17:44:19 +00:00

BL31 will need to access a device tree for several configurations (UART, GIC, OTP mapping...). Create a BL31 device tree (SOC_FW_CONFIG). It is loaded in DDR, in a spare area. Signed-off-by: Yann Gautier <yann.gautier@foss.st.com> Signed-off-by: Maxime Méré <maxime.mere@foss.st.com> Change-Id: I320a05859e1aa3dd8db9a274e7201075a8c250c2
156 lines
3.7 KiB
C
156 lines
3.7 KiB
C
/*
|
|
* Copyright (c) 2023-2024, STMicroelectronics - All Rights Reserved
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <assert.h>
|
|
#include <stdint.h>
|
|
|
|
#include <common/bl_common.h>
|
|
#include <drivers/generic_delay_timer.h>
|
|
#include <drivers/st/stm32_console.h>
|
|
#include <lib/xlat_tables/xlat_tables_v2.h>
|
|
#include <plat/common/platform.h>
|
|
|
|
#include <platform_def.h>
|
|
|
|
static entry_point_info_t bl32_image_ep_info;
|
|
static entry_point_info_t bl33_image_ep_info;
|
|
|
|
void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
|
|
u_register_t arg2, u_register_t arg3)
|
|
{
|
|
bl_params_t *params_from_bl2;
|
|
int ret;
|
|
|
|
/*
|
|
* Invalidate remaining data from second half of SYSRAM (used by BL2) as this area will
|
|
* be later used as non-secure.
|
|
*/
|
|
inv_dcache_range(STM32MP_SYSRAM_BASE + STM32MP_SYSRAM_SIZE / 2U,
|
|
STM32MP_SYSRAM_SIZE / 2U);
|
|
|
|
mmap_add_region(BL_CODE_BASE, BL_CODE_BASE,
|
|
BL_CODE_END - BL_CODE_BASE,
|
|
MT_CODE | MT_SECURE);
|
|
|
|
/*
|
|
* Map soc_fw_config device tree with secure property, i.e. default region.
|
|
* DDR region definitions will be finalized at BL32 level.
|
|
*/
|
|
mmap_add_region(arg1, arg1, STM32MP_SOC_FW_CONFIG_MAX_SIZE, MT_RO_DATA | MT_SECURE);
|
|
|
|
#if USE_COHERENT_MEM
|
|
/* Map coherent memory */
|
|
mmap_add_region(BL_COHERENT_RAM_BASE, BL_COHERENT_RAM_BASE,
|
|
BL_COHERENT_RAM_END - BL_COHERENT_RAM_BASE,
|
|
MT_DEVICE | MT_RW | MT_SECURE);
|
|
#endif
|
|
|
|
configure_mmu();
|
|
|
|
ret = dt_open_and_check(arg1);
|
|
if (ret < 0) {
|
|
EARLY_ERROR("%s: failed to open DT (%d)\n", __func__, ret);
|
|
panic();
|
|
}
|
|
|
|
ret = stm32mp2_clk_init();
|
|
if (ret < 0) {
|
|
EARLY_ERROR("%s: failed init clocks (%d)\n", __func__, ret);
|
|
panic();
|
|
}
|
|
|
|
(void)stm32mp_uart_console_setup();
|
|
|
|
/*
|
|
* Map upper SYSRAM where bl_params_t are stored in BL2
|
|
*/
|
|
ret = mmap_add_dynamic_region(STM32MP_SYSRAM_BASE + STM32MP_SYSRAM_SIZE / 2U,
|
|
STM32MP_SYSRAM_BASE + STM32MP_SYSRAM_SIZE / 2U,
|
|
STM32MP_SYSRAM_SIZE / 2U, MT_RO_DATA | MT_SECURE);
|
|
if (ret < 0) {
|
|
ERROR("BL2 params area mapping: %d\n", ret);
|
|
panic();
|
|
}
|
|
|
|
assert(arg0 != 0UL);
|
|
params_from_bl2 = (bl_params_t *)arg0;
|
|
assert(params_from_bl2 != NULL);
|
|
assert(params_from_bl2->h.type == PARAM_BL_PARAMS);
|
|
assert(params_from_bl2->h.version >= VERSION_2);
|
|
|
|
bl_params_node_t *bl_params = params_from_bl2->head;
|
|
|
|
while (bl_params != NULL) {
|
|
/*
|
|
* Copy BL33 entry point information.
|
|
* They are stored in Secure RAM, in BL2's address space.
|
|
*/
|
|
if (bl_params->image_id == BL33_IMAGE_ID) {
|
|
bl33_image_ep_info = *bl_params->ep_info;
|
|
/*
|
|
* Check if hw_configuration is given to BL32 and
|
|
* share it to BL33
|
|
*/
|
|
if (arg2 != 0U) {
|
|
bl33_image_ep_info.args.arg0 = 0U;
|
|
bl33_image_ep_info.args.arg1 = 0U;
|
|
bl33_image_ep_info.args.arg2 = arg2;
|
|
}
|
|
}
|
|
|
|
if (bl_params->image_id == BL32_IMAGE_ID) {
|
|
bl32_image_ep_info = *bl_params->ep_info;
|
|
|
|
if (arg2 != 0U) {
|
|
bl32_image_ep_info.args.arg3 = arg2;
|
|
}
|
|
}
|
|
|
|
bl_params = bl_params->next_params_info;
|
|
}
|
|
|
|
ret = mmap_remove_dynamic_region(STM32MP_SYSRAM_BASE + STM32MP_SYSRAM_SIZE / 2U,
|
|
STM32MP_SYSRAM_SIZE / 2U);
|
|
if (ret < 0) {
|
|
ERROR("BL2 params area unmapping: %d\n", ret);
|
|
panic();
|
|
}
|
|
}
|
|
|
|
void bl31_plat_arch_setup(void)
|
|
{
|
|
}
|
|
|
|
void bl31_platform_setup(void)
|
|
{
|
|
}
|
|
|
|
entry_point_info_t *bl31_plat_get_next_image_ep_info(unsigned int type)
|
|
{
|
|
entry_point_info_t *next_image_info = NULL;
|
|
|
|
assert(sec_state_is_valid(type));
|
|
|
|
switch (type) {
|
|
case NON_SECURE:
|
|
next_image_info = &bl33_image_ep_info;
|
|
break;
|
|
|
|
case SECURE:
|
|
next_image_info = &bl32_image_ep_info;
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
/* None of the next images on ST platforms can have 0x0 as the entrypoint */
|
|
if ((next_image_info == NULL) || (next_image_info->pc == 0UL)) {
|
|
return NULL;
|
|
}
|
|
|
|
return next_image_info;
|
|
}
|