mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-17 01:54:22 +00:00

Change-Id: I5993b425445ee794e6d2a792c244c0af53640655 Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>
176 lines
4.7 KiB
C
176 lines
4.7 KiB
C
/*
|
|
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <arch.h>
|
|
#include <arch_helpers.h>
|
|
#include <platform_def.h>
|
|
#include <assert.h>
|
|
#include <bl_common.h>
|
|
#include <pl011.h>
|
|
#include <debug.h>
|
|
#include <mmio.h>
|
|
#include <sq_common.h>
|
|
|
|
static console_pl011_t console;
|
|
static entry_point_info_t bl32_image_ep_info;
|
|
static entry_point_info_t bl33_image_ep_info;
|
|
|
|
entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
|
|
{
|
|
assert(sec_state_is_valid(type));
|
|
return type == NON_SECURE ? &bl33_image_ep_info : &bl32_image_ep_info;
|
|
}
|
|
|
|
/*******************************************************************************
|
|
* Gets SPSR for BL32 entry
|
|
******************************************************************************/
|
|
uint32_t sq_get_spsr_for_bl32_entry(void)
|
|
{
|
|
/*
|
|
* The Secure Payload Dispatcher service is responsible for
|
|
* setting the SPSR prior to entry into the BL32 image.
|
|
*/
|
|
return 0;
|
|
}
|
|
|
|
/*******************************************************************************
|
|
* Gets SPSR for BL33 entry
|
|
******************************************************************************/
|
|
uint32_t sq_get_spsr_for_bl33_entry(void)
|
|
{
|
|
unsigned long el_status;
|
|
unsigned int mode;
|
|
uint32_t spsr;
|
|
|
|
/* Figure out what mode we enter the non-secure world in */
|
|
el_status = read_id_aa64pfr0_el1() >> ID_AA64PFR0_EL2_SHIFT;
|
|
el_status &= ID_AA64PFR0_ELX_MASK;
|
|
|
|
mode = (el_status) ? MODE_EL2 : MODE_EL1;
|
|
|
|
spsr = SPSR_64(mode, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS);
|
|
return spsr;
|
|
}
|
|
|
|
void bl31_early_platform_setup(bl31_params_t *from_bl2,
|
|
void *plat_params_from_bl2)
|
|
{
|
|
/* Initialize the console to provide early debug support */
|
|
(void)console_pl011_register(PLAT_SQ_BOOT_UART_BASE,
|
|
PLAT_SQ_BOOT_UART_CLK_IN_HZ,
|
|
SQ_CONSOLE_BAUDRATE, &console);
|
|
|
|
console_set_scope(&console.console, CONSOLE_FLAG_BOOT |
|
|
CONSOLE_FLAG_RUNTIME);
|
|
|
|
/* There are no parameters from BL2 if BL31 is a reset vector */
|
|
assert(from_bl2 == NULL);
|
|
assert(plat_params_from_bl2 == NULL);
|
|
|
|
/* Initialize power controller before setting up topology */
|
|
plat_sq_pwrc_setup();
|
|
|
|
#ifdef BL32_BASE
|
|
struct draminfo di = {0};
|
|
|
|
scpi_get_draminfo(&di);
|
|
|
|
/*
|
|
* Check if OP-TEE has been loaded in Secure RAM allocated
|
|
* from DRAM1 region
|
|
*/
|
|
if ((di.base1 + di.size1) <= BL32_BASE) {
|
|
NOTICE("OP-TEE has been loaded by SCP firmware\n");
|
|
/* Populate entry point information for BL32 */
|
|
SET_PARAM_HEAD(&bl32_image_ep_info,
|
|
PARAM_EP,
|
|
VERSION_1,
|
|
0);
|
|
SET_SECURITY_STATE(bl32_image_ep_info.h.attr, SECURE);
|
|
bl32_image_ep_info.pc = BL32_BASE;
|
|
bl32_image_ep_info.spsr = sq_get_spsr_for_bl32_entry();
|
|
} else {
|
|
NOTICE("OP-TEE has not been loaded by SCP firmware\n");
|
|
}
|
|
#endif /* BL32_BASE */
|
|
|
|
/* Populate entry point information for BL33 */
|
|
SET_PARAM_HEAD(&bl33_image_ep_info,
|
|
PARAM_EP,
|
|
VERSION_1,
|
|
0);
|
|
/*
|
|
* Tell BL31 where the non-trusted software image
|
|
* is located and the entry state information
|
|
*/
|
|
bl33_image_ep_info.pc = PRELOADED_BL33_BASE;
|
|
bl33_image_ep_info.spsr = sq_get_spsr_for_bl33_entry();
|
|
SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE);
|
|
}
|
|
|
|
static void sq_configure_sys_timer(void)
|
|
{
|
|
unsigned int reg_val;
|
|
|
|
reg_val = (1 << CNTACR_RPCT_SHIFT) | (1 << CNTACR_RVCT_SHIFT);
|
|
reg_val |= (1 << CNTACR_RFRQ_SHIFT) | (1 << CNTACR_RVOFF_SHIFT);
|
|
reg_val |= (1 << CNTACR_RWVT_SHIFT) | (1 << CNTACR_RWPT_SHIFT);
|
|
mmio_write_32(SQ_SYS_TIMCTL_BASE +
|
|
CNTACR_BASE(PLAT_SQ_NSTIMER_FRAME_ID), reg_val);
|
|
|
|
reg_val = (1 << CNTNSAR_NS_SHIFT(PLAT_SQ_NSTIMER_FRAME_ID));
|
|
mmio_write_32(SQ_SYS_TIMCTL_BASE + CNTNSAR, reg_val);
|
|
}
|
|
|
|
void bl31_platform_setup(void)
|
|
{
|
|
/* Initialize the CCN interconnect */
|
|
plat_sq_interconnect_init();
|
|
plat_sq_interconnect_enter_coherency();
|
|
|
|
/* Initialize the GIC driver, cpu and distributor interfaces */
|
|
sq_gic_driver_init();
|
|
sq_gic_init();
|
|
|
|
/* Enable and initialize the System level generic timer */
|
|
mmio_write_32(SQ_SYS_CNTCTL_BASE + CNTCR_OFF,
|
|
CNTCR_FCREQ(0U) | CNTCR_EN);
|
|
|
|
/* Allow access to the System counter timer module */
|
|
sq_configure_sys_timer();
|
|
}
|
|
|
|
void bl31_plat_runtime_setup(void)
|
|
{
|
|
struct draminfo *di = (struct draminfo *)(unsigned long)DRAMINFO_BASE;
|
|
|
|
scpi_get_draminfo(di);
|
|
}
|
|
|
|
void bl31_plat_arch_setup(void)
|
|
{
|
|
sq_mmap_setup(BL31_BASE, BL31_SIZE, NULL);
|
|
enable_mmu_el3(XLAT_TABLE_NC);
|
|
}
|
|
|
|
void bl31_plat_enable_mmu(uint32_t flags)
|
|
{
|
|
enable_mmu_el3(flags | XLAT_TABLE_NC);
|
|
}
|
|
|
|
unsigned int plat_get_syscnt_freq2(void)
|
|
{
|
|
unsigned int counter_base_frequency;
|
|
|
|
/* Read the frequency from Frequency modes table */
|
|
counter_base_frequency = mmio_read_32(SQ_SYS_CNTCTL_BASE + CNTFID_OFF);
|
|
|
|
/* The first entry of the frequency modes table must not be 0 */
|
|
if (counter_base_frequency == 0)
|
|
panic();
|
|
|
|
return counter_base_frequency;
|
|
}
|