/* * Copyright (c) 2023-2024, STMicroelectronics - All Rights Reserved * * SPDX-License-Identifier: BSD-3-Clause */ #include #include #include #include #include #include #include #include static entry_point_info_t bl32_image_ep_info; static entry_point_info_t bl33_image_ep_info; void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, u_register_t arg2, u_register_t arg3) { bl_params_t *params_from_bl2; int ret; /* * Invalidate remaining data from second half of SYSRAM (used by BL2) as this area will * be later used as non-secure. */ inv_dcache_range(STM32MP_SYSRAM_BASE + STM32MP_SYSRAM_SIZE / 2U, STM32MP_SYSRAM_SIZE / 2U); mmap_add_region(BL_CODE_BASE, BL_CODE_BASE, BL_CODE_END - BL_CODE_BASE, MT_CODE | MT_SECURE); /* * Map soc_fw_config device tree with secure property, i.e. default region. * DDR region definitions will be finalized at BL32 level. */ mmap_add_region(arg1, arg1, STM32MP_SOC_FW_CONFIG_MAX_SIZE, MT_RO_DATA | MT_SECURE); #if USE_COHERENT_MEM /* Map coherent memory */ mmap_add_region(BL_COHERENT_RAM_BASE, BL_COHERENT_RAM_BASE, BL_COHERENT_RAM_END - BL_COHERENT_RAM_BASE, MT_DEVICE | MT_RW | MT_SECURE); #endif configure_mmu(); ret = dt_open_and_check(arg1); if (ret < 0) { EARLY_ERROR("%s: failed to open DT (%d)\n", __func__, ret); panic(); } ret = stm32mp2_clk_init(); if (ret < 0) { EARLY_ERROR("%s: failed init clocks (%d)\n", __func__, ret); panic(); } generic_delay_timer_init(); (void)stm32mp_uart_console_setup(); /* * Map upper SYSRAM where bl_params_t are stored in BL2 */ ret = mmap_add_dynamic_region(STM32MP_SYSRAM_BASE + STM32MP_SYSRAM_SIZE / 2U, STM32MP_SYSRAM_BASE + STM32MP_SYSRAM_SIZE / 2U, STM32MP_SYSRAM_SIZE / 2U, MT_RO_DATA | MT_SECURE); if (ret < 0) { ERROR("BL2 params area mapping: %d\n", ret); panic(); } assert(arg0 != 0UL); params_from_bl2 = (bl_params_t *)arg0; assert(params_from_bl2 != NULL); assert(params_from_bl2->h.type == PARAM_BL_PARAMS); assert(params_from_bl2->h.version >= VERSION_2); bl_params_node_t *bl_params = params_from_bl2->head; while (bl_params != NULL) { /* * Copy BL33 entry point information. * They are stored in Secure RAM, in BL2's address space. */ if (bl_params->image_id == BL33_IMAGE_ID) { bl33_image_ep_info = *bl_params->ep_info; /* * Check if hw_configuration is given to BL32 and * share it to BL33 */ if (arg2 != 0U) { bl33_image_ep_info.args.arg0 = 0U; bl33_image_ep_info.args.arg1 = 0U; bl33_image_ep_info.args.arg2 = arg2; } } if (bl_params->image_id == BL32_IMAGE_ID) { bl32_image_ep_info = *bl_params->ep_info; if (arg2 != 0U) { bl32_image_ep_info.args.arg3 = arg2; } } bl_params = bl_params->next_params_info; } ret = mmap_remove_dynamic_region(STM32MP_SYSRAM_BASE + STM32MP_SYSRAM_SIZE / 2U, STM32MP_SYSRAM_SIZE / 2U); if (ret < 0) { ERROR("BL2 params area unmapping: %d\n", ret); panic(); } } void bl31_plat_arch_setup(void) { stm32mp_gic_init(); } void bl31_platform_setup(void) { } entry_point_info_t *bl31_plat_get_next_image_ep_info(unsigned int type) { entry_point_info_t *next_image_info = NULL; assert(sec_state_is_valid(type)); switch (type) { case NON_SECURE: next_image_info = &bl33_image_ep_info; break; case SECURE: next_image_info = &bl32_image_ep_info; break; default: break; } /* None of the next images on ST platforms can have 0x0 as the entrypoint */ if ((next_image_info == NULL) || (next_image_info->pc == 0UL)) { return NULL; } return next_image_info; }