123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574 |
- /*
- * Copyright (c) 2015-2024, Arm Limited and Contributors. All rights reserved.
- *
- * SPDX-License-Identifier: BSD-3-Clause
- */
- #include <assert.h>
- #include <arch.h>
- #include <arch_features.h>
- #include <arch_helpers.h>
- #include <common/bl_common.h>
- #include <common/debug.h>
- #include <drivers/console.h>
- #include <lib/debugfs.h>
- #include <lib/extensions/ras.h>
- #include <lib/fconf/fconf.h>
- #include <lib/gpt_rme/gpt_rme.h>
- #include <lib/mmio.h>
- #if TRANSFER_LIST
- #include <lib/transfer_list.h>
- #endif
- #include <lib/xlat_tables/xlat_tables_compat.h>
- #include <plat/arm/common/plat_arm.h>
- #include <plat/common/platform.h>
- #include <platform_def.h>
- static struct transfer_list_header *secure_tl __unused;
- static struct transfer_list_header *ns_tl __unused;
- /*
- * Placeholder variables for copying the arguments that have been passed to
- * BL31 from BL2.
- */
- static entry_point_info_t bl32_image_ep_info;
- static entry_point_info_t bl33_image_ep_info;
- #if ENABLE_RME
- static entry_point_info_t rmm_image_ep_info;
- #endif
- #if !RESET_TO_BL31
- /*
- * Check that BL31_BASE is above ARM_FW_CONFIG_LIMIT. The reserved page
- * is required for SOC_FW_CONFIG/TOS_FW_CONFIG passed from BL2.
- */
- #if TRANSFER_LIST
- CASSERT(BL31_BASE >= PLAT_ARM_EL3_FW_HANDOFF_LIMIT, assert_bl31_base_overflows);
- #else
- CASSERT(BL31_BASE >= ARM_FW_CONFIG_LIMIT, assert_bl31_base_overflows);
- #endif /* TRANSFER_LIST */
- #endif /* RESET_TO_BL31 */
- /* Weak definitions may be overridden in specific ARM standard platform */
- #pragma weak bl31_early_platform_setup2
- #pragma weak bl31_platform_setup
- #pragma weak bl31_plat_arch_setup
- #pragma weak bl31_plat_get_next_image_ep_info
- #pragma weak bl31_plat_runtime_setup
- #define MAP_BL31_TOTAL MAP_REGION_FLAT( \
- BL31_START, \
- BL31_END - BL31_START, \
- MT_MEMORY | MT_RW | EL3_PAS)
- #if RECLAIM_INIT_CODE
- IMPORT_SYM(unsigned long, __INIT_CODE_START__, BL_INIT_CODE_BASE);
- IMPORT_SYM(unsigned long, __INIT_CODE_END__, BL_CODE_END_UNALIGNED);
- IMPORT_SYM(unsigned long, __STACKS_END__, BL_STACKS_END_UNALIGNED);
- #define BL_INIT_CODE_END ((BL_CODE_END_UNALIGNED + PAGE_SIZE - 1) & \
- ~(PAGE_SIZE - 1))
- #define BL_STACKS_END ((BL_STACKS_END_UNALIGNED + PAGE_SIZE - 1) & \
- ~(PAGE_SIZE - 1))
- #define MAP_BL_INIT_CODE MAP_REGION_FLAT( \
- BL_INIT_CODE_BASE, \
- BL_INIT_CODE_END \
- - BL_INIT_CODE_BASE, \
- MT_CODE | EL3_PAS)
- #endif
- #if SEPARATE_NOBITS_REGION
- #define MAP_BL31_NOBITS MAP_REGION_FLAT( \
- BL31_NOBITS_BASE, \
- BL31_NOBITS_LIMIT \
- - BL31_NOBITS_BASE, \
- MT_MEMORY | MT_RW | EL3_PAS)
- #endif
- /*******************************************************************************
- * Return a pointer to the 'entry_point_info' structure of the next image for the
- * security state specified. BL33 corresponds to the non-secure image type
- * while BL32 corresponds to the secure image type. A NULL pointer is returned
- * if the image does not exist.
- ******************************************************************************/
- struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type)
- {
- entry_point_info_t *next_image_info;
- assert(sec_state_is_valid(type));
- if (type == NON_SECURE) {
- #if TRANSFER_LIST && !RESET_TO_BL31
- next_image_info = transfer_list_set_handoff_args(
- ns_tl, &bl33_image_ep_info);
- #else
- next_image_info = &bl33_image_ep_info;
- #endif
- }
- #if ENABLE_RME
- else if (type == REALM) {
- next_image_info = &rmm_image_ep_info;
- }
- #endif
- else {
- next_image_info = &bl32_image_ep_info;
- }
- /*
- * None of the images on the ARM development platforms can have 0x0
- * as the entrypoint
- */
- if (next_image_info->pc)
- return next_image_info;
- else
- return NULL;
- }
- /*******************************************************************************
- * Perform any BL31 early platform setup common to ARM standard platforms.
- * Here is an opportunity to copy parameters passed by the calling EL (S-EL1
- * in BL2 & EL3 in BL1) before they are lost (potentially). This needs to be
- * done before the MMU is initialized so that the memory layout can be used
- * while creating page tables. BL2 has flushed this information to memory, so
- * we are guaranteed to pick up good data.
- ******************************************************************************/
- #if TRANSFER_LIST
- void __init arm_bl31_early_platform_setup(u_register_t arg0, u_register_t arg1,
- u_register_t arg2, u_register_t arg3)
- {
- #if RESET_TO_BL31
- /* Populate entry point information for BL33 */
- SET_PARAM_HEAD(&bl33_image_ep_info, PARAM_EP, VERSION_1, 0);
- /*
- * Tell BL31 where the non-trusted software image
- * is located and the entry state information
- */
- bl33_image_ep_info.pc = plat_get_ns_image_entrypoint();
- bl33_image_ep_info.spsr = arm_get_spsr_for_bl33_entry();
- SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE);
- bl33_image_ep_info.args.arg0 = PLAT_ARM_TRANSFER_LIST_DTB_OFFSET;
- bl33_image_ep_info.args.arg1 =
- TRANSFER_LIST_HANDOFF_X1_VALUE(REGISTER_CONVENTION_VERSION);
- bl33_image_ep_info.args.arg3 = FW_NS_HANDOFF_BASE;
- #else
- struct transfer_list_entry *te = NULL;
- struct entry_point_info *ep;
- secure_tl = (struct transfer_list_header *)arg3;
- /*
- * Populate the global entry point structures used to execute subsequent
- * images.
- */
- while ((te = transfer_list_next(secure_tl, te)) != NULL) {
- ep = transfer_list_entry_data(te);
- if (te->tag_id == TL_TAG_EXEC_EP_INFO64) {
- switch (GET_SECURITY_STATE(ep->h.attr)) {
- case NON_SECURE:
- bl33_image_ep_info = *ep;
- break;
- #if ENABLE_RME
- case REALM:
- rmm_image_ep_info = *ep;
- break;
- #endif
- case SECURE:
- bl32_image_ep_info = *ep;
- break;
- default:
- ERROR("Unrecognized Image Security State %lu\n",
- GET_SECURITY_STATE(ep->h.attr));
- panic();
- }
- }
- }
- #endif /* RESET_TO_BL31 */
- }
- #else
- void __init arm_bl31_early_platform_setup(void *from_bl2, uintptr_t soc_fw_config,
- uintptr_t hw_config, void *plat_params_from_bl2)
- {
- /* Initialize the console to provide early debug support */
- arm_console_boot_init();
- #if RESET_TO_BL31
- /* There are no parameters from BL2 if BL31 is a reset vector */
- assert(from_bl2 == NULL);
- assert(plat_params_from_bl2 == NULL);
- # ifdef BL32_BASE
- /* Populate entry point information for BL32 */
- SET_PARAM_HEAD(&bl32_image_ep_info,
- PARAM_EP,
- VERSION_1,
- 0);
- SET_SECURITY_STATE(bl32_image_ep_info.h.attr, SECURE);
- bl32_image_ep_info.pc = BL32_BASE;
- bl32_image_ep_info.spsr = arm_get_spsr_for_bl32_entry();
- #if defined(SPD_spmd)
- /* SPM (hafnium in secure world) expects SPM Core manifest base address
- * in x0, which in !RESET_TO_BL31 case loaded after base of non shared
- * SRAM(after 4KB offset of SRAM). But in RESET_TO_BL31 case all non
- * shared SRAM is allocated to BL31, so to avoid overwriting of manifest
- * keep it in the last page.
- */
- bl32_image_ep_info.args.arg0 = ARM_TRUSTED_SRAM_BASE +
- PLAT_ARM_TRUSTED_SRAM_SIZE - PAGE_SIZE;
- #endif
- # endif /* BL32_BASE */
- /* Populate entry point information for BL33 */
- SET_PARAM_HEAD(&bl33_image_ep_info,
- PARAM_EP,
- VERSION_1,
- 0);
- /*
- * Tell BL31 where the non-trusted software image
- * is located and the entry state information
- */
- bl33_image_ep_info.pc = plat_get_ns_image_entrypoint();
- bl33_image_ep_info.spsr = arm_get_spsr_for_bl33_entry();
- SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE);
- #if ENABLE_RME
- /*
- * Populate entry point information for RMM.
- * Only PC needs to be set as other fields are determined by RMMD.
- */
- rmm_image_ep_info.pc = RMM_BASE;
- #endif /* ENABLE_RME */
- #else /* RESET_TO_BL31 */
- /*
- * In debug builds, we pass a special value in 'plat_params_from_bl2'
- * to verify platform parameters from BL2 to BL31.
- * In release builds, it's not used.
- */
- assert(((unsigned long long)plat_params_from_bl2) ==
- ARM_BL31_PLAT_PARAM_VAL);
- /*
- * Check params passed from BL2 should not be NULL,
- */
- bl_params_t *params_from_bl2 = (bl_params_t *)from_bl2;
- assert(params_from_bl2 != NULL);
- assert(params_from_bl2->h.type == PARAM_BL_PARAMS);
- assert(params_from_bl2->h.version >= VERSION_2);
- bl_params_node_t *bl_params = params_from_bl2->head;
- /*
- * Copy BL33, BL32 and RMM (if present), entry point information.
- * They are stored in Secure RAM, in BL2's address space.
- */
- while (bl_params != NULL) {
- if (bl_params->image_id == BL32_IMAGE_ID) {
- bl32_image_ep_info = *bl_params->ep_info;
- #if SPMC_AT_EL3
- /*
- * Populate the BL32 image base, size and max limit in
- * the entry point information, since there is no
- * platform function to retrieve them in generic
- * code. We choose arg2, arg3 and arg4 since the generic
- * code uses arg1 for stashing the SP manifest size. The
- * SPMC setup uses these arguments to update SP manifest
- * with actual SP's base address and it size.
- */
- bl32_image_ep_info.args.arg2 =
- bl_params->image_info->image_base;
- bl32_image_ep_info.args.arg3 =
- bl_params->image_info->image_size;
- bl32_image_ep_info.args.arg4 =
- bl_params->image_info->image_base +
- bl_params->image_info->image_max_size;
- #endif
- }
- #if ENABLE_RME
- else if (bl_params->image_id == RMM_IMAGE_ID) {
- rmm_image_ep_info = *bl_params->ep_info;
- }
- #endif
- else if (bl_params->image_id == BL33_IMAGE_ID) {
- bl33_image_ep_info = *bl_params->ep_info;
- }
- bl_params = bl_params->next_params_info;
- }
- if (bl33_image_ep_info.pc == 0U)
- panic();
- #if ENABLE_RME
- if (rmm_image_ep_info.pc == 0U)
- panic();
- #endif
- #endif /* RESET_TO_BL31 */
- # if ARM_LINUX_KERNEL_AS_BL33
- /*
- * According to the file ``Documentation/arm64/booting.txt`` of the
- * Linux kernel tree, Linux expects the physical address of the device
- * tree blob (DTB) in x0, while x1-x3 are reserved for future use and
- * must be 0.
- * Repurpose the option to load Hafnium hypervisor in the normal world.
- * It expects its manifest address in x0. This is essentially the linux
- * dts (passed to the primary VM) by adding 'hypervisor' and chosen
- * nodes specifying the Hypervisor configuration.
- */
- #if RESET_TO_BL31
- bl33_image_ep_info.args.arg0 = (u_register_t)ARM_PRELOADED_DTB_BASE;
- #else
- bl33_image_ep_info.args.arg0 = (u_register_t)hw_config;
- #endif
- bl33_image_ep_info.args.arg1 = 0U;
- bl33_image_ep_info.args.arg2 = 0U;
- bl33_image_ep_info.args.arg3 = 0U;
- # endif
- }
- #endif
- void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
- u_register_t arg2, u_register_t arg3)
- {
- #if TRANSFER_LIST
- arm_bl31_early_platform_setup(arg0, arg1, arg2, arg3);
- #else
- arm_bl31_early_platform_setup((void *)arg0, arg1, arg2, (void *)arg3);
- #endif
- /*
- * Initialize Interconnect for this cluster during cold boot.
- * No need for locks as no other CPU is active.
- */
- plat_arm_interconnect_init();
- /*
- * Enable Interconnect coherency for the primary CPU's cluster.
- * Earlier bootloader stages might already do this (e.g. Trusted
- * Firmware's BL1 does it) but we can't assume so. There is no harm in
- * executing this code twice anyway.
- * Platform specific PSCI code will enable coherency for other
- * clusters.
- */
- plat_arm_interconnect_enter_coherency();
- }
- /*******************************************************************************
- * Perform any BL31 platform setup common to ARM standard platforms
- ******************************************************************************/
- void arm_bl31_platform_setup(void)
- {
- struct transfer_list_entry *te __unused;
- #if TRANSFER_LIST && !RESET_TO_BL31
- ns_tl = transfer_list_init((void *)FW_NS_HANDOFF_BASE,
- PLAT_ARM_FW_HANDOFF_SIZE);
- if (ns_tl == NULL) {
- ERROR("Non-secure transfer list initialisation failed!");
- panic();
- }
- te = transfer_list_find(secure_tl, TL_TAG_FDT);
- assert(te != NULL);
- /*
- * A pre-existing assumption is that FCONF is unsupported w/ RESET_TO_BL2 and
- * RESET_TO_BL31. In the case of RESET_TO_BL31 this makes sense because there
- * isn't a prior stage to load the device tree, but the reasoning for RESET_TO_BL2 is
- * less clear. For the moment hardware properties that would normally be
- * derived from the DT are statically defined.
- */
- #if !RESET_TO_BL2
- fconf_populate("HW_CONFIG", (uintptr_t)transfer_list_entry_data(te));
- #endif
- te = transfer_list_add(ns_tl, TL_TAG_FDT, te->data_size,
- transfer_list_entry_data(te));
- assert(te != NULL);
- #endif /* TRANSFER_LIST */
- /* Initialize the GIC driver, cpu and distributor interfaces */
- plat_arm_gic_driver_init();
- plat_arm_gic_init();
- #if RESET_TO_BL31
- /*
- * Do initial security configuration to allow DRAM/device access
- * (if earlier BL has not already done so).
- */
- plat_arm_security_setup();
- #if defined(PLAT_ARM_MEM_PROT_ADDR)
- arm_nor_psci_do_dyn_mem_protect();
- #endif /* PLAT_ARM_MEM_PROT_ADDR */
- #endif /* RESET_TO_BL31 */
- /* Enable and initialize the System level generic timer */
- mmio_write_32(ARM_SYS_CNTCTL_BASE + CNTCR_OFF,
- CNTCR_FCREQ(0U) | CNTCR_EN);
- /* Allow access to the System counter timer module */
- arm_configure_sys_timer();
- /* Initialize power controller before setting up topology */
- plat_arm_pwrc_setup();
- #if ENABLE_FEAT_RAS && FFH_SUPPORT
- ras_init();
- #endif
- #if USE_DEBUGFS
- debugfs_init();
- #endif /* USE_DEBUGFS */
- }
- /*******************************************************************************
- * Perform any BL31 platform runtime setup prior to BL31 exit common to ARM
- * standard platforms
- ******************************************************************************/
- void arm_bl31_plat_runtime_setup(void)
- {
- struct transfer_list_entry *te __unused;
- /* Initialize the runtime console */
- arm_console_runtime_init();
- #if TRANSFER_LIST && !RESET_TO_BL31
- /*
- * We assume BL31 has added all TE's required by BL33 at this stage, ensure
- * that data is visible to all observers by performing a flush operation, so
- * they can access the updated data even if caching is not enabled.
- */
- flush_dcache_range((uintptr_t)ns_tl, ns_tl->size);
- #endif /* TRANSFER_LIST && !(RESET_TO_BL2 || RESET_TO_BL31) */
- #if RECLAIM_INIT_CODE
- arm_free_init_memory();
- #endif
- #if PLAT_RO_XLAT_TABLES
- arm_xlat_make_tables_readonly();
- #endif
- }
- #if RECLAIM_INIT_CODE
- /*
- * Make memory for image boot time code RW to reclaim it as stack for the
- * secondary cores, or RO where it cannot be reclaimed:
- *
- * |-------- INIT SECTION --------|
- * -----------------------------------------
- * | CORE 0 | CORE 1 | CORE 2 | EXTRA |
- * | STACK | STACK | STACK | SPACE |
- * -----------------------------------------
- * <-------------------> <------>
- * MAKE RW AND XN MAKE
- * FOR STACKS RO AND XN
- */
- void arm_free_init_memory(void)
- {
- int ret = 0;
- if (BL_STACKS_END < BL_INIT_CODE_END) {
- /* Reclaim some of the init section as stack if possible. */
- if (BL_INIT_CODE_BASE < BL_STACKS_END) {
- ret |= xlat_change_mem_attributes(BL_INIT_CODE_BASE,
- BL_STACKS_END - BL_INIT_CODE_BASE,
- MT_RW_DATA);
- }
- /* Make the rest of the init section read-only. */
- ret |= xlat_change_mem_attributes(BL_STACKS_END,
- BL_INIT_CODE_END - BL_STACKS_END,
- MT_RO_DATA);
- } else {
- /* The stacks cover the init section, so reclaim it all. */
- ret |= xlat_change_mem_attributes(BL_INIT_CODE_BASE,
- BL_INIT_CODE_END - BL_INIT_CODE_BASE,
- MT_RW_DATA);
- }
- if (ret != 0) {
- ERROR("Could not reclaim initialization code");
- panic();
- }
- }
- #endif
- void __init bl31_platform_setup(void)
- {
- arm_bl31_platform_setup();
- }
- void bl31_plat_runtime_setup(void)
- {
- arm_bl31_plat_runtime_setup();
- }
- /*******************************************************************************
- * Perform the very early platform specific architectural setup shared between
- * ARM standard platforms. This only does basic initialization. Later
- * architectural setup (bl31_arch_setup()) does not do anything platform
- * specific.
- ******************************************************************************/
- void __init arm_bl31_plat_arch_setup(void)
- {
- const mmap_region_t bl_regions[] = {
- MAP_BL31_TOTAL,
- #if ENABLE_RME
- ARM_MAP_L0_GPT_REGION,
- #endif
- #if RECLAIM_INIT_CODE
- MAP_BL_INIT_CODE,
- #endif
- #if SEPARATE_NOBITS_REGION
- MAP_BL31_NOBITS,
- #endif
- ARM_MAP_BL_RO,
- #if USE_ROMLIB
- ARM_MAP_ROMLIB_CODE,
- ARM_MAP_ROMLIB_DATA,
- #endif
- #if USE_COHERENT_MEM
- ARM_MAP_BL_COHERENT_RAM,
- #endif
- {0}
- };
- setup_page_tables(bl_regions, plat_arm_get_mmap());
- enable_mmu_el3(0);
- #if ENABLE_RME
- #if RESET_TO_BL31
- /* initialize GPT only when RME is enabled. */
- assert(is_feat_rme_present());
- /* Initialise and enable granule protection after MMU. */
- arm_gpt_setup();
- #endif /* RESET_TO_BL31 */
- /*
- * Initialise Granule Protection library and enable GPC for the primary
- * processor. The tables have already been initialized by a previous BL
- * stage, so there is no need to provide any PAS here. This function
- * sets up pointers to those tables.
- */
- if (gpt_runtime_init() < 0) {
- ERROR("gpt_runtime_init() failed!\n");
- panic();
- }
- #endif /* ENABLE_RME */
- arm_setup_romlib();
- }
- void __init bl31_plat_arch_setup(void)
- {
- arm_bl31_plat_arch_setup();
- }
|