g12a_bl31_setup.c 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142
  1. /*
  2. * Copyright (c) 2019, ARM Limited and Contributors. All rights reserved.
  3. *
  4. * SPDX-License-Identifier: BSD-3-Clause
  5. */
  6. #include <assert.h>
  7. #include <common/bl_common.h>
  8. #include <common/interrupt_props.h>
  9. #include <drivers/arm/gicv2.h>
  10. #include <lib/mmio.h>
  11. #include <lib/xlat_tables/xlat_mmu_helpers.h>
  12. #include <plat/common/platform.h>
  13. #include <platform_def.h>
  14. #include "aml_private.h"
  15. /*
  16. * Placeholder variables for copying the arguments that have been passed to
  17. * BL31 from BL2.
  18. */
  19. static entry_point_info_t bl32_image_ep_info;
  20. static entry_point_info_t bl33_image_ep_info;
  21. static image_info_t bl30_image_info;
  22. static image_info_t bl301_image_info;
  23. /*******************************************************************************
  24. * Return a pointer to the 'entry_point_info' structure of the next image for
  25. * the security state specified. BL33 corresponds to the non-secure image type
  26. * while BL32 corresponds to the secure image type. A NULL pointer is returned
  27. * if the image does not exist.
  28. ******************************************************************************/
  29. entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
  30. {
  31. entry_point_info_t *next_image_info;
  32. next_image_info = (type == NON_SECURE) ?
  33. &bl33_image_ep_info : &bl32_image_ep_info;
  34. /* None of the images can have 0x0 as the entrypoint. */
  35. if (next_image_info->pc != 0U)
  36. return next_image_info;
  37. return NULL;
  38. }
  39. /*******************************************************************************
  40. * Perform any BL31 early platform setup. Here is an opportunity to copy
  41. * parameters passed by the calling EL (S-EL1 in BL2 & S-EL3 in BL1) before
  42. * they are lost (potentially). This needs to be done before the MMU is
  43. * initialized so that the memory layout can be used while creating page
  44. * tables. BL2 has flushed this information to memory, so we are guaranteed
  45. * to pick up good data.
  46. ******************************************************************************/
  47. struct g12a_bl31_param {
  48. param_header_t h;
  49. image_info_t *bl31_image_info;
  50. entry_point_info_t *bl32_ep_info;
  51. image_info_t *bl32_image_info;
  52. entry_point_info_t *bl33_ep_info;
  53. image_info_t *bl33_image_info;
  54. image_info_t *scp_image_info[];
  55. };
  56. void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
  57. u_register_t arg2, u_register_t arg3)
  58. {
  59. struct g12a_bl31_param *from_bl2;
  60. /* Initialize the console to provide early debug support */
  61. aml_console_init();
  62. from_bl2 = (struct g12a_bl31_param *)arg0;
  63. /* Check params passed from BL2 are not NULL. */
  64. assert(from_bl2 != NULL);
  65. assert(from_bl2->h.type == PARAM_BL31);
  66. assert(from_bl2->h.version >= VERSION_1);
  67. /*
  68. * Copy BL32 and BL33 entry point information. It is stored in Secure
  69. * RAM, in BL2's address space.
  70. */
  71. bl32_image_ep_info = *from_bl2->bl32_ep_info;
  72. bl33_image_ep_info = *from_bl2->bl33_ep_info;
  73. if (bl33_image_ep_info.pc == 0U) {
  74. ERROR("BL31: BL33 entrypoint not obtained from BL2\n");
  75. panic();
  76. }
  77. bl30_image_info = *from_bl2->scp_image_info[0];
  78. bl301_image_info = *from_bl2->scp_image_info[1];
  79. }
  80. void bl31_plat_arch_setup(void)
  81. {
  82. aml_setup_page_tables();
  83. enable_mmu_el3(0);
  84. }
  85. /*******************************************************************************
  86. * GICv2 driver setup information
  87. ******************************************************************************/
  88. static const interrupt_prop_t g12a_interrupt_props[] = {
  89. INTR_PROP_DESC(IRQ_SEC_PHY_TIMER, GIC_HIGHEST_SEC_PRIORITY,
  90. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  91. INTR_PROP_DESC(IRQ_SEC_SGI_0, GIC_HIGHEST_SEC_PRIORITY,
  92. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  93. INTR_PROP_DESC(IRQ_SEC_SGI_1, GIC_HIGHEST_SEC_PRIORITY,
  94. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  95. INTR_PROP_DESC(IRQ_SEC_SGI_2, GIC_HIGHEST_SEC_PRIORITY,
  96. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  97. INTR_PROP_DESC(IRQ_SEC_SGI_3, GIC_HIGHEST_SEC_PRIORITY,
  98. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  99. INTR_PROP_DESC(IRQ_SEC_SGI_4, GIC_HIGHEST_SEC_PRIORITY,
  100. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  101. INTR_PROP_DESC(IRQ_SEC_SGI_5, GIC_HIGHEST_SEC_PRIORITY,
  102. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  103. INTR_PROP_DESC(IRQ_SEC_SGI_6, GIC_HIGHEST_SEC_PRIORITY,
  104. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  105. INTR_PROP_DESC(IRQ_SEC_SGI_7, GIC_HIGHEST_SEC_PRIORITY,
  106. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL)
  107. };
  108. static const gicv2_driver_data_t g12a_gic_data = {
  109. .gicd_base = AML_GICD_BASE,
  110. .gicc_base = AML_GICC_BASE,
  111. .interrupt_props = g12a_interrupt_props,
  112. .interrupt_props_num = ARRAY_SIZE(g12a_interrupt_props)
  113. };
  114. void bl31_platform_setup(void)
  115. {
  116. aml_mhu_secure_init();
  117. gicv2_driver_init(&g12a_gic_data);
  118. gicv2_distif_init();
  119. gicv2_pcpu_distif_init();
  120. gicv2_cpuif_enable();
  121. }