gxbb_bl31_setup.c 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144
  1. /*
  2. * Copyright (c) 2018-2019, ARM Limited and Contributors. All rights reserved.
  3. *
  4. * SPDX-License-Identifier: BSD-3-Clause
  5. */
  6. #include <assert.h>
  7. #include <common/bl_common.h>
  8. #include <common/interrupt_props.h>
  9. #include <drivers/arm/gicv2.h>
  10. #include <lib/xlat_tables/xlat_mmu_helpers.h>
  11. #include <plat/common/platform.h>
  12. #include <platform_def.h>
  13. #include "aml_private.h"
  14. /*
  15. * Placeholder variables for copying the arguments that have been passed to
  16. * BL31 from BL2.
  17. */
  18. static entry_point_info_t bl33_image_ep_info;
  19. /*******************************************************************************
  20. * Return a pointer to the 'entry_point_info' structure of the next image for
  21. * the security state specified. BL33 corresponds to the non-secure image type
  22. * while BL32 corresponds to the secure image type. A NULL pointer is returned
  23. * if the image does not exist.
  24. ******************************************************************************/
  25. entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
  26. {
  27. entry_point_info_t *next_image_info;
  28. assert(type == NON_SECURE);
  29. next_image_info = &bl33_image_ep_info;
  30. /* None of the images can have 0x0 as the entrypoint. */
  31. if (next_image_info->pc != 0U) {
  32. return next_image_info;
  33. } else {
  34. return NULL;
  35. }
  36. }
  37. /*******************************************************************************
  38. * Perform any BL31 early platform setup. Here is an opportunity to copy
  39. * parameters passed by the calling EL (S-EL1 in BL2 & S-EL3 in BL1) before
  40. * they are lost (potentially). This needs to be done before the MMU is
  41. * initialized so that the memory layout can be used while creating page
  42. * tables. BL2 has flushed this information to memory, so we are guaranteed
  43. * to pick up good data.
  44. ******************************************************************************/
  45. struct gxbb_bl31_param {
  46. param_header_t h;
  47. image_info_t *bl31_image_info;
  48. entry_point_info_t *bl32_ep_info;
  49. image_info_t *bl32_image_info;
  50. entry_point_info_t *bl33_ep_info;
  51. image_info_t *bl33_image_info;
  52. };
  53. void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
  54. u_register_t arg2, u_register_t arg3)
  55. {
  56. struct gxbb_bl31_param *from_bl2;
  57. /* Initialize the console to provide early debug support */
  58. aml_console_init();
  59. /*
  60. * In debug builds, we pass a special value in 'arg1' to verify platform
  61. * parameters from BL2 to BL31. In release builds it's not used.
  62. */
  63. assert(arg1 == AML_BL31_PLAT_PARAM_VAL);
  64. /* Check that params passed from BL2 are not NULL. */
  65. from_bl2 = (struct gxbb_bl31_param *) arg0;
  66. /* Check params passed from BL2 are not NULL. */
  67. assert(from_bl2 != NULL);
  68. assert(from_bl2->h.type == PARAM_BL31);
  69. assert(from_bl2->h.version >= VERSION_1);
  70. /*
  71. * Copy BL33 entry point information. It is stored in Secure RAM, in
  72. * BL2's address space.
  73. */
  74. bl33_image_ep_info = *from_bl2->bl33_ep_info;
  75. if (bl33_image_ep_info.pc == 0U) {
  76. ERROR("BL31: BL33 entrypoint not obtained from BL2\n");
  77. panic();
  78. }
  79. }
  80. void bl31_plat_arch_setup(void)
  81. {
  82. aml_setup_page_tables();
  83. enable_mmu_el3(0);
  84. }
  85. /*******************************************************************************
  86. * GICv2 driver setup information
  87. ******************************************************************************/
  88. static const interrupt_prop_t gxbb_interrupt_props[] = {
  89. INTR_PROP_DESC(IRQ_SEC_PHY_TIMER, GIC_HIGHEST_SEC_PRIORITY,
  90. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  91. INTR_PROP_DESC(IRQ_SEC_SGI_0, GIC_HIGHEST_SEC_PRIORITY,
  92. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  93. INTR_PROP_DESC(IRQ_SEC_SGI_1, GIC_HIGHEST_SEC_PRIORITY,
  94. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  95. INTR_PROP_DESC(IRQ_SEC_SGI_2, GIC_HIGHEST_SEC_PRIORITY,
  96. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  97. INTR_PROP_DESC(IRQ_SEC_SGI_3, GIC_HIGHEST_SEC_PRIORITY,
  98. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  99. INTR_PROP_DESC(IRQ_SEC_SGI_4, GIC_HIGHEST_SEC_PRIORITY,
  100. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  101. INTR_PROP_DESC(IRQ_SEC_SGI_5, GIC_HIGHEST_SEC_PRIORITY,
  102. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  103. INTR_PROP_DESC(IRQ_SEC_SGI_6, GIC_HIGHEST_SEC_PRIORITY,
  104. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  105. INTR_PROP_DESC(IRQ_SEC_SGI_7, GIC_HIGHEST_SEC_PRIORITY,
  106. GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
  107. };
  108. static const gicv2_driver_data_t gxbb_gic_data = {
  109. .gicd_base = AML_GICD_BASE,
  110. .gicc_base = AML_GICC_BASE,
  111. .interrupt_props = gxbb_interrupt_props,
  112. .interrupt_props_num = ARRAY_SIZE(gxbb_interrupt_props),
  113. };
  114. void bl31_platform_setup(void)
  115. {
  116. aml_mhu_secure_init();
  117. gicv2_driver_init(&gxbb_gic_data);
  118. gicv2_distif_init();
  119. gicv2_pcpu_distif_init();
  120. gicv2_cpuif_enable();
  121. aml_thermal_unknown();
  122. }