arm_bl31_setup.c 11.8 KB
Newer Older
1
/*
johpow01's avatar
johpow01 committed
2
 * Copyright (c) 2015-2021, Arm Limited and Contributors. All rights reserved.
3
 *
dp-arm's avatar
dp-arm committed
4
 * SPDX-License-Identifier: BSD-3-Clause
5
6
 */

7
8
#include <assert.h>

9
10
#include <arch.h>
#include <arch_helpers.h>
11
12
13
#include <common/bl_common.h>
#include <common/debug.h>
#include <drivers/console.h>
Ambroise Vincent's avatar
Ambroise Vincent committed
14
#include <lib/debugfs.h>
15
#include <lib/extensions/ras.h>
johpow01's avatar
johpow01 committed
16
17
18
#if ENABLE_RME
#include <lib/gpt/gpt.h>
#endif
19
20
#include <lib/mmio.h>
#include <lib/xlat_tables/xlat_tables_compat.h>
21
#include <plat/arm/common/plat_arm.h>
22
#include <plat/common/platform.h>
23
#include <platform_def.h>
24

25
26
/*
 * Placeholder variables for copying the arguments that have been passed to
27
 * BL31 from BL2.
28
29
30
31
 */
static entry_point_info_t bl32_image_ep_info;
static entry_point_info_t bl33_image_ep_info;

32
#if !RESET_TO_BL31
33
/*
34
 * Check that BL31_BASE is above ARM_FW_CONFIG_LIMIT. The reserved page
35
36
 * is required for SOC_FW_CONFIG/TOS_FW_CONFIG passed from BL2.
 */
37
CASSERT(BL31_BASE >= ARM_FW_CONFIG_LIMIT, assert_bl31_base_overflows);
38
#endif
39
40

/* Weak definitions may be overridden in specific ARM standard platform */
41
#pragma weak bl31_early_platform_setup2
42
43
44
45
#pragma weak bl31_platform_setup
#pragma weak bl31_plat_arch_setup
#pragma weak bl31_plat_get_next_image_ep_info

46
#define MAP_BL31_TOTAL		MAP_REGION_FLAT(			\
47
48
					BL31_START,			\
					BL31_END - BL31_START,		\
johpow01's avatar
johpow01 committed
49
					MT_MEMORY | MT_RW | EL3_PAS)
50
51
#if RECLAIM_INIT_CODE
IMPORT_SYM(unsigned long, __INIT_CODE_START__, BL_INIT_CODE_BASE);
52
IMPORT_SYM(unsigned long, __INIT_CODE_END__, BL_CODE_END_UNALIGNED);
53
IMPORT_SYM(unsigned long, __STACKS_END__, BL_STACKS_END_UNALIGNED);
54
55
56

#define	BL_INIT_CODE_END	((BL_CODE_END_UNALIGNED + PAGE_SIZE - 1) & \
					~(PAGE_SIZE - 1))
57
58
#define	BL_STACKS_END		((BL_STACKS_END_UNALIGNED + PAGE_SIZE - 1) & \
					~(PAGE_SIZE - 1))
59
60
61
62
63

#define MAP_BL_INIT_CODE	MAP_REGION_FLAT(			\
					BL_INIT_CODE_BASE,		\
					BL_INIT_CODE_END		\
						- BL_INIT_CODE_BASE,	\
johpow01's avatar
johpow01 committed
64
					MT_CODE | EL3_PAS)
65
#endif
66

67
68
69
70
71
#if SEPARATE_NOBITS_REGION
#define MAP_BL31_NOBITS		MAP_REGION_FLAT(			\
					BL31_NOBITS_BASE,		\
					BL31_NOBITS_LIMIT 		\
						- BL31_NOBITS_BASE,	\
johpow01's avatar
johpow01 committed
72
					MT_MEMORY | MT_RW | EL3_PAS)
73
74

#endif
75
76
/*******************************************************************************
 * Return a pointer to the 'entry_point_info' structure of the next image for the
77
78
 * security state specified. BL33 corresponds to the non-secure image type
 * while BL32 corresponds to the secure image type. A NULL pointer is returned
79
80
 * if the image does not exist.
 ******************************************************************************/
81
struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type)
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
{
	entry_point_info_t *next_image_info;

	assert(sec_state_is_valid(type));
	next_image_info = (type == NON_SECURE)
			? &bl33_image_ep_info : &bl32_image_ep_info;
	/*
	 * None of the images on the ARM development platforms can have 0x0
	 * as the entrypoint
	 */
	if (next_image_info->pc)
		return next_image_info;
	else
		return NULL;
}

/*******************************************************************************
99
 * Perform any BL31 early platform setup common to ARM standard platforms.
100
 * Here is an opportunity to copy parameters passed by the calling EL (S-EL1
101
 * in BL2 & EL3 in BL1) before they are lost (potentially). This needs to be
102
103
104
105
 * done before the MMU is initialized so that the memory layout can be used
 * while creating page tables. BL2 has flushed this information to memory, so
 * we are guaranteed to pick up good data.
 ******************************************************************************/
106
void __init arm_bl31_early_platform_setup(void *from_bl2, uintptr_t soc_fw_config,
107
				uintptr_t hw_config, void *plat_params_from_bl2)
108
109
{
	/* Initialize the console to provide early debug support */
110
	arm_console_boot_init();
111
112

#if RESET_TO_BL31
113
	/* There are no parameters from BL2 if BL31 is a reset vector */
114
115
116
	assert(from_bl2 == NULL);
	assert(plat_params_from_bl2 == NULL);

117
# ifdef BL32_BASE
118
	/* Populate entry point information for BL32 */
119
120
121
122
123
124
125
	SET_PARAM_HEAD(&bl32_image_ep_info,
				PARAM_EP,
				VERSION_1,
				0);
	SET_SECURITY_STATE(bl32_image_ep_info.h.attr, SECURE);
	bl32_image_ep_info.pc = BL32_BASE;
	bl32_image_ep_info.spsr = arm_get_spsr_for_bl32_entry();
126
127
128
129
130
131
132
133
134
135
136
137

#if defined(SPD_spmd)
	/* SPM (hafnium in secure world) expects SPM Core manifest base address
	 * in x0, which in !RESET_TO_BL31 case loaded after base of non shared
	 * SRAM(after 4KB offset of SRAM). But in RESET_TO_BL31 case all non
	 * shared SRAM is allocated to BL31, so to avoid overwriting of manifest
	 * keep it in the last page.
	 */
	bl32_image_ep_info.args.arg0 = ARM_TRUSTED_SRAM_BASE +
				PLAT_ARM_TRUSTED_SRAM_SIZE - PAGE_SIZE;
#endif

138
# endif /* BL32_BASE */
139

140
	/* Populate entry point information for BL33 */
141
142
143
144
145
	SET_PARAM_HEAD(&bl33_image_ep_info,
				PARAM_EP,
				VERSION_1,
				0);
	/*
146
	 * Tell BL31 where the non-trusted software image
147
148
149
	 * is located and the entry state information
	 */
	bl33_image_ep_info.pc = plat_get_ns_image_entrypoint();
150

151
152
153
	bl33_image_ep_info.spsr = arm_get_spsr_for_bl33_entry();
	SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE);

154
#else /* RESET_TO_BL31 */
155
156
	/*
	 * In debug builds, we pass a special value in 'plat_params_from_bl2'
157
	 * to verify platform parameters from BL2 to BL31.
158
159
160
161
162
	 * In release builds, it's not used.
	 */
	assert(((unsigned long long)plat_params_from_bl2) ==
		ARM_BL31_PLAT_PARAM_VAL);

163
164
165
166
167
168
169
170
171
172
173
174
175
176
	/*
	 * Check params passed from BL2 should not be NULL,
	 */
	bl_params_t *params_from_bl2 = (bl_params_t *)from_bl2;
	assert(params_from_bl2 != NULL);
	assert(params_from_bl2->h.type == PARAM_BL_PARAMS);
	assert(params_from_bl2->h.version >= VERSION_2);

	bl_params_node_t *bl_params = params_from_bl2->head;

	/*
	 * Copy BL33 and BL32 (if present), entry point information.
	 * They are stored in Secure RAM, in BL2's address space.
	 */
177
	while (bl_params != NULL) {
178
179
180
181
182
183
184
185
186
		if (bl_params->image_id == BL32_IMAGE_ID)
			bl32_image_ep_info = *bl_params->ep_info;

		if (bl_params->image_id == BL33_IMAGE_ID)
			bl33_image_ep_info = *bl_params->ep_info;

		bl_params = bl_params->next_params_info;
	}

187
	if (bl33_image_ep_info.pc == 0U)
188
189
		panic();
#endif /* RESET_TO_BL31 */
190
191
192
193
194
195
196
197
198
199
200
201
202

# if ARM_LINUX_KERNEL_AS_BL33
	/*
	 * According to the file ``Documentation/arm64/booting.txt`` of the
	 * Linux kernel tree, Linux expects the physical address of the device
	 * tree blob (DTB) in x0, while x1-x3 are reserved for future use and
	 * must be 0.
	 */
	bl33_image_ep_info.args.arg0 = (u_register_t)ARM_PRELOADED_DTB_BASE;
	bl33_image_ep_info.args.arg1 = 0U;
	bl33_image_ep_info.args.arg2 = 0U;
	bl33_image_ep_info.args.arg3 = 0U;
# endif
203
204
205
206
207
208
209
210

#if defined(SPD_spmd)
	/*
	 * Hafnium in normal world expects its manifest address in x0, In CI
	 * configuration manifest is preloaded at 0x80000000(start of DRAM).
	 */
	bl33_image_ep_info.args.arg0 = (u_register_t)ARM_DRAM1_BASE;
#endif
johpow01's avatar
johpow01 committed
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232

#if ENABLE_RME
	/*
	 * Initialise Granule Protection library and enable GPC
	 * for the primary processor. The tables were initialised
	 * in BL2, so there is no need to provide any PAS here.
	 */
	gpt_init_params_t gpt_params = {
		PLATFORM_PGS,
		PLATFORM_PPS,
		PLATFORM_L0GPTSZ,
		NULL,
		0U,
		ARM_L0_GPT_ADDR_BASE, ARM_L0_GPT_SIZE,
		ARM_L1_GPT_ADDR_BASE, ARM_L1_GPT_SIZE
	};

	/* Initialise the global granule tables. */
	if (gpt_init(&gpt_params) < 0) {
		panic();
	}
#endif /* ENABLE_RME */
233
234
}

235
236
void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
		u_register_t arg2, u_register_t arg3)
237
{
238
	arm_bl31_early_platform_setup((void *)arg0, arg1, arg2, (void *)arg3);
239
240

	/*
241
	 * Initialize Interconnect for this cluster during cold boot.
242
243
	 * No need for locks as no other CPU is active.
	 */
244
	plat_arm_interconnect_init();
245

246
	/*
247
	 * Enable Interconnect coherency for the primary CPU's cluster.
248
249
250
	 * Earlier bootloader stages might already do this (e.g. Trusted
	 * Firmware's BL1 does it) but we can't assume so. There is no harm in
	 * executing this code twice anyway.
251
252
253
	 * Platform specific PSCI code will enable coherency for other
	 * clusters.
	 */
254
	plat_arm_interconnect_enter_coherency();
255
256
257
}

/*******************************************************************************
258
 * Perform any BL31 platform setup common to ARM standard platforms
259
260
261
 ******************************************************************************/
void arm_bl31_platform_setup(void)
{
262
263
	/* Initialize the GIC driver, cpu and distributor interfaces */
	plat_arm_gic_driver_init();
264
265
266
267
268
269
270
271
272
	plat_arm_gic_init();

#if RESET_TO_BL31
	/*
	 * Do initial security configuration to allow DRAM/device access
	 * (if earlier BL has not already done so).
	 */
	plat_arm_security_setup();

273
274
275
276
#if defined(PLAT_ARM_MEM_PROT_ADDR)
	arm_nor_psci_do_dyn_mem_protect();
#endif /* PLAT_ARM_MEM_PROT_ADDR */

277
278
279
280
#endif /* RESET_TO_BL31 */

	/* Enable and initialize the System level generic timer */
	mmio_write_32(ARM_SYS_CNTCTL_BASE + CNTCR_OFF,
281
			CNTCR_FCREQ(0U) | CNTCR_EN);
282
283

	/* Allow access to the System counter timer module */
284
	arm_configure_sys_timer();
285
286
287

	/* Initialize power controller before setting up topology */
	plat_arm_pwrc_setup();
288
289
290
291

#if RAS_EXTENSION
	ras_init();
#endif
Ambroise Vincent's avatar
Ambroise Vincent committed
292
293
294
295

#if USE_DEBUGFS
	debugfs_init();
#endif /* USE_DEBUGFS */
296
297
}

298
/*******************************************************************************
299
 * Perform any BL31 platform runtime setup prior to BL31 exit common to ARM
300
 * standard platforms
301
 * Perform BL31 platform setup
302
303
304
 ******************************************************************************/
void arm_bl31_plat_runtime_setup(void)
{
305
306
	console_switch_state(CONSOLE_FLAG_RUNTIME);

307
	/* Initialize the runtime console */
308
	arm_console_runtime_init();
309

310
311
312
#if RECLAIM_INIT_CODE
	arm_free_init_memory();
#endif
313
314
315
316

#if PLAT_RO_XLAT_TABLES
	arm_xlat_make_tables_readonly();
#endif
317
318
319
320
}

#if RECLAIM_INIT_CODE
/*
321
322
323
324
325
326
327
328
329
330
331
 * Make memory for image boot time code RW to reclaim it as stack for the
 * secondary cores, or RO where it cannot be reclaimed:
 *
 *            |-------- INIT SECTION --------|
 *  -----------------------------------------
 * |  CORE 0  |  CORE 1  |  CORE 2  | EXTRA  |
 * |  STACK   |  STACK   |  STACK   | SPACE  |
 *  -----------------------------------------
 *             <-------------------> <------>
 *                MAKE RW AND XN       MAKE
 *                  FOR STACKS       RO AND XN
332
333
334
 */
void arm_free_init_memory(void)
{
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
	int ret = 0;

	if (BL_STACKS_END < BL_INIT_CODE_END) {
		/* Reclaim some of the init section as stack if possible. */
		if (BL_INIT_CODE_BASE < BL_STACKS_END) {
			ret |= xlat_change_mem_attributes(BL_INIT_CODE_BASE,
					BL_STACKS_END - BL_INIT_CODE_BASE,
					MT_RW_DATA);
		}
		/* Make the rest of the init section read-only. */
		ret |= xlat_change_mem_attributes(BL_STACKS_END,
				BL_INIT_CODE_END - BL_STACKS_END,
				MT_RO_DATA);
	} else {
		/* The stacks cover the init section, so reclaim it all. */
		ret |= xlat_change_mem_attributes(BL_INIT_CODE_BASE,
351
352
				BL_INIT_CODE_END - BL_INIT_CODE_BASE,
				MT_RW_DATA);
353
	}
354
355
356
357
358

	if (ret != 0) {
		ERROR("Could not reclaim initialization code");
		panic();
	}
359
}
360
#endif
361

362
void __init bl31_platform_setup(void)
363
364
365
366
{
	arm_bl31_platform_setup();
}

367
368
369
370
371
void bl31_plat_runtime_setup(void)
{
	arm_bl31_plat_runtime_setup();
}

372
/*******************************************************************************
373
374
375
376
 * Perform the very early platform specific architectural setup shared between
 * ARM standard platforms. This only does basic initialization. Later
 * architectural setup (bl31_arch_setup()) does not do anything platform
 * specific.
377
 ******************************************************************************/
378
void __init arm_bl31_plat_arch_setup(void)
379
{
380
381
	const mmap_region_t bl_regions[] = {
		MAP_BL31_TOTAL,
johpow01's avatar
johpow01 committed
382
383
384
#if ENABLE_RME
		ARM_MAP_BL_CONFIG_REGION,
#endif
385
386
#if RECLAIM_INIT_CODE
		MAP_BL_INIT_CODE,
387
388
389
#endif
#if SEPARATE_NOBITS_REGION
		MAP_BL31_NOBITS,
390
#endif
391
		ARM_MAP_BL_RO,
Roberto Vargas's avatar
Roberto Vargas committed
392
393
394
395
#if USE_ROMLIB
		ARM_MAP_ROMLIB_CODE,
		ARM_MAP_ROMLIB_DATA,
#endif
396
#if USE_COHERENT_MEM
397
		ARM_MAP_BL_COHERENT_RAM,
398
#endif
399
400
401
		{0}
	};

402
	setup_page_tables(bl_regions, plat_arm_get_mmap());
403

404
	enable_mmu_el3(0);
Roberto Vargas's avatar
Roberto Vargas committed
405
406

	arm_setup_romlib();
407
408
}

409
void __init bl31_plat_arch_setup(void)
410
411
412
{
	arm_bl31_plat_arch_setup();
}