Home | History | Annotate | Download | only in juno
      1 /*
      2  * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
      3  *
      4  * Redistribution and use in source and binary forms, with or without
      5  * modification, are permitted provided that the following conditions are met:
      6  *
      7  * Redistributions of source code must retain the above copyright notice, this
      8  * list of conditions and the following disclaimer.
      9  *
     10  * Redistributions in binary form must reproduce the above copyright notice,
     11  * this list of conditions and the following disclaimer in the documentation
     12  * and/or other materials provided with the distribution.
     13  *
     14  * Neither the name of ARM nor the names of its contributors may be used
     15  * to endorse or promote products derived from this software without specific
     16  * prior written permission.
     17  *
     18  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
     19  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     20  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     21  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
     22  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     23  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     24  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     25  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     26  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     27  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     28  * POSSIBILITY OF SUCH DAMAGE.
     29  */
     30 
     31 #include <arch_helpers.h>
     32 #include <assert.h>
     33 #include <bl_common.h>
     34 #include <cci400.h>
     35 #include <console.h>
     36 #include <debug.h>
     37 #include <mmio.h>
     38 #include <platform.h>
     39 #include <platform_def.h>
     40 #include "../../bl1/bl1_private.h"
     41 #include "juno_def.h"
     42 #include "juno_private.h"
     43 
     44 #if USE_COHERENT_MEM
     45 /*******************************************************************************
     46  * Declarations of linker defined symbols which will help us find the layout
     47  * of trusted RAM
     48  ******************************************************************************/
     49 extern unsigned long __COHERENT_RAM_START__;
     50 extern unsigned long __COHERENT_RAM_END__;
     51 
     52 /*
     53  * The next 2 constants identify the extents of the coherent memory region.
     54  * These addresses are used by the MMU setup code and therefore they must be
     55  * page-aligned.  It is the responsibility of the linker script to ensure that
     56  * __COHERENT_RAM_START__ and __COHERENT_RAM_END__ linker symbols refer to
     57  * page-aligned addresses.
     58  */
     59 #define BL1_COHERENT_RAM_BASE (unsigned long)(&__COHERENT_RAM_START__)
     60 #define BL1_COHERENT_RAM_LIMIT (unsigned long)(&__COHERENT_RAM_END__)
     61 #endif
     62 
     63 /* Data structure which holds the extents of the trusted RAM for BL1 */
     64 static meminfo_t bl1_tzram_layout;
     65 
     66 meminfo_t *bl1_plat_sec_mem_layout(void)
     67 {
     68 	return &bl1_tzram_layout;
     69 }
     70 
     71 /*******************************************************************************
     72  * Perform any BL1 specific platform actions.
     73  ******************************************************************************/
     74 void bl1_early_platform_setup(void)
     75 {
     76 	const size_t bl1_size = BL1_RAM_LIMIT - BL1_RAM_BASE;
     77 
     78 	/* Initialize the console to provide early debug support */
     79 	console_init(PL011_UART2_BASE, PL011_UART2_CLK_IN_HZ, PL011_BAUDRATE);
     80 
     81 	/*
     82 	 * Enable CCI-400 for this cluster. No need for locks as no other cpu is
     83 	 * active at the moment
     84 	 */
     85 	cci_init(CCI400_BASE,
     86 		 CCI400_SL_IFACE3_CLUSTER_IX,
     87 		 CCI400_SL_IFACE4_CLUSTER_IX);
     88 	cci_enable_cluster_coherency(read_mpidr());
     89 
     90 	/* Allow BL1 to see the whole Trusted RAM */
     91 	bl1_tzram_layout.total_base = TZRAM_BASE;
     92 	bl1_tzram_layout.total_size = TZRAM_SIZE;
     93 
     94 	/* Calculate how much RAM BL1 is using and how much remains free */
     95 	bl1_tzram_layout.free_base = TZRAM_BASE;
     96 	bl1_tzram_layout.free_size = TZRAM_SIZE;
     97 	reserve_mem(&bl1_tzram_layout.free_base,
     98 		    &bl1_tzram_layout.free_size,
     99 		    BL1_RAM_BASE,
    100 		    bl1_size);
    101 
    102 	INFO("BL1: 0x%lx - 0x%lx [size = %u]\n", BL1_RAM_BASE, BL1_RAM_LIMIT,
    103 	     bl1_size);
    104 }
    105 
    106 
    107 /*
    108  * Address of slave 'n' security setting in the NIC-400 address region
    109  * control
    110  * TODO: Ideally this macro should be moved in a "nic-400.h" header file but
    111  * it would be the only thing in there so it's not worth it at the moment.
    112  */
    113 #define NIC400_ADDR_CTRL_SECURITY_REG(n)	(0x8 + (n) * 4)
    114 
    115 static void init_nic400(void)
    116 {
    117 	/*
    118 	 * NIC-400 Access Control Initialization
    119 	 *
    120 	 * Define access privileges by setting each corresponding bit to:
    121 	 *   0 = Secure access only
    122 	 *   1 = Non-secure access allowed
    123 	 */
    124 
    125 	/*
    126 	 * Allow non-secure access to some SOC regions, excluding UART1, which
    127 	 * remains secure.
    128 	 * Note: This is the NIC-400 device on the SOC
    129 	 */
    130 	mmio_write_32(SOC_NIC400_BASE +
    131 		      NIC400_ADDR_CTRL_SECURITY_REG(SOC_NIC400_USB_EHCI), ~0);
    132 	mmio_write_32(SOC_NIC400_BASE +
    133 		      NIC400_ADDR_CTRL_SECURITY_REG(SOC_NIC400_TLX_MASTER), ~0);
    134 	mmio_write_32(SOC_NIC400_BASE +
    135 		      NIC400_ADDR_CTRL_SECURITY_REG(SOC_NIC400_USB_OHCI), ~0);
    136 	mmio_write_32(SOC_NIC400_BASE +
    137 		      NIC400_ADDR_CTRL_SECURITY_REG(SOC_NIC400_PL354_SMC), ~0);
    138 	mmio_write_32(SOC_NIC400_BASE +
    139 		      NIC400_ADDR_CTRL_SECURITY_REG(SOC_NIC400_APB4_BRIDGE), ~0);
    140 	mmio_write_32(SOC_NIC400_BASE +
    141 		      NIC400_ADDR_CTRL_SECURITY_REG(SOC_NIC400_BOOTSEC_BRIDGE),
    142 		      ~SOC_NIC400_BOOTSEC_BRIDGE_UART1);
    143 
    144 	/*
    145 	 * Allow non-secure access to some CSS regions.
    146 	 * Note: This is the NIC-400 device on the CSS
    147 	 */
    148 	mmio_write_32(CSS_NIC400_BASE +
    149 		      NIC400_ADDR_CTRL_SECURITY_REG(CSS_NIC400_SLAVE_BOOTSECURE),
    150 		      ~0);
    151 }
    152 
    153 
    154 #define PCIE_SECURE_REG		0x3000
    155 #define PCIE_SEC_ACCESS_MASK	((1 << 0) | (1 << 1)) /* REG and MEM access bits */
    156 
    157 static void init_pcie(void)
    158 {
    159 	/*
    160 	 * PCIE Root Complex Security settings to enable non-secure
    161 	 * access to config registers.
    162 	 */
    163 	mmio_write_32(PCIE_CONTROL_BASE + PCIE_SECURE_REG, PCIE_SEC_ACCESS_MASK);
    164 }
    165 
    166 
    167 /*******************************************************************************
    168  * Function which will perform any remaining platform-specific setup that can
    169  * occur after the MMU and data cache have been enabled.
    170  ******************************************************************************/
    171 void bl1_platform_setup(void)
    172 {
    173 	init_nic400();
    174 	init_pcie();
    175 
    176 	/* Initialise the IO layer and register platform IO devices */
    177 	io_setup();
    178 
    179 	/* Enable and initialize the System level generic timer */
    180 	mmio_write_32(SYS_CNTCTL_BASE + CNTCR_OFF, CNTCR_FCREQ(0) | CNTCR_EN);
    181 }
    182 
    183 
    184 /*******************************************************************************
    185  * Perform the very early platform specific architecture setup here. At the
    186  * moment this only does basic initialization. Later architectural setup
    187  * (bl1_arch_setup()) does not do anything platform specific.
    188  ******************************************************************************/
    189 void bl1_plat_arch_setup(void)
    190 {
    191 	configure_mmu_el3(bl1_tzram_layout.total_base,
    192 			  bl1_tzram_layout.total_size,
    193 			  TZROM_BASE,
    194 			  TZROM_BASE + TZROM_SIZE
    195 #if USE_COHERENT_MEM
    196 			  , BL1_COHERENT_RAM_BASE,
    197 			  BL1_COHERENT_RAM_LIMIT
    198 #endif
    199 			  );
    200 }
    201 
    202 /*******************************************************************************
    203  * Before calling this function BL2 is loaded in memory and its entrypoint
    204  * is set by load_image. This is a placeholder for the platform to change
    205  * the entrypoint of BL2 and set SPSR and security state.
    206  * On Juno we are only setting the security state, entrypoint
    207  ******************************************************************************/
    208 void bl1_plat_set_bl2_ep_info(image_info_t *bl2_image,
    209 			      entry_point_info_t *bl2_ep)
    210 {
    211 	SET_SECURITY_STATE(bl2_ep->h.attr, SECURE);
    212 	bl2_ep->spsr = SPSR_64(MODE_EL1, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS);
    213 }
    214