xref: /arm-trusted-firmware/plat/brcm/common/brcm_common.c (revision 91f16700b400a8c0651d24a598fc48ee2997a0d7)
1*91f16700Schasinglulu /*
2*91f16700Schasinglulu  * Copyright (c) 2019-2020, ARM Limited and Contributors. All rights reserved.
3*91f16700Schasinglulu  *
4*91f16700Schasinglulu  * SPDX-License-Identifier: BSD-3-Clause
5*91f16700Schasinglulu  */
6*91f16700Schasinglulu 
7*91f16700Schasinglulu #include <assert.h>
8*91f16700Schasinglulu 
9*91f16700Schasinglulu #include <arch.h>
10*91f16700Schasinglulu #include <arch_helpers.h>
11*91f16700Schasinglulu #include <common/debug.h>
12*91f16700Schasinglulu #include <plat/common/platform.h>
13*91f16700Schasinglulu 
14*91f16700Schasinglulu #include <plat_brcm.h>
15*91f16700Schasinglulu #include <platform_def.h>
16*91f16700Schasinglulu 
17*91f16700Schasinglulu /* Weak definitions may be overridden in specific BRCM platform */
18*91f16700Schasinglulu #pragma weak plat_get_ns_image_entrypoint
19*91f16700Schasinglulu #pragma weak plat_brcm_get_mmap
20*91f16700Schasinglulu 
21*91f16700Schasinglulu uintptr_t plat_get_ns_image_entrypoint(void)
22*91f16700Schasinglulu {
23*91f16700Schasinglulu #ifdef PRELOADED_BL33_BASE
24*91f16700Schasinglulu 	return PRELOADED_BL33_BASE;
25*91f16700Schasinglulu #else
26*91f16700Schasinglulu 	return PLAT_BRCM_NS_IMAGE_OFFSET;
27*91f16700Schasinglulu #endif
28*91f16700Schasinglulu }
29*91f16700Schasinglulu 
30*91f16700Schasinglulu uint32_t brcm_get_spsr_for_bl32_entry(void)
31*91f16700Schasinglulu {
32*91f16700Schasinglulu 	/*
33*91f16700Schasinglulu 	 * The Secure Payload Dispatcher service is responsible for
34*91f16700Schasinglulu 	 * setting the SPSR prior to entry into the BL32 image.
35*91f16700Schasinglulu 	 */
36*91f16700Schasinglulu 	return 0;
37*91f16700Schasinglulu }
38*91f16700Schasinglulu 
39*91f16700Schasinglulu uint32_t brcm_get_spsr_for_bl33_entry(void)
40*91f16700Schasinglulu {
41*91f16700Schasinglulu 	unsigned int mode;
42*91f16700Schasinglulu 	uint32_t spsr;
43*91f16700Schasinglulu 
44*91f16700Schasinglulu 	/* Figure out what mode we enter the non-secure world in */
45*91f16700Schasinglulu 	mode = el_implemented(2) ? MODE_EL2 : MODE_EL1;
46*91f16700Schasinglulu 
47*91f16700Schasinglulu 	/*
48*91f16700Schasinglulu 	 * TODO: Consider the possibility of specifying the SPSR in
49*91f16700Schasinglulu 	 * the FIP ToC and allowing the platform to have a say as
50*91f16700Schasinglulu 	 * well.
51*91f16700Schasinglulu 	 */
52*91f16700Schasinglulu 	spsr = SPSR_64(mode, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS);
53*91f16700Schasinglulu 	return spsr;
54*91f16700Schasinglulu }
55*91f16700Schasinglulu 
56*91f16700Schasinglulu const mmap_region_t *plat_brcm_get_mmap(void)
57*91f16700Schasinglulu {
58*91f16700Schasinglulu 	return plat_brcm_mmap;
59*91f16700Schasinglulu }
60