blob: e12ad56d81e95386c0ee81a9c96f8d6bd6dcd3b4 [file] [log] [blame]
Usama Arifbec5afd2020-04-17 16:13:39 +01001/*
2 * Copyright (c) 2020, ARM Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <assert.h>
8
9#include <platform_def.h>
10
11#include <plat/common/platform.h>
12#include <common/bl_common.h>
13#include <common/debug.h>
14#include <drivers/arm/ccn.h>
15#include <plat/arm/common/plat_arm.h>
16#include <plat/common/platform.h>
17#include <drivers/arm/sbsa.h>
Olivier Deprez21cf3602020-07-30 17:18:33 +020018
19#if SPM_MM
Usama Arifbec5afd2020-04-17 16:13:39 +010020#include <services/spm_mm_partition.h>
Olivier Deprez21cf3602020-07-30 17:18:33 +020021#endif
Usama Arifbec5afd2020-04-17 16:13:39 +010022
23/*
24 * Table of regions for different BL stages to map using the MMU.
25 * This doesn't include Trusted RAM as the 'mem_layout' argument passed to
26 * arm_configure_mmu_elx() will give the available subset of that.
27 */
28#if IMAGE_BL1
29const mmap_region_t plat_arm_mmap[] = {
30 ARM_MAP_SHARED_RAM,
31 TC0_FLASH0_RO,
32 TC0_MAP_DEVICE,
33 {0}
34};
35#endif
36#if IMAGE_BL2
37const mmap_region_t plat_arm_mmap[] = {
38 ARM_MAP_SHARED_RAM,
39 TC0_FLASH0_RO,
40 TC0_MAP_DEVICE,
Arunachalam Ganapathy81da5582020-09-22 12:47:33 +010041 TC0_MAP_NS_DRAM1,
Arunachalam Ganapathyade4a202020-09-22 12:50:45 +010042#if defined(SPD_spmd)
43 TC0_MAP_TZC_DRAM1,
44#endif
Usama Arifbec5afd2020-04-17 16:13:39 +010045#if ARM_BL31_IN_DRAM
46 ARM_MAP_BL31_SEC_DRAM,
47#endif
48#if SPM_MM
49 ARM_SP_IMAGE_MMAP,
50#endif
51#if TRUSTED_BOARD_BOOT && !BL2_AT_EL3
52 ARM_MAP_BL1_RW,
53#endif
54 {0}
55};
56#endif
57#if IMAGE_BL31
58const mmap_region_t plat_arm_mmap[] = {
59 ARM_MAP_SHARED_RAM,
60 V2M_MAP_IOFPGA,
61 TC0_MAP_DEVICE,
62#if SPM_MM
63 ARM_SPM_BUF_EL3_MMAP,
64#endif
65 {0}
66};
67
68#if SPM_MM && defined(IMAGE_BL31)
69const mmap_region_t plat_arm_secure_partition_mmap[] = {
70 PLAT_ARM_SECURE_MAP_DEVICE,
71 ARM_SP_IMAGE_MMAP,
72 ARM_SP_IMAGE_NS_BUF_MMAP,
73 ARM_SP_CPER_BUF_MMAP,
74 ARM_SP_IMAGE_RW_MMAP,
75 ARM_SPM_BUF_EL0_MMAP,
76 {0}
77};
78#endif /* SPM_MM && defined(IMAGE_BL31) */
79#endif
80
81ARM_CASSERT_MMAP
82
83#if SPM_MM && defined(IMAGE_BL31)
84/*
85 * Boot information passed to a secure partition during initialisation. Linear
86 * indices in MP information will be filled at runtime.
87 */
88static spm_mm_mp_info_t sp_mp_info[] = {
89 [0] = {0x81000000, 0},
90 [1] = {0x81000100, 0},
91 [2] = {0x81000200, 0},
92 [3] = {0x81000300, 0},
93 [4] = {0x81010000, 0},
94 [5] = {0x81010100, 0},
95 [6] = {0x81010200, 0},
96 [7] = {0x81010300, 0},
97};
98
99const spm_mm_boot_info_t plat_arm_secure_partition_boot_info = {
100 .h.type = PARAM_SP_IMAGE_BOOT_INFO,
101 .h.version = VERSION_1,
102 .h.size = sizeof(spm_mm_boot_info_t),
103 .h.attr = 0,
104 .sp_mem_base = ARM_SP_IMAGE_BASE,
105 .sp_mem_limit = ARM_SP_IMAGE_LIMIT,
106 .sp_image_base = ARM_SP_IMAGE_BASE,
107 .sp_stack_base = PLAT_SP_IMAGE_STACK_BASE,
108 .sp_heap_base = ARM_SP_IMAGE_HEAP_BASE,
109 .sp_ns_comm_buf_base = PLAT_SP_IMAGE_NS_BUF_BASE,
110 .sp_shared_buf_base = PLAT_SPM_BUF_BASE,
111 .sp_image_size = ARM_SP_IMAGE_SIZE,
112 .sp_pcpu_stack_size = PLAT_SP_IMAGE_STACK_PCPU_SIZE,
113 .sp_heap_size = ARM_SP_IMAGE_HEAP_SIZE,
114 .sp_ns_comm_buf_size = PLAT_SP_IMAGE_NS_BUF_SIZE,
115 .sp_shared_buf_size = PLAT_SPM_BUF_SIZE,
116 .num_sp_mem_regions = ARM_SP_IMAGE_NUM_MEM_REGIONS,
117 .num_cpus = PLATFORM_CORE_COUNT,
118 .mp_info = &sp_mp_info[0],
119};
120
121const struct mmap_region *plat_get_secure_partition_mmap(void *cookie)
122{
123 return plat_arm_secure_partition_mmap;
124}
125
126const struct spm_mm_boot_info *plat_get_secure_partition_boot_info(
127 void *cookie)
128{
129 return &plat_arm_secure_partition_boot_info;
130}
131#endif /* SPM_MM && defined(IMAGE_BL31) */
132
133#if TRUSTED_BOARD_BOOT
134int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size)
135{
136 assert(heap_addr != NULL);
137 assert(heap_size != NULL);
138
139 return arm_get_mbedtls_heap(heap_addr, heap_size);
140}
141#endif
142
143void plat_arm_secure_wdt_start(void)
144{
145 sbsa_wdog_start(SBSA_SECURE_WDOG_BASE, SBSA_SECURE_WDOG_TIMEOUT);
146}
147
148void plat_arm_secure_wdt_stop(void)
149{
150 sbsa_wdog_stop(SBSA_SECURE_WDOG_BASE);
151}