blob: 3b94c425bc6c66e0396002aa0fd978b4b6126dc5 [file] [log] [blame]
Dan Handleyed6ff952014-05-14 17:44:19 +01001/*
2 * Copyright (c) 2014, ARM Limited and Contributors. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
31#ifndef __PLATFORM_DEF_H__
32#define __PLATFORM_DEF_H__
33
34#include <arch.h>
Juan Castillo0c70c572014-08-12 13:04:43 +010035#include <../fvp_def.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010036
37
38/*******************************************************************************
39 * Platform binary types for linking
40 ******************************************************************************/
41#define PLATFORM_LINKER_FORMAT "elf64-littleaarch64"
42#define PLATFORM_LINKER_ARCH aarch64
43
44/*******************************************************************************
45 * Generic platform constants
46 ******************************************************************************/
47
48/* Size of cacheable stacks */
49#define PLATFORM_STACK_SIZE 0x800
50
Dan Handleyed6ff952014-05-14 17:44:19 +010051#define FIRMWARE_WELCOME_STR "Booting trusted firmware boot loader stage 1\n\r"
52
53/* Trusted Boot Firmware BL2 */
54#define BL2_IMAGE_NAME "bl2.bin"
55
56/* EL3 Runtime Firmware BL31 */
57#define BL31_IMAGE_NAME "bl31.bin"
58
59/* Secure Payload BL32 (Trusted OS) */
60#define BL32_IMAGE_NAME "bl32.bin"
61
62/* Non-Trusted Firmware BL33 */
63#define BL33_IMAGE_NAME "bl33.bin" /* e.g. UEFI */
64
65#define PLATFORM_CACHE_LINE_SIZE 64
66#define PLATFORM_CLUSTER_COUNT 2ull
67#define PLATFORM_CLUSTER0_CORE_COUNT 4
68#define PLATFORM_CLUSTER1_CORE_COUNT 4
69#define PLATFORM_CORE_COUNT (PLATFORM_CLUSTER1_CORE_COUNT + \
70 PLATFORM_CLUSTER0_CORE_COUNT)
71#define PLATFORM_MAX_CPUS_PER_CLUSTER 4
Andrew Thoelke56f44702014-06-20 00:36:14 +010072#define PLATFORM_NUM_AFFS (PLATFORM_CLUSTER_COUNT + \
73 PLATFORM_CORE_COUNT)
Dan Handleyed6ff952014-05-14 17:44:19 +010074#define MAX_IO_DEVICES 3
75#define MAX_IO_HANDLES 4
76
77/*******************************************************************************
Dan Handleyed6ff952014-05-14 17:44:19 +010078 * BL1 specific defines.
79 * BL1 RW data is relocated from ROM to RAM at runtime so we need 2 sets of
80 * addresses.
81 ******************************************************************************/
Juan Castillo0c70c572014-08-12 13:04:43 +010082#define BL1_RO_BASE FVP_TRUSTED_ROM_BASE
83#define BL1_RO_LIMIT (FVP_TRUSTED_ROM_BASE \
84 + FVP_TRUSTED_ROM_SIZE)
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +010085/*
86 * Put BL1 RW at the top of the Trusted SRAM. BL1_RW_BASE is calculated using
87 * the current BL1 RW debug size plus a little space for growth.
88 */
Juan Castillo0c70c572014-08-12 13:04:43 +010089#define BL1_RW_BASE (FVP_TRUSTED_SRAM_BASE + \
90 FVP_TRUSTED_SRAM_SIZE - \
91 0x6000)
92#define BL1_RW_LIMIT (FVP_TRUSTED_SRAM_BASE + \
93 FVP_TRUSTED_SRAM_SIZE)
Dan Handleyed6ff952014-05-14 17:44:19 +010094
95/*******************************************************************************
96 * BL2 specific defines.
97 ******************************************************************************/
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +010098/*
99 * Put BL2 just below BL3-1. BL2_BASE is calculated using the current BL2 debug
100 * size plus a little space for growth.
101 */
102#define BL2_BASE (BL31_BASE - 0xC000)
103#define BL2_LIMIT BL31_BASE
Dan Handleyed6ff952014-05-14 17:44:19 +0100104
105/*******************************************************************************
106 * BL31 specific defines.
107 ******************************************************************************/
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100108/*
109 * Put BL3-1 at the top of the Trusted SRAM. BL31_BASE is calculated using the
110 * current BL3-1 debug size plus a little space for growth.
111 */
Juan Castillo0c70c572014-08-12 13:04:43 +0100112#define BL31_BASE (FVP_TRUSTED_SRAM_BASE + \
113 FVP_TRUSTED_SRAM_SIZE - \
114 0x1D000)
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100115#define BL31_PROGBITS_LIMIT BL1_RW_BASE
Juan Castillo0c70c572014-08-12 13:04:43 +0100116#define BL31_LIMIT (FVP_TRUSTED_SRAM_BASE + \
117 FVP_TRUSTED_SRAM_SIZE)
Dan Handleyed6ff952014-05-14 17:44:19 +0100118
119/*******************************************************************************
120 * BL32 specific defines.
121 ******************************************************************************/
122/*
123 * On FVP, the TSP can execute either from Trusted SRAM or Trusted DRAM.
124 */
Juan Castillo0c70c572014-08-12 13:04:43 +0100125#if FVP_TSP_RAM_LOCATION_ID == FVP_IN_TRUSTED_SRAM
126# define TSP_SEC_MEM_BASE FVP_TRUSTED_SRAM_BASE
127# define TSP_SEC_MEM_SIZE FVP_TRUSTED_SRAM_SIZE
128# define BL32_BASE FVP_TRUSTED_SRAM_BASE
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100129# define BL32_PROGBITS_LIMIT BL2_BASE
130# define BL32_LIMIT BL31_BASE
Juan Castillo0c70c572014-08-12 13:04:43 +0100131#elif FVP_TSP_RAM_LOCATION_ID == FVP_IN_TRUSTED_DRAM
132# define TSP_SEC_MEM_BASE FVP_TRUSTED_DRAM_BASE
133# define TSP_SEC_MEM_SIZE FVP_TRUSTED_DRAM_SIZE
134# define BL32_BASE (FVP_TRUSTED_DRAM_BASE + 0x2000)
135# define BL32_LIMIT (FVP_TRUSTED_DRAM_BASE + (1 << 21))
Dan Handleyed6ff952014-05-14 17:44:19 +0100136#else
Juan Castillo0c70c572014-08-12 13:04:43 +0100137# error "Unsupported FVP_TSP_RAM_LOCATION_ID value"
Dan Handleyed6ff952014-05-14 17:44:19 +0100138#endif
139
140/*******************************************************************************
141 * Platform specific page table and MMU setup constants
142 ******************************************************************************/
143#define ADDR_SPACE_SIZE (1ull << 32)
Andrew Thoelke30b04fc2014-06-20 12:23:20 +0100144#define MAX_XLAT_TABLES 2
Dan Handleyed6ff952014-05-14 17:44:19 +0100145#define MAX_MMAP_REGIONS 16
146
147/*******************************************************************************
148 * ID of the secure physical generic timer interrupt.
149 ******************************************************************************/
150#define IRQ_SEC_PHY_TIMER 29
151
152/*******************************************************************************
153 * CCI-400 related constants
154 ******************************************************************************/
155#define CCI400_BASE 0x2c090000
156#define CCI400_SL_IFACE_CLUSTER0 3
157#define CCI400_SL_IFACE_CLUSTER1 4
158#define CCI400_SL_IFACE_INDEX(mpidr) (mpidr & MPIDR_CLUSTER_MASK ? \
159 CCI400_SL_IFACE_CLUSTER1 : \
160 CCI400_SL_IFACE_CLUSTER0)
161
162
163/*******************************************************************************
164 * Declarations and constants to access the mailboxes safely. Each mailbox is
165 * aligned on the biggest cache line size in the platform. This is known only
166 * to the platform as it might have a combination of integrated and external
167 * caches. Such alignment ensures that two maiboxes do not sit on the same cache
168 * line at any cache level. They could belong to different cpus/clusters &
169 * get written while being protected by different locks causing corruption of
170 * a valid mailbox address.
171 ******************************************************************************/
172#define CACHE_WRITEBACK_SHIFT 6
173#define CACHE_WRITEBACK_GRANULE (1 << CACHE_WRITEBACK_SHIFT)
174
175
176#endif /* __PLATFORM_DEF_H__ */