blob: ce2c356995b39f16073304b8af6cb177f747530e [file] [log] [blame]
Yatharth Kochar736a3bf2015-10-11 14:14:55 +01001/*
laurenw-arm56f1e3e2021-03-03 14:19:38 -06002 * Copyright (c) 2015-2021, ARM Limited and Contributors. All rights reserved.
Yatharth Kochar736a3bf2015-10-11 14:14:55 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Yatharth Kochar736a3bf2015-10-11 14:14:55 +01005 */
6
7#include <assert.h>
Yatharth Kochar736a3bf2015-10-11 14:14:55 +01008#include <errno.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +00009
Yatharth Kocharf11b29a2016-02-01 11:04:46 +000010#include <platform_def.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000011
12#include <bl1/tbbr/tbbr_img_desc.h>
13#include <common/bl_common.h>
14#include <common/debug.h>
15#include <lib/utils.h>
Antonio Nino Diazbd7b7402019-01-25 14:30:04 +000016#include <plat/arm/common/plat_arm.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000017#include <plat/common/platform.h>
18
laurenw-arm56f1e3e2021-03-03 14:19:38 -060019#pragma weak bl1_plat_get_image_desc
20
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010021/* Struct to keep track of usable memory */
Yatharth Kocharf11b29a2016-02-01 11:04:46 +000022typedef struct bl1_mem_info {
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010023 uintptr_t mem_base;
24 unsigned int mem_size;
25} bl1_mem_info_t;
26
Roberto Vargas52f707f2018-02-12 12:36:17 +000027static bl1_mem_info_t fwu_addr_map_secure[] = {
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010028 {
29 .mem_base = ARM_SHARED_RAM_BASE,
30 .mem_size = ARM_SHARED_RAM_SIZE
31 },
32 {
33 .mem_size = 0
34 }
35};
36
Roberto Vargas52f707f2018-02-12 12:36:17 +000037static bl1_mem_info_t fwu_addr_map_non_secure[] = {
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010038 {
39 .mem_base = ARM_NS_DRAM1_BASE,
40 .mem_size = ARM_NS_DRAM1_SIZE
41 },
42 {
Yatharth Kocharf11b29a2016-02-01 11:04:46 +000043 .mem_base = PLAT_ARM_NVM_BASE,
44 .mem_size = PLAT_ARM_NVM_SIZE
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010045 },
46 {
47 .mem_size = 0
48 }
49};
50
51int bl1_plat_mem_check(uintptr_t mem_base,
52 unsigned int mem_size,
53 unsigned int flags)
54{
55 unsigned int index = 0;
56 bl1_mem_info_t *mmap;
57
58 assert(mem_base);
59 assert(mem_size);
Sandrine Bailleuxb39d75f2016-11-11 16:44:37 +000060 /*
61 * The caller of this function is responsible for checking upfront that
62 * the end address doesn't overflow. We double-check this in debug
63 * builds.
64 */
65 assert(!check_uptr_overflow(mem_base, mem_size - 1));
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010066
67 /*
68 * Check the given image source and size.
69 */
Yatharth Kocharf11b29a2016-02-01 11:04:46 +000070 if (GET_SECURITY_STATE(flags) == SECURE)
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010071 mmap = fwu_addr_map_secure;
72 else
73 mmap = fwu_addr_map_non_secure;
74
75 while (mmap[index].mem_size) {
76 if ((mem_base >= mmap[index].mem_base) &&
77 ((mem_base + mem_size)
78 <= (mmap[index].mem_base +
79 mmap[index].mem_size)))
80 return 0;
81
82 index++;
83 }
84
85 return -ENOMEM;
86}
87
88/*******************************************************************************
89 * This function does linear search for image_id and returns image_desc.
90 ******************************************************************************/
91image_desc_t *bl1_plat_get_image_desc(unsigned int image_id)
92{
93 unsigned int index = 0;
94
95 while (bl1_tbbr_image_descs[index].image_id != INVALID_IMAGE_ID) {
96 if (bl1_tbbr_image_descs[index].image_id == image_id)
97 return &bl1_tbbr_image_descs[index];
98 index++;
99 }
100
101 return NULL;
102}