blob: a2117f6c1deaafaac8f5adf56dc5c442f600b4a3 [file] [log] [blame]
Nariman Poushin0ece80f2018-02-26 06:52:04 +00001/*
Olivier Deprez21cf3602020-07-30 17:18:33 +02002 * Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved.
Nariman Poushin0ece80f2018-02-26 06:52:04 +00003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
Antonio Nino Diaze0f90632018-12-14 00:18:21 +00007#include <assert.h>
8
9#include <platform_def.h>
10
11#include <common/bl_common.h>
12#include <common/debug.h>
13#include <drivers/arm/ccn.h>
Antonio Nino Diazbd7b7402019-01-25 14:30:04 +000014#include <plat/arm/common/plat_arm.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000015#include <plat/common/platform.h>
Aditya Angadi20b48412019-04-16 11:29:14 +053016#include <drivers/arm/sbsa.h>
17#include <sgi_base_platform_def.h>
Olivier Deprez21cf3602020-07-30 17:18:33 +020018
19#if SPM_MM
Paul Beesley45f40282019-10-15 10:57:42 +000020#include <services/spm_mm_partition.h>
Olivier Deprez21cf3602020-07-30 17:18:33 +020021#endif
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000022
Nariman Poushin0ece80f2018-02-26 06:52:04 +000023#define SGI_MAP_FLASH0_RO MAP_REGION_FLAT(V2M_FLASH0_BASE,\
24 V2M_FLASH0_SIZE, \
25 MT_DEVICE | MT_RO | MT_SECURE)
26/*
27 * Table of regions for different BL stages to map using the MMU.
28 * This doesn't include Trusted RAM as the 'mem_layout' argument passed to
29 * arm_configure_mmu_elx() will give the available subset of that.
30 *
31 * Replace or extend the below regions as required
32 */
33#if IMAGE_BL1
34const mmap_region_t plat_arm_mmap[] = {
35 ARM_MAP_SHARED_RAM,
36 SGI_MAP_FLASH0_RO,
37 CSS_SGI_MAP_DEVICE,
38 SOC_CSS_MAP_DEVICE,
39 {0}
40};
41#endif
42#if IMAGE_BL2
43const mmap_region_t plat_arm_mmap[] = {
44 ARM_MAP_SHARED_RAM,
45 SGI_MAP_FLASH0_RO,
46 CSS_SGI_MAP_DEVICE,
47 SOC_CSS_MAP_DEVICE,
48 ARM_MAP_NS_DRAM1,
49#if ARM_BL31_IN_DRAM
50 ARM_MAP_BL31_SEC_DRAM,
51#endif
Paul Beesleyfe975b42019-09-16 11:29:03 +000052#if SPM_MM
Sughosh Ganue1579e02018-05-16 17:19:56 +053053 ARM_SP_IMAGE_MMAP,
54#endif
Antonio Nino Diaz9b759862018-09-25 11:38:18 +010055#if TRUSTED_BOARD_BOOT && !BL2_AT_EL3
John Tsichritzis0c6ee742018-08-22 12:36:37 +010056 ARM_MAP_BL1_RW,
57#endif
Nariman Poushin0ece80f2018-02-26 06:52:04 +000058 {0}
59};
60#endif
61#if IMAGE_BL31
62const mmap_region_t plat_arm_mmap[] = {
63 ARM_MAP_SHARED_RAM,
64 V2M_MAP_IOFPGA,
65 CSS_SGI_MAP_DEVICE,
66 SOC_CSS_MAP_DEVICE,
Paul Beesleyfe975b42019-09-16 11:29:03 +000067#if SPM_MM
Sughosh Ganue1579e02018-05-16 17:19:56 +053068 ARM_SPM_BUF_EL3_MMAP,
69#endif
Nariman Poushin0ece80f2018-02-26 06:52:04 +000070 {0}
71};
Sughosh Ganue1579e02018-05-16 17:19:56 +053072
Paul Beesleyfe975b42019-09-16 11:29:03 +000073#if SPM_MM && defined(IMAGE_BL31)
Sughosh Ganue1579e02018-05-16 17:19:56 +053074const mmap_region_t plat_arm_secure_partition_mmap[] = {
75 PLAT_ARM_SECURE_MAP_DEVICE,
76 ARM_SP_IMAGE_MMAP,
77 ARM_SP_IMAGE_NS_BUF_MMAP,
Sughosh Ganu70661cf2018-05-16 17:26:40 +053078 ARM_SP_CPER_BUF_MMAP,
Sughosh Ganue1579e02018-05-16 17:19:56 +053079 ARM_SP_IMAGE_RW_MMAP,
80 ARM_SPM_BUF_EL0_MMAP,
81 {0}
82};
Paul Beesleyfe975b42019-09-16 11:29:03 +000083#endif /* SPM_MM && defined(IMAGE_BL31) */
Nariman Poushin0ece80f2018-02-26 06:52:04 +000084#endif
85
86ARM_CASSERT_MMAP
Sughosh Ganue1579e02018-05-16 17:19:56 +053087
Paul Beesleyfe975b42019-09-16 11:29:03 +000088#if SPM_MM && defined(IMAGE_BL31)
Sughosh Ganue1579e02018-05-16 17:19:56 +053089/*
90 * Boot information passed to a secure partition during initialisation. Linear
91 * indices in MP information will be filled at runtime.
92 */
Paul Beesley45f40282019-10-15 10:57:42 +000093static spm_mm_mp_info_t sp_mp_info[] = {
Sughosh Ganue1579e02018-05-16 17:19:56 +053094 [0] = {0x81000000, 0},
95 [1] = {0x81000100, 0},
96 [2] = {0x81000200, 0},
97 [3] = {0x81000300, 0},
98 [4] = {0x81010000, 0},
99 [5] = {0x81010100, 0},
100 [6] = {0x81010200, 0},
101 [7] = {0x81010300, 0},
102};
103
Paul Beesley45f40282019-10-15 10:57:42 +0000104const spm_mm_boot_info_t plat_arm_secure_partition_boot_info = {
Sughosh Ganue1579e02018-05-16 17:19:56 +0530105 .h.type = PARAM_SP_IMAGE_BOOT_INFO,
106 .h.version = VERSION_1,
Paul Beesley45f40282019-10-15 10:57:42 +0000107 .h.size = sizeof(spm_mm_boot_info_t),
Sughosh Ganue1579e02018-05-16 17:19:56 +0530108 .h.attr = 0,
109 .sp_mem_base = ARM_SP_IMAGE_BASE,
110 .sp_mem_limit = ARM_SP_IMAGE_LIMIT,
111 .sp_image_base = ARM_SP_IMAGE_BASE,
112 .sp_stack_base = PLAT_SP_IMAGE_STACK_BASE,
113 .sp_heap_base = ARM_SP_IMAGE_HEAP_BASE,
Ard Biesheuvel8b034fc2018-12-29 19:43:21 +0100114 .sp_ns_comm_buf_base = PLAT_SP_IMAGE_NS_BUF_BASE,
Sughosh Ganue1579e02018-05-16 17:19:56 +0530115 .sp_shared_buf_base = PLAT_SPM_BUF_BASE,
116 .sp_image_size = ARM_SP_IMAGE_SIZE,
117 .sp_pcpu_stack_size = PLAT_SP_IMAGE_STACK_PCPU_SIZE,
118 .sp_heap_size = ARM_SP_IMAGE_HEAP_SIZE,
Ard Biesheuvel8b034fc2018-12-29 19:43:21 +0100119 .sp_ns_comm_buf_size = PLAT_SP_IMAGE_NS_BUF_SIZE,
Sughosh Ganue1579e02018-05-16 17:19:56 +0530120 .sp_shared_buf_size = PLAT_SPM_BUF_SIZE,
121 .num_sp_mem_regions = ARM_SP_IMAGE_NUM_MEM_REGIONS,
122 .num_cpus = PLATFORM_CORE_COUNT,
123 .mp_info = &sp_mp_info[0],
124};
125
126const struct mmap_region *plat_get_secure_partition_mmap(void *cookie)
127{
128 return plat_arm_secure_partition_mmap;
129}
130
Paul Beesley45f40282019-10-15 10:57:42 +0000131const struct spm_mm_boot_info *plat_get_secure_partition_boot_info(
Sughosh Ganue1579e02018-05-16 17:19:56 +0530132 void *cookie)
133{
134 return &plat_arm_secure_partition_boot_info;
135}
Paul Beesleyfe975b42019-09-16 11:29:03 +0000136#endif /* SPM_MM && defined(IMAGE_BL31) */
John Tsichritzis0c6ee742018-08-22 12:36:37 +0100137
Antonio Nino Diaz9b759862018-09-25 11:38:18 +0100138#if TRUSTED_BOARD_BOOT
John Tsichritzis0c6ee742018-08-22 12:36:37 +0100139int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size)
140{
141 assert(heap_addr != NULL);
142 assert(heap_size != NULL);
143
144 return arm_get_mbedtls_heap(heap_addr, heap_size);
145}
146#endif
Aditya Angadi20b48412019-04-16 11:29:14 +0530147
148void plat_arm_secure_wdt_start(void)
149{
150 sbsa_wdog_start(SBSA_SECURE_WDOG_BASE, SBSA_SECURE_WDOG_TIMEOUT);
151}
152
153void plat_arm_secure_wdt_stop(void)
154{
155 sbsa_wdog_stop(SBSA_SECURE_WDOG_BASE);
156}