blob: e0138acbb4cb858080b2a551cc839c2a830f81e3 [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Madhukar Pappireddyf4e6ea62020-01-27 15:32:15 -06002 * Copyright (c) 2013-2020, ARM Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Achin Gupta4f6ad662013-10-25 09:08:21 +01005 */
6
Dan Handleyed6ff952014-05-14 17:44:19 +01007#include <platform_def.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +00008
Masahiro Yamada0b67e562020-03-09 17:39:48 +09009#include <common/bl_common.ld.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000010#include <lib/xlat_tables/xlat_tables_defs.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010011
12OUTPUT_FORMAT(PLATFORM_LINKER_FORMAT)
13OUTPUT_ARCH(PLATFORM_LINKER_ARCH)
Jeenu Viswambharan2a30a752014-03-11 11:06:45 +000014ENTRY(bl31_entrypoint)
Achin Gupta4f6ad662013-10-25 09:08:21 +010015
16
17MEMORY {
Juan Castillofd8c0772014-09-16 10:40:35 +010018 RAM (rwx): ORIGIN = BL31_BASE, LENGTH = BL31_LIMIT - BL31_BASE
Samuel Holland31a14e12018-10-17 21:40:18 -050019#if SEPARATE_NOBITS_REGION
20 NOBITS (rw!a): ORIGIN = BL31_NOBITS_BASE, LENGTH = BL31_NOBITS_LIMIT - BL31_NOBITS_BASE
21#else
22#define NOBITS RAM
23#endif
Achin Gupta4f6ad662013-10-25 09:08:21 +010024}
25
Caesar Wangd90f43e2016-10-11 09:36:00 +080026#ifdef PLAT_EXTRA_LD_SCRIPT
27#include <plat.ld.S>
28#endif
Achin Gupta4f6ad662013-10-25 09:08:21 +010029
30SECTIONS
31{
Sandrine Bailleux8d69a032013-11-27 09:38:52 +000032 . = BL31_BASE;
Antonio Nino Diaz2ce2b092017-11-15 11:45:35 +000033 ASSERT(. == ALIGN(PAGE_SIZE),
Sandrine Bailleux8d69a032013-11-27 09:38:52 +000034 "BL31_BASE address is not aligned on a page boundary.")
Achin Gupta4f6ad662013-10-25 09:08:21 +010035
Soby Mathew4e28c202018-10-14 08:09:22 +010036 __BL31_START__ = .;
37
Sandrine Bailleuxf91f1442016-07-08 14:37:40 +010038#if SEPARATE_CODE_AND_RODATA
39 .text . : {
40 __TEXT_START__ = .;
41 *bl31_entrypoint.o(.text*)
Samuel Holland23f5e542019-10-20 16:11:25 -050042 *(SORT_BY_ALIGNMENT(.text*))
Sandrine Bailleuxf91f1442016-07-08 14:37:40 +010043 *(.vectors)
Roberto Vargasd93fde32018-04-11 11:53:31 +010044 . = ALIGN(PAGE_SIZE);
Sandrine Bailleuxf91f1442016-07-08 14:37:40 +010045 __TEXT_END__ = .;
46 } >RAM
47
48 .rodata . : {
49 __RODATA_START__ = .;
Samuel Holland23f5e542019-10-20 16:11:25 -050050 *(SORT_BY_ALIGNMENT(.rodata*))
Sandrine Bailleuxf91f1442016-07-08 14:37:40 +010051
52 /* Ensure 8-byte alignment for descriptors and ensure inclusion */
53 . = ALIGN(8);
54 __RT_SVC_DESCS_START__ = .;
55 KEEP(*(rt_svc_descs))
56 __RT_SVC_DESCS_END__ = .;
57
58#if ENABLE_PMF
59 /* Ensure 8-byte alignment for descriptors and ensure inclusion */
60 . = ALIGN(8);
61 __PMF_SVC_DESCS_START__ = .;
62 KEEP(*(pmf_svc_descs))
63 __PMF_SVC_DESCS_END__ = .;
64#endif /* ENABLE_PMF */
65
66 /*
67 * Ensure 8-byte alignment for cpu_ops so that its fields are also
68 * aligned. Also ensure cpu_ops inclusion.
69 */
70 . = ALIGN(8);
71 __CPU_OPS_START__ = .;
72 KEEP(*(cpu_ops))
73 __CPU_OPS_END__ = .;
74
Soby Mathew4e28c202018-10-14 08:09:22 +010075 /*
Soby Mathew2b3fc1d2018-12-12 14:33:11 +000076 * Keep the .got section in the RO section as it is patched
Soby Mathew4e28c202018-10-14 08:09:22 +010077 * prior to enabling the MMU and having the .got in RO is better for
Soby Mathew2b3fc1d2018-12-12 14:33:11 +000078 * security. GOT is a table of addresses so ensure 8-byte alignment.
Soby Mathew4e28c202018-10-14 08:09:22 +010079 */
Soby Mathew2b3fc1d2018-12-12 14:33:11 +000080 . = ALIGN(8);
Soby Mathew4e28c202018-10-14 08:09:22 +010081 __GOT_START__ = .;
82 *(.got)
83 __GOT_END__ = .;
84
Jeenu Viswambharane3f22002017-09-22 08:32:10 +010085 /* Place pubsub sections for events */
86 . = ALIGN(8);
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000087#include <lib/el3_runtime/pubsub_events.h>
Jeenu Viswambharane3f22002017-09-22 08:32:10 +010088
Roberto Vargasd93fde32018-04-11 11:53:31 +010089 . = ALIGN(PAGE_SIZE);
Sandrine Bailleuxf91f1442016-07-08 14:37:40 +010090 __RODATA_END__ = .;
91 } >RAM
92#else
Sandrine Bailleux8d69a032013-11-27 09:38:52 +000093 ro . : {
94 __RO_START__ = .;
Andrew Thoelkee01ea342014-03-18 07:13:52 +000095 *bl31_entrypoint.o(.text*)
Samuel Holland23f5e542019-10-20 16:11:25 -050096 *(SORT_BY_ALIGNMENT(.text*))
97 *(SORT_BY_ALIGNMENT(.rodata*))
Achin Gupta7421b462014-02-01 18:53:26 +000098
Andrew Thoelkee01ea342014-03-18 07:13:52 +000099 /* Ensure 8-byte alignment for descriptors and ensure inclusion */
Achin Gupta7421b462014-02-01 18:53:26 +0000100 . = ALIGN(8);
101 __RT_SVC_DESCS_START__ = .;
Andrew Thoelkee01ea342014-03-18 07:13:52 +0000102 KEEP(*(rt_svc_descs))
Achin Gupta7421b462014-02-01 18:53:26 +0000103 __RT_SVC_DESCS_END__ = .;
104
Yatharth Kochar9518d022016-03-11 14:20:19 +0000105#if ENABLE_PMF
106 /* Ensure 8-byte alignment for descriptors and ensure inclusion */
107 . = ALIGN(8);
108 __PMF_SVC_DESCS_START__ = .;
109 KEEP(*(pmf_svc_descs))
110 __PMF_SVC_DESCS_END__ = .;
111#endif /* ENABLE_PMF */
112
Soby Mathewc704cbc2014-08-14 11:33:56 +0100113 /*
114 * Ensure 8-byte alignment for cpu_ops so that its fields are also
115 * aligned. Also ensure cpu_ops inclusion.
116 */
117 . = ALIGN(8);
118 __CPU_OPS_START__ = .;
119 KEEP(*(cpu_ops))
120 __CPU_OPS_END__ = .;
121
Soby Mathew2b3fc1d2018-12-12 14:33:11 +0000122 /*
123 * Keep the .got section in the RO section as it is patched
124 * prior to enabling the MMU and having the .got in RO is better for
125 * security. GOT is a table of addresses so ensure 8-byte alignment.
126 */
127 . = ALIGN(8);
128 __GOT_START__ = .;
129 *(.got)
130 __GOT_END__ = .;
131
Jeenu Viswambharane3f22002017-09-22 08:32:10 +0100132 /* Place pubsub sections for events */
133 . = ALIGN(8);
Antonio Nino Diaze0f90632018-12-14 00:18:21 +0000134#include <lib/el3_runtime/pubsub_events.h>
Jeenu Viswambharane3f22002017-09-22 08:32:10 +0100135
Achin Guptab739f222014-01-18 16:50:09 +0000136 *(.vectors)
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000137 __RO_END_UNALIGNED__ = .;
138 /*
139 * Memory page(s) mapped to this section will be marked as read-only,
140 * executable. No RW data from the next section must creep in.
141 * Ensure the rest of the current memory page is unused.
142 */
Roberto Vargasd93fde32018-04-11 11:53:31 +0100143 . = ALIGN(PAGE_SIZE);
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000144 __RO_END__ = .;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100145 } >RAM
Sandrine Bailleuxf91f1442016-07-08 14:37:40 +0100146#endif
Achin Gupta4f6ad662013-10-25 09:08:21 +0100147
Soby Mathewc704cbc2014-08-14 11:33:56 +0100148 ASSERT(__CPU_OPS_END__ > __CPU_OPS_START__,
149 "cpu_ops not defined for this platform.")
150
Paul Beesleydb4e25a2019-10-14 15:27:12 +0000151#if SPM_MM
Ard Biesheuvel447d56f2019-01-06 10:07:24 +0100152#ifndef SPM_SHIM_EXCEPTIONS_VMA
153#define SPM_SHIM_EXCEPTIONS_VMA RAM
154#endif
155
Antonio Nino Diazc41f2062017-10-24 10:07:35 +0100156 /*
157 * Exception vectors of the SPM shim layer. They must be aligned to a 2K
158 * address, but we need to place them in a separate page so that we can set
159 * individual permissions to them, so the actual alignment needed is 4K.
160 *
161 * There's no need to include this into the RO section of BL31 because it
162 * doesn't need to be accessed by BL31.
163 */
Antonio Nino Diaz2ce2b092017-11-15 11:45:35 +0000164 spm_shim_exceptions : ALIGN(PAGE_SIZE) {
Antonio Nino Diazc41f2062017-10-24 10:07:35 +0100165 __SPM_SHIM_EXCEPTIONS_START__ = .;
166 *(.spm_shim_exceptions)
Roberto Vargasd93fde32018-04-11 11:53:31 +0100167 . = ALIGN(PAGE_SIZE);
Antonio Nino Diazc41f2062017-10-24 10:07:35 +0100168 __SPM_SHIM_EXCEPTIONS_END__ = .;
Ard Biesheuvel447d56f2019-01-06 10:07:24 +0100169 } >SPM_SHIM_EXCEPTIONS_VMA AT>RAM
170
171 PROVIDE(__SPM_SHIM_EXCEPTIONS_LMA__ = LOADADDR(spm_shim_exceptions));
172 . = LOADADDR(spm_shim_exceptions) + SIZEOF(spm_shim_exceptions);
Antonio Nino Diazc41f2062017-10-24 10:07:35 +0100173#endif
174
Achin Guptae9c4a642015-09-11 16:03:13 +0100175 /*
176 * Define a linker symbol to mark start of the RW memory area for this
177 * image.
178 */
179 __RW_START__ = . ;
180
Douglas Raillard306593d2017-02-24 18:14:15 +0000181 /*
182 * .data must be placed at a lower address than the stacks if the stack
183 * protector is enabled. Alternatively, the .data.stack_protector_canary
184 * section can be placed independently of the main .data section.
185 */
186 .data . : {
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000187 __DATA_START__ = .;
Samuel Holland23f5e542019-10-20 16:11:25 -0500188 *(SORT_BY_ALIGNMENT(.data*))
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000189 __DATA_END__ = .;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100190 } >RAM
191
Soby Mathew4e28c202018-10-14 08:09:22 +0100192 /*
193 * .rela.dyn needs to come after .data for the read-elf utility to parse
Soby Mathew2b3fc1d2018-12-12 14:33:11 +0000194 * this section correctly. Ensure 8-byte alignment so that the fields of
195 * RELA data structure are aligned.
Soby Mathew4e28c202018-10-14 08:09:22 +0100196 */
Soby Mathew2b3fc1d2018-12-12 14:33:11 +0000197 . = ALIGN(8);
Soby Mathew4e28c202018-10-14 08:09:22 +0100198 __RELA_START__ = .;
199 .rela.dyn . : {
200 } >RAM
201 __RELA_END__ = .;
202
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100203#ifdef BL31_PROGBITS_LIMIT
Juan Castillo7d199412015-12-14 09:35:25 +0000204 ASSERT(. <= BL31_PROGBITS_LIMIT, "BL31 progbits has exceeded its limit.")
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100205#endif
206
Samuel Holland31a14e12018-10-17 21:40:18 -0500207#if SEPARATE_NOBITS_REGION
208 /*
209 * Define a linker symbol to mark end of the RW memory area for this
210 * image.
211 */
Madhukar Pappireddyf4e6ea62020-01-27 15:32:15 -0600212 . = ALIGN(PAGE_SIZE);
Samuel Holland31a14e12018-10-17 21:40:18 -0500213 __RW_END__ = .;
214 __BL31_END__ = .;
215
216 ASSERT(. <= BL31_LIMIT, "BL31 image has exceeded its limit.")
217
218 . = BL31_NOBITS_BASE;
219 ASSERT(. == ALIGN(PAGE_SIZE),
220 "BL31 NOBITS base address is not aligned on a page boundary.")
221
222 __NOBITS_START__ = .;
223#endif
224
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000225 stacks (NOLOAD) : {
226 __STACKS_START__ = .;
227 *(tzfw_normal_stacks)
228 __STACKS_END__ = .;
Samuel Holland31a14e12018-10-17 21:40:18 -0500229 } >NOBITS
Achin Gupta4f6ad662013-10-25 09:08:21 +0100230
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000231 /*
232 * The .bss section gets initialised to 0 at runtime.
Douglas Raillard21362a92016-12-02 13:51:54 +0000233 * Its base address should be 16-byte aligned for better performance of the
234 * zero-initialization code.
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000235 */
Andrew Thoelkee466c9f2015-09-10 11:39:36 +0100236 .bss (NOLOAD) : ALIGN(16) {
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000237 __BSS_START__ = .;
Samuel Holland23f5e542019-10-20 16:11:25 -0500238 *(SORT_BY_ALIGNMENT(.bss*))
Achin Gupta4f6ad662013-10-25 09:08:21 +0100239 *(COMMON)
Andrew Thoelkee466c9f2015-09-10 11:39:36 +0100240#if !USE_COHERENT_MEM
241 /*
242 * Bakery locks are stored in normal .bss memory
243 *
244 * Each lock's data is spread across multiple cache lines, one per CPU,
245 * but multiple locks can share the same cache line.
246 * The compiler will allocate enough memory for one CPU's bakery locks,
247 * the remaining cache lines are allocated by the linker script
248 */
249 . = ALIGN(CACHE_WRITEBACK_GRANULE);
250 __BAKERY_LOCK_START__ = .;
Varun Wadekar77c382c2019-01-30 08:26:20 -0800251 __PERCPU_BAKERY_LOCK_START__ = .;
Andrew Thoelkee466c9f2015-09-10 11:39:36 +0100252 *(bakery_lock)
253 . = ALIGN(CACHE_WRITEBACK_GRANULE);
Varun Wadekar77c382c2019-01-30 08:26:20 -0800254 __PERCPU_BAKERY_LOCK_END__ = .;
255 __PERCPU_BAKERY_LOCK_SIZE__ = ABSOLUTE(__PERCPU_BAKERY_LOCK_END__ - __PERCPU_BAKERY_LOCK_START__);
Andrew Thoelkee466c9f2015-09-10 11:39:36 +0100256 . = . + (__PERCPU_BAKERY_LOCK_SIZE__ * (PLATFORM_CORE_COUNT - 1));
257 __BAKERY_LOCK_END__ = .;
Roberto Vargas00996942017-11-13 13:41:58 +0000258
259 /*
260 * If BL31 doesn't use any bakery lock then __PERCPU_BAKERY_LOCK_SIZE__
261 * will be zero. For this reason, the only two valid values for
262 * __PERCPU_BAKERY_LOCK_SIZE__ are 0 or the platform defined value
263 * PLAT_PERCPU_BAKERY_LOCK_SIZE.
264 */
Andrew Thoelkee466c9f2015-09-10 11:39:36 +0100265#ifdef PLAT_PERCPU_BAKERY_LOCK_SIZE
Roberto Vargas00996942017-11-13 13:41:58 +0000266 ASSERT((__PERCPU_BAKERY_LOCK_SIZE__ == 0) || (__PERCPU_BAKERY_LOCK_SIZE__ == PLAT_PERCPU_BAKERY_LOCK_SIZE),
Andrew Thoelkee466c9f2015-09-10 11:39:36 +0100267 "PLAT_PERCPU_BAKERY_LOCK_SIZE does not match bakery lock requirements");
268#endif
269#endif
Yatharth Kochar9518d022016-03-11 14:20:19 +0000270
271#if ENABLE_PMF
272 /*
273 * Time-stamps are stored in normal .bss memory
274 *
275 * The compiler will allocate enough memory for one CPU's time-stamps,
Paul Beesley1fbc97b2019-01-11 18:26:51 +0000276 * the remaining memory for other CPUs is allocated by the
Yatharth Kochar9518d022016-03-11 14:20:19 +0000277 * linker script
278 */
279 . = ALIGN(CACHE_WRITEBACK_GRANULE);
280 __PMF_TIMESTAMP_START__ = .;
281 KEEP(*(pmf_timestamp_array))
282 . = ALIGN(CACHE_WRITEBACK_GRANULE);
283 __PMF_PERCPU_TIMESTAMP_END__ = .;
284 __PERCPU_TIMESTAMP_SIZE__ = ABSOLUTE(. - __PMF_TIMESTAMP_START__);
285 . = . + (__PERCPU_TIMESTAMP_SIZE__ * (PLATFORM_CORE_COUNT - 1));
286 __PMF_TIMESTAMP_END__ = .;
287#endif /* ENABLE_PMF */
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000288 __BSS_END__ = .;
Samuel Holland31a14e12018-10-17 21:40:18 -0500289 } >NOBITS
Achin Gupta4f6ad662013-10-25 09:08:21 +0100290
Masahiro Yamada0b67e562020-03-09 17:39:48 +0900291 XLAT_TABLE_SECTION >NOBITS
Achin Guptaa0cd9892014-02-09 13:30:38 +0000292
Soby Mathew2ae20432015-01-08 18:02:44 +0000293#if USE_COHERENT_MEM
Achin Guptaa0cd9892014-02-09 13:30:38 +0000294 /*
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000295 * The base address of the coherent memory section must be page-aligned (4K)
296 * to guarantee that the coherent data are stored on their own pages and
297 * are not mixed with normal data. This is required to set up the correct
298 * memory attributes for the coherent data page tables.
299 */
Antonio Nino Diaz2ce2b092017-11-15 11:45:35 +0000300 coherent_ram (NOLOAD) : ALIGN(PAGE_SIZE) {
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000301 __COHERENT_RAM_START__ = .;
Andrew Thoelkee466c9f2015-09-10 11:39:36 +0100302 /*
303 * Bakery locks are stored in coherent memory
304 *
305 * Each lock's data is contiguous and fully allocated by the compiler
306 */
307 *(bakery_lock)
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000308 *(tzfw_coherent_mem)
309 __COHERENT_RAM_END_UNALIGNED__ = .;
310 /*
311 * Memory page(s) mapped to this section will be marked
312 * as device memory. No other unexpected data must creep in.
313 * Ensure the rest of the current memory page is unused.
314 */
Roberto Vargasd93fde32018-04-11 11:53:31 +0100315 . = ALIGN(PAGE_SIZE);
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000316 __COHERENT_RAM_END__ = .;
Samuel Holland31a14e12018-10-17 21:40:18 -0500317 } >NOBITS
Soby Mathew2ae20432015-01-08 18:02:44 +0000318#endif
Achin Gupta4f6ad662013-10-25 09:08:21 +0100319
Samuel Holland31a14e12018-10-17 21:40:18 -0500320#if SEPARATE_NOBITS_REGION
321 /*
322 * Define a linker symbol to mark end of the NOBITS memory area for this
323 * image.
324 */
325 __NOBITS_END__ = .;
326
327 ASSERT(. <= BL31_NOBITS_LIMIT, "BL31 NOBITS region has exceeded its limit.")
328#else
Achin Guptae9c4a642015-09-11 16:03:13 +0100329 /*
330 * Define a linker symbol to mark end of the RW memory area for this
331 * image.
332 */
333 __RW_END__ = .;
Sandrine Bailleux8d69a032013-11-27 09:38:52 +0000334 __BL31_END__ = .;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100335
Masahiro Yamadad3e7baa2020-01-17 13:44:50 +0900336 /DISCARD/ : {
337 *(.dynsym .dynstr .hash .gnu.hash)
338 }
339
Juan Castillo7d199412015-12-14 09:35:25 +0000340 ASSERT(. <= BL31_LIMIT, "BL31 image has exceeded its limit.")
Samuel Holland31a14e12018-10-17 21:40:18 -0500341#endif
Achin Gupta4f6ad662013-10-25 09:08:21 +0100342}