blob: 6713c5c2845bd1c7a33dbd0cd8dccc24a8f4b480 [file] [log] [blame]
Dan Handleyed6ff952014-05-14 17:44:19 +01001/*
2 * Copyright (c) 2014, ARM Limited and Contributors. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
31#ifndef __PLATFORM_DEF_H__
32#define __PLATFORM_DEF_H__
33
34#include <arch.h>
Dan Handley4fd2f5c2014-08-04 11:41:20 +010035#include "../fvp_def.h"
Dan Handleyed6ff952014-05-14 17:44:19 +010036
37
38/*******************************************************************************
39 * Platform binary types for linking
40 ******************************************************************************/
41#define PLATFORM_LINKER_FORMAT "elf64-littleaarch64"
42#define PLATFORM_LINKER_ARCH aarch64
43
44/*******************************************************************************
45 * Generic platform constants
46 ******************************************************************************/
47
48/* Size of cacheable stacks */
Soby Mathew0b6c7062014-08-04 16:02:05 +010049#if DEBUG_XLAT_TABLE
50#define PLATFORM_STACK_SIZE 0x800
51#elif IMAGE_BL1
Juan Castillo9c25a402015-01-13 12:21:04 +000052#if TRUSTED_BOARD_BOOT
53#define PLATFORM_STACK_SIZE 0x1000
54#else
Soby Mathew0b6c7062014-08-04 16:02:05 +010055#define PLATFORM_STACK_SIZE 0x440
Juan Castillo9c25a402015-01-13 12:21:04 +000056#endif
Soby Mathew0b6c7062014-08-04 16:02:05 +010057#elif IMAGE_BL2
Juan Castillo9c25a402015-01-13 12:21:04 +000058#if TRUSTED_BOARD_BOOT
59#define PLATFORM_STACK_SIZE 0x1000
60#else
Soby Mathew0b6c7062014-08-04 16:02:05 +010061#define PLATFORM_STACK_SIZE 0x400
Juan Castillo9c25a402015-01-13 12:21:04 +000062#endif
Soby Mathew0b6c7062014-08-04 16:02:05 +010063#elif IMAGE_BL31
64#define PLATFORM_STACK_SIZE 0x400
65#elif IMAGE_BL32
66#define PLATFORM_STACK_SIZE 0x440
67#endif
Dan Handleyed6ff952014-05-14 17:44:19 +010068
Dan Handley91b624e2014-07-29 17:14:00 +010069#define FIRMWARE_WELCOME_STR "Booting Trusted Firmware\n"
Dan Handleyed6ff952014-05-14 17:44:19 +010070
71/* Trusted Boot Firmware BL2 */
72#define BL2_IMAGE_NAME "bl2.bin"
73
74/* EL3 Runtime Firmware BL31 */
75#define BL31_IMAGE_NAME "bl31.bin"
76
77/* Secure Payload BL32 (Trusted OS) */
78#define BL32_IMAGE_NAME "bl32.bin"
79
80/* Non-Trusted Firmware BL33 */
81#define BL33_IMAGE_NAME "bl33.bin" /* e.g. UEFI */
82
Juan Castillod227d8b2015-01-07 13:49:59 +000083#if TRUSTED_BOARD_BOOT
84/* Certificates */
85# define BL2_CERT_NAME "bl2.crt"
Juan Castillo9246ab82015-01-28 16:46:57 +000086# define TRUSTED_KEY_CERT_NAME "trusted_key.crt"
87
88# define BL30_KEY_CERT_NAME "bl30_key.crt"
89# define BL31_KEY_CERT_NAME "bl31_key.crt"
90# define BL32_KEY_CERT_NAME "bl32_key.crt"
91# define BL33_KEY_CERT_NAME "bl33_key.crt"
92
93# define BL30_CERT_NAME "bl30.crt"
94# define BL31_CERT_NAME "bl31.crt"
95# define BL32_CERT_NAME "bl32.crt"
96# define BL33_CERT_NAME "bl33.crt"
Juan Castillod227d8b2015-01-07 13:49:59 +000097#endif /* TRUSTED_BOARD_BOOT */
98
Dan Handleyed6ff952014-05-14 17:44:19 +010099#define PLATFORM_CACHE_LINE_SIZE 64
100#define PLATFORM_CLUSTER_COUNT 2ull
101#define PLATFORM_CLUSTER0_CORE_COUNT 4
102#define PLATFORM_CLUSTER1_CORE_COUNT 4
103#define PLATFORM_CORE_COUNT (PLATFORM_CLUSTER1_CORE_COUNT + \
104 PLATFORM_CLUSTER0_CORE_COUNT)
105#define PLATFORM_MAX_CPUS_PER_CLUSTER 4
Andrew Thoelke56f44702014-06-20 00:36:14 +0100106#define PLATFORM_NUM_AFFS (PLATFORM_CLUSTER_COUNT + \
107 PLATFORM_CORE_COUNT)
Soby Mathew2b7de2b2015-02-12 14:45:02 +0000108#define PLATFORM_MAX_AFFLVL MPIDR_AFFLVL1
Dan Handleyed6ff952014-05-14 17:44:19 +0100109#define MAX_IO_DEVICES 3
110#define MAX_IO_HANDLES 4
111
112/*******************************************************************************
Dan Handleyed6ff952014-05-14 17:44:19 +0100113 * BL1 specific defines.
114 * BL1 RW data is relocated from ROM to RAM at runtime so we need 2 sets of
115 * addresses.
116 ******************************************************************************/
Juan Castillo0c70c572014-08-12 13:04:43 +0100117#define BL1_RO_BASE FVP_TRUSTED_ROM_BASE
118#define BL1_RO_LIMIT (FVP_TRUSTED_ROM_BASE \
119 + FVP_TRUSTED_ROM_SIZE)
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100120/*
Juan Castillo42a617d2014-09-24 10:00:06 +0100121 * Put BL1 RW at the top of the Trusted SRAM. BL1_RW_BASE is calculated using
122 * the current BL1 RW debug size plus a little space for growth.
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100123 */
Juan Castillo9c25a402015-01-13 12:21:04 +0000124#if TRUSTED_BOARD_BOOT
125#define BL1_RW_BASE (FVP_TRUSTED_SRAM_BASE \
126 + FVP_TRUSTED_SRAM_SIZE - 0x8000)
127#else
Juan Castillo42a617d2014-09-24 10:00:06 +0100128#define BL1_RW_BASE (FVP_TRUSTED_SRAM_BASE \
129 + FVP_TRUSTED_SRAM_SIZE - 0x6000)
Juan Castillo9c25a402015-01-13 12:21:04 +0000130#endif
Juan Castillo42a617d2014-09-24 10:00:06 +0100131#define BL1_RW_LIMIT (FVP_TRUSTED_SRAM_BASE \
132 + FVP_TRUSTED_SRAM_SIZE)
Dan Handleyed6ff952014-05-14 17:44:19 +0100133
134/*******************************************************************************
135 * BL2 specific defines.
136 ******************************************************************************/
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100137/*
138 * Put BL2 just below BL3-1. BL2_BASE is calculated using the current BL2 debug
139 * size plus a little space for growth.
140 */
Juan Castillo9c25a402015-01-13 12:21:04 +0000141#if TRUSTED_BOARD_BOOT
142#define BL2_BASE (BL31_BASE - 0x1C000)
143#else
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100144#define BL2_BASE (BL31_BASE - 0xC000)
Juan Castillo9c25a402015-01-13 12:21:04 +0000145#endif
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100146#define BL2_LIMIT BL31_BASE
Dan Handleyed6ff952014-05-14 17:44:19 +0100147
148/*******************************************************************************
149 * BL31 specific defines.
150 ******************************************************************************/
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100151/*
Juan Castillo42a617d2014-09-24 10:00:06 +0100152 * Put BL3-1 at the top of the Trusted SRAM. BL31_BASE is calculated using the
153 * current BL3-1 debug size plus a little space for growth.
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100154 */
Juan Castillo42a617d2014-09-24 10:00:06 +0100155#define BL31_BASE (FVP_TRUSTED_SRAM_BASE \
156 + FVP_TRUSTED_SRAM_SIZE - 0x1D000)
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100157#define BL31_PROGBITS_LIMIT BL1_RW_BASE
Juan Castillo42a617d2014-09-24 10:00:06 +0100158#define BL31_LIMIT (FVP_TRUSTED_SRAM_BASE \
159 + FVP_TRUSTED_SRAM_SIZE)
Dan Handleyed6ff952014-05-14 17:44:19 +0100160
161/*******************************************************************************
162 * BL32 specific defines.
163 ******************************************************************************/
164/*
Juan Castilloe33ee5f2014-12-19 09:51:00 +0000165 * On FVP, the TSP can execute from Trusted SRAM, Trusted DRAM or the DRAM
166 * region secured by the TrustZone controller.
Dan Handleyed6ff952014-05-14 17:44:19 +0100167 */
Juan Castilloe33ee5f2014-12-19 09:51:00 +0000168#if FVP_TSP_RAM_LOCATION_ID == FVP_TRUSTED_SRAM_ID
Juan Castillo0c70c572014-08-12 13:04:43 +0100169# define TSP_SEC_MEM_BASE FVP_TRUSTED_SRAM_BASE
170# define TSP_SEC_MEM_SIZE FVP_TRUSTED_SRAM_SIZE
Dan Handley4fd2f5c2014-08-04 11:41:20 +0100171# define TSP_PROGBITS_LIMIT BL2_BASE
Juan Castillo0c70c572014-08-12 13:04:43 +0100172# define BL32_BASE FVP_TRUSTED_SRAM_BASE
Sandrine Bailleuxe2e0c652014-06-16 16:12:27 +0100173# define BL32_LIMIT BL31_BASE
Juan Castilloe33ee5f2014-12-19 09:51:00 +0000174#elif FVP_TSP_RAM_LOCATION_ID == FVP_TRUSTED_DRAM_ID
Juan Castillo0c70c572014-08-12 13:04:43 +0100175# define TSP_SEC_MEM_BASE FVP_TRUSTED_DRAM_BASE
176# define TSP_SEC_MEM_SIZE FVP_TRUSTED_DRAM_SIZE
Juan Castillo42a617d2014-09-24 10:00:06 +0100177# define BL32_BASE FVP_TRUSTED_DRAM_BASE
Juan Castillo0c70c572014-08-12 13:04:43 +0100178# define BL32_LIMIT (FVP_TRUSTED_DRAM_BASE + (1 << 21))
Juan Castilloe33ee5f2014-12-19 09:51:00 +0000179#elif FVP_TSP_RAM_LOCATION_ID == FVP_DRAM_ID
180# define TSP_SEC_MEM_BASE DRAM1_SEC_BASE
181# define TSP_SEC_MEM_SIZE DRAM1_SEC_SIZE
182# define BL32_BASE DRAM1_SEC_BASE
183# define BL32_LIMIT (DRAM1_SEC_BASE + DRAM1_SEC_SIZE)
Dan Handleyed6ff952014-05-14 17:44:19 +0100184#else
Juan Castillo0c70c572014-08-12 13:04:43 +0100185# error "Unsupported FVP_TSP_RAM_LOCATION_ID value"
Dan Handleyed6ff952014-05-14 17:44:19 +0100186#endif
187
Dan Handley4fd2f5c2014-08-04 11:41:20 +0100188/*
189 * ID of the secure physical generic timer interrupt used by the TSP.
190 */
191#define TSP_IRQ_SEC_PHY_TIMER IRQ_SEC_PHY_TIMER
192
Dan Handleyed6ff952014-05-14 17:44:19 +0100193/*******************************************************************************
194 * Platform specific page table and MMU setup constants
195 ******************************************************************************/
196#define ADDR_SPACE_SIZE (1ull << 32)
Juan Castilloe33ee5f2014-12-19 09:51:00 +0000197
198#if IMAGE_BL1
199# define MAX_XLAT_TABLES 2
200#elif IMAGE_BL2
Juan Castillof3e02182014-12-19 09:28:30 +0000201# define MAX_XLAT_TABLES 3
Juan Castilloe33ee5f2014-12-19 09:51:00 +0000202#elif IMAGE_BL31
Juan Castillof3e02182014-12-19 09:28:30 +0000203# define MAX_XLAT_TABLES 2
Juan Castilloe33ee5f2014-12-19 09:51:00 +0000204#elif IMAGE_BL32
205# if FVP_TSP_RAM_LOCATION_ID == FVP_DRAM_ID
206# define MAX_XLAT_TABLES 3
207# else
208# define MAX_XLAT_TABLES 2
209# endif
Juan Castillof3e02182014-12-19 09:28:30 +0000210#endif
Juan Castilloe33ee5f2014-12-19 09:51:00 +0000211
Soby Mathew13ee9682015-01-22 11:22:22 +0000212#define MAX_MMAP_REGIONS (FVP_MMAP_ENTRIES + FVP_BL_REGIONS)
Dan Handleyed6ff952014-05-14 17:44:19 +0100213
214/*******************************************************************************
Dan Handleyed6ff952014-05-14 17:44:19 +0100215 * Declarations and constants to access the mailboxes safely. Each mailbox is
216 * aligned on the biggest cache line size in the platform. This is known only
217 * to the platform as it might have a combination of integrated and external
218 * caches. Such alignment ensures that two maiboxes do not sit on the same cache
219 * line at any cache level. They could belong to different cpus/clusters &
220 * get written while being protected by different locks causing corruption of
221 * a valid mailbox address.
222 ******************************************************************************/
223#define CACHE_WRITEBACK_SHIFT 6
224#define CACHE_WRITEBACK_GRANULE (1 << CACHE_WRITEBACK_SHIFT)
225
Soby Mathew523d6332015-01-08 18:02:19 +0000226#if !USE_COHERENT_MEM
227/*******************************************************************************
228 * Size of the per-cpu data in bytes that should be reserved in the generic
229 * per-cpu data structure for the FVP port.
230 ******************************************************************************/
231#define PLAT_PCPU_DATA_SIZE 2
232#endif
Dan Handleyed6ff952014-05-14 17:44:19 +0100233
234#endif /* __PLATFORM_DEF_H__ */