blob: 124c1af53138665137fe49c0661080dc97d73739 [file] [log] [blame]
Yatharth Kochar736a3bf2015-10-11 14:14:55 +01001/*
Roberto Vargas52f707f2018-02-12 12:36:17 +00002 * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved.
Yatharth Kochar736a3bf2015-10-11 14:14:55 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Yatharth Kochar736a3bf2015-10-11 14:14:55 +01005 */
6
7#include <assert.h>
Yatharth Kochar736a3bf2015-10-11 14:14:55 +01008#include <errno.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +00009
Yatharth Kocharf11b29a2016-02-01 11:04:46 +000010#include <platform_def.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000011
12#include <bl1/tbbr/tbbr_img_desc.h>
13#include <common/bl_common.h>
14#include <common/debug.h>
15#include <lib/utils.h>
Antonio Nino Diazbd7b7402019-01-25 14:30:04 +000016#include <plat/arm/common/plat_arm.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000017#include <plat/common/platform.h>
18
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010019/* Struct to keep track of usable memory */
Yatharth Kocharf11b29a2016-02-01 11:04:46 +000020typedef struct bl1_mem_info {
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010021 uintptr_t mem_base;
22 unsigned int mem_size;
23} bl1_mem_info_t;
24
Roberto Vargas52f707f2018-02-12 12:36:17 +000025static bl1_mem_info_t fwu_addr_map_secure[] = {
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010026 {
27 .mem_base = ARM_SHARED_RAM_BASE,
28 .mem_size = ARM_SHARED_RAM_SIZE
29 },
30 {
31 .mem_size = 0
32 }
33};
34
Roberto Vargas52f707f2018-02-12 12:36:17 +000035static bl1_mem_info_t fwu_addr_map_non_secure[] = {
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010036 {
37 .mem_base = ARM_NS_DRAM1_BASE,
38 .mem_size = ARM_NS_DRAM1_SIZE
39 },
40 {
Yatharth Kocharf11b29a2016-02-01 11:04:46 +000041 .mem_base = PLAT_ARM_NVM_BASE,
42 .mem_size = PLAT_ARM_NVM_SIZE
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010043 },
44 {
45 .mem_size = 0
46 }
47};
48
49int bl1_plat_mem_check(uintptr_t mem_base,
50 unsigned int mem_size,
51 unsigned int flags)
52{
53 unsigned int index = 0;
54 bl1_mem_info_t *mmap;
55
56 assert(mem_base);
57 assert(mem_size);
Sandrine Bailleuxb39d75f2016-11-11 16:44:37 +000058 /*
59 * The caller of this function is responsible for checking upfront that
60 * the end address doesn't overflow. We double-check this in debug
61 * builds.
62 */
63 assert(!check_uptr_overflow(mem_base, mem_size - 1));
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010064
65 /*
66 * Check the given image source and size.
67 */
Yatharth Kocharf11b29a2016-02-01 11:04:46 +000068 if (GET_SECURITY_STATE(flags) == SECURE)
Yatharth Kochar736a3bf2015-10-11 14:14:55 +010069 mmap = fwu_addr_map_secure;
70 else
71 mmap = fwu_addr_map_non_secure;
72
73 while (mmap[index].mem_size) {
74 if ((mem_base >= mmap[index].mem_base) &&
75 ((mem_base + mem_size)
76 <= (mmap[index].mem_base +
77 mmap[index].mem_size)))
78 return 0;
79
80 index++;
81 }
82
83 return -ENOMEM;
84}
85
86/*******************************************************************************
87 * This function does linear search for image_id and returns image_desc.
88 ******************************************************************************/
89image_desc_t *bl1_plat_get_image_desc(unsigned int image_id)
90{
91 unsigned int index = 0;
92
93 while (bl1_tbbr_image_descs[index].image_id != INVALID_IMAGE_ID) {
94 if (bl1_tbbr_image_descs[index].image_id == image_id)
95 return &bl1_tbbr_image_descs[index];
96 index++;
97 }
98
99 return NULL;
100}