blob: 995d630c030bff6af3fcd3b3979f36c2fa4ccdcd [file] [log] [blame]
Nariman Poushinb44cfc62018-02-26 06:52:04 +00001/*
Thomas Abrahamd306eb82021-02-16 11:36:00 +05302 * Copyright (c) 2018-2021, Arm Limited and Contributors. All rights reserved.
Nariman Poushinb44cfc62018-02-26 06:52:04 +00003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
Antonio Nino Diaz09d40e02018-12-14 00:18:21 +00007#include <assert.h>
8
9#include <platform_def.h>
10
11#include <common/bl_common.h>
12#include <common/debug.h>
13#include <drivers/arm/ccn.h>
Antonio Nino Diazbd9344f2019-01-25 14:30:04 +000014#include <plat/arm/common/plat_arm.h>
Antonio Nino Diaz09d40e02018-12-14 00:18:21 +000015#include <plat/common/platform.h>
Aditya Angadib0c97da2019-04-16 11:29:14 +053016#include <drivers/arm/sbsa.h>
17#include <sgi_base_platform_def.h>
Olivier Deprez9d9ae972020-07-30 17:18:33 +020018
19#if SPM_MM
Paul Beesleyaeaa2252019-10-15 10:57:42 +000020#include <services/spm_mm_partition.h>
Olivier Deprez9d9ae972020-07-30 17:18:33 +020021#endif
Antonio Nino Diaz09d40e02018-12-14 00:18:21 +000022
Nariman Poushinb44cfc62018-02-26 06:52:04 +000023#define SGI_MAP_FLASH0_RO MAP_REGION_FLAT(V2M_FLASH0_BASE,\
24 V2M_FLASH0_SIZE, \
25 MT_DEVICE | MT_RO | MT_SECURE)
26/*
27 * Table of regions for different BL stages to map using the MMU.
28 * This doesn't include Trusted RAM as the 'mem_layout' argument passed to
29 * arm_configure_mmu_elx() will give the available subset of that.
30 *
31 * Replace or extend the below regions as required
32 */
33#if IMAGE_BL1
34const mmap_region_t plat_arm_mmap[] = {
35 ARM_MAP_SHARED_RAM,
36 SGI_MAP_FLASH0_RO,
37 CSS_SGI_MAP_DEVICE,
38 SOC_CSS_MAP_DEVICE,
39 {0}
40};
41#endif
42#if IMAGE_BL2
43const mmap_region_t plat_arm_mmap[] = {
44 ARM_MAP_SHARED_RAM,
45 SGI_MAP_FLASH0_RO,
Sami Mujawar7c15a8c2020-04-30 15:50:34 +010046#ifdef PLAT_ARM_MEM_PROT_ADDR
47 ARM_V2M_MAP_MEM_PROTECT,
48#endif
Nariman Poushinb44cfc62018-02-26 06:52:04 +000049 CSS_SGI_MAP_DEVICE,
50 SOC_CSS_MAP_DEVICE,
51 ARM_MAP_NS_DRAM1,
52#if ARM_BL31_IN_DRAM
53 ARM_MAP_BL31_SEC_DRAM,
54#endif
Paul Beesley3f3c3412019-09-16 11:29:03 +000055#if SPM_MM
Sughosh Ganud9523912018-05-16 17:19:56 +053056 ARM_SP_IMAGE_MMAP,
57#endif
Antonio Nino Diaz9e119a42018-09-25 11:38:18 +010058#if TRUSTED_BOARD_BOOT && !BL2_AT_EL3
John Tsichritzis7cdb4342018-08-22 12:36:37 +010059 ARM_MAP_BL1_RW,
60#endif
Nariman Poushinb44cfc62018-02-26 06:52:04 +000061 {0}
62};
63#endif
64#if IMAGE_BL31
65const mmap_region_t plat_arm_mmap[] = {
66 ARM_MAP_SHARED_RAM,
67 V2M_MAP_IOFPGA,
68 CSS_SGI_MAP_DEVICE,
Sami Mujawar7c15a8c2020-04-30 15:50:34 +010069#ifdef PLAT_ARM_MEM_PROT_ADDR
70 ARM_V2M_MAP_MEM_PROTECT,
71#endif
Nariman Poushinb44cfc62018-02-26 06:52:04 +000072 SOC_CSS_MAP_DEVICE,
Paul Beesley3f3c3412019-09-16 11:29:03 +000073#if SPM_MM
Sughosh Ganud9523912018-05-16 17:19:56 +053074 ARM_SPM_BUF_EL3_MMAP,
75#endif
Nariman Poushinb44cfc62018-02-26 06:52:04 +000076 {0}
77};
Sughosh Ganud9523912018-05-16 17:19:56 +053078
Paul Beesley3f3c3412019-09-16 11:29:03 +000079#if SPM_MM && defined(IMAGE_BL31)
Sughosh Ganud9523912018-05-16 17:19:56 +053080const mmap_region_t plat_arm_secure_partition_mmap[] = {
Thomas Abraham5dae6bc2021-02-15 14:14:59 +053081 PLAT_ARM_SECURE_MAP_SYSTEMREG,
82 PLAT_ARM_SECURE_MAP_NOR2,
Sughosh Ganud9523912018-05-16 17:19:56 +053083 PLAT_ARM_SECURE_MAP_DEVICE,
84 ARM_SP_IMAGE_MMAP,
85 ARM_SP_IMAGE_NS_BUF_MMAP,
Thomas Abrahamd306eb82021-02-16 11:36:00 +053086#if RAS_EXTENSION
87 CSS_SGI_SP_CPER_BUF_MMAP,
88#endif
Sughosh Ganud9523912018-05-16 17:19:56 +053089 ARM_SP_IMAGE_RW_MMAP,
90 ARM_SPM_BUF_EL0_MMAP,
91 {0}
92};
Paul Beesley3f3c3412019-09-16 11:29:03 +000093#endif /* SPM_MM && defined(IMAGE_BL31) */
Nariman Poushinb44cfc62018-02-26 06:52:04 +000094#endif
95
96ARM_CASSERT_MMAP
Sughosh Ganud9523912018-05-16 17:19:56 +053097
Paul Beesley3f3c3412019-09-16 11:29:03 +000098#if SPM_MM && defined(IMAGE_BL31)
Sughosh Ganud9523912018-05-16 17:19:56 +053099/*
100 * Boot information passed to a secure partition during initialisation. Linear
101 * indices in MP information will be filled at runtime.
102 */
Paul Beesleyaeaa2252019-10-15 10:57:42 +0000103static spm_mm_mp_info_t sp_mp_info[] = {
Sughosh Ganud9523912018-05-16 17:19:56 +0530104 [0] = {0x81000000, 0},
105 [1] = {0x81000100, 0},
106 [2] = {0x81000200, 0},
107 [3] = {0x81000300, 0},
108 [4] = {0x81010000, 0},
109 [5] = {0x81010100, 0},
110 [6] = {0x81010200, 0},
111 [7] = {0x81010300, 0},
112};
113
Paul Beesleyaeaa2252019-10-15 10:57:42 +0000114const spm_mm_boot_info_t plat_arm_secure_partition_boot_info = {
Sughosh Ganud9523912018-05-16 17:19:56 +0530115 .h.type = PARAM_SP_IMAGE_BOOT_INFO,
116 .h.version = VERSION_1,
Paul Beesleyaeaa2252019-10-15 10:57:42 +0000117 .h.size = sizeof(spm_mm_boot_info_t),
Sughosh Ganud9523912018-05-16 17:19:56 +0530118 .h.attr = 0,
119 .sp_mem_base = ARM_SP_IMAGE_BASE,
120 .sp_mem_limit = ARM_SP_IMAGE_LIMIT,
121 .sp_image_base = ARM_SP_IMAGE_BASE,
122 .sp_stack_base = PLAT_SP_IMAGE_STACK_BASE,
123 .sp_heap_base = ARM_SP_IMAGE_HEAP_BASE,
Ard Biesheuvel0560efb2018-12-29 19:43:21 +0100124 .sp_ns_comm_buf_base = PLAT_SP_IMAGE_NS_BUF_BASE,
Sughosh Ganud9523912018-05-16 17:19:56 +0530125 .sp_shared_buf_base = PLAT_SPM_BUF_BASE,
126 .sp_image_size = ARM_SP_IMAGE_SIZE,
127 .sp_pcpu_stack_size = PLAT_SP_IMAGE_STACK_PCPU_SIZE,
128 .sp_heap_size = ARM_SP_IMAGE_HEAP_SIZE,
Ard Biesheuvel0560efb2018-12-29 19:43:21 +0100129 .sp_ns_comm_buf_size = PLAT_SP_IMAGE_NS_BUF_SIZE,
Sughosh Ganud9523912018-05-16 17:19:56 +0530130 .sp_shared_buf_size = PLAT_SPM_BUF_SIZE,
131 .num_sp_mem_regions = ARM_SP_IMAGE_NUM_MEM_REGIONS,
132 .num_cpus = PLATFORM_CORE_COUNT,
133 .mp_info = &sp_mp_info[0],
134};
135
136const struct mmap_region *plat_get_secure_partition_mmap(void *cookie)
137{
138 return plat_arm_secure_partition_mmap;
139}
140
Paul Beesleyaeaa2252019-10-15 10:57:42 +0000141const struct spm_mm_boot_info *plat_get_secure_partition_boot_info(
Sughosh Ganud9523912018-05-16 17:19:56 +0530142 void *cookie)
143{
144 return &plat_arm_secure_partition_boot_info;
145}
Paul Beesley3f3c3412019-09-16 11:29:03 +0000146#endif /* SPM_MM && defined(IMAGE_BL31) */
John Tsichritzis7cdb4342018-08-22 12:36:37 +0100147
Antonio Nino Diaz9e119a42018-09-25 11:38:18 +0100148#if TRUSTED_BOARD_BOOT
John Tsichritzis7cdb4342018-08-22 12:36:37 +0100149int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size)
150{
151 assert(heap_addr != NULL);
152 assert(heap_size != NULL);
153
154 return arm_get_mbedtls_heap(heap_addr, heap_size);
155}
156#endif
Aditya Angadib0c97da2019-04-16 11:29:14 +0530157
158void plat_arm_secure_wdt_start(void)
159{
160 sbsa_wdog_start(SBSA_SECURE_WDOG_BASE, SBSA_SECURE_WDOG_TIMEOUT);
161}
162
163void plat_arm_secure_wdt_stop(void)
164{
165 sbsa_wdog_stop(SBSA_SECURE_WDOG_BASE);
166}