blob: 8f607bae2c8d565e06c9921b4d0cbb8f57aa48ef [file] [log] [blame]
Dan Handley5f0cdb02014-05-14 17:44:19 +01001/*
2 * Copyright (c) 2014, ARM Limited and Contributors. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
31#ifndef __PLATFORM_DEF_H__
32#define __PLATFORM_DEF_H__
33
34#include <arch.h>
35
36
37/*******************************************************************************
38 * Platform binary types for linking
39 ******************************************************************************/
40#define PLATFORM_LINKER_FORMAT "elf64-littleaarch64"
41#define PLATFORM_LINKER_ARCH aarch64
42
43/*******************************************************************************
44 * Generic platform constants
45 ******************************************************************************/
46
47/* Size of cacheable stacks */
Soby Mathewaa442d32014-08-04 16:02:05 +010048#if DEBUG_XLAT_TABLE
49#define PLATFORM_STACK_SIZE 0x800
50#elif IMAGE_BL1
51#define PLATFORM_STACK_SIZE 0x440
52#elif IMAGE_BL2
53#define PLATFORM_STACK_SIZE 0x400
54#elif IMAGE_BL31
55#define PLATFORM_STACK_SIZE 0x400
56#elif IMAGE_BL32
57#define PLATFORM_STACK_SIZE 0x440
58#endif
Dan Handley5f0cdb02014-05-14 17:44:19 +010059
Dan Handley5f0cdb02014-05-14 17:44:19 +010060#define FIRMWARE_WELCOME_STR "Booting trusted firmware boot loader stage 1\n\r"
61
62/* Trusted Boot Firmware BL2 */
63#define BL2_IMAGE_NAME "bl2.bin"
64
65/* EL3 Runtime Firmware BL31 */
66#define BL31_IMAGE_NAME "bl31.bin"
67
68/* Secure Payload BL32 (Trusted OS) */
69#define BL32_IMAGE_NAME "bl32.bin"
70
71/* Non-Trusted Firmware BL33 */
72#define BL33_IMAGE_NAME "bl33.bin" /* e.g. UEFI */
73
74#define PLATFORM_CACHE_LINE_SIZE 64
75#define PLATFORM_CLUSTER_COUNT 2ull
76#define PLATFORM_CLUSTER0_CORE_COUNT 4
77#define PLATFORM_CLUSTER1_CORE_COUNT 4
78#define PLATFORM_CORE_COUNT (PLATFORM_CLUSTER1_CORE_COUNT + \
79 PLATFORM_CLUSTER0_CORE_COUNT)
80#define PLATFORM_MAX_CPUS_PER_CLUSTER 4
Andrew Thoelke6c0b45d2014-06-20 00:36:14 +010081#define PLATFORM_NUM_AFFS (PLATFORM_CLUSTER_COUNT + \
82 PLATFORM_CORE_COUNT)
Dan Handley5f0cdb02014-05-14 17:44:19 +010083#define MAX_IO_DEVICES 3
84#define MAX_IO_HANDLES 4
85
86/*******************************************************************************
87 * Platform memory map related constants
88 ******************************************************************************/
89#define TZROM_BASE 0x00000000
90#define TZROM_SIZE 0x04000000
91
92#define TZRAM_BASE 0x04000000
93#define TZRAM_SIZE 0x40000
94
95/* Location of trusted dram on the base fvp */
96#define TZDRAM_BASE 0x06000000
97#define TZDRAM_SIZE 0x02000000
98
99/*******************************************************************************
100 * BL1 specific defines.
101 * BL1 RW data is relocated from ROM to RAM at runtime so we need 2 sets of
102 * addresses.
103 ******************************************************************************/
104#define BL1_RO_BASE TZROM_BASE
105#define BL1_RO_LIMIT (TZROM_BASE + TZROM_SIZE)
Sandrine Bailleuxa1b6db62014-06-16 16:12:27 +0100106/*
107 * Put BL1 RW at the top of the Trusted SRAM. BL1_RW_BASE is calculated using
108 * the current BL1 RW debug size plus a little space for growth.
109 */
110#define BL1_RW_BASE (TZRAM_BASE + TZRAM_SIZE - 0x6000)
111#define BL1_RW_LIMIT (TZRAM_BASE + TZRAM_SIZE)
Dan Handley5f0cdb02014-05-14 17:44:19 +0100112
113/*******************************************************************************
114 * BL2 specific defines.
115 ******************************************************************************/
Sandrine Bailleuxa1b6db62014-06-16 16:12:27 +0100116/*
117 * Put BL2 just below BL3-1. BL2_BASE is calculated using the current BL2 debug
118 * size plus a little space for growth.
119 */
120#define BL2_BASE (BL31_BASE - 0xC000)
121#define BL2_LIMIT BL31_BASE
Dan Handley5f0cdb02014-05-14 17:44:19 +0100122
123/*******************************************************************************
124 * BL31 specific defines.
125 ******************************************************************************/
Sandrine Bailleuxa1b6db62014-06-16 16:12:27 +0100126/*
127 * Put BL3-1 at the top of the Trusted SRAM. BL31_BASE is calculated using the
128 * current BL3-1 debug size plus a little space for growth.
129 */
130#define BL31_BASE (TZRAM_BASE + TZRAM_SIZE - 0x1D000)
131#define BL31_PROGBITS_LIMIT BL1_RW_BASE
132#define BL31_LIMIT (TZRAM_BASE + TZRAM_SIZE)
Dan Handley5f0cdb02014-05-14 17:44:19 +0100133
134/*******************************************************************************
135 * BL32 specific defines.
136 ******************************************************************************/
137/*
138 * On FVP, the TSP can execute either from Trusted SRAM or Trusted DRAM.
139 */
140#define TSP_IN_TZRAM 0
141#define TSP_IN_TZDRAM 1
142
143#if TSP_RAM_LOCATION_ID == TSP_IN_TZRAM
144# define TSP_SEC_MEM_BASE TZRAM_BASE
145# define TSP_SEC_MEM_SIZE TZRAM_SIZE
Sandrine Bailleuxa1b6db62014-06-16 16:12:27 +0100146# define BL32_BASE TZRAM_BASE
147# define BL32_PROGBITS_LIMIT BL2_BASE
148# define BL32_LIMIT BL31_BASE
Dan Handley5f0cdb02014-05-14 17:44:19 +0100149#elif TSP_RAM_LOCATION_ID == TSP_IN_TZDRAM
150# define TSP_SEC_MEM_BASE TZDRAM_BASE
151# define TSP_SEC_MEM_SIZE TZDRAM_SIZE
152# define BL32_BASE (TZDRAM_BASE + 0x2000)
153# define BL32_LIMIT (TZDRAM_BASE + (1 << 21))
154#else
155# error "Unsupported TSP_RAM_LOCATION_ID value"
156#endif
157
158/*******************************************************************************
159 * Platform specific page table and MMU setup constants
160 ******************************************************************************/
161#define ADDR_SPACE_SIZE (1ull << 32)
Andrew Thoelke15f195b2014-06-20 12:23:20 +0100162#define MAX_XLAT_TABLES 2
Dan Handley5f0cdb02014-05-14 17:44:19 +0100163#define MAX_MMAP_REGIONS 16
164
165/*******************************************************************************
166 * ID of the secure physical generic timer interrupt.
167 ******************************************************************************/
168#define IRQ_SEC_PHY_TIMER 29
169
170/*******************************************************************************
171 * CCI-400 related constants
172 ******************************************************************************/
173#define CCI400_BASE 0x2c090000
174#define CCI400_SL_IFACE_CLUSTER0 3
175#define CCI400_SL_IFACE_CLUSTER1 4
176#define CCI400_SL_IFACE_INDEX(mpidr) (mpidr & MPIDR_CLUSTER_MASK ? \
177 CCI400_SL_IFACE_CLUSTER1 : \
178 CCI400_SL_IFACE_CLUSTER0)
179
180
181/*******************************************************************************
182 * Declarations and constants to access the mailboxes safely. Each mailbox is
183 * aligned on the biggest cache line size in the platform. This is known only
184 * to the platform as it might have a combination of integrated and external
185 * caches. Such alignment ensures that two maiboxes do not sit on the same cache
186 * line at any cache level. They could belong to different cpus/clusters &
187 * get written while being protected by different locks causing corruption of
188 * a valid mailbox address.
189 ******************************************************************************/
190#define CACHE_WRITEBACK_SHIFT 6
191#define CACHE_WRITEBACK_GRANULE (1 << CACHE_WRITEBACK_SHIFT)
192
193
194#endif /* __PLATFORM_DEF_H__ */