xref: /rk3399_ARM-atf/bl31/bl31.ld.S (revision 931f7c615643e5d0fb2cbab68e4093c980b0e271)
14f6ad66aSAchin Gupta/*
2883d1b5dSAntonio Nino Diaz * Copyright (c) 2013-2018, ARM Limited and Contributors. All rights reserved.
34f6ad66aSAchin Gupta *
482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause
54f6ad66aSAchin Gupta */
64f6ad66aSAchin Gupta
75f0cdb05SDan Handley#include <platform_def.h>
8a2aedac2SAntonio Nino Diaz#include <xlat_tables_defs.h>
94f6ad66aSAchin Gupta
104f6ad66aSAchin GuptaOUTPUT_FORMAT(PLATFORM_LINKER_FORMAT)
114f6ad66aSAchin GuptaOUTPUT_ARCH(PLATFORM_LINKER_ARCH)
129f98aa1aSJeenu ViswambharanENTRY(bl31_entrypoint)
134f6ad66aSAchin Gupta
144f6ad66aSAchin Gupta
154f6ad66aSAchin GuptaMEMORY {
16d7fbf132SJuan Castillo    RAM (rwx): ORIGIN = BL31_BASE, LENGTH = BL31_LIMIT - BL31_BASE
174f6ad66aSAchin Gupta}
184f6ad66aSAchin Gupta
19ec693569SCaesar Wang#ifdef PLAT_EXTRA_LD_SCRIPT
20ec693569SCaesar Wang#include <plat.ld.S>
21ec693569SCaesar Wang#endif
224f6ad66aSAchin Gupta
234f6ad66aSAchin GuptaSECTIONS
244f6ad66aSAchin Gupta{
254f6ad66aSAchin Gupta    . = BL31_BASE;
26a2aedac2SAntonio Nino Diaz    ASSERT(. == ALIGN(PAGE_SIZE),
278d69a03fSSandrine Bailleux           "BL31_BASE address is not aligned on a page boundary.")
284f6ad66aSAchin Gupta
29*931f7c61SSoby Mathew    __BL31_START__ = .;
30*931f7c61SSoby Mathew
315d1c104fSSandrine Bailleux#if SEPARATE_CODE_AND_RODATA
325d1c104fSSandrine Bailleux    .text . : {
335d1c104fSSandrine Bailleux        __TEXT_START__ = .;
345d1c104fSSandrine Bailleux        *bl31_entrypoint.o(.text*)
355d1c104fSSandrine Bailleux        *(.text*)
365d1c104fSSandrine Bailleux        *(.vectors)
375629b2b1SRoberto Vargas        . = ALIGN(PAGE_SIZE);
385d1c104fSSandrine Bailleux        __TEXT_END__ = .;
395d1c104fSSandrine Bailleux    } >RAM
405d1c104fSSandrine Bailleux
415d1c104fSSandrine Bailleux    .rodata . : {
425d1c104fSSandrine Bailleux        __RODATA_START__ = .;
435d1c104fSSandrine Bailleux        *(.rodata*)
445d1c104fSSandrine Bailleux
455d1c104fSSandrine Bailleux        /* Ensure 8-byte alignment for descriptors and ensure inclusion */
465d1c104fSSandrine Bailleux        . = ALIGN(8);
475d1c104fSSandrine Bailleux        __RT_SVC_DESCS_START__ = .;
485d1c104fSSandrine Bailleux        KEEP(*(rt_svc_descs))
495d1c104fSSandrine Bailleux        __RT_SVC_DESCS_END__ = .;
505d1c104fSSandrine Bailleux
515d1c104fSSandrine Bailleux#if ENABLE_PMF
525d1c104fSSandrine Bailleux        /* Ensure 8-byte alignment for descriptors and ensure inclusion */
535d1c104fSSandrine Bailleux        . = ALIGN(8);
545d1c104fSSandrine Bailleux        __PMF_SVC_DESCS_START__ = .;
555d1c104fSSandrine Bailleux        KEEP(*(pmf_svc_descs))
565d1c104fSSandrine Bailleux        __PMF_SVC_DESCS_END__ = .;
575d1c104fSSandrine Bailleux#endif /* ENABLE_PMF */
585d1c104fSSandrine Bailleux
595d1c104fSSandrine Bailleux        /*
605d1c104fSSandrine Bailleux         * Ensure 8-byte alignment for cpu_ops so that its fields are also
615d1c104fSSandrine Bailleux         * aligned. Also ensure cpu_ops inclusion.
625d1c104fSSandrine Bailleux         */
635d1c104fSSandrine Bailleux        . = ALIGN(8);
645d1c104fSSandrine Bailleux        __CPU_OPS_START__ = .;
655d1c104fSSandrine Bailleux        KEEP(*(cpu_ops))
665d1c104fSSandrine Bailleux        __CPU_OPS_END__ = .;
675d1c104fSSandrine Bailleux
68*931f7c61SSoby Mathew        /*
69*931f7c61SSoby Mathew         * Keep the .got section in the RO section as the it is patched
70*931f7c61SSoby Mathew         * prior to enabling the MMU and having the .got in RO is better for
71*931f7c61SSoby Mathew         * security.
72*931f7c61SSoby Mathew         */
73*931f7c61SSoby Mathew        . = ALIGN(16);
74*931f7c61SSoby Mathew        __GOT_START__ = .;
75*931f7c61SSoby Mathew        *(.got)
76*931f7c61SSoby Mathew        __GOT_END__ = .;
77*931f7c61SSoby Mathew
788e743bcdSJeenu Viswambharan        /* Place pubsub sections for events */
798e743bcdSJeenu Viswambharan        . = ALIGN(8);
808e743bcdSJeenu Viswambharan#include <pubsub_events.h>
818e743bcdSJeenu Viswambharan
825629b2b1SRoberto Vargas        . = ALIGN(PAGE_SIZE);
835d1c104fSSandrine Bailleux        __RODATA_END__ = .;
845d1c104fSSandrine Bailleux    } >RAM
855d1c104fSSandrine Bailleux#else
868d69a03fSSandrine Bailleux    ro . : {
878d69a03fSSandrine Bailleux        __RO_START__ = .;
88dccc537aSAndrew Thoelke        *bl31_entrypoint.o(.text*)
89dccc537aSAndrew Thoelke        *(.text*)
908d69a03fSSandrine Bailleux        *(.rodata*)
917421b465SAchin Gupta
92dccc537aSAndrew Thoelke        /* Ensure 8-byte alignment for descriptors and ensure inclusion */
937421b465SAchin Gupta        . = ALIGN(8);
947421b465SAchin Gupta        __RT_SVC_DESCS_START__ = .;
95dccc537aSAndrew Thoelke        KEEP(*(rt_svc_descs))
967421b465SAchin Gupta        __RT_SVC_DESCS_END__ = .;
977421b465SAchin Gupta
98a31d8983SYatharth Kochar#if ENABLE_PMF
99a31d8983SYatharth Kochar        /* Ensure 8-byte alignment for descriptors and ensure inclusion */
100a31d8983SYatharth Kochar        . = ALIGN(8);
101a31d8983SYatharth Kochar        __PMF_SVC_DESCS_START__ = .;
102a31d8983SYatharth Kochar        KEEP(*(pmf_svc_descs))
103a31d8983SYatharth Kochar        __PMF_SVC_DESCS_END__ = .;
104a31d8983SYatharth Kochar#endif /* ENABLE_PMF */
105a31d8983SYatharth Kochar
1069b476841SSoby Mathew        /*
1079b476841SSoby Mathew         * Ensure 8-byte alignment for cpu_ops so that its fields are also
1089b476841SSoby Mathew         * aligned. Also ensure cpu_ops inclusion.
1099b476841SSoby Mathew         */
1109b476841SSoby Mathew        . = ALIGN(8);
1119b476841SSoby Mathew        __CPU_OPS_START__ = .;
1129b476841SSoby Mathew        KEEP(*(cpu_ops))
1139b476841SSoby Mathew        __CPU_OPS_END__ = .;
1149b476841SSoby Mathew
1158e743bcdSJeenu Viswambharan        /* Place pubsub sections for events */
1168e743bcdSJeenu Viswambharan        . = ALIGN(8);
1178e743bcdSJeenu Viswambharan#include <pubsub_events.h>
1188e743bcdSJeenu Viswambharan
119b739f22aSAchin Gupta        *(.vectors)
1208d69a03fSSandrine Bailleux        __RO_END_UNALIGNED__ = .;
1218d69a03fSSandrine Bailleux        /*
1228d69a03fSSandrine Bailleux         * Memory page(s) mapped to this section will be marked as read-only,
1238d69a03fSSandrine Bailleux         * executable.  No RW data from the next section must creep in.
1248d69a03fSSandrine Bailleux         * Ensure the rest of the current memory page is unused.
1258d69a03fSSandrine Bailleux         */
1265629b2b1SRoberto Vargas        . = ALIGN(PAGE_SIZE);
1278d69a03fSSandrine Bailleux        __RO_END__ = .;
1284f6ad66aSAchin Gupta    } >RAM
1295d1c104fSSandrine Bailleux#endif
1304f6ad66aSAchin Gupta
1319b476841SSoby Mathew    ASSERT(__CPU_OPS_END__ > __CPU_OPS_START__,
1329b476841SSoby Mathew           "cpu_ops not defined for this platform.")
1339b476841SSoby Mathew
1342fccb228SAntonio Nino Diaz#if ENABLE_SPM
1352fccb228SAntonio Nino Diaz    /*
1362fccb228SAntonio Nino Diaz     * Exception vectors of the SPM shim layer. They must be aligned to a 2K
1372fccb228SAntonio Nino Diaz     * address, but we need to place them in a separate page so that we can set
1382fccb228SAntonio Nino Diaz     * individual permissions to them, so the actual alignment needed is 4K.
1392fccb228SAntonio Nino Diaz     *
1402fccb228SAntonio Nino Diaz     * There's no need to include this into the RO section of BL31 because it
1412fccb228SAntonio Nino Diaz     * doesn't need to be accessed by BL31.
1422fccb228SAntonio Nino Diaz     */
143a2aedac2SAntonio Nino Diaz    spm_shim_exceptions : ALIGN(PAGE_SIZE) {
1442fccb228SAntonio Nino Diaz        __SPM_SHIM_EXCEPTIONS_START__ = .;
1452fccb228SAntonio Nino Diaz        *(.spm_shim_exceptions)
1465629b2b1SRoberto Vargas        . = ALIGN(PAGE_SIZE);
1472fccb228SAntonio Nino Diaz        __SPM_SHIM_EXCEPTIONS_END__ = .;
1482fccb228SAntonio Nino Diaz    } >RAM
1492fccb228SAntonio Nino Diaz#endif
1502fccb228SAntonio Nino Diaz
15154dc71e7SAchin Gupta    /*
15254dc71e7SAchin Gupta     * Define a linker symbol to mark start of the RW memory area for this
15354dc71e7SAchin Gupta     * image.
15454dc71e7SAchin Gupta     */
15554dc71e7SAchin Gupta    __RW_START__ = . ;
15654dc71e7SAchin Gupta
15751faada7SDouglas Raillard    /*
15851faada7SDouglas Raillard     * .data must be placed at a lower address than the stacks if the stack
15951faada7SDouglas Raillard     * protector is enabled. Alternatively, the .data.stack_protector_canary
16051faada7SDouglas Raillard     * section can be placed independently of the main .data section.
16151faada7SDouglas Raillard     */
1628d69a03fSSandrine Bailleux   .data . : {
1638d69a03fSSandrine Bailleux        __DATA_START__ = .;
164dccc537aSAndrew Thoelke        *(.data*)
1658d69a03fSSandrine Bailleux        __DATA_END__ = .;
1668d69a03fSSandrine Bailleux    } >RAM
1678d69a03fSSandrine Bailleux
168*931f7c61SSoby Mathew    . = ALIGN(16);
169*931f7c61SSoby Mathew    /*
170*931f7c61SSoby Mathew     * .rela.dyn needs to come after .data for the read-elf utility to parse
171*931f7c61SSoby Mathew     * this section correctly.
172*931f7c61SSoby Mathew     */
173*931f7c61SSoby Mathew    __RELA_START__ = .;
174*931f7c61SSoby Mathew    .rela.dyn . : {
175*931f7c61SSoby Mathew    } >RAM
176*931f7c61SSoby Mathew    __RELA_END__ = .;
177*931f7c61SSoby Mathew
178a1b6db6cSSandrine Bailleux#ifdef BL31_PROGBITS_LIMIT
179d178637dSJuan Castillo    ASSERT(. <= BL31_PROGBITS_LIMIT, "BL31 progbits has exceeded its limit.")
180a1b6db6cSSandrine Bailleux#endif
181a1b6db6cSSandrine Bailleux
1828d69a03fSSandrine Bailleux    stacks (NOLOAD) : {
1838d69a03fSSandrine Bailleux        __STACKS_START__ = .;
1844f6ad66aSAchin Gupta        *(tzfw_normal_stacks)
1858d69a03fSSandrine Bailleux        __STACKS_END__ = .;
1864f6ad66aSAchin Gupta    } >RAM
1874f6ad66aSAchin Gupta
1888d69a03fSSandrine Bailleux    /*
1898d69a03fSSandrine Bailleux     * The .bss section gets initialised to 0 at runtime.
190308d359bSDouglas Raillard     * Its base address should be 16-byte aligned for better performance of the
191308d359bSDouglas Raillard     * zero-initialization code.
1928d69a03fSSandrine Bailleux     */
193ee7b35c4SAndrew Thoelke    .bss (NOLOAD) : ALIGN(16) {
1948d69a03fSSandrine Bailleux        __BSS_START__ = .;
195dccc537aSAndrew Thoelke        *(.bss*)
1964f6ad66aSAchin Gupta        *(COMMON)
197ee7b35c4SAndrew Thoelke#if !USE_COHERENT_MEM
198ee7b35c4SAndrew Thoelke        /*
199ee7b35c4SAndrew Thoelke         * Bakery locks are stored in normal .bss memory
200ee7b35c4SAndrew Thoelke         *
201ee7b35c4SAndrew Thoelke         * Each lock's data is spread across multiple cache lines, one per CPU,
202ee7b35c4SAndrew Thoelke         * but multiple locks can share the same cache line.
203ee7b35c4SAndrew Thoelke         * The compiler will allocate enough memory for one CPU's bakery locks,
204ee7b35c4SAndrew Thoelke         * the remaining cache lines are allocated by the linker script
205ee7b35c4SAndrew Thoelke         */
206ee7b35c4SAndrew Thoelke        . = ALIGN(CACHE_WRITEBACK_GRANULE);
207ee7b35c4SAndrew Thoelke        __BAKERY_LOCK_START__ = .;
208ee7b35c4SAndrew Thoelke        *(bakery_lock)
209ee7b35c4SAndrew Thoelke        . = ALIGN(CACHE_WRITEBACK_GRANULE);
2107173f5f6SVikram Kanigiri        __PERCPU_BAKERY_LOCK_SIZE__ = ABSOLUTE(. - __BAKERY_LOCK_START__);
211ee7b35c4SAndrew Thoelke        . = . + (__PERCPU_BAKERY_LOCK_SIZE__ * (PLATFORM_CORE_COUNT - 1));
212ee7b35c4SAndrew Thoelke        __BAKERY_LOCK_END__ = .;
21332aee841SRoberto Vargas
21432aee841SRoberto Vargas	/*
21532aee841SRoberto Vargas	 * If BL31 doesn't use any bakery lock then __PERCPU_BAKERY_LOCK_SIZE__
21632aee841SRoberto Vargas	 * will be zero. For this reason, the only two valid values for
21732aee841SRoberto Vargas	 * __PERCPU_BAKERY_LOCK_SIZE__ are 0 or the platform defined value
21832aee841SRoberto Vargas	 * PLAT_PERCPU_BAKERY_LOCK_SIZE.
21932aee841SRoberto Vargas	 */
220ee7b35c4SAndrew Thoelke#ifdef PLAT_PERCPU_BAKERY_LOCK_SIZE
22132aee841SRoberto Vargas    ASSERT((__PERCPU_BAKERY_LOCK_SIZE__ == 0) || (__PERCPU_BAKERY_LOCK_SIZE__ == PLAT_PERCPU_BAKERY_LOCK_SIZE),
222ee7b35c4SAndrew Thoelke        "PLAT_PERCPU_BAKERY_LOCK_SIZE does not match bakery lock requirements");
223ee7b35c4SAndrew Thoelke#endif
224ee7b35c4SAndrew Thoelke#endif
225a31d8983SYatharth Kochar
226a31d8983SYatharth Kochar#if ENABLE_PMF
227a31d8983SYatharth Kochar        /*
228a31d8983SYatharth Kochar         * Time-stamps are stored in normal .bss memory
229a31d8983SYatharth Kochar         *
230a31d8983SYatharth Kochar         * The compiler will allocate enough memory for one CPU's time-stamps,
231a31d8983SYatharth Kochar         * the remaining memory for other CPU's is allocated by the
232a31d8983SYatharth Kochar         * linker script
233a31d8983SYatharth Kochar         */
234a31d8983SYatharth Kochar        . = ALIGN(CACHE_WRITEBACK_GRANULE);
235a31d8983SYatharth Kochar        __PMF_TIMESTAMP_START__ = .;
236a31d8983SYatharth Kochar        KEEP(*(pmf_timestamp_array))
237a31d8983SYatharth Kochar        . = ALIGN(CACHE_WRITEBACK_GRANULE);
238a31d8983SYatharth Kochar        __PMF_PERCPU_TIMESTAMP_END__ = .;
239a31d8983SYatharth Kochar        __PERCPU_TIMESTAMP_SIZE__ = ABSOLUTE(. - __PMF_TIMESTAMP_START__);
240a31d8983SYatharth Kochar        . = . + (__PERCPU_TIMESTAMP_SIZE__ * (PLATFORM_CORE_COUNT - 1));
241a31d8983SYatharth Kochar        __PMF_TIMESTAMP_END__ = .;
242a31d8983SYatharth Kochar#endif /* ENABLE_PMF */
2438d69a03fSSandrine Bailleux        __BSS_END__ = .;
2444f6ad66aSAchin Gupta    } >RAM
2454f6ad66aSAchin Gupta
2468d69a03fSSandrine Bailleux    /*
247e3fff153SJeenu Viswambharan     * The xlat_table section is for full, aligned page tables (4K).
248a0cd989dSAchin Gupta     * Removing them from .bss avoids forcing 4K alignment on
249883d1b5dSAntonio Nino Diaz     * the .bss section. The tables are initialized to zero by the translation
250883d1b5dSAntonio Nino Diaz     * tables library.
251a0cd989dSAchin Gupta     */
252a0cd989dSAchin Gupta    xlat_table (NOLOAD) : {
253a0cd989dSAchin Gupta        *(xlat_table)
254a0cd989dSAchin Gupta    } >RAM
255a0cd989dSAchin Gupta
256ab8707e6SSoby Mathew#if USE_COHERENT_MEM
257a0cd989dSAchin Gupta    /*
2588d69a03fSSandrine Bailleux     * The base address of the coherent memory section must be page-aligned (4K)
2598d69a03fSSandrine Bailleux     * to guarantee that the coherent data are stored on their own pages and
2608d69a03fSSandrine Bailleux     * are not mixed with normal data.  This is required to set up the correct
2618d69a03fSSandrine Bailleux     * memory attributes for the coherent data page tables.
2628d69a03fSSandrine Bailleux     */
263a2aedac2SAntonio Nino Diaz    coherent_ram (NOLOAD) : ALIGN(PAGE_SIZE) {
2648d69a03fSSandrine Bailleux        __COHERENT_RAM_START__ = .;
265ee7b35c4SAndrew Thoelke        /*
266ee7b35c4SAndrew Thoelke         * Bakery locks are stored in coherent memory
267ee7b35c4SAndrew Thoelke         *
268ee7b35c4SAndrew Thoelke         * Each lock's data is contiguous and fully allocated by the compiler
269ee7b35c4SAndrew Thoelke         */
270ee7b35c4SAndrew Thoelke        *(bakery_lock)
2718d69a03fSSandrine Bailleux        *(tzfw_coherent_mem)
2728d69a03fSSandrine Bailleux        __COHERENT_RAM_END_UNALIGNED__ = .;
2738d69a03fSSandrine Bailleux        /*
2748d69a03fSSandrine Bailleux         * Memory page(s) mapped to this section will be marked
2758d69a03fSSandrine Bailleux         * as device memory.  No other unexpected data must creep in.
2768d69a03fSSandrine Bailleux         * Ensure the rest of the current memory page is unused.
2778d69a03fSSandrine Bailleux         */
2785629b2b1SRoberto Vargas        . = ALIGN(PAGE_SIZE);
2798d69a03fSSandrine Bailleux        __COHERENT_RAM_END__ = .;
2804f6ad66aSAchin Gupta    } >RAM
281ab8707e6SSoby Mathew#endif
2824f6ad66aSAchin Gupta
28354dc71e7SAchin Gupta    /*
28454dc71e7SAchin Gupta     * Define a linker symbol to mark end of the RW memory area for this
28554dc71e7SAchin Gupta     * image.
28654dc71e7SAchin Gupta     */
28754dc71e7SAchin Gupta    __RW_END__ = .;
2888d69a03fSSandrine Bailleux    __BL31_END__ = .;
2894f6ad66aSAchin Gupta
290d178637dSJuan Castillo    ASSERT(. <= BL31_LIMIT, "BL31 image has exceeded its limit.")
2914f6ad66aSAchin Gupta}
292