1 /* 2 * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 #ifndef COMMON_DEF_H 7 #define COMMON_DEF_H 8 9 #include <bl_common.h> 10 #include <platform_def.h> 11 #include <utils_def.h> 12 #include <xlat_tables_defs.h> 13 14 /****************************************************************************** 15 * Required platform porting definitions that are expected to be common to 16 * all platforms 17 *****************************************************************************/ 18 19 /* 20 * Platform binary types for linking 21 */ 22 #ifdef AARCH32 23 #define PLATFORM_LINKER_FORMAT "elf32-littlearm" 24 #define PLATFORM_LINKER_ARCH arm 25 #else 26 #define PLATFORM_LINKER_FORMAT "elf64-littleaarch64" 27 #define PLATFORM_LINKER_ARCH aarch64 28 #endif /* AARCH32 */ 29 30 /* 31 * Generic platform constants 32 */ 33 #define FIRMWARE_WELCOME_STR "Booting Trusted Firmware\n" 34 35 #define BL2_IMAGE_DESC { \ 36 .image_id = BL2_IMAGE_ID, \ 37 SET_STATIC_PARAM_HEAD(image_info, PARAM_EP, \ 38 VERSION_2, image_info_t, 0), \ 39 .image_info.image_base = BL2_BASE, \ 40 .image_info.image_max_size = BL2_LIMIT - BL2_BASE,\ 41 SET_STATIC_PARAM_HEAD(ep_info, PARAM_EP, \ 42 VERSION_2, entry_point_info_t, SECURE | EXECUTABLE),\ 43 .ep_info.pc = BL2_BASE, \ 44 } 45 46 /* 47 * The following constants identify the extents of the code & read-only data 48 * regions. These addresses are used by the MMU setup code and therefore they 49 * must be page-aligned. 50 * 51 * When the code and read-only data are mapped as a single atomic section 52 * (i.e. when SEPARATE_CODE_AND_RODATA=0) then we treat the whole section as 53 * code by specifying the read-only data section as empty. 54 * 55 * BL1 is different than the other images in the sense that its read-write data 56 * originally lives in Trusted ROM and needs to be relocated in Trusted SRAM at 57 * run-time. Therefore, the read-write data in ROM can be mapped with the same 58 * memory attributes as the read-only data region. For this reason, BL1 uses 59 * different macros. 60 * 61 * Note that BL1_ROM_END is not necessarily aligned on a page boundary as it 62 * just points to the end of BL1's actual content in Trusted ROM. Therefore it 63 * needs to be rounded up to the next page size in order to map the whole last 64 * page of it with the right memory attributes. 65 */ 66 #if SEPARATE_CODE_AND_RODATA 67 68 #define BL1_CODE_END BL_CODE_END 69 #define BL1_RO_DATA_BASE BL_RO_DATA_BASE 70 #define BL1_RO_DATA_END round_up(BL1_ROM_END, PAGE_SIZE) 71 #if BL2_IN_XIP_MEM 72 #define BL2_CODE_END BL_CODE_END 73 #define BL2_RO_DATA_BASE BL_RO_DATA_BASE 74 #define BL2_RO_DATA_END round_up(BL2_ROM_END, PAGE_SIZE) 75 #endif /* BL2_IN_XIP_MEM */ 76 #else 77 #define BL_RO_DATA_BASE UL(0) 78 #define BL_RO_DATA_END UL(0) 79 #define BL1_CODE_END round_up(BL1_ROM_END, PAGE_SIZE) 80 #if BL2_IN_XIP_MEM 81 #define BL2_RO_DATA_BASE UL(0) 82 #define BL2_RO_DATA_END UL(0) 83 #define BL2_CODE_END round_up(BL2_ROM_END, PAGE_SIZE) 84 #endif /* BL2_IN_XIP_MEM */ 85 #endif /* SEPARATE_CODE_AND_RODATA */ 86 87 #endif /* COMMON_DEF_H */ 88