1 /* 2 * Copyright (c) 2020-2023, Arm Limited and Contributors. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 7 #include <assert.h> 8 9 #include <platform_def.h> 10 11 #include <plat/common/platform.h> 12 #include <common/bl_common.h> 13 #include <common/debug.h> 14 #include <drivers/arm/ccn.h> 15 #include <plat/arm/common/plat_arm.h> 16 #include <plat/common/platform.h> 17 #include <drivers/arm/sbsa.h> 18 19 #if SPM_MM 20 #include <services/spm_mm_partition.h> 21 #endif 22 23 /* 24 * Table of regions for different BL stages to map using the MMU. 25 * This doesn't include Trusted RAM as the 'mem_layout' argument passed to 26 * arm_configure_mmu_elx() will give the available subset of that. 27 */ 28 #if IMAGE_BL1 29 const mmap_region_t plat_arm_mmap[] = { 30 ARM_MAP_SHARED_RAM, 31 TC_FLASH0_RO, 32 TC_MAP_DEVICE, 33 {0} 34 }; 35 #endif 36 #if IMAGE_BL2 37 const mmap_region_t plat_arm_mmap[] = { 38 ARM_MAP_SHARED_RAM, 39 TC_FLASH0_RO, 40 TC_MAP_DEVICE, 41 TC_MAP_NS_DRAM1, 42 #if defined(SPD_spmd) 43 TC_MAP_TZC_DRAM1, 44 #endif 45 #if ARM_BL31_IN_DRAM 46 ARM_MAP_BL31_SEC_DRAM, 47 #endif 48 #if SPM_MM 49 ARM_SP_IMAGE_MMAP, 50 #endif 51 #if TRUSTED_BOARD_BOOT && !RESET_TO_BL2 52 ARM_MAP_BL1_RW, 53 #endif 54 #ifdef SPD_opteed 55 ARM_MAP_OPTEE_CORE_MEM, 56 ARM_OPTEE_PAGEABLE_LOAD_MEM, 57 #endif 58 {0} 59 }; 60 #endif 61 #if IMAGE_BL31 62 const mmap_region_t plat_arm_mmap[] = { 63 ARM_MAP_SHARED_RAM, 64 V2M_MAP_IOFPGA, 65 TC_MAP_DEVICE, 66 PLAT_DTB_DRAM_NS, 67 #if SPM_MM 68 ARM_SPM_BUF_EL3_MMAP, 69 #endif 70 {0} 71 }; 72 73 #if SPM_MM && defined(IMAGE_BL31) 74 const mmap_region_t plat_arm_secure_partition_mmap[] = { 75 PLAT_ARM_SECURE_MAP_DEVICE, 76 ARM_SP_IMAGE_MMAP, 77 ARM_SP_IMAGE_NS_BUF_MMAP, 78 ARM_SP_CPER_BUF_MMAP, 79 ARM_SP_IMAGE_RW_MMAP, 80 ARM_SPM_BUF_EL0_MMAP, 81 {0} 82 }; 83 #endif /* SPM_MM && defined(IMAGE_BL31) */ 84 #endif 85 86 ARM_CASSERT_MMAP 87 88 #if SPM_MM && defined(IMAGE_BL31) 89 /* 90 * Boot information passed to a secure partition during initialisation. Linear 91 * indices in MP information will be filled at runtime. 92 */ 93 static spm_mm_mp_info_t sp_mp_info[] = { 94 [0] = {0x81000000, 0}, 95 [1] = {0x81000100, 0}, 96 [2] = {0x81000200, 0}, 97 [3] = {0x81000300, 0}, 98 [4] = {0x81010000, 0}, 99 [5] = {0x81010100, 0}, 100 [6] = {0x81010200, 0}, 101 [7] = {0x81010300, 0}, 102 }; 103 104 const spm_mm_boot_info_t plat_arm_secure_partition_boot_info = { 105 .h.type = PARAM_SP_IMAGE_BOOT_INFO, 106 .h.version = VERSION_1, 107 .h.size = sizeof(spm_mm_boot_info_t), 108 .h.attr = 0, 109 .sp_mem_base = ARM_SP_IMAGE_BASE, 110 .sp_mem_limit = ARM_SP_IMAGE_LIMIT, 111 .sp_image_base = ARM_SP_IMAGE_BASE, 112 .sp_stack_base = PLAT_SP_IMAGE_STACK_BASE, 113 .sp_heap_base = ARM_SP_IMAGE_HEAP_BASE, 114 .sp_ns_comm_buf_base = PLAT_SP_IMAGE_NS_BUF_BASE, 115 .sp_shared_buf_base = PLAT_SPM_BUF_BASE, 116 .sp_image_size = ARM_SP_IMAGE_SIZE, 117 .sp_pcpu_stack_size = PLAT_SP_IMAGE_STACK_PCPU_SIZE, 118 .sp_heap_size = ARM_SP_IMAGE_HEAP_SIZE, 119 .sp_ns_comm_buf_size = PLAT_SP_IMAGE_NS_BUF_SIZE, 120 .sp_shared_buf_size = PLAT_SPM_BUF_SIZE, 121 .num_sp_mem_regions = ARM_SP_IMAGE_NUM_MEM_REGIONS, 122 .num_cpus = PLATFORM_CORE_COUNT, 123 .mp_info = &sp_mp_info[0], 124 }; 125 126 const struct mmap_region *plat_get_secure_partition_mmap(void *cookie) 127 { 128 return plat_arm_secure_partition_mmap; 129 } 130 131 const struct spm_mm_boot_info *plat_get_secure_partition_boot_info( 132 void *cookie) 133 { 134 return &plat_arm_secure_partition_boot_info; 135 } 136 #endif /* SPM_MM && defined(IMAGE_BL31) */ 137 138 #if TRUSTED_BOARD_BOOT || MEASURED_BOOT 139 int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size) 140 { 141 assert(heap_addr != NULL); 142 assert(heap_size != NULL); 143 144 return arm_get_mbedtls_heap(heap_addr, heap_size); 145 } 146 #endif 147 148 void plat_arm_secure_wdt_start(void) 149 { 150 sbsa_wdog_start(SBSA_SECURE_WDOG_CONTROL_BASE, SBSA_SECURE_WDOG_TIMEOUT); 151 } 152 153 void plat_arm_secure_wdt_stop(void) 154 { 155 sbsa_wdog_stop(SBSA_SECURE_WDOG_CONTROL_BASE); 156 } 157 158 void plat_arm_secure_wdt_refresh(void) 159 { 160 sbsa_wdog_refresh(SBSA_SECURE_WDOG_REFRESH_BASE); 161 } 162