mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-08-16 09:27:01 +02:00
Enforce full include path for includes. Deprecate old paths. The following folders inside include/lib have been left unchanged: - include/lib/cpus/${ARCH} - include/lib/el3_runtime/${ARCH} The reason for this change is that having a global namespace for includes isn't a good idea. It defeats one of the advantages of having folders and it introduces problems that are sometimes subtle (because you may not know the header you are actually including if there are two of them). For example, this patch had to be created because two headers were called the same way:e0ea0928d5
("Fix gpio includes of mt8173 platform to avoid collision."). More recently, this patch has had similar problems:46f9b2c3a2
("drivers: add tzc380 support"). This problem was introduced in commit4ecca33988
("Move include and source files to logical locations"). At that time, there weren't too many headers so it wasn't a real issue. However, time has shown that this creates problems. Platforms that want to preserve the way they include headers may add the removed paths to PLAT_INCLUDES, but this is discouraged. Change-Id: I39dc53ed98f9e297a5966e723d1936d6ccf2fc8f Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>
163 lines
4.4 KiB
C
163 lines
4.4 KiB
C
/*
|
|
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <assert.h>
|
|
|
|
#include <platform_def.h>
|
|
|
|
#include <common/bl_common.h>
|
|
#include <common/debug.h>
|
|
#include <drivers/arm/ccn.h>
|
|
#include <plat/common/platform.h>
|
|
#include <services/secure_partition.h>
|
|
|
|
#include <arm_def.h>
|
|
#include <arm_spm_def.h>
|
|
#include <plat_arm.h>
|
|
#include "../../../../bl1/bl1_private.h"
|
|
|
|
#if USE_COHERENT_MEM
|
|
/*
|
|
* The next 2 constants identify the extents of the coherent memory region.
|
|
* These addresses are used by the MMU setup code and therefore they must be
|
|
* page-aligned. It is the responsibility of the linker script to ensure that
|
|
* __COHERENT_RAM_START__ and __COHERENT_RAM_END__ linker symbols
|
|
* refer to page-aligned addresses.
|
|
*/
|
|
#define BL1_COHERENT_RAM_BASE (unsigned long)(&__COHERENT_RAM_START__)
|
|
#define BL1_COHERENT_RAM_LIMIT (unsigned long)(&__COHERENT_RAM_END__)
|
|
#define BL2_COHERENT_RAM_BASE (unsigned long)(&__COHERENT_RAM_START__)
|
|
#define BL2_COHERENT_RAM_LIMIT (unsigned long)(&__COHERENT_RAM_END__)
|
|
|
|
#define BL31_COHERENT_RAM_BASE (uintptr_t)(&__COHERENT_RAM_START__)
|
|
#define BL31_COHERENT_RAM_LIMIT (uintptr_t)(&__COHERENT_RAM_END__)
|
|
#endif
|
|
|
|
#define SGI_MAP_FLASH0_RO MAP_REGION_FLAT(V2M_FLASH0_BASE,\
|
|
V2M_FLASH0_SIZE, \
|
|
MT_DEVICE | MT_RO | MT_SECURE)
|
|
/*
|
|
* Table of regions for different BL stages to map using the MMU.
|
|
* This doesn't include Trusted RAM as the 'mem_layout' argument passed to
|
|
* arm_configure_mmu_elx() will give the available subset of that.
|
|
*
|
|
* Replace or extend the below regions as required
|
|
*/
|
|
#if IMAGE_BL1
|
|
const mmap_region_t plat_arm_mmap[] = {
|
|
ARM_MAP_SHARED_RAM,
|
|
SGI_MAP_FLASH0_RO,
|
|
CSS_SGI_MAP_DEVICE,
|
|
SOC_CSS_MAP_DEVICE,
|
|
{0}
|
|
};
|
|
#endif
|
|
#if IMAGE_BL2
|
|
const mmap_region_t plat_arm_mmap[] = {
|
|
ARM_MAP_SHARED_RAM,
|
|
SGI_MAP_FLASH0_RO,
|
|
CSS_SGI_MAP_DEVICE,
|
|
SOC_CSS_MAP_DEVICE,
|
|
ARM_MAP_NS_DRAM1,
|
|
#if ARM_BL31_IN_DRAM
|
|
ARM_MAP_BL31_SEC_DRAM,
|
|
#endif
|
|
#if ENABLE_SPM
|
|
ARM_SP_IMAGE_MMAP,
|
|
#endif
|
|
#if TRUSTED_BOARD_BOOT && !BL2_AT_EL3
|
|
ARM_MAP_BL1_RW,
|
|
#endif
|
|
{0}
|
|
};
|
|
#endif
|
|
#if IMAGE_BL31
|
|
const mmap_region_t plat_arm_mmap[] = {
|
|
ARM_MAP_SHARED_RAM,
|
|
V2M_MAP_IOFPGA,
|
|
CSS_SGI_MAP_DEVICE,
|
|
SOC_CSS_MAP_DEVICE,
|
|
#if ENABLE_SPM
|
|
ARM_SPM_BUF_EL3_MMAP,
|
|
#endif
|
|
{0}
|
|
};
|
|
|
|
#if ENABLE_SPM && defined(IMAGE_BL31)
|
|
const mmap_region_t plat_arm_secure_partition_mmap[] = {
|
|
PLAT_ARM_SECURE_MAP_DEVICE,
|
|
ARM_SP_IMAGE_MMAP,
|
|
ARM_SP_IMAGE_NS_BUF_MMAP,
|
|
ARM_SP_CPER_BUF_MMAP,
|
|
ARM_SP_IMAGE_RW_MMAP,
|
|
ARM_SPM_BUF_EL0_MMAP,
|
|
{0}
|
|
};
|
|
#endif /* ENABLE_SPM && defined(IMAGE_BL31) */
|
|
#endif
|
|
|
|
ARM_CASSERT_MMAP
|
|
|
|
#if ENABLE_SPM && defined(IMAGE_BL31)
|
|
/*
|
|
* Boot information passed to a secure partition during initialisation. Linear
|
|
* indices in MP information will be filled at runtime.
|
|
*/
|
|
static secure_partition_mp_info_t sp_mp_info[] = {
|
|
[0] = {0x81000000, 0},
|
|
[1] = {0x81000100, 0},
|
|
[2] = {0x81000200, 0},
|
|
[3] = {0x81000300, 0},
|
|
[4] = {0x81010000, 0},
|
|
[5] = {0x81010100, 0},
|
|
[6] = {0x81010200, 0},
|
|
[7] = {0x81010300, 0},
|
|
};
|
|
|
|
const secure_partition_boot_info_t plat_arm_secure_partition_boot_info = {
|
|
.h.type = PARAM_SP_IMAGE_BOOT_INFO,
|
|
.h.version = VERSION_1,
|
|
.h.size = sizeof(secure_partition_boot_info_t),
|
|
.h.attr = 0,
|
|
.sp_mem_base = ARM_SP_IMAGE_BASE,
|
|
.sp_mem_limit = ARM_SP_IMAGE_LIMIT,
|
|
.sp_image_base = ARM_SP_IMAGE_BASE,
|
|
.sp_stack_base = PLAT_SP_IMAGE_STACK_BASE,
|
|
.sp_heap_base = ARM_SP_IMAGE_HEAP_BASE,
|
|
.sp_ns_comm_buf_base = ARM_SP_IMAGE_NS_BUF_BASE,
|
|
.sp_shared_buf_base = PLAT_SPM_BUF_BASE,
|
|
.sp_image_size = ARM_SP_IMAGE_SIZE,
|
|
.sp_pcpu_stack_size = PLAT_SP_IMAGE_STACK_PCPU_SIZE,
|
|
.sp_heap_size = ARM_SP_IMAGE_HEAP_SIZE,
|
|
.sp_ns_comm_buf_size = ARM_SP_IMAGE_NS_BUF_SIZE,
|
|
.sp_shared_buf_size = PLAT_SPM_BUF_SIZE,
|
|
.num_sp_mem_regions = ARM_SP_IMAGE_NUM_MEM_REGIONS,
|
|
.num_cpus = PLATFORM_CORE_COUNT,
|
|
.mp_info = &sp_mp_info[0],
|
|
};
|
|
|
|
const struct mmap_region *plat_get_secure_partition_mmap(void *cookie)
|
|
{
|
|
return plat_arm_secure_partition_mmap;
|
|
}
|
|
|
|
const struct secure_partition_boot_info *plat_get_secure_partition_boot_info(
|
|
void *cookie)
|
|
{
|
|
return &plat_arm_secure_partition_boot_info;
|
|
}
|
|
#endif /* ENABLE_SPM && defined(IMAGE_BL31) */
|
|
|
|
#if TRUSTED_BOARD_BOOT
|
|
int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size)
|
|
{
|
|
assert(heap_addr != NULL);
|
|
assert(heap_size != NULL);
|
|
|
|
return arm_get_mbedtls_heap(heap_addr, heap_size);
|
|
}
|
|
#endif
|