mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-08-17 09:57:01 +02:00
The BL1 stage setup code for ARM platforms sets up the SP805 watchdog controller as the secure watchdog. But not all ARM platforms use SP805 as the secure watchdog controller. So introduce two new ARM platform code specific wrapper functions to start and stop the secure watchdog. These functions then replace the calls to SP805 driver in common BL1 setup code. All the ARM platforms implement these wrapper functions by either calling into SP805 driver or the SBSA watchdog driver. Change-Id: I1a9a11b124cf3fac2a84f22ca40acd440a441257 Signed-off-by: Aditya Angadi <aditya.angadi@arm.com>
154 lines
3.8 KiB
C
154 lines
3.8 KiB
C
/*
|
|
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <assert.h>
|
|
|
|
#include <platform_def.h>
|
|
|
|
#include <common/bl_common.h>
|
|
#include <common/debug.h>
|
|
#include <drivers/arm/ccn.h>
|
|
#include <plat/arm/common/plat_arm.h>
|
|
#include <plat/common/platform.h>
|
|
#include <drivers/arm/sbsa.h>
|
|
#include <sgi_base_platform_def.h>
|
|
#include <services/secure_partition.h>
|
|
|
|
#define SGI_MAP_FLASH0_RO MAP_REGION_FLAT(V2M_FLASH0_BASE,\
|
|
V2M_FLASH0_SIZE, \
|
|
MT_DEVICE | MT_RO | MT_SECURE)
|
|
/*
|
|
* Table of regions for different BL stages to map using the MMU.
|
|
* This doesn't include Trusted RAM as the 'mem_layout' argument passed to
|
|
* arm_configure_mmu_elx() will give the available subset of that.
|
|
*
|
|
* Replace or extend the below regions as required
|
|
*/
|
|
#if IMAGE_BL1
|
|
const mmap_region_t plat_arm_mmap[] = {
|
|
ARM_MAP_SHARED_RAM,
|
|
SGI_MAP_FLASH0_RO,
|
|
CSS_SGI_MAP_DEVICE,
|
|
SOC_CSS_MAP_DEVICE,
|
|
{0}
|
|
};
|
|
#endif
|
|
#if IMAGE_BL2
|
|
const mmap_region_t plat_arm_mmap[] = {
|
|
ARM_MAP_SHARED_RAM,
|
|
SGI_MAP_FLASH0_RO,
|
|
CSS_SGI_MAP_DEVICE,
|
|
SOC_CSS_MAP_DEVICE,
|
|
ARM_MAP_NS_DRAM1,
|
|
#if ARM_BL31_IN_DRAM
|
|
ARM_MAP_BL31_SEC_DRAM,
|
|
#endif
|
|
#if ENABLE_SPM
|
|
ARM_SP_IMAGE_MMAP,
|
|
#endif
|
|
#if TRUSTED_BOARD_BOOT && !BL2_AT_EL3
|
|
ARM_MAP_BL1_RW,
|
|
#endif
|
|
{0}
|
|
};
|
|
#endif
|
|
#if IMAGE_BL31
|
|
const mmap_region_t plat_arm_mmap[] = {
|
|
ARM_MAP_SHARED_RAM,
|
|
V2M_MAP_IOFPGA,
|
|
CSS_SGI_MAP_DEVICE,
|
|
SOC_CSS_MAP_DEVICE,
|
|
#if ENABLE_SPM
|
|
ARM_SPM_BUF_EL3_MMAP,
|
|
#endif
|
|
{0}
|
|
};
|
|
|
|
#if ENABLE_SPM && defined(IMAGE_BL31)
|
|
const mmap_region_t plat_arm_secure_partition_mmap[] = {
|
|
PLAT_ARM_SECURE_MAP_DEVICE,
|
|
ARM_SP_IMAGE_MMAP,
|
|
ARM_SP_IMAGE_NS_BUF_MMAP,
|
|
ARM_SP_CPER_BUF_MMAP,
|
|
ARM_SP_IMAGE_RW_MMAP,
|
|
ARM_SPM_BUF_EL0_MMAP,
|
|
{0}
|
|
};
|
|
#endif /* ENABLE_SPM && defined(IMAGE_BL31) */
|
|
#endif
|
|
|
|
ARM_CASSERT_MMAP
|
|
|
|
#if ENABLE_SPM && defined(IMAGE_BL31)
|
|
/*
|
|
* Boot information passed to a secure partition during initialisation. Linear
|
|
* indices in MP information will be filled at runtime.
|
|
*/
|
|
static secure_partition_mp_info_t sp_mp_info[] = {
|
|
[0] = {0x81000000, 0},
|
|
[1] = {0x81000100, 0},
|
|
[2] = {0x81000200, 0},
|
|
[3] = {0x81000300, 0},
|
|
[4] = {0x81010000, 0},
|
|
[5] = {0x81010100, 0},
|
|
[6] = {0x81010200, 0},
|
|
[7] = {0x81010300, 0},
|
|
};
|
|
|
|
const secure_partition_boot_info_t plat_arm_secure_partition_boot_info = {
|
|
.h.type = PARAM_SP_IMAGE_BOOT_INFO,
|
|
.h.version = VERSION_1,
|
|
.h.size = sizeof(secure_partition_boot_info_t),
|
|
.h.attr = 0,
|
|
.sp_mem_base = ARM_SP_IMAGE_BASE,
|
|
.sp_mem_limit = ARM_SP_IMAGE_LIMIT,
|
|
.sp_image_base = ARM_SP_IMAGE_BASE,
|
|
.sp_stack_base = PLAT_SP_IMAGE_STACK_BASE,
|
|
.sp_heap_base = ARM_SP_IMAGE_HEAP_BASE,
|
|
.sp_ns_comm_buf_base = PLAT_SP_IMAGE_NS_BUF_BASE,
|
|
.sp_shared_buf_base = PLAT_SPM_BUF_BASE,
|
|
.sp_image_size = ARM_SP_IMAGE_SIZE,
|
|
.sp_pcpu_stack_size = PLAT_SP_IMAGE_STACK_PCPU_SIZE,
|
|
.sp_heap_size = ARM_SP_IMAGE_HEAP_SIZE,
|
|
.sp_ns_comm_buf_size = PLAT_SP_IMAGE_NS_BUF_SIZE,
|
|
.sp_shared_buf_size = PLAT_SPM_BUF_SIZE,
|
|
.num_sp_mem_regions = ARM_SP_IMAGE_NUM_MEM_REGIONS,
|
|
.num_cpus = PLATFORM_CORE_COUNT,
|
|
.mp_info = &sp_mp_info[0],
|
|
};
|
|
|
|
const struct mmap_region *plat_get_secure_partition_mmap(void *cookie)
|
|
{
|
|
return plat_arm_secure_partition_mmap;
|
|
}
|
|
|
|
const struct secure_partition_boot_info *plat_get_secure_partition_boot_info(
|
|
void *cookie)
|
|
{
|
|
return &plat_arm_secure_partition_boot_info;
|
|
}
|
|
#endif /* ENABLE_SPM && defined(IMAGE_BL31) */
|
|
|
|
#if TRUSTED_BOARD_BOOT
|
|
int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size)
|
|
{
|
|
assert(heap_addr != NULL);
|
|
assert(heap_size != NULL);
|
|
|
|
return arm_get_mbedtls_heap(heap_addr, heap_size);
|
|
}
|
|
#endif
|
|
|
|
void plat_arm_secure_wdt_start(void)
|
|
{
|
|
sbsa_wdog_start(SBSA_SECURE_WDOG_BASE, SBSA_SECURE_WDOG_TIMEOUT);
|
|
}
|
|
|
|
void plat_arm_secure_wdt_stop(void)
|
|
{
|
|
sbsa_wdog_stop(SBSA_SECURE_WDOG_BASE);
|
|
}
|