mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-18 02:24:18 +00:00

The purpose of platform_is_primary_cpu() is to determine after reset (BL1 or BL3-1 with reset handler) if the current CPU must follow the cold boot path (primary CPU), or wait in a safe state (secondary CPU) until the primary CPU has finished the system initialization. This patch removes redundant calls to platform_is_primary_cpu() in subsequent bootloader entrypoints since the reset handler already guarantees that code is executed exclusively on the primary CPU. Additionally, this patch removes the weak definition of platform_is_primary_cpu(), so the implementation of this function becomes mandatory. Removing the weak symbol avoids other bootloaders accidentally picking up an invalid definition in case the porting layer makes the real function available only to BL1. The define PRIMARY_CPU is no longer mandatory in the platform porting because platform_is_primary_cpu() hides the implementation details (for instance, there may be platforms that report the primary CPU in a system register). The primary CPU definition in FVP has been moved to fvp_def.h. The porting guide has been updated accordingly. Fixes ARM-software/tf-issues#219 Change-Id: If675a1de8e8d25122b7fef147cb238d939f90b5e
184 lines
7.3 KiB
C
184 lines
7.3 KiB
C
/*
|
|
* Copyright (c) 2014, ARM Limited and Contributors. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions are met:
|
|
*
|
|
* Redistributions of source code must retain the above copyright notice, this
|
|
* list of conditions and the following disclaimer.
|
|
*
|
|
* Redistributions in binary form must reproduce the above copyright notice,
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
* and/or other materials provided with the distribution.
|
|
*
|
|
* Neither the name of ARM nor the names of its contributors may be used
|
|
* to endorse or promote products derived from this software without specific
|
|
* prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#ifndef __PLATFORM_DEF_H__
|
|
#define __PLATFORM_DEF_H__
|
|
|
|
#include <arch.h>
|
|
|
|
|
|
/*******************************************************************************
|
|
* Platform binary types for linking
|
|
******************************************************************************/
|
|
#define PLATFORM_LINKER_FORMAT "elf64-littleaarch64"
|
|
#define PLATFORM_LINKER_ARCH aarch64
|
|
|
|
/*******************************************************************************
|
|
* Generic platform constants
|
|
******************************************************************************/
|
|
|
|
/* Size of cacheable stacks */
|
|
#define PLATFORM_STACK_SIZE 0x800
|
|
|
|
#define FIRMWARE_WELCOME_STR "Booting trusted firmware boot loader stage 1\n\r"
|
|
|
|
/* Trusted Boot Firmware BL2 */
|
|
#define BL2_IMAGE_NAME "bl2.bin"
|
|
|
|
/* EL3 Runtime Firmware BL31 */
|
|
#define BL31_IMAGE_NAME "bl31.bin"
|
|
|
|
/* Secure Payload BL32 (Trusted OS) */
|
|
#define BL32_IMAGE_NAME "bl32.bin"
|
|
|
|
/* Non-Trusted Firmware BL33 */
|
|
#define BL33_IMAGE_NAME "bl33.bin" /* e.g. UEFI */
|
|
|
|
#define PLATFORM_CACHE_LINE_SIZE 64
|
|
#define PLATFORM_CLUSTER_COUNT 2ull
|
|
#define PLATFORM_CLUSTER0_CORE_COUNT 4
|
|
#define PLATFORM_CLUSTER1_CORE_COUNT 4
|
|
#define PLATFORM_CORE_COUNT (PLATFORM_CLUSTER1_CORE_COUNT + \
|
|
PLATFORM_CLUSTER0_CORE_COUNT)
|
|
#define PLATFORM_MAX_CPUS_PER_CLUSTER 4
|
|
#define PLATFORM_NUM_AFFS (PLATFORM_CLUSTER_COUNT + \
|
|
PLATFORM_CORE_COUNT)
|
|
#define MAX_IO_DEVICES 3
|
|
#define MAX_IO_HANDLES 4
|
|
|
|
/*******************************************************************************
|
|
* Platform memory map related constants
|
|
******************************************************************************/
|
|
#define TZROM_BASE 0x00000000
|
|
#define TZROM_SIZE 0x04000000
|
|
|
|
#define TZRAM_BASE 0x04000000
|
|
#define TZRAM_SIZE 0x40000
|
|
|
|
/* Location of trusted dram on the base fvp */
|
|
#define TZDRAM_BASE 0x06000000
|
|
#define TZDRAM_SIZE 0x02000000
|
|
|
|
/*******************************************************************************
|
|
* BL1 specific defines.
|
|
* BL1 RW data is relocated from ROM to RAM at runtime so we need 2 sets of
|
|
* addresses.
|
|
******************************************************************************/
|
|
#define BL1_RO_BASE TZROM_BASE
|
|
#define BL1_RO_LIMIT (TZROM_BASE + TZROM_SIZE)
|
|
/*
|
|
* Put BL1 RW at the top of the Trusted SRAM. BL1_RW_BASE is calculated using
|
|
* the current BL1 RW debug size plus a little space for growth.
|
|
*/
|
|
#define BL1_RW_BASE (TZRAM_BASE + TZRAM_SIZE - 0x6000)
|
|
#define BL1_RW_LIMIT (TZRAM_BASE + TZRAM_SIZE)
|
|
|
|
/*******************************************************************************
|
|
* BL2 specific defines.
|
|
******************************************************************************/
|
|
/*
|
|
* Put BL2 just below BL3-1. BL2_BASE is calculated using the current BL2 debug
|
|
* size plus a little space for growth.
|
|
*/
|
|
#define BL2_BASE (BL31_BASE - 0xC000)
|
|
#define BL2_LIMIT BL31_BASE
|
|
|
|
/*******************************************************************************
|
|
* BL31 specific defines.
|
|
******************************************************************************/
|
|
/*
|
|
* Put BL3-1 at the top of the Trusted SRAM. BL31_BASE is calculated using the
|
|
* current BL3-1 debug size plus a little space for growth.
|
|
*/
|
|
#define BL31_BASE (TZRAM_BASE + TZRAM_SIZE - 0x1D000)
|
|
#define BL31_PROGBITS_LIMIT BL1_RW_BASE
|
|
#define BL31_LIMIT (TZRAM_BASE + TZRAM_SIZE)
|
|
|
|
/*******************************************************************************
|
|
* BL32 specific defines.
|
|
******************************************************************************/
|
|
/*
|
|
* On FVP, the TSP can execute either from Trusted SRAM or Trusted DRAM.
|
|
*/
|
|
#define TSP_IN_TZRAM 0
|
|
#define TSP_IN_TZDRAM 1
|
|
|
|
#if TSP_RAM_LOCATION_ID == TSP_IN_TZRAM
|
|
# define TSP_SEC_MEM_BASE TZRAM_BASE
|
|
# define TSP_SEC_MEM_SIZE TZRAM_SIZE
|
|
# define BL32_BASE TZRAM_BASE
|
|
# define BL32_PROGBITS_LIMIT BL2_BASE
|
|
# define BL32_LIMIT BL31_BASE
|
|
#elif TSP_RAM_LOCATION_ID == TSP_IN_TZDRAM
|
|
# define TSP_SEC_MEM_BASE TZDRAM_BASE
|
|
# define TSP_SEC_MEM_SIZE TZDRAM_SIZE
|
|
# define BL32_BASE (TZDRAM_BASE + 0x2000)
|
|
# define BL32_LIMIT (TZDRAM_BASE + (1 << 21))
|
|
#else
|
|
# error "Unsupported TSP_RAM_LOCATION_ID value"
|
|
#endif
|
|
|
|
/*******************************************************************************
|
|
* Platform specific page table and MMU setup constants
|
|
******************************************************************************/
|
|
#define ADDR_SPACE_SIZE (1ull << 32)
|
|
#define MAX_XLAT_TABLES 2
|
|
#define MAX_MMAP_REGIONS 16
|
|
|
|
/*******************************************************************************
|
|
* ID of the secure physical generic timer interrupt.
|
|
******************************************************************************/
|
|
#define IRQ_SEC_PHY_TIMER 29
|
|
|
|
/*******************************************************************************
|
|
* CCI-400 related constants
|
|
******************************************************************************/
|
|
#define CCI400_BASE 0x2c090000
|
|
#define CCI400_SL_IFACE_CLUSTER0 3
|
|
#define CCI400_SL_IFACE_CLUSTER1 4
|
|
#define CCI400_SL_IFACE_INDEX(mpidr) (mpidr & MPIDR_CLUSTER_MASK ? \
|
|
CCI400_SL_IFACE_CLUSTER1 : \
|
|
CCI400_SL_IFACE_CLUSTER0)
|
|
|
|
|
|
/*******************************************************************************
|
|
* Declarations and constants to access the mailboxes safely. Each mailbox is
|
|
* aligned on the biggest cache line size in the platform. This is known only
|
|
* to the platform as it might have a combination of integrated and external
|
|
* caches. Such alignment ensures that two maiboxes do not sit on the same cache
|
|
* line at any cache level. They could belong to different cpus/clusters &
|
|
* get written while being protected by different locks causing corruption of
|
|
* a valid mailbox address.
|
|
******************************************************************************/
|
|
#define CACHE_WRITEBACK_SHIFT 6
|
|
#define CACHE_WRITEBACK_GRANULE (1 << CACHE_WRITEBACK_SHIFT)
|
|
|
|
|
|
#endif /* __PLATFORM_DEF_H__ */
|