mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-21 03:54:34 +00:00

This patch adds mapping for secure FLASH0 for qemu/virt and qemu/qemu_sbsa platforms. This change is targeted for sbsa but since both platforms share common code, changes in common defines was necessary. For qemu_sbsa, this patch adds necessary mapping in order to boot without semi-hosting from secure FLASH0. EFI need to stay in FLASH1 (share it with variables) since it need to "run in place" in non secure domain. Changes for this are under RFC at edk2-platforms mailing list: https://patches.linaro.org/patch/171327/ (edk2-platforms/Platform/Qemu/SbsaQemu/SbsaQemu.dsc). In docs qemu/virt is described as using semi-hosting, therefore this change should be orthogonal to existing assumptions while giving possibility to store both bl1 and fip in FLASH0 at some point (additional changes required for that). Signed-off-by: Radoslaw Biernacki <radoslaw.biernacki@linaro.org> Change-Id: I782bc3637c91c01eaee680b3c5c408e24b4b6e28
147 lines
3.6 KiB
C
147 lines
3.6 KiB
C
/*
|
|
* Copyright (c) 2015-2019, ARM Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <platform_def.h>
|
|
|
|
#include <arch_helpers.h>
|
|
#include <common/bl_common.h>
|
|
#include <lib/xlat_tables/xlat_tables_v2.h>
|
|
|
|
#include "qemu_private.h"
|
|
|
|
#define MAP_DEVICE0 MAP_REGION_FLAT(DEVICE0_BASE, \
|
|
DEVICE0_SIZE, \
|
|
MT_DEVICE | MT_RW | MT_SECURE)
|
|
|
|
#ifdef DEVICE1_BASE
|
|
#define MAP_DEVICE1 MAP_REGION_FLAT(DEVICE1_BASE, \
|
|
DEVICE1_SIZE, \
|
|
MT_DEVICE | MT_RW | MT_SECURE)
|
|
#endif
|
|
|
|
#ifdef DEVICE2_BASE
|
|
#define MAP_DEVICE2 MAP_REGION_FLAT(DEVICE2_BASE, \
|
|
DEVICE2_SIZE, \
|
|
MT_DEVICE | MT_RO | MT_SECURE)
|
|
#endif
|
|
|
|
#define MAP_SHARED_RAM MAP_REGION_FLAT(SHARED_RAM_BASE, \
|
|
SHARED_RAM_SIZE, \
|
|
MT_DEVICE | MT_RW | MT_SECURE)
|
|
|
|
#define MAP_BL32_MEM MAP_REGION_FLAT(BL32_MEM_BASE, BL32_MEM_SIZE, \
|
|
MT_MEMORY | MT_RW | MT_SECURE)
|
|
|
|
#define MAP_NS_DRAM0 MAP_REGION_FLAT(NS_DRAM0_BASE, NS_DRAM0_SIZE, \
|
|
MT_MEMORY | MT_RW | MT_NS)
|
|
|
|
#define MAP_FLASH0 MAP_REGION_FLAT(QEMU_FLASH0_BASE, QEMU_FLASH0_SIZE, \
|
|
MT_MEMORY | MT_RO | MT_SECURE)
|
|
|
|
#define MAP_FLASH1 MAP_REGION_FLAT(QEMU_FLASH1_BASE, QEMU_FLASH1_SIZE, \
|
|
MT_MEMORY | MT_RO | MT_SECURE)
|
|
|
|
/*
|
|
* Table of regions for various BL stages to map using the MMU.
|
|
* This doesn't include TZRAM as the 'mem_layout' argument passed to
|
|
* arm_configure_mmu_elx() will give the available subset of that,
|
|
*/
|
|
#ifdef IMAGE_BL1
|
|
static const mmap_region_t plat_qemu_mmap[] = {
|
|
MAP_FLASH0,
|
|
MAP_FLASH1,
|
|
MAP_SHARED_RAM,
|
|
MAP_DEVICE0,
|
|
#ifdef MAP_DEVICE1
|
|
MAP_DEVICE1,
|
|
#endif
|
|
#ifdef MAP_DEVICE2
|
|
MAP_DEVICE2,
|
|
#endif
|
|
{0}
|
|
};
|
|
#endif
|
|
#ifdef IMAGE_BL2
|
|
static const mmap_region_t plat_qemu_mmap[] = {
|
|
MAP_FLASH0,
|
|
MAP_FLASH1,
|
|
MAP_SHARED_RAM,
|
|
MAP_DEVICE0,
|
|
#ifdef MAP_DEVICE1
|
|
MAP_DEVICE1,
|
|
#endif
|
|
#ifdef MAP_DEVICE2
|
|
MAP_DEVICE2,
|
|
#endif
|
|
MAP_NS_DRAM0,
|
|
MAP_BL32_MEM,
|
|
{0}
|
|
};
|
|
#endif
|
|
#ifdef IMAGE_BL31
|
|
static const mmap_region_t plat_qemu_mmap[] = {
|
|
MAP_SHARED_RAM,
|
|
MAP_DEVICE0,
|
|
#ifdef MAP_DEVICE1
|
|
MAP_DEVICE1,
|
|
#endif
|
|
MAP_BL32_MEM,
|
|
{0}
|
|
};
|
|
#endif
|
|
#ifdef IMAGE_BL32
|
|
static const mmap_region_t plat_qemu_mmap[] = {
|
|
MAP_SHARED_RAM,
|
|
MAP_DEVICE0,
|
|
#ifdef MAP_DEVICE1
|
|
MAP_DEVICE1,
|
|
#endif
|
|
{0}
|
|
};
|
|
#endif
|
|
|
|
/*******************************************************************************
|
|
* Macro generating the code for the function setting up the pagetables as per
|
|
* the platform memory map & initialize the mmu, for the given exception level
|
|
******************************************************************************/
|
|
|
|
#define DEFINE_CONFIGURE_MMU_EL(_el) \
|
|
void qemu_configure_mmu_##_el(unsigned long total_base, \
|
|
unsigned long total_size, \
|
|
unsigned long code_start, \
|
|
unsigned long code_limit, \
|
|
unsigned long ro_start, \
|
|
unsigned long ro_limit, \
|
|
unsigned long coh_start, \
|
|
unsigned long coh_limit) \
|
|
{ \
|
|
mmap_add_region(total_base, total_base, \
|
|
total_size, \
|
|
MT_MEMORY | MT_RW | MT_SECURE); \
|
|
mmap_add_region(code_start, code_start, \
|
|
code_limit - code_start, \
|
|
MT_CODE | MT_SECURE); \
|
|
mmap_add_region(ro_start, ro_start, \
|
|
ro_limit - ro_start, \
|
|
MT_RO_DATA | MT_SECURE); \
|
|
mmap_add_region(coh_start, coh_start, \
|
|
coh_limit - coh_start, \
|
|
MT_DEVICE | MT_RW | MT_SECURE); \
|
|
mmap_add(plat_qemu_mmap); \
|
|
init_xlat_tables(); \
|
|
\
|
|
enable_mmu_##_el(0); \
|
|
}
|
|
|
|
/* Define EL1 and EL3 variants of the function initialising the MMU */
|
|
#ifdef __aarch64__
|
|
DEFINE_CONFIGURE_MMU_EL(el1)
|
|
DEFINE_CONFIGURE_MMU_EL(el3)
|
|
#else
|
|
DEFINE_CONFIGURE_MMU_EL(svc_mon)
|
|
#endif
|
|
|
|
|