/* * Copyright (c) 2020-2023, Arm Limited. All rights reserved. * * SPDX-License-Identifier: BSD-3-Clause */ #ifndef PLATFORM_DEF_H #define PLATFORM_DEF_H #include #include #include #include #include #include #include #include #include #define PLATFORM_CORE_COUNT 8 #define PLAT_ARM_TRUSTED_SRAM_SIZE 0x00080000 /* 512 KB */ /* * The top 16MB of ARM_DRAM1 is configured as secure access only using the TZC, * its base is ARM_AP_TZC_DRAM1_BASE. * * Reserve 96 MB below ARM_AP_TZC_DRAM1_BASE for: * - BL32_BASE when SPD_spmd is enabled * - Region to load secure partitions * * * 0xF900_0000 ------------------ TC_TZC_DRAM1_BASE * | | * | SPMC | * | SP | * | (96MB) | * 0xFF00_0000 ------------------ ARM_AP_TZC_DRAM1_BASE * | AP | * | EL3 Monitor | * | SCP | * | (16MB) | * 0xFFFF_FFFF ------------------ * * */ #define TC_TZC_DRAM1_BASE (ARM_AP_TZC_DRAM1_BASE - \ TC_TZC_DRAM1_SIZE) #define TC_TZC_DRAM1_SIZE 96 * SZ_1M /* 96 MB */ #define TC_TZC_DRAM1_END (TC_TZC_DRAM1_BASE + \ TC_TZC_DRAM1_SIZE - 1) #define TC_NS_DRAM1_BASE ARM_DRAM1_BASE #define TC_NS_DRAM1_SIZE (ARM_DRAM1_SIZE - \ ARM_TZC_DRAM1_SIZE - \ TC_TZC_DRAM1_SIZE) #define TC_NS_DRAM1_END (TC_NS_DRAM1_BASE + \ TC_NS_DRAM1_SIZE - 1) /* * Mappings for TC DRAM1 (non-secure) and TC TZC DRAM1 (secure) */ #define TC_MAP_NS_DRAM1 MAP_REGION_FLAT( \ TC_NS_DRAM1_BASE, \ TC_NS_DRAM1_SIZE, \ MT_MEMORY | MT_RW | MT_NS) #define TC_MAP_TZC_DRAM1 MAP_REGION_FLAT( \ TC_TZC_DRAM1_BASE, \ TC_TZC_DRAM1_SIZE, \ MT_MEMORY | MT_RW | MT_SECURE) #define PLAT_HW_CONFIG_DTB_BASE ULL(0x83000000) #define PLAT_HW_CONFIG_DTB_SIZE ULL(0x8000) #define PLAT_DTB_DRAM_NS MAP_REGION_FLAT( \ PLAT_HW_CONFIG_DTB_BASE, \ PLAT_HW_CONFIG_DTB_SIZE, \ MT_MEMORY | MT_RO | MT_NS) /* * Max size of SPMC is 2MB for tc. With SPMD enabled this value corresponds to * max size of BL32 image. */ #if defined(SPD_spmd) #define TC_EL2SPMC_LOAD_ADDR (TC_TZC_DRAM1_BASE + 0x04000000) #define PLAT_ARM_SPMC_BASE TC_EL2SPMC_LOAD_ADDR #define PLAT_ARM_SPMC_SIZE UL(0x200000) /* 2 MB */ #endif /* * PLAT_ARM_MMAP_ENTRIES depends on the number of entries in the * plat_arm_mmap array defined for each BL stage. */ #if defined(IMAGE_BL31) # if SPM_MM # define PLAT_ARM_MMAP_ENTRIES 9 # define MAX_XLAT_TABLES 7 # define PLAT_SP_IMAGE_MMAP_REGIONS 7 # define PLAT_SP_IMAGE_MAX_XLAT_TABLES 10 # else # define PLAT_ARM_MMAP_ENTRIES 8 # define MAX_XLAT_TABLES 8 # endif #elif defined(IMAGE_BL32) # define PLAT_ARM_MMAP_ENTRIES 8 # define MAX_XLAT_TABLES 5 #elif !USE_ROMLIB # define PLAT_ARM_MMAP_ENTRIES 11 # define MAX_XLAT_TABLES 7 #else # define PLAT_ARM_MMAP_ENTRIES 12 # define MAX_XLAT_TABLES 6 #endif /* * PLAT_ARM_MAX_BL1_RW_SIZE is calculated using the current BL1 RW debug size * plus a little space for growth. */ #define PLAT_ARM_MAX_BL1_RW_SIZE 0x12000 /* * PLAT_ARM_MAX_ROMLIB_RW_SIZE is define to use a full page */ #if USE_ROMLIB #define PLAT_ARM_MAX_ROMLIB_RW_SIZE 0x1000 #define PLAT_ARM_MAX_ROMLIB_RO_SIZE 0xe000 #else #define PLAT_ARM_MAX_ROMLIB_RW_SIZE 0 #define PLAT_ARM_MAX_ROMLIB_RO_SIZE 0 #endif /* * PLAT_ARM_MAX_BL2_SIZE is calculated using the current BL2 debug size plus a * little space for growth. Current size is considering that TRUSTED_BOARD_BOOT * and MEASURED_BOOT is enabled. */ # define PLAT_ARM_MAX_BL2_SIZE 0x26000 /* * Since BL31 NOBITS overlays BL2 and BL1-RW, PLAT_ARM_MAX_BL31_SIZE is * calculated using the current BL31 PROGBITS debug size plus the sizes of * BL2 and BL1-RW. Current size is considering that TRUSTED_BOARD_BOOT and * MEASURED_BOOT is enabled. */ #define PLAT_ARM_MAX_BL31_SIZE 0x60000 /* * Size of cacheable stacks */ #if defined(IMAGE_BL1) # if TRUSTED_BOARD_BOOT # define PLATFORM_STACK_SIZE 0x1000 # else # define PLATFORM_STACK_SIZE 0x440 # endif #elif defined(IMAGE_BL2) # if TRUSTED_BOARD_BOOT # define PLATFORM_STACK_SIZE 0x1000 # else # define PLATFORM_STACK_SIZE 0x400 # endif #elif defined(IMAGE_BL2U) # define PLATFORM_STACK_SIZE 0x400 #elif defined(IMAGE_BL31) # if SPM_MM # define PLATFORM_STACK_SIZE 0x500 # else # define PLATFORM_STACK_SIZE 0xa00 # endif #elif defined(IMAGE_BL32) # define PLATFORM_STACK_SIZE 0x440 #endif /* * In the current implementation the RoT Service request that requires the * biggest message buffer is the RSS_DELEGATED_ATTEST_GET_PLATFORM_TOKEN. The * maximum required buffer size is calculated based on the platform-specific * needs of this request. */ #define PLAT_RSS_COMMS_PAYLOAD_MAX_SIZE 0x500 #define TC_DEVICE_BASE 0x21000000 #define TC_DEVICE_SIZE 0x5f000000 // TC_MAP_DEVICE covers different peripherals // available to the platform #define TC_MAP_DEVICE MAP_REGION_FLAT( \ TC_DEVICE_BASE, \ TC_DEVICE_SIZE, \ MT_DEVICE | MT_RW | MT_SECURE) #define TC_FLASH0_RO MAP_REGION_FLAT(V2M_FLASH0_BASE,\ V2M_FLASH0_SIZE, \ MT_DEVICE | MT_RO | MT_SECURE) #define PLAT_ARM_NSTIMER_FRAME_ID 0 #define PLAT_ARM_TRUSTED_ROM_BASE 0x0 /* PLAT_ARM_TRUSTED_ROM_SIZE 512KB minus ROM base. */ #define PLAT_ARM_TRUSTED_ROM_SIZE (0x00080000 - PLAT_ARM_TRUSTED_ROM_BASE) #define PLAT_ARM_NSRAM_BASE 0x06000000 #define PLAT_ARM_NSRAM_SIZE 0x00080000 /* 512KB */ #define PLAT_ARM_DRAM2_BASE ULL(0x8080000000) #define PLAT_ARM_DRAM2_SIZE ULL(0x180000000) #define PLAT_ARM_DRAM2_END (PLAT_ARM_DRAM2_BASE + PLAT_ARM_DRAM2_SIZE - 1ULL) #define PLAT_ARM_G1S_IRQ_PROPS(grp) CSS_G1S_IRQ_PROPS(grp) #define PLAT_ARM_G0_IRQ_PROPS(grp) ARM_G0_IRQ_PROPS(grp) #define PLAT_ARM_SP_IMAGE_STACK_BASE (PLAT_SP_IMAGE_NS_BUF_BASE + \ PLAT_SP_IMAGE_NS_BUF_SIZE) /******************************************************************************* * Memprotect definitions ******************************************************************************/ /* PSCI memory protect definitions: * This variable is stored in a non-secure flash because some ARM reference * platforms do not have secure NVRAM. Real systems that provided MEM_PROTECT * support must use a secure NVRAM to store the PSCI MEM_PROTECT definitions. */ #define PLAT_ARM_MEM_PROT_ADDR (V2M_FLASH0_BASE + \ V2M_FLASH0_SIZE - V2M_FLASH_BLOCK_SIZE) /*Secure Watchdog Constants */ #define SBSA_SECURE_WDOG_BASE UL(0x2A480000) #define SBSA_SECURE_WDOG_TIMEOUT UL(100) #define PLAT_ARM_SCMI_CHANNEL_COUNT 1 #define PLAT_ARM_CLUSTER_COUNT U(1) #define PLAT_MAX_CPUS_PER_CLUSTER U(8) #define PLAT_MAX_PE_PER_CPU U(1) /* Message Handling Unit (MHU) base addresses */ #define PLAT_CSS_MHU_BASE UL(0x45400000) #define PLAT_MHUV2_BASE PLAT_CSS_MHU_BASE /* TC2: AP<->RSS MHUs */ #define PLAT_RSS_AP_SND_MHU_BASE UL(0x2A840000) #define PLAT_RSS_AP_RCV_MHU_BASE UL(0x2A850000) #define CSS_SYSTEM_PWR_DMN_LVL ARM_PWR_LVL2 #define PLAT_MAX_PWR_LVL ARM_PWR_LVL1 /* * Physical and virtual address space limits for MMU in AARCH64 */ #define PLAT_PHY_ADDR_SPACE_SIZE (1ULL << 36) #define PLAT_VIRT_ADDR_SPACE_SIZE (1ULL << 36) /* GIC related constants */ #define PLAT_ARM_GICD_BASE UL(0x30000000) #define PLAT_ARM_GICC_BASE UL(0x2C000000) #define PLAT_ARM_GICR_BASE UL(0x30080000) /* * PLAT_CSS_MAX_SCP_BL2_SIZE is calculated using the current * SCP_BL2 size plus a little space for growth. */ #define PLAT_CSS_MAX_SCP_BL2_SIZE 0x20000 /* * PLAT_CSS_MAX_SCP_BL2U_SIZE is calculated using the current * SCP_BL2U size plus a little space for growth. */ #define PLAT_CSS_MAX_SCP_BL2U_SIZE 0x20000 /* TZC Related Constants */ #define PLAT_ARM_TZC_BASE UL(0x25000000) #define PLAT_ARM_TZC_FILTERS TZC_400_REGION_ATTR_FILTER_BIT(0) #define TZC400_OFFSET UL(0x1000000) #define TZC400_COUNT 4 #define TZC400_BASE(n) (PLAT_ARM_TZC_BASE + \ (n * TZC400_OFFSET)) #define TZC_NSAID_DEFAULT U(0) #define PLAT_ARM_TZC_NS_DEV_ACCESS \ (TZC_REGION_ACCESS_RDWR(TZC_NSAID_DEFAULT)) /* * The first region below, TC_TZC_DRAM1_BASE (0xf9000000) to * ARM_SCP_TZC_DRAM1_END (0xffffffff) will mark the last 112 MB of DRAM as * secure. The second and third regions gives non secure access to rest of DRAM. */ #define TC_TZC_REGIONS_DEF \ {TC_TZC_DRAM1_BASE, ARM_SCP_TZC_DRAM1_END, \ TZC_REGION_S_RDWR, PLAT_ARM_TZC_NS_DEV_ACCESS}, \ {TC_NS_DRAM1_BASE, TC_NS_DRAM1_END, ARM_TZC_NS_DRAM_S_ACCESS, \ PLAT_ARM_TZC_NS_DEV_ACCESS}, \ {PLAT_ARM_DRAM2_BASE, PLAT_ARM_DRAM2_END, \ ARM_TZC_NS_DRAM_S_ACCESS, PLAT_ARM_TZC_NS_DEV_ACCESS} /* virtual address used by dynamic mem_protect for chunk_base */ #define PLAT_ARM_MEM_PROTEC_VA_FRAME UL(0xc0000000) #if ARM_GPT_SUPPORT /* * This overrides the default PLAT_ARM_FIP_OFFSET_IN_GPT in board_css_def.h. * Offset of the FIP in the GPT image. BL1 component uses this option * as it does not load the partition table to get the FIP base * address. At sector 48 for TC to align with ATU page size boundaries (8KiB) * (i.e. after reserved sectors 0-47). * Offset = 48 * 512 = 0x6000 */ #undef PLAT_ARM_FIP_OFFSET_IN_GPT #define PLAT_ARM_FIP_OFFSET_IN_GPT 0x6000 #endif /* ARM_GPT_SUPPORT */ #endif /* PLATFORM_DEF_H */