Merge changes from topic "raspberry-pi-4-support" into integration
authorSoby Mathew <soby.mathew@arm.com>
Fri, 27 Sep 2019 09:45:42 +0000 (09:45 +0000)
committerTrustedFirmware Code Review <review@review.trustedfirmware.org>
Fri, 27 Sep 2019 09:45:42 +0000 (09:45 +0000)
* changes:
  rpi4: Add initial documentation file
  rpi4: Add stdout-path to device tree
  rpi4: Add GIC maintenance interrupt to GIC DT node
  rpi4: Cleanup memory regions, move pens to first page
  rpi4: Reserve resident BL31 region from non-secure world
  rpi4: Amend DTB to advertise PSCI
  rpi4: Determine BL33 entry point at runtime
  rpi4: Accommodate "armstub8.bin" header at the beginning of BL31 image
  Add basic support for Raspberry Pi 4
  rpi3: Allow runtime determination of UART base clock rate
  FDT helper functions: Respect architecture in PSCI function IDs
  FDT helper functions: Add function documentation

45 files changed:
docs/getting_started/porting-guide.rst
docs/plat/index.rst
docs/plat/marvell/build.rst [new file with mode: 0644]
docs/plat/marvell/build.txt [deleted file]
docs/plat/marvell/index.rst [new file with mode: 0644]
docs/plat/marvell/misc/mvebu-a8k-addr-map.rst [new file with mode: 0644]
docs/plat/marvell/misc/mvebu-a8k-addr-map.txt [deleted file]
docs/plat/marvell/misc/mvebu-amb.rst [new file with mode: 0644]
docs/plat/marvell/misc/mvebu-amb.txt [deleted file]
docs/plat/marvell/misc/mvebu-ccu.rst [new file with mode: 0644]
docs/plat/marvell/misc/mvebu-ccu.txt [deleted file]
docs/plat/marvell/misc/mvebu-io-win.rst [new file with mode: 0644]
docs/plat/marvell/misc/mvebu-io-win.txt [deleted file]
docs/plat/marvell/misc/mvebu-iob.rst [new file with mode: 0644]
docs/plat/marvell/misc/mvebu-iob.txt [deleted file]
docs/plat/marvell/porting.rst [new file with mode: 0644]
docs/plat/marvell/porting.txt [deleted file]
drivers/arm/gic/v3/gicv3_main.c
drivers/partition/gpt.c
drivers/partition/partition.c
include/drivers/arm/gicv3.h
include/drivers/partition/gpt.h
include/drivers/partition/partition.h
include/lib/psci/psci.h
include/plat/arm/css/common/css_pm.h
lib/psci/psci_on.c
plat/arm/board/fvp/fvp_pm.c
plat/arm/board/fvp/fvp_trusted_boot.c
plat/arm/common/arm_gicv3.c
plat/arm/css/common/css_pm.c
plat/hisilicon/hikey/hikey_bl2_setup.c
plat/hisilicon/hikey/hikey_io_storage.c
plat/hisilicon/hikey/hikey_private.h
plat/hisilicon/hikey/include/hikey_def.h
plat/hisilicon/hikey/platform.mk
plat/hisilicon/hikey960/hikey960_bl2_setup.c
plat/hisilicon/hikey960/hikey960_def.h
plat/hisilicon/hikey960/hikey960_io_storage.c
plat/hisilicon/hikey960/hikey960_private.h
plat/hisilicon/hikey960/platform.mk
plat/rockchip/px30/include/platform_def.h
plat/rockchip/rk3288/include/shared/bl32_param.h
plat/rockchip/rk3328/include/platform_def.h
plat/rockchip/rk3368/include/platform_def.h
plat/rockchip/rk3399/include/shared/bl31_param.h

index 5786dd38495f69323dd3ff6ee4a9ee5c9a8c4ce3..9eb7c17e15c2827ce287b2674375c014b3f3c81e 100644 (file)
@@ -546,6 +546,13 @@ optionally be defined:
    PLAT_PARTITION_MAX_ENTRIES := 12
    $(eval $(call add_define,PLAT_PARTITION_MAX_ENTRIES))
 
+-  **PLAT_PARTITION_BLOCK_SIZE**
+   The size of partition block. It could be either 512 bytes or 4096 bytes.
+   The default value is 512.
+   `For example, define the build flag in platform.mk`_:
+   PLAT_PARTITION_BLOCK_SIZE := 4096
+   $(eval $(call add_define,PLAT_PARTITION_BLOCK_SIZE))
+
 The following constant is optional. It should be defined to override the default
 behaviour of the ``assert()`` function (for example, to save memory).
 
@@ -2202,6 +2209,19 @@ immediately before the CPU was turned on. It indicates which power domains
 above the CPU might require initialization due to having previously been in
 low power states. The generic code expects the handler to succeed.
 
+plat_psci_ops.pwr_domain_on_finish_late() [optional]
+...........................................................
+
+This optional function is called by the PSCI implementation after the calling
+CPU is fully powered on with respective data caches enabled. The calling CPU and
+the associated cluster are guaranteed to be participating in coherency. This
+function gives the flexibility to perform any platform-specific actions safely,
+such as initialization or modification of shared data structures, without the
+overhead of explicit cache maintainace operations.
+
+The ``target_state`` has a similar meaning as described in the ``pwr_domain_on_finish()``
+operation. The generic code expects the handler to succeed.
+
 plat_psci_ops.pwr_domain_suspend_finish()
 .........................................
 
index 5951413729133daf9f9043bebf4c1bfc53773911..eaeee84f3dd082f6231a207aae6b861c2f36c5e5 100644 (file)
@@ -12,6 +12,7 @@ Platform Ports
    imx8m
    intel-stratix10
    ls1043a
+   marvell/index
    meson-gxbb
    meson-gxl
    mt8183
diff --git a/docs/plat/marvell/build.rst b/docs/plat/marvell/build.rst
new file mode 100644 (file)
index 0000000..c8923e4
--- /dev/null
@@ -0,0 +1,254 @@
+TF-A Build Instructions for Marvell Platforms
+=============================================
+
+This section describes how to compile the Trusted Firmware-A (TF-A) project for Marvell's platforms.
+
+Build Instructions
+------------------
+(1) Set the cross compiler
+
+    .. code:: shell
+
+        > export CROSS_COMPILE=/path/to/toolchain/aarch64-linux-gnu-
+
+(2) Set path for FIP images:
+
+Set U-Boot image path (relatively to TF-A root or absolute path)
+
+    .. code:: shell
+
+        > export BL33=path/to/u-boot.bin
+
+For example: if U-Boot project (and its images) is located at ``~/project/u-boot``,
+BL33 should be ``~/project/u-boot/u-boot.bin``
+
+    .. note::
+
+       *u-boot.bin* should be used and not *u-boot-spl.bin*
+
+Set MSS/SCP image path (mandatory only for Armada80x0)
+
+    .. code:: shell
+
+        > export SCP_BL2=path/to/mrvl_scp_bl2*.img
+
+(3) Armada-37x0 build requires WTP tools installation.
+
+See below in the section "Tools and external components installation".
+Install ARM 32-bit cross compiler, which is required for building WTMI image for CM3
+
+    .. code:: shell
+
+        > sudo apt-get install gcc-arm-linux-gnueabi
+
+(4) Clean previous build residuals (if any)
+
+    .. code:: shell
+
+        > make distclean
+
+(5) Build TF-A
+
+There are several build options:
+
+- DEBUG
+
+        Default is without debug information (=0). in order to enable it use ``DEBUG=1``.
+        Must be disabled when building UART recovery images due to current console driver
+        implementation that is not compatible with Xmodem protocol used for boot image download.
+
+- LOG_LEVEL
+
+        Defines the level of logging which will be purged to the default output port.
+
+        LOG_LEVEL_NONE         0
+        LOG_LEVEL_ERROR                10
+        LOG_LEVEL_NOTICE       20
+        LOG_LEVEL_WARNING      30
+        LOG_LEVEL_INFO         40
+        LOG_LEVEL_VERBOSE      50
+
+- USE_COHERENT_MEM
+
+        This flag determines whether to include the coherent memory region in the
+        BL memory map or not.
+
+- LLC_ENABLE
+
+        Flag defining the LLC (L3) cache state. The cache is enabled by default (``LLC_ENABLE=1``).
+
+- MARVELL_SECURE_BOOT
+
+        Build trusted(=1)/non trusted(=0) image, default is non trusted.
+
+- BLE_PATH
+
+        Points to BLE (Binary ROM extension) sources folder. Only required for A8K builds.
+        The parameter is optional, its default value is ``plat/marvell/a8k/common/ble``.
+
+- MV_DDR_PATH
+
+        For A7/8K, use this parameter to point to mv_ddr driver sources to allow BLE build. For A37x0,
+        it is used for ddr_tool build.
+
+        Usage example: MV_DDR_PATH=path/to/mv_ddr
+
+        The parameter is optional for A7/8K, when this parameter is not set, the mv_ddr
+        sources are expected to be located at: drivers/marvell/mv_ddr. However, the parameter
+        is necessary for A37x0.
+
+        For the mv_ddr source location, check the section "Tools and external components installation"
+
+- DDR_TOPOLOGY
+
+        For Armada37x0 only, the DDR topology map index/name, default is 0.
+
+        Supported Options:
+            - DDR3 1CS (0): DB-88F3720-DDR3-Modular (512MB); EspressoBIN (512MB)
+            - DDR4 1CS (1): DB-88F3720-DDR4-Modular (512MB)
+            - DDR3 2CS (2): EspressoBIN V3-V5 (1GB)
+            - DDR4 2CS (3): DB-88F3720-DDR4-Modular (4GB)
+            - DDR3 1CS (4): DB-88F3720-DDR3-Modular (1GB)
+            - DDR4 1CS (5): EspressoBin V7 (1GB)
+            - DDR4 2CS (6): EspressoBin V7 (2GB)
+            - CUSTOMER (CUST): Customer board, DDR3 1CS 512MB
+
+- CLOCKSPRESET
+
+        For Armada37x0 only, the clock tree configuration preset including CPU and DDR frequency,
+        default is CPU_800_DDR_800.
+
+            - CPU_600_DDR_600  -       CPU at 600 MHz, DDR at 600 MHz
+            - CPU_800_DDR_800  -       CPU at 800 MHz, DDR at 800 MHz
+            - CPU_1000_DDR_800 -       CPU at 1000 MHz, DDR at 800 MHz
+            - CPU_1200_DDR_750 -       CPU at 1200 MHz, DDR at 750 MHz
+
+- BOOTDEV
+
+        For Armada37x0 only, the flash boot device, default is ``SPINOR``.
+
+        Currently, Armada37x0 only supports ``SPINOR``, ``SPINAND``, ``EMMCNORM`` and ``SATA``:
+
+            - SPINOR - SPI NOR flash boot
+            - SPINAND - SPI NAND flash boot
+            - EMMCNORM - eMMC Download Mode
+
+                Download boot loader or program code from eMMC flash into CM3 or CA53
+                Requires full initialization and command sequence
+
+            - SATA - SATA device boot
+
+- PARTNUM
+
+        For Armada37x0 only, the boot partition number, default is 0.
+
+        To boot from eMMC, the value should be aligned with the parameter in
+        U-Boot with name of ``CONFIG_SYS_MMC_ENV_PART``, whose value by default is
+        1. For details about CONFIG_SYS_MMC_ENV_PART, please refer to the U-Boot
+        build instructions.
+
+- WTMI_IMG
+
+        For Armada37x0 only, the path of the WTMI image can point to an image which
+        does nothing, an image which supports EFUSE or a customized CM3 firmware
+        binary. The default image is wtmi.bin that built from sources in WTP
+        folder, which is the next option. If the default image is OK, then this
+        option should be skipped.
+
+- WTP
+
+    For Armada37x0 only, use this parameter to point to wtptools source code
+    directory, which can be found as a3700_utils.zip in the release. Usage
+    example: ``WTP=/path/to/a3700_utils``
+
+    For example, in order to build the image in debug mode with log level up to 'notice' level run
+
+    .. code:: shell
+
+        > make DEBUG=1 USE_COHERENT_MEM=0 LOG_LEVEL=20 PLAT=<MARVELL_PLATFORM> all fip
+
+    And if we want to build a Armada37x0 image in debug mode with log level up to 'notice' level,
+    the image has the preset CPU at 1000 MHz, preset DDR3 at 800 MHz, the DDR topology of DDR4 2CS,
+    the image boot from SPI NOR flash partition 0, and the image is non trusted in WTP, the command
+    line is as following
+
+    .. code:: shell
+
+        > make DEBUG=1 USE_COHERENT_MEM=0 LOG_LEVEL=20 CLOCKSPRESET=CPU_1000_DDR_800 \
+            MARVELL_SECURE_BOOT=0 DDR_TOPOLOGY=3 BOOTDEV=SPINOR PARTNUM=0 PLAT=a3700 all fip
+
+    Supported MARVELL_PLATFORM are:
+        - a3700 (for both A3720 DB and EspressoBin)
+        - a70x0
+        - a70x0_amc (for AMC board)
+        - a80x0
+        - a80x0_mcbin (for MacciatoBin)
+
+Special Build Flags
+--------------------
+
+- PLAT_RECOVERY_IMAGE_ENABLE
+    When set this option to enable secondary recovery function when build atf.
+    In order to build UART recovery image this operation should be disabled for
+    a70x0 and a80x0 because of hardware limitation (boot from secondary image
+    can interrupt UART recovery process). This MACRO definition is set in
+    ``plat/marvell/a8k/common/include/platform_def.h`` file.
+
+For more information about build options, please refer to section
+'Summary of build options' in the :ref:`User Guide`.
+
+
+Build output
+------------
+Marvell's TF-A compilation generates 7 files:
+
+    - ble.bin          - BLe image
+    - bl1.bin          - BL1 image
+    - bl2.bin          - BL2 image
+    - bl31.bin         - BL31 image
+    - fip.bin          - FIP image (contains BL2, BL31 & BL33 (U-Boot) images)
+    - boot-image.bin   - TF-A image (contains BL1 and FIP images)
+    - flash-image.bin  - Image which contains boot-image.bin and SPL image.
+      Should be placed on the boot flash/device.
+
+
+Tools and external components installation
+------------------------------------------
+
+Armada37x0 Builds require installation of 3 components
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+(1) ARM cross compiler capable of building images for the service CPU (CM3).
+    This component is usually included in the Linux host packages.
+    On Debian/Ubuntu hosts the default GNU ARM tool chain can be installed
+    using the following command
+
+    .. code:: shell
+
+        > sudo apt-get install gcc-arm-linux-gnueabi
+
+    Only if required, the default tool chain prefix ``arm-linux-gnueabi-`` can be
+    overwritten using the environment variable ``CROSS_CM3``.
+    Example for BASH shell
+
+    .. code:: shell
+
+        > export CROSS_CM3=/opt/arm-cross/bin/arm-linux-gnueabi
+
+(2) DDR initialization library sources (mv_ddr) available at the following repository
+    (use the "mv_ddr-armada-atf-mainline" branch):
+
+    https://github.com/MarvellEmbeddedProcessors/mv-ddr-marvell.git
+
+(3) Armada3700 tools available at the following repository (use the latest release branch):
+
+    https://github.com/MarvellEmbeddedProcessors/A3700-utils-marvell.git
+
+Armada70x0 and Armada80x0 Builds require installation of an additional component
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+(1) DDR initialization library sources (mv_ddr) available at the following repository
+    (use the "mv_ddr-armada-atf-mainline" branch):
+
+    https://github.com/MarvellEmbeddedProcessors/mv-ddr-marvell.git
+
diff --git a/docs/plat/marvell/build.txt b/docs/plat/marvell/build.txt
deleted file mode 100644 (file)
index 7b75196..0000000
+++ /dev/null
@@ -1,194 +0,0 @@
-TF-A Build Instructions
-======================
-
-This section describes how to compile the ARM Trusted Firmware (TF-A) project for Marvell's platforms.
-
-Build Instructions
-------------------
-(1) Set the cross compiler::
-
-               > export CROSS_COMPILE=/path/to/toolchain/aarch64-linux-gnu-
-
-(2) Set path for FIP images:
-
-       Set U-Boot image path (relatively to TF-A root or absolute path)::
-
-               > export BL33=path/to/u-boot.bin
-
-       For example: if U-Boot project (and its images) is located at ~/project/u-boot,
-       BL33 should be ~/project/u-boot/u-boot.bin
-
-       .. note::
-
-          u-boot.bin should be used and not u-boot-spl.bin
-
-       Set MSS/SCP image path (mandatory only for Armada80x0)::
-
-               > export SCP_BL2=path/to/mrvl_scp_bl2*.img
-
-(3) Armada-37x0 build requires WTP tools installation.
-
-       See below in the section "Tools and external components installation".
-       Install ARM 32-bit cross compiler, which is required for building WTMI image for CM3::
-
-               > sudo apt-get install gcc-arm-linux-gnueabi
-
-(4) Clean previous build residuals (if any)::
-
-               > make distclean
-
-(5) Build TF-A:
-
-       There are several build options:
-
-       - DEBUG: default is without debug information (=0). in order to enable it use DEBUG=1
-               Must be disabled when building UART recovery images due to current console driver
-               implementation that is not compatible with Xmodem protocol used for boot image download.
-
-       - LOG_LEVEL: defines the level of logging which will be purged to the default output port.
-
-               LOG_LEVEL_NONE          0
-               LOG_LEVEL_ERROR         10
-               LOG_LEVEL_NOTICE        20
-               LOG_LEVEL_WARNING       30
-               LOG_LEVEL_INFO          40
-               LOG_LEVEL_VERBOSE       50
-
-       - USE_COHERENT_MEM: This flag determines whether to include the coherent memory region in the
-               BL memory map or not.
-
-       - LLC_ENABLE: Flag defining the LLC (L3) cache state. The cache is enabled by default (LLC_ENABLE=1).
-
-       - MARVELL_SECURE_BOOT: build trusted(=1)/non trusted(=0) image, default is non trusted.
-
-       - BLE_PATH:
-               Points to BLE (Binary ROM extension) sources folder. Only required for A8K builds.
-               The parameter is optional, its default value is "plat/marvell/a8k/common/ble".
-
-       - MV_DDR_PATH:
-               For A7/8K, use this parameter to point to mv_ddr driver sources to allow BLE build. For A37x0,
-               it is used for ddr_tool build.
-               Usage example: MV_DDR_PATH=path/to/mv_ddr
-               The parameter is optional for A7/8K, when this parameter is not set, the mv_ddr
-               sources are expected to be located at: drivers/marvell/mv_ddr. However, the parameter
-               is necessary for A37x0.
-               For the mv_ddr source location, check the section "Tools and external components installation"
-
-       - DDR_TOPOLOGY: For Armada37x0 only, the DDR topology map index/name, default is 0.
-               Supported Options:
-                       - DDR3 1CS (0): DB-88F3720-DDR3-Modular (512MB); EspressoBIN (512MB)
-                       - DDR4 1CS (1): DB-88F3720-DDR4-Modular (512MB)
-                       - DDR3 2CS (2): EspressoBIN V3-V5 (1GB)
-                       - DDR4 2CS (3): DB-88F3720-DDR4-Modular (4GB)
-                       - DDR3 1CS (4): DB-88F3720-DDR3-Modular (1GB)
-                       - DDR4 1CS (5): EspressoBin V7 (1GB)
-                       - DDR4 2CS (6): EspressoBin V7 (2GB)
-                       - CUSTOMER (CUST): Customer board, DDR3 1CS 512MB
-
-       - CLOCKSPRESET: For Armada37x0 only, the clock tree configuration preset including CPU and DDR frequency,
-               default is CPU_800_DDR_800.
-                       - CPU_600_DDR_600       -       CPU at 600 MHz, DDR at 600 MHz
-                       - CPU_800_DDR_800       -       CPU at 800 MHz, DDR at 800 MHz
-                       - CPU_1000_DDR_800      -       CPU at 1000 MHz, DDR at 800 MHz
-                       - CPU_1200_DDR_750      -       CPU at 1200 MHz, DDR at 750 MHz
-
-       - BOOTDEV: For Armada37x0 only, the flash boot device, default is SPINOR,
-               Currently, Armada37x0 only supports SPINOR, SPINAND, EMMCNORM and SATA:
-
-                       - SPINOR - SPI NOR flash boot
-                       - SPINAND - SPI NAND flash boot
-                       - EMMCNORM - eMMC Download Mode
-                               Download boot loader or program code from eMMC flash into CM3 or CA53
-                               Requires full initialization and command sequence
-                       - SATA - SATA device boot
-
-       - PARTNUM: For Armada37x0 only, the boot partition number, default is 0. To boot from eMMC, the value
-               should be aligned with the parameter in U-Boot with name of CONFIG_SYS_MMC_ENV_PART, whose
-               value by default is 1.
-               For details about CONFIG_SYS_MMC_ENV_PART, please refer to the U-Boot build instructions.
-
-       - WTMI_IMG: For Armada37x0 only, the path of the WTMI image can point to an image which does
-               nothing, an image which supports EFUSE or a customized CM3 firmware binary. The default image
-               is wtmi.bin that built from sources in WTP folder, which is the next option. If the default
-               image is OK, then this option should be skipped.
-
-       - WTP: For Armada37x0 only, use this parameter to point to wtptools source code directory, which
-               can be found as a3700_utils.zip in the release.
-               Usage example: WTP=/path/to/a3700_utils
-
-       For example, in order to build the image in debug mode with log level up to 'notice' level run::
-
-               > make DEBUG=1 USE_COHERENT_MEM=0 LOG_LEVEL=20 PLAT=<MARVELL_PLATFORM> all fip
-
-       And if we want to build a Armada37x0 image in debug mode with log level up to 'notice' level,
-       the image has the preset CPU at 1000 MHz, preset DDR3 at 800 MHz, the DDR topology of DDR4 2CS,
-       the image boot from SPI NOR flash partition 0, and the image is non trusted in WTP, the command
-       line is as following::
-
-               > make DEBUG=1 USE_COHERENT_MEM=0 LOG_LEVEL=20 CLOCKSPRESET=CPU_1000_DDR_800 \
-                       MARVELL_SECURE_BOOT=0 DDR_TOPOLOGY=3 BOOTDEV=SPINOR PARTNUM=0 PLAT=a3700 all fip
-
-       Supported MARVELL_PLATFORM are:
-               - a3700 (for both A3720 DB and EspressoBin)
-               - a70x0
-               - a70x0_amc (for AMC board)
-               - a80x0
-               - a80x0_mcbin (for MacciatoBin)
-
-Special Build Flags
---------------------
-       - PLAT_RECOVERY_IMAGE_ENABLE: When set this option to enable secondary recovery function when build
-               atf. In order to build UART recovery image this operation should be disabled for a70x0 and a80x0
-               because of hardware limitation (boot from secondary image can interrupt UART recovery process).
-               This MACRO definition is set in plat/marvell/a8k/common/include/platform_def.h file
-
-(for more information about build options, please refer to section 'Summary of build options' in  TF-A user-guide:
- https://github.com/ARM-software/arm-trusted-firmware/blob/master/docs/user-guide.md)
-
-
-Build output
--------------
-Marvell's TF-A compilation generates 7 files:
-       - ble.bin               - BLe image
-       - bl1.bin               - BL1 image
-       - bl2.bin               - BL2 image
-       - bl31.bin              - BL31 image
-       - fip.bin               - FIP image (contains BL2, BL31 & BL33 (U-Boot) images)
-       - boot-image.bin        - TF-A image (contains BL1 and FIP images)
-       - flash-image.bin       - Image which contains boot-image.bin and SPL image;
-                                 should be placed on the boot flash/device.
-
-
-Tools and external components installation
-==========================================
-
-Armada37x0 Builds require installation of 3 components
--------------------------------------------------------
-
-(1) ARM cross compiler capable of building images for the service CPU (CM3).
-    This component is usually included in the Linux host packages.
-    On Debian/Ubuntu hosts the default GNU ARM tool chain can be installed
-    using the following command::
-
-               > sudo apt-get install gcc-arm-linux-gnueabi
-
-    Only if required, the default tool chain prefix "arm-linux-gnueabi-" can be
-    overwritten using the environment variable CROSS_CM3.
-    Example for BASH shell::
-
-               > export CROSS_CM3=/opt/arm-cross/bin/arm-linux-gnueabi
-
-(2) DDR initialization library sources (mv_ddr) available at the following repository
-    (use the "mv_ddr-armada-atf-mainline" branch)::
-    https://github.com/MarvellEmbeddedProcessors/mv-ddr-marvell.git
-
-(3) Armada3700 tools available at the following repository (use the latest release branch)::
-    https://github.com/MarvellEmbeddedProcessors/A3700-utils-marvell.git
-
-Armada70x0 and Armada80x0 Builds require installation of an additional component
---------------------------------------------------------------------------------
-
-(1) DDR initialization library sources (mv_ddr) available at the following repository
-    (use the "mv_ddr-armada-atf-mainline" branch)::
-    https://github.com/MarvellEmbeddedProcessors/mv-ddr-marvell.git
-
diff --git a/docs/plat/marvell/index.rst b/docs/plat/marvell/index.rst
new file mode 100644 (file)
index 0000000..89ebdc0
--- /dev/null
@@ -0,0 +1,14 @@
+Marvell
+=======
+
+.. toctree::
+   :maxdepth: 1
+   :caption: Contents
+
+   build
+   porting
+   misc/mvebu-a8k-addr-map
+   misc/mvebu-amb
+   misc/mvebu-ccu
+   misc/mvebu-io-win
+   misc/mvebu-iob
diff --git a/docs/plat/marvell/misc/mvebu-a8k-addr-map.rst b/docs/plat/marvell/misc/mvebu-a8k-addr-map.rst
new file mode 100644 (file)
index 0000000..e88a458
--- /dev/null
@@ -0,0 +1,49 @@
+Address decoding flow and address translation units of Marvell Armada 8K SoC family
+===================================================================================
+
+::
+
+  +--------------------------------------------------------------------------------------------------+
+  |                                                              +-------------+    +--------------+ |
+  |                                                              | Memory      +-----   DRAM CS    | |
+  |+------------+ +-----------+ +-----------+                    | Controller  |    +--------------+ |
+  ||  AP DMA    | |           | |           |                    +-------------+                     |
+  ||  SD/eMMC   | | CA72 CPUs | |  AP MSS   |                    +-------------+                     |
+  ||  MCI-0/1   | |           | |           |                    | Memory      |                     |
+  |+------+-----+ +--+--------+ +--------+--+  +------------+    | Controller  |     +-------------+ |
+  |       |          |                   |     |            +----- Translaton  |     |AP           | |
+  |       |          |                   |     |            |    +-------------+     |Configuration| |
+  |       |          |                   +-----+            +-------------------------Space        | |
+  |       |          | +-------------+         |  CCU       |                        +-------------+ |
+  |       |          | | MMU         +---------+  Windows   |   +-----------+        +-------------+ |
+  |       |          +-| translation |         |  Lookup    +----           +---------   AP SPI    | |
+  |       |            +-------------+         |            |   |           |        +-------------+ |
+  |       |            +-------------+         |            |   |  IO       |        +-------------+ |
+  |       +------------| SMMU        +---------+            |   |  Windows  +---------  AP MCI0/1  | |
+  |                    | translation |         +------------+   |  Lookup   |        +-------------+ |
+  |                    +---------+---+                          |           |        +-------------+ |
+  |             -                |                              |           +---------   AP STM    | |
+  |             +-----------------                              |           |        +-------------+ |
+  | AP          |                |                              +-+---------+                        |
+  +---------------------------------------------------------------|----------------------------------+
+  +-------------|-------------------------------------------------|----------------------------------+
+  | CP          |            +-------------+               +------+-----+      +-------------------+ |
+  |             |            |             |               |            +-------   SB CFG Space    | |
+  |             |            |   DIOB      |               |            |      +-------------------+ |
+  |             |            |   Windows   -----------------  IOB       |      +-------------------+ |
+  |             |            |   Control   |               |  Windows   +------| SB PCIe-0 - PCIe2 | |
+  |             |            |             |               |  Lookup    |      +-------------------+ |
+  |             |            +------+------+               |            |      +-------------------+ |
+  |             |                   |                      |            +------+      SB NAND      | |
+  |             |                   |                      +------+-----+      +-------------------+ |
+  |             |                   |                             |                                  |
+  |             |                   |                             |                                  |
+  |   +------------------+   +------------+                +------+-----+      +-------------------+ |
+  |   | Network Engine   |   |            |                |            +-------  SB SPI-0/SPI-1   | |
+  |   | Security Engine  |   | PCIe, MSS  |                |  RUNIT     |      +-------------------+ |
+  |   | SATA, USB        |   | DMA        |                |  Windows   |      +-------------------+ |
+  |   | SD/eMMC          |   |            |                |  Lookup    +-------   SB Device Bus   | |
+  |   | TDM, I2C         |   |            |                |            |      +-------------------+ |
+  |   +------------------+   +------------+                +------------+                            |
+  |                                                                                                  |
+  +--------------------------------------------------------------------------------------------------+
diff --git a/docs/plat/marvell/misc/mvebu-a8k-addr-map.txt b/docs/plat/marvell/misc/mvebu-a8k-addr-map.txt
deleted file mode 100644 (file)
index 586e8b7..0000000
+++ /dev/null
@@ -1,47 +0,0 @@
-Address decoding flow and address translation units of Marvell Armada 8K SoC family
-
-+--------------------------------------------------------------------------------------------------+
-|                                                              +-------------+    +--------------+ |
-|                                                              | Memory      +-----   DRAM CS    | |
-|+------------+ +-----------+ +-----------+                    | Controller  |    +--------------+ |
-||  AP DMA    | |           | |           |                    +-------------+                     |
-||  SD/eMMC   | | CA72 CPUs | |  AP MSS   |                    +-------------+                     |
-||  MCI-0/1   | |           | |           |                    | Memory      |                     |
-|+------+-----+ +--+--------+ +--------+--+  +------------+    | Controller  |     +-------------+ |
-|       |          |                   |     |            +----- Translaton  |     |AP           | |
-|       |          |                   |     |            |    +-------------+     |Configuration| |
-|       |          |                   +-----+            +-------------------------Space        | |
-|       |          | +-------------+         |  CCU       |                        +-------------+ |
-|       |          | | MMU         +---------+  Windows   |   +-----------+        +-------------+ |
-|       |          +-| translation |         |  Lookup    +----           +---------   AP SPI    | |
-|       |            +-------------+         |            |   |           |        +-------------+ |
-|       |            +-------------+         |            |   |  IO       |        +-------------+ |
-|       +------------| SMMU        +---------+            |   |  Windows  +---------  AP MCI0/1  | |
-|                    | translation |         +------------+   |  Lookup   |        +-------------+ |
-|                    +---------+---+                          |           |        +-------------+ |
-|             -                |                              |           +---------   AP STM    | |
-|             +-----------------                              |           |        +-------------+ |
-| AP          |                |                              +-+---------+                        |
-+---------------------------------------------------------------|----------------------------------+
-+-------------|-------------------------------------------------|----------------------------------+
-| CP          |            +-------------+               +------+-----+      +-------------------+ |
-|             |            |             |               |            +-------   SB CFG Space    | |
-|             |            |   DIOB      |               |            |      +-------------------+ |
-|             |            |   Windows   -----------------  IOB       |      +-------------------+ |
-|             |            |   Control   |               |  Windows   +------| SB PCIe-0 - PCIe2 | |
-|             |            |             |               |  Lookup    |      +-------------------+ |
-|             |            +------+------+               |            |      +-------------------+ |
-|             |                   |                      |            +------+      SB NAND      | |
-|             |                   |                      +------+-----+      +-------------------+ |
-|             |                   |                             |                                  |
-|             |                   |                             |                                  |
-|   +------------------+   +------------+                +------+-----+      +-------------------+ |
-|   | Network Engine   |   |            |                |            +-------  SB SPI-0/SPI-1   | |
-|   | Security Engine  |   | PCIe, MSS  |                |  RUNIT     |      +-------------------+ |
-|   | SATA, USB        |   | DMA        |                |  Windows   |      +-------------------+ |
-|   | SD/eMMC          |   |            |                |  Lookup    +-------   SB Device Bus   | |
-|   | TDM, I2C         |   |            |                |            |      +-------------------+ |
-|   +------------------+   +------------+                +------------+                            |
-|                                                                                                  |
-+--------------------------------------------------------------------------------------------------+
-
diff --git a/docs/plat/marvell/misc/mvebu-amb.rst b/docs/plat/marvell/misc/mvebu-amb.rst
new file mode 100644 (file)
index 0000000..d734003
--- /dev/null
@@ -0,0 +1,58 @@
+AMB - AXI MBUS address decoding
+===============================
+
+AXI to M-bridge decoding unit driver for Marvell Armada 8K and 8K+ SoCs.
+
+The Runit offers a second level of address windows lookup. It is used to map
+transaction towards the CD BootROM, SPI0, SPI1 and Device bus (NOR).
+
+The Runit contains eight configurable windows. Each window defines a contiguous,
+address space and the properties associated with that address space.
+
+::
+
+  Unit        Bank         ATTR
+  Device-Bus  DEV_BOOT_CS  0x2F
+              DEV_CS0      0x3E
+              DEV_CS1      0x3D
+              DEV_CS2      0x3B
+              DEV_CS3      0x37
+  SPI-0       SPI_A_CS0    0x1E
+              SPI_A_CS1    0x5E
+              SPI_A_CS2    0x9E
+              SPI_A_CS3    0xDE
+              SPI_A_CS4    0x1F
+              SPI_A_CS5    0x5F
+              SPI_A_CS6    0x9F
+              SPI_A_CS7    0xDF
+  SPI         SPI_B_CS0    0x1A
+              SPI_B_CS1    0x5A
+              SPI_B_CS2    0x9A
+              SPI_B_CS3    0xDA
+  BOOT_ROM    BOOT_ROM     0x1D
+  UART        UART         0x01
+
+Mandatory functions
+-------------------
+
+- marvell_get_amb_memory_map
+    Returns the AMB windows configuration and the number of windows
+
+Mandatory structures
+--------------------
+
+- amb_memory_map
+    Array that include the configuration of the windows. Every window/entry is a
+    struct which has 2 parameters:
+
+      - Base address of the window
+      - Attribute of the window
+
+Examples
+--------
+
+.. code:: c
+
+    struct addr_map_win amb_memory_map[] = {
+        {0xf900,       AMB_DEV_CS0_ID},
+    };
diff --git a/docs/plat/marvell/misc/mvebu-amb.txt b/docs/plat/marvell/misc/mvebu-amb.txt
deleted file mode 100644 (file)
index 2a7a41e..0000000
+++ /dev/null
@@ -1,45 +0,0 @@
-AMB - AXI MBUS address decoding
--------------------------------
-
-AXI to M-bridge decoding unit driver for Marvell Armada 8K and 8K+ SoCs.
-
-- The Runit offers a second level of address windows lookup. It is used to map transaction towards
-the CD BootROM, SPI0, SPI1 and Device bus (NOR).
-- The Runit contains eight configurable windows. Each window defines a contiguous,
-address space and the properties associated with that address space.
-
-Unit           Bank            ATTR
-Device-Bus     DEV_BOOT_CS     0x2F
-               DEV_CS0         0x3E
-               DEV_CS1         0x3D
-               DEV_CS2         0x3B
-               DEV_CS3         0x37
-SPI-0          SPI_A_CS0       0x1E
-               SPI_A_CS1       0x5E
-               SPI_A_CS2       0x9E
-               SPI_A_CS3       0xDE
-               SPI_A_CS4       0x1F
-               SPI_A_CS5       0x5F
-               SPI_A_CS6       0x9F
-               SPI_A_CS7       0xDF
-SPI1           SPI_B_CS0       0x1A
-               SPI_B_CS1       0x5A
-               SPI_B_CS2       0x9A
-               SPI_B_CS3       0xDA
-BOOT_ROM       BOOT_ROM        0x1D
-UART           UART            0x01
-
-Mandatory functions:
-       - marvell_get_amb_memory_map
-               returns the AMB windows configuration and the number of windows
-
-Mandatory structures:
-       amb_memory_map - Array that include the configuration of the windows
-         every window/entry is a struct which has 2 parameters:
-         - base address of the window
-         - Attribute of the window
-
-Examples:
-       struct addr_map_win amb_memory_map[] = {
-               {0xf900,        AMB_DEV_CS0_ID},
-       };
diff --git a/docs/plat/marvell/misc/mvebu-ccu.rst b/docs/plat/marvell/misc/mvebu-ccu.rst
new file mode 100644 (file)
index 0000000..5bac11f
--- /dev/null
@@ -0,0 +1,33 @@
+Marvell CCU address decoding bindings
+=====================================
+
+CCU configration driver (1st stage address translation) for Marvell Armada 8K and 8K+ SoCs.
+
+The CCU node includes a description of the address decoding configuration.
+
+Mandatory functions
+-------------------
+
+- marvell_get_ccu_memory_map
+    Return the CCU windows configuration and the number of windows of the
+    specific AP.
+
+Mandatory structures
+--------------------
+
+- ccu_memory_map
+    Array that includes the configuration of the windows. Every window/entry is
+    a struct which has 3 parameters:
+
+      - Base address of the window
+      - Size of the window
+      - Target-ID of the window
+
+Example
+-------
+
+.. code:: c
+
+       struct addr_map_win ccu_memory_map[] = {
+               {0x00000000f2000000,     0x00000000e000000,      IO_0_TID}, /* IO window */
+       };
diff --git a/docs/plat/marvell/misc/mvebu-ccu.txt b/docs/plat/marvell/misc/mvebu-ccu.txt
deleted file mode 100644 (file)
index 9764027..0000000
+++ /dev/null
@@ -1,23 +0,0 @@
-Marvell CCU address decoding bindings
-=====================================
-
-CCU configration driver (1st stage address translation) for Marvell Armada 8K and 8K+ SoCs.
-
-The CCU node includes a description of the address decoding configuration.
-
-Mandatory functions:
-       - marvell_get_ccu_memory_map
-               return the CCU windows configuration and the number of windows
-               of the specific AP.
-
-Mandatory structures:
-       ccu_memory_map - Array that includes the configuration of the windows
-         every window/entry is a struct which has 3 parameters:
-         - Base address of the window
-         - Size of the window
-         - Target-ID of the window
-
-Example:
-       struct addr_map_win ccu_memory_map[] = {
-               {0x00000000f2000000,     0x00000000e000000,      IO_0_TID}, /* IO window */
-       };
diff --git a/docs/plat/marvell/misc/mvebu-io-win.rst b/docs/plat/marvell/misc/mvebu-io-win.rst
new file mode 100644 (file)
index 0000000..52845ca
--- /dev/null
@@ -0,0 +1,46 @@
+Marvell IO WIN address decoding bindings
+========================================
+
+IO Window configration driver (2nd stage address translation) for Marvell Armada 8K and 8K+ SoCs.
+
+The IO WIN includes a description of the address decoding configuration.
+
+Transactions that are decoded by CCU windows as IO peripheral, have an additional
+layer of decoding. This additional address decoding layer defines one of the
+following targets:
+
+- **0x0** = BootRom
+- **0x1** = STM (Serial Trace Macro-cell, a programmer's port into trace stream)
+- **0x2** = SPI direct access
+- **0x3** = PCIe registers
+- **0x4** = MCI Port
+- **0x5** = PCIe port
+
+Mandatory functions
+-------------------
+
+- marvell_get_io_win_memory_map
+    Returns the IO windows configuration and the number of windows of the
+    specific AP.
+
+Mandatory structures
+--------------------
+
+- io_win_memory_map
+    Array that include the configuration of the windows. Every window/entry is
+    a struct which has 3 parameters:
+
+         - Base address of the window
+         - Size of the window
+         - Target-ID of the window
+
+Example
+-------
+
+.. code:: c
+
+       struct addr_map_win io_win_memory_map[] = {
+               {0x00000000fe000000,    0x000000001f00000,      PCIE_PORT_TID}, /* PCIe window 31Mb for PCIe port*/
+               {0x00000000ffe00000,    0x000000000100000,      PCIE_REGS_TID}, /* PCI-REG window 64Kb for PCIe-reg*/
+               {0x00000000f6000000,    0x000000000100000,      MCIPHY_TID},    /* MCI window  1Mb for PHY-reg*/
+       };
diff --git a/docs/plat/marvell/misc/mvebu-io-win.txt b/docs/plat/marvell/misc/mvebu-io-win.txt
deleted file mode 100644 (file)
index c83ad1f..0000000
+++ /dev/null
@@ -1,35 +0,0 @@
-Marvell IO WIN address decoding bindings
-=====================================
-
-IO Window configration driver (2nd stage address translation) for Marvell Armada 8K and 8K+ SoCs.
-
-The IO WIN includes a description of the address decoding configuration.
-
-Transactions that are decoded by CCU windows as IO peripheral, have an additional
-layer of decoding. This additional address decoding layer defines one of the
-following targets:
-       0x0 = BootRom
-       0x1 = STM (Serial Trace Macro-cell, a programmer's port into trace stream)
-       0x2 = SPI direct access
-       0x3 = PCIe registers
-       0x4 = MCI Port
-       0x5 = PCIe port
-
-Mandatory functions:
-       - marvell_get_io_win_memory_map
-               returns the IO windows configuration and the number of windows
-               of the specific AP.
-
-Mandatory structures:
-       io_win_memory_map - Array that include the configuration of the windows
-         every window/entry is a struct which has 3 parameters:
-         - Base address of the window
-         - Size of the window
-         - Target-ID of the window
-
-Example:
-       struct addr_map_win io_win_memory_map[] = {
-               {0x00000000fe000000,    0x000000001f00000,      PCIE_PORT_TID}, /* PCIe window 31Mb for PCIe port*/
-               {0x00000000ffe00000,    0x000000000100000,      PCIE_REGS_TID}, /* PCI-REG window 64Kb for PCIe-reg*/
-               {0x00000000f6000000,    0x000000000100000,      MCIPHY_TID},    /* MCI window  1Mb for PHY-reg*/
-       };
diff --git a/docs/plat/marvell/misc/mvebu-iob.rst b/docs/plat/marvell/misc/mvebu-iob.rst
new file mode 100644 (file)
index 0000000..d02a7e8
--- /dev/null
@@ -0,0 +1,52 @@
+Marvell IOB address decoding bindings
+=====================================
+
+IO bridge configration driver (3rd stage address translation) for Marvell Armada 8K and 8K+ SoCs.
+
+The IOB includes a description of the address decoding configuration.
+
+IOB supports up to n (in CP110 n=24) windows for external memory transaction.
+When a transaction passes through the IOB, its address is compared to each of
+the enabled windows. If there is a hit and it passes the security checks, it is
+advanced to the target port.
+
+Mandatory functions
+-------------------
+
+- marvell_get_iob_memory_map
+     Returns the IOB windows configuration and the number of windows
+
+Mandatory structures
+--------------------
+
+- iob_memory_map
+     Array that includes the configuration of the windows. Every window/entry is
+     a struct which has 3 parameters:
+
+       - Base address of the window
+       - Size of the window
+       - Target-ID of the window
+
+Target ID options
+-----------------
+
+- **0x0** = Internal configuration space
+- **0x1** = MCI0
+- **0x2** = PEX1_X1
+- **0x3** = PEX2_X1
+- **0x4** = PEX0_X4
+- **0x5** = NAND flash
+- **0x6** = RUNIT (NOR/SPI/BootRoom)
+- **0x7** = MCI1
+
+Example
+-------
+
+.. code:: c
+
+       struct addr_map_win iob_memory_map[] = {
+               {0x00000000f7000000,    0x0000000001000000,     PEX1_TID}, /* PEX1_X1 window */
+               {0x00000000f8000000,    0x0000000001000000,     PEX2_TID}, /* PEX2_X1 window */
+               {0x00000000f6000000,    0x0000000001000000,     PEX0_TID}, /* PEX0_X4 window */
+               {0x00000000f9000000,    0x0000000001000000,     NAND_TID}  /* NAND window */
+       };
diff --git a/docs/plat/marvell/misc/mvebu-iob.txt b/docs/plat/marvell/misc/mvebu-iob.txt
deleted file mode 100644 (file)
index 97ec09d..0000000
+++ /dev/null
@@ -1,40 +0,0 @@
-Marvell IOB address decoding bindings
-=====================================
-
-IO bridge configration driver (3rd stage address translation) for Marvell Armada 8K and 8K+ SoCs.
-
-The IOB includes a description of the address decoding configuration.
-
-IOB supports up to n (in CP110 n=24) windows for external memory transaction.
-When a transaction passes through the IOB, its address is compared to each of
-the enabled windows. If there is a hit and it passes the security checks, it is
-advanced to the target port.
-
-Mandatory functions:
-       - marvell_get_iob_memory_map
-               returns the IOB windows configuration and the number of windows
-
-Mandatory structures:
-       iob_memory_map - Array that include the configuration of the windows
-         every window/entry is a struct which has 3 parameters:
-         - Base address of the window
-         - Size of the window
-         - Target-ID of the window
-
-Target ID options:
-       - 0x0 = Internal configuration space
-       - 0x1 = MCI0
-       - 0x2 = PEX1_X1
-       - 0x3 = PEX2_X1
-       - 0x4 = PEX0_X4
-       - 0x5 = NAND flash
-       - 0x6 = RUNIT (NOR/SPI/BootRoom)
-       - 0x7 = MCI1
-
-Example:
-       struct addr_map_win iob_memory_map[] = {
-               {0x00000000f7000000,    0x0000000001000000,     PEX1_TID}, /* PEX1_X1 window */
-               {0x00000000f8000000,    0x0000000001000000,     PEX2_TID}, /* PEX2_X1 window */
-               {0x00000000f6000000,    0x0000000001000000,     PEX0_TID}, /* PEX0_X4 window */
-               {0x00000000f9000000,    0x0000000001000000,     NAND_TID}  /* NAND window */
-       };
diff --git a/docs/plat/marvell/porting.rst b/docs/plat/marvell/porting.rst
new file mode 100644 (file)
index 0000000..8fc1c1f
--- /dev/null
@@ -0,0 +1,163 @@
+TF-A Porting Guide for Marvell Platforms
+========================================
+
+This section describes how to port TF-A to a customer board, assuming that the
+SoC being used is already supported in TF-A.
+
+
+Source Code Structure
+---------------------
+
+- The customer platform specific code shall reside under ``plat/marvell/<soc family>/<soc>_cust``
+  (e.g. 'plat/marvell/a8k/a7040_cust').
+- The platform name for build purposes is called ``<soc>_cust`` (e.g. ``a7040_cust``).
+- The build system will reuse all files from within the soc directory, and take only the porting
+  files from the customer platform directory.
+
+Files that require porting are located at ``plat/marvell/<soc family>/<soc>_cust`` directory.
+
+
+Armada-70x0/Armada-80x0 Porting
+-------------------------------
+
+SoC Physical Address Map (marvell_plat_config.c)
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+This file describes the SoC physical memory mapping to be used for the CCU,
+IOWIN, AXI-MBUS and IOB address decode units (Refer to the functional spec for
+more details).
+
+In most cases, using the default address decode windows should work OK.
+
+In cases where a special physical address map is needed (e.g. Special size for
+PCIe MEM windows, large memory mapped SPI flash...), then porting of the SoC
+memory map is required.
+
+.. note::
+   For a detailed information on how CCU, IOWIN, AXI-MBUS & IOB work, please
+   refer to the SoC functional spec, and under
+   ``docs/marvell/misc/mvebu-[ccu/iob/amb/io-win].txt`` files.
+
+boot loader recovery (marvell_plat_config.c)
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+- Background:
+
+  Boot rom can skip the current image and choose to boot from next position if a
+  specific value (``0xDEADB002``) is returned by the ble main function. This
+  feature is used for boot loader recovery by booting from a valid flash-image
+  saved in next position on flash (e.g. address 2M in SPI flash).
+
+  Supported options to implement the skip request are:
+    - GPIO
+    - I2C
+    - User defined
+
+- Porting:
+
+  Under marvell_plat_config.c, implement struct skip_image that includes
+  specific board parameters.
+
+  .. warning::
+     To disable this feature make sure the struct skip_image is not implemented.
+
+- Example:
+
+In A7040-DB specific implementation
+(``plat/marvell/a8k/a70x0/board/marvell_plat_config.c``), the image skip is
+implemented using GPIO: mpp 33 (SW5).
+
+Before resetting the board make sure there is a valid image on the next flash
+address:
+
+ -tftp [valid address] flash-image.bin
+ -sf update [valid address] 0x2000000 [size]
+
+Press reset and keep pressing the button connected to the chosen GPIO pin. A
+skip image request message is printed on the screen and boot rom boots from the
+saved image at the next position.
+
+DDR Porting (dram_port.c)
+~~~~~~~~~~~~~~~~~~~~~~~~~
+
+This file defines the dram topology and parameters of the target board.
+
+The DDR code is part of the BLE component, which is an extension of ARM Trusted
+Firmware (TF-A).
+
+The DDR driver called mv_ddr is released separately apart from TF-A sources.
+
+The BLE and consequently, the DDR init code is executed at the early stage of
+the boot process.
+
+Each supported platform of the TF-A has its own DDR porting file called
+dram_port.c located at ``atf/plat/marvell/a8k/<platform>/board`` directory.
+
+Please refer to '<path_to_mv_ddr_sources>/doc/porting_guide.txt' for detailed
+porting description.
+
+The build target directory is "build/<platform>/release/ble".
+
+Comphy Porting (phy-porting-layer.h or phy-default-porting-layer.h)
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+- Background:
+    Some of the comphy's parameters value depend on the HW connection between
+    the SoC and the PHY. Every board type has specific HW characteristics like
+    wire length. Due to those differences some comphy parameters vary between
+    board types. Therefore each board type can have its own list of values for
+    all relevant comphy parameters. The PHY porting layer specifies which
+    parameters need to be suited and the board designer should provide relevant
+    values.
+
+    .. seealso::
+        For XFI/SFI comphy type there is procedure "rx_training" which eases
+        process of suiting some of the parameters. Please see :ref:`uboot_cmd`
+        section: rx_training.
+
+    The PHY porting layer simplifies updating static values per board type,
+    which are now grouped in one place.
+
+    .. note::
+        The parameters for the same type of comphy may vary even for the same
+        board type, it is because the lanes from comphy-x to some PHY may have
+        different HW characteristic than lanes from comphy-y to the same
+        (multiplexed) or other PHY.
+
+- Porting:
+    The porting layer for PHY was introduced in TF-A. There is one file
+    ``drivers/marvell/comphy/phy-default-porting-layer.h`` which contains the
+    defaults. Those default parameters are used only if there is no appropriate
+    phy-porting-layer.h file under: ``plat/marvell/<soc
+    family>/<platform>/board/phy-porting-layer.h``. If the phy-porting-layer.h
+    exists, the phy-default-porting-layer.h is not going to be included.
+
+    .. warning::
+        Not all comphy types are already reworked to support the PHY porting
+        layer, currently the porting layer is supported for XFI/SFI and SATA
+        comphy types.
+
+    The easiest way to prepare the PHY porting layer for custom board is to copy
+    existing example to a new platform:
+
+    - cp ``plat/marvell/a8k/a80x0/board/phy-porting-layer.h`` "plat/marvell/<soc family>/<platform>/board/phy-porting-layer.h"
+    - adjust relevant parameters or
+    - if different comphy index is used for specific feature, move it to proper table entry and then adjust.
+
+    .. note::
+        The final table size with comphy parameters can be different, depending
+        on the CP module count for given SoC type.
+
+- Example:
+    Example porting layer for armada-8040-db is under:
+    ``plat/marvell/a8k/a80x0/board/phy-porting-layer.h``
+
+    .. note::
+        If there is no PHY porting layer for new platform (missing
+        phy-porting-layer.h), the default values are used
+        (drivers/marvell/comphy/phy-default-porting-layer.h) and the user is
+        warned:
+
+    .. warning::
+        "Using default comphy parameters - it may be required to suit them for
+        your board".
diff --git a/docs/plat/marvell/porting.txt b/docs/plat/marvell/porting.txt
deleted file mode 100644 (file)
index f9a39a0..0000000
+++ /dev/null
@@ -1,118 +0,0 @@
-.. _porting:
-
-TF-A Porting Guide
-=================
-
-This section describes how to port TF-A to a customer board, assuming that the SoC being used is already supported
-in TF-A.
-
-
-Source Code Structure
----------------------
-- The customer platform specific code shall reside under "plat/marvell/<soc family>/<soc>_cust"
-       (e.g. 'plat/marvell/a8k/a7040_cust').
-- The platform name for build purposes is called "<soc>_cust" (e.g. a7040_cust).
-- The build system will reuse all files from within the soc directory, and take only the porting
-  files from the customer platform directory.
-
-Files that require porting are located at "plat/marvell/<soc family>/<soc>_cust" directory.
-
-
-Armada-70x0/Armada-80x0 Porting
--------------------------------
-
-  - SoC Physical Address Map (marvell_plat_config.c):
-       - This file describes the SoC physical memory mapping to be used for the CCU, IOWIN, AXI-MBUS and IOB
-         address decode units (Refer to the functional spec for more details).
-       - In most cases, using the default address decode windows should work OK.
-       - In cases where a special physical address map is needed (e.g. Special size for PCIe MEM windows,
-         large memory mapped SPI flash...), then porting of the SoC memory map is required.
-       - Note: For a detailed information on how CCU, IOWIN, AXI-MBUS & IOB work, please refer to the SoC functional spec,
-         and under "docs/marvell/misc/mvebu-[ccu/iob/amb/io-win].txt" files.
-
-  - boot loader recovery (marvell_plat_config.c):
-       - Background:
-               boot rom can skip the current image and choose to boot from next position if a specific value
-               (0xDEADB002) is returned by the ble main function. This feature is used for boot loader recovery
-               by booting from a valid flash-image saved in next position on flash (e.g. address 2M in SPI flash).
-
-               Supported options to implement the skip request are:
-                       - GPIO
-                       - I2C
-                       - User defined
-
-       - Porting:
-               Under marvell_plat_config.c, implement struct skip_image that includes specific board parameters.
-               .. warning:: to disable this feature make sure the struct skip_image is not implemented.
-
-       - Example:
-               In A7040-DB specific implementation (plat/marvell/a8k/a70x0/board/marvell_plat_config.c),
-               the image skip is implemented using GPIO: mpp 33 (SW5).
-
-               Before resetting the board make sure there is a valid image on the next flash address:
-                       -tftp [valid address] flash-image.bin
-                       -sf update [valid address] 0x2000000 [size]
-
-               Press reset and keep pressing the button connected to the chosen GPIO pin. A skip image request
-               message is printed on the screen and boot rom boots from the saved image at the next position.
-
-  - DDR Porting (dram_port.c):
-       - This file defines the dram topology and parameters of the target board.
-       - The DDR code is part of the BLE component, which is an extension of ARM Trusted Firmware (TF-A).
-       - The DDR driver called mv_ddr is released separately apart from TF-A sources.
-       - The BLE and consequently, the DDR init code is executed at the early stage of the boot process.
-       - Each supported platform of the TF-A has its own DDR porting file called dram_port.c located at
-         ``atf/plat/marvell/a8k/<platform>/board`` directory.
-       - Please refer to '<path_to_mv_ddr_sources>/doc/porting_guide.txt' for detailed porting description.
-       - The build target directory is "build/<platform>/release/ble".
-
-  - Comphy Porting (phy-porting-layer.h or phy-default-porting-layer.h)
-       - Background:
-               Some of the comphy's parameters value depend on the HW connection between the SoC and the PHY. Every
-               board type has specific HW characteristics like wire length. Due to those differences some comphy
-               parameters vary between board types. Therefore each board type can have its own list of values for
-               all relevant comphy parameters. The PHY porting layer specifies which parameters need to be suited and
-               the board designer should provide relevant values.
-
-               .. seealso::
-                       For XFI/SFI comphy type there is procedure "rx_training" which eases process of suiting some of
-                       the parameters. Please see :ref:`uboot_cmd` section: rx_training.
-
-               The PHY porting layer simplifies updating static values per board type, which are now grouped in one place.
-
-               .. note::
-                       The parameters for the same type of comphy may vary even for the same board type, it is because
-                       the lanes from comphy-x to some PHY may have different HW characteristic than lanes from
-                       comphy-y to the same (multiplexed) or other PHY.
-
-       - Porting:
-               The porting layer for PHY was introduced in TF-A. There is one file
-               ``drivers/marvell/comphy/phy-default-porting-layer.h`` which contains the defaults. Those default
-               parameters are used only if there is no appropriate phy-porting-layer.h file under:
-               ``plat/marvell/<soc family>/<platform>/board/phy-porting-layer.h``. If the phy-porting-layer.h exists,
-               the phy-default-porting-layer.h is not going to be included.
-
-               .. warning::
-                       Not all comphy types are already reworked to support the PHY porting layer, currently the porting
-                       layer is supported for XFI/SFI and SATA comphy types.
-
-               The easiest way to prepare the PHY porting layer for custom board is to copy existing example to a new
-               platform:
-
-               - cp ``plat/marvell/a8k/a80x0/board/phy-porting-layer.h`` "plat/marvell/<soc family>/<platform>/board/phy-porting-layer.h"
-               - adjust relevant parameters or
-               - if different comphy index is used for specific feature, move it to proper table entry and then adjust.
-
-               .. note::
-                       The final table size with comphy parameters can be different, depending on the CP module count for
-                       given SoC type.
-
-       - Example:
-               Example porting layer for armada-8040-db is under: ``plat/marvell/a8k/a80x0/board/phy-porting-layer.h``
-
-               .. note::
-                       If there is no PHY porting layer for new platform (missing phy-porting-layer.h), the default
-                       values are used (drivers/marvell/comphy/phy-default-porting-layer.h) and the user is warned:
-
-               .. warning::
-                       "Using default comphy parameters - it may be required to suit them for your board".
index 94a20ba07ea4aa1f5ac6b22bb1df34fb8832b8f3..f371330968c2d718262670273707c1b4735191a0 100644 (file)
@@ -16,7 +16,6 @@
 #include "gicv3_private.h"
 
 const gicv3_driver_data_t *gicv3_driver_data;
-static unsigned int gicv2_compat;
 
 /*
  * Spinlock to guard registers needing read-modify-write. APIs protected by this
@@ -60,51 +59,61 @@ static spinlock_t gic_lock;
 void __init gicv3_driver_init(const gicv3_driver_data_t *plat_driver_data)
 {
        unsigned int gic_version;
+       unsigned int gicv2_compat;
 
        assert(plat_driver_data != NULL);
        assert(plat_driver_data->gicd_base != 0U);
-       assert(plat_driver_data->gicr_base != 0U);
        assert(plat_driver_data->rdistif_num != 0U);
        assert(plat_driver_data->rdistif_base_addrs != NULL);
 
        assert(IS_IN_EL3());
 
-       assert(plat_driver_data->interrupt_props_num > 0 ?
-              plat_driver_data->interrupt_props != NULL : 1);
+       assert((plat_driver_data->interrupt_props_num != 0U) ?
+              (plat_driver_data->interrupt_props != NULL) : 1);
 
        /* Check for system register support */
-#ifdef __aarch64__
+#ifndef __aarch64__
+       assert((read_id_pfr1() &
+                       (ID_PFR1_GIC_MASK << ID_PFR1_GIC_SHIFT)) != 0U);
+#else
        assert((read_id_aa64pfr0_el1() &
                        (ID_AA64PFR0_GIC_MASK << ID_AA64PFR0_GIC_SHIFT)) != 0U);
-#else
-       assert((read_id_pfr1() & (ID_PFR1_GIC_MASK << ID_PFR1_GIC_SHIFT)) != 0U);
-#endif /* __aarch64__ */
+#endif /* !__aarch64__ */
 
        /* The GIC version should be 3.0 */
        gic_version = gicd_read_pidr2(plat_driver_data->gicd_base);
-       gic_version >>= PIDR2_ARCH_REV_SHIFT;
+       gic_version >>= PIDR2_ARCH_REV_SHIFT;
        gic_version &= PIDR2_ARCH_REV_MASK;
        assert(gic_version == ARCH_REV_GICV3);
 
        /*
-        * Find out whether the GIC supports the GICv2 compatibility mode. The
-        * ARE_S bit resets to 0 if supported
+        * Find out whether the GIC supports the GICv2 compatibility mode.
+        * The ARE_S bit resets to 0 if supported
         */
        gicv2_compat = gicd_read_ctlr(plat_driver_data->gicd_base);
        gicv2_compat >>= CTLR_ARE_S_SHIFT;
-       gicv2_compat = !(gicv2_compat & CTLR_ARE_S_MASK);
-
-       /*
-        * Find the base address of each implemented Redistributor interface.
-        * The number of interfaces should be equal to the number of CPUs in the
-        * system. The memory for saving these addresses has to be allocated by
-        * the platform port
-        */
-       gicv3_rdistif_base_addrs_probe(plat_driver_data->rdistif_base_addrs,
-                                          plat_driver_data->rdistif_num,
-                                          plat_driver_data->gicr_base,
-                                          plat_driver_data->mpidr_to_core_pos);
-
+       gicv2_compat = gicv2_compat & CTLR_ARE_S_MASK;
+
+       if (plat_driver_data->gicr_base != 0U) {
+               /*
+                * Find the base address of each implemented Redistributor interface.
+                * The number of interfaces should be equal to the number of CPUs in the
+                * system. The memory for saving these addresses has to be allocated by
+                * the platform port
+                */
+               gicv3_rdistif_base_addrs_probe(plat_driver_data->rdistif_base_addrs,
+                                                  plat_driver_data->rdistif_num,
+                                                  plat_driver_data->gicr_base,
+                                                  plat_driver_data->mpidr_to_core_pos);
+#if !HW_ASSISTED_COHERENCY
+               /*
+                * Flush the rdistif_base_addrs[] contents linked to the GICv3 driver.
+                */
+               flush_dcache_range((uintptr_t)(plat_driver_data->rdistif_base_addrs),
+                       plat_driver_data->rdistif_num *
+                       sizeof(*(plat_driver_data->rdistif_base_addrs)));
+#endif
+       }
        gicv3_driver_data = plat_driver_data;
 
        /*
@@ -112,19 +121,19 @@ void __init gicv3_driver_init(const gicv3_driver_data_t *plat_driver_data)
         * enabled. When the secondary CPU boots up, it initializes the
         * GICC/GICR interface with the caches disabled. Hence flush the
         * driver data to ensure coherency. This is not required if the
-        * platform has HW_ASSISTED_COHERENCY or WARMBOOT_ENABLE_DCACHE_EARLY
-        * enabled.
+        * platform has HW_ASSISTED_COHERENCY enabled.
         */
-#if !(HW_ASSISTED_COHERENCY || WARMBOOT_ENABLE_DCACHE_EARLY)
-       flush_dcache_range((uintptr_t) &gicv3_driver_data,
-                       sizeof(gicv3_driver_data));
-       flush_dcache_range((uintptr_t) gicv3_driver_data,
-                       sizeof(*gicv3_driver_data));
+#if !HW_ASSISTED_COHERENCY
+       flush_dcache_range((uintptr_t)&gicv3_driver_data,
+               sizeof(gicv3_driver_data));
+       flush_dcache_range((uintptr_t)gicv3_driver_data,
+               sizeof(*gicv3_driver_data));
 #endif
 
-       INFO("GICv3 %s legacy support detected."
-                       " ARM GICV3 driver initialized in EL3\n",
-                       gicv2_compat ? "with" : "without");
+       INFO("GICv3 with%s legacy support detected."
+                       " ARM GICv3 driver initialized in EL3\n",
+                       (gicv2_compat == 0U) ? "" : "out");
+
 }
 
 /*******************************************************************************
@@ -192,6 +201,7 @@ void gicv3_rdistif_init(unsigned int proc_num)
        gicv3_rdistif_on(proc_num);
 
        gicr_base = gicv3_driver_data->rdistif_base_addrs[proc_num];
+       assert(gicr_base != 0U);
 
        /* Set the default attribute of all SGIs and PPIs */
        gicv3_ppi_sgi_config_defaults(gicr_base);
@@ -313,6 +323,7 @@ void gicv3_cpuif_disable(unsigned int proc_num)
 
        /* Mark the connected core as asleep */
        gicr_base = gicv3_driver_data->rdistif_base_addrs[proc_num];
+       assert(gicr_base != 0U);
        gicv3_rdistif_mark_core_asleep(gicr_base);
 }
 
@@ -1081,3 +1092,71 @@ unsigned int gicv3_set_pmr(unsigned int mask)
 
        return old_mask;
 }
+
+/*******************************************************************************
+ * This function delegates the responsibility of discovering the corresponding
+ * Redistributor frames to each CPU itself. It is a modified version of
+ * gicv3_rdistif_base_addrs_probe() and is executed by each CPU in the platform
+ * unlike the previous way in which only the Primary CPU did the discovery of
+ * all the Redistributor frames for every CPU. It also handles the scenario in
+ * which the frames of various CPUs are not contiguous in physical memory.
+ ******************************************************************************/
+int gicv3_rdistif_probe(const uintptr_t gicr_frame)
+{
+       u_register_t mpidr;
+       unsigned int proc_num, proc_self;
+       uint64_t typer_val;
+       uintptr_t rdistif_base;
+       bool gicr_frame_found = false;
+
+       assert(gicv3_driver_data->gicr_base == 0U);
+
+       /* Ensure this function is called with Data Cache enabled */
+#ifndef __aarch64__
+       assert((read_sctlr() & SCTLR_C_BIT) != 0U);
+#else
+       assert((read_sctlr_el3() & SCTLR_C_BIT) != 0U);
+#endif /* !__aarch64__ */
+
+       proc_self = gicv3_driver_data->mpidr_to_core_pos(read_mpidr_el1());
+       rdistif_base = gicr_frame;
+       do {
+               typer_val = gicr_read_typer(rdistif_base);
+               if (gicv3_driver_data->mpidr_to_core_pos != NULL) {
+                       mpidr = mpidr_from_gicr_typer(typer_val);
+                       proc_num = gicv3_driver_data->mpidr_to_core_pos(mpidr);
+               } else {
+                       proc_num = (unsigned int)(typer_val >> TYPER_PROC_NUM_SHIFT) &
+                                       TYPER_PROC_NUM_MASK;
+               }
+               if (proc_num == proc_self) {
+                       /* The base address doesn't need to be initialized on
+                        * every warm boot.
+                        */
+                       if (gicv3_driver_data->rdistif_base_addrs[proc_num] != 0U)
+                               return 0;
+                       gicv3_driver_data->rdistif_base_addrs[proc_num] =
+                       rdistif_base;
+                       gicr_frame_found = true;
+                       break;
+               }
+               rdistif_base += (uintptr_t)(ULL(1) << GICR_PCPUBASE_SHIFT);
+       } while ((typer_val & TYPER_LAST_BIT) == 0U);
+
+       if (!gicr_frame_found)
+               return -1;
+
+       /*
+        * Flush the driver data to ensure coherency. This is
+        * not required if platform has HW_ASSISTED_COHERENCY
+        * enabled.
+        */
+#if !HW_ASSISTED_COHERENCY
+       /*
+        * Flush the rdistif_base_addrs[] contents linked to the GICv3 driver.
+        */
+       flush_dcache_range((uintptr_t)&(gicv3_driver_data->rdistif_base_addrs[proc_num]),
+               sizeof(*(gicv3_driver_data->rdistif_base_addrs)));
+#endif
+       return 0; /* Found matching GICR frame */
+}
index 4577f06a20bf468e359e9eba31fe4bde9b9eb32c..1b804deef6d8e2b43d7dff874f4620a4d08e5717 100644 (file)
@@ -52,9 +52,10 @@ int parse_gpt_entry(gpt_entry_t *gpt_entry, partition_entry_t *entry)
        if (result != 0) {
                return result;
        }
-       entry->start = (uint64_t)gpt_entry->first_lba * PARTITION_BLOCK_SIZE;
+       entry->start = (uint64_t)gpt_entry->first_lba *
+                      PLAT_PARTITION_BLOCK_SIZE;
        entry->length = (uint64_t)(gpt_entry->last_lba -
                                   gpt_entry->first_lba + 1) *
-                       PARTITION_BLOCK_SIZE;
+                       PLAT_PARTITION_BLOCK_SIZE;
        return 0;
 }
index 7fdbf5385aa7fe10ea62422133094d6abdf26ffc..68133eaf4f1b7951c33e11b4c23ebfdc79598ec0 100644 (file)
@@ -15,7 +15,7 @@
 #include <drivers/partition/mbr.h>
 #include <plat/common/platform.h>
 
-static uint8_t mbr_sector[PARTITION_BLOCK_SIZE];
+static uint8_t mbr_sector[PLAT_PARTITION_BLOCK_SIZE];
 static partition_entry_list_t list;
 
 #if LOG_LEVEL >= LOG_LEVEL_VERBOSE
@@ -57,15 +57,15 @@ static int load_mbr_header(uintptr_t image_handle, mbr_entry_t *mbr_entry)
                return result;
        }
        result = io_read(image_handle, (uintptr_t)&mbr_sector,
-                        PARTITION_BLOCK_SIZE, &bytes_read);
+                        PLAT_PARTITION_BLOCK_SIZE, &bytes_read);
        if (result != 0) {
                WARN("Failed to read data (%i)\n", result);
                return result;
        }
 
        /* Check MBR boot signature. */
-       if ((mbr_sector[PARTITION_BLOCK_SIZE - 2] != MBR_SIGNATURE_FIRST) ||
-           (mbr_sector[PARTITION_BLOCK_SIZE - 1] != MBR_SIGNATURE_SECOND)) {
+       if ((mbr_sector[LEGACY_PARTITION_BLOCK_SIZE - 2] != MBR_SIGNATURE_FIRST) ||
+           (mbr_sector[LEGACY_PARTITION_BLOCK_SIZE - 1] != MBR_SIGNATURE_SECOND)) {
                return -ENOENT;
        }
        offset = (uintptr_t)&mbr_sector + MBR_PRIMARY_ENTRY_OFFSET;
@@ -120,15 +120,15 @@ static int load_mbr_entry(uintptr_t image_handle, mbr_entry_t *mbr_entry,
                return result;
        }
        result = io_read(image_handle, (uintptr_t)&mbr_sector,
-                        PARTITION_BLOCK_SIZE, &bytes_read);
+                        PLAT_PARTITION_BLOCK_SIZE, &bytes_read);
        if (result != 0) {
                WARN("Failed to read data (%i)\n", result);
                return result;
        }
 
        /* Check MBR boot signature. */
-       if ((mbr_sector[PARTITION_BLOCK_SIZE - 2] != MBR_SIGNATURE_FIRST) ||
-           (mbr_sector[PARTITION_BLOCK_SIZE - 1] != MBR_SIGNATURE_SECOND)) {
+       if ((mbr_sector[LEGACY_PARTITION_BLOCK_SIZE - 2] != MBR_SIGNATURE_FIRST) ||
+           (mbr_sector[LEGACY_PARTITION_BLOCK_SIZE - 1] != MBR_SIGNATURE_SECOND)) {
                return -ENOENT;
        }
        offset = (uintptr_t)&mbr_sector +
index 9c72d4dff311fc5d2c0a1793ef693ceaeca6d6f7..c4f42d04d2fd2bdae238bf88737c384e28907072 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved.
+ * Copyright (c) 2015-2019, ARM Limited and Contributors. All rights reserved.
  *
  * SPDX-License-Identifier: BSD-3-Clause
  */
@@ -366,6 +366,7 @@ typedef struct gicv3_its_ctx {
  * GICv3 EL3 driver API
  ******************************************************************************/
 void gicv3_driver_init(const gicv3_driver_data_t *plat_driver_data);
+int gicv3_rdistif_probe(const uintptr_t gicr_frame);
 void gicv3_distif_init(void);
 void gicv3_rdistif_init(unsigned int proc_num);
 void gicv3_rdistif_on(unsigned int proc_num);
index 3ae160fdc1e1bd28465c0f072c13748bd67d6b0f..d923e9535f3771de647256368fc3c86d3db3e3b2 100644 (file)
@@ -10,9 +10,9 @@
 #include <drivers/partition/partition.h>
 
 #define PARTITION_TYPE_GPT             0xee
-#define GPT_HEADER_OFFSET              PARTITION_BLOCK_SIZE
+#define GPT_HEADER_OFFSET              PLAT_PARTITION_BLOCK_SIZE
 #define GPT_ENTRY_OFFSET               (GPT_HEADER_OFFSET +            \
-                                        PARTITION_BLOCK_SIZE)
+                                        PLAT_PARTITION_BLOCK_SIZE)
 #define GUID_LEN                       16
 
 #define GPT_SIGNATURE                  "EFI PART"
index d94c7824a63f6cba6c233e7195c736be982566fa..5f6483373f3da2ab55b7ed5cc00e6e01952a4172 100644 (file)
 
 CASSERT(PLAT_PARTITION_MAX_ENTRIES <= 128, assert_plat_partition_max_entries);
 
-#define PARTITION_BLOCK_SIZE           512
+#if !PLAT_PARTITION_BLOCK_SIZE
+# define PLAT_PARTITION_BLOCK_SIZE     512
+#endif /* PLAT_PARTITION_BLOCK_SIZE */
+
+CASSERT((PLAT_PARTITION_BLOCK_SIZE == 512) ||
+       (PLAT_PARTITION_BLOCK_SIZE == 4096),
+       assert_plat_partition_block_size);
+
+#define LEGACY_PARTITION_BLOCK_SIZE    512
 
 #define EFI_NAMELEN                    36
 
index 04e5e3d7261aa09d9fc4e3ca2252f88df5db5e1b..7f7b7e3ff5262b08aef36c9a020eeb674dc18cd0 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2013-2018, ARM Limited and Contributors. All rights reserved.
+ * Copyright (c) 2013-2019, ARM Limited and Contributors. All rights reserved.
  *
  * SPDX-License-Identifier: BSD-3-Clause
  */
@@ -301,6 +301,8 @@ typedef struct plat_psci_ops {
                                const psci_power_state_t *target_state);
        void (*pwr_domain_suspend)(const psci_power_state_t *target_state);
        void (*pwr_domain_on_finish)(const psci_power_state_t *target_state);
+       void (*pwr_domain_on_finish_late)(
+                               const psci_power_state_t *target_state);
        void (*pwr_domain_suspend_finish)(
                                const psci_power_state_t *target_state);
        void __dead2 (*pwr_domain_pwr_down_wfi)(
index b82ff47e7b5a1b21550f6795d5fb01d0fff9c515..93f86162e9652bc98de21ea2657b913fa73fc648 100644 (file)
@@ -27,6 +27,7 @@ static inline unsigned int css_system_pwr_state(const psci_power_state_t *state)
 
 int css_pwr_domain_on(u_register_t mpidr);
 void css_pwr_domain_on_finish(const psci_power_state_t *target_state);
+void css_pwr_domain_on_finish_late(const psci_power_state_t *target_state);
 void css_pwr_domain_off(const psci_power_state_t *target_state);
 void css_pwr_domain_suspend(const psci_power_state_t *target_state);
 void css_pwr_domain_suspend_finish(
index aa6b324ed69e6dcc44113608f1a11dc61b537105..470b4f33ec4a49c9a5eeea6256b0c00d58e88596 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2013-2018, ARM Limited and Contributors. All rights reserved.
+ * Copyright (c) 2013-2019, ARM Limited and Contributors. All rights reserved.
  *
  * SPDX-License-Identifier: BSD-3-Clause
  */
@@ -181,6 +181,14 @@ void psci_cpu_on_finish(int cpu_idx, const psci_power_state_t *state_info)
        psci_do_pwrup_cache_maintenance();
 #endif
 
+       /*
+        * Plat. management: Perform any platform specific actions which
+        * can only be done with the cpu and the cluster guaranteed to
+        * be coherent.
+        */
+       if (psci_plat_pm_ops->pwr_domain_on_finish_late != NULL)
+               psci_plat_pm_ops->pwr_domain_on_finish_late(state_info);
+
        /*
         * All the platform specific actions for turning this cpu
         * on have completed. Perform enough arch.initialization
index 42dec8dfc81ab0ee57fa84f17d1448ac951161d4..0a62543fa9c9e1670139c278a2bfbb254dfe41e8 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2013-2018, ARM Limited and Contributors. All rights reserved.
+ * Copyright (c) 2013-2019, ARM Limited and Contributors. All rights reserved.
  *
  * SPDX-License-Identifier: BSD-3-Clause
  */
@@ -247,10 +247,19 @@ static void fvp_pwr_domain_on_finish(const psci_power_state_t *target_state)
 {
        fvp_power_domain_on_finish_common(target_state);
 
-       /* Enable the gic cpu interface */
+}
+
+/*******************************************************************************
+ * FVP handler called when a power domain has just been powered on and the cpu
+ * and its cluster are fully participating in coherent transaction on the
+ * interconnect. Data cache must be enabled for CPU at this point.
+ ******************************************************************************/
+static void fvp_pwr_domain_on_finish_late(const psci_power_state_t *target_state)
+{
+       /* Program GIC per-cpu distributor or re-distributor interface */
        plat_arm_gic_pcpu_init();
 
-       /* Program the gic per-cpu distributor or re-distributor interface */
+       /* Enable GIC CPU interface */
        plat_arm_gic_cpuif_enable();
 }
 
@@ -272,7 +281,7 @@ static void fvp_pwr_domain_suspend_finish(const psci_power_state_t *target_state
 
        fvp_power_domain_on_finish_common(target_state);
 
-       /* Enable the gic cpu interface */
+       /* Enable GIC CPU interface */
        plat_arm_gic_cpuif_enable();
 }
 
@@ -397,6 +406,7 @@ plat_psci_ops_t plat_arm_psci_pm_ops = {
        .pwr_domain_off = fvp_pwr_domain_off,
        .pwr_domain_suspend = fvp_pwr_domain_suspend,
        .pwr_domain_on_finish = fvp_pwr_domain_on_finish,
+       .pwr_domain_on_finish_late = fvp_pwr_domain_on_finish_late,
        .pwr_domain_suspend_finish = fvp_pwr_domain_suspend_finish,
        .system_off = fvp_system_off,
        .system_reset = fvp_system_reset,
index 0d160cb1ddad33c1aca33cfec406db98d1db2ba9..dc50764356d8870dbbc704f101c032f6e9de8935 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2016-2018, ARM Limited and Contributors. All rights reserved.
+ * Copyright (c) 2016-2019, ARM Limited and Contributors. All rights reserved.
  *
  * SPDX-License-Identifier: BSD-3-Clause
  */
@@ -8,39 +8,41 @@
 #include <stdint.h>
 #include <string.h>
 
+#include <lib/mmio.h>
+
 #include <plat/common/platform.h>
 #include <platform_def.h>
 #include <tools_share/tbbr_oid.h>
 
 /*
- * Store a new non-volatile counter value. On some FVP versions, the
- * non-volatile counters are RO. On these versions we expect the values in the
- * certificates to always match the RO values so that this function is never
- * called.
+ * Store a new non-volatile counter value.
+ *
+ * On some FVP versions, the non-volatile counters are read-only so this
+ * function will always fail.
  *
  * Return: 0 = success, Otherwise = error
  */
 int plat_set_nv_ctr(void *cookie, unsigned int nv_ctr)
 {
        const char *oid;
-       uint32_t *nv_ctr_addr;
+       uintptr_t nv_ctr_addr;
 
        assert(cookie != NULL);
 
        oid = (const char *)cookie;
        if (strcmp(oid, TRUSTED_FW_NVCOUNTER_OID) == 0) {
-               nv_ctr_addr = (uint32_t *)TFW_NVCTR_BASE;
+               nv_ctr_addr = TFW_NVCTR_BASE;
        } else if (strcmp(oid, NON_TRUSTED_FW_NVCOUNTER_OID) == 0) {
-               nv_ctr_addr = (uint32_t *)NTFW_CTR_BASE;
+               nv_ctr_addr = NTFW_CTR_BASE;
        } else {
                return 1;
        }
 
-       *(unsigned int *)nv_ctr_addr = nv_ctr;
-
-       /* Verify that the current value is the one we just wrote. */
-       if (nv_ctr != (unsigned int)(*nv_ctr_addr))
-               return 1;
+       mmio_write_32(nv_ctr_addr, nv_ctr);
 
-       return 0;
+       /*
+        * If the FVP models a locked counter then its value cannot be updated
+        * and the above write operation has been silently ignored.
+        */
+       return (mmio_read_32(nv_ctr_addr) == nv_ctr) ? 0 : 1;
 }
index 7f4957fa92e5df01000453b216565a080e086330..fef53761c219dd3cad58e77313edfdeb055adeea 100644 (file)
@@ -4,6 +4,7 @@
  * SPDX-License-Identifier: BSD-3-Clause
  */
 
+#include <assert.h>
 #include <platform_def.h>
 
 #include <common/interrupt_props.h>
@@ -67,7 +68,7 @@ static unsigned int arm_gicv3_mpidr_hash(u_register_t mpidr)
 
 static const gicv3_driver_data_t arm_gic_data __unused = {
        .gicd_base = PLAT_ARM_GICD_BASE,
-       .gicr_base = PLAT_ARM_GICR_BASE,
+       .gicr_base = 0U,
        .interrupt_props = arm_interrupt_props,
        .interrupt_props_num = ARRAY_SIZE(arm_interrupt_props),
        .rdistif_num = PLATFORM_CORE_COUNT,
@@ -86,6 +87,11 @@ void __init plat_arm_gic_driver_init(void)
 #if (!defined(__aarch64__) && defined(IMAGE_BL32)) || \
        (defined(__aarch64__) && defined(IMAGE_BL31))
        gicv3_driver_init(&arm_gic_data);
+
+       if (gicv3_rdistif_probe(PLAT_ARM_GICR_BASE) == -1) {
+               ERROR("No GICR base frame found for Primary CPU\n");
+               panic();
+       }
 #endif
 }
 
@@ -116,10 +122,20 @@ void plat_arm_gic_cpuif_disable(void)
 }
 
 /******************************************************************************
- * ARM common helper to initialize the per-cpu redistributor interface in GICv3
+ * ARM common helper function to iterate over all GICR frames and discover the
+ * corresponding per-cpu redistributor frame as well as initialize the
+ * corresponding interface in GICv3. At the moment, Arm platforms do not have
+ * non-contiguous GICR frames.
  *****************************************************************************/
 void plat_arm_gic_pcpu_init(void)
 {
+       int result;
+
+       result = gicv3_rdistif_probe(PLAT_ARM_GICR_BASE);
+       if (result == -1) {
+               ERROR("No GICR base frame found for CPU 0x%lx\n", read_mpidr());
+               panic();
+       }
        gicv3_rdistif_init(plat_my_core_pos());
 }
 
index f6fc6aa7aab3b1c623ed03449ac4fc93fe70851e..01c674f82e1483e65c004757c7d4342b2bf4e249 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved.
+ * Copyright (c) 2015-2019, ARM Limited and Contributors. All rights reserved.
  *
  * SPDX-License-Identifier: BSD-3-Clause
  */
@@ -76,9 +76,6 @@ static void css_pwr_domain_on_finisher_common(
 {
        assert(CSS_CORE_PWR_STATE(target_state) == ARM_LOCAL_STATE_OFF);
 
-       /* Enable the gic cpu interface */
-       plat_arm_gic_cpuif_enable();
-
        /*
         * Perform the common cluster specific operations i.e enable coherency
         * if this cluster was off.
@@ -100,10 +97,21 @@ void css_pwr_domain_on_finish(const psci_power_state_t *target_state)
        /* Assert that the system power domain need not be initialized */
        assert(css_system_pwr_state(target_state) == ARM_LOCAL_STATE_RUN);
 
+       css_pwr_domain_on_finisher_common(target_state);
+}
+
+/*******************************************************************************
+ * Handler called when a power domain has just been powered on and the cpu
+ * and its cluster are fully participating in coherent transaction on the
+ * interconnect. Data cache must be enabled for CPU at this point.
+ ******************************************************************************/
+void css_pwr_domain_on_finish_late(const psci_power_state_t *target_state)
+{
        /* Program the gic per-cpu distributor or re-distributor interface */
        plat_arm_gic_pcpu_init();
 
-       css_pwr_domain_on_finisher_common(target_state);
+       /* Enable the gic cpu interface */
+       plat_arm_gic_cpuif_enable();
 }
 
 /*******************************************************************************
@@ -185,6 +193,9 @@ void css_pwr_domain_suspend_finish(
                arm_system_pwr_domain_resume();
 
        css_pwr_domain_on_finisher_common(target_state);
+
+       /* Enable the gic cpu interface */
+       plat_arm_gic_cpuif_enable();
 }
 
 /*******************************************************************************
@@ -306,6 +317,7 @@ static int css_translate_power_state_by_mpidr(u_register_t mpidr,
 plat_psci_ops_t plat_arm_psci_pm_ops = {
        .pwr_domain_on          = css_pwr_domain_on,
        .pwr_domain_on_finish   = css_pwr_domain_on_finish,
+       .pwr_domain_on_finish_late = css_pwr_domain_on_finish_late,
        .pwr_domain_off         = css_pwr_domain_off,
        .cpu_standby            = css_cpu_standby,
        .pwr_domain_suspend     = css_pwr_domain_suspend,
index 2f96efcdb3853591201005facc5ecaf4c25d6970..96136ec126f0f822df1dc684d6c3dc17b0edf74e 100644 (file)
@@ -114,6 +114,11 @@ uint32_t hikey_get_spsr_for_bl33_entry(void)
 }
 #endif /* __aarch64__ */
 
+int bl2_plat_handle_pre_image_load(unsigned int image_id)
+{
+       return hikey_set_fip_addr(image_id, "fastboot");
+}
+
 int hikey_bl2_handle_post_image_load(unsigned int image_id)
 {
        int err = 0;
index 11dd97334c4e54022b8a7214cf75a7932b9e0063..fd610d8c0c667a24451bbbcc8b164aa8e89875f7 100644 (file)
@@ -18,6 +18,7 @@
 #include <drivers/io/io_memmap.h>
 #include <drivers/io/io_storage.h>
 #include <drivers/mmc.h>
+#include <drivers/partition/partition.h>
 #include <lib/mmio.h>
 #include <lib/semihosting.h>
 #include <tools_share/firmware_image_package.h>
@@ -43,9 +44,12 @@ static uintptr_t fip_dev_handle;
 static int check_emmc(const uintptr_t spec);
 static int check_fip(const uintptr_t spec);
 
-static const io_block_spec_t emmc_fip_spec = {
-       .offset         = HIKEY_FIP_BASE,
-       .length         = HIKEY_FIP_MAX_SIZE,
+static io_block_spec_t emmc_fip_spec;
+
+static const io_block_spec_t emmc_gpt_spec = {
+       .offset         = 0,
+       .length         = PLAT_PARTITION_BLOCK_SIZE *
+                         (PLAT_PARTITION_MAX_ENTRIES / 4 + 2),
 };
 
 static const io_block_dev_spec_t emmc_dev_spec = {
@@ -213,6 +217,11 @@ static const struct plat_io_policy policies[] = {
                check_fip
        },
 #endif /* TRUSTED_BOARD_BOOT */
+       [GPT_IMAGE_ID] = {
+               &emmc_dev_handle,
+               (uintptr_t)&emmc_gpt_spec,
+               check_emmc
+       },
 };
 
 static int check_emmc(const uintptr_t spec)
@@ -267,6 +276,23 @@ void hikey_io_setup(void)
        (void)result;
 }
 
+int hikey_set_fip_addr(unsigned int image_id, const char *name)
+{
+       const partition_entry_t *entry;
+
+       if (emmc_fip_spec.length == 0) {
+               partition_init(GPT_IMAGE_ID);
+               entry = get_partition_entry(name);
+               if (entry == NULL) {
+                       ERROR("Could NOT find the %s partition!\n", name);
+                       return -ENOENT;
+               }
+               emmc_fip_spec.offset = entry->start;
+               emmc_fip_spec.length = entry->length;
+       }
+       return 0;
+}
+
 /* Return an IO device handle and specification which can be used to access
  * an image. Use this to enforce platform load policy
  */
index d82a0794a0c5d6e850a74a89ede6cd9bbc6b022c..b75bc723d7f3cb95fd2eb3572728fd9e68ba32b5 100644 (file)
@@ -72,4 +72,6 @@ int hikey_write_serialno(struct random_serial_num *serialno);
 
 void init_acpu_dvfs(void);
 
+int hikey_set_fip_addr(unsigned int image_id, const char *name);
+
 #endif /* HIKEY_PRIVATE_H */
index 4fb3e56a17b01636111023ffa19e3bad91365d85..590700daf91540400826e2757bded6dcf631a966 100644 (file)
@@ -84,8 +84,6 @@
 #define HIKEY_BL1_MMC_DATA_SIZE                0x0000B000
 
 #define EMMC_BASE                      0
-#define HIKEY_FIP_BASE                 (EMMC_BASE + (4 << 20))
-#define HIKEY_FIP_MAX_SIZE             (8 << 20)
 #define HIKEY_EMMC_RPMB_BASE           (EMMC_BASE + 0)
 #define HIKEY_EMMC_RPMB_MAX_SIZE       (128 << 10)
 #define HIKEY_EMMC_USERDATA_BASE       (EMMC_BASE + 0)
index 7fd897cdab134be222c6e9d54de27d0e6b7e6be6..fbf743292753b478cf4c348f415b971d87a2813d 100644 (file)
@@ -76,6 +76,8 @@ BL2_SOURCES           +=      common/desc_image_load.c                \
                                drivers/io/io_fip.c                     \
                                drivers/io/io_storage.c                 \
                                drivers/mmc/mmc.c                       \
+                               drivers/partition/gpt.c                 \
+                               drivers/partition/partition.c           \
                                drivers/synopsys/emmc/dw_mmc.c          \
                                lib/cpus/aarch64/cortex_a53.S           \
                                plat/hisilicon/hikey/aarch64/hikey_helpers.S \
index fc9ddab0dfc2c01a304cb15ca015bbbe661b420b..35d76921dc7dbdd253d1da30e9c1cab930b1df8d 100644 (file)
@@ -18,6 +18,7 @@
 #include <drivers/delay_timer.h>
 #include <drivers/dw_ufs.h>
 #include <drivers/generic_delay_timer.h>
+#include <drivers/partition/partition.h>
 #include <drivers/ufs.h>
 #include <lib/mmio.h>
 #ifdef SPD_opteed
@@ -263,6 +264,11 @@ int hikey960_bl2_handle_post_image_load(unsigned int image_id)
  * This function can be used by the platforms to update/use image
  * information for given `image_id`.
  ******************************************************************************/
+int bl2_plat_handle_pre_image_load(unsigned int image_id)
+{
+       return hikey960_set_fip_addr(image_id, "fip");
+}
+
 int bl2_plat_handle_post_image_load(unsigned int image_id)
 {
        return hikey960_bl2_handle_post_image_load(image_id);
index 4ea3acd5100f3e763795962823b21de9273410a9..9651d78919e0c50507ad7fc41c02182a16264532 100644 (file)
@@ -44,9 +44,6 @@
 #define PL011_UART_CLK_IN_HZ           19200000
 
 #define UFS_BASE                       0
-/* FIP partition */
-#define HIKEY960_FIP_BASE              (UFS_BASE + 0x1400000)
-#define HIKEY960_FIP_MAX_SIZE          (12 << 20)
 
 #define HIKEY960_UFS_DESC_BASE         0x20000000
 #define HIKEY960_UFS_DESC_SIZE         0x00200000      /* 2MB */
index a4e83897ededa327860d681aad29c4e0885ef584..e1c5845fbdb1e7f8bc7f69ed50dc88195d9fd097 100644 (file)
@@ -18,6 +18,7 @@
 #include <drivers/io/io_fip.h>
 #include <drivers/io/io_memmap.h>
 #include <drivers/io/io_storage.h>
+#include <drivers/partition/partition.h>
 #include <lib/mmio.h>
 #include <lib/semihosting.h>
 #include <tools_share/firmware_image_package.h>
@@ -36,9 +37,12 @@ static int check_fip(const uintptr_t spec);
 size_t ufs_read_lun3_blks(int lba, uintptr_t buf, size_t size);
 size_t ufs_write_lun3_blks(int lba, const uintptr_t buf, size_t size);
 
-static const io_block_spec_t ufs_fip_spec = {
-       .offset         = HIKEY960_FIP_BASE,
-       .length         = HIKEY960_FIP_MAX_SIZE,
+static io_block_spec_t ufs_fip_spec;
+
+static const io_block_spec_t ufs_gpt_spec = {
+       .offset         = 0,
+       .length         = PLAT_PARTITION_BLOCK_SIZE *
+                         (PLAT_PARTITION_MAX_ENTRIES / 4 + 2),
 };
 
 static const io_block_dev_spec_t ufs_dev_spec = {
@@ -199,6 +203,11 @@ static const struct plat_io_policy policies[] = {
                check_fip
        },
 #endif /* TRUSTED_BOARD_BOOT */
+       [GPT_IMAGE_ID] = {
+               &ufs_dev_handle,
+               (uintptr_t)&ufs_gpt_spec,
+               check_ufs
+       },
 };
 
 static int check_ufs(const uintptr_t spec)
@@ -253,6 +262,23 @@ void hikey960_io_setup(void)
        (void)result;
 }
 
+int hikey960_set_fip_addr(unsigned int image_id, const char *name)
+{
+       const partition_entry_t *entry;
+
+       if (ufs_fip_spec.length == 0) {
+               partition_init(GPT_IMAGE_ID);
+               entry = get_partition_entry(name);
+               if (entry == NULL) {
+                       ERROR("Could NOT find the %s partition!\n", name);
+                       return -ENOENT;
+               }
+               ufs_fip_spec.offset = entry->start;
+               ufs_fip_spec.length = entry->length;
+       }
+       return 0;
+}
+
 /* Return an IO device handle and specification which can be used to access
  * an image. Use this to enforce platform load policy
  */
index 9a18dd620c5c0ff31f8cf7b72c3cc54021f40dfd..54bf501341083573850cba91e77ffec9f78c1943 100644 (file)
@@ -26,6 +26,7 @@ void hikey960_init_mmu_el3(unsigned long total_base,
                        unsigned long coh_limit);
 void hikey960_io_setup(void);
 int hikey960_read_boardid(unsigned int *id);
+int hikey960_set_fip_addr(unsigned int image_id, const char *name);
 void hikey960_clk_init(void);
 void hikey960_pmu_init(void);
 void hikey960_regulator_enable(void);
index 4f2c3c699fef0afee85b8418d13e15490ab26d31..6cb53c7b6cb18f3de3287596a44cdee62daf4b53 100644 (file)
@@ -22,11 +22,13 @@ COLD_BOOT_SINGLE_CPU                :=      1
 PLAT_PL061_MAX_GPIOS           :=      176
 PROGRAMMABLE_RESET_ADDRESS     :=      1
 ENABLE_SVE_FOR_NS              :=      0
+PLAT_PARTITION_BLOCK_SIZE      :=      4096
 
 # Process flags
 $(eval $(call add_define,HIKEY960_TSP_RAM_LOCATION_ID))
 $(eval $(call add_define,CRASH_CONSOLE_BASE))
 $(eval $(call add_define,PLAT_PL061_MAX_GPIOS))
+$(eval $(call add_define,PLAT_PARTITION_BLOCK_SIZE))
 
 # Add the build options to pack Trusted OS Extra1 and Trusted OS Extra2 images
 # in the FIP if the platform requires.
@@ -75,6 +77,8 @@ BL2_SOURCES           +=      common/desc_image_load.c                \
                                drivers/io/io_block.c                   \
                                drivers/io/io_fip.c                     \
                                drivers/io/io_storage.c                 \
+                               drivers/partition/gpt.c                 \
+                               drivers/partition/partition.c           \
                                drivers/synopsys/ufs/dw_ufs.c           \
                                drivers/ufs/ufs.c                       \
                                lib/cpus/aarch64/cortex_a53.S           \
index c101cdc8117740da780a5c9765176d12d60091f5..9dccab82bee4dbe68809d02c366377d972670682 100644 (file)
@@ -69,7 +69,7 @@
 /*******************************************************************************
  * Platform memory map related constants
  ******************************************************************************/
-/* TF txet, ro, rw, Size: 512KB */
+/* TF text, ro, rw, Size: 512KB */
 #define TZRAM_BASE             (0x0)
 #define TZRAM_SIZE             (0x80000)
 
@@ -79,7 +79,7 @@
 /*
  * Put BL3-1 at the top of the Trusted RAM
  */
-#define BL31_BASE              (TZRAM_BASE + 0x10000)
+#define BL31_BASE              (TZRAM_BASE + 0x40000)
 #define BL31_LIMIT             (TZRAM_BASE + TZRAM_SIZE)
 
 /*******************************************************************************
index 743dad41b74ff681b0237f55c5e98a9d0c6244d5..ffdb2f38c484e5ef4206ad1812334e2eeb84dc47 100644 (file)
@@ -10,9 +10,9 @@
 /*******************************************************************************
  * Platform memory map related constants
  ******************************************************************************/
-/* TF txet, ro, rw, Size: 2MB */
+/* TF text, ro, rw, Size: 1MB */
 #define TZRAM_BASE             (0x0)
-#define TZRAM_SIZE             (0x200000)
+#define TZRAM_SIZE             (0x100000)
 
 /*******************************************************************************
  * BL32 specific defines.
@@ -20,7 +20,7 @@
 /*
  * Put BL32 at the top of the Trusted RAM
  */
-#define BL32_BASE                      (TZRAM_BASE + 0x100000)
+#define BL32_BASE                      (TZRAM_BASE + 0x40000)
 #define BL32_LIMIT                     (TZRAM_BASE + TZRAM_SIZE)
 
 #endif /* BL32_PARAM_H */
index 3104d9fcbfae18bcf6bd8135ab7d33ca924eb7fa..baac12d3bafed8f832abe07ae66b0fd82d688889 100644 (file)
@@ -66,7 +66,7 @@
 /*******************************************************************************
  * Platform memory map related constants
  ******************************************************************************/
-/* TF txet, ro, rw, Size: 512KB */
+/* TF text, ro, rw, Size: 512KB */
 #define TZRAM_BASE             (0x0)
 #define TZRAM_SIZE             (0x80000)
 
@@ -76,7 +76,7 @@
 /*
  * Put BL3-1 at the top of the Trusted RAM
  */
-#define BL31_BASE              (TZRAM_BASE + 0x10000)
+#define BL31_BASE              (TZRAM_BASE + 0x40000)
 #define BL31_LIMIT             (TZRAM_BASE + TZRAM_SIZE)
 
 /*******************************************************************************
index 7b3cc6eba9e43daeeb79a556ece13eeb30614348..9334a83ae69eded7215c40c0bc02302ac8b6f202 100644 (file)
@@ -67,7 +67,7 @@
 /*******************************************************************************
  * Platform memory map related constants
  ******************************************************************************/
-/* TF txet, ro, rw, Size: 512KB */
+/* TF text, ro, rw, Size: 512KB */
 #define TZRAM_BASE             (0x0)
 #define TZRAM_SIZE             (0x80000)
 
@@ -77,7 +77,7 @@
 /*
  * Put BL3-1 at the top of the Trusted RAM
  */
-#define BL31_BASE              (TZRAM_BASE + 0x10000)
+#define BL31_BASE              (TZRAM_BASE + 0x40000)
 #define BL31_LIMIT     (TZRAM_BASE + TZRAM_SIZE)
 
 /*******************************************************************************
index e7f2226cd8dd646c776f76427471e9bf1ca4cf51..6e7e8ba099e9242fc2efea6291aea5ec20865ca8 100644 (file)
@@ -20,7 +20,7 @@
 /*
  * Put BL31 at the top of the Trusted RAM
  */
-#define BL31_BASE              (TZRAM_BASE + 0x1000)
+#define BL31_BASE              (TZRAM_BASE + 0x40000)
 #define BL31_LIMIT             (TZRAM_BASE + TZRAM_SIZE)
 
 #endif /* BL31_PARAM_H */