bl31.ld.S 8.91 KB
Newer Older
1
/*
2
 * Copyright (c) 2013-2018, ARM Limited and Contributors. All rights reserved.
3
 *
dp-arm's avatar
dp-arm committed
4
 * SPDX-License-Identifier: BSD-3-Clause
5
6
 */

7
#include <platform_def.h>
8
#include <xlat_tables_defs.h>
9
10
11

OUTPUT_FORMAT(PLATFORM_LINKER_FORMAT)
OUTPUT_ARCH(PLATFORM_LINKER_ARCH)
12
ENTRY(bl31_entrypoint)
13
14
15


MEMORY {
16
    RAM (rwx): ORIGIN = BL31_BASE, LENGTH = BL31_LIMIT - BL31_BASE
17
18
}

19
20
21
#ifdef PLAT_EXTRA_LD_SCRIPT
#include <plat.ld.S>
#endif
22
23
24

SECTIONS
{
25
    . = BL31_BASE;
26
    ASSERT(. == ALIGN(PAGE_SIZE),
27
           "BL31_BASE address is not aligned on a page boundary.")
28

29
30
    __BL31_START__ = .;

31
32
33
34
35
36
#if SEPARATE_CODE_AND_RODATA
    .text . : {
        __TEXT_START__ = .;
        *bl31_entrypoint.o(.text*)
        *(.text*)
        *(.vectors)
37
        . = ALIGN(PAGE_SIZE);
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
        __TEXT_END__ = .;
    } >RAM

    .rodata . : {
        __RODATA_START__ = .;
        *(.rodata*)

        /* Ensure 8-byte alignment for descriptors and ensure inclusion */
        . = ALIGN(8);
        __RT_SVC_DESCS_START__ = .;
        KEEP(*(rt_svc_descs))
        __RT_SVC_DESCS_END__ = .;

#if ENABLE_PMF
        /* Ensure 8-byte alignment for descriptors and ensure inclusion */
        . = ALIGN(8);
        __PMF_SVC_DESCS_START__ = .;
        KEEP(*(pmf_svc_descs))
        __PMF_SVC_DESCS_END__ = .;
#endif /* ENABLE_PMF */

        /*
         * Ensure 8-byte alignment for cpu_ops so that its fields are also
         * aligned. Also ensure cpu_ops inclusion.
         */
        . = ALIGN(8);
        __CPU_OPS_START__ = .;
        KEEP(*(cpu_ops))
        __CPU_OPS_END__ = .;

68
        /*
69
         * Keep the .got section in the RO section as it is patched
70
         * prior to enabling the MMU and having the .got in RO is better for
71
         * security. GOT is a table of addresses so ensure 8-byte alignment.
72
         */
73
        . = ALIGN(8);
74
75
76
77
        __GOT_START__ = .;
        *(.got)
        __GOT_END__ = .;

78
79
80
81
        /* Place pubsub sections for events */
        . = ALIGN(8);
#include <pubsub_events.h>

82
        . = ALIGN(PAGE_SIZE);
83
84
85
        __RODATA_END__ = .;
    } >RAM
#else
86
87
    ro . : {
        __RO_START__ = .;
Andrew Thoelke's avatar
Andrew Thoelke committed
88
89
        *bl31_entrypoint.o(.text*)
        *(.text*)
90
        *(.rodata*)
Achin Gupta's avatar
Achin Gupta committed
91

Andrew Thoelke's avatar
Andrew Thoelke committed
92
        /* Ensure 8-byte alignment for descriptors and ensure inclusion */
Achin Gupta's avatar
Achin Gupta committed
93
94
        . = ALIGN(8);
        __RT_SVC_DESCS_START__ = .;
Andrew Thoelke's avatar
Andrew Thoelke committed
95
        KEEP(*(rt_svc_descs))
Achin Gupta's avatar
Achin Gupta committed
96
97
        __RT_SVC_DESCS_END__ = .;

98
99
100
101
102
103
104
105
#if ENABLE_PMF
        /* Ensure 8-byte alignment for descriptors and ensure inclusion */
        . = ALIGN(8);
        __PMF_SVC_DESCS_START__ = .;
        KEEP(*(pmf_svc_descs))
        __PMF_SVC_DESCS_END__ = .;
#endif /* ENABLE_PMF */

106
107
108
109
110
111
112
113
114
        /*
         * Ensure 8-byte alignment for cpu_ops so that its fields are also
         * aligned. Also ensure cpu_ops inclusion.
         */
        . = ALIGN(8);
        __CPU_OPS_START__ = .;
        KEEP(*(cpu_ops))
        __CPU_OPS_END__ = .;

115
116
117
118
119
120
121
122
123
124
        /*
         * Keep the .got section in the RO section as it is patched
         * prior to enabling the MMU and having the .got in RO is better for
         * security. GOT is a table of addresses so ensure 8-byte alignment.
         */
        . = ALIGN(8);
        __GOT_START__ = .;
        *(.got)
        __GOT_END__ = .;

125
126
127
128
        /* Place pubsub sections for events */
        . = ALIGN(8);
#include <pubsub_events.h>

Achin Gupta's avatar
Achin Gupta committed
129
        *(.vectors)
130
131
132
133
134
135
        __RO_END_UNALIGNED__ = .;
        /*
         * Memory page(s) mapped to this section will be marked as read-only,
         * executable.  No RW data from the next section must creep in.
         * Ensure the rest of the current memory page is unused.
         */
136
        . = ALIGN(PAGE_SIZE);
137
        __RO_END__ = .;
138
    } >RAM
139
#endif
140

141
142
143
    ASSERT(__CPU_OPS_END__ > __CPU_OPS_START__,
           "cpu_ops not defined for this platform.")

144
145
146
147
148
149
150
151
152
#if ENABLE_SPM
    /*
     * Exception vectors of the SPM shim layer. They must be aligned to a 2K
     * address, but we need to place them in a separate page so that we can set
     * individual permissions to them, so the actual alignment needed is 4K.
     *
     * There's no need to include this into the RO section of BL31 because it
     * doesn't need to be accessed by BL31.
     */
153
    spm_shim_exceptions : ALIGN(PAGE_SIZE) {
154
155
        __SPM_SHIM_EXCEPTIONS_START__ = .;
        *(.spm_shim_exceptions)
156
        . = ALIGN(PAGE_SIZE);
157
158
159
160
        __SPM_SHIM_EXCEPTIONS_END__ = .;
    } >RAM
#endif

161
162
163
164
165
166
    /*
     * Define a linker symbol to mark start of the RW memory area for this
     * image.
     */
    __RW_START__ = . ;

167
168
169
170
171
172
    /*
     * .data must be placed at a lower address than the stacks if the stack
     * protector is enabled. Alternatively, the .data.stack_protector_canary
     * section can be placed independently of the main .data section.
     */
   .data . : {
173
        __DATA_START__ = .;
Andrew Thoelke's avatar
Andrew Thoelke committed
174
        *(.data*)
175
        __DATA_END__ = .;
176
177
    } >RAM

178
179
    /*
     * .rela.dyn needs to come after .data for the read-elf utility to parse
180
181
     * this section correctly. Ensure 8-byte alignment so that the fields of
     * RELA data structure are aligned.
182
     */
183
    . = ALIGN(8);
184
185
186
187
188
    __RELA_START__ = .;
    .rela.dyn . : {
    } >RAM
    __RELA_END__ = .;

189
#ifdef BL31_PROGBITS_LIMIT
190
    ASSERT(. <= BL31_PROGBITS_LIMIT, "BL31 progbits has exceeded its limit.")
191
192
#endif

193
194
195
196
    stacks (NOLOAD) : {
        __STACKS_START__ = .;
        *(tzfw_normal_stacks)
        __STACKS_END__ = .;
197
198
    } >RAM

199
200
    /*
     * The .bss section gets initialised to 0 at runtime.
201
202
     * Its base address should be 16-byte aligned for better performance of the
     * zero-initialization code.
203
     */
204
    .bss (NOLOAD) : ALIGN(16) {
205
        __BSS_START__ = .;
Andrew Thoelke's avatar
Andrew Thoelke committed
206
        *(.bss*)
207
        *(COMMON)
208
209
210
211
212
213
214
215
216
217
218
219
220
#if !USE_COHERENT_MEM
        /*
         * Bakery locks are stored in normal .bss memory
         *
         * Each lock's data is spread across multiple cache lines, one per CPU,
         * but multiple locks can share the same cache line.
         * The compiler will allocate enough memory for one CPU's bakery locks,
         * the remaining cache lines are allocated by the linker script
         */
        . = ALIGN(CACHE_WRITEBACK_GRANULE);
        __BAKERY_LOCK_START__ = .;
        *(bakery_lock)
        . = ALIGN(CACHE_WRITEBACK_GRANULE);
221
        __PERCPU_BAKERY_LOCK_SIZE__ = ABSOLUTE(. - __BAKERY_LOCK_START__);
222
223
        . = . + (__PERCPU_BAKERY_LOCK_SIZE__ * (PLATFORM_CORE_COUNT - 1));
        __BAKERY_LOCK_END__ = .;
224
225
226
227
228
229
230

	/*
	 * If BL31 doesn't use any bakery lock then __PERCPU_BAKERY_LOCK_SIZE__
	 * will be zero. For this reason, the only two valid values for
	 * __PERCPU_BAKERY_LOCK_SIZE__ are 0 or the platform defined value
	 * PLAT_PERCPU_BAKERY_LOCK_SIZE.
	 */
231
#ifdef PLAT_PERCPU_BAKERY_LOCK_SIZE
232
    ASSERT((__PERCPU_BAKERY_LOCK_SIZE__ == 0) || (__PERCPU_BAKERY_LOCK_SIZE__ == PLAT_PERCPU_BAKERY_LOCK_SIZE),
233
234
235
        "PLAT_PERCPU_BAKERY_LOCK_SIZE does not match bakery lock requirements");
#endif
#endif
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253

#if ENABLE_PMF
        /*
         * Time-stamps are stored in normal .bss memory
         *
         * The compiler will allocate enough memory for one CPU's time-stamps,
         * the remaining memory for other CPU's is allocated by the
         * linker script
         */
        . = ALIGN(CACHE_WRITEBACK_GRANULE);
        __PMF_TIMESTAMP_START__ = .;
        KEEP(*(pmf_timestamp_array))
        . = ALIGN(CACHE_WRITEBACK_GRANULE);
        __PMF_PERCPU_TIMESTAMP_END__ = .;
        __PERCPU_TIMESTAMP_SIZE__ = ABSOLUTE(. - __PMF_TIMESTAMP_START__);
        . = . + (__PERCPU_TIMESTAMP_SIZE__ * (PLATFORM_CORE_COUNT - 1));
        __PMF_TIMESTAMP_END__ = .;
#endif /* ENABLE_PMF */
254
        __BSS_END__ = .;
255
256
    } >RAM

257
    /*
258
     * The xlat_table section is for full, aligned page tables (4K).
259
     * Removing them from .bss avoids forcing 4K alignment on
260
261
     * the .bss section. The tables are initialized to zero by the translation
     * tables library.
262
263
264
265
266
     */
    xlat_table (NOLOAD) : {
        *(xlat_table)
    } >RAM

267
#if USE_COHERENT_MEM
268
269
270
271
272
273
    /*
     * The base address of the coherent memory section must be page-aligned (4K)
     * to guarantee that the coherent data are stored on their own pages and
     * are not mixed with normal data.  This is required to set up the correct
     * memory attributes for the coherent data page tables.
     */
274
    coherent_ram (NOLOAD) : ALIGN(PAGE_SIZE) {
275
        __COHERENT_RAM_START__ = .;
276
277
278
279
280
281
        /*
         * Bakery locks are stored in coherent memory
         *
         * Each lock's data is contiguous and fully allocated by the compiler
         */
        *(bakery_lock)
282
283
284
285
286
287
288
        *(tzfw_coherent_mem)
        __COHERENT_RAM_END_UNALIGNED__ = .;
        /*
         * Memory page(s) mapped to this section will be marked
         * as device memory.  No other unexpected data must creep in.
         * Ensure the rest of the current memory page is unused.
         */
289
        . = ALIGN(PAGE_SIZE);
290
        __COHERENT_RAM_END__ = .;
291
    } >RAM
292
#endif
293

294
295
296
297
298
    /*
     * Define a linker symbol to mark end of the RW memory area for this
     * image.
     */
    __RW_END__ = .;
299
    __BL31_END__ = .;
300

301
    ASSERT(. <= BL31_LIMIT, "BL31 image has exceeded its limit.")
302
}