blob: f47564054a60d127fa29b9de1ef94e3951b00d84 [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Dan Handleye83b0ca2014-01-14 18:17:09 +00002 * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
Dan Handley2bd4ef22014-04-09 13:14:54 +010031#include <arch.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010032#include <arch_helpers.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010033#include <assert.h>
Juan Castilloa08a5e72015-05-19 11:54:12 +010034#include <auth_mod.h>
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +010035#include <bl1.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010036#include <bl_common.h>
Dan Handley714a0d22014-04-09 13:13:04 +010037#include <debug.h>
Juan Castilloec813f52015-10-01 18:37:40 +010038#include <errno.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010039#include <platform.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010040#include <platform_def.h>
Juan Castillo3a66aca2015-04-13 17:36:19 +010041#include <stdint.h>
Dan Handleybcd60ba2014-04-17 18:53:42 +010042#include "bl2_private.h"
Achin Gupta4f6ad662013-10-25 09:08:21 +010043
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010044/*******************************************************************************
45 * Load the BL3-0 image if there's one.
46 * If a platform does not want to attempt to load BL3-0 image it must leave
47 * BL30_BASE undefined.
48 * Return 0 on success or if there's no BL3-0 image to load, a negative error
49 * code otherwise.
50 ******************************************************************************/
51static int load_bl30(void)
52{
53 int e = 0;
54#ifdef BL30_BASE
55 meminfo_t bl30_mem_info;
56 image_info_t bl30_image_info;
57
58 /*
59 * It is up to the platform to specify where BL3-0 should be loaded if
60 * it exists. It could create space in the secure sram or point to a
61 * completely different memory.
62 *
63 * The entry point information is not relevant in this case as the AP
64 * won't execute the BL3-0 image.
65 */
Dan Handley91b624e2014-07-29 17:14:00 +010066 INFO("BL2: Loading BL3-0\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010067 bl2_plat_get_bl30_meminfo(&bl30_mem_info);
Juan Castillo4db9d152014-11-13 17:04:33 +000068 bl30_image_info.h.version = VERSION_1;
Juan Castilloa08a5e72015-05-19 11:54:12 +010069 e = load_auth_image(&bl30_mem_info,
70 BL30_IMAGE_ID,
71 BL30_BASE,
72 &bl30_image_info,
73 NULL);
Juan Castillo9246ab82015-01-28 16:46:57 +000074
Juan Castilloa08a5e72015-05-19 11:54:12 +010075 if (e == 0) {
76 /* The subsequent handling of BL3-0 is platform specific */
77 e = bl2_plat_handle_bl30(&bl30_image_info);
78 if (e) {
79 ERROR("Failure in platform-specific handling of BL3-0 image.\n");
80 }
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010081 }
82#endif /* BL30_BASE */
83
84 return e;
85}
Vikram Kanigiria3a5e4a2014-05-15 18:27:15 +010086
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000087#ifndef EL3_PAYLOAD_BASE
Vikram Kanigiria3a5e4a2014-05-15 18:27:15 +010088/*******************************************************************************
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010089 * Load the BL3-1 image.
90 * The bl2_to_bl31_params and bl31_ep_info params will be updated with the
91 * relevant BL3-1 information.
92 * Return 0 on success, a negative error code otherwise.
Achin Gupta4f6ad662013-10-25 09:08:21 +010093 ******************************************************************************/
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010094static int load_bl31(bl31_params_t *bl2_to_bl31_params,
95 entry_point_info_t *bl31_ep_info)
Achin Gupta4f6ad662013-10-25 09:08:21 +010096{
Dan Handleye2712bc2014-04-10 15:37:22 +010097 meminfo_t *bl2_tzram_layout;
Vikram Kanigirida567432014-04-15 18:08:08 +010098 int e;
Achin Gupta4f6ad662013-10-25 09:08:21 +010099
Dan Handley91b624e2014-07-29 17:14:00 +0100100 INFO("BL2: Loading BL3-1\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100101 assert(bl2_to_bl31_params != NULL);
102 assert(bl31_ep_info != NULL);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100103
104 /* Find out how much free trusted ram remains after BL2 load */
Sandrine Bailleuxee12f6f2013-11-28 14:55:58 +0000105 bl2_tzram_layout = bl2_plat_sec_mem_layout();
Achin Gupta4f6ad662013-10-25 09:08:21 +0100106
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100107 /* Set the X0 parameter to BL3-1 */
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100108 bl31_ep_info->args.arg0 = (unsigned long)bl2_to_bl31_params;
109
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100110 /* Load the BL3-1 image */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100111 e = load_auth_image(bl2_tzram_layout,
112 BL31_IMAGE_ID,
113 BL31_BASE,
114 bl2_to_bl31_params->bl31_image_info,
115 bl31_ep_info);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100116
Juan Castilloa08a5e72015-05-19 11:54:12 +0100117 if (e == 0) {
118 bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info,
119 bl31_ep_info);
Sandrine Bailleuxaada44c2015-03-26 11:07:09 +0000120 }
Juan Castillo9246ab82015-01-28 16:46:57 +0000121
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100122 return e;
123}
Vikram Kanigirida567432014-04-15 18:08:08 +0100124
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100125/*******************************************************************************
126 * Load the BL3-2 image if there's one.
127 * The bl2_to_bl31_params param will be updated with the relevant BL3-2
128 * information.
129 * If a platform does not want to attempt to load BL3-2 image it must leave
130 * BL32_BASE undefined.
131 * Return 0 on success or if there's no BL3-2 image to load, a negative error
132 * code otherwise.
133 ******************************************************************************/
134static int load_bl32(bl31_params_t *bl2_to_bl31_params)
135{
136 int e = 0;
137#ifdef BL32_BASE
138 meminfo_t bl32_mem_info;
Harry Liebel561cd332014-02-14 14:42:48 +0000139
Dan Handley91b624e2014-07-29 17:14:00 +0100140 INFO("BL2: Loading BL3-2\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100141 assert(bl2_to_bl31_params != NULL);
Dan Handley21a30ab2014-04-15 11:38:38 +0100142
Achin Gupta4f6ad662013-10-25 09:08:21 +0100143 /*
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100144 * It is up to the platform to specify where BL3-2 should be loaded if
145 * it exists. It could create space in the secure sram or point to a
Dan Handley21a30ab2014-04-15 11:38:38 +0100146 * completely different memory.
Vikram Kanigiria3a5e4a2014-05-15 18:27:15 +0100147 */
Vikram Kanigirid8c9d262014-05-16 18:48:12 +0100148 bl2_plat_get_bl32_meminfo(&bl32_mem_info);
Juan Castilloa08a5e72015-05-19 11:54:12 +0100149 e = load_auth_image(&bl32_mem_info,
150 BL32_IMAGE_ID,
151 BL32_BASE,
152 bl2_to_bl31_params->bl32_image_info,
153 bl2_to_bl31_params->bl32_ep_info);
Juan Castillo9246ab82015-01-28 16:46:57 +0000154
Juan Castilloa08a5e72015-05-19 11:54:12 +0100155 if (e == 0) {
156 bl2_plat_set_bl32_ep_info(
157 bl2_to_bl31_params->bl32_image_info,
158 bl2_to_bl31_params->bl32_ep_info);
Sandrine Bailleuxaada44c2015-03-26 11:07:09 +0000159 }
Dan Handley21a30ab2014-04-15 11:38:38 +0100160#endif /* BL32_BASE */
Achin Guptaa3050ed2014-02-19 17:52:35 +0000161
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100162 return e;
163}
164
165/*******************************************************************************
166 * Load the BL3-3 image.
167 * The bl2_to_bl31_params param will be updated with the relevant BL3-3
168 * information.
169 * Return 0 on success, a negative error code otherwise.
170 ******************************************************************************/
171static int load_bl33(bl31_params_t *bl2_to_bl31_params)
172{
173 meminfo_t bl33_mem_info;
174 int e;
175
Dan Handley91b624e2014-07-29 17:14:00 +0100176 INFO("BL2: Loading BL3-3\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100177 assert(bl2_to_bl31_params != NULL);
178
179 bl2_plat_get_bl33_meminfo(&bl33_mem_info);
180
181 /* Load the BL3-3 image in non-secure memory provided by the platform */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100182 e = load_auth_image(&bl33_mem_info,
183 BL33_IMAGE_ID,
184 plat_get_ns_image_entrypoint(),
185 bl2_to_bl31_params->bl33_image_info,
186 bl2_to_bl31_params->bl33_ep_info);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100187
Juan Castilloa08a5e72015-05-19 11:54:12 +0100188 if (e == 0) {
189 bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info,
190 bl2_to_bl31_params->bl33_ep_info);
Sandrine Bailleuxaada44c2015-03-26 11:07:09 +0000191 }
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100192
193 return e;
194}
Sandrine Bailleux03897bb2015-11-26 16:31:34 +0000195#endif /* EL3_PAYLOAD_BASE */
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100196
197/*******************************************************************************
198 * The only thing to do in BL2 is to load further images and pass control to
199 * BL3-1. The memory occupied by BL2 will be reclaimed by BL3-x stages. BL2 runs
200 * entirely in S-EL1.
201 ******************************************************************************/
202void bl2_main(void)
203{
204 bl31_params_t *bl2_to_bl31_params;
205 entry_point_info_t *bl31_ep_info;
206 int e;
207
Dan Handley91b624e2014-07-29 17:14:00 +0100208 NOTICE("BL2: %s\n", version_string);
209 NOTICE("BL2: %s\n", build_message);
210
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100211 /* Perform remaining generic architectural setup in S-EL1 */
212 bl2_arch_setup();
213
Juan Castillo9246ab82015-01-28 16:46:57 +0000214#if TRUSTED_BOARD_BOOT
215 /* Initialize authentication module */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100216 auth_mod_init();
Juan Castillo9246ab82015-01-28 16:46:57 +0000217#endif /* TRUSTED_BOARD_BOOT */
218
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100219 /*
220 * Load the subsequent bootloader images
221 */
222 e = load_bl30();
223 if (e) {
224 ERROR("Failed to load BL3-0 (%i)\n", e);
Juan Castillo26ae5832015-09-25 15:41:14 +0100225 plat_error_handler(e);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100226 }
227
Juan Castillo6b672f52014-09-04 14:43:09 +0100228 /* Perform platform setup in BL2 after loading BL3-0 */
229 bl2_platform_setup();
230
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100231 /*
232 * Get a pointer to the memory the platform has set aside to pass
233 * information to BL3-1.
234 */
235 bl2_to_bl31_params = bl2_plat_get_bl31_params();
236 bl31_ep_info = bl2_plat_get_bl31_ep_info();
237
Sandrine Bailleux03897bb2015-11-26 16:31:34 +0000238#ifdef EL3_PAYLOAD_BASE
239 /*
240 * In the case of an EL3 payload, we don't need to load any further
241 * images. Just update the BL31 entrypoint info structure to make BL1
242 * jump to the EL3 payload.
243 * The pointer to the memory the platform has set aside to pass
244 * information to BL3-1 in the normal boot flow is reused here, even
245 * though only a fraction of the information contained in the
246 * bl31_params_t structure makes sense in the context of EL3 payloads.
247 * This will be refined in the future.
248 */
249 VERBOSE("BL2: Populating the entrypoint info for the EL3 payload\n");
250 bl31_ep_info->pc = EL3_PAYLOAD_BASE;
251 bl31_ep_info->args.arg0 = (unsigned long) bl2_to_bl31_params;
252 bl2_plat_set_bl31_ep_info(NULL, bl31_ep_info);
253#else
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100254 e = load_bl31(bl2_to_bl31_params, bl31_ep_info);
255 if (e) {
256 ERROR("Failed to load BL3-1 (%i)\n", e);
Juan Castillo26ae5832015-09-25 15:41:14 +0100257 plat_error_handler(e);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100258 }
259
260 e = load_bl32(bl2_to_bl31_params);
Juan Castillo97dbcf12015-08-17 10:43:27 +0100261 if (e) {
Juan Castilloec813f52015-10-01 18:37:40 +0100262 if (e == -EAUTH) {
Juan Castillo97dbcf12015-08-17 10:43:27 +0100263 ERROR("Failed to authenticate BL3-2\n");
Juan Castillo26ae5832015-09-25 15:41:14 +0100264 plat_error_handler(e);
Juan Castillo97dbcf12015-08-17 10:43:27 +0100265 } else {
266 WARN("Failed to load BL3-2 (%i)\n", e);
267 }
268 }
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100269
270 e = load_bl33(bl2_to_bl31_params);
271 if (e) {
272 ERROR("Failed to load BL3-3 (%i)\n", e);
Juan Castillo26ae5832015-09-25 15:41:14 +0100273 plat_error_handler(e);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100274 }
Sandrine Bailleux03897bb2015-11-26 16:31:34 +0000275#endif /* EL3_PAYLOAD_BASE */
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100276
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100277 /* Flush the params to be passed to memory */
278 bl2_plat_flush_bl31_params();
279
Achin Gupta4f6ad662013-10-25 09:08:21 +0100280 /*
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100281 * Run BL3-1 via an SMC to BL1. Information on how to pass control to
282 * the BL3-2 (if present) and BL3-3 software images will be passed to
283 * BL3-1 as an argument.
Achin Gupta4f6ad662013-10-25 09:08:21 +0100284 */
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100285 smc(BL1_SMC_RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100286}