blob: a3f016f9c3cc031e8bac20703919b7868bbc97b2 [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Dan Handleye83b0ca2014-01-14 18:17:09 +00002 * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
Dan Handley2bd4ef22014-04-09 13:14:54 +010031#include <arch.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010032#include <arch_helpers.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010033#include <assert.h>
Juan Castilloa08a5e72015-05-19 11:54:12 +010034#include <auth_mod.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010035#include <bl_common.h>
Dan Handley714a0d22014-04-09 13:13:04 +010036#include <debug.h>
Juan Castilloec813f52015-10-01 18:37:40 +010037#include <errno.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010038#include <platform.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010039#include <platform_def.h>
Juan Castillo3a66aca2015-04-13 17:36:19 +010040#include <stdint.h>
Dan Handleybcd60ba2014-04-17 18:53:42 +010041#include "bl2_private.h"
Achin Gupta4f6ad662013-10-25 09:08:21 +010042
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010043/*******************************************************************************
44 * Load the BL3-0 image if there's one.
45 * If a platform does not want to attempt to load BL3-0 image it must leave
46 * BL30_BASE undefined.
47 * Return 0 on success or if there's no BL3-0 image to load, a negative error
48 * code otherwise.
49 ******************************************************************************/
50static int load_bl30(void)
51{
52 int e = 0;
53#ifdef BL30_BASE
54 meminfo_t bl30_mem_info;
55 image_info_t bl30_image_info;
56
57 /*
58 * It is up to the platform to specify where BL3-0 should be loaded if
59 * it exists. It could create space in the secure sram or point to a
60 * completely different memory.
61 *
62 * The entry point information is not relevant in this case as the AP
63 * won't execute the BL3-0 image.
64 */
Dan Handley91b624e2014-07-29 17:14:00 +010065 INFO("BL2: Loading BL3-0\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010066 bl2_plat_get_bl30_meminfo(&bl30_mem_info);
Juan Castillo4db9d152014-11-13 17:04:33 +000067 bl30_image_info.h.version = VERSION_1;
Juan Castilloa08a5e72015-05-19 11:54:12 +010068 e = load_auth_image(&bl30_mem_info,
69 BL30_IMAGE_ID,
70 BL30_BASE,
71 &bl30_image_info,
72 NULL);
Juan Castillo9246ab82015-01-28 16:46:57 +000073
Juan Castilloa08a5e72015-05-19 11:54:12 +010074 if (e == 0) {
75 /* The subsequent handling of BL3-0 is platform specific */
76 e = bl2_plat_handle_bl30(&bl30_image_info);
77 if (e) {
78 ERROR("Failure in platform-specific handling of BL3-0 image.\n");
79 }
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010080 }
81#endif /* BL30_BASE */
82
83 return e;
84}
Vikram Kanigiria3a5e4a2014-05-15 18:27:15 +010085
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000086#ifndef EL3_PAYLOAD_BASE
Vikram Kanigiria3a5e4a2014-05-15 18:27:15 +010087/*******************************************************************************
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010088 * Load the BL3-1 image.
89 * The bl2_to_bl31_params and bl31_ep_info params will be updated with the
90 * relevant BL3-1 information.
91 * Return 0 on success, a negative error code otherwise.
Achin Gupta4f6ad662013-10-25 09:08:21 +010092 ******************************************************************************/
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010093static int load_bl31(bl31_params_t *bl2_to_bl31_params,
94 entry_point_info_t *bl31_ep_info)
Achin Gupta4f6ad662013-10-25 09:08:21 +010095{
Dan Handleye2712bc2014-04-10 15:37:22 +010096 meminfo_t *bl2_tzram_layout;
Vikram Kanigirida567432014-04-15 18:08:08 +010097 int e;
Achin Gupta4f6ad662013-10-25 09:08:21 +010098
Dan Handley91b624e2014-07-29 17:14:00 +010099 INFO("BL2: Loading BL3-1\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100100 assert(bl2_to_bl31_params != NULL);
101 assert(bl31_ep_info != NULL);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100102
103 /* Find out how much free trusted ram remains after BL2 load */
Sandrine Bailleuxee12f6f2013-11-28 14:55:58 +0000104 bl2_tzram_layout = bl2_plat_sec_mem_layout();
Achin Gupta4f6ad662013-10-25 09:08:21 +0100105
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100106 /* Set the X0 parameter to BL3-1 */
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100107 bl31_ep_info->args.arg0 = (unsigned long)bl2_to_bl31_params;
108
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100109 /* Load the BL3-1 image */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100110 e = load_auth_image(bl2_tzram_layout,
111 BL31_IMAGE_ID,
112 BL31_BASE,
113 bl2_to_bl31_params->bl31_image_info,
114 bl31_ep_info);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100115
Juan Castilloa08a5e72015-05-19 11:54:12 +0100116 if (e == 0) {
117 bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info,
118 bl31_ep_info);
Sandrine Bailleuxaada44c2015-03-26 11:07:09 +0000119 }
Juan Castillo9246ab82015-01-28 16:46:57 +0000120
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100121 return e;
122}
Vikram Kanigirida567432014-04-15 18:08:08 +0100123
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100124/*******************************************************************************
125 * Load the BL3-2 image if there's one.
126 * The bl2_to_bl31_params param will be updated with the relevant BL3-2
127 * information.
128 * If a platform does not want to attempt to load BL3-2 image it must leave
129 * BL32_BASE undefined.
130 * Return 0 on success or if there's no BL3-2 image to load, a negative error
131 * code otherwise.
132 ******************************************************************************/
133static int load_bl32(bl31_params_t *bl2_to_bl31_params)
134{
135 int e = 0;
136#ifdef BL32_BASE
137 meminfo_t bl32_mem_info;
Harry Liebel561cd332014-02-14 14:42:48 +0000138
Dan Handley91b624e2014-07-29 17:14:00 +0100139 INFO("BL2: Loading BL3-2\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100140 assert(bl2_to_bl31_params != NULL);
Dan Handley21a30ab2014-04-15 11:38:38 +0100141
Achin Gupta4f6ad662013-10-25 09:08:21 +0100142 /*
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100143 * It is up to the platform to specify where BL3-2 should be loaded if
144 * it exists. It could create space in the secure sram or point to a
Dan Handley21a30ab2014-04-15 11:38:38 +0100145 * completely different memory.
Vikram Kanigiria3a5e4a2014-05-15 18:27:15 +0100146 */
Vikram Kanigirid8c9d262014-05-16 18:48:12 +0100147 bl2_plat_get_bl32_meminfo(&bl32_mem_info);
Juan Castilloa08a5e72015-05-19 11:54:12 +0100148 e = load_auth_image(&bl32_mem_info,
149 BL32_IMAGE_ID,
150 BL32_BASE,
151 bl2_to_bl31_params->bl32_image_info,
152 bl2_to_bl31_params->bl32_ep_info);
Juan Castillo9246ab82015-01-28 16:46:57 +0000153
Juan Castilloa08a5e72015-05-19 11:54:12 +0100154 if (e == 0) {
155 bl2_plat_set_bl32_ep_info(
156 bl2_to_bl31_params->bl32_image_info,
157 bl2_to_bl31_params->bl32_ep_info);
Sandrine Bailleuxaada44c2015-03-26 11:07:09 +0000158 }
Dan Handley21a30ab2014-04-15 11:38:38 +0100159#endif /* BL32_BASE */
Achin Guptaa3050ed2014-02-19 17:52:35 +0000160
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100161 return e;
162}
163
164/*******************************************************************************
165 * Load the BL3-3 image.
166 * The bl2_to_bl31_params param will be updated with the relevant BL3-3
167 * information.
168 * Return 0 on success, a negative error code otherwise.
169 ******************************************************************************/
170static int load_bl33(bl31_params_t *bl2_to_bl31_params)
171{
172 meminfo_t bl33_mem_info;
173 int e;
174
Dan Handley91b624e2014-07-29 17:14:00 +0100175 INFO("BL2: Loading BL3-3\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100176 assert(bl2_to_bl31_params != NULL);
177
178 bl2_plat_get_bl33_meminfo(&bl33_mem_info);
179
180 /* Load the BL3-3 image in non-secure memory provided by the platform */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100181 e = load_auth_image(&bl33_mem_info,
182 BL33_IMAGE_ID,
183 plat_get_ns_image_entrypoint(),
184 bl2_to_bl31_params->bl33_image_info,
185 bl2_to_bl31_params->bl33_ep_info);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100186
Juan Castilloa08a5e72015-05-19 11:54:12 +0100187 if (e == 0) {
188 bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info,
189 bl2_to_bl31_params->bl33_ep_info);
Sandrine Bailleuxaada44c2015-03-26 11:07:09 +0000190 }
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100191
192 return e;
193}
Sandrine Bailleux03897bb2015-11-26 16:31:34 +0000194#endif /* EL3_PAYLOAD_BASE */
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100195
196/*******************************************************************************
197 * The only thing to do in BL2 is to load further images and pass control to
198 * BL3-1. The memory occupied by BL2 will be reclaimed by BL3-x stages. BL2 runs
199 * entirely in S-EL1.
200 ******************************************************************************/
201void bl2_main(void)
202{
203 bl31_params_t *bl2_to_bl31_params;
204 entry_point_info_t *bl31_ep_info;
205 int e;
206
Dan Handley91b624e2014-07-29 17:14:00 +0100207 NOTICE("BL2: %s\n", version_string);
208 NOTICE("BL2: %s\n", build_message);
209
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100210 /* Perform remaining generic architectural setup in S-EL1 */
211 bl2_arch_setup();
212
Juan Castillo9246ab82015-01-28 16:46:57 +0000213#if TRUSTED_BOARD_BOOT
214 /* Initialize authentication module */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100215 auth_mod_init();
Juan Castillo9246ab82015-01-28 16:46:57 +0000216#endif /* TRUSTED_BOARD_BOOT */
217
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100218 /*
219 * Load the subsequent bootloader images
220 */
221 e = load_bl30();
222 if (e) {
223 ERROR("Failed to load BL3-0 (%i)\n", e);
Juan Castillo26ae5832015-09-25 15:41:14 +0100224 plat_error_handler(e);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100225 }
226
Juan Castillo6b672f52014-09-04 14:43:09 +0100227 /* Perform platform setup in BL2 after loading BL3-0 */
228 bl2_platform_setup();
229
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100230 /*
231 * Get a pointer to the memory the platform has set aside to pass
232 * information to BL3-1.
233 */
234 bl2_to_bl31_params = bl2_plat_get_bl31_params();
235 bl31_ep_info = bl2_plat_get_bl31_ep_info();
236
Sandrine Bailleux03897bb2015-11-26 16:31:34 +0000237#ifdef EL3_PAYLOAD_BASE
238 /*
239 * In the case of an EL3 payload, we don't need to load any further
240 * images. Just update the BL31 entrypoint info structure to make BL1
241 * jump to the EL3 payload.
242 * The pointer to the memory the platform has set aside to pass
243 * information to BL3-1 in the normal boot flow is reused here, even
244 * though only a fraction of the information contained in the
245 * bl31_params_t structure makes sense in the context of EL3 payloads.
246 * This will be refined in the future.
247 */
248 VERBOSE("BL2: Populating the entrypoint info for the EL3 payload\n");
249 bl31_ep_info->pc = EL3_PAYLOAD_BASE;
250 bl31_ep_info->args.arg0 = (unsigned long) bl2_to_bl31_params;
251 bl2_plat_set_bl31_ep_info(NULL, bl31_ep_info);
252#else
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100253 e = load_bl31(bl2_to_bl31_params, bl31_ep_info);
254 if (e) {
255 ERROR("Failed to load BL3-1 (%i)\n", e);
Juan Castillo26ae5832015-09-25 15:41:14 +0100256 plat_error_handler(e);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100257 }
258
259 e = load_bl32(bl2_to_bl31_params);
Juan Castillo97dbcf12015-08-17 10:43:27 +0100260 if (e) {
Juan Castilloec813f52015-10-01 18:37:40 +0100261 if (e == -EAUTH) {
Juan Castillo97dbcf12015-08-17 10:43:27 +0100262 ERROR("Failed to authenticate BL3-2\n");
Juan Castillo26ae5832015-09-25 15:41:14 +0100263 plat_error_handler(e);
Juan Castillo97dbcf12015-08-17 10:43:27 +0100264 } else {
265 WARN("Failed to load BL3-2 (%i)\n", e);
266 }
267 }
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100268
269 e = load_bl33(bl2_to_bl31_params);
270 if (e) {
271 ERROR("Failed to load BL3-3 (%i)\n", e);
Juan Castillo26ae5832015-09-25 15:41:14 +0100272 plat_error_handler(e);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100273 }
Sandrine Bailleux03897bb2015-11-26 16:31:34 +0000274#endif /* EL3_PAYLOAD_BASE */
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100275
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100276 /* Flush the params to be passed to memory */
277 bl2_plat_flush_bl31_params();
278
Achin Gupta4f6ad662013-10-25 09:08:21 +0100279 /*
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100280 * Run BL3-1 via an SMC to BL1. Information on how to pass control to
281 * the BL3-2 (if present) and BL3-3 software images will be passed to
282 * BL3-1 as an argument.
Achin Gupta4f6ad662013-10-25 09:08:21 +0100283 */
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100284 smc(RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100285}