blob: c7c748729c67552072029f49881bb0558266b66e [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Roberto Vargas777dd432018-02-12 12:36:17 +00002 * Copyright (c) 2013-2018, ARM Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Achin Gupta4f6ad662013-10-25 09:08:21 +01005 */
6
7#ifndef __BL_COMMON_H__
8#define __BL_COMMON_H__
9
Soby Mathewb911cc72017-02-13 12:46:28 +000010#include <ep_info.h>
11#include <param_header.h>
Soby Mathewcc364842018-02-21 01:16:39 +000012#include <utils_def.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010013
14#define UP 1
15#define DOWN 0
16
17/*******************************************************************************
Sandrine Bailleux467d0572014-06-24 14:02:34 +010018 * Constants to identify the location of a memory region in a given memory
19 * layout.
20******************************************************************************/
21#define TOP 0x1
22#define BOTTOM !TOP
Achin Gupta4f6ad662013-10-25 09:08:21 +010023
Yatharth Kochara65be2f2015-10-09 18:06:13 +010024/*
25 * The following are used for image state attributes.
26 * Image can only be in one of the following state.
27 */
28#define IMAGE_STATE_RESET 0
29#define IMAGE_STATE_COPIED 1
30#define IMAGE_STATE_COPYING 2
31#define IMAGE_STATE_AUTHENTICATED 3
32#define IMAGE_STATE_EXECUTED 4
33#define IMAGE_STATE_INTERRUPTED 5
34
Soby Mathewcc364842018-02-21 01:16:39 +000035#define IMAGE_ATTRIB_SKIP_LOADING U(0x02)
36#define IMAGE_ATTRIB_PLAT_SETUP U(0x04)
Dan Handley2bd4ef22014-04-09 13:14:54 +010037
Soby Mathewcc364842018-02-21 01:16:39 +000038#define INVALID_IMAGE_ID U(0xFFFFFFFF)
Yatharth Kochara65be2f2015-10-09 18:06:13 +010039
Yatharth Kochar6c0566c2015-10-02 17:56:48 +010040/*******************************************************************************
41 * Constants to indicate type of exception to the common exception handler.
42 ******************************************************************************/
43#define SYNC_EXCEPTION_SP_EL0 0x0
44#define IRQ_SP_EL0 0x1
45#define FIQ_SP_EL0 0x2
46#define SERROR_SP_EL0 0x3
47#define SYNC_EXCEPTION_SP_ELX 0x4
48#define IRQ_SP_ELX 0x5
49#define FIQ_SP_ELX 0x6
50#define SERROR_SP_ELX 0x7
51#define SYNC_EXCEPTION_AARCH64 0x8
52#define IRQ_AARCH64 0x9
53#define FIQ_AARCH64 0xa
54#define SERROR_AARCH64 0xb
55#define SYNC_EXCEPTION_AARCH32 0xc
56#define IRQ_AARCH32 0xd
57#define FIQ_AARCH32 0xe
58#define SERROR_AARCH32 0xf
59
Vikram Kanigirida567432014-04-15 18:08:08 +010060#ifndef __ASSEMBLY__
Vikram Kanigiria3a5e4a2014-05-15 18:27:15 +010061#include <cassert.h>
Sandrine Bailleux467d0572014-06-24 14:02:34 +010062#include <stddef.h>
Soby Mathewb911cc72017-02-13 12:46:28 +000063#include <stdint.h>
Soby Mathewa0fedc42016-06-16 14:52:04 +010064#include <types.h>
Scott Brandenbf404c02017-04-10 11:45:52 -070065#include <utils_def.h> /* To retain compatibility */
Vikram Kanigiri725b1332015-03-04 10:34:27 +000066
Joel Hutton5cc3bc82018-03-21 11:40:57 +000067
Dan Handleyf05c1b52015-04-27 11:49:22 +010068/*
69 * Declarations of linker defined symbols to help determine memory layout of
70 * BL images
71 */
Sandrine Bailleuxf91f1442016-07-08 14:37:40 +010072#if SEPARATE_CODE_AND_RODATA
Joel Hutton5cc3bc82018-03-21 11:40:57 +000073IMPORT_SYM(unsigned long, __TEXT_START__, BL_CODE_BASE);
74IMPORT_SYM(unsigned long, __TEXT_END__, BL_CODE_END);
75IMPORT_SYM(unsigned long, __RODATA_START__, BL_RO_DATA_BASE);
76IMPORT_SYM(unsigned long, __RODATA_END__, BL_RO_DATA_END);
Sandrine Bailleuxf91f1442016-07-08 14:37:40 +010077#else
Joel Hutton5cc3bc82018-03-21 11:40:57 +000078IMPORT_SYM(unsigned long, __RO_START__, BL_CODE_BASE);
79IMPORT_SYM(unsigned long, __RO_END__, BL_CODE_END);
Sandrine Bailleuxf91f1442016-07-08 14:37:40 +010080#endif
81
Masahiro Yamada441bfdd2016-12-25 23:36:24 +090082#if defined(IMAGE_BL2)
Joel Hutton5cc3bc82018-03-21 11:40:57 +000083IMPORT_SYM(unsigned long, __BL2_END__, BL2_END);
Masahiro Yamada441bfdd2016-12-25 23:36:24 +090084#elif defined(IMAGE_BL2U)
Joel Hutton5cc3bc82018-03-21 11:40:57 +000085IMPORT_SYM(unsigned long, __BL2U_END__, BL2U_END);
Masahiro Yamada441bfdd2016-12-25 23:36:24 +090086#elif defined(IMAGE_BL31)
Joel Hutton5cc3bc82018-03-21 11:40:57 +000087IMPORT_SYM(unsigned long, __BL31_END__, BL31_END);
Masahiro Yamada441bfdd2016-12-25 23:36:24 +090088#elif defined(IMAGE_BL32)
Joel Hutton5cc3bc82018-03-21 11:40:57 +000089IMPORT_SYM(unsigned long, __BL32_END__, BL32_END);
Dan Handleyf05c1b52015-04-27 11:49:22 +010090#endif /* IMAGE_BLX */
91
Joel Hutton5cc3bc82018-03-21 11:40:57 +000092/*
93 * The next 2 constants identify the extents of the coherent memory region.
94 * These addresses are used by the MMU setup code and therefore they must be
95 * page-aligned. It is the responsibility of the linker script to ensure that
96 * __COHERENT_RAM_START__ and __COHERENT_RAM_END__ linker symbols refer to
97 * page-aligned addresses.
98 */
Dan Handleyf05c1b52015-04-27 11:49:22 +010099#if USE_COHERENT_MEM
Joel Hutton5cc3bc82018-03-21 11:40:57 +0000100IMPORT_SYM(unsigned long, __COHERENT_RAM_START__, BL_COHERENT_RAM_BASE);
101IMPORT_SYM(unsigned long, __COHERENT_RAM_END__, BL_COHERENT_RAM_END);
Dan Handleyf05c1b52015-04-27 11:49:22 +0100102#endif
103
Achin Gupta4f6ad662013-10-25 09:08:21 +0100104/*******************************************************************************
105 * Structure used for telling the next BL how much of a particular type of
106 * memory is available for its use and how much is already used.
107 ******************************************************************************/
Dan Handleye2712bc2014-04-10 15:37:22 +0100108typedef struct meminfo {
Soby Mathewa0fedc42016-06-16 14:52:04 +0100109 uintptr_t total_base;
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100110 size_t total_size;
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100111#if !LOAD_IMAGE_V2
Soby Mathewa0fedc42016-06-16 14:52:04 +0100112 uintptr_t free_base;
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100113 size_t free_size;
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100114#endif
Dan Handleye2712bc2014-04-10 15:37:22 +0100115} meminfo_t;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100116
Vikram Kanigirida567432014-04-15 18:08:08 +0100117/*****************************************************************************
118 * Image info binary provides information from the image loader that
119 * can be used by the firmware to manage available trusted RAM.
120 * More advanced firmware image formats can provide additional
121 * information that enables optimization or greater flexibility in the
122 * common firmware code
123 *****************************************************************************/
124typedef struct image_info {
125 param_header_t h;
126 uintptr_t image_base; /* physical address of base of image */
127 uint32_t image_size; /* bytes read from image file */
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100128#if LOAD_IMAGE_V2
129 uint32_t image_max_size;
130#endif
Vikram Kanigirida567432014-04-15 18:08:08 +0100131} image_info_t;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100132
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100133/*****************************************************************************
134 * The image descriptor struct definition.
135 *****************************************************************************/
136typedef struct image_desc {
137 /* Contains unique image id for the image. */
138 unsigned int image_id;
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100139 /*
140 * This member contains Image state information.
141 * Refer IMAGE_STATE_XXX defined above.
142 */
143 unsigned int state;
Yatharth Kocharf11b29a2016-02-01 11:04:46 +0000144 uint32_t copied_size; /* image size copied in blocks */
Soby Mathew6d4f2622016-01-12 10:30:59 +0000145 image_info_t image_info;
146 entry_point_info_t ep_info;
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100147} image_desc_t;
148
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100149#if LOAD_IMAGE_V2
150/* BL image node in the BL image loading sequence */
151typedef struct bl_load_info_node {
152 unsigned int image_id;
153 image_info_t *image_info;
154 struct bl_load_info_node *next_load_info;
155} bl_load_info_node_t;
156
157/* BL image head node in the BL image loading sequence */
158typedef struct bl_load_info {
159 param_header_t h;
160 bl_load_info_node_t *head;
161} bl_load_info_t;
162
163/* BL image node in the BL image execution sequence */
164typedef struct bl_params_node {
165 unsigned int image_id;
166 image_info_t *image_info;
167 entry_point_info_t *ep_info;
168 struct bl_params_node *next_params_info;
169} bl_params_node_t;
170
171/*
172 * BL image head node in the BL image execution sequence
173 * It is also used to pass information to next BL image.
174 */
175typedef struct bl_params {
176 param_header_t h;
177 bl_params_node_t *head;
178} bl_params_t;
179
180#else /* LOAD_IMAGE_V2 */
181
Achin Gupta4f6ad662013-10-25 09:08:21 +0100182/*******************************************************************************
Achin Guptae4d084e2014-02-19 17:18:23 +0000183 * This structure represents the superset of information that can be passed to
184 * BL31 e.g. while passing control to it from BL2. The BL32 parameters will be
Vikram Kanigirida567432014-04-15 18:08:08 +0100185 * populated only if BL2 detects its presence. A pointer to a structure of this
Juan Castillo7d199412015-12-14 09:35:25 +0000186 * type should be passed in X0 to BL31's cold boot entrypoint.
Vikram Kanigirida567432014-04-15 18:08:08 +0100187 *
Juan Castillo7d199412015-12-14 09:35:25 +0000188 * Use of this structure and the X0 parameter is not mandatory: the BL31
Vikram Kanigirida567432014-04-15 18:08:08 +0100189 * platform code can use other mechanisms to provide the necessary information
Juan Castillo7d199412015-12-14 09:35:25 +0000190 * about BL32 and BL33 to the common and SPD code.
Vikram Kanigirida567432014-04-15 18:08:08 +0100191 *
Juan Castillo7d199412015-12-14 09:35:25 +0000192 * BL31 image information is mandatory if this structure is used. If either of
193 * the optional BL32 and BL33 image information is not provided, this is
Vikram Kanigirida567432014-04-15 18:08:08 +0100194 * indicated by the respective image_info pointers being zero.
Achin Guptae4d084e2014-02-19 17:18:23 +0000195 ******************************************************************************/
Vikram Kanigirida567432014-04-15 18:08:08 +0100196typedef struct bl31_params {
197 param_header_t h;
198 image_info_t *bl31_image_info;
199 entry_point_info_t *bl32_ep_info;
200 image_info_t *bl32_image_info;
201 entry_point_info_t *bl33_ep_info;
202 image_info_t *bl33_image_info;
203} bl31_params_t;
204
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100205#endif /* LOAD_IMAGE_V2 */
Vikram Kanigirida567432014-04-15 18:08:08 +0100206
Achin Guptae4d084e2014-02-19 17:18:23 +0000207/*******************************************************************************
Achin Gupta4f6ad662013-10-25 09:08:21 +0100208 * Function & variable prototypes
209 ******************************************************************************/
Soby Mathewa0fedc42016-06-16 14:52:04 +0100210size_t image_size(unsigned int image_id);
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100211
Sandrine Bailleuxb0e529b2016-11-08 14:27:10 +0000212int is_mem_free(uintptr_t free_base, size_t free_size,
213 uintptr_t addr, size_t size);
214
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100215#if LOAD_IMAGE_V2
216
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100217int load_auth_image(unsigned int image_id, image_info_t *image_data);
218
219#else
220
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100221int load_image(meminfo_t *mem_layout,
Juan Castillo3a66aca2015-04-13 17:36:19 +0100222 unsigned int image_id,
Juan Castilloa08a5e72015-05-19 11:54:12 +0100223 uintptr_t image_base,
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100224 image_info_t *image_data,
225 entry_point_info_t *entry_point_info);
Juan Castilloa08a5e72015-05-19 11:54:12 +0100226int load_auth_image(meminfo_t *mem_layout,
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100227 unsigned int image_id,
Juan Castilloa08a5e72015-05-19 11:54:12 +0100228 uintptr_t image_base,
229 image_info_t *image_data,
230 entry_point_info_t *entry_point_info);
Soby Mathewa0fedc42016-06-16 14:52:04 +0100231void reserve_mem(uintptr_t *free_base, size_t *free_size,
232 uintptr_t addr, size_t size);
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100233
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100234#endif /* LOAD_IMAGE_V2 */
235
Soby Mathew9fe88042018-03-26 12:43:37 +0100236#if TRUSTED_BOARD_BOOT && defined(DYN_DISABLE_AUTH)
237/*
238 * API to dynamically disable authentication. Only meant for development
239 * systems.
240 */
241void dyn_disable_auth(void);
242#endif
243
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100244extern const char build_message[];
245extern const char version_string[];
246
Sandrine Bailleuxb2e224c2015-09-28 17:03:06 +0100247void print_entry_point_info(const entry_point_info_t *ep_info);
Roberto Vargas2ca18d92018-02-12 12:36:17 +0000248uintptr_t page_align(uintptr_t value, unsigned dir);
Sandrine Bailleuxb2e224c2015-09-28 17:03:06 +0100249
Achin Gupta4f6ad662013-10-25 09:08:21 +0100250#endif /*__ASSEMBLY__*/
251
252#endif /* __BL_COMMON_H__ */