Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 1 | /* |
Zelalem | 87675d4 | 2020-02-03 14:56:42 -0600 | [diff] [blame] | 2 | * Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved. |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 3 | * |
| 4 | * SPDX-License-Identifier: BSD-3-Clause |
| 5 | */ |
| 6 | |
Soby Mathew | 2f38ce3 | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 7 | #include <assert.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 8 | |
| 9 | #include <arch_helpers.h> |
| 10 | #include <common/bl_common.h> |
| 11 | #include <common/debug.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 12 | #include <lib/xlat_tables/xlat_tables_compat.h> |
| 13 | #include <plat/common/platform.h> |
Manish V Badarkhe | 80f13ee | 2020-07-23 20:23:01 +0100 | [diff] [blame] | 14 | #include <services/arm_arch_svc.h> |
Manish V Badarkhe | f809c6e | 2020-02-22 08:43:00 +0000 | [diff] [blame] | 15 | #include <smccc_helpers.h> |
Sumit Garg | 617e215 | 2019-11-15 15:34:55 +0530 | [diff] [blame] | 16 | #include <tools_share/firmware_encrypted.h> |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 17 | |
| 18 | /* |
Soby Mathew | 2f38ce3 | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 19 | * The following platform functions are weakly defined. The Platforms |
| 20 | * may redefine with strong definition. |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 21 | */ |
Soby Mathew | 2f38ce3 | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 22 | #pragma weak bl2_el3_plat_prepare_exit |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 23 | #pragma weak plat_error_handler |
| 24 | #pragma weak bl2_plat_preload_setup |
Masahiro Yamada | 02a0d3d | 2018-02-01 16:45:51 +0900 | [diff] [blame] | 25 | #pragma weak bl2_plat_handle_pre_image_load |
| 26 | #pragma weak bl2_plat_handle_post_image_load |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 27 | #pragma weak plat_try_next_boot_source |
Sumit Garg | 617e215 | 2019-11-15 15:34:55 +0530 | [diff] [blame] | 28 | #pragma weak plat_get_enc_key_info |
Manish V Badarkhe | 80f13ee | 2020-07-23 20:23:01 +0100 | [diff] [blame] | 29 | #pragma weak plat_is_smccc_feature_available |
Manish V Badarkhe | f809c6e | 2020-02-22 08:43:00 +0000 | [diff] [blame] | 30 | #pragma weak plat_get_soc_version |
| 31 | #pragma weak plat_get_soc_revision |
| 32 | |
| 33 | int32_t plat_get_soc_version(void) |
| 34 | { |
| 35 | return SMC_ARCH_CALL_NOT_SUPPORTED; |
| 36 | } |
| 37 | |
| 38 | int32_t plat_get_soc_revision(void) |
| 39 | { |
| 40 | return SMC_ARCH_CALL_NOT_SUPPORTED; |
| 41 | } |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 42 | |
Manish V Badarkhe | 80f13ee | 2020-07-23 20:23:01 +0100 | [diff] [blame] | 43 | int32_t plat_is_smccc_feature_available(u_register_t fid __unused) |
| 44 | { |
| 45 | return SMC_ARCH_CALL_NOT_SUPPORTED; |
| 46 | } |
| 47 | |
Soby Mathew | 2f38ce3 | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 48 | void bl2_el3_plat_prepare_exit(void) |
Masahiro Yamada | 43d20b3 | 2018-02-01 16:46:18 +0900 | [diff] [blame] | 49 | { |
Masahiro Yamada | 43d20b3 | 2018-02-01 16:46:18 +0900 | [diff] [blame] | 50 | } |
| 51 | |
Soby Mathew | 2f38ce3 | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 52 | void __dead2 plat_error_handler(int err) |
Masahiro Yamada | 43d20b3 | 2018-02-01 16:46:18 +0900 | [diff] [blame] | 53 | { |
Soby Mathew | 2f38ce3 | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 54 | while (1) |
| 55 | wfi(); |
Masahiro Yamada | 43d20b3 | 2018-02-01 16:46:18 +0900 | [diff] [blame] | 56 | } |
| 57 | |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 58 | void bl2_plat_preload_setup(void) |
| 59 | { |
| 60 | } |
| 61 | |
Masahiro Yamada | 02a0d3d | 2018-02-01 16:45:51 +0900 | [diff] [blame] | 62 | int bl2_plat_handle_pre_image_load(unsigned int image_id) |
| 63 | { |
| 64 | return 0; |
| 65 | } |
| 66 | |
| 67 | int bl2_plat_handle_post_image_load(unsigned int image_id) |
| 68 | { |
| 69 | return 0; |
| 70 | } |
| 71 | |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 72 | int plat_try_next_boot_source(void) |
| 73 | { |
| 74 | return 0; |
| 75 | } |
Soby Mathew | 73308d0 | 2018-01-09 14:36:14 +0000 | [diff] [blame] | 76 | |
Roberto Vargas | 344ff02 | 2018-10-19 16:44:18 +0100 | [diff] [blame] | 77 | /* |
Sumit Garg | 617e215 | 2019-11-15 15:34:55 +0530 | [diff] [blame] | 78 | * Weak implementation to provide dummy decryption key only for test purposes, |
| 79 | * platforms must override this API for any real world firmware encryption |
| 80 | * use-case. |
| 81 | */ |
| 82 | int plat_get_enc_key_info(enum fw_enc_status_t fw_enc_status, uint8_t *key, |
| 83 | size_t *key_len, unsigned int *flags, |
| 84 | const uint8_t *img_id, size_t img_id_len) |
| 85 | { |
| 86 | #define DUMMY_FIP_ENC_KEY { 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef, \ |
| 87 | 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef, \ |
| 88 | 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef, \ |
| 89 | 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef } |
| 90 | |
| 91 | const uint8_t dummy_key[] = DUMMY_FIP_ENC_KEY; |
| 92 | |
| 93 | assert(*key_len >= sizeof(dummy_key)); |
| 94 | |
| 95 | *key_len = sizeof(dummy_key); |
| 96 | memcpy(key, dummy_key, *key_len); |
| 97 | *flags = 0; |
| 98 | |
| 99 | return 0; |
| 100 | } |
| 101 | |
| 102 | /* |
Roberto Vargas | 344ff02 | 2018-10-19 16:44:18 +0100 | [diff] [blame] | 103 | * Set up the page tables for the generic and platform-specific memory regions. |
| 104 | * The size of the Trusted SRAM seen by the BL image must be specified as well |
| 105 | * as an array specifying the generic memory regions which can be; |
| 106 | * - Code section; |
| 107 | * - Read-only data section; |
| 108 | * - Init code section, if applicable |
| 109 | * - Coherent memory region, if applicable. |
| 110 | */ |
| 111 | |
| 112 | void __init setup_page_tables(const mmap_region_t *bl_regions, |
| 113 | const mmap_region_t *plat_regions) |
| 114 | { |
| 115 | #if LOG_LEVEL >= LOG_LEVEL_VERBOSE |
| 116 | const mmap_region_t *regions = bl_regions; |
| 117 | |
| 118 | while (regions->size != 0U) { |
| 119 | VERBOSE("Region: 0x%lx - 0x%lx has attributes 0x%x\n", |
| 120 | regions->base_va, |
| 121 | regions->base_va + regions->size, |
| 122 | regions->attr); |
| 123 | regions++; |
| 124 | } |
| 125 | #endif |
| 126 | /* |
| 127 | * Map the Trusted SRAM with appropriate memory attributes. |
| 128 | * Subsequent mappings will adjust the attributes for specific regions. |
| 129 | */ |
| 130 | mmap_add(bl_regions); |
| 131 | |
| 132 | /* Now (re-)map the platform-specific memory regions */ |
| 133 | mmap_add(plat_regions); |
| 134 | |
| 135 | /* Create the page tables to reflect the above mappings */ |
| 136 | init_xlat_tables(); |
| 137 | } |