blob: f8a2372fe5ee91c36f95684287f43dc6848029c7 [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Dan Handleye83b0ca2014-01-14 18:17:09 +00002 * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
Dan Handley2bd4ef22014-04-09 13:14:54 +010031#include <arch.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010032#include <arch_helpers.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010033#include <assert.h>
Juan Castilloa08a5e72015-05-19 11:54:12 +010034#include <auth_mod.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010035#include <bl_common.h>
Dan Handley714a0d22014-04-09 13:13:04 +010036#include <debug.h>
Juan Castilloec813f52015-10-01 18:37:40 +010037#include <errno.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010038#include <platform.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010039#include <platform_def.h>
Juan Castillo3a66aca2015-04-13 17:36:19 +010040#include <stdint.h>
Dan Handleybcd60ba2014-04-17 18:53:42 +010041#include "bl2_private.h"
Achin Gupta4f6ad662013-10-25 09:08:21 +010042
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010043/*******************************************************************************
44 * Load the BL3-0 image if there's one.
45 * If a platform does not want to attempt to load BL3-0 image it must leave
46 * BL30_BASE undefined.
47 * Return 0 on success or if there's no BL3-0 image to load, a negative error
48 * code otherwise.
49 ******************************************************************************/
50static int load_bl30(void)
51{
52 int e = 0;
53#ifdef BL30_BASE
54 meminfo_t bl30_mem_info;
55 image_info_t bl30_image_info;
56
57 /*
58 * It is up to the platform to specify where BL3-0 should be loaded if
59 * it exists. It could create space in the secure sram or point to a
60 * completely different memory.
61 *
62 * The entry point information is not relevant in this case as the AP
63 * won't execute the BL3-0 image.
64 */
Dan Handley91b624e2014-07-29 17:14:00 +010065 INFO("BL2: Loading BL3-0\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010066 bl2_plat_get_bl30_meminfo(&bl30_mem_info);
Juan Castillo4db9d152014-11-13 17:04:33 +000067 bl30_image_info.h.version = VERSION_1;
Juan Castilloa08a5e72015-05-19 11:54:12 +010068 e = load_auth_image(&bl30_mem_info,
69 BL30_IMAGE_ID,
70 BL30_BASE,
71 &bl30_image_info,
72 NULL);
Juan Castillo9246ab82015-01-28 16:46:57 +000073
Juan Castilloa08a5e72015-05-19 11:54:12 +010074 if (e == 0) {
75 /* The subsequent handling of BL3-0 is platform specific */
76 e = bl2_plat_handle_bl30(&bl30_image_info);
77 if (e) {
78 ERROR("Failure in platform-specific handling of BL3-0 image.\n");
79 }
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010080 }
81#endif /* BL30_BASE */
82
83 return e;
84}
Vikram Kanigiria3a5e4a2014-05-15 18:27:15 +010085
86/*******************************************************************************
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010087 * Load the BL3-1 image.
88 * The bl2_to_bl31_params and bl31_ep_info params will be updated with the
89 * relevant BL3-1 information.
90 * Return 0 on success, a negative error code otherwise.
Achin Gupta4f6ad662013-10-25 09:08:21 +010091 ******************************************************************************/
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010092static int load_bl31(bl31_params_t *bl2_to_bl31_params,
93 entry_point_info_t *bl31_ep_info)
Achin Gupta4f6ad662013-10-25 09:08:21 +010094{
Dan Handleye2712bc2014-04-10 15:37:22 +010095 meminfo_t *bl2_tzram_layout;
Vikram Kanigirida567432014-04-15 18:08:08 +010096 int e;
Achin Gupta4f6ad662013-10-25 09:08:21 +010097
Dan Handley91b624e2014-07-29 17:14:00 +010098 INFO("BL2: Loading BL3-1\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010099 assert(bl2_to_bl31_params != NULL);
100 assert(bl31_ep_info != NULL);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100101
102 /* Find out how much free trusted ram remains after BL2 load */
Sandrine Bailleuxee12f6f2013-11-28 14:55:58 +0000103 bl2_tzram_layout = bl2_plat_sec_mem_layout();
Achin Gupta4f6ad662013-10-25 09:08:21 +0100104
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100105 /* Set the X0 parameter to BL3-1 */
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100106 bl31_ep_info->args.arg0 = (unsigned long)bl2_to_bl31_params;
107
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100108 /* Load the BL3-1 image */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100109 e = load_auth_image(bl2_tzram_layout,
110 BL31_IMAGE_ID,
111 BL31_BASE,
112 bl2_to_bl31_params->bl31_image_info,
113 bl31_ep_info);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100114
Juan Castilloa08a5e72015-05-19 11:54:12 +0100115 if (e == 0) {
116 bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info,
117 bl31_ep_info);
Sandrine Bailleuxaada44c2015-03-26 11:07:09 +0000118 }
Juan Castillo9246ab82015-01-28 16:46:57 +0000119
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100120 return e;
121}
Vikram Kanigirida567432014-04-15 18:08:08 +0100122
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100123/*******************************************************************************
124 * Load the BL3-2 image if there's one.
125 * The bl2_to_bl31_params param will be updated with the relevant BL3-2
126 * information.
127 * If a platform does not want to attempt to load BL3-2 image it must leave
128 * BL32_BASE undefined.
129 * Return 0 on success or if there's no BL3-2 image to load, a negative error
130 * code otherwise.
131 ******************************************************************************/
132static int load_bl32(bl31_params_t *bl2_to_bl31_params)
133{
134 int e = 0;
135#ifdef BL32_BASE
136 meminfo_t bl32_mem_info;
Harry Liebel561cd332014-02-14 14:42:48 +0000137
Dan Handley91b624e2014-07-29 17:14:00 +0100138 INFO("BL2: Loading BL3-2\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100139 assert(bl2_to_bl31_params != NULL);
Dan Handley21a30ab2014-04-15 11:38:38 +0100140
Achin Gupta4f6ad662013-10-25 09:08:21 +0100141 /*
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100142 * It is up to the platform to specify where BL3-2 should be loaded if
143 * it exists. It could create space in the secure sram or point to a
Dan Handley21a30ab2014-04-15 11:38:38 +0100144 * completely different memory.
Vikram Kanigiria3a5e4a2014-05-15 18:27:15 +0100145 */
Vikram Kanigirid8c9d262014-05-16 18:48:12 +0100146 bl2_plat_get_bl32_meminfo(&bl32_mem_info);
Juan Castilloa08a5e72015-05-19 11:54:12 +0100147 e = load_auth_image(&bl32_mem_info,
148 BL32_IMAGE_ID,
149 BL32_BASE,
150 bl2_to_bl31_params->bl32_image_info,
151 bl2_to_bl31_params->bl32_ep_info);
Juan Castillo9246ab82015-01-28 16:46:57 +0000152
Juan Castilloa08a5e72015-05-19 11:54:12 +0100153 if (e == 0) {
154 bl2_plat_set_bl32_ep_info(
155 bl2_to_bl31_params->bl32_image_info,
156 bl2_to_bl31_params->bl32_ep_info);
Sandrine Bailleuxaada44c2015-03-26 11:07:09 +0000157 }
Dan Handley21a30ab2014-04-15 11:38:38 +0100158#endif /* BL32_BASE */
Achin Guptaa3050ed2014-02-19 17:52:35 +0000159
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100160 return e;
161}
162
163/*******************************************************************************
164 * Load the BL3-3 image.
165 * The bl2_to_bl31_params param will be updated with the relevant BL3-3
166 * information.
167 * Return 0 on success, a negative error code otherwise.
168 ******************************************************************************/
169static int load_bl33(bl31_params_t *bl2_to_bl31_params)
170{
171 meminfo_t bl33_mem_info;
172 int e;
173
Dan Handley91b624e2014-07-29 17:14:00 +0100174 INFO("BL2: Loading BL3-3\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100175 assert(bl2_to_bl31_params != NULL);
176
177 bl2_plat_get_bl33_meminfo(&bl33_mem_info);
178
179 /* Load the BL3-3 image in non-secure memory provided by the platform */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100180 e = load_auth_image(&bl33_mem_info,
181 BL33_IMAGE_ID,
182 plat_get_ns_image_entrypoint(),
183 bl2_to_bl31_params->bl33_image_info,
184 bl2_to_bl31_params->bl33_ep_info);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100185
Juan Castilloa08a5e72015-05-19 11:54:12 +0100186 if (e == 0) {
187 bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info,
188 bl2_to_bl31_params->bl33_ep_info);
Sandrine Bailleuxaada44c2015-03-26 11:07:09 +0000189 }
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100190
191 return e;
192}
193
194/*******************************************************************************
195 * The only thing to do in BL2 is to load further images and pass control to
196 * BL3-1. The memory occupied by BL2 will be reclaimed by BL3-x stages. BL2 runs
197 * entirely in S-EL1.
198 ******************************************************************************/
199void bl2_main(void)
200{
201 bl31_params_t *bl2_to_bl31_params;
202 entry_point_info_t *bl31_ep_info;
203 int e;
204
Dan Handley91b624e2014-07-29 17:14:00 +0100205 NOTICE("BL2: %s\n", version_string);
206 NOTICE("BL2: %s\n", build_message);
207
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100208 /* Perform remaining generic architectural setup in S-EL1 */
209 bl2_arch_setup();
210
Juan Castillo9246ab82015-01-28 16:46:57 +0000211#if TRUSTED_BOARD_BOOT
212 /* Initialize authentication module */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100213 auth_mod_init();
Juan Castillo9246ab82015-01-28 16:46:57 +0000214#endif /* TRUSTED_BOARD_BOOT */
215
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100216 /*
217 * Load the subsequent bootloader images
218 */
219 e = load_bl30();
220 if (e) {
221 ERROR("Failed to load BL3-0 (%i)\n", e);
Juan Castillo26ae5832015-09-25 15:41:14 +0100222 plat_error_handler(e);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100223 }
224
Juan Castillo6b672f52014-09-04 14:43:09 +0100225 /* Perform platform setup in BL2 after loading BL3-0 */
226 bl2_platform_setup();
227
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100228 /*
229 * Get a pointer to the memory the platform has set aside to pass
230 * information to BL3-1.
231 */
232 bl2_to_bl31_params = bl2_plat_get_bl31_params();
233 bl31_ep_info = bl2_plat_get_bl31_ep_info();
234
235 e = load_bl31(bl2_to_bl31_params, bl31_ep_info);
236 if (e) {
237 ERROR("Failed to load BL3-1 (%i)\n", e);
Juan Castillo26ae5832015-09-25 15:41:14 +0100238 plat_error_handler(e);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100239 }
240
241 e = load_bl32(bl2_to_bl31_params);
Juan Castillo97dbcf12015-08-17 10:43:27 +0100242 if (e) {
Juan Castilloec813f52015-10-01 18:37:40 +0100243 if (e == -EAUTH) {
Juan Castillo97dbcf12015-08-17 10:43:27 +0100244 ERROR("Failed to authenticate BL3-2\n");
Juan Castillo26ae5832015-09-25 15:41:14 +0100245 plat_error_handler(e);
Juan Castillo97dbcf12015-08-17 10:43:27 +0100246 } else {
247 WARN("Failed to load BL3-2 (%i)\n", e);
248 }
249 }
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100250
251 e = load_bl33(bl2_to_bl31_params);
252 if (e) {
253 ERROR("Failed to load BL3-3 (%i)\n", e);
Juan Castillo26ae5832015-09-25 15:41:14 +0100254 plat_error_handler(e);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100255 }
256
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100257 /* Flush the params to be passed to memory */
258 bl2_plat_flush_bl31_params();
259
Achin Gupta4f6ad662013-10-25 09:08:21 +0100260 /*
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100261 * Run BL3-1 via an SMC to BL1. Information on how to pass control to
262 * the BL3-2 (if present) and BL3-3 software images will be passed to
263 * BL3-1 as an argument.
Achin Gupta4f6ad662013-10-25 09:08:21 +0100264 */
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100265 smc(RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100266}