blob: 11c7c3bcde19c2cda822eb57053e871901f42728 [file] [log] [blame]
James Morrissey9d72b4e2014-02-10 17:04:32 +00001/*
Soby Mathew7c6df5b2018-01-15 14:43:42 +00002 * Copyright (c) 2014-2018, ARM Limited and Contributors. All rights reserved.
James Morrissey9d72b4e2014-02-10 17:04:32 +00003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
James Morrissey9d72b4e2014-02-10 17:04:32 +00005 */
6
7#include <assert.h>
Juan Castillo3a66aca2015-04-13 17:36:19 +01008#include <common_def.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +01009#include <debug.h>
Dan Handley714a0d22014-04-09 13:13:04 +010010#include <io_driver.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010011#include <io_semihosting.h>
Isla Mitchelld2548792017-07-14 10:48:25 +010012#include <io_storage.h>
Dan Handley2b6b5742015-03-19 19:17:53 +000013#include <plat_arm.h>
Juan Castillo3a66aca2015-04-13 17:36:19 +010014#include <semihosting.h> /* For FOPEN_MODE_... */
15
16/* Semihosting filenames */
17#define BL2_IMAGE_NAME "bl2.bin"
18#define BL31_IMAGE_NAME "bl31.bin"
19#define BL32_IMAGE_NAME "bl32.bin"
20#define BL33_IMAGE_NAME "bl33.bin"
Soby Mathew7c6df5b2018-01-15 14:43:42 +000021#define TB_FW_CONFIG_NAME "fvp_tb_fw_config.dtb"
Soby Mathew96a1c6b2018-01-15 14:45:33 +000022#define HW_CONFIG_NAME "hw_config.dtb"
Juan Castillo3a66aca2015-04-13 17:36:19 +010023
24#if TRUSTED_BOARD_BOOT
Juan Castillobe801202015-12-03 10:19:21 +000025#define TRUSTED_BOOT_FW_CERT_NAME "tb_fw.crt"
Juan Castillo3a66aca2015-04-13 17:36:19 +010026#define TRUSTED_KEY_CERT_NAME "trusted_key.crt"
Juan Castillobe801202015-12-03 10:19:21 +000027#define SOC_FW_KEY_CERT_NAME "soc_fw_key.crt"
28#define TOS_FW_KEY_CERT_NAME "tos_fw_key.crt"
29#define NT_FW_KEY_CERT_NAME "nt_fw_key.crt"
30#define SOC_FW_CONTENT_CERT_NAME "soc_fw_content.crt"
31#define TOS_FW_CONTENT_CERT_NAME "tos_fw_content.crt"
32#define NT_FW_CONTENT_CERT_NAME "nt_fw_content.crt"
Juan Castillo3a66aca2015-04-13 17:36:19 +010033#endif /* TRUSTED_BOARD_BOOT */
James Morrissey9d72b4e2014-02-10 17:04:32 +000034
James Morrissey9d72b4e2014-02-10 17:04:32 +000035/* IO devices */
Dan Handleya4cb68e2014-04-23 13:47:06 +010036static const io_dev_connector_t *sh_dev_con;
Dan Handleya4cb68e2014-04-23 13:47:06 +010037static uintptr_t sh_dev_handle;
Harry Liebel561cd332014-02-14 14:42:48 +000038
Juan Castillo3a66aca2015-04-13 17:36:19 +010039static const io_file_spec_t sh_file_spec[] = {
40 [BL2_IMAGE_ID] = {
41 .path = BL2_IMAGE_NAME,
42 .mode = FOPEN_MODE_RB
43 },
44 [BL31_IMAGE_ID] = {
45 .path = BL31_IMAGE_NAME,
46 .mode = FOPEN_MODE_RB
47 },
48 [BL32_IMAGE_ID] = {
49 .path = BL32_IMAGE_NAME,
50 .mode = FOPEN_MODE_RB
51 },
52 [BL33_IMAGE_ID] = {
53 .path = BL33_IMAGE_NAME,
54 .mode = FOPEN_MODE_RB
55 },
Soby Mathew7c6df5b2018-01-15 14:43:42 +000056 [TB_FW_CONFIG_ID] = {
57 .path = TB_FW_CONFIG_NAME,
58 .mode = FOPEN_MODE_RB
59 },
Soby Mathew96a1c6b2018-01-15 14:45:33 +000060 [HW_CONFIG_ID] = {
61 .path = HW_CONFIG_NAME,
62 .mode = FOPEN_MODE_RB
63 },
Juan Castillo3a66aca2015-04-13 17:36:19 +010064#if TRUSTED_BOARD_BOOT
Juan Castillobe801202015-12-03 10:19:21 +000065 [TRUSTED_BOOT_FW_CERT_ID] = {
66 .path = TRUSTED_BOOT_FW_CERT_NAME,
Juan Castillo3a66aca2015-04-13 17:36:19 +010067 .mode = FOPEN_MODE_RB
68 },
69 [TRUSTED_KEY_CERT_ID] = {
70 .path = TRUSTED_KEY_CERT_NAME,
71 .mode = FOPEN_MODE_RB
72 },
Juan Castillobe801202015-12-03 10:19:21 +000073 [SOC_FW_KEY_CERT_ID] = {
74 .path = SOC_FW_KEY_CERT_NAME,
Juan Castillo3a66aca2015-04-13 17:36:19 +010075 .mode = FOPEN_MODE_RB
76 },
Juan Castillobe801202015-12-03 10:19:21 +000077 [TRUSTED_OS_FW_KEY_CERT_ID] = {
78 .path = TOS_FW_KEY_CERT_NAME,
Juan Castillo3a66aca2015-04-13 17:36:19 +010079 .mode = FOPEN_MODE_RB
80 },
Juan Castillobe801202015-12-03 10:19:21 +000081 [NON_TRUSTED_FW_KEY_CERT_ID] = {
82 .path = NT_FW_KEY_CERT_NAME,
Juan Castillo3a66aca2015-04-13 17:36:19 +010083 .mode = FOPEN_MODE_RB
84 },
Juan Castillobe801202015-12-03 10:19:21 +000085 [SOC_FW_CONTENT_CERT_ID] = {
86 .path = SOC_FW_CONTENT_CERT_NAME,
Juan Castillo3a66aca2015-04-13 17:36:19 +010087 .mode = FOPEN_MODE_RB
88 },
Juan Castillobe801202015-12-03 10:19:21 +000089 [TRUSTED_OS_FW_CONTENT_CERT_ID] = {
90 .path = TOS_FW_CONTENT_CERT_NAME,
Juan Castillo3a66aca2015-04-13 17:36:19 +010091 .mode = FOPEN_MODE_RB
92 },
Juan Castillobe801202015-12-03 10:19:21 +000093 [NON_TRUSTED_FW_CONTENT_CERT_ID] = {
94 .path = NT_FW_CONTENT_CERT_NAME,
Juan Castillo3a66aca2015-04-13 17:36:19 +010095 .mode = FOPEN_MODE_RB
96 },
97#endif /* TRUSTED_BOARD_BOOT */
98};
99
Harry Liebel561cd332014-02-14 14:42:48 +0000100
Dan Handleya4cb68e2014-04-23 13:47:06 +0100101static int open_semihosting(const uintptr_t spec)
Harry Liebel561cd332014-02-14 14:42:48 +0000102{
Juan Castillo6e762062015-11-02 10:47:01 +0000103 int result;
Dan Handleya4cb68e2014-04-23 13:47:06 +0100104 uintptr_t local_image_handle;
Harry Liebel561cd332014-02-14 14:42:48 +0000105
106 /* See if the file exists on semi-hosting.*/
Dan Handley2b6b5742015-03-19 19:17:53 +0000107 result = io_dev_init(sh_dev_handle, (uintptr_t)NULL);
Juan Castillo6e762062015-11-02 10:47:01 +0000108 if (result == 0) {
Harry Liebel561cd332014-02-14 14:42:48 +0000109 result = io_open(sh_dev_handle, spec, &local_image_handle);
Juan Castillo6e762062015-11-02 10:47:01 +0000110 if (result == 0) {
Dan Handley91b624e2014-07-29 17:14:00 +0100111 VERBOSE("Using Semi-hosting IO\n");
Harry Liebel561cd332014-02-14 14:42:48 +0000112 io_close(local_image_handle);
113 }
114 }
115 return result;
116}
117
Dan Handley2b6b5742015-03-19 19:17:53 +0000118void plat_arm_io_setup(void)
Harry Liebel561cd332014-02-14 14:42:48 +0000119{
Dan Handley2b6b5742015-03-19 19:17:53 +0000120 int io_result;
Harry Liebel561cd332014-02-14 14:42:48 +0000121
Dan Handley2b6b5742015-03-19 19:17:53 +0000122 arm_io_setup();
Harry Liebel561cd332014-02-14 14:42:48 +0000123
Dan Handley2b6b5742015-03-19 19:17:53 +0000124 /* Register the additional IO devices on this platform */
125 io_result = register_io_dev_sh(&sh_dev_con);
Juan Castillo6e762062015-11-02 10:47:01 +0000126 assert(io_result == 0);
Harry Liebel561cd332014-02-14 14:42:48 +0000127
128 /* Open connections to devices and cache the handles */
Dan Handley2b6b5742015-03-19 19:17:53 +0000129 io_result = io_dev_open(sh_dev_con, (uintptr_t)NULL, &sh_dev_handle);
Juan Castillo6e762062015-11-02 10:47:01 +0000130 assert(io_result == 0);
Harry Liebel561cd332014-02-14 14:42:48 +0000131
James Morrissey9d72b4e2014-02-10 17:04:32 +0000132 /* Ignore improbable errors in release builds */
133 (void)io_result;
134}
135
Juan Castillo3a66aca2015-04-13 17:36:19 +0100136/*
137 * FVP provides semihosting as an alternative to load images
138 */
139int plat_arm_get_alt_image_source(unsigned int image_id, uintptr_t *dev_handle,
140 uintptr_t *image_spec)
James Morrissey9d72b4e2014-02-10 17:04:32 +0000141{
Juan Castillo3a66aca2015-04-13 17:36:19 +0100142 int result = open_semihosting((const uintptr_t)&sh_file_spec[image_id]);
Juan Castillo6e762062015-11-02 10:47:01 +0000143 if (result == 0) {
Dan Handley2b6b5742015-03-19 19:17:53 +0000144 *dev_handle = sh_dev_handle;
Juan Castillo3a66aca2015-04-13 17:36:19 +0100145 *image_spec = (uintptr_t)&sh_file_spec[image_id];
146 }
James Morrissey9d72b4e2014-02-10 17:04:32 +0000147
James Morrissey9d72b4e2014-02-10 17:04:32 +0000148 return result;
149}