blob: 4c1900252244af99109398f7d94839461921dd7f [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Dan Handleye83b0ca2014-01-14 18:17:09 +00002 * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
Dan Handley2bd4ef22014-04-09 13:14:54 +010031#include <arch.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010032#include <arch_helpers.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010033#include <assert.h>
Juan Castilloa08a5e72015-05-19 11:54:12 +010034#include <auth_mod.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010035#include <bl_common.h>
Dan Handley714a0d22014-04-09 13:13:04 +010036#include <debug.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010037#include <platform.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010038#include <platform_def.h>
Juan Castillo3a66aca2015-04-13 17:36:19 +010039#include <stdint.h>
Dan Handleybcd60ba2014-04-17 18:53:42 +010040#include "bl2_private.h"
Achin Gupta4f6ad662013-10-25 09:08:21 +010041
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010042/*******************************************************************************
43 * Load the BL3-0 image if there's one.
44 * If a platform does not want to attempt to load BL3-0 image it must leave
45 * BL30_BASE undefined.
46 * Return 0 on success or if there's no BL3-0 image to load, a negative error
47 * code otherwise.
48 ******************************************************************************/
49static int load_bl30(void)
50{
51 int e = 0;
52#ifdef BL30_BASE
53 meminfo_t bl30_mem_info;
54 image_info_t bl30_image_info;
55
56 /*
57 * It is up to the platform to specify where BL3-0 should be loaded if
58 * it exists. It could create space in the secure sram or point to a
59 * completely different memory.
60 *
61 * The entry point information is not relevant in this case as the AP
62 * won't execute the BL3-0 image.
63 */
Dan Handley91b624e2014-07-29 17:14:00 +010064 INFO("BL2: Loading BL3-0\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010065 bl2_plat_get_bl30_meminfo(&bl30_mem_info);
Juan Castillo4db9d152014-11-13 17:04:33 +000066 bl30_image_info.h.version = VERSION_1;
Juan Castilloa08a5e72015-05-19 11:54:12 +010067 e = load_auth_image(&bl30_mem_info,
68 BL30_IMAGE_ID,
69 BL30_BASE,
70 &bl30_image_info,
71 NULL);
Juan Castillo9246ab82015-01-28 16:46:57 +000072
Juan Castilloa08a5e72015-05-19 11:54:12 +010073 if (e == 0) {
74 /* The subsequent handling of BL3-0 is platform specific */
75 e = bl2_plat_handle_bl30(&bl30_image_info);
76 if (e) {
77 ERROR("Failure in platform-specific handling of BL3-0 image.\n");
78 }
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010079 }
80#endif /* BL30_BASE */
81
82 return e;
83}
Vikram Kanigiria3a5e4a2014-05-15 18:27:15 +010084
85/*******************************************************************************
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010086 * Load the BL3-1 image.
87 * The bl2_to_bl31_params and bl31_ep_info params will be updated with the
88 * relevant BL3-1 information.
89 * Return 0 on success, a negative error code otherwise.
Achin Gupta4f6ad662013-10-25 09:08:21 +010090 ******************************************************************************/
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010091static int load_bl31(bl31_params_t *bl2_to_bl31_params,
92 entry_point_info_t *bl31_ep_info)
Achin Gupta4f6ad662013-10-25 09:08:21 +010093{
Dan Handleye2712bc2014-04-10 15:37:22 +010094 meminfo_t *bl2_tzram_layout;
Vikram Kanigirida567432014-04-15 18:08:08 +010095 int e;
Achin Gupta4f6ad662013-10-25 09:08:21 +010096
Dan Handley91b624e2014-07-29 17:14:00 +010097 INFO("BL2: Loading BL3-1\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010098 assert(bl2_to_bl31_params != NULL);
99 assert(bl31_ep_info != NULL);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100100
101 /* Find out how much free trusted ram remains after BL2 load */
Sandrine Bailleuxee12f6f2013-11-28 14:55:58 +0000102 bl2_tzram_layout = bl2_plat_sec_mem_layout();
Achin Gupta4f6ad662013-10-25 09:08:21 +0100103
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100104 /* Set the X0 parameter to BL3-1 */
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100105 bl31_ep_info->args.arg0 = (unsigned long)bl2_to_bl31_params;
106
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100107 /* Load the BL3-1 image */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100108 e = load_auth_image(bl2_tzram_layout,
109 BL31_IMAGE_ID,
110 BL31_BASE,
111 bl2_to_bl31_params->bl31_image_info,
112 bl31_ep_info);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100113
Juan Castilloa08a5e72015-05-19 11:54:12 +0100114 if (e == 0) {
115 bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info,
116 bl31_ep_info);
Sandrine Bailleuxaada44c2015-03-26 11:07:09 +0000117 }
Juan Castillo9246ab82015-01-28 16:46:57 +0000118
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100119 return e;
120}
Vikram Kanigirida567432014-04-15 18:08:08 +0100121
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100122/*******************************************************************************
123 * Load the BL3-2 image if there's one.
124 * The bl2_to_bl31_params param will be updated with the relevant BL3-2
125 * information.
126 * If a platform does not want to attempt to load BL3-2 image it must leave
127 * BL32_BASE undefined.
128 * Return 0 on success or if there's no BL3-2 image to load, a negative error
129 * code otherwise.
130 ******************************************************************************/
131static int load_bl32(bl31_params_t *bl2_to_bl31_params)
132{
133 int e = 0;
134#ifdef BL32_BASE
135 meminfo_t bl32_mem_info;
Harry Liebel561cd332014-02-14 14:42:48 +0000136
Dan Handley91b624e2014-07-29 17:14:00 +0100137 INFO("BL2: Loading BL3-2\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100138 assert(bl2_to_bl31_params != NULL);
Dan Handley21a30ab2014-04-15 11:38:38 +0100139
Achin Gupta4f6ad662013-10-25 09:08:21 +0100140 /*
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100141 * It is up to the platform to specify where BL3-2 should be loaded if
142 * it exists. It could create space in the secure sram or point to a
Dan Handley21a30ab2014-04-15 11:38:38 +0100143 * completely different memory.
Vikram Kanigiria3a5e4a2014-05-15 18:27:15 +0100144 */
Vikram Kanigirid8c9d262014-05-16 18:48:12 +0100145 bl2_plat_get_bl32_meminfo(&bl32_mem_info);
Juan Castilloa08a5e72015-05-19 11:54:12 +0100146 e = load_auth_image(&bl32_mem_info,
147 BL32_IMAGE_ID,
148 BL32_BASE,
149 bl2_to_bl31_params->bl32_image_info,
150 bl2_to_bl31_params->bl32_ep_info);
Juan Castillo9246ab82015-01-28 16:46:57 +0000151
Juan Castilloa08a5e72015-05-19 11:54:12 +0100152 if (e == 0) {
153 bl2_plat_set_bl32_ep_info(
154 bl2_to_bl31_params->bl32_image_info,
155 bl2_to_bl31_params->bl32_ep_info);
Sandrine Bailleuxaada44c2015-03-26 11:07:09 +0000156 }
Dan Handley21a30ab2014-04-15 11:38:38 +0100157#endif /* BL32_BASE */
Achin Guptaa3050ed2014-02-19 17:52:35 +0000158
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100159 return e;
160}
161
162/*******************************************************************************
163 * Load the BL3-3 image.
164 * The bl2_to_bl31_params param will be updated with the relevant BL3-3
165 * information.
166 * Return 0 on success, a negative error code otherwise.
167 ******************************************************************************/
168static int load_bl33(bl31_params_t *bl2_to_bl31_params)
169{
170 meminfo_t bl33_mem_info;
171 int e;
172
Dan Handley91b624e2014-07-29 17:14:00 +0100173 INFO("BL2: Loading BL3-3\n");
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100174 assert(bl2_to_bl31_params != NULL);
175
176 bl2_plat_get_bl33_meminfo(&bl33_mem_info);
177
178 /* Load the BL3-3 image in non-secure memory provided by the platform */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100179 e = load_auth_image(&bl33_mem_info,
180 BL33_IMAGE_ID,
181 plat_get_ns_image_entrypoint(),
182 bl2_to_bl31_params->bl33_image_info,
183 bl2_to_bl31_params->bl33_ep_info);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100184
Juan Castilloa08a5e72015-05-19 11:54:12 +0100185 if (e == 0) {
186 bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info,
187 bl2_to_bl31_params->bl33_ep_info);
Sandrine Bailleuxaada44c2015-03-26 11:07:09 +0000188 }
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100189
190 return e;
191}
192
193/*******************************************************************************
194 * The only thing to do in BL2 is to load further images and pass control to
195 * BL3-1. The memory occupied by BL2 will be reclaimed by BL3-x stages. BL2 runs
196 * entirely in S-EL1.
197 ******************************************************************************/
198void bl2_main(void)
199{
200 bl31_params_t *bl2_to_bl31_params;
201 entry_point_info_t *bl31_ep_info;
202 int e;
203
Dan Handley91b624e2014-07-29 17:14:00 +0100204 NOTICE("BL2: %s\n", version_string);
205 NOTICE("BL2: %s\n", build_message);
206
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100207 /* Perform remaining generic architectural setup in S-EL1 */
208 bl2_arch_setup();
209
Juan Castillo9246ab82015-01-28 16:46:57 +0000210#if TRUSTED_BOARD_BOOT
211 /* Initialize authentication module */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100212 auth_mod_init();
Juan Castillo9246ab82015-01-28 16:46:57 +0000213#endif /* TRUSTED_BOARD_BOOT */
214
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100215 /*
216 * Load the subsequent bootloader images
217 */
218 e = load_bl30();
219 if (e) {
220 ERROR("Failed to load BL3-0 (%i)\n", e);
221 panic();
222 }
223
Juan Castillo6b672f52014-09-04 14:43:09 +0100224 /* Perform platform setup in BL2 after loading BL3-0 */
225 bl2_platform_setup();
226
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100227 /*
228 * Get a pointer to the memory the platform has set aside to pass
229 * information to BL3-1.
230 */
231 bl2_to_bl31_params = bl2_plat_get_bl31_params();
232 bl31_ep_info = bl2_plat_get_bl31_ep_info();
233
234 e = load_bl31(bl2_to_bl31_params, bl31_ep_info);
235 if (e) {
236 ERROR("Failed to load BL3-1 (%i)\n", e);
237 panic();
238 }
239
240 e = load_bl32(bl2_to_bl31_params);
241 if (e)
242 WARN("Failed to load BL3-2 (%i)\n", e);
243
244 e = load_bl33(bl2_to_bl31_params);
245 if (e) {
246 ERROR("Failed to load BL3-3 (%i)\n", e);
247 panic();
248 }
249
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100250 /* Flush the params to be passed to memory */
251 bl2_plat_flush_bl31_params();
252
Achin Gupta4f6ad662013-10-25 09:08:21 +0100253 /*
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100254 * Run BL3-1 via an SMC to BL1. Information on how to pass control to
255 * the BL3-2 (if present) and BL3-3 software images will be passed to
256 * BL3-1 as an argument.
Achin Gupta4f6ad662013-10-25 09:08:21 +0100257 */
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100258 smc(RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100259}