blob: 3bc314c6ea1ce68ba4aedc61af09bd65522affc9 [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Dan Handleye83b0ca2014-01-14 18:17:09 +00002 * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
Dan Handley2bd4ef22014-04-09 13:14:54 +010031#include <arch.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010032#include <arch_helpers.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010033#include <assert.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010034#include <bl_common.h>
Dan Handley714a0d22014-04-09 13:13:04 +010035#include <debug.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010036#include <io_storage.h>
37#include <platform.h>
Vikram Kanigirida567432014-04-15 18:08:08 +010038#include <errno.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010039#include <stdio.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010040
Achin Gupta4f6ad662013-10-25 09:08:21 +010041unsigned long page_align(unsigned long value, unsigned dir)
42{
43 unsigned long page_size = 1 << FOUR_KB_SHIFT;
44
45 /* Round up the limit to the next page boundary */
46 if (value & (page_size - 1)) {
47 value &= ~(page_size - 1);
48 if (dir == UP)
49 value += page_size;
50 }
51
52 return value;
53}
54
55static inline unsigned int is_page_aligned (unsigned long addr) {
56 const unsigned long page_size = 1 << FOUR_KB_SHIFT;
57
58 return (addr & (page_size - 1)) == 0;
59}
60
61void change_security_state(unsigned int target_security_state)
62{
63 unsigned long scr = read_scr();
64
65 if (target_security_state == SECURE)
66 scr &= ~SCR_NS_BIT;
67 else if (target_security_state == NON_SECURE)
68 scr |= SCR_NS_BIT;
69 else
70 assert(0);
71
72 write_scr(scr);
73}
74
Achin Gupta4f6ad662013-10-25 09:08:21 +010075
76/*******************************************************************************
Dan Handley7ce42df2014-05-15 14:11:36 +010077 * The next function has a weak definition. Platform specific code can override
78 * it if it wishes to.
Achin Gupta4f6ad662013-10-25 09:08:21 +010079 ******************************************************************************/
Dan Handley7ce42df2014-05-15 14:11:36 +010080#pragma weak init_bl2_mem_layout
Achin Gupta4f6ad662013-10-25 09:08:21 +010081
82/*******************************************************************************
83 * Function that takes a memory layout into which BL2 has been either top or
84 * bottom loaded along with the address where BL2 has been loaded in it. Using
85 * this information, it populates bl2_mem_layout to tell BL2 how much memory
86 * it has access to and how much is available for use.
87 ******************************************************************************/
Dan Handleye2712bc2014-04-10 15:37:22 +010088void init_bl2_mem_layout(meminfo_t *bl1_mem_layout,
89 meminfo_t *bl2_mem_layout,
Achin Gupta4f6ad662013-10-25 09:08:21 +010090 unsigned int load_type,
91 unsigned long bl2_base)
92{
93 unsigned tmp;
94
95 if (load_type == BOT_LOAD) {
96 bl2_mem_layout->total_base = bl2_base;
97 tmp = bl1_mem_layout->free_base - bl2_base;
98 bl2_mem_layout->total_size = bl1_mem_layout->free_size + tmp;
99
100 } else {
101 bl2_mem_layout->total_base = bl1_mem_layout->free_base;
102 tmp = bl1_mem_layout->total_base + bl1_mem_layout->total_size;
103 bl2_mem_layout->total_size = tmp - bl1_mem_layout->free_base;
104 }
105
106 bl2_mem_layout->free_base = bl1_mem_layout->free_base;
107 bl2_mem_layout->free_size = bl1_mem_layout->free_size;
108 bl2_mem_layout->attr = load_type;
109
Dan Handleye2712bc2014-04-10 15:37:22 +0100110 flush_dcache_range((unsigned long) bl2_mem_layout, sizeof(meminfo_t));
Achin Gupta4f6ad662013-10-25 09:08:21 +0100111 return;
112}
113
114static void dump_load_info(unsigned long image_load_addr,
115 unsigned long image_size,
Dan Handleye2712bc2014-04-10 15:37:22 +0100116 const meminfo_t *mem_layout)
Achin Gupta4f6ad662013-10-25 09:08:21 +0100117{
118#if DEBUG
119 printf("Trying to load image at address 0x%lx, size = 0x%lx\r\n",
120 image_load_addr, image_size);
121 printf("Current memory layout:\r\n");
122 printf(" total region = [0x%lx, 0x%lx]\r\n", mem_layout->total_base,
123 mem_layout->total_base + mem_layout->total_size);
124 printf(" free region = [0x%lx, 0x%lx]\r\n", mem_layout->free_base,
125 mem_layout->free_base + mem_layout->free_size);
126#endif
127}
128
Ryan Harkin87274c42014-02-04 11:43:57 +0000129/* Generic function to return the size of an image */
130unsigned long image_size(const char *image_name)
131{
Dan Handleya4cb68e2014-04-23 13:47:06 +0100132 uintptr_t dev_handle;
133 uintptr_t image_handle;
134 uintptr_t image_spec;
Ryan Harkin87274c42014-02-04 11:43:57 +0000135 size_t image_size = 0;
136 int io_result = IO_FAIL;
137
138 assert(image_name != NULL);
139
140 /* Obtain a reference to the image by querying the platform layer */
141 io_result = plat_get_image_source(image_name, &dev_handle, &image_spec);
142 if (io_result != IO_SUCCESS) {
143 WARN("Failed to obtain reference to image '%s' (%i)\n",
144 image_name, io_result);
145 return 0;
146 }
147
148 /* Attempt to access the image */
149 io_result = io_open(dev_handle, image_spec, &image_handle);
150 if (io_result != IO_SUCCESS) {
151 WARN("Failed to access image '%s' (%i)\n",
152 image_name, io_result);
153 return 0;
154 }
155
156 /* Find the size of the image */
157 io_result = io_size(image_handle, &image_size);
158 if ((io_result != IO_SUCCESS) || (image_size == 0)) {
159 WARN("Failed to determine the size of the image '%s' file (%i)\n",
160 image_name, io_result);
161 }
162 io_result = io_close(image_handle);
163 /* Ignore improbable/unrecoverable error in 'close' */
164
165 /* TODO: Consider maintaining open device connection from this
166 * bootloader stage
167 */
168 io_result = io_dev_close(dev_handle);
169 /* Ignore improbable/unrecoverable error in 'dev_close' */
170
171 return image_size;
172}
Achin Gupta4f6ad662013-10-25 09:08:21 +0100173/*******************************************************************************
James Morrissey9d72b4e2014-02-10 17:04:32 +0000174 * Generic function to load an image into the trusted RAM,
Achin Gupta4f6ad662013-10-25 09:08:21 +0100175 * given a name, extents of free memory & whether the image should be loaded at
176 * the bottom or top of the free memory. It updates the memory layout if the
Vikram Kanigirida567432014-04-15 18:08:08 +0100177 * load is successful. It also updates the image information and the entry point
178 * information in the params passed
Achin Gupta4f6ad662013-10-25 09:08:21 +0100179 ******************************************************************************/
Vikram Kanigirida567432014-04-15 18:08:08 +0100180int load_image(meminfo_t *mem_layout,
Achin Gupta4f6ad662013-10-25 09:08:21 +0100181 const char *image_name,
182 unsigned int load_type,
Vikram Kanigirida567432014-04-15 18:08:08 +0100183 unsigned long fixed_addr,
184 image_info_t *image_data,
185 entry_point_info_t *entry_point_info)
Achin Gupta4f6ad662013-10-25 09:08:21 +0100186{
Dan Handleya4cb68e2014-04-23 13:47:06 +0100187 uintptr_t dev_handle;
188 uintptr_t image_handle;
189 uintptr_t image_spec;
James Morrissey40a6f642014-02-10 14:24:36 +0000190 unsigned long temp_image_base = 0;
191 unsigned long image_base = 0;
192 long offset = 0;
James Morrissey9d72b4e2014-02-10 17:04:32 +0000193 size_t image_size = 0;
194 size_t bytes_read = 0;
195 int io_result = IO_FAIL;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100196
James Morrissey9d72b4e2014-02-10 17:04:32 +0000197 assert(mem_layout != NULL);
198 assert(image_name != NULL);
Vikram Kanigirida567432014-04-15 18:08:08 +0100199 assert(image_data->h.version >= VERSION_1);
James Morrissey9d72b4e2014-02-10 17:04:32 +0000200
201 /* Obtain a reference to the image by querying the platform layer */
202 io_result = plat_get_image_source(image_name, &dev_handle, &image_spec);
203 if (io_result != IO_SUCCESS) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000204 WARN("Failed to obtain reference to image '%s' (%i)\n",
James Morrissey9d72b4e2014-02-10 17:04:32 +0000205 image_name, io_result);
Vikram Kanigirida567432014-04-15 18:08:08 +0100206 return io_result;
James Morrissey9d72b4e2014-02-10 17:04:32 +0000207 }
208
209 /* Attempt to access the image */
210 io_result = io_open(dev_handle, image_spec, &image_handle);
211 if (io_result != IO_SUCCESS) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000212 WARN("Failed to access image '%s' (%i)\n",
James Morrissey9d72b4e2014-02-10 17:04:32 +0000213 image_name, io_result);
Vikram Kanigirida567432014-04-15 18:08:08 +0100214 return io_result;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100215 }
216
James Morrissey9d72b4e2014-02-10 17:04:32 +0000217 /* Find the size of the image */
218 io_result = io_size(image_handle, &image_size);
219 if ((io_result != IO_SUCCESS) || (image_size == 0)) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000220 WARN("Failed to determine the size of the image '%s' file (%i)\n",
James Morrissey9d72b4e2014-02-10 17:04:32 +0000221 image_name, io_result);
Vikram Kanigirida567432014-04-15 18:08:08 +0100222 goto exit;
James Morrissey9d72b4e2014-02-10 17:04:32 +0000223 }
224
Achin Gupta4f6ad662013-10-25 09:08:21 +0100225 /* See if we have enough space */
James Morrissey9d72b4e2014-02-10 17:04:32 +0000226 if (image_size > mem_layout->free_size) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000227 WARN("Cannot load '%s' file: Not enough space.\n",
Achin Gupta4f6ad662013-10-25 09:08:21 +0100228 image_name);
James Morrissey9d72b4e2014-02-10 17:04:32 +0000229 dump_load_info(0, image_size, mem_layout);
Vikram Kanigirida567432014-04-15 18:08:08 +0100230 goto exit;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100231 }
232
233 switch (load_type) {
234
235 case TOP_LOAD:
236
237 /* Load the image in the top of free memory */
238 temp_image_base = mem_layout->free_base + mem_layout->free_size;
James Morrissey9d72b4e2014-02-10 17:04:32 +0000239 temp_image_base -= image_size;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100240
241 /* Page align base address and check whether the image still fits */
242 image_base = page_align(temp_image_base, DOWN);
243 assert(image_base <= temp_image_base);
244
245 if (image_base < mem_layout->free_base) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000246 WARN("Cannot load '%s' file: Not enough space.\n",
James Morrissey9d72b4e2014-02-10 17:04:32 +0000247 image_name);
248 dump_load_info(image_base, image_size, mem_layout);
Vikram Kanigirida567432014-04-15 18:08:08 +0100249 io_result = -ENOMEM;
250 goto exit;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100251 }
252
253 /* Calculate the amount of extra memory used due to alignment */
254 offset = temp_image_base - image_base;
255
256 break;
257
258 case BOT_LOAD:
259
260 /* Load the BL2 image in the bottom of free memory */
261 temp_image_base = mem_layout->free_base;
262 image_base = page_align(temp_image_base, UP);
263 assert(image_base >= temp_image_base);
264
265 /* Page align base address and check whether the image still fits */
James Morrissey9d72b4e2014-02-10 17:04:32 +0000266 if (image_base + image_size >
Achin Gupta4f6ad662013-10-25 09:08:21 +0100267 mem_layout->free_base + mem_layout->free_size) {
Vikram Kanigirida567432014-04-15 18:08:08 +0100268 WARN("Cannot load '%s' file: Not enough space.\n",
269 image_name);
270 dump_load_info(image_base, image_size, mem_layout);
271 io_result = -ENOMEM;
272 goto exit;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100273 }
274
275 /* Calculate the amount of extra memory used due to alignment */
276 offset = image_base - temp_image_base;
277
278 break;
279
280 default:
281 assert(0);
282
283 }
284
285 /*
286 * Some images must be loaded at a fixed address, not a dynamic one.
287 *
288 * This has been implemented as a hack on top of the existing dynamic
289 * loading mechanism, for the time being. If the 'fixed_addr' function
290 * argument is different from zero, then it will force the load address.
291 * So we still have this principle of top/bottom loading but the code
292 * determining the load address is bypassed and the load address is
293 * forced to the fixed one.
294 *
295 * This can result in quite a lot of wasted space because we still use
296 * 1 sole meminfo structure to represent the extents of free memory,
297 * where we should use some sort of linked list.
298 *
299 * E.g. we want to load BL2 at address 0x04020000, the resulting memory
300 * layout should look as follows:
301 * ------------ 0x04040000
302 * | | <- Free space (1)
303 * |----------|
304 * | BL2 |
305 * |----------| 0x04020000
306 * | | <- Free space (2)
307 * |----------|
308 * | BL1 |
309 * ------------ 0x04000000
310 *
311 * But in the current hacky implementation, we'll need to specify
312 * whether BL2 is loaded at the top or bottom of the free memory.
313 * E.g. if BL2 is considered as top-loaded, the meminfo structure
314 * will give the following view of the memory, hiding the chunk of
315 * free memory above BL2:
316 * ------------ 0x04040000
317 * | |
318 * | |
319 * | BL2 |
320 * |----------| 0x04020000
321 * | | <- Free space (2)
322 * |----------|
323 * | BL1 |
324 * ------------ 0x04000000
325 */
326 if (fixed_addr != 0) {
327 /* Load the image at the given address. */
328 image_base = fixed_addr;
329
330 /* Check whether the image fits. */
331 if ((image_base < mem_layout->free_base) ||
James Morrissey9d72b4e2014-02-10 17:04:32 +0000332 (image_base + image_size >
Achin Gupta4f6ad662013-10-25 09:08:21 +0100333 mem_layout->free_base + mem_layout->free_size)) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000334 WARN("Cannot load '%s' file: Not enough space.\n",
Achin Gupta4f6ad662013-10-25 09:08:21 +0100335 image_name);
James Morrissey9d72b4e2014-02-10 17:04:32 +0000336 dump_load_info(image_base, image_size, mem_layout);
Vikram Kanigirida567432014-04-15 18:08:08 +0100337 io_result = -ENOMEM;
338 goto exit;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100339 }
340
341 /* Check whether the fixed load address is page-aligned. */
342 if (!is_page_aligned(image_base)) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000343 WARN("Cannot load '%s' file at unaligned address 0x%lx\n",
Achin Gupta4f6ad662013-10-25 09:08:21 +0100344 image_name, fixed_addr);
Vikram Kanigirida567432014-04-15 18:08:08 +0100345 io_result = -ENOMEM;
346 goto exit;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100347 }
348
349 /*
350 * Calculate the amount of extra memory used due to fixed
351 * loading.
352 */
353 if (load_type == TOP_LOAD) {
354 unsigned long max_addr, space_used;
355 /*
356 * ------------ max_addr
357 * | /wasted/ | | offset
358 * |..........|..............................
359 * | image | | image_flen
360 * |----------| fixed_addr
361 * | |
362 * | |
363 * ------------ total_base
364 */
365 max_addr = mem_layout->total_base + mem_layout->total_size;
366 /*
367 * Compute the amount of memory used by the image.
368 * Corresponds to all space above the image load
369 * address.
370 */
371 space_used = max_addr - fixed_addr;
372 /*
373 * Calculate the amount of wasted memory within the
374 * amount of memory used by the image.
375 */
James Morrissey9d72b4e2014-02-10 17:04:32 +0000376 offset = space_used - image_size;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100377 } else /* BOT_LOAD */
378 /*
379 * ------------
380 * | |
381 * | |
382 * |----------|
383 * | image |
384 * |..........| fixed_addr
385 * | /wasted/ | | offset
386 * ------------ total_base
387 */
388 offset = fixed_addr - mem_layout->total_base;
389 }
390
391 /* We have enough space so load the image now */
James Morrissey9d72b4e2014-02-10 17:04:32 +0000392 /* TODO: Consider whether to try to recover/retry a partially successful read */
Dan Handleya4cb68e2014-04-23 13:47:06 +0100393 io_result = io_read(image_handle, image_base, image_size, &bytes_read);
James Morrissey9d72b4e2014-02-10 17:04:32 +0000394 if ((io_result != IO_SUCCESS) || (bytes_read < image_size)) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000395 WARN("Failed to load '%s' file (%i)\n", image_name, io_result);
Vikram Kanigirida567432014-04-15 18:08:08 +0100396 goto exit;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100397 }
398
Vikram Kanigirida567432014-04-15 18:08:08 +0100399 image_data->image_base = image_base;
400 image_data->image_size = image_size;
401
402 entry_point_info->pc = image_base;
403
Achin Gupta4f6ad662013-10-25 09:08:21 +0100404 /*
405 * File has been successfully loaded. Update the free memory
406 * data structure & flush the contents of the TZRAM so that
407 * the next EL can see it.
408 */
409 /* Update the memory contents */
James Morrissey9d72b4e2014-02-10 17:04:32 +0000410 flush_dcache_range(image_base, image_size);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100411
James Morrissey9d72b4e2014-02-10 17:04:32 +0000412 mem_layout->free_size -= image_size + offset;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100413
414 /* Update the base of free memory since its moved up */
415 if (load_type == BOT_LOAD)
James Morrissey9d72b4e2014-02-10 17:04:32 +0000416 mem_layout->free_base += offset + image_size;
417
418exit:
Vikram Kanigirida567432014-04-15 18:08:08 +0100419 io_close(image_handle);
James Morrissey9d72b4e2014-02-10 17:04:32 +0000420 /* Ignore improbable/unrecoverable error in 'close' */
421
422 /* TODO: Consider maintaining open device connection from this bootloader stage */
Vikram Kanigirida567432014-04-15 18:08:08 +0100423 io_dev_close(dev_handle);
James Morrissey9d72b4e2014-02-10 17:04:32 +0000424 /* Ignore improbable/unrecoverable error in 'dev_close' */
Achin Gupta4f6ad662013-10-25 09:08:21 +0100425
Vikram Kanigirida567432014-04-15 18:08:08 +0100426 return io_result;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100427}