blob: 66e350aad4892b8822fbb1509a2f54bdb639a743 [file] [log] [blame]
Dan Handley9df48042015-03-19 18:58:55 +00001/*
Douglas Raillarda8954fc2017-01-26 15:54:44 +00002 * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved.
Dan Handley9df48042015-03-19 18:58:55 +00003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
31#include <arch_helpers.h>
32#include <arm_def.h>
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010033#include <assert.h>
Dan Handley9df48042015-03-19 18:58:55 +000034#include <bl_common.h>
35#include <console.h>
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010036#include <debug.h>
37#include <desc_image_load.h>
Dan Handley9df48042015-03-19 18:58:55 +000038#include <plat_arm.h>
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010039#include <platform_def.h>
Dan Handley9df48042015-03-19 18:58:55 +000040#include <string.h>
Douglas Raillarda8954fc2017-01-26 15:54:44 +000041#include <utils.h>
Dan Handley9df48042015-03-19 18:58:55 +000042
Dan Handley9df48042015-03-19 18:58:55 +000043/* Data structure which holds the extents of the trusted SRAM for BL2 */
44static meminfo_t bl2_tzram_layout __aligned(CACHE_WRITEBACK_GRANULE);
45
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010046/* Weak definitions may be overridden in specific ARM standard platform */
47#pragma weak bl2_early_platform_setup
48#pragma weak bl2_platform_setup
49#pragma weak bl2_plat_arch_setup
50#pragma weak bl2_plat_sec_mem_layout
51
52#if LOAD_IMAGE_V2
53
54#pragma weak bl2_plat_handle_post_image_load
55
56#else /* LOAD_IMAGE_V2 */
Dan Handley9df48042015-03-19 18:58:55 +000057
58/*******************************************************************************
59 * This structure represents the superset of information that is passed to
Juan Castillo7d199412015-12-14 09:35:25 +000060 * BL31, e.g. while passing control to it from BL2, bl31_params
Dan Handley9df48042015-03-19 18:58:55 +000061 * and other platform specific params
62 ******************************************************************************/
63typedef struct bl2_to_bl31_params_mem {
64 bl31_params_t bl31_params;
65 image_info_t bl31_image_info;
66 image_info_t bl32_image_info;
67 image_info_t bl33_image_info;
68 entry_point_info_t bl33_ep_info;
69 entry_point_info_t bl32_ep_info;
70 entry_point_info_t bl31_ep_info;
71} bl2_to_bl31_params_mem_t;
72
73
74static bl2_to_bl31_params_mem_t bl31_params_mem;
75
76
77/* Weak definitions may be overridden in specific ARM standard platform */
Dan Handley9df48042015-03-19 18:58:55 +000078#pragma weak bl2_plat_get_bl31_params
79#pragma weak bl2_plat_get_bl31_ep_info
80#pragma weak bl2_plat_flush_bl31_params
81#pragma weak bl2_plat_set_bl31_ep_info
Juan Castilloa72b6472015-12-10 15:49:17 +000082#pragma weak bl2_plat_get_scp_bl2_meminfo
Dan Handley9df48042015-03-19 18:58:55 +000083#pragma weak bl2_plat_get_bl32_meminfo
84#pragma weak bl2_plat_set_bl32_ep_info
85#pragma weak bl2_plat_get_bl33_meminfo
86#pragma weak bl2_plat_set_bl33_ep_info
87
David Wang0ba499f2016-03-07 11:02:57 +080088#if ARM_BL31_IN_DRAM
89meminfo_t *bl2_plat_sec_mem_layout(void)
90{
91 static meminfo_t bl2_dram_layout
92 __aligned(CACHE_WRITEBACK_GRANULE) = {
93 .total_base = BL31_BASE,
94 .total_size = (ARM_AP_TZC_DRAM1_BASE +
95 ARM_AP_TZC_DRAM1_SIZE) - BL31_BASE,
96 .free_base = BL31_BASE,
97 .free_size = (ARM_AP_TZC_DRAM1_BASE +
98 ARM_AP_TZC_DRAM1_SIZE) - BL31_BASE
99 };
Dan Handley9df48042015-03-19 18:58:55 +0000100
David Wang0ba499f2016-03-07 11:02:57 +0800101 return &bl2_dram_layout;
102}
103#else
Dan Handley9df48042015-03-19 18:58:55 +0000104meminfo_t *bl2_plat_sec_mem_layout(void)
105{
106 return &bl2_tzram_layout;
107}
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100108#endif /* ARM_BL31_IN_DRAM */
Dan Handley9df48042015-03-19 18:58:55 +0000109
110/*******************************************************************************
111 * This function assigns a pointer to the memory that the platform has kept
112 * aside to pass platform specific and trusted firmware related information
113 * to BL31. This memory is allocated by allocating memory to
114 * bl2_to_bl31_params_mem_t structure which is a superset of all the
115 * structure whose information is passed to BL31
116 * NOTE: This function should be called only once and should be done
117 * before generating params to BL31
118 ******************************************************************************/
119bl31_params_t *bl2_plat_get_bl31_params(void)
120{
121 bl31_params_t *bl2_to_bl31_params;
122
123 /*
124 * Initialise the memory for all the arguments that needs to
Juan Castillo7d199412015-12-14 09:35:25 +0000125 * be passed to BL31
Dan Handley9df48042015-03-19 18:58:55 +0000126 */
Douglas Raillarda8954fc2017-01-26 15:54:44 +0000127 zeromem(&bl31_params_mem, sizeof(bl2_to_bl31_params_mem_t));
Dan Handley9df48042015-03-19 18:58:55 +0000128
129 /* Assign memory for TF related information */
130 bl2_to_bl31_params = &bl31_params_mem.bl31_params;
131 SET_PARAM_HEAD(bl2_to_bl31_params, PARAM_BL31, VERSION_1, 0);
132
Juan Castillo7d199412015-12-14 09:35:25 +0000133 /* Fill BL31 related information */
Dan Handley9df48042015-03-19 18:58:55 +0000134 bl2_to_bl31_params->bl31_image_info = &bl31_params_mem.bl31_image_info;
135 SET_PARAM_HEAD(bl2_to_bl31_params->bl31_image_info, PARAM_IMAGE_BINARY,
136 VERSION_1, 0);
137
Juan Castillo7d199412015-12-14 09:35:25 +0000138 /* Fill BL32 related information if it exists */
Antonio Nino Diaze4fa3702016-04-05 11:38:49 +0100139#ifdef BL32_BASE
Dan Handley9df48042015-03-19 18:58:55 +0000140 bl2_to_bl31_params->bl32_ep_info = &bl31_params_mem.bl32_ep_info;
141 SET_PARAM_HEAD(bl2_to_bl31_params->bl32_ep_info, PARAM_EP,
142 VERSION_1, 0);
143 bl2_to_bl31_params->bl32_image_info = &bl31_params_mem.bl32_image_info;
144 SET_PARAM_HEAD(bl2_to_bl31_params->bl32_image_info, PARAM_IMAGE_BINARY,
145 VERSION_1, 0);
Antonio Nino Diaze4fa3702016-04-05 11:38:49 +0100146#endif /* BL32_BASE */
Dan Handley9df48042015-03-19 18:58:55 +0000147
Juan Castillo7d199412015-12-14 09:35:25 +0000148 /* Fill BL33 related information */
Dan Handley9df48042015-03-19 18:58:55 +0000149 bl2_to_bl31_params->bl33_ep_info = &bl31_params_mem.bl33_ep_info;
150 SET_PARAM_HEAD(bl2_to_bl31_params->bl33_ep_info,
151 PARAM_EP, VERSION_1, 0);
152
Juan Castillo7d199412015-12-14 09:35:25 +0000153 /* BL33 expects to receive the primary CPU MPID (through x0) */
Dan Handley9df48042015-03-19 18:58:55 +0000154 bl2_to_bl31_params->bl33_ep_info->args.arg0 = 0xffff & read_mpidr();
155
156 bl2_to_bl31_params->bl33_image_info = &bl31_params_mem.bl33_image_info;
157 SET_PARAM_HEAD(bl2_to_bl31_params->bl33_image_info, PARAM_IMAGE_BINARY,
158 VERSION_1, 0);
159
160 return bl2_to_bl31_params;
161}
162
163/* Flush the TF params and the TF plat params */
164void bl2_plat_flush_bl31_params(void)
165{
166 flush_dcache_range((unsigned long)&bl31_params_mem,
167 sizeof(bl2_to_bl31_params_mem_t));
168}
169
170/*******************************************************************************
171 * This function returns a pointer to the shared memory that the platform
172 * has kept to point to entry point information of BL31 to BL2
173 ******************************************************************************/
174struct entry_point_info *bl2_plat_get_bl31_ep_info(void)
175{
176#if DEBUG
177 bl31_params_mem.bl31_ep_info.args.arg1 = ARM_BL31_PLAT_PARAM_VAL;
178#endif
179
180 return &bl31_params_mem.bl31_ep_info;
181}
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100182#endif /* LOAD_IMAGE_V2 */
Dan Handley9df48042015-03-19 18:58:55 +0000183
184/*******************************************************************************
185 * BL1 has passed the extents of the trusted SRAM that should be visible to BL2
186 * in x0. This memory layout is sitting at the base of the free trusted SRAM.
187 * Copy it to a safe location before its reclaimed by later BL2 functionality.
188 ******************************************************************************/
189void arm_bl2_early_platform_setup(meminfo_t *mem_layout)
190{
191 /* Initialize the console to provide early debug support */
192 console_init(PLAT_ARM_BOOT_UART_BASE, PLAT_ARM_BOOT_UART_CLK_IN_HZ,
193 ARM_CONSOLE_BAUDRATE);
194
195 /* Setup the BL2 memory layout */
196 bl2_tzram_layout = *mem_layout;
197
198 /* Initialise the IO layer and register platform IO devices */
199 plat_arm_io_setup();
200}
201
202void bl2_early_platform_setup(meminfo_t *mem_layout)
203{
204 arm_bl2_early_platform_setup(mem_layout);
205}
206
207/*
208 * Perform ARM standard platform setup.
209 */
210void arm_bl2_platform_setup(void)
211{
212 /* Initialize the secure environment */
213 plat_arm_security_setup();
214}
215
216void bl2_platform_setup(void)
217{
218 arm_bl2_platform_setup();
219}
220
221/*******************************************************************************
222 * Perform the very early platform specific architectural setup here. At the
223 * moment this is only initializes the mmu in a quick and dirty way.
224 ******************************************************************************/
225void arm_bl2_plat_arch_setup(void)
226{
Sandrine Bailleux4a1267a2016-05-18 16:11:47 +0100227 arm_setup_page_tables(bl2_tzram_layout.total_base,
Dan Handley9df48042015-03-19 18:58:55 +0000228 bl2_tzram_layout.total_size,
Sandrine Bailleuxecdc4d32016-07-08 14:38:16 +0100229 BL_CODE_BASE,
Masahiro Yamada51bef612017-01-18 02:10:08 +0900230 BL_CODE_END,
Sandrine Bailleuxecdc4d32016-07-08 14:38:16 +0100231 BL_RO_DATA_BASE,
Masahiro Yamada51bef612017-01-18 02:10:08 +0900232 BL_RO_DATA_END
Dan Handley9df48042015-03-19 18:58:55 +0000233#if USE_COHERENT_MEM
Masahiro Yamada0fac5af2016-12-28 16:11:41 +0900234 , BL_COHERENT_RAM_BASE,
235 BL_COHERENT_RAM_END
Dan Handley9df48042015-03-19 18:58:55 +0000236#endif
237 );
Yatharth Kochara5f77d32016-07-04 11:26:14 +0100238
239#ifdef AARCH32
240 enable_mmu_secure(0);
241#else
Sandrine Bailleux4a1267a2016-05-18 16:11:47 +0100242 enable_mmu_el1(0);
Yatharth Kochara5f77d32016-07-04 11:26:14 +0100243#endif
Dan Handley9df48042015-03-19 18:58:55 +0000244}
245
246void bl2_plat_arch_setup(void)
247{
248 arm_bl2_plat_arch_setup();
249}
250
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100251#if LOAD_IMAGE_V2
Yatharth Kocharede39cb2016-11-14 12:01:04 +0000252int arm_bl2_handle_post_image_load(unsigned int image_id)
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100253{
254 int err = 0;
255 bl_mem_params_node_t *bl_mem_params = get_bl_mem_params_node(image_id);
256 assert(bl_mem_params);
257
258 switch (image_id) {
Yatharth Kochara5f77d32016-07-04 11:26:14 +0100259#ifdef AARCH64
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100260 case BL32_IMAGE_ID:
261 bl_mem_params->ep_info.spsr = arm_get_spsr_for_bl32_entry();
262 break;
Yatharth Kochara5f77d32016-07-04 11:26:14 +0100263#endif
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100264
265 case BL33_IMAGE_ID:
266 /* BL33 expects to receive the primary CPU MPID (through r0) */
267 bl_mem_params->ep_info.args.arg0 = 0xffff & read_mpidr();
268 bl_mem_params->ep_info.spsr = arm_get_spsr_for_bl33_entry();
269 break;
270
271#ifdef SCP_BL2_BASE
272 case SCP_BL2_IMAGE_ID:
273 /* The subsequent handling of SCP_BL2 is platform specific */
274 err = plat_arm_bl2_handle_scp_bl2(&bl_mem_params->image_info);
275 if (err) {
276 WARN("Failure in platform-specific handling of SCP_BL2 image.\n");
277 }
278 break;
279#endif
280 }
281
282 return err;
283}
284
Yatharth Kocharede39cb2016-11-14 12:01:04 +0000285/*******************************************************************************
286 * This function can be used by the platforms to update/use image
287 * information for given `image_id`.
288 ******************************************************************************/
289int bl2_plat_handle_post_image_load(unsigned int image_id)
290{
291 return arm_bl2_handle_post_image_load(image_id);
292}
293
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100294#else /* LOAD_IMAGE_V2 */
295
Dan Handley9df48042015-03-19 18:58:55 +0000296/*******************************************************************************
Juan Castilloa72b6472015-12-10 15:49:17 +0000297 * Populate the extents of memory available for loading SCP_BL2 (if used),
Dan Handley9df48042015-03-19 18:58:55 +0000298 * i.e. anywhere in trusted RAM as long as it doesn't overwrite BL2.
299 ******************************************************************************/
Juan Castilloa72b6472015-12-10 15:49:17 +0000300void bl2_plat_get_scp_bl2_meminfo(meminfo_t *scp_bl2_meminfo)
Dan Handley9df48042015-03-19 18:58:55 +0000301{
Juan Castilloa72b6472015-12-10 15:49:17 +0000302 *scp_bl2_meminfo = bl2_tzram_layout;
Dan Handley9df48042015-03-19 18:58:55 +0000303}
304
305/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000306 * Before calling this function BL31 is loaded in memory and its entrypoint
Dan Handley9df48042015-03-19 18:58:55 +0000307 * is set by load_image. This is a placeholder for the platform to change
Juan Castillo7d199412015-12-14 09:35:25 +0000308 * the entrypoint of BL31 and set SPSR and security state.
Dan Handley9df48042015-03-19 18:58:55 +0000309 * On ARM standard platforms we only set the security state of the entrypoint
310 ******************************************************************************/
311void bl2_plat_set_bl31_ep_info(image_info_t *bl31_image_info,
312 entry_point_info_t *bl31_ep_info)
313{
314 SET_SECURITY_STATE(bl31_ep_info->h.attr, SECURE);
315 bl31_ep_info->spsr = SPSR_64(MODE_EL3, MODE_SP_ELX,
316 DISABLE_ALL_EXCEPTIONS);
317}
318
319
320/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000321 * Before calling this function BL32 is loaded in memory and its entrypoint
Dan Handley9df48042015-03-19 18:58:55 +0000322 * is set by load_image. This is a placeholder for the platform to change
Juan Castillo7d199412015-12-14 09:35:25 +0000323 * the entrypoint of BL32 and set SPSR and security state.
Dan Handley9df48042015-03-19 18:58:55 +0000324 * On ARM standard platforms we only set the security state of the entrypoint
325 ******************************************************************************/
Antonio Nino Diaze4fa3702016-04-05 11:38:49 +0100326#ifdef BL32_BASE
Dan Handley9df48042015-03-19 18:58:55 +0000327void bl2_plat_set_bl32_ep_info(image_info_t *bl32_image_info,
328 entry_point_info_t *bl32_ep_info)
329{
330 SET_SECURITY_STATE(bl32_ep_info->h.attr, SECURE);
331 bl32_ep_info->spsr = arm_get_spsr_for_bl32_entry();
332}
333
334/*******************************************************************************
Dan Handley9df48042015-03-19 18:58:55 +0000335 * Populate the extents of memory available for loading BL32
336 ******************************************************************************/
337void bl2_plat_get_bl32_meminfo(meminfo_t *bl32_meminfo)
338{
339 /*
340 * Populate the extents of memory available for loading BL32.
341 */
342 bl32_meminfo->total_base = BL32_BASE;
343 bl32_meminfo->free_base = BL32_BASE;
344 bl32_meminfo->total_size =
345 (TSP_SEC_MEM_BASE + TSP_SEC_MEM_SIZE) - BL32_BASE;
346 bl32_meminfo->free_size =
347 (TSP_SEC_MEM_BASE + TSP_SEC_MEM_SIZE) - BL32_BASE;
348}
Antonio Nino Diaze4fa3702016-04-05 11:38:49 +0100349#endif /* BL32_BASE */
Dan Handley9df48042015-03-19 18:58:55 +0000350
Antonio Nino Diaze4fa3702016-04-05 11:38:49 +0100351/*******************************************************************************
352 * Before calling this function BL33 is loaded in memory and its entrypoint
353 * is set by load_image. This is a placeholder for the platform to change
354 * the entrypoint of BL33 and set SPSR and security state.
355 * On ARM standard platforms we only set the security state of the entrypoint
356 ******************************************************************************/
357void bl2_plat_set_bl33_ep_info(image_info_t *image,
358 entry_point_info_t *bl33_ep_info)
359{
360 SET_SECURITY_STATE(bl33_ep_info->h.attr, NON_SECURE);
361 bl33_ep_info->spsr = arm_get_spsr_for_bl33_entry();
362}
Dan Handley9df48042015-03-19 18:58:55 +0000363
364/*******************************************************************************
365 * Populate the extents of memory available for loading BL33
366 ******************************************************************************/
367void bl2_plat_get_bl33_meminfo(meminfo_t *bl33_meminfo)
368{
369 bl33_meminfo->total_base = ARM_NS_DRAM1_BASE;
370 bl33_meminfo->total_size = ARM_NS_DRAM1_SIZE;
371 bl33_meminfo->free_base = ARM_NS_DRAM1_BASE;
372 bl33_meminfo->free_size = ARM_NS_DRAM1_SIZE;
373}
Yatharth Kocharf9a0f162016-09-13 17:07:57 +0100374
375#endif /* LOAD_IMAGE_V2 */