blob: 6478f12fc781357a30d5245a4bdc03706e0385fd [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Roberto Vargas777dd432018-02-12 12:36:17 +00002 * Copyright (c) 2013-2018, ARM Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Achin Gupta4f6ad662013-10-25 09:08:21 +01005 */
6
7#ifndef __BL_COMMON_H__
8#define __BL_COMMON_H__
9
Soby Mathewb911cc72017-02-13 12:46:28 +000010#include <ep_info.h>
11#include <param_header.h>
Soby Mathewcc364842018-02-21 01:16:39 +000012#include <utils_def.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010013
14#define UP 1
15#define DOWN 0
16
17/*******************************************************************************
Sandrine Bailleux467d0572014-06-24 14:02:34 +010018 * Constants to identify the location of a memory region in a given memory
19 * layout.
20******************************************************************************/
21#define TOP 0x1
22#define BOTTOM !TOP
Achin Gupta4f6ad662013-10-25 09:08:21 +010023
Yatharth Kochara65be2f2015-10-09 18:06:13 +010024/*
25 * The following are used for image state attributes.
26 * Image can only be in one of the following state.
27 */
28#define IMAGE_STATE_RESET 0
29#define IMAGE_STATE_COPIED 1
30#define IMAGE_STATE_COPYING 2
31#define IMAGE_STATE_AUTHENTICATED 3
32#define IMAGE_STATE_EXECUTED 4
33#define IMAGE_STATE_INTERRUPTED 5
34
Soby Mathewcc364842018-02-21 01:16:39 +000035#define IMAGE_ATTRIB_SKIP_LOADING U(0x02)
36#define IMAGE_ATTRIB_PLAT_SETUP U(0x04)
Dan Handley2bd4ef22014-04-09 13:14:54 +010037
Soby Mathewcc364842018-02-21 01:16:39 +000038#define INVALID_IMAGE_ID U(0xFFFFFFFF)
Yatharth Kochara65be2f2015-10-09 18:06:13 +010039
Yatharth Kochar6c0566c2015-10-02 17:56:48 +010040/*******************************************************************************
41 * Constants to indicate type of exception to the common exception handler.
42 ******************************************************************************/
43#define SYNC_EXCEPTION_SP_EL0 0x0
44#define IRQ_SP_EL0 0x1
45#define FIQ_SP_EL0 0x2
46#define SERROR_SP_EL0 0x3
47#define SYNC_EXCEPTION_SP_ELX 0x4
48#define IRQ_SP_ELX 0x5
49#define FIQ_SP_ELX 0x6
50#define SERROR_SP_ELX 0x7
51#define SYNC_EXCEPTION_AARCH64 0x8
52#define IRQ_AARCH64 0x9
53#define FIQ_AARCH64 0xa
54#define SERROR_AARCH64 0xb
55#define SYNC_EXCEPTION_AARCH32 0xc
56#define IRQ_AARCH32 0xd
57#define FIQ_AARCH32 0xe
58#define SERROR_AARCH32 0xf
59
Vikram Kanigirida567432014-04-15 18:08:08 +010060#ifndef __ASSEMBLY__
Vikram Kanigiria3a5e4a2014-05-15 18:27:15 +010061#include <cassert.h>
Sandrine Bailleux467d0572014-06-24 14:02:34 +010062#include <stddef.h>
Soby Mathewb911cc72017-02-13 12:46:28 +000063#include <stdint.h>
Scott Brandenbf404c02017-04-10 11:45:52 -070064#include <utils_def.h> /* To retain compatibility */
Vikram Kanigiri725b1332015-03-04 10:34:27 +000065
Joel Hutton5cc3bc82018-03-21 11:40:57 +000066
Dan Handleyf05c1b52015-04-27 11:49:22 +010067/*
68 * Declarations of linker defined symbols to help determine memory layout of
69 * BL images
70 */
Sandrine Bailleuxf91f1442016-07-08 14:37:40 +010071#if SEPARATE_CODE_AND_RODATA
Joel Hutton5cc3bc82018-03-21 11:40:57 +000072IMPORT_SYM(unsigned long, __TEXT_START__, BL_CODE_BASE);
73IMPORT_SYM(unsigned long, __TEXT_END__, BL_CODE_END);
74IMPORT_SYM(unsigned long, __RODATA_START__, BL_RO_DATA_BASE);
75IMPORT_SYM(unsigned long, __RODATA_END__, BL_RO_DATA_END);
Sandrine Bailleuxf91f1442016-07-08 14:37:40 +010076#else
Joel Hutton5cc3bc82018-03-21 11:40:57 +000077IMPORT_SYM(unsigned long, __RO_START__, BL_CODE_BASE);
78IMPORT_SYM(unsigned long, __RO_END__, BL_CODE_END);
Sandrine Bailleuxf91f1442016-07-08 14:37:40 +010079#endif
80
Masahiro Yamada441bfdd2016-12-25 23:36:24 +090081#if defined(IMAGE_BL2)
Joel Hutton5cc3bc82018-03-21 11:40:57 +000082IMPORT_SYM(unsigned long, __BL2_END__, BL2_END);
Masahiro Yamada441bfdd2016-12-25 23:36:24 +090083#elif defined(IMAGE_BL2U)
Joel Hutton5cc3bc82018-03-21 11:40:57 +000084IMPORT_SYM(unsigned long, __BL2U_END__, BL2U_END);
Masahiro Yamada441bfdd2016-12-25 23:36:24 +090085#elif defined(IMAGE_BL31)
Joel Hutton5cc3bc82018-03-21 11:40:57 +000086IMPORT_SYM(unsigned long, __BL31_END__, BL31_END);
Masahiro Yamada441bfdd2016-12-25 23:36:24 +090087#elif defined(IMAGE_BL32)
Joel Hutton5cc3bc82018-03-21 11:40:57 +000088IMPORT_SYM(unsigned long, __BL32_END__, BL32_END);
Dan Handleyf05c1b52015-04-27 11:49:22 +010089#endif /* IMAGE_BLX */
90
Joel Hutton5cc3bc82018-03-21 11:40:57 +000091/*
92 * The next 2 constants identify the extents of the coherent memory region.
93 * These addresses are used by the MMU setup code and therefore they must be
94 * page-aligned. It is the responsibility of the linker script to ensure that
95 * __COHERENT_RAM_START__ and __COHERENT_RAM_END__ linker symbols refer to
96 * page-aligned addresses.
97 */
Dan Handleyf05c1b52015-04-27 11:49:22 +010098#if USE_COHERENT_MEM
Joel Hutton5cc3bc82018-03-21 11:40:57 +000099IMPORT_SYM(unsigned long, __COHERENT_RAM_START__, BL_COHERENT_RAM_BASE);
100IMPORT_SYM(unsigned long, __COHERENT_RAM_END__, BL_COHERENT_RAM_END);
Dan Handleyf05c1b52015-04-27 11:49:22 +0100101#endif
102
Achin Gupta4f6ad662013-10-25 09:08:21 +0100103/*******************************************************************************
104 * Structure used for telling the next BL how much of a particular type of
105 * memory is available for its use and how much is already used.
106 ******************************************************************************/
Dan Handleye2712bc2014-04-10 15:37:22 +0100107typedef struct meminfo {
Soby Mathewa0fedc42016-06-16 14:52:04 +0100108 uintptr_t total_base;
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100109 size_t total_size;
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100110#if !LOAD_IMAGE_V2
Soby Mathewa0fedc42016-06-16 14:52:04 +0100111 uintptr_t free_base;
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100112 size_t free_size;
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100113#endif
Dan Handleye2712bc2014-04-10 15:37:22 +0100114} meminfo_t;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100115
Vikram Kanigirida567432014-04-15 18:08:08 +0100116/*****************************************************************************
117 * Image info binary provides information from the image loader that
118 * can be used by the firmware to manage available trusted RAM.
119 * More advanced firmware image formats can provide additional
120 * information that enables optimization or greater flexibility in the
121 * common firmware code
122 *****************************************************************************/
123typedef struct image_info {
124 param_header_t h;
125 uintptr_t image_base; /* physical address of base of image */
126 uint32_t image_size; /* bytes read from image file */
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100127#if LOAD_IMAGE_V2
128 uint32_t image_max_size;
129#endif
Vikram Kanigirida567432014-04-15 18:08:08 +0100130} image_info_t;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100131
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100132/*****************************************************************************
133 * The image descriptor struct definition.
134 *****************************************************************************/
135typedef struct image_desc {
136 /* Contains unique image id for the image. */
137 unsigned int image_id;
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100138 /*
139 * This member contains Image state information.
140 * Refer IMAGE_STATE_XXX defined above.
141 */
142 unsigned int state;
Yatharth Kocharf11b29a2016-02-01 11:04:46 +0000143 uint32_t copied_size; /* image size copied in blocks */
Soby Mathew6d4f2622016-01-12 10:30:59 +0000144 image_info_t image_info;
145 entry_point_info_t ep_info;
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100146} image_desc_t;
147
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100148#if LOAD_IMAGE_V2
149/* BL image node in the BL image loading sequence */
150typedef struct bl_load_info_node {
151 unsigned int image_id;
152 image_info_t *image_info;
153 struct bl_load_info_node *next_load_info;
154} bl_load_info_node_t;
155
156/* BL image head node in the BL image loading sequence */
157typedef struct bl_load_info {
158 param_header_t h;
159 bl_load_info_node_t *head;
160} bl_load_info_t;
161
162/* BL image node in the BL image execution sequence */
163typedef struct bl_params_node {
164 unsigned int image_id;
165 image_info_t *image_info;
166 entry_point_info_t *ep_info;
167 struct bl_params_node *next_params_info;
168} bl_params_node_t;
169
170/*
171 * BL image head node in the BL image execution sequence
172 * It is also used to pass information to next BL image.
173 */
174typedef struct bl_params {
175 param_header_t h;
176 bl_params_node_t *head;
177} bl_params_t;
178
179#else /* LOAD_IMAGE_V2 */
180
Achin Gupta4f6ad662013-10-25 09:08:21 +0100181/*******************************************************************************
Achin Guptae4d084e2014-02-19 17:18:23 +0000182 * This structure represents the superset of information that can be passed to
183 * BL31 e.g. while passing control to it from BL2. The BL32 parameters will be
Vikram Kanigirida567432014-04-15 18:08:08 +0100184 * populated only if BL2 detects its presence. A pointer to a structure of this
Juan Castillo7d199412015-12-14 09:35:25 +0000185 * type should be passed in X0 to BL31's cold boot entrypoint.
Vikram Kanigirida567432014-04-15 18:08:08 +0100186 *
Juan Castillo7d199412015-12-14 09:35:25 +0000187 * Use of this structure and the X0 parameter is not mandatory: the BL31
Vikram Kanigirida567432014-04-15 18:08:08 +0100188 * platform code can use other mechanisms to provide the necessary information
Juan Castillo7d199412015-12-14 09:35:25 +0000189 * about BL32 and BL33 to the common and SPD code.
Vikram Kanigirida567432014-04-15 18:08:08 +0100190 *
Juan Castillo7d199412015-12-14 09:35:25 +0000191 * BL31 image information is mandatory if this structure is used. If either of
192 * the optional BL32 and BL33 image information is not provided, this is
Vikram Kanigirida567432014-04-15 18:08:08 +0100193 * indicated by the respective image_info pointers being zero.
Achin Guptae4d084e2014-02-19 17:18:23 +0000194 ******************************************************************************/
Vikram Kanigirida567432014-04-15 18:08:08 +0100195typedef struct bl31_params {
196 param_header_t h;
197 image_info_t *bl31_image_info;
198 entry_point_info_t *bl32_ep_info;
199 image_info_t *bl32_image_info;
200 entry_point_info_t *bl33_ep_info;
201 image_info_t *bl33_image_info;
202} bl31_params_t;
203
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100204#endif /* LOAD_IMAGE_V2 */
Vikram Kanigirida567432014-04-15 18:08:08 +0100205
Achin Guptae4d084e2014-02-19 17:18:23 +0000206/*******************************************************************************
Achin Gupta4f6ad662013-10-25 09:08:21 +0100207 * Function & variable prototypes
208 ******************************************************************************/
Daniel Boulby4f3b6ed2018-05-04 11:18:26 +0100209size_t get_image_size(unsigned int image_id);
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100210
Sandrine Bailleuxb0e529b2016-11-08 14:27:10 +0000211int is_mem_free(uintptr_t free_base, size_t free_size,
212 uintptr_t addr, size_t size);
213
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100214#if LOAD_IMAGE_V2
215
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100216int load_auth_image(unsigned int image_id, image_info_t *image_data);
217
218#else
219
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100220int load_image(meminfo_t *mem_layout,
Juan Castillo3a66aca2015-04-13 17:36:19 +0100221 unsigned int image_id,
Juan Castilloa08a5e72015-05-19 11:54:12 +0100222 uintptr_t image_base,
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100223 image_info_t *image_data,
224 entry_point_info_t *entry_point_info);
Juan Castilloa08a5e72015-05-19 11:54:12 +0100225int load_auth_image(meminfo_t *mem_layout,
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100226 unsigned int image_id,
Juan Castilloa08a5e72015-05-19 11:54:12 +0100227 uintptr_t image_base,
228 image_info_t *image_data,
229 entry_point_info_t *entry_point_info);
Soby Mathewa0fedc42016-06-16 14:52:04 +0100230void reserve_mem(uintptr_t *free_base, size_t *free_size,
231 uintptr_t addr, size_t size);
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100232
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100233#endif /* LOAD_IMAGE_V2 */
234
Soby Mathew9fe88042018-03-26 12:43:37 +0100235#if TRUSTED_BOARD_BOOT && defined(DYN_DISABLE_AUTH)
236/*
237 * API to dynamically disable authentication. Only meant for development
238 * systems.
239 */
240void dyn_disable_auth(void);
241#endif
242
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100243extern const char build_message[];
244extern const char version_string[];
245
Sandrine Bailleuxb2e224c2015-09-28 17:03:06 +0100246void print_entry_point_info(const entry_point_info_t *ep_info);
Roberto Vargas2ca18d92018-02-12 12:36:17 +0000247uintptr_t page_align(uintptr_t value, unsigned dir);
Sandrine Bailleuxb2e224c2015-09-28 17:03:06 +0100248
Achin Gupta4f6ad662013-10-25 09:08:21 +0100249#endif /*__ASSEMBLY__*/
250
251#endif /* __BL_COMMON_H__ */