2013-10-25 09:08:21 +01:00
|
|
|
/*
|
2014-01-14 18:17:09 +00:00
|
|
|
* Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
|
2013-10-25 09:08:21 +01:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
*
|
|
|
|
* Redistributions of source code must retain the above copyright notice, this
|
|
|
|
* list of conditions and the following disclaimer.
|
|
|
|
*
|
|
|
|
* Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
* and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* Neither the name of ARM nor the names of its contributors may be used
|
|
|
|
* to endorse or promote products derived from this software without specific
|
|
|
|
* prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
|
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
2014-04-09 13:14:54 +01:00
|
|
|
#include <arch.h>
|
2013-10-25 09:08:21 +01:00
|
|
|
#include <arch_helpers.h>
|
2014-04-09 13:14:54 +01:00
|
|
|
#include <assert.h>
|
2015-05-19 11:54:12 +01:00
|
|
|
#include <auth_mod.h>
|
2015-10-10 19:06:53 +01:00
|
|
|
#include <bl1.h>
|
2013-10-25 09:08:21 +01:00
|
|
|
#include <bl_common.h>
|
2014-04-09 13:13:04 +01:00
|
|
|
#include <debug.h>
|
2015-10-01 18:37:40 +01:00
|
|
|
#include <errno.h>
|
2014-04-09 13:14:54 +01:00
|
|
|
#include <platform.h>
|
2014-05-14 17:44:19 +01:00
|
|
|
#include <platform_def.h>
|
2015-04-13 17:36:19 +01:00
|
|
|
#include <stdint.h>
|
2014-04-17 18:53:42 +01:00
|
|
|
#include "bl2_private.h"
|
2013-10-25 09:08:21 +01:00
|
|
|
|
2015-12-10 15:49:17 +00:00
|
|
|
/*
|
|
|
|
* Check for platforms that use obsolete image terminology
|
|
|
|
*/
|
|
|
|
#ifdef BL30_BASE
|
|
|
|
# error "BL30_BASE platform define no longer used - please use SCP_BL2_BASE"
|
|
|
|
#endif
|
|
|
|
|
2014-06-24 14:19:36 +01:00
|
|
|
/*******************************************************************************
|
2015-12-10 15:49:17 +00:00
|
|
|
* Load the SCP_BL2 image if there's one.
|
|
|
|
* If a platform does not want to attempt to load SCP_BL2 image it must leave
|
|
|
|
* SCP_BL2_BASE undefined.
|
|
|
|
* Return 0 on success or if there's no SCP_BL2 image to load, a negative error
|
2014-06-24 14:19:36 +01:00
|
|
|
* code otherwise.
|
|
|
|
******************************************************************************/
|
2015-12-10 15:49:17 +00:00
|
|
|
static int load_scp_bl2(void)
|
2014-06-24 14:19:36 +01:00
|
|
|
{
|
|
|
|
int e = 0;
|
2015-12-10 15:49:17 +00:00
|
|
|
#ifdef SCP_BL2_BASE
|
|
|
|
meminfo_t scp_bl2_mem_info;
|
|
|
|
image_info_t scp_bl2_image_info;
|
2014-06-24 14:19:36 +01:00
|
|
|
|
|
|
|
/*
|
2015-12-10 15:49:17 +00:00
|
|
|
* It is up to the platform to specify where SCP_BL2 should be loaded if
|
2014-06-24 14:19:36 +01:00
|
|
|
* it exists. It could create space in the secure sram or point to a
|
|
|
|
* completely different memory.
|
|
|
|
*
|
|
|
|
* The entry point information is not relevant in this case as the AP
|
2015-12-10 15:49:17 +00:00
|
|
|
* won't execute the SCP_BL2 image.
|
2014-06-24 14:19:36 +01:00
|
|
|
*/
|
2015-12-10 15:49:17 +00:00
|
|
|
INFO("BL2: Loading SCP_BL2\n");
|
|
|
|
bl2_plat_get_scp_bl2_meminfo(&scp_bl2_mem_info);
|
|
|
|
scp_bl2_image_info.h.version = VERSION_1;
|
|
|
|
e = load_auth_image(&scp_bl2_mem_info,
|
|
|
|
SCP_BL2_IMAGE_ID,
|
|
|
|
SCP_BL2_BASE,
|
|
|
|
&scp_bl2_image_info,
|
2015-05-19 11:54:12 +01:00
|
|
|
NULL);
|
|
|
|
|
|
|
|
if (e == 0) {
|
2015-12-10 15:49:17 +00:00
|
|
|
/* The subsequent handling of SCP_BL2 is platform specific */
|
|
|
|
e = bl2_plat_handle_scp_bl2(&scp_bl2_image_info);
|
2015-05-19 11:54:12 +01:00
|
|
|
if (e) {
|
2015-12-10 15:49:17 +00:00
|
|
|
ERROR("Failure in platform-specific handling of SCP_BL2 image.\n");
|
2015-05-19 11:54:12 +01:00
|
|
|
}
|
2014-06-24 14:19:36 +01:00
|
|
|
}
|
2015-12-10 15:49:17 +00:00
|
|
|
#endif /* SCP_BL2_BASE */
|
2014-06-24 14:19:36 +01:00
|
|
|
|
|
|
|
return e;
|
|
|
|
}
|
2014-05-15 18:27:15 +01:00
|
|
|
|
2015-11-26 16:31:34 +00:00
|
|
|
#ifndef EL3_PAYLOAD_BASE
|
2013-10-25 09:08:21 +01:00
|
|
|
/*******************************************************************************
|
2014-06-24 14:19:36 +01:00
|
|
|
* Load the BL3-1 image.
|
|
|
|
* The bl2_to_bl31_params and bl31_ep_info params will be updated with the
|
|
|
|
* relevant BL3-1 information.
|
|
|
|
* Return 0 on success, a negative error code otherwise.
|
2013-10-25 09:08:21 +01:00
|
|
|
******************************************************************************/
|
2014-06-24 14:19:36 +01:00
|
|
|
static int load_bl31(bl31_params_t *bl2_to_bl31_params,
|
|
|
|
entry_point_info_t *bl31_ep_info)
|
2013-10-25 09:08:21 +01:00
|
|
|
{
|
2014-04-10 15:37:22 +01:00
|
|
|
meminfo_t *bl2_tzram_layout;
|
2014-04-15 18:08:08 +01:00
|
|
|
int e;
|
2013-10-25 09:08:21 +01:00
|
|
|
|
2014-07-29 17:14:00 +01:00
|
|
|
INFO("BL2: Loading BL3-1\n");
|
2014-06-24 14:19:36 +01:00
|
|
|
assert(bl2_to_bl31_params != NULL);
|
|
|
|
assert(bl31_ep_info != NULL);
|
2013-10-25 09:08:21 +01:00
|
|
|
|
|
|
|
/* Find out how much free trusted ram remains after BL2 load */
|
2013-11-28 14:55:58 +00:00
|
|
|
bl2_tzram_layout = bl2_plat_sec_mem_layout();
|
2013-10-25 09:08:21 +01:00
|
|
|
|
2014-06-24 14:19:36 +01:00
|
|
|
/* Set the X0 parameter to BL3-1 */
|
2014-05-28 22:22:55 +01:00
|
|
|
bl31_ep_info->args.arg0 = (unsigned long)bl2_to_bl31_params;
|
|
|
|
|
2014-06-24 14:02:34 +01:00
|
|
|
/* Load the BL3-1 image */
|
2015-05-19 11:54:12 +01:00
|
|
|
e = load_auth_image(bl2_tzram_layout,
|
|
|
|
BL31_IMAGE_ID,
|
|
|
|
BL31_BASE,
|
|
|
|
bl2_to_bl31_params->bl31_image_info,
|
|
|
|
bl31_ep_info);
|
2013-10-25 09:08:21 +01:00
|
|
|
|
2015-05-19 11:54:12 +01:00
|
|
|
if (e == 0) {
|
|
|
|
bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info,
|
|
|
|
bl31_ep_info);
|
2015-03-26 11:07:09 +00:00
|
|
|
}
|
|
|
|
|
2014-06-24 14:19:36 +01:00
|
|
|
return e;
|
|
|
|
}
|
2014-04-15 18:08:08 +01:00
|
|
|
|
2014-06-24 14:19:36 +01:00
|
|
|
/*******************************************************************************
|
|
|
|
* Load the BL3-2 image if there's one.
|
|
|
|
* The bl2_to_bl31_params param will be updated with the relevant BL3-2
|
|
|
|
* information.
|
|
|
|
* If a platform does not want to attempt to load BL3-2 image it must leave
|
|
|
|
* BL32_BASE undefined.
|
|
|
|
* Return 0 on success or if there's no BL3-2 image to load, a negative error
|
|
|
|
* code otherwise.
|
|
|
|
******************************************************************************/
|
|
|
|
static int load_bl32(bl31_params_t *bl2_to_bl31_params)
|
|
|
|
{
|
|
|
|
int e = 0;
|
|
|
|
#ifdef BL32_BASE
|
|
|
|
meminfo_t bl32_mem_info;
|
2014-02-19 17:18:23 +00:00
|
|
|
|
2014-07-29 17:14:00 +01:00
|
|
|
INFO("BL2: Loading BL3-2\n");
|
2014-06-24 14:19:36 +01:00
|
|
|
assert(bl2_to_bl31_params != NULL);
|
2014-04-15 11:38:38 +01:00
|
|
|
|
2014-05-15 18:27:15 +01:00
|
|
|
/*
|
2014-06-24 14:19:36 +01:00
|
|
|
* It is up to the platform to specify where BL3-2 should be loaded if
|
|
|
|
* it exists. It could create space in the secure sram or point to a
|
2014-04-15 11:38:38 +01:00
|
|
|
* completely different memory.
|
2014-05-15 18:27:15 +01:00
|
|
|
*/
|
2014-05-16 18:48:12 +01:00
|
|
|
bl2_plat_get_bl32_meminfo(&bl32_mem_info);
|
2015-05-19 11:54:12 +01:00
|
|
|
e = load_auth_image(&bl32_mem_info,
|
|
|
|
BL32_IMAGE_ID,
|
|
|
|
BL32_BASE,
|
|
|
|
bl2_to_bl31_params->bl32_image_info,
|
|
|
|
bl2_to_bl31_params->bl32_ep_info);
|
2015-03-26 11:07:09 +00:00
|
|
|
|
2015-05-19 11:54:12 +01:00
|
|
|
if (e == 0) {
|
|
|
|
bl2_plat_set_bl32_ep_info(
|
|
|
|
bl2_to_bl31_params->bl32_image_info,
|
|
|
|
bl2_to_bl31_params->bl32_ep_info);
|
2015-03-26 11:07:09 +00:00
|
|
|
}
|
2014-04-15 11:38:38 +01:00
|
|
|
#endif /* BL32_BASE */
|
2014-02-19 17:52:35 +00:00
|
|
|
|
2014-06-24 14:19:36 +01:00
|
|
|
return e;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*******************************************************************************
|
|
|
|
* Load the BL3-3 image.
|
|
|
|
* The bl2_to_bl31_params param will be updated with the relevant BL3-3
|
|
|
|
* information.
|
|
|
|
* Return 0 on success, a negative error code otherwise.
|
|
|
|
******************************************************************************/
|
|
|
|
static int load_bl33(bl31_params_t *bl2_to_bl31_params)
|
|
|
|
{
|
|
|
|
meminfo_t bl33_mem_info;
|
|
|
|
int e;
|
|
|
|
|
2014-07-29 17:14:00 +01:00
|
|
|
INFO("BL2: Loading BL3-3\n");
|
2014-06-24 14:19:36 +01:00
|
|
|
assert(bl2_to_bl31_params != NULL);
|
|
|
|
|
|
|
|
bl2_plat_get_bl33_meminfo(&bl33_mem_info);
|
|
|
|
|
|
|
|
/* Load the BL3-3 image in non-secure memory provided by the platform */
|
2015-05-19 11:54:12 +01:00
|
|
|
e = load_auth_image(&bl33_mem_info,
|
|
|
|
BL33_IMAGE_ID,
|
|
|
|
plat_get_ns_image_entrypoint(),
|
|
|
|
bl2_to_bl31_params->bl33_image_info,
|
|
|
|
bl2_to_bl31_params->bl33_ep_info);
|
2014-06-24 14:19:36 +01:00
|
|
|
|
2015-05-19 11:54:12 +01:00
|
|
|
if (e == 0) {
|
|
|
|
bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info,
|
|
|
|
bl2_to_bl31_params->bl33_ep_info);
|
2015-03-26 11:07:09 +00:00
|
|
|
}
|
2014-06-24 14:19:36 +01:00
|
|
|
|
|
|
|
return e;
|
|
|
|
}
|
2015-11-26 16:31:34 +00:00
|
|
|
#endif /* EL3_PAYLOAD_BASE */
|
2014-06-24 14:19:36 +01:00
|
|
|
|
|
|
|
/*******************************************************************************
|
|
|
|
* The only thing to do in BL2 is to load further images and pass control to
|
|
|
|
* BL3-1. The memory occupied by BL2 will be reclaimed by BL3-x stages. BL2 runs
|
|
|
|
* entirely in S-EL1.
|
|
|
|
******************************************************************************/
|
|
|
|
void bl2_main(void)
|
|
|
|
{
|
|
|
|
bl31_params_t *bl2_to_bl31_params;
|
|
|
|
entry_point_info_t *bl31_ep_info;
|
|
|
|
int e;
|
|
|
|
|
2014-07-29 17:14:00 +01:00
|
|
|
NOTICE("BL2: %s\n", version_string);
|
|
|
|
NOTICE("BL2: %s\n", build_message);
|
|
|
|
|
2014-06-24 14:19:36 +01:00
|
|
|
/* Perform remaining generic architectural setup in S-EL1 */
|
|
|
|
bl2_arch_setup();
|
|
|
|
|
2015-01-28 16:46:57 +00:00
|
|
|
#if TRUSTED_BOARD_BOOT
|
|
|
|
/* Initialize authentication module */
|
2015-05-19 11:54:12 +01:00
|
|
|
auth_mod_init();
|
2015-01-28 16:46:57 +00:00
|
|
|
#endif /* TRUSTED_BOARD_BOOT */
|
|
|
|
|
2014-06-24 14:19:36 +01:00
|
|
|
/*
|
|
|
|
* Load the subsequent bootloader images
|
|
|
|
*/
|
2015-12-10 15:49:17 +00:00
|
|
|
e = load_scp_bl2();
|
2014-06-24 14:19:36 +01:00
|
|
|
if (e) {
|
2015-12-10 15:49:17 +00:00
|
|
|
ERROR("Failed to load SCP_BL2 (%i)\n", e);
|
2015-09-25 15:41:14 +01:00
|
|
|
plat_error_handler(e);
|
2014-06-24 14:19:36 +01:00
|
|
|
}
|
|
|
|
|
2015-12-10 15:49:17 +00:00
|
|
|
/* Perform platform setup in BL2 after loading SCP_BL2 */
|
2014-09-04 14:43:09 +01:00
|
|
|
bl2_platform_setup();
|
|
|
|
|
2014-06-24 14:19:36 +01:00
|
|
|
/*
|
|
|
|
* Get a pointer to the memory the platform has set aside to pass
|
|
|
|
* information to BL3-1.
|
|
|
|
*/
|
|
|
|
bl2_to_bl31_params = bl2_plat_get_bl31_params();
|
|
|
|
bl31_ep_info = bl2_plat_get_bl31_ep_info();
|
|
|
|
|
2015-11-26 16:31:34 +00:00
|
|
|
#ifdef EL3_PAYLOAD_BASE
|
|
|
|
/*
|
|
|
|
* In the case of an EL3 payload, we don't need to load any further
|
|
|
|
* images. Just update the BL31 entrypoint info structure to make BL1
|
|
|
|
* jump to the EL3 payload.
|
|
|
|
* The pointer to the memory the platform has set aside to pass
|
|
|
|
* information to BL3-1 in the normal boot flow is reused here, even
|
|
|
|
* though only a fraction of the information contained in the
|
|
|
|
* bl31_params_t structure makes sense in the context of EL3 payloads.
|
|
|
|
* This will be refined in the future.
|
|
|
|
*/
|
|
|
|
VERBOSE("BL2: Populating the entrypoint info for the EL3 payload\n");
|
|
|
|
bl31_ep_info->pc = EL3_PAYLOAD_BASE;
|
|
|
|
bl31_ep_info->args.arg0 = (unsigned long) bl2_to_bl31_params;
|
|
|
|
bl2_plat_set_bl31_ep_info(NULL, bl31_ep_info);
|
|
|
|
#else
|
2014-06-24 14:19:36 +01:00
|
|
|
e = load_bl31(bl2_to_bl31_params, bl31_ep_info);
|
|
|
|
if (e) {
|
|
|
|
ERROR("Failed to load BL3-1 (%i)\n", e);
|
2015-09-25 15:41:14 +01:00
|
|
|
plat_error_handler(e);
|
2014-06-24 14:19:36 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
e = load_bl32(bl2_to_bl31_params);
|
2015-08-17 10:43:27 +01:00
|
|
|
if (e) {
|
2015-10-01 18:37:40 +01:00
|
|
|
if (e == -EAUTH) {
|
2015-08-17 10:43:27 +01:00
|
|
|
ERROR("Failed to authenticate BL3-2\n");
|
2015-09-25 15:41:14 +01:00
|
|
|
plat_error_handler(e);
|
2015-08-17 10:43:27 +01:00
|
|
|
} else {
|
|
|
|
WARN("Failed to load BL3-2 (%i)\n", e);
|
|
|
|
}
|
|
|
|
}
|
2014-06-24 14:19:36 +01:00
|
|
|
|
|
|
|
e = load_bl33(bl2_to_bl31_params);
|
|
|
|
if (e) {
|
|
|
|
ERROR("Failed to load BL3-3 (%i)\n", e);
|
2015-09-25 15:41:14 +01:00
|
|
|
plat_error_handler(e);
|
2014-06-24 14:19:36 +01:00
|
|
|
}
|
2015-11-26 16:31:34 +00:00
|
|
|
#endif /* EL3_PAYLOAD_BASE */
|
2014-06-24 14:19:36 +01:00
|
|
|
|
2014-05-28 22:22:55 +01:00
|
|
|
/* Flush the params to be passed to memory */
|
|
|
|
bl2_plat_flush_bl31_params();
|
|
|
|
|
2013-10-25 09:08:21 +01:00
|
|
|
/*
|
2014-06-24 14:19:36 +01:00
|
|
|
* Run BL3-1 via an SMC to BL1. Information on how to pass control to
|
|
|
|
* the BL3-2 (if present) and BL3-3 software images will be passed to
|
|
|
|
* BL3-1 as an argument.
|
2013-10-25 09:08:21 +01:00
|
|
|
*/
|
2015-10-10 19:06:53 +01:00
|
|
|
smc(BL1_SMC_RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0);
|
2013-10-25 09:08:21 +01:00
|
|
|
}
|