blob: 55ae3c0e0566bb6c4bbd14adf7e56b68ff70eb9c [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Dan Handleye83b0ca2014-01-14 18:17:09 +00002 * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
Dan Handley97043ac2014-04-09 13:14:54 +010031#include <arch.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010032#include <arch_helpers.h>
Dan Handley97043ac2014-04-09 13:14:54 +010033#include <assert.h>
Achin Gupta4f6ad662013-10-25 09:08:21 +010034#include <bl_common.h>
35#include <bl2.h>
Dan Handley35e98e52014-04-09 13:13:04 +010036#include <debug.h>
Dan Handley97043ac2014-04-09 13:14:54 +010037#include <platform.h>
Dan Handley5f0cdb02014-05-14 17:44:19 +010038#include <platform_def.h>
Dan Handley97043ac2014-04-09 13:14:54 +010039#include <stdio.h>
Dan Handley5b827a82014-04-17 18:53:42 +010040#include "bl2_private.h"
Achin Gupta4f6ad662013-10-25 09:08:21 +010041
42/*******************************************************************************
Vikram Kanigiri29fb9052014-05-15 18:27:15 +010043 * Runs BL31 from the given entry point. It jumps to a higher exception level
44 * through an SMC.
45 ******************************************************************************/
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +010046static void __dead2 bl2_run_bl31(entry_point_info_t *bl31_ep_info,
Vikram Kanigiri29fb9052014-05-15 18:27:15 +010047 unsigned long arg1,
48 unsigned long arg2)
49{
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +010050 /* Set the args pointer */
51 bl31_ep_info->args.arg0 = arg1;
52 bl31_ep_info->args.arg1 = arg2;
Vikram Kanigiri29fb9052014-05-15 18:27:15 +010053
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +010054 /* Flush the params to be passed to memory */
55 bl2_plat_flush_bl31_params();
Vikram Kanigiri29fb9052014-05-15 18:27:15 +010056
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +010057 smc(RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0);
Vikram Kanigiri29fb9052014-05-15 18:27:15 +010058}
59
60
61/*******************************************************************************
Achin Gupta4f6ad662013-10-25 09:08:21 +010062 * The only thing to do in BL2 is to load further images and pass control to
63 * BL31. The memory occupied by BL2 will be reclaimed by BL3_x stages. BL2 runs
64 * entirely in S-EL1. Since arm standard c libraries are not PIC, printf et al
65 * are not available. We rely on assertions to signal error conditions
66 ******************************************************************************/
67void bl2_main(void)
68{
Dan Handleyfb037bf2014-04-10 15:37:22 +010069 meminfo_t *bl2_tzram_layout;
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +010070 bl31_params_t *bl2_to_bl31_params;
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +010071 unsigned int bl2_load, bl31_load;
72 entry_point_info_t *bl31_ep_info;
Vikram Kanigiri6871c5d2014-05-16 18:48:12 +010073 meminfo_t bl32_mem_info;
74 meminfo_t bl33_mem_info;
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +010075 int e;
Achin Gupta4f6ad662013-10-25 09:08:21 +010076
77 /* Perform remaining generic architectural setup in S-El1 */
78 bl2_arch_setup();
79
80 /* Perform platform setup in BL1 */
81 bl2_platform_setup();
82
Jon Medhurstfb052462014-02-17 12:18:24 +000083 printf("BL2 %s\n\r", build_message);
Achin Gupta4f6ad662013-10-25 09:08:21 +010084
85 /* Find out how much free trusted ram remains after BL2 load */
Sandrine Bailleuxee12f6f2013-11-28 14:55:58 +000086 bl2_tzram_layout = bl2_plat_sec_mem_layout();
Achin Gupta4f6ad662013-10-25 09:08:21 +010087
88 /*
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +010089 * Get a pointer to the memory the platform has set aside to pass
90 * information to BL31.
91 */
92 bl2_to_bl31_params = bl2_plat_get_bl31_params();
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +010093 bl31_ep_info = bl2_plat_get_bl31_ep_info();
94
95 /*
Achin Gupta4f6ad662013-10-25 09:08:21 +010096 * Load BL31. BL1 tells BL2 whether it has been TOP or BOTTOM loaded.
97 * To avoid fragmentation of trusted SRAM memory, BL31 is always
98 * loaded opposite to BL2. This allows BL31 to reclaim BL2 memory
99 * while maintaining its free space in one contiguous chunk.
100 */
Sandrine Bailleuxee12f6f2013-11-28 14:55:58 +0000101 bl2_load = bl2_tzram_layout->attr & LOAD_MASK;
Achin Gupta4f6ad662013-10-25 09:08:21 +0100102 assert((bl2_load == TOP_LOAD) || (bl2_load == BOT_LOAD));
103 bl31_load = (bl2_load == TOP_LOAD) ? BOT_LOAD : TOP_LOAD;
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +0100104 e = load_image(bl2_tzram_layout,
105 BL31_IMAGE_NAME,
106 bl31_load,
107 BL31_BASE,
108 bl2_to_bl31_params->bl31_image_info,
109 bl31_ep_info);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100110
111 /* Assert if it has not been possible to load BL31 */
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +0100112 if (e) {
Achin Guptae4d084e2014-02-19 17:18:23 +0000113 ERROR("Failed to load BL3-1.\n");
114 panic();
115 }
116
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +0100117 bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info,
118 bl31_ep_info);
Achin Guptaa3050ed2014-02-19 17:52:35 +0000119
Vikram Kanigiri6871c5d2014-05-16 18:48:12 +0100120 bl2_plat_get_bl33_meminfo(&bl33_mem_info);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100121
Achin Guptae4d084e2014-02-19 17:18:23 +0000122 /* Load the BL33 image in non-secure memory provided by the platform */
Vikram Kanigiri6871c5d2014-05-16 18:48:12 +0100123 e = load_image(&bl33_mem_info,
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +0100124 BL33_IMAGE_NAME,
125 BOT_LOAD,
126 plat_get_ns_image_entrypoint(),
127 bl2_to_bl31_params->bl33_image_info,
128 bl2_to_bl31_params->bl33_ep_info);
129
Harry Liebel561cd332014-02-14 14:42:48 +0000130 /* Halt if failed to load normal world firmware. */
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +0100131 if (e) {
Harry Liebel561cd332014-02-14 14:42:48 +0000132 ERROR("Failed to load BL3-3.\n");
133 panic();
134 }
Vikram Kanigiri4112bfa2014-04-15 18:08:08 +0100135 bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info,
136 bl2_to_bl31_params->bl33_ep_info);
Achin Guptae4d084e2014-02-19 17:18:23 +0000137
Dan Handley1151c822014-04-15 11:38:38 +0100138
139#ifdef BL32_BASE
Vikram Kanigiri29fb9052014-05-15 18:27:15 +0100140 /*
141 * Load the BL32 image if there's one. It is upto to platform
142 * to specify where BL32 should be loaded if it exists. It
143 * could create space in the secure sram or point to a
Dan Handley1151c822014-04-15 11:38:38 +0100144 * completely different memory.
145 *
146 * If a platform does not want to attempt to load BL3-2 image
147 * it must leave BL32_BASE undefined
Vikram Kanigiri29fb9052014-05-15 18:27:15 +0100148 */
Vikram Kanigiri6871c5d2014-05-16 18:48:12 +0100149 bl2_plat_get_bl32_meminfo(&bl32_mem_info);
Dan Handley1151c822014-04-15 11:38:38 +0100150 e = load_image(&bl32_mem_info,
151 BL32_IMAGE_NAME,
152 bl32_mem_info.attr & LOAD_MASK,
153 BL32_BASE,
154 bl2_to_bl31_params->bl32_image_info,
155 bl2_to_bl31_params->bl32_ep_info);
Vikram Kanigiri29fb9052014-05-15 18:27:15 +0100156
Dan Handley1151c822014-04-15 11:38:38 +0100157 /* Issue a diagnostic if no Secure Payload could be loaded */
158 if (e) {
159 WARN("Failed to load BL3-2.\n");
160 } else {
161 bl2_plat_set_bl32_ep_info(
162 bl2_to_bl31_params->bl32_image_info,
163 bl2_to_bl31_params->bl32_ep_info);
Achin Guptaa3050ed2014-02-19 17:52:35 +0000164 }
Dan Handley1151c822014-04-15 11:38:38 +0100165#endif /* BL32_BASE */
Achin Guptaa3050ed2014-02-19 17:52:35 +0000166
Achin Gupta4f6ad662013-10-25 09:08:21 +0100167 /*
168 * Run BL31 via an SMC to BL1. Information on how to pass control to
Achin Guptae4d084e2014-02-19 17:18:23 +0000169 * the BL32 (if present) and BL33 software images will be passed to
170 * BL31 as an argument.
Achin Gupta4f6ad662013-10-25 09:08:21 +0100171 */
Vikram Kanigiri6871c5d2014-05-16 18:48:12 +0100172 bl2_run_bl31(bl31_ep_info, (unsigned long)bl2_to_bl31_params, 0);
Achin Gupta4f6ad662013-10-25 09:08:21 +0100173}