14f6ad66aSAchin Gupta /* 2e83b0cadSDan Handley * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved. 34f6ad66aSAchin Gupta * 44f6ad66aSAchin Gupta * Redistribution and use in source and binary forms, with or without 54f6ad66aSAchin Gupta * modification, are permitted provided that the following conditions are met: 64f6ad66aSAchin Gupta * 74f6ad66aSAchin Gupta * Redistributions of source code must retain the above copyright notice, this 84f6ad66aSAchin Gupta * list of conditions and the following disclaimer. 94f6ad66aSAchin Gupta * 104f6ad66aSAchin Gupta * Redistributions in binary form must reproduce the above copyright notice, 114f6ad66aSAchin Gupta * this list of conditions and the following disclaimer in the documentation 124f6ad66aSAchin Gupta * and/or other materials provided with the distribution. 134f6ad66aSAchin Gupta * 144f6ad66aSAchin Gupta * Neither the name of ARM nor the names of its contributors may be used 154f6ad66aSAchin Gupta * to endorse or promote products derived from this software without specific 164f6ad66aSAchin Gupta * prior written permission. 174f6ad66aSAchin Gupta * 184f6ad66aSAchin Gupta * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 194f6ad66aSAchin Gupta * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 204f6ad66aSAchin Gupta * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 214f6ad66aSAchin Gupta * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 224f6ad66aSAchin Gupta * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 234f6ad66aSAchin Gupta * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 244f6ad66aSAchin Gupta * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 254f6ad66aSAchin Gupta * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 264f6ad66aSAchin Gupta * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 274f6ad66aSAchin Gupta * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 284f6ad66aSAchin Gupta * POSSIBILITY OF SUCH DAMAGE. 294f6ad66aSAchin Gupta */ 304f6ad66aSAchin Gupta 3197043ac9SDan Handley #include <arch.h> 324f6ad66aSAchin Gupta #include <arch_helpers.h> 3397043ac9SDan Handley #include <assert.h> 344f6ad66aSAchin Gupta #include <bl_common.h> 354f6ad66aSAchin Gupta #include <bl2.h> 3635e98e55SDan Handley #include <debug.h> 3797043ac9SDan Handley #include <platform.h> 3897043ac9SDan Handley #include <stdio.h> 395b827a8fSDan Handley #include "bl2_private.h" 404f6ad66aSAchin Gupta 414f6ad66aSAchin Gupta /******************************************************************************* 4229fb905dSVikram Kanigiri * Runs BL31 from the given entry point. It jumps to a higher exception level 4329fb905dSVikram Kanigiri * through an SMC. 4429fb905dSVikram Kanigiri ******************************************************************************/ 454112bfa0SVikram Kanigiri static void __dead2 bl2_run_bl31(entry_point_info_t *bl31_ep_info, 4629fb905dSVikram Kanigiri unsigned long arg1, 4729fb905dSVikram Kanigiri unsigned long arg2) 4829fb905dSVikram Kanigiri { 494112bfa0SVikram Kanigiri /* Set the args pointer */ 504112bfa0SVikram Kanigiri bl31_ep_info->args.arg0 = arg1; 514112bfa0SVikram Kanigiri bl31_ep_info->args.arg1 = arg2; 5229fb905dSVikram Kanigiri 534112bfa0SVikram Kanigiri /* Flush the params to be passed to memory */ 544112bfa0SVikram Kanigiri bl2_plat_flush_bl31_params(); 5529fb905dSVikram Kanigiri 564112bfa0SVikram Kanigiri smc(RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0); 5729fb905dSVikram Kanigiri } 5829fb905dSVikram Kanigiri 5929fb905dSVikram Kanigiri 6029fb905dSVikram Kanigiri /******************************************************************************* 614f6ad66aSAchin Gupta * The only thing to do in BL2 is to load further images and pass control to 624f6ad66aSAchin Gupta * BL31. The memory occupied by BL2 will be reclaimed by BL3_x stages. BL2 runs 634f6ad66aSAchin Gupta * entirely in S-EL1. Since arm standard c libraries are not PIC, printf et al 644f6ad66aSAchin Gupta * are not available. We rely on assertions to signal error conditions 654f6ad66aSAchin Gupta ******************************************************************************/ 664f6ad66aSAchin Gupta void bl2_main(void) 674f6ad66aSAchin Gupta { 68fb037bfbSDan Handley meminfo_t *bl2_tzram_layout; 694112bfa0SVikram Kanigiri bl31_params_t *bl2_to_bl31_params; 704112bfa0SVikram Kanigiri unsigned int bl2_load, bl31_load; 714112bfa0SVikram Kanigiri entry_point_info_t *bl31_ep_info; 726871c5d3SVikram Kanigiri meminfo_t bl32_mem_info; 736871c5d3SVikram Kanigiri meminfo_t bl33_mem_info; 744112bfa0SVikram Kanigiri int e; 754f6ad66aSAchin Gupta 764f6ad66aSAchin Gupta /* Perform remaining generic architectural setup in S-El1 */ 774f6ad66aSAchin Gupta bl2_arch_setup(); 784f6ad66aSAchin Gupta 794f6ad66aSAchin Gupta /* Perform platform setup in BL1 */ 804f6ad66aSAchin Gupta bl2_platform_setup(); 814f6ad66aSAchin Gupta 82fb052462SJon Medhurst printf("BL2 %s\n\r", build_message); 834f6ad66aSAchin Gupta 844f6ad66aSAchin Gupta /* Find out how much free trusted ram remains after BL2 load */ 85ee12f6f7SSandrine Bailleux bl2_tzram_layout = bl2_plat_sec_mem_layout(); 864f6ad66aSAchin Gupta 874f6ad66aSAchin Gupta /* 884112bfa0SVikram Kanigiri * Get a pointer to the memory the platform has set aside to pass 894112bfa0SVikram Kanigiri * information to BL31. 904112bfa0SVikram Kanigiri */ 914112bfa0SVikram Kanigiri bl2_to_bl31_params = bl2_plat_get_bl31_params(); 924112bfa0SVikram Kanigiri bl31_ep_info = bl2_plat_get_bl31_ep_info(); 934112bfa0SVikram Kanigiri 944112bfa0SVikram Kanigiri /* 954f6ad66aSAchin Gupta * Load BL31. BL1 tells BL2 whether it has been TOP or BOTTOM loaded. 964f6ad66aSAchin Gupta * To avoid fragmentation of trusted SRAM memory, BL31 is always 974f6ad66aSAchin Gupta * loaded opposite to BL2. This allows BL31 to reclaim BL2 memory 984f6ad66aSAchin Gupta * while maintaining its free space in one contiguous chunk. 994f6ad66aSAchin Gupta */ 100ee12f6f7SSandrine Bailleux bl2_load = bl2_tzram_layout->attr & LOAD_MASK; 1014f6ad66aSAchin Gupta assert((bl2_load == TOP_LOAD) || (bl2_load == BOT_LOAD)); 1024f6ad66aSAchin Gupta bl31_load = (bl2_load == TOP_LOAD) ? BOT_LOAD : TOP_LOAD; 1034112bfa0SVikram Kanigiri e = load_image(bl2_tzram_layout, 1044112bfa0SVikram Kanigiri BL31_IMAGE_NAME, 1054112bfa0SVikram Kanigiri bl31_load, 1064112bfa0SVikram Kanigiri BL31_BASE, 1074112bfa0SVikram Kanigiri bl2_to_bl31_params->bl31_image_info, 1084112bfa0SVikram Kanigiri bl31_ep_info); 1094f6ad66aSAchin Gupta 1104f6ad66aSAchin Gupta /* Assert if it has not been possible to load BL31 */ 1114112bfa0SVikram Kanigiri if (e) { 112e4d084eaSAchin Gupta ERROR("Failed to load BL3-1.\n"); 113e4d084eaSAchin Gupta panic(); 114e4d084eaSAchin Gupta } 115e4d084eaSAchin Gupta 1164112bfa0SVikram Kanigiri bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info, 1174112bfa0SVikram Kanigiri bl31_ep_info); 118a3050ed5SAchin Gupta 1196871c5d3SVikram Kanigiri bl2_plat_get_bl33_meminfo(&bl33_mem_info); 1204f6ad66aSAchin Gupta 121e4d084eaSAchin Gupta /* Load the BL33 image in non-secure memory provided by the platform */ 1226871c5d3SVikram Kanigiri e = load_image(&bl33_mem_info, 123e4d084eaSAchin Gupta BL33_IMAGE_NAME, 124e4d084eaSAchin Gupta BOT_LOAD, 1254112bfa0SVikram Kanigiri plat_get_ns_image_entrypoint(), 1264112bfa0SVikram Kanigiri bl2_to_bl31_params->bl33_image_info, 1274112bfa0SVikram Kanigiri bl2_to_bl31_params->bl33_ep_info); 1284112bfa0SVikram Kanigiri 129561cd33eSHarry Liebel /* Halt if failed to load normal world firmware. */ 1304112bfa0SVikram Kanigiri if (e) { 131561cd33eSHarry Liebel ERROR("Failed to load BL3-3.\n"); 132561cd33eSHarry Liebel panic(); 133561cd33eSHarry Liebel } 1344112bfa0SVikram Kanigiri bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info, 1354112bfa0SVikram Kanigiri bl2_to_bl31_params->bl33_ep_info); 136e4d084eaSAchin Gupta 137*1151c821SDan Handley 138*1151c821SDan Handley #ifdef BL32_BASE 13929fb905dSVikram Kanigiri /* 14029fb905dSVikram Kanigiri * Load the BL32 image if there's one. It is upto to platform 14129fb905dSVikram Kanigiri * to specify where BL32 should be loaded if it exists. It 14229fb905dSVikram Kanigiri * could create space in the secure sram or point to a 143*1151c821SDan Handley * completely different memory. 144*1151c821SDan Handley * 145*1151c821SDan Handley * If a platform does not want to attempt to load BL3-2 image 146*1151c821SDan Handley * it must leave BL32_BASE undefined 14729fb905dSVikram Kanigiri */ 1486871c5d3SVikram Kanigiri bl2_plat_get_bl32_meminfo(&bl32_mem_info); 1496871c5d3SVikram Kanigiri e = load_image(&bl32_mem_info, 15029fb905dSVikram Kanigiri BL32_IMAGE_NAME, 151*1151c821SDan Handley bl32_mem_info.attr & LOAD_MASK, 1524112bfa0SVikram Kanigiri BL32_BASE, 1534112bfa0SVikram Kanigiri bl2_to_bl31_params->bl32_image_info, 1544112bfa0SVikram Kanigiri bl2_to_bl31_params->bl32_ep_info); 15529fb905dSVikram Kanigiri 156*1151c821SDan Handley /* Issue a diagnostic if no Secure Payload could be loaded */ 1574112bfa0SVikram Kanigiri if (e) { 1584112bfa0SVikram Kanigiri WARN("Failed to load BL3-2.\n"); 1594112bfa0SVikram Kanigiri } else { 1604112bfa0SVikram Kanigiri bl2_plat_set_bl32_ep_info( 1614112bfa0SVikram Kanigiri bl2_to_bl31_params->bl32_image_info, 1624112bfa0SVikram Kanigiri bl2_to_bl31_params->bl32_ep_info); 163a3050ed5SAchin Gupta } 164*1151c821SDan Handley #endif /* BL32_BASE */ 1654112bfa0SVikram Kanigiri 1664f6ad66aSAchin Gupta /* 1674f6ad66aSAchin Gupta * Run BL31 via an SMC to BL1. Information on how to pass control to 168e4d084eaSAchin Gupta * the BL32 (if present) and BL33 software images will be passed to 169e4d084eaSAchin Gupta * BL31 as an argument. 1704f6ad66aSAchin Gupta */ 1716871c5d3SVikram Kanigiri bl2_run_bl31(bl31_ep_info, (unsigned long)bl2_to_bl31_params, 0); 1724f6ad66aSAchin Gupta } 173