14f6ad66aSAchin Gupta /* 2e83b0cadSDan Handley * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved. 34f6ad66aSAchin Gupta * 44f6ad66aSAchin Gupta * Redistribution and use in source and binary forms, with or without 54f6ad66aSAchin Gupta * modification, are permitted provided that the following conditions are met: 64f6ad66aSAchin Gupta * 74f6ad66aSAchin Gupta * Redistributions of source code must retain the above copyright notice, this 84f6ad66aSAchin Gupta * list of conditions and the following disclaimer. 94f6ad66aSAchin Gupta * 104f6ad66aSAchin Gupta * Redistributions in binary form must reproduce the above copyright notice, 114f6ad66aSAchin Gupta * this list of conditions and the following disclaimer in the documentation 124f6ad66aSAchin Gupta * and/or other materials provided with the distribution. 134f6ad66aSAchin Gupta * 144f6ad66aSAchin Gupta * Neither the name of ARM nor the names of its contributors may be used 154f6ad66aSAchin Gupta * to endorse or promote products derived from this software without specific 164f6ad66aSAchin Gupta * prior written permission. 174f6ad66aSAchin Gupta * 184f6ad66aSAchin Gupta * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 194f6ad66aSAchin Gupta * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 204f6ad66aSAchin Gupta * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 214f6ad66aSAchin Gupta * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 224f6ad66aSAchin Gupta * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 234f6ad66aSAchin Gupta * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 244f6ad66aSAchin Gupta * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 254f6ad66aSAchin Gupta * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 264f6ad66aSAchin Gupta * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 274f6ad66aSAchin Gupta * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 284f6ad66aSAchin Gupta * POSSIBILITY OF SUCH DAMAGE. 294f6ad66aSAchin Gupta */ 304f6ad66aSAchin Gupta 3197043ac9SDan Handley #include <arch.h> 324f6ad66aSAchin Gupta #include <arch_helpers.h> 3397043ac9SDan Handley #include <assert.h> 344f6ad66aSAchin Gupta #include <bl_common.h> 354f6ad66aSAchin Gupta #include <bl2.h> 3635e98e55SDan Handley #include <debug.h> 3797043ac9SDan Handley #include <platform.h> 38*5f0cdb05SDan Handley #include <platform_def.h> 3997043ac9SDan Handley #include <stdio.h> 405b827a8fSDan Handley #include "bl2_private.h" 414f6ad66aSAchin Gupta 424f6ad66aSAchin Gupta /******************************************************************************* 4329fb905dSVikram Kanigiri * Runs BL31 from the given entry point. It jumps to a higher exception level 4429fb905dSVikram Kanigiri * through an SMC. 4529fb905dSVikram Kanigiri ******************************************************************************/ 464112bfa0SVikram Kanigiri static void __dead2 bl2_run_bl31(entry_point_info_t *bl31_ep_info, 4729fb905dSVikram Kanigiri unsigned long arg1, 4829fb905dSVikram Kanigiri unsigned long arg2) 4929fb905dSVikram Kanigiri { 504112bfa0SVikram Kanigiri /* Set the args pointer */ 514112bfa0SVikram Kanigiri bl31_ep_info->args.arg0 = arg1; 524112bfa0SVikram Kanigiri bl31_ep_info->args.arg1 = arg2; 5329fb905dSVikram Kanigiri 544112bfa0SVikram Kanigiri /* Flush the params to be passed to memory */ 554112bfa0SVikram Kanigiri bl2_plat_flush_bl31_params(); 5629fb905dSVikram Kanigiri 574112bfa0SVikram Kanigiri smc(RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0); 5829fb905dSVikram Kanigiri } 5929fb905dSVikram Kanigiri 6029fb905dSVikram Kanigiri 6129fb905dSVikram Kanigiri /******************************************************************************* 624f6ad66aSAchin Gupta * The only thing to do in BL2 is to load further images and pass control to 634f6ad66aSAchin Gupta * BL31. The memory occupied by BL2 will be reclaimed by BL3_x stages. BL2 runs 644f6ad66aSAchin Gupta * entirely in S-EL1. Since arm standard c libraries are not PIC, printf et al 654f6ad66aSAchin Gupta * are not available. We rely on assertions to signal error conditions 664f6ad66aSAchin Gupta ******************************************************************************/ 674f6ad66aSAchin Gupta void bl2_main(void) 684f6ad66aSAchin Gupta { 69fb037bfbSDan Handley meminfo_t *bl2_tzram_layout; 704112bfa0SVikram Kanigiri bl31_params_t *bl2_to_bl31_params; 714112bfa0SVikram Kanigiri unsigned int bl2_load, bl31_load; 724112bfa0SVikram Kanigiri entry_point_info_t *bl31_ep_info; 736871c5d3SVikram Kanigiri meminfo_t bl32_mem_info; 746871c5d3SVikram Kanigiri meminfo_t bl33_mem_info; 754112bfa0SVikram Kanigiri int e; 764f6ad66aSAchin Gupta 774f6ad66aSAchin Gupta /* Perform remaining generic architectural setup in S-El1 */ 784f6ad66aSAchin Gupta bl2_arch_setup(); 794f6ad66aSAchin Gupta 804f6ad66aSAchin Gupta /* Perform platform setup in BL1 */ 814f6ad66aSAchin Gupta bl2_platform_setup(); 824f6ad66aSAchin Gupta 83fb052462SJon Medhurst printf("BL2 %s\n\r", build_message); 844f6ad66aSAchin Gupta 854f6ad66aSAchin Gupta /* Find out how much free trusted ram remains after BL2 load */ 86ee12f6f7SSandrine Bailleux bl2_tzram_layout = bl2_plat_sec_mem_layout(); 874f6ad66aSAchin Gupta 884f6ad66aSAchin Gupta /* 894112bfa0SVikram Kanigiri * Get a pointer to the memory the platform has set aside to pass 904112bfa0SVikram Kanigiri * information to BL31. 914112bfa0SVikram Kanigiri */ 924112bfa0SVikram Kanigiri bl2_to_bl31_params = bl2_plat_get_bl31_params(); 934112bfa0SVikram Kanigiri bl31_ep_info = bl2_plat_get_bl31_ep_info(); 944112bfa0SVikram Kanigiri 954112bfa0SVikram Kanigiri /* 964f6ad66aSAchin Gupta * Load BL31. BL1 tells BL2 whether it has been TOP or BOTTOM loaded. 974f6ad66aSAchin Gupta * To avoid fragmentation of trusted SRAM memory, BL31 is always 984f6ad66aSAchin Gupta * loaded opposite to BL2. This allows BL31 to reclaim BL2 memory 994f6ad66aSAchin Gupta * while maintaining its free space in one contiguous chunk. 1004f6ad66aSAchin Gupta */ 101ee12f6f7SSandrine Bailleux bl2_load = bl2_tzram_layout->attr & LOAD_MASK; 1024f6ad66aSAchin Gupta assert((bl2_load == TOP_LOAD) || (bl2_load == BOT_LOAD)); 1034f6ad66aSAchin Gupta bl31_load = (bl2_load == TOP_LOAD) ? BOT_LOAD : TOP_LOAD; 1044112bfa0SVikram Kanigiri e = load_image(bl2_tzram_layout, 1054112bfa0SVikram Kanigiri BL31_IMAGE_NAME, 1064112bfa0SVikram Kanigiri bl31_load, 1074112bfa0SVikram Kanigiri BL31_BASE, 1084112bfa0SVikram Kanigiri bl2_to_bl31_params->bl31_image_info, 1094112bfa0SVikram Kanigiri bl31_ep_info); 1104f6ad66aSAchin Gupta 1114f6ad66aSAchin Gupta /* Assert if it has not been possible to load BL31 */ 1124112bfa0SVikram Kanigiri if (e) { 113e4d084eaSAchin Gupta ERROR("Failed to load BL3-1.\n"); 114e4d084eaSAchin Gupta panic(); 115e4d084eaSAchin Gupta } 116e4d084eaSAchin Gupta 1174112bfa0SVikram Kanigiri bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info, 1184112bfa0SVikram Kanigiri bl31_ep_info); 119a3050ed5SAchin Gupta 1206871c5d3SVikram Kanigiri bl2_plat_get_bl33_meminfo(&bl33_mem_info); 1214f6ad66aSAchin Gupta 122e4d084eaSAchin Gupta /* Load the BL33 image in non-secure memory provided by the platform */ 1236871c5d3SVikram Kanigiri e = load_image(&bl33_mem_info, 124e4d084eaSAchin Gupta BL33_IMAGE_NAME, 125e4d084eaSAchin Gupta BOT_LOAD, 1264112bfa0SVikram Kanigiri plat_get_ns_image_entrypoint(), 1274112bfa0SVikram Kanigiri bl2_to_bl31_params->bl33_image_info, 1284112bfa0SVikram Kanigiri bl2_to_bl31_params->bl33_ep_info); 1294112bfa0SVikram Kanigiri 130561cd33eSHarry Liebel /* Halt if failed to load normal world firmware. */ 1314112bfa0SVikram Kanigiri if (e) { 132561cd33eSHarry Liebel ERROR("Failed to load BL3-3.\n"); 133561cd33eSHarry Liebel panic(); 134561cd33eSHarry Liebel } 1354112bfa0SVikram Kanigiri bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info, 1364112bfa0SVikram Kanigiri bl2_to_bl31_params->bl33_ep_info); 137e4d084eaSAchin Gupta 1381151c821SDan Handley 1391151c821SDan Handley #ifdef BL32_BASE 14029fb905dSVikram Kanigiri /* 14129fb905dSVikram Kanigiri * Load the BL32 image if there's one. It is upto to platform 14229fb905dSVikram Kanigiri * to specify where BL32 should be loaded if it exists. It 14329fb905dSVikram Kanigiri * could create space in the secure sram or point to a 1441151c821SDan Handley * completely different memory. 1451151c821SDan Handley * 1461151c821SDan Handley * If a platform does not want to attempt to load BL3-2 image 1471151c821SDan Handley * it must leave BL32_BASE undefined 14829fb905dSVikram Kanigiri */ 1496871c5d3SVikram Kanigiri bl2_plat_get_bl32_meminfo(&bl32_mem_info); 1506871c5d3SVikram Kanigiri e = load_image(&bl32_mem_info, 15129fb905dSVikram Kanigiri BL32_IMAGE_NAME, 1521151c821SDan Handley bl32_mem_info.attr & LOAD_MASK, 1534112bfa0SVikram Kanigiri BL32_BASE, 1544112bfa0SVikram Kanigiri bl2_to_bl31_params->bl32_image_info, 1554112bfa0SVikram Kanigiri bl2_to_bl31_params->bl32_ep_info); 15629fb905dSVikram Kanigiri 1571151c821SDan Handley /* Issue a diagnostic if no Secure Payload could be loaded */ 1584112bfa0SVikram Kanigiri if (e) { 1594112bfa0SVikram Kanigiri WARN("Failed to load BL3-2.\n"); 1604112bfa0SVikram Kanigiri } else { 1614112bfa0SVikram Kanigiri bl2_plat_set_bl32_ep_info( 1624112bfa0SVikram Kanigiri bl2_to_bl31_params->bl32_image_info, 1634112bfa0SVikram Kanigiri bl2_to_bl31_params->bl32_ep_info); 164a3050ed5SAchin Gupta } 1651151c821SDan Handley #endif /* BL32_BASE */ 1664112bfa0SVikram Kanigiri 1674f6ad66aSAchin Gupta /* 1684f6ad66aSAchin Gupta * Run BL31 via an SMC to BL1. Information on how to pass control to 169e4d084eaSAchin Gupta * the BL32 (if present) and BL33 software images will be passed to 170e4d084eaSAchin Gupta * BL31 as an argument. 1714f6ad66aSAchin Gupta */ 1726871c5d3SVikram Kanigiri bl2_run_bl31(bl31_ep_info, (unsigned long)bl2_to_bl31_params, 0); 1734f6ad66aSAchin Gupta } 174