xref: /rk3399_ARM-atf/bl2/bl2_main.c (revision 1a2ee045b6ae36f2087caf97bbe7136317c0607c)
1 /*
2  * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
3  *
4  * Redistribution and use in source and binary forms, with or without
5  * modification, are permitted provided that the following conditions are met:
6  *
7  * Redistributions of source code must retain the above copyright notice, this
8  * list of conditions and the following disclaimer.
9  *
10  * Redistributions in binary form must reproduce the above copyright notice,
11  * this list of conditions and the following disclaimer in the documentation
12  * and/or other materials provided with the distribution.
13  *
14  * Neither the name of ARM nor the names of its contributors may be used
15  * to endorse or promote products derived from this software without specific
16  * prior written permission.
17  *
18  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28  * POSSIBILITY OF SUCH DAMAGE.
29  */
30 
31 #include <arch.h>
32 #include <arch_helpers.h>
33 #include <assert.h>
34 #include <auth_mod.h>
35 #include <bl_common.h>
36 #include <debug.h>
37 #include <errno.h>
38 #include <platform.h>
39 #include <platform_def.h>
40 #include <stdint.h>
41 #include "bl2_private.h"
42 
43 /*******************************************************************************
44  * Load the BL3-0 image if there's one.
45  * If a platform does not want to attempt to load BL3-0 image it must leave
46  * BL30_BASE undefined.
47  * Return 0 on success or if there's no BL3-0 image to load, a negative error
48  * code otherwise.
49  ******************************************************************************/
50 static int load_bl30(void)
51 {
52 	int e = 0;
53 #ifdef BL30_BASE
54 	meminfo_t bl30_mem_info;
55 	image_info_t bl30_image_info;
56 
57 	/*
58 	 * It is up to the platform to specify where BL3-0 should be loaded if
59 	 * it exists. It could create space in the secure sram or point to a
60 	 * completely different memory.
61 	 *
62 	 * The entry point information is not relevant in this case as the AP
63 	 * won't execute the BL3-0 image.
64 	 */
65 	INFO("BL2: Loading BL3-0\n");
66 	bl2_plat_get_bl30_meminfo(&bl30_mem_info);
67 	bl30_image_info.h.version = VERSION_1;
68 	e = load_auth_image(&bl30_mem_info,
69 			    BL30_IMAGE_ID,
70 			    BL30_BASE,
71 			    &bl30_image_info,
72 			    NULL);
73 
74 	if (e == 0) {
75 		/* The subsequent handling of BL3-0 is platform specific */
76 		e = bl2_plat_handle_bl30(&bl30_image_info);
77 		if (e) {
78 			ERROR("Failure in platform-specific handling of BL3-0 image.\n");
79 		}
80 	}
81 #endif /* BL30_BASE */
82 
83 	return e;
84 }
85 
86 /*******************************************************************************
87  * Load the BL3-1 image.
88  * The bl2_to_bl31_params and bl31_ep_info params will be updated with the
89  * relevant BL3-1 information.
90  * Return 0 on success, a negative error code otherwise.
91  ******************************************************************************/
92 static int load_bl31(bl31_params_t *bl2_to_bl31_params,
93 		     entry_point_info_t *bl31_ep_info)
94 {
95 	meminfo_t *bl2_tzram_layout;
96 	int e;
97 
98 	INFO("BL2: Loading BL3-1\n");
99 	assert(bl2_to_bl31_params != NULL);
100 	assert(bl31_ep_info != NULL);
101 
102 	/* Find out how much free trusted ram remains after BL2 load */
103 	bl2_tzram_layout = bl2_plat_sec_mem_layout();
104 
105 	/* Set the X0 parameter to BL3-1 */
106 	bl31_ep_info->args.arg0 = (unsigned long)bl2_to_bl31_params;
107 
108 	/* Load the BL3-1 image */
109 	e = load_auth_image(bl2_tzram_layout,
110 			    BL31_IMAGE_ID,
111 			    BL31_BASE,
112 			    bl2_to_bl31_params->bl31_image_info,
113 			    bl31_ep_info);
114 
115 	if (e == 0) {
116 		bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info,
117 					  bl31_ep_info);
118 	}
119 
120 	return e;
121 }
122 
123 /*******************************************************************************
124  * Load the BL3-2 image if there's one.
125  * The bl2_to_bl31_params param will be updated with the relevant BL3-2
126  * information.
127  * If a platform does not want to attempt to load BL3-2 image it must leave
128  * BL32_BASE undefined.
129  * Return 0 on success or if there's no BL3-2 image to load, a negative error
130  * code otherwise.
131  ******************************************************************************/
132 static int load_bl32(bl31_params_t *bl2_to_bl31_params)
133 {
134 	int e = 0;
135 #ifdef BL32_BASE
136 	meminfo_t bl32_mem_info;
137 
138 	INFO("BL2: Loading BL3-2\n");
139 	assert(bl2_to_bl31_params != NULL);
140 
141 	/*
142 	 * It is up to the platform to specify where BL3-2 should be loaded if
143 	 * it exists. It could create space in the secure sram or point to a
144 	 * completely different memory.
145 	 */
146 	bl2_plat_get_bl32_meminfo(&bl32_mem_info);
147 	e = load_auth_image(&bl32_mem_info,
148 			    BL32_IMAGE_ID,
149 			    BL32_BASE,
150 			    bl2_to_bl31_params->bl32_image_info,
151 			    bl2_to_bl31_params->bl32_ep_info);
152 
153 	if (e == 0) {
154 		bl2_plat_set_bl32_ep_info(
155 			bl2_to_bl31_params->bl32_image_info,
156 			bl2_to_bl31_params->bl32_ep_info);
157 	}
158 #endif /* BL32_BASE */
159 
160 	return e;
161 }
162 
163 /*******************************************************************************
164  * Load the BL3-3 image.
165  * The bl2_to_bl31_params param will be updated with the relevant BL3-3
166  * information.
167  * Return 0 on success, a negative error code otherwise.
168  ******************************************************************************/
169 static int load_bl33(bl31_params_t *bl2_to_bl31_params)
170 {
171 	meminfo_t bl33_mem_info;
172 	int e;
173 
174 	INFO("BL2: Loading BL3-3\n");
175 	assert(bl2_to_bl31_params != NULL);
176 
177 	bl2_plat_get_bl33_meminfo(&bl33_mem_info);
178 
179 	/* Load the BL3-3 image in non-secure memory provided by the platform */
180 	e = load_auth_image(&bl33_mem_info,
181 			    BL33_IMAGE_ID,
182 			    plat_get_ns_image_entrypoint(),
183 			    bl2_to_bl31_params->bl33_image_info,
184 			    bl2_to_bl31_params->bl33_ep_info);
185 
186 	if (e == 0) {
187 		bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info,
188 					  bl2_to_bl31_params->bl33_ep_info);
189 	}
190 
191 	return e;
192 }
193 
194 /*******************************************************************************
195  * The only thing to do in BL2 is to load further images and pass control to
196  * BL3-1. The memory occupied by BL2 will be reclaimed by BL3-x stages. BL2 runs
197  * entirely in S-EL1.
198  ******************************************************************************/
199 void bl2_main(void)
200 {
201 	bl31_params_t *bl2_to_bl31_params;
202 	entry_point_info_t *bl31_ep_info;
203 	int e;
204 
205 	NOTICE("BL2: %s\n", version_string);
206 	NOTICE("BL2: %s\n", build_message);
207 
208 	/* Perform remaining generic architectural setup in S-EL1 */
209 	bl2_arch_setup();
210 
211 #if TRUSTED_BOARD_BOOT
212 	/* Initialize authentication module */
213 	auth_mod_init();
214 #endif /* TRUSTED_BOARD_BOOT */
215 
216 	/*
217 	 * Load the subsequent bootloader images
218 	 */
219 	e = load_bl30();
220 	if (e) {
221 		ERROR("Failed to load BL3-0 (%i)\n", e);
222 		panic();
223 	}
224 
225 	/* Perform platform setup in BL2 after loading BL3-0 */
226 	bl2_platform_setup();
227 
228 	/*
229 	 * Get a pointer to the memory the platform has set aside to pass
230 	 * information to BL3-1.
231 	 */
232 	bl2_to_bl31_params = bl2_plat_get_bl31_params();
233 	bl31_ep_info = bl2_plat_get_bl31_ep_info();
234 
235 	e = load_bl31(bl2_to_bl31_params, bl31_ep_info);
236 	if (e) {
237 		ERROR("Failed to load BL3-1 (%i)\n", e);
238 		panic();
239 	}
240 
241 	e = load_bl32(bl2_to_bl31_params);
242 	if (e) {
243 		if (e == -EAUTH) {
244 			ERROR("Failed to authenticate BL3-2\n");
245 			panic();
246 		} else {
247 			WARN("Failed to load BL3-2 (%i)\n", e);
248 		}
249 	}
250 
251 	e = load_bl33(bl2_to_bl31_params);
252 	if (e) {
253 		ERROR("Failed to load BL3-3 (%i)\n", e);
254 		panic();
255 	}
256 
257 	/* Flush the params to be passed to memory */
258 	bl2_plat_flush_bl31_params();
259 
260 	/*
261 	 * Run BL3-1 via an SMC to BL1. Information on how to pass control to
262 	 * the BL3-2 (if present) and BL3-3 software images will be passed to
263 	 * BL3-1 as an argument.
264 	 */
265 	smc(RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0);
266 }
267