14f6ad66aSAchin Gupta /* 21b70db06SDan Handley * Copyright (c) 2013-2015, ARM Limited and Contributors. All rights reserved. 34f6ad66aSAchin Gupta * 44f6ad66aSAchin Gupta * Redistribution and use in source and binary forms, with or without 54f6ad66aSAchin Gupta * modification, are permitted provided that the following conditions are met: 64f6ad66aSAchin Gupta * 74f6ad66aSAchin Gupta * Redistributions of source code must retain the above copyright notice, this 84f6ad66aSAchin Gupta * list of conditions and the following disclaimer. 94f6ad66aSAchin Gupta * 104f6ad66aSAchin Gupta * Redistributions in binary form must reproduce the above copyright notice, 114f6ad66aSAchin Gupta * this list of conditions and the following disclaimer in the documentation 124f6ad66aSAchin Gupta * and/or other materials provided with the distribution. 134f6ad66aSAchin Gupta * 144f6ad66aSAchin Gupta * Neither the name of ARM nor the names of its contributors may be used 154f6ad66aSAchin Gupta * to endorse or promote products derived from this software without specific 164f6ad66aSAchin Gupta * prior written permission. 174f6ad66aSAchin Gupta * 184f6ad66aSAchin Gupta * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 194f6ad66aSAchin Gupta * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 204f6ad66aSAchin Gupta * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 214f6ad66aSAchin Gupta * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 224f6ad66aSAchin Gupta * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 234f6ad66aSAchin Gupta * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 244f6ad66aSAchin Gupta * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 254f6ad66aSAchin Gupta * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 264f6ad66aSAchin Gupta * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 274f6ad66aSAchin Gupta * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 284f6ad66aSAchin Gupta * POSSIBILITY OF SUCH DAMAGE. 294f6ad66aSAchin Gupta */ 304f6ad66aSAchin Gupta 3197043ac9SDan Handley #include <arch.h> 324f6ad66aSAchin Gupta #include <arch_helpers.h> 3397043ac9SDan Handley #include <assert.h> 34*1779ba6bSJuan Castillo #include <auth_mod.h> 354f6ad66aSAchin Gupta #include <bl_common.h> 3635e98e55SDan Handley #include <debug.h> 378f55dfb4SSandrine Bailleux #include <errno.h> 3897043ac9SDan Handley #include <io_storage.h> 3997043ac9SDan Handley #include <platform.h> 404f6ad66aSAchin Gupta 414f6ad66aSAchin Gupta unsigned long page_align(unsigned long value, unsigned dir) 424f6ad66aSAchin Gupta { 434f6ad66aSAchin Gupta unsigned long page_size = 1 << FOUR_KB_SHIFT; 444f6ad66aSAchin Gupta 454f6ad66aSAchin Gupta /* Round up the limit to the next page boundary */ 464f6ad66aSAchin Gupta if (value & (page_size - 1)) { 474f6ad66aSAchin Gupta value &= ~(page_size - 1); 484f6ad66aSAchin Gupta if (dir == UP) 494f6ad66aSAchin Gupta value += page_size; 504f6ad66aSAchin Gupta } 514f6ad66aSAchin Gupta 524f6ad66aSAchin Gupta return value; 534f6ad66aSAchin Gupta } 544f6ad66aSAchin Gupta 554f6ad66aSAchin Gupta static inline unsigned int is_page_aligned (unsigned long addr) { 564f6ad66aSAchin Gupta const unsigned long page_size = 1 << FOUR_KB_SHIFT; 574f6ad66aSAchin Gupta 584f6ad66aSAchin Gupta return (addr & (page_size - 1)) == 0; 594f6ad66aSAchin Gupta } 604f6ad66aSAchin Gupta 614f6ad66aSAchin Gupta void change_security_state(unsigned int target_security_state) 624f6ad66aSAchin Gupta { 634f6ad66aSAchin Gupta unsigned long scr = read_scr(); 644f6ad66aSAchin Gupta 65d3280bebSJuan Castillo assert(sec_state_is_valid(target_security_state)); 664f6ad66aSAchin Gupta if (target_security_state == SECURE) 674f6ad66aSAchin Gupta scr &= ~SCR_NS_BIT; 684f6ad66aSAchin Gupta else 69d3280bebSJuan Castillo scr |= SCR_NS_BIT; 704f6ad66aSAchin Gupta 714f6ad66aSAchin Gupta write_scr(scr); 724f6ad66aSAchin Gupta } 734f6ad66aSAchin Gupta 748f55dfb4SSandrine Bailleux /****************************************************************************** 758f55dfb4SSandrine Bailleux * Determine whether the memory region delimited by 'addr' and 'size' is free, 768f55dfb4SSandrine Bailleux * given the extents of free memory. 778f55dfb4SSandrine Bailleux * Return 1 if it is free, 0 otherwise. 788f55dfb4SSandrine Bailleux *****************************************************************************/ 798f55dfb4SSandrine Bailleux static int is_mem_free(uint64_t free_base, size_t free_size, 808f55dfb4SSandrine Bailleux uint64_t addr, size_t size) 814f6ad66aSAchin Gupta { 828f55dfb4SSandrine Bailleux return (addr >= free_base) && (addr + size <= free_base + free_size); 834f6ad66aSAchin Gupta } 844f6ad66aSAchin Gupta 858f55dfb4SSandrine Bailleux /****************************************************************************** 868f55dfb4SSandrine Bailleux * Inside a given memory region, determine whether a sub-region of memory is 878f55dfb4SSandrine Bailleux * closer from the top or the bottom of the encompassing region. Return the 888f55dfb4SSandrine Bailleux * size of the smallest chunk of free memory surrounding the sub-region in 898f55dfb4SSandrine Bailleux * 'small_chunk_size'. 908f55dfb4SSandrine Bailleux *****************************************************************************/ 918f55dfb4SSandrine Bailleux static unsigned int choose_mem_pos(uint64_t mem_start, uint64_t mem_end, 928f55dfb4SSandrine Bailleux uint64_t submem_start, uint64_t submem_end, 938f55dfb4SSandrine Bailleux size_t *small_chunk_size) 948f55dfb4SSandrine Bailleux { 958f55dfb4SSandrine Bailleux size_t top_chunk_size, bottom_chunk_size; 964f6ad66aSAchin Gupta 978f55dfb4SSandrine Bailleux assert(mem_start <= submem_start); 988f55dfb4SSandrine Bailleux assert(submem_start <= submem_end); 998f55dfb4SSandrine Bailleux assert(submem_end <= mem_end); 1008f55dfb4SSandrine Bailleux assert(small_chunk_size != NULL); 1018f55dfb4SSandrine Bailleux 1028f55dfb4SSandrine Bailleux top_chunk_size = mem_end - submem_end; 1038f55dfb4SSandrine Bailleux bottom_chunk_size = submem_start - mem_start; 1048f55dfb4SSandrine Bailleux 1058f55dfb4SSandrine Bailleux if (top_chunk_size < bottom_chunk_size) { 1068f55dfb4SSandrine Bailleux *small_chunk_size = top_chunk_size; 1078f55dfb4SSandrine Bailleux return TOP; 1088f55dfb4SSandrine Bailleux } else { 1098f55dfb4SSandrine Bailleux *small_chunk_size = bottom_chunk_size; 1108f55dfb4SSandrine Bailleux return BOTTOM; 1118f55dfb4SSandrine Bailleux } 1128f55dfb4SSandrine Bailleux } 1138f55dfb4SSandrine Bailleux 1148f55dfb4SSandrine Bailleux /****************************************************************************** 1158f55dfb4SSandrine Bailleux * Reserve the memory region delimited by 'addr' and 'size'. The extents of free 1168f55dfb4SSandrine Bailleux * memory are passed in 'free_base' and 'free_size' and they will be updated to 1178f55dfb4SSandrine Bailleux * reflect the memory usage. 1188f55dfb4SSandrine Bailleux * The caller must ensure the memory to reserve is free. 1198f55dfb4SSandrine Bailleux *****************************************************************************/ 1208f55dfb4SSandrine Bailleux void reserve_mem(uint64_t *free_base, size_t *free_size, 1218f55dfb4SSandrine Bailleux uint64_t addr, size_t size) 1228f55dfb4SSandrine Bailleux { 1238f55dfb4SSandrine Bailleux size_t discard_size; 1248f55dfb4SSandrine Bailleux size_t reserved_size; 1258f55dfb4SSandrine Bailleux unsigned int pos; 1268f55dfb4SSandrine Bailleux 1278f55dfb4SSandrine Bailleux assert(free_base != NULL); 1288f55dfb4SSandrine Bailleux assert(free_size != NULL); 1298f55dfb4SSandrine Bailleux assert(is_mem_free(*free_base, *free_size, addr, size)); 1308f55dfb4SSandrine Bailleux 1318f55dfb4SSandrine Bailleux pos = choose_mem_pos(*free_base, *free_base + *free_size, 1328f55dfb4SSandrine Bailleux addr, addr + size, 1338f55dfb4SSandrine Bailleux &discard_size); 1348f55dfb4SSandrine Bailleux 1358f55dfb4SSandrine Bailleux reserved_size = size + discard_size; 1368f55dfb4SSandrine Bailleux *free_size -= reserved_size; 1378f55dfb4SSandrine Bailleux 1388f55dfb4SSandrine Bailleux if (pos == BOTTOM) 1398f55dfb4SSandrine Bailleux *free_base = addr + size; 1408f55dfb4SSandrine Bailleux 1411b70db06SDan Handley VERBOSE("Reserved 0x%lx bytes (discarded 0x%lx bytes %s)\n", 1428f55dfb4SSandrine Bailleux reserved_size, discard_size, 1438f55dfb4SSandrine Bailleux pos == TOP ? "above" : "below"); 1444f6ad66aSAchin Gupta } 1454f6ad66aSAchin Gupta 1464f6ad66aSAchin Gupta static void dump_load_info(unsigned long image_load_addr, 1474f6ad66aSAchin Gupta unsigned long image_size, 148fb037bfbSDan Handley const meminfo_t *mem_layout) 1494f6ad66aSAchin Gupta { 1506ad2e461SDan Handley INFO("Trying to load image at address 0x%lx, size = 0x%lx\n", 1514f6ad66aSAchin Gupta image_load_addr, image_size); 1526ad2e461SDan Handley INFO("Current memory layout:\n"); 1536ad2e461SDan Handley INFO(" total region = [0x%lx, 0x%lx]\n", mem_layout->total_base, 1544f6ad66aSAchin Gupta mem_layout->total_base + mem_layout->total_size); 1556ad2e461SDan Handley INFO(" free region = [0x%lx, 0x%lx]\n", mem_layout->free_base, 1564f6ad66aSAchin Gupta mem_layout->free_base + mem_layout->free_size); 1574f6ad66aSAchin Gupta } 1584f6ad66aSAchin Gupta 159ee9ad785SRyan Harkin /* Generic function to return the size of an image */ 16016948ae1SJuan Castillo unsigned long image_size(unsigned int image_id) 161ee9ad785SRyan Harkin { 162625de1d4SDan Handley uintptr_t dev_handle; 163625de1d4SDan Handley uintptr_t image_handle; 164625de1d4SDan Handley uintptr_t image_spec; 165ee9ad785SRyan Harkin size_t image_size = 0; 166ee9ad785SRyan Harkin int io_result = IO_FAIL; 167ee9ad785SRyan Harkin 168ee9ad785SRyan Harkin /* Obtain a reference to the image by querying the platform layer */ 16916948ae1SJuan Castillo io_result = plat_get_image_source(image_id, &dev_handle, &image_spec); 170ee9ad785SRyan Harkin if (io_result != IO_SUCCESS) { 17116948ae1SJuan Castillo WARN("Failed to obtain reference to image id=%u (%i)\n", 17216948ae1SJuan Castillo image_id, io_result); 173ee9ad785SRyan Harkin return 0; 174ee9ad785SRyan Harkin } 175ee9ad785SRyan Harkin 176ee9ad785SRyan Harkin /* Attempt to access the image */ 177ee9ad785SRyan Harkin io_result = io_open(dev_handle, image_spec, &image_handle); 178ee9ad785SRyan Harkin if (io_result != IO_SUCCESS) { 17916948ae1SJuan Castillo WARN("Failed to access image id=%u (%i)\n", 18016948ae1SJuan Castillo image_id, io_result); 181ee9ad785SRyan Harkin return 0; 182ee9ad785SRyan Harkin } 183ee9ad785SRyan Harkin 184ee9ad785SRyan Harkin /* Find the size of the image */ 185ee9ad785SRyan Harkin io_result = io_size(image_handle, &image_size); 186ee9ad785SRyan Harkin if ((io_result != IO_SUCCESS) || (image_size == 0)) { 18716948ae1SJuan Castillo WARN("Failed to determine the size of the image id=%u (%i)\n", 18816948ae1SJuan Castillo image_id, io_result); 189ee9ad785SRyan Harkin } 190ee9ad785SRyan Harkin io_result = io_close(image_handle); 191ee9ad785SRyan Harkin /* Ignore improbable/unrecoverable error in 'close' */ 192ee9ad785SRyan Harkin 193ee9ad785SRyan Harkin /* TODO: Consider maintaining open device connection from this 194ee9ad785SRyan Harkin * bootloader stage 195ee9ad785SRyan Harkin */ 196ee9ad785SRyan Harkin io_result = io_dev_close(dev_handle); 197ee9ad785SRyan Harkin /* Ignore improbable/unrecoverable error in 'dev_close' */ 198ee9ad785SRyan Harkin 199ee9ad785SRyan Harkin return image_size; 200ee9ad785SRyan Harkin } 2018f55dfb4SSandrine Bailleux 2024f6ad66aSAchin Gupta /******************************************************************************* 2038f55dfb4SSandrine Bailleux * Generic function to load an image at a specific address given a name and 2048f55dfb4SSandrine Bailleux * extents of free memory. It updates the memory layout if the load is 2058f55dfb4SSandrine Bailleux * successful, as well as the image information and the entry point information. 2068f55dfb4SSandrine Bailleux * The caller might pass a NULL pointer for the entry point if it is not 2078f55dfb4SSandrine Bailleux * interested in this information, e.g. because the image just needs to be 2088f55dfb4SSandrine Bailleux * loaded in memory but won't ever be executed. 2098f55dfb4SSandrine Bailleux * Returns 0 on success, a negative error code otherwise. 2104f6ad66aSAchin Gupta ******************************************************************************/ 2114112bfa0SVikram Kanigiri int load_image(meminfo_t *mem_layout, 21216948ae1SJuan Castillo unsigned int image_id, 213*1779ba6bSJuan Castillo uintptr_t image_base, 2144112bfa0SVikram Kanigiri image_info_t *image_data, 2154112bfa0SVikram Kanigiri entry_point_info_t *entry_point_info) 2164f6ad66aSAchin Gupta { 217625de1d4SDan Handley uintptr_t dev_handle; 218625de1d4SDan Handley uintptr_t image_handle; 219625de1d4SDan Handley uintptr_t image_spec; 2208f55dfb4SSandrine Bailleux size_t image_size; 2218f55dfb4SSandrine Bailleux size_t bytes_read; 2229d72b4eaSJames Morrissey int io_result = IO_FAIL; 2234f6ad66aSAchin Gupta 2249d72b4eaSJames Morrissey assert(mem_layout != NULL); 2258f55dfb4SSandrine Bailleux assert(image_data != NULL); 2264112bfa0SVikram Kanigiri assert(image_data->h.version >= VERSION_1); 2279d72b4eaSJames Morrissey 2289d72b4eaSJames Morrissey /* Obtain a reference to the image by querying the platform layer */ 22916948ae1SJuan Castillo io_result = plat_get_image_source(image_id, &dev_handle, &image_spec); 2309d72b4eaSJames Morrissey if (io_result != IO_SUCCESS) { 23116948ae1SJuan Castillo WARN("Failed to obtain reference to image id=%u (%i)\n", 23216948ae1SJuan Castillo image_id, io_result); 2334112bfa0SVikram Kanigiri return io_result; 2344f6ad66aSAchin Gupta } 2354f6ad66aSAchin Gupta 2369d72b4eaSJames Morrissey /* Attempt to access the image */ 2379d72b4eaSJames Morrissey io_result = io_open(dev_handle, image_spec, &image_handle); 2389d72b4eaSJames Morrissey if (io_result != IO_SUCCESS) { 23916948ae1SJuan Castillo WARN("Failed to access image id=%u (%i)\n", 24016948ae1SJuan Castillo image_id, io_result); 2414112bfa0SVikram Kanigiri return io_result; 2424f6ad66aSAchin Gupta } 2434f6ad66aSAchin Gupta 24416948ae1SJuan Castillo INFO("Loading image id=%u at address 0x%lx\n", image_id, image_base); 2458f55dfb4SSandrine Bailleux 2469d72b4eaSJames Morrissey /* Find the size of the image */ 2479d72b4eaSJames Morrissey io_result = io_size(image_handle, &image_size); 2489d72b4eaSJames Morrissey if ((io_result != IO_SUCCESS) || (image_size == 0)) { 24916948ae1SJuan Castillo WARN("Failed to determine the size of the image id=%u (%i)\n", 25016948ae1SJuan Castillo image_id, io_result); 2514112bfa0SVikram Kanigiri goto exit; 2529d72b4eaSJames Morrissey } 2539d72b4eaSJames Morrissey 2548f55dfb4SSandrine Bailleux /* Check that the memory where the image will be loaded is free */ 2558f55dfb4SSandrine Bailleux if (!is_mem_free(mem_layout->free_base, mem_layout->free_size, 2568f55dfb4SSandrine Bailleux image_base, image_size)) { 2578f55dfb4SSandrine Bailleux WARN("Failed to reserve memory: 0x%lx - 0x%lx\n", 2588f55dfb4SSandrine Bailleux image_base, image_base + image_size); 2599d72b4eaSJames Morrissey dump_load_info(image_base, image_size, mem_layout); 2604112bfa0SVikram Kanigiri io_result = -ENOMEM; 2614112bfa0SVikram Kanigiri goto exit; 2624f6ad66aSAchin Gupta } 2634f6ad66aSAchin Gupta 2644f6ad66aSAchin Gupta /* We have enough space so load the image now */ 2659d72b4eaSJames Morrissey /* TODO: Consider whether to try to recover/retry a partially successful read */ 266625de1d4SDan Handley io_result = io_read(image_handle, image_base, image_size, &bytes_read); 2679d72b4eaSJames Morrissey if ((io_result != IO_SUCCESS) || (bytes_read < image_size)) { 26816948ae1SJuan Castillo WARN("Failed to load image id=%u (%i)\n", image_id, io_result); 2694112bfa0SVikram Kanigiri goto exit; 2704f6ad66aSAchin Gupta } 2714f6ad66aSAchin Gupta 2728f55dfb4SSandrine Bailleux /* 2738f55dfb4SSandrine Bailleux * Update the memory usage info. 2748f55dfb4SSandrine Bailleux * This is done after the actual loading so that it is not updated when 2758f55dfb4SSandrine Bailleux * the load is unsuccessful. 276c5fb47c3SJuan Castillo * If the caller does not provide an entry point, bypass the memory 277c5fb47c3SJuan Castillo * reservation. 2788f55dfb4SSandrine Bailleux */ 279c5fb47c3SJuan Castillo if (entry_point_info != NULL) { 2808f55dfb4SSandrine Bailleux reserve_mem(&mem_layout->free_base, &mem_layout->free_size, 2818f55dfb4SSandrine Bailleux image_base, image_size); 282c5fb47c3SJuan Castillo } else { 283c5fb47c3SJuan Castillo INFO("Skip reserving memory: 0x%lx - 0x%lx\n", 284c5fb47c3SJuan Castillo image_base, image_base + image_size); 285c5fb47c3SJuan Castillo } 2868f55dfb4SSandrine Bailleux 2874112bfa0SVikram Kanigiri image_data->image_base = image_base; 2884112bfa0SVikram Kanigiri image_data->image_size = image_size; 2894112bfa0SVikram Kanigiri 29063db7ba2SSandrine Bailleux if (entry_point_info != NULL) 2914112bfa0SVikram Kanigiri entry_point_info->pc = image_base; 2924112bfa0SVikram Kanigiri 2934f6ad66aSAchin Gupta /* 2948f55dfb4SSandrine Bailleux * File has been successfully loaded. 2958f55dfb4SSandrine Bailleux * Flush the image in TZRAM so that the next EL can see it. 2964f6ad66aSAchin Gupta */ 2979d72b4eaSJames Morrissey flush_dcache_range(image_base, image_size); 2984f6ad66aSAchin Gupta 29916948ae1SJuan Castillo INFO("Image id=%u loaded: 0x%lx - 0x%lx\n", image_id, image_base, 3008f55dfb4SSandrine Bailleux image_base + image_size); 3019d72b4eaSJames Morrissey 3029d72b4eaSJames Morrissey exit: 3034112bfa0SVikram Kanigiri io_close(image_handle); 3049d72b4eaSJames Morrissey /* Ignore improbable/unrecoverable error in 'close' */ 3059d72b4eaSJames Morrissey 3069d72b4eaSJames Morrissey /* TODO: Consider maintaining open device connection from this bootloader stage */ 3074112bfa0SVikram Kanigiri io_dev_close(dev_handle); 3089d72b4eaSJames Morrissey /* Ignore improbable/unrecoverable error in 'dev_close' */ 3094f6ad66aSAchin Gupta 3104112bfa0SVikram Kanigiri return io_result; 3114f6ad66aSAchin Gupta } 312*1779ba6bSJuan Castillo 313*1779ba6bSJuan Castillo /******************************************************************************* 314*1779ba6bSJuan Castillo * Generic function to load and authenticate an image. The image is actually 315*1779ba6bSJuan Castillo * loaded by calling the 'load_image()' function. In addition, this function 316*1779ba6bSJuan Castillo * uses recursion to authenticate the parent images up to the root of trust. 317*1779ba6bSJuan Castillo ******************************************************************************/ 318*1779ba6bSJuan Castillo int load_auth_image(meminfo_t *mem_layout, 319*1779ba6bSJuan Castillo unsigned int image_id, 320*1779ba6bSJuan Castillo uintptr_t image_base, 321*1779ba6bSJuan Castillo image_info_t *image_data, 322*1779ba6bSJuan Castillo entry_point_info_t *entry_point_info) 323*1779ba6bSJuan Castillo { 324*1779ba6bSJuan Castillo int rc; 325*1779ba6bSJuan Castillo 326*1779ba6bSJuan Castillo #if TRUSTED_BOARD_BOOT 327*1779ba6bSJuan Castillo unsigned int parent_id; 328*1779ba6bSJuan Castillo 329*1779ba6bSJuan Castillo /* Use recursion to authenticate parent images */ 330*1779ba6bSJuan Castillo rc = auth_mod_get_parent_id(image_id, &parent_id); 331*1779ba6bSJuan Castillo if (rc == 0) { 332*1779ba6bSJuan Castillo rc = load_auth_image(mem_layout, parent_id, image_base, 333*1779ba6bSJuan Castillo image_data, NULL); 334*1779ba6bSJuan Castillo if (rc != IO_SUCCESS) { 335*1779ba6bSJuan Castillo return rc; 336*1779ba6bSJuan Castillo } 337*1779ba6bSJuan Castillo } 338*1779ba6bSJuan Castillo #endif /* TRUSTED_BOARD_BOOT */ 339*1779ba6bSJuan Castillo 340*1779ba6bSJuan Castillo /* Load the image */ 341*1779ba6bSJuan Castillo rc = load_image(mem_layout, image_id, image_base, image_data, 342*1779ba6bSJuan Castillo entry_point_info); 343*1779ba6bSJuan Castillo if (rc != IO_SUCCESS) { 344*1779ba6bSJuan Castillo return rc; 345*1779ba6bSJuan Castillo } 346*1779ba6bSJuan Castillo 347*1779ba6bSJuan Castillo #if TRUSTED_BOARD_BOOT 348*1779ba6bSJuan Castillo /* Authenticate it */ 349*1779ba6bSJuan Castillo rc = auth_mod_verify_img(image_id, 350*1779ba6bSJuan Castillo (void *)image_data->image_base, 351*1779ba6bSJuan Castillo image_data->image_size); 352*1779ba6bSJuan Castillo if (rc != 0) { 353*1779ba6bSJuan Castillo return IO_FAIL; 354*1779ba6bSJuan Castillo } 355*1779ba6bSJuan Castillo 356*1779ba6bSJuan Castillo /* After working with data, invalidate the data cache */ 357*1779ba6bSJuan Castillo inv_dcache_range(image_data->image_base, 358*1779ba6bSJuan Castillo (size_t)image_data->image_size); 359*1779ba6bSJuan Castillo #endif /* TRUSTED_BOARD_BOOT */ 360*1779ba6bSJuan Castillo 361*1779ba6bSJuan Castillo return IO_SUCCESS; 362*1779ba6bSJuan Castillo } 363