14f6ad66aSAchin Gupta /* 2e83b0cadSDan Handley * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved. 34f6ad66aSAchin Gupta * 44f6ad66aSAchin Gupta * Redistribution and use in source and binary forms, with or without 54f6ad66aSAchin Gupta * modification, are permitted provided that the following conditions are met: 64f6ad66aSAchin Gupta * 74f6ad66aSAchin Gupta * Redistributions of source code must retain the above copyright notice, this 84f6ad66aSAchin Gupta * list of conditions and the following disclaimer. 94f6ad66aSAchin Gupta * 104f6ad66aSAchin Gupta * Redistributions in binary form must reproduce the above copyright notice, 114f6ad66aSAchin Gupta * this list of conditions and the following disclaimer in the documentation 124f6ad66aSAchin Gupta * and/or other materials provided with the distribution. 134f6ad66aSAchin Gupta * 144f6ad66aSAchin Gupta * Neither the name of ARM nor the names of its contributors may be used 154f6ad66aSAchin Gupta * to endorse or promote products derived from this software without specific 164f6ad66aSAchin Gupta * prior written permission. 174f6ad66aSAchin Gupta * 184f6ad66aSAchin Gupta * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 194f6ad66aSAchin Gupta * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 204f6ad66aSAchin Gupta * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 214f6ad66aSAchin Gupta * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 224f6ad66aSAchin Gupta * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 234f6ad66aSAchin Gupta * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 244f6ad66aSAchin Gupta * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 254f6ad66aSAchin Gupta * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 264f6ad66aSAchin Gupta * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 274f6ad66aSAchin Gupta * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 284f6ad66aSAchin Gupta * POSSIBILITY OF SUCH DAMAGE. 294f6ad66aSAchin Gupta */ 304f6ad66aSAchin Gupta 3197043ac9SDan Handley #include <arch.h> 324f6ad66aSAchin Gupta #include <arch_helpers.h> 3397043ac9SDan Handley #include <assert.h> 344f6ad66aSAchin Gupta #include <bl_common.h> 3535e98e55SDan Handley #include <debug.h> 3697043ac9SDan Handley #include <io_storage.h> 3797043ac9SDan Handley #include <platform.h> 38*4112bfa0SVikram Kanigiri #include <errno.h> 3997043ac9SDan Handley #include <stdio.h> 404f6ad66aSAchin Gupta 414f6ad66aSAchin Gupta unsigned long page_align(unsigned long value, unsigned dir) 424f6ad66aSAchin Gupta { 434f6ad66aSAchin Gupta unsigned long page_size = 1 << FOUR_KB_SHIFT; 444f6ad66aSAchin Gupta 454f6ad66aSAchin Gupta /* Round up the limit to the next page boundary */ 464f6ad66aSAchin Gupta if (value & (page_size - 1)) { 474f6ad66aSAchin Gupta value &= ~(page_size - 1); 484f6ad66aSAchin Gupta if (dir == UP) 494f6ad66aSAchin Gupta value += page_size; 504f6ad66aSAchin Gupta } 514f6ad66aSAchin Gupta 524f6ad66aSAchin Gupta return value; 534f6ad66aSAchin Gupta } 544f6ad66aSAchin Gupta 554f6ad66aSAchin Gupta static inline unsigned int is_page_aligned (unsigned long addr) { 564f6ad66aSAchin Gupta const unsigned long page_size = 1 << FOUR_KB_SHIFT; 574f6ad66aSAchin Gupta 584f6ad66aSAchin Gupta return (addr & (page_size - 1)) == 0; 594f6ad66aSAchin Gupta } 604f6ad66aSAchin Gupta 614f6ad66aSAchin Gupta void change_security_state(unsigned int target_security_state) 624f6ad66aSAchin Gupta { 634f6ad66aSAchin Gupta unsigned long scr = read_scr(); 644f6ad66aSAchin Gupta 654f6ad66aSAchin Gupta if (target_security_state == SECURE) 664f6ad66aSAchin Gupta scr &= ~SCR_NS_BIT; 674f6ad66aSAchin Gupta else if (target_security_state == NON_SECURE) 684f6ad66aSAchin Gupta scr |= SCR_NS_BIT; 694f6ad66aSAchin Gupta else 704f6ad66aSAchin Gupta assert(0); 714f6ad66aSAchin Gupta 724f6ad66aSAchin Gupta write_scr(scr); 734f6ad66aSAchin Gupta } 744f6ad66aSAchin Gupta 754f6ad66aSAchin Gupta 764f6ad66aSAchin Gupta /******************************************************************************* 774f6ad66aSAchin Gupta * The next two functions are the weak definitions. Platform specific 784f6ad66aSAchin Gupta * code can override them if it wishes to. 794f6ad66aSAchin Gupta ******************************************************************************/ 804f6ad66aSAchin Gupta 814f6ad66aSAchin Gupta /******************************************************************************* 824f6ad66aSAchin Gupta * Function that takes a memory layout into which BL31 has been either top or 834f6ad66aSAchin Gupta * bottom loaded. Using this information, it populates bl31_mem_layout to tell 844f6ad66aSAchin Gupta * BL31 how much memory it has access to and how much is available for use. It 854f6ad66aSAchin Gupta * does not need the address where BL31 has been loaded as BL31 will reclaim 864f6ad66aSAchin Gupta * all the memory used by BL2. 874f6ad66aSAchin Gupta * TODO: Revisit if this and init_bl2_mem_layout can be replaced by a single 884f6ad66aSAchin Gupta * routine. 894f6ad66aSAchin Gupta ******************************************************************************/ 90fb037bfbSDan Handley void init_bl31_mem_layout(const meminfo_t *bl2_mem_layout, 91fb037bfbSDan Handley meminfo_t *bl31_mem_layout, 924f6ad66aSAchin Gupta unsigned int load_type) 934f6ad66aSAchin Gupta { 944f6ad66aSAchin Gupta if (load_type == BOT_LOAD) { 954f6ad66aSAchin Gupta /* 964f6ad66aSAchin Gupta * ------------ ^ 974f6ad66aSAchin Gupta * | BL2 | | 984f6ad66aSAchin Gupta * |----------| ^ | BL2 994f6ad66aSAchin Gupta * | | | BL2 free | total 1004f6ad66aSAchin Gupta * | | | size | size 1014f6ad66aSAchin Gupta * |----------| BL2 free base v | 1024f6ad66aSAchin Gupta * | BL31 | | 1034f6ad66aSAchin Gupta * ------------ BL2 total base v 1044f6ad66aSAchin Gupta */ 1054f6ad66aSAchin Gupta unsigned long bl31_size; 1064f6ad66aSAchin Gupta 1074f6ad66aSAchin Gupta bl31_mem_layout->free_base = bl2_mem_layout->free_base; 1084f6ad66aSAchin Gupta 1094f6ad66aSAchin Gupta bl31_size = bl2_mem_layout->free_base - bl2_mem_layout->total_base; 1104f6ad66aSAchin Gupta bl31_mem_layout->free_size = bl2_mem_layout->total_size - bl31_size; 1114f6ad66aSAchin Gupta } else { 1124f6ad66aSAchin Gupta /* 1134f6ad66aSAchin Gupta * ------------ ^ 1144f6ad66aSAchin Gupta * | BL31 | | 1154f6ad66aSAchin Gupta * |----------| ^ | BL2 1164f6ad66aSAchin Gupta * | | | BL2 free | total 1174f6ad66aSAchin Gupta * | | | size | size 1184f6ad66aSAchin Gupta * |----------| BL2 free base v | 1194f6ad66aSAchin Gupta * | BL2 | | 1204f6ad66aSAchin Gupta * ------------ BL2 total base v 1214f6ad66aSAchin Gupta */ 1224f6ad66aSAchin Gupta unsigned long bl2_size; 1234f6ad66aSAchin Gupta 1244f6ad66aSAchin Gupta bl31_mem_layout->free_base = bl2_mem_layout->total_base; 1254f6ad66aSAchin Gupta 1264f6ad66aSAchin Gupta bl2_size = bl2_mem_layout->free_base - bl2_mem_layout->total_base; 1274f6ad66aSAchin Gupta bl31_mem_layout->free_size = bl2_mem_layout->free_size + bl2_size; 1284f6ad66aSAchin Gupta } 1294f6ad66aSAchin Gupta 1304f6ad66aSAchin Gupta bl31_mem_layout->total_base = bl2_mem_layout->total_base; 1314f6ad66aSAchin Gupta bl31_mem_layout->total_size = bl2_mem_layout->total_size; 1324f6ad66aSAchin Gupta bl31_mem_layout->attr = load_type; 1334f6ad66aSAchin Gupta 134fb037bfbSDan Handley flush_dcache_range((unsigned long) bl31_mem_layout, sizeof(meminfo_t)); 1354f6ad66aSAchin Gupta return; 1364f6ad66aSAchin Gupta } 1374f6ad66aSAchin Gupta 1384f6ad66aSAchin Gupta /******************************************************************************* 1394f6ad66aSAchin Gupta * Function that takes a memory layout into which BL2 has been either top or 1404f6ad66aSAchin Gupta * bottom loaded along with the address where BL2 has been loaded in it. Using 1414f6ad66aSAchin Gupta * this information, it populates bl2_mem_layout to tell BL2 how much memory 1424f6ad66aSAchin Gupta * it has access to and how much is available for use. 1434f6ad66aSAchin Gupta ******************************************************************************/ 144fb037bfbSDan Handley void init_bl2_mem_layout(meminfo_t *bl1_mem_layout, 145fb037bfbSDan Handley meminfo_t *bl2_mem_layout, 1464f6ad66aSAchin Gupta unsigned int load_type, 1474f6ad66aSAchin Gupta unsigned long bl2_base) 1484f6ad66aSAchin Gupta { 1494f6ad66aSAchin Gupta unsigned tmp; 1504f6ad66aSAchin Gupta 1514f6ad66aSAchin Gupta if (load_type == BOT_LOAD) { 1524f6ad66aSAchin Gupta bl2_mem_layout->total_base = bl2_base; 1534f6ad66aSAchin Gupta tmp = bl1_mem_layout->free_base - bl2_base; 1544f6ad66aSAchin Gupta bl2_mem_layout->total_size = bl1_mem_layout->free_size + tmp; 1554f6ad66aSAchin Gupta 1564f6ad66aSAchin Gupta } else { 1574f6ad66aSAchin Gupta bl2_mem_layout->total_base = bl1_mem_layout->free_base; 1584f6ad66aSAchin Gupta tmp = bl1_mem_layout->total_base + bl1_mem_layout->total_size; 1594f6ad66aSAchin Gupta bl2_mem_layout->total_size = tmp - bl1_mem_layout->free_base; 1604f6ad66aSAchin Gupta } 1614f6ad66aSAchin Gupta 1624f6ad66aSAchin Gupta bl2_mem_layout->free_base = bl1_mem_layout->free_base; 1634f6ad66aSAchin Gupta bl2_mem_layout->free_size = bl1_mem_layout->free_size; 1644f6ad66aSAchin Gupta bl2_mem_layout->attr = load_type; 1654f6ad66aSAchin Gupta 166fb037bfbSDan Handley flush_dcache_range((unsigned long) bl2_mem_layout, sizeof(meminfo_t)); 1674f6ad66aSAchin Gupta return; 1684f6ad66aSAchin Gupta } 1694f6ad66aSAchin Gupta 1704f6ad66aSAchin Gupta static void dump_load_info(unsigned long image_load_addr, 1714f6ad66aSAchin Gupta unsigned long image_size, 172fb037bfbSDan Handley const meminfo_t *mem_layout) 1734f6ad66aSAchin Gupta { 1744f6ad66aSAchin Gupta #if DEBUG 1754f6ad66aSAchin Gupta printf("Trying to load image at address 0x%lx, size = 0x%lx\r\n", 1764f6ad66aSAchin Gupta image_load_addr, image_size); 1774f6ad66aSAchin Gupta printf("Current memory layout:\r\n"); 1784f6ad66aSAchin Gupta printf(" total region = [0x%lx, 0x%lx]\r\n", mem_layout->total_base, 1794f6ad66aSAchin Gupta mem_layout->total_base + mem_layout->total_size); 1804f6ad66aSAchin Gupta printf(" free region = [0x%lx, 0x%lx]\r\n", mem_layout->free_base, 1814f6ad66aSAchin Gupta mem_layout->free_base + mem_layout->free_size); 1824f6ad66aSAchin Gupta #endif 1834f6ad66aSAchin Gupta } 1844f6ad66aSAchin Gupta 185ee9ad785SRyan Harkin /* Generic function to return the size of an image */ 186ee9ad785SRyan Harkin unsigned long image_size(const char *image_name) 187ee9ad785SRyan Harkin { 188625de1d4SDan Handley uintptr_t dev_handle; 189625de1d4SDan Handley uintptr_t image_handle; 190625de1d4SDan Handley uintptr_t image_spec; 191ee9ad785SRyan Harkin size_t image_size = 0; 192ee9ad785SRyan Harkin int io_result = IO_FAIL; 193ee9ad785SRyan Harkin 194ee9ad785SRyan Harkin assert(image_name != NULL); 195ee9ad785SRyan Harkin 196ee9ad785SRyan Harkin /* Obtain a reference to the image by querying the platform layer */ 197ee9ad785SRyan Harkin io_result = plat_get_image_source(image_name, &dev_handle, &image_spec); 198ee9ad785SRyan Harkin if (io_result != IO_SUCCESS) { 199ee9ad785SRyan Harkin WARN("Failed to obtain reference to image '%s' (%i)\n", 200ee9ad785SRyan Harkin image_name, io_result); 201ee9ad785SRyan Harkin return 0; 202ee9ad785SRyan Harkin } 203ee9ad785SRyan Harkin 204ee9ad785SRyan Harkin /* Attempt to access the image */ 205ee9ad785SRyan Harkin io_result = io_open(dev_handle, image_spec, &image_handle); 206ee9ad785SRyan Harkin if (io_result != IO_SUCCESS) { 207ee9ad785SRyan Harkin WARN("Failed to access image '%s' (%i)\n", 208ee9ad785SRyan Harkin image_name, io_result); 209ee9ad785SRyan Harkin return 0; 210ee9ad785SRyan Harkin } 211ee9ad785SRyan Harkin 212ee9ad785SRyan Harkin /* Find the size of the image */ 213ee9ad785SRyan Harkin io_result = io_size(image_handle, &image_size); 214ee9ad785SRyan Harkin if ((io_result != IO_SUCCESS) || (image_size == 0)) { 215ee9ad785SRyan Harkin WARN("Failed to determine the size of the image '%s' file (%i)\n", 216ee9ad785SRyan Harkin image_name, io_result); 217ee9ad785SRyan Harkin } 218ee9ad785SRyan Harkin io_result = io_close(image_handle); 219ee9ad785SRyan Harkin /* Ignore improbable/unrecoverable error in 'close' */ 220ee9ad785SRyan Harkin 221ee9ad785SRyan Harkin /* TODO: Consider maintaining open device connection from this 222ee9ad785SRyan Harkin * bootloader stage 223ee9ad785SRyan Harkin */ 224ee9ad785SRyan Harkin io_result = io_dev_close(dev_handle); 225ee9ad785SRyan Harkin /* Ignore improbable/unrecoverable error in 'dev_close' */ 226ee9ad785SRyan Harkin 227ee9ad785SRyan Harkin return image_size; 228ee9ad785SRyan Harkin } 2294f6ad66aSAchin Gupta /******************************************************************************* 2309d72b4eaSJames Morrissey * Generic function to load an image into the trusted RAM, 2314f6ad66aSAchin Gupta * given a name, extents of free memory & whether the image should be loaded at 2324f6ad66aSAchin Gupta * the bottom or top of the free memory. It updates the memory layout if the 233*4112bfa0SVikram Kanigiri * load is successful. It also updates the image information and the entry point 234*4112bfa0SVikram Kanigiri * information in the params passed 2354f6ad66aSAchin Gupta ******************************************************************************/ 236*4112bfa0SVikram Kanigiri int load_image(meminfo_t *mem_layout, 2374f6ad66aSAchin Gupta const char *image_name, 2384f6ad66aSAchin Gupta unsigned int load_type, 239*4112bfa0SVikram Kanigiri unsigned long fixed_addr, 240*4112bfa0SVikram Kanigiri image_info_t *image_data, 241*4112bfa0SVikram Kanigiri entry_point_info_t *entry_point_info) 2424f6ad66aSAchin Gupta { 243625de1d4SDan Handley uintptr_t dev_handle; 244625de1d4SDan Handley uintptr_t image_handle; 245625de1d4SDan Handley uintptr_t image_spec; 24640a6f647SJames Morrissey unsigned long temp_image_base = 0; 24740a6f647SJames Morrissey unsigned long image_base = 0; 24840a6f647SJames Morrissey long offset = 0; 2499d72b4eaSJames Morrissey size_t image_size = 0; 2509d72b4eaSJames Morrissey size_t bytes_read = 0; 2519d72b4eaSJames Morrissey int io_result = IO_FAIL; 2524f6ad66aSAchin Gupta 2539d72b4eaSJames Morrissey assert(mem_layout != NULL); 2549d72b4eaSJames Morrissey assert(image_name != NULL); 255*4112bfa0SVikram Kanigiri assert(image_data->h.version >= VERSION_1); 2569d72b4eaSJames Morrissey 2579d72b4eaSJames Morrissey /* Obtain a reference to the image by querying the platform layer */ 2589d72b4eaSJames Morrissey io_result = plat_get_image_source(image_name, &dev_handle, &image_spec); 2599d72b4eaSJames Morrissey if (io_result != IO_SUCCESS) { 26008c28d53SJeenu Viswambharan WARN("Failed to obtain reference to image '%s' (%i)\n", 2619d72b4eaSJames Morrissey image_name, io_result); 262*4112bfa0SVikram Kanigiri return io_result; 2634f6ad66aSAchin Gupta } 2644f6ad66aSAchin Gupta 2659d72b4eaSJames Morrissey /* Attempt to access the image */ 2669d72b4eaSJames Morrissey io_result = io_open(dev_handle, image_spec, &image_handle); 2679d72b4eaSJames Morrissey if (io_result != IO_SUCCESS) { 26808c28d53SJeenu Viswambharan WARN("Failed to access image '%s' (%i)\n", 2699d72b4eaSJames Morrissey image_name, io_result); 270*4112bfa0SVikram Kanigiri return io_result; 2714f6ad66aSAchin Gupta } 2724f6ad66aSAchin Gupta 2739d72b4eaSJames Morrissey /* Find the size of the image */ 2749d72b4eaSJames Morrissey io_result = io_size(image_handle, &image_size); 2759d72b4eaSJames Morrissey if ((io_result != IO_SUCCESS) || (image_size == 0)) { 27608c28d53SJeenu Viswambharan WARN("Failed to determine the size of the image '%s' file (%i)\n", 2779d72b4eaSJames Morrissey image_name, io_result); 278*4112bfa0SVikram Kanigiri goto exit; 2799d72b4eaSJames Morrissey } 2809d72b4eaSJames Morrissey 2819d72b4eaSJames Morrissey /* See if we have enough space */ 2829d72b4eaSJames Morrissey if (image_size > mem_layout->free_size) { 28308c28d53SJeenu Viswambharan WARN("Cannot load '%s' file: Not enough space.\n", 2849d72b4eaSJames Morrissey image_name); 2859d72b4eaSJames Morrissey dump_load_info(0, image_size, mem_layout); 286*4112bfa0SVikram Kanigiri goto exit; 2879d72b4eaSJames Morrissey } 2889d72b4eaSJames Morrissey 2894f6ad66aSAchin Gupta switch (load_type) { 2904f6ad66aSAchin Gupta 2914f6ad66aSAchin Gupta case TOP_LOAD: 2924f6ad66aSAchin Gupta 2934f6ad66aSAchin Gupta /* Load the image in the top of free memory */ 2944f6ad66aSAchin Gupta temp_image_base = mem_layout->free_base + mem_layout->free_size; 2959d72b4eaSJames Morrissey temp_image_base -= image_size; 2964f6ad66aSAchin Gupta 2974f6ad66aSAchin Gupta /* Page align base address and check whether the image still fits */ 2984f6ad66aSAchin Gupta image_base = page_align(temp_image_base, DOWN); 2994f6ad66aSAchin Gupta assert(image_base <= temp_image_base); 3004f6ad66aSAchin Gupta 3014f6ad66aSAchin Gupta if (image_base < mem_layout->free_base) { 30208c28d53SJeenu Viswambharan WARN("Cannot load '%s' file: Not enough space.\n", 3034f6ad66aSAchin Gupta image_name); 3049d72b4eaSJames Morrissey dump_load_info(image_base, image_size, mem_layout); 305*4112bfa0SVikram Kanigiri io_result = -ENOMEM; 306*4112bfa0SVikram Kanigiri goto exit; 3074f6ad66aSAchin Gupta } 3084f6ad66aSAchin Gupta 3094f6ad66aSAchin Gupta /* Calculate the amount of extra memory used due to alignment */ 3104f6ad66aSAchin Gupta offset = temp_image_base - image_base; 3114f6ad66aSAchin Gupta 3124f6ad66aSAchin Gupta break; 3134f6ad66aSAchin Gupta 3144f6ad66aSAchin Gupta case BOT_LOAD: 3154f6ad66aSAchin Gupta 3164f6ad66aSAchin Gupta /* Load the BL2 image in the bottom of free memory */ 3174f6ad66aSAchin Gupta temp_image_base = mem_layout->free_base; 3184f6ad66aSAchin Gupta image_base = page_align(temp_image_base, UP); 3194f6ad66aSAchin Gupta assert(image_base >= temp_image_base); 3204f6ad66aSAchin Gupta 3214f6ad66aSAchin Gupta /* Page align base address and check whether the image still fits */ 3229d72b4eaSJames Morrissey if (image_base + image_size > 3234f6ad66aSAchin Gupta mem_layout->free_base + mem_layout->free_size) { 32408c28d53SJeenu Viswambharan WARN("Cannot load '%s' file: Not enough space.\n", 3254f6ad66aSAchin Gupta image_name); 3269d72b4eaSJames Morrissey dump_load_info(image_base, image_size, mem_layout); 327*4112bfa0SVikram Kanigiri io_result = -ENOMEM; 328*4112bfa0SVikram Kanigiri goto exit; 3294f6ad66aSAchin Gupta } 3304f6ad66aSAchin Gupta 3314f6ad66aSAchin Gupta /* Calculate the amount of extra memory used due to alignment */ 3324f6ad66aSAchin Gupta offset = image_base - temp_image_base; 3334f6ad66aSAchin Gupta 3344f6ad66aSAchin Gupta break; 3354f6ad66aSAchin Gupta 3364f6ad66aSAchin Gupta default: 3374f6ad66aSAchin Gupta assert(0); 3384f6ad66aSAchin Gupta 3394f6ad66aSAchin Gupta } 3404f6ad66aSAchin Gupta 3414f6ad66aSAchin Gupta /* 3424f6ad66aSAchin Gupta * Some images must be loaded at a fixed address, not a dynamic one. 3434f6ad66aSAchin Gupta * 3444f6ad66aSAchin Gupta * This has been implemented as a hack on top of the existing dynamic 3454f6ad66aSAchin Gupta * loading mechanism, for the time being. If the 'fixed_addr' function 3464f6ad66aSAchin Gupta * argument is different from zero, then it will force the load address. 3474f6ad66aSAchin Gupta * So we still have this principle of top/bottom loading but the code 3484f6ad66aSAchin Gupta * determining the load address is bypassed and the load address is 3494f6ad66aSAchin Gupta * forced to the fixed one. 3504f6ad66aSAchin Gupta * 3514f6ad66aSAchin Gupta * This can result in quite a lot of wasted space because we still use 3524f6ad66aSAchin Gupta * 1 sole meminfo structure to represent the extents of free memory, 3534f6ad66aSAchin Gupta * where we should use some sort of linked list. 3544f6ad66aSAchin Gupta * 3554f6ad66aSAchin Gupta * E.g. we want to load BL2 at address 0x04020000, the resulting memory 3564f6ad66aSAchin Gupta * layout should look as follows: 3574f6ad66aSAchin Gupta * ------------ 0x04040000 3584f6ad66aSAchin Gupta * | | <- Free space (1) 3594f6ad66aSAchin Gupta * |----------| 3604f6ad66aSAchin Gupta * | BL2 | 3614f6ad66aSAchin Gupta * |----------| 0x04020000 3624f6ad66aSAchin Gupta * | | <- Free space (2) 3634f6ad66aSAchin Gupta * |----------| 3644f6ad66aSAchin Gupta * | BL1 | 3654f6ad66aSAchin Gupta * ------------ 0x04000000 3664f6ad66aSAchin Gupta * 3674f6ad66aSAchin Gupta * But in the current hacky implementation, we'll need to specify 3684f6ad66aSAchin Gupta * whether BL2 is loaded at the top or bottom of the free memory. 3694f6ad66aSAchin Gupta * E.g. if BL2 is considered as top-loaded, the meminfo structure 3704f6ad66aSAchin Gupta * will give the following view of the memory, hiding the chunk of 3714f6ad66aSAchin Gupta * free memory above BL2: 3724f6ad66aSAchin Gupta * ------------ 0x04040000 3734f6ad66aSAchin Gupta * | | 3744f6ad66aSAchin Gupta * | | 3754f6ad66aSAchin Gupta * | BL2 | 3764f6ad66aSAchin Gupta * |----------| 0x04020000 3774f6ad66aSAchin Gupta * | | <- Free space (2) 3784f6ad66aSAchin Gupta * |----------| 3794f6ad66aSAchin Gupta * | BL1 | 3804f6ad66aSAchin Gupta * ------------ 0x04000000 3814f6ad66aSAchin Gupta */ 3824f6ad66aSAchin Gupta if (fixed_addr != 0) { 3834f6ad66aSAchin Gupta /* Load the image at the given address. */ 3844f6ad66aSAchin Gupta image_base = fixed_addr; 3854f6ad66aSAchin Gupta 3864f6ad66aSAchin Gupta /* Check whether the image fits. */ 3874f6ad66aSAchin Gupta if ((image_base < mem_layout->free_base) || 3889d72b4eaSJames Morrissey (image_base + image_size > 3894f6ad66aSAchin Gupta mem_layout->free_base + mem_layout->free_size)) { 39008c28d53SJeenu Viswambharan WARN("Cannot load '%s' file: Not enough space.\n", 3914f6ad66aSAchin Gupta image_name); 3929d72b4eaSJames Morrissey dump_load_info(image_base, image_size, mem_layout); 393*4112bfa0SVikram Kanigiri io_result = -ENOMEM; 394*4112bfa0SVikram Kanigiri goto exit; 3954f6ad66aSAchin Gupta } 3964f6ad66aSAchin Gupta 3974f6ad66aSAchin Gupta /* Check whether the fixed load address is page-aligned. */ 3984f6ad66aSAchin Gupta if (!is_page_aligned(image_base)) { 39908c28d53SJeenu Viswambharan WARN("Cannot load '%s' file at unaligned address 0x%lx\n", 4004f6ad66aSAchin Gupta image_name, fixed_addr); 401*4112bfa0SVikram Kanigiri io_result = -ENOMEM; 402*4112bfa0SVikram Kanigiri goto exit; 4034f6ad66aSAchin Gupta } 4044f6ad66aSAchin Gupta 4054f6ad66aSAchin Gupta /* 4064f6ad66aSAchin Gupta * Calculate the amount of extra memory used due to fixed 4074f6ad66aSAchin Gupta * loading. 4084f6ad66aSAchin Gupta */ 4094f6ad66aSAchin Gupta if (load_type == TOP_LOAD) { 4104f6ad66aSAchin Gupta unsigned long max_addr, space_used; 4114f6ad66aSAchin Gupta /* 4124f6ad66aSAchin Gupta * ------------ max_addr 4134f6ad66aSAchin Gupta * | /wasted/ | | offset 4144f6ad66aSAchin Gupta * |..........|.............................. 4154f6ad66aSAchin Gupta * | image | | image_flen 4164f6ad66aSAchin Gupta * |----------| fixed_addr 4174f6ad66aSAchin Gupta * | | 4184f6ad66aSAchin Gupta * | | 4194f6ad66aSAchin Gupta * ------------ total_base 4204f6ad66aSAchin Gupta */ 4214f6ad66aSAchin Gupta max_addr = mem_layout->total_base + mem_layout->total_size; 4224f6ad66aSAchin Gupta /* 4234f6ad66aSAchin Gupta * Compute the amount of memory used by the image. 4244f6ad66aSAchin Gupta * Corresponds to all space above the image load 4254f6ad66aSAchin Gupta * address. 4264f6ad66aSAchin Gupta */ 4274f6ad66aSAchin Gupta space_used = max_addr - fixed_addr; 4284f6ad66aSAchin Gupta /* 4294f6ad66aSAchin Gupta * Calculate the amount of wasted memory within the 4304f6ad66aSAchin Gupta * amount of memory used by the image. 4314f6ad66aSAchin Gupta */ 4329d72b4eaSJames Morrissey offset = space_used - image_size; 4334f6ad66aSAchin Gupta } else /* BOT_LOAD */ 4344f6ad66aSAchin Gupta /* 4354f6ad66aSAchin Gupta * ------------ 4364f6ad66aSAchin Gupta * | | 4374f6ad66aSAchin Gupta * | | 4384f6ad66aSAchin Gupta * |----------| 4394f6ad66aSAchin Gupta * | image | 4404f6ad66aSAchin Gupta * |..........| fixed_addr 4414f6ad66aSAchin Gupta * | /wasted/ | | offset 4424f6ad66aSAchin Gupta * ------------ total_base 4434f6ad66aSAchin Gupta */ 4444f6ad66aSAchin Gupta offset = fixed_addr - mem_layout->total_base; 4454f6ad66aSAchin Gupta } 4464f6ad66aSAchin Gupta 4474f6ad66aSAchin Gupta /* We have enough space so load the image now */ 4489d72b4eaSJames Morrissey /* TODO: Consider whether to try to recover/retry a partially successful read */ 449625de1d4SDan Handley io_result = io_read(image_handle, image_base, image_size, &bytes_read); 4509d72b4eaSJames Morrissey if ((io_result != IO_SUCCESS) || (bytes_read < image_size)) { 45108c28d53SJeenu Viswambharan WARN("Failed to load '%s' file (%i)\n", image_name, io_result); 452*4112bfa0SVikram Kanigiri goto exit; 4534f6ad66aSAchin Gupta } 4544f6ad66aSAchin Gupta 455*4112bfa0SVikram Kanigiri image_data->image_base = image_base; 456*4112bfa0SVikram Kanigiri image_data->image_size = image_size; 457*4112bfa0SVikram Kanigiri 458*4112bfa0SVikram Kanigiri entry_point_info->pc = image_base; 459*4112bfa0SVikram Kanigiri 4604f6ad66aSAchin Gupta /* 4614f6ad66aSAchin Gupta * File has been successfully loaded. Update the free memory 4624f6ad66aSAchin Gupta * data structure & flush the contents of the TZRAM so that 4634f6ad66aSAchin Gupta * the next EL can see it. 4644f6ad66aSAchin Gupta */ 4654f6ad66aSAchin Gupta /* Update the memory contents */ 4669d72b4eaSJames Morrissey flush_dcache_range(image_base, image_size); 4674f6ad66aSAchin Gupta 4689d72b4eaSJames Morrissey mem_layout->free_size -= image_size + offset; 4694f6ad66aSAchin Gupta 4704f6ad66aSAchin Gupta /* Update the base of free memory since its moved up */ 4714f6ad66aSAchin Gupta if (load_type == BOT_LOAD) 4729d72b4eaSJames Morrissey mem_layout->free_base += offset + image_size; 4739d72b4eaSJames Morrissey 4749d72b4eaSJames Morrissey exit: 475*4112bfa0SVikram Kanigiri io_close(image_handle); 4769d72b4eaSJames Morrissey /* Ignore improbable/unrecoverable error in 'close' */ 4779d72b4eaSJames Morrissey 4789d72b4eaSJames Morrissey /* TODO: Consider maintaining open device connection from this bootloader stage */ 479*4112bfa0SVikram Kanigiri io_dev_close(dev_handle); 4809d72b4eaSJames Morrissey /* Ignore improbable/unrecoverable error in 'dev_close' */ 4814f6ad66aSAchin Gupta 482*4112bfa0SVikram Kanigiri return io_result; 4834f6ad66aSAchin Gupta } 484