14ecca339SDan Handley /* 24ecca339SDan Handley * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved. 34ecca339SDan Handley * 44ecca339SDan Handley * Redistribution and use in source and binary forms, with or without 54ecca339SDan Handley * modification, are permitted provided that the following conditions are met: 64ecca339SDan Handley * 74ecca339SDan Handley * Redistributions of source code must retain the above copyright notice, this 84ecca339SDan Handley * list of conditions and the following disclaimer. 94ecca339SDan Handley * 104ecca339SDan Handley * Redistributions in binary form must reproduce the above copyright notice, 114ecca339SDan Handley * this list of conditions and the following disclaimer in the documentation 124ecca339SDan Handley * and/or other materials provided with the distribution. 134ecca339SDan Handley * 144ecca339SDan Handley * Neither the name of ARM nor the names of its contributors may be used 154ecca339SDan Handley * to endorse or promote products derived from this software without specific 164ecca339SDan Handley * prior written permission. 174ecca339SDan Handley * 184ecca339SDan Handley * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 194ecca339SDan Handley * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 204ecca339SDan Handley * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 214ecca339SDan Handley * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 224ecca339SDan Handley * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 234ecca339SDan Handley * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 244ecca339SDan Handley * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 254ecca339SDan Handley * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 264ecca339SDan Handley * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 274ecca339SDan Handley * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 284ecca339SDan Handley * POSSIBILITY OF SUCH DAMAGE. 294ecca339SDan Handley */ 304ecca339SDan Handley 314ecca339SDan Handley #ifndef __BL_COMMON_H__ 324ecca339SDan Handley #define __BL_COMMON_H__ 334ecca339SDan Handley 344112bfa0SVikram Kanigiri #define SECURE 0x0 354112bfa0SVikram Kanigiri #define NON_SECURE 0x1 36d3280bebSJuan Castillo #define sec_state_is_valid(s) (((s) == SECURE) || ((s) == NON_SECURE)) 374ecca339SDan Handley 384ecca339SDan Handley #define UP 1 394ecca339SDan Handley #define DOWN 0 404ecca339SDan Handley 414ecca339SDan Handley /******************************************************************************* 428f55dfb4SSandrine Bailleux * Constants to identify the location of a memory region in a given memory 438f55dfb4SSandrine Bailleux * layout. 444ecca339SDan Handley ******************************************************************************/ 458f55dfb4SSandrine Bailleux #define TOP 0x1 468f55dfb4SSandrine Bailleux #define BOTTOM !TOP 474ecca339SDan Handley 484ecca339SDan Handley /****************************************************************************** 494ecca339SDan Handley * Opcode passed in x0 to tell next EL that we want to run an image. 504ecca339SDan Handley * Corresponds to the function ID of the only SMC that the BL1 exception 514ecca339SDan Handley * handlers service. That's why the chosen value is the first function ID of 524ecca339SDan Handley * the ARM SMC64 range. 534ecca339SDan Handley *****************************************************************************/ 544ecca339SDan Handley #define RUN_IMAGE 0xC0000000 554ecca339SDan Handley 5629fb905dSVikram Kanigiri /******************************************************************************* 5729fb905dSVikram Kanigiri * Constants that allow assembler code to access members of and the 584112bfa0SVikram Kanigiri * 'entry_point_info' structure at their correct offsets. 5929fb905dSVikram Kanigiri ******************************************************************************/ 604112bfa0SVikram Kanigiri #define ENTRY_POINT_INFO_PC_OFFSET 0x08 614112bfa0SVikram Kanigiri #define ENTRY_POINT_INFO_ARGS_OFFSET 0x18 624112bfa0SVikram Kanigiri 63167a9357SAndrew Thoelke #define PARAM_EP_SECURITY_MASK 0x1 644112bfa0SVikram Kanigiri #define GET_SECURITY_STATE(x) (x & PARAM_EP_SECURITY_MASK) 654112bfa0SVikram Kanigiri #define SET_SECURITY_STATE(x, security) \ 664112bfa0SVikram Kanigiri ((x) = ((x) & ~PARAM_EP_SECURITY_MASK) | (security)) 674112bfa0SVikram Kanigiri 68167a9357SAndrew Thoelke #define EP_EE_MASK 0x2 69167a9357SAndrew Thoelke #define EP_EE_LITTLE 0x0 70167a9357SAndrew Thoelke #define EP_EE_BIG 0x2 71167a9357SAndrew Thoelke #define EP_GET_EE(x) (x & EP_EE_MASK) 72167a9357SAndrew Thoelke #define EP_SET_EE(x, ee) ((x) = ((x) & ~EP_EE_MASK) | (ee)) 73167a9357SAndrew Thoelke 74167a9357SAndrew Thoelke #define EP_ST_MASK 0x4 75167a9357SAndrew Thoelke #define EP_ST_DISABLE 0x0 76167a9357SAndrew Thoelke #define EP_ST_ENABLE 0x4 77167a9357SAndrew Thoelke #define EP_GET_ST(x) (x & EP_ST_MASK) 78167a9357SAndrew Thoelke #define EP_SET_ST(x, ee) ((x) = ((x) & ~EP_ST_MASK) | (ee)) 79167a9357SAndrew Thoelke 804112bfa0SVikram Kanigiri #define PARAM_EP 0x01 814112bfa0SVikram Kanigiri #define PARAM_IMAGE_BINARY 0x02 824112bfa0SVikram Kanigiri #define PARAM_BL31 0x03 834112bfa0SVikram Kanigiri 844112bfa0SVikram Kanigiri #define VERSION_1 0x01 854112bfa0SVikram Kanigiri 864112bfa0SVikram Kanigiri #define SET_PARAM_HEAD(_p, _type, _ver, _attr) do { \ 874112bfa0SVikram Kanigiri (_p)->h.type = (uint8_t)(_type); \ 884112bfa0SVikram Kanigiri (_p)->h.version = (uint8_t)(_ver); \ 894112bfa0SVikram Kanigiri (_p)->h.size = (uint16_t)sizeof(*_p); \ 904112bfa0SVikram Kanigiri (_p)->h.attr = (uint32_t)(_attr) ; \ 914112bfa0SVikram Kanigiri } while (0) 924ecca339SDan Handley 9379a97b2eSYatharth Kochar /******************************************************************************* 9479a97b2eSYatharth Kochar * Constant that indicates if this is the first version of the reset handler 9579a97b2eSYatharth Kochar * contained in an image. This will be the case when the image is BL1 or when 9679a97b2eSYatharth Kochar * its BL3-1 and RESET_TO_BL31 is true. This constant enables a subsequent 9779a97b2eSYatharth Kochar * version of the reset handler to perform actions that override the ones 9879a97b2eSYatharth Kochar * performed in the first version of the code. This will be required when the 9979a97b2eSYatharth Kochar * first version exists in an un-modifiable image e.g. a BootROM image. 10079a97b2eSYatharth Kochar ******************************************************************************/ 10179a97b2eSYatharth Kochar #if IMAGE_BL1 || (IMAGE_BL31 && RESET_TO_BL31) 10279a97b2eSYatharth Kochar #define FIRST_RESET_HANDLER_CALL 10379a97b2eSYatharth Kochar #endif 10479a97b2eSYatharth Kochar 1054ecca339SDan Handley #ifndef __ASSEMBLY__ 10697043ac9SDan Handley #include <cdefs.h> /* For __dead2 */ 10729fb905dSVikram Kanigiri #include <cassert.h> 1084112bfa0SVikram Kanigiri #include <stdint.h> 1098f55dfb4SSandrine Bailleux #include <stddef.h> 1104ecca339SDan Handley 111a7e98ad5SVikram Kanigiri #define ARRAY_SIZE(a) (sizeof(a) / sizeof((a)[0])) 112a7e98ad5SVikram Kanigiri 113*90b3a6acSDan Handley /* 114*90b3a6acSDan Handley * Declarations of linker defined symbols to help determine memory layout of 115*90b3a6acSDan Handley * BL images 116*90b3a6acSDan Handley */ 117*90b3a6acSDan Handley extern unsigned long __RO_START__; 118*90b3a6acSDan Handley extern unsigned long __RO_END__; 119*90b3a6acSDan Handley #if IMAGE_BL2 120*90b3a6acSDan Handley extern unsigned long __BL2_END__; 121*90b3a6acSDan Handley #elif IMAGE_BL31 122*90b3a6acSDan Handley extern unsigned long __BL31_END__; 123*90b3a6acSDan Handley #elif IMAGE_BL32 124*90b3a6acSDan Handley extern unsigned long __BL32_END__; 125*90b3a6acSDan Handley #endif /* IMAGE_BLX */ 126*90b3a6acSDan Handley 127*90b3a6acSDan Handley #if USE_COHERENT_MEM 128*90b3a6acSDan Handley extern unsigned long __COHERENT_RAM_START__; 129*90b3a6acSDan Handley extern unsigned long __COHERENT_RAM_END__; 130*90b3a6acSDan Handley #endif 131*90b3a6acSDan Handley 132*90b3a6acSDan Handley 1334ecca339SDan Handley /******************************************************************************* 1344ecca339SDan Handley * Structure used for telling the next BL how much of a particular type of 1354ecca339SDan Handley * memory is available for its use and how much is already used. 1364ecca339SDan Handley ******************************************************************************/ 137fb037bfbSDan Handley typedef struct meminfo { 1388f55dfb4SSandrine Bailleux uint64_t total_base; 1398f55dfb4SSandrine Bailleux size_t total_size; 1408f55dfb4SSandrine Bailleux uint64_t free_base; 1418f55dfb4SSandrine Bailleux size_t free_size; 142fb037bfbSDan Handley } meminfo_t; 1434ecca339SDan Handley 144fb037bfbSDan Handley typedef struct aapcs64_params { 1454ecca339SDan Handley unsigned long arg0; 1464ecca339SDan Handley unsigned long arg1; 1474ecca339SDan Handley unsigned long arg2; 1484ecca339SDan Handley unsigned long arg3; 1494ecca339SDan Handley unsigned long arg4; 1504ecca339SDan Handley unsigned long arg5; 1514ecca339SDan Handley unsigned long arg6; 1524ecca339SDan Handley unsigned long arg7; 153fb037bfbSDan Handley } aapcs64_params_t; 1544ecca339SDan Handley 1554112bfa0SVikram Kanigiri /*************************************************************************** 1564112bfa0SVikram Kanigiri * This structure provides version information and the size of the 1574112bfa0SVikram Kanigiri * structure, attributes for the structure it represents 1584112bfa0SVikram Kanigiri ***************************************************************************/ 1594112bfa0SVikram Kanigiri typedef struct param_header { 1604112bfa0SVikram Kanigiri uint8_t type; /* type of the structure */ 1614112bfa0SVikram Kanigiri uint8_t version; /* version of this structure */ 1624112bfa0SVikram Kanigiri uint16_t size; /* size of this structure in bytes */ 1634112bfa0SVikram Kanigiri uint32_t attr; /* attributes: unused bits SBZ */ 1644112bfa0SVikram Kanigiri } param_header_t; 1654112bfa0SVikram Kanigiri 1664112bfa0SVikram Kanigiri /***************************************************************************** 1674112bfa0SVikram Kanigiri * This structure represents the superset of information needed while 1684112bfa0SVikram Kanigiri * switching exception levels. The only two mechanisms to do so are 1694112bfa0SVikram Kanigiri * ERET & SMC. Security state is indicated using bit zero of header 1704112bfa0SVikram Kanigiri * attribute 1714112bfa0SVikram Kanigiri * NOTE: BL1 expects entrypoint followed by spsr while processing 1724112bfa0SVikram Kanigiri * SMC to jump to BL31 from the start of entry_point_info 1734112bfa0SVikram Kanigiri *****************************************************************************/ 1744112bfa0SVikram Kanigiri typedef struct entry_point_info { 1754112bfa0SVikram Kanigiri param_header_t h; 1764112bfa0SVikram Kanigiri uintptr_t pc; 1774112bfa0SVikram Kanigiri uint32_t spsr; 178fb037bfbSDan Handley aapcs64_params_t args; 1794112bfa0SVikram Kanigiri } entry_point_info_t; 1804112bfa0SVikram Kanigiri 1814112bfa0SVikram Kanigiri /***************************************************************************** 1824112bfa0SVikram Kanigiri * Image info binary provides information from the image loader that 1834112bfa0SVikram Kanigiri * can be used by the firmware to manage available trusted RAM. 1844112bfa0SVikram Kanigiri * More advanced firmware image formats can provide additional 1854112bfa0SVikram Kanigiri * information that enables optimization or greater flexibility in the 1864112bfa0SVikram Kanigiri * common firmware code 1874112bfa0SVikram Kanigiri *****************************************************************************/ 1884112bfa0SVikram Kanigiri typedef struct image_info { 1894112bfa0SVikram Kanigiri param_header_t h; 1904112bfa0SVikram Kanigiri uintptr_t image_base; /* physical address of base of image */ 1914112bfa0SVikram Kanigiri uint32_t image_size; /* bytes read from image file */ 1924112bfa0SVikram Kanigiri } image_info_t; 1934ecca339SDan Handley 1944ecca339SDan Handley /******************************************************************************* 1954ecca339SDan Handley * This structure represents the superset of information that can be passed to 1964ecca339SDan Handley * BL31 e.g. while passing control to it from BL2. The BL32 parameters will be 1974112bfa0SVikram Kanigiri * populated only if BL2 detects its presence. A pointer to a structure of this 1984112bfa0SVikram Kanigiri * type should be passed in X3 to BL31's cold boot entrypoint 1994112bfa0SVikram Kanigiri * 2004112bfa0SVikram Kanigiri * Use of this structure and the X3 parameter is not mandatory: the BL3-1 2014112bfa0SVikram Kanigiri * platform code can use other mechanisms to provide the necessary information 2024112bfa0SVikram Kanigiri * about BL3-2 and BL3-3 to the common and SPD code. 2034112bfa0SVikram Kanigiri * 2044112bfa0SVikram Kanigiri * BL3-1 image information is mandatory if this structure is used. If either of 2054112bfa0SVikram Kanigiri * the optional BL3-2 and BL3-3 image information is not provided, this is 2064112bfa0SVikram Kanigiri * indicated by the respective image_info pointers being zero. 2074ecca339SDan Handley ******************************************************************************/ 2084112bfa0SVikram Kanigiri typedef struct bl31_params { 2094112bfa0SVikram Kanigiri param_header_t h; 2104112bfa0SVikram Kanigiri image_info_t *bl31_image_info; 2114112bfa0SVikram Kanigiri entry_point_info_t *bl32_ep_info; 2124112bfa0SVikram Kanigiri image_info_t *bl32_image_info; 2134112bfa0SVikram Kanigiri entry_point_info_t *bl33_ep_info; 2144112bfa0SVikram Kanigiri image_info_t *bl33_image_info; 2154112bfa0SVikram Kanigiri } bl31_params_t; 2164112bfa0SVikram Kanigiri 2174112bfa0SVikram Kanigiri 21829fb905dSVikram Kanigiri /* 2194112bfa0SVikram Kanigiri * Compile time assertions related to the 'entry_point_info' structure to 22029fb905dSVikram Kanigiri * ensure that the assembler and the compiler view of the offsets of 22129fb905dSVikram Kanigiri * the structure members is the same. 22229fb905dSVikram Kanigiri */ 2234112bfa0SVikram Kanigiri CASSERT(ENTRY_POINT_INFO_PC_OFFSET == 2244112bfa0SVikram Kanigiri __builtin_offsetof(entry_point_info_t, pc), \ 22529fb905dSVikram Kanigiri assert_BL31_pc_offset_mismatch); 22629fb905dSVikram Kanigiri 2274112bfa0SVikram Kanigiri CASSERT(ENTRY_POINT_INFO_ARGS_OFFSET == \ 2284112bfa0SVikram Kanigiri __builtin_offsetof(entry_point_info_t, args), \ 22929fb905dSVikram Kanigiri assert_BL31_args_offset_mismatch); 23029fb905dSVikram Kanigiri 2314112bfa0SVikram Kanigiri CASSERT(sizeof(unsigned long) == 2324112bfa0SVikram Kanigiri __builtin_offsetof(entry_point_info_t, spsr) - \ 2334112bfa0SVikram Kanigiri __builtin_offsetof(entry_point_info_t, pc), \ 23429fb905dSVikram Kanigiri assert_entrypoint_and_spsr_should_be_adjacent); 23529fb905dSVikram Kanigiri 2364ecca339SDan Handley /******************************************************************************* 2374ecca339SDan Handley * Function & variable prototypes 2384ecca339SDan Handley ******************************************************************************/ 239c6bc0710SDan Handley unsigned long page_align(unsigned long, unsigned); 240c6bc0710SDan Handley void change_security_state(unsigned int); 241c6bc0710SDan Handley unsigned long image_size(const char *); 2428f55dfb4SSandrine Bailleux int load_image(meminfo_t *mem_layout, 2438f55dfb4SSandrine Bailleux const char *image_name, 2448f55dfb4SSandrine Bailleux uint64_t image_base, 2458f55dfb4SSandrine Bailleux image_info_t *image_data, 2468f55dfb4SSandrine Bailleux entry_point_info_t *entry_point_info); 2474ecca339SDan Handley extern const char build_message[]; 248aaa3e722SJuan Castillo extern const char version_string[]; 2494ecca339SDan Handley 2508f55dfb4SSandrine Bailleux void reserve_mem(uint64_t *free_base, size_t *free_size, 2518f55dfb4SSandrine Bailleux uint64_t addr, size_t size); 2528f55dfb4SSandrine Bailleux 2534ecca339SDan Handley #endif /*__ASSEMBLY__*/ 2544ecca339SDan Handley 2554ecca339SDan Handley #endif /* __BL_COMMON_H__ */ 256