diff options
author | Vikram Kanigiri <vikram.kanigiri@arm.com> | 2014-04-15 18:08:08 +0100 |
---|---|---|
committer | Vikram Kanigiri <vikram.kanigiri@arm.com> | 2014-05-22 16:14:19 +0100 |
commit | 4112bfa0c223eda73af1cfe57ca7dc926f767dd8 (patch) | |
tree | 652b5cb01c095a39c771209caac10b6332a62929 /plat/fvp | |
parent | 29fb905d5f36a415a170a4bffeadf13b5f084345 (diff) |
Populate BL31 input parameters as per new spec
This patch is based on spec published at
https://github.com/ARM-software/tf-issues/issues/133
It rearranges the bl31_args struct into
bl31_params and bl31_plat_params which provide the
information needed for Trusted firmware and platform
specific data via x0 and x1
On the FVP platform BL3-1 params and BL3-1 plat params
and its constituents are stored at the start of TZDRAM.
The information about memory availability and size for
BL3-1, BL3-2 and BL3-3 is moved into platform specific data.
Change-Id: I8b32057a3d0dd3968ea26c2541a0714177820da9
Diffstat (limited to 'plat/fvp')
-rw-r--r-- | plat/fvp/bl1_plat_setup.c | 14 | ||||
-rw-r--r-- | plat/fvp/bl2_plat_setup.c | 207 | ||||
-rw-r--r-- | plat/fvp/bl31_plat_setup.c | 33 | ||||
-rw-r--r-- | plat/fvp/platform.h | 64 |
4 files changed, 266 insertions, 52 deletions
diff --git a/plat/fvp/bl1_plat_setup.c b/plat/fvp/bl1_plat_setup.c index edd3f7b..ac3b69a 100644 --- a/plat/fvp/bl1_plat_setup.c +++ b/plat/fvp/bl1_plat_setup.c @@ -144,3 +144,17 @@ void bl1_plat_arch_setup(void) BL1_COHERENT_RAM_BASE, BL1_COHERENT_RAM_LIMIT); } + + +/******************************************************************************* + * Before calling this function BL2 is loaded in memory and its entrypoint + * is set by load_image. This is a placeholder for the platform to change + * the entrypoint of BL2 and set SPSR and security state. + * On FVP we are only setting the security state, entrypoint + ******************************************************************************/ +void bl1_plat_set_bl2_ep_info(image_info_t *bl2_image, + entry_point_info_t *bl2_ep) +{ + SET_SECURITY_STATE(bl2_ep->h.attr, SECURE); + bl2_ep->spsr = SPSR_64(MODE_EL1, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS); +} diff --git a/plat/fvp/bl2_plat_setup.c b/plat/fvp/bl2_plat_setup.c index ddd3b01..1eb8001 100644 --- a/plat/fvp/bl2_plat_setup.c +++ b/plat/fvp/bl2_plat_setup.c @@ -34,6 +34,7 @@ #include <bl2.h> #include <console.h> #include <platform.h> +#include <string.h> /******************************************************************************* * Declarations of linker defined symbols which will help us find the layout @@ -73,10 +74,12 @@ __attribute__ ((aligned(PLATFORM_CACHE_LINE_SIZE), section("tzfw_coherent_mem"))); /******************************************************************************* - * Reference to structure which holds the arguments which need to be passed + * Reference to structures which holds the arguments which need to be passed * to BL31 ******************************************************************************/ -static bl31_args_t *bl2_to_bl31_args; +static bl31_params_t *bl2_to_bl31_params; +static bl31_plat_params_t *bl2_to_bl31_plat_params; +static entry_point_info_t *bl31_ep_info; meminfo_t *bl2_plat_sec_mem_layout(void) { @@ -84,14 +87,104 @@ meminfo_t *bl2_plat_sec_mem_layout(void) } /******************************************************************************* + * This function assigns a pointer to the memory that the platform has kept + * aside to pass platform specific and trusted firmware related information + * to BL31. This memory is allocated by allocating memory to + * bl2_to_bl31_params_mem_t structure which is a superset of all the + * structure whose information is passed to BL31 + * NOTE: This function should be called only once and should be done + * before generating params to BL31 + ******************************************************************************/ +bl31_params_t *bl2_plat_get_bl31_params(void) +{ + bl2_to_bl31_params_mem_t *bl31_params_mem; + + /* + * Ensure that the secure DRAM memory used for passing BL31 arguments + * does not overlap with the BL32_BASE. + */ + assert(BL32_BASE > PARAMS_BASE + sizeof(bl2_to_bl31_params_mem_t)); + + /* + * Allocate the memory for all the arguments that needs to + * be passed to BL31 + */ + bl31_params_mem = (bl2_to_bl31_params_mem_t *)PARAMS_BASE; + memset((void *)PARAMS_BASE, 0, sizeof(bl2_to_bl31_params_mem_t)); + + /* Assign memory for TF related information */ + bl2_to_bl31_params = &bl31_params_mem->bl31_params; + SET_PARAM_HEAD(bl2_to_bl31_params, PARAM_BL31, VERSION_1, 0); + + /* Assign memory for platform specific information */ + bl2_to_bl31_plat_params = &bl31_params_mem->bl31_plat_params; + + /* Fill BL31 related information */ + bl31_ep_info = &bl31_params_mem->bl31_ep_info; + bl2_to_bl31_params->bl31_image_info = &bl31_params_mem->bl31_image_info; + SET_PARAM_HEAD(bl2_to_bl31_params->bl31_image_info, PARAM_IMAGE_BINARY, + VERSION_1, 0); + + /* Fill BL32 related information if it exists */ + if (BL32_BASE) { + bl2_to_bl31_params->bl32_ep_info = + &bl31_params_mem->bl32_ep_info; + SET_PARAM_HEAD(bl2_to_bl31_params->bl32_ep_info, + PARAM_EP, VERSION_1, 0); + bl2_to_bl31_params->bl32_image_info = + &bl31_params_mem->bl32_image_info; + SET_PARAM_HEAD(bl2_to_bl31_params->bl32_image_info, + PARAM_IMAGE_BINARY, + VERSION_1, 0); + /* + * Populate the extents of memory available for loading BL32. + * TODO: We are temporarily executing BL2 from TZDRAM; + * will eventually move to Trusted SRAM + */ + bl2_to_bl31_plat_params->bl32_meminfo.total_base = BL32_BASE; + bl2_to_bl31_plat_params->bl32_meminfo.free_base = BL32_BASE; + bl2_to_bl31_plat_params->bl32_meminfo.total_size = + (TZDRAM_BASE + TZDRAM_SIZE) - BL32_BASE; + bl2_to_bl31_plat_params->bl32_meminfo.free_size = + (TZDRAM_BASE + TZDRAM_SIZE) - BL32_BASE; + bl2_to_bl31_plat_params->bl32_meminfo.attr = BOT_LOAD; + } + + /* Fill BL33 related information */ + bl2_to_bl31_params->bl33_ep_info = &bl31_params_mem->bl33_ep_info; + SET_PARAM_HEAD(bl2_to_bl31_params->bl33_ep_info, + PARAM_EP, VERSION_1, 0); + bl2_to_bl31_params->bl33_image_info = &bl31_params_mem->bl33_image_info; + SET_PARAM_HEAD(bl2_to_bl31_params->bl33_image_info, PARAM_IMAGE_BINARY, + VERSION_1, 0); + /* Populate the extents of memory available for loading BL33 */ + bl2_to_bl31_plat_params->bl33_meminfo.total_base = DRAM_BASE; + bl2_to_bl31_plat_params->bl33_meminfo.total_size = DRAM_SIZE; + bl2_to_bl31_plat_params->bl33_meminfo.free_base = DRAM_BASE; + bl2_to_bl31_plat_params->bl33_meminfo.free_size = DRAM_SIZE; + + return bl2_to_bl31_params; +} + +/******************************************************************************* * This function returns a pointer to the memory that the platform has kept - * aside to pass all the information that BL31 could need. + * aside to pass platform related information that BL31 could need + ******************************************************************************/ +bl31_plat_params_t *bl2_plat_get_bl31_plat_params(void) +{ + return bl2_to_bl31_plat_params; +} + +/******************************************************************************* + * This function returns a pointer to the shared memory that the platform + * has kept to point to entry point information of BL31 to BL2 ******************************************************************************/ -bl31_args_t *bl2_get_bl31_args_ptr(void) +struct entry_point_info *bl2_plat_get_bl31_ep_info(void) { - return bl2_to_bl31_args; + return bl31_ep_info; } + /******************************************************************************* * BL1 has passed the extents of the trusted SRAM that should be visible to BL2 * in x0. This memory layout is sitting at the base of the free trusted SRAM. @@ -118,7 +211,7 @@ void bl2_early_platform_setup(meminfo_t *mem_layout) * Perform platform specific setup. For now just initialize the memory location * to use for passing arguments to BL31. ******************************************************************************/ -void bl2_platform_setup() +void bl2_platform_setup(void) { /* * Do initial security configuration to allow DRAM/device access. On @@ -130,41 +223,16 @@ void bl2_platform_setup() /* Initialise the IO layer and register platform IO devices */ io_setup(); +} - /* - * Ensure that the secure DRAM memory used for passing BL31 arguments - * does not overlap with the BL32_BASE. - */ - assert (BL32_BASE > TZDRAM_BASE + sizeof(bl31_args_t)); - - /* Use the Trusted DRAM for passing args to BL31 */ - bl2_to_bl31_args = (bl31_args_t *) TZDRAM_BASE; - - /* Populate the extents of memory available for loading BL33 */ - bl2_to_bl31_args->bl33_meminfo.total_base = DRAM_BASE; - bl2_to_bl31_args->bl33_meminfo.total_size = DRAM_SIZE; - bl2_to_bl31_args->bl33_meminfo.free_base = DRAM_BASE; - bl2_to_bl31_args->bl33_meminfo.free_size = DRAM_SIZE; - bl2_to_bl31_args->bl33_meminfo.attr = 0; - bl2_to_bl31_args->bl33_meminfo.next = 0; - - /* - * Populate the extents of memory available for loading BL32. - * TODO: We are temporarily executing BL2 from TZDRAM; will eventually - * move to Trusted SRAM - */ - bl2_to_bl31_args->bl32_meminfo.total_base = BL32_BASE; - bl2_to_bl31_args->bl32_meminfo.free_base = BL32_BASE; - - bl2_to_bl31_args->bl32_meminfo.total_size = - (TZDRAM_BASE + TZDRAM_SIZE) - BL32_BASE; - bl2_to_bl31_args->bl32_meminfo.free_size = - (TZDRAM_BASE + TZDRAM_SIZE) - BL32_BASE; - - bl2_to_bl31_args->bl32_meminfo.attr = BOT_LOAD; - bl2_to_bl31_args->bl32_meminfo.next = 0; +/* Flush the TF params and the TF plat params */ +void bl2_plat_flush_bl31_params(void) +{ + flush_dcache_range((unsigned long)PARAMS_BASE, \ + sizeof(bl2_to_bl31_params_mem_t)); } + /******************************************************************************* * Perform the very early platform specific architectural setup here. At the * moment this is only intializes the mmu in a quick and dirty way. @@ -177,3 +245,66 @@ void bl2_plat_arch_setup() BL2_COHERENT_RAM_BASE, BL2_COHERENT_RAM_LIMIT); } + +/******************************************************************************* + * Before calling this function BL31 is loaded in memory and its entrypoint + * is set by load_image. This is a placeholder for the platform to change + * the entrypoint of BL31 and set SPSR and security state. + * On FVP we are only setting the security state, entrypoint + ******************************************************************************/ +void bl2_plat_set_bl31_ep_info(image_info_t *bl31_image_info, + entry_point_info_t *bl31_ep_info) +{ + SET_SECURITY_STATE(bl31_ep_info->h.attr, SECURE); + bl31_ep_info->spsr = SPSR_64(MODE_EL3, MODE_SP_ELX, + DISABLE_ALL_EXCEPTIONS); +} + + +/******************************************************************************* + * Before calling this function BL32 is loaded in memory and its entrypoint + * is set by load_image. This is a placeholder for the platform to change + * the entrypoint of BL32 and set SPSR and security state. + * On FVP we are only setting the security state, entrypoint + ******************************************************************************/ +void bl2_plat_set_bl32_ep_info(image_info_t *bl32_image_info, + entry_point_info_t *bl32_ep_info) +{ + SET_SECURITY_STATE(bl32_ep_info->h.attr, SECURE); + /* + * The Secure Payload Dispatcher service is responsible for + * setting the SPSR prior to entry into the BL32 image. + */ + bl32_ep_info->spsr = 0; +} + +/******************************************************************************* + * Before calling this function BL33 is loaded in memory and its entrypoint + * is set by load_image. This is a placeholder for the platform to change + * the entrypoint of BL33 and set SPSR and security state. + * On FVP we are only setting the security state, entrypoint + ******************************************************************************/ +void bl2_plat_set_bl33_ep_info(image_info_t *image, + entry_point_info_t *bl33_ep_info) +{ + unsigned long el_status; + unsigned int mode; + + /* Figure out what mode we enter the non-secure world in */ + el_status = read_id_aa64pfr0_el1() >> ID_AA64PFR0_EL2_SHIFT; + el_status &= ID_AA64PFR0_ELX_MASK; + + if (el_status) + mode = MODE_EL2; + else + mode = MODE_EL1; + + /* + * TODO: Consider the possibility of specifying the SPSR in + * the FIP ToC and allowing the platform to have a say as + * well. + */ + bl33_ep_info->spsr = SPSR_64(mode, MODE_SP_ELX, + DISABLE_ALL_EXCEPTIONS); + SET_SECURITY_STATE(bl33_ep_info->h.attr, NON_SECURE); +} diff --git a/plat/fvp/bl31_plat_setup.c b/plat/fvp/bl31_plat_setup.c index baf7df1..83072e4 100644 --- a/plat/fvp/bl31_plat_setup.c +++ b/plat/fvp/bl31_plat_setup.c @@ -29,6 +29,7 @@ */ #include <arch.h> +#include <assert.h> #include <bl_common.h> #include <bl31.h> #include <console.h> @@ -70,34 +71,35 @@ extern unsigned long __COHERENT_RAM_END__; * Reference to structure which holds the arguments that have been passed to * BL31 from BL2. ******************************************************************************/ -static bl31_args_t *bl2_to_bl31_args; +static bl31_params_t *bl2_to_bl31_params; +static bl31_plat_params_t *bl2_to_bl31_plat_params; meminfo_t *bl31_plat_sec_mem_layout(void) { - return &bl2_to_bl31_args->bl31_meminfo; + return &bl2_to_bl31_plat_params->bl31_meminfo; } meminfo_t *bl31_plat_get_bl32_mem_layout(void) { - return &bl2_to_bl31_args->bl32_meminfo; + return &bl2_to_bl31_plat_params->bl32_meminfo; } /******************************************************************************* - * Return a pointer to the 'el_change_info' structure of the next image for the + * Return a pointer to the 'entry_point_info' structure of the next image for the * security state specified. BL33 corresponds to the non-secure image type * while BL32 corresponds to the secure image type. A NULL pointer is returned * if the image does not exist. ******************************************************************************/ -el_change_info_t *bl31_get_next_image_info(uint32_t type) +entry_point_info_t *bl31_get_next_image_info(uint32_t type) { - el_change_info_t *next_image_info; + entry_point_info_t *next_image_info; next_image_info = (type == NON_SECURE) ? - &bl2_to_bl31_args->bl33_image_info : - &bl2_to_bl31_args->bl32_image_info; + bl2_to_bl31_params->bl33_ep_info : + bl2_to_bl31_params->bl32_ep_info; /* None of the images on this platform can have 0x0 as the entrypoint */ - if (next_image_info->entrypoint) + if (next_image_info->pc) return next_image_info; else return NULL; @@ -114,10 +116,15 @@ el_change_info_t *bl31_get_next_image_info(uint32_t type) * has flushed this information to memory, so we are guaranteed to pick up good * data ******************************************************************************/ -void bl31_early_platform_setup(bl31_args_t *from_bl2, - void *data) +void bl31_early_platform_setup(bl31_params_t *from_bl2, + bl31_plat_params_t *plat_info_from_bl2) { - bl2_to_bl31_args = from_bl2; + assert(from_bl2->h.type == PARAM_BL31); + assert(from_bl2->h.version >= VERSION_1); + + bl2_to_bl31_params = from_bl2; + bl2_to_bl31_plat_params = plat_info_from_bl2; + /* Initialize the console to provide early debug support */ console_init(PL011_UART0_BASE); @@ -172,7 +179,7 @@ void bl31_platform_setup() ******************************************************************************/ void bl31_plat_arch_setup() { - configure_mmu_el3(&bl2_to_bl31_args->bl31_meminfo, + configure_mmu_el3(&bl2_to_bl31_plat_params->bl31_meminfo, BL31_RO_BASE, BL31_RO_LIMIT, BL31_COHERENT_RAM_BASE, diff --git a/plat/fvp/platform.h b/plat/fvp/platform.h index 40f780e..85a74bc 100644 --- a/plat/fvp/platform.h +++ b/plat/fvp/platform.h @@ -134,6 +134,10 @@ #define TZDRAM_SIZE 0x02000000 #define MBOX_OFF 0x1000 +/* Base address where parameters to BL31 are stored */ +#define PARAMS_BASE TZDRAM_BASE + + #define DRAM_BASE 0x80000000ull #define DRAM_SIZE 0x80000000ull @@ -339,7 +343,7 @@ #ifndef __ASSEMBLY__ #include <stdint.h> - +#include <bl_common.h> typedef volatile struct mailbox { unsigned long value @@ -351,6 +355,28 @@ typedef volatile struct mailbox { ******************************************************************************/ struct plat_pm_ops; struct meminfo; +struct bl31_params; +struct bl31_plat_params; +struct image_info; +struct entry_point_info; + + +/******************************************************************************* + * This structure represents the superset of information that is passed to + * BL31 e.g. while passing control to it from BL2 which is bl31_params + * and bl31_plat_params and its elements + ******************************************************************************/ +typedef struct bl2_to_bl31_params_mem { + struct bl31_params bl31_params; + struct bl31_plat_params bl31_plat_params; + struct image_info bl31_image_info; + struct image_info bl32_image_info; + struct image_info bl33_image_info; + struct entry_point_info bl33_ep_info; + struct entry_point_info bl32_ep_info; + struct entry_point_info bl31_ep_info; +} bl2_to_bl31_params_mem_t; + /******************************************************************************* * Function and variable prototypes @@ -412,6 +438,42 @@ extern int plat_get_image_source(const char *image_name, /* Declarations for plat_security.c */ extern void plat_security_setup(void); +/* + * Before calling this function BL2 is loaded in memory and its entrypoint + * is set by load_image. This is a placeholder for the platform to change + * the entrypoint of BL2 and set SPSR and security state. + * On FVP we are only setting the security state, entrypoint + */ +extern void bl1_plat_set_bl2_ep_info(struct image_info *image, + struct entry_point_info *ep); + +/* + * Before calling this function BL31 is loaded in memory and its entrypoint + * is set by load_image. This is a placeholder for the platform to change + * the entrypoint of BL31 and set SPSR and security state. + * On FVP we are only setting the security state, entrypoint + */ +extern void bl2_plat_set_bl31_ep_info(struct image_info *image, + struct entry_point_info *ep); + +/* + * Before calling this function BL32 is loaded in memory and its entrypoint + * is set by load_image. This is a placeholder for the platform to change + * the entrypoint of BL32 and set SPSR and security state. + * On FVP we are only setting the security state, entrypoint + */ +extern void bl2_plat_set_bl32_ep_info(struct image_info *image, + struct entry_point_info *ep); + +/* + * Before calling this function BL33 is loaded in memory and its entrypoint + * is set by load_image. This is a placeholder for the platform to change + * the entrypoint of BL33 and set SPSR and security state. + * On FVP we are only setting the security state, entrypoint + */ +extern void bl2_plat_set_bl33_ep_info(struct image_info *image, + struct entry_point_info *ep); + #endif /*__ASSEMBLY__*/ |