diff options
author | Furquan Shaikh <furquan@google.com> | 2015-05-28 12:13:51 -0700 |
---|---|---|
committer | Patrick Georgi <pgeorgi@google.com> | 2015-06-30 08:10:28 +0200 |
commit | a384c2899d5440a216eadbb6a144ba7d49e3674e (patch) | |
tree | 5e700a82b37b159a86c302d28aa8b7de91b16e68 /src/arch/arm64/arm_tf.c | |
parent | add740ac2857263769cfcfb72351b1cecc3f7cfd (diff) | |
download | coreboot-a384c2899d5440a216eadbb6a144ba7d49e3674e.tar.xz |
arm64: Add support for loading secure os
Add support for loading secure os and pass its entrypoint as bl32 params
to bl31 stage.
BUG=chrome-os-partner:40713
BRANCH=None
TEST=Compiles successfully and loads secure os
Change-Id: I1409ccb7344c1d1b1ddc2b321fdae1beea2f823d
Signed-off-by: Patrick Georgi <pgeorgi@chromium.org>
Original-Commit-Id: d3dc19025ff11c1e0590306230df7654ef9ad086
Original-Change-Id: Iafd540bf2906d10b5ee009e96179121fecbf5e11
Original-Signed-off-by: Furquan Shaikh <furquan@google.com>
Original-Reviewed-on: https://chromium-review.googlesource.com/273719
Original-Reviewed-by: Julius Werner <jwerner@chromium.org>
Original-Commit-Queue: Furquan Shaikh <furquan@chromium.org>
Original-Trybot-Ready: Furquan Shaikh <furquan@chromium.org>
Original-Tested-by: Furquan Shaikh <furquan@chromium.org>
Reviewed-on: http://review.coreboot.org/10693
Tested-by: build bot (Jenkins)
Reviewed-by: Stefan Reinauer <stefan.reinauer@coreboot.org>
Diffstat (limited to 'src/arch/arm64/arm_tf.c')
-rw-r--r-- | src/arch/arm64/arm_tf.c | 20 |
1 files changed, 19 insertions, 1 deletions
diff --git a/src/arch/arm64/arm_tf.c b/src/arch/arm64/arm_tf.c index 29dc7c344f..9b0f19fc63 100644 --- a/src/arch/arm64/arm_tf.c +++ b/src/arch/arm64/arm_tf.c @@ -18,6 +18,8 @@ */ #include <arch/cache.h> +#include <arch/lib_helpers.h> +#include <arch/transition.h> #include <arm_tf.h> #include <assert.h> #include <cbfs.h> @@ -32,8 +34,8 @@ static image_info_t bl31_image_info; static image_info_t bl32_image_info; static image_info_t bl33_image_info; -static entry_point_info_t bl32_ep_info; */ +static entry_point_info_t bl32_ep_info; static entry_point_info_t bl33_ep_info; static bl31_params_t bl31_params; @@ -57,6 +59,22 @@ void arm_tf_run_bl31(u64 payload_entry, u64 payload_arg0, u64 payload_spsr) bl31_entry = prog_entry(&bl31); SET_PARAM_HEAD(&bl31_params, PARAM_BL31, VERSION_1, 0); + + if (IS_ENABLED(CONFIG_ARM64_USE_SECURE_OS)) { + struct prog bl32 = PROG_INIT(ASSET_BL32, CONFIG_CBFS_PREFIX"/secure_os"); + + if (prog_locate(&bl32)) + die("BL31 not found"); + + if (cbfs_prog_stage_load(&bl32)) + die("BL31 load failed"); + + SET_PARAM_HEAD(&bl32_ep_info, PARAM_EP, VERSION_1, PARAM_EP_SECURE); + bl32_ep_info.pc = (uintptr_t)prog_entry(&bl32); + bl32_ep_info.spsr = SPSR_EXCEPTION_MASK | get_eret_el(EL1, SPSR_USE_L); + bl31_params.bl32_ep_info = &bl32_ep_info; + } + bl31_params.bl33_ep_info = &bl33_ep_info; SET_PARAM_HEAD(&bl33_ep_info, PARAM_EP, VERSION_1, PARAM_EP_NON_SECURE); |