Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 1 | /* |
Antonio Nino Diaz | 6e4b083 | 2019-01-31 10:48:47 +0000 | [diff] [blame] | 2 | * Copyright (c) 2013-2019, ARM Limited and Contributors. All rights reserved. |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 3 | * |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 5 | */ |
| 6 | |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 7 | #include <assert.h> |
| 8 | |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 9 | #include <arch_helpers.h> |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 10 | #include <arch_features.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 11 | #include <bl1/bl1.h> |
| 12 | #include <bl2/bl2.h> |
| 13 | #include <common/bl_common.h> |
| 14 | #include <common/debug.h> |
| 15 | #include <drivers/auth/auth_mod.h> |
| 16 | #include <drivers/console.h> |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 17 | #include <lib/extensions/pauth.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 18 | #include <plat/common/platform.h> |
| 19 | |
Dan Handley | bcd60ba | 2014-04-17 18:53:42 +0100 | [diff] [blame] | 20 | #include "bl2_private.h" |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 21 | |
Julius Werner | 8e0ef0f | 2019-07-09 14:02:43 -0700 | [diff] [blame] | 22 | #ifdef __aarch64__ |
Roberto Vargas | e0e9946 | 2017-10-30 14:43:43 +0000 | [diff] [blame] | 23 | #define NEXT_IMAGE "BL31" |
Julius Werner | 8e0ef0f | 2019-07-09 14:02:43 -0700 | [diff] [blame] | 24 | #else |
| 25 | #define NEXT_IMAGE "BL32" |
Roberto Vargas | e0e9946 | 2017-10-30 14:43:43 +0000 | [diff] [blame] | 26 | #endif |
Vikram Kanigiri | da56743 | 2014-04-15 18:08:08 +0100 | [diff] [blame] | 27 | |
Antonio Nino Diaz | 4f29fb7 | 2019-01-31 17:40:44 +0000 | [diff] [blame] | 28 | #if !BL2_AT_EL3 |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 29 | /******************************************************************************* |
Antonio Nino Diaz | 6e4b083 | 2019-01-31 10:48:47 +0000 | [diff] [blame] | 30 | * Setup function for BL2. |
| 31 | ******************************************************************************/ |
| 32 | void bl2_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2, |
| 33 | u_register_t arg3) |
| 34 | { |
| 35 | /* Perform early platform-specific setup */ |
| 36 | bl2_early_platform_setup2(arg0, arg1, arg2, arg3); |
| 37 | |
Antonio Nino Diaz | 6e4b083 | 2019-01-31 10:48:47 +0000 | [diff] [blame] | 38 | /* Perform late platform-specific setup */ |
| 39 | bl2_plat_arch_setup(); |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 40 | |
| 41 | #if CTX_INCLUDE_PAUTH_REGS |
| 42 | /* |
| 43 | * Assert that the ARMv8.3-PAuth registers are present or an access |
| 44 | * fault will be triggered when they are being saved or restored. |
| 45 | */ |
| 46 | assert(is_armv8_3_pauth_present()); |
| 47 | #endif /* CTX_INCLUDE_PAUTH_REGS */ |
Antonio Nino Diaz | 6e4b083 | 2019-01-31 10:48:47 +0000 | [diff] [blame] | 48 | } |
Antonio Nino Diaz | 4f29fb7 | 2019-01-31 17:40:44 +0000 | [diff] [blame] | 49 | |
| 50 | #else /* if BL2_AT_EL3 */ |
| 51 | /******************************************************************************* |
| 52 | * Setup function for BL2 when BL2_AT_EL3=1. |
| 53 | ******************************************************************************/ |
| 54 | void bl2_el3_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2, |
| 55 | u_register_t arg3) |
| 56 | { |
| 57 | /* Perform early platform-specific setup */ |
| 58 | bl2_el3_early_platform_setup(arg0, arg1, arg2, arg3); |
| 59 | |
Antonio Nino Diaz | 4f29fb7 | 2019-01-31 17:40:44 +0000 | [diff] [blame] | 60 | /* Perform late platform-specific setup */ |
| 61 | bl2_el3_plat_arch_setup(); |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 62 | |
| 63 | #if CTX_INCLUDE_PAUTH_REGS |
| 64 | /* |
| 65 | * Assert that the ARMv8.3-PAuth registers are present or an access |
| 66 | * fault will be triggered when they are being saved or restored. |
| 67 | */ |
| 68 | assert(is_armv8_3_pauth_present()); |
| 69 | #endif /* CTX_INCLUDE_PAUTH_REGS */ |
Antonio Nino Diaz | 4f29fb7 | 2019-01-31 17:40:44 +0000 | [diff] [blame] | 70 | } |
| 71 | #endif /* BL2_AT_EL3 */ |
Antonio Nino Diaz | 6e4b083 | 2019-01-31 10:48:47 +0000 | [diff] [blame] | 72 | |
| 73 | /******************************************************************************* |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 74 | * The only thing to do in BL2 is to load further images and pass control to |
Yatharth Kochar | 51f76f6 | 2016-09-12 16:10:33 +0100 | [diff] [blame] | 75 | * next BL. The memory occupied by BL2 will be reclaimed by BL3x stages. BL2 |
| 76 | * runs entirely in S-EL1. |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 77 | ******************************************************************************/ |
| 78 | void bl2_main(void) |
| 79 | { |
Yatharth Kochar | 51f76f6 | 2016-09-12 16:10:33 +0100 | [diff] [blame] | 80 | entry_point_info_t *next_bl_ep_info; |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 81 | |
Dan Handley | 91b624e | 2014-07-29 17:14:00 +0100 | [diff] [blame] | 82 | NOTICE("BL2: %s\n", version_string); |
| 83 | NOTICE("BL2: %s\n", build_message); |
| 84 | |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 85 | /* Perform remaining generic architectural setup in S-EL1 */ |
| 86 | bl2_arch_setup(); |
| 87 | |
Juan Castillo | 9246ab8 | 2015-01-28 16:46:57 +0000 | [diff] [blame] | 88 | #if TRUSTED_BOARD_BOOT |
| 89 | /* Initialize authentication module */ |
Juan Castillo | a08a5e7 | 2015-05-19 11:54:12 +0100 | [diff] [blame] | 90 | auth_mod_init(); |
Juan Castillo | 9246ab8 | 2015-01-28 16:46:57 +0000 | [diff] [blame] | 91 | #endif /* TRUSTED_BOARD_BOOT */ |
| 92 | |
Roberto Vargas | bc1ae1f | 2017-09-26 12:53:01 +0100 | [diff] [blame] | 93 | /* initialize boot source */ |
| 94 | bl2_plat_preload_setup(); |
| 95 | |
Yatharth Kochar | 51f76f6 | 2016-09-12 16:10:33 +0100 | [diff] [blame] | 96 | /* Load the subsequent bootloader images. */ |
| 97 | next_bl_ep_info = bl2_load_images(); |
Andrew Thoelke | a55566d | 2014-05-28 22:22:55 +0100 | [diff] [blame] | 98 | |
Yann Gautier | 60e5c2f | 2018-04-26 19:07:17 +0200 | [diff] [blame] | 99 | #if !BL2_AT_EL3 |
Julius Werner | 8e0ef0f | 2019-07-09 14:02:43 -0700 | [diff] [blame] | 100 | #ifndef __aarch64__ |
Yatharth Kochar | dafb247 | 2016-06-30 14:52:12 +0100 | [diff] [blame] | 101 | /* |
| 102 | * For AArch32 state BL1 and BL2 share the MMU setup. |
| 103 | * Given that BL2 does not map BL1 regions, MMU needs |
| 104 | * to be disabled in order to go back to BL1. |
| 105 | */ |
| 106 | disable_mmu_icache_secure(); |
Julius Werner | 8e0ef0f | 2019-07-09 14:02:43 -0700 | [diff] [blame] | 107 | #endif /* !__aarch64__ */ |
Yatharth Kochar | dafb247 | 2016-06-30 14:52:12 +0100 | [diff] [blame] | 108 | |
Antonio Nino Diaz | e3962d0 | 2017-02-16 16:17:19 +0000 | [diff] [blame] | 109 | console_flush(); |
| 110 | |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 111 | #if ENABLE_PAUTH |
| 112 | /* |
| 113 | * Disable pointer authentication before running next boot image |
| 114 | */ |
| 115 | pauth_disable_el1(); |
| 116 | #endif /* ENABLE_PAUTH */ |
| 117 | |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 118 | /* |
Yatharth Kochar | 51f76f6 | 2016-09-12 16:10:33 +0100 | [diff] [blame] | 119 | * Run next BL image via an SMC to BL1. Information on how to pass |
| 120 | * control to the BL32 (if present) and BL33 software images will |
| 121 | * be passed to next BL image as an argument. |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 122 | */ |
Yatharth Kochar | 51f76f6 | 2016-09-12 16:10:33 +0100 | [diff] [blame] | 123 | smc(BL1_SMC_RUN_IMAGE, (unsigned long)next_bl_ep_info, 0, 0, 0, 0, 0, 0); |
Antonio Nino Diaz | 4f29fb7 | 2019-01-31 17:40:44 +0000 | [diff] [blame] | 124 | #else /* if BL2_AT_EL3 */ |
Roberto Vargas | e0e9946 | 2017-10-30 14:43:43 +0000 | [diff] [blame] | 125 | NOTICE("BL2: Booting " NEXT_IMAGE "\n"); |
| 126 | print_entry_point_info(next_bl_ep_info); |
| 127 | console_flush(); |
| 128 | |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 129 | #if ENABLE_PAUTH |
| 130 | /* |
| 131 | * Disable pointer authentication before running next boot image |
| 132 | */ |
| 133 | pauth_disable_el3(); |
| 134 | #endif /* ENABLE_PAUTH */ |
| 135 | |
Roberto Vargas | e0e9946 | 2017-10-30 14:43:43 +0000 | [diff] [blame] | 136 | bl2_run_next_image(next_bl_ep_info); |
Antonio Nino Diaz | 4f29fb7 | 2019-01-31 17:40:44 +0000 | [diff] [blame] | 137 | #endif /* BL2_AT_EL3 */ |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 138 | } |