Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 1 | /* |
Manish V Badarkhe | 99575e4 | 2021-06-25 23:28:59 +0100 | [diff] [blame] | 2 | * Copyright (c) 2013-2021, ARM Limited and Contributors. All rights reserved. |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 3 | * |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 5 | */ |
| 6 | |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 7 | #include <assert.h> |
| 8 | |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 9 | #include <arch_helpers.h> |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 10 | #include <arch_features.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 11 | #include <bl1/bl1.h> |
| 12 | #include <bl2/bl2.h> |
| 13 | #include <common/bl_common.h> |
| 14 | #include <common/debug.h> |
| 15 | #include <drivers/auth/auth_mod.h> |
| 16 | #include <drivers/console.h> |
Manish V Badarkhe | 99575e4 | 2021-06-25 23:28:59 +0100 | [diff] [blame] | 17 | #include <drivers/fwu/fwu.h> |
Alexei Fedorov | 71707b1 | 2020-07-13 14:06:47 +0100 | [diff] [blame] | 18 | #if MEASURED_BOOT |
| 19 | #include <drivers/measured_boot/measured_boot.h> |
| 20 | #endif |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 21 | #include <lib/extensions/pauth.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 22 | #include <plat/common/platform.h> |
| 23 | |
Dan Handley | bcd60ba | 2014-04-17 18:53:42 +0100 | [diff] [blame] | 24 | #include "bl2_private.h" |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 25 | |
Julius Werner | 8e0ef0f | 2019-07-09 14:02:43 -0700 | [diff] [blame] | 26 | #ifdef __aarch64__ |
Roberto Vargas | e0e9946 | 2017-10-30 14:43:43 +0000 | [diff] [blame] | 27 | #define NEXT_IMAGE "BL31" |
Julius Werner | 8e0ef0f | 2019-07-09 14:02:43 -0700 | [diff] [blame] | 28 | #else |
| 29 | #define NEXT_IMAGE "BL32" |
Roberto Vargas | e0e9946 | 2017-10-30 14:43:43 +0000 | [diff] [blame] | 30 | #endif |
Vikram Kanigiri | da56743 | 2014-04-15 18:08:08 +0100 | [diff] [blame] | 31 | |
Antonio Nino Diaz | 4f29fb7 | 2019-01-31 17:40:44 +0000 | [diff] [blame] | 32 | #if !BL2_AT_EL3 |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 33 | /******************************************************************************* |
Antonio Nino Diaz | 6e4b083 | 2019-01-31 10:48:47 +0000 | [diff] [blame] | 34 | * Setup function for BL2. |
| 35 | ******************************************************************************/ |
| 36 | void bl2_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2, |
| 37 | u_register_t arg3) |
| 38 | { |
| 39 | /* Perform early platform-specific setup */ |
| 40 | bl2_early_platform_setup2(arg0, arg1, arg2, arg3); |
| 41 | |
Antonio Nino Diaz | 6e4b083 | 2019-01-31 10:48:47 +0000 | [diff] [blame] | 42 | /* Perform late platform-specific setup */ |
| 43 | bl2_plat_arch_setup(); |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 44 | |
| 45 | #if CTX_INCLUDE_PAUTH_REGS |
| 46 | /* |
| 47 | * Assert that the ARMv8.3-PAuth registers are present or an access |
| 48 | * fault will be triggered when they are being saved or restored. |
| 49 | */ |
| 50 | assert(is_armv8_3_pauth_present()); |
| 51 | #endif /* CTX_INCLUDE_PAUTH_REGS */ |
Antonio Nino Diaz | 6e4b083 | 2019-01-31 10:48:47 +0000 | [diff] [blame] | 52 | } |
Antonio Nino Diaz | 4f29fb7 | 2019-01-31 17:40:44 +0000 | [diff] [blame] | 53 | |
| 54 | #else /* if BL2_AT_EL3 */ |
| 55 | /******************************************************************************* |
| 56 | * Setup function for BL2 when BL2_AT_EL3=1. |
| 57 | ******************************************************************************/ |
| 58 | void bl2_el3_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2, |
| 59 | u_register_t arg3) |
| 60 | { |
| 61 | /* Perform early platform-specific setup */ |
| 62 | bl2_el3_early_platform_setup(arg0, arg1, arg2, arg3); |
| 63 | |
Antonio Nino Diaz | 4f29fb7 | 2019-01-31 17:40:44 +0000 | [diff] [blame] | 64 | /* Perform late platform-specific setup */ |
| 65 | bl2_el3_plat_arch_setup(); |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 66 | |
| 67 | #if CTX_INCLUDE_PAUTH_REGS |
| 68 | /* |
| 69 | * Assert that the ARMv8.3-PAuth registers are present or an access |
| 70 | * fault will be triggered when they are being saved or restored. |
| 71 | */ |
| 72 | assert(is_armv8_3_pauth_present()); |
| 73 | #endif /* CTX_INCLUDE_PAUTH_REGS */ |
Antonio Nino Diaz | 4f29fb7 | 2019-01-31 17:40:44 +0000 | [diff] [blame] | 74 | } |
| 75 | #endif /* BL2_AT_EL3 */ |
Antonio Nino Diaz | 6e4b083 | 2019-01-31 10:48:47 +0000 | [diff] [blame] | 76 | |
| 77 | /******************************************************************************* |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 78 | * The only thing to do in BL2 is to load further images and pass control to |
Yatharth Kochar | 51f76f6 | 2016-09-12 16:10:33 +0100 | [diff] [blame] | 79 | * next BL. The memory occupied by BL2 will be reclaimed by BL3x stages. BL2 |
| 80 | * runs entirely in S-EL1. |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 81 | ******************************************************************************/ |
| 82 | void bl2_main(void) |
| 83 | { |
Yatharth Kochar | 51f76f6 | 2016-09-12 16:10:33 +0100 | [diff] [blame] | 84 | entry_point_info_t *next_bl_ep_info; |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 85 | |
Dan Handley | 91b624e | 2014-07-29 17:14:00 +0100 | [diff] [blame] | 86 | NOTICE("BL2: %s\n", version_string); |
| 87 | NOTICE("BL2: %s\n", build_message); |
| 88 | |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 89 | /* Perform remaining generic architectural setup in S-EL1 */ |
| 90 | bl2_arch_setup(); |
| 91 | |
Manish V Badarkhe | 99575e4 | 2021-06-25 23:28:59 +0100 | [diff] [blame] | 92 | #if PSA_FWU_SUPPORT |
| 93 | fwu_init(); |
| 94 | #endif /* PSA_FWU_SUPPORT */ |
| 95 | |
Juan Castillo | 9246ab8 | 2015-01-28 16:46:57 +0000 | [diff] [blame] | 96 | #if TRUSTED_BOARD_BOOT |
| 97 | /* Initialize authentication module */ |
Juan Castillo | a08a5e7 | 2015-05-19 11:54:12 +0100 | [diff] [blame] | 98 | auth_mod_init(); |
Alexei Fedorov | 71707b1 | 2020-07-13 14:06:47 +0100 | [diff] [blame] | 99 | |
| 100 | #if MEASURED_BOOT |
| 101 | /* Initialize measured boot module */ |
| 102 | measured_boot_init(); |
| 103 | |
| 104 | #endif /* MEASURED_BOOT */ |
Juan Castillo | 9246ab8 | 2015-01-28 16:46:57 +0000 | [diff] [blame] | 105 | #endif /* TRUSTED_BOARD_BOOT */ |
| 106 | |
Alexei Fedorov | 71707b1 | 2020-07-13 14:06:47 +0100 | [diff] [blame] | 107 | /* Initialize boot source */ |
Roberto Vargas | bc1ae1f | 2017-09-26 12:53:01 +0100 | [diff] [blame] | 108 | bl2_plat_preload_setup(); |
| 109 | |
Yatharth Kochar | 51f76f6 | 2016-09-12 16:10:33 +0100 | [diff] [blame] | 110 | /* Load the subsequent bootloader images. */ |
| 111 | next_bl_ep_info = bl2_load_images(); |
Andrew Thoelke | a55566d | 2014-05-28 22:22:55 +0100 | [diff] [blame] | 112 | |
Alexei Fedorov | 71707b1 | 2020-07-13 14:06:47 +0100 | [diff] [blame] | 113 | #if MEASURED_BOOT |
| 114 | /* Finalize measured boot */ |
| 115 | measured_boot_finish(); |
| 116 | #endif /* MEASURED_BOOT */ |
| 117 | |
Yann Gautier | 60e5c2f | 2018-04-26 19:07:17 +0200 | [diff] [blame] | 118 | #if !BL2_AT_EL3 |
Julius Werner | 8e0ef0f | 2019-07-09 14:02:43 -0700 | [diff] [blame] | 119 | #ifndef __aarch64__ |
Yatharth Kochar | dafb247 | 2016-06-30 14:52:12 +0100 | [diff] [blame] | 120 | /* |
| 121 | * For AArch32 state BL1 and BL2 share the MMU setup. |
| 122 | * Given that BL2 does not map BL1 regions, MMU needs |
| 123 | * to be disabled in order to go back to BL1. |
| 124 | */ |
| 125 | disable_mmu_icache_secure(); |
Julius Werner | 8e0ef0f | 2019-07-09 14:02:43 -0700 | [diff] [blame] | 126 | #endif /* !__aarch64__ */ |
Yatharth Kochar | dafb247 | 2016-06-30 14:52:12 +0100 | [diff] [blame] | 127 | |
Antonio Nino Diaz | e3962d0 | 2017-02-16 16:17:19 +0000 | [diff] [blame] | 128 | console_flush(); |
| 129 | |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 130 | #if ENABLE_PAUTH |
| 131 | /* |
| 132 | * Disable pointer authentication before running next boot image |
| 133 | */ |
| 134 | pauth_disable_el1(); |
| 135 | #endif /* ENABLE_PAUTH */ |
| 136 | |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 137 | /* |
Yatharth Kochar | 51f76f6 | 2016-09-12 16:10:33 +0100 | [diff] [blame] | 138 | * Run next BL image via an SMC to BL1. Information on how to pass |
| 139 | * control to the BL32 (if present) and BL33 software images will |
| 140 | * be passed to next BL image as an argument. |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 141 | */ |
Yatharth Kochar | 51f76f6 | 2016-09-12 16:10:33 +0100 | [diff] [blame] | 142 | smc(BL1_SMC_RUN_IMAGE, (unsigned long)next_bl_ep_info, 0, 0, 0, 0, 0, 0); |
Antonio Nino Diaz | 4f29fb7 | 2019-01-31 17:40:44 +0000 | [diff] [blame] | 143 | #else /* if BL2_AT_EL3 */ |
Roberto Vargas | e0e9946 | 2017-10-30 14:43:43 +0000 | [diff] [blame] | 144 | NOTICE("BL2: Booting " NEXT_IMAGE "\n"); |
| 145 | print_entry_point_info(next_bl_ep_info); |
| 146 | console_flush(); |
| 147 | |
Alexei Fedorov | f41355c | 2019-09-13 14:11:59 +0100 | [diff] [blame] | 148 | #if ENABLE_PAUTH |
| 149 | /* |
| 150 | * Disable pointer authentication before running next boot image |
| 151 | */ |
| 152 | pauth_disable_el3(); |
| 153 | #endif /* ENABLE_PAUTH */ |
| 154 | |
Roberto Vargas | e0e9946 | 2017-10-30 14:43:43 +0000 | [diff] [blame] | 155 | bl2_run_next_image(next_bl_ep_info); |
Antonio Nino Diaz | 4f29fb7 | 2019-01-31 17:40:44 +0000 | [diff] [blame] | 156 | #endif /* BL2_AT_EL3 */ |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 157 | } |