blob: f12c1a5e422b29661757234d2ad505563297c8a9 [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Chris Kay99b5b2e2024-03-08 16:08:31 +00002 * Copyright (c) 2013-2024, Arm Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Achin Gupta4f6ad662013-10-25 09:08:21 +01005 */
6
Alexei Fedorovf41355c2019-09-13 14:11:59 +01007#include <assert.h>
8
Achin Gupta4f6ad662013-10-25 09:08:21 +01009#include <arch_helpers.h>
Alexei Fedorovf41355c2019-09-13 14:11:59 +010010#include <arch_features.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000011#include <bl1/bl1.h>
12#include <bl2/bl2.h>
13#include <common/bl_common.h>
Chris Kay99b5b2e2024-03-08 16:08:31 +000014#include <common/build_message.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000015#include <common/debug.h>
16#include <drivers/auth/auth_mod.h>
Manish V Badarkhe92de80a2021-12-16 10:41:47 +000017#include <drivers/auth/crypto_mod.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000018#include <drivers/console.h>
Manish V Badarkhe99575e42021-06-25 23:28:59 +010019#include <drivers/fwu/fwu.h>
thagon01-arm6805e8d2023-07-12 10:43:58 -050020#include <lib/bootmarker_capture.h>
Alexei Fedorovf41355c2019-09-13 14:11:59 +010021#include <lib/extensions/pauth.h>
thagon01-arm6805e8d2023-07-12 10:43:58 -050022#include <lib/pmf/pmf.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000023#include <plat/common/platform.h>
24
Dan Handleybcd60ba2014-04-17 18:53:42 +010025#include "bl2_private.h"
Achin Gupta4f6ad662013-10-25 09:08:21 +010026
Julius Werner8e0ef0f2019-07-09 14:02:43 -070027#ifdef __aarch64__
Roberto Vargase0e99462017-10-30 14:43:43 +000028#define NEXT_IMAGE "BL31"
Julius Werner8e0ef0f2019-07-09 14:02:43 -070029#else
30#define NEXT_IMAGE "BL32"
Roberto Vargase0e99462017-10-30 14:43:43 +000031#endif
Vikram Kanigirida567432014-04-15 18:08:08 +010032
thagon01-arm6805e8d2023-07-12 10:43:58 -050033#if ENABLE_RUNTIME_INSTRUMENTATION
34 PMF_REGISTER_SERVICE(bl_svc, PMF_RT_INSTR_SVC_ID,
35 BL_TOTAL_IDS, PMF_DUMP_ENABLE);
36#endif
37
Arvind Ram Prakash11b9b492022-11-22 14:41:00 -060038#if RESET_TO_BL2
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010039/*******************************************************************************
Arvind Ram Prakash11b9b492022-11-22 14:41:00 -060040 * Setup function for BL2 when RESET_TO_BL2=1
Antonio Nino Diaz6e4b0832019-01-31 10:48:47 +000041 ******************************************************************************/
Zelalem Aweke688fbf72021-07-09 11:37:10 -050042void bl2_el3_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
43 u_register_t arg3)
Antonio Nino Diaz6e4b0832019-01-31 10:48:47 +000044{
Yann Gautier5ae29c02024-01-16 19:39:31 +010045 /* Enable early console if EARLY_CONSOLE flag is enabled */
46 plat_setup_early_console();
47
Antonio Nino Diaz6e4b0832019-01-31 10:48:47 +000048 /* Perform early platform-specific setup */
Zelalem Aweke688fbf72021-07-09 11:37:10 -050049 bl2_el3_early_platform_setup(arg0, arg1, arg2, arg3);
Antonio Nino Diaz6e4b0832019-01-31 10:48:47 +000050
Antonio Nino Diaz6e4b0832019-01-31 10:48:47 +000051 /* Perform late platform-specific setup */
Zelalem Aweke688fbf72021-07-09 11:37:10 -050052 bl2_el3_plat_arch_setup();
Alexei Fedorovf41355c2019-09-13 14:11:59 +010053
54#if CTX_INCLUDE_PAUTH_REGS
55 /*
56 * Assert that the ARMv8.3-PAuth registers are present or an access
57 * fault will be triggered when they are being saved or restored.
58 */
59 assert(is_armv8_3_pauth_present());
60#endif /* CTX_INCLUDE_PAUTH_REGS */
Antonio Nino Diaz6e4b0832019-01-31 10:48:47 +000061}
Arvind Ram Prakash11b9b492022-11-22 14:41:00 -060062#else /* RESET_TO_BL2 */
63
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +000064/*******************************************************************************
Arvind Ram Prakash11b9b492022-11-22 14:41:00 -060065 * Setup function for BL2 when RESET_TO_BL2=0
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +000066 ******************************************************************************/
Zelalem Aweke688fbf72021-07-09 11:37:10 -050067void bl2_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
68 u_register_t arg3)
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +000069{
Yann Gautier5ae29c02024-01-16 19:39:31 +010070 /* Enable early console if EARLY_CONSOLE flag is enabled */
71 plat_setup_early_console();
72
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +000073 /* Perform early platform-specific setup */
Zelalem Aweke688fbf72021-07-09 11:37:10 -050074 bl2_early_platform_setup2(arg0, arg1, arg2, arg3);
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +000075
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +000076 /* Perform late platform-specific setup */
Zelalem Aweke688fbf72021-07-09 11:37:10 -050077 bl2_plat_arch_setup();
Alexei Fedorovf41355c2019-09-13 14:11:59 +010078
79#if CTX_INCLUDE_PAUTH_REGS
80 /*
81 * Assert that the ARMv8.3-PAuth registers are present or an access
82 * fault will be triggered when they are being saved or restored.
83 */
84 assert(is_armv8_3_pauth_present());
85#endif /* CTX_INCLUDE_PAUTH_REGS */
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +000086}
Arvind Ram Prakash11b9b492022-11-22 14:41:00 -060087#endif /* RESET_TO_BL2 */
Antonio Nino Diaz6e4b0832019-01-31 10:48:47 +000088
89/*******************************************************************************
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010090 * The only thing to do in BL2 is to load further images and pass control to
Yatharth Kochar51f76f62016-09-12 16:10:33 +010091 * next BL. The memory occupied by BL2 will be reclaimed by BL3x stages. BL2
92 * runs entirely in S-EL1.
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010093 ******************************************************************************/
94void bl2_main(void)
95{
Yatharth Kochar51f76f62016-09-12 16:10:33 +010096 entry_point_info_t *next_bl_ep_info;
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010097
thagon01-arm6805e8d2023-07-12 10:43:58 -050098#if ENABLE_RUNTIME_INSTRUMENTATION
99 PMF_CAPTURE_TIMESTAMP(bl_svc, BL2_ENTRY, PMF_CACHE_MAINT);
100#endif
101
Chris Kay99b5b2e2024-03-08 16:08:31 +0000102 NOTICE("BL2: %s\n", build_version_string);
Dan Handley91b624e2014-07-29 17:14:00 +0100103 NOTICE("BL2: %s\n", build_message);
104
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100105 /* Perform remaining generic architectural setup in S-EL1 */
106 bl2_arch_setup();
107
Manish V Badarkhe99575e42021-06-25 23:28:59 +0100108#if PSA_FWU_SUPPORT
109 fwu_init();
110#endif /* PSA_FWU_SUPPORT */
111
Manish V Badarkhe92de80a2021-12-16 10:41:47 +0000112 crypto_mod_init();
113
Juan Castillo9246ab82015-01-28 16:46:57 +0000114 /* Initialize authentication module */
Juan Castilloa08a5e72015-05-19 11:54:12 +0100115 auth_mod_init();
Juan Castillo9246ab82015-01-28 16:46:57 +0000116
Manish V Badarkhe5797b802021-08-06 09:26:20 +0100117 /* Initialize the Measured Boot backend */
118 bl2_plat_mboot_init();
119
Alexei Fedorov71707b12020-07-13 14:06:47 +0100120 /* Initialize boot source */
Roberto Vargasbc1ae1f2017-09-26 12:53:01 +0100121 bl2_plat_preload_setup();
122
Yatharth Kochar51f76f62016-09-12 16:10:33 +0100123 /* Load the subsequent bootloader images. */
124 next_bl_ep_info = bl2_load_images();
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100125
Manish V Badarkhe5797b802021-08-06 09:26:20 +0100126 /* Teardown the Measured Boot backend */
127 bl2_plat_mboot_finish();
Alexei Fedorov71707b12020-07-13 14:06:47 +0100128
Arvind Ram Prakash11b9b492022-11-22 14:41:00 -0600129#if !BL2_RUNS_AT_EL3
Julius Werner8e0ef0f2019-07-09 14:02:43 -0700130#ifndef __aarch64__
Yatharth Kochardafb2472016-06-30 14:52:12 +0100131 /*
132 * For AArch32 state BL1 and BL2 share the MMU setup.
133 * Given that BL2 does not map BL1 regions, MMU needs
134 * to be disabled in order to go back to BL1.
135 */
136 disable_mmu_icache_secure();
Julius Werner8e0ef0f2019-07-09 14:02:43 -0700137#endif /* !__aarch64__ */
Yatharth Kochardafb2472016-06-30 14:52:12 +0100138
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100139#if ENABLE_PAUTH
140 /*
141 * Disable pointer authentication before running next boot image
142 */
143 pauth_disable_el1();
144#endif /* ENABLE_PAUTH */
145
thagon01-arm6805e8d2023-07-12 10:43:58 -0500146#if ENABLE_RUNTIME_INSTRUMENTATION
147 PMF_CAPTURE_TIMESTAMP(bl_svc, BL2_EXIT, PMF_CACHE_MAINT);
148#endif
149
150 console_flush();
151
Achin Gupta4f6ad662013-10-25 09:08:21 +0100152 /*
Yatharth Kochar51f76f62016-09-12 16:10:33 +0100153 * Run next BL image via an SMC to BL1. Information on how to pass
154 * control to the BL32 (if present) and BL33 software images will
155 * be passed to next BL image as an argument.
Achin Gupta4f6ad662013-10-25 09:08:21 +0100156 */
Yatharth Kochar51f76f62016-09-12 16:10:33 +0100157 smc(BL1_SMC_RUN_IMAGE, (unsigned long)next_bl_ep_info, 0, 0, 0, 0, 0, 0);
Arvind Ram Prakash11b9b492022-11-22 14:41:00 -0600158#else /* if BL2_RUNS_AT_EL3 */
159
Roberto Vargase0e99462017-10-30 14:43:43 +0000160 NOTICE("BL2: Booting " NEXT_IMAGE "\n");
161 print_entry_point_info(next_bl_ep_info);
thagon01-arm6805e8d2023-07-12 10:43:58 -0500162#if ENABLE_RUNTIME_INSTRUMENTATION
163 PMF_CAPTURE_TIMESTAMP(bl_svc, BL2_EXIT, PMF_CACHE_MAINT);
164#endif
Roberto Vargase0e99462017-10-30 14:43:43 +0000165 console_flush();
166
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100167#if ENABLE_PAUTH
168 /*
169 * Disable pointer authentication before running next boot image
170 */
171 pauth_disable_el3();
172#endif /* ENABLE_PAUTH */
173
Roberto Vargase0e99462017-10-30 14:43:43 +0000174 bl2_run_next_image(next_bl_ep_info);
Arvind Ram Prakash11b9b492022-11-22 14:41:00 -0600175#endif /* BL2_RUNS_AT_EL3 */
Achin Gupta4f6ad662013-10-25 09:08:21 +0100176}