blob: d2de1350d303ad6c62c0d3dd50b1c9e5510bfbe0 [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Manish V Badarkhe99575e42021-06-25 23:28:59 +01002 * Copyright (c) 2013-2021, ARM Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Achin Gupta4f6ad662013-10-25 09:08:21 +01005 */
6
Alexei Fedorovf41355c2019-09-13 14:11:59 +01007#include <assert.h>
8
Achin Gupta4f6ad662013-10-25 09:08:21 +01009#include <arch_helpers.h>
Alexei Fedorovf41355c2019-09-13 14:11:59 +010010#include <arch_features.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000011#include <bl1/bl1.h>
12#include <bl2/bl2.h>
13#include <common/bl_common.h>
14#include <common/debug.h>
15#include <drivers/auth/auth_mod.h>
16#include <drivers/console.h>
Manish V Badarkhe99575e42021-06-25 23:28:59 +010017#include <drivers/fwu/fwu.h>
Alexei Fedorov71707b12020-07-13 14:06:47 +010018#if MEASURED_BOOT
19#include <drivers/measured_boot/measured_boot.h>
20#endif
Alexei Fedorovf41355c2019-09-13 14:11:59 +010021#include <lib/extensions/pauth.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000022#include <plat/common/platform.h>
23
Dan Handleybcd60ba2014-04-17 18:53:42 +010024#include "bl2_private.h"
Achin Gupta4f6ad662013-10-25 09:08:21 +010025
Julius Werner8e0ef0f2019-07-09 14:02:43 -070026#ifdef __aarch64__
Roberto Vargase0e99462017-10-30 14:43:43 +000027#define NEXT_IMAGE "BL31"
Julius Werner8e0ef0f2019-07-09 14:02:43 -070028#else
29#define NEXT_IMAGE "BL32"
Roberto Vargase0e99462017-10-30 14:43:43 +000030#endif
Vikram Kanigirida567432014-04-15 18:08:08 +010031
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +000032#if !BL2_AT_EL3
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010033/*******************************************************************************
Antonio Nino Diaz6e4b0832019-01-31 10:48:47 +000034 * Setup function for BL2.
35 ******************************************************************************/
36void bl2_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
37 u_register_t arg3)
38{
39 /* Perform early platform-specific setup */
40 bl2_early_platform_setup2(arg0, arg1, arg2, arg3);
41
Antonio Nino Diaz6e4b0832019-01-31 10:48:47 +000042 /* Perform late platform-specific setup */
43 bl2_plat_arch_setup();
Alexei Fedorovf41355c2019-09-13 14:11:59 +010044
45#if CTX_INCLUDE_PAUTH_REGS
46 /*
47 * Assert that the ARMv8.3-PAuth registers are present or an access
48 * fault will be triggered when they are being saved or restored.
49 */
50 assert(is_armv8_3_pauth_present());
51#endif /* CTX_INCLUDE_PAUTH_REGS */
Antonio Nino Diaz6e4b0832019-01-31 10:48:47 +000052}
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +000053
54#else /* if BL2_AT_EL3 */
55/*******************************************************************************
56 * Setup function for BL2 when BL2_AT_EL3=1.
57 ******************************************************************************/
58void bl2_el3_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
59 u_register_t arg3)
60{
61 /* Perform early platform-specific setup */
62 bl2_el3_early_platform_setup(arg0, arg1, arg2, arg3);
63
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +000064 /* Perform late platform-specific setup */
65 bl2_el3_plat_arch_setup();
Alexei Fedorovf41355c2019-09-13 14:11:59 +010066
67#if CTX_INCLUDE_PAUTH_REGS
68 /*
69 * Assert that the ARMv8.3-PAuth registers are present or an access
70 * fault will be triggered when they are being saved or restored.
71 */
72 assert(is_armv8_3_pauth_present());
73#endif /* CTX_INCLUDE_PAUTH_REGS */
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +000074}
75#endif /* BL2_AT_EL3 */
Antonio Nino Diaz6e4b0832019-01-31 10:48:47 +000076
77/*******************************************************************************
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010078 * The only thing to do in BL2 is to load further images and pass control to
Yatharth Kochar51f76f62016-09-12 16:10:33 +010079 * next BL. The memory occupied by BL2 will be reclaimed by BL3x stages. BL2
80 * runs entirely in S-EL1.
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010081 ******************************************************************************/
82void bl2_main(void)
83{
Yatharth Kochar51f76f62016-09-12 16:10:33 +010084 entry_point_info_t *next_bl_ep_info;
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010085
Dan Handley91b624e2014-07-29 17:14:00 +010086 NOTICE("BL2: %s\n", version_string);
87 NOTICE("BL2: %s\n", build_message);
88
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +010089 /* Perform remaining generic architectural setup in S-EL1 */
90 bl2_arch_setup();
91
Manish V Badarkhe99575e42021-06-25 23:28:59 +010092#if PSA_FWU_SUPPORT
93 fwu_init();
94#endif /* PSA_FWU_SUPPORT */
95
Juan Castillo9246ab82015-01-28 16:46:57 +000096#if TRUSTED_BOARD_BOOT
97 /* Initialize authentication module */
Juan Castilloa08a5e72015-05-19 11:54:12 +010098 auth_mod_init();
Alexei Fedorov71707b12020-07-13 14:06:47 +010099
100#if MEASURED_BOOT
101 /* Initialize measured boot module */
102 measured_boot_init();
103
104#endif /* MEASURED_BOOT */
Juan Castillo9246ab82015-01-28 16:46:57 +0000105#endif /* TRUSTED_BOARD_BOOT */
106
Alexei Fedorov71707b12020-07-13 14:06:47 +0100107 /* Initialize boot source */
Roberto Vargasbc1ae1f2017-09-26 12:53:01 +0100108 bl2_plat_preload_setup();
109
Yatharth Kochar51f76f62016-09-12 16:10:33 +0100110 /* Load the subsequent bootloader images. */
111 next_bl_ep_info = bl2_load_images();
Andrew Thoelkea55566d2014-05-28 22:22:55 +0100112
Alexei Fedorov71707b12020-07-13 14:06:47 +0100113#if MEASURED_BOOT
114 /* Finalize measured boot */
115 measured_boot_finish();
116#endif /* MEASURED_BOOT */
117
Yann Gautier60e5c2f2018-04-26 19:07:17 +0200118#if !BL2_AT_EL3
Julius Werner8e0ef0f2019-07-09 14:02:43 -0700119#ifndef __aarch64__
Yatharth Kochardafb2472016-06-30 14:52:12 +0100120 /*
121 * For AArch32 state BL1 and BL2 share the MMU setup.
122 * Given that BL2 does not map BL1 regions, MMU needs
123 * to be disabled in order to go back to BL1.
124 */
125 disable_mmu_icache_secure();
Julius Werner8e0ef0f2019-07-09 14:02:43 -0700126#endif /* !__aarch64__ */
Yatharth Kochardafb2472016-06-30 14:52:12 +0100127
Antonio Nino Diaze3962d02017-02-16 16:17:19 +0000128 console_flush();
129
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100130#if ENABLE_PAUTH
131 /*
132 * Disable pointer authentication before running next boot image
133 */
134 pauth_disable_el1();
135#endif /* ENABLE_PAUTH */
136
Achin Gupta4f6ad662013-10-25 09:08:21 +0100137 /*
Yatharth Kochar51f76f62016-09-12 16:10:33 +0100138 * Run next BL image via an SMC to BL1. Information on how to pass
139 * control to the BL32 (if present) and BL33 software images will
140 * be passed to next BL image as an argument.
Achin Gupta4f6ad662013-10-25 09:08:21 +0100141 */
Yatharth Kochar51f76f62016-09-12 16:10:33 +0100142 smc(BL1_SMC_RUN_IMAGE, (unsigned long)next_bl_ep_info, 0, 0, 0, 0, 0, 0);
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +0000143#else /* if BL2_AT_EL3 */
Roberto Vargase0e99462017-10-30 14:43:43 +0000144 NOTICE("BL2: Booting " NEXT_IMAGE "\n");
145 print_entry_point_info(next_bl_ep_info);
146 console_flush();
147
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100148#if ENABLE_PAUTH
149 /*
150 * Disable pointer authentication before running next boot image
151 */
152 pauth_disable_el3();
153#endif /* ENABLE_PAUTH */
154
Roberto Vargase0e99462017-10-30 14:43:43 +0000155 bl2_run_next_image(next_bl_ep_info);
Antonio Nino Diaz4f29fb72019-01-31 17:40:44 +0000156#endif /* BL2_AT_EL3 */
Achin Gupta4f6ad662013-10-25 09:08:21 +0100157}