bl2_main.c 4.07 KB
Newer Older
1
/*
2
 * Copyright (c) 2013-2020, ARM Limited and Contributors. All rights reserved.
3
 *
dp-arm's avatar
dp-arm committed
4
 * SPDX-License-Identifier: BSD-3-Clause
5
6
 */

7
8
#include <assert.h>

9
#include <arch_helpers.h>
10
#include <arch_features.h>
11
12
13
14
15
16
#include <bl1/bl1.h>
#include <bl2/bl2.h>
#include <common/bl_common.h>
#include <common/debug.h>
#include <drivers/auth/auth_mod.h>
#include <drivers/console.h>
17
18
19
#if MEASURED_BOOT
#include <drivers/measured_boot/measured_boot.h>
#endif
20
#include <lib/extensions/pauth.h>
21
22
#include <plat/common/platform.h>

23
#include "bl2_private.h"
24

25
#ifdef __aarch64__
Roberto Vargas's avatar
Roberto Vargas committed
26
#define NEXT_IMAGE	"BL31"
27
28
#else
#define NEXT_IMAGE	"BL32"
Roberto Vargas's avatar
Roberto Vargas committed
29
#endif
30

31
#if !BL2_AT_EL3
32
33
34
35
36
37
38
39
40
41
42
/*******************************************************************************
 * Setup function for BL2.
 ******************************************************************************/
void bl2_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
	       u_register_t arg3)
{
	/* Perform early platform-specific setup */
	bl2_early_platform_setup2(arg0, arg1, arg2, arg3);

	/* Perform late platform-specific setup */
	bl2_plat_arch_setup();
43
44
45
46
47
48
49
50

#if CTX_INCLUDE_PAUTH_REGS
	/*
	 * Assert that the ARMv8.3-PAuth registers are present or an access
	 * fault will be triggered when they are being saved or restored.
	 */
	assert(is_armv8_3_pauth_present());
#endif /* CTX_INCLUDE_PAUTH_REGS */
51
52
}

53
54
55
56
57
58
59
60
61
62
63
64
#else /* if BL2_AT_EL3 */
/*******************************************************************************
 * Setup function for BL2 when BL2_AT_EL3=1.
 ******************************************************************************/
void bl2_el3_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
		   u_register_t arg3)
{
	/* Perform early platform-specific setup */
	bl2_el3_early_platform_setup(arg0, arg1, arg2, arg3);

	/* Perform late platform-specific setup */
	bl2_el3_plat_arch_setup();
65
66
67
68
69
70
71
72

#if CTX_INCLUDE_PAUTH_REGS
	/*
	 * Assert that the ARMv8.3-PAuth registers are present or an access
	 * fault will be triggered when they are being saved or restored.
	 */
	assert(is_armv8_3_pauth_present());
#endif /* CTX_INCLUDE_PAUTH_REGS */
73
74
75
}
#endif /* BL2_AT_EL3 */

76
77
/*******************************************************************************
 * The only thing to do in BL2 is to load further images and pass control to
78
79
 * next BL. The memory occupied by BL2 will be reclaimed by BL3x stages. BL2
 * runs entirely in S-EL1.
80
81
82
 ******************************************************************************/
void bl2_main(void)
{
83
	entry_point_info_t *next_bl_ep_info;
84

Dan Handley's avatar
Dan Handley committed
85
86
87
	NOTICE("BL2: %s\n", version_string);
	NOTICE("BL2: %s\n", build_message);

88
89
90
	/* Perform remaining generic architectural setup in S-EL1 */
	bl2_arch_setup();

91
92
#if TRUSTED_BOARD_BOOT
	/* Initialize authentication module */
93
	auth_mod_init();
94
95
96
97
98
99

#if MEASURED_BOOT
	/* Initialize measured boot module */
	measured_boot_init();

#endif /* MEASURED_BOOT */
100
101
#endif /* TRUSTED_BOARD_BOOT */

102
	/* Initialize boot source */
103
104
	bl2_plat_preload_setup();

105
106
	/* Load the subsequent bootloader images. */
	next_bl_ep_info = bl2_load_images();
107

108
109
110
111
112
#if MEASURED_BOOT
	/* Finalize measured boot */
	measured_boot_finish();
#endif /* MEASURED_BOOT */

113
#if !BL2_AT_EL3
114
#ifndef __aarch64__
115
116
117
118
119
120
	/*
	 * For AArch32 state BL1 and BL2 share the MMU setup.
	 * Given that BL2 does not map BL1 regions, MMU needs
	 * to be disabled in order to go back to BL1.
	 */
	disable_mmu_icache_secure();
121
#endif /* !__aarch64__ */
122

123
124
	console_flush();

125
126
127
128
129
130
131
#if ENABLE_PAUTH
	/*
	 * Disable pointer authentication before running next boot image
	 */
	pauth_disable_el1();
#endif /* ENABLE_PAUTH */

132
	/*
133
134
135
	 * Run next BL image via an SMC to BL1. Information on how to pass
	 * control to the BL32 (if present) and BL33 software images will
	 * be passed to next BL image as an argument.
136
	 */
137
	smc(BL1_SMC_RUN_IMAGE, (unsigned long)next_bl_ep_info, 0, 0, 0, 0, 0, 0);
138
#else /* if BL2_AT_EL3 */
Roberto Vargas's avatar
Roberto Vargas committed
139
140
141
142
	NOTICE("BL2: Booting " NEXT_IMAGE "\n");
	print_entry_point_info(next_bl_ep_info);
	console_flush();

143
144
145
146
147
148
149
#if ENABLE_PAUTH
	/*
	 * Disable pointer authentication before running next boot image
	 */
	pauth_disable_el3();
#endif /* ENABLE_PAUTH */

Roberto Vargas's avatar
Roberto Vargas committed
150
	bl2_run_next_image(next_bl_ep_info);
151
#endif /* BL2_AT_EL3 */
152
}