1 /* 2 * Copyright (c) 2013-2021, ARM Limited and Contributors. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 7 #include <assert.h> 8 9 #include <arch_helpers.h> 10 #include <arch_features.h> 11 #include <bl1/bl1.h> 12 #include <bl2/bl2.h> 13 #include <common/bl_common.h> 14 #include <common/debug.h> 15 #include <drivers/auth/auth_mod.h> 16 #include <drivers/console.h> 17 #include <drivers/fwu/fwu.h> 18 #include <lib/extensions/pauth.h> 19 #include <plat/common/platform.h> 20 21 #include "bl2_private.h" 22 23 #ifdef __aarch64__ 24 #define NEXT_IMAGE "BL31" 25 #else 26 #define NEXT_IMAGE "BL32" 27 #endif 28 29 #if BL2_AT_EL3 30 /******************************************************************************* 31 * Setup function for BL2 when BL2_AT_EL3=1 32 ******************************************************************************/ 33 void bl2_el3_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2, 34 u_register_t arg3) 35 { 36 /* Perform early platform-specific setup */ 37 bl2_el3_early_platform_setup(arg0, arg1, arg2, arg3); 38 39 /* Perform late platform-specific setup */ 40 bl2_el3_plat_arch_setup(); 41 42 #if CTX_INCLUDE_PAUTH_REGS 43 /* 44 * Assert that the ARMv8.3-PAuth registers are present or an access 45 * fault will be triggered when they are being saved or restored. 46 */ 47 assert(is_armv8_3_pauth_present()); 48 #endif /* CTX_INCLUDE_PAUTH_REGS */ 49 } 50 #else /* BL2_AT_EL3 */ 51 /******************************************************************************* 52 * Setup function for BL2 when BL2_AT_EL3=0 53 ******************************************************************************/ 54 void bl2_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2, 55 u_register_t arg3) 56 { 57 /* Perform early platform-specific setup */ 58 bl2_early_platform_setup2(arg0, arg1, arg2, arg3); 59 60 /* Perform late platform-specific setup */ 61 bl2_plat_arch_setup(); 62 63 #if CTX_INCLUDE_PAUTH_REGS 64 /* 65 * Assert that the ARMv8.3-PAuth registers are present or an access 66 * fault will be triggered when they are being saved or restored. 67 */ 68 assert(is_armv8_3_pauth_present()); 69 #endif /* CTX_INCLUDE_PAUTH_REGS */ 70 } 71 #endif /* BL2_AT_EL3 */ 72 73 /******************************************************************************* 74 * The only thing to do in BL2 is to load further images and pass control to 75 * next BL. The memory occupied by BL2 will be reclaimed by BL3x stages. BL2 76 * runs entirely in S-EL1. 77 ******************************************************************************/ 78 void bl2_main(void) 79 { 80 entry_point_info_t *next_bl_ep_info; 81 82 NOTICE("BL2: %s\n", version_string); 83 NOTICE("BL2: %s\n", build_message); 84 85 /* Perform remaining generic architectural setup in S-EL1 */ 86 bl2_arch_setup(); 87 88 #if PSA_FWU_SUPPORT 89 fwu_init(); 90 #endif /* PSA_FWU_SUPPORT */ 91 92 #if TRUSTED_BOARD_BOOT 93 /* Initialize authentication module */ 94 auth_mod_init(); 95 #endif /* TRUSTED_BOARD_BOOT */ 96 97 /* Initialize the Measured Boot backend */ 98 bl2_plat_mboot_init(); 99 100 /* Initialize boot source */ 101 bl2_plat_preload_setup(); 102 103 /* Load the subsequent bootloader images. */ 104 next_bl_ep_info = bl2_load_images(); 105 106 /* Teardown the Measured Boot backend */ 107 bl2_plat_mboot_finish(); 108 109 #if !BL2_AT_EL3 && !ENABLE_RME 110 #ifndef __aarch64__ 111 /* 112 * For AArch32 state BL1 and BL2 share the MMU setup. 113 * Given that BL2 does not map BL1 regions, MMU needs 114 * to be disabled in order to go back to BL1. 115 */ 116 disable_mmu_icache_secure(); 117 #endif /* !__aarch64__ */ 118 119 console_flush(); 120 121 #if ENABLE_PAUTH 122 /* 123 * Disable pointer authentication before running next boot image 124 */ 125 pauth_disable_el1(); 126 #endif /* ENABLE_PAUTH */ 127 128 /* 129 * Run next BL image via an SMC to BL1. Information on how to pass 130 * control to the BL32 (if present) and BL33 software images will 131 * be passed to next BL image as an argument. 132 */ 133 smc(BL1_SMC_RUN_IMAGE, (unsigned long)next_bl_ep_info, 0, 0, 0, 0, 0, 0); 134 #else /* if BL2_AT_EL3 || ENABLE_RME */ 135 NOTICE("BL2: Booting " NEXT_IMAGE "\n"); 136 print_entry_point_info(next_bl_ep_info); 137 console_flush(); 138 139 #if ENABLE_PAUTH 140 /* 141 * Disable pointer authentication before running next boot image 142 */ 143 pauth_disable_el3(); 144 #endif /* ENABLE_PAUTH */ 145 146 bl2_run_next_image(next_bl_ep_info); 147 #endif /* BL2_AT_EL3 && ENABLE_RME */ 148 } 149