1 /* 2 * Copyright (c) 2013-2022, Arm Limited and Contributors. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 7 #include <assert.h> 8 9 #include <arch_helpers.h> 10 #include <arch_features.h> 11 #include <bl1/bl1.h> 12 #include <bl2/bl2.h> 13 #include <common/bl_common.h> 14 #include <common/debug.h> 15 #include <drivers/auth/auth_mod.h> 16 #include <drivers/auth/crypto_mod.h> 17 #include <drivers/console.h> 18 #include <drivers/fwu/fwu.h> 19 #include <lib/extensions/pauth.h> 20 #include <plat/common/platform.h> 21 22 #include "bl2_private.h" 23 24 #ifdef __aarch64__ 25 #define NEXT_IMAGE "BL31" 26 #else 27 #define NEXT_IMAGE "BL32" 28 #endif 29 30 #if BL2_AT_EL3 31 /******************************************************************************* 32 * Setup function for BL2 when BL2_AT_EL3=1 33 ******************************************************************************/ 34 void bl2_el3_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2, 35 u_register_t arg3) 36 { 37 /* Perform early platform-specific setup */ 38 bl2_el3_early_platform_setup(arg0, arg1, arg2, arg3); 39 40 /* Perform late platform-specific setup */ 41 bl2_el3_plat_arch_setup(); 42 43 #if CTX_INCLUDE_PAUTH_REGS 44 /* 45 * Assert that the ARMv8.3-PAuth registers are present or an access 46 * fault will be triggered when they are being saved or restored. 47 */ 48 assert(is_armv8_3_pauth_present()); 49 #endif /* CTX_INCLUDE_PAUTH_REGS */ 50 } 51 #else /* BL2_AT_EL3 */ 52 /******************************************************************************* 53 * Setup function for BL2 when BL2_AT_EL3=0 54 ******************************************************************************/ 55 void bl2_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2, 56 u_register_t arg3) 57 { 58 /* Perform early platform-specific setup */ 59 bl2_early_platform_setup2(arg0, arg1, arg2, arg3); 60 61 /* Perform late platform-specific setup */ 62 bl2_plat_arch_setup(); 63 64 #if CTX_INCLUDE_PAUTH_REGS 65 /* 66 * Assert that the ARMv8.3-PAuth registers are present or an access 67 * fault will be triggered when they are being saved or restored. 68 */ 69 assert(is_armv8_3_pauth_present()); 70 #endif /* CTX_INCLUDE_PAUTH_REGS */ 71 } 72 #endif /* BL2_AT_EL3 */ 73 74 /******************************************************************************* 75 * The only thing to do in BL2 is to load further images and pass control to 76 * next BL. The memory occupied by BL2 will be reclaimed by BL3x stages. BL2 77 * runs entirely in S-EL1. 78 ******************************************************************************/ 79 void bl2_main(void) 80 { 81 entry_point_info_t *next_bl_ep_info; 82 83 NOTICE("BL2: %s\n", version_string); 84 NOTICE("BL2: %s\n", build_message); 85 86 /* Perform remaining generic architectural setup in S-EL1 */ 87 bl2_arch_setup(); 88 89 #if PSA_FWU_SUPPORT 90 fwu_init(); 91 #endif /* PSA_FWU_SUPPORT */ 92 93 crypto_mod_init(); 94 95 /* Initialize authentication module */ 96 auth_mod_init(); 97 98 /* Initialize the Measured Boot backend */ 99 bl2_plat_mboot_init(); 100 101 /* Initialize boot source */ 102 bl2_plat_preload_setup(); 103 104 /* Load the subsequent bootloader images. */ 105 next_bl_ep_info = bl2_load_images(); 106 107 /* Teardown the Measured Boot backend */ 108 bl2_plat_mboot_finish(); 109 110 #if !BL2_AT_EL3 && !ENABLE_RME 111 #ifndef __aarch64__ 112 /* 113 * For AArch32 state BL1 and BL2 share the MMU setup. 114 * Given that BL2 does not map BL1 regions, MMU needs 115 * to be disabled in order to go back to BL1. 116 */ 117 disable_mmu_icache_secure(); 118 #endif /* !__aarch64__ */ 119 120 console_flush(); 121 122 #if ENABLE_PAUTH 123 /* 124 * Disable pointer authentication before running next boot image 125 */ 126 pauth_disable_el1(); 127 #endif /* ENABLE_PAUTH */ 128 129 /* 130 * Run next BL image via an SMC to BL1. Information on how to pass 131 * control to the BL32 (if present) and BL33 software images will 132 * be passed to next BL image as an argument. 133 */ 134 smc(BL1_SMC_RUN_IMAGE, (unsigned long)next_bl_ep_info, 0, 0, 0, 0, 0, 0); 135 #else /* if BL2_AT_EL3 || ENABLE_RME */ 136 NOTICE("BL2: Booting " NEXT_IMAGE "\n"); 137 print_entry_point_info(next_bl_ep_info); 138 console_flush(); 139 140 #if ENABLE_PAUTH 141 /* 142 * Disable pointer authentication before running next boot image 143 */ 144 pauth_disable_el3(); 145 #endif /* ENABLE_PAUTH */ 146 147 bl2_run_next_image(next_bl_ep_info); 148 #endif /* BL2_AT_EL3 && ENABLE_RME */ 149 } 150