blob: ce83692e0ebc5c227fba38bc3bfb670ab9848995 [file] [log] [blame]
Achin Gupta4f6ad662013-10-25 09:08:21 +01001/*
Arvind Ram Prakash42d4d3b2022-11-22 14:41:00 -06002 * Copyright (c) 2013-2023, Arm Limited and Contributors. All rights reserved.
Achin Gupta4f6ad662013-10-25 09:08:21 +01003 *
dp-arm82cb2c12017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Achin Gupta4f6ad662013-10-25 09:08:21 +01005 */
6
Alexei Fedoroved108b52019-09-13 14:11:59 +01007#include <assert.h>
8
Achin Gupta4f6ad662013-10-25 09:08:21 +01009#include <arch_helpers.h>
Alexei Fedoroved108b52019-09-13 14:11:59 +010010#include <arch_features.h>
Antonio Nino Diaz09d40e02018-12-14 00:18:21 +000011#include <bl1/bl1.h>
12#include <bl2/bl2.h>
13#include <common/bl_common.h>
14#include <common/debug.h>
15#include <drivers/auth/auth_mod.h>
Manish V Badarkhe0aa0b3a2021-12-16 10:41:47 +000016#include <drivers/auth/crypto_mod.h>
Antonio Nino Diaz09d40e02018-12-14 00:18:21 +000017#include <drivers/console.h>
Manish V Badarkhe396b3392021-06-25 23:28:59 +010018#include <drivers/fwu/fwu.h>
Alexei Fedoroved108b52019-09-13 14:11:59 +010019#include <lib/extensions/pauth.h>
Antonio Nino Diaz09d40e02018-12-14 00:18:21 +000020#include <plat/common/platform.h>
21
Dan Handley5b827a82014-04-17 18:53:42 +010022#include "bl2_private.h"
Achin Gupta4f6ad662013-10-25 09:08:21 +010023
Julius Werner402b3cf2019-07-09 14:02:43 -070024#ifdef __aarch64__
Roberto Vargasb1d27b42017-10-30 14:43:43 +000025#define NEXT_IMAGE "BL31"
Julius Werner402b3cf2019-07-09 14:02:43 -070026#else
27#define NEXT_IMAGE "BL32"
Roberto Vargasb1d27b42017-10-30 14:43:43 +000028#endif
Sandrine Bailleux93d81d62014-06-24 14:19:36 +010029
Arvind Ram Prakash42d4d3b2022-11-22 14:41:00 -060030#if RESET_TO_BL2
Sandrine Bailleux93d81d62014-06-24 14:19:36 +010031/*******************************************************************************
Arvind Ram Prakash42d4d3b2022-11-22 14:41:00 -060032 * Setup function for BL2 when RESET_TO_BL2=1
Antonio Nino Diazdcbfa112019-01-31 17:40:44 +000033 ******************************************************************************/
34void bl2_el3_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
35 u_register_t arg3)
36{
37 /* Perform early platform-specific setup */
38 bl2_el3_early_platform_setup(arg0, arg1, arg2, arg3);
39
Antonio Nino Diazdcbfa112019-01-31 17:40:44 +000040 /* Perform late platform-specific setup */
41 bl2_el3_plat_arch_setup();
Alexei Fedoroved108b52019-09-13 14:11:59 +010042
43#if CTX_INCLUDE_PAUTH_REGS
44 /*
45 * Assert that the ARMv8.3-PAuth registers are present or an access
46 * fault will be triggered when they are being saved or restored.
47 */
48 assert(is_armv8_3_pauth_present());
49#endif /* CTX_INCLUDE_PAUTH_REGS */
Antonio Nino Diazdcbfa112019-01-31 17:40:44 +000050}
Arvind Ram Prakash42d4d3b2022-11-22 14:41:00 -060051#else /* RESET_TO_BL2 */
52
Zelalem Aweke6c09af92021-07-09 11:37:10 -050053/*******************************************************************************
Arvind Ram Prakash42d4d3b2022-11-22 14:41:00 -060054 * Setup function for BL2 when RESET_TO_BL2=0
Zelalem Aweke6c09af92021-07-09 11:37:10 -050055 ******************************************************************************/
56void bl2_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
57 u_register_t arg3)
58{
59 /* Perform early platform-specific setup */
60 bl2_early_platform_setup2(arg0, arg1, arg2, arg3);
61
62 /* Perform late platform-specific setup */
63 bl2_plat_arch_setup();
64
65#if CTX_INCLUDE_PAUTH_REGS
66 /*
67 * Assert that the ARMv8.3-PAuth registers are present or an access
68 * fault will be triggered when they are being saved or restored.
69 */
70 assert(is_armv8_3_pauth_present());
71#endif /* CTX_INCLUDE_PAUTH_REGS */
72}
Arvind Ram Prakash42d4d3b2022-11-22 14:41:00 -060073#endif /* RESET_TO_BL2 */
Antonio Nino Diazdcbfa112019-01-31 17:40:44 +000074
Antonio Nino Diaz9d93fc22019-01-31 10:48:47 +000075/*******************************************************************************
Sandrine Bailleux93d81d62014-06-24 14:19:36 +010076 * The only thing to do in BL2 is to load further images and pass control to
Yatharth Kochar42019bf2016-09-12 16:10:33 +010077 * next BL. The memory occupied by BL2 will be reclaimed by BL3x stages. BL2
78 * runs entirely in S-EL1.
Sandrine Bailleux93d81d62014-06-24 14:19:36 +010079 ******************************************************************************/
80void bl2_main(void)
81{
Yatharth Kochar42019bf2016-09-12 16:10:33 +010082 entry_point_info_t *next_bl_ep_info;
Sandrine Bailleux93d81d62014-06-24 14:19:36 +010083
Dan Handley6ad2e462014-07-29 17:14:00 +010084 NOTICE("BL2: %s\n", version_string);
85 NOTICE("BL2: %s\n", build_message);
86
Sandrine Bailleux93d81d62014-06-24 14:19:36 +010087 /* Perform remaining generic architectural setup in S-EL1 */
88 bl2_arch_setup();
89
Manish V Badarkhe396b3392021-06-25 23:28:59 +010090#if PSA_FWU_SUPPORT
91 fwu_init();
92#endif /* PSA_FWU_SUPPORT */
93
Manish V Badarkhe0aa0b3a2021-12-16 10:41:47 +000094 crypto_mod_init();
95
Juan Castillodec840a2015-01-28 16:46:57 +000096 /* Initialize authentication module */
Juan Castillo1779ba62015-05-19 11:54:12 +010097 auth_mod_init();
Juan Castillodec840a2015-01-28 16:46:57 +000098
Manish V Badarkhe47bf3ac2021-08-06 09:26:20 +010099 /* Initialize the Measured Boot backend */
100 bl2_plat_mboot_init();
101
Alexei Fedorov3f498b02020-07-13 14:06:47 +0100102 /* Initialize boot source */
Roberto Vargas01f62b62017-09-26 12:53:01 +0100103 bl2_plat_preload_setup();
104
Yatharth Kochar42019bf2016-09-12 16:10:33 +0100105 /* Load the subsequent bootloader images. */
106 next_bl_ep_info = bl2_load_images();
Juan Castilloef538c62014-09-04 14:43:09 +0100107
Manish V Badarkhe47bf3ac2021-08-06 09:26:20 +0100108 /* Teardown the Measured Boot backend */
109 bl2_plat_mboot_finish();
Alexei Fedorov3f498b02020-07-13 14:06:47 +0100110
Arvind Ram Prakash42d4d3b2022-11-22 14:41:00 -0600111#if !BL2_RUNS_AT_EL3
Julius Werner402b3cf2019-07-09 14:02:43 -0700112#ifndef __aarch64__
Yatharth Kochard48c12e2016-06-30 14:52:12 +0100113 /*
114 * For AArch32 state BL1 and BL2 share the MMU setup.
115 * Given that BL2 does not map BL1 regions, MMU needs
116 * to be disabled in order to go back to BL1.
117 */
118 disable_mmu_icache_secure();
Julius Werner402b3cf2019-07-09 14:02:43 -0700119#endif /* !__aarch64__ */
Yatharth Kochard48c12e2016-06-30 14:52:12 +0100120
Antonio Nino Diaz0b326282017-02-16 16:17:19 +0000121 console_flush();
122
Alexei Fedoroved108b52019-09-13 14:11:59 +0100123#if ENABLE_PAUTH
124 /*
125 * Disable pointer authentication before running next boot image
126 */
127 pauth_disable_el1();
128#endif /* ENABLE_PAUTH */
129
Sandrine Bailleux93d81d62014-06-24 14:19:36 +0100130 /*
Yatharth Kochar42019bf2016-09-12 16:10:33 +0100131 * Run next BL image via an SMC to BL1. Information on how to pass
132 * control to the BL32 (if present) and BL33 software images will
133 * be passed to next BL image as an argument.
Sandrine Bailleux93d81d62014-06-24 14:19:36 +0100134 */
Yatharth Kochar42019bf2016-09-12 16:10:33 +0100135 smc(BL1_SMC_RUN_IMAGE, (unsigned long)next_bl_ep_info, 0, 0, 0, 0, 0, 0);
Arvind Ram Prakash42d4d3b2022-11-22 14:41:00 -0600136#else /* if BL2_RUNS_AT_EL3 */
137
Roberto Vargasb1d27b42017-10-30 14:43:43 +0000138 NOTICE("BL2: Booting " NEXT_IMAGE "\n");
139 print_entry_point_info(next_bl_ep_info);
140 console_flush();
141
Alexei Fedoroved108b52019-09-13 14:11:59 +0100142#if ENABLE_PAUTH
143 /*
144 * Disable pointer authentication before running next boot image
145 */
146 pauth_disable_el3();
147#endif /* ENABLE_PAUTH */
148
Roberto Vargasb1d27b42017-10-30 14:43:43 +0000149 bl2_run_next_image(next_bl_ep_info);
Arvind Ram Prakash42d4d3b2022-11-22 14:41:00 -0600150#endif /* BL2_RUNS_AT_EL3 */
Achin Gupta4f6ad662013-10-25 09:08:21 +0100151}