1 /*
2 * Copyright (c) 2013-2019, ARM Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7 #include <assert.h>
8
9 #include <arch_helpers.h>
10 #include <arch_features.h>
11 #include <bl1/bl1.h>
12 #include <bl2/bl2.h>
13 #include <common/bl_common.h>
14 #include <common/debug.h>
15 #include <drivers/auth/auth_mod.h>
16 #include <drivers/console.h>
17 #include <lib/extensions/pauth.h>
18 #include <plat/common/platform.h>
19
20 #include "bl2_private.h"
21
22 #ifdef __aarch64__
23 #define NEXT_IMAGE "BL31"
24 #else
25 #define NEXT_IMAGE "BL32"
26 #endif
27
28 #if !BL2_AT_EL3
29 /*******************************************************************************
30 * Setup function for BL2.
31 ******************************************************************************/
bl2_setup(u_register_t arg0,u_register_t arg1,u_register_t arg2,u_register_t arg3)32 void bl2_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
33 u_register_t arg3)
34 {
35 /* Perform early platform-specific setup */
36 bl2_early_platform_setup2(arg0, arg1, arg2, arg3);
37
38 /* Perform late platform-specific setup */
39 bl2_plat_arch_setup();
40
41 #if CTX_INCLUDE_PAUTH_REGS
42 /*
43 * Assert that the ARMv8.3-PAuth registers are present or an access
44 * fault will be triggered when they are being saved or restored.
45 */
46 assert(is_armv8_3_pauth_present());
47 #endif /* CTX_INCLUDE_PAUTH_REGS */
48 }
49
50 #else /* if BL2_AT_EL3 */
51 /*******************************************************************************
52 * Setup function for BL2 when BL2_AT_EL3=1.
53 ******************************************************************************/
bl2_el3_setup(u_register_t arg0,u_register_t arg1,u_register_t arg2,u_register_t arg3)54 void bl2_el3_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
55 u_register_t arg3)
56 {
57 /* Perform early platform-specific setup */
58 bl2_el3_early_platform_setup(arg0, arg1, arg2, arg3);
59
60 /* Perform late platform-specific setup */
61 bl2_el3_plat_arch_setup();
62
63 #if CTX_INCLUDE_PAUTH_REGS
64 /*
65 * Assert that the ARMv8.3-PAuth registers are present or an access
66 * fault will be triggered when they are being saved or restored.
67 */
68 assert(is_armv8_3_pauth_present());
69 #endif /* CTX_INCLUDE_PAUTH_REGS */
70 }
71 #endif /* BL2_AT_EL3 */
72
73 /*******************************************************************************
74 * The only thing to do in BL2 is to load further images and pass control to
75 * next BL. The memory occupied by BL2 will be reclaimed by BL3x stages. BL2
76 * runs entirely in S-EL1.
77 ******************************************************************************/
bl2_main(void)78 void bl2_main(void)
79 {
80 entry_point_info_t *next_bl_ep_info;
81
82 NOTICE("BL2: %s\n", version_string);
83 NOTICE("BL2: %s\n", build_message);
84
85 /* Perform remaining generic architectural setup in S-EL1 */
86 bl2_arch_setup();
87
88 #if TRUSTED_BOARD_BOOT
89 /* Initialize authentication module */
90 auth_mod_init();
91 #endif /* TRUSTED_BOARD_BOOT */
92
93 /* initialize boot source */
94 bl2_plat_preload_setup();
95
96 /* Load the subsequent bootloader images. */
97 next_bl_ep_info = bl2_load_images();
98
99 #if !BL2_AT_EL3
100 #ifndef __aarch64__
101 /*
102 * For AArch32 state BL1 and BL2 share the MMU setup.
103 * Given that BL2 does not map BL1 regions, MMU needs
104 * to be disabled in order to go back to BL1.
105 */
106 disable_mmu_icache_secure();
107 #endif /* !__aarch64__ */
108
109 console_flush();
110
111 #if ENABLE_PAUTH
112 /*
113 * Disable pointer authentication before running next boot image
114 */
115 pauth_disable_el1();
116 #endif /* ENABLE_PAUTH */
117
118 /*
119 * Run next BL image via an SMC to BL1. Information on how to pass
120 * control to the BL32 (if present) and BL33 software images will
121 * be passed to next BL image as an argument.
122 */
123 smc(BL1_SMC_RUN_IMAGE, (unsigned long)next_bl_ep_info, 0, 0, 0, 0, 0, 0);
124 #else /* if BL2_AT_EL3 */
125 NOTICE("BL2: Booting " NEXT_IMAGE "\n");
126 print_entry_point_info(next_bl_ep_info);
127 console_flush();
128
129 #if ENABLE_PAUTH
130 /*
131 * Disable pointer authentication before running next boot image
132 */
133 pauth_disable_el3();
134 #endif /* ENABLE_PAUTH */
135
136 bl2_run_next_image(next_bl_ep_info);
137 #endif /* BL2_AT_EL3 */
138 }
139