diff options
Diffstat (limited to 'bl31')
-rw-r--r-- | bl31/bl31_main.c | 17 |
1 files changed, 12 insertions, 5 deletions
diff --git a/bl31/bl31_main.c b/bl31/bl31_main.c index 68bdd367..19f37743 100644 --- a/bl31/bl31_main.c +++ b/bl31/bl31_main.c @@ -71,19 +71,20 @@ void bl31_lib_init(void) ******************************************************************************/ void bl31_main(void) { + NOTICE("BL3-1: %s\n", version_string); + NOTICE("BL3-1: %s\n", build_message); + /* Perform remaining generic architectural setup from EL3 */ bl31_arch_setup(); /* Perform platform setup in BL1 */ bl31_platform_setup(); - tf_printf("BL31 %s\n", version_string); - tf_printf("BL31 %s\n", build_message); - /* Initialise helper libraries */ bl31_lib_init(); /* Initialize the runtime services e.g. psci */ + INFO("BL3-1: Initializing runtime services\n"); runtime_svc_init(); /* Clean caches before re-entering normal world */ @@ -102,9 +103,10 @@ void bl31_main(void) /* * If SPD had registerd an init hook, invoke it. */ - if (bl32_init) + if (bl32_init) { + INFO("BL3-1: Initializing BL3-2\n"); (*bl32_init)(); - + } /* * We are ready to enter the next EL. Prepare entry into the image * corresponding to the desired security state after the next ERET. @@ -148,6 +150,11 @@ void bl31_prepare_next_image_entry(void) assert(next_image_info); assert(image_type == GET_SECURITY_STATE(next_image_info->h.attr)); + INFO("BL3-1: Preparing for EL3 exit to %s world\n", + (image_type == SECURE) ? "secure" : "normal"); + INFO("BL3-1: Next image address = 0x%llx\n", + (unsigned long long) next_image_info->pc); + INFO("BL3-1: Next image spsr = 0x%x\n", next_image_info->spsr); cm_init_context(read_mpidr_el1(), next_image_info); cm_prepare_el3_exit(image_type); } |