blob: a82966e7729f1c4c555ad68f0c473889c2e8d84c [file] [log] [blame]
/*
* Copyright (c) 2021-2025, Arm Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
#include <common/build_message.h>
#include <common/debug.h>
#include <plat/common/platform.h>
#include <services/rmm_core_manifest.h>
#include <services/rmmd_svc.h>
#include <services/trp/platform_trp.h>
#include <trp_helpers.h>
#include "trp_private.h"
#include <platform_def.h>
#define RMI_ERROR_REALM 2U
#define RMI_ERROR_NOT_SUPPORTED 6U
#define DIR_BIT_SHIFT 0x8
#define KEYSET_SHIFT 0xC
#define STREAM_ID_MASK 0xFF
#define STREAM_ID_SHIFT 0x0
#define SUBSTREAM_MASK 0x7
#define SUBSTREAM_SHIFT 0x8
#define KEY_SET 0x0
#define DIR_VAL 0x0
#define SUBSTREAM_VAL 0x1
#define STREAM_ID 0x1
#define ENCODE_STREAM_INFO(key, dir, substream, stream_id) \
(((key & 0x1) << KEYSET_SHIFT) | \
((dir & 0x1) << DIR_BIT_SHIFT) | \
((substream && SUBSTREAM_MASK) << SUBSTREAM_SHIFT) | \
((stream_id && STREAM_ID_MASK) << STREAM_ID_SHIFT))
/* Parameters received from the previous image */
static unsigned int trp_boot_abi_version;
static uintptr_t trp_shared_region_start;
/* Parameters received from boot manifest */
uint32_t trp_boot_manifest_version;
/*******************************************************************************
* Setup function for TRP.
******************************************************************************/
void trp_setup(uint64_t x0,
uint64_t x1,
uint64_t x2,
uint64_t x3)
{
/*
* Validate boot parameters
*
* According to the Boot Interface ABI v.0.1,
* the parameters received from EL3 are:
* x0: CPUID (verified earlier, so not used)
* x1: Boot Interface version
* x2: PLATFORM_CORE_COUNT
* x3: Pointer to the shared memory area.
*/
(void)x0;
if (TRP_RMM_EL3_VERSION_GET_MAJOR(x1) != TRP_RMM_EL3_ABI_VERS_MAJOR) {
trp_boot_abort(E_RMM_BOOT_VERSION_MISMATCH);
}
if ((void *)x3 == NULL) {
trp_boot_abort(E_RMM_BOOT_INVALID_SHARED_BUFFER);
}
if (x2 > TRP_PLATFORM_CORE_COUNT) {
trp_boot_abort(E_RMM_BOOT_CPUS_OUT_OF_RANGE);
}
trp_boot_abi_version = x1;
trp_shared_region_start = x3;
flush_dcache_range((uintptr_t)&trp_boot_abi_version,
sizeof(trp_boot_abi_version));
flush_dcache_range((uintptr_t)&trp_shared_region_start,
sizeof(trp_shared_region_start));
/* Perform early platform-specific setup */
trp_early_platform_setup((struct rmm_manifest *)trp_shared_region_start);
}
int trp_validate_warmboot_args(uint64_t x0, uint64_t x1,
uint64_t x2, uint64_t x3)
{
/*
* Validate boot parameters for warm boot
*
* According to the Boot Interface ABI v.0.1, the parameters
* received from EL3 during warm boot are:
*
* x0: CPUID (verified earlier so not used here)
* [x1:x3]: RES0
*/
(void)x0;
return ((x1 | x2 | x3) == 0UL) ? 0 : E_RMM_BOOT_UNKNOWN;
}
/* Main function for TRP */
void trp_main(void)
{
NOTICE("TRP: %s\n", build_version_string);
NOTICE("TRP: %s\n", build_message);
NOTICE("TRP: Supported RMM-EL3 Interface ABI: v.%u.%u\n",
TRP_RMM_EL3_ABI_VERS_MAJOR, TRP_RMM_EL3_ABI_VERS_MINOR);
NOTICE("TRP: Boot Manifest Version: v.%u.%u\n",
RMMD_GET_MANIFEST_VERSION_MAJOR(trp_boot_manifest_version),
RMMD_GET_MANIFEST_VERSION_MINOR(trp_boot_manifest_version));
INFO("TRP: Memory base: 0x%lx\n", (unsigned long)RMM_BASE);
INFO("TRP: Shared region base address: 0x%lx\n",
(unsigned long)trp_shared_region_start);
INFO("TRP: Total size: 0x%lx bytes\n",
(unsigned long)(RMM_END - RMM_BASE));
INFO("TRP: RMM-EL3 Interface ABI reported by EL3: v.%u.%u\n",
TRP_RMM_EL3_VERSION_GET_MAJOR(trp_boot_abi_version),
TRP_RMM_EL3_VERSION_GET_MINOR(trp_boot_abi_version));
}
/*******************************************************************************
* Returning RMI version back to Normal World
******************************************************************************/
static void trp_ret_rmi_version(unsigned long long rmi_version,
struct trp_smc_result *smc_ret)
{
if (rmi_version != RMI_ABI_VERSION) {
smc_ret->x[0] = RMI_ERROR_INPUT;
} else {
smc_ret->x[0] = RMI_SUCCESS;
}
VERBOSE("RMM version is %u.%u\n", RMI_ABI_VERSION_MAJOR,
RMI_ABI_VERSION_MINOR);
smc_ret->x[1] = RMI_ABI_VERSION;
smc_ret->x[2] = RMI_ABI_VERSION;
}
/*******************************************************************************
* Transitioning granule of NON-SECURE type to REALM type
******************************************************************************/
static void trp_asc_mark_realm(unsigned long long x1,
struct trp_smc_result *smc_ret)
{
VERBOSE("Delegating granule 0x%llx\n", x1);
smc_ret->x[0] = trp_smc(set_smc_args(RMM_GTSI_DELEGATE, x1,
0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL));
if (smc_ret->x[0] != 0ULL) {
ERROR("Granule transition from NON-SECURE type to REALM type "
"failed 0x%llx\n", smc_ret->x[0]);
}
}
/*******************************************************************************
* Transitioning granule of REALM type to NON-SECURE type
******************************************************************************/
static void trp_asc_mark_nonsecure(unsigned long long x1,
struct trp_smc_result *smc_ret)
{
VERBOSE("Undelegating granule 0x%llx\n", x1);
smc_ret->x[0] = trp_smc(set_smc_args(RMM_GTSI_UNDELEGATE, x1,
0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL));
if (smc_ret->x[0] != 0ULL) {
ERROR("Granule transition from REALM type to NON-SECURE type "
"failed 0x%llx\n", smc_ret->x[0]);
}
}
/*******************************************************************************
* Test the IDE Key management interface
******************************************************************************/
static void trp_ide_keymgmt_interface_fn(unsigned long long x1, unsigned long long x2,
struct trp_smc_result *smc_ret)
{
uint64_t ecam_address = 0U, rp_id = 0U, ide_stream_info;
uint64_t keyqw0, keyqw1, keyqw2, keyqw3;
uint64_t ifvqw0, ifvqw1;
int return_value;
#if RMMD_ENABLE_IDE_KEY_PROG
trp_get_test_rootport(&ecam_address, &rp_id);
#endif /* RMMD_ENABLE_IDE_KEY_PROG */
/*
* Dummy values for testing:
* Key set = 0x0
* Dir = 0x0
* Substream = 0x1
* Stream ID = 0x1
*/
ide_stream_info = ENCODE_STREAM_INFO(KEY_SET, DIR_VAL, SUBSTREAM_VAL, STREAM_ID);
/* Dummy key and IV values for testing */
keyqw0 = 0xA1B2C3D4E5F60708;
keyqw1 = 0x1122334455667788;
keyqw2 = 0xDEADBEEFCAFEBABE;
keyqw3 = 0x1234567890ABCDEF;
ifvqw0 = 0xABCDEF0123456789;
ifvqw1 = 0x9876543210FEDCBA;
return_value = trp_smc(set_smc_args(RMM_IDE_KEY_PROG, ecam_address, rp_id,
ide_stream_info, keyqw0, keyqw1, keyqw2, keyqw3, ifvqw0,
ifvqw1, 0UL, 0UL));
INFO("return value from RMM_IDE_KEY_PROG = %d\n", return_value);
return_value = trp_smc(set_smc_args(RMM_IDE_KEY_SET_GO, ecam_address, rp_id,
ide_stream_info, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL));
INFO("return value from RMM_IDE_KEY_SET_GO = %d\n", return_value);
return_value = trp_smc(set_smc_args(RMM_IDE_KEY_SET_STOP, ecam_address, rp_id,
ide_stream_info, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL));
INFO("return value from RMM_IDE_KEY_SET_STOP = %d\n", return_value);
return_value = trp_smc(set_smc_args(RMM_IDE_KM_PULL_RESPONSE, ecam_address, rp_id,
0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL, 0UL));
INFO("return value from RMM_IDE_KEY_SET_STOP = %d\n", return_value);
smc_ret->x[0] = RMI_ERROR_NOT_SUPPORTED;
}
/*******************************************************************************
* Main RMI SMC handler function
******************************************************************************/
void trp_rmi_handler(unsigned long fid,
unsigned long long x1, unsigned long long x2,
unsigned long long x3, unsigned long long x4,
unsigned long long x5, unsigned long long x6,
struct trp_smc_result *smc_ret)
{
/* Not used in the current implementation */
(void)x2;
(void)x3;
(void)x4;
(void)x5;
(void)x6;
switch (fid) {
case RMI_RMM_REQ_VERSION:
trp_ret_rmi_version(x1, smc_ret);
break;
case RMI_RMM_GRANULE_DELEGATE:
trp_asc_mark_realm(x1, smc_ret);
break;
case RMI_RMM_GRANULE_UNDELEGATE:
trp_asc_mark_nonsecure(x1, smc_ret);
break;
case RMI_RMM_PDEV_CREATE:
trp_ide_keymgmt_interface_fn(x1, x2, smc_ret);
break;
default:
ERROR("Invalid SMC code to %s, FID %lx\n", __func__, fid);
smc_ret->x[0] = SMC_UNK;
}
}