blob: 7df128b629d8f47745814f3615b6de7719c81b8f [file] [log] [blame]
/*
* Copyright (c) 2021-2022, Arm Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
#include <common/debug.h>
#include <plat/common/platform.h>
#include <services/rmmd_svc.h>
#include <services/trp/platform_trp.h>
#include <platform_def.h>
#include "trp_private.h"
/* Parameters received from the previous image */
static unsigned int trp_boot_abi_version;
static uintptr_t trp_shared_region_start;
/*******************************************************************************
* Per cpu data structure to populate parameters for an SMC in C code and use
* a pointer to this structure in assembler code to populate x0-x7
******************************************************************************/
static trp_args_t trp_smc_args[PLATFORM_CORE_COUNT];
/*******************************************************************************
* Set the arguments for SMC call
******************************************************************************/
static trp_args_t *set_smc_args(uint64_t arg0,
uint64_t arg1,
uint64_t arg2,
uint64_t arg3,
uint64_t arg4,
uint64_t arg5,
uint64_t arg6,
uint64_t arg7)
{
uint32_t linear_id;
trp_args_t *pcpu_smc_args;
/*
* Return to Secure Monitor by raising an SMC. The results of the
* service are passed as an arguments to the SMC
*/
linear_id = plat_my_core_pos();
pcpu_smc_args = &trp_smc_args[linear_id];
write_trp_arg(pcpu_smc_args, TRP_ARG0, arg0);
write_trp_arg(pcpu_smc_args, TRP_ARG1, arg1);
write_trp_arg(pcpu_smc_args, TRP_ARG2, arg2);
write_trp_arg(pcpu_smc_args, TRP_ARG3, arg3);
write_trp_arg(pcpu_smc_args, TRP_ARG4, arg4);
write_trp_arg(pcpu_smc_args, TRP_ARG5, arg5);
write_trp_arg(pcpu_smc_args, TRP_ARG6, arg6);
write_trp_arg(pcpu_smc_args, TRP_ARG7, arg7);
return pcpu_smc_args;
}
/*
* Abort the boot process with the reason given in err.
*/
__dead2 static void trp_boot_abort(uint64_t err)
{
(void)trp_smc(set_smc_args(RMM_BOOT_COMPLETE, err, 0, 0, 0, 0, 0, 0));
panic();
}
/*******************************************************************************
* Setup function for TRP.
******************************************************************************/
void trp_setup(uint64_t x0,
uint64_t x1,
uint64_t x2,
uint64_t x3)
{
/*
* Validate boot parameters.
*
* According to the Boot Interface ABI v.0.1, the
* parameters recived from EL3 are:
* x0: CPUID (verified earlier so not used)
* x1: Boot Interface version
* x2: PLATFORM_CORE_COUNT
* x3: Pointer to the shared memory area.
*/
(void)x0;
if (TRP_RMM_EL3_VERSION_GET_MAJOR(x1) != TRP_RMM_EL3_ABI_VERS_MAJOR) {
trp_boot_abort(E_RMM_BOOT_VERSION_MISMATCH);
}
if ((void *)x3 == NULL) {
trp_boot_abort(E_RMM_BOOT_INVALID_SHARED_BUFFER);
}
if (x2 > TRP_PLATFORM_CORE_COUNT) {
trp_boot_abort(E_RMM_BOOT_CPUS_OUT_OF_RANGE);
}
trp_boot_abi_version = x1;
trp_shared_region_start = x3;
flush_dcache_range((uintptr_t)&trp_boot_abi_version,
sizeof(trp_boot_abi_version));
flush_dcache_range((uintptr_t)&trp_shared_region_start,
sizeof(trp_shared_region_start));
/* Perform early platform-specific setup */
trp_early_platform_setup();
}
/* Main function for TRP */
void trp_main(void)
{
NOTICE("TRP: %s\n", version_string);
NOTICE("TRP: %s\n", build_message);
NOTICE("TRP: Supported RMM-EL3 Interface ABI: v.%u.%u\n",
TRP_RMM_EL3_ABI_VERS_MAJOR, TRP_RMM_EL3_ABI_VERS_MINOR);
INFO("TRP: Memory base : 0x%lx\n", (unsigned long)RMM_BASE);
INFO("TRP: Base address for the shared region : 0x%lx\n",
(unsigned long)trp_shared_region_start);
INFO("TRP: Total size : 0x%lx bytes\n", (unsigned long)(RMM_END
- RMM_BASE));
INFO("TRP: RMM-EL3 Interface ABI reported by EL3: v.%u.%u\n",
TRP_RMM_EL3_VERSION_GET_MAJOR(trp_boot_abi_version),
TRP_RMM_EL3_VERSION_GET_MINOR(trp_boot_abi_version));
}
/*******************************************************************************
* Returning RMI version back to Normal World
******************************************************************************/
static trp_args_t *trp_ret_rmi_version(void)
{
VERBOSE("RMM version is %u.%u\n", RMI_ABI_VERSION_MAJOR,
RMI_ABI_VERSION_MINOR);
return set_smc_args(RMMD_RMI_REQ_COMPLETE, RMI_ABI_VERSION,
0, 0, 0, 0, 0, 0);
}
/*******************************************************************************
* Transitioning granule of NON-SECURE type to REALM type
******************************************************************************/
static trp_args_t *trp_asc_mark_realm(unsigned long long x1)
{
unsigned long long ret;
VERBOSE("Delegating granule 0x%llx\n", x1);
ret = trp_smc(set_smc_args(RMMD_GTSI_DELEGATE, x1, 0, 0, 0, 0, 0, 0));
if (ret != 0ULL) {
ERROR("Granule transition from NON-SECURE type to REALM type "
"failed 0x%llx\n", ret);
}
return set_smc_args(RMMD_RMI_REQ_COMPLETE, ret, 0, 0, 0, 0, 0, 0);
}
/*******************************************************************************
* Transitioning granule of REALM type to NON-SECURE type
******************************************************************************/
static trp_args_t *trp_asc_mark_nonsecure(unsigned long long x1)
{
unsigned long long ret;
VERBOSE("Undelegating granule 0x%llx\n", x1);
ret = trp_smc(set_smc_args(RMMD_GTSI_UNDELEGATE, x1, 0, 0, 0, 0, 0, 0));
if (ret != 0ULL) {
ERROR("Granule transition from REALM type to NON-SECURE type "
"failed 0x%llx\n", ret);
}
return set_smc_args(RMMD_RMI_REQ_COMPLETE, ret, 0, 0, 0, 0, 0, 0);
}
/*******************************************************************************
* Main RMI SMC handler function
******************************************************************************/
trp_args_t *trp_rmi_handler(unsigned long fid, unsigned long long x1)
{
switch (fid) {
case RMI_RMM_REQ_VERSION:
return trp_ret_rmi_version();
case RMI_RMM_GRANULE_DELEGATE:
return trp_asc_mark_realm(x1);
case RMI_RMM_GRANULE_UNDELEGATE:
return trp_asc_mark_nonsecure(x1);
default:
ERROR("Invalid SMC code to %s, FID %lu\n", __func__, fid);
}
return set_smc_args(SMC_UNK, 0, 0, 0, 0, 0, 0, 0);
}