| /* |
| * Copyright (c) 2021-2022, Arm Limited and Contributors. All rights reserved. |
| * |
| * SPDX-License-Identifier: BSD-3-Clause |
| */ |
| |
| |
| #include <common/debug.h> |
| #include <plat/common/platform.h> |
| #include <services/rmmd_svc.h> |
| #include <services/trp/platform_trp.h> |
| |
| #include <platform_def.h> |
| #include "trp_private.h" |
| |
| /* Parameters received from the previous image */ |
| static unsigned int trp_boot_abi_version; |
| static uintptr_t trp_shared_region_start; |
| |
| /******************************************************************************* |
| * Per cpu data structure to populate parameters for an SMC in C code and use |
| * a pointer to this structure in assembler code to populate x0-x7 |
| ******************************************************************************/ |
| static trp_args_t trp_smc_args[PLATFORM_CORE_COUNT]; |
| |
| /******************************************************************************* |
| * Set the arguments for SMC call |
| ******************************************************************************/ |
| static trp_args_t *set_smc_args(uint64_t arg0, |
| uint64_t arg1, |
| uint64_t arg2, |
| uint64_t arg3, |
| uint64_t arg4, |
| uint64_t arg5, |
| uint64_t arg6, |
| uint64_t arg7) |
| { |
| uint32_t linear_id; |
| trp_args_t *pcpu_smc_args; |
| |
| /* |
| * Return to Secure Monitor by raising an SMC. The results of the |
| * service are passed as an arguments to the SMC |
| */ |
| linear_id = plat_my_core_pos(); |
| pcpu_smc_args = &trp_smc_args[linear_id]; |
| write_trp_arg(pcpu_smc_args, TRP_ARG0, arg0); |
| write_trp_arg(pcpu_smc_args, TRP_ARG1, arg1); |
| write_trp_arg(pcpu_smc_args, TRP_ARG2, arg2); |
| write_trp_arg(pcpu_smc_args, TRP_ARG3, arg3); |
| write_trp_arg(pcpu_smc_args, TRP_ARG4, arg4); |
| write_trp_arg(pcpu_smc_args, TRP_ARG5, arg5); |
| write_trp_arg(pcpu_smc_args, TRP_ARG6, arg6); |
| write_trp_arg(pcpu_smc_args, TRP_ARG7, arg7); |
| |
| return pcpu_smc_args; |
| } |
| |
| /* |
| * Abort the boot process with the reason given in err. |
| */ |
| __dead2 static void trp_boot_abort(uint64_t err) |
| { |
| (void)trp_smc(set_smc_args(RMM_BOOT_COMPLETE, err, 0, 0, 0, 0, 0, 0)); |
| panic(); |
| } |
| |
| /******************************************************************************* |
| * Setup function for TRP. |
| ******************************************************************************/ |
| void trp_setup(uint64_t x0, |
| uint64_t x1, |
| uint64_t x2, |
| uint64_t x3) |
| { |
| /* |
| * Validate boot parameters. |
| * |
| * According to the Boot Interface ABI v.0.1, the |
| * parameters recived from EL3 are: |
| * x0: CPUID (verified earlier so not used) |
| * x1: Boot Interface version |
| * x2: PLATFORM_CORE_COUNT |
| * x3: Pointer to the shared memory area. |
| */ |
| |
| (void)x0; |
| |
| if (TRP_RMM_EL3_VERSION_GET_MAJOR(x1) != TRP_RMM_EL3_ABI_VERS_MAJOR) { |
| trp_boot_abort(E_RMM_BOOT_VERSION_MISMATCH); |
| } |
| |
| if ((void *)x3 == NULL) { |
| trp_boot_abort(E_RMM_BOOT_INVALID_SHARED_BUFFER); |
| } |
| |
| if (x2 > TRP_PLATFORM_CORE_COUNT) { |
| trp_boot_abort(E_RMM_BOOT_CPUS_OUT_OF_RANGE); |
| } |
| |
| trp_boot_abi_version = x1; |
| trp_shared_region_start = x3; |
| flush_dcache_range((uintptr_t)&trp_boot_abi_version, |
| sizeof(trp_boot_abi_version)); |
| flush_dcache_range((uintptr_t)&trp_shared_region_start, |
| sizeof(trp_shared_region_start)); |
| |
| /* Perform early platform-specific setup */ |
| trp_early_platform_setup(); |
| } |
| |
| /* Main function for TRP */ |
| void trp_main(void) |
| { |
| NOTICE("TRP: %s\n", version_string); |
| NOTICE("TRP: %s\n", build_message); |
| NOTICE("TRP: Supported RMM-EL3 Interface ABI: v.%u.%u\n", |
| TRP_RMM_EL3_ABI_VERS_MAJOR, TRP_RMM_EL3_ABI_VERS_MINOR); |
| INFO("TRP: Memory base : 0x%lx\n", (unsigned long)RMM_BASE); |
| INFO("TRP: Base address for the shared region : 0x%lx\n", |
| (unsigned long)trp_shared_region_start); |
| INFO("TRP: Total size : 0x%lx bytes\n", (unsigned long)(RMM_END |
| - RMM_BASE)); |
| INFO("TRP: RMM-EL3 Interface ABI reported by EL3: v.%u.%u\n", |
| TRP_RMM_EL3_VERSION_GET_MAJOR(trp_boot_abi_version), |
| TRP_RMM_EL3_VERSION_GET_MINOR(trp_boot_abi_version)); |
| } |
| |
| /******************************************************************************* |
| * Returning RMI version back to Normal World |
| ******************************************************************************/ |
| static trp_args_t *trp_ret_rmi_version(void) |
| { |
| VERBOSE("RMM version is %u.%u\n", RMI_ABI_VERSION_MAJOR, |
| RMI_ABI_VERSION_MINOR); |
| return set_smc_args(RMMD_RMI_REQ_COMPLETE, RMI_ABI_VERSION, |
| 0, 0, 0, 0, 0, 0); |
| } |
| |
| /******************************************************************************* |
| * Transitioning granule of NON-SECURE type to REALM type |
| ******************************************************************************/ |
| static trp_args_t *trp_asc_mark_realm(unsigned long long x1) |
| { |
| unsigned long long ret; |
| |
| VERBOSE("Delegating granule 0x%llx\n", x1); |
| ret = trp_smc(set_smc_args(RMMD_GTSI_DELEGATE, x1, 0, 0, 0, 0, 0, 0)); |
| |
| if (ret != 0ULL) { |
| ERROR("Granule transition from NON-SECURE type to REALM type " |
| "failed 0x%llx\n", ret); |
| } |
| return set_smc_args(RMMD_RMI_REQ_COMPLETE, ret, 0, 0, 0, 0, 0, 0); |
| } |
| |
| /******************************************************************************* |
| * Transitioning granule of REALM type to NON-SECURE type |
| ******************************************************************************/ |
| static trp_args_t *trp_asc_mark_nonsecure(unsigned long long x1) |
| { |
| unsigned long long ret; |
| |
| VERBOSE("Undelegating granule 0x%llx\n", x1); |
| ret = trp_smc(set_smc_args(RMMD_GTSI_UNDELEGATE, x1, 0, 0, 0, 0, 0, 0)); |
| |
| if (ret != 0ULL) { |
| ERROR("Granule transition from REALM type to NON-SECURE type " |
| "failed 0x%llx\n", ret); |
| } |
| return set_smc_args(RMMD_RMI_REQ_COMPLETE, ret, 0, 0, 0, 0, 0, 0); |
| } |
| |
| /******************************************************************************* |
| * Main RMI SMC handler function |
| ******************************************************************************/ |
| trp_args_t *trp_rmi_handler(unsigned long fid, unsigned long long x1) |
| { |
| switch (fid) { |
| case RMI_RMM_REQ_VERSION: |
| return trp_ret_rmi_version(); |
| case RMI_RMM_GRANULE_DELEGATE: |
| return trp_asc_mark_realm(x1); |
| case RMI_RMM_GRANULE_UNDELEGATE: |
| return trp_asc_mark_nonsecure(x1); |
| default: |
| ERROR("Invalid SMC code to %s, FID %lu\n", __func__, fid); |
| } |
| return set_smc_args(SMC_UNK, 0, 0, 0, 0, 0, 0, 0); |
| } |