blob: 9e8384844354f1c5ed214344063748fe975a71fb [file] [log] [blame]
Jens Wiklanderc2888862014-08-04 15:39:58 +02001/*
Raymond Mao5fe9abb2023-10-04 09:36:21 -07002 * Copyright (c) 2013-2023, Arm Limited and Contributors. All rights reserved.
Jens Wiklanderc2888862014-08-04 15:39:58 +02003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Jens Wiklanderc2888862014-08-04 15:39:58 +02005 */
6
7
8/*******************************************************************************
9 * This is the Secure Payload Dispatcher (SPD). The dispatcher is meant to be a
10 * plug-in component to the Secure Monitor, registered as a runtime service. The
11 * SPD is expected to be a functional extension of the Secure Payload (SP) that
12 * executes in Secure EL1. The Secure Monitor will delegate all SMCs targeting
13 * the Trusted OS/Applications range to the dispatcher. The SPD will either
14 * handle the request locally or delegate it to the Secure Payload. It is also
15 * responsible for initialising and maintaining communication with the SP.
16 ******************************************************************************/
Jens Wiklanderc2888862014-08-04 15:39:58 +020017#include <assert.h>
Jens Wiklanderc2888862014-08-04 15:39:58 +020018#include <errno.h>
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -070019#include <inttypes.h>
Jens Wiklanderc2888862014-08-04 15:39:58 +020020#include <stddef.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000021
22#include <arch_helpers.h>
23#include <bl31/bl31.h>
24#include <common/bl_common.h>
25#include <common/debug.h>
26#include <common/runtime_svc.h>
Jeffrey Kardatzke45521892023-02-09 10:45:35 -080027#include <lib/coreboot.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000028#include <lib/el3_runtime/context_mgmt.h>
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -070029#include <lib/optee_utils.h>
Raymond Mao5fe9abb2023-10-04 09:36:21 -070030#include <lib/transfer_list.h>
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -070031#include <lib/xlat_tables/xlat_tables_v2.h>
Jeffrey Kardatzke45521892023-02-09 10:45:35 -080032#if OPTEE_ALLOW_SMC_LOAD
33#include <libfdt.h>
34#endif /* OPTEE_ALLOW_SMC_LOAD */
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000035#include <plat/common/platform.h>
Yi Chou097051f2023-04-11 15:57:08 +080036#include <services/oem/chromeos/widevine_smc_handlers.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000037#include <tools_share/uuid.h>
38
Jens Wiklanderc2888862014-08-04 15:39:58 +020039#include "opteed_private.h"
Jens Wiklanderc2888862014-08-04 15:39:58 +020040#include "teesmc_opteed.h"
Isla Mitchell99305012017-07-11 14:54:08 +010041
Raymond Mao5fe9abb2023-10-04 09:36:21 -070042#if OPTEE_ALLOW_SMC_LOAD
43static struct transfer_list_header *bl31_tl;
44#endif
45
Jens Wiklanderc2888862014-08-04 15:39:58 +020046/*******************************************************************************
47 * Address of the entrypoint vector table in OPTEE. It is
48 * initialised once on the primary core after a cold boot.
49 ******************************************************************************/
Sandrine Bailleuxb3b6e222018-07-11 12:44:22 +020050struct optee_vectors *optee_vector_table;
Jens Wiklanderc2888862014-08-04 15:39:58 +020051
52/*******************************************************************************
53 * Array to keep track of per-cpu OPTEE state
54 ******************************************************************************/
55optee_context_t opteed_sp_context[OPTEED_CORE_COUNT];
56uint32_t opteed_rw;
57
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -070058#if OPTEE_ALLOW_SMC_LOAD
59static bool opteed_allow_load;
Jeffrey Kardatzke85f05c02023-03-02 12:02:51 -080060/* OP-TEE image loading service UUID */
61DEFINE_SVC_UUID2(optee_image_load_uuid,
62 0xb1eafba3, 0x5d31, 0x4612, 0xb9, 0x06,
63 0xc4, 0xc7, 0xa4, 0xbe, 0x3c, 0xc0);
Jeffrey Kardatzke45521892023-02-09 10:45:35 -080064
Yi Chou097051f2023-04-11 15:57:08 +080065#define OPTEED_FDT_SIZE 1024
Jeffrey Kardatzke45521892023-02-09 10:45:35 -080066static uint8_t fdt_buf[OPTEED_FDT_SIZE] __aligned(CACHE_WRITEBACK_GRANULE);
67
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -070068#else
Jens Wiklanderc2888862014-08-04 15:39:58 +020069static int32_t opteed_init(void);
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -070070#endif
71
72uint64_t dual32to64(uint32_t high, uint32_t low)
73{
74 return ((uint64_t)high << 32) | low;
75}
Jens Wiklanderc2888862014-08-04 15:39:58 +020076
77/*******************************************************************************
78 * This function is the handler registered for S-EL1 interrupts by the
79 * OPTEED. It validates the interrupt and upon success arranges entry into
80 * the OPTEE at 'optee_fiq_entry()' for handling the interrupt.
81 ******************************************************************************/
82static uint64_t opteed_sel1_interrupt_handler(uint32_t id,
83 uint32_t flags,
84 void *handle,
85 void *cookie)
86{
87 uint32_t linear_id;
Jens Wiklanderc2888862014-08-04 15:39:58 +020088 optee_context_t *optee_ctx;
89
Jeffrey Kardatzke916eb9e2024-04-17 10:38:17 -070090#if OPTEE_ALLOW_SMC_LOAD
91 if (optee_vector_table == NULL) {
92 /* OPTEE is not loaded yet, ignore this interrupt */
93 SMC_RET0(handle);
94 }
95#endif
96
Jens Wiklanderc2888862014-08-04 15:39:58 +020097 /* Check the security state when the exception was generated */
98 assert(get_interrupt_src_ss(flags) == NON_SECURE);
99
Jens Wiklanderc2888862014-08-04 15:39:58 +0200100 /* Sanity check the pointer to this cpu's context */
Jens Wiklanderc2888862014-08-04 15:39:58 +0200101 assert(handle == cm_get_context(NON_SECURE));
102
103 /* Save the non-secure context before entering the OPTEE */
104 cm_el1_sysregs_context_save(NON_SECURE);
105
106 /* Get a reference to this cpu's OPTEE context */
Soby Mathewda43b662015-07-08 21:45:46 +0100107 linear_id = plat_my_core_pos();
Jens Wiklanderc2888862014-08-04 15:39:58 +0200108 optee_ctx = &opteed_sp_context[linear_id];
109 assert(&optee_ctx->cpu_ctx == cm_get_context(SECURE));
110
Daniel Boulbyc5259cc2018-05-15 11:41:55 +0100111 cm_set_elr_el3(SECURE, (uint64_t)&optee_vector_table->fiq_entry);
Jens Wiklanderc2888862014-08-04 15:39:58 +0200112 cm_el1_sysregs_context_restore(SECURE);
113 cm_set_next_eret_context(SECURE);
114
115 /*
116 * Tell the OPTEE that it has to handle an FIQ (synchronously).
117 * Also the instruction in normal world where the interrupt was
118 * generated is passed for debugging purposes. It is safe to
119 * retrieve this address from ELR_EL3 as the secure context will
120 * not take effect until el3_exit().
121 */
122 SMC_RET1(&optee_ctx->cpu_ctx, read_elr_el3());
123}
124
Jeffrey Kardatzke916eb9e2024-04-17 10:38:17 -0700125/*
126 * Registers an interrupt handler for S-EL1 interrupts when generated during
127 * code executing in the non-secure state. Panics if it fails to do so.
128 */
129static void register_opteed_interrupt_handler(void)
130{
131 u_register_t flags;
132 uint64_t rc;
133
134 flags = 0;
135 set_interrupt_rm_flag(flags, NON_SECURE);
136 rc = register_interrupt_type_handler(INTR_TYPE_S_EL1,
137 opteed_sel1_interrupt_handler,
138 flags);
139 if (rc)
140 panic();
141}
142
Jens Wiklanderc2888862014-08-04 15:39:58 +0200143/*******************************************************************************
144 * OPTEE Dispatcher setup. The OPTEED finds out the OPTEE entrypoint and type
145 * (aarch32/aarch64) if not already known and initialises the context for entry
146 * into OPTEE for its initialization.
147 ******************************************************************************/
Masahiro Yamada56212752018-04-19 01:14:42 +0900148static int32_t opteed_setup(void)
Jens Wiklanderc2888862014-08-04 15:39:58 +0200149{
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700150#if OPTEE_ALLOW_SMC_LOAD
151 opteed_allow_load = true;
152 INFO("Delaying OP-TEE setup until we receive an SMC call to load it\n");
Jeffrey Kardatzke916eb9e2024-04-17 10:38:17 -0700153 /*
154 * We must register the interrupt handler now so that the interrupt
155 * priorities are not changed after starting the linux kernel.
156 */
157 register_opteed_interrupt_handler();
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700158 return 0;
159#else
Jens Wiklanderc2888862014-08-04 15:39:58 +0200160 entry_point_info_t *optee_ep_info;
Jens Wiklanderc2888862014-08-04 15:39:58 +0200161 uint32_t linear_id;
Raymond Mao5fe9abb2023-10-04 09:36:21 -0700162 uint64_t arg0;
163 uint64_t arg1;
164 uint64_t arg2;
165 uint64_t arg3;
166 struct transfer_list_header *tl = NULL;
167 struct transfer_list_entry *te = NULL;
168 void *dt = NULL;
Jens Wiklanderc2888862014-08-04 15:39:58 +0200169
Soby Mathewda43b662015-07-08 21:45:46 +0100170 linear_id = plat_my_core_pos();
Jens Wiklanderc2888862014-08-04 15:39:58 +0200171
172 /*
173 * Get information about the Secure Payload (BL32) image. Its
174 * absence is a critical failure. TODO: Add support to
175 * conditionally include the SPD service
176 */
177 optee_ep_info = bl31_plat_get_next_image_ep_info(SECURE);
178 if (!optee_ep_info) {
179 WARN("No OPTEE provided by BL2 boot loader, Booting device"
180 " without OPTEE initialization. SMC`s destined for OPTEE"
181 " will return SMC_UNK\n");
182 return 1;
183 }
184
185 /*
186 * If there's no valid entry point for SP, we return a non-zero value
187 * signalling failure initializing the service. We bail out without
188 * registering any handlers
189 */
190 if (!optee_ep_info->pc)
191 return 1;
192
Raymond Mao5fe9abb2023-10-04 09:36:21 -0700193 if (TRANSFER_LIST &&
194 optee_ep_info->args.arg1 == (TRANSFER_LIST_SIGNATURE |
195 REGISTER_CONVENTION_VERSION_MASK)) {
196 tl = (void *)optee_ep_info->args.arg3;
197 if (transfer_list_check_header(tl) == TL_OPS_NON) {
198 return 1;
199 }
Edison Ai5d685d32017-07-18 16:52:26 +0800200
Raymond Mao5fe9abb2023-10-04 09:36:21 -0700201 opteed_rw = GET_RW(optee_ep_info->spsr);
202 te = transfer_list_find(tl, TL_TAG_FDT);
203 dt = transfer_list_entry_data(te);
204
205 if (opteed_rw == OPTEE_AARCH64) {
206 arg0 = (uint64_t)dt;
207 arg2 = 0;
208 } else {
209 arg2 = (uint64_t)dt;
210 arg0 = 0;
211 }
212
213 arg1 = optee_ep_info->args.arg1;
214 arg3 = optee_ep_info->args.arg3;
215 } else {
216 /* Default handoff arguments */
217 opteed_rw = optee_ep_info->args.arg0;
218 arg0 = optee_ep_info->args.arg1; /* opteed_pageable_part */
219 arg1 = optee_ep_info->args.arg2; /* opteed_mem_limit */
220 arg2 = optee_ep_info->args.arg3; /* dt_addr */
221 arg3 = 0;
222 }
223
224 opteed_init_optee_ep_state(optee_ep_info, opteed_rw, optee_ep_info->pc,
225 arg0, arg1, arg2, arg3,
Jens Wiklanderc2888862014-08-04 15:39:58 +0200226 &opteed_sp_context[linear_id]);
227
228 /*
229 * All OPTEED initialization done. Now register our init function with
230 * BL31 for deferred invocation
231 */
232 bl31_register_bl32_init(&opteed_init);
233
234 return 0;
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700235#endif /* OPTEE_ALLOW_SMC_LOAD */
Jens Wiklanderc2888862014-08-04 15:39:58 +0200236}
237
238/*******************************************************************************
239 * This function passes control to the OPTEE image (BL32) for the first time
240 * on the primary cpu after a cold boot. It assumes that a valid secure
241 * context has already been created by opteed_setup() which can be directly
242 * used. It also assumes that a valid non-secure context has been
243 * initialised by PSCI so it does not need to save and restore any
244 * non-secure state. This function performs a synchronous entry into
Jeffrey Kardatzkeab7e5572023-02-09 11:03:17 -0800245 * OPTEE. OPTEE passes control back to this routine through a SMC. This returns
246 * a non-zero value on success and zero on failure.
Jens Wiklanderc2888862014-08-04 15:39:58 +0200247 ******************************************************************************/
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700248static int32_t
249opteed_init_with_entry_point(entry_point_info_t *optee_entry_point)
Jens Wiklanderc2888862014-08-04 15:39:58 +0200250{
Soby Mathewda43b662015-07-08 21:45:46 +0100251 uint32_t linear_id = plat_my_core_pos();
Jens Wiklanderc2888862014-08-04 15:39:58 +0200252 optee_context_t *optee_ctx = &opteed_sp_context[linear_id];
Jens Wiklanderc2888862014-08-04 15:39:58 +0200253 uint64_t rc;
Jens Wiklanderc2888862014-08-04 15:39:58 +0200254 assert(optee_entry_point);
255
Soby Mathewda43b662015-07-08 21:45:46 +0100256 cm_init_my_context(optee_entry_point);
Jens Wiklanderc2888862014-08-04 15:39:58 +0200257
258 /*
259 * Arrange for an entry into OPTEE. It will be returned via
260 * OPTEE_ENTRY_DONE case
261 */
262 rc = opteed_synchronous_sp_entry(optee_ctx);
263 assert(rc != 0);
264
265 return rc;
266}
267
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700268#if !OPTEE_ALLOW_SMC_LOAD
269static int32_t opteed_init(void)
270{
271 entry_point_info_t *optee_entry_point;
272 /*
273 * Get information about the OP-TEE (BL32) image. Its
274 * absence is a critical failure.
275 */
276 optee_entry_point = bl31_plat_get_next_image_ep_info(SECURE);
277 return opteed_init_with_entry_point(optee_entry_point);
278}
279#endif /* !OPTEE_ALLOW_SMC_LOAD */
Jens Wiklanderc2888862014-08-04 15:39:58 +0200280
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700281#if OPTEE_ALLOW_SMC_LOAD
Jeffrey Kardatzke45521892023-02-09 10:45:35 -0800282#if COREBOOT
283/*
284 * Adds a firmware/coreboot node with the coreboot table information to a device
285 * tree. Returns zero on success or if there is no coreboot table information;
286 * failure code otherwise.
287 */
288static int add_coreboot_node(void *fdt)
289{
290 int ret;
291 uint64_t coreboot_table_addr;
292 uint32_t coreboot_table_size;
293 struct {
294 uint64_t addr;
295 uint32_t size;
296 } reg_node;
297 coreboot_get_table_location(&coreboot_table_addr, &coreboot_table_size);
298 if (!coreboot_table_addr || !coreboot_table_size) {
299 WARN("Unable to get coreboot table location for device tree");
300 return 0;
301 }
302 ret = fdt_begin_node(fdt, "firmware");
303 if (ret)
304 return ret;
305
306 ret = fdt_property(fdt, "ranges", NULL, 0);
307 if (ret)
308 return ret;
309
310 ret = fdt_begin_node(fdt, "coreboot");
311 if (ret)
312 return ret;
313
314 ret = fdt_property_string(fdt, "compatible", "coreboot");
315 if (ret)
316 return ret;
317
318 reg_node.addr = cpu_to_fdt64(coreboot_table_addr);
319 reg_node.size = cpu_to_fdt32(coreboot_table_size);
320 ret = fdt_property(fdt, "reg", &reg_node,
321 sizeof(uint64_t) + sizeof(uint32_t));
322 if (ret)
323 return ret;
324
325 ret = fdt_end_node(fdt);
326 if (ret)
327 return ret;
328
329 return fdt_end_node(fdt);
330}
331#endif /* COREBOOT */
332
Yi Chou097051f2023-04-11 15:57:08 +0800333#if CROS_WIDEVINE_SMC
334/*
335 * Adds a options/widevine node with the widevine table information to a device
336 * tree. Returns zero on success or if there is no widevine table information;
337 * failure code otherwise.
338 */
339static int add_options_widevine_node(void *fdt)
340{
341 int ret;
342
343 ret = fdt_begin_node(fdt, "options");
344 if (ret)
345 return ret;
346
347 ret = fdt_begin_node(fdt, "op-tee");
348 if (ret)
349 return ret;
350
351 ret = fdt_begin_node(fdt, "widevine");
352 if (ret)
353 return ret;
354
355 if (cros_oem_tpm_auth_pk.length) {
356 ret = fdt_property(fdt, "tcg,tpm-auth-public-key",
357 cros_oem_tpm_auth_pk.buffer,
358 cros_oem_tpm_auth_pk.length);
359 if (ret)
360 return ret;
361 }
362
363 if (cros_oem_huk.length) {
364 ret = fdt_property(fdt, "op-tee,hardware-unique-key",
365 cros_oem_huk.buffer, cros_oem_huk.length);
366 if (ret)
367 return ret;
368 }
369
370 if (cros_oem_rot.length) {
371 ret = fdt_property(fdt, "google,widevine-root-of-trust-ecc-p256",
372 cros_oem_rot.buffer, cros_oem_rot.length);
373 if (ret)
374 return ret;
375 }
376
377 ret = fdt_end_node(fdt);
378 if (ret)
379 return ret;
380
381 ret = fdt_end_node(fdt);
382 if (ret)
383 return ret;
384
385 return fdt_end_node(fdt);
386}
387#endif /* CROS_WIDEVINE_SMC */
388
Jeffrey Kardatzke45521892023-02-09 10:45:35 -0800389/*
390 * Creates a device tree for passing into OP-TEE. Currently is populated with
391 * the coreboot table address.
392 * Returns 0 on success, error code otherwise.
393 */
394static int create_opteed_dt(void)
395{
396 int ret;
397
398 ret = fdt_create(fdt_buf, OPTEED_FDT_SIZE);
399 if (ret)
400 return ret;
401
402 ret = fdt_finish_reservemap(fdt_buf);
403 if (ret)
404 return ret;
405
406 ret = fdt_begin_node(fdt_buf, "");
407 if (ret)
408 return ret;
409
410#if COREBOOT
411 ret = add_coreboot_node(fdt_buf);
412 if (ret)
413 return ret;
414#endif /* COREBOOT */
415
Yi Chou097051f2023-04-11 15:57:08 +0800416#if CROS_WIDEVINE_SMC
417 ret = add_options_widevine_node(fdt_buf);
418 if (ret)
419 return ret;
420#endif /* CROS_WIDEVINE_SMC */
421
Jeffrey Kardatzke45521892023-02-09 10:45:35 -0800422 ret = fdt_end_node(fdt_buf);
423 if (ret)
424 return ret;
425
426 return fdt_finish(fdt_buf);
427}
428
Raymond Mao5fe9abb2023-10-04 09:36:21 -0700429static int32_t create_smc_tl(const void *fdt, uint32_t fdt_sz)
430{
431#if TRANSFER_LIST
432 bl31_tl = transfer_list_init((void *)(uintptr_t)FW_HANDOFF_BASE,
433 FW_HANDOFF_SIZE);
434 if (!bl31_tl) {
435 ERROR("Failed to initialize Transfer List at 0x%lx\n",
436 (unsigned long)FW_HANDOFF_BASE);
437 return -1;
438 }
439
440 if (!transfer_list_add(bl31_tl, TL_TAG_FDT, fdt_sz, fdt)) {
441 return -1;
442 }
443 return 0;
444#else
445 return -1;
446#endif
447}
448
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700449/*******************************************************************************
450 * This function is responsible for handling the SMC that loads the OP-TEE
451 * binary image via a non-secure SMC call. It takes the size and physical
452 * address of the payload as parameters.
453 ******************************************************************************/
454static int32_t opteed_handle_smc_load(uint64_t data_size, uint32_t data_pa)
455{
456 uintptr_t data_va = data_pa;
457 uint64_t mapped_data_pa;
458 uintptr_t mapped_data_va;
459 uint64_t data_map_size;
460 int32_t rc;
461 optee_header_t *image_header;
462 uint8_t *image_ptr;
463 uint64_t target_pa;
464 uint64_t target_end_pa;
465 uint64_t image_pa;
466 uintptr_t image_va;
467 optee_image_t *curr_image;
468 uintptr_t target_va;
469 uint64_t target_size;
470 entry_point_info_t optee_ep_info;
471 uint32_t linear_id = plat_my_core_pos();
Jeffrey Kardatzke45521892023-02-09 10:45:35 -0800472 uint64_t dt_addr = 0;
Raymond Mao5fe9abb2023-10-04 09:36:21 -0700473 uint64_t arg0 = 0;
474 uint64_t arg1 = 0;
475 uint64_t arg2 = 0;
476 uint64_t arg3 = 0;
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700477
478 mapped_data_pa = page_align(data_pa, DOWN);
479 mapped_data_va = mapped_data_pa;
480 data_map_size = page_align(data_size + (mapped_data_pa - data_pa), UP);
481
Jeffrey Kardatzkeab7e5572023-02-09 11:03:17 -0800482 /*
483 * We do not validate the passed in address because we are trusting the
484 * non-secure world at this point still.
485 */
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700486 rc = mmap_add_dynamic_region(mapped_data_pa, mapped_data_va,
487 data_map_size, MT_MEMORY | MT_RO | MT_NS);
488 if (rc != 0) {
489 return rc;
490 }
491
492 image_header = (optee_header_t *)data_va;
493 if (image_header->magic != TEE_MAGIC_NUM_OPTEE ||
494 image_header->version != 2 || image_header->nb_images != 1) {
495 mmap_remove_dynamic_region(mapped_data_va, data_map_size);
496 return -EINVAL;
497 }
498
499 image_ptr = (uint8_t *)data_va + sizeof(optee_header_t) +
500 sizeof(optee_image_t);
501 if (image_header->arch == 1) {
502 opteed_rw = OPTEE_AARCH64;
503 } else {
504 opteed_rw = OPTEE_AARCH32;
505 }
506
507 curr_image = &image_header->optee_image_list[0];
508 image_pa = dual32to64(curr_image->load_addr_hi,
509 curr_image->load_addr_lo);
510 image_va = image_pa;
511 target_end_pa = image_pa + curr_image->size;
512
513 /* Now also map the memory we want to copy it to. */
514 target_pa = page_align(image_pa, DOWN);
515 target_va = target_pa;
516 target_size = page_align(target_end_pa, UP) - target_pa;
517
518 rc = mmap_add_dynamic_region(target_pa, target_va, target_size,
519 MT_MEMORY | MT_RW | MT_SECURE);
520 if (rc != 0) {
521 mmap_remove_dynamic_region(mapped_data_va, data_map_size);
522 return rc;
523 }
524
525 INFO("Loaded OP-TEE via SMC: size %d addr 0x%" PRIx64 "\n",
526 curr_image->size, image_va);
527
528 memcpy((void *)image_va, image_ptr, curr_image->size);
529 flush_dcache_range(target_pa, target_size);
530
531 mmap_remove_dynamic_region(mapped_data_va, data_map_size);
532 mmap_remove_dynamic_region(target_va, target_size);
533
534 /* Save the non-secure state */
535 cm_el1_sysregs_context_save(NON_SECURE);
536
Jeffrey Kardatzke45521892023-02-09 10:45:35 -0800537 rc = create_opteed_dt();
538 if (rc) {
539 ERROR("Failed device tree creation %d\n", rc);
540 return rc;
541 }
542 dt_addr = (uint64_t)fdt_buf;
543 flush_dcache_range(dt_addr, OPTEED_FDT_SIZE);
544
Raymond Mao5fe9abb2023-10-04 09:36:21 -0700545 if (TRANSFER_LIST &&
546 !create_smc_tl((void *)dt_addr, OPTEED_FDT_SIZE)) {
547 struct transfer_list_entry *te = NULL;
548 void *dt = NULL;
549
550 te = transfer_list_find(bl31_tl, TL_TAG_FDT);
551 dt = transfer_list_entry_data(te);
552
553 if (opteed_rw == OPTEE_AARCH64) {
554 arg0 = (uint64_t)dt;
levi.yun010d2ae2024-05-13 10:27:17 +0100555 arg1 = TRANSFER_LIST_HANDOFF_X1_VALUE(REGISTER_CONVENTION_VERSION);
Raymond Mao5fe9abb2023-10-04 09:36:21 -0700556 arg2 = 0;
557 } else {
Raymond Mao5fe9abb2023-10-04 09:36:21 -0700558 arg0 = 0;
levi.yun010d2ae2024-05-13 10:27:17 +0100559 arg1 = TRANSFER_LIST_HANDOFF_R1_VALUE(REGISTER_CONVENTION_VERSION);
560 arg2 = (uint64_t)dt;
Raymond Mao5fe9abb2023-10-04 09:36:21 -0700561 }
levi.yun010d2ae2024-05-13 10:27:17 +0100562
Raymond Mao5fe9abb2023-10-04 09:36:21 -0700563 arg3 = (uint64_t)bl31_tl;
564 } else {
565 /* Default handoff arguments */
566 arg2 = dt_addr;
567 }
568
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700569 opteed_init_optee_ep_state(&optee_ep_info,
570 opteed_rw,
571 image_pa,
Raymond Mao5fe9abb2023-10-04 09:36:21 -0700572 arg0,
573 arg1,
574 arg2,
575 arg3,
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700576 &opteed_sp_context[linear_id]);
Jeffrey Kardatzkeab7e5572023-02-09 11:03:17 -0800577 if (opteed_init_with_entry_point(&optee_ep_info) == 0) {
578 rc = -EFAULT;
579 }
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700580
581 /* Restore non-secure state */
582 cm_el1_sysregs_context_restore(NON_SECURE);
583 cm_set_next_eret_context(NON_SECURE);
584
585 return rc;
586}
587#endif /* OPTEE_ALLOW_SMC_LOAD */
588
Jens Wiklanderc2888862014-08-04 15:39:58 +0200589/*******************************************************************************
590 * This function is responsible for handling all SMCs in the Trusted OS/App
591 * range from the non-secure state as defined in the SMC Calling Convention
592 * Document. It is also responsible for communicating with the Secure
593 * payload to delegate work and return results back to the non-secure
594 * state. Lastly it will also return any information that OPTEE needs to do
595 * the work assigned to it.
596 ******************************************************************************/
Masahiro Yamada5ac9d962018-04-19 01:18:48 +0900597static uintptr_t opteed_smc_handler(uint32_t smc_fid,
598 u_register_t x1,
599 u_register_t x2,
600 u_register_t x3,
601 u_register_t x4,
Jens Wiklanderc2888862014-08-04 15:39:58 +0200602 void *cookie,
603 void *handle,
Masahiro Yamada5ac9d962018-04-19 01:18:48 +0900604 u_register_t flags)
Jens Wiklanderc2888862014-08-04 15:39:58 +0200605{
606 cpu_context_t *ns_cpu_context;
Soby Mathewda43b662015-07-08 21:45:46 +0100607 uint32_t linear_id = plat_my_core_pos();
Jens Wiklanderc2888862014-08-04 15:39:58 +0200608 optee_context_t *optee_ctx = &opteed_sp_context[linear_id];
Jens Wiklanderc2888862014-08-04 15:39:58 +0200609
610 /*
611 * Determine which security state this SMC originated from
612 */
613
614 if (is_caller_non_secure(flags)) {
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700615#if OPTEE_ALLOW_SMC_LOAD
Jeffrey Kardatzke85f05c02023-03-02 12:02:51 -0800616 if (opteed_allow_load && smc_fid == NSSMC_OPTEED_CALL_UID) {
617 /* Provide the UUID of the image loading service. */
618 SMC_UUID_RET(handle, optee_image_load_uuid);
619 }
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700620 if (smc_fid == NSSMC_OPTEED_CALL_LOAD_IMAGE) {
621 /*
622 * TODO: Consider wiping the code for SMC loading from
623 * memory after it has been invoked similar to what is
624 * done under RECLAIM_INIT, but extended to happen
625 * later.
626 */
627 if (!opteed_allow_load) {
628 SMC_RET1(handle, -EPERM);
629 }
630
631 opteed_allow_load = false;
632 uint64_t data_size = dual32to64(x1, x2);
633 uint64_t data_pa = dual32to64(x3, x4);
634 if (!data_size || !data_pa) {
635 /*
636 * This is invoked when the OP-TEE image didn't
637 * load correctly in the kernel but we want to
638 * block off loading of it later for security
639 * reasons.
640 */
641 SMC_RET1(handle, -EINVAL);
642 }
643 SMC_RET1(handle, opteed_handle_smc_load(
644 data_size, data_pa));
645 }
646#endif /* OPTEE_ALLOW_SMC_LOAD */
Jens Wiklanderc2888862014-08-04 15:39:58 +0200647 /*
648 * This is a fresh request from the non-secure client.
649 * The parameters are in x1 and x2. Figure out which
650 * registers need to be preserved, save the non-secure
651 * state and send the request to the secure payload.
652 */
653 assert(handle == cm_get_context(NON_SECURE));
654
655 cm_el1_sysregs_context_save(NON_SECURE);
656
657 /*
658 * We are done stashing the non-secure context. Ask the
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700659 * OP-TEE to do the work now. If we are loading vi an SMC,
660 * then we also need to init this CPU context if not done
661 * already.
Jens Wiklanderc2888862014-08-04 15:39:58 +0200662 */
Jeffrey Kardatzke7e6b09a2022-10-03 15:50:21 -0700663 if (optee_vector_table == NULL) {
664 SMC_RET1(handle, -EINVAL);
665 }
666
667 if (get_optee_pstate(optee_ctx->state) ==
668 OPTEE_PSTATE_UNKNOWN) {
669 opteed_cpu_on_finish_handler(0);
670 }
Jens Wiklanderc2888862014-08-04 15:39:58 +0200671
672 /*
673 * Verify if there is a valid context to use, copy the
674 * operation type and parameters to the secure context
675 * and jump to the fast smc entry point in the secure
676 * payload. Entry into S-EL1 will take place upon exit
677 * from this function.
678 */
679 assert(&optee_ctx->cpu_ctx == cm_get_context(SECURE));
680
681 /* Set appropriate entry for SMC.
682 * We expect OPTEE to manage the PSTATE.I and PSTATE.F
683 * flags as appropriate.
684 */
685 if (GET_SMC_TYPE(smc_fid) == SMC_TYPE_FAST) {
686 cm_set_elr_el3(SECURE, (uint64_t)
Daniel Boulbyc5259cc2018-05-15 11:41:55 +0100687 &optee_vector_table->fast_smc_entry);
Jens Wiklanderc2888862014-08-04 15:39:58 +0200688 } else {
689 cm_set_elr_el3(SECURE, (uint64_t)
Daniel Boulbyc5259cc2018-05-15 11:41:55 +0100690 &optee_vector_table->yield_smc_entry);
Jens Wiklanderc2888862014-08-04 15:39:58 +0200691 }
692
693 cm_el1_sysregs_context_restore(SECURE);
694 cm_set_next_eret_context(SECURE);
695
Ashutosh Singh3270b842016-03-31 17:18:34 +0100696 write_ctx_reg(get_gpregs_ctx(&optee_ctx->cpu_ctx),
697 CTX_GPREG_X4,
698 read_ctx_reg(get_gpregs_ctx(handle),
699 CTX_GPREG_X4));
700 write_ctx_reg(get_gpregs_ctx(&optee_ctx->cpu_ctx),
701 CTX_GPREG_X5,
702 read_ctx_reg(get_gpregs_ctx(handle),
703 CTX_GPREG_X5));
704 write_ctx_reg(get_gpregs_ctx(&optee_ctx->cpu_ctx),
705 CTX_GPREG_X6,
706 read_ctx_reg(get_gpregs_ctx(handle),
707 CTX_GPREG_X6));
Jens Wiklanderc2888862014-08-04 15:39:58 +0200708 /* Propagate hypervisor client ID */
709 write_ctx_reg(get_gpregs_ctx(&optee_ctx->cpu_ctx),
710 CTX_GPREG_X7,
711 read_ctx_reg(get_gpregs_ctx(handle),
712 CTX_GPREG_X7));
713
714 SMC_RET4(&optee_ctx->cpu_ctx, smc_fid, x1, x2, x3);
715 }
716
717 /*
718 * Returning from OPTEE
719 */
720
721 switch (smc_fid) {
722 /*
723 * OPTEE has finished initialising itself after a cold boot
724 */
725 case TEESMC_OPTEED_RETURN_ENTRY_DONE:
726 /*
727 * Stash the OPTEE entry points information. This is done
728 * only once on the primary cpu
729 */
Daniel Boulbyc5259cc2018-05-15 11:41:55 +0100730 assert(optee_vector_table == NULL);
731 optee_vector_table = (optee_vectors_t *) x1;
Jens Wiklanderc2888862014-08-04 15:39:58 +0200732
Daniel Boulbyc5259cc2018-05-15 11:41:55 +0100733 if (optee_vector_table) {
Jens Wiklanderc2888862014-08-04 15:39:58 +0200734 set_optee_pstate(optee_ctx->state, OPTEE_PSTATE_ON);
735
736 /*
737 * OPTEE has been successfully initialized.
738 * Register power management hooks with PSCI
739 */
740 psci_register_spd_pm_hook(&opteed_pm);
741
Jeffrey Kardatzke916eb9e2024-04-17 10:38:17 -0700742#if !OPTEE_ALLOW_SMC_LOAD
743 register_opteed_interrupt_handler();
744#endif
Jens Wiklanderc2888862014-08-04 15:39:58 +0200745 }
746
747 /*
748 * OPTEE reports completion. The OPTEED must have initiated
749 * the original request through a synchronous entry into
750 * OPTEE. Jump back to the original C runtime context.
751 */
752 opteed_synchronous_sp_exit(optee_ctx, x1);
Jonathan Wright75a5d8b2018-03-14 15:56:21 +0000753 break;
Jens Wiklanderc2888862014-08-04 15:39:58 +0200754
755
756 /*
757 * These function IDs is used only by OP-TEE to indicate it has
758 * finished:
759 * 1. turning itself on in response to an earlier psci
760 * cpu_on request
761 * 2. resuming itself after an earlier psci cpu_suspend
762 * request.
763 */
764 case TEESMC_OPTEED_RETURN_ON_DONE:
765 case TEESMC_OPTEED_RETURN_RESUME_DONE:
766
767
768 /*
769 * These function IDs is used only by the SP to indicate it has
770 * finished:
771 * 1. suspending itself after an earlier psci cpu_suspend
772 * request.
773 * 2. turning itself off in response to an earlier psci
774 * cpu_off request.
775 */
776 case TEESMC_OPTEED_RETURN_OFF_DONE:
777 case TEESMC_OPTEED_RETURN_SUSPEND_DONE:
778 case TEESMC_OPTEED_RETURN_SYSTEM_OFF_DONE:
779 case TEESMC_OPTEED_RETURN_SYSTEM_RESET_DONE:
780
781 /*
782 * OPTEE reports completion. The OPTEED must have initiated the
783 * original request through a synchronous entry into OPTEE.
784 * Jump back to the original C runtime context, and pass x1 as
785 * return value to the caller
786 */
787 opteed_synchronous_sp_exit(optee_ctx, x1);
Jonathan Wright75a5d8b2018-03-14 15:56:21 +0000788 break;
Jens Wiklanderc2888862014-08-04 15:39:58 +0200789
790 /*
791 * OPTEE is returning from a call or being preempted from a call, in
792 * either case execution should resume in the normal world.
793 */
794 case TEESMC_OPTEED_RETURN_CALL_DONE:
795 /*
796 * This is the result from the secure client of an
797 * earlier request. The results are in x0-x3. Copy it
798 * into the non-secure context, save the secure state
799 * and return to the non-secure state.
800 */
801 assert(handle == cm_get_context(SECURE));
802 cm_el1_sysregs_context_save(SECURE);
803
804 /* Get a reference to the non-secure context */
805 ns_cpu_context = cm_get_context(NON_SECURE);
806 assert(ns_cpu_context);
807
808 /* Restore non-secure state */
809 cm_el1_sysregs_context_restore(NON_SECURE);
810 cm_set_next_eret_context(NON_SECURE);
811
812 SMC_RET4(ns_cpu_context, x1, x2, x3, x4);
813
814 /*
815 * OPTEE has finished handling a S-EL1 FIQ interrupt. Execution
816 * should resume in the normal world.
817 */
818 case TEESMC_OPTEED_RETURN_FIQ_DONE:
819 /* Get a reference to the non-secure context */
820 ns_cpu_context = cm_get_context(NON_SECURE);
821 assert(ns_cpu_context);
822
823 /*
824 * Restore non-secure state. There is no need to save the
825 * secure system register context since OPTEE was supposed
826 * to preserve it during S-EL1 interrupt handling.
827 */
828 cm_el1_sysregs_context_restore(NON_SECURE);
829 cm_set_next_eret_context(NON_SECURE);
830
831 SMC_RET0((uint64_t) ns_cpu_context);
832
833 default:
834 panic();
835 }
836}
837
838/* Define an OPTEED runtime service descriptor for fast SMC calls */
839DECLARE_RT_SVC(
840 opteed_fast,
841
842 OEN_TOS_START,
843 OEN_TOS_END,
844 SMC_TYPE_FAST,
845 opteed_setup,
846 opteed_smc_handler
847);
848
David Cunadoc8833ea2017-04-16 17:15:08 +0100849/* Define an OPTEED runtime service descriptor for yielding SMC calls */
Jens Wiklanderc2888862014-08-04 15:39:58 +0200850DECLARE_RT_SVC(
851 opteed_std,
852
853 OEN_TOS_START,
854 OEN_TOS_END,
David Cunadoc8833ea2017-04-16 17:15:08 +0100855 SMC_TYPE_YIELD,
Jens Wiklanderc2888862014-08-04 15:39:58 +0200856 NULL,
857 opteed_smc_handler
858);