mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-08 05:43:53 +00:00

Enforce full include path for includes. Deprecate old paths. The following folders inside include/lib have been left unchanged: - include/lib/cpus/${ARCH} - include/lib/el3_runtime/${ARCH} The reason for this change is that having a global namespace for includes isn't a good idea. It defeats one of the advantages of having folders and it introduces problems that are sometimes subtle (because you may not know the header you are actually including if there are two of them). For example, this patch had to be created because two headers were called the same way:e0ea0928d5
("Fix gpio includes of mt8173 platform to avoid collision."). More recently, this patch has had similar problems:46f9b2c3a2
("drivers: add tzc380 support"). This problem was introduced in commit4ecca33988
("Move include and source files to logical locations"). At that time, there weren't too many headers so it wasn't a real issue. However, time has shown that this creates problems. Platforms that want to preserve the way they include headers may add the removed paths to PLAT_INCLUDES, but this is discouraged. Change-Id: I39dc53ed98f9e297a5966e723d1936d6ccf2fc8f Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>
157 lines
3.7 KiB
ArmAsm
157 lines
3.7 KiB
ArmAsm
/*
|
|
* Copyright (c) 2016-2018, ARM Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <arch.h>
|
|
#include <asm_macros.S>
|
|
#include <bl1/bl1.h>
|
|
#include <common/bl_common.h>
|
|
#include <context.h>
|
|
#include <lib/xlat_tables/xlat_tables.h>
|
|
#include <smccc_helpers.h>
|
|
#include <smccc_macros.S>
|
|
|
|
.globl bl1_aarch32_smc_handler
|
|
|
|
|
|
func bl1_aarch32_smc_handler
|
|
/* On SMC entry, `sp` points to `smc_ctx_t`. Save `lr`. */
|
|
str lr, [sp, #SMC_CTX_LR_MON]
|
|
|
|
/* ------------------------------------------------
|
|
* SMC in BL1 is handled assuming that the MMU is
|
|
* turned off by BL2.
|
|
* ------------------------------------------------
|
|
*/
|
|
|
|
/* ----------------------------------------------
|
|
* Detect if this is a RUN_IMAGE or other SMC.
|
|
* ----------------------------------------------
|
|
*/
|
|
mov lr, #BL1_SMC_RUN_IMAGE
|
|
cmp lr, r0
|
|
bne smc_handler
|
|
|
|
/* ------------------------------------------------
|
|
* Make sure only Secure world reaches here.
|
|
* ------------------------------------------------
|
|
*/
|
|
ldcopr r8, SCR
|
|
tst r8, #SCR_NS_BIT
|
|
blne report_exception
|
|
|
|
/* ---------------------------------------------------------------------
|
|
* Pass control to next secure image.
|
|
* Here it expects r1 to contain the address of a entry_point_info_t
|
|
* structure describing the BL entrypoint.
|
|
* ---------------------------------------------------------------------
|
|
*/
|
|
mov r8, r1
|
|
mov r0, r1
|
|
bl bl1_print_next_bl_ep_info
|
|
|
|
#if SPIN_ON_BL1_EXIT
|
|
bl print_debug_loop_message
|
|
debug_loop:
|
|
b debug_loop
|
|
#endif
|
|
|
|
mov r0, r8
|
|
bl bl1_plat_prepare_exit
|
|
|
|
stcopr r0, TLBIALL
|
|
dsb sy
|
|
isb
|
|
|
|
/*
|
|
* Extract PC and SPSR based on struct `entry_point_info_t`
|
|
* and load it in LR and SPSR registers respectively.
|
|
*/
|
|
ldr lr, [r8, #ENTRY_POINT_INFO_PC_OFFSET]
|
|
ldr r1, [r8, #(ENTRY_POINT_INFO_PC_OFFSET + 4)]
|
|
msr spsr, r1
|
|
|
|
/* Some BL32 stages expect lr_svc to provide the BL33 entry address */
|
|
cps #MODE32_svc
|
|
ldr lr, [r8, #ENTRY_POINT_INFO_LR_SVC_OFFSET]
|
|
cps #MODE32_mon
|
|
|
|
add r8, r8, #ENTRY_POINT_INFO_ARGS_OFFSET
|
|
ldm r8, {r0, r1, r2, r3}
|
|
eret
|
|
endfunc bl1_aarch32_smc_handler
|
|
|
|
/* -----------------------------------------------------
|
|
* Save Secure/Normal world context and jump to
|
|
* BL1 SMC handler.
|
|
* -----------------------------------------------------
|
|
*/
|
|
func smc_handler
|
|
/* -----------------------------------------------------
|
|
* Save the GP registers.
|
|
* -----------------------------------------------------
|
|
*/
|
|
smccc_save_gp_mode_regs
|
|
|
|
/*
|
|
* `sp` still points to `smc_ctx_t`. Save it to a register
|
|
* and restore the C runtime stack pointer to `sp`.
|
|
*/
|
|
mov r6, sp
|
|
ldr sp, [r6, #SMC_CTX_SP_MON]
|
|
|
|
ldr r0, [r6, #SMC_CTX_SCR]
|
|
and r7, r0, #SCR_NS_BIT /* flags */
|
|
|
|
/* Switch to Secure Mode */
|
|
bic r0, #SCR_NS_BIT
|
|
stcopr r0, SCR
|
|
isb
|
|
|
|
/* If caller is from Secure world then turn on the MMU */
|
|
tst r7, #SCR_NS_BIT
|
|
bne skip_mmu_on
|
|
|
|
/* Turn on the MMU */
|
|
mov r0, #DISABLE_DCACHE
|
|
bl enable_mmu_svc_mon
|
|
|
|
/* Enable the data cache. */
|
|
ldcopr r9, SCTLR
|
|
orr r9, r9, #SCTLR_C_BIT
|
|
stcopr r9, SCTLR
|
|
isb
|
|
|
|
skip_mmu_on:
|
|
/* Prepare arguments for BL1 SMC wrapper. */
|
|
ldr r0, [r6, #SMC_CTX_GPREG_R0] /* smc_fid */
|
|
mov r1, #0 /* cookie */
|
|
mov r2, r6 /* handle */
|
|
mov r3, r7 /* flags */
|
|
bl bl1_smc_wrapper
|
|
|
|
/* Get the smc_context for next BL image */
|
|
bl smc_get_next_ctx
|
|
mov r4, r0
|
|
|
|
/* Only turn-off MMU if going to secure world */
|
|
ldr r5, [r4, #SMC_CTX_SCR]
|
|
tst r5, #SCR_NS_BIT
|
|
bne skip_mmu_off
|
|
|
|
/* Disable the MMU */
|
|
bl disable_mmu_icache_secure
|
|
stcopr r0, TLBIALL
|
|
dsb sy
|
|
isb
|
|
|
|
skip_mmu_off:
|
|
/* -----------------------------------------------------
|
|
* Do the transition to next BL image.
|
|
* -----------------------------------------------------
|
|
*/
|
|
mov r0, r4
|
|
monitor_exit
|
|
endfunc smc_handler
|