mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-25 06:19:56 +00:00

A Secure Partition is a software execution environment instantiated in S-EL0 that can be used to implement simple management and security services. Since S-EL0 is an unprivileged exception level, a Secure Partition relies on privileged firmware e.g. ARM Trusted Firmware to be granted access to system and processor resources. Essentially, it is a software sandbox that runs under the control of privileged software in the Secure World and accesses the following system resources: - Memory and device regions in the system address map. - PE system registers. - A range of asynchronous exceptions e.g. interrupts. - A range of synchronous exceptions e.g. SMC function identifiers. A Secure Partition enables privileged firmware to implement only the absolutely essential secure services in EL3 and instantiate the rest in a partition. Since the partition executes in S-EL0, its implementation cannot be overly complex. The component in ARM Trusted Firmware responsible for managing a Secure Partition is called the Secure Partition Manager (SPM). The SPM is responsible for the following: - Validating and allocating resources requested by a Secure Partition. - Implementing a well defined interface that is used for initialising a Secure Partition. - Implementing a well defined interface that is used by the normal world and other secure services for accessing the services exported by a Secure Partition. - Implementing a well defined interface that is used by a Secure Partition to fulfil service requests. - Instantiating the software execution environment required by a Secure Partition to fulfil a service request. Change-Id: I6f7862d6bba8732db5b73f54e789d717a35e802f Co-authored-by: Douglas Raillard <douglas.raillard@arm.com> Co-authored-by: Sandrine Bailleux <sandrine.bailleux@arm.com> Co-authored-by: Achin Gupta <achin.gupta@arm.com> Co-authored-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com> Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>
138 lines
2.9 KiB
C
138 lines
2.9 KiB
C
/*
|
|
* Copyright (c) 2014-2017, ARM Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <assert.h>
|
|
#include <cpu_data.h>
|
|
#include <debug.h>
|
|
#include <pmf.h>
|
|
#include <psci.h>
|
|
#include <runtime_instr.h>
|
|
#include <runtime_svc.h>
|
|
#include <smcc_helpers.h>
|
|
#include <spm_svc.h>
|
|
#include <std_svc.h>
|
|
#include <stdint.h>
|
|
#include <uuid.h>
|
|
|
|
/* Standard Service UUID */
|
|
DEFINE_SVC_UUID(arm_svc_uid,
|
|
0x108d905b, 0xf863, 0x47e8, 0xae, 0x2d,
|
|
0xc0, 0xfb, 0x56, 0x41, 0xf6, 0xe2);
|
|
|
|
/* Setup Standard Services */
|
|
static int32_t std_svc_setup(void)
|
|
{
|
|
uintptr_t svc_arg;
|
|
int ret = 0;
|
|
|
|
svc_arg = get_arm_std_svc_args(PSCI_FID_MASK);
|
|
assert(svc_arg);
|
|
|
|
/*
|
|
* PSCI is one of the specifications implemented as a Standard Service.
|
|
* The `psci_setup()` also does EL3 architectural setup.
|
|
*/
|
|
if (psci_setup((const psci_lib_args_t *)svc_arg) != PSCI_E_SUCCESS) {
|
|
ret = 1;
|
|
}
|
|
|
|
#if ENABLE_SPM
|
|
if (spm_setup() != 0) {
|
|
ret = 1;
|
|
}
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Top-level Standard Service SMC handler. This handler will in turn dispatch
|
|
* calls to PSCI SMC handler
|
|
*/
|
|
uintptr_t std_svc_smc_handler(uint32_t smc_fid,
|
|
u_register_t x1,
|
|
u_register_t x2,
|
|
u_register_t x3,
|
|
u_register_t x4,
|
|
void *cookie,
|
|
void *handle,
|
|
u_register_t flags)
|
|
{
|
|
/*
|
|
* Dispatch PSCI calls to PSCI SMC handler and return its return
|
|
* value
|
|
*/
|
|
if (is_psci_fid(smc_fid)) {
|
|
uint64_t ret;
|
|
|
|
#if ENABLE_RUNTIME_INSTRUMENTATION
|
|
|
|
/*
|
|
* Flush cache line so that even if CPU power down happens
|
|
* the timestamp update is reflected in memory.
|
|
*/
|
|
PMF_WRITE_TIMESTAMP(rt_instr_svc,
|
|
RT_INSTR_ENTER_PSCI,
|
|
PMF_CACHE_MAINT,
|
|
get_cpu_data(cpu_data_pmf_ts[CPU_DATA_PMF_TS0_IDX]));
|
|
#endif
|
|
|
|
ret = psci_smc_handler(smc_fid, x1, x2, x3, x4,
|
|
cookie, handle, flags);
|
|
|
|
#if ENABLE_RUNTIME_INSTRUMENTATION
|
|
PMF_CAPTURE_TIMESTAMP(rt_instr_svc,
|
|
RT_INSTR_EXIT_PSCI,
|
|
PMF_NO_CACHE_MAINT);
|
|
#endif
|
|
|
|
SMC_RET1(handle, ret);
|
|
}
|
|
|
|
|
|
#if ENABLE_SPM
|
|
/*
|
|
* Dispatch SPM calls to SPM SMC handler and return its return
|
|
* value
|
|
*/
|
|
if (is_spm_fid(smc_fid)) {
|
|
return spm_smc_handler(smc_fid, x1, x2, x3, x4, cookie,
|
|
handle, flags);
|
|
}
|
|
#endif
|
|
|
|
switch (smc_fid) {
|
|
case ARM_STD_SVC_CALL_COUNT:
|
|
/*
|
|
* Return the number of Standard Service Calls. PSCI is the only
|
|
* standard service implemented; so return number of PSCI calls
|
|
*/
|
|
SMC_RET1(handle, PSCI_NUM_CALLS);
|
|
|
|
case ARM_STD_SVC_UID:
|
|
/* Return UID to the caller */
|
|
SMC_UUID_RET(handle, arm_svc_uid);
|
|
|
|
case ARM_STD_SVC_VERSION:
|
|
/* Return the version of current implementation */
|
|
SMC_RET2(handle, STD_SVC_VERSION_MAJOR, STD_SVC_VERSION_MINOR);
|
|
|
|
default:
|
|
WARN("Unimplemented Standard Service Call: 0x%x \n", smc_fid);
|
|
SMC_RET1(handle, SMC_UNK);
|
|
}
|
|
}
|
|
|
|
/* Register Standard Service Calls as runtime service */
|
|
DECLARE_RT_SVC(
|
|
std_svc,
|
|
|
|
OEN_STD_START,
|
|
OEN_STD_END,
|
|
SMC_TYPE_FAST,
|
|
std_svc_setup,
|
|
std_svc_smc_handler
|
|
);
|