mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-11 15:14:21 +00:00

This function causes the build message to be generated and compiled in two different ways, with one way done inside `build_macros.mk` and the other done inside `windows.mk`, mostly because it's done by generating the C file on the command line. We can instead replace this whole build message generation sequence with a simple standard C compilation command and a normal C file. Change-Id: I8bc136380c9585ddeec9a11154ee39ef70526f81 Signed-off-by: Chris Kay <chris.kay@arm.com>
186 lines
5.7 KiB
C
186 lines
5.7 KiB
C
/*
|
|
* Copyright (c) 2021-2024, Arm Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <common/build_message.h>
|
|
#include <common/debug.h>
|
|
#include <plat/common/platform.h>
|
|
#include <services/rmm_core_manifest.h>
|
|
#include <services/rmmd_svc.h>
|
|
#include <services/trp/platform_trp.h>
|
|
#include <trp_helpers.h>
|
|
#include "trp_private.h"
|
|
|
|
#include <platform_def.h>
|
|
|
|
/* Parameters received from the previous image */
|
|
static unsigned int trp_boot_abi_version;
|
|
static uintptr_t trp_shared_region_start;
|
|
|
|
/* Parameters received from boot manifest */
|
|
uint32_t trp_boot_manifest_version;
|
|
|
|
/*******************************************************************************
|
|
* Setup function for TRP.
|
|
******************************************************************************/
|
|
void trp_setup(uint64_t x0,
|
|
uint64_t x1,
|
|
uint64_t x2,
|
|
uint64_t x3)
|
|
{
|
|
/*
|
|
* Validate boot parameters
|
|
*
|
|
* According to the Boot Interface ABI v.0.1,
|
|
* the parameters received from EL3 are:
|
|
* x0: CPUID (verified earlier, so not used)
|
|
* x1: Boot Interface version
|
|
* x2: PLATFORM_CORE_COUNT
|
|
* x3: Pointer to the shared memory area.
|
|
*/
|
|
|
|
(void)x0;
|
|
|
|
if (TRP_RMM_EL3_VERSION_GET_MAJOR(x1) != TRP_RMM_EL3_ABI_VERS_MAJOR) {
|
|
trp_boot_abort(E_RMM_BOOT_VERSION_MISMATCH);
|
|
}
|
|
|
|
if ((void *)x3 == NULL) {
|
|
trp_boot_abort(E_RMM_BOOT_INVALID_SHARED_BUFFER);
|
|
}
|
|
|
|
if (x2 > TRP_PLATFORM_CORE_COUNT) {
|
|
trp_boot_abort(E_RMM_BOOT_CPUS_OUT_OF_RANGE);
|
|
}
|
|
|
|
trp_boot_abi_version = x1;
|
|
trp_shared_region_start = x3;
|
|
flush_dcache_range((uintptr_t)&trp_boot_abi_version,
|
|
sizeof(trp_boot_abi_version));
|
|
flush_dcache_range((uintptr_t)&trp_shared_region_start,
|
|
sizeof(trp_shared_region_start));
|
|
|
|
/* Perform early platform-specific setup */
|
|
trp_early_platform_setup((struct rmm_manifest *)trp_shared_region_start);
|
|
}
|
|
|
|
int trp_validate_warmboot_args(uint64_t x0, uint64_t x1,
|
|
uint64_t x2, uint64_t x3)
|
|
{
|
|
/*
|
|
* Validate boot parameters for warm boot
|
|
*
|
|
* According to the Boot Interface ABI v.0.1, the parameters
|
|
* received from EL3 during warm boot are:
|
|
*
|
|
* x0: CPUID (verified earlier so not used here)
|
|
* [x1:x3]: RES0
|
|
*/
|
|
|
|
(void)x0;
|
|
|
|
return ((x1 | x2 | x3) == 0UL) ? 0 : E_RMM_BOOT_UNKNOWN;
|
|
}
|
|
|
|
/* Main function for TRP */
|
|
void trp_main(void)
|
|
{
|
|
NOTICE("TRP: %s\n", build_version_string);
|
|
NOTICE("TRP: %s\n", build_message);
|
|
NOTICE("TRP: Supported RMM-EL3 Interface ABI: v.%u.%u\n",
|
|
TRP_RMM_EL3_ABI_VERS_MAJOR, TRP_RMM_EL3_ABI_VERS_MINOR);
|
|
NOTICE("TRP: Boot Manifest Version: v.%u.%u\n",
|
|
RMMD_GET_MANIFEST_VERSION_MAJOR(trp_boot_manifest_version),
|
|
RMMD_GET_MANIFEST_VERSION_MINOR(trp_boot_manifest_version));
|
|
INFO("TRP: Memory base: 0x%lx\n", (unsigned long)RMM_BASE);
|
|
INFO("TRP: Shared region base address: 0x%lx\n",
|
|
(unsigned long)trp_shared_region_start);
|
|
INFO("TRP: Total size: 0x%lx bytes\n",
|
|
(unsigned long)(RMM_END - RMM_BASE));
|
|
INFO("TRP: RMM-EL3 Interface ABI reported by EL3: v.%u.%u\n",
|
|
TRP_RMM_EL3_VERSION_GET_MAJOR(trp_boot_abi_version),
|
|
TRP_RMM_EL3_VERSION_GET_MINOR(trp_boot_abi_version));
|
|
}
|
|
|
|
/*******************************************************************************
|
|
* Returning RMI version back to Normal World
|
|
******************************************************************************/
|
|
static void trp_ret_rmi_version(unsigned long long rmi_version,
|
|
struct trp_smc_result *smc_ret)
|
|
{
|
|
if (rmi_version != RMI_ABI_VERSION) {
|
|
smc_ret->x[0] = RMI_ERROR_INPUT;
|
|
} else {
|
|
smc_ret->x[0] = RMI_SUCCESS;
|
|
}
|
|
VERBOSE("RMM version is %u.%u\n", RMI_ABI_VERSION_MAJOR,
|
|
RMI_ABI_VERSION_MINOR);
|
|
smc_ret->x[1] = RMI_ABI_VERSION;
|
|
smc_ret->x[2] = RMI_ABI_VERSION;
|
|
}
|
|
|
|
/*******************************************************************************
|
|
* Transitioning granule of NON-SECURE type to REALM type
|
|
******************************************************************************/
|
|
static void trp_asc_mark_realm(unsigned long long x1,
|
|
struct trp_smc_result *smc_ret)
|
|
{
|
|
VERBOSE("Delegating granule 0x%llx\n", x1);
|
|
smc_ret->x[0] = trp_smc(set_smc_args(RMM_GTSI_DELEGATE, x1,
|
|
0UL, 0UL, 0UL, 0UL, 0UL, 0UL));
|
|
|
|
if (smc_ret->x[0] != 0ULL) {
|
|
ERROR("Granule transition from NON-SECURE type to REALM type "
|
|
"failed 0x%llx\n", smc_ret->x[0]);
|
|
}
|
|
}
|
|
|
|
/*******************************************************************************
|
|
* Transitioning granule of REALM type to NON-SECURE type
|
|
******************************************************************************/
|
|
static void trp_asc_mark_nonsecure(unsigned long long x1,
|
|
struct trp_smc_result *smc_ret)
|
|
{
|
|
VERBOSE("Undelegating granule 0x%llx\n", x1);
|
|
smc_ret->x[0] = trp_smc(set_smc_args(RMM_GTSI_UNDELEGATE, x1,
|
|
0UL, 0UL, 0UL, 0UL, 0UL, 0UL));
|
|
|
|
if (smc_ret->x[0] != 0ULL) {
|
|
ERROR("Granule transition from REALM type to NON-SECURE type "
|
|
"failed 0x%llx\n", smc_ret->x[0]);
|
|
}
|
|
}
|
|
|
|
/*******************************************************************************
|
|
* Main RMI SMC handler function
|
|
******************************************************************************/
|
|
void trp_rmi_handler(unsigned long fid,
|
|
unsigned long long x1, unsigned long long x2,
|
|
unsigned long long x3, unsigned long long x4,
|
|
unsigned long long x5, unsigned long long x6,
|
|
struct trp_smc_result *smc_ret)
|
|
{
|
|
/* Not used in the current implementation */
|
|
(void)x2;
|
|
(void)x3;
|
|
(void)x4;
|
|
(void)x5;
|
|
(void)x6;
|
|
|
|
switch (fid) {
|
|
case RMI_RMM_REQ_VERSION:
|
|
trp_ret_rmi_version(x1, smc_ret);
|
|
break;
|
|
case RMI_RMM_GRANULE_DELEGATE:
|
|
trp_asc_mark_realm(x1, smc_ret);
|
|
break;
|
|
case RMI_RMM_GRANULE_UNDELEGATE:
|
|
trp_asc_mark_nonsecure(x1, smc_ret);
|
|
break;
|
|
default:
|
|
ERROR("Invalid SMC code to %s, FID %lx\n", __func__, fid);
|
|
smc_ret->x[0] = SMC_UNK;
|
|
}
|
|
}
|