mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-15 00:54:22 +00:00

Some of our specialized sections are not prefixed with the conventional period. The compiler uses input section names to derive certain other section names (e.g. `.rela.text`, `.relacpu_ops`), and these can be difficult to select in linker scripts when there is a lack of a delimiter. This change introduces the period prefix to all specialized section names. BREAKING-CHANGE: All input and output linker section names have been prefixed with the period character, e.g. `cpu_ops` -> `.cpu_ops`. Change-Id: I51c13c5266d5975fbd944ef4961328e72f82fc1c Signed-off-by: Chris Kay <chris.kay@arm.com>
236 lines
6.6 KiB
C
236 lines
6.6 KiB
C
/*
|
|
* Copyright (c) 2022, MediaTek Inc. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <assert.h>
|
|
#include <errno.h>
|
|
#if MTK_SIP_KERNEL_BOOT_ENABLE
|
|
#include <cold_boot.h>
|
|
#endif
|
|
#include <common/debug.h>
|
|
#include <common/runtime_svc.h>
|
|
#include <lib/mtk_init/mtk_init.h>
|
|
#include <mtk_sip_svc.h>
|
|
|
|
#define SMC_HANDLER_DEBUG(...) VERBOSE(__VA_ARGS__)
|
|
#define SMC_HANDLER_DEBUG_NOT_IMP_MSG "%s[0x%x] smc handler not implemented\n"
|
|
#define SMC_HANDLER_DEBUG_START_MSG "%s[0x%x] smc handler start, smc desc. index:%d\n"
|
|
#define SMC_HANDLER_DEBUG_END_MSG "%s[0x%x] smc handler end\n"
|
|
|
|
/*
|
|
* These macros below are used to identify SIP calls from Kernel,
|
|
* Hypervisor, or 2ndBootloader
|
|
*/
|
|
#define SIP_FID_ORI_MASK (0xc000)
|
|
#define SIP_FID_ORI_SHIFT (14)
|
|
#define SIP_FID_KERNEL (0x0)
|
|
#define SIP_FID_KERNEL_VIA_GZ (0x1)
|
|
#define SIP_FID_GZ (0x2)
|
|
|
|
#define GET_SMC_ORI(_fid) (((_fid) & SIP_FID_ORI_MASK) >> SIP_FID_ORI_SHIFT)
|
|
#define GET_SMC_ORI_NUM(_fid) ((_fid) & ~(SIP_FID_ORI_MASK))
|
|
|
|
#define is_from_nsel2(_ori) (_ori == SIP_FID_GZ)
|
|
#define is_from_bl33(_ori) \
|
|
((_ori != SIP_FID_GZ) && (is_el1_2nd_bootloader() == 1))
|
|
#define is_from_nsel1(_ori) \
|
|
(((_ori == SIP_FID_KERNEL) || \
|
|
(_ori == SIP_FID_KERNEL_VIA_GZ)) && \
|
|
(is_el1_2nd_bootloader() == 0))
|
|
|
|
#define is_smc_forbidden(_ori) (_ori == SIP_FID_KERNEL_VIA_GZ)
|
|
|
|
#define MASK_32_BIT (0xffffffffU)
|
|
#define SMC_ID_EXPAND_AS_SMC_OPERATION(_smc_id, _smc_num) \
|
|
case _smc_id##_AARCH32: \
|
|
{ \
|
|
x1 = x1 & MASK_32_BIT; \
|
|
x2 = x2 & MASK_32_BIT; \
|
|
x3 = x3 & MASK_32_BIT; \
|
|
x4 = x4 & MASK_32_BIT; \
|
|
} \
|
|
/* fallthrough */ \
|
|
case _smc_id##_AARCH64: \
|
|
{ \
|
|
if (_smc_id##_descriptor_index < 0) { \
|
|
SMC_HANDLER_DEBUG(SMC_HANDLER_DEBUG_NOT_IMP_MSG, #_smc_id, smc_id); \
|
|
break; \
|
|
} \
|
|
if (_smc_id##_descriptor_index >= smc_id_descriptor_max) { \
|
|
SMC_HANDLER_DEBUG("smc descriptor index[%d] exceed max[%d]\n", \
|
|
_smc_id##_descriptor_index, smc_id_descriptor_max); \
|
|
break; \
|
|
} \
|
|
SMC_HANDLER_DEBUG(SMC_HANDLER_DEBUG_START_MSG, #_smc_id, smc_id, \
|
|
_smc_id##_descriptor_index); \
|
|
ret = smc_handler_pool[_smc_id##_descriptor_index].smc_handler(x1,\
|
|
x2, x3, x4, handle, &smc_ret); \
|
|
SMC_HANDLER_DEBUG(SMC_HANDLER_DEBUG_END_MSG, #_smc_id, smc_id); \
|
|
break; \
|
|
}
|
|
|
|
#define SMC_ID_EXPAND_AS_DESCRIPTOR_INDEX(_smc_id, _smc_num) \
|
|
short _smc_id##_descriptor_index __section(".mtk_plat_ro") = -1;
|
|
|
|
MTK_SIP_SMC_FROM_BL33_TABLE(SMC_ID_EXPAND_AS_DESCRIPTOR_INDEX);
|
|
MTK_SIP_SMC_FROM_NS_EL1_TABLE(SMC_ID_EXPAND_AS_DESCRIPTOR_INDEX);
|
|
|
|
IMPORT_SYM(uintptr_t, __MTK_SMC_POOL_START__, MTK_SMC_POOL_START);
|
|
IMPORT_SYM(uintptr_t, __MTK_SMC_POOL_END_UNALIGNED__, MTK_SMC_POOL_END_UNALIGNED);
|
|
|
|
static const struct smc_descriptor *smc_handler_pool;
|
|
static short smc_id_descriptor_max;
|
|
|
|
#if !MTK_SIP_KERNEL_BOOT_ENABLE
|
|
/*
|
|
* If there is no SMC request needs to be served in 2nd bootloader,
|
|
* disable the service path inherently.
|
|
*/
|
|
bool is_el1_2nd_bootloader(void)
|
|
{
|
|
return false;
|
|
}
|
|
#endif
|
|
|
|
static void print_smc_descriptor(const struct smc_descriptor pool[])
|
|
{
|
|
const struct smc_descriptor *p_smc_desc;
|
|
|
|
INFO("print smc descriptor pool\n");
|
|
for (p_smc_desc = &pool[0];
|
|
(char *)p_smc_desc < (char *)MTK_SMC_POOL_END_UNALIGNED;
|
|
p_smc_desc++) {
|
|
INFO("descriptor name:%s\n", p_smc_desc->smc_name);
|
|
INFO("descriptor index:%d\n", *p_smc_desc->smc_descriptor_index);
|
|
INFO("smc id 32:0x%x, smc id 64:0x%x\n",
|
|
p_smc_desc->smc_id_aarch32, p_smc_desc->smc_id_aarch64);
|
|
}
|
|
}
|
|
|
|
static int mtk_smc_handler_init(void)
|
|
{
|
|
const struct smc_descriptor *iter;
|
|
short index_cnt;
|
|
int ret = 0;
|
|
|
|
smc_handler_pool = (const struct smc_descriptor *)MTK_SMC_POOL_START;
|
|
/* Designate descriptor index point to smc_handler_pool */
|
|
for (index_cnt = 0, iter = &smc_handler_pool[0];
|
|
(char *)iter < (char *)MTK_SMC_POOL_END_UNALIGNED;
|
|
iter++, index_cnt++) {
|
|
if (index_cnt < 0) {
|
|
SMC_HANDLER_DEBUG("smc handler pool index overflow!\n");
|
|
ret = -EPERM;
|
|
assert(0);
|
|
break;
|
|
}
|
|
*(iter->smc_descriptor_index) = index_cnt;
|
|
}
|
|
smc_id_descriptor_max = index_cnt;
|
|
print_smc_descriptor(smc_handler_pool);
|
|
return ret;
|
|
}
|
|
MTK_EARLY_PLAT_INIT(mtk_smc_handler_init);
|
|
|
|
/* This function handles Mediatek defined SiP Calls from Bootloader */
|
|
static uintptr_t mtk_smc_handler_bl33(uint32_t smc_id,
|
|
u_register_t x1,
|
|
u_register_t x2,
|
|
u_register_t x3,
|
|
u_register_t x4,
|
|
void *cookie,
|
|
void *handle,
|
|
u_register_t flags)
|
|
{
|
|
uintptr_t ret = MTK_SIP_E_SUCCESS;
|
|
struct smccc_res smc_ret = {0};
|
|
|
|
switch (smc_id) {
|
|
MTK_SIP_SMC_FROM_BL33_TABLE(SMC_ID_EXPAND_AS_SMC_OPERATION);
|
|
default:
|
|
INFO("BL33 SMC ID:0x%x not supported\n", smc_id);
|
|
ret = SMC_UNK;
|
|
break;
|
|
}
|
|
SMC_RET4(handle, ret, smc_ret.a1, smc_ret.a2, smc_ret.a3);
|
|
}
|
|
|
|
/* This function handles Mediatek defined SiP Calls from Kernel */
|
|
static uintptr_t mtk_smc_handler_nsel1(uint32_t smc_id,
|
|
u_register_t x1,
|
|
u_register_t x2,
|
|
u_register_t x3,
|
|
u_register_t x4,
|
|
void *cookie,
|
|
void *handle,
|
|
u_register_t flags)
|
|
{
|
|
uintptr_t ret = MTK_SIP_E_SUCCESS;
|
|
struct smccc_res smc_ret = {0};
|
|
|
|
switch (smc_id) {
|
|
MTK_SIP_SMC_FROM_NS_EL1_TABLE(SMC_ID_EXPAND_AS_SMC_OPERATION);
|
|
default:
|
|
INFO("NSEL1 SMC ID:0x%x not supported\n", smc_id);
|
|
ret = SMC_UNK;
|
|
break;
|
|
}
|
|
SMC_RET4(handle, ret, smc_ret.a1, smc_ret.a2, smc_ret.a3);
|
|
}
|
|
|
|
static uintptr_t mtk_smc_handler(uint32_t smc_id,
|
|
u_register_t x1,
|
|
u_register_t x2,
|
|
u_register_t x3,
|
|
u_register_t x4,
|
|
void *cookie,
|
|
void *handle,
|
|
u_register_t flags)
|
|
{
|
|
uintptr_t ret = SMC_UNK;
|
|
uint32_t ns;
|
|
uint32_t smc_ori;
|
|
uint32_t smc_num;
|
|
|
|
/* Get SMC Originator bit 14.15 */
|
|
smc_ori = GET_SMC_ORI(smc_id);
|
|
/* Get SMC Number. Clean bit 14.15 */
|
|
smc_num = GET_SMC_ORI_NUM(smc_id);
|
|
|
|
/* Determine which security state this SMC originated from */
|
|
ns = is_caller_non_secure(flags);
|
|
|
|
if (ns && is_smc_forbidden(smc_ori)) {
|
|
ERROR("%s: Forbidden SMC call (0x%x)\n", __func__, smc_id);
|
|
SMC_RET1(handle, ret);
|
|
}
|
|
|
|
if (!ns) {
|
|
/* SiP SMC service secure world's call */
|
|
INFO("Secure SMC ID:0x%x not supported\n", smc_id);
|
|
SMC_RET1(handle, ret);
|
|
}
|
|
if (is_from_bl33(smc_ori)) {
|
|
/* SiP SMC service secure bootloader's call */
|
|
return mtk_smc_handler_bl33(smc_num, x1, x2, x3, x4,
|
|
cookie, handle, flags);
|
|
} else if (is_from_nsel1(smc_ori)) {
|
|
/* SiP SMC service kernel's call */
|
|
return mtk_smc_handler_nsel1(smc_num, x1, x2, x3, x4,
|
|
cookie, handle, flags);
|
|
}
|
|
INFO("SMC ID:0x%x not supported\n", smc_id);
|
|
SMC_RET1(handle, ret);
|
|
}
|
|
|
|
/* Define a runtime service descriptor for fast SMC calls */
|
|
DECLARE_RT_SVC(
|
|
mtk_smc_handler,
|
|
OEN_SIP_START,
|
|
OEN_SIP_END,
|
|
SMC_TYPE_FAST,
|
|
NULL,
|
|
mtk_smc_handler
|
|
);
|