arm-trusted-firmware/plat/nxp/common/sip_svc/sip_svc.c

195 lines
4.9 KiB
C

/*
* Copyright 2018-2021 NXP
*
* SPDX-License-Identifier: BSD-3-Clause
*
*/
#include <assert.h>
#include <string.h>
#include <caam.h>
#include <common/runtime_svc.h>
#include <dcfg.h>
#include <lib/mmio.h>
#include <tools_share/uuid.h>
#include <plat_common.h>
#include <sipsvc.h>
/* Layerscape SiP Service UUID */
DEFINE_SVC_UUID2(nxp_sip_svc_uid,
0x871de4ef, 0xedfc, 0x4209, 0xa4, 0x23,
0x8d, 0x23, 0x75, 0x9d, 0x3b, 0x9f);
#pragma weak nxp_plat_sip_handler
static uintptr_t nxp_plat_sip_handler(unsigned int smc_fid,
u_register_t x1,
u_register_t x2,
u_register_t x3,
u_register_t x4,
void *cookie,
void *handle,
u_register_t flags)
{
ERROR("%s: unhandled SMC (0x%x)\n", __func__, smc_fid);
SMC_RET1(handle, SMC_UNK);
}
uint64_t el2_2_aarch32(u_register_t smc_id, u_register_t start_addr,
u_register_t parm1, u_register_t parm2);
uint64_t prefetch_disable(u_register_t smc_id, u_register_t mask);
uint64_t bl31_get_porsr1(void);
static void clean_top_32b_of_param(uint32_t smc_fid,
u_register_t *px1,
u_register_t *px2,
u_register_t *px3,
u_register_t *px4)
{
/* if parameters from SMC32. Clean top 32 bits */
if (GET_SMC_CC(smc_fid) == SMC_32) {
*px1 = *px1 & SMC32_PARAM_MASK;
*px2 = *px2 & SMC32_PARAM_MASK;
*px3 = *px3 & SMC32_PARAM_MASK;
*px4 = *px4 & SMC32_PARAM_MASK;
}
}
/* This function handles Layerscape defined SiP Calls */
static uintptr_t nxp_sip_handler(unsigned int smc_fid,
u_register_t x1,
u_register_t x2,
u_register_t x3,
u_register_t x4,
void *cookie,
void *handle,
u_register_t flags)
{
uint32_t ns;
uint64_t ret;
dram_regions_info_t *info_dram_regions;
/* if parameter is sent from SMC32. Clean top 32 bits */
clean_top_32b_of_param(smc_fid, &x1, &x2, &x3, &x4);
/* Determine which security state this SMC originated from */
ns = is_caller_non_secure(flags);
if (ns == 0) {
/* SiP SMC service secure world's call */
;
} else {
/* SiP SMC service normal world's call */
;
}
switch (smc_fid & SMC_FUNC_MASK) {
case SIP_SVC_RNG:
if (is_sec_enabled() == false) {
NOTICE("SEC is disabled.\n");
SMC_RET1(handle, SMC_UNK);
}
/* Return zero on failure */
ret = get_random((int)x1);
if (ret != 0) {
SMC_RET2(handle, SMC_OK, ret);
} else {
SMC_RET1(handle, SMC_UNK);
}
/* break is not required as SMC_RETx return */
case SIP_SVC_HUK:
if (is_sec_enabled() == false) {
NOTICE("SEC is disabled.\n");
SMC_RET1(handle, SMC_UNK);
}
ret = get_hw_unq_key_blob_hw((uint8_t *) x1, (uint32_t) x2);
if (ret == SMC_OK) {
SMC_RET1(handle, SMC_OK);
} else {
SMC_RET1(handle, SMC_UNK);
}
/* break is not required as SMC_RETx return */
case SIP_SVC_MEM_BANK:
VERBOSE("Handling SMC SIP_SVC_MEM_BANK.\n");
info_dram_regions = get_dram_regions_info();
if (x1 == -1) {
SMC_RET2(handle, SMC_OK,
info_dram_regions->total_dram_size);
} else if (x1 >= info_dram_regions->num_dram_regions) {
SMC_RET1(handle, SMC_UNK);
} else {
SMC_RET3(handle, SMC_OK,
info_dram_regions->region[x1].addr,
info_dram_regions->region[x1].size);
}
/* break is not required as SMC_RETx return */
case SIP_SVC_PREFETCH_DIS:
VERBOSE("In SIP_SVC_PREFETCH_DIS call\n");
ret = prefetch_disable(smc_fid, x1);
if (ret == SMC_OK) {
SMC_RET1(handle, SMC_OK);
} else {
SMC_RET1(handle, SMC_UNK);
}
/* break is not required as SMC_RETx return */
case SIP_SVC_2_AARCH32:
ret = el2_2_aarch32(smc_fid, x1, x2, x3);
/* In success case, control should not reach here. */
NOTICE("SMC: SIP_SVC_2_AARCH32 Failed.\n");
SMC_RET1(handle, SMC_UNK);
/* break is not required as SMC_RETx return */
case SIP_SVC_PORSR1:
ret = bl31_get_porsr1();
SMC_RET2(handle, SMC_OK, ret);
/* break is not required as SMC_RETx return */
default:
return nxp_plat_sip_handler(smc_fid, x1, x2, x3, x4,
cookie, handle, flags);
}
}
/* This function is responsible for handling all SiP calls */
static uintptr_t sip_smc_handler(unsigned int smc_fid,
u_register_t x1,
u_register_t x2,
u_register_t x3,
u_register_t x4,
void *cookie,
void *handle,
u_register_t flags)
{
switch (smc_fid & SMC_FUNC_MASK) {
case SIP_SVC_CALL_COUNT:
/* Return the number of Layerscape SiP Service Calls. */
SMC_RET1(handle, LS_COMMON_SIP_NUM_CALLS);
break;
case SIP_SVC_UID:
/* Return UID to the caller */
SMC_UUID_RET(handle, nxp_sip_svc_uid);
break;
case SIP_SVC_VERSION:
/* Return the version of current implementation */
SMC_RET2(handle, LS_SIP_SVC_VERSION_MAJOR,
LS_SIP_SVC_VERSION_MINOR);
break;
default:
return nxp_sip_handler(smc_fid, x1, x2, x3, x4,
cookie, handle, flags);
}
}
/* Define a runtime service descriptor for fast SMC calls */
DECLARE_RT_SVC(
nxp_sip_svc,
OEN_SIP_START,
OEN_SIP_END,
SMC_TYPE_FAST,
NULL,
sip_smc_handler
);