spm_setup.c 4.59 KB
Newer Older
1
/*
2
 * Copyright (c) 2017-2019, ARM Limited and Contributors. All rights reserved.
3
4
5
6
 *
 * SPDX-License-Identifier: BSD-3-Clause
 */

7
8
9
10
11
#include <assert.h>
#include <string.h>

#include <platform_def.h>

12
13
14
#include <arch.h>
#include <arch_helpers.h>
#include <context.h>
15
16
17
18
19
20
#include <common/debug.h>
#include <lib/el3_runtime/context_mgmt.h>
#include <lib/xlat_tables/xlat_tables_v2.h>
#include <plat/common/common_def.h>
#include <plat/common/platform.h>
#include <services/sp_res_desc.h>
21
#include <sprt_host.h>
22
23
24
25
26

#include "spm_private.h"
#include "spm_shim_private.h"

/* Setup context of the Secure Partition */
27
void spm_sp_setup(sp_context_t *sp_ctx)
28
{
29
	cpu_context_t *ctx = &(sp_ctx->cpu_ctx);
30

31
32
33
34
	/*
	 * Initialize CPU context
	 * ----------------------
	 */
35

36
	entry_point_info_t ep_info = {0};
37

38
	SET_PARAM_HEAD(&ep_info, PARAM_EP, VERSION_1, SECURE | EP_ST_ENABLE);
39
40

	/* Setup entrypoint and SPSR */
41
	ep_info.pc = sp_ctx->rd.attribute.entrypoint;
42
	ep_info.spsr = SPSR_64(MODE_EL0, MODE_SP_EL0, DISABLE_ALL_EXCEPTIONS);
43
44

	/*
45
46
	 * X0: Unused (MBZ).
	 * X1: Unused (MBZ).
47
48
	 * X2: cookie value (Implementation Defined)
	 * X3: cookie value (Implementation Defined)
49
	 * X4 to X7 = 0
50
	 */
51
52
	ep_info.args.arg0 = 0;
	ep_info.args.arg1 = 0;
53
54
55
56
	ep_info.args.arg2 = PLAT_SPM_COOKIE_0;
	ep_info.args.arg3 = PLAT_SPM_COOKIE_1;

	cm_setup_context(ctx, &ep_info);
57
58
59
60
61
62

	/*
	 * Setup translation tables
	 * ------------------------
	 */

63
64
65
	/* Assign translation tables context. */
	spm_sp_xlat_context_alloc(sp_ctx);

66
	sp_map_memory_regions(sp_ctx);
67
68
69
70
71

	/*
	 * MMU-related registers
	 * ---------------------
	 */
72
	xlat_ctx_t *xlat_ctx = sp_ctx->xlat_ctx_handle;
73

74
	uint64_t mmu_cfg_params[MMU_CFG_PARAM_MAX];
75

76
77
78
79
80
81
82
	setup_mmu_cfg((uint64_t *)&mmu_cfg_params, 0, xlat_ctx->base_table,
		      xlat_ctx->pa_max_address, xlat_ctx->va_max_address,
		      EL1_EL0_REGIME);

	write_ctx_reg(get_sysregs_ctx(ctx), CTX_MAIR_EL1,
		      mmu_cfg_params[MMU_CFG_MAIR]);

83
84
85
86
87
88
89
90
91
	/* Enable translations using TTBR1_EL1 */
	int t1sz = 64 - __builtin_ctzll(SPM_SHIM_XLAT_VIRT_ADDR_SPACE_SIZE);
	mmu_cfg_params[MMU_CFG_TCR] &= ~TCR_EPD1_BIT;
	mmu_cfg_params[MMU_CFG_TCR] |=
		((uint64_t)t1sz << TCR_T1SZ_SHIFT) |
		TCR_SH1_INNER_SHAREABLE |
		TCR_RGN1_OUTER_WBA | TCR_RGN1_INNER_WBA |
		TCR_TG1_4K;

92
93
	write_ctx_reg(get_sysregs_ctx(ctx), CTX_TCR_EL1,
		      mmu_cfg_params[MMU_CFG_TCR]);
94

95
96
	write_ctx_reg(get_sysregs_ctx(ctx), CTX_TTBR0_EL1,
		      mmu_cfg_params[MMU_CFG_TTBR0]);
97

98
99
100
	write_ctx_reg(get_sysregs_ctx(ctx), CTX_TTBR1_EL1,
		      (uint64_t)spm_exceptions_xlat_get_base_table());

101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
	/* Setup SCTLR_EL1 */
	u_register_t sctlr_el1 = read_ctx_reg(get_sysregs_ctx(ctx), CTX_SCTLR_EL1);

	sctlr_el1 |=
		/*SCTLR_EL1_RES1 |*/
		/* Don't trap DC CVAU, DC CIVAC, DC CVAC, DC CVAP, or IC IVAU */
		SCTLR_UCI_BIT							|
		/* RW regions at xlat regime EL1&0 are forced to be XN. */
		SCTLR_WXN_BIT							|
		/* Don't trap to EL1 execution of WFI or WFE at EL0. */
		SCTLR_NTWI_BIT | SCTLR_NTWE_BIT					|
		/* Don't trap to EL1 accesses to CTR_EL0 from EL0. */
		SCTLR_UCT_BIT							|
		/* Don't trap to EL1 execution of DZ ZVA at EL0. */
		SCTLR_DZE_BIT							|
		/* Enable SP Alignment check for EL0 */
		SCTLR_SA0_BIT							|
		/* Allow cacheable data and instr. accesses to normal memory. */
		SCTLR_C_BIT | SCTLR_I_BIT					|
		/* Alignment fault checking enabled when at EL1 and EL0. */
		SCTLR_A_BIT							|
		/* Enable MMU. */
		SCTLR_M_BIT
	;

	sctlr_el1 &= ~(
		/* Explicit data accesses at EL0 are little-endian. */
		SCTLR_E0E_BIT							|
		/* Accesses to DAIF from EL0 are trapped to EL1. */
		SCTLR_UMA_BIT
	);

	write_ctx_reg(get_sysregs_ctx(ctx), CTX_SCTLR_EL1, sctlr_el1);

	/*
	 * Setup other system registers
	 * ----------------------------
	 */

140
141
142
143
144
145
	/*
	 * Shim exception vector base address. It is mapped at the start of the
	 * address space accessed by TTBR1_EL1, which means that the base
	 * address of the exception vectors depends on the size of the address
	 * space specified in TCR_EL1.T1SZ.
	 */
146
	write_ctx_reg(get_sysregs_ctx(ctx), CTX_VBAR_EL1,
147
		      UINT64_MAX - (SPM_SHIM_XLAT_VIRT_ADDR_SPACE_SIZE - 1ULL));
148
149

	/*
150
151
152
	 * FPEN: Allow the Secure Partition to access FP/SIMD registers.
	 * Note that SPM will not do any saving/restoring of these registers on
	 * behalf of the SP. This falls under the SP's responsibility.
153
154
155
156
	 * TTA: Enable access to trace registers.
	 * ZEN (v8.2): Trap SVE instructions and access to SVE registers.
	 */
	write_ctx_reg(get_sysregs_ctx(ctx), CTX_CPACR_EL1,
157
			CPACR_EL1_FPEN(CPACR_EL1_FP_TRAP_NONE));
158
159
160
161
162
163
164
165
166

	/*
	 * Prepare shared buffers
	 * ----------------------
	 */

	/* Initialize SPRT queues */
	sprt_initialize_queues((void *)sp_ctx->spm_sp_buffer_base,
			       sp_ctx->spm_sp_buffer_size);
167
}