Skip to content
GitLab
Menu
Projects
Groups
Snippets
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
Menu
Open sidebar
adam.huang
Arm Trusted Firmware
Commits
8957fc76
Commit
8957fc76
authored
May 23, 2014
by
Andrew Thoelke
Browse files
Merge pull request #104 from athoelke:at/tsp-entrypoints-v2
parents
65335d45
445fe84f
Changes
7
Show whitespace changes
Inline
Side-by-side
bl32/tsp/aarch64/tsp_entrypoint.S
View file @
8957fc76
...
@@ -34,13 +34,7 @@
...
@@ -34,13 +34,7 @@
.
globl
tsp_entrypoint
.
globl
tsp_entrypoint
.
globl
tsp_cpu_on_entry
.
globl
tsp_vector_table
.
globl
tsp_cpu_off_entry
.
globl
tsp_cpu_suspend_entry
.
globl
tsp_cpu_resume_entry
.
globl
tsp_fast_smc_entry
.
globl
tsp_std_smc_entry
.
globl
tsp_fiq_entry
...
@@ -157,6 +151,21 @@ func tsp_entrypoint
...
@@ -157,6 +151,21 @@ func tsp_entrypoint
tsp_entrypoint_panic
:
tsp_entrypoint_panic
:
b
tsp_entrypoint_panic
b
tsp_entrypoint_panic
/
*
-------------------------------------------
*
Table
of
entrypoint
vectors
provided
to
the
*
TSPD
for
the
various
entrypoints
*
-------------------------------------------
*/
func
tsp_vector_table
b
tsp_std_smc_entry
b
tsp_fast_smc_entry
b
tsp_cpu_on_entry
b
tsp_cpu_off_entry
b
tsp_cpu_resume_entry
b
tsp_cpu_suspend_entry
b
tsp_fiq_entry
/*---------------------------------------------
/*---------------------------------------------
*
This
entrypoint
is
used
by
the
TSPD
when
this
*
This
entrypoint
is
used
by
the
TSPD
when
this
*
cpu
is
to
be
turned
off
through
a
CPU_OFF
*
cpu
is
to
be
turned
off
through
a
CPU_OFF
...
...
bl32/tsp/tsp_main.c
View file @
8957fc76
...
@@ -60,22 +60,6 @@ static tsp_args_t tsp_smc_args[PLATFORM_CORE_COUNT];
...
@@ -60,22 +60,6 @@ static tsp_args_t tsp_smc_args[PLATFORM_CORE_COUNT];
******************************************************************************/
******************************************************************************/
work_statistics_t
tsp_stats
[
PLATFORM_CORE_COUNT
];
work_statistics_t
tsp_stats
[
PLATFORM_CORE_COUNT
];
/*******************************************************************************
* Single reference to the various entry points exported by the test secure
* payload. A single copy should suffice for all cpus as they are not expected
* to change.
******************************************************************************/
static
const
entry_info_t
tsp_entry_info
=
{
tsp_std_smc_entry
,
tsp_fast_smc_entry
,
tsp_cpu_on_entry
,
tsp_cpu_off_entry
,
tsp_cpu_resume_entry
,
tsp_cpu_suspend_entry
,
tsp_fiq_entry
,
};
/*******************************************************************************
/*******************************************************************************
* The BL32 memory footprint starts with an RO sections and ends
* The BL32 memory footprint starts with an RO sections and ends
* with a section for coherent RAM. Use it to find the memory size
* with a section for coherent RAM. Use it to find the memory size
...
@@ -118,7 +102,7 @@ static tsp_args_t *set_smc_args(uint64_t arg0,
...
@@ -118,7 +102,7 @@ static tsp_args_t *set_smc_args(uint64_t arg0,
/*******************************************************************************
/*******************************************************************************
* TSP main entry point where it gets the opportunity to initialize its secure
* TSP main entry point where it gets the opportunity to initialize its secure
* state/applications. Once the state is initialized, it must return to the
* state/applications. Once the state is initialized, it must return to the
* SPD with a pointer to the 'tsp_
entry_info' structur
e.
* SPD with a pointer to the 'tsp_
vector_table' jump tabl
e.
******************************************************************************/
******************************************************************************/
uint64_t
tsp_main
(
void
)
uint64_t
tsp_main
(
void
)
{
{
...
@@ -147,12 +131,7 @@ uint64_t tsp_main(void)
...
@@ -147,12 +131,7 @@ uint64_t tsp_main(void)
tsp_stats
[
linear_id
].
cpu_on_count
);
tsp_stats
[
linear_id
].
cpu_on_count
);
spin_unlock
(
&
console_lock
);
spin_unlock
(
&
console_lock
);
/*
return
(
uint64_t
)
&
tsp_vector_table
;
* TODO: There is a massive assumption that the SPD and SP can see each
* other's memory without issues so it is safe to pass pointers to
* internal memory. Replace this with a shared communication buffer.
*/
return
(
uint64_t
)
&
tsp_entry_info
;
}
}
/*******************************************************************************
/*******************************************************************************
...
...
include/bl32/payloads/tsp.h
View file @
8957fc76
...
@@ -117,24 +117,17 @@
...
@@ -117,24 +117,17 @@
#include <spinlock.h>
#include <spinlock.h>
#include <stdint.h>
#include <stdint.h>
typedef
void
(
*
tsp_generic_fptr_t
)(
uint64_t
arg0
,
typedef
uint32_t
tsp_vector_isn_t
;
uint64_t
arg1
,
uint64_t
arg2
,
typedef
struct
tsp_vectors
{
uint64_t
arg3
,
tsp_vector_isn_t
std_smc_entry
;
uint64_t
arg4
,
tsp_vector_isn_t
fast_smc_entry
;
uint64_t
arg5
,
tsp_vector_isn_t
cpu_on_entry
;
uint64_t
arg6
,
tsp_vector_isn_t
cpu_off_entry
;
uint64_t
arg7
);
tsp_vector_isn_t
cpu_resume_entry
;
tsp_vector_isn_t
cpu_suspend_entry
;
typedef
struct
entry_info
{
tsp_vector_isn_t
fiq_entry
;
tsp_generic_fptr_t
std_smc_entry
;
}
tsp_vectors_t
;
tsp_generic_fptr_t
fast_smc_entry
;
tsp_generic_fptr_t
cpu_on_entry
;
tsp_generic_fptr_t
cpu_off_entry
;
tsp_generic_fptr_t
cpu_resume_entry
;
tsp_generic_fptr_t
cpu_suspend_entry
;
tsp_generic_fptr_t
fiq_entry
;
}
entry_info_t
;
typedef
struct
work_statistics
{
typedef
struct
work_statistics
{
uint32_t
fiq_count
;
/* Number of FIQs on this cpu */
uint32_t
fiq_count
;
/* Number of FIQs on this cpu */
...
@@ -166,38 +159,6 @@ CASSERT(TSP_ARGS_SIZE == sizeof(tsp_args_t), assert_sp_args_size_mismatch);
...
@@ -166,38 +159,6 @@ CASSERT(TSP_ARGS_SIZE == sizeof(tsp_args_t), assert_sp_args_size_mismatch);
extern
void
tsp_get_magic
(
uint64_t
args
[
4
]);
extern
void
tsp_get_magic
(
uint64_t
args
[
4
]);
extern
void
tsp_fiq_entry
(
uint64_t
arg0
,
uint64_t
arg1
,
uint64_t
arg2
,
uint64_t
arg3
,
uint64_t
arg4
,
uint64_t
arg5
,
uint64_t
arg6
,
uint64_t
arg7
);
extern
void
tsp_std_smc_entry
(
uint64_t
arg0
,
uint64_t
arg1
,
uint64_t
arg2
,
uint64_t
arg3
,
uint64_t
arg4
,
uint64_t
arg5
,
uint64_t
arg6
,
uint64_t
arg7
);
extern
void
tsp_fast_smc_entry
(
uint64_t
arg0
,
uint64_t
arg1
,
uint64_t
arg2
,
uint64_t
arg3
,
uint64_t
arg4
,
uint64_t
arg5
,
uint64_t
arg6
,
uint64_t
arg7
);
extern
void
tsp_cpu_resume_entry
(
uint64_t
arg0
,
uint64_t
arg1
,
uint64_t
arg2
,
uint64_t
arg3
,
uint64_t
arg4
,
uint64_t
arg5
,
uint64_t
arg6
,
uint64_t
arg7
);
extern
tsp_args_t
*
tsp_cpu_resume_main
(
uint64_t
arg0
,
extern
tsp_args_t
*
tsp_cpu_resume_main
(
uint64_t
arg0
,
uint64_t
arg1
,
uint64_t
arg1
,
uint64_t
arg2
,
uint64_t
arg2
,
...
@@ -206,14 +167,6 @@ extern tsp_args_t *tsp_cpu_resume_main(uint64_t arg0,
...
@@ -206,14 +167,6 @@ extern tsp_args_t *tsp_cpu_resume_main(uint64_t arg0,
uint64_t
arg5
,
uint64_t
arg5
,
uint64_t
arg6
,
uint64_t
arg6
,
uint64_t
arg7
);
uint64_t
arg7
);
extern
void
tsp_cpu_suspend_entry
(
uint64_t
arg0
,
uint64_t
arg1
,
uint64_t
arg2
,
uint64_t
arg3
,
uint64_t
arg4
,
uint64_t
arg5
,
uint64_t
arg6
,
uint64_t
arg7
);
extern
tsp_args_t
*
tsp_cpu_suspend_main
(
uint64_t
arg0
,
extern
tsp_args_t
*
tsp_cpu_suspend_main
(
uint64_t
arg0
,
uint64_t
arg1
,
uint64_t
arg1
,
uint64_t
arg2
,
uint64_t
arg2
,
...
@@ -222,23 +175,7 @@ extern tsp_args_t *tsp_cpu_suspend_main(uint64_t arg0,
...
@@ -222,23 +175,7 @@ extern tsp_args_t *tsp_cpu_suspend_main(uint64_t arg0,
uint64_t
arg5
,
uint64_t
arg5
,
uint64_t
arg6
,
uint64_t
arg6
,
uint64_t
arg7
);
uint64_t
arg7
);
extern
void
tsp_cpu_on_entry
(
uint64_t
arg0
,
uint64_t
arg1
,
uint64_t
arg2
,
uint64_t
arg3
,
uint64_t
arg4
,
uint64_t
arg5
,
uint64_t
arg6
,
uint64_t
arg7
);
extern
tsp_args_t
*
tsp_cpu_on_main
(
void
);
extern
tsp_args_t
*
tsp_cpu_on_main
(
void
);
extern
void
tsp_cpu_off_entry
(
uint64_t
arg0
,
uint64_t
arg1
,
uint64_t
arg2
,
uint64_t
arg3
,
uint64_t
arg4
,
uint64_t
arg5
,
uint64_t
arg6
,
uint64_t
arg7
);
extern
tsp_args_t
*
tsp_cpu_off_main
(
uint64_t
arg0
,
extern
tsp_args_t
*
tsp_cpu_off_main
(
uint64_t
arg0
,
uint64_t
arg1
,
uint64_t
arg1
,
uint64_t
arg2
,
uint64_t
arg2
,
...
@@ -261,6 +198,10 @@ extern void tsp_update_sync_fiq_stats(uint32_t type, uint64_t elr_el3);
...
@@ -261,6 +198,10 @@ extern void tsp_update_sync_fiq_stats(uint32_t type, uint64_t elr_el3);
/* Data structure to keep track of TSP statistics */
/* Data structure to keep track of TSP statistics */
extern
spinlock_t
console_lock
;
extern
spinlock_t
console_lock
;
extern
work_statistics_t
tsp_stats
[
PLATFORM_CORE_COUNT
];
extern
work_statistics_t
tsp_stats
[
PLATFORM_CORE_COUNT
];
/* Vector table of jumps */
extern
tsp_vectors_t
tsp_vector_table
;
#endif
/* __ASSEMBLY__ */
#endif
/* __ASSEMBLY__ */
#endif
/* __BL2_H__ */
#endif
/* __BL2_H__ */
plat/fvp/bl31_plat_setup.c
View file @
8957fc76
...
@@ -210,8 +210,8 @@ void bl31_plat_arch_setup()
...
@@ -210,8 +210,8 @@ void bl31_plat_arch_setup()
fvp_cci_setup
();
fvp_cci_setup
();
#endif
#endif
configure_mmu_el3
(
TZRAM
_BASE
,
configure_mmu_el3
(
BL31_RO
_BASE
,
TZRAM_SIZE
,
(
BL31_COHERENT_RAM_LIMIT
-
BL31_RO_BASE
)
,
BL31_RO_BASE
,
BL31_RO_BASE
,
BL31_RO_LIMIT
,
BL31_RO_LIMIT
,
BL31_COHERENT_RAM_BASE
,
BL31_COHERENT_RAM_BASE
,
...
...
services/spd/tspd/tspd_main.c
View file @
8957fc76
...
@@ -53,10 +53,10 @@
...
@@ -53,10 +53,10 @@
#include "tspd_private.h"
#include "tspd_private.h"
/*******************************************************************************
/*******************************************************************************
*
Single structure to hold information about the various
entry
point
s into the
*
Address of the
entrypoint
vector table in the Secure Payload. It is
*
Secure Payload. It is
initialised once on the primary core after a cold boot.
* initialised once on the primary core after a cold boot.
******************************************************************************/
******************************************************************************/
entry_info_t
*
tsp_entry_info
;
tsp_vectors_t
*
tsp_vectors
;
/*******************************************************************************
/*******************************************************************************
* Array to keep track of per-cpu Secure Payload state
* Array to keep track of per-cpu Secure Payload state
...
@@ -127,7 +127,7 @@ static uint64_t tspd_sel1_interrupt_handler(uint32_t id,
...
@@ -127,7 +127,7 @@ static uint64_t tspd_sel1_interrupt_handler(uint32_t id,
SPSR_64
(
MODE_EL1
,
MODE_SP_ELX
,
DISABLE_ALL_EXCEPTIONS
));
SPSR_64
(
MODE_EL1
,
MODE_SP_ELX
,
DISABLE_ALL_EXCEPTIONS
));
SMC_SET_EL3
(
&
tsp_ctx
->
cpu_ctx
,
SMC_SET_EL3
(
&
tsp_ctx
->
cpu_ctx
,
CTX_ELR_EL3
,
CTX_ELR_EL3
,
(
uint64_t
)
tsp_
entry_info
->
fiq_entry
);
(
uint64_t
)
&
tsp_
vectors
->
fiq_entry
);
cm_el1_sysregs_context_restore
(
SECURE
);
cm_el1_sysregs_context_restore
(
SECURE
);
cm_set_next_eret_context
(
SECURE
);
cm_set_next_eret_context
(
SECURE
);
...
@@ -370,8 +370,8 @@ uint64_t tspd_smc_handler(uint32_t smc_fid,
...
@@ -370,8 +370,8 @@ uint64_t tspd_smc_handler(uint32_t smc_fid,
* Stash the SP entry points information. This is done
* Stash the SP entry points information. This is done
* only once on the primary cpu
* only once on the primary cpu
*/
*/
assert
(
tsp_
entry_info
==
NULL
);
assert
(
tsp_
vectors
==
NULL
);
tsp_
entry_info
=
(
entry_info
_t
*
)
x1
;
tsp_
vectors
=
(
tsp_vectors
_t
*
)
x1
;
/*
/*
* SP reports completion. The SPD must have initiated
* SP reports completion. The SPD must have initiated
...
@@ -465,11 +465,11 @@ uint64_t tspd_smc_handler(uint32_t smc_fid,
...
@@ -465,11 +465,11 @@ uint64_t tspd_smc_handler(uint32_t smc_fid,
*/
*/
if
(
GET_SMC_TYPE
(
smc_fid
)
==
SMC_TYPE_FAST
)
{
if
(
GET_SMC_TYPE
(
smc_fid
)
==
SMC_TYPE_FAST
)
{
cm_set_elr_el3
(
SECURE
,
(
uint64_t
)
cm_set_elr_el3
(
SECURE
,
(
uint64_t
)
tsp_
entry_info
->
fast_smc_entry
);
&
tsp_
vectors
->
fast_smc_entry
);
}
else
{
}
else
{
set_std_smc_active_flag
(
tsp_ctx
->
state
);
set_std_smc_active_flag
(
tsp_ctx
->
state
);
cm_set_elr_el3
(
SECURE
,
(
uint64_t
)
cm_set_elr_el3
(
SECURE
,
(
uint64_t
)
tsp_
entry_info
->
std_smc_entry
);
&
tsp_
vectors
->
std_smc_entry
);
}
}
cm_el1_sysregs_context_restore
(
SECURE
);
cm_el1_sysregs_context_restore
(
SECURE
);
...
...
services/spd/tspd/tspd_pm.c
View file @
8957fc76
...
@@ -55,11 +55,11 @@ static int32_t tspd_cpu_off_handler(uint64_t cookie)
...
@@ -55,11 +55,11 @@ static int32_t tspd_cpu_off_handler(uint64_t cookie)
uint32_t
linear_id
=
platform_get_core_pos
(
mpidr
);
uint32_t
linear_id
=
platform_get_core_pos
(
mpidr
);
tsp_context_t
*
tsp_ctx
=
&
tspd_sp_context
[
linear_id
];
tsp_context_t
*
tsp_ctx
=
&
tspd_sp_context
[
linear_id
];
assert
(
tsp_
entry_info
);
assert
(
tsp_
vectors
);
assert
(
get_tsp_pstate
(
tsp_ctx
->
state
)
==
TSP_PSTATE_ON
);
assert
(
get_tsp_pstate
(
tsp_ctx
->
state
)
==
TSP_PSTATE_ON
);
/* Program the entry point and enter the TSP */
/* Program the entry point and enter the TSP */
cm_set_elr_el3
(
SECURE
,
(
uint64_t
)
tsp_
entry_info
->
cpu_off_entry
);
cm_set_elr_el3
(
SECURE
,
(
uint64_t
)
&
tsp_
vectors
->
cpu_off_entry
);
rc
=
tspd_synchronous_sp_entry
(
tsp_ctx
);
rc
=
tspd_synchronous_sp_entry
(
tsp_ctx
);
/*
/*
...
@@ -89,14 +89,14 @@ static void tspd_cpu_suspend_handler(uint64_t power_state)
...
@@ -89,14 +89,14 @@ static void tspd_cpu_suspend_handler(uint64_t power_state)
uint32_t
linear_id
=
platform_get_core_pos
(
mpidr
);
uint32_t
linear_id
=
platform_get_core_pos
(
mpidr
);
tsp_context_t
*
tsp_ctx
=
&
tspd_sp_context
[
linear_id
];
tsp_context_t
*
tsp_ctx
=
&
tspd_sp_context
[
linear_id
];
assert
(
tsp_
entry_info
);
assert
(
tsp_
vectors
);
assert
(
get_tsp_pstate
(
tsp_ctx
->
state
)
==
TSP_PSTATE_ON
);
assert
(
get_tsp_pstate
(
tsp_ctx
->
state
)
==
TSP_PSTATE_ON
);
/* Program the entry point, power_state parameter and enter the TSP */
/* Program the entry point, power_state parameter and enter the TSP */
write_ctx_reg
(
get_gpregs_ctx
(
&
tsp_ctx
->
cpu_ctx
),
write_ctx_reg
(
get_gpregs_ctx
(
&
tsp_ctx
->
cpu_ctx
),
CTX_GPREG_X0
,
CTX_GPREG_X0
,
power_state
);
power_state
);
cm_set_elr_el3
(
SECURE
,
(
uint64_t
)
tsp_
entry_info
->
cpu_suspend_entry
);
cm_set_elr_el3
(
SECURE
,
(
uint64_t
)
&
tsp_
vectors
->
cpu_suspend_entry
);
rc
=
tspd_synchronous_sp_entry
(
tsp_ctx
);
rc
=
tspd_synchronous_sp_entry
(
tsp_ctx
);
/*
/*
...
@@ -123,11 +123,11 @@ static void tspd_cpu_on_finish_handler(uint64_t cookie)
...
@@ -123,11 +123,11 @@ static void tspd_cpu_on_finish_handler(uint64_t cookie)
uint32_t
linear_id
=
platform_get_core_pos
(
mpidr
);
uint32_t
linear_id
=
platform_get_core_pos
(
mpidr
);
tsp_context_t
*
tsp_ctx
=
&
tspd_sp_context
[
linear_id
];
tsp_context_t
*
tsp_ctx
=
&
tspd_sp_context
[
linear_id
];
assert
(
tsp_
entry_info
);
assert
(
tsp_
vectors
);
assert
(
get_tsp_pstate
(
tsp_ctx
->
state
)
==
TSP_PSTATE_OFF
);
assert
(
get_tsp_pstate
(
tsp_ctx
->
state
)
==
TSP_PSTATE_OFF
);
/* Initialise this cpu's secure context */
/* Initialise this cpu's secure context */
tspd_init_secure_context
((
uint64_t
)
tsp_
entry_info
->
cpu_on_entry
,
tspd_init_secure_context
((
uint64_t
)
&
tsp_
vectors
->
cpu_on_entry
,
TSP_AARCH64
,
TSP_AARCH64
,
mpidr
,
mpidr
,
tsp_ctx
);
tsp_ctx
);
...
@@ -158,14 +158,14 @@ static void tspd_cpu_suspend_finish_handler(uint64_t suspend_level)
...
@@ -158,14 +158,14 @@ static void tspd_cpu_suspend_finish_handler(uint64_t suspend_level)
uint32_t
linear_id
=
platform_get_core_pos
(
mpidr
);
uint32_t
linear_id
=
platform_get_core_pos
(
mpidr
);
tsp_context_t
*
tsp_ctx
=
&
tspd_sp_context
[
linear_id
];
tsp_context_t
*
tsp_ctx
=
&
tspd_sp_context
[
linear_id
];
assert
(
tsp_
entry_info
);
assert
(
tsp_
vectors
);
assert
(
get_tsp_pstate
(
tsp_ctx
->
state
)
==
TSP_PSTATE_SUSPEND
);
assert
(
get_tsp_pstate
(
tsp_ctx
->
state
)
==
TSP_PSTATE_SUSPEND
);
/* Program the entry point, suspend_level and enter the SP */
/* Program the entry point, suspend_level and enter the SP */
write_ctx_reg
(
get_gpregs_ctx
(
&
tsp_ctx
->
cpu_ctx
),
write_ctx_reg
(
get_gpregs_ctx
(
&
tsp_ctx
->
cpu_ctx
),
CTX_GPREG_X0
,
CTX_GPREG_X0
,
suspend_level
);
suspend_level
);
cm_set_elr_el3
(
SECURE
,
(
uint64_t
)
tsp_
entry_info
->
cpu_resume_entry
);
cm_set_elr_el3
(
SECURE
,
(
uint64_t
)
&
tsp_
vectors
->
cpu_resume_entry
);
rc
=
tspd_synchronous_sp_entry
(
tsp_ctx
);
rc
=
tspd_synchronous_sp_entry
(
tsp_ctx
);
/*
/*
...
...
services/spd/tspd/tspd_private.h
View file @
8957fc76
...
@@ -183,7 +183,7 @@ extern const spd_pm_ops_t tspd_pm;
...
@@ -183,7 +183,7 @@ extern const spd_pm_ops_t tspd_pm;
/*******************************************************************************
/*******************************************************************************
* Forward declarations
* Forward declarations
******************************************************************************/
******************************************************************************/
struct
entry_info
;
struct
tsp_vectors
;
/*******************************************************************************
/*******************************************************************************
* Function & Data prototypes
* Function & Data prototypes
...
@@ -197,7 +197,7 @@ extern int32_t tspd_init_secure_context(uint64_t entrypoint,
...
@@ -197,7 +197,7 @@ extern int32_t tspd_init_secure_context(uint64_t entrypoint,
uint64_t
mpidr
,
uint64_t
mpidr
,
tsp_context_t
*
tsp_ctx
);
tsp_context_t
*
tsp_ctx
);
extern
tsp_context_t
tspd_sp_context
[
TSPD_CORE_COUNT
];
extern
tsp_context_t
tspd_sp_context
[
TSPD_CORE_COUNT
];
extern
struct
entry_info
*
tsp_entry_info
;
extern
struct
tsp_vectors
*
tsp_vectors
;
#endif
/*__ASSEMBLY__*/
#endif
/*__ASSEMBLY__*/
#endif
/* __TSPD_PRIVATE_H__ */
#endif
/* __TSPD_PRIVATE_H__ */
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment