2 Entry point to the Standalone MM Foundation when initialized during the SEC
5 Copyright (c) 2017 - 2021, Arm Ltd. All rights reserved.<BR>
6 SPDX-License-Identifier: BSD-2-Clause-Patent
13 #include <Library/AArch64/StandaloneMmCoreEntryPoint.h>
16 #include <Guid/MmramMemoryReserve.h>
17 #include <Guid/MpInformation.h>
19 #include <Library/ArmMmuLib.h>
20 #include <Library/ArmSvcLib.h>
21 #include <Library/DebugLib.h>
22 #include <Library/HobLib.h>
23 #include <Library/BaseLib.h>
24 #include <Library/BaseMemoryLib.h>
25 #include <Library/SerialPortLib.h>
27 #include <IndustryStandard/ArmStdSmc.h>
28 #include <IndustryStandard/ArmMmSvc.h>
30 #define SPM_MAJOR_VER_MASK 0xFFFF0000
31 #define SPM_MINOR_VER_MASK 0x0000FFFF
32 #define SPM_MAJOR_VER_SHIFT 16
34 CONST UINT32 SPM_MAJOR_VER
= 0;
35 CONST UINT32 SPM_MINOR_VER
= 1;
37 CONST UINT8 BOOT_PAYLOAD_VERSION
= 1;
39 PI_MM_ARM_TF_CPU_DRIVER_ENTRYPOINT CpuDriverEntryPoint
= NULL
;
42 Retrieve a pointer to and print the boot information passed by privileged
45 @param [in] SharedBufAddress The pointer memory shared with privileged
49 EFI_SECURE_PARTITION_BOOT_INFO
*
50 GetAndPrintBootinformation (
51 IN VOID
*SharedBufAddress
54 EFI_SECURE_PARTITION_BOOT_INFO
*PayloadBootInfo
;
55 EFI_SECURE_PARTITION_CPU_INFO
*PayloadCpuInfo
;
58 PayloadBootInfo
= (EFI_SECURE_PARTITION_BOOT_INFO
*) SharedBufAddress
;
60 if (PayloadBootInfo
== NULL
) {
61 DEBUG ((DEBUG_ERROR
, "PayloadBootInfo NULL\n"));
65 if (PayloadBootInfo
->Header
.Version
!= BOOT_PAYLOAD_VERSION
) {
66 DEBUG ((DEBUG_ERROR
, "Boot Information Version Mismatch. Current=0x%x, Expected=0x%x.\n",
67 PayloadBootInfo
->Header
.Version
, BOOT_PAYLOAD_VERSION
));
71 DEBUG ((DEBUG_INFO
, "NumSpMemRegions - 0x%x\n", PayloadBootInfo
->NumSpMemRegions
));
72 DEBUG ((DEBUG_INFO
, "SpMemBase - 0x%lx\n", PayloadBootInfo
->SpMemBase
));
73 DEBUG ((DEBUG_INFO
, "SpMemLimit - 0x%lx\n", PayloadBootInfo
->SpMemLimit
));
74 DEBUG ((DEBUG_INFO
, "SpImageBase - 0x%lx\n", PayloadBootInfo
->SpImageBase
));
75 DEBUG ((DEBUG_INFO
, "SpStackBase - 0x%lx\n", PayloadBootInfo
->SpStackBase
));
76 DEBUG ((DEBUG_INFO
, "SpHeapBase - 0x%lx\n", PayloadBootInfo
->SpHeapBase
));
77 DEBUG ((DEBUG_INFO
, "SpNsCommBufBase - 0x%lx\n", PayloadBootInfo
->SpNsCommBufBase
));
78 DEBUG ((DEBUG_INFO
, "SpSharedBufBase - 0x%lx\n", PayloadBootInfo
->SpSharedBufBase
));
80 DEBUG ((DEBUG_INFO
, "SpImageSize - 0x%x\n", PayloadBootInfo
->SpImageSize
));
81 DEBUG ((DEBUG_INFO
, "SpPcpuStackSize - 0x%x\n", PayloadBootInfo
->SpPcpuStackSize
));
82 DEBUG ((DEBUG_INFO
, "SpHeapSize - 0x%x\n", PayloadBootInfo
->SpHeapSize
));
83 DEBUG ((DEBUG_INFO
, "SpNsCommBufSize - 0x%x\n", PayloadBootInfo
->SpNsCommBufSize
));
84 DEBUG ((DEBUG_INFO
, "SpPcpuSharedBufSize - 0x%x\n", PayloadBootInfo
->SpPcpuSharedBufSize
));
86 DEBUG ((DEBUG_INFO
, "NumCpus - 0x%x\n", PayloadBootInfo
->NumCpus
));
87 DEBUG ((DEBUG_INFO
, "CpuInfo - 0x%p\n", PayloadBootInfo
->CpuInfo
));
89 PayloadCpuInfo
= (EFI_SECURE_PARTITION_CPU_INFO
*) PayloadBootInfo
->CpuInfo
;
91 if (PayloadCpuInfo
== NULL
) {
92 DEBUG ((DEBUG_ERROR
, "PayloadCpuInfo NULL\n"));
96 for (Index
= 0; Index
< PayloadBootInfo
->NumCpus
; Index
++) {
97 DEBUG ((DEBUG_INFO
, "Mpidr - 0x%lx\n", PayloadCpuInfo
[Index
].Mpidr
));
98 DEBUG ((DEBUG_INFO
, "LinearId - 0x%x\n", PayloadCpuInfo
[Index
].LinearId
));
99 DEBUG ((DEBUG_INFO
, "Flags - 0x%x\n", PayloadCpuInfo
[Index
].Flags
));
102 return PayloadBootInfo
;
106 A loop to delegated events.
108 @param [in] EventCompleteSvcArgs Pointer to the event completion arguments.
114 IN ARM_SVC_ARGS
*EventCompleteSvcArgs
121 ArmCallSvc (EventCompleteSvcArgs
);
123 DEBUG ((DEBUG_INFO
, "Received delegated event\n"));
124 DEBUG ((DEBUG_INFO
, "X0 : 0x%x\n", (UINT32
) EventCompleteSvcArgs
->Arg0
));
125 DEBUG ((DEBUG_INFO
, "X1 : 0x%x\n", (UINT32
) EventCompleteSvcArgs
->Arg1
));
126 DEBUG ((DEBUG_INFO
, "X2 : 0x%x\n", (UINT32
) EventCompleteSvcArgs
->Arg2
));
127 DEBUG ((DEBUG_INFO
, "X3 : 0x%x\n", (UINT32
) EventCompleteSvcArgs
->Arg3
));
129 Status
= CpuDriverEntryPoint (
130 EventCompleteSvcArgs
->Arg0
,
131 EventCompleteSvcArgs
->Arg3
,
132 EventCompleteSvcArgs
->Arg1
135 if (EFI_ERROR (Status
)) {
136 DEBUG ((DEBUG_ERROR
, "Failed delegated event 0x%x, Status 0x%x\n",
137 EventCompleteSvcArgs
->Arg0
, Status
));
142 SvcStatus
= ARM_SVC_SPM_RET_SUCCESS
;
144 case EFI_INVALID_PARAMETER
:
145 SvcStatus
= ARM_SVC_SPM_RET_INVALID_PARAMS
;
147 case EFI_ACCESS_DENIED
:
148 SvcStatus
= ARM_SVC_SPM_RET_DENIED
;
150 case EFI_OUT_OF_RESOURCES
:
151 SvcStatus
= ARM_SVC_SPM_RET_NO_MEMORY
;
153 case EFI_UNSUPPORTED
:
154 SvcStatus
= ARM_SVC_SPM_RET_NOT_SUPPORTED
;
157 SvcStatus
= ARM_SVC_SPM_RET_NOT_SUPPORTED
;
161 EventCompleteSvcArgs
->Arg0
= ARM_SVC_ID_SP_EVENT_COMPLETE_AARCH64
;
162 EventCompleteSvcArgs
->Arg1
= SvcStatus
;
167 Query the SPM version, check compatibility and return success if compatible.
169 @retval EFI_SUCCESS SPM versions compatible.
170 @retval EFI_UNSUPPORTED SPM versions not compatible.
177 UINT16 SpmMajorVersion
;
178 UINT16 SpmMinorVersion
;
180 ARM_SVC_ARGS SpmVersionArgs
;
182 SpmVersionArgs
.Arg0
= ARM_SVC_ID_SPM_VERSION_AARCH32
;
184 ArmCallSvc (&SpmVersionArgs
);
186 SpmVersion
= SpmVersionArgs
.Arg0
;
188 SpmMajorVersion
= ((SpmVersion
& SPM_MAJOR_VER_MASK
) >> SPM_MAJOR_VER_SHIFT
);
189 SpmMinorVersion
= ((SpmVersion
& SPM_MINOR_VER_MASK
) >> 0);
191 // Different major revision values indicate possibly incompatible functions.
192 // For two revisions, A and B, for which the major revision values are
193 // identical, if the minor revision value of revision B is greater than
194 // the minor revision value of revision A, then every function in
195 // revision A must work in a compatible way with revision B.
196 // However, it is possible for revision B to have a higher
197 // function count than revision A.
198 if ((SpmMajorVersion
== SPM_MAJOR_VER
) &&
199 (SpmMinorVersion
>= SPM_MINOR_VER
))
201 DEBUG ((DEBUG_INFO
, "SPM Version: Major=0x%x, Minor=0x%x\n",
202 SpmMajorVersion
, SpmMinorVersion
));
203 Status
= EFI_SUCCESS
;
207 DEBUG ((DEBUG_INFO
, "Incompatible SPM Versions.\n Current Version: Major=0x%x, Minor=0x%x.\n Expected: Major=0x%x, Minor>=0x%x.\n",
208 SpmMajorVersion
, SpmMinorVersion
, SPM_MAJOR_VER
, SPM_MINOR_VER
));
209 Status
= EFI_UNSUPPORTED
;
216 The entry point of Standalone MM Foundation.
218 @param [in] SharedBufAddress Pointer to the Buffer between SPM and SP.
219 @param [in] SharedBufSize Size of the shared buffer.
220 @param [in] cookie1 Cookie 1
221 @param [in] cookie2 Cookie 2
227 IN VOID
*SharedBufAddress
,
228 IN UINT64 SharedBufSize
,
233 PE_COFF_LOADER_IMAGE_CONTEXT ImageContext
;
234 EFI_SECURE_PARTITION_BOOT_INFO
*PayloadBootInfo
;
235 ARM_SVC_ARGS InitMmFoundationSvcArgs
;
237 UINT32 SectionHeaderOffset
;
238 UINT16 NumberOfSections
;
242 EFI_PHYSICAL_ADDRESS ImageBase
;
244 // Get Secure Partition Manager Version Information
245 Status
= GetSpmVersion ();
246 if (EFI_ERROR (Status
)) {
250 PayloadBootInfo
= GetAndPrintBootinformation (SharedBufAddress
);
251 if (PayloadBootInfo
== NULL
) {
252 Status
= EFI_UNSUPPORTED
;
256 // Locate PE/COFF File information for the Standalone MM core module
257 Status
= LocateStandaloneMmCorePeCoffData (
258 (EFI_FIRMWARE_VOLUME_HEADER
*) PayloadBootInfo
->SpImageBase
,
263 if (EFI_ERROR (Status
)) {
267 // Obtain the PE/COFF Section information for the Standalone MM core module
268 Status
= GetStandaloneMmCorePeCoffSections (
272 &SectionHeaderOffset
,
276 if (EFI_ERROR (Status
)) {
281 // ImageBase may deviate from ImageContext.ImageAddress if we are dealing
282 // with a TE image, in which case the latter points to the actual offset
283 // of the image, whereas ImageBase refers to the address where the image
284 // would start if the stripped PE headers were still in place. In either
285 // case, we need to fix up ImageBase so it refers to the actual current
288 ImageBase
+= (UINTN
)TeData
- ImageContext
.ImageAddress
;
290 // Update the memory access permissions of individual sections in the
291 // Standalone MM core module
292 Status
= UpdateMmFoundationPeCoffPermissions (
297 ArmSetMemoryRegionNoExec
,
298 ArmSetMemoryRegionReadOnly
,
299 ArmClearMemoryRegionReadOnly
302 if (EFI_ERROR (Status
)) {
306 if (ImageContext
.ImageAddress
!= (UINTN
)TeData
) {
307 ImageContext
.ImageAddress
= (UINTN
)TeData
;
308 ArmSetMemoryRegionNoExec (ImageBase
, SIZE_4KB
);
309 ArmClearMemoryRegionReadOnly (ImageBase
, SIZE_4KB
);
311 Status
= PeCoffLoaderRelocateImage (&ImageContext
);
312 ASSERT_EFI_ERROR (Status
);
316 // Create Hoblist based upon boot information passed by privileged software
318 HobStart
= CreateHobListFromBootInfo (&CpuDriverEntryPoint
, PayloadBootInfo
);
321 // Call the MM Core entry point
323 ProcessModuleEntryPointList (HobStart
);
325 DEBUG ((DEBUG_INFO
, "Shared Cpu Driver EP 0x%lx\n", (UINT64
) CpuDriverEntryPoint
));
328 ZeroMem (&InitMmFoundationSvcArgs
, sizeof(InitMmFoundationSvcArgs
));
329 InitMmFoundationSvcArgs
.Arg0
= ARM_SVC_ID_SP_EVENT_COMPLETE_AARCH64
;
330 InitMmFoundationSvcArgs
.Arg1
= Status
;
331 DelegatedEventLoop (&InitMmFoundationSvcArgs
);