Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 1 | /* |
TTornblom | 83d9637 | 2019-11-19 12:53:16 +0100 | [diff] [blame] | 2 | * Copyright (c) 2017-2020, Arm Limited. All rights reserved. |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 3 | * |
| 4 | * SPDX-License-Identifier: BSD-3-Clause |
| 5 | * |
| 6 | */ |
| 7 | |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 8 | #include <stdbool.h> |
David Hu | 326f397 | 2019-08-06 14:16:51 +0800 | [diff] [blame] | 9 | #include "secure_utilities.h" |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 10 | #include "tfm_secure_api.h" |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 11 | |
Mate Toth-Pal | 65291f3 | 2018-02-23 14:35:22 +0100 | [diff] [blame] | 12 | /* This is the "Big Lock" on the secure side, to guarantee single entry |
| 13 | * to SPE |
| 14 | */ |
Miklos Balint | 87da251 | 2018-04-19 13:45:50 +0200 | [diff] [blame] | 15 | int32_t tfm_secure_lock; |
Miklos Balint | ace4c3f | 2018-07-30 12:31:15 +0200 | [diff] [blame] | 16 | |
Antonio de Angelis | ffdcaa8 | 2019-03-04 16:43:15 +0000 | [diff] [blame] | 17 | bool tfm_is_one_bit_set(uint32_t n) |
| 18 | { |
| 19 | return ((n && !(n & (n-1))) ? true : false); |
Mate Toth-Pal | 4341de0 | 2018-10-02 12:55:47 +0200 | [diff] [blame] | 20 | } |
| 21 | |
David Hu | 326f397 | 2019-08-06 14:16:51 +0800 | [diff] [blame] | 22 | enum tfm_status_e check_address_range(const void *p, size_t s, |
| 23 | uintptr_t region_start, |
| 24 | uintptr_t region_limit) |
Mate Toth-Pal | b8ce0dd | 2018-07-25 10:18:34 +0200 | [diff] [blame] | 25 | { |
Summer Qin | 0fc3f59 | 2019-04-11 16:00:10 +0800 | [diff] [blame] | 26 | int32_t range_in_region; |
Mate Toth-Pal | b8ce0dd | 2018-07-25 10:18:34 +0200 | [diff] [blame] | 27 | |
| 28 | /* Check for overflow in the range parameters */ |
David Hu | 326f397 | 2019-08-06 14:16:51 +0800 | [diff] [blame] | 29 | if ((uintptr_t)p > UINTPTR_MAX - s) { |
Summer Qin | 0fc3f59 | 2019-04-11 16:00:10 +0800 | [diff] [blame] | 30 | return TFM_ERROR_GENERIC; |
Mate Toth-Pal | b8ce0dd | 2018-07-25 10:18:34 +0200 | [diff] [blame] | 31 | } |
| 32 | |
| 33 | /* We trust the region parameters, and don't check for overflow */ |
| 34 | |
| 35 | /* Calculate the result */ |
| 36 | range_in_region = ((uintptr_t)p >= region_start) && |
TTornblom | 83d9637 | 2019-11-19 12:53:16 +0100 | [diff] [blame] | 37 | ((uintptr_t)((char *) p + s - 1) <= region_limit); |
Summer Qin | 0fc3f59 | 2019-04-11 16:00:10 +0800 | [diff] [blame] | 38 | if (range_in_region) { |
| 39 | return TFM_SUCCESS; |
| 40 | } else { |
| 41 | return TFM_ERROR_GENERIC; |
| 42 | } |
Mate Toth-Pal | b8ce0dd | 2018-07-25 10:18:34 +0200 | [diff] [blame] | 43 | } |
| 44 | |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 45 | void tfm_secure_api_error_handler(void) |
| 46 | { |
Miklos Balint | ace4c3f | 2018-07-30 12:31:15 +0200 | [diff] [blame] | 47 | ERROR_MSG("Security violation when calling secure API"); |
Edison Ai | 9059ea0 | 2019-11-28 13:46:14 +0800 | [diff] [blame] | 48 | tfm_core_panic(); |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 49 | } |
David Hu | 8d1f107 | 2020-04-30 12:52:14 +0800 | [diff] [blame] | 50 | |
| 51 | #ifndef TFM_PSA_API |
| 52 | int32_t tfm_core_partition_request(uint32_t id, bool is_ns, void *fn, |
| 53 | int32_t arg1, int32_t arg2, int32_t arg3, int32_t arg4) |
| 54 | { |
| 55 | int32_t args[4] = {arg1, arg2, arg3, arg4}; |
| 56 | struct tfm_sfn_req_s desc, *desc_ptr = &desc; |
| 57 | |
| 58 | desc.sp_id = id; |
| 59 | desc.sfn = (sfn_t) fn; |
| 60 | desc.args = args; |
| 61 | desc.ns_caller = is_ns; |
| 62 | |
| 63 | if (__get_active_exc_num() != EXC_NUM_THREAD_MODE) { |
| 64 | /* The veneer of a secure service had been called from Handler mode. |
| 65 | * This violates TF-M's programming model, and is considered an |
| 66 | * unrecoverable error. |
| 67 | */ |
| 68 | tfm_core_panic(); |
| 69 | } else { |
| 70 | if (desc.ns_caller) { |
| 71 | return tfm_core_sfn_request(desc_ptr); |
| 72 | } else { |
| 73 | return tfm_spm_sfn_request_thread_mode(desc_ptr); |
| 74 | } |
| 75 | } |
| 76 | return TFM_ERROR_GENERIC; |
| 77 | } |
| 78 | #endif |