blob: eecb62ead38313bea1c39f28dab8d49f1ed89818 [file] [log] [blame]
Miklos Balint386b8b52017-11-29 13:12:32 +00001/*
TTornblom83d96372019-11-19 12:53:16 +01002 * Copyright (c) 2017-2020, Arm Limited. All rights reserved.
Miklos Balint386b8b52017-11-29 13:12:32 +00003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 *
6 */
7
Miklos Balint386b8b52017-11-29 13:12:32 +00008#include <stdbool.h>
David Hu326f3972019-08-06 14:16:51 +08009#include "secure_utilities.h"
Miklos Balint386b8b52017-11-29 13:12:32 +000010#include "tfm_secure_api.h"
Miklos Balint386b8b52017-11-29 13:12:32 +000011
Mate Toth-Pal65291f32018-02-23 14:35:22 +010012/* This is the "Big Lock" on the secure side, to guarantee single entry
13 * to SPE
14 */
Miklos Balint87da2512018-04-19 13:45:50 +020015int32_t tfm_secure_lock;
Miklos Balintace4c3f2018-07-30 12:31:15 +020016
Antonio de Angelisffdcaa82019-03-04 16:43:15 +000017bool tfm_is_one_bit_set(uint32_t n)
18{
19 return ((n && !(n & (n-1))) ? true : false);
Mate Toth-Pal4341de02018-10-02 12:55:47 +020020}
21
David Hu326f3972019-08-06 14:16:51 +080022enum tfm_status_e check_address_range(const void *p, size_t s,
23 uintptr_t region_start,
24 uintptr_t region_limit)
Mate Toth-Palb8ce0dd2018-07-25 10:18:34 +020025{
Summer Qin0fc3f592019-04-11 16:00:10 +080026 int32_t range_in_region;
Mate Toth-Palb8ce0dd2018-07-25 10:18:34 +020027
28 /* Check for overflow in the range parameters */
David Hu326f3972019-08-06 14:16:51 +080029 if ((uintptr_t)p > UINTPTR_MAX - s) {
Summer Qin0fc3f592019-04-11 16:00:10 +080030 return TFM_ERROR_GENERIC;
Mate Toth-Palb8ce0dd2018-07-25 10:18:34 +020031 }
32
33 /* We trust the region parameters, and don't check for overflow */
34
35 /* Calculate the result */
36 range_in_region = ((uintptr_t)p >= region_start) &&
TTornblom83d96372019-11-19 12:53:16 +010037 ((uintptr_t)((char *) p + s - 1) <= region_limit);
Summer Qin0fc3f592019-04-11 16:00:10 +080038 if (range_in_region) {
39 return TFM_SUCCESS;
40 } else {
41 return TFM_ERROR_GENERIC;
42 }
Mate Toth-Palb8ce0dd2018-07-25 10:18:34 +020043}
44
Miklos Balint386b8b52017-11-29 13:12:32 +000045void tfm_secure_api_error_handler(void)
46{
Miklos Balintace4c3f2018-07-30 12:31:15 +020047 ERROR_MSG("Security violation when calling secure API");
Edison Ai9059ea02019-11-28 13:46:14 +080048 tfm_core_panic();
Miklos Balint386b8b52017-11-29 13:12:32 +000049}
David Hu8d1f1072020-04-30 12:52:14 +080050
51#ifndef TFM_PSA_API
52int32_t tfm_core_partition_request(uint32_t id, bool is_ns, void *fn,
53 int32_t arg1, int32_t arg2, int32_t arg3, int32_t arg4)
54{
55 int32_t args[4] = {arg1, arg2, arg3, arg4};
56 struct tfm_sfn_req_s desc, *desc_ptr = &desc;
57
58 desc.sp_id = id;
59 desc.sfn = (sfn_t) fn;
60 desc.args = args;
61 desc.ns_caller = is_ns;
62
63 if (__get_active_exc_num() != EXC_NUM_THREAD_MODE) {
64 /* The veneer of a secure service had been called from Handler mode.
65 * This violates TF-M's programming model, and is considered an
66 * unrecoverable error.
67 */
68 tfm_core_panic();
69 } else {
70 if (desc.ns_caller) {
71 return tfm_core_sfn_request(desc_ptr);
72 } else {
73 return tfm_spm_sfn_request_thread_mode(desc_ptr);
74 }
75 }
76 return TFM_ERROR_GENERIC;
77}
78#endif