Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 1 | /* |
Jaykumar Pitambarbhai Patel | 98e6ce4 | 2020-01-06 12:42:42 +0530 | [diff] [blame] | 2 | * Copyright (c) 2017-2020, Arm Limited. All rights reserved. |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 3 | * |
| 4 | * SPDX-License-Identifier: BSD-3-Clause |
| 5 | * |
| 6 | */ |
| 7 | |
Summer Qin | f993cd4 | 2020-08-12 16:55:17 +0800 | [diff] [blame] | 8 | #include "log/tfm_log.h" |
TTornblom | 83d9637 | 2019-11-19 12:53:16 +0100 | [diff] [blame] | 9 | #include "region.h" |
Summer Qin | f993cd4 | 2020-08-12 16:55:17 +0800 | [diff] [blame] | 10 | #include "spm_func.h" |
Summer Qin | 0eb7c91 | 2020-08-19 16:08:50 +0800 | [diff] [blame^] | 11 | #include "tfm_hal_platform.h" |
Summer Qin | 830c554 | 2020-02-14 13:44:20 +0800 | [diff] [blame] | 12 | #include "tfm_internal.h" |
| 13 | #include "tfm_irq_list.h" |
| 14 | #include "tfm_nspm.h" |
| 15 | #include "tfm_spm_hal.h" |
| 16 | #include "tfm_version.h" |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 17 | |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 18 | /* |
| 19 | * Avoids the semihosting issue |
| 20 | * FixMe: describe 'semihosting issue' |
| 21 | */ |
| 22 | #if defined(__ARMCC_VERSION) && (__ARMCC_VERSION >= 6010050) |
| 23 | __asm(" .global __ARM_use_no_argv\n"); |
| 24 | #endif |
| 25 | |
| 26 | #ifndef TFM_LVL |
| 27 | #error TFM_LVL is not defined! |
Summer Qin | f993cd4 | 2020-08-12 16:55:17 +0800 | [diff] [blame] | 28 | #elif (TFM_LVL != 1) |
Edison Ai | cb0ecf6 | 2019-07-10 18:43:51 +0800 | [diff] [blame] | 29 | #error Only TFM_LVL 1 is supported for library model! |
| 30 | #endif |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 31 | |
Mate Toth-Pal | 6bb416a | 2019-05-07 16:23:55 +0200 | [diff] [blame] | 32 | REGION_DECLARE(Image$$, ARM_LIB_STACK_MSP, $$ZI$$Base); |
| 33 | |
Summer Qin | 830c554 | 2020-02-14 13:44:20 +0800 | [diff] [blame] | 34 | static int32_t tfm_core_init(void) |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 35 | { |
Mate Toth-Pal | 4341de0 | 2018-10-02 12:55:47 +0200 | [diff] [blame] | 36 | size_t i; |
Summer Qin | 0eb7c91 | 2020-08-19 16:08:50 +0800 | [diff] [blame^] | 37 | enum tfm_hal_status_t hal_status = TFM_HAL_ERROR_GENERIC; |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 38 | enum tfm_plat_err_t plat_err = TFM_PLAT_ERR_SYSTEM_ERR; |
| 39 | enum irq_target_state_t irq_target_state = TFM_IRQ_TARGET_STATE_SECURE; |
Mate Toth-Pal | 4341de0 | 2018-10-02 12:55:47 +0200 | [diff] [blame] | 40 | |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 41 | /* Enables fault handlers */ |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 42 | plat_err = tfm_spm_hal_enable_fault_handlers(); |
| 43 | if (plat_err != TFM_PLAT_ERR_SUCCESS) { |
| 44 | return TFM_ERROR_GENERIC; |
| 45 | } |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 46 | |
Marc Moreno Berengue | 8e0fa7a | 2018-10-04 18:25:13 +0100 | [diff] [blame] | 47 | /* Configures the system reset request properties */ |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 48 | plat_err = tfm_spm_hal_system_reset_cfg(); |
| 49 | if (plat_err != TFM_PLAT_ERR_SUCCESS) { |
| 50 | return TFM_ERROR_GENERIC; |
| 51 | } |
Marc Moreno Berengue | 8e0fa7a | 2018-10-04 18:25:13 +0100 | [diff] [blame] | 52 | |
Marc Moreno Berengue | d584b61 | 2018-11-26 11:46:31 +0000 | [diff] [blame] | 53 | /* Configures debug authentication */ |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 54 | plat_err = tfm_spm_hal_init_debug(); |
| 55 | if (plat_err != TFM_PLAT_ERR_SUCCESS) { |
| 56 | return TFM_ERROR_GENERIC; |
| 57 | } |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 58 | |
Jaykumar Pitambarbhai Patel | 98e6ce4 | 2020-01-06 12:42:42 +0530 | [diff] [blame] | 59 | /* |
| 60 | * Access to any peripheral should be performed after programming |
| 61 | * the necessary security components such as PPC/SAU. |
| 62 | */ |
| 63 | plat_err = tfm_spm_hal_init_isolation_hw(); |
| 64 | if (plat_err != TFM_PLAT_ERR_SUCCESS) { |
| 65 | return TFM_ERROR_GENERIC; |
| 66 | } |
| 67 | |
Andrei Narkevitch | 5bba54c | 2019-09-23 14:09:13 -0700 | [diff] [blame] | 68 | /* Performs platform specific initialization */ |
Summer Qin | 0eb7c91 | 2020-08-19 16:08:50 +0800 | [diff] [blame^] | 69 | hal_status = tfm_hal_platform_init(); |
| 70 | if (hal_status != TFM_HAL_SUCCESS) { |
Andrei Narkevitch | 5bba54c | 2019-09-23 14:09:13 -0700 | [diff] [blame] | 71 | return TFM_ERROR_GENERIC; |
| 72 | } |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 73 | |
Ken Liu | 81f2d5e | 2019-12-26 11:44:36 +0800 | [diff] [blame] | 74 | LOG_MSG("\033[1;34m[Sec Thread] Secure image initializing!\033[0m\r\n"); |
Miklos Balint | 6cbeba6 | 2018-04-12 17:31:34 +0200 | [diff] [blame] | 75 | |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 76 | #ifdef TFM_CORE_DEBUG |
Ken Liu | 81f2d5e | 2019-12-26 11:44:36 +0800 | [diff] [blame] | 77 | LOG_MSG("TF-M isolation level is: %d\r\n", TFM_LVL); |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 78 | #endif |
| 79 | |
Tamas Ban | 9ff535b | 2018-09-18 08:15:18 +0100 | [diff] [blame] | 80 | tfm_core_validate_boot_data(); |
| 81 | |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 82 | configure_ns_code(); |
| 83 | |
| 84 | /* Configures all interrupts to retarget NS state, except for |
| 85 | * secure peripherals |
| 86 | */ |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 87 | plat_err = tfm_spm_hal_nvic_interrupt_target_state_cfg(); |
| 88 | if (plat_err != TFM_PLAT_ERR_SUCCESS) { |
| 89 | return TFM_ERROR_GENERIC; |
| 90 | } |
Mate Toth-Pal | 4341de0 | 2018-10-02 12:55:47 +0200 | [diff] [blame] | 91 | |
| 92 | for (i = 0; i < tfm_core_irq_signals_count; ++i) { |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 93 | plat_err = tfm_spm_hal_set_secure_irq_priority( |
Mate Toth-Pal | 4341de0 | 2018-10-02 12:55:47 +0200 | [diff] [blame] | 94 | tfm_core_irq_signals[i].irq_line, |
| 95 | tfm_core_irq_signals[i].irq_priority); |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 96 | if (plat_err != TFM_PLAT_ERR_SUCCESS) { |
| 97 | return TFM_ERROR_GENERIC; |
| 98 | } |
| 99 | irq_target_state = tfm_spm_hal_set_irq_target_state( |
| 100 | tfm_core_irq_signals[i].irq_line, |
| 101 | TFM_IRQ_TARGET_STATE_SECURE); |
| 102 | if (irq_target_state != TFM_IRQ_TARGET_STATE_SECURE) { |
| 103 | return TFM_ERROR_GENERIC; |
| 104 | } |
Mate Toth-Pal | 4341de0 | 2018-10-02 12:55:47 +0200 | [diff] [blame] | 105 | } |
| 106 | |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 107 | /* Enable secure peripherals interrupts */ |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 108 | plat_err = tfm_spm_hal_nvic_interrupt_enable(); |
| 109 | if (plat_err != TFM_PLAT_ERR_SUCCESS) { |
| 110 | return TFM_ERROR_GENERIC; |
| 111 | } |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 112 | |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 113 | return TFM_SUCCESS; |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 114 | } |
| 115 | |
Edison Ai | d87f07b | 2019-07-22 18:50:24 +0800 | [diff] [blame] | 116 | static int32_t tfm_core_set_secure_exception_priorities(void) |
Miklos Balint | ace4c3f | 2018-07-30 12:31:15 +0200 | [diff] [blame] | 117 | { |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 118 | enum tfm_plat_err_t plat_err = TFM_PLAT_ERR_SYSTEM_ERR; |
| 119 | |
David Hu | 4e16560 | 2019-06-12 18:38:31 +0800 | [diff] [blame] | 120 | tfm_arch_prioritize_secure_exception(); |
Miklos Balint | ace4c3f | 2018-07-30 12:31:15 +0200 | [diff] [blame] | 121 | |
Mate Toth-Pal | 3e2ebd0 | 2019-05-07 14:22:16 +0200 | [diff] [blame] | 122 | /* Explicitly set Secure SVC priority to highest */ |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 123 | plat_err = tfm_spm_hal_set_secure_irq_priority(SVCall_IRQn, 0); |
| 124 | if (plat_err != TFM_PLAT_ERR_SUCCESS) { |
| 125 | return TFM_ERROR_GENERIC; |
| 126 | } |
Miklos Balint | ace4c3f | 2018-07-30 12:31:15 +0200 | [diff] [blame] | 127 | |
Summer Qin | 2b8ab7e | 2020-02-18 13:58:58 +0800 | [diff] [blame] | 128 | tfm_arch_set_pendsv_priority(); |
Edison Ai | e5111d9 | 2019-07-22 16:08:27 +0800 | [diff] [blame] | 129 | |
| 130 | return TFM_SUCCESS; |
Miklos Balint | ace4c3f | 2018-07-30 12:31:15 +0200 | [diff] [blame] | 131 | } |
| 132 | |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 133 | int main(void) |
| 134 | { |
Mate Toth-Pal | 6bb416a | 2019-05-07 16:23:55 +0200 | [diff] [blame] | 135 | /* set Main Stack Pointer limit */ |
David Hu | f363fe9 | 2019-07-02 13:03:30 +0800 | [diff] [blame] | 136 | tfm_arch_set_msplim((uint32_t)®ION_NAME(Image$$, ARM_LIB_STACK_MSP, |
| 137 | $$ZI$$Base)); |
Mate Toth-Pal | 6bb416a | 2019-05-07 16:23:55 +0200 | [diff] [blame] | 138 | |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 139 | if (tfm_core_init() != TFM_SUCCESS) { |
Edison Ai | 9059ea0 | 2019-11-28 13:46:14 +0800 | [diff] [blame] | 140 | tfm_core_panic(); |
Hugues de Valon | 4bf875b | 2019-02-19 14:53:49 +0000 | [diff] [blame] | 141 | } |
Soby Mathew | c64adbc | 2020-03-11 12:33:44 +0000 | [diff] [blame] | 142 | /* Print the TF-M version */ |
| 143 | LOG_MSG("\033[1;34mBooting TFM v%d.%d %s\033[0m\r\n", |
| 144 | VERSION_MAJOR, VERSION_MINOR, VERSION_STRING); |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 145 | |
Hugues de Valon | 4bf875b | 2019-02-19 14:53:49 +0000 | [diff] [blame] | 146 | if (tfm_spm_db_init() != SPM_ERR_OK) { |
Edison Ai | 9059ea0 | 2019-11-28 13:46:14 +0800 | [diff] [blame] | 147 | tfm_core_panic(); |
Hugues de Valon | 4bf875b | 2019-02-19 14:53:49 +0000 | [diff] [blame] | 148 | } |
Mate Toth-Pal | 936c33b | 2018-04-10 14:02:07 +0200 | [diff] [blame] | 149 | |
Edison Ai | 1dfd7b1 | 2020-02-23 14:16:08 +0800 | [diff] [blame] | 150 | #ifdef CONFIG_TFM_ENABLE_MEMORY_PROTECT |
Edison Ai | c1b1090 | 2019-08-26 10:34:19 +0800 | [diff] [blame] | 151 | if (tfm_spm_hal_setup_isolation_hw() != TFM_PLAT_ERR_SUCCESS) { |
Edison Ai | 9059ea0 | 2019-11-28 13:46:14 +0800 | [diff] [blame] | 152 | tfm_core_panic(); |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 153 | } |
Edison Ai | 1dfd7b1 | 2020-02-23 14:16:08 +0800 | [diff] [blame] | 154 | #endif /* CONFIG_TFM_ENABLE_MEMORY_PROTECT */ |
Mate Toth-Pal | 936c33b | 2018-04-10 14:02:07 +0200 | [diff] [blame] | 155 | |
Mate Toth-Pal | 349714a | 2018-02-23 15:30:24 +0100 | [diff] [blame] | 156 | tfm_spm_partition_set_state(TFM_SP_CORE_ID, SPM_PARTITION_STATE_RUNNING); |
Mate Toth-Pal | 65291f3 | 2018-02-23 14:35:22 +0100 | [diff] [blame] | 157 | |
TTornblom | c640e07 | 2019-06-14 14:33:51 +0200 | [diff] [blame] | 158 | REGION_DECLARE(Image$$, ARM_LIB_STACK, $$ZI$$Base)[]; |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 159 | uint32_t psp_stack_bottom = |
| 160 | (uint32_t)REGION_NAME(Image$$, ARM_LIB_STACK, $$ZI$$Base); |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 161 | |
David Hu | e05b6a6 | 2019-06-12 18:45:28 +0800 | [diff] [blame] | 162 | tfm_arch_set_psplim(psp_stack_bottom); |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 163 | |
Miklos Balint | 6a139ae | 2018-04-04 19:44:37 +0200 | [diff] [blame] | 164 | if (tfm_spm_partition_init() != SPM_ERR_OK) { |
| 165 | /* Certain systems might refuse to boot altogether if partitions fail |
| 166 | * to initialize. This is a placeholder for such an error handler |
| 167 | */ |
| 168 | } |
| 169 | |
Ken Liu | 96714b3 | 2019-04-08 15:10:39 +0800 | [diff] [blame] | 170 | /* |
| 171 | * Prioritise secure exceptions to avoid NS being able to pre-empt |
| 172 | * secure SVC or SecureFault. Do it before PSA API initialization. |
| 173 | */ |
Edison Ai | c1b1090 | 2019-08-26 10:34:19 +0800 | [diff] [blame] | 174 | if (tfm_core_set_secure_exception_priorities() != TFM_SUCCESS) { |
Edison Ai | 9059ea0 | 2019-11-28 13:46:14 +0800 | [diff] [blame] | 175 | tfm_core_panic(); |
Mate Toth-Pal | 5d3ae08 | 2019-07-10 16:14:14 +0200 | [diff] [blame] | 176 | } |
Ken Liu | 96714b3 | 2019-04-08 15:10:39 +0800 | [diff] [blame] | 177 | |
Edison Ai | 4d66dc3 | 2019-02-18 17:58:49 +0800 | [diff] [blame] | 178 | /* We close the TFM_SP_CORE_ID partition, because its only purpose is |
| 179 | * to be able to pass the state checks for the tests started from secure. |
| 180 | */ |
| 181 | tfm_spm_partition_set_state(TFM_SP_CORE_ID, SPM_PARTITION_STATE_CLOSED); |
| 182 | tfm_spm_partition_set_state(TFM_SP_NON_SECURE_ID, |
| 183 | SPM_PARTITION_STATE_RUNNING); |
Edison Ai | 4dcae6f | 2019-03-18 10:13:47 +0800 | [diff] [blame] | 184 | |
| 185 | #ifdef TFM_CORE_DEBUG |
| 186 | /* Jumps to non-secure code */ |
Ken Liu | 81f2d5e | 2019-12-26 11:44:36 +0800 | [diff] [blame] | 187 | LOG_MSG("\033[1;34mJumping to non-secure code...\033[0m\r\n"); |
Edison Ai | 4dcae6f | 2019-03-18 10:13:47 +0800 | [diff] [blame] | 188 | #endif |
| 189 | |
| 190 | jump_to_ns_code(); |
Miklos Balint | 386b8b5 | 2017-11-29 13:12:32 +0000 | [diff] [blame] | 191 | } |