2014-07-12 13:24:03 +00:00
|
|
|
#ifndef __ASM_SECURE_H
|
|
|
|
#define __ASM_SECURE_H
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
2016-06-19 04:38:41 +00:00
|
|
|
#define __secure __attribute__ ((section ("._secure.text")))
|
2016-07-05 13:45:06 +00:00
|
|
|
#define __secure_data __attribute__ ((section ("._secure.data")))
|
2016-06-19 04:38:41 +00:00
|
|
|
|
2019-02-12 08:27:02 +00:00
|
|
|
#ifndef __ASSEMBLY__
|
|
|
|
|
|
|
|
typedef struct secure_svc_tbl {
|
|
|
|
u32 id;
|
|
|
|
#ifdef CONFIG_ARMV8_PSCI
|
|
|
|
u8 pad[4];
|
|
|
|
#endif
|
|
|
|
void *func;
|
|
|
|
} secure_svc_tbl_t;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Macro to declare a SiP function service in '_secure_svc_tbl_entries' section
|
|
|
|
*/
|
|
|
|
#define DECLARE_SECURE_SVC(_name, _id, _fn) \
|
|
|
|
static const secure_svc_tbl_t __secure_svc_ ## _name \
|
|
|
|
__attribute__((used, section("._secure_svc_tbl_entries"))) \
|
|
|
|
= { \
|
|
|
|
.id = _id, \
|
|
|
|
.func = _fn }
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
|
|
|
#ifdef CONFIG_ARMV8_PSCI
|
|
|
|
#define SECURE_SVC_TBL_OFFSET 16
|
|
|
|
#else
|
|
|
|
#define SECURE_SVC_TBL_OFFSET 8
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif /* __ASSEMBLY__ */
|
|
|
|
|
2016-12-08 03:58:25 +00:00
|
|
|
#if defined(CONFIG_ARMV7_SECURE_BASE) || defined(CONFIG_ARMV8_SECURE_BASE)
|
2014-07-12 13:24:03 +00:00
|
|
|
/*
|
|
|
|
* Warning, horror ahead.
|
|
|
|
*
|
|
|
|
* The target code lives in our "secure ram", but u-boot doesn't know
|
|
|
|
* that, and has blindly added reloc_off to every relocation
|
|
|
|
* entry. Gahh. Do the opposite conversion. This hack also prevents
|
|
|
|
* GCC from generating code veeners, which u-boot doesn't relocate at
|
|
|
|
* all...
|
|
|
|
*/
|
|
|
|
#define secure_ram_addr(_fn) ({ \
|
|
|
|
DECLARE_GLOBAL_DATA_PTR; \
|
|
|
|
void *__fn = _fn; \
|
|
|
|
typeof(_fn) *__tmp = (__fn - gd->reloc_off); \
|
|
|
|
__tmp; \
|
|
|
|
})
|
|
|
|
#else
|
|
|
|
#define secure_ram_addr(_fn) (_fn)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif
|