Secure monitor runs at EL3 and is responsible for jumping to the payload at
specified EL and also to manage features like PSCI.
Adding basic implementation of secure monitor as a rmodule. Currently, it just
jumps to the the payload at current EL. Support for switching el and PSCI will
be added as separate patches.
CQ-DEPEND=CL:218300
BUG=chrome-os-partner:30785
BRANCH=None
TEST=Compiles succesfully and secure monitor loads and runs payload on ryu
Change-Id: If0f22299a9bad4e93311154e5546f5bae3f3395c
Signed-off-by: Patrick Georgi <pgeorgi@chromium.org>
Original-Commit-Id: 5e40a21115
Original-Change-Id: I86d5e93583afac141ff61475bd05c8c82d17d926
Original-Signed-off-by: Furquan Shaikh <furquan@google.com>
Original-Reviewed-on: https://chromium-review.googlesource.com/214371
Original-Tested-by: Furquan Shaikh <furquan@chromium.org>
Original-Reviewed-by: Aaron Durbin <adurbin@chromium.org>
Original-Commit-Queue: Furquan Shaikh <furquan@chromium.org>
Reviewed-on: http://review.coreboot.org/9080
Tested-by: build bot (Jenkins)
Reviewed-by: Stefan Reinauer <stefan.reinauer@coreboot.org>
77 lines
2.4 KiB
C
77 lines
2.4 KiB
C
/*
|
|
* This file is part of the coreboot project.
|
|
*
|
|
* Copyright (C) 2003 Eric Biederman
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; version 2 of the License.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*/
|
|
|
|
#ifndef CONSOLE_CONSOLE_H_
|
|
#define CONSOLE_CONSOLE_H_
|
|
|
|
#include <stdint.h>
|
|
#include <rules.h>
|
|
#include <console/post_codes.h>
|
|
#include <console/loglevel.h>
|
|
|
|
#ifndef __ROMCC__
|
|
void post_code(u8 value);
|
|
#if CONFIG_CMOS_POST_EXTRA
|
|
void post_log_extra(u32 value);
|
|
struct device;
|
|
void post_log_path(struct device *dev);
|
|
void post_log_clear(void);
|
|
#else
|
|
#define post_log_extra(x) do {} while (0)
|
|
#define post_log_path(x) do {} while (0)
|
|
#define post_log_clear() do {} while (0)
|
|
#endif
|
|
/* this function is weak and can be overridden by a mainboard function. */
|
|
void mainboard_post(u8 value);
|
|
void __attribute__ ((noreturn)) die(const char *msg);
|
|
|
|
#define __CONSOLE_ENABLE__ \
|
|
((ENV_BOOTBLOCK && CONFIG_BOOTBLOCK_CONSOLE) || \
|
|
ENV_SECMON || \
|
|
ENV_ROMSTAGE || ENV_RAMSTAGE || (ENV_SMM && CONFIG_DEBUG_SMI))
|
|
|
|
#if __CONSOLE_ENABLE__
|
|
void console_init(void);
|
|
int console_log_level(int msg_level);
|
|
int do_printk(int msg_level, const char *fmt, ...) __attribute__((format(printf, 2, 3)));
|
|
void do_putchar(unsigned char byte);
|
|
|
|
#define printk(LEVEL, fmt, args...) \
|
|
do { do_printk(LEVEL, fmt, ##args); } while(0)
|
|
|
|
#else
|
|
static inline void console_init(void) {}
|
|
static inline int console_log_level(int msg_level) { return 0; }
|
|
static inline void printk(int LEVEL, const char *fmt, ...) {}
|
|
static inline void do_putchar(unsigned char byte) {}
|
|
#endif
|
|
|
|
#if CONFIG_CHROMEOS
|
|
/* FIXME: Collision of varargs with AMD headers without guard. */
|
|
#include <console/vtxprintf.h>
|
|
#if __CONSOLE_ENABLE__
|
|
void do_vtxprintf(const char *fmt, va_list args);
|
|
#else
|
|
static inline void do_vtxprintf(const char *fmt, va_list args) {};
|
|
#endif
|
|
#endif
|
|
|
|
#endif /* !__ROMCC__ */
|
|
|
|
#endif /* CONSOLE_CONSOLE_H_ */
|