[U-Boot] [PATCH v4] arm64: Add SMC and HVC commands

Michalis Pappas mpappas at fastmail.fm
Wed Apr 25 12:54:19 UTC 2018


On 04/13/2018 10:40 AM, Michalis Pappas wrote:
> This patch adds smc and hvc commands, that allow issuing Secure Monitor
> Calls and Hypervisor Calls conforming to the ARM SMC Calling Convention.
>
> Add Kconfig items to allow each command can be individually enabled.
>
> Signed-off-by: Michalis Pappas <mpappas at fastmail.fm>
> ---
>
> Changes for v2:
>    - Update help message with additional information on usefulness
>    - Remove default=n from Kconfig
>
> Changes for v3:
>    - Replace dependency on ARM64 with ARM_SMCCC in Kconfig
>
> Changes for v4:
>    - Add list of changes
>
>   cmd/Kconfig  | 14 ++++++++++
>   cmd/Makefile |  2 ++
>   cmd/smccc.c  | 72 ++++++++++++++++++++++++++++++++++++++++++++++++++++
>   3 files changed, 88 insertions(+)
>   create mode 100644 cmd/smccc.c
>
> diff --git a/cmd/Kconfig b/cmd/Kconfig
> index 136836d146..2176b98ccb 100644
> --- a/cmd/Kconfig
> +++ b/cmd/Kconfig
> @@ -1348,6 +1348,20 @@ config CMD_HASH
>   	  saved to memory or to an environment variable. It is also possible
>   	  to verify a hash against data in memory.
>
> +config CMD_HVC
> +	bool "Support the 'hvc' command"
> +	depends on ARM_SMCCC
> +	help
> +	  Allows issuing Hypervisor Calls (HVCs). Mostly useful for
> +	  development and testing.
> +
> +config CMD_SMC
> +	bool "Support the 'smc' command"
> +	depends on ARM_SMCCC
> +	help
> +	  Allows issuing Secure Monitor Calls (SMCs). Mostly useful for
> +	  development and testing.
> +
>   config HASH_VERIFY
>   	bool "hash -v"
>   	depends on CMD_HASH
> diff --git a/cmd/Makefile b/cmd/Makefile
> index 9a358e4801..5656a1a40a 100644
> --- a/cmd/Makefile
> +++ b/cmd/Makefile
> @@ -61,6 +61,7 @@ obj-$(CONFIG_CMD_FS_GENERIC) += fs.o
>   obj-$(CONFIG_CMD_FUSE) += fuse.o
>   obj-$(CONFIG_CMD_GETTIME) += gettime.o
>   obj-$(CONFIG_CMD_GPIO) += gpio.o
> +obj-$(CONFIG_CMD_HVC) += smccc.o
>   obj-$(CONFIG_CMD_I2C) += i2c.o
>   obj-$(CONFIG_CMD_IOTRACE) += iotrace.o
>   obj-$(CONFIG_CMD_HASH) += hash.o
> @@ -113,6 +114,7 @@ obj-$(CONFIG_CMD_SHA1SUM) += sha1sum.o
>   obj-$(CONFIG_CMD_SETEXPR) += setexpr.o
>   obj-$(CONFIG_CMD_SPI) += spi.o
>   obj-$(CONFIG_CMD_STRINGS) += strings.o
> +obj-$(CONFIG_CMD_SMC) += smccc.o
>   obj-$(CONFIG_CMD_TERMINAL) += terminal.o
>   obj-$(CONFIG_CMD_TIME) += time.o
>   obj-$(CONFIG_CMD_TRACE) += trace.o
> diff --git a/cmd/smccc.c b/cmd/smccc.c
> new file mode 100644
> index 0000000000..2fa7c23999
> --- /dev/null
> +++ b/cmd/smccc.c
> @@ -0,0 +1,72 @@
> +/*
> + * Copyright 2018
> + * Michalis Pappas <mpappas at fastmail.fm>
> + *
> + * SPDX-License-Identifier:	GPL-2.0+
> + */
> +#include <asm/psci.h>
> +#include <common.h>
> +#include <command.h>
> +#include <linux/arm-smccc.h>
> +#include <linux/compiler.h>
> +#include <linux/psci.h>
> +
> +static int do_call(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
> +{
> +	struct arm_smccc_res res;
> +
> +	unsigned long fid;
> +
> +	unsigned long a1;
> +	unsigned long a2;
> +	unsigned long a3;
> +	unsigned long a4;
> +	unsigned long a5;
> +	unsigned long a6;
> +	unsigned long a7;
> +
> +	if (argc < 2)
> +		return CMD_RET_USAGE;
> +
> +	fid = simple_strtoul(argv[1], NULL, 16);
> +
> +	a1 = argc > 2 ? simple_strtoul(argv[2], NULL, 16) : 0;
> +	a2 = argc > 3 ? simple_strtoul(argv[3], NULL, 16) : 0;
> +	a3 = argc > 4 ? simple_strtoul(argv[4], NULL, 16) : 0;
> +	a4 = argc > 5 ? simple_strtoul(argv[5], NULL, 16) : 0;
> +	a5 = argc > 6 ? simple_strtoul(argv[6], NULL, 16) : 0;
> +	a6 = argc > 7 ? simple_strtoul(argv[7], NULL, 16) : 0;
> +	a7 = argc > 8 ? simple_strtoul(argv[8], NULL, 16) : 0;
> +
> +	if (!strcmp(argv[0], "smc"))
> +		arm_smccc_smc(fid, a1, a2, a3, a4, a5, a6, a7, &res);
> +	else
> +		arm_smccc_hvc(fid, a1, a2, a3, a4, a5, a6, a7, &res);
> +
> +	printf("Res:  %ld %ld %ld %ld\n", res.a0, res.a1, res.a2, res.a3);
> +
> +	return 0;
> +}
> +
> +#ifdef CONFIG_CMD_SMC
> +U_BOOT_CMD(
> +	smc,	8,		2,	do_call,
> +	"Issue a Secure Monitor Call",
> +	"<fid> [arg1 ... arg6] [id]\n"
> +	"  - fid Function ID\n"
> +	"  - arg SMC arguments, passed to X1-X6 (default to zero)\n"
> +	"  - id  Secure OS ID / Session ID, passed to W7 (defaults to zero)\n"
> +);
> +#endif
> +
> +#ifdef CONFIG_CMD_HVC
> +U_BOOT_CMD(
> +	hvc,	8,		2,	do_call,
> +	"Issue a Hypervisor Call",
> +	"<fid> [arg1...arg7] [id]\n"
> +	"  - fid Function ID\n"
> +	"  - arg HVC arguments, passed to X1-X6 (default to zero)\n"
> +	"  - id  Session ID, passed to W7 (defaults to zero)\n"
> +);
> +#endif
> +
> --
> 2.17.0
>

Hi,

all review comments have been satsified, happy to merge this one?

Thanks,

Michalis


More information about the U-Boot mailing list