mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-18 18:44:22 +00:00

This corrects the MISRA violation C2012-15.6: The body of an iteration-statement or a selection-statement shall be a compound-statement. Enclosed statement body within the curly braces. Change-Id: I8941f3c713586c36396e1f3731b99ffadc28c6e8 Signed-off-by: Nithin G <nithing@amd.com> Signed-off-by: Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>
147 lines
4 KiB
C
147 lines
4 KiB
C
/*
|
|
* Copyright (c) 2017-2019, Arm Limited and Contributors. All rights reserved.
|
|
* Copyright (c) 2022-2023, Advanced Micro Devices, Inc. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
/*
|
|
* Top-level SMC handler for ZynqMP IPI Mailbox doorbell functions.
|
|
*/
|
|
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
|
|
#include <common/debug.h>
|
|
#include <common/runtime_svc.h>
|
|
#include <lib/bakery_lock.h>
|
|
#include <lib/mmio.h>
|
|
|
|
#include <ipi.h>
|
|
#include "ipi_mailbox_svc.h"
|
|
#include <plat_ipi.h>
|
|
#include <plat_private.h>
|
|
|
|
/*********************************************************************
|
|
* Macros definitions
|
|
********************************************************************/
|
|
|
|
/* IPI SMC calls macros: */
|
|
#define IPI_SMC_OPEN_IRQ_MASK 0x00000001U /* IRQ enable bit in IPI
|
|
* open SMC call
|
|
*/
|
|
#define IPI_SMC_NOTIFY_BLOCK_MASK 0x00000001U /* Flag to indicate if
|
|
* IPI notification needs
|
|
* to be blocking.
|
|
*/
|
|
#define IPI_SMC_ENQUIRY_DIRQ_MASK 0x00000001U /* Flag to indicate if
|
|
* notification interrupt
|
|
* to be disabled.
|
|
*/
|
|
#define IPI_SMC_ACK_EIRQ_MASK 0x00000001U /* Flag to indicate if
|
|
* notification interrupt
|
|
* to be enable.
|
|
*/
|
|
|
|
#define UNSIGNED32_MASK 0xFFFFFFFFU /* 32bit mask */
|
|
|
|
/**
|
|
* ipi_smc_handler() - SMC handler for IPI SMC calls.
|
|
* @smc_fid: Function identifier.
|
|
* @x1: Arguments.
|
|
* @x2: Arguments.
|
|
* @x3: Arguments.
|
|
* @x4: Arguments.
|
|
* @cookie: Unused.
|
|
* @handle: Pointer to caller's context structure.
|
|
* @flags: SECURE_FLAG or NON_SECURE_FLAG.
|
|
*
|
|
* Return: Unused.
|
|
*
|
|
* Determines that smc_fid is valid and supported PM SMC Function ID from the
|
|
* list of pm_api_ids, otherwise completes the request with
|
|
* the unknown SMC Function ID.
|
|
*
|
|
* The SMC calls for PM service are forwarded from SIP Service SMC handler
|
|
* function with rt_svc_handle signature.
|
|
*
|
|
*/
|
|
uint64_t ipi_smc_handler(uint32_t smc_fid, uint64_t x1, uint64_t x2,
|
|
uint64_t x3, uint64_t x4, const void *cookie,
|
|
void *handle, uint64_t flags)
|
|
{
|
|
(void) x4;
|
|
(void) flags;
|
|
(void) cookie;
|
|
int32_t ret;
|
|
uint32_t ipi_local_id;
|
|
uint32_t ipi_remote_id;
|
|
uint32_t is_secure;
|
|
|
|
ipi_local_id = (uint32_t)(x1 & UNSIGNED32_MASK);
|
|
ipi_remote_id = (uint32_t)(x2 & UNSIGNED32_MASK);
|
|
|
|
/* OEN Number 48 to 63 is for Trusted App and OS
|
|
* GET_SMC_OEN limits the return value of OEN number to 63 by bitwise
|
|
* AND operation with 0x3F.
|
|
* Upper limit check for OEN value is not required.
|
|
*/
|
|
if (GET_SMC_OEN(smc_fid) >= OEN_TAP_START) {
|
|
is_secure = 1;
|
|
} else {
|
|
is_secure = 0;
|
|
}
|
|
|
|
/* Validate IPI mailbox access */
|
|
ret = ipi_mb_validate(ipi_local_id, ipi_remote_id, is_secure);
|
|
if (ret != 0)
|
|
SMC_RET1(handle, ret);
|
|
|
|
switch (GET_SMC_NUM(smc_fid)) {
|
|
case IPI_MAILBOX_OPEN:
|
|
ipi_mb_open(ipi_local_id, ipi_remote_id);
|
|
SMC_RET1(handle, 0);
|
|
case IPI_MAILBOX_RELEASE:
|
|
ipi_mb_release(ipi_local_id, ipi_remote_id);
|
|
SMC_RET1(handle, 0);
|
|
case IPI_MAILBOX_STATUS_ENQUIRY:
|
|
{
|
|
bool disable_interrupt;
|
|
|
|
disable_interrupt = ((x3 & IPI_SMC_ENQUIRY_DIRQ_MASK) != 0U);
|
|
ret = ipi_mb_enquire_status(ipi_local_id, ipi_remote_id);
|
|
if ((((uint32_t)ret & IPI_MB_STATUS_RECV_PENDING) > 0U) && disable_interrupt) {
|
|
ipi_mb_disable_irq(ipi_local_id, ipi_remote_id);
|
|
}
|
|
SMC_RET1(handle, ret);
|
|
}
|
|
case IPI_MAILBOX_NOTIFY:
|
|
{
|
|
uint32_t is_blocking;
|
|
|
|
is_blocking = ((x3 & IPI_SMC_NOTIFY_BLOCK_MASK) != 0U);
|
|
ipi_mb_notify(ipi_local_id, ipi_remote_id, is_blocking);
|
|
SMC_RET1(handle, 0);
|
|
}
|
|
case IPI_MAILBOX_ACK:
|
|
{
|
|
bool enable_interrupt;
|
|
|
|
enable_interrupt = ((x3 & IPI_SMC_ACK_EIRQ_MASK) != 0U);
|
|
ipi_mb_ack(ipi_local_id, ipi_remote_id);
|
|
if (enable_interrupt != 0) {
|
|
ipi_mb_enable_irq(ipi_local_id, ipi_remote_id);
|
|
}
|
|
SMC_RET1(handle, 0);
|
|
}
|
|
case IPI_MAILBOX_ENABLE_IRQ:
|
|
ipi_mb_enable_irq(ipi_local_id, ipi_remote_id);
|
|
SMC_RET1(handle, 0);
|
|
case IPI_MAILBOX_DISABLE_IRQ:
|
|
ipi_mb_disable_irq(ipi_local_id, ipi_remote_id);
|
|
SMC_RET1(handle, 0);
|
|
default:
|
|
WARN("Unimplemented IPI service call: 0x%x\n", smc_fid);
|
|
SMC_RET1(handle, SMC_UNK);
|
|
}
|
|
}
|