xref: /rk3399_ARM-atf/bl32/tsp/tsp_main.c (revision 8aabea3358670f26cfa9eb99f8cd935d928f6da0)
17c88f3f6SAchin Gupta /*
2*8aabea33SPaul Beesley  * Copyright (c) 2013-2019, ARM Limited and Contributors. All rights reserved.
37c88f3f6SAchin Gupta  *
482cb2c1aSdp-arm  * SPDX-License-Identifier: BSD-3-Clause
57c88f3f6SAchin Gupta  */
67c88f3f6SAchin Gupta 
75f0cdb05SDan Handley #include <platform_def.h>
809d40e0eSAntonio Nino Diaz 
909d40e0eSAntonio Nino Diaz #include <arch_helpers.h>
1009d40e0eSAntonio Nino Diaz #include <bl32/tsp/tsp.h>
1109d40e0eSAntonio Nino Diaz #include <common/bl_common.h>
1209d40e0eSAntonio Nino Diaz #include <common/debug.h>
1309d40e0eSAntonio Nino Diaz #include <lib/spinlock.h>
1409d40e0eSAntonio Nino Diaz #include <plat/common/platform.h>
155a06bb7eSDan Handley #include <platform_tsp.h>
1609d40e0eSAntonio Nino Diaz 
17da0af78aSDan Handley #include "tsp_private.h"
187c88f3f6SAchin Gupta 
196871c5d3SVikram Kanigiri 
206871c5d3SVikram Kanigiri /*******************************************************************************
217c88f3f6SAchin Gupta  * Lock to control access to the console
227c88f3f6SAchin Gupta  ******************************************************************************/
237c88f3f6SAchin Gupta spinlock_t console_lock;
247c88f3f6SAchin Gupta 
257c88f3f6SAchin Gupta /*******************************************************************************
267c88f3f6SAchin Gupta  * Per cpu data structure to populate parameters for an SMC in C code and use
277c88f3f6SAchin Gupta  * a pointer to this structure in assembler code to populate x0-x7
287c88f3f6SAchin Gupta  ******************************************************************************/
29fb037bfbSDan Handley static tsp_args_t tsp_smc_args[PLATFORM_CORE_COUNT];
307c88f3f6SAchin Gupta 
317c88f3f6SAchin Gupta /*******************************************************************************
327c88f3f6SAchin Gupta  * Per cpu data structure to keep track of TSP activity
337c88f3f6SAchin Gupta  ******************************************************************************/
346cf89021SAchin Gupta work_statistics_t tsp_stats[PLATFORM_CORE_COUNT];
357c88f3f6SAchin Gupta 
367c88f3f6SAchin Gupta /*******************************************************************************
37a604623cSSandrine Bailleux  * The TSP memory footprint starts at address BL32_BASE and ends with the
38a604623cSSandrine Bailleux  * linker symbol __BL32_END__. Use these addresses to compute the TSP image
39a604623cSSandrine Bailleux  * size.
406871c5d3SVikram Kanigiri  ******************************************************************************/
41ab8707e6SSoby Mathew #define BL32_TOTAL_LIMIT (unsigned long)(&__BL32_END__)
42a604623cSSandrine Bailleux #define BL32_TOTAL_SIZE (BL32_TOTAL_LIMIT - (unsigned long) BL32_BASE)
436871c5d3SVikram Kanigiri 
44fb037bfbSDan Handley static tsp_args_t *set_smc_args(uint64_t arg0,
457c88f3f6SAchin Gupta 			     uint64_t arg1,
467c88f3f6SAchin Gupta 			     uint64_t arg2,
477c88f3f6SAchin Gupta 			     uint64_t arg3,
487c88f3f6SAchin Gupta 			     uint64_t arg4,
497c88f3f6SAchin Gupta 			     uint64_t arg5,
507c88f3f6SAchin Gupta 			     uint64_t arg6,
517c88f3f6SAchin Gupta 			     uint64_t arg7)
527c88f3f6SAchin Gupta {
537c88f3f6SAchin Gupta 	uint32_t linear_id;
54fb037bfbSDan Handley 	tsp_args_t *pcpu_smc_args;
557c88f3f6SAchin Gupta 
567c88f3f6SAchin Gupta 	/*
577c88f3f6SAchin Gupta 	 * Return to Secure Monitor by raising an SMC. The results of the
587c88f3f6SAchin Gupta 	 * service are passed as an arguments to the SMC
597c88f3f6SAchin Gupta 	 */
60fd650ff6SSoby Mathew 	linear_id = plat_my_core_pos();
617c88f3f6SAchin Gupta 	pcpu_smc_args = &tsp_smc_args[linear_id];
627c88f3f6SAchin Gupta 	write_sp_arg(pcpu_smc_args, TSP_ARG0, arg0);
637c88f3f6SAchin Gupta 	write_sp_arg(pcpu_smc_args, TSP_ARG1, arg1);
647c88f3f6SAchin Gupta 	write_sp_arg(pcpu_smc_args, TSP_ARG2, arg2);
657c88f3f6SAchin Gupta 	write_sp_arg(pcpu_smc_args, TSP_ARG3, arg3);
667c88f3f6SAchin Gupta 	write_sp_arg(pcpu_smc_args, TSP_ARG4, arg4);
677c88f3f6SAchin Gupta 	write_sp_arg(pcpu_smc_args, TSP_ARG5, arg5);
687c88f3f6SAchin Gupta 	write_sp_arg(pcpu_smc_args, TSP_ARG6, arg6);
697c88f3f6SAchin Gupta 	write_sp_arg(pcpu_smc_args, TSP_ARG7, arg7);
707c88f3f6SAchin Gupta 
717c88f3f6SAchin Gupta 	return pcpu_smc_args;
727c88f3f6SAchin Gupta }
737c88f3f6SAchin Gupta 
747c88f3f6SAchin Gupta /*******************************************************************************
757c88f3f6SAchin Gupta  * TSP main entry point where it gets the opportunity to initialize its secure
767c88f3f6SAchin Gupta  * state/applications. Once the state is initialized, it must return to the
77399fb08fSAndrew Thoelke  * SPD with a pointer to the 'tsp_vector_table' jump table.
787c88f3f6SAchin Gupta  ******************************************************************************/
797c88f3f6SAchin Gupta uint64_t tsp_main(void)
807c88f3f6SAchin Gupta {
816ad2e461SDan Handley 	NOTICE("TSP: %s\n", version_string);
826ad2e461SDan Handley 	NOTICE("TSP: %s\n", build_message);
83a604623cSSandrine Bailleux 	INFO("TSP: Total memory base : 0x%lx\n", (unsigned long) BL32_BASE);
84a604623cSSandrine Bailleux 	INFO("TSP: Total memory size : 0x%lx bytes\n", BL32_TOTAL_SIZE);
856ad2e461SDan Handley 
86fd650ff6SSoby Mathew 	uint32_t linear_id = plat_my_core_pos();
877c88f3f6SAchin Gupta 
887c88f3f6SAchin Gupta 	/* Initialize the platform */
895a06bb7eSDan Handley 	tsp_platform_setup();
907c88f3f6SAchin Gupta 
917c88f3f6SAchin Gupta 	/* Initialize secure/applications state here */
92a20a81e5SAchin Gupta 	tsp_generic_timer_start();
937c88f3f6SAchin Gupta 
947c88f3f6SAchin Gupta 	/* Update this cpu's statistics */
957c88f3f6SAchin Gupta 	tsp_stats[linear_id].smc_count++;
967c88f3f6SAchin Gupta 	tsp_stats[linear_id].eret_count++;
977c88f3f6SAchin Gupta 	tsp_stats[linear_id].cpu_on_count++;
987c88f3f6SAchin Gupta 
996ad2e461SDan Handley #if LOG_LEVEL >= LOG_LEVEL_INFO
1007c88f3f6SAchin Gupta 	spin_lock(&console_lock);
101fd650ff6SSoby Mathew 	INFO("TSP: cpu 0x%lx: %d smcs, %d erets %d cpu on requests\n",
102fd650ff6SSoby Mathew 	     read_mpidr(),
1037c88f3f6SAchin Gupta 	     tsp_stats[linear_id].smc_count,
1047c88f3f6SAchin Gupta 	     tsp_stats[linear_id].eret_count,
1057c88f3f6SAchin Gupta 	     tsp_stats[linear_id].cpu_on_count);
1067c88f3f6SAchin Gupta 	spin_unlock(&console_lock);
1076ad2e461SDan Handley #endif
108399fb08fSAndrew Thoelke 	return (uint64_t) &tsp_vector_table;
1097c88f3f6SAchin Gupta }
1107c88f3f6SAchin Gupta 
1117c88f3f6SAchin Gupta /*******************************************************************************
1127c88f3f6SAchin Gupta  * This function performs any remaining book keeping in the test secure payload
1137c88f3f6SAchin Gupta  * after this cpu's architectural state has been setup in response to an earlier
1147c88f3f6SAchin Gupta  * psci cpu_on request.
1157c88f3f6SAchin Gupta  ******************************************************************************/
116fb037bfbSDan Handley tsp_args_t *tsp_cpu_on_main(void)
1177c88f3f6SAchin Gupta {
118fd650ff6SSoby Mathew 	uint32_t linear_id = plat_my_core_pos();
1197c88f3f6SAchin Gupta 
120a20a81e5SAchin Gupta 	/* Initialize secure/applications state here */
121a20a81e5SAchin Gupta 	tsp_generic_timer_start();
122a20a81e5SAchin Gupta 
1237c88f3f6SAchin Gupta 	/* Update this cpu's statistics */
1247c88f3f6SAchin Gupta 	tsp_stats[linear_id].smc_count++;
1257c88f3f6SAchin Gupta 	tsp_stats[linear_id].eret_count++;
1267c88f3f6SAchin Gupta 	tsp_stats[linear_id].cpu_on_count++;
1277c88f3f6SAchin Gupta 
1286ad2e461SDan Handley #if LOG_LEVEL >= LOG_LEVEL_INFO
1297c88f3f6SAchin Gupta 	spin_lock(&console_lock);
130fd650ff6SSoby Mathew 	INFO("TSP: cpu 0x%lx turned on\n", read_mpidr());
131fd650ff6SSoby Mathew 	INFO("TSP: cpu 0x%lx: %d smcs, %d erets %d cpu on requests\n",
132fd650ff6SSoby Mathew 		read_mpidr(),
1337c88f3f6SAchin Gupta 		tsp_stats[linear_id].smc_count,
1347c88f3f6SAchin Gupta 		tsp_stats[linear_id].eret_count,
1357c88f3f6SAchin Gupta 		tsp_stats[linear_id].cpu_on_count);
1367c88f3f6SAchin Gupta 	spin_unlock(&console_lock);
1376ad2e461SDan Handley #endif
1387c88f3f6SAchin Gupta 	/* Indicate to the SPD that we have completed turned ourselves on */
1397c88f3f6SAchin Gupta 	return set_smc_args(TSP_ON_DONE, 0, 0, 0, 0, 0, 0, 0);
1407c88f3f6SAchin Gupta }
1417c88f3f6SAchin Gupta 
1427c88f3f6SAchin Gupta /*******************************************************************************
1437c88f3f6SAchin Gupta  * This function performs any remaining book keeping in the test secure payload
1447c88f3f6SAchin Gupta  * before this cpu is turned off in response to a psci cpu_off request.
1457c88f3f6SAchin Gupta  ******************************************************************************/
146fb037bfbSDan Handley tsp_args_t *tsp_cpu_off_main(uint64_t arg0,
1477c88f3f6SAchin Gupta 			   uint64_t arg1,
1487c88f3f6SAchin Gupta 			   uint64_t arg2,
1497c88f3f6SAchin Gupta 			   uint64_t arg3,
1507c88f3f6SAchin Gupta 			   uint64_t arg4,
1517c88f3f6SAchin Gupta 			   uint64_t arg5,
1527c88f3f6SAchin Gupta 			   uint64_t arg6,
1537c88f3f6SAchin Gupta 			   uint64_t arg7)
1547c88f3f6SAchin Gupta {
155fd650ff6SSoby Mathew 	uint32_t linear_id = plat_my_core_pos();
1567c88f3f6SAchin Gupta 
157a20a81e5SAchin Gupta 	/*
158a20a81e5SAchin Gupta 	 * This cpu is being turned off, so disable the timer to prevent the
159a20a81e5SAchin Gupta 	 * secure timer interrupt from interfering with power down. A pending
160a20a81e5SAchin Gupta 	 * interrupt will be lost but we do not care as we are turning off.
161a20a81e5SAchin Gupta 	 */
162a20a81e5SAchin Gupta 	tsp_generic_timer_stop();
163a20a81e5SAchin Gupta 
1647c88f3f6SAchin Gupta 	/* Update this cpu's statistics */
1657c88f3f6SAchin Gupta 	tsp_stats[linear_id].smc_count++;
1667c88f3f6SAchin Gupta 	tsp_stats[linear_id].eret_count++;
1677c88f3f6SAchin Gupta 	tsp_stats[linear_id].cpu_off_count++;
1687c88f3f6SAchin Gupta 
1696ad2e461SDan Handley #if LOG_LEVEL >= LOG_LEVEL_INFO
1707c88f3f6SAchin Gupta 	spin_lock(&console_lock);
171fd650ff6SSoby Mathew 	INFO("TSP: cpu 0x%lx off request\n", read_mpidr());
172fd650ff6SSoby Mathew 	INFO("TSP: cpu 0x%lx: %d smcs, %d erets %d cpu off requests\n",
173fd650ff6SSoby Mathew 		read_mpidr(),
1747c88f3f6SAchin Gupta 		tsp_stats[linear_id].smc_count,
1757c88f3f6SAchin Gupta 		tsp_stats[linear_id].eret_count,
1767c88f3f6SAchin Gupta 		tsp_stats[linear_id].cpu_off_count);
1777c88f3f6SAchin Gupta 	spin_unlock(&console_lock);
1786ad2e461SDan Handley #endif
1797c88f3f6SAchin Gupta 
180607084eeSAchin Gupta 	/* Indicate to the SPD that we have completed this request */
1817c88f3f6SAchin Gupta 	return set_smc_args(TSP_OFF_DONE, 0, 0, 0, 0, 0, 0, 0);
1827c88f3f6SAchin Gupta }
1837c88f3f6SAchin Gupta 
1847c88f3f6SAchin Gupta /*******************************************************************************
1857c88f3f6SAchin Gupta  * This function performs any book keeping in the test secure payload before
1867c88f3f6SAchin Gupta  * this cpu's architectural state is saved in response to an earlier psci
1877c88f3f6SAchin Gupta  * cpu_suspend request.
1887c88f3f6SAchin Gupta  ******************************************************************************/
18931244d74SSoby Mathew tsp_args_t *tsp_cpu_suspend_main(uint64_t arg0,
1907c88f3f6SAchin Gupta 			       uint64_t arg1,
1917c88f3f6SAchin Gupta 			       uint64_t arg2,
1927c88f3f6SAchin Gupta 			       uint64_t arg3,
1937c88f3f6SAchin Gupta 			       uint64_t arg4,
1947c88f3f6SAchin Gupta 			       uint64_t arg5,
1957c88f3f6SAchin Gupta 			       uint64_t arg6,
1967c88f3f6SAchin Gupta 			       uint64_t arg7)
1977c88f3f6SAchin Gupta {
198fd650ff6SSoby Mathew 	uint32_t linear_id = plat_my_core_pos();
1997c88f3f6SAchin Gupta 
200a20a81e5SAchin Gupta 	/*
201a20a81e5SAchin Gupta 	 * Save the time context and disable it to prevent the secure timer
202a20a81e5SAchin Gupta 	 * interrupt from interfering with wakeup from the suspend state.
203a20a81e5SAchin Gupta 	 */
204a20a81e5SAchin Gupta 	tsp_generic_timer_save();
205a20a81e5SAchin Gupta 	tsp_generic_timer_stop();
206a20a81e5SAchin Gupta 
2077c88f3f6SAchin Gupta 	/* Update this cpu's statistics */
2087c88f3f6SAchin Gupta 	tsp_stats[linear_id].smc_count++;
2097c88f3f6SAchin Gupta 	tsp_stats[linear_id].eret_count++;
2107c88f3f6SAchin Gupta 	tsp_stats[linear_id].cpu_suspend_count++;
2117c88f3f6SAchin Gupta 
2126ad2e461SDan Handley #if LOG_LEVEL >= LOG_LEVEL_INFO
2137c88f3f6SAchin Gupta 	spin_lock(&console_lock);
214dad25049SSandrine Bailleux 	INFO("TSP: cpu 0x%lx: %d smcs, %d erets %d cpu suspend requests\n",
215fd650ff6SSoby Mathew 		read_mpidr(),
2167c88f3f6SAchin Gupta 		tsp_stats[linear_id].smc_count,
2177c88f3f6SAchin Gupta 		tsp_stats[linear_id].eret_count,
2187c88f3f6SAchin Gupta 		tsp_stats[linear_id].cpu_suspend_count);
2197c88f3f6SAchin Gupta 	spin_unlock(&console_lock);
2206ad2e461SDan Handley #endif
2217c88f3f6SAchin Gupta 
222607084eeSAchin Gupta 	/* Indicate to the SPD that we have completed this request */
2237c88f3f6SAchin Gupta 	return set_smc_args(TSP_SUSPEND_DONE, 0, 0, 0, 0, 0, 0, 0);
2247c88f3f6SAchin Gupta }
2257c88f3f6SAchin Gupta 
2267c88f3f6SAchin Gupta /*******************************************************************************
2277c88f3f6SAchin Gupta  * This function performs any book keeping in the test secure payload after this
2287c88f3f6SAchin Gupta  * cpu's architectural state has been restored after wakeup from an earlier psci
2297c88f3f6SAchin Gupta  * cpu_suspend request.
2307c88f3f6SAchin Gupta  ******************************************************************************/
231f1054c93SAchin Gupta tsp_args_t *tsp_cpu_resume_main(uint64_t max_off_pwrlvl,
2327c88f3f6SAchin Gupta 			      uint64_t arg1,
2337c88f3f6SAchin Gupta 			      uint64_t arg2,
2347c88f3f6SAchin Gupta 			      uint64_t arg3,
2357c88f3f6SAchin Gupta 			      uint64_t arg4,
2367c88f3f6SAchin Gupta 			      uint64_t arg5,
2377c88f3f6SAchin Gupta 			      uint64_t arg6,
2387c88f3f6SAchin Gupta 			      uint64_t arg7)
2397c88f3f6SAchin Gupta {
240fd650ff6SSoby Mathew 	uint32_t linear_id = plat_my_core_pos();
2417c88f3f6SAchin Gupta 
242a20a81e5SAchin Gupta 	/* Restore the generic timer context */
243a20a81e5SAchin Gupta 	tsp_generic_timer_restore();
244a20a81e5SAchin Gupta 
2457c88f3f6SAchin Gupta 	/* Update this cpu's statistics */
2467c88f3f6SAchin Gupta 	tsp_stats[linear_id].smc_count++;
2477c88f3f6SAchin Gupta 	tsp_stats[linear_id].eret_count++;
2487c88f3f6SAchin Gupta 	tsp_stats[linear_id].cpu_resume_count++;
2497c88f3f6SAchin Gupta 
2506ad2e461SDan Handley #if LOG_LEVEL >= LOG_LEVEL_INFO
2517c88f3f6SAchin Gupta 	spin_lock(&console_lock);
2520a2d5b43SMasahiro Yamada 	INFO("TSP: cpu 0x%lx resumed. maximum off power level %lld\n",
253f1054c93SAchin Gupta 	     read_mpidr(), max_off_pwrlvl);
254dad25049SSandrine Bailleux 	INFO("TSP: cpu 0x%lx: %d smcs, %d erets %d cpu suspend requests\n",
255fd650ff6SSoby Mathew 		read_mpidr(),
2567c88f3f6SAchin Gupta 		tsp_stats[linear_id].smc_count,
2577c88f3f6SAchin Gupta 		tsp_stats[linear_id].eret_count,
2587c88f3f6SAchin Gupta 		tsp_stats[linear_id].cpu_suspend_count);
2597c88f3f6SAchin Gupta 	spin_unlock(&console_lock);
2606ad2e461SDan Handley #endif
261607084eeSAchin Gupta 	/* Indicate to the SPD that we have completed this request */
2627c88f3f6SAchin Gupta 	return set_smc_args(TSP_RESUME_DONE, 0, 0, 0, 0, 0, 0, 0);
2637c88f3f6SAchin Gupta }
2647c88f3f6SAchin Gupta 
2657c88f3f6SAchin Gupta /*******************************************************************************
266d5f13093SJuan Castillo  * This function performs any remaining bookkeeping in the test secure payload
267d5f13093SJuan Castillo  * before the system is switched off (in response to a psci SYSTEM_OFF request)
268d5f13093SJuan Castillo  ******************************************************************************/
269d5f13093SJuan Castillo tsp_args_t *tsp_system_off_main(uint64_t arg0,
270d5f13093SJuan Castillo 				uint64_t arg1,
271d5f13093SJuan Castillo 				uint64_t arg2,
272d5f13093SJuan Castillo 				uint64_t arg3,
273d5f13093SJuan Castillo 				uint64_t arg4,
274d5f13093SJuan Castillo 				uint64_t arg5,
275d5f13093SJuan Castillo 				uint64_t arg6,
276d5f13093SJuan Castillo 				uint64_t arg7)
277d5f13093SJuan Castillo {
278fd650ff6SSoby Mathew 	uint32_t linear_id = plat_my_core_pos();
279d5f13093SJuan Castillo 
280d5f13093SJuan Castillo 	/* Update this cpu's statistics */
281d5f13093SJuan Castillo 	tsp_stats[linear_id].smc_count++;
282d5f13093SJuan Castillo 	tsp_stats[linear_id].eret_count++;
283d5f13093SJuan Castillo 
284d5f13093SJuan Castillo #if LOG_LEVEL >= LOG_LEVEL_INFO
285d5f13093SJuan Castillo 	spin_lock(&console_lock);
286fd650ff6SSoby Mathew 	INFO("TSP: cpu 0x%lx SYSTEM_OFF request\n", read_mpidr());
287fd650ff6SSoby Mathew 	INFO("TSP: cpu 0x%lx: %d smcs, %d erets requests\n", read_mpidr(),
288d5f13093SJuan Castillo 	     tsp_stats[linear_id].smc_count,
289d5f13093SJuan Castillo 	     tsp_stats[linear_id].eret_count);
290d5f13093SJuan Castillo 	spin_unlock(&console_lock);
291d5f13093SJuan Castillo #endif
292d5f13093SJuan Castillo 
293d5f13093SJuan Castillo 	/* Indicate to the SPD that we have completed this request */
294d5f13093SJuan Castillo 	return set_smc_args(TSP_SYSTEM_OFF_DONE, 0, 0, 0, 0, 0, 0, 0);
295d5f13093SJuan Castillo }
296d5f13093SJuan Castillo 
297d5f13093SJuan Castillo /*******************************************************************************
298d5f13093SJuan Castillo  * This function performs any remaining bookkeeping in the test secure payload
299d5f13093SJuan Castillo  * before the system is reset (in response to a psci SYSTEM_RESET request)
300d5f13093SJuan Castillo  ******************************************************************************/
301d5f13093SJuan Castillo tsp_args_t *tsp_system_reset_main(uint64_t arg0,
302d5f13093SJuan Castillo 				uint64_t arg1,
303d5f13093SJuan Castillo 				uint64_t arg2,
304d5f13093SJuan Castillo 				uint64_t arg3,
305d5f13093SJuan Castillo 				uint64_t arg4,
306d5f13093SJuan Castillo 				uint64_t arg5,
307d5f13093SJuan Castillo 				uint64_t arg6,
308d5f13093SJuan Castillo 				uint64_t arg7)
309d5f13093SJuan Castillo {
310fd650ff6SSoby Mathew 	uint32_t linear_id = plat_my_core_pos();
311d5f13093SJuan Castillo 
312d5f13093SJuan Castillo 	/* Update this cpu's statistics */
313d5f13093SJuan Castillo 	tsp_stats[linear_id].smc_count++;
314d5f13093SJuan Castillo 	tsp_stats[linear_id].eret_count++;
315d5f13093SJuan Castillo 
316d5f13093SJuan Castillo #if LOG_LEVEL >= LOG_LEVEL_INFO
317d5f13093SJuan Castillo 	spin_lock(&console_lock);
318fd650ff6SSoby Mathew 	INFO("TSP: cpu 0x%lx SYSTEM_RESET request\n", read_mpidr());
319fd650ff6SSoby Mathew 	INFO("TSP: cpu 0x%lx: %d smcs, %d erets requests\n", read_mpidr(),
320d5f13093SJuan Castillo 	     tsp_stats[linear_id].smc_count,
321d5f13093SJuan Castillo 	     tsp_stats[linear_id].eret_count);
322d5f13093SJuan Castillo 	spin_unlock(&console_lock);
323d5f13093SJuan Castillo #endif
324d5f13093SJuan Castillo 
325d5f13093SJuan Castillo 	/* Indicate to the SPD that we have completed this request */
326d5f13093SJuan Castillo 	return set_smc_args(TSP_SYSTEM_RESET_DONE, 0, 0, 0, 0, 0, 0, 0);
327d5f13093SJuan Castillo }
328d5f13093SJuan Castillo 
329d5f13093SJuan Castillo /*******************************************************************************
3307c88f3f6SAchin Gupta  * TSP fast smc handler. The secure monitor jumps to this function by
3317c88f3f6SAchin Gupta  * doing the ERET after populating X0-X7 registers. The arguments are received
3327c88f3f6SAchin Gupta  * in the function arguments in order. Once the service is rendered, this
333239b04faSSoby Mathew  * function returns to Secure Monitor by raising SMC.
3347c88f3f6SAchin Gupta  ******************************************************************************/
335239b04faSSoby Mathew tsp_args_t *tsp_smc_handler(uint64_t func,
3367c88f3f6SAchin Gupta 			       uint64_t arg1,
3377c88f3f6SAchin Gupta 			       uint64_t arg2,
3387c88f3f6SAchin Gupta 			       uint64_t arg3,
3397c88f3f6SAchin Gupta 			       uint64_t arg4,
3407c88f3f6SAchin Gupta 			       uint64_t arg5,
3417c88f3f6SAchin Gupta 			       uint64_t arg6,
3427c88f3f6SAchin Gupta 			       uint64_t arg7)
3437c88f3f6SAchin Gupta {
344916a2c1eSAchin Gupta 	uint64_t results[2];
345916a2c1eSAchin Gupta 	uint64_t service_args[2];
346fd650ff6SSoby Mathew 	uint32_t linear_id = plat_my_core_pos();
3477c88f3f6SAchin Gupta 
348916a2c1eSAchin Gupta 	/* Update this cpu's statistics */
349916a2c1eSAchin Gupta 	tsp_stats[linear_id].smc_count++;
350916a2c1eSAchin Gupta 	tsp_stats[linear_id].eret_count++;
3517c88f3f6SAchin Gupta 
3520a2d5b43SMasahiro Yamada 	INFO("TSP: cpu 0x%lx received %s smc 0x%llx\n", read_mpidr(),
35316292f54SDavid Cunado 		((func >> 31) & 1) == 1 ? "fast" : "yielding",
3546ad2e461SDan Handley 		func);
355fd650ff6SSoby Mathew 	INFO("TSP: cpu 0x%lx: %d smcs, %d erets\n", read_mpidr(),
356916a2c1eSAchin Gupta 		tsp_stats[linear_id].smc_count,
357916a2c1eSAchin Gupta 		tsp_stats[linear_id].eret_count);
358916a2c1eSAchin Gupta 
359916a2c1eSAchin Gupta 	/* Render secure services and obtain results here */
3607c88f3f6SAchin Gupta 	results[0] = arg1;
3617c88f3f6SAchin Gupta 	results[1] = arg2;
3627c88f3f6SAchin Gupta 
3637c88f3f6SAchin Gupta 	/*
3647c88f3f6SAchin Gupta 	 * Request a service back from dispatcher/secure monitor. This call
365*8aabea33SPaul Beesley 	 * return and thereafter resume execution
3667c88f3f6SAchin Gupta 	 */
3677c88f3f6SAchin Gupta 	tsp_get_magic(service_args);
3687c88f3f6SAchin Gupta 
3697c88f3f6SAchin Gupta 	/* Determine the function to perform based on the function ID */
370239b04faSSoby Mathew 	switch (TSP_BARE_FID(func)) {
371239b04faSSoby Mathew 	case TSP_ADD:
3727c88f3f6SAchin Gupta 		results[0] += service_args[0];
3737c88f3f6SAchin Gupta 		results[1] += service_args[1];
3747c88f3f6SAchin Gupta 		break;
375239b04faSSoby Mathew 	case TSP_SUB:
3767c88f3f6SAchin Gupta 		results[0] -= service_args[0];
3777c88f3f6SAchin Gupta 		results[1] -= service_args[1];
3787c88f3f6SAchin Gupta 		break;
379239b04faSSoby Mathew 	case TSP_MUL:
3807c88f3f6SAchin Gupta 		results[0] *= service_args[0];
3817c88f3f6SAchin Gupta 		results[1] *= service_args[1];
3827c88f3f6SAchin Gupta 		break;
383239b04faSSoby Mathew 	case TSP_DIV:
3847c88f3f6SAchin Gupta 		results[0] /= service_args[0] ? service_args[0] : 1;
3857c88f3f6SAchin Gupta 		results[1] /= service_args[1] ? service_args[1] : 1;
3867c88f3f6SAchin Gupta 		break;
3877c88f3f6SAchin Gupta 	default:
3887c88f3f6SAchin Gupta 		break;
3897c88f3f6SAchin Gupta 	}
3907c88f3f6SAchin Gupta 
391239b04faSSoby Mathew 	return set_smc_args(func, 0,
3927c88f3f6SAchin Gupta 			    results[0],
3937c88f3f6SAchin Gupta 			    results[1],
394239b04faSSoby Mathew 			    0, 0, 0, 0);
3957c88f3f6SAchin Gupta }
3967c88f3f6SAchin Gupta 
3973df6012aSDouglas Raillard /*******************************************************************************
398*8aabea33SPaul Beesley  * TSP smc abort handler. This function is called when aborting a preempted
39916292f54SDavid Cunado  * yielding SMC request. It should cleanup all resources owned by the SMC
4003df6012aSDouglas Raillard  * handler such as locks or dynamically allocated memory so following SMC
4013df6012aSDouglas Raillard  * request are executed in a clean environment.
4023df6012aSDouglas Raillard  ******************************************************************************/
4033df6012aSDouglas Raillard tsp_args_t *tsp_abort_smc_handler(uint64_t func,
4043df6012aSDouglas Raillard 				  uint64_t arg1,
4053df6012aSDouglas Raillard 				  uint64_t arg2,
4063df6012aSDouglas Raillard 				  uint64_t arg3,
4073df6012aSDouglas Raillard 				  uint64_t arg4,
4083df6012aSDouglas Raillard 				  uint64_t arg5,
4093df6012aSDouglas Raillard 				  uint64_t arg6,
4103df6012aSDouglas Raillard 				  uint64_t arg7)
4113df6012aSDouglas Raillard {
4123df6012aSDouglas Raillard 	return set_smc_args(TSP_ABORT_DONE, 0, 0, 0, 0, 0, 0, 0);
4133df6012aSDouglas Raillard }
414