177c27753SZelalem Aweke /* 2*42cf6026SJuan Pablo Conde * Copyright (c) 2021-2024, Arm Limited and Contributors. All rights reserved. 377c27753SZelalem Aweke * 477c27753SZelalem Aweke * SPDX-License-Identifier: BSD-3-Clause 577c27753SZelalem Aweke */ 677c27753SZelalem Aweke 777c27753SZelalem Aweke #ifndef RMMD_SVC_H 877c27753SZelalem Aweke #define RMMD_SVC_H 977c27753SZelalem Aweke 10319fb084SSoby Mathew #include <lib/smccc.h> 11319fb084SSoby Mathew #include <lib/utils_def.h> 12319fb084SSoby Mathew 13fb00dc4aSSubhasish Ghosh /* STD calls FNUM Min/Max ranges */ 14319fb084SSoby Mathew #define RMI_FNUM_MIN_VALUE U(0x150) 15319fb084SSoby Mathew #define RMI_FNUM_MAX_VALUE U(0x18F) 16319fb084SSoby Mathew 17fb00dc4aSSubhasish Ghosh /* Construct RMI fastcall std FID from offset */ 18fb00dc4aSSubhasish Ghosh #define SMC64_RMI_FID(_offset) \ 19fb00dc4aSSubhasish Ghosh ((SMC_TYPE_FAST << FUNCID_TYPE_SHIFT) | \ 20fb00dc4aSSubhasish Ghosh (SMC_64 << FUNCID_CC_SHIFT) | \ 21fb00dc4aSSubhasish Ghosh (OEN_STD_START << FUNCID_OEN_SHIFT) | \ 22fb00dc4aSSubhasish Ghosh (((RMI_FNUM_MIN_VALUE + (_offset)) & FUNCID_NUM_MASK) \ 23fb00dc4aSSubhasish Ghosh << FUNCID_NUM_SHIFT)) 24fb00dc4aSSubhasish Ghosh 25319fb084SSoby Mathew #define is_rmi_fid(fid) __extension__ ({ \ 26319fb084SSoby Mathew __typeof__(fid) _fid = (fid); \ 27319fb084SSoby Mathew ((GET_SMC_NUM(_fid) >= RMI_FNUM_MIN_VALUE) && \ 28319fb084SSoby Mathew (GET_SMC_NUM(_fid) <= RMI_FNUM_MAX_VALUE) && \ 29319fb084SSoby Mathew (GET_SMC_TYPE(_fid) == SMC_TYPE_FAST) && \ 30319fb084SSoby Mathew (GET_SMC_CC(_fid) == SMC_64) && \ 31319fb084SSoby Mathew (GET_SMC_OEN(_fid) == OEN_STD_START) && \ 32319fb084SSoby Mathew ((_fid & 0x00FE0000) == 0U)); }) 33319fb084SSoby Mathew 34319fb084SSoby Mathew /* 35fb00dc4aSSubhasish Ghosh * RMI_FNUM_REQ_COMPLETE is the only function in the RMI range that originates 36319fb084SSoby Mathew * from the Realm world and is handled by the RMMD. The RMI functions are 37319fb084SSoby Mathew * always invoked by the Normal world, forwarded by RMMD and handled by the 38fb00dc4aSSubhasish Ghosh * RMM. 39319fb084SSoby Mathew */ 40fb00dc4aSSubhasish Ghosh /* 0x18F */ 41e50fedbcSJavier Almansa Sobrino #define RMM_RMI_REQ_COMPLETE SMC64_RMI_FID(U(0x3F)) 42319fb084SSoby Mathew 438c980a4aSJavier Almansa Sobrino /* RMM_BOOT_COMPLETE arg0 error codes */ 448c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_SUCCESS (0) 458c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_UNKNOWN (-1) 468c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_VERSION_MISMATCH (-2) 478c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_CPUS_OUT_OF_RANGE (-3) 488c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_CPU_ID_OUT_OF_RANGE (-4) 498c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_INVALID_SHARED_BUFFER (-5) 508c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_MANIFEST_VERSION_NOT_SUPPORTED (-6) 518c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_MANIFEST_DATA_ERROR (-7) 528c980a4aSJavier Almansa Sobrino 538c980a4aSJavier Almansa Sobrino /* The SMC in the range 0x8400 0191 - 0x8400 01AF are reserved for RSIs.*/ 54319fb084SSoby Mathew 55319fb084SSoby Mathew /* 56319fb084SSoby Mathew * EL3 - RMM SMCs used for requesting RMMD services. These SMCs originate in Realm 57319fb084SSoby Mathew * world and return to Realm world. 58319fb084SSoby Mathew * 59319fb084SSoby Mathew * These are allocated from 0x8400 01B0 - 0x8400 01CF in the RMM Service range. 60319fb084SSoby Mathew */ 61319fb084SSoby Mathew #define RMMD_EL3_FNUM_MIN_VALUE U(0x1B0) 62319fb084SSoby Mathew #define RMMD_EL3_FNUM_MAX_VALUE U(0x1CF) 63319fb084SSoby Mathew 64fb00dc4aSSubhasish Ghosh /* Construct RMM_EL3 fastcall std FID from offset */ 65fb00dc4aSSubhasish Ghosh #define SMC64_RMMD_EL3_FID(_offset) \ 66fb00dc4aSSubhasish Ghosh ((SMC_TYPE_FAST << FUNCID_TYPE_SHIFT) | \ 67fb00dc4aSSubhasish Ghosh (SMC_64 << FUNCID_CC_SHIFT) | \ 68fb00dc4aSSubhasish Ghosh (OEN_STD_START << FUNCID_OEN_SHIFT) | \ 69fb00dc4aSSubhasish Ghosh (((RMMD_EL3_FNUM_MIN_VALUE + (_offset)) & FUNCID_NUM_MASK) \ 70fb00dc4aSSubhasish Ghosh << FUNCID_NUM_SHIFT)) 71fb00dc4aSSubhasish Ghosh 72319fb084SSoby Mathew /* The macros below are used to identify GTSI calls from the SMC function ID */ 73319fb084SSoby Mathew #define is_rmmd_el3_fid(fid) __extension__ ({ \ 74319fb084SSoby Mathew __typeof__(fid) _fid = (fid); \ 75319fb084SSoby Mathew ((GET_SMC_NUM(_fid) >= RMMD_EL3_FNUM_MIN_VALUE) &&\ 76319fb084SSoby Mathew (GET_SMC_NUM(_fid) <= RMMD_EL3_FNUM_MAX_VALUE) &&\ 77319fb084SSoby Mathew (GET_SMC_TYPE(_fid) == SMC_TYPE_FAST) && \ 78319fb084SSoby Mathew (GET_SMC_CC(_fid) == SMC_64) && \ 79319fb084SSoby Mathew (GET_SMC_OEN(_fid) == OEN_STD_START) && \ 80319fb084SSoby Mathew ((_fid & 0x00FE0000) == 0U)); }) 81319fb084SSoby Mathew 82fb00dc4aSSubhasish Ghosh /* 0x1B0 - 0x1B1 */ 83e50fedbcSJavier Almansa Sobrino #define RMM_GTSI_DELEGATE SMC64_RMMD_EL3_FID(U(0)) 84e50fedbcSJavier Almansa Sobrino #define RMM_GTSI_UNDELEGATE SMC64_RMMD_EL3_FID(U(1)) 85319fb084SSoby Mathew 86319fb084SSoby Mathew /* Return error codes from RMM-EL3 SMCs */ 87dc65ae46SJavier Almansa Sobrino #define E_RMM_OK 0 88dc65ae46SJavier Almansa Sobrino #define E_RMM_UNK -1 89dc65ae46SJavier Almansa Sobrino #define E_RMM_BAD_ADDR -2 90dc65ae46SJavier Almansa Sobrino #define E_RMM_BAD_PAS -3 91dc65ae46SJavier Almansa Sobrino #define E_RMM_NOMEM -4 92dc65ae46SJavier Almansa Sobrino #define E_RMM_INVAL -5 93*42cf6026SJuan Pablo Conde #define E_RMM_AGAIN -6 94319fb084SSoby Mathew 95ade6000fSShruti Gupta /* Return error codes from RMI SMCs */ 96ade6000fSShruti Gupta #define RMI_SUCCESS 0 97ade6000fSShruti Gupta #define RMI_ERROR_INPUT 1 98ade6000fSShruti Gupta 990f9159b7SSoby Mathew /* Acceptable SHA sizes for Challenge object */ 1000f9159b7SSoby Mathew #define SHA256_DIGEST_SIZE 32U 1010f9159b7SSoby Mathew #define SHA384_DIGEST_SIZE 48U 1020f9159b7SSoby Mathew #define SHA512_DIGEST_SIZE 64U 1030f9159b7SSoby Mathew 104a0435105SSoby Mathew /* 105a0435105SSoby Mathew * Retrieve Realm attestation key from EL3. Only P-384 ECC curve key is 106a0435105SSoby Mathew * supported. The arguments to this SMC are : 107a0435105SSoby Mathew * arg0 - Function ID. 108a0435105SSoby Mathew * arg1 - Realm attestation key buffer Physical address. 109a0435105SSoby Mathew * arg2 - Realm attestation key buffer size (in bytes). 110a0435105SSoby Mathew * arg3 - The type of the elliptic curve to which the requested 111a0435105SSoby Mathew * attestation key belongs to. The value should be one of the 112a0435105SSoby Mathew * defined curve types. 113a0435105SSoby Mathew * The return arguments are : 114a0435105SSoby Mathew * ret0 - Status / error. 115a0435105SSoby Mathew * ret1 - Size of the realm attestation key if successful. 116a0435105SSoby Mathew */ 117fb00dc4aSSubhasish Ghosh /* 0x1B2 */ 118e50fedbcSJavier Almansa Sobrino #define RMM_ATTEST_GET_REALM_KEY SMC64_RMMD_EL3_FID(U(2)) 119fb00dc4aSSubhasish Ghosh 120fb00dc4aSSubhasish Ghosh /* 121fb00dc4aSSubhasish Ghosh * Retrieve Platform token from EL3. 122fb00dc4aSSubhasish Ghosh * The arguments to this SMC are : 123fb00dc4aSSubhasish Ghosh * arg0 - Function ID. 124fb00dc4aSSubhasish Ghosh * arg1 - Platform attestation token buffer Physical address. (The challenge 125fb00dc4aSSubhasish Ghosh * object is passed in this buffer.) 126fb00dc4aSSubhasish Ghosh * arg2 - Platform attestation token buffer size (in bytes). 127fb00dc4aSSubhasish Ghosh * arg3 - Challenge object size (in bytes). It has to be one of the defined 128fb00dc4aSSubhasish Ghosh * SHA hash sizes. 129fb00dc4aSSubhasish Ghosh * The return arguments are : 130fb00dc4aSSubhasish Ghosh * ret0 - Status / error. 131fb00dc4aSSubhasish Ghosh * ret1 - Size of the platform token if successful. 132fb00dc4aSSubhasish Ghosh */ 133fb00dc4aSSubhasish Ghosh /* 0x1B3 */ 134e50fedbcSJavier Almansa Sobrino #define RMM_ATTEST_GET_PLAT_TOKEN SMC64_RMMD_EL3_FID(U(3)) 135a0435105SSoby Mathew 136a0435105SSoby Mathew /* ECC Curve types for attest key generation */ 137a0435105SSoby Mathew #define ATTEST_KEY_CURVE_ECC_SECP384R1 0 138a0435105SSoby Mathew 1398c980a4aSJavier Almansa Sobrino /* 1408c980a4aSJavier Almansa Sobrino * RMM_BOOT_COMPLETE originates on RMM when the boot finishes (either cold 1418c980a4aSJavier Almansa Sobrino * or warm boot). This is handled by the RMM-EL3 interface SMC handler. 1428c980a4aSJavier Almansa Sobrino * 1438c980a4aSJavier Almansa Sobrino * RMM_BOOT_COMPLETE FID is located at the end of the available range. 1448c980a4aSJavier Almansa Sobrino */ 1458c980a4aSJavier Almansa Sobrino /* 0x1CF */ 1468c980a4aSJavier Almansa Sobrino #define RMM_BOOT_COMPLETE SMC64_RMMD_EL3_FID(U(0x1F)) 1478c980a4aSJavier Almansa Sobrino 1488c980a4aSJavier Almansa Sobrino /* 1498c980a4aSJavier Almansa Sobrino * The major version number of the RMM Boot Interface implementation. 1508c980a4aSJavier Almansa Sobrino * Increase this whenever the semantics of the boot arguments change making it 1518c980a4aSJavier Almansa Sobrino * backwards incompatible. 1528c980a4aSJavier Almansa Sobrino */ 1538c980a4aSJavier Almansa Sobrino #define RMM_EL3_IFC_VERSION_MAJOR (U(0)) 1548c980a4aSJavier Almansa Sobrino 1558c980a4aSJavier Almansa Sobrino /* 1568c980a4aSJavier Almansa Sobrino * The minor version number of the RMM Boot Interface implementation. 1578c980a4aSJavier Almansa Sobrino * Increase this when a bug is fixed, or a feature is added without 1588c980a4aSJavier Almansa Sobrino * breaking compatibility. 1598c980a4aSJavier Almansa Sobrino */ 160*42cf6026SJuan Pablo Conde #define RMM_EL3_IFC_VERSION_MINOR (U(3)) 1618c980a4aSJavier Almansa Sobrino 1628c980a4aSJavier Almansa Sobrino #define RMM_EL3_INTERFACE_VERSION \ 1638c980a4aSJavier Almansa Sobrino (((RMM_EL3_IFC_VERSION_MAJOR << 16) & 0x7FFFF) | \ 1648c980a4aSJavier Almansa Sobrino RMM_EL3_IFC_VERSION_MINOR) 1658c980a4aSJavier Almansa Sobrino 1668c980a4aSJavier Almansa Sobrino #define RMM_EL3_IFC_VERSION_GET_MAJOR(_version) (((_version) >> 16) \ 1678c980a4aSJavier Almansa Sobrino & 0x7FFF) 1688c980a4aSJavier Almansa Sobrino #define RMM_EL3_IFC_VERSION_GET_MAJOR_MINOR(_version) ((_version) & 0xFFFF) 169a0435105SSoby Mathew 17077c27753SZelalem Aweke #ifndef __ASSEMBLER__ 17177c27753SZelalem Aweke #include <stdint.h> 17277c27753SZelalem Aweke 17377c27753SZelalem Aweke int rmmd_setup(void); 17477c27753SZelalem Aweke uint64_t rmmd_rmi_handler(uint32_t smc_fid, 17577c27753SZelalem Aweke uint64_t x1, 17677c27753SZelalem Aweke uint64_t x2, 17777c27753SZelalem Aweke uint64_t x3, 17877c27753SZelalem Aweke uint64_t x4, 17977c27753SZelalem Aweke void *cookie, 18077c27753SZelalem Aweke void *handle, 18177c27753SZelalem Aweke uint64_t flags); 18277c27753SZelalem Aweke 183319fb084SSoby Mathew uint64_t rmmd_rmm_el3_handler(uint32_t smc_fid, 18477c27753SZelalem Aweke uint64_t x1, 18577c27753SZelalem Aweke uint64_t x2, 18677c27753SZelalem Aweke uint64_t x3, 18777c27753SZelalem Aweke uint64_t x4, 18877c27753SZelalem Aweke void *cookie, 18977c27753SZelalem Aweke void *handle, 19077c27753SZelalem Aweke uint64_t flags); 19177c27753SZelalem Aweke 19277c27753SZelalem Aweke #endif /* __ASSEMBLER__ */ 19377c27753SZelalem Aweke #endif /* RMMD_SVC_H */ 194