summaryrefslogtreecommitdiff
path: root/spm/cactus/cactus_interrupt.c
blob: 35fdf30f6339f7305fd2188a18ba92a10c5b558b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
/*
 * Copyright (c) 2021-2022, Arm Limited. All rights reserved.
 *
 * SPDX-License-Identifier: BSD-3-Clause
 */

#include <debug.h>

#include "cactus_message_loop.h"
#include "cactus_test_cmds.h"
#include <drivers/arm/sp805.h>
#include <ffa_helpers.h>
#include <sp_helpers.h>
#include "spm_common.h"
#include <spm_helpers.h>

#include <platform_def.h>

#define NOTIFICATION_PENDING_INTERRUPT_INTID 5

extern void notification_pending_interrupt_handler(void);

extern ffa_id_t g_ffa_id;
extern ffa_id_t g_dir_req_source_id;
static uint32_t managed_exit_interrupt_id;

/* Secure virtual interrupt that was last handled by Cactus SP. */
uint32_t last_serviced_interrupt[PLATFORM_CORE_COUNT];

extern spinlock_t sp_handler_lock[NUM_VINT_ID];

/*
 * Managed exit ID discoverable by querying the SPMC through
 * FFA_FEATURES API.
 */
void discover_managed_exit_interrupt_id(void)
{
	struct ffa_value ffa_ret;

	/* Interrupt ID value is returned through register W2. */
	ffa_ret = ffa_features(FFA_FEATURE_MEI);
	managed_exit_interrupt_id = ffa_feature_intid(ffa_ret);

	VERBOSE("Discovered managed exit interrupt ID: %d\n",
	     managed_exit_interrupt_id);
}

static void post_interrupt_handler(uint32_t intid)
{
	unsigned int core_pos = get_current_core_id();

	last_serviced_interrupt[core_pos] = intid;

	/* Invoke the tail end handler registered by the SP. */
	spin_lock(&sp_handler_lock[intid]);
	if (sp_interrupt_tail_end_handler[intid]) {
		sp_interrupt_tail_end_handler[intid]();
	}
	spin_unlock(&sp_handler_lock[intid]);
}

void cactus_interrupt_handler_irq(void)
{
	uint32_t intid = spm_interrupt_get();

	if (intid == managed_exit_interrupt_id) {
		/*
		 * A secure partition performs its housekeeping and
		 * sends a direct response to signal interrupt
		 * completion. This is a pure virtual interrupt, no
		 * need for deactivation.
		 */
		VERBOSE("vIRQ: Sending ME response to %x\n",
			g_dir_req_source_id);
		cactus_response(g_ffa_id, g_dir_req_source_id,
				managed_exit_interrupt_id);
	} else {
		switch (intid) {
		case IRQ_TWDOG_INTID:
			/*
			 * Interrupt triggered due to Trusted watchdog timer expiry.
			 * Clear the interrupt and stop the timer.
			 */
			VERBOSE("Trusted WatchDog timer stopped\n");
			sp805_twdog_stop();

			/* Perform secure interrupt de-activation. */
			spm_interrupt_deactivate(intid);

			break;
		case NOTIFICATION_PENDING_INTERRUPT_INTID:
			notification_pending_interrupt_handler();
			break;
		default:
			ERROR("%s: Interrupt ID %x not handled!\n", __func__,
				 intid);
			panic();
			break;
		}
	}
	post_interrupt_handler(intid);
}

void cactus_interrupt_handler_fiq(void)
{
	uint32_t intid = spm_interrupt_get();

	switch (intid) {
	case MANAGED_EXIT_INTERRUPT_ID:
		/*
		 * A secure partition performs its housekeeping and sends a
		 * direct response to signal interrupt completion.
		 * This is a pure virtual interrupt, no need for deactivation.
		 */
		VERBOSE("vFIQ: Sending ME response to %x\n",
			g_dir_req_source_id);
		cactus_response(g_ffa_id, g_dir_req_source_id,
				MANAGED_EXIT_INTERRUPT_ID);
		break;
	default:
		/*
		 * Currently only managed exit interrupt is supported by vFIQ.
		 */
		panic();
		break;
	}
	post_interrupt_handler(intid);
}