blob: 2c7b619670e0a536681d221e8bd0268d5fc433de [file] [log] [blame]
Andrew Thoelke8c28fe02014-06-02 11:40:35 +01001/*
Zelalem Awekeb6301e62021-07-09 17:54:30 -05002 * Copyright (c) 2014-2021, Arm Limited and Contributors. All rights reserved.
Andrew Thoelke8c28fe02014-06-02 11:40:35 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Andrew Thoelke8c28fe02014-06-02 11:40:35 +01005 */
6
Antonio Nino Diaz9fe40fd2018-10-25 17:11:02 +01007#ifndef CPU_DATA_H
8#define CPU_DATA_H
Andrew Thoelke8c28fe02014-06-02 11:40:35 +01009
Etienne Carriere97ad6ce2017-09-01 10:22:20 +020010#include <platform_def.h> /* CACHE_WRITEBACK_GRANULE required */
11
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000012#include <bl31/ehf.h>
13
Alexei Fedorovf41355c2019-09-13 14:11:59 +010014/* Size of psci_cpu_data structure */
15#define PSCI_CPU_DATA_SIZE 12
16
Julius Werner8e0ef0f2019-07-09 14:02:43 -070017#ifdef __aarch64__
Soby Mathew748be1d2016-05-05 14:10:46 +010018
Alexei Fedorovf41355c2019-09-13 14:11:59 +010019/* 8-bytes aligned size of psci_cpu_data structure */
20#define PSCI_CPU_DATA_SIZE_ALIGNED ((PSCI_CPU_DATA_SIZE + 7) & ~7)
21
Zelalem Awekeb6301e62021-07-09 17:54:30 -050022#if ENABLE_RME
23/* Size of cpu_context array */
24#define CPU_DATA_CONTEXT_NUM 3
Alexei Fedorovf41355c2019-09-13 14:11:59 +010025/* Offset of cpu_ops_ptr, size 8 bytes */
Zelalem Awekeb6301e62021-07-09 17:54:30 -050026#define CPU_DATA_CPU_OPS_PTR 0x18
27#else /* ENABLE_RME */
28#define CPU_DATA_CONTEXT_NUM 2
Alexei Fedorovf41355c2019-09-13 14:11:59 +010029#define CPU_DATA_CPU_OPS_PTR 0x10
Zelalem Awekeb6301e62021-07-09 17:54:30 -050030#endif /* ENABLE_RME */
Alexei Fedorovf41355c2019-09-13 14:11:59 +010031
32#if ENABLE_PAUTH
33/* 8-bytes aligned offset of apiakey[2], size 16 bytes */
Zelalem Awekeb6301e62021-07-09 17:54:30 -050034#define CPU_DATA_APIAKEY_OFFSET (0x8 + PSCI_CPU_DATA_SIZE_ALIGNED \
35 + CPU_DATA_CPU_OPS_PTR)
36#define CPU_DATA_CRASH_BUF_OFFSET (0x10 + CPU_DATA_APIAKEY_OFFSET)
37#else /* ENABLE_PAUTH */
38#define CPU_DATA_CRASH_BUF_OFFSET (0x8 + PSCI_CPU_DATA_SIZE_ALIGNED \
39 + CPU_DATA_CPU_OPS_PTR)
40#endif /* ENABLE_PAUTH */
Alexei Fedorovf41355c2019-09-13 14:11:59 +010041
Soby Mathew748be1d2016-05-05 14:10:46 +010042/* need enough space in crash buffer to save 8 registers */
43#define CPU_DATA_CRASH_BUF_SIZE 64
Soby Mathew748be1d2016-05-05 14:10:46 +010044
Alexei Fedorovf41355c2019-09-13 14:11:59 +010045#else /* !__aarch64__ */
Soby Mathew748be1d2016-05-05 14:10:46 +010046
Soby Mathewc1adbbc2014-06-25 10:07:40 +010047#if CRASH_REPORTING
Julius Werner8e0ef0f2019-07-09 14:02:43 -070048#error "Crash reporting is not supported in AArch32"
49#endif
50#define CPU_DATA_CPU_OPS_PTR 0x0
Alexei Fedorovf41355c2019-09-13 14:11:59 +010051#define CPU_DATA_CRASH_BUF_OFFSET (0x4 + PSCI_CPU_DATA_SIZE)
Julius Werner8e0ef0f2019-07-09 14:02:43 -070052
Alexei Fedorovf41355c2019-09-13 14:11:59 +010053#endif /* __aarch64__ */
Julius Werner8e0ef0f2019-07-09 14:02:43 -070054
55#if CRASH_REPORTING
dp-arm3cac7862016-09-19 11:18:44 +010056#define CPU_DATA_CRASH_BUF_END (CPU_DATA_CRASH_BUF_OFFSET + \
57 CPU_DATA_CRASH_BUF_SIZE)
Soby Mathewc1adbbc2014-06-25 10:07:40 +010058#else
dp-arm3cac7862016-09-19 11:18:44 +010059#define CPU_DATA_CRASH_BUF_END CPU_DATA_CRASH_BUF_OFFSET
Soby Mathewc1adbbc2014-06-25 10:07:40 +010060#endif
Soby Mathewc704cbc2014-08-14 11:33:56 +010061
Etienne Carriere97ad6ce2017-09-01 10:22:20 +020062/* cpu_data size is the data size rounded up to the platform cache line size */
63#define CPU_DATA_SIZE (((CPU_DATA_CRASH_BUF_END + \
64 CACHE_WRITEBACK_GRANULE - 1) / \
65 CACHE_WRITEBACK_GRANULE) * \
66 CACHE_WRITEBACK_GRANULE)
67
dp-arm3cac7862016-09-19 11:18:44 +010068#if ENABLE_RUNTIME_INSTRUMENTATION
69/* Temporary space to store PMF timestamps from assembly code */
70#define CPU_DATA_PMF_TS_COUNT 1
71#define CPU_DATA_PMF_TS0_OFFSET CPU_DATA_CRASH_BUF_END
72#define CPU_DATA_PMF_TS0_IDX 0
73#endif
74
Julius Werner53456fc2019-07-09 13:49:11 -070075#ifndef __ASSEMBLER__
Andrew Thoelke8c28fe02014-06-02 11:40:35 +010076
Zelalem Awekeb6301e62021-07-09 17:54:30 -050077#include <assert.h>
78#include <stdint.h>
79
Andrew Thoelke8c28fe02014-06-02 11:40:35 +010080#include <arch_helpers.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000081#include <lib/cassert.h>
82#include <lib/psci/psci.h>
Zelalem Awekeb6301e62021-07-09 17:54:30 -050083
Andrew Thoelke8c28fe02014-06-02 11:40:35 +010084#include <platform_def.h>
Andrew Thoelke8c28fe02014-06-02 11:40:35 +010085
Soby Mathew523d6332015-01-08 18:02:19 +000086/* Offsets for the cpu_data structure */
87#define CPU_DATA_PSCI_LOCK_OFFSET __builtin_offsetof\
88 (cpu_data_t, psci_svc_cpu_data.pcpu_bakery_info)
89
90#if PLAT_PCPU_DATA_SIZE
91#define CPU_DATA_PLAT_PCPU_OFFSET __builtin_offsetof\
92 (cpu_data_t, platform_cpu_data)
93#endif
94
Zelalem Awekeb6301e62021-07-09 17:54:30 -050095typedef enum context_pas {
96 CPU_CONTEXT_SECURE = 0,
97 CPU_CONTEXT_NS,
98#if ENABLE_RME
99 CPU_CONTEXT_REALM,
100#endif
101 CPU_CONTEXT_NUM
102} context_pas_t;
103
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100104/*******************************************************************************
105 * Function & variable prototypes
106 ******************************************************************************/
107
108/*******************************************************************************
109 * Cache of frequently used per-cpu data:
Zelalem Awekeb6301e62021-07-09 17:54:30 -0500110 * Pointers to non-secure, realm, and secure security state contexts
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100111 * Address of the crash stack
112 * It is aligned to the cache line boundary to allow efficient concurrent
113 * manipulation of these pointers on different cpus
114 *
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100115 * The data structure and the _cpu_data accessors should not be used directly
116 * by components that have per-cpu members. The member access macros should be
117 * used for this.
118 ******************************************************************************/
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100119typedef struct cpu_data {
Julius Werner8e0ef0f2019-07-09 14:02:43 -0700120#ifdef __aarch64__
Zelalem Awekeb6301e62021-07-09 17:54:30 -0500121 void *cpu_context[CPU_DATA_CONTEXT_NUM];
122#endif /* __aarch64__ */
Soby Mathewa0fedc42016-06-16 14:52:04 +0100123 uintptr_t cpu_ops_ptr;
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100124 struct psci_cpu_data psci_svc_cpu_data;
125#if ENABLE_PAUTH
126 uint64_t apiakey[2];
127#endif
Soby Mathewc1adbbc2014-06-25 10:07:40 +0100128#if CRASH_REPORTING
Soby Mathewa0fedc42016-06-16 14:52:04 +0100129 u_register_t crash_buf[CPU_DATA_CRASH_BUF_SIZE >> 3];
Soby Mathewc1adbbc2014-06-25 10:07:40 +0100130#endif
dp-arm3cac7862016-09-19 11:18:44 +0100131#if ENABLE_RUNTIME_INSTRUMENTATION
132 uint64_t cpu_data_pmf_ts[CPU_DATA_PMF_TS_COUNT];
133#endif
Soby Mathew523d6332015-01-08 18:02:19 +0000134#if PLAT_PCPU_DATA_SIZE
135 uint8_t platform_cpu_data[PLAT_PCPU_DATA_SIZE];
136#endif
Jeenu Viswambharan10a67272017-09-22 08:32:10 +0100137#if defined(IMAGE_BL31) && EL3_EXCEPTION_HANDLING
138 pe_exc_data_t ehf_data;
139#endif
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100140} __aligned(CACHE_WRITEBACK_GRANULE) cpu_data_t;
141
Roberto Vargas05712702018-02-12 12:36:17 +0000142extern cpu_data_t percpu_data[PLATFORM_CORE_COUNT];
143
Zelalem Awekeb6301e62021-07-09 17:54:30 -0500144#ifdef __aarch64__
145CASSERT(CPU_DATA_CONTEXT_NUM == CPU_CONTEXT_NUM,
146 assert_cpu_data_context_num_mismatch);
147#endif
148
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100149#if ENABLE_PAUTH
150CASSERT(CPU_DATA_APIAKEY_OFFSET == __builtin_offsetof
151 (cpu_data_t, apiakey),
Olivier Deprezf57491e2021-08-19 11:36:26 +0200152 assert_cpu_data_pauth_stack_offset_mismatch);
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100153#endif
154
Soby Mathewc1adbbc2014-06-25 10:07:40 +0100155#if CRASH_REPORTING
156/* verify assembler offsets match data structures */
157CASSERT(CPU_DATA_CRASH_BUF_OFFSET == __builtin_offsetof
158 (cpu_data_t, crash_buf),
159 assert_cpu_data_crash_stack_offset_mismatch);
160#endif
161
Etienne Carriere97ad6ce2017-09-01 10:22:20 +0200162CASSERT(CPU_DATA_SIZE == sizeof(cpu_data_t),
163 assert_cpu_data_size_mismatch);
Soby Mathewc1adbbc2014-06-25 10:07:40 +0100164
Soby Mathewc704cbc2014-08-14 11:33:56 +0100165CASSERT(CPU_DATA_CPU_OPS_PTR == __builtin_offsetof
166 (cpu_data_t, cpu_ops_ptr),
167 assert_cpu_data_cpu_ops_ptr_offset_mismatch);
168
dp-arm3cac7862016-09-19 11:18:44 +0100169#if ENABLE_RUNTIME_INSTRUMENTATION
170CASSERT(CPU_DATA_PMF_TS0_OFFSET == __builtin_offsetof
171 (cpu_data_t, cpu_data_pmf_ts[0]),
172 assert_cpu_data_pmf_ts0_offset_mismatch);
173#endif
174
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100175struct cpu_data *_cpu_data_by_index(uint32_t cpu_index);
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100176
Julius Werner8e0ef0f2019-07-09 14:02:43 -0700177#ifdef __aarch64__
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100178/* Return the cpu_data structure for the current CPU. */
179static inline struct cpu_data *_cpu_data(void)
180{
181 return (cpu_data_t *)read_tpidr_el3();
182}
Soby Mathew748be1d2016-05-05 14:10:46 +0100183#else
184struct cpu_data *_cpu_data(void);
185#endif
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100186
Zelalem Awekeb6301e62021-07-09 17:54:30 -0500187/*
188 * Returns the index of the cpu_context array for the given security state.
189 * All accesses to cpu_context should be through this helper to make sure
190 * an access is not out-of-bounds. The function assumes security_state is
191 * valid.
192 */
193static inline context_pas_t get_cpu_context_index(uint32_t security_state)
194{
195 if (security_state == SECURE) {
196 return CPU_CONTEXT_SECURE;
197 } else {
198#if ENABLE_RME
199 if (security_state == NON_SECURE) {
200 return CPU_CONTEXT_NS;
201 } else {
202 assert(security_state == REALM);
203 return CPU_CONTEXT_REALM;
204 }
205#else
206 assert(security_state == NON_SECURE);
207 return CPU_CONTEXT_NS;
208#endif
209 }
210}
211
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100212/**************************************************************************
213 * APIs for initialising and accessing per-cpu data
214 *************************************************************************/
215
216void init_cpu_data_ptr(void);
Vikram Kanigiri9b38fc82015-01-29 18:27:38 +0000217void init_cpu_ops(void);
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100218
219#define get_cpu_data(_m) _cpu_data()->_m
Antonio Nino Diaz864ca6f2018-10-31 15:25:35 +0000220#define set_cpu_data(_m, _v) _cpu_data()->_m = (_v)
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100221#define get_cpu_data_by_index(_ix, _m) _cpu_data_by_index(_ix)->_m
Antonio Nino Diaz864ca6f2018-10-31 15:25:35 +0000222#define set_cpu_data_by_index(_ix, _m, _v) _cpu_data_by_index(_ix)->_m = (_v)
Joel Hutton43a4d572017-10-20 10:31:14 +0100223/* ((cpu_data_t *)0)->_m is a dummy to get the sizeof the struct member _m */
Soby Mathew24ab34f2016-05-03 17:11:42 +0100224#define flush_cpu_data(_m) flush_dcache_range((uintptr_t) \
Joel Hutton43a4d572017-10-20 10:31:14 +0100225 &(_cpu_data()->_m), \
226 sizeof(((cpu_data_t *)0)->_m))
Soby Mathew24ab34f2016-05-03 17:11:42 +0100227#define inv_cpu_data(_m) inv_dcache_range((uintptr_t) \
Joel Hutton43a4d572017-10-20 10:31:14 +0100228 &(_cpu_data()->_m), \
229 sizeof(((cpu_data_t *)0)->_m))
Soby Mathew7d861ea2014-11-18 10:14:14 +0000230#define flush_cpu_data_by_index(_ix, _m) \
Soby Mathewa0fedc42016-06-16 14:52:04 +0100231 flush_dcache_range((uintptr_t) \
Soby Mathew7d861ea2014-11-18 10:14:14 +0000232 &(_cpu_data_by_index(_ix)->_m), \
Joel Hutton43a4d572017-10-20 10:31:14 +0100233 sizeof(((cpu_data_t *)0)->_m))
Achin Guptae4b9fa42014-07-25 14:47:05 +0100234
Andrew Thoelke8c28fe02014-06-02 11:40:35 +0100235
Julius Werner53456fc2019-07-09 13:49:11 -0700236#endif /* __ASSEMBLER__ */
Antonio Nino Diaz9fe40fd2018-10-25 17:11:02 +0100237#endif /* CPU_DATA_H */