blob: ac37b56f4bf230dd680b78733d2c363c714b7701 [file] [log] [blame]
Miklos Balint386b8b52017-11-29 13:12:32 +00001/*
Kevin Penga20b5af2021-01-11 11:20:52 +08002 * Copyright (c) 2020-2021, Arm Limited. All rights reserved.
Miklos Balint386b8b52017-11-29 13:12:32 +00003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 *
6 */
7
Mingyang Sun7397b4f2020-06-17 15:07:45 +08008#ifndef __SPM_IPC_H__
9#define __SPM_IPC_H__
Miklos Balint386b8b52017-11-29 13:12:32 +000010
Mingyang Sun7397b4f2020-06-17 15:07:45 +080011#include <stdint.h>
Mingyang Sun37f6ced2020-07-08 16:30:28 +080012#include "spm_partition_defs.h"
Mingyang Sun7397b4f2020-06-17 15:07:45 +080013#include "tfm_arch.h"
Ken Liu24dffb22021-02-10 11:03:58 +080014#include "lists.h"
Edison Ai66fbdf12019-07-08 16:05:07 +080015#include "tfm_wait.h"
Mingyang Sunf3d29892019-07-10 17:50:23 +080016#include "tfm_secure_api.h"
Summer Qinb5da9cc2019-08-26 15:19:45 +080017#include "tfm_thread.h"
Mingyang Sun7397b4f2020-06-17 15:07:45 +080018#include "psa/service.h"
19
20#define TFM_VERSION_POLICY_RELAXED 0
21#define TFM_VERSION_POLICY_STRICT 1
22
23#define TFM_HANDLE_STATUS_IDLE 0
24#define TFM_HANDLE_STATUS_ACTIVE 1
25#define TFM_HANDLE_STATUS_CONNECT_ERROR 2
26
Mingyang Sun37f6ced2020-07-08 16:30:28 +080027#define PART_REGION_ADDR(partition, region) \
28 (uint32_t)&REGION_NAME(Image$$, partition, region)
29
Mingyang Sun7397b4f2020-06-17 15:07:45 +080030#define TFM_CONN_HANDLE_MAX_NUM 16
Miklos Balint386b8b52017-11-29 13:12:32 +000031
Mate Toth-Pal52674ab2018-02-26 09:47:56 +010032#define SPM_INVALID_PARTITION_IDX (~0U)
33
Summer Qineb537e52019-03-29 09:57:10 +080034/* Privileged definitions for partition thread mode */
Summer Qineb537e52019-03-29 09:57:10 +080035#define TFM_PARTITION_UNPRIVILEGED_MODE 0
Mingyang Sun7397b4f2020-06-17 15:07:45 +080036#define TFM_PARTITION_PRIVILEGED_MODE 1
37
38#define SPM_PART_FLAG_APP_ROT 0x01
39#define SPM_PART_FLAG_PSA_ROT 0x02
40#define SPM_PART_FLAG_IPC 0x04
Summer Qineb537e52019-03-29 09:57:10 +080041
Mingyang Sun37f6ced2020-07-08 16:30:28 +080042#define TFM_PRIORITY_HIGH THRD_PRIOR_HIGHEST
43#define TFM_PRIORITY_NORMAL THRD_PRIOR_MEDIUM
44#define TFM_PRIORITY_LOW THRD_PRIOR_LOWEST
45#define TFM_PRIORITY(LEVEL) TFM_PRIORITY_##LEVEL
46
Mingyang Sun73056b62020-07-03 15:18:46 +080047#define TFM_MSG_MAGIC 0x15154343
48
Mingyang Sun73056b62020-07-03 15:18:46 +080049/* Message struct to collect parameter from client */
50struct tfm_msg_body_t {
51 int32_t magic;
52 struct tfm_spm_service_t *service; /* RoT service pointer */
53 struct tfm_event_t ack_evnt; /* Event for ack reponse */
54 psa_msg_t msg; /* PSA message body */
55 psa_invec invec[PSA_MAX_IOVEC]; /* Put in/out vectors in msg body */
56 psa_outvec outvec[PSA_MAX_IOVEC];
57 psa_outvec *caller_outvec; /*
58 * Save caller outvec pointer for
59 * write length update
60 */
61#ifdef TFM_MULTI_CORE_TOPOLOGY
62 const void *caller_data; /*
63 * Pointer to the private data of the
64 * caller. It identifies the NSPE PSA
65 * client calls in multi-core topology
66 */
67#endif
Ken Liu2c47f7f2021-01-22 11:06:04 +080068 struct bi_list_node_t msg_node; /* For list operators */
Mingyang Sun73056b62020-07-03 15:18:46 +080069};
70
Mate Toth-Pal3db437a2018-06-22 16:15:13 +020071/**
Mingyang Sun37f6ced2020-07-08 16:30:28 +080072 * Holds the fields of the partition DB used by the SPM code. The values of
73 * these fields are calculated at compile time, and set during initialisation
74 * phase.
75 */
Mingyang Sunae70d8d2020-06-30 15:56:05 +080076struct partition_static_t {
Mingyang Sun56c59692020-07-20 17:02:19 +080077 uint32_t psa_ff_ver; /* PSA-FF version */
78 uint32_t pid; /* Partition ID */
79 uint32_t flags; /* Flags of the partition */
80 uint32_t priority; /* Priority of the partition thread */
81 sp_entry_point entry; /* Entry point of the partition */
82 uintptr_t stack_base_addr; /* Stack base of the partition */
83 size_t stack_size; /* Stack size of the partition */
84 uintptr_t heap_base_addr; /* Heap base of the partition */
85 size_t heap_size; /* Heap size of the partition */
Ken Liu172f1e32021-02-05 16:31:03 +080086 uintptr_t platform_data; /* Platform specific data */
Mingyang Sun56c59692020-07-20 17:02:19 +080087 uint32_t ndeps; /* Numbers of depended services */
88 uint32_t *deps; /* Pointer to dependency arrays */
Mingyang Sun37f6ced2020-07-08 16:30:28 +080089};
90
91/**
92 * Holds the fields that define a partition for SPM. The fields are further
93 * divided to structures, to keep the related fields close to each other.
94 */
Mingyang Sunae70d8d2020-06-30 15:56:05 +080095struct partition_t {
Mingyang Sun56c59692020-07-20 17:02:19 +080096 const struct partition_static_t *p_static;
Mingyang Sunae70d8d2020-06-30 15:56:05 +080097 void *p_platform;
98 void *p_interrupts;
99 void *p_metadata;
Mingyang Sunaf22ffa2020-07-09 17:48:37 +0800100 struct tfm_core_thread_t sp_thread;
101 struct tfm_event_t event;
Ken Liu2c47f7f2021-01-22 11:06:04 +0800102 struct bi_list_node_t msg_list;
Mingyang Sunaf22ffa2020-07-09 17:48:37 +0800103 uint32_t signals_allowed;
104 uint32_t signals_waiting;
105 uint32_t signals_asserted;
Mingyang Sun37f6ced2020-07-08 16:30:28 +0800106 /** A list of platform_data pointers */
Mingyang Sun37f6ced2020-07-08 16:30:28 +0800107 const struct tfm_spm_partition_memory_data_t *memory_data;
108};
109
110struct spm_partition_db_t {
Mingyang Sun37f6ced2020-07-08 16:30:28 +0800111 uint32_t partition_count;
Mingyang Sunae70d8d2020-06-30 15:56:05 +0800112 struct partition_t *partitions;
Mingyang Sun37f6ced2020-07-08 16:30:28 +0800113};
114
Mingyang Sunda01a972019-07-12 17:32:59 +0800115/* Service database defined by manifest */
116struct tfm_spm_service_db_t {
117 char *name; /* Service name */
118 uint32_t partition_id; /* Partition ID which service belong to */
119 psa_signal_t signal; /* Service signal */
120 uint32_t sid; /* Service identifier */
121 bool non_secure_client; /* If can be called by non secure client */
Shawn Shancc39fcb2019-11-13 15:38:16 +0800122 uint32_t version; /* Service version */
123 uint32_t version_policy; /* Service version policy */
Mingyang Sunda01a972019-07-12 17:32:59 +0800124};
125
126/* RoT Service data */
127struct tfm_spm_service_t {
Summer Qine578c5b2019-08-16 16:42:16 +0800128 const struct tfm_spm_service_db_t *service_db;/* Service database pointer */
Mingyang Sunae70d8d2020-06-30 15:56:05 +0800129 struct partition_t *partition; /*
Mingyang Sunda01a972019-07-12 17:32:59 +0800130 * Point to secure partition
131 * data
132 */
Ken Liu2c47f7f2021-01-22 11:06:04 +0800133 struct bi_list_node_t handle_list; /* Service handle list */
134 struct bi_list_node_t list; /* For list operation */
Mingyang Sunda01a972019-07-12 17:32:59 +0800135};
Summer Qin5fdcf632020-06-22 16:49:24 +0800136
Mingyang Sun7397b4f2020-06-17 15:07:45 +0800137/* RoT connection handle list */
138struct tfm_conn_handle_t {
139 void *rhandle; /* Reverse handle value */
140 uint32_t status; /*
141 * Status of handle, three valid
142 * options:
143 * TFM_HANDLE_STATUS_ACTIVE,
144 * TFM_HANDLE_STATUS_IDLE and
145 * TFM_HANDLE_STATUS_CONNECT_ERROR
146 */
147 int32_t client_id; /*
148 * Partition ID of the sender of the
149 * message:
150 * - secure partition id;
151 * - non secure client endpoint id.
152 */
153 struct tfm_msg_body_t internal_msg; /* Internal message for message queue */
Mingyang Sunae70d8d2020-06-30 15:56:05 +0800154 struct tfm_spm_service_t *service; /* RoT service pointer */
Ken Liu2c47f7f2021-01-22 11:06:04 +0800155 struct bi_list_node_t list; /* list node */
Mingyang Sun7397b4f2020-06-17 15:07:45 +0800156};
157
Summer Qin5fdcf632020-06-22 16:49:24 +0800158enum tfm_memory_access_e {
159 TFM_MEMORY_ACCESS_RO = 1,
160 TFM_MEMORY_ACCESS_RW = 2,
161};
Summer Qinb4a854d2019-05-29 15:31:22 +0800162
163/**
Mate Toth-Pal5e6d0342019-11-22 11:43:20 +0100164 * \brief Get the current partition mode.
165 *
166 * \param[in] partition_flags Flags of current partition
167 *
168 * \retval TFM_PARTITION_PRIVILEGED_MODE Privileged mode
169 * \retval TFM_PARTITION_UNPRIVILEGED_MODE Unprivileged mode
170 */
171uint32_t tfm_spm_partition_get_privileged_mode(uint32_t partition_flags);
172
Summer Qin830c5542020-02-14 13:44:20 +0800173/**
174 * \brief Handle an SPM request by a secure service
175 * \param[in] svc_ctx The stacked SVC context
176 */
177void tfm_spm_request_handler(const struct tfm_state_context_t *svc_ctx);
178
Edison Ai7aff9e82019-07-11 14:56:46 +0800179/**
Mingyang Sunf3d29892019-07-10 17:50:23 +0800180 * \brief Get the running partition ID.
181 *
182 * \return Returns the partition ID
183 */
184uint32_t tfm_spm_partition_get_running_partition_id(void);
185
Mingyang Sunf3d29892019-07-10 17:50:23 +0800186/******************** Service handle management functions ********************/
187
188/**
189 * \brief Create connection handle for client connect
190 *
191 * \param[in] service Target service context pointer
Summer Qin1ce712a2019-10-14 18:04:05 +0800192 * \param[in] client_id Partition ID of the sender of the message
Mingyang Sunf3d29892019-07-10 17:50:23 +0800193 *
Summer Qin630c76b2020-05-20 10:32:58 +0800194 * \retval NULL Create failed
195 * \retval "Not NULL" Service handle created
Mingyang Sunf3d29892019-07-10 17:50:23 +0800196 */
Summer Qin630c76b2020-05-20 10:32:58 +0800197struct tfm_conn_handle_t *tfm_spm_create_conn_handle(
198 struct tfm_spm_service_t *service,
Summer Qin1ce712a2019-10-14 18:04:05 +0800199 int32_t client_id);
200
201/**
202 * \brief Validate connection handle for client connect
203 *
204 * \param[in] conn_handle Handle to be validated
205 * \param[in] client_id Partition ID of the sender of the message
206 *
Ken Liubcae38b2021-01-20 15:47:44 +0800207 * \retval SPM_SUCCESS Success
208 * \retval SPM_ERROR_GENERIC Invalid handle
Summer Qin1ce712a2019-10-14 18:04:05 +0800209 */
Summer Qin630c76b2020-05-20 10:32:58 +0800210int32_t tfm_spm_validate_conn_handle(
211 const struct tfm_conn_handle_t *conn_handle,
212 int32_t client_id);
Mingyang Sunf3d29892019-07-10 17:50:23 +0800213
Summer Qin02f7f072020-08-24 16:02:54 +0800214/**
215 * \brief Free connection handle which not used anymore.
216 *
217 * \param[in] service Target service context pointer
218 * \param[in] conn_handle Connection handle created by
219 * tfm_spm_create_conn_handle()
220 *
Ken Liubcae38b2021-01-20 15:47:44 +0800221 * \retval SPM_SUCCESS Success
222 * \retval SPM_ERROR_BAD_PARAMETERS Bad parameters input
Summer Qin02f7f072020-08-24 16:02:54 +0800223 * \retval "Does not return" Panic for not find service by handle
224 */
225int32_t tfm_spm_free_conn_handle(struct tfm_spm_service_t *service,
226 struct tfm_conn_handle_t *conn_handle);
227
Mingyang Sunf3d29892019-07-10 17:50:23 +0800228/******************** Partition management functions *************************/
229
230/**
Summer Qin02f7f072020-08-24 16:02:54 +0800231 * \brief Get the msg context by signal.
232 *
233 * \param[in] partition Partition context pointer
234 * \ref partition_t structures
235 * \param[in] signal Signal associated with inputs to the Secure
236 * Partition, \ref psa_signal_t
237 *
238 * \retval NULL Failed
239 * \retval "Not NULL" Target service context pointer,
240 * \ref tfm_msg_body_t structures
241 */
242struct tfm_msg_body_t *tfm_spm_get_msg_by_signal(struct partition_t *partition,
243 psa_signal_t signal);
244
245/**
Mingyang Sunf3d29892019-07-10 17:50:23 +0800246 * \brief Get current running partition context.
247 *
248 * \retval NULL Failed
249 * \retval "Not NULL" Return the parttion context pointer
Mingyang Sunae70d8d2020-06-30 15:56:05 +0800250 * \ref partition_t structures
Mingyang Sunf3d29892019-07-10 17:50:23 +0800251 */
Mingyang Sunae70d8d2020-06-30 15:56:05 +0800252struct partition_t *tfm_spm_get_running_partition(void);
Mingyang Sunf3d29892019-07-10 17:50:23 +0800253
254/**
Mingyang Sunf3d29892019-07-10 17:50:23 +0800255 * \brief Get the service context by service ID.
256 *
257 * \param[in] sid RoT Service identity
258 *
259 * \retval NULL Failed
260 * \retval "Not NULL" Target service context pointer,
261 * \ref tfm_spm_service_t structures
262 */
263struct tfm_spm_service_t *tfm_spm_get_service_by_sid(uint32_t sid);
264
Mingyang Sunf3d29892019-07-10 17:50:23 +0800265/************************ Message functions **********************************/
266
267/**
Summer Qin02f7f072020-08-24 16:02:54 +0800268 * \brief Get message context by message handle.
269 *
270 * \param[in] msg_handle Message handle which is a reference generated
271 * by the SPM to a specific message.
272 *
273 * \return The message body context pointer
274 * \ref tfm_msg_body_t structures
275 */
276struct tfm_msg_body_t *tfm_spm_get_msg_from_handle(psa_handle_t msg_handle);
277
278/**
Edison Ai97115822019-08-01 14:22:19 +0800279 * \brief Fill the message for PSA client call.
280 *
281 * \param[in] msg Service Message Queue buffer pointer
Mingyang Sunf3d29892019-07-10 17:50:23 +0800282 * \param[in] service Target service context pointer, which can be
283 * obtained by partition management functions
284 * \prarm[in] handle Connect handle return by psa_connect().
285 * \param[in] type Message type, PSA_IPC_CONNECT, PSA_IPC_CALL or
286 * PSA_IPC_DISCONNECT
Summer Qin1ce712a2019-10-14 18:04:05 +0800287 * \param[in] client_id Partition ID of the sender of the message
Mingyang Sunf3d29892019-07-10 17:50:23 +0800288 * \param[in] invec Array of input \ref psa_invec structures
289 * \param[in] in_len Number of input \ref psa_invec structures
290 * \param[in] outvec Array of output \ref psa_outvec structures
291 * \param[in] out_len Number of output \ref psa_outvec structures
292 * \param[in] caller_outvec Array of caller output \ref psa_outvec structures
Mingyang Sunf3d29892019-07-10 17:50:23 +0800293 */
Edison Ai97115822019-08-01 14:22:19 +0800294void tfm_spm_fill_msg(struct tfm_msg_body_t *msg,
295 struct tfm_spm_service_t *service,
Ken Liu505b1702020-05-29 13:19:58 +0800296 psa_handle_t handle,
Summer Qin1ce712a2019-10-14 18:04:05 +0800297 int32_t type, int32_t client_id,
Edison Ai97115822019-08-01 14:22:19 +0800298 psa_invec *invec, size_t in_len,
299 psa_outvec *outvec, size_t out_len,
300 psa_outvec *caller_outvec);
Mingyang Sunf3d29892019-07-10 17:50:23 +0800301
302/**
303 * \brief Send message and wake up the SP who is waiting on
304 * message queue, block the current thread and
305 * scheduler triggered
306 *
307 * \param[in] service Target service context pointer, which can be
308 * obtained by partition management functions
309 * \param[in] msg message created by tfm_spm_create_msg()
310 * \ref tfm_msg_body_t structures
311 *
Ken Liubcae38b2021-01-20 15:47:44 +0800312 * \retval SPM_SUCCESS Success
313 * \retval SPM_ERROR_BAD_PARAMETERS Bad parameters input
314 * \retval SPM_ERROR_GENERIC Failed to enqueue message to service message queue
Mingyang Sunf3d29892019-07-10 17:50:23 +0800315 */
316int32_t tfm_spm_send_event(struct tfm_spm_service_t *service,
317 struct tfm_msg_body_t *msg);
318
319/**
Jaykumar Pitambarbhai Patel3a986022019-10-08 17:37:15 +0530320 * \brief Check the client version according to
Mingyang Sunf3d29892019-07-10 17:50:23 +0800321 * version policy
322 *
323 * \param[in] service Target service context pointer, which can be get
324 * by partition management functions
Jaykumar Pitambarbhai Patel3a986022019-10-08 17:37:15 +0530325 * \param[in] version Client support version
Mingyang Sunf3d29892019-07-10 17:50:23 +0800326 *
Ken Liubcae38b2021-01-20 15:47:44 +0800327 * \retval SPM_SUCCESS Success
328 * \retval SPM_ERROR_BAD_PARAMETERS Bad parameters input
329 * \retval SPM_ERROR_VERSION Check failed
Mingyang Sunf3d29892019-07-10 17:50:23 +0800330 */
331int32_t tfm_spm_check_client_version(struct tfm_spm_service_t *service,
Jaykumar Pitambarbhai Patel3a986022019-10-08 17:37:15 +0530332 uint32_t version);
Mingyang Sunf3d29892019-07-10 17:50:23 +0800333
334/**
Edison Aie728fbf2019-11-13 09:37:12 +0800335 * \brief Check the client access authorization
336 *
337 * \param[in] sid Target RoT Service identity
338 * \param[in] service Target service context pointer, which can be get
339 * by partition management functions
340 * \param[in] ns_caller Whether from NS caller
341 *
Ken Liubcae38b2021-01-20 15:47:44 +0800342 * \retval SPM_SUCCESS Success
343 * \retval SPM_ERROR_GENERIC Authorization check failed
Edison Aie728fbf2019-11-13 09:37:12 +0800344 */
345int32_t tfm_spm_check_authorization(uint32_t sid,
346 struct tfm_spm_service_t *service,
Summer Qin618e8c32019-12-09 10:47:20 +0800347 bool ns_caller);
Edison Aie728fbf2019-11-13 09:37:12 +0800348
349/**
Mingyang Sunf3d29892019-07-10 17:50:23 +0800350 * \brief Check the memory reference is valid.
351 *
352 * \param[in] buffer Pointer of memory reference
353 * \param[in] len Length of memory reference in bytes
354 * \param[in] ns_caller From non-secure caller
355 * \param[in] access Type of access specified by the
356 * \ref tfm_memory_access_e
357 * \param[in] privileged Privileged mode or unprivileged mode:
358 * \ref TFM_PARTITION_UNPRIVILEGED_MODE
359 * \ref TFM_PARTITION_PRIVILEGED_MODE
360 *
Ken Liubcae38b2021-01-20 15:47:44 +0800361 * \retval SPM_SUCCESS Success
362 * \retval SPM_ERROR_BAD_PARAMETERS Bad parameters input
363 * \retval SPM_ERROR_MEMORY_CHECK Check failed
Mingyang Sunf3d29892019-07-10 17:50:23 +0800364 */
Summer Qin43c185d2019-10-10 15:44:42 +0800365int32_t tfm_memory_check(const void *buffer, size_t len, bool ns_caller,
Mingyang Sunf3d29892019-07-10 17:50:23 +0800366 enum tfm_memory_access_e access,
367 uint32_t privileged);
368
Mingyang Sunf3d29892019-07-10 17:50:23 +0800369/*
370 * PendSV specified function.
371 *
372 * Parameters :
Summer Qind2ad7e72020-01-06 18:16:35 +0800373 * p_actx - Architecture context storage pointer
Mingyang Sunf3d29892019-07-10 17:50:23 +0800374 *
375 * Notes:
376 * This is a staging API. Scheduler should be called in SPM finally and
377 * this function will be obsoleted later.
378 */
Summer Qind2ad7e72020-01-06 18:16:35 +0800379void tfm_pendsv_do_schedule(struct tfm_arch_ctx_t *p_actx);
Mingyang Sunf3d29892019-07-10 17:50:23 +0800380
Ken Liu490281d2019-12-30 15:55:26 +0800381/**
382 * \brief SPM initialization implementation
383 *
384 * \details This function must be called under handler mode.
Ken Liuce2692d2020-02-11 12:39:36 +0800385 * \retval This function returns an EXC_RETURN value. Other
386 * faults would panic the execution and never
387 * returned.
Ken Liu490281d2019-12-30 15:55:26 +0800388 */
Ken Liuce2692d2020-02-11 12:39:36 +0800389uint32_t tfm_spm_init(void);
Ken Liu490281d2019-12-30 15:55:26 +0800390
Mingyang Sund44522a2020-01-16 16:48:37 +0800391/**
Mingyang Sunc3123ec2020-06-11 17:43:58 +0800392 * \brief SVC handler of enabling irq_line of the specified irq_signal.
Mingyang Sund44522a2020-01-16 16:48:37 +0800393 *
394 * \param[in] args Include all input arguments: irq_signal.
395 *
396 * \retval void Success.
397 * \retval "Does not return" The call is invalid, one or more of the
398 * following are true:
399 * \arg irq_signal is not an interrupt signal.
400 * \arg irq_signal indicates more than one signal.
401 */
402void tfm_spm_enable_irq(uint32_t *args);
403
404/**
Mingyang Sunc3123ec2020-06-11 17:43:58 +0800405 * \brief SVC handler of disabling irq_line of the specified irq_signal.
Mingyang Sund44522a2020-01-16 16:48:37 +0800406 *
407 * \param[in] args Include all input arguments: irq_signal.
408 *
409 * \retval void Success.
410 * \retval "Does not return" The call is invalid, one or more of the
411 * following are true:
412 * \arg irq_signal is not an interrupt signal.
413 * \arg irq_signal indicates more than one signal.
414 */
415void tfm_spm_disable_irq(uint32_t *args);
416
417/**
418 * \brief Validate the whether NS caller re-enter.
419 *
420 * \param[in] p_cur_sp Pointer to current partition.
421 * \param[in] p_ctx Pointer to current stack context.
422 * \param[in] exc_return EXC_RETURN value.
423 * \param[in] ns_caller If 'true', call from non-secure client.
424 * Or from secure client.
425 *
426 * \retval void Success.
427 */
Mingyang Sunae70d8d2020-06-30 15:56:05 +0800428void tfm_spm_validate_caller(struct partition_t *p_cur_sp, uint32_t *p_ctx,
429 uint32_t exc_return, bool ns_caller);
Mingyang Sund44522a2020-01-16 16:48:37 +0800430
431/**
Ken Liu505b1702020-05-29 13:19:58 +0800432 * \brief Converts a handle instance into a corresponded user handle.
433 */
434psa_handle_t tfm_spm_to_user_handle(struct tfm_conn_handle_t *handle_instance);
435
436/**
Summer Qin373feb12020-03-27 15:35:33 +0800437 * \brief Converts a user handle into a corresponded handle instance.
438 */
439struct tfm_conn_handle_t *tfm_spm_to_handle_instance(psa_handle_t user_handle);
440
Summer Qin9c1fba12020-08-12 15:49:12 +0800441/**
442 * \brief Move to handler mode by a SVC for specific purpose
443 */
444void tfm_core_handler_mode(void);
445
Summer Qin02f7f072020-08-24 16:02:54 +0800446/**
447 * \brief Set reverse handle value for connection.
448 *
449 * \param[in] service Target service context pointer
450 * \param[in] conn_handle Connection handle created by
451 * tfm_spm_create_conn_handle()
452 * \param[in] rhandle rhandle need to save
453 *
Ken Liubcae38b2021-01-20 15:47:44 +0800454 * \retval SPM_SUCCESS Success
455 * \retval SPM_ERROR_BAD_PARAMETERS Bad parameters input
Summer Qin02f7f072020-08-24 16:02:54 +0800456 * \retval "Does not return" Panic for not find handle node
457 */
458int32_t tfm_spm_set_rhandle(struct tfm_spm_service_t *service,
459 struct tfm_conn_handle_t *conn_handle,
460 void *rhandle);
461
462void update_caller_outvec_len(struct tfm_msg_body_t *msg);
463
464/**
465 * \brief notify the partition with the signal.
466 *
467 * \param[in] partition_id The ID of the partition to be notified.
468 * \param[in] signal The signal that the partition is to be notified
469 * with.
470 *
471 * \retval void Success.
472 * \retval "Does not return" If partition_id is invalid.
473 */
474void notify_with_signal(int32_t partition_id, psa_signal_t signal);
475
476/**
477 * \brief Return the IRQ line number associated with a signal
478 *
479 * \param[in] partition_id The ID of the partition in which we look for
480 * the signal.
Kevin Peng410bee52021-01-13 16:27:17 +0800481 * \param[in] signal The signal to query for.
Summer Qin02f7f072020-08-24 16:02:54 +0800482 *
Kevin Penga20b5af2021-01-11 11:20:52 +0800483 * \retval None-negative value The irq line associated with signal
Kevin Peng410bee52021-01-13 16:27:17 +0800484 * \retval Negative value if one of more the following are true:
485 * - the \ref signal indicates more than one signal
486 * - the \ref signal does not belong to the
487 * partition.
Summer Qin02f7f072020-08-24 16:02:54 +0800488 */
Kevin Penga20b5af2021-01-11 11:20:52 +0800489int32_t get_irq_line_for_signal(int32_t partition_id, psa_signal_t signal);
Summer Qin02f7f072020-08-24 16:02:54 +0800490
Mingyang Sun7397b4f2020-06-17 15:07:45 +0800491#endif /* __SPM_IPC_H__ */