xref: /rk3399_ARM-atf/services/std_svc/spm/el3_spmc/spmc.h (revision 5096aeb2ba646548a7a6ab59e975b996e6c9026a)
1*5096aeb2SMarc Bonnici /*
2*5096aeb2SMarc Bonnici  * Copyright (c) 2022, ARM Limited and Contributors. All rights reserved.
3*5096aeb2SMarc Bonnici  *
4*5096aeb2SMarc Bonnici  * SPDX-License-Identifier: BSD-3-Clause
5*5096aeb2SMarc Bonnici  */
6*5096aeb2SMarc Bonnici 
7*5096aeb2SMarc Bonnici #ifndef SPMC_H
8*5096aeb2SMarc Bonnici #define SPMC_H
9*5096aeb2SMarc Bonnici 
10*5096aeb2SMarc Bonnici #include <stdint.h>
11*5096aeb2SMarc Bonnici 
12*5096aeb2SMarc Bonnici #include <lib/psci/psci.h>
13*5096aeb2SMarc Bonnici #include <lib/spinlock.h>
14*5096aeb2SMarc Bonnici #include "spm_common.h"
15*5096aeb2SMarc Bonnici 
16*5096aeb2SMarc Bonnici /*
17*5096aeb2SMarc Bonnici  * Ranges of FF-A IDs for Normal world and Secure world components. The
18*5096aeb2SMarc Bonnici  * convention matches that used by other SPMCs i.e. Hafnium and OP-TEE.
19*5096aeb2SMarc Bonnici  */
20*5096aeb2SMarc Bonnici #define FFA_NWD_ID_BASE		0x0
21*5096aeb2SMarc Bonnici #define FFA_NWD_ID_LIMIT	0x7FFF
22*5096aeb2SMarc Bonnici #define FFA_SWD_ID_BASE		0x8000
23*5096aeb2SMarc Bonnici #define FFA_SWD_ID_LIMIT	SPMD_DIRECT_MSG_ENDPOINT_ID - 1
24*5096aeb2SMarc Bonnici #define FFA_SWD_ID_MASK		0x8000
25*5096aeb2SMarc Bonnici 
26*5096aeb2SMarc Bonnici /* First ID is reserved for the SPMC */
27*5096aeb2SMarc Bonnici #define FFA_SPMC_ID		U(FFA_SWD_ID_BASE)
28*5096aeb2SMarc Bonnici /* SP IDs are allocated after the SPMC ID */
29*5096aeb2SMarc Bonnici #define FFA_SP_ID_BASE		(FFA_SPMC_ID + 1)
30*5096aeb2SMarc Bonnici /* Align with Hafnium implementation */
31*5096aeb2SMarc Bonnici #define INV_SP_ID		0x7FFF
32*5096aeb2SMarc Bonnici 
33*5096aeb2SMarc Bonnici /* FF-A warm boot types. */
34*5096aeb2SMarc Bonnici #define FFA_WB_TYPE_S2RAM	0
35*5096aeb2SMarc Bonnici #define FFA_WB_TYPE_NOTS2RAM	1
36*5096aeb2SMarc Bonnici 
37*5096aeb2SMarc Bonnici /*
38*5096aeb2SMarc Bonnici  * Runtime states of an execution context as per the FF-A v1.1 specification.
39*5096aeb2SMarc Bonnici  */
40*5096aeb2SMarc Bonnici enum sp_runtime_states {
41*5096aeb2SMarc Bonnici 	RT_STATE_WAITING,
42*5096aeb2SMarc Bonnici 	RT_STATE_RUNNING,
43*5096aeb2SMarc Bonnici 	RT_STATE_PREEMPTED,
44*5096aeb2SMarc Bonnici 	RT_STATE_BLOCKED
45*5096aeb2SMarc Bonnici };
46*5096aeb2SMarc Bonnici 
47*5096aeb2SMarc Bonnici /*
48*5096aeb2SMarc Bonnici  * Runtime model of an execution context as per the FF-A v1.1 specification. Its
49*5096aeb2SMarc Bonnici  * value is valid only if the execution context is not in the waiting state.
50*5096aeb2SMarc Bonnici  */
51*5096aeb2SMarc Bonnici enum sp_runtime_model {
52*5096aeb2SMarc Bonnici 	RT_MODEL_DIR_REQ,
53*5096aeb2SMarc Bonnici 	RT_MODEL_RUN,
54*5096aeb2SMarc Bonnici 	RT_MODEL_INIT,
55*5096aeb2SMarc Bonnici 	RT_MODEL_INTR
56*5096aeb2SMarc Bonnici };
57*5096aeb2SMarc Bonnici 
58*5096aeb2SMarc Bonnici enum sp_runtime_el {
59*5096aeb2SMarc Bonnici 	EL1 = 0,
60*5096aeb2SMarc Bonnici 	S_EL0,
61*5096aeb2SMarc Bonnici 	S_EL1
62*5096aeb2SMarc Bonnici };
63*5096aeb2SMarc Bonnici 
64*5096aeb2SMarc Bonnici enum sp_execution_state {
65*5096aeb2SMarc Bonnici 	SP_STATE_AARCH64 = 0,
66*5096aeb2SMarc Bonnici 	SP_STATE_AARCH32
67*5096aeb2SMarc Bonnici };
68*5096aeb2SMarc Bonnici 
69*5096aeb2SMarc Bonnici /*
70*5096aeb2SMarc Bonnici  * Execution context members for an SP. This is a bit like struct
71*5096aeb2SMarc Bonnici  * vcpu in a hypervisor.
72*5096aeb2SMarc Bonnici  */
73*5096aeb2SMarc Bonnici struct sp_exec_ctx {
74*5096aeb2SMarc Bonnici 	/*
75*5096aeb2SMarc Bonnici 	 * Store the stack address to restore C runtime context from after
76*5096aeb2SMarc Bonnici 	 * returning from a synchronous entry into the SP.
77*5096aeb2SMarc Bonnici 	 */
78*5096aeb2SMarc Bonnici 	uint64_t c_rt_ctx;
79*5096aeb2SMarc Bonnici 
80*5096aeb2SMarc Bonnici 	/* Space to maintain the architectural state of an SP. */
81*5096aeb2SMarc Bonnici 	cpu_context_t cpu_ctx;
82*5096aeb2SMarc Bonnici 
83*5096aeb2SMarc Bonnici 	/* Track the current runtime state of the SP. */
84*5096aeb2SMarc Bonnici 	enum sp_runtime_states rt_state;
85*5096aeb2SMarc Bonnici 
86*5096aeb2SMarc Bonnici 	/* Track the current runtime model of the SP. */
87*5096aeb2SMarc Bonnici 	enum sp_runtime_model rt_model;
88*5096aeb2SMarc Bonnici };
89*5096aeb2SMarc Bonnici 
90*5096aeb2SMarc Bonnici /*
91*5096aeb2SMarc Bonnici  * Structure to describe the cumulative properties of an SP.
92*5096aeb2SMarc Bonnici  */
93*5096aeb2SMarc Bonnici struct secure_partition_desc {
94*5096aeb2SMarc Bonnici 	/*
95*5096aeb2SMarc Bonnici 	 * Execution contexts allocated to this endpoint. Ideally,
96*5096aeb2SMarc Bonnici 	 * we need as many contexts as there are physical cpus only
97*5096aeb2SMarc Bonnici 	 * for a S-EL1 SP which is MP-pinned.
98*5096aeb2SMarc Bonnici 	 */
99*5096aeb2SMarc Bonnici 	struct sp_exec_ctx ec[PLATFORM_CORE_COUNT];
100*5096aeb2SMarc Bonnici 
101*5096aeb2SMarc Bonnici 	/* ID of the Secure Partition. */
102*5096aeb2SMarc Bonnici 	uint16_t sp_id;
103*5096aeb2SMarc Bonnici 
104*5096aeb2SMarc Bonnici 	/* Runtime EL. */
105*5096aeb2SMarc Bonnici 	enum sp_runtime_el runtime_el;
106*5096aeb2SMarc Bonnici 
107*5096aeb2SMarc Bonnici 	/* Partition UUID. */
108*5096aeb2SMarc Bonnici 	uint32_t uuid[4];
109*5096aeb2SMarc Bonnici 
110*5096aeb2SMarc Bonnici 	/* Partition Properties. */
111*5096aeb2SMarc Bonnici 	uint32_t properties;
112*5096aeb2SMarc Bonnici 
113*5096aeb2SMarc Bonnici 	/* Supported FF-A Version. */
114*5096aeb2SMarc Bonnici 	uint32_t ffa_version;
115*5096aeb2SMarc Bonnici 
116*5096aeb2SMarc Bonnici 	/* Execution State. */
117*5096aeb2SMarc Bonnici 	enum sp_execution_state execution_state;
118*5096aeb2SMarc Bonnici 
119*5096aeb2SMarc Bonnici 	/* Secondary entrypoint. Only valid for a S-EL1 SP. */
120*5096aeb2SMarc Bonnici 	uintptr_t secondary_ep;
121*5096aeb2SMarc Bonnici };
122*5096aeb2SMarc Bonnici 
123*5096aeb2SMarc Bonnici /*
124*5096aeb2SMarc Bonnici  * This define identifies the only SP that will be initialised and participate
125*5096aeb2SMarc Bonnici  * in FF-A communication. The implementation leaves the door open for more SPs
126*5096aeb2SMarc Bonnici  * to be managed in future but for now it is reasonable to assume that either a
127*5096aeb2SMarc Bonnici  * single S-EL0 or a single S-EL1 SP will be supported. This define will be used
128*5096aeb2SMarc Bonnici  * to identify which SP descriptor to initialise and manage during SP runtime.
129*5096aeb2SMarc Bonnici  */
130*5096aeb2SMarc Bonnici #define ACTIVE_SP_DESC_INDEX	0
131*5096aeb2SMarc Bonnici 
132*5096aeb2SMarc Bonnici /*
133*5096aeb2SMarc Bonnici  * Structure to describe the cumulative properties of the Hypervisor and
134*5096aeb2SMarc Bonnici  * NS-Endpoints.
135*5096aeb2SMarc Bonnici  */
136*5096aeb2SMarc Bonnici struct ns_endpoint_desc {
137*5096aeb2SMarc Bonnici 	/*
138*5096aeb2SMarc Bonnici 	 * ID of the NS-Endpoint or Hypervisor.
139*5096aeb2SMarc Bonnici 	 */
140*5096aeb2SMarc Bonnici 	uint16_t ns_ep_id;
141*5096aeb2SMarc Bonnici 
142*5096aeb2SMarc Bonnici 	/*
143*5096aeb2SMarc Bonnici 	 * Supported FF-A Version.
144*5096aeb2SMarc Bonnici 	 */
145*5096aeb2SMarc Bonnici 	uint32_t ffa_version;
146*5096aeb2SMarc Bonnici };
147*5096aeb2SMarc Bonnici 
148*5096aeb2SMarc Bonnici /* Setup Function for different SP types. */
149*5096aeb2SMarc Bonnici void spmc_sp_common_setup(struct secure_partition_desc *sp,
150*5096aeb2SMarc Bonnici 			  entry_point_info_t *ep_info);
151*5096aeb2SMarc Bonnici void spmc_el1_sp_setup(struct secure_partition_desc *sp,
152*5096aeb2SMarc Bonnici 		       entry_point_info_t *ep_info);
153*5096aeb2SMarc Bonnici void spmc_sp_common_ep_commit(struct secure_partition_desc *sp,
154*5096aeb2SMarc Bonnici 			      entry_point_info_t *ep_info);
155*5096aeb2SMarc Bonnici 
156*5096aeb2SMarc Bonnici /*
157*5096aeb2SMarc Bonnici  * Helper function to perform a synchronous entry into a SP.
158*5096aeb2SMarc Bonnici  */
159*5096aeb2SMarc Bonnici uint64_t spmc_sp_synchronous_entry(struct sp_exec_ctx *ec);
160*5096aeb2SMarc Bonnici 
161*5096aeb2SMarc Bonnici /*
162*5096aeb2SMarc Bonnici  * Helper function to obtain the descriptor of the current SP on a physical cpu.
163*5096aeb2SMarc Bonnici  */
164*5096aeb2SMarc Bonnici struct secure_partition_desc *spmc_get_current_sp_ctx(void);
165*5096aeb2SMarc Bonnici 
166*5096aeb2SMarc Bonnici /*
167*5096aeb2SMarc Bonnici  * Helper function to obtain the execution context of an SP on a
168*5096aeb2SMarc Bonnici  * physical cpu.
169*5096aeb2SMarc Bonnici  */
170*5096aeb2SMarc Bonnici struct sp_exec_ctx *spmc_get_sp_ec(struct secure_partition_desc *sp);
171*5096aeb2SMarc Bonnici 
172*5096aeb2SMarc Bonnici /*
173*5096aeb2SMarc Bonnici  * Helper function to obtain the index of the execution context of an SP on a
174*5096aeb2SMarc Bonnici  * physical cpu.
175*5096aeb2SMarc Bonnici  */
176*5096aeb2SMarc Bonnici unsigned int get_ec_index(struct secure_partition_desc *sp);
177*5096aeb2SMarc Bonnici 
178*5096aeb2SMarc Bonnici uint64_t spmc_ffa_error_return(void *handle, int error_code);
179*5096aeb2SMarc Bonnici 
180*5096aeb2SMarc Bonnici /*
181*5096aeb2SMarc Bonnici  * Ensure a partition ID does not clash and follows the secure world convention.
182*5096aeb2SMarc Bonnici  */
183*5096aeb2SMarc Bonnici bool is_ffa_secure_id_valid(uint16_t partition_id);
184*5096aeb2SMarc Bonnici 
185*5096aeb2SMarc Bonnici #endif /* SPMC_H */
186