1*5096aeb2SMarc Bonnici /* 2*5096aeb2SMarc Bonnici * Copyright (c) 2022, ARM Limited and Contributors. All rights reserved. 3*5096aeb2SMarc Bonnici * 4*5096aeb2SMarc Bonnici * SPDX-License-Identifier: BSD-3-Clause 5*5096aeb2SMarc Bonnici */ 6*5096aeb2SMarc Bonnici 7*5096aeb2SMarc Bonnici #ifndef SPMC_H 8*5096aeb2SMarc Bonnici #define SPMC_H 9*5096aeb2SMarc Bonnici 10*5096aeb2SMarc Bonnici #include <stdint.h> 11*5096aeb2SMarc Bonnici 12*5096aeb2SMarc Bonnici #include <lib/psci/psci.h> 13*5096aeb2SMarc Bonnici #include <lib/spinlock.h> 14*5096aeb2SMarc Bonnici #include "spm_common.h" 15*5096aeb2SMarc Bonnici 16*5096aeb2SMarc Bonnici /* 17*5096aeb2SMarc Bonnici * Ranges of FF-A IDs for Normal world and Secure world components. The 18*5096aeb2SMarc Bonnici * convention matches that used by other SPMCs i.e. Hafnium and OP-TEE. 19*5096aeb2SMarc Bonnici */ 20*5096aeb2SMarc Bonnici #define FFA_NWD_ID_BASE 0x0 21*5096aeb2SMarc Bonnici #define FFA_NWD_ID_LIMIT 0x7FFF 22*5096aeb2SMarc Bonnici #define FFA_SWD_ID_BASE 0x8000 23*5096aeb2SMarc Bonnici #define FFA_SWD_ID_LIMIT SPMD_DIRECT_MSG_ENDPOINT_ID - 1 24*5096aeb2SMarc Bonnici #define FFA_SWD_ID_MASK 0x8000 25*5096aeb2SMarc Bonnici 26*5096aeb2SMarc Bonnici /* First ID is reserved for the SPMC */ 27*5096aeb2SMarc Bonnici #define FFA_SPMC_ID U(FFA_SWD_ID_BASE) 28*5096aeb2SMarc Bonnici /* SP IDs are allocated after the SPMC ID */ 29*5096aeb2SMarc Bonnici #define FFA_SP_ID_BASE (FFA_SPMC_ID + 1) 30*5096aeb2SMarc Bonnici /* Align with Hafnium implementation */ 31*5096aeb2SMarc Bonnici #define INV_SP_ID 0x7FFF 32*5096aeb2SMarc Bonnici 33*5096aeb2SMarc Bonnici /* FF-A warm boot types. */ 34*5096aeb2SMarc Bonnici #define FFA_WB_TYPE_S2RAM 0 35*5096aeb2SMarc Bonnici #define FFA_WB_TYPE_NOTS2RAM 1 36*5096aeb2SMarc Bonnici 37*5096aeb2SMarc Bonnici /* 38*5096aeb2SMarc Bonnici * Runtime states of an execution context as per the FF-A v1.1 specification. 39*5096aeb2SMarc Bonnici */ 40*5096aeb2SMarc Bonnici enum sp_runtime_states { 41*5096aeb2SMarc Bonnici RT_STATE_WAITING, 42*5096aeb2SMarc Bonnici RT_STATE_RUNNING, 43*5096aeb2SMarc Bonnici RT_STATE_PREEMPTED, 44*5096aeb2SMarc Bonnici RT_STATE_BLOCKED 45*5096aeb2SMarc Bonnici }; 46*5096aeb2SMarc Bonnici 47*5096aeb2SMarc Bonnici /* 48*5096aeb2SMarc Bonnici * Runtime model of an execution context as per the FF-A v1.1 specification. Its 49*5096aeb2SMarc Bonnici * value is valid only if the execution context is not in the waiting state. 50*5096aeb2SMarc Bonnici */ 51*5096aeb2SMarc Bonnici enum sp_runtime_model { 52*5096aeb2SMarc Bonnici RT_MODEL_DIR_REQ, 53*5096aeb2SMarc Bonnici RT_MODEL_RUN, 54*5096aeb2SMarc Bonnici RT_MODEL_INIT, 55*5096aeb2SMarc Bonnici RT_MODEL_INTR 56*5096aeb2SMarc Bonnici }; 57*5096aeb2SMarc Bonnici 58*5096aeb2SMarc Bonnici enum sp_runtime_el { 59*5096aeb2SMarc Bonnici EL1 = 0, 60*5096aeb2SMarc Bonnici S_EL0, 61*5096aeb2SMarc Bonnici S_EL1 62*5096aeb2SMarc Bonnici }; 63*5096aeb2SMarc Bonnici 64*5096aeb2SMarc Bonnici enum sp_execution_state { 65*5096aeb2SMarc Bonnici SP_STATE_AARCH64 = 0, 66*5096aeb2SMarc Bonnici SP_STATE_AARCH32 67*5096aeb2SMarc Bonnici }; 68*5096aeb2SMarc Bonnici 69*5096aeb2SMarc Bonnici /* 70*5096aeb2SMarc Bonnici * Execution context members for an SP. This is a bit like struct 71*5096aeb2SMarc Bonnici * vcpu in a hypervisor. 72*5096aeb2SMarc Bonnici */ 73*5096aeb2SMarc Bonnici struct sp_exec_ctx { 74*5096aeb2SMarc Bonnici /* 75*5096aeb2SMarc Bonnici * Store the stack address to restore C runtime context from after 76*5096aeb2SMarc Bonnici * returning from a synchronous entry into the SP. 77*5096aeb2SMarc Bonnici */ 78*5096aeb2SMarc Bonnici uint64_t c_rt_ctx; 79*5096aeb2SMarc Bonnici 80*5096aeb2SMarc Bonnici /* Space to maintain the architectural state of an SP. */ 81*5096aeb2SMarc Bonnici cpu_context_t cpu_ctx; 82*5096aeb2SMarc Bonnici 83*5096aeb2SMarc Bonnici /* Track the current runtime state of the SP. */ 84*5096aeb2SMarc Bonnici enum sp_runtime_states rt_state; 85*5096aeb2SMarc Bonnici 86*5096aeb2SMarc Bonnici /* Track the current runtime model of the SP. */ 87*5096aeb2SMarc Bonnici enum sp_runtime_model rt_model; 88*5096aeb2SMarc Bonnici }; 89*5096aeb2SMarc Bonnici 90*5096aeb2SMarc Bonnici /* 91*5096aeb2SMarc Bonnici * Structure to describe the cumulative properties of an SP. 92*5096aeb2SMarc Bonnici */ 93*5096aeb2SMarc Bonnici struct secure_partition_desc { 94*5096aeb2SMarc Bonnici /* 95*5096aeb2SMarc Bonnici * Execution contexts allocated to this endpoint. Ideally, 96*5096aeb2SMarc Bonnici * we need as many contexts as there are physical cpus only 97*5096aeb2SMarc Bonnici * for a S-EL1 SP which is MP-pinned. 98*5096aeb2SMarc Bonnici */ 99*5096aeb2SMarc Bonnici struct sp_exec_ctx ec[PLATFORM_CORE_COUNT]; 100*5096aeb2SMarc Bonnici 101*5096aeb2SMarc Bonnici /* ID of the Secure Partition. */ 102*5096aeb2SMarc Bonnici uint16_t sp_id; 103*5096aeb2SMarc Bonnici 104*5096aeb2SMarc Bonnici /* Runtime EL. */ 105*5096aeb2SMarc Bonnici enum sp_runtime_el runtime_el; 106*5096aeb2SMarc Bonnici 107*5096aeb2SMarc Bonnici /* Partition UUID. */ 108*5096aeb2SMarc Bonnici uint32_t uuid[4]; 109*5096aeb2SMarc Bonnici 110*5096aeb2SMarc Bonnici /* Partition Properties. */ 111*5096aeb2SMarc Bonnici uint32_t properties; 112*5096aeb2SMarc Bonnici 113*5096aeb2SMarc Bonnici /* Supported FF-A Version. */ 114*5096aeb2SMarc Bonnici uint32_t ffa_version; 115*5096aeb2SMarc Bonnici 116*5096aeb2SMarc Bonnici /* Execution State. */ 117*5096aeb2SMarc Bonnici enum sp_execution_state execution_state; 118*5096aeb2SMarc Bonnici 119*5096aeb2SMarc Bonnici /* Secondary entrypoint. Only valid for a S-EL1 SP. */ 120*5096aeb2SMarc Bonnici uintptr_t secondary_ep; 121*5096aeb2SMarc Bonnici }; 122*5096aeb2SMarc Bonnici 123*5096aeb2SMarc Bonnici /* 124*5096aeb2SMarc Bonnici * This define identifies the only SP that will be initialised and participate 125*5096aeb2SMarc Bonnici * in FF-A communication. The implementation leaves the door open for more SPs 126*5096aeb2SMarc Bonnici * to be managed in future but for now it is reasonable to assume that either a 127*5096aeb2SMarc Bonnici * single S-EL0 or a single S-EL1 SP will be supported. This define will be used 128*5096aeb2SMarc Bonnici * to identify which SP descriptor to initialise and manage during SP runtime. 129*5096aeb2SMarc Bonnici */ 130*5096aeb2SMarc Bonnici #define ACTIVE_SP_DESC_INDEX 0 131*5096aeb2SMarc Bonnici 132*5096aeb2SMarc Bonnici /* 133*5096aeb2SMarc Bonnici * Structure to describe the cumulative properties of the Hypervisor and 134*5096aeb2SMarc Bonnici * NS-Endpoints. 135*5096aeb2SMarc Bonnici */ 136*5096aeb2SMarc Bonnici struct ns_endpoint_desc { 137*5096aeb2SMarc Bonnici /* 138*5096aeb2SMarc Bonnici * ID of the NS-Endpoint or Hypervisor. 139*5096aeb2SMarc Bonnici */ 140*5096aeb2SMarc Bonnici uint16_t ns_ep_id; 141*5096aeb2SMarc Bonnici 142*5096aeb2SMarc Bonnici /* 143*5096aeb2SMarc Bonnici * Supported FF-A Version. 144*5096aeb2SMarc Bonnici */ 145*5096aeb2SMarc Bonnici uint32_t ffa_version; 146*5096aeb2SMarc Bonnici }; 147*5096aeb2SMarc Bonnici 148*5096aeb2SMarc Bonnici /* Setup Function for different SP types. */ 149*5096aeb2SMarc Bonnici void spmc_sp_common_setup(struct secure_partition_desc *sp, 150*5096aeb2SMarc Bonnici entry_point_info_t *ep_info); 151*5096aeb2SMarc Bonnici void spmc_el1_sp_setup(struct secure_partition_desc *sp, 152*5096aeb2SMarc Bonnici entry_point_info_t *ep_info); 153*5096aeb2SMarc Bonnici void spmc_sp_common_ep_commit(struct secure_partition_desc *sp, 154*5096aeb2SMarc Bonnici entry_point_info_t *ep_info); 155*5096aeb2SMarc Bonnici 156*5096aeb2SMarc Bonnici /* 157*5096aeb2SMarc Bonnici * Helper function to perform a synchronous entry into a SP. 158*5096aeb2SMarc Bonnici */ 159*5096aeb2SMarc Bonnici uint64_t spmc_sp_synchronous_entry(struct sp_exec_ctx *ec); 160*5096aeb2SMarc Bonnici 161*5096aeb2SMarc Bonnici /* 162*5096aeb2SMarc Bonnici * Helper function to obtain the descriptor of the current SP on a physical cpu. 163*5096aeb2SMarc Bonnici */ 164*5096aeb2SMarc Bonnici struct secure_partition_desc *spmc_get_current_sp_ctx(void); 165*5096aeb2SMarc Bonnici 166*5096aeb2SMarc Bonnici /* 167*5096aeb2SMarc Bonnici * Helper function to obtain the execution context of an SP on a 168*5096aeb2SMarc Bonnici * physical cpu. 169*5096aeb2SMarc Bonnici */ 170*5096aeb2SMarc Bonnici struct sp_exec_ctx *spmc_get_sp_ec(struct secure_partition_desc *sp); 171*5096aeb2SMarc Bonnici 172*5096aeb2SMarc Bonnici /* 173*5096aeb2SMarc Bonnici * Helper function to obtain the index of the execution context of an SP on a 174*5096aeb2SMarc Bonnici * physical cpu. 175*5096aeb2SMarc Bonnici */ 176*5096aeb2SMarc Bonnici unsigned int get_ec_index(struct secure_partition_desc *sp); 177*5096aeb2SMarc Bonnici 178*5096aeb2SMarc Bonnici uint64_t spmc_ffa_error_return(void *handle, int error_code); 179*5096aeb2SMarc Bonnici 180*5096aeb2SMarc Bonnici /* 181*5096aeb2SMarc Bonnici * Ensure a partition ID does not clash and follows the secure world convention. 182*5096aeb2SMarc Bonnici */ 183*5096aeb2SMarc Bonnici bool is_ffa_secure_id_valid(uint16_t partition_id); 184*5096aeb2SMarc Bonnici 185*5096aeb2SMarc Bonnici #endif /* SPMC_H */ 186