15096aeb2SMarc Bonnici /* 248db2b01SNishant Sharma * Copyright (c) 2022-2023, ARM Limited and Contributors. All rights reserved. 35096aeb2SMarc Bonnici * 45096aeb2SMarc Bonnici * SPDX-License-Identifier: BSD-3-Clause 55096aeb2SMarc Bonnici */ 65096aeb2SMarc Bonnici 75096aeb2SMarc Bonnici #ifndef SPMC_H 85096aeb2SMarc Bonnici #define SPMC_H 95096aeb2SMarc Bonnici 105096aeb2SMarc Bonnici #include <stdint.h> 115096aeb2SMarc Bonnici 12885e2683SClaus Pedersen #include <common/bl_common.h> 135096aeb2SMarc Bonnici #include <lib/psci/psci.h> 145096aeb2SMarc Bonnici #include <lib/spinlock.h> 157affa25cSMarc Bonnici #include <services/el3_spmc_logical_sp.h> 165096aeb2SMarc Bonnici #include "spm_common.h" 175096aeb2SMarc Bonnici 185096aeb2SMarc Bonnici /* 195096aeb2SMarc Bonnici * Ranges of FF-A IDs for Normal world and Secure world components. The 205096aeb2SMarc Bonnici * convention matches that used by other SPMCs i.e. Hafnium and OP-TEE. 215096aeb2SMarc Bonnici */ 225096aeb2SMarc Bonnici #define FFA_NWD_ID_BASE 0x0 235096aeb2SMarc Bonnici #define FFA_NWD_ID_LIMIT 0x7FFF 245096aeb2SMarc Bonnici #define FFA_SWD_ID_BASE 0x8000 255096aeb2SMarc Bonnici #define FFA_SWD_ID_LIMIT SPMD_DIRECT_MSG_ENDPOINT_ID - 1 265096aeb2SMarc Bonnici #define FFA_SWD_ID_MASK 0x8000 275096aeb2SMarc Bonnici 28c4db76f0SMarc Bonnici /* ID 0 is reserved for the normal world entity, (Hypervisor or OS Kernel). */ 29c4db76f0SMarc Bonnici #define FFA_NWD_ID U(0) 305096aeb2SMarc Bonnici /* First ID is reserved for the SPMC */ 315096aeb2SMarc Bonnici #define FFA_SPMC_ID U(FFA_SWD_ID_BASE) 325096aeb2SMarc Bonnici /* SP IDs are allocated after the SPMC ID */ 335096aeb2SMarc Bonnici #define FFA_SP_ID_BASE (FFA_SPMC_ID + 1) 345096aeb2SMarc Bonnici /* Align with Hafnium implementation */ 355096aeb2SMarc Bonnici #define INV_SP_ID 0x7FFF 365096aeb2SMarc Bonnici 3755a29638SMarc Bonnici /* FF-A Related helper macros. */ 38aad20c85SMarc Bonnici #define FFA_ID_MASK U(0xFFFF) 39aad20c85SMarc Bonnici #define FFA_PARTITION_ID_SHIFT U(16) 4055a29638SMarc Bonnici #define FFA_FEATURES_BIT31_MASK U(0x1u << 31) 410560b53eSMarc Bonnici #define FFA_FEATURES_RET_REQ_NS_BIT U(0x1 << 1) 4255a29638SMarc Bonnici 43aad20c85SMarc Bonnici #define FFA_RUN_EP_ID(ep_vcpu_ids) \ 44aad20c85SMarc Bonnici ((ep_vcpu_ids >> FFA_PARTITION_ID_SHIFT) & FFA_ID_MASK) 45aad20c85SMarc Bonnici #define FFA_RUN_VCPU_ID(ep_vcpu_ids) \ 46aad20c85SMarc Bonnici (ep_vcpu_ids & FFA_ID_MASK) 47aad20c85SMarc Bonnici 481a752245SMarc Bonnici #define FFA_PAGE_SIZE (4096) 491a752245SMarc Bonnici #define FFA_RXTX_PAGE_COUNT_MASK 0x1F 501a752245SMarc Bonnici 511a752245SMarc Bonnici /* Ensure that the page size used by TF-A is 4k aligned. */ 521a752245SMarc Bonnici CASSERT((PAGE_SIZE % FFA_PAGE_SIZE) == 0, assert_aligned_page_size); 531a752245SMarc Bonnici 545096aeb2SMarc Bonnici /* 5559bd2ad8SMarc Bonnici * Defines to allow an SP to subscribe for power management messages 5659bd2ad8SMarc Bonnici */ 5759bd2ad8SMarc Bonnici #define FFA_PM_MSG_SUB_CPU_OFF U(1 << 0) 5859bd2ad8SMarc Bonnici #define FFA_PM_MSG_SUB_CPU_SUSPEND U(1 << 1) 5959bd2ad8SMarc Bonnici #define FFA_PM_MSG_SUB_CPU_SUSPEND_RESUME U(1 << 2) 6059bd2ad8SMarc Bonnici 6159bd2ad8SMarc Bonnici /* 625096aeb2SMarc Bonnici * Runtime states of an execution context as per the FF-A v1.1 specification. 635096aeb2SMarc Bonnici */ 645096aeb2SMarc Bonnici enum sp_runtime_states { 655096aeb2SMarc Bonnici RT_STATE_WAITING, 665096aeb2SMarc Bonnici RT_STATE_RUNNING, 675096aeb2SMarc Bonnici RT_STATE_PREEMPTED, 685096aeb2SMarc Bonnici RT_STATE_BLOCKED 695096aeb2SMarc Bonnici }; 705096aeb2SMarc Bonnici 715096aeb2SMarc Bonnici /* 725096aeb2SMarc Bonnici * Runtime model of an execution context as per the FF-A v1.1 specification. Its 735096aeb2SMarc Bonnici * value is valid only if the execution context is not in the waiting state. 745096aeb2SMarc Bonnici */ 755096aeb2SMarc Bonnici enum sp_runtime_model { 765096aeb2SMarc Bonnici RT_MODEL_DIR_REQ, 775096aeb2SMarc Bonnici RT_MODEL_RUN, 785096aeb2SMarc Bonnici RT_MODEL_INIT, 795096aeb2SMarc Bonnici RT_MODEL_INTR 805096aeb2SMarc Bonnici }; 815096aeb2SMarc Bonnici 825096aeb2SMarc Bonnici enum sp_runtime_el { 835096aeb2SMarc Bonnici EL1 = 0, 845096aeb2SMarc Bonnici S_EL0, 855096aeb2SMarc Bonnici S_EL1 865096aeb2SMarc Bonnici }; 875096aeb2SMarc Bonnici 885096aeb2SMarc Bonnici enum sp_execution_state { 895096aeb2SMarc Bonnici SP_STATE_AARCH64 = 0, 905096aeb2SMarc Bonnici SP_STATE_AARCH32 915096aeb2SMarc Bonnici }; 925096aeb2SMarc Bonnici 93e1df6008SMarc Bonnici enum mailbox_state { 94e1df6008SMarc Bonnici /* There is no message in the mailbox. */ 95e1df6008SMarc Bonnici MAILBOX_STATE_EMPTY, 96e1df6008SMarc Bonnici 97e1df6008SMarc Bonnici /* There is a message that has been populated in the mailbox. */ 98e1df6008SMarc Bonnici MAILBOX_STATE_FULL, 99e1df6008SMarc Bonnici }; 100e1df6008SMarc Bonnici 101e1df6008SMarc Bonnici struct mailbox { 102e1df6008SMarc Bonnici enum mailbox_state state; 103e1df6008SMarc Bonnici 104e1df6008SMarc Bonnici /* RX/TX Buffers. */ 105e1df6008SMarc Bonnici void *rx_buffer; 106e1df6008SMarc Bonnici const void *tx_buffer; 107e1df6008SMarc Bonnici 108e1df6008SMarc Bonnici /* Size of RX/TX Buffer. */ 109e1df6008SMarc Bonnici uint32_t rxtx_page_count; 110e1df6008SMarc Bonnici 111e1df6008SMarc Bonnici /* Lock access to mailbox. */ 112e1df6008SMarc Bonnici spinlock_t lock; 113*c55b519eSAndrei Homescu 114*c55b519eSAndrei Homescu /* The offset of the last transmitted RX fragment */ 115*c55b519eSAndrei Homescu uint32_t last_rx_fragment_offset; 116*c55b519eSAndrei Homescu 117*c55b519eSAndrei Homescu /* The offset of the next RX fragment to transmit */ 118*c55b519eSAndrei Homescu uint32_t next_rx_fragment_offset; 119e1df6008SMarc Bonnici }; 120e1df6008SMarc Bonnici 1215096aeb2SMarc Bonnici /* 1225096aeb2SMarc Bonnici * Execution context members for an SP. This is a bit like struct 1235096aeb2SMarc Bonnici * vcpu in a hypervisor. 1245096aeb2SMarc Bonnici */ 1255096aeb2SMarc Bonnici struct sp_exec_ctx { 1265096aeb2SMarc Bonnici /* 1275096aeb2SMarc Bonnici * Store the stack address to restore C runtime context from after 1285096aeb2SMarc Bonnici * returning from a synchronous entry into the SP. 1295096aeb2SMarc Bonnici */ 1305096aeb2SMarc Bonnici uint64_t c_rt_ctx; 1315096aeb2SMarc Bonnici 1325096aeb2SMarc Bonnici /* Space to maintain the architectural state of an SP. */ 1335096aeb2SMarc Bonnici cpu_context_t cpu_ctx; 1345096aeb2SMarc Bonnici 1355096aeb2SMarc Bonnici /* Track the current runtime state of the SP. */ 1365096aeb2SMarc Bonnici enum sp_runtime_states rt_state; 1375096aeb2SMarc Bonnici 1385096aeb2SMarc Bonnici /* Track the current runtime model of the SP. */ 1395096aeb2SMarc Bonnici enum sp_runtime_model rt_model; 14048fe24c5SMarc Bonnici 14148fe24c5SMarc Bonnici /* Track the source partition ID to validate a direct response. */ 14248fe24c5SMarc Bonnici uint16_t dir_req_origin_id; 14309a580b7SLevi Yun 14409a580b7SLevi Yun /* Track direct message function id to validate a direct response. */ 14509a580b7SLevi Yun uint16_t dir_req_funcid; 1465096aeb2SMarc Bonnici }; 1475096aeb2SMarc Bonnici 1485096aeb2SMarc Bonnici /* 1495096aeb2SMarc Bonnici * Structure to describe the cumulative properties of an SP. 1505096aeb2SMarc Bonnici */ 1515096aeb2SMarc Bonnici struct secure_partition_desc { 1525096aeb2SMarc Bonnici /* 1535096aeb2SMarc Bonnici * Execution contexts allocated to this endpoint. Ideally, 1545096aeb2SMarc Bonnici * we need as many contexts as there are physical cpus only 1555096aeb2SMarc Bonnici * for a S-EL1 SP which is MP-pinned. 1565096aeb2SMarc Bonnici */ 1575096aeb2SMarc Bonnici struct sp_exec_ctx ec[PLATFORM_CORE_COUNT]; 1585096aeb2SMarc Bonnici 1595096aeb2SMarc Bonnici /* ID of the Secure Partition. */ 1605096aeb2SMarc Bonnici uint16_t sp_id; 1615096aeb2SMarc Bonnici 1625096aeb2SMarc Bonnici /* Runtime EL. */ 1635096aeb2SMarc Bonnici enum sp_runtime_el runtime_el; 1645096aeb2SMarc Bonnici 1655096aeb2SMarc Bonnici /* Partition UUID. */ 1665096aeb2SMarc Bonnici uint32_t uuid[4]; 1675096aeb2SMarc Bonnici 1685096aeb2SMarc Bonnici /* Partition Properties. */ 1695096aeb2SMarc Bonnici uint32_t properties; 1705096aeb2SMarc Bonnici 1715096aeb2SMarc Bonnici /* Supported FF-A Version. */ 1725096aeb2SMarc Bonnici uint32_t ffa_version; 1735096aeb2SMarc Bonnici 1745096aeb2SMarc Bonnici /* Execution State. */ 1755096aeb2SMarc Bonnici enum sp_execution_state execution_state; 1765096aeb2SMarc Bonnici 177e1df6008SMarc Bonnici /* Mailbox tracking. */ 178e1df6008SMarc Bonnici struct mailbox mailbox; 179e1df6008SMarc Bonnici 1805ed8e255SNishant Sharma /* Lock to protect the runtime state of a S-EL0 SP execution context. */ 1815ed8e255SNishant Sharma spinlock_t rt_state_lock; 1825ed8e255SNishant Sharma 18348db2b01SNishant Sharma /* Pointer to translation table context of a S-EL0 SP. */ 18448db2b01SNishant Sharma xlat_ctx_t *xlat_ctx_handle; 18548db2b01SNishant Sharma 1865096aeb2SMarc Bonnici /* Secondary entrypoint. Only valid for a S-EL1 SP. */ 1875096aeb2SMarc Bonnici uintptr_t secondary_ep; 18859bd2ad8SMarc Bonnici 18959bd2ad8SMarc Bonnici /* 19059bd2ad8SMarc Bonnici * Store whether the SP has subscribed to any power management messages. 19159bd2ad8SMarc Bonnici */ 19259bd2ad8SMarc Bonnici uint16_t pwr_mgmt_msgs; 1930560b53eSMarc Bonnici 1940560b53eSMarc Bonnici /* 1950560b53eSMarc Bonnici * Store whether the SP has requested the use of the NS bit for memory 1960560b53eSMarc Bonnici * management transactions if it is using FF-A v1.0. 1970560b53eSMarc Bonnici */ 1980560b53eSMarc Bonnici bool ns_bit_requested; 1995096aeb2SMarc Bonnici }; 2005096aeb2SMarc Bonnici 2015096aeb2SMarc Bonnici /* 2025096aeb2SMarc Bonnici * This define identifies the only SP that will be initialised and participate 2035096aeb2SMarc Bonnici * in FF-A communication. The implementation leaves the door open for more SPs 2045096aeb2SMarc Bonnici * to be managed in future but for now it is reasonable to assume that either a 2055096aeb2SMarc Bonnici * single S-EL0 or a single S-EL1 SP will be supported. This define will be used 2065096aeb2SMarc Bonnici * to identify which SP descriptor to initialise and manage during SP runtime. 2075096aeb2SMarc Bonnici */ 2085096aeb2SMarc Bonnici #define ACTIVE_SP_DESC_INDEX 0 2095096aeb2SMarc Bonnici 2105096aeb2SMarc Bonnici /* 2115096aeb2SMarc Bonnici * Structure to describe the cumulative properties of the Hypervisor and 2125096aeb2SMarc Bonnici * NS-Endpoints. 2135096aeb2SMarc Bonnici */ 2145096aeb2SMarc Bonnici struct ns_endpoint_desc { 2155096aeb2SMarc Bonnici /* 2165096aeb2SMarc Bonnici * ID of the NS-Endpoint or Hypervisor. 2175096aeb2SMarc Bonnici */ 2185096aeb2SMarc Bonnici uint16_t ns_ep_id; 2195096aeb2SMarc Bonnici 2205096aeb2SMarc Bonnici /* 221e1df6008SMarc Bonnici * Mailbox tracking. 222e1df6008SMarc Bonnici */ 223e1df6008SMarc Bonnici struct mailbox mailbox; 224e1df6008SMarc Bonnici 225e1df6008SMarc Bonnici /* 226e1df6008SMarc Bonnici * Supported FF-A Version 2275096aeb2SMarc Bonnici */ 2285096aeb2SMarc Bonnici uint32_t ffa_version; 2295096aeb2SMarc Bonnici }; 2305096aeb2SMarc Bonnici 23159bd2ad8SMarc Bonnici /* Reference to power management hooks */ 23259bd2ad8SMarc Bonnici extern const spd_pm_ops_t spmc_pm; 23359bd2ad8SMarc Bonnici 2345096aeb2SMarc Bonnici /* Setup Function for different SP types. */ 2355096aeb2SMarc Bonnici void spmc_sp_common_setup(struct secure_partition_desc *sp, 2362e219215SAchin Gupta entry_point_info_t *ep_info, 2372e219215SAchin Gupta int32_t boot_info_reg); 2385096aeb2SMarc Bonnici void spmc_el1_sp_setup(struct secure_partition_desc *sp, 2395096aeb2SMarc Bonnici entry_point_info_t *ep_info); 2405096aeb2SMarc Bonnici void spmc_sp_common_ep_commit(struct secure_partition_desc *sp, 2415096aeb2SMarc Bonnici entry_point_info_t *ep_info); 24248db2b01SNishant Sharma void spmc_el0_sp_spsr_setup(entry_point_info_t *ep_info); 24348db2b01SNishant Sharma void spmc_el0_sp_setup(struct secure_partition_desc *sp, 24483c3da77SNishant Sharma int32_t boot_info_reg, 24583c3da77SNishant Sharma void *sp_manifest); 2465096aeb2SMarc Bonnici 2475096aeb2SMarc Bonnici /* 2485096aeb2SMarc Bonnici * Helper function to perform a synchronous entry into a SP. 2495096aeb2SMarc Bonnici */ 2505096aeb2SMarc Bonnici uint64_t spmc_sp_synchronous_entry(struct sp_exec_ctx *ec); 2515096aeb2SMarc Bonnici 2525096aeb2SMarc Bonnici /* 2535096aeb2SMarc Bonnici * Helper function to obtain the descriptor of the current SP on a physical cpu. 2545096aeb2SMarc Bonnici */ 2555096aeb2SMarc Bonnici struct secure_partition_desc *spmc_get_current_sp_ctx(void); 2565096aeb2SMarc Bonnici 2575096aeb2SMarc Bonnici /* 2585096aeb2SMarc Bonnici * Helper function to obtain the execution context of an SP on a 2595096aeb2SMarc Bonnici * physical cpu. 2605096aeb2SMarc Bonnici */ 2615096aeb2SMarc Bonnici struct sp_exec_ctx *spmc_get_sp_ec(struct secure_partition_desc *sp); 2625096aeb2SMarc Bonnici 2635096aeb2SMarc Bonnici /* 2645096aeb2SMarc Bonnici * Helper function to obtain the index of the execution context of an SP on a 2655096aeb2SMarc Bonnici * physical cpu. 2665096aeb2SMarc Bonnici */ 2675096aeb2SMarc Bonnici unsigned int get_ec_index(struct secure_partition_desc *sp); 2685096aeb2SMarc Bonnici 2695096aeb2SMarc Bonnici uint64_t spmc_ffa_error_return(void *handle, int error_code); 2705096aeb2SMarc Bonnici 2715096aeb2SMarc Bonnici /* 2725096aeb2SMarc Bonnici * Ensure a partition ID does not clash and follows the secure world convention. 2735096aeb2SMarc Bonnici */ 2745096aeb2SMarc Bonnici bool is_ffa_secure_id_valid(uint16_t partition_id); 2755096aeb2SMarc Bonnici 2767affa25cSMarc Bonnici /* 2777affa25cSMarc Bonnici * Helper function to obtain the array storing the EL3 2787affa25cSMarc Bonnici * Logical Partition descriptors. 2797affa25cSMarc Bonnici */ 2807affa25cSMarc Bonnici struct el3_lp_desc *get_el3_lp_array(void); 2817affa25cSMarc Bonnici 282f16b6ee3SMarc Bonnici /* 283f16b6ee3SMarc Bonnici * Helper function to obtain the RX/TX buffer pair descriptor of the Hypervisor 284f16b6ee3SMarc Bonnici * or OS kernel in the normal world or the last SP that was run. 285f16b6ee3SMarc Bonnici */ 286f16b6ee3SMarc Bonnici struct mailbox *spmc_get_mbox_desc(bool secure_origin); 287f16b6ee3SMarc Bonnici 288f0244e5dSMarc Bonnici /* 289f0244e5dSMarc Bonnici * Helper function to obtain the context of an SP with a given partition ID. 290f0244e5dSMarc Bonnici */ 291f0244e5dSMarc Bonnici struct secure_partition_desc *spmc_get_sp_ctx(uint16_t id); 292f0244e5dSMarc Bonnici 2937e804f96SMarc Bonnici /* 2947e804f96SMarc Bonnici * Add helper function to obtain the FF-A version of the calling 2957e804f96SMarc Bonnici * partition. 2967e804f96SMarc Bonnici */ 2977e804f96SMarc Bonnici uint32_t get_partition_ffa_version(bool secure_origin); 2987e804f96SMarc Bonnici 299f0244e5dSMarc Bonnici 3005096aeb2SMarc Bonnici #endif /* SPMC_H */ 301