xref: /rk3399_ARM-atf/services/std_svc/spm/el3_spmc/spmc.h (revision 030e4d0c1b87cc5936a502428ba53eadc784c6cb)
1 /*
2  * Copyright (c) 2022-2023, ARM Limited and Contributors. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  */
6 
7 #ifndef SPMC_H
8 #define SPMC_H
9 
10 #include <stdint.h>
11 
12 #include <common/bl_common.h>
13 #include <lib/psci/psci.h>
14 #include <lib/spinlock.h>
15 #include <services/el3_spmc_logical_sp.h>
16 #include "spm_common.h"
17 
18 /*
19  * Ranges of FF-A IDs for Normal world and Secure world components. The
20  * convention matches that used by other SPMCs i.e. Hafnium and OP-TEE.
21  */
22 #define FFA_NWD_ID_BASE		0x0
23 #define FFA_NWD_ID_LIMIT	0x7FFF
24 #define FFA_SWD_ID_BASE		0x8000
25 #define FFA_SWD_ID_LIMIT	SPMD_DIRECT_MSG_ENDPOINT_ID - 1
26 #define FFA_SWD_ID_MASK		0x8000
27 
28 /* ID 0 is reserved for the normal world entity, (Hypervisor or OS Kernel). */
29 #define FFA_NWD_ID		U(0)
30 /* First ID is reserved for the SPMC */
31 #define FFA_SPMC_ID		U(FFA_SWD_ID_BASE)
32 /* SP IDs are allocated after the SPMC ID */
33 #define FFA_SP_ID_BASE		(FFA_SPMC_ID + 1)
34 /* Align with Hafnium implementation */
35 #define INV_SP_ID		0x7FFF
36 
37 /* FF-A Related helper macros. */
38 #define FFA_ID_MASK			U(0xFFFF)
39 #define FFA_PARTITION_ID_SHIFT		U(16)
40 #define FFA_FEATURES_BIT31_MASK		U(0x1u << 31)
41 #define FFA_FEATURES_RET_REQ_NS_BIT	U(0x1 << 1)
42 
43 #define FFA_RUN_EP_ID(ep_vcpu_ids) \
44 		((ep_vcpu_ids >> FFA_PARTITION_ID_SHIFT) & FFA_ID_MASK)
45 #define FFA_RUN_VCPU_ID(ep_vcpu_ids) \
46 		(ep_vcpu_ids & FFA_ID_MASK)
47 
48 #define FFA_PAGE_SIZE (4096)
49 #define FFA_RXTX_PAGE_COUNT_MASK 0x1F
50 
51 /* Ensure that the page size used by TF-A is 4k aligned. */
52 CASSERT((PAGE_SIZE % FFA_PAGE_SIZE) == 0, assert_aligned_page_size);
53 
54 /*
55  * Defines to allow an SP to subscribe for power management messages
56  */
57 #define FFA_PM_MSG_SUB_CPU_OFF			U(1 << 0)
58 #define FFA_PM_MSG_SUB_CPU_SUSPEND		U(1 << 1)
59 #define FFA_PM_MSG_SUB_CPU_SUSPEND_RESUME	U(1 << 2)
60 
61 /*
62  * Runtime states of an execution context as per the FF-A v1.1 specification.
63  */
64 enum sp_runtime_states {
65 	RT_STATE_WAITING,
66 	RT_STATE_RUNNING,
67 	RT_STATE_PREEMPTED,
68 	RT_STATE_BLOCKED
69 };
70 
71 /*
72  * Runtime model of an execution context as per the FF-A v1.1 specification. Its
73  * value is valid only if the execution context is not in the waiting state.
74  */
75 enum sp_runtime_model {
76 	RT_MODEL_DIR_REQ,
77 	RT_MODEL_RUN,
78 	RT_MODEL_INIT,
79 	RT_MODEL_INTR
80 };
81 
82 enum sp_runtime_el {
83 	EL1 = 0,
84 	S_EL0,
85 	S_EL1
86 };
87 
88 enum sp_execution_state {
89 	SP_STATE_AARCH64 = 0,
90 	SP_STATE_AARCH32
91 };
92 
93 enum mailbox_state {
94 	/* There is no message in the mailbox. */
95 	MAILBOX_STATE_EMPTY,
96 
97 	/* There is a message that has been populated in the mailbox. */
98 	MAILBOX_STATE_FULL,
99 };
100 
101 struct mailbox {
102 	enum mailbox_state state;
103 
104 	/* RX/TX Buffers. */
105 	void *rx_buffer;
106 	const void *tx_buffer;
107 
108 	/* Size of RX/TX Buffer. */
109 	uint32_t rxtx_page_count;
110 
111 	/* Lock access to mailbox. */
112 	spinlock_t lock;
113 
114 	/* The offset of the last transmitted RX fragment */
115 	uint32_t last_rx_fragment_offset;
116 
117 	/* The offset of the next RX fragment to transmit */
118 	uint32_t next_rx_fragment_offset;
119 };
120 
121 /*
122  * Execution context members for an SP. This is a bit like struct
123  * vcpu in a hypervisor.
124  */
125 struct sp_exec_ctx {
126 	/*
127 	 * Store the stack address to restore C runtime context from after
128 	 * returning from a synchronous entry into the SP.
129 	 */
130 	uint64_t c_rt_ctx;
131 
132 	/* Space to maintain the architectural state of an SP. */
133 	cpu_context_t cpu_ctx;
134 
135 	/* Track the current runtime state of the SP. */
136 	enum sp_runtime_states rt_state;
137 
138 	/* Track the current runtime model of the SP. */
139 	enum sp_runtime_model rt_model;
140 
141 	/* Track the source partition ID to validate a direct response. */
142 	uint16_t dir_req_origin_id;
143 
144 	/* Track direct message function id to validate a direct response. */
145 	uint16_t dir_req_funcid;
146 };
147 
148 /*
149  * Structure to describe the cumulative properties of an SP.
150  */
151 struct secure_partition_desc {
152 	/*
153 	 * Execution contexts allocated to this endpoint. Ideally,
154 	 * we need as many contexts as there are physical cpus only
155 	 * for a S-EL1 SP which is MP-pinned.
156 	 */
157 	struct sp_exec_ctx ec[PLATFORM_CORE_COUNT];
158 
159 	/* ID of the Secure Partition. */
160 	uint16_t sp_id;
161 
162 	/* Runtime EL. */
163 	enum sp_runtime_el runtime_el;
164 
165 	/* Partition UUID. */
166 	uint32_t uuid[4];
167 
168 	/* Partition Properties. */
169 	uint32_t properties;
170 
171 	/* Supported FF-A Version. */
172 	uint32_t ffa_version;
173 
174 	/* Execution State. */
175 	enum sp_execution_state execution_state;
176 
177 	/* Mailbox tracking. */
178 	struct mailbox mailbox;
179 
180 	/* Lock to protect the runtime state of a S-EL0 SP execution context. */
181 	spinlock_t rt_state_lock;
182 
183 	/* Pointer to translation table context of a S-EL0 SP. */
184 	xlat_ctx_t *xlat_ctx_handle;
185 
186 	/* Secondary entrypoint. Only valid for a S-EL1 SP. */
187 	uintptr_t secondary_ep;
188 
189 	/*
190 	 * Store whether the SP has subscribed to any power management messages.
191 	 */
192 	uint16_t pwr_mgmt_msgs;
193 
194 	/*
195 	 * Store whether the SP has requested the use of the NS bit for memory
196 	 * management transactions if it is using FF-A v1.0.
197 	 */
198 	bool ns_bit_requested;
199 };
200 
201 /*
202  * This define identifies the only SP that will be initialised and participate
203  * in FF-A communication. The implementation leaves the door open for more SPs
204  * to be managed in future but for now it is reasonable to assume that either a
205  * single S-EL0 or a single S-EL1 SP will be supported. This define will be used
206  * to identify which SP descriptor to initialise and manage during SP runtime.
207  */
208 #define ACTIVE_SP_DESC_INDEX	0
209 
210 /*
211  * Structure to describe the cumulative properties of the Hypervisor and
212  * NS-Endpoints.
213  */
214 struct ns_endpoint_desc {
215 	/*
216 	 * ID of the NS-Endpoint or Hypervisor.
217 	 */
218 	uint16_t ns_ep_id;
219 
220 	/*
221 	 * Mailbox tracking.
222 	 */
223 	struct mailbox mailbox;
224 
225 	/*
226 	 * Supported FF-A Version
227 	 */
228 	uint32_t ffa_version;
229 };
230 
231 /* Reference to power management hooks */
232 extern const spd_pm_ops_t spmc_pm;
233 
234 /* Setup Function for different SP types. */
235 void spmc_sp_common_setup(struct secure_partition_desc *sp,
236 			  entry_point_info_t *ep_info,
237 			  int32_t boot_info_reg);
238 void spmc_el1_sp_setup(struct secure_partition_desc *sp,
239 		       entry_point_info_t *ep_info);
240 void spmc_sp_common_ep_commit(struct secure_partition_desc *sp,
241 			      entry_point_info_t *ep_info);
242 void spmc_el0_sp_spsr_setup(entry_point_info_t *ep_info);
243 void spmc_el0_sp_setup(struct secure_partition_desc *sp,
244 		       int32_t boot_info_reg,
245 		       void *sp_manifest);
246 
247 /*
248  * Helper function to perform a synchronous entry into a SP.
249  */
250 uint64_t spmc_sp_synchronous_entry(struct sp_exec_ctx *ec);
251 
252 /*
253  * Helper function to obtain the descriptor of the current SP on a physical cpu.
254  */
255 struct secure_partition_desc *spmc_get_current_sp_ctx(void);
256 
257 /*
258  * Helper function to obtain the execution context of an SP on a
259  * physical cpu.
260  */
261 struct sp_exec_ctx *spmc_get_sp_ec(struct secure_partition_desc *sp);
262 
263 /*
264  * Helper function to obtain the index of the execution context of an SP on a
265  * physical cpu.
266  */
267 unsigned int get_ec_index(struct secure_partition_desc *sp);
268 
269 uint64_t spmc_ffa_error_return(void *handle, int error_code);
270 
271 /*
272  * Ensure a partition ID does not clash and follows the secure world convention.
273  */
274 bool is_ffa_secure_id_valid(uint16_t partition_id);
275 
276 /*
277  * Helper function to obtain the array storing the EL3
278  * Logical Partition descriptors.
279  */
280 struct el3_lp_desc *get_el3_lp_array(void);
281 
282 /*
283  * Helper function to obtain the RX/TX buffer pair descriptor of the Hypervisor
284  * or OS kernel in the normal world or the last SP that was run.
285  */
286 struct mailbox *spmc_get_mbox_desc(bool secure_origin);
287 
288 /*
289  * Helper function to obtain the context of an SP with a given partition ID.
290  */
291 struct secure_partition_desc *spmc_get_sp_ctx(uint16_t id);
292 
293 /*
294  * Add helper function to obtain the FF-A version of the calling
295  * partition.
296  */
297 uint32_t get_partition_ffa_version(bool secure_origin);
298 
299 
300 #endif /* SPMC_H */
301