xref: /rk3399_ARM-atf/services/std_svc/spm/el3_spmc/spmc.h (revision 06f3c7058c42a9f1a9f7df75ea2de71a000855e8)
1 /*
2  * Copyright (c) 2022-2023, ARM Limited and Contributors. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  */
6 
7 #ifndef SPMC_H
8 #define SPMC_H
9 
10 #include <stdint.h>
11 
12 #include <common/bl_common.h>
13 #include <lib/psci/psci.h>
14 #include <lib/spinlock.h>
15 #include <services/el3_spmc_logical_sp.h>
16 #include "spm_common.h"
17 
18 /*
19  * Ranges of FF-A IDs for Normal world and Secure world components. The
20  * convention matches that used by other SPMCs i.e. Hafnium and OP-TEE.
21  */
22 #define FFA_NWD_ID_BASE		0x0
23 #define FFA_NWD_ID_LIMIT	0x7FFF
24 #define FFA_SWD_ID_BASE		0x8000
25 #define FFA_SWD_ID_LIMIT	SPMD_DIRECT_MSG_ENDPOINT_ID - 1
26 #define FFA_SWD_ID_MASK		0x8000
27 
28 /* ID 0 is reserved for the normal world entity, (Hypervisor or OS Kernel). */
29 #define FFA_NWD_ID		U(0)
30 /* First ID is reserved for the SPMC */
31 #define FFA_SPMC_ID		U(FFA_SWD_ID_BASE)
32 /* SP IDs are allocated after the SPMC ID */
33 #define FFA_SP_ID_BASE		(FFA_SPMC_ID + 1)
34 /* Align with Hafnium implementation */
35 #define INV_SP_ID		0x7FFF
36 
37 /* FF-A Related helper macros. */
38 #define FFA_ID_MASK			U(0xFFFF)
39 #define FFA_PARTITION_ID_SHIFT		U(16)
40 #define FFA_FEATURES_BIT31_MASK		U(0x1u << 31)
41 #define FFA_FEATURES_RET_REQ_NS_BIT	U(0x1 << 1)
42 
43 #define FFA_RUN_EP_ID(ep_vcpu_ids) \
44 		((ep_vcpu_ids >> FFA_PARTITION_ID_SHIFT) & FFA_ID_MASK)
45 #define FFA_RUN_VCPU_ID(ep_vcpu_ids) \
46 		(ep_vcpu_ids & FFA_ID_MASK)
47 
48 #define FFA_PAGE_SIZE (4096)
49 #define FFA_RXTX_PAGE_COUNT_MASK 0x1F
50 
51 /* Ensure that the page size used by TF-A is 4k aligned. */
52 CASSERT((PAGE_SIZE % FFA_PAGE_SIZE) == 0, assert_aligned_page_size);
53 
54 /*
55  * Defines to allow an SP to subscribe for power management messages
56  */
57 #define FFA_PM_MSG_SUB_CPU_OFF			U(1 << 0)
58 #define FFA_PM_MSG_SUB_CPU_SUSPEND		U(1 << 1)
59 #define FFA_PM_MSG_SUB_CPU_SUSPEND_RESUME	U(1 << 2)
60 
61 /*
62  * Runtime states of an execution context as per the FF-A v1.1 specification.
63  */
64 enum sp_runtime_states {
65 	RT_STATE_WAITING,
66 	RT_STATE_RUNNING,
67 	RT_STATE_PREEMPTED,
68 	RT_STATE_BLOCKED
69 };
70 
71 /*
72  * Runtime model of an execution context as per the FF-A v1.1 specification. Its
73  * value is valid only if the execution context is not in the waiting state.
74  */
75 enum sp_runtime_model {
76 	RT_MODEL_DIR_REQ,
77 	RT_MODEL_RUN,
78 	RT_MODEL_INIT,
79 	RT_MODEL_INTR
80 };
81 
82 enum sp_runtime_el {
83 	EL1 = 0,
84 	S_EL0,
85 	S_EL1
86 };
87 
88 enum sp_execution_state {
89 	SP_STATE_AARCH64 = 0,
90 	SP_STATE_AARCH32
91 };
92 
93 enum mailbox_state {
94 	/* There is no message in the mailbox. */
95 	MAILBOX_STATE_EMPTY,
96 
97 	/* There is a message that has been populated in the mailbox. */
98 	MAILBOX_STATE_FULL,
99 };
100 
101 struct mailbox {
102 	enum mailbox_state state;
103 
104 	/* RX/TX Buffers. */
105 	void *rx_buffer;
106 	const void *tx_buffer;
107 
108 	/* Size of RX/TX Buffer. */
109 	uint32_t rxtx_page_count;
110 
111 	/* Lock access to mailbox. */
112 	spinlock_t lock;
113 };
114 
115 /*
116  * Execution context members for an SP. This is a bit like struct
117  * vcpu in a hypervisor.
118  */
119 struct sp_exec_ctx {
120 	/*
121 	 * Store the stack address to restore C runtime context from after
122 	 * returning from a synchronous entry into the SP.
123 	 */
124 	uint64_t c_rt_ctx;
125 
126 	/* Space to maintain the architectural state of an SP. */
127 	cpu_context_t cpu_ctx;
128 
129 	/* Track the current runtime state of the SP. */
130 	enum sp_runtime_states rt_state;
131 
132 	/* Track the current runtime model of the SP. */
133 	enum sp_runtime_model rt_model;
134 
135 	/* Track the source partition ID to validate a direct response. */
136 	uint16_t dir_req_origin_id;
137 
138 	/* Track direct message function id to validate a direct response. */
139 	uint16_t dir_req_funcid;
140 };
141 
142 /*
143  * Structure to describe the cumulative properties of an SP.
144  */
145 struct secure_partition_desc {
146 	/*
147 	 * Execution contexts allocated to this endpoint. Ideally,
148 	 * we need as many contexts as there are physical cpus only
149 	 * for a S-EL1 SP which is MP-pinned.
150 	 */
151 	struct sp_exec_ctx ec[PLATFORM_CORE_COUNT];
152 
153 	/* ID of the Secure Partition. */
154 	uint16_t sp_id;
155 
156 	/* Runtime EL. */
157 	enum sp_runtime_el runtime_el;
158 
159 	/* Partition UUID. */
160 	uint32_t uuid[4];
161 
162 	/* Partition Properties. */
163 	uint32_t properties;
164 
165 	/* Supported FF-A Version. */
166 	uint32_t ffa_version;
167 
168 	/* Execution State. */
169 	enum sp_execution_state execution_state;
170 
171 	/* Mailbox tracking. */
172 	struct mailbox mailbox;
173 
174 	/* Lock to protect the runtime state of a S-EL0 SP execution context. */
175 	spinlock_t rt_state_lock;
176 
177 	/* Pointer to translation table context of a S-EL0 SP. */
178 	xlat_ctx_t *xlat_ctx_handle;
179 
180 	/* Secondary entrypoint. Only valid for a S-EL1 SP. */
181 	uintptr_t secondary_ep;
182 
183 	/*
184 	 * Store whether the SP has subscribed to any power management messages.
185 	 */
186 	uint16_t pwr_mgmt_msgs;
187 
188 	/*
189 	 * Store whether the SP has requested the use of the NS bit for memory
190 	 * management transactions if it is using FF-A v1.0.
191 	 */
192 	bool ns_bit_requested;
193 };
194 
195 /*
196  * This define identifies the only SP that will be initialised and participate
197  * in FF-A communication. The implementation leaves the door open for more SPs
198  * to be managed in future but for now it is reasonable to assume that either a
199  * single S-EL0 or a single S-EL1 SP will be supported. This define will be used
200  * to identify which SP descriptor to initialise and manage during SP runtime.
201  */
202 #define ACTIVE_SP_DESC_INDEX	0
203 
204 /*
205  * Structure to describe the cumulative properties of the Hypervisor and
206  * NS-Endpoints.
207  */
208 struct ns_endpoint_desc {
209 	/*
210 	 * ID of the NS-Endpoint or Hypervisor.
211 	 */
212 	uint16_t ns_ep_id;
213 
214 	/*
215 	 * Mailbox tracking.
216 	 */
217 	struct mailbox mailbox;
218 
219 	/*
220 	 * Supported FF-A Version
221 	 */
222 	uint32_t ffa_version;
223 };
224 
225 /* Reference to power management hooks */
226 extern const spd_pm_ops_t spmc_pm;
227 
228 /* Setup Function for different SP types. */
229 void spmc_sp_common_setup(struct secure_partition_desc *sp,
230 			  entry_point_info_t *ep_info,
231 			  int32_t boot_info_reg);
232 void spmc_el1_sp_setup(struct secure_partition_desc *sp,
233 		       entry_point_info_t *ep_info);
234 void spmc_sp_common_ep_commit(struct secure_partition_desc *sp,
235 			      entry_point_info_t *ep_info);
236 void spmc_el0_sp_spsr_setup(entry_point_info_t *ep_info);
237 void spmc_el0_sp_setup(struct secure_partition_desc *sp,
238 		       int32_t boot_info_reg,
239 		       void *sp_manifest);
240 
241 /*
242  * Helper function to perform a synchronous entry into a SP.
243  */
244 uint64_t spmc_sp_synchronous_entry(struct sp_exec_ctx *ec);
245 
246 /*
247  * Helper function to obtain the descriptor of the current SP on a physical cpu.
248  */
249 struct secure_partition_desc *spmc_get_current_sp_ctx(void);
250 
251 /*
252  * Helper function to obtain the execution context of an SP on a
253  * physical cpu.
254  */
255 struct sp_exec_ctx *spmc_get_sp_ec(struct secure_partition_desc *sp);
256 
257 /*
258  * Helper function to obtain the index of the execution context of an SP on a
259  * physical cpu.
260  */
261 unsigned int get_ec_index(struct secure_partition_desc *sp);
262 
263 uint64_t spmc_ffa_error_return(void *handle, int error_code);
264 
265 /*
266  * Ensure a partition ID does not clash and follows the secure world convention.
267  */
268 bool is_ffa_secure_id_valid(uint16_t partition_id);
269 
270 /*
271  * Helper function to obtain the array storing the EL3
272  * Logical Partition descriptors.
273  */
274 struct el3_lp_desc *get_el3_lp_array(void);
275 
276 /*
277  * Helper function to obtain the RX/TX buffer pair descriptor of the Hypervisor
278  * or OS kernel in the normal world or the last SP that was run.
279  */
280 struct mailbox *spmc_get_mbox_desc(bool secure_origin);
281 
282 /*
283  * Helper function to obtain the context of an SP with a given partition ID.
284  */
285 struct secure_partition_desc *spmc_get_sp_ctx(uint16_t id);
286 
287 /*
288  * Add helper function to obtain the FF-A version of the calling
289  * partition.
290  */
291 uint32_t get_partition_ffa_version(bool secure_origin);
292 
293 
294 #endif /* SPMC_H */
295