1 /* 2 * Copyright (c) 2022, ARM Limited and Contributors. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 7 #ifndef SPMC_H 8 #define SPMC_H 9 10 #include <stdint.h> 11 12 #include <common/bl_common.h> 13 #include <lib/psci/psci.h> 14 #include <lib/spinlock.h> 15 #include <services/el3_spmc_logical_sp.h> 16 #include "spm_common.h" 17 18 /* 19 * Ranges of FF-A IDs for Normal world and Secure world components. The 20 * convention matches that used by other SPMCs i.e. Hafnium and OP-TEE. 21 */ 22 #define FFA_NWD_ID_BASE 0x0 23 #define FFA_NWD_ID_LIMIT 0x7FFF 24 #define FFA_SWD_ID_BASE 0x8000 25 #define FFA_SWD_ID_LIMIT SPMD_DIRECT_MSG_ENDPOINT_ID - 1 26 #define FFA_SWD_ID_MASK 0x8000 27 28 /* ID 0 is reserved for the normal world entity, (Hypervisor or OS Kernel). */ 29 #define FFA_NWD_ID U(0) 30 /* First ID is reserved for the SPMC */ 31 #define FFA_SPMC_ID U(FFA_SWD_ID_BASE) 32 /* SP IDs are allocated after the SPMC ID */ 33 #define FFA_SP_ID_BASE (FFA_SPMC_ID + 1) 34 /* Align with Hafnium implementation */ 35 #define INV_SP_ID 0x7FFF 36 37 /* FF-A Related helper macros. */ 38 #define FFA_ID_MASK U(0xFFFF) 39 #define FFA_PARTITION_ID_SHIFT U(16) 40 #define FFA_FEATURES_BIT31_MASK U(0x1u << 31) 41 #define FFA_FEATURES_RET_REQ_NS_BIT U(0x1 << 1) 42 43 #define FFA_RUN_EP_ID(ep_vcpu_ids) \ 44 ((ep_vcpu_ids >> FFA_PARTITION_ID_SHIFT) & FFA_ID_MASK) 45 #define FFA_RUN_VCPU_ID(ep_vcpu_ids) \ 46 (ep_vcpu_ids & FFA_ID_MASK) 47 48 #define FFA_PAGE_SIZE (4096) 49 #define FFA_RXTX_PAGE_COUNT_MASK 0x1F 50 51 /* Ensure that the page size used by TF-A is 4k aligned. */ 52 CASSERT((PAGE_SIZE % FFA_PAGE_SIZE) == 0, assert_aligned_page_size); 53 54 /* 55 * Defines to allow an SP to subscribe for power management messages 56 */ 57 #define FFA_PM_MSG_SUB_CPU_OFF U(1 << 0) 58 #define FFA_PM_MSG_SUB_CPU_SUSPEND U(1 << 1) 59 #define FFA_PM_MSG_SUB_CPU_SUSPEND_RESUME U(1 << 2) 60 61 /* 62 * Runtime states of an execution context as per the FF-A v1.1 specification. 63 */ 64 enum sp_runtime_states { 65 RT_STATE_WAITING, 66 RT_STATE_RUNNING, 67 RT_STATE_PREEMPTED, 68 RT_STATE_BLOCKED 69 }; 70 71 /* 72 * Runtime model of an execution context as per the FF-A v1.1 specification. Its 73 * value is valid only if the execution context is not in the waiting state. 74 */ 75 enum sp_runtime_model { 76 RT_MODEL_DIR_REQ, 77 RT_MODEL_RUN, 78 RT_MODEL_INIT, 79 RT_MODEL_INTR 80 }; 81 82 enum sp_runtime_el { 83 EL1 = 0, 84 S_EL0, 85 S_EL1 86 }; 87 88 enum sp_execution_state { 89 SP_STATE_AARCH64 = 0, 90 SP_STATE_AARCH32 91 }; 92 93 enum mailbox_state { 94 /* There is no message in the mailbox. */ 95 MAILBOX_STATE_EMPTY, 96 97 /* There is a message that has been populated in the mailbox. */ 98 MAILBOX_STATE_FULL, 99 }; 100 101 struct mailbox { 102 enum mailbox_state state; 103 104 /* RX/TX Buffers. */ 105 void *rx_buffer; 106 const void *tx_buffer; 107 108 /* Size of RX/TX Buffer. */ 109 uint32_t rxtx_page_count; 110 111 /* Lock access to mailbox. */ 112 spinlock_t lock; 113 }; 114 115 /* 116 * Execution context members for an SP. This is a bit like struct 117 * vcpu in a hypervisor. 118 */ 119 struct sp_exec_ctx { 120 /* 121 * Store the stack address to restore C runtime context from after 122 * returning from a synchronous entry into the SP. 123 */ 124 uint64_t c_rt_ctx; 125 126 /* Space to maintain the architectural state of an SP. */ 127 cpu_context_t cpu_ctx; 128 129 /* Track the current runtime state of the SP. */ 130 enum sp_runtime_states rt_state; 131 132 /* Track the current runtime model of the SP. */ 133 enum sp_runtime_model rt_model; 134 135 /* Track the source partition ID to validate a direct response. */ 136 uint16_t dir_req_origin_id; 137 }; 138 139 /* 140 * Structure to describe the cumulative properties of an SP. 141 */ 142 struct secure_partition_desc { 143 /* 144 * Execution contexts allocated to this endpoint. Ideally, 145 * we need as many contexts as there are physical cpus only 146 * for a S-EL1 SP which is MP-pinned. 147 */ 148 struct sp_exec_ctx ec[PLATFORM_CORE_COUNT]; 149 150 /* ID of the Secure Partition. */ 151 uint16_t sp_id; 152 153 /* Runtime EL. */ 154 enum sp_runtime_el runtime_el; 155 156 /* Partition UUID. */ 157 uint32_t uuid[4]; 158 159 /* Partition Properties. */ 160 uint32_t properties; 161 162 /* Supported FF-A Version. */ 163 uint32_t ffa_version; 164 165 /* Execution State. */ 166 enum sp_execution_state execution_state; 167 168 /* Mailbox tracking. */ 169 struct mailbox mailbox; 170 171 /* Secondary entrypoint. Only valid for a S-EL1 SP. */ 172 uintptr_t secondary_ep; 173 174 /* 175 * Store whether the SP has subscribed to any power management messages. 176 */ 177 uint16_t pwr_mgmt_msgs; 178 179 /* 180 * Store whether the SP has requested the use of the NS bit for memory 181 * management transactions if it is using FF-A v1.0. 182 */ 183 bool ns_bit_requested; 184 }; 185 186 /* 187 * This define identifies the only SP that will be initialised and participate 188 * in FF-A communication. The implementation leaves the door open for more SPs 189 * to be managed in future but for now it is reasonable to assume that either a 190 * single S-EL0 or a single S-EL1 SP will be supported. This define will be used 191 * to identify which SP descriptor to initialise and manage during SP runtime. 192 */ 193 #define ACTIVE_SP_DESC_INDEX 0 194 195 /* 196 * Structure to describe the cumulative properties of the Hypervisor and 197 * NS-Endpoints. 198 */ 199 struct ns_endpoint_desc { 200 /* 201 * ID of the NS-Endpoint or Hypervisor. 202 */ 203 uint16_t ns_ep_id; 204 205 /* 206 * Mailbox tracking. 207 */ 208 struct mailbox mailbox; 209 210 /* 211 * Supported FF-A Version 212 */ 213 uint32_t ffa_version; 214 }; 215 216 /** 217 * Holds information returned for each partition by the FFA_PARTITION_INFO_GET 218 * interface. 219 */ 220 struct ffa_partition_info_v1_0 { 221 uint16_t ep_id; 222 uint16_t execution_ctx_count; 223 uint32_t properties; 224 }; 225 226 /* Extended structure for v1.1. */ 227 struct ffa_partition_info_v1_1 { 228 uint16_t ep_id; 229 uint16_t execution_ctx_count; 230 uint32_t properties; 231 uint32_t uuid[4]; 232 }; 233 234 /* FF-A Partition Info Get related macros. */ 235 #define FFA_PARTITION_INFO_GET_PROPERTIES_V1_0_MASK U(0x7) 236 #define FFA_PARTITION_INFO_GET_EXEC_STATE_SHIFT U(8) 237 #define FFA_PARTITION_INFO_GET_AARCH32_STATE U(0) 238 #define FFA_PARTITION_INFO_GET_AARCH64_STATE U(1) 239 240 /* Reference to power management hooks */ 241 extern const spd_pm_ops_t spmc_pm; 242 243 /* Setup Function for different SP types. */ 244 void spmc_sp_common_setup(struct secure_partition_desc *sp, 245 entry_point_info_t *ep_info, 246 int32_t boot_info_reg); 247 void spmc_el1_sp_setup(struct secure_partition_desc *sp, 248 entry_point_info_t *ep_info); 249 void spmc_sp_common_ep_commit(struct secure_partition_desc *sp, 250 entry_point_info_t *ep_info); 251 252 /* 253 * Helper function to perform a synchronous entry into a SP. 254 */ 255 uint64_t spmc_sp_synchronous_entry(struct sp_exec_ctx *ec); 256 257 /* 258 * Helper function to obtain the descriptor of the current SP on a physical cpu. 259 */ 260 struct secure_partition_desc *spmc_get_current_sp_ctx(void); 261 262 /* 263 * Helper function to obtain the execution context of an SP on a 264 * physical cpu. 265 */ 266 struct sp_exec_ctx *spmc_get_sp_ec(struct secure_partition_desc *sp); 267 268 /* 269 * Helper function to obtain the index of the execution context of an SP on a 270 * physical cpu. 271 */ 272 unsigned int get_ec_index(struct secure_partition_desc *sp); 273 274 uint64_t spmc_ffa_error_return(void *handle, int error_code); 275 276 /* 277 * Ensure a partition ID does not clash and follows the secure world convention. 278 */ 279 bool is_ffa_secure_id_valid(uint16_t partition_id); 280 281 /* 282 * Helper function to obtain the array storing the EL3 283 * Logical Partition descriptors. 284 */ 285 struct el3_lp_desc *get_el3_lp_array(void); 286 287 /* 288 * Helper function to obtain the RX/TX buffer pair descriptor of the Hypervisor 289 * or OS kernel in the normal world or the last SP that was run. 290 */ 291 struct mailbox *spmc_get_mbox_desc(bool secure_origin); 292 293 /* 294 * Helper function to obtain the context of an SP with a given partition ID. 295 */ 296 struct secure_partition_desc *spmc_get_sp_ctx(uint16_t id); 297 298 /* 299 * Add helper function to obtain the FF-A version of the calling 300 * partition. 301 */ 302 uint32_t get_partition_ffa_version(bool secure_origin); 303 304 305 #endif /* SPMC_H */ 306