blob: b3f7451822c66b3e55b0d61e70c792ae249ad003 [file] [log] [blame]
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +02001/*
Madhukar Pappireddy4d1f1122023-03-16 17:54:24 -05002 * Copyright (c) 2018-2023, Arm Limited. All rights reserved.
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +02003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <assert.h>
Antonio Nino Diaz43ef3932018-07-03 14:39:47 +01008#include <errno.h>
J-Alves9f6f0142020-06-17 15:37:59 +01009#include <debug.h>
Max Shvetsov103e0562021-02-04 16:58:31 +000010
J-Alveseeb25472021-03-11 09:54:21 +000011#include <cactus_message_loop.h>
J-Alves9f6f0142020-06-17 15:37:59 +010012#include <drivers/arm/pl011.h>
13#include <drivers/console.h>
J-Alves9f6f0142020-06-17 15:37:59 +010014#include <lib/aarch64/arch_helpers.h>
Max Shvetsov2263efb2020-11-12 17:30:11 +000015#include <lib/tftf_lib.h>
J-Alves9f6f0142020-06-17 15:37:59 +010016#include <lib/xlat_tables/xlat_mmu_helpers.h>
17#include <lib/xlat_tables/xlat_tables_v2.h>
Ruari Phippsddc661a2020-09-10 09:06:14 +010018
Daniel Boulbyce386b12022-03-29 18:36:36 +010019#include <ffa_helpers.h>
Max Shvetsov103e0562021-02-04 16:58:31 +000020#include <plat_arm.h>
21#include <plat/common/platform.h>
22#include <platform_def.h>
Ruari Phippsddc661a2020-09-10 09:06:14 +010023#include <sp_debug.h>
J-Alves5aecd982020-06-11 10:25:33 +010024#include <sp_helpers.h>
Olivier Deprez6967c242021-04-09 09:24:08 +020025#include <spm_helpers.h>
J-Alves9f6f0142020-06-17 15:37:59 +010026#include <std_svc.h>
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010027
Daniel Boulbyf3da5912022-04-01 12:31:52 +010028#include "sp_def.h"
29#include "sp_tests.h"
Max Shvetsov103e0562021-02-04 16:58:31 +000030#include "cactus.h"
J-Alves63cdaa72020-10-08 17:22:45 +010031
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +020032/* Host machine information injected by the build system in the ELF file. */
33extern const char build_message[];
34extern const char version_string[];
35
Max Shvetsov2263efb2020-11-12 17:30:11 +000036extern void secondary_cold_entry(void);
37
Manish Pandey87d4c702021-03-02 22:31:57 +000038/* Global ffa_id */
Daniel Boulbye79d2072021-03-03 11:34:53 +000039ffa_id_t g_ffa_id;
Manish Pandey87d4c702021-03-02 22:31:57 +000040
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010041/*
42 *
43 * Message loop function
44 * Notice we cannot use regular print functions because this serves to both
45 * "primary" and "secondary" VMs. Secondary VM cannot access UART directly
46 * but rather through Hafnium print hypercall.
47 *
48 */
J-Alves0e1e7ca2021-01-25 14:11:06 +000049
Daniel Boulbye79d2072021-03-03 11:34:53 +000050static void __dead2 message_loop(ffa_id_t vm_id, struct mailbox_buffers *mb)
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010051{
Daniel Boulbyce386b12022-03-29 18:36:36 +010052 struct ffa_value ffa_ret;
Daniel Boulbye79d2072021-03-03 11:34:53 +000053 ffa_id_t destination;
J-Alves1d203f12020-11-11 11:38:49 +000054
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010055 /*
J-Alves63cdaa72020-10-08 17:22:45 +010056 * This initial wait call is necessary to inform SPMD that
57 * SP initialization has completed. It blocks until receiving
58 * a direct message request.
59 */
60
J-Alves7581c382020-05-07 18:34:20 +010061 ffa_ret = ffa_msg_wait();
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010062
63 for (;;) {
J-Alves6cb21d92021-01-07 15:18:12 +000064 VERBOSE("Woke up with func id: %x\n", ffa_func_id(ffa_ret));
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010065
J-Alves6cb21d92021-01-07 15:18:12 +000066 if (ffa_func_id(ffa_ret) == FFA_ERROR) {
67 ERROR("Error: %x\n", ffa_error_code(ffa_ret));
J-Alvesda6ac322020-11-09 15:45:30 +000068 break;
69 }
70
J-Alves6cb21d92021-01-07 15:18:12 +000071 if (ffa_func_id(ffa_ret) != FFA_MSG_SEND_DIRECT_REQ_SMC32 &&
Madhukar Pappireddycd183ef2021-08-05 15:34:07 -050072 ffa_func_id(ffa_ret) != FFA_MSG_SEND_DIRECT_REQ_SMC64 &&
Olivier Deprez57245242022-08-24 16:19:27 +020073 ffa_func_id(ffa_ret) != FFA_INTERRUPT &&
74 ffa_func_id(ffa_ret) != FFA_RUN) {
J-Alves6cb21d92021-01-07 15:18:12 +000075 ERROR("%s(%u) unknown func id 0x%x\n",
76 __func__, vm_id, ffa_func_id(ffa_ret));
Olivier Deprez73d81cf2020-09-15 16:57:00 +020077 break;
Olivier Deprezafcdb7c2019-11-29 14:21:48 +010078 }
79
Olivier Deprez57245242022-08-24 16:19:27 +020080 if ((ffa_func_id(ffa_ret) == FFA_INTERRUPT) ||
81 (ffa_func_id(ffa_ret) == FFA_RUN)) {
Madhukar Pappireddycd183ef2021-08-05 15:34:07 -050082 /*
83 * Received FFA_INTERRUPT in waiting state.
84 * The interrupt id is passed although this is just
85 * informational as we're running with virtual
86 * interrupts unmasked and the interrupt is processed
87 * by the interrupt handler.
Olivier Deprez57245242022-08-24 16:19:27 +020088 *
89 * Received FFA_RUN in waiting state, the endpoint
90 * simply returns by FFA_MSG_WAIT.
Madhukar Pappireddycd183ef2021-08-05 15:34:07 -050091 */
92 ffa_ret = ffa_msg_wait();
93 continue;
94 }
J-Alvesda6ac322020-11-09 15:45:30 +000095
Madhukar Pappireddycd183ef2021-08-05 15:34:07 -050096 destination = ffa_dir_msg_dest(ffa_ret);
J-Alvesda6ac322020-11-09 15:45:30 +000097 if (destination != vm_id) {
J-Alves6cb21d92021-01-07 15:18:12 +000098 ERROR("%s(%u) invalid vm id 0x%x\n",
99 __func__, vm_id, destination);
Olivier Deprez73d81cf2020-09-15 16:57:00 +0200100 break;
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100101 }
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100102
J-Alves4cb9dee2021-03-03 13:59:52 +0000103 if (!cactus_handle_cmd(&ffa_ret, &ffa_ret, mb)) {
J-Alves63cdaa72020-10-08 17:22:45 +0100104 break;
105 }
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100106 }
Olivier Deprez73d81cf2020-09-15 16:57:00 +0200107
108 panic();
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100109}
110
111static const mmap_region_t cactus_mmap[] __attribute__((used)) = {
Arunachalam Ganapathy51be1fe2020-09-22 13:25:21 +0100112 /* PLAT_ARM_DEVICE0 area includes UART2 necessary to console */
113 MAP_REGION_FLAT(PLAT_ARM_DEVICE0_BASE, PLAT_ARM_DEVICE0_SIZE,
114 MT_DEVICE | MT_RW),
Madhukar Pappireddy172523b2020-12-31 19:25:33 -0600115 /* scratch memory allocated to be used for running SMMU tests */
116 MAP_REGION_FLAT(PLAT_CACTUS_MEMCPY_BASE, PLAT_CACTUS_MEMCPY_RANGE,
117 MT_MEMORY | MT_RW),
Madhukar Pappireddy5d4936a2024-02-12 18:49:21 -0600118#if PLAT_fvp
Madhukar Pappireddya08c7192023-10-18 17:49:32 -0500119 MAP_REGION_FLAT(PLAT_CACTUS_NS_MEMCPY_BASE, PLAT_CACTUS_MEMCPY_RANGE,
120 MT_MEMORY | MT_RW | MT_NS),
Madhukar Pappireddy5d4936a2024-02-12 18:49:21 -0600121#endif
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100122 {0}
123};
124
Manish Pandey26c6f812020-04-30 11:43:00 +0100125static void cactus_print_memory_layout(unsigned int vm_id)
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200126{
Olivier Deprezaed7f082020-11-04 15:11:59 +0100127 INFO("Secure Partition memory layout:\n");
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200128
Olivier Deprezaed7f082020-11-04 15:11:59 +0100129 INFO(" Text region : %p - %p\n",
Antonio Nino Diaz1486f3b2018-06-26 10:30:10 +0100130 (void *)CACTUS_TEXT_START, (void *)CACTUS_TEXT_END);
Manish Pandey26c6f812020-04-30 11:43:00 +0100131
Olivier Deprezaed7f082020-11-04 15:11:59 +0100132 INFO(" Read-only data region : %p - %p\n",
Antonio Nino Diaz1486f3b2018-06-26 10:30:10 +0100133 (void *)CACTUS_RODATA_START, (void *)CACTUS_RODATA_END);
Manish Pandey26c6f812020-04-30 11:43:00 +0100134
Olivier Deprezaed7f082020-11-04 15:11:59 +0100135 INFO(" Data region : %p - %p\n",
Antonio Nino Diaz1486f3b2018-06-26 10:30:10 +0100136 (void *)CACTUS_DATA_START, (void *)CACTUS_DATA_END);
Manish Pandey26c6f812020-04-30 11:43:00 +0100137
Olivier Deprezaed7f082020-11-04 15:11:59 +0100138 INFO(" BSS region : %p - %p\n",
Antonio Nino Diaz1486f3b2018-06-26 10:30:10 +0100139 (void *)CACTUS_BSS_START, (void *)CACTUS_BSS_END);
Manish Pandey26c6f812020-04-30 11:43:00 +0100140
Olivier Deprezaed7f082020-11-04 15:11:59 +0100141 INFO(" RX : %p - %p\n",
Max Shvetsovc32f4782020-06-23 09:41:15 +0100142 (void *)get_sp_rx_start(vm_id),
143 (void *)get_sp_rx_end(vm_id));
Manish Pandey26c6f812020-04-30 11:43:00 +0100144
Olivier Deprezaed7f082020-11-04 15:11:59 +0100145 INFO(" TX : %p - %p\n",
Max Shvetsovc32f4782020-06-23 09:41:15 +0100146 (void *)get_sp_tx_start(vm_id),
147 (void *)get_sp_tx_end(vm_id));
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200148}
149
J-Alves31d87952022-04-04 12:34:16 +0100150static void cactus_print_boot_info(struct ffa_boot_info_header *boot_info_header)
151{
152 struct ffa_boot_info_desc *boot_info_desc;
153
154 if (boot_info_header == NULL) {
155 NOTICE("SP doesn't have boot information!\n");
156 return;
157 }
158
159 VERBOSE("SP boot info:\n");
160 VERBOSE(" Signature: %x\n", boot_info_header->signature);
161 VERBOSE(" Version: %x\n", boot_info_header->version);
162 VERBOSE(" Blob Size: %u\n", boot_info_header->info_blob_size);
163 VERBOSE(" Descriptor Size: %u\n", boot_info_header->desc_size);
164 VERBOSE(" Descriptor Count: %u\n", boot_info_header->desc_count);
165
166 boot_info_desc = boot_info_header->boot_info;
167
168 if (boot_info_desc == NULL) {
169 ERROR("Boot data arguments error...\n");
170 return;
171 }
172
173 for (uint32_t i = 0; i < boot_info_header->desc_count; i++) {
174 VERBOSE(" Boot Data:\n");
175 VERBOSE(" Type: %u\n",
176 ffa_boot_info_type(&boot_info_desc[i]));
177 VERBOSE(" Type ID: %u\n",
178 ffa_boot_info_type_id(&boot_info_desc[i]));
179 VERBOSE(" Flags:\n");
180 VERBOSE(" Name Format: %x\n",
181 ffa_boot_info_name_format(&boot_info_desc[i]));
182 VERBOSE(" Content Format: %x\n",
183 ffa_boot_info_content_format(&boot_info_desc[i]));
184 VERBOSE(" Size: %u\n", boot_info_desc[i].size);
185 VERBOSE(" Value: %llx\n", boot_info_desc[i].content);
186 }
187}
188
Manish Pandey26c6f812020-04-30 11:43:00 +0100189static void cactus_plat_configure_mmu(unsigned int vm_id)
Antonio Nino Diaz43ef3932018-07-03 14:39:47 +0100190{
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100191 mmap_add_region(CACTUS_TEXT_START,
192 CACTUS_TEXT_START,
193 CACTUS_TEXT_END - CACTUS_TEXT_START,
194 MT_CODE);
195 mmap_add_region(CACTUS_RODATA_START,
196 CACTUS_RODATA_START,
197 CACTUS_RODATA_END - CACTUS_RODATA_START,
198 MT_RO_DATA);
199 mmap_add_region(CACTUS_DATA_START,
200 CACTUS_DATA_START,
201 CACTUS_DATA_END - CACTUS_DATA_START,
202 MT_RW_DATA);
203 mmap_add_region(CACTUS_BSS_START,
204 CACTUS_BSS_START,
205 CACTUS_BSS_END - CACTUS_BSS_START,
206 MT_RW_DATA);
Antonio Nino Diaz43ef3932018-07-03 14:39:47 +0100207
Max Shvetsovc32f4782020-06-23 09:41:15 +0100208 mmap_add_region(get_sp_rx_start(vm_id),
209 get_sp_rx_start(vm_id),
Daniel Boulbyf3da5912022-04-01 12:31:52 +0100210 (SP_RX_TX_SIZE / 2),
Manish Pandey26c6f812020-04-30 11:43:00 +0100211 MT_RO_DATA);
212
Max Shvetsovc32f4782020-06-23 09:41:15 +0100213 mmap_add_region(get_sp_tx_start(vm_id),
214 get_sp_tx_start(vm_id),
Daniel Boulbyf3da5912022-04-01 12:31:52 +0100215 (SP_RX_TX_SIZE / 2),
Manish Pandey26c6f812020-04-30 11:43:00 +0100216 MT_RW_DATA);
217
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100218 mmap_add(cactus_mmap);
219 init_xlat_tables();
Antonio Nino Diaz43ef3932018-07-03 14:39:47 +0100220}
221
Madhukar Pappireddyd4de7ed2023-12-11 17:48:48 -0600222static struct ffa_value register_secondary_entrypoint(void)
Max Shvetsov2263efb2020-11-12 17:30:11 +0000223{
Arunachalam Ganapathybbf08c52023-11-07 13:38:54 +0000224 struct ffa_value args;
Max Shvetsov2263efb2020-11-12 17:30:11 +0000225
226 args.fid = FFA_SECONDARY_EP_REGISTER_SMC64;
227 args.arg1 = (u_register_t)&secondary_cold_entry;
228
Madhukar Pappireddyd4de7ed2023-12-11 17:48:48 -0600229 return ffa_service_call(&args);
Max Shvetsov2263efb2020-11-12 17:30:11 +0000230}
231
J-Alves31d87952022-04-04 12:34:16 +0100232void __dead2 cactus_main(bool primary_cold_boot,
233 struct ffa_boot_info_header *boot_info_header)
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200234{
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100235 assert(IS_IN_EL1() != 0);
236
Max Shvetsovc32f4782020-06-23 09:41:15 +0100237 struct mailbox_buffers mb;
Daniel Boulbyce386b12022-03-29 18:36:36 +0100238 struct ffa_value ret;
J-Alvesda6ac322020-11-09 15:45:30 +0000239
J-Alves7581c382020-05-07 18:34:20 +0100240 /* Get current FFA id */
Daniel Boulbyce386b12022-03-29 18:36:36 +0100241 struct ffa_value ffa_id_ret = ffa_id_get();
Daniel Boulby198deda2021-03-03 11:35:25 +0000242 ffa_id_t ffa_id = ffa_endpoint_id(ffa_id_ret);
J-Alves6cb21d92021-01-07 15:18:12 +0000243 if (ffa_func_id(ffa_id_ret) != FFA_SUCCESS_SMC32) {
J-Alves7581c382020-05-07 18:34:20 +0100244 ERROR("FFA_ID_GET failed.\n");
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100245 panic();
246 }
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100247
Max Shvetsov2263efb2020-11-12 17:30:11 +0000248 if (primary_cold_boot == true) {
249 /* Clear BSS */
250 memset((void *)CACTUS_BSS_START,
251 0, CACTUS_BSS_END - CACTUS_BSS_START);
252
Max Shvetsov2263efb2020-11-12 17:30:11 +0000253 mb.send = (void *) get_sp_tx_start(ffa_id);
254 mb.recv = (void *) get_sp_rx_start(ffa_id);
255
256 /* Configure and enable Stage-1 MMU, enable D-Cache */
257 cactus_plat_configure_mmu(ffa_id);
Madhukar Pappireddy7caaa4a2022-01-28 17:01:35 -0600258
259 /* Initialize locks for tail end interrupt handler */
260 sp_handler_spin_lock_init();
J-Alves31d87952022-04-04 12:34:16 +0100261
262 if (boot_info_header != NULL) {
263 /*
264 * TODO: Currently just validating that cactus can
265 * access the boot info descriptors. In case we want to
266 * use the boot info contents, we should check the
267 * blob and remap if the size is bigger than one page.
268 * Only then access the contents.
269 */
270 mmap_add_dynamic_region(
271 (unsigned long long)boot_info_header,
272 (uintptr_t)boot_info_header,
273 PAGE_SIZE, MT_RO_DATA);
274 }
Max Shvetsov2263efb2020-11-12 17:30:11 +0000275 }
276
Manish Pandey87d4c702021-03-02 22:31:57 +0000277 /*
278 * The local ffa_id value is held on the stack. The global g_ffa_id
279 * value is set after BSS is cleared.
280 */
281 g_ffa_id = ffa_id;
282
Manish Pandey26c6f812020-04-30 11:43:00 +0100283 enable_mmu_el1(0);
284
Manish Pandeyd27b37d2021-03-02 14:41:58 +0000285 /* Enable IRQ/FIQ */
286 enable_irq();
287 enable_fiq();
288
Max Shvetsov2263efb2020-11-12 17:30:11 +0000289 if (primary_cold_boot == false) {
290 goto msg_loop;
291 }
292
J-Alvesf3ea1a82024-01-17 11:06:55 +0000293 set_putc_impl(FFA_SVC_SMC_CALL_AS_STDOUT);
Manish Pandey29495372020-04-09 15:19:26 +0100294
Olivier Deprez24bd1702021-10-05 14:35:17 +0200295 /* Below string is monitored by CI expect script. */
296 NOTICE("Booting Secure Partition (ID: %x)\n%s\n%s\n",
297 ffa_id, build_message, version_string);
Ruari Phippsbd0a7e42020-07-17 16:42:21 +0100298
J-Alvesf3ea1a82024-01-17 11:06:55 +0000299 if (ffa_id == SP_ID(1)) {
300 cactus_print_boot_info(boot_info_header);
301 }
302
Olivier Deprez24bd1702021-10-05 14:35:17 +0200303 if (ffa_id == (SPM_VM_ID_FIRST + 2)) {
304 VERBOSE("Mapping RXTX Region\n");
305 CONFIGURE_AND_MAP_MAILBOX(mb, PAGE_SIZE, ret);
306 if (ffa_func_id(ret) != FFA_SUCCESS_SMC32) {
307 ERROR(
308 "Failed to map RXTX buffers. Error: %x\n",
309 ffa_error_code(ret));
310 panic();
Ruari Phippsbd0a7e42020-07-17 16:42:21 +0100311 }
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100312 }
Manish Pandey26c6f812020-04-30 11:43:00 +0100313
Manish Pandey26c6f812020-04-30 11:43:00 +0100314 cactus_print_memory_layout(ffa_id);
315
Madhukar Pappireddyd4de7ed2023-12-11 17:48:48 -0600316 ret = register_secondary_entrypoint();
317
318 /* FFA_SECONDARY_EP_REGISTER interface is not supported for UP SP. */
319 if (ffa_id == (SPM_VM_ID_FIRST + 2)) {
320 expect(ffa_func_id(ret), FFA_ERROR);
321 expect(ffa_error_code(ret), FFA_ERROR_NOT_SUPPORTED);
322 } else {
323 expect(ffa_func_id(ret), FFA_SUCCESS_SMC32);
324 }
325
Madhukar Pappireddyca1e2012022-06-22 17:05:09 -0500326 discover_managed_exit_interrupt_id();
Madhukar Pappireddy4d1f1122023-03-16 17:54:24 -0500327 register_maintenance_interrupt_handlers();
Max Shvetsov2263efb2020-11-12 17:30:11 +0000328
J-Alves9f6f0142020-06-17 15:37:59 +0100329 /* Invoking Tests */
Max Shvetsovc32f4782020-06-23 09:41:15 +0100330 ffa_tests(&mb);
J-Alves9f6f0142020-06-17 15:37:59 +0100331
Max Shvetsov2263efb2020-11-12 17:30:11 +0000332msg_loop:
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100333 /* End up to message loop */
J-Alves63cdaa72020-10-08 17:22:45 +0100334 message_loop(ffa_id, &mb);
Antonio Nino Diaz43ef3932018-07-03 14:39:47 +0100335
Olivier Deprezafcdb7c2019-11-29 14:21:48 +0100336 /* Not reached */
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200337}