blob: 89a1b17bcaa581ba982bcda94182b5a891d4741a [file] [log] [blame]
/*
* Copyright (c) 2020, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
#include <assert.h>
#include <common/debug.h>
#include <common/runtime_svc.h>
#include <errno.h>
#include <inttypes.h>
#include <lib/object_pool.h>
#include <lib/spinlock.h>
#include <lib/xlat_tables/xlat_tables_v2.h>
#include <platform_def.h>
#include <trusty/arm_ffa.h>
#include <trusty/ffa_helpers.h>
#include <trusty/plat/shared_mem.h>
/*
* Use a 512KB buffer by default for shared memory descriptors. Set
* TRUSTY_SHARED_MEMORY_OBJ_SIZE in platform_def.h to use a different value.
*/
#ifndef TRUSTY_SHARED_MEMORY_OBJ_SIZE
#define TRUSTY_SHARED_MEMORY_OBJ_SIZE (512 * 1024)
#endif
#pragma weak plat_mem_set_shared
int plat_mem_set_shared(struct ffa_mtd *mtd, bool shared)
{
/**
* The platform should check that the memory is nonsecure, however a
* default implementation is provided here without that check for
* backward compatibility.
*/
if (trusty_ffa_should_be_secure(mtd)) {
return -EINVAL;
}
return 0;
}
/**
* struct trusty_shmem_obj - Shared memory object.
* @desc_size: Size of @desc.
* @desc_filled: Size of @desc already received.
* @in_use: Number of clients that have called ffa_mem_retrieve_req
* without a matching ffa_mem_relinquish call.
* @desc: FF-A memory region descriptor passed in ffa_mem_share.
*/
struct trusty_shmem_obj {
size_t desc_size;
size_t desc_filled;
size_t in_use;
struct ffa_mtd desc;
};
/**
* struct trusty_shmem_obj_state - Global state.
* @data: Backing store for trusty_shmem_obj objects.
* @allocated: Number of bytes allocated in @data.
* @next_handle: Handle used for next allocated object.
* @lock: Lock protecting all state in this file.
*/
struct trusty_shmem_obj_state {
uint8_t *data;
size_t allocated;
uint64_t next_handle;
struct spinlock lock;
};
/**
* struct trusty_shmem_client_state - Per client state.
* @tx_buf: Client's transmit buffer.
* @rx_buf: Client's receive buffer.
* @buf_size: Size of @tx_buf and @rx_buf.
* @secure: If %true, the client is the secure os.
* @identity_mapped: If %true, all client memory is identity mapped.
* @receiver: If %true, the client is allowed to receive memory.
* If %false, the client is allowed to send memory.
* @use_ns_bit: If %true, the client expects the NS bit in the
* memory_region_attributes of the ffa_mtd to be set for
* nonsecure memory.
* If %false, the client does not support the NS bit
* in the memory_region_attributes of the ffa_mtd.
*/
struct trusty_shmem_client_state {
const void *tx_buf;
void *rx_buf;
size_t buf_size;
const bool secure;
const bool identity_mapped;
const bool receiver;
bool use_ns_bit;
};
/*
* This is given its own name so that it can be pulled out of .bss by
* a linker script and put in a different section if desired.
*/
__section(".bss.trusty.shmem.objs_data")
__aligned(8) static uint8_t
trusty_shmem_objs_data[TRUSTY_SHARED_MEMORY_OBJ_SIZE];
static struct trusty_shmem_obj_state trusty_shmem_obj_state = {
/* initializing data this way keeps the bulk of the state in .bss */
.data = trusty_shmem_objs_data,
/* Set start value for handle so top 32 bits are needed quickly */
.next_handle = 0xffffffc0,
};
typedef struct trusty_sp_desc {
uint16_t sp_id;
const uuid_t *uuid;
uint32_t ffa_version;
uint32_t properties;
struct trusty_shmem_client_state *client;
} trusty_sp_desc_t;
static trusty_sp_desc_t trusty_sp;
typedef struct trusty_ns_client_desc {
uint16_t ep_id;
struct trusty_shmem_client_state *client;
} trusty_ns_client_desc_t;
static trusty_ns_client_desc_t trusty_ns_client;
static struct trusty_shmem_client_state trusty_shmem_client_state[2] = {
[true].secure = true,
[true].identity_mapped = true,
[true].receiver = true,
};
/**
* trusty_shmem_obj_size - Convert from descriptor size to object size.
* @desc_size: Size of struct ffa_memory_region_descriptor object.
*
* Return: Size of struct trusty_shmem_obj object.
*/
static size_t trusty_shmem_obj_size(size_t desc_size)
{
return desc_size + offsetof(struct trusty_shmem_obj, desc);
}
/**
* trusty_shmem_obj_alloc - Allocate struct trusty_shmem_obj.
* @state: Global state.
* @desc_size: Size of struct ffa_memory_region_descriptor object that
* allocated object will hold.
*
* Return: Pointer to newly allocated object, or %NULL if there not enough space
* left. The returned pointer is only valid while @state is locked, to
* used it again after unlocking @state, trusty_shmem_obj_lookup must be
* called.
*/
static struct trusty_shmem_obj *
trusty_shmem_obj_alloc(struct trusty_shmem_obj_state *state, size_t desc_size)
{
struct trusty_shmem_obj *obj;
size_t free = sizeof(trusty_shmem_objs_data) - state->allocated;
if (trusty_shmem_obj_size(desc_size) > free) {
NOTICE("%s(0x%zx) failed, free 0x%zx\n",
__func__, desc_size, free);
return NULL;
}
obj = (struct trusty_shmem_obj *)(state->data + state->allocated);
obj->desc_size = desc_size;
obj->desc_filled = 0;
obj->in_use = 0;
state->allocated += trusty_shmem_obj_size(desc_size);
return obj;
}
/**
* trusty_shmem_obj_free - Free struct trusty_shmem_obj.
* @state: Global state.
* @obj: Object to free.
*
* Release memory used by @obj. Other objects may move, so on return all
* pointers to struct trusty_shmem_obj object should be considered invalid, not
* just @obj.
*
* The current implementation always compacts the remaining objects to simplify
* the allocator and to avoid fragmentation.
*/
static void trusty_shmem_obj_free(struct trusty_shmem_obj_state *state,
struct trusty_shmem_obj *obj)
{
size_t free_size = trusty_shmem_obj_size(obj->desc_size);
uint8_t *shift_dest = (uint8_t *)obj;
uint8_t *shift_src = shift_dest + free_size;
size_t shift_size = state->allocated - (shift_src - state->data);
if (shift_size) {
memmove(shift_dest, shift_src, shift_size);
}
state->allocated -= free_size;
}
/**
* trusty_shmem_obj_lookup - Lookup struct trusty_shmem_obj by handle.
* @state: Global state.
* @handle: Unique handle of object to return.
*
* Return: struct trusty_shmem_obj_state object with handle matching @handle.
* %NULL, if not object in @state->data has a matching handle.
*/
static struct trusty_shmem_obj *
trusty_shmem_obj_lookup(struct trusty_shmem_obj_state *state, uint64_t handle)
{
uint8_t *curr = state->data;
while (curr - state->data < state->allocated) {
struct trusty_shmem_obj *obj = (struct trusty_shmem_obj *)curr;
if (obj->desc.handle == handle) {
return obj;
}
curr += trusty_shmem_obj_size(obj->desc_size);
}
return NULL;
}
static struct ffa_comp_mrd *
trusty_shmem_obj_get_comp_mrd(struct trusty_shmem_obj *obj)
{
return trusty_ffa_mtd_get_comp_mrd(&obj->desc);
}
/**
* trusty_shmem_obj_ffa_constituent_size - Calculate variable size part of obj.
* @obj: Object containing ffa_memory_region_descriptor.
*
* Return: Size of ffa_constituent_memory_region_descriptors in @obj.
*/
static size_t
trusty_shmem_obj_ffa_constituent_size(struct trusty_shmem_obj *obj)
{
return trusty_shmem_obj_get_comp_mrd(obj)->address_range_count *
sizeof(struct ffa_cons_mrd);
}
/**
* trusty_shmem_check_obj - Check that counts in descriptor match overall size.
* @obj: Object containing ffa_memory_region_descriptor.
*
* Return: 0 if object is valid, -EINVAL if memory region attributes count is
* not 1, -EINVAL if constituent_memory_region_descriptor offset or count is
* invalid.
*/
static int trusty_shmem_check_obj(struct trusty_shmem_obj *obj)
{
if (obj->desc.emad_count != 1) {
NOTICE("%s: unsupported attribute desc count %u != 1\n",
__func__, obj->desc.emad_count);
return -EINVAL;
}
uint32_t offset = obj->desc.emad[0].comp_mrd_offset;
size_t header_emad_size = sizeof(obj->desc) +
obj->desc.emad_count * sizeof(obj->desc.emad[0]);
if (offset < header_emad_size) {
NOTICE("%s: invalid object, offset %u < header + emad %zu\n",
__func__, offset, header_emad_size);
return -EINVAL;
}
size_t size = obj->desc_size;
if (offset > size) {
NOTICE("%s: invalid object, offset %u > total size %zu\n",
__func__, offset, obj->desc_size);
return -EINVAL;
}
size -= offset;
if (size < sizeof(struct ffa_comp_mrd)) {
NOTICE("%s: invalid object, offset %u, total size %zu, no space for header\n",
__func__, offset, obj->desc_size);
return -EINVAL;
}
size -= sizeof(struct ffa_comp_mrd);
size_t count = size / sizeof(struct ffa_cons_mrd);
struct ffa_comp_mrd *comp = trusty_shmem_obj_get_comp_mrd(obj);
if (comp->address_range_count != count) {
NOTICE("%s: invalid object, desc count %u != %zu\n",
__func__, comp->address_range_count, count);
return -EINVAL;
}
size_t expected_size = offset + sizeof(*comp) +
trusty_shmem_obj_ffa_constituent_size(obj);
if (expected_size != obj->desc_size) {
NOTICE("%s: invalid object, computed size %zu != size %zu\n",
__func__, expected_size, obj->desc_size);
return -EINVAL;
}
if (obj->desc_filled < obj->desc_size) {
/*
* The whole descriptor has not yet been received. Skip final
* checks.
*/
return 0;
}
size_t total_page_count = 0;
for (size_t i = 0; i < count; i++) {
total_page_count +=
comp->address_range_array[i].page_count;
}
if (comp->total_page_count != total_page_count) {
NOTICE("%s: invalid object, desc total_page_count %u != %zu\n",
__func__, comp->total_page_count,
total_page_count);
return -EINVAL;
}
return 0;
}
static long trusty_ffa_fill_desc(struct trusty_shmem_client_state *client,
struct trusty_shmem_obj *obj,
uint32_t fragment_length,
ffa_mtd_flag32_t mtd_flags,
void *smc_handle)
{
int ret;
if (!client->buf_size) {
NOTICE("%s: buffer pair not registered\n", __func__);
ret = -EINVAL;
goto err_arg;
}
if (fragment_length > client->buf_size) {
NOTICE("%s: bad fragment size %u > %zu buffer size\n", __func__,
fragment_length, client->buf_size);
ret = -EINVAL;
goto err_arg;
}
if (fragment_length > obj->desc_size - obj->desc_filled) {
NOTICE("%s: bad fragment size %u > %zu remaining\n", __func__,
fragment_length, obj->desc_size - obj->desc_filled);
ret = -EINVAL;
goto err_arg;
}
memcpy((uint8_t *)&obj->desc + obj->desc_filled, client->tx_buf,
fragment_length);
if (!obj->desc_filled) {
/* First fragment, descriptor header has been copied */
obj->desc.handle = trusty_shmem_obj_state.next_handle++;
obj->desc.flags = mtd_flags;
obj->desc.memory_region_attributes |= FFA_MEM_ATTR_NONSECURE;
}
obj->desc_filled += fragment_length;
ret = trusty_shmem_check_obj(obj);
if (ret) {
goto err_bad_desc;
}
uint32_t handle_low = (uint32_t)obj->desc.handle;
uint32_t handle_high = obj->desc.handle >> 32;
if (obj->desc_filled != obj->desc_size) {
SMC_RET8(smc_handle, FFA_MEM_FRAG_RX, handle_low,
handle_high, obj->desc_filled,
(uint32_t)obj->desc.sender_id << 16, 0, 0, 0);
}
ret = plat_mem_set_shared(&obj->desc, true);
if (ret) {
goto err_share_fail;
}
SMC_RET8(smc_handle, FFA_SUCCESS_SMC32, 0, handle_low, handle_high, 0,
0, 0, 0);
err_share_fail:
err_bad_desc:
err_arg:
trusty_shmem_obj_free(&trusty_shmem_obj_state, obj);
return ret;
}
/**
* trusty_ffa_mem_share - FFA_MEM_SHARE implementation.
* @client: Client state.
* @total_length: Total length of shared memory descriptor.
* @fragment_length: Length of fragment of shared memory descriptor passed in
* this call.
* @address: Not supported, must be 0.
* @page_count: Not supported, must be 0.
* @smc_handle: Handle passed to smc call. Used to return
* FFA_MEM_FRAG_RX or FFA_SUCCESS_SMC32.
*
* Implements a subset of the FF-A FFA_MEM_SHARE call needed to share memory
* from non-secure os to secure os (with no stream endpoints).
*
* Return: 0 on success, error code on failure.
*/
static long trusty_ffa_mem_share(struct trusty_shmem_client_state *client,
uint32_t total_length,
uint32_t fragment_length,
uint64_t address,
uint32_t page_count,
ffa_mtd_flag32_t mtd_flags,
void *smc_handle)
{
struct trusty_shmem_obj *obj;
if (address || page_count) {
NOTICE("%s: custom memory region for message not supported\n",
__func__);
return -EINVAL;
}
if (client->receiver) {
NOTICE("%s: unsupported share direction\n", __func__);
return -EINVAL;
}
if (fragment_length < sizeof(obj->desc)) {
NOTICE("%s: bad first fragment size %u < %zu\n",
__func__, fragment_length, sizeof(obj->desc));
return -EINVAL;
}
obj = trusty_shmem_obj_alloc(&trusty_shmem_obj_state, total_length);
if (!obj) {
return -ENOMEM;
}
return trusty_ffa_fill_desc(client, obj, fragment_length, mtd_flags,
smc_handle);
}
/**
* trusty_ffa_mem_frag_tx - FFA_MEM_FRAG_TX implementation.
* @client: Client state.
* @handle_low: Handle_low value returned from FFA_MEM_FRAG_RX.
* @handle_high: Handle_high value returned from FFA_MEM_FRAG_RX.
* @fragment_length: Length of fragments transmitted.
* @sender_id: Vmid of sender in bits [31:16]
* @smc_handle: Handle passed to smc call. Used to return
* FFA_MEM_FRAG_RX or FFA_SUCCESS_SMC32.
*
* Return: @smc_handle on success, error code on failure.
*/
static long trusty_ffa_mem_frag_tx(struct trusty_shmem_client_state *client,
uint32_t handle_low,
uint32_t handle_high,
uint32_t fragment_length,
uint32_t sender_id,
void *smc_handle)
{
struct trusty_shmem_obj *obj;
uint64_t handle = handle_low | (((uint64_t)handle_high) << 32);
if (client->receiver) {
NOTICE("%s: unsupported share direction\n", __func__);
return -EINVAL;
}
obj = trusty_shmem_obj_lookup(&trusty_shmem_obj_state, handle);
if (!obj) {
NOTICE("%s: invalid handle, 0x%" PRIx64
", not a valid handle\n", __func__, handle);
return -ENOENT;
}
if (sender_id != (uint32_t)obj->desc.sender_id << 16) {
NOTICE("%s: invalid sender_id 0x%x != 0x%x\n", __func__,
sender_id, (uint32_t)obj->desc.sender_id << 16);
return -ENOENT;
}
if (obj->desc_filled == obj->desc_size) {
NOTICE("%s: object desc already filled, %zu\n", __func__,
obj->desc_filled);
return -EINVAL;
}
return trusty_ffa_fill_desc(client, obj, fragment_length, 0,
smc_handle);
}
/**
* trusty_ffa_mem_retrieve_req - FFA_MEM_RETRIEVE_REQ implementation.
* @client: Client state.
* @total_length: Total length of retrieve request descriptor if this is
* the first call. Otherwise (unsupported) must be 0.
* @fragment_length: Length of fragment of retrieve request descriptor passed
* in this call. Only @fragment_length == @length is
* supported by this implementation.
* @address: Not supported, must be 0.
* @page_count: Not supported, must be 0.
* @smc_handle: Handle passed to smc call. Used to return
* FFA_MEM_RETRIEVE_RESP.
*
* Implements a subset of the FF-A FFA_MEM_RETRIEVE_REQ call.
* Used by secure os to retrieve memory already shared by non-secure os.
* If the data does not fit in a single FFA_MEM_RETRIEVE_RESP message,
* the client must call FFA_MEM_FRAG_RX until the full response has been
* received.
*
* Return: @smc_handle on success, error code on failure.
*/
static long
trusty_ffa_mem_retrieve_req(struct trusty_shmem_client_state *client,
uint32_t total_length,
uint32_t fragment_length,
uint64_t address,
uint32_t page_count,
void *smc_handle)
{
struct trusty_shmem_obj *obj = NULL;
const struct ffa_mtd *req = client->tx_buf;
struct ffa_mtd *resp = client->rx_buf;
if (!client->buf_size) {
NOTICE("%s: buffer pair not registered\n", __func__);
return -EINVAL;
}
if (address || page_count) {
NOTICE("%s: custom memory region not supported\n", __func__);
return -EINVAL;
}
if (fragment_length != total_length) {
NOTICE("%s: fragmented retrieve request not supported\n",
__func__);
return -EINVAL;
}
/* req->emad_count is not set for retrieve by hypervisor */
if (client->receiver && req->emad_count != 1) {
NOTICE("%s: unsupported retrieve descriptor count: %u\n",
__func__, req->emad_count);
return -EINVAL;
}
if (total_length < sizeof(*req)) {
NOTICE("%s: invalid length %u < %zu\n", __func__, total_length,
sizeof(*req));
return -EINVAL;
}
obj = trusty_shmem_obj_lookup(&trusty_shmem_obj_state, req->handle);
if (!obj) {
return -ENOENT;
}
if (obj->desc_filled != obj->desc_size) {
NOTICE("%s: incomplete object desc filled %zu < size %zu\n",
__func__, obj->desc_filled, obj->desc_size);
return -EINVAL;
}
if (req->emad_count && req->sender_id != obj->desc.sender_id) {
NOTICE("%s: wrong sender id 0x%x != 0x%x\n",
__func__, req->sender_id, obj->desc.sender_id);
return -EINVAL;
}
if (req->emad_count && req->tag != obj->desc.tag) {
NOTICE("%s: wrong tag 0x%" PRIx64 " != 0x%" PRIx64 "\n",
__func__, req->tag, obj->desc.tag);
return -EINVAL;
}
if (req->flags != 0 && req->flags != obj->desc.flags) {
/*
* Current implementation does not support donate, and it
* supports no other flags. obj->desc.flags will be
* FFA_MTD_FLAG_TYPE_SHARE_MEMORY or
* FFA_MTD_FLAG_TYPE_LEND_MEMORY.
*/
NOTICE("%s: invalid flags 0x%x\n", __func__, req->flags);
return -EINVAL;
}
/* TODO: support more than one endpoint ids */
if (req->emad_count &&
req->emad[0].mapd.endpoint_id !=
obj->desc.emad[0].mapd.endpoint_id) {
NOTICE("%s: wrong receiver id 0x%x != 0x%x\n",
__func__, req->emad[0].mapd.endpoint_id,
obj->desc.emad[0].mapd.endpoint_id);
return -EINVAL;
}
if (req->emad_count) {
obj->in_use++;
}
size_t copy_size = MIN(obj->desc_size, client->buf_size);
memcpy(resp, &obj->desc, copy_size);
if (!client->use_ns_bit) {
assert(copy_size >= sizeof(*resp));
resp->memory_region_attributes &= ~FFA_MEM_ATTR_NONSECURE;
}
SMC_RET8(smc_handle, FFA_MEM_RETRIEVE_RESP, obj->desc_size,
copy_size, 0, 0, 0, 0, 0);
}
/**
* trusty_ffa_mem_frag_rx - FFA_MEM_FRAG_RX implementation.
* @client: Client state.
* @handle_low: Handle passed to &FFA_MEM_RETRIEVE_REQ. Bit[31:0].
* @handle_high: Handle passed to &FFA_MEM_RETRIEVE_REQ. Bit[63:32].
* @fragment_offset: Byte offset in descriptor to resume at.
* @sender_id: Bit[31:16]: Endpoint id of sender if client is a
* hypervisor. 0 otherwise.
* @smc_handle: Handle passed to smc call. Used to return
* FFA_MEM_FRAG_TX.
*
* Return: @smc_handle on success, error code on failure.
*/
static long trusty_ffa_mem_frag_rx(struct trusty_shmem_client_state *client,
uint32_t handle_low,
uint32_t handle_high,
uint32_t fragment_offset,
uint32_t sender_id,
void *smc_handle)
{
struct trusty_shmem_obj *obj;
uint64_t handle = handle_low | (((uint64_t)handle_high) << 32);
if (!client->buf_size) {
NOTICE("%s: buffer pair not registered\n", __func__);
return -EINVAL;
}
if (client->secure && sender_id) {
NOTICE("%s: invalid sender_id 0x%x != 0\n",
__func__, sender_id);
return -EINVAL;
}
obj = trusty_shmem_obj_lookup(&trusty_shmem_obj_state, handle);
if (!obj) {
NOTICE("%s: invalid handle, 0x%" PRIx64
", not a valid handle\n", __func__, handle);
return -ENOENT;
}
if (!client->secure && sender_id &&
sender_id != (uint32_t)obj->desc.sender_id << 16) {
NOTICE("%s: invalid sender_id 0x%x != 0x%x\n", __func__,
sender_id, (uint32_t)obj->desc.sender_id << 16);
return -ENOENT;
}
if (fragment_offset >= obj->desc_size) {
NOTICE("%s: invalid fragment_offset 0x%x >= 0x%zx\n",
__func__, fragment_offset, obj->desc_size);
return -EINVAL;
}
size_t full_copy_size = obj->desc_size - fragment_offset;
size_t copy_size = MIN(full_copy_size, client->buf_size);
void *src = &obj->desc;
memcpy(client->rx_buf, src + fragment_offset, copy_size);
SMC_RET8(smc_handle, FFA_MEM_FRAG_TX, handle_low, handle_high,
copy_size, sender_id, 0, 0, 0);
}
/**
* trusty_ffa_mem_relinquish - FFA_MEM_RELINQUISH implementation.
* @client: Client state.
*
* Implements a subset of the FF-A FFA_MEM_RELINQUISH call.
* Used by secure os release previously shared memory to non-secure os.
*
* The handle to release must be in the client's (secure os's) transmit buffer.
*
* Return: 0 on success, error code on failure.
*/
static int trusty_ffa_mem_relinquish(struct trusty_shmem_client_state *client)
{
struct trusty_shmem_obj *obj;
const struct ffa_mem_relinquish_descriptor *req = client->tx_buf;
if (!client->buf_size) {
NOTICE("%s: buffer pair not registered\n", __func__);
return -EINVAL;
}
if (!client->receiver) {
NOTICE("%s: unsupported share direction\n", __func__);
return -EINVAL;
}
if (req->flags) {
NOTICE("%s: unsupported flags 0x%x\n", __func__, req->flags);
return -EINVAL;
}
obj = trusty_shmem_obj_lookup(&trusty_shmem_obj_state, req->handle);
if (!obj) {
return -ENOENT;
}
if (obj->desc.emad_count != req->endpoint_count) {
return -EINVAL;
}
for (size_t i = 0; i < req->endpoint_count; i++) {
if (req->endpoint_array[i] !=
obj->desc.emad[i].mapd.endpoint_id) {
return -EINVAL;
}
}
if (!obj->in_use) {
return -EACCES;
}
obj->in_use--;
return 0;
}
/**
* trusty_ffa_mem_reclaim - FFA_MEM_RECLAIM implementation.
* @client: Client state.
* @handle_low: Unique handle of shared memory object to relaim. Bit[31:0].
* @handle_high: Unique handle of shared memory object to relaim. Bit[63:32].
* @flags: Unsupported, ignored.
*
* Implements a subset of the FF-A FFA_MEM_RECLAIM call.
* Used by non-secure os reclaim memory previously shared with secure os.
*
* Return: 0 on success, error code on failure.
*/
static int trusty_ffa_mem_reclaim(struct trusty_shmem_client_state *client,
uint32_t handle_low, uint32_t handle_high,
uint32_t flags)
{
int ret;
struct trusty_shmem_obj *obj;
uint64_t handle = handle_low | (((uint64_t)handle_high) << 32);
if (client->receiver) {
NOTICE("%s: unsupported share direction\n", __func__);
return -EINVAL;
}
if (flags) {
NOTICE("%s: unsupported flags 0x%x\n", __func__, flags);
return -EINVAL;
}
obj = trusty_shmem_obj_lookup(&trusty_shmem_obj_state, handle);
if (!obj) {
return -ENOENT;
}
if (obj->in_use) {
return -EACCES;
}
ret = plat_mem_set_shared(&obj->desc, false);
if (ret) {
return ret;
}
trusty_shmem_obj_free(&trusty_shmem_obj_state, obj);
return 0;
}
/**
* trusty_ffa_rxtx_map - FFA_RXTX_MAP implementation.
* @client: Client state.
* @tx_address: Address of client's transmit buffer.
* @rx_address: Address of client's receive buffer.
* @page_count: Number of (contiguous) 4K pages per buffer.
*
* Implements the FF-A FFA_RXTX_MAP call.
* Used by non-secure os and secure os to register their RX/TX buffer pairs.
*
* Return: 0 on success, error code on failure.
*/
static long trusty_ffa_rxtx_map(struct trusty_shmem_client_state *client,
u_register_t tx_address,
u_register_t rx_address,
uint32_t page_count)
{
int ret;
uintptr_t tx_va;
uintptr_t rx_va;
size_t buf_size = page_count * FFA_PAGE_SIZE;
if (!buf_size) {
NOTICE("%s: invalid page_count %u\n", __func__, page_count);
return -EINVAL;
}
if (client->buf_size) {
NOTICE("%s: buffer pair already registered\n", __func__);
return -EACCES;
}
if (client->identity_mapped) {
tx_va = tx_address;
rx_va = rx_address;
} else {
unsigned int attr = client->secure ? MT_SECURE : MT_NS;
ret = mmap_add_dynamic_region_alloc_va(tx_address, &tx_va,
buf_size,
attr | MT_RO_DATA);
if (ret) {
NOTICE("%s: failed to map tx buffer @ 0x%lx, size 0x%zx\n",
__func__, tx_address, buf_size);
goto err_map_tx;
}
ret = mmap_add_dynamic_region_alloc_va(rx_address, &rx_va,
buf_size,
attr | MT_RW_DATA);
if (ret) {
NOTICE("%s: failed to map rx buffer @ 0x%lx, size 0x%zx\n",
__func__, rx_address, buf_size);
goto err_map_rx;
}
}
client->buf_size = buf_size;
client->tx_buf = (const void *)tx_va;
client->rx_buf = (void *)rx_va;
return 0;
err_map_rx:
mmap_remove_dynamic_region(tx_va, buf_size);
err_map_tx:
return ret;
}
/**
* trusty_ffa_rxtx_unmap - FFA_RXTX_UNMAP implementation.
* @client: Client state.
* @id: Unsupported, ignored.
*
* Implements the FF-A FFA_RXTX_UNMAP call.
* Used by non-secure os and secure os to release their RX/TX buffer pairs.
*
* Return: 0 on success, error code on failure.
*/
static long trusty_ffa_rxtx_unmap(struct trusty_shmem_client_state *client,
uint32_t id)
{
int ret;
if (!client->buf_size) {
NOTICE("%s: buffer pair not registered\n", __func__);
return -EINVAL;
}
if (!client->identity_mapped) {
ret = mmap_remove_dynamic_region((uintptr_t)client->tx_buf,
client->buf_size);
if (ret) {
NOTICE("%s: failed to unmap tx buffer @ %p, size 0x%zx\n",
__func__, client->tx_buf, client->buf_size);
}
ret = mmap_remove_dynamic_region((uintptr_t)client->rx_buf,
client->buf_size);
if (ret) {
NOTICE("%s: failed to unmap rx buffer @ %p, size 0x%zx\n",
__func__, client->rx_buf, client->buf_size);
}
}
if (trusty_shmem_obj_state.allocated) {
WARN("%s: shared memory regions are still active\n", __func__);
}
client->buf_size = 0;
client->tx_buf = NULL;
client->rx_buf = NULL;
return 0;
}
/**
* trusty_ffa_id_get - FFA_ID_GET implementation.
* @flags: State flags.
* @idp: Pointer to store id return value in.
*
* Return the ID of the caller. For the non-secure client, use ID 0 as required
* by FF-A.
*
* Note that the sender_id check in trusty_ffa_mem_frag_tx and
* trusty_ffa_mem_frag_rx only works when there is no hypervisor because we use
* id 0. The spec says the sender_id field must be 0 in that case.
*
* Return: 0 on success, error code on failure.
*/
static int trusty_ffa_id_get(u_register_t flags, u_register_t *idp)
{
if (is_caller_secure(flags)) {
*idp = trusty_sp.sp_id;
} else {
*idp = trusty_ns_client.ep_id;
}
return 0;
}
/**
* trusty_ffa_rx_release - FFA_RX_RELEASE implementation.
* @client: Client state.
*
* Return: 0 on success, error code on failure.
*/
static long trusty_ffa_rx_release(struct trusty_shmem_client_state *client)
{
/* Trusty SPD doesn't track mailbox state */
return 0;
}
/**
* trusty_ffa_version - FFA_VERSION implementation.
* @client: Client state.
* @version_in: Version supported by client.
* @smc_handle: Handle passed to smc call. Used to return version or error code
* directly as this call does not use the FFA_SUCCESS_SMC32 and
* FFA_ERROR opcodes that the other calls use.
*
* Return: 0 on success, error code on failure.
*/
static long trusty_ffa_version(struct trusty_shmem_client_state *client,
uint32_t version_in, void *smc_handle)
{
if (version_in & (1U << 31)) {
goto err_not_suppoprted;
}
/*
* We only implement one version. If the client specified a newer major
* version than ours, return the version we suppoort. Otherwise return
* not-supported.
*/
if (FFA_VERSION_TO_MAJOR(version_in) >=
TRUSTY_FFA_CURRENT_VERSION_MAJOR) {
SMC_RET8(smc_handle, MAKE_TRUSTY_FFA_CURRENT_VERSION,
0, 0, 0, 0, 0, 0, 0);
}
err_not_suppoprted:
SMC_RET1(smc_handle, (uint32_t)FFA_ERROR_NOT_SUPPORTED);
}
/**
* trusty_ffa_features - FFA_FEATURES implementation.
* @client: Client state.
* @func: Api to check.
* @props: Input properties.
* @ret2: Pointer to return value2 on success.
* @ret3: Pointer to return value3 on success.
*
* Return: 0 on success, error code on failure.
*/
static int trusty_ffa_features(struct trusty_shmem_client_state *client,
uint32_t func, uint32_t props, u_register_t *ret2,
u_register_t *ret3)
{
if (SMC_ENTITY(func) != SMC_ENTITY_SHARED_MEMORY ||
!SMC_IS_FASTCALL(func)) {
return -EINVAL;
}
switch (func) {
case FFA_ERROR:
case FFA_SUCCESS_SMC32:
case FFA_VERSION:
case FFA_FEATURES:
case FFA_RXTX_UNMAP:
case FFA_ID_GET:
case FFA_MEM_RETRIEVE_RESP:
case FFA_MEM_FRAG_RX:
case FFA_MEM_FRAG_TX:
return 0;
case FFA_RXTX_MAP_SMC32:
case FFA_RXTX_MAP_SMC64:
*ret2 = FFA_FEATURES2_RXTX_MAP_BUF_SIZE_4K;
return 0;
case FFA_MEM_RETRIEVE_REQ_SMC32:
case FFA_MEM_RETRIEVE_REQ_SMC64:
/*
* Indicate that object can be retrieved up to 2^64 - 1 times
* (on a 64 bit build). We track the number of times an object
* had been retrieved in a variable of type size_t.
*/
*ret3 = sizeof(size_t) * 8 - 1;
*ret2 = 0;
if (props & FFA_FEATURES2_MEM_RETRIEVE_REQ_NS_BIT) {
*ret2 |= FFA_FEATURES2_MEM_RETRIEVE_REQ_NS_BIT;
client->use_ns_bit = true;
}
return 0;
case FFA_MEM_SHARE_SMC32:
case FFA_MEM_SHARE_SMC64:
case FFA_MEM_RELINQUISH:
case FFA_MEM_RECLAIM:
*ret2 = 0;
return 0;
default:
return -ENOTSUP;
}
}
/**
* to_spi_err - Convert from local error code to FF-A error code.
* @ret: Local error code.
*
* Return: FF-A defined error code.
*/
static int to_spi_err(long ret)
{
switch(ret) {
case -ENOMEM:
return FFA_ERROR_NO_MEMORY;
case -EINVAL:
case -ENOENT:
return FFA_ERROR_INVALID_PARAMETER;
case -EACCES:
return FFA_ERROR_DENIED;
case -ENOTSUP:
return FFA_ERROR_NOT_SUPPORTED;
default:
return FFA_ERROR_INVALID_PARAMETER;
}
}
/*
* trusty_shared_memory_smc - SMC call handler.
*/
uintptr_t spmd_ffa_smc_handler(uint32_t smc_fid,
u_register_t x1,
u_register_t x2,
u_register_t x3,
u_register_t x4,
void *cookie,
void *handle,
u_register_t flags)
{
long ret = -1;
/*
* Some arguments to FF-A functions are specified to come from 32 bit
* (w) registers. Create 32 bit copies of the 64 bit arguments that can
* be passed to these functions.
*/
uint32_t w1 = (uint32_t)x1;
uint32_t w2 = (uint32_t)x2;
uint32_t w3 = (uint32_t)x3;
uint32_t w4 = (uint32_t)x4;
u_register_t ret_reg2 = 0;
u_register_t ret_reg3 = 0;
struct trusty_shmem_client_state *client;
if (((smc_fid < SMC_FC32_FFA_MIN) || (smc_fid > SMC_FC32_FFA_MAX)) &&
((smc_fid < SMC_FC64_FFA_MIN) || (smc_fid > SMC_FC64_FFA_MAX))) {
NOTICE("%s(0x%x) unknown smc\n", __func__, smc_fid);
SMC_RET1(handle, SMC_UNK);
}
spin_lock(&trusty_shmem_obj_state.lock);
if (is_caller_secure(flags)) {
client = trusty_sp.client;
} else {
client = trusty_ns_client.client;
}
switch (smc_fid) {
case FFA_VERSION:
ret = trusty_ffa_version(client, w1, handle);
break;
case FFA_FEATURES:
ret = trusty_ffa_features(client, w1, w2, &ret_reg2, &ret_reg3);
break;
case FFA_RXTX_MAP_SMC32:
ret = trusty_ffa_rxtx_map(client, w1, w2, w3);
break;
case FFA_RXTX_MAP_SMC64:
ret = trusty_ffa_rxtx_map(client, x1, x2, w3);
break;
case FFA_RXTX_UNMAP:
ret = trusty_ffa_rxtx_unmap(client, w1);
break;
case FFA_RX_RELEASE:
ret = trusty_ffa_rx_release(client);
break;
case FFA_ID_GET:
ret = trusty_ffa_id_get(flags, &ret_reg2);
break;
case FFA_MEM_LEND_SMC32:
ret = trusty_ffa_mem_share(client, w1, w2, w3, w4,
FFA_MTD_FLAG_TYPE_LEND_MEMORY,
handle);
break;
case FFA_MEM_LEND_SMC64:
ret = trusty_ffa_mem_share(client, w1, w2, x3, w4,
FFA_MTD_FLAG_TYPE_LEND_MEMORY,
handle);
break;
case FFA_MEM_SHARE_SMC32:
ret = trusty_ffa_mem_share(client, w1, w2, w3, w4,
FFA_MTD_FLAG_TYPE_SHARE_MEMORY,
handle);
break;
case FFA_MEM_SHARE_SMC64:
ret = trusty_ffa_mem_share(client, w1, w2, x3, w4,
FFA_MTD_FLAG_TYPE_SHARE_MEMORY,
handle);
break;
case FFA_MEM_RETRIEVE_REQ_SMC32:
ret = trusty_ffa_mem_retrieve_req(client, w1, w2, w3, w4,
handle);
break;
case FFA_MEM_RETRIEVE_REQ_SMC64:
ret = trusty_ffa_mem_retrieve_req(client, w1, w2, x3, w4,
handle);
break;
case FFA_MEM_RELINQUISH:
ret = trusty_ffa_mem_relinquish(client);
break;
case FFA_MEM_RECLAIM:
ret = trusty_ffa_mem_reclaim(client, w1, w2, w3);
break;
case FFA_MEM_FRAG_RX:
ret = trusty_ffa_mem_frag_rx(client, w1, w2, w3, w4, handle);
break;
case FFA_MEM_FRAG_TX:
ret = trusty_ffa_mem_frag_tx(client, w1, w2, w3, w4, handle);
break;
default:
NOTICE("%s(0x%x, 0x%lx) unsupported ffa smc\n", __func__,
smc_fid, x1);
ret = -ENOTSUP;
break;
}
spin_unlock(&trusty_shmem_obj_state.lock);
if (ret) {
if (ret == (int64_t)handle) {
/* return value already encoded, pass through */
return ret;
}
NOTICE("%s(0x%x) failed %ld\n", __func__, smc_fid, ret);
SMC_RET8(handle, FFA_ERROR, 0, to_spi_err(ret), 0, 0, 0,
0, 0);
} else {
SMC_RET8(handle, FFA_SUCCESS_SMC32, 0, ret_reg2, ret_reg3, 0,
0, 0, 0);
}
}
/**
* trusty_shared_mem_init - Initialize Trusty secure and non-secure endpoints.
* @trusty_uuid: Pointer to Trusty UUID
*
* Returns: none
*/
void trusty_shared_mem_init(const uuid_t *trusty_uuid)
{
/*
* Initialize secure side of Trusty that implements FFA_MEM_ABIs
*/
trusty_sp.sp_id = FFA_SWLD_ID_BASE;
trusty_sp.uuid = trusty_uuid;
trusty_sp.properties = 0; /* Doesn't support DIRECT MSG */
trusty_sp.ffa_version = MAKE_TRUSTY_FFA_CURRENT_VERSION;
trusty_sp.client = &trusty_shmem_client_state[true];
/*
* Initialize non-secure client endpoint.
*/
trusty_ns_client.ep_id = FFA_NWLD_ID_BASE;
trusty_ns_client.client = &trusty_shmem_client_state[false];
}