J-Alves | bec49a1 | 2023-10-18 13:27:41 +0100 | [diff] [blame] | 1 | # Change Log |
Olivier Deprez | 55b74f8 | 2021-11-10 11:32:31 +0100 | [diff] [blame] | 2 | |
J-Alves | 2cf2ca7 | 2024-11-15 15:12:06 +0000 | [diff] [blame] | 3 | ## v2.12 |
| 4 | ### Highlights |
| 5 | |
| 6 | * FF-A v1.2 (continued adoption): |
| 7 | * Restrict use of the `FFA_VERSION` ABI: FF-A endpoint version is locked from the first |
| 8 | FF-A ABI call handled in the SPMC. |
| 9 | * `FFA_MSG_WAIT` ABI update: |
| 10 | * Transfer the ownership of RX buffer from consumer to producer. |
| 11 | * Bypass the mentioned transfer of ownership via dedicated flag. |
| 12 | * Support for VM availibility messages: |
| 13 | * Subscription through the FF-A manifest. |
| 14 | * Discovery through `FFA_PARTITION_INFO_GET` only at the NS FF-A instance. |
| 15 | * Relay the framework message to the subscribed partition. |
| 16 | |
| 17 | * Runtime support: |
| 18 | * `FFA_CONSOLE_LOG` ABI: |
| 19 | * SPMC adds the string `[<SP ID> <vCPU ID>]` to line logs from SPs. |
| 20 | * Console log for each partition is tracked per vCPU, to avoid corrupting the buffer |
| 21 | from concurrent logging from the same partition. |
| 22 | * Exceptions related to synchronous tag faults in S-EL2 are now logged. |
| 23 | * FF-A memory management: |
| 24 | * Support of the SMC64 ABI version of all FF-A memory management interfaces. |
| 25 | * Handle GPF exception caused by accessing non-secure RX/TX buffers in the handling |
| 26 | of FF-A memory management ABIs. |
| 27 | * Support for sharing and lending device memory. |
| 28 | * Allocate the boot parameters for Hafnium's initialisation functions in the memory |
| 29 | pool. |
| 30 | * Paravirtualized interface for sending IPI (`HF_INTERRUPT_SEND_IPI`). |
| 31 | * IPI injected straight away to target vCPUs in the running state. |
| 32 | * Sending `SRI` interrupt to the NWd, when the target vCPU is in the waiting state. |
| 33 | * Report the partitions and vCPUs which require CPU cycles to handle IPI through |
| 34 | `FFA_NOTIFICATION_INFO_GET`. |
| 35 | * If target vCPU is in blocked/preempted state, then pend/queue the virtual |
| 36 | interrupt. |
| 37 | * Secure Interrupt handling: |
| 38 | * Support for queueing secure interrupts. |
| 39 | * Support for S-EL1 UP SPs to handle interrupts. |
| 40 | * Support interrupts sent during runtime model for intialisation (`RTM_INIT`). |
| 41 | * Always eret `FFA_RUN` to the target SP, regardless of if it has pending messages, |
| 42 | secure interrupts or notifications. |
| 43 | |
| 44 | * Hardware architecture support: |
| 45 | * Architectural physical timer emulation for SPs. |
| 46 | * TC platform enabled branch protection feature. |
| 47 | * Support for platforms with non-linear GIC redistributor frames. |
| 48 | * Enabled S-EL0 partitions Pointer Authentication feature. |
| 49 | |
| 50 | * Tests, scripts, testing framework and build: |
| 51 | * Improved readability of the error messages for failed assertions. |
| 52 | * Enabled the build flags '-Wextra' and '-Wsign-compare'. |
| 53 | * Definition of assertion helpers to check content of strings. |
| 54 | * Using enum types for the FF-A ABIs, FF-A errors, and test SP service commands. |
| 55 | * Toolchain upgrade to clang-18. |
| 56 | * Improved performance of `clang-tidy`. |
| 57 | * Always expand the `assert` macro, to make sure arguments are type checked even |
| 58 | when `ENABLE_ASSERTIONS` is not enabled. |
| 59 | * Adopted `FFA_CONSOLE_LOG` ABI on `dlog` instances from SPs. |
| 60 | * Restricted the functions defined with `SERVICE_SETUP` macros to run on the primary |
| 61 | core. |
| 62 | * Support for using the generic timer in the test partitions. |
| 63 | * Support for using a watchdog timer from NWd test VMs. |
| 64 | * Added new system setup, loading S-EL1 UP partitions on top of SPMC. |
| 65 | |
| 66 | * Bug fixes: |
| 67 | * Incorrect calculation of number of FF-A boot information descriptors. |
| 68 | * FF-A memory management: |
| 69 | * Drop unnecessary check to instruction permissions in the handling of |
| 70 | `FFA_MEM_RELINQUISH`. |
| 71 | * Sender with no Write access to a given memory region is prevented from using |
| 72 | the clear/zero memory flags, in the descriptor to `FFA_MEM_LEND`, `FFA_MEM_SHARE` |
| 73 | or `FFA_MEM_DONATE`. |
| 74 | * Checks to the `impdef` field in the FF-A memory access descriptor done in accordance |
| 75 | to FF-A version. |
| 76 | * Consider the memory region descriptor format according to FF-A version, when |
| 77 | processing an hypervisor retrieve request. |
| 78 | * Platform build options: |
| 79 | * Attest the option `enable_mte` can only have legal values 0 or 1, to enable |
| 80 | and disable MTE feature use, respectively. |
| 81 | * Attest the options `gic_version` and `gic_enable_espi` are configured with |
| 82 | correct values, according to what is supported in Hafnium. |
| 83 | * Attest the option `branch_protection` can only be configured with values |
| 84 | `standard`, `pac-ret`, `pac-ret+leaf` and `bti`. |
| 85 | * FF-A Notifications: |
| 86 | * Set framework notifications only when recipient supports notifications. |
| 87 | * Delay SRI flag can only be used on `FFA_NOTIFICATION_SET` from SPs. Return |
| 88 | `FFA_ERROR(FFA_INVALID_PARAMETERS)` in invocations from the NWd that use it. |
| 89 | * Allow for a caller to invoke`FFA_NOTIFICATION_GET` specifying a vCPU ID different |
| 90 | than the calling vCPU. |
| 91 | * `FFA_FEATURES` ABI: |
| 92 | * Reports `FFA_YIELD` only to SPs. |
| 93 | * Reports `ME` and `NPI` VI Id to S-EL1 partitions only. |
| 94 | * Reports `FFA_SECONDARY_EP_REGISTER` to MP partitions only. |
| 95 | * Reports `FFA_MEM_PERM_SET/GET` to S-EL0 partitions only. |
| 96 | * The `FFA_PARTITION_INFO_GET(_REGS)` ABI reports the support of indirect message and direct |
| 97 | message request/response 2, considering the version of the caller. |
| 98 | * Prevent secure interrupt from preempting an SP in `SPMC` scheduled mode. |
| 99 | * Ensure the FF-A error codes are be 32-bit unsigned values. |
| 100 | * The error return for `FFA_FEATURES` ABI is restricted to `FFA_ERROR(FFA_NOT_SUPPORTED)` |
| 101 | according to the FF-A v1.2 specification. |
| 102 | * Ensure that accesses to `GICD_CTLR` register are complete by checking the state of |
| 103 | the bit RWP. |
| 104 | * Add check that manifest declared memory regions shouldn't overlap with SPMC address |
| 105 | space. |
| 106 | * First vCPU to boot ever from any SP was booting with the wrong vCPU state, fixed to |
| 107 | `VCPU_STATE_RUNNING`. |
| 108 | * Correctly define stack for the test SPs. |
| 109 | * Report error when there are too many UUIDs defined in the partition's FF-A manifest. |
| 110 | * Fix out of tree buid: use of `OUT` make argument such that the output directory can point |
| 111 | to another location other than out/project/reference. |
| 112 | * Memory regions specified with offset relative to partition's image position, rather than |
| 113 | partition package load-address. |
| 114 | * The SPMC enables a physical interrupt when the SP enables the respective virtual interrupt, |
| 115 | instead of enabling by default during load of owner SP. |
| 116 | |
| 117 | * Miscellaneous: |
| 118 | * Improved `dlog` functions with compile time type checking to the arguments of |
| 119 | logged strings. |
| 120 | * Reduced complexity of utility functions defined in `std.h`. |
| 121 | * The documentation of FF-A manifest bindings now refer to TF-A documentation as the common |
| 122 | resource for all reference SPMC implementations. |
| 123 | * Simplified the code for handling the preemption of `FFA_MSG_WAIT`/`FFA_MSG_SEND_DIRECT_RESP` |
| 124 | due to a pending interrupt. |
| 125 | * Dropped legacy code/tests: |
| 126 | * Legacy hypervisor tests for timer support in NWd VMs. |
| 127 | * Legacy hypervisor interface `HF_INTERRUPT_INJECT` and respective tests. |
| 128 | * Legacy hypervisor waiting list concept. |
| 129 | * The linux kernel tests in the Hafnium tests scripts. Hafnium driver code supports the |
| 130 | hypervisor runtime model not the SPMC. |
| 131 | * The linux kernel and hafnium driver submodules. |
| 132 | * Legacy hypervisor `FFA_RUN` ABI tests. |
| 133 | * Refactored the code enforcing the `boot-order` according to FF-A boot protocol to use |
| 134 | `list.h` header. |
| 135 | * Refactored the UUID packing/unpacking functions. |
| 136 | * Dropped the SRI state tracking within the SPMC, to simplify notifications code. |
| 137 | |
J-Alves | 2bef7ab | 2024-05-10 14:24:39 +0100 | [diff] [blame] | 138 | ## v2.11 |
| 139 | ### Highlights |
| 140 | |
| 141 | * FF-A v1.2 (continued adoption): |
| 142 | * Direct messaging: |
| 143 | * New ABIs `FFA_MSG_SEND_DIRECT_REQ2` and `FFA_MSG_SEND_DIRECT_RESP2`. |
| 144 | * Support extended register set and use of service UUID. |
| 145 | * Memory management: |
| 146 | * ABIs support the impdef field in memory access descriptor. |
| 147 | * Lend device memory from an SP to another SP, and from a VM to an SP. |
| 148 | * Setup and discovery: |
| 149 | * Support multiple UUIDs per SP, both in manifest parsing and |
| 150 | `FFA_PARTITION_INFO_GET`. |
| 151 | * The `FFA_FEATURES` ABI reports RX/TX buffer max size. |
| 152 | * Support extended set of registers with `FFA_CONSOLE_LOG` for v1.2 SPs. |
| 153 | |
| 154 | * Runtime support: |
| 155 | * Trap SP access to AMU counters. |
| 156 | * SIMD context: |
| 157 | * Refactored Advanced SIMD/SVE save and restore operations. |
| 158 | * Introduce context save and restore of SME registers. |
| 159 | * Leverage the SMCCC SVE hint bit mask. |
| 160 | * Trap SP access to SVE/SME registers. |
| 161 | * Realm Management Extension support: |
| 162 | * On `FFA_MEM_DONATE` or `FFA_MEM_LEND` from VM/OS Kernel to SPs, change the physical |
| 163 | address space of the memory regions from non-secure to secure. |
| 164 | * On `FFA_MEM_RECLAIM`, if memory's address space was changed from non-secure to secure |
| 165 | address space, revert physical address space change (from secure to non-secure). |
| 166 | * The SPMC can handle a Granule Protection Fault: exception handler refactored |
| 167 | to trap the new `memcpy_trapped` function, which returns error if copy failed due to GPF. |
| 168 | * FFA_PARTITION_INFO_GET and FFA_MSG_SEND2 interfaces return FFA_ERROR(FFA_ABORTED) in case |
| 169 | of hitting a Granule Protection Fault. |
| 170 | * SMMUv3: |
| 171 | * Support for static DMA isolation of upstream devices. |
| 172 | * Access from DMA capable devices are only permitted to specific memory regions |
| 173 | via dedicated DMA properties in the memory region node of an partition manifest. |
| 174 | * SPMC saves and restores the NS-EL1 system registers context, to help reduce memory from |
| 175 | EL3 monitor. |
| 176 | * GICv3 driver to support two security states for interrupts. |
| 177 | |
| 178 | * Hardware architecture support: |
| 179 | * New platform build for RD fremont. |
| 180 | * TC platform remapped the UART devices. |
| 181 | |
| 182 | * Tests, scripts and testing framework: |
| 183 | * TF-A prebuilt image used in Hafnium tests updated to support v1.2 interfaces. |
| 184 | * S-EL0 partitions bumped to FF-A v1.2 version in general functionality tests. |
| 185 | * The `SERVICE_SELECT_MP` macro was added to allow for tests to target a different vCPU |
| 186 | than the primary vCPU. |
| 187 | * Various new tests added to cover the newly added functionalities. |
| 188 | |
| 189 | * Bug fixes: |
| 190 | * FF-A memory management: |
| 191 | * `FFA_MEM_RELINQUISH` returns `FFA_ERROR(FFA_DENIED)`, if clear memory flag is used |
| 192 | when borrower's permission is RO. |
| 193 | * `FFA_MEM_RETRIEVE_REQ` returns `FFA_ERROR(FFA_DENIED)` if sender ID is not correct in |
| 194 | memory region descriptor. |
| 195 | * Hypervisor retrieve request updated to support FF-A v1.2 descriptors and avoid |
| 196 | conflicting checks with normal retrieve requests from FF-A endpoints. |
| 197 | * `FFA_MEM_RETRIEVE_REQ` returns `FFA_ERROR(FFA_INVALID_PARAMETERS)` if receiver count |
| 198 | is zero in memory region descriptor. |
| 199 | * Interrupt handling: |
| 200 | * Secure interrupt implicit completion flag reset in the runtime model for `FFA_RUN`. |
| 201 | * Intercept `FFA_MSG_SEND_DIRECT_RESP/FFA_MSG_SEND_DIRECT_RESP2` and `FFA_MSG_WAIT` if SP |
| 202 | relinquishes CPU cycles with pending secure interrupts. |
| 203 | * Ignore spurious interrupt 1023 when SP is executing. |
| 204 | * Unwind call chain when intercepting a direct response, to avoid SPs crashing. |
| 205 | * Check that platform exists before building. |
| 206 | * `FFA_FEATURES` interface: |
| 207 | * SPMC returns `FFA_ERROR(FFA_NOT_SUPPORTED)` if func ID is `FFA_EL3_INTR_HANDLE`, and |
| 208 | call is from hyperviosr/OS kernel. |
| 209 | * SPMC returns `FFA_ERROR(FFA_NOT_SUPPORTED)` if feature ID is `SRI`, and call is from SP. |
| 210 | * SPMC returns `FFA_ERROR(FFA_NOT_SUPPORTED)` if feature ID is `NPI` or `ME`, and call is |
| 211 | from Hypervisor/OS Kernel. |
| 212 | * FF-A notifications: |
| 213 | * Return error code `FFA_INVALID_PARAMETERS` when provided invalid partition IDs |
| 214 | in `FFA_NOTIFICATION_BITMAP_CREATE/DESTROY` and `FFA_NOTIFICATION_BIND/UNBIND`. |
| 215 | * Return error `FFA_INVALID_PARAMETERS` to `FFA_NOTIFICATION_SET` if flags that |
| 216 | Must Be Zero are not. |
| 217 | * The vCPU argument must be zero in `FFA_NOTIFICATION_SET` for global notifications, |
| 218 | else return error `FFA_INVALID_PARAMETERS`. |
| 219 | * FF-A Indirect messaging: |
| 220 | * Fix the checks to messages offset and total size. |
| 221 | * Validate that SPMC has mapped the hypervisor/OS Kernel RX/TX buffers before |
| 222 | accessing the buffers. |
| 223 | * The handling of `FFA_MSG_WAIT` shall not change the SPMC's internal state of the |
| 224 | RX buffer. |
| 225 | * The interfaces `FFA_MEM_PERM_SET/GET` return error `FFA_DENIED` if used after |
| 226 | SP's initializing. |
| 227 | * The `kokoro/test_spmc.sh` terminates when hitting a failure for runs that are not |
| 228 | collecting coverage data. |
| 229 | * Device memory regions are mapped with attributes nGnRnE. |
| 230 | |
| 231 | * Misc: |
| 232 | * Building multiple targets with a single command with PLATFORM variable, providing |
| 233 | multiple targets separated by ','. |
| 234 | * Dropped the clang toolchain from the 'prebuilts' submodule to save repository space. |
| 235 | * Dropped implementation of `HF_INTERRUPT_INJECT` out of SPMC implementation, as it was |
| 236 | designed for Hypervisor and has no use in the SPMC. |
| 237 | * Code static checks were separated into a dedicated script. |
| 238 | * The interfaces `FFA_RXTX_MAP` and `FFA_RXTX_UNMAP` are restricted to NS memory provided |
| 239 | in the SPMC manifest. |
| 240 | * Improved handling of device region nodes in SP manifest: |
| 241 | * The ranges specified were restricted to those specified in the designated nodes of |
| 242 | the SPMC manifest. |
| 243 | * Check overlaps with other memory regions in the system, such as partitions address |
| 244 | space. |
| 245 | * Avoid tracking the sender ID and descriptor size for memory management ABIs, in |
| 246 | Hafnium's mailbox internal structures. |
| 247 | * Helpers to log the names of FF-A ABIs and FF-A error codes. |
| 248 | * Increase timeout for tests in `kokoro/test_spmc.sh` to cater for CI speed. |
| 249 | * Use bitfield structures for permissions and attributes from the FF-A memory access |
| 250 | descriptors. |
| 251 | |
J-Alves | 946fde9 | 2023-11-03 17:34:20 +0000 | [diff] [blame] | 252 | ## v2.10 |
| 253 | ### Highlights |
| 254 | |
| 255 | * FF-A v1.2 (continued adoption): |
| 256 | * `FFA_YIELD` interface: |
| 257 | * Allow to be invoked while endpoint's partition runtime model is |
| 258 | either direct message request or secure interrupt handling. |
| 259 | * Allow an endpoint to specify an optional timeout such that it can be |
| 260 | rescheduled after appropriate time to avoid busy wait. |
| 261 | * Handle the `FFA_ERROR` interface at the SPs initialisation runtime model |
| 262 | to put the SP in an aborted state. |
| 263 | * Support for Logical Secure Partitions at EL3, managed by the SPMD: |
| 264 | * Direct messaging request from LSPs to SPs at the virtual FF-A instance. |
| 265 | * Discovery of LSPs via `FFA_PARTITION_INFO_GET(_REGS)` interfaces. |
| 266 | * Support flag to bypass multiple borrower checks as part of `FFA_MEM_RETRIEVE_REQ` |
| 267 | handling. |
| 268 | * Memory region nodes support addresses relative to partition's load address. |
| 269 | * Hardware architecture support: |
| 270 | * Fix to SMCCC use on Hafnium, to support use of extended register set as per |
| 271 | SMCCCv1.2 for FF-A v1.2 and above. |
| 272 | * GICv3: Enable platforms to leverage Shared Peripheral Interrupts extended ranges. |
| 273 | * New paravirtualized interfaces to reconfigure a physical interrupt at runtime: |
| 274 | target CPU, disabling/enabling the secure interrupt, and changing interrupt's |
| 275 | security state. |
| 276 | * Leverage support of secure and non-secure set of page tables for SMMUv3 streams. |
| 277 | * Platform description of secure and non-secure memory is mandatory in the SPMC |
| 278 | manifest. |
| 279 | * Use security state information in the S2 page tables to invalidate SP's TLB. |
| 280 | * Tests, scripts and testing framework: |
| 281 | * Test framework improved to add tests into the SP's intialisation, via means of |
| 282 | a helper macro. |
| 283 | * Removed duplicated set of tests that were used to enable support of EL0 |
| 284 | partitions. |
| 285 | * Hypervisor build refactored to track the state of memory sharing operations. |
| 286 | * Few memory sharing related tests to run on EL3 SPMC, and serve as an indicator |
| 287 | about feature parity. |
| 288 | * Added ability to perform test coverage analysis, via Hafnium's testing scripts. |
| 289 | * Increased test coverage of memory sharing functionality. |
| 290 | * Bug fixes: |
| 291 | * Various fixes to memory sharing functionality: |
| 292 | * Clear memory operations retrieve security state from S2 translation |
| 293 | attributes. |
| 294 | * Validation to page count field in the composite memory descriptor. |
| 295 | * No overlapping of memory constituents. |
| 296 | * Restrict SP from doing lend/share/donate targeting a normal world borrower. |
| 297 | * Processing of instruction permissions specified in the lend/share/donate |
| 298 | and by the borrower in the memory retrieve operation. |
| 299 | * Use the NS bit in the `FFA_MEM_RETRIEVE_RESP` from SPMC to SP. |
| 300 | * Force uniqueness of boot order field in the partition's manifest. |
| 301 | * Added `FFA_RUN` interface restriction towards vCPU cores migration. |
| 302 | * Refactor use of locked vCPU structures in few identified scenarios, that |
| 303 | were prone to creating deadlocks. |
| 304 | * Fixed the version compatibility rules in handling of the `FFA_VERSION` |
| 305 | interface. |
| 306 | * Misc: |
| 307 | * Migration of Hafnium documentation as the reference Secure Partition Manager |
| 308 | into its own pages, leveraging the sphinx documentation framework. |
| 309 | * Free resources allocated to SP if it gets to an aborted state, including |
| 310 | disabling any physical interrupts that might trigger. |
| 311 | * Deprecation of legacy hypervisor calls `HF_MAILBOX_*_GET`. |
| 312 | * Simplified code path in the handling of secure interrupts. |
| 313 | * Added build option to specify build target, which allows for faster builds, |
| 314 | e.g. `make PLATFORM=secure_aem_v8a_fvp_vhe`. |
| 315 | |
Olivier Deprez | 0715b8e | 2023-05-11 12:28:03 +0200 | [diff] [blame] | 316 | ## v2.9 |
Olivier Deprez | 28c95f4 | 2023-05-22 14:28:39 +0200 | [diff] [blame] | 317 | ### Highlights |
Olivier Deprez | 0715b8e | 2023-05-11 12:28:03 +0200 | [diff] [blame] | 318 | |
| 319 | * FF-A v1.2 (early adoption) |
| 320 | * Implemented `FFA_PARTITION_INFO_GET_REGS` ABI permitting discovery of |
| 321 | secure partitions by the use of general purpose registers instead of RX/TX |
| 322 | buffers. |
| 323 | * `FFA_CONSOLE_LOG` ABI support is improved from earlier release. It permits |
| 324 | handling multiple characters passed through general purpose registers. |
| 325 | The intent is to deprecate the legacy `HF_DEBUG_LOG` hypercall in a next |
| 326 | release. |
| 327 | * Introduced `FFA_EL3_INTR_HANDLE` ABI permitting the delegation of Group0 |
| 328 | physical secure interrupt handling to EL3. A G0 interrupt triggered while |
| 329 | an SP is running traps to S-EL2 and is routed to the SPMD by the use of |
| 330 | this ABI. Conversely, a G0 interrupt triggered while the normal world runs |
| 331 | traps to EL3. |
| 332 | * FF-A v1.1 interrupt handling |
| 333 | * Added support for secure interrupt signalling to S-EL0 partitions. |
| 334 | * Increased the maximum number of virtual interrupts supported by an SP to a |
| 335 | platform defined value (default 1024). This lifts a limitation in which |
| 336 | SPs were allowed to declare only the first 64 physical interrupt IDs. |
| 337 | * Added the impdef 'other-s-interrupts-action' field to SP manifests |
| 338 | specifying the action to be taken (queued or signaled) in response to a |
| 339 | secure interrupt targetted to an SP that is not the currently running SP. |
| 340 | * For S-EL1 SP vCPUs, enable the notification pending and managed exit |
| 341 | virtual interrupts if requested in the manifest. |
| 342 | For S-EL0 SP vCPUs, enable virtual interrupts IDs matching the secure |
| 343 | physical interrupt IDs declared in device regions. |
| 344 | * Allow a physical interrupt declared in a SP manifest device region to be |
| 345 | routed to any PE specified by its MPIDR. Introduce the 'interrupts-target' |
| 346 | manifest field for this purpose. |
| 347 | * FF-A v1.1 memory sharing |
| 348 | * Implemented changes to memory sharing structures to support FF-A backwards |
| 349 | compatibility updates in the specification. The SPMC implementation caters |
| 350 | for the case of existing FF-A v1.0 endpoints on top of the FF-A v1.1 SPMC. |
| 351 | The latter performs the necessary conversions in the memory sharing |
| 352 | structures. |
| 353 | * Implemented capability to share/lend/donate memory to multiple borrowers |
| 354 | including VMs or SPs. |
| 355 | * Fragmented memory sharing is supported between normal world and secure |
| 356 | world endpoints. |
| 357 | * FF-A v1.1 power management |
| 358 | * Added the impdef 'power-management-messages' field to SP manifests |
| 359 | specifying the type of power management events relayed to the SPMC. |
| 360 | * Removed the limitation in which the first SP must be a MP SP. |
| 361 | The configuration where all deployed SPs are S-EL0 SPs is now supported. |
| 362 | * FF-A v1.1 Indirect messaging |
| 363 | * Updated mailbox internal state structures to align with RX/TX buffer |
| 364 | synchronization rules (buffer state and ownership transfer). |
| 365 | * Misc and bug fixes |
| 366 | * Introduced SPMC manifest memory region nodes specifying the system address |
| 367 | ranges for secure and non-secure memory. This permits further hardening in |
| 368 | which the SPMC needs to know the security state of a memory range. This |
| 369 | helps boot time validation of SP manifests, and run-time checks in the |
| 370 | memory sharing protocol. |
| 371 | * SP manifest memory regions validation is hardened such that one SP cannot |
| 372 | declare a memory region overlapping another SP's memory region. |
| 373 | * Drop dynamic allocation of memory region base address. The option for |
| 374 | declaring a memory region without its base address (and let the SPMC |
| 375 | choose it) is removed. |
| 376 | * Fixed handling of FEAT_LPA/FEAT_LPA2. |
| 377 | * SMMUv3: fix SIDSIZE field usage. |
| 378 | * GIC: fixed interrupt type configuration (edge/level). |
| 379 | * CI and test infrastructure |
| 380 | * Migration to LLVM/clang 15.0.6 |
| 381 | * Removal of non-VHE configurations. Keep only configurations assuming |
| 382 | Armv8.1 Virtualization Host Extensions is implemented. This implies |
| 383 | HCR_EL2.E2H is always set. This change is transparent for the end user as |
| 384 | configurations supported with VHE enabled are a superset of legacy non-VHE |
| 385 | configurations. |
| 386 | * EL3 SPMC: added test configurations to permit testing TF-A's EL3 SPMC |
| 387 | by the use of Hafnium's CI test and infrastructure. The goal is to improve |
| 388 | the test coverage for this alternative SPMC configuration and maintain a |
| 389 | feature set parity with the S-EL2 SPMC. |
| 390 | * Added debug capabilities to hftest script. |
| 391 | |
Olivier Deprez | 28c95f4 | 2023-05-22 14:28:39 +0200 | [diff] [blame] | 392 | ### Known limitations: |
Olivier Deprez | 0715b8e | 2023-05-11 12:28:03 +0200 | [diff] [blame] | 393 | * Power management support limits to cpu on and cpu off events. Only S-EL1 |
| 394 | partitions can opt in for power management events. A power management |
| 395 | event is forwarded from the SPMD to the SPMC and isn't forwarded to a SP. |
| 396 | |
Olivier Deprez | b7d27ac | 2022-11-14 09:49:50 +0100 | [diff] [blame] | 397 | ## v2.8 |
Olivier Deprez | 28c95f4 | 2023-05-22 14:28:39 +0200 | [diff] [blame] | 398 | ### Highlights |
Olivier Deprez | b7d27ac | 2022-11-14 09:49:50 +0100 | [diff] [blame] | 399 | |
| 400 | * FF-A v1.1 partition runtime model and CPU cycle allocation modes |
| 401 | * Implemented partition runtime models for secure partitions entered at |
| 402 | initialization, processing a secure interrupt or as a result of allocation |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 403 | of CPU cycles by `FFA_RUN` and `FFA_MSG_SEND_DIRECT_REQ` ABIs invocations. |
Olivier Deprez | b7d27ac | 2022-11-14 09:49:50 +0100 | [diff] [blame] | 404 | * Added state machine checks related to above, in which a partition has a |
| 405 | set of allowed transitions to enter and exit a partition runtime model. |
| 406 | * Implemented CPU cycle allocation modes and winding/unwinding of call |
| 407 | chains. |
| 408 | * Refactored managed exit field in manifests to use one of the possible |
| 409 | "Action for a non-secure interrupt" defined by the specification. |
| 410 | * Added support for preferred managed exit signal (among vIRQ or vFIQ). |
| 411 | * Support for precedence of the NS interrupt action in unwinding a normal |
| 412 | world scheduled call chain. |
| 413 | * FF-A v1.1 memory sharing |
| 414 | * Preparation changes for multiple borrowers and fragmented memory |
| 415 | sharing support. |
| 416 | * Fixed memory attributes checks as they are passed to memory sharing |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 417 | primitives (`FFA_MEM_SHARE/LEND/DONATE` and `FFA_MEM_RETRIEVE_REQ`). |
Olivier Deprez | b7d27ac | 2022-11-14 09:49:50 +0100 | [diff] [blame] | 418 | * Memory sharing support for S-EL0 partitions. |
| 419 | * FF-A v1.1 notifications |
| 420 | * Added framework notifications support. |
| 421 | The supported use case is for indirect messaging to notify a partition |
| 422 | about a message pending in its RX buffer (or 'RX buffer full' framework |
| 423 | notification). |
| 424 | * Added support for notification pending interrupt injection on a RX buffer |
| 425 | full event. |
| 426 | * FF-A v1.1 Indirect messaging |
| 427 | * Added support for VM-VM, VM-SP, SP-SP indirect messaging scenarios. |
| 428 | * Added partition message header structures. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 429 | * Implemented `FFA_MSG_SEND2` and `FFA_RX_ACQUIRE` ABIs. |
Olivier Deprez | b7d27ac | 2022-11-14 09:49:50 +0100 | [diff] [blame] | 430 | * Refactored VM internal state tracking in the SPMC to support forwarding |
| 431 | of RX/TX buffer mapping/unmapping, notifications creation/destruction, |
| 432 | RX buffer acquire/release. |
| 433 | * Refactored VM mailbox states to support the RX buffer full event. |
| 434 | * FF-A console log ABI |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 435 | * Added the `FFA_CONSOLE_LOG` ABI as a simple and standardized means to print |
Olivier Deprez | b7d27ac | 2022-11-14 09:49:50 +0100 | [diff] [blame] | 436 | characters without depending on an MMIO device mapped into the VM. |
| 437 | This allows a VM to print debug or information strings through an |
| 438 | hypervisor call service using general-purpose registers rather than a |
| 439 | shared buffer. Multiple VMs can use the ABI concurrently as the SPMC |
| 440 | buffers data per VM and serializes output to the physical serial device. |
| 441 | * FF-A v1.1 Setup & Discovery |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 442 | * Updated the `PARTITION_INFO_GET` ABI to return the partition UUID in the |
Olivier Deprez | b7d27ac | 2022-11-14 09:49:50 +0100 | [diff] [blame] | 443 | partition information descriptors. Additionaly the partition information |
| 444 | descriptor size is returned as part of the response. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 445 | * Added `FFA_MEM_FRAG_RX/TX` as supported interface in `FFA_FEATURE` response. |
Olivier Deprez | b7d27ac | 2022-11-14 09:49:50 +0100 | [diff] [blame] | 446 | * Image footprint optimization |
| 447 | * The following updates were made with the general idea of reducing the |
| 448 | flash and RAM footprints. They are also means to adjust the memory |
| 449 | utilization based on the target market segment. |
| 450 | * Added platform defines to state the per-VM maximum number of memory and |
| 451 | device regions, interrupts and SMMU streams per device. |
| 452 | * Dynamically allocate per vCPU notifications. |
| 453 | * Allocate vCPU structures from heap. |
| 454 | * Manifest data allocation from page pool. |
| 455 | * Fixed core stacks section with noload attribute. |
| 456 | * GIC |
| 457 | * Added support for GICv3.1 extended SPI / PPI INTID ranges. |
| 458 | * Add build options to extend the number of supported virtual interrupt IDs. |
| 459 | * SVE |
| 460 | * Detect the platform supported SVE vector length or set the limit for the |
| 461 | lower ELs. |
| 462 | * Increased the SVE NS context to support the maximum vector length |
| 463 | permitted by the architecture. |
| 464 | * Above changes lift the limit about a fixed sized SVE vector length (of |
| 465 | 512 bits) used in earlier releases. |
| 466 | * Misc |
| 467 | * Partition manifest parsing: |
| 468 | * Added checks forbidding SPs to declare overlapping memory regions and |
| 469 | conflicting device interrupt ID resources. |
| 470 | * Add ability to specify the security state of a memory region |
| 471 | for S-EL0 partitions. |
| 472 | * Fixed system register trap exception injection. |
| 473 | * Removed hypervisor tables defragmentation. |
| 474 | * Add ability to define a log level per platform. |
| 475 | * Disable alignment check for EL0 partitions (when VHE is enabled). |
| 476 | |
Olivier Deprez | 28c95f4 | 2023-05-22 14:28:39 +0200 | [diff] [blame] | 477 | ### Known limitations: |
Olivier Deprez | b7d27ac | 2022-11-14 09:49:50 +0100 | [diff] [blame] | 478 | * S-EL0 partitions interrupt handling is work in progress. |
| 479 | * Normal world to secure world fragmented memory sharing and sharing to multiple |
| 480 | borrowers is work in progress. |
| 481 | |
Olivier Deprez | 79e9522 | 2022-05-09 17:21:08 +0200 | [diff] [blame] | 482 | ## v2.7 |
Olivier Deprez | 28c95f4 | 2023-05-22 14:28:39 +0200 | [diff] [blame] | 483 | ### Highlights |
Olivier Deprez | 79e9522 | 2022-05-09 17:21:08 +0200 | [diff] [blame] | 484 | |
| 485 | * Boot protocol (FF-A v1.1 EAC0) |
| 486 | * The SPMC primarily supports passing the SP manifest address at boot time. |
| 487 | * In a secure partition package, partition manifest and image offsets are |
| 488 | configurable. |
| 489 | * Allows for larger partition manifest sizes. |
| 490 | * Setup and discovery (FF-A v1.1 EAC0) |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 491 | * `FFA_VERSION` is forwarded from SPMD to SPMC. SPMC records the version of |
Olivier Deprez | 79e9522 | 2022-05-09 17:21:08 +0200 | [diff] [blame] | 492 | a normal world endpoint. |
| 493 | * Added UUID to partition info descriptors. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 494 | * Introduced count flag to `FFA_PARTITION_INFO_GET`. |
Olivier Deprez | 79e9522 | 2022-05-09 17:21:08 +0200 | [diff] [blame] | 495 | * Interrupt handling (FF-A v1.1 Beta0) |
| 496 | * Physical GIC registers trapped when accessed from secure partitions. |
| 497 | * Priority mask register saved/restored on world switches. |
| 498 | * Interrupts masked before resuming a pre-empted vCPU. |
| 499 | * Implemented implicit secure interrupt completion signal. |
| 500 | * Allow unused GICR frame for non-existent PEs. |
| 501 | * Notifications (FF-A v1.1 EAC0) |
| 502 | * Implemented notification pending interrupt and additional test coverage. |
| 503 | * MTE stack tagging |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 504 | * Implemented `FEAT_MTE2` stack tagging support at S-EL2. |
Olivier Deprez | 79e9522 | 2022-05-09 17:21:08 +0200 | [diff] [blame] | 505 | * Core stacks marked as normal tagged memory. A synchronous abort triggers |
| 506 | on a load/store tag check failure. |
| 507 | * This permits detection of wrong operations affecting buffers allocated |
| 508 | from the stack. |
| 509 | * FF-A v1.0 compliance |
| 510 | * Check composite memory region offset is defined in FF-A memory sharing. |
| 511 | * Check sender and receiver memory attributes in a FF-A memory sharing |
| 512 | operation match the attributes expected in the Hafnium implementation. |
| 513 | * Fix clear memory bit use in FF-A memory sharing from NWd to SWd. |
| 514 | * Prevent FF-A memory sharing from a SP to a NS endpoint. |
| 515 | * Reject a FF-A memory retrieve operation with the 'Address Range Alignment |
| 516 | Hint' bit set (not supported by the implementation). |
| 517 | * Refine usage of FF-A memory sharing 'clear memory flag'. |
| 518 | * Misc |
| 519 | * Improved extended memory address ranges support: |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 520 | * 52 bits PA (`FEAT_LPA`/`FEAT_LPA2`) architecture extension detected |
Olivier Deprez | 79e9522 | 2022-05-09 17:21:08 +0200 | [diff] [blame] | 521 | results in limiting the EL2 Stage-1 physical address range to 48 bits. |
| 522 | * In the FF-A memory sharing operations, harden address width checks on |
| 523 | buffer mapping. |
| 524 | * Improved MP SP and S-EL0 partitions support |
| 525 | * The physical core index is passed to a SP vCPU0 on booting. |
| 526 | * Added MP SP and S-EL0 partitions boot test coverage. |
| 527 | * Emulate SMCCC VERSION to the primary VM. |
| 528 | * Memory config registers (non-secure and secure virtualization control and |
| 529 | translation table base) moved to the vCPU context. |
| 530 | * EL2 stage 1 mapping extended to 1TB to support systems with physical |
| 531 | address space larger than 512GB. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 532 | * `FFA_RUN` ABI hardened to check the vCPU index matches the PE index onto |
Olivier Deprez | 79e9522 | 2022-05-09 17:21:08 +0200 | [diff] [blame] | 533 | which a vCPU is requested to run. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 534 | * Fixed missing ISB after `CPTR_EL2` update upon PE initialization. |
Olivier Deprez | 79e9522 | 2022-05-09 17:21:08 +0200 | [diff] [blame] | 535 | * Fixed stage 2 default shareability to inner shareable (from non-shareable) |
| 536 | to better support vCPU migration. |
| 537 | * Fixed manifest structure allocation from BSS rather than stack |
| 538 | at initialization. |
| 539 | * Fixed an issue with FF-A memory reclaim executed after memory donate |
| 540 | resulting in a returned error code. |
| 541 | * Build and test environment |
| 542 | * Add the ability to use an out-of-tree toolchain. |
| 543 | * Primary intent is to permit building Hafnium on Aarch64 hosts. |
| 544 | * CI runs using the toolchain versioned in prebuilts submodule. |
| 545 | A developer can still use this version as well. |
| 546 | * Introduce an assert macro enabled by a build option on the command line. |
| 547 | Assertions are checked by default. Production builds can optionally |
| 548 | disable assertions. |
| 549 | * Added manifest options to permit loading VMs using an FF-A manifest. |
| 550 | * CI |
| 551 | * Added job running the Hypervisor + SPMC configuration on patch |
| 552 | submissions. |
| 553 | * FVP |
| 554 | * Enable secure memory option. |
| 555 | * Remove restriction on speculative execution options. |
| 556 | * Updated to use model version 11.17 build 21. |
| 557 | * Updated linux submodule to v5.10. |
| 558 | * VHE EL0 partitions tests automated through jenkins. |
| 559 | |
Olivier Deprez | 28c95f4 | 2023-05-22 14:28:39 +0200 | [diff] [blame] | 560 | ### Known limitations: |
Olivier Deprez | 79e9522 | 2022-05-09 17:21:08 +0200 | [diff] [blame] | 561 | * FF-A v1.1 EAC0 implementation is partial mainly on interrupt handling and |
| 562 | memory sharing. |
| 563 | * Hafnium limits physical interrupt IDs to 64. The legacy virtual interrupt |
| 564 | controller driver limits to 64. The recent addition of physical interrupt |
| 565 | handling in the SPMC through the GIC assumes a 1:1 mapping of a physical |
| 566 | interrupt ID to a virtual interrupt ID. |
| 567 | * Secure timer virtualization is not supported. |
| 568 | * The security state of memory or device region cannot be specified in a SP |
| 569 | manifest. |
| 570 | |
Olivier Deprez | 55b74f8 | 2021-11-10 11:32:31 +0100 | [diff] [blame] | 571 | ## v2.6 |
Olivier Deprez | 28c95f4 | 2023-05-22 14:28:39 +0200 | [diff] [blame] | 572 | ### Highlights |
Olivier Deprez | 55b74f8 | 2021-11-10 11:32:31 +0100 | [diff] [blame] | 573 | * FF-A Setup and discovery |
| 574 | * FF-A build time version updated to v1.1. |
| 575 | * Managed exit and notifications feature support enabled in SP manifests. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 576 | * Updated `FFA_FEATURES` to permit discovery of managed exit, schedule receiver, |
Olivier Deprez | 55b74f8 | 2021-11-10 11:32:31 +0100 | [diff] [blame] | 577 | and notification pending interrupt IDs. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 578 | * `FFA_PARTITION_INFO_GET` updated to permit managed exit and notification |
Olivier Deprez | 55b74f8 | 2021-11-10 11:32:31 +0100 | [diff] [blame] | 579 | support discovery. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 580 | * `FFA_SPM_ID_GET` added to permit discovering the SPMC endpoint ID (or the |
Olivier Deprez | 55b74f8 | 2021-11-10 11:32:31 +0100 | [diff] [blame] | 581 | SPMD ID at the secure physical FF-A instance). |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 582 | * `FFA_RXTX_UNMAP` implementation added. |
Olivier Deprez | 55b74f8 | 2021-11-10 11:32:31 +0100 | [diff] [blame] | 583 | * FF-A v1.1 notifications |
| 584 | * Added ABIs permitting VM (or OS kernel) to SP, and SP to SP asynchronous |
| 585 | signaling. |
| 586 | * Added generation of scheduler receiver (NS physical) and notification |
| 587 | pending (secure virtual) interrupts. |
| 588 | * The schedule receiver interrupt is donated from the secure world SGI |
| 589 | interrupt ID range. |
| 590 | * FF-A v1.1 interrupt handling |
| 591 | * Added a GIC driver at S-EL2 permitting to trap and handle non-secure and |
| 592 | secure interrupts while the secure world runs. |
| 593 | * Added forwarding and handling of a secure interrupt while the normal world |
| 594 | runs. |
| 595 | * Added secure interrupt forwarding to the secure partition that had the |
| 596 | interrupt registered in its partition manifest. |
| 597 | * The interrupt deactivation happens through the Hafnium para-virtualized |
| 598 | interrupt controller interface. |
| 599 | * vCPU states, run time models and SP scheduling model are revisited as per |
| 600 | FF-A v1.1 Beta0 specification (see 'Known limitations' section below). |
| 601 | * S-EL0 partitions support |
| 602 | * Added support for VHE architecture extension in the secure world (through |
| 603 | a build option). |
| 604 | * A partition bootstraps as an S-EL0 partition based on the exception-level |
| 605 | field in the FF-A manifest. |
| 606 | * It permits the implementation of applications on top of Hafnium without |
| 607 | relying on an operating system at S-EL1. |
| 608 | * It leverages the EL2&0 Stage-1 translation regime. Apps use FF-A |
| 609 | ABIs through the SVC conduit. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 610 | * Added FF-A v1.1 `FFA_MEM_PERM_GET/SET` ABIs permitting run-time update of |
Olivier Deprez | 55b74f8 | 2021-11-10 11:32:31 +0100 | [diff] [blame] | 611 | memory region permissions. |
| 612 | * It supersedes the existing S-EL1 shim architecture (without removing its |
| 613 | support). |
| 614 | * S-EL1 SP, S-EL0 SP or former S-EL0 SP+shim can all co-exist in the same |
| 615 | system. |
| 616 | * SVE |
| 617 | * Support for saving/restoring the SVE live state such that S-EL2/Hafnium |
| 618 | preserves the normal world state on world switches. |
| 619 | * Secure partitions are permitted to use FP/SIMD while normal world uses |
| 620 | SVE/SIMD/FP on the same core. |
| 621 | * The SVE NS live state comprises FPCR/FPSR/FFR/p[16]/Z[32] registers. |
| 622 | * LLVM/Clang 12 |
| 623 | * The toolchain stored in prebuilts submodule is updated to LLVM 12.0.5. |
| 624 | * Build/static analyzer fixes done in the top and third party projects. |
| 625 | * Linux sources (used by the test infrastructure) are updated to 5.4.148. |
| 626 | The linux test kernel module build is updated to only depend on LLVM |
| 627 | toolchain. |
| 628 | * Hafnium CI improvements |
| 629 | * Added two configurations permitting Hafnium testing in the secure world. |
| 630 | * First configuration launches both the Hypervisor in the normal world |
| 631 | and the SPMC in the secure world. This permits thorough FF-A ABI testing |
| 632 | among normal and secure world endpoints. |
| 633 | * The second configuration launches the SPMC alone for component testing |
| 634 | or SP to SP ABI testing. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 635 | * Hafnium CI Qemu version updated to v6.0.0 (implements VHE and `FEAT_SEL2` |
Olivier Deprez | 55b74f8 | 2021-11-10 11:32:31 +0100 | [diff] [blame] | 636 | extensions). |
| 637 | * FF-A compliance fixes |
| 638 | * Added checks for valid memory permissions values in manifest memory and |
| 639 | device regions declarations. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 640 | * `FFA_FEATURES` fixed to state indirect messages are not supported by |
Olivier Deprez | 55b74f8 | 2021-11-10 11:32:31 +0100 | [diff] [blame] | 641 | the SPMC. |
| 642 | * Limit an SP to emit a direct request to another SP only. |
| 643 | * Memory sharing: fixed input validation and return values. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 644 | * `FFA_RXTX_MAP` fixed returned error codes. |
| 645 | * `FFA_MSG_WAIT` input parameters check hardened. |
Olivier Deprez | 55b74f8 | 2021-11-10 11:32:31 +0100 | [diff] [blame] | 646 | |
Olivier Deprez | 28c95f4 | 2023-05-22 14:28:39 +0200 | [diff] [blame] | 647 | ### Known limitations: |
Olivier Deprez | 55b74f8 | 2021-11-10 11:32:31 +0100 | [diff] [blame] | 648 | * S-EL0 partitions/VHE: the feature is in an experimental stage and not all use |
| 649 | cases have been implemented or tested. Normal world to SP and SP to SP memory |
| 650 | sharing is not tested. Interrupt handling is not tested. |
| 651 | * The current implementation does not support handling a secure interrupt that |
| 652 | is triggered while currently handling a secure interrupt. This restricts to |
| 653 | scenarios described in Table 8.13 and Table 8.14 of the FF-A v1.1 Beta0 |
| 654 | specification. Priority Mask Register is not saved/restored during context |
| 655 | switching while handling secure interrupt. |
| 656 | * Hafnium CI: scenarios involving the Hypervisor are left as test harness |
| 657 | purposes only, not meant for production use cases. |
Daniel Boulby | ccb7068 | 2021-04-28 19:40:39 +0100 | [diff] [blame] | 658 | |
| 659 | ## v2.5 |
Olivier Deprez | 28c95f4 | 2023-05-22 14:28:39 +0200 | [diff] [blame] | 660 | ### Highlights |
Daniel Boulby | ccb7068 | 2021-04-28 19:40:39 +0100 | [diff] [blame] | 661 | * BTI/Pointer authentication support |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 662 | * Add branch protection build option for `FEAT_PAuth` and `FEAT_BTI` to the |
Daniel Boulby | ccb7068 | 2021-04-28 19:40:39 +0100 | [diff] [blame] | 663 | clang command line. This only affects the S-EL2 image. |
| 664 | * Enable pointer authentication by supplying a platform defined pseudo |
| 665 | random key. |
| 666 | * Enable BTI by setting the guarded page bit in MMU descriptors for |
| 667 | executable pages. |
| 668 | * SMMUv3.2 S-EL2 support |
| 669 | * Add support for SMMUv3 driver to perform stage 2 translation, protection |
| 670 | and isolation of upstream peripheral device's DMA transactions. |
| 671 | * FF-A v1.0 Non-secure interrupt handling |
| 672 | * Trap physical interrupts to S-EL2 when running a SP. |
| 673 | * Handle non secure interrupts that occur while an SP is executing, |
| 674 | performing managed exit if supported. |
| 675 | * Add basic support for the GICv3 interrupt controller for the AArch64 |
| 676 | platform. |
| 677 | * FF-A power management support at boot time |
| 678 | * Provide platform-independent power management implementations for the |
| 679 | Hypervisor and SPMC. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 680 | * Implement the `FFA_SECONDARY_EP_REGISTER` interface for an MP SP or SPMC |
Daniel Boulby | ccb7068 | 2021-04-28 19:40:39 +0100 | [diff] [blame] | 681 | to register the secondary core cold boot entry point for each of their |
| 682 | execution contexts. |
| 683 | * Introduce a generic "SPMD handler" to process the power management events |
| 684 | that may be conveyed from SPMD to SPMC, such as core off. |
| 685 | * FF-A Direct message interfaces |
| 686 | * Introduce SP to SP direct messaging. |
| 687 | * Fix bug in the MP SP to UP SP direct response handling. |
| 688 | * FF-A Memory sharing interfaces |
| 689 | * Introduce SP to SP memory sharing. |
| 690 | * When a sender of a memory management operation reclaims memory, set the |
| 691 | memory regions permissions back to it's original configuration. |
| 692 | * Require default permissions to be supplied to the function |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 693 | `ffa_memory_permissions_to_mode`, so in the case where no permissions are |
Daniel Boulby | ccb7068 | 2021-04-28 19:40:39 +0100 | [diff] [blame] | 694 | specified for a memory operation, the data and instruction permissions can |
| 695 | be set to the default. |
| 696 | * Encode Bit[63] of the memory region handle according to if the handle is |
| 697 | allocated by the Hypervisor or SPMC. |
| 698 | * FF-A v1.0 spec compliance |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 699 | * Return `INVALID_PARAMETER` error code instead of `NOT_SUPPORTED` for direct |
Daniel Boulby | ccb7068 | 2021-04-28 19:40:39 +0100 | [diff] [blame] | 700 | messaging interfaces when an invalid sender or receiver id is given. |
| 701 | * Check that reserved parameter registers are 0 when invoking direct |
| 702 | messaging ABI interfaces. |
| 703 | * For SMC32 compliant direct message interfaces, only copy 32-bits |
| 704 | parameter values. |
| 705 | * Change the FF-A error codes to 32-bit to match the FF-A specification. |
| 706 | * Fix consistency with maintaining the calling convention bit of the |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 707 | func id between the `ffa_handler` and the `FFA_FEATURES` function. |
Daniel Boulby | ccb7068 | 2021-04-28 19:40:39 +0100 | [diff] [blame] | 708 | * Remove primary VM dependencies in the SPMC |
| 709 | * Treat normal world as primary VM when running in the secure world. |
| 710 | * Create an SPMC boot flow. |
| 711 | * Hafnium CI |
| 712 | * Enable Hafnium CI to include tests for Hafnium SPMC. |
| 713 | * Add basic exception handler to service VM's. |
| 714 | * SIMD support |
| 715 | * Add saving/restoring of other world FP/NEON/SIMD state when entering and |
| 716 | exiting the SPMC. |
| 717 | * SPMC early boot cache fix |
| 718 | * Import data cache clean and invalidation helpers from TF-A project and |
| 719 | provide an arch module for cache operations. |
| 720 | * Invalidate the SPMC image in the data cache at boot time to prevent |
| 721 | potential access to stale cache entries left by earlier boots stages. |
| 722 | * Misc and bug fixes |
| 723 | * Complete vCPU state save prior to normal world exit. |
| 724 | * Update S-EL2 Stage-1 page table shareability from outer to inner. |
| 725 | * Add PL011 UART initialization code to set the IDRD and FBRD registers |
| 726 | according to the UART clock and baud rate specified at build time. |
| 727 | * License script checker fixes. |
| 728 | |
Olivier Deprez | 28c95f4 | 2023-05-22 14:28:39 +0200 | [diff] [blame] | 729 | ### Known limitations: |
Daniel Boulby | ccb7068 | 2021-04-28 19:40:39 +0100 | [diff] [blame] | 730 | * Secure interrupts not supported. |
| 731 | * FF-A indirect message interface not supported in the secure world. |
| 732 | * Only supporting models of MultiProcessor SP (vCPUs pinned to physical |
| 733 | CPUs) or UniProcessor SP (single vCPU). |
| 734 | * The first secure partition booted must be a MP SP. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 735 | * `FFA_RXTX_UNMAP` not implemented. |
Daniel Boulby | ccb7068 | 2021-04-28 19:40:39 +0100 | [diff] [blame] | 736 | * Use of an alternate caller provided buffer from RX/TX buffers for memory |
| 737 | sharing operations is not implemented. |
| 738 | * A memory retrieve request to SPMC does not support the caller endpoint to |
| 739 | provide the range of IPA addresses to map the region to. |
Olivier Deprez | 62405ad | 2020-10-26 18:51:49 +0100 | [diff] [blame] | 740 | |
| 741 | ## v2.4 |
| 742 | |
| 743 | This is the first drop to implement the TrustZone secure side S-EL2 firmware |
Olivier Deprez | 410a3ac | 2020-11-04 13:54:15 +0100 | [diff] [blame] | 744 | (SPM Core component) complying with FF-A v1.0. |
Olivier Deprez | 62405ad | 2020-10-26 18:51:49 +0100 | [diff] [blame] | 745 | It is a companion to the broader TF-A v2.4 release. |
| 746 | The normal world Hypervisor is maintained functional along with the |
| 747 | Hafnium CI test suite. |
| 748 | |
Olivier Deprez | 28c95f4 | 2023-05-22 14:28:39 +0200 | [diff] [blame] | 749 | ### Highlights |
Olivier Deprez | 62405ad | 2020-10-26 18:51:49 +0100 | [diff] [blame] | 750 | * FF-A v1.0 Setup and discovery interface |
| 751 | * Hypervisor implementation re-used and extended to the SPMC and SPs. |
| 752 | * Added partition info get ABI and appropriate properties response depending |
| 753 | on partition capabilities (PVM, Secondary VM or Secure Partitions). |
| 754 | * FF-A device-tree manifest parsing. |
| 755 | * FF-A partitions can declare memory/device regions, and RX/TX buffers that |
| 756 | the SPMC sets up in the SP EL1&0 Stage-2 translation regime at boot time. |
| 757 | * FF-A IDs normal and secure world split ranges. |
| 758 | * The SPMC maps the Hypervisor (or OS kernel) RX/TX buffers as non-secure |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 759 | buffers in its EL2 Stage-1 translation regime on `FFA_RXTX_MAP` ABI |
Olivier Deprez | 62405ad | 2020-10-26 18:51:49 +0100 | [diff] [blame] | 760 | invocation from the non-secure physical FF-A instance. |
| 761 | * FF-A v1.0 Direct message interface |
| 762 | * Added implementation for the normal world Hypervisor and test cases. |
| 763 | * Implementation extended to the SPMC and SPs. |
| 764 | * Direct message requests emitted from the PVM to a Secondary VM or a |
| 765 | Secure Partition (or OS Kernel to a Secure Partition). Direct message |
| 766 | responses emitted from Secondary VMs and Secure Partitions to the PVM. |
| 767 | * The secure world represents the "other world" (normal world Hypervisor |
| 768 | or OS kernel) vCPUs in an abstract "Hypervisor VM". |
| 769 | * FF-A v1.0 memory sharing |
| 770 | * Hypervisor implementation re-used and extended to the SPMC and SPs. |
| 771 | * A NS buffer can be shared/lent/donated by a VM to a SP (or OS Kernel |
| 772 | to a SP). |
| 773 | * The secure world configures Stage-1 NS IPA output to access the NS PA |
| 774 | space. |
| 775 | * The secure world represents the "other world" (normal world Hypervisor |
| 776 | or OS kernel) memory pages in an abstract "Hypervisor VM" and tracks |
| 777 | memory sharing permissions from incoming normal world requests. |
| 778 | * Secure world enablement |
Olivier Deprez | 410a3ac | 2020-11-04 13:54:15 +0100 | [diff] [blame] | 779 | * Secure Partitions booted in sequence on their primary execution context, |
| 780 | according to the boot order field in their partition manifest. |
| 781 | This happens during the secure boot process before the normal world |
| 782 | actually runs. |
Olivier Deprez | 62405ad | 2020-10-26 18:51:49 +0100 | [diff] [blame] | 783 | * The SPMC implements the logic to receive FF-A messages through the EL3 |
| 784 | SPMD, process them, and either return to the SPMD (and normal world) or |
| 785 | resume a Secure Partition. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 786 | * Extract NS bit from `HPFAR_EL2` on Stage-2 page fault. |
Olivier Deprez | 62405ad | 2020-10-26 18:51:49 +0100 | [diff] [blame] | 787 | * Prevent setup of LOR regions in SWd. |
| 788 | * Avoid direct PSCI calls down to EL3. |
| 789 | * Platforms |
| 790 | * Added Arm FVP secure Hafnium build support. |
| 791 | * Added Arm TC0 "Total Compute" secure Hafnium build support. |
| 792 | * Other improvements |
| 793 | * Re-hosting to trustedfirmware.org |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 794 | * `busy_secondary` timer increased to improve CI stability. |
Olivier Deprez | 62405ad | 2020-10-26 18:51:49 +0100 | [diff] [blame] | 795 | * Removed legacy Hypervisor calls. |
Demi Marie Obenour | 1a55b77 | 2023-02-15 10:38:26 -0500 | [diff] [blame] | 796 | * Fix `CPTR_EL2` TTA bit position. |
| 797 | * Report `FAR_EL2` on injecting EL1 exception. |
Olivier Deprez | 28c95f4 | 2023-05-22 14:28:39 +0200 | [diff] [blame] | 798 | ### Known limitations: |
Daniel Boulby | ccb7068 | 2021-04-28 19:40:39 +0100 | [diff] [blame] | 799 | * Not all fields of the FF-A manifest are actually processed by the Hafnium |
| 800 | device-tree parser. |
| 801 | * SP to SP communication not supported. |
| 802 | * SP to SP memory sharing not supported. |
| 803 | * S-EL1 and SIMD contexts shall be saved/restored by EL3. |
| 804 | * Multi-endpoint memory sharing not supported. |
| 805 | * Interrupt management limited to trapping physical interrupts to |
| 806 | the first S-EL1 SP. Physical interrupt trapping at S-EL2 planned as |
| 807 | next release improvement. |
| 808 | * Validation mostly performed using first SP Execution Context (vCPU0). More |
| 809 | comprehensive multicore enablement planned as next release improvement. |