From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id ADCECC001B0 for ; Tue, 8 Aug 2023 19:25:55 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 0BC2786679; Tue, 8 Aug 2023 21:25:54 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=konsulko.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=konsulko.com header.i=@konsulko.com header.b="Fhr/mqdJ"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 1FB8686625; Tue, 8 Aug 2023 21:25:52 +0200 (CEST) Received: from mail-yw1-x112e.google.com (mail-yw1-x112e.google.com [IPv6:2607:f8b0:4864:20::112e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 0A77B865DE for ; Tue, 8 Aug 2023 21:25:50 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=konsulko.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=trini@konsulko.com Received: by mail-yw1-x112e.google.com with SMTP id 00721157ae682-5862a6ae535so64405517b3.0 for ; Tue, 08 Aug 2023 12:25:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=konsulko.com; s=google; t=1691522748; x=1692127548; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=EqoxCVRKMv6d1ek5V66k+YRzm8euw01IVHkXdpweacI=; b=Fhr/mqdJAlFpaWXWXDYwIB9IGp3Gu5Ydv7qWyN8pCpKhUTPnUe8RkeFSVWM/JdXj3H sZy2a7ZYFOk/d8Q1vdFgEsxhdX5uMOjieBio6tmKFVkNE+vCZHoVucA1HWCtyOlSX3Kb qNcsjKFxe8DiPWavVxtN3/fsLt3BBepsTacZQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1691522748; x=1692127548; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=EqoxCVRKMv6d1ek5V66k+YRzm8euw01IVHkXdpweacI=; b=HXyYPDs05UihpKBjIc+GWLOYpHNnDx4fgPHl+4iL2bqyP8wKQC4DJHEo9tMQXLHR4R zpNzGv8AbaoqvdBnqT1Crhel0yeWjvhJkvsMjE8Cc0pjgv5As+c3gisVPJeibUu0ROB7 bifMNXFqn+khgfm1Icohwc6zeMadiEHv5DTOlMG9lIjVU4KFXdPMdRDeZ2bNqi4I2uz7 KjU/XuAutR8S5X7yEqqZn4rH9M6GR6tdnlCw+T8bRb83906rlNdmGWaCuSvuGbuRXB7T vB6DqIHEJb5niW4Pz+2cUYAtOkHwtn4jMChQY+HbF/77skmtF//Z5obkhvWzmPWDAkZ7 DXXQ== X-Gm-Message-State: AOJu0YzxvxRhBdTh+ix/cOms4x1FICrz5Mz9/HbPrDSgoHhurszW9+q8 zdTDYszrjPSBBaTsg/wpLrkT8g== X-Google-Smtp-Source: AGHT+IEI0+f2sZjvaOgu63Uzq5cxu1cC06GVJnwn5+GEuJPf2W4limnTV2DBkMqsYupQHwxLY3yTiQ== X-Received: by 2002:a5b:48a:0:b0:d07:3049:a876 with SMTP id n10-20020a5b048a000000b00d073049a876mr501205ybp.58.1691522748585; Tue, 08 Aug 2023 12:25:48 -0700 (PDT) Received: from bill-the-cat (2603-6081-7b00-6400-2db6-4152-97dc-8c4e.res6.spectrum.com. [2603:6081:7b00:6400:2db6:4152:97dc:8c4e]) by smtp.gmail.com with ESMTPSA id g188-20020a2520c5000000b00d32135938c1sm2955210ybg.26.2023.08.08.12.25.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 08 Aug 2023 12:25:48 -0700 (PDT) Date: Tue, 8 Aug 2023 15:25:46 -0400 From: Tom Rini To: Abdellatif El Khlifi Cc: achin.gupta@arm.com, ilias.apalodimas@linaro.org, jens.wiklander@linaro.org, nd@arm.com, sjg@chromium.org, u-boot@lists.denx.de, Rob Herring , Drew Reed , Xueliang Zhong Subject: Re: [PATCH v19 0/9] introduce Arm FF-A support Message-ID: <20230808192546.GA1080577@bill-the-cat> References: <20230803171435.GV3630934@bill-the-cat> <20230804133345.246809-1-abdellatif.elkhlifi@arm.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="jinI84ba6qu0wfVg" Content-Disposition: inline In-Reply-To: <20230804133345.246809-1-abdellatif.elkhlifi@arm.com> X-Clacks-Overhead: GNU Terry Pratchett X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.8 at phobos.denx.de X-Virus-Status: Clean --jinI84ba6qu0wfVg Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Fri, Aug 04, 2023 at 02:33:36PM +0100, Abdellatif El Khlifi wrote: > Adding support for Arm FF-A v1.0 (Arm Firmware Framework for Armv8-A) [A]. >=20 > FF-A specifies interfaces that enable a pair of software execution enviro= nments aka partitions to > communicate with each other. A partition could be a VM in the Normal or S= ecure world, an > application in S-EL0, or a Trusted OS in S-EL1. >=20 > FF-A is a discoverable bus and similar to architecture features. > FF-A bus is discovered using ARM_SMCCC_FEATURES mechanism performed > by the PSCI driver. >=20 > =3D> dm tree >=20 > Class Index Probed Driver Name > ----------------------------------------------------------- > ... > firmware 0 [ + ] psci |-- psci > ffa 0 [ ] arm_ffa | `-- arm_ffa > ... >=20 > Clients are able to probe then use the FF-A bus by calling the DM class > searching APIs (e.g: uclass_first_device). >=20 > This implementation of the specification provides support for Aarch64. >=20 > The FF-A driver uses the SMC ABIs defined by the FF-A specification to: >=20 > - Discover the presence of secure partitions (SPs) of interest > - Access an SP's service through communication protocols > (e.g: EFI MM communication protocol) >=20 > The FF-A support provides the following features: >=20 > - Being generic by design and can be used by any Arm 64-bit platform > - FF-A support can be compiled and used without EFI > - Support for SMCCCv1.2 x0-x17 registers > - Support for SMC32 calling convention > - Support for 32-bit and 64-bit FF-A direct messaging > - Support for FF-A MM communication (compatible with EFI boot time) > - Enabling FF-A and MM communication in Corstone1000 platform as a us= e case > - A Uclass driver providing generic FF-A methods. > - An Arm FF-A device driver providing Arm-specific methods and reusin= g the Uclass methods. > - A sandbox emulator for Arm FF-A, emulates the FF-A side of the Secu= re World and provides > FF-A ABIs inspection methods. > - An FF-A sandbox device driver for FF-A communication with the emula= ted Secure World. > The driver leverages the FF-A Uclass to establish FF-A communicatio= n. > - Sandbox FF-A test cases. > - A new command called armffa is provided as an example of how to acc= ess the > FF-A bus >=20 > For more details about the FF-A support please refer to [B] and refer to = [C] for > how to use the armffa command. >=20 > Please find at [D] an example of the expected boot logs when enabling > FF-A support for a platform. In this example the platform is > Corstone1000. But it can be any Arm 64-bit platform. For the series, applied to u-boot/master, thanks! --=20 Tom --jinI84ba6qu0wfVg Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGzBAABCgAdFiEEGjx/cOCPqxcHgJu/FHw5/5Y0tywFAmTSlrMACgkQFHw5/5Y0 tywNOwwAtBiRWQC0/UiGu576VniDs9qMIetzl6zJDni00kTI2li9fUy/rFv6YWmR gYC7YGEgosE0N2bREHG2MWkmx0SXrbpaKn2nizcXD4mC6EjR+mnm0AWkoknBhLri Hx/NY3PDIK97VCPnCuh+W8G92p6Y5tW3bNskQ1OVG5sK3cHa8po7ouRswTtHpTlE PLNTV+xj34HkI6bwl6TJnxTJQAD5D4fzs4oXketAnUWDgYQGSWVkOsooYDxbmNNN DqBUKw8v3B70X1aZcyaTE3Ex4x6WS/UEre+f6LB0793K5yvUeVuo8ll3omdvStxJ gpj8+NFT91DR8gfYuJzxM6BfuRTMBO8jI8EACOziElsn54q108EHVlJKlhYFym4j enB9zmPcx32CrlScDEQGV2KSAzppBL0eTZ93pVaFU2FrOFPB8HYOZxLcYvKV6h/S k5d0zvAiqSEaWH2E01lD6ti9ar3js6nBta1eU/PsvtVrdaBoFoxzVtAoxriAmS3l uvOA8GQ7 =hhdJ -----END PGP SIGNATURE----- --jinI84ba6qu0wfVg--