blob: 917885f7991e394015d54ffdc41b4ba208f3bc9f [file] [log] [blame]
J-Alves7581c382020-05-07 18:34:20 +01001/*
Karl Meakin92aa7702023-10-11 18:48:01 +01002 * Copyright (c) 2018-2023, Arm Limited. All rights reserved.
J-Alves7581c382020-05-07 18:34:20 +01003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#ifndef FFA_HELPERS_H
8#define FFA_HELPERS_H
9
J-Alves8f08a052020-05-26 17:14:40 +010010#include <ffa_svc.h>
J-Alves7581c382020-05-07 18:34:20 +010011#include <tftf_lib.h>
12#include <utils_def.h>
13
J-Alves779fba62024-04-05 14:14:40 +010014#include <xlat_tables_defs.h>
15
Karl Meakin7308b122024-04-16 14:02:25 +010016/* FFA_VERSION helpers */
17/**
18 * The version number of a Firmware Framework implementation is a 31-bit
19 * unsigned integer, with the upper 15 bits denoting the major revision,
20 * and the lower 16 bits denoting the minor revision.
21 */
22enum ffa_version {
23 FFA_VERSION_1_0 = 0x10000,
24 FFA_VERSION_1_1 = 0x10001,
25 FFA_VERSION_1_2 = 0x10002,
26 FFA_VERSION_COMPILED = FFA_VERSION_1_2,
27};
28
29#define FFA_VERSION_MBZ_BIT (1U << 31U)
30#define FFA_VERSION_MAJOR_SHIFT (16U)
31#define FFA_VERSION_MAJOR_MASK (0x7FFFU)
32#define FFA_VERSION_MINOR_SHIFT (0U)
33#define FFA_VERSION_MINOR_MASK (0xFFFFU)
34
35/** Return true if the version is valid (i.e. bit 31 is 0). */
36static inline bool ffa_version_is_valid(uint32_t version)
37{
38 return (version & FFA_VERSION_MBZ_BIT) == 0;
39}
40
41/** Construct a version from a pair of major and minor components. */
42static inline enum ffa_version make_ffa_version(uint16_t major, uint16_t minor)
43{
44 return (enum ffa_version)((major << FFA_VERSION_MAJOR_SHIFT) |
45 (minor << FFA_VERSION_MINOR_SHIFT));
46}
47
48/** Get the major component of the version. */
49static inline uint16_t ffa_version_get_major(enum ffa_version version)
50{
51 return (version >> FFA_VERSION_MAJOR_SHIFT) & FFA_VERSION_MAJOR_MASK;
52}
53
54/** Get the minor component of the version. */
55static inline uint16_t ffa_version_get_minor(enum ffa_version version)
56{
57 return (version >> FFA_VERSION_MINOR_SHIFT) & FFA_VERSION_MINOR_MASK;
58}
59
60/**
61 * Check major versions are equal and the minor version of the caller is
62 * less than or equal to the minor version of the callee.
63 */
64static inline bool ffa_versions_are_compatible(enum ffa_version caller,
65 enum ffa_version callee)
66{
67 return ffa_version_get_major(caller) == ffa_version_get_major(callee) &&
68 ffa_version_get_minor(caller) <= ffa_version_get_minor(callee);
69}
70
J-Alves7581c382020-05-07 18:34:20 +010071/* This error code must be different to the ones used by FFA */
72#define FFA_TFTF_ERROR -42
73
Daniel Boulbye79d2072021-03-03 11:34:53 +000074typedef unsigned short ffa_id_t;
J-Alves5aecd982020-06-11 10:25:33 +010075typedef unsigned short ffa_vm_count_t;
76typedef unsigned short ffa_vcpu_count_t;
J-Alvesf3a393c2020-10-23 16:00:39 +010077typedef uint64_t ffa_memory_handle_t;
78/** Flags to indicate properties of receivers during memory region retrieval. */
79typedef uint8_t ffa_memory_receiver_flags_t;
J-Alves5aecd982020-06-11 10:25:33 +010080
J-Alvesd708c032020-11-19 12:14:21 +000081struct ffa_uuid {
Raghu Krishnamurthyab5321a2023-04-23 16:14:28 -070082 uint32_t uuid[4];
J-Alvesd708c032020-11-19 12:14:21 +000083};
84
J-Alvesda3e6d42022-01-25 10:19:56 +000085/** Length in bytes of the name in boot information descriptor. */
86#define FFA_BOOT_INFO_NAME_LEN 16
87
88/**
89 * The FF-A boot info descriptor, as defined in table 5.8 of section 5.4.1, of
90 * the FF-A v1.1 EAC0 specification.
91 */
92struct ffa_boot_info_desc {
93 char name[FFA_BOOT_INFO_NAME_LEN];
94 uint8_t type;
95 uint8_t reserved;
96 uint16_t flags;
97 uint32_t size;
98 uint64_t content;
99};
100
101/** FF-A boot information type mask. */
102#define FFA_BOOT_INFO_TYPE_SHIFT 7
103#define FFA_BOOT_INFO_TYPE_MASK (0x1U << FFA_BOOT_INFO_TYPE_SHIFT)
104#define FFA_BOOT_INFO_TYPE_STD 0U
105#define FFA_BOOT_INFO_TYPE_IMPDEF 1U
106
107/** Standard boot info type IDs. */
108#define FFA_BOOT_INFO_TYPE_ID_MASK 0x7FU
109#define FFA_BOOT_INFO_TYPE_ID_FDT 0U
110#define FFA_BOOT_INFO_TYPE_ID_HOB 1U
111
112/** FF-A Boot Info descriptors flags. */
113#define FFA_BOOT_INFO_FLAG_MBZ_MASK 0xFFF0U
114
115/** Bits [1:0] encode the format of the name field in ffa_boot_info_desc. */
116#define FFA_BOOT_INFO_FLAG_NAME_FORMAT_SHIFT 0U
117#define FFA_BOOT_INFO_FLAG_NAME_FORMAT_MASK \
118 (0x3U << FFA_BOOT_INFO_FLAG_NAME_FORMAT_SHIFT)
119#define FFA_BOOT_INFO_FLAG_NAME_FORMAT_STRING 0x0U
120#define FFA_BOOT_INFO_FLAG_NAME_FORMAT_UUID 0x1U
121
122/** Bits [3:2] encode the format of the content field in ffa_boot_info_desc. */
123#define FFA_BOOT_INFO_FLAG_CONTENT_FORMAT_SHIFT 2
124#define FFA_BOOT_INFO_FLAG_CONTENT_FORMAT_MASK \
125 (0x3U << FFA_BOOT_INFO_FLAG_CONTENT_FORMAT_SHIFT)
126#define FFA_BOOT_INFO_FLAG_CONTENT_FORMAT_VALUE 0x1U
127#define FFA_BOOT_INFO_FLAG_CONTENT_FORMAT_ADDR 0x0U
128
129static inline uint16_t ffa_boot_info_content_format(
130 struct ffa_boot_info_desc *desc)
131{
132 return (desc->flags & FFA_BOOT_INFO_FLAG_CONTENT_FORMAT_MASK) >>
133 FFA_BOOT_INFO_FLAG_CONTENT_FORMAT_SHIFT;
134}
135
136static inline uint16_t ffa_boot_info_name_format(
137 struct ffa_boot_info_desc *desc)
138{
139 return (desc->flags & FFA_BOOT_INFO_FLAG_NAME_FORMAT_MASK) >>
140 FFA_BOOT_INFO_FLAG_NAME_FORMAT_SHIFT;
141}
142
143static inline uint8_t ffa_boot_info_type_id(struct ffa_boot_info_desc *desc)
144{
145 return desc->type & FFA_BOOT_INFO_TYPE_ID_MASK;
146}
147
148static inline uint8_t ffa_boot_info_type(struct ffa_boot_info_desc *desc)
149{
150 return (desc->type & FFA_BOOT_INFO_TYPE_MASK) >>
151 FFA_BOOT_INFO_TYPE_SHIFT;
152}
153
154/** Length in bytes of the signature in the boot descriptor. */
155#define FFA_BOOT_INFO_HEADER_SIGNATURE_LEN 4
156
157/**
158 * The FF-A boot information header, as defined in table 5.9 of section 5.4.2,
159 * of the FF-A v1.1 EAC0 specification.
160 */
161struct ffa_boot_info_header {
162 uint32_t signature;
163 uint32_t version;
164 uint32_t info_blob_size;
165 uint32_t desc_size;
166 uint32_t desc_count;
167 uint32_t desc_offset;
168 uint64_t reserved;
169 struct ffa_boot_info_desc boot_info[];
170};
171
J-Alves7581c382020-05-07 18:34:20 +0100172#ifndef __ASSEMBLY__
173
J-Alves18c28052021-03-09 09:58:53 +0000174#include <cassert.h>
J-Alves7581c382020-05-07 18:34:20 +0100175#include <stdint.h>
176
J-Alves4439ece2021-11-05 11:52:54 +0000177/**
178 * FF-A Feature ID, to be used with interface FFA_FEATURES.
179 * As defined in the FF-A v1.1 Beta specification, table 13.10, in section
180 * 13.2.
181 */
182
183/** Query interrupt ID of Notification Pending Interrupt. */
184#define FFA_FEATURE_NPI 0x1U
185
186/** Query interrupt ID of Schedule Receiver Interrupt. */
187#define FFA_FEATURE_SRI 0x2U
188
189/** Query interrupt ID of the Managed Exit Interrupt. */
190#define FFA_FEATURE_MEI 0x3U
191
Karl Meakinf2bb5d02024-02-13 17:23:17 +0000192/** Minimum and maximum buffer size reported by FFA_FEATURES(FFA_RXTX_MAP) */
193#define FFA_RXTX_MAP_MIN_BUF_4K 0
194#define FFA_RXTX_MAP_MAX_BUF_PAGE_COUNT 1
195
Max Shvetsov0b7d25f2021-03-05 13:46:42 +0000196/** Partition property: partition supports receipt of direct requests. */
Kathleen Capella7774d6e2022-11-23 19:06:21 -0500197#define FFA_PARTITION_DIRECT_REQ_RECV (UINT32_C(1) << 0)
Max Shvetsov0b7d25f2021-03-05 13:46:42 +0000198
199/** Partition property: partition can send direct requests. */
Kathleen Capella7774d6e2022-11-23 19:06:21 -0500200#define FFA_PARTITION_DIRECT_REQ_SEND (UINT32_C(1) << 1)
Max Shvetsov0b7d25f2021-03-05 13:46:42 +0000201
202/** Partition property: partition can send and receive indirect messages. */
Kathleen Capella7774d6e2022-11-23 19:06:21 -0500203#define FFA_PARTITION_INDIRECT_MSG (UINT32_C(1) << 2)
Max Shvetsov0b7d25f2021-03-05 13:46:42 +0000204
J-Alves4d05dec2021-11-02 11:52:27 +0000205/** Partition property: partition can receive notifications. */
Kathleen Capella7774d6e2022-11-23 19:06:21 -0500206#define FFA_PARTITION_NOTIFICATION (UINT32_C(1) << 3)
J-Alves4d05dec2021-11-02 11:52:27 +0000207
Kathleen Capella7774d6e2022-11-23 19:06:21 -0500208/** Partition property: partition runs in the AArch64 execution state. */
209#define FFA_PARTITION_AARCH64_EXEC (UINT32_C(1) << 8)
210
211/** Partition info descriptor as defined in FF-A v1.1 EAC0 Table 13.37 */
Max Shvetsovc32f4782020-06-23 09:41:15 +0100212struct ffa_partition_info {
213 /** The ID of the VM the information is about */
Daniel Boulbye79d2072021-03-03 11:34:53 +0000214 ffa_id_t id;
Max Shvetsovc32f4782020-06-23 09:41:15 +0100215 /** The number of execution contexts implemented by the partition */
216 uint16_t exec_context;
217 /** The Partition's properties, e.g. supported messaging methods */
218 uint32_t properties;
Daniel Boulby8aa994c2022-01-05 19:44:30 +0000219 /** The uuid of the partition */
220 struct ffa_uuid uuid;
Max Shvetsovc32f4782020-06-23 09:41:15 +0100221};
222
Daniel Boulby2ac55f22022-01-21 12:08:08 +0000223/**
Kathleen Capella7774d6e2022-11-23 19:06:21 -0500224 * Bits[31:3] of partition properties must be zero for FF-A v1.0.
225 * This corresponds to table 8.25 "Partition information descriptor"
226 * in DEN0077A FF-A 1.0 REL specification.
227 */
228#define FFA_PARTITION_v1_0_RES_MASK (~(UINT32_C(0x7)))
229
230/**
Daniel Boulby2ac55f22022-01-21 12:08:08 +0000231 * Partition info descriptor as defined in Table 8.25 of the v1.0
Kathleen Capella7774d6e2022-11-23 19:06:21 -0500232 * FF-A Specification (DEN0077A).
Daniel Boulby2ac55f22022-01-21 12:08:08 +0000233 */
234struct ffa_partition_info_v1_0 {
235 /** The ID of the VM the information is about */
236 ffa_id_t id;
237 /** The number of execution contexts implemented by the partition */
238 uint16_t exec_context;
239 /** The Partition's properties, e.g. supported messaging methods */
240 uint32_t properties;
241};
242
Daniel Boulbyce386b12022-03-29 18:36:36 +0100243struct ffa_value {
244 u_register_t fid;
245 u_register_t arg1;
246 u_register_t arg2;
247 u_register_t arg3;
248 u_register_t arg4;
249 u_register_t arg5;
250 u_register_t arg6;
251 u_register_t arg7;
Raghu Krishnamurthyab5321a2023-04-23 16:14:28 -0700252 u_register_t arg8;
253 u_register_t arg9;
254 u_register_t arg10;
255 u_register_t arg11;
256 u_register_t arg12;
257 u_register_t arg13;
258 u_register_t arg14;
259 u_register_t arg15;
260 u_register_t arg16;
261 u_register_t arg17;
Daniel Boulbyce386b12022-03-29 18:36:36 +0100262};
263
264/* Function to make an SMC or SVC service call depending on the exception
265 * level of the SP.
266 */
267struct ffa_value ffa_service_call(struct ffa_value *args);
268
269/*
270 * Functions to trigger a service call.
271 *
272 * The arguments to pass through the service call must be stored in the
273 * ffa_value structure. The return values of the service call will be stored
274 * in the same structure (overriding the input arguments).
275 *
276 * Return the first return value. It is equivalent to args.fid but is also
277 * provided as the return value for convenience.
278 */
279u_register_t ffa_svc(struct ffa_value *args);
280u_register_t ffa_smc(struct ffa_value *args);
281
282static inline uint32_t ffa_func_id(struct ffa_value val)
J-Alvesf156ae92021-10-08 12:10:05 +0100283{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100284 return (uint32_t)val.fid;
J-Alves6cb21d92021-01-07 15:18:12 +0000285}
286
Daniel Boulbyce386b12022-03-29 18:36:36 +0100287static inline int32_t ffa_error_code(struct ffa_value val)
J-Alvesf156ae92021-10-08 12:10:05 +0100288{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100289 return (int32_t)val.arg2;
J-Alves6cb21d92021-01-07 15:18:12 +0000290}
291
Daniel Boulbyce386b12022-03-29 18:36:36 +0100292static inline ffa_id_t ffa_endpoint_id(struct ffa_value val) {
293 return (ffa_id_t)val.arg2 & 0xffff;
Daniel Boulby198deda2021-03-03 11:35:25 +0000294}
295
Daniel Boulbyce386b12022-03-29 18:36:36 +0100296static inline uint32_t ffa_partition_info_count(struct ffa_value val)
Daniel Boulby2ac55f22022-01-21 12:08:08 +0000297{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100298 return (uint32_t)val.arg2;
Daniel Boulby2ac55f22022-01-21 12:08:08 +0000299}
300
Daniel Boulby07d751e2022-05-30 17:32:00 +0100301static inline uint32_t ffa_partition_info_desc_size(struct ffa_value val)
302{
303 return (uint32_t)val.arg3;
304}
305
Daniel Boulbyce386b12022-03-29 18:36:36 +0100306static inline uint32_t ffa_feature_intid(struct ffa_value val)
J-Alves4439ece2021-11-05 11:52:54 +0000307{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100308 return (uint32_t)val.arg2;
J-Alves4439ece2021-11-05 11:52:54 +0000309}
310
Raghu Krishnamurthyab5321a2023-04-23 16:14:28 -0700311static inline uint16_t ffa_partition_info_regs_get_last_idx(
312 struct ffa_value args)
313{
314 return args.arg2 & 0xFFFF;
315}
316
317static inline uint16_t ffa_partition_info_regs_get_curr_idx(
318 struct ffa_value args)
319{
320 return (args.arg2 >> 16) & 0xFFFF;
321}
322
323static inline uint16_t ffa_partition_info_regs_get_tag(struct ffa_value args)
324{
325 return (args.arg2 >> 32) & 0xFFFF;
326}
327
328static inline uint16_t ffa_partition_info_regs_get_desc_size(
329 struct ffa_value args)
330{
331 return (args.arg2 >> 48);
332}
333
334static inline uint32_t ffa_partition_info_regs_partition_count(
335 struct ffa_value args)
336{
337 return ffa_partition_info_regs_get_last_idx(args) + 1;
338}
339
340static inline uint32_t ffa_partition_info_regs_entry_count(
341 struct ffa_value args, uint16_t start_idx)
342{
343 return (ffa_partition_info_regs_get_curr_idx(args) - start_idx + 1);
344}
345
346static inline uint16_t ffa_partition_info_regs_entry_size(
347 struct ffa_value args)
348{
349 return (args.arg2 >> 48) & 0xFFFFU;
350}
351
J-Alves18c28052021-03-09 09:58:53 +0000352typedef uint64_t ffa_notification_bitmap_t;
353
J-Alves779fba62024-04-05 14:14:40 +0100354/**
355 * Partition message header as specified by table 6.2 from FF-A v1.1 EAC0
356 * specification.
357 */
358struct ffa_partition_rxtx_header {
359 uint32_t flags;
360 /* MBZ */
361 uint32_t reserved;
362 /* Offset from the beginning of the buffer to the message payload. */
363 uint32_t offset;
364 /* Sender(Bits[31:16]) and Receiver(Bits[15:0]) endpoint IDs. */
365 ffa_id_t receiver;
366 ffa_id_t sender;
367 /* Size of message in buffer. */
368 uint32_t size;
369};
370
371#define FFA_RXTX_HEADER_SIZE sizeof(struct ffa_partition_rxtx_header)
372
373static inline void ffa_rxtx_header_init(
374 ffa_id_t sender, ffa_id_t receiver, uint32_t size,
375 struct ffa_partition_rxtx_header *header)
376{
377 header->flags = 0;
378 header->reserved = 0;
379 header->offset = FFA_RXTX_HEADER_SIZE;
380 header->sender = sender;
381 header->receiver = receiver;
382 header->size = size;
383}
384
385/* The maximum length possible for a single message. */
386#define FFA_PARTITION_MSG_PAYLOAD_MAX (PAGE_SIZE - FFA_RXTX_HEADER_SIZE)
387
388struct ffa_partition_msg {
389 struct ffa_partition_rxtx_header header;
390 char payload[FFA_PARTITION_MSG_PAYLOAD_MAX];
391};
392
393/* The maximum length possible for a single message. */
394#define FFA_MSG_PAYLOAD_MAX PAGE_SIZE
395
J-Alves18c28052021-03-09 09:58:53 +0000396#define FFA_NOTIFICATION(ID) (UINT64_C(1) << ID)
397
398#define MAX_FFA_NOTIFICATIONS UINT32_C(64)
399
400#define FFA_NOTIFICATIONS_FLAG_PER_VCPU UINT32_C(0x1 << 0)
401
J-Alvesb0cb5d02021-07-08 11:19:33 +0100402/** Flag to delay Schedule Receiver Interrupt. */
403#define FFA_NOTIFICATIONS_FLAG_DELAY_SRI UINT32_C(0x1 << 1)
404
J-Alves18c28052021-03-09 09:58:53 +0000405#define FFA_NOTIFICATIONS_FLAGS_VCPU_ID(id) UINT32_C((id & 0xFFFF) << 16)
406
J-Alvesf156ae92021-10-08 12:10:05 +0100407#define FFA_NOTIFICATIONS_FLAG_BITMAP_SP UINT32_C(0x1 << 0)
408#define FFA_NOTIFICATIONS_FLAG_BITMAP_VM UINT32_C(0x1 << 1)
409#define FFA_NOTIFICATIONS_FLAG_BITMAP_SPM UINT32_C(0x1 << 2)
410#define FFA_NOTIFICATIONS_FLAG_BITMAP_HYP UINT32_C(0x1 << 3)
411
J-Alvesc6b92d52024-04-05 14:16:00 +0100412#define FFA_NOTIFICATION_SPM_BUFFER_FULL_MASK FFA_NOTIFICATION(0)
413#define FFA_NOTIFICATION_HYP_BUFFER_FULL_MASK FFA_NOTIFICATION(32)
414
J-Alves269118a2021-09-22 09:46:11 +0100415/**
416 * The following is an SGI ID, that the SPMC configures as non-secure, as
417 * suggested by the FF-A v1.1 specification, in section 9.4.1.
418 */
419#define FFA_SCHEDULE_RECEIVER_INTERRUPT_ID 8
420
J-Alvesc6b92d52024-04-05 14:16:00 +0100421/**
422 * Helper function to assemble a 64-bit sized bitmap, from the 32-bit sized lo
423 * and hi.
424 * Helpful as FF-A specification defines that the notifications interfaces
425 * arguments are 32-bit registers.
426 */
427static inline ffa_notification_bitmap_t ffa_notification_bitmap(uint32_t lo,
428 uint32_t hi)
J-Alvesf156ae92021-10-08 12:10:05 +0100429{
J-Alvesc6b92d52024-04-05 14:16:00 +0100430 return (ffa_notification_bitmap_t)hi << 32U | lo;
J-Alvesf156ae92021-10-08 12:10:05 +0100431}
432
J-Alvesc6b92d52024-04-05 14:16:00 +0100433static inline ffa_notification_bitmap_t ffa_notification_get_from_sp(
Daniel Boulbyce386b12022-03-29 18:36:36 +0100434 struct ffa_value val)
J-Alvesf156ae92021-10-08 12:10:05 +0100435{
J-Alvesc6b92d52024-04-05 14:16:00 +0100436 return ffa_notification_bitmap((uint32_t)val.arg2,
437 (uint32_t)val.arg3);
J-Alvesf156ae92021-10-08 12:10:05 +0100438}
439
J-Alvesc6b92d52024-04-05 14:16:00 +0100440static inline ffa_notification_bitmap_t ffa_notification_get_from_vm(
441 struct ffa_value val)
442{
443 return ffa_notification_bitmap((uint32_t)val.arg4,
444 (uint32_t)val.arg5);
445}
446
447static inline ffa_notification_bitmap_t ffa_notification_get_from_framework(
448 struct ffa_value val)
449{
450 return ffa_notification_bitmap((uint32_t)val.arg6,
451 (uint32_t)val.arg7);
452}
453
454 /**
455 * Helper functions to check for buffer full notification.
456 */
457static inline bool is_ffa_hyp_buffer_full_notification(
458 ffa_notification_bitmap_t framework)
459{
460 return (framework & FFA_NOTIFICATION_HYP_BUFFER_FULL_MASK) != 0U;
461}
462
463static inline bool is_ffa_spm_buffer_full_notification(
464 ffa_notification_bitmap_t framework)
465{
466 return (framework & FFA_NOTIFICATION_SPM_BUFFER_FULL_MASK) != 0U;
467}
468
469
J-Alves5bce2502021-06-14 14:27:45 +0100470/*
471 * FFA_NOTIFICATION_INFO_GET is a SMC64 interface.
472 * The following macros are defined for SMC64 implementation.
473 */
474#define FFA_NOTIFICATIONS_INFO_GET_MAX_IDS 20U
475
476#define FFA_NOTIFICATIONS_INFO_GET_FLAG_MORE_PENDING UINT64_C(0x1)
477
478#define FFA_NOTIFICATIONS_LISTS_COUNT_SHIFT 0x7U
479#define FFA_NOTIFICATIONS_LISTS_COUNT_MASK 0x1FU
480#define FFA_NOTIFICATIONS_LIST_SHIFT(l) (2 * (l - 1) + 12)
481#define FFA_NOTIFICATIONS_LIST_SIZE_MASK 0x3U
482
J-Alvesc6b92d52024-04-05 14:16:00 +0100483static inline uint32_t ffa_notification_info_get_lists_count(
Daniel Boulbyce386b12022-03-29 18:36:36 +0100484 struct ffa_value ret)
J-Alves5bce2502021-06-14 14:27:45 +0100485{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100486 return (uint32_t)(ret.arg2 >> FFA_NOTIFICATIONS_LISTS_COUNT_SHIFT)
J-Alves5bce2502021-06-14 14:27:45 +0100487 & FFA_NOTIFICATIONS_LISTS_COUNT_MASK;
488}
489
J-Alvesc6b92d52024-04-05 14:16:00 +0100490static inline uint32_t ffa_notification_info_get_list_size(
Daniel Boulbyce386b12022-03-29 18:36:36 +0100491 struct ffa_value ret, uint32_t list)
J-Alves5bce2502021-06-14 14:27:45 +0100492{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100493 return (uint32_t)(ret.arg2 >> FFA_NOTIFICATIONS_LIST_SHIFT(list)) &
J-Alves5bce2502021-06-14 14:27:45 +0100494 FFA_NOTIFICATIONS_LIST_SIZE_MASK;
495}
496
J-Alvesc6b92d52024-04-05 14:16:00 +0100497static inline bool ffa_notification_info_get_more_pending(struct ffa_value ret)
J-Alves5bce2502021-06-14 14:27:45 +0100498{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100499 return (ret.arg2 & FFA_NOTIFICATIONS_INFO_GET_FLAG_MORE_PENDING) != 0U;
J-Alves5bce2502021-06-14 14:27:45 +0100500}
501
J-Alvesf3a393c2020-10-23 16:00:39 +0100502enum ffa_data_access {
503 FFA_DATA_ACCESS_NOT_SPECIFIED,
504 FFA_DATA_ACCESS_RO,
505 FFA_DATA_ACCESS_RW,
506 FFA_DATA_ACCESS_RESERVED,
507};
508
509enum ffa_instruction_access {
510 FFA_INSTRUCTION_ACCESS_NOT_SPECIFIED,
511 FFA_INSTRUCTION_ACCESS_NX,
512 FFA_INSTRUCTION_ACCESS_X,
513 FFA_INSTRUCTION_ACCESS_RESERVED,
514};
515
516enum ffa_memory_type {
517 FFA_MEMORY_NOT_SPECIFIED_MEM,
518 FFA_MEMORY_DEVICE_MEM,
519 FFA_MEMORY_NORMAL_MEM,
520};
521
522enum ffa_memory_cacheability {
523 FFA_MEMORY_CACHE_RESERVED = 0x0,
524 FFA_MEMORY_CACHE_NON_CACHEABLE = 0x1,
525 FFA_MEMORY_CACHE_RESERVED_1 = 0x2,
526 FFA_MEMORY_CACHE_WRITE_BACK = 0x3,
527 FFA_MEMORY_DEV_NGNRNE = 0x0,
528 FFA_MEMORY_DEV_NGNRE = 0x1,
529 FFA_MEMORY_DEV_NGRE = 0x2,
530 FFA_MEMORY_DEV_GRE = 0x3,
531};
532
533enum ffa_memory_shareability {
534 FFA_MEMORY_SHARE_NON_SHAREABLE,
535 FFA_MEMORY_SHARE_RESERVED,
536 FFA_MEMORY_OUTER_SHAREABLE,
537 FFA_MEMORY_INNER_SHAREABLE,
538};
539
Karl Meakin92aa7702023-10-11 18:48:01 +0100540typedef struct {
541 uint8_t data_access : 2;
542 uint8_t instruction_access : 2;
543} ffa_memory_access_permissions_t;
544
545_Static_assert(sizeof(ffa_memory_access_permissions_t) == sizeof(uint8_t),
546 "ffa_memory_access_permissions_t must be 1 byte wide");
J-Alvesf3a393c2020-10-23 16:00:39 +0100547
548/**
J-Alvesd13d7602023-05-05 14:19:03 +0100549 * FF-A v1.1 REL0 Table 10.18 memory region attributes descriptor NS Bit 6.
550 * Per section 10.10.4.1, NS bit is reserved for FFA_MEM_DONATE/LEND/SHARE
551 * and FFA_MEM_RETRIEVE_REQUEST.
552 */
553enum ffa_memory_security {
554 FFA_MEMORY_SECURITY_UNSPECIFIED = 0,
555 FFA_MEMORY_SECURITY_SECURE = 0,
556 FFA_MEMORY_SECURITY_NON_SECURE,
557};
558
559/**
J-Alvesb42d17f2022-07-04 12:42:13 +0100560 * This corresponds to table 10.18 of the FF-A v1.1 EAC0 specification, "Memory
561 * region attributes descriptor".
J-Alvesf3a393c2020-10-23 16:00:39 +0100562 */
Karl Meakin92aa7702023-10-11 18:48:01 +0100563typedef struct {
564 uint16_t shareability : 2;
565 uint16_t cacheability : 2;
566 uint16_t type : 2;
567 uint16_t security : 1;
568} ffa_memory_attributes_t;
J-Alvesf3a393c2020-10-23 16:00:39 +0100569
Karl Meakin92aa7702023-10-11 18:48:01 +0100570_Static_assert(sizeof(ffa_memory_attributes_t) == sizeof(uint16_t),
571 "ffa_memory_attributes_t must be 2 bytes wide");
J-Alvesf3a393c2020-10-23 16:00:39 +0100572
Karl Meakin0d4f5ff2023-10-13 20:03:16 +0100573#define FFA_MEMORY_HANDLE_ALLOCATOR_MASK UINT64_C(1)
574#define FFA_MEMORY_HANDLE_ALLOCATOR_SHIFT 63U
575#define FFA_MEMORY_HANDLE_ALLOCATOR_HYPERVISOR UINT64_C(1)
576#define FFA_MEMORY_HANDLE_ALLOCATOR_SPMC UINT64_C(0)
J-Alvesf3a393c2020-10-23 16:00:39 +0100577#define FFA_MEMORY_HANDLE_INVALID (~UINT64_C(0))
578
579/**
580 * A set of contiguous pages which is part of a memory region. This corresponds
J-Alvesb42d17f2022-07-04 12:42:13 +0100581 * to table 10.14 of the FF-A v1.1 EAC0 specification, "Constituent memory
582 * region descriptor".
J-Alvesf3a393c2020-10-23 16:00:39 +0100583 */
584struct ffa_memory_region_constituent {
585 /**
586 * The base IPA of the constituent memory region, aligned to 4 kiB page
587 * size granularity.
588 */
589 void *address;
590 /** The number of 4 kiB pages in the constituent memory region. */
591 uint32_t page_count;
592 /** Reserved field, must be 0. */
593 uint32_t reserved;
594};
595
596/**
J-Alvesb42d17f2022-07-04 12:42:13 +0100597 * A set of pages comprising a memory region. This corresponds to table 10.13 of
598 * the FF-A v1.1 EAC0 specification, "Composite memory region descriptor".
J-Alvesf3a393c2020-10-23 16:00:39 +0100599 */
600struct ffa_composite_memory_region {
601 /**
602 * The total number of 4 kiB pages included in this memory region. This
603 * must be equal to the sum of page counts specified in each
604 * `ffa_memory_region_constituent`.
605 */
606 uint32_t page_count;
607 /**
608 * The number of constituents (`ffa_memory_region_constituent`)
609 * included in this memory region range.
610 */
611 uint32_t constituent_count;
612 /** Reserved field, must be 0. */
613 uint64_t reserved_0;
614 /** An array of `constituent_count` memory region constituents. */
615 struct ffa_memory_region_constituent constituents[];
616};
617
618/**
619 * This corresponds to table "Memory access permissions descriptor" of the FFA
620 * 1.0 specification.
621 */
622struct ffa_memory_region_attributes {
623 /** The ID of the VM to which the memory is being given or shared. */
Daniel Boulbye79d2072021-03-03 11:34:53 +0000624 ffa_id_t receiver;
J-Alvesf3a393c2020-10-23 16:00:39 +0100625 /**
626 * The permissions with which the memory region should be mapped in the
627 * receiver's page table.
628 */
629 ffa_memory_access_permissions_t permissions;
630 /**
631 * Flags used during FFA_MEM_RETRIEVE_REQ and FFA_MEM_RETRIEVE_RESP
632 * for memory regions with multiple borrowers.
633 */
634 ffa_memory_receiver_flags_t flags;
635};
636
Karl Meakinbff9b3c2024-01-18 16:08:35 +0000637/**
638 * Endpoint RX/TX descriptor, as defined by Table 13.27 in FF-A v1.1 EAC0.
639 * It's used by the Hypervisor to describe the RX/TX buffers mapped by a VM
640 * to the SPMC, in order to allow indirect messaging.
641 */
642struct ffa_endpoint_rxtx_descriptor {
643 ffa_id_t endpoint_id;
644 uint16_t reserved;
645
646 /*
647 * 8-byte aligned offset from the base address of this descriptor to the
648 * `ffa_composite_memory_region` describing the RX buffer.
649 */
650 uint32_t rx_offset;
651
652 /*
653 * 8-byte aligned offset from the base address of this descriptor to the
654 * `ffa_composite_memory_region` describing the TX buffer.
655 */
656 uint32_t tx_offset;
657
658 /* Pad to align on 16-byte boundary. */
659 uint32_t pad;
660};
661
662_Static_assert(sizeof(struct ffa_endpoint_rxtx_descriptor) == 16,
663 "ffa_endpoint_rx_tx_descriptor must be 16 bytes wide");
664
J-Alvesf3a393c2020-10-23 16:00:39 +0100665/** Flags to control the behaviour of a memory sharing transaction. */
666typedef uint32_t ffa_memory_region_flags_t;
667
668/**
669 * Clear memory region contents after unmapping it from the sender and before
670 * mapping it for any receiver.
671 */
672#define FFA_MEMORY_REGION_FLAG_CLEAR 0x1U
673
674/**
675 * Whether the hypervisor may time slice the memory sharing or retrieval
676 * operation.
677 */
678#define FFA_MEMORY_REGION_FLAG_TIME_SLICE 0x2U
679
680/**
681 * Whether the hypervisor should clear the memory region after the receiver
682 * relinquishes it or is aborted.
683 */
684#define FFA_MEMORY_REGION_FLAG_CLEAR_RELINQUISH 0x4U
685
686#define FFA_MEMORY_REGION_TRANSACTION_TYPE_MASK ((0x3U) << 3)
687#define FFA_MEMORY_REGION_TRANSACTION_TYPE_UNSPECIFIED ((0x0U) << 3)
688#define FFA_MEMORY_REGION_TRANSACTION_TYPE_SHARE ((0x1U) << 3)
689#define FFA_MEMORY_REGION_TRANSACTION_TYPE_LEND ((0x2U) << 3)
690#define FFA_MEMORY_REGION_TRANSACTION_TYPE_DONATE ((0x3U) << 3)
691
J-Alves0435cae2020-11-06 10:49:56 +0000692/** The maximum number of recipients a memory region may be sent to. */
J-Alvesf3253312024-01-18 17:05:26 +0000693#define MAX_MEM_SHARE_RECIPIENTS 2U
J-Alves0435cae2020-11-06 10:49:56 +0000694
Daniel Boulbya24f23a2023-11-15 18:23:40 +0000695struct ffa_memory_access_impdef {
696 uint64_t val[2];
697};
698
J-Alvesf3a393c2020-10-23 16:00:39 +0100699/**
700 * This corresponds to table "Endpoint memory access descriptor" of the FFA 1.0
701 * specification.
702 */
703struct ffa_memory_access {
704 struct ffa_memory_region_attributes receiver_permissions;
705 /**
706 * Offset in bytes from the start of the outer `ffa_memory_region` to
707 * an `ffa_composite_memory_region` struct.
708 */
709 uint32_t composite_memory_region_offset;
Daniel Boulbya24f23a2023-11-15 18:23:40 +0000710 /* Space for implementation defined information */
711 struct ffa_memory_access_impdef impdef;
J-Alvesf3a393c2020-10-23 16:00:39 +0100712 uint64_t reserved_0;
713};
714
715/**
716 * Information about a set of pages which are being shared. This corresponds to
J-Alvesb42d17f2022-07-04 12:42:13 +0100717 * table 10.20 of the FF-A v1.1 EAC0 specification, "Lend, donate or share
718 * memory transaction descriptor". Note that it is also used for retrieve
719 * requests and responses.
J-Alvesf3a393c2020-10-23 16:00:39 +0100720 */
721struct ffa_memory_region {
722 /**
723 * The ID of the VM which originally sent the memory region, i.e. the
724 * owner.
725 */
Daniel Boulbye79d2072021-03-03 11:34:53 +0000726 ffa_id_t sender;
J-Alvesf3a393c2020-10-23 16:00:39 +0100727 ffa_memory_attributes_t attributes;
J-Alvesf3a393c2020-10-23 16:00:39 +0100728 /** Flags to control behaviour of the transaction. */
729 ffa_memory_region_flags_t flags;
730 ffa_memory_handle_t handle;
731 /**
732 * An implementation defined value associated with the receiver and the
733 * memory region.
734 */
735 uint64_t tag;
J-Alvesb42d17f2022-07-04 12:42:13 +0100736 /** Size of the memory access descriptor. */
737 uint32_t memory_access_desc_size;
J-Alvesf3a393c2020-10-23 16:00:39 +0100738 /**
739 * The number of `ffa_memory_access` entries included in this
740 * transaction.
741 */
742 uint32_t receiver_count;
743 /**
J-Alvesb42d17f2022-07-04 12:42:13 +0100744 * Offset of the 'receivers' field, which relates to the memory access
745 * descriptors.
746 */
747 uint32_t receivers_offset;
748 /** Reserved field (12 bytes) must be 0. */
749 uint32_t reserved[3];
750 /**
751 * An array of `receiver_count` endpoint memory access descriptors.
J-Alvesf3a393c2020-10-23 16:00:39 +0100752 * Each one specifies a memory region offset, an endpoint and the
753 * attributes with which this memory region should be mapped in that
754 * endpoint's page table.
755 */
756 struct ffa_memory_access receivers[];
757};
758
759/**
760 * Descriptor used for FFA_MEM_RELINQUISH requests. This corresponds to table
J-Alvesb42d17f2022-07-04 12:42:13 +0100761 * 16.25 of the FF-A v1.1 EAC0 specification, "Descriptor to relinquish a memory
762 * region".
J-Alvesf3a393c2020-10-23 16:00:39 +0100763 */
764struct ffa_mem_relinquish {
765 ffa_memory_handle_t handle;
766 ffa_memory_region_flags_t flags;
767 uint32_t endpoint_count;
Daniel Boulbye79d2072021-03-03 11:34:53 +0000768 ffa_id_t endpoints[];
J-Alvesf3a393c2020-10-23 16:00:39 +0100769};
770
771static inline ffa_memory_handle_t ffa_assemble_handle(uint32_t h1, uint32_t h2)
772{
J-Alves18c28052021-03-09 09:58:53 +0000773 return (ffa_notification_bitmap_t)h1 |
774 (ffa_notification_bitmap_t)h2 << 32;
J-Alvesf3a393c2020-10-23 16:00:39 +0100775}
776
Daniel Boulbyce386b12022-03-29 18:36:36 +0100777static inline ffa_memory_handle_t ffa_mem_success_handle(struct ffa_value r)
J-Alvesf3a393c2020-10-23 16:00:39 +0100778{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100779 return ffa_assemble_handle(r.arg2, r.arg3);
J-Alvesf3a393c2020-10-23 16:00:39 +0100780}
781
Karl Meakin0d4f5ff2023-10-13 20:03:16 +0100782static inline ffa_memory_handle_t ffa_frag_handle(struct ffa_value r)
783{
784 return ffa_assemble_handle(r.arg1, r.arg2);
785}
786
787static inline ffa_id_t ffa_frag_sender(struct ffa_value args)
788{
789 return (args.arg4 >> 16) & 0xffff;
790}
791
J-Alvesf3a393c2020-10-23 16:00:39 +0100792/**
J-Alvesf0b3bd62024-01-18 17:01:37 +0000793 * To maintain forwards compatability we can't make assumptions about the size
794 * of the endpoint memory access descriptor so provide a helper function
795 * to get a receiver from the receiver array using the memory access descriptor
796 * size field from the memory region descriptor struct.
797 * Returns NULL if we cannot return the receiver.
798 */
799static inline struct ffa_memory_access *ffa_memory_region_get_receiver(
800 struct ffa_memory_region *memory_region, uint32_t receiver_index)
801{
802 uint32_t memory_access_desc_size =
803 memory_region->memory_access_desc_size;
804
805 if (receiver_index >= memory_region->receiver_count) {
806 return NULL;
807 }
808
809 /*
810 * Memory access descriptor size cannot be greater than the size of
811 * the memory access descriptor defined by the current FF-A version.
812 */
813 if (memory_access_desc_size > sizeof(struct ffa_memory_access)) {
814 return NULL;
815 }
816
817 /* Check we cannot use receivers offset to cause overflow. */
818 if (memory_region->receivers_offset !=
819 sizeof(struct ffa_memory_region)) {
820 return NULL;
821 }
822
823 return (struct ffa_memory_access *)((uint8_t *)memory_region +
824 memory_region->receivers_offset +
825 (receiver_index *
826 memory_access_desc_size));
827}
828
829/**
J-Alvesf3a393c2020-10-23 16:00:39 +0100830 * Gets the `ffa_composite_memory_region` for the given receiver from an
831 * `ffa_memory_region`, or NULL if it is not valid.
832 */
833static inline struct ffa_composite_memory_region *
834ffa_memory_region_get_composite(struct ffa_memory_region *memory_region,
835 uint32_t receiver_index)
836{
837 uint32_t offset = memory_region->receivers[receiver_index]
838 .composite_memory_region_offset;
839
840 if (offset == 0) {
841 return NULL;
842 }
843
844 return (struct ffa_composite_memory_region *)((uint8_t *)memory_region +
845 offset);
846}
847
848static inline uint32_t ffa_mem_relinquish_init(
849 struct ffa_mem_relinquish *relinquish_request,
850 ffa_memory_handle_t handle, ffa_memory_region_flags_t flags,
Daniel Boulbye79d2072021-03-03 11:34:53 +0000851 ffa_id_t sender)
J-Alvesf3a393c2020-10-23 16:00:39 +0100852{
853 relinquish_request->handle = handle;
854 relinquish_request->flags = flags;
855 relinquish_request->endpoint_count = 1;
856 relinquish_request->endpoints[0] = sender;
Daniel Boulbye79d2072021-03-03 11:34:53 +0000857 return sizeof(struct ffa_mem_relinquish) + sizeof(ffa_id_t);
J-Alvesf3a393c2020-10-23 16:00:39 +0100858}
859
860uint32_t ffa_memory_retrieve_request_init(
861 struct ffa_memory_region *memory_region, ffa_memory_handle_t handle,
Karl Meakin1331a8c2023-09-14 16:25:15 +0100862 ffa_id_t sender, struct ffa_memory_access receivers[],
863 uint32_t receiver_count, uint32_t tag, ffa_memory_region_flags_t flags,
J-Alvesf3a393c2020-10-23 16:00:39 +0100864 enum ffa_memory_type type, enum ffa_memory_cacheability cacheability,
865 enum ffa_memory_shareability shareability);
866
Karl Meakin3d879b82023-06-16 10:32:08 +0100867void ffa_hypervisor_retrieve_request_init(struct ffa_memory_region *region,
868 ffa_memory_handle_t handle);
869
J-Alvesf3a393c2020-10-23 16:00:39 +0100870uint32_t ffa_memory_region_init(
871 struct ffa_memory_region *memory_region, size_t memory_region_max_size,
Karl Meakin1331a8c2023-09-14 16:25:15 +0100872 ffa_id_t sender, struct ffa_memory_access receivers[],
873 uint32_t receiver_count,
J-Alvesf3a393c2020-10-23 16:00:39 +0100874 const struct ffa_memory_region_constituent constituents[],
875 uint32_t constituent_count, uint32_t tag,
Karl Meakin1331a8c2023-09-14 16:25:15 +0100876 ffa_memory_region_flags_t flags, enum ffa_memory_type type,
877 enum ffa_memory_cacheability cacheability,
J-Alvesf3a393c2020-10-23 16:00:39 +0100878 enum ffa_memory_shareability shareability, uint32_t *total_length,
879 uint32_t *fragment_length);
880
Karl Meakin0d4f5ff2023-10-13 20:03:16 +0100881uint32_t ffa_memory_fragment_init(
882 struct ffa_memory_region_constituent *fragment,
883 size_t fragment_max_size,
884 const struct ffa_memory_region_constituent constituents[],
885 uint32_t constituent_count, uint32_t *fragment_length);
886
Daniel Boulbyce386b12022-03-29 18:36:36 +0100887static inline ffa_id_t ffa_dir_msg_dest(struct ffa_value val) {
888 return (ffa_id_t)val.arg1 & U(0xFFFF);
J-Alves6cb21d92021-01-07 15:18:12 +0000889}
890
Daniel Boulbyce386b12022-03-29 18:36:36 +0100891static inline ffa_id_t ffa_dir_msg_source(struct ffa_value val) {
892 return (ffa_id_t)(val.arg1 >> 16U);
J-Alves6cb21d92021-01-07 15:18:12 +0000893}
894
Daniel Boulbyce386b12022-03-29 18:36:36 +0100895struct ffa_value ffa_msg_send_direct_req64(ffa_id_t source_id,
896 ffa_id_t dest_id, uint64_t arg0,
897 uint64_t arg1, uint64_t arg2,
898 uint64_t arg3, uint64_t arg4);
J-Alvesd1aae292020-10-08 17:16:58 +0100899
Daniel Boulbyce386b12022-03-29 18:36:36 +0100900struct ffa_value ffa_msg_send_direct_req32(ffa_id_t source_id,
901 ffa_id_t dest_id, uint32_t arg0,
902 uint32_t arg1, uint32_t arg2,
903 uint32_t arg3, uint32_t arg4);
J-Alvesecd30742021-02-19 18:31:06 +0000904
Daniel Boulbyce386b12022-03-29 18:36:36 +0100905struct ffa_value ffa_msg_send_direct_resp64(ffa_id_t source_id,
906 ffa_id_t dest_id, uint64_t arg0,
907 uint64_t arg1, uint64_t arg2,
908 uint64_t arg3, uint64_t arg4);
J-Alvesecd30742021-02-19 18:31:06 +0000909
Daniel Boulbyce386b12022-03-29 18:36:36 +0100910struct ffa_value ffa_msg_send_direct_resp32(ffa_id_t source_id,
911 ffa_id_t dest_id, uint32_t arg0,
912 uint32_t arg1, uint32_t arg2,
913 uint32_t arg3, uint32_t arg4);
J-Alves035b7d02021-02-11 10:40:35 +0000914
Daniel Boulbyce386b12022-03-29 18:36:36 +0100915struct ffa_value ffa_run(uint32_t dest_id, uint32_t vcpu_id);
916struct ffa_value ffa_version(uint32_t input_version);
917struct ffa_value ffa_id_get(void);
918struct ffa_value ffa_spm_id_get(void);
919struct ffa_value ffa_msg_wait(void);
920struct ffa_value ffa_error(int32_t error_code);
921struct ffa_value ffa_features(uint32_t feature);
Karl Meakin31b81772023-03-14 15:38:17 +0000922struct ffa_value ffa_features_with_input_property(uint32_t feature,
923 uint32_t param);
Daniel Boulbyce386b12022-03-29 18:36:36 +0100924struct ffa_value ffa_partition_info_get(const struct ffa_uuid uuid);
J-Alves067daca2024-04-08 17:31:54 +0100925struct ffa_value ffa_rx_release_with_id(ffa_id_t vm_id);
Daniel Boulbyce386b12022-03-29 18:36:36 +0100926struct ffa_value ffa_rx_release(void);
927struct ffa_value ffa_rxtx_map(uintptr_t send, uintptr_t recv, uint32_t pages);
Karl Meakinbff9b3c2024-01-18 16:08:35 +0000928struct ffa_value ffa_rxtx_unmap_with_id(uint32_t id);
Daniel Boulbyce386b12022-03-29 18:36:36 +0100929struct ffa_value ffa_rxtx_unmap(void);
J-Alvesffdfafb2024-04-09 12:07:11 +0100930struct ffa_value ffa_msg_send2_with_id(uint32_t flags, ffa_id_t sender);
J-Alves779fba62024-04-05 14:14:40 +0100931struct ffa_value ffa_msg_send2(uint32_t flags);
Daniel Boulbyce386b12022-03-29 18:36:36 +0100932struct ffa_value ffa_mem_donate(uint32_t descriptor_length,
933 uint32_t fragment_length);
934struct ffa_value ffa_mem_lend(uint32_t descriptor_length,
J-Alves3ea46d12020-09-09 11:13:05 +0100935 uint32_t fragment_length);
Daniel Boulbyce386b12022-03-29 18:36:36 +0100936struct ffa_value ffa_mem_share(uint32_t descriptor_length,
937 uint32_t fragment_length);
938struct ffa_value ffa_mem_retrieve_req(uint32_t descriptor_length,
939 uint32_t fragment_length);
940struct ffa_value ffa_mem_relinquish(void);
941struct ffa_value ffa_mem_reclaim(uint64_t handle, uint32_t flags);
Karl Meakin0d4f5ff2023-10-13 20:03:16 +0100942struct ffa_value ffa_mem_frag_rx(ffa_memory_handle_t handle,
943 uint32_t fragment_length);
944struct ffa_value ffa_mem_frag_tx(ffa_memory_handle_t handle,
945 uint32_t fragment_length);
Daniel Boulbyce386b12022-03-29 18:36:36 +0100946struct ffa_value ffa_notification_bitmap_create(ffa_id_t vm_id,
947 ffa_vcpu_count_t vcpu_count);
948struct ffa_value ffa_notification_bitmap_destroy(ffa_id_t vm_id);
949struct ffa_value ffa_notification_bind(ffa_id_t sender, ffa_id_t receiver,
950 uint32_t flags,
J-Alves18c28052021-03-09 09:58:53 +0000951 ffa_notification_bitmap_t notifications);
Daniel Boulbyce386b12022-03-29 18:36:36 +0100952struct ffa_value ffa_notification_unbind(ffa_id_t sender, ffa_id_t receiver,
953 ffa_notification_bitmap_t notifications);
954struct ffa_value ffa_notification_set(ffa_id_t sender, ffa_id_t receiver,
955 uint32_t flags,
956 ffa_notification_bitmap_t bitmap);
957struct ffa_value ffa_notification_get(ffa_id_t receiver, uint32_t vcpu_id,
958 uint32_t flags);
959struct ffa_value ffa_notification_info_get(void);
Maksims Svecovs0b452232022-05-24 11:30:34 +0100960
961struct ffa_value ffa_console_log(const char* message, size_t char_count);
Raghu Krishnamurthyab5321a2023-04-23 16:14:28 -0700962struct ffa_value ffa_partition_info_get_regs(const struct ffa_uuid uuid,
963 const uint16_t start_index,
964 const uint16_t tag);
Karl Meakin367ff542023-11-01 15:05:37 +0000965
Daniel Boulbya24f23a2023-11-15 18:23:40 +0000966struct ffa_memory_access ffa_memory_access_init(
Karl Meakin367ff542023-11-01 15:05:37 +0000967 ffa_id_t receiver_id, enum ffa_data_access data_access,
968 enum ffa_instruction_access instruction_access,
Daniel Boulbya24f23a2023-11-15 18:23:40 +0000969 ffa_memory_receiver_flags_t flags,
970 struct ffa_memory_access_impdef *impdef);
Karl Meakin367ff542023-11-01 15:05:37 +0000971
Karl Meakinbff9b3c2024-01-18 16:08:35 +0000972void ffa_endpoint_rxtx_descriptor_init(
973 struct ffa_endpoint_rxtx_descriptor *desc, ffa_id_t endpoint_id,
974 void *rx_address, void *tx_address);
975
976struct ffa_value ffa_rxtx_map_forward(
977 struct ffa_endpoint_rxtx_descriptor *desc, ffa_id_t endpoint_id,
978 void *rx_address, void *tx_address);
979
J-Alves7581c382020-05-07 18:34:20 +0100980#endif /* __ASSEMBLY__ */
981
982#endif /* FFA_HELPERS_H */