xref: /rk3399_ARM-atf/include/services/rmmd_svc.h (revision 2132c707d73753338ce05f262843a91738177f5e)
177c27753SZelalem Aweke /*
2f801fdc2STushar Khandelwal  * Copyright (c) 2021-2025, Arm Limited and Contributors. All rights reserved.
377c27753SZelalem Aweke  *
477c27753SZelalem Aweke  * SPDX-License-Identifier: BSD-3-Clause
577c27753SZelalem Aweke  */
677c27753SZelalem Aweke 
777c27753SZelalem Aweke #ifndef RMMD_SVC_H
877c27753SZelalem Aweke #define RMMD_SVC_H
977c27753SZelalem Aweke 
10e9529e46SRaghu Krishnamurthy #include <common/sha_common_macros.h>
11319fb084SSoby Mathew #include <lib/smccc.h>
12319fb084SSoby Mathew #include <lib/utils_def.h>
13319fb084SSoby Mathew 
14fb00dc4aSSubhasish Ghosh /* STD calls FNUM Min/Max ranges */
15319fb084SSoby Mathew #define RMI_FNUM_MIN_VALUE	U(0x150)
16319fb084SSoby Mathew #define RMI_FNUM_MAX_VALUE	U(0x18F)
17319fb084SSoby Mathew 
18fb00dc4aSSubhasish Ghosh /* Construct RMI fastcall std FID from offset */
19fb00dc4aSSubhasish Ghosh #define SMC64_RMI_FID(_offset)					  \
20fb00dc4aSSubhasish Ghosh 	((SMC_TYPE_FAST << FUNCID_TYPE_SHIFT)			| \
21fb00dc4aSSubhasish Ghosh 	 (SMC_64 << FUNCID_CC_SHIFT)				| \
22fb00dc4aSSubhasish Ghosh 	 (OEN_STD_START << FUNCID_OEN_SHIFT)			| \
23fb00dc4aSSubhasish Ghosh 	 (((RMI_FNUM_MIN_VALUE + (_offset)) & FUNCID_NUM_MASK)	  \
24fb00dc4aSSubhasish Ghosh 	  << FUNCID_NUM_SHIFT))
25fb00dc4aSSubhasish Ghosh 
26319fb084SSoby Mathew #define is_rmi_fid(fid) __extension__ ({		\
27319fb084SSoby Mathew 	__typeof__(fid) _fid = (fid);			\
28319fb084SSoby Mathew 	((GET_SMC_NUM(_fid) >= RMI_FNUM_MIN_VALUE) &&	\
29319fb084SSoby Mathew 	 (GET_SMC_NUM(_fid) <= RMI_FNUM_MAX_VALUE) &&	\
30319fb084SSoby Mathew 	 (GET_SMC_TYPE(_fid) == SMC_TYPE_FAST)	   &&	\
31319fb084SSoby Mathew 	 (GET_SMC_CC(_fid) == SMC_64)              &&	\
32319fb084SSoby Mathew 	 (GET_SMC_OEN(_fid) == OEN_STD_START)      &&	\
33319fb084SSoby Mathew 	 ((_fid & 0x00FE0000) == 0U)); })
34319fb084SSoby Mathew 
35319fb084SSoby Mathew /*
36fb00dc4aSSubhasish Ghosh  * RMI_FNUM_REQ_COMPLETE is the only function in the RMI range that originates
37319fb084SSoby Mathew  * from the Realm world and is handled by the RMMD. The RMI functions are
38319fb084SSoby Mathew  * always invoked by the Normal world, forwarded by RMMD and handled by the
39fb00dc4aSSubhasish Ghosh  * RMM.
40319fb084SSoby Mathew  */
41fb00dc4aSSubhasish Ghosh 					/* 0x18F */
42e50fedbcSJavier Almansa Sobrino #define RMM_RMI_REQ_COMPLETE		SMC64_RMI_FID(U(0x3F))
43319fb084SSoby Mathew 
448c980a4aSJavier Almansa Sobrino /* RMM_BOOT_COMPLETE arg0 error codes */
458c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_SUCCESS				(0)
468c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_UNKNOWN				(-1)
478c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_VERSION_MISMATCH			(-2)
488c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_CPUS_OUT_OF_RANGE			(-3)
498c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_CPU_ID_OUT_OF_RANGE			(-4)
508c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_INVALID_SHARED_BUFFER		(-5)
518c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_MANIFEST_VERSION_NOT_SUPPORTED	(-6)
528c980a4aSJavier Almansa Sobrino #define E_RMM_BOOT_MANIFEST_DATA_ERROR			(-7)
538c980a4aSJavier Almansa Sobrino 
548c980a4aSJavier Almansa Sobrino /* The SMC in the range 0x8400 0191 - 0x8400 01AF are reserved for RSIs.*/
55319fb084SSoby Mathew 
56319fb084SSoby Mathew /*
57319fb084SSoby Mathew  * EL3 - RMM SMCs used for requesting RMMD services. These SMCs originate in Realm
58319fb084SSoby Mathew  * world and return to Realm world.
59319fb084SSoby Mathew  *
60319fb084SSoby Mathew  * These are allocated from 0x8400 01B0 - 0x8400 01CF in the RMM Service range.
61319fb084SSoby Mathew  */
62319fb084SSoby Mathew #define RMMD_EL3_FNUM_MIN_VALUE		U(0x1B0)
63319fb084SSoby Mathew #define RMMD_EL3_FNUM_MAX_VALUE		U(0x1CF)
64319fb084SSoby Mathew 
65fb00dc4aSSubhasish Ghosh /* Construct RMM_EL3 fastcall std FID from offset */
66fb00dc4aSSubhasish Ghosh #define SMC64_RMMD_EL3_FID(_offset)					  \
67fb00dc4aSSubhasish Ghosh 	((SMC_TYPE_FAST << FUNCID_TYPE_SHIFT)				| \
68fb00dc4aSSubhasish Ghosh 	 (SMC_64 << FUNCID_CC_SHIFT)					| \
69fb00dc4aSSubhasish Ghosh 	 (OEN_STD_START << FUNCID_OEN_SHIFT)				| \
70fb00dc4aSSubhasish Ghosh 	 (((RMMD_EL3_FNUM_MIN_VALUE + (_offset)) & FUNCID_NUM_MASK)	  \
71fb00dc4aSSubhasish Ghosh 	  << FUNCID_NUM_SHIFT))
72fb00dc4aSSubhasish Ghosh 
73319fb084SSoby Mathew /* The macros below are used to identify GTSI calls from the SMC function ID */
74319fb084SSoby Mathew #define is_rmmd_el3_fid(fid) __extension__ ({		\
75319fb084SSoby Mathew 	__typeof__(fid) _fid = (fid);			\
76319fb084SSoby Mathew 	((GET_SMC_NUM(_fid) >= RMMD_EL3_FNUM_MIN_VALUE) &&\
77319fb084SSoby Mathew 	(GET_SMC_NUM(_fid) <= RMMD_EL3_FNUM_MAX_VALUE)  &&\
78319fb084SSoby Mathew 	(GET_SMC_TYPE(_fid) == SMC_TYPE_FAST)	    &&	\
79319fb084SSoby Mathew 	(GET_SMC_CC(_fid) == SMC_64)                &&	\
80319fb084SSoby Mathew 	(GET_SMC_OEN(_fid) == OEN_STD_START)        &&	\
81319fb084SSoby Mathew 	((_fid & 0x00FE0000) == 0U)); })
82319fb084SSoby Mathew 
83fb00dc4aSSubhasish Ghosh 					/* 0x1B0 - 0x1B1 */
84e50fedbcSJavier Almansa Sobrino #define RMM_GTSI_DELEGATE		SMC64_RMMD_EL3_FID(U(0))
85e50fedbcSJavier Almansa Sobrino #define RMM_GTSI_UNDELEGATE		SMC64_RMMD_EL3_FID(U(1))
86319fb084SSoby Mathew 
87319fb084SSoby Mathew /* Return error codes from RMM-EL3 SMCs */
88dc65ae46SJavier Almansa Sobrino #define E_RMM_OK			 0
89dc65ae46SJavier Almansa Sobrino #define E_RMM_UNK			-1
90dc65ae46SJavier Almansa Sobrino #define E_RMM_BAD_ADDR			-2
91dc65ae46SJavier Almansa Sobrino #define E_RMM_BAD_PAS			-3
92dc65ae46SJavier Almansa Sobrino #define E_RMM_NOMEM			-4
93dc65ae46SJavier Almansa Sobrino #define E_RMM_INVAL			-5
9442cf6026SJuan Pablo Conde #define E_RMM_AGAIN			-6
95*2132c707SSona Mathew #define E_RMM_FAULT			-7
96*2132c707SSona Mathew #define E_RMM_IN_PROGRESS		-8
97319fb084SSoby Mathew 
98ade6000fSShruti Gupta /* Return error codes from RMI SMCs */
99ade6000fSShruti Gupta #define RMI_SUCCESS			0
100ade6000fSShruti Gupta #define RMI_ERROR_INPUT			1
101ade6000fSShruti Gupta 
102a0435105SSoby Mathew /*
103a0435105SSoby Mathew  * Retrieve Realm attestation key from EL3. Only P-384 ECC curve key is
104a0435105SSoby Mathew  * supported. The arguments to this SMC are :
105a0435105SSoby Mathew  *    arg0 - Function ID.
106a0435105SSoby Mathew  *    arg1 - Realm attestation key buffer Physical address.
107a0435105SSoby Mathew  *    arg2 - Realm attestation key buffer size (in bytes).
108a0435105SSoby Mathew  *    arg3 - The type of the elliptic curve to which the requested
109a0435105SSoby Mathew  *           attestation key belongs to. The value should be one of the
110a0435105SSoby Mathew  *           defined curve types.
111a0435105SSoby Mathew  * The return arguments are :
112a0435105SSoby Mathew  *    ret0 - Status / error.
113a0435105SSoby Mathew  *    ret1 - Size of the realm attestation key if successful.
114a0435105SSoby Mathew  */
115fb00dc4aSSubhasish Ghosh 					/* 0x1B2 */
116e50fedbcSJavier Almansa Sobrino #define RMM_ATTEST_GET_REALM_KEY	SMC64_RMMD_EL3_FID(U(2))
117fb00dc4aSSubhasish Ghosh 
118fb00dc4aSSubhasish Ghosh /*
119fb00dc4aSSubhasish Ghosh  * Retrieve Platform token from EL3.
120fb00dc4aSSubhasish Ghosh  * The arguments to this SMC are :
121fb00dc4aSSubhasish Ghosh  *    arg0 - Function ID.
122fb00dc4aSSubhasish Ghosh  *    arg1 - Platform attestation token buffer Physical address. (The challenge
123fb00dc4aSSubhasish Ghosh  *           object is passed in this buffer.)
124fb00dc4aSSubhasish Ghosh  *    arg2 - Platform attestation token buffer size (in bytes).
125fb00dc4aSSubhasish Ghosh  *    arg3 - Challenge object size (in bytes). It has to be one of the defined
126fb00dc4aSSubhasish Ghosh  *           SHA hash sizes.
127fb00dc4aSSubhasish Ghosh  * The return arguments are :
128fb00dc4aSSubhasish Ghosh  *    ret0 - Status / error.
129fb00dc4aSSubhasish Ghosh  *    ret1 - Size of the platform token if successful.
130fb00dc4aSSubhasish Ghosh  */
131fb00dc4aSSubhasish Ghosh 					/* 0x1B3 */
132e50fedbcSJavier Almansa Sobrino #define RMM_ATTEST_GET_PLAT_TOKEN	SMC64_RMMD_EL3_FID(U(3))
133a0435105SSoby Mathew 
1346a88ec8bSRaghu Krishnamurthy /* Starting RMM-EL3 interface version 0.4 */
1356a88ec8bSRaghu Krishnamurthy #define RMM_EL3_FEATURES				SMC64_RMMD_EL3_FID(U(4))
1366a88ec8bSRaghu Krishnamurthy #define RMM_EL3_FEAT_REG_0_IDX				U(0)
1376a88ec8bSRaghu Krishnamurthy /* Bit 0 of FEAT_REG_0 */
1386a88ec8bSRaghu Krishnamurthy /* 1 - the feature is present in EL3 , 0 - the feature is absent */
1396a88ec8bSRaghu Krishnamurthy #define RMM_EL3_FEAT_REG_0_EL3_TOKEN_SIGN_MASK		U(0x1)
1406a88ec8bSRaghu Krishnamurthy 
1416a88ec8bSRaghu Krishnamurthy /*
1426a88ec8bSRaghu Krishnamurthy  * Function codes to support attestation where EL3 is used to sign
1436a88ec8bSRaghu Krishnamurthy  * realm attestation tokens. In this model, the private key is not
1446a88ec8bSRaghu Krishnamurthy  * exposed to the RMM.
1456a88ec8bSRaghu Krishnamurthy  * The arguments to this SMC are:
1466a88ec8bSRaghu Krishnamurthy  *     arg0 - Function ID.
1476a88ec8bSRaghu Krishnamurthy  *     arg1 - Opcode, one of:
1486a88ec8bSRaghu Krishnamurthy  *               RMM_EL3_TOKEN_SIGN_PUSH_REQ_OP,
1496a88ec8bSRaghu Krishnamurthy  *               RMM_EL3_TOKEN_SIGN_PULL_RESP_OP,
1506a88ec8bSRaghu Krishnamurthy  *               RMM_EL3_TOKEN_SIGN_GET_RAK_PUB_OP
1516a88ec8bSRaghu Krishnamurthy  *     arg2 - Pointer to buffer with request/response structures,
1526a88ec8bSRaghu Krishnamurthy  *            which is in the RMM<->EL3 shared buffer.
1536a88ec8bSRaghu Krishnamurthy  *     arg3 - Buffer size of memory pointed by arg2.
1546a88ec8bSRaghu Krishnamurthy  *     arg4 - ECC Curve, when opcode is RMM_EL3_TOKEN_SIGN_GET_RAK_PUB_OP
1556a88ec8bSRaghu Krishnamurthy  * The return arguments are:
1566a88ec8bSRaghu Krishnamurthy  *     ret0 - Status/Error
1576a88ec8bSRaghu Krishnamurthy  *     ret1 - Size of public key if opcode is RMM_EL3_TOKEN_SIGN_GET_RAK_PUB_OP
1586a88ec8bSRaghu Krishnamurthy  */
1596a88ec8bSRaghu Krishnamurthy #define RMM_EL3_TOKEN_SIGN			SMC64_RMMD_EL3_FID(U(5))
1606a88ec8bSRaghu Krishnamurthy 
1616a88ec8bSRaghu Krishnamurthy /* Opcodes for RMM_EL3_TOKEN_SIGN  */
1626a88ec8bSRaghu Krishnamurthy #define RMM_EL3_TOKEN_SIGN_PUSH_REQ_OP          U(1)
1636a88ec8bSRaghu Krishnamurthy #define RMM_EL3_TOKEN_SIGN_PULL_RESP_OP         U(2)
1646a88ec8bSRaghu Krishnamurthy #define RMM_EL3_TOKEN_SIGN_GET_RAK_PUB_OP       U(3)
1656a88ec8bSRaghu Krishnamurthy 
166f801fdc2STushar Khandelwal /* Starting RMM-EL3 interface version 0.5 */
167f801fdc2STushar Khandelwal 
168f801fdc2STushar Khandelwal /*
169f801fdc2STushar Khandelwal  * Function code to support update of MEC keys.
170f801fdc2STushar Khandelwal  * The arguments of this SMC are:
171f801fdc2STushar Khandelwal  * 	arg0 - Function ID.
172f801fdc2STushar Khandelwal  * 	arg1 - MECID
173f801fdc2STushar Khandelwal  * The return arguments are:
174f801fdc2STushar Khandelwal  * 	ret0 - Status/Error
175f801fdc2STushar Khandelwal  */
176f801fdc2STushar Khandelwal #define RMM_MECID_KEY_UPDATE			SMC64_RMMD_EL3_FID(U(6))
177f801fdc2STushar Khandelwal 
178a0435105SSoby Mathew /* ECC Curve types for attest key generation */
1796a88ec8bSRaghu Krishnamurthy #define ATTEST_KEY_CURVE_ECC_SECP384R1		U(0)
1806a88ec8bSRaghu Krishnamurthy 
1816a88ec8bSRaghu Krishnamurthy /* Identifier for the hash algorithm used for attestation signing */
1826a88ec8bSRaghu Krishnamurthy #define EL3_TOKEN_SIGN_HASH_ALG_SHA384		U(1)
183a0435105SSoby Mathew 
184*2132c707SSona Mathew /* Starting RMM-EL3 interface version 0.6 */
185*2132c707SSona Mathew /*
186*2132c707SSona Mathew  * Function codes to support RMM IDE Key management Interface.
187*2132c707SSona Mathew  * The arguments to this SMC are:
188*2132c707SSona Mathew  *     arg0 - Function ID.
189*2132c707SSona Mathew  *     arg1 - Enhanced Configuration Access Mechanism address
190*2132c707SSona Mathew  *     arg2 - Root Port ID
191*2132c707SSona Mathew  *     arg3 - IDE selective stream info
192*2132c707SSona Mathew  *     arg4 - Quad word of key[63:0]
193*2132c707SSona Mathew  *     arg5 - Quad word of key[127:64]
194*2132c707SSona Mathew  *     arg6 - Quad word of key[191:128]
195*2132c707SSona Mathew  *     arg7 - Quad word of key[255:192]
196*2132c707SSona Mathew  *     arg8 - Quad word of IV [63:0]
197*2132c707SSona Mathew  *     arg9 - Quad word of IV [95:64]
198*2132c707SSona Mathew  *     arg10 - request_id
199*2132c707SSona Mathew  *     arg11 - cookie
200*2132c707SSona Mathew  * The return arguments are:
201*2132c707SSona Mathew  *     ret0 - Status/Error
202*2132c707SSona Mathew  */
203*2132c707SSona Mathew #define RMM_IDE_KEY_PROG			SMC64_RMMD_EL3_FID(U(7))
204*2132c707SSona Mathew 
205*2132c707SSona Mathew /*******************************************************************************
206*2132c707SSona Mathew  * Structure to hold el3_ide_key info
207*2132c707SSona Mathew  ******************************************************************************/
208*2132c707SSona Mathew #ifndef __ASSEMBLER__
209*2132c707SSona Mathew typedef struct rp_ide_key_info {
210*2132c707SSona Mathew 	uint64_t keyqw0;
211*2132c707SSona Mathew 	uint64_t keyqw1;
212*2132c707SSona Mathew 	uint64_t keyqw2;
213*2132c707SSona Mathew 	uint64_t keyqw3;
214*2132c707SSona Mathew 	uint64_t ifvqw0;
215*2132c707SSona Mathew 	uint64_t ifvqw1;
216*2132c707SSona Mathew } rp_ide_key_info_t;
217*2132c707SSona Mathew #endif /* __ASSEMBLER__ */
218*2132c707SSona Mathew 
219*2132c707SSona Mathew /*
220*2132c707SSona Mathew  * Function codes to support RMM IDE Key management Interface.
221*2132c707SSona Mathew  * The arguments to this SMC are:
222*2132c707SSona Mathew  *     arg0 - Function ID.
223*2132c707SSona Mathew  *     arg1 - Enhanced Configuration Access Mechanism address
224*2132c707SSona Mathew  *     arg2 - Root Port ID
225*2132c707SSona Mathew  *     arg3 - IDE selective stream info
226*2132c707SSona Mathew  *     arg4 - request_id
227*2132c707SSona Mathew  *     arg5 - cookie
228*2132c707SSona Mathew  * The return arguments are:
229*2132c707SSona Mathew  *     ret0 - Status/Error
230*2132c707SSona Mathew  */
231*2132c707SSona Mathew #define RMM_IDE_KEY_SET_GO			SMC64_RMMD_EL3_FID(U(8))
232*2132c707SSona Mathew 
233*2132c707SSona Mathew /*
234*2132c707SSona Mathew  * Function codes to support RMM IDE Key management Interface.
235*2132c707SSona Mathew  * The arguments to this SMC are:
236*2132c707SSona Mathew  *     arg0 - Function ID.
237*2132c707SSona Mathew  *     arg1 - Enhanced Configuration Access Mechanism address
238*2132c707SSona Mathew  *     arg2 - Root Port ID
239*2132c707SSona Mathew  *     arg3 - IDE selective stream info
240*2132c707SSona Mathew  *     arg4 - request_id
241*2132c707SSona Mathew  *     arg5 - cookie
242*2132c707SSona Mathew  * The return arguments are:
243*2132c707SSona Mathew  *     ret0 - Status/Error
244*2132c707SSona Mathew  */
245*2132c707SSona Mathew #define RMM_IDE_KEY_SET_STOP			SMC64_RMMD_EL3_FID(U(9))
246*2132c707SSona Mathew 
247*2132c707SSona Mathew /*
248*2132c707SSona Mathew  * Function codes to support RMM IDE Key management Interface.
249*2132c707SSona Mathew  * The arguments to this SMC are:
250*2132c707SSona Mathew  *     arg0 - Function ID.
251*2132c707SSona Mathew  *     arg1 - Enhanced Configuration Access Mechanism address
252*2132c707SSona Mathew  *     arg2 - Root Port ID
253*2132c707SSona Mathew  * The return arguments are:
254*2132c707SSona Mathew  *     ret0 - Status/Error
255*2132c707SSona Mathew  *     ret1 - Retrieved response corresponding to the previous request.
256*2132c707SSona Mathew  *     ret2 - request_id
257*2132c707SSona Mathew  *     ret3 - cookie
258*2132c707SSona Mathew  */
259*2132c707SSona Mathew #define RMM_IDE_KM_PULL_RESPONSE		SMC64_RMMD_EL3_FID(U(10))
260*2132c707SSona Mathew 
2618c980a4aSJavier Almansa Sobrino /*
2628c980a4aSJavier Almansa Sobrino  * RMM_BOOT_COMPLETE originates on RMM when the boot finishes (either cold
2638c980a4aSJavier Almansa Sobrino  * or warm boot). This is handled by the RMM-EL3 interface SMC handler.
2648c980a4aSJavier Almansa Sobrino  *
2658c980a4aSJavier Almansa Sobrino  * RMM_BOOT_COMPLETE FID is located at the end of the available range.
2668c980a4aSJavier Almansa Sobrino  */
2678c980a4aSJavier Almansa Sobrino 					 /* 0x1CF */
2688c980a4aSJavier Almansa Sobrino #define RMM_BOOT_COMPLETE		SMC64_RMMD_EL3_FID(U(0x1F))
2698c980a4aSJavier Almansa Sobrino 
2708c980a4aSJavier Almansa Sobrino /*
2718c980a4aSJavier Almansa Sobrino  * The major version number of the RMM Boot Interface implementation.
2728c980a4aSJavier Almansa Sobrino  * Increase this whenever the semantics of the boot arguments change making it
2738c980a4aSJavier Almansa Sobrino  * backwards incompatible.
2748c980a4aSJavier Almansa Sobrino  */
2758c980a4aSJavier Almansa Sobrino #define RMM_EL3_IFC_VERSION_MAJOR	(U(0))
2768c980a4aSJavier Almansa Sobrino 
2778c980a4aSJavier Almansa Sobrino /*
2788c980a4aSJavier Almansa Sobrino  * The minor version number of the RMM Boot Interface implementation.
2798c980a4aSJavier Almansa Sobrino  * Increase this when a bug is fixed, or a feature is added without
2808c980a4aSJavier Almansa Sobrino  * breaking compatibility.
2818c980a4aSJavier Almansa Sobrino  */
282*2132c707SSona Mathew #define RMM_EL3_IFC_VERSION_MINOR	(U(6))
2838c980a4aSJavier Almansa Sobrino 
2848c980a4aSJavier Almansa Sobrino #define RMM_EL3_INTERFACE_VERSION				\
2858c980a4aSJavier Almansa Sobrino 	(((RMM_EL3_IFC_VERSION_MAJOR << 16) & 0x7FFFF) |	\
2868c980a4aSJavier Almansa Sobrino 		RMM_EL3_IFC_VERSION_MINOR)
2878c980a4aSJavier Almansa Sobrino 
2888c980a4aSJavier Almansa Sobrino #define RMM_EL3_IFC_VERSION_GET_MAJOR(_version) (((_version) >> 16) \
2898c980a4aSJavier Almansa Sobrino 								& 0x7FFF)
2908c980a4aSJavier Almansa Sobrino #define RMM_EL3_IFC_VERSION_GET_MAJOR_MINOR(_version) ((_version) & 0xFFFF)
291a0435105SSoby Mathew 
29277c27753SZelalem Aweke #ifndef __ASSEMBLER__
29377c27753SZelalem Aweke #include <stdint.h>
29477c27753SZelalem Aweke 
29577c27753SZelalem Aweke int rmmd_setup(void);
29677c27753SZelalem Aweke uint64_t rmmd_rmi_handler(uint32_t smc_fid,
29777c27753SZelalem Aweke 		uint64_t x1,
29877c27753SZelalem Aweke 		uint64_t x2,
29977c27753SZelalem Aweke 		uint64_t x3,
30077c27753SZelalem Aweke 		uint64_t x4,
30177c27753SZelalem Aweke 		void *cookie,
30277c27753SZelalem Aweke 		void *handle,
30377c27753SZelalem Aweke 		uint64_t flags);
30477c27753SZelalem Aweke 
305319fb084SSoby Mathew uint64_t rmmd_rmm_el3_handler(uint32_t smc_fid,
30677c27753SZelalem Aweke 		uint64_t x1,
30777c27753SZelalem Aweke 		uint64_t x2,
30877c27753SZelalem Aweke 		uint64_t x3,
30977c27753SZelalem Aweke 		uint64_t x4,
31077c27753SZelalem Aweke 		void *cookie,
31177c27753SZelalem Aweke 		void *handle,
31277c27753SZelalem Aweke 		uint64_t flags);
31377c27753SZelalem Aweke 
31477c27753SZelalem Aweke #endif /* __ASSEMBLER__ */
31577c27753SZelalem Aweke #endif /* RMMD_SVC_H */
316