[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2 04/10] xen/arm: ffa: Fine granular call support


  • To: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Thu, 24 Oct 2024 10:00:48 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GnmstD/hgAp/Uiv7oK65KRUjRCYHHauNvIaE8dGkKQk=; b=MXZu9KJ5uIIgEyv/Qun/ktThH2BaPnyoDUZWE5xNnsN3GfpOLPcue2opR8RtFFOtzYjtnzPHoOlDsoudrAfYptBA6nfyoXJq6RGNC9Oke7+ic1lke6Mtmfp2vrZLyOdWHL25651EFjKWDUdRb5gGwBBVpnEZ6I+10BqhQNLXOeBdjKdY24NSu3GLbG74ZU2CuH1zmK+zVBzjYSbPb689Iv6NQZZ2etqyyli2r6xFXV1nU0mJR3/Qxlne/UXaPjlrBUxu1o7KQOxvMec1R7NFmWw3/XgDrF+lujxHLek1Ds/gMIRvxA9qBlB7++j2ipI5bmYtVG+bwDpDiOZiNdnoJA==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GnmstD/hgAp/Uiv7oK65KRUjRCYHHauNvIaE8dGkKQk=; b=SdOUoBBTxY7BPFN7iW2M21rXaJBAJkW11U454grwrnhB+TRhY8Niz1S7IPThieQlFPT/22967+pm09i7CYY0fRgeAwPXAKHPy18emViiV7l0duSDXxCnjv1elCStdUOPxiOSYJW0QL2c42+xNzHo1Ki+HUvOrnLQ8ZJSa60HfpKpH0TjX4wsWGP3pb06UkLAQv0qVNdYwW3PyJDXAIjRAsoW9M6D+dJxWs7NtA8GRox0jtUrOcXPV2u5UoqINMKJdHOLUFM7Fny/X3/Ur3OJQWjT/OC/D16VhyEGDzWutATlxRbZigWSP+cfXNS4CFwa1Sz+DNOIuh8ZE/ncbni/8Q==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=yhv65RIcE5/ZuSjqCt99J8FvRCOr/D3OpguZ5fZr8WdTg0eM1cShJRfKww/2kEwUxAw/aBtLqSPwR2PdnPbe/asVj0nK5FIjD1lbDvlWNeBpXZptG+WbmZ9qSQ2m3MEME2lbZBOR1Xn0d/h9hIVLqQCKYraK6MmRdrNl7mCCR1BQvrQzAlcJXAibUPfIhzPL4+2Lb7OF++2titYtFv1FHRuxWdC1uXcQGJqP0fcg/w8agbeZTklwq+M/2u0CQNkIi9sx9HF1HWARElB/RwYu/xWAXD5AKOp12DWsojsmbZu+fiYhOfpeWG73B5Fmwd6qbXxVDklcnGFyXlhY4PciRg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=B4kQe+VktGXlMqGBIw6ALmtEf1GlIpflTWRUcdF7cBnQKh+YxNwl0OOTjKF719tSUsrSlflbEgTur1X08q+3lBtzmD37ZUm9uYkSfKepA60OFmBmrUsFUkmT2Wk87hSPGBcqivj+cPPLB1bXh051YdqzmFHEsXhLeMCWsXrTNh1rzzNJ+SCbFABT7oen/EwpQ+jgDI8prv69sOCIlcM/+oyerfjXH2Xh3AoK1/nd+ZdvePi01YGAXppHqKPm/2GdI9cPa8TU7Ii6r2ozwQWm9eJzfAIZJXlmwnVyFMHi6n7q566rMYLUX8idgVRxeRFxpZxFonm3ME0A+OAdCAA4+A==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Volodymyr Babchuk <volodymyr_babchuk@xxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>
  • Delivery-date: Thu, 24 Oct 2024 10:01:07 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHbH6X6DgTlgbJ1hkeaet/uwiCV8bKUJP2AgAF1ZYCAAB15AA==
  • Thread-topic: [PATCH v2 04/10] xen/arm: ffa: Fine granular call support

Hi Jens,

> On 24 Oct 2024, at 10:15, Jens Wiklander <jens.wiklander@xxxxxxxxxx> wrote:
> 
> On Wed, Oct 23, 2024 at 11:58 AM Jens Wiklander
> <jens.wiklander@xxxxxxxxxx> wrote:
>> 
>> Hi Bertrand,
>> 
>> On Wed, Oct 16, 2024 at 10:32 AM Bertrand Marquis
>> <bertrand.marquis@xxxxxxx> wrote:
>>> 
>>> Create a bitmap to store which feature is supported or not by the
>>> firmware and use it to filter which calls are done to the firmware.
>>> 
>>> While there reoder ABI definition by numbers to easily find the min and
>>> max ones.
>>> 
>>> Signed-off-by: Bertrand Marquis <bertrand.marquis@xxxxxxx>
>>> ---
>>> Changes in v2:
>>> - rename fw_feat to abi and macros to FFA_ABI to be coherent with the
>>>  abi needed change done before
>>> - rework the macros to be simpler by directly defining MIN and MAX using
>>>  only Function ids
>>> - check that requested function ids do not go over the bitmap size in
>>>  ffa_fw_supports_fid
>>> - add an ASSERT to make sure that we do not try to set bits outside of
>>>  the bitmap
>>> - turn off FF-A if there is not firmware support and adapt the commit
>>>  message to reflect this
>>> - add a compile time check that FFA_ABI_MIN < FFA_ABI_MAX
>>> - remove spurious line removal
>>> - restore proper cleanup of rxtx init in case of error
>>> - reorder ABI by numbers
>>> ---
>>> xen/arch/arm/tee/ffa.c          | 28 +++++++++++++++---------
>>> xen/arch/arm/tee/ffa_notif.c    |  7 ++++++
>>> xen/arch/arm/tee/ffa_partinfo.c | 30 +++++++++++++++++++++++++-
>>> xen/arch/arm/tee/ffa_private.h  | 38 ++++++++++++++++++++++++++++-----
>>> xen/arch/arm/tee/ffa_rxtx.c     |  4 ++++
>>> xen/arch/arm/tee/ffa_shm.c      | 12 +++++++++++
>>> 6 files changed, 103 insertions(+), 16 deletions(-)
>> 
>> Looks good.
>> Reviewed-by: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
> 
> I'm sorry, I'm having second thoughts about this patch. I have two concerns:
> 1. Xen will complain at boot with XENLOG_INFO if an ABI function
> listed in ffa_fw_abi_needed is missing. With the current list of ABI
> functions that's somewhat OK since it was a cause of disabling FF-A
> support before. But as the list grows it may become annoying or even
> confusing since when Xen supports more features it may complain more
> even if there is no regression compared to previous versions. If we
> need to print anything perhaps XENLOG_DEBUG is better.

This is only printed at boot and in the worst case it would list all needed ABI.
If the list printed becomes big, it probably means that almost nothing is
possible to do which might be interesting for the user.
Only seeing this information with debug prints might lead into normal users
not understanding why communication with secure world are not working
without having a reason.
I would expect that the most common case will be for the list of printed
entries to be limited (right now it only prints something for 64bit sharing 
which
should be solved in Hafnium).
As Xen is already quite verbose in INFO mode during boot and this is not
a runtime print, I think it is ok.

> 2. FFA_FEATURES may return success for features not supported by the
> SPMC. How about only returning success for features in the
> ffa_fw_abi_needed bitmap?

This would be a reinterpretation of the specification and could create
issues in some cases (some ABIs might be supported by Xen but not
by the SPMC and still work correctly this way) and even more when
we will have VM to VM.
The specification is saying that we should return what we support and
not what is supported by the SPMC. Filtering based on what is supported
by the SPMC and what will still work if not supported by the SPMC and
what we do not support even if it is supported by the SPMC might become
quickly very complex.

What do you think we would gain from doing what you suggest instead of
what we have right now ?

Cheers
Bertrand

> 
> Cheers,
> Jens
> 
>> 
>> Cheers,
>> Jens
>> 
>>> 
>>> diff --git a/xen/arch/arm/tee/ffa.c b/xen/arch/arm/tee/ffa.c
>>> index 1ee6b2895e92..267d4435ac08 100644
>>> --- a/xen/arch/arm/tee/ffa.c
>>> +++ b/xen/arch/arm/tee/ffa.c
>>> @@ -72,7 +72,10 @@
>>> #include "ffa_private.h"
>>> 
>>> /* Negotiated FF-A version to use with the SPMC, 0 if not there or 
>>> supported */
>>> -static uint32_t __ro_after_init ffa_fw_version;
>>> +uint32_t __ro_after_init ffa_fw_version;
>>> +
>>> +/* Features supported by the SPMC or secure world when present */
>>> +DECLARE_BITMAP(ffa_fw_abi_supported, FFA_ABI_BITMAP_SIZE);
>>> 
>>> struct ffa_fw_abi {
>>>     const uint32_t id;
>>> @@ -177,6 +180,13 @@ static void handle_msg_send_direct_req(struct 
>>> cpu_user_regs *regs, uint32_t fid)
>>>     else
>>>         mask = GENMASK_ULL(31, 0);
>>> 
>>> +    if ( !ffa_fw_supports_fid(fid) )
>>> +    {
>>> +        resp.a0 = FFA_ERROR;
>>> +        resp.a2 = FFA_RET_NOT_SUPPORTED;
>>> +        goto out;
>>> +    }
>>> +
>>>     src_dst = get_user_reg(regs, 1);
>>>     if ( (src_dst >> 16) != ffa_get_vm_id(d) )
>>>     {
>>> @@ -577,19 +587,16 @@ static bool ffa_probe(void)
>>>     else
>>>         ffa_fw_version = vers;
>>> 
>>> -    /*
>>> -     * At the moment domains must support the same features used by Xen.
>>> -     * TODO: Rework the code to allow domain to use a subset of the
>>> -     * features supported.
>>> -     */
>>>     for ( unsigned int i = 0; i < ARRAY_SIZE(ffa_fw_abi_needed); i++ )
>>>     {
>>> -        if ( !ffa_abi_supported(ffa_fw_abi_needed[i].id) )
>>> -        {
>>> +        ASSERT(FFA_ABI_BITNUM(ffa_fw_abi_needed[i].id) < 
>>> FFA_ABI_BITMAP_SIZE);
>>> +
>>> +        if ( ffa_abi_supported(ffa_fw_abi_needed[i].id) )
>>> +            set_bit(FFA_ABI_BITNUM(ffa_fw_abi_needed[i].id),
>>> +                    ffa_fw_abi_supported);
>>> +        else
>>>             printk(XENLOG_INFO "ARM FF-A Firmware does not support %s\n",
>>>                    ffa_fw_abi_needed[i].name);
>>> -            goto err_no_fw;
>>> -        }
>>>     }
>>> 
>>>     if ( !ffa_rxtx_init() )
>>> @@ -611,6 +618,7 @@ err_rxtx_destroy:
>>>     ffa_rxtx_destroy();
>>> err_no_fw:
>>>     ffa_fw_version = 0;
>>> +    bitmap_zero(ffa_fw_abi_supported, FFA_ABI_BITMAP_SIZE);
>>>     printk(XENLOG_WARNING "ARM FF-A No firmware support\n");
>>> 
>>>     return false;
>>> diff --git a/xen/arch/arm/tee/ffa_notif.c b/xen/arch/arm/tee/ffa_notif.c
>>> index 541e61d2f606..4b3e46318f4b 100644
>>> --- a/xen/arch/arm/tee/ffa_notif.c
>>> +++ b/xen/arch/arm/tee/ffa_notif.c
>>> @@ -377,6 +377,13 @@ void ffa_notif_init(void)
>>>     unsigned int irq;
>>>     int ret;
>>> 
>>> +    /* Only enable fw notification if all ABIs we need are supported */
>>> +    if ( !(ffa_fw_supports_fid(FFA_NOTIFICATION_BITMAP_CREATE) &&
>>> +           ffa_fw_supports_fid(FFA_NOTIFICATION_BITMAP_DESTROY) &&
>>> +           ffa_fw_supports_fid(FFA_NOTIFICATION_GET) &&
>>> +           ffa_fw_supports_fid(FFA_NOTIFICATION_INFO_GET_64)) )
>>> +        return;
>>> +
>>>     arm_smccc_1_2_smc(&arg, &resp);
>>>     if ( resp.a0 != FFA_SUCCESS_32 )
>>>         return;
>>> diff --git a/xen/arch/arm/tee/ffa_partinfo.c 
>>> b/xen/arch/arm/tee/ffa_partinfo.c
>>> index 93a03c6bc672..99c48f0e5c05 100644
>>> --- a/xen/arch/arm/tee/ffa_partinfo.c
>>> +++ b/xen/arch/arm/tee/ffa_partinfo.c
>>> @@ -77,7 +77,15 @@ int32_t ffa_handle_partition_info_get(uint32_t w1, 
>>> uint32_t w2, uint32_t w3,
>>>      */
>>>     if ( w5 == FFA_PARTITION_INFO_GET_COUNT_FLAG &&
>>>          ctx->guest_vers == FFA_VERSION_1_1 )
>>> -        return ffa_partition_info_get(w1, w2, w3, w4, w5, count, fpi_size);
>>> +    {
>>> +        if ( ffa_fw_supports_fid(FFA_PARTITION_INFO_GET) )
>>> +            return ffa_partition_info_get(w1, w2, w3, w4, w5, count, 
>>> fpi_size);
>>> +        else
>>> +        {
>>> +            *count = 0;
>>> +            return FFA_RET_OK;
>>> +        }
>>> +    }
>>>     if ( w5 )
>>>         return FFA_RET_INVALID_PARAMETERS;
>>> 
>>> @@ -87,6 +95,18 @@ int32_t ffa_handle_partition_info_get(uint32_t w1, 
>>> uint32_t w2, uint32_t w3,
>>>     if ( !spin_trylock(&ctx->rx_lock) )
>>>         return FFA_RET_BUSY;
>>> 
>>> +    if ( !ffa_fw_supports_fid(FFA_PARTITION_INFO_GET) )
>>> +    {
>>> +        if ( ctx->guest_vers == FFA_VERSION_1_0 )
>>> +            *fpi_size = sizeof(struct ffa_partition_info_1_0);
>>> +        else
>>> +            *fpi_size = sizeof(struct ffa_partition_info_1_1);
>>> +
>>> +        *count = 0;
>>> +        ret = FFA_RET_OK;
>>> +        goto out;
>>> +    }
>>> +
>>>     if ( !ctx->page_count || !ctx->rx_is_free )
>>>         goto out;
>>>     spin_lock(&ffa_rx_buffer_lock);
>>> @@ -250,6 +270,11 @@ bool ffa_partinfo_init(void)
>>>     uint32_t count;
>>>     int e;
>>> 
>>> +    if ( !ffa_fw_supports_fid(FFA_PARTITION_INFO_GET) ||
>>> +         !ffa_fw_supports_fid(FFA_MSG_SEND_DIRECT_REQ_32) ||
>>> +         !ffa_rx || !ffa_tx )
>>> +        return false;
>>> +
>>>     e = ffa_partition_info_get(0, 0, 0, 0, 0, &count, &fpi_size);
>>>     if ( e )
>>>     {
>>> @@ -313,6 +338,9 @@ int ffa_partinfo_domain_init(struct domain *d)
>>>     unsigned int n;
>>>     int32_t res;
>>> 
>>> +    if ( !ffa_fw_supports_fid(FFA_MSG_SEND_DIRECT_REQ_32) )
>>> +        return 0;
>>> +
>>>     ctx->vm_destroy_bitmap = xzalloc_array(unsigned long, count);
>>>     if ( !ctx->vm_destroy_bitmap )
>>>         return -ENOMEM;
>>> diff --git a/xen/arch/arm/tee/ffa_private.h b/xen/arch/arm/tee/ffa_private.h
>>> index 045d9c4a0b56..85eb61c13464 100644
>>> --- a/xen/arch/arm/tee/ffa_private.h
>>> +++ b/xen/arch/arm/tee/ffa_private.h
>>> @@ -14,6 +14,7 @@
>>> #include <xen/spinlock.h>
>>> #include <xen/sched.h>
>>> #include <xen/time.h>
>>> +#include <xen/bitmap.h>
>>> 
>>> /* Error codes */
>>> #define FFA_RET_OK                      0
>>> @@ -201,18 +202,17 @@
>>> #define FFA_INTERRUPT                   0x84000062U
>>> #define FFA_VERSION                     0x84000063U
>>> #define FFA_FEATURES                    0x84000064U
>>> -#define FFA_RX_ACQUIRE                  0x84000084U
>>> #define FFA_RX_RELEASE                  0x84000065U
>>> #define FFA_RXTX_MAP_32                 0x84000066U
>>> #define FFA_RXTX_MAP_64                 0xC4000066U
>>> #define FFA_RXTX_UNMAP                  0x84000067U
>>> #define FFA_PARTITION_INFO_GET          0x84000068U
>>> #define FFA_ID_GET                      0x84000069U
>>> -#define FFA_SPM_ID_GET                  0x84000085U
>>> +#define FFA_MSG_POLL                    0x8400006AU
>>> #define FFA_MSG_WAIT                    0x8400006BU
>>> #define FFA_MSG_YIELD                   0x8400006CU
>>> #define FFA_RUN                         0x8400006DU
>>> -#define FFA_MSG_SEND2                   0x84000086U
>>> +#define FFA_MSG_SEND                    0x8400006EU
>>> #define FFA_MSG_SEND_DIRECT_REQ_32      0x8400006FU
>>> #define FFA_MSG_SEND_DIRECT_REQ_64      0xC400006FU
>>> #define FFA_MSG_SEND_DIRECT_RESP_32     0x84000070U
>>> @@ -230,8 +230,6 @@
>>> #define FFA_MEM_RECLAIM                 0x84000077U
>>> #define FFA_MEM_FRAG_RX                 0x8400007AU
>>> #define FFA_MEM_FRAG_TX                 0x8400007BU
>>> -#define FFA_MSG_SEND                    0x8400006EU
>>> -#define FFA_MSG_POLL                    0x8400006AU
>>> #define FFA_NOTIFICATION_BITMAP_CREATE  0x8400007DU
>>> #define FFA_NOTIFICATION_BITMAP_DESTROY 0x8400007EU
>>> #define FFA_NOTIFICATION_BIND           0x8400007FU
>>> @@ -240,6 +238,25 @@
>>> #define FFA_NOTIFICATION_GET            0x84000082U
>>> #define FFA_NOTIFICATION_INFO_GET_32    0x84000083U
>>> #define FFA_NOTIFICATION_INFO_GET_64    0xC4000083U
>>> +#define FFA_RX_ACQUIRE                  0x84000084U
>>> +#define FFA_SPM_ID_GET                  0x84000085U
>>> +#define FFA_MSG_SEND2                   0x84000086U
>>> +
>>> +/**
>>> + * Encoding of features supported or not by the fw in a bitmap:
>>> + * - Function IDs are going from 0x60 to 0xFF
>>> + * - A function can be supported in 32 and/or 64bit
>>> + * The bitmap has one bit for each function in 32 and 64 bit.
>>> + */
>>> +#define FFA_ABI_ID(id)        ((id) & ARM_SMCCC_FUNC_MASK)
>>> +#define FFA_ABI_CONV(id)      (((id) >> ARM_SMCCC_CONV_SHIFT) & BIT(0,U))
>>> +
>>> +#define FFA_ABI_MIN           FFA_ABI_ID(FFA_ERROR)
>>> +#define FFA_ABI_MAX           FFA_ABI_ID(FFA_MSG_SEND2)
>>> +
>>> +#define FFA_ABI_BITMAP_SIZE   (2 * (FFA_ABI_MAX - FFA_ABI_MIN + 1))
>>> +#define FFA_ABI_BITNUM(id)    ((FFA_ABI_ID(id) - FFA_ABI_MIN) << 1 | \
>>> +                               FFA_ABI_CONV(id))
>>> 
>>> struct ffa_ctx_notif {
>>>     bool enabled;
>>> @@ -289,6 +306,8 @@ extern void *ffa_rx;
>>> extern void *ffa_tx;
>>> extern spinlock_t ffa_rx_buffer_lock;
>>> extern spinlock_t ffa_tx_buffer_lock;
>>> +extern uint32_t __ro_after_init ffa_fw_version;
>>> +extern DECLARE_BITMAP(ffa_fw_abi_supported, FFA_ABI_BITMAP_SIZE);
>>> 
>>> bool ffa_shm_domain_destroy(struct domain *d);
>>> void ffa_handle_mem_share(struct cpu_user_regs *regs);
>>> @@ -401,4 +420,13 @@ static inline int32_t ffa_rx_release(void)
>>>     return ffa_simple_call(FFA_RX_RELEASE, 0, 0, 0, 0);
>>> }
>>> 
>>> +static inline bool ffa_fw_supports_fid(uint32_t fid)
>>> +{
>>> +    BUILD_BUG_ON(FFA_ABI_MIN > FFA_ABI_MAX);
>>> +
>>> +    if ( FFA_ABI_BITNUM(fid) > FFA_ABI_BITMAP_SIZE)
>>> +        return false;
>>> +    return test_bit(FFA_ABI_BITNUM(fid), ffa_fw_abi_supported);
>>> +}
>>> +
>>> #endif /*__FFA_PRIVATE_H__*/
>>> diff --git a/xen/arch/arm/tee/ffa_rxtx.c b/xen/arch/arm/tee/ffa_rxtx.c
>>> index 661764052e67..b6931c855779 100644
>>> --- a/xen/arch/arm/tee/ffa_rxtx.c
>>> +++ b/xen/arch/arm/tee/ffa_rxtx.c
>>> @@ -193,6 +193,10 @@ bool ffa_rxtx_init(void)
>>> {
>>>     int e;
>>> 
>>> +    /* Firmware not there or not supporting */
>>> +    if ( !ffa_fw_supports_fid(FFA_RXTX_MAP_64) )
>>> +        return false;
>>> +
>>>     ffa_rx = alloc_xenheap_pages(get_order_from_pages(FFA_RXTX_PAGE_COUNT), 
>>> 0);
>>>     if ( !ffa_rx )
>>>         return false;
>>> diff --git a/xen/arch/arm/tee/ffa_shm.c b/xen/arch/arm/tee/ffa_shm.c
>>> index 370d83ec5cf8..efa5b67db8e1 100644
>>> --- a/xen/arch/arm/tee/ffa_shm.c
>>> +++ b/xen/arch/arm/tee/ffa_shm.c
>>> @@ -149,6 +149,9 @@ static int32_t ffa_mem_share(uint32_t tot_len, uint32_t 
>>> frag_len,
>>> static int32_t ffa_mem_reclaim(uint32_t handle_lo, uint32_t handle_hi,
>>>                                uint32_t flags)
>>> {
>>> +    if ( !ffa_fw_supports_fid(FFA_MEM_RECLAIM) )
>>> +        return FFA_RET_NOT_SUPPORTED;
>>> +
>>>     return ffa_simple_call(FFA_MEM_RECLAIM, handle_lo, handle_hi, flags, 0);
>>> }
>>> 
>>> @@ -467,6 +470,12 @@ void ffa_handle_mem_share(struct cpu_user_regs *regs)
>>>     uint32_t range_count;
>>>     uint32_t region_offs;
>>> 
>>> +    if ( !ffa_fw_supports_fid(FFA_MEM_SHARE_64) )
>>> +    {
>>> +        ret = FFA_RET_NOT_SUPPORTED;
>>> +        goto out_set_ret;
>>> +    }
>>> +
>>>     /*
>>>      * We're only accepting memory transaction descriptors via the rx/tx
>>>      * buffer.
>>> @@ -621,6 +630,9 @@ int ffa_handle_mem_reclaim(uint64_t handle, uint32_t 
>>> flags)
>>>     register_t handle_lo;
>>>     int ret;
>>> 
>>> +    if ( !ffa_fw_supports_fid(FFA_MEM_RECLAIM) )
>>> +        return FFA_RET_NOT_SUPPORTED;
>>> +
>>>     spin_lock(&ctx->lock);
>>>     shm = find_shm_mem(ctx, handle);
>>>     if ( shm )
>>> --
>>> 2.47.0



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.