Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 1 | /* |
dp-arm | 66abfbe | 2017-01-31 13:01:04 +0000 | [diff] [blame] | 2 | * Copyright (c) 2013-2017, ARM Limited and Contributors. All rights reserved. |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 3 | * |
| 4 | * Redistribution and use in source and binary forms, with or without |
| 5 | * modification, are permitted provided that the following conditions are met: |
| 6 | * |
| 7 | * Redistributions of source code must retain the above copyright notice, this |
| 8 | * list of conditions and the following disclaimer. |
| 9 | * |
| 10 | * Redistributions in binary form must reproduce the above copyright notice, |
| 11 | * this list of conditions and the following disclaimer in the documentation |
| 12 | * and/or other materials provided with the distribution. |
| 13 | * |
| 14 | * Neither the name of ARM nor the names of its contributors may be used |
| 15 | * to endorse or promote products derived from this software without specific |
| 16 | * prior written permission. |
| 17 | * |
| 18 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
| 19 | * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 20 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 21 | * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE |
| 22 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| 23 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| 24 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| 25 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
| 26 | * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| 27 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
| 28 | * POSSIBILITY OF SUCH DAMAGE. |
| 29 | */ |
| 30 | |
| 31 | #ifndef __PLATFORM_H__ |
| 32 | #define __PLATFORM_H__ |
| 33 | |
Soby Mathew | 981487a | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 34 | #include <psci.h> |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 35 | #include <stdint.h> |
Soby Mathew | 981487a | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 36 | #include <types.h> |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 37 | |
| 38 | |
| 39 | /******************************************************************************* |
| 40 | * Forward declarations |
| 41 | ******************************************************************************/ |
dp-arm | b3e8580 | 2016-12-12 14:48:13 +0000 | [diff] [blame] | 42 | struct auth_img_desc_s; |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 43 | struct meminfo; |
| 44 | struct image_info; |
| 45 | struct entry_point_info; |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 46 | struct bl31_params; |
Yatharth Kochar | a65be2f | 2015-10-09 18:06:13 +0100 | [diff] [blame] | 47 | struct image_desc; |
Yatharth Kochar | 3345a8d | 2016-09-12 16:08:41 +0100 | [diff] [blame] | 48 | struct bl_load_info; |
| 49 | struct bl_params; |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 50 | |
| 51 | /******************************************************************************* |
Juan Castillo | 31a68f0 | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 52 | * plat_get_rotpk_info() flags |
| 53 | ******************************************************************************/ |
| 54 | #define ROTPK_IS_HASH (1 << 0) |
Soby Mathew | 2f7ed05 | 2016-05-24 15:05:15 +0100 | [diff] [blame] | 55 | /* Flag used to skip verification of the certificate ROTPK while the platform |
| 56 | ROTPK is not deployed */ |
| 57 | #define ROTPK_NOT_DEPLOYED (1 << 1) |
Juan Castillo | 31a68f0 | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 58 | |
| 59 | /******************************************************************************* |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 60 | * Function declarations |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 61 | ******************************************************************************/ |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 62 | /******************************************************************************* |
| 63 | * Mandatory common functions |
| 64 | ******************************************************************************/ |
Antonio Nino Diaz | 391a76e | 2016-05-18 16:53:31 +0100 | [diff] [blame] | 65 | unsigned long long plat_get_syscnt_freq(void) __deprecated; |
| 66 | unsigned int plat_get_syscnt_freq2(void); |
| 67 | |
Juan Castillo | 3a66aca | 2015-04-13 17:36:19 +0100 | [diff] [blame] | 68 | int plat_get_image_source(unsigned int image_id, |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 69 | uintptr_t *dev_handle, |
| 70 | uintptr_t *image_spec); |
Soby Mathew | 21f9361 | 2016-03-23 10:11:10 +0000 | [diff] [blame] | 71 | uintptr_t plat_get_ns_image_entrypoint(void); |
Soby Mathew | 981487a | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 72 | unsigned int plat_my_core_pos(void); |
| 73 | int plat_core_pos_by_mpidr(u_register_t mpidr); |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 74 | |
Douglas Raillard | 306593d | 2017-02-24 18:14:15 +0000 | [diff] [blame] | 75 | #if STACK_PROTECTOR_ENABLED |
| 76 | /* |
| 77 | * Return a new value to be used for the stack protection's canary. |
| 78 | * |
| 79 | * Ideally, this value is a random number that is impossible to predict by an |
| 80 | * attacker. |
| 81 | */ |
| 82 | u_register_t plat_get_stack_protector_canary(void); |
| 83 | #endif /* STACK_PROTECTOR_ENABLED */ |
| 84 | |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 85 | /******************************************************************************* |
| 86 | * Mandatory interrupt management functions |
| 87 | ******************************************************************************/ |
Dan Handley | 701fea7 | 2014-05-27 16:17:21 +0100 | [diff] [blame] | 88 | uint32_t plat_ic_get_pending_interrupt_id(void); |
| 89 | uint32_t plat_ic_get_pending_interrupt_type(void); |
| 90 | uint32_t plat_ic_acknowledge_interrupt(void); |
| 91 | uint32_t plat_ic_get_interrupt_type(uint32_t id); |
| 92 | void plat_ic_end_of_interrupt(uint32_t id); |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 93 | uint32_t plat_interrupt_type_to_line(uint32_t type, |
| 94 | uint32_t security_state); |
| 95 | |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 96 | /******************************************************************************* |
| 97 | * Optional common functions (may be overridden) |
| 98 | ******************************************************************************/ |
Soby Mathew | a0fedc4 | 2016-06-16 14:52:04 +0100 | [diff] [blame] | 99 | uintptr_t plat_get_my_stack(void); |
Yatharth Kochar | f528faf | 2016-06-28 16:58:26 +0100 | [diff] [blame] | 100 | void plat_report_exception(unsigned int exception_type); |
Sandrine Bailleux | 046cd3f | 2014-08-06 11:27:23 +0100 | [diff] [blame] | 101 | int plat_crash_console_init(void); |
Soby Mathew | 066f713 | 2014-07-14 16:57:23 +0100 | [diff] [blame] | 102 | int plat_crash_console_putc(int c); |
Juan Castillo | 26ae583 | 2015-09-25 15:41:14 +0100 | [diff] [blame] | 103 | void plat_error_handler(int err) __dead2; |
Antonio Nino Diaz | 1f21bcf | 2016-02-01 13:57:25 +0000 | [diff] [blame] | 104 | void plat_panic_handler(void) __dead2; |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 105 | |
| 106 | /******************************************************************************* |
| 107 | * Mandatory BL1 functions |
| 108 | ******************************************************************************/ |
Dan Handley | 4fd2f5c | 2014-08-04 11:41:20 +0100 | [diff] [blame] | 109 | void bl1_early_platform_setup(void); |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 110 | void bl1_plat_arch_setup(void); |
| 111 | void bl1_platform_setup(void); |
| 112 | struct meminfo *bl1_plat_sec_mem_layout(void); |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 113 | |
Yatharth Kochar | 71c9a5e | 2015-10-10 19:06:53 +0100 | [diff] [blame] | 114 | /* |
| 115 | * The following function is mandatory when the |
| 116 | * firmware update feature is used. |
| 117 | */ |
| 118 | int bl1_plat_mem_check(uintptr_t mem_base, unsigned int mem_size, |
| 119 | unsigned int flags); |
| 120 | |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 121 | /******************************************************************************* |
| 122 | * Optional BL1 functions (may be overridden) |
| 123 | ******************************************************************************/ |
Sandrine Bailleux | 467d057 | 2014-06-24 14:02:34 +0100 | [diff] [blame] | 124 | void bl1_init_bl2_mem_layout(const struct meminfo *bl1_mem_layout, |
| 125 | struct meminfo *bl2_mem_layout); |
Yatharth Kochar | 71c9a5e | 2015-10-10 19:06:53 +0100 | [diff] [blame] | 126 | |
Yatharth Kochar | a65be2f | 2015-10-09 18:06:13 +0100 | [diff] [blame] | 127 | /* |
| 128 | * The following functions are used for image loading process in BL1. |
| 129 | */ |
| 130 | void bl1_plat_set_ep_info(unsigned int image_id, |
| 131 | struct entry_point_info *ep_info); |
Yatharth Kochar | 71c9a5e | 2015-10-10 19:06:53 +0100 | [diff] [blame] | 132 | /* |
| 133 | * The following functions are mandatory when firmware update |
| 134 | * feature is used and optional otherwise. |
| 135 | */ |
Yatharth Kochar | a65be2f | 2015-10-09 18:06:13 +0100 | [diff] [blame] | 136 | unsigned int bl1_plat_get_next_image_id(void); |
| 137 | struct image_desc *bl1_plat_get_image_desc(unsigned int image_id); |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 138 | |
Yatharth Kochar | 71c9a5e | 2015-10-10 19:06:53 +0100 | [diff] [blame] | 139 | /* |
| 140 | * The following functions are used by firmware update |
| 141 | * feature and may optionally be overridden. |
| 142 | */ |
Dan Handley | 89f8f33 | 2015-12-15 14:28:24 +0000 | [diff] [blame] | 143 | __dead2 void bl1_plat_fwu_done(void *client_cookie, void *reserved); |
Yatharth Kochar | 71c9a5e | 2015-10-10 19:06:53 +0100 | [diff] [blame] | 144 | |
| 145 | |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 146 | /******************************************************************************* |
| 147 | * Mandatory BL2 functions |
| 148 | ******************************************************************************/ |
Dan Handley | 4fd2f5c | 2014-08-04 11:41:20 +0100 | [diff] [blame] | 149 | void bl2_early_platform_setup(struct meminfo *mem_layout); |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 150 | void bl2_plat_arch_setup(void); |
| 151 | void bl2_platform_setup(void); |
| 152 | struct meminfo *bl2_plat_sec_mem_layout(void); |
| 153 | |
Yatharth Kochar | 3345a8d | 2016-09-12 16:08:41 +0100 | [diff] [blame] | 154 | #if LOAD_IMAGE_V2 |
| 155 | /* |
| 156 | * This function can be used by the platforms to update/use image |
| 157 | * information for given `image_id`. |
| 158 | */ |
| 159 | int bl2_plat_handle_post_image_load(unsigned int image_id); |
| 160 | |
| 161 | #else /* LOAD_IMAGE_V2 */ |
| 162 | |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 163 | /* |
| 164 | * This function returns a pointer to the shared memory that the platform has |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 165 | * kept aside to pass trusted firmware related information that BL31 |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 166 | * could need |
| 167 | */ |
| 168 | struct bl31_params *bl2_plat_get_bl31_params(void); |
| 169 | |
| 170 | /* |
| 171 | * This function returns a pointer to the shared memory that the platform |
| 172 | * has kept to point to entry point information of BL31 to BL2 |
| 173 | */ |
| 174 | struct entry_point_info *bl2_plat_get_bl31_ep_info(void); |
| 175 | |
| 176 | /* |
| 177 | * This function flushes to main memory all the params that are |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 178 | * passed to BL31 |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 179 | */ |
| 180 | void bl2_plat_flush_bl31_params(void); |
| 181 | |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 182 | /* |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 183 | * The next 2 functions allow the platform to change the entrypoint information |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 184 | * for the mandatory 3rd level BL images, BL31 and BL33. This is done after |
| 185 | * BL2 has loaded those images into memory but before BL31 is executed. |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 186 | */ |
| 187 | void bl2_plat_set_bl31_ep_info(struct image_info *image, |
| 188 | struct entry_point_info *ep); |
| 189 | |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 190 | void bl2_plat_set_bl33_ep_info(struct image_info *image, |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 191 | struct entry_point_info *ep); |
| 192 | |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 193 | /* Gets the memory layout for BL33 */ |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 194 | void bl2_plat_get_bl33_meminfo(struct meminfo *mem_info); |
| 195 | |
| 196 | /******************************************************************************* |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 197 | * Conditionally mandatory BL2 functions: must be implemented if SCP_BL2 image |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 198 | * is supported |
| 199 | ******************************************************************************/ |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 200 | /* Gets the memory layout for SCP_BL2 */ |
| 201 | void bl2_plat_get_scp_bl2_meminfo(struct meminfo *mem_info); |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 202 | |
| 203 | /* |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 204 | * This function is called after loading SCP_BL2 image and it is used to perform |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 205 | * any platform-specific actions required to handle the SCP firmware. |
| 206 | */ |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 207 | int bl2_plat_handle_scp_bl2(struct image_info *scp_bl2_image_info); |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 208 | |
| 209 | /******************************************************************************* |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 210 | * Conditionally mandatory BL2 functions: must be implemented if BL32 image |
Sandrine Bailleux | f841ef0 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 211 | * is supported |
| 212 | ******************************************************************************/ |
| 213 | void bl2_plat_set_bl32_ep_info(struct image_info *image, |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 214 | struct entry_point_info *ep); |
| 215 | |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 216 | /* Gets the memory layout for BL32 */ |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 217 | void bl2_plat_get_bl32_meminfo(struct meminfo *mem_info); |
| 218 | |
Yatharth Kochar | 3345a8d | 2016-09-12 16:08:41 +0100 | [diff] [blame] | 219 | #endif /* LOAD_IMAGE_V2 */ |
| 220 | |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 221 | /******************************************************************************* |
| 222 | * Optional BL2 functions (may be overridden) |
| 223 | ******************************************************************************/ |
| 224 | |
| 225 | /******************************************************************************* |
Yatharth Kochar | b1c2fe0 | 2015-10-14 15:27:24 +0100 | [diff] [blame] | 226 | * Mandatory BL2U functions. |
| 227 | ******************************************************************************/ |
| 228 | void bl2u_early_platform_setup(struct meminfo *mem_layout, |
| 229 | void *plat_info); |
| 230 | void bl2u_plat_arch_setup(void); |
| 231 | void bl2u_platform_setup(void); |
| 232 | |
| 233 | /******************************************************************************* |
| 234 | * Conditionally mandatory BL2U functions for CSS platforms. |
| 235 | ******************************************************************************/ |
| 236 | /* |
| 237 | * This function is used to perform any platform-specific actions required to |
| 238 | * handle the BL2U_SCP firmware. |
| 239 | */ |
| 240 | int bl2u_plat_handle_scp_bl2u(void); |
| 241 | |
| 242 | /******************************************************************************* |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 243 | * Mandatory BL31 functions |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 244 | ******************************************************************************/ |
Yatharth Kochar | 3345a8d | 2016-09-12 16:08:41 +0100 | [diff] [blame] | 245 | #if LOAD_IMAGE_V2 |
| 246 | void bl31_early_platform_setup(void *from_bl2, |
| 247 | void *plat_params_from_bl2); |
| 248 | #else |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 249 | void bl31_early_platform_setup(struct bl31_params *from_bl2, |
| 250 | void *plat_params_from_bl2); |
Yatharth Kochar | 3345a8d | 2016-09-12 16:08:41 +0100 | [diff] [blame] | 251 | #endif |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 252 | void bl31_plat_arch_setup(void); |
| 253 | void bl31_platform_setup(void); |
Soby Mathew | 1ff495b | 2015-12-09 11:28:43 +0000 | [diff] [blame] | 254 | void bl31_plat_runtime_setup(void); |
Dan Handley | 701fea7 | 2014-05-27 16:17:21 +0100 | [diff] [blame] | 255 | struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type); |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 256 | |
| 257 | /******************************************************************************* |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 258 | * Mandatory PSCI functions (BL31) |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 259 | ******************************************************************************/ |
Soby Mathew | 981487a | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 260 | int plat_setup_psci_ops(uintptr_t sec_entrypoint, |
| 261 | const struct plat_psci_ops **); |
| 262 | const unsigned char *plat_get_power_domain_tree_desc(void); |
| 263 | |
| 264 | /******************************************************************************* |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 265 | * Optional PSCI functions (BL31). |
Soby Mathew | 981487a | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 266 | ******************************************************************************/ |
dp-arm | 66abfbe | 2017-01-31 13:01:04 +0000 | [diff] [blame] | 267 | void plat_psci_stat_accounting_start(const psci_power_state_t *state_info); |
| 268 | void plat_psci_stat_accounting_stop(const psci_power_state_t *state_info); |
| 269 | u_register_t plat_psci_stat_get_residency(unsigned int lvl, |
| 270 | const psci_power_state_t *state_info, |
| 271 | int last_cpu_index); |
Soby Mathew | 981487a | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 272 | plat_local_state_t plat_get_target_pwr_state(unsigned int lvl, |
| 273 | const plat_local_state_t *states, |
| 274 | unsigned int ncpu); |
Dan Handley | 7ce42df | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 275 | |
| 276 | /******************************************************************************* |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 277 | * Optional BL31 functions (may be overridden) |
Dan Handley | b226a4d | 2014-05-16 14:08:45 +0100 | [diff] [blame] | 278 | ******************************************************************************/ |
Achin Gupta | e998254 | 2014-06-26 08:59:07 +0100 | [diff] [blame] | 279 | void bl31_plat_enable_mmu(uint32_t flags); |
Dan Handley | b226a4d | 2014-05-16 14:08:45 +0100 | [diff] [blame] | 280 | |
| 281 | /******************************************************************************* |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 282 | * Optional BL32 functions (may be overridden) |
Dan Handley | b226a4d | 2014-05-16 14:08:45 +0100 | [diff] [blame] | 283 | ******************************************************************************/ |
Achin Gupta | e998254 | 2014-06-26 08:59:07 +0100 | [diff] [blame] | 284 | void bl32_plat_enable_mmu(uint32_t flags); |
Dan Handley | b226a4d | 2014-05-16 14:08:45 +0100 | [diff] [blame] | 285 | |
Juan Castillo | 5e29c75 | 2015-01-07 10:39:25 +0000 | [diff] [blame] | 286 | /******************************************************************************* |
Juan Castillo | 31a68f0 | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 287 | * Trusted Board Boot functions |
Juan Castillo | 5e29c75 | 2015-01-07 10:39:25 +0000 | [diff] [blame] | 288 | ******************************************************************************/ |
Juan Castillo | 31a68f0 | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 289 | int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len, |
| 290 | unsigned int *flags); |
Juan Castillo | bfb7fa6 | 2016-01-22 11:05:57 +0000 | [diff] [blame] | 291 | int plat_get_nv_ctr(void *cookie, unsigned int *nv_ctr); |
| 292 | int plat_set_nv_ctr(void *cookie, unsigned int nv_ctr); |
dp-arm | b3e8580 | 2016-12-12 14:48:13 +0000 | [diff] [blame] | 293 | int plat_set_nv_ctr2(void *cookie, const struct auth_img_desc_s *img_desc, |
| 294 | unsigned int nv_ctr); |
Juan Castillo | 5e29c75 | 2015-01-07 10:39:25 +0000 | [diff] [blame] | 295 | |
Yatharth Kochar | 3345a8d | 2016-09-12 16:08:41 +0100 | [diff] [blame] | 296 | #if LOAD_IMAGE_V2 |
| 297 | /******************************************************************************* |
| 298 | * Mandatory BL image load functions(may be overridden). |
| 299 | ******************************************************************************/ |
| 300 | /* |
| 301 | * This function returns pointer to the list of images that the |
| 302 | * platform has populated to load. |
| 303 | */ |
| 304 | struct bl_load_info *plat_get_bl_image_load_info(void); |
| 305 | |
| 306 | /* |
| 307 | * This function returns a pointer to the shared memory that the |
| 308 | * platform has kept aside to pass trusted firmware related |
| 309 | * information that next BL image could need. |
| 310 | */ |
| 311 | struct bl_params *plat_get_next_bl_params(void); |
| 312 | |
| 313 | /* |
| 314 | * This function flushes to main memory all the params that are |
| 315 | * passed to next image. |
| 316 | */ |
| 317 | void plat_flush_next_bl_params(void); |
| 318 | |
| 319 | #endif /* LOAD_IMAGE_V2 */ |
| 320 | |
Soby Mathew | 981487a | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 321 | #if ENABLE_PLAT_COMPAT |
| 322 | /* |
| 323 | * The below declarations are to enable compatibility for the platform ports |
| 324 | * using the old platform interface. |
| 325 | */ |
| 326 | |
| 327 | /******************************************************************************* |
| 328 | * Optional common functions (may be overridden) |
| 329 | ******************************************************************************/ |
| 330 | unsigned int platform_get_core_pos(unsigned long mpidr); |
| 331 | |
| 332 | /******************************************************************************* |
Juan Castillo | 7d19941 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 333 | * Mandatory PSCI Compatibility functions (BL31) |
Soby Mathew | 981487a | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 334 | ******************************************************************************/ |
| 335 | int platform_setup_pm(const plat_pm_ops_t **); |
| 336 | |
| 337 | unsigned int plat_get_aff_count(unsigned int, unsigned long); |
| 338 | unsigned int plat_get_aff_state(unsigned int, unsigned long); |
Douglas Raillard | 306593d | 2017-02-24 18:14:15 +0000 | [diff] [blame] | 339 | #else /* __ENABLE_PLAT_COMPAT__ */ |
Soby Mathew | 70716d6 | 2015-07-13 16:26:11 +0100 | [diff] [blame] | 340 | /* |
| 341 | * The below function enable Trusted Firmware components like SPDs which |
| 342 | * haven't migrated to the new platform API to compile on platforms which |
| 343 | * have the compatibility layer disabled. |
| 344 | */ |
Soren Brinkmann | a581bd5 | 2016-01-14 10:02:33 -0800 | [diff] [blame] | 345 | unsigned int platform_get_core_pos(unsigned long mpidr) __deprecated; |
Soby Mathew | 981487a | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 346 | |
Soby Mathew | 70716d6 | 2015-07-13 16:26:11 +0100 | [diff] [blame] | 347 | #endif /* __ENABLE_PLAT_COMPAT__ */ |
Douglas Raillard | 306593d | 2017-02-24 18:14:15 +0000 | [diff] [blame] | 348 | |
Dan Handley | ed6ff95 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 349 | #endif /* __PLATFORM_H__ */ |
Douglas Raillard | 306593d | 2017-02-24 18:14:15 +0000 | [diff] [blame] | 350 | |