blob: 8c6ee98df923f4541fb8932583bfb720828f4aba [file] [log] [blame]
Dan Handleyed6ff952014-05-14 17:44:19 +01001/*
Tushar Khandelwal01365af2024-04-22 15:35:40 +01002 * Copyright (c) 2013-2025, Arm Limited and Contributors. All rights reserved.
Dan Handleyed6ff952014-05-14 17:44:19 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handleyed6ff952014-05-14 17:44:19 +01005 */
6
Antonio Nino Diazfec756f2018-07-18 16:24:16 +01007#ifndef PLATFORM_H
8#define PLATFORM_H
Dan Handleyed6ff952014-05-14 17:44:19 +01009
10#include <stdint.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010011
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000012#include <lib/psci/psci.h>
Achin Guptada6ef0e2019-10-11 14:54:48 +010013#if defined(SPD_spmd)
AlexeiFedorov8e754f92022-12-14 17:28:11 +000014#include <services/spm_core_manifest.h>
Achin Guptada6ef0e2019-10-11 14:54:48 +010015#endif
Javier Almansa Sobrino4165e842022-04-25 17:18:15 +010016#if ENABLE_RME
17#include <services/rmm_core_manifest.h>
Raghu Krishnamurthyc11b60e2024-06-03 19:02:29 -070018#include <services/rmm_el3_token_sign.h>
Javier Almansa Sobrino4165e842022-04-25 17:18:15 +010019#endif
Jayanth Dodderi Chidanand7c7faff2022-10-11 17:16:07 +010020#include <drivers/fwu/fwu_metadata.h>
Jimmy Brisson26c5b5c2020-06-22 14:18:42 -050021#if TRNG_SUPPORT
22#include "plat_trng.h"
Jayanth Dodderi Chidanand7c7faff2022-10-11 17:16:07 +010023#endif /* TRNG_SUPPORT */
Lucian Paul-Trifu5ee4f4e2022-06-22 18:45:30 +010024#if DRTM_SUPPORT
25#include "plat_drtm.h"
26#endif /* DRTM_SUPPORT */
Manish V Badarkhef8481d42025-05-30 13:21:21 +010027#if LFA_SUPPORT
28#include "plat_lfa.h"
29#endif /* LFA_SUPPORT */
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000030
Dan Handleyed6ff952014-05-14 17:44:19 +010031/*******************************************************************************
32 * Forward declarations
33 ******************************************************************************/
dp-armb3e85802016-12-12 14:48:13 +000034struct auth_img_desc_s;
Dan Handleyed6ff952014-05-14 17:44:19 +010035struct meminfo;
36struct image_info;
37struct entry_point_info;
Yatharth Kochara65be2f2015-10-09 18:06:13 +010038struct image_desc;
Yatharth Kochar3345a8d2016-09-12 16:08:41 +010039struct bl_load_info;
40struct bl_params;
Antonio Nino Diazc41f2062017-10-24 10:07:35 +010041struct mmap_region;
Paul Beesley45f40282019-10-15 10:57:42 +000042struct spm_mm_boot_info;
Antonio Nino Diazb86edcb2018-10-30 11:12:42 +000043struct sp_res_desc;
AlexeiFedorov8e754f92022-12-14 17:28:11 +000044struct rmm_manifest;
Sumit Garg617e2152019-11-15 15:34:55 +053045enum fw_enc_status_t;
Dan Handleyed6ff952014-05-14 17:44:19 +010046
47/*******************************************************************************
Yann Gautier4a7f3022024-04-10 12:03:33 +020048 * Structure populated by platform specific code to export routines which
49 * perform load images functions, and associated pointer to platform ops
50 ******************************************************************************/
51struct plat_try_images_ops {
52 int (*next_instance)(unsigned int image_id);
53};
54
55extern const struct plat_try_images_ops *plat_try_img_ops;
56
57/*******************************************************************************
Juan Castillo31a68f02015-04-14 12:49:03 +010058 * plat_get_rotpk_info() flags
59 ******************************************************************************/
60#define ROTPK_IS_HASH (1 << 0)
Manish V Badarkhee984bc72023-03-10 19:00:02 +000061
Soby Mathew2f7ed052016-05-24 15:05:15 +010062/* Flag used to skip verification of the certificate ROTPK while the platform
63 ROTPK is not deployed */
64#define ROTPK_NOT_DEPLOYED (1 << 1)
Juan Castillo31a68f02015-04-14 12:49:03 +010065
Manish V Badarkhee984bc72023-03-10 19:00:02 +000066static inline bool is_rotpk_flags_valid(unsigned int flags)
67{
68 unsigned int valid_flags = ROTPK_IS_HASH;
69 return (flags == ROTPK_NOT_DEPLOYED) || ((flags & ~valid_flags) == 0);
70}
71
Juan Castillo31a68f02015-04-14 12:49:03 +010072/*******************************************************************************
Sumit Garg392e4df2019-11-15 10:43:00 +053073 * plat_get_enc_key_info() flags
74 ******************************************************************************/
75/*
76 * Flag used to notify caller that information provided in key buffer is an
77 * identifier rather than an actual key.
78 */
79#define ENC_KEY_IS_IDENTIFIER (1 << 0)
80
81/*******************************************************************************
Dan Handley7ce42df2014-05-15 14:11:36 +010082 * Function declarations
Dan Handleyed6ff952014-05-14 17:44:19 +010083 ******************************************************************************/
Dan Handley7ce42df2014-05-15 14:11:36 +010084/*******************************************************************************
85 * Mandatory common functions
86 ******************************************************************************/
Antonio Nino Diaz391a76e2016-05-18 16:53:31 +010087unsigned int plat_get_syscnt_freq2(void);
88
Juan Castillo3a66aca2015-04-13 17:36:19 +010089int plat_get_image_source(unsigned int image_id,
Dan Handley7ce42df2014-05-15 14:11:36 +010090 uintptr_t *dev_handle,
91 uintptr_t *image_spec);
Soby Mathew21f93612016-03-23 10:11:10 +000092uintptr_t plat_get_ns_image_entrypoint(void);
Soby Mathew981487a2015-07-13 14:10:57 +010093unsigned int plat_my_core_pos(void);
94int plat_core_pos_by_mpidr(u_register_t mpidr);
Ambroise Vincentd207f562019-04-10 12:50:27 +010095int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size);
Dan Handley7ce42df2014-05-15 14:11:36 +010096
Manish Pandey0b1714f2023-10-27 11:45:44 +010097/*******************************************************************************
98 * Simple routine to determine whether a mpidr is valid or not.
99 ******************************************************************************/
100static inline bool is_valid_mpidr(u_register_t mpidr)
101{
102 int pos = plat_core_pos_by_mpidr(mpidr);
103
104 if ((pos < 0) || ((unsigned int)pos >= PLATFORM_CORE_COUNT)) {
105 return false;
106 }
107
108 return true;
109}
110
Douglas Raillard306593d2017-02-24 18:14:15 +0000111#if STACK_PROTECTOR_ENABLED
112/*
113 * Return a new value to be used for the stack protection's canary.
114 *
115 * Ideally, this value is a random number that is impossible to predict by an
116 * attacker.
117 */
118u_register_t plat_get_stack_protector_canary(void);
119#endif /* STACK_PROTECTOR_ENABLED */
120
Dan Handley7ce42df2014-05-15 14:11:36 +0100121/*******************************************************************************
122 * Mandatory interrupt management functions
123 ******************************************************************************/
Dan Handley701fea72014-05-27 16:17:21 +0100124uint32_t plat_ic_get_pending_interrupt_id(void);
125uint32_t plat_ic_get_pending_interrupt_type(void);
126uint32_t plat_ic_acknowledge_interrupt(void);
127uint32_t plat_ic_get_interrupt_type(uint32_t id);
128void plat_ic_end_of_interrupt(uint32_t id);
Dan Handleyed6ff952014-05-14 17:44:19 +0100129uint32_t plat_interrupt_type_to_line(uint32_t type,
130 uint32_t security_state);
131
Dan Handley7ce42df2014-05-15 14:11:36 +0100132/*******************************************************************************
Jeenu Viswambharanb1e957e2017-09-22 08:32:09 +0100133 * Optional interrupt management functions, depending on chosen EL3 components.
134 ******************************************************************************/
135unsigned int plat_ic_get_running_priority(void);
Jeenu Viswambharan522a4652017-09-22 08:32:09 +0100136int plat_ic_is_spi(unsigned int id);
137int plat_ic_is_ppi(unsigned int id);
138int plat_ic_is_sgi(unsigned int id);
Jeenu Viswambharan24e70292017-09-22 08:32:09 +0100139unsigned int plat_ic_get_interrupt_active(unsigned int id);
Jeenu Viswambharan0fcdfff2017-09-22 08:32:09 +0100140void plat_ic_disable_interrupt(unsigned int id);
141void plat_ic_enable_interrupt(unsigned int id);
Madhukar Pappireddy67ac77c2023-09-06 16:50:22 -0500142bool plat_ic_has_interrupt_type(unsigned int type);
Jeenu Viswambharanc06f05c2017-09-22 08:32:09 +0100143void plat_ic_set_interrupt_type(unsigned int id, unsigned int type);
Jeenu Viswambharan447b89d2017-09-22 08:32:09 +0100144void plat_ic_set_interrupt_priority(unsigned int id, unsigned int priority);
Jeenu Viswambharanab14e9b2017-09-22 08:32:09 +0100145void plat_ic_raise_el3_sgi(int sgi_num, u_register_t target);
Florian Lugoud4e25032021-09-08 12:40:24 +0200146void plat_ic_raise_ns_sgi(int sgi_num, u_register_t target);
147void plat_ic_raise_s_el1_sgi(int sgi_num, u_register_t target);
Jeenu Viswambharandce70b32017-09-22 08:32:09 +0100148void plat_ic_set_spi_routing(unsigned int id, unsigned int routing_mode,
149 u_register_t mpidr);
Jeenu Viswambharaneb1c12c2017-09-22 08:32:09 +0100150void plat_ic_set_interrupt_pending(unsigned int id);
151void plat_ic_clear_interrupt_pending(unsigned int id);
Jeenu Viswambharan62505072017-09-22 08:32:09 +0100152unsigned int plat_ic_set_priority_mask(unsigned int mask);
Arvind Ram Prakash579a23c2024-02-05 16:19:37 -0600153unsigned int plat_ic_deactivate_priority(unsigned int mask);
Jeenu Viswambharan055af4b2017-10-24 15:13:59 +0100154unsigned int plat_ic_get_interrupt_id(unsigned int raw);
Jeenu Viswambharanb1e957e2017-09-22 08:32:09 +0100155
156/*******************************************************************************
Dan Handley7ce42df2014-05-15 14:11:36 +0100157 * Optional common functions (may be overridden)
158 ******************************************************************************/
Soby Mathewa0fedc42016-06-16 14:52:04 +0100159uintptr_t plat_get_my_stack(void);
Yatharth Kocharf528faf2016-06-28 16:58:26 +0100160void plat_report_exception(unsigned int exception_type);
Yann Gautierc1425872019-02-15 16:42:20 +0100161void plat_report_prefetch_abort(unsigned int fault_address);
162void plat_report_data_abort(unsigned int fault_address);
Sandrine Bailleux046cd3f2014-08-06 11:27:23 +0100163int plat_crash_console_init(void);
Soby Mathew066f7132014-07-14 16:57:23 +0100164int plat_crash_console_putc(int c);
Jimmy Brisson39f9eee2020-08-05 13:44:05 -0500165void plat_crash_console_flush(void);
Juan Castillo26ae5832015-09-25 15:41:14 +0100166void plat_error_handler(int err) __dead2;
Antonio Nino Diaz1f21bcf2016-02-01 13:57:25 +0000167void plat_panic_handler(void) __dead2;
Manish V Badarkhefcfe4312022-07-12 21:48:04 +0100168void plat_system_reset(void) __dead2;
Soby Mathewaaf15f52017-09-04 11:49:29 +0100169const char *plat_log_get_prefix(unsigned int log_level);
Roberto Vargasbc1ae1f2017-09-26 12:53:01 +0100170void bl2_plat_preload_setup(void);
Yann Gautier4a7f3022024-04-10 12:03:33 +0200171void plat_setup_try_img_ops(const struct plat_try_images_ops *plat_try_ops);
Dan Handley7ce42df2014-05-15 14:11:36 +0100172
Manish V Badarkhea74d9632021-09-14 23:12:42 +0100173#if MEASURED_BOOT
174int plat_mboot_measure_image(unsigned int image_id, image_info_t *image_data);
Manish V Badarkhe1ffa0092021-10-20 22:06:40 +0100175int plat_mboot_measure_critical_data(unsigned int critical_data_id,
176 const void *base,
177 size_t size);
Manish V Badarkheb2a21602023-04-11 16:12:33 +0100178int plat_mboot_measure_key(const void *pk_oid, const void *pk_ptr,
179 size_t pk_len);
Manish V Badarkhea74d9632021-09-14 23:12:42 +0100180#else
181static inline int plat_mboot_measure_image(unsigned int image_id __unused,
182 image_info_t *image_data __unused)
183{
184 return 0;
185}
Manish V Badarkhe1ffa0092021-10-20 22:06:40 +0100186static inline int plat_mboot_measure_critical_data(
187 unsigned int critical_data_id __unused,
188 const void *base __unused,
189 size_t size __unused)
190{
191 return 0;
192}
Manish V Badarkheb2a21602023-04-11 16:12:33 +0100193static inline int plat_mboot_measure_key(const void *pk_oid __unused,
194 const void *pk_ptr __unused,
195 size_t pk_len __unused)
196{
197 return 0;
198}
Manish V Badarkhea74d9632021-09-14 23:12:42 +0100199#endif /* MEASURED_BOOT */
200
Yann Gautier5ae29c02024-01-16 19:39:31 +0100201#if EARLY_CONSOLE
202void plat_setup_early_console(void);
203#else
204static inline void plat_setup_early_console(void)
205{
206}
207#endif /* EARLY_CONSOLE */
208
Dan Handley7ce42df2014-05-15 14:11:36 +0100209/*******************************************************************************
210 * Mandatory BL1 functions
211 ******************************************************************************/
Dan Handley4fd2f5c2014-08-04 11:41:20 +0100212void bl1_early_platform_setup(void);
Dan Handley7ce42df2014-05-15 14:11:36 +0100213void bl1_plat_arch_setup(void);
214void bl1_platform_setup(void);
215struct meminfo *bl1_plat_sec_mem_layout(void);
Dan Handleyed6ff952014-05-14 17:44:19 +0100216
Jeenu Viswambharan04e3a7f2017-10-16 08:43:14 +0100217/*******************************************************************************
218 * Optional EL3 component functions in BL31
219 ******************************************************************************/
220
221/* SDEI platform functions */
222#if SDEI_SUPPORT
Balint Dobszayd0dbd5e2019-12-18 15:28:00 +0100223void plat_sdei_setup(void);
Jeenu Viswambharan04e3a7f2017-10-16 08:43:14 +0100224int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode);
225void plat_sdei_handle_masked_trigger(uint64_t mpidr, unsigned int intr);
226#endif
227
Pali Rohárc36e97f2021-06-21 17:22:27 +0200228void plat_default_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie,
229 void *handle, uint64_t flags);
Jeenu Viswambharan96c7df02017-11-30 12:54:15 +0000230void plat_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie,
231 void *handle, uint64_t flags);
232
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100233/*
234 * The following function is mandatory when the
235 * firmware update feature is used.
236 */
237int bl1_plat_mem_check(uintptr_t mem_base, unsigned int mem_size,
238 unsigned int flags);
239
Dan Handley7ce42df2014-05-15 14:11:36 +0100240/*******************************************************************************
241 * Optional BL1 functions (may be overridden)
242 ******************************************************************************/
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100243/*
244 * The following functions are used for image loading process in BL1.
245 */
246void bl1_plat_set_ep_info(unsigned int image_id,
247 struct entry_point_info *ep_info);
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100248/*
249 * The following functions are mandatory when firmware update
250 * feature is used and optional otherwise.
251 */
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100252unsigned int bl1_plat_get_next_image_id(void);
253struct image_desc *bl1_plat_get_image_desc(unsigned int image_id);
Dan Handley7ce42df2014-05-15 14:11:36 +0100254
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100255/*
256 * The following functions are used by firmware update
257 * feature and may optionally be overridden.
258 */
Dan Handley89f8f332015-12-15 14:28:24 +0000259__dead2 void bl1_plat_fwu_done(void *client_cookie, void *reserved);
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100260
Masahiro Yamada43d20b32018-02-01 16:46:18 +0900261/*
Soby Mathew2f38ce32018-02-08 17:45:12 +0000262 * This BL1 function can be used by the platforms to update/use image
263 * information for a given `image_id`.
Masahiro Yamada43d20b32018-02-01 16:46:18 +0900264 */
Soby Mathew2f38ce32018-02-08 17:45:12 +0000265int bl1_plat_handle_pre_image_load(unsigned int image_id);
266int bl1_plat_handle_post_image_load(unsigned int image_id);
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100267
Harrison Mutaifaf3ac32024-01-04 16:18:47 +0000268/* Utility functions */
269void bl1_plat_calc_bl2_layout(const meminfo_t *bl1_mem_layout,
270 meminfo_t *bl2_mem_layout);
271
272#if MEASURED_BOOT
Manish V Badarkhea74d9632021-09-14 23:12:42 +0100273void bl1_plat_mboot_init(void);
274void bl1_plat_mboot_finish(void);
275#else
276static inline void bl1_plat_mboot_init(void)
277{
278}
279static inline void bl1_plat_mboot_finish(void)
280{
281}
Tamas Bana4260892023-06-07 13:35:04 +0200282#endif /* MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENT */
Manish V Badarkhea74d9632021-09-14 23:12:42 +0100283
Dan Handley7ce42df2014-05-15 14:11:36 +0100284/*******************************************************************************
285 * Mandatory BL2 functions
286 ******************************************************************************/
Soby Mathew73308d02018-01-09 14:36:14 +0000287void bl2_early_platform_setup2(u_register_t arg0, u_register_t arg1, u_register_t arg2, u_register_t arg3);
Dan Handley7ce42df2014-05-15 14:11:36 +0100288void bl2_plat_arch_setup(void);
289void bl2_platform_setup(void);
290struct meminfo *bl2_plat_sec_mem_layout(void);
291
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100292/*
293 * This function can be used by the platforms to update/use image
294 * information for given `image_id`.
295 */
Masahiro Yamada02a0d3d2018-02-01 16:45:51 +0900296int bl2_plat_handle_pre_image_load(unsigned int image_id);
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100297int bl2_plat_handle_post_image_load(unsigned int image_id);
298
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100299/*******************************************************************************
Dan Handley7ce42df2014-05-15 14:11:36 +0100300 * Optional BL2 functions (may be overridden)
301 ******************************************************************************/
Tamas Bana4260892023-06-07 13:35:04 +0200302#if (MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENT)
Manish V Badarkhe5797b802021-08-06 09:26:20 +0100303void bl2_plat_mboot_init(void);
304void bl2_plat_mboot_finish(void);
Raymond Maoab98f152024-11-14 13:28:36 -0800305#if TRANSFER_LIST
306int plat_handoff_mboot(const void *data, uint32_t data_size, void *tl_base);
307#else
308static inline int
309plat_handoff_mboot(__unused const void *data, __unused uint32_t data_size,
310 __unused void *tl_base)
311{
312 return -1;
313}
314#endif
Manish V Badarkhe5797b802021-08-06 09:26:20 +0100315#else
316static inline void bl2_plat_mboot_init(void)
317{
318}
319static inline void bl2_plat_mboot_finish(void)
320{
Manish V Badarkhe57b669f2021-09-20 09:06:02 +0100321}
Tamas Bana4260892023-06-07 13:35:04 +0200322#endif /* MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENTs */
Roberto Vargase0e99462017-10-30 14:43:43 +0000323
324/*******************************************************************************
Arvind Ram Prakash11b9b492022-11-22 14:41:00 -0600325 * Mandatory BL2 at EL3 functions: Must be implemented
326 * if RESET_TO_BL2 image is supported
Roberto Vargase0e99462017-10-30 14:43:43 +0000327 ******************************************************************************/
328void bl2_el3_early_platform_setup(u_register_t arg0, u_register_t arg1,
329 u_register_t arg2, u_register_t arg3);
330void bl2_el3_plat_arch_setup(void);
331
Roberto Vargase0e99462017-10-30 14:43:43 +0000332/*******************************************************************************
333 * Optional BL2 at EL3 functions (may be overridden)
334 ******************************************************************************/
335void bl2_el3_plat_prepare_exit(void);
336
Dan Handley7ce42df2014-05-15 14:11:36 +0100337/*******************************************************************************
Yatharth Kocharb1c2fe02015-10-14 15:27:24 +0100338 * Mandatory BL2U functions.
339 ******************************************************************************/
340void bl2u_early_platform_setup(struct meminfo *mem_layout,
341 void *plat_info);
342void bl2u_plat_arch_setup(void);
343void bl2u_platform_setup(void);
344
345/*******************************************************************************
346 * Conditionally mandatory BL2U functions for CSS platforms.
347 ******************************************************************************/
348/*
349 * This function is used to perform any platform-specific actions required to
350 * handle the BL2U_SCP firmware.
351 */
352int bl2u_plat_handle_scp_bl2u(void);
353
354/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000355 * Mandatory BL31 functions
Dan Handley7ce42df2014-05-15 14:11:36 +0100356 ******************************************************************************/
Soby Mathew73308d02018-01-09 14:36:14 +0000357void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
358 u_register_t arg2, u_register_t arg3);
Dan Handley7ce42df2014-05-15 14:11:36 +0100359void bl31_plat_arch_setup(void);
360void bl31_platform_setup(void);
Soby Mathew1ff495b2015-12-09 11:28:43 +0000361void bl31_plat_runtime_setup(void);
Dan Handley701fea72014-05-27 16:17:21 +0100362struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type);
Dan Handley7ce42df2014-05-15 14:11:36 +0100363
364/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000365 * Mandatory PSCI functions (BL31)
Dan Handley7ce42df2014-05-15 14:11:36 +0100366 ******************************************************************************/
Soby Mathew981487a2015-07-13 14:10:57 +0100367int plat_setup_psci_ops(uintptr_t sec_entrypoint,
Roberto Vargas777dd432018-02-12 12:36:17 +0000368 const struct plat_psci_ops **psci_ops);
Soby Mathew981487a2015-07-13 14:10:57 +0100369const unsigned char *plat_get_power_domain_tree_desc(void);
370
371/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000372 * Optional PSCI functions (BL31).
Soby Mathew981487a2015-07-13 14:10:57 +0100373 ******************************************************************************/
dp-arm66abfbe2017-01-31 13:01:04 +0000374void plat_psci_stat_accounting_start(const psci_power_state_t *state_info);
375void plat_psci_stat_accounting_stop(const psci_power_state_t *state_info);
376u_register_t plat_psci_stat_get_residency(unsigned int lvl,
377 const psci_power_state_t *state_info,
Deepika Bhavnani4287c0c2019-12-13 10:23:18 -0600378 unsigned int last_cpu_idx);
Soby Mathew981487a2015-07-13 14:10:57 +0100379plat_local_state_t plat_get_target_pwr_state(unsigned int lvl,
380 const plat_local_state_t *states,
381 unsigned int ncpu);
Dan Handley7ce42df2014-05-15 14:11:36 +0100382
383/*******************************************************************************
Soby Mathew294e1cf2022-03-22 16:19:39 +0000384 * Mandatory BL31 functions when ENABLE_RME=1
385 ******************************************************************************/
Javier Almansa Sobrino4165e842022-04-25 17:18:15 +0100386#if ENABLE_RME
Juan Pablo Conde9b94a422024-07-10 14:33:42 -0500387
Javier Almansa Sobrino7176a772021-11-24 18:37:37 +0000388int plat_rmmd_get_cca_attest_token(uintptr_t buf, size_t *len,
Juan Pablo Conde9b94a422024-07-10 14:33:42 -0500389 uintptr_t hash, size_t hash_size,
390 uint64_t *remaining_len);
Javier Almansa Sobrino7176a772021-11-24 18:37:37 +0000391int plat_rmmd_get_cca_realm_attest_key(uintptr_t buf, size_t *len,
392 unsigned int type);
Raghu Krishnamurthyc11b60e2024-06-03 19:02:29 -0700393/* The following 3 functions are to be implement if
394 * RMMD_ENABLE_EL3_TOKEN_SIGN=1.
395 * The following three functions are expected to return E_RMM_* error codes.
396 */
397int plat_rmmd_el3_token_sign_get_rak_pub(uintptr_t buf, size_t *len,
398 unsigned int type);
399int plat_rmmd_el3_token_sign_push_req(
400 const struct el3_token_sign_request *req);
401int plat_rmmd_el3_token_sign_pull_resp(struct el3_token_sign_response *resp);
Javier Almansa Sobrino7176a772021-11-24 18:37:37 +0000402size_t plat_rmmd_get_el3_rmm_shared_mem(uintptr_t *shared);
AlexeiFedorov8e754f92022-12-14 17:28:11 +0000403int plat_rmmd_load_manifest(struct rmm_manifest *manifest);
Tushar Khandelwal01365af2024-04-22 15:35:40 +0100404int plat_rmmd_mecid_key_update(uint16_t mecid);
Sona Mathew9b746472025-03-14 01:27:11 -0500405
406/* The following 4 functions are to be implemented if
407 * RMMD_ENABLE_IDE_KEY_PROG=1.
408 * The following functions are expected to return E_RMM_* error codes.
409 */
410int plat_rmmd_el3_ide_key_program(uint64_t ecam_address, uint64_t root_port_id,
411 uint64_t ide_stream_info,
412 rp_ide_key_info_t *ide_key_info_ptr,
413 uint64_t request_id, uint64_t cookie);
414int plat_rmmd_el3_ide_key_set_go(uint64_t ecam_address, uint64_t root_port_id,
415 uint64_t ide_stream_info, uint64_t request_id,
416 uint64_t cookie);
417int plat_rmmd_el3_ide_key_set_stop(uint64_t ecam_address, uint64_t root_port_id,
418 uint64_t ide_stream_info, uint64_t request_id,
419 uint64_t cookie);
420int plat_rmmd_el3_ide_km_pull_response(uint64_t ecam_address, uint64_t root_port_id,
421 uint64_t *req_resp, uint64_t *request_id,
422 uint64_t *cookie);
Juan Pablo Conde72ae4822025-03-24 16:18:48 -0500423#endif /* ENABLE_RME */
Javier Almansa Sobrino4165e842022-04-25 17:18:15 +0100424
Soby Mathew294e1cf2022-03-22 16:19:39 +0000425/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000426 * Optional BL31 functions (may be overridden)
Dan Handleyb226a4d2014-05-16 14:08:45 +0100427 ******************************************************************************/
Achin Guptae9982542014-06-26 08:59:07 +0100428void bl31_plat_enable_mmu(uint32_t flags);
Dan Handleyb226a4d2014-05-16 14:08:45 +0100429
430/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000431 * Optional BL32 functions (may be overridden)
Dan Handleyb226a4d2014-05-16 14:08:45 +0100432 ******************************************************************************/
Achin Guptae9982542014-06-26 08:59:07 +0100433void bl32_plat_enable_mmu(uint32_t flags);
Dan Handleyb226a4d2014-05-16 14:08:45 +0100434
Juan Castillo5e29c752015-01-07 10:39:25 +0000435/*******************************************************************************
Juan Castillo31a68f02015-04-14 12:49:03 +0100436 * Trusted Board Boot functions
Juan Castillo5e29c752015-01-07 10:39:25 +0000437 ******************************************************************************/
Juan Castillo31a68f02015-04-14 12:49:03 +0100438int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len,
439 unsigned int *flags);
Juan Castillobfb7fa62016-01-22 11:05:57 +0000440int plat_get_nv_ctr(void *cookie, unsigned int *nv_ctr);
441int plat_set_nv_ctr(void *cookie, unsigned int nv_ctr);
dp-armb3e85802016-12-12 14:48:13 +0000442int plat_set_nv_ctr2(void *cookie, const struct auth_img_desc_s *img_desc,
443 unsigned int nv_ctr);
Ambroise Vincentd207f562019-04-10 12:50:27 +0100444int get_mbedtls_heap_helper(void **heap_addr, size_t *heap_size);
Sumit Garg617e2152019-11-15 15:34:55 +0530445int plat_get_enc_key_info(enum fw_enc_status_t fw_enc_status, uint8_t *key,
446 size_t *key_len, unsigned int *flags,
447 const uint8_t *img_id, size_t img_id_len);
Juan Castillo5e29c752015-01-07 10:39:25 +0000448
Antonio Nino Diazc41f2062017-10-24 10:07:35 +0100449/*******************************************************************************
450 * Secure Partitions functions
451 ******************************************************************************/
452const struct mmap_region *plat_get_secure_partition_mmap(void *cookie);
Paul Beesley45f40282019-10-15 10:57:42 +0000453const struct spm_mm_boot_info *plat_get_secure_partition_boot_info(
Antonio Nino Diazc41f2062017-10-24 10:07:35 +0100454 void *cookie);
Antonio Nino Diazb86edcb2018-10-30 11:12:42 +0000455int plat_spm_sp_rd_load(struct sp_res_desc *rd, const void *ptr, size_t size);
Antonio Nino Diaz840627f2018-11-27 08:36:02 +0000456int plat_spm_sp_get_next_address(void **sp_base, size_t *sp_size,
457 void **rd_base, size_t *rd_size);
Achin Guptada6ef0e2019-10-11 14:54:48 +0100458#if defined(SPD_spmd)
Olivier Deprez2bae35f2020-04-16 13:39:06 +0200459int plat_spm_core_manifest_load(spmc_manifest_attribute_t *manifest,
Olivier Deprez69ca84a2020-02-07 15:44:43 +0100460 const void *pm_addr);
Achin Guptada6ef0e2019-10-11 14:54:48 +0100461#endif
Marc Bonnicic66fc1b2021-12-16 18:31:02 +0000462#if defined(SPMC_AT_EL3)
463int plat_spmc_shmem_datastore_get(uint8_t **datastore, size_t *size);
464#endif
465
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100466/*******************************************************************************
467 * Mandatory BL image load functions(may be overridden).
468 ******************************************************************************/
469/*
470 * This function returns pointer to the list of images that the
471 * platform has populated to load.
472 */
473struct bl_load_info *plat_get_bl_image_load_info(void);
474
475/*
476 * This function returns a pointer to the shared memory that the
477 * platform has kept aside to pass trusted firmware related
478 * information that next BL image could need.
479 */
480struct bl_params *plat_get_next_bl_params(void);
481
482/*
483 * This function flushes to main memory all the params that are
484 * passed to next image.
485 */
486void plat_flush_next_bl_params(void);
487
Soby Mathew70716d62015-07-13 16:26:11 +0100488/*
Manish V Badarkhef809c6e2020-02-22 08:43:00 +0000489 * Optional function to get SOC version
490 */
491int32_t plat_get_soc_version(void);
492
493/*
494 * Optional function to get SOC revision
495 */
496int32_t plat_get_soc_revision(void);
497
Manish V Badarkhe80f13ee2020-07-23 20:23:01 +0100498/*
499 * Optional function to check for SMCCC function availability for platform
500 */
501int32_t plat_is_smccc_feature_available(u_register_t fid);
502
Manish V Badarkhea040b642021-06-20 21:04:49 +0100503/*******************************************************************************
504 * FWU platform specific functions
505 ******************************************************************************/
506int plat_fwu_set_metadata_image_source(unsigned int image_id,
507 uintptr_t *dev_handle,
508 uintptr_t *image_spec);
Sughosh Ganuf40154f2021-11-17 17:08:10 +0530509void plat_fwu_set_images_source(const struct fwu_metadata *metadata);
Sughosh Ganu4e336a62021-12-01 15:53:32 +0530510uint32_t plat_fwu_get_boot_idx(void);
Manish V Badarkhea040b642021-06-20 21:04:49 +0100511
Channagoud kadabia037d972022-11-29 16:03:47 -0800512/*
513 * Optional function to indicate if cache management operations can be
514 * performed.
515 */
516#if CONDITIONAL_CMO
517uint64_t plat_can_cmo(void);
518#else
519static inline uint64_t plat_can_cmo(void)
520{
521 return 1;
522}
523#endif /* CONDITIONAL_CMO */
524
Antonio Nino Diazfec756f2018-07-18 16:24:16 +0100525#endif /* PLATFORM_H */