blob: 04272b1b58f5627cd27d8cf5479dec49911a2cd5 [file] [log] [blame]
Dan Handleyed6ff952014-05-14 17:44:19 +01001/*
Masahiro Yamada02a0d3d2018-02-01 16:45:51 +09002 * Copyright (c) 2013-2018, ARM Limited and Contributors. All rights reserved.
Dan Handleyed6ff952014-05-14 17:44:19 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handleyed6ff952014-05-14 17:44:19 +01005 */
6
Antonio Nino Diazfec756f2018-07-18 16:24:16 +01007#ifndef PLATFORM_H
8#define PLATFORM_H
Dan Handleyed6ff952014-05-14 17:44:19 +01009
Soby Mathew981487a2015-07-13 14:10:57 +010010#include <psci.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010011#include <stdint.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010012
13/*******************************************************************************
14 * Forward declarations
15 ******************************************************************************/
dp-armb3e85802016-12-12 14:48:13 +000016struct auth_img_desc_s;
Dan Handleyed6ff952014-05-14 17:44:19 +010017struct meminfo;
18struct image_info;
19struct entry_point_info;
Yatharth Kochara65be2f2015-10-09 18:06:13 +010020struct image_desc;
Yatharth Kochar3345a8d2016-09-12 16:08:41 +010021struct bl_load_info;
22struct bl_params;
Antonio Nino Diazc41f2062017-10-24 10:07:35 +010023struct mmap_region;
24struct secure_partition_boot_info;
Antonio Nino Diazb86edcb2018-10-30 11:12:42 +000025struct sp_res_desc;
Dan Handleyed6ff952014-05-14 17:44:19 +010026
27/*******************************************************************************
Juan Castillo31a68f02015-04-14 12:49:03 +010028 * plat_get_rotpk_info() flags
29 ******************************************************************************/
30#define ROTPK_IS_HASH (1 << 0)
Soby Mathew2f7ed052016-05-24 15:05:15 +010031/* Flag used to skip verification of the certificate ROTPK while the platform
32 ROTPK is not deployed */
33#define ROTPK_NOT_DEPLOYED (1 << 1)
Juan Castillo31a68f02015-04-14 12:49:03 +010034
35/*******************************************************************************
Dan Handley7ce42df2014-05-15 14:11:36 +010036 * Function declarations
Dan Handleyed6ff952014-05-14 17:44:19 +010037 ******************************************************************************/
Dan Handley7ce42df2014-05-15 14:11:36 +010038/*******************************************************************************
39 * Mandatory common functions
40 ******************************************************************************/
Antonio Nino Diaz391a76e2016-05-18 16:53:31 +010041unsigned int plat_get_syscnt_freq2(void);
42
Juan Castillo3a66aca2015-04-13 17:36:19 +010043int plat_get_image_source(unsigned int image_id,
Dan Handley7ce42df2014-05-15 14:11:36 +010044 uintptr_t *dev_handle,
45 uintptr_t *image_spec);
Soby Mathew21f93612016-03-23 10:11:10 +000046uintptr_t plat_get_ns_image_entrypoint(void);
Soby Mathew981487a2015-07-13 14:10:57 +010047unsigned int plat_my_core_pos(void);
48int plat_core_pos_by_mpidr(u_register_t mpidr);
Dan Handley7ce42df2014-05-15 14:11:36 +010049
Douglas Raillard306593d2017-02-24 18:14:15 +000050#if STACK_PROTECTOR_ENABLED
51/*
52 * Return a new value to be used for the stack protection's canary.
53 *
54 * Ideally, this value is a random number that is impossible to predict by an
55 * attacker.
56 */
57u_register_t plat_get_stack_protector_canary(void);
58#endif /* STACK_PROTECTOR_ENABLED */
59
Dan Handley7ce42df2014-05-15 14:11:36 +010060/*******************************************************************************
61 * Mandatory interrupt management functions
62 ******************************************************************************/
Dan Handley701fea72014-05-27 16:17:21 +010063uint32_t plat_ic_get_pending_interrupt_id(void);
64uint32_t plat_ic_get_pending_interrupt_type(void);
65uint32_t plat_ic_acknowledge_interrupt(void);
66uint32_t plat_ic_get_interrupt_type(uint32_t id);
67void plat_ic_end_of_interrupt(uint32_t id);
Dan Handleyed6ff952014-05-14 17:44:19 +010068uint32_t plat_interrupt_type_to_line(uint32_t type,
69 uint32_t security_state);
70
Dan Handley7ce42df2014-05-15 14:11:36 +010071/*******************************************************************************
Jeenu Viswambharanb1e957e2017-09-22 08:32:09 +010072 * Optional interrupt management functions, depending on chosen EL3 components.
73 ******************************************************************************/
74unsigned int plat_ic_get_running_priority(void);
Jeenu Viswambharan522a4652017-09-22 08:32:09 +010075int plat_ic_is_spi(unsigned int id);
76int plat_ic_is_ppi(unsigned int id);
77int plat_ic_is_sgi(unsigned int id);
Jeenu Viswambharan24e70292017-09-22 08:32:09 +010078unsigned int plat_ic_get_interrupt_active(unsigned int id);
Jeenu Viswambharan0fcdfff2017-09-22 08:32:09 +010079void plat_ic_disable_interrupt(unsigned int id);
80void plat_ic_enable_interrupt(unsigned int id);
Jeenu Viswambharanc06f05c2017-09-22 08:32:09 +010081int plat_ic_has_interrupt_type(unsigned int type);
82void plat_ic_set_interrupt_type(unsigned int id, unsigned int type);
Jeenu Viswambharan447b89d2017-09-22 08:32:09 +010083void plat_ic_set_interrupt_priority(unsigned int id, unsigned int priority);
Jeenu Viswambharanab14e9b2017-09-22 08:32:09 +010084void plat_ic_raise_el3_sgi(int sgi_num, u_register_t target);
Jeenu Viswambharandce70b32017-09-22 08:32:09 +010085void plat_ic_set_spi_routing(unsigned int id, unsigned int routing_mode,
86 u_register_t mpidr);
Jeenu Viswambharaneb1c12c2017-09-22 08:32:09 +010087void plat_ic_set_interrupt_pending(unsigned int id);
88void plat_ic_clear_interrupt_pending(unsigned int id);
Jeenu Viswambharan62505072017-09-22 08:32:09 +010089unsigned int plat_ic_set_priority_mask(unsigned int mask);
Jeenu Viswambharan055af4b2017-10-24 15:13:59 +010090unsigned int plat_ic_get_interrupt_id(unsigned int raw);
Jeenu Viswambharanb1e957e2017-09-22 08:32:09 +010091
92/*******************************************************************************
Dan Handley7ce42df2014-05-15 14:11:36 +010093 * Optional common functions (may be overridden)
94 ******************************************************************************/
Soby Mathewa0fedc42016-06-16 14:52:04 +010095uintptr_t plat_get_my_stack(void);
Yatharth Kocharf528faf2016-06-28 16:58:26 +010096void plat_report_exception(unsigned int exception_type);
Sandrine Bailleux046cd3f2014-08-06 11:27:23 +010097int plat_crash_console_init(void);
Soby Mathew066f7132014-07-14 16:57:23 +010098int plat_crash_console_putc(int c);
Antonio Nino Diazd3ec5432017-02-17 17:11:27 +000099int plat_crash_console_flush(void);
Juan Castillo26ae5832015-09-25 15:41:14 +0100100void plat_error_handler(int err) __dead2;
Antonio Nino Diaz1f21bcf2016-02-01 13:57:25 +0000101void plat_panic_handler(void) __dead2;
Soby Mathewaaf15f52017-09-04 11:49:29 +0100102const char *plat_log_get_prefix(unsigned int log_level);
Roberto Vargasbc1ae1f2017-09-26 12:53:01 +0100103void bl2_plat_preload_setup(void);
104int plat_try_next_boot_source(void);
John Tsichritzis30f89642018-06-07 16:31:34 +0100105int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size);
Dan Handley7ce42df2014-05-15 14:11:36 +0100106
107/*******************************************************************************
108 * Mandatory BL1 functions
109 ******************************************************************************/
Dan Handley4fd2f5c2014-08-04 11:41:20 +0100110void bl1_early_platform_setup(void);
Dan Handley7ce42df2014-05-15 14:11:36 +0100111void bl1_plat_arch_setup(void);
112void bl1_platform_setup(void);
113struct meminfo *bl1_plat_sec_mem_layout(void);
Dan Handleyed6ff952014-05-14 17:44:19 +0100114
Jeenu Viswambharan04e3a7f2017-10-16 08:43:14 +0100115/*******************************************************************************
116 * Optional EL3 component functions in BL31
117 ******************************************************************************/
118
119/* SDEI platform functions */
120#if SDEI_SUPPORT
121int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode);
122void plat_sdei_handle_masked_trigger(uint64_t mpidr, unsigned int intr);
123#endif
124
Jeenu Viswambharan96c7df02017-11-30 12:54:15 +0000125void plat_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie,
126 void *handle, uint64_t flags);
127
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100128/*
129 * The following function is mandatory when the
130 * firmware update feature is used.
131 */
132int bl1_plat_mem_check(uintptr_t mem_base, unsigned int mem_size,
133 unsigned int flags);
134
Dan Handley7ce42df2014-05-15 14:11:36 +0100135/*******************************************************************************
136 * Optional BL1 functions (may be overridden)
137 ******************************************************************************/
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100138/*
139 * The following functions are used for image loading process in BL1.
140 */
141void bl1_plat_set_ep_info(unsigned int image_id,
142 struct entry_point_info *ep_info);
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100143/*
144 * The following functions are mandatory when firmware update
145 * feature is used and optional otherwise.
146 */
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100147unsigned int bl1_plat_get_next_image_id(void);
148struct image_desc *bl1_plat_get_image_desc(unsigned int image_id);
Dan Handley7ce42df2014-05-15 14:11:36 +0100149
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100150/*
151 * The following functions are used by firmware update
152 * feature and may optionally be overridden.
153 */
Dan Handley89f8f332015-12-15 14:28:24 +0000154__dead2 void bl1_plat_fwu_done(void *client_cookie, void *reserved);
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100155
Masahiro Yamada43d20b32018-02-01 16:46:18 +0900156/*
Soby Mathew2f38ce32018-02-08 17:45:12 +0000157 * This BL1 function can be used by the platforms to update/use image
158 * information for a given `image_id`.
Masahiro Yamada43d20b32018-02-01 16:46:18 +0900159 */
Soby Mathew2f38ce32018-02-08 17:45:12 +0000160int bl1_plat_handle_pre_image_load(unsigned int image_id);
161int bl1_plat_handle_post_image_load(unsigned int image_id);
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100162
Dan Handley7ce42df2014-05-15 14:11:36 +0100163/*******************************************************************************
164 * Mandatory BL2 functions
165 ******************************************************************************/
Soby Mathew73308d02018-01-09 14:36:14 +0000166void bl2_early_platform_setup2(u_register_t arg0, u_register_t arg1, u_register_t arg2, u_register_t arg3);
Dan Handley7ce42df2014-05-15 14:11:36 +0100167void bl2_plat_arch_setup(void);
168void bl2_platform_setup(void);
169struct meminfo *bl2_plat_sec_mem_layout(void);
170
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100171/*
172 * This function can be used by the platforms to update/use image
173 * information for given `image_id`.
174 */
Masahiro Yamada02a0d3d2018-02-01 16:45:51 +0900175int bl2_plat_handle_pre_image_load(unsigned int image_id);
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100176int bl2_plat_handle_post_image_load(unsigned int image_id);
177
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100178
179/*******************************************************************************
Dan Handley7ce42df2014-05-15 14:11:36 +0100180 * Optional BL2 functions (may be overridden)
181 ******************************************************************************/
182
Roberto Vargase0e99462017-10-30 14:43:43 +0000183
184/*******************************************************************************
185 * Mandatory BL2 at EL3 functions: Must be implemented if BL2_AT_EL3 image is
186 * supported
187 ******************************************************************************/
188void bl2_el3_early_platform_setup(u_register_t arg0, u_register_t arg1,
189 u_register_t arg2, u_register_t arg3);
190void bl2_el3_plat_arch_setup(void);
191
192
193/*******************************************************************************
194 * Optional BL2 at EL3 functions (may be overridden)
195 ******************************************************************************/
196void bl2_el3_plat_prepare_exit(void);
197
Dan Handley7ce42df2014-05-15 14:11:36 +0100198/*******************************************************************************
Yatharth Kocharb1c2fe02015-10-14 15:27:24 +0100199 * Mandatory BL2U functions.
200 ******************************************************************************/
201void bl2u_early_platform_setup(struct meminfo *mem_layout,
202 void *plat_info);
203void bl2u_plat_arch_setup(void);
204void bl2u_platform_setup(void);
205
206/*******************************************************************************
207 * Conditionally mandatory BL2U functions for CSS platforms.
208 ******************************************************************************/
209/*
210 * This function is used to perform any platform-specific actions required to
211 * handle the BL2U_SCP firmware.
212 */
213int bl2u_plat_handle_scp_bl2u(void);
214
215/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000216 * Mandatory BL31 functions
Dan Handley7ce42df2014-05-15 14:11:36 +0100217 ******************************************************************************/
Soby Mathew73308d02018-01-09 14:36:14 +0000218void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
219 u_register_t arg2, u_register_t arg3);
Dan Handley7ce42df2014-05-15 14:11:36 +0100220void bl31_plat_arch_setup(void);
221void bl31_platform_setup(void);
Soby Mathew1ff495b2015-12-09 11:28:43 +0000222void bl31_plat_runtime_setup(void);
Dan Handley701fea72014-05-27 16:17:21 +0100223struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type);
Dan Handley7ce42df2014-05-15 14:11:36 +0100224
225/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000226 * Mandatory PSCI functions (BL31)
Dan Handley7ce42df2014-05-15 14:11:36 +0100227 ******************************************************************************/
Soby Mathew981487a2015-07-13 14:10:57 +0100228int plat_setup_psci_ops(uintptr_t sec_entrypoint,
Roberto Vargas777dd432018-02-12 12:36:17 +0000229 const struct plat_psci_ops **psci_ops);
Soby Mathew981487a2015-07-13 14:10:57 +0100230const unsigned char *plat_get_power_domain_tree_desc(void);
231
232/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000233 * Optional PSCI functions (BL31).
Soby Mathew981487a2015-07-13 14:10:57 +0100234 ******************************************************************************/
dp-arm66abfbe2017-01-31 13:01:04 +0000235void plat_psci_stat_accounting_start(const psci_power_state_t *state_info);
236void plat_psci_stat_accounting_stop(const psci_power_state_t *state_info);
237u_register_t plat_psci_stat_get_residency(unsigned int lvl,
238 const psci_power_state_t *state_info,
Roberto Vargas777dd432018-02-12 12:36:17 +0000239 int last_cpu_idx);
Soby Mathew981487a2015-07-13 14:10:57 +0100240plat_local_state_t plat_get_target_pwr_state(unsigned int lvl,
241 const plat_local_state_t *states,
242 unsigned int ncpu);
Dan Handley7ce42df2014-05-15 14:11:36 +0100243
244/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000245 * Optional BL31 functions (may be overridden)
Dan Handleyb226a4d2014-05-16 14:08:45 +0100246 ******************************************************************************/
Achin Guptae9982542014-06-26 08:59:07 +0100247void bl31_plat_enable_mmu(uint32_t flags);
Dan Handleyb226a4d2014-05-16 14:08:45 +0100248
249/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000250 * Optional BL32 functions (may be overridden)
Dan Handleyb226a4d2014-05-16 14:08:45 +0100251 ******************************************************************************/
Achin Guptae9982542014-06-26 08:59:07 +0100252void bl32_plat_enable_mmu(uint32_t flags);
Dan Handleyb226a4d2014-05-16 14:08:45 +0100253
Juan Castillo5e29c752015-01-07 10:39:25 +0000254/*******************************************************************************
Juan Castillo31a68f02015-04-14 12:49:03 +0100255 * Trusted Board Boot functions
Juan Castillo5e29c752015-01-07 10:39:25 +0000256 ******************************************************************************/
Juan Castillo31a68f02015-04-14 12:49:03 +0100257int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len,
258 unsigned int *flags);
Juan Castillobfb7fa62016-01-22 11:05:57 +0000259int plat_get_nv_ctr(void *cookie, unsigned int *nv_ctr);
260int plat_set_nv_ctr(void *cookie, unsigned int nv_ctr);
dp-armb3e85802016-12-12 14:48:13 +0000261int plat_set_nv_ctr2(void *cookie, const struct auth_img_desc_s *img_desc,
262 unsigned int nv_ctr);
Juan Castillo5e29c752015-01-07 10:39:25 +0000263
Antonio Nino Diazc41f2062017-10-24 10:07:35 +0100264/*******************************************************************************
265 * Secure Partitions functions
266 ******************************************************************************/
267const struct mmap_region *plat_get_secure_partition_mmap(void *cookie);
268const struct secure_partition_boot_info *plat_get_secure_partition_boot_info(
269 void *cookie);
Antonio Nino Diazb86edcb2018-10-30 11:12:42 +0000270int plat_spm_sp_rd_load(struct sp_res_desc *rd, const void *ptr, size_t size);
Antonio Nino Diaz840627f2018-11-27 08:36:02 +0000271int plat_spm_sp_get_next_address(void **sp_base, size_t *sp_size,
272 void **rd_base, size_t *rd_size);
Antonio Nino Diazc41f2062017-10-24 10:07:35 +0100273
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100274/*******************************************************************************
275 * Mandatory BL image load functions(may be overridden).
276 ******************************************************************************/
277/*
278 * This function returns pointer to the list of images that the
279 * platform has populated to load.
280 */
281struct bl_load_info *plat_get_bl_image_load_info(void);
282
283/*
284 * This function returns a pointer to the shared memory that the
285 * platform has kept aside to pass trusted firmware related
286 * information that next BL image could need.
287 */
288struct bl_params *plat_get_next_bl_params(void);
289
290/*
291 * This function flushes to main memory all the params that are
292 * passed to next image.
293 */
294void plat_flush_next_bl_params(void);
295
Soby Mathew70716d62015-07-13 16:26:11 +0100296/*
297 * The below function enable Trusted Firmware components like SPDs which
298 * haven't migrated to the new platform API to compile on platforms which
299 * have the compatibility layer disabled.
300 */
Roberto Vargas05712702018-02-12 12:36:17 +0000301unsigned int platform_core_pos_helper(unsigned long mpidr);
Douglas Raillard306593d2017-02-24 18:14:15 +0000302
Antonio Nino Diazfec756f2018-07-18 16:24:16 +0100303#endif /* PLATFORM_H */