blob: e189f648ac03fd926fab8c4b5695dc8e3fc0488b [file] [log] [blame]
Dan Handleyed6ff952014-05-14 17:44:19 +01001/*
dp-arm66abfbe2017-01-31 13:01:04 +00002 * Copyright (c) 2013-2017, ARM Limited and Contributors. All rights reserved.
Dan Handleyed6ff952014-05-14 17:44:19 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handleyed6ff952014-05-14 17:44:19 +01005 */
6
7#ifndef __PLATFORM_H__
8#define __PLATFORM_H__
9
Soby Mathew981487a2015-07-13 14:10:57 +010010#include <psci.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010011#include <stdint.h>
Soby Mathew981487a2015-07-13 14:10:57 +010012#include <types.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010013
14
15/*******************************************************************************
16 * Forward declarations
17 ******************************************************************************/
dp-armb3e85802016-12-12 14:48:13 +000018struct auth_img_desc_s;
Dan Handleyed6ff952014-05-14 17:44:19 +010019struct meminfo;
20struct image_info;
21struct entry_point_info;
Dan Handley7ce42df2014-05-15 14:11:36 +010022struct bl31_params;
Yatharth Kochara65be2f2015-10-09 18:06:13 +010023struct image_desc;
Yatharth Kochar3345a8d2016-09-12 16:08:41 +010024struct bl_load_info;
25struct bl_params;
Dan Handleyed6ff952014-05-14 17:44:19 +010026
27/*******************************************************************************
Juan Castillo31a68f02015-04-14 12:49:03 +010028 * plat_get_rotpk_info() flags
29 ******************************************************************************/
30#define ROTPK_IS_HASH (1 << 0)
Soby Mathew2f7ed052016-05-24 15:05:15 +010031/* Flag used to skip verification of the certificate ROTPK while the platform
32 ROTPK is not deployed */
33#define ROTPK_NOT_DEPLOYED (1 << 1)
Juan Castillo31a68f02015-04-14 12:49:03 +010034
35/*******************************************************************************
Dan Handley7ce42df2014-05-15 14:11:36 +010036 * Function declarations
Dan Handleyed6ff952014-05-14 17:44:19 +010037 ******************************************************************************/
Dan Handley7ce42df2014-05-15 14:11:36 +010038/*******************************************************************************
39 * Mandatory common functions
40 ******************************************************************************/
Antonio Nino Diaz391a76e2016-05-18 16:53:31 +010041unsigned long long plat_get_syscnt_freq(void) __deprecated;
42unsigned int plat_get_syscnt_freq2(void);
43
Juan Castillo3a66aca2015-04-13 17:36:19 +010044int plat_get_image_source(unsigned int image_id,
Dan Handley7ce42df2014-05-15 14:11:36 +010045 uintptr_t *dev_handle,
46 uintptr_t *image_spec);
Soby Mathew21f93612016-03-23 10:11:10 +000047uintptr_t plat_get_ns_image_entrypoint(void);
Soby Mathew981487a2015-07-13 14:10:57 +010048unsigned int plat_my_core_pos(void);
49int plat_core_pos_by_mpidr(u_register_t mpidr);
Dan Handley7ce42df2014-05-15 14:11:36 +010050
Douglas Raillard306593d2017-02-24 18:14:15 +000051#if STACK_PROTECTOR_ENABLED
52/*
53 * Return a new value to be used for the stack protection's canary.
54 *
55 * Ideally, this value is a random number that is impossible to predict by an
56 * attacker.
57 */
58u_register_t plat_get_stack_protector_canary(void);
59#endif /* STACK_PROTECTOR_ENABLED */
60
Dan Handley7ce42df2014-05-15 14:11:36 +010061/*******************************************************************************
62 * Mandatory interrupt management functions
63 ******************************************************************************/
Dan Handley701fea72014-05-27 16:17:21 +010064uint32_t plat_ic_get_pending_interrupt_id(void);
65uint32_t plat_ic_get_pending_interrupt_type(void);
66uint32_t plat_ic_acknowledge_interrupt(void);
67uint32_t plat_ic_get_interrupt_type(uint32_t id);
68void plat_ic_end_of_interrupt(uint32_t id);
Dan Handleyed6ff952014-05-14 17:44:19 +010069uint32_t plat_interrupt_type_to_line(uint32_t type,
70 uint32_t security_state);
71
Dan Handley7ce42df2014-05-15 14:11:36 +010072/*******************************************************************************
73 * Optional common functions (may be overridden)
74 ******************************************************************************/
Soby Mathewa0fedc42016-06-16 14:52:04 +010075uintptr_t plat_get_my_stack(void);
Yatharth Kocharf528faf2016-06-28 16:58:26 +010076void plat_report_exception(unsigned int exception_type);
Sandrine Bailleux046cd3f2014-08-06 11:27:23 +010077int plat_crash_console_init(void);
Soby Mathew066f7132014-07-14 16:57:23 +010078int plat_crash_console_putc(int c);
Antonio Nino Diazd3ec5432017-02-17 17:11:27 +000079int plat_crash_console_flush(void);
Juan Castillo26ae5832015-09-25 15:41:14 +010080void plat_error_handler(int err) __dead2;
Antonio Nino Diaz1f21bcf2016-02-01 13:57:25 +000081void plat_panic_handler(void) __dead2;
Soby Mathewaaf15f52017-09-04 11:49:29 +010082const char *plat_log_get_prefix(unsigned int log_level);
Dan Handley7ce42df2014-05-15 14:11:36 +010083
84/*******************************************************************************
85 * Mandatory BL1 functions
86 ******************************************************************************/
Dan Handley4fd2f5c2014-08-04 11:41:20 +010087void bl1_early_platform_setup(void);
Dan Handley7ce42df2014-05-15 14:11:36 +010088void bl1_plat_arch_setup(void);
89void bl1_platform_setup(void);
90struct meminfo *bl1_plat_sec_mem_layout(void);
Dan Handleyed6ff952014-05-14 17:44:19 +010091
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +010092/*
93 * The following function is mandatory when the
94 * firmware update feature is used.
95 */
96int bl1_plat_mem_check(uintptr_t mem_base, unsigned int mem_size,
97 unsigned int flags);
98
Dan Handley7ce42df2014-05-15 14:11:36 +010099/*******************************************************************************
100 * Optional BL1 functions (may be overridden)
101 ******************************************************************************/
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100102void bl1_init_bl2_mem_layout(const struct meminfo *bl1_mem_layout,
103 struct meminfo *bl2_mem_layout);
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100104
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100105/*
106 * The following functions are used for image loading process in BL1.
107 */
108void bl1_plat_set_ep_info(unsigned int image_id,
109 struct entry_point_info *ep_info);
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100110/*
111 * The following functions are mandatory when firmware update
112 * feature is used and optional otherwise.
113 */
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100114unsigned int bl1_plat_get_next_image_id(void);
115struct image_desc *bl1_plat_get_image_desc(unsigned int image_id);
Dan Handley7ce42df2014-05-15 14:11:36 +0100116
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100117/*
118 * The following functions are used by firmware update
119 * feature and may optionally be overridden.
120 */
Dan Handley89f8f332015-12-15 14:28:24 +0000121__dead2 void bl1_plat_fwu_done(void *client_cookie, void *reserved);
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100122
123
Dan Handley7ce42df2014-05-15 14:11:36 +0100124/*******************************************************************************
125 * Mandatory BL2 functions
126 ******************************************************************************/
Dan Handley4fd2f5c2014-08-04 11:41:20 +0100127void bl2_early_platform_setup(struct meminfo *mem_layout);
Dan Handley7ce42df2014-05-15 14:11:36 +0100128void bl2_plat_arch_setup(void);
129void bl2_platform_setup(void);
130struct meminfo *bl2_plat_sec_mem_layout(void);
131
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100132#if LOAD_IMAGE_V2
133/*
134 * This function can be used by the platforms to update/use image
135 * information for given `image_id`.
136 */
137int bl2_plat_handle_post_image_load(unsigned int image_id);
138
139#else /* LOAD_IMAGE_V2 */
140
Dan Handley7ce42df2014-05-15 14:11:36 +0100141/*
142 * This function returns a pointer to the shared memory that the platform has
Juan Castillo7d199412015-12-14 09:35:25 +0000143 * kept aside to pass trusted firmware related information that BL31
Dan Handley7ce42df2014-05-15 14:11:36 +0100144 * could need
145 */
146struct bl31_params *bl2_plat_get_bl31_params(void);
147
148/*
149 * This function returns a pointer to the shared memory that the platform
150 * has kept to point to entry point information of BL31 to BL2
151 */
152struct entry_point_info *bl2_plat_get_bl31_ep_info(void);
153
154/*
155 * This function flushes to main memory all the params that are
Juan Castillo7d199412015-12-14 09:35:25 +0000156 * passed to BL31
Dan Handley7ce42df2014-05-15 14:11:36 +0100157 */
158void bl2_plat_flush_bl31_params(void);
159
Dan Handleyed6ff952014-05-14 17:44:19 +0100160/*
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100161 * The next 2 functions allow the platform to change the entrypoint information
Juan Castillo7d199412015-12-14 09:35:25 +0000162 * for the mandatory 3rd level BL images, BL31 and BL33. This is done after
163 * BL2 has loaded those images into memory but before BL31 is executed.
Dan Handleyed6ff952014-05-14 17:44:19 +0100164 */
165void bl2_plat_set_bl31_ep_info(struct image_info *image,
166 struct entry_point_info *ep);
167
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100168void bl2_plat_set_bl33_ep_info(struct image_info *image,
Dan Handleyed6ff952014-05-14 17:44:19 +0100169 struct entry_point_info *ep);
170
Juan Castillo7d199412015-12-14 09:35:25 +0000171/* Gets the memory layout for BL33 */
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100172void bl2_plat_get_bl33_meminfo(struct meminfo *mem_info);
173
174/*******************************************************************************
Juan Castilloa72b6472015-12-10 15:49:17 +0000175 * Conditionally mandatory BL2 functions: must be implemented if SCP_BL2 image
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100176 * is supported
177 ******************************************************************************/
Juan Castilloa72b6472015-12-10 15:49:17 +0000178/* Gets the memory layout for SCP_BL2 */
179void bl2_plat_get_scp_bl2_meminfo(struct meminfo *mem_info);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100180
181/*
Juan Castilloa72b6472015-12-10 15:49:17 +0000182 * This function is called after loading SCP_BL2 image and it is used to perform
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100183 * any platform-specific actions required to handle the SCP firmware.
184 */
Juan Castilloa72b6472015-12-10 15:49:17 +0000185int bl2_plat_handle_scp_bl2(struct image_info *scp_bl2_image_info);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100186
187/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000188 * Conditionally mandatory BL2 functions: must be implemented if BL32 image
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100189 * is supported
190 ******************************************************************************/
191void bl2_plat_set_bl32_ep_info(struct image_info *image,
Dan Handleyed6ff952014-05-14 17:44:19 +0100192 struct entry_point_info *ep);
193
Juan Castillo7d199412015-12-14 09:35:25 +0000194/* Gets the memory layout for BL32 */
Dan Handleyed6ff952014-05-14 17:44:19 +0100195void bl2_plat_get_bl32_meminfo(struct meminfo *mem_info);
196
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100197#endif /* LOAD_IMAGE_V2 */
198
Dan Handley7ce42df2014-05-15 14:11:36 +0100199/*******************************************************************************
200 * Optional BL2 functions (may be overridden)
201 ******************************************************************************/
202
203/*******************************************************************************
Yatharth Kocharb1c2fe02015-10-14 15:27:24 +0100204 * Mandatory BL2U functions.
205 ******************************************************************************/
206void bl2u_early_platform_setup(struct meminfo *mem_layout,
207 void *plat_info);
208void bl2u_plat_arch_setup(void);
209void bl2u_platform_setup(void);
210
211/*******************************************************************************
212 * Conditionally mandatory BL2U functions for CSS platforms.
213 ******************************************************************************/
214/*
215 * This function is used to perform any platform-specific actions required to
216 * handle the BL2U_SCP firmware.
217 */
218int bl2u_plat_handle_scp_bl2u(void);
219
220/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000221 * Mandatory BL31 functions
Dan Handley7ce42df2014-05-15 14:11:36 +0100222 ******************************************************************************/
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100223#if LOAD_IMAGE_V2
224void bl31_early_platform_setup(void *from_bl2,
225 void *plat_params_from_bl2);
226#else
Dan Handley7ce42df2014-05-15 14:11:36 +0100227void bl31_early_platform_setup(struct bl31_params *from_bl2,
228 void *plat_params_from_bl2);
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100229#endif
Dan Handley7ce42df2014-05-15 14:11:36 +0100230void bl31_plat_arch_setup(void);
231void bl31_platform_setup(void);
Soby Mathew1ff495b2015-12-09 11:28:43 +0000232void bl31_plat_runtime_setup(void);
Dan Handley701fea72014-05-27 16:17:21 +0100233struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type);
Dan Handley7ce42df2014-05-15 14:11:36 +0100234
235/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000236 * Mandatory PSCI functions (BL31)
Dan Handley7ce42df2014-05-15 14:11:36 +0100237 ******************************************************************************/
Soby Mathew981487a2015-07-13 14:10:57 +0100238int plat_setup_psci_ops(uintptr_t sec_entrypoint,
239 const struct plat_psci_ops **);
240const unsigned char *plat_get_power_domain_tree_desc(void);
241
242/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000243 * Optional PSCI functions (BL31).
Soby Mathew981487a2015-07-13 14:10:57 +0100244 ******************************************************************************/
dp-arm66abfbe2017-01-31 13:01:04 +0000245void plat_psci_stat_accounting_start(const psci_power_state_t *state_info);
246void plat_psci_stat_accounting_stop(const psci_power_state_t *state_info);
247u_register_t plat_psci_stat_get_residency(unsigned int lvl,
248 const psci_power_state_t *state_info,
249 int last_cpu_index);
Soby Mathew981487a2015-07-13 14:10:57 +0100250plat_local_state_t plat_get_target_pwr_state(unsigned int lvl,
251 const plat_local_state_t *states,
252 unsigned int ncpu);
Dan Handley7ce42df2014-05-15 14:11:36 +0100253
254/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000255 * Optional BL31 functions (may be overridden)
Dan Handleyb226a4d2014-05-16 14:08:45 +0100256 ******************************************************************************/
Achin Guptae9982542014-06-26 08:59:07 +0100257void bl31_plat_enable_mmu(uint32_t flags);
Dan Handleyb226a4d2014-05-16 14:08:45 +0100258
259/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000260 * Optional BL32 functions (may be overridden)
Dan Handleyb226a4d2014-05-16 14:08:45 +0100261 ******************************************************************************/
Achin Guptae9982542014-06-26 08:59:07 +0100262void bl32_plat_enable_mmu(uint32_t flags);
Dan Handleyb226a4d2014-05-16 14:08:45 +0100263
Juan Castillo5e29c752015-01-07 10:39:25 +0000264/*******************************************************************************
Juan Castillo31a68f02015-04-14 12:49:03 +0100265 * Trusted Board Boot functions
Juan Castillo5e29c752015-01-07 10:39:25 +0000266 ******************************************************************************/
Juan Castillo31a68f02015-04-14 12:49:03 +0100267int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len,
268 unsigned int *flags);
Juan Castillobfb7fa62016-01-22 11:05:57 +0000269int plat_get_nv_ctr(void *cookie, unsigned int *nv_ctr);
270int plat_set_nv_ctr(void *cookie, unsigned int nv_ctr);
dp-armb3e85802016-12-12 14:48:13 +0000271int plat_set_nv_ctr2(void *cookie, const struct auth_img_desc_s *img_desc,
272 unsigned int nv_ctr);
Juan Castillo5e29c752015-01-07 10:39:25 +0000273
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100274#if LOAD_IMAGE_V2
275/*******************************************************************************
276 * Mandatory BL image load functions(may be overridden).
277 ******************************************************************************/
278/*
279 * This function returns pointer to the list of images that the
280 * platform has populated to load.
281 */
282struct bl_load_info *plat_get_bl_image_load_info(void);
283
284/*
285 * This function returns a pointer to the shared memory that the
286 * platform has kept aside to pass trusted firmware related
287 * information that next BL image could need.
288 */
289struct bl_params *plat_get_next_bl_params(void);
290
291/*
292 * This function flushes to main memory all the params that are
293 * passed to next image.
294 */
295void plat_flush_next_bl_params(void);
296
297#endif /* LOAD_IMAGE_V2 */
298
Soby Mathew981487a2015-07-13 14:10:57 +0100299#if ENABLE_PLAT_COMPAT
300/*
301 * The below declarations are to enable compatibility for the platform ports
302 * using the old platform interface.
303 */
304
305/*******************************************************************************
306 * Optional common functions (may be overridden)
307 ******************************************************************************/
308unsigned int platform_get_core_pos(unsigned long mpidr);
309
310/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000311 * Mandatory PSCI Compatibility functions (BL31)
Soby Mathew981487a2015-07-13 14:10:57 +0100312 ******************************************************************************/
313int platform_setup_pm(const plat_pm_ops_t **);
314
315unsigned int plat_get_aff_count(unsigned int, unsigned long);
316unsigned int plat_get_aff_state(unsigned int, unsigned long);
Douglas Raillard306593d2017-02-24 18:14:15 +0000317#else /* __ENABLE_PLAT_COMPAT__ */
Soby Mathew70716d62015-07-13 16:26:11 +0100318/*
319 * The below function enable Trusted Firmware components like SPDs which
320 * haven't migrated to the new platform API to compile on platforms which
321 * have the compatibility layer disabled.
322 */
Soren Brinkmanna581bd52016-01-14 10:02:33 -0800323unsigned int platform_get_core_pos(unsigned long mpidr) __deprecated;
Soby Mathew981487a2015-07-13 14:10:57 +0100324
Soby Mathew70716d62015-07-13 16:26:11 +0100325#endif /* __ENABLE_PLAT_COMPAT__ */
Douglas Raillard306593d2017-02-24 18:14:15 +0000326
Dan Handleyed6ff952014-05-14 17:44:19 +0100327#endif /* __PLATFORM_H__ */
Douglas Raillard306593d2017-02-24 18:14:15 +0000328