blob: ddb1cab1a544e16acf625cfb84266be3936390b2 [file] [log] [blame]
Dan Handleyed6ff952014-05-14 17:44:19 +01001/*
dp-arm66abfbe2017-01-31 13:01:04 +00002 * Copyright (c) 2013-2017, ARM Limited and Contributors. All rights reserved.
Dan Handleyed6ff952014-05-14 17:44:19 +01003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
31#ifndef __PLATFORM_H__
32#define __PLATFORM_H__
33
Soby Mathew981487a2015-07-13 14:10:57 +010034#include <psci.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010035#include <stdint.h>
Soby Mathew981487a2015-07-13 14:10:57 +010036#include <types.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010037
38
39/*******************************************************************************
40 * Forward declarations
41 ******************************************************************************/
dp-armb3e85802016-12-12 14:48:13 +000042struct auth_img_desc_s;
Dan Handleyed6ff952014-05-14 17:44:19 +010043struct meminfo;
44struct image_info;
45struct entry_point_info;
Dan Handley7ce42df2014-05-15 14:11:36 +010046struct bl31_params;
Yatharth Kochara65be2f2015-10-09 18:06:13 +010047struct image_desc;
Yatharth Kochar3345a8d2016-09-12 16:08:41 +010048struct bl_load_info;
49struct bl_params;
Dan Handleyed6ff952014-05-14 17:44:19 +010050
51/*******************************************************************************
Juan Castillo31a68f02015-04-14 12:49:03 +010052 * plat_get_rotpk_info() flags
53 ******************************************************************************/
54#define ROTPK_IS_HASH (1 << 0)
Soby Mathew2f7ed052016-05-24 15:05:15 +010055/* Flag used to skip verification of the certificate ROTPK while the platform
56 ROTPK is not deployed */
57#define ROTPK_NOT_DEPLOYED (1 << 1)
Juan Castillo31a68f02015-04-14 12:49:03 +010058
59/*******************************************************************************
Dan Handley7ce42df2014-05-15 14:11:36 +010060 * Function declarations
Dan Handleyed6ff952014-05-14 17:44:19 +010061 ******************************************************************************/
Dan Handley7ce42df2014-05-15 14:11:36 +010062/*******************************************************************************
63 * Mandatory common functions
64 ******************************************************************************/
Antonio Nino Diaz391a76e2016-05-18 16:53:31 +010065unsigned long long plat_get_syscnt_freq(void) __deprecated;
66unsigned int plat_get_syscnt_freq2(void);
67
Juan Castillo3a66aca2015-04-13 17:36:19 +010068int plat_get_image_source(unsigned int image_id,
Dan Handley7ce42df2014-05-15 14:11:36 +010069 uintptr_t *dev_handle,
70 uintptr_t *image_spec);
Soby Mathew21f93612016-03-23 10:11:10 +000071uintptr_t plat_get_ns_image_entrypoint(void);
Soby Mathew981487a2015-07-13 14:10:57 +010072unsigned int plat_my_core_pos(void);
73int plat_core_pos_by_mpidr(u_register_t mpidr);
Dan Handley7ce42df2014-05-15 14:11:36 +010074
Douglas Raillard306593d2017-02-24 18:14:15 +000075#if STACK_PROTECTOR_ENABLED
76/*
77 * Return a new value to be used for the stack protection's canary.
78 *
79 * Ideally, this value is a random number that is impossible to predict by an
80 * attacker.
81 */
82u_register_t plat_get_stack_protector_canary(void);
83#endif /* STACK_PROTECTOR_ENABLED */
84
Dan Handley7ce42df2014-05-15 14:11:36 +010085/*******************************************************************************
86 * Mandatory interrupt management functions
87 ******************************************************************************/
Dan Handley701fea72014-05-27 16:17:21 +010088uint32_t plat_ic_get_pending_interrupt_id(void);
89uint32_t plat_ic_get_pending_interrupt_type(void);
90uint32_t plat_ic_acknowledge_interrupt(void);
91uint32_t plat_ic_get_interrupt_type(uint32_t id);
92void plat_ic_end_of_interrupt(uint32_t id);
Dan Handleyed6ff952014-05-14 17:44:19 +010093uint32_t plat_interrupt_type_to_line(uint32_t type,
94 uint32_t security_state);
95
Dan Handley7ce42df2014-05-15 14:11:36 +010096/*******************************************************************************
97 * Optional common functions (may be overridden)
98 ******************************************************************************/
Soby Mathewa0fedc42016-06-16 14:52:04 +010099uintptr_t plat_get_my_stack(void);
Yatharth Kocharf528faf2016-06-28 16:58:26 +0100100void plat_report_exception(unsigned int exception_type);
Sandrine Bailleux046cd3f2014-08-06 11:27:23 +0100101int plat_crash_console_init(void);
Soby Mathew066f7132014-07-14 16:57:23 +0100102int plat_crash_console_putc(int c);
Antonio Nino Diazd3ec5432017-02-17 17:11:27 +0000103int plat_crash_console_flush(void);
Juan Castillo26ae5832015-09-25 15:41:14 +0100104void plat_error_handler(int err) __dead2;
Antonio Nino Diaz1f21bcf2016-02-01 13:57:25 +0000105void plat_panic_handler(void) __dead2;
Dan Handley7ce42df2014-05-15 14:11:36 +0100106
107/*******************************************************************************
108 * Mandatory BL1 functions
109 ******************************************************************************/
Dan Handley4fd2f5c2014-08-04 11:41:20 +0100110void bl1_early_platform_setup(void);
Dan Handley7ce42df2014-05-15 14:11:36 +0100111void bl1_plat_arch_setup(void);
112void bl1_platform_setup(void);
113struct meminfo *bl1_plat_sec_mem_layout(void);
Dan Handleyed6ff952014-05-14 17:44:19 +0100114
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100115/*
116 * The following function is mandatory when the
117 * firmware update feature is used.
118 */
119int bl1_plat_mem_check(uintptr_t mem_base, unsigned int mem_size,
120 unsigned int flags);
121
Dan Handley7ce42df2014-05-15 14:11:36 +0100122/*******************************************************************************
123 * Optional BL1 functions (may be overridden)
124 ******************************************************************************/
Sandrine Bailleux467d0572014-06-24 14:02:34 +0100125void bl1_init_bl2_mem_layout(const struct meminfo *bl1_mem_layout,
126 struct meminfo *bl2_mem_layout);
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100127
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100128/*
129 * The following functions are used for image loading process in BL1.
130 */
131void bl1_plat_set_ep_info(unsigned int image_id,
132 struct entry_point_info *ep_info);
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100133/*
134 * The following functions are mandatory when firmware update
135 * feature is used and optional otherwise.
136 */
Yatharth Kochara65be2f2015-10-09 18:06:13 +0100137unsigned int bl1_plat_get_next_image_id(void);
138struct image_desc *bl1_plat_get_image_desc(unsigned int image_id);
Dan Handley7ce42df2014-05-15 14:11:36 +0100139
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100140/*
141 * The following functions are used by firmware update
142 * feature and may optionally be overridden.
143 */
Dan Handley89f8f332015-12-15 14:28:24 +0000144__dead2 void bl1_plat_fwu_done(void *client_cookie, void *reserved);
Yatharth Kochar71c9a5e2015-10-10 19:06:53 +0100145
146
Dan Handley7ce42df2014-05-15 14:11:36 +0100147/*******************************************************************************
148 * Mandatory BL2 functions
149 ******************************************************************************/
Dan Handley4fd2f5c2014-08-04 11:41:20 +0100150void bl2_early_platform_setup(struct meminfo *mem_layout);
Dan Handley7ce42df2014-05-15 14:11:36 +0100151void bl2_plat_arch_setup(void);
152void bl2_platform_setup(void);
153struct meminfo *bl2_plat_sec_mem_layout(void);
154
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100155#if LOAD_IMAGE_V2
156/*
157 * This function can be used by the platforms to update/use image
158 * information for given `image_id`.
159 */
160int bl2_plat_handle_post_image_load(unsigned int image_id);
161
162#else /* LOAD_IMAGE_V2 */
163
Dan Handley7ce42df2014-05-15 14:11:36 +0100164/*
165 * This function returns a pointer to the shared memory that the platform has
Juan Castillo7d199412015-12-14 09:35:25 +0000166 * kept aside to pass trusted firmware related information that BL31
Dan Handley7ce42df2014-05-15 14:11:36 +0100167 * could need
168 */
169struct bl31_params *bl2_plat_get_bl31_params(void);
170
171/*
172 * This function returns a pointer to the shared memory that the platform
173 * has kept to point to entry point information of BL31 to BL2
174 */
175struct entry_point_info *bl2_plat_get_bl31_ep_info(void);
176
177/*
178 * This function flushes to main memory all the params that are
Juan Castillo7d199412015-12-14 09:35:25 +0000179 * passed to BL31
Dan Handley7ce42df2014-05-15 14:11:36 +0100180 */
181void bl2_plat_flush_bl31_params(void);
182
Dan Handleyed6ff952014-05-14 17:44:19 +0100183/*
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100184 * The next 2 functions allow the platform to change the entrypoint information
Juan Castillo7d199412015-12-14 09:35:25 +0000185 * for the mandatory 3rd level BL images, BL31 and BL33. This is done after
186 * BL2 has loaded those images into memory but before BL31 is executed.
Dan Handleyed6ff952014-05-14 17:44:19 +0100187 */
188void bl2_plat_set_bl31_ep_info(struct image_info *image,
189 struct entry_point_info *ep);
190
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100191void bl2_plat_set_bl33_ep_info(struct image_info *image,
Dan Handleyed6ff952014-05-14 17:44:19 +0100192 struct entry_point_info *ep);
193
Juan Castillo7d199412015-12-14 09:35:25 +0000194/* Gets the memory layout for BL33 */
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100195void bl2_plat_get_bl33_meminfo(struct meminfo *mem_info);
196
197/*******************************************************************************
Juan Castilloa72b6472015-12-10 15:49:17 +0000198 * Conditionally mandatory BL2 functions: must be implemented if SCP_BL2 image
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100199 * is supported
200 ******************************************************************************/
Juan Castilloa72b6472015-12-10 15:49:17 +0000201/* Gets the memory layout for SCP_BL2 */
202void bl2_plat_get_scp_bl2_meminfo(struct meminfo *mem_info);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100203
204/*
Juan Castilloa72b6472015-12-10 15:49:17 +0000205 * This function is called after loading SCP_BL2 image and it is used to perform
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100206 * any platform-specific actions required to handle the SCP firmware.
207 */
Juan Castilloa72b6472015-12-10 15:49:17 +0000208int bl2_plat_handle_scp_bl2(struct image_info *scp_bl2_image_info);
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100209
210/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000211 * Conditionally mandatory BL2 functions: must be implemented if BL32 image
Sandrine Bailleuxf841ef02014-06-24 14:19:36 +0100212 * is supported
213 ******************************************************************************/
214void bl2_plat_set_bl32_ep_info(struct image_info *image,
Dan Handleyed6ff952014-05-14 17:44:19 +0100215 struct entry_point_info *ep);
216
Juan Castillo7d199412015-12-14 09:35:25 +0000217/* Gets the memory layout for BL32 */
Dan Handleyed6ff952014-05-14 17:44:19 +0100218void bl2_plat_get_bl32_meminfo(struct meminfo *mem_info);
219
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100220#endif /* LOAD_IMAGE_V2 */
221
Dan Handley7ce42df2014-05-15 14:11:36 +0100222/*******************************************************************************
223 * Optional BL2 functions (may be overridden)
224 ******************************************************************************/
225
226/*******************************************************************************
Yatharth Kocharb1c2fe02015-10-14 15:27:24 +0100227 * Mandatory BL2U functions.
228 ******************************************************************************/
229void bl2u_early_platform_setup(struct meminfo *mem_layout,
230 void *plat_info);
231void bl2u_plat_arch_setup(void);
232void bl2u_platform_setup(void);
233
234/*******************************************************************************
235 * Conditionally mandatory BL2U functions for CSS platforms.
236 ******************************************************************************/
237/*
238 * This function is used to perform any platform-specific actions required to
239 * handle the BL2U_SCP firmware.
240 */
241int bl2u_plat_handle_scp_bl2u(void);
242
243/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000244 * Mandatory BL31 functions
Dan Handley7ce42df2014-05-15 14:11:36 +0100245 ******************************************************************************/
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100246#if LOAD_IMAGE_V2
247void bl31_early_platform_setup(void *from_bl2,
248 void *plat_params_from_bl2);
249#else
Dan Handley7ce42df2014-05-15 14:11:36 +0100250void bl31_early_platform_setup(struct bl31_params *from_bl2,
251 void *plat_params_from_bl2);
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100252#endif
Dan Handley7ce42df2014-05-15 14:11:36 +0100253void bl31_plat_arch_setup(void);
254void bl31_platform_setup(void);
Soby Mathew1ff495b2015-12-09 11:28:43 +0000255void bl31_plat_runtime_setup(void);
Dan Handley701fea72014-05-27 16:17:21 +0100256struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type);
Dan Handley7ce42df2014-05-15 14:11:36 +0100257
258/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000259 * Mandatory PSCI functions (BL31)
Dan Handley7ce42df2014-05-15 14:11:36 +0100260 ******************************************************************************/
Soby Mathew981487a2015-07-13 14:10:57 +0100261int plat_setup_psci_ops(uintptr_t sec_entrypoint,
262 const struct plat_psci_ops **);
263const unsigned char *plat_get_power_domain_tree_desc(void);
264
265/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000266 * Optional PSCI functions (BL31).
Soby Mathew981487a2015-07-13 14:10:57 +0100267 ******************************************************************************/
dp-arm66abfbe2017-01-31 13:01:04 +0000268void plat_psci_stat_accounting_start(const psci_power_state_t *state_info);
269void plat_psci_stat_accounting_stop(const psci_power_state_t *state_info);
270u_register_t plat_psci_stat_get_residency(unsigned int lvl,
271 const psci_power_state_t *state_info,
272 int last_cpu_index);
Soby Mathew981487a2015-07-13 14:10:57 +0100273plat_local_state_t plat_get_target_pwr_state(unsigned int lvl,
274 const plat_local_state_t *states,
275 unsigned int ncpu);
Dan Handley7ce42df2014-05-15 14:11:36 +0100276
277/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000278 * Optional BL31 functions (may be overridden)
Dan Handleyb226a4d2014-05-16 14:08:45 +0100279 ******************************************************************************/
Achin Guptae9982542014-06-26 08:59:07 +0100280void bl31_plat_enable_mmu(uint32_t flags);
Dan Handleyb226a4d2014-05-16 14:08:45 +0100281
282/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000283 * Optional BL32 functions (may be overridden)
Dan Handleyb226a4d2014-05-16 14:08:45 +0100284 ******************************************************************************/
Achin Guptae9982542014-06-26 08:59:07 +0100285void bl32_plat_enable_mmu(uint32_t flags);
Dan Handleyb226a4d2014-05-16 14:08:45 +0100286
Juan Castillo5e29c752015-01-07 10:39:25 +0000287/*******************************************************************************
Juan Castillo31a68f02015-04-14 12:49:03 +0100288 * Trusted Board Boot functions
Juan Castillo5e29c752015-01-07 10:39:25 +0000289 ******************************************************************************/
Juan Castillo31a68f02015-04-14 12:49:03 +0100290int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len,
291 unsigned int *flags);
Juan Castillobfb7fa62016-01-22 11:05:57 +0000292int plat_get_nv_ctr(void *cookie, unsigned int *nv_ctr);
293int plat_set_nv_ctr(void *cookie, unsigned int nv_ctr);
dp-armb3e85802016-12-12 14:48:13 +0000294int plat_set_nv_ctr2(void *cookie, const struct auth_img_desc_s *img_desc,
295 unsigned int nv_ctr);
Juan Castillo5e29c752015-01-07 10:39:25 +0000296
Yatharth Kochar3345a8d2016-09-12 16:08:41 +0100297#if LOAD_IMAGE_V2
298/*******************************************************************************
299 * Mandatory BL image load functions(may be overridden).
300 ******************************************************************************/
301/*
302 * This function returns pointer to the list of images that the
303 * platform has populated to load.
304 */
305struct bl_load_info *plat_get_bl_image_load_info(void);
306
307/*
308 * This function returns a pointer to the shared memory that the
309 * platform has kept aside to pass trusted firmware related
310 * information that next BL image could need.
311 */
312struct bl_params *plat_get_next_bl_params(void);
313
314/*
315 * This function flushes to main memory all the params that are
316 * passed to next image.
317 */
318void plat_flush_next_bl_params(void);
319
320#endif /* LOAD_IMAGE_V2 */
321
Soby Mathew981487a2015-07-13 14:10:57 +0100322#if ENABLE_PLAT_COMPAT
323/*
324 * The below declarations are to enable compatibility for the platform ports
325 * using the old platform interface.
326 */
327
328/*******************************************************************************
329 * Optional common functions (may be overridden)
330 ******************************************************************************/
331unsigned int platform_get_core_pos(unsigned long mpidr);
332
333/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000334 * Mandatory PSCI Compatibility functions (BL31)
Soby Mathew981487a2015-07-13 14:10:57 +0100335 ******************************************************************************/
336int platform_setup_pm(const plat_pm_ops_t **);
337
338unsigned int plat_get_aff_count(unsigned int, unsigned long);
339unsigned int plat_get_aff_state(unsigned int, unsigned long);
Douglas Raillard306593d2017-02-24 18:14:15 +0000340#else /* __ENABLE_PLAT_COMPAT__ */
Soby Mathew70716d62015-07-13 16:26:11 +0100341/*
342 * The below function enable Trusted Firmware components like SPDs which
343 * haven't migrated to the new platform API to compile on platforms which
344 * have the compatibility layer disabled.
345 */
Soren Brinkmanna581bd52016-01-14 10:02:33 -0800346unsigned int platform_get_core_pos(unsigned long mpidr) __deprecated;
Soby Mathew981487a2015-07-13 14:10:57 +0100347
Soby Mathew70716d62015-07-13 16:26:11 +0100348#endif /* __ENABLE_PLAT_COMPAT__ */
Douglas Raillard306593d2017-02-24 18:14:15 +0000349
Dan Handleyed6ff952014-05-14 17:44:19 +0100350#endif /* __PLATFORM_H__ */
Douglas Raillard306593d2017-02-24 18:14:15 +0000351