blob: f5bd298c5ae9df64985307cd670f0ec7a5bb1794 [file] [log] [blame]
Dan Handley5f0cdb02014-05-14 17:44:19 +01001/*
Achin Gupta0cb64d02019-10-11 14:54:48 +01002 * Copyright (c) 2013-2020, ARM Limited and Contributors. All rights reserved.
Dan Handley5f0cdb02014-05-14 17:44:19 +01003 *
dp-arm82cb2c12017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handley5f0cdb02014-05-14 17:44:19 +01005 */
6
Antonio Nino Diaz2bc3dba2018-07-18 16:24:16 +01007#ifndef PLATFORM_H
8#define PLATFORM_H
Dan Handley5f0cdb02014-05-14 17:44:19 +01009
10#include <stdint.h>
Dan Handley5f0cdb02014-05-14 17:44:19 +010011
Antonio Nino Diaz09d40e02018-12-14 00:18:21 +000012#include <lib/psci/psci.h>
Achin Gupta0cb64d02019-10-11 14:54:48 +010013#if defined(SPD_spmd)
14 #include <services/spm_core_manifest.h>
15#endif
Antonio Nino Diaz09d40e02018-12-14 00:18:21 +000016
Dan Handley5f0cdb02014-05-14 17:44:19 +010017/*******************************************************************************
18 * Forward declarations
19 ******************************************************************************/
dp-armd35dee22016-12-12 14:48:13 +000020struct auth_img_desc_s;
Dan Handley5f0cdb02014-05-14 17:44:19 +010021struct meminfo;
22struct image_info;
23struct entry_point_info;
Yatharth Kochar7baff112015-10-09 18:06:13 +010024struct image_desc;
Yatharth Kochar72600222016-09-12 16:08:41 +010025struct bl_load_info;
26struct bl_params;
Antonio Nino Diaz2fccb222017-10-24 10:07:35 +010027struct mmap_region;
Paul Beesleyaeaa2252019-10-15 10:57:42 +000028struct spm_mm_boot_info;
Antonio Nino Diaze4583022018-10-30 11:12:42 +000029struct sp_res_desc;
Dan Handley5f0cdb02014-05-14 17:44:19 +010030
31/*******************************************************************************
Juan Castillo95cfd4a2015-04-14 12:49:03 +010032 * plat_get_rotpk_info() flags
33 ******************************************************************************/
34#define ROTPK_IS_HASH (1 << 0)
Soby Mathew04943d32016-05-24 15:05:15 +010035/* Flag used to skip verification of the certificate ROTPK while the platform
36 ROTPK is not deployed */
37#define ROTPK_NOT_DEPLOYED (1 << 1)
Juan Castillo95cfd4a2015-04-14 12:49:03 +010038
39/*******************************************************************************
Dan Handleydec5e0d2014-05-15 14:11:36 +010040 * Function declarations
Dan Handley5f0cdb02014-05-14 17:44:19 +010041 ******************************************************************************/
Dan Handleydec5e0d2014-05-15 14:11:36 +010042/*******************************************************************************
43 * Mandatory common functions
44 ******************************************************************************/
Antonio Nino Diazd4486392016-05-18 16:53:31 +010045unsigned int plat_get_syscnt_freq2(void);
46
Juan Castillo16948ae2015-04-13 17:36:19 +010047int plat_get_image_source(unsigned int image_id,
Dan Handleydec5e0d2014-05-15 14:11:36 +010048 uintptr_t *dev_handle,
49 uintptr_t *image_spec);
Soby Mathewa0ad6012016-03-23 10:11:10 +000050uintptr_t plat_get_ns_image_entrypoint(void);
Soby Mathew67487842015-07-13 14:10:57 +010051unsigned int plat_my_core_pos(void);
52int plat_core_pos_by_mpidr(u_register_t mpidr);
Ambroise Vincent2374ab12019-04-10 12:50:27 +010053int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size);
Dan Handleydec5e0d2014-05-15 14:11:36 +010054
Douglas Raillard51faada2017-02-24 18:14:15 +000055#if STACK_PROTECTOR_ENABLED
56/*
57 * Return a new value to be used for the stack protection's canary.
58 *
59 * Ideally, this value is a random number that is impossible to predict by an
60 * attacker.
61 */
62u_register_t plat_get_stack_protector_canary(void);
63#endif /* STACK_PROTECTOR_ENABLED */
64
Dan Handleydec5e0d2014-05-15 14:11:36 +010065/*******************************************************************************
66 * Mandatory interrupt management functions
67 ******************************************************************************/
Dan Handley9865ac12014-05-27 16:17:21 +010068uint32_t plat_ic_get_pending_interrupt_id(void);
69uint32_t plat_ic_get_pending_interrupt_type(void);
70uint32_t plat_ic_acknowledge_interrupt(void);
71uint32_t plat_ic_get_interrupt_type(uint32_t id);
72void plat_ic_end_of_interrupt(uint32_t id);
Dan Handley5f0cdb02014-05-14 17:44:19 +010073uint32_t plat_interrupt_type_to_line(uint32_t type,
74 uint32_t security_state);
75
Dan Handleydec5e0d2014-05-15 14:11:36 +010076/*******************************************************************************
Jeenu Viswambharaneb68ea92017-09-22 08:32:09 +010077 * Optional interrupt management functions, depending on chosen EL3 components.
78 ******************************************************************************/
79unsigned int plat_ic_get_running_priority(void);
Jeenu Viswambharanca43b552017-09-22 08:32:09 +010080int plat_ic_is_spi(unsigned int id);
81int plat_ic_is_ppi(unsigned int id);
82int plat_ic_is_sgi(unsigned int id);
Jeenu Viswambharancbd3f372017-09-22 08:32:09 +010083unsigned int plat_ic_get_interrupt_active(unsigned int id);
Jeenu Viswambharan979225f2017-09-22 08:32:09 +010084void plat_ic_disable_interrupt(unsigned int id);
85void plat_ic_enable_interrupt(unsigned int id);
Jeenu Viswambharan74dce7f2017-09-22 08:32:09 +010086int plat_ic_has_interrupt_type(unsigned int type);
87void plat_ic_set_interrupt_type(unsigned int id, unsigned int type);
Jeenu Viswambharanf3a86602017-09-22 08:32:09 +010088void plat_ic_set_interrupt_priority(unsigned int id, unsigned int priority);
Jeenu Viswambharan8db978b2017-09-22 08:32:09 +010089void plat_ic_raise_el3_sgi(int sgi_num, u_register_t target);
Jeenu Viswambharanfc529fe2017-09-22 08:32:09 +010090void plat_ic_set_spi_routing(unsigned int id, unsigned int routing_mode,
91 u_register_t mpidr);
Jeenu Viswambharana2816a12017-09-22 08:32:09 +010092void plat_ic_set_interrupt_pending(unsigned int id);
93void plat_ic_clear_interrupt_pending(unsigned int id);
Jeenu Viswambharand55a4452017-09-22 08:32:09 +010094unsigned int plat_ic_set_priority_mask(unsigned int mask);
Jeenu Viswambharan4ee8d0b2017-10-24 15:13:59 +010095unsigned int plat_ic_get_interrupt_id(unsigned int raw);
Jeenu Viswambharaneb68ea92017-09-22 08:32:09 +010096
97/*******************************************************************************
Dan Handleydec5e0d2014-05-15 14:11:36 +010098 * Optional common functions (may be overridden)
99 ******************************************************************************/
Soby Mathew4c0d0392016-06-16 14:52:04 +0100100uintptr_t plat_get_my_stack(void);
Yatharth Kochar1a0a3f02016-06-28 16:58:26 +0100101void plat_report_exception(unsigned int exception_type);
Sandrine Bailleux44804252014-08-06 11:27:23 +0100102int plat_crash_console_init(void);
Soby Mathewc67b09b2014-07-14 16:57:23 +0100103int plat_crash_console_putc(int c);
Antonio Nino Diaz801cf932017-02-17 17:11:27 +0000104int plat_crash_console_flush(void);
Juan Castillo40fc6cd2015-09-25 15:41:14 +0100105void plat_error_handler(int err) __dead2;
Antonio Nino Diaz1c3ea102016-02-01 13:57:25 +0000106void plat_panic_handler(void) __dead2;
Soby Mathew7f56e9a2017-09-04 11:49:29 +0100107const char *plat_log_get_prefix(unsigned int log_level);
Roberto Vargas01f62b62017-09-26 12:53:01 +0100108void bl2_plat_preload_setup(void);
109int plat_try_next_boot_source(void);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100110
111/*******************************************************************************
112 * Mandatory BL1 functions
113 ******************************************************************************/
Dan Handley5a06bb72014-08-04 11:41:20 +0100114void bl1_early_platform_setup(void);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100115void bl1_plat_arch_setup(void);
116void bl1_platform_setup(void);
117struct meminfo *bl1_plat_sec_mem_layout(void);
Dan Handley5f0cdb02014-05-14 17:44:19 +0100118
Jeenu Viswambharanb7cb1332017-10-16 08:43:14 +0100119/*******************************************************************************
120 * Optional EL3 component functions in BL31
121 ******************************************************************************/
122
123/* SDEI platform functions */
124#if SDEI_SUPPORT
125int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode);
126void plat_sdei_handle_masked_trigger(uint64_t mpidr, unsigned int intr);
127#endif
128
Jeenu Viswambharan76454ab2017-11-30 12:54:15 +0000129void plat_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie,
130 void *handle, uint64_t flags);
131
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100132/*
133 * The following function is mandatory when the
134 * firmware update feature is used.
135 */
136int bl1_plat_mem_check(uintptr_t mem_base, unsigned int mem_size,
137 unsigned int flags);
138
Dan Handleydec5e0d2014-05-15 14:11:36 +0100139/*******************************************************************************
140 * Optional BL1 functions (may be overridden)
141 ******************************************************************************/
Yatharth Kochar7baff112015-10-09 18:06:13 +0100142/*
143 * The following functions are used for image loading process in BL1.
144 */
145void bl1_plat_set_ep_info(unsigned int image_id,
146 struct entry_point_info *ep_info);
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100147/*
148 * The following functions are mandatory when firmware update
149 * feature is used and optional otherwise.
150 */
Yatharth Kochar7baff112015-10-09 18:06:13 +0100151unsigned int bl1_plat_get_next_image_id(void);
152struct image_desc *bl1_plat_get_image_desc(unsigned int image_id);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100153
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100154/*
155 * The following functions are used by firmware update
156 * feature and may optionally be overridden.
157 */
Dan Handley1f37b942015-12-15 14:28:24 +0000158__dead2 void bl1_plat_fwu_done(void *client_cookie, void *reserved);
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100159
Masahiro Yamada11f001c2018-02-01 16:46:18 +0900160/*
Soby Mathew566034f2018-02-08 17:45:12 +0000161 * This BL1 function can be used by the platforms to update/use image
162 * information for a given `image_id`.
Masahiro Yamada11f001c2018-02-01 16:46:18 +0900163 */
Soby Mathew566034f2018-02-08 17:45:12 +0000164int bl1_plat_handle_pre_image_load(unsigned int image_id);
165int bl1_plat_handle_post_image_load(unsigned int image_id);
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100166
Dan Handleydec5e0d2014-05-15 14:11:36 +0100167/*******************************************************************************
168 * Mandatory BL2 functions
169 ******************************************************************************/
Soby Mathewa6f340f2018-01-09 14:36:14 +0000170void bl2_early_platform_setup2(u_register_t arg0, u_register_t arg1, u_register_t arg2, u_register_t arg3);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100171void bl2_plat_arch_setup(void);
172void bl2_platform_setup(void);
173struct meminfo *bl2_plat_sec_mem_layout(void);
174
Yatharth Kochar72600222016-09-12 16:08:41 +0100175/*
176 * This function can be used by the platforms to update/use image
177 * information for given `image_id`.
178 */
Masahiro Yamadaba68ef52018-02-01 16:45:51 +0900179int bl2_plat_handle_pre_image_load(unsigned int image_id);
Yatharth Kochar72600222016-09-12 16:08:41 +0100180int bl2_plat_handle_post_image_load(unsigned int image_id);
181
Yatharth Kochar72600222016-09-12 16:08:41 +0100182
Sandrine Bailleux93d81d62014-06-24 14:19:36 +0100183/*******************************************************************************
Dan Handleydec5e0d2014-05-15 14:11:36 +0100184 * Optional BL2 functions (may be overridden)
185 ******************************************************************************/
186
Roberto Vargasb1d27b42017-10-30 14:43:43 +0000187
188/*******************************************************************************
189 * Mandatory BL2 at EL3 functions: Must be implemented if BL2_AT_EL3 image is
190 * supported
191 ******************************************************************************/
192void bl2_el3_early_platform_setup(u_register_t arg0, u_register_t arg1,
193 u_register_t arg2, u_register_t arg3);
194void bl2_el3_plat_arch_setup(void);
195
196
197/*******************************************************************************
198 * Optional BL2 at EL3 functions (may be overridden)
199 ******************************************************************************/
200void bl2_el3_plat_prepare_exit(void);
201
Dan Handleydec5e0d2014-05-15 14:11:36 +0100202/*******************************************************************************
Yatharth Kochar9003fa02015-10-14 15:27:24 +0100203 * Mandatory BL2U functions.
204 ******************************************************************************/
205void bl2u_early_platform_setup(struct meminfo *mem_layout,
206 void *plat_info);
207void bl2u_plat_arch_setup(void);
208void bl2u_platform_setup(void);
209
210/*******************************************************************************
211 * Conditionally mandatory BL2U functions for CSS platforms.
212 ******************************************************************************/
213/*
214 * This function is used to perform any platform-specific actions required to
215 * handle the BL2U_SCP firmware.
216 */
217int bl2u_plat_handle_scp_bl2u(void);
218
219/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000220 * Mandatory BL31 functions
Dan Handleydec5e0d2014-05-15 14:11:36 +0100221 ******************************************************************************/
Soby Mathewa6f340f2018-01-09 14:36:14 +0000222void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
223 u_register_t arg2, u_register_t arg3);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100224void bl31_plat_arch_setup(void);
225void bl31_platform_setup(void);
Soby Mathew78e61612015-12-09 11:28:43 +0000226void bl31_plat_runtime_setup(void);
Dan Handley9865ac12014-05-27 16:17:21 +0100227struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100228
229/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000230 * Mandatory PSCI functions (BL31)
Dan Handleydec5e0d2014-05-15 14:11:36 +0100231 ******************************************************************************/
Soby Mathew67487842015-07-13 14:10:57 +0100232int plat_setup_psci_ops(uintptr_t sec_entrypoint,
Roberto Vargas9fb8af32018-02-12 12:36:17 +0000233 const struct plat_psci_ops **psci_ops);
Soby Mathew67487842015-07-13 14:10:57 +0100234const unsigned char *plat_get_power_domain_tree_desc(void);
235
236/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000237 * Optional PSCI functions (BL31).
Soby Mathew67487842015-07-13 14:10:57 +0100238 ******************************************************************************/
dp-arm04c1db12017-01-31 13:01:04 +0000239void plat_psci_stat_accounting_start(const psci_power_state_t *state_info);
240void plat_psci_stat_accounting_stop(const psci_power_state_t *state_info);
241u_register_t plat_psci_stat_get_residency(unsigned int lvl,
242 const psci_power_state_t *state_info,
Deepika Bhavnani5b33ad12019-12-13 10:23:18 -0600243 unsigned int last_cpu_idx);
Soby Mathew67487842015-07-13 14:10:57 +0100244plat_local_state_t plat_get_target_pwr_state(unsigned int lvl,
245 const plat_local_state_t *states,
246 unsigned int ncpu);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100247
248/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000249 * Optional BL31 functions (may be overridden)
Dan Handleydff8e472014-05-16 14:08:45 +0100250 ******************************************************************************/
Achin Guptaafff8cb2014-06-26 08:59:07 +0100251void bl31_plat_enable_mmu(uint32_t flags);
Dan Handleydff8e472014-05-16 14:08:45 +0100252
253/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000254 * Optional BL32 functions (may be overridden)
Dan Handleydff8e472014-05-16 14:08:45 +0100255 ******************************************************************************/
Achin Guptaafff8cb2014-06-26 08:59:07 +0100256void bl32_plat_enable_mmu(uint32_t flags);
Dan Handleydff8e472014-05-16 14:08:45 +0100257
Juan Castillo6eadf762015-01-07 10:39:25 +0000258/*******************************************************************************
Juan Castillo95cfd4a2015-04-14 12:49:03 +0100259 * Trusted Board Boot functions
Juan Castillo6eadf762015-01-07 10:39:25 +0000260 ******************************************************************************/
Juan Castillo95cfd4a2015-04-14 12:49:03 +0100261int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len,
262 unsigned int *flags);
Juan Castillo48279d52016-01-22 11:05:57 +0000263int plat_get_nv_ctr(void *cookie, unsigned int *nv_ctr);
264int plat_set_nv_ctr(void *cookie, unsigned int nv_ctr);
dp-armd35dee22016-12-12 14:48:13 +0000265int plat_set_nv_ctr2(void *cookie, const struct auth_img_desc_s *img_desc,
266 unsigned int nv_ctr);
Ambroise Vincent2374ab12019-04-10 12:50:27 +0100267int get_mbedtls_heap_helper(void **heap_addr, size_t *heap_size);
Juan Castillo6eadf762015-01-07 10:39:25 +0000268
Antonio Nino Diaz2fccb222017-10-24 10:07:35 +0100269/*******************************************************************************
270 * Secure Partitions functions
271 ******************************************************************************/
272const struct mmap_region *plat_get_secure_partition_mmap(void *cookie);
Paul Beesleyaeaa2252019-10-15 10:57:42 +0000273const struct spm_mm_boot_info *plat_get_secure_partition_boot_info(
Antonio Nino Diaz2fccb222017-10-24 10:07:35 +0100274 void *cookie);
Antonio Nino Diaze4583022018-10-30 11:12:42 +0000275int plat_spm_sp_rd_load(struct sp_res_desc *rd, const void *ptr, size_t size);
Antonio Nino Diaz680389a2018-11-27 08:36:02 +0000276int plat_spm_sp_get_next_address(void **sp_base, size_t *sp_size,
277 void **rd_base, size_t *rd_size);
Achin Gupta0cb64d02019-10-11 14:54:48 +0100278#if defined(SPD_spmd)
279int plat_spm_core_manifest_load(spmc_manifest_sect_attribute_t *manifest,
280 const void *ptr,
281 size_t size);
282#endif
Yatharth Kochar72600222016-09-12 16:08:41 +0100283/*******************************************************************************
284 * Mandatory BL image load functions(may be overridden).
285 ******************************************************************************/
286/*
287 * This function returns pointer to the list of images that the
288 * platform has populated to load.
289 */
290struct bl_load_info *plat_get_bl_image_load_info(void);
291
292/*
293 * This function returns a pointer to the shared memory that the
294 * platform has kept aside to pass trusted firmware related
295 * information that next BL image could need.
296 */
297struct bl_params *plat_get_next_bl_params(void);
298
299/*
300 * This function flushes to main memory all the params that are
301 * passed to next image.
302 */
303void plat_flush_next_bl_params(void);
304
Soby Mathew5c8babc2015-07-13 16:26:11 +0100305/*
306 * The below function enable Trusted Firmware components like SPDs which
307 * haven't migrated to the new platform API to compile on platforms which
308 * have the compatibility layer disabled.
309 */
Roberto Vargas7fabe1a2018-02-12 12:36:17 +0000310unsigned int platform_core_pos_helper(unsigned long mpidr);
Douglas Raillard51faada2017-02-24 18:14:15 +0000311
Antonio Nino Diaz2bc3dba2018-07-18 16:24:16 +0100312#endif /* PLATFORM_H */