blob: 5c4e0588d5070c6a1546238a2e5257cc55a181b0 [file] [log] [blame]
Dan Handley5f0cdb02014-05-14 17:44:19 +01001/*
dp-arm04c1db12017-01-31 13:01:04 +00002 * Copyright (c) 2013-2017, ARM Limited and Contributors. All rights reserved.
Dan Handley5f0cdb02014-05-14 17:44:19 +01003 *
dp-arm82cb2c12017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handley5f0cdb02014-05-14 17:44:19 +01005 */
6
7#ifndef __PLATFORM_H__
8#define __PLATFORM_H__
9
Soby Mathew67487842015-07-13 14:10:57 +010010#include <psci.h>
Dan Handley5f0cdb02014-05-14 17:44:19 +010011#include <stdint.h>
Soby Mathew67487842015-07-13 14:10:57 +010012#include <types.h>
Dan Handley5f0cdb02014-05-14 17:44:19 +010013
14
15/*******************************************************************************
16 * Forward declarations
17 ******************************************************************************/
dp-armd35dee22016-12-12 14:48:13 +000018struct auth_img_desc_s;
Dan Handley5f0cdb02014-05-14 17:44:19 +010019struct meminfo;
20struct image_info;
21struct entry_point_info;
Dan Handleydec5e0d2014-05-15 14:11:36 +010022struct bl31_params;
Yatharth Kochar7baff112015-10-09 18:06:13 +010023struct image_desc;
Yatharth Kochar72600222016-09-12 16:08:41 +010024struct bl_load_info;
25struct bl_params;
Dan Handley5f0cdb02014-05-14 17:44:19 +010026
27/*******************************************************************************
Juan Castillo95cfd4a2015-04-14 12:49:03 +010028 * plat_get_rotpk_info() flags
29 ******************************************************************************/
30#define ROTPK_IS_HASH (1 << 0)
Soby Mathew04943d32016-05-24 15:05:15 +010031/* Flag used to skip verification of the certificate ROTPK while the platform
32 ROTPK is not deployed */
33#define ROTPK_NOT_DEPLOYED (1 << 1)
Juan Castillo95cfd4a2015-04-14 12:49:03 +010034
35/*******************************************************************************
Dan Handleydec5e0d2014-05-15 14:11:36 +010036 * Function declarations
Dan Handley5f0cdb02014-05-14 17:44:19 +010037 ******************************************************************************/
Dan Handleydec5e0d2014-05-15 14:11:36 +010038/*******************************************************************************
39 * Mandatory common functions
40 ******************************************************************************/
Antonio Nino Diazd4486392016-05-18 16:53:31 +010041unsigned long long plat_get_syscnt_freq(void) __deprecated;
42unsigned int plat_get_syscnt_freq2(void);
43
Juan Castillo16948ae2015-04-13 17:36:19 +010044int plat_get_image_source(unsigned int image_id,
Dan Handleydec5e0d2014-05-15 14:11:36 +010045 uintptr_t *dev_handle,
46 uintptr_t *image_spec);
Soby Mathewa0ad6012016-03-23 10:11:10 +000047uintptr_t plat_get_ns_image_entrypoint(void);
Soby Mathew67487842015-07-13 14:10:57 +010048unsigned int plat_my_core_pos(void);
49int plat_core_pos_by_mpidr(u_register_t mpidr);
Dan Handleydec5e0d2014-05-15 14:11:36 +010050
Douglas Raillard51faada2017-02-24 18:14:15 +000051#if STACK_PROTECTOR_ENABLED
52/*
53 * Return a new value to be used for the stack protection's canary.
54 *
55 * Ideally, this value is a random number that is impossible to predict by an
56 * attacker.
57 */
58u_register_t plat_get_stack_protector_canary(void);
59#endif /* STACK_PROTECTOR_ENABLED */
60
Dan Handleydec5e0d2014-05-15 14:11:36 +010061/*******************************************************************************
62 * Mandatory interrupt management functions
63 ******************************************************************************/
Dan Handley9865ac12014-05-27 16:17:21 +010064uint32_t plat_ic_get_pending_interrupt_id(void);
65uint32_t plat_ic_get_pending_interrupt_type(void);
66uint32_t plat_ic_acknowledge_interrupt(void);
67uint32_t plat_ic_get_interrupt_type(uint32_t id);
68void plat_ic_end_of_interrupt(uint32_t id);
Dan Handley5f0cdb02014-05-14 17:44:19 +010069uint32_t plat_interrupt_type_to_line(uint32_t type,
70 uint32_t security_state);
71
Dan Handleydec5e0d2014-05-15 14:11:36 +010072/*******************************************************************************
Jeenu Viswambharaneb68ea92017-09-22 08:32:09 +010073 * Optional interrupt management functions, depending on chosen EL3 components.
74 ******************************************************************************/
75unsigned int plat_ic_get_running_priority(void);
Jeenu Viswambharanca43b552017-09-22 08:32:09 +010076int plat_ic_is_spi(unsigned int id);
77int plat_ic_is_ppi(unsigned int id);
78int plat_ic_is_sgi(unsigned int id);
Jeenu Viswambharancbd3f372017-09-22 08:32:09 +010079unsigned int plat_ic_get_interrupt_active(unsigned int id);
Jeenu Viswambharan979225f2017-09-22 08:32:09 +010080void plat_ic_disable_interrupt(unsigned int id);
81void plat_ic_enable_interrupt(unsigned int id);
Jeenu Viswambharan74dce7f2017-09-22 08:32:09 +010082int plat_ic_has_interrupt_type(unsigned int type);
83void plat_ic_set_interrupt_type(unsigned int id, unsigned int type);
Jeenu Viswambharanf3a86602017-09-22 08:32:09 +010084void plat_ic_set_interrupt_priority(unsigned int id, unsigned int priority);
Jeenu Viswambharan8db978b2017-09-22 08:32:09 +010085void plat_ic_raise_el3_sgi(int sgi_num, u_register_t target);
Jeenu Viswambharanfc529fe2017-09-22 08:32:09 +010086void plat_ic_set_spi_routing(unsigned int id, unsigned int routing_mode,
87 u_register_t mpidr);
Jeenu Viswambharaneb68ea92017-09-22 08:32:09 +010088
89/*******************************************************************************
Dan Handleydec5e0d2014-05-15 14:11:36 +010090 * Optional common functions (may be overridden)
91 ******************************************************************************/
Soby Mathew4c0d0392016-06-16 14:52:04 +010092uintptr_t plat_get_my_stack(void);
Yatharth Kochar1a0a3f02016-06-28 16:58:26 +010093void plat_report_exception(unsigned int exception_type);
Sandrine Bailleux44804252014-08-06 11:27:23 +010094int plat_crash_console_init(void);
Soby Mathewc67b09b2014-07-14 16:57:23 +010095int plat_crash_console_putc(int c);
Antonio Nino Diaz801cf932017-02-17 17:11:27 +000096int plat_crash_console_flush(void);
Juan Castillo40fc6cd2015-09-25 15:41:14 +010097void plat_error_handler(int err) __dead2;
Antonio Nino Diaz1c3ea102016-02-01 13:57:25 +000098void plat_panic_handler(void) __dead2;
Soby Mathew7f56e9a2017-09-04 11:49:29 +010099const char *plat_log_get_prefix(unsigned int log_level);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100100
101/*******************************************************************************
102 * Mandatory BL1 functions
103 ******************************************************************************/
Dan Handley5a06bb72014-08-04 11:41:20 +0100104void bl1_early_platform_setup(void);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100105void bl1_plat_arch_setup(void);
106void bl1_platform_setup(void);
107struct meminfo *bl1_plat_sec_mem_layout(void);
Dan Handley5f0cdb02014-05-14 17:44:19 +0100108
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100109/*
110 * The following function is mandatory when the
111 * firmware update feature is used.
112 */
113int bl1_plat_mem_check(uintptr_t mem_base, unsigned int mem_size,
114 unsigned int flags);
115
Dan Handleydec5e0d2014-05-15 14:11:36 +0100116/*******************************************************************************
117 * Optional BL1 functions (may be overridden)
118 ******************************************************************************/
Sandrine Bailleux8f55dfb2014-06-24 14:02:34 +0100119void bl1_init_bl2_mem_layout(const struct meminfo *bl1_mem_layout,
120 struct meminfo *bl2_mem_layout);
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100121
Yatharth Kochar7baff112015-10-09 18:06:13 +0100122/*
123 * The following functions are used for image loading process in BL1.
124 */
125void bl1_plat_set_ep_info(unsigned int image_id,
126 struct entry_point_info *ep_info);
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100127/*
128 * The following functions are mandatory when firmware update
129 * feature is used and optional otherwise.
130 */
Yatharth Kochar7baff112015-10-09 18:06:13 +0100131unsigned int bl1_plat_get_next_image_id(void);
132struct image_desc *bl1_plat_get_image_desc(unsigned int image_id);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100133
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100134/*
135 * The following functions are used by firmware update
136 * feature and may optionally be overridden.
137 */
Dan Handley1f37b942015-12-15 14:28:24 +0000138__dead2 void bl1_plat_fwu_done(void *client_cookie, void *reserved);
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100139
140
Dan Handleydec5e0d2014-05-15 14:11:36 +0100141/*******************************************************************************
142 * Mandatory BL2 functions
143 ******************************************************************************/
Dan Handley5a06bb72014-08-04 11:41:20 +0100144void bl2_early_platform_setup(struct meminfo *mem_layout);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100145void bl2_plat_arch_setup(void);
146void bl2_platform_setup(void);
147struct meminfo *bl2_plat_sec_mem_layout(void);
148
Yatharth Kochar72600222016-09-12 16:08:41 +0100149#if LOAD_IMAGE_V2
150/*
151 * This function can be used by the platforms to update/use image
152 * information for given `image_id`.
153 */
154int bl2_plat_handle_post_image_load(unsigned int image_id);
155
156#else /* LOAD_IMAGE_V2 */
157
Dan Handleydec5e0d2014-05-15 14:11:36 +0100158/*
159 * This function returns a pointer to the shared memory that the platform has
Juan Castillod1786372015-12-14 09:35:25 +0000160 * kept aside to pass trusted firmware related information that BL31
Dan Handleydec5e0d2014-05-15 14:11:36 +0100161 * could need
162 */
163struct bl31_params *bl2_plat_get_bl31_params(void);
164
165/*
166 * This function returns a pointer to the shared memory that the platform
167 * has kept to point to entry point information of BL31 to BL2
168 */
169struct entry_point_info *bl2_plat_get_bl31_ep_info(void);
170
171/*
172 * This function flushes to main memory all the params that are
Juan Castillod1786372015-12-14 09:35:25 +0000173 * passed to BL31
Dan Handleydec5e0d2014-05-15 14:11:36 +0100174 */
175void bl2_plat_flush_bl31_params(void);
176
Dan Handley5f0cdb02014-05-14 17:44:19 +0100177/*
Sandrine Bailleux93d81d62014-06-24 14:19:36 +0100178 * The next 2 functions allow the platform to change the entrypoint information
Juan Castillod1786372015-12-14 09:35:25 +0000179 * for the mandatory 3rd level BL images, BL31 and BL33. This is done after
180 * BL2 has loaded those images into memory but before BL31 is executed.
Dan Handley5f0cdb02014-05-14 17:44:19 +0100181 */
182void bl2_plat_set_bl31_ep_info(struct image_info *image,
183 struct entry_point_info *ep);
184
Dan Handley5f0cdb02014-05-14 17:44:19 +0100185void bl2_plat_set_bl33_ep_info(struct image_info *image,
186 struct entry_point_info *ep);
187
Juan Castillod1786372015-12-14 09:35:25 +0000188/* Gets the memory layout for BL33 */
Dan Handley5f0cdb02014-05-14 17:44:19 +0100189void bl2_plat_get_bl33_meminfo(struct meminfo *mem_info);
190
Dan Handleydec5e0d2014-05-15 14:11:36 +0100191/*******************************************************************************
Juan Castillof59821d2015-12-10 15:49:17 +0000192 * Conditionally mandatory BL2 functions: must be implemented if SCP_BL2 image
Sandrine Bailleux93d81d62014-06-24 14:19:36 +0100193 * is supported
194 ******************************************************************************/
Juan Castillof59821d2015-12-10 15:49:17 +0000195/* Gets the memory layout for SCP_BL2 */
196void bl2_plat_get_scp_bl2_meminfo(struct meminfo *mem_info);
Sandrine Bailleux93d81d62014-06-24 14:19:36 +0100197
198/*
Juan Castillof59821d2015-12-10 15:49:17 +0000199 * This function is called after loading SCP_BL2 image and it is used to perform
Sandrine Bailleux93d81d62014-06-24 14:19:36 +0100200 * any platform-specific actions required to handle the SCP firmware.
201 */
Juan Castillof59821d2015-12-10 15:49:17 +0000202int bl2_plat_handle_scp_bl2(struct image_info *scp_bl2_image_info);
Sandrine Bailleux93d81d62014-06-24 14:19:36 +0100203
204/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000205 * Conditionally mandatory BL2 functions: must be implemented if BL32 image
Sandrine Bailleux93d81d62014-06-24 14:19:36 +0100206 * is supported
207 ******************************************************************************/
208void bl2_plat_set_bl32_ep_info(struct image_info *image,
209 struct entry_point_info *ep);
210
Juan Castillod1786372015-12-14 09:35:25 +0000211/* Gets the memory layout for BL32 */
Sandrine Bailleux93d81d62014-06-24 14:19:36 +0100212void bl2_plat_get_bl32_meminfo(struct meminfo *mem_info);
213
Yatharth Kochar72600222016-09-12 16:08:41 +0100214#endif /* LOAD_IMAGE_V2 */
215
Sandrine Bailleux93d81d62014-06-24 14:19:36 +0100216/*******************************************************************************
Dan Handleydec5e0d2014-05-15 14:11:36 +0100217 * Optional BL2 functions (may be overridden)
218 ******************************************************************************/
219
220/*******************************************************************************
Yatharth Kochar9003fa02015-10-14 15:27:24 +0100221 * Mandatory BL2U functions.
222 ******************************************************************************/
223void bl2u_early_platform_setup(struct meminfo *mem_layout,
224 void *plat_info);
225void bl2u_plat_arch_setup(void);
226void bl2u_platform_setup(void);
227
228/*******************************************************************************
229 * Conditionally mandatory BL2U functions for CSS platforms.
230 ******************************************************************************/
231/*
232 * This function is used to perform any platform-specific actions required to
233 * handle the BL2U_SCP firmware.
234 */
235int bl2u_plat_handle_scp_bl2u(void);
236
237/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000238 * Mandatory BL31 functions
Dan Handleydec5e0d2014-05-15 14:11:36 +0100239 ******************************************************************************/
Yatharth Kochar72600222016-09-12 16:08:41 +0100240#if LOAD_IMAGE_V2
241void bl31_early_platform_setup(void *from_bl2,
242 void *plat_params_from_bl2);
243#else
Dan Handleydec5e0d2014-05-15 14:11:36 +0100244void bl31_early_platform_setup(struct bl31_params *from_bl2,
245 void *plat_params_from_bl2);
Yatharth Kochar72600222016-09-12 16:08:41 +0100246#endif
Dan Handleydec5e0d2014-05-15 14:11:36 +0100247void bl31_plat_arch_setup(void);
248void bl31_platform_setup(void);
Soby Mathew78e61612015-12-09 11:28:43 +0000249void bl31_plat_runtime_setup(void);
Dan Handley9865ac12014-05-27 16:17:21 +0100250struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100251
252/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000253 * Mandatory PSCI functions (BL31)
Dan Handleydec5e0d2014-05-15 14:11:36 +0100254 ******************************************************************************/
Soby Mathew67487842015-07-13 14:10:57 +0100255int plat_setup_psci_ops(uintptr_t sec_entrypoint,
256 const struct plat_psci_ops **);
257const unsigned char *plat_get_power_domain_tree_desc(void);
258
259/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000260 * Optional PSCI functions (BL31).
Soby Mathew67487842015-07-13 14:10:57 +0100261 ******************************************************************************/
dp-arm04c1db12017-01-31 13:01:04 +0000262void plat_psci_stat_accounting_start(const psci_power_state_t *state_info);
263void plat_psci_stat_accounting_stop(const psci_power_state_t *state_info);
264u_register_t plat_psci_stat_get_residency(unsigned int lvl,
265 const psci_power_state_t *state_info,
266 int last_cpu_index);
Soby Mathew67487842015-07-13 14:10:57 +0100267plat_local_state_t plat_get_target_pwr_state(unsigned int lvl,
268 const plat_local_state_t *states,
269 unsigned int ncpu);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100270
271/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000272 * Optional BL31 functions (may be overridden)
Dan Handleydff8e472014-05-16 14:08:45 +0100273 ******************************************************************************/
Achin Guptaafff8cb2014-06-26 08:59:07 +0100274void bl31_plat_enable_mmu(uint32_t flags);
Dan Handleydff8e472014-05-16 14:08:45 +0100275
276/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000277 * Optional BL32 functions (may be overridden)
Dan Handleydff8e472014-05-16 14:08:45 +0100278 ******************************************************************************/
Achin Guptaafff8cb2014-06-26 08:59:07 +0100279void bl32_plat_enable_mmu(uint32_t flags);
Dan Handleydff8e472014-05-16 14:08:45 +0100280
Juan Castillo6eadf762015-01-07 10:39:25 +0000281/*******************************************************************************
Juan Castillo95cfd4a2015-04-14 12:49:03 +0100282 * Trusted Board Boot functions
Juan Castillo6eadf762015-01-07 10:39:25 +0000283 ******************************************************************************/
Juan Castillo95cfd4a2015-04-14 12:49:03 +0100284int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len,
285 unsigned int *flags);
Juan Castillo48279d52016-01-22 11:05:57 +0000286int plat_get_nv_ctr(void *cookie, unsigned int *nv_ctr);
287int plat_set_nv_ctr(void *cookie, unsigned int nv_ctr);
dp-armd35dee22016-12-12 14:48:13 +0000288int plat_set_nv_ctr2(void *cookie, const struct auth_img_desc_s *img_desc,
289 unsigned int nv_ctr);
Juan Castillo6eadf762015-01-07 10:39:25 +0000290
Yatharth Kochar72600222016-09-12 16:08:41 +0100291#if LOAD_IMAGE_V2
292/*******************************************************************************
293 * Mandatory BL image load functions(may be overridden).
294 ******************************************************************************/
295/*
296 * This function returns pointer to the list of images that the
297 * platform has populated to load.
298 */
299struct bl_load_info *plat_get_bl_image_load_info(void);
300
301/*
302 * This function returns a pointer to the shared memory that the
303 * platform has kept aside to pass trusted firmware related
304 * information that next BL image could need.
305 */
306struct bl_params *plat_get_next_bl_params(void);
307
308/*
309 * This function flushes to main memory all the params that are
310 * passed to next image.
311 */
312void plat_flush_next_bl_params(void);
313
314#endif /* LOAD_IMAGE_V2 */
315
Soby Mathew67487842015-07-13 14:10:57 +0100316#if ENABLE_PLAT_COMPAT
317/*
318 * The below declarations are to enable compatibility for the platform ports
319 * using the old platform interface.
320 */
321
322/*******************************************************************************
323 * Optional common functions (may be overridden)
324 ******************************************************************************/
325unsigned int platform_get_core_pos(unsigned long mpidr);
326
327/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000328 * Mandatory PSCI Compatibility functions (BL31)
Soby Mathew67487842015-07-13 14:10:57 +0100329 ******************************************************************************/
330int platform_setup_pm(const plat_pm_ops_t **);
331
332unsigned int plat_get_aff_count(unsigned int, unsigned long);
333unsigned int plat_get_aff_state(unsigned int, unsigned long);
Douglas Raillard51faada2017-02-24 18:14:15 +0000334#else /* __ENABLE_PLAT_COMPAT__ */
Soby Mathew5c8babc2015-07-13 16:26:11 +0100335/*
336 * The below function enable Trusted Firmware components like SPDs which
337 * haven't migrated to the new platform API to compile on platforms which
338 * have the compatibility layer disabled.
339 */
Soren Brinkmann70ecb562016-01-14 10:02:33 -0800340unsigned int platform_get_core_pos(unsigned long mpidr) __deprecated;
Soby Mathew67487842015-07-13 14:10:57 +0100341
Soby Mathew5c8babc2015-07-13 16:26:11 +0100342#endif /* __ENABLE_PLAT_COMPAT__ */
Douglas Raillard51faada2017-02-24 18:14:15 +0000343
Dan Handley5f0cdb02014-05-14 17:44:19 +0100344#endif /* __PLATFORM_H__ */
Douglas Raillard51faada2017-02-24 18:14:15 +0000345