Dan Handley | 5f0cdb0 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 1 | /* |
Tushar Khandelwal | f801fdc | 2024-04-22 15:35:40 +0100 | [diff] [blame] | 2 | * Copyright (c) 2013-2025, Arm Limited and Contributors. All rights reserved. |
Dan Handley | 5f0cdb0 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 3 | * |
dp-arm | 82cb2c1 | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Dan Handley | 5f0cdb0 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 5 | */ |
| 6 | |
Antonio Nino Diaz | 2bc3dba | 2018-07-18 16:24:16 +0100 | [diff] [blame] | 7 | #ifndef PLATFORM_H |
| 8 | #define PLATFORM_H |
Dan Handley | 5f0cdb0 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 9 | |
| 10 | #include <stdint.h> |
Dan Handley | 5f0cdb0 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 11 | |
Antonio Nino Diaz | 09d40e0 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 12 | #include <lib/psci/psci.h> |
Achin Gupta | 0cb64d0 | 2019-10-11 14:54:48 +0100 | [diff] [blame] | 13 | #if defined(SPD_spmd) |
AlexeiFedorov | a97bfa5 | 2022-12-14 17:28:11 +0000 | [diff] [blame] | 14 | #include <services/spm_core_manifest.h> |
Achin Gupta | 0cb64d0 | 2019-10-11 14:54:48 +0100 | [diff] [blame] | 15 | #endif |
Javier Almansa Sobrino | 1d0ca40 | 2022-04-25 17:18:15 +0100 | [diff] [blame] | 16 | #if ENABLE_RME |
| 17 | #include <services/rmm_core_manifest.h> |
Raghu Krishnamurthy | 6a88ec8 | 2024-06-03 19:02:29 -0700 | [diff] [blame] | 18 | #include <services/rmm_el3_token_sign.h> |
Javier Almansa Sobrino | 1d0ca40 | 2022-04-25 17:18:15 +0100 | [diff] [blame] | 19 | #endif |
Jayanth Dodderi Chidanand | 0b22e59 | 2022-10-11 17:16:07 +0100 | [diff] [blame] | 20 | #include <drivers/fwu/fwu_metadata.h> |
Jimmy Brisson | 7dfb991 | 2020-06-22 14:18:42 -0500 | [diff] [blame] | 21 | #if TRNG_SUPPORT |
| 22 | #include "plat_trng.h" |
Jayanth Dodderi Chidanand | 0b22e59 | 2022-10-11 17:16:07 +0100 | [diff] [blame] | 23 | #endif /* TRNG_SUPPORT */ |
Lucian Paul-Trifu | d72c486 | 2022-06-22 18:45:30 +0100 | [diff] [blame] | 24 | #if DRTM_SUPPORT |
| 25 | #include "plat_drtm.h" |
| 26 | #endif /* DRTM_SUPPORT */ |
Antonio Nino Diaz | 09d40e0 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 27 | |
Dan Handley | 5f0cdb0 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 28 | /******************************************************************************* |
| 29 | * Forward declarations |
| 30 | ******************************************************************************/ |
dp-arm | d35dee2 | 2016-12-12 14:48:13 +0000 | [diff] [blame] | 31 | struct auth_img_desc_s; |
Dan Handley | 5f0cdb0 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 32 | struct meminfo; |
| 33 | struct image_info; |
| 34 | struct entry_point_info; |
Yatharth Kochar | 7baff11 | 2015-10-09 18:06:13 +0100 | [diff] [blame] | 35 | struct image_desc; |
Yatharth Kochar | 7260022 | 2016-09-12 16:08:41 +0100 | [diff] [blame] | 36 | struct bl_load_info; |
| 37 | struct bl_params; |
Antonio Nino Diaz | 2fccb22 | 2017-10-24 10:07:35 +0100 | [diff] [blame] | 38 | struct mmap_region; |
Paul Beesley | aeaa225 | 2019-10-15 10:57:42 +0000 | [diff] [blame] | 39 | struct spm_mm_boot_info; |
Antonio Nino Diaz | e458302 | 2018-10-30 11:12:42 +0000 | [diff] [blame] | 40 | struct sp_res_desc; |
AlexeiFedorov | a97bfa5 | 2022-12-14 17:28:11 +0000 | [diff] [blame] | 41 | struct rmm_manifest; |
Sumit Garg | 2be57b8 | 2019-11-15 15:34:55 +0530 | [diff] [blame] | 42 | enum fw_enc_status_t; |
Dan Handley | 5f0cdb0 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 43 | |
| 44 | /******************************************************************************* |
Yann Gautier | a03dafe | 2024-04-10 12:03:33 +0200 | [diff] [blame] | 45 | * Structure populated by platform specific code to export routines which |
| 46 | * perform load images functions, and associated pointer to platform ops |
| 47 | ******************************************************************************/ |
| 48 | struct plat_try_images_ops { |
| 49 | int (*next_instance)(unsigned int image_id); |
| 50 | }; |
| 51 | |
| 52 | extern const struct plat_try_images_ops *plat_try_img_ops; |
| 53 | |
| 54 | /******************************************************************************* |
Juan Castillo | 95cfd4a | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 55 | * plat_get_rotpk_info() flags |
| 56 | ******************************************************************************/ |
| 57 | #define ROTPK_IS_HASH (1 << 0) |
Manish V Badarkhe | f1e693a | 2023-03-10 19:00:02 +0000 | [diff] [blame] | 58 | |
Soby Mathew | 04943d3 | 2016-05-24 15:05:15 +0100 | [diff] [blame] | 59 | /* Flag used to skip verification of the certificate ROTPK while the platform |
| 60 | ROTPK is not deployed */ |
| 61 | #define ROTPK_NOT_DEPLOYED (1 << 1) |
Juan Castillo | 95cfd4a | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 62 | |
Manish V Badarkhe | f1e693a | 2023-03-10 19:00:02 +0000 | [diff] [blame] | 63 | static inline bool is_rotpk_flags_valid(unsigned int flags) |
| 64 | { |
| 65 | unsigned int valid_flags = ROTPK_IS_HASH; |
| 66 | return (flags == ROTPK_NOT_DEPLOYED) || ((flags & ~valid_flags) == 0); |
| 67 | } |
| 68 | |
Juan Castillo | 95cfd4a | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 69 | /******************************************************************************* |
Sumit Garg | 7cda17b | 2019-11-15 10:43:00 +0530 | [diff] [blame] | 70 | * plat_get_enc_key_info() flags |
| 71 | ******************************************************************************/ |
| 72 | /* |
| 73 | * Flag used to notify caller that information provided in key buffer is an |
| 74 | * identifier rather than an actual key. |
| 75 | */ |
| 76 | #define ENC_KEY_IS_IDENTIFIER (1 << 0) |
| 77 | |
| 78 | /******************************************************************************* |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 79 | * Function declarations |
Dan Handley | 5f0cdb0 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 80 | ******************************************************************************/ |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 81 | /******************************************************************************* |
| 82 | * Mandatory common functions |
| 83 | ******************************************************************************/ |
Antonio Nino Diaz | d448639 | 2016-05-18 16:53:31 +0100 | [diff] [blame] | 84 | unsigned int plat_get_syscnt_freq2(void); |
| 85 | |
Juan Castillo | 16948ae | 2015-04-13 17:36:19 +0100 | [diff] [blame] | 86 | int plat_get_image_source(unsigned int image_id, |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 87 | uintptr_t *dev_handle, |
| 88 | uintptr_t *image_spec); |
Soby Mathew | a0ad601 | 2016-03-23 10:11:10 +0000 | [diff] [blame] | 89 | uintptr_t plat_get_ns_image_entrypoint(void); |
Soby Mathew | 6748784 | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 90 | unsigned int plat_my_core_pos(void); |
| 91 | int plat_core_pos_by_mpidr(u_register_t mpidr); |
Ambroise Vincent | 2374ab1 | 2019-04-10 12:50:27 +0100 | [diff] [blame] | 92 | int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size); |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 93 | |
Manish Pandey | e60c184 | 2023-10-27 11:45:44 +0100 | [diff] [blame] | 94 | /******************************************************************************* |
| 95 | * Simple routine to determine whether a mpidr is valid or not. |
| 96 | ******************************************************************************/ |
| 97 | static inline bool is_valid_mpidr(u_register_t mpidr) |
| 98 | { |
| 99 | int pos = plat_core_pos_by_mpidr(mpidr); |
| 100 | |
| 101 | if ((pos < 0) || ((unsigned int)pos >= PLATFORM_CORE_COUNT)) { |
| 102 | return false; |
| 103 | } |
| 104 | |
| 105 | return true; |
| 106 | } |
| 107 | |
Douglas Raillard | 51faada | 2017-02-24 18:14:15 +0000 | [diff] [blame] | 108 | #if STACK_PROTECTOR_ENABLED |
| 109 | /* |
| 110 | * Return a new value to be used for the stack protection's canary. |
| 111 | * |
| 112 | * Ideally, this value is a random number that is impossible to predict by an |
| 113 | * attacker. |
| 114 | */ |
| 115 | u_register_t plat_get_stack_protector_canary(void); |
| 116 | #endif /* STACK_PROTECTOR_ENABLED */ |
| 117 | |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 118 | /******************************************************************************* |
| 119 | * Mandatory interrupt management functions |
| 120 | ******************************************************************************/ |
Dan Handley | 9865ac1 | 2014-05-27 16:17:21 +0100 | [diff] [blame] | 121 | uint32_t plat_ic_get_pending_interrupt_id(void); |
| 122 | uint32_t plat_ic_get_pending_interrupt_type(void); |
| 123 | uint32_t plat_ic_acknowledge_interrupt(void); |
| 124 | uint32_t plat_ic_get_interrupt_type(uint32_t id); |
| 125 | void plat_ic_end_of_interrupt(uint32_t id); |
Dan Handley | 5f0cdb0 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 126 | uint32_t plat_interrupt_type_to_line(uint32_t type, |
| 127 | uint32_t security_state); |
| 128 | |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 129 | /******************************************************************************* |
Jeenu Viswambharan | eb68ea9 | 2017-09-22 08:32:09 +0100 | [diff] [blame] | 130 | * Optional interrupt management functions, depending on chosen EL3 components. |
| 131 | ******************************************************************************/ |
| 132 | unsigned int plat_ic_get_running_priority(void); |
Jeenu Viswambharan | ca43b55 | 2017-09-22 08:32:09 +0100 | [diff] [blame] | 133 | int plat_ic_is_spi(unsigned int id); |
| 134 | int plat_ic_is_ppi(unsigned int id); |
| 135 | int plat_ic_is_sgi(unsigned int id); |
Jeenu Viswambharan | cbd3f37 | 2017-09-22 08:32:09 +0100 | [diff] [blame] | 136 | unsigned int plat_ic_get_interrupt_active(unsigned int id); |
Jeenu Viswambharan | 979225f | 2017-09-22 08:32:09 +0100 | [diff] [blame] | 137 | void plat_ic_disable_interrupt(unsigned int id); |
| 138 | void plat_ic_enable_interrupt(unsigned int id); |
Madhukar Pappireddy | 1f6bb41 | 2023-09-06 16:50:22 -0500 | [diff] [blame] | 139 | bool plat_ic_has_interrupt_type(unsigned int type); |
Jeenu Viswambharan | 74dce7f | 2017-09-22 08:32:09 +0100 | [diff] [blame] | 140 | void plat_ic_set_interrupt_type(unsigned int id, unsigned int type); |
Jeenu Viswambharan | f3a8660 | 2017-09-22 08:32:09 +0100 | [diff] [blame] | 141 | void plat_ic_set_interrupt_priority(unsigned int id, unsigned int priority); |
Jeenu Viswambharan | 8db978b | 2017-09-22 08:32:09 +0100 | [diff] [blame] | 142 | void plat_ic_raise_el3_sgi(int sgi_num, u_register_t target); |
Florian Lugou | dcb31ff | 2021-09-08 12:40:24 +0200 | [diff] [blame] | 143 | void plat_ic_raise_ns_sgi(int sgi_num, u_register_t target); |
| 144 | void plat_ic_raise_s_el1_sgi(int sgi_num, u_register_t target); |
Jeenu Viswambharan | fc529fe | 2017-09-22 08:32:09 +0100 | [diff] [blame] | 145 | void plat_ic_set_spi_routing(unsigned int id, unsigned int routing_mode, |
| 146 | u_register_t mpidr); |
Jeenu Viswambharan | a2816a1 | 2017-09-22 08:32:09 +0100 | [diff] [blame] | 147 | void plat_ic_set_interrupt_pending(unsigned int id); |
| 148 | void plat_ic_clear_interrupt_pending(unsigned int id); |
Jeenu Viswambharan | d55a445 | 2017-09-22 08:32:09 +0100 | [diff] [blame] | 149 | unsigned int plat_ic_set_priority_mask(unsigned int mask); |
Arvind Ram Prakash | 24a4a0a | 2024-02-05 16:19:37 -0600 | [diff] [blame] | 150 | unsigned int plat_ic_deactivate_priority(unsigned int mask); |
Jeenu Viswambharan | 4ee8d0b | 2017-10-24 15:13:59 +0100 | [diff] [blame] | 151 | unsigned int plat_ic_get_interrupt_id(unsigned int raw); |
Jeenu Viswambharan | eb68ea9 | 2017-09-22 08:32:09 +0100 | [diff] [blame] | 152 | |
| 153 | /******************************************************************************* |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 154 | * Optional common functions (may be overridden) |
| 155 | ******************************************************************************/ |
Soby Mathew | 4c0d039 | 2016-06-16 14:52:04 +0100 | [diff] [blame] | 156 | uintptr_t plat_get_my_stack(void); |
Yatharth Kochar | 1a0a3f0 | 2016-06-28 16:58:26 +0100 | [diff] [blame] | 157 | void plat_report_exception(unsigned int exception_type); |
Yann Gautier | 6dc5979 | 2019-02-15 16:42:20 +0100 | [diff] [blame] | 158 | void plat_report_prefetch_abort(unsigned int fault_address); |
| 159 | void plat_report_data_abort(unsigned int fault_address); |
Sandrine Bailleux | 4480425 | 2014-08-06 11:27:23 +0100 | [diff] [blame] | 160 | int plat_crash_console_init(void); |
Soby Mathew | c67b09b | 2014-07-14 16:57:23 +0100 | [diff] [blame] | 161 | int plat_crash_console_putc(int c); |
Jimmy Brisson | 831b0e9 | 2020-08-05 13:44:05 -0500 | [diff] [blame] | 162 | void plat_crash_console_flush(void); |
Juan Castillo | 40fc6cd | 2015-09-25 15:41:14 +0100 | [diff] [blame] | 163 | void plat_error_handler(int err) __dead2; |
Antonio Nino Diaz | 1c3ea10 | 2016-02-01 13:57:25 +0000 | [diff] [blame] | 164 | void plat_panic_handler(void) __dead2; |
Manish V Badarkhe | 586f60c | 2022-07-12 21:48:04 +0100 | [diff] [blame] | 165 | void plat_system_reset(void) __dead2; |
Soby Mathew | 7f56e9a | 2017-09-04 11:49:29 +0100 | [diff] [blame] | 166 | const char *plat_log_get_prefix(unsigned int log_level); |
Roberto Vargas | 01f62b6 | 2017-09-26 12:53:01 +0100 | [diff] [blame] | 167 | void bl2_plat_preload_setup(void); |
Yann Gautier | a03dafe | 2024-04-10 12:03:33 +0200 | [diff] [blame] | 168 | void plat_setup_try_img_ops(const struct plat_try_images_ops *plat_try_ops); |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 169 | |
Manish V Badarkhe | 48ba034 | 2021-09-14 23:12:42 +0100 | [diff] [blame] | 170 | #if MEASURED_BOOT |
| 171 | int plat_mboot_measure_image(unsigned int image_id, image_info_t *image_data); |
Manish V Badarkhe | cf21064 | 2021-10-20 22:06:40 +0100 | [diff] [blame] | 172 | int plat_mboot_measure_critical_data(unsigned int critical_data_id, |
| 173 | const void *base, |
| 174 | size_t size); |
Manish V Badarkhe | 2971bad | 2023-04-11 16:12:33 +0100 | [diff] [blame] | 175 | int plat_mboot_measure_key(const void *pk_oid, const void *pk_ptr, |
| 176 | size_t pk_len); |
Manish V Badarkhe | 48ba034 | 2021-09-14 23:12:42 +0100 | [diff] [blame] | 177 | #else |
| 178 | static inline int plat_mboot_measure_image(unsigned int image_id __unused, |
| 179 | image_info_t *image_data __unused) |
| 180 | { |
| 181 | return 0; |
| 182 | } |
Manish V Badarkhe | cf21064 | 2021-10-20 22:06:40 +0100 | [diff] [blame] | 183 | static inline int plat_mboot_measure_critical_data( |
| 184 | unsigned int critical_data_id __unused, |
| 185 | const void *base __unused, |
| 186 | size_t size __unused) |
| 187 | { |
| 188 | return 0; |
| 189 | } |
Manish V Badarkhe | 2971bad | 2023-04-11 16:12:33 +0100 | [diff] [blame] | 190 | static inline int plat_mboot_measure_key(const void *pk_oid __unused, |
| 191 | const void *pk_ptr __unused, |
| 192 | size_t pk_len __unused) |
| 193 | { |
| 194 | return 0; |
| 195 | } |
Manish V Badarkhe | 48ba034 | 2021-09-14 23:12:42 +0100 | [diff] [blame] | 196 | #endif /* MEASURED_BOOT */ |
| 197 | |
Yann Gautier | ae770fe | 2024-01-16 19:39:31 +0100 | [diff] [blame] | 198 | #if EARLY_CONSOLE |
| 199 | void plat_setup_early_console(void); |
| 200 | #else |
| 201 | static inline void plat_setup_early_console(void) |
| 202 | { |
| 203 | } |
| 204 | #endif /* EARLY_CONSOLE */ |
| 205 | |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 206 | /******************************************************************************* |
| 207 | * Mandatory BL1 functions |
| 208 | ******************************************************************************/ |
Dan Handley | 5a06bb7 | 2014-08-04 11:41:20 +0100 | [diff] [blame] | 209 | void bl1_early_platform_setup(void); |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 210 | void bl1_plat_arch_setup(void); |
| 211 | void bl1_platform_setup(void); |
| 212 | struct meminfo *bl1_plat_sec_mem_layout(void); |
Dan Handley | 5f0cdb0 | 2014-05-14 17:44:19 +0100 | [diff] [blame] | 213 | |
Jeenu Viswambharan | b7cb133 | 2017-10-16 08:43:14 +0100 | [diff] [blame] | 214 | /******************************************************************************* |
| 215 | * Optional EL3 component functions in BL31 |
| 216 | ******************************************************************************/ |
| 217 | |
| 218 | /* SDEI platform functions */ |
| 219 | #if SDEI_SUPPORT |
Balint Dobszay | cbf9e84 | 2019-12-18 15:28:00 +0100 | [diff] [blame] | 220 | void plat_sdei_setup(void); |
Jeenu Viswambharan | b7cb133 | 2017-10-16 08:43:14 +0100 | [diff] [blame] | 221 | int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode); |
| 222 | void plat_sdei_handle_masked_trigger(uint64_t mpidr, unsigned int intr); |
| 223 | #endif |
| 224 | |
Pali Rohár | 30e8fa7 | 2021-06-21 17:22:27 +0200 | [diff] [blame] | 225 | void plat_default_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie, |
| 226 | void *handle, uint64_t flags); |
Jeenu Viswambharan | 76454ab | 2017-11-30 12:54:15 +0000 | [diff] [blame] | 227 | void plat_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie, |
| 228 | void *handle, uint64_t flags); |
| 229 | |
Yatharth Kochar | 48bfb88 | 2015-10-10 19:06:53 +0100 | [diff] [blame] | 230 | /* |
| 231 | * The following function is mandatory when the |
| 232 | * firmware update feature is used. |
| 233 | */ |
| 234 | int bl1_plat_mem_check(uintptr_t mem_base, unsigned int mem_size, |
| 235 | unsigned int flags); |
| 236 | |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 237 | /******************************************************************************* |
| 238 | * Optional BL1 functions (may be overridden) |
| 239 | ******************************************************************************/ |
Yatharth Kochar | 7baff11 | 2015-10-09 18:06:13 +0100 | [diff] [blame] | 240 | /* |
| 241 | * The following functions are used for image loading process in BL1. |
| 242 | */ |
| 243 | void bl1_plat_set_ep_info(unsigned int image_id, |
| 244 | struct entry_point_info *ep_info); |
Yatharth Kochar | 48bfb88 | 2015-10-10 19:06:53 +0100 | [diff] [blame] | 245 | /* |
| 246 | * The following functions are mandatory when firmware update |
| 247 | * feature is used and optional otherwise. |
| 248 | */ |
Yatharth Kochar | 7baff11 | 2015-10-09 18:06:13 +0100 | [diff] [blame] | 249 | unsigned int bl1_plat_get_next_image_id(void); |
| 250 | struct image_desc *bl1_plat_get_image_desc(unsigned int image_id); |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 251 | |
Yatharth Kochar | 48bfb88 | 2015-10-10 19:06:53 +0100 | [diff] [blame] | 252 | /* |
| 253 | * The following functions are used by firmware update |
| 254 | * feature and may optionally be overridden. |
| 255 | */ |
Dan Handley | 1f37b94 | 2015-12-15 14:28:24 +0000 | [diff] [blame] | 256 | __dead2 void bl1_plat_fwu_done(void *client_cookie, void *reserved); |
Yatharth Kochar | 48bfb88 | 2015-10-10 19:06:53 +0100 | [diff] [blame] | 257 | |
Masahiro Yamada | 11f001c | 2018-02-01 16:46:18 +0900 | [diff] [blame] | 258 | /* |
Soby Mathew | 566034f | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 259 | * This BL1 function can be used by the platforms to update/use image |
| 260 | * information for a given `image_id`. |
Masahiro Yamada | 11f001c | 2018-02-01 16:46:18 +0900 | [diff] [blame] | 261 | */ |
Soby Mathew | 566034f | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 262 | int bl1_plat_handle_pre_image_load(unsigned int image_id); |
| 263 | int bl1_plat_handle_post_image_load(unsigned int image_id); |
Yatharth Kochar | 48bfb88 | 2015-10-10 19:06:53 +0100 | [diff] [blame] | 264 | |
Harrison Mutai | 6a4da29 | 2024-01-04 16:18:47 +0000 | [diff] [blame] | 265 | /* Utility functions */ |
| 266 | void bl1_plat_calc_bl2_layout(const meminfo_t *bl1_mem_layout, |
| 267 | meminfo_t *bl2_mem_layout); |
| 268 | |
| 269 | #if MEASURED_BOOT |
Manish V Badarkhe | 48ba034 | 2021-09-14 23:12:42 +0100 | [diff] [blame] | 270 | void bl1_plat_mboot_init(void); |
| 271 | void bl1_plat_mboot_finish(void); |
| 272 | #else |
| 273 | static inline void bl1_plat_mboot_init(void) |
| 274 | { |
| 275 | } |
| 276 | static inline void bl1_plat_mboot_finish(void) |
| 277 | { |
| 278 | } |
Tamas Ban | e7f1181 | 2023-06-07 13:35:04 +0200 | [diff] [blame] | 279 | #endif /* MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENT */ |
Manish V Badarkhe | 48ba034 | 2021-09-14 23:12:42 +0100 | [diff] [blame] | 280 | |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 281 | /******************************************************************************* |
| 282 | * Mandatory BL2 functions |
| 283 | ******************************************************************************/ |
Soby Mathew | a6f340f | 2018-01-09 14:36:14 +0000 | [diff] [blame] | 284 | void bl2_early_platform_setup2(u_register_t arg0, u_register_t arg1, u_register_t arg2, u_register_t arg3); |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 285 | void bl2_plat_arch_setup(void); |
| 286 | void bl2_platform_setup(void); |
| 287 | struct meminfo *bl2_plat_sec_mem_layout(void); |
| 288 | |
Yatharth Kochar | 7260022 | 2016-09-12 16:08:41 +0100 | [diff] [blame] | 289 | /* |
| 290 | * This function can be used by the platforms to update/use image |
| 291 | * information for given `image_id`. |
| 292 | */ |
Masahiro Yamada | ba68ef5 | 2018-02-01 16:45:51 +0900 | [diff] [blame] | 293 | int bl2_plat_handle_pre_image_load(unsigned int image_id); |
Yatharth Kochar | 7260022 | 2016-09-12 16:08:41 +0100 | [diff] [blame] | 294 | int bl2_plat_handle_post_image_load(unsigned int image_id); |
| 295 | |
Sandrine Bailleux | 93d81d6 | 2014-06-24 14:19:36 +0100 | [diff] [blame] | 296 | /******************************************************************************* |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 297 | * Optional BL2 functions (may be overridden) |
| 298 | ******************************************************************************/ |
Tamas Ban | e7f1181 | 2023-06-07 13:35:04 +0200 | [diff] [blame] | 299 | #if (MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENT) |
Manish V Badarkhe | 47bf3ac | 2021-08-06 09:26:20 +0100 | [diff] [blame] | 300 | void bl2_plat_mboot_init(void); |
| 301 | void bl2_plat_mboot_finish(void); |
Raymond Mao | 4d8b4ca | 2024-11-14 13:28:36 -0800 | [diff] [blame] | 302 | #if TRANSFER_LIST |
| 303 | int plat_handoff_mboot(const void *data, uint32_t data_size, void *tl_base); |
| 304 | #else |
| 305 | static inline int |
| 306 | plat_handoff_mboot(__unused const void *data, __unused uint32_t data_size, |
| 307 | __unused void *tl_base) |
| 308 | { |
| 309 | return -1; |
| 310 | } |
| 311 | #endif |
Manish V Badarkhe | 47bf3ac | 2021-08-06 09:26:20 +0100 | [diff] [blame] | 312 | #else |
| 313 | static inline void bl2_plat_mboot_init(void) |
| 314 | { |
| 315 | } |
| 316 | static inline void bl2_plat_mboot_finish(void) |
| 317 | { |
| 318 | } |
Tamas Ban | e7f1181 | 2023-06-07 13:35:04 +0200 | [diff] [blame] | 319 | #endif /* MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENTs */ |
Roberto Vargas | b1d27b4 | 2017-10-30 14:43:43 +0000 | [diff] [blame] | 320 | |
| 321 | /******************************************************************************* |
Arvind Ram Prakash | 42d4d3b | 2022-11-22 14:41:00 -0600 | [diff] [blame] | 322 | * Mandatory BL2 at EL3 functions: Must be implemented |
| 323 | * if RESET_TO_BL2 image is supported |
Roberto Vargas | b1d27b4 | 2017-10-30 14:43:43 +0000 | [diff] [blame] | 324 | ******************************************************************************/ |
| 325 | void bl2_el3_early_platform_setup(u_register_t arg0, u_register_t arg1, |
| 326 | u_register_t arg2, u_register_t arg3); |
| 327 | void bl2_el3_plat_arch_setup(void); |
| 328 | |
Roberto Vargas | b1d27b4 | 2017-10-30 14:43:43 +0000 | [diff] [blame] | 329 | /******************************************************************************* |
| 330 | * Optional BL2 at EL3 functions (may be overridden) |
| 331 | ******************************************************************************/ |
| 332 | void bl2_el3_plat_prepare_exit(void); |
| 333 | |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 334 | /******************************************************************************* |
Yatharth Kochar | 9003fa0 | 2015-10-14 15:27:24 +0100 | [diff] [blame] | 335 | * Mandatory BL2U functions. |
| 336 | ******************************************************************************/ |
| 337 | void bl2u_early_platform_setup(struct meminfo *mem_layout, |
| 338 | void *plat_info); |
| 339 | void bl2u_plat_arch_setup(void); |
| 340 | void bl2u_platform_setup(void); |
| 341 | |
| 342 | /******************************************************************************* |
| 343 | * Conditionally mandatory BL2U functions for CSS platforms. |
| 344 | ******************************************************************************/ |
| 345 | /* |
| 346 | * This function is used to perform any platform-specific actions required to |
| 347 | * handle the BL2U_SCP firmware. |
| 348 | */ |
| 349 | int bl2u_plat_handle_scp_bl2u(void); |
| 350 | |
| 351 | /******************************************************************************* |
Juan Castillo | d178637 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 352 | * Mandatory BL31 functions |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 353 | ******************************************************************************/ |
Soby Mathew | a6f340f | 2018-01-09 14:36:14 +0000 | [diff] [blame] | 354 | void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, |
| 355 | u_register_t arg2, u_register_t arg3); |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 356 | void bl31_plat_arch_setup(void); |
| 357 | void bl31_platform_setup(void); |
Soby Mathew | 78e6161 | 2015-12-09 11:28:43 +0000 | [diff] [blame] | 358 | void bl31_plat_runtime_setup(void); |
Dan Handley | 9865ac1 | 2014-05-27 16:17:21 +0100 | [diff] [blame] | 359 | struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type); |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 360 | |
| 361 | /******************************************************************************* |
Juan Castillo | d178637 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 362 | * Mandatory PSCI functions (BL31) |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 363 | ******************************************************************************/ |
Soby Mathew | 6748784 | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 364 | int plat_setup_psci_ops(uintptr_t sec_entrypoint, |
Roberto Vargas | 9fb8af3 | 2018-02-12 12:36:17 +0000 | [diff] [blame] | 365 | const struct plat_psci_ops **psci_ops); |
Soby Mathew | 6748784 | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 366 | const unsigned char *plat_get_power_domain_tree_desc(void); |
| 367 | |
| 368 | /******************************************************************************* |
Juan Castillo | d178637 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 369 | * Optional PSCI functions (BL31). |
Soby Mathew | 6748784 | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 370 | ******************************************************************************/ |
dp-arm | 04c1db1 | 2017-01-31 13:01:04 +0000 | [diff] [blame] | 371 | void plat_psci_stat_accounting_start(const psci_power_state_t *state_info); |
| 372 | void plat_psci_stat_accounting_stop(const psci_power_state_t *state_info); |
| 373 | u_register_t plat_psci_stat_get_residency(unsigned int lvl, |
| 374 | const psci_power_state_t *state_info, |
Deepika Bhavnani | 5b33ad1 | 2019-12-13 10:23:18 -0600 | [diff] [blame] | 375 | unsigned int last_cpu_idx); |
Soby Mathew | 6748784 | 2015-07-13 14:10:57 +0100 | [diff] [blame] | 376 | plat_local_state_t plat_get_target_pwr_state(unsigned int lvl, |
| 377 | const plat_local_state_t *states, |
| 378 | unsigned int ncpu); |
Dan Handley | dec5e0d | 2014-05-15 14:11:36 +0100 | [diff] [blame] | 379 | |
| 380 | /******************************************************************************* |
Soby Mathew | 0f9159b | 2022-03-22 16:19:39 +0000 | [diff] [blame] | 381 | * Mandatory BL31 functions when ENABLE_RME=1 |
| 382 | ******************************************************************************/ |
Javier Almansa Sobrino | 1d0ca40 | 2022-04-25 17:18:15 +0100 | [diff] [blame] | 383 | #if ENABLE_RME |
Juan Pablo Conde | 42cf602 | 2024-07-10 14:33:42 -0500 | [diff] [blame] | 384 | |
Javier Almansa Sobrino | 8c980a4 | 2021-11-24 18:37:37 +0000 | [diff] [blame] | 385 | int plat_rmmd_get_cca_attest_token(uintptr_t buf, size_t *len, |
Juan Pablo Conde | 42cf602 | 2024-07-10 14:33:42 -0500 | [diff] [blame] | 386 | uintptr_t hash, size_t hash_size, |
| 387 | uint64_t *remaining_len); |
Javier Almansa Sobrino | 8c980a4 | 2021-11-24 18:37:37 +0000 | [diff] [blame] | 388 | int plat_rmmd_get_cca_realm_attest_key(uintptr_t buf, size_t *len, |
| 389 | unsigned int type); |
Raghu Krishnamurthy | 6a88ec8 | 2024-06-03 19:02:29 -0700 | [diff] [blame] | 390 | /* The following 3 functions are to be implement if |
| 391 | * RMMD_ENABLE_EL3_TOKEN_SIGN=1. |
| 392 | * The following three functions are expected to return E_RMM_* error codes. |
| 393 | */ |
| 394 | int plat_rmmd_el3_token_sign_get_rak_pub(uintptr_t buf, size_t *len, |
| 395 | unsigned int type); |
| 396 | int plat_rmmd_el3_token_sign_push_req( |
| 397 | const struct el3_token_sign_request *req); |
| 398 | int plat_rmmd_el3_token_sign_pull_resp(struct el3_token_sign_response *resp); |
Javier Almansa Sobrino | 8c980a4 | 2021-11-24 18:37:37 +0000 | [diff] [blame] | 399 | size_t plat_rmmd_get_el3_rmm_shared_mem(uintptr_t *shared); |
AlexeiFedorov | a97bfa5 | 2022-12-14 17:28:11 +0000 | [diff] [blame] | 400 | int plat_rmmd_load_manifest(struct rmm_manifest *manifest); |
Tushar Khandelwal | f801fdc | 2024-04-22 15:35:40 +0100 | [diff] [blame] | 401 | int plat_rmmd_mecid_key_update(uint16_t mecid); |
Juan Pablo Conde | 609ada9 | 2025-03-24 16:18:48 -0500 | [diff] [blame] | 402 | #endif /* ENABLE_RME */ |
Javier Almansa Sobrino | 1d0ca40 | 2022-04-25 17:18:15 +0100 | [diff] [blame] | 403 | |
Soby Mathew | 0f9159b | 2022-03-22 16:19:39 +0000 | [diff] [blame] | 404 | /******************************************************************************* |
Juan Castillo | d178637 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 405 | * Optional BL31 functions (may be overridden) |
Dan Handley | dff8e47 | 2014-05-16 14:08:45 +0100 | [diff] [blame] | 406 | ******************************************************************************/ |
Achin Gupta | afff8cb | 2014-06-26 08:59:07 +0100 | [diff] [blame] | 407 | void bl31_plat_enable_mmu(uint32_t flags); |
Dan Handley | dff8e47 | 2014-05-16 14:08:45 +0100 | [diff] [blame] | 408 | |
| 409 | /******************************************************************************* |
Juan Castillo | d178637 | 2015-12-14 09:35:25 +0000 | [diff] [blame] | 410 | * Optional BL32 functions (may be overridden) |
Dan Handley | dff8e47 | 2014-05-16 14:08:45 +0100 | [diff] [blame] | 411 | ******************************************************************************/ |
Achin Gupta | afff8cb | 2014-06-26 08:59:07 +0100 | [diff] [blame] | 412 | void bl32_plat_enable_mmu(uint32_t flags); |
Dan Handley | dff8e47 | 2014-05-16 14:08:45 +0100 | [diff] [blame] | 413 | |
Juan Castillo | 6eadf76 | 2015-01-07 10:39:25 +0000 | [diff] [blame] | 414 | /******************************************************************************* |
Juan Castillo | 95cfd4a | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 415 | * Trusted Board Boot functions |
Juan Castillo | 6eadf76 | 2015-01-07 10:39:25 +0000 | [diff] [blame] | 416 | ******************************************************************************/ |
Juan Castillo | 95cfd4a | 2015-04-14 12:49:03 +0100 | [diff] [blame] | 417 | int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len, |
| 418 | unsigned int *flags); |
Juan Castillo | 48279d5 | 2016-01-22 11:05:57 +0000 | [diff] [blame] | 419 | int plat_get_nv_ctr(void *cookie, unsigned int *nv_ctr); |
| 420 | int plat_set_nv_ctr(void *cookie, unsigned int nv_ctr); |
dp-arm | d35dee2 | 2016-12-12 14:48:13 +0000 | [diff] [blame] | 421 | int plat_set_nv_ctr2(void *cookie, const struct auth_img_desc_s *img_desc, |
| 422 | unsigned int nv_ctr); |
Ambroise Vincent | 2374ab1 | 2019-04-10 12:50:27 +0100 | [diff] [blame] | 423 | int get_mbedtls_heap_helper(void **heap_addr, size_t *heap_size); |
Sumit Garg | 2be57b8 | 2019-11-15 15:34:55 +0530 | [diff] [blame] | 424 | int plat_get_enc_key_info(enum fw_enc_status_t fw_enc_status, uint8_t *key, |
| 425 | size_t *key_len, unsigned int *flags, |
| 426 | const uint8_t *img_id, size_t img_id_len); |
Juan Castillo | 6eadf76 | 2015-01-07 10:39:25 +0000 | [diff] [blame] | 427 | |
Antonio Nino Diaz | 2fccb22 | 2017-10-24 10:07:35 +0100 | [diff] [blame] | 428 | /******************************************************************************* |
| 429 | * Secure Partitions functions |
| 430 | ******************************************************************************/ |
| 431 | const struct mmap_region *plat_get_secure_partition_mmap(void *cookie); |
Paul Beesley | aeaa225 | 2019-10-15 10:57:42 +0000 | [diff] [blame] | 432 | const struct spm_mm_boot_info *plat_get_secure_partition_boot_info( |
Antonio Nino Diaz | 2fccb22 | 2017-10-24 10:07:35 +0100 | [diff] [blame] | 433 | void *cookie); |
Antonio Nino Diaz | e458302 | 2018-10-30 11:12:42 +0000 | [diff] [blame] | 434 | int plat_spm_sp_rd_load(struct sp_res_desc *rd, const void *ptr, size_t size); |
Antonio Nino Diaz | 680389a | 2018-11-27 08:36:02 +0000 | [diff] [blame] | 435 | int plat_spm_sp_get_next_address(void **sp_base, size_t *sp_size, |
| 436 | void **rd_base, size_t *rd_size); |
Achin Gupta | 0cb64d0 | 2019-10-11 14:54:48 +0100 | [diff] [blame] | 437 | #if defined(SPD_spmd) |
Olivier Deprez | 5269694 | 2020-04-16 13:39:06 +0200 | [diff] [blame] | 438 | int plat_spm_core_manifest_load(spmc_manifest_attribute_t *manifest, |
Olivier Deprez | 23d5ba8 | 2020-02-07 15:44:43 +0100 | [diff] [blame] | 439 | const void *pm_addr); |
Achin Gupta | 0cb64d0 | 2019-10-11 14:54:48 +0100 | [diff] [blame] | 440 | #endif |
Marc Bonnici | 6a0788b | 2021-12-16 18:31:02 +0000 | [diff] [blame] | 441 | #if defined(SPMC_AT_EL3) |
| 442 | int plat_spmc_shmem_datastore_get(uint8_t **datastore, size_t *size); |
| 443 | #endif |
| 444 | |
Yatharth Kochar | 7260022 | 2016-09-12 16:08:41 +0100 | [diff] [blame] | 445 | /******************************************************************************* |
| 446 | * Mandatory BL image load functions(may be overridden). |
| 447 | ******************************************************************************/ |
| 448 | /* |
| 449 | * This function returns pointer to the list of images that the |
| 450 | * platform has populated to load. |
| 451 | */ |
| 452 | struct bl_load_info *plat_get_bl_image_load_info(void); |
| 453 | |
| 454 | /* |
| 455 | * This function returns a pointer to the shared memory that the |
| 456 | * platform has kept aside to pass trusted firmware related |
| 457 | * information that next BL image could need. |
| 458 | */ |
| 459 | struct bl_params *plat_get_next_bl_params(void); |
| 460 | |
| 461 | /* |
| 462 | * This function flushes to main memory all the params that are |
| 463 | * passed to next image. |
| 464 | */ |
| 465 | void plat_flush_next_bl_params(void); |
| 466 | |
Soby Mathew | 5c8babc | 2015-07-13 16:26:11 +0100 | [diff] [blame] | 467 | /* |
Manish V Badarkhe | 0e75343 | 2020-02-22 08:43:00 +0000 | [diff] [blame] | 468 | * Optional function to get SOC version |
| 469 | */ |
| 470 | int32_t plat_get_soc_version(void); |
| 471 | |
| 472 | /* |
| 473 | * Optional function to get SOC revision |
| 474 | */ |
| 475 | int32_t plat_get_soc_revision(void); |
| 476 | |
Manish V Badarkhe | 6f0a2f0 | 2020-07-23 20:23:01 +0100 | [diff] [blame] | 477 | /* |
| 478 | * Optional function to check for SMCCC function availability for platform |
| 479 | */ |
| 480 | int32_t plat_is_smccc_feature_available(u_register_t fid); |
| 481 | |
Manish V Badarkhe | efb2ced | 2021-06-20 21:04:49 +0100 | [diff] [blame] | 482 | /******************************************************************************* |
| 483 | * FWU platform specific functions |
| 484 | ******************************************************************************/ |
| 485 | int plat_fwu_set_metadata_image_source(unsigned int image_id, |
| 486 | uintptr_t *dev_handle, |
| 487 | uintptr_t *image_spec); |
Sughosh Ganu | 6aaf257 | 2021-11-17 17:08:10 +0530 | [diff] [blame] | 488 | void plat_fwu_set_images_source(const struct fwu_metadata *metadata); |
Sughosh Ganu | 40c175e | 2021-12-01 15:53:32 +0530 | [diff] [blame] | 489 | uint32_t plat_fwu_get_boot_idx(void); |
Manish V Badarkhe | efb2ced | 2021-06-20 21:04:49 +0100 | [diff] [blame] | 490 | |
Channagoud kadabi | 78fbb0e | 2022-11-29 16:03:47 -0800 | [diff] [blame] | 491 | /* |
| 492 | * Optional function to indicate if cache management operations can be |
| 493 | * performed. |
| 494 | */ |
| 495 | #if CONDITIONAL_CMO |
| 496 | uint64_t plat_can_cmo(void); |
| 497 | #else |
| 498 | static inline uint64_t plat_can_cmo(void) |
| 499 | { |
| 500 | return 1; |
| 501 | } |
| 502 | #endif /* CONDITIONAL_CMO */ |
| 503 | |
Antonio Nino Diaz | 2bc3dba | 2018-07-18 16:24:16 +0100 | [diff] [blame] | 504 | #endif /* PLATFORM_H */ |