blob: 09fce82135e31138dcf6a2d13af77a1a23746668 [file] [log] [blame]
Dan Handley5f0cdb02014-05-14 17:44:19 +01001/*
Arvind Ram Prakash24a4a0a2024-02-05 16:19:37 -06002 * Copyright (c) 2013-2024, Arm Limited and Contributors. All rights reserved.
Dan Handley5f0cdb02014-05-14 17:44:19 +01003 *
dp-arm82cb2c12017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handley5f0cdb02014-05-14 17:44:19 +01005 */
6
Antonio Nino Diaz2bc3dba2018-07-18 16:24:16 +01007#ifndef PLATFORM_H
8#define PLATFORM_H
Dan Handley5f0cdb02014-05-14 17:44:19 +01009
10#include <stdint.h>
Dan Handley5f0cdb02014-05-14 17:44:19 +010011
Antonio Nino Diaz09d40e02018-12-14 00:18:21 +000012#include <lib/psci/psci.h>
Achin Gupta0cb64d02019-10-11 14:54:48 +010013#if defined(SPD_spmd)
AlexeiFedorova97bfa52022-12-14 17:28:11 +000014#include <services/spm_core_manifest.h>
Achin Gupta0cb64d02019-10-11 14:54:48 +010015#endif
Javier Almansa Sobrino1d0ca402022-04-25 17:18:15 +010016#if ENABLE_RME
17#include <services/rmm_core_manifest.h>
18#endif
Jayanth Dodderi Chidanand0b22e592022-10-11 17:16:07 +010019#include <drivers/fwu/fwu_metadata.h>
Jimmy Brisson7dfb9912020-06-22 14:18:42 -050020#if TRNG_SUPPORT
21#include "plat_trng.h"
Jayanth Dodderi Chidanand0b22e592022-10-11 17:16:07 +010022#endif /* TRNG_SUPPORT */
Lucian Paul-Trifud72c4862022-06-22 18:45:30 +010023#if DRTM_SUPPORT
24#include "plat_drtm.h"
25#endif /* DRTM_SUPPORT */
Antonio Nino Diaz09d40e02018-12-14 00:18:21 +000026
Dan Handley5f0cdb02014-05-14 17:44:19 +010027/*******************************************************************************
28 * Forward declarations
29 ******************************************************************************/
dp-armd35dee22016-12-12 14:48:13 +000030struct auth_img_desc_s;
Dan Handley5f0cdb02014-05-14 17:44:19 +010031struct meminfo;
32struct image_info;
33struct entry_point_info;
Yatharth Kochar7baff112015-10-09 18:06:13 +010034struct image_desc;
Yatharth Kochar72600222016-09-12 16:08:41 +010035struct bl_load_info;
36struct bl_params;
Antonio Nino Diaz2fccb222017-10-24 10:07:35 +010037struct mmap_region;
Paul Beesleyaeaa2252019-10-15 10:57:42 +000038struct spm_mm_boot_info;
Antonio Nino Diaze4583022018-10-30 11:12:42 +000039struct sp_res_desc;
AlexeiFedorova97bfa52022-12-14 17:28:11 +000040struct rmm_manifest;
Sumit Garg2be57b82019-11-15 15:34:55 +053041enum fw_enc_status_t;
Dan Handley5f0cdb02014-05-14 17:44:19 +010042
43/*******************************************************************************
Juan Castillo95cfd4a2015-04-14 12:49:03 +010044 * plat_get_rotpk_info() flags
45 ******************************************************************************/
46#define ROTPK_IS_HASH (1 << 0)
Manish V Badarkhef1e693a2023-03-10 19:00:02 +000047
Soby Mathew04943d32016-05-24 15:05:15 +010048/* Flag used to skip verification of the certificate ROTPK while the platform
49 ROTPK is not deployed */
50#define ROTPK_NOT_DEPLOYED (1 << 1)
Juan Castillo95cfd4a2015-04-14 12:49:03 +010051
Manish V Badarkhef1e693a2023-03-10 19:00:02 +000052static inline bool is_rotpk_flags_valid(unsigned int flags)
53{
54 unsigned int valid_flags = ROTPK_IS_HASH;
55 return (flags == ROTPK_NOT_DEPLOYED) || ((flags & ~valid_flags) == 0);
56}
57
Juan Castillo95cfd4a2015-04-14 12:49:03 +010058/*******************************************************************************
Sumit Garg7cda17b2019-11-15 10:43:00 +053059 * plat_get_enc_key_info() flags
60 ******************************************************************************/
61/*
62 * Flag used to notify caller that information provided in key buffer is an
63 * identifier rather than an actual key.
64 */
65#define ENC_KEY_IS_IDENTIFIER (1 << 0)
66
67/*******************************************************************************
Dan Handleydec5e0d2014-05-15 14:11:36 +010068 * Function declarations
Dan Handley5f0cdb02014-05-14 17:44:19 +010069 ******************************************************************************/
Dan Handleydec5e0d2014-05-15 14:11:36 +010070/*******************************************************************************
71 * Mandatory common functions
72 ******************************************************************************/
Antonio Nino Diazd4486392016-05-18 16:53:31 +010073unsigned int plat_get_syscnt_freq2(void);
74
Juan Castillo16948ae2015-04-13 17:36:19 +010075int plat_get_image_source(unsigned int image_id,
Dan Handleydec5e0d2014-05-15 14:11:36 +010076 uintptr_t *dev_handle,
77 uintptr_t *image_spec);
Soby Mathewa0ad6012016-03-23 10:11:10 +000078uintptr_t plat_get_ns_image_entrypoint(void);
Soby Mathew67487842015-07-13 14:10:57 +010079unsigned int plat_my_core_pos(void);
80int plat_core_pos_by_mpidr(u_register_t mpidr);
Ambroise Vincent2374ab12019-04-10 12:50:27 +010081int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size);
Dan Handleydec5e0d2014-05-15 14:11:36 +010082
Manish Pandeye60c1842023-10-27 11:45:44 +010083/*******************************************************************************
84 * Simple routine to determine whether a mpidr is valid or not.
85 ******************************************************************************/
86static inline bool is_valid_mpidr(u_register_t mpidr)
87{
88 int pos = plat_core_pos_by_mpidr(mpidr);
89
90 if ((pos < 0) || ((unsigned int)pos >= PLATFORM_CORE_COUNT)) {
91 return false;
92 }
93
94 return true;
95}
96
Douglas Raillard51faada2017-02-24 18:14:15 +000097#if STACK_PROTECTOR_ENABLED
98/*
99 * Return a new value to be used for the stack protection's canary.
100 *
101 * Ideally, this value is a random number that is impossible to predict by an
102 * attacker.
103 */
104u_register_t plat_get_stack_protector_canary(void);
105#endif /* STACK_PROTECTOR_ENABLED */
106
Dan Handleydec5e0d2014-05-15 14:11:36 +0100107/*******************************************************************************
108 * Mandatory interrupt management functions
109 ******************************************************************************/
Dan Handley9865ac12014-05-27 16:17:21 +0100110uint32_t plat_ic_get_pending_interrupt_id(void);
111uint32_t plat_ic_get_pending_interrupt_type(void);
112uint32_t plat_ic_acknowledge_interrupt(void);
113uint32_t plat_ic_get_interrupt_type(uint32_t id);
114void plat_ic_end_of_interrupt(uint32_t id);
Dan Handley5f0cdb02014-05-14 17:44:19 +0100115uint32_t plat_interrupt_type_to_line(uint32_t type,
116 uint32_t security_state);
117
Dan Handleydec5e0d2014-05-15 14:11:36 +0100118/*******************************************************************************
Jeenu Viswambharaneb68ea92017-09-22 08:32:09 +0100119 * Optional interrupt management functions, depending on chosen EL3 components.
120 ******************************************************************************/
121unsigned int plat_ic_get_running_priority(void);
Jeenu Viswambharanca43b552017-09-22 08:32:09 +0100122int plat_ic_is_spi(unsigned int id);
123int plat_ic_is_ppi(unsigned int id);
124int plat_ic_is_sgi(unsigned int id);
Jeenu Viswambharancbd3f372017-09-22 08:32:09 +0100125unsigned int plat_ic_get_interrupt_active(unsigned int id);
Jeenu Viswambharan979225f2017-09-22 08:32:09 +0100126void plat_ic_disable_interrupt(unsigned int id);
127void plat_ic_enable_interrupt(unsigned int id);
Madhukar Pappireddy1f6bb412023-09-06 16:50:22 -0500128bool plat_ic_has_interrupt_type(unsigned int type);
Jeenu Viswambharan74dce7f2017-09-22 08:32:09 +0100129void plat_ic_set_interrupt_type(unsigned int id, unsigned int type);
Jeenu Viswambharanf3a86602017-09-22 08:32:09 +0100130void plat_ic_set_interrupt_priority(unsigned int id, unsigned int priority);
Jeenu Viswambharan8db978b2017-09-22 08:32:09 +0100131void plat_ic_raise_el3_sgi(int sgi_num, u_register_t target);
Florian Lugoudcb31ff2021-09-08 12:40:24 +0200132void plat_ic_raise_ns_sgi(int sgi_num, u_register_t target);
133void plat_ic_raise_s_el1_sgi(int sgi_num, u_register_t target);
Jeenu Viswambharanfc529fe2017-09-22 08:32:09 +0100134void plat_ic_set_spi_routing(unsigned int id, unsigned int routing_mode,
135 u_register_t mpidr);
Jeenu Viswambharana2816a12017-09-22 08:32:09 +0100136void plat_ic_set_interrupt_pending(unsigned int id);
137void plat_ic_clear_interrupt_pending(unsigned int id);
Jeenu Viswambharand55a4452017-09-22 08:32:09 +0100138unsigned int plat_ic_set_priority_mask(unsigned int mask);
Arvind Ram Prakash24a4a0a2024-02-05 16:19:37 -0600139unsigned int plat_ic_deactivate_priority(unsigned int mask);
Jeenu Viswambharan4ee8d0b2017-10-24 15:13:59 +0100140unsigned int plat_ic_get_interrupt_id(unsigned int raw);
Jeenu Viswambharaneb68ea92017-09-22 08:32:09 +0100141
142/*******************************************************************************
Dan Handleydec5e0d2014-05-15 14:11:36 +0100143 * Optional common functions (may be overridden)
144 ******************************************************************************/
Soby Mathew4c0d0392016-06-16 14:52:04 +0100145uintptr_t plat_get_my_stack(void);
Yatharth Kochar1a0a3f02016-06-28 16:58:26 +0100146void plat_report_exception(unsigned int exception_type);
Yann Gautier6dc59792019-02-15 16:42:20 +0100147void plat_report_prefetch_abort(unsigned int fault_address);
148void plat_report_data_abort(unsigned int fault_address);
Sandrine Bailleux44804252014-08-06 11:27:23 +0100149int plat_crash_console_init(void);
Soby Mathewc67b09b2014-07-14 16:57:23 +0100150int plat_crash_console_putc(int c);
Jimmy Brisson831b0e92020-08-05 13:44:05 -0500151void plat_crash_console_flush(void);
Juan Castillo40fc6cd2015-09-25 15:41:14 +0100152void plat_error_handler(int err) __dead2;
Antonio Nino Diaz1c3ea102016-02-01 13:57:25 +0000153void plat_panic_handler(void) __dead2;
Manish V Badarkhe586f60c2022-07-12 21:48:04 +0100154void plat_system_reset(void) __dead2;
Soby Mathew7f56e9a2017-09-04 11:49:29 +0100155const char *plat_log_get_prefix(unsigned int log_level);
Roberto Vargas01f62b62017-09-26 12:53:01 +0100156void bl2_plat_preload_setup(void);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100157
Manish V Badarkhe48ba0342021-09-14 23:12:42 +0100158#if MEASURED_BOOT
159int plat_mboot_measure_image(unsigned int image_id, image_info_t *image_data);
Manish V Badarkhecf210642021-10-20 22:06:40 +0100160int plat_mboot_measure_critical_data(unsigned int critical_data_id,
161 const void *base,
162 size_t size);
Manish V Badarkhe2971bad2023-04-11 16:12:33 +0100163int plat_mboot_measure_key(const void *pk_oid, const void *pk_ptr,
164 size_t pk_len);
Manish V Badarkhe48ba0342021-09-14 23:12:42 +0100165#else
166static inline int plat_mboot_measure_image(unsigned int image_id __unused,
167 image_info_t *image_data __unused)
168{
169 return 0;
170}
Manish V Badarkhecf210642021-10-20 22:06:40 +0100171static inline int plat_mboot_measure_critical_data(
172 unsigned int critical_data_id __unused,
173 const void *base __unused,
174 size_t size __unused)
175{
176 return 0;
177}
Manish V Badarkhe2971bad2023-04-11 16:12:33 +0100178static inline int plat_mboot_measure_key(const void *pk_oid __unused,
179 const void *pk_ptr __unused,
180 size_t pk_len __unused)
181{
182 return 0;
183}
Manish V Badarkhe48ba0342021-09-14 23:12:42 +0100184#endif /* MEASURED_BOOT */
185
Yann Gautierae770fe2024-01-16 19:39:31 +0100186#if EARLY_CONSOLE
187void plat_setup_early_console(void);
188#else
189static inline void plat_setup_early_console(void)
190{
191}
192#endif /* EARLY_CONSOLE */
193
Dan Handleydec5e0d2014-05-15 14:11:36 +0100194/*******************************************************************************
195 * Mandatory BL1 functions
196 ******************************************************************************/
Dan Handley5a06bb72014-08-04 11:41:20 +0100197void bl1_early_platform_setup(void);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100198void bl1_plat_arch_setup(void);
199void bl1_platform_setup(void);
200struct meminfo *bl1_plat_sec_mem_layout(void);
Dan Handley5f0cdb02014-05-14 17:44:19 +0100201
Jeenu Viswambharanb7cb1332017-10-16 08:43:14 +0100202/*******************************************************************************
203 * Optional EL3 component functions in BL31
204 ******************************************************************************/
205
206/* SDEI platform functions */
207#if SDEI_SUPPORT
Balint Dobszaycbf9e842019-12-18 15:28:00 +0100208void plat_sdei_setup(void);
Jeenu Viswambharanb7cb1332017-10-16 08:43:14 +0100209int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode);
210void plat_sdei_handle_masked_trigger(uint64_t mpidr, unsigned int intr);
211#endif
212
Pali Rohár30e8fa72021-06-21 17:22:27 +0200213void plat_default_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie,
214 void *handle, uint64_t flags);
Jeenu Viswambharan76454ab2017-11-30 12:54:15 +0000215void plat_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie,
216 void *handle, uint64_t flags);
217
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100218/*
219 * The following function is mandatory when the
220 * firmware update feature is used.
221 */
222int bl1_plat_mem_check(uintptr_t mem_base, unsigned int mem_size,
223 unsigned int flags);
224
Dan Handleydec5e0d2014-05-15 14:11:36 +0100225/*******************************************************************************
226 * Optional BL1 functions (may be overridden)
227 ******************************************************************************/
Yatharth Kochar7baff112015-10-09 18:06:13 +0100228/*
229 * The following functions are used for image loading process in BL1.
230 */
231void bl1_plat_set_ep_info(unsigned int image_id,
232 struct entry_point_info *ep_info);
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100233/*
234 * The following functions are mandatory when firmware update
235 * feature is used and optional otherwise.
236 */
Yatharth Kochar7baff112015-10-09 18:06:13 +0100237unsigned int bl1_plat_get_next_image_id(void);
238struct image_desc *bl1_plat_get_image_desc(unsigned int image_id);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100239
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100240/*
241 * The following functions are used by firmware update
242 * feature and may optionally be overridden.
243 */
Dan Handley1f37b942015-12-15 14:28:24 +0000244__dead2 void bl1_plat_fwu_done(void *client_cookie, void *reserved);
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100245
Masahiro Yamada11f001c2018-02-01 16:46:18 +0900246/*
Soby Mathew566034f2018-02-08 17:45:12 +0000247 * This BL1 function can be used by the platforms to update/use image
248 * information for a given `image_id`.
Masahiro Yamada11f001c2018-02-01 16:46:18 +0900249 */
Soby Mathew566034f2018-02-08 17:45:12 +0000250int bl1_plat_handle_pre_image_load(unsigned int image_id);
251int bl1_plat_handle_post_image_load(unsigned int image_id);
Yatharth Kochar48bfb882015-10-10 19:06:53 +0100252
Harrison Mutai6a4da292024-01-04 16:18:47 +0000253/* Utility functions */
254void bl1_plat_calc_bl2_layout(const meminfo_t *bl1_mem_layout,
255 meminfo_t *bl2_mem_layout);
256
257#if MEASURED_BOOT
Manish V Badarkhe48ba0342021-09-14 23:12:42 +0100258void bl1_plat_mboot_init(void);
259void bl1_plat_mboot_finish(void);
260#else
261static inline void bl1_plat_mboot_init(void)
262{
263}
264static inline void bl1_plat_mboot_finish(void)
265{
266}
Tamas Bane7f11812023-06-07 13:35:04 +0200267#endif /* MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENT */
Manish V Badarkhe48ba0342021-09-14 23:12:42 +0100268
Dan Handleydec5e0d2014-05-15 14:11:36 +0100269/*******************************************************************************
270 * Mandatory BL2 functions
271 ******************************************************************************/
Soby Mathewa6f340f2018-01-09 14:36:14 +0000272void bl2_early_platform_setup2(u_register_t arg0, u_register_t arg1, u_register_t arg2, u_register_t arg3);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100273void bl2_plat_arch_setup(void);
274void bl2_platform_setup(void);
275struct meminfo *bl2_plat_sec_mem_layout(void);
276
Yatharth Kochar72600222016-09-12 16:08:41 +0100277/*
278 * This function can be used by the platforms to update/use image
279 * information for given `image_id`.
280 */
Masahiro Yamadaba68ef52018-02-01 16:45:51 +0900281int bl2_plat_handle_pre_image_load(unsigned int image_id);
Yatharth Kochar72600222016-09-12 16:08:41 +0100282int bl2_plat_handle_post_image_load(unsigned int image_id);
283
Sandrine Bailleux93d81d62014-06-24 14:19:36 +0100284/*******************************************************************************
Dan Handleydec5e0d2014-05-15 14:11:36 +0100285 * Optional BL2 functions (may be overridden)
286 ******************************************************************************/
Tamas Bane7f11812023-06-07 13:35:04 +0200287#if (MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENT)
Manish V Badarkhe47bf3ac2021-08-06 09:26:20 +0100288void bl2_plat_mboot_init(void);
289void bl2_plat_mboot_finish(void);
290#else
291static inline void bl2_plat_mboot_init(void)
292{
293}
294static inline void bl2_plat_mboot_finish(void)
295{
296}
Tamas Bane7f11812023-06-07 13:35:04 +0200297#endif /* MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENTs */
Roberto Vargasb1d27b42017-10-30 14:43:43 +0000298
299/*******************************************************************************
Arvind Ram Prakash42d4d3b2022-11-22 14:41:00 -0600300 * Mandatory BL2 at EL3 functions: Must be implemented
301 * if RESET_TO_BL2 image is supported
Roberto Vargasb1d27b42017-10-30 14:43:43 +0000302 ******************************************************************************/
303void bl2_el3_early_platform_setup(u_register_t arg0, u_register_t arg1,
304 u_register_t arg2, u_register_t arg3);
305void bl2_el3_plat_arch_setup(void);
306
Roberto Vargasb1d27b42017-10-30 14:43:43 +0000307/*******************************************************************************
308 * Optional BL2 at EL3 functions (may be overridden)
309 ******************************************************************************/
310void bl2_el3_plat_prepare_exit(void);
311
Dan Handleydec5e0d2014-05-15 14:11:36 +0100312/*******************************************************************************
Yatharth Kochar9003fa02015-10-14 15:27:24 +0100313 * Mandatory BL2U functions.
314 ******************************************************************************/
315void bl2u_early_platform_setup(struct meminfo *mem_layout,
316 void *plat_info);
317void bl2u_plat_arch_setup(void);
318void bl2u_platform_setup(void);
319
320/*******************************************************************************
321 * Conditionally mandatory BL2U functions for CSS platforms.
322 ******************************************************************************/
323/*
324 * This function is used to perform any platform-specific actions required to
325 * handle the BL2U_SCP firmware.
326 */
327int bl2u_plat_handle_scp_bl2u(void);
328
329/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000330 * Mandatory BL31 functions
Dan Handleydec5e0d2014-05-15 14:11:36 +0100331 ******************************************************************************/
Soby Mathewa6f340f2018-01-09 14:36:14 +0000332void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
333 u_register_t arg2, u_register_t arg3);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100334void bl31_plat_arch_setup(void);
335void bl31_platform_setup(void);
Soby Mathew78e61612015-12-09 11:28:43 +0000336void bl31_plat_runtime_setup(void);
Dan Handley9865ac12014-05-27 16:17:21 +0100337struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100338
339/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000340 * Mandatory PSCI functions (BL31)
Dan Handleydec5e0d2014-05-15 14:11:36 +0100341 ******************************************************************************/
Soby Mathew67487842015-07-13 14:10:57 +0100342int plat_setup_psci_ops(uintptr_t sec_entrypoint,
Roberto Vargas9fb8af32018-02-12 12:36:17 +0000343 const struct plat_psci_ops **psci_ops);
Soby Mathew67487842015-07-13 14:10:57 +0100344const unsigned char *plat_get_power_domain_tree_desc(void);
345
346/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000347 * Optional PSCI functions (BL31).
Soby Mathew67487842015-07-13 14:10:57 +0100348 ******************************************************************************/
dp-arm04c1db12017-01-31 13:01:04 +0000349void plat_psci_stat_accounting_start(const psci_power_state_t *state_info);
350void plat_psci_stat_accounting_stop(const psci_power_state_t *state_info);
351u_register_t plat_psci_stat_get_residency(unsigned int lvl,
352 const psci_power_state_t *state_info,
Deepika Bhavnani5b33ad12019-12-13 10:23:18 -0600353 unsigned int last_cpu_idx);
Soby Mathew67487842015-07-13 14:10:57 +0100354plat_local_state_t plat_get_target_pwr_state(unsigned int lvl,
355 const plat_local_state_t *states,
356 unsigned int ncpu);
Dan Handleydec5e0d2014-05-15 14:11:36 +0100357
358/*******************************************************************************
Soby Mathew0f9159b2022-03-22 16:19:39 +0000359 * Mandatory BL31 functions when ENABLE_RME=1
360 ******************************************************************************/
Javier Almansa Sobrino1d0ca402022-04-25 17:18:15 +0100361#if ENABLE_RME
Javier Almansa Sobrino8c980a42021-11-24 18:37:37 +0000362int plat_rmmd_get_cca_attest_token(uintptr_t buf, size_t *len,
363 uintptr_t hash, size_t hash_size);
364int plat_rmmd_get_cca_realm_attest_key(uintptr_t buf, size_t *len,
365 unsigned int type);
366size_t plat_rmmd_get_el3_rmm_shared_mem(uintptr_t *shared);
AlexeiFedorova97bfa52022-12-14 17:28:11 +0000367int plat_rmmd_load_manifest(struct rmm_manifest *manifest);
Javier Almansa Sobrino1d0ca402022-04-25 17:18:15 +0100368#endif
369
Soby Mathew0f9159b2022-03-22 16:19:39 +0000370/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000371 * Optional BL31 functions (may be overridden)
Dan Handleydff8e472014-05-16 14:08:45 +0100372 ******************************************************************************/
Achin Guptaafff8cb2014-06-26 08:59:07 +0100373void bl31_plat_enable_mmu(uint32_t flags);
Dan Handleydff8e472014-05-16 14:08:45 +0100374
375/*******************************************************************************
Juan Castillod1786372015-12-14 09:35:25 +0000376 * Optional BL32 functions (may be overridden)
Dan Handleydff8e472014-05-16 14:08:45 +0100377 ******************************************************************************/
Achin Guptaafff8cb2014-06-26 08:59:07 +0100378void bl32_plat_enable_mmu(uint32_t flags);
Dan Handleydff8e472014-05-16 14:08:45 +0100379
Juan Castillo6eadf762015-01-07 10:39:25 +0000380/*******************************************************************************
Juan Castillo95cfd4a2015-04-14 12:49:03 +0100381 * Trusted Board Boot functions
Juan Castillo6eadf762015-01-07 10:39:25 +0000382 ******************************************************************************/
Juan Castillo95cfd4a2015-04-14 12:49:03 +0100383int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len,
384 unsigned int *flags);
Juan Castillo48279d52016-01-22 11:05:57 +0000385int plat_get_nv_ctr(void *cookie, unsigned int *nv_ctr);
386int plat_set_nv_ctr(void *cookie, unsigned int nv_ctr);
dp-armd35dee22016-12-12 14:48:13 +0000387int plat_set_nv_ctr2(void *cookie, const struct auth_img_desc_s *img_desc,
388 unsigned int nv_ctr);
Ambroise Vincent2374ab12019-04-10 12:50:27 +0100389int get_mbedtls_heap_helper(void **heap_addr, size_t *heap_size);
Sumit Garg2be57b82019-11-15 15:34:55 +0530390int plat_get_enc_key_info(enum fw_enc_status_t fw_enc_status, uint8_t *key,
391 size_t *key_len, unsigned int *flags,
392 const uint8_t *img_id, size_t img_id_len);
Juan Castillo6eadf762015-01-07 10:39:25 +0000393
Antonio Nino Diaz2fccb222017-10-24 10:07:35 +0100394/*******************************************************************************
395 * Secure Partitions functions
396 ******************************************************************************/
397const struct mmap_region *plat_get_secure_partition_mmap(void *cookie);
Paul Beesleyaeaa2252019-10-15 10:57:42 +0000398const struct spm_mm_boot_info *plat_get_secure_partition_boot_info(
Antonio Nino Diaz2fccb222017-10-24 10:07:35 +0100399 void *cookie);
Antonio Nino Diaze4583022018-10-30 11:12:42 +0000400int plat_spm_sp_rd_load(struct sp_res_desc *rd, const void *ptr, size_t size);
Antonio Nino Diaz680389a2018-11-27 08:36:02 +0000401int plat_spm_sp_get_next_address(void **sp_base, size_t *sp_size,
402 void **rd_base, size_t *rd_size);
Achin Gupta0cb64d02019-10-11 14:54:48 +0100403#if defined(SPD_spmd)
Olivier Deprez52696942020-04-16 13:39:06 +0200404int plat_spm_core_manifest_load(spmc_manifest_attribute_t *manifest,
Olivier Deprez23d5ba82020-02-07 15:44:43 +0100405 const void *pm_addr);
Achin Gupta0cb64d02019-10-11 14:54:48 +0100406#endif
Marc Bonnici6a0788b2021-12-16 18:31:02 +0000407#if defined(SPMC_AT_EL3)
408int plat_spmc_shmem_datastore_get(uint8_t **datastore, size_t *size);
409#endif
410
Yatharth Kochar72600222016-09-12 16:08:41 +0100411/*******************************************************************************
412 * Mandatory BL image load functions(may be overridden).
413 ******************************************************************************/
414/*
415 * This function returns pointer to the list of images that the
416 * platform has populated to load.
417 */
418struct bl_load_info *plat_get_bl_image_load_info(void);
419
420/*
421 * This function returns a pointer to the shared memory that the
422 * platform has kept aside to pass trusted firmware related
423 * information that next BL image could need.
424 */
425struct bl_params *plat_get_next_bl_params(void);
426
427/*
428 * This function flushes to main memory all the params that are
429 * passed to next image.
430 */
431void plat_flush_next_bl_params(void);
432
Soby Mathew5c8babc2015-07-13 16:26:11 +0100433/*
434 * The below function enable Trusted Firmware components like SPDs which
435 * haven't migrated to the new platform API to compile on platforms which
436 * have the compatibility layer disabled.
437 */
Roberto Vargas7fabe1a2018-02-12 12:36:17 +0000438unsigned int platform_core_pos_helper(unsigned long mpidr);
Douglas Raillard51faada2017-02-24 18:14:15 +0000439
Manish V Badarkhe0e753432020-02-22 08:43:00 +0000440/*
441 * Optional function to get SOC version
442 */
443int32_t plat_get_soc_version(void);
444
445/*
446 * Optional function to get SOC revision
447 */
448int32_t plat_get_soc_revision(void);
449
Manish V Badarkhe6f0a2f02020-07-23 20:23:01 +0100450/*
451 * Optional function to check for SMCCC function availability for platform
452 */
453int32_t plat_is_smccc_feature_available(u_register_t fid);
454
Manish V Badarkheefb2ced2021-06-20 21:04:49 +0100455/*******************************************************************************
456 * FWU platform specific functions
457 ******************************************************************************/
458int plat_fwu_set_metadata_image_source(unsigned int image_id,
459 uintptr_t *dev_handle,
460 uintptr_t *image_spec);
Sughosh Ganu6aaf2572021-11-17 17:08:10 +0530461void plat_fwu_set_images_source(const struct fwu_metadata *metadata);
Sughosh Ganu40c175e2021-12-01 15:53:32 +0530462uint32_t plat_fwu_get_boot_idx(void);
Manish V Badarkheefb2ced2021-06-20 21:04:49 +0100463
Channagoud kadabi78fbb0e2022-11-29 16:03:47 -0800464/*
465 * Optional function to indicate if cache management operations can be
466 * performed.
467 */
468#if CONDITIONAL_CMO
469uint64_t plat_can_cmo(void);
470#else
471static inline uint64_t plat_can_cmo(void)
472{
473 return 1;
474}
475#endif /* CONDITIONAL_CMO */
476
Antonio Nino Diaz2bc3dba2018-07-18 16:24:16 +0100477#endif /* PLATFORM_H */