15f0cdb05SDan Handley /* 2f801fdc2STushar Khandelwal * Copyright (c) 2013-2025, Arm Limited and Contributors. All rights reserved. 35f0cdb05SDan Handley * 482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause 55f0cdb05SDan Handley */ 65f0cdb05SDan Handley 72bc3dba9SAntonio Nino Diaz #ifndef PLATFORM_H 82bc3dba9SAntonio Nino Diaz #define PLATFORM_H 95f0cdb05SDan Handley 105f0cdb05SDan Handley #include <stdint.h> 115f0cdb05SDan Handley 1209d40e0eSAntonio Nino Diaz #include <lib/psci/psci.h> 130cb64d01SAchin Gupta #if defined(SPD_spmd) 140cb64d01SAchin Gupta #include <services/spm_core_manifest.h> 150cb64d01SAchin Gupta #endif 161d0ca40eSJavier Almansa Sobrino #if ENABLE_RME 171d0ca40eSJavier Almansa Sobrino #include <services/rmm_core_manifest.h> 186a88ec8bSRaghu Krishnamurthy #include <services/rmm_el3_token_sign.h> 191d0ca40eSJavier Almansa Sobrino #endif 200b22e591SJayanth Dodderi Chidanand #include <drivers/fwu/fwu_metadata.h> 217dfb9911SJimmy Brisson #if TRNG_SUPPORT 227dfb9911SJimmy Brisson #include "plat_trng.h" 230b22e591SJayanth Dodderi Chidanand #endif /* TRNG_SUPPORT */ 24d72c486bSLucian Paul-Trifu #if DRTM_SUPPORT 25d72c486bSLucian Paul-Trifu #include "plat_drtm.h" 26d72c486bSLucian Paul-Trifu #endif /* DRTM_SUPPORT */ 273bb52661SManish V Badarkhe #if LFA_SUPPORT 283bb52661SManish V Badarkhe #include "plat_lfa.h" 293bb52661SManish V Badarkhe #endif /* LFA_SUPPORT */ 3009d40e0eSAntonio Nino Diaz 315f0cdb05SDan Handley /******************************************************************************* 325f0cdb05SDan Handley * Forward declarations 335f0cdb05SDan Handley ******************************************************************************/ 34d35dee23Sdp-arm struct auth_img_desc_s; 355f0cdb05SDan Handley struct meminfo; 365f0cdb05SDan Handley struct image_info; 375f0cdb05SDan Handley struct entry_point_info; 387baff11fSYatharth Kochar struct image_desc; 3972600226SYatharth Kochar struct bl_load_info; 4072600226SYatharth Kochar struct bl_params; 412fccb228SAntonio Nino Diaz struct mmap_region; 42aeaa225cSPaul Beesley struct spm_mm_boot_info; 43e458302bSAntonio Nino Diaz struct sp_res_desc; 44a97bfa5fSAlexeiFedorov struct rmm_manifest; 452be57b86SSumit Garg enum fw_enc_status_t; 465f0cdb05SDan Handley 475f0cdb05SDan Handley /******************************************************************************* 48a03dafe5SYann Gautier * Structure populated by platform specific code to export routines which 49a03dafe5SYann Gautier * perform load images functions, and associated pointer to platform ops 50a03dafe5SYann Gautier ******************************************************************************/ 51a03dafe5SYann Gautier struct plat_try_images_ops { 52a03dafe5SYann Gautier int (*next_instance)(unsigned int image_id); 53a03dafe5SYann Gautier }; 54a03dafe5SYann Gautier 55a03dafe5SYann Gautier extern const struct plat_try_images_ops *plat_try_img_ops; 56a03dafe5SYann Gautier 57a03dafe5SYann Gautier /******************************************************************************* 58*3537dad5SXialin Liu * Structure populated by platform specific code to log if the primary GPT 59*3537dad5SXialin Liu * is corrupted 60*3537dad5SXialin Liu ******************************************************************************/ 61*3537dad5SXialin Liu struct plat_log_gpt_corrupted { 62*3537dad5SXialin Liu uint8_t gpt_corrupted_info; 63*3537dad5SXialin Liu void (*plat_set_gpt_corruption)(uintptr_t gpt_corrupted_info_ptr, uint8_t flags); 64*3537dad5SXialin Liu void (*plat_log_gpt_corruption)(uintptr_t log_address, uint8_t gpt_corrupted_info); 65*3537dad5SXialin Liu }; 66*3537dad5SXialin Liu 67*3537dad5SXialin Liu extern const struct plat_log_gpt_corrupted *plat_log_gpt_ptr; 68*3537dad5SXialin Liu 69*3537dad5SXialin Liu /******************************************************************************* 7095cfd4adSJuan Castillo * plat_get_rotpk_info() flags 7195cfd4adSJuan Castillo ******************************************************************************/ 7295cfd4adSJuan Castillo #define ROTPK_IS_HASH (1 << 0) 73f1e693a7SManish V Badarkhe 7404943d33SSoby Mathew /* Flag used to skip verification of the certificate ROTPK while the platform 7504943d33SSoby Mathew ROTPK is not deployed */ 7604943d33SSoby Mathew #define ROTPK_NOT_DEPLOYED (1 << 1) 7795cfd4adSJuan Castillo 78f1e693a7SManish V Badarkhe static inline bool is_rotpk_flags_valid(unsigned int flags) 79f1e693a7SManish V Badarkhe { 80f1e693a7SManish V Badarkhe unsigned int valid_flags = ROTPK_IS_HASH; 81f1e693a7SManish V Badarkhe return (flags == ROTPK_NOT_DEPLOYED) || ((flags & ~valid_flags) == 0); 82f1e693a7SManish V Badarkhe } 83f1e693a7SManish V Badarkhe 8495cfd4adSJuan Castillo /******************************************************************************* 857cda17bbSSumit Garg * plat_get_enc_key_info() flags 867cda17bbSSumit Garg ******************************************************************************/ 877cda17bbSSumit Garg /* 887cda17bbSSumit Garg * Flag used to notify caller that information provided in key buffer is an 897cda17bbSSumit Garg * identifier rather than an actual key. 907cda17bbSSumit Garg */ 917cda17bbSSumit Garg #define ENC_KEY_IS_IDENTIFIER (1 << 0) 927cda17bbSSumit Garg 937cda17bbSSumit Garg /******************************************************************************* 94dec5e0d1SDan Handley * Function declarations 955f0cdb05SDan Handley ******************************************************************************/ 96dec5e0d1SDan Handley /******************************************************************************* 97dec5e0d1SDan Handley * Mandatory common functions 98dec5e0d1SDan Handley ******************************************************************************/ 99d4486391SAntonio Nino Diaz unsigned int plat_get_syscnt_freq2(void); 100d4486391SAntonio Nino Diaz 10116948ae1SJuan Castillo int plat_get_image_source(unsigned int image_id, 102dec5e0d1SDan Handley uintptr_t *dev_handle, 103dec5e0d1SDan Handley uintptr_t *image_spec); 104a0ad6019SSoby Mathew uintptr_t plat_get_ns_image_entrypoint(void); 10567487846SSoby Mathew unsigned int plat_my_core_pos(void); 10667487846SSoby Mathew int plat_core_pos_by_mpidr(u_register_t mpidr); 1072374ab17SAmbroise Vincent int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size); 108dec5e0d1SDan Handley 109e60c1847SManish Pandey /******************************************************************************* 110e60c1847SManish Pandey * Simple routine to determine whether a mpidr is valid or not. 111e60c1847SManish Pandey ******************************************************************************/ 112e60c1847SManish Pandey static inline bool is_valid_mpidr(u_register_t mpidr) 113e60c1847SManish Pandey { 114e60c1847SManish Pandey int pos = plat_core_pos_by_mpidr(mpidr); 115e60c1847SManish Pandey 116e60c1847SManish Pandey if ((pos < 0) || ((unsigned int)pos >= PLATFORM_CORE_COUNT)) { 117e60c1847SManish Pandey return false; 118e60c1847SManish Pandey } 119e60c1847SManish Pandey 120e60c1847SManish Pandey return true; 121e60c1847SManish Pandey } 122e60c1847SManish Pandey 12351faada7SDouglas Raillard #if STACK_PROTECTOR_ENABLED 12451faada7SDouglas Raillard /* 12551faada7SDouglas Raillard * Return a new value to be used for the stack protection's canary. 12651faada7SDouglas Raillard * 12751faada7SDouglas Raillard * Ideally, this value is a random number that is impossible to predict by an 12851faada7SDouglas Raillard * attacker. 12951faada7SDouglas Raillard */ 13051faada7SDouglas Raillard u_register_t plat_get_stack_protector_canary(void); 13151faada7SDouglas Raillard #endif /* STACK_PROTECTOR_ENABLED */ 13251faada7SDouglas Raillard 133dec5e0d1SDan Handley /******************************************************************************* 134dec5e0d1SDan Handley * Mandatory interrupt management functions 135dec5e0d1SDan Handley ******************************************************************************/ 1369865ac15SDan Handley uint32_t plat_ic_get_pending_interrupt_id(void); 1379865ac15SDan Handley uint32_t plat_ic_get_pending_interrupt_type(void); 1389865ac15SDan Handley uint32_t plat_ic_acknowledge_interrupt(void); 1399865ac15SDan Handley uint32_t plat_ic_get_interrupt_type(uint32_t id); 1409865ac15SDan Handley void plat_ic_end_of_interrupt(uint32_t id); 1415f0cdb05SDan Handley uint32_t plat_interrupt_type_to_line(uint32_t type, 1425f0cdb05SDan Handley uint32_t security_state); 1435f0cdb05SDan Handley 144dec5e0d1SDan Handley /******************************************************************************* 145eb68ea9bSJeenu Viswambharan * Optional interrupt management functions, depending on chosen EL3 components. 146eb68ea9bSJeenu Viswambharan ******************************************************************************/ 147eb68ea9bSJeenu Viswambharan unsigned int plat_ic_get_running_priority(void); 1480523d3dcSSaivardhan Thatikonda bool plat_ic_is_spi(unsigned int id); 1490523d3dcSSaivardhan Thatikonda bool plat_ic_is_ppi(unsigned int id); 1500523d3dcSSaivardhan Thatikonda bool plat_ic_is_sgi(unsigned int id); 151cbd3f370SJeenu Viswambharan unsigned int plat_ic_get_interrupt_active(unsigned int id); 152979225f4SJeenu Viswambharan void plat_ic_disable_interrupt(unsigned int id); 153979225f4SJeenu Viswambharan void plat_ic_enable_interrupt(unsigned int id); 1541f6bb41dSMadhukar Pappireddy bool plat_ic_has_interrupt_type(unsigned int type); 15574dce7faSJeenu Viswambharan void plat_ic_set_interrupt_type(unsigned int id, unsigned int type); 156f3a86600SJeenu Viswambharan void plat_ic_set_interrupt_priority(unsigned int id, unsigned int priority); 1578db978b5SJeenu Viswambharan void plat_ic_raise_el3_sgi(int sgi_num, u_register_t target); 158dcb31ff7SFlorian Lugou void plat_ic_raise_ns_sgi(int sgi_num, u_register_t target); 159dcb31ff7SFlorian Lugou void plat_ic_raise_s_el1_sgi(int sgi_num, u_register_t target); 160fc529feeSJeenu Viswambharan void plat_ic_set_spi_routing(unsigned int id, unsigned int routing_mode, 161fc529feeSJeenu Viswambharan u_register_t mpidr); 162a2816a16SJeenu Viswambharan void plat_ic_set_interrupt_pending(unsigned int id); 163a2816a16SJeenu Viswambharan void plat_ic_clear_interrupt_pending(unsigned int id); 164d55a4450SJeenu Viswambharan unsigned int plat_ic_set_priority_mask(unsigned int mask); 16524a4a0a5SArvind Ram Prakash unsigned int plat_ic_deactivate_priority(unsigned int mask); 1664ee8d0beSJeenu Viswambharan unsigned int plat_ic_get_interrupt_id(unsigned int raw); 167eb68ea9bSJeenu Viswambharan 168eb68ea9bSJeenu Viswambharan /******************************************************************************* 169dec5e0d1SDan Handley * Optional common functions (may be overridden) 170dec5e0d1SDan Handley ******************************************************************************/ 1714c0d0390SSoby Mathew uintptr_t plat_get_my_stack(void); 1721a0a3f06SYatharth Kochar void plat_report_exception(unsigned int exception_type); 1736dc5979aSYann Gautier void plat_report_prefetch_abort(unsigned int fault_address); 1746dc5979aSYann Gautier void plat_report_data_abort(unsigned int fault_address); 17544804252SSandrine Bailleux int plat_crash_console_init(void); 176c67b09bdSSoby Mathew int plat_crash_console_putc(int c); 177831b0e98SJimmy Brisson void plat_crash_console_flush(void); 17840fc6cd1SJuan Castillo void plat_error_handler(int err) __dead2; 1791c3ea103SAntonio Nino Diaz void plat_panic_handler(void) __dead2; 1807f56e9a3SSoby Mathew const char *plat_log_get_prefix(unsigned int log_level); 18101f62b6dSRoberto Vargas void bl2_plat_preload_setup(void); 182a03dafe5SYann Gautier void plat_setup_try_img_ops(const struct plat_try_images_ops *plat_try_ops); 183*3537dad5SXialin Liu void plat_setup_log_gpt_corrupted(const struct plat_log_gpt_corrupted *log_gpt); 184dec5e0d1SDan Handley 18548ba0345SManish V Badarkhe #if MEASURED_BOOT 18648ba0345SManish V Badarkhe int plat_mboot_measure_image(unsigned int image_id, image_info_t *image_data); 187cf21064eSManish V Badarkhe int plat_mboot_measure_critical_data(unsigned int critical_data_id, 188cf21064eSManish V Badarkhe const void *base, 189cf21064eSManish V Badarkhe size_t size); 1902971bad8SManish V Badarkhe int plat_mboot_measure_key(const void *pk_oid, const void *pk_ptr, 1912971bad8SManish V Badarkhe size_t pk_len); 19248ba0345SManish V Badarkhe #else 19348ba0345SManish V Badarkhe static inline int plat_mboot_measure_image(unsigned int image_id __unused, 19448ba0345SManish V Badarkhe image_info_t *image_data __unused) 19548ba0345SManish V Badarkhe { 19648ba0345SManish V Badarkhe return 0; 19748ba0345SManish V Badarkhe } 198cf21064eSManish V Badarkhe static inline int plat_mboot_measure_critical_data( 199cf21064eSManish V Badarkhe unsigned int critical_data_id __unused, 200cf21064eSManish V Badarkhe const void *base __unused, 201cf21064eSManish V Badarkhe size_t size __unused) 202cf21064eSManish V Badarkhe { 203cf21064eSManish V Badarkhe return 0; 204cf21064eSManish V Badarkhe } 2052971bad8SManish V Badarkhe static inline int plat_mboot_measure_key(const void *pk_oid __unused, 2062971bad8SManish V Badarkhe const void *pk_ptr __unused, 2072971bad8SManish V Badarkhe size_t pk_len __unused) 2082971bad8SManish V Badarkhe { 2092971bad8SManish V Badarkhe return 0; 2102971bad8SManish V Badarkhe } 21148ba0345SManish V Badarkhe #endif /* MEASURED_BOOT */ 21248ba0345SManish V Badarkhe 213ae770fedSYann Gautier #if EARLY_CONSOLE 214ae770fedSYann Gautier void plat_setup_early_console(void); 215ae770fedSYann Gautier #else 216ae770fedSYann Gautier static inline void plat_setup_early_console(void) 217ae770fedSYann Gautier { 218ae770fedSYann Gautier } 219ae770fedSYann Gautier #endif /* EARLY_CONSOLE */ 220ae770fedSYann Gautier 221dec5e0d1SDan Handley /******************************************************************************* 222dec5e0d1SDan Handley * Mandatory BL1 functions 223dec5e0d1SDan Handley ******************************************************************************/ 2245a06bb7eSDan Handley void bl1_early_platform_setup(void); 225dec5e0d1SDan Handley void bl1_plat_arch_setup(void); 226dec5e0d1SDan Handley void bl1_platform_setup(void); 227dec5e0d1SDan Handley struct meminfo *bl1_plat_sec_mem_layout(void); 2285f0cdb05SDan Handley 229b7cb133eSJeenu Viswambharan /******************************************************************************* 230b7cb133eSJeenu Viswambharan * Optional EL3 component functions in BL31 231b7cb133eSJeenu Viswambharan ******************************************************************************/ 232b7cb133eSJeenu Viswambharan 233b7cb133eSJeenu Viswambharan /* SDEI platform functions */ 234b7cb133eSJeenu Viswambharan #if SDEI_SUPPORT 235cbf9e84aSBalint Dobszay void plat_sdei_setup(void); 236b7cb133eSJeenu Viswambharan int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode); 237b7cb133eSJeenu Viswambharan void plat_sdei_handle_masked_trigger(uint64_t mpidr, unsigned int intr); 238b7cb133eSJeenu Viswambharan #endif 239b7cb133eSJeenu Viswambharan 24030e8fa7eSPali Rohár void plat_default_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie, 24130e8fa7eSPali Rohár void *handle, uint64_t flags); 24276454abfSJeenu Viswambharan void plat_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie, 24376454abfSJeenu Viswambharan void *handle, uint64_t flags); 24476454abfSJeenu Viswambharan 24548bfb88eSYatharth Kochar /* 24648bfb88eSYatharth Kochar * The following function is mandatory when the 24748bfb88eSYatharth Kochar * firmware update feature is used. 24848bfb88eSYatharth Kochar */ 24948bfb88eSYatharth Kochar int bl1_plat_mem_check(uintptr_t mem_base, unsigned int mem_size, 25048bfb88eSYatharth Kochar unsigned int flags); 25148bfb88eSYatharth Kochar 252dec5e0d1SDan Handley /******************************************************************************* 253dec5e0d1SDan Handley * Optional BL1 functions (may be overridden) 254dec5e0d1SDan Handley ******************************************************************************/ 2557baff11fSYatharth Kochar /* 2567baff11fSYatharth Kochar * The following functions are used for image loading process in BL1. 2577baff11fSYatharth Kochar */ 2587baff11fSYatharth Kochar void bl1_plat_set_ep_info(unsigned int image_id, 2597baff11fSYatharth Kochar struct entry_point_info *ep_info); 26048bfb88eSYatharth Kochar /* 26148bfb88eSYatharth Kochar * The following functions are mandatory when firmware update 26248bfb88eSYatharth Kochar * feature is used and optional otherwise. 26348bfb88eSYatharth Kochar */ 2647baff11fSYatharth Kochar unsigned int bl1_plat_get_next_image_id(void); 2657baff11fSYatharth Kochar struct image_desc *bl1_plat_get_image_desc(unsigned int image_id); 266dec5e0d1SDan Handley 26748bfb88eSYatharth Kochar /* 26848bfb88eSYatharth Kochar * The following functions are used by firmware update 26948bfb88eSYatharth Kochar * feature and may optionally be overridden. 27048bfb88eSYatharth Kochar */ 2711f37b944SDan Handley __dead2 void bl1_plat_fwu_done(void *client_cookie, void *reserved); 27248bfb88eSYatharth Kochar 27311f001cbSMasahiro Yamada /* 274566034fcSSoby Mathew * This BL1 function can be used by the platforms to update/use image 275566034fcSSoby Mathew * information for a given `image_id`. 27611f001cbSMasahiro Yamada */ 277566034fcSSoby Mathew int bl1_plat_handle_pre_image_load(unsigned int image_id); 278566034fcSSoby Mathew int bl1_plat_handle_post_image_load(unsigned int image_id); 27948bfb88eSYatharth Kochar 2806a4da290SHarrison Mutai /* Utility functions */ 2816a4da290SHarrison Mutai void bl1_plat_calc_bl2_layout(const meminfo_t *bl1_mem_layout, 2826a4da290SHarrison Mutai meminfo_t *bl2_mem_layout); 2836a4da290SHarrison Mutai 2846a4da290SHarrison Mutai #if MEASURED_BOOT 28548ba0345SManish V Badarkhe void bl1_plat_mboot_init(void); 28648ba0345SManish V Badarkhe void bl1_plat_mboot_finish(void); 28748ba0345SManish V Badarkhe #else 28848ba0345SManish V Badarkhe static inline void bl1_plat_mboot_init(void) 28948ba0345SManish V Badarkhe { 29048ba0345SManish V Badarkhe } 29148ba0345SManish V Badarkhe static inline void bl1_plat_mboot_finish(void) 29248ba0345SManish V Badarkhe { 29348ba0345SManish V Badarkhe } 294e7f1181fSTamas Ban #endif /* MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENT */ 29548ba0345SManish V Badarkhe 296dec5e0d1SDan Handley /******************************************************************************* 297dec5e0d1SDan Handley * Mandatory BL2 functions 298dec5e0d1SDan Handley ******************************************************************************/ 299a6f340feSSoby Mathew void bl2_early_platform_setup2(u_register_t arg0, u_register_t arg1, u_register_t arg2, u_register_t arg3); 300dec5e0d1SDan Handley void bl2_plat_arch_setup(void); 301dec5e0d1SDan Handley void bl2_platform_setup(void); 302dec5e0d1SDan Handley struct meminfo *bl2_plat_sec_mem_layout(void); 303dec5e0d1SDan Handley 30472600226SYatharth Kochar /* 30572600226SYatharth Kochar * This function can be used by the platforms to update/use image 30672600226SYatharth Kochar * information for given `image_id`. 30772600226SYatharth Kochar */ 308ba68ef55SMasahiro Yamada int bl2_plat_handle_pre_image_load(unsigned int image_id); 30972600226SYatharth Kochar int bl2_plat_handle_post_image_load(unsigned int image_id); 31072600226SYatharth Kochar 31193d81d64SSandrine Bailleux /******************************************************************************* 312dec5e0d1SDan Handley * Optional BL2 functions (may be overridden) 313dec5e0d1SDan Handley ******************************************************************************/ 314e7f1181fSTamas Ban #if (MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENT) 31547bf3ac3SManish V Badarkhe void bl2_plat_mboot_init(void); 31647bf3ac3SManish V Badarkhe void bl2_plat_mboot_finish(void); 3174d8b4ca0SRaymond Mao #if TRANSFER_LIST 3184d8b4ca0SRaymond Mao int plat_handoff_mboot(const void *data, uint32_t data_size, void *tl_base); 3194d8b4ca0SRaymond Mao #else 3204d8b4ca0SRaymond Mao static inline int 3214d8b4ca0SRaymond Mao plat_handoff_mboot(__unused const void *data, __unused uint32_t data_size, 3224d8b4ca0SRaymond Mao __unused void *tl_base) 3234d8b4ca0SRaymond Mao { 3244d8b4ca0SRaymond Mao return -1; 3254d8b4ca0SRaymond Mao } 3264d8b4ca0SRaymond Mao #endif 32747bf3ac3SManish V Badarkhe #else 32847bf3ac3SManish V Badarkhe static inline void bl2_plat_mboot_init(void) 32947bf3ac3SManish V Badarkhe { 33047bf3ac3SManish V Badarkhe } 33147bf3ac3SManish V Badarkhe static inline void bl2_plat_mboot_finish(void) 33247bf3ac3SManish V Badarkhe { 33347bf3ac3SManish V Badarkhe } 334e7f1181fSTamas Ban #endif /* MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENTs */ 335b1d27b48SRoberto Vargas 336b1d27b48SRoberto Vargas /******************************************************************************* 33742d4d3baSArvind Ram Prakash * Mandatory BL2 at EL3 functions: Must be implemented 33842d4d3baSArvind Ram Prakash * if RESET_TO_BL2 image is supported 339b1d27b48SRoberto Vargas ******************************************************************************/ 340b1d27b48SRoberto Vargas void bl2_el3_early_platform_setup(u_register_t arg0, u_register_t arg1, 341b1d27b48SRoberto Vargas u_register_t arg2, u_register_t arg3); 342b1d27b48SRoberto Vargas void bl2_el3_plat_arch_setup(void); 343b1d27b48SRoberto Vargas 344b1d27b48SRoberto Vargas /******************************************************************************* 345b1d27b48SRoberto Vargas * Optional BL2 at EL3 functions (may be overridden) 346b1d27b48SRoberto Vargas ******************************************************************************/ 347b1d27b48SRoberto Vargas void bl2_el3_plat_prepare_exit(void); 348b1d27b48SRoberto Vargas 349dec5e0d1SDan Handley /******************************************************************************* 3509003fa0bSYatharth Kochar * Mandatory BL2U functions. 3519003fa0bSYatharth Kochar ******************************************************************************/ 3529003fa0bSYatharth Kochar void bl2u_early_platform_setup(struct meminfo *mem_layout, 3539003fa0bSYatharth Kochar void *plat_info); 3549003fa0bSYatharth Kochar void bl2u_plat_arch_setup(void); 3559003fa0bSYatharth Kochar void bl2u_platform_setup(void); 3569003fa0bSYatharth Kochar 3579003fa0bSYatharth Kochar /******************************************************************************* 3589003fa0bSYatharth Kochar * Conditionally mandatory BL2U functions for CSS platforms. 3599003fa0bSYatharth Kochar ******************************************************************************/ 3609003fa0bSYatharth Kochar /* 3619003fa0bSYatharth Kochar * This function is used to perform any platform-specific actions required to 3629003fa0bSYatharth Kochar * handle the BL2U_SCP firmware. 3639003fa0bSYatharth Kochar */ 3649003fa0bSYatharth Kochar int bl2u_plat_handle_scp_bl2u(void); 3659003fa0bSYatharth Kochar 3669003fa0bSYatharth Kochar /******************************************************************************* 367d178637dSJuan Castillo * Mandatory BL31 functions 368dec5e0d1SDan Handley ******************************************************************************/ 369a6f340feSSoby Mathew void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, 370a6f340feSSoby Mathew u_register_t arg2, u_register_t arg3); 371dec5e0d1SDan Handley void bl31_plat_arch_setup(void); 372dec5e0d1SDan Handley void bl31_platform_setup(void); 37378e61613SSoby Mathew void bl31_plat_runtime_setup(void); 3749865ac15SDan Handley struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type); 375dec5e0d1SDan Handley 376dec5e0d1SDan Handley /******************************************************************************* 377d178637dSJuan Castillo * Mandatory PSCI functions (BL31) 378dec5e0d1SDan Handley ******************************************************************************/ 37967487846SSoby Mathew int plat_setup_psci_ops(uintptr_t sec_entrypoint, 3809fb8af33SRoberto Vargas const struct plat_psci_ops **psci_ops); 38167487846SSoby Mathew const unsigned char *plat_get_power_domain_tree_desc(void); 38267487846SSoby Mathew 38367487846SSoby Mathew /******************************************************************************* 384d178637dSJuan Castillo * Optional PSCI functions (BL31). 38567487846SSoby Mathew ******************************************************************************/ 38604c1db1eSdp-arm void plat_psci_stat_accounting_start(const psci_power_state_t *state_info); 38704c1db1eSdp-arm void plat_psci_stat_accounting_stop(const psci_power_state_t *state_info); 38804c1db1eSdp-arm u_register_t plat_psci_stat_get_residency(unsigned int lvl, 38904c1db1eSdp-arm const psci_power_state_t *state_info, 3905b33ad17SDeepika Bhavnani unsigned int last_cpu_idx); 39167487846SSoby Mathew plat_local_state_t plat_get_target_pwr_state(unsigned int lvl, 39267487846SSoby Mathew const plat_local_state_t *states, 39367487846SSoby Mathew unsigned int ncpu); 394dec5e0d1SDan Handley 395dec5e0d1SDan Handley /******************************************************************************* 3960f9159b7SSoby Mathew * Mandatory BL31 functions when ENABLE_RME=1 3970f9159b7SSoby Mathew ******************************************************************************/ 3981d0ca40eSJavier Almansa Sobrino #if ENABLE_RME 39942cf6026SJuan Pablo Conde 4008c980a4aSJavier Almansa Sobrino int plat_rmmd_get_cca_attest_token(uintptr_t buf, size_t *len, 40142cf6026SJuan Pablo Conde uintptr_t hash, size_t hash_size, 40242cf6026SJuan Pablo Conde uint64_t *remaining_len); 4038c980a4aSJavier Almansa Sobrino int plat_rmmd_get_cca_realm_attest_key(uintptr_t buf, size_t *len, 404a0435105SSoby Mathew unsigned int type); 4056a88ec8bSRaghu Krishnamurthy /* The following 3 functions are to be implement if 4066a88ec8bSRaghu Krishnamurthy * RMMD_ENABLE_EL3_TOKEN_SIGN=1. 4076a88ec8bSRaghu Krishnamurthy * The following three functions are expected to return E_RMM_* error codes. 4086a88ec8bSRaghu Krishnamurthy */ 4096a88ec8bSRaghu Krishnamurthy int plat_rmmd_el3_token_sign_get_rak_pub(uintptr_t buf, size_t *len, 4106a88ec8bSRaghu Krishnamurthy unsigned int type); 4116a88ec8bSRaghu Krishnamurthy int plat_rmmd_el3_token_sign_push_req( 4126a88ec8bSRaghu Krishnamurthy const struct el3_token_sign_request *req); 4136a88ec8bSRaghu Krishnamurthy int plat_rmmd_el3_token_sign_pull_resp(struct el3_token_sign_response *resp); 4148c980a4aSJavier Almansa Sobrino size_t plat_rmmd_get_el3_rmm_shared_mem(uintptr_t *shared); 415a97bfa5fSAlexeiFedorov int plat_rmmd_load_manifest(struct rmm_manifest *manifest); 41600e62ff9SJuan Pablo Conde int plat_rmmd_mecid_key_update(uint16_t mecid, unsigned int reason); 417745c129aSAndre Przywara uintptr_t plat_rmmd_reserve_memory(size_t size, unsigned long alignment); 4182132c707SSona Mathew 4192132c707SSona Mathew /* The following 4 functions are to be implemented if 4202132c707SSona Mathew * RMMD_ENABLE_IDE_KEY_PROG=1. 4212132c707SSona Mathew * The following functions are expected to return E_RMM_* error codes. 4222132c707SSona Mathew */ 4232132c707SSona Mathew int plat_rmmd_el3_ide_key_program(uint64_t ecam_address, uint64_t root_port_id, 4242132c707SSona Mathew uint64_t ide_stream_info, 4252132c707SSona Mathew rp_ide_key_info_t *ide_key_info_ptr, 4262132c707SSona Mathew uint64_t request_id, uint64_t cookie); 4272132c707SSona Mathew int plat_rmmd_el3_ide_key_set_go(uint64_t ecam_address, uint64_t root_port_id, 4282132c707SSona Mathew uint64_t ide_stream_info, uint64_t request_id, 4292132c707SSona Mathew uint64_t cookie); 4302132c707SSona Mathew int plat_rmmd_el3_ide_key_set_stop(uint64_t ecam_address, uint64_t root_port_id, 4312132c707SSona Mathew uint64_t ide_stream_info, uint64_t request_id, 4322132c707SSona Mathew uint64_t cookie); 4332132c707SSona Mathew int plat_rmmd_el3_ide_km_pull_response(uint64_t ecam_address, uint64_t root_port_id, 4342132c707SSona Mathew uint64_t *req_resp, uint64_t *request_id, 4352132c707SSona Mathew uint64_t *cookie); 436609ada96SJuan Pablo Conde #endif /* ENABLE_RME */ 4371d0ca40eSJavier Almansa Sobrino 4380f9159b7SSoby Mathew /******************************************************************************* 439d178637dSJuan Castillo * Optional BL31 functions (may be overridden) 440dff8e47aSDan Handley ******************************************************************************/ 441afff8cbdSAchin Gupta void bl31_plat_enable_mmu(uint32_t flags); 442dff8e47aSDan Handley 443dff8e47aSDan Handley /******************************************************************************* 444d178637dSJuan Castillo * Optional BL32 functions (may be overridden) 445dff8e47aSDan Handley ******************************************************************************/ 446afff8cbdSAchin Gupta void bl32_plat_enable_mmu(uint32_t flags); 447dff8e47aSDan Handley 4486eadf762SJuan Castillo /******************************************************************************* 44995cfd4adSJuan Castillo * Trusted Board Boot functions 4506eadf762SJuan Castillo ******************************************************************************/ 45195cfd4adSJuan Castillo int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len, 45295cfd4adSJuan Castillo unsigned int *flags); 45348279d52SJuan Castillo int plat_get_nv_ctr(void *cookie, unsigned int *nv_ctr); 45448279d52SJuan Castillo int plat_set_nv_ctr(void *cookie, unsigned int nv_ctr); 455d35dee23Sdp-arm int plat_set_nv_ctr2(void *cookie, const struct auth_img_desc_s *img_desc, 456d35dee23Sdp-arm unsigned int nv_ctr); 4572374ab17SAmbroise Vincent int get_mbedtls_heap_helper(void **heap_addr, size_t *heap_size); 4582be57b86SSumit Garg int plat_get_enc_key_info(enum fw_enc_status_t fw_enc_status, uint8_t *key, 4592be57b86SSumit Garg size_t *key_len, unsigned int *flags, 4602be57b86SSumit Garg const uint8_t *img_id, size_t img_id_len); 4616eadf762SJuan Castillo 4622fccb228SAntonio Nino Diaz /******************************************************************************* 4632fccb228SAntonio Nino Diaz * Secure Partitions functions 4642fccb228SAntonio Nino Diaz ******************************************************************************/ 4652fccb228SAntonio Nino Diaz const struct mmap_region *plat_get_secure_partition_mmap(void *cookie); 466aeaa225cSPaul Beesley const struct spm_mm_boot_info *plat_get_secure_partition_boot_info( 4672fccb228SAntonio Nino Diaz void *cookie); 468e458302bSAntonio Nino Diaz int plat_spm_sp_rd_load(struct sp_res_desc *rd, const void *ptr, size_t size); 469680389a6SAntonio Nino Diaz int plat_spm_sp_get_next_address(void **sp_base, size_t *sp_size, 470680389a6SAntonio Nino Diaz void **rd_base, size_t *rd_size); 4710cb64d01SAchin Gupta #if defined(SPD_spmd) 47252696946SOlivier Deprez int plat_spm_core_manifest_load(spmc_manifest_attribute_t *manifest, 47323d5ba86SOlivier Deprez const void *pm_addr); 4740cb64d01SAchin Gupta #endif 4756a0788bcSMarc Bonnici #if defined(SPMC_AT_EL3) 4766a0788bcSMarc Bonnici int plat_spmc_shmem_datastore_get(uint8_t **datastore, size_t *size); 4776a0788bcSMarc Bonnici #endif 4786a0788bcSMarc Bonnici 47972600226SYatharth Kochar /******************************************************************************* 48072600226SYatharth Kochar * Mandatory BL image load functions(may be overridden). 48172600226SYatharth Kochar ******************************************************************************/ 48272600226SYatharth Kochar /* 48372600226SYatharth Kochar * This function returns pointer to the list of images that the 48472600226SYatharth Kochar * platform has populated to load. 48572600226SYatharth Kochar */ 48672600226SYatharth Kochar struct bl_load_info *plat_get_bl_image_load_info(void); 48772600226SYatharth Kochar 48872600226SYatharth Kochar /* 48972600226SYatharth Kochar * This function returns a pointer to the shared memory that the 49072600226SYatharth Kochar * platform has kept aside to pass trusted firmware related 49172600226SYatharth Kochar * information that next BL image could need. 49272600226SYatharth Kochar */ 49372600226SYatharth Kochar struct bl_params *plat_get_next_bl_params(void); 49472600226SYatharth Kochar 49572600226SYatharth Kochar /* 49672600226SYatharth Kochar * This function flushes to main memory all the params that are 49772600226SYatharth Kochar * passed to next image. 49872600226SYatharth Kochar */ 49972600226SYatharth Kochar void plat_flush_next_bl_params(void); 50072600226SYatharth Kochar 5015c8babcdSSoby Mathew /* 5020e753437SManish V Badarkhe * Optional function to get SOC version 5030e753437SManish V Badarkhe */ 5040e753437SManish V Badarkhe int32_t plat_get_soc_version(void); 5050e753437SManish V Badarkhe 5060e753437SManish V Badarkhe /* 5070e753437SManish V Badarkhe * Optional function to get SOC revision 5080e753437SManish V Badarkhe */ 5090e753437SManish V Badarkhe int32_t plat_get_soc_revision(void); 5100e753437SManish V Badarkhe 5116f0a2f04SManish V Badarkhe /* 512cb4ee3e4SArvind Ram Prakash * Optional function to get SoC name 513cb4ee3e4SArvind Ram Prakash */ 514cb4ee3e4SArvind Ram Prakash int32_t plat_get_soc_name(char *soc_name); 515cb4ee3e4SArvind Ram Prakash 516cb4ee3e4SArvind Ram Prakash /* 5176f0a2f04SManish V Badarkhe * Optional function to check for SMCCC function availability for platform 5186f0a2f04SManish V Badarkhe */ 5196f0a2f04SManish V Badarkhe int32_t plat_is_smccc_feature_available(u_register_t fid); 5206f0a2f04SManish V Badarkhe 521291e493dSHarrison Mutai /* 522291e493dSHarrison Mutai * Optional function to retrieve the base address of hardware DT from the 523291e493dSHarrison Mutai * platform. 524291e493dSHarrison Mutai */ 525291e493dSHarrison Mutai uintptr_t plat_get_hw_dt_base(void); 526291e493dSHarrison Mutai 527efb2ced2SManish V Badarkhe /******************************************************************************* 528efb2ced2SManish V Badarkhe * FWU platform specific functions 529efb2ced2SManish V Badarkhe ******************************************************************************/ 530efb2ced2SManish V Badarkhe int plat_fwu_set_metadata_image_source(unsigned int image_id, 531efb2ced2SManish V Badarkhe uintptr_t *dev_handle, 532efb2ced2SManish V Badarkhe uintptr_t *image_spec); 5336aaf257dSSughosh Ganu void plat_fwu_set_images_source(const struct fwu_metadata *metadata); 53440c175e7SSughosh Ganu uint32_t plat_fwu_get_boot_idx(void); 535efb2ced2SManish V Badarkhe 53678fbb0ecSChannagoud kadabi /* 53778fbb0ecSChannagoud kadabi * Optional function to indicate if cache management operations can be 53878fbb0ecSChannagoud kadabi * performed. 53978fbb0ecSChannagoud kadabi */ 54078fbb0ecSChannagoud kadabi #if CONDITIONAL_CMO 54178fbb0ecSChannagoud kadabi uint64_t plat_can_cmo(void); 54278fbb0ecSChannagoud kadabi #else 54378fbb0ecSChannagoud kadabi static inline uint64_t plat_can_cmo(void) 54478fbb0ecSChannagoud kadabi { 54578fbb0ecSChannagoud kadabi return 1; 54678fbb0ecSChannagoud kadabi } 54778fbb0ecSChannagoud kadabi #endif /* CONDITIONAL_CMO */ 54878fbb0ecSChannagoud kadabi 5492bc3dba9SAntonio Nino Diaz #endif /* PLATFORM_H */ 550