15f0cdb05SDan Handley /* 2d72c486bSLucian Paul-Trifu * Copyright (c) 2013-2022, Arm Limited and Contributors. All rights reserved. 35f0cdb05SDan Handley * 482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause 55f0cdb05SDan Handley */ 65f0cdb05SDan Handley 72bc3dba9SAntonio Nino Diaz #ifndef PLATFORM_H 82bc3dba9SAntonio Nino Diaz #define PLATFORM_H 95f0cdb05SDan Handley 105f0cdb05SDan Handley #include <stdint.h> 115f0cdb05SDan Handley 1209d40e0eSAntonio Nino Diaz #include <lib/psci/psci.h> 130cb64d01SAchin Gupta #if defined(SPD_spmd) 140cb64d01SAchin Gupta #include <services/spm_core_manifest.h> 150cb64d01SAchin Gupta #endif 161d0ca40eSJavier Almansa Sobrino #if ENABLE_RME 171d0ca40eSJavier Almansa Sobrino #include <services/rmm_core_manifest.h> 181d0ca40eSJavier Almansa Sobrino #endif 190b22e591SJayanth Dodderi Chidanand #include <drivers/fwu/fwu_metadata.h> 207dfb9911SJimmy Brisson #if TRNG_SUPPORT 217dfb9911SJimmy Brisson #include "plat_trng.h" 220b22e591SJayanth Dodderi Chidanand #endif /* TRNG_SUPPORT */ 23d72c486bSLucian Paul-Trifu #if DRTM_SUPPORT 24d72c486bSLucian Paul-Trifu #include "plat_drtm.h" 25d72c486bSLucian Paul-Trifu #endif /* DRTM_SUPPORT */ 2609d40e0eSAntonio Nino Diaz 275f0cdb05SDan Handley /******************************************************************************* 285f0cdb05SDan Handley * Forward declarations 295f0cdb05SDan Handley ******************************************************************************/ 30d35dee23Sdp-arm struct auth_img_desc_s; 315f0cdb05SDan Handley struct meminfo; 325f0cdb05SDan Handley struct image_info; 335f0cdb05SDan Handley struct entry_point_info; 347baff11fSYatharth Kochar struct image_desc; 3572600226SYatharth Kochar struct bl_load_info; 3672600226SYatharth Kochar struct bl_params; 372fccb228SAntonio Nino Diaz struct mmap_region; 38aeaa225cSPaul Beesley struct spm_mm_boot_info; 39e458302bSAntonio Nino Diaz struct sp_res_desc; 40*a97bfa5fSAlexeiFedorov struct rmm_manifest; 412be57b86SSumit Garg enum fw_enc_status_t; 425f0cdb05SDan Handley 435f0cdb05SDan Handley /******************************************************************************* 4495cfd4adSJuan Castillo * plat_get_rotpk_info() flags 4595cfd4adSJuan Castillo ******************************************************************************/ 4695cfd4adSJuan Castillo #define ROTPK_IS_HASH (1 << 0) 4704943d33SSoby Mathew /* Flag used to skip verification of the certificate ROTPK while the platform 4804943d33SSoby Mathew ROTPK is not deployed */ 4904943d33SSoby Mathew #define ROTPK_NOT_DEPLOYED (1 << 1) 5095cfd4adSJuan Castillo 5195cfd4adSJuan Castillo /******************************************************************************* 527cda17bbSSumit Garg * plat_get_enc_key_info() flags 537cda17bbSSumit Garg ******************************************************************************/ 547cda17bbSSumit Garg /* 557cda17bbSSumit Garg * Flag used to notify caller that information provided in key buffer is an 567cda17bbSSumit Garg * identifier rather than an actual key. 577cda17bbSSumit Garg */ 587cda17bbSSumit Garg #define ENC_KEY_IS_IDENTIFIER (1 << 0) 597cda17bbSSumit Garg 607cda17bbSSumit Garg /******************************************************************************* 61dec5e0d1SDan Handley * Function declarations 625f0cdb05SDan Handley ******************************************************************************/ 63dec5e0d1SDan Handley /******************************************************************************* 64dec5e0d1SDan Handley * Mandatory common functions 65dec5e0d1SDan Handley ******************************************************************************/ 66d4486391SAntonio Nino Diaz unsigned int plat_get_syscnt_freq2(void); 67d4486391SAntonio Nino Diaz 6816948ae1SJuan Castillo int plat_get_image_source(unsigned int image_id, 69dec5e0d1SDan Handley uintptr_t *dev_handle, 70dec5e0d1SDan Handley uintptr_t *image_spec); 71a0ad6019SSoby Mathew uintptr_t plat_get_ns_image_entrypoint(void); 7267487846SSoby Mathew unsigned int plat_my_core_pos(void); 7367487846SSoby Mathew int plat_core_pos_by_mpidr(u_register_t mpidr); 742374ab17SAmbroise Vincent int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size); 75dec5e0d1SDan Handley 7651faada7SDouglas Raillard #if STACK_PROTECTOR_ENABLED 7751faada7SDouglas Raillard /* 7851faada7SDouglas Raillard * Return a new value to be used for the stack protection's canary. 7951faada7SDouglas Raillard * 8051faada7SDouglas Raillard * Ideally, this value is a random number that is impossible to predict by an 8151faada7SDouglas Raillard * attacker. 8251faada7SDouglas Raillard */ 8351faada7SDouglas Raillard u_register_t plat_get_stack_protector_canary(void); 8451faada7SDouglas Raillard #endif /* STACK_PROTECTOR_ENABLED */ 8551faada7SDouglas Raillard 86dec5e0d1SDan Handley /******************************************************************************* 87dec5e0d1SDan Handley * Mandatory interrupt management functions 88dec5e0d1SDan Handley ******************************************************************************/ 899865ac15SDan Handley uint32_t plat_ic_get_pending_interrupt_id(void); 909865ac15SDan Handley uint32_t plat_ic_get_pending_interrupt_type(void); 919865ac15SDan Handley uint32_t plat_ic_acknowledge_interrupt(void); 929865ac15SDan Handley uint32_t plat_ic_get_interrupt_type(uint32_t id); 939865ac15SDan Handley void plat_ic_end_of_interrupt(uint32_t id); 945f0cdb05SDan Handley uint32_t plat_interrupt_type_to_line(uint32_t type, 955f0cdb05SDan Handley uint32_t security_state); 965f0cdb05SDan Handley 97dec5e0d1SDan Handley /******************************************************************************* 98eb68ea9bSJeenu Viswambharan * Optional interrupt management functions, depending on chosen EL3 components. 99eb68ea9bSJeenu Viswambharan ******************************************************************************/ 100eb68ea9bSJeenu Viswambharan unsigned int plat_ic_get_running_priority(void); 101ca43b55dSJeenu Viswambharan int plat_ic_is_spi(unsigned int id); 102ca43b55dSJeenu Viswambharan int plat_ic_is_ppi(unsigned int id); 103ca43b55dSJeenu Viswambharan int plat_ic_is_sgi(unsigned int id); 104cbd3f370SJeenu Viswambharan unsigned int plat_ic_get_interrupt_active(unsigned int id); 105979225f4SJeenu Viswambharan void plat_ic_disable_interrupt(unsigned int id); 106979225f4SJeenu Viswambharan void plat_ic_enable_interrupt(unsigned int id); 10774dce7faSJeenu Viswambharan int plat_ic_has_interrupt_type(unsigned int type); 10874dce7faSJeenu Viswambharan void plat_ic_set_interrupt_type(unsigned int id, unsigned int type); 109f3a86600SJeenu Viswambharan void plat_ic_set_interrupt_priority(unsigned int id, unsigned int priority); 1108db978b5SJeenu Viswambharan void plat_ic_raise_el3_sgi(int sgi_num, u_register_t target); 111dcb31ff7SFlorian Lugou void plat_ic_raise_ns_sgi(int sgi_num, u_register_t target); 112dcb31ff7SFlorian Lugou void plat_ic_raise_s_el1_sgi(int sgi_num, u_register_t target); 113fc529feeSJeenu Viswambharan void plat_ic_set_spi_routing(unsigned int id, unsigned int routing_mode, 114fc529feeSJeenu Viswambharan u_register_t mpidr); 115a2816a16SJeenu Viswambharan void plat_ic_set_interrupt_pending(unsigned int id); 116a2816a16SJeenu Viswambharan void plat_ic_clear_interrupt_pending(unsigned int id); 117d55a4450SJeenu Viswambharan unsigned int plat_ic_set_priority_mask(unsigned int mask); 1184ee8d0beSJeenu Viswambharan unsigned int plat_ic_get_interrupt_id(unsigned int raw); 119eb68ea9bSJeenu Viswambharan 120eb68ea9bSJeenu Viswambharan /******************************************************************************* 121dec5e0d1SDan Handley * Optional common functions (may be overridden) 122dec5e0d1SDan Handley ******************************************************************************/ 1234c0d0390SSoby Mathew uintptr_t plat_get_my_stack(void); 1241a0a3f06SYatharth Kochar void plat_report_exception(unsigned int exception_type); 1256dc5979aSYann Gautier void plat_report_prefetch_abort(unsigned int fault_address); 1266dc5979aSYann Gautier void plat_report_data_abort(unsigned int fault_address); 12744804252SSandrine Bailleux int plat_crash_console_init(void); 128c67b09bdSSoby Mathew int plat_crash_console_putc(int c); 129831b0e98SJimmy Brisson void plat_crash_console_flush(void); 13040fc6cd1SJuan Castillo void plat_error_handler(int err) __dead2; 1311c3ea103SAntonio Nino Diaz void plat_panic_handler(void) __dead2; 132586f60ccSManish V Badarkhe void plat_system_reset(void) __dead2; 1337f56e9a3SSoby Mathew const char *plat_log_get_prefix(unsigned int log_level); 13401f62b6dSRoberto Vargas void bl2_plat_preload_setup(void); 13501f62b6dSRoberto Vargas int plat_try_next_boot_source(void); 136dec5e0d1SDan Handley 13748ba0345SManish V Badarkhe #if MEASURED_BOOT 13848ba0345SManish V Badarkhe int plat_mboot_measure_image(unsigned int image_id, image_info_t *image_data); 139cf21064eSManish V Badarkhe int plat_mboot_measure_critical_data(unsigned int critical_data_id, 140cf21064eSManish V Badarkhe const void *base, 141cf21064eSManish V Badarkhe size_t size); 14248ba0345SManish V Badarkhe #else 14348ba0345SManish V Badarkhe static inline int plat_mboot_measure_image(unsigned int image_id __unused, 14448ba0345SManish V Badarkhe image_info_t *image_data __unused) 14548ba0345SManish V Badarkhe { 14648ba0345SManish V Badarkhe return 0; 14748ba0345SManish V Badarkhe } 148cf21064eSManish V Badarkhe static inline int plat_mboot_measure_critical_data( 149cf21064eSManish V Badarkhe unsigned int critical_data_id __unused, 150cf21064eSManish V Badarkhe const void *base __unused, 151cf21064eSManish V Badarkhe size_t size __unused) 152cf21064eSManish V Badarkhe { 153cf21064eSManish V Badarkhe return 0; 154cf21064eSManish V Badarkhe } 15548ba0345SManish V Badarkhe #endif /* MEASURED_BOOT */ 15648ba0345SManish V Badarkhe 157dec5e0d1SDan Handley /******************************************************************************* 158dec5e0d1SDan Handley * Mandatory BL1 functions 159dec5e0d1SDan Handley ******************************************************************************/ 1605a06bb7eSDan Handley void bl1_early_platform_setup(void); 161dec5e0d1SDan Handley void bl1_plat_arch_setup(void); 162dec5e0d1SDan Handley void bl1_platform_setup(void); 163dec5e0d1SDan Handley struct meminfo *bl1_plat_sec_mem_layout(void); 1645f0cdb05SDan Handley 165b7cb133eSJeenu Viswambharan /******************************************************************************* 166b7cb133eSJeenu Viswambharan * Optional EL3 component functions in BL31 167b7cb133eSJeenu Viswambharan ******************************************************************************/ 168b7cb133eSJeenu Viswambharan 169b7cb133eSJeenu Viswambharan /* SDEI platform functions */ 170b7cb133eSJeenu Viswambharan #if SDEI_SUPPORT 171cbf9e84aSBalint Dobszay void plat_sdei_setup(void); 172b7cb133eSJeenu Viswambharan int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode); 173b7cb133eSJeenu Viswambharan void plat_sdei_handle_masked_trigger(uint64_t mpidr, unsigned int intr); 174b7cb133eSJeenu Viswambharan #endif 175b7cb133eSJeenu Viswambharan 17630e8fa7eSPali Rohár void plat_default_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie, 17730e8fa7eSPali Rohár void *handle, uint64_t flags); 17876454abfSJeenu Viswambharan void plat_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie, 17976454abfSJeenu Viswambharan void *handle, uint64_t flags); 18076454abfSJeenu Viswambharan 18148bfb88eSYatharth Kochar /* 18248bfb88eSYatharth Kochar * The following function is mandatory when the 18348bfb88eSYatharth Kochar * firmware update feature is used. 18448bfb88eSYatharth Kochar */ 18548bfb88eSYatharth Kochar int bl1_plat_mem_check(uintptr_t mem_base, unsigned int mem_size, 18648bfb88eSYatharth Kochar unsigned int flags); 18748bfb88eSYatharth Kochar 188dec5e0d1SDan Handley /******************************************************************************* 189dec5e0d1SDan Handley * Optional BL1 functions (may be overridden) 190dec5e0d1SDan Handley ******************************************************************************/ 1917baff11fSYatharth Kochar /* 1927baff11fSYatharth Kochar * The following functions are used for image loading process in BL1. 1937baff11fSYatharth Kochar */ 1947baff11fSYatharth Kochar void bl1_plat_set_ep_info(unsigned int image_id, 1957baff11fSYatharth Kochar struct entry_point_info *ep_info); 19648bfb88eSYatharth Kochar /* 19748bfb88eSYatharth Kochar * The following functions are mandatory when firmware update 19848bfb88eSYatharth Kochar * feature is used and optional otherwise. 19948bfb88eSYatharth Kochar */ 2007baff11fSYatharth Kochar unsigned int bl1_plat_get_next_image_id(void); 2017baff11fSYatharth Kochar struct image_desc *bl1_plat_get_image_desc(unsigned int image_id); 202dec5e0d1SDan Handley 20348bfb88eSYatharth Kochar /* 20448bfb88eSYatharth Kochar * The following functions are used by firmware update 20548bfb88eSYatharth Kochar * feature and may optionally be overridden. 20648bfb88eSYatharth Kochar */ 2071f37b944SDan Handley __dead2 void bl1_plat_fwu_done(void *client_cookie, void *reserved); 20848bfb88eSYatharth Kochar 20911f001cbSMasahiro Yamada /* 210566034fcSSoby Mathew * This BL1 function can be used by the platforms to update/use image 211566034fcSSoby Mathew * information for a given `image_id`. 21211f001cbSMasahiro Yamada */ 213566034fcSSoby Mathew int bl1_plat_handle_pre_image_load(unsigned int image_id); 214566034fcSSoby Mathew int bl1_plat_handle_post_image_load(unsigned int image_id); 21548bfb88eSYatharth Kochar 21648ba0345SManish V Badarkhe #if MEASURED_BOOT 21748ba0345SManish V Badarkhe void bl1_plat_mboot_init(void); 21848ba0345SManish V Badarkhe void bl1_plat_mboot_finish(void); 21948ba0345SManish V Badarkhe #else 22048ba0345SManish V Badarkhe static inline void bl1_plat_mboot_init(void) 22148ba0345SManish V Badarkhe { 22248ba0345SManish V Badarkhe } 22348ba0345SManish V Badarkhe static inline void bl1_plat_mboot_finish(void) 22448ba0345SManish V Badarkhe { 22548ba0345SManish V Badarkhe } 22648ba0345SManish V Badarkhe #endif /* MEASURED_BOOT */ 22748ba0345SManish V Badarkhe 228dec5e0d1SDan Handley /******************************************************************************* 229dec5e0d1SDan Handley * Mandatory BL2 functions 230dec5e0d1SDan Handley ******************************************************************************/ 231a6f340feSSoby Mathew void bl2_early_platform_setup2(u_register_t arg0, u_register_t arg1, u_register_t arg2, u_register_t arg3); 232dec5e0d1SDan Handley void bl2_plat_arch_setup(void); 233dec5e0d1SDan Handley void bl2_platform_setup(void); 234dec5e0d1SDan Handley struct meminfo *bl2_plat_sec_mem_layout(void); 235dec5e0d1SDan Handley 23672600226SYatharth Kochar /* 23772600226SYatharth Kochar * This function can be used by the platforms to update/use image 23872600226SYatharth Kochar * information for given `image_id`. 23972600226SYatharth Kochar */ 240ba68ef55SMasahiro Yamada int bl2_plat_handle_pre_image_load(unsigned int image_id); 24172600226SYatharth Kochar int bl2_plat_handle_post_image_load(unsigned int image_id); 24272600226SYatharth Kochar 24393d81d64SSandrine Bailleux /******************************************************************************* 244dec5e0d1SDan Handley * Optional BL2 functions (may be overridden) 245dec5e0d1SDan Handley ******************************************************************************/ 2467b4e1fbbSAlexei Fedorov #if MEASURED_BOOT 24747bf3ac3SManish V Badarkhe void bl2_plat_mboot_init(void); 24847bf3ac3SManish V Badarkhe void bl2_plat_mboot_finish(void); 24947bf3ac3SManish V Badarkhe #else 25047bf3ac3SManish V Badarkhe static inline void bl2_plat_mboot_init(void) 25147bf3ac3SManish V Badarkhe { 25247bf3ac3SManish V Badarkhe } 25347bf3ac3SManish V Badarkhe static inline void bl2_plat_mboot_finish(void) 25447bf3ac3SManish V Badarkhe { 25547bf3ac3SManish V Badarkhe } 25647bf3ac3SManish V Badarkhe #endif /* MEASURED_BOOT */ 257b1d27b48SRoberto Vargas 258b1d27b48SRoberto Vargas /******************************************************************************* 259b1d27b48SRoberto Vargas * Mandatory BL2 at EL3 functions: Must be implemented if BL2_AT_EL3 image is 260b1d27b48SRoberto Vargas * supported 261b1d27b48SRoberto Vargas ******************************************************************************/ 262b1d27b48SRoberto Vargas void bl2_el3_early_platform_setup(u_register_t arg0, u_register_t arg1, 263b1d27b48SRoberto Vargas u_register_t arg2, u_register_t arg3); 264b1d27b48SRoberto Vargas void bl2_el3_plat_arch_setup(void); 265b1d27b48SRoberto Vargas 266b1d27b48SRoberto Vargas /******************************************************************************* 267b1d27b48SRoberto Vargas * Optional BL2 at EL3 functions (may be overridden) 268b1d27b48SRoberto Vargas ******************************************************************************/ 269b1d27b48SRoberto Vargas void bl2_el3_plat_prepare_exit(void); 270b1d27b48SRoberto Vargas 271dec5e0d1SDan Handley /******************************************************************************* 2729003fa0bSYatharth Kochar * Mandatory BL2U functions. 2739003fa0bSYatharth Kochar ******************************************************************************/ 2749003fa0bSYatharth Kochar void bl2u_early_platform_setup(struct meminfo *mem_layout, 2759003fa0bSYatharth Kochar void *plat_info); 2769003fa0bSYatharth Kochar void bl2u_plat_arch_setup(void); 2779003fa0bSYatharth Kochar void bl2u_platform_setup(void); 2789003fa0bSYatharth Kochar 2799003fa0bSYatharth Kochar /******************************************************************************* 2809003fa0bSYatharth Kochar * Conditionally mandatory BL2U functions for CSS platforms. 2819003fa0bSYatharth Kochar ******************************************************************************/ 2829003fa0bSYatharth Kochar /* 2839003fa0bSYatharth Kochar * This function is used to perform any platform-specific actions required to 2849003fa0bSYatharth Kochar * handle the BL2U_SCP firmware. 2859003fa0bSYatharth Kochar */ 2869003fa0bSYatharth Kochar int bl2u_plat_handle_scp_bl2u(void); 2879003fa0bSYatharth Kochar 2889003fa0bSYatharth Kochar /******************************************************************************* 289d178637dSJuan Castillo * Mandatory BL31 functions 290dec5e0d1SDan Handley ******************************************************************************/ 291a6f340feSSoby Mathew void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1, 292a6f340feSSoby Mathew u_register_t arg2, u_register_t arg3); 293dec5e0d1SDan Handley void bl31_plat_arch_setup(void); 294dec5e0d1SDan Handley void bl31_platform_setup(void); 29578e61613SSoby Mathew void bl31_plat_runtime_setup(void); 2969865ac15SDan Handley struct entry_point_info *bl31_plat_get_next_image_ep_info(uint32_t type); 297dec5e0d1SDan Handley 298dec5e0d1SDan Handley /******************************************************************************* 299d178637dSJuan Castillo * Mandatory PSCI functions (BL31) 300dec5e0d1SDan Handley ******************************************************************************/ 30167487846SSoby Mathew int plat_setup_psci_ops(uintptr_t sec_entrypoint, 3029fb8af33SRoberto Vargas const struct plat_psci_ops **psci_ops); 30367487846SSoby Mathew const unsigned char *plat_get_power_domain_tree_desc(void); 30467487846SSoby Mathew 30567487846SSoby Mathew /******************************************************************************* 306d178637dSJuan Castillo * Optional PSCI functions (BL31). 30767487846SSoby Mathew ******************************************************************************/ 30804c1db1eSdp-arm void plat_psci_stat_accounting_start(const psci_power_state_t *state_info); 30904c1db1eSdp-arm void plat_psci_stat_accounting_stop(const psci_power_state_t *state_info); 31004c1db1eSdp-arm u_register_t plat_psci_stat_get_residency(unsigned int lvl, 31104c1db1eSdp-arm const psci_power_state_t *state_info, 3125b33ad17SDeepika Bhavnani unsigned int last_cpu_idx); 31367487846SSoby Mathew plat_local_state_t plat_get_target_pwr_state(unsigned int lvl, 31467487846SSoby Mathew const plat_local_state_t *states, 31567487846SSoby Mathew unsigned int ncpu); 316dec5e0d1SDan Handley 317dec5e0d1SDan Handley /******************************************************************************* 3180f9159b7SSoby Mathew * Mandatory BL31 functions when ENABLE_RME=1 3190f9159b7SSoby Mathew ******************************************************************************/ 3201d0ca40eSJavier Almansa Sobrino #if ENABLE_RME 3218c980a4aSJavier Almansa Sobrino int plat_rmmd_get_cca_attest_token(uintptr_t buf, size_t *len, 3220f9159b7SSoby Mathew uintptr_t hash, size_t hash_size); 3238c980a4aSJavier Almansa Sobrino int plat_rmmd_get_cca_realm_attest_key(uintptr_t buf, size_t *len, 324a0435105SSoby Mathew unsigned int type); 3258c980a4aSJavier Almansa Sobrino size_t plat_rmmd_get_el3_rmm_shared_mem(uintptr_t *shared); 326*a97bfa5fSAlexeiFedorov int plat_rmmd_load_manifest(struct rmm_manifest *manifest); 3271d0ca40eSJavier Almansa Sobrino #endif 3281d0ca40eSJavier Almansa Sobrino 3290f9159b7SSoby Mathew /******************************************************************************* 330d178637dSJuan Castillo * Optional BL31 functions (may be overridden) 331dff8e47aSDan Handley ******************************************************************************/ 332afff8cbdSAchin Gupta void bl31_plat_enable_mmu(uint32_t flags); 333dff8e47aSDan Handley 334dff8e47aSDan Handley /******************************************************************************* 335d178637dSJuan Castillo * Optional BL32 functions (may be overridden) 336dff8e47aSDan Handley ******************************************************************************/ 337afff8cbdSAchin Gupta void bl32_plat_enable_mmu(uint32_t flags); 338dff8e47aSDan Handley 3396eadf762SJuan Castillo /******************************************************************************* 34095cfd4adSJuan Castillo * Trusted Board Boot functions 3416eadf762SJuan Castillo ******************************************************************************/ 34295cfd4adSJuan Castillo int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len, 34395cfd4adSJuan Castillo unsigned int *flags); 34448279d52SJuan Castillo int plat_get_nv_ctr(void *cookie, unsigned int *nv_ctr); 34548279d52SJuan Castillo int plat_set_nv_ctr(void *cookie, unsigned int nv_ctr); 346d35dee23Sdp-arm int plat_set_nv_ctr2(void *cookie, const struct auth_img_desc_s *img_desc, 347d35dee23Sdp-arm unsigned int nv_ctr); 34840f9f644SNicolas Toromanoff int plat_convert_pk(void *full_pk_ptr, unsigned int full_pk_len, 34940f9f644SNicolas Toromanoff void **hashed_pk_ptr, unsigned int *hash_pk_len); 3502374ab17SAmbroise Vincent int get_mbedtls_heap_helper(void **heap_addr, size_t *heap_size); 3512be57b86SSumit Garg int plat_get_enc_key_info(enum fw_enc_status_t fw_enc_status, uint8_t *key, 3522be57b86SSumit Garg size_t *key_len, unsigned int *flags, 3532be57b86SSumit Garg const uint8_t *img_id, size_t img_id_len); 3546eadf762SJuan Castillo 3552fccb228SAntonio Nino Diaz /******************************************************************************* 3562fccb228SAntonio Nino Diaz * Secure Partitions functions 3572fccb228SAntonio Nino Diaz ******************************************************************************/ 3582fccb228SAntonio Nino Diaz const struct mmap_region *plat_get_secure_partition_mmap(void *cookie); 359aeaa225cSPaul Beesley const struct spm_mm_boot_info *plat_get_secure_partition_boot_info( 3602fccb228SAntonio Nino Diaz void *cookie); 361e458302bSAntonio Nino Diaz int plat_spm_sp_rd_load(struct sp_res_desc *rd, const void *ptr, size_t size); 362680389a6SAntonio Nino Diaz int plat_spm_sp_get_next_address(void **sp_base, size_t *sp_size, 363680389a6SAntonio Nino Diaz void **rd_base, size_t *rd_size); 3640cb64d01SAchin Gupta #if defined(SPD_spmd) 36552696946SOlivier Deprez int plat_spm_core_manifest_load(spmc_manifest_attribute_t *manifest, 36623d5ba86SOlivier Deprez const void *pm_addr); 3670cb64d01SAchin Gupta #endif 3686a0788bcSMarc Bonnici #if defined(SPMC_AT_EL3) 3696a0788bcSMarc Bonnici int plat_spmc_shmem_datastore_get(uint8_t **datastore, size_t *size); 3706a0788bcSMarc Bonnici #endif 3716a0788bcSMarc Bonnici 37272600226SYatharth Kochar /******************************************************************************* 37372600226SYatharth Kochar * Mandatory BL image load functions(may be overridden). 37472600226SYatharth Kochar ******************************************************************************/ 37572600226SYatharth Kochar /* 37672600226SYatharth Kochar * This function returns pointer to the list of images that the 37772600226SYatharth Kochar * platform has populated to load. 37872600226SYatharth Kochar */ 37972600226SYatharth Kochar struct bl_load_info *plat_get_bl_image_load_info(void); 38072600226SYatharth Kochar 38172600226SYatharth Kochar /* 38272600226SYatharth Kochar * This function returns a pointer to the shared memory that the 38372600226SYatharth Kochar * platform has kept aside to pass trusted firmware related 38472600226SYatharth Kochar * information that next BL image could need. 38572600226SYatharth Kochar */ 38672600226SYatharth Kochar struct bl_params *plat_get_next_bl_params(void); 38772600226SYatharth Kochar 38872600226SYatharth Kochar /* 38972600226SYatharth Kochar * This function flushes to main memory all the params that are 39072600226SYatharth Kochar * passed to next image. 39172600226SYatharth Kochar */ 39272600226SYatharth Kochar void plat_flush_next_bl_params(void); 39372600226SYatharth Kochar 3945c8babcdSSoby Mathew /* 3955c8babcdSSoby Mathew * The below function enable Trusted Firmware components like SPDs which 3965c8babcdSSoby Mathew * haven't migrated to the new platform API to compile on platforms which 3975c8babcdSSoby Mathew * have the compatibility layer disabled. 3985c8babcdSSoby Mathew */ 3997fabe1a8SRoberto Vargas unsigned int platform_core_pos_helper(unsigned long mpidr); 40051faada7SDouglas Raillard 4010e753437SManish V Badarkhe /* 4020e753437SManish V Badarkhe * Optional function to get SOC version 4030e753437SManish V Badarkhe */ 4040e753437SManish V Badarkhe int32_t plat_get_soc_version(void); 4050e753437SManish V Badarkhe 4060e753437SManish V Badarkhe /* 4070e753437SManish V Badarkhe * Optional function to get SOC revision 4080e753437SManish V Badarkhe */ 4090e753437SManish V Badarkhe int32_t plat_get_soc_revision(void); 4100e753437SManish V Badarkhe 4116f0a2f04SManish V Badarkhe /* 4126f0a2f04SManish V Badarkhe * Optional function to check for SMCCC function availability for platform 4136f0a2f04SManish V Badarkhe */ 4146f0a2f04SManish V Badarkhe int32_t plat_is_smccc_feature_available(u_register_t fid); 4156f0a2f04SManish V Badarkhe 416efb2ced2SManish V Badarkhe /******************************************************************************* 417efb2ced2SManish V Badarkhe * FWU platform specific functions 418efb2ced2SManish V Badarkhe ******************************************************************************/ 419efb2ced2SManish V Badarkhe int plat_fwu_set_metadata_image_source(unsigned int image_id, 420efb2ced2SManish V Badarkhe uintptr_t *dev_handle, 421efb2ced2SManish V Badarkhe uintptr_t *image_spec); 4226aaf257dSSughosh Ganu void plat_fwu_set_images_source(const struct fwu_metadata *metadata); 42340c175e7SSughosh Ganu uint32_t plat_fwu_get_boot_idx(void); 424efb2ced2SManish V Badarkhe 42578fbb0ecSChannagoud kadabi /* 42678fbb0ecSChannagoud kadabi * Optional function to indicate if cache management operations can be 42778fbb0ecSChannagoud kadabi * performed. 42878fbb0ecSChannagoud kadabi */ 42978fbb0ecSChannagoud kadabi #if CONDITIONAL_CMO 43078fbb0ecSChannagoud kadabi uint64_t plat_can_cmo(void); 43178fbb0ecSChannagoud kadabi #else 43278fbb0ecSChannagoud kadabi static inline uint64_t plat_can_cmo(void) 43378fbb0ecSChannagoud kadabi { 43478fbb0ecSChannagoud kadabi return 1; 43578fbb0ecSChannagoud kadabi } 43678fbb0ecSChannagoud kadabi #endif /* CONDITIONAL_CMO */ 43778fbb0ecSChannagoud kadabi 4382bc3dba9SAntonio Nino Diaz #endif /* PLATFORM_H */ 439