plat_arm.h 6.97 KB
Newer Older
1
/*
2
 * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved.
3
 *
dp-arm's avatar
dp-arm committed
4
 * SPDX-License-Identifier: BSD-3-Clause
5
6
7
8
 */
#ifndef __PLAT_ARM_H__
#define __PLAT_ARM_H__

9
#include <arm_xlat_tables.h>
10
11
12
13
#include <bakery_lock.h>
#include <cassert.h>
#include <cpu_data.h>
#include <stdint.h>
14
#include <utils_def.h>
15

16
17
18
19
20
/*******************************************************************************
 * Forward declarations
 ******************************************************************************/
struct bl31_params;
struct meminfo;
21
struct image_info;
22

23
24
25
26
27
28
29
30
#define ARM_CASSERT_MMAP						\
	CASSERT((ARRAY_SIZE(plat_arm_mmap) + ARM_BL_REGIONS)		\
		<= MAX_MMAP_REGIONS,					\
		assert_max_mmap_regions);

/*
 * Utility functions common to ARM standard platforms
 */
31
32
33
34
35
36
void arm_setup_page_tables(uintptr_t total_base,
			size_t total_size,
			uintptr_t code_start,
			uintptr_t code_limit,
			uintptr_t rodata_start,
			uintptr_t rodata_limit
37
#if USE_COHERENT_MEM
38
39
			, uintptr_t coh_start,
			uintptr_t coh_limit
40
41
42
#endif
);

43
#if defined(IMAGE_BL31) || (defined(AARCH32) && defined(IMAGE_BL32))
44
45
46
47
/*
 * Use this macro to instantiate lock before it is used in below
 * arm_lock_xxx() macros
 */
48
#define ARM_INSTANTIATE_LOCK	DEFINE_BAKERY_LOCK(arm_lock)
Soby Mathew's avatar
Soby Mathew committed
49
#define ARM_LOCK_GET_INSTANCE	(&arm_lock)
50
51
52
53
54
55
56
57
58
59
/*
 * These are wrapper macros to the Coherent Memory Bakery Lock API.
 */
#define arm_lock_init()		bakery_lock_init(&arm_lock)
#define arm_lock_get()		bakery_lock_get(&arm_lock)
#define arm_lock_release()	bakery_lock_release(&arm_lock)

#else

/*
60
 * Empty macros for all other BL stages other than BL31 and BL32
61
 */
62
#define ARM_INSTANTIATE_LOCK	static int arm_lock __unused
Soby Mathew's avatar
Soby Mathew committed
63
#define ARM_LOCK_GET_INSTANCE	0
64
65
66
67
#define arm_lock_init()
#define arm_lock_get()
#define arm_lock_release()

68
#endif /* defined(IMAGE_BL31) || (defined(AARCH32) && defined(IMAGE_BL32)) */
69

70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
#if ARM_RECOM_STATE_ID_ENC
/*
 * Macros used to parse state information from State-ID if it is using the
 * recommended encoding for State-ID.
 */
#define ARM_LOCAL_PSTATE_WIDTH		4
#define ARM_LOCAL_PSTATE_MASK		((1 << ARM_LOCAL_PSTATE_WIDTH) - 1)

/* Macros to construct the composite power state */

/* Make composite power state parameter till power level 0 */
#if PSCI_EXTENDED_STATE_ID

#define arm_make_pwrstate_lvl0(lvl0_state, pwr_lvl, type) \
		(((lvl0_state) << PSTATE_ID_SHIFT) | ((type) << PSTATE_TYPE_SHIFT))
#else
#define arm_make_pwrstate_lvl0(lvl0_state, pwr_lvl, type) \
		(((lvl0_state) << PSTATE_ID_SHIFT) | \
		((pwr_lvl) << PSTATE_PWR_LVL_SHIFT) | \
		((type) << PSTATE_TYPE_SHIFT))
#endif /* __PSCI_EXTENDED_STATE_ID__ */

/* Make composite power state parameter till power level 1 */
#define arm_make_pwrstate_lvl1(lvl1_state, lvl0_state, pwr_lvl, type) \
		(((lvl1_state) << ARM_LOCAL_PSTATE_WIDTH) | \
		arm_make_pwrstate_lvl0(lvl0_state, pwr_lvl, type))

97
98
99
100
101
/* Make composite power state parameter till power level 2 */
#define arm_make_pwrstate_lvl2(lvl2_state, lvl1_state, lvl0_state, pwr_lvl, type) \
		(((lvl2_state) << (ARM_LOCAL_PSTATE_WIDTH * 2)) | \
		arm_make_pwrstate_lvl1(lvl1_state, lvl0_state, pwr_lvl, type))

102
103
#endif /* __ARM_RECOM_STATE_ID_ENC__ */

104
105
106
/* ARM State switch error codes */
#define STATE_SW_E_PARAM		(-2)
#define STATE_SW_E_DENIED		(-3)
107
108
109
110
111

/* IO storage utility functions */
void arm_io_setup(void);

/* Security utility functions */
112
void arm_tzc400_setup(void);
113
114
struct tzc_dmc500_driver_data;
void arm_tzc_dmc500_setup(struct tzc_dmc500_driver_data *plat_driver_data);
115

116
117
118
/* Systimer utility function */
void arm_configure_sys_timer(void);

119
/* PM utility functions */
120
121
int arm_validate_power_state(unsigned int power_state,
			    psci_power_state_t *req_state);
122
int arm_validate_psci_entrypoint(uintptr_t entrypoint);
123
int arm_validate_ns_entrypoint(uintptr_t entrypoint);
124
void arm_system_pwr_domain_save(void);
125
void arm_system_pwr_domain_resume(void);
126
void arm_program_trusted_mailbox(uintptr_t address);
127
128
129
130
int arm_psci_read_mem_protect(int *val);
int arm_nor_psci_write_mem_protect(int val);
void arm_nor_psci_do_mem_protect(void);
int arm_psci_mem_protect_chk(uintptr_t base, u_register_t length);
131
132
133

/* Topology utility function */
int arm_check_mpidr(u_register_t mpidr);
134
135
136
137
138
139
140

/* BL1 utility functions */
void arm_bl1_early_platform_setup(void);
void arm_bl1_platform_setup(void);
void arm_bl1_plat_arch_setup(void);

/* BL2 utility functions */
141
void arm_bl2_early_platform_setup(struct meminfo *mem_layout);
142
143
144
145
void arm_bl2_platform_setup(void);
void arm_bl2_plat_arch_setup(void);
uint32_t arm_get_spsr_for_bl32_entry(void);
uint32_t arm_get_spsr_for_bl33_entry(void);
146
int arm_bl2_handle_post_image_load(unsigned int image_id);
147

148
149
150
151
152
153
/* BL2U utility functions */
void arm_bl2u_early_platform_setup(struct meminfo *mem_layout,
				void *plat_info);
void arm_bl2u_platform_setup(void);
void arm_bl2u_plat_arch_setup(void);

154
/* BL31 utility functions */
155
156
157
158
#if LOAD_IMAGE_V2
void arm_bl31_early_platform_setup(void *from_bl2,
				void *plat_params_from_bl2);
#else
159
void arm_bl31_early_platform_setup(struct bl31_params *from_bl2,
160
				void *plat_params_from_bl2);
161
#endif /* LOAD_IMAGE_V2 */
162
void arm_bl31_platform_setup(void);
163
void arm_bl31_plat_runtime_setup(void);
164
165
166
167
168
void arm_bl31_plat_arch_setup(void);

/* TSP utility functions */
void arm_tsp_early_platform_setup(void);

169
/* SP_MIN utility functions */
170
171
void arm_sp_min_early_platform_setup(void *from_bl2,
		void *plat_params_from_bl2);
172
void arm_sp_min_plat_runtime_setup(void);
173

174
175
/* FIP TOC validity check */
int arm_io_is_toc_valid(void);
176
177
178
179

/*
 * Mandatory functions required in ARM standard platforms
 */
180
unsigned int plat_arm_get_cluster_core_count(u_register_t mpidr);
181
void plat_arm_gic_driver_init(void);
182
void plat_arm_gic_init(void);
183
184
void plat_arm_gic_cpuif_enable(void);
void plat_arm_gic_cpuif_disable(void);
185
186
void plat_arm_gic_redistif_on(void);
void plat_arm_gic_redistif_off(void);
187
void plat_arm_gic_pcpu_init(void);
188
189
void plat_arm_gic_save(void);
void plat_arm_gic_resume(void);
190
191
void plat_arm_security_setup(void);
void plat_arm_pwrc_setup(void);
192
193
194
void plat_arm_interconnect_init(void);
void plat_arm_interconnect_enter_coherency(void);
void plat_arm_interconnect_exit_coherency(void);
195

196
197
198
199
#if ARM_PLAT_MT
unsigned int plat_arm_get_cpu_pe_count(u_register_t mpidr);
#endif

200
201
202
203
204
205
206
207
#if LOAD_IMAGE_V2
/*
 * This function is called after loading SCP_BL2 image and it is used to perform
 * any platform-specific actions required to handle the SCP firmware.
 */
int plat_arm_bl2_handle_scp_bl2(struct image_info *scp_bl2_image_info);
#endif

208
209
210
211
212
/*
 * Optional functions required in ARM standard platforms
 */
void plat_arm_io_setup(void);
int plat_arm_get_alt_image_source(
213
214
215
	unsigned int image_id,
	uintptr_t *dev_handle,
	uintptr_t *image_spec);
216
unsigned int plat_arm_calc_core_pos(u_register_t mpidr);
217
const mmap_region_t *plat_arm_get_mmap(void);
218

219
220
221
/* Allow platform to override psci_pm_ops during runtime */
const plat_psci_ops_t *plat_arm_psci_override_pm_ops(plat_psci_ops_t *ops);

222
223
224
225
226
227
228
229
/* Execution state switch in ARM platforms */
int arm_execution_state_switch(unsigned int smc_fid,
		uint32_t pc_hi,
		uint32_t pc_lo,
		uint32_t cookie_hi,
		uint32_t cookie_lo,
		void *handle);

230
#endif /* __PLAT_ARM_H__ */