]>
Commit | Line | Data |
---|---|---|
1e57a462 | 1 | /** @file\r |
2 | *\r | |
3 | * Copyright (c) 2011-2012, ARM Limited. All rights reserved.\r | |
1e57a462 | 4 | *\r |
3402aac7 RC |
5 | * This program and the accompanying materials\r |
6 | * are licensed and made available under the terms and conditions of the BSD License\r | |
7 | * which accompanies this distribution. The full text of the license may be found at\r | |
8 | * http://opensource.org/licenses/bsd-license.php\r | |
9 | *\r | |
10 | * THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r | |
11 | * WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r | |
1e57a462 | 12 | *\r |
13 | **/\r | |
14 | \r | |
15 | #ifndef _ARMPLATFORMSECLIB_H_\r | |
16 | #define _ARMPLATFORMSECLIB_H_\r | |
17 | \r | |
18 | #define ARM_SEC_BOOT_MASK ~0\r | |
19 | #define ARM_SEC_COLD_BOOT (1 << 0)\r | |
20 | #define ARM_SEC_SECONDARY_COLD_BOOT (1 << 1)\r | |
21 | \r | |
22 | /**\r | |
23 | Initialize the memory where the initial stacks will reside\r | |
24 | \r | |
25 | This memory can contain the initial stacks (Secure and Secure Monitor stacks).\r | |
26 | In some platform, this region is already initialized and the implementation of this function can\r | |
27 | do nothing. This memory can also represent the Secure RAM.\r | |
28 | This function is called before the satck has been set up. Its implementation must ensure the stack\r | |
29 | pointer is not used (probably required to use assembly language)\r | |
30 | \r | |
31 | **/\r | |
32 | VOID\r | |
33 | ArmPlatformSecBootMemoryInit (\r | |
34 | VOID\r | |
35 | );\r | |
36 | \r | |
37 | /**\r | |
38 | Call at the beginning of the platform boot up\r | |
39 | \r | |
40 | This function allows the firmware platform to do extra actions at the early\r | |
41 | stage of the platform power up.\r | |
42 | \r | |
43 | Note: This function must be implemented in assembler as there is no stack set up yet\r | |
44 | \r | |
45 | **/\r | |
46 | VOID\r | |
47 | ArmPlatformSecBootAction (\r | |
48 | VOID\r | |
49 | );\r | |
50 | \r | |
51 | /**\r | |
52 | Initialize controllers that must setup at the early stage\r | |
53 | \r | |
54 | Some peripherals must be initialized in Secure World.\r | |
55 | For example: Some L2 controller, interconnect, clock, DMC, etc\r | |
56 | \r | |
57 | **/\r | |
58 | RETURN_STATUS\r | |
59 | ArmPlatformSecInitialize (\r | |
60 | IN UINTN MpId\r | |
61 | );\r | |
62 | \r | |
63 | /**\r | |
64 | Call before jumping to Normal World\r | |
65 | \r | |
66 | This function allows the firmware platform to do extra actions before\r | |
67 | jumping to the Normal World\r | |
68 | \r | |
69 | **/\r | |
70 | VOID\r | |
71 | ArmPlatformSecExtraAction (\r | |
72 | IN UINTN MpId,\r | |
73 | OUT UINTN* JumpAddress\r | |
74 | );\r | |
75 | \r | |
76 | /**\r | |
77 | Initialize the Secure peripherals and memory regions\r | |
78 | \r | |
79 | If Trustzone is supported by your platform then this function makes the required initialization\r | |
80 | of the secure peripherals and memory regions.\r | |
81 | \r | |
82 | **/\r | |
83 | VOID\r | |
84 | ArmPlatformSecTrustzoneInit (\r | |
85 | IN UINTN MpId\r | |
86 | );\r | |
87 | \r | |
88 | #endif\r |