mirror of
https://github.com/CTCaer/switch-l4t-atf.git
synced 2024-12-13 05:05:56 +00:00
668c5022e5
Non-automated fixes to the converted documentation. Change-Id: I61f3d37c7a8d6a56a7351048060b970c5b3751e4 Signed-off-by: Douglas Raillard <douglas.raillard@arm.com>
561 lines
25 KiB
ReStructuredText
561 lines
25 KiB
ReStructuredText
PSCI Library Integration guide for ARMv8-A AArch32 systems
|
|
==========================================================
|
|
|
|
|
|
.. section-numbering::
|
|
:suffix: .
|
|
|
|
.. contents::
|
|
|
|
This document describes the PSCI library interface with a focus on how to
|
|
integrate with a suitable Trusted OS for an ARMv8-A AArch32 system. The PSCI
|
|
Library implements the PSCI Standard as described in `PSCI spec`_ and is meant
|
|
to be integrated with EL3 Runtime Software which invokes the PSCI Library
|
|
interface appropriately. **EL3 Runtime Software** refers to software executing
|
|
at the highest secure privileged mode, which is EL3 in AArch64 or Secure SVC/
|
|
Monitor mode in AArch32, and provides runtime services to the non-secure world.
|
|
The runtime service request is made via SMC (Secure Monitor Call) and the call
|
|
must adhere to `SMCCC`_. In AArch32, EL3 Runtime Software may additionally
|
|
include Trusted OS functionality. A minimal AArch32 Secure Payload, SP-MIN, is
|
|
provided in ARM Trusted Firmware to illustrate the usage and integration of the
|
|
PSCI library. The description of PSCI library interface and its integration
|
|
with EL3 Runtime Software in this document is targeted towards AArch32 systems.
|
|
|
|
Generic call sequence for PSCI Library interface (AArch32)
|
|
----------------------------------------------------------
|
|
|
|
The generic call sequence of PSCI Library interfaces (see
|
|
`PSCI Library Interface`_) during cold boot in AArch32
|
|
system is described below:
|
|
|
|
#. After cold reset, the EL3 Runtime Software performs its cold boot
|
|
initialization including the PSCI library pre-requisites mentioned in
|
|
`PSCI Library Interface`_, and also the necessary platform
|
|
setup.
|
|
|
|
#. Call ``psci_setup()`` in Monitor mode.
|
|
|
|
#. Optionally call ``psci_register_spd_pm_hook()`` to register callbacks to
|
|
do bookkeeping for the EL3 Runtime Software during power management.
|
|
|
|
#. Call ``psci_prepare_next_non_secure_ctx()`` to initialize the non-secure CPU
|
|
context.
|
|
|
|
#. Get the non-secure ``cpu_context_t`` for the current CPU by calling
|
|
``cm_get_context()`` , then programming the registers in the non-secure
|
|
context and exiting to non-secure world. If the EL3 Runtime Software needs
|
|
additional configuration to be set for non-secure context, like routing
|
|
FIQs to the secure world, the values of the registers can be modified prior
|
|
to programming. See `PSCI CPU context management`_ for more
|
|
details on CPU context management.
|
|
|
|
The generic call sequence of PSCI library interfaces during warm boot in
|
|
AArch32 systems is described below:
|
|
|
|
#. After warm reset, the EL3 Runtime Software performs the necessary warm
|
|
boot initialization including the PSCI library pre-requisites mentioned in
|
|
`PSCI Library Interface`_ (Note that the Data cache
|
|
**must not** be enabled).
|
|
|
|
#. Call ``psci_warmboot_entrypoint()`` in Monitor mode. This interface
|
|
initializes/restores the non-secure CPU context as well.
|
|
|
|
#. Do step 5 of the cold boot call sequence described above.
|
|
|
|
The generic call sequence of PSCI library interfaces on receipt of a PSCI SMC
|
|
on an AArch32 system is described below:
|
|
|
|
#. On receipt of an SMC, save the register context as per `SMCCC`_.
|
|
|
|
#. If the SMC function identifier corresponds to a SMC32 PSCI API, construct
|
|
the appropriate arguments and call the ``psci_smc_handler()`` interface.
|
|
The invocation may or may not return back to the caller depending on
|
|
whether the PSCI API resulted in power down of the CPU.
|
|
|
|
#. If ``psci_smc_handler()`` returns, populate the return value in R0 (AArch32)/
|
|
X0 (AArch64) and restore other registers as per `SMCCC`_.
|
|
|
|
PSCI CPU context management
|
|
---------------------------
|
|
|
|
PSCI library is in charge of initializing/restoring the non-secure CPU system
|
|
registers according to `PSCI specification`_ during cold/warm boot.
|
|
This is referred to as ``PSCI CPU Context Management``. Registers that need to
|
|
be preserved across CPU power down/power up cycles are maintained in
|
|
``cpu_context_t`` data structure. The initialization of other non-secure CPU
|
|
system registers which do not require coordination with the EL3 Runtime
|
|
Software is done directly by the PSCI library (see ``cm_prepare_el3_exit()``).
|
|
|
|
The EL3 Runtime Software is responsible for managing register context
|
|
during switch between Normal and Secure worlds. The register context to be
|
|
saved and restored depends on the mechanism used to trigger the world switch.
|
|
For example, if the world switch was triggered by an SMC call, then the
|
|
registers need to be saved and restored according to `SMCCC`_. In AArch64,
|
|
due to the tight integration with BL31, both BL31 and PSCI library
|
|
use the same ``cpu_context_t`` data structure for PSCI CPU context management
|
|
and register context management during world switch. This cannot be assumed
|
|
for AArch32 EL3 Runtime Software since most AArch32 Trusted OSes already implement
|
|
a mechanism for register context management during world switch. Hence, when
|
|
the PSCI library is integrated with a AArch32 EL3 Runtime Software, the
|
|
``cpu_context_t`` is stripped down for just PSCI CPU context management.
|
|
|
|
During cold/warm boot, after invoking appropriate PSCI library interfaces, it
|
|
is expected that the EL3 Runtime Software will query the ``cpu_context_t`` and
|
|
write appropriate values to the corresponding system registers. This mechanism
|
|
resolves 2 additional problems for AArch32 EL3 Runtime Software:
|
|
|
|
#. Values for certain system registers like SCR and SCTLR cannot be
|
|
unilaterally determined by PSCI library and need inputs from the EL3
|
|
Runtime Software. Using ``cpu_context_t`` as an intermediary data store
|
|
allows EL3 Runtime Software to modify the register values appropriately
|
|
before programming them.
|
|
|
|
#. The PSCI library provides appropriate LR and SPSR values (entrypoint
|
|
information) for exit into non-secure world. Using ``cpu_context_t`` as an
|
|
intermediary data store allows the EL3 Runtime Software to store these
|
|
values safely until it is ready for exit to non-secure world.
|
|
|
|
Currently the ``cpu_context_t`` data structure for AArch32 stores the following
|
|
registers: R0 - R3, LR (R14), SCR, SPSR, SCTLR.
|
|
|
|
The EL3 Runtime Software must implement accessors to get/set pointers
|
|
to CPU context ``cpu_context_t`` data and these are described in
|
|
`CPU Context management API`_.
|
|
|
|
PSCI Library Interface
|
|
----------------------
|
|
|
|
The PSCI library implements the `PSCI Specification`_. The interfaces
|
|
to this library are declared in ``psci.h`` and are as listed below:
|
|
|
|
.. code:: c
|
|
|
|
u_register_t psci_smc_handler(uint32_t smc_fid, u_register_t x1,
|
|
u_register_t x2, u_register_t x3,
|
|
u_register_t x4, void *cookie,
|
|
void *handle, u_register_t flags);
|
|
int psci_setup(const psci_lib_args_t *lib_args);
|
|
void psci_warmboot_entrypoint(void);
|
|
void psci_register_spd_pm_hook(const spd_pm_ops_t *pm);
|
|
void psci_prepare_next_non_secure_ctx(entry_point_info_t *next_image_info);
|
|
|
|
The CPU context data 'cpu\_context\_t' is programmed to the registers differently
|
|
when PSCI is integrated with an AArch32 EL3 Runtime Software compared to
|
|
when the PSCI is integrated with an AArch64 EL3 Runtime Software (BL31). For
|
|
example, in the case of AArch64, there is no need to retrieve ``cpu_context_t``
|
|
data and program the registers as it will done implicitly as part of
|
|
``el3_exit``. The description below of the PSCI interfaces is targeted at
|
|
integration with an AArch32 EL3 Runtime Software.
|
|
|
|
The PSCI library is responsible for initializing/restoring the non-secure world
|
|
to an appropriate state after boot and may choose to directly program the
|
|
non-secure system registers. The PSCI generic code takes care not to directly
|
|
modify any of the system registers affecting the secure world and instead
|
|
returns the values to be programmed to these registers via ``cpu_context_t``.
|
|
The EL3 Runtime Software is responsible for programming those registers and
|
|
can use the proposed values provided in the ``cpu_context_t``, modifying the
|
|
values if required.
|
|
|
|
PSCI library needs the flexibility to access both secure and non-secure
|
|
copies of banked registers. Hence it needs to be invoked in Monitor mode
|
|
for AArch32 and in EL3 for AArch64. The NS bit in SCR (in AArch32) or SCR\_EL3
|
|
(in AArch64) must be set to 0. Additional requirements for the PSCI library
|
|
interfaces are:
|
|
|
|
- Instruction cache must be enabled
|
|
- Both IRQ and FIQ must be masked for the current CPU
|
|
- The page tables must be setup and the MMU enabled
|
|
- The C runtime environment must be setup and stack initialized
|
|
- The Data cache must be enabled prior to invoking any of the PSCI library
|
|
interfaces except for ``psci_warmboot_entrypoint()``. For
|
|
``psci_warmboot_entrypoint()``, if the build option ``HW_ASSISTED_COHERENCY``
|
|
is enabled however, data caches are expected to be enabled.
|
|
|
|
Further requirements for each interface can be found in the interface
|
|
description.
|
|
|
|
Interface : psci\_setup()
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
::
|
|
|
|
Argument : const psci_lib_args_t *lib_args
|
|
Return : void
|
|
|
|
This function is to be called by the primary CPU during cold boot before
|
|
any other interface to the PSCI library. It takes ``lib_args``, a const pointer
|
|
to ``psci_lib_args_t``, as the argument. The ``psci_lib_args_t`` is a versioned
|
|
structure and is declared in ``psci.h`` header as follows:
|
|
|
|
.. code:: c
|
|
|
|
typedef struct psci_lib_args {
|
|
/* The version information of PSCI Library Interface */
|
|
param_header_t h;
|
|
/* The warm boot entrypoint function */
|
|
mailbox_entrypoint_t mailbox_ep;
|
|
} psci_lib_args_t;
|
|
|
|
The first field ``h``, of ``param_header_t`` type, provides the version
|
|
information. The second field ``mailbox_ep`` is the warm boot entrypoint address
|
|
and is used to configure the platform mailbox. Helper macros are provided in
|
|
psci.h to construct the ``lib_args`` argument statically or during runtime. Prior
|
|
to calling the ``psci_setup()`` interface, the platform setup for cold boot
|
|
must have completed. Major actions performed by this interface are:
|
|
|
|
- Initializes architecture.
|
|
- Initializes PSCI power domain and state coordination data structures.
|
|
- Calls ``plat_setup_psci_ops()`` with warm boot entrypoint ``mailbox_ep`` as
|
|
argument.
|
|
- Calls ``cm_set_context_by_index()`` (see
|
|
`CPU Context management API`_) for all the CPUs in the
|
|
platform
|
|
|
|
Interface : psci\_prepare\_next\_non\_secure\_ctx()
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
::
|
|
|
|
Argument : entry_point_info_t *next_image_info
|
|
Return : void
|
|
|
|
After ``psci_setup()`` and prior to exit to the non-secure world, this function
|
|
must be called by the EL3 Runtime Software to initialize the non-secure world
|
|
context. The non-secure world entrypoint information ``next_image_info`` (first
|
|
argument) will be used to determine the non-secure context. After this function
|
|
returns, the EL3 Runtime Software must retrieve the ``cpu_context_t`` (using
|
|
cm\_get\_context()) for the current CPU and program the registers prior to exit
|
|
to the non-secure world.
|
|
|
|
Interface : psci\_register\_spd\_pm\_hook()
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
::
|
|
|
|
Argument : const spd_pm_ops_t *
|
|
Return : void
|
|
|
|
As explained in `Secure payload power management callback`_,
|
|
the EL3 Runtime Software may want to perform some bookkeeping during power
|
|
management operations. This function is used to register the ``spd_pm_ops_t``
|
|
(first argument) callbacks with the PSCI library which will be called
|
|
ppropriately during power management. Calling this function is optional and
|
|
need to be called by the primary CPU during the cold boot sequence after
|
|
``psci_setup()`` has completed.
|
|
|
|
Interface : psci\_smc\_handler()
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
::
|
|
|
|
Argument : uint32_t smc_fid, u_register_t x1,
|
|
u_register_t x2, u_register_t x3,
|
|
u_register_t x4, void *cookie,
|
|
void *handle, u_register_t flags
|
|
Return : u_register_t
|
|
|
|
This function is the top level handler for SMCs which fall within the
|
|
PSCI service range specified in `SMCCC`_. The function ID ``smc_fid`` (first
|
|
argument) determines the PSCI API to be called. The ``x1`` to ``x4`` (2nd to 5th
|
|
arguments), are the values of the registers r1 - r4 (in AArch32) or x1 - x4
|
|
(in AArch64) when the SMC is received. These are the arguments to PSCI API as
|
|
described in `PSCI spec`_. The 'flags' (8th argument) is a bit field parameter
|
|
and is detailed in 'smcc.h' header. It includes whether the call is from the
|
|
secure or non-secure world. The ``cookie`` (6th argument) and the ``handle``
|
|
(7th argument) are not used and are reserved for future use.
|
|
|
|
The return value from this interface is the return value from the underlying
|
|
PSCI API corresponding to ``smc_fid``. This function may not return back to the
|
|
caller if PSCI API causes power down of the CPU. In this case, when the CPU
|
|
wakes up, it will start execution from the warm reset address.
|
|
|
|
Interface : psci\_warmboot\_entrypoint()
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
::
|
|
|
|
Argument : void
|
|
Return : void
|
|
|
|
This function performs the warm boot initialization/restoration as mandated by
|
|
`PSCI spec`_. For AArch32, on wakeup from power down the CPU resets to secure SVC
|
|
mode and the EL3 Runtime Software must perform the prerequisite initializations
|
|
mentioned at top of this section. This function must be called with Data cache
|
|
disabled (unless build option ``HW_ASSISTED_COHERENCY`` is enabled) but with MMU
|
|
initialized and enabled. The major actions performed by this function are:
|
|
|
|
- Invalidates the stack and enables the data cache.
|
|
- Initializes architecture and PSCI state coordination.
|
|
- Restores/Initializes the peripheral drivers to the required state via
|
|
appropriate ``plat_psci_ops_t`` hooks
|
|
- Restores the EL3 Runtime Software context via appropriate ``spd_pm_ops_t``
|
|
callbacks.
|
|
- Restores/Initializes the non-secure context and populates the
|
|
``cpu_context_t`` for the current CPU.
|
|
|
|
Upon the return of this function, the EL3 Runtime Software must retrieve the
|
|
non-secure ``cpu_context_t`` using ``cm_get_context()`` and program the registers
|
|
prior to exit to the non-secure world.
|
|
|
|
EL3 Runtime Software dependencies
|
|
---------------------------------
|
|
|
|
The PSCI Library includes supporting frameworks like context management,
|
|
cpu operations (cpu\_ops) and per-cpu data framework. Other helper library
|
|
functions like bakery locks and spin locks are also included in the library.
|
|
The dependencies which must be fulfilled by the EL3 Runtime Software
|
|
for integration with PSCI library are described below.
|
|
|
|
General dependencies
|
|
~~~~~~~~~~~~~~~~~~~~
|
|
|
|
The PSCI library being a Multiprocessor (MP) implementation, EL3 Runtime
|
|
Software must provide an SMC handling framework capable of MP adhering to
|
|
`SMCCC`_ specification.
|
|
|
|
The EL3 Runtime Software must also export cache maintenance primitives
|
|
and some helper utilities for assert, print and memory operations as listed
|
|
below. The ARM Trusted Firmware source tree provides implementations for all
|
|
these functions but the EL3 Runtime Software may use its own implementation.
|
|
|
|
**Functions : assert(), memcpy(), memset**
|
|
|
|
These must be implemented as described in ISO C Standard.
|
|
|
|
**Function : flush\_dcache\_range()**
|
|
|
|
::
|
|
|
|
Argument : uintptr_t addr, size_t size
|
|
Return : void
|
|
|
|
This function cleans and invalidates (flushes) the data cache for memory
|
|
at address ``addr`` (first argument) address and of size ``size`` (second argument).
|
|
|
|
**Function : inv\_dcache\_range()**
|
|
|
|
::
|
|
|
|
Argument : uintptr_t addr, size_t size
|
|
Return : void
|
|
|
|
This function invalidates (flushes) the data cache for memory at address
|
|
``addr`` (first argument) address and of size ``size`` (second argument).
|
|
|
|
**Function : do\_panic()**
|
|
|
|
::
|
|
|
|
Argument : void
|
|
Return : void
|
|
|
|
This function will be called by the PSCI library on encountering a critical
|
|
failure that cannot be recovered from. This function **must not** return.
|
|
|
|
**Function : tf\_printf()**
|
|
|
|
This is printf-compatible function, but unlike printf, it does not return any
|
|
value. The ARM Trusted Firmware source tree provides an implementation which
|
|
is optimized for stack usage and supports only a subset of format specifiers.
|
|
The details of the format specifiers supported can be found in the
|
|
``tf_printf.c`` file in ARM Trusted Firmware source tree.
|
|
|
|
CPU Context management API
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
The CPU context management data memory is statically allocated by PSCI library
|
|
in BSS section. The PSCI library requires the EL3 Runtime Software to implement
|
|
APIs to store and retrieve pointers to this CPU context data. SP-MIN
|
|
demonstrates how these APIs can be implemented but the EL3 Runtime Software can
|
|
choose a more optimal implementation (like dedicating the secure TPIDRPRW
|
|
system register (in AArch32) for storing these pointers).
|
|
|
|
**Function : cm\_set\_context\_by\_index()**
|
|
|
|
::
|
|
|
|
Argument : unsigned int cpu_idx, void *context, unsigned int security_state
|
|
Return : void
|
|
|
|
This function is called during cold boot when the ``psci_setup()`` PSCI library
|
|
interface is called.
|
|
|
|
This function must store the pointer to the CPU context data, ``context`` (2nd
|
|
argument), for the specified ``security_state`` (3rd argument) and CPU identified
|
|
by ``cpu_idx`` (first argument). The ``security_state`` will always be non-secure
|
|
when called by PSCI library and this argument is retained for compatibility
|
|
with BL31. The ``cpu_idx`` will correspond to the index returned by the
|
|
``plat_core_pos_by_mpidr()`` for ``mpidr`` of the CPU.
|
|
|
|
The actual method of storing the ``context`` pointers is implementation specific.
|
|
For example, SP-MIN stores the pointers in the array ``sp_min_cpu_ctx_ptr``
|
|
declared in ``sp_min_main.c``.
|
|
|
|
**Function : cm\_get\_context()**
|
|
|
|
::
|
|
|
|
Argument : uint32_t security_state
|
|
Return : void *
|
|
|
|
This function must return the pointer to the ``cpu_context_t`` structure for
|
|
the specified ``security_state`` (first argument) for the current CPU. The caller
|
|
must ensure that ``cm_set_context_by_index`` is called first and the appropriate
|
|
context pointers are stored prior to invoking this API. The ``security_state``
|
|
will always be non-secure when called by PSCI library and this argument
|
|
is retained for compatibility with BL31.
|
|
|
|
**Function : cm\_get\_context\_by\_index()**
|
|
|
|
::
|
|
|
|
Argument : unsigned int cpu_idx, unsigned int security_state
|
|
Return : void *
|
|
|
|
This function must return the pointer to the ``cpu_context_t`` structure for
|
|
the specified ``security_state`` (second argument) for the CPU identified by
|
|
``cpu_idx`` (first argument). The caller must ensure that
|
|
``cm_set_context_by_index`` is called first and the appropriate context
|
|
pointers are stored prior to invoking this API. The ``security_state`` will
|
|
always be non-secure when called by PSCI library and this argument is
|
|
retained for compatibility with BL31. The ``cpu_idx`` will correspond to the
|
|
index returned by the ``plat_core_pos_by_mpidr()`` for ``mpidr`` of the CPU.
|
|
|
|
Platform API
|
|
~~~~~~~~~~~~
|
|
|
|
The platform layer abstracts the platform-specific details from the generic
|
|
PSCI library. The following platform APIs/macros must be defined by the EL3
|
|
Runtime Software for integration with the PSCI library.
|
|
|
|
The mandatory platform APIs are:
|
|
|
|
- plat\_my\_core\_pos
|
|
- plat\_core\_pos\_by\_mpidr
|
|
- plat\_get\_syscnt\_freq2
|
|
- plat\_get\_power\_domain\_tree\_desc
|
|
- plat\_setup\_psci\_ops
|
|
- plat\_reset\_handler
|
|
- plat\_panic\_handler
|
|
- plat\_get\_my\_stack
|
|
|
|
The mandatory platform macros are:
|
|
|
|
- PLATFORM\_CORE\_COUNT
|
|
- PLAT\_MAX\_PWR\_LVL
|
|
- PLAT\_NUM\_PWR\_DOMAINS
|
|
- CACHE\_WRITEBACK\_GRANULE
|
|
- PLAT\_MAX\_OFF\_STATE
|
|
- PLAT\_MAX\_RET\_STATE
|
|
- PLAT\_MAX\_PWR\_LVL\_STATES (optional)
|
|
- PLAT\_PCPU\_DATA\_SIZE (optional)
|
|
|
|
The details of these APIs/macros can be found in `Porting Guide`_.
|
|
|
|
All platform specific operations for power management are done via
|
|
``plat_psci_ops_t`` callbacks registered by the platform when
|
|
``plat_setup_psci_ops()`` API is called. The description of each of
|
|
the callbacks in ``plat_psci_ops_t`` can be found in PSCI section of the
|
|
`Porting Guide`_. If any these callbacks are not registered, then the
|
|
PSCI API associated with that callback will not be supported by PSCI
|
|
library.
|
|
|
|
Secure payload power management callback
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
During PSCI power management operations, the EL3 Runtime Software may
|
|
need to perform some bookkeeping, and PSCI library provides
|
|
``spd_pm_ops_t`` callbacks for this purpose. These hooks must be
|
|
populated and registered by using ``psci_register_spd_pm_hook()`` PSCI
|
|
library interface.
|
|
|
|
Typical bookkeeping during PSCI power management calls include save/restore
|
|
of the EL3 Runtime Software context. Also if the EL3 Runtime Software makes
|
|
use of secure interrupts, then these interrupts must also be managed
|
|
appropriately during CPU power down/power up. Any secure interrupt targeted
|
|
to the current CPU must be disabled or re-targeted to other running CPU prior
|
|
to power down of the current CPU. During power up, these interrupt can be
|
|
enabled/re-targeted back to the current CPU.
|
|
|
|
.. code:: c
|
|
|
|
typedef struct spd_pm_ops {
|
|
void (*svc_on)(u_register_t target_cpu);
|
|
int32_t (*svc_off)(u_register_t __unused);
|
|
void (*svc_suspend)(u_register_t max_off_pwrlvl);
|
|
void (*svc_on_finish)(u_register_t __unused);
|
|
void (*svc_suspend_finish)(u_register_t max_off_pwrlvl);
|
|
int32_t (*svc_migrate)(u_register_t from_cpu, u_register_t to_cpu);
|
|
int32_t (*svc_migrate_info)(u_register_t *resident_cpu);
|
|
void (*svc_system_off)(void);
|
|
void (*svc_system_reset)(void);
|
|
} spd_pm_ops_t;
|
|
|
|
A brief description of each callback is given below:
|
|
|
|
- svc\_on, svc\_off, svc\_on\_finish
|
|
|
|
The ``svc_on``, ``svc_off`` callbacks are called during PSCI\_CPU\_ON,
|
|
PSCI\_CPU\_OFF APIs respectively. The ``svc_on_finish`` is called when the
|
|
target CPU of PSCI\_CPU\_ON API powers up and executes the
|
|
``psci_warmboot_entrypoint()`` PSCI library interface.
|
|
|
|
- svc\_suspend, svc\_suspend\_finish
|
|
|
|
The ``svc_suspend`` callback is called during power down bu either
|
|
PSCI\_SUSPEND or PSCI\_SYSTEM\_SUSPEND APIs. The ``svc_suspend_finish`` is
|
|
called when the CPU wakes up from suspend and executes the
|
|
``psci_warmboot_entrypoint()`` PSCI library interface. The ``max_off_pwrlvl``
|
|
(first parameter) denotes the highest power domain level being powered down
|
|
to or woken up from suspend.
|
|
|
|
- svc\_system\_off, svc\_system\_reset
|
|
|
|
These callbacks are called during PSCI\_SYSTEM\_OFF and PSCI\_SYSTEM\_RESET
|
|
PSCI APIs respectively.
|
|
|
|
- svc\_migrate\_info
|
|
|
|
This callback is called in response to PSCI\_MIGRATE\_INFO\_TYPE or
|
|
PSCI\_MIGRATE\_INFO\_UP\_CPU APIs. The return value of this callback must
|
|
correspond to the return value of PSCI\_MIGRATE\_INFO\_TYPE API as described
|
|
in `PSCI spec`_. If the secure payload is a Uniprocessor (UP)
|
|
implementation, then it must update the mpidr of the CPU it is resident in
|
|
via ``resident_cpu`` (first argument). The updates to ``resident_cpu`` is
|
|
ignored if the secure payload is a multiprocessor (MP) implementation.
|
|
|
|
- svc\_migrate
|
|
|
|
This callback is only relevant if the secure payload in EL3 Runtime
|
|
Software is a Uniprocessor (UP) implementation and supports migration from
|
|
the current CPU ``from_cpu`` (first argument) to another CPU ``to_cpu``
|
|
(second argument). This callback is called in response to PSCI\_MIGRATE
|
|
API. This callback is never called if the secure payload is a
|
|
Multiprocessor (MP) implementation.
|
|
|
|
CPU operations
|
|
~~~~~~~~~~~~~~
|
|
|
|
The CPU operations (cpu\_ops) framework implement power down sequence specific
|
|
to the CPU and the details of which can be found in the ``CPU specific operations framework`` section of `Firmware Design`_. The ARM Trusted Firmware
|
|
tree implements the ``cpu_ops`` for various supported CPUs and the EL3 Runtime
|
|
Software needs to include the required ``cpu_ops`` in its build. The start and
|
|
end of the ``cpu_ops`` descriptors must be exported by the EL3 Runtime Software
|
|
via the ``__CPU_OPS_START__`` and ``__CPU_OPS_END__`` linker symbols.
|
|
|
|
The ``cpu_ops`` descriptors also include reset sequences and may include errata
|
|
workarounds for the CPU. The EL3 Runtime Software can choose to call this
|
|
during cold/warm reset if it does not implement its own reset sequence/errata
|
|
workarounds.
|
|
|
|
--------------
|
|
|
|
*Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.*
|
|
|
|
.. _PSCI spec: http://infocenter.arm.com/help/topic/com.arm.doc.den0022c/DEN0022C_Power_State_Coordination_Interface.pdf
|
|
.. _SMCCC: https://silver.arm.com/download/ARM_and_AMBA_Architecture/AR570-DA-80002-r0p0-00rel0/ARM_DEN0028A_SMC_Calling_Convention.pdf
|
|
.. _PSCI specification: http://infocenter.arm.com/help/topic/com.arm.doc.den0022c/DEN0022C_Power_State_Coordination_Interface.pdf
|
|
.. _PSCI Specification: http://infocenter.arm.com/help/topic/com.arm.doc.den0022c/DEN0022C_Power_State_Coordination_Interface.pdf
|
|
.. _Porting Guide: porting-guide.rst
|
|
.. _Firmware Design: ./firmware-design.rst
|