blob: 6054f7a568e0e6cfb92bb755e73846259db0354a [file] [log] [blame]
Dan Handley9df48042015-03-19 18:58:55 +00001/*
2 * Copyright (c) 2015, ARM Limited and Contributors. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
31#include <bl_common.h>
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000032#include <css_def.h>
Dan Handley9df48042015-03-19 18:58:55 +000033#include <debug.h>
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000034#include <mmio.h>
35#include <plat_arm.h>
36#include <string.h>
Dan Handley9df48042015-03-19 18:58:55 +000037#include "css_scp_bootloader.h"
38
39/* Weak definition may be overridden in specific CSS based platform */
40#pragma weak bl2_plat_handle_bl30
41
42/*******************************************************************************
43 * Transfer BL3-0 from Trusted RAM using the SCP Download protocol.
44 * Return 0 on success, -1 otherwise.
45 ******************************************************************************/
46int bl2_plat_handle_bl30(image_info_t *bl30_image_info)
47{
48 int ret;
49
Sandrine Bailleux04b66d82015-03-18 14:52:53 +000050 INFO("BL2: Initiating BL3-0 transfer to SCP\n");
51
Dan Handley9df48042015-03-19 18:58:55 +000052 ret = scp_bootloader_transfer((void *)bl30_image_info->image_base,
53 bl30_image_info->image_size);
54
55 if (ret == 0)
Sandrine Bailleux04b66d82015-03-18 14:52:53 +000056 INFO("BL2: BL3-0 transferred to SCP\n");
Dan Handley9df48042015-03-19 18:58:55 +000057 else
Sandrine Bailleux04b66d82015-03-18 14:52:53 +000058 ERROR("BL2: BL3-0 transfer failure\n");
Dan Handley9df48042015-03-19 18:58:55 +000059
60 return ret;
61}
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000062
63#ifdef EL3_PAYLOAD_BASE
64/*
65 * We need to override some of the platform functions when booting an EL3
66 * payload.
67 */
68
69static unsigned int scp_boot_config;
70
71void bl2_early_platform_setup(meminfo_t *mem_layout)
72{
73 arm_bl2_early_platform_setup(mem_layout);
74
75 /* Save SCP Boot config before it gets overwritten by BL30 loading */
76 scp_boot_config = mmio_read_32(SCP_BOOT_CFG_ADDR);
77 VERBOSE("BL2: Saved SCP Boot config = 0x%x\n", scp_boot_config);
78}
79
80void bl2_platform_setup(void)
81{
82 arm_bl2_platform_setup();
83
84 /*
85 * Before releasing the AP cores out of reset, the SCP writes some data
86 * at the beginning of the Trusted SRAM. It is is overwritten before
87 * reaching this function. We need to restore this data, as if the
88 * target had just come out of reset. This implies:
89 * - zeroing the first 128 bytes of Trusted SRAM;
90 * - restoring the SCP boot configuration.
91 */
92 VERBOSE("BL2: Restoring SCP reset data in Trusted SRAM\n");
93 memset((void *) ARM_TRUSTED_SRAM_BASE, 0, 128);
94 mmio_write_32(SCP_BOOT_CFG_ADDR, scp_boot_config);
95}
96#endif /* EL3_PAYLOAD_BASE */