blob: 5361d897ec390934cb81bf2153294988beb3a7ba [file] [log] [blame]
Dan Handley9df48042015-03-19 18:58:55 +00001/*
Douglas Raillard21362a92016-12-02 13:51:54 +00002 * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved.
Dan Handley9df48042015-03-19 18:58:55 +00003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
31#include <bl_common.h>
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000032#include <css_def.h>
Dan Handley9df48042015-03-19 18:58:55 +000033#include <debug.h>
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000034#include <mmio.h>
35#include <plat_arm.h>
36#include <string.h>
Dan Handley9df48042015-03-19 18:58:55 +000037#include "css_scp_bootloader.h"
38
39/* Weak definition may be overridden in specific CSS based platform */
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010040#if LOAD_IMAGE_V2
41#pragma weak plat_arm_bl2_handle_scp_bl2
42#else
Juan Castilloa72b6472015-12-10 15:49:17 +000043#pragma weak bl2_plat_handle_scp_bl2
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010044#endif
Dan Handley9df48042015-03-19 18:58:55 +000045
46/*******************************************************************************
Juan Castilloa72b6472015-12-10 15:49:17 +000047 * Transfer SCP_BL2 from Trusted RAM using the SCP Download protocol.
Dan Handley9df48042015-03-19 18:58:55 +000048 * Return 0 on success, -1 otherwise.
49 ******************************************************************************/
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010050#if LOAD_IMAGE_V2
51int plat_arm_bl2_handle_scp_bl2(image_info_t *scp_bl2_image_info)
52#else
Juan Castilloa72b6472015-12-10 15:49:17 +000053int bl2_plat_handle_scp_bl2(image_info_t *scp_bl2_image_info)
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010054#endif
Dan Handley9df48042015-03-19 18:58:55 +000055{
56 int ret;
57
Juan Castilloa72b6472015-12-10 15:49:17 +000058 INFO("BL2: Initiating SCP_BL2 transfer to SCP\n");
Sandrine Bailleux04b66d82015-03-18 14:52:53 +000059
Juan Castilloa72b6472015-12-10 15:49:17 +000060 ret = scp_bootloader_transfer((void *)scp_bl2_image_info->image_base,
61 scp_bl2_image_info->image_size);
Dan Handley9df48042015-03-19 18:58:55 +000062
63 if (ret == 0)
Juan Castilloa72b6472015-12-10 15:49:17 +000064 INFO("BL2: SCP_BL2 transferred to SCP\n");
Dan Handley9df48042015-03-19 18:58:55 +000065 else
Juan Castilloa72b6472015-12-10 15:49:17 +000066 ERROR("BL2: SCP_BL2 transfer failure\n");
Dan Handley9df48042015-03-19 18:58:55 +000067
68 return ret;
69}
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000070
71#ifdef EL3_PAYLOAD_BASE
72/*
73 * We need to override some of the platform functions when booting an EL3
74 * payload.
75 */
76
77static unsigned int scp_boot_config;
78
79void bl2_early_platform_setup(meminfo_t *mem_layout)
80{
81 arm_bl2_early_platform_setup(mem_layout);
82
Juan Castilloa72b6472015-12-10 15:49:17 +000083 /* Save SCP Boot config before it gets overwritten by SCP_BL2 loading */
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000084 scp_boot_config = mmio_read_32(SCP_BOOT_CFG_ADDR);
85 VERBOSE("BL2: Saved SCP Boot config = 0x%x\n", scp_boot_config);
86}
87
88void bl2_platform_setup(void)
89{
90 arm_bl2_platform_setup();
91
92 /*
93 * Before releasing the AP cores out of reset, the SCP writes some data
94 * at the beginning of the Trusted SRAM. It is is overwritten before
95 * reaching this function. We need to restore this data, as if the
96 * target had just come out of reset. This implies:
97 * - zeroing the first 128 bytes of Trusted SRAM;
98 * - restoring the SCP boot configuration.
99 */
100 VERBOSE("BL2: Restoring SCP reset data in Trusted SRAM\n");
Douglas Raillard21362a92016-12-02 13:51:54 +0000101 zero_normalmem((void *)ARM_TRUSTED_SRAM_BASE, 128);
Sandrine Bailleux03897bb2015-11-26 16:31:34 +0000102 mmio_write_32(SCP_BOOT_CFG_ADDR, scp_boot_config);
103}
104#endif /* EL3_PAYLOAD_BASE */