Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 1 | /* |
Douglas Raillard | 21362a9 | 2016-12-02 13:51:54 +0000 | [diff] [blame] | 2 | * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 3 | * |
| 4 | * Redistribution and use in source and binary forms, with or without |
| 5 | * modification, are permitted provided that the following conditions are met: |
| 6 | * |
| 7 | * Redistributions of source code must retain the above copyright notice, this |
| 8 | * list of conditions and the following disclaimer. |
| 9 | * |
| 10 | * Redistributions in binary form must reproduce the above copyright notice, |
| 11 | * this list of conditions and the following disclaimer in the documentation |
| 12 | * and/or other materials provided with the distribution. |
| 13 | * |
| 14 | * Neither the name of ARM nor the names of its contributors may be used |
| 15 | * to endorse or promote products derived from this software without specific |
| 16 | * prior written permission. |
| 17 | * |
| 18 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
| 19 | * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 20 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 21 | * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE |
| 22 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| 23 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| 24 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| 25 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
| 26 | * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| 27 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
| 28 | * POSSIBILITY OF SUCH DAMAGE. |
| 29 | */ |
| 30 | |
| 31 | #include <bl_common.h> |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 32 | #include <css_def.h> |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 33 | #include <debug.h> |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 34 | #include <mmio.h> |
| 35 | #include <plat_arm.h> |
| 36 | #include <string.h> |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 37 | #include "css_scp_bootloader.h" |
| 38 | |
| 39 | /* Weak definition may be overridden in specific CSS based platform */ |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 40 | #if LOAD_IMAGE_V2 |
| 41 | #pragma weak plat_arm_bl2_handle_scp_bl2 |
| 42 | #else |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 43 | #pragma weak bl2_plat_handle_scp_bl2 |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 44 | #endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 45 | |
| 46 | /******************************************************************************* |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 47 | * Transfer SCP_BL2 from Trusted RAM using the SCP Download protocol. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 48 | * Return 0 on success, -1 otherwise. |
| 49 | ******************************************************************************/ |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 50 | #if LOAD_IMAGE_V2 |
| 51 | int plat_arm_bl2_handle_scp_bl2(image_info_t *scp_bl2_image_info) |
| 52 | #else |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 53 | int bl2_plat_handle_scp_bl2(image_info_t *scp_bl2_image_info) |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 54 | #endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 55 | { |
| 56 | int ret; |
| 57 | |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 58 | INFO("BL2: Initiating SCP_BL2 transfer to SCP\n"); |
Sandrine Bailleux | 04b66d8 | 2015-03-18 14:52:53 +0000 | [diff] [blame] | 59 | |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 60 | ret = scp_bootloader_transfer((void *)scp_bl2_image_info->image_base, |
| 61 | scp_bl2_image_info->image_size); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 62 | |
| 63 | if (ret == 0) |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 64 | INFO("BL2: SCP_BL2 transferred to SCP\n"); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 65 | else |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 66 | ERROR("BL2: SCP_BL2 transfer failure\n"); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 67 | |
| 68 | return ret; |
| 69 | } |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 70 | |
| 71 | #ifdef EL3_PAYLOAD_BASE |
| 72 | /* |
| 73 | * We need to override some of the platform functions when booting an EL3 |
| 74 | * payload. |
| 75 | */ |
| 76 | |
| 77 | static unsigned int scp_boot_config; |
| 78 | |
| 79 | void bl2_early_platform_setup(meminfo_t *mem_layout) |
| 80 | { |
| 81 | arm_bl2_early_platform_setup(mem_layout); |
| 82 | |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 83 | /* Save SCP Boot config before it gets overwritten by SCP_BL2 loading */ |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 84 | scp_boot_config = mmio_read_32(SCP_BOOT_CFG_ADDR); |
| 85 | VERBOSE("BL2: Saved SCP Boot config = 0x%x\n", scp_boot_config); |
| 86 | } |
| 87 | |
| 88 | void bl2_platform_setup(void) |
| 89 | { |
| 90 | arm_bl2_platform_setup(); |
| 91 | |
| 92 | /* |
| 93 | * Before releasing the AP cores out of reset, the SCP writes some data |
| 94 | * at the beginning of the Trusted SRAM. It is is overwritten before |
| 95 | * reaching this function. We need to restore this data, as if the |
| 96 | * target had just come out of reset. This implies: |
| 97 | * - zeroing the first 128 bytes of Trusted SRAM; |
| 98 | * - restoring the SCP boot configuration. |
| 99 | */ |
| 100 | VERBOSE("BL2: Restoring SCP reset data in Trusted SRAM\n"); |
Douglas Raillard | 21362a9 | 2016-12-02 13:51:54 +0000 | [diff] [blame] | 101 | zero_normalmem((void *)ARM_TRUSTED_SRAM_BASE, 128); |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 102 | mmio_write_32(SCP_BOOT_CFG_ADDR, scp_boot_config); |
| 103 | } |
| 104 | #endif /* EL3_PAYLOAD_BASE */ |