blob: b4aafd464ae303263f1674a6f93ffd6fc7f66c88 [file] [log] [blame]
Dan Handley9df48042015-03-19 18:58:55 +00001/*
Douglas Raillard21362a92016-12-02 13:51:54 +00002 * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved.
Dan Handley9df48042015-03-19 18:58:55 +00003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handley9df48042015-03-19 18:58:55 +00005 */
6
7#include <bl_common.h>
Sandrine Bailleux03897bb2015-11-26 16:31:34 +00008#include <css_def.h>
Dan Handley9df48042015-03-19 18:58:55 +00009#include <debug.h>
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000010#include <mmio.h>
11#include <plat_arm.h>
12#include <string.h>
Scott Brandenbf404c02017-04-10 11:45:52 -070013#include <utils.h>
Soby Mathew73b7bf92017-05-03 12:58:41 +010014#include "../drivers/scp/css_scp.h"
Dan Handley9df48042015-03-19 18:58:55 +000015
16/* Weak definition may be overridden in specific CSS based platform */
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010017#if LOAD_IMAGE_V2
18#pragma weak plat_arm_bl2_handle_scp_bl2
19#else
Juan Castilloa72b6472015-12-10 15:49:17 +000020#pragma weak bl2_plat_handle_scp_bl2
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010021#endif
Dan Handley9df48042015-03-19 18:58:55 +000022
23/*******************************************************************************
Juan Castilloa72b6472015-12-10 15:49:17 +000024 * Transfer SCP_BL2 from Trusted RAM using the SCP Download protocol.
Dan Handley9df48042015-03-19 18:58:55 +000025 * Return 0 on success, -1 otherwise.
26 ******************************************************************************/
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010027#if LOAD_IMAGE_V2
28int plat_arm_bl2_handle_scp_bl2(image_info_t *scp_bl2_image_info)
29#else
Juan Castilloa72b6472015-12-10 15:49:17 +000030int bl2_plat_handle_scp_bl2(image_info_t *scp_bl2_image_info)
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010031#endif
Dan Handley9df48042015-03-19 18:58:55 +000032{
33 int ret;
34
Juan Castilloa72b6472015-12-10 15:49:17 +000035 INFO("BL2: Initiating SCP_BL2 transfer to SCP\n");
Sandrine Bailleux04b66d82015-03-18 14:52:53 +000036
Soby Mathew73b7bf92017-05-03 12:58:41 +010037 ret = css_scp_boot_image_xfer((void *)scp_bl2_image_info->image_base,
Juan Castilloa72b6472015-12-10 15:49:17 +000038 scp_bl2_image_info->image_size);
Dan Handley9df48042015-03-19 18:58:55 +000039
40 if (ret == 0)
Soby Mathew73b7bf92017-05-03 12:58:41 +010041 ret = css_scp_boot_ready();
42
43 if (ret == 0)
Juan Castilloa72b6472015-12-10 15:49:17 +000044 INFO("BL2: SCP_BL2 transferred to SCP\n");
Dan Handley9df48042015-03-19 18:58:55 +000045 else
Juan Castilloa72b6472015-12-10 15:49:17 +000046 ERROR("BL2: SCP_BL2 transfer failure\n");
Dan Handley9df48042015-03-19 18:58:55 +000047
48 return ret;
49}
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000050
Soby Mathew1ced6b82017-06-12 12:37:10 +010051#if !CSS_USE_SCMI_SDS_DRIVER
Soby Mathewe9263d02017-11-15 12:05:28 +000052# if defined(EL3_PAYLOAD_BASE) || JUNO_AARCH32_EL3_RUNTIME
Soby Mathew1ced6b82017-06-12 12:37:10 +010053
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000054/*
55 * We need to override some of the platform functions when booting an EL3
Soby Mathewe9263d02017-11-15 12:05:28 +000056 * payload or SP_MIN on Juno AArch32. This needs to be done only for
57 * SCPI/BOM SCP systems as in case of SDS, the structures remain in memory and
58 * don't need to be overwritten.
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000059 */
60
61static unsigned int scp_boot_config;
62
63void bl2_early_platform_setup(meminfo_t *mem_layout)
64{
65 arm_bl2_early_platform_setup(mem_layout);
66
Juan Castilloa72b6472015-12-10 15:49:17 +000067 /* Save SCP Boot config before it gets overwritten by SCP_BL2 loading */
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000068 scp_boot_config = mmio_read_32(SCP_BOOT_CFG_ADDR);
69 VERBOSE("BL2: Saved SCP Boot config = 0x%x\n", scp_boot_config);
70}
71
72void bl2_platform_setup(void)
73{
74 arm_bl2_platform_setup();
75
76 /*
77 * Before releasing the AP cores out of reset, the SCP writes some data
78 * at the beginning of the Trusted SRAM. It is is overwritten before
79 * reaching this function. We need to restore this data, as if the
80 * target had just come out of reset. This implies:
Roberto Vargas0b52e782017-08-30 08:24:48 +010081 * - zeroing the first 128 bytes of Trusted SRAM using zeromem instead
82 * of zero_normalmem since this is device memory.
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000083 * - restoring the SCP boot configuration.
84 */
85 VERBOSE("BL2: Restoring SCP reset data in Trusted SRAM\n");
Roberto Vargas0b52e782017-08-30 08:24:48 +010086 zeromem((void *) ARM_SHARED_RAM_BASE, 128);
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000087 mmio_write_32(SCP_BOOT_CFG_ADDR, scp_boot_config);
88}
Soby Mathew1ced6b82017-06-12 12:37:10 +010089
90# endif /* EL3_PAYLOAD_BASE */
91
92#endif /* CSS_USE_SCMI_SDS_DRIVER */