blob: c1c7868b8b2198a87168a8aa9a44b604befd36d9 [file] [log] [blame]
Dan Handley9df48042015-03-19 18:58:55 +00001/*
Soby Mathew7d5a2e72018-01-10 15:59:31 +00002 * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved.
Dan Handley9df48042015-03-19 18:58:55 +00003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handley9df48042015-03-19 18:58:55 +00005 */
6
Antonio Nino Diaze0f90632018-12-14 00:18:21 +00007#include <string.h>
8
9#include <common/bl_common.h>
10#include <common/debug.h>
11#include <lib/mmio.h>
12#include <lib/utils.h>
13
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000014#include <css_def.h>
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000015#include <plat_arm.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000016
Soby Mathew73b7bf92017-05-03 12:58:41 +010017#include "../drivers/scp/css_scp.h"
Dan Handley9df48042015-03-19 18:58:55 +000018
19/* Weak definition may be overridden in specific CSS based platform */
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010020#pragma weak plat_arm_bl2_handle_scp_bl2
Dan Handley9df48042015-03-19 18:58:55 +000021
22/*******************************************************************************
Juan Castilloa72b6472015-12-10 15:49:17 +000023 * Transfer SCP_BL2 from Trusted RAM using the SCP Download protocol.
Dan Handley9df48042015-03-19 18:58:55 +000024 * Return 0 on success, -1 otherwise.
25 ******************************************************************************/
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010026int plat_arm_bl2_handle_scp_bl2(image_info_t *scp_bl2_image_info)
Dan Handley9df48042015-03-19 18:58:55 +000027{
28 int ret;
29
Juan Castilloa72b6472015-12-10 15:49:17 +000030 INFO("BL2: Initiating SCP_BL2 transfer to SCP\n");
Sandrine Bailleux04b66d82015-03-18 14:52:53 +000031
Soby Mathew73b7bf92017-05-03 12:58:41 +010032 ret = css_scp_boot_image_xfer((void *)scp_bl2_image_info->image_base,
Juan Castilloa72b6472015-12-10 15:49:17 +000033 scp_bl2_image_info->image_size);
Dan Handley9df48042015-03-19 18:58:55 +000034
35 if (ret == 0)
Soby Mathew73b7bf92017-05-03 12:58:41 +010036 ret = css_scp_boot_ready();
37
38 if (ret == 0)
Juan Castilloa72b6472015-12-10 15:49:17 +000039 INFO("BL2: SCP_BL2 transferred to SCP\n");
Dan Handley9df48042015-03-19 18:58:55 +000040 else
Juan Castilloa72b6472015-12-10 15:49:17 +000041 ERROR("BL2: SCP_BL2 transfer failure\n");
Dan Handley9df48042015-03-19 18:58:55 +000042
43 return ret;
44}
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000045
Soby Mathew1ced6b82017-06-12 12:37:10 +010046#if !CSS_USE_SCMI_SDS_DRIVER
Soby Mathewe9263d02017-11-15 12:05:28 +000047# if defined(EL3_PAYLOAD_BASE) || JUNO_AARCH32_EL3_RUNTIME
Soby Mathew1ced6b82017-06-12 12:37:10 +010048
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000049/*
50 * We need to override some of the platform functions when booting an EL3
Soby Mathewe9263d02017-11-15 12:05:28 +000051 * payload or SP_MIN on Juno AArch32. This needs to be done only for
52 * SCPI/BOM SCP systems as in case of SDS, the structures remain in memory and
53 * don't need to be overwritten.
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000054 */
55
56static unsigned int scp_boot_config;
57
Soby Mathew7d5a2e72018-01-10 15:59:31 +000058void bl2_early_platform_setup2(u_register_t arg0, u_register_t arg1,
59 u_register_t arg2, u_register_t arg3)
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000060{
Soby Mathew7d5a2e72018-01-10 15:59:31 +000061 arm_bl2_early_platform_setup((uintptr_t)arg0, (meminfo_t *)arg1);
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000062
Juan Castilloa72b6472015-12-10 15:49:17 +000063 /* Save SCP Boot config before it gets overwritten by SCP_BL2 loading */
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000064 scp_boot_config = mmio_read_32(SCP_BOOT_CFG_ADDR);
65 VERBOSE("BL2: Saved SCP Boot config = 0x%x\n", scp_boot_config);
66}
67
68void bl2_platform_setup(void)
69{
70 arm_bl2_platform_setup();
71
72 /*
73 * Before releasing the AP cores out of reset, the SCP writes some data
74 * at the beginning of the Trusted SRAM. It is is overwritten before
75 * reaching this function. We need to restore this data, as if the
76 * target had just come out of reset. This implies:
Roberto Vargas0b52e782017-08-30 08:24:48 +010077 * - zeroing the first 128 bytes of Trusted SRAM using zeromem instead
78 * of zero_normalmem since this is device memory.
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000079 * - restoring the SCP boot configuration.
80 */
81 VERBOSE("BL2: Restoring SCP reset data in Trusted SRAM\n");
Roberto Vargas0b52e782017-08-30 08:24:48 +010082 zeromem((void *) ARM_SHARED_RAM_BASE, 128);
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000083 mmio_write_32(SCP_BOOT_CFG_ADDR, scp_boot_config);
84}
Soby Mathew1ced6b82017-06-12 12:37:10 +010085
86# endif /* EL3_PAYLOAD_BASE */
87
88#endif /* CSS_USE_SCMI_SDS_DRIVER */