Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 1 | /* |
Soby Mathew | 7d5a2e7 | 2018-01-10 15:59:31 +0000 | [diff] [blame] | 2 | * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 3 | * |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 5 | */ |
| 6 | |
| 7 | #include <bl_common.h> |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 8 | #include <css_def.h> |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 9 | #include <debug.h> |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 10 | #include <mmio.h> |
| 11 | #include <plat_arm.h> |
| 12 | #include <string.h> |
Scott Branden | bf404c0 | 2017-04-10 11:45:52 -0700 | [diff] [blame] | 13 | #include <utils.h> |
Soby Mathew | 73b7bf9 | 2017-05-03 12:58:41 +0100 | [diff] [blame] | 14 | #include "../drivers/scp/css_scp.h" |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 15 | |
| 16 | /* Weak definition may be overridden in specific CSS based platform */ |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 17 | #if LOAD_IMAGE_V2 |
| 18 | #pragma weak plat_arm_bl2_handle_scp_bl2 |
| 19 | #else |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 20 | #pragma weak bl2_plat_handle_scp_bl2 |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 21 | #endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 22 | |
| 23 | /******************************************************************************* |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 24 | * Transfer SCP_BL2 from Trusted RAM using the SCP Download protocol. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 25 | * Return 0 on success, -1 otherwise. |
| 26 | ******************************************************************************/ |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 27 | #if LOAD_IMAGE_V2 |
| 28 | int plat_arm_bl2_handle_scp_bl2(image_info_t *scp_bl2_image_info) |
| 29 | #else |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 30 | int bl2_plat_handle_scp_bl2(image_info_t *scp_bl2_image_info) |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 31 | #endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 32 | { |
| 33 | int ret; |
| 34 | |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 35 | INFO("BL2: Initiating SCP_BL2 transfer to SCP\n"); |
Sandrine Bailleux | 04b66d8 | 2015-03-18 14:52:53 +0000 | [diff] [blame] | 36 | |
Soby Mathew | 73b7bf9 | 2017-05-03 12:58:41 +0100 | [diff] [blame] | 37 | ret = css_scp_boot_image_xfer((void *)scp_bl2_image_info->image_base, |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 38 | scp_bl2_image_info->image_size); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 39 | |
| 40 | if (ret == 0) |
Soby Mathew | 73b7bf9 | 2017-05-03 12:58:41 +0100 | [diff] [blame] | 41 | ret = css_scp_boot_ready(); |
| 42 | |
| 43 | if (ret == 0) |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 44 | INFO("BL2: SCP_BL2 transferred to SCP\n"); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 45 | else |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 46 | ERROR("BL2: SCP_BL2 transfer failure\n"); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 47 | |
| 48 | return ret; |
| 49 | } |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 50 | |
Soby Mathew | 1ced6b8 | 2017-06-12 12:37:10 +0100 | [diff] [blame] | 51 | #if !CSS_USE_SCMI_SDS_DRIVER |
Soby Mathew | e9263d0 | 2017-11-15 12:05:28 +0000 | [diff] [blame] | 52 | # if defined(EL3_PAYLOAD_BASE) || JUNO_AARCH32_EL3_RUNTIME |
Soby Mathew | 1ced6b8 | 2017-06-12 12:37:10 +0100 | [diff] [blame] | 53 | |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 54 | /* |
| 55 | * We need to override some of the platform functions when booting an EL3 |
Soby Mathew | e9263d0 | 2017-11-15 12:05:28 +0000 | [diff] [blame] | 56 | * payload or SP_MIN on Juno AArch32. This needs to be done only for |
| 57 | * SCPI/BOM SCP systems as in case of SDS, the structures remain in memory and |
| 58 | * don't need to be overwritten. |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 59 | */ |
| 60 | |
| 61 | static unsigned int scp_boot_config; |
| 62 | |
Soby Mathew | 7d5a2e7 | 2018-01-10 15:59:31 +0000 | [diff] [blame] | 63 | void bl2_early_platform_setup2(u_register_t arg0, u_register_t arg1, |
| 64 | u_register_t arg2, u_register_t arg3) |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 65 | { |
Soby Mathew | 7d5a2e7 | 2018-01-10 15:59:31 +0000 | [diff] [blame] | 66 | arm_bl2_early_platform_setup((uintptr_t)arg0, (meminfo_t *)arg1); |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 67 | |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 68 | /* Save SCP Boot config before it gets overwritten by SCP_BL2 loading */ |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 69 | scp_boot_config = mmio_read_32(SCP_BOOT_CFG_ADDR); |
| 70 | VERBOSE("BL2: Saved SCP Boot config = 0x%x\n", scp_boot_config); |
| 71 | } |
| 72 | |
| 73 | void bl2_platform_setup(void) |
| 74 | { |
| 75 | arm_bl2_platform_setup(); |
| 76 | |
| 77 | /* |
| 78 | * Before releasing the AP cores out of reset, the SCP writes some data |
| 79 | * at the beginning of the Trusted SRAM. It is is overwritten before |
| 80 | * reaching this function. We need to restore this data, as if the |
| 81 | * target had just come out of reset. This implies: |
Roberto Vargas | 0b52e78 | 2017-08-30 08:24:48 +0100 | [diff] [blame] | 82 | * - zeroing the first 128 bytes of Trusted SRAM using zeromem instead |
| 83 | * of zero_normalmem since this is device memory. |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 84 | * - restoring the SCP boot configuration. |
| 85 | */ |
| 86 | VERBOSE("BL2: Restoring SCP reset data in Trusted SRAM\n"); |
Roberto Vargas | 0b52e78 | 2017-08-30 08:24:48 +0100 | [diff] [blame] | 87 | zeromem((void *) ARM_SHARED_RAM_BASE, 128); |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 88 | mmio_write_32(SCP_BOOT_CFG_ADDR, scp_boot_config); |
| 89 | } |
Soby Mathew | 1ced6b8 | 2017-06-12 12:37:10 +0100 | [diff] [blame] | 90 | |
| 91 | # endif /* EL3_PAYLOAD_BASE */ |
| 92 | |
| 93 | #endif /* CSS_USE_SCMI_SDS_DRIVER */ |