Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 1 | /* |
Douglas Raillard | 21362a9 | 2016-12-02 13:51:54 +0000 | [diff] [blame] | 2 | * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 3 | * |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 5 | */ |
| 6 | |
| 7 | #include <bl_common.h> |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 8 | #include <css_def.h> |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 9 | #include <debug.h> |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 10 | #include <mmio.h> |
| 11 | #include <plat_arm.h> |
| 12 | #include <string.h> |
Scott Branden | bf404c0 | 2017-04-10 11:45:52 -0700 | [diff] [blame] | 13 | #include <utils.h> |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 14 | #include "css_scp_bootloader.h" |
| 15 | |
| 16 | /* Weak definition may be overridden in specific CSS based platform */ |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 17 | #if LOAD_IMAGE_V2 |
| 18 | #pragma weak plat_arm_bl2_handle_scp_bl2 |
| 19 | #else |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 20 | #pragma weak bl2_plat_handle_scp_bl2 |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 21 | #endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 22 | |
| 23 | /******************************************************************************* |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 24 | * Transfer SCP_BL2 from Trusted RAM using the SCP Download protocol. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 25 | * Return 0 on success, -1 otherwise. |
| 26 | ******************************************************************************/ |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 27 | #if LOAD_IMAGE_V2 |
| 28 | int plat_arm_bl2_handle_scp_bl2(image_info_t *scp_bl2_image_info) |
| 29 | #else |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 30 | int bl2_plat_handle_scp_bl2(image_info_t *scp_bl2_image_info) |
Yatharth Kochar | f9a0f16 | 2016-09-13 17:07:57 +0100 | [diff] [blame] | 31 | #endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 32 | { |
| 33 | int ret; |
| 34 | |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 35 | INFO("BL2: Initiating SCP_BL2 transfer to SCP\n"); |
Sandrine Bailleux | 04b66d8 | 2015-03-18 14:52:53 +0000 | [diff] [blame] | 36 | |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 37 | ret = scp_bootloader_transfer((void *)scp_bl2_image_info->image_base, |
| 38 | scp_bl2_image_info->image_size); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 39 | |
| 40 | if (ret == 0) |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 41 | INFO("BL2: SCP_BL2 transferred to SCP\n"); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 42 | else |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 43 | ERROR("BL2: SCP_BL2 transfer failure\n"); |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 44 | |
| 45 | return ret; |
| 46 | } |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 47 | |
| 48 | #ifdef EL3_PAYLOAD_BASE |
| 49 | /* |
| 50 | * We need to override some of the platform functions when booting an EL3 |
| 51 | * payload. |
| 52 | */ |
| 53 | |
| 54 | static unsigned int scp_boot_config; |
| 55 | |
| 56 | void bl2_early_platform_setup(meminfo_t *mem_layout) |
| 57 | { |
| 58 | arm_bl2_early_platform_setup(mem_layout); |
| 59 | |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 60 | /* Save SCP Boot config before it gets overwritten by SCP_BL2 loading */ |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 61 | scp_boot_config = mmio_read_32(SCP_BOOT_CFG_ADDR); |
| 62 | VERBOSE("BL2: Saved SCP Boot config = 0x%x\n", scp_boot_config); |
| 63 | } |
| 64 | |
| 65 | void bl2_platform_setup(void) |
| 66 | { |
| 67 | arm_bl2_platform_setup(); |
| 68 | |
| 69 | /* |
| 70 | * Before releasing the AP cores out of reset, the SCP writes some data |
| 71 | * at the beginning of the Trusted SRAM. It is is overwritten before |
| 72 | * reaching this function. We need to restore this data, as if the |
| 73 | * target had just come out of reset. This implies: |
| 74 | * - zeroing the first 128 bytes of Trusted SRAM; |
| 75 | * - restoring the SCP boot configuration. |
| 76 | */ |
| 77 | VERBOSE("BL2: Restoring SCP reset data in Trusted SRAM\n"); |
Douglas Raillard | 21362a9 | 2016-12-02 13:51:54 +0000 | [diff] [blame] | 78 | zero_normalmem((void *)ARM_TRUSTED_SRAM_BASE, 128); |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 79 | mmio_write_32(SCP_BOOT_CFG_ADDR, scp_boot_config); |
| 80 | } |
| 81 | #endif /* EL3_PAYLOAD_BASE */ |