blob: 73549aa0b24ed6b570e13e9c2409e7e469de7935 [file] [log] [blame]
Dan Handley9df48042015-03-19 18:58:55 +00001/*
Douglas Raillard21362a92016-12-02 13:51:54 +00002 * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved.
Dan Handley9df48042015-03-19 18:58:55 +00003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Dan Handley9df48042015-03-19 18:58:55 +00005 */
6
7#include <bl_common.h>
Sandrine Bailleux03897bb2015-11-26 16:31:34 +00008#include <css_def.h>
Dan Handley9df48042015-03-19 18:58:55 +00009#include <debug.h>
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000010#include <mmio.h>
11#include <plat_arm.h>
12#include <string.h>
Scott Brandenbf404c02017-04-10 11:45:52 -070013#include <utils.h>
Dan Handley9df48042015-03-19 18:58:55 +000014#include "css_scp_bootloader.h"
15
16/* Weak definition may be overridden in specific CSS based platform */
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010017#if LOAD_IMAGE_V2
18#pragma weak plat_arm_bl2_handle_scp_bl2
19#else
Juan Castilloa72b6472015-12-10 15:49:17 +000020#pragma weak bl2_plat_handle_scp_bl2
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010021#endif
Dan Handley9df48042015-03-19 18:58:55 +000022
23/*******************************************************************************
Juan Castilloa72b6472015-12-10 15:49:17 +000024 * Transfer SCP_BL2 from Trusted RAM using the SCP Download protocol.
Dan Handley9df48042015-03-19 18:58:55 +000025 * Return 0 on success, -1 otherwise.
26 ******************************************************************************/
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010027#if LOAD_IMAGE_V2
28int plat_arm_bl2_handle_scp_bl2(image_info_t *scp_bl2_image_info)
29#else
Juan Castilloa72b6472015-12-10 15:49:17 +000030int bl2_plat_handle_scp_bl2(image_info_t *scp_bl2_image_info)
Yatharth Kocharf9a0f162016-09-13 17:07:57 +010031#endif
Dan Handley9df48042015-03-19 18:58:55 +000032{
33 int ret;
34
Juan Castilloa72b6472015-12-10 15:49:17 +000035 INFO("BL2: Initiating SCP_BL2 transfer to SCP\n");
Sandrine Bailleux04b66d82015-03-18 14:52:53 +000036
Juan Castilloa72b6472015-12-10 15:49:17 +000037 ret = scp_bootloader_transfer((void *)scp_bl2_image_info->image_base,
38 scp_bl2_image_info->image_size);
Dan Handley9df48042015-03-19 18:58:55 +000039
40 if (ret == 0)
Juan Castilloa72b6472015-12-10 15:49:17 +000041 INFO("BL2: SCP_BL2 transferred to SCP\n");
Dan Handley9df48042015-03-19 18:58:55 +000042 else
Juan Castilloa72b6472015-12-10 15:49:17 +000043 ERROR("BL2: SCP_BL2 transfer failure\n");
Dan Handley9df48042015-03-19 18:58:55 +000044
45 return ret;
46}
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000047
48#ifdef EL3_PAYLOAD_BASE
49/*
50 * We need to override some of the platform functions when booting an EL3
51 * payload.
52 */
53
54static unsigned int scp_boot_config;
55
56void bl2_early_platform_setup(meminfo_t *mem_layout)
57{
58 arm_bl2_early_platform_setup(mem_layout);
59
Juan Castilloa72b6472015-12-10 15:49:17 +000060 /* Save SCP Boot config before it gets overwritten by SCP_BL2 loading */
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000061 scp_boot_config = mmio_read_32(SCP_BOOT_CFG_ADDR);
62 VERBOSE("BL2: Saved SCP Boot config = 0x%x\n", scp_boot_config);
63}
64
65void bl2_platform_setup(void)
66{
67 arm_bl2_platform_setup();
68
69 /*
70 * Before releasing the AP cores out of reset, the SCP writes some data
71 * at the beginning of the Trusted SRAM. It is is overwritten before
72 * reaching this function. We need to restore this data, as if the
73 * target had just come out of reset. This implies:
74 * - zeroing the first 128 bytes of Trusted SRAM;
75 * - restoring the SCP boot configuration.
76 */
77 VERBOSE("BL2: Restoring SCP reset data in Trusted SRAM\n");
Douglas Raillard21362a92016-12-02 13:51:54 +000078 zero_normalmem((void *)ARM_TRUSTED_SRAM_BASE, 128);
Sandrine Bailleux03897bb2015-11-26 16:31:34 +000079 mmio_write_32(SCP_BOOT_CFG_ADDR, scp_boot_config);
80}
81#endif /* EL3_PAYLOAD_BASE */