Home | History | Annotate | Download | only in common
      1 /*
      2  * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved.
      3  *
      4  * SPDX-License-Identifier: BSD-3-Clause
      5  */
      6 
      7 #include <bl_common.h>
      8 #include <css_def.h>
      9 #include <debug.h>
     10 #include <mmio.h>
     11 #include <plat_arm.h>
     12 #include <string.h>
     13 #include <utils.h>
     14 #include "../drivers/scp/css_scp.h"
     15 
     16 /* Weak definition may be overridden in specific CSS based platform */
     17 #if LOAD_IMAGE_V2
     18 #pragma weak plat_arm_bl2_handle_scp_bl2
     19 #else
     20 #pragma weak bl2_plat_handle_scp_bl2
     21 #endif
     22 
     23 /*******************************************************************************
     24  * Transfer SCP_BL2 from Trusted RAM using the SCP Download protocol.
     25  * Return 0 on success, -1 otherwise.
     26  ******************************************************************************/
     27 #if LOAD_IMAGE_V2
     28 int plat_arm_bl2_handle_scp_bl2(image_info_t *scp_bl2_image_info)
     29 #else
     30 int bl2_plat_handle_scp_bl2(image_info_t *scp_bl2_image_info)
     31 #endif
     32 {
     33 	int ret;
     34 
     35 	INFO("BL2: Initiating SCP_BL2 transfer to SCP\n");
     36 
     37 	ret = css_scp_boot_image_xfer((void *)scp_bl2_image_info->image_base,
     38 		scp_bl2_image_info->image_size);
     39 
     40 	if (ret == 0)
     41 		ret = css_scp_boot_ready();
     42 
     43 	if (ret == 0)
     44 		INFO("BL2: SCP_BL2 transferred to SCP\n");
     45 	else
     46 		ERROR("BL2: SCP_BL2 transfer failure\n");
     47 
     48 	return ret;
     49 }
     50 
     51 #if !CSS_USE_SCMI_SDS_DRIVER
     52 # ifdef EL3_PAYLOAD_BASE
     53 
     54 /*
     55  * We need to override some of the platform functions when booting an EL3
     56  * payload. These needs to be done only for SCPI/BOM SCP systems as
     57  * in case of SDS, the structures remain in memory and doesn't need to be
     58  * overwritten.
     59  */
     60 
     61 static unsigned int scp_boot_config;
     62 
     63 void bl2_early_platform_setup(meminfo_t *mem_layout)
     64 {
     65 	arm_bl2_early_platform_setup(mem_layout);
     66 
     67 	/* Save SCP Boot config before it gets overwritten by SCP_BL2 loading */
     68 	scp_boot_config = mmio_read_32(SCP_BOOT_CFG_ADDR);
     69 	VERBOSE("BL2: Saved SCP Boot config = 0x%x\n", scp_boot_config);
     70 }
     71 
     72 void bl2_platform_setup(void)
     73 {
     74 	arm_bl2_platform_setup();
     75 
     76 	/*
     77 	 * Before releasing the AP cores out of reset, the SCP writes some data
     78 	 * at the beginning of the Trusted SRAM. It is is overwritten before
     79 	 * reaching this function. We need to restore this data, as if the
     80 	 * target had just come out of reset. This implies:
     81 	 *  - zeroing the first 128 bytes of Trusted SRAM using zeromem instead
     82 	 *    of zero_normalmem since this is device memory.
     83 	 *  - restoring the SCP boot configuration.
     84 	 */
     85 	VERBOSE("BL2: Restoring SCP reset data in Trusted SRAM\n");
     86 	zeromem((void *) ARM_SHARED_RAM_BASE, 128);
     87 	mmio_write_32(SCP_BOOT_CFG_ADDR, scp_boot_config);
     88 }
     89 
     90 # endif /* EL3_PAYLOAD_BASE */
     91 
     92 #endif /* CSS_USE_SCMI_SDS_DRIVER */
     93