xref: /rk3399_ARM-atf/plat/socionext/uniphier/uniphier_bl2_setup.c (revision f29d1e0c72e6665ba4c8ab11bad83f59669ea0d9)
1 /*
2  * Copyright (c) 2017-2020, ARM Limited and Contributors. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  */
6 
7 #include <errno.h>
8 
9 #include <platform_def.h>
10 
11 #include <common/bl_common.h>
12 #include <common/debug.h>
13 #include <common/desc_image_load.h>
14 #include <common/image_decompress.h>
15 #include <drivers/io/io_storage.h>
16 #include <lib/xlat_tables/xlat_tables_v2.h>
17 #include <plat/common/platform.h>
18 #ifdef UNIPHIER_DECOMPRESS_GZIP
19 #include <tf_gunzip.h>
20 #endif
21 
22 #include "uniphier.h"
23 
24 #define UNIPHIER_IMAGE_BUF_OFFSET	0x04300000UL
25 #define UNIPHIER_IMAGE_BUF_SIZE		0x00100000UL
26 
27 static uintptr_t uniphier_mem_base = UNIPHIER_MEM_BASE;
28 static unsigned int uniphier_soc = UNIPHIER_SOC_UNKNOWN;
29 static int uniphier_bl2_kick_scp;
30 
31 void bl2_el3_early_platform_setup(u_register_t x0, u_register_t x1,
32 				  u_register_t x2, u_register_t x3)
33 {
34 	uniphier_soc = uniphier_get_soc_id();
35 	if (uniphier_soc == UNIPHIER_SOC_UNKNOWN)
36 		plat_error_handler(-ENOTSUP);
37 
38 	uniphier_console_setup(uniphier_soc);
39 }
40 
41 void bl2_el3_plat_arch_setup(void)
42 {
43 	int skip_scp = 0;
44 	int ret;
45 
46 	uniphier_mmap_setup(uniphier_soc);
47 	enable_mmu_el3(0);
48 
49 	/* add relocation offset (run-time-address - link-address) */
50 	uniphier_mem_base += BL_CODE_BASE - BL2_BASE;
51 
52 	ret = uniphier_io_setup(uniphier_soc, uniphier_mem_base);
53 	if (ret) {
54 		ERROR("failed to setup io devices\n");
55 		plat_error_handler(ret);
56 	}
57 
58 	switch (uniphier_get_boot_master(uniphier_soc)) {
59 	case UNIPHIER_BOOT_MASTER_THIS:
60 		INFO("Booting from this SoC\n");
61 		skip_scp = 1;
62 		break;
63 	case UNIPHIER_BOOT_MASTER_SCP:
64 		INFO("Booting from on-chip SCP\n");
65 		if (uniphier_scp_is_running()) {
66 			INFO("SCP is already running. SCP_BL2 load will be skipped.\n");
67 			skip_scp = 1;
68 		}
69 
70 		/*
71 		 * SCP must be kicked every time even if it is already running
72 		 * because it polls this event after the reboot of the backend.
73 		 */
74 		uniphier_bl2_kick_scp = 1;
75 		break;
76 	case UNIPHIER_BOOT_MASTER_EXT:
77 		INFO("Booting from external SCP\n");
78 		skip_scp = 1;
79 		break;
80 	default:
81 		plat_error_handler(-ENOTSUP);
82 		break;
83 	}
84 
85 	if (skip_scp) {
86 		struct image_info *image_info;
87 
88 		image_info = uniphier_get_image_info(SCP_BL2_IMAGE_ID);
89 		image_info->h.attr |= IMAGE_ATTRIB_SKIP_LOADING;
90 	}
91 }
92 
93 void bl2_platform_setup(void)
94 {
95 }
96 
97 void plat_flush_next_bl_params(void)
98 {
99 	flush_bl_params_desc();
100 }
101 
102 bl_load_info_t *plat_get_bl_image_load_info(void)
103 {
104 	return get_bl_load_info_from_mem_params_desc();
105 }
106 
107 bl_params_t *plat_get_next_bl_params(void)
108 {
109 	return get_next_bl_params_from_mem_params_desc();
110 }
111 
112 void bl2_plat_preload_setup(void)
113 {
114 #ifdef UNIPHIER_DECOMPRESS_GZIP
115 	uintptr_t buf_base = uniphier_mem_base + UNIPHIER_IMAGE_BUF_OFFSET;
116 	int ret;
117 
118 	ret = mmap_add_dynamic_region(buf_base, buf_base,
119 				      UNIPHIER_IMAGE_BUF_SIZE,
120 				      MT_MEMORY | MT_RW | MT_NS);
121 	if (ret)
122 		plat_error_handler(ret);
123 
124 	image_decompress_init(buf_base, UNIPHIER_IMAGE_BUF_SIZE, gunzip);
125 #endif
126 
127 	uniphier_init_image_descs(uniphier_mem_base);
128 }
129 
130 int bl2_plat_handle_pre_image_load(unsigned int image_id)
131 {
132 	struct image_info *image_info;
133 	int ret;
134 
135 	image_info = uniphier_get_image_info(image_id);
136 
137 	ret = mmap_add_dynamic_region(image_info->image_base,
138 				      image_info->image_base,
139 				      image_info->image_max_size,
140 				      MT_MEMORY | MT_RW | MT_NS);
141 	if (ret)
142 		return ret;
143 
144 #ifdef UNIPHIER_DECOMPRESS_GZIP
145 	image_decompress_prepare(image_info);
146 #endif
147 	return 0;
148 }
149 
150 int bl2_plat_handle_post_image_load(unsigned int image_id)
151 {
152 	struct image_info *image_info = uniphier_get_image_info(image_id);
153 #ifdef UNIPHIER_DECOMPRESS_GZIP
154 	int ret;
155 
156 	if (!(image_info->h.attr & IMAGE_ATTRIB_SKIP_LOADING)) {
157 		ret = image_decompress(uniphier_get_image_info(image_id));
158 		if (ret)
159 			return ret;
160 	}
161 #endif
162 
163 	if (image_id == SCP_BL2_IMAGE_ID && uniphier_bl2_kick_scp)
164 		uniphier_scp_start(image_info->image_base);
165 
166 	return 0;
167 }
168