1 /* 2 * Copyright (c) 2017-2020, ARM Limited and Contributors. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 7 #include <errno.h> 8 9 #include <platform_def.h> 10 11 #include <common/bl_common.h> 12 #include <common/debug.h> 13 #include <common/desc_image_load.h> 14 #include <common/image_decompress.h> 15 #include <drivers/io/io_storage.h> 16 #include <lib/xlat_tables/xlat_tables_v2.h> 17 #include <plat/common/platform.h> 18 #ifdef UNIPHIER_DECOMPRESS_GZIP 19 #include <tf_gunzip.h> 20 #endif 21 22 #include "uniphier.h" 23 24 #define UNIPHIER_IMAGE_BUF_OFFSET 0x04300000UL 25 #define UNIPHIER_IMAGE_BUF_SIZE 0x00100000UL 26 27 static uintptr_t uniphier_mem_base = UNIPHIER_MEM_BASE; 28 static unsigned int uniphier_soc = UNIPHIER_SOC_UNKNOWN; 29 static int uniphier_bl2_kick_scp; 30 31 void bl2_el3_early_platform_setup(u_register_t x0, u_register_t x1, 32 u_register_t x2, u_register_t x3) 33 { 34 uniphier_soc = uniphier_get_soc_id(); 35 if (uniphier_soc == UNIPHIER_SOC_UNKNOWN) 36 plat_error_handler(-ENOTSUP); 37 38 uniphier_console_setup(uniphier_soc); 39 } 40 41 void bl2_el3_plat_arch_setup(void) 42 { 43 int skip_scp = 0; 44 int ret; 45 46 uniphier_mmap_setup(uniphier_soc); 47 enable_mmu_el3(0); 48 49 /* add relocation offset (run-time-address - link-address) */ 50 uniphier_mem_base += BL_CODE_BASE - BL2_BASE; 51 52 ret = uniphier_io_setup(uniphier_soc, uniphier_mem_base); 53 if (ret) { 54 ERROR("failed to setup io devices\n"); 55 plat_error_handler(ret); 56 } 57 58 switch (uniphier_get_boot_master(uniphier_soc)) { 59 case UNIPHIER_BOOT_MASTER_THIS: 60 INFO("Booting from this SoC\n"); 61 skip_scp = 1; 62 break; 63 case UNIPHIER_BOOT_MASTER_SCP: 64 INFO("Booting from on-chip SCP\n"); 65 if (uniphier_scp_is_running()) { 66 INFO("SCP is already running. SCP_BL2 load will be skipped.\n"); 67 skip_scp = 1; 68 } 69 70 /* 71 * SCP must be kicked every time even if it is already running 72 * because it polls this event after the reboot of the backend. 73 */ 74 uniphier_bl2_kick_scp = 1; 75 break; 76 case UNIPHIER_BOOT_MASTER_EXT: 77 INFO("Booting from external SCP\n"); 78 skip_scp = 1; 79 break; 80 default: 81 plat_error_handler(-ENOTSUP); 82 break; 83 } 84 85 if (skip_scp) { 86 struct image_info *image_info; 87 88 image_info = uniphier_get_image_info(SCP_BL2_IMAGE_ID); 89 image_info->h.attr |= IMAGE_ATTRIB_SKIP_LOADING; 90 } 91 } 92 93 void bl2_platform_setup(void) 94 { 95 } 96 97 void plat_flush_next_bl_params(void) 98 { 99 flush_bl_params_desc(); 100 } 101 102 bl_load_info_t *plat_get_bl_image_load_info(void) 103 { 104 return get_bl_load_info_from_mem_params_desc(); 105 } 106 107 bl_params_t *plat_get_next_bl_params(void) 108 { 109 return get_next_bl_params_from_mem_params_desc(); 110 } 111 112 void bl2_plat_preload_setup(void) 113 { 114 #ifdef UNIPHIER_DECOMPRESS_GZIP 115 uintptr_t buf_base = uniphier_mem_base + UNIPHIER_IMAGE_BUF_OFFSET; 116 int ret; 117 118 ret = mmap_add_dynamic_region(buf_base, buf_base, 119 UNIPHIER_IMAGE_BUF_SIZE, 120 MT_MEMORY | MT_RW | MT_NS); 121 if (ret) 122 plat_error_handler(ret); 123 124 image_decompress_init(buf_base, UNIPHIER_IMAGE_BUF_SIZE, gunzip); 125 #endif 126 127 uniphier_init_image_descs(uniphier_mem_base); 128 } 129 130 int bl2_plat_handle_pre_image_load(unsigned int image_id) 131 { 132 struct image_info *image_info; 133 int ret; 134 135 image_info = uniphier_get_image_info(image_id); 136 137 ret = mmap_add_dynamic_region(image_info->image_base, 138 image_info->image_base, 139 image_info->image_max_size, 140 MT_MEMORY | MT_RW | MT_NS); 141 if (ret) 142 return ret; 143 144 #ifdef UNIPHIER_DECOMPRESS_GZIP 145 image_decompress_prepare(image_info); 146 #endif 147 return 0; 148 } 149 150 int bl2_plat_handle_post_image_load(unsigned int image_id) 151 { 152 struct image_info *image_info = uniphier_get_image_info(image_id); 153 #ifdef UNIPHIER_DECOMPRESS_GZIP 154 int ret; 155 156 if (!(image_info->h.attr & IMAGE_ATTRIB_SKIP_LOADING)) { 157 ret = image_decompress(uniphier_get_image_info(image_id)); 158 if (ret) 159 return ret; 160 } 161 #endif 162 163 if (image_id == SCP_BL2_IMAGE_ID && uniphier_bl2_kick_scp) 164 uniphier_scp_start(image_info->image_base); 165 166 return 0; 167 } 168