xref: /rk3399_ARM-atf/plat/socionext/uniphier/uniphier_bl2_setup.c (revision ff2743e544f0f82381ebb9dff8f14eacb837d2e0)
1 /*
2  * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  */
6 
7 #include <bl_common.h>
8 #include <debug.h>
9 #include <desc_image_load.h>
10 #include <errno.h>
11 #include <io/io_storage.h>
12 #include <image_decompress.h>
13 #include <platform.h>
14 #include <platform_def.h>
15 #ifdef UNIPHIER_DECOMPRESS_GZIP
16 #include <tf_gunzip.h>
17 #endif
18 #include <xlat_tables_v2.h>
19 
20 #include "uniphier.h"
21 
22 #define BL2_END			(unsigned long)(&__BL2_END__)
23 #define BL2_SIZE		((BL2_END) - (BL2_BASE))
24 
25 static int uniphier_bl2_kick_scp;
26 
27 void bl2_el3_early_platform_setup(u_register_t x0, u_register_t x1,
28 				  u_register_t x2, u_register_t x3)
29 {
30 	uniphier_console_setup();
31 }
32 
33 static const struct mmap_region uniphier_bl2_mmap[] = {
34 	/* for BL31, BL32 */
35 	MAP_REGION_FLAT(UNIPHIER_SEC_DRAM_BASE, UNIPHIER_SEC_DRAM_SIZE,
36 			MT_MEMORY | MT_RW | MT_SECURE),
37 	/* for SCP, BL33 */
38 	MAP_REGION_FLAT(UNIPHIER_NS_DRAM_BASE, UNIPHIER_NS_DRAM_SIZE,
39 			MT_MEMORY | MT_RW | MT_NS),
40 	{ .size = 0 },
41 };
42 
43 void bl2_el3_plat_arch_setup(void)
44 {
45 	unsigned int soc;
46 	int skip_scp = 0;
47 	int ret;
48 
49 	uniphier_mmap_setup(BL2_BASE, BL2_SIZE, uniphier_bl2_mmap);
50 	enable_mmu_el3(0);
51 
52 	soc = uniphier_get_soc_id();
53 	if (soc == UNIPHIER_SOC_UNKNOWN) {
54 		ERROR("unsupported SoC\n");
55 		plat_error_handler(-ENOTSUP);
56 	}
57 
58 	ret = uniphier_io_setup(soc);
59 	if (ret) {
60 		ERROR("failed to setup io devices\n");
61 		plat_error_handler(ret);
62 	}
63 
64 	switch (uniphier_get_boot_master(soc)) {
65 	case UNIPHIER_BOOT_MASTER_THIS:
66 		INFO("Booting from this SoC\n");
67 		skip_scp = 1;
68 		break;
69 	case UNIPHIER_BOOT_MASTER_SCP:
70 		INFO("Booting from on-chip SCP\n");
71 		if (uniphier_scp_is_running()) {
72 			INFO("SCP is already running. SCP_BL2 load will be skipped.\n");
73 			skip_scp = 1;
74 		}
75 
76 		/*
77 		 * SCP must be kicked every time even if it is already running
78 		 * because it polls this event after the reboot of the backend.
79 		 */
80 		uniphier_bl2_kick_scp = 1;
81 		break;
82 	case UNIPHIER_BOOT_MASTER_EXT:
83 		INFO("Booting from external SCP\n");
84 		skip_scp = 1;
85 		break;
86 	default:
87 		plat_error_handler(-ENOTSUP);
88 		break;
89 	}
90 
91 	if (!skip_scp) {
92 		ret = uniphier_check_image(SCP_BL2_IMAGE_ID);
93 		if (ret) {
94 			WARN("SCP_BL2 image not found. SCP_BL2 load will be skipped.\n");
95 			WARN("You must setup SCP by other means.\n");
96 			skip_scp = 1;
97 			uniphier_bl2_kick_scp = 0;
98 		}
99 	}
100 
101 	if (skip_scp) {
102 		struct image_info *image_info;
103 
104 		image_info = uniphier_get_image_info(SCP_BL2_IMAGE_ID);
105 		image_info->h.attr |= IMAGE_ATTRIB_SKIP_LOADING;
106 	}
107 }
108 
109 void bl2_platform_setup(void)
110 {
111 }
112 
113 void plat_flush_next_bl_params(void)
114 {
115 	flush_bl_params_desc();
116 }
117 
118 bl_load_info_t *plat_get_bl_image_load_info(void)
119 {
120 	return get_bl_load_info_from_mem_params_desc();
121 }
122 
123 bl_params_t *plat_get_next_bl_params(void)
124 {
125 	return get_next_bl_params_from_mem_params_desc();
126 }
127 
128 void bl2_plat_preload_setup(void)
129 {
130 #ifdef UNIPHIER_DECOMPRESS_GZIP
131 	image_decompress_init(UNIPHIER_IMAGE_BUF_BASE,
132 			      UNIPHIER_IMAGE_BUF_SIZE,
133 			      gunzip);
134 #endif
135 }
136 
137 int bl2_plat_handle_pre_image_load(unsigned int image_id)
138 {
139 #ifdef UNIPHIER_DECOMPRESS_GZIP
140 	image_decompress_prepare(uniphier_get_image_info(image_id));
141 #endif
142 	return 0;
143 }
144 
145 int bl2_plat_handle_post_image_load(unsigned int image_id)
146 {
147 #ifdef UNIPHIER_DECOMPRESS_GZIP
148 	struct image_info *image_info;
149 	int ret;
150 
151 	image_info = uniphier_get_image_info(image_id);
152 
153 	if (!(image_info->h.attr & IMAGE_ATTRIB_SKIP_LOADING)) {
154 		ret = image_decompress(uniphier_get_image_info(image_id));
155 		if (ret)
156 			return ret;
157 	}
158 #endif
159 
160 	if (image_id == SCP_BL2_IMAGE_ID && uniphier_bl2_kick_scp)
161 		uniphier_scp_start();
162 
163 	return 0;
164 }
165