fb7997c891f2387531239b2c0aeeb114052674cc
[project/bcm63xx/atf.git] / plat / socionext / uniphier / uniphier_bl2_setup.c
1 /*
2 * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7 #include <bl_common.h>
8 #include <debug.h>
9 #include <desc_image_load.h>
10 #include <errno.h>
11 #include <io/io_storage.h>
12 #include <image_decompress.h>
13 #include <platform.h>
14 #include <platform_def.h>
15 #ifdef UNIPHIER_DECOMPRESS_GZIP
16 #include <tf_gunzip.h>
17 #endif
18 #include <xlat_tables_v2.h>
19
20 #include "uniphier.h"
21
22 #define BL2_END (unsigned long)(&__BL2_END__)
23 #define BL2_SIZE ((BL2_END) - (BL2_BASE))
24
25 static int uniphier_bl2_kick_scp;
26
27 void bl2_el3_early_platform_setup(u_register_t x0, u_register_t x1,
28 u_register_t x2, u_register_t x3)
29 {
30 uniphier_console_setup();
31 }
32
33 static const struct mmap_region uniphier_bl2_mmap[] = {
34 /* for BL31, BL32 */
35 MAP_REGION_FLAT(UNIPHIER_SEC_DRAM_BASE, UNIPHIER_SEC_DRAM_SIZE,
36 MT_MEMORY | MT_RW | MT_SECURE),
37 /* for SCP, BL33 */
38 MAP_REGION_FLAT(UNIPHIER_NS_DRAM_BASE, UNIPHIER_NS_DRAM_SIZE,
39 MT_MEMORY | MT_RW | MT_NS),
40 { .size = 0 },
41 };
42
43 void bl2_el3_plat_arch_setup(void)
44 {
45 unsigned int soc;
46 int skip_scp = 0;
47 int ret;
48
49 uniphier_mmap_setup(BL2_BASE, BL2_SIZE, uniphier_bl2_mmap);
50 enable_mmu_el3(0);
51
52 soc = uniphier_get_soc_id();
53 if (soc == UNIPHIER_SOC_UNKNOWN) {
54 ERROR("unsupported SoC\n");
55 plat_error_handler(-ENOTSUP);
56 }
57
58 ret = uniphier_io_setup(soc);
59 if (ret) {
60 ERROR("failed to setup io devices\n");
61 plat_error_handler(ret);
62 }
63
64 switch (uniphier_get_boot_master(soc)) {
65 case UNIPHIER_BOOT_MASTER_THIS:
66 INFO("Booting from this SoC\n");
67 skip_scp = 1;
68 break;
69 case UNIPHIER_BOOT_MASTER_SCP:
70 INFO("Booting from on-chip SCP\n");
71 if (uniphier_scp_is_running()) {
72 INFO("SCP is already running. SCP_BL2 load will be skipped.\n");
73 skip_scp = 1;
74 }
75
76 /*
77 * SCP must be kicked every time even if it is already running
78 * because it polls this event after the reboot of the backend.
79 */
80 uniphier_bl2_kick_scp = 1;
81 break;
82 case UNIPHIER_BOOT_MASTER_EXT:
83 INFO("Booting from external SCP\n");
84 skip_scp = 1;
85 break;
86 default:
87 plat_error_handler(-ENOTSUP);
88 break;
89 }
90
91 if (skip_scp) {
92 struct image_info *image_info;
93
94 image_info = uniphier_get_image_info(SCP_BL2_IMAGE_ID);
95 image_info->h.attr |= IMAGE_ATTRIB_SKIP_LOADING;
96 }
97 }
98
99 void bl2_platform_setup(void)
100 {
101 }
102
103 void plat_flush_next_bl_params(void)
104 {
105 flush_bl_params_desc();
106 }
107
108 bl_load_info_t *plat_get_bl_image_load_info(void)
109 {
110 return get_bl_load_info_from_mem_params_desc();
111 }
112
113 bl_params_t *plat_get_next_bl_params(void)
114 {
115 return get_next_bl_params_from_mem_params_desc();
116 }
117
118 void bl2_plat_preload_setup(void)
119 {
120 #ifdef UNIPHIER_DECOMPRESS_GZIP
121 image_decompress_init(UNIPHIER_IMAGE_BUF_BASE,
122 UNIPHIER_IMAGE_BUF_SIZE,
123 gunzip);
124 #endif
125 }
126
127 int bl2_plat_handle_pre_image_load(unsigned int image_id)
128 {
129 #ifdef UNIPHIER_DECOMPRESS_GZIP
130 image_decompress_prepare(uniphier_get_image_info(image_id));
131 #endif
132 return 0;
133 }
134
135 int bl2_plat_handle_post_image_load(unsigned int image_id)
136 {
137 #ifdef UNIPHIER_DECOMPRESS_GZIP
138 struct image_info *image_info;
139 int ret;
140
141 image_info = uniphier_get_image_info(image_id);
142
143 if (!(image_info->h.attr & IMAGE_ATTRIB_SKIP_LOADING)) {
144 ret = image_decompress(uniphier_get_image_info(image_id));
145 if (ret)
146 return ret;
147 }
148 #endif
149
150 if (image_id == SCP_BL2_IMAGE_ID && uniphier_bl2_kick_scp)
151 uniphier_scp_start();
152
153 return 0;
154 }