xref: /rk3399_ARM-atf/plat/hisilicon/hikey/hikey_bl31_setup.c (revision 09d40e0e08283a249e7dce0e106c07c5141f9b7e)
1127793daSHaojian Zhuang /*
2103c213cSHaojian Zhuang  * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
3127793daSHaojian Zhuang  *
4127793daSHaojian Zhuang  * SPDX-License-Identifier: BSD-3-Clause
5127793daSHaojian Zhuang  */
6127793daSHaojian Zhuang 
7127793daSHaojian Zhuang #include <assert.h>
8127793daSHaojian Zhuang #include <errno.h>
9*09d40e0eSAntonio Nino Diaz 
10*09d40e0eSAntonio Nino Diaz #include <platform_def.h>
11*09d40e0eSAntonio Nino Diaz 
12*09d40e0eSAntonio Nino Diaz #include <arch_helpers.h>
13*09d40e0eSAntonio Nino Diaz #include <common/bl_common.h>
14*09d40e0eSAntonio Nino Diaz #include <common/debug.h>
15*09d40e0eSAntonio Nino Diaz #include <common/interrupt_props.h>
16*09d40e0eSAntonio Nino Diaz #include <drivers/arm/cci.h>
17*09d40e0eSAntonio Nino Diaz #include <drivers/arm/gicv2.h>
18*09d40e0eSAntonio Nino Diaz #include <drivers/arm/pl011.h>
19*09d40e0eSAntonio Nino Diaz #include <lib/mmio.h>
20*09d40e0eSAntonio Nino Diaz 
21127793daSHaojian Zhuang #include <hi6220.h>
224368ae07SMichael Brandl #include <hikey_def.h>
23127793daSHaojian Zhuang #include <hisi_ipc.h>
24127793daSHaojian Zhuang #include <hisi_pwrc.h>
25127793daSHaojian Zhuang 
26127793daSHaojian Zhuang #include "hikey_private.h"
27127793daSHaojian Zhuang 
28127793daSHaojian Zhuang /*
29127793daSHaojian Zhuang  * The next 2 constants identify the extents of the code & RO data region.
30127793daSHaojian Zhuang  * These addresses are used by the MMU setup code and therefore they must be
31127793daSHaojian Zhuang  * page-aligned.  It is the responsibility of the linker script to ensure that
32127793daSHaojian Zhuang  * __RO_START__ and __RO_END__ linker symbols refer to page-aligned addresses.
33127793daSHaojian Zhuang  */
34127793daSHaojian Zhuang #define BL31_RO_BASE (unsigned long)(&__RO_START__)
35127793daSHaojian Zhuang #define BL31_RO_LIMIT (unsigned long)(&__RO_END__)
36127793daSHaojian Zhuang 
37127793daSHaojian Zhuang /*
38127793daSHaojian Zhuang  * The next 2 constants identify the extents of the coherent memory region.
39127793daSHaojian Zhuang  * These addresses are used by the MMU setup code and therefore they must be
40127793daSHaojian Zhuang  * page-aligned.  It is the responsibility of the linker script to ensure that
41127793daSHaojian Zhuang  * __COHERENT_RAM_START__ and __COHERENT_RAM_END__ linker symbols refer to
42127793daSHaojian Zhuang  * page-aligned addresses.
43127793daSHaojian Zhuang  */
44127793daSHaojian Zhuang #define BL31_COHERENT_RAM_BASE (unsigned long)(&__COHERENT_RAM_START__)
45127793daSHaojian Zhuang #define BL31_COHERENT_RAM_LIMIT (unsigned long)(&__COHERENT_RAM_END__)
46127793daSHaojian Zhuang 
47127793daSHaojian Zhuang static entry_point_info_t bl32_ep_info;
48127793daSHaojian Zhuang static entry_point_info_t bl33_ep_info;
49c779b159SJerome Forissier static console_pl011_t console;
50127793daSHaojian Zhuang 
51127793daSHaojian Zhuang /******************************************************************************
52127793daSHaojian Zhuang  * On a GICv2 system, the Group 1 secure interrupts are treated as Group 0
53127793daSHaojian Zhuang  * interrupts.
54127793daSHaojian Zhuang  *****************************************************************************/
55c3b5800bSAntonio Nino Diaz static const interrupt_prop_t g0_interrupt_props[] = {
56c3b5800bSAntonio Nino Diaz 	INTR_PROP_DESC(IRQ_SEC_PHY_TIMER, GIC_HIGHEST_SEC_PRIORITY,
57c3b5800bSAntonio Nino Diaz 		       GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
58c3b5800bSAntonio Nino Diaz 	INTR_PROP_DESC(IRQ_SEC_SGI_0, GIC_HIGHEST_SEC_PRIORITY,
59c3b5800bSAntonio Nino Diaz 		       GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
60127793daSHaojian Zhuang };
61127793daSHaojian Zhuang 
62127793daSHaojian Zhuang /*
63127793daSHaojian Zhuang  * Ideally `arm_gic_data` structure definition should be a `const` but it is
64127793daSHaojian Zhuang  * kept as modifiable for overwriting with different GICD and GICC base when
65127793daSHaojian Zhuang  * running on FVP with VE memory map.
66127793daSHaojian Zhuang  */
67127793daSHaojian Zhuang gicv2_driver_data_t hikey_gic_data = {
68127793daSHaojian Zhuang 	.gicd_base = PLAT_ARM_GICD_BASE,
69127793daSHaojian Zhuang 	.gicc_base = PLAT_ARM_GICC_BASE,
70c3b5800bSAntonio Nino Diaz 	.interrupt_props = g0_interrupt_props,
71c3b5800bSAntonio Nino Diaz 	.interrupt_props_num = ARRAY_SIZE(g0_interrupt_props),
72127793daSHaojian Zhuang };
73127793daSHaojian Zhuang 
74127793daSHaojian Zhuang static const int cci_map[] = {
75127793daSHaojian Zhuang 	CCI400_SL_IFACE3_CLUSTER_IX,
76127793daSHaojian Zhuang 	CCI400_SL_IFACE4_CLUSTER_IX
77127793daSHaojian Zhuang };
78127793daSHaojian Zhuang 
79b16bb16eSVictor Chong entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
80127793daSHaojian Zhuang {
81127793daSHaojian Zhuang 	entry_point_info_t *next_image_info;
82127793daSHaojian Zhuang 
83127793daSHaojian Zhuang 	next_image_info = (type == NON_SECURE) ? &bl33_ep_info : &bl32_ep_info;
84127793daSHaojian Zhuang 
85127793daSHaojian Zhuang 	/* None of the images on this platform can have 0x0 as the entrypoint */
86127793daSHaojian Zhuang 	if (next_image_info->pc)
87127793daSHaojian Zhuang 		return next_image_info;
88127793daSHaojian Zhuang 	return NULL;
89127793daSHaojian Zhuang }
90127793daSHaojian Zhuang 
91c3b5800bSAntonio Nino Diaz void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
92c3b5800bSAntonio Nino Diaz 				u_register_t arg2, u_register_t arg3)
93127793daSHaojian Zhuang {
94c3b5800bSAntonio Nino Diaz 	void *from_bl2;
95c3b5800bSAntonio Nino Diaz 
96c3b5800bSAntonio Nino Diaz 	from_bl2 = (void *) arg0;
97c3b5800bSAntonio Nino Diaz 
98127793daSHaojian Zhuang 	/* Initialize the console to provide early debug support */
99c779b159SJerome Forissier 	console_pl011_register(CONSOLE_BASE, PL011_UART_CLK_IN_HZ,
100c779b159SJerome Forissier 			       PL011_BAUDRATE, &console);
101127793daSHaojian Zhuang 
102127793daSHaojian Zhuang 	/* Initialize CCI driver */
103127793daSHaojian Zhuang 	cci_init(CCI400_BASE, cci_map, ARRAY_SIZE(cci_map));
104c78d524cSLeo Yan 	cci_enable_snoop_dvm_reqs(MPIDR_AFFLVL1_VAL(read_mpidr_el1()));
105127793daSHaojian Zhuang 
1062de0c5ccSVictor Chong 	/*
1072de0c5ccSVictor Chong 	 * Check params passed from BL2 should not be NULL,
1082de0c5ccSVictor Chong 	 */
1092de0c5ccSVictor Chong 	bl_params_t *params_from_bl2 = (bl_params_t *)from_bl2;
1102de0c5ccSVictor Chong 	assert(params_from_bl2 != NULL);
1112de0c5ccSVictor Chong 	assert(params_from_bl2->h.type == PARAM_BL_PARAMS);
1122de0c5ccSVictor Chong 	assert(params_from_bl2->h.version >= VERSION_2);
1132de0c5ccSVictor Chong 
1142de0c5ccSVictor Chong 	bl_params_node_t *bl_params = params_from_bl2->head;
1152de0c5ccSVictor Chong 
1162de0c5ccSVictor Chong 	/*
1172de0c5ccSVictor Chong 	 * Copy BL33 and BL32 (if present), entry point information.
1182de0c5ccSVictor Chong 	 * They are stored in Secure RAM, in BL2's address space.
1192de0c5ccSVictor Chong 	 */
1202de0c5ccSVictor Chong 	while (bl_params) {
1212de0c5ccSVictor Chong 		if (bl_params->image_id == BL32_IMAGE_ID)
1222de0c5ccSVictor Chong 			bl32_ep_info = *bl_params->ep_info;
1232de0c5ccSVictor Chong 
1242de0c5ccSVictor Chong 		if (bl_params->image_id == BL33_IMAGE_ID)
1252de0c5ccSVictor Chong 			bl33_ep_info = *bl_params->ep_info;
1262de0c5ccSVictor Chong 
1272de0c5ccSVictor Chong 		bl_params = bl_params->next_params_info;
1282de0c5ccSVictor Chong 	}
1292de0c5ccSVictor Chong 
1302de0c5ccSVictor Chong 	if (bl33_ep_info.pc == 0)
1312de0c5ccSVictor Chong 		panic();
132127793daSHaojian Zhuang }
133127793daSHaojian Zhuang 
134127793daSHaojian Zhuang void bl31_plat_arch_setup(void)
135127793daSHaojian Zhuang {
136127793daSHaojian Zhuang 	hikey_init_mmu_el3(BL31_BASE,
137127793daSHaojian Zhuang 			   BL31_LIMIT - BL31_BASE,
138127793daSHaojian Zhuang 			   BL31_RO_BASE,
139127793daSHaojian Zhuang 			   BL31_RO_LIMIT,
140127793daSHaojian Zhuang 			   BL31_COHERENT_RAM_BASE,
141127793daSHaojian Zhuang 			   BL31_COHERENT_RAM_LIMIT);
142127793daSHaojian Zhuang }
143127793daSHaojian Zhuang 
144f715bfddSHaojian Zhuang /* Initialize EDMAC controller with non-secure mode. */
145f715bfddSHaojian Zhuang static void hikey_edma_init(void)
146f715bfddSHaojian Zhuang {
147f715bfddSHaojian Zhuang 	int i;
148f715bfddSHaojian Zhuang 	uint32_t non_secure;
149f715bfddSHaojian Zhuang 
150f715bfddSHaojian Zhuang 	non_secure = EDMAC_SEC_CTRL_INTR_SEC | EDMAC_SEC_CTRL_GLOBAL_SEC;
151f715bfddSHaojian Zhuang 	mmio_write_32(EDMAC_SEC_CTRL, non_secure);
152f715bfddSHaojian Zhuang 
153f715bfddSHaojian Zhuang 	for (i = 0; i < EDMAC_CHANNEL_NUMS; i++) {
154f715bfddSHaojian Zhuang 		mmio_write_32(EDMAC_AXI_CONF(i), (1 << 6) | (1 << 18));
155f715bfddSHaojian Zhuang 	}
156f715bfddSHaojian Zhuang }
157f715bfddSHaojian Zhuang 
158127793daSHaojian Zhuang void bl31_platform_setup(void)
159127793daSHaojian Zhuang {
160127793daSHaojian Zhuang 	/* Initialize the GIC driver, cpu and distributor interfaces */
161127793daSHaojian Zhuang 	gicv2_driver_init(&hikey_gic_data);
162127793daSHaojian Zhuang 	gicv2_distif_init();
163127793daSHaojian Zhuang 	gicv2_pcpu_distif_init();
164127793daSHaojian Zhuang 	gicv2_cpuif_enable();
165127793daSHaojian Zhuang 
166f715bfddSHaojian Zhuang 	hikey_edma_init();
167f715bfddSHaojian Zhuang 
168127793daSHaojian Zhuang 	hisi_ipc_init();
169127793daSHaojian Zhuang 	hisi_pwrc_setup();
170127793daSHaojian Zhuang }
171127793daSHaojian Zhuang 
172127793daSHaojian Zhuang void bl31_plat_runtime_setup(void)
173127793daSHaojian Zhuang {
174127793daSHaojian Zhuang }
175