xref: /rk3399_ARM-atf/plat/mediatek/mt8173/bl31_plat_setup.c (revision 3fc26aa0938a838686644c146ee84c562d963c34)
17d116dccSCC Ma /*
21d0b990eSAntonio Nino Diaz  * Copyright (c) 2013-2016, ARM Limited and Contributors. All rights reserved.
37d116dccSCC Ma  *
47d116dccSCC Ma  * Redistribution and use in source and binary forms, with or without
57d116dccSCC Ma  * modification, are permitted provided that the following conditions are met:
67d116dccSCC Ma  *
77d116dccSCC Ma  * Redistributions of source code must retain the above copyright notice, this
87d116dccSCC Ma  * list of conditions and the following disclaimer.
97d116dccSCC Ma  *
107d116dccSCC Ma  * Redistributions in binary form must reproduce the above copyright notice,
117d116dccSCC Ma  * this list of conditions and the following disclaimer in the documentation
127d116dccSCC Ma  * and/or other materials provided with the distribution.
137d116dccSCC Ma  *
147d116dccSCC Ma  * Neither the name of ARM nor the names of its contributors may be used
157d116dccSCC Ma  * to endorse or promote products derived from this software without specific
167d116dccSCC Ma  * prior written permission.
177d116dccSCC Ma  *
187d116dccSCC Ma  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
197d116dccSCC Ma  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
207d116dccSCC Ma  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
217d116dccSCC Ma  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
227d116dccSCC Ma  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
237d116dccSCC Ma  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
247d116dccSCC Ma  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
257d116dccSCC Ma  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
267d116dccSCC Ma  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
277d116dccSCC Ma  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
287d116dccSCC Ma  * POSSIBILITY OF SUCH DAMAGE.
297d116dccSCC Ma  */
307d116dccSCC Ma #include <arm_gic.h>
317d116dccSCC Ma #include <assert.h>
327d116dccSCC Ma #include <bl_common.h>
3347497053SMasahiro Yamada #include <common_def.h>
347d116dccSCC Ma #include <console.h>
357d116dccSCC Ma #include <debug.h>
361d0b990eSAntonio Nino Diaz #include <generic_delay_timer.h>
377d116dccSCC Ma #include <mcucfg.h>
387d116dccSCC Ma #include <mmio.h>
397d116dccSCC Ma #include <mtcmos.h>
407d116dccSCC Ma #include <plat_private.h>
417d116dccSCC Ma #include <platform.h>
427d116dccSCC Ma #include <spm.h>
437d116dccSCC Ma 
447d116dccSCC Ma /*******************************************************************************
457d116dccSCC Ma  * Declarations of linker defined symbols which will help us find the layout
467d116dccSCC Ma  * of trusted SRAM
477d116dccSCC Ma  ******************************************************************************/
487d116dccSCC Ma unsigned long __RO_START__;
497d116dccSCC Ma unsigned long __RO_END__;
507d116dccSCC Ma 
517d116dccSCC Ma /*
52a1e0c01fSJimmy Huang  * The next 3 constants identify the extents of the code, RO data region and the
53a1e0c01fSJimmy Huang  * limit of the BL31 image.  These addresses are used by the MMU setup code and
54a1e0c01fSJimmy Huang  * therefore they must be page-aligned.  It is the responsibility of the linker
55a1e0c01fSJimmy Huang  * script to ensure that __RO_START__, __RO_END__ & __BL31_END__ linker symbols
56a1e0c01fSJimmy Huang  * refer to page-aligned addresses.
577d116dccSCC Ma  */
587d116dccSCC Ma #define BL31_RO_BASE (unsigned long)(&__RO_START__)
597d116dccSCC Ma #define BL31_RO_LIMIT (unsigned long)(&__RO_END__)
60a1e0c01fSJimmy Huang #define BL31_END (unsigned long)(&__BL31_END__)
617d116dccSCC Ma 
627d116dccSCC Ma static entry_point_info_t bl32_ep_info;
637d116dccSCC Ma static entry_point_info_t bl33_ep_info;
647d116dccSCC Ma 
657d116dccSCC Ma static void platform_setup_cpu(void)
667d116dccSCC Ma {
677d116dccSCC Ma 	/* turn off all the little core's power except cpu 0 */
687d116dccSCC Ma 	mtcmos_little_cpu_off();
697d116dccSCC Ma 
707d116dccSCC Ma 	/* setup big cores */
717d116dccSCC Ma 	mmio_write_32((uintptr_t)&mt8173_mcucfg->mp1_config_res,
727d116dccSCC Ma 		MP1_DIS_RGU0_WAIT_PD_CPUS_L1_ACK |
737d116dccSCC Ma 		MP1_DIS_RGU1_WAIT_PD_CPUS_L1_ACK |
747d116dccSCC Ma 		MP1_DIS_RGU2_WAIT_PD_CPUS_L1_ACK |
757d116dccSCC Ma 		MP1_DIS_RGU3_WAIT_PD_CPUS_L1_ACK |
767d116dccSCC Ma 		MP1_DIS_RGU_NOCPU_WAIT_PD_CPUS_L1_ACK);
777d116dccSCC Ma 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp1_miscdbg, MP1_AINACTS);
787d116dccSCC Ma 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp1_clkenm_div,
797d116dccSCC Ma 		MP1_SW_CG_GEN);
807d116dccSCC Ma 	mmio_clrbits_32((uintptr_t)&mt8173_mcucfg->mp1_rst_ctl,
817d116dccSCC Ma 		MP1_L2RSTDISABLE);
827d116dccSCC Ma 
837d116dccSCC Ma 	/* set big cores arm64 boot mode */
847d116dccSCC Ma 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp1_cpucfg,
857d116dccSCC Ma 		MP1_CPUCFG_64BIT);
867d116dccSCC Ma 
877d116dccSCC Ma 	/* set LITTLE cores arm64 boot mode */
887d116dccSCC Ma 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp0_rv_addr[0].rv_addr_hw,
897d116dccSCC Ma 		MP0_CPUCFG_64BIT);
90ac3986efSJimmy Huang 
91ac3986efSJimmy Huang 	/* enable dcm control */
92ac3986efSJimmy Huang 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->bus_fabric_dcm_ctrl,
93ac3986efSJimmy Huang 		ADB400_GRP_DCM_EN | CCI400_GRP_DCM_EN | ADBCLK_GRP_DCM_EN |
94ac3986efSJimmy Huang 		EMICLK_GRP_DCM_EN | ACLK_GRP_DCM_EN | L2C_IDLE_DCM_EN |
95ac3986efSJimmy Huang 		INFRACLK_PSYS_DYNAMIC_CG_EN);
96ac3986efSJimmy Huang 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->l2c_sram_ctrl,
97ac3986efSJimmy Huang 		L2C_SRAM_DCM_EN);
98ac3986efSJimmy Huang 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->cci_clk_ctrl,
99ac3986efSJimmy Huang 		MCU_BUS_DCM_EN);
1007d116dccSCC Ma }
1017d116dccSCC Ma 
102a1e0c01fSJimmy Huang static void platform_setup_sram(void)
103a1e0c01fSJimmy Huang {
104a1e0c01fSJimmy Huang 	/* protect BL31 memory from non-secure read/write access */
105a1e0c01fSJimmy Huang 	mmio_write_32(SRAMROM_SEC_ADDR, (uint32_t)(BL31_END + 0x3ff) & 0x3fc00);
106a1e0c01fSJimmy Huang 	mmio_write_32(SRAMROM_SEC_CTRL, 0x10000ff9);
107a1e0c01fSJimmy Huang }
108a1e0c01fSJimmy Huang 
1097d116dccSCC Ma /*******************************************************************************
1107d116dccSCC Ma  * Return a pointer to the 'entry_point_info' structure of the next image for
1117d116dccSCC Ma  * the security state specified. BL33 corresponds to the non-secure image type
1127d116dccSCC Ma  * while BL32 corresponds to the secure image type. A NULL pointer is returned
1137d116dccSCC Ma  * if the image does not exist.
1147d116dccSCC Ma  ******************************************************************************/
1157d116dccSCC Ma entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
1167d116dccSCC Ma {
1177d116dccSCC Ma 	entry_point_info_t *next_image_info;
1187d116dccSCC Ma 
1197d116dccSCC Ma 	next_image_info = (type == NON_SECURE) ? &bl33_ep_info : &bl32_ep_info;
1207d116dccSCC Ma 
1217d116dccSCC Ma 	/* None of the images on this platform can have 0x0 as the entrypoint */
1227d116dccSCC Ma 	if (next_image_info->pc)
1237d116dccSCC Ma 		return next_image_info;
1247d116dccSCC Ma 	else
1257d116dccSCC Ma 		return NULL;
1267d116dccSCC Ma }
1277d116dccSCC Ma 
1287d116dccSCC Ma /*******************************************************************************
1297d116dccSCC Ma  * Perform any BL3-1 early platform setup. Here is an opportunity to copy
1307d116dccSCC Ma  * parameters passed by the calling EL (S-EL1 in BL2 & S-EL3 in BL1) before they
1317d116dccSCC Ma  * are lost (potentially). This needs to be done before the MMU is initialized
1327d116dccSCC Ma  * so that the memory layout can be used while creating page tables.
1337d116dccSCC Ma  * BL2 has flushed this information to memory, so we are guaranteed to pick up
1347d116dccSCC Ma  * good data.
1357d116dccSCC Ma  ******************************************************************************/
1367d116dccSCC Ma void bl31_early_platform_setup(bl31_params_t *from_bl2,
1377d116dccSCC Ma 			       void *plat_params_from_bl2)
1387d116dccSCC Ma {
1397d116dccSCC Ma 	console_init(MT8173_UART0_BASE, MT8173_UART_CLOCK, MT8173_BAUDRATE);
1407d116dccSCC Ma 
1417d116dccSCC Ma 	VERBOSE("bl31_setup\n");
1427d116dccSCC Ma 
1437d116dccSCC Ma 	assert(from_bl2 != NULL);
1447d116dccSCC Ma 	assert(from_bl2->h.type == PARAM_BL31);
1457d116dccSCC Ma 	assert(from_bl2->h.version >= VERSION_1);
1467d116dccSCC Ma 
1477d116dccSCC Ma 	bl32_ep_info = *from_bl2->bl32_ep_info;
1487d116dccSCC Ma 	bl33_ep_info = *from_bl2->bl33_ep_info;
1497d116dccSCC Ma }
1507d116dccSCC Ma 
1517d116dccSCC Ma /*******************************************************************************
1527d116dccSCC Ma  * Perform any BL3-1 platform setup code
1537d116dccSCC Ma  ******************************************************************************/
1547d116dccSCC Ma void bl31_platform_setup(void)
1557d116dccSCC Ma {
1567d116dccSCC Ma 	platform_setup_cpu();
157a1e0c01fSJimmy Huang 	platform_setup_sram();
1587d116dccSCC Ma 
1591d0b990eSAntonio Nino Diaz 	generic_delay_timer_init();
1607d116dccSCC Ma 
1617d116dccSCC Ma 	/* Initialize the gic cpu and distributor interfaces */
1627d116dccSCC Ma 	plat_mt_gic_init();
1637d116dccSCC Ma 	arm_gic_setup();
1647d116dccSCC Ma 
165*3fc26aa0SKoan-Sin Tan #if ENABLE_PLAT_COMPAT
1667d116dccSCC Ma 	/* Topologies are best known to the platform. */
1677d116dccSCC Ma 	mt_setup_topology();
168*3fc26aa0SKoan-Sin Tan #endif
1697d116dccSCC Ma 
1707d116dccSCC Ma 	/* Initialize spm at boot time */
1717d116dccSCC Ma 	spm_boot_init();
1727d116dccSCC Ma }
1737d116dccSCC Ma 
1747d116dccSCC Ma /*******************************************************************************
1757d116dccSCC Ma  * Perform the very early platform specific architectural setup here. At the
1767d116dccSCC Ma  * moment this is only intializes the mmu in a quick and dirty way.
1777d116dccSCC Ma  ******************************************************************************/
1787d116dccSCC Ma void bl31_plat_arch_setup(void)
1797d116dccSCC Ma {
1807d116dccSCC Ma 	plat_cci_init();
1817d116dccSCC Ma 	plat_cci_enable();
1827d116dccSCC Ma 
1837d116dccSCC Ma 	plat_configure_mmu_el3(BL31_RO_BASE,
18447497053SMasahiro Yamada 			       BL_COHERENT_RAM_END - BL31_RO_BASE,
1857d116dccSCC Ma 			       BL31_RO_BASE,
1867d116dccSCC Ma 			       BL31_RO_LIMIT,
18747497053SMasahiro Yamada 			       BL_COHERENT_RAM_BASE,
18847497053SMasahiro Yamada 			       BL_COHERENT_RAM_END);
1897d116dccSCC Ma }
1907d116dccSCC Ma 
191