xref: /rk3399_ARM-atf/plat/mediatek/mt8173/bl31_plat_setup.c (revision 4bd8c929b4bc6e1731c2892b38d4a8c43e8e89dc)
17d116dccSCC Ma /*
2cbdc72b5SJulius Werner  * Copyright (c) 2013-2019, ARM Limited and Contributors. All rights reserved.
37d116dccSCC Ma  *
482cb2c1aSdp-arm  * SPDX-License-Identifier: BSD-3-Clause
57d116dccSCC Ma  */
609d40e0eSAntonio Nino Diaz 
77d116dccSCC Ma #include <assert.h>
809d40e0eSAntonio Nino Diaz 
909d40e0eSAntonio Nino Diaz #include <common/bl_common.h>
1009d40e0eSAntonio Nino Diaz #include <common/debug.h>
11cbdc72b5SJulius Werner #include <common/desc_image_load.h>
1209d40e0eSAntonio Nino Diaz #include <drivers/generic_delay_timer.h>
13d1d06275Skenny liang #include <drivers/ti/uart/uart_16550.h>
1409d40e0eSAntonio Nino Diaz #include <lib/mmio.h>
15bd9344f6SAntonio Nino Diaz #include <plat/arm/common/plat_arm.h>
1609d40e0eSAntonio Nino Diaz #include <plat/common/common_def.h>
1709d40e0eSAntonio Nino Diaz #include <plat/common/platform.h>
1809d40e0eSAntonio Nino Diaz 
197d116dccSCC Ma #include <mcucfg.h>
207d116dccSCC Ma #include <mtcmos.h>
21b8424642SAntonio Nino Diaz #include <mtk_plat_common.h>
227d116dccSCC Ma #include <plat_private.h>
237d116dccSCC Ma #include <spm.h>
247d116dccSCC Ma 
257d116dccSCC Ma static entry_point_info_t bl32_ep_info;
267d116dccSCC Ma static entry_point_info_t bl33_ep_info;
277d116dccSCC Ma 
platform_setup_cpu(void)287d116dccSCC Ma static void platform_setup_cpu(void)
297d116dccSCC Ma {
307d116dccSCC Ma 	/* turn off all the little core's power except cpu 0 */
317d116dccSCC Ma 	mtcmos_little_cpu_off();
327d116dccSCC Ma 
337d116dccSCC Ma 	/* setup big cores */
347d116dccSCC Ma 	mmio_write_32((uintptr_t)&mt8173_mcucfg->mp1_config_res,
357d116dccSCC Ma 		MP1_DIS_RGU0_WAIT_PD_CPUS_L1_ACK |
367d116dccSCC Ma 		MP1_DIS_RGU1_WAIT_PD_CPUS_L1_ACK |
377d116dccSCC Ma 		MP1_DIS_RGU2_WAIT_PD_CPUS_L1_ACK |
387d116dccSCC Ma 		MP1_DIS_RGU3_WAIT_PD_CPUS_L1_ACK |
397d116dccSCC Ma 		MP1_DIS_RGU_NOCPU_WAIT_PD_CPUS_L1_ACK);
407d116dccSCC Ma 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp1_miscdbg, MP1_AINACTS);
417d116dccSCC Ma 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp1_clkenm_div,
427d116dccSCC Ma 		MP1_SW_CG_GEN);
437d116dccSCC Ma 	mmio_clrbits_32((uintptr_t)&mt8173_mcucfg->mp1_rst_ctl,
447d116dccSCC Ma 		MP1_L2RSTDISABLE);
457d116dccSCC Ma 
467d116dccSCC Ma 	/* set big cores arm64 boot mode */
477d116dccSCC Ma 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp1_cpucfg,
487d116dccSCC Ma 		MP1_CPUCFG_64BIT);
497d116dccSCC Ma 
507d116dccSCC Ma 	/* set LITTLE cores arm64 boot mode */
517d116dccSCC Ma 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp0_rv_addr[0].rv_addr_hw,
527d116dccSCC Ma 		MP0_CPUCFG_64BIT);
53ac3986efSJimmy Huang 
54ac3986efSJimmy Huang 	/* enable dcm control */
55ac3986efSJimmy Huang 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->bus_fabric_dcm_ctrl,
56ac3986efSJimmy Huang 		ADB400_GRP_DCM_EN | CCI400_GRP_DCM_EN | ADBCLK_GRP_DCM_EN |
57ac3986efSJimmy Huang 		EMICLK_GRP_DCM_EN | ACLK_GRP_DCM_EN | L2C_IDLE_DCM_EN |
58ac3986efSJimmy Huang 		INFRACLK_PSYS_DYNAMIC_CG_EN);
59ac3986efSJimmy Huang 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->l2c_sram_ctrl,
60ac3986efSJimmy Huang 		L2C_SRAM_DCM_EN);
61ac3986efSJimmy Huang 	mmio_setbits_32((uintptr_t)&mt8173_mcucfg->cci_clk_ctrl,
62ac3986efSJimmy Huang 		MCU_BUS_DCM_EN);
637d116dccSCC Ma }
647d116dccSCC Ma 
platform_setup_sram(void)65a1e0c01fSJimmy Huang static void platform_setup_sram(void)
66a1e0c01fSJimmy Huang {
67a1e0c01fSJimmy Huang 	/* protect BL31 memory from non-secure read/write access */
68a1e0c01fSJimmy Huang 	mmio_write_32(SRAMROM_SEC_ADDR, (uint32_t)(BL31_END + 0x3ff) & 0x3fc00);
69a1e0c01fSJimmy Huang 	mmio_write_32(SRAMROM_SEC_CTRL, 0x10000ff9);
70a1e0c01fSJimmy Huang }
71a1e0c01fSJimmy Huang 
727d116dccSCC Ma /*******************************************************************************
737d116dccSCC Ma  * Return a pointer to the 'entry_point_info' structure of the next image for
747d116dccSCC Ma  * the security state specified. BL33 corresponds to the non-secure image type
757d116dccSCC Ma  * while BL32 corresponds to the secure image type. A NULL pointer is returned
767d116dccSCC Ma  * if the image does not exist.
777d116dccSCC Ma  ******************************************************************************/
bl31_plat_get_next_image_ep_info(uint32_t type)787d116dccSCC Ma entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
797d116dccSCC Ma {
807d116dccSCC Ma 	entry_point_info_t *next_image_info;
817d116dccSCC Ma 
827d116dccSCC Ma 	next_image_info = (type == NON_SECURE) ? &bl33_ep_info : &bl32_ep_info;
83cbdc72b5SJulius Werner 	assert(next_image_info->h.type == PARAM_EP);
847d116dccSCC Ma 
857d116dccSCC Ma 	/* None of the images on this platform can have 0x0 as the entrypoint */
867d116dccSCC Ma 	if (next_image_info->pc)
877d116dccSCC Ma 		return next_image_info;
887d116dccSCC Ma 	else
897d116dccSCC Ma 		return NULL;
907d116dccSCC Ma }
917d116dccSCC Ma 
927d116dccSCC Ma /*******************************************************************************
937d116dccSCC Ma  * Perform any BL3-1 early platform setup. Here is an opportunity to copy
94a6238326SJohn Tsichritzis  * parameters passed by the calling EL (S-EL1 in BL2 & EL3 in BL1) before they
957d116dccSCC Ma  * are lost (potentially). This needs to be done before the MMU is initialized
967d116dccSCC Ma  * so that the memory layout can be used while creating page tables.
977d116dccSCC Ma  * BL2 has flushed this information to memory, so we are guaranteed to pick up
987d116dccSCC Ma  * good data.
997d116dccSCC Ma  ******************************************************************************/
bl31_early_platform_setup2(u_register_t arg0,u_register_t arg1,u_register_t arg2,u_register_t arg3)100b8424642SAntonio Nino Diaz void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
101b8424642SAntonio Nino Diaz 				u_register_t arg2, u_register_t arg3)
1027d116dccSCC Ma {
10398964f05SAndre Przywara 	static console_t console;
104d1d06275Skenny liang 
105d1d06275Skenny liang 	console_16550_register(MT8173_UART0_BASE, MT8173_UART_CLOCK, MT8173_BAUDRATE, &console);
1067d116dccSCC Ma 
1077d116dccSCC Ma 	VERBOSE("bl31_setup\n");
1087d116dccSCC Ma 
109cbdc72b5SJulius Werner 	bl31_params_parse_helper(arg0, &bl32_ep_info, &bl33_ep_info);
1107d116dccSCC Ma }
1117d116dccSCC Ma 
1127d116dccSCC Ma /*******************************************************************************
1137d116dccSCC Ma  * Perform any BL3-1 platform setup code
1147d116dccSCC Ma  ******************************************************************************/
bl31_platform_setup(void)1157d116dccSCC Ma void bl31_platform_setup(void)
1167d116dccSCC Ma {
1177d116dccSCC Ma 	platform_setup_cpu();
118a1e0c01fSJimmy Huang 	platform_setup_sram();
1197d116dccSCC Ma 
1201d0b990eSAntonio Nino Diaz 	generic_delay_timer_init();
1217d116dccSCC Ma 
1227d116dccSCC Ma 	/* Initialize the gic cpu and distributor interfaces */
1238bc20038SKoan-Sin Tan 	plat_arm_gic_driver_init();
1248bc20038SKoan-Sin Tan 	plat_arm_gic_init();
1257d116dccSCC Ma 
1267d116dccSCC Ma 	/* Initialize spm at boot time */
1277d116dccSCC Ma 	spm_boot_init();
1287d116dccSCC Ma }
1297d116dccSCC Ma 
1307d116dccSCC Ma /*******************************************************************************
1317d116dccSCC Ma  * Perform the very early platform specific architectural setup here. At the
132*1b491eeaSElyes Haouas  * moment this is only initializes the mmu in a quick and dirty way.
1337d116dccSCC Ma  ******************************************************************************/
bl31_plat_arch_setup(void)1347d116dccSCC Ma void bl31_plat_arch_setup(void)
1357d116dccSCC Ma {
1367d116dccSCC Ma 	plat_cci_init();
1377d116dccSCC Ma 	plat_cci_enable();
1387d116dccSCC Ma 
1399f85f9e3SJoel Hutton 	plat_configure_mmu_el3(BL_CODE_BASE,
1409f85f9e3SJoel Hutton 			       BL_COHERENT_RAM_END - BL_CODE_BASE,
1419f85f9e3SJoel Hutton 			       BL_CODE_BASE,
1429f85f9e3SJoel Hutton 			       BL_CODE_END,
14347497053SMasahiro Yamada 			       BL_COHERENT_RAM_BASE,
14447497053SMasahiro Yamada 			       BL_COHERENT_RAM_END);
1457d116dccSCC Ma }
1467d116dccSCC Ma 
147