17d116dccSCC Ma /* 21d0b990eSAntonio Nino Diaz * Copyright (c) 2013-2016, ARM Limited and Contributors. All rights reserved. 37d116dccSCC Ma * 47d116dccSCC Ma * Redistribution and use in source and binary forms, with or without 57d116dccSCC Ma * modification, are permitted provided that the following conditions are met: 67d116dccSCC Ma * 77d116dccSCC Ma * Redistributions of source code must retain the above copyright notice, this 87d116dccSCC Ma * list of conditions and the following disclaimer. 97d116dccSCC Ma * 107d116dccSCC Ma * Redistributions in binary form must reproduce the above copyright notice, 117d116dccSCC Ma * this list of conditions and the following disclaimer in the documentation 127d116dccSCC Ma * and/or other materials provided with the distribution. 137d116dccSCC Ma * 147d116dccSCC Ma * Neither the name of ARM nor the names of its contributors may be used 157d116dccSCC Ma * to endorse or promote products derived from this software without specific 167d116dccSCC Ma * prior written permission. 177d116dccSCC Ma * 187d116dccSCC Ma * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 197d116dccSCC Ma * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 207d116dccSCC Ma * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 217d116dccSCC Ma * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 227d116dccSCC Ma * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 237d116dccSCC Ma * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 247d116dccSCC Ma * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 257d116dccSCC Ma * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 267d116dccSCC Ma * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 277d116dccSCC Ma * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 287d116dccSCC Ma * POSSIBILITY OF SUCH DAMAGE. 297d116dccSCC Ma */ 307d116dccSCC Ma #include <assert.h> 317d116dccSCC Ma #include <bl_common.h> 3247497053SMasahiro Yamada #include <common_def.h> 337d116dccSCC Ma #include <console.h> 347d116dccSCC Ma #include <debug.h> 351d0b990eSAntonio Nino Diaz #include <generic_delay_timer.h> 367d116dccSCC Ma #include <mcucfg.h> 377d116dccSCC Ma #include <mmio.h> 387d116dccSCC Ma #include <mtcmos.h> 39*8bc20038SKoan-Sin Tan #include <plat_arm.h> 407d116dccSCC Ma #include <plat_private.h> 417d116dccSCC Ma #include <platform.h> 427d116dccSCC Ma #include <spm.h> 437d116dccSCC Ma 447d116dccSCC Ma /******************************************************************************* 457d116dccSCC Ma * Declarations of linker defined symbols which will help us find the layout 467d116dccSCC Ma * of trusted SRAM 477d116dccSCC Ma ******************************************************************************/ 487d116dccSCC Ma unsigned long __RO_START__; 497d116dccSCC Ma unsigned long __RO_END__; 507d116dccSCC Ma 517d116dccSCC Ma /* 52a1e0c01fSJimmy Huang * The next 3 constants identify the extents of the code, RO data region and the 53a1e0c01fSJimmy Huang * limit of the BL31 image. These addresses are used by the MMU setup code and 54a1e0c01fSJimmy Huang * therefore they must be page-aligned. It is the responsibility of the linker 55a1e0c01fSJimmy Huang * script to ensure that __RO_START__, __RO_END__ & __BL31_END__ linker symbols 56a1e0c01fSJimmy Huang * refer to page-aligned addresses. 577d116dccSCC Ma */ 587d116dccSCC Ma #define BL31_RO_BASE (unsigned long)(&__RO_START__) 597d116dccSCC Ma #define BL31_RO_LIMIT (unsigned long)(&__RO_END__) 60a1e0c01fSJimmy Huang #define BL31_END (unsigned long)(&__BL31_END__) 617d116dccSCC Ma 627d116dccSCC Ma static entry_point_info_t bl32_ep_info; 637d116dccSCC Ma static entry_point_info_t bl33_ep_info; 647d116dccSCC Ma 657d116dccSCC Ma static void platform_setup_cpu(void) 667d116dccSCC Ma { 677d116dccSCC Ma /* turn off all the little core's power except cpu 0 */ 687d116dccSCC Ma mtcmos_little_cpu_off(); 697d116dccSCC Ma 707d116dccSCC Ma /* setup big cores */ 717d116dccSCC Ma mmio_write_32((uintptr_t)&mt8173_mcucfg->mp1_config_res, 727d116dccSCC Ma MP1_DIS_RGU0_WAIT_PD_CPUS_L1_ACK | 737d116dccSCC Ma MP1_DIS_RGU1_WAIT_PD_CPUS_L1_ACK | 747d116dccSCC Ma MP1_DIS_RGU2_WAIT_PD_CPUS_L1_ACK | 757d116dccSCC Ma MP1_DIS_RGU3_WAIT_PD_CPUS_L1_ACK | 767d116dccSCC Ma MP1_DIS_RGU_NOCPU_WAIT_PD_CPUS_L1_ACK); 777d116dccSCC Ma mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp1_miscdbg, MP1_AINACTS); 787d116dccSCC Ma mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp1_clkenm_div, 797d116dccSCC Ma MP1_SW_CG_GEN); 807d116dccSCC Ma mmio_clrbits_32((uintptr_t)&mt8173_mcucfg->mp1_rst_ctl, 817d116dccSCC Ma MP1_L2RSTDISABLE); 827d116dccSCC Ma 837d116dccSCC Ma /* set big cores arm64 boot mode */ 847d116dccSCC Ma mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp1_cpucfg, 857d116dccSCC Ma MP1_CPUCFG_64BIT); 867d116dccSCC Ma 877d116dccSCC Ma /* set LITTLE cores arm64 boot mode */ 887d116dccSCC Ma mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp0_rv_addr[0].rv_addr_hw, 897d116dccSCC Ma MP0_CPUCFG_64BIT); 90ac3986efSJimmy Huang 91ac3986efSJimmy Huang /* enable dcm control */ 92ac3986efSJimmy Huang mmio_setbits_32((uintptr_t)&mt8173_mcucfg->bus_fabric_dcm_ctrl, 93ac3986efSJimmy Huang ADB400_GRP_DCM_EN | CCI400_GRP_DCM_EN | ADBCLK_GRP_DCM_EN | 94ac3986efSJimmy Huang EMICLK_GRP_DCM_EN | ACLK_GRP_DCM_EN | L2C_IDLE_DCM_EN | 95ac3986efSJimmy Huang INFRACLK_PSYS_DYNAMIC_CG_EN); 96ac3986efSJimmy Huang mmio_setbits_32((uintptr_t)&mt8173_mcucfg->l2c_sram_ctrl, 97ac3986efSJimmy Huang L2C_SRAM_DCM_EN); 98ac3986efSJimmy Huang mmio_setbits_32((uintptr_t)&mt8173_mcucfg->cci_clk_ctrl, 99ac3986efSJimmy Huang MCU_BUS_DCM_EN); 1007d116dccSCC Ma } 1017d116dccSCC Ma 102a1e0c01fSJimmy Huang static void platform_setup_sram(void) 103a1e0c01fSJimmy Huang { 104a1e0c01fSJimmy Huang /* protect BL31 memory from non-secure read/write access */ 105a1e0c01fSJimmy Huang mmio_write_32(SRAMROM_SEC_ADDR, (uint32_t)(BL31_END + 0x3ff) & 0x3fc00); 106a1e0c01fSJimmy Huang mmio_write_32(SRAMROM_SEC_CTRL, 0x10000ff9); 107a1e0c01fSJimmy Huang } 108a1e0c01fSJimmy Huang 1097d116dccSCC Ma /******************************************************************************* 1107d116dccSCC Ma * Return a pointer to the 'entry_point_info' structure of the next image for 1117d116dccSCC Ma * the security state specified. BL33 corresponds to the non-secure image type 1127d116dccSCC Ma * while BL32 corresponds to the secure image type. A NULL pointer is returned 1137d116dccSCC Ma * if the image does not exist. 1147d116dccSCC Ma ******************************************************************************/ 1157d116dccSCC Ma entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type) 1167d116dccSCC Ma { 1177d116dccSCC Ma entry_point_info_t *next_image_info; 1187d116dccSCC Ma 1197d116dccSCC Ma next_image_info = (type == NON_SECURE) ? &bl33_ep_info : &bl32_ep_info; 1207d116dccSCC Ma 1217d116dccSCC Ma /* None of the images on this platform can have 0x0 as the entrypoint */ 1227d116dccSCC Ma if (next_image_info->pc) 1237d116dccSCC Ma return next_image_info; 1247d116dccSCC Ma else 1257d116dccSCC Ma return NULL; 1267d116dccSCC Ma } 1277d116dccSCC Ma 1287d116dccSCC Ma /******************************************************************************* 1297d116dccSCC Ma * Perform any BL3-1 early platform setup. Here is an opportunity to copy 1307d116dccSCC Ma * parameters passed by the calling EL (S-EL1 in BL2 & S-EL3 in BL1) before they 1317d116dccSCC Ma * are lost (potentially). This needs to be done before the MMU is initialized 1327d116dccSCC Ma * so that the memory layout can be used while creating page tables. 1337d116dccSCC Ma * BL2 has flushed this information to memory, so we are guaranteed to pick up 1347d116dccSCC Ma * good data. 1357d116dccSCC Ma ******************************************************************************/ 1367d116dccSCC Ma void bl31_early_platform_setup(bl31_params_t *from_bl2, 1377d116dccSCC Ma void *plat_params_from_bl2) 1387d116dccSCC Ma { 1397d116dccSCC Ma console_init(MT8173_UART0_BASE, MT8173_UART_CLOCK, MT8173_BAUDRATE); 1407d116dccSCC Ma 1417d116dccSCC Ma VERBOSE("bl31_setup\n"); 1427d116dccSCC Ma 1437d116dccSCC Ma assert(from_bl2 != NULL); 1447d116dccSCC Ma assert(from_bl2->h.type == PARAM_BL31); 1457d116dccSCC Ma assert(from_bl2->h.version >= VERSION_1); 1467d116dccSCC Ma 1477d116dccSCC Ma bl32_ep_info = *from_bl2->bl32_ep_info; 1487d116dccSCC Ma bl33_ep_info = *from_bl2->bl33_ep_info; 1497d116dccSCC Ma } 1507d116dccSCC Ma 1517d116dccSCC Ma /******************************************************************************* 1527d116dccSCC Ma * Perform any BL3-1 platform setup code 1537d116dccSCC Ma ******************************************************************************/ 1547d116dccSCC Ma void bl31_platform_setup(void) 1557d116dccSCC Ma { 1567d116dccSCC Ma platform_setup_cpu(); 157a1e0c01fSJimmy Huang platform_setup_sram(); 1587d116dccSCC Ma 1591d0b990eSAntonio Nino Diaz generic_delay_timer_init(); 1607d116dccSCC Ma 1617d116dccSCC Ma /* Initialize the gic cpu and distributor interfaces */ 162*8bc20038SKoan-Sin Tan plat_arm_gic_driver_init(); 163*8bc20038SKoan-Sin Tan plat_arm_gic_init(); 1647d116dccSCC Ma 1653fc26aa0SKoan-Sin Tan #if ENABLE_PLAT_COMPAT 1667d116dccSCC Ma /* Topologies are best known to the platform. */ 1677d116dccSCC Ma mt_setup_topology(); 1683fc26aa0SKoan-Sin Tan #endif 1697d116dccSCC Ma 1707d116dccSCC Ma /* Initialize spm at boot time */ 1717d116dccSCC Ma spm_boot_init(); 1727d116dccSCC Ma } 1737d116dccSCC Ma 1747d116dccSCC Ma /******************************************************************************* 1757d116dccSCC Ma * Perform the very early platform specific architectural setup here. At the 1767d116dccSCC Ma * moment this is only intializes the mmu in a quick and dirty way. 1777d116dccSCC Ma ******************************************************************************/ 1787d116dccSCC Ma void bl31_plat_arch_setup(void) 1797d116dccSCC Ma { 1807d116dccSCC Ma plat_cci_init(); 1817d116dccSCC Ma plat_cci_enable(); 1827d116dccSCC Ma 1837d116dccSCC Ma plat_configure_mmu_el3(BL31_RO_BASE, 18447497053SMasahiro Yamada BL_COHERENT_RAM_END - BL31_RO_BASE, 1857d116dccSCC Ma BL31_RO_BASE, 1867d116dccSCC Ma BL31_RO_LIMIT, 18747497053SMasahiro Yamada BL_COHERENT_RAM_BASE, 18847497053SMasahiro Yamada BL_COHERENT_RAM_END); 1897d116dccSCC Ma } 1907d116dccSCC Ma 191