17d116dccSCC Ma /* 27d116dccSCC Ma * Copyright (c) 2013-2015, ARM Limited and Contributors. All rights reserved. 37d116dccSCC Ma * 47d116dccSCC Ma * Redistribution and use in source and binary forms, with or without 57d116dccSCC Ma * modification, are permitted provided that the following conditions are met: 67d116dccSCC Ma * 77d116dccSCC Ma * Redistributions of source code must retain the above copyright notice, this 87d116dccSCC Ma * list of conditions and the following disclaimer. 97d116dccSCC Ma * 107d116dccSCC Ma * Redistributions in binary form must reproduce the above copyright notice, 117d116dccSCC Ma * this list of conditions and the following disclaimer in the documentation 127d116dccSCC Ma * and/or other materials provided with the distribution. 137d116dccSCC Ma * 147d116dccSCC Ma * Neither the name of ARM nor the names of its contributors may be used 157d116dccSCC Ma * to endorse or promote products derived from this software without specific 167d116dccSCC Ma * prior written permission. 177d116dccSCC Ma * 187d116dccSCC Ma * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 197d116dccSCC Ma * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 207d116dccSCC Ma * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 217d116dccSCC Ma * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 227d116dccSCC Ma * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 237d116dccSCC Ma * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 247d116dccSCC Ma * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 257d116dccSCC Ma * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 267d116dccSCC Ma * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 277d116dccSCC Ma * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 287d116dccSCC Ma * POSSIBILITY OF SUCH DAMAGE. 297d116dccSCC Ma */ 307d116dccSCC Ma #include <arm_gic.h> 317d116dccSCC Ma #include <assert.h> 327d116dccSCC Ma #include <bl_common.h> 337d116dccSCC Ma #include <console.h> 347d116dccSCC Ma #include <debug.h> 357d116dccSCC Ma #include <mcucfg.h> 367d116dccSCC Ma #include <mmio.h> 377d116dccSCC Ma #include <mtcmos.h> 387d116dccSCC Ma #include <plat_private.h> 397d116dccSCC Ma #include <platform.h> 407d116dccSCC Ma #include <spm.h> 417d116dccSCC Ma 427d116dccSCC Ma /******************************************************************************* 437d116dccSCC Ma * Declarations of linker defined symbols which will help us find the layout 447d116dccSCC Ma * of trusted SRAM 457d116dccSCC Ma ******************************************************************************/ 467d116dccSCC Ma unsigned long __RO_START__; 477d116dccSCC Ma unsigned long __RO_END__; 487d116dccSCC Ma 497d116dccSCC Ma unsigned long __COHERENT_RAM_START__; 507d116dccSCC Ma unsigned long __COHERENT_RAM_END__; 517d116dccSCC Ma 527d116dccSCC Ma /* 53*a1e0c01fSJimmy Huang * The next 3 constants identify the extents of the code, RO data region and the 54*a1e0c01fSJimmy Huang * limit of the BL31 image. These addresses are used by the MMU setup code and 55*a1e0c01fSJimmy Huang * therefore they must be page-aligned. It is the responsibility of the linker 56*a1e0c01fSJimmy Huang * script to ensure that __RO_START__, __RO_END__ & __BL31_END__ linker symbols 57*a1e0c01fSJimmy Huang * refer to page-aligned addresses. 587d116dccSCC Ma */ 597d116dccSCC Ma #define BL31_RO_BASE (unsigned long)(&__RO_START__) 607d116dccSCC Ma #define BL31_RO_LIMIT (unsigned long)(&__RO_END__) 61*a1e0c01fSJimmy Huang #define BL31_END (unsigned long)(&__BL31_END__) 627d116dccSCC Ma 637d116dccSCC Ma /* 647d116dccSCC Ma * The next 2 constants identify the extents of the coherent memory region. 657d116dccSCC Ma * These addresses are used by the MMU setup code and therefore they must be 667d116dccSCC Ma * page-aligned. It is the responsibility of the linker script to ensure that 677d116dccSCC Ma * __COHERENT_RAM_START__ and __COHERENT_RAM_END__ linker symbols 687d116dccSCC Ma * refer to page-aligned addresses. 697d116dccSCC Ma */ 707d116dccSCC Ma #define BL31_COHERENT_RAM_BASE (unsigned long)(&__COHERENT_RAM_START__) 717d116dccSCC Ma #define BL31_COHERENT_RAM_LIMIT (unsigned long)(&__COHERENT_RAM_END__) 727d116dccSCC Ma 737d116dccSCC Ma static entry_point_info_t bl32_ep_info; 747d116dccSCC Ma static entry_point_info_t bl33_ep_info; 757d116dccSCC Ma 767d116dccSCC Ma static void platform_setup_cpu(void) 777d116dccSCC Ma { 787d116dccSCC Ma /* turn off all the little core's power except cpu 0 */ 797d116dccSCC Ma mtcmos_little_cpu_off(); 807d116dccSCC Ma 817d116dccSCC Ma /* setup big cores */ 827d116dccSCC Ma mmio_write_32((uintptr_t)&mt8173_mcucfg->mp1_config_res, 837d116dccSCC Ma MP1_DIS_RGU0_WAIT_PD_CPUS_L1_ACK | 847d116dccSCC Ma MP1_DIS_RGU1_WAIT_PD_CPUS_L1_ACK | 857d116dccSCC Ma MP1_DIS_RGU2_WAIT_PD_CPUS_L1_ACK | 867d116dccSCC Ma MP1_DIS_RGU3_WAIT_PD_CPUS_L1_ACK | 877d116dccSCC Ma MP1_DIS_RGU_NOCPU_WAIT_PD_CPUS_L1_ACK); 887d116dccSCC Ma mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp1_miscdbg, MP1_AINACTS); 897d116dccSCC Ma mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp1_clkenm_div, 907d116dccSCC Ma MP1_SW_CG_GEN); 917d116dccSCC Ma mmio_clrbits_32((uintptr_t)&mt8173_mcucfg->mp1_rst_ctl, 927d116dccSCC Ma MP1_L2RSTDISABLE); 937d116dccSCC Ma 947d116dccSCC Ma /* set big cores arm64 boot mode */ 957d116dccSCC Ma mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp1_cpucfg, 967d116dccSCC Ma MP1_CPUCFG_64BIT); 977d116dccSCC Ma 987d116dccSCC Ma /* set LITTLE cores arm64 boot mode */ 997d116dccSCC Ma mmio_setbits_32((uintptr_t)&mt8173_mcucfg->mp0_rv_addr[0].rv_addr_hw, 1007d116dccSCC Ma MP0_CPUCFG_64BIT); 101ac3986efSJimmy Huang 102ac3986efSJimmy Huang /* enable dcm control */ 103ac3986efSJimmy Huang mmio_setbits_32((uintptr_t)&mt8173_mcucfg->bus_fabric_dcm_ctrl, 104ac3986efSJimmy Huang ADB400_GRP_DCM_EN | CCI400_GRP_DCM_EN | ADBCLK_GRP_DCM_EN | 105ac3986efSJimmy Huang EMICLK_GRP_DCM_EN | ACLK_GRP_DCM_EN | L2C_IDLE_DCM_EN | 106ac3986efSJimmy Huang INFRACLK_PSYS_DYNAMIC_CG_EN); 107ac3986efSJimmy Huang mmio_setbits_32((uintptr_t)&mt8173_mcucfg->l2c_sram_ctrl, 108ac3986efSJimmy Huang L2C_SRAM_DCM_EN); 109ac3986efSJimmy Huang mmio_setbits_32((uintptr_t)&mt8173_mcucfg->cci_clk_ctrl, 110ac3986efSJimmy Huang MCU_BUS_DCM_EN); 1117d116dccSCC Ma } 1127d116dccSCC Ma 113*a1e0c01fSJimmy Huang static void platform_setup_sram(void) 114*a1e0c01fSJimmy Huang { 115*a1e0c01fSJimmy Huang /* protect BL31 memory from non-secure read/write access */ 116*a1e0c01fSJimmy Huang mmio_write_32(SRAMROM_SEC_ADDR, (uint32_t)(BL31_END + 0x3ff) & 0x3fc00); 117*a1e0c01fSJimmy Huang mmio_write_32(SRAMROM_SEC_CTRL, 0x10000ff9); 118*a1e0c01fSJimmy Huang } 119*a1e0c01fSJimmy Huang 1207d116dccSCC Ma /******************************************************************************* 1217d116dccSCC Ma * Return a pointer to the 'entry_point_info' structure of the next image for 1227d116dccSCC Ma * the security state specified. BL33 corresponds to the non-secure image type 1237d116dccSCC Ma * while BL32 corresponds to the secure image type. A NULL pointer is returned 1247d116dccSCC Ma * if the image does not exist. 1257d116dccSCC Ma ******************************************************************************/ 1267d116dccSCC Ma entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type) 1277d116dccSCC Ma { 1287d116dccSCC Ma entry_point_info_t *next_image_info; 1297d116dccSCC Ma 1307d116dccSCC Ma next_image_info = (type == NON_SECURE) ? &bl33_ep_info : &bl32_ep_info; 1317d116dccSCC Ma 1327d116dccSCC Ma /* None of the images on this platform can have 0x0 as the entrypoint */ 1337d116dccSCC Ma if (next_image_info->pc) 1347d116dccSCC Ma return next_image_info; 1357d116dccSCC Ma else 1367d116dccSCC Ma return NULL; 1377d116dccSCC Ma } 1387d116dccSCC Ma 1397d116dccSCC Ma /******************************************************************************* 1407d116dccSCC Ma * Perform any BL3-1 early platform setup. Here is an opportunity to copy 1417d116dccSCC Ma * parameters passed by the calling EL (S-EL1 in BL2 & S-EL3 in BL1) before they 1427d116dccSCC Ma * are lost (potentially). This needs to be done before the MMU is initialized 1437d116dccSCC Ma * so that the memory layout can be used while creating page tables. 1447d116dccSCC Ma * BL2 has flushed this information to memory, so we are guaranteed to pick up 1457d116dccSCC Ma * good data. 1467d116dccSCC Ma ******************************************************************************/ 1477d116dccSCC Ma void bl31_early_platform_setup(bl31_params_t *from_bl2, 1487d116dccSCC Ma void *plat_params_from_bl2) 1497d116dccSCC Ma { 1507d116dccSCC Ma console_init(MT8173_UART0_BASE, MT8173_UART_CLOCK, MT8173_BAUDRATE); 1517d116dccSCC Ma 1527d116dccSCC Ma VERBOSE("bl31_setup\n"); 1537d116dccSCC Ma 1547d116dccSCC Ma assert(from_bl2 != NULL); 1557d116dccSCC Ma assert(from_bl2->h.type == PARAM_BL31); 1567d116dccSCC Ma assert(from_bl2->h.version >= VERSION_1); 1577d116dccSCC Ma 1587d116dccSCC Ma bl32_ep_info = *from_bl2->bl32_ep_info; 1597d116dccSCC Ma bl33_ep_info = *from_bl2->bl33_ep_info; 1607d116dccSCC Ma } 1617d116dccSCC Ma 1627d116dccSCC Ma /******************************************************************************* 1637d116dccSCC Ma * Perform any BL3-1 platform setup code 1647d116dccSCC Ma ******************************************************************************/ 1657d116dccSCC Ma void bl31_platform_setup(void) 1667d116dccSCC Ma { 1677d116dccSCC Ma platform_setup_cpu(); 168*a1e0c01fSJimmy Huang platform_setup_sram(); 1697d116dccSCC Ma 1707d116dccSCC Ma plat_delay_timer_init(); 1717d116dccSCC Ma 1727d116dccSCC Ma /* Initialize the gic cpu and distributor interfaces */ 1737d116dccSCC Ma plat_mt_gic_init(); 1747d116dccSCC Ma arm_gic_setup(); 1757d116dccSCC Ma 1767d116dccSCC Ma /* Topologies are best known to the platform. */ 1777d116dccSCC Ma mt_setup_topology(); 1787d116dccSCC Ma 1797d116dccSCC Ma /* Initialize spm at boot time */ 1807d116dccSCC Ma spm_boot_init(); 1817d116dccSCC Ma } 1827d116dccSCC Ma 1837d116dccSCC Ma /******************************************************************************* 1847d116dccSCC Ma * Perform the very early platform specific architectural setup here. At the 1857d116dccSCC Ma * moment this is only intializes the mmu in a quick and dirty way. 1867d116dccSCC Ma ******************************************************************************/ 1877d116dccSCC Ma void bl31_plat_arch_setup(void) 1887d116dccSCC Ma { 1897d116dccSCC Ma plat_cci_init(); 1907d116dccSCC Ma plat_cci_enable(); 1917d116dccSCC Ma 1927d116dccSCC Ma plat_configure_mmu_el3(BL31_RO_BASE, 1937d116dccSCC Ma (BL31_COHERENT_RAM_LIMIT - BL31_RO_BASE), 1947d116dccSCC Ma BL31_RO_BASE, 1957d116dccSCC Ma BL31_RO_LIMIT, 1967d116dccSCC Ma BL31_COHERENT_RAM_BASE, 1977d116dccSCC Ma BL31_COHERENT_RAM_LIMIT); 1987d116dccSCC Ma } 1997d116dccSCC Ma 200