1840831b2SStephan Gerhold /*
2840831b2SStephan Gerhold * Copyright (c) 2021-2023, Stephan Gerhold <stephan@gerhold.net>
3840831b2SStephan Gerhold *
4840831b2SStephan Gerhold * SPDX-License-Identifier: BSD-3-Clause
5840831b2SStephan Gerhold */
6840831b2SStephan Gerhold
7840831b2SStephan Gerhold #include <assert.h>
8840831b2SStephan Gerhold
9840831b2SStephan Gerhold #include <arch.h>
101240dc7eSStephan Gerhold #include <drivers/arm/cci.h>
11840831b2SStephan Gerhold #include <lib/mmio.h>
12840831b2SStephan Gerhold
13840831b2SStephan Gerhold #include "msm8916_config.h"
14840831b2SStephan Gerhold #include "msm8916_gicv2.h"
15840831b2SStephan Gerhold #include <msm8916_mmap.h>
16840831b2SStephan Gerhold #include <platform_def.h>
17840831b2SStephan Gerhold
181240dc7eSStephan Gerhold static const int cci_map[] = { 3, 4 };
191240dc7eSStephan Gerhold
msm8916_configure_early(void)201240dc7eSStephan Gerhold void msm8916_configure_early(void)
211240dc7eSStephan Gerhold {
221240dc7eSStephan Gerhold if (PLATFORM_CLUSTER_COUNT > 1) {
231240dc7eSStephan Gerhold cci_init(APCS_CCI_BASE, cci_map, ARRAY_SIZE(cci_map));
241240dc7eSStephan Gerhold cci_enable_snoop_dvm_reqs(MPIDR_AFFLVL1_VAL(read_mpidr_el1()));
251240dc7eSStephan Gerhold }
261240dc7eSStephan Gerhold }
271240dc7eSStephan Gerhold
msm8916_configure_timer(uintptr_t base)281d7ed58fSStephan Gerhold static void msm8916_configure_timer(uintptr_t base)
29840831b2SStephan Gerhold {
30840831b2SStephan Gerhold /* Set timer frequency */
311d7ed58fSStephan Gerhold mmio_write_32(base + CNTCTLBASE_CNTFRQ, PLAT_SYSCNT_FREQ);
32840831b2SStephan Gerhold
33840831b2SStephan Gerhold /* Make all timer frames available to non-secure world */
341d7ed58fSStephan Gerhold mmio_write_32(base + CNTNSAR, GENMASK_32(7, 0));
35840831b2SStephan Gerhold }
36840831b2SStephan Gerhold
37840831b2SStephan Gerhold /*
38840831b2SStephan Gerhold * The APCS register regions always start with a SECURE register that should
39840831b2SStephan Gerhold * be cleared to 0 to only allow secure access. Since BL31 handles most of
40840831b2SStephan Gerhold * the CPU power management, most of them can be cleared to secure access only.
41840831b2SStephan Gerhold */
42840831b2SStephan Gerhold #define APCS_GLB_SECURE_STS_NS BIT_32(0)
43840831b2SStephan Gerhold #define APCS_GLB_SECURE_PWR_NS BIT_32(1)
44*d9e565eaSStephan Gerhold #if PLATFORM_CORE_COUNT > 1
451d7ed58fSStephan Gerhold #define APCS_BOOT_START_ADDR_SEC 0x04
461d7ed58fSStephan Gerhold #define APCS_AA64NAA32_REG 0x0c
47*d9e565eaSStephan Gerhold #else
48*d9e565eaSStephan Gerhold #define APCS_BOOT_START_ADDR_SEC 0x18
49*d9e565eaSStephan Gerhold #endif
50*d9e565eaSStephan Gerhold #define REMAP_EN BIT_32(0)
51840831b2SStephan Gerhold
msm8916_configure_apcs_cluster(unsigned int cluster)521d7ed58fSStephan Gerhold static void msm8916_configure_apcs_cluster(unsigned int cluster)
53840831b2SStephan Gerhold {
541d7ed58fSStephan Gerhold uintptr_t cfg = APCS_CFG(cluster);
55840831b2SStephan Gerhold unsigned int cpu;
56840831b2SStephan Gerhold
57840831b2SStephan Gerhold /* Disallow non-secure access to boot remapper / TCM registers */
581d7ed58fSStephan Gerhold mmio_write_32(cfg, 0);
59840831b2SStephan Gerhold
60840831b2SStephan Gerhold /*
61840831b2SStephan Gerhold * Disallow non-secure access to power management registers.
62840831b2SStephan Gerhold * However, allow STS and PWR since those also seem to control access
63840831b2SStephan Gerhold * to CPU frequency related registers (e.g. APCS_CMD_RCGR). If these
64840831b2SStephan Gerhold * bits are not set, CPU frequency control fails in the non-secure world.
65840831b2SStephan Gerhold */
661d7ed58fSStephan Gerhold mmio_write_32(APCS_GLB(cluster),
671d7ed58fSStephan Gerhold APCS_GLB_SECURE_STS_NS | APCS_GLB_SECURE_PWR_NS);
68840831b2SStephan Gerhold
69*d9e565eaSStephan Gerhold if (PLATFORM_CORE_COUNT > 1) {
70840831b2SStephan Gerhold /* Disallow non-secure access to L2 SAW2 */
711d7ed58fSStephan Gerhold mmio_write_32(APCS_L2_SAW2(cluster), 0);
72840831b2SStephan Gerhold
73840831b2SStephan Gerhold /* Disallow non-secure access to CPU ACS and SAW2 */
741d7ed58fSStephan Gerhold for (cpu = 0; cpu < PLATFORM_CPUS_PER_CLUSTER; cpu++) {
751d7ed58fSStephan Gerhold mmio_write_32(APCS_ALIAS_ACS(cluster, cpu), 0);
761d7ed58fSStephan Gerhold mmio_write_32(APCS_ALIAS_SAW2(cluster, cpu), 0);
77840831b2SStephan Gerhold }
78*d9e565eaSStephan Gerhold } else {
79*d9e565eaSStephan Gerhold /* There is just one core so no aliases exist */
80*d9e565eaSStephan Gerhold mmio_write_32(APCS_BANKED_ACS, 0);
81*d9e565eaSStephan Gerhold mmio_write_32(APCS_BANKED_SAW2, 0);
82*d9e565eaSStephan Gerhold }
83840831b2SStephan Gerhold
8445b2bd0aSStephan Gerhold #ifdef __aarch64__
85840831b2SStephan Gerhold /* Make sure all further warm boots end up in BL31 and aarch64 state */
86840831b2SStephan Gerhold CASSERT((BL31_BASE & 0xffff) == 0, assert_bl31_base_64k_aligned);
871d7ed58fSStephan Gerhold mmio_write_32(cfg + APCS_BOOT_START_ADDR_SEC, BL31_BASE | REMAP_EN);
881d7ed58fSStephan Gerhold mmio_write_32(cfg + APCS_AA64NAA32_REG, 1);
8945b2bd0aSStephan Gerhold #else
9045b2bd0aSStephan Gerhold /* Make sure all further warm boots end up in BL32 */
9145b2bd0aSStephan Gerhold CASSERT((BL32_BASE & 0xffff) == 0, assert_bl32_base_64k_aligned);
921d7ed58fSStephan Gerhold mmio_write_32(cfg + APCS_BOOT_START_ADDR_SEC, BL32_BASE | REMAP_EN);
9345b2bd0aSStephan Gerhold #endif
941d7ed58fSStephan Gerhold
951d7ed58fSStephan Gerhold msm8916_configure_timer(APCS_QTMR(cluster));
961d7ed58fSStephan Gerhold }
971d7ed58fSStephan Gerhold
msm8916_configure_apcs(void)981d7ed58fSStephan Gerhold static void msm8916_configure_apcs(void)
991d7ed58fSStephan Gerhold {
1001d7ed58fSStephan Gerhold unsigned int cluster;
1011d7ed58fSStephan Gerhold
1021d7ed58fSStephan Gerhold for (cluster = 0; cluster < PLATFORM_CLUSTER_COUNT; cluster++) {
1031d7ed58fSStephan Gerhold msm8916_configure_apcs_cluster(cluster);
1041d7ed58fSStephan Gerhold }
1051240dc7eSStephan Gerhold
1061240dc7eSStephan Gerhold if (PLATFORM_CLUSTER_COUNT > 1) {
1071240dc7eSStephan Gerhold /* Disallow non-secure access to CCI ACS and SAW2 */
1081240dc7eSStephan Gerhold mmio_write_32(APCS_CCI_ACS, 0);
1091240dc7eSStephan Gerhold mmio_write_32(APCS_CCI_SAW2, 0);
1101240dc7eSStephan Gerhold }
111840831b2SStephan Gerhold }
112840831b2SStephan Gerhold
113840831b2SStephan Gerhold /*
114840831b2SStephan Gerhold * MSM8916 has a special "interrupt aggregation logic" in the APPS SMMU,
115840831b2SStephan Gerhold * which allows routing context bank interrupts to one of 3 interrupt numbers
116840831b2SStephan Gerhold * ("TZ/HYP/NS"). Route all interrupts to the non-secure interrupt number
117840831b2SStephan Gerhold * by default to avoid special setup on the non-secure side.
118840831b2SStephan Gerhold */
119840831b2SStephan Gerhold #define CLK_OFF BIT_32(31)
120d9b04423SStephan Gerhold #define GCC_APSS_TCU_CBCR (GCC_BASE + 0x12018)
121d9b04423SStephan Gerhold #define GCC_GFX_TCU_CBCR (GCC_BASE + 0x12020)
122840831b2SStephan Gerhold #define GCC_SMMU_CFG_CBCR (GCC_BASE + 0x12038)
123d9b04423SStephan Gerhold #define GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE (GCC_BASE + 0x3600c)
124840831b2SStephan Gerhold #define GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE (GCC_BASE + 0x4500c)
125d9b04423SStephan Gerhold #define APSS_TCU_CLK_ENA BIT_32(1)
126d9b04423SStephan Gerhold #define GFX_TCU_CLK_ENA BIT_32(2)
127d9b04423SStephan Gerhold #define GFX_TBU_CLK_ENA BIT_32(3)
128840831b2SStephan Gerhold #define SMMU_CFG_CLK_ENA BIT_32(12)
129840831b2SStephan Gerhold #define APPS_SMMU_INTR_SEL_NS (APPS_SMMU_QCOM + 0x2000)
130840831b2SStephan Gerhold #define APPS_SMMU_INTR_SEL_NS_EN_ALL U(0xffffffff)
131840831b2SStephan Gerhold
132d9b04423SStephan Gerhold #define SMMU_SACR 0x010
133d9b04423SStephan Gerhold #define SMMU_SACR_CACHE_LOCK BIT_32(26)
134d9b04423SStephan Gerhold #define SMMU_IDR7 0x03c
135d9b04423SStephan Gerhold #define SMMU_IDR7_MINOR(val) (((val) >> 0) & 0xf)
136d9b04423SStephan Gerhold #define SMMU_IDR7_MAJOR(val) (((val) >> 4) & 0xf)
137d9b04423SStephan Gerhold
msm8916_smmu_cache_unlock(uintptr_t smmu_base,uintptr_t clk_cbcr)138d9b04423SStephan Gerhold static void msm8916_smmu_cache_unlock(uintptr_t smmu_base, uintptr_t clk_cbcr)
139d9b04423SStephan Gerhold {
140d9b04423SStephan Gerhold uint32_t version;
141d9b04423SStephan Gerhold
142d9b04423SStephan Gerhold /* Wait for clock */
143d9b04423SStephan Gerhold while (mmio_read_32(clk_cbcr) & CLK_OFF) {
144d9b04423SStephan Gerhold }
145d9b04423SStephan Gerhold
146d9b04423SStephan Gerhold version = mmio_read_32(smmu_base + SMMU_IDR7);
147d9b04423SStephan Gerhold VERBOSE("SMMU(0x%lx) r%dp%d\n", smmu_base,
148d9b04423SStephan Gerhold SMMU_IDR7_MAJOR(version), SMMU_IDR7_MINOR(version));
149d9b04423SStephan Gerhold
150d9b04423SStephan Gerhold /* For SMMU r2p0+ clear CACHE_LOCK to allow writes to CBn_ACTLR */
151d9b04423SStephan Gerhold if (SMMU_IDR7_MAJOR(version) >= 2) {
152d9b04423SStephan Gerhold mmio_clrbits_32(smmu_base + SMMU_SACR, SMMU_SACR_CACHE_LOCK);
153d9b04423SStephan Gerhold }
154d9b04423SStephan Gerhold }
155d9b04423SStephan Gerhold
msm8916_configure_smmu(void)156840831b2SStephan Gerhold static void msm8916_configure_smmu(void)
157840831b2SStephan Gerhold {
158*d9e565eaSStephan Gerhold uint32_t ena_bits = APSS_TCU_CLK_ENA | SMMU_CFG_CLK_ENA;
159*d9e565eaSStephan Gerhold
160*d9e565eaSStephan Gerhold /* Single core (MDM) platforms do not have a GPU */
161*d9e565eaSStephan Gerhold if (PLATFORM_CORE_COUNT > 1) {
162*d9e565eaSStephan Gerhold ena_bits |= GFX_TCU_CLK_ENA | GFX_TBU_CLK_ENA;
163*d9e565eaSStephan Gerhold }
164*d9e565eaSStephan Gerhold
165d9b04423SStephan Gerhold /* Enable SMMU clocks to enable register access */
166*d9e565eaSStephan Gerhold mmio_write_32(GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE, ena_bits);
167d9b04423SStephan Gerhold
168d9b04423SStephan Gerhold /* Wait for configuration clock */
169b9072a34SStephan Gerhold while (mmio_read_32(GCC_SMMU_CFG_CBCR) & CLK_OFF) {
170b9072a34SStephan Gerhold }
171840831b2SStephan Gerhold
172840831b2SStephan Gerhold /* Route all context bank interrupts to non-secure interrupt */
173840831b2SStephan Gerhold mmio_write_32(APPS_SMMU_INTR_SEL_NS, APPS_SMMU_INTR_SEL_NS_EN_ALL);
174840831b2SStephan Gerhold
175d9b04423SStephan Gerhold /* Clear sACR.CACHE_LOCK bit if needed for MMU-500 r2p0+ */
176d9b04423SStephan Gerhold msm8916_smmu_cache_unlock(APPS_SMMU_BASE, GCC_APSS_TCU_CBCR);
177*d9e565eaSStephan Gerhold if (PLATFORM_CORE_COUNT > 1) {
178d9b04423SStephan Gerhold msm8916_smmu_cache_unlock(GPU_SMMU_BASE, GCC_GFX_TCU_CBCR);
179*d9e565eaSStephan Gerhold }
180d9b04423SStephan Gerhold
181d9b04423SStephan Gerhold /*
182d9b04423SStephan Gerhold * Keep APCS vote for SMMU clocks for rest of booting process, but make
183d9b04423SStephan Gerhold * sure other vote registers (such as RPM) do not keep permanent votes.
184d9b04423SStephan Gerhold */
185d9b04423SStephan Gerhold VERBOSE("Clearing GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE (was: 0x%x)\n",
186d9b04423SStephan Gerhold mmio_read_32(GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE));
187d9b04423SStephan Gerhold mmio_write_32(GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE, 0);
188840831b2SStephan Gerhold }
189840831b2SStephan Gerhold
msm8916_configure(void)190840831b2SStephan Gerhold void msm8916_configure(void)
191840831b2SStephan Gerhold {
192840831b2SStephan Gerhold msm8916_gicv2_configure();
1931d7ed58fSStephan Gerhold msm8916_configure_apcs();
194840831b2SStephan Gerhold msm8916_configure_smmu();
195840831b2SStephan Gerhold }
196