xref: /rk3399_ARM-atf/plat/qti/msm8916/msm8916_config.c (revision 1d7ed58ff7eb3ee7016c95fb4813651c59e8c7d9)
1840831b2SStephan Gerhold /*
2840831b2SStephan Gerhold  * Copyright (c) 2021-2023, Stephan Gerhold <stephan@gerhold.net>
3840831b2SStephan Gerhold  *
4840831b2SStephan Gerhold  * SPDX-License-Identifier: BSD-3-Clause
5840831b2SStephan Gerhold  */
6840831b2SStephan Gerhold 
7840831b2SStephan Gerhold #include <assert.h>
8840831b2SStephan Gerhold 
9840831b2SStephan Gerhold #include <arch.h>
10840831b2SStephan Gerhold #include <lib/mmio.h>
11840831b2SStephan Gerhold 
12840831b2SStephan Gerhold #include "msm8916_config.h"
13840831b2SStephan Gerhold #include "msm8916_gicv2.h"
14840831b2SStephan Gerhold #include <msm8916_mmap.h>
15840831b2SStephan Gerhold #include <platform_def.h>
16840831b2SStephan Gerhold 
17*1d7ed58fSStephan Gerhold static void msm8916_configure_timer(uintptr_t base)
18840831b2SStephan Gerhold {
19840831b2SStephan Gerhold 	/* Set timer frequency */
20*1d7ed58fSStephan Gerhold 	mmio_write_32(base + CNTCTLBASE_CNTFRQ, PLAT_SYSCNT_FREQ);
21840831b2SStephan Gerhold 
22840831b2SStephan Gerhold 	/* Make all timer frames available to non-secure world */
23*1d7ed58fSStephan Gerhold 	mmio_write_32(base + CNTNSAR, GENMASK_32(7, 0));
24840831b2SStephan Gerhold }
25840831b2SStephan Gerhold 
26840831b2SStephan Gerhold /*
27840831b2SStephan Gerhold  * The APCS register regions always start with a SECURE register that should
28840831b2SStephan Gerhold  * be cleared to 0 to only allow secure access. Since BL31 handles most of
29840831b2SStephan Gerhold  * the CPU power management, most of them can be cleared to secure access only.
30840831b2SStephan Gerhold  */
31840831b2SStephan Gerhold #define APCS_GLB_SECURE_STS_NS		BIT_32(0)
32840831b2SStephan Gerhold #define APCS_GLB_SECURE_PWR_NS		BIT_32(1)
33*1d7ed58fSStephan Gerhold #define APCS_BOOT_START_ADDR_SEC	0x04
34840831b2SStephan Gerhold #define REMAP_EN			BIT_32(0)
35*1d7ed58fSStephan Gerhold #define APCS_AA64NAA32_REG		0x0c
36840831b2SStephan Gerhold 
37*1d7ed58fSStephan Gerhold static void msm8916_configure_apcs_cluster(unsigned int cluster)
38840831b2SStephan Gerhold {
39*1d7ed58fSStephan Gerhold 	uintptr_t cfg = APCS_CFG(cluster);
40840831b2SStephan Gerhold 	unsigned int cpu;
41840831b2SStephan Gerhold 
42840831b2SStephan Gerhold 	/* Disallow non-secure access to boot remapper / TCM registers */
43*1d7ed58fSStephan Gerhold 	mmio_write_32(cfg, 0);
44840831b2SStephan Gerhold 
45840831b2SStephan Gerhold 	/*
46840831b2SStephan Gerhold 	 * Disallow non-secure access to power management registers.
47840831b2SStephan Gerhold 	 * However, allow STS and PWR since those also seem to control access
48840831b2SStephan Gerhold 	 * to CPU frequency related registers (e.g. APCS_CMD_RCGR). If these
49840831b2SStephan Gerhold 	 * bits are not set, CPU frequency control fails in the non-secure world.
50840831b2SStephan Gerhold 	 */
51*1d7ed58fSStephan Gerhold 	mmio_write_32(APCS_GLB(cluster),
52*1d7ed58fSStephan Gerhold 		      APCS_GLB_SECURE_STS_NS | APCS_GLB_SECURE_PWR_NS);
53840831b2SStephan Gerhold 
54840831b2SStephan Gerhold 	/* Disallow non-secure access to L2 SAW2 */
55*1d7ed58fSStephan Gerhold 	mmio_write_32(APCS_L2_SAW2(cluster), 0);
56840831b2SStephan Gerhold 
57840831b2SStephan Gerhold 	/* Disallow non-secure access to CPU ACS and SAW2 */
58*1d7ed58fSStephan Gerhold 	for (cpu = 0; cpu < PLATFORM_CPUS_PER_CLUSTER; cpu++) {
59*1d7ed58fSStephan Gerhold 		mmio_write_32(APCS_ALIAS_ACS(cluster, cpu), 0);
60*1d7ed58fSStephan Gerhold 		mmio_write_32(APCS_ALIAS_SAW2(cluster, cpu), 0);
61840831b2SStephan Gerhold 	}
62840831b2SStephan Gerhold 
6345b2bd0aSStephan Gerhold #ifdef __aarch64__
64840831b2SStephan Gerhold 	/* Make sure all further warm boots end up in BL31 and aarch64 state */
65840831b2SStephan Gerhold 	CASSERT((BL31_BASE & 0xffff) == 0, assert_bl31_base_64k_aligned);
66*1d7ed58fSStephan Gerhold 	mmio_write_32(cfg + APCS_BOOT_START_ADDR_SEC, BL31_BASE | REMAP_EN);
67*1d7ed58fSStephan Gerhold 	mmio_write_32(cfg + APCS_AA64NAA32_REG, 1);
6845b2bd0aSStephan Gerhold #else
6945b2bd0aSStephan Gerhold 	/* Make sure all further warm boots end up in BL32 */
7045b2bd0aSStephan Gerhold 	CASSERT((BL32_BASE & 0xffff) == 0, assert_bl32_base_64k_aligned);
71*1d7ed58fSStephan Gerhold 	mmio_write_32(cfg + APCS_BOOT_START_ADDR_SEC, BL32_BASE | REMAP_EN);
7245b2bd0aSStephan Gerhold #endif
73*1d7ed58fSStephan Gerhold 
74*1d7ed58fSStephan Gerhold 	msm8916_configure_timer(APCS_QTMR(cluster));
75*1d7ed58fSStephan Gerhold }
76*1d7ed58fSStephan Gerhold 
77*1d7ed58fSStephan Gerhold static void msm8916_configure_apcs(void)
78*1d7ed58fSStephan Gerhold {
79*1d7ed58fSStephan Gerhold 	unsigned int cluster;
80*1d7ed58fSStephan Gerhold 
81*1d7ed58fSStephan Gerhold 	for (cluster = 0; cluster < PLATFORM_CLUSTER_COUNT; cluster++) {
82*1d7ed58fSStephan Gerhold 		msm8916_configure_apcs_cluster(cluster);
83*1d7ed58fSStephan Gerhold 	}
84840831b2SStephan Gerhold }
85840831b2SStephan Gerhold 
86840831b2SStephan Gerhold /*
87840831b2SStephan Gerhold  * MSM8916 has a special "interrupt aggregation logic" in the APPS SMMU,
88840831b2SStephan Gerhold  * which allows routing context bank interrupts to one of 3 interrupt numbers
89840831b2SStephan Gerhold  * ("TZ/HYP/NS"). Route all interrupts to the non-secure interrupt number
90840831b2SStephan Gerhold  * by default to avoid special setup on the non-secure side.
91840831b2SStephan Gerhold  */
92840831b2SStephan Gerhold #define CLK_OFF					BIT_32(31)
93d9b04423SStephan Gerhold #define GCC_APSS_TCU_CBCR			(GCC_BASE + 0x12018)
94d9b04423SStephan Gerhold #define GCC_GFX_TCU_CBCR			(GCC_BASE + 0x12020)
95840831b2SStephan Gerhold #define GCC_SMMU_CFG_CBCR			(GCC_BASE + 0x12038)
96d9b04423SStephan Gerhold #define GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE	(GCC_BASE + 0x3600c)
97840831b2SStephan Gerhold #define GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE	(GCC_BASE + 0x4500c)
98d9b04423SStephan Gerhold #define APSS_TCU_CLK_ENA			BIT_32(1)
99d9b04423SStephan Gerhold #define GFX_TCU_CLK_ENA				BIT_32(2)
100d9b04423SStephan Gerhold #define GFX_TBU_CLK_ENA				BIT_32(3)
101840831b2SStephan Gerhold #define SMMU_CFG_CLK_ENA			BIT_32(12)
102840831b2SStephan Gerhold #define APPS_SMMU_INTR_SEL_NS			(APPS_SMMU_QCOM + 0x2000)
103840831b2SStephan Gerhold #define APPS_SMMU_INTR_SEL_NS_EN_ALL		U(0xffffffff)
104840831b2SStephan Gerhold 
105d9b04423SStephan Gerhold #define SMMU_SACR				0x010
106d9b04423SStephan Gerhold #define SMMU_SACR_CACHE_LOCK			BIT_32(26)
107d9b04423SStephan Gerhold #define SMMU_IDR7				0x03c
108d9b04423SStephan Gerhold #define SMMU_IDR7_MINOR(val)			(((val) >> 0) & 0xf)
109d9b04423SStephan Gerhold #define SMMU_IDR7_MAJOR(val)			(((val) >> 4) & 0xf)
110d9b04423SStephan Gerhold 
111d9b04423SStephan Gerhold static void msm8916_smmu_cache_unlock(uintptr_t smmu_base, uintptr_t clk_cbcr)
112d9b04423SStephan Gerhold {
113d9b04423SStephan Gerhold 	uint32_t version;
114d9b04423SStephan Gerhold 
115d9b04423SStephan Gerhold 	/* Wait for clock */
116d9b04423SStephan Gerhold 	while (mmio_read_32(clk_cbcr) & CLK_OFF) {
117d9b04423SStephan Gerhold 	}
118d9b04423SStephan Gerhold 
119d9b04423SStephan Gerhold 	version = mmio_read_32(smmu_base + SMMU_IDR7);
120d9b04423SStephan Gerhold 	VERBOSE("SMMU(0x%lx) r%dp%d\n", smmu_base,
121d9b04423SStephan Gerhold 		SMMU_IDR7_MAJOR(version), SMMU_IDR7_MINOR(version));
122d9b04423SStephan Gerhold 
123d9b04423SStephan Gerhold 	/* For SMMU r2p0+ clear CACHE_LOCK to allow writes to CBn_ACTLR */
124d9b04423SStephan Gerhold 	if (SMMU_IDR7_MAJOR(version) >= 2) {
125d9b04423SStephan Gerhold 		mmio_clrbits_32(smmu_base + SMMU_SACR, SMMU_SACR_CACHE_LOCK);
126d9b04423SStephan Gerhold 	}
127d9b04423SStephan Gerhold }
128d9b04423SStephan Gerhold 
129840831b2SStephan Gerhold static void msm8916_configure_smmu(void)
130840831b2SStephan Gerhold {
131d9b04423SStephan Gerhold 	/* Enable SMMU clocks to enable register access */
132d9b04423SStephan Gerhold 	mmio_write_32(GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE, SMMU_CFG_CLK_ENA |
133d9b04423SStephan Gerhold 		      APSS_TCU_CLK_ENA | GFX_TCU_CLK_ENA | GFX_TBU_CLK_ENA);
134d9b04423SStephan Gerhold 
135d9b04423SStephan Gerhold 	/* Wait for configuration clock */
136b9072a34SStephan Gerhold 	while (mmio_read_32(GCC_SMMU_CFG_CBCR) & CLK_OFF) {
137b9072a34SStephan Gerhold 	}
138840831b2SStephan Gerhold 
139840831b2SStephan Gerhold 	/* Route all context bank interrupts to non-secure interrupt */
140840831b2SStephan Gerhold 	mmio_write_32(APPS_SMMU_INTR_SEL_NS, APPS_SMMU_INTR_SEL_NS_EN_ALL);
141840831b2SStephan Gerhold 
142d9b04423SStephan Gerhold 	/* Clear sACR.CACHE_LOCK bit if needed for MMU-500 r2p0+ */
143d9b04423SStephan Gerhold 	msm8916_smmu_cache_unlock(APPS_SMMU_BASE, GCC_APSS_TCU_CBCR);
144d9b04423SStephan Gerhold 	msm8916_smmu_cache_unlock(GPU_SMMU_BASE, GCC_GFX_TCU_CBCR);
145d9b04423SStephan Gerhold 
146d9b04423SStephan Gerhold 	/*
147d9b04423SStephan Gerhold 	 * Keep APCS vote for SMMU clocks for rest of booting process, but make
148d9b04423SStephan Gerhold 	 * sure other vote registers (such as RPM) do not keep permanent votes.
149d9b04423SStephan Gerhold 	 */
150d9b04423SStephan Gerhold 	VERBOSE("Clearing GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE (was: 0x%x)\n",
151d9b04423SStephan Gerhold 		mmio_read_32(GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE));
152d9b04423SStephan Gerhold 	mmio_write_32(GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE, 0);
153840831b2SStephan Gerhold }
154840831b2SStephan Gerhold 
155840831b2SStephan Gerhold void msm8916_configure(void)
156840831b2SStephan Gerhold {
157840831b2SStephan Gerhold 	msm8916_gicv2_configure();
158*1d7ed58fSStephan Gerhold 	msm8916_configure_apcs();
159840831b2SStephan Gerhold 	msm8916_configure_smmu();
160840831b2SStephan Gerhold }
161