1840831b2SStephan Gerhold /* 2840831b2SStephan Gerhold * Copyright (c) 2021-2023, Stephan Gerhold <stephan@gerhold.net> 3840831b2SStephan Gerhold * 4840831b2SStephan Gerhold * SPDX-License-Identifier: BSD-3-Clause 5840831b2SStephan Gerhold */ 6840831b2SStephan Gerhold 7840831b2SStephan Gerhold #include <assert.h> 8840831b2SStephan Gerhold 9840831b2SStephan Gerhold #include <arch.h> 10840831b2SStephan Gerhold #include <lib/mmio.h> 11840831b2SStephan Gerhold 12840831b2SStephan Gerhold #include "msm8916_config.h" 13840831b2SStephan Gerhold #include "msm8916_gicv2.h" 14840831b2SStephan Gerhold #include <msm8916_mmap.h> 15840831b2SStephan Gerhold #include <platform_def.h> 16840831b2SStephan Gerhold 17*1d7ed58fSStephan Gerhold static void msm8916_configure_timer(uintptr_t base) 18840831b2SStephan Gerhold { 19840831b2SStephan Gerhold /* Set timer frequency */ 20*1d7ed58fSStephan Gerhold mmio_write_32(base + CNTCTLBASE_CNTFRQ, PLAT_SYSCNT_FREQ); 21840831b2SStephan Gerhold 22840831b2SStephan Gerhold /* Make all timer frames available to non-secure world */ 23*1d7ed58fSStephan Gerhold mmio_write_32(base + CNTNSAR, GENMASK_32(7, 0)); 24840831b2SStephan Gerhold } 25840831b2SStephan Gerhold 26840831b2SStephan Gerhold /* 27840831b2SStephan Gerhold * The APCS register regions always start with a SECURE register that should 28840831b2SStephan Gerhold * be cleared to 0 to only allow secure access. Since BL31 handles most of 29840831b2SStephan Gerhold * the CPU power management, most of them can be cleared to secure access only. 30840831b2SStephan Gerhold */ 31840831b2SStephan Gerhold #define APCS_GLB_SECURE_STS_NS BIT_32(0) 32840831b2SStephan Gerhold #define APCS_GLB_SECURE_PWR_NS BIT_32(1) 33*1d7ed58fSStephan Gerhold #define APCS_BOOT_START_ADDR_SEC 0x04 34840831b2SStephan Gerhold #define REMAP_EN BIT_32(0) 35*1d7ed58fSStephan Gerhold #define APCS_AA64NAA32_REG 0x0c 36840831b2SStephan Gerhold 37*1d7ed58fSStephan Gerhold static void msm8916_configure_apcs_cluster(unsigned int cluster) 38840831b2SStephan Gerhold { 39*1d7ed58fSStephan Gerhold uintptr_t cfg = APCS_CFG(cluster); 40840831b2SStephan Gerhold unsigned int cpu; 41840831b2SStephan Gerhold 42840831b2SStephan Gerhold /* Disallow non-secure access to boot remapper / TCM registers */ 43*1d7ed58fSStephan Gerhold mmio_write_32(cfg, 0); 44840831b2SStephan Gerhold 45840831b2SStephan Gerhold /* 46840831b2SStephan Gerhold * Disallow non-secure access to power management registers. 47840831b2SStephan Gerhold * However, allow STS and PWR since those also seem to control access 48840831b2SStephan Gerhold * to CPU frequency related registers (e.g. APCS_CMD_RCGR). If these 49840831b2SStephan Gerhold * bits are not set, CPU frequency control fails in the non-secure world. 50840831b2SStephan Gerhold */ 51*1d7ed58fSStephan Gerhold mmio_write_32(APCS_GLB(cluster), 52*1d7ed58fSStephan Gerhold APCS_GLB_SECURE_STS_NS | APCS_GLB_SECURE_PWR_NS); 53840831b2SStephan Gerhold 54840831b2SStephan Gerhold /* Disallow non-secure access to L2 SAW2 */ 55*1d7ed58fSStephan Gerhold mmio_write_32(APCS_L2_SAW2(cluster), 0); 56840831b2SStephan Gerhold 57840831b2SStephan Gerhold /* Disallow non-secure access to CPU ACS and SAW2 */ 58*1d7ed58fSStephan Gerhold for (cpu = 0; cpu < PLATFORM_CPUS_PER_CLUSTER; cpu++) { 59*1d7ed58fSStephan Gerhold mmio_write_32(APCS_ALIAS_ACS(cluster, cpu), 0); 60*1d7ed58fSStephan Gerhold mmio_write_32(APCS_ALIAS_SAW2(cluster, cpu), 0); 61840831b2SStephan Gerhold } 62840831b2SStephan Gerhold 6345b2bd0aSStephan Gerhold #ifdef __aarch64__ 64840831b2SStephan Gerhold /* Make sure all further warm boots end up in BL31 and aarch64 state */ 65840831b2SStephan Gerhold CASSERT((BL31_BASE & 0xffff) == 0, assert_bl31_base_64k_aligned); 66*1d7ed58fSStephan Gerhold mmio_write_32(cfg + APCS_BOOT_START_ADDR_SEC, BL31_BASE | REMAP_EN); 67*1d7ed58fSStephan Gerhold mmio_write_32(cfg + APCS_AA64NAA32_REG, 1); 6845b2bd0aSStephan Gerhold #else 6945b2bd0aSStephan Gerhold /* Make sure all further warm boots end up in BL32 */ 7045b2bd0aSStephan Gerhold CASSERT((BL32_BASE & 0xffff) == 0, assert_bl32_base_64k_aligned); 71*1d7ed58fSStephan Gerhold mmio_write_32(cfg + APCS_BOOT_START_ADDR_SEC, BL32_BASE | REMAP_EN); 7245b2bd0aSStephan Gerhold #endif 73*1d7ed58fSStephan Gerhold 74*1d7ed58fSStephan Gerhold msm8916_configure_timer(APCS_QTMR(cluster)); 75*1d7ed58fSStephan Gerhold } 76*1d7ed58fSStephan Gerhold 77*1d7ed58fSStephan Gerhold static void msm8916_configure_apcs(void) 78*1d7ed58fSStephan Gerhold { 79*1d7ed58fSStephan Gerhold unsigned int cluster; 80*1d7ed58fSStephan Gerhold 81*1d7ed58fSStephan Gerhold for (cluster = 0; cluster < PLATFORM_CLUSTER_COUNT; cluster++) { 82*1d7ed58fSStephan Gerhold msm8916_configure_apcs_cluster(cluster); 83*1d7ed58fSStephan Gerhold } 84840831b2SStephan Gerhold } 85840831b2SStephan Gerhold 86840831b2SStephan Gerhold /* 87840831b2SStephan Gerhold * MSM8916 has a special "interrupt aggregation logic" in the APPS SMMU, 88840831b2SStephan Gerhold * which allows routing context bank interrupts to one of 3 interrupt numbers 89840831b2SStephan Gerhold * ("TZ/HYP/NS"). Route all interrupts to the non-secure interrupt number 90840831b2SStephan Gerhold * by default to avoid special setup on the non-secure side. 91840831b2SStephan Gerhold */ 92840831b2SStephan Gerhold #define CLK_OFF BIT_32(31) 93d9b04423SStephan Gerhold #define GCC_APSS_TCU_CBCR (GCC_BASE + 0x12018) 94d9b04423SStephan Gerhold #define GCC_GFX_TCU_CBCR (GCC_BASE + 0x12020) 95840831b2SStephan Gerhold #define GCC_SMMU_CFG_CBCR (GCC_BASE + 0x12038) 96d9b04423SStephan Gerhold #define GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE (GCC_BASE + 0x3600c) 97840831b2SStephan Gerhold #define GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE (GCC_BASE + 0x4500c) 98d9b04423SStephan Gerhold #define APSS_TCU_CLK_ENA BIT_32(1) 99d9b04423SStephan Gerhold #define GFX_TCU_CLK_ENA BIT_32(2) 100d9b04423SStephan Gerhold #define GFX_TBU_CLK_ENA BIT_32(3) 101840831b2SStephan Gerhold #define SMMU_CFG_CLK_ENA BIT_32(12) 102840831b2SStephan Gerhold #define APPS_SMMU_INTR_SEL_NS (APPS_SMMU_QCOM + 0x2000) 103840831b2SStephan Gerhold #define APPS_SMMU_INTR_SEL_NS_EN_ALL U(0xffffffff) 104840831b2SStephan Gerhold 105d9b04423SStephan Gerhold #define SMMU_SACR 0x010 106d9b04423SStephan Gerhold #define SMMU_SACR_CACHE_LOCK BIT_32(26) 107d9b04423SStephan Gerhold #define SMMU_IDR7 0x03c 108d9b04423SStephan Gerhold #define SMMU_IDR7_MINOR(val) (((val) >> 0) & 0xf) 109d9b04423SStephan Gerhold #define SMMU_IDR7_MAJOR(val) (((val) >> 4) & 0xf) 110d9b04423SStephan Gerhold 111d9b04423SStephan Gerhold static void msm8916_smmu_cache_unlock(uintptr_t smmu_base, uintptr_t clk_cbcr) 112d9b04423SStephan Gerhold { 113d9b04423SStephan Gerhold uint32_t version; 114d9b04423SStephan Gerhold 115d9b04423SStephan Gerhold /* Wait for clock */ 116d9b04423SStephan Gerhold while (mmio_read_32(clk_cbcr) & CLK_OFF) { 117d9b04423SStephan Gerhold } 118d9b04423SStephan Gerhold 119d9b04423SStephan Gerhold version = mmio_read_32(smmu_base + SMMU_IDR7); 120d9b04423SStephan Gerhold VERBOSE("SMMU(0x%lx) r%dp%d\n", smmu_base, 121d9b04423SStephan Gerhold SMMU_IDR7_MAJOR(version), SMMU_IDR7_MINOR(version)); 122d9b04423SStephan Gerhold 123d9b04423SStephan Gerhold /* For SMMU r2p0+ clear CACHE_LOCK to allow writes to CBn_ACTLR */ 124d9b04423SStephan Gerhold if (SMMU_IDR7_MAJOR(version) >= 2) { 125d9b04423SStephan Gerhold mmio_clrbits_32(smmu_base + SMMU_SACR, SMMU_SACR_CACHE_LOCK); 126d9b04423SStephan Gerhold } 127d9b04423SStephan Gerhold } 128d9b04423SStephan Gerhold 129840831b2SStephan Gerhold static void msm8916_configure_smmu(void) 130840831b2SStephan Gerhold { 131d9b04423SStephan Gerhold /* Enable SMMU clocks to enable register access */ 132d9b04423SStephan Gerhold mmio_write_32(GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE, SMMU_CFG_CLK_ENA | 133d9b04423SStephan Gerhold APSS_TCU_CLK_ENA | GFX_TCU_CLK_ENA | GFX_TBU_CLK_ENA); 134d9b04423SStephan Gerhold 135d9b04423SStephan Gerhold /* Wait for configuration clock */ 136b9072a34SStephan Gerhold while (mmio_read_32(GCC_SMMU_CFG_CBCR) & CLK_OFF) { 137b9072a34SStephan Gerhold } 138840831b2SStephan Gerhold 139840831b2SStephan Gerhold /* Route all context bank interrupts to non-secure interrupt */ 140840831b2SStephan Gerhold mmio_write_32(APPS_SMMU_INTR_SEL_NS, APPS_SMMU_INTR_SEL_NS_EN_ALL); 141840831b2SStephan Gerhold 142d9b04423SStephan Gerhold /* Clear sACR.CACHE_LOCK bit if needed for MMU-500 r2p0+ */ 143d9b04423SStephan Gerhold msm8916_smmu_cache_unlock(APPS_SMMU_BASE, GCC_APSS_TCU_CBCR); 144d9b04423SStephan Gerhold msm8916_smmu_cache_unlock(GPU_SMMU_BASE, GCC_GFX_TCU_CBCR); 145d9b04423SStephan Gerhold 146d9b04423SStephan Gerhold /* 147d9b04423SStephan Gerhold * Keep APCS vote for SMMU clocks for rest of booting process, but make 148d9b04423SStephan Gerhold * sure other vote registers (such as RPM) do not keep permanent votes. 149d9b04423SStephan Gerhold */ 150d9b04423SStephan Gerhold VERBOSE("Clearing GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE (was: 0x%x)\n", 151d9b04423SStephan Gerhold mmio_read_32(GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE)); 152d9b04423SStephan Gerhold mmio_write_32(GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE, 0); 153840831b2SStephan Gerhold } 154840831b2SStephan Gerhold 155840831b2SStephan Gerhold void msm8916_configure(void) 156840831b2SStephan Gerhold { 157840831b2SStephan Gerhold msm8916_gicv2_configure(); 158*1d7ed58fSStephan Gerhold msm8916_configure_apcs(); 159840831b2SStephan Gerhold msm8916_configure_smmu(); 160840831b2SStephan Gerhold } 161