1840831b2SStephan Gerhold /* 2840831b2SStephan Gerhold * Copyright (c) 2021-2023, Stephan Gerhold <stephan@gerhold.net> 3840831b2SStephan Gerhold * 4840831b2SStephan Gerhold * SPDX-License-Identifier: BSD-3-Clause 5840831b2SStephan Gerhold */ 6840831b2SStephan Gerhold 7840831b2SStephan Gerhold #include <assert.h> 8840831b2SStephan Gerhold 9840831b2SStephan Gerhold #include <arch.h> 101240dc7eSStephan Gerhold #include <drivers/arm/cci.h> 11840831b2SStephan Gerhold #include <lib/mmio.h> 12840831b2SStephan Gerhold 13840831b2SStephan Gerhold #include "msm8916_config.h" 14840831b2SStephan Gerhold #include "msm8916_gicv2.h" 15840831b2SStephan Gerhold #include <msm8916_mmap.h> 16840831b2SStephan Gerhold #include <platform_def.h> 17840831b2SStephan Gerhold 181240dc7eSStephan Gerhold static const int cci_map[] = { 3, 4 }; 191240dc7eSStephan Gerhold 201240dc7eSStephan Gerhold void msm8916_configure_early(void) 211240dc7eSStephan Gerhold { 221240dc7eSStephan Gerhold if (PLATFORM_CLUSTER_COUNT > 1) { 231240dc7eSStephan Gerhold cci_init(APCS_CCI_BASE, cci_map, ARRAY_SIZE(cci_map)); 241240dc7eSStephan Gerhold cci_enable_snoop_dvm_reqs(MPIDR_AFFLVL1_VAL(read_mpidr_el1())); 251240dc7eSStephan Gerhold } 261240dc7eSStephan Gerhold } 271240dc7eSStephan Gerhold 281d7ed58fSStephan Gerhold static void msm8916_configure_timer(uintptr_t base) 29840831b2SStephan Gerhold { 30840831b2SStephan Gerhold /* Set timer frequency */ 311d7ed58fSStephan Gerhold mmio_write_32(base + CNTCTLBASE_CNTFRQ, PLAT_SYSCNT_FREQ); 32840831b2SStephan Gerhold 33840831b2SStephan Gerhold /* Make all timer frames available to non-secure world */ 341d7ed58fSStephan Gerhold mmio_write_32(base + CNTNSAR, GENMASK_32(7, 0)); 35840831b2SStephan Gerhold } 36840831b2SStephan Gerhold 37840831b2SStephan Gerhold /* 38840831b2SStephan Gerhold * The APCS register regions always start with a SECURE register that should 39840831b2SStephan Gerhold * be cleared to 0 to only allow secure access. Since BL31 handles most of 40840831b2SStephan Gerhold * the CPU power management, most of them can be cleared to secure access only. 41840831b2SStephan Gerhold */ 42840831b2SStephan Gerhold #define APCS_GLB_SECURE_STS_NS BIT_32(0) 43840831b2SStephan Gerhold #define APCS_GLB_SECURE_PWR_NS BIT_32(1) 44*d9e565eaSStephan Gerhold #if PLATFORM_CORE_COUNT > 1 451d7ed58fSStephan Gerhold #define APCS_BOOT_START_ADDR_SEC 0x04 461d7ed58fSStephan Gerhold #define APCS_AA64NAA32_REG 0x0c 47*d9e565eaSStephan Gerhold #else 48*d9e565eaSStephan Gerhold #define APCS_BOOT_START_ADDR_SEC 0x18 49*d9e565eaSStephan Gerhold #endif 50*d9e565eaSStephan Gerhold #define REMAP_EN BIT_32(0) 51840831b2SStephan Gerhold 521d7ed58fSStephan Gerhold static void msm8916_configure_apcs_cluster(unsigned int cluster) 53840831b2SStephan Gerhold { 541d7ed58fSStephan Gerhold uintptr_t cfg = APCS_CFG(cluster); 55840831b2SStephan Gerhold unsigned int cpu; 56840831b2SStephan Gerhold 57840831b2SStephan Gerhold /* Disallow non-secure access to boot remapper / TCM registers */ 581d7ed58fSStephan Gerhold mmio_write_32(cfg, 0); 59840831b2SStephan Gerhold 60840831b2SStephan Gerhold /* 61840831b2SStephan Gerhold * Disallow non-secure access to power management registers. 62840831b2SStephan Gerhold * However, allow STS and PWR since those also seem to control access 63840831b2SStephan Gerhold * to CPU frequency related registers (e.g. APCS_CMD_RCGR). If these 64840831b2SStephan Gerhold * bits are not set, CPU frequency control fails in the non-secure world. 65840831b2SStephan Gerhold */ 661d7ed58fSStephan Gerhold mmio_write_32(APCS_GLB(cluster), 671d7ed58fSStephan Gerhold APCS_GLB_SECURE_STS_NS | APCS_GLB_SECURE_PWR_NS); 68840831b2SStephan Gerhold 69*d9e565eaSStephan Gerhold if (PLATFORM_CORE_COUNT > 1) { 70840831b2SStephan Gerhold /* Disallow non-secure access to L2 SAW2 */ 711d7ed58fSStephan Gerhold mmio_write_32(APCS_L2_SAW2(cluster), 0); 72840831b2SStephan Gerhold 73840831b2SStephan Gerhold /* Disallow non-secure access to CPU ACS and SAW2 */ 741d7ed58fSStephan Gerhold for (cpu = 0; cpu < PLATFORM_CPUS_PER_CLUSTER; cpu++) { 751d7ed58fSStephan Gerhold mmio_write_32(APCS_ALIAS_ACS(cluster, cpu), 0); 761d7ed58fSStephan Gerhold mmio_write_32(APCS_ALIAS_SAW2(cluster, cpu), 0); 77840831b2SStephan Gerhold } 78*d9e565eaSStephan Gerhold } else { 79*d9e565eaSStephan Gerhold /* There is just one core so no aliases exist */ 80*d9e565eaSStephan Gerhold mmio_write_32(APCS_BANKED_ACS, 0); 81*d9e565eaSStephan Gerhold mmio_write_32(APCS_BANKED_SAW2, 0); 82*d9e565eaSStephan Gerhold } 83840831b2SStephan Gerhold 8445b2bd0aSStephan Gerhold #ifdef __aarch64__ 85840831b2SStephan Gerhold /* Make sure all further warm boots end up in BL31 and aarch64 state */ 86840831b2SStephan Gerhold CASSERT((BL31_BASE & 0xffff) == 0, assert_bl31_base_64k_aligned); 871d7ed58fSStephan Gerhold mmio_write_32(cfg + APCS_BOOT_START_ADDR_SEC, BL31_BASE | REMAP_EN); 881d7ed58fSStephan Gerhold mmio_write_32(cfg + APCS_AA64NAA32_REG, 1); 8945b2bd0aSStephan Gerhold #else 9045b2bd0aSStephan Gerhold /* Make sure all further warm boots end up in BL32 */ 9145b2bd0aSStephan Gerhold CASSERT((BL32_BASE & 0xffff) == 0, assert_bl32_base_64k_aligned); 921d7ed58fSStephan Gerhold mmio_write_32(cfg + APCS_BOOT_START_ADDR_SEC, BL32_BASE | REMAP_EN); 9345b2bd0aSStephan Gerhold #endif 941d7ed58fSStephan Gerhold 951d7ed58fSStephan Gerhold msm8916_configure_timer(APCS_QTMR(cluster)); 961d7ed58fSStephan Gerhold } 971d7ed58fSStephan Gerhold 981d7ed58fSStephan Gerhold static void msm8916_configure_apcs(void) 991d7ed58fSStephan Gerhold { 1001d7ed58fSStephan Gerhold unsigned int cluster; 1011d7ed58fSStephan Gerhold 1021d7ed58fSStephan Gerhold for (cluster = 0; cluster < PLATFORM_CLUSTER_COUNT; cluster++) { 1031d7ed58fSStephan Gerhold msm8916_configure_apcs_cluster(cluster); 1041d7ed58fSStephan Gerhold } 1051240dc7eSStephan Gerhold 1061240dc7eSStephan Gerhold if (PLATFORM_CLUSTER_COUNT > 1) { 1071240dc7eSStephan Gerhold /* Disallow non-secure access to CCI ACS and SAW2 */ 1081240dc7eSStephan Gerhold mmio_write_32(APCS_CCI_ACS, 0); 1091240dc7eSStephan Gerhold mmio_write_32(APCS_CCI_SAW2, 0); 1101240dc7eSStephan Gerhold } 111840831b2SStephan Gerhold } 112840831b2SStephan Gerhold 113840831b2SStephan Gerhold /* 114840831b2SStephan Gerhold * MSM8916 has a special "interrupt aggregation logic" in the APPS SMMU, 115840831b2SStephan Gerhold * which allows routing context bank interrupts to one of 3 interrupt numbers 116840831b2SStephan Gerhold * ("TZ/HYP/NS"). Route all interrupts to the non-secure interrupt number 117840831b2SStephan Gerhold * by default to avoid special setup on the non-secure side. 118840831b2SStephan Gerhold */ 119840831b2SStephan Gerhold #define CLK_OFF BIT_32(31) 120d9b04423SStephan Gerhold #define GCC_APSS_TCU_CBCR (GCC_BASE + 0x12018) 121d9b04423SStephan Gerhold #define GCC_GFX_TCU_CBCR (GCC_BASE + 0x12020) 122840831b2SStephan Gerhold #define GCC_SMMU_CFG_CBCR (GCC_BASE + 0x12038) 123d9b04423SStephan Gerhold #define GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE (GCC_BASE + 0x3600c) 124840831b2SStephan Gerhold #define GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE (GCC_BASE + 0x4500c) 125d9b04423SStephan Gerhold #define APSS_TCU_CLK_ENA BIT_32(1) 126d9b04423SStephan Gerhold #define GFX_TCU_CLK_ENA BIT_32(2) 127d9b04423SStephan Gerhold #define GFX_TBU_CLK_ENA BIT_32(3) 128840831b2SStephan Gerhold #define SMMU_CFG_CLK_ENA BIT_32(12) 129840831b2SStephan Gerhold #define APPS_SMMU_INTR_SEL_NS (APPS_SMMU_QCOM + 0x2000) 130840831b2SStephan Gerhold #define APPS_SMMU_INTR_SEL_NS_EN_ALL U(0xffffffff) 131840831b2SStephan Gerhold 132d9b04423SStephan Gerhold #define SMMU_SACR 0x010 133d9b04423SStephan Gerhold #define SMMU_SACR_CACHE_LOCK BIT_32(26) 134d9b04423SStephan Gerhold #define SMMU_IDR7 0x03c 135d9b04423SStephan Gerhold #define SMMU_IDR7_MINOR(val) (((val) >> 0) & 0xf) 136d9b04423SStephan Gerhold #define SMMU_IDR7_MAJOR(val) (((val) >> 4) & 0xf) 137d9b04423SStephan Gerhold 138d9b04423SStephan Gerhold static void msm8916_smmu_cache_unlock(uintptr_t smmu_base, uintptr_t clk_cbcr) 139d9b04423SStephan Gerhold { 140d9b04423SStephan Gerhold uint32_t version; 141d9b04423SStephan Gerhold 142d9b04423SStephan Gerhold /* Wait for clock */ 143d9b04423SStephan Gerhold while (mmio_read_32(clk_cbcr) & CLK_OFF) { 144d9b04423SStephan Gerhold } 145d9b04423SStephan Gerhold 146d9b04423SStephan Gerhold version = mmio_read_32(smmu_base + SMMU_IDR7); 147d9b04423SStephan Gerhold VERBOSE("SMMU(0x%lx) r%dp%d\n", smmu_base, 148d9b04423SStephan Gerhold SMMU_IDR7_MAJOR(version), SMMU_IDR7_MINOR(version)); 149d9b04423SStephan Gerhold 150d9b04423SStephan Gerhold /* For SMMU r2p0+ clear CACHE_LOCK to allow writes to CBn_ACTLR */ 151d9b04423SStephan Gerhold if (SMMU_IDR7_MAJOR(version) >= 2) { 152d9b04423SStephan Gerhold mmio_clrbits_32(smmu_base + SMMU_SACR, SMMU_SACR_CACHE_LOCK); 153d9b04423SStephan Gerhold } 154d9b04423SStephan Gerhold } 155d9b04423SStephan Gerhold 156840831b2SStephan Gerhold static void msm8916_configure_smmu(void) 157840831b2SStephan Gerhold { 158*d9e565eaSStephan Gerhold uint32_t ena_bits = APSS_TCU_CLK_ENA | SMMU_CFG_CLK_ENA; 159*d9e565eaSStephan Gerhold 160*d9e565eaSStephan Gerhold /* Single core (MDM) platforms do not have a GPU */ 161*d9e565eaSStephan Gerhold if (PLATFORM_CORE_COUNT > 1) { 162*d9e565eaSStephan Gerhold ena_bits |= GFX_TCU_CLK_ENA | GFX_TBU_CLK_ENA; 163*d9e565eaSStephan Gerhold } 164*d9e565eaSStephan Gerhold 165d9b04423SStephan Gerhold /* Enable SMMU clocks to enable register access */ 166*d9e565eaSStephan Gerhold mmio_write_32(GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE, ena_bits); 167d9b04423SStephan Gerhold 168d9b04423SStephan Gerhold /* Wait for configuration clock */ 169b9072a34SStephan Gerhold while (mmio_read_32(GCC_SMMU_CFG_CBCR) & CLK_OFF) { 170b9072a34SStephan Gerhold } 171840831b2SStephan Gerhold 172840831b2SStephan Gerhold /* Route all context bank interrupts to non-secure interrupt */ 173840831b2SStephan Gerhold mmio_write_32(APPS_SMMU_INTR_SEL_NS, APPS_SMMU_INTR_SEL_NS_EN_ALL); 174840831b2SStephan Gerhold 175d9b04423SStephan Gerhold /* Clear sACR.CACHE_LOCK bit if needed for MMU-500 r2p0+ */ 176d9b04423SStephan Gerhold msm8916_smmu_cache_unlock(APPS_SMMU_BASE, GCC_APSS_TCU_CBCR); 177*d9e565eaSStephan Gerhold if (PLATFORM_CORE_COUNT > 1) { 178d9b04423SStephan Gerhold msm8916_smmu_cache_unlock(GPU_SMMU_BASE, GCC_GFX_TCU_CBCR); 179*d9e565eaSStephan Gerhold } 180d9b04423SStephan Gerhold 181d9b04423SStephan Gerhold /* 182d9b04423SStephan Gerhold * Keep APCS vote for SMMU clocks for rest of booting process, but make 183d9b04423SStephan Gerhold * sure other vote registers (such as RPM) do not keep permanent votes. 184d9b04423SStephan Gerhold */ 185d9b04423SStephan Gerhold VERBOSE("Clearing GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE (was: 0x%x)\n", 186d9b04423SStephan Gerhold mmio_read_32(GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE)); 187d9b04423SStephan Gerhold mmio_write_32(GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE, 0); 188840831b2SStephan Gerhold } 189840831b2SStephan Gerhold 190840831b2SStephan Gerhold void msm8916_configure(void) 191840831b2SStephan Gerhold { 192840831b2SStephan Gerhold msm8916_gicv2_configure(); 1931d7ed58fSStephan Gerhold msm8916_configure_apcs(); 194840831b2SStephan Gerhold msm8916_configure_smmu(); 195840831b2SStephan Gerhold } 196