| /* |
| * Copyright (c) 2015-2019, ARM Limited and Contributors. All rights reserved. |
| * Copyright (c) 2020, NVIDIA Corporation. All rights reserved. |
| * |
| * SPDX-License-Identifier: BSD-3-Clause |
| */ |
| |
| #include <assert.h> |
| |
| #include <arch_helpers.h> |
| #include <bl31/bl31.h> |
| #include <bl31/interrupt_mgmt.h> |
| #include <common/bl_common.h> |
| #include <common/debug.h> |
| #include <common/ep_info.h> |
| #include <common/interrupt_props.h> |
| #include <context.h> |
| #include <cortex_a57.h> |
| #include <denver.h> |
| #include <drivers/arm/gic_common.h> |
| #include <drivers/arm/gicv2.h> |
| #include <drivers/console.h> |
| #include <lib/el3_runtime/context_mgmt.h> |
| #include <lib/utils.h> |
| #include <lib/xlat_tables/xlat_tables_v2.h> |
| #include <plat/common/platform.h> |
| |
| #include <mce.h> |
| #include <memctrl.h> |
| #include <smmu.h> |
| #include <tegra_def.h> |
| #include <tegra_platform.h> |
| #include <tegra_private.h> |
| |
| extern void memcpy16(void *dest, const void *src, unsigned int length); |
| |
| /******************************************************************************* |
| * Tegra186 CPU numbers in cluster #0 |
| ******************************************************************************* |
| */ |
| #define TEGRA186_CLUSTER0_CORE2 2U |
| #define TEGRA186_CLUSTER0_CORE3 3U |
| |
| /******************************************************************************* |
| * The Tegra power domain tree has a single system level power domain i.e. a |
| * single root node. The first entry in the power domain descriptor specifies |
| * the number of power domains at the highest power level. |
| ******************************************************************************* |
| */ |
| static const uint8_t tegra_power_domain_tree_desc[] = { |
| /* No of root nodes */ |
| 1, |
| /* No of clusters */ |
| PLATFORM_CLUSTER_COUNT, |
| /* No of CPU cores - cluster0 */ |
| PLATFORM_MAX_CPUS_PER_CLUSTER, |
| /* No of CPU cores - cluster1 */ |
| PLATFORM_MAX_CPUS_PER_CLUSTER |
| }; |
| |
| /******************************************************************************* |
| * This function returns the Tegra default topology tree information. |
| ******************************************************************************/ |
| const uint8_t *plat_get_power_domain_tree_desc(void) |
| { |
| return tegra_power_domain_tree_desc; |
| } |
| |
| /* |
| * Table of regions to map using the MMU. |
| */ |
| static const mmap_region_t tegra_mmap[] = { |
| MAP_REGION_FLAT(TEGRA_MISC_BASE, 0x10000U, /* 64KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_TSA_BASE, 0x20000U, /* 128KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_MC_STREAMID_BASE, 0x10000U, /* 64KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_MC_BASE, 0x10000U, /* 64KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_UARTA_BASE, 0x20000U, /* 128KB - UART A, B*/ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_UARTC_BASE, 0x20000U, /* 128KB - UART C, G */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_UARTD_BASE, 0x30000U, /* 192KB - UART D, E, F */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_FUSE_BASE, 0x10000U, /* 64KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_GICD_BASE, 0x20000U, /* 128KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_SE0_BASE, 0x10000U, /* 64KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_PKA1_BASE, 0x10000U, /* 64KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_RNG1_BASE, 0x10000U, /* 64KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_CAR_RESET_BASE, 0x10000U, /* 64KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_PMC_BASE, 0x40000U, /* 256KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_TMRUS_BASE, 0x1000U, /* 4KB */ |
| MT_DEVICE | MT_RO | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_SCRATCH_BASE, 0x10000U, /* 64KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_MMCRAB_BASE, 0x60000U, /* 384KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_ARM_ACTMON_CTR_BASE, 0x20000U, /* 128KB - ARM/Denver */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_SMMU0_BASE, 0x1000000U, /* 64KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_HSP_DBELL_BASE, 0x10000U, /* 64KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_BPMP_IPC_TX_PHYS_BASE, TEGRA_BPMP_IPC_CH_MAP_SIZE, /* 4KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| MAP_REGION_FLAT(TEGRA_BPMP_IPC_RX_PHYS_BASE, TEGRA_BPMP_IPC_CH_MAP_SIZE, /* 4KB */ |
| MT_DEVICE | MT_RW | MT_SECURE), |
| {0} |
| }; |
| |
| /******************************************************************************* |
| * Set up the pagetables as per the platform memory map & initialize the MMU |
| ******************************************************************************/ |
| const mmap_region_t *plat_get_mmio_map(void) |
| { |
| /* MMIO space */ |
| return tegra_mmap; |
| } |
| |
| /******************************************************************************* |
| * Handler to get the System Counter Frequency |
| ******************************************************************************/ |
| uint32_t plat_get_syscnt_freq2(void) |
| { |
| return 31250000; |
| } |
| |
| /******************************************************************************* |
| * Maximum supported UART controllers |
| ******************************************************************************/ |
| #define TEGRA186_MAX_UART_PORTS 7 |
| |
| /******************************************************************************* |
| * This variable holds the UART port base addresses |
| ******************************************************************************/ |
| static uint32_t tegra186_uart_addresses[TEGRA186_MAX_UART_PORTS + 1] = { |
| 0, /* undefined - treated as an error case */ |
| TEGRA_UARTA_BASE, |
| TEGRA_UARTB_BASE, |
| TEGRA_UARTC_BASE, |
| TEGRA_UARTD_BASE, |
| TEGRA_UARTE_BASE, |
| TEGRA_UARTF_BASE, |
| TEGRA_UARTG_BASE, |
| }; |
| |
| /******************************************************************************* |
| * Enable console corresponding to the console ID |
| ******************************************************************************/ |
| void plat_enable_console(int32_t id) |
| { |
| static console_t uart_console; |
| uint32_t console_clock; |
| |
| if ((id > 0) && (id < TEGRA186_MAX_UART_PORTS)) { |
| /* |
| * Reference clock used by the FPGAs is a lot slower. |
| */ |
| if (tegra_platform_is_fpga()) { |
| console_clock = TEGRA_BOOT_UART_CLK_13_MHZ; |
| } else { |
| console_clock = TEGRA_BOOT_UART_CLK_408_MHZ; |
| } |
| |
| (void)console_16550_register(tegra186_uart_addresses[id], |
| console_clock, |
| TEGRA_CONSOLE_BAUDRATE, |
| &uart_console); |
| console_set_scope(&uart_console, CONSOLE_FLAG_BOOT | |
| CONSOLE_FLAG_RUNTIME | CONSOLE_FLAG_CRASH); |
| } |
| } |
| |
| /******************************************************************************* |
| * Handler for early platform setup |
| ******************************************************************************/ |
| void plat_early_platform_setup(void) |
| { |
| uint64_t impl, val; |
| const plat_params_from_bl2_t *plat_params = bl31_get_plat_params(); |
| const struct tegra_bl31_params *arg_from_bl2 = plat_get_bl31_params(); |
| |
| /* Verify chip id is t186 */ |
| assert(tegra_chipid_is_t186()); |
| |
| /* sanity check MCE firmware compatibility */ |
| mce_verify_firmware_version(); |
| |
| /* |
| * Do initial security configuration to allow DRAM/device access. |
| */ |
| tegra_memctrl_tzdram_setup(plat_params->tzdram_base, |
| (uint32_t)plat_params->tzdram_size); |
| |
| impl = (read_midr() >> MIDR_IMPL_SHIFT) & (uint64_t)MIDR_IMPL_MASK; |
| |
| /* |
| * Enable ECC and Parity Protection for Cortex-A57 CPUs (Tegra186 |
| * A02p and beyond). |
| */ |
| if ((plat_params->l2_ecc_parity_prot_dis != 1) && |
| (impl != (uint64_t)DENVER_IMPL)) { |
| |
| val = read_l2ctlr_el1(); |
| val |= CORTEX_A57_L2_ECC_PARITY_PROTECTION_BIT; |
| write_l2ctlr_el1(val); |
| } |
| |
| /* |
| * The previous bootloader might not have placed the BL32 image |
| * inside the TZDRAM. Platform handler to allow relocation of BL32 |
| * image to TZDRAM memory. This behavior might change per platform. |
| */ |
| plat_relocate_bl32_image(arg_from_bl2->bl32_image_info); |
| } |
| |
| /******************************************************************************* |
| * Handler for late platform setup |
| ******************************************************************************/ |
| void plat_late_platform_setup(void) |
| { |
| ; /* do nothing */ |
| } |
| |
| /* Secure IRQs for Tegra186 */ |
| static const interrupt_prop_t tegra186_interrupt_props[] = { |
| INTR_PROP_DESC(TEGRA_SDEI_SGI_PRIVATE, PLAT_SDEI_CRITICAL_PRI, |
| GICV2_INTR_GROUP0, GIC_INTR_CFG_EDGE), |
| INTR_PROP_DESC(TEGRA186_TOP_WDT_IRQ, PLAT_TEGRA_WDT_PRIO, |
| GICV2_INTR_GROUP0, GIC_INTR_CFG_EDGE), |
| INTR_PROP_DESC(TEGRA186_AON_WDT_IRQ, PLAT_TEGRA_WDT_PRIO, |
| GICV2_INTR_GROUP0, GIC_INTR_CFG_EDGE) |
| }; |
| |
| /******************************************************************************* |
| * Initialize the GIC and SGIs |
| ******************************************************************************/ |
| void plat_gic_setup(void) |
| { |
| tegra_gic_setup(tegra186_interrupt_props, ARRAY_SIZE(tegra186_interrupt_props)); |
| tegra_gic_init(); |
| |
| /* |
| * Initialize the FIQ handler only if the platform supports any |
| * FIQ interrupt sources. |
| */ |
| tegra_fiq_handler_setup(); |
| } |
| |
| /******************************************************************************* |
| * Return pointer to the BL31 params from previous bootloader |
| ******************************************************************************/ |
| struct tegra_bl31_params *plat_get_bl31_params(void) |
| { |
| uint32_t val; |
| |
| val = mmio_read_32(TEGRA_SCRATCH_BASE + SCRATCH_BL31_PARAMS_ADDR); |
| |
| return (struct tegra_bl31_params *)(uintptr_t)val; |
| } |
| |
| /******************************************************************************* |
| * Return pointer to the BL31 platform params from previous bootloader |
| ******************************************************************************/ |
| plat_params_from_bl2_t *plat_get_bl31_plat_params(void) |
| { |
| uint32_t val; |
| |
| val = mmio_read_32(TEGRA_SCRATCH_BASE + SCRATCH_BL31_PLAT_PARAMS_ADDR); |
| |
| return (plat_params_from_bl2_t *)(uintptr_t)val; |
| } |
| |
| /******************************************************************************* |
| * This function implements a part of the critical interface between the psci |
| * generic layer and the platform that allows the former to query the platform |
| * to convert an MPIDR to a unique linear index. An error code (-1) is returned |
| * in case the MPIDR is invalid. |
| ******************************************************************************/ |
| int32_t plat_core_pos_by_mpidr(u_register_t mpidr) |
| { |
| u_register_t cluster_id, cpu_id, pos; |
| int32_t ret; |
| |
| cluster_id = (mpidr >> (u_register_t)MPIDR_AFF1_SHIFT) & (u_register_t)MPIDR_AFFLVL_MASK; |
| cpu_id = (mpidr >> (u_register_t)MPIDR_AFF0_SHIFT) & (u_register_t)MPIDR_AFFLVL_MASK; |
| |
| /* |
| * Validate cluster_id by checking whether it represents |
| * one of the two clusters present on the platform. |
| * Validate cpu_id by checking whether it represents a CPU in |
| * one of the two clusters present on the platform. |
| */ |
| if ((cluster_id >= (u_register_t)PLATFORM_CLUSTER_COUNT) || |
| (cpu_id >= (u_register_t)PLATFORM_MAX_CPUS_PER_CLUSTER)) { |
| ret = -1; |
| } else { |
| /* calculate the core position */ |
| pos = cpu_id + (cluster_id << 2U); |
| |
| /* check for non-existent CPUs */ |
| if ((pos == TEGRA186_CLUSTER0_CORE2) || (pos == TEGRA186_CLUSTER0_CORE3)) { |
| ret = -1; |
| } else { |
| ret = (int32_t)pos; |
| } |
| } |
| |
| return ret; |
| } |
| |
| /******************************************************************************* |
| * Handler to relocate BL32 image to TZDRAM |
| ******************************************************************************/ |
| void plat_relocate_bl32_image(const image_info_t *bl32_img_info) |
| { |
| const plat_params_from_bl2_t *plat_bl31_params = plat_get_bl31_plat_params(); |
| const entry_point_info_t *bl32_ep_info = bl31_plat_get_next_image_ep_info(SECURE); |
| uint64_t tzdram_start, tzdram_end, bl32_start, bl32_end; |
| |
| if ((bl32_img_info != NULL) && (bl32_ep_info != NULL)) { |
| |
| /* Relocate BL32 if it resides outside of the TZDRAM */ |
| tzdram_start = plat_bl31_params->tzdram_base; |
| tzdram_end = plat_bl31_params->tzdram_base + |
| plat_bl31_params->tzdram_size; |
| bl32_start = bl32_img_info->image_base; |
| bl32_end = bl32_img_info->image_base + bl32_img_info->image_size; |
| |
| assert(tzdram_end > tzdram_start); |
| assert(bl32_end > bl32_start); |
| assert(bl32_ep_info->pc > tzdram_start); |
| assert(bl32_ep_info->pc < tzdram_end); |
| |
| /* relocate BL32 */ |
| if ((bl32_start >= tzdram_end) || (bl32_end <= tzdram_start)) { |
| |
| INFO("Relocate BL32 to TZDRAM\n"); |
| |
| (void)memcpy16((void *)(uintptr_t)bl32_ep_info->pc, |
| (void *)(uintptr_t)bl32_start, |
| bl32_img_info->image_size); |
| |
| /* clean up non-secure intermediate buffer */ |
| zeromem((void *)(uintptr_t)bl32_start, |
| bl32_img_info->image_size); |
| } |
| } |
| } |
| |
| /******************************************************************************* |
| * Handler to indicate support for System Suspend |
| ******************************************************************************/ |
| bool plat_supports_system_suspend(void) |
| { |
| return true; |
| } |
| /******************************************************************************* |
| * Platform specific runtime setup. |
| ******************************************************************************/ |
| void plat_runtime_setup(void) |
| { |
| /* |
| * During cold boot, it is observed that the arbitration |
| * bit is set in the Memory controller leading to false |
| * error interrupts in the non-secure world. To avoid |
| * this, clean the interrupt status register before |
| * booting into the non-secure world |
| */ |
| tegra_memctrl_clear_pending_interrupts(); |
| |
| /* |
| * During boot, USB3 and flash media (SDMMC/SATA) devices need |
| * access to IRAM. Because these clients connect to the MC and |
| * do not have a direct path to the IRAM, the MC implements AHB |
| * redirection during boot to allow path to IRAM. In this mode |
| * accesses to a programmed memory address aperture are directed |
| * to the AHB bus, allowing access to the IRAM. This mode must be |
| * disabled before we jump to the non-secure world. |
| */ |
| tegra_memctrl_disable_ahb_redirection(); |
| |
| /* |
| * Verify the integrity of the previously configured SMMU(s) |
| * settings |
| */ |
| tegra_smmu_verify(); |
| } |