blob: 8cba5c5215d938a0b4c804084640d692a2a988f5 [file] [log] [blame]
Stephan Gerhold14fdf072021-12-01 20:01:11 +01001/*
Stephan Gerhold04058392023-03-22 18:15:15 +01002 * Copyright (c) 2021-2023, Stephan Gerhold <stephan@gerhold.net>
Stephan Gerhold14fdf072021-12-01 20:01:11 +01003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <assert.h>
8
9#include <arch.h>
10#include <common/debug.h>
11#include <drivers/console.h>
12#include <drivers/generic_delay_timer.h>
13#include <lib/mmio.h>
14#include <lib/xlat_tables/xlat_mmu_helpers.h>
15#include <lib/xlat_tables/xlat_tables_v2.h>
16#include <plat/common/platform.h>
17
Stephan Gerhold253fef02021-12-01 20:03:33 +010018#include "msm8916_gicv2.h"
Stephan Gerhold14fdf072021-12-01 20:01:11 +010019#include <msm8916_mmap.h>
20#include <platform_def.h>
21#include <uartdm_console.h>
22
23static const mmap_region_t msm8916_mmap[] = {
24 MAP_REGION_FLAT(PCNOC_BASE, PCNOC_SIZE,
25 MT_DEVICE | MT_RW | MT_SECURE | MT_EXECUTE_NEVER),
26 MAP_REGION_FLAT(APCS_BASE, APCS_SIZE,
27 MT_DEVICE | MT_RW | MT_SECURE | MT_EXECUTE_NEVER),
28 {},
29};
30
31static struct {
32 entry_point_info_t bl32;
33 entry_point_info_t bl33;
34} image_ep_info = {
35 /* BL32 entry point */
36 SET_STATIC_PARAM_HEAD(bl32, PARAM_EP, VERSION_1,
37 entry_point_info_t, SECURE),
38 .bl32.pc = BL32_BASE,
39
40 /* BL33 entry point */
41 SET_STATIC_PARAM_HEAD(bl33, PARAM_EP, VERSION_1,
42 entry_point_info_t, NON_SECURE),
43 .bl33.pc = PRELOADED_BL33_BASE,
44 .bl33.spsr = SPSR_64(MODE_EL2, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS),
45};
46
47static console_t console;
48
49unsigned int plat_get_syscnt_freq2(void)
50{
51 return PLAT_SYSCNT_FREQ;
52}
53
54#define CLK_ENABLE BIT_32(0)
55#define CLK_OFF BIT_32(31)
56
57#define GPIO_BLSP_UART2_TX 4
58#define GPIO_BLSP_UART2_RX 5
59#define GPIO_CFG_FUNC_BLSP_UART2 (U(0x2) << 2)
60#define GPIO_CFG_DRV_STRENGTH_16MA (U(0x7) << 6)
61
62#define GCC_BLSP1_AHB_CBCR (GCC_BASE + 0x01008)
63#define GCC_BLSP1_UART2_APPS_CBCR (GCC_BASE + 0x0302c)
64#define GCC_APCS_CLOCK_BRANCH_ENA_VOTE (GCC_BASE + 0x45004)
65#define BLSP1_AHB_CLK_ENA BIT_32(10)
66
67/*
68 * The previous boot stage seems to disable most of the UART setup before exit
69 * so it must be enabled here again before the UART console can be used.
70 */
71static void msm8916_enable_blsp_uart2(void)
72{
73 /* Route GPIOs to BLSP UART2 */
74 mmio_write_32(TLMM_GPIO_CFG(GPIO_BLSP_UART2_TX),
75 GPIO_CFG_FUNC_BLSP_UART2 | GPIO_CFG_DRV_STRENGTH_16MA);
76 mmio_write_32(TLMM_GPIO_CFG(GPIO_BLSP_UART2_RX),
77 GPIO_CFG_FUNC_BLSP_UART2 | GPIO_CFG_DRV_STRENGTH_16MA);
78
79 /* Enable AHB clock */
80 mmio_setbits_32(GCC_APCS_CLOCK_BRANCH_ENA_VOTE, BLSP1_AHB_CLK_ENA);
81 while (mmio_read_32(GCC_BLSP1_AHB_CBCR) & CLK_OFF)
82 ;
83
84 /* Enable BLSP UART2 clock */
85 mmio_setbits_32(GCC_BLSP1_UART2_APPS_CBCR, CLK_ENABLE);
86 while (mmio_read_32(GCC_BLSP1_UART2_APPS_CBCR) & CLK_OFF)
87 ;
88}
89
90void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
91 u_register_t arg2, u_register_t arg3)
92{
93 /* Initialize the debug console as early as possible */
94 msm8916_enable_blsp_uart2();
95 console_uartdm_register(&console, BLSP_UART2_BASE);
96}
97
98void bl31_plat_arch_setup(void)
99{
100 mmap_add_region(BL31_BASE, BL31_BASE, BL31_END - BL31_BASE,
101 MT_RW_DATA | MT_SECURE);
102 mmap_add_region(BL_CODE_BASE, BL_CODE_BASE,
103 BL_CODE_END - BL_CODE_BASE,
104 MT_CODE | MT_SECURE);
105 mmap_add_region(BL_RO_DATA_BASE, BL_RO_DATA_BASE,
106 BL_RO_DATA_END - BL_RO_DATA_BASE,
107 MT_RO_DATA | MT_SECURE);
108 mmap_add_region(BL_COHERENT_RAM_BASE, BL_COHERENT_RAM_BASE,
109 BL_COHERENT_RAM_END - BL_COHERENT_RAM_BASE,
110 MT_DEVICE | MT_RW | MT_SECURE | MT_EXECUTE_NEVER);
111
112 mmap_add(msm8916_mmap);
113 init_xlat_tables();
114 enable_mmu_el3(0);
115}
116
Stephan Gerhold253fef02021-12-01 20:03:33 +0100117static void msm8916_configure_timer(void)
118{
119 /* Set timer frequency */
120 mmio_write_32(APCS_QTMR + CNTCTLBASE_CNTFRQ, plat_get_syscnt_freq2());
121
Stephan Gerholdef76cc72023-03-22 18:15:15 +0100122 /* Make all timer frames available to non-secure world */
123 mmio_write_32(APCS_QTMR + CNTNSAR, GENMASK_32(7, 0));
Stephan Gerhold253fef02021-12-01 20:03:33 +0100124}
125
126/*
127 * The APCS register regions always start with a SECURE register that should
128 * be cleared to 0 to only allow secure access. Since BL31 handles most of
129 * the CPU power management, most of them can be cleared to secure access only.
130 */
131#define APCS_GLB_SECURE_STS_NS BIT_32(0)
132#define APCS_GLB_SECURE_PWR_NS BIT_32(1)
Stephan Gerhold765e8592021-12-01 20:04:44 +0100133#define APCS_BOOT_START_ADDR_SEC (APCS_CFG + 0x04)
134#define REMAP_EN BIT_32(0)
135#define APCS_AA64NAA32_REG (APCS_CFG + 0x0c)
Stephan Gerhold253fef02021-12-01 20:03:33 +0100136
137static void msm8916_configure_cpu_pm(void)
138{
139 unsigned int cpu;
140
141 /* Disallow non-secure access to boot remapper / TCM registers */
142 mmio_write_32(APCS_CFG, 0);
143
144 /*
145 * Disallow non-secure access to power management registers.
146 * However, allow STS and PWR since those also seem to control access
147 * to CPU frequency related registers (e.g. APCS_CMD_RCGR). If these
148 * bits are not set, CPU frequency control fails in the non-secure world.
149 */
150 mmio_write_32(APCS_GLB, APCS_GLB_SECURE_STS_NS | APCS_GLB_SECURE_PWR_NS);
151
152 /* Disallow non-secure access to L2 SAW2 */
153 mmio_write_32(APCS_L2_SAW2, 0);
154
155 /* Disallow non-secure access to CPU ACS and SAW2 */
156 for (cpu = 0; cpu < PLATFORM_CORE_COUNT; cpu++) {
157 mmio_write_32(APCS_ALIAS_ACS(cpu), 0);
158 mmio_write_32(APCS_ALIAS_SAW2(cpu), 0);
159 }
Stephan Gerhold765e8592021-12-01 20:04:44 +0100160
161 /* Make sure all further warm boots end up in BL31 and aarch64 state */
162 CASSERT((BL31_BASE & 0xffff) == 0, assert_bl31_base_64k_aligned);
163 mmio_write_32(APCS_BOOT_START_ADDR_SEC, BL31_BASE | REMAP_EN);
164 mmio_write_32(APCS_AA64NAA32_REG, 1);
Stephan Gerhold253fef02021-12-01 20:03:33 +0100165}
166
167/*
168 * MSM8916 has a special "interrupt aggregation logic" in the APPS SMMU,
169 * which allows routing context bank interrupts to one of 3 interrupt numbers
170 * ("TZ/HYP/NS"). Route all interrupts to the non-secure interrupt number
171 * by default to avoid special setup on the non-secure side.
172 */
173#define GCC_SMMU_CFG_CBCR (GCC_BASE + 0x12038)
174#define GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE (GCC_BASE + 0x4500c)
175#define SMMU_CFG_CLK_ENA BIT_32(12)
176#define APPS_SMMU_INTR_SEL_NS (APPS_SMMU_QCOM + 0x2000)
177#define APPS_SMMU_INTR_SEL_NS_EN_ALL U(0xffffffff)
178
179static void msm8916_configure_smmu(void)
180{
181 /* Enable SMMU configuration clock to enable register access */
182 mmio_setbits_32(GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE, SMMU_CFG_CLK_ENA);
183 while (mmio_read_32(GCC_SMMU_CFG_CBCR) & CLK_OFF)
184 ;
185
186 /* Route all context bank interrupts to non-secure interrupt */
187 mmio_write_32(APPS_SMMU_INTR_SEL_NS, APPS_SMMU_INTR_SEL_NS_EN_ALL);
188
189 /* Disable configuration clock again */
190 mmio_clrbits_32(GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE, SMMU_CFG_CLK_ENA);
191}
192
Stephan Gerhold14fdf072021-12-01 20:01:11 +0100193void bl31_platform_setup(void)
194{
Stephan Gerhold253fef02021-12-01 20:03:33 +0100195 INFO("BL31: Platform setup start\n");
Stephan Gerhold14fdf072021-12-01 20:01:11 +0100196 generic_delay_timer_init();
Stephan Gerhold253fef02021-12-01 20:03:33 +0100197 msm8916_configure_timer();
198 msm8916_gicv2_init();
199 msm8916_configure_cpu_pm();
200 msm8916_configure_smmu();
201 INFO("BL31: Platform setup done\n");
Stephan Gerhold14fdf072021-12-01 20:01:11 +0100202}
203
204entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
205{
206 switch (type) {
207 case SECURE:
208 return &image_ep_info.bl32;
209 case NON_SECURE:
210 return &image_ep_info.bl33;
211 default:
212 assert(sec_state_is_valid(type));
213 return NULL;
214 }
215}