blob: a36e4ed603b1af17566384416c75d3120336f2ab [file] [log] [blame]
Lokesh Vutlaa2285322019-06-13 10:29:42 +05301// SPDX-License-Identifier: GPL-2.0+
2/*
3 * J721E: SoC specific initialization
4 *
5 * Copyright (C) 2018-2019 Texas Instruments Incorporated - http://www.ti.com/
6 * Lokesh Vutla <lokeshvutla@ti.com>
7 */
8
9#include <common.h>
Simon Glass97589732020-05-10 11:40:02 -060010#include <init.h>
Lokesh Vutlaa2285322019-06-13 10:29:42 +053011#include <spl.h>
12#include <asm/io.h>
13#include <asm/armv7_mpu.h>
Lokesh Vutla6edde292019-06-13 10:29:43 +053014#include <asm/arch/hardware.h>
Andreas Dannenberg5e1782c2019-06-13 10:29:47 +053015#include <asm/arch/sysfw-loader.h>
Lokesh Vutlaa2285322019-06-13 10:29:42 +053016#include "common.h"
Lokesh Vutla96c11f42019-06-13 10:29:46 +053017#include <asm/arch/sys_proto.h>
18#include <linux/soc/ti/ti_sci_protocol.h>
Andreas Dannenberg5e1782c2019-06-13 10:29:47 +053019#include <dm.h>
20#include <dm/uclass-internal.h>
21#include <dm/pinctrl.h>
Faiz Abbas68393212020-02-26 13:44:36 +053022#include <mmc.h>
Keerthy7007adc2020-02-12 13:55:04 +053023#include <remoteproc.h>
Lokesh Vutlaa2285322019-06-13 10:29:42 +053024
25#ifdef CONFIG_SPL_BUILD
Andrew F. Davisf0bcb662020-01-10 14:35:21 -050026#ifdef CONFIG_K3_LOAD_SYSFW
27#ifdef CONFIG_TI_SECURE_DEVICE
28struct fwl_data cbass_hc_cfg0_fwls[] = {
29 { "PCIE0_CFG", 2560, 8 },
30 { "PCIE1_CFG", 2561, 8 },
31 { "USB3SS0_CORE", 2568, 4 },
32 { "USB3SS1_CORE", 2570, 4 },
33 { "EMMC8SS0_CFG", 2576, 4 },
34 { "UFS_HCI0_CFG", 2580, 4 },
35 { "SERDES0", 2584, 1 },
36 { "SERDES1", 2585, 1 },
37}, cbass_hc0_fwls[] = {
38 { "PCIE0_HP", 2528, 24 },
39 { "PCIE0_LP", 2529, 24 },
40 { "PCIE1_HP", 2530, 24 },
41 { "PCIE1_LP", 2531, 24 },
42}, cbass_rc_cfg0_fwls[] = {
43 { "EMMCSD4SS0_CFG", 2380, 4 },
44}, cbass_rc0_fwls[] = {
45 { "GPMC0", 2310, 8 },
46}, infra_cbass0_fwls[] = {
47 { "PLL_MMR0", 8, 26 },
48 { "CTRL_MMR0", 9, 16 },
49}, mcu_cbass0_fwls[] = {
50 { "MCU_R5FSS0_CORE0", 1024, 4 },
51 { "MCU_R5FSS0_CORE0_CFG", 1025, 2 },
52 { "MCU_R5FSS0_CORE1", 1028, 4 },
53 { "MCU_FSS0_CFG", 1032, 12 },
54 { "MCU_FSS0_S1", 1033, 8 },
55 { "MCU_FSS0_S0", 1036, 8 },
56 { "MCU_PSROM49152X32", 1048, 1 },
57 { "MCU_MSRAM128KX64", 1050, 8 },
58 { "MCU_CTRL_MMR0", 1200, 8 },
59 { "MCU_PLL_MMR0", 1201, 3 },
60 { "MCU_CPSW0", 1220, 2 },
61}, wkup_cbass0_fwls[] = {
62 { "WKUP_CTRL_MMR0", 131, 16 },
63};
64#endif
65#endif
66
Andreas Dannenberg660aa462019-06-13 10:29:44 +053067static void ctrl_mmr_unlock(void)
68{
69 /* Unlock all WKUP_CTRL_MMR0 module registers */
70 mmr_unlock(WKUP_CTRL_MMR0_BASE, 0);
71 mmr_unlock(WKUP_CTRL_MMR0_BASE, 1);
72 mmr_unlock(WKUP_CTRL_MMR0_BASE, 2);
73 mmr_unlock(WKUP_CTRL_MMR0_BASE, 3);
74 mmr_unlock(WKUP_CTRL_MMR0_BASE, 4);
75 mmr_unlock(WKUP_CTRL_MMR0_BASE, 6);
76 mmr_unlock(WKUP_CTRL_MMR0_BASE, 7);
77
78 /* Unlock all MCU_CTRL_MMR0 module registers */
79 mmr_unlock(MCU_CTRL_MMR0_BASE, 0);
80 mmr_unlock(MCU_CTRL_MMR0_BASE, 1);
81 mmr_unlock(MCU_CTRL_MMR0_BASE, 2);
82 mmr_unlock(MCU_CTRL_MMR0_BASE, 3);
83 mmr_unlock(MCU_CTRL_MMR0_BASE, 4);
84
85 /* Unlock all CTRL_MMR0 module registers */
86 mmr_unlock(CTRL_MMR0_BASE, 0);
87 mmr_unlock(CTRL_MMR0_BASE, 1);
88 mmr_unlock(CTRL_MMR0_BASE, 2);
89 mmr_unlock(CTRL_MMR0_BASE, 3);
Andreas Dannenberg660aa462019-06-13 10:29:44 +053090 mmr_unlock(CTRL_MMR0_BASE, 5);
Lokesh Vutlad5bc6862020-08-05 22:44:20 +053091 if (soc_is_j721e())
92 mmr_unlock(CTRL_MMR0_BASE, 6);
Andreas Dannenberg660aa462019-06-13 10:29:44 +053093 mmr_unlock(CTRL_MMR0_BASE, 7);
94}
95
Faiz Abbas68393212020-02-26 13:44:36 +053096#if defined(CONFIG_K3_LOAD_SYSFW)
97void k3_mmc_stop_clock(void)
98{
99 if (spl_boot_device() == BOOT_DEVICE_MMC1) {
100 struct mmc *mmc = find_mmc_device(0);
101
102 if (!mmc)
103 return;
104
105 mmc->saved_clock = mmc->clock;
106 mmc_set_clock(mmc, 0, true);
107 }
108}
109
110void k3_mmc_restart_clock(void)
111{
112 if (spl_boot_device() == BOOT_DEVICE_MMC1) {
113 struct mmc *mmc = find_mmc_device(0);
114
115 if (!mmc)
116 return;
117
118 mmc_set_clock(mmc, mmc->saved_clock, false);
119 }
120}
121#endif
122
Andreas Dannenbergb8267412019-06-13 10:29:45 +0530123/*
124 * This uninitialized global variable would normal end up in the .bss section,
125 * but the .bss is cleared between writing and reading this variable, so move
126 * it to the .data section.
127 */
128u32 bootindex __attribute__((section(".data")));
Lokesh Vutla8e7bd012020-08-05 22:44:22 +0530129static struct rom_extended_boot_data bootdata __section(.data);
Andreas Dannenbergb8267412019-06-13 10:29:45 +0530130
Lokesh Vutla8e7bd012020-08-05 22:44:22 +0530131static void store_boot_info_from_rom(void)
Andreas Dannenbergb8267412019-06-13 10:29:45 +0530132{
133 bootindex = *(u32 *)(CONFIG_SYS_K3_BOOT_PARAM_TABLE_INDEX);
Lokesh Vutla8e7bd012020-08-05 22:44:22 +0530134 memcpy(&bootdata, (uintptr_t *)ROM_ENTENDED_BOOT_DATA_INFO,
135 sizeof(struct rom_extended_boot_data));
Andreas Dannenbergb8267412019-06-13 10:29:45 +0530136}
137
Lokesh Vutlaa2285322019-06-13 10:29:42 +0530138void board_init_f(ulong dummy)
139{
Lokesh Vutlaedfb5de2019-10-07 19:26:38 +0530140#if defined(CONFIG_K3_J721E_DDRSS) || defined(CONFIG_K3_LOAD_SYSFW)
Andreas Dannenberg5e1782c2019-06-13 10:29:47 +0530141 struct udevice *dev;
142 int ret;
143#endif
Lokesh Vutlaa2285322019-06-13 10:29:42 +0530144 /*
Andreas Dannenbergb8267412019-06-13 10:29:45 +0530145 * Cannot delay this further as there is a chance that
146 * K3_BOOT_PARAM_TABLE_INDEX can be over written by SPL MALLOC section.
Lokesh Vutlaa2285322019-06-13 10:29:42 +0530147 */
Lokesh Vutla8e7bd012020-08-05 22:44:22 +0530148 store_boot_info_from_rom();
Lokesh Vutlaa2285322019-06-13 10:29:42 +0530149
Andreas Dannenberg660aa462019-06-13 10:29:44 +0530150 /* Make all control module registers accessible */
151 ctrl_mmr_unlock();
152
Lokesh Vutlaa2285322019-06-13 10:29:42 +0530153#ifdef CONFIG_CPU_V7R
Lokesh Vutla5fbd6fe2019-12-31 15:49:55 +0530154 disable_linefill_optimization();
Lokesh Vutlaa2285322019-06-13 10:29:42 +0530155 setup_k3_mpu_regions();
156#endif
157
158 /* Init DM early */
159 spl_early_init();
160
Andreas Dannenberg5e1782c2019-06-13 10:29:47 +0530161#ifdef CONFIG_K3_LOAD_SYSFW
162 /*
163 * Process pinctrl for the serial0 a.k.a. MCU_UART0 module and continue
164 * regardless of the result of pinctrl. Do this without probing the
165 * device, but instead by searching the device that would request the
166 * given sequence number if probed. The UART will be used by the system
167 * firmware (SYSFW) image for various purposes and SYSFW depends on us
168 * to initialize its pin settings.
169 */
170 ret = uclass_find_device_by_seq(UCLASS_SERIAL, 0, true, &dev);
171 if (!ret)
172 pinctrl_select_state(dev, "default");
173
174 /*
175 * Load, start up, and configure system controller firmware. Provide
176 * the U-Boot console init function to the SYSFW post-PM configuration
177 * callback hook, effectively switching on (or over) the console
178 * output.
179 */
Lokesh Vutla8be6bbf2020-08-05 22:44:23 +0530180 k3_sysfw_loader(is_rom_loaded_sysfw(&bootdata),
181 k3_mmc_stop_clock, k3_mmc_restart_clock);
Faiz Abbas68393212020-02-26 13:44:36 +0530182
183 /* Prepare console output */
184 preloader_console_init();
Andrew F. Davisf0bcb662020-01-10 14:35:21 -0500185
186 /* Disable ROM configured firewalls right after loading sysfw */
187#ifdef CONFIG_TI_SECURE_DEVICE
188 remove_fwl_configs(cbass_hc_cfg0_fwls, ARRAY_SIZE(cbass_hc_cfg0_fwls));
189 remove_fwl_configs(cbass_hc0_fwls, ARRAY_SIZE(cbass_hc0_fwls));
190 remove_fwl_configs(cbass_rc_cfg0_fwls, ARRAY_SIZE(cbass_rc_cfg0_fwls));
191 remove_fwl_configs(cbass_rc0_fwls, ARRAY_SIZE(cbass_rc0_fwls));
192 remove_fwl_configs(infra_cbass0_fwls, ARRAY_SIZE(infra_cbass0_fwls));
193 remove_fwl_configs(mcu_cbass0_fwls, ARRAY_SIZE(mcu_cbass0_fwls));
194 remove_fwl_configs(wkup_cbass0_fwls, ARRAY_SIZE(wkup_cbass0_fwls));
195#endif
Andreas Dannenberg5e1782c2019-06-13 10:29:47 +0530196#else
Lokesh Vutlaa2285322019-06-13 10:29:42 +0530197 /* Prepare console output */
198 preloader_console_init();
Andreas Dannenberg5e1782c2019-06-13 10:29:47 +0530199#endif
Lokesh Vutlaedfb5de2019-10-07 19:26:38 +0530200
Lokesh Vutla5fafe442020-03-10 16:50:58 +0530201 /* Output System Firmware version info */
202 k3_sysfw_print_ver();
203
Andreas Dannenbergd036a212020-01-07 13:15:54 +0530204 /* Perform EEPROM-based board detection */
Lokesh Vutla5a08e652020-08-05 22:44:14 +0530205 if (IS_ENABLED(CONFIG_TI_I2C_BOARD_DETECT))
206 do_board_detect();
Andreas Dannenbergd036a212020-01-07 13:15:54 +0530207
Keerthy0b01f662019-10-24 15:00:53 +0530208#if defined(CONFIG_CPU_V7R) && defined(CONFIG_K3_AVS0)
209 ret = uclass_get_device_by_driver(UCLASS_MISC, DM_GET_DRIVER(k3_avs),
210 &dev);
211 if (ret)
212 printf("AVS init failed: %d\n", ret);
213#endif
214
Lokesh Vutlaedfb5de2019-10-07 19:26:38 +0530215#if defined(CONFIG_K3_J721E_DDRSS)
216 ret = uclass_get_device(UCLASS_RAM, 0, &dev);
217 if (ret)
218 panic("DRAM init failed: %d\n", ret);
219#endif
Jan Kiszka7ce99f72020-05-18 07:57:22 +0200220 spl_enable_dcache();
Lokesh Vutlaa2285322019-06-13 10:29:42 +0530221}
Lokesh Vutla6edde292019-06-13 10:29:43 +0530222
Harald Seiler0bf7ab12020-04-15 11:33:30 +0200223u32 spl_mmc_boot_mode(const u32 boot_device)
Lokesh Vutla6edde292019-06-13 10:29:43 +0530224{
225 switch (boot_device) {
226 case BOOT_DEVICE_MMC1:
227 return MMCSD_MODE_EMMCBOOT;
228 case BOOT_DEVICE_MMC2:
229 return MMCSD_MODE_FS;
230 default:
231 return MMCSD_MODE_RAW;
232 }
233}
234
Andreas Dannenbergee0f5e62020-05-16 21:05:01 +0530235static u32 __get_backup_bootmedia(u32 main_devstat)
236{
237 u32 bkup_boot = (main_devstat & MAIN_DEVSTAT_BKUP_BOOTMODE_MASK) >>
238 MAIN_DEVSTAT_BKUP_BOOTMODE_SHIFT;
239
240 switch (bkup_boot) {
241 case BACKUP_BOOT_DEVICE_USB:
242 return BOOT_DEVICE_DFU;
243 case BACKUP_BOOT_DEVICE_UART:
244 return BOOT_DEVICE_UART;
245 case BACKUP_BOOT_DEVICE_ETHERNET:
246 return BOOT_DEVICE_ETHERNET;
247 case BACKUP_BOOT_DEVICE_MMC2:
248 {
249 u32 port = (main_devstat & MAIN_DEVSTAT_BKUP_MMC_PORT_MASK) >>
250 MAIN_DEVSTAT_BKUP_MMC_PORT_SHIFT;
251 if (port == 0x0)
252 return BOOT_DEVICE_MMC1;
253 return BOOT_DEVICE_MMC2;
254 }
255 case BACKUP_BOOT_DEVICE_SPI:
256 return BOOT_DEVICE_SPI;
257 case BACKUP_BOOT_DEVICE_I2C:
258 return BOOT_DEVICE_I2C;
259 }
260
261 return BOOT_DEVICE_RAM;
262}
263
Lokesh Vutla6edde292019-06-13 10:29:43 +0530264static u32 __get_primary_bootmedia(u32 main_devstat, u32 wkup_devstat)
265{
266
267 u32 bootmode = (wkup_devstat & WKUP_DEVSTAT_PRIMARY_BOOTMODE_MASK) >>
268 WKUP_DEVSTAT_PRIMARY_BOOTMODE_SHIFT;
269
270 bootmode |= (main_devstat & MAIN_DEVSTAT_BOOT_MODE_B_MASK) <<
271 BOOT_MODE_B_SHIFT;
272
273 if (bootmode == BOOT_DEVICE_OSPI || bootmode == BOOT_DEVICE_QSPI)
274 bootmode = BOOT_DEVICE_SPI;
275
276 if (bootmode == BOOT_DEVICE_MMC2) {
277 u32 port = (main_devstat &
278 MAIN_DEVSTAT_PRIM_BOOTMODE_MMC_PORT_MASK) >>
279 MAIN_DEVSTAT_PRIM_BOOTMODE_PORT_SHIFT;
280 if (port == 0x0)
281 bootmode = BOOT_DEVICE_MMC1;
282 }
283
284 return bootmode;
285}
286
287u32 spl_boot_device(void)
288{
289 u32 wkup_devstat = readl(CTRLMMR_WKUP_DEVSTAT);
290 u32 main_devstat;
291
292 if (wkup_devstat & WKUP_DEVSTAT_MCU_OMLY_MASK) {
293 printf("ERROR: MCU only boot is not yet supported\n");
294 return BOOT_DEVICE_RAM;
295 }
296
297 /* MAIN CTRL MMR can only be read if MCU ONLY is 0 */
298 main_devstat = readl(CTRLMMR_MAIN_DEVSTAT);
299
Andreas Dannenbergee0f5e62020-05-16 21:05:01 +0530300 if (bootindex == K3_PRIMARY_BOOTMODE)
301 return __get_primary_bootmedia(main_devstat, wkup_devstat);
302 else
303 return __get_backup_bootmedia(main_devstat);
Lokesh Vutla6edde292019-06-13 10:29:43 +0530304}
Lokesh Vutlaa2285322019-06-13 10:29:42 +0530305#endif
Lokesh Vutla96c11f42019-06-13 10:29:46 +0530306
307#ifdef CONFIG_SYS_K3_SPL_ATF
308
309#define J721E_DEV_MCU_RTI0 262
310#define J721E_DEV_MCU_RTI1 263
311#define J721E_DEV_MCU_ARMSS0_CPU0 250
312#define J721E_DEV_MCU_ARMSS0_CPU1 251
313
314void release_resources_for_core_shutdown(void)
315{
316 struct ti_sci_handle *ti_sci;
317 struct ti_sci_dev_ops *dev_ops;
318 struct ti_sci_proc_ops *proc_ops;
319 int ret;
320 u32 i;
321
322 const u32 put_device_ids[] = {
323 J721E_DEV_MCU_RTI0,
324 J721E_DEV_MCU_RTI1,
325 };
326
327 ti_sci = get_ti_sci_handle();
328 dev_ops = &ti_sci->ops.dev_ops;
329 proc_ops = &ti_sci->ops.proc_ops;
330
331 /* Iterate through list of devices to put (shutdown) */
332 for (i = 0; i < ARRAY_SIZE(put_device_ids); i++) {
333 u32 id = put_device_ids[i];
334
335 ret = dev_ops->put_device(ti_sci, id);
336 if (ret)
337 panic("Failed to put device %u (%d)\n", id, ret);
338 }
339
340 const u32 put_core_ids[] = {
341 J721E_DEV_MCU_ARMSS0_CPU1,
342 J721E_DEV_MCU_ARMSS0_CPU0, /* Handle CPU0 after CPU1 */
343 };
344
345 /* Iterate through list of cores to put (shutdown) */
346 for (i = 0; i < ARRAY_SIZE(put_core_ids); i++) {
347 u32 id = put_core_ids[i];
348
349 /*
350 * Queue up the core shutdown request. Note that this call
351 * needs to be followed up by an actual invocation of an WFE
352 * or WFI CPU instruction.
353 */
354 ret = proc_ops->proc_shutdown_no_wait(ti_sci, id);
355 if (ret)
356 panic("Failed sending core %u shutdown message (%d)\n",
357 id, ret);
358 }
359}
360#endif
Keerthy7007adc2020-02-12 13:55:04 +0530361
362#ifdef CONFIG_SYS_K3_SPL_ATF
363void start_non_linux_remote_cores(void)
364{
365 int size = 0, ret;
366 u32 loadaddr = 0;
367
Lokesh Vutla65549942020-08-05 22:44:19 +0530368 if (!soc_is_j721e())
369 return;
370
Keerthy7007adc2020-02-12 13:55:04 +0530371 size = load_firmware("name_mainr5f0_0fw", "addr_mainr5f0_0load",
372 &loadaddr);
373 if (size <= 0)
374 goto err_load;
375
376 /* assuming remoteproc 2 is aliased for the needed remotecore */
377 ret = rproc_load(2, loadaddr, size);
378 if (ret) {
379 printf("Firmware failed to start on rproc (%d)\n", ret);
380 goto err_load;
381 }
382
383 ret = rproc_start(2);
384 if (ret) {
385 printf("Firmware init failed on rproc (%d)\n", ret);
386 goto err_load;
387 }
388
389 printf("Remoteproc 2 started successfully\n");
390
391 return;
392
393err_load:
394 rproc_reset(2);
Lokesh Vutlaa2285322019-06-13 10:29:42 +0530395}
396#endif