xref: /arm-trusted-firmware/plat/qti/msm8916/msm8916_config.c (revision 91f16700b400a8c0651d24a598fc48ee2997a0d7)
1*91f16700Schasinglulu /*
2*91f16700Schasinglulu  * Copyright (c) 2021-2023, Stephan Gerhold <stephan@gerhold.net>
3*91f16700Schasinglulu  *
4*91f16700Schasinglulu  * SPDX-License-Identifier: BSD-3-Clause
5*91f16700Schasinglulu  */
6*91f16700Schasinglulu 
7*91f16700Schasinglulu #include <assert.h>
8*91f16700Schasinglulu 
9*91f16700Schasinglulu #include <arch.h>
10*91f16700Schasinglulu #include <drivers/arm/cci.h>
11*91f16700Schasinglulu #include <lib/mmio.h>
12*91f16700Schasinglulu 
13*91f16700Schasinglulu #include "msm8916_config.h"
14*91f16700Schasinglulu #include "msm8916_gicv2.h"
15*91f16700Schasinglulu #include <msm8916_mmap.h>
16*91f16700Schasinglulu #include <platform_def.h>
17*91f16700Schasinglulu 
18*91f16700Schasinglulu static const int cci_map[] = { 3, 4 };
19*91f16700Schasinglulu 
20*91f16700Schasinglulu void msm8916_configure_early(void)
21*91f16700Schasinglulu {
22*91f16700Schasinglulu 	if (PLATFORM_CLUSTER_COUNT > 1) {
23*91f16700Schasinglulu 		cci_init(APCS_CCI_BASE, cci_map, ARRAY_SIZE(cci_map));
24*91f16700Schasinglulu 		cci_enable_snoop_dvm_reqs(MPIDR_AFFLVL1_VAL(read_mpidr_el1()));
25*91f16700Schasinglulu 	}
26*91f16700Schasinglulu }
27*91f16700Schasinglulu 
28*91f16700Schasinglulu static void msm8916_configure_timer(uintptr_t base)
29*91f16700Schasinglulu {
30*91f16700Schasinglulu 	/* Set timer frequency */
31*91f16700Schasinglulu 	mmio_write_32(base + CNTCTLBASE_CNTFRQ, PLAT_SYSCNT_FREQ);
32*91f16700Schasinglulu 
33*91f16700Schasinglulu 	/* Make all timer frames available to non-secure world */
34*91f16700Schasinglulu 	mmio_write_32(base + CNTNSAR, GENMASK_32(7, 0));
35*91f16700Schasinglulu }
36*91f16700Schasinglulu 
37*91f16700Schasinglulu /*
38*91f16700Schasinglulu  * The APCS register regions always start with a SECURE register that should
39*91f16700Schasinglulu  * be cleared to 0 to only allow secure access. Since BL31 handles most of
40*91f16700Schasinglulu  * the CPU power management, most of them can be cleared to secure access only.
41*91f16700Schasinglulu  */
42*91f16700Schasinglulu #define APCS_GLB_SECURE_STS_NS		BIT_32(0)
43*91f16700Schasinglulu #define APCS_GLB_SECURE_PWR_NS		BIT_32(1)
44*91f16700Schasinglulu #if PLATFORM_CORE_COUNT > 1
45*91f16700Schasinglulu #define APCS_BOOT_START_ADDR_SEC	0x04
46*91f16700Schasinglulu #define APCS_AA64NAA32_REG		0x0c
47*91f16700Schasinglulu #else
48*91f16700Schasinglulu #define APCS_BOOT_START_ADDR_SEC	0x18
49*91f16700Schasinglulu #endif
50*91f16700Schasinglulu #define REMAP_EN			BIT_32(0)
51*91f16700Schasinglulu 
52*91f16700Schasinglulu static void msm8916_configure_apcs_cluster(unsigned int cluster)
53*91f16700Schasinglulu {
54*91f16700Schasinglulu 	uintptr_t cfg = APCS_CFG(cluster);
55*91f16700Schasinglulu 	unsigned int cpu;
56*91f16700Schasinglulu 
57*91f16700Schasinglulu 	/* Disallow non-secure access to boot remapper / TCM registers */
58*91f16700Schasinglulu 	mmio_write_32(cfg, 0);
59*91f16700Schasinglulu 
60*91f16700Schasinglulu 	/*
61*91f16700Schasinglulu 	 * Disallow non-secure access to power management registers.
62*91f16700Schasinglulu 	 * However, allow STS and PWR since those also seem to control access
63*91f16700Schasinglulu 	 * to CPU frequency related registers (e.g. APCS_CMD_RCGR). If these
64*91f16700Schasinglulu 	 * bits are not set, CPU frequency control fails in the non-secure world.
65*91f16700Schasinglulu 	 */
66*91f16700Schasinglulu 	mmio_write_32(APCS_GLB(cluster),
67*91f16700Schasinglulu 		      APCS_GLB_SECURE_STS_NS | APCS_GLB_SECURE_PWR_NS);
68*91f16700Schasinglulu 
69*91f16700Schasinglulu 	if (PLATFORM_CORE_COUNT > 1) {
70*91f16700Schasinglulu 		/* Disallow non-secure access to L2 SAW2 */
71*91f16700Schasinglulu 		mmio_write_32(APCS_L2_SAW2(cluster), 0);
72*91f16700Schasinglulu 
73*91f16700Schasinglulu 		/* Disallow non-secure access to CPU ACS and SAW2 */
74*91f16700Schasinglulu 		for (cpu = 0; cpu < PLATFORM_CPUS_PER_CLUSTER; cpu++) {
75*91f16700Schasinglulu 			mmio_write_32(APCS_ALIAS_ACS(cluster, cpu), 0);
76*91f16700Schasinglulu 			mmio_write_32(APCS_ALIAS_SAW2(cluster, cpu), 0);
77*91f16700Schasinglulu 		}
78*91f16700Schasinglulu 	} else {
79*91f16700Schasinglulu 		/* There is just one core so no aliases exist */
80*91f16700Schasinglulu 		mmio_write_32(APCS_BANKED_ACS, 0);
81*91f16700Schasinglulu 		mmio_write_32(APCS_BANKED_SAW2, 0);
82*91f16700Schasinglulu 	}
83*91f16700Schasinglulu 
84*91f16700Schasinglulu #ifdef __aarch64__
85*91f16700Schasinglulu 	/* Make sure all further warm boots end up in BL31 and aarch64 state */
86*91f16700Schasinglulu 	CASSERT((BL31_BASE & 0xffff) == 0, assert_bl31_base_64k_aligned);
87*91f16700Schasinglulu 	mmio_write_32(cfg + APCS_BOOT_START_ADDR_SEC, BL31_BASE | REMAP_EN);
88*91f16700Schasinglulu 	mmio_write_32(cfg + APCS_AA64NAA32_REG, 1);
89*91f16700Schasinglulu #else
90*91f16700Schasinglulu 	/* Make sure all further warm boots end up in BL32 */
91*91f16700Schasinglulu 	CASSERT((BL32_BASE & 0xffff) == 0, assert_bl32_base_64k_aligned);
92*91f16700Schasinglulu 	mmio_write_32(cfg + APCS_BOOT_START_ADDR_SEC, BL32_BASE | REMAP_EN);
93*91f16700Schasinglulu #endif
94*91f16700Schasinglulu 
95*91f16700Schasinglulu 	msm8916_configure_timer(APCS_QTMR(cluster));
96*91f16700Schasinglulu }
97*91f16700Schasinglulu 
98*91f16700Schasinglulu static void msm8916_configure_apcs(void)
99*91f16700Schasinglulu {
100*91f16700Schasinglulu 	unsigned int cluster;
101*91f16700Schasinglulu 
102*91f16700Schasinglulu 	for (cluster = 0; cluster < PLATFORM_CLUSTER_COUNT; cluster++) {
103*91f16700Schasinglulu 		msm8916_configure_apcs_cluster(cluster);
104*91f16700Schasinglulu 	}
105*91f16700Schasinglulu 
106*91f16700Schasinglulu 	if (PLATFORM_CLUSTER_COUNT > 1) {
107*91f16700Schasinglulu 		/* Disallow non-secure access to CCI ACS and SAW2 */
108*91f16700Schasinglulu 		mmio_write_32(APCS_CCI_ACS, 0);
109*91f16700Schasinglulu 		mmio_write_32(APCS_CCI_SAW2, 0);
110*91f16700Schasinglulu 	}
111*91f16700Schasinglulu }
112*91f16700Schasinglulu 
113*91f16700Schasinglulu /*
114*91f16700Schasinglulu  * MSM8916 has a special "interrupt aggregation logic" in the APPS SMMU,
115*91f16700Schasinglulu  * which allows routing context bank interrupts to one of 3 interrupt numbers
116*91f16700Schasinglulu  * ("TZ/HYP/NS"). Route all interrupts to the non-secure interrupt number
117*91f16700Schasinglulu  * by default to avoid special setup on the non-secure side.
118*91f16700Schasinglulu  */
119*91f16700Schasinglulu #define CLK_OFF					BIT_32(31)
120*91f16700Schasinglulu #define GCC_APSS_TCU_CBCR			(GCC_BASE + 0x12018)
121*91f16700Schasinglulu #define GCC_GFX_TCU_CBCR			(GCC_BASE + 0x12020)
122*91f16700Schasinglulu #define GCC_SMMU_CFG_CBCR			(GCC_BASE + 0x12038)
123*91f16700Schasinglulu #define GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE	(GCC_BASE + 0x3600c)
124*91f16700Schasinglulu #define GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE	(GCC_BASE + 0x4500c)
125*91f16700Schasinglulu #define APSS_TCU_CLK_ENA			BIT_32(1)
126*91f16700Schasinglulu #define GFX_TCU_CLK_ENA				BIT_32(2)
127*91f16700Schasinglulu #define GFX_TBU_CLK_ENA				BIT_32(3)
128*91f16700Schasinglulu #define SMMU_CFG_CLK_ENA			BIT_32(12)
129*91f16700Schasinglulu #define APPS_SMMU_INTR_SEL_NS			(APPS_SMMU_QCOM + 0x2000)
130*91f16700Schasinglulu #define APPS_SMMU_INTR_SEL_NS_EN_ALL		U(0xffffffff)
131*91f16700Schasinglulu 
132*91f16700Schasinglulu #define SMMU_SACR				0x010
133*91f16700Schasinglulu #define SMMU_SACR_CACHE_LOCK			BIT_32(26)
134*91f16700Schasinglulu #define SMMU_IDR7				0x03c
135*91f16700Schasinglulu #define SMMU_IDR7_MINOR(val)			(((val) >> 0) & 0xf)
136*91f16700Schasinglulu #define SMMU_IDR7_MAJOR(val)			(((val) >> 4) & 0xf)
137*91f16700Schasinglulu 
138*91f16700Schasinglulu static void msm8916_smmu_cache_unlock(uintptr_t smmu_base, uintptr_t clk_cbcr)
139*91f16700Schasinglulu {
140*91f16700Schasinglulu 	uint32_t version;
141*91f16700Schasinglulu 
142*91f16700Schasinglulu 	/* Wait for clock */
143*91f16700Schasinglulu 	while (mmio_read_32(clk_cbcr) & CLK_OFF) {
144*91f16700Schasinglulu 	}
145*91f16700Schasinglulu 
146*91f16700Schasinglulu 	version = mmio_read_32(smmu_base + SMMU_IDR7);
147*91f16700Schasinglulu 	VERBOSE("SMMU(0x%lx) r%dp%d\n", smmu_base,
148*91f16700Schasinglulu 		SMMU_IDR7_MAJOR(version), SMMU_IDR7_MINOR(version));
149*91f16700Schasinglulu 
150*91f16700Schasinglulu 	/* For SMMU r2p0+ clear CACHE_LOCK to allow writes to CBn_ACTLR */
151*91f16700Schasinglulu 	if (SMMU_IDR7_MAJOR(version) >= 2) {
152*91f16700Schasinglulu 		mmio_clrbits_32(smmu_base + SMMU_SACR, SMMU_SACR_CACHE_LOCK);
153*91f16700Schasinglulu 	}
154*91f16700Schasinglulu }
155*91f16700Schasinglulu 
156*91f16700Schasinglulu static void msm8916_configure_smmu(void)
157*91f16700Schasinglulu {
158*91f16700Schasinglulu 	uint32_t ena_bits = APSS_TCU_CLK_ENA | SMMU_CFG_CLK_ENA;
159*91f16700Schasinglulu 
160*91f16700Schasinglulu 	/* Single core (MDM) platforms do not have a GPU */
161*91f16700Schasinglulu 	if (PLATFORM_CORE_COUNT > 1) {
162*91f16700Schasinglulu 		ena_bits |= GFX_TCU_CLK_ENA | GFX_TBU_CLK_ENA;
163*91f16700Schasinglulu 	}
164*91f16700Schasinglulu 
165*91f16700Schasinglulu 	/* Enable SMMU clocks to enable register access */
166*91f16700Schasinglulu 	mmio_write_32(GCC_APCS_SMMU_CLOCK_BRANCH_ENA_VOTE, ena_bits);
167*91f16700Schasinglulu 
168*91f16700Schasinglulu 	/* Wait for configuration clock */
169*91f16700Schasinglulu 	while (mmio_read_32(GCC_SMMU_CFG_CBCR) & CLK_OFF) {
170*91f16700Schasinglulu 	}
171*91f16700Schasinglulu 
172*91f16700Schasinglulu 	/* Route all context bank interrupts to non-secure interrupt */
173*91f16700Schasinglulu 	mmio_write_32(APPS_SMMU_INTR_SEL_NS, APPS_SMMU_INTR_SEL_NS_EN_ALL);
174*91f16700Schasinglulu 
175*91f16700Schasinglulu 	/* Clear sACR.CACHE_LOCK bit if needed for MMU-500 r2p0+ */
176*91f16700Schasinglulu 	msm8916_smmu_cache_unlock(APPS_SMMU_BASE, GCC_APSS_TCU_CBCR);
177*91f16700Schasinglulu 	if (PLATFORM_CORE_COUNT > 1) {
178*91f16700Schasinglulu 		msm8916_smmu_cache_unlock(GPU_SMMU_BASE, GCC_GFX_TCU_CBCR);
179*91f16700Schasinglulu 	}
180*91f16700Schasinglulu 
181*91f16700Schasinglulu 	/*
182*91f16700Schasinglulu 	 * Keep APCS vote for SMMU clocks for rest of booting process, but make
183*91f16700Schasinglulu 	 * sure other vote registers (such as RPM) do not keep permanent votes.
184*91f16700Schasinglulu 	 */
185*91f16700Schasinglulu 	VERBOSE("Clearing GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE (was: 0x%x)\n",
186*91f16700Schasinglulu 		mmio_read_32(GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE));
187*91f16700Schasinglulu 	mmio_write_32(GCC_RPM_SMMU_CLOCK_BRANCH_ENA_VOTE, 0);
188*91f16700Schasinglulu }
189*91f16700Schasinglulu 
190*91f16700Schasinglulu void msm8916_configure(void)
191*91f16700Schasinglulu {
192*91f16700Schasinglulu 	msm8916_gicv2_configure();
193*91f16700Schasinglulu 	msm8916_configure_apcs();
194*91f16700Schasinglulu 	msm8916_configure_smmu();
195*91f16700Schasinglulu }
196