mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-23 21:44:15 +00:00
Merge changes from topic "mp/delete_platforms" into integration
* changes: refactor(mt6795): remove mediatek's mt6795 platform refactor(sgm775): remove Arm sgm775 platform
This commit is contained in:
commit
d6fbcc57f9
43 changed files with 0 additions and 3409 deletions
|
@ -1,21 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <common/tbbr/tbbr_img_def.h>
|
||||
|
||||
/dts-v1/;
|
||||
|
||||
/ {
|
||||
dtb-registry {
|
||||
compatible = "fconf,dyn_cfg-dtb_registry";
|
||||
|
||||
tb_fw-config {
|
||||
load-address = <0x0 0x4001300>;
|
||||
max-size = <0x200>;
|
||||
id = <TB_FW_CONFIG_ID>;
|
||||
};
|
||||
};
|
||||
};
|
|
@ -1,28 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2020, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
/dts-v1/;
|
||||
|
||||
/ {
|
||||
tb_fw-config {
|
||||
compatible = "arm,tb_fw";
|
||||
|
||||
/* Disable authentication for development */
|
||||
disable_auth = <0x0>;
|
||||
|
||||
/*
|
||||
* The following two entries are placeholders for Mbed TLS
|
||||
* heap information. The default values don't matter since
|
||||
* they will be overwritten by BL1.
|
||||
* In case of having shared Mbed TLS heap between BL1 and BL2,
|
||||
* BL1 will populate these two properties with the respective
|
||||
* info about the shared heap. This info will be available for
|
||||
* BL2 in order to locate and re-use the heap.
|
||||
*/
|
||||
mbedtls_heap_addr = <0x0 0x0>;
|
||||
mbedtls_heap_size = <0x0>;
|
||||
};
|
||||
};
|
|
@ -1,29 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#ifndef PLATFORM_DEF_H
|
||||
#define PLATFORM_DEF_H
|
||||
|
||||
#include <sgm_base_platform_def.h>
|
||||
|
||||
#define PLAT_MAX_CPUS_PER_CLUSTER U(8)
|
||||
#define PLAT_MAX_PE_PER_CPU U(1)
|
||||
|
||||
#define PLAT_ARM_DRAM2_BASE ULL(0x880000000)
|
||||
#define PLAT_ARM_DRAM2_SIZE ULL(0x180000000)
|
||||
|
||||
/*
|
||||
* Physical and virtual address space limits for MMU in AARCH64 & AARCH32 modes
|
||||
*/
|
||||
#ifdef __aarch64__
|
||||
#define PLAT_PHY_ADDR_SPACE_SIZE (1ULL << 36)
|
||||
#define PLAT_VIRT_ADDR_SPACE_SIZE (1ULL << 36)
|
||||
#else
|
||||
#define PLAT_PHY_ADDR_SPACE_SIZE (1ULL << 32)
|
||||
#define PLAT_VIRT_ADDR_SPACE_SIZE (1ULL << 32)
|
||||
#endif
|
||||
|
||||
#endif /* PLATFORM_DEF_H */
|
|
@ -1,39 +0,0 @@
|
|||
#
|
||||
# Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved.
|
||||
#
|
||||
# SPDX-License-Identifier: BSD-3-Clause
|
||||
#
|
||||
|
||||
$(warning Platform ${PLAT} is deprecated. Some of the features might not work as expected)
|
||||
|
||||
include plat/arm/css/sgm/sgm-common.mk
|
||||
|
||||
SGM775_BASE= plat/arm/board/sgm775
|
||||
|
||||
# Add the FDT_SOURCES and options for Dynamic Config
|
||||
FDT_SOURCES += ${SGM775_BASE}/fdts/${PLAT}_fw_config.dts \
|
||||
${SGM775_BASE}/fdts/${PLAT}_tb_fw_config.dts
|
||||
FW_CONFIG := ${BUILD_PLAT}/fdts/${PLAT}_fw_config.dtb
|
||||
TB_FW_CONFIG := ${BUILD_PLAT}/fdts/${PLAT}_tb_fw_config.dtb
|
||||
|
||||
# Add the FW_CONFIG to FIP and specify the same to certtool
|
||||
$(eval $(call TOOL_ADD_PAYLOAD,${FW_CONFIG},--fw-config,${FW_CONFIG}))
|
||||
# Add the TB_FW_CONFIG to FIP and specify the same to certtool
|
||||
$(eval $(call TOOL_ADD_PAYLOAD,${TB_FW_CONFIG},--tb-fw-config,${TB_FW_CONFIG}))
|
||||
|
||||
PLAT_INCLUDES +=-I${SGM775_BASE}/include/
|
||||
|
||||
BL1_SOURCES += ${SGM775_BASE}/sgm775_err.c
|
||||
|
||||
BL2_SOURCES += lib/utils/mem_region.c \
|
||||
${SGM775_BASE}/sgm775_err.c \
|
||||
plat/arm/common/arm_nor_psci_mem_protect.c
|
||||
|
||||
BL31_SOURCES += drivers/cfi/v2m/v2m_flash.c \
|
||||
lib/utils/mem_region.c \
|
||||
plat/arm/common/arm_nor_psci_mem_protect.c
|
||||
|
||||
ifeq (${TRUSTED_BOARD_BOOT}, 1)
|
||||
BL1_SOURCES += ${SGM775_BASE}/sgm775_trusted_boot.c
|
||||
BL2_SOURCES += ${SGM775_BASE}/sgm775_trusted_boot.c
|
||||
endif
|
|
@ -1,17 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2019-2020, Arm Limited. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <plat/arm/common/plat_arm.h>
|
||||
|
||||
/*
|
||||
* sgm775 error handler
|
||||
*/
|
||||
void __dead2 plat_arm_error_handler(int err)
|
||||
{
|
||||
while (true) {
|
||||
wfi();
|
||||
}
|
||||
}
|
|
@ -1,26 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2020, Arm Limited. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <plat/arm/common/plat_arm.h>
|
||||
|
||||
/*
|
||||
* Return the ROTPK hash in the following ASN.1 structure in DER format:
|
||||
*
|
||||
* AlgorithmIdentifier ::= SEQUENCE {
|
||||
* algorithm OBJECT IDENTIFIER,
|
||||
* parameters ANY DEFINED BY algorithm OPTIONAL
|
||||
* }
|
||||
*
|
||||
* DigestInfo ::= SEQUENCE {
|
||||
* digestAlgorithm AlgorithmIdentifier,
|
||||
* digest OCTET STRING
|
||||
* }
|
||||
*/
|
||||
int plat_get_rotpk_info(void *cookie, void **key_ptr, unsigned int *key_len,
|
||||
unsigned int *flags)
|
||||
{
|
||||
return arm_get_rotpk_info(cookie, key_ptr, key_len, flags);
|
||||
}
|
|
@ -1,7 +0,0 @@
|
|||
#
|
||||
# Copyright (c) 2019, ARM Limited and Contributors. All rights reserved.
|
||||
#
|
||||
# SPDX-License-Identifier: BSD-3-Clause
|
||||
#
|
||||
|
||||
include plat/arm/css/sgm/tsp/tsp-sgm.mk
|
|
@ -1,82 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <arch.h>
|
||||
#include <asm_macros.S>
|
||||
#include <platform_def.h>
|
||||
#include <cortex_a75.h>
|
||||
#include <cortex_a55.h>
|
||||
#include <cpu_macros.S>
|
||||
|
||||
.globl plat_arm_calc_core_pos
|
||||
.globl plat_reset_handler
|
||||
|
||||
/* ---------------------------------------------------------------------
|
||||
* unsigned int plat_arm_calc_core_pos(u_register_t mpidr)
|
||||
*
|
||||
* Function to calculate the core position on FVP.
|
||||
*
|
||||
* (ClusterId * MAX_CPUS_PER_CLUSTER * MAX_PE_PER_CPU) +
|
||||
* (CPUId * MAX_PE_PER_CPU) +
|
||||
* ThreadId
|
||||
*
|
||||
* which can be simplified as:
|
||||
*
|
||||
* ((ClusterId * MAX_CPUS_PER_CLUSTER + CPUId) * MAX_PE_PER_CPU)
|
||||
* + ThreadId
|
||||
* ---------------------------------------------------------------------
|
||||
*/
|
||||
func plat_arm_calc_core_pos
|
||||
/*
|
||||
* Check for MT bit in MPIDR. If not set, shift MPIDR to left to make it
|
||||
* look as if in a multi-threaded implementation.
|
||||
*/
|
||||
tst x0, #MPIDR_MT_MASK
|
||||
lsr x3, x0, #MPIDR_AFFINITY_BITS
|
||||
csel x3, x3, x0, eq
|
||||
|
||||
/* Extract individual affinity fields from MPIDR */
|
||||
ubfx x0, x3, #MPIDR_AFF0_SHIFT, #MPIDR_AFFINITY_BITS
|
||||
ubfx x1, x3, #MPIDR_AFF1_SHIFT, #MPIDR_AFFINITY_BITS
|
||||
ubfx x2, x3, #MPIDR_AFF2_SHIFT, #MPIDR_AFFINITY_BITS
|
||||
|
||||
/* Compute linear position */
|
||||
mov x4, #PLAT_MAX_CPUS_PER_CLUSTER
|
||||
madd x1, x2, x4, x1
|
||||
mov x5, #PLAT_MAX_PE_PER_CPU
|
||||
madd x0, x1, x5, x0
|
||||
ret
|
||||
endfunc plat_arm_calc_core_pos
|
||||
|
||||
/* -----------------------------------------------------
|
||||
* void plat_reset_handler(void);
|
||||
*
|
||||
* Determine the CPU MIDR and disable power down bit for
|
||||
* that CPU.
|
||||
* -----------------------------------------------------
|
||||
*/
|
||||
func plat_reset_handler
|
||||
jump_if_cpu_midr CORTEX_A75_MIDR, A75
|
||||
jump_if_cpu_midr CORTEX_A55_MIDR, A55
|
||||
ret
|
||||
|
||||
/* -----------------------------------------------------
|
||||
* Disable CPU power down bit in power control register
|
||||
* -----------------------------------------------------
|
||||
*/
|
||||
A75:
|
||||
mrs x0, CORTEX_A75_CPUPWRCTLR_EL1
|
||||
bic x0, x0, #CORTEX_A75_CORE_PWRDN_EN_MASK
|
||||
msr CORTEX_A75_CPUPWRCTLR_EL1, x0
|
||||
isb
|
||||
ret
|
||||
A55:
|
||||
mrs x0, CORTEX_A55_CPUPWRCTLR_EL1
|
||||
bic x0, x0, #CORTEX_A55_CORE_PWRDN_EN_MASK
|
||||
msr CORTEX_A55_CPUPWRCTLR_EL1, x0
|
||||
isb
|
||||
ret
|
||||
endfunc plat_reset_handler
|
|
@ -1,27 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2020, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
/dts-v1/;
|
||||
|
||||
/ {
|
||||
/* Platform Config */
|
||||
tb_fw-config {
|
||||
compatible = "arm,tb_fw";
|
||||
hw_config_addr = <0x0 0x83000000>;
|
||||
hw_config_max_size = <0x01000000>;
|
||||
/*
|
||||
* The following two entries are placeholders for Mbed TLS
|
||||
* heap information. The default values don't matter since
|
||||
* they will be overwritten by BL1.
|
||||
* In case of having shared Mbed TLS heap between BL1 and BL2,
|
||||
* BL1 will populate these two properties with the respective
|
||||
* info about the shared heap. This info will be available for
|
||||
* BL2 in order to locate and re-use the heap.
|
||||
*/
|
||||
mbedtls_heap_addr = <0x0 0x0>;
|
||||
mbedtls_heap_size = <0x0>;
|
||||
};
|
||||
};
|
|
@ -1,24 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
#ifndef PLAT_MACROS_S
|
||||
#define PLAT_MACROS_S
|
||||
|
||||
#include <cci_macros.S>
|
||||
#include <css_macros.S>
|
||||
|
||||
/* ---------------------------------------------
|
||||
* The below required platform porting macro
|
||||
* prints out relevant platform registers
|
||||
* whenever an unhandled exception is taken in
|
||||
* BL31.
|
||||
* ---------------------------------------------
|
||||
*/
|
||||
.macro plat_crash_print_regs
|
||||
css_print_gic_regs
|
||||
print_cci_regs
|
||||
.endm
|
||||
|
||||
#endif /* PLAT_MACROS_S */
|
|
@ -1,242 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#ifndef SGM_BASE_PLATFORM_DEF_H
|
||||
#define SGM_BASE_PLATFORM_DEF_H
|
||||
|
||||
#include <drivers/arm/tzc400.h>
|
||||
#include <drivers/arm/tzc_common.h>
|
||||
#include <plat/arm/board/common/board_css_def.h>
|
||||
#include <plat/arm/board/common/v2m_def.h>
|
||||
#include <plat/arm/common/arm_def.h>
|
||||
#include <plat/arm/css/common/css_def.h>
|
||||
#include <plat/arm/soc/common/soc_css_def.h>
|
||||
#include <plat/common/common_def.h>
|
||||
|
||||
/* CPU topology */
|
||||
#define PLAT_ARM_CLUSTER_COUNT U(1)
|
||||
#define PLAT_ARM_CLUSTER_CORE_COUNT U(8)
|
||||
#define PLATFORM_CORE_COUNT PLAT_ARM_CLUSTER_CORE_COUNT
|
||||
|
||||
#define PLAT_MAX_PWR_LVL ARM_PWR_LVL2
|
||||
#define PLAT_NUM_PWR_DOMAINS (ARM_SYSTEM_COUNT + \
|
||||
PLAT_ARM_CLUSTER_COUNT + \
|
||||
PLATFORM_CORE_COUNT)
|
||||
|
||||
/*
|
||||
* Define a list of Group 1 Secure and Group 0 interrupts as per GICv3
|
||||
* terminology. On a GICv2 system or mode, the lists will be merged and treated
|
||||
* as Group 0 interrupts.
|
||||
*/
|
||||
#define PLAT_ARM_G1S_IRQ_PROPS(grp) \
|
||||
CSS_G1S_IRQ_PROPS(grp), \
|
||||
ARM_G1S_IRQ_PROPS(grp)
|
||||
|
||||
#define PLAT_ARM_G0_IRQ_PROPS(grp) ARM_G0_IRQ_PROPS(grp)
|
||||
|
||||
/* GIC related constants */
|
||||
#define PLAT_ARM_GICD_BASE 0x30000000
|
||||
#define PLAT_ARM_GICR_BASE 0x300C0000
|
||||
#define PLAT_ARM_GICC_BASE 0x2c000000
|
||||
|
||||
#define CSS_GIC_SIZE 0x00200000
|
||||
|
||||
#define CSS_MAP_GIC_DEVICE MAP_REGION_FLAT( \
|
||||
PLAT_ARM_GICD_BASE, \
|
||||
CSS_GIC_SIZE, \
|
||||
MT_DEVICE | MT_RW | MT_SECURE)
|
||||
|
||||
/* Platform ID address */
|
||||
#define SSC_VERSION (SSC_REG_BASE + SSC_VERSION_OFFSET)
|
||||
#ifndef __ASSEMBLER__
|
||||
/* SSC_VERSION related accessors */
|
||||
/* Returns the part number of the platform */
|
||||
#define GET_PLAT_PART_NUM \
|
||||
GET_SSC_VERSION_PART_NUM(mmio_read_32(SSC_VERSION))
|
||||
/* Returns the configuration number of the platform */
|
||||
#define GET_PLAT_CONFIG_NUM \
|
||||
GET_SSC_VERSION_CONFIG(mmio_read_32(SSC_VERSION))
|
||||
#endif /* __ASSEMBLER__ */
|
||||
|
||||
|
||||
/*************************************************************************
|
||||
* Definitions common to all SGM CSS based platforms
|
||||
*************************************************************************/
|
||||
|
||||
/* TZC-400 related constants */
|
||||
#define PLAT_ARM_TZC_BASE 0x2a500000
|
||||
#define TZC_NSAID_ALL_AP 0 /* Note: Same as default NSAID!! */
|
||||
#define TZC_NSAID_HDLCD0 2
|
||||
#define TZC_NSAID_HDLCD1 3
|
||||
#define TZC_NSAID_GPU 9
|
||||
#define TZC_NSAID_VIDEO 10
|
||||
#define TZC_NSAID_DISP0 11
|
||||
#define TZC_NSAID_DISP1 12
|
||||
|
||||
|
||||
/*************************************************************************
|
||||
* Required platform porting definitions common to all SGM CSS based
|
||||
* platforms
|
||||
*************************************************************************/
|
||||
|
||||
#define PLAT_ARM_TRUSTED_SRAM_SIZE 0x00040000 /* 256 KB */
|
||||
|
||||
/* MHU related constants */
|
||||
#define PLAT_CSS_MHU_BASE 0x2b1f0000
|
||||
|
||||
#define PLAT_ARM_TRUSTED_ROM_BASE 0x00000000
|
||||
#define PLAT_ARM_TRUSTED_ROM_SIZE 0x00080000
|
||||
|
||||
#define PLAT_ARM_CCI_BASE 0x2a000000
|
||||
|
||||
/* Cluster to CCI slave mapping */
|
||||
#define PLAT_ARM_CCI_CLUSTER0_SL_IFACE_IX 6
|
||||
#define PLAT_ARM_CCI_CLUSTER1_SL_IFACE_IX 5
|
||||
|
||||
/* System timer related constants */
|
||||
#define PLAT_ARM_NSTIMER_FRAME_ID 0
|
||||
|
||||
/* TZC related constants */
|
||||
#define PLAT_ARM_TZC_NS_DEV_ACCESS ( \
|
||||
TZC_REGION_ACCESS_RDWR(TZC_NSAID_ALL_AP) | \
|
||||
TZC_REGION_ACCESS_RDWR(TZC_NSAID_HDLCD0) | \
|
||||
TZC_REGION_ACCESS_RDWR(TZC_NSAID_HDLCD1) | \
|
||||
TZC_REGION_ACCESS_RDWR(TZC_NSAID_GPU) | \
|
||||
TZC_REGION_ACCESS_RDWR(TZC_NSAID_VIDEO) | \
|
||||
TZC_REGION_ACCESS_RDWR(TZC_NSAID_DISP0) | \
|
||||
TZC_REGION_ACCESS_RDWR(TZC_NSAID_DISP1))
|
||||
|
||||
/* Display Processor register definitions to setup the NSAIDs */
|
||||
#define MALI_DP_BASE 0x2cc00000
|
||||
#define DP_NPROT_NSAID_OFFSET 0x1000c
|
||||
#define W_NPROT_NSAID_SHIFT 24
|
||||
#define LS_NPORT_NSAID_SHIFT 12
|
||||
|
||||
/*
|
||||
* Base address of the first memory region used for communication between AP
|
||||
* and SCP. Used by the BootOverMHU and SCPI protocols.
|
||||
*/
|
||||
#if !CSS_USE_SCMI_SDS_DRIVER
|
||||
/*
|
||||
* Note that this is located at the same address as SCP_BOOT_CFG_ADDR, which
|
||||
* means the SCP/AP configuration data gets overwritten when the AP initiates
|
||||
* communication with the SCP. The configuration data is expected to be a
|
||||
* 32-bit word on all CSS platforms. Part of this configuration is
|
||||
* which CPU is the primary, according to the shift and mask definitions below.
|
||||
*/
|
||||
#define PLAT_CSS_SCP_COM_SHARED_MEM_BASE (ARM_TRUSTED_SRAM_BASE + 0x80)
|
||||
#define PLAT_CSS_PRIMARY_CPU_SHIFT 8
|
||||
#define PLAT_CSS_PRIMARY_CPU_BIT_WIDTH 4
|
||||
#endif
|
||||
|
||||
/*
|
||||
* SCP_BL2 uses up whatever remaining space is available as it is loaded before
|
||||
* anything else in this memory region and is handed over to the SCP before
|
||||
* BL31 is loaded over the top.
|
||||
*/
|
||||
#define PLAT_CSS_MAX_SCP_BL2_SIZE \
|
||||
((SCP_BL2_LIMIT - ARM_FW_CONFIG_LIMIT) & ~PAGE_SIZE_MASK)
|
||||
|
||||
#define PLAT_CSS_MAX_SCP_BL2U_SIZE PLAT_CSS_MAX_SCP_BL2_SIZE
|
||||
|
||||
/*
|
||||
* Most platform porting definitions provided by included headers
|
||||
*/
|
||||
|
||||
/*
|
||||
* PLAT_ARM_MMAP_ENTRIES depends on the number of entries in the
|
||||
* plat_arm_mmap array defined for each BL stage.
|
||||
*/
|
||||
#if defined(IMAGE_BL31)
|
||||
# define PLAT_ARM_MMAP_ENTRIES 8
|
||||
# define MAX_XLAT_TABLES 5
|
||||
#elif defined(IMAGE_BL32)
|
||||
# define PLAT_ARM_MMAP_ENTRIES 8
|
||||
# define MAX_XLAT_TABLES 5
|
||||
#elif !USE_ROMLIB
|
||||
# define PLAT_ARM_MMAP_ENTRIES 11
|
||||
# define MAX_XLAT_TABLES 5
|
||||
#else
|
||||
# define PLAT_ARM_MMAP_ENTRIES 12
|
||||
# define MAX_XLAT_TABLES 6
|
||||
#endif
|
||||
|
||||
/*
|
||||
* PLAT_ARM_MAX_BL1_RW_SIZE is calculated using the current BL1 RW debug size
|
||||
* plus a little space for growth.
|
||||
*/
|
||||
#define PLAT_ARM_MAX_BL1_RW_SIZE 0xB000
|
||||
|
||||
/*
|
||||
* PLAT_ARM_MAX_ROMLIB_RW_SIZE is define to use a full page
|
||||
*/
|
||||
|
||||
#if USE_ROMLIB
|
||||
#define PLAT_ARM_MAX_ROMLIB_RW_SIZE 0x1000
|
||||
#define PLAT_ARM_MAX_ROMLIB_RO_SIZE 0xe000
|
||||
#else
|
||||
#define PLAT_ARM_MAX_ROMLIB_RW_SIZE 0
|
||||
#define PLAT_ARM_MAX_ROMLIB_RO_SIZE 0
|
||||
#endif
|
||||
|
||||
/*
|
||||
* PLAT_ARM_MAX_BL2_SIZE is calculated using the current BL2 debug size plus a
|
||||
* little space for growth.
|
||||
*/
|
||||
#if TRUSTED_BOARD_BOOT
|
||||
# define PLAT_ARM_MAX_BL2_SIZE 0x1D000
|
||||
#else
|
||||
# define PLAT_ARM_MAX_BL2_SIZE 0x12000
|
||||
#endif
|
||||
|
||||
/*
|
||||
* Since BL31 NOBITS overlays BL2 and BL1-RW, PLAT_ARM_MAX_BL31_SIZE is
|
||||
* calculated using the current BL31 PROGBITS debug size plus the sizes of
|
||||
* BL2 and BL1-RW
|
||||
*/
|
||||
#define PLAT_ARM_MAX_BL31_SIZE 0x3B000
|
||||
|
||||
/*
|
||||
* Size of cacheable stacks
|
||||
*/
|
||||
#if defined(IMAGE_BL1)
|
||||
# if TRUSTED_BOARD_BOOT
|
||||
# define PLATFORM_STACK_SIZE 0x1000
|
||||
# else
|
||||
# define PLATFORM_STACK_SIZE 0x440
|
||||
# endif
|
||||
#elif defined(IMAGE_BL2)
|
||||
# if TRUSTED_BOARD_BOOT
|
||||
# define PLATFORM_STACK_SIZE 0x1000
|
||||
# else
|
||||
# define PLATFORM_STACK_SIZE 0x400
|
||||
# endif
|
||||
#elif defined(IMAGE_BL2U)
|
||||
# define PLATFORM_STACK_SIZE 0x400
|
||||
#elif defined(IMAGE_BL31)
|
||||
# define PLATFORM_STACK_SIZE 0x400
|
||||
#elif defined(IMAGE_BL32)
|
||||
# define PLATFORM_STACK_SIZE 0x440
|
||||
#endif
|
||||
|
||||
/*******************************************************************************
|
||||
* Memprotect definitions
|
||||
******************************************************************************/
|
||||
/* PSCI memory protect definitions:
|
||||
* This variable is stored in a non-secure flash because some ARM reference
|
||||
* platforms do not have secure NVRAM. Real systems that provided MEM_PROTECT
|
||||
* support must use a secure NVRAM to store the PSCI MEM_PROTECT definitions.
|
||||
*/
|
||||
#define PLAT_ARM_MEM_PROT_ADDR (V2M_FLASH0_BASE + \
|
||||
V2M_FLASH0_SIZE - V2M_FLASH_BLOCK_SIZE)
|
||||
|
||||
/* System power domain level */
|
||||
#define CSS_SYSTEM_PWR_DMN_LVL ARM_PWR_LVL2
|
||||
|
||||
/* Number of SCMI channels on the platform */
|
||||
#define PLAT_ARM_SCMI_CHANNEL_COUNT U(1)
|
||||
|
||||
#endif /* SGM_BASE_PLATFORM_DEF_H */
|
|
@ -1,43 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#ifndef SGM_PLAT_CONFIG_H
|
||||
#define SGM_PLAT_CONFIG_H
|
||||
|
||||
#include <drivers/arm/ccn.h>
|
||||
#include <drivers/arm/gicv3.h>
|
||||
|
||||
/* The type of interconnect */
|
||||
typedef enum {
|
||||
ARM_CCI = 0,
|
||||
ARM_CCN,
|
||||
ARM_CMN
|
||||
} css_inteconn_type_t;
|
||||
|
||||
typedef ccn_desc_t inteconn_desc_t;
|
||||
|
||||
/* Interconnect configurations */
|
||||
typedef struct css_inteconn_config {
|
||||
css_inteconn_type_t ip_type;
|
||||
const inteconn_desc_t *plat_inteconn_desc;
|
||||
} css_inteconn_config_t;
|
||||
|
||||
/* Topology configurations */
|
||||
typedef struct css_topology {
|
||||
const unsigned char *power_tree;
|
||||
unsigned int plat_cluster_core_count;
|
||||
} css_topology_t;
|
||||
|
||||
typedef struct css_plat_config {
|
||||
const gicv3_driver_data_t *gic_data;
|
||||
const css_inteconn_config_t *inteconn;
|
||||
const css_topology_t *topology;
|
||||
} css_plat_config_t;
|
||||
|
||||
void plat_config_init(void);
|
||||
css_plat_config_t *get_plat_config(void);
|
||||
|
||||
#endif /* SGM_PLAT_CONFIG_H */
|
|
@ -1,17 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#ifndef SGM_VARIANT_H
|
||||
#define SGM_VARIANT_H
|
||||
|
||||
/* SSC_VERSION values for sgm */
|
||||
#define SGM775_SSC_VER_PART_NUM 0x0790
|
||||
|
||||
/* DMC configuration for sgm */
|
||||
#define SGM_DMC_SIZE 0x40000
|
||||
#define SGM775_DMC_COUNT 4
|
||||
|
||||
#endif /* SGM_VARIANT_H */
|
|
@ -1,76 +0,0 @@
|
|||
#
|
||||
# Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved.
|
||||
#
|
||||
# SPDX-License-Identifier: BSD-3-Clause
|
||||
#
|
||||
|
||||
CSS_USE_SCMI_SDS_DRIVER := 1
|
||||
|
||||
CSS_SGM_BASE := plat/arm/css/sgm
|
||||
|
||||
PLAT_INCLUDES := -I${CSS_SGM_BASE}/include
|
||||
|
||||
PLAT_BL_COMMON_SOURCES := ${CSS_SGM_BASE}/sgm_mmap_config.c \
|
||||
${CSS_SGM_BASE}/aarch64/css_sgm_helpers.S
|
||||
|
||||
SECURITY_SOURCES := drivers/arm/tzc/tzc_dmc500.c \
|
||||
plat/arm/common/arm_tzc_dmc500.c \
|
||||
${CSS_SGM_BASE}/sgm_security.c
|
||||
|
||||
SGM_CPU_SOURCES := lib/cpus/aarch64/cortex_a55.S \
|
||||
lib/cpus/aarch64/cortex_a75.S
|
||||
|
||||
INTERCONNECT_SOURCES := ${CSS_SGM_BASE}/sgm_interconnect.c
|
||||
|
||||
# GIC-600 configuration
|
||||
GICV3_SUPPORT_GIC600 := 1
|
||||
|
||||
# Include GICv3 driver files
|
||||
include drivers/arm/gic/v3/gicv3.mk
|
||||
|
||||
SGM_GIC_SOURCES := ${GICV3_SOURCES} \
|
||||
plat/common/plat_gicv3.c \
|
||||
plat/arm/common/arm_gicv3.c
|
||||
|
||||
BL1_SOURCES += $(SGM_CPU_SOURCES) \
|
||||
${INTERCONNECT_SOURCES} \
|
||||
${CSS_SGM_BASE}/sgm_bl1_setup.c \
|
||||
${CSS_SGM_BASE}/sgm_plat_config.c \
|
||||
drivers/arm/sp805/sp805.c
|
||||
|
||||
BL2_SOURCES += ${SECURITY_SOURCES} \
|
||||
${CSS_SGM_BASE}/sgm_plat_config.c
|
||||
|
||||
BL2U_SOURCES += ${SECURITY_SOURCES}
|
||||
|
||||
BL31_SOURCES += $(SGM_CPU_SOURCES) \
|
||||
${INTERCONNECT_SOURCES} \
|
||||
${SECURITY_SOURCES} \
|
||||
${SGM_GIC_SOURCES} \
|
||||
${CSS_SGM_BASE}/sgm_topology.c \
|
||||
${CSS_SGM_BASE}/sgm_bl31_setup.c \
|
||||
${CSS_SGM_BASE}/sgm_plat_config.c
|
||||
|
||||
ifneq (${RESET_TO_BL31},0)
|
||||
$(error "Using BL31 as the reset vector is not supported on ${PLAT} platform. \
|
||||
Please set RESET_TO_BL31 to 0.")
|
||||
endif
|
||||
|
||||
# sgm uses CCI-500 as Cache Coherent Interconnect
|
||||
ARM_CCI_PRODUCT_ID := 500
|
||||
|
||||
# System coherency is managed in hardware
|
||||
HW_ASSISTED_COHERENCY := 1
|
||||
|
||||
# When building for systems with hardware-assisted coherency, there's no need to
|
||||
# use USE_COHERENT_MEM. Require that USE_COHERENT_MEM must be set to 0 too.
|
||||
USE_COHERENT_MEM := 0
|
||||
|
||||
override ARM_PLAT_MT := 1
|
||||
|
||||
$(eval $(call add_define,SGM_PLAT))
|
||||
|
||||
include plat/arm/common/arm_common.mk
|
||||
include plat/arm/board/common/board_common.mk
|
||||
include plat/arm/css/common/css_common.mk
|
||||
include plat/arm/soc/common/soc_css.mk
|
|
@ -1,45 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <common/bl_common.h>
|
||||
#include <common/debug.h>
|
||||
#include <plat/arm/common/plat_arm.h>
|
||||
#include <plat/arm/soc/common/soc_css.h>
|
||||
#include <plat/arm/common/arm_def.h>
|
||||
#include <drivers/arm/sp805.h>
|
||||
#include <sgm_plat_config.h>
|
||||
|
||||
void bl1_early_platform_setup(void)
|
||||
{
|
||||
|
||||
/* Initialize the console before anything else */
|
||||
arm_bl1_early_platform_setup();
|
||||
|
||||
/* Initialize the platform configuration structure */
|
||||
plat_config_init();
|
||||
|
||||
#if !HW_ASSISTED_COHERENCY
|
||||
/*
|
||||
* Initialize Interconnect for this cluster during cold boot.
|
||||
* No need for locks as no other CPU is active.
|
||||
*/
|
||||
plat_arm_interconnect_init();
|
||||
/*
|
||||
* Enable Interconnect coherency for the primary CPU's cluster.
|
||||
*/
|
||||
plat_arm_interconnect_enter_coherency();
|
||||
#endif
|
||||
}
|
||||
|
||||
void plat_arm_secure_wdt_start(void)
|
||||
{
|
||||
sp805_start(ARM_SP805_TWDG_BASE, ARM_TWDG_LOAD_VAL);
|
||||
}
|
||||
|
||||
void plat_arm_secure_wdt_stop(void)
|
||||
{
|
||||
sp805_stop(ARM_SP805_TWDG_BASE);
|
||||
}
|
|
@ -1,55 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <common/bl_common.h>
|
||||
#include <common/debug.h>
|
||||
#include <drivers/arm/css/css_mhu_doorbell.h>
|
||||
#include <drivers/arm/css/scmi.h>
|
||||
#include <plat/arm/common/plat_arm.h>
|
||||
|
||||
#include <sgm_plat_config.h>
|
||||
|
||||
static scmi_channel_plat_info_t sgm775_scmi_plat_info = {
|
||||
.scmi_mbx_mem = CSS_SCMI_PAYLOAD_BASE,
|
||||
.db_reg_addr = PLAT_CSS_MHU_BASE + CSS_SCMI_MHU_DB_REG_OFF,
|
||||
.db_preserve_mask = 0xfffffffe,
|
||||
.db_modify_mask = 0x1,
|
||||
.ring_doorbell = &mhu_ring_doorbell,
|
||||
};
|
||||
|
||||
scmi_channel_plat_info_t *plat_css_get_scmi_info(int channel_id)
|
||||
{
|
||||
return &sgm775_scmi_plat_info;
|
||||
}
|
||||
|
||||
void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
|
||||
u_register_t arg2, u_register_t arg3)
|
||||
{
|
||||
uint32_t plat_version;
|
||||
bl_params_node_t *bl_params;
|
||||
|
||||
bl_params = ((bl_params_t *)arg0)->head;
|
||||
|
||||
/* Initialize the platform configuration structure */
|
||||
plat_config_init();
|
||||
|
||||
while (bl_params) {
|
||||
if (bl_params->image_id == BL33_IMAGE_ID) {
|
||||
plat_version = mmio_read_32(SSC_VERSION);
|
||||
bl_params->ep_info->args.arg2 = plat_version;
|
||||
break;
|
||||
}
|
||||
|
||||
bl_params = bl_params->next_params_info;
|
||||
}
|
||||
|
||||
arm_bl31_early_platform_setup((void *)arg0, arg1, arg2, (void *)arg3);
|
||||
}
|
||||
|
||||
const plat_psci_ops_t *plat_arm_psci_override_pm_ops(plat_psci_ops_t *ops)
|
||||
{
|
||||
return css_scmi_override_pm_ops(ops);
|
||||
}
|
|
@ -1,34 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <cdefs.h>
|
||||
|
||||
/*
|
||||
* As the SGM platform supports FCM (with automatic interconnect
|
||||
* enter/exit), we should not do anything in these interface functions.
|
||||
* They are used to override the weak functions in cci drivers.
|
||||
*/
|
||||
|
||||
/******************************************************************************
|
||||
* Helper function to initialize ARM interconnect driver.
|
||||
*****************************************************************************/
|
||||
void __init plat_arm_interconnect_init(void)
|
||||
{
|
||||
}
|
||||
|
||||
/******************************************************************************
|
||||
* Helper function to place current master into coherency
|
||||
*****************************************************************************/
|
||||
void plat_arm_interconnect_enter_coherency(void)
|
||||
{
|
||||
}
|
||||
|
||||
/******************************************************************************
|
||||
* Helper function to remove current master from coherency
|
||||
*****************************************************************************/
|
||||
void plat_arm_interconnect_exit_coherency(void)
|
||||
{
|
||||
}
|
|
@ -1,89 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <platform_def.h>
|
||||
|
||||
#include <common/bl_common.h>
|
||||
#include <common/debug.h>
|
||||
#include <plat/arm/common/plat_arm.h>
|
||||
|
||||
#include <sgm_variant.h>
|
||||
|
||||
/*
|
||||
* Table of regions for different BL stages to map using the MMU.
|
||||
* This doesn't include Trusted RAM as the 'mem_layout' argument passed to
|
||||
* arm_configure_mmu_elx() will give the available subset of that.
|
||||
*/
|
||||
#if IMAGE_BL1
|
||||
const mmap_region_t plat_arm_mmap[] = {
|
||||
ARM_MAP_SHARED_RAM,
|
||||
V2M_MAP_FLASH0_RO,
|
||||
V2M_MAP_IOFPGA,
|
||||
CSS_MAP_DEVICE,
|
||||
CSS_MAP_GIC_DEVICE,
|
||||
SOC_CSS_MAP_DEVICE,
|
||||
#if TRUSTED_BOARD_BOOT
|
||||
ARM_MAP_NS_DRAM1,
|
||||
#endif
|
||||
{0}
|
||||
};
|
||||
#endif
|
||||
#if IMAGE_BL2
|
||||
const mmap_region_t plat_arm_mmap[] = {
|
||||
ARM_MAP_SHARED_RAM,
|
||||
V2M_MAP_FLASH0_RO,
|
||||
V2M_MAP_IOFPGA,
|
||||
CSS_MAP_DEVICE,
|
||||
CSS_MAP_GIC_DEVICE,
|
||||
SOC_CSS_MAP_DEVICE,
|
||||
ARM_MAP_NS_DRAM1,
|
||||
#ifdef SPD_tspd
|
||||
ARM_MAP_TSP_SEC_MEM,
|
||||
#endif
|
||||
#ifdef SPD_opteed
|
||||
ARM_OPTEE_PAGEABLE_LOAD_MEM,
|
||||
#endif
|
||||
#if TRUSTED_BOARD_BOOT && !BL2_AT_EL3
|
||||
ARM_MAP_BL1_RW,
|
||||
#endif
|
||||
{0}
|
||||
};
|
||||
#endif
|
||||
#if IMAGE_BL2U
|
||||
const mmap_region_t plat_arm_mmap[] = {
|
||||
ARM_MAP_SHARED_RAM,
|
||||
CSS_MAP_DEVICE,
|
||||
CSS_MAP_GIC_DEVICE,
|
||||
SOC_CSS_MAP_DEVICE,
|
||||
{0}
|
||||
};
|
||||
#endif
|
||||
#if IMAGE_BL31
|
||||
const mmap_region_t plat_arm_mmap[] = {
|
||||
ARM_MAP_SHARED_RAM,
|
||||
V2M_MAP_IOFPGA,
|
||||
CSS_MAP_DEVICE,
|
||||
CSS_MAP_GIC_DEVICE,
|
||||
SOC_CSS_MAP_DEVICE,
|
||||
{0}
|
||||
};
|
||||
#endif
|
||||
#if IMAGE_BL32
|
||||
const mmap_region_t plat_arm_mmap[] = {
|
||||
V2M_MAP_IOFPGA,
|
||||
CSS_MAP_DEVICE,
|
||||
CSS_MAP_GIC_DEVICE,
|
||||
SOC_CSS_MAP_DEVICE,
|
||||
{0}
|
||||
};
|
||||
#endif
|
||||
|
||||
ARM_CASSERT_MMAP
|
||||
|
||||
const mmap_region_t *plat_arm_get_mmap(void)
|
||||
{
|
||||
return plat_arm_mmap;
|
||||
}
|
|
@ -1,80 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018-2019, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <assert.h>
|
||||
#include <string.h>
|
||||
|
||||
#include <platform_def.h>
|
||||
|
||||
#include <common/debug.h>
|
||||
#include <plat/common/platform.h>
|
||||
#include <plat/arm/common/plat_arm.h>
|
||||
|
||||
#include <sgm_plat_config.h>
|
||||
#include <sgm_variant.h>
|
||||
|
||||
static css_plat_config_t *css_plat_info;
|
||||
|
||||
/* Interconnect */
|
||||
const css_inteconn_config_t sgm_inteconn = {
|
||||
.ip_type = ARM_CCI,
|
||||
.plat_inteconn_desc = NULL
|
||||
};
|
||||
|
||||
/* Special definition for SGM775 */
|
||||
/* Topology configuration for SGM775 */
|
||||
const unsigned char sgm775_power_domain_tree_desc[] = {
|
||||
/* No of root nodes */
|
||||
ARM_SYSTEM_COUNT,
|
||||
/* No of children for the root node */
|
||||
PLAT_ARM_CLUSTER_COUNT,
|
||||
/* No of children for the first cluster node */
|
||||
PLAT_ARM_CLUSTER_CORE_COUNT,
|
||||
};
|
||||
|
||||
const css_topology_t sgm775_topology = {
|
||||
.power_tree = sgm775_power_domain_tree_desc,
|
||||
.plat_cluster_core_count = PLAT_ARM_CLUSTER_CORE_COUNT
|
||||
};
|
||||
|
||||
/* Configuration structure for SGM775 */
|
||||
css_plat_config_t sgm775_config = {
|
||||
.inteconn = &sgm_inteconn,
|
||||
.topology = &sgm775_topology
|
||||
};
|
||||
|
||||
/*******************************************************************************
|
||||
* This function initializes the platform structure.
|
||||
******************************************************************************/
|
||||
void plat_config_init(void)
|
||||
{
|
||||
/* Get the platform configurations */
|
||||
switch (GET_PLAT_PART_NUM) {
|
||||
case SGM775_SSC_VER_PART_NUM:
|
||||
css_plat_info = &sgm775_config;
|
||||
|
||||
break;
|
||||
default:
|
||||
ERROR("Not a valid sgm variant!\n");
|
||||
panic();
|
||||
}
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* This function returns the platform structure pointer.
|
||||
******************************************************************************/
|
||||
css_plat_config_t *get_plat_config(void)
|
||||
{
|
||||
assert(css_plat_info != NULL);
|
||||
return css_plat_info;
|
||||
}
|
||||
|
||||
#if TRUSTED_BOARD_BOOT
|
||||
int plat_get_mbedtls_heap(void **heap_addr, size_t *heap_size)
|
||||
{
|
||||
return get_mbedtls_heap_helper(heap_addr, heap_size);
|
||||
}
|
||||
#endif
|
|
@ -1,65 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <common/debug.h>
|
||||
#include <drivers/arm/tzc_dmc500.h>
|
||||
#include <plat/arm/common/plat_arm.h>
|
||||
#include <plat/arm/soc/common/soc_css.h>
|
||||
|
||||
#include <sgm_variant.h>
|
||||
|
||||
/* Is populated with the DMC-500 controllers base addresses */
|
||||
static tzc_dmc500_driver_data_t plat_driver_data;
|
||||
|
||||
void plat_sgm_dp_security_setup(void)
|
||||
{
|
||||
unsigned int nprot_nsaid;
|
||||
|
||||
/*
|
||||
* At reset the Mali display processors start with NSAIDs set to zero
|
||||
* so the firmware must set them up to the expected values for ARM sgm
|
||||
* platforms.
|
||||
*/
|
||||
|
||||
nprot_nsaid = mmio_read_32(MALI_DP_BASE + DP_NPROT_NSAID_OFFSET);
|
||||
nprot_nsaid &= ~((0xF << W_NPROT_NSAID_SHIFT) |
|
||||
(0xF << LS_NPORT_NSAID_SHIFT));
|
||||
nprot_nsaid |= ((TZC_NSAID_DISP1 << W_NPROT_NSAID_SHIFT) |
|
||||
(TZC_NSAID_DISP0 << LS_NPORT_NSAID_SHIFT));
|
||||
mmio_write_32(MALI_DP_BASE + DP_NPROT_NSAID_OFFSET, nprot_nsaid);
|
||||
}
|
||||
|
||||
void plat_arm_security_setup(void)
|
||||
{
|
||||
unsigned int i;
|
||||
unsigned int part_num = GET_PLAT_PART_NUM;
|
||||
|
||||
INFO("part_num: 0x%x\n", part_num);
|
||||
|
||||
/*
|
||||
* Initialise plat_driver_data with platform specific DMC_BASE
|
||||
* addresses
|
||||
*/
|
||||
switch (part_num) {
|
||||
case SGM775_SSC_VER_PART_NUM:
|
||||
for (i = 0; i < SGM775_DMC_COUNT; i++)
|
||||
plat_driver_data.dmc_base[i] = PLAT_ARM_TZC_BASE
|
||||
+ SGM_DMC_SIZE * i;
|
||||
plat_driver_data.dmc_count = SGM775_DMC_COUNT;
|
||||
break;
|
||||
default:
|
||||
/* Unexpected platform */
|
||||
ERROR("Unexpected platform\n");
|
||||
panic();
|
||||
}
|
||||
/* Initialize the TrustZone Controller in DMC-500 */
|
||||
arm_tzc_dmc500_setup(&plat_driver_data, NULL);
|
||||
|
||||
/* Do DP NSAID setup */
|
||||
plat_sgm_dp_security_setup();
|
||||
/* Do ARM CSS SoC security setup */
|
||||
soc_css_security_setup();
|
||||
}
|
|
@ -1,33 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <plat/arm/common/plat_arm.h>
|
||||
|
||||
#include <sgm_plat_config.h>
|
||||
|
||||
/*******************************************************************************
|
||||
* This function returns the topology tree information.
|
||||
******************************************************************************/
|
||||
const unsigned char *plat_get_power_domain_tree_desc(void)
|
||||
{
|
||||
return get_plat_config()->topology->power_tree;
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* This function returns the core count within the cluster corresponding to
|
||||
* `mpidr`.
|
||||
******************************************************************************/
|
||||
unsigned int plat_arm_get_cluster_core_count(u_register_t mpidr)
|
||||
{
|
||||
return get_plat_config()->topology->plat_cluster_core_count;
|
||||
}
|
||||
|
||||
/*
|
||||
* The array mapping platform core position (implemented by plat_my_core_pos())
|
||||
* to the SCMI power domain ID implemented by SCP.
|
||||
*/
|
||||
const uint32_t plat_css_core_pos_to_scmi_dmn_id_map[PLATFORM_CORE_COUNT] = {
|
||||
0, 1, 2, 3, 4, 5, 6, 7 };
|
|
@ -1,17 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <plat/arm/common/plat_arm.h>
|
||||
|
||||
#include <sgm_plat_config.h>
|
||||
|
||||
void tsp_early_platform_setup(void)
|
||||
{
|
||||
/* Initialize the platform configuration structure */
|
||||
plat_config_init();
|
||||
|
||||
arm_tsp_early_platform_setup();
|
||||
}
|
|
@ -1,11 +0,0 @@
|
|||
#
|
||||
# Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
|
||||
#
|
||||
# SPDX-License-Identifier: BSD-3-Clause
|
||||
#
|
||||
|
||||
BL32_SOURCES += ${SGM_GIC_SOURCES} \
|
||||
${CSS_SGM_BASE}/sgm_plat_config.c \
|
||||
plat/arm/css/sgm/tsp/sgm_tsp_setup.c
|
||||
|
||||
include plat/arm/common/tsp/arm_tsp.mk
|
|
@ -1,148 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016-2020, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
#include <arch.h>
|
||||
#include <asm_macros.S>
|
||||
#include <platform_def.h>
|
||||
|
||||
.globl plat_secondary_cold_boot_setup
|
||||
.globl plat_report_exception
|
||||
.globl platform_is_primary_cpu
|
||||
.globl plat_crash_console_init
|
||||
.globl plat_crash_console_putc
|
||||
.globl plat_crash_console_flush
|
||||
.globl platform_mem_init
|
||||
|
||||
|
||||
.macro crash_ram_log
|
||||
/*
|
||||
* Check teearg->atf_log_buf_size.
|
||||
* Exit if atf_log_buf_size equals 0
|
||||
*/
|
||||
adr x2, ptr_atf_crash_flag
|
||||
ldr x2, [x2]
|
||||
/* exit if ptr_atf_crash_flag equals NULL */
|
||||
cbz x2, exit_putc
|
||||
|
||||
/*
|
||||
* set atf crash magic number
|
||||
*/
|
||||
1:
|
||||
adr x2, ptr_atf_crash_flag
|
||||
ldr x2, [x2]
|
||||
mov_imm x1, 0xdead1abf
|
||||
/* p_atf_log_ctrl->atf_crash_flag = 0xdead1abf */
|
||||
str w1, [x2]
|
||||
/* can't use w3 return addr, w4, start of buffer addr */
|
||||
ldr w2, [x2]
|
||||
cmp w2, w1
|
||||
b.ne 1b
|
||||
|
||||
/*
|
||||
* get cpu id
|
||||
*/
|
||||
mrs x1, mpidr_el1
|
||||
/* refer to platform_get_core_pos */
|
||||
and x2, x1, #MPIDR_CPU_MASK
|
||||
and x1, x1, #MPIDR_CLUSTER_MASK
|
||||
/* x1 = cpu id (cpu id = aff0 + aff1*4 ) */
|
||||
add x1, x2, x1, LSR #6
|
||||
|
||||
adr x2, ptr_atf_except_write_pos_per_cpu
|
||||
ldr x2, [x2]
|
||||
/*
|
||||
* plus (cpu_id * 8)-->
|
||||
* &p_atf_log_ctrl->atf_except_write_pos_per_cpu[cpu_id]
|
||||
* x2 = &p_atf_log_ctrl->atf_except_write_pos_per_cpu[cpu_id];
|
||||
*/
|
||||
add x2, x2, x1, LSL # 3
|
||||
/* log write */
|
||||
/* w1 = p_atf_log_ctrl->atf_except_write_pos_per_cpu[cpu_id] */
|
||||
ldr x1, [x2]
|
||||
/* *x1 = w0-->
|
||||
* *(p_atf_log_ctrl->atf_except_write_pos_per_cpu[cpu_id]) = c)
|
||||
*/
|
||||
strb w0, [x1]
|
||||
/* w1++ */
|
||||
add x1, x1, #1
|
||||
/* p_atf_log_ctrl->atf_except_write_pos_per_cpu[cpu_id] = w1 */
|
||||
str x1, [x2]
|
||||
exit_putc:
|
||||
.endm
|
||||
|
||||
/* -----------------------------------------------------
|
||||
* void plat_secondary_cold_boot_setup (void);
|
||||
*
|
||||
* This function performs any platform specific actions
|
||||
* needed for a secondary cpu after a cold reset e.g
|
||||
* mark the cpu's presence, mechanism to place it in a
|
||||
* holding pen etc.
|
||||
* -----------------------------------------------------
|
||||
*/
|
||||
func plat_secondary_cold_boot_setup
|
||||
/* Do not do cold boot for secondary CPU */
|
||||
cb_panic:
|
||||
b cb_panic
|
||||
endfunc plat_secondary_cold_boot_setup
|
||||
|
||||
func platform_is_primary_cpu
|
||||
and x0, x0, #(MPIDR_CLUSTER_MASK | MPIDR_CPU_MASK)
|
||||
cmp x0, #PLAT_PRIMARY_CPU
|
||||
cset x0, eq
|
||||
ret
|
||||
endfunc platform_is_primary_cpu
|
||||
|
||||
/* ---------------------------------------------
|
||||
* int plat_crash_console_init(void)
|
||||
* Function to initialize the crash console
|
||||
* without a C Runtime to print crash report.
|
||||
* Clobber list : x0, x1, x2
|
||||
* ---------------------------------------------
|
||||
*/
|
||||
func plat_crash_console_init
|
||||
mov_imm x0, UART0_BASE
|
||||
mov_imm x1, UART_CLOCK
|
||||
mov_imm x2, UART_BAUDRATE
|
||||
b console_init
|
||||
ret
|
||||
endfunc plat_crash_console_init
|
||||
|
||||
/* ---------------------------------------------
|
||||
* int plat_crash_console_putc(void)
|
||||
* Function to print a character on the crash
|
||||
* console without a C Runtime.
|
||||
* Clobber list : x1, x2
|
||||
* ---------------------------------------------
|
||||
*/
|
||||
func plat_crash_console_putc
|
||||
mov_imm x1, UART0_BASE
|
||||
b console_core_putc
|
||||
ret
|
||||
endfunc plat_crash_console_putc
|
||||
|
||||
/* ---------------------------------------------
|
||||
* void plat_crash_console_flush(int c)
|
||||
* Function to force a write of all buffered
|
||||
* data that hasn't been output.
|
||||
* Out : void.
|
||||
* Clobber list : x0, x1
|
||||
* ---------------------------------------------
|
||||
*/
|
||||
func plat_crash_console_flush
|
||||
mov_imm x0, UART0_BASE
|
||||
b console_core_flush
|
||||
endfunc plat_crash_console_flush
|
||||
|
||||
/* --------------------------------------------------------
|
||||
* void platform_mem_init (void);
|
||||
*
|
||||
* Any memory init, relocation to be done before the
|
||||
* platform boots. Called very early in the boot process.
|
||||
* --------------------------------------------------------
|
||||
*/
|
||||
func platform_mem_init
|
||||
ret
|
||||
endfunc platform_mem_init
|
||||
|
|
@ -1,116 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016-2020, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <common/bl_common.ld.h>
|
||||
#include <lib/xlat_tables/xlat_tables_defs.h>
|
||||
|
||||
OUTPUT_FORMAT(PLATFORM_LINKER_FORMAT)
|
||||
OUTPUT_ARCH(PLATFORM_LINKER_ARCH)
|
||||
ENTRY(bl31_entrypoint)
|
||||
|
||||
|
||||
MEMORY {
|
||||
RAM (rwx): ORIGIN = BL31_BASE, LENGTH = BL31_TZRAM_SIZE
|
||||
RAM2 (rwx): ORIGIN = TZRAM2_BASE, LENGTH = TZRAM2_SIZE
|
||||
}
|
||||
|
||||
|
||||
SECTIONS
|
||||
{
|
||||
. = BL31_BASE;
|
||||
|
||||
ASSERT(. == ALIGN(2048),
|
||||
"vector base is not aligned on a 2K boundary.")
|
||||
|
||||
__RO_START__ = .;
|
||||
vector . : {
|
||||
*(.vectors)
|
||||
} >RAM
|
||||
|
||||
ASSERT(. == ALIGN(PAGE_SIZE),
|
||||
"BL31_BASE address is not aligned on a page boundary.")
|
||||
|
||||
ro . : {
|
||||
*bl31_entrypoint.o(.text*)
|
||||
*(.text*)
|
||||
*(.rodata*)
|
||||
|
||||
RODATA_COMMON
|
||||
|
||||
__RO_END_UNALIGNED__ = .;
|
||||
/*
|
||||
* Memory page(s) mapped to this section will be marked as read-only,
|
||||
* executable. No RW data from the next section must creep in.
|
||||
* Ensure the rest of the current memory page is unused.
|
||||
*/
|
||||
. = ALIGN(PAGE_SIZE);
|
||||
__RO_END__ = .;
|
||||
} >RAM
|
||||
|
||||
ASSERT(__CPU_OPS_END__ > __CPU_OPS_START__,
|
||||
"cpu_ops not defined for this platform.")
|
||||
|
||||
/*
|
||||
* Define a linker symbol to mark start of the RW memory area for this
|
||||
* image.
|
||||
*/
|
||||
__RW_START__ = . ;
|
||||
|
||||
DATA_SECTION >RAM
|
||||
|
||||
#ifdef BL31_PROGBITS_LIMIT
|
||||
ASSERT(. <= BL31_PROGBITS_LIMIT, "BL3-1 progbits has exceeded its limit.")
|
||||
#endif
|
||||
|
||||
STACK_SECTION >RAM
|
||||
BSS_SECTION >RAM
|
||||
__RW_END__ = __BSS_END__;
|
||||
|
||||
ASSERT(. <= BL31_LIMIT, "BL3-1 image has exceeded its limit.")
|
||||
|
||||
XLAT_TABLE_SECTION >RAM2
|
||||
|
||||
#if USE_COHERENT_MEM
|
||||
/*
|
||||
* The base address of the coherent memory section must be page-aligned (4K)
|
||||
* to guarantee that the coherent data are stored on their own pages and
|
||||
* are not mixed with normal data. This is required to set up the correct
|
||||
* memory attributes for the coherent data page tables.
|
||||
*/
|
||||
coherent_ram (NOLOAD) : ALIGN(PAGE_SIZE) {
|
||||
__COHERENT_RAM_START__ = .;
|
||||
/*
|
||||
* Bakery locks are stored in coherent memory
|
||||
*
|
||||
* Each lock's data is contiguous and fully allocated by the compiler
|
||||
*/
|
||||
*(bakery_lock)
|
||||
*(tzfw_coherent_mem)
|
||||
__COHERENT_RAM_END_UNALIGNED__ = .;
|
||||
/*
|
||||
* Memory page(s) mapped to this section will be marked
|
||||
* as device memory. No other unexpected data must creep in.
|
||||
* Ensure the rest of the current memory page is unused.
|
||||
*/
|
||||
. = ALIGN(PAGE_SIZE);
|
||||
__COHERENT_RAM_END__ = .;
|
||||
} >RAM2
|
||||
#endif
|
||||
|
||||
/*
|
||||
* Define a linker symbol to mark end of the RW memory area for this
|
||||
* image.
|
||||
*/
|
||||
__BL31_END__ = .;
|
||||
|
||||
__BSS_SIZE__ = SIZEOF(.bss);
|
||||
#if USE_COHERENT_MEM
|
||||
__COHERENT_RAM_UNALIGNED_SIZE__ =
|
||||
__COHERENT_RAM_END_UNALIGNED__ - __COHERENT_RAM_START__;
|
||||
#endif
|
||||
|
||||
ASSERT(. <= TZRAM2_LIMIT, "TZRAM2 image has exceeded its limit.")
|
||||
}
|
|
@ -1,449 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016-2018, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <assert.h>
|
||||
#include <string.h>
|
||||
|
||||
#include <arch_helpers.h>
|
||||
#include <common/bl_common.h>
|
||||
#include <common/debug.h>
|
||||
#include <drivers/arm/cci.h>
|
||||
#include <drivers/console.h>
|
||||
#include <drivers/generic_delay_timer.h>
|
||||
#include <lib/el3_runtime/context_mgmt.h>
|
||||
#include <lib/mmio.h>
|
||||
#include <lib/utils_def.h>
|
||||
#include <lib/xlat_tables/xlat_tables.h>
|
||||
#include <plat/common/common_def.h>
|
||||
#include <plat/common/platform.h>
|
||||
|
||||
#include <mcucfg.h>
|
||||
#include <mt_cpuxgpt.h>
|
||||
#include <mtk_plat_common.h>
|
||||
#include <mtk_sip_svc.h>
|
||||
#include <plat_private.h>
|
||||
|
||||
/*******************************************************************************
|
||||
* Declarations of linker defined symbols which will help us find the layout
|
||||
* of trusted SRAM
|
||||
******************************************************************************/
|
||||
/*
|
||||
* The next 2 constants identify the extents of the code & RO data region.
|
||||
* These addresses are used by the MMU setup code and therefore they must be
|
||||
* page-aligned. It is the responsibility of the linker script to ensure that
|
||||
* __RO_START__ and __RO_END__ linker symbols refer to page-aligned addresses.
|
||||
*/
|
||||
IMPORT_SYM(unsigned long, __RO_START__, BL31_RO_BASE);
|
||||
IMPORT_SYM(unsigned long, __RO_END__, BL31_RO_LIMIT);
|
||||
|
||||
/*
|
||||
* Placeholder variables for copying the arguments that have been passed to
|
||||
* BL3-1 from BL2.
|
||||
*/
|
||||
static entry_point_info_t bl32_image_ep_info;
|
||||
static entry_point_info_t bl33_image_ep_info;
|
||||
|
||||
static const int cci_map[] = {
|
||||
PLAT_MT_CCI_CLUSTER0_SL_IFACE_IX,
|
||||
PLAT_MT_CCI_CLUSTER1_SL_IFACE_IX
|
||||
};
|
||||
|
||||
static uint32_t cci_map_length = ARRAY_SIZE(cci_map);
|
||||
|
||||
/* Table of regions to map using the MMU. */
|
||||
static const mmap_region_t plat_mmap[] = {
|
||||
/* for TF text, RO, RW */
|
||||
MAP_REGION_FLAT(MTK_DEV_RNG0_BASE, MTK_DEV_RNG0_SIZE,
|
||||
MT_DEVICE | MT_RW | MT_SECURE),
|
||||
MAP_REGION_FLAT(MTK_DEV_RNG1_BASE, MTK_DEV_RNG1_SIZE,
|
||||
MT_DEVICE | MT_RW | MT_SECURE),
|
||||
MAP_REGION_FLAT(RAM_CONSOLE_BASE & ~(PAGE_SIZE_MASK), RAM_CONSOLE_SIZE,
|
||||
MT_DEVICE | MT_RW | MT_NS),
|
||||
{ 0 }
|
||||
|
||||
};
|
||||
|
||||
/*******************************************************************************
|
||||
* Macro generating the code for the function setting up the pagetables as per
|
||||
* the platform memory map & initialize the mmu, for the given exception level
|
||||
******************************************************************************/
|
||||
#define DEFINE_CONFIGURE_MMU_EL(_el) \
|
||||
void plat_configure_mmu_el ## _el(unsigned long total_base, \
|
||||
unsigned long total_size, \
|
||||
unsigned long ro_start, \
|
||||
unsigned long ro_limit, \
|
||||
unsigned long coh_start, \
|
||||
unsigned long coh_limit) \
|
||||
{ \
|
||||
mmap_add_region(total_base, total_base, \
|
||||
total_size, \
|
||||
MT_MEMORY | MT_RW | MT_SECURE); \
|
||||
mmap_add_region(ro_start, ro_start, \
|
||||
ro_limit - ro_start, \
|
||||
MT_MEMORY | MT_RO | MT_SECURE); \
|
||||
mmap_add_region(coh_start, coh_start, \
|
||||
coh_limit - coh_start, \
|
||||
MT_DEVICE | MT_RW | MT_SECURE); \
|
||||
mmap_add(plat_mmap); \
|
||||
init_xlat_tables(); \
|
||||
\
|
||||
enable_mmu_el ## _el(0); \
|
||||
}
|
||||
|
||||
/* Define EL3 variants of the function initialising the MMU */
|
||||
DEFINE_CONFIGURE_MMU_EL(3)
|
||||
|
||||
unsigned int plat_get_syscnt_freq2(void)
|
||||
{
|
||||
return SYS_COUNTER_FREQ_IN_TICKS;
|
||||
}
|
||||
|
||||
void plat_cci_init(void)
|
||||
{
|
||||
/* Initialize CCI driver */
|
||||
cci_init(PLAT_MT_CCI_BASE, cci_map, cci_map_length);
|
||||
}
|
||||
|
||||
void plat_cci_enable(void)
|
||||
{
|
||||
/*
|
||||
* Enable CCI coherency for this cluster.
|
||||
* No need for locks as no other cpu is active at the moment.
|
||||
*/
|
||||
cci_enable_snoop_dvm_reqs(MPIDR_AFFLVL1_VAL(read_mpidr()));
|
||||
}
|
||||
|
||||
void plat_cci_disable(void)
|
||||
{
|
||||
cci_disable_snoop_dvm_reqs(MPIDR_AFFLVL1_VAL(read_mpidr()));
|
||||
}
|
||||
|
||||
|
||||
static void platform_setup_cpu(void)
|
||||
{
|
||||
/* setup big cores */
|
||||
mmio_write_32((uintptr_t)&mt6795_mcucfg->mp1_config_res,
|
||||
MP1_DIS_RGU0_WAIT_PD_CPUS_L1_ACK |
|
||||
MP1_DIS_RGU1_WAIT_PD_CPUS_L1_ACK |
|
||||
MP1_DIS_RGU2_WAIT_PD_CPUS_L1_ACK |
|
||||
MP1_DIS_RGU3_WAIT_PD_CPUS_L1_ACK |
|
||||
MP1_DIS_RGU_NOCPU_WAIT_PD_CPUS_L1_ACK);
|
||||
mmio_setbits_32((uintptr_t)&mt6795_mcucfg->mp1_miscdbg, MP1_AINACTS);
|
||||
mmio_setbits_32((uintptr_t)&mt6795_mcucfg->mp1_clkenm_div,
|
||||
MP1_SW_CG_GEN);
|
||||
mmio_clrbits_32((uintptr_t)&mt6795_mcucfg->mp1_rst_ctl,
|
||||
MP1_L2RSTDISABLE);
|
||||
|
||||
/* set big cores arm64 boot mode */
|
||||
mmio_setbits_32((uintptr_t)&mt6795_mcucfg->mp1_cpucfg,
|
||||
MP1_CPUCFG_64BIT);
|
||||
|
||||
/* set LITTLE cores arm64 boot mode */
|
||||
mmio_setbits_32((uintptr_t)&mt6795_mcucfg->mp0_rv_addr[0].rv_addr_hw,
|
||||
MP0_CPUCFG_64BIT);
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* Return a pointer to the 'entry_point_info' structure of the next image for
|
||||
* the security state specified. BL33 corresponds to the non-secure image type
|
||||
* while BL32 corresponds to the secure image type. A NULL pointer is returned
|
||||
* if the image does not exist.
|
||||
******************************************************************************/
|
||||
entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
|
||||
{
|
||||
entry_point_info_t *next_image_info;
|
||||
|
||||
next_image_info = (type == NON_SECURE) ?
|
||||
&bl33_image_ep_info : &bl32_image_ep_info;
|
||||
|
||||
/* None of the images on this platform can have 0x0 as the entrypoint */
|
||||
if (next_image_info->pc)
|
||||
return next_image_info;
|
||||
else
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* Perform any BL3-1 early platform setup. Here is an opportunity to copy
|
||||
* parameters passed by the calling EL (S-EL1 in BL2 & EL3 in BL1) before they
|
||||
* are lost (potentially). This needs to be done before the MMU is initialized
|
||||
* so that the memory layout can be used while creating page tables.
|
||||
* BL2 has flushed this information to memory, so we are guaranteed to pick up
|
||||
* good data.
|
||||
******************************************************************************/
|
||||
void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
|
||||
u_register_t arg2, u_register_t arg3)
|
||||
{
|
||||
struct mtk_bl_param_t *pmtk_bl_param = (struct mtk_bl_param_t *)arg0;
|
||||
struct atf_arg_t *teearg;
|
||||
unsigned long long normal_base;
|
||||
unsigned long long atf_base;
|
||||
|
||||
assert(pmtk_bl_param != NULL);
|
||||
/*
|
||||
* Mediatek preloader(i.e, BL2) is in 32 bit state, high 32bits
|
||||
* of 64 bit GP registers are UNKNOWN if CPU warm reset from 32 bit
|
||||
* to 64 bit state. So we need to clear high 32bit,
|
||||
* which may be random value.
|
||||
*/
|
||||
pmtk_bl_param =
|
||||
(struct mtk_bl_param_t *)((uint64_t)pmtk_bl_param & 0x00000000ffffffff);
|
||||
|
||||
teearg = (struct atf_arg_t *)pmtk_bl_param->tee_info_addr;
|
||||
|
||||
console_init(teearg->atf_log_port, UART_CLOCK, UART_BAUDRATE);
|
||||
memcpy((void *)>eearg, (void *)teearg, sizeof(struct atf_arg_t));
|
||||
|
||||
normal_base = 0;
|
||||
/* in ATF boot time, timer for cntpct_el0 is not initialized
|
||||
* so it will not count now.
|
||||
*/
|
||||
atf_base = read_cntpct_el0();
|
||||
sched_clock_init(normal_base, atf_base);
|
||||
|
||||
VERBOSE("bl31_setup\n");
|
||||
|
||||
/* Populate entry point information for BL3-2 and BL3-3 */
|
||||
SET_PARAM_HEAD(&bl32_image_ep_info,
|
||||
PARAM_EP,
|
||||
VERSION_1,
|
||||
0);
|
||||
SET_SECURITY_STATE(bl32_image_ep_info.h.attr, SECURE);
|
||||
bl32_image_ep_info.pc = BL32_BASE;
|
||||
|
||||
SET_PARAM_HEAD(&bl33_image_ep_info,
|
||||
PARAM_EP,
|
||||
VERSION_1,
|
||||
0);
|
||||
/*
|
||||
* Tell BL3-1 where the non-trusted software image
|
||||
* is located and the entry state information
|
||||
*/
|
||||
/* BL33_START_ADDRESS */
|
||||
bl33_image_ep_info.pc = pmtk_bl_param->bl33_start_addr;
|
||||
bl33_image_ep_info.spsr = plat_get_spsr_for_bl33_entry();
|
||||
bl33_image_ep_info.args.arg4 = pmtk_bl_param->bootarg_loc;
|
||||
bl33_image_ep_info.args.arg5 = pmtk_bl_param->bootarg_size;
|
||||
SET_SECURITY_STATE(bl33_image_ep_info.h.attr, NON_SECURE);
|
||||
}
|
||||
/*******************************************************************************
|
||||
* Perform any BL3-1 platform setup code
|
||||
******************************************************************************/
|
||||
|
||||
void bl31_platform_setup(void)
|
||||
{
|
||||
platform_setup_cpu();
|
||||
|
||||
generic_delay_timer_init();
|
||||
|
||||
plat_mt_gic_driver_init();
|
||||
/* Initialize the gic cpu and distributor interfaces */
|
||||
plat_mt_gic_init();
|
||||
|
||||
/* Topologies are best known to the platform. */
|
||||
mt_setup_topology();
|
||||
}
|
||||
/*******************************************************************************
|
||||
* Perform the very early platform specific architectural setup here. At the
|
||||
* moment this is only intializes the mmu in a quick and dirty way.
|
||||
* Init MTK propiartary log buffer control field.
|
||||
******************************************************************************/
|
||||
void bl31_plat_arch_setup(void)
|
||||
{
|
||||
/* Enable non-secure access to CCI-400 registers */
|
||||
mmio_write_32(CCI400_BASE + CCI_SEC_ACCESS_OFFSET, 0x1);
|
||||
|
||||
plat_cci_init();
|
||||
plat_cci_enable();
|
||||
|
||||
if (gteearg.atf_log_buf_size != 0) {
|
||||
INFO("mmap atf buffer : 0x%x, 0x%x\n\r",
|
||||
gteearg.atf_log_buf_start,
|
||||
gteearg.atf_log_buf_size);
|
||||
|
||||
mmap_add_region(
|
||||
gteearg.atf_log_buf_start &
|
||||
~(PAGE_SIZE_2MB_MASK),
|
||||
gteearg.atf_log_buf_start &
|
||||
~(PAGE_SIZE_2MB_MASK),
|
||||
PAGE_SIZE_2MB,
|
||||
MT_DEVICE | MT_RW | MT_NS);
|
||||
|
||||
INFO("mmap atf buffer (force 2MB aligned):0x%x, 0x%x\n",
|
||||
(gteearg.atf_log_buf_start & ~(PAGE_SIZE_2MB_MASK)),
|
||||
PAGE_SIZE_2MB);
|
||||
}
|
||||
/*
|
||||
* add TZRAM_BASE to memory map
|
||||
* then set RO and COHERENT to different attribute
|
||||
*/
|
||||
plat_configure_mmu_el3(
|
||||
(TZRAM_BASE & ~(PAGE_SIZE_MASK)),
|
||||
(TZRAM_SIZE & ~(PAGE_SIZE_MASK)),
|
||||
(BL31_RO_BASE & ~(PAGE_SIZE_MASK)),
|
||||
BL31_RO_LIMIT,
|
||||
BL_COHERENT_RAM_BASE,
|
||||
BL_COHERENT_RAM_END);
|
||||
/* Initialize for ATF log buffer */
|
||||
if (gteearg.atf_log_buf_size != 0) {
|
||||
gteearg.atf_aee_debug_buf_size = ATF_AEE_BUFFER_SIZE;
|
||||
gteearg.atf_aee_debug_buf_start =
|
||||
gteearg.atf_log_buf_start +
|
||||
gteearg.atf_log_buf_size - ATF_AEE_BUFFER_SIZE;
|
||||
INFO("ATF log service is registered (0x%x, aee:0x%x)\n",
|
||||
gteearg.atf_log_buf_start,
|
||||
gteearg.atf_aee_debug_buf_start);
|
||||
} else{
|
||||
gteearg.atf_aee_debug_buf_size = 0;
|
||||
gteearg.atf_aee_debug_buf_start = 0;
|
||||
}
|
||||
|
||||
/* Platform code before bl31_main */
|
||||
/* compatible to the earlier chipset */
|
||||
|
||||
/* Show to ATF log buffer & UART */
|
||||
INFO("BL3-1: %s\n", version_string);
|
||||
INFO("BL3-1: %s\n", build_message);
|
||||
|
||||
}
|
||||
#if 0
|
||||
/* MTK Define */
|
||||
#define ACTLR_CPUECTLR_BIT (1 << 1)
|
||||
|
||||
void enable_ns_access_to_cpuectlr(void)
|
||||
{
|
||||
unsigned int next_actlr;
|
||||
|
||||
|
||||
/* ACTLR_EL1 do not implement CUPECTLR */
|
||||
next_actlr = read_actlr_el2();
|
||||
next_actlr |= ACTLR_CPUECTLR_BIT;
|
||||
write_actlr_el2(next_actlr);
|
||||
|
||||
next_actlr = read_actlr_el3();
|
||||
next_actlr |= ACTLR_CPUECTLR_BIT;
|
||||
write_actlr_el3(next_actlr);
|
||||
}
|
||||
#endif
|
||||
/*******************************************************************************
|
||||
* This function prepare boot argument for 64 bit kernel entry
|
||||
******************************************************************************/
|
||||
static entry_point_info_t *bl31_plat_get_next_kernel64_ep_info(void)
|
||||
{
|
||||
entry_point_info_t *next_image_info;
|
||||
unsigned int mode;
|
||||
|
||||
mode = 0;
|
||||
|
||||
/* Kernel image is always non-secured */
|
||||
next_image_info = &bl33_image_ep_info;
|
||||
|
||||
/* Figure out what mode we enter the non-secure world in */
|
||||
if (el_implemented(2) != EL_IMPL_NONE) {
|
||||
INFO("Kernel_EL2\n");
|
||||
mode = MODE_EL2;
|
||||
} else{
|
||||
INFO("Kernel_EL1\n");
|
||||
mode = MODE_EL1;
|
||||
}
|
||||
|
||||
INFO("Kernel is 64Bit\n");
|
||||
next_image_info->spsr =
|
||||
SPSR_64(mode, MODE_SP_ELX, DISABLE_ALL_EXCEPTIONS);
|
||||
next_image_info->pc = get_kernel_info_pc();
|
||||
next_image_info->args.arg0 = get_kernel_info_r0();
|
||||
next_image_info->args.arg1 = get_kernel_info_r1();
|
||||
|
||||
INFO("pc=0x%lx, r0=0x%lx, r1=0x%lx\n",
|
||||
next_image_info->pc,
|
||||
next_image_info->args.arg0,
|
||||
next_image_info->args.arg1);
|
||||
|
||||
|
||||
SET_SECURITY_STATE(next_image_info->h.attr, NON_SECURE);
|
||||
|
||||
/* None of the images on this platform can have 0x0 as the entrypoint */
|
||||
if (next_image_info->pc)
|
||||
return next_image_info;
|
||||
else
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* This function prepare boot argument for 32 bit kernel entry
|
||||
******************************************************************************/
|
||||
static entry_point_info_t *bl31_plat_get_next_kernel32_ep_info(void)
|
||||
{
|
||||
entry_point_info_t *next_image_info;
|
||||
unsigned int mode;
|
||||
|
||||
mode = 0;
|
||||
|
||||
/* Kernel image is always non-secured */
|
||||
next_image_info = &bl33_image_ep_info;
|
||||
|
||||
/* Figure out what mode we enter the non-secure world in */
|
||||
mode = MODE32_hyp;
|
||||
/*
|
||||
* TODO: Consider the possibility of specifying the SPSR in
|
||||
* the FIP ToC and allowing the platform to have a say as
|
||||
* well.
|
||||
*/
|
||||
|
||||
INFO("Kernel is 32Bit\n");
|
||||
next_image_info->spsr =
|
||||
SPSR_MODE32(mode, SPSR_T_ARM, SPSR_E_LITTLE,
|
||||
(DAIF_FIQ_BIT | DAIF_IRQ_BIT | DAIF_ABT_BIT));
|
||||
next_image_info->pc = get_kernel_info_pc();
|
||||
next_image_info->args.arg0 = get_kernel_info_r0();
|
||||
next_image_info->args.arg1 = get_kernel_info_r1();
|
||||
next_image_info->args.arg2 = get_kernel_info_r2();
|
||||
|
||||
INFO("pc=0x%lx, r0=0x%lx, r1=0x%lx, r2=0x%lx\n",
|
||||
next_image_info->pc,
|
||||
next_image_info->args.arg0,
|
||||
next_image_info->args.arg1,
|
||||
next_image_info->args.arg2);
|
||||
|
||||
|
||||
SET_SECURITY_STATE(next_image_info->h.attr, NON_SECURE);
|
||||
|
||||
/* None of the images on this platform can have 0x0 as the entrypoint */
|
||||
if (next_image_info->pc)
|
||||
return next_image_info;
|
||||
else
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* This function prepare boot argument for kernel entrypoint
|
||||
******************************************************************************/
|
||||
void bl31_prepare_kernel_entry(uint64_t k32_64)
|
||||
{
|
||||
entry_point_info_t *next_image_info;
|
||||
uint32_t image_type;
|
||||
|
||||
/* Determine which image to execute next */
|
||||
/* image_type = bl31_get_next_image_type(); */
|
||||
image_type = NON_SECURE;
|
||||
|
||||
/* Program EL3 registers to enable entry into the next EL */
|
||||
if (k32_64 == 0)
|
||||
next_image_info = bl31_plat_get_next_kernel32_ep_info();
|
||||
else
|
||||
next_image_info = bl31_plat_get_next_kernel64_ep_info();
|
||||
|
||||
assert(next_image_info);
|
||||
assert(image_type == GET_SECURITY_STATE(next_image_info->h.attr));
|
||||
|
||||
INFO("BL3-1: Preparing for EL3 exit to %s world, Kernel\n",
|
||||
(image_type == SECURE) ? "secure" : "normal");
|
||||
INFO("BL3-1: Next image address = 0x%llx\n",
|
||||
(unsigned long long) next_image_info->pc);
|
||||
INFO("BL3-1: Next image spsr = 0x%x\n", next_image_info->spsr);
|
||||
cm_init_my_context(next_image_info);
|
||||
cm_prepare_el3_exit(image_type);
|
||||
}
|
|
@ -1,67 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <stdint.h>
|
||||
|
||||
#include <arch_helpers.h>
|
||||
#include <common/debug.h>
|
||||
#include <lib/mmio.h>
|
||||
#include <plat/common/platform.h>
|
||||
|
||||
#include <mt_cpuxgpt.h>
|
||||
|
||||
#define CPUXGPT_BASE 0x10200000
|
||||
#define INDEX_BASE (CPUXGPT_BASE+0x0674)
|
||||
#define CTL_BASE (CPUXGPT_BASE+0x0670)
|
||||
|
||||
uint64_t normal_time_base;
|
||||
uint64_t atf_time_base;
|
||||
|
||||
void sched_clock_init(uint64_t normal_base, uint64_t atf_base)
|
||||
{
|
||||
normal_time_base = normal_base;
|
||||
atf_time_base = atf_base;
|
||||
}
|
||||
|
||||
uint64_t sched_clock(void)
|
||||
{
|
||||
uint64_t cval;
|
||||
|
||||
cval = (((read_cntpct_el0() - atf_time_base)*1000)/
|
||||
SYS_COUNTER_FREQ_IN_MHZ) + normal_time_base;
|
||||
return cval;
|
||||
}
|
||||
|
||||
/*
|
||||
* Return: 0 - Trying to disable the CPUXGPT control bit,
|
||||
* and not allowed to disable it.
|
||||
* Return: 1 - reg_addr is not realted to disable the control bit.
|
||||
*/
|
||||
unsigned char check_cpuxgpt_write_permission(unsigned int reg_addr,
|
||||
unsigned int reg_value)
|
||||
{
|
||||
unsigned int idx;
|
||||
unsigned int ctl_val;
|
||||
|
||||
if (reg_addr == CTL_BASE) {
|
||||
idx = mmio_read_32(INDEX_BASE);
|
||||
|
||||
/* idx 0: CPUXGPT system control */
|
||||
if (idx == 0) {
|
||||
ctl_val = mmio_read_32(CTL_BASE);
|
||||
if (ctl_val & 1) {
|
||||
/*
|
||||
* if enable bit already set,
|
||||
* then bit 0 is not allow to set as 0
|
||||
*/
|
||||
if (!(reg_value & 1))
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
|
|
@ -1,28 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#ifndef MT_CPUXGPT_H
|
||||
#define MT_CPUXGPT_H
|
||||
|
||||
/* REG */
|
||||
#define INDEX_CTL_REG 0x000
|
||||
#define INDEX_STA_REG 0x004
|
||||
#define INDEX_CNT_L_INIT 0x008
|
||||
#define INDEX_CNT_H_INIT 0x00C
|
||||
|
||||
/* CTL_REG SET */
|
||||
#define EN_CPUXGPT 0x01
|
||||
#define EN_AHLT_DEBUG 0x02
|
||||
#define CLK_DIV1 (0x1 << 8)
|
||||
#define CLK_DIV2 (0x2 << 8)
|
||||
#define CLK_DIV4 (0x4 << 8)
|
||||
#define CLK_DIV_MASK (~(0x7<<8))
|
||||
|
||||
void generic_timer_backup(void);
|
||||
void sched_clock_init(uint64_t normal_base, uint64_t atf_base);
|
||||
uint64_t sched_clock(void);
|
||||
|
||||
#endif /* MT_CPUXGPT_H */
|
|
@ -1,155 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016-2017, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#ifndef MCUCFG_H
|
||||
#define MCUCFG_H
|
||||
|
||||
#include <stdint.h>
|
||||
|
||||
#include <platform_def.h>
|
||||
|
||||
struct mt6795_mcucfg_regs {
|
||||
uint32_t mp0_ca7l_cache_config;
|
||||
struct {
|
||||
uint32_t mem_delsel0;
|
||||
uint32_t mem_delsel1;
|
||||
} mp0_cpu[4];
|
||||
uint32_t mp0_cache_mem_delsel0;
|
||||
uint32_t mp0_cache_mem_delsel1;
|
||||
uint32_t mp0_axi_config;
|
||||
uint32_t mp0_misc_config[2];
|
||||
struct {
|
||||
uint32_t rv_addr_lw;
|
||||
uint32_t rv_addr_hw;
|
||||
} mp0_rv_addr[4];
|
||||
uint32_t mp0_ca7l_cfg_dis;
|
||||
uint32_t mp0_ca7l_clken_ctrl;
|
||||
uint32_t mp0_ca7l_rst_ctrl;
|
||||
uint32_t mp0_ca7l_misc_config;
|
||||
uint32_t mp0_ca7l_dbg_pwr_ctrl;
|
||||
uint32_t mp0_rw_rsvd0;
|
||||
uint32_t mp0_rw_rsvd1;
|
||||
uint32_t mp0_ro_rsvd;
|
||||
uint32_t reserved0_0[100];
|
||||
uint32_t mp1_cpucfg;
|
||||
uint32_t mp1_miscdbg;
|
||||
uint32_t reserved0_1[13];
|
||||
uint32_t mp1_rst_ctl;
|
||||
uint32_t mp1_clkenm_div;
|
||||
uint32_t reserved0_2[7];
|
||||
uint32_t mp1_config_res;
|
||||
uint32_t reserved0_3[13];
|
||||
struct {
|
||||
uint32_t rv_addr_lw;
|
||||
uint32_t rv_addr_hw;
|
||||
} mp1_rv_addr[2];
|
||||
uint32_t reserved0_4[84];
|
||||
uint32_t mp0_rst_status; /* 0x400 */
|
||||
uint32_t mp0_dbg_ctrl;
|
||||
uint32_t mp0_dbg_flag;
|
||||
uint32_t mp0_ca7l_ir_mon;
|
||||
struct {
|
||||
uint32_t pc_lw;
|
||||
uint32_t pc_hw;
|
||||
uint32_t fp_arch32;
|
||||
uint32_t sp_arch32;
|
||||
uint32_t fp_arch64_lw;
|
||||
uint32_t fp_arch64_hw;
|
||||
uint32_t sp_arch64_lw;
|
||||
uint32_t sp_arch64_hw;
|
||||
} mp0_dbg_core[4];
|
||||
uint32_t dfd_ctrl;
|
||||
uint32_t dfd_cnt_l;
|
||||
uint32_t dfd_cnt_h;
|
||||
uint32_t misccfg_mp0_rw_rsvd;
|
||||
uint32_t misccfg_sec_vio_status0;
|
||||
uint32_t misccfg_sec_vio_status1;
|
||||
uint32_t reserved1[22];
|
||||
uint32_t misccfg_rw_rsvd; /* 0x500 */
|
||||
uint32_t mcusys_dbg_mon_sel_a;
|
||||
uint32_t mcusys_dbg_mon;
|
||||
uint32_t reserved2[61];
|
||||
uint32_t mcusys_config_a; /* 0x600 */
|
||||
uint32_t mcusys_config1_a;
|
||||
uint32_t mcusys_gic_peribase_a;
|
||||
uint32_t reserved3;
|
||||
uint32_t sec_range0_start; /* 0x610 */
|
||||
uint32_t sec_range0_end;
|
||||
uint32_t sec_range_enable;
|
||||
uint32_t reserved4;
|
||||
uint32_t int_pol_ctl[8]; /* 0x620 */
|
||||
uint32_t aclken_div; /* 0x640 */
|
||||
uint32_t pclken_div;
|
||||
uint32_t l2c_sram_ctrl;
|
||||
uint32_t armpll_jit_ctrl;
|
||||
uint32_t cci_addrmap; /* 0x650 */
|
||||
uint32_t cci_config;
|
||||
uint32_t cci_periphbase;
|
||||
uint32_t cci_nevntcntovfl;
|
||||
uint32_t cci_clk_ctrl; /* 0x660 */
|
||||
uint32_t cci_acel_s1_ctrl;
|
||||
uint32_t bus_fabric_dcm_ctrl;
|
||||
uint32_t reserved5;
|
||||
uint32_t xgpt_ctl; /* 0x670 */
|
||||
uint32_t xgpt_idx;
|
||||
uint32_t ptpod2_ctl0;
|
||||
uint32_t ptpod2_ctl1;
|
||||
uint32_t mcusys_revid;
|
||||
uint32_t mcusys_rw_rsvd0;
|
||||
uint32_t mcusys_rw_rsvd1;
|
||||
};
|
||||
|
||||
static struct mt6795_mcucfg_regs *const mt6795_mcucfg = (void *)MCUCFG_BASE;
|
||||
|
||||
/* cpu boot mode */
|
||||
#define MP0_CPUCFG_64BIT_SHIFT 12
|
||||
#define MP1_CPUCFG_64BIT_SHIFT 28
|
||||
#define MP0_CPUCFG_64BIT (U(0xf) << MP0_CPUCFG_64BIT_SHIFT)
|
||||
#define MP1_CPUCFG_64BIT (U(0xf) << MP1_CPUCFG_64BIT_SHIFT)
|
||||
|
||||
/* scu related */
|
||||
enum {
|
||||
MP0_ACINACTM_SHIFT = 4,
|
||||
MP1_ACINACTM_SHIFT = 0,
|
||||
MP0_ACINACTM = 1 << MP0_ACINACTM_SHIFT,
|
||||
MP1_ACINACTM = 1 << MP1_ACINACTM_SHIFT
|
||||
};
|
||||
|
||||
enum {
|
||||
MP1_DIS_RGU0_WAIT_PD_CPUS_L1_ACK_SHIFT = 0,
|
||||
MP1_DIS_RGU1_WAIT_PD_CPUS_L1_ACK_SHIFT = 4,
|
||||
MP1_DIS_RGU2_WAIT_PD_CPUS_L1_ACK_SHIFT = 8,
|
||||
MP1_DIS_RGU3_WAIT_PD_CPUS_L1_ACK_SHIFT = 12,
|
||||
MP1_DIS_RGU_NOCPU_WAIT_PD_CPUS_L1_ACK_SHIFT = 16,
|
||||
|
||||
MP1_DIS_RGU0_WAIT_PD_CPUS_L1_ACK =
|
||||
0xf << MP1_DIS_RGU0_WAIT_PD_CPUS_L1_ACK_SHIFT,
|
||||
MP1_DIS_RGU1_WAIT_PD_CPUS_L1_ACK =
|
||||
0xf << MP1_DIS_RGU1_WAIT_PD_CPUS_L1_ACK_SHIFT,
|
||||
MP1_DIS_RGU2_WAIT_PD_CPUS_L1_ACK =
|
||||
0xf << MP1_DIS_RGU2_WAIT_PD_CPUS_L1_ACK_SHIFT,
|
||||
MP1_DIS_RGU3_WAIT_PD_CPUS_L1_ACK =
|
||||
0xf << MP1_DIS_RGU3_WAIT_PD_CPUS_L1_ACK_SHIFT,
|
||||
MP1_DIS_RGU_NOCPU_WAIT_PD_CPUS_L1_ACK =
|
||||
0xf << MP1_DIS_RGU_NOCPU_WAIT_PD_CPUS_L1_ACK_SHIFT
|
||||
};
|
||||
|
||||
enum {
|
||||
MP1_AINACTS_SHIFT = 4,
|
||||
MP1_AINACTS = 1 << MP1_AINACTS_SHIFT
|
||||
};
|
||||
|
||||
enum {
|
||||
MP1_SW_CG_GEN_SHIFT = 12,
|
||||
MP1_SW_CG_GEN = 1 << MP1_SW_CG_GEN_SHIFT
|
||||
};
|
||||
|
||||
enum {
|
||||
MP1_L2RSTDISABLE_SHIFT = 14,
|
||||
MP1_L2RSTDISABLE = 1 << MP1_L2RSTDISABLE_SHIFT
|
||||
};
|
||||
|
||||
#endif /* MCUCFG_H */
|
|
@ -1,85 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <drivers/arm/cci.h>
|
||||
#include <platform_def.h>
|
||||
|
||||
.section .rodata.gic_reg_name, "aS"
|
||||
gicc_regs:
|
||||
.asciz "gicc_hppir", "gicc_ahppir", "gicc_ctlr", ""
|
||||
gicd_pend_reg:
|
||||
.asciz "gicd_ispendr regs (Offsets 0x200 - 0x278)\n" \
|
||||
" Offset:\t\t\tvalue\n"
|
||||
newline:
|
||||
.asciz "\n"
|
||||
spacer:
|
||||
.asciz ":\t\t0x"
|
||||
|
||||
/* ---------------------------------------------
|
||||
* The below macro prints out relevant GIC
|
||||
* registers whenever an unhandled exception is
|
||||
* taken in BL3-1.
|
||||
* Clobbers: x0 - x10, x16, x17, sp
|
||||
* ---------------------------------------------
|
||||
*/
|
||||
.macro plat_crash_print_regs
|
||||
mov_imm x16, BASE_GICD_BASE
|
||||
mov_imm x17, BASE_GICC_BASE
|
||||
/* Load the gicc reg list to x6 */
|
||||
adr x6, gicc_regs
|
||||
/* Load the gicc regs to gp regs used by str_in_crash_buf_print */
|
||||
ldr w8, [x17, #GICC_HPPIR]
|
||||
ldr w9, [x17, #GICC_AHPPIR]
|
||||
ldr w10, [x17, #GICC_CTLR]
|
||||
/* Store to the crash buf and print to console */
|
||||
bl str_in_crash_buf_print
|
||||
|
||||
/* Print the GICD_ISPENDR regs */
|
||||
add x7, x16, #GICD_ISPENDR
|
||||
adr x4, gicd_pend_reg
|
||||
bl asm_print_str
|
||||
gicd_ispendr_loop:
|
||||
sub x4, x7, x16
|
||||
cmp x4, #0x280
|
||||
b.eq exit_print_gic_regs
|
||||
bl asm_print_hex
|
||||
|
||||
adr x4, spacer
|
||||
bl asm_print_str
|
||||
|
||||
ldr x4, [x7], #8
|
||||
bl asm_print_hex
|
||||
|
||||
adr x4, newline
|
||||
bl asm_print_str
|
||||
b gicd_ispendr_loop
|
||||
exit_print_gic_regs:
|
||||
.endm
|
||||
|
||||
.section .rodata.cci_reg_name, "aS"
|
||||
cci_iface_regs:
|
||||
.asciz "cci_snoop_ctrl_cluster0", "cci_snoop_ctrl_cluster1" , ""
|
||||
|
||||
/* ------------------------------------------------
|
||||
* The below macro prints out relevant interconnect
|
||||
* registers whenever an unhandled exception is
|
||||
* taken in BL3-1.
|
||||
* Clobbers: x0 - x9, sp
|
||||
* ------------------------------------------------
|
||||
*/
|
||||
.macro plat_print_interconnect_regs
|
||||
adr x6, cci_iface_regs
|
||||
/* Store in x7 the base address of the first interface */
|
||||
mov_imm x7, (PLAT_MT_CCI_BASE + SLAVE_IFACE_OFFSET( \
|
||||
PLAT_MT_CCI_CLUSTER0_SL_IFACE_IX))
|
||||
ldr w8, [x7, #SNOOP_CTRL_REG]
|
||||
/* Store in x7 the base address of the second interface */
|
||||
mov_imm x7, (PLAT_MT_CCI_BASE + SLAVE_IFACE_OFFSET( \
|
||||
PLAT_MT_CCI_CLUSTER1_SL_IFACE_IX))
|
||||
ldr w9, [x7, #SNOOP_CTRL_REG]
|
||||
/* Store to the crash buf and print to console */
|
||||
bl str_in_crash_buf_print
|
||||
.endm
|
|
@ -1,38 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#ifndef PLAT_PRIVATE_H
|
||||
#define PLAT_PRIVATE_H
|
||||
|
||||
#include <stdint.h>
|
||||
|
||||
#include <lib/xlat_tables/xlat_tables.h>
|
||||
|
||||
void plat_configure_mmu_el3(unsigned long total_base,
|
||||
unsigned long total_size,
|
||||
unsigned long,
|
||||
unsigned long,
|
||||
unsigned long,
|
||||
unsigned long);
|
||||
|
||||
void plat_cci_init(void);
|
||||
void plat_cci_enable(void);
|
||||
void plat_cci_disable(void);
|
||||
|
||||
/* Declarations for plat_mt_gic.c */
|
||||
void plat_mt_gic_init(void);
|
||||
|
||||
/* Declarations for plat_topology.c */
|
||||
int mt_setup_topology(void);
|
||||
void plat_delay_timer_init(void);
|
||||
|
||||
void plat_mt_gic_driver_init(void);
|
||||
void plat_mt_gic_init(void);
|
||||
void plat_mt_gic_cpuif_enable(void);
|
||||
void plat_mt_gic_cpuif_disable(void);
|
||||
void plat_mt_gic_pcpu_init(void);
|
||||
|
||||
#endif /* PLAT_PRIVATE_H */
|
|
@ -1,15 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#ifndef PLAT_SIP_CALLS_H
|
||||
#define PLAT_SIP_CALLS_H
|
||||
|
||||
/*******************************************************************************
|
||||
* Plat SiP function constants
|
||||
******************************************************************************/
|
||||
#define MTK_PLAT_SIP_NUM_CALLS 0
|
||||
|
||||
#endif /* PLAT_SIP_CALLS_H */
|
|
@ -1,238 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016-2019, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#ifndef PLATFORM_DEF_H
|
||||
#define PLATFORM_DEF_H
|
||||
|
||||
#include <lib/utils_def.h>
|
||||
|
||||
#define PLAT_PRIMARY_CPU 0x0
|
||||
|
||||
/* Special value used to verify platform parameters from BL2 to BL3-1 */
|
||||
#define MT_BL31_PLAT_PARAM_VAL 0x0f1e2d3c4b5a6978ULL
|
||||
|
||||
#define IO_PHYS (0x10000000)
|
||||
#define INFRACFG_AO_BASE (IO_PHYS + 0x1000)
|
||||
#define MCUCFG_BASE (IO_PHYS + 0x200000)
|
||||
#define PERI_BASE (IO_PHYS + 0x1000000)
|
||||
|
||||
|
||||
#define GPIO_BASE (IO_PHYS + 0x370000)
|
||||
#define SPM_BASE (IO_PHYS + 0x6000)
|
||||
#define RGU_BASE (MCUCFG_BASE + 0x11000)
|
||||
#define PMIC_WRAP_BASE (IO_PHYS + 0x10000)
|
||||
|
||||
#define TRNG_base (MCUCFG_BASE + 0x230000)
|
||||
#define MT_GIC_BASE (0x10220000)
|
||||
#define MCU_SYS_SIZE (0x700000)
|
||||
#define PLAT_MT_CCI_BASE (IO_PHYS + 0x390000)
|
||||
|
||||
/* Aggregate of all devices in the first GB */
|
||||
#define MTK_DEV_RNG0_BASE IO_PHYS
|
||||
#define MTK_DEV_RNG0_SIZE 0x400000
|
||||
#define MTK_DEV_RNG1_BASE (PERI_BASE)
|
||||
#define MTK_DEV_RNG1_SIZE 0x4000000
|
||||
|
||||
/*******************************************************************************
|
||||
* UART related constants
|
||||
******************************************************************************/
|
||||
#define UART0_BASE (PERI_BASE + 0x2000)
|
||||
|
||||
#define UART_BAUDRATE (921600)
|
||||
#define UART_CLOCK (26000000)
|
||||
|
||||
/*******************************************************************************
|
||||
* System counter frequency related constants
|
||||
******************************************************************************/
|
||||
#define SYS_COUNTER_FREQ_IN_TICKS 13000000
|
||||
#define SYS_COUNTER_FREQ_IN_MHZ (SYS_COUNTER_FREQ_IN_TICKS/1000000)
|
||||
|
||||
/*******************************************************************************
|
||||
* GIC-400 & interrupt handling related constants
|
||||
******************************************************************************/
|
||||
|
||||
/* Base MTK_platform compatible GIC memory map */
|
||||
#define BASE_GICD_BASE (MT_GIC_BASE+0x1000)
|
||||
#define BASE_GICC_BASE (MT_GIC_BASE + 0x2000)
|
||||
#define BASE_GICR_BASE (MT_GIC_BASE + 0x200000)
|
||||
#define BASE_GICH_BASE (MT_GIC_BASE + 0x4000)
|
||||
#define BASE_GICV_BASE (MT_GIC_BASE + 0x6000)
|
||||
|
||||
#define INT_POL_CTL0 0x10200620
|
||||
#define GIC_PRIVATE_SIGNALS (32)
|
||||
|
||||
/*******************************************************************************
|
||||
* CCI-400 related constants
|
||||
******************************************************************************/
|
||||
#define PLAT_MT_CCI_CLUSTER0_SL_IFACE_IX 4
|
||||
#define PLAT_MT_CCI_CLUSTER1_SL_IFACE_IX 3
|
||||
|
||||
/*******************************************************************************
|
||||
* WDT Registers
|
||||
******************************************************************************/
|
||||
#define MTK_WDT_BASE (RGU_BASE)
|
||||
#define MTK_WDT_SIZE (0x1000)
|
||||
#define MTK_WDT_MODE (MTK_WDT_BASE+0x0000)
|
||||
#define MTK_WDT_LENGTH (MTK_WDT_BASE+0x0004)
|
||||
#define MTK_WDT_RESTART (MTK_WDT_BASE+0x0008)
|
||||
#define MTK_WDT_STATUS (MTK_WDT_BASE+0x000C)
|
||||
#define MTK_WDT_INTERVAL (MTK_WDT_BASE+0x0010)
|
||||
#define MTK_WDT_SWRST (MTK_WDT_BASE+0x0014)
|
||||
#define MTK_WDT_SWSYSRST (MTK_WDT_BASE+0x0018)
|
||||
#define MTK_WDT_NONRST_REG (MTK_WDT_BASE+0x0020)
|
||||
#define MTK_WDT_NONRST_REG2 (MTK_WDT_BASE+0x0024)
|
||||
#define MTK_WDT_REQ_MODE (MTK_WDT_BASE+0x0030)
|
||||
#define MTK_WDT_REQ_IRQ_EN (MTK_WDT_BASE+0x0034)
|
||||
#define MTK_WDT_DEBUG_CTL (MTK_WDT_BASE+0x0040)
|
||||
|
||||
/*WDT_STATUS*/
|
||||
#define MTK_WDT_STATUS_HWWDT_RST (0x80000000)
|
||||
#define MTK_WDT_STATUS_SWWDT_RST (0x40000000)
|
||||
#define MTK_WDT_STATUS_IRQWDT_RST (0x20000000)
|
||||
#define MTK_WDT_STATUS_DEBUGWDT_RST (0x00080000)
|
||||
#define MTK_WDT_STATUS_SPMWDT_RST (0x0002)
|
||||
#define MTK_WDT_STATUS_SPM_THERMAL_RST (0x0001)
|
||||
#define MTK_WDT_STATUS_THERMAL_DIRECT_RST (1<<18)
|
||||
#define MTK_WDT_STATUS_SECURITY_RST (1<<28)
|
||||
|
||||
#define MTK_WDT_MODE_DUAL_MODE 0x0040
|
||||
#define MTK_WDT_MODE_IRQ 0x0008
|
||||
#define MTK_WDT_MODE_KEY 0x22000000
|
||||
#define MTK_WDT_MODE_EXTEN 0x0004
|
||||
#define MTK_WDT_SWRST_KEY 0x1209
|
||||
#define MTK_WDT_RESTART_KEY (0x1971)
|
||||
|
||||
/* FIQ platform related define */
|
||||
#define MT_IRQ_SEC_SGI_0 8
|
||||
#define MT_IRQ_SEC_SGI_1 9
|
||||
#define MT_IRQ_SEC_SGI_2 10
|
||||
#define MT_IRQ_SEC_SGI_3 11
|
||||
#define MT_IRQ_SEC_SGI_4 12
|
||||
#define MT_IRQ_SEC_SGI_5 13
|
||||
#define MT_IRQ_SEC_SGI_6 14
|
||||
#define MT_IRQ_SEC_SGI_7 15
|
||||
|
||||
#define FIQ_SMP_CALL_SGI MT_IRQ_SEC_SGI_5
|
||||
|
||||
/*******************************************************************************
|
||||
* Platform binary types for linking
|
||||
******************************************************************************/
|
||||
#define PLATFORM_LINKER_FORMAT "elf64-littleaarch64"
|
||||
#define PLATFORM_LINKER_ARCH aarch64
|
||||
|
||||
/*******************************************************************************
|
||||
* Generic platform constants
|
||||
******************************************************************************/
|
||||
|
||||
/* Size of cacheable stacks */
|
||||
#if defined(IMAGE_BL1)
|
||||
#define PLATFORM_STACK_SIZE 0x440
|
||||
#elif defined(IMAGE_BL2)
|
||||
#define PLATFORM_STACK_SIZE 0x400
|
||||
#elif defined(IMAGE_BL31)
|
||||
#define PLATFORM_STACK_SIZE 0x800
|
||||
#elif defined(IMAGE_BL32)
|
||||
#define PLATFORM_STACK_SIZE 0x440
|
||||
#endif
|
||||
|
||||
#define FIRMWARE_WELCOME_STR "Booting Trusted Firmware\n"
|
||||
#define PLAT_MAX_PWR_LVL U(2) /* MPIDR_AFFLVL2 */
|
||||
|
||||
#define PLAT_MAX_RET_STATE U(1)
|
||||
#define PLAT_MAX_OFF_STATE U(2)
|
||||
|
||||
#define PLATFORM_CACHE_LINE_SIZE 64
|
||||
#define PLATFORM_SYSTEM_COUNT U(1)
|
||||
#define PLATFORM_CLUSTER_COUNT U(2)
|
||||
#define PLATFORM_CLUSTER0_CORE_COUNT U(4)
|
||||
#define PLATFORM_CLUSTER1_CORE_COUNT U(4)
|
||||
#define PLATFORM_CORE_COUNT (PLATFORM_CLUSTER1_CORE_COUNT + \
|
||||
PLATFORM_CLUSTER0_CORE_COUNT)
|
||||
#define PLATFORM_MAX_CPUS_PER_CLUSTER U(4)
|
||||
#define PLATFORM_NUM_AFFS (PLATFORM_SYSTEM_COUNT + \
|
||||
PLATFORM_CLUSTER_COUNT + \
|
||||
PLATFORM_CORE_COUNT)
|
||||
|
||||
/*******************************************************************************
|
||||
* Platform memory map related constants
|
||||
******************************************************************************/
|
||||
/* ATF Argument */
|
||||
#define ATF_ARG_SIZE (0x800)
|
||||
|
||||
/* TF txet, ro, rw, internal SRAM, Size: release: 80KB, debug: 92KB */
|
||||
#define TZRAM_BASE (0x110000)
|
||||
#if DEBUG
|
||||
#define TZRAM_SIZE (0x1C400)
|
||||
#else
|
||||
#define TZRAM_SIZE (0x1C400)
|
||||
#endif
|
||||
#define TZRAM2_BASE 0x00100000
|
||||
#define TZRAM2_SIZE 0xDC00
|
||||
#define TZRAM2_LIMIT (TZRAM2_BASE + TZRAM2_SIZE)
|
||||
|
||||
#define RAM_CONSOLE_BASE 0x0012D000
|
||||
#define RAM_CONSOLE_SIZE 0x00001000
|
||||
/*******************************************************************************
|
||||
* BL31 specific defines.
|
||||
******************************************************************************/
|
||||
/*
|
||||
* Put BL3-1 at the top of the Trusted SRAM (just below the shared memory, if
|
||||
* present). BL31_BASE is calculated using the current BL3-1 debug size plus a
|
||||
* little space for growth.
|
||||
*/
|
||||
#define BL31_BASE (TZRAM_BASE + 0x1000)
|
||||
#define BL31_LIMIT (TZRAM_BASE + TZRAM_SIZE)
|
||||
#define BSS1_STACK_LIMIT (TZRAM_BASE + TZRAM_SIZE)
|
||||
#define BL31_TZRAM_SIZE (TZRAM_SIZE - ATF_ARG_SIZE)
|
||||
|
||||
/*******************************************************************************
|
||||
* Platform specific page table and MMU setup constants
|
||||
******************************************************************************/
|
||||
#define PLAT_VIRT_ADDR_SPACE_SIZE (1ULL << 32)
|
||||
#define PLAT_PHY_ADDR_SPACE_SIZE (1ULL << 32)
|
||||
#define MAX_XLAT_TABLES 7
|
||||
#define MAX_MMAP_REGIONS 16
|
||||
|
||||
|
||||
/*******************************************************************************
|
||||
* CCI-400 related constants
|
||||
******************************************************************************/
|
||||
#define CCI400_BASE 0x10390000
|
||||
#define CCI400_SL_IFACE_CLUSTER0 4
|
||||
#define CCI400_SL_IFACE_CLUSTER1 3
|
||||
#define CCI400_SL_IFACE_INDEX(mpidr) (mpidr & MPIDR_CLUSTER_MASK ? \
|
||||
CCI400_SL_IFACE_CLUSTER1 : \
|
||||
CCI400_SL_IFACE_CLUSTER0)
|
||||
#define CCI_SEC_ACCESS_OFFSET (0x8)
|
||||
|
||||
|
||||
/*******************************************************************************
|
||||
* Declarations and constants to access the mailboxes safely. Each mailbox is
|
||||
* aligned on the biggest cache line size in the platform. This is known only
|
||||
* to the platform as it might have a combination of integrated and external
|
||||
* caches. Such alignment ensures that two maiboxes do not sit on the same cache
|
||||
* line at any cache level. They could belong to different cpus/clusters &
|
||||
* get written while being protected by different locks causing corruption of
|
||||
* a valid mailbox address.
|
||||
******************************************************************************/
|
||||
#define CACHE_WRITEBACK_SHIFT 6
|
||||
#define CACHE_WRITEBACK_GRANULE (1 << CACHE_WRITEBACK_SHIFT)
|
||||
|
||||
#define BL32_BASE (0x0)
|
||||
|
||||
/*
|
||||
* Load address of BL3-3 for this platform port
|
||||
*/
|
||||
#define LK_SIZE_LIMIT (0x100000)
|
||||
#define PLAT_MTK_NS_IMAGE_OFFSET (0x41E00000)
|
||||
/* 16KB */
|
||||
#define ATF_AEE_BUFFER_SIZE (0x4000)
|
||||
#define PAGE_SIZE_2MB_MASK (PAGE_SIZE_2MB - 1)
|
||||
#define IS_PAGE_2MB_ALIGNED(addr) (((addr) & PAGE_SIZE_2MB_MASK) == 0)
|
||||
#define PAGE_SIZE_2MB (1 << PAGE_SIZE_2MB_SHIFT)
|
||||
#define PAGE_SIZE_2MB_SHIFT TWO_MB_SHIFT
|
||||
|
||||
#endif /* PLATFORM_DEF_H */
|
|
@ -1,19 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#ifndef POWER_TRACER_H
|
||||
#define POWER_TRACER_H
|
||||
|
||||
#define CPU_UP 0
|
||||
#define CPU_DOWN 1
|
||||
#define CPU_SUSPEND 2
|
||||
#define CLUSTER_UP 3
|
||||
#define CLUSTER_DOWN 4
|
||||
#define CLUSTER_SUSPEND 5
|
||||
|
||||
void trace_power_flow(unsigned long mpidr, unsigned char mode);
|
||||
|
||||
#endif /* POWER_TRACER_H */
|
|
@ -1,13 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#ifndef SCU_H
|
||||
#define SCU_H
|
||||
|
||||
void disable_scu(unsigned long mpidr);
|
||||
void enable_scu(unsigned long mpidr);
|
||||
|
||||
#endif /* SCU_H */
|
|
@ -1,198 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#ifndef SPM_H
|
||||
#define SPM_H
|
||||
|
||||
#define SPM_POWERON_CONFIG_SET (SPM_BASE + 0x000)
|
||||
#define SPM_POWER_ON_VAL0 (SPM_BASE + 0x010)
|
||||
#define SPM_POWER_ON_VAL1 (SPM_BASE + 0x014)
|
||||
#define SPM_CLK_SETTLE (SPM_BASE + 0x100)
|
||||
#define SPM_CA7_CPU1_PWR_CON (SPM_BASE + 0x218)
|
||||
#define SPM_CA7_CPU2_PWR_CON (SPM_BASE + 0x21c)
|
||||
#define SPM_CA7_CPU3_PWR_CON (SPM_BASE + 0x220)
|
||||
#define SPM_CA7_CPU1_L1_PDN (SPM_BASE + 0x264)
|
||||
#define SPM_CA7_CPU2_L1_PDN (SPM_BASE + 0x26c)
|
||||
#define SPM_CA7_CPU3_L1_PDN (SPM_BASE + 0x274)
|
||||
#define SPM_MD32_SRAM_CON (SPM_BASE + 0x2c8)
|
||||
#define SPM_PCM_CON0 (SPM_BASE + 0x310)
|
||||
#define SPM_PCM_CON1 (SPM_BASE + 0x314)
|
||||
#define SPM_PCM_IM_PTR (SPM_BASE + 0x318)
|
||||
#define SPM_PCM_IM_LEN (SPM_BASE + 0x31c)
|
||||
#define SPM_PCM_REG_DATA_INI (SPM_BASE + 0x320)
|
||||
#define SPM_PCM_EVENT_VECTOR0 (SPM_BASE + 0x340)
|
||||
#define SPM_PCM_EVENT_VECTOR1 (SPM_BASE + 0x344)
|
||||
#define SPM_PCM_EVENT_VECTOR2 (SPM_BASE + 0x348)
|
||||
#define SPM_PCM_EVENT_VECTOR3 (SPM_BASE + 0x34c)
|
||||
#define SPM_PCM_MAS_PAUSE_MASK (SPM_BASE + 0x354)
|
||||
#define SPM_PCM_PWR_IO_EN (SPM_BASE + 0x358)
|
||||
#define SPM_PCM_TIMER_VAL (SPM_BASE + 0x35c)
|
||||
#define SPM_PCM_TIMER_OUT (SPM_BASE + 0x360)
|
||||
#define SPM_PCM_REG0_DATA (SPM_BASE + 0x380)
|
||||
#define SPM_PCM_REG1_DATA (SPM_BASE + 0x384)
|
||||
#define SPM_PCM_REG2_DATA (SPM_BASE + 0x388)
|
||||
#define SPM_PCM_REG3_DATA (SPM_BASE + 0x38c)
|
||||
#define SPM_PCM_REG4_DATA (SPM_BASE + 0x390)
|
||||
#define SPM_PCM_REG5_DATA (SPM_BASE + 0x394)
|
||||
#define SPM_PCM_REG6_DATA (SPM_BASE + 0x398)
|
||||
#define SPM_PCM_REG7_DATA (SPM_BASE + 0x39c)
|
||||
#define SPM_PCM_REG8_DATA (SPM_BASE + 0x3a0)
|
||||
#define SPM_PCM_REG9_DATA (SPM_BASE + 0x3a4)
|
||||
#define SPM_PCM_REG10_DATA (SPM_BASE + 0x3a8)
|
||||
#define SPM_PCM_REG11_DATA (SPM_BASE + 0x3ac)
|
||||
#define SPM_PCM_REG12_DATA (SPM_BASE + 0x3b0)
|
||||
#define SPM_PCM_REG13_DATA (SPM_BASE + 0x3b4)
|
||||
#define SPM_PCM_REG14_DATA (SPM_BASE + 0x3b8)
|
||||
#define SPM_PCM_REG15_DATA (SPM_BASE + 0x3bc)
|
||||
#define SPM_PCM_EVENT_REG_STA (SPM_BASE + 0x3c0)
|
||||
#define SPM_PCM_FSM_STA (SPM_BASE + 0x3c4)
|
||||
#define SPM_PCM_IM_HOST_RW_PTR (SPM_BASE + 0x3c8)
|
||||
#define SPM_PCM_IM_HOST_RW_DAT (SPM_BASE + 0x3cc)
|
||||
#define SPM_PCM_EVENT_VECTOR4 (SPM_BASE + 0x3d0)
|
||||
#define SPM_PCM_EVENT_VECTOR5 (SPM_BASE + 0x3d4)
|
||||
#define SPM_PCM_EVENT_VECTOR6 (SPM_BASE + 0x3d8)
|
||||
#define SPM_PCM_EVENT_VECTOR7 (SPM_BASE + 0x3dc)
|
||||
#define SPM_PCM_SW_INT_SET (SPM_BASE + 0x3e0)
|
||||
#define SPM_PCM_SW_INT_CLEAR (SPM_BASE + 0x3e4)
|
||||
#define SPM_CLK_CON (SPM_BASE + 0x400)
|
||||
#define SPM_SLEEP_PTPOD2_CON (SPM_BASE + 0x408)
|
||||
#define SPM_APMCU_PWRCTL (SPM_BASE + 0x600)
|
||||
#define SPM_AP_DVFS_CON_SET (SPM_BASE + 0x604)
|
||||
#define SPM_AP_STANBY_CON (SPM_BASE + 0x608)
|
||||
#define SPM_PWR_STATUS (SPM_BASE + 0x60c)
|
||||
#define SPM_PWR_STATUS_2ND (SPM_BASE + 0x610)
|
||||
#define SPM_AP_BSI_REQ (SPM_BASE + 0x614)
|
||||
#define SPM_SLEEP_TIMER_STA (SPM_BASE + 0x720)
|
||||
#define SPM_SLEEP_WAKEUP_EVENT_MASK (SPM_BASE + 0x810)
|
||||
#define SPM_SLEEP_CPU_WAKEUP_EVENT (SPM_BASE + 0x814)
|
||||
#define SPM_SLEEP_MD32_WAKEUP_EVENT_MASK (SPM_BASE + 0x818)
|
||||
#define SPM_PCM_WDT_TIMER_VAL (SPM_BASE + 0x824)
|
||||
#define SPM_PCM_WDT_TIMER_OUT (SPM_BASE + 0x828)
|
||||
#define SPM_PCM_MD32_MAILBOX (SPM_BASE + 0x830)
|
||||
#define SPM_PCM_MD32_IRQ (SPM_BASE + 0x834)
|
||||
#define SPM_SLEEP_ISR_MASK (SPM_BASE + 0x900)
|
||||
#define SPM_SLEEP_ISR_STATUS (SPM_BASE + 0x904)
|
||||
#define SPM_SLEEP_ISR_RAW_STA (SPM_BASE + 0x910)
|
||||
#define SPM_SLEEP_MD32_ISR_RAW_STA (SPM_BASE + 0x914)
|
||||
#define SPM_SLEEP_WAKEUP_MISC (SPM_BASE + 0x918)
|
||||
#define SPM_SLEEP_BUS_PROTECT_RDY (SPM_BASE + 0x91c)
|
||||
#define SPM_SLEEP_SUBSYS_IDLE_STA (SPM_BASE + 0x920)
|
||||
#define SPM_PCM_RESERVE (SPM_BASE + 0xb00)
|
||||
#define SPM_PCM_RESERVE2 (SPM_BASE + 0xb04)
|
||||
#define SPM_PCM_FLAGS (SPM_BASE + 0xb08)
|
||||
#define SPM_PCM_SRC_REQ (SPM_BASE + 0xb0c)
|
||||
#define SPM_PCM_DEBUG_CON (SPM_BASE + 0xb20)
|
||||
#define SPM_CA7_CPU0_IRQ_MASK (SPM_BASE + 0xb30)
|
||||
#define SPM_CA7_CPU1_IRQ_MASK (SPM_BASE + 0xb34)
|
||||
#define SPM_CA7_CPU2_IRQ_MASK (SPM_BASE + 0xb38)
|
||||
#define SPM_CA7_CPU3_IRQ_MASK (SPM_BASE + 0xb3c)
|
||||
#define SPM_CA15_CPU0_IRQ_MASK (SPM_BASE + 0xb40)
|
||||
#define SPM_CA15_CPU1_IRQ_MASK (SPM_BASE + 0xb44)
|
||||
#define SPM_CA15_CPU2_IRQ_MASK (SPM_BASE + 0xb48)
|
||||
#define SPM_CA15_CPU3_IRQ_MASK (SPM_BASE + 0xb4c)
|
||||
#define SPM_PCM_PASR_DPD_0 (SPM_BASE + 0xb60)
|
||||
#define SPM_PCM_PASR_DPD_1 (SPM_BASE + 0xb64)
|
||||
#define SPM_PCM_PASR_DPD_2 (SPM_BASE + 0xb68)
|
||||
#define SPM_PCM_PASR_DPD_3 (SPM_BASE + 0xb6c)
|
||||
#define SPM_SLEEP_CA7_WFI0_EN (SPM_BASE + 0xf00)
|
||||
#define SPM_SLEEP_CA7_WFI1_EN (SPM_BASE + 0xf04)
|
||||
#define SPM_SLEEP_CA7_WFI2_EN (SPM_BASE + 0xf08)
|
||||
#define SPM_SLEEP_CA7_WFI3_EN (SPM_BASE + 0xf0c)
|
||||
#define SPM_SLEEP_CA15_WFI0_EN (SPM_BASE + 0xf10)
|
||||
#define SPM_SLEEP_CA15_WFI1_EN (SPM_BASE + 0xf14)
|
||||
#define SPM_SLEEP_CA15_WFI2_EN (SPM_BASE + 0xf18)
|
||||
#define SPM_SLEEP_CA15_WFI3_EN (SPM_BASE + 0xf1c)
|
||||
|
||||
#define SPM_PROJECT_CODE 0xb16
|
||||
|
||||
#define SPM_REGWR_EN (1U << 0)
|
||||
#define SPM_REGWR_CFG_KEY (SPM_PROJECT_CODE << 16)
|
||||
|
||||
#define SPM_CPU_PDN_DIS (1U << 0)
|
||||
#define SPM_INFRA_PDN_DIS (1U << 1)
|
||||
#define SPM_DDRPHY_PDN_DIS (1U << 2)
|
||||
#define SPM_DUALVCORE_PDN_DIS (1U << 3)
|
||||
#define SPM_PASR_DIS (1U << 4)
|
||||
#define SPM_DPD_DIS (1U << 5)
|
||||
#define SPM_SODI_DIS (1U << 6)
|
||||
#define SPM_MEMPLL_RESET (1U << 7)
|
||||
#define SPM_MAINPLL_PDN_DIS (1U << 8)
|
||||
#define SPM_CPU_DVS_DIS (1U << 9)
|
||||
#define SPM_CPU_DORMANT (1U << 10)
|
||||
#define SPM_EXT_VSEL_GPIO103 (1U << 11)
|
||||
#define SPM_DDR_HIGH_SPEED (1U << 12)
|
||||
#define SPM_OPT (1U << 13)
|
||||
|
||||
#define POWER_ON_VAL1_DEF 0x01011820
|
||||
#define PCM_FSM_STA_DEF 0x48490
|
||||
#define PCM_END_FSM_STA_DEF 0x08490
|
||||
#define PCM_END_FSM_STA_MASK 0x3fff0
|
||||
#define PCM_HANDSHAKE_SEND1 0xbeefbeef
|
||||
|
||||
#define PCM_WDT_TIMEOUT (30 * 32768)
|
||||
#define PCM_TIMER_MAX (0xffffffff - PCM_WDT_TIMEOUT)
|
||||
|
||||
#define CON0_PCM_KICK (1U << 0)
|
||||
#define CON0_IM_KICK (1U << 1)
|
||||
#define CON0_IM_SLEEP_DVS (1U << 3)
|
||||
#define CON0_PCM_SW_RESET (1U << 15)
|
||||
#define CON0_CFG_KEY (SPM_PROJECT_CODE << 16)
|
||||
|
||||
#define CON1_IM_SLAVE (1U << 0)
|
||||
#define CON1_MIF_APBEN (1U << 3)
|
||||
#define CON1_PCM_TIMER_EN (1U << 5)
|
||||
#define CON1_IM_NONRP_EN (1U << 6)
|
||||
#define CON1_PCM_WDT_EN (1U << 8)
|
||||
#define CON1_PCM_WDT_WAKE_MODE (1U << 9)
|
||||
#define CON1_SPM_SRAM_SLP_B (1U << 10)
|
||||
#define CON1_SPM_SRAM_ISO_B (1U << 11)
|
||||
#define CON1_EVENT_LOCK_EN (1U << 12)
|
||||
#define CON1_CFG_KEY (SPM_PROJECT_CODE << 16)
|
||||
|
||||
#define PCM_PWRIO_EN_R0 (1U << 0)
|
||||
#define PCM_PWRIO_EN_R7 (1U << 7)
|
||||
#define PCM_RF_SYNC_R0 (1U << 16)
|
||||
#define PCM_RF_SYNC_R2 (1U << 18)
|
||||
#define PCM_RF_SYNC_R6 (1U << 22)
|
||||
#define PCM_RF_SYNC_R7 (1U << 23)
|
||||
|
||||
#define CC_SYSCLK0_EN_0 (1U << 0)
|
||||
#define CC_SYSCLK0_EN_1 (1U << 1)
|
||||
#define CC_SYSCLK1_EN_0 (1U << 2)
|
||||
#define CC_SYSCLK1_EN_1 (1U << 3)
|
||||
#define CC_SYSSETTLE_SEL (1U << 4)
|
||||
#define CC_LOCK_INFRA_DCM (1U << 5)
|
||||
#define CC_SRCLKENA_MASK_0 (1U << 6)
|
||||
#define CC_CXO32K_RM_EN_MD1 (1U << 9)
|
||||
#define CC_CXO32K_RM_EN_MD2 (1U << 10)
|
||||
#define CC_CLKSQ1_SEL (1U << 12)
|
||||
#define CC_DISABLE_DORM_PWR (1U << 14)
|
||||
#define CC_MD32_DCM_EN (1U << 18)
|
||||
|
||||
#define WFI_OP_AND 1
|
||||
#define WFI_OP_OR 0
|
||||
|
||||
#define WAKE_MISC_PCM_TIMER (1U << 19)
|
||||
#define WAKE_MISC_CPU_WAKE (1U << 20)
|
||||
|
||||
/* define WAKE_SRC_XXX */
|
||||
#define WAKE_SRC_SPM_MERGE (1 << 0)
|
||||
#define WAKE_SRC_KP (1 << 2)
|
||||
#define WAKE_SRC_WDT (1 << 3)
|
||||
#define WAKE_SRC_GPT (1 << 4)
|
||||
#define WAKE_SRC_EINT (1 << 6)
|
||||
#define WAKE_SRC_LOW_BAT (1 << 9)
|
||||
#define WAKE_SRC_MD32 (1 << 10)
|
||||
#define WAKE_SRC_USB_CD (1 << 14)
|
||||
#define WAKE_SRC_USB_PDN (1 << 15)
|
||||
#define WAKE_SRC_AFE (1 << 20)
|
||||
#define WAKE_SRC_THERM (1 << 21)
|
||||
#define WAKE_SRC_SYSPWREQ (1 << 24)
|
||||
#define WAKE_SRC_SEJ (1 << 27)
|
||||
#define WAKE_SRC_ALL_MD32 (1 << 28)
|
||||
#define WAKE_SRC_CPU_IRQ (1 << 29)
|
||||
|
||||
#endif /* SPM_H */
|
|
@ -1,31 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <platform_def.h>
|
||||
|
||||
#include <arch_helpers.h>
|
||||
#include <drivers/delay_timer.h>
|
||||
|
||||
static uint32_t plat_get_timer_value(void)
|
||||
{
|
||||
/*
|
||||
* Generic delay timer implementation expects the timer to be a down
|
||||
* counter. We apply bitwise NOT operator to the tick values returned
|
||||
* by read_cntpct_el0() to simulate the down counter.
|
||||
*/
|
||||
return (uint32_t)(~read_cntpct_el0());
|
||||
}
|
||||
|
||||
static const timer_ops_t plat_timer_ops = {
|
||||
.get_timer_value = plat_get_timer_value,
|
||||
.clk_mult = 1,
|
||||
.clk_div = SYS_COUNTER_FREQ_IN_MHZ,
|
||||
};
|
||||
|
||||
void plat_delay_timer_init(void)
|
||||
{
|
||||
timer_init(&plat_timer_ops);
|
||||
}
|
|
@ -1,50 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016-2018, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <platform_def.h>
|
||||
|
||||
#include <common/interrupt_props.h>
|
||||
#include <drivers/arm/gicv2.h>
|
||||
#include <plat/common/platform.h>
|
||||
|
||||
static const interrupt_prop_t g0_interrupt_props[] = {
|
||||
INTR_PROP_DESC(FIQ_SMP_CALL_SGI, GIC_HIGHEST_SEC_PRIORITY,
|
||||
GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
|
||||
};
|
||||
|
||||
gicv2_driver_data_t arm_gic_data = {
|
||||
.gicd_base = BASE_GICD_BASE,
|
||||
.gicc_base = BASE_GICC_BASE,
|
||||
.interrupt_props = g0_interrupt_props,
|
||||
.interrupt_props_num = ARRAY_SIZE(g0_interrupt_props),
|
||||
};
|
||||
|
||||
void plat_mt_gic_driver_init(void)
|
||||
{
|
||||
gicv2_driver_init(&arm_gic_data);
|
||||
}
|
||||
|
||||
void plat_mt_gic_init(void)
|
||||
{
|
||||
gicv2_distif_init();
|
||||
gicv2_pcpu_distif_init();
|
||||
gicv2_cpuif_enable();
|
||||
}
|
||||
|
||||
void plat_mt_gic_cpuif_enable(void)
|
||||
{
|
||||
gicv2_cpuif_enable();
|
||||
}
|
||||
|
||||
void plat_mt_gic_cpuif_disable(void)
|
||||
{
|
||||
gicv2_cpuif_disable();
|
||||
}
|
||||
|
||||
void plat_mt_gic_pcpu_init(void)
|
||||
{
|
||||
gicv2_pcpu_distif_init();
|
||||
}
|
|
@ -1,473 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <assert.h>
|
||||
#include <errno.h>
|
||||
|
||||
#include <platform_def.h>
|
||||
|
||||
#include <arch_helpers.h>
|
||||
#include <common/debug.h>
|
||||
#include <drivers/arm/cci.h>
|
||||
#include <drivers/console.h>
|
||||
#include <lib/bakery_lock.h>
|
||||
#include <lib/mmio.h>
|
||||
#include <lib/psci/psci.h>
|
||||
|
||||
#include <mcucfg.h>
|
||||
#include <plat_private.h>
|
||||
#include <power_tracer.h>
|
||||
#include <scu.h>
|
||||
|
||||
struct core_context {
|
||||
unsigned long timer_data[8];
|
||||
unsigned int count;
|
||||
unsigned int rst;
|
||||
unsigned int abt;
|
||||
unsigned int brk;
|
||||
};
|
||||
|
||||
struct cluster_context {
|
||||
struct core_context core[PLATFORM_MAX_CPUS_PER_CLUSTER];
|
||||
};
|
||||
|
||||
/*
|
||||
* Top level structure to hold the complete context of a multi cluster system
|
||||
*/
|
||||
struct system_context {
|
||||
struct cluster_context cluster[PLATFORM_CLUSTER_COUNT];
|
||||
};
|
||||
|
||||
/*
|
||||
* Top level structure which encapsulates the context of the entire system
|
||||
*/
|
||||
static struct system_context dormant_data[1];
|
||||
|
||||
static inline struct cluster_context *system_cluster(
|
||||
struct system_context *system,
|
||||
uint32_t clusterid)
|
||||
{
|
||||
return &system->cluster[clusterid];
|
||||
}
|
||||
|
||||
static inline struct core_context *cluster_core(struct cluster_context *cluster,
|
||||
uint32_t cpuid)
|
||||
{
|
||||
return &cluster->core[cpuid];
|
||||
}
|
||||
|
||||
static struct cluster_context *get_cluster_data(unsigned long mpidr)
|
||||
{
|
||||
uint32_t clusterid;
|
||||
|
||||
clusterid = (mpidr & MPIDR_CLUSTER_MASK) >> MPIDR_AFFINITY_BITS;
|
||||
|
||||
return system_cluster(dormant_data, clusterid);
|
||||
}
|
||||
|
||||
static struct core_context *get_core_data(unsigned long mpidr)
|
||||
{
|
||||
struct cluster_context *cluster;
|
||||
uint32_t cpuid;
|
||||
|
||||
cluster = get_cluster_data(mpidr);
|
||||
cpuid = mpidr & MPIDR_CPU_MASK;
|
||||
|
||||
return cluster_core(cluster, cpuid);
|
||||
}
|
||||
|
||||
static void mt_save_generic_timer(unsigned long *container)
|
||||
{
|
||||
uint64_t ctl;
|
||||
uint64_t val;
|
||||
|
||||
__asm__ volatile("mrs %x0, cntkctl_el1\n\t"
|
||||
"mrs %x1, cntp_cval_el0\n\t"
|
||||
"stp %x0, %x1, [%2, #0]"
|
||||
: "=&r" (ctl), "=&r" (val)
|
||||
: "r" (container)
|
||||
: "memory");
|
||||
|
||||
__asm__ volatile("mrs %x0, cntp_tval_el0\n\t"
|
||||
"mrs %x1, cntp_ctl_el0\n\t"
|
||||
"stp %x0, %x1, [%2, #16]"
|
||||
: "=&r" (val), "=&r" (ctl)
|
||||
: "r" (container)
|
||||
: "memory");
|
||||
|
||||
__asm__ volatile("mrs %x0, cntv_tval_el0\n\t"
|
||||
"mrs %x1, cntv_ctl_el0\n\t"
|
||||
"stp %x0, %x1, [%2, #32]"
|
||||
: "=&r" (val), "=&r" (ctl)
|
||||
: "r" (container)
|
||||
: "memory");
|
||||
}
|
||||
|
||||
static void mt_restore_generic_timer(unsigned long *container)
|
||||
{
|
||||
uint64_t ctl;
|
||||
uint64_t val;
|
||||
|
||||
__asm__ volatile("ldp %x0, %x1, [%2, #0]\n\t"
|
||||
"msr cntkctl_el1, %x0\n\t"
|
||||
"msr cntp_cval_el0, %x1"
|
||||
: "=&r" (ctl), "=&r" (val)
|
||||
: "r" (container)
|
||||
: "memory");
|
||||
|
||||
__asm__ volatile("ldp %x0, %x1, [%2, #16]\n\t"
|
||||
"msr cntp_tval_el0, %x0\n\t"
|
||||
"msr cntp_ctl_el0, %x1"
|
||||
: "=&r" (val), "=&r" (ctl)
|
||||
: "r" (container)
|
||||
: "memory");
|
||||
|
||||
__asm__ volatile("ldp %x0, %x1, [%2, #32]\n\t"
|
||||
"msr cntv_tval_el0, %x0\n\t"
|
||||
"msr cntv_ctl_el0, %x1"
|
||||
: "=&r" (val), "=&r" (ctl)
|
||||
: "r" (container)
|
||||
: "memory");
|
||||
}
|
||||
|
||||
static void stop_generic_timer(void)
|
||||
{
|
||||
/*
|
||||
* Disable the timer and mask the irq to prevent
|
||||
* suprious interrupts on this cpu interface. It
|
||||
* will bite us when we come back if we don't. It
|
||||
* will be replayed on the inbound cluster.
|
||||
*/
|
||||
uint64_t cntpctl = read_cntp_ctl_el0();
|
||||
|
||||
write_cntp_ctl_el0(clr_cntp_ctl_enable(cntpctl));
|
||||
}
|
||||
|
||||
static void mt_cpu_save(unsigned long mpidr)
|
||||
{
|
||||
struct core_context *core;
|
||||
|
||||
core = get_core_data(mpidr);
|
||||
mt_save_generic_timer(core->timer_data);
|
||||
|
||||
/* disable timer irq, and upper layer should enable it again. */
|
||||
stop_generic_timer();
|
||||
}
|
||||
|
||||
static void mt_cpu_restore(unsigned long mpidr)
|
||||
{
|
||||
struct core_context *core;
|
||||
|
||||
core = get_core_data(mpidr);
|
||||
mt_restore_generic_timer(core->timer_data);
|
||||
}
|
||||
|
||||
static void mt_platform_save_context(unsigned long mpidr)
|
||||
{
|
||||
/* mcusys_save_context: */
|
||||
mt_cpu_save(mpidr);
|
||||
}
|
||||
|
||||
static void mt_platform_restore_context(unsigned long mpidr)
|
||||
{
|
||||
/* mcusys_restore_context: */
|
||||
mt_cpu_restore(mpidr);
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* Private function which is used to determine if any platform actions
|
||||
* should be performed for the specified affinity instance given its
|
||||
* state. Nothing needs to be done if the 'state' is not off or if this is not
|
||||
* the highest affinity level which will enter the 'state'.
|
||||
*******************************************************************************/
|
||||
static int32_t plat_do_plat_actions(unsigned int afflvl, unsigned int state)
|
||||
{
|
||||
unsigned int max_phys_off_afflvl;
|
||||
|
||||
assert(afflvl <= MPIDR_AFFLVL2);
|
||||
|
||||
if (state != PSCI_STATE_OFF)
|
||||
return -EAGAIN;
|
||||
|
||||
/*
|
||||
* Find the highest affinity level which will be suspended and postpone
|
||||
* all the platform specific actions until that level is hit.
|
||||
*/
|
||||
max_phys_off_afflvl = psci_get_max_phys_off_afflvl();
|
||||
assert(max_phys_off_afflvl != PSCI_INVALID_DATA);
|
||||
if (afflvl != max_phys_off_afflvl)
|
||||
return -EAGAIN;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* MTK_platform handler called when an affinity instance is about to enter
|
||||
* standby.
|
||||
******************************************************************************/
|
||||
static void plat_affinst_standby(unsigned int power_state)
|
||||
{
|
||||
unsigned int target_afflvl;
|
||||
|
||||
/* Sanity check the requested state */
|
||||
target_afflvl = psci_get_pstate_afflvl(power_state);
|
||||
|
||||
/*
|
||||
* It's possible to enter standby only on affinity level 0 i.e. a cpu
|
||||
* on the MTK_platform. Ignore any other affinity level.
|
||||
*/
|
||||
if (target_afflvl == MPIDR_AFFLVL0) {
|
||||
/*
|
||||
* Enter standby state. dsb is good practice before using wfi
|
||||
* to enter low power states.
|
||||
*/
|
||||
dsb();
|
||||
wfi();
|
||||
}
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* MTK_platform handler called when an affinity instance is about to be turned
|
||||
* on. The level and mpidr determine the affinity instance.
|
||||
******************************************************************************/
|
||||
static int plat_affinst_on(unsigned long mpidr,
|
||||
unsigned long sec_entrypoint,
|
||||
unsigned int afflvl,
|
||||
unsigned int state)
|
||||
{
|
||||
int rc = PSCI_E_SUCCESS;
|
||||
unsigned long cpu_id;
|
||||
unsigned long cluster_id;
|
||||
uintptr_t rv;
|
||||
|
||||
/*
|
||||
* It's possible to turn on only affinity level 0 i.e. a cpu
|
||||
* on the MTK_platform. Ignore any other affinity level.
|
||||
*/
|
||||
if (afflvl != MPIDR_AFFLVL0)
|
||||
return rc;
|
||||
|
||||
cpu_id = mpidr & MPIDR_CPU_MASK;
|
||||
cluster_id = mpidr & MPIDR_CLUSTER_MASK;
|
||||
|
||||
if (cluster_id)
|
||||
rv = (uintptr_t)&mt6795_mcucfg->mp1_rv_addr[cpu_id].rv_addr_lw;
|
||||
else
|
||||
rv = (uintptr_t)&mt6795_mcucfg->mp0_rv_addr[cpu_id].rv_addr_lw;
|
||||
|
||||
mmio_write_32(rv, sec_entrypoint);
|
||||
INFO("mt_on[%ld:%ld], entry %x\n",
|
||||
cluster_id, cpu_id, mmio_read_32(rv));
|
||||
|
||||
return rc;
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* MTK_platform handler called when an affinity instance is about to be turned
|
||||
* off. The level and mpidr determine the affinity instance. The 'state' arg.
|
||||
* allows the platform to decide whether the cluster is being turned off and
|
||||
* take apt actions.
|
||||
*
|
||||
* CAUTION: This function is called with coherent stacks so that caches can be
|
||||
* turned off, flushed and coherency disabled. There is no guarantee that caches
|
||||
* will remain turned on across calls to this function as each affinity level is
|
||||
* dealt with. So do not write & read global variables across calls. It will be
|
||||
* wise to do flush a write to the global to prevent unpredictable results.
|
||||
******************************************************************************/
|
||||
static void plat_affinst_off(unsigned int afflvl, unsigned int state)
|
||||
{
|
||||
unsigned long mpidr = read_mpidr_el1();
|
||||
|
||||
/* Determine if any platform actions need to be executed. */
|
||||
if (plat_do_plat_actions(afflvl, state) == -EAGAIN)
|
||||
return;
|
||||
|
||||
/* Prevent interrupts from spuriously waking up this cpu */
|
||||
plat_mt_gic_cpuif_disable();
|
||||
|
||||
trace_power_flow(mpidr, CPU_DOWN);
|
||||
|
||||
if (afflvl != MPIDR_AFFLVL0) {
|
||||
/* Disable coherency if this cluster is to be turned off */
|
||||
plat_cci_disable();
|
||||
|
||||
trace_power_flow(mpidr, CLUSTER_DOWN);
|
||||
}
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* MTK_platform handler called when an affinity instance is about to be
|
||||
* suspended. The level and mpidr determine the affinity instance. The 'state'
|
||||
* arg. allows the platform to decide whether the cluster is being turned off
|
||||
* and take apt actions.
|
||||
*
|
||||
* CAUTION: This function is called with coherent stacks so that caches can be
|
||||
* turned off, flushed and coherency disabled. There is no guarantee that caches
|
||||
* will remain turned on across calls to this function as each affinity level is
|
||||
* dealt with. So do not write & read global variables across calls. It will be
|
||||
* wise to do flush a write to the global to prevent unpredictable results.
|
||||
******************************************************************************/
|
||||
static void plat_affinst_suspend(unsigned long sec_entrypoint,
|
||||
unsigned int afflvl,
|
||||
unsigned int state)
|
||||
{
|
||||
unsigned long mpidr = read_mpidr_el1();
|
||||
unsigned long cluster_id;
|
||||
unsigned long cpu_id;
|
||||
uintptr_t rv;
|
||||
|
||||
/* Determine if any platform actions need to be executed. */
|
||||
if (plat_do_plat_actions(afflvl, state) == -EAGAIN)
|
||||
return;
|
||||
|
||||
cpu_id = mpidr & MPIDR_CPU_MASK;
|
||||
cluster_id = mpidr & MPIDR_CLUSTER_MASK;
|
||||
|
||||
if (cluster_id)
|
||||
rv = (uintptr_t)&mt6795_mcucfg->mp1_rv_addr[cpu_id].rv_addr_lw;
|
||||
else
|
||||
rv = (uintptr_t)&mt6795_mcucfg->mp0_rv_addr[cpu_id].rv_addr_lw;
|
||||
|
||||
mmio_write_32(rv, sec_entrypoint);
|
||||
|
||||
if (afflvl >= MPIDR_AFFLVL0)
|
||||
mt_platform_save_context(mpidr);
|
||||
|
||||
/* Perform the common cluster specific operations */
|
||||
if (afflvl >= MPIDR_AFFLVL1) {
|
||||
/* Disable coherency if this cluster is to be turned off */
|
||||
plat_cci_disable();
|
||||
disable_scu(mpidr);
|
||||
|
||||
trace_power_flow(mpidr, CLUSTER_SUSPEND);
|
||||
}
|
||||
|
||||
if (afflvl >= MPIDR_AFFLVL2) {
|
||||
/* Prevent interrupts from spuriously waking up this cpu */
|
||||
plat_mt_gic_cpuif_disable();
|
||||
}
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* MTK_platform handler called when an affinity instance has just been powered
|
||||
* on after being turned off earlier. The level and mpidr determine the affinity
|
||||
* instance. The 'state' arg. allows the platform to decide whether the cluster
|
||||
* was turned off prior to wakeup and do what's necessary to setup it up
|
||||
* correctly.
|
||||
******************************************************************************/
|
||||
static void plat_affinst_on_finish(unsigned int afflvl, unsigned int state)
|
||||
{
|
||||
unsigned long mpidr = read_mpidr_el1();
|
||||
|
||||
/* Determine if any platform actions need to be executed. */
|
||||
if (plat_do_plat_actions(afflvl, state) == -EAGAIN)
|
||||
return;
|
||||
|
||||
/* Perform the common cluster specific operations */
|
||||
if (afflvl >= MPIDR_AFFLVL1) {
|
||||
enable_scu(mpidr);
|
||||
|
||||
/* Enable coherency if this cluster was off */
|
||||
plat_cci_enable();
|
||||
trace_power_flow(mpidr, CLUSTER_UP);
|
||||
}
|
||||
|
||||
/* Enable the gic cpu interface */
|
||||
plat_mt_gic_cpuif_enable();
|
||||
plat_mt_gic_pcpu_init();
|
||||
trace_power_flow(mpidr, CPU_UP);
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* MTK_platform handler called when an affinity instance has just been powered
|
||||
* on after having been suspended earlier. The level and mpidr determine the
|
||||
* affinity instance.
|
||||
******************************************************************************/
|
||||
static void plat_affinst_suspend_finish(unsigned int afflvl, unsigned int state)
|
||||
{
|
||||
unsigned long mpidr = read_mpidr_el1();
|
||||
|
||||
/* Determine if any platform actions need to be executed. */
|
||||
if (plat_do_plat_actions(afflvl, state) == -EAGAIN)
|
||||
return;
|
||||
|
||||
if (afflvl >= MPIDR_AFFLVL2) {
|
||||
/* Enable the gic cpu interface */
|
||||
plat_mt_gic_init();
|
||||
plat_mt_gic_cpuif_enable();
|
||||
}
|
||||
|
||||
/* Perform the common cluster specific operations */
|
||||
if (afflvl >= MPIDR_AFFLVL1) {
|
||||
enable_scu(mpidr);
|
||||
|
||||
/* Enable coherency if this cluster was off */
|
||||
plat_cci_enable();
|
||||
trace_power_flow(mpidr, CLUSTER_UP);
|
||||
}
|
||||
|
||||
if (afflvl >= MPIDR_AFFLVL0)
|
||||
mt_platform_restore_context(mpidr);
|
||||
|
||||
plat_mt_gic_pcpu_init();
|
||||
}
|
||||
|
||||
static unsigned int plat_get_sys_suspend_power_state(void)
|
||||
{
|
||||
/* StateID: 0, StateType: 1(power down), PowerLevel: 2(system) */
|
||||
return psci_make_powerstate(0, 1, 2);
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* MTK handlers to shutdown/reboot the system
|
||||
******************************************************************************/
|
||||
static void __dead2 plat_system_off(void)
|
||||
{
|
||||
INFO("MTK System Off\n");
|
||||
wfi();
|
||||
ERROR("MTK System Off: operation not handled.\n");
|
||||
panic();
|
||||
}
|
||||
|
||||
static void __dead2 plat_system_reset(void)
|
||||
{
|
||||
/* Write the System Configuration Control Register */
|
||||
INFO("MTK System Reset\n");
|
||||
|
||||
mmio_clrbits_32(MTK_WDT_BASE,
|
||||
(MTK_WDT_MODE_DUAL_MODE | MTK_WDT_MODE_IRQ));
|
||||
mmio_setbits_32(MTK_WDT_BASE, (MTK_WDT_MODE_KEY | MTK_WDT_MODE_EXTEN));
|
||||
mmio_setbits_32(MTK_WDT_SWRST, MTK_WDT_SWRST_KEY);
|
||||
|
||||
wfi();
|
||||
ERROR("MTK System Reset: operation not handled.\n");
|
||||
panic();
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* Export the platform handlers to enable psci to invoke them
|
||||
******************************************************************************/
|
||||
static const plat_pm_ops_t plat_plat_pm_ops = {
|
||||
.affinst_standby = plat_affinst_standby,
|
||||
.affinst_on = plat_affinst_on,
|
||||
.affinst_off = plat_affinst_off,
|
||||
.affinst_suspend = plat_affinst_suspend,
|
||||
.affinst_on_finish = plat_affinst_on_finish,
|
||||
.affinst_suspend_finish = plat_affinst_suspend_finish,
|
||||
.system_off = plat_system_off,
|
||||
.system_reset = plat_system_reset,
|
||||
.get_sys_suspend_power_state = plat_get_sys_suspend_power_state,
|
||||
};
|
||||
|
||||
/*******************************************************************************
|
||||
* Export the platform specific power ops & initialize the mtk_platform power
|
||||
* controller
|
||||
******************************************************************************/
|
||||
int platform_setup_pm(const plat_pm_ops_t **plat_ops)
|
||||
{
|
||||
*plat_ops = &plat_plat_pm_ops;
|
||||
return 0;
|
||||
}
|
|
@ -1,34 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <platform_def.h>
|
||||
|
||||
#include <arch.h>
|
||||
#include <lib/psci/psci.h>
|
||||
|
||||
unsigned int plat_get_aff_count(unsigned int aff_lvl, unsigned long mpidr)
|
||||
{
|
||||
/* Report 1 (absent) instance at levels higher that the cluster level */
|
||||
if (aff_lvl > MPIDR_AFFLVL1)
|
||||
return PLATFORM_SYSTEM_COUNT;
|
||||
|
||||
if (aff_lvl == MPIDR_AFFLVL1)
|
||||
return PLATFORM_CLUSTER_COUNT;
|
||||
|
||||
return mpidr & 0x100 ? PLATFORM_CLUSTER1_CORE_COUNT :
|
||||
PLATFORM_CLUSTER0_CORE_COUNT;
|
||||
}
|
||||
|
||||
unsigned int plat_get_aff_state(unsigned int aff_lvl, unsigned long mpidr)
|
||||
{
|
||||
return aff_lvl <= MPIDR_AFFLVL2 ? PSCI_AFF_PRESENT : PSCI_AFF_ABSENT;
|
||||
}
|
||||
|
||||
int mt_setup_topology(void)
|
||||
{
|
||||
/* [TODO] Make topology configurable via SCC */
|
||||
return 0;
|
||||
}
|
|
@ -1,67 +0,0 @@
|
|||
#
|
||||
# Copyright (c) 2016-2017, ARM Limited and Contributors. All rights reserved.
|
||||
#
|
||||
# SPDX-License-Identifier: BSD-3-Clause
|
||||
#
|
||||
|
||||
MTK_PLAT := plat/mediatek
|
||||
MTK_PLAT_SOC := ${MTK_PLAT}/${PLAT}
|
||||
|
||||
# Add OEM customized codes
|
||||
OEMS := true
|
||||
MTK_SIP_KERNEL_BOOT_ENABLE := 1
|
||||
|
||||
|
||||
ifneq (${OEMS},none)
|
||||
OEMS_INCLUDES := -I${MTK_PLAT}/common/custom/
|
||||
OEMS_SOURCES := ${MTK_PLAT}/common/custom/oem_svc.c
|
||||
endif
|
||||
|
||||
PLAT_INCLUDES := -I${MTK_PLAT}/common/ \
|
||||
-I${MTK_PLAT}/common/drivers/uart \
|
||||
-I${MTK_PLAT_SOC}/ \
|
||||
-I${MTK_PLAT_SOC}/drivers/timer/ \
|
||||
-I${MTK_PLAT_SOC}/include/ \
|
||||
-Iinclude/plat/arm/common/ \
|
||||
${OEMS_INCLUDES}
|
||||
|
||||
PLAT_BL_COMMON_SOURCES := lib/xlat_tables/aarch64/xlat_tables.c \
|
||||
lib/xlat_tables/xlat_tables_common.c \
|
||||
plat/common/plat_gic.c
|
||||
|
||||
BL31_SOURCES += drivers/arm/cci/cci.c \
|
||||
drivers/delay_timer/generic_delay_timer.c \
|
||||
drivers/arm/gic/common/gic_common.c \
|
||||
drivers/arm/gic/v2/gicv2_main.c \
|
||||
drivers/arm/gic/v2/gicv2_helpers.c \
|
||||
plat/common/plat_gicv2.c \
|
||||
drivers/console/aarch64/console.S \
|
||||
drivers/delay_timer/delay_timer.c \
|
||||
lib/cpus/aarch64/cortex_a53.S \
|
||||
${MTK_PLAT_SOC}/bl31_plat_setup.c \
|
||||
${MTK_PLAT_SOC}/plat_mt_gic.c \
|
||||
${MTK_PLAT}/common/mtk_sip_svc.c \
|
||||
${MTK_PLAT}/common/mtk_plat_common.c \
|
||||
${MTK_PLAT}/common/drivers/uart/8250_console.S \
|
||||
${MTK_PLAT_SOC}/aarch64/plat_helpers.S \
|
||||
${MTK_PLAT_SOC}/drivers/timer/mt_cpuxgpt.c \
|
||||
${MTK_PLAT_SOC}/plat_delay_timer.c \
|
||||
${MTK_PLAT_SOC}/plat_pm.c \
|
||||
${MTK_PLAT_SOC}/plat_topology.c \
|
||||
${MTK_PLAT_SOC}/power_tracer.c \
|
||||
${MTK_PLAT_SOC}/scu.c \
|
||||
${OEMS_SOURCES}
|
||||
|
||||
# Enable workarounds for selected Cortex-A53 erratas.
|
||||
ERRATA_A53_826319 := 1
|
||||
ERRATA_A53_836870 := 1
|
||||
|
||||
WORKAROUND_CVE_2017_5715 := 0
|
||||
|
||||
# indicate the reset vector address can be programmed
|
||||
PROGRAMMABLE_RESET_ADDRESS := 1
|
||||
|
||||
$(eval $(call add_define,MTK_SIP_KERNEL_BOOT_ENABLE))
|
||||
|
||||
# Do not enable SVE
|
||||
ENABLE_SVE_FOR_NS := 0
|
|
@ -1,48 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <arch.h>
|
||||
#include <common/debug.h>
|
||||
|
||||
#include <power_tracer.h>
|
||||
|
||||
#define trace_log(...) INFO("psci: " __VA_ARGS__)
|
||||
|
||||
void trace_power_flow(unsigned long mpidr, unsigned char mode)
|
||||
{
|
||||
switch (mode) {
|
||||
case CPU_UP:
|
||||
trace_log("core %lld:%lld ON\n",
|
||||
(mpidr & MPIDR_CLUSTER_MASK) >> MPIDR_AFFINITY_BITS,
|
||||
(mpidr & MPIDR_CPU_MASK));
|
||||
break;
|
||||
case CPU_DOWN:
|
||||
trace_log("core %lld:%lld OFF\n",
|
||||
(mpidr & MPIDR_CLUSTER_MASK) >> MPIDR_AFFINITY_BITS,
|
||||
(mpidr & MPIDR_CPU_MASK));
|
||||
break;
|
||||
case CPU_SUSPEND:
|
||||
trace_log("core %lld:%lld SUSPEND\n",
|
||||
(mpidr & MPIDR_CLUSTER_MASK) >> MPIDR_AFFINITY_BITS,
|
||||
(mpidr & MPIDR_CPU_MASK));
|
||||
break;
|
||||
case CLUSTER_UP:
|
||||
trace_log("cluster %lld ON\n",
|
||||
(mpidr & MPIDR_CLUSTER_MASK) >> MPIDR_AFFINITY_BITS);
|
||||
break;
|
||||
case CLUSTER_DOWN:
|
||||
trace_log("cluster %lld OFF\n",
|
||||
(mpidr & MPIDR_CLUSTER_MASK) >> MPIDR_AFFINITY_BITS);
|
||||
break;
|
||||
case CLUSTER_SUSPEND:
|
||||
trace_log("cluster %lld SUSPEND\n",
|
||||
(mpidr & MPIDR_CLUSTER_MASK) >> MPIDR_AFFINITY_BITS);
|
||||
break;
|
||||
default:
|
||||
trace_log("unknown power mode\n");
|
||||
break;
|
||||
}
|
||||
}
|
|
@ -1,30 +0,0 @@
|
|||
/*
|
||||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <arch.h>
|
||||
#include <lib/mmio.h>
|
||||
|
||||
#include <mcucfg.h>
|
||||
|
||||
void disable_scu(unsigned long mpidr)
|
||||
{
|
||||
if (mpidr & MPIDR_CLUSTER_MASK)
|
||||
mmio_setbits_32((uintptr_t)&mt6795_mcucfg->mp1_miscdbg,
|
||||
MP1_ACINACTM);
|
||||
else
|
||||
mmio_setbits_32((uintptr_t)&mt6795_mcucfg->mp0_axi_config,
|
||||
MP0_ACINACTM);
|
||||
}
|
||||
|
||||
void enable_scu(unsigned long mpidr)
|
||||
{
|
||||
if (mpidr & MPIDR_CLUSTER_MASK)
|
||||
mmio_clrbits_32((uintptr_t)&mt6795_mcucfg->mp1_miscdbg,
|
||||
MP1_ACINACTM);
|
||||
else
|
||||
mmio_clrbits_32((uintptr_t)&mt6795_mcucfg->mp0_axi_config,
|
||||
MP0_ACINACTM);
|
||||
}
|
Loading…
Add table
Reference in a new issue