123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318 |
- /*
- * Copyright (c) 2015-2019, ARM Limited and Contributors. All rights reserved.
- * Copyright (c) 2020, NVIDIA Corporation. All rights reserved.
- *
- * SPDX-License-Identifier: BSD-3-Clause
- */
- #include <arch_helpers.h>
- #include <assert.h>
- #include <cortex_a57.h>
- #include <common/bl_common.h>
- #include <common/debug.h>
- #include <common/interrupt_props.h>
- #include <drivers/console.h>
- #include <lib/xlat_tables/xlat_tables_v2.h>
- #include <drivers/arm/gic_common.h>
- #include <drivers/arm/gicv2.h>
- #include <bl31/interrupt_mgmt.h>
- #include <bpmp.h>
- #include <flowctrl.h>
- #include <memctrl.h>
- #include <plat/common/platform.h>
- #include <security_engine.h>
- #include <tegra_def.h>
- #include <tegra_platform.h>
- #include <tegra_private.h>
- /* sets of MMIO ranges setup */
- #define MMIO_RANGE_0_ADDR 0x50000000
- #define MMIO_RANGE_1_ADDR 0x60000000
- #define MMIO_RANGE_2_ADDR 0x70000000
- #define MMIO_RANGE_SIZE 0x200000
- /*
- * Table of regions to map using the MMU.
- */
- static const mmap_region_t tegra_mmap[] = {
- MAP_REGION_FLAT(TEGRA_IRAM_BASE, 0x40000, /* 256KB */
- MT_DEVICE | MT_RW | MT_SECURE),
- MAP_REGION_FLAT(MMIO_RANGE_0_ADDR, MMIO_RANGE_SIZE,
- MT_DEVICE | MT_RW | MT_SECURE),
- MAP_REGION_FLAT(MMIO_RANGE_1_ADDR, MMIO_RANGE_SIZE,
- MT_DEVICE | MT_RW | MT_SECURE),
- MAP_REGION_FLAT(MMIO_RANGE_2_ADDR, MMIO_RANGE_SIZE,
- MT_DEVICE | MT_RW | MT_SECURE),
- {0}
- };
- /*******************************************************************************
- * Set up the pagetables as per the platform memory map & initialize the MMU
- ******************************************************************************/
- const mmap_region_t *plat_get_mmio_map(void)
- {
- /* Add the map region for security engine SE2 */
- if (tegra_chipid_is_t210_b01()) {
- mmap_add_region((uint64_t)TEGRA_SE2_BASE,
- (uint64_t)TEGRA_SE2_BASE,
- (uint64_t)TEGRA_SE2_RANGE_SIZE,
- MT_DEVICE | MT_RW | MT_SECURE);
- }
- /* MMIO space */
- return tegra_mmap;
- }
- /*******************************************************************************
- * The Tegra power domain tree has a single system level power domain i.e. a
- * single root node. The first entry in the power domain descriptor specifies
- * the number of power domains at the highest power level.
- *******************************************************************************
- */
- const unsigned char tegra_power_domain_tree_desc[] = {
- /* No of root nodes */
- 1,
- /* No of clusters */
- PLATFORM_CLUSTER_COUNT,
- /* No of CPU cores - cluster0 */
- PLATFORM_MAX_CPUS_PER_CLUSTER,
- /* No of CPU cores - cluster1 */
- PLATFORM_MAX_CPUS_PER_CLUSTER
- };
- /*******************************************************************************
- * This function returns the Tegra default topology tree information.
- ******************************************************************************/
- const unsigned char *plat_get_power_domain_tree_desc(void)
- {
- return tegra_power_domain_tree_desc;
- }
- /*******************************************************************************
- * Handler to get the System Counter Frequency
- ******************************************************************************/
- unsigned int plat_get_syscnt_freq2(void)
- {
- return 19200000;
- }
- /*******************************************************************************
- * Maximum supported UART controllers
- ******************************************************************************/
- #define TEGRA210_MAX_UART_PORTS 5
- /*******************************************************************************
- * This variable holds the UART port base addresses
- ******************************************************************************/
- static uint32_t tegra210_uart_addresses[TEGRA210_MAX_UART_PORTS + 1] = {
- 0, /* undefined - treated as an error case */
- TEGRA_UARTA_BASE,
- TEGRA_UARTB_BASE,
- TEGRA_UARTC_BASE,
- TEGRA_UARTD_BASE,
- TEGRA_UARTE_BASE,
- };
- /*******************************************************************************
- * Enable console corresponding to the console ID
- ******************************************************************************/
- void plat_enable_console(int32_t id)
- {
- static console_t uart_console;
- uint32_t console_clock;
- if ((id > 0) && (id < TEGRA210_MAX_UART_PORTS)) {
- /*
- * Reference clock used by the FPGAs is a lot slower.
- */
- if (tegra_platform_is_fpga()) {
- console_clock = TEGRA_BOOT_UART_CLK_13_MHZ;
- } else {
- console_clock = TEGRA_BOOT_UART_CLK_408_MHZ;
- }
- (void)console_16550_register(tegra210_uart_addresses[id],
- console_clock,
- TEGRA_CONSOLE_BAUDRATE,
- &uart_console);
- console_set_scope(&uart_console, CONSOLE_FLAG_BOOT |
- CONSOLE_FLAG_RUNTIME | CONSOLE_FLAG_CRASH);
- }
- }
- /*******************************************************************************
- * Return pointer to the BL31 params from previous bootloader
- ******************************************************************************/
- struct tegra_bl31_params *plat_get_bl31_params(void)
- {
- return NULL;
- }
- /*******************************************************************************
- * Return pointer to the BL31 platform params from previous bootloader
- ******************************************************************************/
- plat_params_from_bl2_t *plat_get_bl31_plat_params(void)
- {
- return NULL;
- }
- /*******************************************************************************
- * Handler for early platform setup
- ******************************************************************************/
- void plat_early_platform_setup(void)
- {
- const plat_params_from_bl2_t *plat_params = bl31_get_plat_params();
- uint64_t val;
- /* Verify chip id is t210 */
- assert(tegra_chipid_is_t210());
- /*
- * Do initial security configuration to allow DRAM/device access.
- */
- tegra_memctrl_tzdram_setup(plat_params->tzdram_base,
- (uint32_t)plat_params->tzdram_size);
- /* platform parameter passed by the previous bootloader */
- if (plat_params->l2_ecc_parity_prot_dis != 1) {
- /* Enable ECC Parity Protection for Cortex-A57 CPUs */
- val = read_l2ctlr_el1();
- val |= (uint64_t)CORTEX_A57_L2_ECC_PARITY_PROTECTION_BIT;
- write_l2ctlr_el1(val);
- }
- /* Initialize security engine driver */
- tegra_se_init();
- }
- /* Secure IRQs for Tegra186 */
- static const interrupt_prop_t tegra210_interrupt_props[] = {
- INTR_PROP_DESC(TEGRA_SDEI_SGI_PRIVATE, PLAT_SDEI_CRITICAL_PRI,
- GICV2_INTR_GROUP0, GIC_INTR_CFG_EDGE),
- INTR_PROP_DESC(TEGRA210_TIMER1_IRQ, PLAT_TEGRA_WDT_PRIO,
- GICV2_INTR_GROUP0, GIC_INTR_CFG_EDGE),
- INTR_PROP_DESC(TEGRA210_WDT_CPU_LEGACY_FIQ, PLAT_TEGRA_WDT_PRIO,
- GICV2_INTR_GROUP0, GIC_INTR_CFG_EDGE),
- };
- /*******************************************************************************
- * Handler for late platform setup
- ******************************************************************************/
- void plat_late_platform_setup(void)
- {
- const plat_params_from_bl2_t *plat_params = bl31_get_plat_params();
- uint64_t sc7entry_end, offset;
- int ret;
- uint32_t val;
- /* memmap TZDRAM area containing the SC7 Entry Firmware */
- if (plat_params->sc7entry_fw_base && plat_params->sc7entry_fw_size) {
- assert(plat_params->sc7entry_fw_size <= TEGRA_IRAM_A_SIZE);
- /*
- * Verify that the SC7 entry firmware resides inside the TZDRAM
- * aperture, _before_ the BL31 code and the start address is
- * exactly 1MB from BL31 base.
- */
- /* sc7entry-fw must be _before_ BL31 base */
- assert(plat_params->tzdram_base > plat_params->sc7entry_fw_base);
- sc7entry_end = plat_params->sc7entry_fw_base +
- plat_params->sc7entry_fw_size;
- assert(sc7entry_end < plat_params->tzdram_base);
- /* sc7entry-fw start must be exactly 1MB behind BL31 base */
- offset = plat_params->tzdram_base - plat_params->sc7entry_fw_base;
- assert(offset == 0x100000);
- /* secure TZDRAM area */
- tegra_memctrl_tzdram_setup(plat_params->sc7entry_fw_base,
- plat_params->tzdram_size + offset);
- /* power off BPMP processor until SC7 entry */
- tegra_fc_bpmp_off();
- /* memmap SC7 entry firmware code */
- ret = mmap_add_dynamic_region(plat_params->sc7entry_fw_base,
- plat_params->sc7entry_fw_base,
- plat_params->sc7entry_fw_size,
- MT_SECURE | MT_RO_DATA);
- assert(ret == 0);
- /* restrict PMC access to secure world */
- val = mmio_read_32(TEGRA_MISC_BASE + APB_SLAVE_SECURITY_ENABLE);
- val |= PMC_SECURITY_EN_BIT;
- mmio_write_32(TEGRA_MISC_BASE + APB_SLAVE_SECURITY_ENABLE, val);
- }
- if (!tegra_chipid_is_t210_b01()) {
- /* restrict PMC access to secure world */
- val = mmio_read_32(TEGRA_MISC_BASE + APB_SLAVE_SECURITY_ENABLE);
- val |= PMC_SECURITY_EN_BIT;
- mmio_write_32(TEGRA_MISC_BASE + APB_SLAVE_SECURITY_ENABLE, val);
- }
- }
- /*******************************************************************************
- * Initialize the GIC and SGIs
- ******************************************************************************/
- void plat_gic_setup(void)
- {
- tegra_gic_setup(tegra210_interrupt_props, ARRAY_SIZE(tegra210_interrupt_props));
- tegra_gic_init();
- /* Enable handling for FIQs */
- tegra_fiq_handler_setup();
- /*
- * Enable routing watchdog FIQs from the flow controller to
- * the GICD.
- */
- tegra_fc_enable_fiq_to_ccplex_routing();
- }
- /*******************************************************************************
- * Handler to indicate support for System Suspend
- ******************************************************************************/
- bool plat_supports_system_suspend(void)
- {
- const plat_params_from_bl2_t *plat_params = bl31_get_plat_params();
- /*
- * sc7entry-fw is only supported by Tegra210 SoCs.
- */
- if (!tegra_chipid_is_t210_b01() && (plat_params->sc7entry_fw_base != 0U)) {
- return true;
- } else if (tegra_chipid_is_t210_b01()) {
- return true;
- } else {
- return false;
- }
- }
- /*******************************************************************************
- * Platform specific runtime setup.
- ******************************************************************************/
- void plat_runtime_setup(void)
- {
- /*
- * During cold boot, it is observed that the arbitration
- * bit is set in the Memory controller leading to false
- * error interrupts in the non-secure world. To avoid
- * this, clean the interrupt status register before
- * booting into the non-secure world
- */
- tegra_memctrl_clear_pending_interrupts();
- /*
- * During boot, USB3 and flash media (SDMMC/SATA) devices need
- * access to IRAM. Because these clients connect to the MC and
- * do not have a direct path to the IRAM, the MC implements AHB
- * redirection during boot to allow path to IRAM. In this mode
- * accesses to a programmed memory address aperture are directed
- * to the AHB bus, allowing access to the IRAM. This mode must be
- * disabled before we jump to the non-secure world.
- */
- tegra_memctrl_disable_ahb_redirection();
- }
|