2018-11-02 14:21:05 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0+
|
|
|
|
/*
|
|
|
|
* K3: Common Architecture initialization
|
|
|
|
*
|
2023-11-01 20:56:03 +00:00
|
|
|
* Copyright (C) 2018 Texas Instruments Incorporated - https://www.ti.com/
|
2018-11-02 14:21:05 +00:00
|
|
|
* Lokesh Vutla <lokeshvutla@ti.com>
|
|
|
|
*/
|
|
|
|
|
2019-12-28 17:45:01 +00:00
|
|
|
#include <cpu_func.h>
|
2020-05-10 17:40:01 +00:00
|
|
|
#include <image.h>
|
2020-05-10 17:40:02 +00:00
|
|
|
#include <init.h>
|
2020-05-10 17:40:05 +00:00
|
|
|
#include <log.h>
|
2018-11-02 14:21:05 +00:00
|
|
|
#include <spl.h>
|
2020-10-31 03:38:53 +00:00
|
|
|
#include <asm/global_data.h>
|
2023-09-15 00:21:46 +00:00
|
|
|
#include <linux/printk.h>
|
2018-11-02 14:21:05 +00:00
|
|
|
#include "common.h"
|
|
|
|
#include <dm.h>
|
|
|
|
#include <remoteproc.h>
|
2020-05-10 17:39:56 +00:00
|
|
|
#include <asm/cache.h>
|
2019-03-08 06:17:33 +00:00
|
|
|
#include <linux/soc/ti/ti_sci_protocol.h>
|
2019-03-08 06:17:34 +00:00
|
|
|
#include <fdt_support.h>
|
2019-09-27 08:02:11 +00:00
|
|
|
#include <asm/hardware.h>
|
|
|
|
#include <asm/io.h>
|
2020-02-12 08:25:04 +00:00
|
|
|
#include <fs_loader.h>
|
|
|
|
#include <fs.h>
|
|
|
|
#include <env.h>
|
|
|
|
#include <elf.h>
|
2020-07-16 04:40:04 +00:00
|
|
|
#include <soc.h>
|
2019-03-08 06:17:33 +00:00
|
|
|
|
2021-06-11 08:45:19 +00:00
|
|
|
#if IS_ENABLED(CONFIG_SYS_K3_SPL_ATF)
|
|
|
|
enum {
|
|
|
|
IMAGE_ID_ATF,
|
|
|
|
IMAGE_ID_OPTEE,
|
|
|
|
IMAGE_ID_SPL,
|
|
|
|
IMAGE_ID_DM_FW,
|
|
|
|
IMAGE_AMT,
|
|
|
|
};
|
|
|
|
|
|
|
|
#if CONFIG_IS_ENABLED(FIT_IMAGE_POST_PROCESS)
|
|
|
|
static const char *image_os_match[IMAGE_AMT] = {
|
|
|
|
"arm-trusted-firmware",
|
|
|
|
"tee",
|
|
|
|
"U-Boot",
|
|
|
|
"DM",
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static struct image_info fit_image_info[IMAGE_AMT];
|
|
|
|
#endif
|
|
|
|
|
2019-03-08 06:17:33 +00:00
|
|
|
struct ti_sci_handle *get_ti_sci_handle(void)
|
|
|
|
{
|
|
|
|
struct udevice *dev;
|
|
|
|
int ret;
|
|
|
|
|
2019-09-27 08:02:15 +00:00
|
|
|
ret = uclass_get_device_by_driver(UCLASS_FIRMWARE,
|
2020-12-29 03:34:56 +00:00
|
|
|
DM_DRIVER_GET(ti_sci), &dev);
|
2019-03-08 06:17:33 +00:00
|
|
|
if (ret)
|
|
|
|
panic("Failed to get SYSFW (%d)\n", ret);
|
|
|
|
|
|
|
|
return (struct ti_sci_handle *)ti_sci_get_handle_from_sysfw(dev);
|
|
|
|
}
|
2018-11-02 14:21:05 +00:00
|
|
|
|
2020-03-10 11:20:58 +00:00
|
|
|
void k3_sysfw_print_ver(void)
|
|
|
|
{
|
|
|
|
struct ti_sci_handle *ti_sci = get_ti_sci_handle();
|
|
|
|
char fw_desc[sizeof(ti_sci->version.firmware_description) + 1];
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Output System Firmware version info. Note that since the
|
|
|
|
* 'firmware_description' field is not guaranteed to be zero-
|
|
|
|
* terminated we manually add a \0 terminator if needed. Further
|
|
|
|
* note that we intentionally no longer rely on the extended
|
|
|
|
* printf() formatter '%.*s' to not having to require a more
|
|
|
|
* full-featured printf() implementation.
|
|
|
|
*/
|
|
|
|
strncpy(fw_desc, ti_sci->version.firmware_description,
|
|
|
|
sizeof(ti_sci->version.firmware_description));
|
|
|
|
fw_desc[sizeof(fw_desc) - 1] = '\0';
|
|
|
|
|
|
|
|
printf("SYSFW ABI: %d.%d (firmware rev 0x%04x '%s')\n",
|
|
|
|
ti_sci->version.abi_major, ti_sci->version.abi_minor,
|
|
|
|
ti_sci->version.firmware_revision, fw_desc);
|
|
|
|
}
|
|
|
|
|
2023-09-27 13:43:14 +00:00
|
|
|
void mmr_unlock(uintptr_t base, u32 partition)
|
2020-08-05 17:14:17 +00:00
|
|
|
{
|
|
|
|
/* Translate the base address */
|
2023-09-27 13:43:14 +00:00
|
|
|
uintptr_t part_base = base + partition * CTRL_MMR0_PARTITION_SIZE;
|
2020-08-05 17:14:17 +00:00
|
|
|
|
|
|
|
/* Unlock the requested partition if locked using two-step sequence */
|
|
|
|
writel(CTRLMMR_LOCK_KICK0_UNLOCK_VAL, part_base + CTRLMMR_LOCK_KICK0);
|
|
|
|
writel(CTRLMMR_LOCK_KICK1_UNLOCK_VAL, part_base + CTRLMMR_LOCK_KICK1);
|
|
|
|
}
|
|
|
|
|
2020-08-05 17:14:23 +00:00
|
|
|
bool is_rom_loaded_sysfw(struct rom_extended_boot_data *data)
|
|
|
|
{
|
|
|
|
if (strncmp(data->header, K3_ROM_BOOT_HEADER_MAGIC, 7))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return data->num_components > 1;
|
|
|
|
}
|
|
|
|
|
2019-08-15 20:55:28 +00:00
|
|
|
DECLARE_GLOBAL_DATA_PTR;
|
|
|
|
|
|
|
|
#ifdef CONFIG_K3_EARLY_CONS
|
|
|
|
int early_console_init(void)
|
|
|
|
{
|
|
|
|
struct udevice *dev;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
gd->baudrate = CONFIG_BAUDRATE;
|
|
|
|
|
|
|
|
ret = uclass_get_device_by_seq(UCLASS_SERIAL, CONFIG_K3_EARLY_CONS_IDX,
|
|
|
|
&dev);
|
|
|
|
if (ret) {
|
|
|
|
printf("Error getting serial dev for early console! (%d)\n",
|
|
|
|
ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
gd->cur_serial_dev = dev;
|
|
|
|
gd->flags |= GD_FLG_SERIAL_READY;
|
|
|
|
gd->have_console = 1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2021-06-11 08:45:19 +00:00
|
|
|
#if IS_ENABLED(CONFIG_SYS_K3_SPL_ATF)
|
2020-02-12 08:25:04 +00:00
|
|
|
|
|
|
|
void init_env(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_SPL_ENV_SUPPORT
|
|
|
|
char *part;
|
|
|
|
|
|
|
|
env_init();
|
|
|
|
env_relocate();
|
|
|
|
switch (spl_boot_device()) {
|
|
|
|
case BOOT_DEVICE_MMC2:
|
|
|
|
part = env_get("bootpart");
|
|
|
|
env_set("storage_interface", "mmc");
|
|
|
|
env_set("fw_dev_part", part);
|
|
|
|
break;
|
|
|
|
case BOOT_DEVICE_SPI:
|
|
|
|
env_set("storage_interface", "ubi");
|
|
|
|
env_set("fw_ubi_mtdpart", "UBI");
|
|
|
|
env_set("fw_ubi_volume", "UBI0");
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
printf("%s from device %u not supported!\n",
|
|
|
|
__func__, spl_boot_device());
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
int load_firmware(char *name_fw, char *name_loadaddr, u32 *loadaddr)
|
|
|
|
{
|
|
|
|
struct udevice *fsdev;
|
|
|
|
char *name = NULL;
|
|
|
|
int size = 0;
|
|
|
|
|
2022-01-27 12:16:53 +00:00
|
|
|
if (!IS_ENABLED(CONFIG_FS_LOADER))
|
|
|
|
return 0;
|
|
|
|
|
2020-02-12 08:25:04 +00:00
|
|
|
*loadaddr = 0;
|
|
|
|
#ifdef CONFIG_SPL_ENV_SUPPORT
|
|
|
|
switch (spl_boot_device()) {
|
|
|
|
case BOOT_DEVICE_MMC2:
|
|
|
|
name = env_get(name_fw);
|
|
|
|
*loadaddr = env_get_hex(name_loadaddr, *loadaddr);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
printf("Loading rproc fw image from device %u not supported!\n",
|
|
|
|
spl_boot_device());
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
if (!*loadaddr)
|
|
|
|
return 0;
|
|
|
|
|
2022-12-29 16:52:59 +00:00
|
|
|
if (!get_fs_loader(&fsdev)) {
|
2020-02-12 08:25:04 +00:00
|
|
|
size = request_firmware_into_buf(fsdev, name, (void *)*loadaddr,
|
|
|
|
0, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
2023-04-06 16:38:15 +00:00
|
|
|
void release_resources_for_core_shutdown(void)
|
2021-07-27 23:24:40 +00:00
|
|
|
{
|
2023-04-06 16:38:15 +00:00
|
|
|
struct ti_sci_handle *ti_sci = get_ti_sci_handle();
|
|
|
|
struct ti_sci_dev_ops *dev_ops = &ti_sci->ops.dev_ops;
|
|
|
|
struct ti_sci_proc_ops *proc_ops = &ti_sci->ops.proc_ops;
|
|
|
|
int ret;
|
|
|
|
u32 i;
|
|
|
|
|
|
|
|
/* Iterate through list of devices to put (shutdown) */
|
|
|
|
for (i = 0; i < ARRAY_SIZE(put_device_ids); i++) {
|
|
|
|
u32 id = put_device_ids[i];
|
|
|
|
|
|
|
|
ret = dev_ops->put_device(ti_sci, id);
|
|
|
|
if (ret)
|
|
|
|
panic("Failed to put device %u (%d)\n", id, ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Iterate through list of cores to put (shutdown) */
|
|
|
|
for (i = 0; i < ARRAY_SIZE(put_core_ids); i++) {
|
|
|
|
u32 id = put_core_ids[i];
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Queue up the core shutdown request. Note that this call
|
|
|
|
* needs to be followed up by an actual invocation of an WFE
|
|
|
|
* or WFI CPU instruction.
|
|
|
|
*/
|
|
|
|
ret = proc_ops->proc_shutdown_no_wait(ti_sci, id);
|
|
|
|
if (ret)
|
|
|
|
panic("Failed sending core %u shutdown message (%d)\n",
|
|
|
|
id, ret);
|
|
|
|
}
|
2021-07-27 23:24:40 +00:00
|
|
|
}
|
|
|
|
|
2018-11-02 14:21:05 +00:00
|
|
|
void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
|
|
|
|
{
|
2020-02-12 08:25:06 +00:00
|
|
|
typedef void __noreturn (*image_entry_noargs_t)(void);
|
2019-06-07 13:54:43 +00:00
|
|
|
struct ti_sci_handle *ti_sci = get_ti_sci_handle();
|
2020-02-12 08:25:06 +00:00
|
|
|
u32 loadaddr = 0;
|
2021-08-31 18:20:48 +00:00
|
|
|
int ret, size = 0, shut_cpu = 0;
|
2018-11-02 14:21:05 +00:00
|
|
|
|
2019-06-07 13:54:43 +00:00
|
|
|
/* Release all the exclusive devices held by SPL before starting ATF */
|
|
|
|
ti_sci->ops.dev_ops.release_exclusive_devices(ti_sci);
|
|
|
|
|
2020-02-12 08:25:04 +00:00
|
|
|
ret = rproc_init();
|
|
|
|
if (ret)
|
|
|
|
panic("rproc failed to be initialized (%d)\n", ret);
|
|
|
|
|
|
|
|
init_env();
|
2021-06-11 08:45:21 +00:00
|
|
|
|
|
|
|
if (!fit_image_info[IMAGE_ID_DM_FW].image_start) {
|
2021-06-11 08:45:19 +00:00
|
|
|
size = load_firmware("name_mcur5f0_0fw", "addr_mcur5f0_0load",
|
|
|
|
&loadaddr);
|
2021-06-11 08:45:21 +00:00
|
|
|
}
|
2020-02-12 08:25:04 +00:00
|
|
|
|
2018-11-02 14:21:05 +00:00
|
|
|
/*
|
|
|
|
* It is assumed that remoteproc device 1 is the corresponding
|
2019-02-04 18:58:47 +00:00
|
|
|
* Cortex-A core which runs ATF. Make sure DT reflects the same.
|
2018-11-02 14:21:05 +00:00
|
|
|
*/
|
2021-06-11 08:45:19 +00:00
|
|
|
if (!fit_image_info[IMAGE_ID_ATF].image_start)
|
|
|
|
fit_image_info[IMAGE_ID_ATF].image_start =
|
|
|
|
spl_image->entry_point;
|
|
|
|
|
|
|
|
ret = rproc_load(1, fit_image_info[IMAGE_ID_ATF].image_start, 0x200);
|
2019-02-04 18:58:47 +00:00
|
|
|
if (ret)
|
|
|
|
panic("%s: ATF failed to load on rproc (%d)\n", __func__, ret);
|
2018-11-02 14:21:05 +00:00
|
|
|
|
2023-04-14 04:18:01 +00:00
|
|
|
#if (CONFIG_IS_ENABLED(FIT_IMAGE_POST_PROCESS) && IS_ENABLED(CONFIG_SYS_K3_SPL_ATF))
|
|
|
|
/* Authenticate ATF */
|
|
|
|
void *image_addr = (void *)fit_image_info[IMAGE_ID_ATF].image_start;
|
|
|
|
|
|
|
|
debug("%s: Authenticating image: addr=%lx, size=%ld, os=%s\n", __func__,
|
|
|
|
fit_image_info[IMAGE_ID_ATF].image_start,
|
|
|
|
fit_image_info[IMAGE_ID_ATF].image_len,
|
|
|
|
image_os_match[IMAGE_ID_ATF]);
|
|
|
|
|
|
|
|
ti_secure_image_post_process(&image_addr,
|
|
|
|
(size_t *)&fit_image_info[IMAGE_ID_ATF].image_len);
|
|
|
|
|
|
|
|
/* Authenticate OPTEE */
|
|
|
|
image_addr = (void *)fit_image_info[IMAGE_ID_OPTEE].image_start;
|
|
|
|
|
|
|
|
debug("%s: Authenticating image: addr=%lx, size=%ld, os=%s\n", __func__,
|
|
|
|
fit_image_info[IMAGE_ID_OPTEE].image_start,
|
|
|
|
fit_image_info[IMAGE_ID_OPTEE].image_len,
|
|
|
|
image_os_match[IMAGE_ID_OPTEE]);
|
|
|
|
|
|
|
|
ti_secure_image_post_process(&image_addr,
|
|
|
|
(size_t *)&fit_image_info[IMAGE_ID_OPTEE].image_len);
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2021-06-11 08:45:19 +00:00
|
|
|
if (!fit_image_info[IMAGE_ID_DM_FW].image_len &&
|
|
|
|
!(size > 0 && valid_elf_image(loadaddr))) {
|
2021-08-31 18:20:48 +00:00
|
|
|
shut_cpu = 1;
|
|
|
|
goto start_arm64;
|
2020-02-12 08:25:06 +00:00
|
|
|
}
|
2018-11-02 14:21:05 +00:00
|
|
|
|
2021-06-11 08:45:19 +00:00
|
|
|
if (!fit_image_info[IMAGE_ID_DM_FW].image_start) {
|
|
|
|
loadaddr = load_elf_image_phdr(loadaddr);
|
|
|
|
} else {
|
|
|
|
loadaddr = fit_image_info[IMAGE_ID_DM_FW].image_start;
|
|
|
|
if (valid_elf_image(loadaddr))
|
|
|
|
loadaddr = load_elf_image_phdr(loadaddr);
|
|
|
|
}
|
|
|
|
|
|
|
|
debug("%s: jumping to address %x\n", __func__, loadaddr);
|
|
|
|
|
2021-08-31 18:20:48 +00:00
|
|
|
start_arm64:
|
|
|
|
/* Add an extra newline to differentiate the ATF logs from SPL */
|
|
|
|
printf("Starting ATF on ARM64 core...\n\n");
|
|
|
|
|
|
|
|
ret = rproc_start(1);
|
|
|
|
if (ret)
|
|
|
|
panic("%s: ATF failed to start on rproc (%d)\n", __func__, ret);
|
|
|
|
|
|
|
|
if (shut_cpu) {
|
|
|
|
debug("Shutting down...\n");
|
|
|
|
release_resources_for_core_shutdown();
|
|
|
|
|
|
|
|
while (1)
|
|
|
|
asm volatile("wfe");
|
|
|
|
}
|
2021-06-11 08:45:19 +00:00
|
|
|
image_entry_noargs_t image_entry = (image_entry_noargs_t)loadaddr;
|
2019-06-07 13:54:42 +00:00
|
|
|
|
2020-02-12 08:25:06 +00:00
|
|
|
image_entry();
|
2018-11-02 14:21:05 +00:00
|
|
|
}
|
|
|
|
#endif
|
2019-03-08 06:17:34 +00:00
|
|
|
|
2021-06-11 08:45:19 +00:00
|
|
|
#if CONFIG_IS_ENABLED(FIT_IMAGE_POST_PROCESS)
|
|
|
|
void board_fit_image_post_process(const void *fit, int node, void **p_image,
|
|
|
|
size_t *p_size)
|
|
|
|
{
|
|
|
|
#if IS_ENABLED(CONFIG_SYS_K3_SPL_ATF)
|
|
|
|
int len;
|
|
|
|
int i;
|
|
|
|
const char *os;
|
|
|
|
u32 addr;
|
|
|
|
|
|
|
|
os = fdt_getprop(fit, node, "os", &len);
|
|
|
|
addr = fdt_getprop_u32_default_node(fit, node, 0, "entry", -1);
|
|
|
|
|
|
|
|
debug("%s: processing image: addr=%x, size=%d, os=%s\n", __func__,
|
|
|
|
addr, *p_size, os);
|
|
|
|
|
|
|
|
for (i = 0; i < IMAGE_AMT; i++) {
|
|
|
|
if (!strcmp(os, image_os_match[i])) {
|
|
|
|
fit_image_info[i].image_start = addr;
|
|
|
|
fit_image_info[i].image_len = *p_size;
|
|
|
|
debug("%s: matched image for ID %d\n", __func__, i);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2023-04-14 04:18:01 +00:00
|
|
|
/*
|
|
|
|
* Only DM and the DTBs are being authenticated here,
|
|
|
|
* rest will be authenticated when A72 cluster is up
|
|
|
|
*/
|
|
|
|
if ((i != IMAGE_ID_ATF) && (i != IMAGE_ID_OPTEE))
|
2021-06-11 08:45:19 +00:00
|
|
|
#endif
|
2023-04-14 04:18:01 +00:00
|
|
|
{
|
2023-05-18 07:14:17 +00:00
|
|
|
ti_secure_image_check_binary(p_image, p_size);
|
2023-04-14 04:18:01 +00:00
|
|
|
ti_secure_image_post_process(p_image, p_size);
|
|
|
|
}
|
2023-05-18 07:14:17 +00:00
|
|
|
#if IS_ENABLED(CONFIG_SYS_K3_SPL_ATF)
|
|
|
|
else
|
|
|
|
ti_secure_image_check_binary(p_image, p_size);
|
|
|
|
#endif
|
2021-06-11 08:45:19 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
arm: K3: j721e: Add basic support for J721E SoC definition
The J721E SoC belongs to the K3 Multicore SoC architecture platform,
providing advanced system integration to enable lower system costs
of automotive applications such as infotainment, cluster, premium
Audio, Gateway, industrial and a range of broad market applications.
This SoC is designed around reducing the system cost by eliminating
the need of an external system MCU and is targeted towards ASIL-B/C
certification/requirements in addition to allowing complex software
and system use-cases.
Some highlights of this SoC are:
* Dual Cortex-A72s in a single cluster, three clusters of lockstep
capable dual Cortex-R5F MCUs, Deep-learning Matrix Multiply Accelerator(MMA),
C7x floating point Vector DSP, Two C66x floating point DSPs.
* 3D GPU PowerVR Rogue 8XE GE8430
* Vision Processing Accelerator (VPAC) with image signal processor and Depth
and Motion Processing Accelerator (DMPAC)
* Two Gigabit Industrial Communication Subsystems (ICSSG), each with dual
PRUs and dual RTUs
* Two CSI2.0 4L RX plus one CSI2.0 4L TX, one eDP/DP, One DSI Tx, and
up to two DPI interfaces.
* Integrated Ethernet switch supporting up to a total of 8 external ports in
addition to legacy Ethernet switch of up to 2 ports.
* System MMU (SMMU) Version 3.0 and advanced virtualisation
capabilities.
* Upto 4 PCIe-GEN3 controllers, 2 USB3.0 Dual-role device subsystems,
16 MCANs, 12 McASP, eMMC and SD, UFS, OSPI/HyperBus memory controller, QSPI,
I3C and I2C, eCAP/eQEP, eHRPWM, MLB among other peripherals.
* Two hardware accelerator block containing AES/DES/SHA/MD5 called SA2UL
management.
* Configurable L3 Cache and IO-coherent architecture with high data throughput
capable distributed DMA architecture under NAVSS
* Centralized System Controller for Security, Power, and Resource
Management (DMSC)
See J721E Technical Reference Manual (SPRUIL1, May 2019)
for further details: http://www.ti.com/lit/pdf/spruil1
Add base support for J721E SoC
Signed-off-by: Lokesh Vutla <lokeshvutla@ti.com>
Signed-off-by: Andreas Dannenberg <dannenberg@ti.com>
Signed-off-by: Nishanth Menon <nm@ti.com>
2019-06-13 04:59:42 +00:00
|
|
|
#ifndef CONFIG_SYSRESET
|
2020-12-15 15:47:52 +00:00
|
|
|
void reset_cpu(void)
|
arm: K3: j721e: Add basic support for J721E SoC definition
The J721E SoC belongs to the K3 Multicore SoC architecture platform,
providing advanced system integration to enable lower system costs
of automotive applications such as infotainment, cluster, premium
Audio, Gateway, industrial and a range of broad market applications.
This SoC is designed around reducing the system cost by eliminating
the need of an external system MCU and is targeted towards ASIL-B/C
certification/requirements in addition to allowing complex software
and system use-cases.
Some highlights of this SoC are:
* Dual Cortex-A72s in a single cluster, three clusters of lockstep
capable dual Cortex-R5F MCUs, Deep-learning Matrix Multiply Accelerator(MMA),
C7x floating point Vector DSP, Two C66x floating point DSPs.
* 3D GPU PowerVR Rogue 8XE GE8430
* Vision Processing Accelerator (VPAC) with image signal processor and Depth
and Motion Processing Accelerator (DMPAC)
* Two Gigabit Industrial Communication Subsystems (ICSSG), each with dual
PRUs and dual RTUs
* Two CSI2.0 4L RX plus one CSI2.0 4L TX, one eDP/DP, One DSI Tx, and
up to two DPI interfaces.
* Integrated Ethernet switch supporting up to a total of 8 external ports in
addition to legacy Ethernet switch of up to 2 ports.
* System MMU (SMMU) Version 3.0 and advanced virtualisation
capabilities.
* Upto 4 PCIe-GEN3 controllers, 2 USB3.0 Dual-role device subsystems,
16 MCANs, 12 McASP, eMMC and SD, UFS, OSPI/HyperBus memory controller, QSPI,
I3C and I2C, eCAP/eQEP, eHRPWM, MLB among other peripherals.
* Two hardware accelerator block containing AES/DES/SHA/MD5 called SA2UL
management.
* Configurable L3 Cache and IO-coherent architecture with high data throughput
capable distributed DMA architecture under NAVSS
* Centralized System Controller for Security, Power, and Resource
Management (DMSC)
See J721E Technical Reference Manual (SPRUIL1, May 2019)
for further details: http://www.ti.com/lit/pdf/spruil1
Add base support for J721E SoC
Signed-off-by: Lokesh Vutla <lokeshvutla@ti.com>
Signed-off-by: Andreas Dannenberg <dannenberg@ti.com>
Signed-off-by: Nishanth Menon <nm@ti.com>
2019-06-13 04:59:42 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
#endif
|
2019-09-27 08:02:11 +00:00
|
|
|
|
2022-07-15 16:34:32 +00:00
|
|
|
enum k3_device_type get_device_type(void)
|
|
|
|
{
|
|
|
|
u32 sys_status = readl(K3_SEC_MGR_SYS_STATUS);
|
|
|
|
|
|
|
|
u32 sys_dev_type = (sys_status & SYS_STATUS_DEV_TYPE_MASK) >>
|
|
|
|
SYS_STATUS_DEV_TYPE_SHIFT;
|
|
|
|
|
|
|
|
u32 sys_sub_type = (sys_status & SYS_STATUS_SUB_TYPE_MASK) >>
|
|
|
|
SYS_STATUS_SUB_TYPE_SHIFT;
|
|
|
|
|
|
|
|
switch (sys_dev_type) {
|
|
|
|
case SYS_STATUS_DEV_TYPE_GP:
|
|
|
|
return K3_DEVICE_TYPE_GP;
|
|
|
|
case SYS_STATUS_DEV_TYPE_TEST:
|
|
|
|
return K3_DEVICE_TYPE_TEST;
|
|
|
|
case SYS_STATUS_DEV_TYPE_EMU:
|
|
|
|
return K3_DEVICE_TYPE_EMU;
|
|
|
|
case SYS_STATUS_DEV_TYPE_HS:
|
|
|
|
if (sys_sub_type == SYS_STATUS_SUB_TYPE_VAL_FS)
|
|
|
|
return K3_DEVICE_TYPE_HS_FS;
|
|
|
|
else
|
|
|
|
return K3_DEVICE_TYPE_HS_SE;
|
|
|
|
default:
|
|
|
|
return K3_DEVICE_TYPE_BAD;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-27 08:02:11 +00:00
|
|
|
#if defined(CONFIG_DISPLAY_CPUINFO)
|
2022-07-15 16:34:32 +00:00
|
|
|
static const char *get_device_type_name(void)
|
|
|
|
{
|
|
|
|
enum k3_device_type type = get_device_type();
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case K3_DEVICE_TYPE_GP:
|
|
|
|
return "GP";
|
|
|
|
case K3_DEVICE_TYPE_TEST:
|
|
|
|
return "TEST";
|
|
|
|
case K3_DEVICE_TYPE_EMU:
|
|
|
|
return "EMU";
|
|
|
|
case K3_DEVICE_TYPE_HS_FS:
|
|
|
|
return "HS-FS";
|
|
|
|
case K3_DEVICE_TYPE_HS_SE:
|
|
|
|
return "HS-SE";
|
|
|
|
default:
|
|
|
|
return "BAD";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-27 08:02:11 +00:00
|
|
|
int print_cpuinfo(void)
|
|
|
|
{
|
2020-07-16 04:40:04 +00:00
|
|
|
struct udevice *soc;
|
|
|
|
char name[64];
|
|
|
|
int ret;
|
2020-07-16 04:40:04 +00:00
|
|
|
|
2020-07-24 12:42:06 +00:00
|
|
|
printf("SoC: ");
|
2020-07-16 04:40:04 +00:00
|
|
|
|
2020-07-16 04:40:04 +00:00
|
|
|
ret = soc_get(&soc);
|
|
|
|
if (ret) {
|
|
|
|
printf("UNKNOWN\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = soc_get_family(soc, name, 64);
|
|
|
|
if (!ret) {
|
|
|
|
printf("%s ", name);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = soc_get_revision(soc, name, 64);
|
|
|
|
if (!ret) {
|
2022-07-15 16:34:32 +00:00
|
|
|
printf("%s ", name);
|
2020-07-16 04:40:04 +00:00
|
|
|
}
|
2019-09-27 08:02:11 +00:00
|
|
|
|
2022-07-15 16:34:32 +00:00
|
|
|
printf("%s\n", get_device_type_name());
|
|
|
|
|
2019-09-27 08:02:11 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
2019-10-07 08:22:17 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_ARM64
|
2022-09-07 02:26:50 +00:00
|
|
|
void board_prep_linux(struct bootm_headers *images)
|
2019-10-07 08:22:17 +00:00
|
|
|
{
|
|
|
|
debug("Linux kernel Image start = 0x%lx end = 0x%lx\n",
|
|
|
|
images->os.start, images->os.end);
|
|
|
|
__asm_flush_dcache_range(images->os.start,
|
|
|
|
ROUND(images->os.end,
|
|
|
|
CONFIG_SYS_CACHELINE_SIZE));
|
|
|
|
}
|
|
|
|
#endif
|
2019-12-31 10:19:55 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_CPU_V7R
|
|
|
|
void disable_linefill_optimization(void)
|
|
|
|
{
|
|
|
|
u32 actlr;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* On K3 devices there are 2 conditions where R5F can deadlock:
|
|
|
|
* 1.When software is performing series of store operations to
|
|
|
|
* cacheable write back/write allocate memory region and later
|
|
|
|
* on software execute barrier operation (DSB or DMB). R5F may
|
|
|
|
* hang at the barrier instruction.
|
|
|
|
* 2.When software is performing a mix of load and store operations
|
|
|
|
* within a tight loop and store operations are all writing to
|
|
|
|
* cacheable write back/write allocates memory regions, R5F may
|
|
|
|
* hang at one of the load instruction.
|
|
|
|
*
|
|
|
|
* To avoid the above two conditions disable linefill optimization
|
|
|
|
* inside Cortex R5F.
|
|
|
|
*/
|
|
|
|
asm("mrc p15, 0, %0, c1, c0, 1" : "=r" (actlr));
|
|
|
|
actlr |= (1 << 13); /* Set DLFO bit */
|
|
|
|
asm("mcr p15, 0, %0, c1, c0, 1" : : "r" (actlr));
|
|
|
|
}
|
|
|
|
#endif
|
2020-01-10 19:35:21 +00:00
|
|
|
|
2023-05-05 10:24:00 +00:00
|
|
|
static void remove_fwl_regions(struct fwl_data fwl_data, size_t num_regions,
|
|
|
|
enum k3_firewall_region_type fwl_type)
|
2020-01-10 19:35:21 +00:00
|
|
|
{
|
|
|
|
struct ti_sci_fwl_ops *fwl_ops;
|
|
|
|
struct ti_sci_handle *ti_sci;
|
2023-05-05 10:24:00 +00:00
|
|
|
struct ti_sci_msg_fwl_region region;
|
|
|
|
size_t j;
|
2020-01-10 19:35:21 +00:00
|
|
|
|
|
|
|
ti_sci = get_ti_sci_handle();
|
|
|
|
fwl_ops = &ti_sci->ops.fwl_ops;
|
2023-05-05 10:24:00 +00:00
|
|
|
|
|
|
|
for (j = 0; j < fwl_data.regions; j++) {
|
|
|
|
region.fwl_id = fwl_data.fwl_id;
|
|
|
|
region.region = j;
|
|
|
|
region.n_permission_regs = 3;
|
|
|
|
|
|
|
|
fwl_ops->get_fwl_region(ti_sci, ®ion);
|
|
|
|
|
|
|
|
/* Don't disable the background regions */
|
|
|
|
if (region.control != 0 &&
|
2023-07-14 05:52:27 +00:00
|
|
|
((region.control >> K3_FIREWALL_BACKGROUND_BIT) & 1) == fwl_type) {
|
2023-05-05 10:24:00 +00:00
|
|
|
pr_debug("Attempting to disable firewall %5d (%25s)\n",
|
|
|
|
region.fwl_id, fwl_data.name);
|
|
|
|
region.control = 0;
|
|
|
|
|
|
|
|
if (fwl_ops->set_fwl_region(ti_sci, ®ion))
|
|
|
|
pr_err("Could not disable firewall %5d (%25s)\n",
|
|
|
|
region.fwl_id, fwl_data.name);
|
2020-01-10 19:35:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-05-18 05:57:22 +00:00
|
|
|
|
2023-05-05 10:24:00 +00:00
|
|
|
void remove_fwl_configs(struct fwl_data *fwl_data, size_t fwl_data_size)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
for (i = 0; i < fwl_data_size; i++) {
|
|
|
|
remove_fwl_regions(fwl_data[i], fwl_data[i].regions,
|
|
|
|
K3_FIREWALL_REGION_FOREGROUND);
|
|
|
|
remove_fwl_regions(fwl_data[i], fwl_data[i].regions,
|
|
|
|
K3_FIREWALL_REGION_BACKGROUND);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-18 05:57:22 +00:00
|
|
|
void spl_enable_dcache(void)
|
|
|
|
{
|
|
|
|
#if !(defined(CONFIG_SYS_ICACHE_OFF) && defined(CONFIG_SYS_DCACHE_OFF))
|
2022-11-16 18:10:37 +00:00
|
|
|
phys_addr_t ram_top = CFG_SYS_SDRAM_BASE;
|
2020-05-18 05:57:22 +00:00
|
|
|
|
2022-06-14 14:45:30 +00:00
|
|
|
dram_init();
|
2020-05-18 05:57:22 +00:00
|
|
|
|
|
|
|
/* reserve TLB table */
|
|
|
|
gd->arch.tlb_size = PGTABLE_SIZE;
|
|
|
|
|
|
|
|
ram_top += get_effective_memsize();
|
|
|
|
/* keep ram_top in the 32-bit address space */
|
|
|
|
if (ram_top >= 0x100000000)
|
|
|
|
ram_top = (phys_addr_t) 0x100000000;
|
|
|
|
|
|
|
|
gd->arch.tlb_addr = ram_top - gd->arch.tlb_size;
|
2023-07-18 08:57:28 +00:00
|
|
|
gd->arch.tlb_addr &= ~(0x10000 - 1);
|
2020-05-18 05:57:22 +00:00
|
|
|
debug("TLB table from %08lx to %08lx\n", gd->arch.tlb_addr,
|
|
|
|
gd->arch.tlb_addr + gd->arch.tlb_size);
|
2023-07-18 08:57:28 +00:00
|
|
|
gd->relocaddr = gd->arch.tlb_addr;
|
2020-05-18 05:57:22 +00:00
|
|
|
|
|
|
|
dcache_enable();
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
#if !(defined(CONFIG_SYS_ICACHE_OFF) && defined(CONFIG_SYS_DCACHE_OFF))
|
|
|
|
void spl_board_prepare_for_boot(void)
|
|
|
|
{
|
|
|
|
dcache_disable();
|
|
|
|
}
|
|
|
|
|
2020-07-07 12:25:15 +00:00
|
|
|
void spl_board_prepare_for_linux(void)
|
2020-05-18 05:57:22 +00:00
|
|
|
{
|
|
|
|
dcache_disable();
|
|
|
|
}
|
|
|
|
#endif
|
2021-12-24 07:25:29 +00:00
|
|
|
|
|
|
|
int misc_init_r(void)
|
|
|
|
{
|
|
|
|
if (IS_ENABLED(CONFIG_TI_AM65_CPSW_NUSS)) {
|
|
|
|
struct udevice *dev;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = uclass_get_device_by_driver(UCLASS_MISC,
|
|
|
|
DM_DRIVER_GET(am65_cpsw_nuss),
|
|
|
|
&dev);
|
|
|
|
if (ret)
|
|
|
|
printf("Failed to probe am65_cpsw_nuss driver\n");
|
|
|
|
}
|
|
|
|
|
2023-04-20 16:12:21 +00:00
|
|
|
/* Default FIT boot on HS-SE devices */
|
|
|
|
if (get_device_type() == K3_DEVICE_TYPE_HS_SE)
|
2022-10-07 16:27:46 +00:00
|
|
|
env_set("boot_fit", "1");
|
|
|
|
|
2021-12-24 07:25:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2023-04-06 16:38:17 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* do_board_detect() - Detect board description
|
|
|
|
*
|
|
|
|
* Function to detect board description. This is expected to be
|
|
|
|
* overridden in the SoC family board file where desired.
|
|
|
|
*/
|
|
|
|
void __weak do_board_detect(void)
|
|
|
|
{
|
|
|
|
}
|