amlogic: g12a: Add support for the S905X2 (G12A) platform
authorCarlo Caione <ccaione@baylibre.com>
Wed, 18 Sep 2019 10:29:48 +0000 (11:29 +0100)
committerCarlo Caione <ccaione@baylibre.com>
Thu, 26 Sep 2019 08:27:45 +0000 (09:27 +0100)
Introduce the preliminary support for the Amlogic S905X2 (G12A) SoC.

This port is a minimal implementation of BL31 capable of booting
mainline U-Boot and Linux. Tested on a SEI510 board.

Signed-off-by: Carlo Caione <ccaione@baylibre.com>
Change-Id: Ife958f10e815a4530292c45446adb71239f3367f

docs/maintainers.rst
docs/plat/meson-g12a.rst [new file with mode: 0644]
plat/amlogic/g12a/g12a_bl31_setup.c [new file with mode: 0644]
plat/amlogic/g12a/g12a_common.c [new file with mode: 0644]
plat/amlogic/g12a/g12a_def.h [new file with mode: 0644]
plat/amlogic/g12a/g12a_pm.c [new file with mode: 0644]
plat/amlogic/g12a/include/platform_def.h [new file with mode: 0644]
plat/amlogic/g12a/platform.mk [new file with mode: 0644]

index 7731c72eca889efae6bae75be1dc6d98646a416b..d997baace00d38ab8a9da5bc621b5c916f0ffe3c 100644 (file)
@@ -48,6 +48,14 @@ Amlogic Meson S905x (GXL) platform port
 :F: drivers/amlogic/gxl
 :F: plat/amlogic/gxl/
 
+Amlogic Meson S905X2 (G12A) platform port
+---------------------------------------
+:M: Carlo Caione <ccaione@baylibre.com>
+:G: `carlo.caione`_
+:F: docs/plat/meson-g12a.rst
+:F: drivers/amlogic/g12a
+:F: plat/amlogic/g12a/
+
 Armv7-A architecture port
 -------------------------
 :M: Etienne Carriere <etienne.carriere@linaro.org>
diff --git a/docs/plat/meson-g12a.rst b/docs/plat/meson-g12a.rst
new file mode 100644 (file)
index 0000000..1021da4
--- /dev/null
@@ -0,0 +1,27 @@
+Amlogic Meson S905X2 (G12A)
+==========================
+
+The Amlogic Meson S905X2 is a SoC with a quad core Arm Cortex-A53 running at
+~1.8GHz. It also contains a Cortex-M3 used as SCP.
+
+This port is a minimal implementation of BL31 capable of booting mainline U-Boot
+and Linux:
+
+- SCPI support.
+- Basic PSCI support (CPU_ON, CPU_OFF, SYSTEM_RESET, SYSTEM_OFF). Note that CPU0
+  can't be turned off, so there is a workaround to hide this from the caller.
+- GICv2 driver set up.
+- Basic SIP services (read efuse data, enable/disable JTAG).
+
+In order to build it:
+
+.. code:: shell
+
+    CROSS_COMPILE=aarch64-linux-gnu- make DEBUG=1 PLAT=g12a
+
+This port has been tested on a SEI510 board. After building it, follow the
+instructions in the `gxlimg repository` or `U-Boot repository`_, replacing the
+mentioned **bl31.img** by the one built from this port.
+
+.. _gxlimg repository: https://github.com/repk/gxlimg/blob/master/README.g12a
+.. _U-Boot repository: https://github.com/u-boot/u-boot/blob/master/board/amlogic/sei510/README
diff --git a/plat/amlogic/g12a/g12a_bl31_setup.c b/plat/amlogic/g12a/g12a_bl31_setup.c
new file mode 100644 (file)
index 0000000..77057a1
--- /dev/null
@@ -0,0 +1,142 @@
+/*
+ * Copyright (c) 2019, ARM Limited and Contributors. All rights reserved.
+ *
+ * SPDX-License-Identifier: BSD-3-Clause
+ */
+
+#include <assert.h>
+#include <common/bl_common.h>
+#include <common/interrupt_props.h>
+#include <drivers/arm/gicv2.h>
+#include <lib/mmio.h>
+#include <lib/xlat_tables/xlat_mmu_helpers.h>
+#include <plat/common/platform.h>
+#include <platform_def.h>
+
+#include "aml_private.h"
+
+/*
+ * Placeholder variables for copying the arguments that have been passed to
+ * BL31 from BL2.
+ */
+static entry_point_info_t bl32_image_ep_info;
+static entry_point_info_t bl33_image_ep_info;
+static image_info_t bl30_image_info;
+static image_info_t bl301_image_info;
+
+/*******************************************************************************
+ * Return a pointer to the 'entry_point_info' structure of the next image for
+ * the security state specified. BL33 corresponds to the non-secure image type
+ * while BL32 corresponds to the secure image type. A NULL pointer is returned
+ * if the image does not exist.
+ ******************************************************************************/
+entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
+{
+       entry_point_info_t *next_image_info;
+
+       next_image_info = (type == NON_SECURE) ?
+                         &bl33_image_ep_info : &bl32_image_ep_info;
+
+       /* None of the images can have 0x0 as the entrypoint. */
+       if (next_image_info->pc != 0U)
+               return next_image_info;
+
+       return NULL;
+}
+
+/*******************************************************************************
+ * Perform any BL31 early platform setup. Here is an opportunity to copy
+ * parameters passed by the calling EL (S-EL1 in BL2 & S-EL3 in BL1) before
+ * they are lost (potentially). This needs to be done before the MMU is
+ * initialized so that the memory layout can be used while creating page
+ * tables. BL2 has flushed this information to memory, so we are guaranteed
+ * to pick up good data.
+ ******************************************************************************/
+struct g12a_bl31_param {
+       param_header_t h;
+       image_info_t *bl31_image_info;
+       entry_point_info_t *bl32_ep_info;
+       image_info_t *bl32_image_info;
+       entry_point_info_t *bl33_ep_info;
+       image_info_t *bl33_image_info;
+       image_info_t *scp_image_info[];
+};
+
+void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
+                               u_register_t arg2, u_register_t arg3)
+{
+       struct g12a_bl31_param *from_bl2;
+
+       /* Initialize the console to provide early debug support */
+       aml_console_init();
+
+       from_bl2 = (struct g12a_bl31_param *)arg0;
+
+       /* Check params passed from BL2 are not NULL. */
+       assert(from_bl2 != NULL);
+       assert(from_bl2->h.type == PARAM_BL31);
+       assert(from_bl2->h.version >= VERSION_1);
+
+       /*
+        * Copy BL32 and BL33 entry point information. It is stored in Secure
+        * RAM, in BL2's address space.
+        */
+       bl32_image_ep_info = *from_bl2->bl32_ep_info;
+       bl33_image_ep_info = *from_bl2->bl33_ep_info;
+
+       if (bl33_image_ep_info.pc == 0U) {
+               ERROR("BL31: BL33 entrypoint not obtained from BL2\n");
+               panic();
+       }
+
+       bl30_image_info = *from_bl2->scp_image_info[0];
+       bl301_image_info = *from_bl2->scp_image_info[1];
+}
+
+void bl31_plat_arch_setup(void)
+{
+       aml_setup_page_tables();
+
+       enable_mmu_el3(0);
+}
+
+/*******************************************************************************
+ * GICv2 driver setup information
+ ******************************************************************************/
+static const interrupt_prop_t g12a_interrupt_props[] = {
+       INTR_PROP_DESC(IRQ_SEC_PHY_TIMER, GIC_HIGHEST_SEC_PRIORITY,
+                      GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
+       INTR_PROP_DESC(IRQ_SEC_SGI_0, GIC_HIGHEST_SEC_PRIORITY,
+                      GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
+       INTR_PROP_DESC(IRQ_SEC_SGI_1, GIC_HIGHEST_SEC_PRIORITY,
+                      GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
+       INTR_PROP_DESC(IRQ_SEC_SGI_2, GIC_HIGHEST_SEC_PRIORITY,
+                      GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
+       INTR_PROP_DESC(IRQ_SEC_SGI_3, GIC_HIGHEST_SEC_PRIORITY,
+                      GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
+       INTR_PROP_DESC(IRQ_SEC_SGI_4, GIC_HIGHEST_SEC_PRIORITY,
+                      GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
+       INTR_PROP_DESC(IRQ_SEC_SGI_5, GIC_HIGHEST_SEC_PRIORITY,
+                      GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
+       INTR_PROP_DESC(IRQ_SEC_SGI_6, GIC_HIGHEST_SEC_PRIORITY,
+                      GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL),
+       INTR_PROP_DESC(IRQ_SEC_SGI_7, GIC_HIGHEST_SEC_PRIORITY,
+                      GICV2_INTR_GROUP0, GIC_INTR_CFG_LEVEL)
+};
+
+static const gicv2_driver_data_t g12a_gic_data = {
+       .gicd_base = AML_GICD_BASE,
+       .gicc_base = AML_GICC_BASE,
+       .interrupt_props = g12a_interrupt_props,
+       .interrupt_props_num = ARRAY_SIZE(g12a_interrupt_props)
+};
+
+void bl31_platform_setup(void)
+{
+       aml_mhu_secure_init();
+
+       gicv2_driver_init(&g12a_gic_data);
+       gicv2_distif_init();
+       gicv2_pcpu_distif_init();
+       gicv2_cpuif_enable();
+}
diff --git a/plat/amlogic/g12a/g12a_common.c b/plat/amlogic/g12a/g12a_common.c
new file mode 100644 (file)
index 0000000..e74ed04
--- /dev/null
@@ -0,0 +1,125 @@
+/*
+ * Copyright (c) 2019, ARM Limited and Contributors. All rights reserved.
+ *
+ * SPDX-License-Identifier: BSD-3-Clause
+ */
+
+#include <assert.h>
+#include <bl31/interrupt_mgmt.h>
+#include <common/bl_common.h>
+#include <common/ep_info.h>
+#include <lib/mmio.h>
+#include <lib/xlat_tables/xlat_tables_v2.h>
+#include <platform_def.h>
+#include <stdint.h>
+
+/*******************************************************************************
+ * Platform memory map regions
+ ******************************************************************************/
+#define MAP_NSDRAM0            MAP_REGION_FLAT(AML_NSDRAM0_BASE,               \
+                                               AML_NSDRAM0_SIZE,               \
+                                               MT_MEMORY | MT_RW | MT_NS)
+
+#define MAP_NS_SHARE_MEM       MAP_REGION_FLAT(AML_NS_SHARE_MEM_BASE,          \
+                                               AML_NS_SHARE_MEM_SIZE,          \
+                                               MT_MEMORY | MT_RW | MT_NS)
+
+#define MAP_SEC_SHARE_MEM      MAP_REGION_FLAT(AML_SEC_SHARE_MEM_BASE,         \
+                                               AML_SEC_SHARE_MEM_SIZE,         \
+                                               MT_MEMORY | MT_RW | MT_SECURE)
+
+#define MAP_SEC_DEVICE0                MAP_REGION_FLAT(AML_SEC_DEVICE0_BASE,           \
+                                               AML_SEC_DEVICE0_SIZE,           \
+                                               MT_DEVICE | MT_RW)
+
+#define MAP_HDCP_RX            MAP_REGION_FLAT(AML_HDCP_RX_BASE,               \
+                                               AML_HDCP_RX_SIZE,               \
+                                               MT_DEVICE | MT_RW | MT_SECURE)
+
+#define MAP_HDCP_TX            MAP_REGION_FLAT(AML_HDCP_TX_BASE,               \
+                                               AML_HDCP_TX_SIZE,               \
+                                               MT_DEVICE | MT_RW | MT_SECURE)
+
+#define MAP_GIC_DEVICE         MAP_REGION_FLAT(AML_GIC_DEVICE_BASE,            \
+                                               AML_GIC_DEVICE_SIZE,            \
+                                               MT_DEVICE | MT_RW | MT_SECURE)
+
+#define MAP_SEC_DEVICE1                MAP_REGION_FLAT(AML_SEC_DEVICE1_BASE,           \
+                                               AML_SEC_DEVICE1_SIZE,           \
+                                               MT_DEVICE | MT_RW | MT_SECURE)
+
+#define MAP_SEC_DEVICE2                MAP_REGION_FLAT(AML_SEC_DEVICE2_BASE,           \
+                                               AML_SEC_DEVICE2_SIZE,           \
+                                               MT_DEVICE | MT_RW | MT_SECURE)
+
+#define MAP_TZRAM              MAP_REGION_FLAT(AML_TZRAM_BASE,                 \
+                                               AML_TZRAM_SIZE,                 \
+                                               MT_DEVICE | MT_RW | MT_SECURE)
+
+static const mmap_region_t g12a_mmap[] = {
+       MAP_NSDRAM0,
+       MAP_NS_SHARE_MEM,
+       MAP_SEC_SHARE_MEM,
+       MAP_SEC_DEVICE0,
+       MAP_HDCP_RX,
+       MAP_HDCP_TX,
+       MAP_GIC_DEVICE,
+       MAP_SEC_DEVICE1,
+       MAP_SEC_DEVICE2,
+       MAP_TZRAM,
+       {0}
+};
+
+/*******************************************************************************
+ * Per-image regions
+ ******************************************************************************/
+#define MAP_BL31       MAP_REGION_FLAT(BL31_BASE,                                      \
+                                       BL31_END - BL31_BASE,                           \
+                                       MT_MEMORY | MT_RW | MT_SECURE)
+
+#define MAP_BL_CODE    MAP_REGION_FLAT(BL_CODE_BASE,                                   \
+                                       BL_CODE_END - BL_CODE_BASE,                     \
+                                       MT_CODE | MT_SECURE)
+
+#define MAP_BL_RO_DATA MAP_REGION_FLAT(BL_RO_DATA_BASE,                                \
+                                       BL_RO_DATA_END - BL_RO_DATA_BASE,               \
+                                       MT_RO_DATA | MT_SECURE)
+
+#define MAP_BL_COHERENT        MAP_REGION_FLAT(BL_COHERENT_RAM_BASE,                           \
+                                       BL_COHERENT_RAM_END - BL_COHERENT_RAM_BASE,     \
+                                       MT_DEVICE | MT_RW | MT_SECURE)
+
+/*******************************************************************************
+ * Function that sets up the translation tables.
+ ******************************************************************************/
+void aml_setup_page_tables(void)
+{
+#if IMAGE_BL31
+       const mmap_region_t g12a_bl_mmap[] = {
+               MAP_BL31,
+               MAP_BL_CODE,
+               MAP_BL_RO_DATA,
+#if USE_COHERENT_MEM
+               MAP_BL_COHERENT,
+#endif
+               {0}
+       };
+#endif
+
+       mmap_add(g12a_bl_mmap);
+
+       mmap_add(g12a_mmap);
+
+       init_xlat_tables();
+}
+
+/*******************************************************************************
+ * Function that returns the system counter frequency
+ ******************************************************************************/
+unsigned int plat_get_syscnt_freq2(void)
+{
+       mmio_clrbits_32(AML_SYS_CPU_CFG7, ~0xFDFFFFFF);
+       mmio_clrbits_32(AML_AO_TIMESTAMP_CNTL, ~0xFFFFFE00);
+
+       return AML_OSC24M_CLK_IN_HZ;
+}
diff --git a/plat/amlogic/g12a/g12a_def.h b/plat/amlogic/g12a/g12a_def.h
new file mode 100644 (file)
index 0000000..d032815
--- /dev/null
@@ -0,0 +1,135 @@
+/*
+ * Copyright (c) 2019, ARM Limited and Contributors. All rights reserved.
+ *
+ * SPDX-License-Identifier: BSD-3-Clause
+ */
+
+#ifndef G12A_DEF_H
+#define G12A_DEF_H
+
+#include <lib/utils_def.h>
+
+/*******************************************************************************
+ * System oscillator
+ ******************************************************************************/
+#define AML_OSC24M_CLK_IN_HZ                   ULL(24000000) /* 24 MHz */
+
+/*******************************************************************************
+ * Memory regions
+ ******************************************************************************/
+#define AML_HDCP_RX_BASE                       UL(0xFFE0D000)
+#define AML_HDCP_RX_SIZE                       UL(0x00002000)
+
+#define AML_HDCP_TX_BASE                       UL(0xFFE01000)
+#define AML_HDCP_TX_SIZE                       UL(0x00001000)
+
+#define AML_NS_SHARE_MEM_BASE                  UL(0x05000000)
+#define AML_NS_SHARE_MEM_SIZE                  UL(0x00100000)
+
+#define AML_SEC_SHARE_MEM_BASE                 UL(0x05200000)
+#define AML_SEC_SHARE_MEM_SIZE                 UL(0x00100000)
+
+#define AML_GIC_DEVICE_BASE                    UL(0xFFC00000)
+#define AML_GIC_DEVICE_SIZE                    UL(0x00008000)
+
+#define AML_NSDRAM0_BASE                       UL(0x01000000)
+#define AML_NSDRAM0_SIZE                       UL(0x0F000000)
+
+#define BL31_BASE                              UL(0x05100000)
+#define BL31_SIZE                              UL(0x00100000)
+#define BL31_LIMIT                             (BL31_BASE + BL31_SIZE)
+
+/* Shared memory used for SMC services */
+#define AML_SHARE_MEM_INPUT_BASE               UL(0x050FE000)
+#define AML_SHARE_MEM_OUTPUT_BASE              UL(0x050FF000)
+
+#define AML_SEC_DEVICE0_BASE                   UL(0xFFD00000)
+#define AML_SEC_DEVICE0_SIZE                   UL(0x00026000)
+
+#define AML_SEC_DEVICE1_BASE                   UL(0xFF800000)
+#define AML_SEC_DEVICE1_SIZE                   UL(0x0000A000)
+
+#define AML_TZRAM_BASE                         UL(0xFFFA0000)
+#define AML_TZRAM_SIZE                         UL(0x00048000)
+
+/* Mailboxes */
+#define AML_MHU_SECURE_SCP_TO_AP_PAYLOAD       UL(0xFFFE7800)
+#define AML_MHU_SECURE_AP_TO_SCP_PAYLOAD       UL(0xFFFE7A00)
+#define AML_PSCI_MAILBOX_BASE                  UL(0xFFFE7F00)
+
+#define AML_SEC_DEVICE2_BASE                   UL(0xFF620000)
+#define AML_SEC_DEVICE2_SIZE                   UL(0x00028000)
+
+/*******************************************************************************
+ * GIC-400 and interrupt handling related constants
+ ******************************************************************************/
+#define AML_GICD_BASE                          UL(0xFFC01000)
+#define AML_GICC_BASE                          UL(0xFFC02000)
+
+#define IRQ_SEC_PHY_TIMER                      29
+
+#define IRQ_SEC_SGI_0                          8
+#define IRQ_SEC_SGI_1                          9
+#define IRQ_SEC_SGI_2                          10
+#define IRQ_SEC_SGI_3                          11
+#define IRQ_SEC_SGI_4                          12
+#define IRQ_SEC_SGI_5                          13
+#define IRQ_SEC_SGI_6                          14
+#define IRQ_SEC_SGI_7                          15
+#define IRQ_SEC_SGI_8                          16
+
+/*******************************************************************************
+ * UART definitions
+ ******************************************************************************/
+#define AML_UART0_AO_BASE                      UL(0xFF803000)
+#define AML_UART0_AO_CLK_IN_HZ                 AML_OSC24M_CLK_IN_HZ
+#define AML_UART_BAUDRATE                      U(115200)
+
+/*******************************************************************************
+ * Memory-mapped I/O Registers
+ ******************************************************************************/
+#define AML_AO_TIMESTAMP_CNTL                  UL(0xFF8000B4)
+
+#define AML_SYS_CPU_CFG7                       UL(0xFF634664)
+
+#define AML_AO_RTI_STATUS_REG3                 UL(0xFF80001C)
+#define AML_AO_RTI_SCP_STAT                    UL(0xFF80023C)
+#define AML_AO_RTI_SCP_READY_OFF               U(0x14)
+#define AML_A0_RTI_SCP_READY_MASK              U(3)
+#define AML_AO_RTI_SCP_IS_READY(v)                                     \
+       ((((v) >> AML_AO_RTI_SCP_READY_OFF) &                           \
+       AML_A0_RTI_SCP_READY_MASK) == AML_A0_RTI_SCP_READY_MASK)
+
+#define AML_HIU_MAILBOX_SET_0                  UL(0xFF63C404)
+#define AML_HIU_MAILBOX_STAT_0                 UL(0xFF63C408)
+#define AML_HIU_MAILBOX_CLR_0                  UL(0xFF63C40C)
+#define AML_HIU_MAILBOX_SET_3                  UL(0xFF63C428)
+#define AML_HIU_MAILBOX_STAT_3                 UL(0xFF63C42C)
+#define AML_HIU_MAILBOX_CLR_3                  UL(0xFF63C430)
+
+#define AML_SHA_DMA_BASE                       UL(0xFF63E000)
+#define AML_SHA_DMA_DESC                       (AML_SHA_DMA_BASE + 0x08)
+#define AML_SHA_DMA_STATUS                     (AML_SHA_DMA_BASE + 0x28)
+
+/*******************************************************************************
+ * System Monitor Call IDs and arguments
+ ******************************************************************************/
+#define AML_SM_GET_SHARE_MEM_INPUT_BASE                U(0x82000020)
+#define AML_SM_GET_SHARE_MEM_OUTPUT_BASE       U(0x82000021)
+
+#define AML_SM_EFUSE_READ                      U(0x82000030)
+#define AML_SM_EFUSE_USER_MAX                  U(0x82000033)
+
+#define AML_SM_JTAG_ON                         U(0x82000040)
+#define AML_SM_JTAG_OFF                                U(0x82000041)
+#define AML_SM_GET_CHIP_ID                     U(0x82000044)
+
+#define AML_JTAG_STATE_ON                      U(0)
+#define AML_JTAG_STATE_OFF                     U(1)
+
+#define AML_JTAG_M3_AO                         U(0)
+#define AML_JTAG_M3_EE                         U(1)
+#define AML_JTAG_A53_AO                                U(2)
+#define AML_JTAG_A53_EE                                U(3)
+
+#endif /* G12A_DEF_H */
diff --git a/plat/amlogic/g12a/g12a_pm.c b/plat/amlogic/g12a/g12a_pm.c
new file mode 100644 (file)
index 0000000..c9fe3e9
--- /dev/null
@@ -0,0 +1,215 @@
+/*
+ * Copyright (c) 2019, ARM Limited and Contributors. All rights reserved.
+ *
+ * SPDX-License-Identifier: BSD-3-Clause
+ */
+
+#include <arch_helpers.h>
+#include <assert.h>
+#include <common/debug.h>
+#include <drivers/arm/gicv2.h>
+#include <drivers/console.h>
+#include <errno.h>
+#include <lib/mmio.h>
+#include <lib/psci/psci.h>
+#include <plat/common/platform.h>
+#include <platform_def.h>
+
+#include "aml_private.h"
+
+#define SCPI_POWER_ON          0
+#define SCPI_POWER_RETENTION   1
+#define SCPI_POWER_OFF         3
+
+#define SCPI_SYSTEM_SHUTDOWN   0
+#define SCPI_SYSTEM_REBOOT     1
+
+static uintptr_t g12a_sec_entrypoint;
+static volatile uint32_t g12a_cpu0_go;
+
+static void g12a_pm_set_reset_addr(u_register_t mpidr, uint64_t value)
+{
+       unsigned int core = plat_calc_core_pos(mpidr);
+       uintptr_t cpu_mailbox_addr = AML_PSCI_MAILBOX_BASE + (core << 4);
+
+       mmio_write_64(cpu_mailbox_addr, value);
+}
+
+static void g12a_pm_reset(u_register_t mpidr)
+{
+       unsigned int core = plat_calc_core_pos(mpidr);
+       uintptr_t cpu_mailbox_addr = AML_PSCI_MAILBOX_BASE + (core << 4) + 8;
+
+       mmio_write_32(cpu_mailbox_addr, 0);
+}
+
+static void __dead2 g12a_system_reset(void)
+{
+       INFO("BL31: PSCI_SYSTEM_RESET\n");
+
+       u_register_t mpidr = read_mpidr_el1();
+       uint32_t status = mmio_read_32(AML_AO_RTI_STATUS_REG3);
+       int ret;
+
+       NOTICE("BL31: Reboot reason: 0x%x\n", status);
+
+       status &= 0xFFFF0FF0;
+
+       console_flush();
+
+       mmio_write_32(AML_AO_RTI_STATUS_REG3, status);
+
+       ret = aml_scpi_sys_power_state(SCPI_SYSTEM_REBOOT);
+
+       if (ret != 0) {
+               ERROR("BL31: PSCI_SYSTEM_RESET: SCP error: %i\n", ret);
+               panic();
+       }
+
+       g12a_pm_reset(mpidr);
+
+       wfi();
+
+       ERROR("BL31: PSCI_SYSTEM_RESET: Operation not handled\n");
+       panic();
+}
+
+static void __dead2 g12a_system_off(void)
+{
+       INFO("BL31: PSCI_SYSTEM_OFF\n");
+
+       u_register_t mpidr = read_mpidr_el1();
+       int ret;
+
+       ret = aml_scpi_sys_power_state(SCPI_SYSTEM_SHUTDOWN);
+
+       if (ret != 0) {
+               ERROR("BL31: PSCI_SYSTEM_OFF: SCP error %i\n", ret);
+               panic();
+       }
+
+       g12a_pm_set_reset_addr(mpidr, 0);
+       g12a_pm_reset(mpidr);
+
+       wfi();
+
+       ERROR("BL31: PSCI_SYSTEM_OFF: Operation not handled\n");
+       panic();
+}
+
+static int32_t g12a_pwr_domain_on(u_register_t mpidr)
+{
+       unsigned int core = plat_calc_core_pos(mpidr);
+
+       /* CPU0 can't be turned OFF */
+       if (core == AML_PRIMARY_CPU) {
+               VERBOSE("BL31: Releasing CPU0 from wait loop...\n");
+
+               g12a_cpu0_go = 1;
+               flush_dcache_range((uintptr_t)&g12a_cpu0_go,
+                               sizeof(g12a_cpu0_go));
+               dsb();
+               isb();
+
+               sev();
+
+               return PSCI_E_SUCCESS;
+       }
+
+       g12a_pm_set_reset_addr(mpidr, g12a_sec_entrypoint);
+       aml_scpi_set_css_power_state(mpidr,
+                                    SCPI_POWER_ON, SCPI_POWER_ON, SCPI_POWER_ON);
+       dmbsy();
+       sev();
+
+       return PSCI_E_SUCCESS;
+}
+
+static void g12a_pwr_domain_on_finish(const psci_power_state_t *target_state)
+{
+       unsigned int core = plat_calc_core_pos(read_mpidr_el1());
+
+       assert(target_state->pwr_domain_state[MPIDR_AFFLVL0] ==
+                                       PLAT_LOCAL_STATE_OFF);
+
+       if (core == AML_PRIMARY_CPU) {
+               g12a_cpu0_go = 0;
+               flush_dcache_range((uintptr_t)&g12a_cpu0_go,
+                               sizeof(g12a_cpu0_go));
+               dsb();
+               isb();
+       }
+
+       gicv2_pcpu_distif_init();
+       gicv2_cpuif_enable();
+}
+
+static void g12a_pwr_domain_off(const psci_power_state_t *target_state)
+{
+       u_register_t mpidr = read_mpidr_el1();
+       unsigned int core = plat_calc_core_pos(mpidr);
+
+       gicv2_cpuif_disable();
+
+       /* CPU0 can't be turned OFF */
+       if (core == AML_PRIMARY_CPU)
+               return;
+
+       aml_scpi_set_css_power_state(mpidr,
+                                    SCPI_POWER_OFF, SCPI_POWER_ON,
+                                    SCPI_POWER_ON);
+}
+
+static void __dead2 g12a_pwr_domain_pwr_down_wfi(const psci_power_state_t
+                                                *target_state)
+{
+       u_register_t mpidr = read_mpidr_el1();
+       unsigned int core = plat_calc_core_pos(mpidr);
+
+       /* CPU0 can't be turned OFF, emulate it with a WFE loop */
+       if (core == AML_PRIMARY_CPU) {
+               VERBOSE("BL31: CPU0 entering wait loop...\n");
+
+               while (g12a_cpu0_go == 0)
+                       wfe();
+
+               VERBOSE("BL31: CPU0 resumed.\n");
+
+               /*
+                * Because setting CPU0's warm reset entrypoint through PSCI
+                * mailbox and/or mmio mapped RVBAR (0xda834650) does not seem
+                * to work, jump to it manually.
+                * In order to avoid an assert, MMU has to be disabled.
+                */
+               disable_mmu_el3();
+               ((void(*)(void))g12a_sec_entrypoint)();
+       }
+
+       dsbsy();
+       g12a_pm_set_reset_addr(mpidr, 0);
+       g12a_pm_reset(mpidr);
+
+       for (;;)
+               wfi();
+}
+
+/*******************************************************************************
+ * Platform handlers and setup function.
+ ******************************************************************************/
+static const plat_psci_ops_t g12a_ops = {
+       .pwr_domain_on                  = g12a_pwr_domain_on,
+       .pwr_domain_on_finish           = g12a_pwr_domain_on_finish,
+       .pwr_domain_off                 = g12a_pwr_domain_off,
+       .pwr_domain_pwr_down_wfi        = g12a_pwr_domain_pwr_down_wfi,
+       .system_off                     = g12a_system_off,
+       .system_reset                   = g12a_system_reset
+};
+
+int plat_setup_psci_ops(uintptr_t sec_entrypoint,
+                       const plat_psci_ops_t **psci_ops)
+{
+       g12a_sec_entrypoint = sec_entrypoint;
+       *psci_ops = &g12a_ops;
+       g12a_cpu0_go = 0;
+       return 0;
+}
diff --git a/plat/amlogic/g12a/include/platform_def.h b/plat/amlogic/g12a/include/platform_def.h
new file mode 100644 (file)
index 0000000..23d816d
--- /dev/null
@@ -0,0 +1,63 @@
+/*
+ * Copyright (c) 2019, ARM Limited and Contributors. All rights reserved.
+ *
+ * SPDX-License-Identifier: BSD-3-Clause
+ */
+
+#ifndef PLATFORM_DEF_H
+#define PLATFORM_DEF_H
+
+#include <arch.h>
+#include <lib/utils_def.h>
+
+#include "../g12a_def.h"
+
+#define PLATFORM_LINKER_FORMAT         "elf64-littleaarch64"
+#define PLATFORM_LINKER_ARCH           aarch64
+
+#define PLATFORM_STACK_SIZE            UL(0x1000)
+
+#define PLATFORM_MAX_CPUS_PER_CLUSTER  U(4)
+#define PLATFORM_CLUSTER_COUNT         U(1)
+#define PLATFORM_CLUSTER0_CORE_COUNT   PLATFORM_MAX_CPUS_PER_CLUSTER
+#define PLATFORM_CORE_COUNT            PLATFORM_CLUSTER0_CORE_COUNT
+
+#define AML_PRIMARY_CPU                        U(0)
+
+#define PLAT_MAX_PWR_LVL               MPIDR_AFFLVL1
+#define PLAT_NUM_PWR_DOMAINS           (PLATFORM_CLUSTER_COUNT + \
+                                        PLATFORM_CORE_COUNT)
+
+#define PLAT_MAX_RET_STATE             U(1)
+#define PLAT_MAX_OFF_STATE             U(2)
+
+/* Local power state for power domains in Run state. */
+#define PLAT_LOCAL_STATE_RUN           U(0)
+/* Local power state for retention. Valid only for CPU power domains */
+#define PLAT_LOCAL_STATE_RET           U(1)
+/* Local power state for power-down. Valid for CPU and cluster power domains. */
+#define PLAT_LOCAL_STATE_OFF           U(2)
+
+/*
+ * Macros used to parse state information from State-ID if it is using the
+ * recommended encoding for State-ID.
+ */
+#define PLAT_LOCAL_PSTATE_WIDTH                U(4)
+#define PLAT_LOCAL_PSTATE_MASK         ((U(1) << PLAT_LOCAL_PSTATE_WIDTH) - 1)
+
+/*
+ * Some data must be aligned on the biggest cache line size in the platform.
+ * This is known only to the platform as it might have a combination of
+ * integrated and external caches.
+ */
+#define CACHE_WRITEBACK_SHIFT          U(6)
+#define CACHE_WRITEBACK_GRANULE                (U(1) << CACHE_WRITEBACK_SHIFT)
+
+/* Memory-related defines */
+#define PLAT_PHY_ADDR_SPACE_SIZE       (ULL(1) << 32)
+#define PLAT_VIRT_ADDR_SPACE_SIZE      (ULL(1) << 32)
+
+#define MAX_MMAP_REGIONS               16
+#define MAX_XLAT_TABLES                        8
+
+#endif /* PLATFORM_DEF_H */
diff --git a/plat/amlogic/g12a/platform.mk b/plat/amlogic/g12a/platform.mk
new file mode 100644 (file)
index 0000000..b0c91b0
--- /dev/null
@@ -0,0 +1,91 @@
+#
+# Copyright (c) 2019, ARM Limited and Contributors. All rights reserved.
+#
+# SPDX-License-Identifier: BSD-3-Clause
+#
+
+include lib/xlat_tables_v2/xlat_tables.mk
+
+AML_PLAT               :=      plat/amlogic
+AML_PLAT_SOC           :=      ${AML_PLAT}/${PLAT}
+AML_PLAT_COMMON                :=      ${AML_PLAT}/common
+
+DOIMAGEPATH            ?=      tools/amlogic
+DOIMAGETOOL            ?=      ${DOIMAGEPATH}/doimage
+
+PLAT_INCLUDES          :=      -Iinclude/drivers/amlogic/                      \
+                               -I${AML_PLAT_SOC}/include                       \
+                               -I${AML_PLAT_COMMON}/include
+
+GIC_SOURCES            :=      drivers/arm/gic/common/gic_common.c             \
+                               drivers/arm/gic/v2/gicv2_main.c                 \
+                               drivers/arm/gic/v2/gicv2_helpers.c              \
+                               plat/common/plat_gicv2.c
+
+BL31_SOURCES           +=      lib/cpus/aarch64/cortex_a53.S                   \
+                               plat/common/plat_psci_common.c                  \
+                               drivers/amlogic/console/aarch64/meson_console.S \
+                               ${AML_PLAT_SOC}/${PLAT}_bl31_setup.c            \
+                               ${AML_PLAT_SOC}/${PLAT}_pm.c                    \
+                               ${AML_PLAT_SOC}/${PLAT}_common.c                \
+                               ${AML_PLAT_COMMON}/aarch64/aml_helpers.S        \
+                               ${AML_PLAT_COMMON}/aml_efuse.c                  \
+                               ${AML_PLAT_COMMON}/aml_mhu.c                    \
+                               ${AML_PLAT_COMMON}/aml_scpi.c                   \
+                               ${AML_PLAT_COMMON}/aml_sip_svc.c                \
+                               ${AML_PLAT_COMMON}/aml_thermal.c                \
+                               ${AML_PLAT_COMMON}/aml_topology.c               \
+                               ${AML_PLAT_COMMON}/aml_console.c                \
+                               drivers/amlogic/crypto/sha_dma.c                \
+                               ${XLAT_TABLES_LIB_SRCS}                         \
+                               ${GIC_SOURCES}
+
+# Tune compiler for Cortex-A53
+ifeq ($(notdir $(CC)),armclang)
+    TF_CFLAGS_aarch64  +=      -mcpu=cortex-a53
+else ifneq ($(findstring clang,$(notdir $(CC))),)
+    TF_CFLAGS_aarch64  +=      -mcpu=cortex-a53
+else
+    TF_CFLAGS_aarch64  +=      -mtune=cortex-a53
+endif
+
+# Build config flags
+# ------------------
+
+# Enable all errata workarounds for Cortex-A53
+ERRATA_A53_855873              := 1
+ERRATA_A53_819472              := 1
+ERRATA_A53_824069              := 1
+ERRATA_A53_827319              := 1
+
+WORKAROUND_CVE_2017_5715       := 0
+
+# Have different sections for code and rodata
+SEPARATE_CODE_AND_RODATA       := 1
+
+# Use Coherent memory
+USE_COHERENT_MEM               := 1
+
+# Verify build config
+# -------------------
+
+ifneq (${RESET_TO_BL31}, 0)
+  $(error Error: ${PLAT} needs RESET_TO_BL31=0)
+endif
+
+ifeq (${ARCH},aarch32)
+  $(error Error: AArch32 not supported on ${PLAT})
+endif
+
+all: ${BUILD_PLAT}/bl31.img
+distclean realclean clean: cleanimage
+
+cleanimage:
+       ${Q}${MAKE} -C ${DOIMAGEPATH} clean
+
+${DOIMAGETOOL}:
+       ${Q}${MAKE} -C ${DOIMAGEPATH}
+
+${BUILD_PLAT}/bl31.img: ${BUILD_PLAT}/bl31.bin ${DOIMAGETOOL}
+       ${DOIMAGETOOL} ${BUILD_PLAT}/bl31.bin ${BUILD_PLAT}/bl31.img
+