blob: 81de674bc66fb801b047b2f7ebbb4bcf61d826f8 [file] [log] [blame]
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +05301/*
Krishna Reddyae18d222017-12-07 13:52:39 -08002 * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
Varun Wadekar07f970d2018-06-28 11:03:41 -07003 * Copyright (c) 2020, NVIDIA Corporation. All rights reserved.
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +05304 *
dp-armfa3cf0b2017-05-03 09:38:09 +01005 * SPDX-License-Identifier: BSD-3-Clause
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +05306 */
7
Puneet Saxenacf8c0e22017-08-04 17:19:55 +05308#include <assert.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +00009#include <common/bl_common.h>
10
Steven Kaoa457f2e2017-11-14 18:52:05 +080011#include <mce.h>
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053012#include <memctrl_v2.h>
Varun Wadekar07f970d2018-06-28 11:03:41 -070013#include <tegra186_private.h>
Varun Wadekar17ad11a2018-11-09 09:08:16 -080014#include <tegra_mc_def.h>
Puneet Saxenacf8c0e22017-08-04 17:19:55 +053015#include <tegra_platform.h>
Varun Wadekar07f970d2018-06-28 11:03:41 -070016#include <tegra_private.h>
17
18extern uint64_t tegra_bl31_phys_base;
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053019
20/*******************************************************************************
21 * Array to hold stream_id override config register offsets
22 ******************************************************************************/
23const static uint32_t tegra186_streamid_override_regs[] = {
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053024 MC_STREAMID_OVERRIDE_CFG_SDMMCRA,
25 MC_STREAMID_OVERRIDE_CFG_SDMMCRAA,
26 MC_STREAMID_OVERRIDE_CFG_SDMMCR,
27 MC_STREAMID_OVERRIDE_CFG_SDMMCRAB,
28 MC_STREAMID_OVERRIDE_CFG_SDMMCWA,
29 MC_STREAMID_OVERRIDE_CFG_SDMMCWAA,
30 MC_STREAMID_OVERRIDE_CFG_SDMMCW,
31 MC_STREAMID_OVERRIDE_CFG_SDMMCWAB,
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053032};
33
34/*******************************************************************************
35 * Array to hold the security configs for stream IDs
36 ******************************************************************************/
37const static mc_streamid_security_cfg_t tegra186_streamid_sec_cfgs[] = {
Krishna Reddyae18d222017-12-07 13:52:39 -080038 mc_make_sec_cfg(SCEW, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053039 mc_make_sec_cfg(AFIR, NON_SECURE, OVERRIDE, DISABLE),
40 mc_make_sec_cfg(AFIW, NON_SECURE, OVERRIDE, DISABLE),
41 mc_make_sec_cfg(NVDISPLAYR1, NON_SECURE, OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053042 mc_make_sec_cfg(XUSB_DEVR, NON_SECURE, OVERRIDE, ENABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053043 mc_make_sec_cfg(VICSRD1, NON_SECURE, NO_OVERRIDE, DISABLE),
44 mc_make_sec_cfg(NVENCSWR, NON_SECURE, NO_OVERRIDE, DISABLE),
45 mc_make_sec_cfg(TSECSRDB, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053046 mc_make_sec_cfg(AXISW, SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053047 mc_make_sec_cfg(SDMMCWAB, NON_SECURE, OVERRIDE, DISABLE),
48 mc_make_sec_cfg(AONDMAW, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053049 mc_make_sec_cfg(GPUSWR2, SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053050 mc_make_sec_cfg(SATAW, NON_SECURE, OVERRIDE, DISABLE),
51 mc_make_sec_cfg(UFSHCW, NON_SECURE, OVERRIDE, DISABLE),
52 mc_make_sec_cfg(SDMMCR, NON_SECURE, OVERRIDE, DISABLE),
Krishna Reddyae18d222017-12-07 13:52:39 -080053 mc_make_sec_cfg(SCEDMAW, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053054 mc_make_sec_cfg(UFSHCR, NON_SECURE, OVERRIDE, DISABLE),
55 mc_make_sec_cfg(SDMMCWAA, NON_SECURE, OVERRIDE, DISABLE),
56 mc_make_sec_cfg(SESWR, NON_SECURE, NO_OVERRIDE, DISABLE),
57 mc_make_sec_cfg(MPCORER, NON_SECURE, OVERRIDE, DISABLE),
58 mc_make_sec_cfg(PTCR, NON_SECURE, OVERRIDE, DISABLE),
Krishna Reddyae18d222017-12-07 13:52:39 -080059 mc_make_sec_cfg(BPMPW, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053060 mc_make_sec_cfg(ETRW, NON_SECURE, OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053061 mc_make_sec_cfg(GPUSRD, SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053062 mc_make_sec_cfg(VICSWR, NON_SECURE, NO_OVERRIDE, DISABLE),
Krishna Reddyae18d222017-12-07 13:52:39 -080063 mc_make_sec_cfg(SCEDMAR, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053064 mc_make_sec_cfg(HDAW, NON_SECURE, OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053065 mc_make_sec_cfg(ISPWA, NON_SECURE, OVERRIDE, ENABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053066 mc_make_sec_cfg(EQOSW, NON_SECURE, OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053067 mc_make_sec_cfg(XUSB_HOSTW, NON_SECURE, OVERRIDE, ENABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053068 mc_make_sec_cfg(TSECSWR, NON_SECURE, NO_OVERRIDE, DISABLE),
69 mc_make_sec_cfg(SDMMCRAA, NON_SECURE, OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053070 mc_make_sec_cfg(VIW, NON_SECURE, OVERRIDE, ENABLE),
71 mc_make_sec_cfg(AXISR, SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053072 mc_make_sec_cfg(SDMMCW, NON_SECURE, OVERRIDE, DISABLE),
Krishna Reddyae18d222017-12-07 13:52:39 -080073 mc_make_sec_cfg(BPMPDMAW, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053074 mc_make_sec_cfg(ISPRA, NON_SECURE, OVERRIDE, ENABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053075 mc_make_sec_cfg(NVDECSWR, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053076 mc_make_sec_cfg(XUSB_DEVW, NON_SECURE, OVERRIDE, ENABLE),
Krishna Reddyae18d222017-12-07 13:52:39 -080077 mc_make_sec_cfg(NVDECSRD, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053078 mc_make_sec_cfg(MPCOREW, NON_SECURE, OVERRIDE, DISABLE),
79 mc_make_sec_cfg(NVDISPLAYR, NON_SECURE, OVERRIDE, DISABLE),
Krishna Reddyae18d222017-12-07 13:52:39 -080080 mc_make_sec_cfg(BPMPDMAR, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053081 mc_make_sec_cfg(NVJPGSWR, NON_SECURE, NO_OVERRIDE, DISABLE),
Krishna Reddyae18d222017-12-07 13:52:39 -080082 mc_make_sec_cfg(NVDECSRD1, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053083 mc_make_sec_cfg(TSECSRD, NON_SECURE, NO_OVERRIDE, DISABLE),
84 mc_make_sec_cfg(NVJPGSRD, NON_SECURE, NO_OVERRIDE, DISABLE),
85 mc_make_sec_cfg(SDMMCWA, NON_SECURE, OVERRIDE, DISABLE),
Krishna Reddyae18d222017-12-07 13:52:39 -080086 mc_make_sec_cfg(SCER, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053087 mc_make_sec_cfg(XUSB_HOSTR, NON_SECURE, OVERRIDE, ENABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053088 mc_make_sec_cfg(VICSRD, NON_SECURE, NO_OVERRIDE, DISABLE),
89 mc_make_sec_cfg(AONDMAR, NON_SECURE, NO_OVERRIDE, DISABLE),
90 mc_make_sec_cfg(AONW, NON_SECURE, NO_OVERRIDE, DISABLE),
91 mc_make_sec_cfg(SDMMCRA, NON_SECURE, OVERRIDE, DISABLE),
92 mc_make_sec_cfg(HOST1XDMAR, NON_SECURE, NO_OVERRIDE, DISABLE),
93 mc_make_sec_cfg(EQOSR, NON_SECURE, OVERRIDE, DISABLE),
94 mc_make_sec_cfg(SATAR, NON_SECURE, OVERRIDE, DISABLE),
Krishna Reddyae18d222017-12-07 13:52:39 -080095 mc_make_sec_cfg(BPMPR, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +053096 mc_make_sec_cfg(HDAR, NON_SECURE, OVERRIDE, DISABLE),
97 mc_make_sec_cfg(SDMMCRAB, NON_SECURE, OVERRIDE, DISABLE),
98 mc_make_sec_cfg(ETRR, NON_SECURE, OVERRIDE, DISABLE),
99 mc_make_sec_cfg(AONR, NON_SECURE, NO_OVERRIDE, DISABLE),
100 mc_make_sec_cfg(SESRD, NON_SECURE, NO_OVERRIDE, DISABLE),
101 mc_make_sec_cfg(NVENCSRD, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +0530102 mc_make_sec_cfg(GPUSWR, SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha17fb18e2018-05-31 12:06:15 +0530103 mc_make_sec_cfg(TSECSWRB, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +0530104 mc_make_sec_cfg(ISPWB, NON_SECURE, OVERRIDE, ENABLE),
105 mc_make_sec_cfg(GPUSRD2, SECURE, NO_OVERRIDE, DISABLE),
Krishna Reddyae18d222017-12-07 13:52:39 -0800106 mc_make_sec_cfg(APEDMAW, NON_SECURE, NO_OVERRIDE, DISABLE),
107 mc_make_sec_cfg(APER, NON_SECURE, NO_OVERRIDE, DISABLE),
108 mc_make_sec_cfg(APEW, NON_SECURE, NO_OVERRIDE, DISABLE),
109 mc_make_sec_cfg(APEDMAR, NON_SECURE, NO_OVERRIDE, DISABLE),
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +0530110};
111
112/*******************************************************************************
113 * Array to hold the transaction override configs
114 ******************************************************************************/
115const static mc_txn_override_cfg_t tegra186_txn_override_cfgs[] = {
116 mc_make_txn_override_cfg(BPMPW, CGID_TAG_ADR),
117 mc_make_txn_override_cfg(EQOSW, CGID_TAG_ADR),
118 mc_make_txn_override_cfg(NVJPGSWR, CGID_TAG_ADR),
119 mc_make_txn_override_cfg(SDMMCWAA, CGID_TAG_ADR),
120 mc_make_txn_override_cfg(MPCOREW, CGID_TAG_ADR),
121 mc_make_txn_override_cfg(SCEDMAW, CGID_TAG_ADR),
122 mc_make_txn_override_cfg(SDMMCW, CGID_TAG_ADR),
123 mc_make_txn_override_cfg(AXISW, CGID_TAG_ADR),
124 mc_make_txn_override_cfg(TSECSWR, CGID_TAG_ADR),
125 mc_make_txn_override_cfg(GPUSWR, CGID_TAG_ADR),
126 mc_make_txn_override_cfg(XUSB_HOSTW, CGID_TAG_ADR),
127 mc_make_txn_override_cfg(TSECSWRB, CGID_TAG_ADR),
128 mc_make_txn_override_cfg(GPUSWR2, CGID_TAG_ADR),
129 mc_make_txn_override_cfg(AONDMAW, CGID_TAG_ADR),
130 mc_make_txn_override_cfg(AONW, CGID_TAG_ADR),
131 mc_make_txn_override_cfg(SESWR, CGID_TAG_ADR),
132 mc_make_txn_override_cfg(BPMPDMAW, CGID_TAG_ADR),
133 mc_make_txn_override_cfg(SDMMCWA, CGID_TAG_ADR),
134 mc_make_txn_override_cfg(HDAW, CGID_TAG_ADR),
135 mc_make_txn_override_cfg(NVDECSWR, CGID_TAG_ADR),
136 mc_make_txn_override_cfg(UFSHCW, CGID_TAG_ADR),
137 mc_make_txn_override_cfg(SATAW, CGID_TAG_ADR),
138 mc_make_txn_override_cfg(ETRW, CGID_TAG_ADR),
139 mc_make_txn_override_cfg(VICSWR, CGID_TAG_ADR),
140 mc_make_txn_override_cfg(NVENCSWR, CGID_TAG_ADR),
141 mc_make_txn_override_cfg(SDMMCWAB, CGID_TAG_ADR),
142 mc_make_txn_override_cfg(ISPWB, CGID_TAG_ADR),
143 mc_make_txn_override_cfg(APEW, CGID_TAG_ADR),
144 mc_make_txn_override_cfg(XUSB_DEVW, CGID_TAG_ADR),
145 mc_make_txn_override_cfg(AFIW, CGID_TAG_ADR),
146 mc_make_txn_override_cfg(SCEW, CGID_TAG_ADR),
147};
148
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530149static void tegra186_memctrl_reconfig_mss_clients(void)
150{
151#if ENABLE_ROC_FOR_ORDERING_CLIENT_REQUESTS
152 uint32_t val, wdata_0, wdata_1;
153
154 /*
155 * Assert Memory Controller's HOTRESET_FLUSH_ENABLE signal for
156 * boot and strongly ordered MSS clients to flush existing memory
157 * traffic and stall future requests.
158 */
159 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_CTRL0);
160 assert(val == MC_CLIENT_HOTRESET_CTRL0_RESET_VAL);
161
162 wdata_0 = MC_CLIENT_HOTRESET_CTRL0_HDA_FLUSH_ENB |
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530163 MC_CLIENT_HOTRESET_CTRL0_AFI_FLUSH_ENB |
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530164 MC_CLIENT_HOTRESET_CTRL0_SATA_FLUSH_ENB |
165 MC_CLIENT_HOTRESET_CTRL0_XUSB_HOST_FLUSH_ENB |
166 MC_CLIENT_HOTRESET_CTRL0_XUSB_DEV_FLUSH_ENB;
167 tegra_mc_write_32(MC_CLIENT_HOTRESET_CTRL0, wdata_0);
168
169 /* Wait for HOTRESET STATUS to indicate FLUSH_DONE */
170 do {
171 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_STATUS0);
172 } while ((val & wdata_0) != wdata_0);
173
174 /* Wait one more time due to SW WAR for known legacy issue */
175 do {
176 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_STATUS0);
177 } while ((val & wdata_0) != wdata_0);
178
179 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_CTRL1);
180 assert(val == MC_CLIENT_HOTRESET_CTRL1_RESET_VAL);
181
182 wdata_1 = MC_CLIENT_HOTRESET_CTRL1_SDMMC4A_FLUSH_ENB |
183 MC_CLIENT_HOTRESET_CTRL1_APE_FLUSH_ENB |
184 MC_CLIENT_HOTRESET_CTRL1_SE_FLUSH_ENB |
185 MC_CLIENT_HOTRESET_CTRL1_ETR_FLUSH_ENB |
186 MC_CLIENT_HOTRESET_CTRL1_AXIS_FLUSH_ENB |
187 MC_CLIENT_HOTRESET_CTRL1_EQOS_FLUSH_ENB |
188 MC_CLIENT_HOTRESET_CTRL1_UFSHC_FLUSH_ENB |
189 MC_CLIENT_HOTRESET_CTRL1_BPMP_FLUSH_ENB |
190 MC_CLIENT_HOTRESET_CTRL1_AON_FLUSH_ENB |
191 MC_CLIENT_HOTRESET_CTRL1_SCE_FLUSH_ENB;
192 tegra_mc_write_32(MC_CLIENT_HOTRESET_CTRL1, wdata_1);
193
194 /* Wait for HOTRESET STATUS to indicate FLUSH_DONE */
195 do {
196 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_STATUS1);
197 } while ((val & wdata_1) != wdata_1);
198
199 /* Wait one more time due to SW WAR for known legacy issue */
200 do {
201 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_STATUS1);
202 } while ((val & wdata_1) != wdata_1);
203
204 /*
205 * Change MEMTYPE_OVERRIDE from SO_DEV -> PASSTHRU for boot and
206 * strongly ordered MSS clients. ROC needs to be single point
207 * of control on overriding the memory type. So, remove TSA's
208 * memtype override.
209 *
210 * MC clients with default SO_DEV override still enabled at TSA:
211 * AONW, BPMPW, SCEW, APEW
212 */
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530213 mc_set_tsa_passthrough(AFIW);
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530214 mc_set_tsa_passthrough(HDAW);
215 mc_set_tsa_passthrough(SATAW);
216 mc_set_tsa_passthrough(XUSB_HOSTW);
217 mc_set_tsa_passthrough(XUSB_DEVW);
218 mc_set_tsa_passthrough(SDMMCWAB);
219 mc_set_tsa_passthrough(APEDMAW);
220 mc_set_tsa_passthrough(SESWR);
221 mc_set_tsa_passthrough(ETRW);
222 mc_set_tsa_passthrough(AXISW);
223 mc_set_tsa_passthrough(EQOSW);
224 mc_set_tsa_passthrough(UFSHCW);
225 mc_set_tsa_passthrough(BPMPDMAW);
226 mc_set_tsa_passthrough(AONDMAW);
227 mc_set_tsa_passthrough(SCEDMAW);
228
229 /* Parker has no IO Coherency support and need the following:
230 * Ordered MC Clients on Parker are AFI, EQOS, SATA, XUSB.
231 * ISO clients(DISP, VI, EQOS) should never snoop caches and
232 * don't need ROC/PCFIFO ordering.
233 * ISO clients(EQOS) that need ordering should use PCFIFO ordering
234 * and bypass ROC ordering by using FORCE_NON_COHERENT path.
235 * FORCE_NON_COHERENT/FORCE_COHERENT config take precedence
236 * over SMMU attributes.
237 * Force all Normal memory transactions from ISO and non-ISO to be
238 * non-coherent(bypass ROC, avoid cache snoop to avoid perf hit).
239 * Force the SO_DEV transactions from ordered ISO clients(EQOS) to
240 * non-coherent path and enable MC PCFIFO interlock for ordering.
241 * Force the SO_DEV transactions from ordered non-ISO clients (PCIe,
242 * XUSB, SATA) to coherent so that the transactions are
243 * ordered by ROC.
244 * PCFIFO ensure write ordering.
245 * Read after Write ordering is maintained/enforced by MC clients.
246 * Clients that need PCIe type write ordering must
247 * go through ROC ordering.
248 * Ordering enable for Read clients is not necessary.
249 * R5's and A9 would get necessary ordering from AXI and
250 * don't need ROC ordering enable:
251 * - MMIO ordering is through dev mapping and MMIO
252 * accesses bypass SMMU.
253 * - Normal memory is accessed through SMMU and ordering is
254 * ensured by client and AXI.
255 * - Ack point for Normal memory is WCAM in MC.
256 * - MMIO's can be early acked and AXI ensures dev memory ordering,
257 * Client ensures read/write direction change ordering.
258 * - See Bug 200312466 for more details.
259 *
260 * CGID_TAG_ADR is only present from T186 A02. As this code is common
261 * between A01 and A02, tegra_memctrl_set_overrides() programs
262 * CGID_TAG_ADR for the necessary clients on A02.
263 */
264 mc_set_txn_override(HDAR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
265 mc_set_txn_override(BPMPW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
266 mc_set_txn_override(PTCR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
267 mc_set_txn_override(NVDISPLAYR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
268 mc_set_txn_override(EQOSW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
269 mc_set_txn_override(NVJPGSWR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
270 mc_set_txn_override(ISPRA, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
271 mc_set_txn_override(SDMMCWAA, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
272 mc_set_txn_override(VICSRD, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
273 mc_set_txn_override(MPCOREW, CGID_TAG_DEFAULT, SO_DEV_ZERO, NO_OVERRIDE, NO_OVERRIDE);
274 mc_set_txn_override(GPUSRD, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
275 mc_set_txn_override(AXISR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
276 mc_set_txn_override(SCEDMAW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
277 mc_set_txn_override(SDMMCW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
278 mc_set_txn_override(EQOSR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
279 /* See bug 200131110 comment #35*/
280 mc_set_txn_override(APEDMAR, CGID_TAG_CLIENT_AXI_ID, SO_DEV_CLIENT_AXI_ID, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
281 mc_set_txn_override(NVENCSRD, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
282 mc_set_txn_override(SDMMCRAB, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
283 mc_set_txn_override(VICSRD1, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
284 mc_set_txn_override(BPMPDMAR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
285 mc_set_txn_override(VIW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
286 mc_set_txn_override(SDMMCRAA, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
287 mc_set_txn_override(AXISW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
288 mc_set_txn_override(XUSB_DEVR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
289 mc_set_txn_override(UFSHCR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
290 mc_set_txn_override(TSECSWR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
291 mc_set_txn_override(GPUSWR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
292 mc_set_txn_override(SATAR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
293 mc_set_txn_override(XUSB_HOSTW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_COHERENT);
294 mc_set_txn_override(TSECSWRB, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
295 mc_set_txn_override(GPUSRD2, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
296 mc_set_txn_override(SCEDMAR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
297 mc_set_txn_override(GPUSWR2, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
298 mc_set_txn_override(AONDMAW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
299 /* See bug 200131110 comment #35*/
300 mc_set_txn_override(APEDMAW, CGID_TAG_CLIENT_AXI_ID, SO_DEV_CLIENT_AXI_ID, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
301 mc_set_txn_override(AONW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
302 mc_set_txn_override(HOST1XDMAR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
303 mc_set_txn_override(ETRR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
304 mc_set_txn_override(SESWR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
305 mc_set_txn_override(NVJPGSRD, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
306 mc_set_txn_override(NVDECSRD, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
307 mc_set_txn_override(TSECSRDB, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
308 mc_set_txn_override(BPMPDMAW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
309 mc_set_txn_override(APER, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
310 mc_set_txn_override(NVDECSRD1, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
311 mc_set_txn_override(XUSB_HOSTR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
312 mc_set_txn_override(ISPWA, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
313 mc_set_txn_override(SESRD, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
314 mc_set_txn_override(SCER, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
315 mc_set_txn_override(AONR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
316 mc_set_txn_override(MPCORER, CGID_TAG_DEFAULT, SO_DEV_ZERO, NO_OVERRIDE, NO_OVERRIDE);
317 mc_set_txn_override(SDMMCWA, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
318 mc_set_txn_override(HDAW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
319 mc_set_txn_override(NVDECSWR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
320 mc_set_txn_override(UFSHCW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
321 mc_set_txn_override(AONDMAR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
322 mc_set_txn_override(SATAW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_COHERENT);
323 mc_set_txn_override(ETRW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
324 mc_set_txn_override(VICSWR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
325 mc_set_txn_override(NVENCSWR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
326 /* See bug 200131110 comment #35 */
327 mc_set_txn_override(AFIR, CGID_TAG_DEFAULT, SO_DEV_CLIENT_AXI_ID, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
328 mc_set_txn_override(SDMMCWAB, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
329 mc_set_txn_override(SDMMCRA, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
330 mc_set_txn_override(NVDISPLAYR1, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
331 mc_set_txn_override(ISPWB, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
332 mc_set_txn_override(BPMPR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
333 mc_set_txn_override(APEW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
334 mc_set_txn_override(SDMMCR, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
335 mc_set_txn_override(XUSB_DEVW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_COHERENT);
336 mc_set_txn_override(TSECSRD, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
337 /*
338 * See bug 200131110 comment #35 - there are no normal requests
339 * and AWID for SO/DEV requests is hardcoded in RTL for a
340 * particular PCIE controller
341 */
342 mc_set_txn_override(AFIW, CGID_TAG_DEFAULT, SO_DEV_CLIENT_AXI_ID, FORCE_NON_COHERENT, FORCE_COHERENT);
343 mc_set_txn_override(SCEW, CGID_TAG_DEFAULT, SO_DEV_ZERO, FORCE_NON_COHERENT, FORCE_NON_COHERENT);
344
345 /*
346 * At this point, ordering can occur at ROC. So, remove PCFIFO's
347 * control over ordering requests.
348 *
349 * Change PCFIFO_*_ORDERED_CLIENT from ORDERED -> UNORDERED for
350 * boot and strongly ordered MSS clients
351 */
352 val = MC_PCFIFO_CLIENT_CONFIG1_RESET_VAL &
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530353 mc_set_pcfifo_unordered_boot_so_mss(1, AFIW) &
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530354 mc_set_pcfifo_unordered_boot_so_mss(1, HDAW) &
355 mc_set_pcfifo_unordered_boot_so_mss(1, SATAW);
356 tegra_mc_write_32(MC_PCFIFO_CLIENT_CONFIG1, val);
357
358 val = MC_PCFIFO_CLIENT_CONFIG2_RESET_VAL &
359 mc_set_pcfifo_unordered_boot_so_mss(2, XUSB_HOSTW) &
360 mc_set_pcfifo_unordered_boot_so_mss(2, XUSB_DEVW);
361 tegra_mc_write_32(MC_PCFIFO_CLIENT_CONFIG2, val);
362
363 val = MC_PCFIFO_CLIENT_CONFIG3_RESET_VAL &
364 mc_set_pcfifo_unordered_boot_so_mss(3, SDMMCWAB);
365 tegra_mc_write_32(MC_PCFIFO_CLIENT_CONFIG3, val);
366
367 val = MC_PCFIFO_CLIENT_CONFIG4_RESET_VAL &
368 mc_set_pcfifo_unordered_boot_so_mss(4, SESWR) &
369 mc_set_pcfifo_unordered_boot_so_mss(4, ETRW) &
370 mc_set_pcfifo_unordered_boot_so_mss(4, AXISW) &
371 mc_set_pcfifo_unordered_boot_so_mss(4, UFSHCW) &
372 mc_set_pcfifo_unordered_boot_so_mss(4, BPMPDMAW) &
373 mc_set_pcfifo_unordered_boot_so_mss(4, AONDMAW) &
374 mc_set_pcfifo_unordered_boot_so_mss(4, SCEDMAW);
375 /* EQOSW is the only client that has PCFIFO order enabled. */
376 val |= mc_set_pcfifo_ordered_boot_so_mss(4, EQOSW);
377 tegra_mc_write_32(MC_PCFIFO_CLIENT_CONFIG4, val);
378
379 val = MC_PCFIFO_CLIENT_CONFIG5_RESET_VAL &
380 mc_set_pcfifo_unordered_boot_so_mss(5, APEDMAW);
381 tegra_mc_write_32(MC_PCFIFO_CLIENT_CONFIG5, val);
382
383 /*
384 * Deassert HOTRESET FLUSH_ENABLE for boot and strongly ordered MSS
385 * clients to allow memory traffic from all clients to start passing
386 * through ROC
387 */
388 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_CTRL0);
389 assert(val == wdata_0);
390
391 wdata_0 = MC_CLIENT_HOTRESET_CTRL0_RESET_VAL;
392 tegra_mc_write_32(MC_CLIENT_HOTRESET_CTRL0, wdata_0);
393
394 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_CTRL1);
395 assert(val == wdata_1);
396
397 wdata_1 = MC_CLIENT_HOTRESET_CTRL1_RESET_VAL;
398 tegra_mc_write_32(MC_CLIENT_HOTRESET_CTRL1, wdata_1);
399
400#endif
401}
402
403static void tegra186_memctrl_set_overrides(void)
404{
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530405 uint32_t i, val;
406
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530407 /*
408 * Set the MC_TXN_OVERRIDE registers for write clients.
409 */
410 if ((tegra_chipid_is_t186()) &&
411 (!tegra_platform_is_silicon() ||
412 (tegra_platform_is_silicon() && (tegra_get_chipid_minor() == 1U)))) {
413
414 /*
415 * GPU and NVENC settings for Tegra186 simulation and
416 * Silicon rev. A01
417 */
418 val = tegra_mc_read_32(MC_TXN_OVERRIDE_CONFIG_GPUSWR);
419 val &= (uint32_t)~MC_TXN_OVERRIDE_CGID_TAG_MASK;
420 tegra_mc_write_32(MC_TXN_OVERRIDE_CONFIG_GPUSWR,
421 val | MC_TXN_OVERRIDE_CGID_TAG_ZERO);
422
423 val = tegra_mc_read_32(MC_TXN_OVERRIDE_CONFIG_GPUSWR2);
424 val &= (uint32_t)~MC_TXN_OVERRIDE_CGID_TAG_MASK;
425 tegra_mc_write_32(MC_TXN_OVERRIDE_CONFIG_GPUSWR2,
426 val | MC_TXN_OVERRIDE_CGID_TAG_ZERO);
427
428 val = tegra_mc_read_32(MC_TXN_OVERRIDE_CONFIG_NVENCSWR);
429 val &= (uint32_t)~MC_TXN_OVERRIDE_CGID_TAG_MASK;
430 tegra_mc_write_32(MC_TXN_OVERRIDE_CONFIG_NVENCSWR,
431 val | MC_TXN_OVERRIDE_CGID_TAG_CLIENT_AXI_ID);
432
433 } else {
434
435 /*
436 * Settings for Tegra186 silicon rev. A02 and onwards.
437 */
Varun Wadekard4a698f2019-08-26 10:20:53 -0700438 for (i = 0; i < ARRAY_SIZE(tegra186_txn_override_cfgs); i++) {
439 val = tegra_mc_read_32(tegra186_txn_override_cfgs[i].offset);
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530440 val &= (uint32_t)~MC_TXN_OVERRIDE_CGID_TAG_MASK;
Varun Wadekard4a698f2019-08-26 10:20:53 -0700441 tegra_mc_write_32(tegra186_txn_override_cfgs[i].offset,
442 val | tegra186_txn_override_cfgs[i].cgid_tag);
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530443 }
444 }
445}
446
Pritesh Raithatha75c94432018-08-03 15:48:15 +0530447
448/*******************************************************************************
449 * Array to hold MC context for Tegra186
450 ******************************************************************************/
451static __attribute__((aligned(16))) mc_regs_t tegra186_mc_context[] = {
452 _START_OF_TABLE_,
453 mc_make_sid_security_cfg(SCEW),
454 mc_make_sid_security_cfg(AFIR),
455 mc_make_sid_security_cfg(NVDISPLAYR1),
456 mc_make_sid_security_cfg(XUSB_DEVR),
457 mc_make_sid_security_cfg(VICSRD1),
458 mc_make_sid_security_cfg(NVENCSWR),
459 mc_make_sid_security_cfg(TSECSRDB),
460 mc_make_sid_security_cfg(AXISW),
461 mc_make_sid_security_cfg(SDMMCWAB),
462 mc_make_sid_security_cfg(AONDMAW),
463 mc_make_sid_security_cfg(GPUSWR2),
464 mc_make_sid_security_cfg(SATAW),
465 mc_make_sid_security_cfg(UFSHCW),
466 mc_make_sid_security_cfg(AFIW),
467 mc_make_sid_security_cfg(SDMMCR),
468 mc_make_sid_security_cfg(SCEDMAW),
469 mc_make_sid_security_cfg(UFSHCR),
470 mc_make_sid_security_cfg(SDMMCWAA),
471 mc_make_sid_security_cfg(APEDMAW),
472 mc_make_sid_security_cfg(SESWR),
473 mc_make_sid_security_cfg(MPCORER),
474 mc_make_sid_security_cfg(PTCR),
475 mc_make_sid_security_cfg(BPMPW),
476 mc_make_sid_security_cfg(ETRW),
477 mc_make_sid_security_cfg(GPUSRD),
478 mc_make_sid_security_cfg(VICSWR),
479 mc_make_sid_security_cfg(SCEDMAR),
480 mc_make_sid_security_cfg(HDAW),
481 mc_make_sid_security_cfg(ISPWA),
482 mc_make_sid_security_cfg(EQOSW),
483 mc_make_sid_security_cfg(XUSB_HOSTW),
484 mc_make_sid_security_cfg(TSECSWR),
485 mc_make_sid_security_cfg(SDMMCRAA),
486 mc_make_sid_security_cfg(APER),
487 mc_make_sid_security_cfg(VIW),
488 mc_make_sid_security_cfg(APEW),
489 mc_make_sid_security_cfg(AXISR),
490 mc_make_sid_security_cfg(SDMMCW),
491 mc_make_sid_security_cfg(BPMPDMAW),
492 mc_make_sid_security_cfg(ISPRA),
493 mc_make_sid_security_cfg(NVDECSWR),
494 mc_make_sid_security_cfg(XUSB_DEVW),
495 mc_make_sid_security_cfg(NVDECSRD),
496 mc_make_sid_security_cfg(MPCOREW),
497 mc_make_sid_security_cfg(NVDISPLAYR),
498 mc_make_sid_security_cfg(BPMPDMAR),
499 mc_make_sid_security_cfg(NVJPGSWR),
500 mc_make_sid_security_cfg(NVDECSRD1),
501 mc_make_sid_security_cfg(TSECSRD),
502 mc_make_sid_security_cfg(NVJPGSRD),
503 mc_make_sid_security_cfg(SDMMCWA),
504 mc_make_sid_security_cfg(SCER),
505 mc_make_sid_security_cfg(XUSB_HOSTR),
506 mc_make_sid_security_cfg(VICSRD),
507 mc_make_sid_security_cfg(AONDMAR),
508 mc_make_sid_security_cfg(AONW),
509 mc_make_sid_security_cfg(SDMMCRA),
510 mc_make_sid_security_cfg(HOST1XDMAR),
511 mc_make_sid_security_cfg(EQOSR),
512 mc_make_sid_security_cfg(SATAR),
513 mc_make_sid_security_cfg(BPMPR),
514 mc_make_sid_security_cfg(HDAR),
515 mc_make_sid_security_cfg(SDMMCRAB),
516 mc_make_sid_security_cfg(ETRR),
517 mc_make_sid_security_cfg(AONR),
518 mc_make_sid_security_cfg(APEDMAR),
519 mc_make_sid_security_cfg(SESRD),
520 mc_make_sid_security_cfg(NVENCSRD),
521 mc_make_sid_security_cfg(GPUSWR),
522 mc_make_sid_security_cfg(TSECSWRB),
523 mc_make_sid_security_cfg(ISPWB),
524 mc_make_sid_security_cfg(GPUSRD2),
525 mc_make_sid_override_cfg(APER),
526 mc_make_sid_override_cfg(VICSRD),
527 mc_make_sid_override_cfg(NVENCSRD),
528 mc_make_sid_override_cfg(NVJPGSWR),
529 mc_make_sid_override_cfg(AONW),
530 mc_make_sid_override_cfg(BPMPR),
531 mc_make_sid_override_cfg(BPMPW),
532 mc_make_sid_override_cfg(HDAW),
533 mc_make_sid_override_cfg(NVDISPLAYR1),
534 mc_make_sid_override_cfg(APEDMAR),
535 mc_make_sid_override_cfg(AFIR),
536 mc_make_sid_override_cfg(AXISR),
537 mc_make_sid_override_cfg(VICSRD1),
538 mc_make_sid_override_cfg(TSECSRD),
539 mc_make_sid_override_cfg(BPMPDMAW),
540 mc_make_sid_override_cfg(MPCOREW),
541 mc_make_sid_override_cfg(XUSB_HOSTR),
542 mc_make_sid_override_cfg(GPUSWR),
543 mc_make_sid_override_cfg(XUSB_DEVR),
544 mc_make_sid_override_cfg(UFSHCW),
545 mc_make_sid_override_cfg(XUSB_HOSTW),
546 mc_make_sid_override_cfg(SDMMCWAB),
547 mc_make_sid_override_cfg(SATAW),
548 mc_make_sid_override_cfg(SCEDMAR),
549 mc_make_sid_override_cfg(HOST1XDMAR),
550 mc_make_sid_override_cfg(SDMMCWA),
551 mc_make_sid_override_cfg(APEDMAW),
552 mc_make_sid_override_cfg(SESWR),
553 mc_make_sid_override_cfg(AXISW),
554 mc_make_sid_override_cfg(AONDMAW),
555 mc_make_sid_override_cfg(TSECSWRB),
556 mc_make_sid_override_cfg(MPCORER),
557 mc_make_sid_override_cfg(ISPWB),
558 mc_make_sid_override_cfg(AONR),
559 mc_make_sid_override_cfg(BPMPDMAR),
560 mc_make_sid_override_cfg(HDAR),
561 mc_make_sid_override_cfg(SDMMCRA),
562 mc_make_sid_override_cfg(ETRW),
563 mc_make_sid_override_cfg(GPUSWR2),
564 mc_make_sid_override_cfg(EQOSR),
565 mc_make_sid_override_cfg(TSECSWR),
566 mc_make_sid_override_cfg(ETRR),
567 mc_make_sid_override_cfg(NVDECSRD),
568 mc_make_sid_override_cfg(TSECSRDB),
569 mc_make_sid_override_cfg(SDMMCRAA),
570 mc_make_sid_override_cfg(NVDECSRD1),
571 mc_make_sid_override_cfg(SDMMCR),
572 mc_make_sid_override_cfg(NVJPGSRD),
573 mc_make_sid_override_cfg(SCEDMAW),
574 mc_make_sid_override_cfg(SDMMCWAA),
575 mc_make_sid_override_cfg(APEW),
576 mc_make_sid_override_cfg(AONDMAR),
577 mc_make_sid_override_cfg(PTCR),
578 mc_make_sid_override_cfg(SCER),
579 mc_make_sid_override_cfg(ISPRA),
580 mc_make_sid_override_cfg(ISPWA),
581 mc_make_sid_override_cfg(VICSWR),
582 mc_make_sid_override_cfg(SESRD),
583 mc_make_sid_override_cfg(SDMMCW),
584 mc_make_sid_override_cfg(SDMMCRAB),
585 mc_make_sid_override_cfg(EQOSW),
586 mc_make_sid_override_cfg(GPUSRD2),
587 mc_make_sid_override_cfg(SCEW),
588 mc_make_sid_override_cfg(GPUSRD),
589 mc_make_sid_override_cfg(NVDECSWR),
590 mc_make_sid_override_cfg(XUSB_DEVW),
591 mc_make_sid_override_cfg(SATAR),
592 mc_make_sid_override_cfg(NVDISPLAYR),
593 mc_make_sid_override_cfg(VIW),
594 mc_make_sid_override_cfg(UFSHCR),
595 mc_make_sid_override_cfg(NVENCSWR),
596 mc_make_sid_override_cfg(AFIW),
597 mc_smmu_bypass_cfg, /* TBU settings */
598 _END_OF_TABLE_,
599};
600
601/*******************************************************************************
602 * Handler to return the pointer to the MC's context struct
603 ******************************************************************************/
Varun Wadekard4a698f2019-08-26 10:20:53 -0700604mc_regs_t *plat_memctrl_get_sys_suspend_ctx(void)
Pritesh Raithatha75c94432018-08-03 15:48:15 +0530605{
606 /* index of _END_OF_TABLE_ */
607 tegra186_mc_context[0].val = (uint32_t)(ARRAY_SIZE(tegra186_mc_context)) - 1U;
608
609 return tegra186_mc_context;
610}
611
Varun Wadekard4a698f2019-08-26 10:20:53 -0700612void plat_memctrl_setup(void)
613{
614 uint32_t val;
615 unsigned int i;
616
617 /* Program all the Stream ID overrides */
618 for (i = 0U; i < ARRAY_SIZE(tegra186_streamid_override_regs); i++) {
619 tegra_mc_streamid_write_32(tegra186_streamid_override_regs[i],
620 MC_STREAM_ID_MAX);
621 }
622
623 /* Program the security config settings for all Stream IDs */
624 for (i = 0U; i < ARRAY_SIZE(tegra186_streamid_sec_cfgs); i++) {
625 val = (tegra186_streamid_sec_cfgs[i].override_enable << 16) |
626 (tegra186_streamid_sec_cfgs[i].override_client_inputs << 8) |
627 (tegra186_streamid_sec_cfgs[i].override_client_ns_flag << 0);
628 tegra_mc_streamid_write_32(tegra186_streamid_sec_cfgs[i].offset, val);
629 }
630
631 /*
632 * Re-configure MSS to allow ROC to deal with ordering of the
633 * Memory Controller traffic. This is needed as the Memory Controller
634 * boots with MSS having all control, but ROC provides a performance
635 * boost as compared to MSS.
636 */
637 tegra186_memctrl_reconfig_mss_clients();
638
639 /* Program overrides for MC transactions */
640 tegra186_memctrl_set_overrides();
641}
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +0530642
643/*******************************************************************************
Varun Wadekard4a698f2019-08-26 10:20:53 -0700644 * Handler to restore platform specific settings to the memory controller
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +0530645 ******************************************************************************/
Varun Wadekard4a698f2019-08-26 10:20:53 -0700646void plat_memctrl_restore(void)
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +0530647{
Varun Wadekard4a698f2019-08-26 10:20:53 -0700648 /*
649 * Re-configure MSS to allow ROC to deal with ordering of the
650 * Memory Controller traffic. This is needed as the Memory Controller
651 * boots with MSS having all control, but ROC provides a performance
652 * boost as compared to MSS.
653 */
654 tegra186_memctrl_reconfig_mss_clients();
655
656 /* Program overrides for MC transactions */
657 tegra186_memctrl_set_overrides();
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +0530658}
Varun Wadekarf3cd5092017-10-30 14:35:17 -0700659
660/*******************************************************************************
661 * Handler to program the scratch registers with TZDRAM settings for the
662 * resume firmware
663 ******************************************************************************/
664void plat_memctrl_tzdram_setup(uint64_t phys_base, uint64_t size_in_bytes)
665{
666 uint32_t val;
667
Steven Kaoa457f2e2017-11-14 18:52:05 +0800668 /*
669 * Setup the Memory controller to allow only secure accesses to
670 * the TZDRAM carveout
671 */
672 INFO("Configuring TrustZone DRAM Memory Carveout\n");
673
674 tegra_mc_write_32(MC_SECURITY_CFG0_0, (uint32_t)phys_base);
675 tegra_mc_write_32(MC_SECURITY_CFG3_0, (uint32_t)(phys_base >> 32));
676 tegra_mc_write_32(MC_SECURITY_CFG1_0, size_in_bytes >> 20);
Varun Wadekarf3cd5092017-10-30 14:35:17 -0700677
678 /*
679 * When TZ encryption is enabled, we need to setup TZDRAM
680 * before CPU accesses TZ Carveout, else CPU will fetch
681 * non-decrypted data. So save TZDRAM setting for SC7 resume
682 * FW to restore.
683 *
684 * Scratch registers map:
685 * RSV55_0 = CFG1[12:0] | CFG0[31:20]
686 * RSV55_1 = CFG3[1:0]
687 */
688 val = tegra_mc_read_32(MC_SECURITY_CFG1_0) & MC_SECURITY_SIZE_MB_MASK;
689 val |= tegra_mc_read_32(MC_SECURITY_CFG0_0) & MC_SECURITY_BOM_MASK;
Steven Kao186485e2017-10-23 18:22:09 +0800690 mmio_write_32(TEGRA_SCRATCH_BASE + SCRATCH_TZDRAM_ADDR_LO, val);
Varun Wadekarf3cd5092017-10-30 14:35:17 -0700691
692 val = tegra_mc_read_32(MC_SECURITY_CFG3_0) & MC_SECURITY_BOM_HI_MASK;
Steven Kao186485e2017-10-23 18:22:09 +0800693 mmio_write_32(TEGRA_SCRATCH_BASE + SCRATCH_TZDRAM_ADDR_HI, val);
Steven Kaoa457f2e2017-11-14 18:52:05 +0800694
695 /*
696 * MCE propagates the security configuration values across the
697 * CCPLEX.
698 */
699 (void)mce_update_gsc_tzdram();
Varun Wadekarf3cd5092017-10-30 14:35:17 -0700700}