From patchwork Wed Jul 21 14:17:10 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Peng Fan \(OSS\)" X-Patchwork-Id: 483298 Delivered-To: patch@linaro.org Received: by 2002:a02:c94a:0:0:0:0:0 with SMTP id u10csp6213170jao; Wed, 21 Jul 2021 06:49:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwKdNaErVjt56nJIxdHKB0lJ1bEG8Pak7rFVe0gHlM5hbO1LmOeW5qym1gR0pJZIqNZwnPc X-Received: by 2002:a17:906:990f:: with SMTP id zl15mr38870248ejb.34.1626875341418; Wed, 21 Jul 2021 06:49:01 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1626875341; cv=pass; d=google.com; s=arc-20160816; b=YVQ3iwsfPoo9Xi6NMITl9R41C2gdZuXbgecUFND4LdapWtNQMAvzMR9851BlD2vn3b CbLOYE5D9ppPH1aB4BMl/9cF/9dj4DiycAQ543M91uA9q8QmmIlLMCdpPeS3wVhfYnUL 4h2NL9EFPvihWJaIbhC6/US2snrRWz+/ZapsX3R9PmuXenXLwVU1+IFzbKkHPuzD6io+ uYAkVzWY4RXjc3xsAPrbMmoED4XZXtM0ZdxTBhdvXvbpdgtBcb+rDDmBqEH9hy3+UuqK t1cwoABTIHdj1KUHQ2lYIeTSmnNcyAVfjvj1QnwugDzl4sBg19mEKe72GbJsif7MmTrz lfag== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:mime-version :content-transfer-encoding:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=SM7wQoZPfTof5cvek/LTF2Bsmyn/joESbzZf4Z6F0fI=; b=hccimzDFULjQznn6bGQgclHYSn8ClX3ws+9r2ap4WVn9eX1JI2Yn/k4fXx+ltoZPH6 oaHHNHelZceuAdAzrBWo9ljVWb+yW46skaEXKjItR08rMxL+gsXhuT6QtqbzPK3gYaJZ f5KBX/YRS3GYboAjxPaUDJj/FeLcxOySS/H/4yxnkIIe4WvyM3a+48WWC3sDUJEnlT+N mKyfTHiPhQfvZx/ongqtUSiuk3CALe9lhl00JVlKpIq5XSD6vnSvUxFtHhZD4qFKyFy8 uOkG4aR408IYJqEoPH0kRrhn/37SPehGatPxjYdSBFfa7tZn2ADXRmtza74JwioIDdF/ 4UOg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@NXP1.onmicrosoft.com header.s=selector2-NXP1-onmicrosoft-com header.b=kXEZwHCo; arc=pass (i=1 spf=pass spfdomain=oss.nxp.com dkim=pass dkdomain=oss.nxp.com dmarc=pass fromdomain=oss.nxp.com); spf=pass (google.com: domain of u-boot-bounces@lists.denx.de designates 85.214.62.61 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from phobos.denx.de (phobos.denx.de. [85.214.62.61]) by mx.google.com with ESMTPS id rh1si4631760ejb.220.2021.07.21.06.49.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 21 Jul 2021 06:49:01 -0700 (PDT) Received-SPF: pass (google.com: domain of u-boot-bounces@lists.denx.de designates 85.214.62.61 as permitted sender) client-ip=85.214.62.61; Authentication-Results: mx.google.com; dkim=pass header.i=@NXP1.onmicrosoft.com header.s=selector2-NXP1-onmicrosoft-com header.b=kXEZwHCo; arc=pass (i=1 spf=pass spfdomain=oss.nxp.com dkim=pass dkdomain=oss.nxp.com dmarc=pass fromdomain=oss.nxp.com); spf=pass (google.com: domain of u-boot-bounces@lists.denx.de designates 85.214.62.61 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 2A33282DB4; Wed, 21 Jul 2021 15:46:05 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=oss.nxp.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=NXP1.onmicrosoft.com header.i=@NXP1.onmicrosoft.com header.b="kXEZwHCo"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id C22B482C83; Wed, 21 Jul 2021 15:44:41 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-0.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,FORGED_SPF_HELO,MSGID_FROM_MTA_HEADER,SPF_HELO_PASS autolearn=no autolearn_force=no version=3.4.2 Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04on062d.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0e::62d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id A47F082C57 for ; Wed, 21 Jul 2021 15:44:32 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=oss.nxp.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=peng.fan@oss.nxp.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KCyCmv+GwJn/tbJQoYUfyA3wz9INN3MvVloAvEqBz1GzVny3TF2Mq3t3zGcZDgS44Ysd6hBAwhIa3oxxwLIpiEmswm2X/OvhHhqITM/8msJzccBodQePfoEL3SB7oEtPWo/bzTb9vQYUnsdDFDDWjBEYBchPz3Ks4eyEnZ46Rt7+ep4R8Q24kdc/oTMEFXxdelAk2rosx0vQbdVhOk8T6IAWzM7OHlNK1/Y9QYgT2W9bEpwWbEMNe4mF3DrbkWFOdJMfUGXN72rxrCibSCcvB7M0r7FuDnVktUg7Gd8bpxQaqD0atJ0Yge0Xoee35fi95W3ESGIAzv+jzxboxGy0Vg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SM7wQoZPfTof5cvek/LTF2Bsmyn/joESbzZf4Z6F0fI=; b=flIVKw4ob+yM55wRBRNvx9zoh7jSLy+zZGC/AM5cgZLB/eR9gODHdcR0jIdZbGB7JO/QBL2VmYzdsFP43XdjK0uH9nbZCwEzsNucouYnSoSy1Jsd7HKm6lo2rZBn2ZxS+GLzpX0RnxEZZKBCcUuPMtqbkRLJHOscCeIrpVIpCwdJiPBOOwp1ga9xXOCKFOBiihv4uA8P8tTTjomBviIJ08LGdhloPPwFVig/cFsnL+5a++pVPPdI0ufuCIL+a3X9ysz1om2joKjk/5TdkiLYPACCGj5w13jjEe6EDVHFvjPP80P1a4Dr6yGy8EfGJWfwpOYWO1EFbm5TJE4xsICyOQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oss.nxp.com; dmarc=pass action=none header.from=oss.nxp.com; dkim=pass header.d=oss.nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=NXP1.onmicrosoft.com; s=selector2-NXP1-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SM7wQoZPfTof5cvek/LTF2Bsmyn/joESbzZf4Z6F0fI=; b=kXEZwHCoMCFwgohcJRUqMciZ60MrvEgY+nqSZdQ8ydyVG1hxPQOUvukJgr+FPQxmtQApvEWxnau++Ke8D2MB1BgOawM0U81imjKQ/AYwc6dDgXOe+xs/cub9tURxQv8fQ5ZxgExMnAwAh3PqysHyVWlGxZZDQHTeUVBoIk10dYE= Authentication-Results: denx.de; dkim=none (message not signed) header.d=none; denx.de; dmarc=none action=none header.from=oss.nxp.com; Received: from DB6PR0402MB2760.eurprd04.prod.outlook.com (2603:10a6:4:a1::14) by DB6PR0402MB2757.eurprd04.prod.outlook.com (2603:10a6:4:94::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4331.29; Wed, 21 Jul 2021 13:44:31 +0000 Received: from DB6PR0402MB2760.eurprd04.prod.outlook.com ([fe80::c445:d742:eb76:86dd]) by DB6PR0402MB2760.eurprd04.prod.outlook.com ([fe80::c445:d742:eb76:86dd%9]) with mapi id 15.20.4331.034; Wed, 21 Jul 2021 13:44:31 +0000 From: "Peng Fan (OSS)" To: sbabic@denx.de, festevam@gmail.com Cc: uboot-imx@nxp.com, u-boot@lists.denx.de, Peng Fan , Ye Li Subject: [PATCH V4 29/44] arm: imx8ulp: release trdc and assign lpav from RTD to APD Date: Wed, 21 Jul 2021 22:17:10 +0800 Message-Id: <20210721141725.23346-30-peng.fan@oss.nxp.com> X-Mailer: git-send-email 2.30.0 In-Reply-To: <20210721141725.23346-1-peng.fan@oss.nxp.com> References: <20210721141725.23346-1-peng.fan@oss.nxp.com> X-ClientProxiedBy: SG2PR0401CA0015.apcprd04.prod.outlook.com (2603:1096:3:1::25) To DB6PR0402MB2760.eurprd04.prod.outlook.com (2603:10a6:4:a1::14) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from linux-1xn6.ap.freescale.net (119.31.174.71) by SG2PR0401CA0015.apcprd04.prod.outlook.com (2603:1096:3:1::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4331.21 via Frontend Transport; Wed, 21 Jul 2021 13:44:28 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 34c8c882-0a6f-4e34-ee72-08d94c4daaa2 X-MS-TrafficTypeDiagnostic: DB6PR0402MB2757: X-MS-Exchange-SharedMailbox-RoutingAgent-Processed: True X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:6790; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB6PR0402MB2760.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(396003)(39860400002)(346002)(366004)(136003)(4326008)(38350700002)(5660300002)(186003)(86362001)(6666004)(6506007)(2906002)(26005)(8676002)(83380400001)(52116002)(8936002)(6486002)(478600001)(316002)(6512007)(38100700002)(66946007)(66556008)(956004)(1076003)(2616005)(66476007)(54906003)(32563001); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: k5Pj4LPUAoSRyQCO/bu0PS61B1h1uDMFONPqLLvqt6QlkbncDpzaziaoZhT8ZmF+w2+wfI+iTS9MGSfliUr2YxsgtRgCL+EZsF5yeI8klYU+mINxD3gkHfyyWeL1hZzMwwjqrYQd6OicW5yXhoVvh0LWGoi2vzHbZi6POwwH9USUKpPo+RcvWnJiYODgErgSsXQjF8XHDP6fsVDS98GXgE1nwkpCCMFx9tZfPiXi5/UrSRzboyVs8nr7GLnH1rgS/i6WrPWHT+qUpH0d7M5P3xUpsdK0EW2YGrZ/wBeNqhQc7KtFx+pj4uyj+xBAuQEQJuF70aFZE1F4uOSBny6D5zgc9l05f8n84s3bTFZzTxh/RZa7UP3PEDr1suEaD2Ef87qh13obBFhjo+BvwCUeG9Phct3f3u1F6Nws3Q9CxQRx9ohmL/5NoWIOw8a8Yv7+J4l1lWb6uk8JZJ7ODcvzTXXM6F2wPMl+H9Hg9xcAEk4iPHOhPLRHIweUYSgVRQpL3NMqaS/reB2GC7mzmxqfkoNOVlZ/UY5lc6WSXw3iLtYAZtOw+cQ0XX/MHNVd6ldYlk9GVz+4KcCzxKhgND5k6jjY0bO58AhdbatBzX6Mn/ZiuSPPTJDc4pODrdLsCPGjdpr/fzW3aVqpLZwXW9W/X9UPG7OIsBux7cknDfBqAy3Nj/YfMkKT+W9GSN+pTbyGODW+fQFRZrRY3Oe/lhAvINslS6znmrqNDABZa9ppUpmP2bKcoG1WlewBbCxQNIiacq9u6nus6UbHR9SRX1vBSFP1T6CYDkKrxNFpnfMxn5bSosokC0cjQv8ndFJ7uWNj8wbnE7m7E9f76nNM8U9vb/Mk7QiUylKh/wbt9F2AHGLcH4Tls9SHp12tMU/0Qug9Ne3DIDPHxDGPuvY4wSKwQ3AVRsX05ERuWhEkglRi04djFb6efblvrmRhFJAoqpD+S6+75tHAESWoMyLMeLjhyjriWSuS2M3hD+d5gHs1MxbmX1H0hBDCRZx7J1sD16zOR05Zh6YiwkX/cq+vgbJHKLYlp2/peK5pJbEYL3MEBBFH6UI94bmskPbzWhnr6L+gDStcocvHxhdVEOkz5dGQX48nCvUX21cfUhDusc0Mj3GYy7uTWmBPv5TATIitLS8UGgTDF9v8E/fSz13U+iiuwPhsbZpEsXGc8euqzF+anBr5IHRT+EsFNZMr48d47huEhciSq9xLXEqtA3NjzwlTY8WOsXNLpLufLRyQMZak+MpPqqTSNq6c3A78dexmvZsu8yf4+pgU7Cvg8DqSljp8BGolOZ5x+YguYMzcq0+5Guas/WckFziJTHwKKp2flSyP X-OriginatorOrg: oss.nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 34c8c882-0a6f-4e34-ee72-08d94c4daaa2 X-MS-Exchange-CrossTenant-AuthSource: DB6PR0402MB2760.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Jul 2021 13:44:31.0622 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: G5C7NiabRnVqkKL2kn4KB0pt9sevjIxh8Gv/XDPqnrK+skHhpjNedIS6ItVprhkou/RxR9qWa3uNc+Jxy8QrPA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0402MB2757 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean From: Peng Fan Rlease LPAV from RTD to APD Release gpu2D/3D to APD Set TRDC MBC2 MEM1 for iomuxc0 access Since upower depends AP/M33 SW to configure IOMUX for its PMIC i2c and MODE pins. we have to open iomuxc0 access for A35 core (domain 7) in single boot. Signed-off-by: Peng Fan Signed-off-by: Ye Li --- arch/arm/mach-imx/imx8ulp/soc.c | 104 +++++++++++++++++++++++++++++++- 1 file changed, 103 insertions(+), 1 deletion(-) -- 2.30.0 diff --git a/arch/arm/mach-imx/imx8ulp/soc.c b/arch/arm/mach-imx/imx8ulp/soc.c index 43fe62c2fd..29f7d5be02 100644 --- a/arch/arm/mach-imx/imx8ulp/soc.c +++ b/arch/arm/mach-imx/imx8ulp/soc.c @@ -380,6 +380,102 @@ static int release_rdc(enum rdc_type type) return ret; } +struct mbc_mem_dom { + u32 mem_glbcfg[4]; + u32 nse_blk_index; + u32 nse_blk_set; + u32 nse_blk_clr; + u32 nsr_blk_clr_all; + u32 memn_glbac[8]; + /* The upper only existed in the beginning of each MBC */ + u32 mem0_blk_cfg_w[64]; + u32 mem0_blk_nse_w[16]; + u32 mem1_blk_cfg_w[8]; + u32 mem1_blk_nse_w[2]; + u32 mem2_blk_cfg_w[8]; + u32 mem2_blk_nse_w[2]; + u32 mem3_blk_cfg_w[8]; + u32 mem3_blk_nse_w[2];/*0x1F0, 0x1F4 */ + u32 reserved[2]; +}; + +struct trdc { + u8 res0[0x1000]; + struct mbc_mem_dom mem_dom[4][8]; +}; + +/* MBC[m]_[d]_MEM[s]_BLK_CFG_W[w] */ +int trdc_mbc_set_access(u32 mbc_x, u32 dom_x, u32 mem_x, u32 blk_x, u32 perm) +{ + struct trdc *trdc_base = (struct trdc *)0x28031000U; + struct mbc_mem_dom *mbc_dom; + u32 *cfg_w, *nse_w; + u32 index, offset, val; + + mbc_dom = &trdc_base->mem_dom[mbc_x][dom_x]; + + switch (mem_x) { + case 0: + cfg_w = &mbc_dom->mem0_blk_cfg_w[blk_x / 8]; + nse_w = &mbc_dom->mem0_blk_nse_w[blk_x / 32]; + break; + case 1: + cfg_w = &mbc_dom->mem1_blk_cfg_w[blk_x / 8]; + nse_w = &mbc_dom->mem1_blk_nse_w[blk_x / 32]; + break; + case 2: + cfg_w = &mbc_dom->mem2_blk_cfg_w[blk_x / 8]; + nse_w = &mbc_dom->mem2_blk_nse_w[blk_x / 32]; + break; + case 3: + cfg_w = &mbc_dom->mem3_blk_cfg_w[blk_x / 8]; + nse_w = &mbc_dom->mem3_blk_nse_w[blk_x / 32]; + break; + default: + return -EINVAL; + }; + + index = blk_x % 8; + offset = index * 4; + + val = readl((void __iomem *)cfg_w); + + val &= ~(0xFU << offset); + + if (perm == 0x7700) { + val |= (0x0 << offset); + writel(perm, (void __iomem *)cfg_w); + } else if (perm == 0x0077) { + val |= (0x8 << offset); /* nse bit set */ + writel(val, (void __iomem *)cfg_w); + } else { + return -EINVAL; + } + + return 0; +} + +int trdc_set_access(void) +{ + /* + * CGC0: PBridge0 slot 47 + * trdc_mbc_set_access(2, 7, 0, 47, 0x7700); + * For secure access, default single boot already support, + * For non-secure access, need add in future per usecase. + */ + trdc_mbc_set_access(2, 7, 0, 49, 0x7700); + trdc_mbc_set_access(2, 7, 0, 50, 0x7700); + trdc_mbc_set_access(2, 7, 0, 51, 0x7700); + trdc_mbc_set_access(2, 7, 0, 52, 0x7700); + + trdc_mbc_set_access(2, 7, 0, 47, 0x0077); + + /* iomuxc 0 */ + trdc_mbc_set_access(2, 7, 1, 33, 0x7700); + + return 0; +} + static void xrdc_mrc_region_set_access(int mrc_index, u32 addr, u32 access) { ulong xrdc_base = 0x292f0000, off; @@ -428,8 +524,14 @@ int arch_cpu_init(void) /* Disable wdog */ init_wdog(); - if (get_boot_mode() == SINGLE_BOOT) + if (get_boot_mode() == SINGLE_BOOT) { release_rdc(RDC_TRDC); + trdc_set_access(); + /* LPAV to APD */ + setbits_le32(0x2802B044, BIT(7)); + /* GPU 2D/3D to APD */ + setbits_le32(0x2802B04C, BIT(1) | BIT(2)); + } /* release xrdc, then allow A35 to write SRAM2 */ release_rdc(RDC_XRDC);