blob: b2db6160d319c29aa870b07447f218de3c416335 [file] [log] [blame]
Dan Handley9df48042015-03-19 18:58:55 +00001/*
2 * Copyright (c) 2015, ARM Limited and Contributors. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30#ifndef __ARM_DEF_H__
31#define __ARM_DEF_H__
32
Soby Mathewfec4eb72015-07-01 16:16:20 +010033#include <arch.h>
Dan Handley9df48042015-03-19 18:58:55 +000034#include <common_def.h>
35#include <platform_def.h>
Juan Castillo9b265a82015-05-07 14:52:44 +010036#include <tbbr_img_def.h>
Dan Handley9df48042015-03-19 18:58:55 +000037#include <xlat_tables.h>
38
39
40/******************************************************************************
41 * Definitions common to all ARM standard platforms
42 *****************************************************************************/
43
Juan Castillo7d199412015-12-14 09:35:25 +000044/* Special value used to verify platform parameters from BL2 to BL31 */
Dan Handley9df48042015-03-19 18:58:55 +000045#define ARM_BL31_PLAT_PARAM_VAL 0x0f1e2d3c4b5a6978ULL
46
Soby Mathewa869de12015-05-08 10:18:59 +010047#define ARM_CLUSTER_COUNT 2
48#define ARM_SYSTEM_COUNT 1
Dan Handley9df48042015-03-19 18:58:55 +000049
50#define ARM_CACHE_WRITEBACK_SHIFT 6
51
Soby Mathewfec4eb72015-07-01 16:16:20 +010052/*
53 * Macros mapping the MPIDR Affinity levels to ARM Platform Power levels. The
54 * power levels have a 1:1 mapping with the MPIDR affinity levels.
55 */
56#define ARM_PWR_LVL0 MPIDR_AFFLVL0
57#define ARM_PWR_LVL1 MPIDR_AFFLVL1
Soby Mathewa869de12015-05-08 10:18:59 +010058#define ARM_PWR_LVL2 MPIDR_AFFLVL2
Soby Mathewfec4eb72015-07-01 16:16:20 +010059
60/*
61 * Macros for local power states in ARM platforms encoded by State-ID field
62 * within the power-state parameter.
63 */
64/* Local power state for power domains in Run state. */
65#define ARM_LOCAL_STATE_RUN 0
66/* Local power state for retention. Valid only for CPU power domains */
67#define ARM_LOCAL_STATE_RET 1
68/* Local power state for OFF/power-down. Valid for CPU and cluster power
69 domains */
70#define ARM_LOCAL_STATE_OFF 2
71
Dan Handley9df48042015-03-19 18:58:55 +000072/* Memory location options for TSP */
73#define ARM_TRUSTED_SRAM_ID 0
74#define ARM_TRUSTED_DRAM_ID 1
75#define ARM_DRAM_ID 2
76
77/* The first 4KB of Trusted SRAM are used as shared memory */
78#define ARM_TRUSTED_SRAM_BASE 0x04000000
79#define ARM_SHARED_RAM_BASE ARM_TRUSTED_SRAM_BASE
80#define ARM_SHARED_RAM_SIZE 0x00001000 /* 4 KB */
81
82/* The remaining Trusted SRAM is used to load the BL images */
83#define ARM_BL_RAM_BASE (ARM_SHARED_RAM_BASE + \
84 ARM_SHARED_RAM_SIZE)
85#define ARM_BL_RAM_SIZE (PLAT_ARM_TRUSTED_SRAM_SIZE - \
86 ARM_SHARED_RAM_SIZE)
87
88/*
89 * The top 16MB of DRAM1 is configured as secure access only using the TZC
90 * - SCP TZC DRAM: If present, DRAM reserved for SCP use
91 * - AP TZC DRAM: The remaining TZC secured DRAM reserved for AP use
92 */
93#define ARM_TZC_DRAM1_SIZE MAKE_ULL(0x01000000)
94
95#define ARM_SCP_TZC_DRAM1_BASE (ARM_DRAM1_BASE + \
96 ARM_DRAM1_SIZE - \
97 ARM_SCP_TZC_DRAM1_SIZE)
98#define ARM_SCP_TZC_DRAM1_SIZE PLAT_ARM_SCP_TZC_DRAM1_SIZE
99#define ARM_SCP_TZC_DRAM1_END (ARM_SCP_TZC_DRAM1_BASE + \
100 ARM_SCP_TZC_DRAM1_SIZE - 1)
101
102#define ARM_AP_TZC_DRAM1_BASE (ARM_DRAM1_BASE + \
103 ARM_DRAM1_SIZE - \
104 ARM_TZC_DRAM1_SIZE)
105#define ARM_AP_TZC_DRAM1_SIZE (ARM_TZC_DRAM1_SIZE - \
106 ARM_SCP_TZC_DRAM1_SIZE)
107#define ARM_AP_TZC_DRAM1_END (ARM_AP_TZC_DRAM1_BASE + \
108 ARM_AP_TZC_DRAM1_SIZE - 1)
109
110
111#define ARM_NS_DRAM1_BASE ARM_DRAM1_BASE
112#define ARM_NS_DRAM1_SIZE (ARM_DRAM1_SIZE - \
113 ARM_TZC_DRAM1_SIZE)
114#define ARM_NS_DRAM1_END (ARM_NS_DRAM1_BASE + \
115 ARM_NS_DRAM1_SIZE - 1)
116
117#define ARM_DRAM1_BASE MAKE_ULL(0x80000000)
118#define ARM_DRAM1_SIZE MAKE_ULL(0x80000000)
119#define ARM_DRAM1_END (ARM_DRAM1_BASE + \
120 ARM_DRAM1_SIZE - 1)
121
122#define ARM_DRAM2_BASE MAKE_ULL(0x880000000)
123#define ARM_DRAM2_SIZE PLAT_ARM_DRAM2_SIZE
124#define ARM_DRAM2_END (ARM_DRAM2_BASE + \
125 ARM_DRAM2_SIZE - 1)
126
127#define ARM_IRQ_SEC_PHY_TIMER 29
128
129#define ARM_IRQ_SEC_SGI_0 8
130#define ARM_IRQ_SEC_SGI_1 9
131#define ARM_IRQ_SEC_SGI_2 10
132#define ARM_IRQ_SEC_SGI_3 11
133#define ARM_IRQ_SEC_SGI_4 12
134#define ARM_IRQ_SEC_SGI_5 13
135#define ARM_IRQ_SEC_SGI_6 14
136#define ARM_IRQ_SEC_SGI_7 15
137
Achin Gupta1fa7eb62015-11-03 14:18:34 +0000138/*
139 * Define a list of Group 1 Secure and Group 0 interrupts as per GICv3
140 * terminology. On a GICv2 system or mode, the lists will be merged and treated
141 * as Group 0 interrupts.
142 */
143#define ARM_G1S_IRQS ARM_IRQ_SEC_PHY_TIMER, \
144 ARM_IRQ_SEC_SGI_1, \
145 ARM_IRQ_SEC_SGI_2, \
146 ARM_IRQ_SEC_SGI_3, \
147 ARM_IRQ_SEC_SGI_4, \
148 ARM_IRQ_SEC_SGI_5, \
149 ARM_IRQ_SEC_SGI_7
150
151#define ARM_G0_IRQS ARM_IRQ_SEC_SGI_0, \
152 ARM_IRQ_SEC_SGI_6
153
Dan Handley9df48042015-03-19 18:58:55 +0000154#define ARM_SHARED_RAM_ATTR ((PLAT_ARM_SHARED_RAM_CACHED ? \
155 MT_MEMORY : MT_DEVICE) \
156 | MT_RW | MT_SECURE)
157
158#define ARM_MAP_SHARED_RAM MAP_REGION_FLAT( \
159 ARM_SHARED_RAM_BASE, \
160 ARM_SHARED_RAM_SIZE, \
161 ARM_SHARED_RAM_ATTR)
162
163#define ARM_MAP_NS_DRAM1 MAP_REGION_FLAT( \
164 ARM_NS_DRAM1_BASE, \
165 ARM_NS_DRAM1_SIZE, \
166 MT_MEMORY | MT_RW | MT_NS)
167
168#define ARM_MAP_TSP_SEC_MEM MAP_REGION_FLAT( \
169 TSP_SEC_MEM_BASE, \
170 TSP_SEC_MEM_SIZE, \
171 MT_MEMORY | MT_RW | MT_SECURE)
172
173
174/*
175 * The number of regions like RO(code), coherent and data required by
176 * different BL stages which need to be mapped in the MMU.
177 */
178#if USE_COHERENT_MEM
179#define ARM_BL_REGIONS 3
180#else
181#define ARM_BL_REGIONS 2
182#endif
183
184#define MAX_MMAP_REGIONS (PLAT_ARM_MMAP_ENTRIES + \
185 ARM_BL_REGIONS)
186
187/* Memory mapped Generic timer interfaces */
188#define ARM_SYS_CNTCTL_BASE 0x2a430000
189#define ARM_SYS_CNTREAD_BASE 0x2a800000
190#define ARM_SYS_TIMCTL_BASE 0x2a810000
191
192#define ARM_CONSOLE_BAUDRATE 115200
193
Juan Castillob6132f12015-10-06 14:01:35 +0100194/* Trusted Watchdog constants */
195#define ARM_SP805_TWDG_BASE 0x2a490000
196#define ARM_SP805_TWDG_CLK_HZ 32768
197/* The TBBR document specifies a watchdog timeout of 256 seconds. SP805
198 * asserts reset after two consecutive countdowns (2 x 128 = 256 sec) */
199#define ARM_TWDG_TIMEOUT_SEC 128
200#define ARM_TWDG_LOAD_VAL (ARM_SP805_TWDG_CLK_HZ * \
201 ARM_TWDG_TIMEOUT_SEC)
202
Dan Handley9df48042015-03-19 18:58:55 +0000203/******************************************************************************
204 * Required platform porting definitions common to all ARM standard platforms
205 *****************************************************************************/
206
207#define ADDR_SPACE_SIZE (1ull << 32)
208
Soby Mathewfec4eb72015-07-01 16:16:20 +0100209/*
210 * This macro defines the deepest retention state possible. A higher state
211 * id will represent an invalid or a power down state.
212 */
213#define PLAT_MAX_RET_STATE ARM_LOCAL_STATE_RET
214
215/*
216 * This macro defines the deepest power down states possible. Any state ID
217 * higher than this is invalid.
218 */
219#define PLAT_MAX_OFF_STATE ARM_LOCAL_STATE_OFF
220
Dan Handley9df48042015-03-19 18:58:55 +0000221
222#define PLATFORM_CORE_COUNT (PLAT_ARM_CLUSTER0_CORE_COUNT + \
223 PLAT_ARM_CLUSTER1_CORE_COUNT)
224
225/*
226 * Some data must be aligned on the biggest cache line size in the platform.
227 * This is known only to the platform as it might have a combination of
228 * integrated and external caches.
229 */
230#define CACHE_WRITEBACK_GRANULE (1 << ARM_CACHE_WRITEBACK_SHIFT)
231
Dan Handley9df48042015-03-19 18:58:55 +0000232
233/*******************************************************************************
234 * BL1 specific defines.
235 * BL1 RW data is relocated from ROM to RAM at runtime so we need 2 sets of
236 * addresses.
237 ******************************************************************************/
238#define BL1_RO_BASE PLAT_ARM_TRUSTED_ROM_BASE
239#define BL1_RO_LIMIT (PLAT_ARM_TRUSTED_ROM_BASE \
240 + PLAT_ARM_TRUSTED_ROM_SIZE)
241/*
242 * Put BL1 RW at the top of the Trusted SRAM. BL1_RW_BASE is calculated using
243 * the current BL1 RW debug size plus a little space for growth.
244 */
245#if TRUSTED_BOARD_BOOT
246#define BL1_RW_BASE (ARM_BL_RAM_BASE + \
247 ARM_BL_RAM_SIZE - \
Juan Castilloa08a5e72015-05-19 11:54:12 +0100248 0x9000)
Dan Handley9df48042015-03-19 18:58:55 +0000249#else
250#define BL1_RW_BASE (ARM_BL_RAM_BASE + \
251 ARM_BL_RAM_SIZE - \
252 0x6000)
253#endif
254#define BL1_RW_LIMIT (ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)
255
256/*******************************************************************************
257 * BL2 specific defines.
258 ******************************************************************************/
259/*
Juan Castillo7d199412015-12-14 09:35:25 +0000260 * Put BL2 just below BL31. BL2_BASE is calculated using the current BL2 debug
Dan Handley9df48042015-03-19 18:58:55 +0000261 * size plus a little space for growth.
262 */
263#if TRUSTED_BOARD_BOOT
Juan Castilloa08a5e72015-05-19 11:54:12 +0100264#define BL2_BASE (BL31_BASE - 0x1D000)
Dan Handley9df48042015-03-19 18:58:55 +0000265#else
266#define BL2_BASE (BL31_BASE - 0xC000)
267#endif
268#define BL2_LIMIT BL31_BASE
269
270/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000271 * BL31 specific defines.
Dan Handley9df48042015-03-19 18:58:55 +0000272 ******************************************************************************/
273/*
Juan Castillo7d199412015-12-14 09:35:25 +0000274 * Put BL31 at the top of the Trusted SRAM. BL31_BASE is calculated using the
275 * current BL31 debug size plus a little space for growth.
Dan Handley9df48042015-03-19 18:58:55 +0000276 */
277#define BL31_BASE (ARM_BL_RAM_BASE + \
278 ARM_BL_RAM_SIZE - \
279 0x1D000)
280#define BL31_PROGBITS_LIMIT BL1_RW_BASE
281#define BL31_LIMIT (ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)
282
283/*******************************************************************************
Juan Castillo7d199412015-12-14 09:35:25 +0000284 * BL32 specific defines.
Dan Handley9df48042015-03-19 18:58:55 +0000285 ******************************************************************************/
286/*
287 * On ARM standard platforms, the TSP can execute from Trusted SRAM,
288 * Trusted DRAM (if available) or the DRAM region secured by the TrustZone
289 * controller.
290 */
291#if ARM_TSP_RAM_LOCATION_ID == ARM_TRUSTED_SRAM_ID
292# define TSP_SEC_MEM_BASE ARM_BL_RAM_BASE
293# define TSP_SEC_MEM_SIZE ARM_BL_RAM_SIZE
294# define TSP_PROGBITS_LIMIT BL2_BASE
295# define BL32_BASE ARM_BL_RAM_BASE
296# define BL32_LIMIT BL31_BASE
297#elif ARM_TSP_RAM_LOCATION_ID == ARM_TRUSTED_DRAM_ID
298# define TSP_SEC_MEM_BASE PLAT_ARM_TRUSTED_DRAM_BASE
299# define TSP_SEC_MEM_SIZE PLAT_ARM_TRUSTED_DRAM_SIZE
300# define BL32_BASE PLAT_ARM_TRUSTED_DRAM_BASE
301# define BL32_LIMIT (PLAT_ARM_TRUSTED_DRAM_BASE \
302 + (1 << 21))
303#elif ARM_TSP_RAM_LOCATION_ID == ARM_DRAM_ID
304# define TSP_SEC_MEM_BASE ARM_AP_TZC_DRAM1_BASE
305# define TSP_SEC_MEM_SIZE ARM_AP_TZC_DRAM1_SIZE
306# define BL32_BASE ARM_AP_TZC_DRAM1_BASE
307# define BL32_LIMIT (ARM_AP_TZC_DRAM1_BASE + \
308 ARM_AP_TZC_DRAM1_SIZE)
309#else
310# error "Unsupported ARM_TSP_RAM_LOCATION_ID value"
311#endif
312
Yatharth Kochar736a3bf2015-10-11 14:14:55 +0100313/*******************************************************************************
314 * FWU Images: NS_BL1U, BL2U & NS_BL2U defines.
315 ******************************************************************************/
316#define BL2U_BASE BL2_BASE
317#define BL2U_LIMIT BL31_BASE
318#define NS_BL2U_BASE ARM_NS_DRAM1_BASE
319#define NS_BL1U_BASE (V2M_FLASH0_BASE + 0x03EB8000)
320
Dan Handley9df48042015-03-19 18:58:55 +0000321/*
322 * ID of the secure physical generic timer interrupt used by the TSP.
323 */
324#define TSP_IRQ_SEC_PHY_TIMER ARM_IRQ_SEC_PHY_TIMER
325
326
Vikram Kanigirid79214c2015-09-09 10:52:13 +0100327/*
328 * One cache line needed for bakery locks on ARM platforms
329 */
330#define PLAT_PERCPU_BAKERY_LOCK_SIZE (1 * CACHE_WRITEBACK_GRANULE)
331
332
Dan Handley9df48042015-03-19 18:58:55 +0000333#endif /* __ARM_DEF_H__ */