Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 1 | /* |
Soby Mathew | ea26bad | 2016-11-14 12:25:45 +0000 | [diff] [blame] | 2 | * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 3 | * |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 5 | */ |
| 6 | |
| 7 | #ifndef __CSS_DEF_H__ |
| 8 | #define __CSS_DEF_H__ |
| 9 | |
| 10 | #include <arm_def.h> |
Jeenu Viswambharan | 723dce0 | 2017-09-22 08:59:59 +0100 | [diff] [blame] | 11 | #include <gic_common.h> |
| 12 | #include <interrupt_props.h> |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 13 | #include <tzc400.h> |
| 14 | |
| 15 | /************************************************************************* |
| 16 | * Definitions common to all ARM Compute SubSystems (CSS) |
| 17 | *************************************************************************/ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 18 | #define NSROM_BASE 0x1f000000 |
| 19 | #define NSROM_SIZE 0x00001000 |
| 20 | |
| 21 | /* Following covers CSS Peripherals excluding NSROM and NSRAM */ |
| 22 | #define CSS_DEVICE_BASE 0x20000000 |
| 23 | #define CSS_DEVICE_SIZE 0x0e000000 |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 24 | |
Yatharth Kochar | 736a3bf | 2015-10-11 14:14:55 +0100 | [diff] [blame] | 25 | /* System Security Control Registers */ |
| 26 | #define SSC_REG_BASE 0x2a420000 |
| 27 | #define SSC_GPRETN (SSC_REG_BASE + 0x030) |
| 28 | |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 29 | /* The slave_bootsecure controls access to GPU, DMC and CS. */ |
| 30 | #define CSS_NIC400_SLAVE_BOOTSECURE 8 |
| 31 | |
| 32 | /* Interrupt handling constants */ |
| 33 | #define CSS_IRQ_MHU 69 |
| 34 | #define CSS_IRQ_GPU_SMMU_0 71 |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 35 | #define CSS_IRQ_TZC 80 |
| 36 | #define CSS_IRQ_TZ_WDOG 86 |
Vikram Kanigiri | f3bcea2 | 2015-06-24 17:51:09 +0100 | [diff] [blame] | 37 | #define CSS_IRQ_SEC_SYS_TIMER 91 |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 38 | |
Soby Mathew | 1ced6b8 | 2017-06-12 12:37:10 +0100 | [diff] [blame] | 39 | /* MHU register offsets */ |
| 40 | #define MHU_CPU_INTR_S_SET_OFFSET 0x308 |
| 41 | |
Sandrine Bailleux | 761bba3 | 2015-04-29 13:02:46 +0100 | [diff] [blame] | 42 | /* |
Jeenu Viswambharan | 723dce0 | 2017-09-22 08:59:59 +0100 | [diff] [blame] | 43 | * Define a list of Group 1 Secure interrupt properties as per GICv3 |
| 44 | * terminology. On a GICv2 system or mode, the interrupts will be treated as |
| 45 | * Group 0 interrupts. |
Achin Gupta | 1fa7eb6 | 2015-11-03 14:18:34 +0000 | [diff] [blame] | 46 | */ |
Jeenu Viswambharan | 723dce0 | 2017-09-22 08:59:59 +0100 | [diff] [blame] | 47 | #define CSS_G1S_IRQ_PROPS(grp) \ |
| 48 | INTR_PROP_DESC(CSS_IRQ_MHU, GIC_HIGHEST_SEC_PRIORITY, grp, \ |
| 49 | GIC_INTR_CFG_LEVEL), \ |
| 50 | INTR_PROP_DESC(CSS_IRQ_GPU_SMMU_0, GIC_HIGHEST_SEC_PRIORITY, grp, \ |
| 51 | GIC_INTR_CFG_LEVEL), \ |
| 52 | INTR_PROP_DESC(CSS_IRQ_TZC, GIC_HIGHEST_SEC_PRIORITY, grp, \ |
| 53 | GIC_INTR_CFG_LEVEL), \ |
| 54 | INTR_PROP_DESC(CSS_IRQ_TZ_WDOG, GIC_HIGHEST_SEC_PRIORITY, grp, \ |
| 55 | GIC_INTR_CFG_LEVEL), \ |
| 56 | INTR_PROP_DESC(CSS_IRQ_SEC_SYS_TIMER, GIC_HIGHEST_SEC_PRIORITY, grp, \ |
| 57 | GIC_INTR_CFG_LEVEL) |
Achin Gupta | 1fa7eb6 | 2015-11-03 14:18:34 +0000 | [diff] [blame] | 58 | |
Soby Mathew | 1ced6b8 | 2017-06-12 12:37:10 +0100 | [diff] [blame] | 59 | #if CSS_USE_SCMI_SDS_DRIVER |
| 60 | /* Memory region for shared data storage */ |
| 61 | #define PLAT_ARM_SDS_MEM_BASE ARM_SHARED_RAM_BASE |
| 62 | #define PLAT_ARM_SDS_MEM_SIZE_MAX 0xDC0 /* 3520 bytes */ |
Achin Gupta | 1fa7eb6 | 2015-11-03 14:18:34 +0000 | [diff] [blame] | 63 | /* |
Soby Mathew | 1ced6b8 | 2017-06-12 12:37:10 +0100 | [diff] [blame] | 64 | * The SCMI Channel is placed right after the SDS region |
Soby Mathew | ea26bad | 2016-11-14 12:25:45 +0000 | [diff] [blame] | 65 | */ |
Soby Mathew | 1ced6b8 | 2017-06-12 12:37:10 +0100 | [diff] [blame] | 66 | #define CSS_SCMI_PAYLOAD_BASE (PLAT_ARM_SDS_MEM_BASE + PLAT_ARM_SDS_MEM_SIZE_MAX) |
| 67 | #define CSS_SCMI_MHU_DB_REG_OFF MHU_CPU_INTR_S_SET_OFFSET |
| 68 | |
| 69 | /* Trusted mailbox base address common to all CSS */ |
| 70 | /* If SDS is present, then mailbox is at top of SRAM */ |
| 71 | #define PLAT_ARM_TRUSTED_MAILBOX_BASE (ARM_SHARED_RAM_BASE + ARM_SHARED_RAM_SIZE - 0x8) |
Soby Mathew | ea26bad | 2016-11-14 12:25:45 +0000 | [diff] [blame] | 72 | |
Soby Mathew | 1ced6b8 | 2017-06-12 12:37:10 +0100 | [diff] [blame] | 73 | /* Number of retries for SCP_RAM_READY flag */ |
| 74 | #define CSS_SCP_READY_10US_RETRIES 1000000 /* Effective timeout of 10000 ms */ |
| 75 | |
| 76 | #else |
Soby Mathew | ea26bad | 2016-11-14 12:25:45 +0000 | [diff] [blame] | 77 | /* |
Sandrine Bailleux | 761bba3 | 2015-04-29 13:02:46 +0100 | [diff] [blame] | 78 | * SCP <=> AP boot configuration |
| 79 | * |
| 80 | * The SCP/AP boot configuration is a 32-bit word located at a known offset from |
Vikram Kanigiri | 7208419 | 2016-02-08 16:29:30 +0000 | [diff] [blame] | 81 | * the start of the Trusted SRAM. |
Sandrine Bailleux | 761bba3 | 2015-04-29 13:02:46 +0100 | [diff] [blame] | 82 | * |
| 83 | * Note that the value stored at this address is only valid at boot time, before |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 84 | * the SCP_BL2 image is transferred to SCP. |
Sandrine Bailleux | 761bba3 | 2015-04-29 13:02:46 +0100 | [diff] [blame] | 85 | */ |
Vikram Kanigiri | 7208419 | 2016-02-08 16:29:30 +0000 | [diff] [blame] | 86 | #define SCP_BOOT_CFG_ADDR PLAT_CSS_SCP_COM_SHARED_MEM_BASE |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 87 | |
Soby Mathew | 1ced6b8 | 2017-06-12 12:37:10 +0100 | [diff] [blame] | 88 | /* Trusted mailbox base address common to all CSS */ |
| 89 | /* If SDS is not present, then the mailbox is at the bottom of SRAM */ |
| 90 | #define PLAT_ARM_TRUSTED_MAILBOX_BASE ARM_TRUSTED_SRAM_BASE |
| 91 | |
| 92 | #endif /* CSS_USE_SCMI_SDS_DRIVER */ |
| 93 | |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 94 | #define CSS_MAP_DEVICE MAP_REGION_FLAT( \ |
| 95 | CSS_DEVICE_BASE, \ |
| 96 | CSS_DEVICE_SIZE, \ |
| 97 | MT_DEVICE | MT_RW | MT_SECURE) |
| 98 | |
Soby Mathew | cbafd7a | 2016-11-14 12:44:32 +0000 | [diff] [blame] | 99 | #define CSS_MAP_NSRAM MAP_REGION_FLAT( \ |
| 100 | NSRAM_BASE, \ |
| 101 | NSRAM_SIZE, \ |
Chris Kay | 6449182 | 2018-05-10 14:43:28 +0100 | [diff] [blame] | 102 | MT_DEVICE | MT_RW | MT_NS) |
Soby Mathew | cbafd7a | 2016-11-14 12:44:32 +0000 | [diff] [blame] | 103 | |
Daniel Boulby | 45a2c9e | 2018-07-06 16:54:44 +0100 | [diff] [blame] | 104 | #if defined(IMAGE_BL2U) |
| 105 | #define CSS_MAP_SCP_BL2U MAP_REGION_FLAT( \ |
| 106 | SCP_BL2U_BASE, \ |
| 107 | SCP_BL2U_LIMIT \ |
| 108 | - SCP_BL2U_BASE,\ |
| 109 | MT_RW_DATA | MT_SECURE) |
| 110 | #endif |
| 111 | |
Vikram Kanigiri | f79d150 | 2015-11-12 17:22:16 +0000 | [diff] [blame] | 112 | /* Platform ID address */ |
| 113 | #define SSC_VERSION_OFFSET 0x040 |
| 114 | |
| 115 | #define SSC_VERSION_CONFIG_SHIFT 28 |
| 116 | #define SSC_VERSION_MAJOR_REV_SHIFT 24 |
| 117 | #define SSC_VERSION_MINOR_REV_SHIFT 20 |
| 118 | #define SSC_VERSION_DESIGNER_ID_SHIFT 12 |
| 119 | #define SSC_VERSION_PART_NUM_SHIFT 0x0 |
| 120 | #define SSC_VERSION_CONFIG_MASK 0xf |
| 121 | #define SSC_VERSION_MAJOR_REV_MASK 0xf |
| 122 | #define SSC_VERSION_MINOR_REV_MASK 0xf |
| 123 | #define SSC_VERSION_DESIGNER_ID_MASK 0xff |
| 124 | #define SSC_VERSION_PART_NUM_MASK 0xfff |
| 125 | |
dp-arm | b71946b | 2017-02-08 12:16:42 +0000 | [diff] [blame] | 126 | /* SSC debug configuration registers */ |
| 127 | #define SSC_DBGCFG_SET 0x14 |
| 128 | #define SSC_DBGCFG_CLR 0x18 |
| 129 | |
| 130 | #define SPIDEN_INT_CLR_SHIFT 6 |
| 131 | #define SPIDEN_SEL_SET_SHIFT 7 |
| 132 | |
Vikram Kanigiri | f79d150 | 2015-11-12 17:22:16 +0000 | [diff] [blame] | 133 | #ifndef __ASSEMBLY__ |
| 134 | |
| 135 | /* SSC_VERSION related accessors */ |
| 136 | |
| 137 | /* Returns the part number of the platform */ |
| 138 | #define GET_SSC_VERSION_PART_NUM(val) \ |
| 139 | (((val) >> SSC_VERSION_PART_NUM_SHIFT) & \ |
| 140 | SSC_VERSION_PART_NUM_MASK) |
| 141 | |
| 142 | /* Returns the configuration number of the platform */ |
| 143 | #define GET_SSC_VERSION_CONFIG(val) \ |
| 144 | (((val) >> SSC_VERSION_CONFIG_SHIFT) & \ |
| 145 | SSC_VERSION_CONFIG_MASK) |
| 146 | |
| 147 | #endif /* __ASSEMBLY__ */ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 148 | |
| 149 | /************************************************************************* |
| 150 | * Required platform porting definitions common to all |
| 151 | * ARM Compute SubSystems (CSS) |
| 152 | ************************************************************************/ |
| 153 | |
| 154 | /* |
Vikram Kanigiri | 18a1731 | 2016-01-14 14:26:27 +0000 | [diff] [blame] | 155 | * The loading of SCP images(SCP_BL2 or SCP_BL2U) is done if there |
| 156 | * respective base addresses are defined (i.e SCP_BL2_BASE, SCP_BL2U_BASE). |
| 157 | * Hence, `CSS_LOAD_SCP_IMAGES` needs to be set to 1 if BL2 needs to load |
| 158 | * an SCP_BL2/SCP_BL2U image. |
| 159 | */ |
| 160 | #if CSS_LOAD_SCP_IMAGES |
Soby Mathew | 2f6cac4 | 2017-06-13 18:00:53 +0100 | [diff] [blame] | 161 | |
| 162 | #if ARM_BL31_IN_DRAM |
| 163 | #error "SCP_BL2 is not expected to be loaded by BL2 for ARM_BL31_IN_DRAM config" |
| 164 | #endif |
| 165 | |
Vikram Kanigiri | 18a1731 | 2016-01-14 14:26:27 +0000 | [diff] [blame] | 166 | /* |
Juan Castillo | a72b647 | 2015-12-10 15:49:17 +0000 | [diff] [blame] | 167 | * Load address of SCP_BL2 in CSS platform ports |
Soby Mathew | 2f6cac4 | 2017-06-13 18:00:53 +0100 | [diff] [blame] | 168 | * SCP_BL2 is loaded to the same place as BL31 but it shouldn't overwrite BL1 |
Soby Mathew | af14b46 | 2018-06-01 16:53:38 +0100 | [diff] [blame] | 169 | * rw data or BL2. Once SCP_BL2 is transferred to the SCP, it is discarded and |
| 170 | * BL31 is loaded over the top. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 171 | */ |
Soby Mathew | af14b46 | 2018-06-01 16:53:38 +0100 | [diff] [blame] | 172 | #define SCP_BL2_BASE (BL2_BASE - PLAT_CSS_MAX_SCP_BL2_SIZE) |
| 173 | #define SCP_BL2_LIMIT BL2_BASE |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 174 | |
Soby Mathew | af14b46 | 2018-06-01 16:53:38 +0100 | [diff] [blame] | 175 | #define SCP_BL2U_BASE (BL2_BASE - PLAT_CSS_MAX_SCP_BL2U_SIZE) |
| 176 | #define SCP_BL2U_LIMIT BL2_BASE |
Vikram Kanigiri | 18a1731 | 2016-01-14 14:26:27 +0000 | [diff] [blame] | 177 | #endif /* CSS_LOAD_SCP_IMAGES */ |
Yatharth Kochar | 736a3bf | 2015-10-11 14:14:55 +0100 | [diff] [blame] | 178 | |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 179 | /* Load address of Non-Secure Image for CSS platform ports */ |
Roberto Vargas | 550eb08 | 2018-01-05 16:00:05 +0000 | [diff] [blame] | 180 | #define PLAT_ARM_NS_IMAGE_OFFSET U(0xE0000000) |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 181 | |
| 182 | /* TZC related constants */ |
Soby Mathew | 9c708b5 | 2016-02-26 14:23:19 +0000 | [diff] [blame] | 183 | #define PLAT_ARM_TZC_FILTERS TZC_400_REGION_ATTR_FILTER_BIT_ALL |
Vikram Kanigiri | a2cee03 | 2015-07-31 16:35:05 +0100 | [diff] [blame] | 184 | |
Jeenu Viswambharan | 9cc4fc0 | 2016-08-04 09:43:15 +0100 | [diff] [blame] | 185 | /* |
| 186 | * Parsing of CPU and Cluster states, as returned by 'Get CSS Power State' SCP |
| 187 | * command |
| 188 | */ |
| 189 | #define CSS_CLUSTER_PWR_STATE_ON 0 |
| 190 | #define CSS_CLUSTER_PWR_STATE_OFF 3 |
| 191 | |
| 192 | #define CSS_CPU_PWR_STATE_ON 1 |
| 193 | #define CSS_CPU_PWR_STATE_OFF 0 |
| 194 | #define CSS_CPU_PWR_STATE(state, n) (((state) >> (n)) & 1) |
Soby Mathew | feac8fc | 2015-09-29 15:47:16 +0100 | [diff] [blame] | 195 | |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 196 | #endif /* __CSS_DEF_H__ */ |