Home | History | Annotate | Download | only in common
      1 /*
      2  * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved.
      3  *
      4  * SPDX-License-Identifier: BSD-3-Clause
      5  */
      6 
      7 #ifndef __CSS_DEF_H__
      8 #define __CSS_DEF_H__
      9 
     10 #include <arm_def.h>
     11 #include <gic_common.h>
     12 #include <interrupt_props.h>
     13 #include <tzc400.h>
     14 
     15 /*************************************************************************
     16  * Definitions common to all ARM Compute SubSystems (CSS)
     17  *************************************************************************/
     18 #define NSROM_BASE			0x1f000000
     19 #define NSROM_SIZE			0x00001000
     20 
     21 /* Following covers CSS Peripherals excluding NSROM and NSRAM  */
     22 #define CSS_DEVICE_BASE			0x20000000
     23 #define CSS_DEVICE_SIZE			0x0e000000
     24 
     25 #define NSRAM_BASE			0x2e000000
     26 #define NSRAM_SIZE			0x00008000
     27 
     28 /* System Security Control Registers */
     29 #define SSC_REG_BASE			0x2a420000
     30 #define SSC_GPRETN			(SSC_REG_BASE + 0x030)
     31 
     32 /* The slave_bootsecure controls access to GPU, DMC and CS. */
     33 #define CSS_NIC400_SLAVE_BOOTSECURE	8
     34 
     35 /* Interrupt handling constants */
     36 #define CSS_IRQ_MHU			69
     37 #define CSS_IRQ_GPU_SMMU_0		71
     38 #define CSS_IRQ_TZC			80
     39 #define CSS_IRQ_TZ_WDOG			86
     40 #define CSS_IRQ_SEC_SYS_TIMER		91
     41 
     42 /* MHU register offsets */
     43 #define MHU_CPU_INTR_S_SET_OFFSET	0x308
     44 
     45 /*
     46  * Define a list of Group 1 Secure interrupt properties as per GICv3
     47  * terminology. On a GICv2 system or mode, the interrupts will be treated as
     48  * Group 0 interrupts.
     49  */
     50 #define CSS_G1S_IRQ_PROPS(grp) \
     51 	INTR_PROP_DESC(CSS_IRQ_MHU, GIC_HIGHEST_SEC_PRIORITY, grp, \
     52 			GIC_INTR_CFG_LEVEL), \
     53 	INTR_PROP_DESC(CSS_IRQ_GPU_SMMU_0, GIC_HIGHEST_SEC_PRIORITY, grp, \
     54 			GIC_INTR_CFG_LEVEL), \
     55 	INTR_PROP_DESC(CSS_IRQ_TZC, GIC_HIGHEST_SEC_PRIORITY, grp, \
     56 			GIC_INTR_CFG_LEVEL), \
     57 	INTR_PROP_DESC(CSS_IRQ_TZ_WDOG, GIC_HIGHEST_SEC_PRIORITY, grp, \
     58 			GIC_INTR_CFG_LEVEL), \
     59 	INTR_PROP_DESC(CSS_IRQ_SEC_SYS_TIMER, GIC_HIGHEST_SEC_PRIORITY, grp, \
     60 			GIC_INTR_CFG_LEVEL)
     61 
     62 #if CSS_USE_SCMI_SDS_DRIVER
     63 /* Memory region for shared data storage */
     64 #define PLAT_ARM_SDS_MEM_BASE		ARM_SHARED_RAM_BASE
     65 #define PLAT_ARM_SDS_MEM_SIZE_MAX	0xDC0 /* 3520 bytes */
     66 /*
     67  * The SCMI Channel is placed right after the SDS region
     68  */
     69 #define CSS_SCMI_PAYLOAD_BASE		(PLAT_ARM_SDS_MEM_BASE + PLAT_ARM_SDS_MEM_SIZE_MAX)
     70 #define CSS_SCMI_MHU_DB_REG_OFF		MHU_CPU_INTR_S_SET_OFFSET
     71 
     72 /* Trusted mailbox base address common to all CSS */
     73 /* If SDS is present, then mailbox is at top of SRAM */
     74 #define PLAT_ARM_TRUSTED_MAILBOX_BASE	(ARM_SHARED_RAM_BASE + ARM_SHARED_RAM_SIZE - 0x8)
     75 
     76 /* Number of retries for SCP_RAM_READY flag */
     77 #define CSS_SCP_READY_10US_RETRIES		1000000 /* Effective timeout of 10000 ms */
     78 
     79 #else
     80 /*
     81  * SCP <=> AP boot configuration
     82  *
     83  * The SCP/AP boot configuration is a 32-bit word located at a known offset from
     84  * the start of the Trusted SRAM.
     85  *
     86  * Note that the value stored at this address is only valid at boot time, before
     87  * the SCP_BL2 image is transferred to SCP.
     88  */
     89 #define SCP_BOOT_CFG_ADDR		PLAT_CSS_SCP_COM_SHARED_MEM_BASE
     90 
     91 /* Trusted mailbox base address common to all CSS */
     92 /* If SDS is not present, then the mailbox is at the bottom of SRAM */
     93 #define PLAT_ARM_TRUSTED_MAILBOX_BASE	ARM_TRUSTED_SRAM_BASE
     94 
     95 #endif /* CSS_USE_SCMI_SDS_DRIVER */
     96 
     97 #define CSS_MAP_DEVICE			MAP_REGION_FLAT(		\
     98 						CSS_DEVICE_BASE,	\
     99 						CSS_DEVICE_SIZE,	\
    100 						MT_DEVICE | MT_RW | MT_SECURE)
    101 
    102 #define CSS_MAP_NSRAM			MAP_REGION_FLAT(		\
    103 						NSRAM_BASE,	\
    104 						NSRAM_SIZE,	\
    105 						MT_DEVICE | MT_RW | MT_SECURE)
    106 
    107 /* Platform ID address */
    108 #define SSC_VERSION_OFFSET			0x040
    109 
    110 #define SSC_VERSION_CONFIG_SHIFT		28
    111 #define SSC_VERSION_MAJOR_REV_SHIFT		24
    112 #define SSC_VERSION_MINOR_REV_SHIFT		20
    113 #define SSC_VERSION_DESIGNER_ID_SHIFT		12
    114 #define SSC_VERSION_PART_NUM_SHIFT		0x0
    115 #define SSC_VERSION_CONFIG_MASK			0xf
    116 #define SSC_VERSION_MAJOR_REV_MASK		0xf
    117 #define SSC_VERSION_MINOR_REV_MASK		0xf
    118 #define SSC_VERSION_DESIGNER_ID_MASK		0xff
    119 #define SSC_VERSION_PART_NUM_MASK		0xfff
    120 
    121 /* SSC debug configuration registers */
    122 #define SSC_DBGCFG_SET		0x14
    123 #define SSC_DBGCFG_CLR		0x18
    124 
    125 #define SPIDEN_INT_CLR_SHIFT	6
    126 #define SPIDEN_SEL_SET_SHIFT	7
    127 
    128 #ifndef __ASSEMBLY__
    129 
    130 /* SSC_VERSION related accessors */
    131 
    132 /* Returns the part number of the platform */
    133 #define GET_SSC_VERSION_PART_NUM(val)				\
    134 		(((val) >> SSC_VERSION_PART_NUM_SHIFT) &	\
    135 		SSC_VERSION_PART_NUM_MASK)
    136 
    137 /* Returns the configuration number of the platform */
    138 #define GET_SSC_VERSION_CONFIG(val)				\
    139 		(((val) >> SSC_VERSION_CONFIG_SHIFT) &		\
    140 		SSC_VERSION_CONFIG_MASK)
    141 
    142 #endif /* __ASSEMBLY__ */
    143 
    144 /*************************************************************************
    145  * Required platform porting definitions common to all
    146  * ARM Compute SubSystems (CSS)
    147  ************************************************************************/
    148 
    149 /*
    150  * The loading of SCP images(SCP_BL2 or SCP_BL2U) is done if there
    151  * respective base addresses are defined (i.e SCP_BL2_BASE, SCP_BL2U_BASE).
    152  * Hence, `CSS_LOAD_SCP_IMAGES` needs to be set to 1 if BL2 needs to load
    153  * an SCP_BL2/SCP_BL2U image.
    154  */
    155 #if CSS_LOAD_SCP_IMAGES
    156 
    157 #if ARM_BL31_IN_DRAM
    158 #error "SCP_BL2 is not expected to be loaded by BL2 for ARM_BL31_IN_DRAM config"
    159 #endif
    160 
    161 /*
    162  * Load address of SCP_BL2 in CSS platform ports
    163  * SCP_BL2 is loaded to the same place as BL31 but it shouldn't overwrite BL1
    164  * rw data.  Once SCP_BL2 is transferred to the SCP, it is discarded and BL31
    165  * is loaded over the top.
    166  */
    167 #define SCP_BL2_BASE			(BL1_RW_BASE - PLAT_CSS_MAX_SCP_BL2_SIZE)
    168 #define SCP_BL2_LIMIT			BL1_RW_BASE
    169 
    170 #define SCP_BL2U_BASE			(BL1_RW_BASE - PLAT_CSS_MAX_SCP_BL2U_SIZE)
    171 #define SCP_BL2U_LIMIT			BL1_RW_BASE
    172 #endif /* CSS_LOAD_SCP_IMAGES */
    173 
    174 /* Load address of Non-Secure Image for CSS platform ports */
    175 #define PLAT_ARM_NS_IMAGE_OFFSET	0xE0000000
    176 
    177 /* TZC related constants */
    178 #define PLAT_ARM_TZC_FILTERS		TZC_400_REGION_ATTR_FILTER_BIT_ALL
    179 
    180 /*
    181  * Parsing of CPU and Cluster states, as returned by 'Get CSS Power State' SCP
    182  * command
    183  */
    184 #define CSS_CLUSTER_PWR_STATE_ON	0
    185 #define CSS_CLUSTER_PWR_STATE_OFF	3
    186 
    187 #define CSS_CPU_PWR_STATE_ON		1
    188 #define CSS_CPU_PWR_STATE_OFF		0
    189 #define CSS_CPU_PWR_STATE(state, n)	(((state) >> (n)) & 1)
    190 
    191 #endif /* __CSS_DEF_H__ */
    192