xref: /rk3399_ARM-atf/include/plat/arm/css/common/css_def.h (revision d323af9e3d903d981b42f954844a95a6bfef91ab)
1b4315306SDan Handley /*
2c04a3b6cSSoby Mathew  * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved.
3b4315306SDan Handley  *
482cb2c1aSdp-arm  * SPDX-License-Identifier: BSD-3-Clause
5b4315306SDan Handley  */
6b4315306SDan Handley 
7b4315306SDan Handley #ifndef __CSS_DEF_H__
8b4315306SDan Handley #define __CSS_DEF_H__
9b4315306SDan Handley 
10b4315306SDan Handley #include <arm_def.h>
11b2c363b1SJeenu Viswambharan #include <gic_common.h>
12b2c363b1SJeenu Viswambharan #include <interrupt_props.h>
13b4315306SDan Handley #include <tzc400.h>
14b4315306SDan Handley 
15b4315306SDan Handley /*************************************************************************
16b4315306SDan Handley  * Definitions common to all ARM Compute SubSystems (CSS)
17b4315306SDan Handley  *************************************************************************/
18b4315306SDan Handley #define NSROM_BASE			0x1f000000
19b4315306SDan Handley #define NSROM_SIZE			0x00001000
20b4315306SDan Handley 
21b4315306SDan Handley /* Following covers CSS Peripherals excluding NSROM and NSRAM  */
22b4315306SDan Handley #define CSS_DEVICE_BASE			0x20000000
23b4315306SDan Handley #define CSS_DEVICE_SIZE			0x0e000000
24b4315306SDan Handley 
25436223deSYatharth Kochar /* System Security Control Registers */
26436223deSYatharth Kochar #define SSC_REG_BASE			0x2a420000
27436223deSYatharth Kochar #define SSC_GPRETN			(SSC_REG_BASE + 0x030)
28436223deSYatharth Kochar 
29b4315306SDan Handley /* The slave_bootsecure controls access to GPU, DMC and CS. */
30b4315306SDan Handley #define CSS_NIC400_SLAVE_BOOTSECURE	8
31b4315306SDan Handley 
32b4315306SDan Handley /* Interrupt handling constants */
33b4315306SDan Handley #define CSS_IRQ_MHU			69
34b4315306SDan Handley #define CSS_IRQ_GPU_SMMU_0		71
35b4315306SDan Handley #define CSS_IRQ_TZC			80
36b4315306SDan Handley #define CSS_IRQ_TZ_WDOG			86
37a7270d35SVikram Kanigiri #define CSS_IRQ_SEC_SYS_TIMER		91
38b4315306SDan Handley 
3918e279ebSSoby Mathew /* MHU register offsets */
4018e279ebSSoby Mathew #define MHU_CPU_INTR_S_SET_OFFSET	0x308
4118e279ebSSoby Mathew 
429255da5fSSandrine Bailleux /*
43b2c363b1SJeenu Viswambharan  * Define a list of Group 1 Secure interrupt properties as per GICv3
44b2c363b1SJeenu Viswambharan  * terminology. On a GICv2 system or mode, the interrupts will be treated as
45b2c363b1SJeenu Viswambharan  * Group 0 interrupts.
4627573c59SAchin Gupta  */
47b2c363b1SJeenu Viswambharan #define CSS_G1S_IRQ_PROPS(grp) \
48b2c363b1SJeenu Viswambharan 	INTR_PROP_DESC(CSS_IRQ_MHU, GIC_HIGHEST_SEC_PRIORITY, grp, \
49b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_LEVEL), \
50b2c363b1SJeenu Viswambharan 	INTR_PROP_DESC(CSS_IRQ_GPU_SMMU_0, GIC_HIGHEST_SEC_PRIORITY, grp, \
51b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_LEVEL), \
52b2c363b1SJeenu Viswambharan 	INTR_PROP_DESC(CSS_IRQ_TZC, GIC_HIGHEST_SEC_PRIORITY, grp, \
53b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_LEVEL), \
54b2c363b1SJeenu Viswambharan 	INTR_PROP_DESC(CSS_IRQ_TZ_WDOG, GIC_HIGHEST_SEC_PRIORITY, grp, \
55b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_LEVEL), \
56b2c363b1SJeenu Viswambharan 	INTR_PROP_DESC(CSS_IRQ_SEC_SYS_TIMER, GIC_HIGHEST_SEC_PRIORITY, grp, \
57b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_LEVEL)
5827573c59SAchin Gupta 
5918e279ebSSoby Mathew #if CSS_USE_SCMI_SDS_DRIVER
6018e279ebSSoby Mathew /* Memory region for shared data storage */
6118e279ebSSoby Mathew #define PLAT_ARM_SDS_MEM_BASE		ARM_SHARED_RAM_BASE
6218e279ebSSoby Mathew #define PLAT_ARM_SDS_MEM_SIZE_MAX	0xDC0 /* 3520 bytes */
6327573c59SAchin Gupta /*
6418e279ebSSoby Mathew  * The SCMI Channel is placed right after the SDS region
65c04a3b6cSSoby Mathew  */
6618e279ebSSoby Mathew #define CSS_SCMI_PAYLOAD_BASE		(PLAT_ARM_SDS_MEM_BASE + PLAT_ARM_SDS_MEM_SIZE_MAX)
6718e279ebSSoby Mathew #define CSS_SCMI_MHU_DB_REG_OFF		MHU_CPU_INTR_S_SET_OFFSET
68c04a3b6cSSoby Mathew 
6918e279ebSSoby Mathew /* Trusted mailbox base address common to all CSS */
7018e279ebSSoby Mathew /* If SDS is present, then mailbox is at top of SRAM */
7118e279ebSSoby Mathew #define PLAT_ARM_TRUSTED_MAILBOX_BASE	(ARM_SHARED_RAM_BASE + ARM_SHARED_RAM_SIZE - 0x8)
7218e279ebSSoby Mathew 
7318e279ebSSoby Mathew /* Number of retries for SCP_RAM_READY flag */
7418e279ebSSoby Mathew #define CSS_SCP_READY_10US_RETRIES		1000000 /* Effective timeout of 10000 ms */
7518e279ebSSoby Mathew 
7618e279ebSSoby Mathew #else
77c04a3b6cSSoby Mathew /*
789255da5fSSandrine Bailleux  * SCP <=> AP boot configuration
799255da5fSSandrine Bailleux  *
809255da5fSSandrine Bailleux  * The SCP/AP boot configuration is a 32-bit word located at a known offset from
818e083ecdSVikram Kanigiri  * the start of the Trusted SRAM.
829255da5fSSandrine Bailleux  *
839255da5fSSandrine Bailleux  * Note that the value stored at this address is only valid at boot time, before
84f59821d5SJuan Castillo  * the SCP_BL2 image is transferred to SCP.
859255da5fSSandrine Bailleux  */
868e083ecdSVikram Kanigiri #define SCP_BOOT_CFG_ADDR		PLAT_CSS_SCP_COM_SHARED_MEM_BASE
87b4315306SDan Handley 
8818e279ebSSoby Mathew /* Trusted mailbox base address common to all CSS */
8918e279ebSSoby Mathew /* If SDS is not present, then the mailbox is at the bottom of SRAM */
9018e279ebSSoby Mathew #define PLAT_ARM_TRUSTED_MAILBOX_BASE	ARM_TRUSTED_SRAM_BASE
9118e279ebSSoby Mathew 
9218e279ebSSoby Mathew #endif /* CSS_USE_SCMI_SDS_DRIVER */
9318e279ebSSoby Mathew 
94b4315306SDan Handley #define CSS_MAP_DEVICE			MAP_REGION_FLAT(		\
95b4315306SDan Handley 						CSS_DEVICE_BASE,	\
96b4315306SDan Handley 						CSS_DEVICE_SIZE,	\
97b4315306SDan Handley 						MT_DEVICE | MT_RW | MT_SECURE)
98b4315306SDan Handley 
9940111d44SSoby Mathew #define CSS_MAP_NSRAM			MAP_REGION_FLAT(		\
10040111d44SSoby Mathew 						NSRAM_BASE,	\
10140111d44SSoby Mathew 						NSRAM_SIZE,	\
102d0223211SChris Kay 						MT_DEVICE | MT_RW | MT_NS)
10340111d44SSoby Mathew 
104*d323af9eSDaniel Boulby #if defined(IMAGE_BL2U)
105*d323af9eSDaniel Boulby #define CSS_MAP_SCP_BL2U		MAP_REGION_FLAT(		\
106*d323af9eSDaniel Boulby 						SCP_BL2U_BASE,		\
107*d323af9eSDaniel Boulby 						SCP_BL2U_LIMIT		\
108*d323af9eSDaniel Boulby 							- SCP_BL2U_BASE,\
109*d323af9eSDaniel Boulby 						MT_RW_DATA | MT_SECURE)
110*d323af9eSDaniel Boulby #endif
111*d323af9eSDaniel Boulby 
112421295a0SVikram Kanigiri /* Platform ID address */
113421295a0SVikram Kanigiri #define SSC_VERSION_OFFSET			0x040
114421295a0SVikram Kanigiri 
115421295a0SVikram Kanigiri #define SSC_VERSION_CONFIG_SHIFT		28
116421295a0SVikram Kanigiri #define SSC_VERSION_MAJOR_REV_SHIFT		24
117421295a0SVikram Kanigiri #define SSC_VERSION_MINOR_REV_SHIFT		20
118421295a0SVikram Kanigiri #define SSC_VERSION_DESIGNER_ID_SHIFT		12
119421295a0SVikram Kanigiri #define SSC_VERSION_PART_NUM_SHIFT		0x0
120421295a0SVikram Kanigiri #define SSC_VERSION_CONFIG_MASK			0xf
121421295a0SVikram Kanigiri #define SSC_VERSION_MAJOR_REV_MASK		0xf
122421295a0SVikram Kanigiri #define SSC_VERSION_MINOR_REV_MASK		0xf
123421295a0SVikram Kanigiri #define SSC_VERSION_DESIGNER_ID_MASK		0xff
124421295a0SVikram Kanigiri #define SSC_VERSION_PART_NUM_MASK		0xfff
125421295a0SVikram Kanigiri 
12609fad498Sdp-arm /* SSC debug configuration registers */
12709fad498Sdp-arm #define SSC_DBGCFG_SET		0x14
12809fad498Sdp-arm #define SSC_DBGCFG_CLR		0x18
12909fad498Sdp-arm 
13009fad498Sdp-arm #define SPIDEN_INT_CLR_SHIFT	6
13109fad498Sdp-arm #define SPIDEN_SEL_SET_SHIFT	7
13209fad498Sdp-arm 
133421295a0SVikram Kanigiri #ifndef __ASSEMBLY__
134421295a0SVikram Kanigiri 
135421295a0SVikram Kanigiri /* SSC_VERSION related accessors */
136421295a0SVikram Kanigiri 
137421295a0SVikram Kanigiri /* Returns the part number of the platform */
138421295a0SVikram Kanigiri #define GET_SSC_VERSION_PART_NUM(val)				\
139421295a0SVikram Kanigiri 		(((val) >> SSC_VERSION_PART_NUM_SHIFT) &	\
140421295a0SVikram Kanigiri 		SSC_VERSION_PART_NUM_MASK)
141421295a0SVikram Kanigiri 
142421295a0SVikram Kanigiri /* Returns the configuration number of the platform */
143421295a0SVikram Kanigiri #define GET_SSC_VERSION_CONFIG(val)				\
144421295a0SVikram Kanigiri 		(((val) >> SSC_VERSION_CONFIG_SHIFT) &		\
145421295a0SVikram Kanigiri 		SSC_VERSION_CONFIG_MASK)
146421295a0SVikram Kanigiri 
147421295a0SVikram Kanigiri #endif /* __ASSEMBLY__ */
148b4315306SDan Handley 
149b4315306SDan Handley /*************************************************************************
150b4315306SDan Handley  * Required platform porting definitions common to all
151b4315306SDan Handley  * ARM Compute SubSystems (CSS)
152b4315306SDan Handley  ************************************************************************/
153b4315306SDan Handley 
154b4315306SDan Handley /*
1557fb9a32dSVikram Kanigiri  * The loading of SCP images(SCP_BL2 or SCP_BL2U) is done if there
1567fb9a32dSVikram Kanigiri  * respective base addresses are defined (i.e SCP_BL2_BASE, SCP_BL2U_BASE).
1577fb9a32dSVikram Kanigiri  * Hence, `CSS_LOAD_SCP_IMAGES` needs to be set to 1 if BL2 needs to load
1587fb9a32dSVikram Kanigiri  * an SCP_BL2/SCP_BL2U image.
1597fb9a32dSVikram Kanigiri  */
1607fb9a32dSVikram Kanigiri #if CSS_LOAD_SCP_IMAGES
1611ea63d77SSoby Mathew 
1621ea63d77SSoby Mathew #if ARM_BL31_IN_DRAM
1631ea63d77SSoby Mathew #error "SCP_BL2 is not expected to be loaded by BL2 for ARM_BL31_IN_DRAM config"
1641ea63d77SSoby Mathew #endif
1651ea63d77SSoby Mathew 
1667fb9a32dSVikram Kanigiri /*
167f59821d5SJuan Castillo  * Load address of SCP_BL2 in CSS platform ports
1681ea63d77SSoby Mathew  * SCP_BL2 is loaded to the same place as BL31 but it shouldn't overwrite BL1
169c099cd39SSoby Mathew  * rw data or BL2.  Once SCP_BL2 is transferred to the SCP, it is discarded and
170c099cd39SSoby Mathew  * BL31 is loaded over the top.
171b4315306SDan Handley  */
172c099cd39SSoby Mathew #define SCP_BL2_BASE			(BL2_BASE - PLAT_CSS_MAX_SCP_BL2_SIZE)
173c099cd39SSoby Mathew #define SCP_BL2_LIMIT			BL2_BASE
174b4315306SDan Handley 
175c099cd39SSoby Mathew #define SCP_BL2U_BASE			(BL2_BASE - PLAT_CSS_MAX_SCP_BL2U_SIZE)
176c099cd39SSoby Mathew #define SCP_BL2U_LIMIT			BL2_BASE
1777fb9a32dSVikram Kanigiri #endif /* CSS_LOAD_SCP_IMAGES */
178436223deSYatharth Kochar 
179b4315306SDan Handley /* Load address of Non-Secure Image for CSS platform ports */
180638b034cSRoberto Vargas #define PLAT_ARM_NS_IMAGE_OFFSET	U(0xE0000000)
181b4315306SDan Handley 
182b4315306SDan Handley /* TZC related constants */
18357f78201SSoby Mathew #define PLAT_ARM_TZC_FILTERS		TZC_400_REGION_ATTR_FILTER_BIT_ALL
1844b1439c5SVikram Kanigiri 
1853cc17aaeSJeenu Viswambharan /*
1863cc17aaeSJeenu Viswambharan  * Parsing of CPU and Cluster states, as returned by 'Get CSS Power State' SCP
1873cc17aaeSJeenu Viswambharan  * command
1883cc17aaeSJeenu Viswambharan  */
1893cc17aaeSJeenu Viswambharan #define CSS_CLUSTER_PWR_STATE_ON	0
1903cc17aaeSJeenu Viswambharan #define CSS_CLUSTER_PWR_STATE_OFF	3
1913cc17aaeSJeenu Viswambharan 
1923cc17aaeSJeenu Viswambharan #define CSS_CPU_PWR_STATE_ON		1
1933cc17aaeSJeenu Viswambharan #define CSS_CPU_PWR_STATE_OFF		0
1943cc17aaeSJeenu Viswambharan #define CSS_CPU_PWR_STATE(state, n)	(((state) >> (n)) & 1)
195785fb92bSSoby Mathew 
196b4315306SDan Handley #endif /* __CSS_DEF_H__ */
197