xref: /rk3399_ARM-atf/include/plat/arm/css/common/css_def.h (revision ecf70f7bdbf79bd2923ec5b14b933ba4c8e3ee59)
1b4315306SDan Handley /*
2*ecf70f7bSVikram Kanigiri  * Copyright (c) 2015-2016, ARM Limited and Contributors. All rights reserved.
3b4315306SDan Handley  *
4b4315306SDan Handley  * Redistribution and use in source and binary forms, with or without
5b4315306SDan Handley  * modification, are permitted provided that the following conditions are met:
6b4315306SDan Handley  *
7b4315306SDan Handley  * Redistributions of source code must retain the above copyright notice, this
8b4315306SDan Handley  * list of conditions and the following disclaimer.
9b4315306SDan Handley  *
10b4315306SDan Handley  * Redistributions in binary form must reproduce the above copyright notice,
11b4315306SDan Handley  * this list of conditions and the following disclaimer in the documentation
12b4315306SDan Handley  * and/or other materials provided with the distribution.
13b4315306SDan Handley  *
14b4315306SDan Handley  * Neither the name of ARM nor the names of its contributors may be used
15b4315306SDan Handley  * to endorse or promote products derived from this software without specific
16b4315306SDan Handley  * prior written permission.
17b4315306SDan Handley  *
18b4315306SDan Handley  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19b4315306SDan Handley  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20b4315306SDan Handley  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21b4315306SDan Handley  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22b4315306SDan Handley  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23b4315306SDan Handley  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24b4315306SDan Handley  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25b4315306SDan Handley  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26b4315306SDan Handley  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27b4315306SDan Handley  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28b4315306SDan Handley  * POSSIBILITY OF SUCH DAMAGE.
29b4315306SDan Handley  */
30b4315306SDan Handley 
31b4315306SDan Handley #ifndef __CSS_DEF_H__
32b4315306SDan Handley #define __CSS_DEF_H__
33b4315306SDan Handley 
34b4315306SDan Handley #include <arm_def.h>
35b4315306SDan Handley #include <tzc400.h>
36b4315306SDan Handley 
37b4315306SDan Handley /*************************************************************************
38b4315306SDan Handley  * Definitions common to all ARM Compute SubSystems (CSS)
39b4315306SDan Handley  *************************************************************************/
40b4315306SDan Handley #define MHU_PAYLOAD_CACHED		0
41b4315306SDan Handley 
42b4315306SDan Handley #define NSROM_BASE			0x1f000000
43b4315306SDan Handley #define NSROM_SIZE			0x00001000
44b4315306SDan Handley 
45b4315306SDan Handley /* Following covers CSS Peripherals excluding NSROM and NSRAM  */
46b4315306SDan Handley #define CSS_DEVICE_BASE			0x20000000
47b4315306SDan Handley #define CSS_DEVICE_SIZE			0x0e000000
48b4315306SDan Handley 
49b4315306SDan Handley #define NSRAM_BASE			0x2e000000
50b4315306SDan Handley #define NSRAM_SIZE			0x00008000
51b4315306SDan Handley 
52436223deSYatharth Kochar /* System Security Control Registers */
53436223deSYatharth Kochar #define SSC_REG_BASE			0x2a420000
54436223deSYatharth Kochar #define SSC_GPRETN			(SSC_REG_BASE + 0x030)
55436223deSYatharth Kochar 
56b4315306SDan Handley /* The slave_bootsecure controls access to GPU, DMC and CS. */
57b4315306SDan Handley #define CSS_NIC400_SLAVE_BOOTSECURE	8
58b4315306SDan Handley 
59b4315306SDan Handley /* Interrupt handling constants */
60b4315306SDan Handley #define CSS_IRQ_MHU			69
61b4315306SDan Handley #define CSS_IRQ_GPU_SMMU_0		71
62b4315306SDan Handley #define CSS_IRQ_TZC			80
63b4315306SDan Handley #define CSS_IRQ_TZ_WDOG			86
64a7270d35SVikram Kanigiri #define CSS_IRQ_SEC_SYS_TIMER		91
65b4315306SDan Handley 
669255da5fSSandrine Bailleux /*
6727573c59SAchin Gupta  * Define a list of Group 1 Secure interrupts as per GICv3 terminology. On a
6827573c59SAchin Gupta  * GICv2 system or mode, the interrupts will be treated as Group 0 interrupts.
6927573c59SAchin Gupta  */
7027573c59SAchin Gupta #define CSS_G1S_IRQS			CSS_IRQ_MHU,		\
7127573c59SAchin Gupta 					CSS_IRQ_GPU_SMMU_0,	\
7227573c59SAchin Gupta 					CSS_IRQ_TZC,		\
7327573c59SAchin Gupta 					CSS_IRQ_TZ_WDOG,	\
7427573c59SAchin Gupta 					CSS_IRQ_SEC_SYS_TIMER
7527573c59SAchin Gupta 
7627573c59SAchin Gupta /*
779255da5fSSandrine Bailleux  * SCP <=> AP boot configuration
789255da5fSSandrine Bailleux  *
799255da5fSSandrine Bailleux  * The SCP/AP boot configuration is a 32-bit word located at a known offset from
809255da5fSSandrine Bailleux  * the start of the Trusted SRAM. Part of this configuration is which CPU is the
819255da5fSSandrine Bailleux  * primary, according to the shift and mask definitions below.
829255da5fSSandrine Bailleux  *
839255da5fSSandrine Bailleux  * Note that the value stored at this address is only valid at boot time, before
84f59821d5SJuan Castillo  * the SCP_BL2 image is transferred to SCP.
859255da5fSSandrine Bailleux  */
869255da5fSSandrine Bailleux #define SCP_BOOT_CFG_ADDR		(ARM_TRUSTED_SRAM_BASE + 0x80)
87b4315306SDan Handley #define PRIMARY_CPU_SHIFT		8
8819af6fceSSoby Mathew #define PRIMARY_CPU_BIT_WIDTH		4
89b4315306SDan Handley 
90fe55612bSSandrine Bailleux /*
91fe55612bSSandrine Bailleux  * Base address of the first memory region used for communication between AP
92fe55612bSSandrine Bailleux  * and SCP. Used by the BOM and SCPI protocols.
93fe55612bSSandrine Bailleux  *
94fe55612bSSandrine Bailleux  * Note that this is located at the same address as SCP_BOOT_CFG_ADDR, which
95fe55612bSSandrine Bailleux  * means the SCP/AP configuration data gets overwritten when the AP initiates
96fe55612bSSandrine Bailleux  * communication with the SCP.
97fe55612bSSandrine Bailleux  */
98fe55612bSSandrine Bailleux #define SCP_COM_SHARED_MEM_BASE		(ARM_TRUSTED_SRAM_BASE + 0x80)
99b4315306SDan Handley 
100b4315306SDan Handley #define CSS_MAP_DEVICE			MAP_REGION_FLAT(		\
101b4315306SDan Handley 						CSS_DEVICE_BASE,	\
102b4315306SDan Handley 						CSS_DEVICE_SIZE,	\
103b4315306SDan Handley 						MT_DEVICE | MT_RW | MT_SECURE)
104b4315306SDan Handley 
105b4315306SDan Handley 
106b4315306SDan Handley /*************************************************************************
107b4315306SDan Handley  * Required platform porting definitions common to all
108b4315306SDan Handley  * ARM Compute SubSystems (CSS)
109b4315306SDan Handley  ************************************************************************/
110b4315306SDan Handley 
111b4315306SDan Handley /*
112f59821d5SJuan Castillo  * Load address of SCP_BL2 in CSS platform ports
113d178637dSJuan Castillo  * SCP_BL2 is loaded to the same place as BL31.  Once SCP_BL2 is transferred to the
114d178637dSJuan Castillo  * SCP, it is discarded and BL31 is loaded over the top.
115b4315306SDan Handley  */
116f59821d5SJuan Castillo #define SCP_BL2_BASE			BL31_BASE
117b4315306SDan Handley 
118436223deSYatharth Kochar #define SCP_BL2U_BASE			BL31_BASE
119436223deSYatharth Kochar 
120b4315306SDan Handley #define PLAT_ARM_SHARED_RAM_CACHED	MHU_PAYLOAD_CACHED
121b4315306SDan Handley 
122b4315306SDan Handley /* Load address of Non-Secure Image for CSS platform ports */
123b4315306SDan Handley #define PLAT_ARM_NS_IMAGE_OFFSET	0xE0000000
124b4315306SDan Handley 
125b4315306SDan Handley /* TZC related constants */
126b4315306SDan Handley #define PLAT_ARM_TZC_FILTERS		REG_ATTR_FILTER_BIT_ALL
1274b1439c5SVikram Kanigiri 
128785fb92bSSoby Mathew /* Trusted mailbox base address common to all CSS */
129785fb92bSSoby Mathew #define PLAT_ARM_TRUSTED_MAILBOX_BASE	ARM_TRUSTED_SRAM_BASE
130785fb92bSSoby Mathew 
131785fb92bSSoby Mathew 
132b4315306SDan Handley #endif /* __CSS_DEF_H__ */
133