xref: /rk3399_ARM-atf/include/plat/arm/common/arm_def.h (revision 4249423b5966636d2a1924e2052d35a37720fb86)
1b4315306SDan Handley /*
2eab1ed54SRakshit Goyal  * Copyright (c) 2015-2025, Arm Limited and Contributors. All rights reserved.
3b4315306SDan Handley  *
482cb2c1aSdp-arm  * SPDX-License-Identifier: BSD-3-Clause
5b4315306SDan Handley  */
61083b2b3SAntonio Nino Diaz #ifndef ARM_DEF_H
71083b2b3SAntonio Nino Diaz #define ARM_DEF_H
8b4315306SDan Handley 
909d40e0eSAntonio Nino Diaz #include <arch.h>
1009d40e0eSAntonio Nino Diaz #include <common/interrupt_props.h>
1109d40e0eSAntonio Nino Diaz #include <common/tbbr/tbbr_img_def.h>
1209d40e0eSAntonio Nino Diaz #include <drivers/arm/gic_common.h>
1309d40e0eSAntonio Nino Diaz #include <lib/utils_def.h>
1409d40e0eSAntonio Nino Diaz #include <lib/xlat_tables/xlat_tables_defs.h>
150f0fd499SRohit Mathew #include <plat/arm/board/common/rotpk/rotpk_def.h>
1653adebadSManish V Badarkhe #include <plat/arm/common/smccc_def.h>
1709d40e0eSAntonio Nino Diaz #include <plat/common/common_def.h>
18b4315306SDan Handley 
19b4315306SDan Handley /******************************************************************************
20b4315306SDan Handley  * Definitions common to all ARM standard platforms
21b4315306SDan Handley  *****************************************************************************/
22b4315306SDan Handley 
23d178637dSJuan Castillo /* Special value used to verify platform parameters from BL2 to BL31 */
24f21c6321SAntonio Nino Diaz #define ARM_BL31_PLAT_PARAM_VAL		ULL(0x0f1e2d3c4b5a6978)
25b4315306SDan Handley 
265b33ad17SDeepika Bhavnani #define ARM_SYSTEM_COUNT		U(1)
27b4315306SDan Handley 
28b4315306SDan Handley #define ARM_CACHE_WRITEBACK_SHIFT	6
29b4315306SDan Handley 
3038dce70fSSoby Mathew /*
3138dce70fSSoby Mathew  * Macros mapping the MPIDR Affinity levels to ARM Platform Power levels. The
3238dce70fSSoby Mathew  * power levels have a 1:1 mapping with the MPIDR affinity levels.
3338dce70fSSoby Mathew  */
3438dce70fSSoby Mathew #define ARM_PWR_LVL0		MPIDR_AFFLVL0
3538dce70fSSoby Mathew #define ARM_PWR_LVL1		MPIDR_AFFLVL1
365f3a6030SSoby Mathew #define ARM_PWR_LVL2		MPIDR_AFFLVL2
370e27faf4SChandni Cherukuri #define ARM_PWR_LVL3		MPIDR_AFFLVL3
3838dce70fSSoby Mathew 
3938dce70fSSoby Mathew /*
4038dce70fSSoby Mathew  *  Macros for local power states in ARM platforms encoded by State-ID field
4138dce70fSSoby Mathew  *  within the power-state parameter.
4238dce70fSSoby Mathew  */
4338dce70fSSoby Mathew /* Local power state for power domains in Run state. */
441083b2b3SAntonio Nino Diaz #define ARM_LOCAL_STATE_RUN	U(0)
4538dce70fSSoby Mathew /* Local power state for retention. Valid only for CPU power domains */
461083b2b3SAntonio Nino Diaz #define ARM_LOCAL_STATE_RET	U(1)
4738dce70fSSoby Mathew /* Local power state for OFF/power-down. Valid for CPU and cluster power
4838dce70fSSoby Mathew    domains */
491083b2b3SAntonio Nino Diaz #define ARM_LOCAL_STATE_OFF	U(2)
5038dce70fSSoby Mathew 
51b4315306SDan Handley /* Memory location options for TSP */
52b4315306SDan Handley #define ARM_TRUSTED_SRAM_ID		0
53b4315306SDan Handley #define ARM_TRUSTED_DRAM_ID		1
54b4315306SDan Handley #define ARM_DRAM_ID			2
55b4315306SDan Handley 
565fb061e7SGary Morrison #ifdef PLAT_ARM_TRUSTED_SRAM_BASE
5703b201c0Slaurenw-arm #define ARM_TRUSTED_SRAM_BASE		PLAT_ARM_TRUSTED_SRAM_BASE
5803b201c0Slaurenw-arm #else
59af6491f8SAntonio Nino Diaz #define ARM_TRUSTED_SRAM_BASE		UL(0x04000000)
605fb061e7SGary Morrison #endif /* PLAT_ARM_TRUSTED_SRAM_BASE */
6103b201c0Slaurenw-arm 
62b4315306SDan Handley #define ARM_SHARED_RAM_BASE		ARM_TRUSTED_SRAM_BASE
63af6491f8SAntonio Nino Diaz #define ARM_SHARED_RAM_SIZE		UL(0x00001000)	/* 4 KB */
64b4315306SDan Handley 
657a4a0707SAlexeiFedorov #if ENABLE_RME
667a4a0707SAlexeiFedorov /* Store level 0 GPT at the top of the Trusted SRAM */
677a4a0707SAlexeiFedorov #define ARM_L0_GPT_BASE			(ARM_TRUSTED_SRAM_BASE + \
687a4a0707SAlexeiFedorov 					 PLAT_ARM_TRUSTED_SRAM_SIZE - \
697a4a0707SAlexeiFedorov 					 ARM_L0_GPT_SIZE)
70aeec55c8SAlexeiFedorov #define ARM_L0_GPT_SIZE			UL(0x00002000)	/* 8 KB */
717a4a0707SAlexeiFedorov #else
727a4a0707SAlexeiFedorov #define ARM_L0_GPT_SIZE			UL(0)
737a4a0707SAlexeiFedorov #endif
747a4a0707SAlexeiFedorov 
75b4315306SDan Handley /* The remaining Trusted SRAM is used to load the BL images */
76b4315306SDan Handley #define ARM_BL_RAM_BASE			(ARM_SHARED_RAM_BASE + \
77b4315306SDan Handley 					 ARM_SHARED_RAM_SIZE)
78b4315306SDan Handley #define ARM_BL_RAM_SIZE			(PLAT_ARM_TRUSTED_SRAM_SIZE - \
797a4a0707SAlexeiFedorov 					 ARM_SHARED_RAM_SIZE - \
807a4a0707SAlexeiFedorov 					 ARM_L0_GPT_SIZE)
81b4315306SDan Handley 
82b4315306SDan Handley /*
83c8720729SZelalem Aweke  * The top 16MB (or 64MB if RME is enabled) of DRAM1 is configured as
84c8720729SZelalem Aweke  * follows:
85b4315306SDan Handley  *   - SCP TZC DRAM: If present, DRAM reserved for SCP use
86c8720729SZelalem Aweke  *   - L1 GPT DRAM: Reserved for L1 GPT if RME is enabled
87c8720729SZelalem Aweke  *   - REALM DRAM: Reserved for Realm world if RME is enabled
888c980a4aSJavier Almansa Sobrino  *   - TF-A <-> RMM SHARED: Area shared for communication between TF-A and RMM
896b2e961fSManish V Badarkhe  *   - Event Log: Area for Event Log if MEASURED_BOOT feature is enabled
90b4315306SDan Handley  *   - AP TZC DRAM: The remaining TZC secured DRAM reserved for AP use
91c8720729SZelalem Aweke  *
92c8720729SZelalem Aweke  *              RME enabled(64MB)                RME not enabled(16MB)
93c8720729SZelalem Aweke  *              --------------------             -------------------
94c8720729SZelalem Aweke  *              |                  |             |                 |
95c8720729SZelalem Aweke  *              |  AP TZC (~28MB)  |             |  AP TZC (~14MB) |
96c8720729SZelalem Aweke  *              --------------------             -------------------
976b2e961fSManish V Badarkhe  *              |     Event Log    |             |     Event Log   |
986b2e961fSManish V Badarkhe  *              |      (4KB)       |             |      (4KB)      |
996b2e961fSManish V Badarkhe  *              --------------------             -------------------
1006b2e961fSManish V Badarkhe  *              |   REALM (RMM)    |             |                 |
1016b2e961fSManish V Badarkhe  *              |   (32MB - 4KB)   |             |  EL3 TZC (2MB)  |
1026b2e961fSManish V Badarkhe  *              --------------------             -------------------
103c8720729SZelalem Aweke  *              |                  |             |                 |
1046b2e961fSManish V Badarkhe  *              |   TF-A <-> RMM   |             |    SCP TZC      |
1056b2e961fSManish V Badarkhe  *              |   SHARED (4KB)   |  0xFFFF_FFFF-------------------
1068c980a4aSJavier Almansa Sobrino  *              --------------------
1078c980a4aSJavier Almansa Sobrino  *              |                  |
1088c980a4aSJavier Almansa Sobrino  *              |  EL3 TZC (3MB)   |
1098c980a4aSJavier Almansa Sobrino  *              --------------------
110c8720729SZelalem Aweke  *              | L1 GPT + SCP TZC |
111c8720729SZelalem Aweke  *              |       (~1MB)     |
112c8720729SZelalem Aweke  *  0xFFFF_FFFF --------------------
113b4315306SDan Handley  */
114c8720729SZelalem Aweke #if ENABLE_RME
115c8720729SZelalem Aweke #define ARM_TZC_DRAM1_SIZE              UL(0x04000000) /* 64MB */
116c8720729SZelalem Aweke /*
117c8720729SZelalem Aweke  * Define a region within the TZC secured DRAM for use by EL3 runtime
118c8720729SZelalem Aweke  * firmware. This region is meant to be NOLOAD and will not be zero
119da04341eSChris Kay  * initialized. Data sections with the attribute `.arm_el3_tzc_dram` will be
120c8720729SZelalem Aweke  * placed here. 3MB region is reserved if RME is enabled, 2MB otherwise.
121c8720729SZelalem Aweke  */
122c8720729SZelalem Aweke #define ARM_EL3_TZC_DRAM1_SIZE		UL(0x00300000) /* 3MB */
123aeec55c8SAlexeiFedorov /* 8 x 128KB L1 pages (L0GPTSZ = 1GB, PGS = 4KB) */
124c8720729SZelalem Aweke #define ARM_L1_GPT_SIZE			UL(0x00100000) /* 1MB */
1258c980a4aSJavier Almansa Sobrino /* 32MB - ARM_EL3_RMM_SHARED_SIZE */
1268c980a4aSJavier Almansa Sobrino #define ARM_REALM_SIZE			(UL(0x02000000) -		\
1278c980a4aSJavier Almansa Sobrino 						ARM_EL3_RMM_SHARED_SIZE)
1288c980a4aSJavier Almansa Sobrino #define ARM_EL3_RMM_SHARED_SIZE		(PAGE_SIZE)    /* 4KB */
129c8720729SZelalem Aweke #else
130c8720729SZelalem Aweke #define ARM_TZC_DRAM1_SIZE		UL(0x01000000) /* 16MB */
131c8720729SZelalem Aweke #define ARM_EL3_TZC_DRAM1_SIZE		UL(0x00200000) /* 2MB */
132c8720729SZelalem Aweke #define ARM_L1_GPT_SIZE			UL(0)
133c8720729SZelalem Aweke #define ARM_REALM_SIZE			UL(0)
1348c980a4aSJavier Almansa Sobrino #define ARM_EL3_RMM_SHARED_SIZE		UL(0)
135c8720729SZelalem Aweke #endif /* ENABLE_RME */
136b4315306SDan Handley 
137b4315306SDan Handley #define ARM_SCP_TZC_DRAM1_BASE		(ARM_DRAM1_BASE +		\
138b4315306SDan Handley 					ARM_DRAM1_SIZE -		\
139c8720729SZelalem Aweke 					(ARM_SCP_TZC_DRAM1_SIZE +	\
140c8720729SZelalem Aweke 					ARM_L1_GPT_SIZE))
141b4315306SDan Handley #define ARM_SCP_TZC_DRAM1_SIZE		PLAT_ARM_SCP_TZC_DRAM1_SIZE
142b4315306SDan Handley #define ARM_SCP_TZC_DRAM1_END		(ARM_SCP_TZC_DRAM1_BASE +	\
1437b4e1fbbSAlexei Fedorov 					ARM_SCP_TZC_DRAM1_SIZE - 1U)
1446b2e961fSManish V Badarkhe 
1456b2e961fSManish V Badarkhe # if (defined(SPD_tspd) || defined(SPD_opteed) || defined(SPD_spmd)) && \
1466b2e961fSManish V Badarkhe MEASURED_BOOT
1476b2e961fSManish V Badarkhe #define ARM_EVENT_LOG_DRAM1_SIZE	UL(0x00001000)	/* 4KB */
1486b2e961fSManish V Badarkhe 
1496b2e961fSManish V Badarkhe #if ENABLE_RME
1506b2e961fSManish V Badarkhe #define ARM_EVENT_LOG_DRAM1_BASE	(ARM_REALM_BASE -		\
1516b2e961fSManish V Badarkhe 					 ARM_EVENT_LOG_DRAM1_SIZE)
1526b2e961fSManish V Badarkhe #else
1536b2e961fSManish V Badarkhe #define ARM_EVENT_LOG_DRAM1_BASE	(ARM_EL3_TZC_DRAM1_BASE -	\
1546b2e961fSManish V Badarkhe 					 ARM_EVENT_LOG_DRAM1_SIZE)
1556b2e961fSManish V Badarkhe #endif /* ENABLE_RME */
1566b2e961fSManish V Badarkhe #define ARM_EVENT_LOG_DRAM1_END		(ARM_EVENT_LOG_DRAM1_BASE +	\
1576b2e961fSManish V Badarkhe 					 ARM_EVENT_LOG_DRAM1_SIZE -	\
1586b2e961fSManish V Badarkhe 					 1U)
1596b2e961fSManish V Badarkhe #else
1606b2e961fSManish V Badarkhe #define ARM_EVENT_LOG_DRAM1_SIZE	UL(0)
1616b2e961fSManish V Badarkhe #endif /* (SPD_tspd || SPD_opteed || SPD_spmd) && MEASURED_BOOT */
1626b2e961fSManish V Badarkhe 
163c8720729SZelalem Aweke #if ENABLE_RME
1641e7545acSRohit Mathew #define ARM_L1_GPT_BASE			(ARM_DRAM1_BASE +		\
165c8720729SZelalem Aweke 					ARM_DRAM1_SIZE -		\
166c8720729SZelalem Aweke 					ARM_L1_GPT_SIZE)
1671e7545acSRohit Mathew #define ARM_L1_GPT_END			(ARM_L1_GPT_BASE +		\
168c8720729SZelalem Aweke 					ARM_L1_GPT_SIZE - 1U)
169b4315306SDan Handley 
1708c980a4aSJavier Almansa Sobrino #define ARM_REALM_BASE			(ARM_EL3_RMM_SHARED_BASE -	\
1718c980a4aSJavier Almansa Sobrino 					 ARM_REALM_SIZE)
1728c980a4aSJavier Almansa Sobrino 
1738c980a4aSJavier Almansa Sobrino #define ARM_REALM_END                   (ARM_REALM_BASE + ARM_REALM_SIZE - 1U)
1748c980a4aSJavier Almansa Sobrino 
1758c980a4aSJavier Almansa Sobrino #define ARM_EL3_RMM_SHARED_BASE		(ARM_DRAM1_BASE +		\
176c8720729SZelalem Aweke 					 ARM_DRAM1_SIZE -		\
177c8720729SZelalem Aweke 					(ARM_SCP_TZC_DRAM1_SIZE +	\
1788c980a4aSJavier Almansa Sobrino 					ARM_L1_GPT_SIZE +		\
1798c980a4aSJavier Almansa Sobrino 					ARM_EL3_RMM_SHARED_SIZE +	\
1808c980a4aSJavier Almansa Sobrino 					ARM_EL3_TZC_DRAM1_SIZE))
1818c980a4aSJavier Almansa Sobrino 
1828c980a4aSJavier Almansa Sobrino #define ARM_EL3_RMM_SHARED_END		(ARM_EL3_RMM_SHARED_BASE +	\
1838c980a4aSJavier Almansa Sobrino 					 ARM_EL3_RMM_SHARED_SIZE - 1U)
184c8720729SZelalem Aweke #endif /* ENABLE_RME */
185c8720729SZelalem Aweke 
186c8720729SZelalem Aweke #define ARM_EL3_TZC_DRAM1_BASE		(ARM_SCP_TZC_DRAM1_BASE -	\
187c8720729SZelalem Aweke 					ARM_EL3_TZC_DRAM1_SIZE)
188a22dffc6SSoby Mathew #define ARM_EL3_TZC_DRAM1_END		(ARM_EL3_TZC_DRAM1_BASE +	\
1897b4e1fbbSAlexei Fedorov 					ARM_EL3_TZC_DRAM1_SIZE - 1U)
190a22dffc6SSoby Mathew 
191b4315306SDan Handley #define ARM_AP_TZC_DRAM1_BASE		(ARM_DRAM1_BASE +		\
192b4315306SDan Handley 					ARM_DRAM1_SIZE -		\
193b4315306SDan Handley 					ARM_TZC_DRAM1_SIZE)
194b4315306SDan Handley #define ARM_AP_TZC_DRAM1_SIZE		(ARM_TZC_DRAM1_SIZE -		\
195a22dffc6SSoby Mathew 					(ARM_SCP_TZC_DRAM1_SIZE +	\
196c8720729SZelalem Aweke 					ARM_EL3_TZC_DRAM1_SIZE +	\
1978c980a4aSJavier Almansa Sobrino 					ARM_EL3_RMM_SHARED_SIZE +	\
198c8720729SZelalem Aweke 					ARM_REALM_SIZE +		\
1996b2e961fSManish V Badarkhe 					ARM_L1_GPT_SIZE +		\
2006b2e961fSManish V Badarkhe 					ARM_EVENT_LOG_DRAM1_SIZE))
2016b2e961fSManish V Badarkhe 
202b4315306SDan Handley #define ARM_AP_TZC_DRAM1_END		(ARM_AP_TZC_DRAM1_BASE +	\
2037b4e1fbbSAlexei Fedorov 					ARM_AP_TZC_DRAM1_SIZE - 1U)
204b4315306SDan Handley 
205e60f2af9SSoby Mathew /* Define the Access permissions for Secure peripherals to NS_DRAM */
206e60f2af9SSoby Mathew #define ARM_TZC_NS_DRAM_S_ACCESS	TZC_REGION_S_NONE
207e60f2af9SSoby Mathew 
20854661cd2SSummer Qin #ifdef SPD_opteed
20954661cd2SSummer Qin /*
21004f72baeSJens Wiklander  * BL2 needs to map 4MB at the end of TZC_DRAM1 in order to
21104f72baeSJens Wiklander  * load/authenticate the trusted os extra image. The first 512KB of
21204f72baeSJens Wiklander  * TZC_DRAM1 are reserved for trusted os (OPTEE). The extra image loading
21304f72baeSJens Wiklander  * for OPTEE is paged image which only include the paging part using
21404f72baeSJens Wiklander  * virtual memory but without "init" data. OPTEE will copy the "init" data
21504f72baeSJens Wiklander  * (from pager image) to the first 512KB of TZC_DRAM, and then copy the
21604f72baeSJens Wiklander  * extra image behind the "init" data.
21754661cd2SSummer Qin  */
21804f72baeSJens Wiklander #define ARM_OPTEE_PAGEABLE_LOAD_BASE	(ARM_AP_TZC_DRAM1_BASE + \
21904f72baeSJens Wiklander 					 ARM_AP_TZC_DRAM1_SIZE - \
22004f72baeSJens Wiklander 					 ARM_OPTEE_PAGEABLE_LOAD_SIZE)
221af6491f8SAntonio Nino Diaz #define ARM_OPTEE_PAGEABLE_LOAD_SIZE	UL(0x400000)
22254661cd2SSummer Qin #define ARM_OPTEE_PAGEABLE_LOAD_MEM	MAP_REGION_FLAT(		\
22354661cd2SSummer Qin 					ARM_OPTEE_PAGEABLE_LOAD_BASE,	\
22454661cd2SSummer Qin 					ARM_OPTEE_PAGEABLE_LOAD_SIZE,	\
22554661cd2SSummer Qin 					MT_MEMORY | MT_RW | MT_SECURE)
226b3ba6fdaSSoby Mathew 
227b3ba6fdaSSoby Mathew /*
228b3ba6fdaSSoby Mathew  * Map the memory for the OP-TEE core (also known as OP-TEE pager when paging
229b3ba6fdaSSoby Mathew  * support is enabled).
230b3ba6fdaSSoby Mathew  */
231b3ba6fdaSSoby Mathew #define ARM_MAP_OPTEE_CORE_MEM		MAP_REGION_FLAT(		\
232b3ba6fdaSSoby Mathew 						BL32_BASE,		\
233b3ba6fdaSSoby Mathew 						BL32_LIMIT - BL32_BASE,	\
234b3ba6fdaSSoby Mathew 						MT_MEMORY | MT_RW | MT_SECURE)
23554661cd2SSummer Qin #endif /* SPD_opteed */
236b4315306SDan Handley 
237b4315306SDan Handley #define ARM_NS_DRAM1_BASE		ARM_DRAM1_BASE
238b4315306SDan Handley #define ARM_NS_DRAM1_SIZE		(ARM_DRAM1_SIZE -		\
239b4315306SDan Handley 					 ARM_TZC_DRAM1_SIZE)
2408c980a4aSJavier Almansa Sobrino 
241b4315306SDan Handley #define ARM_NS_DRAM1_END		(ARM_NS_DRAM1_BASE +		\
2427b4e1fbbSAlexei Fedorov 					 ARM_NS_DRAM1_SIZE - 1U)
2435fb061e7SGary Morrison #ifdef PLAT_ARM_DRAM1_BASE
24403b201c0Slaurenw-arm #define ARM_DRAM1_BASE			PLAT_ARM_DRAM1_BASE
24503b201c0Slaurenw-arm #else
2463d449de0SSandrine Bailleux #define ARM_DRAM1_BASE			ULL(0x80000000)
2475fb061e7SGary Morrison #endif /* PLAT_ARM_DRAM1_BASE */
24803b201c0Slaurenw-arm 
2493d449de0SSandrine Bailleux #define ARM_DRAM1_SIZE			ULL(0x80000000)
250b4315306SDan Handley #define ARM_DRAM1_END			(ARM_DRAM1_BASE +		\
2517b4e1fbbSAlexei Fedorov 					 ARM_DRAM1_SIZE - 1U)
252b4315306SDan Handley 
2536bb6015fSSami Mujawar #define ARM_DRAM2_BASE			PLAT_ARM_DRAM2_BASE
254b4315306SDan Handley #define ARM_DRAM2_SIZE			PLAT_ARM_DRAM2_SIZE
255b4315306SDan Handley #define ARM_DRAM2_END			(ARM_DRAM2_BASE +		\
2567b4e1fbbSAlexei Fedorov 					 ARM_DRAM2_SIZE - 1U)
257a97bfa5fSAlexeiFedorov /* Number of DRAM banks */
25882685904SAlexeiFedorov #define ARM_DRAM_NUM_BANKS		2UL
259b4315306SDan Handley 
260bef44f60SAlexeiFedorov /* Number of PCIe memory regions */
261bef44f60SAlexeiFedorov #define ARM_PCI_NUM_REGIONS		2UL
262bef44f60SAlexeiFedorov 
263b4315306SDan Handley #define ARM_IRQ_SEC_PHY_TIMER		29
264b4315306SDan Handley 
265b4315306SDan Handley #define ARM_IRQ_SEC_SGI_0		8
266b4315306SDan Handley #define ARM_IRQ_SEC_SGI_1		9
267b4315306SDan Handley #define ARM_IRQ_SEC_SGI_2		10
268b4315306SDan Handley #define ARM_IRQ_SEC_SGI_3		11
269b4315306SDan Handley #define ARM_IRQ_SEC_SGI_4		12
270b4315306SDan Handley #define ARM_IRQ_SEC_SGI_5		13
271b4315306SDan Handley #define ARM_IRQ_SEC_SGI_6		14
272b4315306SDan Handley #define ARM_IRQ_SEC_SGI_7		15
273b4315306SDan Handley 
27427573c59SAchin Gupta /*
275b2c363b1SJeenu Viswambharan  * Define a list of Group 1 Secure and Group 0 interrupt properties as per GICv3
276b2c363b1SJeenu Viswambharan  * terminology. On a GICv2 system or mode, the lists will be merged and treated
277b2c363b1SJeenu Viswambharan  * as Group 0 interrupts.
278b2c363b1SJeenu Viswambharan  */
279b2c363b1SJeenu Viswambharan #define ARM_G1S_IRQ_PROPS(grp) \
280fe747d57SAntonio Nino Diaz 	INTR_PROP_DESC(ARM_IRQ_SEC_PHY_TIMER, GIC_HIGHEST_SEC_PRIORITY, (grp), \
281b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_LEVEL), \
282fe747d57SAntonio Nino Diaz 	INTR_PROP_DESC(ARM_IRQ_SEC_SGI_1, GIC_HIGHEST_SEC_PRIORITY, (grp), \
283b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_EDGE), \
284fe747d57SAntonio Nino Diaz 	INTR_PROP_DESC(ARM_IRQ_SEC_SGI_2, GIC_HIGHEST_SEC_PRIORITY, (grp), \
285b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_EDGE), \
286fe747d57SAntonio Nino Diaz 	INTR_PROP_DESC(ARM_IRQ_SEC_SGI_3, GIC_HIGHEST_SEC_PRIORITY, (grp), \
287b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_EDGE), \
288fe747d57SAntonio Nino Diaz 	INTR_PROP_DESC(ARM_IRQ_SEC_SGI_4, GIC_HIGHEST_SEC_PRIORITY, (grp), \
289b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_EDGE), \
290fe747d57SAntonio Nino Diaz 	INTR_PROP_DESC(ARM_IRQ_SEC_SGI_5, GIC_HIGHEST_SEC_PRIORITY, (grp), \
291b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_EDGE), \
292fe747d57SAntonio Nino Diaz 	INTR_PROP_DESC(ARM_IRQ_SEC_SGI_7, GIC_HIGHEST_SEC_PRIORITY, (grp), \
293b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_EDGE)
294b2c363b1SJeenu Viswambharan 
295b2c363b1SJeenu Viswambharan #define ARM_G0_IRQ_PROPS(grp) \
296fe747d57SAntonio Nino Diaz 	INTR_PROP_DESC(ARM_IRQ_SEC_SGI_0, PLAT_SDEI_NORMAL_PRI, (grp), \
297b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_EDGE), \
298fe747d57SAntonio Nino Diaz 	INTR_PROP_DESC(ARM_IRQ_SEC_SGI_6, GIC_HIGHEST_SEC_PRIORITY, (grp), \
299b2c363b1SJeenu Viswambharan 			GIC_INTR_CFG_EDGE)
300b2c363b1SJeenu Viswambharan 
301b4315306SDan Handley #define ARM_MAP_SHARED_RAM	MAP_REGION_FLAT(			\
302b4315306SDan Handley 					ARM_SHARED_RAM_BASE,		\
303b4315306SDan Handley 					ARM_SHARED_RAM_SIZE,		\
3044bb72c47SZelalem Aweke 					MT_DEVICE | MT_RW | EL3_PAS)
305b4315306SDan Handley 
306b4315306SDan Handley #define ARM_MAP_NS_DRAM1	MAP_REGION_FLAT(			\
307b4315306SDan Handley 					ARM_NS_DRAM1_BASE,		\
308b4315306SDan Handley 					ARM_NS_DRAM1_SIZE,		\
309b4315306SDan Handley 					MT_MEMORY | MT_RW | MT_NS)
310b4315306SDan Handley 
311b09ba056SRoberto Vargas #define ARM_MAP_DRAM2		MAP_REGION_FLAT(			\
312b09ba056SRoberto Vargas 					ARM_DRAM2_BASE,			\
313b09ba056SRoberto Vargas 					ARM_DRAM2_SIZE,			\
314b09ba056SRoberto Vargas 					MT_MEMORY | MT_RW | MT_NS)
315b09ba056SRoberto Vargas 
316b4315306SDan Handley #define ARM_MAP_TSP_SEC_MEM	MAP_REGION_FLAT(			\
317b4315306SDan Handley 					TSP_SEC_MEM_BASE,		\
318b4315306SDan Handley 					TSP_SEC_MEM_SIZE,		\
319b4315306SDan Handley 					MT_MEMORY | MT_RW | MT_SECURE)
320b4315306SDan Handley 
3214518dd9aSDavid Wang #if ARM_BL31_IN_DRAM
3224518dd9aSDavid Wang #define ARM_MAP_BL31_SEC_DRAM	MAP_REGION_FLAT(			\
3234518dd9aSDavid Wang 					BL31_BASE,			\
3244518dd9aSDavid Wang 					PLAT_ARM_MAX_BL31_SIZE,		\
3254518dd9aSDavid Wang 					MT_MEMORY | MT_RW | MT_SECURE)
3264518dd9aSDavid Wang #endif
327b4315306SDan Handley 
328a22dffc6SSoby Mathew #define ARM_MAP_EL3_TZC_DRAM	MAP_REGION_FLAT(			\
329a22dffc6SSoby Mathew 					ARM_EL3_TZC_DRAM1_BASE,		\
330a22dffc6SSoby Mathew 					ARM_EL3_TZC_DRAM1_SIZE,		\
3314bb72c47SZelalem Aweke 					MT_MEMORY | MT_RW | EL3_PAS)
332a22dffc6SSoby Mathew 
33364758c97SAchin Gupta #define ARM_MAP_TRUSTED_DRAM	MAP_REGION_FLAT(			\
33464758c97SAchin Gupta 					PLAT_ARM_TRUSTED_DRAM_BASE,	\
33564758c97SAchin Gupta 					PLAT_ARM_TRUSTED_DRAM_SIZE,	\
33664758c97SAchin Gupta 					MT_MEMORY | MT_RW | MT_SECURE)
33764758c97SAchin Gupta 
3386b2e961fSManish V Badarkhe # if (defined(SPD_tspd) || defined(SPD_opteed) || defined(SPD_spmd)) && \
3396b2e961fSManish V Badarkhe MEASURED_BOOT
3406b2e961fSManish V Badarkhe #define ARM_MAP_EVENT_LOG_DRAM1						\
3416b2e961fSManish V Badarkhe 				MAP_REGION_FLAT(			\
3426b2e961fSManish V Badarkhe 					ARM_EVENT_LOG_DRAM1_BASE,	\
3436b2e961fSManish V Badarkhe 					ARM_EVENT_LOG_DRAM1_SIZE,	\
3446b2e961fSManish V Badarkhe 					MT_MEMORY | MT_RW | MT_SECURE)
3456b2e961fSManish V Badarkhe #endif /* (SPD_tspd || SPD_opteed || SPD_spmd) && MEASURED_BOOT */
3466b2e961fSManish V Badarkhe 
347c8720729SZelalem Aweke #if ENABLE_RME
348e516ba6dSSoby Mathew /*
349e516ba6dSSoby Mathew  * We add the EL3_RMM_SHARED size to RMM mapping to map the region as a block.
350e516ba6dSSoby Mathew  * Else we end up requiring more pagetables in BL2 for ROMLIB build.
351e516ba6dSSoby Mathew  */
352c8720729SZelalem Aweke #define ARM_MAP_RMM_DRAM	MAP_REGION_FLAT(			\
353c8720729SZelalem Aweke 					PLAT_ARM_RMM_BASE,		\
354e516ba6dSSoby Mathew 					(PLAT_ARM_RMM_SIZE + 		\
355e516ba6dSSoby Mathew 					ARM_EL3_RMM_SHARED_SIZE),	\
356c8720729SZelalem Aweke 					MT_MEMORY | MT_RW | MT_REALM)
357c8720729SZelalem Aweke 
358c8720729SZelalem Aweke 
359c8720729SZelalem Aweke #define ARM_MAP_GPT_L1_DRAM	MAP_REGION_FLAT(			\
3601e7545acSRohit Mathew 					ARM_L1_GPT_BASE,		\
361c8720729SZelalem Aweke 					ARM_L1_GPT_SIZE,		\
362c8720729SZelalem Aweke 					MT_MEMORY | MT_RW | EL3_PAS)
363c8720729SZelalem Aweke 
3648c980a4aSJavier Almansa Sobrino #define ARM_MAP_EL3_RMM_SHARED_MEM					\
3658c980a4aSJavier Almansa Sobrino 				MAP_REGION_FLAT(			\
3668c980a4aSJavier Almansa Sobrino 					ARM_EL3_RMM_SHARED_BASE,	\
3678c980a4aSJavier Almansa Sobrino 					ARM_EL3_RMM_SHARED_SIZE,	\
3688c980a4aSJavier Almansa Sobrino 					MT_MEMORY | MT_RW | MT_REALM)
369c8720729SZelalem Aweke #endif /* ENABLE_RME */
37064758c97SAchin Gupta 
3712ecaafd2SDaniel Boulby /*
372ba597da7SJohn Tsichritzis  * Mapping for the BL1 RW region. This mapping is needed by BL2 in order to
373ba597da7SJohn Tsichritzis  * share the Mbed TLS heap. Since the heap is allocated inside BL1, it resides
374ba597da7SJohn Tsichritzis  * in the BL1 RW region. Hence, BL2 needs access to the BL1 RW region in order
375ba597da7SJohn Tsichritzis  * to be able to access the heap.
376ba597da7SJohn Tsichritzis  */
377ba597da7SJohn Tsichritzis #define ARM_MAP_BL1_RW		MAP_REGION_FLAT(	\
378ba597da7SJohn Tsichritzis 					BL1_RW_BASE,	\
379ba597da7SJohn Tsichritzis 					BL1_RW_LIMIT - BL1_RW_BASE, \
3804bb72c47SZelalem Aweke 					MT_MEMORY | MT_RW | EL3_PAS)
381ba597da7SJohn Tsichritzis 
382ba597da7SJohn Tsichritzis /*
3832ecaafd2SDaniel Boulby  * If SEPARATE_CODE_AND_RODATA=1 we define a region for each section
3842ecaafd2SDaniel Boulby  * otherwise one region is defined containing both.
3852ecaafd2SDaniel Boulby  */
386d323af9eSDaniel Boulby #if SEPARATE_CODE_AND_RODATA
3872ecaafd2SDaniel Boulby #define ARM_MAP_BL_RO			MAP_REGION_FLAT(			\
388d323af9eSDaniel Boulby 						BL_CODE_BASE,			\
389d323af9eSDaniel Boulby 						BL_CODE_END - BL_CODE_BASE,	\
3904bb72c47SZelalem Aweke 						MT_CODE | EL3_PAS),		\
3912ecaafd2SDaniel Boulby 					MAP_REGION_FLAT(			\
392d323af9eSDaniel Boulby 						BL_RO_DATA_BASE,		\
393d323af9eSDaniel Boulby 						BL_RO_DATA_END			\
394d323af9eSDaniel Boulby 							- BL_RO_DATA_BASE,	\
3954bb72c47SZelalem Aweke 						MT_RO_DATA | EL3_PAS)
3962ecaafd2SDaniel Boulby #else
3972ecaafd2SDaniel Boulby #define ARM_MAP_BL_RO			MAP_REGION_FLAT(			\
3982ecaafd2SDaniel Boulby 						BL_CODE_BASE,			\
3992ecaafd2SDaniel Boulby 						BL_CODE_END - BL_CODE_BASE,	\
4004bb72c47SZelalem Aweke 						MT_CODE | EL3_PAS)
401d323af9eSDaniel Boulby #endif
402d323af9eSDaniel Boulby #if USE_COHERENT_MEM
403d323af9eSDaniel Boulby #define ARM_MAP_BL_COHERENT_RAM		MAP_REGION_FLAT(			\
404d323af9eSDaniel Boulby 						BL_COHERENT_RAM_BASE,		\
405d323af9eSDaniel Boulby 						BL_COHERENT_RAM_END		\
406d323af9eSDaniel Boulby 							- BL_COHERENT_RAM_BASE, \
4074bb72c47SZelalem Aweke 						MT_DEVICE | MT_RW | EL3_PAS)
408d323af9eSDaniel Boulby #endif
4091eb735d7SRoberto Vargas #if USE_ROMLIB
4101eb735d7SRoberto Vargas #define ARM_MAP_ROMLIB_CODE		MAP_REGION_FLAT(			\
4111eb735d7SRoberto Vargas 						ROMLIB_RO_BASE,			\
4121eb735d7SRoberto Vargas 						ROMLIB_RO_LIMIT	- ROMLIB_RO_BASE,\
4134bb72c47SZelalem Aweke 						MT_CODE | EL3_PAS)
4141eb735d7SRoberto Vargas 
4151eb735d7SRoberto Vargas #define ARM_MAP_ROMLIB_DATA		MAP_REGION_FLAT(			\
4161eb735d7SRoberto Vargas 						ROMLIB_RW_BASE,			\
4171eb735d7SRoberto Vargas 						ROMLIB_RW_END	- ROMLIB_RW_BASE,\
4184bb72c47SZelalem Aweke 						MT_MEMORY | MT_RW | EL3_PAS)
4191eb735d7SRoberto Vargas #endif
420d323af9eSDaniel Boulby 
421b4315306SDan Handley /*
4220f58d4f2SAntonio Nino Diaz  * Map mem_protect flash region with read and write permissions
4230f58d4f2SAntonio Nino Diaz  */
4240f58d4f2SAntonio Nino Diaz #define ARM_V2M_MAP_MEM_PROTECT		MAP_REGION_FLAT(PLAT_ARM_MEM_PROT_ADDR,	\
4250f58d4f2SAntonio Nino Diaz 						V2M_FLASH_BLOCK_SIZE,		\
4260f58d4f2SAntonio Nino Diaz 						MT_DEVICE | MT_RW | MT_SECURE)
4279c11ed7eSHarrison Mutai 
4289c11ed7eSHarrison Mutai #if !TRANSFER_LIST
429a07c101aSManish V Badarkhe /*
430a07c101aSManish V Badarkhe  * Map the region for device tree configuration with read and write permissions
431a07c101aSManish V Badarkhe  */
432a07c101aSManish V Badarkhe #define ARM_MAP_BL_CONFIG_REGION	MAP_REGION_FLAT(ARM_BL_RAM_BASE,	\
433a07c101aSManish V Badarkhe 						(ARM_FW_CONFIGS_LIMIT		\
434a07c101aSManish V Badarkhe 							- ARM_BL_RAM_BASE),	\
4354bb72c47SZelalem Aweke 						MT_MEMORY | MT_RW | EL3_PAS)
4369c11ed7eSHarrison Mutai #endif
4379c11ed7eSHarrison Mutai 
438c8720729SZelalem Aweke /*
439c8720729SZelalem Aweke  * Map L0_GPT with read and write permissions
440c8720729SZelalem Aweke  */
441c8720729SZelalem Aweke #if ENABLE_RME
4421e7545acSRohit Mathew #define ARM_MAP_L0_GPT_REGION		MAP_REGION_FLAT(ARM_L0_GPT_BASE,	\
443c8720729SZelalem Aweke 						ARM_L0_GPT_SIZE,		\
444c8720729SZelalem Aweke 						MT_MEMORY | MT_RW | MT_ROOT)
445c8720729SZelalem Aweke #endif
4460f58d4f2SAntonio Nino Diaz 
4470f58d4f2SAntonio Nino Diaz /*
4482ecaafd2SDaniel Boulby  * The max number of regions like RO(code), coherent and data required by
449b4315306SDan Handley  * different BL stages which need to be mapped in the MMU.
450b4315306SDan Handley  */
451dcb19591SManish V Badarkhe #define ARM_BL_REGIONS			7
452b4315306SDan Handley 
453b4315306SDan Handley #define MAX_MMAP_REGIONS		(PLAT_ARM_MMAP_ENTRIES +	\
454b4315306SDan Handley 					 ARM_BL_REGIONS)
455b4315306SDan Handley 
456b4315306SDan Handley /* Memory mapped Generic timer interfaces  */
4575fb061e7SGary Morrison #ifdef PLAT_ARM_SYS_CNTCTL_BASE
4585fb061e7SGary Morrison #define ARM_SYS_CNTCTL_BASE		PLAT_ARM_SYS_CNTCTL_BASE
4595fb061e7SGary Morrison #else
460af6491f8SAntonio Nino Diaz #define ARM_SYS_CNTCTL_BASE		UL(0x2a430000)
4615fb061e7SGary Morrison #endif
4625fb061e7SGary Morrison 
4635fb061e7SGary Morrison #ifdef PLAT_ARM_SYS_CNTREAD_BASE
4645fb061e7SGary Morrison #define ARM_SYS_CNTREAD_BASE		PLAT_ARM_SYS_CNTREAD_BASE
4655fb061e7SGary Morrison #else
466af6491f8SAntonio Nino Diaz #define ARM_SYS_CNTREAD_BASE		UL(0x2a800000)
4675fb061e7SGary Morrison #endif
4685fb061e7SGary Morrison 
4695fb061e7SGary Morrison #ifdef PLAT_ARM_SYS_TIMCTL_BASE
4705fb061e7SGary Morrison #define ARM_SYS_TIMCTL_BASE		PLAT_ARM_SYS_TIMCTL_BASE
4715fb061e7SGary Morrison #else
472af6491f8SAntonio Nino Diaz #define ARM_SYS_TIMCTL_BASE		UL(0x2a810000)
4735fb061e7SGary Morrison #endif
4745fb061e7SGary Morrison 
4755fb061e7SGary Morrison #ifdef PLAT_ARM_SYS_CNT_BASE_S
4765fb061e7SGary Morrison #define ARM_SYS_CNT_BASE_S		PLAT_ARM_SYS_CNT_BASE_S
4775fb061e7SGary Morrison #else
478af6491f8SAntonio Nino Diaz #define ARM_SYS_CNT_BASE_S		UL(0x2a820000)
4795fb061e7SGary Morrison #endif
4805fb061e7SGary Morrison 
4815fb061e7SGary Morrison #ifdef PLAT_ARM_SYS_CNT_BASE_NS
4825fb061e7SGary Morrison #define ARM_SYS_CNT_BASE_NS		PLAT_ARM_SYS_CNT_BASE_NS
4835fb061e7SGary Morrison #else
484af6491f8SAntonio Nino Diaz #define ARM_SYS_CNT_BASE_NS		UL(0x2a830000)
4855fb061e7SGary Morrison #endif
486b4315306SDan Handley 
487b4315306SDan Handley #define ARM_CONSOLE_BAUDRATE		115200
488b4315306SDan Handley 
4897b4c1405SJuan Castillo /* Trusted Watchdog constants */
4905fb061e7SGary Morrison #ifdef PLAT_ARM_SP805_TWDG_BASE
4915fb061e7SGary Morrison #define ARM_SP805_TWDG_BASE		PLAT_ARM_SP805_TWDG_BASE
4925fb061e7SGary Morrison #else
493af6491f8SAntonio Nino Diaz #define ARM_SP805_TWDG_BASE		UL(0x2a490000)
4945fb061e7SGary Morrison #endif
4957b4c1405SJuan Castillo #define ARM_SP805_TWDG_CLK_HZ		32768
4967b4c1405SJuan Castillo /* The TBBR document specifies a watchdog timeout of 256 seconds. SP805
4977b4c1405SJuan Castillo  * asserts reset after two consecutive countdowns (2 x 128 = 256 sec) */
4987b4c1405SJuan Castillo #define ARM_TWDG_TIMEOUT_SEC		128
4997b4c1405SJuan Castillo #define ARM_TWDG_LOAD_VAL		(ARM_SP805_TWDG_CLK_HZ * 	\
5007b4c1405SJuan Castillo 					 ARM_TWDG_TIMEOUT_SEC)
5017b4c1405SJuan Castillo 
502b4315306SDan Handley /******************************************************************************
503b4315306SDan Handley  * Required platform porting definitions common to all ARM standard platforms
504b4315306SDan Handley  *****************************************************************************/
505b4315306SDan Handley 
506b09ba056SRoberto Vargas /*
50738dce70fSSoby Mathew  * This macro defines the deepest retention state possible. A higher state
50838dce70fSSoby Mathew  * id will represent an invalid or a power down state.
50938dce70fSSoby Mathew  */
51038dce70fSSoby Mathew #define PLAT_MAX_RET_STATE		ARM_LOCAL_STATE_RET
51138dce70fSSoby Mathew 
51238dce70fSSoby Mathew /*
51338dce70fSSoby Mathew  * This macro defines the deepest power down states possible. Any state ID
51438dce70fSSoby Mathew  * higher than this is invalid.
51538dce70fSSoby Mathew  */
51638dce70fSSoby Mathew #define PLAT_MAX_OFF_STATE		ARM_LOCAL_STATE_OFF
51738dce70fSSoby Mathew 
518b4315306SDan Handley /*
519b4315306SDan Handley  * Some data must be aligned on the biggest cache line size in the platform.
520b4315306SDan Handley  * This is known only to the platform as it might have a combination of
521b4315306SDan Handley  * integrated and external caches.
522b4315306SDan Handley  */
523af6491f8SAntonio Nino Diaz #define CACHE_WRITEBACK_GRANULE		(U(1) << ARM_CACHE_WRITEBACK_SHIFT)
524b4315306SDan Handley 
5259c11ed7eSHarrison Mutai /* Define memory configuration for trusted boot device tree files. */
5269c11ed7eSHarrison Mutai #ifdef PLAT_ARM_TB_FW_CONFIG_SIZE
5279c11ed7eSHarrison Mutai #define ARM_TB_FW_CONFIG_MAX_SIZE	PLAT_ARM_TB_FW_CONFIG_SIZE
5289c11ed7eSHarrison Mutai #else
5299c11ed7eSHarrison Mutai #define ARM_TB_FW_CONFIG_MAX_SIZE	U(0x400)
5309c11ed7eSHarrison Mutai #endif
5319c11ed7eSHarrison Mutai 
5329c11ed7eSHarrison Mutai #if !TRANSFER_LIST
533c228956aSSoby Mathew /*
53404e06973SManish V Badarkhe  * To enable FW_CONFIG to be loaded by BL1, define the corresponding base
535c228956aSSoby Mathew  * and limit. Leave enough space of BL2 meminfo.
536c228956aSSoby Mathew  */
53704e06973SManish V Badarkhe #define ARM_FW_CONFIG_BASE		(ARM_BL_RAM_BASE + sizeof(meminfo_t))
5382a0ef943SManish V Badarkhe #define ARM_FW_CONFIG_LIMIT		((ARM_BL_RAM_BASE + PAGE_SIZE) \
5392a0ef943SManish V Badarkhe 					+ (PAGE_SIZE / 2U))
5405b8d50e4SSathees Balya 
5415b8d50e4SSathees Balya /*
5425b8d50e4SSathees Balya  * Boot parameters passed from BL2 to BL31/BL32 are stored here
5435b8d50e4SSathees Balya  */
5442a0ef943SManish V Badarkhe #define ARM_BL2_MEM_DESC_BASE		(ARM_FW_CONFIG_LIMIT)
5452a0ef943SManish V Badarkhe #define ARM_BL2_MEM_DESC_LIMIT		(ARM_BL2_MEM_DESC_BASE \
5462a0ef943SManish V Badarkhe 					+ (PAGE_SIZE / 2U))
5475b8d50e4SSathees Balya 
5485b8d50e4SSathees Balya /*
5495b8d50e4SSathees Balya  * Define limit of firmware configuration memory:
55004e06973SManish V Badarkhe  * ARM_FW_CONFIG + ARM_BL2_MEM_DESC memory
5515b8d50e4SSathees Balya  */
55224e224b4SManish V Badarkhe #define ARM_FW_CONFIGS_SIZE		(PAGE_SIZE * 2)
55324e224b4SManish V Badarkhe #define ARM_FW_CONFIGS_LIMIT		(ARM_BL_RAM_BASE + ARM_FW_CONFIGS_SIZE)
5549c11ed7eSHarrison Mutai #endif
555b4315306SDan Handley 
556b4315306SDan Handley /*******************************************************************************
557b4315306SDan Handley  * BL1 specific defines.
558b4315306SDan Handley  * BL1 RW data is relocated from ROM to RAM at runtime so we need 2 sets of
559b4315306SDan Handley  * addresses.
560b4315306SDan Handley  ******************************************************************************/
561b4315306SDan Handley #define BL1_RO_BASE			PLAT_ARM_TRUSTED_ROM_BASE
562e31fb0faSlaurenw-arm #ifdef PLAT_BL1_RO_LIMIT
563e31fb0faSlaurenw-arm #define BL1_RO_LIMIT			PLAT_BL1_RO_LIMIT
564e31fb0faSlaurenw-arm #else
565b4315306SDan Handley #define BL1_RO_LIMIT			(PLAT_ARM_TRUSTED_ROM_BASE	\
5661eb735d7SRoberto Vargas 					 + (PLAT_ARM_TRUSTED_ROM_SIZE - \
5671eb735d7SRoberto Vargas 					    PLAT_ARM_MAX_ROMLIB_RO_SIZE))
568e31fb0faSlaurenw-arm #endif
569e31fb0faSlaurenw-arm 
570b4315306SDan Handley /*
5717a4a0707SAlexeiFedorov  * With ENABLE_RME=1 put BL1 RW below L0 GPT,
5727a4a0707SAlexeiFedorov  * or at the top of Trusted SRAM otherwise.
573b4315306SDan Handley  */
574b4315306SDan Handley #define BL1_RW_BASE			(ARM_BL_RAM_BASE +		\
575b4315306SDan Handley 						ARM_BL_RAM_SIZE -	\
5761eb735d7SRoberto Vargas 						(PLAT_ARM_MAX_BL1_RW_SIZE +\
5771eb735d7SRoberto Vargas 						 PLAT_ARM_MAX_ROMLIB_RW_SIZE))
5781eb735d7SRoberto Vargas #define BL1_RW_LIMIT			(ARM_BL_RAM_BASE + 		\
5791eb735d7SRoberto Vargas 					    (ARM_BL_RAM_SIZE - PLAT_ARM_MAX_ROMLIB_RW_SIZE))
5801eb735d7SRoberto Vargas 
5811eb735d7SRoberto Vargas #define ROMLIB_RO_BASE			BL1_RO_LIMIT
5821eb735d7SRoberto Vargas #define ROMLIB_RO_LIMIT			(PLAT_ARM_TRUSTED_ROM_BASE + PLAT_ARM_TRUSTED_ROM_SIZE)
5831eb735d7SRoberto Vargas 
5841eb735d7SRoberto Vargas #define ROMLIB_RW_BASE			(BL1_RW_BASE + PLAT_ARM_MAX_BL1_RW_SIZE)
5851eb735d7SRoberto Vargas #define ROMLIB_RW_END			(ROMLIB_RW_BASE + PLAT_ARM_MAX_ROMLIB_RW_SIZE)
586b4315306SDan Handley 
587b4315306SDan Handley /*******************************************************************************
588b4315306SDan Handley  * BL2 specific defines.
589b4315306SDan Handley  ******************************************************************************/
59042d4d3baSArvind Ram Prakash #if RESET_TO_BL2
59169a131d8SManish V Badarkhe #if ENABLE_PIE
59269a131d8SManish V Badarkhe /*
59369a131d8SManish V Badarkhe  * As the BL31 image size appears to be increased when built with the ENABLE_PIE
59469a131d8SManish V Badarkhe  * option, set BL2 base address to have enough space for BL31 in Trusted SRAM.
59569a131d8SManish V Badarkhe  */
596d478ac16SOlivier Deprez #define BL2_OFFSET			(0x5000)
59769a131d8SManish V Badarkhe #else
59842be6fc5SDimitris Papastamos /* Put BL2 towards the middle of the Trusted SRAM */
599d478ac16SOlivier Deprez #define BL2_OFFSET			(0x2000)
600d478ac16SOlivier Deprez #endif /* ENABLE_PIE */
601d478ac16SOlivier Deprez 
602c099cd39SSoby Mathew #define BL2_BASE			(ARM_TRUSTED_SRAM_BASE + \
60369a131d8SManish V Badarkhe 					    (PLAT_ARM_TRUSTED_SRAM_SIZE >> 1) + \
604d478ac16SOlivier Deprez 					    BL2_OFFSET)
605c099cd39SSoby Mathew #define BL2_LIMIT			(ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)
606c099cd39SSoby Mathew 
607c099cd39SSoby Mathew #else
6084518dd9aSDavid Wang /*
6094518dd9aSDavid Wang  * Put BL2 just below BL1.
6104518dd9aSDavid Wang  */
6114518dd9aSDavid Wang #define BL2_BASE			(BL1_RW_BASE - PLAT_ARM_MAX_BL2_SIZE)
6124518dd9aSDavid Wang #define BL2_LIMIT			BL1_RW_BASE
6134518dd9aSDavid Wang #endif
614b4315306SDan Handley 
615b4315306SDan Handley /*******************************************************************************
616d178637dSJuan Castillo  * BL31 specific defines.
617b4315306SDan Handley  ******************************************************************************/
6180c1f197aSMadhukar Pappireddy #if ARM_BL31_IN_DRAM || SEPARATE_NOBITS_REGION
6194518dd9aSDavid Wang /*
6204518dd9aSDavid Wang  * Put BL31 at the bottom of TZC secured DRAM
6214518dd9aSDavid Wang  */
6224518dd9aSDavid Wang #define BL31_BASE			ARM_AP_TZC_DRAM1_BASE
6234518dd9aSDavid Wang #define BL31_LIMIT			(ARM_AP_TZC_DRAM1_BASE +	\
6244518dd9aSDavid Wang 						PLAT_ARM_MAX_BL31_SIZE)
6250c1f197aSMadhukar Pappireddy /*
6260c1f197aSMadhukar Pappireddy  * For SEPARATE_NOBITS_REGION, BL31 PROGBITS are loaded in TZC secured DRAM.
6270c1f197aSMadhukar Pappireddy  * And BL31 NOBITS are loaded in Trusted SRAM such that BL2 is overwritten.
6280c1f197aSMadhukar Pappireddy  */
6290c1f197aSMadhukar Pappireddy #if SEPARATE_NOBITS_REGION
6300c1f197aSMadhukar Pappireddy #define BL31_NOBITS_BASE		BL2_BASE
6310c1f197aSMadhukar Pappireddy #define BL31_NOBITS_LIMIT		BL2_LIMIT
6320c1f197aSMadhukar Pappireddy #endif /* SEPARATE_NOBITS_REGION */
633fd5763eaSQixiang Xu #elif (RESET_TO_BL31)
634133a5c68SManish Pandey /* Ensure Position Independent support (PIE) is enabled for this config.*/
635133a5c68SManish Pandey # if !ENABLE_PIE
636133a5c68SManish Pandey #  error "BL31 must be a PIE if RESET_TO_BL31=1."
637133a5c68SManish Pandey #endif
638fd5763eaSQixiang Xu /*
63955cf015cSSoby Mathew  * Since this is PIE, we can define BL31_BASE to 0x0 since this macro is solely
640d4580d17SSoby Mathew  * used for building BL31 and not used for loading BL31.
641fd5763eaSQixiang Xu  */
64255cf015cSSoby Mathew #  define BL31_BASE			0x0
64355cf015cSSoby Mathew #  define BL31_LIMIT			PLAT_ARM_MAX_BL31_SIZE
6444518dd9aSDavid Wang #else
645c099cd39SSoby Mathew /* Put BL31 below BL2 in the Trusted SRAM.*/
646c099cd39SSoby Mathew #define BL31_BASE			((ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)\
647c099cd39SSoby Mathew 						- PLAT_ARM_MAX_BL31_SIZE)
648c099cd39SSoby Mathew #define BL31_PROGBITS_LIMIT		BL2_BASE
64942be6fc5SDimitris Papastamos /*
65042d4d3baSArvind Ram Prakash  * For RESET_TO_BL2 make sure the BL31 can grow up until BL2_BASE.
65142d4d3baSArvind Ram Prakash  * This is because in the RESET_TO_BL2 configuration,
65242d4d3baSArvind Ram Prakash  * BL2 is always resident.
65342be6fc5SDimitris Papastamos  */
65442d4d3baSArvind Ram Prakash #if RESET_TO_BL2
65542be6fc5SDimitris Papastamos #define BL31_LIMIT			BL2_BASE
65642be6fc5SDimitris Papastamos #else
657b4315306SDan Handley #define BL31_LIMIT			(ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)
6584518dd9aSDavid Wang #endif
65942be6fc5SDimitris Papastamos #endif
660b4315306SDan Handley 
661c8720729SZelalem Aweke /******************************************************************************
662c8720729SZelalem Aweke  * RMM specific defines
663c8720729SZelalem Aweke  *****************************************************************************/
664c8720729SZelalem Aweke #if ENABLE_RME
665c8720729SZelalem Aweke #define RMM_BASE			(ARM_REALM_BASE)
666c8720729SZelalem Aweke #define RMM_LIMIT			(RMM_BASE + ARM_REALM_SIZE)
667745c129aSAndre Przywara #define RMM_PAYLOAD_LIMIT		(RMM_BASE + PLAT_ARM_RMM_PAYLOAD_SIZE)
668*dbda614cSManish V Badarkhe #define RMM_BANK_SIZE			(PLAT_ARM_RMM_PAYLOAD_SIZE / 2U)
6698c980a4aSJavier Almansa Sobrino #define RMM_SHARED_BASE			(ARM_EL3_RMM_SHARED_BASE)
6708c980a4aSJavier Almansa Sobrino #define RMM_SHARED_SIZE			(ARM_EL3_RMM_SHARED_SIZE)
671c8720729SZelalem Aweke #endif
672c8720729SZelalem Aweke 
673402b3cf8SJulius Werner #if !defined(__aarch64__) || JUNO_AARCH32_EL3_RUNTIME
674b4315306SDan Handley /*******************************************************************************
6755744e874SSoby Mathew  * BL32 specific defines for EL3 runtime in AArch32 mode
6765744e874SSoby Mathew  ******************************************************************************/
6775744e874SSoby Mathew # if RESET_TO_SP_MIN && !JUNO_AARCH32_EL3_RUNTIME
6787285fd5fSManish Pandey /* Ensure Position Independent support (PIE) is enabled for this config.*/
6797285fd5fSManish Pandey # if !ENABLE_PIE
6807285fd5fSManish Pandey #  error "BL32 must be a PIE if RESET_TO_SP_MIN=1."
6817285fd5fSManish Pandey #endif
682c099cd39SSoby Mathew /*
6837285fd5fSManish Pandey  * Since this is PIE, we can define BL32_BASE to 0x0 since this macro is solely
6847285fd5fSManish Pandey  * used for building BL32 and not used for loading BL32.
685c099cd39SSoby Mathew  */
6867285fd5fSManish Pandey #  define BL32_BASE			0x0
6877285fd5fSManish Pandey #  define BL32_LIMIT			PLAT_ARM_MAX_BL32_SIZE
6885744e874SSoby Mathew # else
689c099cd39SSoby Mathew /* Put BL32 below BL2 in the Trusted SRAM.*/
690c099cd39SSoby Mathew #  define BL32_BASE			((ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)\
691c099cd39SSoby Mathew 						- PLAT_ARM_MAX_BL32_SIZE)
692c099cd39SSoby Mathew #  define BL32_PROGBITS_LIMIT		BL2_BASE
6935744e874SSoby Mathew #  define BL32_LIMIT			(ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)
6945744e874SSoby Mathew # endif /* RESET_TO_SP_MIN && !JUNO_AARCH32_EL3_RUNTIME */
6955744e874SSoby Mathew 
6965744e874SSoby Mathew #else
6975744e874SSoby Mathew /*******************************************************************************
6985744e874SSoby Mathew  * BL32 specific defines for EL3 runtime in AArch64 mode
699b4315306SDan Handley  ******************************************************************************/
700b4315306SDan Handley /*
701b4315306SDan Handley  * On ARM standard platforms, the TSP can execute from Trusted SRAM,
702b4315306SDan Handley  * Trusted DRAM (if available) or the DRAM region secured by the TrustZone
703b4315306SDan Handley  * controller.
704b4315306SDan Handley  */
7052d65ea19SMarc Bonnici # if SPM_MM || SPMC_AT_EL3
706e29efeb1SAntonio Nino Diaz #  define TSP_SEC_MEM_BASE		(ARM_AP_TZC_DRAM1_BASE + ULL(0x200000))
707e29efeb1SAntonio Nino Diaz #  define TSP_SEC_MEM_SIZE		(ARM_AP_TZC_DRAM1_SIZE - ULL(0x200000))
708e29efeb1SAntonio Nino Diaz #  define BL32_BASE			(ARM_AP_TZC_DRAM1_BASE + ULL(0x200000))
709e29efeb1SAntonio Nino Diaz #  define BL32_LIMIT			(ARM_AP_TZC_DRAM1_BASE +	\
710e29efeb1SAntonio Nino Diaz 						ARM_AP_TZC_DRAM1_SIZE)
71164758c97SAchin Gupta # elif defined(SPD_spmd)
71264758c97SAchin Gupta #  define TSP_SEC_MEM_BASE		(ARM_AP_TZC_DRAM1_BASE + ULL(0x200000))
71364758c97SAchin Gupta #  define TSP_SEC_MEM_SIZE		(ARM_AP_TZC_DRAM1_SIZE - ULL(0x200000))
714d32113c7SArunachalam Ganapathy #  define BL32_BASE			PLAT_ARM_SPMC_BASE
715d32113c7SArunachalam Ganapathy #  define BL32_LIMIT			(PLAT_ARM_SPMC_BASE +		\
716d32113c7SArunachalam Ganapathy 						 PLAT_ARM_SPMC_SIZE)
717e29efeb1SAntonio Nino Diaz # elif ARM_BL31_IN_DRAM
7184518dd9aSDavid Wang #  define TSP_SEC_MEM_BASE		(ARM_AP_TZC_DRAM1_BASE +	\
7194518dd9aSDavid Wang 						PLAT_ARM_MAX_BL31_SIZE)
7204518dd9aSDavid Wang #  define TSP_SEC_MEM_SIZE		(ARM_AP_TZC_DRAM1_SIZE -	\
7214518dd9aSDavid Wang 						PLAT_ARM_MAX_BL31_SIZE)
7224518dd9aSDavid Wang #  define BL32_BASE			(ARM_AP_TZC_DRAM1_BASE +	\
7234518dd9aSDavid Wang 						PLAT_ARM_MAX_BL31_SIZE)
7244518dd9aSDavid Wang #  define BL32_LIMIT			(ARM_AP_TZC_DRAM1_BASE +	\
7254518dd9aSDavid Wang 						ARM_AP_TZC_DRAM1_SIZE)
7264518dd9aSDavid Wang # elif ARM_TSP_RAM_LOCATION_ID == ARM_TRUSTED_SRAM_ID
727b4315306SDan Handley #  define TSP_SEC_MEM_BASE		ARM_BL_RAM_BASE
728b4315306SDan Handley #  define TSP_SEC_MEM_SIZE		ARM_BL_RAM_SIZE
729c099cd39SSoby Mathew #  define TSP_PROGBITS_LIMIT		BL31_BASE
73004e06973SManish V Badarkhe #  define BL32_BASE			ARM_FW_CONFIGS_LIMIT
731b4315306SDan Handley #  define BL32_LIMIT			BL31_BASE
732b4315306SDan Handley # elif ARM_TSP_RAM_LOCATION_ID == ARM_TRUSTED_DRAM_ID
733b4315306SDan Handley #  define TSP_SEC_MEM_BASE		PLAT_ARM_TRUSTED_DRAM_BASE
734b4315306SDan Handley #  define TSP_SEC_MEM_SIZE		PLAT_ARM_TRUSTED_DRAM_SIZE
735b4315306SDan Handley #  define BL32_BASE			PLAT_ARM_TRUSTED_DRAM_BASE
736b4315306SDan Handley #  define BL32_LIMIT			(PLAT_ARM_TRUSTED_DRAM_BASE	\
737c2a76122SManish V Badarkhe 						+ SZ_4M)
738b4315306SDan Handley # elif ARM_TSP_RAM_LOCATION_ID == ARM_DRAM_ID
739b4315306SDan Handley #  define TSP_SEC_MEM_BASE		ARM_AP_TZC_DRAM1_BASE
740b4315306SDan Handley #  define TSP_SEC_MEM_SIZE		ARM_AP_TZC_DRAM1_SIZE
741b4315306SDan Handley #  define BL32_BASE			ARM_AP_TZC_DRAM1_BASE
742b4315306SDan Handley #  define BL32_LIMIT			(ARM_AP_TZC_DRAM1_BASE +	\
743b4315306SDan Handley 						ARM_AP_TZC_DRAM1_SIZE)
744b4315306SDan Handley # else
745b4315306SDan Handley #  error "Unsupported ARM_TSP_RAM_LOCATION_ID value"
746b4315306SDan Handley # endif
747402b3cf8SJulius Werner #endif /* !__aarch64__ || JUNO_AARCH32_EL3_RUNTIME */
748b4315306SDan Handley 
749e29efeb1SAntonio Nino Diaz /*
750e29efeb1SAntonio Nino Diaz  * BL32 is mandatory in AArch32. In AArch64, undefine BL32_BASE if there is no
7512d65ea19SMarc Bonnici  * SPD and no SPM-MM and no SPMC-AT-EL3, as they are the only ones that can be
7522d65ea19SMarc Bonnici  * used as BL32.
753e29efeb1SAntonio Nino Diaz  */
754402b3cf8SJulius Werner #if defined(__aarch64__) && !JUNO_AARCH32_EL3_RUNTIME
7552d65ea19SMarc Bonnici # if defined(SPD_none) && !SPM_MM && !SPMC_AT_EL3
75681d139d5SAntonio Nino Diaz #  undef BL32_BASE
7572d65ea19SMarc Bonnici # endif /* defined(SPD_none) && !SPM_MM || !SPMC_AT_EL3 */
758402b3cf8SJulius Werner #endif /* defined(__aarch64__) && !JUNO_AARCH32_EL3_RUNTIME */
75981d139d5SAntonio Nino Diaz 
760eab1ed54SRakshit Goyal #if RESET_TO_BL31 && defined(SPD_spmd) && defined(PLAT_ARM_SPMC_MANIFEST_BASE)
761eab1ed54SRakshit Goyal #define ARM_SPMC_MANIFEST_BASE  PLAT_ARM_SPMC_MANIFEST_BASE
762eab1ed54SRakshit Goyal #else
763eab1ed54SRakshit Goyal 
764eab1ed54SRakshit Goyal /*
765eab1ed54SRakshit Goyal  * SPM expects SPM Core manifest base address in x0, which in !RESET_TO_BL31
766eab1ed54SRakshit Goyal  * case loaded after base of non shared SRAM(after 4KB offset of SRAM). But in
767eab1ed54SRakshit Goyal  * RESET_TO_BL31 case all non shared SRAM is allocated to BL31, so to avoid
768eab1ed54SRakshit Goyal  * overwriting of manifest keep it in the last page.
769eab1ed54SRakshit Goyal  */
770eab1ed54SRakshit Goyal #define ARM_SPMC_MANIFEST_BASE		(ARM_TRUSTED_SRAM_BASE +	    \
771eab1ed54SRakshit Goyal 					 PLAT_ARM_TRUSTED_SRAM_SIZE -\
772eab1ed54SRakshit Goyal 					 PAGE_SIZE)
773eab1ed54SRakshit Goyal #endif
774eab1ed54SRakshit Goyal 
775436223deSYatharth Kochar /*******************************************************************************
776436223deSYatharth Kochar  * FWU Images: NS_BL1U, BL2U & NS_BL2U defines.
777436223deSYatharth Kochar  ******************************************************************************/
778436223deSYatharth Kochar #define BL2U_BASE			BL2_BASE
7795744e874SSoby Mathew #define BL2U_LIMIT			BL2_LIMIT
7805744e874SSoby Mathew 
781436223deSYatharth Kochar #define NS_BL2U_BASE			ARM_NS_DRAM1_BASE
782f21c6321SAntonio Nino Diaz #define NS_BL1U_BASE			(PLAT_ARM_NVM_BASE + UL(0x03EB8000))
783436223deSYatharth Kochar 
784b4315306SDan Handley /*
785b4315306SDan Handley  * ID of the secure physical generic timer interrupt used by the TSP.
786b4315306SDan Handley  */
787b4315306SDan Handley #define TSP_IRQ_SEC_PHY_TIMER		ARM_IRQ_SEC_PHY_TIMER
788b4315306SDan Handley 
789b4315306SDan Handley 
790e25e6f41SVikram Kanigiri /*
791e25e6f41SVikram Kanigiri  * One cache line needed for bakery locks on ARM platforms
792e25e6f41SVikram Kanigiri  */
793e25e6f41SVikram Kanigiri #define PLAT_PERCPU_BAKERY_LOCK_SIZE		(1 * CACHE_WRITEBACK_GRANULE)
794e25e6f41SVikram Kanigiri 
7950bef0edfSJeenu Viswambharan /* Priority levels for ARM platforms */
796f87e54f7SManish Pandey #if ENABLE_FEAT_RAS && FFH_SUPPORT
7970b9ce906SJeenu Viswambharan #define PLAT_RAS_PRI			0x10
7981c012840SOmkar Anand Kulkarni #endif
7990bef0edfSJeenu Viswambharan #define PLAT_SDEI_CRITICAL_PRI		0x60
8000bef0edfSJeenu Viswambharan #define PLAT_SDEI_NORMAL_PRI		0x70
8010bef0edfSJeenu Viswambharan 
802f1e4a28dSOmkar Anand Kulkarni /* CPU Fault Handling Interrupt(FHI) PPI interrupt ID */
803f1e4a28dSOmkar Anand Kulkarni #define PLAT_CORE_FAULT_IRQ		17
804f1e4a28dSOmkar Anand Kulkarni 
8050bef0edfSJeenu Viswambharan /* ARM platforms use 3 upper bits of secure interrupt priority */
806262aceaaSSandeep Tripathy #define PLAT_PRI_BITS			3
807e25e6f41SVikram Kanigiri 
8080baec2abSJeenu Viswambharan /* SGI used for SDEI signalling */
8090baec2abSJeenu Viswambharan #define ARM_SDEI_SGI			ARM_IRQ_SEC_SGI_0
8100baec2abSJeenu Viswambharan 
811cbf9e84aSBalint Dobszay #if SDEI_IN_FCONF
812cbf9e84aSBalint Dobszay /* ARM SDEI dynamic private event max count */
813cbf9e84aSBalint Dobszay #define ARM_SDEI_DP_EVENT_MAX_CNT	3
814cbf9e84aSBalint Dobszay 
815cbf9e84aSBalint Dobszay /* ARM SDEI dynamic shared event max count */
816cbf9e84aSBalint Dobszay #define ARM_SDEI_DS_EVENT_MAX_CNT	3
817cbf9e84aSBalint Dobszay #else
8180baec2abSJeenu Viswambharan /* ARM SDEI dynamic private event numbers */
8190baec2abSJeenu Viswambharan #define ARM_SDEI_DP_EVENT_0		1000
8200baec2abSJeenu Viswambharan #define ARM_SDEI_DP_EVENT_1		1001
8210baec2abSJeenu Viswambharan #define ARM_SDEI_DP_EVENT_2		1002
8220baec2abSJeenu Viswambharan 
8230baec2abSJeenu Viswambharan /* ARM SDEI dynamic shared event numbers */
8240baec2abSJeenu Viswambharan #define ARM_SDEI_DS_EVENT_0		2000
8250baec2abSJeenu Viswambharan #define ARM_SDEI_DS_EVENT_1		2001
8260baec2abSJeenu Viswambharan #define ARM_SDEI_DS_EVENT_2		2002
8270baec2abSJeenu Viswambharan 
8287bdf0c1fSJeenu Viswambharan #define ARM_SDEI_PRIVATE_EVENTS \
8297bdf0c1fSJeenu Viswambharan 	SDEI_DEFINE_EVENT_0(ARM_SDEI_SGI), \
8307bdf0c1fSJeenu Viswambharan 	SDEI_PRIVATE_EVENT(ARM_SDEI_DP_EVENT_0, SDEI_DYN_IRQ, SDEI_MAPF_DYNAMIC), \
8317bdf0c1fSJeenu Viswambharan 	SDEI_PRIVATE_EVENT(ARM_SDEI_DP_EVENT_1, SDEI_DYN_IRQ, SDEI_MAPF_DYNAMIC), \
8327bdf0c1fSJeenu Viswambharan 	SDEI_PRIVATE_EVENT(ARM_SDEI_DP_EVENT_2, SDEI_DYN_IRQ, SDEI_MAPF_DYNAMIC)
8337bdf0c1fSJeenu Viswambharan 
8347bdf0c1fSJeenu Viswambharan #define ARM_SDEI_SHARED_EVENTS \
8357bdf0c1fSJeenu Viswambharan 	SDEI_SHARED_EVENT(ARM_SDEI_DS_EVENT_0, SDEI_DYN_IRQ, SDEI_MAPF_DYNAMIC), \
8367bdf0c1fSJeenu Viswambharan 	SDEI_SHARED_EVENT(ARM_SDEI_DS_EVENT_1, SDEI_DYN_IRQ, SDEI_MAPF_DYNAMIC), \
8377bdf0c1fSJeenu Viswambharan 	SDEI_SHARED_EVENT(ARM_SDEI_DS_EVENT_2, SDEI_DYN_IRQ, SDEI_MAPF_DYNAMIC)
838cbf9e84aSBalint Dobszay #endif /* SDEI_IN_FCONF */
8397bdf0c1fSJeenu Viswambharan 
8401083b2b3SAntonio Nino Diaz #endif /* ARM_DEF_H */
841