1b4315306SDan Handley /* 20c1f197aSMadhukar Pappireddy * Copyright (c) 2015-2020, ARM Limited and Contributors. All rights reserved. 3b4315306SDan Handley * 482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause 5b4315306SDan Handley */ 61083b2b3SAntonio Nino Diaz #ifndef ARM_DEF_H 71083b2b3SAntonio Nino Diaz #define ARM_DEF_H 8b4315306SDan Handley 909d40e0eSAntonio Nino Diaz #include <arch.h> 1009d40e0eSAntonio Nino Diaz #include <common/interrupt_props.h> 1109d40e0eSAntonio Nino Diaz #include <common/tbbr/tbbr_img_def.h> 1209d40e0eSAntonio Nino Diaz #include <drivers/arm/gic_common.h> 1309d40e0eSAntonio Nino Diaz #include <lib/utils_def.h> 1409d40e0eSAntonio Nino Diaz #include <lib/xlat_tables/xlat_tables_defs.h> 1509d40e0eSAntonio Nino Diaz #include <plat/common/common_def.h> 16b4315306SDan Handley 17b4315306SDan Handley /****************************************************************************** 18b4315306SDan Handley * Definitions common to all ARM standard platforms 19b4315306SDan Handley *****************************************************************************/ 20b4315306SDan Handley 21d178637dSJuan Castillo /* Special value used to verify platform parameters from BL2 to BL31 */ 22f21c6321SAntonio Nino Diaz #define ARM_BL31_PLAT_PARAM_VAL ULL(0x0f1e2d3c4b5a6978) 23b4315306SDan Handley 245b33ad17SDeepika Bhavnani #define ARM_SYSTEM_COUNT U(1) 25b4315306SDan Handley 26b4315306SDan Handley #define ARM_CACHE_WRITEBACK_SHIFT 6 27b4315306SDan Handley 2838dce70fSSoby Mathew /* 2938dce70fSSoby Mathew * Macros mapping the MPIDR Affinity levels to ARM Platform Power levels. The 3038dce70fSSoby Mathew * power levels have a 1:1 mapping with the MPIDR affinity levels. 3138dce70fSSoby Mathew */ 3238dce70fSSoby Mathew #define ARM_PWR_LVL0 MPIDR_AFFLVL0 3338dce70fSSoby Mathew #define ARM_PWR_LVL1 MPIDR_AFFLVL1 345f3a6030SSoby Mathew #define ARM_PWR_LVL2 MPIDR_AFFLVL2 350e27faf4SChandni Cherukuri #define ARM_PWR_LVL3 MPIDR_AFFLVL3 3638dce70fSSoby Mathew 3738dce70fSSoby Mathew /* 3838dce70fSSoby Mathew * Macros for local power states in ARM platforms encoded by State-ID field 3938dce70fSSoby Mathew * within the power-state parameter. 4038dce70fSSoby Mathew */ 4138dce70fSSoby Mathew /* Local power state for power domains in Run state. */ 421083b2b3SAntonio Nino Diaz #define ARM_LOCAL_STATE_RUN U(0) 4338dce70fSSoby Mathew /* Local power state for retention. Valid only for CPU power domains */ 441083b2b3SAntonio Nino Diaz #define ARM_LOCAL_STATE_RET U(1) 4538dce70fSSoby Mathew /* Local power state for OFF/power-down. Valid for CPU and cluster power 4638dce70fSSoby Mathew domains */ 471083b2b3SAntonio Nino Diaz #define ARM_LOCAL_STATE_OFF U(2) 4838dce70fSSoby Mathew 49b4315306SDan Handley /* Memory location options for TSP */ 50b4315306SDan Handley #define ARM_TRUSTED_SRAM_ID 0 51b4315306SDan Handley #define ARM_TRUSTED_DRAM_ID 1 52b4315306SDan Handley #define ARM_DRAM_ID 2 53b4315306SDan Handley 54b4315306SDan Handley /* The first 4KB of Trusted SRAM are used as shared memory */ 55af6491f8SAntonio Nino Diaz #define ARM_TRUSTED_SRAM_BASE UL(0x04000000) 56b4315306SDan Handley #define ARM_SHARED_RAM_BASE ARM_TRUSTED_SRAM_BASE 57af6491f8SAntonio Nino Diaz #define ARM_SHARED_RAM_SIZE UL(0x00001000) /* 4 KB */ 58b4315306SDan Handley 59b4315306SDan Handley /* The remaining Trusted SRAM is used to load the BL images */ 60b4315306SDan Handley #define ARM_BL_RAM_BASE (ARM_SHARED_RAM_BASE + \ 61b4315306SDan Handley ARM_SHARED_RAM_SIZE) 62b4315306SDan Handley #define ARM_BL_RAM_SIZE (PLAT_ARM_TRUSTED_SRAM_SIZE - \ 63b4315306SDan Handley ARM_SHARED_RAM_SIZE) 64b4315306SDan Handley 65b4315306SDan Handley /* 66b4315306SDan Handley * The top 16MB of DRAM1 is configured as secure access only using the TZC 67b4315306SDan Handley * - SCP TZC DRAM: If present, DRAM reserved for SCP use 68b4315306SDan Handley * - AP TZC DRAM: The remaining TZC secured DRAM reserved for AP use 69b4315306SDan Handley */ 70af6491f8SAntonio Nino Diaz #define ARM_TZC_DRAM1_SIZE UL(0x01000000) 71b4315306SDan Handley 72b4315306SDan Handley #define ARM_SCP_TZC_DRAM1_BASE (ARM_DRAM1_BASE + \ 73b4315306SDan Handley ARM_DRAM1_SIZE - \ 74b4315306SDan Handley ARM_SCP_TZC_DRAM1_SIZE) 75b4315306SDan Handley #define ARM_SCP_TZC_DRAM1_SIZE PLAT_ARM_SCP_TZC_DRAM1_SIZE 76b4315306SDan Handley #define ARM_SCP_TZC_DRAM1_END (ARM_SCP_TZC_DRAM1_BASE + \ 77b4315306SDan Handley ARM_SCP_TZC_DRAM1_SIZE - 1) 78b4315306SDan Handley 79a22dffc6SSoby Mathew /* 80a22dffc6SSoby Mathew * Define a 2MB region within the TZC secured DRAM for use by EL3 runtime 81a22dffc6SSoby Mathew * firmware. This region is meant to be NOLOAD and will not be zero 82a22dffc6SSoby Mathew * initialized. Data sections with the attribute `arm_el3_tzc_dram` will be 83a22dffc6SSoby Mathew * placed here. 84a22dffc6SSoby Mathew */ 85a22dffc6SSoby Mathew #define ARM_EL3_TZC_DRAM1_BASE (ARM_SCP_TZC_DRAM1_BASE - ARM_EL3_TZC_DRAM1_SIZE) 86af6491f8SAntonio Nino Diaz #define ARM_EL3_TZC_DRAM1_SIZE UL(0x00200000) /* 2 MB */ 87a22dffc6SSoby Mathew #define ARM_EL3_TZC_DRAM1_END (ARM_EL3_TZC_DRAM1_BASE + \ 88a22dffc6SSoby Mathew ARM_EL3_TZC_DRAM1_SIZE - 1) 89a22dffc6SSoby Mathew 90b4315306SDan Handley #define ARM_AP_TZC_DRAM1_BASE (ARM_DRAM1_BASE + \ 91b4315306SDan Handley ARM_DRAM1_SIZE - \ 92b4315306SDan Handley ARM_TZC_DRAM1_SIZE) 93b4315306SDan Handley #define ARM_AP_TZC_DRAM1_SIZE (ARM_TZC_DRAM1_SIZE - \ 94a22dffc6SSoby Mathew (ARM_SCP_TZC_DRAM1_SIZE + \ 95a22dffc6SSoby Mathew ARM_EL3_TZC_DRAM1_SIZE)) 96b4315306SDan Handley #define ARM_AP_TZC_DRAM1_END (ARM_AP_TZC_DRAM1_BASE + \ 97b4315306SDan Handley ARM_AP_TZC_DRAM1_SIZE - 1) 98b4315306SDan Handley 99e60f2af9SSoby Mathew /* Define the Access permissions for Secure peripherals to NS_DRAM */ 100e60f2af9SSoby Mathew #if ARM_CRYPTOCELL_INTEG 101e60f2af9SSoby Mathew /* 102e60f2af9SSoby Mathew * Allow Secure peripheral to read NS DRAM when integrated with CryptoCell. 103e60f2af9SSoby Mathew * This is required by CryptoCell to authenticate BL33 which is loaded 104e60f2af9SSoby Mathew * into the Non Secure DDR. 105e60f2af9SSoby Mathew */ 106e60f2af9SSoby Mathew #define ARM_TZC_NS_DRAM_S_ACCESS TZC_REGION_S_RD 107e60f2af9SSoby Mathew #else 108e60f2af9SSoby Mathew #define ARM_TZC_NS_DRAM_S_ACCESS TZC_REGION_S_NONE 109e60f2af9SSoby Mathew #endif 110e60f2af9SSoby Mathew 11154661cd2SSummer Qin #ifdef SPD_opteed 11254661cd2SSummer Qin /* 11304f72baeSJens Wiklander * BL2 needs to map 4MB at the end of TZC_DRAM1 in order to 11404f72baeSJens Wiklander * load/authenticate the trusted os extra image. The first 512KB of 11504f72baeSJens Wiklander * TZC_DRAM1 are reserved for trusted os (OPTEE). The extra image loading 11604f72baeSJens Wiklander * for OPTEE is paged image which only include the paging part using 11704f72baeSJens Wiklander * virtual memory but without "init" data. OPTEE will copy the "init" data 11804f72baeSJens Wiklander * (from pager image) to the first 512KB of TZC_DRAM, and then copy the 11904f72baeSJens Wiklander * extra image behind the "init" data. 12054661cd2SSummer Qin */ 12104f72baeSJens Wiklander #define ARM_OPTEE_PAGEABLE_LOAD_BASE (ARM_AP_TZC_DRAM1_BASE + \ 12204f72baeSJens Wiklander ARM_AP_TZC_DRAM1_SIZE - \ 12304f72baeSJens Wiklander ARM_OPTEE_PAGEABLE_LOAD_SIZE) 124af6491f8SAntonio Nino Diaz #define ARM_OPTEE_PAGEABLE_LOAD_SIZE UL(0x400000) 12554661cd2SSummer Qin #define ARM_OPTEE_PAGEABLE_LOAD_MEM MAP_REGION_FLAT( \ 12654661cd2SSummer Qin ARM_OPTEE_PAGEABLE_LOAD_BASE, \ 12754661cd2SSummer Qin ARM_OPTEE_PAGEABLE_LOAD_SIZE, \ 12854661cd2SSummer Qin MT_MEMORY | MT_RW | MT_SECURE) 129b3ba6fdaSSoby Mathew 130b3ba6fdaSSoby Mathew /* 131b3ba6fdaSSoby Mathew * Map the memory for the OP-TEE core (also known as OP-TEE pager when paging 132b3ba6fdaSSoby Mathew * support is enabled). 133b3ba6fdaSSoby Mathew */ 134b3ba6fdaSSoby Mathew #define ARM_MAP_OPTEE_CORE_MEM MAP_REGION_FLAT( \ 135b3ba6fdaSSoby Mathew BL32_BASE, \ 136b3ba6fdaSSoby Mathew BL32_LIMIT - BL32_BASE, \ 137b3ba6fdaSSoby Mathew MT_MEMORY | MT_RW | MT_SECURE) 13854661cd2SSummer Qin #endif /* SPD_opteed */ 139b4315306SDan Handley 140b4315306SDan Handley #define ARM_NS_DRAM1_BASE ARM_DRAM1_BASE 141b4315306SDan Handley #define ARM_NS_DRAM1_SIZE (ARM_DRAM1_SIZE - \ 142b4315306SDan Handley ARM_TZC_DRAM1_SIZE) 143b4315306SDan Handley #define ARM_NS_DRAM1_END (ARM_NS_DRAM1_BASE + \ 144b4315306SDan Handley ARM_NS_DRAM1_SIZE - 1) 145b4315306SDan Handley 1463d449de0SSandrine Bailleux #define ARM_DRAM1_BASE ULL(0x80000000) 1473d449de0SSandrine Bailleux #define ARM_DRAM1_SIZE ULL(0x80000000) 148b4315306SDan Handley #define ARM_DRAM1_END (ARM_DRAM1_BASE + \ 149b4315306SDan Handley ARM_DRAM1_SIZE - 1) 150b4315306SDan Handley 1516bb6015fSSami Mujawar #define ARM_DRAM2_BASE PLAT_ARM_DRAM2_BASE 152b4315306SDan Handley #define ARM_DRAM2_SIZE PLAT_ARM_DRAM2_SIZE 153b4315306SDan Handley #define ARM_DRAM2_END (ARM_DRAM2_BASE + \ 154b4315306SDan Handley ARM_DRAM2_SIZE - 1) 155b4315306SDan Handley 156b4315306SDan Handley #define ARM_IRQ_SEC_PHY_TIMER 29 157b4315306SDan Handley 158b4315306SDan Handley #define ARM_IRQ_SEC_SGI_0 8 159b4315306SDan Handley #define ARM_IRQ_SEC_SGI_1 9 160b4315306SDan Handley #define ARM_IRQ_SEC_SGI_2 10 161b4315306SDan Handley #define ARM_IRQ_SEC_SGI_3 11 162b4315306SDan Handley #define ARM_IRQ_SEC_SGI_4 12 163b4315306SDan Handley #define ARM_IRQ_SEC_SGI_5 13 164b4315306SDan Handley #define ARM_IRQ_SEC_SGI_6 14 165b4315306SDan Handley #define ARM_IRQ_SEC_SGI_7 15 166b4315306SDan Handley 16727573c59SAchin Gupta /* 168b2c363b1SJeenu Viswambharan * Define a list of Group 1 Secure and Group 0 interrupt properties as per GICv3 169b2c363b1SJeenu Viswambharan * terminology. On a GICv2 system or mode, the lists will be merged and treated 170b2c363b1SJeenu Viswambharan * as Group 0 interrupts. 171b2c363b1SJeenu Viswambharan */ 172b2c363b1SJeenu Viswambharan #define ARM_G1S_IRQ_PROPS(grp) \ 173fe747d57SAntonio Nino Diaz INTR_PROP_DESC(ARM_IRQ_SEC_PHY_TIMER, GIC_HIGHEST_SEC_PRIORITY, (grp), \ 174b2c363b1SJeenu Viswambharan GIC_INTR_CFG_LEVEL), \ 175fe747d57SAntonio Nino Diaz INTR_PROP_DESC(ARM_IRQ_SEC_SGI_1, GIC_HIGHEST_SEC_PRIORITY, (grp), \ 176b2c363b1SJeenu Viswambharan GIC_INTR_CFG_EDGE), \ 177fe747d57SAntonio Nino Diaz INTR_PROP_DESC(ARM_IRQ_SEC_SGI_2, GIC_HIGHEST_SEC_PRIORITY, (grp), \ 178b2c363b1SJeenu Viswambharan GIC_INTR_CFG_EDGE), \ 179fe747d57SAntonio Nino Diaz INTR_PROP_DESC(ARM_IRQ_SEC_SGI_3, GIC_HIGHEST_SEC_PRIORITY, (grp), \ 180b2c363b1SJeenu Viswambharan GIC_INTR_CFG_EDGE), \ 181fe747d57SAntonio Nino Diaz INTR_PROP_DESC(ARM_IRQ_SEC_SGI_4, GIC_HIGHEST_SEC_PRIORITY, (grp), \ 182b2c363b1SJeenu Viswambharan GIC_INTR_CFG_EDGE), \ 183fe747d57SAntonio Nino Diaz INTR_PROP_DESC(ARM_IRQ_SEC_SGI_5, GIC_HIGHEST_SEC_PRIORITY, (grp), \ 184b2c363b1SJeenu Viswambharan GIC_INTR_CFG_EDGE), \ 185fe747d57SAntonio Nino Diaz INTR_PROP_DESC(ARM_IRQ_SEC_SGI_7, GIC_HIGHEST_SEC_PRIORITY, (grp), \ 186b2c363b1SJeenu Viswambharan GIC_INTR_CFG_EDGE) 187b2c363b1SJeenu Viswambharan 188b2c363b1SJeenu Viswambharan #define ARM_G0_IRQ_PROPS(grp) \ 189fe747d57SAntonio Nino Diaz INTR_PROP_DESC(ARM_IRQ_SEC_SGI_0, PLAT_SDEI_NORMAL_PRI, (grp), \ 190b2c363b1SJeenu Viswambharan GIC_INTR_CFG_EDGE), \ 191fe747d57SAntonio Nino Diaz INTR_PROP_DESC(ARM_IRQ_SEC_SGI_6, GIC_HIGHEST_SEC_PRIORITY, (grp), \ 192b2c363b1SJeenu Viswambharan GIC_INTR_CFG_EDGE) 193b2c363b1SJeenu Viswambharan 194b4315306SDan Handley #define ARM_MAP_SHARED_RAM MAP_REGION_FLAT( \ 195b4315306SDan Handley ARM_SHARED_RAM_BASE, \ 196b4315306SDan Handley ARM_SHARED_RAM_SIZE, \ 19774eb26e4SJuan Castillo MT_DEVICE | MT_RW | MT_SECURE) 198b4315306SDan Handley 199b4315306SDan Handley #define ARM_MAP_NS_DRAM1 MAP_REGION_FLAT( \ 200b4315306SDan Handley ARM_NS_DRAM1_BASE, \ 201b4315306SDan Handley ARM_NS_DRAM1_SIZE, \ 202b4315306SDan Handley MT_MEMORY | MT_RW | MT_NS) 203b4315306SDan Handley 204b09ba056SRoberto Vargas #define ARM_MAP_DRAM2 MAP_REGION_FLAT( \ 205b09ba056SRoberto Vargas ARM_DRAM2_BASE, \ 206b09ba056SRoberto Vargas ARM_DRAM2_SIZE, \ 207b09ba056SRoberto Vargas MT_MEMORY | MT_RW | MT_NS) 208b09ba056SRoberto Vargas 209b4315306SDan Handley #define ARM_MAP_TSP_SEC_MEM MAP_REGION_FLAT( \ 210b4315306SDan Handley TSP_SEC_MEM_BASE, \ 211b4315306SDan Handley TSP_SEC_MEM_SIZE, \ 212b4315306SDan Handley MT_MEMORY | MT_RW | MT_SECURE) 213b4315306SDan Handley 2144518dd9aSDavid Wang #if ARM_BL31_IN_DRAM 2154518dd9aSDavid Wang #define ARM_MAP_BL31_SEC_DRAM MAP_REGION_FLAT( \ 2164518dd9aSDavid Wang BL31_BASE, \ 2174518dd9aSDavid Wang PLAT_ARM_MAX_BL31_SIZE, \ 2184518dd9aSDavid Wang MT_MEMORY | MT_RW | MT_SECURE) 2194518dd9aSDavid Wang #endif 220b4315306SDan Handley 221a22dffc6SSoby Mathew #define ARM_MAP_EL3_TZC_DRAM MAP_REGION_FLAT( \ 222a22dffc6SSoby Mathew ARM_EL3_TZC_DRAM1_BASE, \ 223a22dffc6SSoby Mathew ARM_EL3_TZC_DRAM1_SIZE, \ 224a22dffc6SSoby Mathew MT_MEMORY | MT_RW | MT_SECURE) 225a22dffc6SSoby Mathew 226*64758c97SAchin Gupta #if defined(SPD_spmd) 227*64758c97SAchin Gupta #define ARM_MAP_TRUSTED_DRAM MAP_REGION_FLAT( \ 228*64758c97SAchin Gupta PLAT_ARM_TRUSTED_DRAM_BASE, \ 229*64758c97SAchin Gupta PLAT_ARM_TRUSTED_DRAM_SIZE, \ 230*64758c97SAchin Gupta MT_MEMORY | MT_RW | MT_SECURE) 231*64758c97SAchin Gupta #endif 232*64758c97SAchin Gupta 233*64758c97SAchin Gupta 2342ecaafd2SDaniel Boulby /* 235ba597da7SJohn Tsichritzis * Mapping for the BL1 RW region. This mapping is needed by BL2 in order to 236ba597da7SJohn Tsichritzis * share the Mbed TLS heap. Since the heap is allocated inside BL1, it resides 237ba597da7SJohn Tsichritzis * in the BL1 RW region. Hence, BL2 needs access to the BL1 RW region in order 238ba597da7SJohn Tsichritzis * to be able to access the heap. 239ba597da7SJohn Tsichritzis */ 240ba597da7SJohn Tsichritzis #define ARM_MAP_BL1_RW MAP_REGION_FLAT( \ 241ba597da7SJohn Tsichritzis BL1_RW_BASE, \ 242ba597da7SJohn Tsichritzis BL1_RW_LIMIT - BL1_RW_BASE, \ 243ba597da7SJohn Tsichritzis MT_MEMORY | MT_RW | MT_SECURE) 244ba597da7SJohn Tsichritzis 245ba597da7SJohn Tsichritzis /* 2462ecaafd2SDaniel Boulby * If SEPARATE_CODE_AND_RODATA=1 we define a region for each section 2472ecaafd2SDaniel Boulby * otherwise one region is defined containing both. 2482ecaafd2SDaniel Boulby */ 249d323af9eSDaniel Boulby #if SEPARATE_CODE_AND_RODATA 2502ecaafd2SDaniel Boulby #define ARM_MAP_BL_RO MAP_REGION_FLAT( \ 251d323af9eSDaniel Boulby BL_CODE_BASE, \ 252d323af9eSDaniel Boulby BL_CODE_END - BL_CODE_BASE, \ 2532ecaafd2SDaniel Boulby MT_CODE | MT_SECURE), \ 2542ecaafd2SDaniel Boulby MAP_REGION_FLAT( \ 255d323af9eSDaniel Boulby BL_RO_DATA_BASE, \ 256d323af9eSDaniel Boulby BL_RO_DATA_END \ 257d323af9eSDaniel Boulby - BL_RO_DATA_BASE, \ 258d323af9eSDaniel Boulby MT_RO_DATA | MT_SECURE) 2592ecaafd2SDaniel Boulby #else 2602ecaafd2SDaniel Boulby #define ARM_MAP_BL_RO MAP_REGION_FLAT( \ 2612ecaafd2SDaniel Boulby BL_CODE_BASE, \ 2622ecaafd2SDaniel Boulby BL_CODE_END - BL_CODE_BASE, \ 2632ecaafd2SDaniel Boulby MT_CODE | MT_SECURE) 264d323af9eSDaniel Boulby #endif 265d323af9eSDaniel Boulby #if USE_COHERENT_MEM 266d323af9eSDaniel Boulby #define ARM_MAP_BL_COHERENT_RAM MAP_REGION_FLAT( \ 267d323af9eSDaniel Boulby BL_COHERENT_RAM_BASE, \ 268d323af9eSDaniel Boulby BL_COHERENT_RAM_END \ 269d323af9eSDaniel Boulby - BL_COHERENT_RAM_BASE, \ 270d323af9eSDaniel Boulby MT_DEVICE | MT_RW | MT_SECURE) 271d323af9eSDaniel Boulby #endif 2721eb735d7SRoberto Vargas #if USE_ROMLIB 2731eb735d7SRoberto Vargas #define ARM_MAP_ROMLIB_CODE MAP_REGION_FLAT( \ 2741eb735d7SRoberto Vargas ROMLIB_RO_BASE, \ 2751eb735d7SRoberto Vargas ROMLIB_RO_LIMIT - ROMLIB_RO_BASE,\ 2761eb735d7SRoberto Vargas MT_CODE | MT_SECURE) 2771eb735d7SRoberto Vargas 2781eb735d7SRoberto Vargas #define ARM_MAP_ROMLIB_DATA MAP_REGION_FLAT( \ 2791eb735d7SRoberto Vargas ROMLIB_RW_BASE, \ 2801eb735d7SRoberto Vargas ROMLIB_RW_END - ROMLIB_RW_BASE,\ 2811eb735d7SRoberto Vargas MT_MEMORY | MT_RW | MT_SECURE) 2821eb735d7SRoberto Vargas #endif 283d323af9eSDaniel Boulby 284b4315306SDan Handley /* 2850f58d4f2SAntonio Nino Diaz * Map mem_protect flash region with read and write permissions 2860f58d4f2SAntonio Nino Diaz */ 2870f58d4f2SAntonio Nino Diaz #define ARM_V2M_MAP_MEM_PROTECT MAP_REGION_FLAT(PLAT_ARM_MEM_PROT_ADDR, \ 2880f58d4f2SAntonio Nino Diaz V2M_FLASH_BLOCK_SIZE, \ 2890f58d4f2SAntonio Nino Diaz MT_DEVICE | MT_RW | MT_SECURE) 2900f58d4f2SAntonio Nino Diaz 2910f58d4f2SAntonio Nino Diaz /* 2922ecaafd2SDaniel Boulby * The max number of regions like RO(code), coherent and data required by 293b4315306SDan Handley * different BL stages which need to be mapped in the MMU. 294b4315306SDan Handley */ 295cb4adb0dSDaniel Boulby #define ARM_BL_REGIONS 5 296b4315306SDan Handley 297b4315306SDan Handley #define MAX_MMAP_REGIONS (PLAT_ARM_MMAP_ENTRIES + \ 298b4315306SDan Handley ARM_BL_REGIONS) 299b4315306SDan Handley 300b4315306SDan Handley /* Memory mapped Generic timer interfaces */ 301af6491f8SAntonio Nino Diaz #define ARM_SYS_CNTCTL_BASE UL(0x2a430000) 302af6491f8SAntonio Nino Diaz #define ARM_SYS_CNTREAD_BASE UL(0x2a800000) 303af6491f8SAntonio Nino Diaz #define ARM_SYS_TIMCTL_BASE UL(0x2a810000) 304af6491f8SAntonio Nino Diaz #define ARM_SYS_CNT_BASE_S UL(0x2a820000) 305af6491f8SAntonio Nino Diaz #define ARM_SYS_CNT_BASE_NS UL(0x2a830000) 306b4315306SDan Handley 307b4315306SDan Handley #define ARM_CONSOLE_BAUDRATE 115200 308b4315306SDan Handley 3097b4c1405SJuan Castillo /* Trusted Watchdog constants */ 310af6491f8SAntonio Nino Diaz #define ARM_SP805_TWDG_BASE UL(0x2a490000) 3117b4c1405SJuan Castillo #define ARM_SP805_TWDG_CLK_HZ 32768 3127b4c1405SJuan Castillo /* The TBBR document specifies a watchdog timeout of 256 seconds. SP805 3137b4c1405SJuan Castillo * asserts reset after two consecutive countdowns (2 x 128 = 256 sec) */ 3147b4c1405SJuan Castillo #define ARM_TWDG_TIMEOUT_SEC 128 3157b4c1405SJuan Castillo #define ARM_TWDG_LOAD_VAL (ARM_SP805_TWDG_CLK_HZ * \ 3167b4c1405SJuan Castillo ARM_TWDG_TIMEOUT_SEC) 3177b4c1405SJuan Castillo 318b4315306SDan Handley /****************************************************************************** 319b4315306SDan Handley * Required platform porting definitions common to all ARM standard platforms 320b4315306SDan Handley *****************************************************************************/ 321b4315306SDan Handley 322b09ba056SRoberto Vargas /* 32338dce70fSSoby Mathew * This macro defines the deepest retention state possible. A higher state 32438dce70fSSoby Mathew * id will represent an invalid or a power down state. 32538dce70fSSoby Mathew */ 32638dce70fSSoby Mathew #define PLAT_MAX_RET_STATE ARM_LOCAL_STATE_RET 32738dce70fSSoby Mathew 32838dce70fSSoby Mathew /* 32938dce70fSSoby Mathew * This macro defines the deepest power down states possible. Any state ID 33038dce70fSSoby Mathew * higher than this is invalid. 33138dce70fSSoby Mathew */ 33238dce70fSSoby Mathew #define PLAT_MAX_OFF_STATE ARM_LOCAL_STATE_OFF 33338dce70fSSoby Mathew 334b4315306SDan Handley /* 335b4315306SDan Handley * Some data must be aligned on the biggest cache line size in the platform. 336b4315306SDan Handley * This is known only to the platform as it might have a combination of 337b4315306SDan Handley * integrated and external caches. 338b4315306SDan Handley */ 339af6491f8SAntonio Nino Diaz #define CACHE_WRITEBACK_GRANULE (U(1) << ARM_CACHE_WRITEBACK_SHIFT) 340b4315306SDan Handley 341c228956aSSoby Mathew /* 342c228956aSSoby Mathew * To enable TB_FW_CONFIG to be loaded by BL1, define the corresponding base 343c228956aSSoby Mathew * and limit. Leave enough space of BL2 meminfo. 344c228956aSSoby Mathew */ 345f21c6321SAntonio Nino Diaz #define ARM_TB_FW_CONFIG_BASE (ARM_BL_RAM_BASE + sizeof(meminfo_t)) 3465b8d50e4SSathees Balya #define ARM_TB_FW_CONFIG_LIMIT (ARM_BL_RAM_BASE + (PAGE_SIZE / 2U)) 3475b8d50e4SSathees Balya 3485b8d50e4SSathees Balya /* 3495b8d50e4SSathees Balya * Boot parameters passed from BL2 to BL31/BL32 are stored here 3505b8d50e4SSathees Balya */ 3515b8d50e4SSathees Balya #define ARM_BL2_MEM_DESC_BASE ARM_TB_FW_CONFIG_LIMIT 3525b8d50e4SSathees Balya #define ARM_BL2_MEM_DESC_LIMIT (ARM_BL2_MEM_DESC_BASE + \ 3535b8d50e4SSathees Balya (PAGE_SIZE / 2U)) 3545b8d50e4SSathees Balya 3555b8d50e4SSathees Balya /* 3565b8d50e4SSathees Balya * Define limit of firmware configuration memory: 3575b8d50e4SSathees Balya * ARM_TB_FW_CONFIG + ARM_BL2_MEM_DESC memory 3585b8d50e4SSathees Balya */ 3595b8d50e4SSathees Balya #define ARM_FW_CONFIG_LIMIT (ARM_BL_RAM_BASE + PAGE_SIZE) 360b4315306SDan Handley 361b4315306SDan Handley /******************************************************************************* 362b4315306SDan Handley * BL1 specific defines. 363b4315306SDan Handley * BL1 RW data is relocated from ROM to RAM at runtime so we need 2 sets of 364b4315306SDan Handley * addresses. 365b4315306SDan Handley ******************************************************************************/ 366b4315306SDan Handley #define BL1_RO_BASE PLAT_ARM_TRUSTED_ROM_BASE 367b4315306SDan Handley #define BL1_RO_LIMIT (PLAT_ARM_TRUSTED_ROM_BASE \ 3681eb735d7SRoberto Vargas + (PLAT_ARM_TRUSTED_ROM_SIZE - \ 3691eb735d7SRoberto Vargas PLAT_ARM_MAX_ROMLIB_RO_SIZE)) 370b4315306SDan Handley /* 371ecf70f7bSVikram Kanigiri * Put BL1 RW at the top of the Trusted SRAM. 372b4315306SDan Handley */ 373b4315306SDan Handley #define BL1_RW_BASE (ARM_BL_RAM_BASE + \ 374b4315306SDan Handley ARM_BL_RAM_SIZE - \ 3751eb735d7SRoberto Vargas (PLAT_ARM_MAX_BL1_RW_SIZE +\ 3761eb735d7SRoberto Vargas PLAT_ARM_MAX_ROMLIB_RW_SIZE)) 3771eb735d7SRoberto Vargas #define BL1_RW_LIMIT (ARM_BL_RAM_BASE + \ 3781eb735d7SRoberto Vargas (ARM_BL_RAM_SIZE - PLAT_ARM_MAX_ROMLIB_RW_SIZE)) 3791eb735d7SRoberto Vargas 3801eb735d7SRoberto Vargas #define ROMLIB_RO_BASE BL1_RO_LIMIT 3811eb735d7SRoberto Vargas #define ROMLIB_RO_LIMIT (PLAT_ARM_TRUSTED_ROM_BASE + PLAT_ARM_TRUSTED_ROM_SIZE) 3821eb735d7SRoberto Vargas 3831eb735d7SRoberto Vargas #define ROMLIB_RW_BASE (BL1_RW_BASE + PLAT_ARM_MAX_BL1_RW_SIZE) 3841eb735d7SRoberto Vargas #define ROMLIB_RW_END (ROMLIB_RW_BASE + PLAT_ARM_MAX_ROMLIB_RW_SIZE) 385b4315306SDan Handley 386b4315306SDan Handley /******************************************************************************* 387b4315306SDan Handley * BL2 specific defines. 388b4315306SDan Handley ******************************************************************************/ 389c099cd39SSoby Mathew #if BL2_AT_EL3 39042be6fc5SDimitris Papastamos /* Put BL2 towards the middle of the Trusted SRAM */ 391c099cd39SSoby Mathew #define BL2_BASE (ARM_TRUSTED_SRAM_BASE + \ 39242be6fc5SDimitris Papastamos (PLAT_ARM_TRUSTED_SRAM_SIZE >> 1) + 0x2000) 393c099cd39SSoby Mathew #define BL2_LIMIT (ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE) 394c099cd39SSoby Mathew 395c099cd39SSoby Mathew #else 3964518dd9aSDavid Wang /* 3974518dd9aSDavid Wang * Put BL2 just below BL1. 3984518dd9aSDavid Wang */ 3994518dd9aSDavid Wang #define BL2_BASE (BL1_RW_BASE - PLAT_ARM_MAX_BL2_SIZE) 4004518dd9aSDavid Wang #define BL2_LIMIT BL1_RW_BASE 4014518dd9aSDavid Wang #endif 402b4315306SDan Handley 403b4315306SDan Handley /******************************************************************************* 404d178637dSJuan Castillo * BL31 specific defines. 405b4315306SDan Handley ******************************************************************************/ 4060c1f197aSMadhukar Pappireddy #if ARM_BL31_IN_DRAM || SEPARATE_NOBITS_REGION 4074518dd9aSDavid Wang /* 4084518dd9aSDavid Wang * Put BL31 at the bottom of TZC secured DRAM 4094518dd9aSDavid Wang */ 4104518dd9aSDavid Wang #define BL31_BASE ARM_AP_TZC_DRAM1_BASE 4114518dd9aSDavid Wang #define BL31_LIMIT (ARM_AP_TZC_DRAM1_BASE + \ 4124518dd9aSDavid Wang PLAT_ARM_MAX_BL31_SIZE) 4130c1f197aSMadhukar Pappireddy /* 4140c1f197aSMadhukar Pappireddy * For SEPARATE_NOBITS_REGION, BL31 PROGBITS are loaded in TZC secured DRAM. 4150c1f197aSMadhukar Pappireddy * And BL31 NOBITS are loaded in Trusted SRAM such that BL2 is overwritten. 4160c1f197aSMadhukar Pappireddy */ 4170c1f197aSMadhukar Pappireddy #if SEPARATE_NOBITS_REGION 4180c1f197aSMadhukar Pappireddy #define BL31_NOBITS_BASE BL2_BASE 4190c1f197aSMadhukar Pappireddy #define BL31_NOBITS_LIMIT BL2_LIMIT 4200c1f197aSMadhukar Pappireddy #endif /* SEPARATE_NOBITS_REGION */ 421fd5763eaSQixiang Xu #elif (RESET_TO_BL31) 422133a5c68SManish Pandey /* Ensure Position Independent support (PIE) is enabled for this config.*/ 423133a5c68SManish Pandey # if !ENABLE_PIE 424133a5c68SManish Pandey # error "BL31 must be a PIE if RESET_TO_BL31=1." 425133a5c68SManish Pandey #endif 426fd5763eaSQixiang Xu /* 42755cf015cSSoby Mathew * Since this is PIE, we can define BL31_BASE to 0x0 since this macro is solely 428d4580d17SSoby Mathew * used for building BL31 and not used for loading BL31. 429fd5763eaSQixiang Xu */ 43055cf015cSSoby Mathew # define BL31_BASE 0x0 43155cf015cSSoby Mathew # define BL31_LIMIT PLAT_ARM_MAX_BL31_SIZE 4324518dd9aSDavid Wang #else 433c099cd39SSoby Mathew /* Put BL31 below BL2 in the Trusted SRAM.*/ 434c099cd39SSoby Mathew #define BL31_BASE ((ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)\ 435c099cd39SSoby Mathew - PLAT_ARM_MAX_BL31_SIZE) 436c099cd39SSoby Mathew #define BL31_PROGBITS_LIMIT BL2_BASE 43742be6fc5SDimitris Papastamos /* 43842be6fc5SDimitris Papastamos * For BL2_AT_EL3 make sure the BL31 can grow up until BL2_BASE. This is 43942be6fc5SDimitris Papastamos * because in the BL2_AT_EL3 configuration, BL2 is always resident. 44042be6fc5SDimitris Papastamos */ 44142be6fc5SDimitris Papastamos #if BL2_AT_EL3 44242be6fc5SDimitris Papastamos #define BL31_LIMIT BL2_BASE 44342be6fc5SDimitris Papastamos #else 444b4315306SDan Handley #define BL31_LIMIT (ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE) 4454518dd9aSDavid Wang #endif 44642be6fc5SDimitris Papastamos #endif 447b4315306SDan Handley 448402b3cf8SJulius Werner #if !defined(__aarch64__) || JUNO_AARCH32_EL3_RUNTIME 449b4315306SDan Handley /******************************************************************************* 4505744e874SSoby Mathew * BL32 specific defines for EL3 runtime in AArch32 mode 4515744e874SSoby Mathew ******************************************************************************/ 4525744e874SSoby Mathew # if RESET_TO_SP_MIN && !JUNO_AARCH32_EL3_RUNTIME 453c099cd39SSoby Mathew /* 454c099cd39SSoby Mathew * SP_MIN is the only BL image in SRAM. Allocate the whole of SRAM (excluding 455c099cd39SSoby Mathew * the page reserved for fw_configs) to BL32 456c099cd39SSoby Mathew */ 4575b8d50e4SSathees Balya # define BL32_BASE ARM_FW_CONFIG_LIMIT 4585744e874SSoby Mathew # define BL32_LIMIT (ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE) 4595744e874SSoby Mathew # else 460c099cd39SSoby Mathew /* Put BL32 below BL2 in the Trusted SRAM.*/ 461c099cd39SSoby Mathew # define BL32_BASE ((ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)\ 462c099cd39SSoby Mathew - PLAT_ARM_MAX_BL32_SIZE) 463c099cd39SSoby Mathew # define BL32_PROGBITS_LIMIT BL2_BASE 4645744e874SSoby Mathew # define BL32_LIMIT (ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE) 4655744e874SSoby Mathew # endif /* RESET_TO_SP_MIN && !JUNO_AARCH32_EL3_RUNTIME */ 4665744e874SSoby Mathew 4675744e874SSoby Mathew #else 4685744e874SSoby Mathew /******************************************************************************* 4695744e874SSoby Mathew * BL32 specific defines for EL3 runtime in AArch64 mode 470b4315306SDan Handley ******************************************************************************/ 471b4315306SDan Handley /* 472b4315306SDan Handley * On ARM standard platforms, the TSP can execute from Trusted SRAM, 473b4315306SDan Handley * Trusted DRAM (if available) or the DRAM region secured by the TrustZone 474b4315306SDan Handley * controller. 475b4315306SDan Handley */ 476538b0020SPaul Beesley # if SPM_MM 477e29efeb1SAntonio Nino Diaz # define TSP_SEC_MEM_BASE (ARM_AP_TZC_DRAM1_BASE + ULL(0x200000)) 478e29efeb1SAntonio Nino Diaz # define TSP_SEC_MEM_SIZE (ARM_AP_TZC_DRAM1_SIZE - ULL(0x200000)) 479e29efeb1SAntonio Nino Diaz # define BL32_BASE (ARM_AP_TZC_DRAM1_BASE + ULL(0x200000)) 480e29efeb1SAntonio Nino Diaz # define BL32_LIMIT (ARM_AP_TZC_DRAM1_BASE + \ 481e29efeb1SAntonio Nino Diaz ARM_AP_TZC_DRAM1_SIZE) 482*64758c97SAchin Gupta # elif defined(SPD_spmd) 483*64758c97SAchin Gupta # define TSP_SEC_MEM_BASE (ARM_AP_TZC_DRAM1_BASE + ULL(0x200000)) 484*64758c97SAchin Gupta # define TSP_SEC_MEM_SIZE (ARM_AP_TZC_DRAM1_SIZE - ULL(0x200000)) 485*64758c97SAchin Gupta # define BL32_BASE PLAT_ARM_TRUSTED_DRAM_BASE 486*64758c97SAchin Gupta # define BL32_LIMIT (PLAT_ARM_TRUSTED_DRAM_BASE \ 487*64758c97SAchin Gupta + (UL(1) << 21)) 488e29efeb1SAntonio Nino Diaz # elif ARM_BL31_IN_DRAM 4894518dd9aSDavid Wang # define TSP_SEC_MEM_BASE (ARM_AP_TZC_DRAM1_BASE + \ 4904518dd9aSDavid Wang PLAT_ARM_MAX_BL31_SIZE) 4914518dd9aSDavid Wang # define TSP_SEC_MEM_SIZE (ARM_AP_TZC_DRAM1_SIZE - \ 4924518dd9aSDavid Wang PLAT_ARM_MAX_BL31_SIZE) 4934518dd9aSDavid Wang # define BL32_BASE (ARM_AP_TZC_DRAM1_BASE + \ 4944518dd9aSDavid Wang PLAT_ARM_MAX_BL31_SIZE) 4954518dd9aSDavid Wang # define BL32_LIMIT (ARM_AP_TZC_DRAM1_BASE + \ 4964518dd9aSDavid Wang ARM_AP_TZC_DRAM1_SIZE) 4974518dd9aSDavid Wang # elif ARM_TSP_RAM_LOCATION_ID == ARM_TRUSTED_SRAM_ID 498b4315306SDan Handley # define TSP_SEC_MEM_BASE ARM_BL_RAM_BASE 499b4315306SDan Handley # define TSP_SEC_MEM_SIZE ARM_BL_RAM_SIZE 500c099cd39SSoby Mathew # define TSP_PROGBITS_LIMIT BL31_BASE 5015b8d50e4SSathees Balya # define BL32_BASE ARM_FW_CONFIG_LIMIT 502b4315306SDan Handley # define BL32_LIMIT BL31_BASE 503b4315306SDan Handley # elif ARM_TSP_RAM_LOCATION_ID == ARM_TRUSTED_DRAM_ID 504b4315306SDan Handley # define TSP_SEC_MEM_BASE PLAT_ARM_TRUSTED_DRAM_BASE 505b4315306SDan Handley # define TSP_SEC_MEM_SIZE PLAT_ARM_TRUSTED_DRAM_SIZE 506b4315306SDan Handley # define BL32_BASE PLAT_ARM_TRUSTED_DRAM_BASE 507b4315306SDan Handley # define BL32_LIMIT (PLAT_ARM_TRUSTED_DRAM_BASE \ 508f21c6321SAntonio Nino Diaz + (UL(1) << 21)) 509b4315306SDan Handley # elif ARM_TSP_RAM_LOCATION_ID == ARM_DRAM_ID 510b4315306SDan Handley # define TSP_SEC_MEM_BASE ARM_AP_TZC_DRAM1_BASE 511b4315306SDan Handley # define TSP_SEC_MEM_SIZE ARM_AP_TZC_DRAM1_SIZE 512b4315306SDan Handley # define BL32_BASE ARM_AP_TZC_DRAM1_BASE 513b4315306SDan Handley # define BL32_LIMIT (ARM_AP_TZC_DRAM1_BASE + \ 514b4315306SDan Handley ARM_AP_TZC_DRAM1_SIZE) 515b4315306SDan Handley # else 516b4315306SDan Handley # error "Unsupported ARM_TSP_RAM_LOCATION_ID value" 517b4315306SDan Handley # endif 518402b3cf8SJulius Werner #endif /* !__aarch64__ || JUNO_AARCH32_EL3_RUNTIME */ 519b4315306SDan Handley 520e29efeb1SAntonio Nino Diaz /* 521e29efeb1SAntonio Nino Diaz * BL32 is mandatory in AArch32. In AArch64, undefine BL32_BASE if there is no 522*64758c97SAchin Gupta * SPD and no SPM-MM, as they are the only ones that can be used as BL32. 523e29efeb1SAntonio Nino Diaz */ 524402b3cf8SJulius Werner #if defined(__aarch64__) && !JUNO_AARCH32_EL3_RUNTIME 525538b0020SPaul Beesley # if defined(SPD_none) && !SPM_MM 52681d139d5SAntonio Nino Diaz # undef BL32_BASE 527538b0020SPaul Beesley # endif /* defined(SPD_none) && !SPM_MM */ 528402b3cf8SJulius Werner #endif /* defined(__aarch64__) && !JUNO_AARCH32_EL3_RUNTIME */ 52981d139d5SAntonio Nino Diaz 530436223deSYatharth Kochar /******************************************************************************* 531436223deSYatharth Kochar * FWU Images: NS_BL1U, BL2U & NS_BL2U defines. 532436223deSYatharth Kochar ******************************************************************************/ 533436223deSYatharth Kochar #define BL2U_BASE BL2_BASE 5345744e874SSoby Mathew #define BL2U_LIMIT BL2_LIMIT 5355744e874SSoby Mathew 536436223deSYatharth Kochar #define NS_BL2U_BASE ARM_NS_DRAM1_BASE 537f21c6321SAntonio Nino Diaz #define NS_BL1U_BASE (PLAT_ARM_NVM_BASE + UL(0x03EB8000)) 538436223deSYatharth Kochar 539b4315306SDan Handley /* 540b4315306SDan Handley * ID of the secure physical generic timer interrupt used by the TSP. 541b4315306SDan Handley */ 542b4315306SDan Handley #define TSP_IRQ_SEC_PHY_TIMER ARM_IRQ_SEC_PHY_TIMER 543b4315306SDan Handley 544b4315306SDan Handley 545e25e6f41SVikram Kanigiri /* 546e25e6f41SVikram Kanigiri * One cache line needed for bakery locks on ARM platforms 547e25e6f41SVikram Kanigiri */ 548e25e6f41SVikram Kanigiri #define PLAT_PERCPU_BAKERY_LOCK_SIZE (1 * CACHE_WRITEBACK_GRANULE) 549e25e6f41SVikram Kanigiri 5500bef0edfSJeenu Viswambharan /* Priority levels for ARM platforms */ 5510b9ce906SJeenu Viswambharan #define PLAT_RAS_PRI 0x10 5520bef0edfSJeenu Viswambharan #define PLAT_SDEI_CRITICAL_PRI 0x60 5530bef0edfSJeenu Viswambharan #define PLAT_SDEI_NORMAL_PRI 0x70 5540bef0edfSJeenu Viswambharan 5550bef0edfSJeenu Viswambharan /* ARM platforms use 3 upper bits of secure interrupt priority */ 5560bef0edfSJeenu Viswambharan #define ARM_PRI_BITS 3 557e25e6f41SVikram Kanigiri 5580baec2abSJeenu Viswambharan /* SGI used for SDEI signalling */ 5590baec2abSJeenu Viswambharan #define ARM_SDEI_SGI ARM_IRQ_SEC_SGI_0 5600baec2abSJeenu Viswambharan 5610baec2abSJeenu Viswambharan /* ARM SDEI dynamic private event numbers */ 5620baec2abSJeenu Viswambharan #define ARM_SDEI_DP_EVENT_0 1000 5630baec2abSJeenu Viswambharan #define ARM_SDEI_DP_EVENT_1 1001 5640baec2abSJeenu Viswambharan #define ARM_SDEI_DP_EVENT_2 1002 5650baec2abSJeenu Viswambharan 5660baec2abSJeenu Viswambharan /* ARM SDEI dynamic shared event numbers */ 5670baec2abSJeenu Viswambharan #define ARM_SDEI_DS_EVENT_0 2000 5680baec2abSJeenu Viswambharan #define ARM_SDEI_DS_EVENT_1 2001 5690baec2abSJeenu Viswambharan #define ARM_SDEI_DS_EVENT_2 2002 5700baec2abSJeenu Viswambharan 5717bdf0c1fSJeenu Viswambharan #define ARM_SDEI_PRIVATE_EVENTS \ 5727bdf0c1fSJeenu Viswambharan SDEI_DEFINE_EVENT_0(ARM_SDEI_SGI), \ 5737bdf0c1fSJeenu Viswambharan SDEI_PRIVATE_EVENT(ARM_SDEI_DP_EVENT_0, SDEI_DYN_IRQ, SDEI_MAPF_DYNAMIC), \ 5747bdf0c1fSJeenu Viswambharan SDEI_PRIVATE_EVENT(ARM_SDEI_DP_EVENT_1, SDEI_DYN_IRQ, SDEI_MAPF_DYNAMIC), \ 5757bdf0c1fSJeenu Viswambharan SDEI_PRIVATE_EVENT(ARM_SDEI_DP_EVENT_2, SDEI_DYN_IRQ, SDEI_MAPF_DYNAMIC) 5767bdf0c1fSJeenu Viswambharan 5777bdf0c1fSJeenu Viswambharan #define ARM_SDEI_SHARED_EVENTS \ 5787bdf0c1fSJeenu Viswambharan SDEI_SHARED_EVENT(ARM_SDEI_DS_EVENT_0, SDEI_DYN_IRQ, SDEI_MAPF_DYNAMIC), \ 5797bdf0c1fSJeenu Viswambharan SDEI_SHARED_EVENT(ARM_SDEI_DS_EVENT_1, SDEI_DYN_IRQ, SDEI_MAPF_DYNAMIC), \ 5807bdf0c1fSJeenu Viswambharan SDEI_SHARED_EVENT(ARM_SDEI_DS_EVENT_2, SDEI_DYN_IRQ, SDEI_MAPF_DYNAMIC) 5817bdf0c1fSJeenu Viswambharan 5821083b2b3SAntonio Nino Diaz #endif /* ARM_DEF_H */ 583