Merge "meson: gxl: Fix reset and power off" into integration
authorAlexei Fedorov <Alexei.Fedorov@arm.com>
Fri, 2 Aug 2019 12:50:04 +0000 (12:50 +0000)
committerTrustedFirmware Code Review <review@review.trustedfirmware.org>
Fri, 2 Aug 2019 12:50:04 +0000 (12:50 +0000)
156 files changed:
Makefile
bl1/bl1_fwu.c
bl1/bl1_main.c
bl2/bl2_main.c
bl2u/bl2u_main.c
bl32/tsp/tsp_private.h
common/backtrace/backtrace.c
common/bl_common.c
docs/getting_started/user-guide.rst
drivers/arm/ccn/ccn.c
drivers/arm/css/sds/sds_private.h
drivers/arm/gic/v3/gicv3_main.c
drivers/arm/gic/v3/gicv3_private.h
drivers/imx/uart/imx_uart.h
drivers/renesas/rcar/delay/micro_delay.h
drivers/renesas/rcar/pwrc/pwrc.c
drivers/renesas/rcar/pwrc/pwrc.h
include/arch/aarch32/smccc_helpers.h
include/arch/aarch64/smccc_helpers.h
include/bl1/bl1.h
include/bl31/ehf.h
include/bl31/interrupt_mgmt.h
include/bl32/tsp/tsp.h
include/common/bl_common.h
include/common/debug.h
include/common/ep_info.h
include/common/interrupt_props.h
include/common/param_header.h
include/common/runtime_svc.h
include/drivers/arm/cci.h
include/drivers/arm/ccn.h
include/drivers/arm/css/sds.h
include/drivers/arm/fvp/fvp_pwrc.h
include/drivers/arm/gicv2.h
include/drivers/arm/gicv3.h
include/drivers/arm/pl011.h
include/drivers/arm/sp805.h
include/drivers/arm/tzc400.h
include/drivers/arm/tzc_dmc500.h
include/drivers/auth/mbedtls/mbedtls_config.h
include/drivers/cadence/cdns_uart.h
include/drivers/console.h
include/drivers/marvell/cache_llc.h
include/drivers/marvell/ccu.h
include/drivers/marvell/uart/a3700_console.h
include/drivers/meson/meson_console.h
include/drivers/renesas/rcar/console/console.h
include/drivers/st/stm32_console.h
include/drivers/st/stm32_gpio.h
include/drivers/ti/uart/uart_16550.h
include/lib/bakery_lock.h
include/lib/cpus/aarch32/cortex_a9.h
include/lib/cpus/aarch64/cortex_a75.h
include/lib/cpus/aarch64/cortex_hercules.h
include/lib/cpus/aarch64/cpuamu.h
include/lib/cpus/aarch64/denver.h
include/lib/cpus/errata_report.h
include/lib/el3_runtime/aarch32/context.h
include/lib/el3_runtime/aarch64/context.h
include/lib/el3_runtime/context_mgmt.h
include/lib/el3_runtime/cpu_data.h
include/lib/el3_runtime/pubsub_events.h
include/lib/extensions/ras.h
include/lib/extensions/ras_arch.h
include/lib/libc/aarch64/setjmp_.h
include/lib/libc/setjmp.h
include/lib/libfdt/fdt.h
include/lib/psci/psci.h
include/lib/psci/psci_lib.h
include/lib/runtime_instr.h
include/lib/smccc.h
include/lib/spinlock.h
include/lib/utils.h
include/lib/utils_def.h
include/lib/xlat_tables/xlat_mmu_helpers.h
include/lib/xlat_tables/xlat_tables.h
include/lib/xlat_tables/xlat_tables_arch.h
include/lib/xlat_tables/xlat_tables_defs.h
include/lib/xlat_tables/xlat_tables_v2.h
include/lib/xlat_tables/xlat_tables_v2_helpers.h
include/plat/arm/board/common/board_css_def.h
include/plat/arm/common/arm_def.h
include/plat/arm/common/plat_arm.h
include/plat/arm/css/common/css_def.h
include/plat/common/common_def.h
include/services/spm_svc.h
lib/cpus/aarch64/cortex_hercules.S
lib/cpus/errata_report.c
lib/locks/bakery/bakery_lock_normal.c
lib/optee/optee_utils.c
lib/psci/psci_common.c
lib/romlib/Makefile
lib/xlat_tables_v2/xlat_tables_context.c
lib/xlat_tables_v2/xlat_tables_utils.c
make_helpers/build_macros.mk
plat/arm/board/fvp/fvp_common.c
plat/arm/board/fvp/include/platform_def.h
plat/arm/board/fvp_ve/include/platform_def.h
plat/arm/board/juno/include/platform_def.h
plat/arm/board/juno/juno_common.c
plat/arm/board/n1sdp/include/platform_def.h
plat/arm/board/rde1edge/include/platform_def.h
plat/arm/board/rdn1edge/include/platform_def.h
plat/arm/board/sgi575/include/platform_def.h
plat/arm/board/sgm775/include/platform_def.h
plat/arm/common/arm_bl1_setup.c
plat/arm/common/arm_bl2_el3_setup.c
plat/arm/common/arm_bl2_setup.c
plat/arm/common/arm_bl2u_setup.c
plat/arm/common/arm_common.c
plat/arm/common/arm_gicv3.c
plat/arm/common/arm_nor_psci_mem_protect.c
plat/arm/common/arm_pm.c
plat/arm/common/execution_state_switch.c
plat/arm/css/sgi/include/sgi_base_platform_def.h
plat/arm/css/sgm/include/sgm_base_platform_def.h
plat/common/plat_gicv3.c
plat/common/plat_psci_common.c
plat/hisilicon/hikey/hikey_bl2_setup.c
plat/hisilicon/hikey/include/hikey_layout.h
plat/hisilicon/hikey/include/hisi_pwrc.h
plat/hisilicon/hikey960/hikey960_bl2_setup.c
plat/hisilicon/hikey960/include/platform_def.h
plat/hisilicon/poplar/bl2_plat_setup.c
plat/hisilicon/poplar/include/platform_def.h
plat/imx/common/include/imx8_lpuart.h
plat/imx/common/include/imx_uart.h
plat/intel/soc/agilex/bl31_plat_setup.c
plat/layerscape/common/include/ls_16550.h
plat/layerscape/common/ls_bl1_setup.c
plat/layerscape/common/ls_bl2_setup.c
plat/layerscape/common/ls_common.c
plat/marvell/a3700/common/include/platform_def.h
plat/marvell/a8k/common/include/platform_def.h
plat/mediatek/mt8183/drivers/mcsi/mcsi.h
plat/nvidia/tegra/include/drivers/memctrl_v2.h
plat/nvidia/tegra/include/tegra_platform.h
plat/qemu/qemu_bl1_setup.c
plat/qemu/qemu_bl2_mem_params_desc.c
plat/qemu/qemu_bl2_setup.c
plat/qemu/qemu_common.c
plat/renesas/rcar/include/platform_def.h
plat/rockchip/common/include/plat_private.h
plat/rockchip/common/pmusram/cpus_on_fixed_addr.h
plat/socionext/uniphier/uniphier_bl31_setup.c
plat/socionext/uniphier/uniphier_gicv3.c
plat/socionext/uniphier/uniphier_io_storage.c
plat/socionext/uniphier/uniphier_nand.c
plat/socionext/uniphier/uniphier_psci.c
plat/st/stm32mp1/stm32mp1_def.h
services/spd/opteed/opteed_private.h
services/spd/tlkd/tlkd_private.h
services/spd/tspd/tspd_private.h
services/std_svc/sdei/sdei_private.h
services/std_svc/spm/spm_private.h
services/std_svc/spm_mm/spm_private.h

index aca57b697680e126d3a14606f203e599c4b83bde..43ff8d2ffd0a5124170a35931bc882d0dc046f77 100644 (file)
--- a/Makefile
+++ b/Makefile
@@ -273,8 +273,7 @@ endif
 CPPFLAGS               =       ${DEFINES} ${INCLUDES} ${MBEDTLS_INC} -nostdinc         \
                                -Wmissing-include-dirs $(ERRORS) $(WARNINGS)
 ASFLAGS                        +=      $(CPPFLAGS) $(ASFLAGS_$(ARCH))                  \
-                               -D__ASSEMBLY__ -ffreestanding                   \
-                               -Wa,--fatal-warnings
+                               -ffreestanding -Wa,--fatal-warnings
 TF_CFLAGS              +=      $(CPPFLAGS) $(TF_CFLAGS_$(ARCH))                \
                                -ffreestanding -fno-builtin -Wall -std=gnu99    \
                                -Os -ffunction-sections -fdata-sections
@@ -735,12 +734,6 @@ else
                 $(eval $(call add_define,PRELOADED_BL33_BASE))
         endif
 endif
-# Define the AARCH32/AARCH64 flag based on the ARCH flag
-ifeq (${ARCH},aarch32)
-        $(eval $(call add_define,AARCH32))
-else
-        $(eval $(call add_define,AARCH64))
-endif
 
 # Define the DYN_DISABLE_AUTH flag only if set.
 ifeq (${DYN_DISABLE_AUTH},1)
@@ -763,14 +756,22 @@ all: msg_start
 msg_start:
        @echo "Building ${PLAT}"
 
-# Check if deprecated declarations and cpp warnings should be treated as error or not.
 ifeq (${ERROR_DEPRECATED},0)
+# Check if deprecated declarations and cpp warnings should be treated as error or not.
 ifneq ($(findstring clang,$(notdir $(CC))),)
     CPPFLAGS           +=      -Wno-error=deprecated-declarations
 else
     CPPFLAGS           +=      -Wno-error=deprecated-declarations -Wno-error=cpp
 endif
+# __ASSEMBLY__ is deprecated in favor of the compiler-builtin __ASSEMBLER__.
+ASFLAGS        += -D__ASSEMBLY__
+# AARCH32/AARCH64 macros are deprecated in favor of the compiler-builtin __aarch64__.
+ifeq (${ARCH},aarch32)
+        $(eval $(call add_define,AARCH32))
+else
+        $(eval $(call add_define,AARCH64))
 endif
+endif # !ERROR_DEPRECATED
 
 $(eval $(call MAKE_LIB_DIRS))
 $(eval $(call MAKE_LIB,c))
index 76a43753799d4ab15f1b70f77d7573a34006d71c..d222b9c525cbb0571818ae946953b0b44856e57e 100644 (file)
@@ -520,7 +520,7 @@ static int bl1_fwu_image_execute(unsigned int image_id,
 
        INFO("BL1-FWU: Executing Secure image\n");
 
-#ifdef AARCH64
+#ifdef __aarch64__
        /* Save NS-EL1 system registers. */
        cm_el1_sysregs_context_save(NON_SECURE);
 #endif
@@ -531,7 +531,7 @@ static int bl1_fwu_image_execute(unsigned int image_id,
        /* Update the secure image id. */
        sec_exec_image_id = image_id;
 
-#ifdef AARCH64
+#ifdef __aarch64__
        *handle = cm_get_context(SECURE);
 #else
        *handle = smc_get_ctx(SECURE);
@@ -584,7 +584,7 @@ static register_t bl1_fwu_image_resume(register_t image_param,
        INFO("BL1-FWU: Resuming %s world context\n",
                (resume_sec_state == SECURE) ? "secure" : "normal");
 
-#ifdef AARCH64
+#ifdef __aarch64__
        /* Save the EL1 system registers of calling world. */
        cm_el1_sysregs_context_save(caller_sec_state);
 
@@ -641,7 +641,7 @@ static int bl1_fwu_sec_image_done(void **handle, unsigned int flags)
        sec_exec_image_id = INVALID_IMAGE_ID;
 
        INFO("BL1-FWU: Resuming Normal world context\n");
-#ifdef AARCH64
+#ifdef __aarch64__
        /*
         * Secure world is done so no need to save the context.
         * Just restore the Non-Secure context.
index fce14f55f0f53d67392bf3c27ddfcb9f53c82dcf..d44b46dc96edf3ca472fe09cd96e2eef2e6f4798 100644 (file)
@@ -59,7 +59,7 @@ void bl1_setup(void)
        /* Perform early platform-specific setup */
        bl1_early_platform_setup();
 
-#ifdef AARCH64
+#ifdef __aarch64__
        /*
         * Update pointer authentication key before the MMU is enabled. It is
         * saved in the rodata section, that can be writen before enabling the
@@ -67,7 +67,7 @@ void bl1_setup(void)
         * in the early platform setup.
         */
        bl_handle_pauth();
-#endif /* AARCH64 */
+#endif /* __aarch64__ */
 
        /* Perform late platform-specific setup */
        bl1_plat_arch_setup();
@@ -97,10 +97,10 @@ void bl1_main(void)
        /*
         * Ensure that MMU/Caches and coherency are turned on
         */
-#ifdef AARCH32
-       val = read_sctlr();
-#else
+#ifdef __aarch64__
        val = read_sctlr_el3();
+#else
+       val = read_sctlr();
 #endif
        assert(val & SCTLR_M_BIT);
        assert(val & SCTLR_C_BIT);
@@ -198,11 +198,11 @@ static void bl1_load_bl2(void)
  ******************************************************************************/
 void bl1_print_next_bl_ep_info(const entry_point_info_t *bl_ep_info)
 {
-#ifdef AARCH32
-       NOTICE("BL1: Booting BL32\n");
-#else
+#ifdef __aarch64__
        NOTICE("BL1: Booting BL31\n");
-#endif /* AARCH32 */
+#else
+       NOTICE("BL1: Booting BL32\n");
+#endif /* __aarch64__ */
        print_entry_point_info(bl_ep_info);
 }
 
index 7d8d60c1914fc549b9e303a3b189aa05ebbb4b89..79b0e717bbd7ce214a753030e5d4c38a4ba4629d 100644 (file)
 
 #include "bl2_private.h"
 
-#ifdef AARCH32
-#define NEXT_IMAGE     "BL32"
-#else
+#ifdef __aarch64__
 #define NEXT_IMAGE     "BL31"
+#else
+#define NEXT_IMAGE     "BL32"
 #endif
 
 #if !BL2_AT_EL3
@@ -31,7 +31,7 @@ void bl2_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
        /* Perform early platform-specific setup */
        bl2_early_platform_setup2(arg0, arg1, arg2, arg3);
 
-#ifdef AARCH64
+#ifdef __aarch64__
        /*
         * Update pointer authentication key before the MMU is enabled. It is
         * saved in the rodata section, that can be writen before enabling the
@@ -39,7 +39,7 @@ void bl2_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
         * in the early platform setup.
         */
        bl_handle_pauth();
-#endif /* AARCH64 */
+#endif /* __aarch64__ */
 
        /* Perform late platform-specific setup */
        bl2_plat_arch_setup();
@@ -55,7 +55,7 @@ void bl2_el3_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
        /* Perform early platform-specific setup */
        bl2_el3_early_platform_setup(arg0, arg1, arg2, arg3);
 
-#ifdef AARCH64
+#ifdef __aarch64__
        /*
         * Update pointer authentication key before the MMU is enabled. It is
         * saved in the rodata section, that can be writen before enabling the
@@ -63,7 +63,7 @@ void bl2_el3_setup(u_register_t arg0, u_register_t arg1, u_register_t arg2,
         * in the early platform setup.
         */
        bl_handle_pauth();
-#endif /* AARCH64 */
+#endif /* __aarch64__ */
 
        /* Perform late platform-specific setup */
        bl2_el3_plat_arch_setup();
@@ -97,14 +97,14 @@ void bl2_main(void)
        next_bl_ep_info = bl2_load_images();
 
 #if !BL2_AT_EL3
-#ifdef AARCH32
+#ifndef __aarch64__
        /*
         * For AArch32 state BL1 and BL2 share the MMU setup.
         * Given that BL2 does not map BL1 regions, MMU needs
         * to be disabled in order to go back to BL1.
         */
        disable_mmu_icache_secure();
-#endif /* AARCH32 */
+#endif /* !__aarch64__ */
 
        console_flush();
 
index d3c83ccc568c4a22cd99814b6c769d32927f714d..d49c9ce9e4b38e26920dbfbef23cc6629e3ea4b6 100644 (file)
@@ -45,14 +45,14 @@ void bl2u_main(void)
 
        console_flush();
 
-#ifdef AARCH32
+#ifndef __aarch64__
        /*
         * For AArch32 state BL1 and BL2U share the MMU setup.
         * Given that BL2U does not map BL1 regions, MMU needs
         * to be disabled in order to go back to BL1.
         */
        disable_mmu_icache_secure();
-#endif /* AARCH32 */
+#endif /* !__aarch64__ */
 
        /*
         * Indicate that BL2U is done and resume back to
index e39f29166cf036e2ed5af516ec2c85d01f2b0adc..cbd527f37e888c850cd5182b1b7decd04ca98985 100644 (file)
@@ -20,7 +20,7 @@
 #define TSP_ARGS_END           0x40
 
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -148,6 +148,6 @@ tsp_args_t *tsp_system_off_main(uint64_t arg0,
                                uint64_t arg7);
 
 uint64_t tsp_main(void);
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* TSP_PRIVATE_H */
index 53f8b0719d24e1eb545b90c61cfc482c86bcf57a..506d4a4822dae8067c6171c203e548c1e6ff6c04 100644 (file)
@@ -93,7 +93,7 @@ static const char *get_el_str(unsigned int el)
  * Returns true if the address points to a virtual address that can be read at
  * the current EL, false otherwise.
  */
-#ifdef AARCH64
+#ifdef __aarch64__
 static bool is_address_readable(uintptr_t addr)
 {
        unsigned int el = get_current_el();
@@ -123,7 +123,7 @@ static bool is_address_readable(uintptr_t addr)
 
        return true;
 }
-#else /* if AARCH32 */
+#else /* !__aarch64__ */
 static bool is_address_readable(uintptr_t addr)
 {
        unsigned int el = get_current_el();
@@ -144,7 +144,7 @@ static bool is_address_readable(uintptr_t addr)
 
        return true;
 }
-#endif
+#endif /* __aarch64__ */
 
 /*
  * Returns true if all the bytes in a given object are in mapped memory and an
@@ -207,7 +207,7 @@ static bool is_valid_frame_record(struct frame_record *fr)
  */
 static struct frame_record *adjust_frame_record(struct frame_record *fr)
 {
-#ifdef AARCH64
+#ifdef __aarch64__
        return fr;
 #else
        return (struct frame_record *)((uintptr_t)fr - 4U);
index 61f031bfd10143c39dfd3972dbb291ea3cddf730..a09cd7171d3e0dc44cc76dfc5942bfd4939777a8 100644 (file)
@@ -236,7 +236,7 @@ void print_entry_point_info(const entry_point_info_t *ep_info)
        PRINT_IMAGE_ARG(1);
        PRINT_IMAGE_ARG(2);
        PRINT_IMAGE_ARG(3);
-#ifndef AARCH32
+#ifdef __aarch64__
        PRINT_IMAGE_ARG(4);
        PRINT_IMAGE_ARG(5);
        PRINT_IMAGE_ARG(6);
@@ -245,7 +245,7 @@ void print_entry_point_info(const entry_point_info_t *ep_info)
 #undef PRINT_IMAGE_ARG
 }
 
-#ifdef AARCH64
+#ifdef __aarch64__
 /*******************************************************************************
  * Handle all possible cases regarding ARMv8.3-PAuth.
  ******************************************************************************/
@@ -293,4 +293,4 @@ void bl_handle_pauth(void)
 
 #endif /* ENABLE_PAUTH */
 }
-#endif /* AARCH64 */
+#endif /* __aarch64__ */
index 858996c817c77c0efc10acc39a6c55314a8a2f67..b447f149386b11cbc44257f52dab9f97aaedba0e 100644 (file)
@@ -50,12 +50,13 @@ Install the required packages to build TF-A with the following command:
 
 TF-A has been tested with Linaro Release 18.04.
 
-Download and install the AArch32 or AArch64 little-endian GCC cross compiler. If
-you would like to use the latest features available, download GCC 8.2-2019.01
-compiler from `arm Developer page`_. Otherwise, the `Linaro Release Notes`_
-documents which version of the compiler to use for a given Linaro Release. Also,
-these `Linaro instructions`_ provide further guidance and a script, which can be
-used to download Linaro deliverables automatically.
+Download and install the AArch32 (arm-eabi) or AArch64 little-endian
+(aarch64-linux-gnu) GCC cross compiler. If you would like to use the latest
+features available, download GCC 8.3-2019.03 compiler from
+`arm Developer page`_. Otherwise, the `Linaro Release Notes`_ documents which
+version of the compiler to use for a given Linaro Release. Also, these
+`Linaro instructions`_ provide further guidance and a script, which can be used
+to download Linaro deliverables automatically.
 
 Optionally, TF-A can be built using clang version 4.0 or newer or Arm
 Compiler 6. See instructions below on how to switch the default compiler.
@@ -138,7 +139,7 @@ Building TF-A
 
    .. code:: shell
 
-       export CROSS_COMPILE=<path-to-aarch32-gcc>/bin/arm-linux-gnueabihf-
+       export CROSS_COMPILE=<path-to-aarch32-gcc>/bin/arm-eabi-
 
    It is possible to build TF-A using Clang or Arm Compiler 6. To do so
    ``CC`` needs to point to the clang or armclang binary, which will
index d184054ee9b6802c75ba8e906844cc25272fd703..d0c5abc7c5f992af732f7e645d52f70bcb75e174 100644 (file)
@@ -17,7 +17,7 @@
 #include "ccn_private.h"
 
 static const ccn_desc_t *ccn_plat_desc;
-#if defined(IMAGE_BL31) || (defined(AARCH32) && defined(IMAGE_BL32))
+#if defined(IMAGE_BL31) || (!defined(__aarch64__) && defined(IMAGE_BL32))
 DEFINE_BAKERY_LOCK(ccn_lock);
 #endif
 
@@ -264,7 +264,7 @@ static void ccn_snoop_dvm_do_op(unsigned long long rn_id_map,
        assert(ccn_plat_desc);
        assert(ccn_plat_desc->periphbase);
 
-#if defined(IMAGE_BL31) || (defined(AARCH32) && defined(IMAGE_BL32))
+#if defined(IMAGE_BL31) || (!defined(__aarch64__) && defined(IMAGE_BL32))
        bakery_lock_get(&ccn_lock);
 #endif
        start_region_id = region_id;
@@ -284,7 +284,7 @@ static void ccn_snoop_dvm_do_op(unsigned long long rn_id_map,
                                                   rn_id_map);
        }
 
-#if defined(IMAGE_BL31) || (defined(AARCH32) && defined(IMAGE_BL32))
+#if defined(IMAGE_BL31) || (!defined(__aarch64__) && defined(IMAGE_BL32))
        bakery_lock_release(&ccn_lock);
 #endif
 }
index 2101dd049e1889c31fabc01ea2f771204a929055..d801a04ddd23e90fa031cd552dcf771e5a605439 100644 (file)
@@ -58,7 +58,7 @@
 #define SDS_REGION_REGIONSIZE_OFFSET           0x4
 #define SDS_REGION_DESC_SIZE                   0x8
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stddef.h>
 #include <stdint.h>
 
@@ -95,6 +95,6 @@ typedef struct region_descriptor {
        & SDS_REGION_SCH_VERSION_MASK)
 #define GET_SDS_REGION_SIZE(region)            ((((region_desc_t *)(region))->reg[1]))
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* SDS_PRIVATE_H */
index a94dbf6791666d4583dac2919970b41c619a4751..94a20ba07ea4aa1f5ac6b22bb1df34fb8832b8f3 100644 (file)
@@ -73,12 +73,12 @@ void __init gicv3_driver_init(const gicv3_driver_data_t *plat_driver_data)
               plat_driver_data->interrupt_props != NULL : 1);
 
        /* Check for system register support */
-#ifdef AARCH32
-       assert((read_id_pfr1() & (ID_PFR1_GIC_MASK << ID_PFR1_GIC_SHIFT)) != 0U);
-#else
+#ifdef __aarch64__
        assert((read_id_aa64pfr0_el1() &
                        (ID_AA64PFR0_GIC_MASK << ID_AA64PFR0_GIC_SHIFT)) != 0U);
-#endif /* AARCH32 */
+#else
+       assert((read_id_pfr1() & (ID_PFR1_GIC_MASK << ID_PFR1_GIC_SHIFT)) != 0U);
+#endif /* __aarch64__ */
 
        /* The GIC version should be 3.0 */
        gic_version = gicd_read_pidr2(plat_driver_data->gicd_base);
index 92066e1f2f9f9e2a7defce6583dfbdd64842f2d3..327a9a1498bf64e89eb40953e8f30926a7ceaf6a 100644 (file)
@@ -40,16 +40,16 @@ static inline u_register_t gicd_irouter_val_from_mpidr(u_register_t mpidr,
  * Macro to convert a GICR_TYPER affinity value into a MPIDR value. Bits[31:24]
  * are zeroes.
  */
-#ifdef AARCH32
+#ifdef __aarch64__
 static inline u_register_t mpidr_from_gicr_typer(uint64_t typer_val)
 {
-       return (((typer_val) >> 32) & U(0xffffff));
+       return (((typer_val >> 56) & MPIDR_AFFLVL_MASK) << MPIDR_AFF3_SHIFT) |
+               ((typer_val >> 32) & U(0xffffff));
 }
 #else
 static inline u_register_t mpidr_from_gicr_typer(uint64_t typer_val)
 {
-       return (((typer_val >> 56) & MPIDR_AFFLVL_MASK) << MPIDR_AFF3_SHIFT) |
-               ((typer_val >> 32) & U(0xffffff));
+       return (((typer_val) >> 32) & U(0xffffff));
 }
 #endif
 
index b71504c7f7609e9de7d22fd74bccdbc9db20fb03..4f6d3de2e581d3e813613fc6446a6bb53a93ee11 100644 (file)
 #define IMX_UART_TS_RXFULL     BIT(3)
 #define IMX_UART_TS_SOFTRST    BIT(0)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 typedef struct {
        console_t console;
@@ -163,6 +163,6 @@ int console_imx_uart_register(uintptr_t baseaddr,
                              uint32_t clock,
                              uint32_t baud,
                              console_imx_uart_t *console);
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* IMX_UART_H */
index 193daba631469a8cbc89e81a36d3d49a8ad543f4..37b71f80a68ae667f3c0b1c2e0e49e3285048da0 100644 (file)
@@ -7,7 +7,7 @@
 #ifndef MICRO_DELAY_H
 #define MICRO_DELAY_H
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stdint.h>
 void rcar_micro_delay(uint64_t micro_sec);
 #endif
index f4c9d3abcb70132d15814a5864101c8f9d39c4b6..32e04a73a73cdf1bfd07c5e2803f382780a3e381 100644 (file)
@@ -148,7 +148,7 @@ RCAR_INSTANTIATE_LOCK
 #define IS_CA57(c)     ((c) == RCAR_CLUSTER_CA57)
 #define IS_CA53(c)     ((c) == RCAR_CLUSTER_CA53)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 IMPORT_SYM(unsigned long, __system_ram_start__, SYSTEM_RAM_START);
 IMPORT_SYM(unsigned long, __system_ram_end__, SYSTEM_RAM_END);
 IMPORT_SYM(unsigned long, __SRAM_COPY_START__, SRAM_COPY_START);
index e67c6ef2d60c97f1208d561906011b641380ce40..2b817839724dcc56c62fce3a748bf82b85b0a109 100644 (file)
@@ -38,7 +38,7 @@
 #define        RCAR_CLUSTER_CA53       (1U)
 #define        RCAR_CLUSTER_CA57       (2U)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 void rcar_pwrc_disable_interrupt_wakeup(uint64_t mpidr);
 void rcar_pwrc_enable_interrupt_wakeup(uint64_t mpidr);
 void rcar_pwrc_clusteroff(uint64_t mpidr);
index d3e5e59c5327b6e3b716369d7200651fb980f81d..b2ee3cfe0496a0016603c547fb7736795cea04a7 100644 (file)
@@ -24,7 +24,7 @@
 #define SMC_CTX_PMCR           U(0x88)
 #define SMC_CTX_SIZE           U(0x90)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -156,6 +156,6 @@ void smc_set_next_ctx(unsigned int security_state);
 /* Get the pointer to next `smc_ctx_t` already set by `smc_set_next_ctx()`. */
 void *smc_get_next_ctx(void);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* SMCCC_HELPERS_H */
index e28697d7ef0885a6b891f1f2549bb5e4a56ae7fe..fac6fd9cf9f236bc99cee62133d197747c97cc68 100644 (file)
@@ -9,7 +9,7 @@
 
 #include <lib/smccc.h>
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdbool.h>
 
@@ -82,6 +82,6 @@
                _x4 = read_ctx_reg(regs, CTX_GPREG_X4);         \
        } while (false)
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* SMCCC_HELPERS_H */
index 937b8c7e8c12e0bde4b3bb991e22e9b5acc60500..d81f434045088be859fe292e2a6bae385ce49ce6 100644 (file)
@@ -61,7 +61,7 @@
 #define is_fwu_fid(_fid) \
     ((_fid >= FWU_SMC_FID_START) && (_fid <= FWU_SMC_FID_END))
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <lib/cassert.h>
 
@@ -98,5 +98,5 @@ CASSERT(FWU_NUM_SMC_CALLS ==  \
 void bl1_calc_bl2_mem_layout(const meminfo_t *bl1_mem_layout,
                        meminfo_t *bl2_mem_layout);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 #endif /* BL1_H */
index ee00d09361b7a35fcc4f557b74bb4b78243cf343..c13d28c357b957c77c941183bfbb430618511fd8 100644 (file)
@@ -7,7 +7,7 @@
 #ifndef EHF_H
 #define EHF_H
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <cdefs.h>
 #include <stdint.h>
@@ -87,6 +87,6 @@ void ehf_register_priority_handler(unsigned int pri, ehf_handler_t handler);
 void ehf_allow_ns_preemption(uint64_t preempt_ret_code);
 unsigned int ehf_is_ns_preemption_allowed(void);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* EHF_H */
index b1683cc11cd8bd80ce16ea492a992050fdcbe86b..8bb1bab248afe41908e54a3ede8dafcf521f99e1 100644 (file)
@@ -79,7 +79,7 @@
 #define get_interrupt_src_ss(flag)     (((flag) >> INTR_SRC_SS_FLAG_SHIFT) & \
                                         INTR_SRC_SS_FLAG_MASK)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <errno.h>
 #include <stdint.h>
@@ -143,5 +143,5 @@ interrupt_type_handler_t get_interrupt_type_handler(uint32_t type);
 int disable_intr_rm_local(uint32_t type, uint32_t security_state);
 int enable_intr_rm_local(uint32_t type, uint32_t security_state);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 #endif /* INTERRUPT_MGMT_H */
index 18d3079e2200c7242fb153bbc45254b4dc13d0d5..637e14abf798cf8745c798bf43e9ed89b744f528 100644 (file)
@@ -84,7 +84,7 @@
 #define TOS_CALL_VERSION       0xbf00ff03 /* Trusted OS Call Version */
 
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -106,6 +106,6 @@ typedef struct tsp_vectors {
 
 void tsp_setup(void);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* TSP_H */
index eb96df0b11f55bcc1286d41b7df0fb73d9f506a2..896a03f0a3c4b82955aeda4662a19e8e69599339 100644 (file)
 #include <common/param_header.h>
 #include <lib/utils_def.h>
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stddef.h>
 #include <stdint.h>
 #include <lib/cassert.h>
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #include <export/common/bl_common_exp.h>
 
@@ -91,7 +91,7 @@
 #define __TEXT_END__                   Load$$__TEXT_EPILOGUE__$$Base
 #endif /* USE_ARM_LINK */
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 /*
  * Declarations of linker defined symbols to help determine memory layout of
@@ -178,6 +178,6 @@ void setup_page_tables(const struct mmap_region *bl_regions,
 
 void bl_handle_pauth(void);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* BL_COMMON_H */
index f8faf6835fd6d31a6560fa4a6521534aebfabbd8..245e698654447b68d3a5e2559b3c4fc0b5837c6b 100644 (file)
@@ -27,7 +27,7 @@
 #define LOG_LEVEL_INFO                 U(40)
 #define LOG_LEVEL_VERBOSE              U(50)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <cdefs.h>
 #include <stdarg.h>
@@ -110,5 +110,5 @@ void __dead2 __stack_chk_fail(void);
 void tf_log(const char *fmt, ...) __printflike(1, 2);
 void tf_log_set_max_level(unsigned int log_level);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 #endif /* DEBUG_H */
index 6cb903ef695bcaca5a90c737b45700dd5a515f89..4bfa1fa6ad27bb76b57c61543e05dbedc4c98535 100644 (file)
@@ -9,10 +9,10 @@
 
 #include <common/param_header.h>
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stdint.h>
 #include <lib/cassert.h>
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #include <export/common/ep_info_exp.h>
 
@@ -30,7 +30,7 @@
 #define SET_SECURITY_STATE(x, security) \
                        ((x) = ((x) & ~EP_SECURITY_MASK) | (security))
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 /*
  * Compile time assertions related to the 'entry_point_info' structure to
@@ -41,7 +41,7 @@ CASSERT(ENTRY_POINT_INFO_PC_OFFSET ==
                __builtin_offsetof(entry_point_info_t, pc), \
                assert_BL31_pc_offset_mismatch);
 
-#ifdef AARCH32
+#ifndef __aarch64__
 CASSERT(ENTRY_POINT_INFO_LR_SVC_OFFSET ==
                __builtin_offsetof(entry_point_info_t, lr_svc),
                assert_entrypoint_lr_offset_error);
@@ -56,6 +56,6 @@ CASSERT(sizeof(uintptr_t) ==
                __builtin_offsetof(entry_point_info_t, pc), \
                assert_entrypoint_and_spsr_should_be_adjacent);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* EP_INFO_H */
index 6c6a85361e42fca89db95cf8c04a9365a9e07cb7..07bafaae546eab4547ce97653aca36c39b58cafa 100644 (file)
@@ -7,7 +7,7 @@
 #ifndef INTERRUPT_PROPS_H
 #define INTERRUPT_PROPS_H
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 /* Create an interrupt property descriptor from various interrupt properties */
 #define INTR_PROP_DESC(num, pri, grp, cfg) \
@@ -25,5 +25,5 @@ typedef struct interrupt_prop {
        unsigned int intr_cfg:2;
 } interrupt_prop_t;
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 #endif /* INTERRUPT_PROPS_H */
index b8852869ad6e474f8b4c74006dca7f0ac37ec6a1..4dab4e3c4756c528000014e589bae8ee085c764b 100644 (file)
@@ -9,9 +9,9 @@
 
 #include <stdbool.h>
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stdint.h>
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #include <export/common/param_header_exp.h>
 
index e5e36c71ef4e8b2669016fcd7af612b8597fe594..472a32a1f718880af359b62c84bb4fe8f276fa86 100644 (file)
  * Constants to allow the assembler access a runtime service
  * descriptor
  */
-#ifdef AARCH32
-#define RT_SVC_SIZE_LOG2       U(4)
-#define RT_SVC_DESC_INIT       U(8)
-#define RT_SVC_DESC_HANDLE     U(12)
-#else
+#ifdef __aarch64__
 #define RT_SVC_SIZE_LOG2       U(5)
 #define RT_SVC_DESC_INIT       U(16)
 #define RT_SVC_DESC_HANDLE     U(24)
-#endif /* AARCH32 */
+#else
+#define RT_SVC_SIZE_LOG2       U(4)
+#define RT_SVC_DESC_INIT       U(8)
+#define RT_SVC_DESC_HANDLE     U(12)
+#endif /* __aarch64__ */
 #define SIZEOF_RT_SVC_DESC     (U(1) << RT_SVC_SIZE_LOG2)
 
 
@@ -39,7 +39,7 @@
  */
 #define MAX_RT_SVCS            U(128)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 /* Prototype for runtime service initializing function */
 typedef int32_t (*rt_svc_init_t)(void);
@@ -134,5 +134,5 @@ void init_crash_reporting(void);
 
 extern uint8_t rt_svc_descs_indices[MAX_RT_SVCS];
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 #endif /* RUNTIME_SVC_H */
index c5ddcfd448b731da41a3b6eed6f01ac7ccc2ed47..5aea95a0c0845370eafed79021464a2821b4472f 100644 (file)
 
 #define SLAVE_IF_UNUSED                        -1
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -121,5 +121,5 @@ void cci_init(uintptr_t base, const int *map, unsigned int num_cci_masters);
 void cci_enable_snoop_dvm_reqs(unsigned int master_id);
 void cci_disable_snoop_dvm_reqs(unsigned int master_id);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 #endif /* CCI_H */
index 9c3abac6b17f58af898c276486129b82f9e74605..7f737681ef07790b538bceff53dd9f3cbba53e69 100644 (file)
@@ -46,7 +46,7 @@
  */
 #define CCN_GET_RUN_STATE(pstate)      (pstate & 0xf)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stdint.h>
 
 /*
@@ -109,5 +109,5 @@ unsigned long long ccn_read_node_reg(node_types_t node_type,
                                        unsigned int node_id,
                                        unsigned int reg_offset);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 #endif /* CCN_H */
index 114ae9258f4f4bd912118e5ce81edcf07e085952..db4cbaaf56ed5862217f72bcf0c0bc73746118da 100644 (file)
@@ -70,7 +70,7 @@
 #define SDS_ERR_STRUCT_NOT_FOUND       -3
 #define SDS_ERR_STRUCT_NOT_FINALIZED   -4
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stddef.h>
 #include <stdint.h>
 
@@ -85,6 +85,6 @@ int sds_struct_read(uint32_t structure_id, unsigned int fld_off, void *data,
                size_t size, sds_access_mode_t mode);
 int sds_struct_write(uint32_t structure_id, unsigned int fld_off, void *data,
                size_t size, sds_access_mode_t mode);
-#endif /*__ASSEMBLY__ */
+#endif /*__ASSEMBLER__ */
 
 #endif /* SDS_H */
index ca173f36f88037f61fac927555045e53e7756918..39e2516201f99e1bcbbdffd9aa5a5c252c7cd9c7 100644 (file)
@@ -35,7 +35,7 @@
 
 #define PSYSR_INVALID          U(0xffffffff)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -50,6 +50,6 @@ void fvp_pwrc_clr_wen(u_register_t mpidr);
 unsigned int fvp_pwrc_read_psysr(u_register_t mpidr);
 unsigned int fvp_pwrc_get_cpu_wkr(u_register_t mpidr);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* FVP_PWRC_H */
index 6bc5101d13f7007e1fab7d54fc1baf0e95466e1c..ebcb216d6b3e62ba68d67f0e18717f7f70242d0f 100644 (file)
 /* Interrupt ID mask for HPPIR, AHPPIR, IAR and AIAR CPU Interface registers */
 #define INT_ID_MASK            U(0x3ff)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <cdefs.h>
 #include <stdint.h>
@@ -184,5 +184,5 @@ void gicv2_clear_interrupt_pending(unsigned int id);
 unsigned int gicv2_set_pmr(unsigned int mask);
 void gicv2_interrupt_set_cfg(unsigned int id, unsigned int cfg);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 #endif /* GICV2_H */
index 72221acb0fc96d9dd51dbd6922abf91498fdc249..9c72d4dff311fc5d2c0a1793ef693ceaeca6d6f7 100644 (file)
 #define GITS_CTLR_QUIESCENT_SHIFT      31
 #define GITS_CTLR_QUIESCENT_BIT                BIT_32(GITS_CTLR_QUIESCENT_SHIFT)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdbool.h>
 #include <stdint.h>
@@ -406,5 +406,5 @@ void gicv3_set_interrupt_pending(unsigned int id, unsigned int proc_num);
 void gicv3_clear_interrupt_pending(unsigned int id, unsigned int proc_num);
 unsigned int gicv3_set_pmr(unsigned int mask);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 #endif /* GICV3_H */
index f201f0048fb5a5c6025cf20dc0007f7f84d28aee..8733d196408cab47bb4981d8b706463419f4afa3 100644 (file)
@@ -83,7 +83,7 @@
 
 #define CONSOLE_T_PL011_BASE   CONSOLE_T_DRVDATA
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -101,6 +101,6 @@ typedef struct {
 int console_pl011_register(uintptr_t baseaddr, uint32_t clock, uint32_t baud,
                           console_pl011_t *console);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* PL011_H */
index 551bfe4bae90abfcc99ba60c645339667572d7e8..b00ede1d6db67f7bcf9265ea691d17b06246b3ec 100644 (file)
@@ -21,7 +21,7 @@
 #define SP805_CTR_RESEN                        (U(1) << 1)
 #define SP805_CTR_INTEN                        (U(1) << 0)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -31,6 +31,6 @@ void sp805_start(uintptr_t base, unsigned int ticks);
 void sp805_stop(uintptr_t base);
 void sp805_refresh(uintptr_t base, unsigned int ticks);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* SP805_H */
index 98ef0ec1e0e13f01bec6a81b4575dbd447318b82..32aeb03502cf93d69e2e1f778238c2e66b9dea6f 100644 (file)
@@ -93,7 +93,7 @@
 #define TZC_400_REGION_SIZE                    U(0x20)
 #define TZC_400_ACTION_OFF                     U(0x4)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <cdefs.h>
 #include <stdint.h>
@@ -154,6 +154,6 @@ static inline void tzc_disable_filters(void)
        tzc400_disable_filters();
 }
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* TZC400_H */
index 24bfaeb145571e5fc49377c406e51f28697e3e6a..cce074cb9b312b58847ca42baec21d1aa62ea62e 100644 (file)
 /* Length of registers for configuring each region */
 #define TZC_DMC500_REGION_SIZE                         U(0x018)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -147,5 +147,5 @@ void tzc_dmc500_config_complete(void);
 int tzc_dmc500_verify_complete(void);
 
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 #endif /* TZC_DMC500_H */
index d143d7351f7d93332d717aa1fbf33a1f03bf93cf..acfde268a2e54ad42f83fe4a343b35c4484fff62 100644 (file)
@@ -86,7 +86,7 @@
 /* Memory buffer allocator options */
 #define MBEDTLS_MEMORY_ALIGN_MULTIPLE        8
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 /* System headers required to build mbed TLS with the current configuration */
 #include <stdlib.h>
 #include "mbedtls/check_config.h"
index 0a1cf77819355fd0222d4c4406937c382aea56cb..64a062ca148da47b83385794a3456b19632580f5 100644 (file)
@@ -27,7 +27,7 @@
 
 #define CONSOLE_T_CDNS_BASE    CONSOLE_T_DRVDATA
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -45,6 +45,6 @@ typedef struct {
 int console_cdns_register(uintptr_t baseaddr, uint32_t clock, uint32_t baud,
                          console_cdns_t *console);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* CDNS_UART_H */
index f31de95493d802f13c7e5176b1af58a0f30b06b3..cada771b43127a0b0b835a3903c68a9cf290858d 100644 (file)
@@ -28,7 +28,7 @@
 /* Returned by console_xxx() if no registered console implements xxx. */
 #define ERROR_NO_VALID_CONSOLE         (-128)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -75,6 +75,6 @@ int console_getc(void);
 /* Flush all consoles registered for the current state. */
 int console_flush(void);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* CONSOLE_H */
index 1aa4c889ee14b135257df34b4103b377da15ad23..85babb8d4b2767efb3986746e308f8c7cf2263bd 100644 (file)
@@ -27,7 +27,7 @@
 #define LLC_EXCLUSIVE_EN               0x100
 #define LLC_WAY_MASK                   0xFFFFFFFF
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 void llc_cache_sync(int ap_index);
 void llc_flush_all(int ap_index);
 void llc_clean_all(int ap_index);
index 546d9f13bce3f055ca5a38092cdca31808dd11c7..b0d1ec98403f025e97b82279e71a8a32098152fd 100644 (file)
@@ -10,7 +10,7 @@
 #ifndef CCU_H
 #define CCU_H
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <drivers/marvell/addr_map.h>
 #endif
 
@@ -36,7 +36,7 @@
 
 #define CCU_SRAM_WIN_CR                                CCU_WIN_CR_OFFSET(MVEBU_AP0, 1)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 int init_ccu(int);
 void ccu_win_check(struct addr_map_win *win);
 void ccu_enable_win(int ap_index, struct addr_map_win *win, uint32_t win_id);
index 5511d96c44dbfc299b825f5803c57862d1bc3a71..517f01a8f9f176f6fdcfef40d3460c443a2b2af2 100644 (file)
@@ -56,7 +56,7 @@
 
 #define CONSOLE_T_A3700_BASE   CONSOLE_T_DRVDATA
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -74,6 +74,6 @@ typedef struct {
 int console_a3700_register(uintptr_t baseaddr, uint32_t clock, uint32_t baud,
                           console_a3700_t *console);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* A3700_CONSOLE_H */
index 5da1e3fd457d94df818c8bb115d08d1799709e10..70e3b0bd4e16bec1ea783b69eff77d6299031573 100644 (file)
@@ -11,7 +11,7 @@
 
 #define CONSOLE_T_MESON_BASE   CONSOLE_T_DRVDATA
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -32,6 +32,6 @@ typedef struct {
 int console_meson_register(uintptr_t baseaddr, uint32_t clock, uint32_t baud,
                           console_meson_t *console);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* MESON_CONSOLE_H */
index 5bc10b7b17b6e29866ada036cab096ad1399c05a..0e4ed8f356761826875729645f953a8846507046 100644 (file)
@@ -9,7 +9,7 @@
 
 #define CONSOLE_T_RCAR_BASE    CONSOLE_T_DRVDATA
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -27,6 +27,6 @@ typedef struct {
 int console_rcar_register(uintptr_t baseaddr, uint32_t clock, uint32_t baud,
                          console_rcar_t *console);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* RCAR_PRINTF_H */
index b30376828f09e57063368d559a6cf39cba37a794..a2ad87cb5f01dd65e53261409d9171d7aced2dba 100644 (file)
@@ -11,7 +11,7 @@
 
 #define CONSOLE_T_STM32_BASE   CONSOLE_T_DRVDATA
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -29,6 +29,6 @@ struct console_stm32 {
 int console_stm32_register(uintptr_t baseaddr, uint32_t clock, uint32_t baud,
                           struct console_stm32 *console);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* STM32_CONSOLE_H */
index 4320eafcdaf07c8458a00c3928fb5c8fe3f9aaad..e241f584f72a60420af3cf1d6d928c23939bf88a 100644 (file)
 #define GPIO_PULL_DOWN         0x02
 #define GPIO_PULL_MASK         U(0x03)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stdint.h>
 
 int dt_set_pinctrl_config(int node);
 void set_gpio(uint32_t bank, uint32_t pin, uint32_t mode, uint32_t speed,
              uint32_t pull, uint32_t alternate, uint8_t status);
 void set_gpio_secure_cfg(uint32_t bank, uint32_t pin, bool secure);
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* STM32_GPIO_H */
index 92b1ea8c3a29fcd5255f133566187e6b6ab0de19..32e38f0ac1ef5e462892db41666e19a75c32edb6 100644 (file)
@@ -73,7 +73,7 @@
 
 #define CONSOLE_T_16550_BASE   CONSOLE_T_DRVDATA
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -91,6 +91,6 @@ typedef struct {
 int console_16550_register(uintptr_t baseaddr, uint32_t clock, uint32_t baud,
                           console_16550_t *console);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* UART_16550_H */
index a2f540c6274e5858aaed485a7863c0d058932bca..1fece01afd1b36bda9f206a4fe25510293aca5ac 100644 (file)
@@ -11,7 +11,7 @@
 
 #define BAKERY_LOCK_MAX_CPUS           PLATFORM_CORE_COUNT
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <cdefs.h>
 #include <stdbool.h>
 #include <stdint.h>
@@ -101,5 +101,5 @@ void bakery_lock_release(bakery_lock_t *bakery);
 #define DECLARE_BAKERY_LOCK(_name) extern bakery_lock_t _name
 
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 #endif /* BAKERY_LOCK_H */
index 1fb0a923c1c6662ebe4fd142d172c89b986557b8..a8c978a8b3078e6171ce43e7b99240cddef0aba2 100644 (file)
@@ -25,7 +25,7 @@
  ******************************************************************************/
 #define PCR            p15, 0, c15, c0, 0
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <arch_helpers.h>
 DEFINE_COPROCR_RW_FUNCS(pcr, PCR)
 #endif
index 204bfdd469196403bce1da1fe578f4e738dd59c9..e5ca1ba313645020b34dd6964681bcb2d2af9ea4 100644 (file)
@@ -41,7 +41,7 @@
 #define CORTEX_A75_AMU_GROUP0_MASK     U(0x7)
 #define CORTEX_A75_AMU_GROUP1_MASK     (U(0) << 3)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stdint.h>
 
 uint64_t cortex_a75_amu_cnt_read(int idx);
@@ -50,6 +50,6 @@ unsigned int cortex_a75_amu_read_cpuamcntenset_el0(void);
 unsigned int cortex_a75_amu_read_cpuamcntenclr_el0(void);
 void cortex_a75_amu_write_cpuamcntenset_el0(unsigned int mask);
 void cortex_a75_amu_write_cpuamcntenclr_el0(unsigned int mask);
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* CORTEX_A75_H */
index 86e8af034bc860ae9ee73c5be0a24612b9577f43..b943e7a4d318db66ad61dabec40c0feee386de70 100644 (file)
 #define CORTEX_HERCULES_CPUPWRCTLR_EL1                         S3_0_C15_C2_7
 #define CORTEX_HERCULES_CPUPWRCTLR_EL1_CORE_PWRDN_EN_BIT       U(1)
 
+/*******************************************************************************
+ * CPU Auxiliary Control register specific definitions.
+ ******************************************************************************/
+#define CORTEX_HERCULES_ACTLR_TAM_BIT                          (ULL(1) << 30)
+
+/*******************************************************************************
+ * CPU Activity Monitor Unit register specific definitions.
+ ******************************************************************************/
+#define CPUAMCNTENCLR0_EL0                                     S3_3_C15_C2_4
+#define CPUAMCNTENSET0_EL0                                     S3_3_C15_C2_5
+#define CPUAMCNTENCLR1_EL0                                     S3_3_C15_C3_0
+#define CPUAMCNTENSET1_EL0                                     S3_3_C15_C3_1
+
+#define CORTEX_HERCULES_AMU_GROUP0_MASK                                U(0xF)
+#define CORTEX_HERCULES_AMU_GROUP1_MASK                                U(0x7)
+
 #endif /* CORTEX_HERCULES_H */
index 921abdbd420d5140e77000682e05a895a86bd0e3..463f890fd02b428762190107248179f238cffa73 100644 (file)
@@ -29,7 +29,7 @@
 #define CPUAMEVTYPER3_EL0      S3_3_C15_C10_3
 #define CPUAMEVTYPER4_EL0      S3_3_C15_C10_4
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stdint.h>
 
 uint64_t cpuamu_cnt_read(unsigned int idx);
@@ -43,6 +43,6 @@ int midr_match(unsigned int cpu_midr);
 void cpuamu_context_save(unsigned int nr_counters);
 void cpuamu_context_restore(unsigned int nr_counters);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* CPUAMU_H */
index 81c076a1a7046ee7ade9b039faa737dfafcfe104..02657a0fb14db1583ae3a6a831c5858aaf05dd2a 100644 (file)
 #define DENVER_CPU_PMSTATE_C7          U(0x7)
 #define DENVER_CPU_PMSTATE_MASK                U(0xF)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 /* Disable Dynamic Code Optimisation */
 void denver_disable_dco(void);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* DENVER_H */
index 17b2c30f852588055940fa9a2b4ea1530e04cf7d..7cac77ebe671ca372501ff44d97572d7acd0a1b7 100644 (file)
@@ -7,7 +7,7 @@
 #ifndef ERRATA_REPORT_H
 #define ERRATA_REPORT_H
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <arch.h>
 #include <arch_helpers.h>
@@ -23,7 +23,7 @@ static inline void print_errata_status(void) {}
 void errata_print_msg(unsigned int status, const char *cpu, const char *id);
 int errata_needs_reporting(spinlock_t *lock, uint32_t *reported);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 /* Errata status */
 #define ERRATA_NOT_APPLIES     0
index 86ff53a67344d7c52891adf7460fcdd1ad4386e4..c5567c974bc76b351877e32d660f7e126e7494c4 100644 (file)
@@ -24,7 +24,7 @@
 #define CTX_NS_SCTLR           U(0x1C)
 #define CTX_REGS_END           U(0x20)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -65,6 +65,6 @@ typedef struct cpu_context {
 CASSERT(CTX_REGS_OFFSET == __builtin_offsetof(cpu_context_t, regs_ctx), \
        assert_core_context_regs_offset_mismatch);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* CONTEXT_H */
index 5bd0de4249e3cf2fecc73ce3098567025745658a..a76a59b78580b01924376fe0a43dd0e66137b103 100644 (file)
 #define CTX_PAUTH_REGS_END     U(0)
 #endif /* CTX_INCLUDE_PAUTH_REGS */
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -384,6 +384,6 @@ void fpregs_context_save(fp_regs_t *regs);
 void fpregs_context_restore(fp_regs_t *regs);
 #endif
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* CONTEXT_H */
index f23f9cd44daf8a729d02473c625bd4dcd13639b3..7c996d12416c7fd1e29370eefe91b6393b6f5b1a 100644 (file)
@@ -35,7 +35,7 @@ void cm_init_context_by_index(unsigned int cpu_idx,
 void cm_setup_context(cpu_context_t *ctx, const entry_point_info_t *ep);
 void cm_prepare_el3_exit(uint32_t security_state);
 
-#ifndef AARCH32
+#ifdef __aarch64__
 void cm_el1_sysregs_context_save(uint32_t security_state);
 void cm_el1_sysregs_context_restore(uint32_t security_state);
 void cm_set_elr_el3(uint32_t security_state, uintptr_t entrypoint);
@@ -78,6 +78,6 @@ static inline void cm_set_next_context(void *context)
 #else
 void *cm_get_next_context(void);
 void cm_set_next_context(void *context);
-#endif /* AARCH32 */
+#endif /* __aarch64__ */
 
 #endif /* CONTEXT_MGMT_H */
index 9e1d7f16c79e4dd2223be150682f32afa4eb0b2b..55db4cff6b060e15eb60fc52ceea55b5ef24cc3a 100644 (file)
 
 #include <bl31/ehf.h>
 
-#ifdef AARCH32
-
-#if CRASH_REPORTING
-#error "Crash reporting is not supported in AArch32"
-#endif
-#define CPU_DATA_CPU_OPS_PTR           0x0
-#define CPU_DATA_CRASH_BUF_OFFSET      0x4
-
-#else /* AARCH32 */
+#ifdef __aarch64__
 
 /* Offsets for the cpu_data structure */
 #define CPU_DATA_CRASH_BUF_OFFSET      0x18
 #define CPU_DATA_CRASH_BUF_SIZE                64
 #define CPU_DATA_CPU_OPS_PTR           0x10
 
-#endif /* AARCH32 */
+#else /* __aarch64__ */
+
+#if CRASH_REPORTING
+#error "Crash reporting is not supported in AArch32"
+#endif
+#define CPU_DATA_CPU_OPS_PTR           0x0
+#define CPU_DATA_CRASH_BUF_OFFSET      0x4
+
+#endif /* __aarch64__ */
 
 #if CRASH_REPORTING
 #define CPU_DATA_CRASH_BUF_END         (CPU_DATA_CRASH_BUF_OFFSET + \
@@ -49,7 +49,7 @@
 #define CPU_DATA_PMF_TS0_IDX           0
 #endif
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <arch_helpers.h>
 #include <lib/cassert.h>
@@ -84,7 +84,7 @@
  * used for this.
  ******************************************************************************/
 typedef struct cpu_data {
-#ifndef AARCH32
+#ifdef __aarch64__
        void *cpu_context[2];
 #endif
        uintptr_t cpu_ops_ptr;
@@ -127,7 +127,7 @@ CASSERT(CPU_DATA_PMF_TS0_OFFSET == __builtin_offsetof
 
 struct cpu_data *_cpu_data_by_index(uint32_t cpu_index);
 
-#ifndef AARCH32
+#ifdef __aarch64__
 /* Return the cpu_data structure for the current CPU. */
 static inline struct cpu_data *_cpu_data(void)
 {
@@ -161,5 +161,5 @@ void init_cpu_ops(void);
                                                sizeof(((cpu_data_t *)0)->_m))
 
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 #endif /* CPU_DATA_H */
index 8e4a87afd44fc84e8b73b856afdc2e5d4e895385..50120826d9eba58287b20d1df580fb1cb2488112 100644 (file)
@@ -24,7 +24,7 @@ REGISTER_PUBSUB_EVENT(psci_cpu_on_finish);
 REGISTER_PUBSUB_EVENT(psci_suspend_pwrdown_start);
 REGISTER_PUBSUB_EVENT(psci_suspend_pwrdown_finish);
 
-#ifdef AARCH64
+#ifdef __aarch64__
 /*
  * These events are published by the AArch64 context management framework
  * after the secure context is restored/saved via
@@ -40,4 +40,4 @@ REGISTER_PUBSUB_EVENT(cm_exited_secure_world);
  */
 REGISTER_PUBSUB_EVENT(cm_entering_normal_world);
 REGISTER_PUBSUB_EVENT(cm_exited_normal_world);
-#endif /* AARCH64 */
+#endif /* __aarch64__ */
index 98daab601dc2cf8c48d98507af6235e09e66847e..4fc8f04b11d87e4cdd3db24101e69ce6a7e7805a 100644 (file)
@@ -68,7 +68,7 @@
                .num_intrs = ARRAY_SIZE(_array), \
        }
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <assert.h>
 
@@ -196,6 +196,6 @@ int ras_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie,
                void *handle, uint64_t flags);
 void ras_init(void);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* RAS_H */
index e9375a35607e9671de4c895086c27edf4d759918..0c98c4a0ea0a2ad67bbe117a4801fb01e93a8462 100644 (file)
 /* I/DFSC code for synchronous external abort */
 #define SYNC_EA_FSC            0x10
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <arch.h>
 #include <arch_helpers.h>
@@ -256,6 +256,6 @@ static inline void ser_sys_select_record(unsigned int idx)
 /* Library functions to probe Standard Error Record */
 int ser_probe_memmap(uintptr_t base, unsigned int size_num_k, int *probe_data);
 int ser_probe_sysreg(unsigned int idx_start, unsigned int num_idx, int *probe_data);
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* RAS_ARCH_H */
index 174b3eb18062708c2d3ddd6b16521a19857d0e65..f880a17b7b87fb19881eee02b94b07b342e858bf 100644 (file)
 
 #define JMP_SIZE       (JMP_CTX_END >> 3)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <cdefs.h>
 
 /* Jump buffer hosting x18 - x30 and sp_el0 registers */
 typedef uint64_t jmp_buf[JMP_SIZE] __aligned(16);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* SETJMP__H */
index 5661201a0b1b1351b1e7b98aff3647cfc700bdd0..be8e2c01ad61b804f562602bf7cfe096fe7e1c13 100644 (file)
@@ -9,12 +9,12 @@
 
 #include <setjmp_.h>
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <cdefs.h>
 
 int setjmp(jmp_buf env);
 __dead2 void longjmp(jmp_buf env, int val);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 #endif /* SETJMP_H */
index 74961f9026d160650f68a5880c1a8a4d8b43c147..ef7c86b6ddbda8e4d2a5af176afd635471319e50 100644 (file)
@@ -52,7 +52,7 @@
  *     EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  */
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 struct fdt_header {
        fdt32_t magic;                   /* magic word FDT_MAGIC */
@@ -90,7 +90,7 @@ struct fdt_property {
        char data[0];
 };
 
-#endif /* !__ASSEMBLY */
+#endif /* !__ASSEMBLER__ */
 
 #define FDT_MAGIC      0xd00dfeed      /* 4: version, 4: total size */
 #define FDT_TAGSIZE    sizeof(fdt32_t)
index fe279d4f2c510d1420ee8d4f81014e4140111de5..04e5e3d7261aa09d9fc4e3ca2252f88df5db5e1b 100644 (file)
 #define PSCI_RESET2_TYPE_ARCH          (U(0) << PSCI_RESET2_TYPE_VENDOR_SHIFT)
 #define PSCI_RESET2_SYSTEM_WARM_RESET  (PSCI_RESET2_TYPE_ARCH | U(0))
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -348,6 +348,6 @@ int psci_features(unsigned int psci_fid);
 void __dead2 psci_power_down_wfi(void);
 void psci_arch_setup(void);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* PSCI_H */
index 53d7711b1208fda262ddb37c7174950a4abb0c2c..76c1a8dcf48aa236b9a070500a7dbfaea64439cd 100644 (file)
@@ -9,7 +9,7 @@
 
 #include <common/ep_info.h>
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <cdefs.h>
 #include <stdint.h>
@@ -89,6 +89,6 @@ void psci_warmboot_entrypoint(void);
 void psci_register_spd_pm_hook(const spd_pm_ops_t *pm);
 void psci_prepare_next_non_secure_ctx(
                          entry_point_info_t *next_image_info);
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* PSCI_LIB_H */
index f5a3f1386515008b6fa132f013edd76996b7bd92..303f27e5bfccaabc1d49c643f21d22ac161ff1d2 100644 (file)
@@ -17,9 +17,9 @@
 #define RT_INSTR_EXIT_CFLUSH           U(5)
 #define RT_INSTR_TOTAL_IDS             U(6)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 PMF_DECLARE_CAPTURE_TIMESTAMP(rt_instr_svc)
 PMF_DECLARE_GET_TIMESTAMP(rt_instr_svc)
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* RUNTIME_INSTR_H */
index 94c39d2a6dbcfed0d61d21e5620186a1ee8411b0..76e60231f0c992428e654680953e420cd7cde982 100644 (file)
@@ -87,7 +87,7 @@
 #define SMC_FROM_SECURE                (U(0) << 0)
 #define SMC_FROM_NON_SECURE    (U(1) << 0)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -155,5 +155,5 @@ static inline uint32_t smc_uuid_word(uint8_t b0, uint8_t b1, uint8_t b2, uint8_t
                smc_uuid_word((_uuid).node[2], (_uuid).node[3],                 \
                              (_uuid).node[4], (_uuid).node[5]))
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 #endif /* SMCCC_H */
index fcd36e85617196e400bcb9d0e974f18f0662cb3a..0bf3ee066f05837cd374a3104a54a6eeaeb57ab5 100644 (file)
@@ -7,7 +7,7 @@
 #ifndef SPINLOCK_H
 #define SPINLOCK_H
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
index 674845404467b2e1df6823d0e07e2af483a83e00..cdb125cfa4dbbce2aceb45682dbd21ccca33db78 100644 (file)
@@ -11,7 +11,7 @@
  * C code should be put in this part of the header to avoid breaking ASM files
  * or linker scripts including it.
  */
-#if !(defined(__LINKER__) || defined(__ASSEMBLY__))
+#if !(defined(__LINKER__) || defined(__ASSEMBLER__))
 
 #include <stddef.h>
 #include <stdint.h>
@@ -91,6 +91,6 @@ static inline u_register_t load_addr_## _name(void)           \
 /* Helper to invoke the function defined by DEFINE_LOAD_SYM_ADDR() */
 #define LOAD_ADDR_OF(_name)    (typeof(_name) *) load_addr_## _name()
 
-#endif /* !(defined(__LINKER__) || defined(__ASSEMBLY__)) */
+#endif /* !(defined(__LINKER__) || defined(__ASSEMBLER__)) */
 
 #endif /* UTILS_H */
index 41f71e84ab5e9bb031367147286e7136dfb807b4..35ae33a6825cda5a9a06b927a725a6bd4c6eccd1 100644 (file)
 #define BIT_32(nr)                     (U(1) << (nr))
 #define BIT_64(nr)                     (ULL(1) << (nr))
 
-#ifdef AARCH32
-#define BIT                            BIT_32
-#else
+#ifdef __aarch64__
 #define BIT                            BIT_64
+#else
+#define BIT                            BIT_32
 #endif
 
 /*
@@ -32,7 +32,7 @@
  * position @h. For example
  * GENMASK_64(39, 21) gives us the 64bit vector 0x000000ffffe00000.
  */
-#if defined(__LINKER__) || defined(__ASSEMBLY__)
+#if defined(__LINKER__) || defined(__ASSEMBLER__)
 #define GENMASK_32(h, l) \
        (((0xFFFFFFFF) << (l)) & (0xFFFFFFFF >> (32 - 1 - (h))))
 
        (((~UINT64_C(0)) << (l)) & (~UINT64_C(0) >> (64 - 1 - (h))))
 #endif
 
-#ifdef AARCH32
-#define GENMASK                                GENMASK_32
-#else
+#ifdef __aarch64__
 #define GENMASK                                GENMASK_64
+#else
+#define GENMASK                                GENMASK_32
 #endif
 
 /*
        ((_u32) > (UINT32_MAX - (_inc)))
 
 /* Register size of the current architecture. */
-#ifdef AARCH32
-#define REGSZ          U(4)
-#else
+#ifdef __aarch64__
 #define REGSZ          U(8)
+#else
+#define REGSZ          U(4)
 #endif
 
 /*
index 85effcaa50895eca3b04368fe0f08257c9e28bc7..abdf1b6d03b8470bc7d7352b33ddc2fb953fb28b 100644 (file)
@@ -50,7 +50,7 @@
 #define MMU_CFG_TTBR0          2
 #define MMU_CFG_PARAM_MAX      3
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdbool.h>
 #include <stdint.h>
@@ -65,14 +65,7 @@ void setup_mmu_cfg(uint64_t *params, unsigned int flags,
                   const uint64_t *base_table, unsigned long long max_pa,
                   uintptr_t max_va, int xlat_regime);
 
-#ifdef AARCH32
-/* AArch32 specific translation table API */
-void enable_mmu_svc_mon(unsigned int flags);
-void enable_mmu_hyp(unsigned int flags);
-
-void enable_mmu_direct_svc_mon(unsigned int flags);
-void enable_mmu_direct_hyp(unsigned int flags);
-#else
+#ifdef __aarch64__
 /* AArch64 specific translation table APIs */
 void enable_mmu_el1(unsigned int flags);
 void enable_mmu_el2(unsigned int flags);
@@ -81,11 +74,18 @@ void enable_mmu_el3(unsigned int flags);
 void enable_mmu_direct_el1(unsigned int flags);
 void enable_mmu_direct_el2(unsigned int flags);
 void enable_mmu_direct_el3(unsigned int flags);
-#endif /* AARCH32 */
+#else
+/* AArch32 specific translation table API */
+void enable_mmu_svc_mon(unsigned int flags);
+void enable_mmu_hyp(unsigned int flags);
+
+void enable_mmu_direct_svc_mon(unsigned int flags);
+void enable_mmu_direct_hyp(unsigned int flags);
+#endif /* __aarch64__ */
 
 bool xlat_arch_is_granule_size_supported(size_t size);
 size_t xlat_arch_get_max_supported_granule_size(void);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* XLAT_MMU_HELPERS_H */
index 9e2543fbbc21ff2fcce0afef865e42187badc160..082bb5e454782a3b28e561095357b31b12078d71 100644 (file)
@@ -9,7 +9,7 @@
 
 #include <lib/xlat_tables/xlat_tables_defs.h>
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stddef.h>
 #include <stdint.h>
 
@@ -88,5 +88,5 @@ void mmap_add_region(unsigned long long base_pa, uintptr_t base_va,
                     size_t size, unsigned int attr);
 void mmap_add(const mmap_region_t *mm);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 #endif /* XLAT_TABLES_H */
index 723753403be174d4e30e7d271a83d033c8a336c8..0ce0cacb45bc1f770ea5119251b921f918227029 100644 (file)
@@ -7,10 +7,10 @@
 #ifndef XLAT_TABLES_ARCH_H
 #define XLAT_TABLES_ARCH_H
 
-#ifdef AARCH32
-#include "aarch32/xlat_tables_aarch32.h"
-#else
+#ifdef __aarch64__
 #include "aarch64/xlat_tables_aarch64.h"
+#else
+#include "aarch32/xlat_tables_aarch32.h"
 #endif
 
 /*
index 000811f3cf8d02985ed8dd991a503a0772cda2cd..76cfc0b3475f6337db085318c16f2f1df2ec16eb 100644 (file)
@@ -62,7 +62,7 @@
 #define OSH                    (U(0x2) << 6)
 #define ISH                    (U(0x3) << 6)
 
-#ifdef AARCH64
+#ifdef __aarch64__
 /* Guarded Page bit */
 #define GP                     (ULL(1) << 50)
 #endif
index 55514268380242807903aaeebc31dc5346d63d33..0e099987e40eeaaa3028e120f4195fbfbfa33077 100644 (file)
@@ -10,7 +10,7 @@
 #include <lib/xlat_tables/xlat_tables_defs.h>
 #include <lib/xlat_tables/xlat_tables_v2_helpers.h>
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stddef.h>
 #include <stdint.h>
 
@@ -364,5 +364,5 @@ int xlat_get_mem_attributes_ctx(const xlat_ctx_t *ctx, uintptr_t base_va,
                                uint32_t *attr);
 int xlat_get_mem_attributes(uintptr_t base_va, uint32_t *attr);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 #endif /* XLAT_TABLES_V2_H */
index 6a1be3258ce00e48002368f9527a5cf69ad78554..b17b71a872004aae44aedd27d0a91daa0ec551e6 100644 (file)
@@ -16,7 +16,7 @@
 #error "Do not include this header file directly. Include xlat_tables_v2.h instead."
 #endif
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdbool.h>
 #include <stddef.h>
@@ -160,6 +160,6 @@ struct xlat_ctx {
                .initialized = false,                                   \
        }
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* XLAT_TABLES_V2_HELPERS_H */
index f982b57b48bcf816309f339361612c2bb8b748ba..4637b6785a26c884d6f54ef6c09d479c8d605db4 100644 (file)
@@ -29,7 +29,7 @@
 #define BOARD_CSS_PLAT_TYPE_EMULATOR           0x02
 #define BOARD_CSS_PLAT_TYPE_FVP                        0x03
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <lib/mmio.h>
 
@@ -37,7 +37,7 @@
        ((mmio_read_32(addr) & BOARD_CSS_PLAT_ID_REG_ID_MASK)           \
        >> BOARD_CSS_PLAT_ID_REG_ID_SHIFT)
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 
 #define MAX_IO_DEVICES                 3
index ead1a8b3523c7a97dce921e683d0dfefc517e520..53bd13fc0b8d6e744a0e7503a5b4a2b640a37a90 100644 (file)
 #endif
 #endif
 
-#if defined(AARCH32) || JUNO_AARCH32_EL3_RUNTIME
+#if !defined(__aarch64__) || JUNO_AARCH32_EL3_RUNTIME
 /*******************************************************************************
  * BL32 specific defines for EL3 runtime in AArch32 mode
  ******************************************************************************/
 # else
 #  error "Unsupported ARM_TSP_RAM_LOCATION_ID value"
 # endif
-#endif /* AARCH32 || JUNO_AARCH32_EL3_RUNTIME */
+#endif /* !__aarch64__ || JUNO_AARCH32_EL3_RUNTIME */
 
 /*
  * BL32 is mandatory in AArch32. In AArch64, undefine BL32_BASE if there is no
  * SPD and no SPM, as they are the only ones that can be used as BL32.
  */
-#if !(defined(AARCH32) || JUNO_AARCH32_EL3_RUNTIME)
+#if defined(__aarch64__) && !JUNO_AARCH32_EL3_RUNTIME
 # if defined(SPD_none) && !ENABLE_SPM
 #  undef BL32_BASE
 # endif /* defined(SPD_none) && !ENABLE_SPM */
-#endif /* !(defined(AARCH32) || JUNO_AARCH32_EL3_RUNTIME) */
+#endif /* defined(__aarch64__) && !JUNO_AARCH32_EL3_RUNTIME */
 
 /*******************************************************************************
  * FWU Images: NS_BL1U, BL2U & NS_BL2U defines.
index c8260e88abdaff8c66ee7bd5f2d13dcfbd5ac6c6..07a46c518d6654da89f7a0b8d1e8d8830b989a80 100644 (file)
@@ -69,7 +69,7 @@ typedef struct arm_tzc_regions_info {
 
 void arm_setup_romlib(void);
 
-#if defined(IMAGE_BL31) || (defined(AARCH32) && defined(IMAGE_BL32))
+#if defined(IMAGE_BL31) || (!defined(__aarch64__) && defined(IMAGE_BL32))
 /*
  * Use this macro to instantiate lock before it is used in below
  * arm_lock_xxx() macros
@@ -102,7 +102,7 @@ void arm_setup_romlib(void);
 #define arm_lock_get()
 #define arm_lock_release()
 
-#endif /* defined(IMAGE_BL31) || (defined(AARCH32) && defined(IMAGE_BL32)) */
+#endif /* defined(IMAGE_BL31) || (!defined(__aarch64__) && defined(IMAGE_BL32)) */
 
 #if ARM_RECOM_STATE_ID_ENC
 /*
index ec28db0750d3833c6311ad047fd0b7df1aa1dc1c..2adf11d66e6c6144c37eebd62486d7a2a7c4ee94 100644 (file)
 #define SPIDEN_INT_CLR_SHIFT   6
 #define SPIDEN_SEL_SET_SHIFT   7
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 /* SSC_VERSION related accessors */
 
                (((val) >> SSC_VERSION_CONFIG_SHIFT) &          \
                SSC_VERSION_CONFIG_MASK)
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 /*************************************************************************
  * Required platform porting definitions common to all
index 66c88ba8cca7e15c7ad56c4e17a28cb43e53538e..14ae603b9b5f1434d9842f9080e846de56ef4018 100644 (file)
 /*
  * Platform binary types for linking
  */
-#ifdef AARCH32
-#define PLATFORM_LINKER_FORMAT          "elf32-littlearm"
-#define PLATFORM_LINKER_ARCH            arm
-#else
+#ifdef __aarch64__
 #define PLATFORM_LINKER_FORMAT          "elf64-littleaarch64"
 #define PLATFORM_LINKER_ARCH            aarch64
-#endif /* AARCH32 */
+#else
+#define PLATFORM_LINKER_FORMAT          "elf32-littlearm"
+#define PLATFORM_LINKER_ARCH            arm
+#endif /* __aarch64__ */
 
 /*
  * Generic platform constants
index 57912e883488bb73c94e7a3a03d047d17aabec65..a3723a0f50e6a840d266b21282475ee1e4733619 100644 (file)
@@ -63,7 +63,7 @@
 
 #endif /* SPM_MM */
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -85,6 +85,6 @@ uint64_t spm_sp_call(uint32_t smc_fid, uint64_t x1, uint64_t x2, uint64_t x3);
 
 #endif /* SPM_MM */
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* SPM_SVC_H */
index 25287de871837ae9f6190364e46231ecfab41850..4e048145f4db5910fa615e53169eeaab7e002503 100644 (file)
 /* Hardware handled coherency */
 #if HW_ASSISTED_COHERENCY == 0
 #error "cortex_hercules must be compiled with HW_ASSISTED_COHERENCY enabled"
+#endif
+
+       /* -------------------------------------------------
+        * The CPU Ops reset function for Cortex-Hercules
+        * -------------------------------------------------
+        */
+#if ENABLE_AMU
+func cortex_hercules_reset_func
+       /* Make sure accesses from EL0/EL1 and EL2 are not trapped to EL3 */
+       mrs     x0, actlr_el3
+       bic     x0, x0, #CORTEX_HERCULES_ACTLR_TAM_BIT
+       msr     actlr_el3, x0
+
+       /* Make sure accesses from non-secure EL0/EL1 are not trapped to EL2 */
+       mrs     x0, actlr_el2
+       bic     x0, x0, #CORTEX_HERCULES_ACTLR_TAM_BIT
+       msr     actlr_el2, x0
+
+       /* Enable group0 counters */
+       mov     x0, #CORTEX_HERCULES_AMU_GROUP0_MASK
+       msr     CPUAMCNTENSET0_EL0, x0
+
+       /* Enable group1 counters */
+       mov     x0, #CORTEX_HERCULES_AMU_GROUP1_MASK
+       msr     CPUAMCNTENSET1_EL0, x0
+       isb
+
+       ret
+endfunc cortex_hercules_reset_func
 #endif
 
        /* ---------------------------------------------
@@ -60,6 +89,12 @@ func cortex_hercules_cpu_reg_dump
        ret
 endfunc cortex_hercules_cpu_reg_dump
 
+#if ENABLE_AMU
+#define HERCULES_RESET_FUNC cortex_hercules_reset_func
+#else
+#define HERCULES_RESET_FUNC CPU_NO_RESET_FUNC
+#endif
+
 declare_cpu_ops cortex_hercules, CORTEX_HERCULES_MIDR, \
-       CPU_NO_RESET_FUNC, \
+       HERCULES_RESET_FUNC, \
        cortex_hercules_core_pwr_dwn
index aeb35600594f841685698120b5b44f67cba7067f..f43b2176db151edd98d59fc889c55b4a66b4f452 100644 (file)
@@ -18,9 +18,9 @@
 
 #ifdef IMAGE_BL1
 # define BL_STRING     "BL1"
-#elif defined(AARCH64) && defined(IMAGE_BL31)
+#elif defined(__aarch64__) && defined(IMAGE_BL31)
 # define BL_STRING     "BL31"
-#elif defined(AARCH32) && defined(IMAGE_BL32)
+#elif !defined(__arch64__) && defined(IMAGE_BL32)
 # define BL_STRING     "BL32"
 #elif defined(IMAGE_BL2) && BL2_AT_EL3
 # define BL_STRING "BL2"
index cc13fc1ba5434a469bc2dc4526d8533fb705aea0..f906f51ead3d0825ff0a90c0829682070a3ee1f1 100644 (file)
@@ -167,10 +167,10 @@ void bakery_lock_get(bakery_lock_t *lock)
        unsigned int their_bakery_data;
 
        me = plat_my_core_pos();
-#ifdef AARCH32
-       is_cached = read_sctlr() & SCTLR_C_BIT;
-#else
+#ifdef __aarch64__
        is_cached = read_sctlr_el3() & SCTLR_C_BIT;
+#else
+       is_cached = read_sctlr() & SCTLR_C_BIT;
 #endif
 
        /* Get a ticket */
@@ -228,10 +228,10 @@ void bakery_lock_get(bakery_lock_t *lock)
 void bakery_lock_release(bakery_lock_t *lock)
 {
        bakery_info_t *my_bakery_info;
-#ifdef AARCH32
-       unsigned int is_cached = read_sctlr() & SCTLR_C_BIT;
-#else
+#ifdef __aarch64__
        unsigned int is_cached = read_sctlr_el3() & SCTLR_C_BIT;
+#else
+       unsigned int is_cached = read_sctlr() & SCTLR_C_BIT;
 #endif
 
        my_bakery_info = get_bakery_info(plat_my_core_pos(), lock);
index f7392fda8192ece7e5e0d1eaf5ecb7009d99ed27..2a407939b2ef361dec9b9df55a750f1f342d0f2b 100644 (file)
@@ -176,7 +176,7 @@ int parse_optee_header(entry_point_info_t *header_ep,
         */
        if (!tee_validate_header(header)) {
                INFO("Invalid OPTEE header, set legacy mode.\n");
-#ifdef AARCH64
+#ifdef __aarch64__
                header_ep->args.arg0 = MODE_RW_64;
 #else
                header_ep->args.arg0 = MODE_RW_32;
@@ -222,7 +222,7 @@ int parse_optee_header(entry_point_info_t *header_ep,
        if (header->arch == 0) {
                header_ep->args.arg0 = MODE_RW_32;
        } else {
-#ifdef AARCH64
+#ifdef __aarch64__
                header_ep->args.arg0 = MODE_RW_64;
 #else
                ERROR("Cannot boot an AArch64 OP-TEE\n");
index 3f5e9893b9b1905d64a64cb7b9f42c19bb9550da..5d24356c9d5063dcbc3055aea576d34ee5120459 100644 (file)
@@ -619,53 +619,7 @@ int psci_validate_mpidr(u_register_t mpidr)
  * This function determines the full entrypoint information for the requested
  * PSCI entrypoint on power on/resume and returns it.
  ******************************************************************************/
-#ifdef AARCH32
-static int psci_get_ns_ep_info(entry_point_info_t *ep,
-                              uintptr_t entrypoint,
-                              u_register_t context_id)
-{
-       u_register_t ep_attr;
-       unsigned int aif, ee, mode;
-       u_register_t scr = read_scr();
-       u_register_t ns_sctlr, sctlr;
-
-       /* Switch to non secure state */
-       write_scr(scr | SCR_NS_BIT);
-       isb();
-       ns_sctlr = read_sctlr();
-
-       sctlr = scr & SCR_HCE_BIT ? read_hsctlr() : ns_sctlr;
-
-       /* Return to original state */
-       write_scr(scr);
-       isb();
-       ee = 0;
-
-       ep_attr = NON_SECURE | EP_ST_DISABLE;
-       if (sctlr & SCTLR_EE_BIT) {
-               ep_attr |= EP_EE_BIG;
-               ee = 1;
-       }
-       SET_PARAM_HEAD(ep, PARAM_EP, VERSION_1, ep_attr);
-
-       ep->pc = entrypoint;
-       zeromem(&ep->args, sizeof(ep->args));
-       ep->args.arg0 = context_id;
-
-       mode = scr & SCR_HCE_BIT ? MODE32_hyp : MODE32_svc;
-
-       /*
-        * TODO: Choose async. exception bits if HYP mode is not
-        * implemented according to the values of SCR.{AW, FW} bits
-        */
-       aif = SPSR_ABT_BIT | SPSR_IRQ_BIT | SPSR_FIQ_BIT;
-
-       ep->spsr = SPSR_MODE32(mode, entrypoint & 0x1, ee, aif);
-
-       return PSCI_E_SUCCESS;
-}
-
-#else
+#ifdef __aarch64__
 static int psci_get_ns_ep_info(entry_point_info_t *ep,
                               uintptr_t entrypoint,
                               u_register_t context_id)
@@ -722,7 +676,53 @@ static int psci_get_ns_ep_info(entry_point_info_t *ep,
 
        return PSCI_E_SUCCESS;
 }
-#endif
+#else /* !__aarch64__ */
+static int psci_get_ns_ep_info(entry_point_info_t *ep,
+                              uintptr_t entrypoint,
+                              u_register_t context_id)
+{
+       u_register_t ep_attr;
+       unsigned int aif, ee, mode;
+       u_register_t scr = read_scr();
+       u_register_t ns_sctlr, sctlr;
+
+       /* Switch to non secure state */
+       write_scr(scr | SCR_NS_BIT);
+       isb();
+       ns_sctlr = read_sctlr();
+
+       sctlr = scr & SCR_HCE_BIT ? read_hsctlr() : ns_sctlr;
+
+       /* Return to original state */
+       write_scr(scr);
+       isb();
+       ee = 0;
+
+       ep_attr = NON_SECURE | EP_ST_DISABLE;
+       if (sctlr & SCTLR_EE_BIT) {
+               ep_attr |= EP_EE_BIG;
+               ee = 1;
+       }
+       SET_PARAM_HEAD(ep, PARAM_EP, VERSION_1, ep_attr);
+
+       ep->pc = entrypoint;
+       zeromem(&ep->args, sizeof(ep->args));
+       ep->args.arg0 = context_id;
+
+       mode = scr & SCR_HCE_BIT ? MODE32_hyp : MODE32_svc;
+
+       /*
+        * TODO: Choose async. exception bits if HYP mode is not
+        * implemented according to the values of SCR.{AW, FW} bits
+        */
+       aif = SPSR_ABT_BIT | SPSR_IRQ_BIT | SPSR_FIQ_BIT;
+
+       ep->spsr = SPSR_MODE32(mode, entrypoint & 0x1, ee, aif);
+
+       return PSCI_E_SUCCESS;
+}
+
+#endif /* __aarch64__ */
 
 /*******************************************************************************
  * This function validates the entrypoint with the platform layer if the
index 60c14580878d0d730d3199fe2cc946e58a6c51da..cec94043dd23accd2d47c00656d70486c1581345 100644 (file)
@@ -15,7 +15,7 @@ LIB_DIR     = ../../$(BUILD_PLAT)/lib
 WRAPPER_DIR = ../../$(BUILD_PLAT)/libwrapper
 LIBS        = -lmbedtls -lfdt -lc
 INC         = $(INCLUDES:-I%=-I../../%)
-PPFLAGS     = $(INC) $(DEFINES) -P -D__ASSEMBLY__ -D__LINKER__ -MD -MP -MT $(BUILD_DIR)/romlib.ld
+PPFLAGS     = $(INC) $(DEFINES) -P -x assembler-with-cpp -D__LINKER__ -MD -MP -MT $(BUILD_DIR)/romlib.ld
 OBJS        = $(BUILD_DIR)/jmptbl.o $(BUILD_DIR)/init.o
 MAPFILE     = ../../$(BUILD_PLAT)/romlib/romlib.map
 
index bf3ae1e7de090c15a86e9ec1d1e6b79858726476..f4b64b33f090ea2e09d49f72842a95dfa8109775 100644 (file)
@@ -136,48 +136,48 @@ int xlat_change_mem_attributes(uintptr_t base_va, size_t size, uint32_t attr)
 #define MAX_PHYS_ADDR  tf_xlat_ctx.max_pa
 #endif
 
-#ifdef AARCH32
+#ifdef __aarch64__
 
-void enable_mmu_svc_mon(unsigned int flags)
+void enable_mmu_el1(unsigned int flags)
 {
        setup_mmu_cfg((uint64_t *)&mmu_cfg_params, flags,
                      tf_xlat_ctx.base_table, MAX_PHYS_ADDR,
                      tf_xlat_ctx.va_max_address, EL1_EL0_REGIME);
-       enable_mmu_direct_svc_mon(flags);
+       enable_mmu_direct_el1(flags);
 }
 
-void enable_mmu_hyp(unsigned int flags)
+void enable_mmu_el2(unsigned int flags)
 {
        setup_mmu_cfg((uint64_t *)&mmu_cfg_params, flags,
                      tf_xlat_ctx.base_table, MAX_PHYS_ADDR,
                      tf_xlat_ctx.va_max_address, EL2_REGIME);
-       enable_mmu_direct_hyp(flags);
+       enable_mmu_direct_el2(flags);
 }
 
-#else
-
-void enable_mmu_el1(unsigned int flags)
+void enable_mmu_el3(unsigned int flags)
 {
        setup_mmu_cfg((uint64_t *)&mmu_cfg_params, flags,
                      tf_xlat_ctx.base_table, MAX_PHYS_ADDR,
-                     tf_xlat_ctx.va_max_address, EL1_EL0_REGIME);
-       enable_mmu_direct_el1(flags);
+                     tf_xlat_ctx.va_max_address, EL3_REGIME);
+       enable_mmu_direct_el3(flags);
 }
 
-void enable_mmu_el2(unsigned int flags)
+#else /* !__aarch64__ */
+
+void enable_mmu_svc_mon(unsigned int flags)
 {
        setup_mmu_cfg((uint64_t *)&mmu_cfg_params, flags,
                      tf_xlat_ctx.base_table, MAX_PHYS_ADDR,
-                     tf_xlat_ctx.va_max_address, EL2_REGIME);
-       enable_mmu_direct_el2(flags);
+                     tf_xlat_ctx.va_max_address, EL1_EL0_REGIME);
+       enable_mmu_direct_svc_mon(flags);
 }
 
-void enable_mmu_el3(unsigned int flags)
+void enable_mmu_hyp(unsigned int flags)
 {
        setup_mmu_cfg((uint64_t *)&mmu_cfg_params, flags,
                      tf_xlat_ctx.base_table, MAX_PHYS_ADDR,
-                     tf_xlat_ctx.va_max_address, EL3_REGIME);
-       enable_mmu_direct_el3(flags);
+                     tf_xlat_ctx.va_max_address, EL2_REGIME);
+       enable_mmu_direct_hyp(flags);
 }
 
-#endif /* AARCH32 */
+#endif /* __aarch64__ */
index 761d00c3df24fd8790d35594d6495c82fd5a9ddb..232142e84cd517710e99f8849b4c69290cb2d09e 100644 (file)
@@ -97,7 +97,7 @@ static void xlat_desc_print(const xlat_ctx_t *ctx, uint64_t desc)
 
        printf(((LOWER_ATTRS(NS) & desc) != 0ULL) ? "-NS" : "-S");
 
-#ifdef AARCH64
+#ifdef __aarch64__
        /* Check Guarded Page bit */
        if ((desc & GP) != 0ULL) {
                printf("-GP");
index 2d41b2db17ac640914a38f5c8e33e717c95f6935..b89d87ea6087f2ce01f837938561a33eafef7d5b 100644 (file)
@@ -273,7 +273,7 @@ $(eval IMAGE := IMAGE_BL$(call uppercase,$(3)))
 
 $(1): $(2) $(filter-out %.d,$(MAKEFILE_LIST)) | bl$(3)_dirs
        $$(ECHO) "  PP      $$<"
-       $$(Q)$$(CPP) $$(CPPFLAGS) -P -D__ASSEMBLY__ -D__LINKER__ $(MAKE_DEP) -D$(IMAGE) -o $$@ $$<
+       $$(Q)$$(CPP) $$(CPPFLAGS) $(TF_CFLAGS_$(ARCH)) -P -x assembler-with-cpp -D__LINKER__ $(MAKE_DEP) -D$(IMAGE) -o $$@ $$<
 
 -include $(DEP)
 
index b885b47a462b58d0d6e6e77891811e335c839c51..36cd5009a505f9e0d73542be8d7b7fb368406620 100644 (file)
@@ -81,7 +81,7 @@ const mmap_region_t plat_arm_mmap[] = {
        MAP_DEVICE0,
        MAP_DEVICE1,
        ARM_MAP_NS_DRAM1,
-#ifdef AARCH64
+#ifdef __aarch64__
        ARM_MAP_DRAM2,
 #endif
 #ifdef SPD_tspd
@@ -150,7 +150,7 @@ const mmap_region_t plat_arm_secure_partition_mmap[] = {
 #endif
 #ifdef IMAGE_BL32
 const mmap_region_t plat_arm_mmap[] = {
-#ifdef AARCH32
+#ifndef __aarch64__
        ARM_MAP_SHARED_RAM,
        ARM_V2M_MAP_MEM_PROTECT,
 #endif
index 207cd31d679a340fd55508a5b31b381d849e8005..4f262770472c641ecf606cc6fe1b4358e8855280 100644 (file)
 #define PLAT_ARM_MAX_BL31_SIZE         UL(0x3B000)
 #endif
 
-#ifdef AARCH32
+#ifndef __aarch64__
 /*
  * Since BL32 NOBITS overlays BL2 and BL1-RW, PLAT_ARM_MAX_BL32_SIZE is
  * calculated using the current SP_MIN PROGBITS debug size plus the sizes of
 /*
  * Physical and virtual address space limits for MMU in AARCH64 & AARCH32 modes
  */
-#ifdef AARCH64
+#ifdef __aarch64__
 #define PLAT_PHY_ADDR_SPACE_SIZE       (1ULL << 36)
 #define PLAT_VIRT_ADDR_SPACE_SIZE      (1ULL << 36)
 #else
index b3b36726442817fc2da22bc1fff7b59209cdb772..4e575e1ab0c9a93fb0536183e4976e65f7616846 100644 (file)
 /*
  * Physical and virtual address space limits for MMU in AARCH64 & AARCH32 modes
  */
-#ifdef AARCH64
+#ifdef __aarch64__
 #define PLAT_PHY_ADDR_SPACE_SIZE       (1ULL << 36)
 #define PLAT_VIRT_ADDR_SPACE_SIZE      (1ULL << 36)
 #else
index d693c26ad50b9811d284d67c19d9a23042a32c9e..83aeeb4bd9fb1e252fbb56c3bb8e1258f55936df 100644 (file)
 /*
  * Physical and virtual address space limits for MMU in AARCH64 & AARCH32 modes
  */
-#ifdef AARCH64
+#ifdef __aarch64__
 #define PLAT_PHY_ADDR_SPACE_SIZE       (1ULL << 36)
 #define PLAT_VIRT_ADDR_SPACE_SIZE      (1ULL << 36)
 #else
index 118c19ab709b22bc76a86317c556bfc042f0921d..98c5d3c941f91207ebfcce599e23b20da1a2f8ed 100644 (file)
@@ -37,7 +37,7 @@ const mmap_region_t plat_arm_mmap[] = {
        CSS_MAP_DEVICE,
        SOC_CSS_MAP_DEVICE,
        ARM_MAP_NS_DRAM1,
-#ifdef AARCH64
+#ifdef __aarch64__
        ARM_MAP_DRAM2,
 #endif
 #ifdef SPD_tspd
@@ -74,7 +74,7 @@ const mmap_region_t plat_arm_mmap[] = {
 #endif
 #ifdef IMAGE_BL32
 const mmap_region_t plat_arm_mmap[] = {
-#ifdef AARCH32
+#ifndef __aarch64__
        ARM_MAP_SHARED_RAM,
 #ifdef PLAT_ARM_MEM_PROT_ADDR
        ARM_V2M_MAP_MEM_PROTECT,
index ff583a9095cb5e1552485fe4a7c7488d7ce71b48..7348bf5e4ef5bf493876857b80c59b040b0fe564 100644 (file)
@@ -34,7 +34,7 @@
  * space the physical & virtual address space limits are extended to
  * 40-bits.
  */
-#ifndef AARCH32
+#ifdef __aarch64__
 #define PLAT_PHY_ADDR_SPACE_SIZE               (1ULL << 40)
 #define PLAT_VIRT_ADDR_SPACE_SIZE              (1ULL << 40)
 #else
index c62cda85eb3c0630a7ef5a788c5b196e1cfd03e6..50b04f049470cf7a87f16e2cf02b437dc39a49d9 100644 (file)
@@ -29,7 +29,7 @@
 /*
  * Physical and virtual address space limits for MMU in AARCH64 & AARCH32 modes
  */
-#ifndef AARCH32
+#ifdef __aarch64__
 #define PLAT_PHY_ADDR_SPACE_SIZE       (1ULL << 36)
 #define PLAT_VIRT_ADDR_SPACE_SIZE      (1ULL << 36)
 #else
index 2c7b8bda5650103d38fad2e0e85410a8a42f29f8..580ab8e6f100552357380c3d32af2057d94f9311 100644 (file)
@@ -30,7 +30,7 @@
 /*
  * Physical and virtual address space limits for MMU in AARCH64 & AARCH32 modes
  */
-#ifndef AARCH32
+#ifdef __aarch64__
 #define PLAT_PHY_ADDR_SPACE_SIZE       (1ULL << 36)
 #define PLAT_VIRT_ADDR_SPACE_SIZE      (1ULL << 36)
 #else
index 883403bb36de662e4c1e335dce0c82d0c05eced1..f00146f99f7768770307bd920e228681859cf8b4 100644 (file)
@@ -30,7 +30,7 @@
 /*
  * Physical and virtual address space limits for MMU in AARCH64 & AARCH32 modes
  */
-#ifndef AARCH32
+#ifdef __aarch64__
 #define PLAT_PHY_ADDR_SPACE_SIZE       (1ULL << 36)
 #define PLAT_VIRT_ADDR_SPACE_SIZE      (1ULL << 36)
 #else
index 3e1fdd129f039f5cadacddc703ec36b9aa5b930a..27d1b3304be0b6ae25957ee0653d001fbce312e2 100644 (file)
@@ -15,7 +15,7 @@
 /*
  * Physical and virtual address space limits for MMU in AARCH64 & AARCH32 modes
  */
-#ifndef AARCH32
+#ifdef __aarch64__
 #define PLAT_PHY_ADDR_SPACE_SIZE       (1ULL << 36)
 #define PLAT_VIRT_ADDR_SPACE_SIZE      (1ULL << 36)
 #else
index 8905bb05fa05dcf210d554ace74fce0722028d79..b19a7c39cfd3d7fe1d1703b21f5b94cf99d93bf4 100644 (file)
@@ -121,11 +121,11 @@ void arm_bl1_plat_arch_setup(void)
        };
 
        setup_page_tables(bl_regions, plat_arm_get_mmap());
-#ifdef AARCH32
-       enable_mmu_svc_mon(0);
-#else
+#ifdef __aarch64__
        enable_mmu_el3(0);
-#endif /* AARCH32 */
+#else
+       enable_mmu_svc_mon(0);
+#endif /* __aarch64__ */
 
        arm_setup_romlib();
 }
index 0c01c872eada2a244c73f4c1e9d3f0eba9e3c827..97b5a8880903ba0cb58aa56134746a9f9ffc82d0 100644 (file)
@@ -83,10 +83,10 @@ void arm_bl2_el3_plat_arch_setup(void)
 
        setup_page_tables(bl_regions, plat_arm_get_mmap());
 
-#ifdef AARCH32
-       enable_mmu_svc_mon(0);
-#else
+#ifdef __aarch64__
        enable_mmu_el3(0);
+#else
+       enable_mmu_svc_mon(0);
 #endif
 }
 
index 32617f68d92eb2f13c559c99a2104c9c0cab7179..cdf87ca552d3c6394d53be867f9905cdbb060b0b 100644 (file)
@@ -128,10 +128,10 @@ void arm_bl2_plat_arch_setup(void)
 
        setup_page_tables(bl_regions, plat_arm_get_mmap());
 
-#ifdef AARCH32
-       enable_mmu_svc_mon(0);
-#else
+#ifdef __aarch64__
        enable_mmu_el1(0);
+#else
+       enable_mmu_svc_mon(0);
 #endif
 
        arm_setup_romlib();
@@ -153,7 +153,7 @@ int arm_bl2_handle_post_image_load(unsigned int image_id)
        assert(bl_mem_params);
 
        switch (image_id) {
-#ifdef AARCH64
+#ifdef __aarch64__
        case BL32_IMAGE_ID:
 #ifdef SPD_opteed
                pager_mem_params = get_bl_mem_params_node(BL32_EXTRA1_IMAGE_ID);
index 9f44b9e6c656ef173a6c75f5514920b29b378ed0..3614c7d2e4f4afb0a59d2493b70468c4f4d063df 100644 (file)
@@ -83,10 +83,10 @@ void arm_bl2u_plat_arch_setup(void)
 
        setup_page_tables(bl_regions, plat_arm_get_mmap());
 
-#ifdef AARCH32
-       enable_mmu_svc_mon(0);
-#else
+#ifdef __aarch64__
        enable_mmu_el1(0);
+#else
+       enable_mmu_svc_mon(0);
 #endif
        arm_setup_romlib();
 }
index f5ce4d2417657e5521d9f6e409a775054bf0f048..bc0cf9a857b464f5d9d34e3d19808d348701c624 100644 (file)
@@ -59,7 +59,7 @@ uint32_t arm_get_spsr_for_bl32_entry(void)
 /*******************************************************************************
  * Gets SPSR for BL33 entry
  ******************************************************************************/
-#ifndef AARCH32
+#ifdef __aarch64__
 uint32_t arm_get_spsr_for_bl33_entry(void)
 {
        unsigned int mode;
@@ -97,7 +97,7 @@ uint32_t arm_get_spsr_for_bl33_entry(void)
                        SPSR_E_LITTLE, DISABLE_ALL_EXCEPTIONS);
        return spsr;
 }
-#endif /* AARCH32 */
+#endif /* __aarch64__ */
 
 /*******************************************************************************
  * Configures access to the system counter timer module.
index 93bebf34702c360049d4a49d28fe46cc4ed88017..7f4957fa92e5df01000453b216565a080e086330 100644 (file)
@@ -83,8 +83,8 @@ void __init plat_arm_gic_driver_init(void)
         * can use GIC system registers to manage interrupts and does
         * not need GIC interface base addresses to be configured.
         */
-#if (defined(AARCH32) && defined(IMAGE_BL32)) || \
-       (defined(IMAGE_BL31) && !defined(AARCH32))
+#if (!defined(__aarch64__) && defined(IMAGE_BL32)) || \
+       (defined(__aarch64__) && defined(IMAGE_BL31))
        gicv3_driver_init(&arm_gic_data);
 #endif
 }
index 3a700598df9faea66230ff1e5bc3c6dc39b22681..b9181eb4cfc7bac0b6999d8a0c0363bd1d3a7ee9 100644 (file)
@@ -26,7 +26,7 @@
 
 static mem_region_t arm_ram_ranges[] = {
        {DRAM1_NS_IMAGE_LIMIT, DRAM1_PROTECTED_SIZE},
-#ifdef AARCH64
+#ifdef __aarch64__
        {ARM_DRAM2_BASE, 1u << ONE_GB_SHIFT},
 #endif
 };
index cb87bafdd0bff45d4431580b5046dbc00f4aff89..c95f4523c630156096ae69dd3ec0e95d7f97b25d 100644 (file)
@@ -116,7 +116,7 @@ int arm_validate_ns_entrypoint(uintptr_t entrypoint)
                        (ARM_NS_DRAM1_BASE + ARM_NS_DRAM1_SIZE))) {
                return 0;
        }
-#ifndef AARCH32
+#ifdef __aarch64__
        if ((entrypoint >= ARM_DRAM2_BASE) && (entrypoint <
                        (ARM_DRAM2_BASE + ARM_DRAM2_SIZE))) {
                return 0;
index d471130294f1a71d32105482f894596ba18b9404..00ac16ef06da66ea2a5e3f628d416181e70a8e75 100644 (file)
@@ -40,7 +40,7 @@ int arm_execution_state_switch(unsigned int smc_fid,
                void *handle)
 {
        /* Execution state can be switched only if EL3 is AArch64 */
-#ifdef AARCH64
+#ifdef __aarch64__
        bool caller_64, thumb = false, from_el2;
        unsigned int el, endianness;
        u_register_t spsr, pc, scr, sctlr;
@@ -173,7 +173,7 @@ invalid_param:
        SMC_RET1(handle, STATE_SW_E_PARAM);
 
 exec_denied:
-#endif
+#endif /* __aarch64__ */
        /* State switch denied */
        SMC_RET1(handle, STATE_SW_E_DENIED);
 }
index 032a1f473f82f0aaa1ff4b3ae68ce31e2c900a1a..a9cc852789e5e132767d8a93046cbfd14a2c9414 100644 (file)
 
 /* Platform ID address */
 #define SSC_VERSION                     (SSC_REG_BASE + SSC_VERSION_OFFSET)
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 /* SSC_VERSION related accessors */
 /* Returns the part number of the platform */
 #define GET_SGI_PART_NUM                                       \
 /* Returns the configuration number of the platform */
 #define GET_SGI_CONFIG_NUM                                     \
                GET_SSC_VERSION_CONFIG(mmio_read_32(SSC_VERSION))
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 /*******************************************************************************
  * Memprotect definitions
index 4ecfc969a729a56c34c3b7659abdbca865e0e763..f349c196ddcde2953f133ceef4e2f234b20b8464 100644 (file)
@@ -51,7 +51,7 @@
 
 /* Platform ID address */
 #define SSC_VERSION                     (SSC_REG_BASE + SSC_VERSION_OFFSET)
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 /* SSC_VERSION related accessors */
 /* Returns the part number of the platform */
 #define GET_PLAT_PART_NUM                                       \
@@ -59,7 +59,7 @@
 /* Returns the configuration number of the platform */
 #define GET_PLAT_CONFIG_NUM                                     \
                GET_SSC_VERSION_CONFIG(mmio_read_32(SSC_VERSION))
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 
 /*************************************************************************
index f5ed6fc96ff4d359a96e65917b4d3261489bf0ca..4a8a7eefe9e1520f06b1e5e44cb0cfaa602b8849 100644 (file)
@@ -300,7 +300,7 @@ unsigned int plat_ic_get_interrupt_id(unsigned int raw)
 #pragma weak plat_ic_end_of_interrupt
 
 /* In AArch32, the secure group1 interrupts are targeted to Secure PL1 */
-#ifdef AARCH32
+#ifndef __aarch64__
 #define IS_IN_EL1()    IS_IN_SECURE()
 #endif
 
index 1a29d9ca428e3a493b5d21cb22698a09b8404c09..16bec7972aa44820f68672f6cc973126e1cb9a59 100644 (file)
 #define MHZ_TICKS_PER_SEC 1000000U
 
 /* Maximum time-stamp value read from architectural counters */
-#ifdef AARCH32
-#define MAX_TS UINT32_MAX
-#else
+#ifdef __aarch64__
 #define MAX_TS UINT64_MAX
+#else
+#define MAX_TS UINT32_MAX
 #endif
 
 /* Following are used as ID's to capture time-stamp */
index c57fea90d30541e671e9bf230104e2bbe0f934f4..2f96efcdb3853591201005facc5ecaf4c25d6970 100644 (file)
@@ -77,7 +77,7 @@ uint32_t hikey_get_spsr_for_bl32_entry(void)
 /*******************************************************************************
  * Gets SPSR for BL33 entry
  ******************************************************************************/
-#ifndef AARCH32
+#ifdef __aarch64__
 uint32_t hikey_get_spsr_for_bl33_entry(void)
 {
        unsigned int mode;
@@ -112,7 +112,7 @@ uint32_t hikey_get_spsr_for_bl33_entry(void)
                        SPSR_E_LITTLE, DISABLE_ALL_EXCEPTIONS);
        return spsr;
 }
-#endif /* AARCH32 */
+#endif /* __aarch64__ */
 
 int hikey_bl2_handle_post_image_load(unsigned int image_id)
 {
@@ -125,7 +125,7 @@ int hikey_bl2_handle_post_image_load(unsigned int image_id)
        assert(bl_mem_params);
 
        switch (image_id) {
-#ifdef AARCH64
+#ifdef __aarch64__
        case BL32_IMAGE_ID:
 #ifdef SPD_opteed
                pager_mem_params = get_bl_mem_params_node(BL32_EXTRA1_IMAGE_ID);
index a87648ed25322a4939a6a42669d64456bac9972d..4b8dc53545a186b1293ba850aefc989f59c11641 100644 (file)
 #endif
 
 /* BL32 is mandatory in AArch32 */
-#ifndef AARCH32
+#ifdef __aarch64__
 #ifdef SPD_none
 #undef BL32_BASE
 #endif /* SPD_none */
index f1cc297dd427750f6c3ecc40c4a871bd5465558a..cbb465134e2ecf8051be98c11f28c0a3af74e3a8 100644 (file)
@@ -7,7 +7,7 @@
 #ifndef HISI_PWRC_H
 #define HISI_PWRC_H
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 void hisi_pwrc_set_cluster_wfi(unsigned int id);
 void hisi_pwrc_set_core_bx_addr(unsigned int core,
@@ -17,6 +17,6 @@ void hisi_pwrc_enable_debug(unsigned int core,
                            unsigned int cluster);
 int hisi_pwrc_setup(void);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* HISI_PWRC_H */
index 7102de85b09a58377ab6e4bb3c3d1eb3445cf4ca..fc9ddab0dfc2c01a304cb15ca015bbbe661b420b 100644 (file)
@@ -168,7 +168,7 @@ uint32_t hikey960_get_spsr_for_bl32_entry(void)
 /*******************************************************************************
  * Gets SPSR for BL33 entry
  ******************************************************************************/
-#ifndef AARCH32
+#ifdef __aarch64__
 uint32_t hikey960_get_spsr_for_bl33_entry(void)
 {
        unsigned int mode;
@@ -203,7 +203,7 @@ uint32_t hikey960_get_spsr_for_bl33_entry(void)
                        SPSR_E_LITTLE, DISABLE_ALL_EXCEPTIONS);
        return spsr;
 }
-#endif /* AARCH32 */
+#endif /* __aarch64__ */
 
 int hikey960_bl2_handle_post_image_load(unsigned int image_id)
 {
@@ -216,7 +216,7 @@ int hikey960_bl2_handle_post_image_load(unsigned int image_id)
        assert(bl_mem_params);
 
        switch (image_id) {
-#ifdef AARCH64
+#ifdef __aarch64__
        case BL32_IMAGE_ID:
 #ifdef SPD_opteed
                pager_mem_params = get_bl_mem_params_node(BL32_EXTRA1_IMAGE_ID);
index 7c3c10238d67179d6b2fd913a2b39f0d10148e9e..f6edad6685062299ebe110ddd55420b23cc99f17 100644 (file)
@@ -95,7 +95,7 @@
 #endif
 
 /* BL32 is mandatory in AArch32 */
-#ifndef AARCH32
+#ifdef __aarch64__
 #ifdef SPD_none
 #undef BL32_BASE
 #endif /* SPD_none */
index 11403b07fe1216d87d5c45859332c3c03125b27f..cc9d9754ecd6a9f720c88f6b7425f5feb211f67b 100644 (file)
@@ -54,7 +54,7 @@ uint32_t poplar_get_spsr_for_bl32_entry(void)
 /*******************************************************************************
  * Gets SPSR for BL33 entry
  ******************************************************************************/
-#ifndef AARCH32
+#ifdef __aarch64__
 uint32_t poplar_get_spsr_for_bl33_entry(void)
 {
        unsigned long el_status;
@@ -93,7 +93,7 @@ uint32_t poplar_get_spsr_for_bl33_entry(void)
                        SPSR_E_LITTLE, DISABLE_ALL_EXCEPTIONS);
        return spsr;
 }
-#endif /* AARCH32 */
+#endif /* __aarch64__ */
 
 int poplar_bl2_handle_post_image_load(unsigned int image_id)
 {
@@ -107,7 +107,7 @@ int poplar_bl2_handle_post_image_load(unsigned int image_id)
        assert(bl_mem_params);
 
        switch (image_id) {
-#ifdef AARCH64
+#ifdef __aarch64__
        case BL32_IMAGE_ID:
 #ifdef SPD_opteed
                pager_mem_params = get_bl_mem_params_node(BL32_EXTRA1_IMAGE_ID);
index 8f7a1559b2472fd9033078144c192ec76f2f13ee..9783f8d2da405ed025d1b876c57b5b91887fcf78 100644 (file)
 #endif
 
 /* BL32 is mandatory in AArch32 */
-#ifndef AARCH32
+#ifdef __aarch64__
 #ifdef SPD_none
 #undef BL32_BASE
 #endif /* SPD_none */
index 63449e7def607c6f18f53728fe25a54af078d0e9..0ea284fdf15cf5cf03b2f9348debd45434ae85a7 100644 (file)
@@ -50,7 +50,7 @@
 #define LPUART_BAUD_BOTHEDGE_MASK                (0x20000U)
 #define LPUART_BAUD_M10_MASK                     (0x20000000U)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -61,6 +61,6 @@ typedef struct {
 
 int console_lpuart_register(uintptr_t baseaddr, uint32_t clock, uint32_t baud,
                           console_lpuart_t *console);
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* IMX8_LPUART_H */
index 1b52e2f0b8878223c875573d9e2840d8a0fe511d..cc1b5318ea6ed104013ef8ee4b8845b2525a105f 100644 (file)
@@ -9,7 +9,7 @@
 
 #include <drivers/console.h>
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 typedef struct {
        console_t console;
@@ -18,6 +18,6 @@ typedef struct {
 
 int console_imx_uart_register(uintptr_t baseaddr, uint32_t clock, uint32_t baud,
                           console_uart_t *console);
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif  /* IMX_UART_H */
index 03fba8aa227f2008ff08098da6786e72bb14a02a..c8765e8577f2a18a6e675d9f283b8f7a04ad42cb 100644 (file)
@@ -97,7 +97,7 @@ void bl31_platform_setup(void)
 const mmap_region_t plat_agilex_mmap[] = {
        MAP_REGION_FLAT(DRAM_BASE, DRAM_SIZE, MT_MEMORY | MT_RW | MT_NS),
        MAP_REGION_FLAT(DEVICE1_BASE, DEVICE1_SIZE, MT_DEVICE | MT_RW | MT_NS),
-       MAP_REGION_FLAT(DEVICE2_BASE, DEVICE2_SIZE, MT_DEVICE | MT_RW | MT_NS),
+       MAP_REGION_FLAT(DEVICE2_BASE, DEVICE2_SIZE, MT_DEVICE | MT_RW | MT_SECURE),
        MAP_REGION_FLAT(OCRAM_BASE, OCRAM_SIZE,
                MT_NON_CACHEABLE | MT_RW | MT_SECURE),
        MAP_REGION_FLAT(DEVICE3_BASE, DEVICE3_SIZE,
index b0b1856f03dc9f50cdb7d070971b4955bf73bb0f..cb4514f3f4816dddc3d6c5f616613a22eadae645 100644 (file)
@@ -63,7 +63,7 @@
 
 #define CONSOLE_T_16550_BASE   CONSOLE_T_DRVDATA
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -81,6 +81,6 @@ typedef struct {
 int console_ls_16550_register(uintptr_t baseaddr, uint32_t clock, uint32_t baud,
                           console_ls_16550_t *console);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* LS_16550_H */
index 163b35c4812b16d191a6e057162746c749e5370c..fff065efd3b8ec6fe0df5a02b7e098c7dd189ab1 100644 (file)
@@ -59,11 +59,11 @@ void ls_bl1_plat_arch_setup(void)
 #endif
                             );
        VERBOSE("After setup the page tables\n");
-#ifdef AARCH32
-       enable_mmu_svc_mon(0);
-#else
+#ifdef __aarch64__
        enable_mmu_el3(0);
-#endif /* AARCH32 */
+#else
+       enable_mmu_svc_mon(0);
+#endif /* __aarch64__ */
        VERBOSE("After MMU enabled\n");
 }
 
index 192eaec46bf9ccc1758eeb2d3d183fd570a00591..35f42e1fbf26d36b03946ac1562e0ce0e124eaa5 100644 (file)
@@ -54,10 +54,10 @@ void ls_bl2_plat_arch_setup(void)
 #endif
                              );
 
-#ifdef AARCH32
-       enable_mmu_svc_mon(0);
-#else
+#ifdef __aarch64__
        enable_mmu_el1(0);
+#else
+       enable_mmu_svc_mon(0);
 #endif
 }
 
@@ -74,7 +74,7 @@ int ls_bl2_handle_post_image_load(unsigned int image_id)
        assert(bl_mem_params);
 
        switch (image_id) {
-#ifdef AARCH64
+#ifdef __aarch64__
        case BL32_IMAGE_ID:
                bl_mem_params->ep_info.spsr = ls_get_spsr_for_bl32_entry();
                break;
index 3b42909c72ffa92589d2ddb2c3d4b4b2d99372b0..23c0d00af52eafea3f44f3bc2c857e25a63b6d51 100644 (file)
@@ -143,7 +143,7 @@ uint32_t ls_get_spsr_for_bl32_entry(void)
 /*******************************************************************************
  * Gets SPSR for BL33 entry
  ******************************************************************************/
-#ifndef AARCH32
+#ifdef __aarch64__
 uint32_t ls_get_spsr_for_bl33_entry(void)
 {
        unsigned int mode;
@@ -181,7 +181,7 @@ uint32_t ls_get_spsr_for_bl33_entry(void)
                        SPSR_E_LITTLE, DISABLE_ALL_EXCEPTIONS);
        return spsr;
 }
-#endif /* AARCH32 */
+#endif /* __aarch64__ */
 
 /*******************************************************************************
  * Returns Layerscape platform specific memory map regions.
index 16865c4d23e0037795c823738b3131e5c81c95dd..591f045857cefdab5e0fb9f1dce0ce233763a6f8 100644 (file)
@@ -8,9 +8,9 @@
 #ifndef PLATFORM_DEF_H
 #define PLATFORM_DEF_H
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stdio.h>
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #include <board_marvell_def.h>
 #include <mvebu_def.h>
index 3f6154e75e090a5d39a2467e0562ea851e26ee78..b9c2e0ed7a5cd0b9e82f5c89975a1aed75f25d3a 100644 (file)
@@ -8,9 +8,9 @@
 #ifndef PLATFORM_DEF_H
 #define PLATFORM_DEF_H
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stdio.h>
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #include <common/interrupt_props.h>
 #include <drivers/arm/gic_common.h>
index 8a588bfb3e6035a9af0d0cfb7e629b4e7c675479..863e7dab10232d768c259b71d3fd1071a8a2d80c 100644 (file)
@@ -85,7 +85,7 @@
 
 #define CCI_CLK_CTRL                   (MCUCFG_BASE + 0x660)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <plat/common/common_def.h>
 #include <stdint.h>
@@ -112,5 +112,5 @@ void cci_secure_switch(unsigned int ns);
 void cci_init_sf(void);
 unsigned long cci_reg_access(unsigned int op, unsigned long offset, unsigned long val);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 #endif /* MCSI_H */
index 9cbadd3e6592e8617b8fde232a23cbf292b4b19b..a4085e2472f37beb2522ecde41fcd5310771fef0 100644 (file)
@@ -9,7 +9,7 @@
 
 #include <tegra_def.h>
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <lib/mmio.h>
 #include <stdint.h>
@@ -173,6 +173,6 @@ tegra_mc_settings_t *tegra_get_mc_settings(void);
  ******************************************************************************/
 void plat_memctrl_tzdram_setup(uint64_t phys_base, uint64_t size_in_bytes);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* MEMCTRL_V2_H */
index b9c378240e0279d1bd955580f57ce5d65f2dc989..d83ce48b8d4e60c8b98155f215f49b93ef07eb8a 100644 (file)
@@ -30,7 +30,7 @@
 #define TEGRA_CHIPID_TEGRA21           U(0x21)
 #define TEGRA_CHIPID_TEGRA18           U(0x18)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 /*
  * Tegra chip ID major/minor identifiers
@@ -57,6 +57,6 @@ bool tegra_platform_is_fpga(void);
 bool tegra_platform_is_unit_fpga(void);
 bool tegra_platform_is_virt_dev_kit(void);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* TEGRA_PLATFORM_H */
index b5821517a04fd2206b11dd56a81757e2fb3b3e88..67f33273fe82c38a90b662609366ce999ca3d80e 100644 (file)
@@ -41,10 +41,10 @@ void bl1_early_platform_setup(void)
  * does basic initialization. Later architectural setup (bl1_arch_setup())
  * does not do anything platform specific.
  *****************************************************************************/
-#ifdef AARCH32
-#define QEMU_CONFIGURE_BL1_MMU(...)    qemu_configure_mmu_svc_mon(__VA_ARGS__)
-#else
+#ifdef __aarch64__
 #define QEMU_CONFIGURE_BL1_MMU(...)    qemu_configure_mmu_el3(__VA_ARGS__)
+#else
+#define QEMU_CONFIGURE_BL1_MMU(...)    qemu_configure_mmu_svc_mon(__VA_ARGS__)
 #endif
 
 void bl1_plat_arch_setup(void)
index ba6a4db2dddb3b30e044c8fe148fb89b2b82469b..a01f2dc914dcdda9dc2b1bf55b697326a3588aa7 100644 (file)
@@ -35,7 +35,7 @@ static bl_mem_params_node_t bl2_mem_params_descs[] = {
          .next_handoff_image_id = INVALID_IMAGE_ID,
        },
 #else /* EL3_PAYLOAD_BASE */
-#ifdef AARCH64
+#ifdef __aarch64__
        /* Fill BL31 related information */
        { .image_id = BL31_IMAGE_ID,
 
@@ -59,10 +59,10 @@ static bl_mem_params_node_t bl2_mem_params_descs[] = {
          .next_handoff_image_id = BL33_IMAGE_ID,
 # endif
        },
-#endif /* AARCH64 */
+#endif /* __aarch64__ */
 # ifdef QEMU_LOAD_BL32
 
-#ifdef AARCH64
+#ifdef __aarch64__
 #define BL32_EP_ATTRIBS                (SECURE | EXECUTABLE)
 #define BL32_IMG_ATTRIBS       0
 #else
index b8ca895f8c58f4acdb5e446f6579bd110310e509..4c97c8dd63f1831e10dc86f90abaa86352386bc5 100644 (file)
@@ -81,10 +81,10 @@ void bl2_platform_setup(void)
        /* TODO Initialize timer */
 }
 
-#ifdef AARCH32
-#define QEMU_CONFIGURE_BL2_MMU(...)    qemu_configure_mmu_svc_mon(__VA_ARGS__)
-#else
+#ifdef __aarch64__
 #define QEMU_CONFIGURE_BL2_MMU(...)    qemu_configure_mmu_el1(__VA_ARGS__)
+#else
+#define QEMU_CONFIGURE_BL2_MMU(...)    qemu_configure_mmu_svc_mon(__VA_ARGS__)
 #endif
 
 void bl2_plat_arch_setup(void)
@@ -101,7 +101,7 @@ void bl2_plat_arch_setup(void)
  ******************************************************************************/
 static uint32_t qemu_get_spsr_for_bl32_entry(void)
 {
-#ifdef AARCH64
+#ifdef __aarch64__
        /*
         * The Secure Payload Dispatcher service is responsible for
         * setting the SPSR prior to entry into the BL3-2 image.
@@ -119,7 +119,7 @@ static uint32_t qemu_get_spsr_for_bl32_entry(void)
 static uint32_t qemu_get_spsr_for_bl33_entry(void)
 {
        uint32_t spsr;
-#ifdef AARCH64
+#ifdef __aarch64__
        unsigned int mode;
 
        /* Figure out what mode we enter the non-secure world in */
index aee8321cb151d420771f8b324732e60b9502390b..56bf9532f7fc3e90c07e1c2c889a4363e4a9f7aa 100644 (file)
@@ -132,11 +132,11 @@ static const mmap_region_t plat_qemu_mmap[] = {
        }
 
 /* Define EL1 and EL3 variants of the function initialising the MMU */
-#ifdef AARCH32
-DEFINE_CONFIGURE_MMU_EL(svc_mon)
-#else
+#ifdef __aarch64__
 DEFINE_CONFIGURE_MMU_EL(el1)
 DEFINE_CONFIGURE_MMU_EL(el3)
+#else
+DEFINE_CONFIGURE_MMU_EL(svc_mon)
 #endif
 
 
index bbe4a5481cc9e47ab0d6becd93194c229bc7f59d..b7f0ca113e581d99586c606106698f87c97bd06a 100644 (file)
@@ -7,7 +7,7 @@
 #ifndef PLATFORM_DEF_H
 #define PLATFORM_DEF_H
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <stdlib.h>
 #endif
 
index 66b61850db4eab23e34def2dc0e9f1588b53336d..714a8bf9e6f30546d09c59c4cb4131db1e9aebb8 100644 (file)
@@ -7,7 +7,7 @@
 #ifndef PLAT_PRIVATE_H
 #define PLAT_PRIVATE_H
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -60,16 +60,7 @@ extern uint32_t __sram_incbin_real_end;
 /******************************************************************************
  * Function and variable prototypes
  *****************************************************************************/
-#ifdef AARCH32
-void plat_configure_mmu_svc_mon(unsigned long total_base,
-                               unsigned long total_size,
-                               unsigned long,
-                               unsigned long,
-                               unsigned long,
-                               unsigned long);
-
-void rockchip_plat_mmu_svc_mon(void);
-#else
+#ifdef __aarch64__
 void plat_configure_mmu_el3(unsigned long total_base,
                            unsigned long total_size,
                            unsigned long,
@@ -78,6 +69,15 @@ void plat_configure_mmu_el3(unsigned long total_base,
                            unsigned long);
 
 void rockchip_plat_mmu_el3(void);
+#else
+void plat_configure_mmu_svc_mon(unsigned long total_base,
+                               unsigned long total_size,
+                               unsigned long,
+                               unsigned long,
+                               unsigned long,
+                               unsigned long);
+
+void rockchip_plat_mmu_svc_mon(void);
 #endif
 
 void plat_cci_init(void);
@@ -140,7 +140,7 @@ extern const mmap_region_t plat_rk_mmap[];
 
 uint32_t rockchip_get_uart_base(void);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 /******************************************************************************
  * cpu up status
index b22ddc29cd6756d39adfa7f741253cf6f7584bb3..34af29a8ab9c687200924e5703feda161283b403 100644 (file)
@@ -26,7 +26,7 @@
 #define PM_WARM_BOOT_SHT       0
 #define PM_WARM_BOOT_BIT       (1 << PM_WARM_BOOT_SHT)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 struct psram_data_t {
        uint64_t sp;
@@ -50,6 +50,6 @@ CASSERT(__builtin_offsetof(struct psram_data_t, boot_mpidr) == PSRAM_DT_MPIDR,
 
 extern void *sys_sleep_flag_sram;
 
-#endif  /* __ASSEMBLY__ */
+#endif  /* __ASSEMBLER__ */
 
 #endif
index bf78a14583cac310283c15c064f337c8f1c75cb6..440e6aa1130e4a9633d962e637df33ecdba31202 100644 (file)
@@ -35,7 +35,7 @@ void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
 {
        void *from_bl2;
 
-       from_bl2 = (void *) arg0;
+       from_bl2 = (void *)arg0;
 
        bl_params_node_t *bl_params = ((bl_params_t *)from_bl2)->head;
 
@@ -76,7 +76,7 @@ void bl31_platform_setup(void)
 
        /* Enable and initialize the System level generic timer */
        mmio_write_32(UNIPHIER_SYS_CNTCTL_BASE + CNTCR_OFF,
-                       CNTCR_FCREQ(0U) | CNTCR_EN);
+                     CNTCR_FCREQ(0U) | CNTCR_EN);
 }
 
 void bl31_plat_arch_setup(void)
index 5148e8f9108aaee430344097e5964ccde2eac6b7..266efe7bc99246cd935f8b919dc0068f94fe0664 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2017, ARM Limited and Contributors. All rights reserved.
+ * Copyright (c) 2017-2019, ARM Limited and Contributors. All rights reserved.
  *
  * SPDX-License-Identifier: BSD-3-Clause
  */
@@ -21,34 +21,34 @@ static const interrupt_prop_t uniphier_interrupt_props[] = {
 
        /* SGI0 */
        INTR_PROP_DESC(8, GIC_HIGHEST_SEC_PRIORITY, INTR_GROUP0,
-                       GIC_INTR_CFG_EDGE),
+                      GIC_INTR_CFG_EDGE),
        /* SGI6 */
        INTR_PROP_DESC(14, GIC_HIGHEST_SEC_PRIORITY, INTR_GROUP0,
-                       GIC_INTR_CFG_EDGE),
+                      GIC_INTR_CFG_EDGE),
 
        /* G1S interrupts */
 
        /* Timer */
        INTR_PROP_DESC(29, GIC_HIGHEST_SEC_PRIORITY, INTR_GROUP1S,
-                       GIC_INTR_CFG_LEVEL),
+                      GIC_INTR_CFG_LEVEL),
        /* SGI1 */
        INTR_PROP_DESC(9, GIC_HIGHEST_SEC_PRIORITY, INTR_GROUP1S,
-                       GIC_INTR_CFG_EDGE),
+                      GIC_INTR_CFG_EDGE),
        /* SGI2 */
        INTR_PROP_DESC(10, GIC_HIGHEST_SEC_PRIORITY, INTR_GROUP1S,
-                       GIC_INTR_CFG_EDGE),
+                      GIC_INTR_CFG_EDGE),
        /* SGI3 */
        INTR_PROP_DESC(11, GIC_HIGHEST_SEC_PRIORITY, INTR_GROUP1S,
-                       GIC_INTR_CFG_EDGE),
+                      GIC_INTR_CFG_EDGE),
        /* SGI4 */
        INTR_PROP_DESC(12, GIC_HIGHEST_SEC_PRIORITY, INTR_GROUP1S,
-                       GIC_INTR_CFG_EDGE),
+                      GIC_INTR_CFG_EDGE),
        /* SGI5 */
        INTR_PROP_DESC(13, GIC_HIGHEST_SEC_PRIORITY, INTR_GROUP1S,
-                       GIC_INTR_CFG_EDGE),
+                      GIC_INTR_CFG_EDGE),
        /* SGI7 */
        INTR_PROP_DESC(15, GIC_HIGHEST_SEC_PRIORITY, INTR_GROUP1S,
-                       GIC_INTR_CFG_EDGE)
+                      GIC_INTR_CFG_EDGE)
 };
 
 static unsigned int uniphier_mpidr_to_core_pos(u_register_t mpidr)
index 451e84f9e0b01dbfe1b4eb95ce475d47120aa412..b456bc538b90cacccca4e4fa49d456a338f2bdcd 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
+ * Copyright (c) 2017-2019, ARM Limited and Contributors. All rights reserved.
  *
  * SPDX-License-Identifier: BSD-3-Clause
  */
@@ -331,7 +331,7 @@ int plat_get_image_source(unsigned int image_id, uintptr_t *dev_handle,
 
        assert(image_id < ARRAY_SIZE(uniphier_io_policies));
 
-       *dev_handle = *(uniphier_io_policies[image_id].dev_handle);
+       *dev_handle = *uniphier_io_policies[image_id].dev_handle;
        *image_spec = uniphier_io_policies[image_id].image_spec;
        init_params = uniphier_io_policies[image_id].init_params;
 
index 271aa0f49a7df68c7fe1b6f8de0ecf01e2397eb6..27e10e4b7a7d13c53eae38edb706ace2fabb65c9 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
+ * Copyright (c) 2017-2019, ARM Limited and Contributors. All rights reserved.
  *
  * SPDX-License-Identifier: BSD-3-Clause
  */
@@ -16,8 +16,6 @@
 
 #include "uniphier.h"
 
-#define DIV_ROUND_UP(n, d)     (((n) + (d) - 1) / (d))
-
 #define NAND_CMD_READ0         0
 #define NAND_CMD_READSTART     0x30
 
@@ -166,7 +164,7 @@ static size_t __uniphier_nand_read(struct uniphier_nand *nand, int lba,
        int pages_per_block = nand->pages_per_block;
        int page_size = nand->page_size;
        int blocks_to_skip = lba / pages_per_block;
-       int pages_to_read = DIV_ROUND_UP(size, page_size);
+       int pages_to_read = div_round_up(size, page_size);
        int page = lba % pages_per_block;
        int block = 0;
        uintptr_t p = buf;
index ce11aa7cbbe4d99e62705df942b43b4239387e60..464252ddd41ece7caa3aa2ae5bd0f2694b73af8c 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2017, ARM Limited and Contributors. All rights reserved.
+ * Copyright (c) 2017-2019, ARM Limited and Contributors. All rights reserved.
  *
  * SPDX-License-Identifier: BSD-3-Clause
  */
@@ -14,9 +14,9 @@
 #define UNIPHIER_ROM_RSV0              0x59801200
 
 #define UNIPHIER_SLFRSTSEL             0x61843010
-#define   UNIPHIER_SLFRSTSEL_MASK              (0x3 << 0)
+#define   UNIPHIER_SLFRSTSEL_MASK              GENMASK(1, 0)
 #define UNIPHIER_SLFRSTCTL             0x61843014
-#define   UNIPHIER_SLFRSTCTL_RST               (1 << 0)
+#define   UNIPHIER_SLFRSTCTL_RST               BIT(0)
 
 #define MPIDR_AFFINITY_INVALID         ((u_register_t)-1)
 
@@ -58,7 +58,7 @@ static void __dead2 uniphier_psci_pwr_domain_pwr_down_wfi(
                                        const psci_power_state_t *target_state)
 {
        /*
-        * The Boot ROM cannot distinguish warn and cold resets.
+        * The Boot ROM cannot distinguish warm and cold resets.
         * Instead of the CPU reset, fake it.
         */
        uniphier_holding_pen_release = MPIDR_AFFINITY_INVALID;
index 94c4c5b38a1c4507459c8b569119174ed6deeb16..37941aa74b556fc27d2fedf932af224aca5acc2e 100644 (file)
@@ -14,7 +14,7 @@
 #include <lib/utils_def.h>
 #include <lib/xlat_tables/xlat_tables_defs.h>
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 #include <drivers/st/stm32mp1_clk.h>
 
 #include <boot_api.h>
@@ -40,7 +40,7 @@
 #endif
 
 /* DDR power initializations */
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 enum ddr_type {
        STM32MP_DDR3,
        STM32MP_LPDDR2,
@@ -254,7 +254,7 @@ enum ddr_type {
 #define TAMP_BASE                      U(0x5C00A000)
 #define TAMP_BKP_REGISTER_BASE         (TAMP_BASE + U(0x100))
 
-#if !(defined(__LINKER__) || defined(__ASSEMBLY__))
+#if !(defined(__LINKER__) || defined(__ASSEMBLER__))
 static inline uint32_t tamp_bkpr(uint32_t idx)
 {
        return TAMP_BKP_REGISTER_BASE + (idx << 2);
index 847b9c5c1a0c93ec1d1caf5bbdd7a082be9fdc4e..242154f0ecf135983057faf8b66df49371c73d23 100644 (file)
@@ -79,7 +79,7 @@
 #define OPTEED_C_RT_CTX_SIZE           0x60
 #define OPTEED_C_RT_CTX_ENTRIES                (OPTEED_C_RT_CTX_SIZE >> DWORD_SHIFT)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -157,6 +157,6 @@ void opteed_init_optee_ep_state(struct entry_point_info *optee_entry_point,
 extern optee_context_t opteed_sp_context[OPTEED_CORE_COUNT];
 extern uint32_t opteed_rw;
 extern struct optee_vectors *optee_vector_table;
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* OPTEED_PRIVATE_H */
index 53f9e20c30961e333e759bbc8c393e117fb426c7..5d5d0e8590cb19ef1a84e028f86bada02e48f678 100644 (file)
@@ -71,7 +71,7 @@
 #define TLKD_C_RT_CTX_SIZE             0x60
 #define TLKD_C_RT_CTX_ENTRIES          (TLKD_C_RT_CTX_SIZE >> DWORD_SHIFT)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -119,6 +119,6 @@ void tlkd_init_tlk_ep_state(struct entry_point_info *tlk_entry_point,
                                uint64_t pc,
                                tlk_context_t *tlk_ctx);
 
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* TLKD_PRIVATE_H */
index 50f3b875e58c30f5bcb2f335c4e3ad522cc019e1..a81eb212ed21d8424c08b178ae6544558d4e4933 100644 (file)
 #define TSPD_SP_CTX_SIZE       0x90
 #define TSPD_SP_CTX_ENTRIES            (TSPD_SP_CTX_SIZE >> DWORD_SHIFT)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -227,6 +227,6 @@ uint64_t tspd_handle_sp_preemption(void *handle);
 
 extern tsp_context_t tspd_sp_context[TSPD_CORE_COUNT];
 extern tsp_vectors_t *tsp_vectors;
-#endif /*__ASSEMBLY__*/
+#endif /*__ASSEMBLER__*/
 
 #endif /* TSPD_PRIVATE_H */
index 8cc66e76d9d70ba731faee1a77a9a855d4642e06..44a7301382fc695908f32ab01706d84cbecc84b4 100644 (file)
@@ -22,7 +22,7 @@
 #include <services/sdei.h>
 #include <setjmp.h>
 
-#ifdef AARCH32
+#ifndef __aarch64__
 # error SDEI is implemented only for AArch64 systems
 #endif
 
index 740fee58b089ee2f06ee9b8b9fb7729ceb4c75d4..efc91cb41d78f3fe1a2db03077fd0419d1d43e88 100644 (file)
@@ -32,7 +32,7 @@
 /* Value returned by spm_sp_synchronous_entry() when a partition is preempted */
 #define SPM_SECURE_PARTITION_PREEMPTED U(0x1234)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -114,6 +114,6 @@ int spm_response_add(uint16_t client_id, uint16_t handle, uint32_t token,
 int spm_response_get(uint16_t client_id, uint16_t handle, uint32_t token,
                     u_register_t *x1, u_register_t *x2, u_register_t *x3);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* SPM_PRIVATE_H */
index 8e94a282464739a8ab337b65a9bbd1f0da8f2593..ba94a4d0884fd53f7fb496c689df4e318d14761b 100644 (file)
@@ -29,7 +29,7 @@
 #define SP_C_RT_CTX_SIZE       0x60
 #define SP_C_RT_CTX_ENTRIES    (SP_C_RT_CTX_SIZE >> DWORD_SHIFT)
 
-#ifndef __ASSEMBLY__
+#ifndef __ASSEMBLER__
 
 #include <stdint.h>
 
@@ -66,6 +66,6 @@ int spm_memory_attributes_set_smc_handler(sp_context_t *sp_ctx,
                                          u_register_t pages_count,
                                          u_register_t smc_attributes);
 
-#endif /* __ASSEMBLY__ */
+#endif /* __ASSEMBLER__ */
 
 #endif /* SPM_PRIVATE_H */