| 1ba7f0bb | 27-Sep-2019 |
Cedric Neveux <cedric.neveux@nxp.com> |
drivers: CAAM driver User Buffer SGT create
CAAM Driver can operate directly with the User Buffer and in this case, the buffer can be on non-contiguous physical page.
CAAM is using a DMA to load/st
drivers: CAAM driver User Buffer SGT create
CAAM Driver can operate directly with the User Buffer and in this case, the buffer can be on non-contiguous physical page.
CAAM is using a DMA to load/store data from memory. The DMA is working with physical address. In case of the User Buffer, if the buffer is crossing multiple Small Page, a CAAM Scatter Gather Table needs to be created to rebuild the physical memory chunks used by the User virtual buffer.
Add a function to check if a buffer is a User buffer crossing mutliple small page. Add a function to create a SGT Table of the User buffer.
Signed-off-by: Cedric Neveux <cedric.neveux@nxp.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 9b726349 | 11-Nov-2019 |
Sheetal Tigadoli <sheetal.tigadoli@broadcom.com> |
drivers: bnxt: Add driver support for additional bnxt cmds
Add driver support for following bnxt commands: - HEALTH_STATUS - HANDSHAKE_STATUS - CRASH_DUMP_COPY
Signed-off-by: Vikas Gupta <vikas.
drivers: bnxt: Add driver support for additional bnxt cmds
Add driver support for following bnxt commands: - HEALTH_STATUS - HANDSHAKE_STATUS - CRASH_DUMP_COPY
Signed-off-by: Vikas Gupta <vikas.gupta@broadcom.com> Signed-off-by: Sheetal Tigadoli <sheetal.tigadoli@broadcom.com> Acked-by: Jerome Forissier <jerome@forissier.org>
show more ...
|
| 5f2bc144 | 19-Aug-2019 |
Vikas Gupta <vikas.gupta@broadcom.com> |
drivers: bnxt: Load bnxt images from secure memory
Load bnxt images from the secure memory at 1K offset, If found on the secure memory instead of flash. We copy the images from flash to secure memor
drivers: bnxt: Load bnxt images from secure memory
Load bnxt images from the secure memory at 1K offset, If found on the secure memory instead of flash. We copy the images from flash to secure memory for the very first time
Signed-off-by: Vikas Gupta <vikas.gupta@broadcom.com> Signed-off-by: Sheetal Tigadoli <sheetal.tigadoli@broadcom.com> Acked-by: Jerome Forissier <jerome@forissier.org>
show more ...
|
| 0588c515 | 12-Nov-2019 |
Sheetal Tigadoli <sheetal.tigadoli@broadcom.com> |
drivers: bnxt: Remove NS3Z specific code
Remove support for discontinued platform(NS3Z)
Signed-off-by: Rajesh Ravi <rajesh.ravi@broadcom.com> Signed-off-by: Sheetal Tigadoli <sheetal.tigadoli@broad
drivers: bnxt: Remove NS3Z specific code
Remove support for discontinued platform(NS3Z)
Signed-off-by: Rajesh Ravi <rajesh.ravi@broadcom.com> Signed-off-by: Sheetal Tigadoli <sheetal.tigadoli@broadcom.com> Acked-by: Jerome Forissier <jerome@forissier.org>
show more ...
|
| f8f95bc1 | 10-Sep-2019 |
Jerome Forissier <jerome@forissier.org> |
Get rid of option -Wno-suggest-attribute=noreturn
The GCC option -Wno-suggest-attribute=noreturn is not supported by Clang. Instead of playing with compiler options, let's fix the code according to
Get rid of option -Wno-suggest-attribute=noreturn
The GCC option -Wno-suggest-attribute=noreturn is not supported by Clang. Instead of playing with compiler options, let's fix the code according to the following rules: - If a function is know to never return, it should have the __noreturn attribute in the header file. - If only some implementation of a function never returns, __noreturn shall be applied to that particular implementation in the .c file.
Signed-off-by: Jerome Forissier <jerome@forissier.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| eb5d5313 | 27-May-2019 |
Etienne Carriere <etienne.carriere@st.com> |
drivers/stpmic1: unpaged low power sequence
STPMIC1 is used by the secure world to driver the system low power sequences. Since these sequences are executed in unpaged context, the driver gets the c
drivers/stpmic1: unpaged low power sequence
STPMIC1 is used by the secure world to driver the system low power sequences. Since these sequences are executed in unpaged context, the driver gets the configuration from the DTB during the initialization and provides optimized functions to load target configuration at runtime.
This change makes STPMIC1 driver to call the memory footprint optimized function stm32_i2c_read_write_membyte() for I2C transfer instead of generic stm32_i2c_mem_read()/stm32_i2c_mem_write(). This is more suitable to OP-TEE pager constraints on the platform.
This changes removes now unused STPMIC1_I2C_TIMEOUT_US.
Signed-off-by: Etienne Carriere <etienne.carriere@st.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 68c4a16b | 15-May-2019 |
Etienne Carriere <etienne.carriere@st.com> |
stm32mp1: use phys_to_virt_io_secure() where expected
This change updates platforms and drivers to use io_pa_or_va_secure() when expecting a secure mapped address.
PWR, RCC, GIC, TAMP, BSEC, ETZPC,
stm32mp1: use phys_to_virt_io_secure() where expected
This change updates platforms and drivers to use io_pa_or_va_secure() when expecting a secure mapped address.
PWR, RCC, GIC, TAMP, BSEC, ETZPC, I2C are always secure (when embedded).
RNG uses a secure or non-secure mapping according to its registration in platform shared_resource driver.
GPIOs IO memory is always access though non-secure mapped virtual addresses.
Signed-off-by: Etienne Carriere <etienne.carriere@st.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 082f27ae | 03-May-2019 |
Etienne Carriere <etienne.carriere@st.com> |
stm32_uart: pin control with stm32_gpio
stm32_uart instance get related pins configuration from device tree content.
Signed-off-by: Etienne Carriere <etienne.carriere@st.com> Acked-by: Jerome Foris
stm32_uart: pin control with stm32_gpio
stm32_uart instance get related pins configuration from device tree content.
Signed-off-by: Etienne Carriere <etienne.carriere@st.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|