History log of /rk3399_ARM-atf/docs/ (Results 1701 – 1725 of 3227)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
8913047a27-Jul-2021 Varun Wadekar <vwadekar@nvidia.com>

feat(cpus): workaround for Cortex A78 AE erratum 1951502

Cortex A78 AE erratum 1951502 is a Cat B erratum that applies to revisions
<= r0p1. It is still open. This erratum is avoided by inserting a

feat(cpus): workaround for Cortex A78 AE erratum 1951502

Cortex A78 AE erratum 1951502 is a Cat B erratum that applies to revisions
<= r0p1. It is still open. This erratum is avoided by inserting a DMB ST
before acquire atomic instructions without release semantics through a series
of writes to implementation defined system registers.

SDEN is available at https://developer.arm.com/documentation/SDEN1707912/0900

Change-Id: I812c5a37cdd03486df8af6046d9fa988f6a0a098
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>

show more ...

d4ad3da024-Apr-2021 Varun Wadekar <vwadekar@nvidia.com>

refactor(tegra132): deprecate platform

The Tegra132 platforms have reached their end of life and are
no longer used in the field. Internally and externally, all
known programs have removed support f

refactor(tegra132): deprecate platform

The Tegra132 platforms have reached their end of life and are
no longer used in the field. Internally and externally, all
known programs have removed support for this legacy platform.

This change removes this platform from the Tegra tree as a result.

Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
Change-Id: I72edb689293e23b63290cdcaef60468b90687a5a

show more ...

be3a51ce13-Aug-2021 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "feat(plat/versal): add support for SLS mitigation" into integration

6ec0c65b09-Apr-2021 Usama Arif <usama.arif@arm.com>

feat(plat/arm): Introduce TC1 platform

This renames tc0 platform folder and files to tc, and introduces
TARGET_PLATFORM variable to account for the differences between
TC0 and TC1.

Signed-off-by: U

feat(plat/arm): Introduce TC1 platform

This renames tc0 platform folder and files to tc, and introduces
TARGET_PLATFORM variable to account for the differences between
TC0 and TC1.

Signed-off-by: Usama Arif <usama.arif@arm.com>
Change-Id: I5b4a83f3453afd12542267091b3edab4c139c5cd

show more ...

100d402903-Aug-2021 johpow01 <john.powell@arm.com>

errata: workaround for Neoverse V1 errata 2139242

Neoverse V1 erratum 2139242 is a Cat B erratum present in the V1
processor core. This issue is present in revisions r0p0, r1p0,
and r1p1, and it is

errata: workaround for Neoverse V1 errata 2139242

Neoverse V1 erratum 2139242 is a Cat B erratum present in the V1
processor core. This issue is present in revisions r0p0, r1p0,
and r1p1, and it is still open.

SDEN can be found here:
https://documentation-service.arm.com/static/60d499080320e92fa40b4625

Signed-off-by: John Powell <john.powell@arm.com>
Change-Id: I5c2e9beec72a64ac4131fb6dd76199821a934ebe

show more ...

1a8804c302-Aug-2021 johpow01 <john.powell@arm.com>

errata: workaround for Neoverse V1 errata 1966096

Neoverse V1 erratum 1966096 is a Cat B erratum present in the V1
processor core. This issue is present in revisions r0p0, r1p0,
and r1p1, but the w

errata: workaround for Neoverse V1 errata 1966096

Neoverse V1 erratum 1966096 is a Cat B erratum present in the V1
processor core. This issue is present in revisions r0p0, r1p0,
and r1p1, but the workaround only applies to r1p0 and r1p1, it is still
open.

SDEN can be found here:
https://documentation-service.arm.com/static/60d499080320e92fa40b4625

Signed-off-by: John Powell <john.powell@arm.com>
Change-Id: Ic0b9a931e38da8a7000648e221481e17c253563b

show more ...

d1987f4c09-Aug-2021 Bipin Ravi <bipin.ravi@arm.com>

Merge "errata: workaround for Neoverse V1 errata 1925756" into integration

55120f9c09-Aug-2021 Bipin Ravi <bipin.ravi@arm.com>

Merge "errata: workaround for Neoverse V1 errata 1852267" into integration

1d24eb3309-Aug-2021 Bipin Ravi <bipin.ravi@arm.com>

Merge "errata: workaround for Neoverse V1 errata 1774420" into integration


design/cpu-specific-build-macros.rst
/rk3399_ARM-atf/drivers/nxp/auth/csf_hdr_parser/csf_hdr.mk
/rk3399_ARM-atf/drivers/nxp/console/console.mk
/rk3399_ARM-atf/drivers/nxp/crypto/caam/caam.mk
/rk3399_ARM-atf/drivers/nxp/csu/csu.mk
/rk3399_ARM-atf/drivers/nxp/dcfg/dcfg.mk
/rk3399_ARM-atf/drivers/nxp/ddr/fsl-mmdc/ddr.mk
/rk3399_ARM-atf/drivers/nxp/ddr/nxp-ddr/ddr.mk
/rk3399_ARM-atf/drivers/nxp/drivers.mk
/rk3399_ARM-atf/drivers/nxp/gic/gic.mk
/rk3399_ARM-atf/drivers/nxp/gpio/gpio.mk
/rk3399_ARM-atf/drivers/nxp/i2c/i2c.mk
/rk3399_ARM-atf/drivers/nxp/interconnect/interconnect.mk
/rk3399_ARM-atf/drivers/nxp/pmu/pmu.mk
/rk3399_ARM-atf/drivers/nxp/qspi/qspi.mk
/rk3399_ARM-atf/drivers/nxp/sd/sd_mmc.mk
/rk3399_ARM-atf/drivers/nxp/sec_mon/sec_mon.mk
/rk3399_ARM-atf/drivers/nxp/sfp/sfp.mk
/rk3399_ARM-atf/drivers/nxp/timer/timer.mk
/rk3399_ARM-atf/drivers/nxp/tzc/tzc.mk
/rk3399_ARM-atf/include/drivers/nxp/auth/csf_hdr_parser/csf_hdr.h
/rk3399_ARM-atf/include/drivers/nxp/console/plat_console.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/caam.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/caam_io.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/hash.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/jobdesc.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/jr_driver_config.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/rsa.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/sec_hw_specific.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/sec_jr_driver.h
/rk3399_ARM-atf/include/drivers/nxp/csu/csu.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/dcfg.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/dcfg_lsch2.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/dcfg_lsch3.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/scfg.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/ddr.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/ddr_io.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/dimm.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/fsl-mmdc/fsl_mmdc.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/immap.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/opts.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/regs.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/utility.h
/rk3399_ARM-atf/include/drivers/nxp/gic/gicv2/plat_gic.h
/rk3399_ARM-atf/include/drivers/nxp/gic/gicv3/plat_gic.h
/rk3399_ARM-atf/include/drivers/nxp/gpio/nxp_gpio.h
/rk3399_ARM-atf/include/drivers/nxp/i2c/i2c.h
/rk3399_ARM-atf/include/drivers/nxp/interconnect/ls_interconnect.h
/rk3399_ARM-atf/include/drivers/nxp/pmu/pmu.h
/rk3399_ARM-atf/include/drivers/nxp/qspi/qspi.h
/rk3399_ARM-atf/include/drivers/nxp/sd/sd_mmc.h
/rk3399_ARM-atf/include/drivers/nxp/sec_mon/snvs.h
/rk3399_ARM-atf/include/drivers/nxp/sfp/fuse_prov.h
/rk3399_ARM-atf/include/drivers/nxp/sfp/sfp.h
/rk3399_ARM-atf/include/drivers/nxp/sfp/sfp_error_codes.h
/rk3399_ARM-atf/include/drivers/nxp/timer/nxp_timer.h
/rk3399_ARM-atf/include/drivers/nxp/tzc/plat_tzc400.h
/rk3399_ARM-atf/include/lib/cpus/aarch64/neoverse_v1.h
/rk3399_ARM-atf/lib/cpus/aarch64/neoverse_v1.S
/rk3399_ARM-atf/lib/cpus/cpu-ops.mk
/rk3399_ARM-atf/plat/arm/css/sgi/sgi_ras.c
741dd04c02-Aug-2021 laurenw-arm <lauren.wehrmeister@arm.com>

errata: workaround for Neoverse V1 errata 1925756

Neoverse V1 erratum 1925756 is a Cat B erratum present in r0p0, r1p0,
and r1p1 of the V1 processor core, and it is still open.

SDEN can be found he

errata: workaround for Neoverse V1 errata 1925756

Neoverse V1 erratum 1925756 is a Cat B erratum present in r0p0, r1p0,
and r1p1 of the V1 processor core, and it is still open.

SDEN can be found here:
https://documentation-service.arm.com/static/60d499080320e92fa40b4625

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: I6500dc98da92a7c405b9ae09d794d666e8f4ae52

show more ...

143b196502-Aug-2021 laurenw-arm <lauren.wehrmeister@arm.com>

errata: workaround for Neoverse V1 errata 1852267

Neoverse V1 erratum 1852267 is a Cat B erratum present in r0p0 and
r1p0 of the V1 processor core. It is fixed in r1p1.

SDEN can be found here:
http

errata: workaround for Neoverse V1 errata 1852267

Neoverse V1 erratum 1852267 is a Cat B erratum present in r0p0 and
r1p0 of the V1 processor core. It is fixed in r1p1.

SDEN can be found here:
https://documentation-service.arm.com/static/60d499080320e92fa40b4625

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: Ide5e0bc09371fbc91c2385ffdff74e604beb2dbe

show more ...

4789cf6602-Aug-2021 laurenw-arm <lauren.wehrmeister@arm.com>

errata: workaround for Neoverse V1 errata 1774420

Neoverse V1 erratum 1774420 is a Cat B erratum present in r0p0 and
r1p0 of the V1 processor core. It is fixed in r1p1.

SDEN can be found here:
http

errata: workaround for Neoverse V1 errata 1774420

Neoverse V1 erratum 1774420 is a Cat B erratum present in r0p0 and
r1p0 of the V1 processor core. It is fixed in r1p1.

SDEN can be found here:
https://documentation-service.arm.com/static/60d499080320e92fa40b4625

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: I66e27b2518f73faeedd8615a1443a74b6a30f123

show more ...

5e4e13e102-Aug-2021 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge changes from topic "fw-update-2" into integration

* changes:
feat(sw_crc32): add software CRC32 support
refactor(hw_crc32): renamed hw_crc32 to tf_crc32
feat(fwu): avoid booting with an

Merge changes from topic "fw-update-2" into integration

* changes:
feat(sw_crc32): add software CRC32 support
refactor(hw_crc32): renamed hw_crc32 to tf_crc32
feat(fwu): avoid booting with an alternate boot source
docs(fwu): add firmware update documentation
feat(fwu): avoid NV counter upgrade in trial run state
feat(plat/arm): add FWU support in Arm platforms
feat(fwu): initialize FWU driver in BL2
feat(fwu): add FWU driver
feat(fwu): introduce FWU platform-specific functions declarations
docs(fwu_metadata): add FWU metadata build options
feat(fwu_metadata): add FWU metadata header and build options

show more ...

0f20e50b20-Jun-2021 Manish V Badarkhe <Manish.Badarkhe@arm.com>

docs(fwu): add firmware update documentation

Added firmware update documentation for:
1. PSA firmware update build flag
2. Porting guidelines to set the addresses of FWU metadata image
and update

docs(fwu): add firmware update documentation

Added firmware update documentation for:
1. PSA firmware update build flag
2. Porting guidelines to set the addresses of FWU metadata image
and updated components in I/O policy

Change-Id: Iad3eb68b4be01a0b5850b69a067c60fcb464f54b
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

c7e39dcf02-Aug-2021 Olivier Deprez <olivier.deprez@arm.com>

Merge "feat(ff-a): change manifest messaging method" into integration

34f702d516-Mar-2021 Manish V Badarkhe <Manish.Badarkhe@arm.com>

docs(fwu_metadata): add FWU metadata build options

Added the build options used in defining the firmware update metadata
structure.

Change-Id: Idd40ea629e643e775083f283b75c80f6c026b127
Signed-off-b

docs(fwu_metadata): add FWU metadata build options

Added the build options used in defining the firmware update metadata
structure.

Change-Id: Idd40ea629e643e775083f283b75c80f6c026b127
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

6ea1a75d29-Jul-2021 Manish Pandey <manish.pandey2@arm.com>

Merge "refactor(plat/marvell): move doc platform build options into own subsections" into integration

92024f8120-Jul-2021 Pali Rohár <pali@kernel.org>

refactor(plat/marvell): move doc platform build options into own subsections

Update documentation and group platform specific build options into
their own subsections.

Signed-off-by: Pali Rohár <pa

refactor(plat/marvell): move doc platform build options into own subsections

Update documentation and group platform specific build options into
their own subsections.

Signed-off-by: Pali Rohár <pali@kernel.org>
Change-Id: I05927d8abf9f811493c49b856f06329220e7d8bb

show more ...

76cce57125-Jul-2021 Joanna Farley <joanna.farley@arm.com>

Merge "docs(maintainers): update imx8 entry" into integration

7b51439923-Jul-2021 Peng Fan <peng.fan@nxp.com>

docs(maintainers): update imx8 entry

Add myself as i.MX8 maintainer.

Signed-off-by: Peng Fan <peng.fan@nxp.com>
Change-Id: Ib037c24a75d42febd79f2eb1ab3b985356dbfb58

bf3ce99321-Apr-2021 Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>

feat: adding the diphda platform

This commit enables trusted-firmware-a with Trusted Board Boot support
for the Diphda 64-bit platform.

Diphda uses a FIP image located in the flash. The FIP contain

feat: adding the diphda platform

This commit enables trusted-firmware-a with Trusted Board Boot support
for the Diphda 64-bit platform.

Diphda uses a FIP image located in the flash. The FIP contains the
following components:

- BL2
- BL31
- BL32
- BL32 SPMC manifest
- BL33
- The TBB certificates

The board boot relies on CoT (chain of trust). The trusted-firmware-a
BL2 is extracted from the FIP and verified by the Secure Enclave
processor. BL2 verification relies on the signature area at the
beginning of the BL2 image. This area is needed by the SecureEnclave
bootloader.

Then, the application processor is released from reset and starts by
executing BL2.

BL2 performs the actions described in the trusted-firmware-a TBB design
document.

Signed-off-by: Rui Miguel Silva <rui.silva@arm.com>
Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
Change-Id: Iddb1cb9c2a0324a9635e23821c210ac81dfc305d

show more ...


about/maintainers.rst
plat/arm/diphda/index.rst
plat/arm/index.rst
/rk3399_ARM-atf/drivers/scmi-msg/common.h
/rk3399_ARM-atf/drivers/scmi-msg/entry.c
/rk3399_ARM-atf/drivers/scmi-msg/power_domain.c
/rk3399_ARM-atf/drivers/scmi-msg/power_domain.h
/rk3399_ARM-atf/drivers/scmi-msg/smt.c
/rk3399_ARM-atf/plat/arm/board/common/rotpk/arm_dev_rotpk.S
/rk3399_ARM-atf/plat/arm/board/diphda/common/diphda_bl2_mem_params_desc.c
/rk3399_ARM-atf/plat/arm/board/diphda/common/diphda_err.c
/rk3399_ARM-atf/plat/arm/board/diphda/common/diphda_helpers.S
/rk3399_ARM-atf/plat/arm/board/diphda/common/diphda_plat.c
/rk3399_ARM-atf/plat/arm/board/diphda/common/diphda_pm.c
/rk3399_ARM-atf/plat/arm/board/diphda/common/diphda_security.c
/rk3399_ARM-atf/plat/arm/board/diphda/common/diphda_stack_protector.c
/rk3399_ARM-atf/plat/arm/board/diphda/common/diphda_topology.c
/rk3399_ARM-atf/plat/arm/board/diphda/common/diphda_trusted_boot.c
/rk3399_ARM-atf/plat/arm/board/diphda/common/fdts/diphda_spmc_manifest.dts
/rk3399_ARM-atf/plat/arm/board/diphda/common/include/platform_def.h
/rk3399_ARM-atf/plat/arm/board/diphda/include/plat_macros.S
/rk3399_ARM-atf/plat/arm/board/diphda/platform.mk
/rk3399_ARM-atf/plat/arm/board/fvp/fvp_bl1_setup.c
/rk3399_ARM-atf/plat/arm/board/fvp/fvp_common.c
/rk3399_ARM-atf/plat/arm/board/fvp/fvp_err.c
/rk3399_ARM-atf/plat/arm/board/juno/juno_bl1_setup.c
/rk3399_ARM-atf/plat/arm/board/juno/juno_err.c
/rk3399_ARM-atf/plat/arm/common/arm_common.mk
/rk3399_ARM-atf/plat/mediatek/mt8192/drivers/spm/mt_spm_cond.c
/rk3399_ARM-atf/plat/mediatek/mt8192/drivers/spm/mt_spm_cond.h
/rk3399_ARM-atf/plat/mediatek/mt8195/drivers/spm/mt_spm_suspend.c
bb320dbc06-May-2021 Maksims Svecovs <maksims.svecovs@arm.com>

feat(ff-a): change manifest messaging method

Align documentation with changes of messaging method for partition
manifest:
- Bit[0]: support for receiving direct message requests
- Bit[1]

feat(ff-a): change manifest messaging method

Align documentation with changes of messaging method for partition
manifest:
- Bit[0]: support for receiving direct message requests
- Bit[1]: support for sending direct messages
- Bit[2]: support for indirect messaging
- Bit[3]: support for managed exit
Change the optee_sp_manifest to align with the new messaging method
description.

Signed-off-by: Maksims Svecovs <maksims.svecovs@arm.com>
Change-Id: I333e82c546c03698c95f0c77293018f8dca5ba9c

show more ...

302b4dfb21-Jul-2021 Venkatesh Yadav Abbarapu <venkatesh.abbarapu@xilinx.com>

feat(plat/versal): add support for SLS mitigation

This patch adds the option HARDEN_SLS_ALL that can be used to enable
the -mharden-sls=all, which mitigates the straight-line speculation
vulnerabili

feat(plat/versal): add support for SLS mitigation

This patch adds the option HARDEN_SLS_ALL that can be used to enable
the -mharden-sls=all, which mitigates the straight-line speculation
vulnerability. Enable this by adding the option HARDEN_SLS_ALL=1,
default this will be disabled.

Signed-off-by: Venkatesh Yadav Abbarapu <venkatesh.abbarapu@xilinx.com>
Change-Id: I0d498d9e96903fcb879993ad491949f6f17769b2

show more ...

e18f4aaf20-Jul-2021 Manish Pandey <manish.pandey2@arm.com>

Merge changes from topic "marvell-a3k-a8k-updates" into integration

* changes:
fix(plat/marvell/a3k): Fix building uart-images.tgz.bin archive
refactor(plat/marvell/a3k): Rename *_CFG and *_SIG

Merge changes from topic "marvell-a3k-a8k-updates" into integration

* changes:
fix(plat/marvell/a3k): Fix building uart-images.tgz.bin archive
refactor(plat/marvell/a3k): Rename *_CFG and *_SIG variables
refactor(plat/marvell/a3k): Rename DOIMAGETOOL to TBB
refactor(plat/marvell/a3k): Remove useless DOIMAGEPATH variable
fix(plat/marvell/a3k): Fix check for external dependences
fix(plat/marvell/a8k): Add missing build dependency for BLE target
fix(plat/marvell/a8k): Correctly set include directories for individual targets
fix(plat/marvell/a8k): Require that MV_DDR_PATH is correctly set

show more ...

c31c82df19-Jul-2021 bipin.ravi <bipin.ravi@arm.com>

Merge "errata: workaround for Neoverse V1 errata 1940577" into integration

1...<<61626364656667686970>>...130