| 37a12f04 | 10-Aug-2020 |
Julius Werner <jwerner@chromium.org> |
Merge "sc7180 platform support" into integration |
| f3ccf036 | 14-Jul-2020 |
Alexei Fedorov <Alexei.Fedorov@arm.com> |
TF-A AMU extension: fix detection of group 1 counters.
This patch fixes the bug when AMUv1 group1 counters was always assumed being implemented without checking for its presence which was causing ex
TF-A AMU extension: fix detection of group 1 counters.
This patch fixes the bug when AMUv1 group1 counters was always assumed being implemented without checking for its presence which was causing exception otherwise. The AMU extension code was also modified as listed below: - Added detection of AMUv1 for ARMv8.6 - 'PLAT_AMU_GROUP1_NR_COUNTERS' build option is removed and number of group1 counters 'AMU_GROUP1_NR_COUNTERS' is now calculated based on 'AMU_GROUP1_COUNTERS_MASK' value - Added bit fields definitions and access functions for AMCFGR_EL0/AMCFGR and AMCGCR_EL0/AMCGCR registers - Unification of amu.c Aarch64 and Aarch32 source files - Bug fixes and TF-A coding style compliant changes.
Change-Id: I14e407be62c3026ebc674ec7045e240ccb71e1fb Signed-off-by: Alexei Fedorov <Alexei.Fedorov@arm.com>
show more ...
|
| 5bd9c17d | 22-Apr-2020 |
Saurabh Gorecha <sgorecha@codeaurora.org> |
sc7180 platform support
Adding support for QTI CHIP SC7180 on ATF
Change-Id: I0d82d3a378036003fbd0bc4784f61464bb76ea82 Signed-off-by: Saurabh Gorecha <sgorecha@codeaurora.org> Co-authored-by: Mauli
sc7180 platform support
Adding support for QTI CHIP SC7180 on ATF
Change-Id: I0d82d3a378036003fbd0bc4784f61464bb76ea82 Signed-off-by: Saurabh Gorecha <sgorecha@codeaurora.org> Co-authored-by: Maulik Shah <mkshah@codeaurora.org>
show more ...
|
| a4075bb5 | 06-Aug-2020 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Fix broken links in docs
Change-Id: If82aaba9f2a5a74cfb5e4381f968166037a70037 Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
| e4c83756 | 05-Aug-2020 |
Mark Dykes <mardyk01@review.trustedfirmware.org> |
Merge "Initialize platform for MediaTek mt8192" into integration |
| 47ee4087 | 05-Aug-2020 |
Alexei Fedorov <Alexei.Fedorov@arm.com> |
Merge "Use abspath to dereference $BUILD_BASE" into integration |
| 95f9b1fb | 05-Aug-2020 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge changes from topic "qemu" into integration
* changes: docs: qemu: bump to QEMU 5.0.0 docs: qemu: remove unneeded root=/dev/vda2 kernel parameter docs: qemu: add build instructions for QE
Merge changes from topic "qemu" into integration
* changes: docs: qemu: bump to QEMU 5.0.0 docs: qemu: remove unneeded root=/dev/vda2 kernel parameter docs: qemu: add build instructions for QEMU_EFI.fd and rootfs.cpio.gz
show more ...
|
| 29214e95 | 30-Jul-2020 |
Grant Likely <grant.likely@arm.com> |
Use abspath to dereference $BUILD_BASE
If the user tries to change BUILD_BASE to put the build products outside the build tree the compile will fail due to hard coded assumptions that $BUILD_BASE is
Use abspath to dereference $BUILD_BASE
If the user tries to change BUILD_BASE to put the build products outside the build tree the compile will fail due to hard coded assumptions that $BUILD_BASE is a relative path. Fix by using $(abspath $(BUILD_BASE)) to rationalize to an absolute path every time and remove the relative path assumptions.
This patch also adds documentation that BUILD_BASE can be specified by the user.
Signed-off-by: Grant Likely <grant.likely@arm.com> Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: Ib1af874de658484aaffc672f30029b852d2489c8
show more ...
|
| 070632f9 | 04-Aug-2020 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "SPM: build OP-TEE as an S-EL1 Secure Partition" into integration |
| 6844c347 | 29-Jul-2020 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Fix broken links to various sections across docs
These broken links were found with the help of this command: $> sphinx-build -M linkcheck . build
A sample broken link is reported as follows: (line
Fix broken links to various sections across docs
These broken links were found with the help of this command: $> sphinx-build -M linkcheck . build
A sample broken link is reported as follows: (line 80) -local- firmware-design.rst#secure-el1-payloads-and-dispatchers
Change-Id: I5dcefdd4b8040908658115647e957f6c2c5da7c2 Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| f85f37d4 | 17-Apr-2020 |
Nina Wu <nina-cm.wu@mediatek.com> |
Initialize platform for MediaTek mt8192
- Add basic platform setup - Add mt8192 documentation at docs/plat/ - Add generic CPU helper functions - Add basic register address
Change-Id: Ife34622105404
Initialize platform for MediaTek mt8192
- Add basic platform setup - Add mt8192 documentation at docs/plat/ - Add generic CPU helper functions - Add basic register address
Change-Id: Ife34622105404a8227441aab939e3c55c96374e9 Signed-off-by: Nina Wu <nina-cm.wu@mediatek.com>
show more ...
|
| db1ef41a | 01-Apr-2020 |
Olivier Deprez <olivier.deprez@arm.com> |
SPM: build OP-TEE as an S-EL1 Secure Partition
Provide manifest and build options to boot OP-TEE as a guest S-EL1 Secure Partition on top of Hafnium in S-EL2.
Increase ARM_SP_MAX_SIZE to cope with
SPM: build OP-TEE as an S-EL1 Secure Partition
Provide manifest and build options to boot OP-TEE as a guest S-EL1 Secure Partition on top of Hafnium in S-EL2.
Increase ARM_SP_MAX_SIZE to cope with OP-TEE debug build image.
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: Idd2686fa689a78fe2d05ed92b1d23c65e2edd4cb
show more ...
|
| 582e4e7b | 29-Jul-2020 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
Makefile, doc: Make OPENSSL_DIR variable as build option for tools
Openssl directory path is hardcoded to '/usr' in the makefile of certificate generation and firmware encryption tool using 'OPENSSL
Makefile, doc: Make OPENSSL_DIR variable as build option for tools
Openssl directory path is hardcoded to '/usr' in the makefile of certificate generation and firmware encryption tool using 'OPENSSL_DIR' variable.
Hence changes are done to make 'OPENSSL_DIR' variable as a build option so that user can provide openssl directory path while building the certificate generation and firmware encryption tool.
Also, updated the document for this newly created build option
Change-Id: Ib1538370d2c59263417f5db3746d1087ee1c1339 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 3045dfe1 | 22-Mar-2019 |
Grzegorz Jaszczyk <jaz@semihalf.com> |
docs: marvell: update PHY porting layer description
The purpose of rx_training had changed after last update. Currently it is not supposed to help with providing static parameters for porting layer.
docs: marvell: update PHY porting layer description
The purpose of rx_training had changed after last update. Currently it is not supposed to help with providing static parameters for porting layer. Instead, it aims to suit the parameters per connection.
Change-Id: I2a146b71e2e20bd264c090a9a627d0b6bc56e052 Signed-off-by: Grzegorz Jaszczyk <jaz@semihalf.com>
show more ...
|
| 663f6bcf | 10-Dec-2018 |
Grzegorz Jaszczyk <jaz@semihalf.com> |
docs: marvell: update path in marvell documentation
Change-Id: I0cebbaa900aa518700f13cbf02f8a97e0c76b21c Signed-off-by: Grzegorz Jaszczyk <jaz@semihalf.com> |
| eed02440 | 19-Feb-2019 |
Konstantin Porotchkin <kostap@marvell.com> |
docs: marvell: update build instructions with CN913x
Add references to the OcteonTX2 CN913x family.
Change-Id: I172a8e3d061086bf4843acad014c113c80359e01 Signed-off-by: Konstantin Porotchkin <kostap
docs: marvell: update build instructions with CN913x
Add references to the OcteonTX2 CN913x family.
Change-Id: I172a8e3d061086bf4843acad014c113c80359e01 Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>
show more ...
|
| f3be7e28 | 29-Jul-2020 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "docs/fvp: update SGI and RD FVP list" into integration |
| 833abc61 | 29-Jul-2020 |
joanna.farley <joanna.farley@arm.com> |
Merge "doc: secure partition manager design" into integration |
| 439dcf50 | 29-Jul-2020 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "Fix broken link in documentation" into integration |
| a6151e7c | 28-Jul-2020 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "SMCCC: Introduce function to check SMCCC function availability" into integration |
| 526f2bdd | 28-Jul-2020 |
johpow01 <john.powell@arm.com> |
Fix broken link in documentation
The link to the exception handling framework page on the System Design / Firmware Design / Section 4.3 just links to itself, so I changed it to link to the exception
Fix broken link in documentation
The link to the exception handling framework page on the System Design / Firmware Design / Section 4.3 just links to itself, so I changed it to link to the exception handling framework component document.
Signed-off-by: John Powell <john.powell@arm.com> Change-Id: I6711b423a789b2b3d1921671e8497fffa8ba33d1
show more ...
|
| 894eb3ee | 28-Jul-2020 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "doc: use docker to build documentation" into integration |
| 6f0a2f04 | 23-Jul-2020 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
SMCCC: Introduce function to check SMCCC function availability
Currently, 'SMCCC_ARCH_FEATURES' SMC call handler unconditionally returns 'SMC_OK' for 'SMCCC_ARCH_SOC_ID' function. This seems to be n
SMCCC: Introduce function to check SMCCC function availability
Currently, 'SMCCC_ARCH_FEATURES' SMC call handler unconditionally returns 'SMC_OK' for 'SMCCC_ARCH_SOC_ID' function. This seems to be not correct for the platform which doesn't implement soc-id functionality i.e. functions to retrieve both soc-version and soc-revision. Hence introduced a platform function which will check whether SMCCC feature is available for the platform.
Also, updated porting guide for the newly added platform function.
Change-Id: I389f0ef6b0837bb24c712aa995b7176117bc7961 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 1056ddce | 23-Jul-2020 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge "Revert workaround for Neoverse N1 erratum 1800710" into integration |
| f0bbaebc | 23-Jul-2020 |
johpow01 <john.powell@arm.com> |
Revert workaround for Neoverse N1 erratum 1800710
This reverts commit 11af40b6308ac75c83e874129bb79bc3a58060bf, reversing changes made to 2afcf1d4b845272791b75c8285108c4dcd91e2b9.
This errata worka
Revert workaround for Neoverse N1 erratum 1800710
This reverts commit 11af40b6308ac75c83e874129bb79bc3a58060bf, reversing changes made to 2afcf1d4b845272791b75c8285108c4dcd91e2b9.
This errata workaround did not work as intended so we are reverting this change. In the future, when the corrected workaround is published in an SDEN, we will push a new workaround.
This is the patch being reverted: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/4750
Signed-off-by: John Powell <john.powell@arm.com> Change-Id: I20aa064c1bac9671939e657bec269d32b9e75a97
show more ...
|