| #
5de3e03d |
| 05-Feb-2026 |
Yann Gautier <yann.gautier@st.com> |
Merge changes from topic "qtiseclib_devel" into integration
* changes: feat(kodiak): build XPU bypass only when bypass is enabled docs(maintainers): update QTI maintainers feat(qti): integrate
Merge changes from topic "qtiseclib_devel" into integration
* changes: feat(kodiak): build XPU bypass only when bypass is enabled docs(maintainers): update QTI maintainers feat(qti): integrate access control stub feat(kodiak): add access control driver feat(qti): integrate watchdog stub feat(kodiak): add watchdog driver feat(qti): extend interrupt dispatcher feat(qti): integrate qtimer stub feat(kodiak): add qtimer driver feat(qti): integrate sec_core stub feat(kodiak): add sec_core driver
show more ...
|
| #
a757f5f8 |
| 27-Oct-2025 |
Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com> |
feat(kodiak): add sec_core driver
Sets the CPU reset start address (via a helper) and configures the security/access policy for CPU/clock/power/timer blocks and the interconnect so the rest of the b
feat(kodiak): add sec_core driver
Sets the CPU reset start address (via a helper) and configures the security/access policy for CPU/clock/power/timer blocks and the interconnect so the rest of the boot flow and the non‑secure OS can safely access what they need.
When this driver is enabled the Qualcomm propietary security library (QTISECLIB) no longer needs to perform these actions.
For coverity purposes, include the driver in the non-bootable build.
Change-Id: I3fd6c62ce6b69f5d1e43f4207142ceaa07b9b370 Signed-off-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>
show more ...
|