History log of /rk3399_ARM-atf/include/ (Results 2051 – 2075 of 3957)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
dcbfbcb502-Jun-2020 johpow01 <john.powell@arm.com>

Workaround for Cortex A76 erratum 1800710

Cortex A76 erratum 1800710 is a Cat B erratum, present in older
revisions of the Cortex A76 processor core. The workaround is to
set a bit in the ECTLR_EL1

Workaround for Cortex A76 erratum 1800710

Cortex A76 erratum 1800710 is a Cat B erratum, present in older
revisions of the Cortex A76 processor core. The workaround is to
set a bit in the ECTLR_EL1 system register, which disables allocation
of splintered pages in the L2 TLB.

This errata is explained in this SDEN:
https://static.docs.arm.com/sden885749/g/Arm_Cortex_A76_MP052_Software_Developer_Errata_Notice_v20.pdf

Signed-off-by: John Powell <john.powell@arm.com>
Change-Id: Ifc34f2e9e053dcee6a108cfb7df7ff7f497c9493

show more ...

d7b08e6929-May-2020 johpow01 <john.powell@arm.com>

Workaround for Cortex A76 erratum 1791580

Cortex A76 erratum 1791580 is a Cat B erratum present in earlier
revisions of the Cortex A76. The workaround is to set a bit in the
implementation defined C

Workaround for Cortex A76 erratum 1791580

Cortex A76 erratum 1791580 is a Cat B erratum present in earlier
revisions of the Cortex A76. The workaround is to set a bit in the
implementation defined CPUACTLR2 register, which forces atomic store
operations to write-back memory to be performed in the L1 data cache.

This errata is explained in this SDEN:
https://static.docs.arm.com/sden885749/g/Arm_Cortex_A76_MP052_Software_Developer_Errata_Notice_v20.pdf

Signed-off-by: John Powell <john.powell@arm.com>
Change-Id: Iefd58159b3f2e2286138993317b98e57dc361925

show more ...

b667b36922-Jun-2020 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "TF-A GIC driver: Add barrier before eoi" into integration

453e12c222-Jun-2020 Manish Pandey <manish.pandey2@arm.com>

Merge changes from topic "scmi-msg" into integration

* changes:
drivers/scmi-msg: smt entry points for incoming messages
drivers/scmi-msg: support for reset domain protocol
drivers/scmi-msg: s

Merge changes from topic "scmi-msg" into integration

* changes:
drivers/scmi-msg: smt entry points for incoming messages
drivers/scmi-msg: support for reset domain protocol
drivers/scmi-msg: support for clock protocol
drivers/scmi-msg: driver for processing scmi messages

show more ...

5eb16c4705-Jun-2020 Sandeep Tripathy <sandeep.tripathy@broadcom.com>

TF-A GIC driver: Add barrier before eoi

It is desired to have the peripheral writes completed to clear the
interrupt condition and de-assert the interrupt request to GIC before
EOI write. Failing wh

TF-A GIC driver: Add barrier before eoi

It is desired to have the peripheral writes completed to clear the
interrupt condition and de-assert the interrupt request to GIC before
EOI write. Failing which spurious interrupt will occurred.

A barrier is needed to ensure peripheral register write transfers are
complete before EOI is done.

GICv2 memory mapped DEVICE nGnR(n)E writes are ordered from core point
of view. However these writes may pass over different interconnects,
bridges, buffers leaving some rare chances for the actual write to
complete out of order.

GICv3 ICC EOI system register writes have no ordering against nGnR(n)E
memory writes as they are over different interfaces.

Hence a dsb can ensure from core no writes are issued before the previous
writes are *complete*.

Signed-off-by: Sandeep Tripathy <sandeep.tripathy@broadcom.com>
Change-Id: Ie6362009e2f91955be99dca8ece14ade7b4811d6

show more ...

49fe535b02-Jun-2020 Sheetal Tigadoli <sheetal.tigadoli@broadcom.com>

Fix typo in file Header guard

Signed-off-by: Sheetal Tigadoli <sheetal.tigadoli@broadcom.com>
Change-Id: Iaf6deaeee2069720518221157edbb052bc42850a

47d1773f15-Apr-2019 Konstantin Porotchkin <kostap@marvell.com>

plat: marvell: armada: a8k: add OP-TEE OS MMU tables

Adjust the latest OP-TEE memory definitions to the
newest TF-A baseline.

Change-Id: Ib9c82b85f868adaf3c7285eb340486bda9c59c36
Signed-off-by: Kon

plat: marvell: armada: a8k: add OP-TEE OS MMU tables

Adjust the latest OP-TEE memory definitions to the
newest TF-A baseline.

Change-Id: Ib9c82b85f868adaf3c7285eb340486bda9c59c36
Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>

show more ...

5a40d70f31-Mar-2019 Konstantin Porotchkin <kostap@marvell.com>

drivers: marvell: add support for mapping the entire LLC to SRAM

Add llc_sram_enable() and llc_sram_disable() APIs to Marvell
cache_lls driver.
Add LLC_SRAM definition to Marvell common makefile - d

drivers: marvell: add support for mapping the entire LLC to SRAM

Add llc_sram_enable() and llc_sram_disable() APIs to Marvell
cache_lls driver.
Add LLC_SRAM definition to Marvell common makefile - disabled
by the default.
Add description of LLC_SRAM flag to the build documentation.

Change-Id: Ib348e09752ce1206d29268ef96c9018b781db182
Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>

show more ...

63a0b12719-Jun-2020 Konstantin Porotchkin <kostap@marvell.com>

plat: marvell: armada: platform definitions cleanup

- Remove
TRUSTED_DRAM_BASE
TRUSTED_DRAM_SIZE
MARVELL_TRUSTED_SRAM_BASE
- Rename
PLAT_MARVELL_TRUSTED_DRAM_* -> PLAT_MARVELL_TRUSTE

plat: marvell: armada: platform definitions cleanup

- Remove
TRUSTED_DRAM_BASE
TRUSTED_DRAM_SIZE
MARVELL_TRUSTED_SRAM_BASE
- Rename
PLAT_MARVELL_TRUSTED_DRAM_* -> PLAT_MARVELL_TRUSTED_RAM_*
PLAT_MARVELL_TRUSTED_SRAM_* -> MARVELL_TRUSTED_DRAM_*
MARVELL_MAP_SHARED_RAM -> MARVELL_MAP_SECURE_RAM
- Move
MARVELL_TRUSTED_DRAM_SIZE to marvell_def.h
- Enable MARVELL_MAP_SECURE_RAM region in BL2U memory map
- Add dependency of MARVELL_MAP_SHARED_RAM on LLC_SRAM
- Add minor style improvents

Change-Id: Iebc03361e4f88489af1597f54e137b27c241814c
Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>
[Improve patch after rebase]
Signed-off-by: Marcin Wojtas <mw@semihalf.com>

show more ...

957a5add31-Mar-2019 Konstantin Porotchkin <kostap@marvell.com>

drivers: marvell: add CCU driver API for window state checking

Add ccu_is_win_enabled() API for checking the CCU window
state using AP and window indexes.

Change-Id: Ib955a2cac28b2729b0a763f3bbbea2

drivers: marvell: add CCU driver API for window state checking

Add ccu_is_win_enabled() API for checking the CCU window
state using AP and window indexes.

Change-Id: Ib955a2cac28b2729b0a763f3bbbea28b476a2fe4
Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>

show more ...

772aa5ba25-Mar-2019 Konstantin Porotchkin <kostap@marvell.com>

drivers: marvell: align and extend llc macros

Make all LLC-related macros to start with the same prefix
Add more LLC control registers definitions
This patch is a preparation step for LLC SRAM suppo

drivers: marvell: align and extend llc macros

Make all LLC-related macros to start with the same prefix
Add more LLC control registers definitions
This patch is a preparation step for LLC SRAM support

Change-Id: I0a4f0fc83e8ef35be93dd239a85f2a9f88d1ab19
Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>

show more ...

cdfbbfef14-Mar-2019 Konstantin Porotchkin <kostap@marvell.com>

plat: marvell: armada: re-enable BL32_BASE definition

As a preparation to support proper loading the OPTEE OS image,
enable the BL32 specific defines in case the SPD is used.

On the occasion move t

plat: marvell: armada: re-enable BL32_BASE definition

As a preparation to support proper loading the OPTEE OS image,
enable the BL32 specific defines in case the SPD is used.

On the occasion move two BL32-related macros to marvell_def.h
and fix BL32_LIMIT definition.

Change-Id: Id4e2d81833bc1895650cca8b0fc0bfc341cf77f3
Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>
Signed-off-by: Marcin Wojtas <mw@semihalf.com>

show more ...

b5c850d418-Jun-2020 Marcin Wojtas <mw@semihalf.com>

plat: marvell: armada: modify PLAT_FAMILY name for 37xx SoCs

The Marvell Armada 37xx SoCs-based platforms contain a bit
awkward directory structure because the currently only one
supported PLAT and

plat: marvell: armada: modify PLAT_FAMILY name for 37xx SoCs

The Marvell Armada 37xx SoCs-based platforms contain a bit
awkward directory structure because the currently only one
supported PLAT and PLAT_FAMILY are the same. Modify the latter
to 'a3k' in order to improve it and keep plat/marvell/armada
tree more consistent:

plat/marvell/
├── armada
│   ├── a3k
│   │   ├── a3700

[...]

│   ├── a8k
│   │   ├── a70x0

[...]

Change-Id: I693a6ef88e6ce49a326a3328875c90bbc186066a
Signed-off-by: Marcin Wojtas <mw@semihalf.com>

show more ...

9935047b17-Jun-2020 Manish Pandey <manish.pandey2@arm.com>

Merge changes I80316689,I23cac4fb,If911e7de,I169ff358,I4e040cd5, ... into integration

* changes:
ddr: a80x0: add DDR 32-bit ECC mode support
ble: ap807: improve PLL configuration sequence
ble:

Merge changes I80316689,I23cac4fb,If911e7de,I169ff358,I4e040cd5, ... into integration

* changes:
ddr: a80x0: add DDR 32-bit ECC mode support
ble: ap807: improve PLL configuration sequence
ble: ap807: clean-up PLL configuration sequence
ddr: a80x0: add DDR 32-bit mode support
plat: marvell: mci: perform mci link tuning for all mci interfaces
plat: marvell: mci: use more meaningful name for mci link tuning
plat: marvell: a8k: remove wrong or unnecessary comments
plat: marvell: ap807: enable snoop filter for ap807
plat: marvell: ap807: update configuration space of each CP
plat: marvell: ap807: use correct address for MCIx4 register
plat: marvell: add support for PLL 2.2GHz mode
plat: marvell: armada: make a8k_common.mk and mss_common.mk more generic
marvell: armada: add extra level in marvell platform hierarchy

show more ...


/rk3399_ARM-atf/docs/plat/marvell/armada/build.rst
/rk3399_ARM-atf/docs/plat/marvell/armada/misc/mvebu-a8k-addr-map.rst
/rk3399_ARM-atf/docs/plat/marvell/armada/misc/mvebu-amb.rst
/rk3399_ARM-atf/docs/plat/marvell/armada/misc/mvebu-ccu.rst
/rk3399_ARM-atf/docs/plat/marvell/armada/misc/mvebu-io-win.rst
/rk3399_ARM-atf/docs/plat/marvell/armada/misc/mvebu-iob.rst
/rk3399_ARM-atf/docs/plat/marvell/armada/porting.rst
/rk3399_ARM-atf/docs/plat/marvell/index.rst
/rk3399_ARM-atf/drivers/marvell/ap807_clocks_init.c
/rk3399_ARM-atf/drivers/marvell/comphy/phy-comphy-cp110.c
/rk3399_ARM-atf/drivers/marvell/comphy/phy-comphy-cp110.h
/rk3399_ARM-atf/drivers/marvell/mci.c
/rk3399_ARM-atf/drivers/marvell/mochi/ap807_setup.c
/rk3399_ARM-atf/drivers/marvell/mochi/apn806_setup.c
drivers/marvell/aro.h
drivers/marvell/mci.h
drivers/marvell/mochi/ap_setup.h
plat/marvell/armada/a3700/common/armada_common.h
plat/marvell/armada/a3700/common/board_marvell_def.h
plat/marvell/armada/a3700/common/marvell_def.h
plat/marvell/armada/a3700/common/plat_marvell.h
plat/marvell/armada/a8k/common/armada_common.h
plat/marvell/armada/a8k/common/board_marvell_def.h
plat/marvell/armada/a8k/common/marvell_def.h
plat/marvell/armada/a8k/common/plat_marvell.h
plat/marvell/armada/a8k/common/plat_pm_trace.h
plat/marvell/armada/common/aarch64/cci_macros.S
plat/marvell/armada/common/aarch64/marvell_macros.S
plat/marvell/armada/common/marvell_plat_priv.h
plat/marvell/armada/common/marvell_pm.h
plat/marvell/armada/common/mvebu.h
/rk3399_ARM-atf/plat/arm/board/rdn1edge/fdts/rdn1edge_fw_config.dts
/rk3399_ARM-atf/plat/arm/board/tc0/fdts/tc0_fw_config.dts
/rk3399_ARM-atf/plat/marvell/armada/a3700/a3700/board/pm_src.c
/rk3399_ARM-atf/plat/marvell/armada/a3700/a3700/mvebu_def.h
/rk3399_ARM-atf/plat/marvell/armada/a3700/a3700/plat_bl31_setup.c
/rk3399_ARM-atf/plat/marvell/armada/a3700/a3700/platform.mk
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/a3700_common.mk
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/a3700_ea.c
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/a3700_sip_svc.c
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/aarch64/a3700_common.c
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/aarch64/plat_helpers.S
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/dram_win.c
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/include/a3700_plat_def.h
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/include/a3700_pm.h
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/include/ddr_info.h
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/include/dram_win.h
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/include/io_addr_dec.h
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/include/plat_macros.S
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/include/platform_def.h
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/io_addr_dec.c
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/marvell_plat_config.c
/rk3399_ARM-atf/plat/marvell/armada/a3700/common/plat_pm.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/a70x0/board/dram_port.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/a70x0/board/marvell_plat_config.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/a70x0/mvebu_def.h
/rk3399_ARM-atf/plat/marvell/armada/a8k/a70x0/platform.mk
/rk3399_ARM-atf/plat/marvell/armada/a8k/a70x0_amc/board/dram_port.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/a70x0_amc/board/marvell_plat_config.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/a70x0_amc/mvebu_def.h
/rk3399_ARM-atf/plat/marvell/armada/a8k/a70x0_amc/platform.mk
/rk3399_ARM-atf/plat/marvell/armada/a8k/a80x0/board/dram_port.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/a80x0/board/marvell_plat_config.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/a80x0/board/phy-porting-layer.h
/rk3399_ARM-atf/plat/marvell/armada/a8k/a80x0/mvebu_def.h
/rk3399_ARM-atf/plat/marvell/armada/a8k/a80x0/platform.mk
/rk3399_ARM-atf/plat/marvell/armada/a8k/a80x0_mcbin/board/dram_port.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/a80x0_mcbin/board/marvell_plat_config.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/a80x0_mcbin/mvebu_def.h
/rk3399_ARM-atf/plat/marvell/armada/a8k/a80x0_mcbin/platform.mk
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/a8k_common.mk
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/aarch64/a8k_common.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/aarch64/plat_arch_config.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/aarch64/plat_helpers.S
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/ble/ble.ld.S
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/ble/ble.mk
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/ble/ble_main.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/ble/ble_mem.S
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/include/a8k_plat_def.h
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/include/ddr_info.h
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/include/mentor_i2c_plat.h
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/include/plat_macros.S
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/include/platform_def.h
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/mss/mss_a8k.mk
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/mss/mss_bl2_setup.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/mss/mss_pm_ipc.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/mss/mss_pm_ipc.h
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/plat_bl1_setup.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/plat_bl31_setup.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/plat_ble_setup.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/plat_pm.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/plat_pm_trace.c
/rk3399_ARM-atf/plat/marvell/armada/a8k/common/plat_thermal.c
/rk3399_ARM-atf/plat/marvell/armada/common/aarch64/marvell_bl2_mem_params_desc.c
/rk3399_ARM-atf/plat/marvell/armada/common/aarch64/marvell_common.c
/rk3399_ARM-atf/plat/marvell/armada/common/aarch64/marvell_helpers.S
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_bl1_setup.c
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_bl2_setup.c
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_bl31_setup.c
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_cci.c
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_common.mk
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_console.c
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_ddr_info.c
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_gicv2.c
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_gicv3.c
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_image_load.c
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_io_storage.c
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_pm.c
/rk3399_ARM-atf/plat/marvell/armada/common/marvell_topology.c
/rk3399_ARM-atf/plat/marvell/armada/common/mrvl_sip_svc.c
/rk3399_ARM-atf/plat/marvell/armada/common/mss/mss_common.mk
/rk3399_ARM-atf/plat/marvell/armada/common/mss/mss_ipc_drv.c
/rk3399_ARM-atf/plat/marvell/armada/common/mss/mss_ipc_drv.h
/rk3399_ARM-atf/plat/marvell/armada/common/mss/mss_mem.h
/rk3399_ARM-atf/plat/marvell/armada/common/mss/mss_scp_bl2_format.h
/rk3399_ARM-atf/plat/marvell/armada/common/mss/mss_scp_bootloader.c
/rk3399_ARM-atf/plat/marvell/armada/common/mss/mss_scp_bootloader.h
/rk3399_ARM-atf/plat/marvell/armada/common/plat_delay_timer.c
/rk3399_ARM-atf/plat/marvell/marvell.mk
7d6fa6ec01-May-2020 Etienne Carriere <etienne.carriere@st.com>

drivers/scmi-msg: smt entry points for incoming messages

This change implements SCMI channels for reading a SCMI message from a
shared memory and call the SCMI message drivers to route the message
t

drivers/scmi-msg: smt entry points for incoming messages

This change implements SCMI channels for reading a SCMI message from a
shared memory and call the SCMI message drivers to route the message
to the target platform services.

SMT refers to the shared memory management protocol which is used
to get/put message/response in shared memory. SMT is a 28byte header
stating shared memory state and exchanged protocol data.

The processing entry for a SCMI message can be a secure interrupt
or fastcall SMCCC invocation.

SMT description in this implementation is based on the OP-TEE
project [1] itself based in the SCP-firmware implementation [2].

Link: [1] https://github.com/OP-TEE/optee_os/commit/a58c4d706d2333d2b21a3eba7e2ec0cb257bca1d
Link: [2] https://github.com/ARM-software/SCP-firmware.git

Change-Id: I416c7dab5c67954c6fe80bae8d8cdfdcda66873e
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>

show more ...

6cc2c1cb01-May-2020 Etienne Carriere <etienne.carriere@st.com>

drivers/scmi-msg: support for reset domain protocol

Adds SCMI reset domain protocol support in the SCMI message drivers
as defined in SCMI specification v2.0 [1]. Not all the messages
defined in the

drivers/scmi-msg: support for reset domain protocol

Adds SCMI reset domain protocol support in the SCMI message drivers
as defined in SCMI specification v2.0 [1]. Not all the messages
defined in the specification are supported.

scmi_msg_get_rd_handler() sanitizes the message_id value
against any speculative use of reset domain ID as a index since by
SCMI specification, IDs are indices.

This implementation is based on the OP-TEE project implementation [2]
itself based on the SCP-firmware implementation [3] of the SCMI
protocol server side.

Link: [1] http://infocenter.arm.com/help/topic/com.arm.doc.den0056a/DEN0056A_System_Control_and_Management_Interface.pdf
Link: [2] https://github.com/OP-TEE/optee_os/commit/56a1f10ed99d683ee3a8af29b6147a59a99ef3e0
Link: [3] https://github.com/ARM-software/SCP-firmware.git

Change-Id: If7cf13de40a815dedb40dcd5af8b6bb6725d9078
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>

show more ...

c9e8300001-May-2020 Etienne Carriere <etienne.carriere@st.com>

drivers/scmi-msg: support for clock protocol

Adds SCMI clock protocol support in the SCMI message drivers as
defined in SCMI specification v2.0 [1] for clock protocol messages.

Platform can provide

drivers/scmi-msg: support for clock protocol

Adds SCMI clock protocol support in the SCMI message drivers as
defined in SCMI specification v2.0 [1] for clock protocol messages.

Platform can provide one of the plat_scmi_clock_*() handler for the
supported operations set/get state/rate and others.

scmi_msg_get_clock_handler() sanitizes the message_id value
against any speculative use of clock ID as a index since by
SCMI specification, IDs are indices.

This implementation is based on the OP-TEE project implementation [2]
itself based on the SCP-firmware implementation [3] of the SCMI
protocol server side.

Link: [1] http://infocenter.arm.com/help/topic/com.arm.doc.den0056a/DEN0056A_System_Control_and_Management_Interface.pdf
Link: [2] https://github.com/OP-TEE/optee_os/commit/a7a9e3ba71dd908aafdc4c5ed9b29b15faa9692d
Link: [3] https://github.com/ARM-software/SCP-firmware.git

Change-Id: Ib56e096512042d4f7b9563d1e4181554eb8ed02c
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>

show more ...

75366ccd28-Nov-2019 Etienne Carriere <etienne.carriere@linaro.org>

drivers/scmi-msg: driver for processing scmi messages

This change introduces drivers to allow a platform to create a basic
SCMI service and register handlers for client request (SCMI agent) on
syste

drivers/scmi-msg: driver for processing scmi messages

This change introduces drivers to allow a platform to create a basic
SCMI service and register handlers for client request (SCMI agent) on
system resources. This is the first piece of the drivers: an entry
function, the SCMI base protocol support and helpers for create
the response message.

With this change, scmi_process_message() is the entry function to
process an incoming SCMI message. The function expect the message
is already copied from shared memory into secure memory. The message
structure stores message reference and output buffer reference where
response message shall be stored.

scmi_process_message() calls the SCMI protocol driver according to
the protocol ID in the message. The SCMI protocol driver will call
defined platform handlers according to the message content.

This change introduces only the SCMI base protocol as defined in
SCMI specification v2.0 [1]. Not all the messages defined
in the specification are supported.

The SCMI message implementation is derived from the OP-TEE project [2]
itself based on the SCP-firmware implementation [3] of the SCMI protocol
server side.

Link: [1] http://infocenter.arm.com/help/topic/com.arm.doc.den0056a/DEN0056A_System_Control_and_Management_Interface.pdf
Link: [2] https://github.com/OP-TEE/optee_os/commit/ae8c8068098d291e6e55744dbc237ec39fd9840a
Link: [3] https://github.com/ARM-software/SCP-firmware/tree/v2.6.0

Change-Id: I639c4154a39fca60606264baf8d32452641f45e9
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>

show more ...

5eeb091a16-Jun-2020 Manish Pandey <manish.pandey2@arm.com>

Merge changes from topic "tegra194-ras-handling" into integration

* changes:
Tegra194: ras: verbose prints for SErrors
Prevent RAS register access from lower ELs
Tegra194: SiP: clear RAS corre

Merge changes from topic "tegra194-ras-handling" into integration

* changes:
Tegra194: ras: verbose prints for SErrors
Prevent RAS register access from lower ELs
Tegra194: SiP: clear RAS corrected error records
Tegra194: add RAS exception handling

show more ...

fbc44bd112-Jun-2020 Varun Wadekar <vwadekar@nvidia.com>

Prevent RAS register access from lower ELs

This patch adds a build config 'RAS_TRAP_LOWER_EL_ERR_ACCESS' to set
SCR_EL3.TERR during CPU boot. This bit enables trapping RAS register
accesses from EL1

Prevent RAS register access from lower ELs

This patch adds a build config 'RAS_TRAP_LOWER_EL_ERR_ACCESS' to set
SCR_EL3.TERR during CPU boot. This bit enables trapping RAS register
accesses from EL1 or EL2 to EL3.

RAS_TRAP_LOWER_EL_ERR_ACCESS is disabled by default.

Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
Change-Id: Ifb0fb0afedea7dd2a29a0b0491a1161ecd241438

show more ...

8ca6153818-Mar-2019 David Pu <dpu@nvidia.com>

Tegra194: add RAS exception handling

This patch adds all Tegra194 RAS nodes definitions and support to
handle all uncorrectable RAS errors.

Change-Id: I109b5a8dbca91d92752dc282c4ca30f273c475f9
Sign

Tegra194: add RAS exception handling

This patch adds all Tegra194 RAS nodes definitions and support to
handle all uncorrectable RAS errors.

Change-Id: I109b5a8dbca91d92752dc282c4ca30f273c475f9
Signed-off-by: David Pu <dpu@nvidia.com>
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>

show more ...

a8818bbf10-Jun-2020 Manish Pandey <manish.pandey2@arm.com>

cert_create: extend Secure partition support for tbbr CoT

with sha 0792dd7, support to generate certificate for Secure
Partitions was added for dualroot CoT only, this patch extends
this support for

cert_create: extend Secure partition support for tbbr CoT

with sha 0792dd7, support to generate certificate for Secure
Partitions was added for dualroot CoT only, this patch extends
this support for tbbr CoT.

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: I451c0333536dd1cbe17861d454bdb0dc7a17c63f

show more ...

10640d2409-Jun-2020 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "GICv3: GIC-600: Detect GIC-600 at runtime" into integration

02383c2809-Jun-2020 Manish Pandey <manish.pandey2@arm.com>

Merge changes from topic "sp_secure_boot" into integration

* changes:
dualroot: add chain of trust for secure partitions
sptool: append cert_tool arguments.
cert_create: add SiP owned secure p

Merge changes from topic "sp_secure_boot" into integration

* changes:
dualroot: add chain of trust for secure partitions
sptool: append cert_tool arguments.
cert_create: add SiP owned secure partitions support

show more ...

452d5e5e02-Jun-2020 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

plat/fvp: Add support for dynamic description of secure interrupts

Using the fconf framework, the Group 0 and Group 1 secure interrupt
descriptors are moved to device tree and retrieved in runtime.

plat/fvp: Add support for dynamic description of secure interrupts

Using the fconf framework, the Group 0 and Group 1 secure interrupt
descriptors are moved to device tree and retrieved in runtime. This
feature is enabled by the build flag SEC_INT_DESC_IN_FCONF.

Change-Id: I360c63a83286c7ecc2426cd1ff1b4746d61e633c
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>

show more ...


/rk3399_ARM-atf/Makefile
/rk3399_ARM-atf/docs/getting_started/build-options.rst
/rk3399_ARM-atf/fdts/fvp-base-gicv3-psci-common.dtsi
plat/arm/common/fconf_sec_intr_config.h
/rk3399_ARM-atf/make_helpers/defaults.mk
/rk3399_ARM-atf/plat/arm/board/a5ds/fdts/a5ds_fw_config.dts
/rk3399_ARM-atf/plat/arm/board/fvp/fdts/fvp_fw_config.dts
/rk3399_ARM-atf/plat/arm/board/fvp/fvp_gicv3.c
/rk3399_ARM-atf/plat/arm/board/fvp/platform.mk
/rk3399_ARM-atf/plat/arm/board/fvp/sp_min/sp_min-fvp.mk
/rk3399_ARM-atf/plat/arm/board/fvp_ve/fdts/fvp_ve_fw_config.dts
/rk3399_ARM-atf/plat/arm/board/juno/fdts/juno_fw_config.dts
/rk3399_ARM-atf/plat/arm/board/rddaniel/fdts/rddaniel_fw_config.dts
/rk3399_ARM-atf/plat/arm/board/rddanielxlr/fdts/rddanielxlr_fw_config.dts
/rk3399_ARM-atf/plat/arm/board/rde1edge/fdts/rde1edge_fw_config.dts
/rk3399_ARM-atf/plat/arm/board/rdn1edge/fdts/rdn1edge_fw_config.dts
/rk3399_ARM-atf/plat/arm/board/sgi575/fdts/sgi575_fw_config.dts
/rk3399_ARM-atf/plat/arm/board/sgm775/fdts/sgm775_fw_config.dts
/rk3399_ARM-atf/plat/arm/board/tc0/fdts/tc0_fw_config.dts
/rk3399_ARM-atf/plat/arm/common/fconf/fconf_sec_intr_config.c
/rk3399_ARM-atf/plat/intel/soc/agilex/bl2_plat_setup.c
/rk3399_ARM-atf/plat/intel/soc/agilex/include/agilex_clock_manager.h
/rk3399_ARM-atf/plat/intel/soc/agilex/include/agilex_mmc.h
/rk3399_ARM-atf/plat/intel/soc/agilex/platform.mk
/rk3399_ARM-atf/plat/intel/soc/agilex/soc/agilex_clock_manager.c
/rk3399_ARM-atf/plat/intel/soc/agilex/soc/agilex_mmc.c
/rk3399_ARM-atf/plat/intel/soc/agilex/soc/agilex_pinmux.c
/rk3399_ARM-atf/plat/intel/soc/common/drivers/ccu/ncore_ccu.c
/rk3399_ARM-atf/plat/intel/soc/common/include/socfpga_system_manager.h
/rk3399_ARM-atf/plat/intel/soc/common/socfpga_delay_timer.c
/rk3399_ARM-atf/plat/rockchip/common/params_setup.c
/rk3399_ARM-atf/plat/rockchip/rk3368/include/platform_def.h
/rk3399_ARM-atf/plat/ti/k3/common/plat_common.mk
/rk3399_ARM-atf/plat/ti/k3/include/platform_def.h

1...<<81828384858687888990>>...159