History log of /rk3399_ARM-atf/include/ (Results 2751 – 2775 of 3957)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
05ca725405-Sep-2018 Dimitris Papastamos <dimitris.papastamos@arm.com>

Merge pull request #1554 from jts-arm/mbed

Mbed TLS shared heap

6cf8d65f28-Aug-2018 Varun Wadekar <vwadekar@nvidia.com>

cpus: denver: Implement static workaround for CVE-2018-3639

For Denver CPUs, this approach enables the mitigation during EL3
initialization, following every PE reset. No mechanism is provided to
dis

cpus: denver: Implement static workaround for CVE-2018-3639

For Denver CPUs, this approach enables the mitigation during EL3
initialization, following every PE reset. No mechanism is provided to
disable the mitigation at runtime.

This approach permanently mitigates the EL3 software stack only. Other
software components are responsible to enable it for their exception
levels.

TF-A implements this approach for the Denver CPUs with DENVER_MIDR_PN3
and earlier:

* By setting bit 11 (Disable speculative store buffering) of
`ACTLR_EL3`

* By setting bit 9 (Disable speculative memory disambiguation) of
`ACTLR_EL3`

TF-A implements this approach for the Denver CPUs with DENVER_MIDR_PN4
and later:

* By setting bit 18 (Disable speculative store buffering) of
`ACTLR_EL3`

* By setting bit 17 (Disable speculative memory disambiguation) of
`ACTLR_EL3`

Change-Id: If1de96605ce3f7b0aff5fab2c828e5aecb687555
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>

show more ...

cf3ed0dc25-Jun-2018 Varun Wadekar <vwadekar@nvidia.com>

cpus: denver: reset power state to 'C1' on boot

Denver CPUs expect the power state field to be reset to 'C1'
during boot. This patch updates the reset handler to reset the
ACTLR_.PMSTATE field to 'C

cpus: denver: reset power state to 'C1' on boot

Denver CPUs expect the power state field to be reset to 'C1'
during boot. This patch updates the reset handler to reset the
ACTLR_.PMSTATE field to 'C1' state during CPU boot.

Change-Id: I7cb629627a4dd1a30ec5cbb3a5e90055244fe30c
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>

show more ...

2a82a9c928-Jun-2018 Jun Nie <jun.nie@linaro.org>

drivers: emmc: dw_mmc: Add response flag into response ID definition

Add response flag into ID definition so that driver does not
need to handle it again.

Signed-off-by: Jun Nie <jun.nie@linaro.org

drivers: emmc: dw_mmc: Add response flag into response ID definition

Add response flag into ID definition so that driver does not
need to handle it again.

Signed-off-by: Jun Nie <jun.nie@linaro.org>
Signed-off-by: Bryan O'Donoghue <bryan.odonoghue@linaro.org>

show more ...

37574c5603-Sep-2018 John Tsichritzis <john.tsichritzis@arm.com>

Reduce BL2 size for FVP

This patch reduces BL2 size by 12kB. Thanks to the shared Mbed TLS heap
between BL1 and BL2, BL2 now requires less memory since it doesn't need
to allocate a heap anymore.

C

Reduce BL2 size for FVP

This patch reduces BL2 size by 12kB. Thanks to the shared Mbed TLS heap
between BL1 and BL2, BL2 now requires less memory since it doesn't need
to allocate a heap anymore.

Change-Id: I58a15f8c424273650c9f55112abe88105b6cdbae
Signed-off-by: John Tsichritzis <john.tsichritzis@arm.com>

show more ...

ba597da730-Jul-2018 John Tsichritzis <john.tsichritzis@arm.com>

Support shared Mbed TLS heap for FVP

This patch introduces the shared Mbed TLS heap optimisation for Arm
platforms. The objective is the Mbed TLS heap to be shared between BL1
and BL2 so as to not a

Support shared Mbed TLS heap for FVP

This patch introduces the shared Mbed TLS heap optimisation for Arm
platforms. The objective is the Mbed TLS heap to be shared between BL1
and BL2 so as to not allocate the heap memory twice. To achieve that,
the patch introduces all the necessary helpers for implementing this
optimisation. It also applies it for FVP.

Change-Id: I6d85eaa1361517b7490956b2ac50f5fa0d0bb008
Signed-off-by: John Tsichritzis <john.tsichritzis@arm.com>

show more ...

6d01a46307-Jun-2018 John Tsichritzis <john.tsichritzis@arm.com>

Prepare Mbed TLS drivers for shared heap

The Mbed TLS drivers, in order to work, need a heap for internal usage.
This heap, instead of being directly referenced by the drivers, now it
is being acces

Prepare Mbed TLS drivers for shared heap

The Mbed TLS drivers, in order to work, need a heap for internal usage.
This heap, instead of being directly referenced by the drivers, now it
is being accessed indirectly through a pointer. Also, the heap, instead
of being part of the drivers, now it is being received through the
plat_get_mbedtls_heap() function. This function requests a heap from the
current BL image which utilises the Mbed TLS drivers.

Those changes create the opportunity for the Mbed TLS heap to be shared
among different images, thus saving memory. A default heap
implementation is provided but it can be overridden by a platform
specific, optimised implemenetation.

Change-Id: I286a1f10097a9cdcbcd312201eea576c18d157fa
Signed-off-by: John Tsichritzis <john.tsichritzis@arm.com>

show more ...

ebf417aa04-Sep-2018 Soby Mathew <soby.mathew@arm.com>

Merge pull request #1540 from MISL-EBU-System-SW/marvell-updates-18.09

Marvell updates 18.09


/rk3399_ARM-atf/docs/marvell/build.txt
/rk3399_ARM-atf/drivers/arm/gic/v2/gicv2_main.c
/rk3399_ARM-atf/drivers/arm/gic/v3/gicv3_main.c
/rk3399_ARM-atf/drivers/marvell/amb_adec.c
/rk3399_ARM-atf/drivers/marvell/ccu.c
/rk3399_ARM-atf/drivers/marvell/comphy/comphy-cp110.h
/rk3399_ARM-atf/drivers/marvell/comphy/phy-comphy-cp110.c
/rk3399_ARM-atf/drivers/marvell/comphy/phy-comphy-cp110.h
/rk3399_ARM-atf/drivers/marvell/gwin.c
/rk3399_ARM-atf/drivers/marvell/i2c/a8k_i2c.c
/rk3399_ARM-atf/drivers/marvell/io_win.c
/rk3399_ARM-atf/drivers/marvell/iob.c
/rk3399_ARM-atf/drivers/marvell/mc_trustzone/mc_trustzone.c
/rk3399_ARM-atf/drivers/marvell/mc_trustzone/mc_trustzone.h
/rk3399_ARM-atf/drivers/marvell/mochi/cp110_setup.c
drivers/arm/gicv2.h
drivers/marvell/aro.h
drivers/marvell/mochi/cp110_setup.h
plat/marvell/a8k/common/armada_common.h
plat/marvell/a8k/common/marvell_def.h
plat/marvell/a8k/common/plat_marvell.h
/rk3399_ARM-atf/lib/optee/optee_utils.c
/rk3399_ARM-atf/plat/marvell/a8k/a70x0/board/marvell_plat_config.c
/rk3399_ARM-atf/plat/marvell/a8k/a70x0_amc/board/marvell_plat_config.c
/rk3399_ARM-atf/plat/marvell/a8k/a80x0/board/marvell_plat_config.c
/rk3399_ARM-atf/plat/marvell/a8k/a80x0_mcbin/board/marvell_plat_config.c
/rk3399_ARM-atf/plat/marvell/a8k/common/a8k_common.mk
/rk3399_ARM-atf/plat/marvell/a8k/common/include/platform_def.h
/rk3399_ARM-atf/plat/marvell/a8k/common/mss/mss_bl2_setup.c
/rk3399_ARM-atf/plat/marvell/a8k/common/plat_bl31_setup.c
/rk3399_ARM-atf/plat/marvell/a8k/common/plat_ble_setup.c
/rk3399_ARM-atf/plat/marvell/a8k/common/plat_pm.c
/rk3399_ARM-atf/plat/marvell/common/marvell_gicv2.c
/rk3399_ARM-atf/plat/marvell/common/mrvl_sip_svc.c
/rk3399_ARM-atf/plat/marvell/marvell.mk
/rk3399_ARM-atf/plat/marvell/version.mk
/rk3399_ARM-atf/plat/ti/k3/common/k3_psci.c
/rk3399_ARM-atf/plat/xilinx/zynqmp/pm_service/pm_api_clock.c
/rk3399_ARM-atf/plat/xilinx/zynqmp/pm_service/pm_api_clock.h
/rk3399_ARM-atf/plat/xilinx/zynqmp/pm_service/pm_api_sys.c
/rk3399_ARM-atf/plat/xilinx/zynqmp/pm_service/pm_api_sys.h
/rk3399_ARM-atf/tools/doimage/doimage.c
/rk3399_ARM-atf/tools/doimage/secure/aes_key.txt
/rk3399_ARM-atf/tools/doimage/secure/csk_priv_pem0.key
/rk3399_ARM-atf/tools/doimage/secure/csk_priv_pem1.key
/rk3399_ARM-atf/tools/doimage/secure/csk_priv_pem2.key
/rk3399_ARM-atf/tools/doimage/secure/csk_priv_pem3.key
/rk3399_ARM-atf/tools/doimage/secure/kak_priv_pem.key
/rk3399_ARM-atf/tools/doimage/secure/sec_img_7K.cfg
/rk3399_ARM-atf/tools/doimage/secure/sec_img_8K.cfg
1ab4df7602-Aug-2018 Christine Gharzuzi <chrisg@marvell.com>

plat: svc: ap807: add SVC configuration for AP807

- add svc configuration according to values burnt
to the chip efuse

Change-Id: Icf5d7cc41bc09ac2244d0a126106e681afebb064
Signed-off-by: Christine

plat: svc: ap807: add SVC configuration for AP807

- add svc configuration according to values burnt
to the chip efuse

Change-Id: Icf5d7cc41bc09ac2244d0a126106e681afebb064
Signed-off-by: Christine Gharzuzi <chrisg@marvell.com>
Reviewed-by: Kostya Porotchkin <kostap@marvell.com>

show more ...

fd1718a221-Mar-2018 Marcin Wojtas <mw@semihalf.com>

plat: a8k: enable PMU overflow interrupt handler

This patch enables handling PMU overflow IRQ by GIC SPI's
directly in EL3. Also implement additional SMC routine,
which can disable the solution on d

plat: a8k: enable PMU overflow interrupt handler

This patch enables handling PMU overflow IRQ by GIC SPI's
directly in EL3. Also implement additional SMC routine,
which can disable the solution on demand in runtime.

Since it is possible to configure PMU interrupt trigger type
in the MADT ACPI table, it is enough to set it only once in EL3
during initialization.

Change-Id: Ie76aa62ccc4fd7cabfec9e3d5ed9970ada1c1b2a
Signed-off-by: Marcin Wojtas <mw@semihalf.com>
Reviewed-by: Kostya Porotchkin <kostap@marvell.com>

show more ...

4acd900d21-Mar-2018 Marcin Wojtas <mw@semihalf.com>

gicv2: enable configuring IRQ trigger type

This patch introduces new helper routines that allow
configuring the individual IRQs to be edge/level-triggered
via GICD_ICFGR registers. This is helpful t

gicv2: enable configuring IRQ trigger type

This patch introduces new helper routines that allow
configuring the individual IRQs to be edge/level-triggered
via GICD_ICFGR registers. This is helpful to modify
the default configuration of the non-secure GIC SPI's, which
are all set during initialization to be level-sensitive.

Change-Id: I23deb4a0381691a686a3cda52405aa1dfd5e56f2
Signed-off-by: Marcin Wojtas <mw@semihalf.com>
Reviewed-by: Kostya Porotchkin <kostap@marvell.com>

show more ...

94d6dd6729-Jul-2018 Konstantin Porotchkin <kostap@marvell.com>

plat: marvell: rename common include file

Rename a8k_common.h to armada_common.h to keep the same header
name across all other Marvell Armada platforms.
This is especially useful since various Marve

plat: marvell: rename common include file

Rename a8k_common.h to armada_common.h to keep the same header
name across all other Marvell Armada platforms.
This is especially useful since various Marvell platforms may
use common platform files and share the driver modules.

Change-Id: I7262105201123d54ccddef9aad4097518f1e38ef
Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>

show more ...

3ee60d8131-Aug-2018 Dimitris Papastamos <dimitris.papastamos@arm.com>

Merge pull request #1547 from semihalf-dabros-jan/semihalf-dabros-jan/fix_errmisc

AARCH64: Fix credentials for ERXMISC0_EL1 and ERXMISC1_EL1

5a22e46128-Aug-2018 Antonio Nino Diaz <antonio.ninodiaz@arm.com>

Fix MISRA defects in log helpers

No functional changes.

Change-Id: I850f08718abb69d5d58856b0e3de036266d8c2f4
Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>

dcf95e7e30-Aug-2018 Dimitris Papastamos <dimitris.papastamos@arm.com>

Merge pull request #1542 from antonio-nino-diaz-arm/an/bl31-misra

Some MISRA fixes in BL31, cci and smmu

612fa95030-Aug-2018 Dimitris Papastamos <dimitris.papastamos@arm.com>

Merge pull request #1539 from antonio-nino-diaz-arm/an/gic-misra

MISRA fixes for the GIC driver

30125eab30-Aug-2018 Jan Dabros <jsd@semihalf.com>

AARCH64: Fix credentials for ERXMISC0_EL1 and ERXMISC1_EL1

fixes arm-software/tf-issues#620

Signed-off-by: Jan Dabros <jsd@semihalf.com>

4213e9ba23-Aug-2018 Antonio Nino Diaz <antonio.ninodiaz@arm.com>

drivers: cci: Fix MISRA defects

Change-Id: Ifdb0ceec19d267b14d796b5d31f08f7342190484
Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>

6d5f063121-Aug-2018 Antonio Nino Diaz <antonio.ninodiaz@arm.com>

drivers: smmu: Fix MISRA defects

Change-Id: I2954a99d5b72069bcb7bac9d6926c6209d6ba881
Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>

819df3fc21-Aug-2018 Antonio Nino Diaz <antonio.ninodiaz@arm.com>

Fix MISRA defects in some common headers

Change-Id: I8fbb4c785e7e07c7241e0c399a9b65161985c9df
Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>

c9512bca24-Aug-2018 Antonio Nino Diaz <antonio.ninodiaz@arm.com>

Fix MISRA defects in BL31 common code

Change-Id: I5993b425445ee794e6d2a792c244c0af53640655
Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>

fe747d5721-Aug-2018 Antonio Nino Diaz <antonio.ninodiaz@arm.com>

plat/arm: gic: Fix macros

Change-Id: I130e35d55c474ecd80f9a825be23620d5bc1a715
Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>

3fea9c8b21-Aug-2018 Antonio Nino Diaz <antonio.ninodiaz@arm.com>

gic: Fix types

Change-Id: I6a2adef87c20f9279446a54b7e69618fba3d2a25
Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>

8782922c24-Aug-2018 Antonio Nino Diaz <antonio.ninodiaz@arm.com>

gic: Fix definitions

Change-Id: I945029ca26ea2e63f0d92c5f33019b882f23bd72
Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>

b9f68dfb13-Aug-2018 Antonio Nino Diaz <antonio.ninodiaz@arm.com>

gic v3: Turn macros into static inline functions

Change-Id: Ib587f12f36810fc7d4f4b8f575195554299b8ed4
Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>

1...<<111112113114115116117118119120>>...159