History log of /rk3399_ARM-atf/plat/arm/board/ (Results 426 – 450 of 1937)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
e7c060d524-Jul-2024 Manish Pandey <manish.pandey2@arm.com>

Merge "feat(fgt2): add support for FEAT_FGT2" into integration

e1b76cb023-Jul-2024 Jagdish Gediya <jagdish.gediya@arm.com>

feat(tc): enable Last-level cache (LLC)

The EXTLLC bit in CPUECTLR_EL1 register indicates that an external
Last-level cache is present in the system.

This bit is not set for CPUs on TC3 platform de

feat(tc): enable Last-level cache (LLC)

The EXTLLC bit in CPUECTLR_EL1 register indicates that an external
Last-level cache is present in the system.

This bit is not set for CPUs on TC3 platform despite there is
presence of LLC in MCN, so set them.

Change-Id: I5f889e67dce2b1d00e4ee66a8c255cf7911825b0
Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com>
Signed-off-by: Leo Yan <leo.yan@arm.com>

show more ...

cd656a5623-Jul-2024 Daniel Boulby <daniel.boulby@arm.com>

feat(spm): change UART0-1 to NS device region

To enable device memory sharing test make memory region for UART0
and 1 a NS device region so that it can be shared by tf-a-tests
to the cactus SP.

Sig

feat(spm): change UART0-1 to NS device region

To enable device memory sharing test make memory region for UART0
and 1 a NS device region so that it can be shared by tf-a-tests
to the cactus SP.

Signed-off-by: Daniel Boulby <daniel.boulby@arm.com>
Change-Id: Iadfe02a65f5d4a8b60296f07c4943dd31f201453

show more ...

de8b9ced17-Jul-2024 Jagdish Gediya <jagdish.gediya@arm.com>

feat(tc): enable el1 access to DSU PMU registers

DSU PMU registers are write accessible in EL1 if the ACTLR_EL3[12] bit
and the ACTLR_EL2[12] bit are set to 1, and these registers are need to
be set

feat(tc): enable el1 access to DSU PMU registers

DSU PMU registers are write accessible in EL1 if the ACTLR_EL3[12] bit
and the ACTLR_EL2[12] bit are set to 1, and these registers are need to
be set for all cores, so set these bits in platform reset handler.

Change-Id: I1db6915939727f0909c05c8b103e37984aadb443
Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com>
Signed-off-by: Leo Yan <leo.yan@arm.com>

show more ...

3960bcda22-Apr-2024 Jagdish Gediya <jagdish.gediya@arm.com>

style(tc): remove comment for plat_reset_handler

The comment for plat_reset_handler doesn't make sense. It is likely a
copy-and-paste error while adding the code, so remove it.

Change-Id: Iab8c8c79

style(tc): remove comment for plat_reset_handler

The comment for plat_reset_handler doesn't make sense. It is likely a
copy-and-paste error while adding the code, so remove it.

Change-Id: Iab8c8c799c184fa99966770d47ecb11bbc640515
Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com>

show more ...

31d4c3e923-Jul-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge "fix(corstone1000): include platform header file" into integration

783e5abe02-Jul-2024 Harsimran Singh Tungal <harsimransingh.tungal@arm.com>

fix(corstone1000): include platform header file

Include platform.h file in order to remove following compiler errors,
as some warnings are being treated as errors now.
error: implicit declaration of

fix(corstone1000): include platform header file

Include platform.h file in order to remove following compiler errors,
as some warnings are being treated as errors now.
error: implicit declaration of function
'plat_core_pos_by_mpidr'[-Wimplicit-function-declaration]

Change-Id: Ie223e11e138ec9b0eef7342f450b90b215a49b15
Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>

show more ...

c5b8de8622-Jul-2024 Manish Pandey <manish.pandey2@arm.com>

Merge "feat(debugv8p9): add support for FEAT_Debugv8p9" into integration

33e6aaac06-Jun-2024 Arvind Ram Prakash <arvind.ramprakash@arm.com>

feat(fgt2): add support for FEAT_FGT2

This patch disables trapping to EL3 when the FEAT_FGT2
specific trap registers are accessed by setting the
SCR_EL3.FGTEn2 bit

Signed-off-by: Arvind Ram Prakash

feat(fgt2): add support for FEAT_FGT2

This patch disables trapping to EL3 when the FEAT_FGT2
specific trap registers are accessed by setting the
SCR_EL3.FGTEn2 bit

Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com>
Change-Id: I6d2b614affb9067b2bc3d7bf0ae7d169d031592a

show more ...

83271d5a22-May-2024 Arvind Ram Prakash <arvind.ramprakash@arm.com>

feat(debugv8p9): add support for FEAT_Debugv8p9

This patch enables FEAT_Debugv8p9 and prevents EL1/0 from
trapping to EL3 when accessing MDSELR_EL1 register by
setting the MDCR_EL3.EBWE bit.

Signed

feat(debugv8p9): add support for FEAT_Debugv8p9

This patch enables FEAT_Debugv8p9 and prevents EL1/0 from
trapping to EL3 when accessing MDSELR_EL1 register by
setting the MDCR_EL3.EBWE bit.

Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com>
Change-Id: I3613af1dd8cb8c0d3c33dc959f170846c0b9695a

show more ...

41d73bff05-Jun-2024 Sudeep Holla <sudeep.holla@arm.com>

feat(fvp): add SPM manifest for OP-TEE at S-EL1 without S-EL2/Hafnium

Provide manifest to boot OP-TEE at S-EL1 running SPMC with secure EL2
disabled and TF-A at secure EL3 running SPMD.

Change-Id:

feat(fvp): add SPM manifest for OP-TEE at S-EL1 without S-EL2/Hafnium

Provide manifest to boot OP-TEE at S-EL1 running SPMC with secure EL2
disabled and TF-A at secure EL3 running SPMD.

Change-Id: If8547b5a514fb48eec88a8d56d718f1c1591cf1f
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>

show more ...

4739372211-Jun-2024 Sudeep Holla <sudeep.holla@arm.com>

fix(fvp): update the memory size allocated to optee at EL1

Update the memory size allocated to optee at EL1 to 0xd80000 to match
the size specified by mem-size in optee manifest.

Change-Id: I6826a5

fix(fvp): update the memory size allocated to optee at EL1

Update the memory size allocated to optee at EL1 to 0xd80000 to match
the size specified by mem-size in optee manifest.

Change-Id: I6826a56d0f68a6a2b5181f849a741a9bf1f0829b
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>

show more ...

18ec9bdc05-Jun-2024 Sudeep Holla <sudeep.holla@arm.com>

fix(fvp): add DRAM memory regions that linux kernel can share

The memory regions that Linux kernel can share including TX/RX buffers
encompass the entire DRAM. Update it accordingly. Without this,
w

fix(fvp): add DRAM memory regions that linux kernel can share

The memory regions that Linux kernel can share including TX/RX buffers
encompass the entire DRAM. Update it accordingly. Without this,
when the Linux kernel call FFA_RXTX_MAP, it fails sometime and the
below error from the secure world appears:

| ERROR: arch_other_world_vm_configure_rxtx_map: send page is invalid
| (expected 0x87, got 0x7c)

Change-Id: Idb40907af2e0c1d4e60979b4948db2fc70971145
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>

show more ...

4f37e1e805-Jun-2024 Sudeep Holla <sudeep.holla@arm.com>

feat(fvp): update FF-A version to v1.1 supported by optee

OPTEE now supports FF-A v1.1, lets us bump the FF-A version in the
OPTEE FF-A manifest.

Change-Id: Ia51cbe1af619895945240004a4163a4c4bda2ee

feat(fvp): update FF-A version to v1.1 supported by optee

OPTEE now supports FF-A v1.1, lets us bump the FF-A version in the
OPTEE FF-A manifest.

Change-Id: Ia51cbe1af619895945240004a4163a4c4bda2ee5
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>

show more ...

887cec9c05-Jun-2024 Sudeep Holla <sudeep.holla@arm.com>

feat(fvp): replace managed-exit with ns-interrupts-action

Commit 10b292e64933 ("docs(spm): update FF-A manifest binding")
deprecated managed-exit in favor of newly added mandatory
ns-interrupts-acti

feat(fvp): replace managed-exit with ns-interrupts-action

Commit 10b292e64933 ("docs(spm): update FF-A manifest binding")
deprecated managed-exit in favor of newly added mandatory
ns-interrupts-action attribute. Replace managed-exit with
ns-interrupts-action before it becomes obsolete.

Change-Id: I9b55f6c55af3510260a9c5a01755a9b66d75823e
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>

show more ...

75265a1605-Jun-2024 Sudeep Holla <sudeep.holla@arm.com>

fix(fvp): add optee specific mem-size attribute

Without the mem-size attribute, the OPTEE boot panics with below
error:
| get_sec_mem_from_manifest:1594 Can't read "mem-size" from FF-A
| man

fix(fvp): add optee specific mem-size attribute

Without the mem-size attribute, the OPTEE boot panics with below
error:
| get_sec_mem_from_manifest:1594 Can't read "mem-size" from FF-A
| manifest at 0x6281000: error -1
| Panic at core/arch/arm/kernel/boot.c:1596 <get_sec_mem_from_manifest>
| TEE load address @ 0x6284000
| Call stack:
| 0x0628c7fc
| 0x06298788
| 0x0628c480

Adding the mem-size attribute fixes the boot. This is OPTEE specific
extension.

Change-Id: I2801c8b4a89cffafff14c788319ad106b03ffef0
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>

show more ...

bf36351a05-Jun-2024 Sudeep Holla <sudeep.holla@arm.com>

fix(fvp): fix the FF-A optee manifest by adding the boot info node

Without the FF-A manifest boot info node, the OPTEE boot as S-EL1 VM
crashes currently with the below error:
| WARNING: Stage-2

fix(fvp): fix the FF-A optee manifest by adding the boot info node

Without the FF-A manifest boot info node, the OPTEE boot as S-EL1 VM
crashes currently with the below error:
| WARNING: Stage-2 page fault: pc=0x628c41c, vmid=0x8001, vcpu=0,
| vaddr=0xd00000, ipaddr=0xd00000, mode=0x1 0x7c
| NOTICE: Injecting Data Abort exception into VM 0x8001.

Adding the boot info node fixes the OPTEE boot.

While at it, also update copyright year in the file.

Change-Id: I1fd0bf4e38bb95deedc74fa04d1e6bb057424c04
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>

show more ...

c16e919815-Jul-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge "chore(rdv3): rename platform RD-Fremont to RD-V3" into integration


/rk3399_ARM-atf/changelog.yaml
/rk3399_ARM-atf/drivers/nxp/clk/s32cc/include/s32cc-clk-regs.h
/rk3399_ARM-atf/drivers/nxp/clk/s32cc/s32cc_clk.mk
/rk3399_ARM-atf/drivers/nxp/clk/s32cc/s32cc_clk_drv.c
/rk3399_ARM-atf/drivers/nxp/clk/s32cc/s32cc_clk_modules.c
/rk3399_ARM-atf/drivers/nxp/clk/s32cc/s32cc_early_clks.c
/rk3399_ARM-atf/drivers/st/clk/clk-stm32mp2.c
/rk3399_ARM-atf/drivers/st/reset/stm32mp1_reset.c
/rk3399_ARM-atf/drivers/st/reset/stm32mp2_reset.c
/rk3399_ARM-atf/include/drivers/nxp/clk/s32cc/s32cc-clk-modules.h
/rk3399_ARM-atf/include/drivers/st/stm32mp25_rcc.h
/rk3399_ARM-atf/include/drivers/st/stm32mp2_clk.h
/rk3399_ARM-atf/include/drivers/st/stm32mp_reset.h
/rk3399_ARM-atf/include/dt-bindings/clock/stm32mp25-clks.h
/rk3399_ARM-atf/include/dt-bindings/clock/stm32mp25-clksrc.h
/rk3399_ARM-atf/include/dt-bindings/reset/stm32mp25-resets.h
/rk3399_ARM-atf/include/lib/psa/rse_crypto_defs.h
neoverse_rd/common/include/nrd_variant.h
neoverse_rd/common/nrd_bl31_setup.c
neoverse_rd/platform/rdv3/fdts/rdv3_fw_config.dts
neoverse_rd/platform/rdv3/fdts/rdv3_nt_fw_config.dts
neoverse_rd/platform/rdv3/fdts/rdv3_tb_fw_config.dts
neoverse_rd/platform/rdv3/include/platform_def.h
neoverse_rd/platform/rdv3/include/rdv3_mhuv3.h
neoverse_rd/platform/rdv3/include/rdv3_rse_comms.h
neoverse_rd/platform/rdv3/platform.mk
neoverse_rd/platform/rdv3/rdv3_bl1_measured_boot.c
neoverse_rd/platform/rdv3/rdv3_bl2_measured_boot.c
neoverse_rd/platform/rdv3/rdv3_bl2_setup.c
neoverse_rd/platform/rdv3/rdv3_bl31_setup.c
neoverse_rd/platform/rdv3/rdv3_common.c
neoverse_rd/platform/rdv3/rdv3_common_measured_boot.c
neoverse_rd/platform/rdv3/rdv3_err.c
neoverse_rd/platform/rdv3/rdv3_mhuv3.c
neoverse_rd/platform/rdv3/rdv3_plat_attest_token.c
neoverse_rd/platform/rdv3/rdv3_realm_attest_key.c
neoverse_rd/platform/rdv3/rdv3_security.c
neoverse_rd/platform/rdv3/rdv3_topology.c
neoverse_rd/platform/rdv3/rdv3_trusted_boot.c
/rk3399_ARM-atf/plat/arm/common/arm_bl2_setup.c
/rk3399_ARM-atf/plat/st/stm32mp1/stm32mp1_pm.c
/rk3399_ARM-atf/plat/st/stm32mp2/platform.mk
/rk3399_ARM-atf/plat/st/stm32mp2/stm32mp2_def.h
137ab5cb08-Jul-2024 Jerry Wang <Jerry.Wang4@arm.com>

chore(rdv3): rename platform RD-Fremont to RD-V3

Arm has decided to rename RD-Fremont to RD-V3 to align with its
existing product lineup, such as RD-V1, RD-V2, etc. This change
replaces all occurenc

chore(rdv3): rename platform RD-Fremont to RD-V3

Arm has decided to rename RD-Fremont to RD-V3 to align with its
existing product lineup, such as RD-V1, RD-V2, etc. This change
replaces all occurences of "Fremont" with "V3" in file names and
contents.

Change-Id: I302103492f962a7ac74854633ad68701b2a7f420
Signed-off-by: Jerry Wang <Jerry.Wang4@arm.com>

show more ...


/rk3399_ARM-atf/changelog.yaml
/rk3399_ARM-atf/docs/plat/st/stm32mp2.rst
/rk3399_ARM-atf/drivers/nxp/clk/s32cc/s32cc_clk.mk
/rk3399_ARM-atf/drivers/nxp/clk/s32cc/s32cc_clk_drv.c
/rk3399_ARM-atf/drivers/nxp/clk/s32cc/s32cc_clk_modules.c
/rk3399_ARM-atf/drivers/nxp/clk/s32cc/s32cc_clk_utils.c
/rk3399_ARM-atf/drivers/nxp/clk/s32cc/s32cc_early_clks.c
/rk3399_ARM-atf/drivers/partition/partition.c
/rk3399_ARM-atf/include/drivers/nxp/clk/s32cc/s32cc-clk-drv.h
/rk3399_ARM-atf/include/drivers/nxp/clk/s32cc/s32cc-clk-ids.h
/rk3399_ARM-atf/include/drivers/nxp/clk/s32cc/s32cc-clk-modules.h
/rk3399_ARM-atf/include/drivers/nxp/clk/s32cc/s32cc-clk-utils.h
neoverse_rd/common/include/nrd_variant.h
neoverse_rd/common/nrd_bl31_setup.c
neoverse_rd/platform/rdv3/fdts/rdv3_fw_config.dts
neoverse_rd/platform/rdv3/fdts/rdv3_nt_fw_config.dts
neoverse_rd/platform/rdv3/fdts/rdv3_tb_fw_config.dts
neoverse_rd/platform/rdv3/include/platform_def.h
neoverse_rd/platform/rdv3/include/rdv3_mhuv3.h
neoverse_rd/platform/rdv3/include/rdv3_rse_comms.h
neoverse_rd/platform/rdv3/platform.mk
neoverse_rd/platform/rdv3/rdv3_bl1_measured_boot.c
neoverse_rd/platform/rdv3/rdv3_bl2_measured_boot.c
neoverse_rd/platform/rdv3/rdv3_bl2_setup.c
neoverse_rd/platform/rdv3/rdv3_bl31_setup.c
neoverse_rd/platform/rdv3/rdv3_common.c
neoverse_rd/platform/rdv3/rdv3_common_measured_boot.c
neoverse_rd/platform/rdv3/rdv3_err.c
neoverse_rd/platform/rdv3/rdv3_mhuv3.c
neoverse_rd/platform/rdv3/rdv3_plat_attest_token.c
neoverse_rd/platform/rdv3/rdv3_realm_attest_key.c
neoverse_rd/platform/rdv3/rdv3_security.c
neoverse_rd/platform/rdv3/rdv3_topology.c
neoverse_rd/platform/rdv3/rdv3_trusted_boot.c
/rk3399_ARM-atf/plat/nxp/s32/s32g274ardb2/plat_bl2_el3_setup.c
c06b555d10-Jul-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge "fix(tc): add stubs for soc_css_init functions" into integration

0dac0e1f10-Jul-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge "fix(tc): don't enable TZC on TC3" into integration

3512adc410-Jul-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge "fix(tc): enable MTE2 unconditionally" into integration

be8eaa5e16-May-2024 Tintu Thomas <tintu.thomas@arm.com>

fix(tc): enable MTE2 unconditionally

Keeping the MTE2 enablement under the SPMD check is breaking for FPGA
and CI test, as SPMD is absent in these cases.

Enable MTE2 unconditionally so that all the

fix(tc): enable MTE2 unconditionally

Keeping the MTE2 enablement under the SPMD check is breaking for FPGA
and CI test, as SPMD is absent in these cases.

Enable MTE2 unconditionally so that all the supported platforms can use
it.

Change-Id: Id86893f0e2767a8686c3dca0ea092907d5c107ba
Signed-off-by: Tintu Thomas <tintu.thomas@arm.com>
Signed-off-by: Leo Yan <leo.yan@arm.com>

show more ...

8ce29a7402-Jul-2024 Tintu Thomas <tintu.thomas@arm.com>

fix(tc): don't enable TZC on TC3

TZC is being replaced by MSF module on TC3. For fixing boot failure on
TC3, don't enable TZC module on the TC3 platform.

Change-Id: I4434cb28bf523be8dd882f5f8799223

fix(tc): don't enable TZC on TC3

TZC is being replaced by MSF module on TC3. For fixing boot failure on
TC3, don't enable TZC module on the TC3 platform.

Change-Id: I4434cb28bf523be8dd882f5f8799223642822ee2
Signed-off-by: Tintu Thomas <tintu.thomas@arm.com>
Signed-off-by: Leo Yan <leo.yan@arm.com>

show more ...

3201faf314-Jun-2024 Tamas Ban <tamas.ban@arm.com>

feat(tc): provide target_locality info of AP FW components

The target_locality attribute is meant to specify that
a certain SW component is expected to run and thereby
send DPE commands from a given

feat(tc): provide target_locality info of AP FW components

The target_locality attribute is meant to specify that
a certain SW component is expected to run and thereby
send DPE commands from a given security domain. The DPE
service must be capable of determining the locality of
a client on his own. RSE determines the client's locality
based on the MHU channel used for communication.

If the expected locality (specified by the parent component)
is not matching with the determined locality by DPE
service then command fails.

The goal is to protect against spoofing when a
context_handle is stolen and used by a component
that should not have access.

Signed-off-by: Tamas Ban <tamas.ban@arm.com>
Change-Id: I96d255de231611cfed10eef4335a47b91c2c94de

show more ...

1...<<11121314151617181920>>...78