History log of /rk3399_ARM-atf/plat/arm/ (Results 701 – 725 of 2546)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
03d388d812-Jun-2023 Tamas Ban <tamas.ban@arm.com>

feat(tc): share DPE context handle with child component

To be allowed to communicate with DPE service all
components must own a valid context handle. The first
valid context handle is inherited from

feat(tc): share DPE context handle with child component

To be allowed to communicate with DPE service all
components must own a valid context handle. The first
valid context handle is inherited from the parent
component via a DTB object.

Signed-off-by: Tamas Ban <tamas.ban@arm.com>
Change-Id: Id357fab3586398b1933444e1d10d1ab6d8243ab9

show more ...

1f47a71312-Jun-2023 Tamas Ban <tamas.ban@arm.com>

feat(tc): add DPE context handle node to device tree

Child software components are inheriting their first valid
DPE context handle from their parent components (who loaded
and measured them). The co

feat(tc): add DPE context handle node to device tree

Child software components are inheriting their first valid
DPE context handle from their parent components (who loaded
and measured them). The context handle is shared through
the device tree object the following way:
- BL1 -> BL2 via TB_FW_CONFIG
- BL2 -> BL33 via NT_FW_CONFIG

Signed-off-by: Tamas Ban <tamas.ban@arm.com>
Change-Id: I9bf7808fb13a310ad7ca1895674a0c7e6725e08b

show more ...

e7f1181f07-Jun-2023 Tamas Ban <tamas.ban@arm.com>

feat(tc): add DPE backend to the measured boot framework

The client platform relies on the DICE attestation
scheme. RSS provides the DICE Protection Environment
(DPE) service. TF-A measured boot fra

feat(tc): add DPE backend to the measured boot framework

The client platform relies on the DICE attestation
scheme. RSS provides the DICE Protection Environment
(DPE) service. TF-A measured boot framework supports
multiple backends. A given platform always enables
the corresponding backend which is required by the
attestation scheme.

Signed-off-by: Tamas Ban <tamas.ban@arm.com>
Change-Id: Idc3360d0d7216e4859e99b5db3d377407e0aeee5

show more ...

24844d8b05-Jun-2023 Tamas Ban <tamas.ban@arm.com>

refactor(tc): align image identifier string macros

Macros were renamed, align with new names.

Signed-off-by: Tamas Ban <tamas.ban@arm.com>
Change-Id: Id7a556da34381618577fed4039d9ca957754cd7c

09bb42db05-Jun-2023 Tamas Ban <tamas.ban@arm.com>

refactor(fvp): align image identifier string macros

Macros were renamed, align with new names.

Signed-off-by: Tamas Ban <tamas.ban@arm.com>
Change-Id: I85d03164f580d9c41b7955482914d20188e559e5

0cda4ada05-Mar-2024 Lauren Wehrmeister <lauren.wehrmeister@arm.com>

Merge changes from topic "sm/framework_optimize" into integration

* changes:
chore: rearrange the fvp_cpu_errata.mk file
fix(cpus): add erratum 2701951 to Cortex-X3's list
refactor(errata-abi)

Merge changes from topic "sm/framework_optimize" into integration

* changes:
chore: rearrange the fvp_cpu_errata.mk file
fix(cpus): add erratum 2701951 to Cortex-X3's list
refactor(errata-abi): workaround platforms non-arm interconnect
refactor(errata-abi): optimize errata ABI using errata framework

show more ...

e8eb441805-Mar-2024 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "fix(el3-spmc): add datastore linker script markers" into integration

1ba369a501-Mar-2024 Sona Mathew <sonarebecca.mathew@arm.com>

chore: rearrange the fvp_cpu_errata.mk file

Change-Id: I3959bdf5852c5714f2238f61493a931b3c857a20
Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com>

106c428321-Feb-2024 Sona Mathew <sonarebecca.mathew@arm.com>

fix(cpus): add erratum 2701951 to Cortex-X3's list

Erratum ID 2701951 is an erratum that could affect platforms that
do not use an Arm interconnect IP. This was originally added to the list
of Corte

fix(cpus): add erratum 2701951 to Cortex-X3's list

Erratum ID 2701951 is an erratum that could affect platforms that
do not use an Arm interconnect IP. This was originally added to the list
of Cortex-A715 in the errata ABI files.
Fixed this by adding it to the Cortex-X3 list.

SDEN documentation:
https://developer.arm.com/documentation/2055130/latest

Change-Id: I6ffaf4360a4a2d0a23c253a2326c178e010c8e45
Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com>

show more ...

aceb9c9e26-Sep-2023 Sona Mathew <sonarebecca.mathew@arm.com>

refactor(errata-abi): workaround platforms non-arm interconnect

The workarounds for these below mentioned errata are not implemented
in EL3, but the flags can be enabled/disabled at a platform level

refactor(errata-abi): workaround platforms non-arm interconnect

The workarounds for these below mentioned errata are not implemented
in EL3, but the flags can be enabled/disabled at a platform level
based on arm/non-arm interconnect IP flag. The ABI helps assist the
Kernel in the process of mitigation for the following errata:

Cortex-A715: erratum 2701951
Neoverse V2: erratum 2719103
Cortex-A710: erratum 2701952
Cortex-X2: erratum 2701952
Neoverse N2: erratum 2728475
Neoverse V1: erratum 2701953
Cortex-A78: erratum 2712571
Cortex-A78AE: erratum 2712574
Cortex-A78C: erratum 2712575

Change-Id: Ie86b7212d731a79e2a0c07649e69234e733cd78d
Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com>

show more ...

c9f2634326-Sep-2023 Sona Mathew <sonarebecca.mathew@arm.com>

refactor(errata-abi): optimize errata ABI using errata framework

Errata ABI feature introduced per CPU based errata structures
in the errata_abi_main.c, these can be removed by re-using
the structur

refactor(errata-abi): optimize errata ABI using errata framework

Errata ABI feature introduced per CPU based errata structures
in the errata_abi_main.c, these can be removed by re-using
the structures created by the errata framework.

Change-Id: I1a60d3e4f116b6254fb45426f43ff1b21771af89
Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com>

show more ...

4d5dcff004-Mar-2024 Manish Pandey <manish.pandey2@arm.com>

Merge changes from topic "css_refactor_arm" into integration

* changes:
refactor(allwinner): console runtime switch on bl31 exit
refactor(arm): console runtime switch on bl31 exit
refactor(con

Merge changes from topic "css_refactor_arm" into integration

* changes:
refactor(allwinner): console runtime switch on bl31 exit
refactor(arm): console runtime switch on bl31 exit
refactor(console): flush before console_switch_state

show more ...

9a79c9e404-Mar-2024 Bipin Ravi <bipin.ravi@arm.com>

Merge changes from topic "fix-lto-build-all" into integration

* changes:
build(fpga): correctly handle gcc as linker for LTO
fix(build): enforce single partition for LTO build
fix(rockchip): a

Merge changes from topic "fix-lto-build-all" into integration

* changes:
build(fpga): correctly handle gcc as linker for LTO
fix(build): enforce single partition for LTO build
fix(rockchip): add support for building with LTO enabled

show more ...

c864af9819-Feb-2024 Salman Nabi <salman.nabi@arm.com>

refactor(arm): console runtime switch on bl31 exit

Any BL31 setup and Runtime initialization within BL31 is still part of
the BOOT process. As such, the console flush and switch must be the
last cal

refactor(arm): console runtime switch on bl31 exit

Any BL31 setup and Runtime initialization within BL31 is still part of
the BOOT process. As such, the console flush and switch must be the
last calls before BL31 exit. Flush the console print buffer before
switching to runtime. This is so that there is no lingering chars in
the print buffer when we move to the runtime console.

This patch adds console flush before switching to runtime in
bl31_plat_runtime_setup() function (before BL31 exits). The plan is to
move flush and switch calls to bl31_main before BL31 exits, until then
console_flush() in bl31_main.c has been left as is.

This patch affects the Arm platform only.

Change-Id: I4d367b9e9640686ac15246ad24318ae4685c12c5
Signed-off-by: Salman Nabi <salman.nabi@arm.com>

show more ...

6c7a039404-Mar-2024 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "fix(spm): reduce verbosity on passing tf-a-tests" into integration

27b0440a02-Mar-2024 Manish Pandey <manish.pandey2@arm.com>

Merge changes from topic "sgi_to_nrd" into integration

* changes:
refactor(sgi): replace references to "SGI"/"sgi" for neoverse_rd
refactor(sgi): rename "CSS_SGI"" macro prefixes to "NRD"
refa

Merge changes from topic "sgi_to_nrd" into integration

* changes:
refactor(sgi): replace references to "SGI"/"sgi" for neoverse_rd
refactor(sgi): rename "CSS_SGI"" macro prefixes to "NRD"
refactor(sgi): move apis and types to "nrd" prefix
refactor(sgi): replace build-option prefix to "NRD"
refactor(sgi): move neoverse_rd out of css
refactor(sgi): move from "sgi" to "neoverse_rd"
feat(sgi): remove unused SGI_PLAT build-option
fix(sgi): align to misra rule for braces
feat(rde1edge): remove support for RD-E1-Edge
fix(rdn2): populate TOS_CONFIG only when SPMC_AT_EL3 is enabled
fix(board): update spi_id max for sgi multichip platforms

show more ...


/rk3399_ARM-atf/docs/about/maintainers.rst
/rk3399_ARM-atf/docs/design/cpu-specific-build-macros.rst
/rk3399_ARM-atf/docs/plat/arm/arm-build-options.rst
/rk3399_ARM-atf/docs/plat/index.rst
/rk3399_ARM-atf/lib/cpus/aarch64/cortex_x3.S
/rk3399_ARM-atf/lib/cpus/cpu-ops.mk
board/neoverse_rd/common/arch/aarch64/nrd_helper.S
board/neoverse_rd/common/include/nrd_base_platform_def.h
board/neoverse_rd/common/include/nrd_dmc620_tzc_regions.h
board/neoverse_rd/common/include/nrd_plat.h
board/neoverse_rd/common/include/nrd_ras.h
board/neoverse_rd/common/include/nrd_sdei.h
board/neoverse_rd/common/include/nrd_soc_css_def.h
board/neoverse_rd/common/include/nrd_soc_css_def_v2.h
board/neoverse_rd/common/include/nrd_soc_platform_def.h
board/neoverse_rd/common/include/nrd_soc_platform_def_v2.h
board/neoverse_rd/common/include/nrd_variant.h
board/neoverse_rd/common/include/plat_macros.S
board/neoverse_rd/common/nrd-common.mk
board/neoverse_rd/common/nrd_bl31_setup.c
board/neoverse_rd/common/nrd_image_load.c
board/neoverse_rd/common/nrd_interconnect.c
board/neoverse_rd/common/nrd_plat.c
board/neoverse_rd/common/nrd_plat_v2.c
board/neoverse_rd/common/nrd_topology.c
board/neoverse_rd/common/ras/nrd_ras_common.c
board/neoverse_rd/common/ras/nrd_ras_cpu.c
board/neoverse_rd/common/ras/nrd_ras_sram.c
board/neoverse_rd/platform/rdn1edge/fdts/rdn1edge_fw_config.dts
board/neoverse_rd/platform/rdn1edge/fdts/rdn1edge_nt_fw_config.dts
board/neoverse_rd/platform/rdn1edge/fdts/rdn1edge_tb_fw_config.dts
board/neoverse_rd/platform/rdn1edge/include/platform_def.h
board/neoverse_rd/platform/rdn1edge/platform.mk
board/neoverse_rd/platform/rdn1edge/rdn1edge_err.c
board/neoverse_rd/platform/rdn1edge/rdn1edge_plat.c
board/neoverse_rd/platform/rdn1edge/rdn1edge_security.c
board/neoverse_rd/platform/rdn1edge/rdn1edge_topology.c
board/neoverse_rd/platform/rdn1edge/rdn1edge_trusted_boot.c
board/neoverse_rd/platform/rdn2/fdts/rdn2_fw_config.dts
board/neoverse_rd/platform/rdn2/fdts/rdn2_nt_fw_config.dts
board/neoverse_rd/platform/rdn2/fdts/rdn2_stmm_sel0_manifest.dts
board/neoverse_rd/platform/rdn2/fdts/rdn2_tb_fw_config.dts
board/neoverse_rd/platform/rdn2/include/platform_def.h
board/neoverse_rd/platform/rdn2/include/rdn2_ras.h
board/neoverse_rd/platform/rdn2/platform.mk
board/neoverse_rd/platform/rdn2/rdn2_err.c
board/neoverse_rd/platform/rdn2/rdn2_plat.c
board/neoverse_rd/platform/rdn2/rdn2_ras.c
board/neoverse_rd/platform/rdn2/rdn2_security.c
board/neoverse_rd/platform/rdn2/rdn2_topology.c
board/neoverse_rd/platform/rdn2/rdn2_trusted_boot.c
board/neoverse_rd/platform/rdv1/fdts/rdv1_fw_config.dts
board/neoverse_rd/platform/rdv1/fdts/rdv1_nt_fw_config.dts
board/neoverse_rd/platform/rdv1/fdts/rdv1_tb_fw_config.dts
board/neoverse_rd/platform/rdv1/include/platform_def.h
board/neoverse_rd/platform/rdv1/platform.mk
board/neoverse_rd/platform/rdv1/rdv1_err.c
board/neoverse_rd/platform/rdv1/rdv1_plat.c
board/neoverse_rd/platform/rdv1/rdv1_security.c
board/neoverse_rd/platform/rdv1/rdv1_topology.c
board/neoverse_rd/platform/rdv1/rdv1_trusted_boot.c
board/neoverse_rd/platform/rdv1mc/fdts/rdv1mc_fw_config.dts
board/neoverse_rd/platform/rdv1mc/fdts/rdv1mc_nt_fw_config.dts
board/neoverse_rd/platform/rdv1mc/fdts/rdv1mc_tb_fw_config.dts
board/neoverse_rd/platform/rdv1mc/include/platform_def.h
board/neoverse_rd/platform/rdv1mc/platform.mk
board/neoverse_rd/platform/rdv1mc/rdv1mc_err.c
board/neoverse_rd/platform/rdv1mc/rdv1mc_plat.c
board/neoverse_rd/platform/rdv1mc/rdv1mc_security.c
board/neoverse_rd/platform/rdv1mc/rdv1mc_topology.c
board/neoverse_rd/platform/rdv1mc/rdv1mc_trusted_boot.c
board/neoverse_rd/platform/sgi575/fdts/sgi575_fw_config.dts
board/neoverse_rd/platform/sgi575/fdts/sgi575_nt_fw_config.dts
board/neoverse_rd/platform/sgi575/fdts/sgi575_tb_fw_config.dts
board/neoverse_rd/platform/sgi575/include/platform_def.h
board/neoverse_rd/platform/sgi575/platform.mk
board/neoverse_rd/platform/sgi575/sgi575_err.c
board/neoverse_rd/platform/sgi575/sgi575_plat.c
board/neoverse_rd/platform/sgi575/sgi575_security.c
board/neoverse_rd/platform/sgi575/sgi575_topology.c
board/neoverse_rd/platform/sgi575/sgi575_trusted_boot.c
/rk3399_ARM-atf/services/std_svc/errata_abi/errata_abi_main.c
b2bca9eb01-Mar-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge changes from topic "smmuv3_fix" into integration

* changes:
feat(smmu): separate out smmuv3_security_init from smmuv3_init
feat(smmu): fix to perform INV_ALL before enabling GPC


/rk3399_ARM-atf/.commitlintrc.js
/rk3399_ARM-atf/.nvmrc
/rk3399_ARM-atf/.versionrc.cjs
/rk3399_ARM-atf/changelog.yaml
/rk3399_ARM-atf/docs/about/maintainers.rst
/rk3399_ARM-atf/docs/plat/imx8ulp.rst
/rk3399_ARM-atf/docs/plat/index.rst
/rk3399_ARM-atf/drivers/arm/smmu/smmu_v3.c
/rk3399_ARM-atf/drivers/scmi-msg/common.h
/rk3399_ARM-atf/drivers/scmi-msg/entry.c
/rk3399_ARM-atf/drivers/scmi-msg/sensor.c
/rk3399_ARM-atf/drivers/scmi-msg/sensor.h
/rk3399_ARM-atf/package-lock.json
/rk3399_ARM-atf/package.json
board/fvp/fvp_bl31_setup.c
/rk3399_ARM-atf/plat/imx/common/imx8_helpers.S
/rk3399_ARM-atf/plat/imx/common/imx_bl31_common.c
/rk3399_ARM-atf/plat/imx/common/imx_sip_handler.c
/rk3399_ARM-atf/plat/imx/common/imx_sip_svc.c
/rk3399_ARM-atf/plat/imx/common/include/imx_plat_common.h
/rk3399_ARM-atf/plat/imx/common/include/imx_sip_svc.h
/rk3399_ARM-atf/plat/imx/imx8ulp/apd_context.c
/rk3399_ARM-atf/plat/imx/imx8ulp/dram.c
/rk3399_ARM-atf/plat/imx/imx8ulp/imx8ulp_bl31_setup.c
/rk3399_ARM-atf/plat/imx/imx8ulp/imx8ulp_caam.c
/rk3399_ARM-atf/plat/imx/imx8ulp/imx8ulp_psci.c
/rk3399_ARM-atf/plat/imx/imx8ulp/include/dram.h
/rk3399_ARM-atf/plat/imx/imx8ulp/include/imx8ulp_caam.h
/rk3399_ARM-atf/plat/imx/imx8ulp/include/platform_def.h
/rk3399_ARM-atf/plat/imx/imx8ulp/include/scmi.h
/rk3399_ARM-atf/plat/imx/imx8ulp/include/scmi_sensor.h
/rk3399_ARM-atf/plat/imx/imx8ulp/include/xrdc.h
/rk3399_ARM-atf/plat/imx/imx8ulp/platform.mk
/rk3399_ARM-atf/plat/imx/imx8ulp/scmi/scmi.c
/rk3399_ARM-atf/plat/imx/imx8ulp/scmi/scmi_pd.c
/rk3399_ARM-atf/plat/imx/imx8ulp/scmi/scmi_sensor.c
/rk3399_ARM-atf/plat/imx/imx8ulp/upower/upmu.h
/rk3399_ARM-atf/plat/imx/imx8ulp/upower/upower_api.c
/rk3399_ARM-atf/plat/imx/imx8ulp/upower/upower_api.h
/rk3399_ARM-atf/plat/imx/imx8ulp/upower/upower_defs.h
/rk3399_ARM-atf/plat/imx/imx8ulp/upower/upower_hal.c
/rk3399_ARM-atf/plat/imx/imx8ulp/upower/upower_soc_defs.h
/rk3399_ARM-atf/plat/imx/imx8ulp/xrdc/xrdc_config.h
/rk3399_ARM-atf/plat/imx/imx8ulp/xrdc/xrdc_core.c
/rk3399_ARM-atf/plat/qemu/common/qemu_bl31_setup.c
ba33528a20-Dec-2022 Shruti Gupta <shruti.gupta@arm.com>

fix(el3-spmc): add datastore linker script markers

Datastore symbol used by EL3 SPMC is not relocated at
boot time when using ENABLE_PIE=1.
Use linker script markers instead of symbol.

Signed-off-b

fix(el3-spmc): add datastore linker script markers

Datastore symbol used by EL3 SPMC is not relocated at
boot time when using ENABLE_PIE=1.
Use linker script markers instead of symbol.

Signed-off-by: Shruti Gupta <shruti.gupta@arm.com>
Change-Id: If22d2fc8deacc74c73d7dc51bb70093935d9fa2b

show more ...

61ee40b128-Feb-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge changes I6ac59693,Ib0e4e5cf into integration

* changes:
refactor(tc): reorder config variable defines
refactor(tc): move DTB to start of DRAM

df21d41b27-Feb-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge changes I1415e402,Ia92cc693,I7a42f72e,I6e75659e,I4c6136c5, ... into integration

* changes:
refactor(tc): correlate secure world addresses with platform_def
feat(tc): add memory node in the

Merge changes I1415e402,Ia92cc693,I7a42f72e,I6e75659e,I4c6136c5, ... into integration

* changes:
refactor(tc): correlate secure world addresses with platform_def
feat(tc): add memory node in the device tree
feat(tc): pass the DTB address to BL33 in R0
feat(tc): add arm_ffa node in dts
chore(tc): add dummy entropy to speed up the Linux boot
feat(tc): choose the DPU address and irq based on the target
feat(tc): add SCMI power domain and IOMMU toggles
refactor(tc): move the FVP RoS to a separate file
feat(tc): factor in FVP/FPGA differences
feat(tc): introduce an FPGA subvariant and TC3 CPUs
feat(tc): add TC3 platform definitions
refactor(tc): sanitise the device tree
feat(tc): add PMU entry
feat(tc): allow booting from DRAM
chore(tc): remove unused hdlcd
feat(tc): add firmware update secure partition
feat(tc): add spmc manifest with trusty sp
refactor(tc): unify all the spmc manifests
feat(arm): add trusty_sp_fw_config build option
fix(tc): do not enable MPMM and Aux AMU counters always
fix(tc): correct interrupts
feat(tc): interrupt numbers for `smmu_700`
feat(tc): enable gpu/dpu scmi power domain and also gpu perf domain

show more ...

96a5f87627-Dec-2023 Boyan Karatotev <boyan.karatotev@arm.com>

refactor(tc): reorder config variable defines

They are very scattered, hard to read, and especially hard to track
down. As a result some are duplicate and some are overridden in the
downstream as it

refactor(tc): reorder config variable defines

They are very scattered, hard to read, and especially hard to track
down. As a result some are duplicate and some are overridden in the
downstream as it's simpler.

Put all variables at the top of the platform makefile. Also drop setting
variables that don't change from their default values
(CTX_INCLUDE_EL2_REGS, ARCH, ENABLE_FEAT_RAS, SDEI_SUPPORT,
EL3_EXCEPTION_HANDLING, HANDLE_EA_EL3_FIRST_NS, ENABLE_SPE_FOR_NS).

While we're at it, add some variables that are necessary. SPMD
requires MTE registers to be saved, BRANCH_PROTECTION, as well as
running at SEL2. All of our CPUs are Armv8.7 compliant so we can have
ARM_ARCH_MINOR=7 (and drop ENABLE_TRF_FOR_NS which it includes).

Finally, drop the override directives as there's no reason to prohibit
experimentation (even if incorrect).

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: I6ac596934952aab8abf5d4db5220e13a4941a10c

show more ...

6dacc27204-Dec-2023 Boyan Karatotev <boyan.karatotev@arm.com>

refactor(tc): correlate secure world addresses with platform_def

Similarly to the memory node in the NS device tree, platform_def already
defines all the necessary values to populate the spmc manife

refactor(tc): correlate secure world addresses with platform_def

Similarly to the memory node in the NS device tree, platform_def already
defines all the necessary values to populate the spmc manifest and NS
related entries automatically. Use the macros directly so any changes
can propagate automatically.

The result of this is that TC3 and above get correct secure world
manifests automatically. They were previously broken.

One "breaking" change is that the FWU region moves. This should have
happened previously but it was missed when the secure portion of DRAM
was increased, leaving it in secure memory. This was caught when going
over the definitions and correlating them should prevent this in the
future.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: I1415e402be8c70f5e22f28eabddcb53298c57a11

show more ...

d585aa1628-Sep-2023 Boyan Karatotev <boyan.karatotev@arm.com>

refactor(tc): move DTB to start of DRAM

Now that tf-a passes the DTB address to BL33, its location doesn't
matter. Since we declare a fixed size for it (32K) put it at the start
of ram to not fragme

refactor(tc): move DTB to start of DRAM

Now that tf-a passes the DTB address to BL33, its location doesn't
matter. Since we declare a fixed size for it (32K) put it at the start
of ram to not fragment memory. This has the added benefit of
"supporting" larger kernel sizes which are breaking with the current
location.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: Ib0e4e5cf780bd58a49a34d72085b0a0914c340ed

show more ...

5ee4deb804-Dec-2023 Boyan Karatotev <boyan.karatotev@arm.com>

feat(tc): add memory node in the device tree

With new TC revisions, memory banks move around which requires an update
in platform_def. It also requires an update in the device tree which
doesn't com

feat(tc): add memory node in the device tree

With new TC revisions, memory banks move around which requires an update
in platform_def. It also requires an update in the device tree which
doesn't come naturally. To avoid this, add the memory node such that it
uses the macros defined in platform_def.

By doing this we can put u-boot out of its misery in trying to come up
with the correct memory node and tf-a's device tree becomes complete.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: Ia92cc6931abb12be2856ac3fb1455e4f3005b326

show more ...

638e4a9229-Nov-2023 Boyan Karatotev <boyan.karatotev@arm.com>

feat(tc): pass the DTB address to BL33 in R0

The DTB that tf-a loads is already used in BL33 directly with the
address hardcoded. As this address is prone to changing, pass it forward
so we can avoi

feat(tc): pass the DTB address to BL33 in R0

The DTB that tf-a loads is already used in BL33 directly with the
address hardcoded. As this address is prone to changing, pass it forward
so we can avoid breakage in the future.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: I7a42f72ecc00814b9f0a4bf5605d70cb53ce2ff4

show more ...

1...<<21222324252627282930>>...102