| 6f503e0e | 08-May-2023 |
Tamas Ban <tamas.ban@arm.com> |
feat(tc): add RSS SDS region right after SCMI payload
Add a second SDS region on the TC platform for communication with RSS. RSS needs to share data with AP during early boot over shared memory to s
feat(tc): add RSS SDS region right after SCMI payload
Add a second SDS region on the TC platform for communication with RSS. RSS needs to share data with AP during early boot over shared memory to support DPE. Reserve a memory region right after the SCMI secure payload areas from unused memory.
Change-Id: I3a3a6ea5ce76531595c88754418602133a283c42 Signed-off-by: David Vincze <david.vincze@arm.com>
show more ...
|
| 0f37ae13 | 08-May-2023 |
Tamas Ban <tamas.ban@arm.com> |
refactor(n1sdp): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on. -
refactor(n1sdp): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on. - Implement plat_sds_get_regions() platform function which is used by the driver to get SDS region information per platform.
[1]: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/24609/
Change-Id: I3447855fbe7427376d5f7aa0ba7356fe2f14d567 Signed-off-by: Tamas Ban <tamas.ban@arm.com> Signed-off-by: David Vincze <david.vincze@arm.com>
show more ...
|
| 48d42ed5 | 08-May-2023 |
Tamas Ban <tamas.ban@arm.com> |
refactor(morello): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on.
refactor(morello): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on. - Implement plat_sds_get_regions() platform function which is used by the driver to get SDS region information per platform.
[1]: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/24609/
Change-Id: I942599edb4d9734c0455f67c6b5673aace62e444 Signed-off-by: Tamas Ban <tamas.ban@arm.com> Signed-off-by: David Vincze <david.vincze@arm.com>
show more ...
|
| fdcd5413 | 08-May-2023 |
Tamas Ban <tamas.ban@arm.com> |
refactor(juno): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on. -
refactor(juno): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on. - Implement plat_sds_get_regions() platform function which is used by the driver to get SDS region information per platform.
[1]: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/24609/
Change-Id: I67aebfe0e2a82d1f5fc2d26653698a552350b387 Signed-off-by: Tamas Ban <tamas.ban@arm.com> Signed-off-by: David Vincze <david.vincze@arm.com>
show more ...
|
| 21b35eee | 08-May-2023 |
Tamas Ban <tamas.ban@arm.com> |
refactor(sgi): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on. - I
refactor(sgi): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on. - Implement plat_sds_get_regions() platform function which is used by the driver to get SDS region information per platform.
[1]: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/24609/
Change-Id: Ifa4595278e094849bea2796ead58e85de98baaf9 Signed-off-by: Tamas Ban <tamas.ban@arm.com> Signed-off-by: David Vincze <david.vincze@arm.com>
show more ...
|
| 17da49bb | 12-Feb-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(qemu): disable FEAT_SB" into integration |
| 00f1ec6b | 09-Feb-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "revert-ti-dm-workaround" into integration
* changes: Revert "fix(ti): do not take system power reference in bl31_platform_setup()" refactor(ti): remove ti_sci_init func
Merge changes from topic "revert-ti-dm-workaround" into integration
* changes: Revert "fix(ti): do not take system power reference in bl31_platform_setup()" refactor(ti): remove ti_sci_init function fix(k3): increment while reading trail bytes
show more ...
|
| 25f55744 | 09-Feb-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "feat(fvp): remove left-over RSS usage" into integration |
| a1726fa7 | 07-Feb-2024 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(fvp): remove left-over RSS usage
Remove any residual RSS usage in the FVP platform, complementing the changes made in commit dea307fd6cca2dad56867e757804224a8654bc38.
Signed-off-by: Manish V B
feat(fvp): remove left-over RSS usage
Remove any residual RSS usage in the FVP platform, complementing the changes made in commit dea307fd6cca2dad56867e757804224a8654bc38.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: I9ced272503456361610ec0c7783d270349233926
show more ...
|
| 59bdb426 | 08-Feb-2024 |
Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> |
fix(qemu): disable FEAT_SB
qemu/qemu_sbsa platforms support wide selection of cpu cores. From Cortex-A57 (v8.0) to Neoverse-N2 (v9.0) one. Only the last one (and 'max' which supports everything poss
fix(qemu): disable FEAT_SB
qemu/qemu_sbsa platforms support wide selection of cpu cores. From Cortex-A57 (v8.0) to Neoverse-N2 (v9.0) one. Only the last one (and 'max' which supports everything possible) supports FEAT_SB.
Runtime check for ENABLE_FEAT_SB does not work in our case and we want to have working platform.
Change-Id: Ic27d5af20ad76ae44c4211d28694e91ec62bddc1 Signed-off-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org>
show more ...
|
| 771a0715 | 08-Feb-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "ADD_DELAY_IN_POLLING_SCMI" into integration
* changes: fix(scmi): induce a delay in monitoring SCMI channel status feat(css): initialise generic timer early in the boot |
| b1428d92 | 08-Feb-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "stm32mp2-usb" into integration
* changes: feat(stm32mp2): add STM32MP_USB_PROGRAMMER compilation refactor(st): move macros to common folder refactor(stm32mp1): remove
Merge changes from topic "stm32mp2-usb" into integration
* changes: feat(stm32mp2): add STM32MP_USB_PROGRAMMER compilation refactor(st): move macros to common folder refactor(stm32mp1): remove unused macros fix(usb): add missing include
show more ...
|
| 4da4a1a6 | 07-Feb-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "od/sme" into integration
* changes: fix(fvp): permit enabling SME for SPD=spmd feat(spmd): pass SMCCCv1.3 SVE hint to lower EL |
| 0b0fd0b4 | 03-May-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
fix(fvp): permit enabling SME for SPD=spmd
Essentially revert [1] to permit specifying SME support along with SPD=spmd on FVP platform.
[1] https://review.trustedfirmware.org/c/TF-A/trusted-firmwar
fix(fvp): permit enabling SME for SPD=spmd
Essentially revert [1] to permit specifying SME support along with SPD=spmd on FVP platform.
[1] https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/20764
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: Iab15d5a4c966b9f5b265ccde6711765e242abeaa
show more ...
|
| ce19ebd2 | 07-Feb-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "ja/spm_rme" into integration
* changes: docs: change FVP argument in RME configuration feat(fvp): added calls to unprotect/protect memory |
| 3d630fa2 | 06-Feb-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "jc/psci_spe" into integration
* changes: fix(spe): invoke spe_disable during power domain off/suspend feat(psci): add psci_do_manage_extensions API fix(arm_fpga): hal
Merge changes from topic "jc/psci_spe" into integration
* changes: fix(spe): invoke spe_disable during power domain off/suspend feat(psci): add psci_do_manage_extensions API fix(arm_fpga): halve number of PEs per core
show more ...
|
| 8620bd0b | 04-Dec-2023 |
Chris Kay <chris.kay@arm.com> |
build: use toolchain identifiers in conditions
The toolchain refactor change introduces the `${toolchain}-${tool}-id` variables, which provide identifiers for all of the toolchain tools used by the
build: use toolchain identifiers in conditions
The toolchain refactor change introduces the `${toolchain}-${tool}-id` variables, which provide identifiers for all of the toolchain tools used by the build system. This change replaces the various conditions that are in use to identify these tools based on the path with a standard set of comparisons against these new identifier variables.
Change-Id: Ib60e592359fa6e415c19a012e68d660f87436ca7 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| ffb77421 | 04-Dec-2023 |
Chris Kay <chris.kay@arm.com> |
build: use new toolchain variables for tools
This change migrates the values of `CC`, `CPP`, `AS` and other toolchain variables to the new `$(toolchain)-$(tool)` variables, which were introduced by
build: use new toolchain variables for tools
This change migrates the values of `CC`, `CPP`, `AS` and other toolchain variables to the new `$(toolchain)-$(tool)` variables, which were introduced by the toolchain refactor patch. These variables should be equivalent to the values that they're replacing.
Change-Id: I644fe4ce82ef1894bed129ddb4b6ab94fb04985d Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| cc277de8 | 20-Oct-2023 |
Chris Kay <chris.kay@arm.com> |
build: refactor toolchain detection
This change refactors how we identify the toolchain, with the ultimate aim of eventually cleaning up the various mechanisms that we employ to configure default to
build: refactor toolchain detection
This change refactors how we identify the toolchain, with the ultimate aim of eventually cleaning up the various mechanisms that we employ to configure default tools, identify the tools in use, and configure toolchain flags.
To do this, we introduce three new concepts in this change:
- Toolchain identifiers, - Tool class identifiers, and - Tool identifiers.
Toolchain identifiers identify a configurable chain of tools targeting one platform/machine/architecture. Today, these are:
- The host machine, which receives the `host` identifier, - The AArch32 architecture, which receives the `aarch32` identifier, and - The AArch64 architecture, which receivs the `aarch64` identifier.
The tools in a toolchain may come from different vendors, and are not necessarily expected to come from one single toolchain distribution. In most cases it is perfectly valid to mix tools from different toolchain distributions, with some exceptions (notably, link-time optimization generally requires the compiler and the linker to be aligned).
Tool class identifiers identify a class (or "role") of a tool. C compilers, assemblers and linkers are all examples of tool classes.
Tool identifiers identify a specific tool recognized and supported by the build system. Every tool that can make up a part of a toolchain must receive a tool identifier.
These new identifiers can be used to retrieve information about the toolchain in a more standardized fashion.
For example, logic in a Makefile that should only execute when the C compiler is GNU GCC can now check the tool identifier for the C compiler in the relevant toolchain:
ifeq ($($(ARCH)-cc-id),gnu-gcc) ... endif
Change-Id: Icc23e43aaa32f4fd01d8187c5202f5012a634e7c Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 6873088c | 04-Oct-2023 |
J-Alves <joao.alves@arm.com> |
feat(fvp): added calls to unprotect/protect memory
Added SiP calls to FVP platform to protect/unprotect a memory range. These leverage rme features to change the PAS of a given memory range from non
feat(fvp): added calls to unprotect/protect memory
Added SiP calls to FVP platform to protect/unprotect a memory range. These leverage rme features to change the PAS of a given memory range from non-secure to secure.
The mentioned call is leveraged by the SPMC in the memory sharing flow, when memory is shared from the normal world onto the secure world.
More details in the SPM related patches.
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Signed-off-by: J-Alves <joao.alves@arm.com> Change-Id: Iaf15d8603a549d247ffb1fc14c16bfb94d0e178a
show more ...
|
| 2e905c06 | 02-Feb-2024 |
Yann Gautier <yann.gautier@st.com> |
feat(stm32mp2): add STM32MP_USB_PROGRAMMER compilation
Add minimal compilation step when enabling STM32MP_USB_PROGRAMMER flag on STM32MP2. Add DWL_BUFFER_BASE in platform.mk and the compilation of t
feat(stm32mp2): add STM32MP_USB_PROGRAMMER compilation
Add minimal compilation step when enabling STM32MP_USB_PROGRAMMER flag on STM32MP2. Add DWL_BUFFER_BASE in platform.mk and the compilation of the new file plat/st/stm32mp2/stm32mp2_usb_dfu.c (just stubs for the moment).
Signed-off-by: Pankaj Dev <pankaj.dev@st.com> Signed-off-by: Patrick Delaunay <patrick.delaunay@foss.st.com> Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: I8891ff23ddc3d40d7477ada3e49e439dd8af8316
show more ...
|
| 9883833c | 02-Feb-2024 |
Yann Gautier <yann.gautier@st.com> |
refactor(st): move macros to common folder
As these definitions will be the same for STM32MP1 and STM32MP2, move PLATFORM_MTD_MAX_PAGE_SIZE and DWL_BUFFER_SIZE macro definition to the file: plat/st/
refactor(st): move macros to common folder
As these definitions will be the same for STM32MP1 and STM32MP2, move PLATFORM_MTD_MAX_PAGE_SIZE and DWL_BUFFER_SIZE macro definition to the file: plat/st/common/include/stm32mp_common.h
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: I480669d009d15fec753298f47b136e34fa240132
show more ...
|
| 8af83a44 | 02-Feb-2024 |
Yann Gautier <yann.gautier@st.com> |
refactor(stm32mp1): remove unused macros
PLAT_STM32MP_NS_IMAGE_OFFSET and PLAT_EMMC_BOOT_SSBL_OFFSET macros should have been removed with patch [1].
[1] 981b9dcb87 ("refactor(stm32mp1): remove STM3
refactor(stm32mp1): remove unused macros
PLAT_STM32MP_NS_IMAGE_OFFSET and PLAT_EMMC_BOOT_SSBL_OFFSET macros should have been removed with patch [1].
[1] 981b9dcb87 ("refactor(stm32mp1): remove STM32MP_USE_STM32IMAGE")
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: Ice98c43c0257041226525199be06134fde8466c5
show more ...
|
| a53d1377 | 29-Jan-2024 |
Manorit Chawdhry <m-chawdhry@ti.com> |
Revert "fix(ti): do not take system power reference in bl31_platform_setup()"
The workaround that we required to get over the timing issue with our Device Manager is fixed in [0], revert the workaro
Revert "fix(ti): do not take system power reference in bl31_platform_setup()"
The workaround that we required to get over the timing issue with our Device Manager is fixed in [0], revert the workaround as it is no longer required.
[0]: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/commit?id=9ad862b528112f7bc26d80668fbb9b38521cddf9
This reverts commit 9977948112d732935362a3fe8518e3b2e4b7f6b7. It also adds a check to make this backward compatible.
Change-Id: Icf10f9df9558de1ae7ba6f5f586485111aac4f8d Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
show more ...
|
| 73d772d8 | 29-Jan-2024 |
Manorit Chawdhry <m-chawdhry@ti.com> |
refactor(ti): remove ti_sci_init function
ti_sci_get_revision handles getting the firmware version and ti_sci_init is just a wrapper around it with no added benefit.
Refactor the ti_sci_get_revisio
refactor(ti): remove ti_sci_init function
ti_sci_get_revision handles getting the firmware version and ti_sci_init is just a wrapper around it with no added benefit.
Refactor the ti_sci_get_revision to give the version information and remove ti_sci_init wrapper.
Change-Id: I39184af5b00bedc8b9220533f1ddac3b6672d2f1 Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
show more ...
|