History log of /rk3399_ARM-atf/plat/ (Results 2676 – 2700 of 8868)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
570a230905-May-2023 Rob Hughes <robert.hughes@arm.com>

fix(fiptool): move juno plat_fiptool.mk

plat_fiptool.mk files now need to be in tools/fiptool/plat_fiptool/, so
this file has been moved to the new location so that it is picked up
correctly by the

fix(fiptool): move juno plat_fiptool.mk

plat_fiptool.mk files now need to be in tools/fiptool/plat_fiptool/, so
this file has been moved to the new location so that it is picked up
correctly by the build system.

Change-Id: Id3596b08bc856362e300f3dfefcaab5d75b4c400
Signed-off-by: Rob Hughes <robert.hughes@arm.com>

show more ...

ba56b01215-May-2023 Prasad Kummari <prasad.kummari@amd.com>

feat(versal-net): add the IPI CRC checksum macro support

Add support for CRC checksum for IPI data when the macro
IPI_CRC_CHECK is enabled.

Change-Id: I14dee4729f88c407bafdf1d6b46106459d8e22c4
Sign

feat(versal-net): add the IPI CRC checksum macro support

Add support for CRC checksum for IPI data when the macro
IPI_CRC_CHECK is enabled.

Change-Id: I14dee4729f88c407bafdf1d6b46106459d8e22c4
Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>

show more ...

2834bc6b16-May-2023 Manish Pandey <manish.pandey2@arm.com>

Merge "fix(tegra210): mark bits [23:17] as zero for Fast SMCs" into integration

493d422316-May-2023 Sandrine Bailleux <sandrine.bailleux@arm.com>

Merge changes from topics "plat_tests_scalability", "sb/tc-plat-tests" into integration

* changes:
test(tc): unify platform tests traces
test(tc): return test failures count for tfm-testsuite

Merge changes from topics "plat_tests_scalability", "sb/tc-plat-tests" into integration

* changes:
test(tc): unify platform tests traces
test(tc): return test failures count for tfm-testsuite
test(tc): move platform tests in their own function
test(tc): centralize platform error handling
refactor(tc): define PLATFORM_TESTS for scale

show more ...

a9779c1115-May-2023 Andre Przywara <andre.przywara@arm.com>

fix(brcm): fix misspelled header inclusion guard

The header inclusion guard for some header for the Broadcom Stingray
board was misspelled.

Make the preprocessor symbol for the #ifndef and #define

fix(brcm): fix misspelled header inclusion guard

The header inclusion guard for some header for the Broadcom Stingray
board was misspelled.

Make the preprocessor symbol for the #ifndef and #define lines the
same, so that the double inclusion protection works as expected.

Change-Id: I19d73c854cd0689a248ce914ef35ae87c39ebf39
Signed-off-by: Andre Przywara <andre.przywara@arm.com>

show more ...

9be6b16810-May-2023 J-Alves <joao.alves@arm.com>

feat: define memory ranges for tc platform

In [1] we missed to update the SPMC manifest for the
TC platform, managing OPTEE as an SP.

[1] https://review.trustedfirmware.org/c/TF-A/trusted-firmware-

feat: define memory ranges for tc platform

In [1] we missed to update the SPMC manifest for the
TC platform, managing OPTEE as an SP.

[1] https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/20107

Signed-off-by: J-Alves <joao.alves@arm.com>
Change-Id: I68c2e0da6e63216c827f77b5b86afe9f5813e62f

show more ...

303ef33e05-May-2023 Sandrine Bailleux <sandrine.bailleux@arm.com>

test(tc): unify platform tests traces

Add some traces at the start and end of platform tests. These traces
are the same regardless of the set of platform tests we run (NV
counter tests / TF-M testsu

test(tc): unify platform tests traces

Add some traces at the start and end of platform tests. These traces
are the same regardless of the set of platform tests we run (NV
counter tests / TF-M testsuite / future set of tests).

This makes it easier to integrate these tests in the CI because we can
now have a unified "expect" script for all platform tests, instead of
having one dedicated "expect" script for each possible set of tests.

Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Change-Id: I5ec30a7a25d8a9a4a90e3338a9789acff7ad4843

show more ...

26207c2d05-May-2023 Sandrine Bailleux <sandrine.bailleux@arm.com>

test(tc): return test failures count for tfm-testsuite

When running the "tfm-testsuite" set of platform tests, we now count
the number of failed tests (in addition to printing a test summary)
and re

test(tc): return test failures count for tfm-testsuite

When running the "tfm-testsuite" set of platform tests, we now count
the number of failed tests (in addition to printing a test summary)
and report that back to the caller,
i.e. tc_bl31_common_platform_setup().

This will be useful to consolidate the tests failure reporting code in
a subsequent patch.

Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Change-Id: I8e51f03869f3b2f264b6581b3bd2a53be0198057

show more ...

4eefbf1b05-May-2023 Sandrine Bailleux <sandrine.bailleux@arm.com>

test(tc): move platform tests in their own function

This is a bit cleaner, as it avoids cluttering the normal boot execution
path. It also gives us the opportunity to mark the tests function with
th

test(tc): move platform tests in their own function

This is a bit cleaner, as it avoids cluttering the normal boot execution
path. It also gives us the opportunity to mark the tests function with
the __dead2 attribute, which inform both the compiler and the developer
that the test function never returns (since it suspends booting).

Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Change-Id: I082a34a840ef791a2ac4c1f59b19b32aeb0a9ec7

show more ...

57cc12c805-May-2023 Sandrine Bailleux <sandrine.bailleux@arm.com>

test(tc): centralize platform error handling

Note that this change only affects the platform tests execution
path. It has no impact on the normal boot flow.

Make individual test functions propagate

test(tc): centralize platform error handling

Note that this change only affects the platform tests execution
path. It has no impact on the normal boot flow.

Make individual test functions propagate an error code, instead of
calling the platform error handler at the point of failure. The latter
is now the responsibility of the caller - in this case
tc_bl31_common_platform_setup().

Note that right now, tc_bl31_common_platform_setup() does not look at
the said error code but this initial change opens up an opportunity to
centralize any error handling in tc_bl31_common_platform_setup(),
which we will seize in subsequent patches.

Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Change-Id: Ib282b64039e0b1ec6e6d29476fbaa2bcd33cb0c7

show more ...

cb6c8efc24-Apr-2023 Kalyani Chidambaram Vaidyanathan <kalyanic@nvidia.com>

fix(tegra210): mark bits [23:17] as zero for Fast SMCs

Per SMCCC documentation, bits [23:17] must be zero for Fast
SMCs. Other values are reserved for future use. Ensure that
these bits are zeroes f

fix(tegra210): mark bits [23:17] as zero for Fast SMCs

Per SMCCC documentation, bits [23:17] must be zero for Fast
SMCs. Other values are reserved for future use. Ensure that
these bits are zeroes for TEGRA_SIP_PMC_COMMANDS.

Commit f8a35797 introduced a check to return error if these
bits are not zero, thus breaking Tegra210 platforms. This
patch fixes the anomaly.

Change-Id: I19edc3b33c999a6fee6b86184233fba146316466
Signed-off-by: Kalyani Chidambaram Vaidyanathan <kalyanic@nvidia.com>
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>

show more ...

9d44b2b911-May-2023 Manish Pandey <manish.pandey2@arm.com>

Merge "fix(n1sdp): add platform-specific power domain functions" into integration

5bfdb73211-May-2023 Manish Pandey <manish.pandey2@arm.com>

Merge "fix(morello): add platform-specific power domain functions" into integration

e1eef33510-May-2023 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "fix(spmd): fix build error with spmd" into integration

fd51b21510-May-2023 Govindraj Raja <govindraj.raja@arm.com>

fix(spmd): fix build error with spmd

Currently when we build with 'SPD=spmd SPMD_SPM_AT_SEL2=0'
options, this causes a build failure as
'plat_spmd_handle_group0_interrupt' is called irrespective of

fix(spmd): fix build error with spmd

Currently when we build with 'SPD=spmd SPMD_SPM_AT_SEL2=0'
options, this causes a build failure as
'plat_spmd_handle_group0_interrupt' is called irrespective of
'SPMD_SPM_AT_SEL2' usage in 'spmd_group0_interrupt_handler_nwd'

So make 'plat_spmd_handle_group0_interrupt' dummy implementation
available just when spmd is enabled and SPMC_AT_EL3 is disabled.

Change-Id: Iaccd38faab81671c98f9165f318145187dca9bc2
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>

show more ...

3c3ea90c10-May-2023 Daniel Boulby <daniel.boulby@arm.com>

build(fpga): reduce cpu_libs to tc and neoverse

Change-Id: I20e88d5e712dafa7364b7932b8b4aaa9051bea55
Signed-off-by: Daniel Boulby <daniel.boulby@arm.com>

41914de309-May-2023 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge changes I5bb43cb0,I6aebe2ca,Ib59df16a,I9d037ab2,I9df5a465, ... into integration

* changes:
fix(msm8916): add timeout for crash console TX flush
style(msm8916): use size macros
feat(msm89

Merge changes I5bb43cb0,I6aebe2ca,Ib59df16a,I9d037ab2,I9df5a465, ... into integration

* changes:
fix(msm8916): add timeout for crash console TX flush
style(msm8916): use size macros
feat(msm8916): expose more timer frames
fix(msm8916): drop unneeded initialization of CNTACR
build(msm8916): disable unneeded workarounds
fix(msm8916): flush dcache after writing msm8916_entry_point
fix(msm8916): print \r before \n on UART console

show more ...

4bd8c92909-May-2023 Manish Pandey <manish.pandey2@arm.com>

Merge changes I1bfa797e,I0ec7a70e into integration

* changes:
fix(tree): correct some typos
fix(rockchip): use semicolon instead of comma


/rk3399_ARM-atf/drivers/arm/css/scmi/vendor/scmi_sq.c
/rk3399_ARM-atf/drivers/arm/gic/v2/gicv2_main.c
/rk3399_ARM-atf/drivers/arm/gic/v3/gic600_multichip.c
/rk3399_ARM-atf/drivers/brcm/emmc/emmc_chal_sd.c
/rk3399_ARM-atf/drivers/brcm/emmc/emmc_csl_sdcard.c
/rk3399_ARM-atf/drivers/brcm/i2c/i2c.c
/rk3399_ARM-atf/drivers/brcm/sotp.c
/rk3399_ARM-atf/drivers/marvell/comphy/phy-comphy-cp110.c
/rk3399_ARM-atf/drivers/marvell/gwin.c
/rk3399_ARM-atf/drivers/marvell/mg_conf_cm3/mg_conf_cm3.c
/rk3399_ARM-atf/drivers/nxp/crypto/caam/src/auth/hash.c
/rk3399_ARM-atf/drivers/nxp/crypto/caam/src/hw_key_blob.c
/rk3399_ARM-atf/drivers/nxp/crypto/caam/src/rng.c
/rk3399_ARM-atf/drivers/nxp/ddr/nxp-ddr/ddr.c
/rk3399_ARM-atf/drivers/nxp/ddr/nxp-ddr/ddrc.c
/rk3399_ARM-atf/drivers/nxp/ddr/phy-gen2/messages.h
/rk3399_ARM-atf/drivers/nxp/ifc/nand/ifc_nand.c
/rk3399_ARM-atf/drivers/nxp/sd/sd_mmc.c
/rk3399_ARM-atf/drivers/renesas/common/console/rcar_printf.c
/rk3399_ARM-atf/drivers/renesas/common/emmc/emmc_hal.h
/rk3399_ARM-atf/drivers/renesas/common/pfc_regs.h
/rk3399_ARM-atf/drivers/renesas/rcar/pfc/V3M/pfc_init_v3m.c
/rk3399_ARM-atf/drivers/scmi-msg/clock.c
/rk3399_ARM-atf/drivers/st/clk/stm32mp1_clk.c
/rk3399_ARM-atf/drivers/st/crypto/stm32_pka.c
/rk3399_ARM-atf/drivers/st/ddr/stm32mp1_ddr.c
/rk3399_ARM-atf/include/arch/aarch32/arch.h
/rk3399_ARM-atf/include/arch/aarch64/arch.h
/rk3399_ARM-atf/include/bl31/ehf.h
/rk3399_ARM-atf/include/drivers/arm/cryptocell/712/cc_pal_types_plat.h
/rk3399_ARM-atf/include/drivers/arm/cryptocell/713/cc_pal_types_plat.h
/rk3399_ARM-atf/include/drivers/arm/gic600ae_fmu.h
/rk3399_ARM-atf/include/drivers/auth/crypto_mod.h
/rk3399_ARM-atf/include/drivers/brcm/emmc/emmc_csl_sdprot.h
/rk3399_ARM-atf/include/drivers/brcm/i2c/i2c.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/sec_hw_specific.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/sec_jr_driver.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/dcfg_lsch2.h
/rk3399_ARM-atf/include/lib/cpus/aarch64/generic.h
/rk3399_ARM-atf/lib/debugfs/debugfs_smc.c
/rk3399_ARM-atf/lib/el3_runtime/aarch64/context_mgmt.c
/rk3399_ARM-atf/lib/optee/optee_utils.c
/rk3399_ARM-atf/lib/xlat_tables/aarch32/nonlpae_tables.c
/rk3399_ARM-atf/lib/xlat_tables/xlat_tables_common.c
/rk3399_ARM-atf/lib/xlat_tables_v2/xlat_tables_core.c
/rk3399_ARM-atf/lib/xlat_tables_v2/xlat_tables_utils.c
arm/board/fvp/sp_min/fvp_sp_min_setup.c
arm/common/tsp/arm_tsp_setup.c
brcm/board/stingray/driver/swreg.c
common/aarch64/plat_ehf.c
imx/common/include/sci/sci_rpc.h
imx/common/include/sci/svc/pad/sci_pad_api.h
imx/common/include/sci/svc/pm/sci_pm_api.h
imx/imx8m/gpc_common.c
imx/imx8m/imx8mm/gpc.c
imx/imx8m/imx8mn/gpc.c
imx/imx8m/imx8mp/gpc.c
imx/imx8m/imx8mq/gpc.c
intel/soc/agilex/bl31_plat_setup.c
intel/soc/common/sip/socfpga_sip_fcs.c
intel/soc/n5x/bl31_plat_setup.c
intel/soc/stratix10/bl31_plat_setup.c
marvell/armada/a8k/common/plat_pm.c
marvell/armada/common/marvell_ddr_info.c
mediatek/include/mtk_sip_svc.h
mediatek/mt8173/bl31_plat_setup.c
mediatek/mt8173/drivers/spm/spm.c
mediatek/mt8183/bl31_plat_setup.c
mediatek/mt8186/bl31_plat_setup.c
mediatek/mt8192/bl31_plat_setup.c
mediatek/mt8195/bl31_plat_setup.c
mediatek/mt8195/drivers/apusys/apupll.c
nvidia/tegra/common/tegra_bl31_setup.c
nvidia/tegra/drivers/memctrl/memctrl_v2.c
nvidia/tegra/include/drivers/tegra_gic.h
nvidia/tegra/include/t186/tegra_def.h
nvidia/tegra/include/t194/tegra_def.h
nvidia/tegra/soc/t186/drivers/include/t18x_ari.h
nvidia/tegra/soc/t194/drivers/include/t194_nvg.h
nvidia/tegra/soc/t194/plat_ras.c
nxp/common/setup/ls_bl31_setup.c
nxp/soc-ls1088a/include/soc.h
qti/common/src/qti_bl31_setup.c
renesas/rcar/bl2_plat_setup.c
rockchip/common/bl31_plat_setup.c
rockchip/common/drivers/pmu/pmu_com.h
rockchip/common/sp_min_plat_setup.c
rockchip/rk3288/drivers/pmu/pmu.c
rockchip/rk3288/drivers/soc/soc.c
rockchip/rk3328/drivers/pmu/pmu.c
rockchip/rk3328/drivers/soc/soc.h
rockchip/rk3368/drivers/soc/soc.c
rockchip/rk3399/drivers/dram/dfs.c
rockchip/rk3399/drivers/dram/dram_spec_timing.h
rockchip/rk3399/drivers/dram/suspend.c
rockchip/rk3399/drivers/gpio/rk3399_gpio.c
rockchip/rk3399/drivers/m0/src/suspend.c
rockchip/rk3399/drivers/secure/secure.h
rockchip/rk3399/drivers/soc/soc.c
rpi/rpi4/rpi4_pci_svc.c
st/stm32mp1/stm32mp1_pm.c
xilinx/common/plat_startup.c
xilinx/zynqmp/pm_service/zynqmp_pm_api_sys.c
xilinx/zynqmp/pm_service/zynqmp_pm_svc_main.c
xilinx/zynqmp/tsp/tsp_plat_setup.c
/rk3399_ARM-atf/services/std_svc/drtm/drtm_measurements.c
/rk3399_ARM-atf/services/std_svc/spm/el3_spmc/spmc_setup.c
/rk3399_ARM-atf/services/std_svc/spm/spm_mm/spm_mm_main.c
/rk3399_ARM-atf/tools/fiptool/win_posix.h
/rk3399_ARM-atf/tools/nxp/create_pbl/create_pbl.c
269f3dae09-May-2023 Manish Pandey <manish.pandey2@arm.com>

Merge changes from topic "mp/feat_ras" into integration

* changes:
refactor(cpufeat): enable FEAT_RAS for FEAT_STATE_CHECKED
refactor(ras): replace RAS_EXTENSION with FEAT_RAS

7e002c8a06-Apr-2023 Stephan Gerhold <stephan@gerhold.net>

fix(msm8916): add timeout for crash console TX flush

Resetting the UART DM controller while there are still remaining
characters in the FIFO often results in corruption on the UART receiver
side. To

fix(msm8916): add timeout for crash console TX flush

Resetting the UART DM controller while there are still remaining
characters in the FIFO often results in corruption on the UART receiver
side. To avoid this the msm8916 crash console implementation tries to
wait until the TX FIFO is empty.

Unfortunately this might spin forever if the transmitter was disabled
before it has fully finished transmitting. In this case the TXEMT bit
console_uartdm_core_flush is waiting for will never get set.

There seems to be no good way to detect if the transmitter is actually
enabled via the status registers. However, the TX FIFO is fairly small
and should not take too long to get flushed, so fix this by simply
limiting the amount of iterations with a short timeout.

Move the code to console_uartdm_core_init to ensure that this always
happens before resetting the transmitter (also during initialization).

Change-Id: I5bb43cb0b6c029bcd15e253d60d36c0b310e108b
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>

show more ...

a27e3f7626-Mar-2023 Stephan Gerhold <stephan@gerhold.net>

style(msm8916): use size macros

Use the pre-defined size macros (SZ_*) for more clarity and to avoid
having to add comments to each size represented by hexadecimal numbers.

Change-Id: I6aebe2caf136

style(msm8916): use size macros

Use the pre-defined size macros (SZ_*) for more clarity and to avoid
having to add comments to each size represented by hexadecimal numbers.

Change-Id: I6aebe2caf1365279670955b9b507dec7d7b04457
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>

show more ...

1781bf1c22-Mar-2023 Stephan Gerhold <stephan@gerhold.net>

feat(msm8916): expose more timer frames

The memory-mapped generic timer on msm8916 has 7 timer frames, but
currently only one is exposed for usage in the non-secure world.

The platform port is curr

feat(msm8916): expose more timer frames

The memory-mapped generic timer on msm8916 has 7 timer frames, but
currently only one is exposed for usage in the non-secure world.

The platform port is currently only designed to be used as minimal PSCI
implementation, without secure world that could make use of the other
timer frames. Let's make all of them available to the normal world.

If needed this could still be changed later by reserving some timer
frames conditionally to a specific SPD being enabled in the build.

Change-Id: Ib59df16aa1fd3dbc875ab6369c133737830c98c6
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>

show more ...

d833af3a22-Mar-2023 Stephan Gerhold <stephan@gerhold.net>

fix(msm8916): drop unneeded initialization of CNTACR

Normal world software is responsible to initialize CNTACR as needed.
There is no existing software for msm8916 that depends on having this
initia

fix(msm8916): drop unneeded initialization of CNTACR

Normal world software is responsible to initialize CNTACR as needed.
There is no existing software for msm8916 that depends on having this
initialization in BL31 so drop it before anything starts to rely on it.

Related issue: https://github.com/ARM-software/tf-issues/issues/170

Change-Id: I9d037ab218c0c1c8a5d5523722013eba531f4728
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>

show more ...

4a3e2cb314-Mar-2023 Stephan Gerhold <stephan@gerhold.net>

build(msm8916): disable unneeded workarounds

The Cortex-A53 cores used in the msm8916 platform are not affected by
CVE-2017-5715 and CVE-2022-23960, so disable the workarounds for them
to drop the u

build(msm8916): disable unneeded workarounds

The Cortex-A53 cores used in the msm8916 platform are not affected by
CVE-2017-5715 and CVE-2022-23960, so disable the workarounds for them
to drop the unused code from the compiled binary.

Change-Id: I9df5a4657c4fd90702b4db4e82d4ee1a2f60303c
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>

show more ...

01ba69cd17-Sep-2022 Stephan Gerhold <stephan@gerhold.net>

fix(msm8916): flush dcache after writing msm8916_entry_point

msm8916_entry_point is read with caches off (and even from two
different physical addresses when read through the "boot remapper"),
so it

fix(msm8916): flush dcache after writing msm8916_entry_point

msm8916_entry_point is read with caches off (and even from two
different physical addresses when read through the "boot remapper"),
so it should be flushed to RAM after writing it.

Change-Id: I5c8193954bb28043b0a46fb2038f629bd8796c74
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>

show more ...

1...<<101102103104105106107108109110>>...355