History log of /rk3399_ARM-atf/plat/ (Results 4351 – 4375 of 8950)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
5183e63705-Jul-2021 Rex-BC Chen <rex-bc.chen@mediatek.com>

feat(plat/mdeiatek/mt8192): add DFD control in SiP service

DFD (Design for Debug) is a debugging tool, which scans
flip-flops and dumps to internal RAM on the WDT reset.
After system reboots, those

feat(plat/mdeiatek/mt8192): add DFD control in SiP service

DFD (Design for Debug) is a debugging tool, which scans
flip-flops and dumps to internal RAM on the WDT reset.
After system reboots, those values could be showed for
debugging.

Signed-off-by: Rex-BC Chen <rex-bc.chen@mediatek.com>
Change-Id: I9c7af9a4f75216ed2c6b44458d121a352bef4b95

show more ...

f34322c104-Aug-2021 Manish V Badarkhe <Manish.Badarkhe@arm.com>

fix: avoid redefinition of 'efi_guid' structure

Fixed the build error by removing the local definition of 'efi_guid'
structure in 'sgi_ras.c' file as this structure definition is already
populated i

fix: avoid redefinition of 'efi_guid' structure

Fixed the build error by removing the local definition of 'efi_guid'
structure in 'sgi_ras.c' file as this structure definition is already
populated in 'sgi_ras.c' file via 'uuid.h' header.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I57687336863f2a0761c09b6c1aa00b4aa82a6a12

show more ...


/rk3399_ARM-atf/drivers/nxp/auth/csf_hdr_parser/csf_hdr.mk
/rk3399_ARM-atf/drivers/nxp/console/console.mk
/rk3399_ARM-atf/drivers/nxp/crypto/caam/caam.mk
/rk3399_ARM-atf/drivers/nxp/csu/csu.mk
/rk3399_ARM-atf/drivers/nxp/dcfg/dcfg.mk
/rk3399_ARM-atf/drivers/nxp/ddr/fsl-mmdc/ddr.mk
/rk3399_ARM-atf/drivers/nxp/ddr/nxp-ddr/ddr.mk
/rk3399_ARM-atf/drivers/nxp/drivers.mk
/rk3399_ARM-atf/drivers/nxp/gic/gic.mk
/rk3399_ARM-atf/drivers/nxp/gpio/gpio.mk
/rk3399_ARM-atf/drivers/nxp/i2c/i2c.mk
/rk3399_ARM-atf/drivers/nxp/interconnect/interconnect.mk
/rk3399_ARM-atf/drivers/nxp/pmu/pmu.mk
/rk3399_ARM-atf/drivers/nxp/qspi/qspi.mk
/rk3399_ARM-atf/drivers/nxp/sd/sd_mmc.mk
/rk3399_ARM-atf/drivers/nxp/sec_mon/sec_mon.mk
/rk3399_ARM-atf/drivers/nxp/sfp/sfp.mk
/rk3399_ARM-atf/drivers/nxp/timer/timer.mk
/rk3399_ARM-atf/drivers/nxp/tzc/tzc.mk
/rk3399_ARM-atf/include/drivers/nxp/auth/csf_hdr_parser/csf_hdr.h
/rk3399_ARM-atf/include/drivers/nxp/console/plat_console.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/caam.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/caam_io.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/hash.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/jobdesc.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/jr_driver_config.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/rsa.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/sec_hw_specific.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/sec_jr_driver.h
/rk3399_ARM-atf/include/drivers/nxp/csu/csu.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/dcfg.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/dcfg_lsch2.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/dcfg_lsch3.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/scfg.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/ddr.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/ddr_io.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/dimm.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/fsl-mmdc/fsl_mmdc.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/immap.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/opts.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/regs.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/utility.h
/rk3399_ARM-atf/include/drivers/nxp/gic/gicv2/plat_gic.h
/rk3399_ARM-atf/include/drivers/nxp/gic/gicv3/plat_gic.h
/rk3399_ARM-atf/include/drivers/nxp/gpio/nxp_gpio.h
/rk3399_ARM-atf/include/drivers/nxp/i2c/i2c.h
/rk3399_ARM-atf/include/drivers/nxp/interconnect/ls_interconnect.h
/rk3399_ARM-atf/include/drivers/nxp/pmu/pmu.h
/rk3399_ARM-atf/include/drivers/nxp/qspi/qspi.h
/rk3399_ARM-atf/include/drivers/nxp/sd/sd_mmc.h
/rk3399_ARM-atf/include/drivers/nxp/sec_mon/snvs.h
/rk3399_ARM-atf/include/drivers/nxp/sfp/fuse_prov.h
/rk3399_ARM-atf/include/drivers/nxp/sfp/sfp.h
/rk3399_ARM-atf/include/drivers/nxp/sfp/sfp_error_codes.h
/rk3399_ARM-atf/include/drivers/nxp/timer/nxp_timer.h
/rk3399_ARM-atf/include/drivers/nxp/tzc/plat_tzc400.h
arm/css/sgi/sgi_ras.c
e1c732d411-Mar-2021 J-Alves <joao.alves@arm.com>

feat(ff-a): update FF-A version to v1.1

Bump the required FF-A version in framework and manifests to v1.1 as
upstream feature development goes.

Signed-off-by: Olivier Deprez <olivier.deprez@arm.com

feat(ff-a): update FF-A version to v1.1

Bump the required FF-A version in framework and manifests to v1.1 as
upstream feature development goes.

Signed-off-by: Olivier Deprez <olivier.deprez@arm.com>
Change-Id: I89b2bd3828a13fc4344ccd53bc3ac9c0c22ab29f

show more ...


/rk3399_ARM-atf/drivers/nxp/auth/csf_hdr_parser/csf_hdr.mk
/rk3399_ARM-atf/drivers/nxp/console/console.mk
/rk3399_ARM-atf/drivers/nxp/crypto/caam/caam.mk
/rk3399_ARM-atf/drivers/nxp/csu/csu.mk
/rk3399_ARM-atf/drivers/nxp/dcfg/dcfg.mk
/rk3399_ARM-atf/drivers/nxp/ddr/fsl-mmdc/ddr.mk
/rk3399_ARM-atf/drivers/nxp/ddr/nxp-ddr/ddr.mk
/rk3399_ARM-atf/drivers/nxp/drivers.mk
/rk3399_ARM-atf/drivers/nxp/gic/gic.mk
/rk3399_ARM-atf/drivers/nxp/gpio/gpio.mk
/rk3399_ARM-atf/drivers/nxp/i2c/i2c.mk
/rk3399_ARM-atf/drivers/nxp/interconnect/interconnect.mk
/rk3399_ARM-atf/drivers/nxp/pmu/pmu.mk
/rk3399_ARM-atf/drivers/nxp/qspi/qspi.mk
/rk3399_ARM-atf/drivers/nxp/sd/sd_mmc.mk
/rk3399_ARM-atf/drivers/nxp/sec_mon/sec_mon.mk
/rk3399_ARM-atf/drivers/nxp/sfp/sfp.mk
/rk3399_ARM-atf/drivers/nxp/timer/timer.mk
/rk3399_ARM-atf/drivers/nxp/tzc/tzc.mk
/rk3399_ARM-atf/include/drivers/nxp/auth/csf_hdr_parser/csf_hdr.h
/rk3399_ARM-atf/include/drivers/nxp/console/plat_console.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/caam.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/caam_io.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/hash.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/jobdesc.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/jr_driver_config.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/rsa.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/sec_hw_specific.h
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/sec_jr_driver.h
/rk3399_ARM-atf/include/drivers/nxp/csu/csu.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/dcfg.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/dcfg_lsch2.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/dcfg_lsch3.h
/rk3399_ARM-atf/include/drivers/nxp/dcfg/scfg.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/ddr.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/ddr_io.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/dimm.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/fsl-mmdc/fsl_mmdc.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/immap.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/opts.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/regs.h
/rk3399_ARM-atf/include/drivers/nxp/ddr/utility.h
/rk3399_ARM-atf/include/drivers/nxp/gic/gicv2/plat_gic.h
/rk3399_ARM-atf/include/drivers/nxp/gic/gicv3/plat_gic.h
/rk3399_ARM-atf/include/drivers/nxp/gpio/nxp_gpio.h
/rk3399_ARM-atf/include/drivers/nxp/i2c/i2c.h
/rk3399_ARM-atf/include/drivers/nxp/interconnect/ls_interconnect.h
/rk3399_ARM-atf/include/drivers/nxp/pmu/pmu.h
/rk3399_ARM-atf/include/drivers/nxp/qspi/qspi.h
/rk3399_ARM-atf/include/drivers/nxp/sd/sd_mmc.h
/rk3399_ARM-atf/include/drivers/nxp/sec_mon/snvs.h
/rk3399_ARM-atf/include/drivers/nxp/sfp/fuse_prov.h
/rk3399_ARM-atf/include/drivers/nxp/sfp/sfp.h
/rk3399_ARM-atf/include/drivers/nxp/sfp/sfp_error_codes.h
/rk3399_ARM-atf/include/drivers/nxp/timer/nxp_timer.h
/rk3399_ARM-atf/include/drivers/nxp/tzc/plat_tzc400.h
/rk3399_ARM-atf/include/services/ffa_svc.h
arm/board/diphda/common/fdts/diphda_spmc_manifest.dts
arm/board/fvp/fdts/fvp_spmc_manifest.dts
arm/board/fvp/fdts/fvp_spmc_optee_sp_manifest.dts
arm/board/tc0/fdts/tc0_spmc_manifest.dts
arm/board/tc0/fdts/tc0_spmc_optee_sp_manifest.dts
5e4e13e102-Aug-2021 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge changes from topic "fw-update-2" into integration

* changes:
feat(sw_crc32): add software CRC32 support
refactor(hw_crc32): renamed hw_crc32 to tf_crc32
feat(fwu): avoid booting with an

Merge changes from topic "fw-update-2" into integration

* changes:
feat(sw_crc32): add software CRC32 support
refactor(hw_crc32): renamed hw_crc32 to tf_crc32
feat(fwu): avoid booting with an alternate boot source
docs(fwu): add firmware update documentation
feat(fwu): avoid NV counter upgrade in trial run state
feat(plat/arm): add FWU support in Arm platforms
feat(fwu): initialize FWU driver in BL2
feat(fwu): add FWU driver
feat(fwu): introduce FWU platform-specific functions declarations
docs(fwu_metadata): add FWU metadata build options
feat(fwu_metadata): add FWU metadata header and build options

show more ...

c885d5c802-Jul-2021 Manish V Badarkhe <Manish.Badarkhe@arm.com>

refactor(hw_crc32): renamed hw_crc32 to tf_crc32

Renamed hw_crc32 to tf_crc32 to make the file and function
name more generic so that the same name can be used in upcoming
software CRC32 implementat

refactor(hw_crc32): renamed hw_crc32 to tf_crc32

Renamed hw_crc32 to tf_crc32 to make the file and function
name more generic so that the same name can be used in upcoming
software CRC32 implementation.

Change-Id: Idff8f70c50ca700a4328a27b49d5e1f14d2095eb
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

2f1177b225-Jun-2021 Manish V Badarkhe <Manish.Badarkhe@arm.com>

feat(plat/arm): add FWU support in Arm platforms

Added firmware update support in Arm platforms by using
FWU platform hooks and compiling FWU driver in BL2
component.

Change-Id: I71af06c09d95c2c58e

feat(plat/arm): add FWU support in Arm platforms

Added firmware update support in Arm platforms by using
FWU platform hooks and compiling FWU driver in BL2
component.

Change-Id: I71af06c09d95c2c58e3fd766c4a61c5652637151
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

c7e39dcf02-Aug-2021 Olivier Deprez <olivier.deprez@arm.com>

Merge "feat(ff-a): change manifest messaging method" into integration

6881f7be30-Jul-2021 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge changes Ic7579b60,I05414ca1 into integration

* changes:
fix(plat/ea_handler): print newline before fatal abort error message
feat(common/debug): add new macro ERROR_NL() to print just a ne

Merge changes Ic7579b60,I05414ca1 into integration

* changes:
fix(plat/ea_handler): print newline before fatal abort error message
feat(common/debug): add new macro ERROR_NL() to print just a newline

show more ...

a5fea81022-Jun-2021 Pali Rohár <pali@kernel.org>

fix(plat/ea_handler): print newline before fatal abort error message

External Abort may happen also during printing of some messages by
U-Boot or kernel. So print newline before fatal abort error me

fix(plat/ea_handler): print newline before fatal abort error message

External Abort may happen also during printing of some messages by
U-Boot or kernel. So print newline before fatal abort error message.

Signed-off-by: Pali Rohár <pali@kernel.org>
Change-Id: Ic7579b605e695c2e4cb9a4f5cdc2d0b3e5083e49

show more ...

749d0fa826-Jul-2021 Stas Sergeev <stsp@users.sourceforge.net>

fix(plat/fvp): provide boot files via semihosting

These files are needed during boot, but they were missing
for semihosting.
With this patch, the list of files is complete enough to
boot on ATF plat

fix(plat/fvp): provide boot files via semihosting

These files are needed during boot, but they were missing
for semihosting.
With this patch, the list of files is complete enough to
boot on ATF platform via semihosting.

Change-Id: I2f0ca25983a6e18096f040780776f19f8040ea79
Signed-off-by: stsp@users.sourceforge.net

show more ...

fe1021f128-Jul-2021 Manish Pandey <manish.pandey2@arm.com>

Merge "rpi4: enable RPi4 PCI SMC conduit" into integration

ab061eb718-Nov-2020 Jeremy Linton <jeremy.linton@arm.com>

rpi4: SMCCC PCI implementation

The rpi4 has a single nonstandard ECAM. It is broken
into two pieces, the root port registers, and a window
to a single device's config space which can be moved
betwee

rpi4: SMCCC PCI implementation

The rpi4 has a single nonstandard ECAM. It is broken
into two pieces, the root port registers, and a window
to a single device's config space which can be moved
between devices. Now that we have widened the page
tables/MMIO window, we can create a read/write acces
functions that are called by the SMCCC/PCI API.

As an example platform, the rpi4 single device ECAM
region quirk is pretty straightforward. The assumption
here is that a lower level (uefi) has configured and
initialized the PCI root to match the values we are
using here.

Signed-off-by: Jeremy Linton <jeremy.linton@arm.com>
Change-Id: Ie1ffa8fe9aa1d3c62e6aa84746a949c1009162e0

show more ...

6e63cdc518-Nov-2020 Jeremy Linton <jeremy.linton@arm.com>

rpi4: enable RPi4 PCI SMC conduit

Now that we have adjusted the address map, added the
SMC conduit code, and the RPi4 PCI callbacks, lets
add the flags to enable everything in the build.

By default

rpi4: enable RPi4 PCI SMC conduit

Now that we have adjusted the address map, added the
SMC conduit code, and the RPi4 PCI callbacks, lets
add the flags to enable everything in the build.

By default this service is disabled because the
expectation is that its only useful in a UEFI+ACPI
environment.

Signed-off-by: Jeremy Linton <jeremy.linton@arm.com>
Change-Id: I2a3cac6d63ba8119d3b711db121185816b89f8a2

show more ...

743e3b4127-Jul-2021 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "plat/sgi: tag dmc620 MM communicate messages with a guid" into integration

7fb82d8227-Jul-2021 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "fix(rk3399/suspend): correct LPDDR4 resume sequence" into integration

d31f319426-Jul-2021 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "fix(plat/imx): do not keep mmc_device_info in stack" into integration

81e63f2526-Jul-2021 André Przywara <andre.przywara@arm.com>

Merge changes from topic "allwinner_mmap" into integration

* changes:
refactor(plat/allwinner): clean up platform definitions
refactor(plat/allwinner): do not map BL32 DRAM at EL3
refactor(pla

Merge changes from topic "allwinner_mmap" into integration

* changes:
refactor(plat/allwinner): clean up platform definitions
refactor(plat/allwinner): do not map BL32 DRAM at EL3
refactor(plat/allwinner): map SRAM as device memory by default
refactor(plat/allwinner): rename static mmap region constant
feat(bl_common): import BL_NOBITS_{BASE,END} when defined

show more ...

a52c524726-Jul-2021 Manish Pandey <manish.pandey2@arm.com>

Merge changes from topic "sve+amu" into integration

* changes:
fix(plat/tc0): enable AMU extension
fix(el3_runtime): fix SVE and AMU extension enablement flags

b5863cab09-Jul-2021 Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>

fix(plat/tc0): enable AMU extension

Recent changes to enable SVE for the secure world have disabled AMU
extension by default in the reset value of CPTR_EL3 register. So the
platform has to enable th

fix(plat/tc0): enable AMU extension

Recent changes to enable SVE for the secure world have disabled AMU
extension by default in the reset value of CPTR_EL3 register. So the
platform has to enable this extension explicitly.

Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
Change-Id: I7d930d96ec22d7c3db961411370564bece0ce272

show more ...

0e54a78904-Apr-2021 Samuel Holland <samuel@sholland.org>

refactor(plat/allwinner): clean up platform definitions

Group the SCP base/size definitions in a more logical location.

Signed-off-by: Samuel Holland <samuel@sholland.org>
Change-Id: Id43f9b468d7d8

refactor(plat/allwinner): clean up platform definitions

Group the SCP base/size definitions in a more logical location.

Signed-off-by: Samuel Holland <samuel@sholland.org>
Change-Id: Id43f9b468d7d855a2413173d674a5ee666527808

show more ...

8d9efdf814-Dec-2020 Samuel Holland <samuel@sholland.org>

refactor(plat/allwinner): do not map BL32 DRAM at EL3

BL31 does not appear to ever access the DRAM allocated to BL32,
so there is no need to map it at EL3.

Signed-off-by: Samuel Holland <samuel@sho

refactor(plat/allwinner): do not map BL32 DRAM at EL3

BL31 does not appear to ever access the DRAM allocated to BL32,
so there is no need to map it at EL3.

Signed-off-by: Samuel Holland <samuel@sholland.org>
Change-Id: Ie8727b793e53ea14517894942266f6da0333eb74

show more ...

ab74206b14-Dec-2020 Samuel Holland <samuel@sholland.org>

refactor(plat/allwinner): map SRAM as device memory by default

The SRAM on Allwinner platforms is shared between BL31 and coprocessor
firmware. Previously, SRAM was mapped as normal memory by defaul

refactor(plat/allwinner): map SRAM as device memory by default

The SRAM on Allwinner platforms is shared between BL31 and coprocessor
firmware. Previously, SRAM was mapped as normal memory by default.
This scheme requires carveouts and cache maintenance code for proper
synchronization with the coprocessor.

A better scheme is to only map pages owned by BL31 as normal memory,
and leave everything else as device memory. This removes the need for
cache maintenance, and it makes the mapping for BL31 RW data explicit
instead of magic.

Signed-off-by: Samuel Holland <samuel@sholland.org>
Change-Id: I820ddeba2dfa2396361c2322308c0db51b55c348

show more ...

bc13562414-Dec-2020 Samuel Holland <samuel@sholland.org>

refactor(plat/allwinner): rename static mmap region constant

This constant specifically refers to the number of static mmap regions.
Rename it to make that clear.

Signed-off-by: Samuel Holland <sam

refactor(plat/allwinner): rename static mmap region constant

This constant specifically refers to the number of static mmap regions.
Rename it to make that clear.

Signed-off-by: Samuel Holland <samuel@sholland.org>
Change-Id: I475c037777ce2a10db2631ec0e7446bb73590a36

show more ...

7f70cd2910-May-2021 Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>

feat: disabling non volatile counters in diphda

At this stage of development Non Volatile counters are not implemented
in the Diphda platform.

This commit disables their use during the Trusted Boar

feat: disabling non volatile counters in diphda

At this stage of development Non Volatile counters are not implemented
in the Diphda platform.

This commit disables their use during the Trusted Board Boot by
overriding the NV counters get/set functions.

Change-Id: I8dcbebe0281cc4d0837c283ff637e20b850988ef
Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>

show more ...

bf3ce99321-Apr-2021 Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>

feat: adding the diphda platform

This commit enables trusted-firmware-a with Trusted Board Boot support
for the Diphda 64-bit platform.

Diphda uses a FIP image located in the flash. The FIP contain

feat: adding the diphda platform

This commit enables trusted-firmware-a with Trusted Board Boot support
for the Diphda 64-bit platform.

Diphda uses a FIP image located in the flash. The FIP contains the
following components:

- BL2
- BL31
- BL32
- BL32 SPMC manifest
- BL33
- The TBB certificates

The board boot relies on CoT (chain of trust). The trusted-firmware-a
BL2 is extracted from the FIP and verified by the Secure Enclave
processor. BL2 verification relies on the signature area at the
beginning of the BL2 image. This area is needed by the SecureEnclave
bootloader.

Then, the application processor is released from reset and starts by
executing BL2.

BL2 performs the actions described in the trusted-firmware-a TBB design
document.

Signed-off-by: Rui Miguel Silva <rui.silva@arm.com>
Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
Change-Id: Iddb1cb9c2a0324a9635e23821c210ac81dfc305d

show more ...

1...<<171172173174175176177178179180>>...358