History log of /rk3399_ARM-atf/plat/ (Results 8451 – 8475 of 8950)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
91fad65514-Jun-2016 Sandrine Bailleux <sandrine.bailleux@arm.com>

ARM CSS platforms: Map flash as execute-never by default

On ARM CSS platforms, the whole flash used to be mapped as executable.
This is not required, given that the flash is used to store the BL1
an

ARM CSS platforms: Map flash as execute-never by default

On ARM CSS platforms, the whole flash used to be mapped as executable.
This is not required, given that the flash is used to store the BL1
and FIP images and:

- The FIP is not executed in place, its images are copied to RAM
and executed from there.

- BL1 is executed in place from flash but only its code needs to be
mapped as executable and platform code takes care of re-mapping
BL1's read-only section as executable.

Therefore, this patch now maps the flash as non-executable by default
on these platforms. This increases security by restricting the
executable region to what is strictly needed.

This patch also adds some comments to clarify the memory mapping
attributes on these platforms.

Change-Id: I4db3c145508bea1f43fbe0f6dcd551e1aec1ecd3

show more ...

84aaf55920-Jun-2016 Sandrine Bailleux <sandrine.bailleux@arm.com>

Add some verbose traces in arm_setup_page_tables()

This patch adds some verbose traces in the arm_setup_page_tables()
function to print the extents of the different memory regions it maps.

Change-I

Add some verbose traces in arm_setup_page_tables()

This patch adds some verbose traces in the arm_setup_page_tables()
function to print the extents of the different memory regions it maps.

Change-Id: Ia3ae1053e7ebf3579601ff9238b0e3791eb1e9e4

show more ...

0af559a808-Jul-2016 Sandrine Bailleux <sandrine.bailleux@arm.com>

ARM platforms: Add support for SEPARATE_CODE_AND_RODATA

The arm_setup_page_tables() function used to expect a single set of
addresses defining the extents of the whole read-only section, code
and re

ARM platforms: Add support for SEPARATE_CODE_AND_RODATA

The arm_setup_page_tables() function used to expect a single set of
addresses defining the extents of the whole read-only section, code
and read-only data mixed up, which was mapped as executable.

This patch changes this behaviour. arm_setup_page_tables() now
expects 2 separate sets of addresses:

- the extents of the code section;
- the extents of the read-only data section.

The code is mapped as executable, whereas the data is mapped as
execute-never. New #defines have been introduced to identify the
extents of the code and the read-only data section. Given that
all BL images except BL1 share the same memory layout and linker
script structure, these #defines are common across these images.
The slight memory layout differences in BL1 have been handled by
providing values specific to BL1.

Note that this patch also affects the Xilinx platform port, which
uses the arm_setup_page_tables() function. It has been updated
accordingly, such that the memory mappings on this platform are
unchanged. This is achieved by passing null values as the extents
of the read-only data section so that it is ignored. As a result,
the whole read-only section is still mapped as executable.

Fixes ARM-software/tf-issues#85

Change-Id: I1f95865c53ce6e253a01286ff56e0aa1161abac5

show more ...

b2c96eed20-Jun-2016 Sandrine Bailleux <sandrine.bailleux@arm.com>

ARM platforms: Include BL2U's RO section in total memory region

This patch changes the base address of the "total" Trusted SRAM region
seen by the BL2U image. It used to start just after BL2U's read

ARM platforms: Include BL2U's RO section in total memory region

This patch changes the base address of the "total" Trusted SRAM region
seen by the BL2U image. It used to start just after BL2U's read-only
section (i.e. at address BL2U_RO_LIMIT), it now starts from the base
address of the BL2U image (i.e. at address BL2U_BASE). In other words,
the "total" memory region now includes BL2U's own read-only section.

This does not change BL2U's resulting memory mappings because the
read-only section was already mapped in BL2U, it just wasn't part of
this total memory region.

Change-Id: I2da16ac842469023b41904eaa8d13ed678d65671

show more ...

af419dd615-Jun-2016 Sandrine Bailleux <sandrine.bailleux@arm.com>

ARM platforms: Restrict mapping of Trusted ROM in BL1

At the moment, on ARM platforms, BL1 maps everything from BL1_RO_BASE
to BL1_RO_LIMIT. BL1_RO_LIMIT, as defined in the porting guide, is
the max

ARM platforms: Restrict mapping of Trusted ROM in BL1

At the moment, on ARM platforms, BL1 maps everything from BL1_RO_BASE
to BL1_RO_LIMIT. BL1_RO_LIMIT, as defined in the porting guide, is
the maximum address in Trusted ROM that BL1's actual content _can_
occupy. The actual portion of ROM occupied by BL1 can be less than
that, which means that BL1 might map more Trusted ROM than it actually
needs to.

This patch changes BL1's memory mappings on ARM platforms to restrict
the region of Trusted ROM it maps. It uses the symbols exported by
the linker to figure out the actual extents of BL1's ROM footprint.

This change increases the number of page tables used on FVP by 1.
On FVP, we used to map the whole Trusted ROM. As it is 64MB large,
we used to map it as blocks of 2MB using level-2 translation table
entries. We now need a finer-grained mapping, which requires an
additional level-3 translation table.

On ARM CSS platforms, the number of translation tables is unchanged.
The BL1 image resides in flash at address 0x0BEC0000. This address is
not aligned on a 2MB-boundary so a level-3 translation table was
already required to map this memory.

Change-Id: I317a93fd99c40e70d0f13cc3d7a570f05c6c61eb

show more ...

ed81f3eb05-Jul-2016 Sandrine Bailleux <sandrine.bailleux@arm.com>

Introduce utils.h header file

This patch introduces a new header file: include/lib/utils.h.
Its purpose is to provide generic macros and helper functions that
are independent of any BL image, archit

Introduce utils.h header file

This patch introduces a new header file: include/lib/utils.h.
Its purpose is to provide generic macros and helper functions that
are independent of any BL image, architecture, platform and even
not specific to Trusted Firmware.

For now, it contains only 2 macros: ARRAY_SIZE() and
IS_POWER_OF_TWO(). These were previously defined in bl_common.h and
xlat_tables.c respectively.

bl_common.h includes utils.h to retain compatibility for platforms
that relied on bl_common.h for the ARRAY_SIZE() macro. Upstream
platform ports that use this macro have been updated to include
utils.h.

Change-Id: I960450f54134f25d1710bfbdc4184f12c049a9a9

show more ...

b5fa656318-May-2016 Sandrine Bailleux <sandrine.bailleux@arm.com>

Introduce arm_setup_page_tables() function

This patch introduces the arm_setup_page_tables() function to
set up page tables on ARM platforms. It replaces the
arm_configure_mmu_elx() functions and do

Introduce arm_setup_page_tables() function

This patch introduces the arm_setup_page_tables() function to
set up page tables on ARM platforms. It replaces the
arm_configure_mmu_elx() functions and does the same thing except
that it doesn't enable the MMU at the end. The idea is to reduce
the amount of per-EL code that is generated by the C preprocessor
by splitting the memory regions definitions and page tables creation
(which is generic) from the MMU enablement (which is the only per-EL
configuration).

As a consequence, the call to the enable_mmu_elx() function has been
moved up into the plat_arch_setup() hook. Any other ARM standard
platforms that use the functions `arm_configure_mmu_elx()` must be
updated.

Change-Id: I6f12a20ce4e5187b3849a8574aac841a136de83d

show more ...

663db20609-Jun-2016 Soby Mathew <soby.mathew@arm.com>

Derive stack alignment from CACHE_WRITEBACK_GRANULE

The per-cpu stacks should be aligned to the cache-line size and
the `declare_stack` helper in asm_macros.S macro assumed a
cache-line size of 64 b

Derive stack alignment from CACHE_WRITEBACK_GRANULE

The per-cpu stacks should be aligned to the cache-line size and
the `declare_stack` helper in asm_macros.S macro assumed a
cache-line size of 64 bytes. The platform defines the cache-line
size via CACHE_WRITEBACK_GRANULE macro. This patch modifies
`declare_stack` helper macro to derive stack alignment from the
platform defined macro.

Change-Id: I1e1b00fc8806ecc88190ed169f4c8d3dd25fe95b

show more ...

6f511c4704-Jul-2016 danh-arm <dan.handley@arm.com>

Merge pull request #651 from Xilinx/zynqmp_uart

zynqmp: Make UART selectable

10b93d7904-Jul-2016 danh-arm <dan.handley@arm.com>

Merge pull request #652 from soby-mathew/sm/pmf_psci_stat

Introduce PMF and implement PSCI STAT APIs

d75f257823-May-2016 Soby Mathew <soby.mathew@arm.com>

Enable PSCI_STAT_COUNT/RESIDENCY for ARM standard platforms

This patch enables optional PSCI functions `PSCI_STAT_COUNT` and
`PSCI_STAT_RESIDENCY` for ARM standard platforms. The optional platform
A

Enable PSCI_STAT_COUNT/RESIDENCY for ARM standard platforms

This patch enables optional PSCI functions `PSCI_STAT_COUNT` and
`PSCI_STAT_RESIDENCY` for ARM standard platforms. The optional platform
API 'translate_power_state_by_mpidr()' is implemented for the Juno
platform. 'validate_power_state()' on Juno downgrades PSCI CPU_SUSPEND
requests for the system power level to the cluster power level.
Hence, it is not suitable for validating the 'power_state' parameter
passed in a PSCI_STAT_COUNT/RESIDENCY call.

Change-Id: I9548322676fa468d22912392f2325c2a9f96e4d2

show more ...

7de544ac10-Jun-2016 Soren Brinkmann <soren.brinkmann@xilinx.com>

zynqmp: Add option to select between Cadence UARTs

Add build time option 'cadence1' for ZYNQMP_CONSOLE to select the 2nd
UART available in the SoC.

Signed-off-by: Soren Brinkmann <soren.brinkmann@x

zynqmp: Add option to select between Cadence UARTs

Add build time option 'cadence1' for ZYNQMP_CONSOLE to select the 2nd
UART available in the SoC.

Signed-off-by: Soren Brinkmann <soren.brinkmann@xilinx.com>
Acked-by: Michal Simek <michal.simek@xilinx.com>

show more ...

50f7101a15-Jun-2016 danh-arm <dan.handley@arm.com>

Merge pull request #650 from Xilinx/zynqmp-updates

Zynqmp updates

eae9d91213-Jun-2016 danh-arm <dan.handley@arm.com>

Merge pull request #646 from davwan01/dw/gicv3-wakeup

CSS: Add support to wake up the core from wfi in GICv3

419e0d2607-Dec-2015 Jens Wiklander <jens.wiklander@linaro.org>

Add support for QEMU virt ARMv8-A target

This patch adds support for the QEMU virt ARMv8-A target.

Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>


/rk3399_ARM-atf/.checkpatch.conf
/rk3399_ARM-atf/Makefile
/rk3399_ARM-atf/common/bl_common.c
/rk3399_ARM-atf/docs/plat/qemu.md
/rk3399_ARM-atf/docs/porting-guide.md
/rk3399_ARM-atf/drivers/auth/auth_mod.c
/rk3399_ARM-atf/include/lib/libfdt/fdt.h
/rk3399_ARM-atf/include/lib/libfdt/libfdt.h
/rk3399_ARM-atf/include/lib/libfdt/libfdt_env.h
/rk3399_ARM-atf/include/lib/stdlib/assert.h
/rk3399_ARM-atf/include/lib/stdlib/inttypes.h
/rk3399_ARM-atf/include/lib/stdlib/machine/_inttypes.h
/rk3399_ARM-atf/include/lib/stdlib/machine/_limits.h
/rk3399_ARM-atf/include/lib/stdlib/machine/_stdint.h
/rk3399_ARM-atf/include/lib/stdlib/machine/_types.h
/rk3399_ARM-atf/include/lib/stdlib/stddef.h
/rk3399_ARM-atf/include/lib/stdlib/stdio.h
/rk3399_ARM-atf/include/lib/stdlib/stdlib.h
/rk3399_ARM-atf/include/lib/stdlib/string.h
/rk3399_ARM-atf/include/lib/stdlib/strings.h
/rk3399_ARM-atf/include/lib/stdlib/sys/_null.h
/rk3399_ARM-atf/include/lib/stdlib/sys/_stdint.h
/rk3399_ARM-atf/include/lib/stdlib/sys/_timespec.h
/rk3399_ARM-atf/include/lib/stdlib/sys/_types.h
/rk3399_ARM-atf/include/lib/stdlib/sys/cdefs.h
/rk3399_ARM-atf/include/lib/stdlib/sys/ctype.h
/rk3399_ARM-atf/include/lib/stdlib/sys/errno.h
/rk3399_ARM-atf/include/lib/stdlib/sys/limits.h
/rk3399_ARM-atf/include/lib/stdlib/sys/stdarg.h
/rk3399_ARM-atf/include/lib/stdlib/sys/stdint.h
/rk3399_ARM-atf/include/lib/stdlib/sys/timespec.h
/rk3399_ARM-atf/include/lib/stdlib/sys/types.h
/rk3399_ARM-atf/include/lib/stdlib/sys/uuid.h
/rk3399_ARM-atf/include/lib/stdlib/time.h
/rk3399_ARM-atf/include/lib/stdlib/xlocale/_strings.h
/rk3399_ARM-atf/include/lib/stdlib/xlocale/_time.h
/rk3399_ARM-atf/include/lib/xlat_tables.h
/rk3399_ARM-atf/include/plat/common/platform.h
/rk3399_ARM-atf/lib/libfdt/fdt.c
/rk3399_ARM-atf/lib/libfdt/fdt_addresses.c
/rk3399_ARM-atf/lib/libfdt/fdt_empty_tree.c
/rk3399_ARM-atf/lib/libfdt/fdt_ro.c
/rk3399_ARM-atf/lib/libfdt/fdt_rw.c
/rk3399_ARM-atf/lib/libfdt/fdt_strerror.c
/rk3399_ARM-atf/lib/libfdt/fdt_sw.c
/rk3399_ARM-atf/lib/libfdt/fdt_wip.c
/rk3399_ARM-atf/lib/libfdt/libfdt.mk
/rk3399_ARM-atf/lib/libfdt/libfdt_internal.h
/rk3399_ARM-atf/lib/stdlib/stdlib.mk
qemu/aarch64/plat_helpers.S
qemu/dt.c
qemu/include/plat_macros.S
qemu/include/platform_def.h
qemu/platform.mk
qemu/qemu_bl1_setup.c
qemu/qemu_bl2_setup.c
qemu/qemu_bl31_setup.c
qemu/qemu_common.c
qemu/qemu_gic.c
qemu/qemu_io_storage.c
qemu/qemu_pm.c
qemu/qemu_private.h
qemu/topology.c
/rk3399_ARM-atf/tools/fip_create/Makefile
68b105ae07-Jun-2016 David Wang <david.wang@arm.com>

CSS: Add support to wake up the core from wfi in GICv3

In GICv3 mode, the non secure group1 interrupts are signalled via the
FIQ line in EL3. To support waking up from CPU_SUSPEND to standby on
thes

CSS: Add support to wake up the core from wfi in GICv3

In GICv3 mode, the non secure group1 interrupts are signalled via the
FIQ line in EL3. To support waking up from CPU_SUSPEND to standby on
these systems, EL3 should route FIQ to EL3 temporarily before wfi and
restore the original setting after resume. This patch makes this change
for the CSS platforms in the `css_cpu_standby` psci pm ops hook.

Change-Id: Ibf3295d16e2f08da490847c1457bc839e1bac144

show more ...

2ba6895907-Jun-2016 Mirela Simonovic <mirela.simonovic@aggios.com>

zynqmp: pm: Added NODE_IPI_APU slave node ID in pm_defs.h

NODE_IPI_APU is the node ID of APU's IPI device. If APU should be
woken-up on an IPI from FPD power down, this node shall be set as
the wake

zynqmp: pm: Added NODE_IPI_APU slave node ID in pm_defs.h

NODE_IPI_APU is the node ID of APU's IPI device. If APU should be
woken-up on an IPI from FPD power down, this node shall be set as
the wake-up source upon suspend.

Signed-off-by: Mirela Simonovic <mirela.simonovic@aggios.com>

show more ...

11ec6c5903-Jun-2016 danh-arm <dan.handley@arm.com>

Merge pull request #641 from antonio-nino-diaz-arm/an/fvp-set-nv-ctr

Implement plat_set_nv_ctr for FVP platforms

c47a078403-Jun-2016 danh-arm <dan.handley@arm.com>

Merge pull request #640 from sandrine-bailleux-arm/sb/fix-syntax-error

Fix a syntax error in plat/arm/common/aarch64/arm_common.c

aed634fe03-Jun-2016 danh-arm <dan.handley@arm.com>

Merge pull request #637 from yatharth-arm/yk/genfw-1134

Add support for ARM Cortex-A73 MPCore Processor

b4127c1f03-Jun-2016 Sandrine Bailleux <sandrine.bailleux@arm.com>

Fix a syntax error

Building TF with ERROR_DEPRECATED=1 fails because of a missing
semi-column. This patch fixes this syntax error.

Change-Id: I98515840ce74245b0a0215805f85c8e399094f68

fe7de03520-May-2016 Antonio Nino Diaz <antonio.ninodiaz@arm.com>

Implement plat_set_nv_ctr for FVP platforms

Replaced placeholder implementation of plat_set_nv_ctr for FVP
platforms by a working one.

On FVP, the mapping of region DEVICE2 has been changed from RO

Implement plat_set_nv_ctr for FVP platforms

Replaced placeholder implementation of plat_set_nv_ctr for FVP
platforms by a working one.

On FVP, the mapping of region DEVICE2 has been changed from RO to RW
to prevent exceptions when writing to the NV counter, which is
contained in this region.

Change-Id: I56a49631432ce13905572378cbdf106f69c82f57

show more ...

2460ac1809-Feb-2016 Yatharth Kochar <yatharth.kochar@arm.com>

Add support for ARM Cortex-A73 MPCore Processor

This patch adds ARM Cortex-A73 MPCore Processor support
in the CPU specific operations framework. It also includes
this support for the Base FVP port.

Add support for ARM Cortex-A73 MPCore Processor

This patch adds ARM Cortex-A73 MPCore Processor support
in the CPU specific operations framework. It also includes
this support for the Base FVP port.

Change-Id: I0e26b594f2ec1d28eb815db9810c682e3885716d

show more ...

a29f50c929-May-2016 Soren Brinkmann <soren.brinkmann@xilinx.com>

zynqmp: Remove double ';'

Signed-off-by: Soren Brinkmann <soren.brinkmann@xilinx.com>

55eae0d429-May-2016 Soren Brinkmann <soren.brinkmann@xilinx.com>

zynqmp: Fix spelling of endianness

Signed-off-by: Soren Brinkmann <soren.brinkmann@xilinx.com>

1...<<331332333334335336337338339340>>...358