History log of /rk3399_ARM-atf/ (Results 10851 – 10875 of 18314)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
e555787b21-Jun-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

doc: Update BL1 and BL2 boot flow

Updated the document for BL1 and BL2 boot flow to capture
below changes made in FCONF

1. Loading of fw_config and tb_fw_config images by BL1.
2. Population of fw_c

doc: Update BL1 and BL2 boot flow

Updated the document for BL1 and BL2 boot flow to capture
below changes made in FCONF

1. Loading of fw_config and tb_fw_config images by BL1.
2. Population of fw_config and tb_fw_config by BL2.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ifea5c61d520ff1de834c279ce1759b53448303ba

show more ...

7fb9bcd830-May-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

plat/arm: Use only fw_config between bl2 and bl31

Passed the address of fw_config instead of soc_fw_config
as arg1 to BL31 from BL2 for ARM fvp platform.

BL31 then retrieve load-address of other de

plat/arm: Use only fw_config between bl2 and bl31

Passed the address of fw_config instead of soc_fw_config
as arg1 to BL31 from BL2 for ARM fvp platform.

BL31 then retrieve load-address of other device trees
from fw_config device tree.

Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ib7e9581cd765d76111dcc3b7e0dafc12503c83c1

show more ...

99bcae5e26-Jun-2020 Sandrine Bailleux <sandrine.bailleux@arm.com>

Merge changes from topic "fw_config_handoff" into integration

* changes:
doc: Update memory layout for firmware configuration area
plat/arm: Increase size of firmware configuration area
plat/a

Merge changes from topic "fw_config_handoff" into integration

* changes:
doc: Update memory layout for firmware configuration area
plat/arm: Increase size of firmware configuration area
plat/arm: Load and populate fw_config and tb_fw_config
fconf: Handle error from fconf_load_config
plat/arm: Update the fw_config load call and populate it's information
fconf: Allow fconf to load additional firmware configuration
fconf: Clean confused naming between TB_FW and FW_CONFIG
tbbr/dualroot: Add fw_config image in chain of trust
cert_tool: Update cert_tool for fw_config image support
fiptool: Add fw_config in FIP
plat/arm: Rentroduce tb_fw_config device tree

show more ...


docs/design/firmware-design.rst
drivers/arm/css/scp/css_bom_bootloader.c
drivers/auth/dualroot/cot.c
drivers/auth/tbbr/tbbr_cot_bl1.c
drivers/auth/tbbr/tbbr_cot_common.c
include/drivers/arm/css/css_scp.h
include/drivers/auth/tbbr_cot_common.h
include/export/common/tbbr/tbbr_img_def_exp.h
include/lib/fconf/fconf.h
include/lib/fconf/fconf_dyn_cfg_getter.h
include/plat/arm/common/arm_def.h
include/plat/arm/common/plat_arm.h
include/tools_share/firmware_image_package.h
include/tools_share/tbbr_oid.h
lib/debugfs/devfip.c
lib/fconf/fconf.c
lib/fconf/fconf.mk
lib/fconf/fconf_dyn_cfg_getter.c
plat/arm/board/a5ds/fdts/a5ds_fw_config.dts
plat/arm/board/a5ds/fdts/a5ds_tb_fw_config.dts
plat/arm/board/a5ds/include/platform_def.h
plat/arm/board/a5ds/platform.mk
plat/arm/board/corstone700/include/platform_def.h
plat/arm/board/fvp/fdts/fvp_fw_config.dts
plat/arm/board/fvp/fdts/fvp_tb_fw_config.dts
plat/arm/board/fvp/include/platform_def.h
plat/arm/board/fvp/platform.mk
plat/arm/board/fvp_ve/fdts/fvp_ve_fw_config.dts
plat/arm/board/fvp_ve/fdts/fvp_ve_tb_fw_config.dts
plat/arm/board/fvp_ve/include/platform_def.h
plat/arm/board/fvp_ve/platform.mk
plat/arm/board/juno/fdts/juno_fw_config.dts
plat/arm/board/juno/fdts/juno_tb_fw_config.dts
plat/arm/board/juno/include/platform_def.h
plat/arm/board/juno/platform.mk
plat/arm/board/rddaniel/fdts/rddaniel_fw_config.dts
plat/arm/board/rddaniel/fdts/rddaniel_tb_fw_config.dts
plat/arm/board/rddaniel/platform.mk
plat/arm/board/rddanielxlr/fdts/rddanielxlr_fw_config.dts
plat/arm/board/rddanielxlr/fdts/rddanielxlr_tb_fw_config.dts
plat/arm/board/rddanielxlr/platform.mk
plat/arm/board/rde1edge/fdts/rde1edge_fw_config.dts
plat/arm/board/rde1edge/fdts/rde1edge_tb_fw_config.dts
plat/arm/board/rde1edge/platform.mk
plat/arm/board/rdn1edge/fdts/rdn1edge_fw_config.dts
plat/arm/board/rdn1edge/fdts/rdn1edge_tb_fw_config.dts
plat/arm/board/rdn1edge/platform.mk
plat/arm/board/sgi575/fdts/sgi575_fw_config.dts
plat/arm/board/sgi575/fdts/sgi575_tb_fw_config.dts
plat/arm/board/sgi575/platform.mk
plat/arm/board/sgm775/fdts/sgm775_fw_config.dts
plat/arm/board/sgm775/fdts/sgm775_tb_fw_config.dts
plat/arm/board/sgm775/platform.mk
plat/arm/board/tc0/fdts/tc0_fw_config.dts
plat/arm/board/tc0/fdts/tc0_tb_fw_config.dts
plat/arm/board/tc0/platform.mk
plat/arm/common/arm_bl1_setup.c
plat/arm/common/arm_bl2_setup.c
plat/arm/common/arm_bl31_setup.c
plat/arm/common/arm_dyn_cfg.c
plat/arm/common/fconf/arm_fconf_io.c
plat/arm/common/sp_min/arm_sp_min_setup.c
plat/arm/css/sgm/fdts/sgm_tb_fw_config.dts
plat/arm/css/sgm/include/sgm_base_platform_def.h
tools/cert_create/include/dualroot/cot.h
tools/cert_create/include/tbbr/tbb_ext.h
tools/cert_create/src/dualroot/cot.c
tools/cert_create/src/tbbr/tbb_cert.c
tools/cert_create/src/tbbr/tbb_ext.c
tools/fiptool/tbbr_config.c
0e0521bd02-Jun-2020 johpow01 <john.powell@arm.com>

Workaround for Neoverse N1 erratum 1800710

Neoverse N1 erratum 1800710 is a Cat B erratum, present in older
revisions of the Neoverse N1 processor core. The workaround is to
set a bit in the ECTLR_

Workaround for Neoverse N1 erratum 1800710

Neoverse N1 erratum 1800710 is a Cat B erratum, present in older
revisions of the Neoverse N1 processor core. The workaround is to
set a bit in the ECTLR_EL1 system register, which disables allocation
of splintered pages in the L2 TLB.

This errata is explained in this SDEN:
https://static.docs.arm.com/sden885747/f/Arm_Neoverse_N1_MP050_Software_Developer_Errata_Notice_v21.pdf

Signed-off-by: John Powell <john.powell@arm.com>
Change-Id: Ie5b15c8bc3235e474a06a57c3ec70684361857a6

show more ...

24cdbb2225-Jun-2020 Mark Dykes <mardyk01@review.trustedfirmware.org>

Merge "stm32mp1: use last page of SYSRAM as SCMI shared memory" into integration

3c20ad5625-Jun-2020 Mark Dykes <mardyk01@review.trustedfirmware.org>

Merge "stm32mp1: SP_MIN embeds Arm Architecture services" into integration

33fe493a25-Jun-2020 Mark Dykes <mardyk01@review.trustedfirmware.org>

Merge "Redirect security incident report to TrustedFirmware.org" into integration

f112d3ef25-Jun-2020 Mark Dykes <mardyk01@review.trustedfirmware.org>

Merge "doc: Add a binding document for COT descriptors" into integration

3df38b6525-Jun-2020 Mark Dykes <mardyk01@review.trustedfirmware.org>

Merge "plat/fvp: Dynamic description of clock freq" into integration

ea96076125-Jun-2020 Mark Dykes <mardyk01@review.trustedfirmware.org>

Merge "fconf: Extract Timer clock freq from HW_CONFIG dtb" into integration

f998d15a25-Jun-2020 Lauren Wehrmeister <lauren.wehrmeister@arm.com>

Merge "Workaround for Cortex A77 erratum 1800714" into integration

62bbfe8203-Jun-2020 johpow01 <john.powell@arm.com>

Workaround for Cortex A77 erratum 1800714

Cortex A77 erratum 1800714 is a Cat B erratum, present in older
revisions of the Cortex A77 processor core. The workaround is to
set a bit in the ECTLR_EL1

Workaround for Cortex A77 erratum 1800714

Cortex A77 erratum 1800714 is a Cat B erratum, present in older
revisions of the Cortex A77 processor core. The workaround is to
set a bit in the ECTLR_EL1 system register, which disables allocation
of splintered pages in the L2 TLB.

Since this is the first errata workaround implemented for Cortex A77,
this patch also adds the required cortex_a77_reset_func in the file
lib/cpus/aarch64/cortex_a77.S.

This errata is explained in this SDEN:
https://static.docs.arm.com/101992/0010/Arm_Cortex_A77_MP074_Software_Developer_Errata_Notice_v10.pdf

Signed-off-by: John Powell <john.powell@arm.com>
Change-Id: I844de34ee1bd0268f80794e2d9542de2f30fd3ad

show more ...

089fc62413-Jun-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

doc: Update memory layout for firmware configuration area

Captured the increase in firmware configuration area from
4KB to 8kB in memory layout document. Updated the documentation
to provide details

doc: Update memory layout for firmware configuration area

Captured the increase in firmware configuration area from
4KB to 8kB in memory layout document. Updated the documentation
to provide details about fw_config separately.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ifbec443ced479301be65827b49ff4fe447e9109f

show more ...

ce4ca1a809-Jun-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

plat/arm: Increase size of firmware configuration area

Increased the size of firmware configuration area to accommodate
all configs.

Updated maximum size of following bootloaders due to increase
in

plat/arm: Increase size of firmware configuration area

Increased the size of firmware configuration area to accommodate
all configs.

Updated maximum size of following bootloaders due to increase
in firmware configs size and addition of the code in the BL2.

1. Increased maximum size of BL2 for Juno platform in no
optimisation case.
2. Reduced maximum size of BL31 for fvp and Juno platform.
3. Reduced maximum size of BL32 for Juno platform.

Change-Id: Ifba0564df0d1fe86175bed9fae87fdcf013b1831
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

8286967511-Jun-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

plat/arm: Load and populate fw_config and tb_fw_config

Modified the code to do below changes:

1. Load tb_fw_config along with fw_config by BL1.
2. Populate fw_config device tree information in the

plat/arm: Load and populate fw_config and tb_fw_config

Modified the code to do below changes:

1. Load tb_fw_config along with fw_config by BL1.
2. Populate fw_config device tree information in the
BL1 to load tb_fw_config.
3. In BL2, populate fw_config information to retrieve
the address of tb_fw_config and then tb_fw_config
gets populated using retrieved address.
4. Avoid processing of configuration file in case of error
value returned from "fw_config_load" function.
5. Updated entrypoint information for BL2 image so
that it's arg0 should point to fw_config address.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Change-Id: Ife6f7b673a074e7f544ee3d1bda7645fd5b2886c

show more ...

c275ea1825-Jun-2020 Sandrine Bailleux <sandrine.bailleux@arm.com>

Merge "Fix usage of incorrect function name" into integration

156dbdd410-Jun-2020 laurenw-arm <lauren.wehrmeister@arm.com>

plat/fvp: Dynamic description of clock freq

Query clock frequency in runtime using FCONF getter API

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: Ie6a8a62d8d190b9994feff

plat/fvp: Dynamic description of clock freq

Query clock frequency in runtime using FCONF getter API

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: Ie6a8a62d8d190b9994feffb167a1d48829913e9b

show more ...

8aa374b906-Feb-2020 laurenw-arm <lauren.wehrmeister@arm.com>

fconf: Extract Timer clock freq from HW_CONFIG dtb

Extract Timer clock frequency from the timer node in
HW_CONFIG dtb. The first timer is a per-core architected timer attached
to a GIC to deliver it

fconf: Extract Timer clock freq from HW_CONFIG dtb

Extract Timer clock frequency from the timer node in
HW_CONFIG dtb. The first timer is a per-core architected timer attached
to a GIC to deliver its per-processor interrupts via PPIs.

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: I2f4b27c48e4c79208dab9f03c768d9221ba6ca86

show more ...

1367cc1922-Jun-2020 Sandrine Bailleux <sandrine.bailleux@arm.com>

Redirect security incident report to TrustedFirmware.org

All projects under the TrustedFirmware.org project now use the same
security incident process, therefore update the disclosure/vulnerability

Redirect security incident report to TrustedFirmware.org

All projects under the TrustedFirmware.org project now use the same
security incident process, therefore update the disclosure/vulnerability
reporting information in the TF-A documentation.

------------------------------------------------------------------------
/!\ IMPORTANT /!\

Please note that the email address to send these reports to has changed.
Please do *not* use trusted-firmware-security@arm.com anymore.

Similarly, the PGP key provided to encrypt emails to the security email
alias has changed as well. Please do *not* use the former one provided
in the TF-A source tree. It is recommended to remove it from your
keyring to avoid any mistake. Please use the new key provided on
TrustedFirmware.org from now on.
------------------------------------------------------------------------

Change-Id: I14eb61017ab99182f1c45d1e156b96d5764934c1
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>

show more ...

f17ae7b011-Jun-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

fconf: Handle error from fconf_load_config

Updated 'fconf_load_config' function to return
the error.
Error from 'fconf_load_config" gets handled
by BL1 in subsequent patches.

Signed-off-by: Manish

fconf: Handle error from fconf_load_config

Updated 'fconf_load_config' function to return
the error.
Error from 'fconf_load_config" gets handled
by BL1 in subsequent patches.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I4360f4df850e355b5762bb2d9666eb285101bc68

show more ...

fe6fd3e411-Jun-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

plat/arm: Update the fw_config load call and populate it's information

Modified the code to do below changes:

1. Migrates the Arm platforms to the API changes introduced in the
previous patches

plat/arm: Update the fw_config load call and populate it's information

Modified the code to do below changes:

1. Migrates the Arm platforms to the API changes introduced in the
previous patches by fixing the fconf_load_config() call.
2. Retrieve dynamically the address of tb_fw_config using fconf
getter api which is subsequently used to write mbedTLS heap
address and BL2 hash data in the tb_fw_config DTB.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Change-Id: I3c9d9345dcbfb99127c61d5589b4aa1532fbf4be

show more ...

9233dd0911-Jun-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

fconf: Allow fconf to load additional firmware configuration

Modified the `fconf_load_config` function so that it can
additionally support loading of tb_fw_config along with
fw_config.

Signed-off-b

fconf: Allow fconf to load additional firmware configuration

Modified the `fconf_load_config` function so that it can
additionally support loading of tb_fw_config along with
fw_config.

Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ie060121d367ba12e3fcac5b8ff169d415a5c2bcd

show more ...

04e0697331-May-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

fconf: Clean confused naming between TB_FW and FW_CONFIG

Cleaned up confused naming between TB_FW and FW_CONFIG.

Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Signed-off-by: Manish V B

fconf: Clean confused naming between TB_FW and FW_CONFIG

Cleaned up confused naming between TB_FW and FW_CONFIG.

Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I9e9f6e6ca076d38fee0388f97d370431ae067f08

show more ...

243875ea11-Jun-2020 Louis Mayencourt <louis.mayencourt@arm.com>

tbbr/dualroot: Add fw_config image in chain of trust

fw_config image is authenticated using secure boot framework by
adding it into the single root and dual root chain of trust.

The COT for fw_conf

tbbr/dualroot: Add fw_config image in chain of trust

fw_config image is authenticated using secure boot framework by
adding it into the single root and dual root chain of trust.

The COT for fw_config image looks as below:

+------------------+ +-------------------+
| ROTPK/ROTPK Hash |------>| Trusted Boot fw |
+------------------+ | Certificate |
| (Auth Image) |
/+-------------------+
/ |
/ |
/ |
/ |
L v
+------------------+ +-------------------+
| fw_config hash |------>| fw_config |
| | | (Data Image) |
+------------------+ +-------------------+

Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I08fc8ee95c29a95bb140c807dd06e772474c7367

show more ...

9b3ca9b111-Jun-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

cert_tool: Update cert_tool for fw_config image support

Updated cert_tool to add hash information of fw_config image into
the existing "trusted boot fw" certificate.

Signed-off-by: Manish V Badarkh

cert_tool: Update cert_tool for fw_config image support

Updated cert_tool to add hash information of fw_config image into
the existing "trusted boot fw" certificate.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I720319225925806a2a9f50a1ac9c8a464be975f0

show more ...

1...<<431432433434435436437438439440>>...733