History log of /rk3399_ARM-atf/ (Results 10876 – 10900 of 18314)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
ce10f9f411-Jun-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

fiptool: Add fw_config in FIP

Added support in fiptool to include fw_config image
in FIP.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ibbd14723a4141598d9d7f6bfcf88a0ef92cf

fiptool: Add fw_config in FIP

Added support in fiptool to include fw_config image
in FIP.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ibbd14723a4141598d9d7f6bfcf88a0ef92cf87bc

show more ...

3cb84a5431-May-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

plat/arm: Rentroduce tb_fw_config device tree

Moved BL2 configuration nodes from fw_config to newly
created tb_fw_config device tree.

fw_config device tree's main usage is to hold properties shared

plat/arm: Rentroduce tb_fw_config device tree

Moved BL2 configuration nodes from fw_config to newly
created tb_fw_config device tree.

fw_config device tree's main usage is to hold properties shared
across all BLx images.
An example is the "dtb-registry" node, which contains the
information about the other device tree configurations
(load-address, size).

Also, Updated load-address of tb_fw_config which is now located
after fw_config in SRAM.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ic398c86a4d822dacd55b5e25fd41d4fe3888d79a

show more ...


lib/fconf/fconf_dyn_cfg_getter.c
plat/arm/board/a5ds/fdts/a5ds_fw_config.dts
plat/arm/board/a5ds/fdts/a5ds_tb_fw_config.dts
plat/arm/board/a5ds/platform.mk
plat/arm/board/fvp/fdts/fvp_fw_config.dts
plat/arm/board/fvp/fdts/fvp_tb_fw_config.dts
plat/arm/board/fvp/platform.mk
plat/arm/board/fvp_ve/fdts/fvp_ve_fw_config.dts
plat/arm/board/fvp_ve/fdts/fvp_ve_tb_fw_config.dts
plat/arm/board/fvp_ve/platform.mk
plat/arm/board/juno/fdts/juno_fw_config.dts
plat/arm/board/juno/fdts/juno_tb_fw_config.dts
plat/arm/board/juno/platform.mk
plat/arm/board/rddaniel/fdts/rddaniel_fw_config.dts
plat/arm/board/rddaniel/fdts/rddaniel_tb_fw_config.dts
plat/arm/board/rddaniel/platform.mk
plat/arm/board/rddanielxlr/fdts/rddanielxlr_fw_config.dts
plat/arm/board/rddanielxlr/fdts/rddanielxlr_tb_fw_config.dts
plat/arm/board/rddanielxlr/platform.mk
plat/arm/board/rde1edge/fdts/rde1edge_fw_config.dts
plat/arm/board/rde1edge/fdts/rde1edge_tb_fw_config.dts
plat/arm/board/rde1edge/platform.mk
plat/arm/board/rdn1edge/fdts/rdn1edge_fw_config.dts
plat/arm/board/rdn1edge/fdts/rdn1edge_tb_fw_config.dts
plat/arm/board/rdn1edge/platform.mk
plat/arm/board/sgi575/fdts/sgi575_fw_config.dts
plat/arm/board/sgi575/fdts/sgi575_tb_fw_config.dts
plat/arm/board/sgi575/platform.mk
plat/arm/board/sgm775/fdts/sgm775_fw_config.dts
plat/arm/board/sgm775/fdts/sgm775_tb_fw_config.dts
plat/arm/board/sgm775/platform.mk
plat/arm/board/tc0/fdts/tc0_fw_config.dts
plat/arm/board/tc0/fdts/tc0_tb_fw_config.dts
plat/arm/board/tc0/platform.mk
plat/arm/css/sgm/fdts/sgm_tb_fw_config.dts
ccf5863223-Jun-2020 Lauren Wehrmeister <lauren.wehrmeister@arm.com>

Merge changes Ifc34f2e9,Iefd58159 into integration

* changes:
Workaround for Cortex A76 erratum 1800710
Workaround for Cortex A76 erratum 1791580

5703c73723-Jun-2020 Sheetal Tigadoli <sheetal.tigadoli@broadcom.com>

Fix usage of incorrect function name

Signed-off-by: Sheetal Tigadoli <sheetal.tigadoli@broadcom.com>
Change-Id: Ic387630c096361ea9a963cde0018a0efb63e3bd2

993dc0ec23-Jun-2020 Manish Pandey <manish.pandey2@arm.com>

Merge "FFA Version interface update" into integration

ebd34bea23-Jun-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

doc: Add a binding document for COT descriptors

Added a binding document for COT descriptors which is going
to be used in order to create COT desciptors at run-time.

Signed-off-by: Manish V Badarkh

doc: Add a binding document for COT descriptors

Added a binding document for COT descriptors which is going
to be used in order to create COT desciptors at run-time.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ic54519b0e16d145cd1609274a00b137a9194e8dd

show more ...

4388f28f26-May-2020 J-Alves <joao.alves@arm.com>

FFA Version interface update

Change handler of FFA version interface:
- Return SPMD's version if the origin of the call is secure;
- Return SPMC's version if origin is non-secure.

Signed-off-by: J-

FFA Version interface update

Change handler of FFA version interface:
- Return SPMD's version if the origin of the call is secure;
- Return SPMC's version if origin is non-secure.

Signed-off-by: J-Alves <joao.alves@arm.com>
Change-Id: I0d1554da79b72b1e02da6cc363a2288119c32f44

show more ...

450e15a723-Jun-2020 Etienne Carriere <etienne.carriere@st.com>

stm32mp1: SP_MIN embeds Arm Architecture services

Embed Arch Architecture SMCCC services in stm32mp1 SP_MIN. This
service is needed by Linux kernel to setup the SMCCC conduit
used by its SCMI SMC tr

stm32mp1: SP_MIN embeds Arm Architecture services

Embed Arch Architecture SMCCC services in stm32mp1 SP_MIN. This
service is needed by Linux kernel to setup the SMCCC conduit
used by its SCMI SMC transport driver.

Change-Id: I454a7ef3048a77ab73fff945e8115b60445d5841
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>

show more ...

0754143a08-Dec-2019 Etienne Carriere <etienne.carriere@st.com>

stm32mp1: use last page of SYSRAM as SCMI shared memory

SCMI shared memory is used to exchange message payloads between
secure SCMI services and non-secure SCMI agents. It is mapped
uncached (device

stm32mp1: use last page of SYSRAM as SCMI shared memory

SCMI shared memory is used to exchange message payloads between
secure SCMI services and non-secure SCMI agents. It is mapped
uncached (device) mainly to conform to existing support in
the Linux kernel. Note that executive messages are mostly short
(few 32bit words) hence not using cache will not penalize much
performances.

Platform stm32mp1 shall configure ETZPC to harden properly the
secure and non-secure areas of the SYSRAM address space, that before
CPU accesses the shared memory when mapped non-secure.

This change defines STM32MP_SEC_SYSRAM_BASE/STM32MP_SEC_SYSRAM_SIZE and
STM32MP_NS_SYSRAM_BASE/STM32MP_NS_SYSRAM_SIZE.

Change-Id: I71ff02a359b9668ae1c5a71b5f102cf3d310f289
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>

show more ...

9864199308-Jun-2020 Etienne Carriere <etienne.carriere@st.com>

stm32mp1: check stronger the secondary CPU entry point

When using SP_min as monitor, only sp_min_warm_entrypoint() is a valid
secure entry point.

Change-Id: I440cec798e901b11a34dd482c33b2e378a8328a

stm32mp1: check stronger the secondary CPU entry point

When using SP_min as monitor, only sp_min_warm_entrypoint() is a valid
secure entry point.

Change-Id: I440cec798e901b11a34dd482c33b2e378a8328ab
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>

show more ...

e4ee1ab910-Apr-2020 Etienne Carriere <etienne.carriere@st.com>

stm32mp1: disable neon in sp_min

Disable use of Neon VFP support for platform stm32mp1 when
building with SP_MIN runtime services as these can conflict with
non-secure world use of NEON support. Thi

stm32mp1: disable neon in sp_min

Disable use of Neon VFP support for platform stm32mp1 when
building with SP_MIN runtime services as these can conflict with
non-secure world use of NEON support. This is preferred over a
systematic backup/restore of NEON context when switching
between non-secure and secure worlds.

When NEON support is disabled, this is done for both BL2 and BL32 as
build process uses common libraries built once for both binaries.

Change-Id: I4e8808dcb6ef58fc839e6f85fd6e45cfbaa34be0
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>

show more ...

5f038ac613-May-2020 Etienne Carriere <etienne.carriere@st.com>

stm32mp1: shared resources: apply registered configuration

BL32/SP_MIN configures platform security hardening from the shared
resources driver. At the end of SP_MIN initialization, all shared
resou

stm32mp1: shared resources: apply registered configuration

BL32/SP_MIN configures platform security hardening from the shared
resources driver. At the end of SP_MIN initialization, all shared
resources shall be assigned to secure or non-secure world by
drivers. A lock prevent from further change on the resource
assignation. By definition, resources not registered are assign
to non-secure world since not claimed by any component on the BL.

No functional change as all resources are currently in state
SHRES_UNREGISTERED hence assigned to non-secure world as prior
this change in stm32mp1_etzpc_early_setup() and
sp_min_platform_setup().

Change-Id: Ic41fab47216c3b8b7a6a75b8358cfcec411ed941
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>

show more ...

722999e313-May-2020 Etienne Carriere <etienne.carriere@st.com>

stm32mp1: shared resources: count GPIOZ bank pins

Get number of pins in the GPIOZ bank with helper function
fdt_get_gpio_bank_pin_count(). Save the value in RAM to prevent
parsing the FDT several ti

stm32mp1: shared resources: count GPIOZ bank pins

Get number of pins in the GPIOZ bank with helper function
fdt_get_gpio_bank_pin_count(). Save the value in RAM to prevent
parsing the FDT several time for the same information.

Change-Id: Ie68e300804461ffce09914100a7d2962116023b5
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>

show more ...

eafe0eb002-Dec-2019 Etienne Carriere <etienne.carriere@st.com>

stm32mp1: shared resources: define resource identifiers

Define enum stm32mp_shres for platform stm32mp1. The enumerated
type defines all resources that can be assigned to secure or
non-secure worlds

stm32mp1: shared resources: define resource identifiers

Define enum stm32mp_shres for platform stm32mp1. The enumerated
type defines all resources that can be assigned to secure or
non-secure worlds at run time for the platform.

Change-Id: I5de20d72735856645f1efd0993643278e8d35bcb
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>

show more ...

47cf5d3f08-Dec-2019 Etienne Carriere <etienne.carriere@st.com>

stm32mp1: introduce shared resources support

STM32MP1 SoC includes peripheral interfaces that can be assigned to
the secure world, or that can be opened to the non-secure world.

This change introdu

stm32mp1: introduce shared resources support

STM32MP1 SoC includes peripheral interfaces that can be assigned to
the secure world, or that can be opened to the non-secure world.

This change introduces the basics of a driver that manages such
resources which assignation is done at run time. It currently offers
API functions that state whether a service exposed to non-secure
world has permission to access a targeted clock or reset controller.

Change-Id: Iff20028f41586bc501085488c03546ffe31046d8
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>

show more ...

dcbfbcb502-Jun-2020 johpow01 <john.powell@arm.com>

Workaround for Cortex A76 erratum 1800710

Cortex A76 erratum 1800710 is a Cat B erratum, present in older
revisions of the Cortex A76 processor core. The workaround is to
set a bit in the ECTLR_EL1

Workaround for Cortex A76 erratum 1800710

Cortex A76 erratum 1800710 is a Cat B erratum, present in older
revisions of the Cortex A76 processor core. The workaround is to
set a bit in the ECTLR_EL1 system register, which disables allocation
of splintered pages in the L2 TLB.

This errata is explained in this SDEN:
https://static.docs.arm.com/sden885749/g/Arm_Cortex_A76_MP052_Software_Developer_Errata_Notice_v20.pdf

Signed-off-by: John Powell <john.powell@arm.com>
Change-Id: Ifc34f2e9e053dcee6a108cfb7df7ff7f497c9493

show more ...

d7b08e6929-May-2020 johpow01 <john.powell@arm.com>

Workaround for Cortex A76 erratum 1791580

Cortex A76 erratum 1791580 is a Cat B erratum present in earlier
revisions of the Cortex A76. The workaround is to set a bit in the
implementation defined C

Workaround for Cortex A76 erratum 1791580

Cortex A76 erratum 1791580 is a Cat B erratum present in earlier
revisions of the Cortex A76. The workaround is to set a bit in the
implementation defined CPUACTLR2 register, which forces atomic store
operations to write-back memory to be performed in the L1 data cache.

This errata is explained in this SDEN:
https://static.docs.arm.com/sden885749/g/Arm_Cortex_A76_MP052_Software_Developer_Errata_Notice_v20.pdf

Signed-off-by: John Powell <john.powell@arm.com>
Change-Id: Iefd58159b3f2e2286138993317b98e57dc361925

show more ...

3fbec43622-Jun-2020 Manish Pandey <manish.pandey2@arm.com>

Merge changes from topic "tegra-memctrlv2-vpr-resize-bugfix" into integration

* changes:
Tegra: sanity check NS address and size before use
Tegra: memctrl_v2: fixup sequence to resize video memo

Merge changes from topic "tegra-memctrlv2-vpr-resize-bugfix" into integration

* changes:
Tegra: sanity check NS address and size before use
Tegra: memctrl_v2: fixup sequence to resize video memory

show more ...

b667b36922-Jun-2020 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "TF-A GIC driver: Add barrier before eoi" into integration

34dae47b22-Jun-2020 Mark Dykes <mardyk01@review.trustedfirmware.org>

Merge "TF-A: Add ARMv8.5 'bti' build option" into integration

453e12c222-Jun-2020 Manish Pandey <manish.pandey2@arm.com>

Merge changes from topic "scmi-msg" into integration

* changes:
drivers/scmi-msg: smt entry points for incoming messages
drivers/scmi-msg: support for reset domain protocol
drivers/scmi-msg: s

Merge changes from topic "scmi-msg" into integration

* changes:
drivers/scmi-msg: smt entry points for incoming messages
drivers/scmi-msg: support for reset domain protocol
drivers/scmi-msg: support for clock protocol
drivers/scmi-msg: driver for processing scmi messages

show more ...

66f05b2d22-Jun-2020 Sandrine Bailleux <sandrine.bailleux@arm.com>

Merge "Fix typo in file Header guard" into integration

5eb16c4705-Jun-2020 Sandeep Tripathy <sandeep.tripathy@broadcom.com>

TF-A GIC driver: Add barrier before eoi

It is desired to have the peripheral writes completed to clear the
interrupt condition and de-assert the interrupt request to GIC before
EOI write. Failing wh

TF-A GIC driver: Add barrier before eoi

It is desired to have the peripheral writes completed to clear the
interrupt condition and de-assert the interrupt request to GIC before
EOI write. Failing which spurious interrupt will occurred.

A barrier is needed to ensure peripheral register write transfers are
complete before EOI is done.

GICv2 memory mapped DEVICE nGnR(n)E writes are ordered from core point
of view. However these writes may pass over different interconnects,
bridges, buffers leaving some rare chances for the actual write to
complete out of order.

GICv3 ICC EOI system register writes have no ordering against nGnR(n)E
memory writes as they are over different interfaces.

Hence a dsb can ensure from core no writes are issued before the previous
writes are *complete*.

Signed-off-by: Sandeep Tripathy <sandeep.tripathy@broadcom.com>
Change-Id: Ie6362009e2f91955be99dca8ece14ade7b4811d6

show more ...

71c074c522-Jun-2020 Olivier Deprez <olivier.deprez@arm.com>

Merge "Tegra: introduce support for GICv3" into integration

49fe535b02-Jun-2020 Sheetal Tigadoli <sheetal.tigadoli@broadcom.com>

Fix typo in file Header guard

Signed-off-by: Sheetal Tigadoli <sheetal.tigadoli@broadcom.com>
Change-Id: Iaf6deaeee2069720518221157edbb052bc42850a

1...<<431432433434435436437438439440>>...733