History log of /rk3399_ARM-atf/ (Results 11251 – 11275 of 18314)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
536d906a11-Nov-2019 Oliver Swede <oli.swede@arm.com>

plat/arm/board/arm_fpga: Enable basic BL31 port for an FPGA image

This adds the minimal functions and definitions to create a basic
BL31 port for an initial FPGA image, in order for the port to be
u

plat/arm/board/arm_fpga: Enable basic BL31 port for an FPGA image

This adds the minimal functions and definitions to create a basic
BL31 port for an initial FPGA image, in order for the port to be
uploaded to one the FPGA boards operated by an internal group within
Arm, such that BL31 runs as a payload for an image.

Future changes will enable the port for a wide range of system
configurations running on the FPGA boards to ensure compatibility with
multiple FPGA images.

It is expected that this will replace the FPGA fork of the Linux kernel
bootwrapper by performing similar secure-world initialization and setup
through the use of drivers and other well-established methods, before
passing control to the kernel, which will act as the BL33 payload and
run in EL2NS.

This change introduces a basic, loadable port with the console
initialized by setting the baud rate and base address of the UART as
configured by the Zeus image.

It is a BL31-only port, and RESET_TO_BL31 is enabled to reflect this.

Signed-off-by: Oliver Swede <oli.swede@arm.com>
Change-Id: I1817ad81be00afddcdbbda1ab70eb697203178e2

show more ...

8d8d9cf226-Mar-2020 Mark Dykes <mardyk01@review.trustedfirmware.org>

Merge "FVP: Add BL2 hash calculation in BL1" into integration

5813e6ed26-Feb-2020 Yann Gautier <yann.gautier@st.com>

stm32mp1: use stm32mp_get_ddr_ns_size() function

Instead of using dt_get_ddr_size() and withdrawing the secure and shared
memory areas, use stm32mp_get_ddr_ns_size() function.

Change-Id: I5608fd787

stm32mp1: use stm32mp_get_ddr_ns_size() function

Instead of using dt_get_ddr_size() and withdrawing the secure and shared
memory areas, use stm32mp_get_ddr_ns_size() function.

Change-Id: I5608fd7873589ea0e1262ba7d2ee3e52b53d9a7d
Signed-off-by: Yann Gautier <yann.gautier@st.com>

show more ...

9c52e69f17-Dec-2019 Yann Gautier <yann.gautier@st.com>

stm32mp1: set XN attribute for some areas in BL2

DTB and BL32 area should not be set as executable in MMU during BL2
execution, hence set those areas as MT_RO_DATA.

Change-Id: I87c47a1e7fda761e541e

stm32mp1: set XN attribute for some areas in BL2

DTB and BL32 area should not be set as executable in MMU during BL2
execution, hence set those areas as MT_RO_DATA.

Change-Id: I87c47a1e7fda761e541ec98a5b294588384d31db
Signed-off-by: Yann Gautier <yann.gautier@st.com>

show more ...

84686ba310-Jan-2020 Yann Gautier <yann.gautier@st.com>

stm32mp1: dynamically map DDR later and non-cacheable during its test

A speculative accesses to DDR could be done whereas it was not reachable
and could lead to bus stall.
To correct this the dynami

stm32mp1: dynamically map DDR later and non-cacheable during its test

A speculative accesses to DDR could be done whereas it was not reachable
and could lead to bus stall.
To correct this the dynamic mapping in MMU is used.
A first mapping is done for DDR tests with MT_NON_CACHEABLE attribute,
once DDR access is setup. It is then unmapped and a new mapping DDR is done
with cacheable attribute (through MT_MEMORY) to speed-up BL33 (or OP-TEE)
load.

The disabling of cache during DDR tests is also removed, as now useless.
A call to new functions stm32mp_{,un}map_ddr_non_cacheable() is done
instead.

PLAT_XLAT_TABLES_DYNAMIC is activated globally as used in BL2 and BL32.

BL33 max size is also updated to take into account the secure and shared
memory areas. Those are used in OP-TEE case.

Change-Id: I22c48b4a48255ee264991c34ecbb15bfe87e67c3
Signed-off-by: Yann Gautier <yann.gautier@st.com>

show more ...

e6cc3ccf26-Feb-2020 Yann Gautier <yann.gautier@st.com>

stm32mp1: add a function to get non-secure DDR size

This function gets the DDR size from DT, and withdraws (if defined) the
sizes of secure DDR and shared memory areas.
This function also checks DT

stm32mp1: add a function to get non-secure DDR size

This function gets the DDR size from DT, and withdraws (if defined) the
sizes of secure DDR and shared memory areas.
This function also checks DT values fits the default DDR range.
This non-secure memory is available for BL33 and non-secure OS.

Change-Id: I162ae5e990a0f9b6b7d07e539de029f1d61a391b
Signed-off-by: Yann Gautier <yann.gautier@st.com>

show more ...

4e1ca00926-Mar-2020 Olivier Deprez <olivier.deprez@arm.com>

Merge "Fix warnings in porting-guide.rst" into integration

735e9a0e26-Mar-2020 Sandrine Bailleux <sandrine.bailleux@arm.com>

Merge "Tegra194: se: increase max. operation timeout to 1 second" into integration

2b06610c26-Mar-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

Fix warnings in porting-guide.rst

Fix below warnings appeared in porting-guide.rst
WARNING: Title underline too short.

Change-Id: Ibc0eba0da72a53a5f9b61c49a8bf7a10b17bc3b8
Signed-off-by: Manish V B

Fix warnings in porting-guide.rst

Fix below warnings appeared in porting-guide.rst
WARNING: Title underline too short.

Change-Id: Ibc0eba0da72a53a5f9b61c49a8bf7a10b17bc3b8
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

46d88f9d26-Mar-2020 Sandrine Bailleux <sandrine.bailleux@arm.com>

Merge changes I250c3aa1,Icf816053 into integration

* changes:
changelog: introduce SPMD, add secure partition loading and tooling
changelog: add debugfs functionality

62c1707026-Mar-2020 Olivier Deprez <olivier.deprez@arm.com>

changelog: introduce SPMD, add secure partition loading and tooling

Signed-off-by: Olivier Deprez <olivier.deprez@arm.com>
Change-Id: I250c3aa199d4e5efa68aa32bf5a1694835be56b7

22193a3e26-Mar-2020 Olivier Deprez <olivier.deprez@arm.com>

changelog: add debugfs functionality

Signed-off-by: Olivier Deprez <olivier.deprez@arm.com>
Change-Id: Icf8160536c249c754b3dfac6f8f49ca7ad3bb0de

78707ef825-Mar-2020 Varun Wadekar <vwadekar@nvidia.com>

Tegra186: increase memory mapped regions

This patch increases MAX_MMAP_REGIONS to 30 to accommodate the
additional dynamic memory mapped region, during Trusty boot.

Signed-off-by: Varun Wadekar <vw

Tegra186: increase memory mapped regions

This patch increases MAX_MMAP_REGIONS to 30 to accommodate the
additional dynamic memory mapped region, during Trusty boot.

Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
Change-Id: I461186a3aff5040f14715b87502fc5f1db3bea6e

show more ...

0ab4964520-Mar-2020 Alexei Fedorov <Alexei.Fedorov@arm.com>

FVP: Add BL2 hash calculation in BL1

This patch provides support for measured boot by adding calculation
of BL2 image hash in BL1 and writing these data in TB_FW_CONFIG DTB.

Change-Id: Ic074a7ed19b

FVP: Add BL2 hash calculation in BL1

This patch provides support for measured boot by adding calculation
of BL2 image hash in BL1 and writing these data in TB_FW_CONFIG DTB.

Change-Id: Ic074a7ed19b14956719c271c805b35d147b7cec1
Signed-off-by: Alexei Fedorov <Alexei.Fedorov@arm.com>

show more ...

d9f405ed25-Mar-2020 Mark Dykes <mardyk01@review.trustedfirmware.org>

Merge "Fix 'tautological-constant-compare' error" into integration

4c4a132722-Mar-2020 Manish V Badarkhe <Manish.Badarkhe@arm.com>

Fix 'tautological-constant-compare' error

Fixed below 'tautological-constant-compare' error when building the source
code with latest clang compiler <clang version 11.0.0>.

plat/common/plat_psci_co

Fix 'tautological-constant-compare' error

Fixed below 'tautological-constant-compare' error when building the source
code with latest clang compiler <clang version 11.0.0>.

plat/common/plat_psci_common.c:36:2:
error: converting the result of '<<' to a boolean always evaluates
to true [-Werror,-Wtautological-constant-compare]
PMF_STORE_ENABLE)
^
include/lib/pmf/pmf.h:28:29: note: expanded from macro 'PMF_STORE_ENABLE'
PMF_STORE_ENABLE (1 << 0)

This error is observed beacuse of CASSERT placed in
"PMF_DEFINE_CAPTURE_TIMESTAMP" which do below stuff:
CASSERT(_flags, select_proper_config);
where _flags = PMF_STORE_ENABLE (1 << 0) which always results true.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ifa82ea202496a23fdf1d27ea1798d1f1b583a021

show more ...

7122259d24-Mar-2020 Manish Pandey <manish.pandey2@arm.com>

Merge "spm: Add spci manifest binding document" into integration

ce8dfd2824-Mar-2020 Mark Dykes <mardyk01@review.trustedfirmware.org>

Merge "fconf: Clean Arm IO" into integration

bdc84cb524-Mar-2020 Mark Dykes <mardyk01@review.trustedfirmware.org>

Merge "plat/sgi: Bump bl1 RW limit" into integration

4f19121d24-Mar-2020 Mark Dykes <mardyk01@review.trustedfirmware.org>

Merge "corstone700: updating the kernel arguments to support initramfs" into integration

f89eea4e24-Mar-2020 Manish Pandey <manish.pandey2@arm.com>

Merge "context: TPIDR_EL2 register not saved/restored" into integration

e515c1dd24-Mar-2020 Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>

corstone700: updating the kernel arguments to support initramfs

In the context of enabling initramfs this change makes
the kernel arguments compatible with the initramfs requirements

Change-Id: Ifa

corstone700: updating the kernel arguments to support initramfs

In the context of enabling initramfs this change makes
the kernel arguments compatible with the initramfs requirements

Change-Id: Ifa955a5790ae1398fd8ad9ca1c8272f019c121a6
Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>

show more ...

0d5864d924-Mar-2020 Alexei Fedorov <Alexei.Fedorov@arm.com>

Merge "spmd: skip loading of secure partitions on pre-v8.4 platforms" into integration

3d1cac9622-Mar-2020 Varun Wadekar <vwadekar@nvidia.com>

Tegra194: se: increase max. operation timeout to 1 second

This patch increases the maximum timeout value for SE operation
completion to 1 second. This takes care of some corner cases where
an operat

Tegra194: se: increase max. operation timeout to 1 second

This patch increases the maximum timeout value for SE operation
completion to 1 second. This takes care of some corner cases where
an operation might take more time than the previous timeout value
of 100ms.

Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
Change-Id: I0012448ba372a8bb0e156df7dfe49d7de6d21a68

show more ...

c33ff19819-Mar-2020 Olivier Deprez <olivier.deprez@arm.com>

spmd: skip loading of secure partitions on pre-v8.4 platforms

When SPD=spmd and SPMD_SPM_AT_SEL2=0, that is SPMC sits at S-EL1
then there is no need for TF-A to load secure partitions individually.

spmd: skip loading of secure partitions on pre-v8.4 platforms

When SPD=spmd and SPMD_SPM_AT_SEL2=0, that is SPMC sits at S-EL1
then there is no need for TF-A to load secure partitions individually.
In this configuration, SPMC handles secure partition loading at
S-EL1/EL0 levels.

Signed-off-by: Olivier Deprez <olivier.deprez@arm.com>
Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: I06a0d88a4811274a8c347ce57b56bb5f64e345df

show more ...

1...<<451452453454455456457458459460>>...733