| 9c52e69f | 17-Dec-2019 |
Yann Gautier <yann.gautier@st.com> |
stm32mp1: set XN attribute for some areas in BL2
DTB and BL32 area should not be set as executable in MMU during BL2 execution, hence set those areas as MT_RO_DATA.
Change-Id: I87c47a1e7fda761e541e
stm32mp1: set XN attribute for some areas in BL2
DTB and BL32 area should not be set as executable in MMU during BL2 execution, hence set those areas as MT_RO_DATA.
Change-Id: I87c47a1e7fda761e541ec98a5b294588384d31db Signed-off-by: Yann Gautier <yann.gautier@st.com>
show more ...
|
| 84686ba3 | 10-Jan-2020 |
Yann Gautier <yann.gautier@st.com> |
stm32mp1: dynamically map DDR later and non-cacheable during its test
A speculative accesses to DDR could be done whereas it was not reachable and could lead to bus stall. To correct this the dynami
stm32mp1: dynamically map DDR later and non-cacheable during its test
A speculative accesses to DDR could be done whereas it was not reachable and could lead to bus stall. To correct this the dynamic mapping in MMU is used. A first mapping is done for DDR tests with MT_NON_CACHEABLE attribute, once DDR access is setup. It is then unmapped and a new mapping DDR is done with cacheable attribute (through MT_MEMORY) to speed-up BL33 (or OP-TEE) load.
The disabling of cache during DDR tests is also removed, as now useless. A call to new functions stm32mp_{,un}map_ddr_non_cacheable() is done instead.
PLAT_XLAT_TABLES_DYNAMIC is activated globally as used in BL2 and BL32.
BL33 max size is also updated to take into account the secure and shared memory areas. Those are used in OP-TEE case.
Change-Id: I22c48b4a48255ee264991c34ecbb15bfe87e67c3 Signed-off-by: Yann Gautier <yann.gautier@st.com>
show more ...
|
| e6cc3ccf | 26-Feb-2020 |
Yann Gautier <yann.gautier@st.com> |
stm32mp1: add a function to get non-secure DDR size
This function gets the DDR size from DT, and withdraws (if defined) the sizes of secure DDR and shared memory areas. This function also checks DT
stm32mp1: add a function to get non-secure DDR size
This function gets the DDR size from DT, and withdraws (if defined) the sizes of secure DDR and shared memory areas. This function also checks DT values fits the default DDR range. This non-secure memory is available for BL33 and non-secure OS.
Change-Id: I162ae5e990a0f9b6b7d07e539de029f1d61a391b Signed-off-by: Yann Gautier <yann.gautier@st.com>
show more ...
|
| 4e1ca009 | 26-Mar-2020 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "Fix warnings in porting-guide.rst" into integration |
| 735e9a0e | 26-Mar-2020 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "Tegra194: se: increase max. operation timeout to 1 second" into integration |
| 2b06610c | 26-Mar-2020 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
Fix warnings in porting-guide.rst
Fix below warnings appeared in porting-guide.rst WARNING: Title underline too short.
Change-Id: Ibc0eba0da72a53a5f9b61c49a8bf7a10b17bc3b8 Signed-off-by: Manish V B
Fix warnings in porting-guide.rst
Fix below warnings appeared in porting-guide.rst WARNING: Title underline too short.
Change-Id: Ibc0eba0da72a53a5f9b61c49a8bf7a10b17bc3b8 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 46d88f9d | 26-Mar-2020 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge changes I250c3aa1,Icf816053 into integration
* changes: changelog: introduce SPMD, add secure partition loading and tooling changelog: add debugfs functionality |
| 62c17070 | 26-Mar-2020 |
Olivier Deprez <olivier.deprez@arm.com> |
changelog: introduce SPMD, add secure partition loading and tooling
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: I250c3aa199d4e5efa68aa32bf5a1694835be56b7 |
| 22193a3e | 26-Mar-2020 |
Olivier Deprez <olivier.deprez@arm.com> |
changelog: add debugfs functionality
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: Icf8160536c249c754b3dfac6f8f49ca7ad3bb0de |
| 78707ef8 | 25-Mar-2020 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra186: increase memory mapped regions
This patch increases MAX_MMAP_REGIONS to 30 to accommodate the additional dynamic memory mapped region, during Trusty boot.
Signed-off-by: Varun Wadekar <vw
Tegra186: increase memory mapped regions
This patch increases MAX_MMAP_REGIONS to 30 to accommodate the additional dynamic memory mapped region, during Trusty boot.
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com> Change-Id: I461186a3aff5040f14715b87502fc5f1db3bea6e
show more ...
|
| 0ab49645 | 20-Mar-2020 |
Alexei Fedorov <Alexei.Fedorov@arm.com> |
FVP: Add BL2 hash calculation in BL1
This patch provides support for measured boot by adding calculation of BL2 image hash in BL1 and writing these data in TB_FW_CONFIG DTB.
Change-Id: Ic074a7ed19b
FVP: Add BL2 hash calculation in BL1
This patch provides support for measured boot by adding calculation of BL2 image hash in BL1 and writing these data in TB_FW_CONFIG DTB.
Change-Id: Ic074a7ed19b14956719c271c805b35d147b7cec1 Signed-off-by: Alexei Fedorov <Alexei.Fedorov@arm.com>
show more ...
|
| d9f405ed | 25-Mar-2020 |
Mark Dykes <mardyk01@review.trustedfirmware.org> |
Merge "Fix 'tautological-constant-compare' error" into integration |
| 4c4a1327 | 22-Mar-2020 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
Fix 'tautological-constant-compare' error
Fixed below 'tautological-constant-compare' error when building the source code with latest clang compiler <clang version 11.0.0>.
plat/common/plat_psci_co
Fix 'tautological-constant-compare' error
Fixed below 'tautological-constant-compare' error when building the source code with latest clang compiler <clang version 11.0.0>.
plat/common/plat_psci_common.c:36:2: error: converting the result of '<<' to a boolean always evaluates to true [-Werror,-Wtautological-constant-compare] PMF_STORE_ENABLE) ^ include/lib/pmf/pmf.h:28:29: note: expanded from macro 'PMF_STORE_ENABLE' PMF_STORE_ENABLE (1 << 0)
This error is observed beacuse of CASSERT placed in "PMF_DEFINE_CAPTURE_TIMESTAMP" which do below stuff: CASSERT(_flags, select_proper_config); where _flags = PMF_STORE_ENABLE (1 << 0) which always results true.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: Ifa82ea202496a23fdf1d27ea1798d1f1b583a021
show more ...
|
| 7122259d | 24-Mar-2020 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "spm: Add spci manifest binding document" into integration |
| ce8dfd28 | 24-Mar-2020 |
Mark Dykes <mardyk01@review.trustedfirmware.org> |
Merge "fconf: Clean Arm IO" into integration |
| bdc84cb5 | 24-Mar-2020 |
Mark Dykes <mardyk01@review.trustedfirmware.org> |
Merge "plat/sgi: Bump bl1 RW limit" into integration |
| 4f19121d | 24-Mar-2020 |
Mark Dykes <mardyk01@review.trustedfirmware.org> |
Merge "corstone700: updating the kernel arguments to support initramfs" into integration |
| f89eea4e | 24-Mar-2020 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "context: TPIDR_EL2 register not saved/restored" into integration |
| e515c1dd | 24-Mar-2020 |
Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com> |
corstone700: updating the kernel arguments to support initramfs
In the context of enabling initramfs this change makes the kernel arguments compatible with the initramfs requirements
Change-Id: Ifa
corstone700: updating the kernel arguments to support initramfs
In the context of enabling initramfs this change makes the kernel arguments compatible with the initramfs requirements
Change-Id: Ifa955a5790ae1398fd8ad9ca1c8272f019c121a6 Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
show more ...
|
| 0d5864d9 | 24-Mar-2020 |
Alexei Fedorov <Alexei.Fedorov@arm.com> |
Merge "spmd: skip loading of secure partitions on pre-v8.4 platforms" into integration |
| 3d1cac96 | 22-Mar-2020 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra194: se: increase max. operation timeout to 1 second
This patch increases the maximum timeout value for SE operation completion to 1 second. This takes care of some corner cases where an operat
Tegra194: se: increase max. operation timeout to 1 second
This patch increases the maximum timeout value for SE operation completion to 1 second. This takes care of some corner cases where an operation might take more time than the previous timeout value of 100ms.
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com> Change-Id: I0012448ba372a8bb0e156df7dfe49d7de6d21a68
show more ...
|
| c33ff198 | 19-Mar-2020 |
Olivier Deprez <olivier.deprez@arm.com> |
spmd: skip loading of secure partitions on pre-v8.4 platforms
When SPD=spmd and SPMD_SPM_AT_SEL2=0, that is SPMC sits at S-EL1 then there is no need for TF-A to load secure partitions individually.
spmd: skip loading of secure partitions on pre-v8.4 platforms
When SPD=spmd and SPMD_SPM_AT_SEL2=0, that is SPMC sits at S-EL1 then there is no need for TF-A to load secure partitions individually. In this configuration, SPMC handles secure partition loading at S-EL1/EL0 levels.
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I06a0d88a4811274a8c347ce57b56bb5f64e345df
show more ...
|
| 92ce719b | 23-Mar-2020 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "static_analysis" into integration
* changes: io: io_stm32image: correct possible NULL pointer dereference plat/st: correctly check pwr-regulators node nand: stm32_fmc
Merge changes from topic "static_analysis" into integration
* changes: io: io_stm32image: correct possible NULL pointer dereference plat/st: correctly check pwr-regulators node nand: stm32_fmc2_nand: correct xor_ecc.val assigned value plat/st: correct static analysis tool warning raw_nand: correct static analysis tool warning spi: stm32_qspi: correct static analysis issues
show more ...
|
| 95433894 | 18-Mar-2020 |
Yann Gautier <yann.gautier@st.com> |
io: io_stm32image: correct possible NULL pointer dereference
This issue was found with cppcheck in our downstream code: [drivers/st/io/io_stm32image.c:234] -> [drivers/st/io/io_stm32image.c:244]: (
io: io_stm32image: correct possible NULL pointer dereference
This issue was found with cppcheck in our downstream code: [drivers/st/io/io_stm32image.c:234] -> [drivers/st/io/io_stm32image.c:244]: (warning) Either the condition 'buffer!=0U' is redundant or there is possible null pointer dereference: local_buffer.
Change-Id: Ieb615b7e485dc93bbeeed4cd8bf845eb84c14ac9 Signed-off-by: Yann Gautier <yann.gautier@st.com>
show more ...
|
| e9d1e5af | 18-Mar-2020 |
Yann Gautier <yann.gautier@st.com> |
plat/st: correctly check pwr-regulators node
This warning was issued by cppcheck in our downstream code: [plat/st/common/stm32mp_dt.c:629] -> [plat/st/common/stm32mp_dt.c:634]: (warning) Identical
plat/st: correctly check pwr-regulators node
This warning was issued by cppcheck in our downstream code: [plat/st/common/stm32mp_dt.c:629] -> [plat/st/common/stm32mp_dt.c:634]: (warning) Identical condition 'node<0', second condition is always false
The second test has to check variable pwr_regulators_node.
Change-Id: I4a20c4a3ac0ef0639c2df36309d90a61c02b511f Signed-off-by: Yann Gautier <yann.gautier@st.com>
show more ...
|