| f6605337 | 25-Jan-2019 |
Antonio Nino Diaz <antonio.ninodiaz@arm.com> |
Remove duplicated definitions of linker symbols
Many parts of the code were duplicating symbols that are defined in include/common/bl_common.h. It is better to only use the definitions in this heade
Remove duplicated definitions of linker symbols
Many parts of the code were duplicating symbols that are defined in include/common/bl_common.h. It is better to only use the definitions in this header.
As all the symbols refer to virtual addresses, they have to be uintptr_t, not unsigned long. This has also been fixed in bl_common.h.
Change-Id: I204081af78326ced03fb05f69846f229d324c711 Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>
show more ...
|
| 0d845356 | 01-Feb-2019 |
Antonio Niño Díaz <antonio.ninodiaz@arm.com> |
Merge pull request #1800 from sandrine-bailleux-arm/sb/load-img-v2
Remove dead code related to LOAD_IMAGE_V2=0 |
| 48eccbc2 | 01-Feb-2019 |
Antonio Niño Díaz <antonio.ninodiaz@arm.com> |
Merge pull request #1802 from oscardagrach/master
hikey960: EDMAC: leave channel 0 as secure |
| d57d2b31 | 31-Jan-2019 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Arm platforms: Fix max size of BL33 image
The BL33 image must not go past the end of DRAM.
Change-Id: I56668ab760d82332d69a8904d125d9a055aa91d5 Signed-off-by: Sandrine Bailleux <sandrine.bailleux@a
Arm platforms: Fix max size of BL33 image
The BL33 image must not go past the end of DRAM.
Change-Id: I56668ab760d82332d69a8904d125d9a055aa91d5 Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
show more ...
|
| ece6fd2d | 31-Jan-2019 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Arm platforms: Rename PLAT_ARM_NS_IMAGE_OFFSET
PLAT_ARM_NS_IMAGE_OFFSET is in fact not an offset relative to some base address, it is an absolute address. Rename it to avoid any confusion.
Change-I
Arm platforms: Rename PLAT_ARM_NS_IMAGE_OFFSET
PLAT_ARM_NS_IMAGE_OFFSET is in fact not an offset relative to some base address, it is an absolute address. Rename it to avoid any confusion.
Change-Id: I1f7f5e8553cb267786afe7e5f3cd4d665b610d3f Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
show more ...
|
| 92d2f491 | 31-Jan-2019 |
Ying-Chun Liu (PaulLiu) <paulliu@debian.org> |
maintainers: Add maintainter for Raspberry Pi 3 platform.
This patch adds myself to co-maintainer list of Raspberry Pi 3 platform.
Signed-off-by: Ying-Chun Liu (PaulLiu) <paulliu@debian.org> |
| 968377fc | 29-Jan-2019 |
Ying-Chun Liu (PaulLiu) <paulliu@debian.org> |
rpi3: Enable SDHost driver in BL2
This patch inits SDHost in BL2 earlysetup. BL2 can start operating mmc commands to read/write MMC raw blocks.
Signed-off-by: Ying-Chun Liu (PaulLiu) <paulliu@debia
rpi3: Enable SDHost driver in BL2
This patch inits SDHost in BL2 earlysetup. BL2 can start operating mmc commands to read/write MMC raw blocks.
Signed-off-by: Ying-Chun Liu (PaulLiu) <paulliu@debian.org>
show more ...
|
| 0503adf4 | 29-Jan-2019 |
Ying-Chun Liu (PaulLiu) <paulliu@debian.org> |
rpi3: Add SDHost driver
This commit adds SDHost driver for RaspberryPi3. SDHost driver uses the GPIO driver to connect the SDCard and SDHost. By using this driver it is able to read/write raw blocks
rpi3: Add SDHost driver
This commit adds SDHost driver for RaspberryPi3. SDHost driver uses the GPIO driver to connect the SDCard and SDHost. By using this driver it is able to read/write raw blocks on SDCard.
Signed-off-by: Ying-Chun Liu (PaulLiu) <paulliu@debian.org>
show more ...
|
| f7bf9b0d | 31-Jan-2019 |
Antonio Niño Díaz <antonio.ninodiaz@arm.com> |
Merge pull request #1801 from sandrine-bailleux-arm/sb/doc
User Guide: Move ARM_PLAT_MT doc to Arm build flags |
| a01b0f16 | 12-Mar-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra: restrict non-secure PMC accesses
Platforms that do not support bpmp firmware, do not need access to the PMC block from outside of the CPU complex. The agents running on the CPU can always acc
Tegra: restrict non-secure PMC accesses
Platforms that do not support bpmp firmware, do not need access to the PMC block from outside of the CPU complex. The agents running on the CPU can always access the PMC through the EL3 exception space.
This patch restricts non-secure world access to the PMC block on such platforms.
Change-Id: I2c4318dc07ddf6407c1700595e0f4aac377ba258 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| a7f4e89b | 07-Dec-2017 |
Krishna Reddy <vdumpa@nvidia.com> |
Tegra186: memctrl: disable stream id writes for MC clients
As per the latest recommendations from the hardware team, write access needs to be disabled for APE, BPMP, NvDec and SCE clients. This patc
Tegra186: memctrl: disable stream id writes for MC clients
As per the latest recommendations from the hardware team, write access needs to be disabled for APE, BPMP, NvDec and SCE clients. This patch disables stream id register writes for these MC clients to implement those recommendations.
Change-Id: I8887c0f2cc5bc3fc5bba42074810ba5c1d3f121f Signed-off-by: Krishna Reddy <vdumpa@nvidia.com>
show more ...
|
| e6712cf5 | 23-Apr-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra: bpmp: mark device "not present" on boot timeout
This patch updates the state machine to "not present" if the bpmp firmware is not found in the system during boot. The suspend handler also che
Tegra: bpmp: mark device "not present" on boot timeout
This patch updates the state machine to "not present" if the bpmp firmware is not found in the system during boot. The suspend handler also checks now if the interface exists, before updating the internal state machine.
Reported by: Kalyani Chidambaram Vaidyanathan <kalyanic@nvidia.com>
Change-Id: If8fd7f8e412bb603944555c24826855226e7f48c Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| 6a397d1d | 20-Apr-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra210: toggle ring oscillator across cluster idle
This patch toggles the ring oscillator state across cluster idle as DFLL loses its state. We dont want garbage values being written to the pmic w
Tegra210: toggle ring oscillator across cluster idle
This patch toggles the ring oscillator state across cluster idle as DFLL loses its state. We dont want garbage values being written to the pmic when we enter cluster idle state, so enable "open loop" when we enter CC6 and restore the state to "closed loop" on exit.
Change-Id: I56f4649f57bcc651d6c415a6dcdc978e9444c97b Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| da0f4743 | 09-Apr-2018 |
kalyani chidambaram <kalyanic@nvidia.com> |
Tegra210: clear PMC_DPD registers on resume
This patch clears the PMC's DPD registers on resuming from System Suspend, for all Tegra210 platforms that support the sc7entry-fw.
Change-Id: I7881ef0a5
Tegra210: clear PMC_DPD registers on resume
This patch clears the PMC's DPD registers on resuming from System Suspend, for all Tegra210 platforms that support the sc7entry-fw.
Change-Id: I7881ef0a5f609ed28b158bc2f4016abea3c7f305 Signed-off-by: kalyani chidambaram <kalyanic@nvidia.com>
show more ...
|
| e275ae7a | 04-Apr-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra210: suspend/resume bpmp interface across System Suspend
The BPMP firmware takes some time to initialise its state on exiting System Suspend state. The CPU needs to synchronize with the BPMP du
Tegra210: suspend/resume bpmp interface across System Suspend
The BPMP firmware takes some time to initialise its state on exiting System Suspend state. The CPU needs to synchronize with the BPMP during this process to avoid any race conditions. This patch suspends and resumes the BPMP interface across a System Suspend cycle, to fix this race.
Change-Id: I82a61d12ef3eee267bdd8d4386bed23397fbfd2d Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| d37a1322 | 04-Apr-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra: bpmp: suspend/resume handlers
This patch adds suspend and resume handlers for the BPMP interface. Mark the interface as "suspended" before entering System Suspend and verify that BPMP is aliv
Tegra: bpmp: suspend/resume handlers
This patch adds suspend and resume handlers for the BPMP interface. Mark the interface as "suspended" before entering System Suspend and verify that BPMP is alive on exit.
Change-Id: I74ccbc86125079b46d06360fc4c7e8a5acfbdfb2 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| 1ffaaec9 | 29-Mar-2018 |
Stephen Wolfe <swolfe@nvidia.com> |
spd: trusty: pass max affinity level to Trusty
During System Suspend, the entire system loses its state. To allow Trusty to save/restore its context and allow its TAs to participate in the suspend p
spd: trusty: pass max affinity level to Trusty
During System Suspend, the entire system loses its state. To allow Trusty to save/restore its context and allow its TAs to participate in the suspend process, it needs to look at the max affinity level being suspended. This patch passes the max affinity level to Trusty to enable to do so.
Change-Id: If7838dae10c3f5a694baedb15ec56fbad41f2b36 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| c33473d5 | 19-Mar-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra210: skip past sc7entry-fw signature header
This patch skips past the signature header added to the sc7entry-fw binary by the previous level bootloader. Currently, the size of the header is 1KB
Tegra210: skip past sc7entry-fw signature header
This patch skips past the signature header added to the sc7entry-fw binary by the previous level bootloader. Currently, the size of the header is 1KB, so adjust the start address and the binary size at the time of copy.
Change-Id: Id0494548009749035846d54df417a960c640c8f9 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| 7350277b | 07-Mar-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra210: move sc7entry-fw inside the TZDRAM fence
This patch uses the sc7entry-fw base/size values to calculate the TZDRAM fence, so as to move sc7entry-fw inside the TZDRAM fence.
Change-Id: I91a
Tegra210: move sc7entry-fw inside the TZDRAM fence
This patch uses the sc7entry-fw base/size values to calculate the TZDRAM fence, so as to move sc7entry-fw inside the TZDRAM fence.
Change-Id: I91aeeeece857076c478cdc4c18a6ad70dc265031 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| fdc08e2e | 07-Mar-2018 |
kalyani chidambaram <kalyanic@nvidia.com> |
Tegra210: SiP handlers to allow PMC access
This patch adds SiP handler for Tegra210 platforms to service read/write requests for PMC block. None of the secure registers are accessible to the NS worl
Tegra210: SiP handlers to allow PMC access
This patch adds SiP handler for Tegra210 platforms to service read/write requests for PMC block. None of the secure registers are accessible to the NS world though.
Change-Id: I7dc1f10c6a6ee6efc642ddcfb1170fb36d3accff Signed-off-by: kalyani chidambaram <kalyanic@nvidia.com>
show more ...
|
| 2d5560f9 | 05-Mar-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra210: power off all DMA masters before System Suspend entry
This patch puts all the DMA masters in reset before starting the System Suspend sequence. This helps us make sure that there are no ro
Tegra210: power off all DMA masters before System Suspend entry
This patch puts all the DMA masters in reset before starting the System Suspend sequence. This helps us make sure that there are no rogue agents in the system trying to over-write the SC7 Entry Firmware with their own.
Change-Id: I7eb39999d229951e612fbfeb9f86c4efb8f98b5a Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| 278d599c | 01-Mar-2018 |
Mihir Joshi <mihirj@nvidia.com> |
spd: tlkd: remove unwanted assert on System Suspend entry
c_rt_ctx is used to store current SP before the system goes into suspend. The assert for its value being zero is not really necessary as the
spd: tlkd: remove unwanted assert on System Suspend entry
c_rt_ctx is used to store current SP before the system goes into suspend. The assert for its value being zero is not really necessary as the value gets over-written eventually.
This patch removes assert(tlk_ctx->c_rt_ctx == 0) from the System Suspend path, as a result.
Change-Id: If41f15e74ebbbfd82958d8e179114899b2ffb0a7 Signed-off-by: Mihir Joshi <mihirj@nvidia.com>
show more ...
|
| 3ca3c27c | 27-Feb-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra: support for System Suspend using sc7entry-fw binary
This patch adds support to enter System Suspend on Tegra210 platforms without the traditional BPMP firmware. The BPMP firmware will no long
Tegra: support for System Suspend using sc7entry-fw binary
This patch adds support to enter System Suspend on Tegra210 platforms without the traditional BPMP firmware. The BPMP firmware will no longer be supported on Tegra210 platforms and its functionality will be divided across the CPU and sc7entry-fw.
The sc7entry-fw takes care of performing the hardware sequence required to enter System Suspend (SC7 power state) from the COP. The CPU is required to load this firmware to the internal RAM of the COP and start the sequence. The CPU also make sure that the COP is off after cold boot and is only powered on when we want to start the actual System Suspend sequence.
The previous bootloader loads the firmware to TZDRAM and passes its base and size as part of the boot parameters. The EL3 layer is supposed to sanitize the parameters before touching the firmware blob.
To assist the warmboot code with the PMIC discovery, EL3 is also supposed to program PMC's scratch register #210, with appropriate values. Without these settings the warmboot code wont be able to get the device out of System Suspend.
Change-Id: I5a7b868512dbfd6cfefd55acf3978a1fd7ebf1e2 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| 93e3b0f3 | 14-Feb-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra210: remove support for cluster power down
This patch removes support for powering down a CPU cluster on Tegra210 platforms as none of them actually use it.
Change-Id: I9665634cf2b5b7b8a1b5a27
Tegra210: remove support for cluster power down
This patch removes support for powering down a CPU cluster on Tegra210 platforms as none of them actually use it.
Change-Id: I9665634cf2b5b7b8a1b5a2700cae152dc9165fe3 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| 7db077f2 | 14-Feb-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
Tegra210: support for cluster idle from the CPU
This patch adds support to enter/exit to/from cluster idle power state on Tegra210 platforms that do not load BPMP firmware.
The CPU initates the clu
Tegra210: support for cluster idle from the CPU
This patch adds support to enter/exit to/from cluster idle power state on Tegra210 platforms that do not load BPMP firmware.
The CPU initates the cluster idle sequence on the last standing CPU, by following these steps:
Entry ----- * stop other CPUs from waking up * program the PWM pinmux to tristate for OVR PMIC * program the flow controller to enter CC6 state * skip L1 $ flush during cluster power down, as L2 $ is inclusive of L1 $ on Cortex-A57 CPUs
Exit ---- * program the PWM pinmux to un-tristate for OVR PMIC * allow other CPUs to wake up
This patch also makes sure that cluster idle state entry is not enabled until CL-DVFS is ready.
Change-Id: I54cf31bf72b4a09d9bf9d2baaed6ee5a963c7808 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|