History log of /rk3399_ARM-atf/ (Results 17501 – 17525 of 18586)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
4c51badf31-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #570 from davwan01/bl31-in-dram

Add support to load BL31 in DRAM

aaa416a431-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #554 from ljerry/tf_issue_368_ter

Enable asynchronous abort exceptions during boot

4518dd9a07-Mar-2016 David Wang <david.wang@arm.com>

Add support to load BL31 in DRAM

This patch adds an option to the ARM common platforms to load BL31 in the
TZC secured DRAM instead of the default secure SRAM.

To enable this feature, set `ARM_BL31

Add support to load BL31 in DRAM

This patch adds an option to the ARM common platforms to load BL31 in the
TZC secured DRAM instead of the default secure SRAM.

To enable this feature, set `ARM_BL31_IN_DRAM` to 1 in build options.
If TSP is present, then setting this option also sets the TSP location
to DRAM and ignores the `ARM_TSP_RAM_LOCATION` build flag.

To use this feature, BL2 platform code must map in the DRAM used by
BL31. The macro ARM_MAP_BL31_SEC_DRAM is provided for this purpose.
Currently, only the FVP BL2 platform code maps in this DRAM.

Change-Id: If5f7cc9deb569cfe68353a174d4caa48acd78d67

show more ...

6b836cf922-Mar-2016 Gerald Lejeune <gerald.lejeune@st.com>

Add ISR_EL1 to crash report

Bring ISR bits definition as a mnemonic for troublershooters as well.

Signed-off-by: Gerald Lejeune <gerald.lejeune@st.com>

4ca5753522-Mar-2016 Gerald Lejeune <gerald.lejeune@st.com>

Remove DAIF bits handling macros

These macros are unused and redundant with other CPU system registers
functions.

Moreover enable_serror() function implementation may not reach its purpose
because

Remove DAIF bits handling macros

These macros are unused and redundant with other CPU system registers
functions.

Moreover enable_serror() function implementation may not reach its purpose
because it does not handle the value of SCR_EL3.EA.

Signed-off-by: Gerald Lejeune <gerald.lejeune@st.com>

show more ...

adb4fcfb22-Mar-2016 Gerald Lejeune <gerald.lejeune@st.com>

Enable asynchronous abort exceptions during boot

Asynchronous abort exceptions generated by the platform during cold boot are
not taken in EL3 unless SCR_EL3.EA is set.

Therefore EA bit is set alon

Enable asynchronous abort exceptions during boot

Asynchronous abort exceptions generated by the platform during cold boot are
not taken in EL3 unless SCR_EL3.EA is set.

Therefore EA bit is set along with RES1 bits in early BL1 and BL31 architecture
initialisation. Further write accesses to SCR_EL3 preserve these bits during
cold boot.

A build flag controls SCR_EL3.EA value to keep asynchronous abort exceptions
being trapped by EL3 after cold boot or not.

For further reference SError Interrupts are also known as asynchronous external
aborts.

On Cortex-A53 revisions below r0p2, asynchronous abort exceptions are taken in
EL3 whatever the SCR_EL3.EA value is.

Fixes arm-software/tf-issues#368

Signed-off-by: Gerald Lejeune <gerald.lejeune@st.com>

show more ...

96103d5a22-Jan-2016 Juan Castillo <juan.castillo@arm.com>

cert_create: add non-volatile counter support

This patch adds non-volatile counter support to the Certificate
Generation tool. The TBBR Chain of Trust definition in the tool
has been extended to inc

cert_create: add non-volatile counter support

This patch adds non-volatile counter support to the Certificate
Generation tool. The TBBR Chain of Trust definition in the tool
has been extended to include the counters as certificate extensions.
The counter values can be specified in the command line.

The following default counter values are specified in the build
system:

* Trusted FW Non-Volatile counter = 0
* Non-Trusted FW Non-Volatile counter = 0

These values can be overridden by the platform at build time.

Change-Id: I7ea10ee78d72748d181df4ee78a7169b3ef2720c

show more ...

6b1ca8f329-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #561 from antonio-nino-diaz-arm/an/bootwrapper

Enable preloaded BL33 alternative boot flow

85f7492529-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #560 from sandrine-bailleux-arm/sb/restructure-doc

Simplify Firmware Design document

b26c222a29-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #559 from soby-mathew/sm/cpu_ops_verbose_log

Make cpu operations warning a VERBOSE print

bda7701023-Mar-2016 Scott Branden <sbranden@broadcom.com>

Add support for %z in tf_print()

Add support for %z format specific in tf_printf() to support
printing data of type size_t

Fixes ARM-software/tf-issues#380

Signed-off-by Scott Branden <scott.brand

Add support for %z in tf_print()

Add support for %z format specific in tf_printf() to support
printing data of type size_t

Fixes ARM-software/tf-issues#380

Signed-off-by Scott Branden <scott.branden@broadcom.com>

show more ...

eaefdecd26-Jan-2016 Sandrine Bailleux <sandrine.bailleux@arm.com>

Simplify Firmware Design document

The Firmware Design document is meant to provide a general overview
of the Trusted Firmware code. Although it is useful to provide some
guidance around the responsi

Simplify Firmware Design document

The Firmware Design document is meant to provide a general overview
of the Trusted Firmware code. Although it is useful to provide some
guidance around the responsibilities of the platform layer, it should
not provide too much platform specific implementation details. Right
now, some sections are too tied to the implementation on ARM
platforms. This makes the Firmware Design document harder to digest.

This patch simplifies this aspect of the Firmware Design document.
The sections relating the platform initialisations performed by the
different BL stages have been simplified and the extra details about
the ARM platforms implementation have been moved to the Porting Guide
when appropriate.

This patch also provides various documentation fixes and additions
in the Firmware Design and Platform Porting Guide. In particular:

- Update list of SMCs supported by BL1.

- Remove MMU setup from architectural inits, as it is actually
performed by platform code.

- Similarly, move runtime services initialisation, BL2 image
initialization and BL33 execution out of the platform
initialisation paragraph.

- List SError interrupt unmasking as part of BL1 architectural
initialization.

- Mention Trusted Watchdog enabling in BL1 on ARM platforms.

- Fix order of steps in "BL2 image load and execution" section.

- Refresh section about GICv3/GICv2 drivers initialisation on
ARM platforms.

Change-Id: I32113c4ffdc26687042629cd8bbdbb34d91e3c14

show more ...

1319e7b121-Mar-2016 Soby Mathew <soby.mathew@arm.com>

Make cpu operations warning a VERBOSE print

The assembler helper function `print_revision_warning` is used when a
CPU specific operation is enabled in the debug build (e.g. an errata
workaround) but

Make cpu operations warning a VERBOSE print

The assembler helper function `print_revision_warning` is used when a
CPU specific operation is enabled in the debug build (e.g. an errata
workaround) but doesn't apply to the executing CPU's revision/part number.
However, in some cases the system integrator may want a single binary to
support multiple platforms with different IP versions, only some of which
contain a specific erratum. In this case, the warning can be emitted very
frequently when CPUs are being powered on/off.

This patch modifies this warning print behaviour so that it is emitted only
when LOG_LEVEL >= LOG_LEVEL_VERBOSE. The `debug.h` header file now contains
guard macros so that it can be included in assembly code.

Change-Id: Ic6e7a07f128dcdb8498a5bfdae920a8feeea1345

show more ...

55a8565916-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #552 from antonio-nino-diaz-arm/an/cache-dts

Add cache topology info to FVP DTBs

63a6d09a16-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #550 from antonio-nino-diaz-arm/an/dead_loops

Remove all non-configurable dead loops

1c3ea10301-Feb-2016 Antonio Nino Diaz <antonio.ninodiaz@arm.com>

Remove all non-configurable dead loops

Added a new platform porting function plat_panic_handler, to allow
platforms to handle unexpected error situations. It must be
implemented in assembly as it ma

Remove all non-configurable dead loops

Added a new platform porting function plat_panic_handler, to allow
platforms to handle unexpected error situations. It must be
implemented in assembly as it may be called before the C environment
is initialized. A default implementation is provided, which simply
spins.

Corrected all dead loops in generic code to call this function
instead. This includes the dead loop that occurs at the end of the
call to panic().

All unnecesary wfis from bl32/tsp/aarch64/tsp_exceptions.S have
been removed.

Change-Id: I67cb85f6112fa8e77bd62f5718efcef4173d8134

show more ...

5cc3483114-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #547 from ljerry/tf_issue_371

Add "size" function to IO memmap device driver

6d70bfa118-Mar-2015 Gerald Lejeune <gerald.lejeune@st.com>

Add "size" function to IO memmap device driver

Hence memmap device can be used to load an image without being wrapped in a
FIP.

Fixes arm-software/tf-issues#371

Signed-off-by: Gerald Lejeune <gera

Add "size" function to IO memmap device driver

Hence memmap device can be used to load an image without being wrapped in a
FIP.

Fixes arm-software/tf-issues#371

Signed-off-by: Gerald Lejeune <gerald.lejeune@st.com>

show more ...

195d29f311-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #546 from mtk09422/mtk-bl31-update

Mtk bl31 update

a25648e011-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #542 from sandrine-bailleux-arm/km/pt-zero

Initialize all translation table entries

a34f3bf211-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #538 from sandrine-bailleux-arm/sb/extend-memory-types

Extend memory attributes to map non-cacheable memory

b6fc25e009-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #541 from antonio-nino-diaz-arm/an/secondary-cpu-init

Initialize secondary CPUs during cold boot

5e3120d109-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #540 from antonio-nino-diaz-arm/an/porting_guide

Porting guide: Clarify API that don't follow AAPCS

0476ea6309-Mar-2016 danh-arm <dan.handley@arm.com>

Merge pull request #539 from antonio-nino-diaz-arm/an/fix-std-compilation

Compile stdlib C files individually

b99d961c16-Nov-2015 Jimmy Huang <jimmy.huang@mediatek.com>

mt8173: support big core PLL control in system suspend flow

This patch adds big core ARMPLL control in system suspend flow.

Change-Id: I27a45dbbb360f17ff0b524a125630358ee2277e2
Signed-off-by: Louis

mt8173: support big core PLL control in system suspend flow

This patch adds big core ARMPLL control in system suspend flow.

Change-Id: I27a45dbbb360f17ff0b524a125630358ee2277e2
Signed-off-by: Louis Yu <louis.yu@mediatek.com>
Signed-off-by: Jimmy Huang <jimmy.huang@mediatek.com>

show more ...

1...<<701702703704705706707708709710>>...744