History log of /rk3399_ARM-atf/ (Results 9351 – 9375 of 18314)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
b085b99009-Jun-2021 Mark Dykes <mark.dykes@arm.com>

Merge "feat(plat/mediatek/mpu): add MPU support for DSP" into integration

66bf006e08-Jun-2021 Mark Dykes <mark.dykes@arm.com>

Merge "fix(security): Set MDCR_EL3.MCCD bit" into integration

8055bbf708-Jun-2021 Joanna Farley <joanna.farley@arm.com>

Merge "docs(imx8m): update build support for imx8mq" into integration

05579daf08-Jun-2021 Heyi Guo <guoheyi@linux.alibaba.com>

style(scmi_common): add \n to warning messages

Add newline(\n) to make the message clearer when the warnings are
really triggered.

Signed-off-by: Heyi Guo <guoheyi@linux.alibaba.com>
Change-Id: I5e

style(scmi_common): add \n to warning messages

Add newline(\n) to make the message clearer when the warnings are
really triggered.

Signed-off-by: Heyi Guo <guoheyi@linux.alibaba.com>
Change-Id: I5e2574a52c9065db32ecb4d453b9b02445f69a82

show more ...

1e9428ea20-Jan-2021 Heyi Guo <guoheyi@linux.alibaba.com>

refactor(gicv3): add helper function to get the limit of SPI INTID

Add helper function gicv3_get_spi_limit() to get the value of (maximum
SPI INTID + 1), so that some duplicated code can be removed

refactor(gicv3): add helper function to get the limit of SPI INTID

Add helper function gicv3_get_spi_limit() to get the value of (maximum
SPI INTID + 1), so that some duplicated code can be removed later.

Signed-off-by: Heyi Guo <guoheyi@linux.alibaba.com>
Change-Id: I160c8a88fbb71d22790b8999a84afbfba766f5e7

show more ...

e3c07d2f07-Jun-2021 Jacky Bai <ping.bai@nxp.com>

docs(imx8m): update build support for imx8mq

Due to the small OCRAM space used for TF-A, we will
meet imx8mq build failure caused by too small RAM size.
We CANNOT support it in TF-A CI. It does NOT

docs(imx8m): update build support for imx8mq

Due to the small OCRAM space used for TF-A, we will
meet imx8mq build failure caused by too small RAM size.
We CANNOT support it in TF-A CI. It does NOT mean that
imx8mq will be dropped by NXP. NXP will still actively
maintain it in NXP official release.

Signed-off-by: Jacky Bai <ping.bai@nxp.com>
Change-Id: Iad726ffbc4eedc5f6770612bb9750986b9324ae9

show more ...

b39a130807-Jun-2021 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge changes I85a87dc9,If75df769,I55b0c910 into integration

* changes:
feat(plat/st): add STM32MP_EMMC_BOOT option
feat(drivers/st): manage boot part in io_mmc
feat(drivers/mmc): boot partiti

Merge changes I85a87dc9,If75df769,I55b0c910 into integration

* changes:
feat(plat/st): add STM32MP_EMMC_BOOT option
feat(drivers/st): manage boot part in io_mmc
feat(drivers/mmc): boot partition read support

show more ...

95d064b407-Jun-2021 Manish Pandey <manish.pandey2@arm.com>

Merge "fix(plat/marvell/armada): select correct pcie reference clock source" into integration

076bb38d07-Jun-2021 Manish Pandey <manish.pandey2@arm.com>

Merge "fix(plat/marvell/a3720/uart): fix UART parent clock rate determination" into integration

7737fdf006-Jun-2021 Joanna Farley <joanna.farley@arm.com>

Merge "docs: add threat model code owners" into integration

a5bcf82409-Nov-2020 Yann Gautier <yann.gautier@st.com>

fix(io_stm32image): invalidate cache on local buf

When retrieving data from stm32 image file, the header is removed with
a memcpy that shifts the data to overwrite the useless header for next
binary

fix(io_stm32image): invalidate cache on local buf

When retrieving data from stm32 image file, the header is removed with
a memcpy that shifts the data to overwrite the useless header for next
binary.

STM32 binary from boot device:
|-------------------------------------|
| header | payload |
|-------------------------------------|

After the memcpy:
|-------------------------------------|
| payload | remain |
|-------------------------------------|

But the remaining data after the shifted payload is still in
the cache. As it is of no use for anyone, just invalidate the cache
at this address.
This is required if the DDR is mapped secure in BL2, and the secure
access is forbidden in BL33, or else TZC-400 issues an error.

Change-Id: Ice2af3b1ca49eccb79bfc62db60437e259d344ca
Signed-off-by: Yann Gautier <yann.gautier@st.com>

show more ...

b6561c1219-Jun-2020 Yann Gautier <yann.gautier@st.com>

refactor(io_stm32image): add header size variable

A variable hdr_sz is created in stm32image_partition_read() function.
It just represents the size of the stm32 image header but it really
improves t

refactor(io_stm32image): add header size variable

A variable hdr_sz is created in stm32image_partition_read() function.
It just represents the size of the stm32 image header but it really
improves the readability of the function.

Change-Id: I95ec62a78a4b6c6a75b0d8c8aa0faef8bee424da
Signed-off-by: Yann Gautier <yann.gautier@st.com>

show more ...

c1d732d018-Nov-2019 Nicolas Le Bayon <nicolas.le.bayon@st.com>

fix(io_stm32image): uninitialized variable warning

Fixes implementation against build warning reported by GCC:

drivers/st/io/io_stm32image.c: In function ‘stm32image_partition_read’:
drivers/st/io/

fix(io_stm32image): uninitialized variable warning

Fixes implementation against build warning reported by GCC:

drivers/st/io/io_stm32image.c: In function ‘stm32image_partition_read’:
drivers/st/io/io_stm32image.c:249:6: error: ‘result’ may be used
uninitialized in this function [-Werror=maybe-uninitialized]
int result;
^~~~~~

Actually, by construction the current implementation of function
stm32image_partition_read() does not mandate result to be initialized
since it always reaches the exit point with a valid value in 'result'.
Yet, this change prevents compiler from complaining and is more robust
against future changes in the implementation.

Change-Id: I383575edb605b7535398952a5fdfc266c0068c71
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
Signed-off-by: Nicolas Le Bayon <nicolas.le.bayon@st.com>
Signed-off-by: Yann Gautier <yann.gautier@st.com>

show more ...

c20b060624-Aug-2020 Yann Gautier <yann.gautier@st.com>

refactor(plat/st): avoid fixed DT address

Device Tree address is now a parameter for dt_open_and_check() function.
This will allow better flexibility when introducing PIE and FIP.
The fdt pointer is

refactor(plat/st): avoid fixed DT address

Device Tree address is now a parameter for dt_open_and_check() function.
This will allow better flexibility when introducing PIE and FIP.
The fdt pointer is now only assigned if the given address holds
a valid device tree file. This allows removing the fdt_checked variable,
as we now check fdt is not null.

Change-Id: I04cbb2fc05c9c711ae1c77d56368dbeb6dd4b01a
Signed-off-by: Yann Gautier <yann.gautier@st.com>

show more ...

d3b0e87009-Nov-2020 Yann Gautier <yann.gautier@st.com>

refactor(plat/st): check boot device only for BL2

The boot device is now checked inside a dedicated rule, that is only
called during BL2 compilation step

Change-Id: Ie7bcd1f166285224b0c042238989a82

refactor(plat/st): check boot device only for BL2

The boot device is now checked inside a dedicated rule, that is only
called during BL2 compilation step

Change-Id: Ie7bcd1f166285224b0c042238989a82f7b6105c6
Signed-off-by: Yann Gautier <yann.gautier@st.com>

show more ...

1a2c0ff904-Jun-2021 Olivier Deprez <olivier.deprez@arm.com>

Merge changes from topic "od/cleanup-changes" into integration

* changes:
perf(spmd): omit sel1 context save if sel2 present
fix(fvp): spmc optee manifest remove SMC allowlist
fix: random typo

Merge changes from topic "od/cleanup-changes" into integration

* changes:
perf(spmd): omit sel1 context save if sel2 present
fix(fvp): spmc optee manifest remove SMC allowlist
fix: random typos in tf-a code base

show more ...

214c8a8d04-Jun-2021 Vyacheslav Yurkov <uvv.mail@gmail.com>

feat(plat/st): add STM32MP_EMMC_BOOT option

Added a new STM32MP_EMMC_BOOT option, which is used to look for SSBL in
the same eMMC boot partition TF-A booted from at a fixed 256k offset. In
case STM3

feat(plat/st): add STM32MP_EMMC_BOOT option

Added a new STM32MP_EMMC_BOOT option, which is used to look for SSBL in
the same eMMC boot partition TF-A booted from at a fixed 256k offset. In
case STM32 image header is not found, the boot process rolls back to a
GPT partition look-up scheme.

Signed-off-by: Vyacheslav Yurkov <uvv.mail@gmail.com>
Change-Id: I85a87dc9ae7f2b915ed8e584be80f4b3588efc48

show more ...

f3d2750a04-Jun-2021 Vyacheslav Yurkov <uvv.mail@gmail.com>

feat(drivers/st): manage boot part in io_mmc

Use dedicated read function for boot partition

Signed-off-by: Vyacheslav Yurkov <uvv.mail@gmail.com>
Change-Id: If75df7691fce0797205365736fc6e4e3429efdca

5014b52d30-Mar-2021 Vyacheslav Yurkov <uvv.mail@gmail.com>

feat(drivers/mmc): boot partition read support

Added a public function to read blocks from a current boot partition.
switch between partitions has to respect eMMC partition switch timing.

Signed-of

feat(drivers/mmc): boot partition read support

Added a public function to read blocks from a current boot partition.
switch between partitions has to respect eMMC partition switch timing.

Signed-off-by: Vyacheslav Yurkov <uvv.mail@gmail.com>
Change-Id: I55b0c910314253e5647486609583fd290dadd30a

show more ...

0ef419b103-Jun-2021 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "feat(plat/zynqmp): add SDEI support" into integration

4143268a14-Jul-2020 Jan Kiszka <jan.kiszka@siemens.com>

feat(plat/zynqmp): add SDEI support

Add basic SDEI support, implementing the software event 0 only for now.
This already allows hypervisors like Jailhouse to use SDEI for internal
signaling while pa

feat(plat/zynqmp): add SDEI support

Add basic SDEI support, implementing the software event 0 only for now.
This already allows hypervisors like Jailhouse to use SDEI for internal
signaling while passing the GICC through to the guest (see also IMX8).

With SDEI on, we overrun the SRAM and need to stay in DRAM. So keep SDEI
off by default.

Co-developed-by: Angelo Ruocco <angeloruocco90@gmail.com>
Signed-off-by: Angelo Ruocco <angeloruocco90@gmail.com>
Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
Change-Id: Ic0d71b4ef0978c0a34393f4e3530ed1e24a39ca2

show more ...

a49babce03-Jun-2021 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge changes from topic "stm32_bl2_io" into integration

* changes:
refactor(plat/st): remove io_dummy code for OP-TEE
refactor(plat/st): remove BL2 image loading
refactor(plat/st): rename OP-

Merge changes from topic "stm32_bl2_io" into integration

* changes:
refactor(plat/st): remove io_dummy code for OP-TEE
refactor(plat/st): remove BL2 image loading
refactor(plat/st): rename OP-TEE pager to core

show more ...

3f916a4103-Jun-2021 Yann Gautier <yann.gautier@foss.st.com>

refactor(plat/st): remove io_dummy code for OP-TEE

The io_dummy code and function calls are only used in case BL32 is TF-A
SP_min, and not OP-TEE. This code in bl2_io_storage can then be put under
#

refactor(plat/st): remove io_dummy code for OP-TEE

The io_dummy code and function calls are only used in case BL32 is TF-A
SP_min, and not OP-TEE. This code in bl2_io_storage can then be put under
#ifndef AARCH32_SP_OPTEE.

Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
Change-Id: I52787a775160b335f97547203f653419621f5147

show more ...

e1db570a11-May-2021 Yann Gautier <yann.gautier@foss.st.com>

refactor(plat/st): remove BL2 image loading

STM32MP1 does not use BL1, the loading of BL2 is done by ROM code. It is
then useless to have an entry BL2_IMAGE_ID in the policies.

Signed-off-by: Yann

refactor(plat/st): remove BL2 image loading

STM32MP1 does not use BL1, the loading of BL2 is done by ROM code. It is
then useless to have an entry BL2_IMAGE_ID in the policies.

Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
Change-Id: I464cedf588114d60522433123f8dbef32ae36818

show more ...

06c3b10019-May-2021 Yann Gautier <yann.gautier@foss.st.com>

refactor(plat/st): rename OP-TEE pager to core

OPTEE_PAGER defines are renamed OPTEE_CORE.

Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
Change-Id: I4c28d3b0a6ed843088a3ef06e3e348ce689fabde

1...<<371372373374375376377378379380>>...733