Home
last modified time | relevance | path

Searched hist:"09 a4bcb81bc37def40ecb638b121e00e05bcbcbd" (Results 1 – 6 of 6) sorted by relevance

/rk3399_ARM-atf/include/lib/gpt_rme/
H A Dgpt_rme.h09a4bcb81bc37def40ecb638b121e00e05bcbcbd Wed Sep 17 15:39:15 UTC 2025 Girish Pathak <girish.pathak@arm.com> feat(cpufeat): add support for FEAT_RME_GPC2

This change adds support for FEAT_RME_GPC2 and Non-Secure-Only (NSO)
Physical Address Space.

Previously, all non-secure (NS) memory was accessible to the secure
world and realm world. With GPC2 and the NSO bit in the GPT, memory
can now be restricted to the non-secure world only. This is enabled
automatically on supported systems when ENABLE_RME is true.

Change-Id: I9b70c3a23c5ec7d83bd787d0fb3edd55934f1d05
Signed-off-by: John Powell <john.powell@arm.com>
Signed-off-by: Girish Pathak <girish.pathak@arm.com>
/rk3399_ARM-atf/lib/gpt_rme/
H A Dgpt_rme_private.h09a4bcb81bc37def40ecb638b121e00e05bcbcbd Wed Sep 17 15:39:15 UTC 2025 Girish Pathak <girish.pathak@arm.com> feat(cpufeat): add support for FEAT_RME_GPC2

This change adds support for FEAT_RME_GPC2 and Non-Secure-Only (NSO)
Physical Address Space.

Previously, all non-secure (NS) memory was accessible to the secure
world and realm world. With GPC2 and the NSO bit in the GPT, memory
can now be restricted to the non-secure world only. This is enabled
automatically on supported systems when ENABLE_RME is true.

Change-Id: I9b70c3a23c5ec7d83bd787d0fb3edd55934f1d05
Signed-off-by: John Powell <john.powell@arm.com>
Signed-off-by: Girish Pathak <girish.pathak@arm.com>
H A Dgpt_rme.c09a4bcb81bc37def40ecb638b121e00e05bcbcbd Wed Sep 17 15:39:15 UTC 2025 Girish Pathak <girish.pathak@arm.com> feat(cpufeat): add support for FEAT_RME_GPC2

This change adds support for FEAT_RME_GPC2 and Non-Secure-Only (NSO)
Physical Address Space.

Previously, all non-secure (NS) memory was accessible to the secure
world and realm world. With GPC2 and the NSO bit in the GPT, memory
can now be restricted to the non-secure world only. This is enabled
automatically on supported systems when ENABLE_RME is true.

Change-Id: I9b70c3a23c5ec7d83bd787d0fb3edd55934f1d05
Signed-off-by: John Powell <john.powell@arm.com>
Signed-off-by: Girish Pathak <girish.pathak@arm.com>
/rk3399_ARM-atf/common/
H A Dfeat_detect.c09a4bcb81bc37def40ecb638b121e00e05bcbcbd Wed Sep 17 15:39:15 UTC 2025 Girish Pathak <girish.pathak@arm.com> feat(cpufeat): add support for FEAT_RME_GPC2

This change adds support for FEAT_RME_GPC2 and Non-Secure-Only (NSO)
Physical Address Space.

Previously, all non-secure (NS) memory was accessible to the secure
world and realm world. With GPC2 and the NSO bit in the GPT, memory
can now be restricted to the non-secure world only. This is enabled
automatically on supported systems when ENABLE_RME is true.

Change-Id: I9b70c3a23c5ec7d83bd787d0fb3edd55934f1d05
Signed-off-by: John Powell <john.powell@arm.com>
Signed-off-by: Girish Pathak <girish.pathak@arm.com>
/rk3399_ARM-atf/include/arch/aarch64/
H A Darch_features.h09a4bcb81bc37def40ecb638b121e00e05bcbcbd Wed Sep 17 15:39:15 UTC 2025 Girish Pathak <girish.pathak@arm.com> feat(cpufeat): add support for FEAT_RME_GPC2

This change adds support for FEAT_RME_GPC2 and Non-Secure-Only (NSO)
Physical Address Space.

Previously, all non-secure (NS) memory was accessible to the secure
world and realm world. With GPC2 and the NSO bit in the GPT, memory
can now be restricted to the non-secure world only. This is enabled
automatically on supported systems when ENABLE_RME is true.

Change-Id: I9b70c3a23c5ec7d83bd787d0fb3edd55934f1d05
Signed-off-by: John Powell <john.powell@arm.com>
Signed-off-by: Girish Pathak <girish.pathak@arm.com>
H A Darch.h09a4bcb81bc37def40ecb638b121e00e05bcbcbd Wed Sep 17 15:39:15 UTC 2025 Girish Pathak <girish.pathak@arm.com> feat(cpufeat): add support for FEAT_RME_GPC2

This change adds support for FEAT_RME_GPC2 and Non-Secure-Only (NSO)
Physical Address Space.

Previously, all non-secure (NS) memory was accessible to the secure
world and realm world. With GPC2 and the NSO bit in the GPT, memory
can now be restricted to the non-secure world only. This is enabled
automatically on supported systems when ENABLE_RME is true.

Change-Id: I9b70c3a23c5ec7d83bd787d0fb3edd55934f1d05
Signed-off-by: John Powell <john.powell@arm.com>
Signed-off-by: Girish Pathak <girish.pathak@arm.com>