Searched hist:"09 a4bcb81bc37def40ecb638b121e00e05bcbcbd" (Results 1 – 6 of 6) sorted by relevance
| /rk3399_ARM-atf/include/lib/gpt_rme/ |
| H A D | gpt_rme.h | 09a4bcb81bc37def40ecb638b121e00e05bcbcbd Wed Sep 17 15:39:15 UTC 2025 Girish Pathak <girish.pathak@arm.com> feat(cpufeat): add support for FEAT_RME_GPC2
This change adds support for FEAT_RME_GPC2 and Non-Secure-Only (NSO) Physical Address Space.
Previously, all non-secure (NS) memory was accessible to the secure world and realm world. With GPC2 and the NSO bit in the GPT, memory can now be restricted to the non-secure world only. This is enabled automatically on supported systems when ENABLE_RME is true.
Change-Id: I9b70c3a23c5ec7d83bd787d0fb3edd55934f1d05 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Girish Pathak <girish.pathak@arm.com>
|
| /rk3399_ARM-atf/lib/gpt_rme/ |
| H A D | gpt_rme_private.h | 09a4bcb81bc37def40ecb638b121e00e05bcbcbd Wed Sep 17 15:39:15 UTC 2025 Girish Pathak <girish.pathak@arm.com> feat(cpufeat): add support for FEAT_RME_GPC2
This change adds support for FEAT_RME_GPC2 and Non-Secure-Only (NSO) Physical Address Space.
Previously, all non-secure (NS) memory was accessible to the secure world and realm world. With GPC2 and the NSO bit in the GPT, memory can now be restricted to the non-secure world only. This is enabled automatically on supported systems when ENABLE_RME is true.
Change-Id: I9b70c3a23c5ec7d83bd787d0fb3edd55934f1d05 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Girish Pathak <girish.pathak@arm.com>
|
| H A D | gpt_rme.c | 09a4bcb81bc37def40ecb638b121e00e05bcbcbd Wed Sep 17 15:39:15 UTC 2025 Girish Pathak <girish.pathak@arm.com> feat(cpufeat): add support for FEAT_RME_GPC2
This change adds support for FEAT_RME_GPC2 and Non-Secure-Only (NSO) Physical Address Space.
Previously, all non-secure (NS) memory was accessible to the secure world and realm world. With GPC2 and the NSO bit in the GPT, memory can now be restricted to the non-secure world only. This is enabled automatically on supported systems when ENABLE_RME is true.
Change-Id: I9b70c3a23c5ec7d83bd787d0fb3edd55934f1d05 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Girish Pathak <girish.pathak@arm.com>
|
| /rk3399_ARM-atf/common/ |
| H A D | feat_detect.c | 09a4bcb81bc37def40ecb638b121e00e05bcbcbd Wed Sep 17 15:39:15 UTC 2025 Girish Pathak <girish.pathak@arm.com> feat(cpufeat): add support for FEAT_RME_GPC2
This change adds support for FEAT_RME_GPC2 and Non-Secure-Only (NSO) Physical Address Space.
Previously, all non-secure (NS) memory was accessible to the secure world and realm world. With GPC2 and the NSO bit in the GPT, memory can now be restricted to the non-secure world only. This is enabled automatically on supported systems when ENABLE_RME is true.
Change-Id: I9b70c3a23c5ec7d83bd787d0fb3edd55934f1d05 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Girish Pathak <girish.pathak@arm.com>
|
| /rk3399_ARM-atf/include/arch/aarch64/ |
| H A D | arch_features.h | 09a4bcb81bc37def40ecb638b121e00e05bcbcbd Wed Sep 17 15:39:15 UTC 2025 Girish Pathak <girish.pathak@arm.com> feat(cpufeat): add support for FEAT_RME_GPC2
This change adds support for FEAT_RME_GPC2 and Non-Secure-Only (NSO) Physical Address Space.
Previously, all non-secure (NS) memory was accessible to the secure world and realm world. With GPC2 and the NSO bit in the GPT, memory can now be restricted to the non-secure world only. This is enabled automatically on supported systems when ENABLE_RME is true.
Change-Id: I9b70c3a23c5ec7d83bd787d0fb3edd55934f1d05 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Girish Pathak <girish.pathak@arm.com>
|
| H A D | arch.h | 09a4bcb81bc37def40ecb638b121e00e05bcbcbd Wed Sep 17 15:39:15 UTC 2025 Girish Pathak <girish.pathak@arm.com> feat(cpufeat): add support for FEAT_RME_GPC2
This change adds support for FEAT_RME_GPC2 and Non-Secure-Only (NSO) Physical Address Space.
Previously, all non-secure (NS) memory was accessible to the secure world and realm world. With GPC2 and the NSO bit in the GPT, memory can now be restricted to the non-secure world only. This is enabled automatically on supported systems when ENABLE_RME is true.
Change-Id: I9b70c3a23c5ec7d83bd787d0fb3edd55934f1d05 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Girish Pathak <girish.pathak@arm.com>
|