1. 13 Feb, 2020 5 commits
    • Samuel Holland's avatar
      allwinner: Implement PSCI system suspend using SCPI · e382c88e
      Samuel Holland authored
      
      
      If an SCP firmware is present and able to communicate via SCPI, then use
      that to implement CPU and system power state transitions, including CPU
      hotplug and system suspend. Otherwise, fall back to the existing CPU
      power control implementation.
      
      The last 16 KiB of SRAM A2 are reserved for the SCP firmware, and the
      SCPI shared memory is at the very end of this region (and therefore the
      end of SRAM A2). BL31 continues to start at the beginning of SRAM A2
      (not counting the ARISC exception vector area) and fills up to the
      beginning of the SCP firmware.
      
      Because the SCP firmware is not loaded adjacent to the ARISC exception
      vector area, the jump instructions used for exception handling cannot be
      included in the SCP firmware image, and must be initialized here before
      turning on the SCP.
      Signed-off-by: default avatarSamuel Holland <samuel@sholland.org>
      Change-Id: I37b9b9636f94d4125230423726f3ac5e9cdb551c
      e382c88e
    • Samuel Holland's avatar
      allwinner: Add a msgbox driver for use with SCPI · 50cabf6d
      Samuel Holland authored
      
      
      The function names follow the naming convention used by the existing
      ARM SCPI client.
      Signed-off-by: default avatarSamuel Holland <samuel@sholland.org>
      Change-Id: I543bae7d46e206eb405dbedfcf7aeba88a12ca48
      50cabf6d
    • Samuel Holland's avatar
      allwinner: Reserve and map space for the SCP firmware · 57b36632
      Samuel Holland authored
      
      
      The SCP firmware is allocated the last 16KiB of SRAM A2. This includes
      the SCPI shared memory area, which must be mapped as MT_DEVICE to
      prevent problems with cache coherency between the AP CPUs and the SCP.
      For simplicity, map the whole SCP region as MT_DEVICE.
      Signed-off-by: default avatarSamuel Holland <samuel@sholland.org>
      Change-Id: Ie39eb5ff281b8898a3c1d9748dc08755f528e2f8
      57b36632
    • Samuel Holland's avatar
      allwinner: Adjust SRAM A2 base to include the ARISC vectors · ae3fe6e3
      Samuel Holland authored
      
      
      The ARISC vector area consists of 0x4000 bytes before the beginning of
      usable SRAM. Still, it is technically a part of SRAM A2, so include it
      in the memory definition. This avoids the confusing practice of
      subtracting from the beginning of the SRAM region when referencing the
      ARISC vectors.
      Signed-off-by: default avatarSamuel Holland <samuel@sholland.org>
      Change-Id: Iae89e01aeab93560159562692e03e88306e2a1bf
      ae3fe6e3
    • Samuel Holland's avatar
      arm/css/scpi: Don't panic if the SCP fails to respond · 98367c80
      Samuel Holland authored
      
      
      Instead, pass back the error to the calling function. This allows
      platform code to fall back to another PSCI implementation if
      scpi_wait_ready() or a later SCPI command fails.
      Signed-off-by: default avatarSamuel Holland <samuel@sholland.org>
      Change-Id: Ib4411e63c2512857f09ffffe1c405358dddeb4a6
      98367c80
  2. 12 Feb, 2020 5 commits
  3. 11 Feb, 2020 3 commits
    • Sandrine Bailleux's avatar
      Merge changes from topic "lm/fconf" into integration · 21c4f56f
      Sandrine Bailleux authored
      * changes:
        arm-io: Panic in case of io setup failure
        MISRA fix: Use boolean essential type
        fconf: Add documentation
        fconf: Move platform io policies into fconf
        fconf: Add mbedtls shared heap as property
        fconf: Add TBBR disable_authentication property
        fconf: Add dynamic config DTBs info as property
        fconf: Populate properties from dtb during bl2 setup
        fconf: Load config dtb from bl1
        fconf: initial commit
      21c4f56f
    • Max Shvetsov's avatar
      Fixes ROTPK hash generation for ECDSA encryption · 698e231d
      Max Shvetsov authored
      
      
      Forced hash generation used to always generate hash via RSA encryption.
      This patch changes encryption based on ARM_ROTPK_LOCATION.
      Also removes setting KEY_ALG based on ARM_ROTPL_LOCATION - there is no
      relation between these two.
      Signed-off-by: default avatarMax Shvetsov <maksims.svecovs@arm.com>
      Change-Id: Id727d2ed06176a243719fd0adfa0cae26c325005
      698e231d
    • Olivier Deprez's avatar
      Merge changes from topic "spmd" into integration · 63aa4094
      Olivier Deprez authored
      * changes:
        SPMD: enable SPM dispatcher support
        SPMD: hook SPMD into standard services framework
        SPMD: add SPM dispatcher based upon SPCI Beta 0 spec
        SPMD: add support to run BL32 in TDRAM and BL31 in secure DRAM on Arm FVP
        SPMD: add support for an example SPM core manifest
        SPMD: add SPCI Beta 0 specification header file
      63aa4094
  4. 10 Feb, 2020 13 commits
  5. 07 Feb, 2020 14 commits