1. 07 Apr, 2021 3 commits
  2. 06 Apr, 2021 6 commits
  3. 31 Mar, 2021 1 commit
  4. 30 Mar, 2021 1 commit
    • André Przywara's avatar
      Merge changes from topic "allwinner_h616" into integration · 8078b5c5
      André Przywara authored
      * changes:
        allwinner: H616: Add reserved-memory node to DT
        allwinner: Add Allwinner H616 SoC support
        allwinner: Add H616 SoC ID
        allwinner: Express memmap more dynamically
        allwinner: Move sunxi_cpu_power_off_self() into platforms
        allwinner: Move SEPARATE_NOBITS_REGION to platforms
        doc: allwinner: Reorder sections, document memory mapping
      8078b5c5
  5. 29 Mar, 2021 12 commits
    • bipin.ravi's avatar
      e5fa7459
    • Madhukar Pappireddy's avatar
      Merge changes from topic "rd_updates" into integration · cba9c0c2
      Madhukar Pappireddy authored
      * changes:
        plat/sgi: allow usage of secure partions on rdn2 platform
        board/rdv1mc: initialize tzc400 controllers
        plat/sgi: allow access to TZC controller on all chips
        plat/sgi: define memory regions for multi-chip platforms
        plat/sgi: allow access to nor2 flash and system registers from s-el0
        plat/sgi: define default list of memory regions for dmc620 tzc
        plat/sgi: improve macros defining cper buffer memory region
        plat/sgi: refactor DMC-620 error handling SMC function id
        plat/sgi: refactor SDEI specific macros
      cba9c0c2
    • Omkar Anand Kulkarni's avatar
      plat/sgi: allow usage of secure partions on rdn2 platform · c0d55ef7
      Omkar Anand Kulkarni authored
      
      
      Add the secure partition mmap table and the secure partition boot
      information to support secure partitions on RD-N2 platform. In addition
      to this, add the required memory region mapping for accessing the
      SoC peripherals from the secure partition.
      Signed-off-by: default avatarOmkar Anand Kulkarni <omkar.kulkarni@arm.com>
      Change-Id: I2c75760d6c8c3da3ff4885599be420e924aeaf3c
      c0d55ef7
    • Sandrine Bailleux's avatar
      Merge changes from topic "tzc400_stm32mp" into integration · 27d593ad
      Sandrine Bailleux authored
      * changes:
        stm32mp1: add TZC400 interrupt management
        stm32mp1: use TZC400 macro to describe filters
        tzc400: add support for interrupts
      27d593ad
    • Aditya Angadi's avatar
      board/rdv1mc: initialize tzc400 controllers · f97b5795
      Aditya Angadi authored
      
      
      A TZC400 controller is placed inline on DRAM channels and regulates
      the secure and non-secure accesses to both secure and non-secure
      regions of the DRAM memory. Configure each of the TZC controllers
      across the Chips.
      
      For use by secure software, configure the first chip's trustzone
      controller to protect the upper 16MB of the memory of the first DRAM
      block for secure accesses only. The other regions are configured for
      non-secure read write access. For all the remote chips, all the DRAM
      regions are allowed for non-secure read and write access.
      Signed-off-by: default avatarAditya Angadi <aditya.angadi@arm.com>
      Change-Id: I809f27eccadfc23ea0ef64e2fd87f95eb8f195c1
      f97b5795
    • Aditya Angadi's avatar
      plat/sgi: allow access to TZC controller on all chips · 21803491
      Aditya Angadi authored
      
      
      On a multi-chip platform, the boot CPU on the first chip programs the
      TZC controllers on all the remote chips. Define a memory region map for
      the TZC controllers for all the remote chips and include it in the BL2
      memory map table.
      
      In addition to this, for SPM_MM enabled multi-chip platforms, increase
      the number of mmap entries and xlat table counts for EL3 execution
      context as well because the shared RAM regions and GIC address space of
      remote chips are accessed.
      Signed-off-by: default avatarAditya Angadi <aditya.angadi@arm.com>
      Change-Id: I6f0b5fd22f9f28046451e382eef7f1f9258d88f7
      21803491
    • Aditya Angadi's avatar
      plat/sgi: define memory regions for multi-chip platforms · 05b5c417
      Aditya Angadi authored
      
      
      For multi-chip platforms, add a macro to define the memory regions on
      chip numbers >1 and its associated access permissions. These memory
      regions are marked with non-secure access.
      Signed-off-by: default avatarAditya Angadi <aditya.angadi@arm.com>
      Change-Id: If3d6180fd8ea61f45147c39d3140d694abf06617
      05b5c417
    • Thomas Abraham's avatar
      plat/sgi: allow access to nor2 flash and system registers from s-el0 · 5dae6bc7
      Thomas Abraham authored
      
      
      Allow the access of system registers and nor2 flash memory region
      from s-el0. This allows the secure parititions residing at s-el0
      to access these memory regions.
      Signed-off-by: default avatarThomas Abraham <thomas.abraham@arm.com>
      Change-Id: I3887a86770de806323fbde0d20fdc96eec6e0c3c
      5dae6bc7
    • Thomas Abraham's avatar
      plat/sgi: define default list of memory regions for dmc620 tzc · b4d548f1
      Thomas Abraham authored
      
      
      Define a default DMC-620 TZC memory region configuration and use it to
      specify the TZC memory regions on sgi575, rdn1edge and rde1edge
      platforms. The default DMC-620 TZC memory regions are defined
      considering the support for secure paritition as well.
      Signed-off-by: default avatarThomas Abraham <thomas.abraham@arm.com>
      Change-Id: Iedee3e57d0d3de5b65321444da51ec990d3702db
      b4d548f1
    • Thomas Abraham's avatar
      plat/sgi: improve macros defining cper buffer memory region · d306eb80
      Thomas Abraham authored
      
      
      Remove the 'ARM_' prefix from the macros defining the CPER buffer memory
      and replace it with 'CSS_SGI_' prefix. These macros are applicable only
      for platforms supported within plat/sgi. In addition to this, ensure
      that these macros are defined only if the RAS_EXTENSION build option is
      enabled.
      Signed-off-by: default avatarThomas Abraham <thomas.abraham@arm.com>
      Change-Id: I44df42cded18d9d3a4cb13e5c990e9ab3194daee
      d306eb80
    • Thomas Abraham's avatar
      plat/sgi: refactor DMC-620 error handling SMC function id · 513ba5c9
      Thomas Abraham authored
      
      
      The macros defining the SMC function ids for DMC-620 error handling are
      listed in the sgi_base_platform_def.h header file. But these macros are
      not applicable for all platforms supported under plat/sgi. So move these
      macro definitions to sgi_ras.c file in which these are consumed. While
      at it, remove the AArch32 and error injection function ids as these are
      unused.
      Signed-off-by: default avatarThomas Abraham <thomas.abraham@arm.com>
      Change-Id: I249b54bf4c1b1694188a1e3b297345b942f16bc9
      513ba5c9
    • Thomas Abraham's avatar
      plat/sgi: refactor SDEI specific macros · a8834474
      Thomas Abraham authored
      
      
      The macros specific to SDEI defined in the sgi_base_platform_def.h are
      not applicable for all the platforms supported by plat/sgi. So refactor
      the SDEI specific macros into a new header file and include this file on
      only on platforms it is applicable on.
      Signed-off-by: default avatarThomas Abraham <thomas.abraham@arm.com>
      Change-Id: I0cb7125334f02a21cae1837cdfd765c16ab50bf5
      a8834474
  6. 26 Mar, 2021 5 commits
  7. 25 Mar, 2021 10 commits
  8. 24 Mar, 2021 2 commits
    • johpow01's avatar
      Add Makalu ELP CPU lib · cb090c19
      johpow01 authored
      
      
      Add basic support for Makalu ELP processor core.
      Signed-off-by: default avatarJohn Powell <john.powell@arm.com>
      Change-Id: I7b1ddbb8dd43326ecb8ff188f6f8fcf239826a93
      cb090c19
    • Joanna Farley's avatar
      Merge changes I500ddbe9,I9c10dac9,I53bfff85,I06f7594d,I24bff8d4, ... into integration · 9719e19a
      Joanna Farley authored
      * changes:
        nxp lx2160a-aqds: new plat based on soc lx2160a
        NXP lx2160a-rdb: new plat based on SoC lx2160a
        nxp lx2162aqds: new plat based on soc lx2160a
        nxp: errata handling at soc level for lx2160a
        nxp: make file for loading additional ddr image
        nxp: adding support of soc lx2160a
        nxp: deflt hdr files for soc & their platforms
        nxp: platform files for bl2 and bl31 setup
        nxp: warm reset support to retain ddr content
        nxp: nv storage api on platforms
        nxp: supports two mode of trusted board boot
        nxp: fip-handler for additional fip_fuse.bin
        nxp: fip-handler for additional ddr-fip.bin
        nxp: image loader for loading fip image
        nxp: svp & sip smc handling
        nxp: psci platform functions used by lib/psci
        nxp: helper function used by plat & common code
        nxp: add data handler used by bl31
        nxp: adding the driver.mk file
        nxp-tool: for creating pbl file from bl2
        nxp: adding the smmu driver
        nxp: cot using nxp internal and mbedtls
        nxp:driver for crypto h/w accelerator caam
        nxp:add driver support for sd and emmc
        nxp:add qspi driver
        nxp: add flexspi driver support
        nxp: adding gic apis for nxp soc
        nxp: gpio driver support
        nxp: added csu driver
        nxp: driver pmu for nxp soc
        nxp: ddr driver enablement for nxp layerscape soc
        nxp: i2c driver support.
        NXP: Driver for NXP Security Monitor
        NXP: SFP driver support for NXP SoC
        NXP: Interconnect API based on ARM CCN-CCI driver
        NXP: TZC API to configure ddr region
        NXP: Timer API added to enable ARM generic timer
        nxp: add dcfg driver
        nxp:add console driver for nxp platform
        tools: add mechanism to allow platform specific image UUID
        tbbr-cot: conditional definition for the macro
        tbbr-cot: fix the issue of compiling time define
        cert_create: updated tool for platform defined certs, keys & extensions
        tbbr-tools: enable override TRUSTED_KEY_CERT
      9719e19a