- Mar 28, 2022
-
-
Thomas Abraham authored
Add 'flow_ctrl_mask_en' and 'enable_dc4' parameters for the non-secure console port. This is required to allow key inputs with WinPE. Signed-off-by:
Thomas Abraham <thomas.abraham@arm.com> Change-Id: Id5925a8edd0815cee24125ea422b1594324cb6f6
-
- Mar 27, 2022
-
-
Rename uart output file name (the file used to capture the uart output) and associated shell variables to match with the current uart configuration. TF-A boot, runtime and MM logs would be routed via secure port. The file name and shell variable associated with this port are prefixed accordingly. Likewise, uefi and OS logs would be routed via non-secure. The file name and shell variable associated with this port are also prefixed accordingly. Signed-off-by:
Rohit Mathew <rohit.mathew@arm.com> Change-Id: Ibbf2599153620c92759942f9b7e40012d1250232
-
Use secure and non-secure uarts in CSS instead of the uarts in SOC. TF-A boot, runtime and Standalone MM logs would be routed via css[0/1/2/3].pl011_s_uart_ap (secure port). UEFI and OS logs would be routed via css[0/1/2/3].pl011_ns_uart_ap (non-secure port) Additionally, as TF-A and MM logs would be routed via the same UART port, remove unused model parameters that are used for configuring uart port for capturing Standalone MM logs. Signed-off-by:
Rohit Mathew <rohit.mathew@arm.com> Change-Id: I0e8fa6c1b8e143cf316471a719c668b39734ef11
-
Use secure and non-secure uarts in CSS instead of the uarts in SOC. TF-A boot, runtime and Standalone MM logs would be routed via css.pl011_s_uart_ap (secure port). UEFI and OS logs would be routed via css.pl011_ns_uart_ap (non-secure port) Additionally, as TF-A and MM logs would be routed via the same UART port, remove unused model parameters that are used for configuring uart port for capturing Standalone MM logs. Signed-off-by:
Rohit Mathew <rohit.mathew@arm.com> Change-Id: I817290aa97d058e240c2712a1783932c37604f90
-
Use secure and non-secure uarts in CSS instead of the uarts in SOC. TF-A boot, runtime and Standalone MM logs would be routed via css.pl011_s_uart_ap (secure port). UEFI and OS logs would be routed via css.pl011_ns_uart_ap (non-secure port) Additionally, as TF-A and MM logs would be routed via the same UART port, remove unused model parameters that are used for configuring uart port for capturing Standalone MM logs. Signed-off-by:
Rohit Mathew <rohit.mathew@arm.com> Change-Id: Iddf81d0e93497cbc64c0abe02d4a18c56735c0d2
-
Use secure and non-secure uarts in CSS instead of the uarts in SOC. TF-A boot, runtime and Standalone MM logs would be routed via css.pl011_s_uart_ap (secure port). UEFI and OS logs would be routed via css.pl011_ns_uart_ap (non-secure port) Additionally, as TF-A and MM logs would be routed via the same UART port, remove unused model parameters that are used for configuring uart port for capturing Standalone MM logs. Signed-off-by:
Rohit Mathew <rohit.mathew@arm.com> Change-Id: I724e175ca23654e78369c556dd39f10c73b00c8d
-
Use secure and non-secure uarts in CSS instead of the uarts in SOC. TF-A boot, runtime and Standalone MM logs would be routed via css[0/1/2/3].pl011_uart1_ap (secure port). UEFI and OS logs would be routed via css[0/1/2/3].pl011_uart_ap (non-secure port) Additionally, as TF-A and MM logs would be routed via the same UART port, remove unused model parameters that are used for configuring uart port for capturing Standalone MM logs. Signed-off-by:
Rohit Mathew <rohit.mathew@arm.com> Change-Id: I179b3a4c3c2e394b3c3814867fea11840306ace1
-
Use secure and non-secure uarts in CSS instead of the uarts in SOC. TF-A boot, runtime and Standalone MM logs would be routed via css.pl011_uart1_ap (secure port). UEFI and OS logs would be routed via css.pl011_uart_ap (non-secure port) Additionally, as TF-A and MM logs would be routed via the same UART port, remove unused model parameters that are used for configuring uart port for capturing Standalone MM logs. Signed-off-by:
Rohit Mathew <rohit.mathew@arm.com> Change-Id: I2f413601a5b53fd33501183a9786e111dd9ab199
-
Use secure and non-secure uarts in CSS instead of the uarts in SOC. TF-A boot, runtime and Standalone MM logs would be routed via css[0/1].pl011_uart1_ap (secure port). UEFI and OS logs would be routed via css[0/1].pl011_uart_ap (non-secure port) Additionally, as TF-A and MM logs would be routed via the same UART port, remove unused model parameters that are used for configuring uart port for capturing Standalone MM logs. Signed-off-by:
Rohit Mathew <rohit.mathew@arm.com> Change-Id: I5d3ba4ddaa6b980dbb6745ecb2b6d8042917bcb6
-
Use secure and non-secure uarts in CSS instead of the uarts in SOC. TF-A boot, runtime and Standalone MM logs would be routed via css.pl011_uart1_ap (secure port). UEFI and OS logs would be routed via css.pl011_uart_ap (non-secure port) Additionally, as TF-A and MM logs would be routed via the same UART port, remove unused model parameters that are used for configuring uart port for capturing Standalone MM logs. Signed-off-by:
Rohit Mathew <rohit.mathew@arm.com> Change-Id: Ife044dd91c9308847f49082089ab7f85f7b8e3fc
-
Use secure and non-secure uarts in CSS instead of the uarts in SOC. TF-A boot, runtime and Standalone MM logs would be routed via css.pl011_uart1_ap (secure port). UEFI and OS logs would be routed via css.pl011_uart_ap (non-secure port) Additionally, as TF-A and MM logs would be routed via the same UART port, remove unused model parameters that are used for configuring uart port for capturing Standalone MM logs. Signed-off-by:
Rohit Mathew <rohit.mathew@arm.com> Change-Id: Iba08f707912147970b4a6d39be9d20eae98e72c8
-
Use secure and non-secure uarts in CSS instead of the uarts in SOC. TF-A boot, runtime and Standalone MM logs would be routed via css.pl011_uart1_ap (secure port). UEFI and OS logs would be routed via css.pl011_uart_ap (non-secure port) Additionally, as TF-A and MM logs would be routed via the same UART port, remove unused model parameters that are used for configuring uart port for capturing Standalone MM logs. Signed-off-by:
Rohit Mathew <rohit.mathew@arm.com> Change-Id: I9495b3d3a1852b87ac1c832ead5b64d917e828c6
-
For supporting ACS SBSA compiance, and to support hotplug functionality, it is required to improve the timing precisition of FVP. Add parameters for the same. Change-Id: Iec23af51ab376ee378ad12f9f6715dd5cb32d325 Signed-off-by:
Pranav Madhu <pranav.madhu@arm.com>
-
Thomas Abraham authored
The parameters used to launch the model is displayed when the model is launched. There are redundant spaces displayed in the displayed model parameters. Remove those redundant spaces. Signed-off-by:
Thomas Abraham <thomas.abraham@arm.com> Change-Id: I3eeda07accdd88ee8e5444945f94ea4a993eee21
-
- Nov 30, 2021
-
-
Vijayenthiran Subramaniam authored
FVP_RD_N2_Multichip has been renamed to FVP_RD_N2_Cfg2 starting from 11.16/25 version. Update the warning message accordingly. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: Ie29daa30ec7c58609c00f65c230a32bf568513d0
-
Vijayenthiran Subramaniam authored
RD-N2-Cfg2 platform has four TZCs (0-3) on each chip. Remove additional four TZCs (4-7) that were programmed to bypass on each chip. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: I82459dd75b6a972baaf6811545823a2b884303dc
-
- Nov 26, 2021
-
-
Replace the term "u-root" with "busybox" in the comments since booting of stage-2 kernel with busybox prompt is automated. Also update the disclaimer message, since we no longer boot stage-1 linux kernel by replacing the UEFI Shell binary. Signed-off-by:
Shriram K <shriram.k@arm.com> Change-Id: I2a3126f127ad67aca6be6906881b4acd6761235f
-
Vijayenthiran Subramaniam authored
FVP by default blocks all the transaction if trustzone controller (TZC) is not configured by software. This is an opposite behaviour to hardware which allows all access if the TZC is not configured by software. To align with hardware behaviour, use model parameters to configure TZC to be bypassed and allow all access until software reconfigures the TZC. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: Id8e4f5160df2655ee29fc182ba29b46fdd6e31e9
-
Vijayenthiran Subramaniam authored
FVP by default blocks all the transaction if trustzone controller (TZC) is not configured by software. This is an opposite behaviour to hardware which allows all access if the TZC is not configured by software. To align with hardware behaviour, use model parameters to configure TZC to be bypassed and allow all access until software reconfigures the TZC. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: I4f5c22bce7fb1f6067c394db21b5329a439dd666
-
Vijayenthiran Subramaniam authored
FVP by default blocks all the transaction if trustzone controller (TZC) is not configured by software. This is an opposite behaviour to hardware which allows all access if the TZC is not configured by software. To align with hardware behaviour, use model parameters to configure TZC to be bypassed and allow all access until software reconfigures the TZC. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: I6ee4dc2c45cca786ec178ec7403f3b161cd2417f
-
Vijayenthiran Subramaniam authored
FVP by default blocks all the transaction if trustzone controller (TZC) is not configured by software. This is an opposite behaviour to hardware which allows all access if the TZC is not configured by software. To align with hardware behaviour, use model parameters to configure TZC to be bypassed and allow all access until software reconfigures the TZC. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: Icae0f6fe9ad9e48cdfa173a55b82e81d81b7e54c
-
Vijayenthiran Subramaniam authored
FVP by default blocks all the transaction if trustzone controller (TZC) is not configured by software. This is an opposite behaviour to hardware which allows all access if the TZC is not configured by software. To align with hardware behaviour, use model parameters to configure TZC to be bypassed and allow all access until software reconfigures the TZC. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: I2ea2a29432b04b5fc9418f4480e97d6e266335b7
-
Vijayenthiran Subramaniam authored
Until 11.15 version, RD-N2-Cfg2 FVP had `mem` component which instantiated `n` number of TZC's statistically and controlled the access to number of regions required for a particular TZC during runtime. Starting from 11.16 version, the `mem` component is removed and the number of regions parameter (`tzcN.num_region`) for a particular TZC has been removed as a model parameter and is configured statically by the model. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: I7def859a4ff1df1dc83f7a17e07086aa823737e4
-
Vijayenthiran Subramaniam authored
Until 11.15 version, RD-Edmunds FVP had `mem` component which instantiated `n` number of TZC's statistically and controlled the access to number of regions required for a particular TZC during runtime. Starting from 11.16 version, the `mem` component is removed and the number of regions parameter (`tzcN.num_region`) for a particular TZC has been removed as a model parameter and is configured statically by the model. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: Id404803404ee2b834609b9ad9c395faf89b43c99
-
Vijayenthiran Subramaniam authored
Until 11.15 version, RD-N2-Cfg1 FVP had `mem` component which instantiated `n` number of TZC's statistically and controlled the access to number of regions required for a particular TZC during runtime. Starting from 11.16 version, the `mem` component is removed and the number of regions parameter (`tzcN.num_region`) for a particular TZC has been removed as a model parameter and is configured statically by the model. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: I3afb7e3ffe823a83621683962efb3d1c18f6f356
-
Vijayenthiran Subramaniam authored
Until 11.15 version, RD-N2 FVP had `mem` component which instantiated `n` number of TZC's statistically and controlled the access to number of regions required for a particular TZC during runtime. Starting from 11.16 version, the `mem` component is removed and the number of regions parameter (`tzcN.num_region`) for a particular TZC has been removed as a model parameter and is configured statically by the model. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: Ic92a94873dd3ea3546b9b8a725e8ce327742f7bc
-
Vijayenthiran Subramaniam authored
Until 11.15 version, RD-V1 FVP had `mem` component which instantiated `n` number of TZC's statistically and controlled the access to number of regions required for a particular TZC during runtime. Starting from 11.16 version, the `mem` component is removed and the number of regions parameter (`tzcN.num_region`) for a particular TZC has been removed as a model parameter and is configured statically by the model. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: If367ce0c00c7755d8e846789d3807dcc426a29dc
-
- Oct 28, 2021
-
-
Vijayenthiran Subramaniam authored
Enable linuxboot test for RD-Edmunds platform. This is an initial implementation of linuxboot for RD-Edmunds platform and not the final version. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: I344d1adbb5306b8c430e8f456d775046d3c9a392
-
Enable linuxboot test for RD-N2-CFG1 platform. This is an initial implementation of linuxboot for RD-N2-CFG1 Platform and not the final version. Signed-off-by:
Shriram K <shriram.k@arm.com> Change-Id: I91c2e0360a1aab7bb0c916ce0afd5e31b72da038
-
Enable linuxboot test for RD-N2 platform. This is an initial implementation of linuxboot for RD-N2 Platform and not the final version. Signed-off-by:
Shriram K <shriram.k@arm.com> Change-Id: I3f44c87498280d28dfb9bf24496e93e12421310c
-
Enable linuxboot test for RD-V1 platform. This is an initial implementation of linuxboot for RD-V1 platform and not the final version. Signed-off-by:
Shriram K <shriram.k@arm.com> Change-Id: Id4ee050fea1ccb671b9fbdc44f1baccb6e9d713f
-
Add a run script for testing linuxboot on RD Platforms. This script launches the FVP with an attached satadisk image that contains the stage-2 linux kernel and busybox ramdisk image. This is an initial implementation of linuxboot for RD Platforms and not the final version. Signed-off-by:
Shriram K <shriram.k@arm.com> Change-Id: I7209ae2fa1a99fc670f281eafedf2a9791c0fd09
-
- Oct 27, 2021
-
-
Add initial model startup support for RD-Edmunds platform. This supports busybox, buildroot, distro boot, secure boot and acs tests. Signed-off-by:
Tony K Nadackal <tony.nadackal@arm.com> Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: I3e2698acb63dd0a68f9af25c4cd7b4c2cb222028
-
Vijayenthiran Subramaniam authored
Refactor RD-N2-Cfg2's run_model.sh script to print the full path of Chip-0's UART logs and the full model launch command. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: Ie96ac5fbae1c96b6f26caa1a086088156a313ed9
-
Vijayenthiran Subramaniam authored
Refactor RD-N2-Cfg1's run_model.sh script to print the full path of all the UART logs and the full model launch command. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: Id8930fc9ce6a5708f91c60e060204214781ce815
-
Vijayenthiran Subramaniam authored
Refactor RD-N2's run_model.sh script to print the full path of all the UART logs and the full model launch command. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: If9c5a8883611c66725ab8de57144e8c9bf044fef
-
Vijayenthiran Subramaniam authored
Refactor RD-V1-MC's run_model.sh script to print the full path of Chip-0's UART logs and the full model launch command. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: Ied07518d0e3e14f282ac6df87153473c0a2345a2
-
Vijayenthiran Subramaniam authored
Refactor RD-V1's run_model.sh script to print the full path of all the UART logs and the full model launch command. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: I66a22594a0715ae1e3cd7a819bc6094505609d13
-
Vijayenthiran Subramaniam authored
Refactor RD-N1-Edge-X2's run_model.sh script to print the full path of Chip-0's UART logs and the full model launch command. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: Id43cadf061942b85bb46e40218d1f1e679da1615
-
Vijayenthiran Subramaniam authored
Refactor RD-E1-Edge's run_model.sh script to print the full path of all the UART logs and the full model launch command. Signed-off-by:
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Change-Id: I3839b083239ce5f56c9f10e1088500b7634e6a54
-