- Jan 27, 2022
-
-
Manish Pandey2 authored
-
Manish Pandey2 authored
* changes: refactor(st-clock): update STGEN management feat(st-clock): assign clocks to the correct BL feat(st-clock): do not refcount on non-secure clocks in bl32 feat(st-clock): define secure and non-secure gate clocks refactor(stm32mp1): remove unused refcount helper functions fix(stm32mp1): add missing debug.h refactor(st-clock): use refcnt instead of secure status
-
Lionel Debieve authored
Rework STGEN config function, and move it to stm32mp_clkfunc.c file. Change-Id: I7784a79c486d1b8811f6f8d123e49ea34899e9b6 Signed-off-by:
Lionel Debieve <lionel.debieve@st.com> Signed-off-by:
Yann Gautier <yann.gautier@st.com>
-
Yann Gautier authored
Some clocks are only required in BL2, like boot devices clocks: FMC, QSPI. Some clocks are only used in BL32: Timers, devices that need special care for independent reset. Change-Id: Id4ba99afeea5095f419a86f7dc6423192c628d82 Signed-off-by:
Etienne Carriere <etienne.carriere@st.com> Signed-off-by:
Yann Gautier <yann.gautier@st.com>
-
Yann Gautier authored
This change removes reference counting support in clock gating implementation for clocks that rely on non-secure only RCC resources. As RCC registers are accessed straight by non-secure world for these clocks, secure world cannot safely store the clock state and even disabling such clock from secure world can jeopardize the non-secure world clock management framework and drivers. As a consequence, for such clocks, stm32_clock_enable() forces the clock ON without any increment of a refcount and stm32_clock_disable() does not disable the clock. Change-Id: I0cc159b36a25dbc8676f05edf2668ae63c640537 Signed-off-by:
Etienne Carriere <etienne.carriere@st.com>
-
Yann Gautier authored
Array stm32mp1_clk_gate[] defines the clock resources. This change add a secure attribute to the clock: secure upon RCC[TZEN] (SEC), secure upon RCC[TZEN] and RCC[MCKPROT] (MKP) or always accessible from non-secure (N_S). At init, lookup clock tree to check if any of the secure clocks is derived from PLL3 in which case PLL3 shall be secure. Note that this change does not grow byte size of stm32mp1_clk_gate[]. Change-Id: I933d8a30007f3c72f755aa1ef6d7e6bcfabbfa9e Signed-off-by:
Etienne Carriere <etienne.carriere@st.com> Signed-off-by:
Yann Gautier <yann.gautier@st.com>
-
Yann Gautier authored
Remove stm32mp_incr_shrefcnt(), stm32mp_decr_shrefcnt(), stm32mp_incr_refcnt() and stm32mp_decr_refcnt() that are unused. The file is then just removed. Change-Id: I09ee23c02317df5d8f71cbc355d3ed4a67ce2749 Signed-off-by:
Etienne Carriere <etienne.carriere@st.com> Signed-off-by:
Yann Gautier <yann.gautier@st.com>
-
Yann Gautier authored
Due to stm32mp_shres_helpers.h removal, the debug.h header is no more included. It should then be added to stm32mp1_boot_device.c. Signed-off-by:
Yann Gautier <yann.gautier@st.com> Change-Id: I397911ac05fdff464c010cf3b2e04320a781b4aa
-
Yann Gautier authored
Rework the internal functions __stm32mp1_clk_enable/disable to check for reference count instead of secure status for a clock. Some functions now unused can be removed. Change-Id: Ie4359110d7144229f85c961dcd5a019222c3fd25 Signed-off-by:
Yann Gautier <yann.gautier@st.com>
-
Madhukar Pappireddy authored
* changes: feat(stm32mp1): add support for building the FWU feature feat(stm32mp1): add logic to pass the boot index to the Update Agent feat(stm32mp1): add support for reading the metadata partition feat(stm32mp1): add logic to select the images to be booted feat(stm32mp1): add GUID's for identifying firmware images to be booted feat(stm32mp1): add GUID values for updatable images feat(fwu): add platform hook for getting the boot index feat(fwu): simplify the assert to check for fwu init feat(fwu): add a function to pass metadata structure to platforms feat(partition): add a function to identify a partition by GUID feat(partition): copy the partition GUID into the partition structure feat(partition): make provision to store partition GUID value feat(partition): cleanup partition and gpt headers feat(fwu): add basic definitions for GUID handling feat(fwu): pass a const metadata structure to platform routines build(changelog): add a valid scope for partition code
-
Sughosh Ganu authored
Add support for enabling the FWU multi bank boot feature on the platform. Currently, this feature is supported on the STM32MP157C-DK2 board, which boots off a uSD card. Also, support has been enabled when booting from a FIP image. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: Ia69e858461e2daf599d41d66d7ff2ccae0c341c2
-
Sughosh Ganu authored
With the FWU Multi Bank update feature, the platform can boot from one of multiple banks(partitions). Pass the value of bank from which the platform has booted as boot index to the Update Agent. The Update Agent will match this boot index value against the active_index field in the metadata, and update the metadata if there is a mismatch. Fow now, the mechanism to pass the boot index is platform specific. On the STM32MP1 platform, the boot index value is passed through a memorey mapped TAMP register on the SoC. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: I0aa665ff9c1db95be8ae19ed8de6d866587d6850
-
Sughosh Ganu authored
Add support for reading the FWU metadata partition. The metadata partition stores information on the current active bank along with information on all the FWU updatable images on the platform. This information is then used to identify the image to be booted. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: I66bc5ac718c21a49c504e698b5b1f5c4daed2d08
-
Sughosh Ganu authored
With the FWU multi bank boot feature enabled, the platform can boot from one of the multiple banks(partitions) containing the firmware images. The bank whose firmware components are to be booted is read from the FWU metadata structure -- the image to be booted is thus derived by reading the metadata. Read the metadata and set the image spec of the corresponding image type to point to the partition from which the image is to be booted. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: I3dfdc7e9202859e917ec4e1f7d1855aad42c6b70
-
Sughosh Ganu authored
Add GUID's for identifying the firmware image type. With the FWU multi bank boot feature enabled, these GUID values are used to identify the firmware image to be booted. This is done by matching GUID values of images in the io policy table with the Image GUID value that is read from the FWU metadata structure. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: Id9751f02f95fc48ef68e4e3f9f0ddbf6d6319d3c
-
Sughosh Ganu authored
With the FWU multi bank feature enabled, the identification of firmware image type is done using the image type GUID instead of binary_type field. Add GUID values for the FIP image which can be updated through the FWU firmware update feature. The GUID values are used in identifying the firmware images. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: If7d9356aa8d2bb3fbcbc87100e6972f1a1862921
-
Sughosh Ganu authored
Add a platform hook for returning the boot index, i.e. the bank from which the platform has booted the updatable firmware images. This value will be passed to the Update Agent. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: Ic7bef21071c48cfc7b69c50e89df9ff758d95b00
-
Sughosh Ganu authored
Simplify the assert to check if the FWU subsystem has been initialised in the fwu_is_trial_run_state function. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: I428668470ebd4b67e68777a62d5732cb96841ab9
-
Sughosh Ganu authored
Add a helper function to pass the metadata structure to the platforms. Platforms can then read the metadata structure and pass the boot index value, i.e. the bank(partition) from which the firmware images were booted, to the Update Agent. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: I571179b9baa0fbc4d0f08d7a6e3b50c0c7165c5c
-
Sughosh Ganu authored
With the GPT partition scheme, a partition can be identified using it's UniquePartitionGUID, instead of it's name. Add a function to identify the partition based on this GUID value. This functionality is useful in identification of a partition whose UniquePartitionGUID value is known. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: I543f794e1f7773f969968a6bce85ecca6f6a1659
-
Sughosh Ganu authored
Copy the UniquePartitionGUID member of a GPT partition entry into the partition_entry structure. This GUID is subsequently used to identify the image to boot on a platform which supports multiple partitions of firmware components using the FWU metadata structure. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: I8b55a1ee7deb1353886fbd8ebde53055d677fee0
-
Sughosh Ganu authored
The FWU multi bank feature supports multiple partitions or banks of firmware components, where a platform can support having an active and a backup partition(bank) of firmware images to boot from. This feature identifies the images in a given bank using image GUID's -- this GUID value corresponds to the UniquePartitionGUID value used to uniquely identify a GPT partition. To support identification of images, add a member to the partition_entry structure to store the UniquePartitionGUID value of the GPT partition entry. This value is subsequently used to select the firmware image to boot in a multi partition setup. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: I2d235467ce7a7f20ebc1cef4db09924a5282e714
-
Sughosh Ganu authored
The EFI_NAMELEN macro has been moved to efi.h header. Get the macro from efi.h. Use the struct efi_guid structure for declaring GUID members in gpt.h Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: I1c3a2605b9f857b9cf2dcfdaed4dc9d0a2cbf0f0
-
Sughosh Ganu authored
The FWU metadata structure uses GUID's to identify the updatable firmware images. Add some basic helper functions and macros that would be used for working with the GUID datatype. With the FWU feature enabled, these would then be used for image identification and booting of images from a particular bank(partition). Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: Ia54c0402d72b503d6abd1d94bc751cc14602cd39
-
Sughosh Ganu authored
The metadata structure copy is passed to the platform routine to set the image source to boot the platform from. This is done by reading the metadata structure. Pass the metadata as a read-only copy to the routine -- the routine only needs to consume the metadata values and should not be able to update the metadata fields. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: I399cad99ab89c71483e5a32a1de0e22df304f8b0
-
Sughosh Ganu authored
Add a valid scope for the partition code under the drivers directory. Signed-off-by:
Sughosh Ganu <sughosh.ganu@linaro.org> Change-Id: I173ac45e4ccbc95566277dabef15dcd25533e097
-
Madhukar Pappireddy authored
-
Madhukar Pappireddy authored
-
- Jan 26, 2022
-
-
Madhukar Pappireddy authored
-
joannafarley-arm authored
* changes: build(npm): mandate Node.js engine version docs(changelog): fix broken version bumping docs(changelog): fix version tag links refactor(hooks): replace cz-conventional-changelog with cz-commitlint style(commitlint): reorder header/body max line length fields chore(npm): update package versions/license
-
Maninder Singh authored
Corrects mapping of HNFs nodes with SNFs nodes based on their proximity in CCN508 ring when disabling unused ddr controller. When DDRC 2 disabled and DDR 1 is active the mapping is 0x3/3/8/8/8/8/3/3. When DDRC 1 is disabled and DDR2 is active the mapping is 0x 18/18/13/13/13/13/18/18 . Signed-off-by:
Maninder Singh <maninder.singh_1@nxp.com> Signed-off-by:
JaiPrakash Singh <JaiPrakash.singh@nxp.com> Signed-off-by:
Jiafei Pan <Jiafei.Pan@nxp.com> Change-Id: I6ec1e02f8ad7e8bb8628913625ff5313a054dcc6
-
Jiafei Pan authored
ocram.h should be in platform includes group. Signed-off-by:
Jiafei Pan <Jiafei.Pan@nxp.com> Change-Id: I43b6a279e48e1a173f8e7c601f2c8d48e6efc647
-
- Jan 25, 2022
-
-
Sandrine Bailleux authored
* changes: refactor(renesas): disable CRYPTO_SUPPORT option refactor(fvp): avoid Measured-Boot dependency on Trusted-Boot refactor(measured-boot): avoid Measured-Boot dependency on Trusted-Boot build: introduce CRYPTO_SUPPORT build option
-
- Jan 24, 2022
-
-
Madhukar Pappireddy authored
* changes: feat(stm32mp1): add helper to enable high speed mode in low voltage refactor(stm32mp1): add helpers for IO compensation cells feat(stm32mp1): use clk_enable/disable functions feat(stm32mp1): add timeout in IO compensation
-
Chris Kay authored
This change mandates a particular version of Node.js when running `npm install`. When using a version of Node.js that does not meet these expectations, a warning will be emitted to the user to let them know that they are using an unsupported version of Node.js Change-Id: I3f9bcf8be483a80b5882d65b034c6655013df19f Signed-off-by:
Chris Kay <chris.kay@arm.com>
-
Chris Kay authored
Standard Version was not bumping the package metadata files as it should have been. It's not clear to me why, but there is an open [GitHub issue][1] for documenting this behaviour. [1]: https://github.com/conventional-changelog/standard-version/issues/506 Change-Id: Ie89a81272fe507a3d2e1cd33c6ac1bdcc8ac3d75 Signed-off-by:
Chris Kay <chris.kay@arm.com>
-
Chris Kay authored
The Standard Version tool will not recognize a release header as a release header without the minor version, and will overwrite them when generating the next release changelog. Additionally, it will not generate a link to the tag diff unless a tag of the form `vX.Y.Z` exists. We ought to generate tags with this version format in the future to ensure the diff links are generated. Change-Id: I7864ab7a5822f83ddb7a7917208d2d029ae34729 Signed-off-by:
Chris Kay <chris.kay@arm.com>
-
Chris Kay authored
This change replaces cz-conventional-changelog with cz-commitlint, which automatically configures Commitizen using our commitlint configuration file. Currently, we use some manual Javascript magic to load our Commitizen configuration into commitlint (the opposite of what's introduced by this change), which can be removed. With this change, we also move our commitlint configuration into a new `changelog.yaml` file. This file holds the same data as `.cz.json` previously did. Change-Id: I14ff2308f1a0b2b293c2128b28ca2df578ce9c1c Signed-off-by:
Chris Kay <chris.kay@arm.com>
-
- Jan 20, 2022
-
-
Manish Pandey2 authored
* changes: docs(maintainers): update nxp layerscape maintainers docs(plat/nxp/layerscape): add ls1043a soc and board support feat(plat/nxp/ls1043ardb): add ls1043ardb board support feat(plat/nxp/ls1043a): add ls1043a soc support refactor(plat/ls1043): remove old implementation for platform ls1043 feat(nxp/driver/dcfg): add some macro definition fix(nxp/common/setup): increase soc name maximum length feat(nxp/common/errata): add SoC erratum a008850 feat(nxp/driver/tzc380): add tzc380 platform driver support feat(tzc380): add sub-region register definition feat(nxp/common/io): add ifc nor and nand as io devices feat(nxp/driver/ifc_nand): add IFC NAND flash driver feat(nxp/driver/ifc_nor): add IFC nor flash driver feat(nxp/driver/csu): add bypass bit mask definition feat(nxp/driver/dcfg): add gic address align register definition feat(nxp/common/rcpm): add RCPM2 registers definition fix(nxp/common/setup): fix total dram size checking feat(nxp/common): add CORTEX A53 helper functions
-
Jiafei Pan authored
Added myself to be NXP common code and ls1028a, ls1043a platforms maintainer. Signed-off-by:
Jiafei Pan <Jiafei.Pan@nxp.com> Change-Id: Iadffc5600e9bb2e94b1d545b8dd1a819358cabcb
-