]> git.baikalelectronics.ru Git - arm-tf.git/log
arm-tf.git
4 years agoTSP: Fix GCC 11.0.0 compilation error.
Alexei Fedorov [Fri, 13 Nov 2020 12:36:49 +0000 (12:36 +0000)]
TSP: Fix GCC 11.0.0 compilation error.

This patch fixes the following compilation error
reported by aarch64-none-elf-gcc 11.0.0:

bl32/tsp/tsp_main.c: In function 'tsp_smc_handler':
bl32/tsp/tsp_main.c:393:9: error: 'tsp_get_magic'
 accessing 32 bytes in a region of size 16
 [-Werror=stringop-overflow=]
  393 |         tsp_get_magic(service_args);
      |         ^~~~~~~~~~~~~~~~~~~~~~~~~~~
bl32/tsp/tsp_main.c:393:9: note: referencing argument 1
 of type 'uint64_t *' {aka 'long long unsigned int *'}
In file included from bl32/tsp/tsp_main.c:19:
bl32/tsp/tsp_private.h:64:6: note: in a call to function 'tsp_get_magic'
   64 | void tsp_get_magic(uint64_t args[4]);
      |      ^~~~~~~~~~~~~

by changing declaration of tsp_get_magic function from
void tsp_get_magic(uint64_t args[4]);
to
uint128_t tsp_get_magic(void);
which returns arguments directly in x0 and x1 registers.

In bl32\tsp\tsp_main.c the current tsp_smc_handler()
implementation calls tsp_get_magic(service_args);
, where service_args array is declared as
uint64_t service_args[2];
and tsp_get_magic() in bl32\tsp\aarch64\tsp_request.S
copies only 2 registers in output buffer:
/* Store returned arguments to the array */
stp x0, x1, [x4, #0]

Change-Id: Ib34759fc5d7bb803e6c734540d91ea278270b330
Signed-off-by: Alexei Fedorov <Alexei.Fedorov@arm.com>
4 years agoMerge "make_helpers: tbbr: Fix FWU certificate generation" into integration
Manish Pandey [Mon, 9 Nov 2020 15:47:34 +0000 (15:47 +0000)]
Merge "make_helpers: tbbr: Fix FWU certificate generation" into integration

4 years agomake_helpers: tbbr: Fix FWU certificate generation
Manish V Badarkhe [Sun, 8 Nov 2020 17:38:57 +0000 (17:38 +0000)]
make_helpers: tbbr: Fix FWU certificate generation

Provide missed command line parameters such as KEY_ALG, HASH_ALG
and KEY_SIZE while generating the FWU certificate.

Signed-off-by: Gilad Ben Yossef <Gilad.BenYossef@arm.com>
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I017fa3fff844f4262ae2441cbc9fee909d357fb3

4 years agoMerge "Use constant stack size with RECLAIM_INIT_CODE" into integration
Alexei Fedorov [Thu, 29 Oct 2020 18:00:13 +0000 (18:00 +0000)]
Merge "Use constant stack size with RECLAIM_INIT_CODE" into integration

4 years agoMerge changes from topic "mbox-patches" into integration
Manish Pandey [Thu, 29 Oct 2020 11:17:01 +0000 (11:17 +0000)]
Merge changes from topic "mbox-patches" into integration

* changes:
  intel: common: Fix non-MISRA compliant code v2
  intel: mailbox: Fix non-MISRA compliant code
  intel: mailbox: Mailbox error recovery handling
  intel: mailbox: Enable sending large mailbox command
  intel: mailbox: Use retry count in mailbox poll
  intel: mailbox: Ensure time out duration is predictive
  intel: mailbox: Read mailbox response even there is an error
  intel: mailbox: Driver now handles larger response
  intel: common: Change how mailbox handles job id & buffer
  intel: common: Improve readability of mailbox read response
  intel: SIP: increase FPGA_CONFIG_SIZE to 32 MB
  intel: common: Remove urgent from mailbox async
  intel: common: Improve mailbox driver readability

4 years agoUse constant stack size with RECLAIM_INIT_CODE
David Horstmann [Wed, 14 Oct 2020 14:17:49 +0000 (15:17 +0100)]
Use constant stack size with RECLAIM_INIT_CODE

Currently, when RECLAIM_INIT_CODE is set, the
stacks are scaled to ensure that the entirety
of the init section can be reclaimed as stack.

This causes an issue in lib/psci/aarch64/psci_helpers.S,
where the stack size is used for cache operations in
psci_do_pwrdown_cache_maintenance(). If the stacks
are scaled, then the PSCI code may fail to invalidate
some of the stack memory before power down.

Resizing stacks is also not good for stability in general,
since code that works with a small number of cores may
overflow the stack when the number of cores is increased.

Change to make every stack be PLATFORM_STACK_SIZE big,
and allow the total stack to be smaller than the
init section.

Any pages of the init section not reclaimed as
stack will be set to read-only and execute-never,
for security.

Change-Id: I10b3884981006431f2fcbec3864c81d4a8c246e8
Signed-off-by: David Horstmann <david.horstmann@arm.com>
4 years agoMerge "aarch64/arm: Add compiler barrier to barrier instructions" into integration
André Przywara [Wed, 28 Oct 2020 14:34:07 +0000 (14:34 +0000)]
Merge "aarch64/arm: Add compiler barrier to barrier instructions" into integration

4 years agoMerge changes from topic "mbox-patches" into integration
Manish Pandey [Wed, 28 Oct 2020 14:07:15 +0000 (14:07 +0000)]
Merge changes from topic "mbox-patches" into integration

* changes:
  intel: common: Clean up mailbox and sip header
  intel: clear 'PLAT_SEC_ENTRY' in early platform setup

4 years agoMerge changes I07448d85,If85be70b,Ie6802d6d,I67a9abef into integration
Manish Pandey [Wed, 28 Oct 2020 14:04:07 +0000 (14:04 +0000)]
Merge changes I07448d85,If85be70b,Ie6802d6d,I67a9abef into integration

* changes:
  mediatek: mt8192: add timer support
  mediatek: mt8192: Add reboot function for PSCI
  mediatek: mt8192: add sys_cirq driver
  mediatek: mt8192: add GPIO driver support

4 years agomediatek: mt8192: add timer support
Dehui Sun [Fri, 3 Jul 2020 01:19:06 +0000 (09:19 +0800)]
mediatek: mt8192: add timer support

add timer driver.

Signed-off-by: Dehui Sun <dehui.sun@mediatek.com>
Change-Id: I07448d85a15bb14577b05e4f302860d609420ba7

4 years agomediatek: mt8192: Add reboot function for PSCI
Nina Wu [Thu, 2 Jul 2020 04:10:13 +0000 (12:10 +0800)]
mediatek: mt8192: Add reboot function for PSCI

Add system_reset function in psci ops

Change-Id: If85be70b8ae9d6487e02626356f0ff1e78b76de9
Signed-off-by: Nina Wu <nina-cm.wu@mediatek.com>
4 years agomediatek: mt8192: add sys_cirq driver
gtk_pangao [Thu, 19 Dec 2019 07:58:20 +0000 (15:58 +0800)]
mediatek: mt8192: add sys_cirq driver

1.add sys_cirq driver
2.add gic api for cirq

Change-Id: Ie6802d6ddcf7dde3412a050736dfdc85f97cb51b
Signed-off-by: gtk_pangao <gtk_pangao@mediatek.com>
4 years agoaarch64/arm: Add compiler barrier to barrier instructions
Andre Przywara [Fri, 16 Oct 2020 17:19:03 +0000 (18:19 +0100)]
aarch64/arm: Add compiler barrier to barrier instructions

When issuing barrier instructions like DSB or DMB, we must make sure
that the compiler does not undermine out efforts to fence off
instructions. Currently the compiler is free to move the barrier
instruction around, in respect to former or later memory access
statements, which is not what we want.

Add a compiler barrier to the inline assembly statement in our
DEFINE_SYSOP_TYPE_FUNC macro, to make sure memory accesses are not
reordered by the compiler.
This is in line with Linux' definition:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/arch/arm64/include/asm/barrier.h

Since those instructions share a definition, apart from DSB and DMB this
now also covers some TLBI instructions. Having a compiler barrier there
also is useful, although we probably have stronger barriers in place
already.

Change-Id: If6fe97b13a562643a643efc507cb4aad29daa5b6
Reported-by: Alexandru Elisei <alexandru.elisei@arm.com>
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
4 years agoMerge "plat: marvell: armada: Fix dependences for target fip" into integration
Manish Pandey [Tue, 27 Oct 2020 14:01:11 +0000 (14:01 +0000)]
Merge "plat: marvell: armada: Fix dependences for target fip" into integration

4 years agointel: common: Fix non-MISRA compliant code v2
Abdul Halim, Muhammad Hadi Asyrafi [Thu, 15 Oct 2020 07:27:18 +0000 (15:27 +0800)]
intel: common: Fix non-MISRA compliant code v2

This patch is used to fix remaining non compliant code for Intel
SoCFPGA's mailbox and sip driver. These changes include:
- Change non-interface required uint32_t into unsigned int
- Change non-negative variable to unsigned int
- Remove obsolete variable initialization to 0

Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com>
Change-Id: I3a16c7621a5fc75eb614d97d72e44c86e7d53bf5

4 years agointel: mailbox: Fix non-MISRA compliant code
Abdul Halim, Muhammad Hadi Asyrafi [Tue, 1 Sep 2020 13:05:18 +0000 (21:05 +0800)]
intel: mailbox: Fix non-MISRA compliant code

This patch is used to fix remaining non compliant code for Intel
SocFPGA's mailbox driver. These changes include:
- adding integer literal for unsigned constant
- fix non-boolean controlling expression
- add braces even on conditional single statement bodies

Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com>
Change-Id: I0f8fd96a3540f35ee102fd2f2369b76fa73e39e1

4 years agointel: mailbox: Mailbox error recovery handling
Chee Hong Ang [Mon, 11 May 2020 03:23:21 +0000 (11:23 +0800)]
intel: mailbox: Mailbox error recovery handling

Attempt to restart the mailbox if the mailbox driver not able
to write any data into the mailbox command buffer.

Signed-off-by: Chee Hong Ang <chee.hong.ang@intel.com>
Change-Id: Ia45291c985844dec9da82839cac701347534d32b

4 years agointel: mailbox: Enable sending large mailbox command
Abdul Halim, Muhammad Hadi Asyrafi [Mon, 1 Jun 2020 17:06:33 +0000 (01:06 +0800)]
intel: mailbox: Enable sending large mailbox command

Allow mailbox command that is larger than mailbox command FIFO buffer
size to be sent to SDM in multiple chunks.

Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com>
Change-Id: I683d5f1d04c4fdf57d11ecae6232b7ed3fc49e26

4 years agointel: mailbox: Use retry count in mailbox poll
Abdul Halim, Muhammad Hadi Asyrafi [Mon, 1 Jun 2020 17:05:24 +0000 (01:05 +0800)]
intel: mailbox: Use retry count in mailbox poll

Change the main loop inside mailbox poll function from while(1) to a
retry counter named sdm_loop. This is to limit the maximum possible
looping of the function and prevent unexpected behaviour.

Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com>
Change-Id: I63afad958fe5f656f6333b60d5a8b4c0ada3b23d

4 years agointel: mailbox: Ensure time out duration is predictive
Chee Hong Ang [Sun, 10 May 2020 16:55:01 +0000 (00:55 +0800)]
intel: mailbox: Ensure time out duration is predictive

For each count down of time out counter, wait for number of
miliseconds to ensure the time out duration is predictive.

Signed-off-by: Chee Hong Ang <chee.hong.ang@intel.com>
Change-Id: I0e92dd1ef1da0ef504ec86472cf0d3c88528930b

4 years agointel: mailbox: Read mailbox response even there is an error
Chee Hong Ang [Sun, 10 May 2020 16:40:18 +0000 (00:40 +0800)]
intel: mailbox: Read mailbox response even there is an error

Mailbox driver should read the response data if the response length
in the response header is non-zero even the response header indicates
error (non-zero).

Signed-off-by: Chee Hong Ang <chee.hong.ang@intel.com>
Change-Id: I928f705f43c0f46ac74b84428b830276cc4c9640

4 years agointel: mailbox: Driver now handles larger response
Abdul Halim, Muhammad Hadi Asyrafi [Wed, 29 Apr 2020 14:26:40 +0000 (22:26 +0800)]
intel: mailbox: Driver now handles larger response

This patch factorizes mailbox read response from SDM into a function.
Also fix the logic to support reading larger than 16 words response from
SDM.

Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com>
Change-Id: Ie035ecffbbc42e12dd68061c403904c28c3b70e5

4 years agointel: common: Change how mailbox handles job id & buffer
Abdul Halim, Muhammad Hadi Asyrafi [Mon, 18 May 2020 03:16:48 +0000 (11:16 +0800)]
intel: common: Change how mailbox handles job id & buffer

This patch modifies several basic mailbox driver features to prepare for
FCS enablement:
- Job id management for asynchronous response
- SDM command buffer full

Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com>
Change-Id: I78168dfb6c521d70d9cba187356b7a3c8e9b62d2

4 years agoMerge "SPMC: adjust device region for first secure partition" into integration
Olivier Deprez [Mon, 26 Oct 2020 09:51:32 +0000 (09:51 +0000)]
Merge "SPMC: adjust device region for first secure partition" into integration

4 years agomediatek: mt8192: add GPIO driver support
Po Xu [Fri, 18 Sep 2020 01:32:31 +0000 (09:32 +0800)]
mediatek: mt8192: add GPIO driver support

add GPIO driver

Change-Id: I67a9abef078e7a62b34dfbd366b45c03892800cd
Signed-off-by: Po Xu <jg_poxu@mediatek.com>
4 years agointel: common: Clean up mailbox and sip header
Abdul Halim, Muhammad Hadi Asyrafi [Thu, 14 May 2020 06:53:29 +0000 (14:53 +0800)]
intel: common: Clean up mailbox and sip header

Sort and rearrange definitions in both mailbox and sip header to
increase readability and maintainability.

Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com>
Change-Id: I5544c2f17efdf3174757c55afd8cc1062fbae856

4 years agointel: common: Improve readability of mailbox read response
Abdul Halim, Muhammad Hadi Asyrafi [Wed, 12 Feb 2020 11:57:44 +0000 (19:57 +0800)]
intel: common: Improve readability of mailbox read response

Rename variables to improve readability of mailbox read response and
mailbox poll response flow.

Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com>
Change-Id: Icd33ff1d2abb28eeead15e4eb9c7f9629f8cb402

4 years agointel: clear 'PLAT_SEC_ENTRY' in early platform setup
Chee Hong Ang [Fri, 24 Apr 2020 13:51:00 +0000 (21:51 +0800)]
intel: clear 'PLAT_SEC_ENTRY' in early platform setup

Ensure 'PLAT_SEC_ENTRY' is cleared during early platform
setup. This is to prevent the slave CPU cores jump to the stale
entry point after warm reset when using U-Boot SPL as first
stage boot loader.

Signed-off-by: Chee Hong Ang <chee.hong.ang@intel.com>
Change-Id: I3294ce2f74aa691d0cf311fa30f27f9d4fb8800a

4 years agointel: SIP: increase FPGA_CONFIG_SIZE to 32 MB
Richard Gong [Mon, 13 Apr 2020 14:40:43 +0000 (09:40 -0500)]
intel: SIP: increase FPGA_CONFIG_SIZE to 32 MB

Increase INTEL_SIP_SMC_FPGA_CONFIG_SIZE from 16 to 32MB. We need higher
pre-reserved memory size between Intel service layer and secure monitor
software so we can handle JIC file authorization.

Signed-off-by: Richard Gong <richard.gong@intel.com>
Change-Id: Ibab4e42e4b7b93a4cf741e60ec9439359ba0a64c

4 years agointel: common: Remove urgent from mailbox async
Abdul Halim, Muhammad Hadi Asyrafi [Mon, 18 May 2020 02:32:15 +0000 (10:32 +0800)]
intel: common: Remove urgent from mailbox async

Remove urgent argument from asynchrounous mailbox command as any urgent
command should always be synchronous

Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com>
Change-Id: Iaa64335db24df3a562470d0d1c3d6a3a71493319

4 years agointel: common: Improve mailbox driver readability
Abdul Halim, Muhammad Hadi Asyrafi [Thu, 14 May 2020 07:32:43 +0000 (15:32 +0800)]
intel: common: Improve mailbox driver readability

Use pre-defined macros for return values and common mailbox arguments

Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com>
Change-Id: I5d549ee5358aebadf909f79fda55e83ee9844a0e

4 years agoMerge "docs: marvell: update ddr3 build instructions" into integration
Varun Wadekar [Sat, 24 Oct 2020 02:30:21 +0000 (02:30 +0000)]
Merge "docs: marvell: update ddr3 build instructions" into integration

4 years agoMerge changes I5ae9d08b,I5cbbd7eb,Idb389223 into integration
Varun Wadekar [Sat, 24 Oct 2020 02:29:31 +0000 (02:29 +0000)]
Merge changes I5ae9d08b,I5cbbd7eb,Idb389223 into integration

* changes:
  plat: marvell: armada: Building ${DOIMAGETOOL} is only for a8k
  plat: marvell: armada: Fix including plat/marvell/marvell.mk file
  plat: marvell: armada: a3k: When WTP is empty do not define variables and targets which depends on it

4 years agoMerge "plat/qemu_sbsa: Remove cortex_a53 and aem_generic" into integration
Manish Pandey [Thu, 22 Oct 2020 08:49:30 +0000 (08:49 +0000)]
Merge "plat/qemu_sbsa: Remove cortex_a53 and aem_generic" into integration

4 years agoSPMC: adjust device region for first secure partition
Olivier Deprez [Thu, 8 Oct 2020 06:38:58 +0000 (08:38 +0200)]
SPMC: adjust device region for first secure partition

For the first partition, mark first 2GB as device memory excluding
the Trusted DRAM region reserved for the SPMC.

Signed-off-by: Olivier Deprez <olivier.deprez@arm.com>
Change-Id: I3ff110b3facf5b6d41ac2519ff6ca5e30a0a502b

4 years agoMerge changes from topic "tc0_sel2_spmc" into integration
Manish Pandey [Wed, 21 Oct 2020 21:14:42 +0000 (21:14 +0000)]
Merge changes from topic "tc0_sel2_spmc" into integration

* changes:
  plat: tc0: Configure TZC with secure world regions
  plat: tc0: Enable SPMC execution at S-EL2
  plat: tc0: Add TZC DRAM1 region for SPMC and trusted OS
  plat: arm: Make BL32_BASE platform dependent when SPD_spmd is enabled
  plat: tc0: Disable SPE

4 years agoMerge changes from topic "tc0_sel2_spmc" into integration
Manish Pandey [Wed, 21 Oct 2020 21:03:14 +0000 (21:03 +0000)]
Merge changes from topic "tc0_sel2_spmc" into integration

* changes:
  lib: el3_runtime: Fix SPE system registers in el2_sysregs_context
  lib: el3_runtime: Conditionally save/restore EL2 NEVE registers
  lib: el3_runtime: Fix aarch32 system registers in el2_sysregs_context

4 years agoplat/qemu_sbsa: Remove cortex_a53 and aem_generic
Tomas Pilar [Tue, 11 Aug 2020 14:06:16 +0000 (15:06 +0100)]
plat/qemu_sbsa: Remove cortex_a53 and aem_generic

The qemu_sbsa platform uses 42bit address size but
the cortex-a53 only supports 40bit addressing, the
cpu is incompatible with the platform.

The aem_generic is also not used with qemu_sbsa, in
fact, the platform currently only properly supports
the cortex-a57 cpu.

Change-Id: I91c92533116f1c3451d01ca99824e91d3d58df14
Signed-off-by: Tomas Pilar <tomas@nuviateam.com>
4 years agoplat: marvell: armada: Building ${DOIMAGETOOL} is only for a8k
Pali Rohár [Wed, 21 Oct 2020 09:50:40 +0000 (11:50 +0200)]
plat: marvell: armada: Building ${DOIMAGETOOL} is only for a8k

Currently a3k target is misusing ${DOIMAGETOOL} target for building flash
and UART images. It is not used for building image tool.

So move ${DOIMAGETOOL} target from common marvell include file into a8k
include file and add correct invocation of ${MAKE} into a3k for building
flash and UART images.

Part of this change is also checks that MV_DDR_PATH for a3k was specified
by user as this option is required for building a3k flash and UART images.

Signed-off-by: Pali Rohár <pali@kernel.org>
Change-Id: I5ae9d08b8505460933f17836c9b6435fd6e51bb6

4 years agoMerge "docs: code review guidelines" into integration
Manish Pandey [Tue, 20 Oct 2020 20:19:35 +0000 (20:19 +0000)]
Merge "docs: code review guidelines" into integration

4 years agoplat: tc0: Configure TZC with secure world regions
Usama Arif [Wed, 26 Aug 2020 13:04:31 +0000 (14:04 +0100)]
plat: tc0: Configure TZC with secure world regions

This includes configuration for SPMC and trusted OS.

Change-Id: Ie24df200f446b3f5b23f5f764b115c7191e6ada3
Signed-off-by: Usama Arif <usama.arif@arm.com>
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
4 years agoplat: tc0: Enable SPMC execution at S-EL2
Arunachalam Ganapathy [Tue, 22 Sep 2020 11:50:45 +0000 (12:50 +0100)]
plat: tc0: Enable SPMC execution at S-EL2

This patch enables SPMC execution at S-EL2 by adding below changes

    - Map TC0_MAP_TZC_DRAM1 for loading SPMC
    - Add details of cactus test secure partitions
    - Adds tc0 spmc manifest file with details on secure partitions
    - Inlcude TOS_FW_CONFIG when SPM is spmd
    - Increases bl2 image size

SPMC at S-EL2 is only enabled when build with SPD=spmd.

Change-Id: I4c5f70911903c232ee8ecca57f1e288d6b1cd647
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
4 years agoplat: tc0: Add TZC DRAM1 region for SPMC and trusted OS
Arunachalam Ganapathy [Tue, 22 Sep 2020 11:47:33 +0000 (12:47 +0100)]
plat: tc0: Add TZC DRAM1 region for SPMC and trusted OS

- Reserve 32MB below ARM_AP_TZC_DRAM1_BASE for TC0_TZC_DRAM1
- Add TC0_NS_DRAM1 base and mapping
- Reserve memory region in tc0.dts

Change-Id: If2431f7f68e4255e28c86a0e89637dab7c424a13
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
4 years agoplat: arm: Make BL32_BASE platform dependent when SPD_spmd is enabled
Arunachalam Ganapathy [Mon, 27 Jul 2020 12:51:30 +0000 (13:51 +0100)]
plat: arm: Make BL32_BASE platform dependent when SPD_spmd is enabled

To support platforms without Trusted DRAM this patch defines
PLAT_ARM_SPMC_BASE and enables platform to use either Trusted DRAM or
DRAM region behind TZC.

Change-Id: Icaa5c7d33334258ff27e8e0bfd0812c304e68ae4
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
4 years agoplat: tc0: Disable SPE
Arunachalam Ganapathy [Thu, 28 May 2020 11:32:10 +0000 (12:32 +0100)]
plat: tc0: Disable SPE

Statistical Profiling Extension is not supported by Matterhorn core

Change-Id: Iec652f1c6d6b6a9bf118ba682276a7c70a6abc0d
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
4 years agolib: el3_runtime: Fix SPE system registers in el2_sysregs_context
Arunachalam Ganapathy [Fri, 9 Oct 2020 13:51:41 +0000 (14:51 +0100)]
lib: el3_runtime: Fix SPE system registers in el2_sysregs_context

Include EL2 registers related to SPE in EL2 context save/restore
routines if architecture supports it and platform wants to use these
features in Secure world.

Change-Id: Ie01a2c38fa5f6c907276eddec120fdfb222561a6
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
4 years agolib: el3_runtime: Conditionally save/restore EL2 NEVE registers
Arunachalam Ganapathy [Thu, 28 May 2020 10:57:09 +0000 (11:57 +0100)]
lib: el3_runtime: Conditionally save/restore EL2 NEVE registers

Include EL2 registers related to Nested Virtualization in EL2 context
save/restore routines if architecture supports it and platform wants to
use these features in Secure world.

Change-Id: If006ab83bbc2576488686f5ffdff88b91adced5c
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
4 years agolib: el3_runtime: Fix aarch32 system registers in el2_sysregs_context
Arunachalam Ganapathy [Tue, 26 May 2020 10:32:35 +0000 (11:32 +0100)]
lib: el3_runtime: Fix aarch32 system registers in el2_sysregs_context

AArch64-only platforms do not implement AArch32 at EL1 and higher ELs.
In such cases the build option CTX_INCLUDE_AARCH32_REGS is set to 0.
So don't save/restore aarch32 system registers in el2_sysregs_context
save/restore routines if CTX_INCLUDE_AARCH32_REGS is set to 0.

Change-Id: I229cdd46136c4b4bc9623b02eb444d904e09ce5a
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
4 years agoplat: marvell: armada: Fix including plat/marvell/marvell.mk file
Pali Rohár [Mon, 19 Oct 2020 15:10:11 +0000 (17:10 +0200)]
plat: marvell: armada: Fix including plat/marvell/marvell.mk file

Include file plat/marvell/marvell.mk for platform A3700 was included two
times. Once from file plat/marvell/armada/a3k/common/a3700_common.mk and
second time from common file plat/marvell/armada/common/marvell_common.mk.

It caused following warning every time was make called:

    plat/marvell/marvell.mk:51: warning: overriding recipe for target 'mrvl_clean'
    plat/marvell/marvell.mk:51: warning: ignoring old recipe for target 'mrvl_clean'

Change in this commit removes inclusion of plat/marvell/marvell.mk file in
common file plat/marvell/armada/common/marvell_common.mk. As a80x0 platform
needs this include file, add it also into a80x0 platform specific include
file lat/marvell/armada/a8k/common/a8k_common.mk.

Also moves inclusion of plat/marvell/marvell.mk file in a3700 platform file
plat/marvell/armada/a3k/common/a3700_common.mk at correct place. Global
plat/marvell/marvell.mk expects that variables DOIMAGEPATH and DOIMAGETOOL
are already defined, but it defines MARVELL_SECURE_BOOT variable which is
needed by plat/marvell/armada/a3k/common/a3700_common.mk.

Signed-off-by: Pali Rohár <pali@kernel.org>
Change-Id: I5cbbd7eb8a3376924419f9850516b2a4924be5aa

4 years agoMerge "fdts: add missing hash node in STM32MP157C-ED1 board DT" into integration
Alexei Fedorov [Mon, 19 Oct 2020 12:08:21 +0000 (12:08 +0000)]
Merge "fdts: add missing hash node in STM32MP157C-ED1 board DT" into integration

4 years agoMerge "Increase type widths to satisfy width requirements" into integration
Joanna Farley [Sun, 18 Oct 2020 14:51:00 +0000 (14:51 +0000)]
Merge "Increase type widths to satisfy width requirements" into integration

4 years agoMerge changes Iba51bff1,I3f563cff into integration
Madhukar Pappireddy [Fri, 16 Oct 2020 22:00:04 +0000 (22:00 +0000)]
Merge changes Iba51bff1,I3f563cff into integration

* changes:
  plat:qti Mandate SMC implementaion and bug fix
  Update in coreboot_get_memory_type API to include size as well

4 years agoMerge "docs: Remove deprecated information" into integration
Mark Dykes [Fri, 16 Oct 2020 20:35:29 +0000 (20:35 +0000)]
Merge "docs: Remove deprecated information" into integration

4 years agoMerge "docs: Update Release information for v2.5" into integration
Mark Dykes [Fri, 16 Oct 2020 20:34:32 +0000 (20:34 +0000)]
Merge "docs: Update Release information for v2.5" into integration

4 years agoMerge "docs: Update code freeze and release target date for v2.4" into integration
Mark Dykes [Fri, 16 Oct 2020 20:33:24 +0000 (20:33 +0000)]
Merge "docs: Update code freeze and release target date for v2.4" into integration

4 years agodocs: Remove deprecated information
Manish V Badarkhe [Thu, 8 Oct 2020 01:21:20 +0000 (02:21 +0100)]
docs: Remove deprecated information

There are no references to AARCH32, AARCH64 and
__ASSEMBLY__ macros in the TF-A code hence
removed the deprecated information mentioning about
these macros in the document.

Change-Id: I472ab985ca2e4173bae23ff7b4465a9b60bc82eb
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
4 years agodocs: Update Release information for v2.5
Manish V Badarkhe [Thu, 8 Oct 2020 01:16:25 +0000 (02:16 +0100)]
docs: Update Release information for v2.5

Updated tentative code freeze and release target date
for v2.5 release.

Change-Id: Idcfd9a127e9210846370dfa0685badac5b1c25c7
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
4 years agodocs: Update code freeze and release target date for v2.4
Manish V Badarkhe [Thu, 8 Oct 2020 01:11:20 +0000 (02:11 +0100)]
docs: Update code freeze and release target date for v2.4

Updated code freeze and release information date for v2.4
release.

Change-Id: I76d5d04d0ee062a350f6a693eb04c29017d8b2e0
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
4 years agoplat: marvell: armada: Fix dependences for target fip
Pali Rohár [Thu, 8 Oct 2020 13:19:26 +0000 (15:19 +0200)]
plat: marvell: armada: Fix dependences for target fip

For building fip image it is not needed to build target mrvl_flash. This
fip image contains only bl2, bl31 and bl33 (u-boot.bin) images and
therefore it does not depend on Marvell wtmi and wtp A3700-utils.

So remove mrvl_flash dependency for fip target to allow building fip image
without need to build mrvl_flash and therefore specify and provide Marvell
wmi and wtp A3700-utils.

This changes fixes compilation of fip image for A3700 platform by command:

    make CROSS_COMPILE=aarch64-linux-gnu- BL33=/path/u-boot/u-boot.bin \
         DEBUG=0 LOG_LEVEL=0 USE_COHERENT_MEM=0 PLAT=a3700 fip

Marvell boot image can be still build by 'mrvl_flash' target.

Signed-off-by: Pali Rohár <pali@kernel.org>
Change-Id: Iba9a9da5be6fd1da23407fc2d490aedcb1a292c9

4 years agoMerge changes I0005959b,I2ea59edb into integration
Manish Pandey [Thu, 15 Oct 2020 21:12:49 +0000 (21:12 +0000)]
Merge changes I0005959b,I2ea59edb into integration

* changes:
  bl32: add an assert on BL32_SIZE in sp_min.ld.S
  bl32: use SORT_BY_ALIGNMENT macro in sp_min.ld.S

4 years agoplat:qti Mandate SMC implementaion and bug fix
Saurabh Gorecha [Wed, 14 Oct 2020 18:41:15 +0000 (00:11 +0530)]
plat:qti Mandate SMC implementaion and bug fix

implementation of SMC call SMCCC_ARCH_SOC_ID
adding debugging logs in mem assign call.
Checking range of param in mem_assign call is from CB_MEM_RAM
or CB_MEM_RESERVED.

Change-Id: Iba51bff154df01e02dcb7715582ffaff7beba26e
Signed-off-by: Saurabh Gorecha <sgorecha@codeaurora.org>
4 years agoUpdate in coreboot_get_memory_type API to include size as well
Saurabh Gorecha [Wed, 14 Oct 2020 18:35:36 +0000 (00:05 +0530)]
Update in coreboot_get_memory_type API to include size as well

Change-Id: I3f563cffd58b0591b433c85c0ff6b71e486eb2c8
Signed-off-by: Saurabh Gorecha <sgorecha@codeaurora.org>
4 years agoplat: marvell: armada: a3k: When WTP is empty do not define variables and targets...
Pali Rohár [Thu, 15 Oct 2020 11:50:28 +0000 (13:50 +0200)]
plat: marvell: armada: a3k: When WTP is empty do not define variables and targets which depends on it

Some of targets (e.g. mrvl_flash) depends on WTP build option. Other
targets (e.g. fip) can be build also without WTP build option as they do
not depend on it.

This change put all A3720 variables and targets which depends on WTP into
conditional if-endif section, so they are not defined when user has not
supplied WTP build option.

Target mrvl_flash is defined also when WTP was not specified and in this
case it just print error message to help user.

Variables which do not depend on WTP are moved to the top of
a3700_common.mk file.

Signed-off-by: Pali Rohár <pali@kernel.org>
Change-Id: Idb3892233586a0afca3e0e6564279641d2e4b960

4 years agoMerge "Don't return error information from console_flush" into integration
Mark Dykes [Wed, 14 Oct 2020 18:59:27 +0000 (18:59 +0000)]
Merge "Don't return error information from console_flush" into integration

4 years agoMerge "stm32mp1: use %u in NOTICE message for board info" into integration
Alexei Fedorov [Wed, 14 Oct 2020 16:55:05 +0000 (16:55 +0000)]
Merge "stm32mp1: use %u in NOTICE message for board info" into integration

4 years agofdts: add missing hash node in STM32MP157C-ED1 board DT
Yann Gautier [Tue, 13 Oct 2020 16:05:06 +0000 (18:05 +0200)]
fdts: add missing hash node in STM32MP157C-ED1 board DT

Without this node, the board fails to boot and panics in the function
stm32mp_init_auth().

Change-Id: Ia54924410dac2a8c94dd6e45d7e93977fe7d87e2
Signed-off-by: Yann Gautier <yann.gautier@st.com>
4 years agostm32mp1: use %u in NOTICE message for board info
Yann Gautier [Tue, 13 Oct 2020 16:03:31 +0000 (18:03 +0200)]
stm32mp1: use %u in NOTICE message for board info

The board information values, read in an OTP are never negative,
%u is then used instead of %d.

Change-Id: I3bc22401fb4d54666ddf56411f75b79aca738492
Signed-off-by: Yann Gautier <yann.gautier@st.com>
4 years agoMerge changes from topic "stm32mp1_plat_updates" into integration
Madhukar Pappireddy [Tue, 13 Oct 2020 15:46:35 +0000 (15:46 +0000)]
Merge changes from topic "stm32mp1_plat_updates" into integration

* changes:
  docs: update STM32MP1 with versions details
  stm32mp1: get peripheral base address from a define
  stm32mp1: add finished good variant in board identifier

4 years agoMerge "stm32mp1: add asserts in get_cpu_package() and get_part_number()" into integration
Alexei Fedorov [Tue, 13 Oct 2020 14:42:55 +0000 (14:42 +0000)]
Merge "stm32mp1: add asserts in get_cpu_package() and get_part_number()" into integration

4 years agoMerge "stm32mp1: add support for new SoC profiles" into integration
Alexei Fedorov [Tue, 13 Oct 2020 14:42:26 +0000 (14:42 +0000)]
Merge "stm32mp1: add support for new SoC profiles" into integration

4 years agoMerge "stm32mp1: support of STM32MP15x Rev.Z" into integration
Alexei Fedorov [Tue, 13 Oct 2020 14:42:09 +0000 (14:42 +0000)]
Merge "stm32mp1: support of STM32MP15x Rev.Z" into integration

4 years agoMerge changes from topic "st/fmc2" into integration
Manish Pandey [Tue, 13 Oct 2020 12:11:04 +0000 (12:11 +0000)]
Merge changes from topic "st/fmc2" into integration

* changes:
  drivers: stm32_fmc2_nand: fix boundary check for chip select
  drivers: stm32_fmc2_nand: move to new bindings

4 years agodocs: update STM32MP1 with versions details
Yann Gautier [Tue, 13 Oct 2020 09:27:05 +0000 (11:27 +0200)]
docs: update STM32MP1 with versions details

After introducing the new STM32MP1 SoC versions in patch [1], the
document describing STM32MP1 platform is updated with the information
given in the patch commit message.

 [1]: stm32mp1: add support for new SoC profiles

Change-Id: I6d7ce1a3c29678ddac78a6685f5d5daf28c3c3a1
Signed-off-by: Yann Gautier <yann.gautier@st.com>
4 years agostm32mp1: add asserts in get_cpu_package() and get_part_number()
Nicolas Le Bayon [Mon, 23 Sep 2019 09:18:32 +0000 (11:18 +0200)]
stm32mp1: add asserts in get_cpu_package() and get_part_number()

Change-Id: I2b702698d6be93da5ac86da1cbc98b3838315a5a
Signed-off-by: Nicolas Le Bayon <nicolas.le.bayon@st.com>
Signed-off-by: Yann Gautier <yann.gautier@st.com>
4 years agostm32mp1: add support for new SoC profiles
Lionel Debieve [Fri, 17 May 2019 14:01:18 +0000 (16:01 +0200)]
stm32mp1: add support for new SoC profiles

Update to support new part numbers.

Add new STM32 MPUs Part = STM32MP151F, STM32MP153F, STM32MP157F,
STM32MP151D, STM32MP153D, STM32MP157D

The STM32MP1 series is available in 3 different lines which are pin-to-pin
compatible:
- STM32MP157: Dual Cortex-A7 cores, Cortex-M4 core @ 209 MHz,
              3D GPU, DSI display interface and CAN FD
- STM32MP153: Dual Cortex-A7 cores, Cortex-M4 core @ 209 MHz
              and CAN FD
- STM32MP151: Single Cortex-A7 core, Cortex-M4 core @ 209 MHz

Each line comes with a security option (cryptography & secure boot)
& a Cortex-A frequency option :

- A      Basic + Cortex-A7 @ 650 MHz
- C      Secure Boot + HW Crypto + Cortex-A7 @ 650 MHz
- D      Basic + Cortex-A7 @ 800 MHz
- F      Secure Boot + HW Crypto + Cortex-A7 @ 800 MHz

Remove useless variable in stm32mp_is_single_core().

Change-Id: Id30c836af986c6340c91efa8a7ae9480a2827089
Signed-off-by: Lionel Debieve <lionel.debieve@st.com>
Signed-off-by: Yann Gautier <yann.gautier@st.com>
4 years agostm32mp1: support of STM32MP15x Rev.Z
Lionel Debieve [Tue, 25 Jun 2019 08:40:37 +0000 (10:40 +0200)]
stm32mp1: support of STM32MP15x Rev.Z

Add a new revision of STM32MP15x CPU (Rev.Z).

Change-Id: I227dd6d9b3fcc43270015cfb21f60aeb0a8ab658
Signed-off-by: Lionel Debieve <lionel.debieve@st.com>
Signed-off-by: Yann Gautier <yann.gautier@st.com>
4 years agostm32mp1: get peripheral base address from a define
Yann Gautier [Tue, 5 May 2020 15:58:40 +0000 (17:58 +0200)]
stm32mp1: get peripheral base address from a define

Retrieve peripheral base address from a define instead of
parsing the device tree. The goal is to improve execution time.

Signed-off-by: Pascal Paillet <p.paillet@st.com>
Signed-off-by: Yann Gautier <yann.gautier@st.com>
Change-Id: I2588c53ad3d4abcc3d7fe156458434a7940dd72b

4 years agostm32mp1: add finished good variant in board identifier
Patrick Delaunay [Wed, 8 Jan 2020 09:05:14 +0000 (10:05 +0100)]
stm32mp1: add finished good variant in board identifier

Update the board info with the new coding including the finished good
variant:

Board: MBxxxx Var<CPN>.<FG> Rev.<Rev>-<BOM>

The OTP 59 coding is:
bit [31:16] (hex) => MBxxxx
bit [15:12] (dec) => Variant CPN (1....15)
bit [11:8]  (dec) => Revision board (index with A = 1, Z = 26)
bit [7:4]   (dec) => Variant FG : finished good (NEW)
bit [3:0]   (dec) => BOM (01, .... 255)

Change-Id: I4fbc0c84596419d1bc30d166311444ece1d9123f
Signed-off-by: Patrick Delaunay <patrick.delaunay@st.com>
Signed-off-by: Yann Gautier <yann.gautier@st.com>
4 years agoMerge "Fix casting bug in gicv2_main.c" into integration
Madhukar Pappireddy [Mon, 12 Oct 2020 18:20:53 +0000 (18:20 +0000)]
Merge "Fix casting bug in gicv2_main.c" into integration

4 years agoIncrease type widths to satisfy width requirements
Jimmy Brisson [Tue, 4 Aug 2020 21:18:52 +0000 (16:18 -0500)]
Increase type widths to satisfy width requirements

Usually, C has no problem up-converting types to larger bit sizes. MISRA
rule 10.7 requires that you not do this, or be very explicit about this.
This resolves the following required rule:

    bl1/aarch64/bl1_context_mgmt.c:81:[MISRA C-2012 Rule 10.7 (required)]<None>
    The width of the composite expression "0U | ((mode & 3U) << 2U) | 1U |
    0x3c0U" (32 bits) is less that the right hand operand
    "18446744073709547519ULL" (64 bits).

This also resolves MISRA defects such as:

    bl2/aarch64/bl2arch_setup.c:18:[MISRA C-2012 Rule 12.2 (required)]
    In the expression "3U << 20", shifting more than 7 bits, the number
    of bits in the essential type of the left expression, "3U", is
    not allowed.

Further, MISRA requires that all shifts don't overflow. The definition of
PAGE_SIZE was (1U << 12), and 1U is 8 bits. This caused about 50 issues.
This fixes the violation by changing the definition to 1UL << 12. Since
this uses 32bits, it should not create any issues for aarch32.

This patch also contains a fix for a build failure in the sun50i_a64
platform. Specifically, these misra fixes removed a single and
instruction,

    92407e73        and     x19, x19, #0xffffffff

from the cm_setup_context function caused a relocation in
psci_cpus_on_start to require a linker-generated stub. This increased the
size of the .text section and caused an alignment later on to go over a
page boundary and round up to the end of RAM before placing the .data
section. This sectionn is of non-zero size and therefore causes a link
error.

The fix included in this reorders the functions during link time
without changing their ording with respect to alignment.

Change-Id: I76b4b662c3d262296728a8b9aab7a33b02087f16
Signed-off-by: Jimmy Brisson <jimmy.brisson@arm.com>
4 years agoMerge changes from topic "deprecated-macro" into integration
Manish Pandey [Mon, 12 Oct 2020 14:12:59 +0000 (14:12 +0000)]
Merge changes from topic "deprecated-macro" into integration

* changes:
  Makefile: Remove unused macro
  plat: brcm: Remove 'AARCH32' deprecated macro
  Remove deprecated macro from TF-A code

4 years agodrivers: stm32_fmc2_nand: fix boundary check for chip select
Lionel Debieve [Tue, 21 Jul 2020 13:22:55 +0000 (15:22 +0200)]
drivers: stm32_fmc2_nand: fix boundary check for chip select

Chip select is retrieved from device tree and check
must be done regarding the MAX_CS defined.

Signed-off-by: Lionel Debieve <lionel.debieve@st.com>
Reviewed-by: Christophe KERELLO <christophe.kerello@st.com>
Change-Id: I03144b133bd51a845a4794f0f6bbd9402fc04936

4 years agodrivers: stm32_fmc2_nand: move to new bindings
Christophe Kerello [Thu, 16 Jul 2020 14:57:34 +0000 (16:57 +0200)]
drivers: stm32_fmc2_nand: move to new bindings

FMC node bindings are modified to add EBI controller node.
FMC driver and associated device tree files are modified
to support these new bindings.

Change-Id: I4bf201e96a1aca20957e0dac3a3b87caadd05bdc
Signed-off-by: Christophe Kerello <christophe.kerello@st.com>
Signed-off-by: Lionel Debieve <lionel.debieve@st.com>
4 years agoMerge "intel: platform: Include GICv2 makefile" into integration
Manish Pandey [Mon, 12 Oct 2020 11:14:06 +0000 (11:14 +0000)]
Merge "intel: platform: Include GICv2 makefile" into integration

4 years agoMakefile: Remove unused macro
Manish V Badarkhe [Wed, 7 Oct 2020 20:15:27 +0000 (21:15 +0100)]
Makefile: Remove unused macro

Removed unused macro AARCH32 and AARCH64 from makefile

Change-Id: I6729e300f18d66dd7c6978d3bbd5a88937839c31
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
4 years agoplat: brcm: Remove 'AARCH32' deprecated macro
Manish V Badarkhe [Wed, 7 Oct 2020 17:53:23 +0000 (18:53 +0100)]
plat: brcm: Remove 'AARCH32' deprecated macro

Removed 'AARCH32' deprecated macro from 'stingray'
Broadcom platform code.

Change-Id: If8d9e785b7980fefd39df06547fcf71b899fd735
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
4 years agoRemove deprecated macro from TF-A code
Manish V Badarkhe [Wed, 7 Oct 2020 15:04:06 +0000 (16:04 +0100)]
Remove deprecated macro from TF-A code

Removed '__ASSEMBLY__' deprecated macro from TF-A code

Change-Id: I9082a568b695acb5b903f509db11c8672b62d9d0
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
4 years agoMerge "TF-A: Add HASH_ALG default value to defaults.mk" into integration
Manish Pandey [Mon, 12 Oct 2020 10:36:53 +0000 (10:36 +0000)]
Merge "TF-A: Add HASH_ALG default value to defaults.mk" into integration

4 years agoMerge "mediatek: mt8192: add GIC600 support" into integration
Manish Pandey [Mon, 12 Oct 2020 09:16:21 +0000 (09:16 +0000)]
Merge "mediatek: mt8192: add GIC600 support" into integration

4 years agoTF-A: Add HASH_ALG default value to defaults.mk
Alexei Fedorov [Tue, 6 Oct 2020 14:54:12 +0000 (15:54 +0100)]
TF-A: Add HASH_ALG default value to defaults.mk

This patch adds default value of 'sha256' for HASH_ALG
build flag to 'make_helpers\defaults.mk', according to
'docs\getting_started\build-options.rst'.
This fixes Measured Boot driver error when TF-A uses
default HASH_ALG value and TPM_HASH_ALG is set to
sha384 or sha512.

Change-Id: Id0aa34b54807de0adaf88e5f7d7032577c22f365
Signed-off-by: Alexei Fedorov <Alexei.Fedorov@arm.com>
4 years agodocs: marvell: update ddr3 build instructions
Pali Rohár [Wed, 7 Oct 2020 09:01:00 +0000 (11:01 +0200)]
docs: marvell: update ddr3 build instructions

Add information about 2GB variant of EspressoBin V5 and use Marvell git
branches which contain required fixes for EspressoBin.

Signed-off-by: Pali Rohár <pali@kernel.org>
Change-Id: I1db510f1576f4762259ad7b0c10024b8ab434a59

4 years agoFix casting bug in gicv2_main.c
johpow01 [Mon, 28 Sep 2020 21:56:48 +0000 (16:56 -0500)]
Fix casting bug in gicv2_main.c

In the function gicv2_set_spi_routing, the signed value proc_num is cast
to unsigned int before being compared to other unsigned values in two
assert calls.  The value proc_num can be a negative value, and once the
negative value is cast to unsigned it becomes a very large number which
will trigger the assert.  This patch changes the assert cast so that the
unsigned values are cast to signed instead, keeping the same functionality
but allowing proc_num to be negative.

This bug can be seen when running the SDEI RM_ANY routing mode test in
TFTF on the Juno platform.

This patch also makes the usage of the proc_num variable in other gicv2
functions more clear.

Signed-off-by: John Powell <john.powell@arm.com>
Change-Id: If1b98eebb00bd9b73862e5e995e5e68c168170a6

4 years agoMerge "Workaround for Cortex A77 erratum 1925769" into integration
Lauren Wehrmeister [Fri, 9 Oct 2020 19:17:23 +0000 (19:17 +0000)]
Merge "Workaround for Cortex A77 erratum 1925769" into integration

4 years agoDon't return error information from console_flush
Jimmy Brisson [Wed, 5 Aug 2020 18:44:05 +0000 (13:44 -0500)]
Don't return error information from console_flush

And from crash_console_flush.

We ignore the error information return by console_flush in _every_
place where we call it, and casting the return type to void does not
work around the MISRA violation that this causes. Instead, we collect
the error information from the driver (to avoid changing that API), and
don't return it to the caller.

Change-Id: I1e35afe01764d5c8f0efd04f8949d333ffb688c1
Signed-off-by: Jimmy Brisson <jimmy.brisson@arm.com>
4 years agoMerge "drivers: stm32_fmc2_nand: fix incorrect error detection" into integration
Manish Pandey [Fri, 9 Oct 2020 14:50:34 +0000 (14:50 +0000)]
Merge "drivers: stm32_fmc2_nand: fix incorrect error detection" into integration

4 years agoMerge changes I99a5d96f,I89b950f0 into integration
Manish Pandey [Fri, 9 Oct 2020 11:09:19 +0000 (11:09 +0000)]
Merge changes I99a5d96f,I89b950f0 into integration

* changes:
  lib/cpus: update MIDR value for rainier cpu
  fdts: enable virtio-rng component for morello fvp platform

4 years agolib/cpus: update MIDR value for rainier cpu
Jagadeesh Ujja [Wed, 7 Oct 2020 14:21:46 +0000 (19:51 +0530)]
lib/cpus: update MIDR value for rainier cpu

This patch updates the MIDR value for rainier cpu.

Change-Id: I99a5d96f757239cf65b2688095c4ec66cd991cf9
Signed-off-by: Jagadeesh Ujja <jagadeesh.ujja@arm.com>
4 years agoMerge changes from topic "stm32mp1_platform_mk" into integration
Manish Pandey [Fri, 9 Oct 2020 10:08:24 +0000 (10:08 +0000)]
Merge changes from topic "stm32mp1_platform_mk" into integration

* changes:
  stm32mp1: cosmetics in platform.mk
  stm32mp1: update rules for stm32image tool
  stm32mp1: add macros to define PLAT_PARTITION_MAX_ENTRIES
  stm32mp1: sort platform.mk
  stm32mp1: use ASFLAGS for binary paths
  stm32mp1: use internal MAKE_LD macro to generate stm32 linker files

4 years agostm32mp1: cosmetics in platform.mk
Yann Gautier [Fri, 18 Sep 2020 08:32:37 +0000 (10:32 +0200)]
stm32mp1: cosmetics in platform.mk

Remove some useless extra tabs or spaces.
Replace some spaces with tabs.

Change-Id: I0e8e2a1a1be7a1109ba7f3e3ae35e3fe1b5b4552
Signed-off-by: Yann Gautier <yann.gautier@st.com>
4 years agostm32mp1: update rules for stm32image tool
Yann Gautier [Fri, 18 Sep 2020 08:21:29 +0000 (10:21 +0200)]
stm32mp1: update rules for stm32image tool

In heavy parallel builds, it has sometimes been seen issues with the
tool not generated before it was needed. Change some rules order and
dependency to solve that.

Change-Id: I8f4b4f46a2ea0fe496bc66bca47c66d1c81d3c99
Signed-off-by: Yann Gautier <yann.gautier@st.com>