Home
last modified time | relevance | path

Searched +full:arm +full:- +full:platform (Results 1 – 25 of 888) sorted by relevance

12345678910>>...36

/openbmc/u-boot/arch/arm/
H A DKconfig1 menu "ARM architecture"
2 depends on ARM
5 default "arm"
14 bool "Generate position-independent pre-relocation code"
16 U-Boot expects to be linked to a specific hard-coded address, and to
20 information that is embedded into the binary to support U-Boot
21 relocating itself to the top-of-RAM later during execution.
28 U-Boot typically uses a hard-coded value for the stack pointer
30 initial SP at run-time. This is useful to avoid hard-coding addresses
31 into U-Boot, so that can be loaded and executed at arbitrary
[all …]
/openbmc/linux/arch/arm/mach-versatile/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
3 bool "ARM Ltd. Versatile family"
18 This enables support for ARM Ltd Versatile board.
21 bool "ARM Ltd. Integrator family"
37 Support for ARM's Integrator platform.
48 Include support for the ARM(R) Integrator/AP and
52 bool "Include support for Integrator/IM-PD1"
60 The IM-PD1 is an add-on logic module for the Integrator which
61 allows ARM(R) Ltd PrimeCells to be developed and evaluated.
62 The IM-PD1 can be found on the Integrator/PP2 platform.
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/
H A D0005-Fix-psa-api-crypto-test-no-243.patch2 From: Bence Balogh <bence.balogh@arm.com>
4 Subject: [PATCH 5/8] Fix psa-api-crypto-test no 243
7 PSA-API tests's `psa-api-crypto-test` number 243 as it is
8 required for Corstone-1000.
10 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/31177/1]
11 Signed-off-by: Emekcan Aras <emekcan.aras@arm.com>
12 Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
13 ---
14 platform/providers/arm/corstone1000/platform.cmake | 1 +
17 diff --git a/platform/providers/arm/corstone1000/platform.cmake b/platform/providers/arm/corstone10…
[all …]
H A D0018-Make-RSS-and-MHU-sizes-compile-time-definitions-user.patch2 From: Bence Balogh <bence.balogh@arm.com>
4 Subject: [PATCH] Make RSS and MHU sizes compile-time definitions
5 user-configurable
11 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/31178/1]
12 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
13 Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
14 ---
15 platform/providers/arm/corstone1000/platform.cmake | 6 ++++--
16 1 file changed, 4 insertions(+), 2 deletions(-)
18 diff --git a/platform/providers/arm/corstone1000/platform.cmake b/platform/providers/arm/corstone10…
[all …]
/openbmc/linux/Documentation/devicetree/bindings/arm/
H A Darm,realview.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/arm/arm,realview.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: ARM RealView Boards
10 - Linus Walleij <linus.walleij@linaro.org>
13 The ARM RealView series of reference designs were built to explore the ARM
14 11, Cortex A-8 and Cortex A-9 CPUs. This included new features compared to
22 - description: ARM RealView Emulation Baseboard (HBI-0140) was created
23 as a generic platform to test different FPGA designs, and has
[all …]
H A Dapple.yaml1 # SPDX-License-Identifier: GPL-2.0-only OR BSD-2-Clause
3 ---
4 $id: http://devicetree.org/schemas/arm/apple.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Apple ARM Machine
10 - Hector Martin <marcan@marcan.st>
13 ARM platforms using SoCs designed by Apple Inc., branded "Apple Silicon".
17 - Mac mini (M1, 2020)
18 - MacBook Pro (13-inch, M1, 2020)
19 - MacBook Air (M1, 2020)
[all …]
H A Darm,vexpress-juno.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/arm/arm,vexpress-juno.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: ARM Versatile Express and Juno Boards
10 - Sudeep Holla <sudeep.holla@arm.com>
11 - Linus Walleij <linus.walleij@linaro.org>
14 ARM's Versatile Express platform were built as reference designs for exploring
15 multicore Cortex-A class systems. The Versatile Express family contains both
30 "arm,vexpress" compatible was retained in the root node, and these are
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/
H A D0010-platform-CS1000-Add-multicore-support-for-FVP.patch2 From: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
4 Subject: [PATCH 10/10] platform: CS1000: Add multicore support for FVP
7 the Corstone-1000 FVP
9 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/29242]
10 Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
11 ---
12 .../target/arm/corstone1000/CMakeLists.txt | 6 +++
14 .../arm/corstone1000/tfm_hal_multi_core.c | 38 ++++++++++++++++++-
15 3 files changed, 48 insertions(+), 2 deletions(-)
17 diff --git a/platform/ext/target/arm/corstone1000/CMakeLists.txt b/platform/ext/target/arm/corstone…
[all …]
H A D0003-Platform-Corstone1000-Enable-firewall-in-FVP.patch2 From: Emekcan Aras <Emekcan.Aras@arm.com>
4 Subject: [PATCH 3/9] Platform: Corstone1000: Enable firewall in FVP
10 Signed-off-by: Emekcan Aras <Emekcan.Aras@arm.com>
11 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
12 Upstream-Status: Backport [4b5a9546205e484ac7f53cee369b1db9a7bf2279]
13 ---
14 .../Device/Include/platform_base_address.h | 2 +-
15 .../arm/corstone1000/bl1/boot_hal_bl1_1.c | 42 ++++---------------
16 .../arm/corstone1000/bl2/flash_map_bl2.c | 2 +-
17 3 files changed, 11 insertions(+), 35 deletions(-)
[all …]
H A D0012-Platform-CS1000-Increase-BL2-partition-size.patch2 From: Bence Balogh <bence.balogh@arm.com>
4 Subject: [PATCH] Platform: CS1000: Increase BL2 partition size
8 on Corstone-1000. The TF-M partition size has to be decreased for this.
12 Signed-off-by: Emekcan Aras <emekcan.aras@arm.com>
13 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
14 Upstream-Status: Backport [https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/30406]
15 ---
16 .../ext/target/arm/corstone1000/CMakeLists.txt | 9 ++++++---
17 .../target/arm/corstone1000/create-flash-image.sh | 14 ++++++++------
18 .../arm/corstone1000/partition/flash_layout.h | 4 ++--
[all …]
H A D0004-Platform-CS1000-Increase-ITS-max-asset-size.patch2 From: Emekcan Aras <emekcan.aras@arm.com>
4 Subject: [PATCH 4/9] Platform: CS1000: Increase ITS max asset size
5 MIME-Version: 1.0
6 Content-Type: text/plain; charset=UTF-8
7 Content-Transfer-Encoding: 8bit
12 Signed-off-by: Emekcan Aras <emekcan.aras@arm.com>
13 Signed-off-by: Vikas Katariya <vikas.katariya@arm.com>
14 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
15 Upstream-Status: Backport [2a7e418afc96a9c897d3511fd47dbe596f880074]
16 ---
[all …]
H A D0015-Platform-CS1000-Fix-platform-name-in-logs.patch2 From: Bence Balogh <bence.balogh@arm.com>
4 Subject: [PATCH] Platform: CS1000: Fix platform name in logs
6 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
7 Upstream-Status: Backport [c3fa68995b247c802589890c6ea3e721127b0c78]
8 ---
9 platform/ext/target/arm/corstone1000/bl2/boot_hal_bl2.c | 2 +-
10 1 file changed, 1 insertion(+), 1 deletion(-)
12 diff --git a/platform/ext/target/arm/corstone1000/bl2/boot_hal_bl2.c b/platform/ext/target/arm/cors…
14 --- a/platform/ext/target/arm/corstone1000/bl2/boot_hal_bl2.c
15 +++ b/platform/ext/target/arm/corstone1000/bl2/boot_hal_bl2.c
[all …]
H A D0008-Platform-CS1000-Increase-flash-PS-area-size.patch2 From: Ali Can Ozaslan <ali.oezaslan@arm.com>
4 Subject: [PATCH 8/9] Platform: CS1000: Increase flash PS area size
15 Signed-off-by: Ali Can Ozaslan <ali.oezaslan@arm.com>
16 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
17 Upstream-Status: Backport [3794ba29b66641ebecbd4dd3d9a2a2e8caeb690a]
18 ---
19 platform/ext/target/arm/corstone1000/partition/flash_layout.h | 2 +-
20 1 file changed, 1 insertion(+), 1 deletion(-)
22 diff --git a/platform/ext/target/arm/corstone1000/partition/flash_layout.h b/platform/ext/target/ar…
24 --- a/platform/ext/target/arm/corstone1000/partition/flash_layout.h
[all …]
H A D0017-Platform-CS1000-Remove-unused-BL1-files.patch2 From: Bence Balogh <bence.balogh@arm.com>
4 Subject: [PATCH 1/5] Platform: CS1000: Remove unused BL1 files
8 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
9 Upstream-Status: Pending [Not submitted to upstream yet]
10 ---
11 .../arm/corstone1000/bl1/CMakeLists.txt | 345 ------------------
12 .../arm/corstone1000/bl1/bl1_security_cnt.c | 75 ----
13 2 files changed, 420 deletions(-)
14 delete mode 100644 platform/ext/target/arm/corstone1000/bl1/CMakeLists.txt
15 delete mode 100644 platform/ext/target/arm/corstone1000/bl1/bl1_security_cnt.c
[all …]
H A D0014-Platform-CS1000-Add-crypto-configs-for-ADAC.patch2 From: Bence Balogh <bence.balogh@arm.com>
4 Subject: [PATCH] Platform: CS1000: Add crypto configs for ADAC
10 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
11 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/31132]
12 ---
13 platform/ext/target/arm/corstone1000/CMakeLists.txt | 12 ++++++++++++
16 diff --git a/platform/ext/target/arm/corstone1000/CMakeLists.txt b/platform/ext/target/arm/corstone…
18 --- a/platform/ext/target/arm/corstone1000/CMakeLists.txt
19 +++ b/platform/ext/target/arm/corstone1000/CMakeLists.txt
20 @@ -412,6 +412,18 @@ if (${PLATFORM_PSA_ADAC_SECURE_DEBUG})
[all …]
H A D0019-Platform-CS1000-Fix-compiler-switch-in-BL1.patch2 From: Bence Balogh <bence.balogh@arm.com>
4 Subject: [PATCH 3/5] Platform: CS1000: Fix compiler switch in BL1
10 tfm/cmake/spe-CMakeLists.cmake:
21 - Adds a new definition that is only added to the
23 - Fixes the #elif with no expression error that came up.
24 - Moves the partition table loading because previously it was not
27 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
28 Upstream-Status: Pending [Not submitted to upstream yet]
29 ---
30 .../target/arm/corstone1000/CMakeLists.txt | 7 ++++
[all …]
H A D0006-Platform-CS1000-Increase-buffers-for-EFI-vars.patch2 From: Bence Balogh <bence.balogh@arm.com>
4 Subject: [PATCH 6/9] Platform: CS1000: Increase buffers for EFI vars
10 - The PS_MAX_ASSET_SIZE needs to be big enough to store the variables.
11 - The CRYPTO_ENGINE_BUF_SIZE needs to be increased because the encryption
13 - The CRYPTO_IOVEC_BUFFER_SIZE needs to be increased because the PS
17 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
18 Upstream-Status: Backport [8ca9620a000ba182ebb51c51f49e2b97622f3404]
19 ---
20 platform/ext/target/arm/corstone1000/config_tfm_target.h | 8 ++++++++
23 diff --git a/platform/ext/target/arm/corstone1000/config_tfm_target.h b/platform/ext/target/arm/cor…
[all …]
H A D0011-Platform-CS1000-Fix-Bank-offsets.patch2 From: Bence Balogh <bence.balogh@arm.com>
4 Subject: [PATCH 9/9] Platform: CS1000: Fix Bank offsets
11 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
12 Upstream-Status: Backport [939a39a0705ed2571fe5b842a9d5f80036f71a12]
13 ---
14 .../ext/target/arm/corstone1000/partition/flash_layout.h | 6 ++----
15 1 file changed, 2 insertions(+), 4 deletions(-)
17 diff --git a/platform/ext/target/arm/corstone1000/partition/flash_layout.h b/platform/ext/target/ar…
19 --- a/platform/ext/target/arm/corstone1000/partition/flash_layout.h
20 +++ b/platform/ext/target/arm/corstone1000/partition/flash_layout.h
[all …]
H A D0005-Platform-CS1000-Increase-RSE_COMMS-buffer-size.patch2 From: Bence Balogh <bence.balogh@arm.com>
4 Subject: [PATCH 5/9] Platform: CS1000: Increase RSE_COMMS buffer size
10 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
11 Upstream-Status: Backport [85e7e9f52177c9617b8554fbacac34c8c591f549]
12 ---
13 .../ext/target/arm/corstone1000/rse_comms/rse_comms.h | 9 +++++++--
14 1 file changed, 7 insertions(+), 2 deletions(-)
16 diff --git a/platform/ext/target/arm/corstone1000/rse_comms/rse_comms.h b/platform/ext/target/arm/c…
18 --- a/platform/ext/target/arm/corstone1000/rse_comms/rse_comms.h
19 +++ b/platform/ext/target/arm/corstone1000/rse_comms/rse_comms.h
[all …]
H A D0021-platform-corstone1000-add-unique-guid-for-mps3.patch2 From: Anusmita Dutta Mazumder <anusmita.duttamazumder@arm.com>
4 Subject: [PATCH 03/10] platform: corstone1000: add unique guid for mps3
8 Upstream-Status: Inappropriate [Redesign of Capsule update interface is required]
9 Signed-off-by: Anusmita Dutta Mazumder <anusmita.duttamazumder@arm.com>
10 ---
11 .../target/arm/corstone1000/fw_update_agent/fwu_agent.c | 8 +++++++-
12 1 file changed, 7 insertions(+), 1 deletion(-)
14 diff --git a/platform/ext/target/arm/corstone1000/fw_update_agent/fwu_agent.c b/platform/ext/target…
16 --- a/platform/ext/target/arm/corstone1000/fw_update_agent/fwu_agent.c
17 +++ b/platform/ext/target/arm/corstone1000/fw_update_agent/fwu_agent.c
[all …]
H A D0016-Platform-corstone1000-Fix-isolation-L2-memory-protection.patch2 From: Jamie Fox <jamie.fox@arm.com>
4 Subject: [PATCH] Platform: corstone1000: Fix isolation L2 memory protection
6 The whole of the SRAM was configured unprivileged on this platform, so
11 so that the App RoT sub-region overlapping S_DATA has a higher region
12 number and so takes priority in the operation of the Armv6-M MPU.
14 Signed-off-by: Jamie Fox <jamie.fox@arm.com>
15 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/30951]
16 ---
17 .../arm/corstone1000/tfm_hal_isolation.c | 43 +++++++++----------
18 1 file changed, 21 insertions(+), 22 deletions(-)
[all …]
/openbmc/linux/drivers/pinctrl/qcom/
H A DKconfig.msm1 # SPDX-License-Identifier: GPL-2.0-only
6 depends on ARM || COMPILE_TEST
9 Qualcomm TLMM block found in the Qualcomm APQ8064 platform.
13 depends on ARM || COMPILE_TEST
16 Qualcomm TLMM block found in the Qualcomm APQ8084 platform.
20 depends on ARM || COMPILE_TEST
23 Qualcomm TLMM block found in the Qualcomm IPQ4019 platform.
31 Qualcomm Technologies Inc. IPQ5018 platform. Select this for
36 depends on ARM || COMPILE_TEST
39 Qualcomm TLMM block found in the Qualcomm IPQ8064 platform.
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/
H A Drelease-notes.rst2 # Copyright (c) 2022-2024, Arm Limited.
4 # SPDX-License-Identifier: MIT
16 of Your Software and Your Hardware designed or modified using the Arm Tools,
18 intended for safety-critical applications. Should Your Software or Your Hardware
23 Release notes - 2024.11
29 Release notes - 2024.06
33 ---------------------------
35 - Use Ethernet over VirtIO due to lan91c111 Ethernet driver support dropped from U-Boot.
36- Due to the performance uplimit of MPS3 FPGA and FVP, some Linux distros like Fedora Rawhide can …
37 - Corstone-1000 SoC on FVP doesn't have a secure debug peripheral. It does on the MPS3.
[all …]
/openbmc/openbmc/meta-arm/documentation/
H A Dtrusted-services.md1 # The Trusted Services: framework for developing root-of-trust services
3 meta-arm layer includes recipes for [Trusted Services][^1] Secure Partitions and Normal World appli…
4 in `meta-arm/recipes-security/trusted-services`
10 These files are automatically included into optee-os image accordingly to defined MACHINE_FEATURES.
14 To include TS SPs into optee-os image you need to add into MACHINE_FEATURES
18 | ----------------- | --------------- |
19 | Attestation | ts-attesation |
20 | Crypto | ts-crypto |
21 | Firmware Update | ts-fwu
22 | Internal Storage | ts-its |
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/files/corstone1000/
H A D0006-feat-corstone1000-include-platform-header-file.patch2 From: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
4 Subject: [PATCH] fix(corstone1000): include platform header file
6 Include platform.h file in order to remove compiler warnings
8 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/29727]
9 Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
10 ---
11 plat/arm/board/corstone1000/common/corstone1000_pm.c | 1 +
14 diff --git a/plat/arm/board/corstone1000/common/corstone1000_pm.c b/plat/arm/board/corstone1000/com…
16 --- a/plat/arm/board/corstone1000/common/corstone1000_pm.c
17 +++ b/plat/arm/board/corstone1000/common/corstone1000_pm.c
[all …]

12345678910>>...36