| #
0a33adc0 |
| 21-Dec-2023 |
Govindraj Raja <govindraj.raja@arm.com> |
refactor(mte): deprecate CTX_INCLUDE_MTE_REGS
Currently CTX_INCLUDE_MTE_REGS is used for dual purpose, to enable allocation tags register and to context save and restore them and also to check if mt
refactor(mte): deprecate CTX_INCLUDE_MTE_REGS
Currently CTX_INCLUDE_MTE_REGS is used for dual purpose, to enable allocation tags register and to context save and restore them and also to check if mte feature is available.
To make it more meaningful, remove CTX_INCLUDE_MTE_REGS and introduce FEAT_MTE. This would enable allocation tags register when FEAT_MTE is enabled and also supported from platform.
Also arch features can be conditionally enabled disabled based on arch version from `make_helpers/arch_features.mk`
Change-Id: Ibdd2d43874634ad7ddff93c7edad6044ae1631ed Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| #
1685b420 |
| 15-Jan-2024 |
Chris Kay <chris.kay@arm.com> |
build: remove the `NM` variable
No part of the build system uses the `NM` variable, which is usually used to dump symbol tables from compiled images. This change removes all declarations of it.
Cha
build: remove the `NM` variable
No part of the build system uses the `NM` variable, which is usually used to dump symbol tables from compiled images. This change removes all declarations of it.
Change-Id: I796ff365e6a7f97d21678f1c8cf8b59bfbb1ae9c Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| #
7e387589 |
| 15-Jan-2024 |
Chris Kay <chris.kay@arm.com> |
build: prefer `gcc-ar` over `ar`
The `gcc-ar` wrapper exists to make it easier to support LTO on some versions of GCC. The two commands are compatible, accepting exactly the same arguments, so this
build: prefer `gcc-ar` over `ar`
The `gcc-ar` wrapper exists to make it easier to support LTO on some versions of GCC. The two commands are compatible, accepting exactly the same arguments, so this change moves us to `gcc-ar` to ensure that we are configuring LTO correctly.
Change-Id: I24a4cfaad29d35b09f847299081f83ca9b41aa8a Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| #
86e489c1 |
| 16-Jan-2024 |
Chris Kay <chris.kay@arm.com> |
build: add `--no-warn-rwx-segments` when linking with GCC
This flag is currently not included when linking with BFD via GCC. Without it, builds can fail when linking via GCC.
Change-Id: Id37e05f6fb
build: add `--no-warn-rwx-segments` when linking with GCC
This flag is currently not included when linking with BFD via GCC. Without it, builds can fail when linking via GCC.
Change-Id: Id37e05f6fb4eea4620861eb1bc8668c41f21ba20 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| #
781cb314 |
| 15-Jan-2024 |
Chris Kay <chris.kay@arm.com> |
build: always use the C compiler to preprocess
We're a bit inconsistent about which tool we use to preprocess source files; in some places we use `$(CC) -E` whilst in others we use `cpp`.
This chan
build: always use the C compiler to preprocess
We're a bit inconsistent about which tool we use to preprocess source files; in some places we use `$(CC) -E` whilst in others we use `cpp`.
This change forces all invocations of the C preprocessor to use the first scheme, which ensures that the preprocessor behaves the same way as the C compiler used when compiling C source files.
Change-Id: Iede2f25ff86ea8b43d7a523e32648058d5023832 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| #
928d737c |
| 02-Jan-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(context-mgmt): report context memory usage" into integration
|
| #
bfef8b90 |
| 08-Nov-2023 |
Juan Pablo Conde <juanpablo.conde@arm.com> |
feat(context-mgmt): report context memory usage
This patch provides a reporting functionality to display the memory consumed by the context in each security state and for each exception level. Flag
feat(context-mgmt): report context memory usage
This patch provides a reporting functionality to display the memory consumed by the context in each security state and for each exception level. Flag PLATFORM_REPORT_CTX_MEM_USE enables or disables this feature.
Change-Id: I1515366bf87561dcedf2b3206be167804df681d4 Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com> Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| #
e631ac3b |
| 29-Dec-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "build(mpam): add new build option CTX_INCLUDE_MPAM_REGS" into integration
|
| #
9acff28a |
| 06-Oct-2023 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
build(mpam): add new build option CTX_INCLUDE_MPAM_REGS
New build option CTX_INCLUDE_MPAM_REGS is added to select if the firmware needs to save the MPAM EL2 registers during world switches. This opt
build(mpam): add new build option CTX_INCLUDE_MPAM_REGS
New build option CTX_INCLUDE_MPAM_REGS is added to select if the firmware needs to save the MPAM EL2 registers during world switches. This option is currently disabled as MPAM is only enabled for NS world.
Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: Ie2e5e184cdb65f7e1a98d8fe81590253fd859679
show more ...
|
| #
8ddb02d5 |
| 30-Nov-2023 |
André Przywara <andre.przywara@arm.com> |
Merge changes from topic "fix-lto-build" into integration
* changes: fix(build): don't generate build-id fix(build): add forgotten BL_LDFLAGS to lto command line feat(build): check that .text
Merge changes from topic "fix-lto-build" into integration
* changes: fix(build): don't generate build-id fix(build): add forgotten BL_LDFLAGS to lto command line feat(build): check that .text section starts at page boundary
show more ...
|
| #
ad866942 |
| 28-Nov-2023 |
Mark Dykes <mark.dykes@arm.com> |
Merge "feat(security): add support for SLS mitigation" into integration
|
| #
5fddf53c |
| 23-Nov-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "mb/deprecate-rss-for-fvp" into integration
* changes: refactor(fvp): remove RSS usage refactor(rss)!: remove PLAT_RSS_NOT_SUPPORTED build option
|
| #
b6c09484 |
| 22-Nov-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "docs(changelog): changelog for v2.10 release" into integration
|
| #
98735809 |
| 21-Nov-2023 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
docs(changelog): changelog for v2.10 release
Added changelog for v2.10 release.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com>
docs(changelog): changelog for v2.10 release
Added changelog for v2.10 release.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com> Change-Id: Id06263047fcc1ec60e82f85cd09e2e4bc95830f5
show more ...
|
| #
538516f5 |
| 28-Sep-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
feat(security): add support for SLS mitigation
This patch enables support for the gcc compiler option "-mharden-sls", the default is not to use this option. Setting HARDEN_SLS=1 sets "-mharden-sls=a
feat(security): add support for SLS mitigation
This patch enables support for the gcc compiler option "-mharden-sls", the default is not to use this option. Setting HARDEN_SLS=1 sets "-mharden-sls=all" that enables all hardening against straight line speculation.
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: I59f5963c22431571f5aebe7e0c5642b32362f4c9
show more ...
|
| #
ccd8c023 |
| 21-Nov-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "Revert "docs(changelog): changelog for v2.10 release"" into integration
|
| #
256c1c60 |
| 21-Nov-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Revert "docs(changelog): changelog for v2.10 release"
This reverts commit 0abbfab320344d4f2110e95d64863a3e82a51ec9.
Reason for revert: Changelog was based on rc0 tag but we got few more patches aft
Revert "docs(changelog): changelog for v2.10 release"
This reverts commit 0abbfab320344d4f2110e95d64863a3e82a51ec9.
Reason for revert: Changelog was based on rc0 tag but we got few more patches after that which were not captured.
Change-Id: I9829f2b6dc09f0bd5c538845cbae051f6e4c8a75
show more ...
|
| #
b8a01c99 |
| 20-Nov-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
Merge "docs(changelog): changelog for v2.10 release" into integration
|
| #
0abbfab3 |
| 10-Nov-2023 |
Juan Pablo Conde <juanpablo.conde@arm.com> |
docs(changelog): changelog for v2.10 release
Change-Id: I44b88c3232d099b85ff71ee14c4918c4f8180146 Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com>
|
| #
878354a8 |
| 07-Nov-2023 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
refactor(rss)!: remove PLAT_RSS_NOT_SUPPORTED build option
Removed the PLAT_RSS_NOT_SUPPORTED build option, which was initially introduced for building the Base AEM FVP platform platform with RSS. H
refactor(rss)!: remove PLAT_RSS_NOT_SUPPORTED build option
Removed the PLAT_RSS_NOT_SUPPORTED build option, which was initially introduced for building the Base AEM FVP platform platform with RSS. However, we now have a well-defined TC2 platform with RSS, making it unnecessary to keep this flag.
Note - Theoretically this is a breaking change. Other platforms could be using the PLAT_RSS_NOT_SUPPORTED build option. Among upstream platforms, only the Base AEM FVP uses it right now but we don't know about downstream platforms.
Change-Id: I931905a4c6ac1ebe3895ab6e0287d0fa07721707 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| #
31a815db |
| 08-Nov-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "sb/remove-cryptocell" into integration
* changes: chore(npcm845x): remove CryptoCell-712/713 support chore(auth)!: remove CryptoCell-712/713 support
|
| #
b65dfe40 |
| 26-Oct-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
chore(auth)!: remove CryptoCell-712/713 support
CryptoCell-712 and CryptoCell-713 drivers have been deprecated since TF-A v2.9 and their removal was announced for TF-A v2.10 release. See [1].
As th
chore(auth)!: remove CryptoCell-712/713 support
CryptoCell-712 and CryptoCell-713 drivers have been deprecated since TF-A v2.9 and their removal was announced for TF-A v2.10 release. See [1].
As the release is approaching, this patch deletes these drivers' code as well as all references to them in the documentation and Arm platforms code (Nuvoton platform is taken care in a subsequent patch). Associated build options (ARM_CRYPTOCELL_INTEG and PLAT_CRYPTOCELL_BASE) have also been removed and thus will have no effect if defined.
This is a breaking change for downstream platforms which use these drivers.
[1] https://trustedfirmware-a.readthedocs.io/en/v2.9/about/release-information.html#removal-of-deprecated-drivers Note that TF-A v3.0 release later got renumbered into v2.10.
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com> Change-Id: Idabbc9115f6732ac1a0e52b273d3380677a39813
show more ...
|
| #
e5e39c35 |
| 07-Nov-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "refactor(cm): introduce INIT_UNUSED_NS_EL2 macro" into integration
|
| #
c1701c8e |
| 07-Nov-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "ns/spmc_at_el3" into integration
* changes: feat(sgi): increase sp memmap size feat(build): include plat header in fdt build feat(docs): save BL32 image base and size
Merge changes from topic "ns/spmc_at_el3" into integration
* changes: feat(sgi): increase sp memmap size feat(build): include plat header in fdt build feat(docs): save BL32 image base and size in entry point info feat(arm): save BL32 image base and size in entry point info
show more ...
|
| #
e03dcc8f |
| 15-Aug-2022 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(build): include plat header in fdt build
Include platform headers in DT build to enable build time configuration of number of execution context supported by the platform.
Signed-off-by: Nishan
feat(build): include plat header in fdt build
Include platform headers in DT build to enable build time configuration of number of execution context supported by the platform.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: I5b9ffc9865f198a1f802fcb5e0950a5fabb48727
show more ...
|