| #
ee9cfacc |
| 07-May-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "makefile-cleanup" into integration
* changes: build: improve diagnostics for unrecognized toolchain tools build(rzg): separate BL2 and BL31 SREC generation build(rcar
Merge changes from topic "makefile-cleanup" into integration
* changes: build: improve diagnostics for unrecognized toolchain tools build(rzg): separate BL2 and BL31 SREC generation build(rcar): separate BL2 and BL31 SREC generation build: separate preprocessing from DTB compilation build: remove `MAKE_BUILD_STRINGS` function
show more ...
|
| #
758ccb80 |
| 08-Mar-2024 |
Chris Kay <chris.kay@arm.com> |
build: remove `MAKE_BUILD_STRINGS` function
This function causes the build message to be generated and compiled in two different ways, with one way done inside `build_macros.mk` and the other done i
build: remove `MAKE_BUILD_STRINGS` function
This function causes the build message to be generated and compiled in two different ways, with one way done inside `build_macros.mk` and the other done inside `windows.mk`, mostly because it's done by generating the C file on the command line.
We can instead replace this whole build message generation sequence with a simple standard C compilation command and a normal C file.
Change-Id: I8bc136380c9585ddeec9a11154ee39ef70526f81 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| #
0ad935f7 |
| 22-Jun-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "ffa_el3_spmc_fixes" into integration
* changes: fix(tsp): fix destination ID in direct request fix(el3-spm): fix LSP direct message response fix(el3-spm): improve dir
Merge changes from topic "ffa_el3_spmc_fixes" into integration
* changes: fix(tsp): fix destination ID in direct request fix(el3-spm): fix LSP direct message response fix(el3-spm): improve direct messaging validation
show more ...
|
| #
ed23d274 |
| 15-Nov-2022 |
Marc Bonnici <marc.bonnici@arm.com> |
fix(tsp): fix destination ID in direct request
Ensure the TSP ID is set as the source ID in a direct request.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: Ia082fe5a1da6f2994072ec70
fix(tsp): fix destination ID in direct request
Ensure the TSP ID is set as the source ID in a direct request.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: Ia082fe5a1da6f2994072ec70c6ba818212a52f20
show more ...
|
| #
ec1c00a7 |
| 10-Feb-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(tsp): loop / crash if mmap of region fails" into integration
|
| #
8c353e00 |
| 23-Jan-2023 |
Thomas Viehweger <Thomas.Viehweger@rohde-schwarz.com> |
fix(tsp): loop / crash if mmap of region fails
In test_memory_send the variable i is of unsigned type, so it is never negative. If i is 0, the result of i-- is 4294967295. Don't know what happens if
fix(tsp): loop / crash if mmap of region fails
In test_memory_send the variable i is of unsigned type, so it is never negative. If i is 0, the result of i-- is 4294967295. Don't know what happens if trying to access composite->address_range_array[4294967295]. Made i a signed integer.
Signed-off-by: Thomas Viehweger <Thomas.Viehweger@rohde-schwarz.com> Change-Id: I8b4e532749b5e86e4b5acd238e72c3f88e309ff2
show more ...
|
| #
4e025c63 |
| 13-Dec-2022 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "ffa_el3_spmc_fixes" into integration
* changes: fix(tsp): use verbose for power logs fix(el3-spmc): fix coverity scan warnings fix(el3-spmc): improve bound check for
Merge changes from topic "ffa_el3_spmc_fixes" into integration
* changes: fix(tsp): use verbose for power logs fix(el3-spmc): fix coverity scan warnings fix(el3-spmc): improve bound check for descriptor
show more ...
|
| #
3354915f |
| 08-Dec-2022 |
Shruti Gupta <shruti.gupta@arm.com> |
fix(tsp): use verbose for power logs
TSP use verbose for cpu suspend resume logs
Signed-off-by: Shruti Gupta <shruti.gupta@arm.com> Change-Id: Ic1d3706feec6361946dd5c0d2bea90a2dd7a2d02
|
| #
1543d17b |
| 25-Aug-2022 |
Shruti Gupta <shruti.gupta@arm.com> |
fix(el3-spmc): fix coverity scan warnings
Validate emad descriptor integrity before accessing. Check for NULL pointer access.
Signed-off-by: Shruti Gupta <shruti.gupta@arm.com> Change-Id: Id4ff3e5d
fix(el3-spmc): fix coverity scan warnings
Validate emad descriptor integrity before accessing. Check for NULL pointer access.
Signed-off-by: Shruti Gupta <shruti.gupta@arm.com> Change-Id: Id4ff3e5d88be95ca8d067378e344947880ec984b
show more ...
|
| #
0c0bab0c |
| 25-Aug-2022 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "ffa_el3_spmc" into integration
* changes: feat(tsp): enable test cases for EL3 SPMC feat(tsp): increase stack size for tsp feat(tsp): add ffa_helpers to enable more F
Merge changes from topic "ffa_el3_spmc" into integration
* changes: feat(tsp): enable test cases for EL3 SPMC feat(tsp): increase stack size for tsp feat(tsp): add ffa_helpers to enable more FF-A functionality
show more ...
|
| #
15ca1ee3 |
| 23-Dec-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(tsp): enable test cases for EL3 SPMC
Introduce initial test cases to the TSP which are designed to be exercised by the FF-A Test Driver in the Normal World. These have been designed to test bas
feat(tsp): enable test cases for EL3 SPMC
Introduce initial test cases to the TSP which are designed to be exercised by the FF-A Test Driver in the Normal World. These have been designed to test basic functionality of the EL3 SPMC.
These tests currently ensure the following functionality: - Partition discovery. - Direct messaging. - Communication with a Logical SP. - Memory Sharing and Lending ABIs - Sharing of contiguous and non-contiguous memory regions. - Memory region descriptors spread of over multiple invocations.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Signed-off-by: Shruti Gupta <shruti.gupta@arm.com> Change-Id: Iaee4180aa18d6b7ac7b53685c6589f0ab306e876
show more ...
|
| #
19037a71 |
| 24-Aug-2022 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "ffa_el3_spmc" into integration
* changes: feat(tsp): add FF-A support to the TSP feat(fvp/tsp_manifest): add example manifest for TSP fix(spmc): fix relinquish valida
Merge changes from topic "ffa_el3_spmc" into integration
* changes: feat(tsp): add FF-A support to the TSP feat(fvp/tsp_manifest): add example manifest for TSP fix(spmc): fix relinquish validation check
show more ...
|
| #
4a8bfdb9 |
| 04-Oct-2021 |
Achin Gupta <achin.gupta@arm.com> |
feat(tsp): add FF-A support to the TSP
This patch adds the FF-A programming model in the test secure payload to ensure that it can be used to test the following spec features.
1. SP initialisation
feat(tsp): add FF-A support to the TSP
This patch adds the FF-A programming model in the test secure payload to ensure that it can be used to test the following spec features.
1. SP initialisation on the primary and secondary cpus. 2. An event loop to receive direct requests and respond with direct responses. 3. Ability to receive messages that indicate power on and off of a cpu. 4. Ability to handle a secure interrupt.
Signed-off-by: Achin Gupta <achin.gupta@arm.com> Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Signed-off-by: Shruti <shruti.gupta@arm.com> Change-Id: I81cf744904d5cdc0b27862b5e4bc6f2cfe58a13a
show more ...
|