| ff342643 | 19-Sep-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(cpus): workaround for Neoverse V2 erratum 2779510
Neoverse V2 erratum 2779510 is a Cat B erratum that applies to all revisions <= r0p1 and is fixed in r0p2. The workaround is to set bit[47] of C
fix(cpus): workaround for Neoverse V2 erratum 2779510
Neoverse V2 erratum 2779510 is a Cat B erratum that applies to all revisions <= r0p1 and is fixed in r0p2. The workaround is to set bit[47] of CPUACTLR3_EL1 which might have a small impact on power and negligible impact on performance.
SDEN documentation: https://developer.arm.com/documentation/SDEN2332927/latest
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: I6d937747bdcbf2913a64c4037f99918cbc466e80
show more ...
|
| b0114025 | 18-Sep-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(cpus): workaround for Neoverse V2 erratum 2719105
Neoverse V2 erratum 2719105 is a Cat B erratum that applies to all revisions <= r0p1 and is fixed in r0p2.
The erratum is avoided by setting CP
fix(cpus): workaround for Neoverse V2 erratum 2719105
Neoverse V2 erratum 2719105 is a Cat B erratum that applies to all revisions <= r0p1 and is fixed in r0p2.
The erratum is avoided by setting CPUACTLR2_EL1[0] to 1 to force PLDW/PFRM ST to behave like PLD/PRFM LD and not cause invalidations to other PE caches. There might be a small performance degradation to this workaround for certain workloads that share data.
SDEN documentation: https://developer.arm.com/documentation/SDEN2332927/latest
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: Id026edcb7ee1ca93371ce0001d18f5a8282c49ba
show more ...
|
| 8852fb5b | 18-Sep-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(cpus): workaround for Neoverse V2 erratum 2331132
Neoverse V2 erratum 2331132 is a Cat B erratum that applies to all revisions <= r0p2 and is still open. The workaround is to write the value 4'b
fix(cpus): workaround for Neoverse V2 erratum 2331132
Neoverse V2 erratum 2331132 is a Cat B erratum that applies to all revisions <= r0p2 and is still open. The workaround is to write the value 4'b1001 to the PF_MODE bits in the IMP_CPUECTLR2_EL1 register which will place the data prefetcher in the most conservative mode instead of disabling it.
SDEN documentation: https://developer.arm.com/documentation/SDEN2332927/latest
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: Ic6c76375df465a4ad2e20dd7add7037477d973c1
show more ...
|
| 57b557d0 | 18-Sep-2023 |
Mark Dykes <mark.dykes@arm.com> |
Merge "refactor(cpufeat): refactor arch feature build options" into integration |
| 140d8909 | 10-Aug-2023 |
Xueliang Zhong <xueliang.zhong@arm.com> |
docs(maintainers): update corstone1000 maintainers
Update maintainers list for corstone1000 platform.
Signed-off-by: Xueliang Zhong <xueliang.zhong@arm.com> Change-Id: I779e3717f6a6e19d32e8568eda05
docs(maintainers): update corstone1000 maintainers
Update maintainers list for corstone1000 platform.
Signed-off-by: Xueliang Zhong <xueliang.zhong@arm.com> Change-Id: I779e3717f6a6e19d32e8568eda05204cd46f35ea
show more ...
|
| f5211420 | 17-Aug-2023 |
Govindraj Raja <govindraj.raja@arm.com> |
refactor(cpufeat): refactor arch feature build options
Current build infra defaults all cpufeats in defaults.mk and some mandatory features are enabled in arch_features.mk and optional arch features
refactor(cpufeat): refactor arch feature build options
Current build infra defaults all cpufeats in defaults.mk and some mandatory features are enabled in arch_features.mk and optional arch features are enabled in platform specific makefile. This fragmentation is sometime confusing to figure out which feature is tied to which ARCH_MAJOR.ARCH_MINOR.
So, consolidating and grouping them for tracking and enabling makes more sense. With this change we consolidate all ARCH feature handling within arch_features.mk and disable all optional features that need to be enabled to platform makefile.
This is an ongoing series of effort to consolidate and going forward platform makefile should just specify ARCH_MAJOR and ARCH MINOR and all mandatory feature should be selected based on arch_features.mk any optional feature needed by the platform support can be enabled by platform makefile.
It also makes it easier for platform ports to look upto arch_features.mk and enable any optional feature that platform may need which are supported from TF-A.
Change-Id: I18764008856d81414256b6cbabdfa42a16b8040d Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| cc933e1d | 15-Sep-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "stm32mp2" into integration
* changes: feat(stm32mp2): generate stm32 file feat(stm32mp2-fdts): add stm32mp257f-ev1 board feat(stm32mp2-fdts): introduce stm32mp25 pinc
Merge changes from topic "stm32mp2" into integration
* changes: feat(stm32mp2): generate stm32 file feat(stm32mp2-fdts): add stm32mp257f-ev1 board feat(stm32mp2-fdts): introduce stm32mp25 pinctrl files feat(stm32mp2-fdts): introduce stm32mp25 SoCs family feat(stm32mp2): add console configuration feat(st): add RCC registers list feat(st-uart): add AARCH64 stm32_console driver feat(st): introduce new platform STM32MP2 feat(dt-bindings): add the STM32MP2 clock and reset bindings docs(changelog): add scopes for STM32MP2 feat(docs): introduce STM32MP2 doc refactor(docs): add a sub-menu for ST platforms refactor(st): move plat_image_load.c refactor(st): rename PLAT_NB_FIXED_REGS refactor(st): move some storage definitions to common part refactor(st): move SDMMC definitions to driver feat(st-clock): stub fdt_get_rcc_secure_state feat(st-clock): allow aarch64 compilation of STGEN functions feat(st): allow AARCH64 compilation for common code refactor(st): rename QSPI macros
show more ...
|
| f1ed218a | 12-Sep-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "feat(mbedtls): update to 3.4.1" into integration |
| 13ff6e9d | 12-Sep-2023 |
Michal Simek <michal.simek@amd.com> |
chore: remove MULTI_CONSOLE_API references
MULTI_CONSOLE_API have been removed long time ago by commit 5b6ebeec9c99 ("Remove MULTI_CONSOLE_API flag and references to it") that's why remove reference
chore: remove MULTI_CONSOLE_API references
MULTI_CONSOLE_API have been removed long time ago by commit 5b6ebeec9c99 ("Remove MULTI_CONSOLE_API flag and references to it") that's why remove references in platform.mk files and also in one rst which is not valid anymore.
Change-Id: I45f8e7db0a14ce63de62509100d8159b7aca2657 Signed-off-by: Michal Simek <michal.simek@amd.com>
show more ...
|
| 2e20069b | 12-Sep-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "docs(maintainers): add maintainers for i.MX9 SoCs" into integration |
| e686cdb4 | 11-Sep-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
feat(mbedtls): update to 3.4.1
Update TF-A documentation to recommend using the latest and greatest release of mbedTLS library to this date, i.e. version 3.4.1. The upgrade was successfully tested b
feat(mbedtls): update to 3.4.1
Update TF-A documentation to recommend using the latest and greatest release of mbedTLS library to this date, i.e. version 3.4.1. The upgrade was successfully tested by the OpenCI running all existing test configs, in particular trusted boot and measured boot related ones.
The reason for this upgrade is simply to obey TF-A's guideline to always use up-to-date security libraries. mbedTLS 3.4.1 release notes [1] do not list any changes that should affect TF-A.
[1] https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.4.1
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com> Change-Id: Ifc31c2fc825a2fc9ca318ea8baadd51b670e7a4e
show more ...
|
| e99df5c2 | 08-Sep-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
Merge changes from topic "sm/errata_X3" into integration
* changes: fix(cpus): workaround for Cortex-X3 erratum 2742421 feat(errata_abi): add support for Cortex-X3 |
| 77fc89fd | 08-Sep-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(docs): replace deprecated urls under tfa/docs" into integration |
| ee5076f9 | 17-Mar-2023 |
Yann Gautier <yann.gautier@foss.st.com> |
feat(docs): introduce STM32MP2 doc
STM32MP2x is a new family of microprocessors designed by STMicroelectronics and based on Arm Cortex-A35.
Signed-off-by: Yann Gautier <yann.gautier@foss.st.com> Ch
feat(docs): introduce STM32MP2 doc
STM32MP2x is a new family of microprocessors designed by STMicroelectronics and based on Arm Cortex-A35.
Signed-off-by: Yann Gautier <yann.gautier@foss.st.com> Change-Id: I741ed0a701a614817a4d0b65d3d6f4e6a79da6a9
show more ...
|
| ce7f8044 | 14-Jun-2023 |
Yann Gautier <yann.gautier@st.com> |
refactor(docs): add a sub-menu for ST platforms
In order to ease introduction of new STM32 MPUs platforms, a dedicated ST sub-menu (and directory) is created. The old page is kept, but with an orpha
refactor(docs): add a sub-menu for ST platforms
In order to ease introduction of new STM32 MPUs platforms, a dedicated ST sub-menu (and directory) is created. The old page is kept, but with an orphan parameter to avoid build issues with the docs, and to avoid listing it in the menu. It is updated to just have links with the new pages. A new page STM32 MPUs is created to group common options for all STM32 MPUs.
Signed-off-by: Yann Gautier <yann.gautier@foss.st.com> Change-Id: I799b57967d76a985835c7a3d9d6ab21beb44ba40
show more ...
|
| 5b0e4438 | 05-Sep-2023 |
Sona Mathew <sonarebecca.mathew@arm.com> |
fix(cpus): workaround for Cortex-X3 erratum 2742421
Cortex-X3 erratum 2742421 is a Cat B erratum that applies to all revisions <= r1p1 and is fixed in r1p2. The workaround is to set CPUACTLR5_EL1[56
fix(cpus): workaround for Cortex-X3 erratum 2742421
Cortex-X3 erratum 2742421 is a Cat B erratum that applies to all revisions <= r1p1 and is fixed in r1p2. The workaround is to set CPUACTLR5_EL1[56:55] to 2'b01.
SDEN documentation: https://developer.arm.com/documentation/2055130/latest
Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com> Change-Id: Idadd323e419739fe909b9b68ea2dbe857846666b
show more ...
|
| 5fdf198c | 14-Aug-2023 |
Thaddeus Serna <thaddeus.gonzalez-serna@arm.com> |
fix(docs): replace deprecated urls under tfa/docs
Fixed internal links refrenced inside tfa/docs. Followed https://www.sphinx-doc.org/en/master/usage/restructuredtext/roles.html#ref-role for instrus
fix(docs): replace deprecated urls under tfa/docs
Fixed internal links refrenced inside tfa/docs. Followed https://www.sphinx-doc.org/en/master/usage/restructuredtext/roles.html#ref-role for instrustion on how to link sections within other documents.
Signed-off-by: Thaddeus Serna <thaddeus.gonzalez-serna@arm.com> Change-Id: I8e7c090d98951b1e3d393ab5b1d6bcdaa1865c6f
show more ...
|
| d2b66cc8 | 07-Sep-2023 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(cpus): workaround for Neoverse N2 erratum 2009478" into integration |
| a1e121be | 21-Aug-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
docs(threat-model): classify threats by mitigating entity
The generic threat model used to list threats in no particular order.
Reorganize threats so that they are grouped by mitigating entity. For
docs(threat-model): classify threats by mitigating entity
The generic threat model used to list threats in no particular order.
Reorganize threats so that they are grouped by mitigating entity. For example, threats mitigated by the boot firmware (i.e. BL1 and BL2) are now clubbed together, ditto for those mitigated by the runtime EL3 firmware. Note that some generic threats apply to all firmware images so these get grouped in their own section as well.
The motivations for this refactoring are the following:
- Clarify the scope of the threats.
In particular, as the boot firmware is typically transient, threats applying to those images can only be exploited during a short period of time before the runtime firmware starts.
A note has been added to this effect.
- Helping developers implement mitigations in the right place.
- Some vendors have their own solution for booting their device and only leverage the runtime firmware from the TF-A project. Thus, they are not interested in the threat model of TF-A's boot firmware. Isolating the latter in a specific section helps them focus on what is important for them.
To avoid unnecessary churn, the threats ids have been kept the same.
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com> Change-Id: Id8616fd0e4b37cd400b1ad3372beb3455234d4dc
show more ...
|
| b721648d | 21-Aug-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
docs(threat-model): club RME note with other assumptions
The fact that RME is out of the generic threat model's scope is just another assumption we make about the target of evaluation so mention it
docs(threat-model): club RME note with other assumptions
The fact that RME is out of the generic threat model's scope is just another assumption we make about the target of evaluation so mention it there.
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com> Change-Id: I839ec5427f36b085148338030e8b1b85191d4245
show more ...
|
| 74bfe31f | 29-Aug-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(cpus): workaround for Neoverse N2 erratum 2009478
Neoverse N2 erratum 2009478 is a Cat B erratum that applies to revision r0p0 and is fixed in r0p1. The workaround is to clear the ED bit for all
fix(cpus): workaround for Neoverse N2 erratum 2009478
Neoverse N2 erratum 2009478 is a Cat B erratum that applies to revision r0p0 and is fixed in r0p1. The workaround is to clear the ED bit for all core error records before setting the PWRDN_EN bit in CPUPWRCTLR_EL1 to request a power down.
SDEN documentation: https://developer.arm.com/documentation/SDEN1982442/latest
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: Ic5ef58c9e795b90026af1d2b09edc0eea3ceee51
show more ...
|
| e37dfd3c | 03-Apr-2023 |
Boyan Karatotev <boyan.karatotev@arm.com> |
refactor(cpus): reorder Cortex-A53 errata by ascending order
Errata report order is enforced to be in ascending order. To achieve this with the errata framework this has to be done at the definition
refactor(cpus): reorder Cortex-A53 errata by ascending order
Errata report order is enforced to be in ascending order. To achieve this with the errata framework this has to be done at the definition level.
Also rename the disable_non_temporal_hint to its erratum number to conform to convention.
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: Id474872afebf361ab3d21c454ab3624db8354045
show more ...
|
| 32ed09ee | 16-Aug-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "docs(psa): doc AP/RSS interfaces for NV ctrs/ROTPK" into integration |
| 4ede8c39 | 14-Aug-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "el3_direct_msg" into integration
* changes: docs(spm): document new build option feat(fvp): spmd logical partition smc handler feat(fvp): add spmd logical partition
Merge changes from topic "el3_direct_msg" into integration
* changes: docs(spm): document new build option feat(fvp): spmd logical partition smc handler feat(fvp): add spmd logical partition feat(spmd): get logical partitions info feat(spmd): add partition info get regs refactor(ff-a): move structure definitions feat(spmd): el3 direct message API feat(spmd): add spmd logical partitions
show more ...
|
| a83aa72f | 04-Jul-2023 |
Raghu Krishnamurthy <raghu.ncstate@gmail.com> |
docs(spm): document new build option
Add documentation for the new build option ENABLE_SPMD_LP.
Signed-off-by: Raghu Krishnamurthy <raghu.ncstate@gmail.com> Change-Id: I808e6c00e3699fc900dc97e889af
docs(spm): document new build option
Add documentation for the new build option ENABLE_SPMD_LP.
Signed-off-by: Raghu Krishnamurthy <raghu.ncstate@gmail.com> Change-Id: I808e6c00e3699fc900dc97e889af63cc01cae794
show more ...
|