| bacfff8b | 09-Jan-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(libc): properly define SCHAR_MIN" into integration |
| 06c01b08 | 06-Jan-2023 |
Yann Gautier <yann.gautier@st.com> |
fix(libc): properly define SCHAR_MIN
SCHAR_MIN definition should use SCHAR_MAX, and not itself.
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: If8c1751a381dac50fe3ec5fdf19d6a4918470b58 |
| 40e740dc | 18-Nov-2022 |
Yann Gautier <yann.gautier@st.com> |
fix(fconf): make struct fconf_populator static
In FCONF_REGISTER_POPULATOR macro, add static for the fconf_populator struct. This avoids this kind of sparse warning: plat/st/common/stm32mp_fconf_io.
fix(fconf): make struct fconf_populator static
In FCONF_REGISTER_POPULATOR macro, add static for the fconf_populator struct. This avoids this kind of sparse warning: plat/st/common/stm32mp_fconf_io.c:181:1: warning: symbol 'stm32mp_io__populator' was not declared. Should it be static?
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: Icaa7da3079e82497e112585150f6348ef2ebf5e6
show more ...
|
| 1ae75529 | 21-Nov-2022 |
Andre Przywara <andre.przywara@arm.com> |
feat(fvp): emulate trapped RNDR
When a platform decides to use FEAT_RNG_TRAP, every RNDR or RNDRSS read will trap into EL3. The platform can then emulate those instructions, by either executing the
feat(fvp): emulate trapped RNDR
When a platform decides to use FEAT_RNG_TRAP, every RNDR or RNDRSS read will trap into EL3. The platform can then emulate those instructions, by either executing the real CPU instructions, potentially conditioning the results, or use rate-limiting or filtering to protect the hardware entropy pool. Another possiblitiy would be to use some platform specific TRNG device to get entropy and returning this.
To demonstrate platform specific usage, add a demo implementation for the FVP: It will execute the actual CPU instruction and just return the result. This should serve as reference code to implement platform specific policies.
We change the definition of read_rndr() and read_rndrrs() to use the alternative sysreg encoding, so that all assemblers can handle that.
Add documentation about the new platform specific RNG handler function.
Signed-off-by: Andre Przywara <andre.przywara@arm.com> Change-Id: Ibce817b3b06ad20129d15531b81402e3cc3e9a9e
show more ...
|
| ccd81f1e | 21-Nov-2022 |
Andre Przywara <andre.przywara@arm.com> |
feat(el3-runtime): introduce system register trap handler
At the moment we only handle SMC traps from lower ELs, but ignore any other synchronous traps and just panic. To cope with system register t
feat(el3-runtime): introduce system register trap handler
At the moment we only handle SMC traps from lower ELs, but ignore any other synchronous traps and just panic. To cope with system register traps, which we might need to emulate, introduce a C function to handle those traps, and wire that up in the exception handler to be called.
We provide a dispatcher function (in C), that will call platform specific implementation for certain (classes of) system registers. For now this is empty.
Signed-off-by: Andre Przywara <andre.przywara@arm.com> Change-Id: If147bcb49472eb02791498700300926afbcf75ff
show more ...
|
| 01617e0b | 19-Dec-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(gic): wrap cache enabled assert under plat_can_cmo" into integration |
| 69544959 | 22-Nov-2022 |
Yann Gautier <yann.gautier@st.com> |
refactor(st): remove unused io_mmc driver
This driver was used when STM32MP_USE_STM32IMAGE was enabled. This flag is now removed, so the ST io_mmc driver can now be removed.
Signed-off-by: Yann Gau
refactor(st): remove unused io_mmc driver
This driver was used when STM32MP_USE_STM32IMAGE was enabled. This flag is now removed, so the ST io_mmc driver can now be removed.
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: I3c1280dec8926b921534c81e143e86cfe6d4ee0d
show more ...
|
| 79664cfc | 15-Dec-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes I2b23e7c8,I779587af,Ic46de7a4,If753e987,I00171b05, ... into integration
* changes: fix(layerscape): unlock write access SMMU_CBn_ACTLR fix(nxp-ddr): add checking return value fea
Merge changes I2b23e7c8,I779587af,Ic46de7a4,If753e987,I00171b05, ... into integration
* changes: fix(layerscape): unlock write access SMMU_CBn_ACTLR fix(nxp-ddr): add checking return value feat(lx2): enable OCRAM ECC fix(nxp-tools): fix coverity issue fix(nxp-ddr): fix coverity issue fix(nxp-ddr): fix underrun coverity issue fix(nxp-drivers): fix sd secure boot failure feat(lx2): support more variants fix(lx2): init global data before using it fix(ls1046a): 4 keys secureboot failure resolved fix(nxp-crypto): fix secure boot assert inclusion fix(nxp-crypto): fix coverity issue fix(nxp-drivers): fix fspi coverity issue fix(nxp-drivers): fix tzc380 memory regions config fix(layerscape): fix nv_storage assert checking fix(nxp-ddr): apply Max CDD values for warm boot fix(nxp-ddr): use CDDWW for write to read delay fix(layerscape): fix errata a008850
show more ...
|
| abd6d7ea | 12-Dec-2022 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge changes from topic "full_dev_rsa_key" into integration
* changes: docs(arm): add ARM_ROTPK_LOCATION variant full key feat(arm): add ARM_ROTPK_LOCATION variant full key |
| 78fbb0ec | 30-Nov-2022 |
Channagoud kadabi <kadabi@google.com> |
fix(gic): wrap cache enabled assert under plat_can_cmo
with reference to feature 04c730 (feat(cpus): make cache ops conditional), booting with caches in debug recovery means SCTLR_C_BIT will be 0. W
fix(gic): wrap cache enabled assert under plat_can_cmo
with reference to feature 04c730 (feat(cpus): make cache ops conditional), booting with caches in debug recovery means SCTLR_C_BIT will be 0. Wrap the assert for the d-cache enabled check in CONDITIONAL_CMO and plat_can_cmo calls to allow booting with d-cache disabled.
Signed-off-by: Channagoud kadabi <kadabi@google.com> Change-Id: I80153df493d1ec9e5e354c7c2e6a14322d22c446
show more ...
|
| 5f899286 | 28-Oct-2022 |
laurenw-arm <lauren.wehrmeister@arm.com> |
feat(arm): add ARM_ROTPK_LOCATION variant full key
Add support for ARM_ROTPK_LOCATION=devel_full_dev_rsa_key, which implements the scenario where the platform provides the full ROTPK, as opposed to
feat(arm): add ARM_ROTPK_LOCATION variant full key
Add support for ARM_ROTPK_LOCATION=devel_full_dev_rsa_key, which implements the scenario where the platform provides the full ROTPK, as opposed to the hash of it. This returns a 2kB development RSA key embedded into the firmware.
The motivation for this patch is to extend our test coverage in the CI. Right now, the authentication framework allows platforms to return either the full ROTPK or a hash of it (*). However, the FVP platform only supports returning a hash currently so we cannot easily exercise the full key scenario. This patch adds that capability.
(*) Or even no key at all if it's not deployed on the platform yet, as is typically the case on pre-production/developement platforms.
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com> Change-Id: Ie869cca1082410e63894e2b7dea2d31155684105
show more ...
|
| 557bc9dc | 09-Dec-2022 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "tonnad01/gcc_warn_fix" into integration
* changes: fix(scmi): change function prototype to fix gcc error fix(rdn1edge): change variable type to fix gcc sign conversion
Merge changes from topic "tonnad01/gcc_warn_fix" into integration
* changes: fix(scmi): change function prototype to fix gcc error fix(rdn1edge): change variable type to fix gcc sign conversion error
show more ...
|
| a0f256b0 | 08-Dec-2022 |
Alexei Fedorov <Alexei.Fedorov@arm.com> |
Merge "fix(rmmd): add missing padding to RMM Boot Manifest and initialize it" into integration |
| f0f2c903 | 07-Dec-2022 |
Tony K Nadackal <tony.nadackal@arm.com> |
fix(scmi): change function prototype to fix gcc error
Change function prototype of plat_css_get_scmi_info() to fix the GCC sign conversion error "comparison between signed and unsigned integer expre
fix(scmi): change function prototype to fix gcc error
Change function prototype of plat_css_get_scmi_info() to fix the GCC sign conversion error "comparison between signed and unsigned integer expressions". Changing channel_id type to unsigned int since it can never be a negative value.
Signed-off-by: Tony K Nadackal <tony.nadackal@arm.com> Change-Id: I579b21497329db40897c10d86c8fc68e4877f3db
show more ...
|
| dc0ca64e | 01-Dec-2022 |
Javier Almansa Sobrino <javier.almansasobrino@arm.com> |
fix(rmmd): add missing padding to RMM Boot Manifest and initialize it
This patch also: * Enforces the check of RES0 fields on EL3-RMM boot interface and manifest * Fixes a couple of
fix(rmmd): add missing padding to RMM Boot Manifest and initialize it
This patch also: * Enforces the check of RES0 fields on EL3-RMM boot interface and manifest * Fixes a couple of nits on the EL3-RMM Boot Interface documentation.
Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com> Change-Id: Idb9e38f9fcda2ba0655646a1e2c4fdbabd5cdc40
show more ...
|
| d1c6c495 | 18-Nov-2022 |
Yann Gautier <yann.gautier@st.com> |
fix(partition): add U suffix for unsigned numbers
This corrects MISRA c2012-7.2 violation: A "u" or "U" suffix shall be applied to all integer constants that are represented in an unsigned type.
Si
fix(partition): add U suffix for unsigned numbers
This corrects MISRA c2012-7.2 violation: A "u" or "U" suffix shall be applied to all integer constants that are represented in an unsigned type.
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: I5508a7d482213fc4d22e3e7ac53defb4135af596
show more ...
|
| 8406db14 | 18-Nov-2022 |
Yann Gautier <yann.gautier@st.com> |
fix: add parenthesis for tests in MIN, MAX and CLAMP macros
This corrects the MISRA violation C2012-12.1: The precedence of operators within expressions should be made explicit
Signed-off-by: Yann
fix: add parenthesis for tests in MIN, MAX and CLAMP macros
This corrects the MISRA violation C2012-12.1: The precedence of operators within expressions should be made explicit
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: I62083c43b3f633504cac3497efe2e984924c63b2
show more ...
|
| 825641d6 | 07-Dec-2022 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge changes Ida9abfd5,Iec447d97 into integration
* changes: build: enable adding MbedTLS files for platform feat(lib/psa): add read_measurement API |
| ca32548a | 07-Dec-2022 |
Soby Mathew <soby.mathew@arm.com> |
Merge "fix(trp): preserve RMI SMC X4 when not used as return" into integration |
| b96253db | 24-Nov-2022 |
AlexeiFedorov <Alexei.Fedorov@arm.com> |
fix(trp): preserve RMI SMC X4 when not used as return
This patch adds X2-X6 and 'smc_ret' parameters to trp_rmi_handler(). The last 'smc_ret' parameter passed in X7 contains address of 'trp_smc_resu
fix(trp): preserve RMI SMC X4 when not used as return
This patch adds X2-X6 and 'smc_ret' parameters to trp_rmi_handler(). The last 'smc_ret' parameter passed in X7 contains address of 'trp_smc_result' structure on stack to return result of RMI SMC call.
This allows to preserve X4 if not used as a return argument as per SMCCCv1.2. The patch also removes use of trp_args_t in RMI handling.
Signed-off-by: AlexeiFedorov <Alexei.Fedorov@arm.com> Change-Id: I9e3387a7380b37863eeccc53d13e92e0ac5cffbd
show more ...
|
| b8dbfacc | 07-Dec-2022 |
Soby Mathew <soby.mathew@arm.com> |
Merge "feat(rmm): add support for the 2nd DRAM bank" into integration |
| 0ca1d8fb | 01-Nov-2022 |
Howard Lu <howard.lu@nxp.com> |
fix(layerscape): unlock write access SMMU_CBn_ACTLR
This patch is to fix Errata #841119 and #826419 failed apply in linux because of SMMU_CBn_ACTLR register can't be modified in non-secure states.
fix(layerscape): unlock write access SMMU_CBn_ACTLR
This patch is to fix Errata #841119 and #826419 failed apply in linux because of SMMU_CBn_ACTLR register can't be modified in non-secure states.
Signed-off-by: Howard Lu <howard.lu@nxp.com> Signed-off-by: Jiafei Pan <Jiafei.Pan@nxp.com> Change-Id: I2b23e7c8baa809f385917eb45b10ec6b26a9ada8
show more ...
|
| 346cfe2b | 29-Nov-2022 |
AlexeiFedorov <Alexei.Fedorov@arm.com> |
feat(rmm): add support for the 2nd DRAM bank
This patch adds support for RMM granules allocation in FVP 2nd DRAM 2GB bank at 0x880000000 base address. For ENABLE_RME = 1 case it also removes "mem=1G
feat(rmm): add support for the 2nd DRAM bank
This patch adds support for RMM granules allocation in FVP 2nd DRAM 2GB bank at 0x880000000 base address. For ENABLE_RME = 1 case it also removes "mem=1G" Linux kernel command line option in fvp-base-psci-common.dsti to allow memory layout discovery from the FVP device tree. FVP parameter 'bp.dram_size' - size of main memory in gigabytes documented in docs/components/realm-management-extension.rst is changed from 2 to 4.
Signed-off-by: AlexeiFedorov <Alexei.Fedorov@arm.com> Change-Id: I174da4416ad5a8d41bf0ac89f356dba7c0cd3fe7
show more ...
|
| caaca4a1 | 30-Nov-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "mb/refactor-evlog" into integration
* changes: refactor(qemu): pass platform metadata as a function's argument refactor(imx8m): pass platform metadata as a function's a
Merge changes from topic "mb/refactor-evlog" into integration
* changes: refactor(qemu): pass platform metadata as a function's argument refactor(imx8m): pass platform metadata as a function's argument refactor(fvp): pass platform metadata as a function's argument refactor(measured-boot): accept metadata as a function's argument
show more ...
|
| d3d2a5a4 | 28-Nov-2022 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge "fix(cpus): workaround for Cortex-X3 erratum 2615812" into integration |