| 8a6a9560 | 21-Oct-2022 |
Daniel Boulby <daniel.boulby@arm.com> |
feat(compiler-rt): update compiler-rt source files
Update the compiler-rt source files to the tip of the llvm-project [1]. To do this some new header files were pulled in from the freebsd-src repo [
feat(compiler-rt): update compiler-rt source files
Update the compiler-rt source files to the tip of the llvm-project [1]. To do this some new header files were pulled in from the freebsd-src repo [2].
[1] https://github.com/llvm/llvm-project/commit/fae258e [2] https://github.com/freebsd/freebsd-src/commit/243a0eda
Change-Id: I1a012b1fe04e127d35e208923877c98c5d999d00 Signed-off-by: Daniel Boulby <daniel.boulby@arm.com>
show more ...
|
| c6877763 | 07-Oct-2022 |
Andre Przywara <andre.przywara@arm.com> |
fix(aarch64): make AArch64 FGT feature detection more robust
The ARMv8 ARM says about the values in the ID register scheme:
==== D17.1.3 Principles of the ID scheme for fields in ID registers === T
fix(aarch64): make AArch64 FGT feature detection more robust
The ARMv8 ARM says about the values in the ID register scheme:
==== D17.1.3 Principles of the ID scheme for fields in ID registers === The ID fields, which are either signed or unsigned, use increasing numerical values to indicate increases in functionality. Therefore, if a value of 0x1 indicates the presence of some instructions, then the value 0x2 will indicate the presence of those instructions plus some additional instructions or functionality. This means software can be written in the form: if (value >= number) { // do something that relies on the value of the feature } =======================================================================
So to check for the presence of a certain architecture feature, we should not check against a certain specific value, as it's done right now in several cases.
Relax the test for Fine Grained Trapping (FGT) to just check against the field being 0 or not.
This fixes TF-A crashing due to an unhandled exception, when running a Linux kernel on an FVP enabling ARMv8.9 features. The value of ID_AA64MMFR0_EL1.FGT went from 0b0001 to 0b0010 there.
Change-Id: Ic3f1625a7650306ed388a0660429ca8823c673c2 Signed-off-by: Andre Przywara <andre.przywara@arm.com>
show more ...
|
| 712a32d9 | 20-Oct-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(cpus): workaround for Cortex-A510 erratum 2666669" into integration |
| 4e7983b7 | 20-Oct-2022 |
Joanna Farley <joanna.farley@arm.com> |
Merge "feat(ethos-n)!: add support for SMMU streams" into integration |
| 94b2f94b | 23-Sep-2022 |
Daniel Boulby <daniel.boulby@arm.com> |
feat(libfdt): upgrade libfdt source files
Update the libfdt source files to the upstream commit e37c256 [1].
[1] https://github.com/dgibson/dtc/commit/e37c256
Change-Id: I00e29b467ff6f8c094f682452
feat(libfdt): upgrade libfdt source files
Update the libfdt source files to the upstream commit e37c256 [1].
[1] https://github.com/dgibson/dtc/commit/e37c256
Change-Id: I00e29b467ff6f8c094f68245232a7cedeaa14aef Signed-off-by: Daniel Boulby <daniel.boulby@arm.com>
show more ...
|
| afb5d069 | 21-Sep-2022 |
Akram Ahmad <Akram.Ahmad@arm.com> |
fix(cpus): workaround for Cortex-A510 erratum 2666669
Cortex-A510 erratum 2666669 applies to revisions r1p1 and lower, and is fixed in r1p2. The errata is mitigated by setting IMP_CPUACTLR_EL1[38] t
fix(cpus): workaround for Cortex-A510 erratum 2666669
Cortex-A510 erratum 2666669 applies to revisions r1p1 and lower, and is fixed in r1p2. The errata is mitigated by setting IMP_CPUACTLR_EL1[38] to 1.
SDEN documentation: https://developer.arm.com/documentation/SDEN1873351/latest https://developer.arm.com/documentation/SDEN1873361/latest
Signed-off-by: Akram Ahmad <Akram.Ahmad@arm.com> Change-Id: Ief27e4a155e43e75f05f2710d0c7bd5da2dec43f
show more ...
|
| c45d2feb | 12-Oct-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(ufs): retry commands on unit attention" into integration |
| 8e75b542 | 11-Oct-2022 |
Bipin Ravi <bipin.ravi@arm.com> |
Merge "feat(cpu): add library support for Hunter ELP" into integration |
| a2506c31 | 11-Oct-2022 |
Bipin Ravi <bipin.ravi@arm.com> |
Merge "revert(cpus): "Revert workaround for A77 erratum 1800714"" into integration |
| 08e2fdbd | 27-Sep-2022 |
Boyan Karatotev <boyan.karatotev@arm.com> |
revert(cpus): "Revert workaround for A77 erratum 1800714"
Reinstate the workaround introduced in commit 9bbc03a6e0608a949d66d9da6db12a455b452bfb. The cited change to the SDEN could not be found and
revert(cpus): "Revert workaround for A77 erratum 1800714"
Reinstate the workaround introduced in commit 9bbc03a6e0608a949d66d9da6db12a455b452bfb. The cited change to the SDEN could not be found and there are no known problems with the workaround.
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: Iec9938f173e7565024aca798f224df339de90806
show more ...
|
| 8c87becb | 03-Oct-2022 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(cpu): add library support for Hunter ELP
Add basic CPU library code to support the Hunter ELP CPU in TF-A. Hunter-ELP adds v9.2 architecture support and is derived from Makalu-ELP. As such, the
feat(cpu): add library support for Hunter ELP
Add basic CPU library code to support the Hunter ELP CPU in TF-A. Hunter-ELP adds v9.2 architecture support and is derived from Makalu-ELP. As such, the library code is adapted from the Makalu-ELP support library.
Change-Id: I7e93b9af6b1f0bc4d08c3cf5caf071d2cbdbc89f Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 420deb5a | 01-Sep-2022 |
Tamas Ban <tamas.ban@arm.com> |
feat(psa): remove initial attestation partition API
The attestation key derivation and platform attestation token creation functionality is provided by the Delegated Attestation partition in RSS.
S
feat(psa): remove initial attestation partition API
The attestation key derivation and platform attestation token creation functionality is provided by the Delegated Attestation partition in RSS.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: I2d8c0e6589d11e7c81c698adf75ee2a993e3a0c6
show more ...
|
| 4b09ffef | 31-Aug-2022 |
Tamas Ban <tamas.ban@arm.com> |
feat(psa): add delegated attestation partition API
Delegated attestation is a service provided by RSS to: - Derive a delegated attestation key: Realm Attestation Key - Query the platform attestation
feat(psa): add delegated attestation partition API
Delegated attestation is a service provided by RSS to: - Derive a delegated attestation key: Realm Attestation Key - Query the platform attestation token
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: I3edf09fcbef24bca7c8a000ffac8c1ab64dfb812
show more ...
|
| d5f225d9 | 04-Jul-2022 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(fvp): add plat API to validate that passed region is non-secure
Added a platform function to check passed region is within the Non-Secure region of DRAM.
Signed-off-by: Manish V Badarkhe <Mani
feat(fvp): add plat API to validate that passed region is non-secure
Added a platform function to check passed region is within the Non-Secure region of DRAM.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: Ie5808fa6a1b6e6bc99f4185fa8acc52af0d5f14d
show more ...
|
| d1747e1b | 23-Jun-2022 |
Manish Pandey <manish.pandey2@arm.com> |
feat(drtm): prepare EL state during dynamic launch
Prepared EL state before dynamic launch
Change-Id: I3940cd7fc74da1a1addbeb08ae34f16771395e61 Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
feat(drtm): prepare EL state during dynamic launch
Prepared EL state before dynamic launch
Change-Id: I3940cd7fc74da1a1addbeb08ae34f16771395e61 Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Signed-off-by: Lucian Paul-Trifu <lucian.paultrifu@gmail.com>
show more ...
|
| 586f60cc | 12-Jul-2022 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(fvp): add plat API to set and get the DRTM error
Added a platform function to set and get DRTM error. Also, added a platform function to reset the system.
Signed-off-by: Manish V Badarkhe <Man
feat(fvp): add plat API to set and get the DRTM error
Added a platform function to set and get DRTM error. Also, added a platform function to reset the system.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: I471f2387f8c78b21a06af063a6fa02cda3646557
show more ...
|
| b9b17508 | 15-Jun-2022 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
refactor(measured-boot): split out a few Event Log driver functions
Reorganized a few Event Log functions into multiple functions so that they can be used for the upcoming DRTM feature. This change
refactor(measured-boot): split out a few Event Log driver functions
Reorganized a few Event Log functions into multiple functions so that they can be used for the upcoming DRTM feature. This change mainly implements below new functions - 1. event_log_buf_init - called by 'event_log_init' to initialise Event Log buffer 2. event_log_write_specid_event - called by 'event_log_fixed_header' to write specification id event to Event Log buffer 3. event_log_measure and event_log_record - called by 'event_log_measure_and_record' to measure and record the measurement to the Event Log buffer
Change-Id: I1aabb57f79bead726fcf36d59839702cd6a3521d Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| e9467afb | 16-Jun-2022 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(drtm): retrieve DRTM features
Retrieved below DRTM features via DRTM_FEATURES SMC call - 1. TPM features 2. Minimum memory requirement 3. Boot PE ID 4. DMA protection
Change-Id: Ia6dc497259541
feat(drtm): retrieve DRTM features
Retrieved below DRTM features via DRTM_FEATURES SMC call - 1. TPM features 2. Minimum memory requirement 3. Boot PE ID 4. DMA protection
Change-Id: Ia6dc497259541ce30a6550afa35d95d9a9a366af Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Signed-off-by: Lucian Paul-Trifu <lucian.paultrifu@gmail.com>
show more ...
|
| 2a1cdee4 | 11-Mar-2022 |
johpow01 <john.powell@arm.com> |
feat(drtm): add platform functions for DRTM
Added platform hooks to retrieve DRTM features and address map. Additionally, implemented these hooks for the FVP platform.
Signed-off-by: John Powell <j
feat(drtm): add platform functions for DRTM
Added platform hooks to retrieve DRTM features and address map. Additionally, implemented these hooks for the FVP platform.
Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: I5621cc9807ffff8139ae8876250147f7b2c76759
show more ...
|
| e6381f9c | 12-May-2022 |
John Powell <john.powell@arm.com> |
feat(sdei): add a function to return total number of events registered
This patch adds a public API to return the total number of registered events. The purpose of this is primarily for DRTM to ensu
feat(sdei): add a function to return total number of events registered
This patch adds a public API to return the total number of registered events. The purpose of this is primarily for DRTM to ensure that no SDEI event can interfere with a dynamic launch.
Signed-off-by: John Powell <john.powell@arm.com> Change-Id: I1d1cba2da7d5566cc340620ee1ce7d7844740b86
show more ...
|
| ff1e42e2 | 03-Mar-2022 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
feat(drtm): add PCR entries for DRTM
Added PCR entries for the measurement performed by the DCE and D-CRTM in DRTM implementation
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Change-I
feat(drtm): add PCR entries for DRTM
Added PCR entries for the measurement performed by the DCE and D-CRTM in DRTM implementation
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Change-Id: Ib9bfafe7fa2efa1cc36d7ff138468d648235dcf1
show more ...
|
| 2bf4f27f | 20-Jun-2022 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
refactor(crypto): change CRYPTO_SUPPORT flag to numeric
Updated CRYPTO_SUPPORT flag to numeric to provide below supports - 1. CRYPTO_SUPPORT = 1 -> Authentication verification only 2. CRYPTO_SUPPORT
refactor(crypto): change CRYPTO_SUPPORT flag to numeric
Updated CRYPTO_SUPPORT flag to numeric to provide below supports - 1. CRYPTO_SUPPORT = 1 -> Authentication verification only 2. CRYPTO_SUPPORT = 2 -> Hash calculation only 3. CRYPTO_SUPPORT = 3 -> Authentication verification and hash calculation
Change-Id: Ib34f31457a6c87d2356d736ad2d048dc787da56f Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| e43caf38 | 25-Feb-2022 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
feat(crypto): update crypto module for DRTM support
Updated crypto module to include crypto calls necessary for a DRTM supported build.
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Ch
feat(crypto): update crypto module for DRTM support
Updated crypto module to include crypto calls necessary for a DRTM supported build.
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Change-Id: I4f945997824393f46864b7fb7fd380308a025452
show more ...
|
| e62748e3 | 23-Feb-2022 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
feat(drtm): add standard DRTM service
Added a dummy DRTM setup function and also, introduced DRTM SMCs handling as per DRTM spec [1]. Few basic SMCs are handled in this change such as ARM_DRTM_SVC_V
feat(drtm): add standard DRTM service
Added a dummy DRTM setup function and also, introduced DRTM SMCs handling as per DRTM spec [1]. Few basic SMCs are handled in this change such as ARM_DRTM_SVC_VERSION and ARM_DRTM_SVC_FEATURES that returns DRTM version and functions ids supported respectively, and others are dummy for now.
[1]: https://developer.arm.com/documentation/den0113/latest
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Signed-off-by: Lucian Paul-Trifu <lucian.paultrifu@gmail.com> Change-Id: I8c7afe920c78e064cbab2298f59e6837c70ba8ff
show more ...
|
| d72c486b | 22-Jun-2022 |
Lucian Paul-Trifu <lucian.paultrifu@gmail.com> |
feat(fvp): add platform hooks for DRTM DMA protection
Added necessary platform hooks for DRTM DMA protection. These calls will be used by the subsequent DRTM implementation patches. DRTM platform AP
feat(fvp): add platform hooks for DRTM DMA protection
Added necessary platform hooks for DRTM DMA protection. These calls will be used by the subsequent DRTM implementation patches. DRTM platform API declarations have been listed down in a separate header file.
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Signed-off-by: Lucian Paul-Trifu <lucian.paultrifu@gmail.com> Change-Id: Ib9726d1d3570800241bde702ee7006a64f1739ec
show more ...
|