| 051c7ad8 | 13-Sep-2024 |
Soby Mathew <soby.mathew@arm.com> |
Merge "refactor(rmmd): plat token requests in pieces" into integration |
| 42cf6026 | 10-Jul-2024 |
Juan Pablo Conde <juanpablo.conde@arm.com> |
refactor(rmmd): plat token requests in pieces
Until now, the attestation token size was limited by the size of the shared buffer between RMM and TF-A. With this change, RMM can now request the token
refactor(rmmd): plat token requests in pieces
Until now, the attestation token size was limited by the size of the shared buffer between RMM and TF-A. With this change, RMM can now request the token in pieces, so they fit in the shared buffer. A new output parameter was added to the SMC call, which will return (along with the size of bytes copied into the buffer) the number of bytes of the token that remain to be retrieved.
TF-A will keep an offset variable that will indicate the position in the token where the next call will retrieve bytes from. This offset will be increased on every call by adding the number number of bytes copied. If the received hash size is not 0, TF-A will reset the offset to 0 and copy from that position on.
The SMC call will now return at most the size of the shared buffer in bytes on every call. Therefore, from now on, multiple SMC calls may be needed to be issued if the token size exceeds the shared buffer size.
Change-Id: I591f7013d06f64e98afaf9535dbea6f815799723 Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com>
show more ...
|
| 4f3e0cdc | 04-Sep-2024 |
Tamas Ban <tamas.ban@arm.com> |
refactor(fvp): use the example CCA platform token from iat-verifier
In [1] and [2], the example CCA platform token has been updated to be aligned with the new profile(s) defined in draft-ffm-rats-cc
refactor(fvp): use the example CCA platform token from iat-verifier
In [1] and [2], the example CCA platform token has been updated to be aligned with the new profile(s) defined in draft-ffm-rats-cca-token-00.
This change replaces the static CCA platform token in the FVP platform.
[1] https://review.trustedfirmware.org/c/TF-M/tf-m-tools/+/30812 [2] https://review.trustedfirmware.org/c/TF-M/tf-m-tools/+/31036
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: Ia23f0dffe618dca04f9f3c46c953a6f021101b09
show more ...
|
| d081c611 | 12-Sep-2024 |
Andre Przywara <andre.przywara@arm.com> |
fix(fvp): enable FEAT_MTE2
ENABLE_FEAT_MTE2 controls the trapping of some MTE related system registers. If the memory_tagging_support_level parameter on the FVP command line is set to higher values,
fix(fvp): enable FEAT_MTE2
ENABLE_FEAT_MTE2 controls the trapping of some MTE related system registers. If the memory_tagging_support_level parameter on the FVP command line is set to higher values, non-secure world will see the feature bits in the CPU ID registers and will use those registers, triggering a panic in BL31.
Enable the feature in the optional form for the FVP build, to avoid any panics.
Change-Id: I26ba444d784adf165db81048f93e11361c7f11ac Signed-off-by: Andre Przywara <andre.przywara@arm.com>
show more ...
|
| 3b5eca9e | 25-Jul-2024 |
Ryan Everett <ryan.everett@arm.com> |
feat(fvp): scale SP_MIN max size based on SRAM size
The maximum size for SP_MIN in the FVP is currently fixed and does not scale with the SRAM size. This update adjusts the SP_MIN size according to
feat(fvp): scale SP_MIN max size based on SRAM size
The maximum size for SP_MIN in the FVP is currently fixed and does not scale with the SRAM size. This update adjusts the SP_MIN size according to the SRAM size used to build the FVP platform.
Change-Id: I95527e8ae6f8a73c336ed4fe05ace5de86d8991d Signed-off-by: Ryan Everett <ryan.everett@arm.com>
show more ...
|
| 4b6e4e61 | 20-Aug-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "mp/simd_ctxt_mgmt" into integration
* changes: feat(fvp): allow SIMD context to be put in TZC DRAM docs(simd): introduce CTX_INCLUDE_SVE_REGS build flag feat(fvp): ad
Merge changes from topic "mp/simd_ctxt_mgmt" into integration
* changes: feat(fvp): allow SIMD context to be put in TZC DRAM docs(simd): introduce CTX_INCLUDE_SVE_REGS build flag feat(fvp): add Cactus partition manifest for EL3 SPMC chore(simd): remove unused macros and utilities for FP feat(el3-spmc): support simd context management upon world switch feat(trusty): switch to simd_ctx_save/restore apis feat(pncd): switch to simd_ctx_save/restore apis feat(spm-mm): switch to simd_ctx_save/restore APIs feat(simd): add rules to rationalize simd ctxt mgmt feat(simd): introduce simd context helper APIs feat(simd): add routines to save, restore sve state feat(simd): add sve state to simd ctxt struct feat(simd): add data struct for simd ctxt management
show more ...
|
| b4c23adf | 18-Jul-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
feat(fvp): allow SIMD context to be put in TZC DRAM
This patch demonstrates the capability of SEPARATE_SIMD_SECTION build flag through which the memory intensive SIMD context data structures are all
feat(fvp): allow SIMD context to be put in TZC DRAM
This patch demonstrates the capability of SEPARATE_SIMD_SECTION build flag through which the memory intensive SIMD context data structures are allocated in a separate section withtin the TZC DRAM space.
Change-Id: Idf3f232a7960a8f84f279d496c76953a6dad2009 Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| 51346236 | 17-Jun-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
feat(fvp): add Cactus partition manifest for EL3 SPMC
This patch adds the SP partition manifest to boot Cactus SP on EL3 SPMC to be used with FVP platform.
Change-Id: I88b36f6ac21ebba7fa93aef75dad7
feat(fvp): add Cactus partition manifest for EL3 SPMC
This patch adds the SP partition manifest to boot Cactus SP on EL3 SPMC to be used with FVP platform.
Change-Id: I88b36f6ac21ebba7fa93aef75dad74bb9ee5c944 Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| 3524d074 | 17-Jun-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
feat(simd): add rules to rationalize simd ctxt mgmt
Illegal combinations of build flags associated with SIMD context management are flagged by the build system.
Change-Id: I3192af3889e1e864c7875778
feat(simd): add rules to rationalize simd ctxt mgmt
Illegal combinations of build flags associated with SIMD context management are flagged by the build system.
Change-Id: I3192af3889e1e864c7875778616e167ba6894195 Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| 2d4f264b | 17-Aug-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "romlib-fixes" into integration
* changes: fix(romlib): wrap indirectly included functions fix(arm): remove duplicate jumptable entry |
| 26f2f24c | 14-Aug-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "cot-dt2c" into integration
* changes: feat(arm): update documentation for cot-dt2c feat(arm): remove the bl2 static c file feat(arm): generate tbbr c file CoT dt2c
Merge changes from topic "cot-dt2c" into integration
* changes: feat(arm): update documentation for cot-dt2c feat(arm): remove the bl2 static c file feat(arm): generate tbbr c file CoT dt2c feat(arm): makefile invoke CoT dt2c feat(auth): standalone CoT dt2c tool refactor(auth): separate bl1 and bl2 CoT refactor(st): align the NV counter naming refactor(fvp): align the NV counter naming
show more ...
|
| 97a689bb | 13-Aug-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "feat(spm): change UART0-1 to NS device region" into integration |
| 04d02a9c | 13-Jun-2024 |
Xialin Liu <Xialin.Liu@ARM.com> |
refactor(fvp): align the NV counter naming
Align the naming of nv_counter to nv_ctr in the DTBs so that they match with the static C files. Update the binding documentation accordingly. This renamin
refactor(fvp): align the NV counter naming
Align the naming of nv_counter to nv_ctr in the DTBs so that they match with the static C files. Update the binding documentation accordingly. This renaming is beneficial for the upcoming conversion tool that will convert CoT DT files to C files.
Change-Id: If65d51ad9fc6445b1ae9937f1691becf8742cf01 Signed-off-by: Xialin Liu <Xialin.Liu@ARM.com>
show more ...
|
| 180a3a9e | 30-Jul-2024 |
Jimmy Brisson <jimmy.brisson@arm.com> |
fix(arm): remove duplicate jumptable entry
Change-Id: I4cc4ef493318372ec0d0531ca3e98196e7065ab9 Signed-off-by: Jimmy Brisson <jimmy.brisson@arm.com> |
| 1a0ebff7 | 02-May-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(arm): add fw handoff support for RESET_TO_BL31
Change-Id: I78f3c5606f0221bb5fc613a973a7d3fe187db35b Signed-off-by: Harrison Mutai <harrison.mutai@arm.com> |
| aca05c59 | 29-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(fvp): add secure uart interrupt in device region" into integration |
| 5477fb37 | 29-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(fvp): add flash areas for secure partition" into integration |
| 9fb76763 | 16-May-2024 |
levi.yun <yeoreum.yun@arm.com> |
feat(fvp): add flash areas for secure partition
To support UEFI secure variable service, StandaloneMm which runs in BL32 should know flash areas. Add flash memory areas and system register region so
feat(fvp): add flash areas for secure partition
To support UEFI secure variable service, StandaloneMm which runs in BL32 should know flash areas. Add flash memory areas and system register region so that StandaloneMm access to flash storages.
Change-Id: I803bda9664a17a0b978ebff90974eaf5442a91cd Signed-off-by: levi.yun <yeoreum.yun@arm.com>
show more ...
|
| fc3a01aa | 24-Jul-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
fix(fvp): add secure uart interrupt in device region
OP-TEE enables the use case of a secure interrupt triggered by the UART driver. This interrupt is routed by FFA_INTERRUPT interface to OP-TEE. De
fix(fvp): add secure uart interrupt in device region
OP-TEE enables the use case of a secure interrupt triggered by the UART driver. This interrupt is routed by FFA_INTERRUPT interface to OP-TEE. Define the UART interrupt in the FF-A device region node. Without this change, OPTEE panics at the boot with the following:
| I/TC: No non-secure external DT | I/TC: manifest DT found | I/TC: OP-TEE version: 4.3.0-23-gfcd8750677db | I/TC: WARNING: This OP-TEE configuration might be insecure! | I/TC: WARNING: Please check https://optee.readthedocs.io/en/latest/architecture/porting_guidelines.html | I/TC: Primary CPU initializing | E/TC:0 0 assertion '!res' failed at core/drivers/hfic.c:56 <hfic_op_enable> | E/TC:0 0 Panic at core/kernel/assert.c:28 <_assert_break> | E/TC:0 0 TEE load address @ 0x6284000
Change-Id: Icddcdfd032315aeee65ba3100f3a6b470a74435d Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
show more ...
|
| e7c060d5 | 24-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(fgt2): add support for FEAT_FGT2" into integration |
| cd656a56 | 23-Jul-2024 |
Daniel Boulby <daniel.boulby@arm.com> |
feat(spm): change UART0-1 to NS device region
To enable device memory sharing test make memory region for UART0 and 1 a NS device region so that it can be shared by tf-a-tests to the cactus SP.
Sig
feat(spm): change UART0-1 to NS device region
To enable device memory sharing test make memory region for UART0 and 1 a NS device region so that it can be shared by tf-a-tests to the cactus SP.
Signed-off-by: Daniel Boulby <daniel.boulby@arm.com> Change-Id: Iadfe02a65f5d4a8b60296f07c4943dd31f201453
show more ...
|
| c5b8de86 | 22-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(debugv8p9): add support for FEAT_Debugv8p9" into integration |
| 33e6aaac | 06-Jun-2024 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
feat(fgt2): add support for FEAT_FGT2
This patch disables trapping to EL3 when the FEAT_FGT2 specific trap registers are accessed by setting the SCR_EL3.FGTEn2 bit
Signed-off-by: Arvind Ram Prakash
feat(fgt2): add support for FEAT_FGT2
This patch disables trapping to EL3 when the FEAT_FGT2 specific trap registers are accessed by setting the SCR_EL3.FGTEn2 bit
Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I6d2b614affb9067b2bc3d7bf0ae7d169d031592a
show more ...
|
| 83271d5a | 22-May-2024 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
feat(debugv8p9): add support for FEAT_Debugv8p9
This patch enables FEAT_Debugv8p9 and prevents EL1/0 from trapping to EL3 when accessing MDSELR_EL1 register by setting the MDCR_EL3.EBWE bit.
Signed
feat(debugv8p9): add support for FEAT_Debugv8p9
This patch enables FEAT_Debugv8p9 and prevents EL1/0 from trapping to EL3 when accessing MDSELR_EL1 register by setting the MDCR_EL3.EBWE bit.
Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I3613af1dd8cb8c0d3c33dc959f170846c0b9695a
show more ...
|
| 41d73bff | 05-Jun-2024 |
Sudeep Holla <sudeep.holla@arm.com> |
feat(fvp): add SPM manifest for OP-TEE at S-EL1 without S-EL2/Hafnium
Provide manifest to boot OP-TEE at S-EL1 running SPMC with secure EL2 disabled and TF-A at secure EL3 running SPMD.
Change-Id:
feat(fvp): add SPM manifest for OP-TEE at S-EL1 without S-EL2/Hafnium
Provide manifest to boot OP-TEE at S-EL1 running SPMC with secure EL2 disabled and TF-A at secure EL3 running SPMD.
Change-Id: If8547b5a514fb48eec88a8d56d718f1c1591cf1f Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
show more ...
|