| 8c87becb | 03-Oct-2022 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(cpu): add library support for Hunter ELP
Add basic CPU library code to support the Hunter ELP CPU in TF-A. Hunter-ELP adds v9.2 architecture support and is derived from Makalu-ELP. As such, the
feat(cpu): add library support for Hunter ELP
Add basic CPU library code to support the Hunter ELP CPU in TF-A. Hunter-ELP adds v9.2 architecture support and is derived from Makalu-ELP. As such, the library code is adapted from the Makalu-ELP support library.
Change-Id: I7e93b9af6b1f0bc4d08c3cf5caf071d2cbdbc89f Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 70247ddb | 05-Oct-2022 |
Tamas Ban <tamas.ban@arm.com> |
fix(rss): rename AP-RSS message size macro
Adding PLAT_* prefix to indicate that the platform needs to provide this definition.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: I0bd02be405fd
fix(rss): rename AP-RSS message size macro
Adding PLAT_* prefix to indicate that the platform needs to provide this definition.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: I0bd02be405fd8b1e625bd2b82647ebb2b58265fc
show more ...
|
| d5f225d9 | 04-Jul-2022 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(fvp): add plat API to validate that passed region is non-secure
Added a platform function to check passed region is within the Non-Secure region of DRAM.
Signed-off-by: Manish V Badarkhe <Mani
feat(fvp): add plat API to validate that passed region is non-secure
Added a platform function to check passed region is within the Non-Secure region of DRAM.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: Ie5808fa6a1b6e6bc99f4185fa8acc52af0d5f14d
show more ...
|
| 586f60cc | 12-Jul-2022 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(fvp): add plat API to set and get the DRTM error
Added a platform function to set and get DRTM error. Also, added a platform function to reset the system.
Signed-off-by: Manish V Badarkhe <Man
feat(fvp): add plat API to set and get the DRTM error
Added a platform function to set and get DRTM error. Also, added a platform function to reset the system.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: I471f2387f8c78b21a06af063a6fa02cda3646557
show more ...
|
| 2a1cdee4 | 11-Mar-2022 |
johpow01 <john.powell@arm.com> |
feat(drtm): add platform functions for DRTM
Added platform hooks to retrieve DRTM features and address map. Additionally, implemented these hooks for the FVP platform.
Signed-off-by: John Powell <j
feat(drtm): add platform functions for DRTM
Added platform hooks to retrieve DRTM features and address map. Additionally, implemented these hooks for the FVP platform.
Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: I5621cc9807ffff8139ae8876250147f7b2c76759
show more ...
|
| c9bd1bac | 25-Feb-2022 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
feat(fvp): add crypto support in BL31
DRTM implementation needs crypto support in BL31 to calculate hash of various DRTM components
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Change
feat(fvp): add crypto support in BL31
DRTM implementation needs crypto support in BL31 to calculate hash of various DRTM components
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Change-Id: I659ce8e54550946db253d23f150cca8b2fa7b880
show more ...
|
| 8a8dace5 | 23-Feb-2022 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
feat(fvp): increase MAX_XLAT_TABLES entries for DRTM support
DRTM implementation maps the DLME data region provided by the DCE-preamble in BL31, hence increased MAX_XLAT_TABLES entries count.
Signe
feat(fvp): increase MAX_XLAT_TABLES entries for DRTM support
DRTM implementation maps the DLME data region provided by the DCE-preamble in BL31, hence increased MAX_XLAT_TABLES entries count.
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Signed-off-by: Lucian Paul-Trifu <lucian.paultrifu@gmail.com> Change-Id: I5f0ac69e009c4f81d3590fdb1f4c0a7f73c5c99d
show more ...
|
| 44df105f | 23-Feb-2022 |
Lucian Paul-Trifu <lucian.paultrifu@gmail.com> |
feat(fvp): increase BL31's stack size for DRTM support
The stack size of BL31 has been increased to accommodate the introduction of mbedTLS support for DRTM.
Signed-off-by: Manish V Badarkhe <manis
feat(fvp): increase BL31's stack size for DRTM support
The stack size of BL31 has been increased to accommodate the introduction of mbedTLS support for DRTM.
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Signed-off-by: Lucian Paul-Trifu <lucian.paultrifu@gmail.com> Change-Id: Id0beacf4df553af4ecbe714af20e71604ccfed59
show more ...
|
| d72c486b | 22-Jun-2022 |
Lucian Paul-Trifu <lucian.paultrifu@gmail.com> |
feat(fvp): add platform hooks for DRTM DMA protection
Added necessary platform hooks for DRTM DMA protection. These calls will be used by the subsequent DRTM implementation patches. DRTM platform AP
feat(fvp): add platform hooks for DRTM DMA protection
Added necessary platform hooks for DRTM DMA protection. These calls will be used by the subsequent DRTM implementation patches. DRTM platform API declarations have been listed down in a separate header file.
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Signed-off-by: Lucian Paul-Trifu <lucian.paultrifu@gmail.com> Change-Id: Ib9726d1d3570800241bde702ee7006a64f1739ec
show more ...
|
| afc9b23b | 05-Oct-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(fvp): support building RSS comms driver" into integration |
| 29e6fc5c | 31-Aug-2022 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
feat(fvp): support building RSS comms driver
On one hand, there is currently no upstream platform supporting the RSS. On the other hand, we are gradually introducing driver code for RSS. Even though
feat(fvp): support building RSS comms driver
On one hand, there is currently no upstream platform supporting the RSS. On the other hand, we are gradually introducing driver code for RSS. Even though we cannot test this code in the TF-A CI right now, we can at least build it to make sure no build regressions are introduced as we continue development.
This patch adds support for overriding PLAT_RSS_NOT_SUPPORTED build flag (which defaults to 1 on the Base AEM FVP) from the command line. This allows introducing an ad-hoc CI build config with PLAT_RSS_NOT_SUPPORTED=0, which will correctly pull in the RSS and MHU source files. Of course, the resulting firmware will not be functional.
Change-Id: I2b0e8dd03bf301e7063dd4734ea5266b73265be1 Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
show more ...
|
| bd063a73 | 21-Sep-2022 |
Joel Goddard <joel.goddard@arm.com> |
refactor(cpu): use the updated IP name for Demeter CPU
Neoverse Demeter CPU has been renamed to Neoverse V2 CPU. Correspondingly, update the CPU library, file names and other references to use the u
refactor(cpu): use the updated IP name for Demeter CPU
Neoverse Demeter CPU has been renamed to Neoverse V2 CPU. Correspondingly, update the CPU library, file names and other references to use the updated IP name.
Signed-off-by: Joel Goddard <joel.goddard@arm.com> Change-Id: Ia4bf45bf47807c06f4c966861230faea420d088f
show more ...
|
| 364b4cdd | 19-Sep-2022 |
Mate Toth-Pal <mate.toth-pal@arm.com> |
fix(rme): update FVP platform token
Update test CCA Platform token in fvp_plat_attest_token.c to be up-to-date with RMM spec Beta0.
Change-Id: I0f5e2ac1149eb6f7a93a997682f41d90e109a049 Signed-off-b
fix(rme): update FVP platform token
Update test CCA Platform token in fvp_plat_attest_token.c to be up-to-date with RMM spec Beta0.
Change-Id: I0f5e2ac1149eb6f7a93a997682f41d90e109a049 Signed-off-by: Mate Toth-Pal <mate.toth-pal@arm.com>
show more ...
|
| 885e2683 | 12-Sep-2022 |
Claus Pedersen <claustbp@google.com> |
refactor(libc): clean up dependencies in libc
- Removing platform dependencies from libc modules. - Replacing panicking with actual error handling. - Debug macros are included indirectly from assert
refactor(libc): clean up dependencies in libc
- Removing platform dependencies from libc modules. - Replacing panicking with actual error handling. - Debug macros are included indirectly from assert.h. Removing "platform_def.h" from assert.h and adding "common/debug.h" where the macros are used. - Removing hack for fixing PLAT_LOG_LEVEL_ASSERT to 40. Instead removing assert with expression, as this does not provide additional information.
Signed-off-by: Claus Pedersen <claustbp@google.com> Change-Id: Icc201ea7b63c1277e423c1cfd13fd6816c2bc568
show more ...
|
| c58b9a8e | 23-Aug-2022 |
Rupinderjit Singh <rupinderjit.singh@arm.com> |
refactor(cpu): update IP names of Makalu CPU lib
* ASM files are renamed to have public IP names in their filename. * updated other files to include ASM filename changes.
Signed-off-by: Rupin
refactor(cpu): update IP names of Makalu CPU lib
* ASM files are renamed to have public IP names in their filename. * updated other files to include ASM filename changes.
Signed-off-by: Rupinderjit Singh <rupinderjit.singh@arm.com> Change-Id: Ie899c512b11fd7c4312e3a808bb6b9d2376cdb8c
show more ...
|
| 5b7bd2af | 09-Aug-2022 |
Shruti Gupta <shruti.gupta@arm.com> |
feat(tsp): increase stack size for tsp
TSP testcases for EL3 SPMC have higher stack usage.
Change-Id: Ib5bfdccc6d0f65174e257f3b0e8b41bcd3c704a6 Signed-off-by: Shruti Gupta <shruti.gupta@arm.com> |
| 3cf080ed | 23-Nov-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(fvp/tsp_manifest): add example manifest for TSP
Add an example manifest for the EL3 SPMC on the FVP Platform that allows booting the TSP example partition.
Signed-off-by: Marc Bonnici <marc.bo
feat(fvp/tsp_manifest): add example manifest for TSP
Add an example manifest for the EL3 SPMC on the FVP Platform that allows booting the TSP example partition.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: Ie7f40328e0313abb5b1a121dfdc22a5f7387587f Signed-off-by: Shruti Gupta <shruti.gupta@arm.com>
show more ...
|
| 8dc7645c | 18-Jul-2022 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
refactor(fvp): add missing header guard in fvp_critical_data.h
Change-Id: If7d1a9dd756164c8e31e29d9e36973f1a21fc8b6 Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com> |
| 717daadc | 05-Jul-2022 |
Soby Mathew <soby.mathew@arm.com> |
Merge changes from topic "jas/rmm-el3-ifc" into integration
* changes: docs(rmmd): document EL3-RMM Interfaces feat(rmmd): add support to create a boot manifest fix(rme): use RMM shared buffer
Merge changes from topic "jas/rmm-el3-ifc" into integration
* changes: docs(rmmd): document EL3-RMM Interfaces feat(rmmd): add support to create a boot manifest fix(rme): use RMM shared buffer for attest SMCs feat(rmmd): add support for RMM Boot interface
show more ...
|
| 1d0ca40e | 25-Apr-2022 |
Javier Almansa Sobrino <javier.almansasobrino@arm.com> |
feat(rmmd): add support to create a boot manifest
This patch also adds an initial RMM Boot Manifest (v0.1) for fvp platform.
Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com> Ch
feat(rmmd): add support to create a boot manifest
This patch also adds an initial RMM Boot Manifest (v0.1) for fvp platform.
Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com> Change-Id: I1374f8f9cb207028f1820953cd2a5cf6d6c3b948
show more ...
|
| dc65ae46 | 13-Apr-2022 |
Javier Almansa Sobrino <javier.almansasobrino@arm.com> |
fix(rme): use RMM shared buffer for attest SMCs
Use the RMM shared buffer to attestation token and signing key SMCs.
Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com> Change-Id:
fix(rme): use RMM shared buffer for attest SMCs
Use the RMM shared buffer to attestation token and signing key SMCs.
Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com> Change-Id: I313838b26d3d9334fb0fe8cd4b229a326440d2f4
show more ...
|
| 8c980a4a | 24-Nov-2021 |
Javier Almansa Sobrino <javier.almansasobrino@arm.com> |
feat(rmmd): add support for RMM Boot interface
This patch adds the infrastructure needed to pass boot arguments from EL3 to RMM and allocates a shared buffer between both worlds that can be used, am
feat(rmmd): add support for RMM Boot interface
This patch adds the infrastructure needed to pass boot arguments from EL3 to RMM and allocates a shared buffer between both worlds that can be used, among others, to pass a boot manifest to RMM. The buffer is composed a single memory page be used by a later EL3 <-> RMM interface by all CPUs.
The RMM boot manifest is not implemented by this patch.
In addition to that, this patch also enables support for RMM when RESET_TO_BL31 is enabled.
Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com> Change-Id: I855cd4758ee3843eadd9fb482d70a6d18954d82a
show more ...
|
| 2d8e80c2 | 30-Jun-2022 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge changes from topics "binary-format-sp", "od/meas-boot-spmc" into integration
* changes: feat(spm): add tpm event log node to spmc manifest fix(measured-boot): add SP entries to event_log_m
Merge changes from topics "binary-format-sp", "od/meas-boot-spmc" into integration
* changes: feat(spm): add tpm event log node to spmc manifest fix(measured-boot): add SP entries to event_log_metadata
show more ...
|
| 02450800 | 27-Jun-2022 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge changes from topic "mb_hash" into integration
* changes: refactor(imx): update config of mbedtls support refactor(qemu): update configuring mbedtls support refactor(measured-boot): mb al
Merge changes from topic "mb_hash" into integration
* changes: refactor(imx): update config of mbedtls support refactor(qemu): update configuring mbedtls support refactor(measured-boot): mb algorithm selection
show more ...
|
| 054f0fe1 | 15-Jun-2022 |
Olivier Deprez <olivier.deprez@arm.com> |
feat(spm): add tpm event log node to spmc manifest
Add the TPM event log node to the SPMC manifest such that the TF-A measured boot infrastructure fills the properties with event log address for com
feat(spm): add tpm event log node to spmc manifest
Add the TPM event log node to the SPMC manifest such that the TF-A measured boot infrastructure fills the properties with event log address for components measured by BL2 at boot time. For a SPMC there is a particular interest with SP measurements. In the particular case of Hafnium SPMC, the tpm event log node is not yet consumed, but the intent is later to pass this information to an attestation SP.
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: Ic30b553d979532c5dad9ed6d419367595be5485e
show more ...
|