| 609ada96 | 24-Mar-2025 |
Juan Pablo Conde <juanpablo.conde@arm.com> |
feat(rmmd): verify FEAT_MEC present before calling plat hoook
Some platforms do not support FEAT_MEC. Hence, they do not provide an interface to update the update of the key corresponding to a MECID
feat(rmmd): verify FEAT_MEC present before calling plat hoook
Some platforms do not support FEAT_MEC. Hence, they do not provide an interface to update the update of the key corresponding to a MECID.
This patch adds a condition in order to verify FEAT_MEC is present before calling the corresponding platform hook, thus preventing it from being called when the platform does not support the feature.
Change-Id: Ib1eb9e42f475e27ec31529569e888b93b207148c Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com>
show more ...
|
| 3c198a97 | 21-Mar-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(rdv3): correctly handle FP regs context saving" into integration |
| ac05182d | 20-Mar-2025 |
Rakshit Goyal <rakshit.goyal@arm.com> |
fix(rdv3): correctly handle FP regs context saving
Commit fe488c3796e01187fb6cffdd27a1bee1a33e0931 added an override to force `CTX_INCLUDE_SVE_REGS` to 0 when `SPD == spmd` and `SPMD_SPM_AT_SEL2 ==
fix(rdv3): correctly handle FP regs context saving
Commit fe488c3796e01187fb6cffdd27a1bee1a33e0931 added an override to force `CTX_INCLUDE_SVE_REGS` to 0 when `SPD == spmd` and `SPMD_SPM_AT_SEL2 == 1`. Since there is an architectural dependency between FP and SVE registers, `CTX_INCLUDE_FPREGS` must also be overridden to 0 when CTX_INCLUDE_SVE_REGS is 0.
Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I1cd834241a2d5a5368ac532a348d8729a701bbcd
show more ...
|
| f801fdc2 | 22-Apr-2024 |
Tushar Khandelwal <tushar.khandelwal@arm.com> |
feat(rmmd): add RMM_MECID_KEY_UPDATE call
With this addition, TF-A now has an SMC call to handle the update of MEC keys associated to MECIDs.
The behavior of this newly added call is empty for now
feat(rmmd): add RMM_MECID_KEY_UPDATE call
With this addition, TF-A now has an SMC call to handle the update of MEC keys associated to MECIDs.
The behavior of this newly added call is empty for now until an implementation for the MPE (Memory Protection Engine) driver is available. Only parameter sanitization has been implemented.
Signed-off-by: Tushar Khandelwal <tushar.khandelwal@arm.com> Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org> Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com> Change-Id: I2a969310b47e8c6da1817a79be0cd56158c6efc3
show more ...
|
| d153bcf4 | 06-Mar-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(spm_mm): move mm_communication header define to general header" into integration |
| c7220035 | 03-Feb-2025 |
Manish Pandey <manish.pandey2@arm.com> |
fix(el3-runtime): replace CTX_ESR_EL3 with CTX_DOUBLE_FAULT_ESR
ESR_EL3 value is updated when an exception is taken to EL3 and its value does not change until a new exception is taken to EL3. We nee
fix(el3-runtime): replace CTX_ESR_EL3 with CTX_DOUBLE_FAULT_ESR
ESR_EL3 value is updated when an exception is taken to EL3 and its value does not change until a new exception is taken to EL3. We need to save ESR in context memory only when we expect nested exception in EL3.
The scenarios where we would expect nested EL3 execution are related with FFH_SUPPORT, namely 1.Handling pending async EAs at EL3 boundry - It uses CTX_SAVED_ESR_EL3 to preserve origins esr_el3 2.Double fault handling - Introduce an explicit storage (CTX_DOUBLE_FAULT_ESR) for esr_el3 to take care of DobuleFault.
As the ESR context has been removed, read the register directly instead of its context value in RD platform.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I7720c5f03903f894a77413a235e3cc05c86f9c17
show more ...
|
| fe488c37 | 20-Feb-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(rdv3): handle invalid build combination
`CTX_INCLUDE_SVE_REGS` should not be enabled when building with SPD=spmd and SPMD_SPM_AT_SEL2=1 both been used.
Unfortunately a check at top level makefi
fix(rdv3): handle invalid build combination
`CTX_INCLUDE_SVE_REGS` should not be enabled when building with SPD=spmd and SPMD_SPM_AT_SEL2=1 both been used.
Unfortunately a check at top level makefile ignored this, now its been fixed at top level makefile. Ensure correct combination are handled, otherwise it will lead to build failures.
Change-Id: Ib84fc0096c92d9b3d56366c0e1d77b6d83098221 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 99b2ae26 | 20-Feb-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "jw/gic-lca-support" into integration
* changes: fix(rdn2): add LCA multichip data for RD-N2-Cfg2 fix(rdv3): add LCA multichip data for RD-V3-Cfg2 feat(gic): add suppo
Merge changes from topic "jw/gic-lca-support" into integration
* changes: fix(rdn2): add LCA multichip data for RD-N2-Cfg2 fix(rdv3): add LCA multichip data for RD-V3-Cfg2 feat(gic): add support for local chip addressing
show more ...
|
| 26f789db | 13-Feb-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(neoverse-rd): initialize CNTFRQ_EL0 for RESET_TO_BL31" into integration |
| e0be63c8 | 13-Feb-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes I712712d7,I1932500e,I75dda77e,I12f3b8a3,Ia72e5900 into integration
* changes: refactor(rse)!: remove rse_comms_init refactor(arm): switch to rse_mbx_init refactor(rse): put MHU c
Merge changes I712712d7,I1932500e,I75dda77e,I12f3b8a3,Ia72e5900 into integration
* changes: refactor(rse)!: remove rse_comms_init refactor(arm): switch to rse_mbx_init refactor(rse): put MHU code in a dedicated file refactor(tc): add plat_rse_comms_init refactor(arm)!: rename PLAT_MHU_VERSION flag
show more ...
|
| 94a4383a | 11-Feb-2025 |
Lokesh B V <Lokesh.BV@Arm.com> |
fix(neoverse-rd): initialize CNTFRQ_EL0 for RESET_TO_BL31
When RESET_TO_BL31 was enabled, CNTFRQ_EL0 was left uninitialized, leading to incorrect system counter frequency settings. This impacted tim
fix(neoverse-rd): initialize CNTFRQ_EL0 for RESET_TO_BL31
When RESET_TO_BL31 was enabled, CNTFRQ_EL0 was left uninitialized, leading to incorrect system counter frequency settings. This impacted timer-dependent components, such as SMMUv3, causing initialization failures and unpredictable behavior.
To fix this, CNTFRQ_EL0 is now explicitly set using plat_get_syscnt_freq2(), ensuring the correct system timer frequency and proper initialization of dependent components.
Signed-off-by: Lokesh B V <Lokesh.BV@Arm.com> Change-Id: I808b17d25c87c4dce1bc2c8171a800b69b5c2908
show more ...
|
| b51436c2 | 20-Nov-2024 |
Levi Yun <yeoreum.yun@arm.com> |
feat(spm_mm): move mm_communication header define to general header
To support TPM start method with SIP, SIP handler dispatch request to secure partition via MM_COMMUNICATE abi. That means spm_mm s
feat(spm_mm): move mm_communication header define to general header
To support TPM start method with SIP, SIP handler dispatch request to secure partition via MM_COMMUNICATE abi. That means spm_mm sip handler should generate mm communication header.
Move mm_communication header's definition to spm_mm_svc header.
Change-Id: I40567c16e67b068ee83a39eff050d6578aecfb2c Signed-off-by: Levi Yun <yeoreum.yun@arm.com>
show more ...
|
| 08963618 | 07-Feb-2025 |
Yann Gautier <yann.gautier@st.com> |
refactor(arm): switch to rse_mbx_init
The rse_comms_init() function will be removed. The new function to use is rse_mbx_init() for the MHU mailbox initialization.
Change-Id: I1932500ef71b6e895f0ee1
refactor(arm): switch to rse_mbx_init
The rse_comms_init() function will be removed. The new function to use is rse_mbx_init() for the MHU mailbox initialization.
Change-Id: I1932500ef71b6e895f0ee164ee9c2b58becf4409 Signed-off-by: Yann Gautier <yann.gautier@st.com>
show more ...
|
| a7739550 | 24-Sep-2024 |
Yann Gautier <yann.gautier@st.com> |
refactor(arm)!: rename PLAT_MHU_VERSION flag
In order to support a platform without MHU in RSE, update the flag PLAT_MHU_VERSION. It is renamed PLAT_MHU and can take the following entries: NO_MHU, M
refactor(arm)!: rename PLAT_MHU_VERSION flag
In order to support a platform without MHU in RSE, update the flag PLAT_MHU_VERSION. It is renamed PLAT_MHU and can take the following entries: NO_MHU, MHUv1, MHUv2, MHUv3...
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: Ia72e590088ce62ba8c9009f341b6135926947bee
show more ...
|
| ac07f3ab | 22-Jan-2025 |
AlexeiFedorov <Alexei.Fedorov@arm.com> |
chore(gpt): define PPS in platform header files
Define protected physical address size in bytes PLAT_ARM_PPS macro for FVP and RDV3 in platform_def.h files.
Change-Id: I7f6529dfbb8df864091fbefc0813
chore(gpt): define PPS in platform header files
Define protected physical address size in bytes PLAT_ARM_PPS macro for FVP and RDV3 in platform_def.h files.
Change-Id: I7f6529dfbb8df864091fbefc08131a0e6d689eb6 Signed-off-by: AlexeiFedorov <Alexei.Fedorov@arm.com>
show more ...
|
| 7a4a0707 | 22-Jan-2025 |
AlexeiFedorov <Alexei.Fedorov@arm.com> |
feat(fvp): allocate L0 GPT at the top of SRAM
This patch allocates level 0 GPT at the top of SRAM for FVP. This helps to meet L0 GPT alignment requirements and prevent the occurrence of possible unu
feat(fvp): allocate L0 GPT at the top of SRAM
This patch allocates level 0 GPT at the top of SRAM for FVP. This helps to meet L0 GPT alignment requirements and prevent the occurrence of possible unused gaps in SRAM. Load addresses for FVP TB_FW, SOC_FW and TOS_FW DTBs are defined in fvp_fw_config.dts via ARM_BL_RAM_BASE macro.
Change-Id: Iaa52e302373779d9fdbaf4e1ba40c10aa8d1f8bd Signed-off-by: AlexeiFedorov <Alexei.Fedorov@arm.com>
show more ...
|
| bef44f60 | 14-Oct-2024 |
AlexeiFedorov <Alexei.Fedorov@arm.com> |
feat(rmm): add PCIe IO info to Boot manifest
- Add PCIe and SMMUv3 related information to DTS for configurations with ENABLE_RME=1. - Add entries for PCIe IO memory regions to Boot manifest - Upda
feat(rmm): add PCIe IO info to Boot manifest
- Add PCIe and SMMUv3 related information to DTS for configurations with ENABLE_RME=1. - Add entries for PCIe IO memory regions to Boot manifest - Update RMMD_MANIFEST_VERSION_MINOR from 3 to 4. - Read PCIe related information from DTB and write it to Boot manifest. - Rename structures that used to describe DRAM layout and now describe both DRAM and PCIe IO memory regions: - ns_dram_bank -> memory_bank - ns_dram_info -> memory_info.
Change-Id: Ib75d1af86076f724f5c330074e231f1c2ba8e21d Signed-off-by: AlexeiFedorov <Alexei.Fedorov@arm.com>
show more ...
|
| 8b68a617 | 06-Feb-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "RDV3-hafnium-support" into integration
* changes: feat(rdv3): enable the support to fetch dynamic config feat(rdv3): add dts files to enable hafnium as BL32 feat(rdv3
Merge changes from topic "RDV3-hafnium-support" into integration
* changes: feat(rdv3): enable the support to fetch dynamic config feat(rdv3): add dts files to enable hafnium as BL32 feat(rdv3): define SPMC manifest base address feat(arm): add a macro for SPMC manifest base address feat(rdv3): add carveout for BL32 image feat(rdv3): introduce platform handler for Group0 interrupt feat(neoverse-rd): use larger stack size when S-EL2 spmc is enabled fix(neoverse-rd): set correct SVE vector lengths
show more ...
|
| 37cc7fa5 | 14-Sep-2023 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(rdv3): enable the support to fetch dynamic config
To enable the support to load Hafnium as BL32, BL31 needs firmware configuration info to get BL32 manifest load location. The load address of B
feat(rdv3): enable the support to fetch dynamic config
To enable the support to load Hafnium as BL32, BL31 needs firmware configuration info to get BL32 manifest load location. The load address of BL32 is passed via firmware config info.
Add the support to get the address using fconf framework from dynamic config info.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I3a2a5706789ed290dc7f4a67e62e03751b930c02
show more ...
|
| 4d9b8281 | 14-Sep-2023 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(rdv3): add dts files to enable hafnium as BL32
On RD-V3 platform and variants, Hafnium is used as SPMC running at S-EL2 and manage SP running at S-EL0. Hafnium is loaded and configured as BL32
feat(rdv3): add dts files to enable hafnium as BL32
On RD-V3 platform and variants, Hafnium is used as SPMC running at S-EL2 and manage SP running at S-EL0. Hafnium is loaded and configured as BL32 image. SP is loaded by SP load framework and configured by Hafnium.
Add the dts files needed to enable load and configuration of hafnium and SP.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Signed-off-by: Rohit Mathew <rohit.mathew@arm.com> Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I7de72052323ff9106d7bedbaaf5ece3272e9a6cd
show more ...
|
| 12973bcc | 05-Jun-2024 |
Rakshit Goyal <rakshit.goyal@arm.com> |
feat(rdv3): define SPMC manifest base address
ARM_SPMC_MANIFEST_BASE defines the base address of the SPMC manifest used by BL32. In the non-RESET_TO_BL31 case, it is defined relative to the top of T
feat(rdv3): define SPMC manifest base address
ARM_SPMC_MANIFEST_BASE defines the base address of the SPMC manifest used by BL32. In the non-RESET_TO_BL31 case, it is defined relative to the top of Trusted SRAM. However, for RESET_TO_BL31, the PLAT_ARM_SPMC_MANIFEST_BASE macro can be used to set it to a different location which is then used to populate ARM_SPMC_MANIFEST_BASE.
As the RD-V3 platform and its variants have a different SRAM layout compared to that defined in arm_def.h, define the PLAT_ARM_SPMC_MANIFEST_BASE macro to an address suitable for this platform and its variants.
Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I36e1eb21ab3d1c68bddb52c62198fcdfc40d8993
show more ...
|
| 6fb8d8cf | 06-Dec-2024 |
Jerry Wang <Jerry.Wang4@arm.com> |
fix(rdn2): correct RD-N2 StMM uuid format
Edk2 converts StMM GUID to UUID format, which is used in FF-A and linux kernel. StMM manifest currently provides GUID format. Correcting this to UUID format
fix(rdn2): correct RD-N2 StMM uuid format
Edk2 converts StMM GUID to UUID format, which is used in FF-A and linux kernel. StMM manifest currently provides GUID format. Correcting this to UUID format.
Change-Id: Ie94728e5ea74d3d9935e0af9a2a601cbafe5ad3d Signed-off-by: Jerry Wang <Jerry.Wang4@arm.com>
show more ...
|
| 6823f5f5 | 02-Apr-2024 |
Rohit Mathew <rohit.mathew@arm.com> |
feat(rdv3): add carveout for BL32 image
Add and map the carveout for loading Hafnium as BL32 image. Also define PLAT_ARM_SP_MAX_SIZE as 3 MB for secure partitions.
Signed-off-by: Rohit Mathew <rohi
feat(rdv3): add carveout for BL32 image
Add and map the carveout for loading Hafnium as BL32 image. Also define PLAT_ARM_SP_MAX_SIZE as 3 MB for secure partitions.
Signed-off-by: Rohit Mathew <rohit.mathew@arm.com> Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I2845eb6807a127c9f6b92de2dabc9a58d25bd4d4
show more ...
|
| 4593b932 | 27-Jun-2024 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(rdv3): introduce platform handler for Group0 interrupt
This patch introduces a handler for RD-V3 variants to handle Group0 secure interrupts. Currently, it is empty but serves as a placeholder
feat(rdv3): introduce platform handler for Group0 interrupt
This patch introduces a handler for RD-V3 variants to handle Group0 secure interrupts. Currently, it is empty but serves as a placeholder for future Group0 interrupt sources.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: Ifa418094f6075a6cdc33e63eec1825103bbf6d68
show more ...
|
| 82f46593 | 27-Sep-2023 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(neoverse-rd): use larger stack size when S-EL2 spmc is enabled
Larger stack size is needed when S-EL2 SPMC is enabled. This is required because BL31 xlat map framework makes more nested calls w
feat(neoverse-rd): use larger stack size when S-EL2 spmc is enabled
Larger stack size is needed when S-EL2 SPMC is enabled. This is required because BL31 xlat map framework makes more nested calls when this feature is enabled.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: Ib3f2abf38b576ba96402dab4ba995d8b648b4cc7
show more ...
|