| 289578e6 | 24-Oct-2024 |
Jerry Wang <Jerry.Wang4@arm.com> |
fix(rdn2): add LCA multichip data for RD-N2-Cfg2
This patch adds the routing table addresses required for LCA enablement on RD-N2-Cfg2. CMN on RD-N2-Cfg2 uses AXI Stream IDs to route LCA connections
fix(rdn2): add LCA multichip data for RD-N2-Cfg2
This patch adds the routing table addresses required for LCA enablement on RD-N2-Cfg2. CMN on RD-N2-Cfg2 uses AXI Stream IDs to route LCA connections to the correct downstream tx_cxs_a4s port. The data programmed in the routing table are the A4S IDs of each chip.
Change-Id: I46e558f3be7f0d51b768b7c5586f15e6bc517f3a Signed-off-by: Jerry Wang <Jerry.Wang4@arm.com>
show more ...
|
| d0b93a0d | 16-Sep-2024 |
Jerry Wang <Jerry.Wang4@arm.com> |
fix(rdv3): add LCA multichip data for RD-V3-Cfg2
This patch adds the routing table addresses required for LCA enablement on RD-V3-Cfg2. Since LCA connection on rdv3 uses ACE5L instead of A4S, the ad
fix(rdv3): add LCA multichip data for RD-V3-Cfg2
This patch adds the routing table addresses required for LCA enablement on RD-V3-Cfg2. Since LCA connection on rdv3 uses ACE5L instead of A4S, the addresses programmed in the routing table is the address of memory mapped HNI with chip offset.
Change-Id: Ic235983d63e8ab3492ae566b68841d0659724e45 Signed-off-by: Jerry Wang <Jerry.Wang4@arm.com>
show more ...
|
| 527fc465 | 07-Feb-2024 |
Vivek Gautam <vivek.gautam@arm.com> |
feat(neoverse-rd): enable RESET_TO_BL31 for RD-V3
Update addresses for BL31, BL33 and NT_FW_CONFIG. Also add the PAS entries to setup GPT tables in BL31.
Signed-off-by: Vivek Gautam <vivek.gautam@a
feat(neoverse-rd): enable RESET_TO_BL31 for RD-V3
Update addresses for BL31, BL33 and NT_FW_CONFIG. Also add the PAS entries to setup GPT tables in BL31.
Signed-off-by: Vivek Gautam <vivek.gautam@arm.com> Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I8947660bb96fdf2f178e560b387e4bc93bf68abf
show more ...
|
| 42cf6026 | 10-Jul-2024 |
Juan Pablo Conde <juanpablo.conde@arm.com> |
refactor(rmmd): plat token requests in pieces
Until now, the attestation token size was limited by the size of the shared buffer between RMM and TF-A. With this change, RMM can now request the token
refactor(rmmd): plat token requests in pieces
Until now, the attestation token size was limited by the size of the shared buffer between RMM and TF-A. With this change, RMM can now request the token in pieces, so they fit in the shared buffer. A new output parameter was added to the SMC call, which will return (along with the size of bytes copied into the buffer) the number of bytes of the token that remain to be retrieved.
TF-A will keep an offset variable that will indicate the position in the token where the next call will retrieve bytes from. This offset will be increased on every call by adding the number number of bytes copied. If the received hash size is not 0, TF-A will reset the offset to 0 and copy from that position on.
The SMC call will now return at most the size of the shared buffer in bytes on every call. Therefore, from now on, multiple SMC calls may be needed to be issued if the token size exceeds the shared buffer size.
Change-Id: I591f7013d06f64e98afaf9535dbea6f815799723 Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com>
show more ...
|
| a0674ab0 | 07-May-2024 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
refactor(cm): remove el1 context when SPMD_SPM_AT_SEL2=1
* Currently, EL1 context is included in cpu_context_t by default for all the build configurations. As part of the cpu context structure,
refactor(cm): remove el1 context when SPMD_SPM_AT_SEL2=1
* Currently, EL1 context is included in cpu_context_t by default for all the build configurations. As part of the cpu context structure, we hold a copy of EL1, EL2 system registers, per world per PE. This context structure is enormous and will continue to grow bigger with the addition of new features incorporating new registers.
* Ideally, EL3 should save and restore the system registers at its next lower exception level, which is EL2 in majority of the configurations.
* This patch aims at optimising the memory allocation in cases, when the members from the context structure are unused. So el1 system register context must be omitted when lower EL is always x-EL2.
* "CTX_INCLUDE_EL2_REGS" is the internal build flag which gets set, when SPD=spmd and SPMD_SPM_AT_SEL2=1 or ENABLE_RME=1. It indicates, the system registers at EL2 are context switched for the respective build configuration. Here, there is no need to save and restore EL1 system registers, while x-EL2 is enabled.
Henceforth, this patch addresses this issue, by taking out the EL1 context at all possible places, while EL2 (CTX_INCLUDE_EL2_REGS) is enabled, there by saving memory.
Change-Id: Ifddc497d3c810e22a15b1c227a731bcc133c2f4a Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| 42e35d2f | 11-Apr-2024 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
refactor(cm): convert el1-ctx assembly offset entries to c structure
Currently the EL1 part of the context structure (el1_sysregs_t), is coupled with feature flags reducing the context memory alloca
refactor(cm): convert el1-ctx assembly offset entries to c structure
Currently the EL1 part of the context structure (el1_sysregs_t), is coupled with feature flags reducing the context memory allocation for platforms, that don't enable/support all the architectural features at once.
Similar to the el2 context optimization commit-"d6af234" this patch further improves this section by converting the assembly context-offset entries into a c structure. It relies on garbage collection of the linker removing unreferenced structures from memory, as well as aiding in readability and future maintenance. Additionally, it eliminates the #ifs usage in 'context_mgmt.c' source file.
Change-Id: If6075931cec994bc89231241337eccc7042c5ede Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| 61829505 | 01-Jun-2023 |
Sayanta Pattanayak <sayanta.pattanayak@arm.com> |
feat(rdfremont): add support for measured boot at BL1 and BL2
RD-Fremont platforms include Runtime Security Engine (RSE) as the hardware crypto module. Add rse_measured_boot driver based platform ho
feat(rdfremont): add support for measured boot at BL1 and BL2
RD-Fremont platforms include Runtime Security Engine (RSE) as the hardware crypto module. Add rse_measured_boot driver based platform hooks to measure and record firmware image measurements.
Additionally, add support for measured boot at BL1 and BL2 boot stages on RD-Fremont platforms. The patch adds the RSE measured boot metadata that includes firmware image IDs, measurement slot number and other information. It also initializes the AP communication with RSE over AP-RSE root MHUv3 channel to pass firmware image measurements to RSE to support extended measurements.
Signed-off-by: Sayanta Pattanayak <sayanta.pattanayak@arm.com> Signed-off-by: Rohit Mathew <rohit.mathew@arm.com> Signed-off-by: Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Signed-off-by: Vivek Gautam <vivek.gautam@arm.com> Change-Id: Ia1b0bf673e865b31862cb8af79c4c71a5ba4dbea
show more ...
|
| 47348b1c | 28-Nov-2023 |
Rohit Mathew <Rohit.Mathew@arm.com> |
feat(neoverse-rd): add MHUv3 channels on third gen multichip platforms
Add MHUv3 doorbell channel information to scmi_channel_plat_info_t for third generation of multichip Neoverse reference design
feat(neoverse-rd): add MHUv3 channels on third gen multichip platforms
Add MHUv3 doorbell channel information to scmi_channel_plat_info_t for third generation of multichip Neoverse reference design platforms.
Signed-off-by: Rohit Mathew <Rohit.Mathew@arm.com> Signed-off-by: Vivek Gautam <vivek.gautam@arm.com> Change-Id: Ie4ebf47a10f2f6e33c7ecfc8008e30bacc62bf3d
show more ...
|
| 46d474fc | 25-Oct-2022 |
Shriram K <shriram.k@arm.com> |
feat(neoverse-rd): add MHUv3 doorbell channels on third gen platforms
Define and use a new scmi_channel_plat_info_t structure specific to third generation Neoverse platforms in order to use MHUv3 do
feat(neoverse-rd): add MHUv3 doorbell channels on third gen platforms
Define and use a new scmi_channel_plat_info_t structure specific to third generation Neoverse platforms in order to use MHUv3 doorbell channels. The structure uses the existing mhu_ring_doorbell method for ring_doorbell implementation.
Signed-off-by: Shriram K <shriram.k@arm.com> Signed-off-by: Vivek Gautam <vivek.gautam@arm.com> Change-Id: Icf3be5305df94ba944038a4d4fdf0ccf32168650
show more ...
|