| 9face212 | 08-Jan-2024 |
Jackson Cooper-Driver <jackson.cooper-driver@arm.com> |
feat(tc): enable SME and SME2 options for TC4
Set the Make flags for TF-A to be able to enable SME and SME2 features. Note that we enable these architectural features for both the secure and non-sec
feat(tc): enable SME and SME2 options for TC4
Set the Make flags for TF-A to be able to enable SME and SME2 features. Note that we enable these architectural features for both the secure and non-secure worlds, which is required on TC4.
In the case of the non-secure world, we specify a value of 2 for the flag which specifies that TF-A should check the feature register to ensure that the feature is present before enabling it. This allows these flags to be compatible with all platforms and stops TF-A doing anything different if it does not detect that the feature is present.
Change-Id: I51f8c7e3eb1cf06767f4b155c93269e1f129f730 Signed-off-by: Jackson Cooper-Driver <jackson.cooper-driver@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| d6b6a8b7 | 22-Apr-2024 |
Jackson Cooper-Driver <jackson.cooper-driver@arm.com> |
feat(tc): add system generic timer register definition for TC4
Add new include (specific to TC4) to the TC platform file which specifies the system generic timer base address and is used by the TF-a
feat(tc): add system generic timer register definition for TC4
Add new include (specific to TC4) to the TC platform file which specifies the system generic timer base address and is used by the TF-a for use as system counters.
Note that this include must come before arm_def.h. This is required as it checks if ARM_SYS_CNTCTL macros are defined before defining its own macros.
Change-Id: I56861e5737271b29f09c75d962533be620766b52 Signed-off-by: Jackson Cooper-Driver <jackson.cooper-driver@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| e8e1b608 | 14-Dec-2023 |
Jackson Cooper-Driver <jackson.cooper-driver@arm.com> |
feat(tc): allow TARGET_VERSION=4
Add basic support for TARGET_VERSION=4. It extends the existing 'if' statements in the Makefile and the header to allow them to take the value of 4 and also specifie
feat(tc): allow TARGET_VERSION=4
Add basic support for TARGET_VERSION=4. It extends the existing 'if' statements in the Makefile and the header to allow them to take the value of 4 and also specifies the SCMI platform info to use for TC4.
Change-Id: I8d8257671314277a133e88ef65fae8fada93d00e Signed-off-by: Jackson Cooper-Driver <jackson.cooper-driver@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| 36ffe3e1 | 10-May-2024 |
Leo Yan <leo.yan@arm.com> |
feat(tc): add MHUv3 register addresses for TC4
Change-Id: I06351fc048d792943f338291f8f64827339e8e1c Signed-off-by: Leo Yan <leo.yan@arm.com> |
| 74dc801d | 12-Aug-2024 |
Manish Pandey <manish.pandey2@arm.com> |
feat(tc): enable trbe errata flags for Cortex-A520 and X4
Enable following erratas as per the TARGET_PLATFORM of TC - ERRATA_A520_2938996 - ERRATA_X4_2726228
Signed-off-by: Manish Pandey <manish.
feat(tc): enable trbe errata flags for Cortex-A520 and X4
Enable following erratas as per the TARGET_PLATFORM of TC - ERRATA_A520_2938996 - ERRATA_X4_2726228
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: Ia552473740c34867dd9fd619faf378adcb784821
show more ...
|
| 7754b770 | 18-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
feat(tc): make SPE feature asymmetric
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: Ibf0fecb2a97cb0f3508e01e0907e61e3c437ac00 |
| 89c58a50 | 02-Feb-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
feat(tc): setup ni-tower non-secure access for TC3
NI-Tower's component's registers are need to be accessed from kernel NI-PMU driver so enable NS access to it.
Change-Id: I83a8b3a1d2778baf767ff932
feat(tc): setup ni-tower non-secure access for TC3
NI-Tower's component's registers are need to be accessed from kernel NI-PMU driver so enable NS access to it.
Change-Id: I83a8b3a1d2778baf767ff93263e246d127ef8114 Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| e1b76cb0 | 23-Jul-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
feat(tc): enable Last-level cache (LLC)
The EXTLLC bit in CPUECTLR_EL1 register indicates that an external Last-level cache is present in the system.
This bit is not set for CPUs on TC3 platform de
feat(tc): enable Last-level cache (LLC)
The EXTLLC bit in CPUECTLR_EL1 register indicates that an external Last-level cache is present in the system.
This bit is not set for CPUs on TC3 platform despite there is presence of LLC in MCN, so set them.
Change-Id: I5f889e67dce2b1d00e4ee66a8c255cf7911825b0 Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| de8b9ced | 17-Jul-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
feat(tc): enable el1 access to DSU PMU registers
DSU PMU registers are write accessible in EL1 if the ACTLR_EL3[12] bit and the ACTLR_EL2[12] bit are set to 1, and these registers are need to be set
feat(tc): enable el1 access to DSU PMU registers
DSU PMU registers are write accessible in EL1 if the ACTLR_EL3[12] bit and the ACTLR_EL2[12] bit are set to 1, and these registers are need to be set for all cores, so set these bits in platform reset handler.
Change-Id: I1db6915939727f0909c05c8b103e37984aadb443 Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| 3960bcda | 22-Apr-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
style(tc): remove comment for plat_reset_handler
The comment for plat_reset_handler doesn't make sense. It is likely a copy-and-paste error while adding the code, so remove it.
Change-Id: Iab8c8c79
style(tc): remove comment for plat_reset_handler
The comment for plat_reset_handler doesn't make sense. It is likely a copy-and-paste error while adding the code, so remove it.
Change-Id: Iab8c8c799c184fa99966770d47ecb11bbc640515 Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com>
show more ...
|
| c06b555d | 10-Jul-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(tc): add stubs for soc_css_init functions" into integration |
| 0dac0e1f | 10-Jul-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(tc): don't enable TZC on TC3" into integration |
| 3512adc4 | 10-Jul-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(tc): enable MTE2 unconditionally" into integration |
| be8eaa5e | 16-May-2024 |
Tintu Thomas <tintu.thomas@arm.com> |
fix(tc): enable MTE2 unconditionally
Keeping the MTE2 enablement under the SPMD check is breaking for FPGA and CI test, as SPMD is absent in these cases.
Enable MTE2 unconditionally so that all the
fix(tc): enable MTE2 unconditionally
Keeping the MTE2 enablement under the SPMD check is breaking for FPGA and CI test, as SPMD is absent in these cases.
Enable MTE2 unconditionally so that all the supported platforms can use it.
Change-Id: Id86893f0e2767a8686c3dca0ea092907d5c107ba Signed-off-by: Tintu Thomas <tintu.thomas@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| 8ce29a74 | 02-Jul-2024 |
Tintu Thomas <tintu.thomas@arm.com> |
fix(tc): don't enable TZC on TC3
TZC is being replaced by MSF module on TC3. For fixing boot failure on TC3, don't enable TZC module on the TC3 platform.
Change-Id: I4434cb28bf523be8dd882f5f8799223
fix(tc): don't enable TZC on TC3
TZC is being replaced by MSF module on TC3. For fixing boot failure on TC3, don't enable TZC module on the TC3 platform.
Change-Id: I4434cb28bf523be8dd882f5f8799223642822ee2 Signed-off-by: Tintu Thomas <tintu.thomas@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| 3201faf3 | 14-Jun-2024 |
Tamas Ban <tamas.ban@arm.com> |
feat(tc): provide target_locality info of AP FW components
The target_locality attribute is meant to specify that a certain SW component is expected to run and thereby send DPE commands from a given
feat(tc): provide target_locality info of AP FW components
The target_locality attribute is meant to specify that a certain SW component is expected to run and thereby send DPE commands from a given security domain. The DPE service must be capable of determining the locality of a client on his own. RSE determines the client's locality based on the MHU channel used for communication.
If the expected locality (specified by the parent component) is not matching with the determined locality by DPE service then command fails.
The goal is to protect against spoofing when a context_handle is stolen and used by a component that should not have access.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: I96d255de231611cfed10eef4335a47b91c2c94de
show more ...
|
| 4f5beb56 | 14-Jun-2024 |
Tamas Ban <tamas.ban@arm.com> |
refactor(tc): rename DPE header
The new name is more generic. The goal to add here all platform dependent defines / data / config which is DPE related.
Signed-off-by: Tamas Ban <tamas.ban@arm.com>
refactor(tc): rename DPE header
The new name is more generic. The goal to add here all platform dependent defines / data / config which is DPE related.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: I5b521932c45d8a9c43ea2344dde83c210801cfee
show more ...
|
| 22344092 | 03-Jul-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "feat(tc): add uart node in spmc manifest" into integration |
| f5ae5dcd | 10-Jun-2024 |
Jackson Cooper-Driver <jackson.cooper-driver@arm.com> |
fix(tc): add stubs for soc_css_init functions
Add TC specific stubs for both soc_css_init_nic400 and soc_css_init_pcie. We do not require any initialisation of these components for TC platforms.
Ch
fix(tc): add stubs for soc_css_init functions
Add TC specific stubs for both soc_css_init_nic400 and soc_css_init_pcie. We do not require any initialisation of these components for TC platforms.
Change-Id: If0129acd1050a56878cb9c3041a033192c88da57 Signed-off-by: Jackson Cooper-Driver <jackson.cooper-driver@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| 1c4f9b95 | 18-Jun-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "refactor(dice): save parent context handle" into integration |
| 880dcd0d | 23-Apr-2024 |
Davidson K <davidson.kumaresan@arm.com> |
feat(tc): add uart node in spmc manifest
The device memory described in the SP manifest has to be described in the SPMC manifest as well. In this case, OP-TEE includes this UART device in its SP man
feat(tc): add uart node in spmc manifest
The device memory described in the SP manifest has to be described in the SPMC manifest as well. In this case, OP-TEE includes this UART device in its SP manifest. Hence, this commit adds it in the SPMC manifest.
Change-Id: I0f84d7b105c072dd021f0f2d215adf6bcdf5f98f Signed-off-by: Davidson K <davidson.kumaresan@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| b6b44e1f | 18-Jun-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "ip_smmu" into integration
* changes: feat(tc): bind SMMU-600 with the DPU on TC3 FPGA feat(tc): bind SMMU-700 with DPU on TC3 refactor(tc): append binding for SMMU-700 |
| 9be048a9 | 17-Jun-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(tc): add SCP_BL2 to RSE measured boot" into integration |
| 8e0fd0bf | 03-Jun-2024 |
Tamas Ban <tamas.ban@arm.com> |
refactor(dice): save parent context handle
Improve the restart handling of DPE. In the case of a restart scenario where only that core is restarted which executes the DPE client, but the core execut
refactor(dice): save parent context handle
Improve the restart handling of DPE. In the case of a restart scenario where only that core is restarted which executes the DPE client, but the core executes the DPE service remains up and running. In this case, client needs to save a valid context handle to be able to send commands again to the DPE service during the new boot sequence.
BL1 saves a valid parent context handle to SDS before passing the execution to BL2. This handle can be used in case of a restart scenario when AP is restarted but RSE is not. Because in that case RSE does not save an initial context handle to SDS, which meant to be used by AP during the boot process.
By then the very first initial context handle is invalidated because it was already used in the previous boot cycle by BL1.
BL2 does not need to do this, because the cold boot starts with BL1.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: Id14eefd2ec758f89f672af176e4f5386a397fa35
show more ...
|
| 79841546 | 30-Apr-2024 |
Tamas Ban <tamas.ban@arm.com> |
fix(tc): add SCP_BL2 to RSE measured boot
SCP_BL2 is part of CCA's TCB. The SCP_BL1 is loaded by RSE. It has already added to the platform attestation token. SCP_BL2 was missed, so it is fixed now.
fix(tc): add SCP_BL2 to RSE measured boot
SCP_BL2 is part of CCA's TCB. The SCP_BL1 is loaded by RSE. It has already added to the platform attestation token. SCP_BL2 was missed, so it is fixed now.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: Ic87743564136f03a901c90ff1ec614f5965b9a47
show more ...
|