| 6b8df7b9 | 09-Jan-2025 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
feat(mops): enable FEAT_MOPS in EL3 when INIT_UNUSED_NS_EL2=1
FEAT_MOPS, mandatory from Arm v8.8, is typically managed in EL2. However, in configurations where NS_EL2 is not enabled, EL3 must set th
feat(mops): enable FEAT_MOPS in EL3 when INIT_UNUSED_NS_EL2=1
FEAT_MOPS, mandatory from Arm v8.8, is typically managed in EL2. However, in configurations where NS_EL2 is not enabled, EL3 must set the HCRX_EL2.MSCEn bit to 1 to enable the feature.
This patch ensures FEAT_MOPS is enabled by setting HCRX_EL2.MSCEn to 1.
Change-Id: Ic4960e0cc14a44279156b79ded50de475b3b21c5 Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com>
show more ...
|
| c3273703 | 13-Jan-2025 |
Chris Kay <chris.kay@arm.com> |
build: remove Windows compatibility layer
For a couple of releases now we have officially withdrawn support for building TF-A on Windows using the native environment, relying instead on POSIX emulat
build: remove Windows compatibility layer
For a couple of releases now we have officially withdrawn support for building TF-A on Windows using the native environment, relying instead on POSIX emulation layers like MSYS2, Mingw64, Cygwin or WSL.
This change removes the remainder of the OS compatibility layer entirely, and migrates the build system over to explicitly relying on a POSIX environment.
Change-Id: I8fb60d998162422e958009afd17eab826e3bc39b Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| ee990d52 | 13-Jan-2025 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "hob_creation_in_tf_a" into integration
* changes: feat(el3_spmc): ffa error handling in direct msg feat(ff-a): support FFA_MSG_SEND_DIRECT_REQ2/RESP2 feat(ff-a): add
Merge changes from topic "hob_creation_in_tf_a" into integration
* changes: feat(el3_spmc): ffa error handling in direct msg feat(ff-a): support FFA_MSG_SEND_DIRECT_REQ2/RESP2 feat(ff-a): add FFA_MEM_PERM_GET/SET_SMC64 feat(el3-spmc): support Hob list to boot S-EL0 SP feat(synquacer): add support Hob creation fix(fvp): exclude extend memory map TZC regions feat(fvp): add StandaloneMm manifest in fvp feat(spm): use xfer list with Hob list in SPM_MM
show more ...
|
| bea55e3c | 15-Aug-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
refactor(tc): rename TC_FPGA_ANDROID_IMG_IN_RAM
Rename TC_FPGA_ANDROID_IMG_IN_RAM to TC_FPGA_FS_IMG_IN_RAM to use it for debian loading to ram as well.
Change-Id: I70b68b06501d17dcebbe78bee8fec0a70
refactor(tc): rename TC_FPGA_ANDROID_IMG_IN_RAM
Rename TC_FPGA_ANDROID_IMG_IN_RAM to TC_FPGA_FS_IMG_IN_RAM to use it for debian loading to ram as well.
Change-Id: I70b68b06501d17dcebbe78bee8fec0a701106c92 Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com> Signed-off-by: Icen.Zeyada <Icen.Zeyada2@arm.com>
show more ...
|
| 84ca47a8 | 28-Jun-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
feat(tc): configure UART for TC4 FPGA
TC4 FPGA have a UART clock of 4000000 so modify the value of TC_UARTCLK for TC4.
Change-Id: I8de84d58bce8b7277bf356136a5185c008ab4c28 Signed-off-by: Jagdish Ge
feat(tc): configure UART for TC4 FPGA
TC4 FPGA have a UART clock of 4000000 so modify the value of TC_UARTCLK for TC4.
Change-Id: I8de84d58bce8b7277bf356136a5185c008ab4c28 Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com> Signed-off-by: Icen.Zeyada <Icen.Zeyada2@arm.com>
show more ...
|
| 54289385 | 13-Aug-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
fix(tc): set console baurate to 38400 for fvp as well
Set console baurate to 38400 for fvp as well for code simplicity.
Change-Id: I58ba6b7043541f6eb67e32257307da4eba0bb28a Signed-off-by: Jagdish G
fix(tc): set console baurate to 38400 for fvp as well
Set console baurate to 38400 for fvp as well for code simplicity.
Change-Id: I58ba6b7043541f6eb67e32257307da4eba0bb28a Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com> Signed-off-by: Icen.Zeyada <Icen.Zeyada2@arm.com>
show more ...
|
| 25264e29 | 28-Jun-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
refactor(tc): remove redundant macro UARTCLK_FREQ
remove redundant macro UARTCLK_FREQ and replace it with TC_UARTCLK in dts.
Change-Id: Id463a9ddc1588278e552ffca3dfb738676229ce7 Signed-off-by: Jagd
refactor(tc): remove redundant macro UARTCLK_FREQ
remove redundant macro UARTCLK_FREQ and replace it with TC_UARTCLK in dts.
Change-Id: Id463a9ddc1588278e552ffca3dfb738676229ce7 Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com> Signed-off-by: Icen.Zeyada <Icen.Zeyada2@arm.com>
show more ...
|
| 06cec933 | 08-Aug-2024 |
Levi Yun <yeoreum.yun@arm.com> |
fix(fvp): exclude extend memory map TZC regions
The commit 192287523350 ("fix(spm-mm): carve out NS buffer TZC400 region") removes overlaps of ns shared buffer in secure memory region. Unfortunate
fix(fvp): exclude extend memory map TZC regions
The commit 192287523350 ("fix(spm-mm): carve out NS buffer TZC400 region") removes overlaps of ns shared buffer in secure memory region. Unfortunately, this separation increases 1 region and over maximum number of TZC programmable regions when they include extended memory map regions (DRAM3 to DRAM6).
This causes boot failure of StandaloneMm with spmc_el3 && sp_el0 with
ASSERT: drivers/arm/tzc/tzc400.c:256.
To fix this, like SPM_MM, exclude setting extended memory map regions when it uses SPMC_AT_EL3 && SPC_AT_EL3_SEL0_SP.
Signed-off-by: Levi Yun <yeoreum.yun@arm.com> Change-Id: I2d40bea066ca030050dfe951218cd17171010676
show more ...
|
| 8416e791 | 24-Jul-2024 |
Levi Yun <yeoreum.yun@arm.com> |
feat(fvp): add StandaloneMm manifest in fvp
Support StandaloneMm running with FF-A as S-EL0 SP when TF-A is built with EL3 SPMC partition manager.
For this 1. add manifest file describing Stand
feat(fvp): add StandaloneMm manifest in fvp
Support StandaloneMm running with FF-A as S-EL0 SP when TF-A is built with EL3 SPMC partition manager.
For this 1. add manifest file describing StandaloneMm partition. 2. add number of page mapping area. 3. StandaloneMm should use SRAM with 512K.
while enabling, StandaloneMm, BL1 image requires more size: aarch64-none-elf/bin/ld: BL31 image has exceeded its limit. aarch64-none-elf/bin/ld: region `RAM' overflowed by 16384 bytes
So, when using SRAM size with 512K configuration, increase size limit of BL1 binary.
Signed-off-by: Levi Yun <yeoreum.yun@arm.com> Change-Id: Idaa1db510340ebb812cfd13588610b2eea941918
show more ...
|
| 05533d99 | 08-Dec-2024 |
Bhupesh Sharma <Bhupesh.Sharma@arm.com> |
fix(morello): remove stray white-space in 'morello/platform.mk'
Stray white-space in 'morello/platform.mk' to fix the following compilation error:
$ make PLAT=morello TARGET_PLATFORM=2 all plat/a
fix(morello): remove stray white-space in 'morello/platform.mk'
Stray white-space in 'morello/platform.mk' to fix the following compilation error:
$ make PLAT=morello TARGET_PLATFORM=2 all plat/arm/board/morello/platform.mk:9: *** recipe commences before first target. Stop.
Fix the same.
While at it also update the year range in the 'Copyright' field.
Change-Id: Id05e4968952049df5ffbe0d25dd17f3aa3a035f7 Signed-off-by: Bhupesh Sharma <Bhupesh.Sharma@arm.com>
show more ...
|
| bd9b01c6 | 13-Nov-2024 |
Ryan Everett <ryan.everett@arm.com> |
refactor(arm): rename ARM_ROTPK_HEADER_LEN
This variable had a misleading name, as it is the length of the header only when the ROTPK is a hash. Also rename arm_rotpk_header to match the new pattern
refactor(arm): rename ARM_ROTPK_HEADER_LEN
This variable had a misleading name, as it is the length of the header only when the ROTPK is a hash. Also rename arm_rotpk_header to match the new pattern.
Change-Id: I36c29998eebf50c356a6ca959ec9223c8837b540 Signed-off-by: Ryan Everett <ryan.everett@arm.com>
show more ...
|
| da57b6e3 | 11-Nov-2024 |
Ryan Everett <ryan.everett@arm.com> |
feat(arm): use provided algs for (swd/p)rotpk
No longer hard code SHA-256 hashed rsa dev keys, now the keys can use pair of key alg: rsa, p256, p384 and hash alg: sha256, sha384, sha512.
All publi
feat(arm): use provided algs for (swd/p)rotpk
No longer hard code SHA-256 hashed rsa dev keys, now the keys can use pair of key alg: rsa, p256, p384 and hash alg: sha256, sha384, sha512.
All public keys are now generated at build-time from the dev keys.
Change-Id: I669438b7d1cd319962c4a135bb0e204e44d7447e Signed-off-by: Ryan Everett <ryan.everett@arm.com>
show more ...
|
| d51981e1 | 11-Nov-2024 |
Ryan Everett <ryan.everett@arm.com> |
feat(arm): use the provided hash alg to hash rotpk
No longer hard code SHA-256 hashed dev rotpks, instead use the algorithm given by HASH_ALG. This means that we no longer need the plat_arm_configs
feat(arm): use the provided hash alg to hash rotpk
No longer hard code SHA-256 hashed dev rotpks, instead use the algorithm given by HASH_ALG. This means that we no longer need the plat_arm_configs (once the protpk and swd_rotpk are also updated to use HASH_ALG).
The rot public key is now generated at build time, as is the header for the key.
Also support some default 3k and 4k RSA keys.
Change-Id: I33538124aeb4fa7d67918d878d17f2a84d3a6756 Signed-off-by: Ryan Everett <ryan.everett@arm.com>
show more ...
|
| 64ff172a | 26-Nov-2024 |
Sammit Joshi <sammit.joshi@arm.com> |
fix(neoverse-rd): initialize timer before use in smmuv3_poll
Commit a6485b2 ("refactor(delay-timer): add timer callback functions") introduced a requirement for timer-related APIs to have a timer ob
fix(neoverse-rd): initialize timer before use in smmuv3_poll
Commit a6485b2 ("refactor(delay-timer): add timer callback functions") introduced a requirement for timer-related APIs to have a timer object initialized before use. This caused assertion failures in SMMU routines on Neoverse platforms, as they relied on timer APIs.
Resolve this issue by initializing the timer early during platform boot to set up the timer_ops object properly.
Change-Id: I3d9ababdb7897185f23e9ccf982b9aab6c666b8c Signed-off-by: Sammit Joshi <sammit.joshi@arm.com>
show more ...
|
| 222c87e7 | 16-Dec-2024 |
Jerry Wang <Jerry.Wang4@arm.com> |
fix(rdv3): add console name to checksum calculation on RD-V3
The name field of console_info structure was missed in checksum calculation. This is corrected by adding a new helper checksum_calc() whi
fix(rdv3): add console name to checksum calculation on RD-V3
The name field of console_info structure was missed in checksum calculation. This is corrected by adding a new helper checksum_calc() which computes the checksum in a field agnostic manner.
Change-Id: I98d35d53e1faccf1221e8eddb122558ae359a2d5 Signed-off-by: Jerry Wang <Jerry.Wang4@arm.com>
show more ...
|
| d1062c47 | 19-Jun-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
feat(tc): enable MCN non-secure access to pmu counters on TC4
MCN PMU counters are by default non-accesible from non-secure world, so enable the non-secure access to those PMU counters so that linux
feat(tc): enable MCN non-secure access to pmu counters on TC4
MCN PMU counters are by default non-accesible from non-secure world, so enable the non-secure access to those PMU counters so that linux perf driver can read them.
Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com> Signed-off-by: Icen Zeyada <Icen.Zeyada2@arm.com> Change-Id: I1cf1f88f97e9062592fd5603a78fd36f15a15f89
show more ...
|
| 8f61c204 | 19-Jun-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
feat(tc): define MCN related macros for TC4
Define MCN related macros for TC4 to add TC4 specific MCN PMU nodes in dts and to enable MCN PMU NS access in further commits.
Signed-off-by: Jagdish Ged
feat(tc): define MCN related macros for TC4
Define MCN related macros for TC4 to add TC4 specific MCN PMU nodes in dts and to enable MCN PMU NS access in further commits.
Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com> Signed-off-by: Icen Zeyada <Icen.Zeyada2@arm.com> Change-Id: Ifc02fcd833888a9953fac404585468316aa0168c
show more ...
|
| fded3a48 | 18-Dec-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "hm/heap-info" into integration
* changes: fix(handoff): remove XFERLIST_TB_FW_CONFIG feat(arm): migrate heap info to fw handoff feat(mbedtls): introduce crypto lib he
Merge changes from topic "hm/heap-info" into integration
* changes: fix(handoff): remove XFERLIST_TB_FW_CONFIG feat(arm): migrate heap info to fw handoff feat(mbedtls): introduce crypto lib heap info struct feat(handoff): add Mbed-TLS heap info entry tag refactor(arm): refactor secure TL initialization fix(handoff): fix message formatting of hex values feat(handoff): add func to check and init a tl fix(arm): resolve dangling comments around macros
show more ...
|
| ada4e59d | 28-May-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(arm): migrate heap info to fw handoff
Mbed-TLS requires platforms to allocate it a heap for it's own internal usage. This heap is typically between shared by BL1 and BL2 to conserve memory.The
feat(arm): migrate heap info to fw handoff
Mbed-TLS requires platforms to allocate it a heap for it's own internal usage. This heap is typically between shared by BL1 and BL2 to conserve memory.The base address and size of the heap are conveyed from BL1 to BL2 through the config TB_FW_CONFIG.
This slightly awkward approach necessitates declaring a placeholder node in the DTS. At runtime, this node is populated with the actual values of the heap information. Instead, since this is dynamic information, and simple to represent through C structures, transmit it to later stages using the firmware handoff framework.
With this migration, remove references to TB_FW_CONFIG when firmware handoff is enabled, as it is no longer needed. The setup code now relies solely on TL structures to configure the TB firmware
Change-Id: Iff00dc742924a055b8bd304f15eec03ce3c6d1ef Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| d5705719 | 23-Sep-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
refactor(arm): refactor secure TL initialization
The initialization logic for the secure transfer list is currently scattered and duplicated across platform setup code. This not only leads to ineffi
refactor(arm): refactor secure TL initialization
The initialization logic for the secure transfer list is currently scattered and duplicated across platform setup code. This not only leads to inefficiency but also complicates access to transfer lists from other parts of the code without invoking setup functions. For instance, arm_bl2_setup_next_ep_info acts as a thin wrapper in arm_bl2_setup.c to provide access to the secure transfer list.
To streamline the interface, all setup code has been consolidated into a central location.
Change-Id: I99d2a567ff39df88baa57e7e08607fccb8af189c Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 8d4d1909 | 17-Dec-2024 |
Icen.Zeyada <Icen.Zeyada2@arm.com> |
fix(tc): define status to fix SPM tests
The failure was caused by missing a variable definition, `status` in the RSE initialisation patch.
Change-Id: I937a39e20fae39f3a6d14fe66af578c166545301 Signe
fix(tc): define status to fix SPM tests
The failure was caused by missing a variable definition, `status` in the RSE initialisation patch.
Change-Id: I937a39e20fae39f3a6d14fe66af578c166545301 Signed-off-by: Icen.Zeyada <Icen.Zeyada2@arm.com>
show more ...
|
| 22220e69 | 15-Dec-2024 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
fix(tc): eliminate unneeded MbedTLS dependency
The rse_platform_api.h file includes certain MbedTLS headers, introducing an unnecessary dependency when building the TC platform with RSE support unco
fix(tc): eliminate unneeded MbedTLS dependency
The rse_platform_api.h file includes certain MbedTLS headers, introducing an unnecessary dependency when building the TC platform with RSE support unconditionally. However, these headers are not required, as the BL31 implementation only initializes RSE communication, which does not rely on MbedTLS.
Change-Id: If45122aaf158be128f8978422fd870dbb0a0d090 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 62ed5aa0 | 13-Dec-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(romlib): romlib build without MbedTLS" into integration |
| 4817b85d | 13-Dec-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "feat(tc): initialize MHU channels with RSE" into integration |
| 1b2e12cc | 13-Dec-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(tc): map mem_protect flash region" into integration |