| 553b70c3 | 19-Aug-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "ar/asymmetricSupport" into integration
* changes: feat(tc): enable trbe errata flags for Cortex-A520 and X4 feat(cm): asymmetric feature support for trbe refactor(err
Merge changes from topic "ar/asymmetricSupport" into integration
* changes: feat(tc): enable trbe errata flags for Cortex-A520 and X4 feat(cm): asymmetric feature support for trbe refactor(errata-abi): move EXTRACT_PARTNUM to arch.h feat(cpus): workaround for Cortex-A520(2938996) and Cortex-X4(2726228) feat(tc): make SPE feature asymmetric feat(cm): handle asymmetry for SPE feature feat(cm): support for asymmetric feature among cores feat(cpufeat): add new feature state for asymmetric features
show more ...
|
| 74dc801d | 12-Aug-2024 |
Manish Pandey <manish.pandey2@arm.com> |
feat(tc): enable trbe errata flags for Cortex-A520 and X4
Enable following erratas as per the TARGET_PLATFORM of TC - ERRATA_A520_2938996 - ERRATA_X4_2726228
Signed-off-by: Manish Pandey <manish.
feat(tc): enable trbe errata flags for Cortex-A520 and X4
Enable following erratas as per the TARGET_PLATFORM of TC - ERRATA_A520_2938996 - ERRATA_X4_2726228
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: Ia552473740c34867dd9fd619faf378adcb784821
show more ...
|
| 7754b770 | 18-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
feat(tc): make SPE feature asymmetric
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: Ibf0fecb2a97cb0f3508e01e0907e61e3c437ac00 |
| 2d4f264b | 17-Aug-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "romlib-fixes" into integration
* changes: fix(romlib): wrap indirectly included functions fix(arm): remove duplicate jumptable entry |
| 9b1f2c79 | 16-Aug-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(rdv3): remove NEED_* from RD-V3 makefile" into integration |
| 26f2f24c | 14-Aug-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "cot-dt2c" into integration
* changes: feat(arm): update documentation for cot-dt2c feat(arm): remove the bl2 static c file feat(arm): generate tbbr c file CoT dt2c
Merge changes from topic "cot-dt2c" into integration
* changes: feat(arm): update documentation for cot-dt2c feat(arm): remove the bl2 static c file feat(arm): generate tbbr c file CoT dt2c feat(arm): makefile invoke CoT dt2c feat(auth): standalone CoT dt2c tool refactor(auth): separate bl1 and bl2 CoT refactor(st): align the NV counter naming refactor(fvp): align the NV counter naming
show more ...
|
| 97a689bb | 13-Aug-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "feat(spm): change UART0-1 to NS device region" into integration |
| 04d02a9c | 13-Jun-2024 |
Xialin Liu <Xialin.Liu@ARM.com> |
refactor(fvp): align the NV counter naming
Align the naming of nv_counter to nv_ctr in the DTBs so that they match with the static C files. Update the binding documentation accordingly. This renamin
refactor(fvp): align the NV counter naming
Align the naming of nv_counter to nv_ctr in the DTBs so that they match with the static C files. Update the binding documentation accordingly. This renaming is beneficial for the upcoming conversion tool that will convert CoT DT files to C files.
Change-Id: If65d51ad9fc6445b1ae9937f1691becf8742cf01 Signed-off-by: Xialin Liu <Xialin.Liu@ARM.com>
show more ...
|
| a3eef39f | 02-Aug-2024 |
Jaylyn Ren <Jaylyn.Ren2@arm.com> |
fix(rdv3): remove NEED_* from RD-V3 makefile
As the NEED_* are internal flags used in the build system and are not meant to be used by platforms, remove them from the RD-V3 makefile.
Signed-off-by:
fix(rdv3): remove NEED_* from RD-V3 makefile
As the NEED_* are internal flags used in the build system and are not meant to be used by platforms, remove them from the RD-V3 makefile.
Signed-off-by: Jaylyn Ren <Jaylyn.Ren2@arm.com> Change-Id: If7144b9d72c16e8025f929f2546abd96194615ce
show more ...
|
| 18faaa24 | 05-Aug-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "us_pmu" into integration
* changes: fix(tc): correct CPU PMU binding feat(tc): add device tree binding for SPE feat(tc): add PPI partitions in DT binding feat(tc):
Merge changes from topic "us_pmu" into integration
* changes: fix(tc): correct CPU PMU binding feat(tc): add device tree binding for SPE feat(tc): add PPI partitions in DT binding feat(tc): change GIC DT property 'interrupt-cells' to 4 feat(tc): add NI-Tower PMU node for TC3 feat(tc): setup ni-tower non-secure access for TC3
show more ...
|
| 89c58a50 | 02-Feb-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
feat(tc): setup ni-tower non-secure access for TC3
NI-Tower's component's registers are need to be accessed from kernel NI-PMU driver so enable NS access to it.
Change-Id: I83a8b3a1d2778baf767ff932
feat(tc): setup ni-tower non-secure access for TC3
NI-Tower's component's registers are need to be accessed from kernel NI-PMU driver so enable NS access to it.
Change-Id: I83a8b3a1d2778baf767ff93263e246d127ef8114 Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| bbca58ff | 05-Aug-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "corstone1000-bugfixes" into integration
* changes: fix(corstone1000): update memory layout comments fix(corstone1000): clean cache and disable interrupt before system r
Merge changes from topic "corstone1000-bugfixes" into integration
* changes: fix(corstone1000): update memory layout comments fix(corstone1000): clean cache and disable interrupt before system reset fix(corstone1000): remove unused NS_SHARED_RAM region fix(corstone1000): pass spsr value explicitly
show more ...
|
| d7417adc | 05-Jul-2024 |
Bence Balogh <bence.balogh@arm.com> |
fix(corstone1000): update memory layout comments
The SRAM (CVM) memory layout was outdated in the platform_defs.h of the Corstone-1000 platform. Updated it to list every bootloaders and to be aligne
fix(corstone1000): update memory layout comments
The SRAM (CVM) memory layout was outdated in the platform_defs.h of the Corstone-1000 platform. Updated it to list every bootloaders and to be aligned with the implementation. Also added the starting (base) addresses of each partition.
Change-Id: Ie8e8416ee2650ff25a8d4c61d8d9af789bc639c1 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
show more ...
|
| 335c4f8b | 15-May-2024 |
Emekcan Aras <Emekcan.Aras@arm.com> |
fix(corstone1000): clean cache and disable interrupt before system reset
Corstone1000 does not properly clean the cache and disable gic interrupts before the reset. This causes a race condition espe
fix(corstone1000): clean cache and disable interrupt before system reset
Corstone1000 does not properly clean the cache and disable gic interrupts before the reset. This causes a race condition especially in FVP after reset. This adds proper sequence before resetting the platform.
Change-Id: I22791eec2ec0ca61d201d8a745972a351248aa3d Signed-off-by: Emekcan Aras <Emekcan.Aras@arm.com>
show more ...
|
| 83c11c0b | 25-Apr-2024 |
Emekcan Aras <Emekcan.Aras@arm.com> |
fix(corstone1000): remove unused NS_SHARED_RAM region
After enabling additional features in Trusted Services, the size of BL32 image (OP-TEE + Trusted Services SPs) is larger now. To create more spa
fix(corstone1000): remove unused NS_SHARED_RAM region
After enabling additional features in Trusted Services, the size of BL32 image (OP-TEE + Trusted Services SPs) is larger now. To create more space in secure RAM for BL32 image, this patch removes NS_SHARED_RAM region which is not currently used by corstone1000 platform.
Change-Id: I1e9468fd2dcb66b4d21fce245097ba51331ec54d Signed-off-by: Emekcan Aras <Emekcan.Aras@arm.com>
show more ...
|
| 32690bac | 21-Feb-2024 |
Emekcan Aras <Emekcan.Aras@arm.com> |
fix(corstone1000): pass spsr value explicitly
Passes spsr value for BL33 (U-Boot) explicitly between different boot stages. This information is needed in order to boot properly.
Change-Id: I06b5b75
fix(corstone1000): pass spsr value explicitly
Passes spsr value for BL33 (U-Boot) explicitly between different boot stages. This information is needed in order to boot properly.
Change-Id: I06b5b750f963f8609e00ff6bf2838bac0f8b7b28 Signed-off-by: Emekcan Aras <Emekcan.Aras@arm.com>
show more ...
|
| 180a3a9e | 30-Jul-2024 |
Jimmy Brisson <jimmy.brisson@arm.com> |
fix(arm): remove duplicate jumptable entry
Change-Id: I4cc4ef493318372ec0d0531ca3e98196e7065ab9 Signed-off-by: Jimmy Brisson <jimmy.brisson@arm.com> |
| 1a0ebff7 | 02-May-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(arm): add fw handoff support for RESET_TO_BL31
Change-Id: I78f3c5606f0221bb5fc613a973a7d3fe187db35b Signed-off-by: Harrison Mutai <harrison.mutai@arm.com> |
| 4bcf5b84 | 29-Jul-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "jc/refact_el1_ctx" into integration
* changes: refactor(cm): convert el1-ctx assembly offset entries to c structure feat(cm): add explicit context entries for ERRATA_SP
Merge changes from topic "jc/refact_el1_ctx" into integration
* changes: refactor(cm): convert el1-ctx assembly offset entries to c structure feat(cm): add explicit context entries for ERRATA_SPECULATIVE_AT
show more ...
|
| aca05c59 | 29-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(fvp): add secure uart interrupt in device region" into integration |
| 5477fb37 | 29-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(fvp): add flash areas for secure partition" into integration |
| 9fb76763 | 16-May-2024 |
levi.yun <yeoreum.yun@arm.com> |
feat(fvp): add flash areas for secure partition
To support UEFI secure variable service, StandaloneMm which runs in BL32 should know flash areas. Add flash memory areas and system register region so
feat(fvp): add flash areas for secure partition
To support UEFI secure variable service, StandaloneMm which runs in BL32 should know flash areas. Add flash memory areas and system register region so that StandaloneMm access to flash storages.
Change-Id: I803bda9664a17a0b978ebff90974eaf5442a91cd Signed-off-by: levi.yun <yeoreum.yun@arm.com>
show more ...
|
| fc3a01aa | 24-Jul-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
fix(fvp): add secure uart interrupt in device region
OP-TEE enables the use case of a secure interrupt triggered by the UART driver. This interrupt is routed by FFA_INTERRUPT interface to OP-TEE. De
fix(fvp): add secure uart interrupt in device region
OP-TEE enables the use case of a secure interrupt triggered by the UART driver. This interrupt is routed by FFA_INTERRUPT interface to OP-TEE. Define the UART interrupt in the FF-A device region node. Without this change, OPTEE panics at the boot with the following:
| I/TC: No non-secure external DT | I/TC: manifest DT found | I/TC: OP-TEE version: 4.3.0-23-gfcd8750677db | I/TC: WARNING: This OP-TEE configuration might be insecure! | I/TC: WARNING: Please check https://optee.readthedocs.io/en/latest/architecture/porting_guidelines.html | I/TC: Primary CPU initializing | E/TC:0 0 assertion '!res' failed at core/drivers/hfic.c:56 <hfic_op_enable> | E/TC:0 0 Panic at core/kernel/assert.c:28 <_assert_break> | E/TC:0 0 TEE load address @ 0x6284000
Change-Id: Icddcdfd032315aeee65ba3100f3a6b470a74435d Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
show more ...
|
| 42e35d2f | 11-Apr-2024 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
refactor(cm): convert el1-ctx assembly offset entries to c structure
Currently the EL1 part of the context structure (el1_sysregs_t), is coupled with feature flags reducing the context memory alloca
refactor(cm): convert el1-ctx assembly offset entries to c structure
Currently the EL1 part of the context structure (el1_sysregs_t), is coupled with feature flags reducing the context memory allocation for platforms, that don't enable/support all the architectural features at once.
Similar to the el2 context optimization commit-"d6af234" this patch further improves this section by converting the assembly context-offset entries into a c structure. It relies on garbage collection of the linker removing unreferenced structures from memory, as well as aiding in readability and future maintenance. Additionally, it eliminates the #ifs usage in 'context_mgmt.c' source file.
Change-Id: If6075931cec994bc89231241337eccc7042c5ede Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| 59b7c0a0 | 05-Jun-2024 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
feat(cm): add explicit context entries for ERRATA_SPECULATIVE_AT
* Currently, "ERRATA_SPECUALTIVE_AT" errata is enabled by default for few cores and they need context entries for saving and rest
feat(cm): add explicit context entries for ERRATA_SPECULATIVE_AT
* Currently, "ERRATA_SPECUALTIVE_AT" errata is enabled by default for few cores and they need context entries for saving and restoring EL1 regs "SCTLR_EL1 and TCR_EL1" registers at all times.
* This prevents the mechanism of decoupling EL1 and EL2 registers, as EL3 firmware shouldn't be handling both simultaneously.
* Depending on the build configuration either EL1 or EL2 context structures need to included, which would result in saving a good amount of context memory.
* In order to achieve this it's essential to have explicit context entries for registers supporting "ERRATA_SPECULATIVE_AT".
* This patch adds two context entries under "errata_speculative_at" structure to assist this errata and thereby allows decoupling EL1 and EL2 context structures.
Change-Id: Ia50626eea8fb64899a2e2d81622adbe07fe77d65 Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|