| 89d85778 | 10-Feb-2024 |
Rohit Mathew <Rohit.Mathew@arm.com> |
fix(board): update spi_id max for sgi multichip platforms
According to GIC-600 TRM, 960 SPIs could be supported on a platform. However, with the current configuration, platforms such as RD-V1-MC and
fix(board): update spi_id max for sgi multichip platforms
According to GIC-600 TRM, 960 SPIs could be supported on a platform. However, with the current configuration, platforms such as RD-V1-MC and RD-N1-Edge Dual-Chip utilize a much smaller range. With commit 'a02a45dfe' gic600 driver is updated to get the max SPI id from the GIC-600 and probe for the corresponding GIC instance for each SPI id. Since RD-V1-MC and RD-N1-Edge Dual-Chip supports wider range, increase SPI range for the chip 0 to max SPI range supported.
Signed-off-by: Rohit Mathew <Rohit.Mathew@arm.com> Change-Id: Ia8c02c6d999033af33d8e7a0bedc7b73c6552ab4
show more ...
|
| 87799772 | 14-Feb-2024 |
Harsimran Singh Tungal <harsimransingh.tungal@arm.com> |
build(corstone1000): add CORSTONE1000_WITH_BL32 preprocessor flag
This change includes adding new CORSTONE1000_WITH_BL32 preprocessor flag on the basis of NEED_BL32 flag. This flag allows us to run
build(corstone1000): add CORSTONE1000_WITH_BL32 preprocessor flag
This change includes adding new CORSTONE1000_WITH_BL32 preprocessor flag on the basis of NEED_BL32 flag. This flag allows us to run the TF-A with or without loading BL32 image. This feature is required to add the support of Corstone-1000 FVP in TF-A open CI. After this, we can run the TF-A tftf tests with or without executing BL32 image, which is optee in case of Corstone-1000.
Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com> Change-Id: Idacbd3883473473841481a2032314db8c9715b1f
show more ...
|
| 60dd8069 | 20-Feb-2024 |
Mark Dykes <mark.dykes@arm.com> |
Merge "build: use new toolchain variables for tools" into integration |
| a23710b4 | 21-Dec-2023 |
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> |
feat(smmu): separate out smmuv3_security_init from smmuv3_init
Split the smmuv3_init() to separate smmuv3_security_init() from it in order to allow skipping the default deny policy on reset for cert
feat(smmu): separate out smmuv3_security_init from smmuv3_init
Split the smmuv3_init() to separate smmuv3_security_init() from it in order to allow skipping the default deny policy on reset for certain SMMUv3 implementations. Additionally, fix a couple of MISRA warnings.
Signed-off-by: Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Signed-off-by: Vivek Gautam <vivek.gautam@arm.com> Change-Id: I2127943e709dd1ded34145bd022c930e351bbb4a
show more ...
|
| 50cd7484 | 19-Feb-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(bl2): make BL2 SRAM footprint flexible" into integration |
| 02088b64 | 15-Feb-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "mb/tc-model-update" into integration
* changes: docs: update FVP TC2 model version and build (11.23/17) fix(tc): increase BL2 maximum size limit refactor(tc): update
Merge changes from topic "mb/tc-model-update" into integration
* changes: docs: update FVP TC2 model version and build (11.23/17) fix(tc): increase BL2 maximum size limit refactor(tc): update platform tests feat(rss): add defines for 'type' range and use them in psa_call() feat(rss): adjust parameter packing to match TF-M changes refactor(tc): remap console logs
show more ...
|
| e0e03a8d | 06-Feb-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
fix(bl2): make BL2 SRAM footprint flexible
On FVP's the default SRAM size is severly restrictive. However, more recent models support larger SRAM configurations (> 256 Kb). We introduced the flag FV
fix(bl2): make BL2 SRAM footprint flexible
On FVP's the default SRAM size is severly restrictive. However, more recent models support larger SRAM configurations (> 256 Kb). We introduced the flag FVP_TRUSTED_SRAM_SIZE to allow for TF to handle different configurations.
BL31 automatically benefits from this optimisation since it starts from the bottom of shared memory, and runs up to the end of SRAM. Increase the size of all BL2 builds in proportion to FVP_TRUSTED_SRAM_SIZE so that BL2 covers around a third of SRAM.
Change-Id: Idf37e8cb86507ea44b97ac8b3b90fffefe13f57a Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 19258a58 | 21-Dec-2023 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
fix(tc): increase BL2 maximum size limit
Increase the size of BL2 to build TC2 with GPT support enabled and a config modification of mbedTLS.
Change-Id: I6d2f466144f2bbffd3387bc40bc86ab733febce1 Si
fix(tc): increase BL2 maximum size limit
Increase the size of BL2 to build TC2 with GPT support enabled and a config modification of mbedTLS.
Change-Id: I6d2f466144f2bbffd3387bc40bc86ab733febce1 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| a93bf0aa | 22-Dec-2023 |
David Vincze <david.vincze@arm.com> |
refactor(tc): update platform tests
Update the TC's platform test Makefile and related common definitions to correspond to newer TF-M code (commit hash: 4ab7a20).
Change-Id: I6ef3effe194a780a0533f9
refactor(tc): update platform tests
Update the TC's platform test Makefile and related common definitions to correspond to newer TF-M code (commit hash: 4ab7a20).
Change-Id: I6ef3effe194a780a0533f9c0c2eab9d0f4efc1fc Signed-off-by: David Vincze <david.vincze@arm.com>
show more ...
|
| 77241043 | 20-Feb-2023 |
annsai01 <annam.saimanisha@arm.com> |
refactor(tc): remap console logs
Remap TF-A console logs from SoC UART2 (S1 terminal) to CSS secure (UART1_AP terminal) and Linux logs from SoC UART2 (S1 terminal) to CSS non-secure (UART_AP termina
refactor(tc): remap console logs
Remap TF-A console logs from SoC UART2 (S1 terminal) to CSS secure (UART1_AP terminal) and Linux logs from SoC UART2 (S1 terminal) to CSS non-secure (UART_AP terminal) to align with the latest FVP TC2 model (version 11.23/17).
Change-Id: I7206e64b65346bfdcc48d6acd3792b436041e45f Signed-off-by: Annam Sai Manisha <annam.saimanisha@arm.com>
show more ...
|
| 6f503e0e | 08-May-2023 |
Tamas Ban <tamas.ban@arm.com> |
feat(tc): add RSS SDS region right after SCMI payload
Add a second SDS region on the TC platform for communication with RSS. RSS needs to share data with AP during early boot over shared memory to s
feat(tc): add RSS SDS region right after SCMI payload
Add a second SDS region on the TC platform for communication with RSS. RSS needs to share data with AP during early boot over shared memory to support DPE. Reserve a memory region right after the SCMI secure payload areas from unused memory.
Change-Id: I3a3a6ea5ce76531595c88754418602133a283c42 Signed-off-by: David Vincze <david.vincze@arm.com>
show more ...
|
| 0f37ae13 | 08-May-2023 |
Tamas Ban <tamas.ban@arm.com> |
refactor(n1sdp): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on. -
refactor(n1sdp): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on. - Implement plat_sds_get_regions() platform function which is used by the driver to get SDS region information per platform.
[1]: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/24609/
Change-Id: I3447855fbe7427376d5f7aa0ba7356fe2f14d567 Signed-off-by: Tamas Ban <tamas.ban@arm.com> Signed-off-by: David Vincze <david.vincze@arm.com>
show more ...
|
| 48d42ed5 | 08-May-2023 |
Tamas Ban <tamas.ban@arm.com> |
refactor(morello): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on.
refactor(morello): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on. - Implement plat_sds_get_regions() platform function which is used by the driver to get SDS region information per platform.
[1]: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/24609/
Change-Id: I942599edb4d9734c0455f67c6b5673aace62e444 Signed-off-by: Tamas Ban <tamas.ban@arm.com> Signed-off-by: David Vincze <david.vincze@arm.com>
show more ...
|
| fdcd5413 | 08-May-2023 |
Tamas Ban <tamas.ban@arm.com> |
refactor(juno): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on. -
refactor(juno): update SDS driver calls
Update SDS driver calls to align with recent changes [1] of the SDS driver.
- The driver now requires us to explicitly pass the SDS region id to act on. - Implement plat_sds_get_regions() platform function which is used by the driver to get SDS region information per platform.
[1]: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/24609/
Change-Id: I67aebfe0e2a82d1f5fc2d26653698a552350b387 Signed-off-by: Tamas Ban <tamas.ban@arm.com> Signed-off-by: David Vincze <david.vincze@arm.com>
show more ...
|
| a1726fa7 | 07-Feb-2024 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(fvp): remove left-over RSS usage
Remove any residual RSS usage in the FVP platform, complementing the changes made in commit dea307fd6cca2dad56867e757804224a8654bc38.
Signed-off-by: Manish V B
feat(fvp): remove left-over RSS usage
Remove any residual RSS usage in the FVP platform, complementing the changes made in commit dea307fd6cca2dad56867e757804224a8654bc38.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: I9ced272503456361610ec0c7783d270349233926
show more ...
|
| 4da4a1a6 | 07-Feb-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "od/sme" into integration
* changes: fix(fvp): permit enabling SME for SPD=spmd feat(spmd): pass SMCCCv1.3 SVE hint to lower EL |
| 0b0fd0b4 | 03-May-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
fix(fvp): permit enabling SME for SPD=spmd
Essentially revert [1] to permit specifying SME support along with SPD=spmd on FVP platform.
[1] https://review.trustedfirmware.org/c/TF-A/trusted-firmwar
fix(fvp): permit enabling SME for SPD=spmd
Essentially revert [1] to permit specifying SME support along with SPD=spmd on FVP platform.
[1] https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/20764
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: Iab15d5a4c966b9f5b265ccde6711765e242abeaa
show more ...
|
| 3d630fa2 | 06-Feb-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "jc/psci_spe" into integration
* changes: fix(spe): invoke spe_disable during power domain off/suspend feat(psci): add psci_do_manage_extensions API fix(arm_fpga): hal
Merge changes from topic "jc/psci_spe" into integration
* changes: fix(spe): invoke spe_disable during power domain off/suspend feat(psci): add psci_do_manage_extensions API fix(arm_fpga): halve number of PEs per core
show more ...
|
| ffb77421 | 04-Dec-2023 |
Chris Kay <chris.kay@arm.com> |
build: use new toolchain variables for tools
This change migrates the values of `CC`, `CPP`, `AS` and other toolchain variables to the new `$(toolchain)-$(tool)` variables, which were introduced by
build: use new toolchain variables for tools
This change migrates the values of `CC`, `CPP`, `AS` and other toolchain variables to the new `$(toolchain)-$(tool)` variables, which were introduced by the toolchain refactor patch. These variables should be equivalent to the values that they're replacing.
Change-Id: I644fe4ce82ef1894bed129ddb4b6ab94fb04985d Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 777f1f68 | 18-Jul-2023 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
fix(spe): invoke spe_disable during power domain off/suspend
spe_disable function, disables profiling and flushes all the buffers and hence needs to be called on power-off/suspend path. It needs to
fix(spe): invoke spe_disable during power domain off/suspend
spe_disable function, disables profiling and flushes all the buffers and hence needs to be called on power-off/suspend path. It needs to be invoked as SPE feature writes to memory as part of regular operation and not disabling before exiting coherency could potentially cause issues.
Currently, this is handled only for the FVP. Other platforms need to replicate this behaviour and is covered as part of this patch.
Calling it from generic psci library code, before the platform specific actions to turn off the CPUs, will make it applicable for all the platforms which have ported the PSCI library.
Change-Id: I90b24c59480357e2ebfa3dfc356c719ca935c13d Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| 70b9204e | 02-Feb-2024 |
Andre Przywara <andre.przywara@arm.com> |
fix(arm_fpga): halve number of PEs per core
When creating the Arm FPGA platform, we had plenty of memory available, so assigned a generous four PEs per core for the potential CPU topology. In realit
fix(arm_fpga): halve number of PEs per core
When creating the Arm FPGA platform, we had plenty of memory available, so assigned a generous four PEs per core for the potential CPU topology. In reality we barely see implementations with two PEs per core, and didn't have four at all so far.
With some design changes we now include more data per CPU type, and since the Arm FPGA build supports many cores (and determines the correct one at runtime), we run out of memory with certain build options.
Since we don't really need four PEs per core, just halve that number, to reduce our memory footprint without sacrificing functionality.
Signed-off-by: Andre Przywara <andre.przywara@arm.com> Change-Id: Ieb37ccc9f362b10ff0ce038f72efca21512a71cb
show more ...
|
| d07d4d63 | 10-Jan-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
feat(fvp): delegate FFH RAS handling to SP
This setup helps to mimic an end-to-end RAS handling flow inspired by real world design with a dedicated RAS secure partition managed by SPMC.
The detaile
feat(fvp): delegate FFH RAS handling to SP
This setup helps to mimic an end-to-end RAS handling flow inspired by real world design with a dedicated RAS secure partition managed by SPMC.
The detailed steps are documented as comments in the relevant source files introduced in this patch.
Change-Id: I97737c66649f6e49840fa0bdf2e0af4fb6b08fc7 Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| 28c79e10 | 30-Jan-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "plat_gpt_setup" into integration
* changes: feat(arm): move GPT setup to common BL source feat(arm): retrieve GPT related data from platform refactor(arm): rename L0/
Merge changes from topic "plat_gpt_setup" into integration
* changes: feat(arm): move GPT setup to common BL source feat(arm): retrieve GPT related data from platform refactor(arm): rename L0/L1 GPT base macros
show more ...
|
| 30019d86 | 25-Oct-2023 |
Sona Mathew <sonarebecca.mathew@arm.com> |
feat(cpufeat): add feature detection for FEAT_CSV2_3
This feature provides support to context save the SCXTNUM_ELx register. FEAT_CSV2_3 implies the implementation of FEAT_CSV2_2. FEAT_CSV2_3 is sup
feat(cpufeat): add feature detection for FEAT_CSV2_3
This feature provides support to context save the SCXTNUM_ELx register. FEAT_CSV2_3 implies the implementation of FEAT_CSV2_2. FEAT_CSV2_3 is supported in AArch64 state only and is an optional feature in Arm v8.0 implementations.
This patch adds feature detection for v8.9 feature FEAT_CSV2_3, adds macros for ID_AA64PFR0_EL1.CSV2 bits [59:56] for detecting FEAT_CSV2_3 and macro for ENABLE_FEAT_CSV2_3.
Change-Id: Ida9f31e832b5f11bd89eebd6cc9f10ddad755c14 Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com>
show more ...
|
| 86e4859a | 20-Dec-2023 |
Rohit Mathew <Rohit.Mathew@arm.com> |
feat(arm): retrieve GPT related data from platform
For RME-enabled platforms, initializing L0 and L1 tables and enabling GPC checks is necessary. For systems using BL2 to load firmware images, the G
feat(arm): retrieve GPT related data from platform
For RME-enabled platforms, initializing L0 and L1 tables and enabling GPC checks is necessary. For systems using BL2 to load firmware images, the GPT initialization has to be done in BL2 prior to the image load. The common Arm platform code currently implements this in the "arm_bl2_plat_gpt_setup" function, relying on the FVP platform's specifications (PAS definitions, GPCCR_PPS, and GPCCR_PGS).
Different Arm platforms may have distinct PAS definitions, GPCCR_PPS, GPCCR_PGS, L0/L1 base, and size. To accommodate these variations, introduce the "plat_arm_get_gpt_info" API. Platforms must implement this API to provide the necessary data for GPT setup on RME-enabled platforms. It is essential to note that these additions are relevant to platforms under the plat/arm hierarchy that will reuse the "arm_bl2_plat_gpt_setup" function.
As a result of these new additions, migrate data related to the FVP platform to its source and header files.
Signed-off-by: Rohit Mathew <Rohit.Mathew@arm.com> Change-Id: I4f4c8894c1cda0adc1f83e7439eb372e923f6147
show more ...
|