| 62269d47 | 25-Jun-2024 |
Davidson K <davidson.kumaresan@arm.com> |
feat(tc): move flash device to own node
Move the flash address to its own devicetree node in tc_spmc_manifest.dtsi. This patch also changes the device-type to ns-device-memory which is the correct t
feat(tc): move flash device to own node
Move the flash address to its own devicetree node in tc_spmc_manifest.dtsi. This patch also changes the device-type to ns-device-memory which is the correct type for a flash device.
Change-Id: I19503ac35c433661faaaa01c0b83a16540d73810 Co-developed-by: Jackson Cooper-Driver <jackson.cooper-driver@arm.com> Signed-off-by: Davidson K <davidson.kumaresan@arm.com> Signed-off-by: Jackson Cooper-Driver <jackson.cooper-driver@arm.com> Signed-off-by: Icen Zeyada <Icen.Zeyada2@arm.com>
show more ...
|
| 41d8c6a0 | 07-Oct-2024 |
Tamas Ban <tamas.ban@arm.com> |
chore(tc): increase stack size with 0x100 bytes
CBOR encoding in the platform test requires a slightly bigger stack, so increase it with 0x100 bytes.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Ch
chore(tc): increase stack size with 0x100 bytes
CBOR encoding in the platform test requires a slightly bigger stack, so increase it with 0x100 bytes.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: I1b151aa29b3ccfcefa733d189d7aab88653cef1f
show more ...
|
| d6225e9d | 07-Oct-2024 |
Tamas Ban <tamas.ban@arm.com> |
chore(tc): link QCBOR library to the platform test
The delegated attestation service was updated to be aligned with RMM spec 1.0-rel0-rc2 version. The test suite uses the QCBOR library to encode the
chore(tc): link QCBOR library to the platform test
The delegated attestation service was updated to be aligned with RMM spec 1.0-rel0-rc2 version. The test suite uses the QCBOR library to encode the public key to be a CBOR serialized COSE_Key object.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: Ib9e1d80f7b4bca8783ae1f7cf4567725c2aa8538
show more ...
|
| 25a2fe3b | 21-Jun-2024 |
Davidson K <davidson.kumaresan@arm.com> |
feat(tc): remove static memory used for fwu
With the updated firmware update implementation in the Trusted Services, it is no longer needed to carve out static memory. Memory will be allocated dynam
feat(tc): remove static memory used for fwu
With the updated firmware update implementation in the Trusted Services, it is no longer needed to carve out static memory. Memory will be allocated dynamically in U-Boot and shared with the firmware update secure partition of Trusted Services.
Change-Id: I0fb128a458773236ee10526edfa1116b229e4d6e Signed-off-by: Davidson K <davidson.kumaresan@arm.com> Signed-off-by: Jackson Cooper-Driver <jackson.cooper-driver@arm.com> Signed-off-by: Icen Zeyada <Icen.Zeyada2@arm.com>
show more ...
|
| 034cc808 | 06-Jun-2024 |
sandeep chiluvuru <sandeep.chiluvuru@arm.com> |
fix(tc): correct NS timer frame ID for TC
The non-secure (NS) timer in TC is AP_GTCLK_NS_CNTBase1. This commit corrects the NS frame ID from its original value of 0 to U(1), ensuring that the correc
fix(tc): correct NS timer frame ID for TC
The non-secure (NS) timer in TC is AP_GTCLK_NS_CNTBase1. This commit corrects the NS frame ID from its original value of 0 to U(1), ensuring that the correct CNTACR register bits are written. This change enables access to the counter registers.
Change-Id: I287ab9c373a60741f78d44a67f546326916473ea Signed-off-by: Sandeep Chiluvuru <sandeep.chiluvuru@arm.com> Signed-off-by: Icen Zeyada <Icen.Zeyada2@arm.com>
show more ...
|
| 26467bf3 | 01-Oct-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "rd1ae-upstream" into integration
* changes: docs(rd1ae): add RD-1 AE documentation feat(rd1ae): enabling Trusted Board Boot(TBB) for RD-1 AE feat(rd1ae): introduce BL
Merge changes from topic "rd1ae-upstream" into integration
* changes: docs(rd1ae): add RD-1 AE documentation feat(rd1ae): enabling Trusted Board Boot(TBB) for RD-1 AE feat(rd1ae): introduce BL31 for RD-1 AE platform feat(rd1ae): add device tree files feat(rd1ae): introduce Arm RD-1 AE platform build(bl2): enable check for bl2 base overflow assert feat(arm): add support for loading CONFIG from BL2
show more ...
|
| ba790730 | 30-Sep-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "build: make Poetry optional" into integration |
| 26384969 | 29-Jul-2024 |
Divin Raj <divin.raj@arm.com> |
feat(rd1ae): enabling Trusted Board Boot(TBB) for RD-1 AE
In this commit, Trusted Board Boot has been enabled for the RD-1 AE platform, and the non-volatile counter remains at the default values sin
feat(rd1ae): enabling Trusted Board Boot(TBB) for RD-1 AE
In this commit, Trusted Board Boot has been enabled for the RD-1 AE platform, and the non-volatile counter remains at the default values since the non-volatile counter is read-only for Arm development platforms.
Signed-off-by: Divin Raj <divin.raj@arm.com> Change-Id: I2e1072101e56da0e474d2a3e9802e5d65a77fd55
show more ...
|
| daf934ca | 20-Feb-2023 |
Peter Hoyes <Peter.Hoyes@arm.com> |
feat(rd1ae): introduce BL31 for RD-1 AE platform
This commit introduces BL31 to the RD-1 AE platform. The RD-1 AE platform incorporates an SCP for CPU power control.
Additinaly introducing the memo
feat(rd1ae): introduce BL31 for RD-1 AE platform
This commit introduces BL31 to the RD-1 AE platform. The RD-1 AE platform incorporates an SCP for CPU power control.
Additinaly introducing the memory descriptor provides BL image information that gets used by BL2 to load the images
Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Signed-off-by: Divin Raj <divin.raj@arm.com> Change-Id: I035cbfd09f254aa47483ad35676f1cb3ffb661bd
show more ...
|
| bb7c7e71 | 04-Apr-2024 |
Divin Raj <divin.raj@arm.com> |
feat(rd1ae): add device tree files
This commit Add FW_CONFIG and HW_CONFIG device trees
Signed-off-by: Divin Raj <divin.raj@arm.com> Change-Id: Ia6cbf06def8ec9b74ef9040bab801278a3117899 |
| f661c74b | 20-Feb-2023 |
Peter Hoyes <Peter.Hoyes@arm.com> |
feat(rd1ae): introduce Arm RD-1 AE platform
Create a new platform for the RD-1 AE automotive FVP. This platform contains: * Neoverse-V3AE, Arm9.2-A application processor * A GICv4-compatible GIC-7
feat(rd1ae): introduce Arm RD-1 AE platform
Create a new platform for the RD-1 AE automotive FVP. This platform contains: * Neoverse-V3AE, Arm9.2-A application processor * A GICv4-compatible GIC-720AE * 128 MB of SRAM, of which 1 MB is reserved for TF-A
and BL2 runs at ELmax (EL3).
Additionally, this commit updates the maintainers.rst file and the changelog.yaml to add scope for RD-1 AE variants.
Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Signed-off-by: Divin Raj <divin.raj@arm.com> Signed-off-by: Rahul Singh <rahul.singh@arm.com> Change-Id: I9ae64b3f05a52653ebd1d334b15b7f21821264e2
show more ...
|
| 8d5c7627 | 16-Apr-2024 |
Divin Raj <divin.raj@arm.com> |
build(bl2): enable check for bl2 base overflow assert
Currently, the BL2 base overflow check asserts for all cases, but this check is only necessary if not reset to BL2 case. Therefore, adding a con
build(bl2): enable check for bl2 base overflow assert
Currently, the BL2 base overflow check asserts for all cases, but this check is only necessary if not reset to BL2 case. Therefore, adding a condition for this check.
Signed-off-by: Divin Raj <divin.raj@arm.com> Change-Id: Ia129921d76bcd32058ea0767db0319e6724be8ab
show more ...
|
| 973e0b7f | 04-Apr-2024 |
Divin Raj <divin.raj@arm.com> |
feat(arm): add support for loading CONFIG from BL2
This commit introduces a new ARM platform-specific build option called `ARM_FW_CONFIG_LOAD_ENABLE`. This option enables the loading of the `fw_conf
feat(arm): add support for loading CONFIG from BL2
This commit introduces a new ARM platform-specific build option called `ARM_FW_CONFIG_LOAD_ENABLE`. This option enables the loading of the `fw_config` device tree when resetting to the BL2 scenario.
Additionally, the FW_CONFIG image reference has been added to the fdts/tbbr_cot_descriptors.dtsi file in order to use in the scenario of RESET_TO_BL2.
Signed-off-by: Divin Raj <divin.raj@arm.com> Change-Id: I11de497b7dbb1386ed84d939d6fd2a11856e9e1b
show more ...
|
| bcce173d | 26-Sep-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "rd-v3-reset-to-bl31" into integration
* changes: feat(neoverse-rd): allow RESET_TO_BL31 for third gen platforms feat(arm): setup GPT in BL31 in RESET_TO_BL31 boot flow
Merge changes from topic "rd-v3-reset-to-bl31" into integration
* changes: feat(neoverse-rd): allow RESET_TO_BL31 for third gen platforms feat(arm): setup GPT in BL31 in RESET_TO_BL31 boot flow feat(neoverse-rd): enable RESET_TO_BL31 for RD-V3 feat(neoverse-rd): add a routine to update NT_FW_CONFIG in BL31
show more ...
|
| d2867397 | 26-Sep-2024 |
Chris Kay <chris.kay@arm.com> |
build: make Poetry optional
The Yocto team has requested that we do not use Poetry from within the Makefile, as Yocto does not have network access during the build process.
We want to maintain the
build: make Poetry optional
The Yocto team has requested that we do not use Poetry from within the Makefile, as Yocto does not have network access during the build process.
We want to maintain the current behaviour, so this change makes our use of Poetry contigent on it being available in the environment.
Additionally, explicitly passing an empty toolchain parameter now allows a tool to be *disabled* (e.g. passing `POETRY=` will prevent the build system from trying to use Poetry).
Change-Id: Ibf552a3fee1eaadee767a1b948b559700083b401 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 4abcfd8b | 25-Mar-2024 |
Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> |
feat(neoverse-rd): allow RESET_TO_BL31 for third gen platforms
Allow building RESET_TO_BL31 for third generation neoverse-rd platforms.
Signed-off-by: Vijayenthiran Subramaniam <vijayenthiran.subra
feat(neoverse-rd): allow RESET_TO_BL31 for third gen platforms
Allow building RESET_TO_BL31 for third generation neoverse-rd platforms.
Signed-off-by: Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com> Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I30256969e5671043b3e58c76922985f7252429af
show more ...
|
| 1547e5e6 | 25-Sep-2024 |
Rakshit Goyal <rakshit.goyal@arm.com> |
feat(arm): setup GPT in BL31 in RESET_TO_BL31 boot flow
In the normal boot flow, BL2 sets up the Granule Protection Tables (GPT). As BL2 is not a part of RESET_TO_BL31, BL31 needs to set up GPT for
feat(arm): setup GPT in BL31 in RESET_TO_BL31 boot flow
In the normal boot flow, BL2 sets up the Granule Protection Tables (GPT). As BL2 is not a part of RESET_TO_BL31, BL31 needs to set up GPT for CPUs supporting FEAT_RME.
Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I9ad16bd93ea9fbad422dd56e2ba1d600a30eea30
show more ...
|
| 527fc465 | 07-Feb-2024 |
Vivek Gautam <vivek.gautam@arm.com> |
feat(neoverse-rd): enable RESET_TO_BL31 for RD-V3
Update addresses for BL31, BL33 and NT_FW_CONFIG. Also add the PAS entries to setup GPT tables in BL31.
Signed-off-by: Vivek Gautam <vivek.gautam@a
feat(neoverse-rd): enable RESET_TO_BL31 for RD-V3
Update addresses for BL31, BL33 and NT_FW_CONFIG. Also add the PAS entries to setup GPT tables in BL31.
Signed-off-by: Vivek Gautam <vivek.gautam@arm.com> Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I8947660bb96fdf2f178e560b387e4bc93bf68abf
show more ...
|
| c6b27c49 | 18-Jul-2024 |
Rakshit Goyal <rakshit.goyal@arm.com> |
feat(neoverse-rd): add a routine to update NT_FW_CONFIG in BL31
In the BL1 based boot-flow, the non-secure DTB, NT_FW_CONFIG, is parsed in BL2. As BL1 and BL2 are not part of RESET_TO_BL31, add supp
feat(neoverse-rd): add a routine to update NT_FW_CONFIG in BL31
In the BL1 based boot-flow, the non-secure DTB, NT_FW_CONFIG, is parsed in BL2. As BL1 and BL2 are not part of RESET_TO_BL31, add support to parse and configure this DTB in BL31. NT_FW_CONFIG contains the platform information which is needed by BL33.
Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Signed-off-by: Vivek Gautam <vivek.gautam@arm.com> Change-Id: Ib1fb5417c36523eb2ec02aa22845218de68809aa
show more ...
|
| 2329e22b | 28-Aug-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(handoff): make tl generation flexible
Make the process of compiling a TL from DT source flexible. Provide a top level recipe to make it easier for developers to build a transfer list. Clean up
feat(handoff): make tl generation flexible
Make the process of compiling a TL from DT source flexible. Provide a top level recipe to make it easier for developers to build a transfer list. Clean up integration of TLC into the build system.
Change-Id: I4466e27a457dfd5bf709dc3a360a2b63bf6030ce Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 45252f14 | 17-Sep-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "feat(fvp): scale SP_MIN max size based on SRAM size" into integration |
| 056b4154 | 13-Sep-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "draft-ffm-rats-cca-token-00" into integration
* changes: refactor(docs): update RSE docs to match the example CCA token refactor(qemu): use the example CCA platform tok
Merge changes from topic "draft-ffm-rats-cca-token-00" into integration
* changes: refactor(docs): update RSE docs to match the example CCA token refactor(qemu): use the example CCA platform token from iat-verifier refactor(fvp): use the example CCA platform token from iat-verifier
show more ...
|
| 051c7ad8 | 13-Sep-2024 |
Soby Mathew <soby.mathew@arm.com> |
Merge "refactor(rmmd): plat token requests in pieces" into integration |
| 42cf6026 | 10-Jul-2024 |
Juan Pablo Conde <juanpablo.conde@arm.com> |
refactor(rmmd): plat token requests in pieces
Until now, the attestation token size was limited by the size of the shared buffer between RMM and TF-A. With this change, RMM can now request the token
refactor(rmmd): plat token requests in pieces
Until now, the attestation token size was limited by the size of the shared buffer between RMM and TF-A. With this change, RMM can now request the token in pieces, so they fit in the shared buffer. A new output parameter was added to the SMC call, which will return (along with the size of bytes copied into the buffer) the number of bytes of the token that remain to be retrieved.
TF-A will keep an offset variable that will indicate the position in the token where the next call will retrieve bytes from. This offset will be increased on every call by adding the number number of bytes copied. If the received hash size is not 0, TF-A will reset the offset to 0 and copy from that position on.
The SMC call will now return at most the size of the shared buffer in bytes on every call. Therefore, from now on, multiple SMC calls may be needed to be issued if the token size exceeds the shared buffer size.
Change-Id: I591f7013d06f64e98afaf9535dbea6f815799723 Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com>
show more ...
|
| 4f3e0cdc | 04-Sep-2024 |
Tamas Ban <tamas.ban@arm.com> |
refactor(fvp): use the example CCA platform token from iat-verifier
In [1] and [2], the example CCA platform token has been updated to be aligned with the new profile(s) defined in draft-ffm-rats-cc
refactor(fvp): use the example CCA platform token from iat-verifier
In [1] and [2], the example CCA platform token has been updated to be aligned with the new profile(s) defined in draft-ffm-rats-cca-token-00.
This change replaces the static CCA platform token in the FVP platform.
[1] https://review.trustedfirmware.org/c/TF-M/tf-m-tools/+/30812 [2] https://review.trustedfirmware.org/c/TF-M/tf-m-tools/+/31036
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: Ia23f0dffe618dca04f9f3c46c953a6f021101b09
show more ...
|