| 45716e37 | 14-Mar-2024 |
Daniel Boulby <daniel.boulby@arm.com> |
fix(spm): add device-regions used in tf-a-tests
Device memory region specified in an SP manifest are now validated against the device memory defined in the SPMC manifest. Therefore we need to add th
fix(spm): add device-regions used in tf-a-tests
Device memory region specified in an SP manifest are now validated against the device memory defined in the SPMC manifest. Therefore we need to add the device memory used in the tf-a-tests to the SPMC manifests.
Signed-off-by: Daniel Boulby <daniel.boulby@arm.com> Change-Id: I47376e67c700705d12338d7078292618a15d5546
show more ...
|
| c35299d6 | 16-Apr-2024 |
J-Alves <joao.alves@arm.com> |
fix: static checks on spmc dts
Change the header of the license to have 2024, and replace spaces for a tab.
Signed-off-by: J-Alves <joao.alves@arm.com> Change-Id: If98161ad35e1ead30e1e0d3ddb4cc6348
fix: static checks on spmc dts
Change the header of the license to have 2024, and replace spaces for a tab.
Signed-off-by: J-Alves <joao.alves@arm.com> Change-Id: If98161ad35e1ead30e1e0d3ddb4cc6348e83d6ee
show more ...
|
| d3604b35 | 16-Apr-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "lto-fixes" into integration
* changes: fix(bl1): add missing `__RW_{START,END}__` symbols fix(fvp): don't check MPIDRs with the power controller in BL1 fix(arm): only
Merge changes from topic "lto-fixes" into integration
* changes: fix(bl1): add missing `__RW_{START,END}__` symbols fix(fvp): don't check MPIDRs with the power controller in BL1 fix(arm): only expose `arm_bl2_dyn_cfg_init` to BL2 fix(cm): hide `cm_init_context_by_index` from BL1 fix(bl1): add missing spinlock dependency
show more ...
|
| 14557291 | 16-Apr-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "hm/handoff" into integration
* changes: refactor(fvp): reduce max size of HW_CONFIG to 16KB refactor(arm): replace hard-coded HW_CONFIG DT size |
| eabcde25 | 15-Apr-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(ff-a): add NS memory node to fvp_spmc_optee_sp manifest" into integration |
| b9ecf645 | 01-Dec-2023 |
Harrison Mutai <harrison.mutai@arm.com> |
refactor(fvp): reduce max size of HW_CONFIG to 16KB
HW_CONFIG is the hardware description consumed primarly by the Linux kernel, and for the FVP platform, TF-A runtime firmware (BL31). Due to both n
refactor(fvp): reduce max size of HW_CONFIG to 16KB
HW_CONFIG is the hardware description consumed primarly by the Linux kernel, and for the FVP platform, TF-A runtime firmware (BL31). Due to both needing it, two copies of this file are made in Trusted DRAM and SRAM. The copy in Trusted DRAM is a workaround stemming from memory constraints in SRAM. We temporarily map the range of memory in Trusted DRAM into BL31 to allow it to consume the configuration. In principle, however, BL31 execution should be limited to SRAM, hence reduce the maximum size of the HW_CONFIG to 16KB in order to accommodate it in SRAM. This is possible since in practice, the HW_CONFIG on FVP is only about 11KB.
Change-Id: Idb5dc0637b402562b7177a2b4e2464c4f3f67da7 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| df960bcc | 11-Apr-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
refactor(arm): replace hard-coded HW_CONFIG DT size
Ensure consistency across all Arm platforms, even those that may already have an existing macro for this purpose.
Change-Id: I07cd4cfcacf2c991717
refactor(arm): replace hard-coded HW_CONFIG DT size
Ensure consistency across all Arm platforms, even those that may already have an existing macro for this purpose.
Change-Id: I07cd4cfcacf2c991717f4c115cb0babd2c614d6f Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 6d8546f9 | 06-Feb-2024 |
Chris Kay <chris.kay@arm.com> |
fix(fvp): don't check MPIDRs with the power controller in BL1
The core platform layer requires an implementation for the `plat_core_pos_by_mpidr` function. This implementation is currently missing i
fix(fvp): don't check MPIDRs with the power controller in BL1
The core platform layer requires an implementation for the `plat_core_pos_by_mpidr` function. This implementation is currently missing in BL1, which causes undefined reference errors when linking with LTO.
The FVP platform source file providing this implementation is the `fvp_topology.c` file, so this change adds it to the BL1 sources for the FVP.
However, the implementation of this function reaches out to the FVP power controller driver - `fvp_pm.c` - to validate the MPIDR, and this file has at least two other dependencies:
- `spe.c` - `arm_gicvX.c`
Pulling these in correctly is no simple job, so I am simply removing the power controller validation in BL1 builds.
Change-Id: I56ddf1d799f5fe7f5b0fb2b046f7fe8232b07b27 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 3b48ca17 | 06-Feb-2024 |
Chris Kay <chris.kay@arm.com> |
fix(arm): only expose `arm_bl2_dyn_cfg_init` to BL2
The `arm_bl2_dyn_cfg_init` function is intended exclusively for BL2 - it should not be compiled for any other bootloader image. This change hides
fix(arm): only expose `arm_bl2_dyn_cfg_init` to BL2
The `arm_bl2_dyn_cfg_init` function is intended exclusively for BL2 - it should not be compiled for any other bootloader image. This change hides it for all but BL2.
Change-Id: I9fa95094dcc30f9fa4cc7bc5b3119ceae82df1ea Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 92bba3e7 | 04-Apr-2024 |
Karl Meakin <karl.meakin@arm.com> |
fix(ff-a): add NS memory node to fvp_spmc_optee_sp manifest
FFA_RXTX_MAP now requires the buffers to be in non-secure memory. This patch ensures that a region of non-secure memory is available so th
fix(ff-a): add NS memory node to fvp_spmc_optee_sp manifest
FFA_RXTX_MAP now requires the buffers to be in non-secure memory. This patch ensures that a region of non-secure memory is available so that tftf tests can pass.
Change-Id: I9daf3182e0dcb73d2bf5a5baffb1b4b78c724dcb Signed-off-by: Karl Meakin <karl.meakin@arm.com>
show more ...
|
| f7c091ea | 03-Apr-2024 |
Bipin Ravi <bipin.ravi@arm.com> |
Merge "refactor(arm): remove unused SP_MIN UART macros" into integration |
| 32904472 | 26-Mar-2024 |
Soby Mathew <soby.mathew@arm.com> |
feat(rme): pass console info via RMM-EL3 ifc
This patch modifies the boot manifest to add console information to be passed from EL3 to RMM.
Boot manifest version is bumped to v0.3
Signed-off-by: H
feat(rme): pass console info via RMM-EL3 ifc
This patch modifies the boot manifest to add console information to be passed from EL3 to RMM.
Boot manifest version is bumped to v0.3
Signed-off-by: Harry Moulton <harry.moulton@arm.com> Signed-off-by: Soby Mathew <soby.mathew@arm.com> Change-Id: Iedc4e640fb7a4450ce5ce966ae76936d1b7b742d
show more ...
|
| 67ff4f56 | 28-Mar-2024 |
Leo Yan <leo.yan@arm.com> |
refactor(arm): remove unused SP_MIN UART macros
Currently, tf-a has been refactored to support the multi UARTs (boot and runtime UARTs). As a result, the SP_MIN UART related code has been removed, a
refactor(arm): remove unused SP_MIN UART macros
Currently, tf-a has been refactored to support the multi UARTs (boot and runtime UARTs). As a result, the SP_MIN UART related code has been removed, and the macros are no longer used.
Therefore, this patch removes these unused UART macros.
Change-Id: I496349f876ba918fcafa7ed6c65d149914762290 Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| c282384d | 07-Mar-2024 |
Govindraj Raja <govindraj.raja@arm.com> |
refactor(mte): remove mte, mte_perm
Currently both FEAT_MTE and FEAT_MTE_PERM aren't used for enabling of any feature bits in EL3. So remove both FEAT handling.
All mte regs that are currently cont
refactor(mte): remove mte, mte_perm
Currently both FEAT_MTE and FEAT_MTE_PERM aren't used for enabling of any feature bits in EL3. So remove both FEAT handling.
All mte regs that are currently context saved/restored are needed only when FEAT_MTE2 is enabled, so move to usage of FEAT_MTE2 and remove FEAT_MTE usage.
BREAKING CHANGE: Any platform or downstream code trying to use SCR_EL3.ATA bit(26) will see failures as this is now moved to be used only with FEAT_MTE2 with commit@ef0d0e5478a3f19cbe70a378b9b184036db38fe2
Change-Id: Id01e154156571f7792135639e17dc5c8d0e17cf8 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 152f4cfa | 14-Mar-2024 |
Bipin Ravi <biprav01@u203721.austin.arm.com> |
fix(cpus): workaround for Cortex-A720 erratum 2926083
Cortex-A720 erratum 2926083 is a Cat B erratum that is present in revisions r0p0, r0p1 and is fixed in r0p2. The errata is only present when SPE
fix(cpus): workaround for Cortex-A720 erratum 2926083
Cortex-A720 erratum 2926083 is a Cat B erratum that is present in revisions r0p0, r0p1 and is fixed in r0p2. The errata is only present when SPE (Statistical Profiling Extension) is implemented and enabled.
The workaround is to set bits[58:57] of the CPUACTLR_EL1 to 'b11 when SPE is "implemented and enabled".
SDEN documentation: https://developer.arm.com/documentation/SDEN2439421/latest
Change-Id: I30182c3893416af65b55fca9a913cb4512430434 Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 15a04615 | 20-Feb-2024 |
Sona Mathew <sonarebecca.mathew@arm.com> |
fix(cpus): workaround for Cortex-A715 erratum 2413290
Cortex-A715 erratum 2413290 is a Cat B erratum that is present only in revision r1p0 and is fixed in r1p1. The errata is only present when SPE(S
fix(cpus): workaround for Cortex-A715 erratum 2413290
Cortex-A715 erratum 2413290 is a Cat B erratum that is present only in revision r1p0 and is fixed in r1p1. The errata is only present when SPE(Statistical Profiling Extension) is enabled.
The workaround is to set bits[58:57] of the CPUACTLR_EL1 to 'b11 when SPE is enabled, ENABLE_SPE_FOR_NS=1.
SDEN documentation: https://developer.arm.com/documentation/SDEN2148827/latest
Change-Id: Iaeb258c8b0a92e93d70b7dad6ba59d1056aeb135 Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com>
show more ...
|
| e8090ce2 | 08-Mar-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "refactor(cm): couple el2 registers with dependent feature flags" into integration |
| ca83a241 | 08-Mar-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(tc): do not use r0 for HW_CONFIG" into integration |
| e7d14fa8 | 07-Mar-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "DPE" into integration
* changes: feat(tc): group components into certificates feat(dice): add cert_id argument to dpe_derive_context() refactor(sds): modify log level
Merge changes from topic "DPE" into integration
* changes: feat(tc): group components into certificates feat(dice): add cert_id argument to dpe_derive_context() refactor(sds): modify log level for region validity feat(tc): add dummy TRNG support to be able to boot pVMs feat(tc): get the parent component provided DPE context_handle feat(tc): share DPE context handle with child component feat(tc): add DPE context handle node to device tree feat(tc): add DPE backend to the measured boot framework feat(auth): add explicit entries for key OIDs feat(dice): add DPE driver to measured boot feat(dice): add client API for DICE Protection Environment feat(dice): add QCBOR library as a dependency of DPE feat(dice): add typedefs from the Open DICE repo docs(changelog): add 'dice' scope refactor(tc): align image identifier string macros refactor(fvp): align image identifier string macros refactor(imx8m): align image identifier string macros refactor(qemu): align image identifier string macros fix(measured-boot): add missing image identifier string refactor(measured-boot): move metadata size macros to a common header refactor(measured-boot): move image identifier strings to a common header
show more ...
|
| d6af2344 | 24-Jan-2024 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
refactor(cm): couple el2 registers with dependent feature flags
Currently the EL2 part of the context structure (el2_sysregs_t), is mostly feature dependent.
For instance, CTX_HCRX_EL2 is only need
refactor(cm): couple el2 registers with dependent feature flags
Currently the EL2 part of the context structure (el2_sysregs_t), is mostly feature dependent.
For instance, CTX_HCRX_EL2 is only needed when FEAT_HCX (ENABLE_FEAT_HCX=1) is set, but the entry is unconditionally added in the EL2 context structure and thereby consuming memory even in build configurations where FEAT_HCX is disabled.
Henceforth, all such context entries should be coupled/tied with their respective feature enables and be optimized away when unused. This would reduce the context memory allocation for platforms, that dont enable/support all the architectural features at once.
Further, converting the assembly context-offset entries into a c structure relies on garbage collection of the linker removing unreferenced structures from memory, as well as aiding in readability and future maintenance.
Change-Id: I0cf49498ee3033cb6f3ee3810331121b26627783 Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| a5a966b1 | 05-Mar-2024 |
Jackson Cooper-Driver <jackson.cooper-driver@arm.com> |
fix(tc): do not use r0 for HW_CONFIG
populate_next_bl_params_config already configures the register values to be passed to BL33 and puts the HW_CONFIG address in r1. Therefore, we do not need to ove
fix(tc): do not use r0 for HW_CONFIG
populate_next_bl_params_config already configures the register values to be passed to BL33 and puts the HW_CONFIG address in r1. Therefore, we do not need to override r0 here and should instead use r1 in BL33.
Change-Id: I00b425301957b5b0510416e1fa1f3599c0359bfc Signed-off-by: Jackson Cooper-Driver <jackson.cooper-driver@arm.com>
show more ...
|
| cc41b56f | 01-Mar-2024 |
Sona Mathew <sonarebecca.mathew@arm.com> |
fix(cpus): workaround for Cortex-X4 erratum 2701112
Cortex-X4 erratum 2701112 is cat B erratum that applies to revision r0p0 and is fixed in r0p1. This erratum affects system configurations that do
fix(cpus): workaround for Cortex-X4 erratum 2701112
Cortex-X4 erratum 2701112 is cat B erratum that applies to revision r0p0 and is fixed in r0p1. This erratum affects system configurations that do not use an Arm interconnect IP.
The workaround for this erratum is not implemented in EL3. The erratum can be enabled/disabled on a platform level. The flag is used when the errata ABI feature is enabled and can assist the Kernel in the process of mitigation of the erratum.
SDEN Documentation: https://developer.arm.com/documentation/SDEN2432808/latest
Change-Id: I8ede1ee75b0ea1658369a0646d8af91d44a8759b Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com>
show more ...
|
| 6bdc856b | 06-Mar-2024 |
Manish Pandey <manish.pandey2@arm.com> |
fix(arm): move console flush/switch in common function
There are some CI configs which apply patch on the fly to test some unusual test scenarios. After commit c864af989 there is one patch which doe
fix(arm): move console flush/switch in common function
There are some CI configs which apply patch on the fly to test some unusual test scenarios. After commit c864af989 there is one patch which does not apply cleanly into arm_bl31_plat_runtime_setup().
To fix this issue move console flush/switch into the caller of this function.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I4116044d53bef349a707c977cf26d1df65200045
show more ...
|
| 6df8d764 | 30-Jan-2024 |
Tamas Ban <tamas.ban@arm.com> |
feat(tc): group components into certificates
Set the cert_id argument to group the components into certificates. The grouping reflects the likely units of updateability.
Signed-off-by: Tamas Ban <t
feat(tc): group components into certificates
Set the cert_id argument to group the components into certificates. The grouping reflects the likely units of updateability.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: Ie7a1f10c84af727d0cd39e3a78b0cb59cbc2e457
show more ...
|
| 7be391d1 | 04-Jan-2024 |
David Vincze <david.vincze@arm.com> |
feat(tc): add dummy TRNG support to be able to boot pVMs
pVMs on Android 14 has a platform requirement to support SMCCC TRNG discovery. This implementation add a dummy TRNG support to TC2.
Signed-o
feat(tc): add dummy TRNG support to be able to boot pVMs
pVMs on Android 14 has a platform requirement to support SMCCC TRNG discovery. This implementation add a dummy TRNG support to TC2.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: Iae0ca546cadf48a6a404ae578c7ccf5a84d057c4
show more ...
|