| ed567207 | 18-Oct-2023 |
Harrison Mutai <harrison.mutai@arm.com> |
refactor(bl2): make post image handling platform-specific
In certain instances a platform may need to make modifications to an image after it has been loaded by BL2. The existing common implementati
refactor(bl2): make post image handling platform-specific
In certain instances a platform may need to make modifications to an image after it has been loaded by BL2. The existing common implementation is a thin wrapper for a more generic arm post image handler. To enable platforms to make changes to images when they're loaded, move this into platform code.
Change-Id: I44025391056adb2d8a8eb4ea5984257b02027181 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| a0896467 | 27-Oct-2023 |
Sandrine Bailleux (on vacation) <sandrine.bailleux@arm.com> |
Merge changes from topic "gpt_updates" into integration
* changes: refactor(arm): use gpt_partition_init feat(partition): add interface to init gpt refactor(partition): convert warn to verbose
Merge changes from topic "gpt_updates" into integration
* changes: refactor(arm): use gpt_partition_init feat(partition): add interface to init gpt refactor(partition): convert warn to verbose feat(partition): add support to use backup GPT header refactor(partition): get GPT header location from MBR feat(arm): add IO policy to use backup gpt header feat(tbbr): add image id for backup GPT
show more ...
|
| efd812c3 | 27-Oct-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "feat(cpus): add support for Travis CPU" into integration |
| 08ec77c7 | 24-Oct-2023 |
Govindraj Raja <govindraj.raja@arm.com> |
refactor(arm): use gpt_partition_init
Current interface partition_init accepts GPT image id and parses the GPT image but doesn't return any error on failure.
So use gpt_partition_init which implici
refactor(arm): use gpt_partition_init
Current interface partition_init accepts GPT image id and parses the GPT image but doesn't return any error on failure.
So use gpt_partition_init which implicitly initialises with GPT image ID and returns a value.
Change-Id: I63280aa672388f1f8d9dc377ae13002c9f861f03 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| ad2dd658 | 03-Oct-2023 |
Govindraj Raja <govindraj.raja@arm.com> |
feat(partition): add support to use backup GPT header
Currently we just use primary GPT header which is located in second entry after MBR header, but if this block is corrupted or CRC mismatch occur
feat(partition): add support to use backup GPT header
Currently we just use primary GPT header which is located in second entry after MBR header, but if this block is corrupted or CRC mismatch occurs we could try to use the backup GPT header located at LBAn and GPT entries following this from LBA-33.
Add suitable warning messages before returning any errors to identify the cause of issue.
Change-Id: I0018ae9eafbacb683a18784d2c8bd917c70f50e1 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 3e6d2457 | 16-Oct-2023 |
Govindraj Raja <govindraj.raja@arm.com> |
feat(arm): add IO policy to use backup gpt header
Add a IO block spec to use GPT backup header if primary fails. Currently we use only the primary gpt header which is in the second block(LBA-1) afte
feat(arm): add IO policy to use backup gpt header
Add a IO block spec to use GPT backup header if primary fails. Currently we use only the primary gpt header which is in the second block(LBA-1) after the MBR block(LBA-0) so we restrict IO access to primary gpt header and its entries.
But we plan to use backup GPT which is the last block of the partition (LBA-n) in case our primary GPT header fails verification or is corrupted.
Offset and length of the block spec will be updated runtime from partition driver after parsing MBR data.
Change-Id: Id1d49841d6f4cbcc3248af19faf2fbd8e24a8ba1 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 94c90ac8 | 08-Aug-2023 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(handoff): port BL31-BL33 interface to fw handoff framework
The firmware handoff framework is a light weight mechanism for sharing information between bootloader stages. Add support for this fra
feat(handoff): port BL31-BL33 interface to fw handoff framework
The firmware handoff framework is a light weight mechanism for sharing information between bootloader stages. Add support for this framework at the handoff boundary between runtime firmware BL31 and NS software on FVP.
Change-Id: Ib02e0e4c20a39e32e06da667caf2ce5a28de1e28 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| eb8700a9 | 11-Sep-2023 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
refactor(fvp): do not use RSS platform token and attestation key APIs
Since FVP does not support RSS, RSS APIs used to provide the hardcoded platform token and attestation key. However, that seems t
refactor(fvp): do not use RSS platform token and attestation key APIs
Since FVP does not support RSS, RSS APIs used to provide the hardcoded platform token and attestation key. However, that seems to be causing un-necessary mandating of some PSA crypto definitions, that doesn't seem appropriate. Hence to retrieve platform token and realm attestation key, these RSS APIs calls have been replaced with hardcoded information.
Change-Id: I5fd091025e3444a698b9d387763ce20db6b13ae1 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| a0594add | 19-Sep-2023 |
Juan Pablo Conde <juanpablo.conde@arm.com> |
feat(cpus): add support for Travis CPU
Adding basic CPU library code to support Travis CPU
Change-Id: I3c85e9fab409325d213978888a8f6d6949291258 Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.
feat(cpus): add support for Travis CPU
Adding basic CPU library code to support Travis CPU
Change-Id: I3c85e9fab409325d213978888a8f6d6949291258 Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com>
show more ...
|
| ce189383 | 02-Oct-2023 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(fvp): increase BL1 RW area for PSA_CRYPTO implementation
When using PSA Crypto API, few algorithms like ECDSA require a larger BL1 RW area. Hence added an additional BL1 RW page when PSA_CRYPTO
feat(fvp): increase BL1 RW area for PSA_CRYPTO implementation
When using PSA Crypto API, few algorithms like ECDSA require a larger BL1 RW area. Hence added an additional BL1 RW page when PSA_CRYPTO is selected.
Change-Id: Id6994667641a0b1e36b6a356d7c39a125d62ac01 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 0e1dc0f2 | 25-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(mpam): refine MPAM initialization and enablement process" into integration |
| edebefbc | 11-Oct-2023 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
fix(mpam): refine MPAM initialization and enablement process
Restricts MPAM to only NS world and enables trap to EL3 for access of MPAM registers from lower ELs of Secure and Realm world.
This patc
fix(mpam): refine MPAM initialization and enablement process
Restricts MPAM to only NS world and enables trap to EL3 for access of MPAM registers from lower ELs of Secure and Realm world.
This patch removes MPAM enablement from global context and adds it to EL3 State context which enables/disables MPAM during world switches. Renamed ENABLE_MPAM_FOR_LOWER_ELS to ENABLE_FEAT_MPAM and removed mpam_init_el3() as RESET behaviour is trapping.
Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I131f9dba5df236a71959b2d425ee11af7f3c38c4
show more ...
|
| 1ca73b4f | 20-Sep-2023 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(build): convert tabs to spaces
Convert any used tabs in arch_features.mk to spaces to avoid makefile build issues. Only recipes should be indented with tabs.
ENABLE_TRBE_FOR_NS should be enable
fix(build): convert tabs to spaces
Convert any used tabs in arch_features.mk to spaces to avoid makefile build issues. Only recipes should be indented with tabs.
ENABLE_TRBE_FOR_NS should be enabled only for aarch64 but accidentally its enabled for aarch32 as well in FVP makefile.
Change-Id: Iee913a04d6b60a4738183a17421754c2638e8e6d Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 20324013 | 24-Aug-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
feat(fvp): new SiP call to set an interrupt pending
This patch introduces an SiP SMC call for FVP platform to set an interrupt pending. This is needed for testing purposes.
Change-Id: I3dc68ffbec36
feat(fvp): new SiP call to set an interrupt pending
This patch introduces an SiP SMC call for FVP platform to set an interrupt pending. This is needed for testing purposes.
Change-Id: I3dc68ffbec36d90207c30571dc1fa7ebfb75046e Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| 7a2130b4 | 10-Sep-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
refactor(arm): allow platform specific SiP support
This patch introduces handler to add support for SiP calls to be handled at EL3 for Arm platforms.
Consequently, the support for SPMD LSP is moved
refactor(arm): allow platform specific SiP support
This patch introduces handler to add support for SiP calls to be handled at EL3 for Arm platforms.
Consequently, the support for SPMD LSP is moved to corresponding Arm platform SiP source file. This will allow us to add support for a new SiP call in subsequent patch.
Change-Id: Ie29cb57fc622f96be3b67bebf34ce37cc82947d8 Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| c623fb2d | 13-Oct-2023 |
laurenw-arm <lauren.wehrmeister@arm.com> |
refactor(arm): remove ARM_ROTPK_KEY_LEN comparison
Removing ARM_ROTPK_KEY_LEN definition and comparison in full key .S files since there is little value in comparing the defined value with a static
refactor(arm): remove ARM_ROTPK_KEY_LEN comparison
Removing ARM_ROTPK_KEY_LEN definition and comparison in full key .S files since there is little value in comparing the defined value with a static size. This becomes more maintenance than value addition.
Removing defines no longer required and general clean up of .S full key files.
Change-Id: Id286b7078ab9e190e37a43804e2a8d1b0934c235 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
show more ...
|
| b8ae6890 | 15-Aug-2023 |
laurenw-arm <lauren.wehrmeister@arm.com> |
feat(arm): ecdsa p384/p256 full key support
Add full key support for ECDSA P384 and P256.
New .S files and p384 pem file created along with new plat_get_rotpk_info() flag ARM_ROTPK_DEVEL_FULL_DEV_E
feat(arm): ecdsa p384/p256 full key support
Add full key support for ECDSA P384 and P256.
New .S files and p384 pem file created along with new plat_get_rotpk_info() flag ARM_ROTPK_DEVEL_FULL_DEV_ECDSA_KEY_ID.
Change-Id: I578b257eca41070bb4f4791ef429f2b8a66b1eb3 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
show more ...
|
| c47d0491 | 28-Jun-2023 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(rdn2): introduce platform handler for Group0 interrupt
This patch introduces a handler for RDN2 platform to triage Group0 secure interrupts. Currently, it is empty but serves as a placeholder f
feat(rdn2): introduce platform handler for Group0 interrupt
This patch introduces a handler for RDN2 platform to triage Group0 secure interrupts. Currently, it is empty but serves as a placeholder for future Group0 interrupt sources.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: If0b64e507e9105813d9a5d16f70101cf0d8ca5a4
show more ...
|
| f99dcbac | 13-Jul-2022 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(rdn2): add plat hook for memory transaction
RdN2 does not make MEM_SHARE/LEND requests. Instead, add a dummy implementation of memory management related platform hooks.
Signed-off-by: Nishant
feat(rdn2): add plat hook for memory transaction
RdN2 does not make MEM_SHARE/LEND requests. Instead, add a dummy implementation of memory management related platform hooks.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: Ifce55b6661f03d379e2fd2dc5625200d550d8038
show more ...
|
| f4589342 | 26-Mar-2022 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(rdn2): introduce accessor function to obtain datastore
In order to provide the EL3 SPMC a sufficient datastore to record memory descriptor, introduce an accessor function so that the backing me
feat(rdn2): introduce accessor function to obtain datastore
In order to provide the EL3 SPMC a sufficient datastore to record memory descriptor, introduce an accessor function so that the backing memory can be allocated in a platform defined manner to accommodate memory constraints and desired usecases.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: If5842e79c2ad22ccc17362b114f47d9900d82f7e
show more ...
|
| b4bed4b7 | 04-Oct-2023 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(rdn2): add defines needed for spmc-el3
Add the following platform specific flags to enable SPMC build.
SECURE_PARTITION_COUNT: Number of secure partitions supported NS_PARTITION_COUNT: Number
feat(rdn2): add defines needed for spmc-el3
Add the following platform specific flags to enable SPMC build.
SECURE_PARTITION_COUNT: Number of secure partitions supported NS_PARTITION_COUNT: Number of non secure partitions supported MAX_EL3_LP_DESCS_COUNT: Number of logical partitions supported
Signed-off-by: Sayanta Pattanayak <sayanta.pattanayak@arm.com> Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: I33d46be9dffd0acfc088bc1701dc0b1ed92dbf46
show more ...
|
| 5df1dccd | 12-Oct-2023 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(arm): reuse SPM_MM specific defines for SPMC_AT_EL3
For EL3 SPMC configuration enabled platforms, allow the reuse of SPM_MM specific definitions.
Signed-off-by: Sayanta Pattanayak <sayanta.pat
feat(arm): reuse SPM_MM specific defines for SPMC_AT_EL3
For EL3 SPMC configuration enabled platforms, allow the reuse of SPM_MM specific definitions.
Signed-off-by: Sayanta Pattanayak <sayanta.pattanayak@arm.com> Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: Ia24b97343c7b8c6b22a4d54c5bb9cee2c480241f
show more ...
|
| 920aa8d4 | 03-Oct-2023 |
Soby Mathew <soby.mathew@arm.com> |
Merge "feat(rmmd): enable SME for RMM" into integration |
| f92eb7e2 | 18-May-2023 |
Arunachalam Ganapathy <arunachalam.ganapathy@arm.com> |
feat(rmmd): enable SME for RMM
This patch enables Scalable Matrix Extension (SME) for RMM. RMM will save/restore required registers that are shared with SVE/FPU register state so that Realm can use
feat(rmmd): enable SME for RMM
This patch enables Scalable Matrix Extension (SME) for RMM. RMM will save/restore required registers that are shared with SVE/FPU register state so that Realm can use FPU or SVE.
The Relevant RMM support can be found here : https://github.com/TF-RMM/tf-rmm/commit/0ccd7ae58b00
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com> Change-Id: I3bbdb840e7736dec00b71c85fcec3d5719413ffd
show more ...
|
| ee7d7f66 | 27-Sep-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(spmd): coverity scan issues" into integration |