| db827f99 | 13-Sep-2024 |
Akshay Belsare <akshay.belsare@amd.com> |
feat(versal): add support for QEMU COSIM platform
QEMU COSIM introduces a new platform id for Versal Platform. QEMU COSIM is equivalent to QEMU with additional COSIM extensions, so just switching pl
feat(versal): add support for QEMU COSIM platform
QEMU COSIM introduces a new platform id for Versal Platform. QEMU COSIM is equivalent to QEMU with additional COSIM extensions, so just switching platform_id to QEMU if QEMU COSIM id is detected.
Change-Id: If81e0bf04301c7101f89d0df13134f7d04e8c257 Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
show more ...
|
| ae84525f | 13-Sep-2024 |
Maxime Méré <maxime.mere@foss.st.com> |
feat(stm32mp2): manage DDR FW via FIP
This feature is enabled by default using STM32MP_DDR_FIP_IO_STORAGE.
DDR firmware binary is loaded from FIP to SRAM1 which needs to be mapped. Only half of the
feat(stm32mp2): manage DDR FW via FIP
This feature is enabled by default using STM32MP_DDR_FIP_IO_STORAGE.
DDR firmware binary is loaded from FIP to SRAM1 which needs to be mapped. Only half of the SRAM1 will be allocated to TF-A. RISAB3 has to be configured to allow access to SRAM1. Add image ID and update maximum number on platform side also.
Fill related descriptor information, add policy and update numbers. DDR_TYPE variable is used to identify binary file, and image is now added in the fiptool command line.
The DDR PHY firmware is not in TF-A repository. It can be found at https://github.com/STMicroelectronics/stm32-ddr-phy-binary To ease the selection of the firmware path, STM32MP_DDR_FW_PATH is added to platform.mk file.
Change-Id: I09ab0a5c63406055a7b5ccd16d65e443de47ca2f Signed-off-by: Nicolas Le Bayon <nicolas.le.bayon@st.com> Signed-off-by: Yann Gautier <yann.gautier@st.com> Signed-off-by: Maxime Méré <maxime.mere@foss.st.com>
show more ...
|
| d07e9467 | 05-Jul-2021 |
Nicolas Le Bayon <nicolas.le.bayon@st.com> |
feat(stm32mp2): introduce DDR type compilation flags
Binary size limitation implies to define DDR type build flags. User must set one single type in the build command line. DDR_TYPE is then deduced,
feat(stm32mp2): introduce DDR type compilation flags
Binary size limitation implies to define DDR type build flags. User must set one single type in the build command line. DDR_TYPE is then deduced, and will help in relative definitions. A check routine is implemented to verify correct configuration.
Signed-off-by: Nicolas Le Bayon <nicolas.le.bayon@st.com> Signed-off-by: Maxime Méré <maxime.mere@foss.st.com> Change-Id: I87d0a492196efea33831d9c090e6e434cc7c0a1e
show more ...
|
| 03020b66 | 13-Jun-2023 |
Yann Gautier <yann.gautier@foss.st.com> |
feat(stm32mp2): add minimal support for BL31
Add the required files to compile BL31 on STM32MP2. Update BL2 configuration to load BL31. The platform boots until BL31, but stops here as no other bina
feat(stm32mp2): add minimal support for BL31
Add the required files to compile BL31 on STM32MP2. Update BL2 configuration to load BL31. The platform boots until BL31, but stops here as no other binaries are loaded as DDR is not initialized. At runtime, BL31 will use only the first half of the SYSRAM, the upper half will be used for non-secure DMA LLIs. To be sure nothing from this area is still in the cache, invalidate the upper SYSRAM before enabling BL31 cache. BL31 should then map only first half of the SYSRAM. But it must temporarily map the upper half read-only, as this is where we will retrieve BL2 parameters, used to fill registers for next boot stages.
Signed-off-by: Yann Gautier <yann.gautier@st.com> Signed-off-by: Maxime Méré <maxime.mere@foss.st.com> Change-Id: Ie91527a7a26625624b4b3c65fb6a0ca9dd355dbd
show more ...
|
| 056b4154 | 13-Sep-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "draft-ffm-rats-cca-token-00" into integration
* changes: refactor(docs): update RSE docs to match the example CCA token refactor(qemu): use the example CCA platform tok
Merge changes from topic "draft-ffm-rats-cca-token-00" into integration
* changes: refactor(docs): update RSE docs to match the example CCA token refactor(qemu): use the example CCA platform token from iat-verifier refactor(fvp): use the example CCA platform token from iat-verifier
show more ...
|
| 9248ee0c | 24-Jul-2024 |
Jean-Philippe Brucker <jean-philippe@linaro.org> |
fix(qemu): update rmmd_attest_get_platform_token()
Update the parameters to rmmd_attest_get_platform_token(), which can now handle platform tokens larger than 4kB. Since the QEMU sample token is sma
fix(qemu): update rmmd_attest_get_platform_token()
Update the parameters to rmmd_attest_get_platform_token(), which can now handle platform tokens larger than 4kB. Since the QEMU sample token is smaller than 4kB, our implementation remains the same. Take the opportunity to clean up the function slightly.
Change-Id: Id5a1d576968ebd160d2b79c1f38392d4ecc89421 Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
show more ...
|
| 051c7ad8 | 13-Sep-2024 |
Soby Mathew <soby.mathew@arm.com> |
Merge "refactor(rmmd): plat token requests in pieces" into integration |
| 42cf6026 | 10-Jul-2024 |
Juan Pablo Conde <juanpablo.conde@arm.com> |
refactor(rmmd): plat token requests in pieces
Until now, the attestation token size was limited by the size of the shared buffer between RMM and TF-A. With this change, RMM can now request the token
refactor(rmmd): plat token requests in pieces
Until now, the attestation token size was limited by the size of the shared buffer between RMM and TF-A. With this change, RMM can now request the token in pieces, so they fit in the shared buffer. A new output parameter was added to the SMC call, which will return (along with the size of bytes copied into the buffer) the number of bytes of the token that remain to be retrieved.
TF-A will keep an offset variable that will indicate the position in the token where the next call will retrieve bytes from. This offset will be increased on every call by adding the number number of bytes copied. If the received hash size is not 0, TF-A will reset the offset to 0 and copy from that position on.
The SMC call will now return at most the size of the shared buffer in bytes on every call. Therefore, from now on, multiple SMC calls may be needed to be issued if the token size exceeds the shared buffer size.
Change-Id: I591f7013d06f64e98afaf9535dbea6f815799723 Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com>
show more ...
|
| 8e5252f3 | 13-Sep-2024 |
Maheedhar Bollapalli <MaheedharSai.Bollapalli@amd.com> |
fix(versal): kernel QEMU boot is failing on versal platform
Due to deprecation of VERSAL_PLATFORM build argument, the board detection is done at runtime due to this the cpu and uart clock freq was n
fix(versal): kernel QEMU boot is failing on versal platform
Due to deprecation of VERSAL_PLATFORM build argument, the board detection is done at runtime due to this the cpu and uart clock freq was not set as required to silicon values.
Updated Versal QEMU cpu_clock and uart_clock to silicon values.
Change-Id: I7c772f07ba45eb7e0ae095fd670718190e24f0d7 Signed-off-by: Maheedhar Bollapalli <MaheedharSai.Bollapalli@amd.com>
show more ...
|
| 3ba9fca7 | 04-Sep-2024 |
Tamas Ban <tamas.ban@arm.com> |
refactor(qemu): use the example CCA platform token from iat-verifier
In [1] and [2], the example CCA platform token has been updated to be aligned with the new profile(s) defined in draft-ffm-rats-c
refactor(qemu): use the example CCA platform token from iat-verifier
In [1] and [2], the example CCA platform token has been updated to be aligned with the new profile(s) defined in draft-ffm-rats-cca-token-00.
This change replaces the static CCA platform token in QEMU.
[1] https://review.trustedfirmware.org/c/TF-M/tf-m-tools/+/30812 [2] https://review.trustedfirmware.org/c/TF-M/tf-m-tools/+/31036
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: I9153df1e6c1be81e669d5495dbe8d1a52e86cdff
show more ...
|
| 4f3e0cdc | 04-Sep-2024 |
Tamas Ban <tamas.ban@arm.com> |
refactor(fvp): use the example CCA platform token from iat-verifier
In [1] and [2], the example CCA platform token has been updated to be aligned with the new profile(s) defined in draft-ffm-rats-cc
refactor(fvp): use the example CCA platform token from iat-verifier
In [1] and [2], the example CCA platform token has been updated to be aligned with the new profile(s) defined in draft-ffm-rats-cca-token-00.
This change replaces the static CCA platform token in the FVP platform.
[1] https://review.trustedfirmware.org/c/TF-M/tf-m-tools/+/30812 [2] https://review.trustedfirmware.org/c/TF-M/tf-m-tools/+/31036
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: Ia23f0dffe618dca04f9f3c46c953a6f021101b09
show more ...
|
| da5984db | 12-Sep-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(fvp): enable FEAT_MTE2" into integration |
| d081c611 | 12-Sep-2024 |
Andre Przywara <andre.przywara@arm.com> |
fix(fvp): enable FEAT_MTE2
ENABLE_FEAT_MTE2 controls the trapping of some MTE related system registers. If the memory_tagging_support_level parameter on the FVP command line is set to higher values,
fix(fvp): enable FEAT_MTE2
ENABLE_FEAT_MTE2 controls the trapping of some MTE related system registers. If the memory_tagging_support_level parameter on the FVP command line is set to higher values, non-secure world will see the feature bits in the CPU ID registers and will use those registers, triggering a panic in BL31.
Enable the feature in the optional form for the FVP build, to avoid any panics.
Change-Id: I26ba444d784adf165db81048f93e11361c7f11ac Signed-off-by: Andre Przywara <andre.przywara@arm.com>
show more ...
|
| 3b5eca9e | 25-Jul-2024 |
Ryan Everett <ryan.everett@arm.com> |
feat(fvp): scale SP_MIN max size based on SRAM size
The maximum size for SP_MIN in the FVP is currently fixed and does not scale with the SRAM size. This update adjusts the SP_MIN size according to
feat(fvp): scale SP_MIN max size based on SRAM size
The maximum size for SP_MIN in the FVP is currently fixed and does not scale with the SRAM size. This update adjusts the SP_MIN size according to the SRAM size used to build the FVP platform.
Change-Id: I95527e8ae6f8a73c336ed4fe05ace5de86d8991d Signed-off-by: Ryan Everett <ryan.everett@arm.com>
show more ...
|
| 078ea665 | 12-Sep-2024 |
Yann Gautier <yann.gautier@st.com> |
Merge "feat(mediatek): change log level from INFO to VERBOSE" into integration |
| 692d32b5 | 10-Sep-2024 |
Ronak Jain <ronak.jain@amd.com> |
fix(xilinx): map PMC_GPIO device node to interrupt for wakeup source
Currently, PMC_GPIO device node was not mapped with interrupt number during the setup of wakeup source while suspending. As a res
fix(xilinx): map PMC_GPIO device node to interrupt for wakeup source
Currently, PMC_GPIO device node was not mapped with interrupt number during the setup of wakeup source while suspending. As a result, system cannot resume using PMC_GPIO as wakeup source.
To address this issue, add an entry for PMC_GPIO node to map with its corresponding interrupt number.
Change-Id: Ic681b7b2e7c0b3bd542c8e4664a2129e4b91c459 Signed-off-by: Ronak Jain <ronak.jain@amd.com>
show more ...
|
| 5f2f3848 | 11-Sep-2024 |
Gavin Liu <gavin.liu@mediatek.com> |
feat(mediatek): change log level from INFO to VERBOSE
This change aims to reduce unnecessary information in the default log output, so change to use VERBOSE.
Change-Id: I80ea57cd4164bdcef915db5392a
feat(mediatek): change log level from INFO to VERBOSE
This change aims to reduce unnecessary information in the default log output, so change to use VERBOSE.
Change-Id: I80ea57cd4164bdcef915db5392a63ae8982a634f Signed-off-by: Gavin Liu <gavin.liu@mediatek.com>
show more ...
|
| 41661656 | 11-Sep-2024 |
Soby Mathew <soby.mathew@arm.com> |
Merge changes If374b491,I6b63b9c6 into integration
* changes: fix(qemu): exclude GPT reserve from BL32_MEM_SIZE fix(qemu): fix L0 GPT page table mapping |
| 3789c3c0 | 03-Jun-2024 |
Chris Kay <chris.kay@arm.com> |
build: determine toolchain tools dynamically
Since the introduction of the toolchain detection framework into the build system, we have done determination and identification of the toolchain(s) used
build: determine toolchain tools dynamically
Since the introduction of the toolchain detection framework into the build system, we have done determination and identification of the toolchain(s) used for the build at the initialization of the build system.
This incurs a large cost to the build every time - for every toolchain that has been requested by the current makefile, we try to identify each tool in the list of known tool classes, even if that tool doesn't actually see any use.
For the clean and check-like targets we worked around this by disabling most of the toolchains if we detect these targets, but this is inflexible and not very reliable, and it still means that when building normal targets we are incurring that cost for all tools whether they are used or not.
This change instead modifies the toolchain detection framework to only initialize a tool for a given toolchain when it is first used. This does mean that we can no longer warn about an incorrectly-configured toolchain at the beginning of build system invocation, but it has the advantage of substantially reducing build time and the complexity of *using* the framework (at the cost of an increase in complexity in the framework itself).
Change-Id: I7f3d06b2eb58c1b26a846791a13b0037f32c8013 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 0631d68d | 09-Sep-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "fix(arm): add extra hash config to validate ROTPK" into integration |
| 014975ce | 06-Sep-2024 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
fix(arm): add extra hash config to validate ROTPK
The default mbedTLS configuration enables hash algorithms based on the HASH_ALG or MBOOT_EL_HASH_ALG selected. However, the Arm ROTPK is always embe
fix(arm): add extra hash config to validate ROTPK
The default mbedTLS configuration enables hash algorithms based on the HASH_ALG or MBOOT_EL_HASH_ALG selected. However, the Arm ROTPK is always embedded as a SHA256 hash in BL1 and BL2. In the future, we may need to adjust this to use the HASH_ALG algorithm for embedding the ROTPK hash.
As a temporary workaround, a separate mbedTLS configuration has been created for Arm platforms to explicitly set SHA256 defines, rather than relying on the default configuration. This adjustment is reflected in the mbedTLS configuration file for the TC platform as well as in the PSA Crypto configuration file.
Change-Id: Ib3128ce7b0fb5c0858624ecbc998d456968beddf Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 75fdb32f | 09-Sep-2024 |
Joanna Farley <joanna.farley@arm.com> |
Merge "feat(versal2): implement USB_SET_STATE dummy IOCTL" into integration |
| aa7f6cd8 | 27-Nov-2020 |
Yann Gautier <yann.gautier@st.com> |
feat(st): manage BL31 FCONF load_info struct
As the file is common with STM32MP1, which is AARCH32, the BL31 entry is put under __aarch64__ flag.
Change-Id: I1efc406717842235264dc6cc3605229659364b0
feat(st): manage BL31 FCONF load_info struct
As the file is common with STM32MP1, which is AARCH32, the BL31 entry is put under __aarch64__ flag.
Change-Id: I1efc406717842235264dc6cc3605229659364b02 Signed-off-by: Yann Gautier <yann.gautier@st.com> Signed-off-by: Maxime Méré <maxime.mere@foss.st.com>
show more ...
|
| 3e8a82a0 | 02-Sep-2024 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
feat(tc): make TCR2 feature asymmetric
Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> Change-Id: I6209dc46ddecaa09cc1220fe9488b3771ea6dc38 |
| 282bce19 | 05-Sep-2024 |
Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com> |
feat(versal2): implement USB_SET_STATE dummy IOCTL
USB DWC3 driver calls firmware API to set USB D0/D3 power states. In absence of firmware driver probe these PM APIs return -ENODEV and DWC3 driver
feat(versal2): implement USB_SET_STATE dummy IOCTL
USB DWC3 driver calls firmware API to set USB D0/D3 power states. In absence of firmware driver probe these PM APIs return -ENODEV and DWC3 driver probe fails. Till PLM implement these PM APIs as a temporary workaround add dummy PM implementation in TFA.
Change-Id: I8768301524ffdc2f275221296feaa2a3ad0ad4f6 Signed-off-by: Maheedhar Bollapalli <MaheedharSai.Bollapalli@amd.com>
show more ...
|