| 55b4c5ce | 29-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "h616_pmics" into integration
* changes: feat(allwinner): adjust H616 L2 cache size in DTB feat(allwinner): h616: add support for AXP717 PMIC feat(allwinner): h616: ad
Merge changes from topic "h616_pmics" into integration
* changes: feat(allwinner): adjust H616 L2 cache size in DTB feat(allwinner): h616: add support for AXP717 PMIC feat(allwinner): h616: add support for AXP313 PMIC feat(allwinner): h616: add I2C PMIC support refactor(allwinner): h616: prepare for more than one PMIC model
show more ...
|
| 70c8a8f5 | 29-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(rcar3): populate kaslr-seed in next stage DT" into integration |
| aca05c59 | 29-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(fvp): add secure uart interrupt in device region" into integration |
| 0195bac1 | 29-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "build: consolidate directory creation rules" into integration |
| 5477fb37 | 29-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(fvp): add flash areas for secure partition" into integration |
| 9fb76763 | 16-May-2024 |
levi.yun <yeoreum.yun@arm.com> |
feat(fvp): add flash areas for secure partition
To support UEFI secure variable service, StandaloneMm which runs in BL32 should know flash areas. Add flash memory areas and system register region so
feat(fvp): add flash areas for secure partition
To support UEFI secure variable service, StandaloneMm which runs in BL32 should know flash areas. Add flash memory areas and system register region so that StandaloneMm access to flash storages.
Change-Id: I803bda9664a17a0b978ebff90974eaf5442a91cd Signed-off-by: levi.yun <yeoreum.yun@arm.com>
show more ...
|
| fc3a01aa | 24-Jul-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
fix(fvp): add secure uart interrupt in device region
OP-TEE enables the use case of a secure interrupt triggered by the UART driver. This interrupt is routed by FFA_INTERRUPT interface to OP-TEE. De
fix(fvp): add secure uart interrupt in device region
OP-TEE enables the use case of a secure interrupt triggered by the UART driver. This interrupt is routed by FFA_INTERRUPT interface to OP-TEE. Define the UART interrupt in the FF-A device region node. Without this change, OPTEE panics at the boot with the following:
| I/TC: No non-secure external DT | I/TC: manifest DT found | I/TC: OP-TEE version: 4.3.0-23-gfcd8750677db | I/TC: WARNING: This OP-TEE configuration might be insecure! | I/TC: WARNING: Please check https://optee.readthedocs.io/en/latest/architecture/porting_guidelines.html | I/TC: Primary CPU initializing | E/TC:0 0 assertion '!res' failed at core/drivers/hfic.c:56 <hfic_op_enable> | E/TC:0 0 Panic at core/kernel/assert.c:28 <_assert_break> | E/TC:0 0 TEE load address @ 0x6284000
Change-Id: Icddcdfd032315aeee65ba3100f3a6b470a74435d Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
show more ...
|
| 42e35d2f | 11-Apr-2024 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
refactor(cm): convert el1-ctx assembly offset entries to c structure
Currently the EL1 part of the context structure (el1_sysregs_t), is coupled with feature flags reducing the context memory alloca
refactor(cm): convert el1-ctx assembly offset entries to c structure
Currently the EL1 part of the context structure (el1_sysregs_t), is coupled with feature flags reducing the context memory allocation for platforms, that don't enable/support all the architectural features at once.
Similar to the el2 context optimization commit-"d6af234" this patch further improves this section by converting the assembly context-offset entries into a c structure. It relies on garbage collection of the linker removing unreferenced structures from memory, as well as aiding in readability and future maintenance. Additionally, it eliminates the #ifs usage in 'context_mgmt.c' source file.
Change-Id: If6075931cec994bc89231241337eccc7042c5ede Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| 59b7c0a0 | 05-Jun-2024 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
feat(cm): add explicit context entries for ERRATA_SPECULATIVE_AT
* Currently, "ERRATA_SPECUALTIVE_AT" errata is enabled by default for few cores and they need context entries for saving and rest
feat(cm): add explicit context entries for ERRATA_SPECULATIVE_AT
* Currently, "ERRATA_SPECUALTIVE_AT" errata is enabled by default for few cores and they need context entries for saving and restoring EL1 regs "SCTLR_EL1 and TCR_EL1" registers at all times.
* This prevents the mechanism of decoupling EL1 and EL2 registers, as EL3 firmware shouldn't be handling both simultaneously.
* Depending on the build configuration either EL1 or EL2 context structures need to included, which would result in saving a good amount of context memory.
* In order to achieve this it's essential to have explicit context entries for registers supporting "ERRATA_SPECULATIVE_AT".
* This patch adds two context entries under "errata_speculative_at" structure to assist this errata and thereby allows decoupling EL1 and EL2 context structures.
Change-Id: Ia50626eea8fb64899a2e2d81622adbe07fe77d65 Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| 3fb52e41 | 14-May-2024 |
Ryan Everett <ryan.everett@arm.com> |
refactor(cpus): remove cpu specific errata funcs
Errata printing is done directly via generic_errata_report. This commit removes the unused \_cpu\()_errata_report functions for all cores, and remove
refactor(cpus): remove cpu specific errata funcs
Errata printing is done directly via generic_errata_report. This commit removes the unused \_cpu\()_errata_report functions for all cores, and removes errata_func from cpu_ops.
Change-Id: I04fefbde5f0ff63b1f1cd17c864557a14070d68c Signed-off-by: Ryan Everett <ryan.everett@arm.com>
show more ...
|
| 76042885 | 26-Jul-2024 |
Jean-Philippe Brucker <jean-philippe@linaro.org> |
fix(qemu): exclude GPT reserve from BL32_MEM_SIZE
BL32_MEM_SIZE fails to take into account the space reserved for L0 and L1 GPTs at the end of secure DRAM, when ENABLE_RME==1.
Fixes: cd75693f5ed3 (
fix(qemu): exclude GPT reserve from BL32_MEM_SIZE
BL32_MEM_SIZE fails to take into account the space reserved for L0 and L1 GPTs at the end of secure DRAM, when ENABLE_RME==1.
Fixes: cd75693f5ed3 ("feat(qemu): setup memory map for RME") Change-Id: If374b491d82be93c195cf501a9d12b9965d85182 Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
show more ...
|
| 147b1a6f | 25-Jul-2024 |
Jean-Philippe Brucker <jean-philippe@linaro.org> |
fix(qemu): fix L0 GPT page table mapping
Page table mappings are missing the bitlock pages introduced by commit e9bcbd7b2ee4 ("fix(qemu): allocate space for GPT bitlock"). Add them to the L0 mapping
fix(qemu): fix L0 GPT page table mapping
Page table mappings are missing the bitlock pages introduced by commit e9bcbd7b2ee4 ("fix(qemu): allocate space for GPT bitlock"). Add them to the L0 mapping.
Change-Id: I6b63b9c6ea4bf01ab1fac98723340272babe7bf8 Reported-by: Mathieu Poirier <mathieu.poirier@linaro.org> Fixes: e9bcbd7b2ee4 ("fix(qemu): allocate space for GPT bitlock") Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
show more ...
|
| 09ac1ca2 | 24-Jul-2024 |
Maheedhar Bollapalli <MaheedharSai.Bollapalli@amd.com> |
feat(versal): deprecate build time arg VERSAL_PLATFORM
Update Versal platform to enable runtime detection of variants instead of relying on the build argument VERSAL_PLATFORM. Integrate functionalit
feat(versal): deprecate build time arg VERSAL_PLATFORM
Update Versal platform to enable runtime detection of variants instead of relying on the build argument VERSAL_PLATFORM. Integrate functionality for identifying the board variant during runtime, allowing dynamic adjustment of CPU and UART clock values accordingly. Print the runtime board information during boot. This advancement streamlines the build process by eliminating dependencies on variant-specific builds, enabling the use of a single binary for multiple variants. Removing all the platform related constants for versal_virt,SPP,EMU as they are not used.
Change-Id: I8c1a1d391bd1a8971addc1f56f8309a3fb75aa6d Signed-off-by: Amey Avinash Raghatate <AmeyAvinash.Raghatate@amd.com> Signed-off-by: Maheedhar Bollapalli <MaheedharSai.Bollapalli@amd.com>
show more ...
|
| a3939b1b | 24-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(handoff): fix register convention r1/x1 value on transfer list" into integration |
| e7c060d5 | 24-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(fgt2): add support for FEAT_FGT2" into integration |
| 80da8264 | 24-Jul-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "us_dsu_pmu" into integration
* changes: feat(tc): enable Last-level cache (LLC) feat(cpus): add sysreg_bitfield_insert_from_gpr macro feat(tc): add DSU PMU node for t
Merge changes from topic "us_dsu_pmu" into integration
* changes: feat(tc): enable Last-level cache (LLC) feat(cpus): add sysreg_bitfield_insert_from_gpr macro feat(tc): add DSU PMU node for tc3 feat(tc): enable el1 access to DSU PMU registers style(tc): remove comment for plat_reset_handler fix(context-mgmt): keep actlr_el2 value in the init context
show more ...
|
| e1b76cb0 | 23-Jul-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
feat(tc): enable Last-level cache (LLC)
The EXTLLC bit in CPUECTLR_EL1 register indicates that an external Last-level cache is present in the system.
This bit is not set for CPUs on TC3 platform de
feat(tc): enable Last-level cache (LLC)
The EXTLLC bit in CPUECTLR_EL1 register indicates that an external Last-level cache is present in the system.
This bit is not set for CPUs on TC3 platform despite there is presence of LLC in MCN, so set them.
Change-Id: I5f889e67dce2b1d00e4ee66a8c255cf7911825b0 Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| 2281c634 | 24-Jul-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(arm): check the presence of the policy check function" into integration |
| f5b2fa90 | 24-Jul-2024 |
Shen Jiamin <shen_jiamin@comp.nus.edu.sg> |
fix(zynqmp): handle secure SGI at EL1 for OP-TEE
OP-TEE requires SGIs to be handled at S-EL1. The Makefile was not properly setting the flag GICV2_G0_FOR_EL3 to 0 when the SPD is OP-TEE.
Change-Id:
fix(zynqmp): handle secure SGI at EL1 for OP-TEE
OP-TEE requires SGIs to be handled at S-EL1. The Makefile was not properly setting the flag GICV2_G0_FOR_EL3 to 0 when the SPD is OP-TEE.
Change-Id: I256afa37ddf4ad4a154c43d51807de670c3689bb Signed-off-by: Shen Jiamin <shen_jiamin@comp.nus.edu.sg>
show more ...
|
| cd656a56 | 23-Jul-2024 |
Daniel Boulby <daniel.boulby@arm.com> |
feat(spm): change UART0-1 to NS device region
To enable device memory sharing test make memory region for UART0 and 1 a NS device region so that it can be shared by tf-a-tests to the cactus SP.
Sig
feat(spm): change UART0-1 to NS device region
To enable device memory sharing test make memory region for UART0 and 1 a NS device region so that it can be shared by tf-a-tests to the cactus SP.
Signed-off-by: Daniel Boulby <daniel.boulby@arm.com> Change-Id: Iadfe02a65f5d4a8b60296f07c4943dd31f201453
show more ...
|
| de8b9ced | 17-Jul-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
feat(tc): enable el1 access to DSU PMU registers
DSU PMU registers are write accessible in EL1 if the ACTLR_EL3[12] bit and the ACTLR_EL2[12] bit are set to 1, and these registers are need to be set
feat(tc): enable el1 access to DSU PMU registers
DSU PMU registers are write accessible in EL1 if the ACTLR_EL3[12] bit and the ACTLR_EL2[12] bit are set to 1, and these registers are need to be set for all cores, so set these bits in platform reset handler.
Change-Id: I1db6915939727f0909c05c8b103e37984aadb443 Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| 3960bcda | 22-Apr-2024 |
Jagdish Gediya <jagdish.gediya@arm.com> |
style(tc): remove comment for plat_reset_handler
The comment for plat_reset_handler doesn't make sense. It is likely a copy-and-paste error while adding the code, so remove it.
Change-Id: Iab8c8c79
style(tc): remove comment for plat_reset_handler
The comment for plat_reset_handler doesn't make sense. It is likely a copy-and-paste error while adding the code, so remove it.
Change-Id: Iab8c8c799c184fa99966770d47ecb11bbc640515 Signed-off-by: Jagdish Gediya <jagdish.gediya@arm.com>
show more ...
|
| 31d4c3e9 | 23-Jul-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(corstone1000): include platform header file" into integration |
| 783e5abe | 02-Jul-2024 |
Harsimran Singh Tungal <harsimransingh.tungal@arm.com> |
fix(corstone1000): include platform header file
Include platform.h file in order to remove following compiler errors, as some warnings are being treated as errors now. error: implicit declaration of
fix(corstone1000): include platform header file
Include platform.h file in order to remove following compiler errors, as some warnings are being treated as errors now. error: implicit declaration of function 'plat_core_pos_by_mpidr'[-Wimplicit-function-declaration]
Change-Id: Ie223e11e138ec9b0eef7342f450b90b215a49b15 Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
show more ...
|
| c5b8de86 | 22-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(debugv8p9): add support for FEAT_Debugv8p9" into integration |