| 1684c8d6 | 06-Nov-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge changes from topic "enable_assertion" into integration
* changes: feat(zynqmp): enable assertion feat(versal-net): enable assertion feat(versal): enable assertion |
| 9ac3bcdd | 06-Nov-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(ti): release lock in all TI-SCI xfer return paths" into integration |
| bfb8d8eb | 06-Nov-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge "feat(xilinx): switch boot console to runtime" into integration |
| d5fe7088 | 06-Nov-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge "feat(zynqmp): remove pm_ioctl_set_sgmii_mode api" into integration |
| e92375e0 | 31-Oct-2023 |
Andrew Davis <afd@ti.com> |
fix(ti): release lock in all TI-SCI xfer return paths
Failing to send a message is often not fatal and we will end up trying to send again. This would fail as some exit paths do not release the secu
fix(ti): release lock in all TI-SCI xfer return paths
Failing to send a message is often not fatal and we will end up trying to send again. This would fail as some exit paths do not release the secure proxy xfer lock. Release this lock on all return paths.
Signed-off-by: Andrew Davis <afd@ti.com> Change-Id: I3939015774f819572dbd26720b2c105fba7574cb
show more ...
|
| cfbac595 | 19-Oct-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
fix(intel): bl31 overwrite OCRAM configuration
U-boot is allowed to configure OCRAM access. However ATF BL31 will overwrite it. Thus removing this function to allow for proper configuration.
Change
fix(intel): bl31 overwrite OCRAM configuration
U-boot is allowed to configure OCRAM access. However ATF BL31 will overwrite it. Thus removing this function to allow for proper configuration.
Change-Id: I45173ef8f472c3620486de0cbf6452ba5f78be01 Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
show more ...
|
| 82752c41 | 15-Oct-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
fix(intel): update individual return result for hps and fpga bridges
The code is designed to execute SOC2FPGA and LWSOC2FPGA first then to F2SOC and both sharing the same result "return". Thus when
fix(intel): update individual return result for hps and fpga bridges
The code is designed to execute SOC2FPGA and LWSOC2FPGA first then to F2SOC and both sharing the same result "return". Thus when F2SOC is executed, the "return" result will overwrite SOC2FPGA "return" result even though it is not enabled. Using 2 different "return" result to for each bridges and return both of them at the end of the function to avoid being overwritten.
Change-Id: Id9de3f416fe3020db35bc946135b175be2a7dc1e Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
show more ...
|
| 2d46b2e4 | 27-Sep-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
feat(intel): increase bl2 size limit
There are several features included in BL2 causing the size getting bigger for RELEASE mode. When build with DEBUG mode, the size will be bigger thus causing BL2
feat(intel): increase bl2 size limit
There are several features included in BL2 causing the size getting bigger for RELEASE mode. When build with DEBUG mode, the size will be bigger thus causing BL2 image has exceeded its limits.
Change-Id: I7542f5ea001542450695d48e8126bcca8728d76a Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
show more ...
|
| 8fbd3073 | 15-Sep-2023 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
fix(intel): update stream id to non-secure for SDM
Update stream id to non-secure for SDM which is to bring up FPGA config via SMMU.
Change-Id: Ib8836fa0cf31fe0cfc0261123e051772923bb66b Signed-off-
fix(intel): update stream id to non-secure for SDM
Update stream id to non-secure for SDM which is to bring up FPGA config via SMMU.
Change-Id: Ib8836fa0cf31fe0cfc0261123e051772923bb66b Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com>
show more ...
|
| 460692af | 04-Sep-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
fix(intel): revert sys counter to 400MHz
For Simics and official release, revert back to 400MHz instead of 80MHz. Sys counter shall get from a static clock.
Change-Id: I9ee3586bc411af8d7381c8bd6404
fix(intel): revert sys counter to 400MHz
For Simics and official release, revert back to 400MHz instead of 80MHz. Sys counter shall get from a static clock.
Change-Id: I9ee3586bc411af8d7381c8bd6404b8449b0c3f69 Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
show more ...
|
| 9bb15ab5 | 03-Nov-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "morello/firmware-revision" into integration
* changes: feat(morello): add TF-A version string to NT_FW_CONFIG feat(morello): set NT_FW_CONFIG properties for MCC, PCC an
Merge changes from topic "morello/firmware-revision" into integration
* changes: feat(morello): add TF-A version string to NT_FW_CONFIG feat(morello): set NT_FW_CONFIG properties for MCC, PCC and SCP version
show more ...
|
| dd532b9e | 03-Nov-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge changes from topic "xlnx_tsp_feat" into integration
* changes: docs(versal-net): add TSP build documentation docs(versal): add TSP build documentation feat(versal-net): add tsp support
Merge changes from topic "xlnx_tsp_feat" into integration
* changes: docs(versal-net): add TSP build documentation docs(versal): add TSP build documentation feat(versal-net): add tsp support feat(versal): add tsp support refactor(xilinx): add generic TSP makefile chore(zynqmp): reorganize tsp code into common path refactor(xilinx): rename platform function to generic name
show more ...
|
| 2973054d | 15-Oct-2023 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
fix(intel): update HPS bridges for Agilex5 SoC FPGA
This patch is used to update reset manager support for Agilex5 Soc FPGA. 1. Update HPS bridges support for socfpga_bridges_disable a. SOC2FPGA
fix(intel): update HPS bridges for Agilex5 SoC FPGA
This patch is used to update reset manager support for Agilex5 Soc FPGA. 1. Update HPS bridges support for socfpga_bridges_disable a. SOC2FPGA b. LWSOC2FPGA c. F2SDRAM d. F2SOC
Change-Id: Ia539ff289e83303ae3b4d78b9ac1d50c9f9558da Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com>
show more ...
|
| 68820f64 | 01-Aug-2023 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
fix(intel): temporarily workaround for Zephyr SMP
Temporarily workaround for Zephyr SMP testing.
Change-Id: I9d2d209e9f384d079f0311b3a8b0b760e0566877 Signed-off-by: Sieu Mun Tang <sieu.mun.tang@int
fix(intel): temporarily workaround for Zephyr SMP
Temporarily workaround for Zephyr SMP testing.
Change-Id: I9d2d209e9f384d079f0311b3a8b0b760e0566877 Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com>
show more ...
|
| 655af4f4 | 09-Jun-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
fix(intel): update boot scratch cold register to use cold 8
Boot scratch cold 8 register is fully used by n5x. Update to use boot scratch cold 8 bit 19 register for cpu0 ON/OFF indicator.
Change-Id
fix(intel): update boot scratch cold register to use cold 8
Boot scratch cold 8 register is fully used by n5x. Update to use boot scratch cold 8 bit 19 register for cpu0 ON/OFF indicator.
Change-Id: I45ebfdcc17c47bcce69f5f611e677ac7838ecf52 Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
show more ...
|
| 47ca43bc | 09-Jun-2023 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
feat(intel): restructure watchdog
This patch is to restructure watchdog. Move platform dependent MACROs to individual platform socfpga_plat_def. Common watchdog code file and header file will remain
feat(intel): restructure watchdog
This patch is to restructure watchdog. Move platform dependent MACROs to individual platform socfpga_plat_def. Common watchdog code file and header file will remain for those common declaration.
Change-Id: Ibb640f08ac313bbad6d9295596cb8ff26e3e626d Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com>
show more ...
|
| f4e64d1f | 17-Aug-2023 |
Werner Lewis <werner.lewis@arm.com> |
feat(morello): add TF-A version string to NT_FW_CONFIG
TF-A version string is passed into NT_FW_CONFIG to allow access in UEFI.
Signed-off-by: Werner Lewis <werner.lewis@arm.com> Change-Id: I9da7b9
feat(morello): add TF-A version string to NT_FW_CONFIG
TF-A version string is passed into NT_FW_CONFIG to allow access in UEFI.
Signed-off-by: Werner Lewis <werner.lewis@arm.com> Change-Id: I9da7b93d30c9d9230ea9a2cd2730cde897ffc580
show more ...
|
| 10fd85d8 | 17-Aug-2023 |
Werner Lewis <werner.lewis@arm.com> |
feat(morello): set NT_FW_CONFIG properties for MCC, PCC and SCP version
SDS firmware version structure is added with MCC, PCC and SCP firmware version members. These are set in NT_FW_CONFIG to provi
feat(morello): set NT_FW_CONFIG properties for MCC, PCC and SCP version
SDS firmware version structure is added with MCC, PCC and SCP firmware version members. These are set in NT_FW_CONFIG to provide access to firmware version information in UEFI.
Signed-off-by: Werner Lewis <werner.lewis@arm.com> Change-Id: Ib0c476e54ef428fb7904f0de5c6f4df6a5fbd7db
show more ...
|
| 7414aaa1 | 03-Nov-2023 |
Ronak Jain <ronak.jain@amd.com> |
feat(zynqmp): remove pm_ioctl_set_sgmii_mode api
There are no existing users of pm_ioctl_set_sgmii_mode() API so cleanup the dead code.
Change-Id: I1088d2f5c944bf54fc5fdd554360bdd321ad798a Signed-o
feat(zynqmp): remove pm_ioctl_set_sgmii_mode api
There are no existing users of pm_ioctl_set_sgmii_mode() API so cleanup the dead code.
Change-Id: I1088d2f5c944bf54fc5fdd554360bdd321ad798a Signed-off-by: Ronak Jain <ronak.jain@amd.com>
show more ...
|
| 6f802c44 | 02-Nov-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "mp/exceptions" into integration
* changes: docs(ras): update RAS documentation docs(el3-runtime): update BL31 exception vector handling fix(el3-runtime): restrict low
Merge changes from topic "mp/exceptions" into integration
* changes: docs(ras): update RAS documentation docs(el3-runtime): update BL31 exception vector handling fix(el3-runtime): restrict lower el EA handlers in FFH mode fix(ras): remove RAS_FFH_SUPPORT and introduce FFH_SUPPORT fix(ras): restrict ENABLE_FEAT_RAS to have only two states feat(ras): use FEAT_IESB for error synchronization feat(el3-runtime): modify vector entry paths
show more ...
|
| 639b3676 | 27-Oct-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
feat(versal-net): add tsp support
Introduces support for the Test Secure Payload (TSP) for AMD-Xilinx Versal NET platform. TSP is a component for testing and validating secure OS and trusted execut
feat(versal-net): add tsp support
Introduces support for the Test Secure Payload (TSP) for AMD-Xilinx Versal NET platform. TSP is a component for testing and validating secure OS and trusted execution environments.
If a BL32 image is present, then there must be a matching Secure-EL1 Payload Dispatcher (SPD) service called TSPD, this service is responsible for Initializing the TSP. During initialization that service must register a function to carry out initialization of BL32 once the runtime services are fully initialized. BL31 invokes such a registered function to initialize BL32 before running BL33.
The GICv3 driver is initialized in EL3 and does not need to be initialized again in SEL1 GICv3 driver is initialized in EL3 This is because the S-EL1 can use GIC system registers to manage interrupts and does not need GIC interface base addresses to be configured.
The secure code load address is initially being pointed to 0x0 in the handoff parameters, which is different from the default or user-provided load address of 0x60000000. In this case, set up the PC to the requested BL32_BASE address to ensure that the secure code is loaded and executed from the correct location.
Change-Id: I58fe256dc9d6be5cee384c5ebb9baca2737c02a6 Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>
show more ...
|
| 7ff4d4fb | 31-Oct-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
feat(versal): add tsp support
Introduces support for the Test Secure Payload (TSP) for AMD-Xilinx Versal platform. TSP is a component for testing and validating secure OS and trusted execution envi
feat(versal): add tsp support
Introduces support for the Test Secure Payload (TSP) for AMD-Xilinx Versal platform. TSP is a component for testing and validating secure OS and trusted execution environments.
If a BL32 image is present, then there must be a matching Secure- EL1 Payload Dispatcher (SPD) service called TSPD, this service is responsible for Initializing the TSP. During initialization that service must register a function to carry out initialization of BL32 once the runtime services are fully initialized. BL31 invokes such a registered function to initialize BL32 before running BL33.
The GICv3 driver is initialized in EL3 and does not need to be initialized again in SEL1 GICv3 driver is initialized in EL3 This is because the S-EL1 can use GIC system registers to manage interrupts and does not need GIC interface base addresses to be configured.
The secure code load address is initially being pointed to 0x0 in the handoff parameters, which is different from the default or user-provided load address of 0x60000000. In this case, set up the PC to the requested BL32_BASE address to ensure that the secure code is loaded and executed from the correct location.
Change-Id: Ida0fc6467a10bfde8927ff9b3755a83f3e16f068 Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>
show more ...
|
| 0561070e | 01-Nov-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
refactor(xilinx): add generic TSP makefile
Updated the generic TSP makefile in the common path for reuse in different platforms.
Change-Id: Idd14675bc547e0a4a95132653a181e7ff39a547a Signed-off-by:
refactor(xilinx): add generic TSP makefile
Updated the generic TSP makefile in the common path for reuse in different platforms.
Change-Id: Idd14675bc547e0a4a95132653a181e7ff39a547a Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>
show more ...
|
| 857c7643 | 01-Nov-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "fw-caps" into integration
* changes: feat(ti): query firmware for suspend capability feat(ti): add TI-SCI query firmware capabilities command support feat(ti): remove
Merge changes from topic "fw-caps" into integration
* changes: feat(ti): query firmware for suspend capability feat(ti): add TI-SCI query firmware capabilities command support feat(ti): remove extra core counts in cluster 2 and 3
show more ...
|
| 6bd79b13 | 27-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
fix(tegra): return correct error code for plat_core_pos_by_mpidr
The error code for plat_core_pos_by_mpidr() for an invalid mpidr should be -1 as mandated by portig guide, but for tegra t186 return
fix(tegra): return correct error code for plat_core_pos_by_mpidr
The error code for plat_core_pos_by_mpidr() for an invalid mpidr should be -1 as mandated by portig guide, but for tegra t186 return value is PSCI_E_NOT_PRESENT (-7) even though the comment at top of function says that it should return -1.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I2b69bc1a56f7966f21b2a3c89c515ebde41e3eb8
show more ...
|