| 83891729 | 07-Aug-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(xilinx): add headers to resolve compile time issue" into integration |
| 744d60aa | 19-Jul-2023 |
Akshay Belsare <akshay.belsare@amd.com> |
fix(xilinx): add headers to resolve compile time issue
Add common/debug.h and libfdt.h files to the common file for XILINX_OF_BOARD_DTB_ADDR configuration.
Signed-off-by: Akshay Belsare <akshay.bel
fix(xilinx): add headers to resolve compile time issue
Add common/debug.h and libfdt.h files to the common file for XILINX_OF_BOARD_DTB_ADDR configuration.
Signed-off-by: Akshay Belsare <akshay.belsare@amd.com> Change-Id: I577cc018eda34e186e48594a62c54eb55f11bbd3
show more ...
|
| cd0786c7 | 14-Mar-2023 |
Stephan Gerhold <stephan@gerhold.net> |
fix(bl32): always include arm_arch_svc in SP_MIN
The PSCI_FEATURES call implementation in TF-A always indicates support for SMCCC_VERSION, but only BL31 ensures that the corresponding Arm Architectu
fix(bl32): always include arm_arch_svc in SP_MIN
The PSCI_FEATURES call implementation in TF-A always indicates support for SMCCC_VERSION, but only BL31 ensures that the corresponding Arm Architecture Service (arm_arch_svc) is really included in the build. For SP_MIN only stm32mp1 currently includes it in the platform-specific make file.
This means that it is easily possible to build configurations that violate the PSCI/SMCCC specification. On Linux this leads to incorrect detection of the SMC Calling Convention when using SP_MIN:
[ 0.000000] psci: SMC Calling Convention v65535.65535
Fix this by always including the Arm Architecture Service in SP_MIN builds. This allows Linux to detect the convention correctly:
[ 0.000000] psci: SMC Calling Convention v1.4
Change-Id: Iaa3076c162b7a55633ec1e27eb5c44d22f8eb2a1 Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
show more ...
|
| 7e030b37 | 11-Jul-2023 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
fix(errata-abi): added Neoverse N2 to Errata ABI list
added the missing Neoverse N2 flag required for enabling Neoverse N2 CPU in Errata ABI
Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm
fix(errata-abi): added Neoverse N2 to Errata ABI list
added the missing Neoverse N2 flag required for enabling Neoverse N2 CPU in Errata ABI
Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I06c6fa67e2f1ccc053f1b1b9261e189c56f4347a
show more ...
|
| 12900c4a | 03-Aug-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(imx8m): make IMX_BOOT_UART_BASE autodetection option more obvious" into integration |
| e5955d7c | 02-Aug-2023 |
Ronak Jain <ronak.jain@amd.com> |
fix(xilinx): remove clock_setrate and clock_getrate api
As per the current code base, PM_CLOCK_SETRATE and PM_CLOCK_GETRATE APIs are not supported for the runtime operations in the firmware and the
fix(xilinx): remove clock_setrate and clock_getrate api
As per the current code base, PM_CLOCK_SETRATE and PM_CLOCK_GETRATE APIs are not supported for the runtime operations in the firmware and the TF-A it is already returning an error when there is any request to access these APIs. So, just removing the unused code to avoid the confusion around these APIs.
Also, there is no issue with the backward compatibility as these APIs were never used since implemented. Hence no need to bump up the version of the feature check API as well.
Signed-off-by: Ronak Jain <ronak.jain@amd.com> Change-Id: I444f973e62cd25aae2e7f697d808210b265106ad
show more ...
|
| 101f0702 | 02-Aug-2023 |
Marco Felsch <m.felsch@pengutronix.de> |
fix(imx8m): make IMX_BOOT_UART_BASE autodetection option more obvious
Switch from IMX_BOOT_UART_BASE=0 to IMX_BOOT_UART_BASE=auto to make it more obvious that the detection is based on the runtime a
fix(imx8m): make IMX_BOOT_UART_BASE autodetection option more obvious
Switch from IMX_BOOT_UART_BASE=0 to IMX_BOOT_UART_BASE=auto to make it more obvious that the detection is based on the runtime autodetection.
In addition this moves the evaluation of IMX_BOOT_UART_BASE into the makefile which removes the ugly conditional compilation as well.
Signed-off-by: Marco Felsch <m.felsch@pengutronix.de> Change-Id: I92c13607bf81c6267f4b6aee829d74902b7f72d2
show more ...
|
| e8027488 | 21-Jun-2023 |
Omkar Anand Kulkarni <omkar.kulkarni@arm.com> |
feat(rdn2): enable Neoverse N2 CPU error handling support
Defines N2 CPU RAS error for RD-N2 platform variants. Enables N2 CPU error handling on RD-N2 platform variants.
Signed-off-by: Omkar Anand
feat(rdn2): enable Neoverse N2 CPU error handling support
Defines N2 CPU RAS error for RD-N2 platform variants. Enables N2 CPU error handling on RD-N2 platform variants.
Signed-off-by: Omkar Anand Kulkarni <omkar.kulkarni@arm.com> Change-Id: If9378064c41e0d14e6c789c71f8def594f89e220
show more ...
|
| 31d1e4ff | 27-Jun-2023 |
Omkar Anand Kulkarni <omkar.kulkarni@arm.com> |
feat(sgi): firmware first error handling for Neoverse N2 CPU
RD-N2 platform variants have Neoverse N2 CPU that supports RAS extensions. N2 CPU has error node that captures the faults occurring on L1
feat(sgi): firmware first error handling for Neoverse N2 CPU
RD-N2 platform variants have Neoverse N2 CPU that supports RAS extensions. N2 CPU has error node that captures the faults occurring on L1, L2 tag and data RAMs. This node captures the error information in its error records and generates fault handling interrupt on error event.
This patch adds reference implementation to demonstrate firmware-first error handling of 1-bit CE that occur on CPU. On error event the error handler reads the error records and ELx context information and forwards it to secure partition. Secure partition creates a CPER record from this error information. Finally the handler notifies the OS about the RAS error using the SDEI notification mechanism.
Signed-off-by: Omkar Anand Kulkarni <omkar.kulkarni@arm.com> Change-Id: I769550efee10b9a3d89056bca4bfeb2db4708998
show more ...
|
| f1e4a28d | 21-Jul-2023 |
Omkar Anand Kulkarni <omkar.kulkarni@arm.com> |
feat(arm): enable FHI PPI interrupt to report CPU errors
To handle the core corrected errors in the firmware, the FHI PPI interrupt has to be enabled on all the cores. At boot, when the RAS framewor
feat(arm): enable FHI PPI interrupt to report CPU errors
To handle the core corrected errors in the firmware, the FHI PPI interrupt has to be enabled on all the cores. At boot, when the RAS framework is initialized, only primary core is up and hence core FHI PPI interrupt is enabled only on primary core. This patch adds support to configure and enable core FHI interrupt for all the secondary cores as part of their boot sequence.
Signed-off-by: Omkar Anand Kulkarni <omkar.kulkarni@arm.com> Change-Id: I4b25152cb498fe975b9c770babb25aa9e01f9656
show more ...
|
| ba554002 | 14-Jul-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
chore(zynqmp): remove unused configuration from TSP
In ZynqMP, the function zynqmp_config_setup() is common between bl31 and bl32(TSP). This function initializes IPI configuration and prints the chi
chore(zynqmp): remove unused configuration from TSP
In ZynqMP, the function zynqmp_config_setup() is common between bl31 and bl32(TSP). This function initializes IPI configuration and prints the chip idcode and revision on the console, which is already done in bl31 and redundant in bl32(TSP).
Remove the legacy code, reading the chip idcode and revision information through direct register read.
Change-Id: I5da8e75a597ac9c4e1b56346e065d29e2be8787f Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>
show more ...
|
| 81ad3b14 | 14-Jul-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
fix(zynqmp): resolve runtime error in TSP
TSP(bl32) requires secure interrupts to be handled at S-EL1. Enable the ZynqMP to handle secure interrupts in S-EL1 by setting GICV2_G0_FOR_EL3 to 0 in case
fix(zynqmp): resolve runtime error in TSP
TSP(bl32) requires secure interrupts to be handled at S-EL1. Enable the ZynqMP to handle secure interrupts in S-EL1 by setting GICV2_G0_FOR_EL3 to 0 in case of SPD=tspd build option.
For ZYNQMP_WDT_RESTART build option GICV2_G0_FOR_EL3 needs to be enabled and thus for ZynqMP GICV2_G0_FOR_EL3 is set to 1 by default. On GICv2, when GICV2_G0_FOR_EL3 is set to 1, Group 0 interrupts target EL3. This allows GICv2 platforms to enable features requiring EL3 interrupt type.
This also means that all GICv2 Group 0 interrupts are delivered to EL3, and the Secure Payload interrupts needs to be synchronously handed over to Secure EL1 for handling.
Change-Id: I7eb72c6588ab41730a74ece261050840646de037 Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>
show more ...
|
| 6304759a | 19-Jul-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
chore(xilinx): reorder headers in assembly files
In tf-a-ci-scripts repo, change commit 8ffa3d571b(ci(static-checks): correct include order for *.S macro headers) provides a fix related to header fi
chore(xilinx): reorder headers in assembly files
In tf-a-ci-scripts repo, change commit 8ffa3d571b(ci(static-checks): correct include order for *.S macro headers) provides a fix related to header file include order in assembly files. With the above fix, improper header order in assembly files has been detected.
Reorder the header includes in assembly files as per the update in tf-a-ci-scripts.
Signed-off-by: Prasad Kummari <prasad.kummari@amd.com> Change-Id: I4a4f3c5bb73886dae234160b893470443f1424fc
show more ...
|
| 421893a0 | 19-Jul-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
chore(xilinx): correct kernel doc warnings for missing functions
In commit b9d26cd3c4 ("chore(xilinx): replace fsbl with xbl"), function and variable names were changed, but the corresponding functi
chore(xilinx): correct kernel doc warnings for missing functions
In commit b9d26cd3c4 ("chore(xilinx): replace fsbl with xbl"), function and variable names were changed, but the corresponding function name in the functional documentation comments is not updated. Update the function and variable names as per the above commit.
Signed-off-by: Prasad Kummari <prasad.kummari@amd.com> Change-Id: I7b777c21fe3673d29f809bf923eba38749f2c024
show more ...
|
| 0cf5f08a | 14-May-2023 |
Andrey Skvortsov <andrej.skvortzov@gmail.com> |
feat(allwinner): use reset through scpi for warm/soft reset
On systems with SCP (running crust) scpi_system_reboot action performs board-level (PMIC) reboot. This doesn't preserve RAM content on A64
feat(allwinner): use reset through scpi for warm/soft reset
On systems with SCP (running crust) scpi_system_reboot action performs board-level (PMIC) reboot. This doesn't preserve RAM content on A64 PinePhone at least.
warm/soft system reset without RAM reset is required to get pstore (persistent storage) in RAM working with Linux kernel. That is very useful for oops/panic logging for post mortem analysis.
scpi_system_reset action performs reset via SoC reset (using watchdog) and RAM content is preserved in this case. Linux kernel detects system_reset2 support and uses it for warm reset automatically.
Change-Id: I1c21aa8f27c8e0395e2326034788693b59b80bc4 Signed-off-by: Andrey Skvortsov <andrej.skvortzov@gmail.com>
show more ...
|
| b74a1938 | 31-Jul-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "feat(nuvoton): added support for npcm845x chip" into integration |
| f0f11acd | 19-Jul-2023 |
Jens Wiklander <jens.wiklander@linaro.org> |
feat(qemu): add dummy plat_mboot_measure_key() function
Adds a dummy implementation of the plat_mboot_measure_key() function for QEMU platform.
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.
feat(qemu): add dummy plat_mboot_measure_key() function
Adds a dummy implementation of the plat_mboot_measure_key() function for QEMU platform.
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Change-Id: I64c1c751348c04cd359c075fc15a0d180ff55918
show more ...
|
| b9bceef8 | 12-Jul-2023 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(imx): add dummy 'plat_mboot_measure_key' function
Added dummy implementation of 'plat_mboot_measure_key' function for IMX platform.
Change-Id: Ib41fd86a9da330f62561707bda7d16f2825c0a7f Signed-
feat(imx): add dummy 'plat_mboot_measure_key' function
Added dummy implementation of 'plat_mboot_measure_key' function for IMX platform.
Change-Id: Ib41fd86a9da330f62561707bda7d16f2825c0a7f Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| eee9fb02 | 12-Jul-2023 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(tc): implement platform function to measure and publish Public Key
Implemented 'plat_mboot_measure_key' platform function for TC platform to measure and publicise the public key information via
feat(tc): implement platform function to measure and publish Public Key
Implemented 'plat_mboot_measure_key' platform function for TC platform to measure and publicise the public key information via RSS.
Change-Id: I10d90e921b135e729d5450d5a7468d0598072e60 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| db55d23d | 11-Apr-2023 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(fvp): implement platform function to measure and publish Public Key
Implemented 'plat_mboot_measure_key' platform function for FVP platform to measure and publish the public key information via
feat(fvp): implement platform function to measure and publish Public Key
Implemented 'plat_mboot_measure_key' platform function for FVP platform to measure and publish the public key information via RSS.
Change-Id: I0c9d6d6ac3650a939437e9331ed3c9246f242830 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| bfbb1cba | 11-Apr-2023 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(fvp): add public key-OID information in RSS metadata structure
Added public key-OID information in the RSS metadata structure.
Change-Id: I5ee5d41519980091296deaa1882fdfe9ae6766c0 Signed-off-b
feat(fvp): add public key-OID information in RSS metadata structure
Added public key-OID information in the RSS metadata structure.
Change-Id: I5ee5d41519980091296deaa1882fdfe9ae6766c0 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 60784c3e | 09-May-2023 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
chore(fvp): add Aarch32 Cortex-A53 to the build
Change-Id: I493893d38d2db80e2c4d2efcf832c712a9abe5a8 Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
| 5d175106 | 23-Jun-2023 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
chore(brcm): include cpu_helpers.S for bl2 build
With errata conversion in place for Cortex_A72 cpu, build fails with undefined reference to functions defined in cpu_helpers.S file. Including the sa
chore(brcm): include cpu_helpers.S for bl2 build
With errata conversion in place for Cortex_A72 cpu, build fails with undefined reference to functions defined in cpu_helpers.S file. Including the same to handle build issues related to Stingray platform.
Change-Id: I2bab3e5ca0811d83cd9ee43ac33d557afe6575a8 Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| edcece15 | 19-Mar-2023 |
rutigl@gmail.com <rutigl@gmail.com> |
feat(nuvoton): added support for npcm845x chip
Initial version
Signed-off-by: Margarita Glushkin <rutigl@gmail.com> Change-Id: If433d325a90b519ae5f02411865bffd368ff2824 |
| df730d94 | 24-Jul-2023 |
Marco Felsch <m.felsch@pengutronix.de> |
feat(imx8m): detect console base address during runtime
Provide a helper to detect the enabled UART device during runtime. This lower the integration effort and make it more straight forward for 'si
feat(imx8m): detect console base address during runtime
Provide a helper to detect the enabled UART device during runtime. This lower the integration effort and make it more straight forward for 'simple' use-cases with a single UART enabled. If multiple UARTs are enabled the first enabled is returned.
The auto-detection is enabled by setting IMX_BOOT_UART_BASE=0 to keep the backward compatibility. For more advanced use-cases (multiple UARTs are enabled) the user still has to provide the correct base address.
Signed-off-by: Marco Felsch <m.felsch@pengutronix.de> Change-Id: I300a167e1a10f9aa991c8d1c3efe2c6b23f56c47
show more ...
|