| 4b031ab4 | 05-Feb-2020 |
Yann Gautier <yann.gautier@st.com> |
feat(stm32mp1): update BACKUP_BOOT_MODE for STM32MP13
The backup register used on STM32MP15 to save the boot interface for the next boot stage was 20. It is now saved in backup register 30 on STM32M
feat(stm32mp1): update BACKUP_BOOT_MODE for STM32MP13
The backup register used on STM32MP15 to save the boot interface for the next boot stage was 20. It is now saved in backup register 30 on STM32MP13.
Change-Id: Ibd051ff2eca7202184fa428ed57ecd4ae7388bd8 Signed-off-by: Yann Gautier <yann.gautier@st.com>
show more ...
|
| 7b48a9f3 | 06-Feb-2020 |
Yann Gautier <yann.gautier@st.com> |
feat(stm32mp1): stm32mp_is_single_core() for STM32MP13
STM32MP13 is a single Cortex-A7 CPU, always return true in stm32mp_is_single_core() function.
Change-Id: Icf36eaa887bdf314137eda07c5751cea8c95
feat(stm32mp1): stm32mp_is_single_core() for STM32MP13
STM32MP13 is a single Cortex-A7 CPU, always return true in stm32mp_is_single_core() function.
Change-Id: Icf36eaa887bdf314137eda07c5751cea8c950143 Signed-off-by: Yann Gautier <yann.gautier@st.com>
show more ...
|
| 111a384c | 12-Feb-2020 |
Yann Gautier <yann.gautier@st.com> |
feat(stm32mp1): remove unsupported features on STM32MP13
* GPIO: On STM32MP13, there are no banks GPIOJ, GPIOK and GPIOZ. * STM32MP13 is a single Cortex-A7 CPU: remove reset from MPU1 and reset fr
feat(stm32mp1): remove unsupported features on STM32MP13
* GPIO: On STM32MP13, there are no banks GPIOJ, GPIOK and GPIOZ. * STM32MP13 is a single Cortex-A7 CPU: remove reset from MPU1 and reset from MCU traces * There is no MCU on STM32MP13. Put MCU security management under STM32MP15 flag. * The authentication feature is not supported yet on STM32MP13, put the code under SPM32MP15 flag. * On STM32MP13, the monotonic counter is managed in ROM code, keep the monotonic counter update just for STM32MP15. * SYSCFG: put registers not present on STM32MP13 under STM32MP15 flag, as the code that manages them. * PMIC: use ldo3 during DDR configuration only for STM32MP15 * Reset UART pins on USB boot is no more required.
Change-Id: Iceba59484a9bb02828fe7e99f3ecafe69c837bc7 Signed-off-by: Yann Gautier <yann.gautier@st.com> Signed-off-by: Gabriel Fernandez <gabriel.fernandez@st.com>
show more ...
|
| 48ede661 | 03-Feb-2020 |
Yann Gautier <yann.gautier@st.com> |
feat(stm32mp1): update memory mapping for STM32MP13
SYSRAM is only 128KB and starts at 0x2FFE0000. SRAMs are added. BL2 code and DTB sizes are also reduced to fit in 128KB.
Change-Id: I25da99ef5c08
feat(stm32mp1): update memory mapping for STM32MP13
SYSRAM is only 128KB and starts at 0x2FFE0000. SRAMs are added. BL2 code and DTB sizes are also reduced to fit in 128KB.
Change-Id: I25da99ef5c08f8008ff00d38248d61b6045adad4 Signed-off-by: Yann Gautier <yann.gautier@st.com>
show more ...
|
| bdec516e | 18-Dec-2020 |
Sebastien Pasdeloup <sebastien.pasdeloup-ext@st.com> |
feat(stm32mp1): introduce new flag for STM32MP13
STM32MP13 is a variant of STM32MP1, with a single Cortex-A7, and no Cortex-M4. There is only one DDR port. SP_min is not supported, only OP-TEE can b
feat(stm32mp1): introduce new flag for STM32MP13
STM32MP13 is a variant of STM32MP1, with a single Cortex-A7, and no Cortex-M4. There is only one DDR port. SP_min is not supported, only OP-TEE can be used as monitor. STM32MP13 uses the header v2.0 format for stm32image generation for BL2.
Change-Id: Ie5b0e3230c5e064fe96f3561fc5b3208914dea53 Signed-off-by: Yann Gautier <yann.gautier@st.com>
show more ...
|
| 2d8886ac | 18-Nov-2019 |
Nicolas Le Bayon <nicolas.le.bayon@st.com> |
feat(st): update stm32image tool for header v2
The stm32image tool is updated to manage new header v2.0 for BL2 images. Add new structure for the header v2.0 management. Adapt to keep compatibility
feat(st): update stm32image tool for header v2
The stm32image tool is updated to manage new header v2.0 for BL2 images. Add new structure for the header v2.0 management. Adapt to keep compatibility with v1.0. Add the header version major and minor in the command line when executing the tool, as well as binary type (0x10 for BL2).
Change-Id: I70c187e8e7e95b57ab7cfad63df314307a78f1d6 Signed-off-by: Yann Gautier <yann.gautier@st.com> Signed-off-by: Lionel Debieve <lionel.debieve@st.com>
show more ...
|
| 815abebc | 18-Mar-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "spectre_bhb" into integration
* changes: fix(security): apply SMCCC_ARCH_WORKAROUND_3 to A73/A75/A72/A57 fix(security): workaround for CVE-2022-23960 for Cortex-A57, Co
Merge changes from topic "spectre_bhb" into integration
* changes: fix(security): apply SMCCC_ARCH_WORKAROUND_3 to A73/A75/A72/A57 fix(security): workaround for CVE-2022-23960 for Cortex-A57, Cortex-A72 fix(fvp): disable reclaiming init code by default
show more ...
|
| 9b2510b6 | 24-Feb-2022 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(security): apply SMCCC_ARCH_WORKAROUND_3 to A73/A75/A72/A57
This patch applies CVE-2022-23960 workarounds for Cortex-A75, Cortex-A73, Cortex-A72 & Cortex-A57. This patch also implements the new
fix(security): apply SMCCC_ARCH_WORKAROUND_3 to A73/A75/A72/A57
This patch applies CVE-2022-23960 workarounds for Cortex-A75, Cortex-A73, Cortex-A72 & Cortex-A57. This patch also implements the new SMCCC_ARCH_WORKAROUND_3 and enables necessary discovery hooks for Coxtex-A72, Cortex-A57, Cortex-A73 and Cortex-A75 to enable discovery of this SMC via SMC_FEATURES. SMCCC_ARCH_WORKAROUND_3 is implemented for A57/A72 because some revisions are affected by both CVE-2022-23960 and CVE-2017-5715 and this allows callers to replace SMCCC_ARCH_WORKAROUND_1 calls with SMCCC_ARCH_WORKAROUND_3. For details of SMCCC_ARCH_WORKAROUND_3, please refer SMCCCv1.4 specification.
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Signed-off-by: John Powell <john.powell@arm.com> Change-Id: Ifa6d9c7baa6764924638efe3c70468f98d60ed7c
show more ...
|
| 72feaad9 | 23-Feb-2022 |
Wasim Khan <wasim.khan@nxp.com> |
fix(layerscape): update WA for Errata A-050426
Update WA for Errata A-050426 as Commands for PEX (PEX1..PEX6) , lnx1_e1000#0, lnx1_xfi and lnx2_xfi has been moved to PBI phase.
This patch requires
fix(layerscape): update WA for Errata A-050426
Update WA for Errata A-050426 as Commands for PEX (PEX1..PEX6) , lnx1_e1000#0, lnx1_xfi and lnx2_xfi has been moved to PBI phase.
This patch requires RCW to include PBI commands to write commands in BIST mode for PEX, lnx1_e1000, lnx1_xfi and lnx2_xfi IP blocks.
Signed-off-by: Wasim Khan <wasim.khan@nxp.com> Change-Id: I27c2b055c82c0b58df83449f9082bfbfdeb65115
show more ...
|
| fdb9166b | 16-Mar-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
fix(fvp): disable reclaiming init code by default
In anticipation of Spectre BHB workaround mitigation patches, we disable the RECLAIM_INIT_CODE for FVP platform. Since the spectre BHB mitigation wo
fix(fvp): disable reclaiming init code by default
In anticipation of Spectre BHB workaround mitigation patches, we disable the RECLAIM_INIT_CODE for FVP platform. Since the spectre BHB mitigation workarounds inevitably increase the size of the various segments due to additional instructions and/or macros, these segments cannot be fit in the existing memory layout designated for BL31 image. The issue is specifically seen in complex build configs for FVP platform. One such config has TBB with Dual CoT and test secure payload dispatcher(TSPD) enabled. Even a small increase in individual segment size in order of few bytes might lead to build fails due to alignment requirements(PAGE_ALIGN to 4KB).
This is needed to workaround the following build failures observed across multiple build configs:
aarch64-none-elf-ld.bfd: BL31 init has exceeded progbits limit.
aarch64-none-elf-ld.bfd: /work/workspace/workspace/tf-worker_ws_2/trusted_firmware/build/fvp/debug/bl31/bl31.elf section coherent_ram will not fit in region RAM aarch64-none-elf-ld.bfd: BL31 image has exceeded its limit. aarch64-none-elf-ld.bfd: region RAM overflowed by 4096 bytes
Change-Id: Idfab539e9a40f4346ee11eea1e618c97e93e19a1 Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| 38dd6b61 | 16-Mar-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(xilinx): fix coding style violations" into integration |
| 26850d71 | 16-Mar-2022 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
refactor(st): update set_config_info function call
Pass NS-load address as ~0UL to the 'set_config_info' function while updating FW_CONFIG device tree information since it is always loaded into secu
refactor(st): update set_config_info function call
Pass NS-load address as ~0UL to the 'set_config_info' function while updating FW_CONFIG device tree information since it is always loaded into secure memory.
Change-Id: Ieeaf9c97085128d7b7339d34495bdd58cd9fcf8a Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| ddbf43b4 | 22-Apr-2022 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
refactor(fvp_r): update set_config_info function call
Pass NS-load address as ~0UL to the 'set_config_info' function while updating FW_CONFIG device tree information since it is always loaded into s
refactor(fvp_r): update set_config_info function call
Pass NS-load address as ~0UL to the 'set_config_info' function while updating FW_CONFIG device tree information since it is always loaded into secure memory.
Change-Id: I64e8531e0ad5cda63f14d838efb9da9cf20beea8 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 046cb19b | 21-Apr-2022 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
refactor(arm): update set_config_info function call
Pass NS-load address as ~0UL to the 'set_config_info' function while updating FW_CONFIG device tree information since it is always loaded into sec
refactor(arm): update set_config_info function call
Pass NS-load address as ~0UL to the 'set_config_info' function while updating FW_CONFIG device tree information since it is always loaded into secure memory.
Change-Id: Ia33adfa9e7b0392f62056053a2df7db321a74e22 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| e58eb9d1 | 16-Mar-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(mt8186): add DFD control in SiP service" into integration |
| 02c6f366 | 16-Mar-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(a3k): change fatal error to warning when CM3 reset is not implemented" into integration |
| 30cdbe70 | 12-Mar-2022 |
Pali Rohár <pali@kernel.org> |
fix(a3k): change fatal error to warning when CM3 reset is not implemented
This allows TF-A's a3700_system_reset() function to try Warm reset method when CM3 reset method is not implemented by WTMI f
fix(a3k): change fatal error to warning when CM3 reset is not implemented
This allows TF-A's a3700_system_reset() function to try Warm reset method when CM3 reset method is not implemented by WTMI firmware.
Signed-off-by: Pali Rohár <pali@kernel.org> Change-Id: I7303197373e1a8ca5a44ba0b1e90b48855d6c0c3
show more ...
|
| fdbbd59e | 15-Mar-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "revert-14286-uart_segregation-VURJFOWMTM" into integration
* changes: Revert "feat(sgi): deviate from arm css common uart related defi..." Revert "feat(sgi): route TF-A
Merge changes from topic "revert-14286-uart_segregation-VURJFOWMTM" into integration
* changes: Revert "feat(sgi): deviate from arm css common uart related defi..." Revert "feat(sgi): route TF-A logs via secure uart" Revert "feat(sgi): add page table translation entry for secure uart"
show more ...
|
| 64e04687 | 11-Mar-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Revert "feat(sgi): deviate from arm css common uart related defi..."
Revert submission 14286-uart_segregation
Reason for revert: Need to wait for companion patches in CI and UEFI/Linux to be upstre
Revert "feat(sgi): deviate from arm css common uart related defi..."
Revert submission 14286-uart_segregation
Reason for revert: Need to wait for companion patches in CI and UEFI/Linux to be upstreamed.
Reverted Changes: I8574b31d5:feat(sgi): add page table translation entry for se... I8896ae05e:feat(sgi): route TF-A logs via secure uart I39170848e:feat(sgi): deviate from arm css common uart relate...
Change-Id: I28a370dd8b3a37087da621460eccc1acd7a30287
show more ...
|
| 162f7923 | 11-Mar-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Revert "feat(sgi): route TF-A logs via secure uart"
Revert submission 14286-uart_segregation
Reason for revert: Need to wait for companion patches in CI and UEFI/Linux to be upstreamed.
Reverted C
Revert "feat(sgi): route TF-A logs via secure uart"
Revert submission 14286-uart_segregation
Reason for revert: Need to wait for companion patches in CI and UEFI/Linux to be upstreamed.
Reverted Changes: I8574b31d5:feat(sgi): add page table translation entry for se... I8896ae05e:feat(sgi): route TF-A logs via secure uart I39170848e:feat(sgi): deviate from arm css common uart relate...
Change-Id: I7c488aed9fcb70c55686d705431b3fe017b8927d
show more ...
|
| 6127767a | 11-Mar-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Revert "feat(sgi): add page table translation entry for secure uart"
Revert submission 14286-uart_segregation
Reason for revert: Need to wait for companion patches in CI and UEFI/Linux to be upstre
Revert "feat(sgi): add page table translation entry for secure uart"
Revert submission 14286-uart_segregation
Reason for revert: Need to wait for companion patches in CI and UEFI/Linux to be upstreamed.
Reverted Changes: I8574b31d5:feat(sgi): add page table translation entry for se... I8896ae05e:feat(sgi): route TF-A logs via secure uart I39170848e:feat(sgi): deviate from arm css common uart relate...
Change-Id: I9bec02496f826e184c6efa643f869b2eb3b52539
show more ...
|
| c5f9d99a | 11-Mar-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(st): don't try to read boot partition on SD cards" into integration |
| e46e9df0 | 02-Dec-2021 |
Rex-BC Chen <rex-bc.chen@mediatek.corp-partner.google.com> |
feat(mt8186): add DFD control in SiP service
DFD (Design for Debug) is a debugging tool, which scans flip-flops and dumps to internal RAM on the WDT reset. After system reboots, those values could b
feat(mt8186): add DFD control in SiP service
DFD (Design for Debug) is a debugging tool, which scans flip-flops and dumps to internal RAM on the WDT reset. After system reboots, those values could be showed for debugging.
BUG=b:222217317 TEST=build pass
Signed-off-by: Rex-BC Chen <rex-bc.chen@mediatek.com> Change-Id: I659ea1e0789cf135a71a13b752edaa35123e0941
show more ...
|
| 9492b391 | 10-Mar-2022 |
Uwe Kleine-König <u.kleine-koenig@pengutronix.de> |
fix(st): don't try to read boot partition on SD cards
When trying to boot from an SD card with STM32MP_EMMC_BOOT enabled, booting fails with:
ERROR: Got unexpected value for active boot partitio
fix(st): don't try to read boot partition on SD cards
When trying to boot from an SD card with STM32MP_EMMC_BOOT enabled, booting fails with:
ERROR: Got unexpected value for active boot partition, 0 ASSERT: plat/st/common/bl2_stm32_io_storage.c:285
because SD cards don't provide a boot partition. So only try reading from such a partition when booting from eMMC.
Fixes: 214c8a8d08b2 ("feat(plat/st): add STM32MP_EMMC_BOOT option") Signed-off-by: Uwe Kleine-König <u.kleine-koenig@pengutronix.de> Change-Id: I354b737a3ae3ea577e83dfeb7096df22275d852d
show more ...
|
| 7d00e72a | 11-Mar-2022 |
Joanna Farley <joanna.farley@arm.com> |
Merge "fix(brcm): allow build to specify mbedTLS absolute path" into integration |