| f7a380e2 | 28-Mar-2025 |
Luc Michel <luc.michel@amd.com> |
fix(versal2): align QEMU APU GT frequency with silicon
The APU generic timer frequency in QEMU is now aligned on silicon to the value of 100MHz.
Signed-off-by: Luc Michel <luc.michel@amd.com> Chang
fix(versal2): align QEMU APU GT frequency with silicon
The APU generic timer frequency in QEMU is now aligned on silicon to the value of 100MHz.
Signed-off-by: Luc Michel <luc.michel@amd.com> Change-Id: I4ef0a040c14fdb2fbb3f2d9d4e6ca6ee8ac8e229
show more ...
|
| 55ae162f | 28-Mar-2025 |
Luc Michel <luc.michel@amd.com> |
fix(zynqmp): fix syscnt frequency for QEMU
QEMU uses a 62.5MHz clock frequency for the ARM generic timers.
Signed-off-by: Luc Michel <luc.michel@amd.com> Change-Id: Ib846e17feb3cd44878a62add320fa47
fix(zynqmp): fix syscnt frequency for QEMU
QEMU uses a 62.5MHz clock frequency for the ARM generic timers.
Signed-off-by: Luc Michel <luc.michel@amd.com> Change-Id: Ib846e17feb3cd44878a62add320fa4795fd5c69e
show more ...
|
| c3ab09d1 | 05-Mar-2025 |
Saivardhan Thatikonda <saivardhan.thatikonda@amd.com> |
feat(versal2): is OCM configured as coherent
Warn users about disabled OCM coherency which is not enabled by default in designs. If it is not enabled and TF-A is running out of OCM,TF-A won't work p
feat(versal2): is OCM configured as coherent
Warn users about disabled OCM coherency which is not enabled by default in designs. If it is not enabled and TF-A is running out of OCM,TF-A won't work properly. This check is done only in Debug mode and isolation disabled.
Change-Id: I7661e0183503b71085c57fa35014341d14522203 Signed-off-by: Saivardhan Thatikonda <saivardhan.thatikonda@amd.com>
show more ...
|
| ca3f2eee | 26-Mar-2025 |
Soby Mathew <soby.mathew@arm.com> |
Merge "feat(rmmd): verify FEAT_MEC present before calling plat hoook" into integration |
| 609ada96 | 24-Mar-2025 |
Juan Pablo Conde <juanpablo.conde@arm.com> |
feat(rmmd): verify FEAT_MEC present before calling plat hoook
Some platforms do not support FEAT_MEC. Hence, they do not provide an interface to update the update of the key corresponding to a MECID
feat(rmmd): verify FEAT_MEC present before calling plat hoook
Some platforms do not support FEAT_MEC. Hence, they do not provide an interface to update the update of the key corresponding to a MECID.
This patch adds a condition in order to verify FEAT_MEC is present before calling the corresponding platform hook, thus preventing it from being called when the platform does not support the feature.
Change-Id: Ib1eb9e42f475e27ec31529569e888b93b207148c Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com>
show more ...
|
| 435bc14a | 17-Feb-2025 |
Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com> |
fix(versal): handle invalid entry point in cpu hotplug scenario
Invalid addresses are from 2G-4G and also address where TF-A is.
Change-Id: I3d07808821da3bdd46be819ad829cb284f9d53d3 Signed-off-by:
fix(versal): handle invalid entry point in cpu hotplug scenario
Invalid addresses are from 2G-4G and also address where TF-A is.
Change-Id: I3d07808821da3bdd46be819ad829cb284f9d53d3 Signed-off-by: Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>
show more ...
|
| e5e417dd | 17-Feb-2025 |
Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com> |
fix(versal-net): handle invalid entry point in cpu hotplug scenario
Invalid addresses are from 2G-4G and also address where TF-A is.
Change-Id: I153d26bd92ea26efcd7f236e2f1d89c3e5442ba4 Signed-off-
fix(versal-net): handle invalid entry point in cpu hotplug scenario
Invalid addresses are from 2G-4G and also address where TF-A is.
Change-Id: I153d26bd92ea26efcd7f236e2f1d89c3e5442ba4 Signed-off-by: Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>
show more ...
|
| df44616a | 08-Jan-2025 |
Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com> |
fix(zynqmp): handle invalid entry point in cpu hotplug scenario
Invalid addresses are from 2G-4G and also address where TF-A is.
Change-Id: Iedb817a2f9667b7d0b9a3ac03891a5b93295bf87 Signed-off-by:
fix(zynqmp): handle invalid entry point in cpu hotplug scenario
Invalid addresses are from 2G-4G and also address where TF-A is.
Change-Id: Iedb817a2f9667b7d0b9a3ac03891a5b93295bf87 Signed-off-by: Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>
show more ...
|
| 8fb8b939 | 25-Mar-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge "refactor(mediatek): fix mcusys off issue for MTK GIC v3 driver" into integration |
| 90f9c9be | 25-Mar-2025 |
Soby Mathew <soby.mathew@arm.com> |
Merge "feat(rme): add SMMU and PCIe information to Boot manifest" into integration |
| 90552c61 | 30-Jan-2025 |
AlexeiFedorov <Alexei.Fedorov@arm.com> |
feat(rme): add SMMU and PCIe information to Boot manifest
- Define information structures for SMMU, root complex, root port and BDF mappings. - Add entries for SMMU and PCIe root complexes to Boot
feat(rme): add SMMU and PCIe information to Boot manifest
- Define information structures for SMMU, root complex, root port and BDF mappings. - Add entries for SMMU and PCIe root complexes to Boot manifest. - Update RMMD_MANIFEST_VERSION_MINOR from 4 to 5.
Change-Id: I0a76dc18edbaaff40116f376aeb56c750d57c7c1 Signed-off-by: AlexeiFedorov <Alexei.Fedorov@arm.com>
show more ...
|
| ddb5e2fd | 15-Jan-2024 |
Mikko Rapeli <mikko.rapeli@linaro.org> |
fix(qemu): ignore TPM error
If firmware is configured with TPM support but it's missing on HW, e.g. swtpm not started and/or configured with qemu, then continue booting. Missing TPM is not a fatal e
fix(qemu): ignore TPM error
If firmware is configured with TPM support but it's missing on HW, e.g. swtpm not started and/or configured with qemu, then continue booting. Missing TPM is not a fatal error. Enables testing boot without TPM device to see that missing TPM is detected further up the SW stack and correct fallback actions are taken.
Change-Id: Ibf35ae84383dc87ad65385ecb9e07fd81dce88f2 Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org>
show more ...
|
| 518b278b | 24-Mar-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "hm/handoff-aarch32" into integration
* changes: refactor(arm): simplify early platform setup functions feat(bl32): enable r3 usage for boot args feat(handoff): add li
Merge changes from topic "hm/handoff-aarch32" into integration
* changes: refactor(arm): simplify early platform setup functions feat(bl32): enable r3 usage for boot args feat(handoff): add lib to sp-min sources feat(handoff): add 32-bit variant of SRAM layout feat(handoff): add 32-bit variant of ep info fix(aarch32): avoid using r12 to store boot params fix(arm): reinit secure and non-secure tls refactor(handoff): downgrade error messages
show more ...
|
| d186c82c | 19-Mar-2025 |
Akshay Belsare <akshay.belsare@amd.com> |
chore(versal2): realign address printing
Secure code address to be printed only when TF-A is compiled with supported dispatcher service.
Change-Id: Ifb31f07981c00a9fddc7470aa991773266840400 Signed-
chore(versal2): realign address printing
Secure code address to be printed only when TF-A is compiled with supported dispatcher service.
Change-Id: Ifb31f07981c00a9fddc7470aa991773266840400 Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
show more ...
|
| 573ec228 | 19-Mar-2025 |
Akshay Belsare <akshay.belsare@amd.com> |
fix(amd): update transfer list args for OP-TEE
Populate the boot arguments for handoff to OP-TEE, along with secure endpoint information, from the transfer list only when SPD is set to opteed.
Fix
fix(amd): update transfer list args for OP-TEE
Populate the boot arguments for handoff to OP-TEE, along with secure endpoint information, from the transfer list only when SPD is set to opteed.
Fix for MISRA Violation: MISRA-C:2012 R.14.4: - The controlling expression of an if statement and the controlling expression of an iteration-statement shall have essentially Boolean type.
Change-Id: I645205da3cb8ef9eea7d2c8d9a4200b485274e8a Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
show more ...
|
| 2f4bcc08 | 21-Mar-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "feat(zynqmp): add pin group for lower qspi interface" into integration |
| 3c198a97 | 21-Mar-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(rdv3): correctly handle FP regs context saving" into integration |
| 2be3014f | 20-Mar-2025 |
Runyang Chen <runyang.chen@mediatek.corp-partner.google.com> |
refactor(mediatek): fix mcusys off issue for MTK GIC v3 driver
When mcusys is off, rdist_ctx will save the rdist data of the last core. In the case of the last core plug off, the data of other cores
refactor(mediatek): fix mcusys off issue for MTK GIC v3 driver
When mcusys is off, rdist_ctx will save the rdist data of the last core. In the case of the last core plug off, the data of other cores will be inconsistent with the data in rdist_ctx.
Therefore, each core needs to use a dedicated context.
Signed-off-by: Runyang Chen <runyang.chen@mediatek.com> Change-Id: Ic9501f4da219cf906c0e348982be3f550c3ba30b
show more ...
|
| 89213498 | 13-Mar-2025 |
Harrison Mutai <harrison.mutai@arm.com> |
refactor(arm): simplify early platform setup functions
Refactor `arm_sp_min_early_platform_setup` to accept generic `u_register_r` values to support receiving firmware handoff boot arguments in comm
refactor(arm): simplify early platform setup functions
Refactor `arm_sp_min_early_platform_setup` to accept generic `u_register_r` values to support receiving firmware handoff boot arguments in common code. This has the added benefit of simplifying the interface into common early platform setup.
Change-Id: Idfc3d41f94f2bf3a3a0c7ca39f6b9b0013836e3a Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| ac05182d | 20-Mar-2025 |
Rakshit Goyal <rakshit.goyal@arm.com> |
fix(rdv3): correctly handle FP regs context saving
Commit fe488c3796e01187fb6cffdd27a1bee1a33e0931 added an override to force `CTX_INCLUDE_SVE_REGS` to 0 when `SPD == spmd` and `SPMD_SPM_AT_SEL2 ==
fix(rdv3): correctly handle FP regs context saving
Commit fe488c3796e01187fb6cffdd27a1bee1a33e0931 added an override to force `CTX_INCLUDE_SVE_REGS` to 0 when `SPD == spmd` and `SPMD_SPM_AT_SEL2 == 1`. Since there is an architectural dependency between FP and SVE registers, `CTX_INCLUDE_FPREGS` must also be overridden to 0 when CTX_INCLUDE_SVE_REGS is 0.
Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I1cd834241a2d5a5368ac532a348d8729a701bbcd
show more ...
|
| 7e848540 | 20-Mar-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "dtpm_poc" into integration
* changes: feat(docs): update mboot threat model with dTPM docs(tpm): add design documentation for dTPM fix(rpi3): expose BL1_RW to BL2 ma
Merge changes from topic "dtpm_poc" into integration
* changes: feat(docs): update mboot threat model with dTPM docs(tpm): add design documentation for dTPM fix(rpi3): expose BL1_RW to BL2 map for mboot feat(rpi3): add dTPM backed measured boot feat(tpm): add Infineon SLB9670 GPIO SPI config feat(tpm): add tpm drivers and framework feat(io): add generic gpio spi bit-bang driver feat(rpi3): implement eventlog handoff to BL33 feat(rpi3): implement mboot for rpi3
show more ...
|
| 48488245 | 20-Mar-2025 |
Soby Mathew <soby.mathew@arm.com> |
Merge changes from topic "mec" into integration
* changes: feat(qemu): add plat_rmmd_mecid_key_update() feat(rmmd): add RMM_MECID_KEY_UPDATE call |
| 9c9a31eb | 18-Mar-2025 |
Jean-Philippe Brucker <jean-philippe@linaro.org> |
feat(qemu): add plat_rmmd_mecid_key_update()
Add an implementation of the plat_rmmd_mecid_key_update() callback, that updates the MEC keys associated with a MECID. Leave it empty for now, since QEMU
feat(qemu): add plat_rmmd_mecid_key_update()
Add an implementation of the plat_rmmd_mecid_key_update() callback, that updates the MEC keys associated with a MECID. Leave it empty for now, since QEMU doesn't yet implement an MPE (Memory Protection Engine).
Change-Id: I2746f6024f28e4fd487726de9e43e14d8cad57a0 Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
show more ...
|
| f801fdc2 | 22-Apr-2024 |
Tushar Khandelwal <tushar.khandelwal@arm.com> |
feat(rmmd): add RMM_MECID_KEY_UPDATE call
With this addition, TF-A now has an SMC call to handle the update of MEC keys associated to MECIDs.
The behavior of this newly added call is empty for now
feat(rmmd): add RMM_MECID_KEY_UPDATE call
With this addition, TF-A now has an SMC call to handle the update of MEC keys associated to MECIDs.
The behavior of this newly added call is empty for now until an implementation for the MPE (Memory Protection Engine) driver is available. Only parameter sanitization has been implemented.
Signed-off-by: Tushar Khandelwal <tushar.khandelwal@arm.com> Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org> Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com> Change-Id: I2a969310b47e8c6da1817a79be0cd56158c6efc3
show more ...
|
| 9acaaded | 07-Nov-2024 |
Abhi Singh <abhi.singh@arm.com> |
fix(rpi3): expose BL1_RW to BL2 map for mboot
BL2 requires the ability to access the TCG Event Log during Measured Boot. Currently the Platform hangs since the Event Log is not exposed to BL2's mma
fix(rpi3): expose BL1_RW to BL2 map for mboot
BL2 requires the ability to access the TCG Event Log during Measured Boot. Currently the Platform hangs since the Event Log is not exposed to BL2's mmap. Define a RPI3_BL1_RW region to be added to the BL2 Image, if Measured Boot is enabled.
Change-Id: Ic236a80e73ea342b4590cfb65bafbb8ffac17085 Signed-off-by: Abhi Singh <abhi.singh@arm.com>
show more ...
|