| e1168bc3 | 13-Nov-2024 |
Levi Yun <yeoreum.yun@arm.com> |
feat(el3_spmc): ffa error handling in direct msg
When an FFA_ERROR happens while handling a direct message from normal world, return to normal world with FFA_ERROR. Otherwise, the system would re-en
feat(el3_spmc): ffa error handling in direct msg
When an FFA_ERROR happens while handling a direct message from normal world, return to normal world with FFA_ERROR. Otherwise, the system would re-enter the secure partition with FFA_ERROR.
Change-Id: I3d9a68a41b4815c1a8e10354cfcf68fec9f4b800 Signed-off-by: Levi Yun <yeoreum.yun@arm.com>
show more ...
|
| 09a580b7 | 07-Aug-2024 |
Levi Yun <yeoreum.yun@arm.com> |
feat(ff-a): support FFA_MSG_SEND_DIRECT_REQ2/RESP2
StandaloneMm which is S-EL0 partition uses FFA_MSG_SEND_DIRECT_REQ2/RESP2 to handle multiple services. For this, add support for FFA_MSG_SEND_DIREC
feat(ff-a): support FFA_MSG_SEND_DIRECT_REQ2/RESP2
StandaloneMm which is S-EL0 partition uses FFA_MSG_SEND_DIRECT_REQ2/RESP2 to handle multiple services. For this, add support for FFA_MSG_SEND_DIRECT_REQ2/RESP2 in el3_spmc restrictly up to use 8 registers. although FF-A v1.2 defines FFA_MSG_SEND_DIRECT_REQ2/RESP2 with ability to pass/return up to 18 registers.
Signed-off-by: Levi Yun <yeoreum.yun@arm.com> Change-Id: I8ab1c332d269d9d131330bb2debd10d75bdba1ee
show more ...
|
| ddf72e6a | 07-Aug-2024 |
Levi Yun <yeoreum.yun@arm.com> |
feat(ff-a): add FFA_MEM_PERM_GET/SET_SMC64
FF-A memory management protocol v1.1 specifies not only FFA_MEM_PERM_GET_SMC32/FFA_MEM_PERM_SET_SMC32 but also FFA_MEM_PERM_GET_SMC64/FFA_MEM_PERM_SET_SMC6
feat(ff-a): add FFA_MEM_PERM_GET/SET_SMC64
FF-A memory management protocol v1.1 specifies not only FFA_MEM_PERM_GET_SMC32/FFA_MEM_PERM_SET_SMC32 but also FFA_MEM_PERM_GET_SMC64/FFA_MEM_PERM_SET_SMC64.
Change former FFA_MEM_PERM_GET/SET definitions to separate operations and add handler for FFA_MEM_PERM_GET/SET_SMC64 in spmc_smc_handler().
Signed-off-by: Levi Yun <yeoreum.yun@arm.com> Change-Id: I175063654703db26c1ffc3cfd7fa428b94d2bfc9
show more ...
|
| 4053a647 | 08-Feb-2024 |
Levi Yun <yeoreum.yun@arm.com> |
feat(el3-spmc): support Hob list to boot S-EL0 SP
The EDKII/StandaloneMm module runs as a S-EL0 partition on top of the EL3 FF-A SPMC.
In the past the StandaloneMm partition received its boot infor
feat(el3-spmc): support Hob list to boot S-EL0 SP
The EDKII/StandaloneMm module runs as a S-EL0 partition on top of the EL3 FF-A SPMC.
In the past the StandaloneMm partition received its boot information through the use of a device tree (DT) passed through the FF-A boot protocol. The StandaloneMm itself converted the DT into a HOB.
To better match the UEFI PI spec, the EL3 SPMC must now produce the HOB including the PHIT (Phase Handoff Information Table) as first item in the HOB list. The SPMC then passes the HOB through the FF-A boot protocol for the StandaloneMm consumption.
This discards the use of a DT between the SPMC and the StandaloneMm partition.
Signed-off-by: Levi Yun <yeoreum.yun@arm.com> Change-Id: I22fb02c710169bd5a5ba1d1f60dce977a5a59ab6
show more ...
|
| 42e35d2f | 11-Apr-2024 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
refactor(cm): convert el1-ctx assembly offset entries to c structure
Currently the EL1 part of the context structure (el1_sysregs_t), is coupled with feature flags reducing the context memory alloca
refactor(cm): convert el1-ctx assembly offset entries to c structure
Currently the EL1 part of the context structure (el1_sysregs_t), is coupled with feature flags reducing the context memory allocation for platforms, that don't enable/support all the architectural features at once.
Similar to the el2 context optimization commit-"d6af234" this patch further improves this section by converting the assembly context-offset entries into a c structure. It relies on garbage collection of the linker removing unreferenced structures from memory, as well as aiding in readability and future maintenance. Additionally, it eliminates the #ifs usage in 'context_mgmt.c' source file.
Change-Id: If6075931cec994bc89231241337eccc7042c5ede Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| 5ed8e255 | 28-Apr-2022 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(el3-spmc): synchronize access to the s-el0 sp context
This patch locks and unlocks access to the S-EL0 SP context when its runtime state and model are updated to avoid issues around concurrent
feat(el3-spmc): synchronize access to the s-el0 sp context
This patch locks and unlocks access to the S-EL0 SP context when its runtime state and model are updated to avoid issues around concurrent access to global state.
Signed-off-by: Achin Gupta <achin.gupta@arm.com> Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: I427657050574c189cbaf82c1371e3ee44bc1663e
show more ...
|
| 727ab1c4 | 14-Aug-2022 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(el3-spmc): add support to map S-EL0 SP device regions
Add the support to parse SP manifest to get device regions, create xlat table entries for the SP.
SP running at SEL-0 does not have enough
feat(el3-spmc): add support to map S-EL0 SP device regions
Add the support to parse SP manifest to get device regions, create xlat table entries for the SP.
SP running at SEL-0 does not have enough privilege to map the regions itself.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: I600f51ee62a33443fe7f1c4e007cc6c5ab45222f
show more ...
|
| 83c3da77 | 28-Apr-2022 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(el3-spmc): add support to map S-EL0 SP memory regions
Add the support to parse SP manifest to get memory regions, create xlat tables and then program it in TTBR0.
SP manifest contains the info
feat(el3-spmc): add support to map S-EL0 SP memory regions
Add the support to parse SP manifest to get memory regions, create xlat tables and then program it in TTBR0.
SP manifest contains the info on memory map regions that are needed by the SP. These regions needs to be mapped as SP running at S-EL0 does not have privilege to do it.
Signed-off-by: Sayanta Pattanayak <sayanta.pattanayak@arm.com> Signed-off-by: Aditya Angadi <aditya.angadi@arm.com> Signed-off-by: Achin Gupta <achin.gupta@arm.com> Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: I0cad36e5c43f8a68c94887ff2bd798933a26be27
show more ...
|
| 1f6b2b26 | 25-Mar-2022 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(el3-spmc): add support for FFA_MEM_PERM_GET and SET ABIs
Secure partition running at SEL0 does not have privilege to modify translation tables. So it needs SPMC to map the regions for it. Add t
feat(el3-spmc): add support for FFA_MEM_PERM_GET and SET ABIs
Secure partition running at SEL0 does not have privilege to modify translation tables. So it needs SPMC to map the regions for it. Add the support to request memory map or region info using FF-A interface.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Signed-off-by: Achin Gupta <achin.gupta@arm.com> Change-Id: I04a97899808bbd45eda24edf7bc74eaef96fb2ce
show more ...
|