| #
cb6551e2 |
| 22-Oct-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "perf(spmd): don't initialise context on boot, do it on CPU_ON" into integration
|
| #
9f3f4d87 |
| 20-Oct-2025 |
Boyan Karatotev <boyan.karatotev@arm.com> |
perf(spmd): don't initialise context on boot, do it on CPU_ON
Normal and Realm worlds setup their contexts whenever a core comes online. This speeds up boot and as a side effect allows any cores tha
perf(spmd): don't initialise context on boot, do it on CPU_ON
Normal and Realm worlds setup their contexts whenever a core comes online. This speeds up boot and as a side effect allows any cores that are never turned on to not be initialised.
So do this for spmd's Secure world too. This makes all three worlds consistent.
Change-Id: I8676d2a03a472074176e4db06910fc2b6cbf269a Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| #
8ed1e20b |
| 04-Apr-2025 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "fix(spmd): check pwr mgmt status for SPMC framework response" into integration
|
| #
8723eaf2 |
| 08-Feb-2025 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
fix(spmd): check pwr mgmt status for SPMC framework response
The direct message response received by the SPMD upon a CPU_OFF power management operation must be a framework message. If message indica
fix(spmd): check pwr mgmt status for SPMC framework response
The direct message response received by the SPMD upon a CPU_OFF power management operation must be a framework message. If message indicates SPMC denied the CPU_OFF operation, SPMD shall panic.
However, if SPMC does not support receiving power management related framework messages from SPMD, it will return FFA_ERROR. In such case, SPMD takes an implementation defined choice to ignore the the FFA_ERROR and proceed with power management operation.
Change-Id: I18b9ee3fb8fd605bcd4aaa6802c969e9d36ccbe1 Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| #
4c23d627 |
| 28-Jan-2025 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "fix(spmd): fix build failure due to redefinition" into integration
|
| #
a869e2dc |
| 24-Oct-2024 |
Sudeep Holla <sudeep.holla@arm.com> |
fix(spmd): fix build failure due to redefinition
Clang build breaks with the following warning:
| In file included from services/std_svc/spmd/spmd_logical_sp.c:15: | include/services/el3_spmd
fix(spmd): fix build failure due to redefinition
Clang build breaks with the following warning:
| In file included from services/std_svc/spmd/spmd_logical_sp.c:15: | include/services/el3_spmd_logical_sp.h:15:38: error: redefinition of | typedef 'spmd_spm_core_context_t' is a C11 feature [-Werror,-Wtypedef-redefinition]. | 15 | typedef struct spmd_spm_core_context spmd_spm_core_context_t; | | ^ | services/std_svc/spmd/spmd_private.h:58:3: note: previous definition is here | 58 | } spmd_spm_core_context_t; | | ^ | CC services/std_svc/std_svc_setup.c | 1 error generated. | In file included from services/std_svc/spmd/spmd_main.c:35: | services/std_svc/spmd/spmd_private.h:58:3: error: redefinition of typedef | 'spmd_spm_core_context_t' is a C11 feature [-Werror,-Wtypedef-redefinition] | 58 | } spmd_spm_core_context_t; | | ^ | include/services/el3_spmd_logical_sp.h:15:38: note: previous definition is here | 15 | typedef struct spmd_spm_core_context spmd_spm_core_context_t; | | ^ | 1 error generated.
A structure 'spmd_spm_core_context_t' defined in 'spmd_private.h' is also declared in 'el3_spmd_logical_sp.h' as it is used in a couple of function declarations. These function declarations can be moved to spmd_private.h as they are not needed elsewhere.
Change-Id: Ic6b9a277abe00cb7129f671570abf7255be62dfa Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
show more ...
|
| #
4ede8c39 |
| 14-Aug-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "el3_direct_msg" into integration
* changes: docs(spm): document new build option feat(fvp): spmd logical partition smc handler feat(fvp): add spmd logical partition
Merge changes from topic "el3_direct_msg" into integration
* changes: docs(spm): document new build option feat(fvp): spmd logical partition smc handler feat(fvp): add spmd logical partition feat(spmd): get logical partitions info feat(spmd): add partition info get regs refactor(ff-a): move structure definitions feat(spmd): el3 direct message API feat(spmd): add spmd logical partitions
show more ...
|
| #
95f7f6d8 |
| 23-Apr-2023 |
Raghu Krishnamurthy <raghu.ncstate@gmail.com> |
feat(spmd): get logical partitions info
This patch enables FF-A secure partitions and the SPMC to query EL3 SPMD logical partitions that are present in the system via partition get info regs abi. No
feat(spmd): get logical partitions info
This patch enables FF-A secure partitions and the SPMC to query EL3 SPMD logical partitions that are present in the system via partition get info regs abi. Note that normal world will not be able to see EL3 SPMD logical partitions as per the spec.
Signed-off-by: Raghu Krishnamurthy <raghu.ncstate@gmail.com> Change-Id: I3fca8aed8ae156a559a74521803324c13ae3d55a
show more ...
|
| #
0b850e9e |
| 22-Apr-2023 |
Raghu Krishnamurthy <raghu.ncstate@gmail.com> |
feat(spmd): add partition info get regs
This patch adds support for an EL3 SPMD logical partition to discover secure partitions using the FFA_PARTITION_INFO_GET_REGS abi. It also adds helper functio
feat(spmd): add partition info get regs
This patch adds support for an EL3 SPMD logical partition to discover secure partitions using the FFA_PARTITION_INFO_GET_REGS abi. It also adds helper functions for a logical partition to use the information returned in registers in a meaningful way.
Signed-off-by: Raghu Krishnamurthy <raghu.ncstate@gmail.com> Change-Id: Id69488e7367e17e2dfa6c8e332be3c8d41f6c773
show more ...
|
| #
66bdfd6e |
| 03-Mar-2023 |
Raghu Krishnamurthy <raghu.ncstate@gmail.com> |
feat(spmd): el3 direct message API
This patch implements an API that is exposed to SPMD logical partitions that can be used to send direct messages to a secure partition. It also adds required code
feat(spmd): el3 direct message API
This patch implements an API that is exposed to SPMD logical partitions that can be used to send direct messages to a secure partition. It also adds required code in the SPMD smc handler to complete the direct response appropriately.
Change-Id: I2d0e38415f13ad4fd28f8984d565036b7d3a9e71 Signed-off-by: Raghu Krishnamurthy <raghu.ncstate@gmail.com>
show more ...
|
| #
17f9732d |
| 03-May-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "mp/group0_support" into integration
* changes: docs(spm): support for handling Group0 interrupts feat(spmd): introduce platform handler for Group0 interrupt feat(spmd
Merge changes from topic "mp/group0_support" into integration
* changes: docs(spm): support for handling Group0 interrupts feat(spmd): introduce platform handler for Group0 interrupt feat(spmd): add support for FFA_EL3_INTR_HANDLE_32 ABI feat(spmd): register handler for group0 interrupt from NWd
show more ...
|
| #
f0b64e50 |
| 02-Mar-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
feat(spmd): introduce platform handler for Group0 interrupt
This patch introduces a handler for FVP platform to triage Group0 secure interrupts. Currently, it is empty but serves as a placeholder fo
feat(spmd): introduce platform handler for Group0 interrupt
This patch introduces a handler for FVP platform to triage Group0 secure interrupts. Currently, it is empty but serves as a placeholder for future Group0 interrupt sources.
Moreover, this patch also provides a dummy implementation of the above mentioned platform hook for QEMU, corstone100, n1sdp and hikey960 ports.
Change-Id: I01d3451408f47ac313b0af74046cce89f89b85bb Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| #
2aaed860 |
| 23-Sep-2022 |
Joanna Farley <joanna.farley@arm.com> |
Merge "refactor(libc): clean up dependencies in libc" into integration
|
| #
885e2683 |
| 12-Sep-2022 |
Claus Pedersen <claustbp@google.com> |
refactor(libc): clean up dependencies in libc
- Removing platform dependencies from libc modules. - Replacing panicking with actual error handling. - Debug macros are included indirectly from assert
refactor(libc): clean up dependencies in libc
- Removing platform dependencies from libc modules. - Replacing panicking with actual error handling. - Debug macros are included indirectly from assert.h. Removing "platform_def.h" from assert.h and adding "common/debug.h" where the macros are used. - Removing hack for fixing PLAT_LOG_LEVEL_ASSERT to 40. Instead removing assert with expression, as this does not provide additional information.
Signed-off-by: Claus Pedersen <claustbp@google.com> Change-Id: Icc201ea7b63c1277e423c1cfd13fd6816c2bc568
show more ...
|
| #
b1470ccc |
| 16-May-2022 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "ffa_el3_spmc" into integration
* changes: feat(spmd): allow forwarding of FFA_FRAG_RX/TX calls feat(spmc): add support for FFA_SPM_ID_GET feat(spmc): add support for
Merge changes from topic "ffa_el3_spmc" into integration
* changes: feat(spmd): allow forwarding of FFA_FRAG_RX/TX calls feat(spmc): add support for FFA_SPM_ID_GET feat(spmc): add support for forwarding a secure interrupt to the SP feat(spmc): add support for FF-A power mgmt. messages in the EL3 SPMC
show more ...
|
| #
59bd2ad8 |
| 12-Apr-2022 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(spmc): add support for FF-A power mgmt. messages in the EL3 SPMC
This patch adds support for forwarding the following PSCI messages received by the SPMC at EL3 to the S-EL1 SP if the SP has ind
feat(spmc): add support for FF-A power mgmt. messages in the EL3 SPMC
This patch adds support for forwarding the following PSCI messages received by the SPMC at EL3 to the S-EL1 SP if the SP has indicated that it wishes to receive the appropriate message via its manifest.
1. A PSCI CPU_OFF message in response to a cpu hot unplug request from the OS. 2. A message to indicate warm boot of a cpu in response to a cpu hot plug request from the OS. 3. A PSCI CPU_SUSPEND message in response to a cpu idle event initiated from the OS. 4. A message to indicate warm boot of a cpu from a shallow power state in response to a cpu resume power event.
This patch also implements the FFA_SECONDARY_EP_REGISTER function to enable the SP specify its secondary entrypoint.
Signed-off-by: Achin Gupta <achin.gupta@arm.com> Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: I375d0655b2c6fc27445facc39213d1d0678557f4
show more ...
|
| #
65b13bac |
| 22-Apr-2022 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "ffa_el3_spmc" into integration
* changes: feat(spmc): add support for direct req/resp feat(spmc): add support for handling FFA_ERROR ABI feat(spmc): add support for F
Merge changes from topic "ffa_el3_spmc" into integration
* changes: feat(spmc): add support for direct req/resp feat(spmc): add support for handling FFA_ERROR ABI feat(spmc): add support for FFA_MSG_WAIT feat(spmc): add function to determine the return path from the SPMC feat(spmd): enable handling of FF-A SMCs with the SPMC at EL3 feat(spmd): update SPMC init flow to use EL3 implementation feat(spmc): add FF-A secure partition manager core feat(spmc): prevent read only xlat tables with the EL3 SPMC feat(spmc): enable building of the SPMC at EL3 refactor(spm_mm): reorganize secure partition manager code
show more ...
|
| #
5096aeb2 |
| 01-Dec-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(spmc): add FF-A secure partition manager core
This patch introduces the core support for enabling an SPMC in EL3 as per the FF-A spec.
The current implemented functionality is targeted to enab
feat(spmc): add FF-A secure partition manager core
This patch introduces the core support for enabling an SPMC in EL3 as per the FF-A spec.
The current implemented functionality is targeted to enable initialization of the SPMC itself and initial support for bringing up a single S-EL1 SP.
This includes initialization of the SPMC's internal state, parsing of an SP's manifest, preparing the cpu contexts and appropriate system registers for the Secure Partition.
The spmc_smc_handler is the main handler for all incoming SMCs to the SPMC, FF-A ABI handlers and functionality will be implemented in subsequent patches.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: Ib33c240b91e54cbd018a69fec880d02adfbe12b9
show more ...
|
| #
b298d4df |
| 04-Mar-2022 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "feat(ff-a): forward FFA_VERSION from SPMD to SPMC" into integration
|
| #
9944f557 |
| 09-Dec-2021 |
Daniel Boulby <daniel.boulby@arm.com> |
feat(ff-a): forward FFA_VERSION from SPMD to SPMC
Introduced by FF-A v1.1 we must forward a call to FFA_VERSION to the SPMC so that the ffa version of the caller can be stored for later use. Since t
feat(ff-a): forward FFA_VERSION from SPMD to SPMC
Introduced by FF-A v1.1 we must forward a call to FFA_VERSION to the SPMC so that the ffa version of the caller can be stored for later use. Since the return of FFA_VERSION is not wrapped in a FF-A call we need to use a direct message request to do this forwarding. For the spmd_handler in the SPMC to hand off to the correct function we use w2 to specify a target framework function. Therefore we must update PSCI CPU_OFF to do this as well.
Change-Id: Ibaa6832b66f1597b3d65aa8986034f0c5916016d Signed-off-by: Daniel Boulby <daniel.boulby@arm.com>
show more ...
|
| #
a127b99d |
| 09-Nov-2021 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "feat(SPMD): route secure interrupts to SPMC" into integration
|
| #
8cb99c3f |
| 05-Aug-2020 |
Olivier Deprez <olivier.deprez@arm.com> |
feat(SPMD): route secure interrupts to SPMC
Define a handler in the SPMD to route secure interrupts occurring while the normal world runs. On a Group1 Secure interrupt (with a GICv3 or a Group0 inte
feat(SPMD): route secure interrupts to SPMC
Define a handler in the SPMD to route secure interrupts occurring while the normal world runs. On a Group1 Secure interrupt (with a GICv3 or a Group0 interrupt on GICv2), the normal world is pre-empted to EL3 and redirected to the SPMD/SPMC for further handling.
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com> Change-Id: I1350d74048c5549a2af8da0ba004c08512cc006a
show more ...
|
| #
ae030052 |
| 16-Mar-2021 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "od/ffa_spmc_pwr" into integration
* changes: SPM: declare third cactus instance as UP SP SPMD: lock the g_spmd_pm structure FF-A: implement FFA_SECONDARY_EP_REGISTER
|
| #
cdb49d47 |
| 19-Jan-2021 |
Olivier Deprez <olivier.deprez@arm.com> |
FF-A: implement FFA_SECONDARY_EP_REGISTER
Remove the former impdef SPMD service for SPMC entry point registration. Replace with FFA_SECONDARY_EP_REGISTER ABI providing a single entry point address i
FF-A: implement FFA_SECONDARY_EP_REGISTER
Remove the former impdef SPMD service for SPMC entry point registration. Replace with FFA_SECONDARY_EP_REGISTER ABI providing a single entry point address into the SPMC for primary and secondary cold boot.
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: I067adeec25fc12cdae90c15a616903b4ac4d4d83
show more ...
|
| #
a6ab1ae3 |
| 21-Aug-2020 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "spm-secondary-cores" into integration
* changes: SPMC: embed secondary core ep info into to SPMC context SPMC: manifest changes to support multicore boot SPMD: second
Merge changes from topic "spm-secondary-cores" into integration
* changes: SPMC: embed secondary core ep info into to SPMC context SPMC: manifest changes to support multicore boot SPMD: secondary cores PM on and off SPD hooks relayed to SPMC SPMD: handle SPMC message to register secondary core entry point SPMD: introduce SPMC to SPMD messages SPMD: register the SPD PM hooks SPMD: add generic SPD PM handlers SPMD: enhance SPMC internal boot states SPMD: entry point info get helper
show more ...
|