| 34795028 | 04-Aug-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge changes Ic01517d5,I43af5796,I540e113f,I15646753,I180d38fe, ... into integration
* changes: fix(cpus): organize Cortex-X2 errata entries fix(cpus): workaround for Cortex-X2 erratum 2291219
Merge changes Ic01517d5,I43af5796,I540e113f,I15646753,I180d38fe, ... into integration
* changes: fix(cpus): organize Cortex-X2 errata entries fix(cpus): workaround for Cortex-X2 erratum 2291219 fix(cpus): workaround for Cortex-X2 erratum 2267065 fix(cpus): workaround for Cortex-X2 erratum 2136059 fix(cpus): workaround for Cortex-X2 erratum 1934260 fix(cpus): workaround for Cortex-X2 erratum 1927200 fix(cpus): workaround for Cortex-X2 erratum 1917258 fix(cpus): workaround for Cortex-X2 erratum 1916945 fix(cpus): workaround for Cortex-X2 erratum 1901946
show more ...
|
| 813bf1a0 | 04-Aug-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge changes from topic "hm/dt" into integration
* changes: refactor(arm): unify SPSR retrieval logic feat(fvp): enable kernel dt convention |
| 01907f3f | 04-Jul-2025 |
Harrison Mutai <harrison.mutai@arm.com> |
refactor(arm): unify SPSR retrieval logic
Consolidate platform-specific SPSR setup logic into a single arm_get_spsr() function that accepts an image_id to select between BL32 and BL33. This reduces
refactor(arm): unify SPSR retrieval logic
Consolidate platform-specific SPSR setup logic into a single arm_get_spsr() function that accepts an image_id to select between BL32 and BL33. This reduces duplication and simplifies control over SPSR generation for later stages, particularly BL33.
The SPD remains responsible for setting the SPSR for BL32.
Change-Id: Ibbba708d607e7676989f5c7ceffe33d7bb2195f1 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 8946bb03 | 08-Jul-2025 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(fvp): enable kernel dt convention
Enable USE_KERNEL_DT_CONVENTION for the FVP platform to pass the DT blob (DTB) in x0 to BL33. This aligns with the Linux boot protocol as described in Document
feat(fvp): enable kernel dt convention
Enable USE_KERNEL_DT_CONVENTION for the FVP platform to pass the DT blob (DTB) in x0 to BL33. This aligns with the Linux boot protocol as described in Documentation/arm64/booting.rst.
In addition:
- Clean up legacy ARM_LINUX_KERNEL_AS_BL33 handling since USE_KERNEL_DT_CONVENTION now implies this mode for DT handoff. - Override args.arg0 for BL33 to point to ARM_PRELOADED_DTB_BASE in RESET_TO_BL31. - Skip setting the primary MPID in x0 when using this convention.
Change-Id: Ieea8cfe68104b82038b9311613abf13afe7b48f1 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 5feb2082 | 04-Aug-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge changes from topics "refactor_stmm", "stmm_crb_area", "stmm_with_xferlist" into integration
* changes: feat(fvp): organize fvp_stmm_manifest.dts feat(juno): add pseudo CRB area feat(fvp)
Merge changes from topics "refactor_stmm", "stmm_crb_area", "stmm_with_xferlist" into integration
* changes: feat(fvp): organize fvp_stmm_manifest.dts feat(juno): add pseudo CRB area feat(fvp): add pseudo CRB area feat(arm): add pseudo CRB area feat(juno): increase xtable for pseudo CRB feat(fvp): increase xtable for pseudo CRB for SPMC_AT_EL3 feat(el3-spmc): deliver TPM event log via hob list feat(el3-spmc): get sp_manifest via xferlist feat(fvp): tos_fw_config with transfer list feat(arm): load tos_fw_cfg using xferlist in SPMC_AT_EL3 feat(fvp): increase secure partition's table mapping count feat(fvp): increase bl2 mmap tables for handoff
show more ...
|
| abcf135e | 04-Aug-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "feat(common): add support for kernel DT handoff convention" into integration |
| 5b435e6d | 04-Aug-2025 |
Chris Kay <chris.kay@arm.com> |
Merge "fix(build): fix Makefile syntax in constraints helpers" into integration |
| 7f690c37 | 04-Aug-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes Ib220a866,I38e6af65,I1554efdb,Iae99985e,I96f96267, ... into integration
* changes: feat(stm32mp25-fdts): enable rng nodes for ST boards feat(stm32mp2): prepare DDR secure area encr
Merge changes Ib220a866,I38e6af65,I1554efdb,Iae99985e,I96f96267, ... into integration
* changes: feat(stm32mp25-fdts): enable rng nodes for ST boards feat(stm32mp2): prepare DDR secure area encryption feat(stm32mp2): add some platform helpers feat(st-drivers): add RISAF driver feat(fdts): add RISAF nodes for STM32MP25 feat(stm32mp2-fdts): add memory firewall node feat(stm32mp2-fdts): add firewall nodes in fw-config feat(stm32mp2): add RIF dt-binding defines feat(stm32mp1-fdts): add MCE support for STM32MP13 DK board feat(stm32mp1): prepare DDR secure area encryption for STM32MP13 feat(stm32mp1): enable MCE driver for STM32MP13 feat(st-drivers): add Memory Cipher Engine driver feat(dt-bindings): add MCE DT bindings for STM32MP13 fix(st-crypto): improve RNG health test configuration feat(st): add RNG minor version feat(st-crypto): add multi instance and error management in RNG driver feat(stm32mp2): add HASH and RNG compilation feat(stm32mp25-fdts): add RNG node
show more ...
|
| 291e493d | 04-Jul-2025 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(common): add support for kernel DT handoff convention
TF-A currently supports multiple DT handoff conventions:
1. Firmware Handoff (FH): DT passed in x0, with x1–x3 carrying additional data
feat(common): add support for kernel DT handoff convention
TF-A currently supports multiple DT handoff conventions:
1. Firmware Handoff (FH): DT passed in x0, with x1–x3 carrying additional data. 2. Kernel-compatible handoff (ARM_LINUX_KERNEL_AS_BL33): DT passed in x0, x1–x3 zeroed. 3. Legacy TF-A convention: DT passed in x1, with x0 used for MPIDR or NT_FW_CONFIG.
After discussions with folks in EDK2 and U-Boot, it's clear that there is no strict requirement for placing the DT in x1. Both projects support x0 for Arm platforms. To standardize behavior and support firmware handoff migration, this patch introduces USE_KERNEL_DT_CONVENTION as a configurable build flag. When enabled, the DT will be passed in x0 for BL33.
This aligns TF-A’s behavior with Linux boot expectations and simplifies integration across bootloaders.
Change-Id: I6bd7154fe07cb2e16e25c058f7cf862f9ae007e7 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 260e18b1 | 13-Jun-2025 |
Cloud Zhang <cloud.zhang@mediatek.corp-partner.google.com> |
feat(mt8189): add UFS functions used by libbl31.a
Add UFS callback functions needed by the MediaTek's private static library (libbl31.a).
Signed-off-by: Cloud Zhang <cloud.zhang@mediatek.corp-partn
feat(mt8189): add UFS functions used by libbl31.a
Add UFS callback functions needed by the MediaTek's private static library (libbl31.a).
Signed-off-by: Cloud Zhang <cloud.zhang@mediatek.corp-partner.google.com> Change-Id: I155b5a805a953e45f1a41a561f1d82f71b99541d
show more ...
|
| 8d66892a | 31-Mar-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(fvp): organize fvp_stmm_manifest.dts
To generalize manifest file for StandaloneMm for FVP, organize this manifest file by separating:
* stmm_common.dtsi - collection of macros to used by
feat(fvp): organize fvp_stmm_manifest.dts
To generalize manifest file for StandaloneMm for FVP, organize this manifest file by separating:
* stmm_common.dtsi - collection of macros to used by {plat_}stmm_*.dts(i) files.
* stmm_dev_region.dtsi - device region template for StandaloneMm. - If some environment don't required it, it can be excluded in by not defining STMM_XXX macro.
* stmm_mem_region.dtsi - memory region template for StandaloneMm.
* stmm_template.dts - StandaloneMm manifest template defining common root node information.
* fvp_stmm_{xxx}_manifest.dts - Main StandaloneMm manifest file. - According to environment, defines proper STMM_XXX value to define device/memory region. - device region can be excluded by not defining some STMM_XXX macro.
This is useful to define new StandaloneMm manifest in different environments.
Change-Id: Ia9668c4994f589b178872d4d7a18a9f28075df74 Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
show more ...
|
| 66579ca0 | 26-Mar-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(juno): add pseudo CRB area
To support StnadlaoneMm with fTPM, add pseudo CRB area used by fTPM.
Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com> Change-Id: I8959faf0b222c326fefedf3f809cc96c276
feat(juno): add pseudo CRB area
To support StnadlaoneMm with fTPM, add pseudo CRB area used by fTPM.
Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com> Change-Id: I8959faf0b222c326fefedf3f809cc96c276a769b
show more ...
|
| 235d9754 | 26-Mar-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(fvp): add pseudo CRB area
To support StandaloneMm with fTPM, add pseudo CRB area used by fTPM.
Change-Id: I43fd00dd23b0f4e6dbc8859808633a0c6051c8b6 Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.
feat(fvp): add pseudo CRB area
To support StandaloneMm with fTPM, add pseudo CRB area used by fTPM.
Change-Id: I43fd00dd23b0f4e6dbc8859808633a0c6051c8b6 Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
show more ...
|
| d771d57a | 26-Mar-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(arm): add pseudo CRB area
To support StandaloneMm with fTPM, add pseudo CRB areas used by fTPM. These areas are allocated: - For Normal world localities (0 ~ 3), allocates NS_CRB at ARM_N
feat(arm): add pseudo CRB area
To support StandaloneMm with fTPM, add pseudo CRB areas used by fTPM. These areas are allocated: - For Normal world localities (0 ~ 3), allocates NS_CRB at ARM_NS_DRAM1_BASE as much as 0x4000. - For Secure world locality (4), allocates S_CRB at the end of HEAP as much as 0x1000.
Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com> Change-Id: I71521a7b418fed4aae5a7d1ae5f8228955776b27
show more ...
|
| 7d142cb5 | 26-Jun-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(juno): increase xtable for pseudo CRB
As normal pseudo CRB is allocated in DRAM1 area, spmc running with SPMC_AT_EL3 need more subtable to map this area. So, increase PLAT_SP_IMAGE_MAX_XLAT_TAB
feat(juno): increase xtable for pseudo CRB
As normal pseudo CRB is allocated in DRAM1 area, spmc running with SPMC_AT_EL3 need more subtable to map this area. So, increase PLAT_SP_IMAGE_MAX_XLAT_TABLES
Change-Id: I0a41b2f9ab127cc10c213fd1216a6fdd2e0ab850 Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
show more ...
|
| 3d35b101 | 26-Jun-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(fvp): increase xtable for pseudo CRB for SPMC_AT_EL3
As normal pseudo CRB is allocated in DRAM1 area, spmc running with SPMC_AT_EL3 need more subtable to map this area. So, increase PLAT_SP_IMA
feat(fvp): increase xtable for pseudo CRB for SPMC_AT_EL3
As normal pseudo CRB is allocated in DRAM1 area, spmc running with SPMC_AT_EL3 need more subtable to map this area. So, increase PLAT_SP_IMAGE_MAX_XLAT_TABLES
Change-Id: I4c3cbf6242f2ccf154b93e9497ab9a21a4b67772 Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
show more ...
|
| 4e5247c1 | 08-Apr-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(el3-spmc): deliver TPM event log via hob list
Add MM_TPM_EVENT_LOG hob type and deliver tpm meaured event logs passed via secure transfer list to secure partition with hob list in SPMC_AT_EL3.
feat(el3-spmc): deliver TPM event log via hob list
Add MM_TPM_EVENT_LOG hob type and deliver tpm meaured event logs passed via secure transfer list to secure partition with hob list in SPMC_AT_EL3.
So that secure partition could get the meausred event log by TF-A.
Change-Id: I14f7f8cb8f8f54e07a13f40748ca551bcd265a51 Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
show more ...
|
| aae2370c | 07-Apr-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(el3-spmc): get sp_manifest via xferlist
Since commit a852fa1d594f ("feat(arm): support boot info handoff and event log"), the arg0 doesn't includes TOS_FW_CONFIG fdt but HW_CONFIG fdt is passed
feat(el3-spmc): get sp_manifest via xferlist
Since commit a852fa1d594f ("feat(arm): support boot info handoff and event log"), the arg0 doesn't includes TOS_FW_CONFIG fdt but HW_CONFIG fdt is passed via arg0 when SPMC_AT_EL3 build with TRANSFER_LIST option.
To resolve this, get TOS_FW_CONFIG (sp manifest) properly saved in passed transfer list which saved with DT_FFA_MANIFEST tag.
Since delivered transfer list memory area is mapped when BL31 is initialized, omit the mapping the manifest code while initialize secure partition by spmc.
Change-Id: I3e02ca749a2b1828b171826a3829170001078d71 Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
show more ...
|
| bc3014a8 | 07-Apr-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(fvp): tos_fw_config with transfer list
To load bl32's secure parition, tos_fw_config should be passed via transfer list with DT_FFA_MANIFEST entry.
For this: 1. define PLAT_ARM_SPMC_SP_MANIF
feat(fvp): tos_fw_config with transfer list
To load bl32's secure parition, tos_fw_config should be passed via transfer list with DT_FFA_MANIFEST entry.
For this: 1. define PLAT_ARM_SPMC_SP_MANIFEST_SIZE with PAGE_SIZE taken from PLAT_ARM_HW_CONFIG_SIZE by reducing it as amount of PLAT_ARM_SPMC_SP_MANIFEST_SIZE.
2. increase HAND_OFF transfer list size as much as PLAT_ARM_SPMC_SP_MANIFEST_SIZE.
Change-Id: I56be7783ee4d257e33148f1f623a64bc498f1955 Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
show more ...
|
| 00c353c4 | 07-Apr-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(arm): load tos_fw_cfg using xferlist in SPMC_AT_EL3
Load tos_fw_cfg when SPMC_AT_EL3 enabled and deliver its manifest via transfer list and set its address in entrypoint's arg0 to load it prope
feat(arm): load tos_fw_cfg using xferlist in SPMC_AT_EL3
Load tos_fw_cfg when SPMC_AT_EL3 enabled and deliver its manifest via transfer list and set its address in entrypoint's arg0 to load it properly by spmc_setup().
Change-Id: I43490d0bbe8288701efcce93313838395d41f330 Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
show more ...
|
| b1f527ab | 08-Apr-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(fvp): increase secure partition's table mapping count
For tpm event log event region passed to SP, increase table mapping count.
Change-Id: Ie9f899a611b6715ea9a8bd3f532774d3f8f6955e Signed-off
feat(fvp): increase secure partition's table mapping count
For tpm event log event region passed to SP, increase table mapping count.
Change-Id: Ie9f899a611b6715ea9a8bd3f532774d3f8f6955e Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
show more ...
|
| 25688b87 | 08-Apr-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(fvp): increase bl2 mmap tables for handoff
With firmware handoff and SPMC_AT_EL3, the BL2 translation tables need to be one entry longer than they currently are. Increase the current max length
feat(fvp): increase bl2 mmap tables for handoff
With firmware handoff and SPMC_AT_EL3, the BL2 translation tables need to be one entry longer than they currently are. Increase the current max length by this much to allow to build these two configurations together.
Change-Id: Ifaeee5010143b53ba4f43c45011eaa8a28456bc5 Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
show more ...
|
| dbc203d8 | 01-Aug-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(fvp): increase xtable for pseudo CRB for SPM_MM" into integration |
| d42144a2 | 29-Jul-2025 |
Andre Przywara <andre.przywara@arm.com> |
fix(build): fix Makefile syntax in constraints helpers
Make is notoriously picky about tabs vs. spaces at the beginning of a line, and some error paths in our Makefile helpers are suffering from thi
fix(build): fix Makefile syntax in constraints helpers
Make is notoriously picky about tabs vs. spaces at the beginning of a line, and some error paths in our Makefile helpers are suffering from this.
Replace the indentation by tabs with spaces when it's not a (shell) recipe, to fix the error reporting in some cases:
$ make PLAT=fvp ENABLE_SPMD_LP=1 SPMC_AT_EL3=1 make_helpers/constraints.mk:54: *** recipe commences before first target. Stop.
Change-Id: Ie8c49c8535e4b9b968d808113aa72b9dafeef906 Signed-off-by: Andre Przywara <andre.przywara@arm.com>
show more ...
|
| 85694560 | 08-Jul-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(fvp): increase xtable for pseudo CRB for SPM_MM
As normal pseudo CRB is allocated in DRAM1 area, spmc running with SPM_MM need more subtable to map this area. So, increase PLAT_SP_IMAGE_MAX_XLA
feat(fvp): increase xtable for pseudo CRB for SPM_MM
As normal pseudo CRB is allocated in DRAM1 area, spmc running with SPM_MM need more subtable to map this area. So, increase PLAT_SP_IMAGE_MAX_XLAT_TABLES
Change-Id: If48e2eb90e3d4319b0588e4467f2bda0fbaf9a64 Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
show more ...
|