| e7d344de | 16-Aug-2020 |
Alexei Fedorov <Alexei.Fedorov@arm.com> |
libc/memset: Implement function in assembler
Trace analysis of FVP_Base_AEMv8A model running in Aarch32 mode with the build options listed below: TRUSTED_BOARD_BOOT=1 GENERATE_COT=1 ARM_ROTPK_LOCATI
libc/memset: Implement function in assembler
Trace analysis of FVP_Base_AEMv8A model running in Aarch32 mode with the build options listed below: TRUSTED_BOARD_BOOT=1 GENERATE_COT=1 ARM_ROTPK_LOCATION=devel_ecdsa KEY_ALG=ecdsa ROT_KEY=plat/arm/board/common/rotpk/arm_rotprivk_ecdsa.pem shows that when auth_signature() gets called 71.84% of CPU execution time is spent in memset() function written in C using single byte write operations, see lib\libc\memset.c. This patch replaces C memset() implementation with assembler version giving the following results: - for Aarch32 in auth_signature() call memset() CPU time reduced to 24.84%. - Number of CPU instructions executed during TF-A boot stage before start of BL33 in RELEASE builds: ---------------------------------------------- | Arch | C | assembler | % | ---------------------------------------------- | Aarch32 | 2073275460 | 1487400003 | -28.25 | | Aarch64 | 2056807158 | 1244898303 | -39.47 | ---------------------------------------------- The patch also replaces memset.c with aarch64/memset.S in plat\nvidia\tegra\platform.mk.
Change-Id: Ifbf085a2f577a25491e2d28446ee95a4ac891597 Signed-off-by: Alexei Fedorov <Alexei.Fedorov@arm.com>
show more ...
|
| e268ea27 | 19-Aug-2020 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "SPM: Change condition on saving/restoring EL2 registers" into integration |
| 9de91c75 | 17-Jul-2020 |
Ruari Phipps <ruari.phipps@arm.com> |
SPM: Add third cactus partition to manifests
Add information about the third partition so it can be loaded into SPM when running the tests
Signed-off-by: Ruari Phipps <ruari.phipps@arm.com> Change-
SPM: Add third cactus partition to manifests
Add information about the third partition so it can be loaded into SPM when running the tests
Signed-off-by: Ruari Phipps <ruari.phipps@arm.com> Change-Id: I5544e88df391ef294ddf6b5750d468d3e74892b1
show more ...
|
| 6b704da3 | 28-Jul-2020 |
Ruari Phipps <ruari.phipps@arm.com> |
SPM: Change condition on saving/restoring EL2 registers
Make this more scalable by explicitly checking internal and hardware states at run_time
Signed-off-by: Ruari Phipps <ruari.phipps@arm.com> Ch
SPM: Change condition on saving/restoring EL2 registers
Make this more scalable by explicitly checking internal and hardware states at run_time
Signed-off-by: Ruari Phipps <ruari.phipps@arm.com> Change-Id: I1c6ed1c1badb3538a93bff3ac5b5189b59cccfa1
show more ...
|
| 572dea85 | 19-Aug-2020 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "plat: qti: Fix build failure" into integration |
| a3b50044 | 19-Aug-2020 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes Ic701675c,Ie55e25c8 into integration
* changes: plat: imx8m: Correct the imr mask reg offset plat: imx8m: Keep A53 PLAT on in wait mode(ret) |
| fb9212be | 22-Jul-2020 |
Jacky Bai <ping.bai@nxp.com> |
plat: imx8m: Correct the imr mask reg offset
The number of gpc imr mask reg & the offset is different on some SOC, so correct it & replace the magic number with macro define.
Signed-off-by: Jacky B
plat: imx8m: Correct the imr mask reg offset
The number of gpc imr mask reg & the offset is different on some SOC, so correct it & replace the magic number with macro define.
Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: Ic701675cdd92e043dcd7f06722f2e871068aec74
show more ...
|
| 9eb1bb63 | 09-Dec-2019 |
Jacky Bai <ping.bai@nxp.com> |
plat: imx8m: Keep A53 PLAT on in wait mode(ret)
Keep A53 PLAT(SCU) power domain on in wait mode(ret). RBC count only need to be set in PLAT OFF mode, so change it accordingly.
Signed-off-by: Jacky
plat: imx8m: Keep A53 PLAT on in wait mode(ret)
Keep A53 PLAT(SCU) power domain on in wait mode(ret). RBC count only need to be set in PLAT OFF mode, so change it accordingly.
Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: Ie55e25c8210d298506fc4dca7a9653583db45e0c
show more ...
|
| 9ce37110 | 19-Aug-2020 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "qemu/qemu_sbsa: enable SPM support" into integration |
| 38294532 | 19-Aug-2020 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "tegra-downstream-07092020" into integration
* changes: Tegra: platform: add function to check t194 chip Tegra: common: make plat_psci_ops routines static |
| 5a32a033 | 19-Aug-2020 |
Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com> |
intel: platform: Include GICv2 makefile
This patch update each Intel's platform makefiles to include GICv2 makefile instead of manually sourcing individual c files. This aligns with latest changes f
intel: platform: Include GICv2 makefile
This patch update each Intel's platform makefiles to include GICv2 makefile instead of manually sourcing individual c files. This aligns with latest changes from commit #1322dc94f7.
Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com> Change-Id: Ib1f446a6fc578f73a9ef86f9708ddf12d7d75f48
show more ...
|
| 43d22073 | 06-Aug-2019 |
David Pu <dpu@nvidia.com> |
Tegra: platform: add function to check t194 chip
This patch adds tegra_chipid_is_t194() function to check if it is a Tegra 194 chip.
Change-Id: I6da6d3a2c9676b748931e42fde1b174cbcb4fd40 Signed-off-
Tegra: platform: add function to check t194 chip
This patch adds tegra_chipid_is_t194() function to check if it is a Tegra 194 chip.
Change-Id: I6da6d3a2c9676b748931e42fde1b174cbcb4fd40 Signed-off-by: David Pu <dpu@nvidia.com>
show more ...
|
| 57e92daf | 08-Aug-2019 |
David Pu <dpu@nvidia.com> |
Tegra: common: make plat_psci_ops routines static
This patch makes Tegra platform psci ops routines to static. These routines are called by PSCI framework and no external linkage is necessary. This
Tegra: common: make plat_psci_ops routines static
This patch makes Tegra platform psci ops routines to static. These routines are called by PSCI framework and no external linkage is necessary. This patch also fixes MISRA C-2012 Rule 8.6 violations.
Change-Id: Idd2381809f76dc0fd578c1c92c0f8eea124f2e88 Signed-off-by: David Pu <dpu@nvidia.com>
show more ...
|
| 6a2426a9 | 11-Jun-2020 |
Masahisa Kojima <masahisa.kojima@linaro.org> |
qemu/qemu_sbsa: enable SPM support
Enable the spm_mm framework for the qemu_sbsa platform. Memory layout required for spm_mm is created in secure SRAM.
Co-developed-by: Fu Wei <fu.wei@linaro.org> S
qemu/qemu_sbsa: enable SPM support
Enable the spm_mm framework for the qemu_sbsa platform. Memory layout required for spm_mm is created in secure SRAM.
Co-developed-by: Fu Wei <fu.wei@linaro.org> Signed-off-by: Fu Wei <fu.wei@linaro.org> Signed-off-by: Masahisa Kojima <masahisa.kojima@linaro.org> Change-Id: I104a623e8bc1e44d035b95f014a13b3f8b33a62a
show more ...
|
| 3ee8e4d8 | 18-Aug-2020 |
Alexei Fedorov <Alexei.Fedorov@arm.com> |
Merge "runtime_exceptions: Update AT speculative workaround" into integration |
| faf7713c | 18-Aug-2020 |
Alexei Fedorov <Alexei.Fedorov@arm.com> |
Merge "el3_runtime: Rearrange context offset of EL1 sys registers" into integration |
| e4ded0c6 | 18-Aug-2020 |
Alexei Fedorov <Alexei.Fedorov@arm.com> |
Merge "el3_runtime: Update context save and restore routines for EL1 and EL2" into integration |
| 6b76d1e9 | 18-Aug-2020 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "soc-id" into integration
* changes: plat/arm: juno: Implement methods to retrieve soc-id information plat/arm: fvp: Implement methods to retrieve soc-id information p
Merge changes from topic "soc-id" into integration
* changes: plat/arm: juno: Implement methods to retrieve soc-id information plat/arm: fvp: Implement methods to retrieve soc-id information plat/arm: remove common code for soc-id feature
show more ...
|
| e008a29a | 31-Jul-2020 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
doc: Update description for AT speculative workaround
Documented the CPU specific build macros created for AT speculative workaround.
Updated the description of 'ERRATA_SPECULATIVE_AT' errata worka
doc: Update description for AT speculative workaround
Documented the CPU specific build macros created for AT speculative workaround.
Updated the description of 'ERRATA_SPECULATIVE_AT' errata workaround option.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: Ie46a80d4e8183c1d5c8b153f08742a04d41a2af2
show more ...
|
| 3b8456bd | 23-Jul-2020 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
runtime_exceptions: Update AT speculative workaround
As per latest mailing communication [1], we decided to update AT speculative workaround implementation in order to disable page table walk for lo
runtime_exceptions: Update AT speculative workaround
As per latest mailing communication [1], we decided to update AT speculative workaround implementation in order to disable page table walk for lower ELs(EL1 or EL0) immediately after context switching to EL3 from lower ELs.
Previous implementation of AT speculative workaround is available here: 45aecff00
AT speculative workaround is updated as below: 1. Avoid saving and restoring of SCTLR and TCR registers for EL1 in context save and restore routine respectively. 2. On EL3 entry, save SCTLR and TCR registers for EL1. 3. On EL3 entry, update EL1 system registers to disable stage 1 page table walk for lower ELs (EL1 and EL0) and enable EL1 MMU. 4. On EL3 exit, restore SCTLR and TCR registers for EL1 which are saved in step 2.
[1]: https://lists.trustedfirmware.org/pipermail/tf-a/2020-July/000586.html
Change-Id: Iee8de16f81dc970a8f492726f2ddd57e7bd9ffb5 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| cb55615c | 28-Jul-2020 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
el3_runtime: Rearrange context offset of EL1 sys registers
SCTLR and TCR registers of EL1 plays role in enabling/disabling of page table walk for lower ELs (EL0 and EL1). Hence re-arranged EL1 conte
el3_runtime: Rearrange context offset of EL1 sys registers
SCTLR and TCR registers of EL1 plays role in enabling/disabling of page table walk for lower ELs (EL0 and EL1). Hence re-arranged EL1 context offsets to have SCTLR and TCR registers values one after another in the stack so that these registers values can be saved and restored using stp and ldp instruction respectively.
Change-Id: Iaa28fd9eba82a60932b6b6d85ec8857a9acd5f8b Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| e1c49333 | 03-Aug-2020 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
lib/cpus: Report AT speculative erratum workaround
Reported the status (applies, missing) of AT speculative workaround which is applicable for below CPUs.
+---------+--------------+ | Errata |
lib/cpus: Report AT speculative erratum workaround
Reported the status (applies, missing) of AT speculative workaround which is applicable for below CPUs.
+---------+--------------+ | Errata | CPU | +=========+==============+ | 1165522 | Cortex-A76 | +---------+--------------+ | 1319367 | Cortex-A72 | +---------+--------------+ | 1319537 | Cortex-A57 | +---------+--------------+ | 1530923 | Cortex-A55 | +---------+--------------+ | 1530924 | Cortex-A53 | +---------+--------------+
Also, changes are done to enable common macro 'ERRATA_SPECULATIVE_AT' if AT speculative errata workaround is enabled for any of the above CPUs using 'ERRATA_*' CPU specific build macro.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: I3e6a5316a2564071f3920c3ce9ae9a29adbe435b
show more ...
|
| 86ba5853 | 14-Jul-2020 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
Add wrapper for AT instruction
In case of AT speculative workaround applied, page table walk is disabled for lower ELs (EL1 and EL0) in EL3. Hence added a wrapper function which temporarily enables
Add wrapper for AT instruction
In case of AT speculative workaround applied, page table walk is disabled for lower ELs (EL1 and EL0) in EL3. Hence added a wrapper function which temporarily enables page table walk to execute AT instruction for lower ELs and then disables page table walk.
Execute AT instructions directly for lower ELs (EL1 and EL0) assuming page table walk is enabled always when AT speculative workaround is not applied.
Change-Id: I4ad4c0bcbb761448af257e9f72ae979473c0dde8 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| fb2072b0 | 28-Jul-2020 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
el3_runtime: Update context save and restore routines for EL1 and EL2
As per latest mailing communication [1], we decided not to update SCTLR and TCR registers in EL1 and EL2 context restore routine
el3_runtime: Update context save and restore routines for EL1 and EL2
As per latest mailing communication [1], we decided not to update SCTLR and TCR registers in EL1 and EL2 context restore routine when AT speculative workaround is enabled hence reverted the changes done as part of this commit: 45aecff00.
[1]: https://lists.trustedfirmware.org/pipermail/tf-a/2020-July/000586.html
Change-Id: I8c5f31d81fcd53770a610e302a5005d98772b71f Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 3f34663f | 04-Aug-2020 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
plat/arm: juno: Implement methods to retrieve soc-id information
Implemented platform functions to retrieve the soc-id information for juno platform
Change-Id: Ie677120710b45e202a2d63a954459ece8a64
plat/arm: juno: Implement methods to retrieve soc-id information
Implemented platform functions to retrieve the soc-id information for juno platform
Change-Id: Ie677120710b45e202a2d63a954459ece8a64b353 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|