| eab1ed54 | 29-Apr-2024 |
Rakshit Goyal <rakshit.goyal@arm.com> |
feat(arm): add a macro for SPMC manifest base address
In RESET_TO_BL31, the SPMC manifest base address that is utilized by bl32_image_ep_info has to be statically defined as DT is not available. Com
feat(arm): add a macro for SPMC manifest base address
In RESET_TO_BL31, the SPMC manifest base address that is utilized by bl32_image_ep_info has to be statically defined as DT is not available. Common arm code sets this to the top of SRAM using macros but it can be different for some platforms. Hence, introduce the macro PLAT_ARM_SPMC_MANIFEST_BASE that could be re-defined by platform as per their use-case. Platforms that utilize arm_def.h would use the existing value from arm common code.
Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I4491749ad2b5794e06c9bd11ff61e2e64f21a948
show more ...
|
| c0893d3f | 05-Feb-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(arm): create build directory before key generation" into integration |
| 8f7d9bfa | 05-Feb-2025 |
Gavin Liu <gavin.liu@mediatek.com> |
fix(mt8196): add whole-archive option to prebuilt library
Added `-Wl,--whole-archive` option to the LDLIBS in the platfrom.mk to ensure that the symbols within the library are not stripped during th
fix(mt8196): add whole-archive option to prebuilt library
Added `-Wl,--whole-archive` option to the LDLIBS in the platfrom.mk to ensure that the symbols within the library are not stripped during the linking process.
Change-Id: I35c728d3ccc98489183285a96f703e02dc7505d3 Signed-off-by: Gavin Liu <gavin.liu@mediatek.com>
show more ...
|
| 0c370e2d | 04-Feb-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge "feat(mt8196): add SMMU driver for PM" into integration |
| 8a7dcf97 | 04-Feb-2025 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "fix(rdn2): correct RD-N2 StMM uuid format" into integration |
| 51eb5281 | 04-Feb-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "chore(dependabot): limit LTS branches to patch updates" into integration |
| 6fb8d8cf | 06-Dec-2024 |
Jerry Wang <Jerry.Wang4@arm.com> |
fix(rdn2): correct RD-N2 StMM uuid format
Edk2 converts StMM GUID to UUID format, which is used in FF-A and linux kernel. StMM manifest currently provides GUID format. Correcting this to UUID format
fix(rdn2): correct RD-N2 StMM uuid format
Edk2 converts StMM GUID to UUID format, which is used in FF-A and linux kernel. StMM manifest currently provides GUID format. Correcting this to UUID format.
Change-Id: Ie94728e5ea74d3d9935e0af9a2a601cbafe5ad3d Signed-off-by: Jerry Wang <Jerry.Wang4@arm.com>
show more ...
|
| 697290a9 | 04-Feb-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "us_tc_trng" into integration
* changes: feat(tc): get entropy with PSA Crypto API feat(psa): add interface with RSE for retrieving entropy fix(psa): guard Crypto APIs
Merge changes from topic "us_tc_trng" into integration
* changes: feat(tc): get entropy with PSA Crypto API feat(psa): add interface with RSE for retrieving entropy fix(psa): guard Crypto APIs with CRYPTO_SUPPORT feat(tc): enable trng feat(tc): initialize the RSE communication in earlier phase
show more ...
|
| 6823f5f5 | 02-Apr-2024 |
Rohit Mathew <rohit.mathew@arm.com> |
feat(rdv3): add carveout for BL32 image
Add and map the carveout for loading Hafnium as BL32 image. Also define PLAT_ARM_SP_MAX_SIZE as 3 MB for secure partitions.
Signed-off-by: Rohit Mathew <rohi
feat(rdv3): add carveout for BL32 image
Add and map the carveout for loading Hafnium as BL32 image. Also define PLAT_ARM_SP_MAX_SIZE as 3 MB for secure partitions.
Signed-off-by: Rohit Mathew <rohit.mathew@arm.com> Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I2845eb6807a127c9f6b92de2dabc9a58d25bd4d4
show more ...
|
| 4593b932 | 27-Jun-2024 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(rdv3): introduce platform handler for Group0 interrupt
This patch introduces a handler for RD-V3 variants to handle Group0 secure interrupts. Currently, it is empty but serves as a placeholder
feat(rdv3): introduce platform handler for Group0 interrupt
This patch introduces a handler for RD-V3 variants to handle Group0 secure interrupts. Currently, it is empty but serves as a placeholder for future Group0 interrupt sources.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: Ifa418094f6075a6cdc33e63eec1825103bbf6d68
show more ...
|
| 82f46593 | 27-Sep-2023 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(neoverse-rd): use larger stack size when S-EL2 spmc is enabled
Larger stack size is needed when S-EL2 SPMC is enabled. This is required because BL31 xlat map framework makes more nested calls w
feat(neoverse-rd): use larger stack size when S-EL2 spmc is enabled
Larger stack size is needed when S-EL2 SPMC is enabled. This is required because BL31 xlat map framework makes more nested calls when this feature is enabled.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: Ib3f2abf38b576ba96402dab4ba995d8b648b4cc7
show more ...
|
| 842ba2f2 | 27-Jan-2025 |
Rakshit Goyal <rakshit.goyal@arm.com> |
fix(neoverse-rd): set correct SVE vector lengths
Affected platforms: RD-N2, RD-V1, RD-V1-MC, RD-V3 and their configurations.
Previously, the SVE vector lengths for these platforms were being taken
fix(neoverse-rd): set correct SVE vector lengths
Affected platforms: RD-N2, RD-V1, RD-V1-MC, RD-V3 and their configurations.
Previously, the SVE vector lengths for these platforms were being taken from the default configuration. This commit updates their respective platform.mk files to specify the correct vector lengths.
Signed-off-by: Rakshit Goyal <rakshit.goyal@arm.com> Change-Id: I8919257e2cec5c0e819424ff44a623dc3ab1a368
show more ...
|
| aacdfdfe | 04-Feb-2025 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "fix(tc): enable Last-level cache (LLC) for tc4" into integration |
| 269be518 | 04-Feb-2025 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "feat(tc): update CPU PMU nodes for tc4" into integration |
| dd5e4f99 | 04-Feb-2025 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes I105cd219,Ie870a7f3 into integration
* changes: feat(tc): add SLC MSC nodes to TC4 DT refactor(tc): clarify msc0 DT node |
| a0883e9e | 04-Feb-2025 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "refactor(bl32): flush before console switch state" into integration |
| 8f0235fb | 31-Jan-2025 |
Leo Yan <leo.yan@arm.com> |
feat(tc): get entropy with PSA Crypto API
The PSA Crypto API is available with sending messages to RSE. Change to invoke PSA Crypto API for getting entropy.
Change-Id: I4b2dc4eb99606c2425b64949d9c
feat(tc): get entropy with PSA Crypto API
The PSA Crypto API is available with sending messages to RSE. Change to invoke PSA Crypto API for getting entropy.
Change-Id: I4b2dc4eb99606c2425b64949d9c3f5c576883758 Signed-off-by: Leo Yan <leo.yan@arm.com> Signed-off-by: Icen Zeyada <Icen.Zeyada2@arm.com>
show more ...
|
| 1147a470 | 31-Jan-2025 |
Leo Yan <leo.yan@arm.com> |
feat(psa): add interface with RSE for retrieving entropy
Add the AP/RSS interface for reading the entropy. And update the document for the API.
Change-Id: I61492d6b5d824a01ffeadc92f9d41ca841ba3367
feat(psa): add interface with RSE for retrieving entropy
Add the AP/RSS interface for reading the entropy. And update the document for the API.
Change-Id: I61492d6b5d824a01ffeadc92f9d41ca841ba3367 Signed-off-by: Leo Yan <leo.yan@arm.com> Signed-off-by: Icen Zeyada <Icen.Zeyada2@arm.com>
show more ...
|
| 8a41106c | 31-Jan-2025 |
Leo Yan <leo.yan@arm.com> |
fix(psa): guard Crypto APIs with CRYPTO_SUPPORT
When building Crypto APIs, it requires dependency on external headers, e.g., Mbedtls headers. Without the CRYPTO_SUPPORT configuration, external depe
fix(psa): guard Crypto APIs with CRYPTO_SUPPORT
When building Crypto APIs, it requires dependency on external headers, e.g., Mbedtls headers. Without the CRYPTO_SUPPORT configuration, external dependencies are not set up, building Crypto APIs will fail.
Guard Crypto APIs with the CRYPTO_SUPPORT configuration, to make sure the code is built only for Crypto enabled case.
Change-Id: Iffe1220b0e6272586c46432b4f8d0512cb39b0b5 Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| 2ae197ac | 16-May-2024 |
Leo Yan <leo.yan@arm.com> |
feat(tc): enable trng
Enable the trng on the platform, which can be used by other features. `rng-seed` has been removed and enabled `FEAT_RNG_TRAP` to trap to EL3 when accessing system registers RND
feat(tc): enable trng
Enable the trng on the platform, which can be used by other features. `rng-seed` has been removed and enabled `FEAT_RNG_TRAP` to trap to EL3 when accessing system registers RNDR and RNDRRS
Change-Id: Ibde39115f285e67d31b14863c75beaf37493deca Signed-off-by: Leo Yan <leo.yan@arm.com> Signed-off-by: Icen Zeyada <Icen.Zeyada2@arm.com>
show more ...
|
| 895d973d | 04-Feb-2025 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "fix(morello): remove stray white-space in 'morello/platform.mk'" into integration |
| 86dd08d8 | 30-Dec-2024 |
Yong Wu <yong.wu@mediatek.com> |
feat(mt8196): add SMMU driver for PM
Add MediaTek SMMU power driver. This driver tracks the reference counter for power domain access on SMMU hardware, including Multimedia SMMU and APU SMMU. The PM
feat(mt8196): add SMMU driver for PM
Add MediaTek SMMU power driver. This driver tracks the reference counter for power domain access on SMMU hardware, including Multimedia SMMU and APU SMMU. The PM get/put commands may come from linux(EL1) and hypervisor(EL2).
Change-Id: I60f83c4e3d87059b0549b2ed8c68367be3bfbbc5 Signed-off-by: Yong Wu <yong.wu@mediatek.com>
show more ...
|
| bfecea00 | 03-Feb-2025 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge changes from topic "gr/errata_ICH_VMCR_EL2" into integration
* changes: fix(cpus): workaround for Neoverse-V3 erratum 3701767 fix(cpus): workaround for Neoverse-N3 erratum 3699563 fix(cp
Merge changes from topic "gr/errata_ICH_VMCR_EL2" into integration
* changes: fix(cpus): workaround for Neoverse-V3 erratum 3701767 fix(cpus): workaround for Neoverse-N3 erratum 3699563 fix(cpus): workaround for Neoverse-N2 erratum 3701773 fix(cpus): workaround for Cortex-X925 erratum 3701747 fix(cpus): workaround for Cortex-X4 erratum 3701758 fix(cpus): workaround for Cortex-X3 erratum 3701769 fix(cpus): workaround for Cortex-X2 erratum 3701772 fix(cpus): workaround for Cortex-A725 erratum 3699564 fix(cpus): workaround for Cortex-A720-AE erratum 3699562 fix(cpus): workaround for Cortex-A720 erratum 3699561 fix(cpus): workaround for Cortex-A715 erratum 3699560 fix(cpus): workaround for Cortex-A710 erratum 3701772 fix(cpus): workaround for accessing ICH_VMCR_EL2 chore(cpus): fix incorrect header macro
show more ...
|
| e25fc9df | 22-Jan-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(cpus): workaround for Neoverse-V3 erratum 3701767
Neoverse-V3 erratum 3701767 that applies to r0p0, r0p1, r0p2 is still Open.
The workaround is for EL3 software that performs context save/resto
fix(cpus): workaround for Neoverse-V3 erratum 3701767
Neoverse-V3 erratum 3701767 that applies to r0p0, r0p1, r0p2 is still Open.
The workaround is for EL3 software that performs context save/restore on a change of Security state to use a value of SCR_EL3.NS when accessing ICH_VMCR_EL2 that reflects the Security state that owns the data being saved or restored.
SDEN documentation: https://developer.arm.com/documentation/SDEN-2891958/latest/
Change-Id: I5be0de881f408a9e82a07b8459d79490e9065f94 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| fded8392 | 22-Jan-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(cpus): workaround for Neoverse-N3 erratum 3699563
Neoverse-N3 erratum 3699563 that applies to r0p0 is still Open.
The workaround is for EL3 software that performs context save/restore on a chan
fix(cpus): workaround for Neoverse-N3 erratum 3699563
Neoverse-N3 erratum 3699563 that applies to r0p0 is still Open.
The workaround is for EL3 software that performs context save/restore on a change of Security state to use a value of SCR_EL3.NS when accessing ICH_VMCR_EL2 that reflects the Security state that owns the data being saved or restored.
SDEN documentation: https://developer.arm.com/documentation/SDEN-3050973/latest/
Change-Id: I77aaf8ae0afff3adde9a85f4a1a13ac9d1daf0af Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|