| ab0450f3 | 15-Apr-2024 |
Leo Yan <leo.yan@arm.com> |
refactor(tc): introduce a new macro ADDRESSIFY()
Now some macros (e.g., MHU_RX_ADDR(0x), MHU_TX_ADDR(0x), etc) add the prefix '0x' at the beginning of the addresses for hexadecimal values.
For bett
refactor(tc): introduce a new macro ADDRESSIFY()
Now some macros (e.g., MHU_RX_ADDR(0x), MHU_TX_ADDR(0x), etc) add the prefix '0x' at the beginning of the addresses for hexadecimal values.
For better readability, this patch introduces a new macro ADDRESSIFY(), which explictly adds the prefix '0x' for hexadecimal values. With this new macro, address macros can drop the parameter and be simplified to hexadecimal address value.
Change-Id: Idd1af0394f6ef8288fbff1fd4d86b1709d1c1d16 Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| 154eb0a2 | 29-Apr-2024 |
Leo Yan <leo.yan@arm.com> |
fix(tc): enable FEAT_MTE2
Commit c282384db ("refactor(mte): remove mte, mte_perm") removes the option FEAT_MTE and introduces FEAT_MTE2 option. Afterwards, the FEAT_MTE2 option is missed on the TC p
fix(tc): enable FEAT_MTE2
Commit c282384db ("refactor(mte): remove mte, mte_perm") removes the option FEAT_MTE and introduces FEAT_MTE2 option. Afterwards, the FEAT_MTE2 option is missed on the TC platform and the feature is disabled. As a result, it causes the panic in secure world.
This patch enables the FEAT_MTE2 option for TC platform to allow the secure world can access the MTE registers properly.
Change-Id: If697236aa59bf4fb374e0ff43b53455ac2154e9c Fixes: c282384db ("refactor(mte): remove mte, mte_perm") Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| 3d6c7e59 | 16-Apr-2024 |
Chris Kay <chris.kay@arm.com> |
build: improve diagnostics for unrecognized toolchain tools
Up until recently the build system accepted an arbitrary value for `AS` and, unbeknownst to anybody, was simply not making use of it. Rece
build: improve diagnostics for unrecognized toolchain tools
Up until recently the build system accepted an arbitrary value for `AS` and, unbeknownst to anybody, was simply not making use of it. Recent feedback has revealed that a number of contributors have `AS` explicitly configured to use the GNU assembler, which is not a supported assembler, and this breakage has yielded some cryptic error messages, e.g.:
aarch64-none-elf-as: unrecognized option '-x'
This change introduces human-readable diagnostics to help developers with diagnosing unsupported toolchain tools:
The configured AArch64 assembler could not be identified and may not be supported:
aarch64-none-elf-as
The default AArch64 assembler is:
aarch64-none-elf-gcc
The following tools are supported:
- Arm® Compiler for Embedded `armclang` - LLVM Clang (`clang`) - GNU GCC (`gcc`)
The build system will treat this assembler as GNU GCC (`gcc`).
Change-Id: I316036c83be2d45ee83a88846cf65c6ce7ae3c26 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 784092ee | 11-Mar-2024 |
Chris Kay <chris.kay@arm.com> |
build(rzg): separate BL2 and BL31 SREC generation
This small change creates individual Make non-phony targets for the Bl2 and BL31 SREC binaries to avoid rebuilding them unnecessarily.
Change-Id: I
build(rzg): separate BL2 and BL31 SREC generation
This small change creates individual Make non-phony targets for the Bl2 and BL31 SREC binaries to avoid rebuilding them unnecessarily.
Change-Id: Ia8e5db0e4a968d4b379fdb66123b6a8f20933bf5 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 4d1289bd | 11-Mar-2024 |
Chris Kay <chris.kay@arm.com> |
build(rcar): separate BL2 and BL31 SREC generation
This small change creates individual Make non-phony targets for the Bl2 and BL31 SREC binaries to avoid rebuilding them unnecessarily.
Change-Id:
build(rcar): separate BL2 and BL31 SREC generation
This small change creates individual Make non-phony targets for the Bl2 and BL31 SREC binaries to avoid rebuilding them unnecessarily.
Change-Id: Ibb8880bb5c00a0956fc78d252fcc56391fbfe439 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 7b453526 | 08-Mar-2024 |
Chris Kay <chris.kay@arm.com> |
build: separate preprocessing from DTB compilation
This is a small change to separate preprocessing of device tree sources into their own build step as opposed to combining them. The impact of this
build: separate preprocessing from DTB compilation
This is a small change to separate preprocessing of device tree sources into their own build step as opposed to combining them. The impact of this is more on separation of concerns than anything tangible, but it's helpful to avoid doing more than necessary in a build rule.
Change-Id: I770291bd9d9f627c93e82556a40f753bf27eef93 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 758ccb80 | 08-Mar-2024 |
Chris Kay <chris.kay@arm.com> |
build: remove `MAKE_BUILD_STRINGS` function
This function causes the build message to be generated and compiled in two different ways, with one way done inside `build_macros.mk` and the other done i
build: remove `MAKE_BUILD_STRINGS` function
This function causes the build message to be generated and compiled in two different ways, with one way done inside `build_macros.mk` and the other done inside `windows.mk`, mostly because it's done by generating the C file on the command line.
We can instead replace this whole build message generation sequence with a simple standard C compilation command and a normal C file.
Change-Id: I8bc136380c9585ddeec9a11154ee39ef70526f81 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 93a7a6d0 | 29-Apr-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(tc): increase stack size when TRUSTED_BOARD_BOOT=0" into integration |
| db2b34d1 | 29-Apr-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(tc): remove timer interrupt from G1S" into integration |
| 0c77651f | 26-Apr-2024 |
Karl Li <karl.li@mediatek.corp-partner.google.com> |
feat(mt8188): remove apusys kernel handler usage constraints
It is expected that kernel can control the flow of the TF-A operations. This patch remove the apusys kernel handler usage constraints, ma
feat(mt8188): remove apusys kernel handler usage constraints
It is expected that kernel can control the flow of the TF-A operations. This patch remove the apusys kernel handler usage constraints, making the operations all controlled on kernel side.
Signed-off-by: Karl Li <karl.li@mediatek.com> Change-Id: Idc205a2cf23e1ff5f1920658a3b089c823f0288a
show more ...
|
| beefea8a | 29-Apr-2024 |
Jason Chen <Jason-ch.Chen@mediatek.com> |
docs(maintainers): remove a maintainer for MediaTek SoCs
Change-Id: I56649f80de0a02919befcb42e15847ceb37b1308 Signed-off-by: Jason Chen <Jason-ch.Chen@mediatek.com> |
| 6704cba2 | 26-Mar-2024 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
fix(intel): add in watchdog for QSPI driver
ATF->Linux boot with QSPI boot source need to enable watchdog so that it will not hang.
Change-Id: Id2a9ceebb1c89f711992a424f4394265efc6b388 Signed-off-b
fix(intel): add in watchdog for QSPI driver
ATF->Linux boot with QSPI boot source need to enable watchdog so that it will not hang.
Change-Id: Id2a9ceebb1c89f711992a424f4394265efc6b388 Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
show more ...
|
| 44ddee6f | 20-Dec-2023 |
Alex Dobrescu <alex.dobrescu@arm.com> |
fix(tc): increase stack size when TRUSTED_BOARD_BOOT=0
The stack is too small for VERBOSE logging when secure world is disabled as there is a recursive call when printing the translation table state
fix(tc): increase stack size when TRUSTED_BOARD_BOOT=0
The stack is too small for VERBOSE logging when secure world is disabled as there is a recursive call when printing the translation table state which causes a crash.
Changing the stack to the same value regardless of trusted boot.
Change-Id: I12298b33e47ae5206f74370262edce06b8a75d99 Signed-off-by: Alex Dobrescu <alex.dobrescu@arm.com> Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|
| a1901c7d | 26-Apr-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "rss_rse_rename" into integration
* changes: refactor(changelog): change all occurrences of RSS to RSE refactor(qemu): change all occurrences of RSS to RSE refactor(fv
Merge changes from topic "rss_rse_rename" into integration
* changes: refactor(changelog): change all occurrences of RSS to RSE refactor(qemu): change all occurrences of RSS to RSE refactor(fvp): change all occurrences of RSS to RSE refactor(fiptool): change all occurrences of RSS to RSE refactor(psa): change all occurrences of RSS to RSE refactor(fvp): remove leftovers from rss measured boot support refactor(tc): change all occurrences of RSS to RSE docs: change all occurrences of RSS to RSE refactor(measured-boot): change all occurrences of RSS to RSE refactor(rse): change all occurrences of RSS to RSE refactor(psa): rename all 'rss' files to 'rse' refactor(tc): rename all 'rss' files to 'rse' docs: rename all 'rss' files to 'rse' refactor(measured-boot): rename all 'rss' files to 'rse' refactor(rss): rename all 'rss' files to 'rse'
show more ...
|
| f9d40b5c | 26-Apr-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "hm/handoff" into integration
* changes: feat(handoff): add support for RESET_TO_BL2 feat(arm): support FW handoff b/w BL1 & BL2 feat(handoff): add TL source files to
Merge changes from topic "hm/handoff" into integration
* changes: feat(handoff): add support for RESET_TO_BL2 feat(arm): support FW handoff b/w BL1 & BL2 feat(handoff): add TL source files to BL1 feat(handoff): add TE's for BL1 handoff interface refactor(bl1): clean up bl2 layout calculation feat(arm): support FW handoff b/w BL2 & BL31
show more ...
|
| 97e7cfb8 | 26-Apr-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "refactor(docs): restructure min requirements section" into integration |
| 3d9fea94 | 18-Jan-2024 |
Sascha Hauer <s.hauer@pengutronix.de> |
feat(imx8mp): optionally take params from BL2
Optionally take params from BL2 to offer more flexibility to BL2 on where and if a BL32 image is expected. This uses imx_bl31_params_parse() to check if
feat(imx8mp): optionally take params from BL2
Optionally take params from BL2 to offer more flexibility to BL2 on where and if a BL32 image is expected. This uses imx_bl31_params_parse() to check if arg0 can safely be accessed as a pointer and actually contains a bl_params_t structure. If not, the hardcoded parameter values are used as before.
Change-Id: I44537ba2baa7543e459e5691b69df14b0bd6e942 Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
show more ...
|
| c37a877e | 18-Jan-2024 |
Sascha Hauer <s.hauer@pengutronix.de> |
feat(imx8mn): optionally take params from BL2
Optionally take params from BL2 to offer more flexibility to BL2 on where and if a BL32 image is expected. This uses imx_bl31_params_parse() to check if
feat(imx8mn): optionally take params from BL2
Optionally take params from BL2 to offer more flexibility to BL2 on where and if a BL32 image is expected. This uses imx_bl31_params_parse() to check if arg0 can safely be accessed as a pointer and actually contains a bl_params_t structure. If not, the hardcoded parameter values are used as before.
Change-Id: Ia12d35778f4d550860e517f2a1f5c5d062f3283a Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
show more ...
|
| 11d32b33 | 18-Jan-2024 |
Sascha Hauer <s.hauer@pengutronix.de> |
feat(imx8mm): optionally take params from BL2
Optionally take params from BL2 to offer more flexibility to BL2 on where and if a BL32 image is expected. This uses imx_bl31_params_parse() to check if
feat(imx8mm): optionally take params from BL2
Optionally take params from BL2 to offer more flexibility to BL2 on where and if a BL32 image is expected. This uses imx_bl31_params_parse() to check if arg0 can safely be accessed as a pointer and actually contains a bl_params_t structure. If not, the hardcoded parameter values are used as before.
Change-Id: I06b3012c67e43ea1e42946d863226bd93ccd4638 Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
show more ...
|
| 02d1813e | 18-Jan-2024 |
Sascha Hauer <s.hauer@pengutronix.de> |
feat(imx93): optionally take params from BL2
Optionally take params from BL2 to offer more flexibility to BL2 on where and if a BL32 image is expected. This uses imx_bl31_params_parse() to check if
feat(imx93): optionally take params from BL2
Optionally take params from BL2 to offer more flexibility to BL2 on where and if a BL32 image is expected. This uses imx_bl31_params_parse() to check if arg0 can safely be accessed as a pointer and actually contains a bl_params_t structure. If not, the hardcoded parameter values are used as before.
Change-Id: Iec885405efd31a6bf6c0e6c532f8d2f31c023333 Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
show more ...
|
| 7eae1db0 | 18-Jan-2024 |
Sascha Hauer <s.hauer@pengutronix.de> |
feat(imx): add helper to take params from BL2
So far the i.MX BL31 doesn't take any parameters. This means the BL32 image base address and whether or not a BL32 image is used at all has to be hardco
feat(imx): add helper to take params from BL2
So far the i.MX BL31 doesn't take any parameters. This means the BL32 image base address and whether or not a BL32 image is used at all has to be hardcoded in BL31.
This adds a helper function that allows to take params from BL2 safely. On i.MX BL2 is usually U-Boot SPL which passes random values in arg0, so make sure arg0 is within the internal SRAM range before accessing it as a pointer. Also make sure arg0 is sufficiently aligned and the header type and version is correct.
Change-Id: Idab8013a1d6dabf50a83c75f3e6f831de4a537e9 Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
show more ...
|
| f019c801 | 23-Apr-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(handoff): add support for RESET_TO_BL2
When BL2 is enabled as the entrypoint in the reset vector, none of the TL initialisation ordinarily performed in BL1 will have been done. This change ensu
feat(handoff): add support for RESET_TO_BL2
When BL2 is enabled as the entrypoint in the reset vector, none of the TL initialisation ordinarily performed in BL1 will have been done. This change ensures that BL2 has a secure TL to pass information onto BL31 through.
Change-Id: I553b0b7aac9390cd6a2d63471b81ddc72cc40a60 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 9c11ed7e | 22-Dec-2023 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(arm): support FW handoff b/w BL1 & BL2
Leverage the framework between BL1 and BL2. Migrate all handoff structures to the TL.
Change-Id: I79ff3a319596b5656184cde10b5204b10a4d03bb Signed-off-by:
feat(arm): support FW handoff b/w BL1 & BL2
Leverage the framework between BL1 and BL2. Migrate all handoff structures to the TL.
Change-Id: I79ff3a319596b5656184cde10b5204b10a4d03bb Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 469b1d84 | 26-Apr-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(handoff): add TL source files to BL1
Change-Id: Id9843ba0ccfb448cf17e09e0659b743741ae01ac Signed-off-by: Harrison Mutai <harrison.mutai@arm.com> |
| 0646c9b2 | 04-Jan-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(handoff): add TE's for BL1 handoff interface
`TL_TAG_RW_MEM_LAYOUT64` encapsulates a structure used to represent the layout of a region of memory on 64-bit platforms [2]. In TF-A this is used t
feat(handoff): add TE's for BL1 handoff interface
`TL_TAG_RW_MEM_LAYOUT64` encapsulates a structure used to represent the layout of a region of memory on 64-bit platforms [2]. In TF-A this is used to represent the `meminfo_t` structure passed between BL1 and BL2, which provides BL2 with information about the space it has available in BL2. The `TL_TAG_TB_FW_CONFIG` entry type encapsulates the trusted bootloader firmware configuration [1].
[1] https://github.com/FirmwareHandoff/firmware_handoff/pull/37 [2] https://github.com/FirmwareHandoff/firmware_handoff/pull/36
Change-Id: I1e0eeec2ec204e469896490d42a9dce9b1b2f209 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|