History log of /rk3399_ARM-atf/ (Results 3726 – 3750 of 18314)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
ab0450f315-Apr-2024 Leo Yan <leo.yan@arm.com>

refactor(tc): introduce a new macro ADDRESSIFY()

Now some macros (e.g., MHU_RX_ADDR(0x), MHU_TX_ADDR(0x), etc) add the
prefix '0x' at the beginning of the addresses for hexadecimal values.

For bett

refactor(tc): introduce a new macro ADDRESSIFY()

Now some macros (e.g., MHU_RX_ADDR(0x), MHU_TX_ADDR(0x), etc) add the
prefix '0x' at the beginning of the addresses for hexadecimal values.

For better readability, this patch introduces a new macro ADDRESSIFY(),
which explictly adds the prefix '0x' for hexadecimal values. With this
new macro, address macros can drop the parameter and be simplified to
hexadecimal address value.

Change-Id: Idd1af0394f6ef8288fbff1fd4d86b1709d1c1d16
Signed-off-by: Leo Yan <leo.yan@arm.com>

show more ...

154eb0a229-Apr-2024 Leo Yan <leo.yan@arm.com>

fix(tc): enable FEAT_MTE2

Commit c282384db ("refactor(mte): remove mte, mte_perm") removes the
option FEAT_MTE and introduces FEAT_MTE2 option. Afterwards, the
FEAT_MTE2 option is missed on the TC p

fix(tc): enable FEAT_MTE2

Commit c282384db ("refactor(mte): remove mte, mte_perm") removes the
option FEAT_MTE and introduces FEAT_MTE2 option. Afterwards, the
FEAT_MTE2 option is missed on the TC platform and the feature is
disabled. As a result, it causes the panic in secure world.

This patch enables the FEAT_MTE2 option for TC platform to allow the
secure world can access the MTE registers properly.

Change-Id: If697236aa59bf4fb374e0ff43b53455ac2154e9c
Fixes: c282384db ("refactor(mte): remove mte, mte_perm")
Signed-off-by: Leo Yan <leo.yan@arm.com>

show more ...

3d6c7e5916-Apr-2024 Chris Kay <chris.kay@arm.com>

build: improve diagnostics for unrecognized toolchain tools

Up until recently the build system accepted an arbitrary value for `AS`
and, unbeknownst to anybody, was simply not making use of it. Rece

build: improve diagnostics for unrecognized toolchain tools

Up until recently the build system accepted an arbitrary value for `AS`
and, unbeknownst to anybody, was simply not making use of it. Recent
feedback has revealed that a number of contributors have `AS` explicitly
configured to use the GNU assembler, which is not a supported assembler,
and this breakage has yielded some cryptic error messages, e.g.:

aarch64-none-elf-as: unrecognized option '-x'

This change introduces human-readable diagnostics to help developers
with diagnosing unsupported toolchain tools:

The configured AArch64 assembler could not be identified and may not
be supported:

aarch64-none-elf-as

The default AArch64 assembler is:

aarch64-none-elf-gcc

The following tools are supported:

- Arm® Compiler for Embedded `armclang`
- LLVM Clang (`clang`)
- GNU GCC (`gcc`)

The build system will treat this assembler as GNU GCC (`gcc`).

Change-Id: I316036c83be2d45ee83a88846cf65c6ce7ae3c26
Signed-off-by: Chris Kay <chris.kay@arm.com>

show more ...

784092ee11-Mar-2024 Chris Kay <chris.kay@arm.com>

build(rzg): separate BL2 and BL31 SREC generation

This small change creates individual Make non-phony targets for the Bl2
and BL31 SREC binaries to avoid rebuilding them unnecessarily.

Change-Id: I

build(rzg): separate BL2 and BL31 SREC generation

This small change creates individual Make non-phony targets for the Bl2
and BL31 SREC binaries to avoid rebuilding them unnecessarily.

Change-Id: Ia8e5db0e4a968d4b379fdb66123b6a8f20933bf5
Signed-off-by: Chris Kay <chris.kay@arm.com>

show more ...

4d1289bd11-Mar-2024 Chris Kay <chris.kay@arm.com>

build(rcar): separate BL2 and BL31 SREC generation

This small change creates individual Make non-phony targets for the Bl2
and BL31 SREC binaries to avoid rebuilding them unnecessarily.

Change-Id:

build(rcar): separate BL2 and BL31 SREC generation

This small change creates individual Make non-phony targets for the Bl2
and BL31 SREC binaries to avoid rebuilding them unnecessarily.

Change-Id: Ibb8880bb5c00a0956fc78d252fcc56391fbfe439
Signed-off-by: Chris Kay <chris.kay@arm.com>

show more ...

7b45352608-Mar-2024 Chris Kay <chris.kay@arm.com>

build: separate preprocessing from DTB compilation

This is a small change to separate preprocessing of device tree sources
into their own build step as opposed to combining them. The impact of
this

build: separate preprocessing from DTB compilation

This is a small change to separate preprocessing of device tree sources
into their own build step as opposed to combining them. The impact of
this is more on separation of concerns than anything tangible, but it's
helpful to avoid doing more than necessary in a build rule.

Change-Id: I770291bd9d9f627c93e82556a40f753bf27eef93
Signed-off-by: Chris Kay <chris.kay@arm.com>

show more ...

758ccb8008-Mar-2024 Chris Kay <chris.kay@arm.com>

build: remove `MAKE_BUILD_STRINGS` function

This function causes the build message to be generated and compiled in
two different ways, with one way done inside `build_macros.mk` and the
other done i

build: remove `MAKE_BUILD_STRINGS` function

This function causes the build message to be generated and compiled in
two different ways, with one way done inside `build_macros.mk` and the
other done inside `windows.mk`, mostly because it's done by generating
the C file on the command line.

We can instead replace this whole build message generation sequence with
a simple standard C compilation command and a normal C file.

Change-Id: I8bc136380c9585ddeec9a11154ee39ef70526f81
Signed-off-by: Chris Kay <chris.kay@arm.com>

show more ...

93a7a6d029-Apr-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge "fix(tc): increase stack size when TRUSTED_BOARD_BOOT=0" into integration

db2b34d129-Apr-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge "fix(tc): remove timer interrupt from G1S" into integration

0c77651f26-Apr-2024 Karl Li <karl.li@mediatek.corp-partner.google.com>

feat(mt8188): remove apusys kernel handler usage constraints

It is expected that kernel can control the flow of the TF-A operations.
This patch remove the apusys kernel handler usage constraints, ma

feat(mt8188): remove apusys kernel handler usage constraints

It is expected that kernel can control the flow of the TF-A operations.
This patch remove the apusys kernel handler usage constraints, making
the operations all controlled on kernel side.

Signed-off-by: Karl Li <karl.li@mediatek.com>
Change-Id: Idc205a2cf23e1ff5f1920658a3b089c823f0288a

show more ...

beefea8a29-Apr-2024 Jason Chen <Jason-ch.Chen@mediatek.com>

docs(maintainers): remove a maintainer for MediaTek SoCs

Change-Id: I56649f80de0a02919befcb42e15847ceb37b1308
Signed-off-by: Jason Chen <Jason-ch.Chen@mediatek.com>

6704cba226-Mar-2024 Sieu Mun Tang <sieu.mun.tang@intel.com>

fix(intel): add in watchdog for QSPI driver

ATF->Linux boot with QSPI boot source need to enable watchdog
so that it will not hang.

Change-Id: Id2a9ceebb1c89f711992a424f4394265efc6b388
Signed-off-b

fix(intel): add in watchdog for QSPI driver

ATF->Linux boot with QSPI boot source need to enable watchdog
so that it will not hang.

Change-Id: Id2a9ceebb1c89f711992a424f4394265efc6b388
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com>
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>

show more ...

44ddee6f20-Dec-2023 Alex Dobrescu <alex.dobrescu@arm.com>

fix(tc): increase stack size when TRUSTED_BOARD_BOOT=0

The stack is too small for VERBOSE logging when secure world is disabled
as there is a recursive call when printing the translation table state

fix(tc): increase stack size when TRUSTED_BOARD_BOOT=0

The stack is too small for VERBOSE logging when secure world is disabled
as there is a recursive call when printing the translation table state
which causes a crash.

Changing the stack to the same value regardless of trusted boot.

Change-Id: I12298b33e47ae5206f74370262edce06b8a75d99
Signed-off-by: Alex Dobrescu <alex.dobrescu@arm.com>
Signed-off-by: Leo Yan <leo.yan@arm.com>

show more ...

a1901c7d26-Apr-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge changes from topic "rss_rse_rename" into integration

* changes:
refactor(changelog): change all occurrences of RSS to RSE
refactor(qemu): change all occurrences of RSS to RSE
refactor(fv

Merge changes from topic "rss_rse_rename" into integration

* changes:
refactor(changelog): change all occurrences of RSS to RSE
refactor(qemu): change all occurrences of RSS to RSE
refactor(fvp): change all occurrences of RSS to RSE
refactor(fiptool): change all occurrences of RSS to RSE
refactor(psa): change all occurrences of RSS to RSE
refactor(fvp): remove leftovers from rss measured boot support
refactor(tc): change all occurrences of RSS to RSE
docs: change all occurrences of RSS to RSE
refactor(measured-boot): change all occurrences of RSS to RSE
refactor(rse): change all occurrences of RSS to RSE
refactor(psa): rename all 'rss' files to 'rse'
refactor(tc): rename all 'rss' files to 'rse'
docs: rename all 'rss' files to 'rse'
refactor(measured-boot): rename all 'rss' files to 'rse'
refactor(rss): rename all 'rss' files to 'rse'

show more ...


changelog.yaml
docs/about/features.rst
docs/about/maintainers.rst
docs/design_documents/index.rst
docs/design_documents/measured_boot.rst
docs/design_documents/rse.rst
docs/porting-guide.rst
docs/resources/diagrams/plantuml/rse_attestation_flow.puml
docs/resources/diagrams/plantuml/rse_measured_boot_flow.puml
docs/resources/diagrams/plantuml/tfa_rse_dfd.puml
docs/resources/diagrams/rse_attestation_flow.svg
docs/resources/diagrams/rse_measured_boot_flow.svg
docs/threat_model/firmware_threat_model/index.rst
docs/threat_model/firmware_threat_model/threat_model_rse_interface.rst
docs/threat_model/supply_chain_threat_model.rst
drivers/arm/rse/rse_comms.c
drivers/arm/rse/rse_comms.mk
drivers/arm/rse/rse_comms_protocol.c
drivers/arm/rse/rse_comms_protocol.h
drivers/arm/rse/rse_comms_protocol_common.h
drivers/arm/rse/rse_comms_protocol_embed.c
drivers/arm/rse/rse_comms_protocol_embed.h
drivers/arm/rse/rse_comms_protocol_pointer_access.c
drivers/arm/rse/rse_comms_protocol_pointer_access.h
drivers/measured_boot/rse/dice_prot_env.c
drivers/measured_boot/rse/dice_prot_env.mk
drivers/measured_boot/rse/qcbor.mk
drivers/measured_boot/rse/rse_measured_boot.c
drivers/measured_boot/rse/rse_measured_boot.mk
include/drivers/arm/rse_comms.h
include/drivers/measured_boot/rse/dice_prot_env.h
include/drivers/measured_boot/rse/rse_measured_boot.h
include/lib/psa/delegated_attestation.h
include/lib/psa/dice_protection_environment.h
include/lib/psa/measured_boot.h
include/lib/psa/psa_manifest/sid.h
include/lib/psa/rse_crypto_defs.h
include/lib/psa/rse_platform_api.h
lib/psa/delegated_attestation.c
lib/psa/dice_protection_environment.c
lib/psa/measured_boot.c
lib/psa/measured_boot_private.h
lib/psa/rse_platform.c
plat/arm/board/fvp/fvp_common_measured_boot.c
plat/arm/board/fvp/fvp_plat_attest_token.c
plat/arm/board/fvp/fvp_realm_attest_key.c
plat/arm/board/tc/include/platform_def.h
plat/arm/board/tc/include/tc_plat.h
plat/arm/board/tc/nv_counter_test.c
plat/arm/board/tc/plat_def_fip_uuid.h
plat/arm/board/tc/platform.mk
plat/arm/board/tc/platform_test.mk
plat/arm/board/tc/rotpk_test.c
plat/arm/board/tc/rse_ap_test_stubs.c
plat/arm/board/tc/rse_ap_tests.c
plat/arm/board/tc/rse_ap_testsuites.c
plat/arm/board/tc/rse_ap_testsuites.h
plat/arm/board/tc/tc_bl1_dpe.c
plat/arm/board/tc/tc_bl1_measured_boot.c
plat/arm/board/tc/tc_bl2_dpe.c
plat/arm/board/tc/tc_bl2_measured_boot.c
plat/arm/board/tc/tc_common_dpe.c
plat/arm/board/tc/tc_common_measured_boot.c
plat/arm/board/tc/tc_dpe_cert.h
plat/arm/board/tc/tc_plat.c
plat/qemu/common/qemu_plat_attest_token.c
plat/qemu/common/qemu_realm_attest_key.c
tools/fiptool/plat_fiptool/arm/board/tc/plat_def_uuid_config.c
f9d40b5c26-Apr-2024 Manish Pandey <manish.pandey2@arm.com>

Merge changes from topic "hm/handoff" into integration

* changes:
feat(handoff): add support for RESET_TO_BL2
feat(arm): support FW handoff b/w BL1 & BL2
feat(handoff): add TL source files to

Merge changes from topic "hm/handoff" into integration

* changes:
feat(handoff): add support for RESET_TO_BL2
feat(arm): support FW handoff b/w BL1 & BL2
feat(handoff): add TL source files to BL1
feat(handoff): add TE's for BL1 handoff interface
refactor(bl1): clean up bl2 layout calculation
feat(arm): support FW handoff b/w BL2 & BL31

show more ...

97e7cfb826-Apr-2024 Manish Pandey <manish.pandey2@arm.com>

Merge "refactor(docs): restructure min requirements section" into integration

3d9fea9418-Jan-2024 Sascha Hauer <s.hauer@pengutronix.de>

feat(imx8mp): optionally take params from BL2

Optionally take params from BL2 to offer more flexibility to BL2 on
where and if a BL32 image is expected. This uses imx_bl31_params_parse()
to check if

feat(imx8mp): optionally take params from BL2

Optionally take params from BL2 to offer more flexibility to BL2 on
where and if a BL32 image is expected. This uses imx_bl31_params_parse()
to check if arg0 can safely be accessed as a pointer and actually
contains a bl_params_t structure. If not, the hardcoded parameter
values are used as before.

Change-Id: I44537ba2baa7543e459e5691b69df14b0bd6e942
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>

show more ...

c37a877e18-Jan-2024 Sascha Hauer <s.hauer@pengutronix.de>

feat(imx8mn): optionally take params from BL2

Optionally take params from BL2 to offer more flexibility to BL2 on
where and if a BL32 image is expected. This uses imx_bl31_params_parse()
to check if

feat(imx8mn): optionally take params from BL2

Optionally take params from BL2 to offer more flexibility to BL2 on
where and if a BL32 image is expected. This uses imx_bl31_params_parse()
to check if arg0 can safely be accessed as a pointer and actually
contains a bl_params_t structure. If not, the hardcoded parameter
values are used as before.

Change-Id: Ia12d35778f4d550860e517f2a1f5c5d062f3283a
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>

show more ...

11d32b3318-Jan-2024 Sascha Hauer <s.hauer@pengutronix.de>

feat(imx8mm): optionally take params from BL2

Optionally take params from BL2 to offer more flexibility to BL2 on
where and if a BL32 image is expected. This uses imx_bl31_params_parse()
to check if

feat(imx8mm): optionally take params from BL2

Optionally take params from BL2 to offer more flexibility to BL2 on
where and if a BL32 image is expected. This uses imx_bl31_params_parse()
to check if arg0 can safely be accessed as a pointer and actually
contains a bl_params_t structure. If not, the hardcoded parameter
values are used as before.

Change-Id: I06b3012c67e43ea1e42946d863226bd93ccd4638
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>

show more ...

02d1813e18-Jan-2024 Sascha Hauer <s.hauer@pengutronix.de>

feat(imx93): optionally take params from BL2

Optionally take params from BL2 to offer more flexibility to BL2 on
where and if a BL32 image is expected. This uses imx_bl31_params_parse()
to check if

feat(imx93): optionally take params from BL2

Optionally take params from BL2 to offer more flexibility to BL2 on
where and if a BL32 image is expected. This uses imx_bl31_params_parse()
to check if arg0 can safely be accessed as a pointer and actually
contains a bl_params_t structure. If not, the hardcoded parameter
values are used as before.

Change-Id: Iec885405efd31a6bf6c0e6c532f8d2f31c023333
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>

show more ...

7eae1db018-Jan-2024 Sascha Hauer <s.hauer@pengutronix.de>

feat(imx): add helper to take params from BL2

So far the i.MX BL31 doesn't take any parameters. This means the BL32
image base address and whether or not a BL32 image is used at all has to
be hardco

feat(imx): add helper to take params from BL2

So far the i.MX BL31 doesn't take any parameters. This means the BL32
image base address and whether or not a BL32 image is used at all has to
be hardcoded in BL31.

This adds a helper function that allows to take params from BL2 safely.
On i.MX BL2 is usually U-Boot SPL which passes random values in arg0,
so make sure arg0 is within the internal SRAM range before accessing it
as a pointer. Also make sure arg0 is sufficiently aligned and the header
type and version is correct.

Change-Id: Idab8013a1d6dabf50a83c75f3e6f831de4a537e9
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>

show more ...

f019c80123-Apr-2024 Harrison Mutai <harrison.mutai@arm.com>

feat(handoff): add support for RESET_TO_BL2

When BL2 is enabled as the entrypoint in the reset vector, none of the
TL initialisation ordinarily performed in BL1 will have been done. This
change ensu

feat(handoff): add support for RESET_TO_BL2

When BL2 is enabled as the entrypoint in the reset vector, none of the
TL initialisation ordinarily performed in BL1 will have been done. This
change ensures that BL2 has a secure TL to pass information onto BL31
through.

Change-Id: I553b0b7aac9390cd6a2d63471b81ddc72cc40a60
Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>

show more ...

9c11ed7e22-Dec-2023 Harrison Mutai <harrison.mutai@arm.com>

feat(arm): support FW handoff b/w BL1 & BL2

Leverage the framework between BL1 and BL2. Migrate all handoff
structures to the TL.

Change-Id: I79ff3a319596b5656184cde10b5204b10a4d03bb
Signed-off-by:

feat(arm): support FW handoff b/w BL1 & BL2

Leverage the framework between BL1 and BL2. Migrate all handoff
structures to the TL.

Change-Id: I79ff3a319596b5656184cde10b5204b10a4d03bb
Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>

show more ...

469b1d8426-Apr-2024 Harrison Mutai <harrison.mutai@arm.com>

feat(handoff): add TL source files to BL1

Change-Id: Id9843ba0ccfb448cf17e09e0659b743741ae01ac
Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>

0646c9b204-Jan-2024 Harrison Mutai <harrison.mutai@arm.com>

feat(handoff): add TE's for BL1 handoff interface

`TL_TAG_RW_MEM_LAYOUT64` encapsulates a structure used to represent the
layout of a region of memory on 64-bit platforms [2]. In TF-A this is
used t

feat(handoff): add TE's for BL1 handoff interface

`TL_TAG_RW_MEM_LAYOUT64` encapsulates a structure used to represent the
layout of a region of memory on 64-bit platforms [2]. In TF-A this is
used to represent the `meminfo_t` structure passed between BL1 and BL2,
which provides BL2 with information about the space it has available in
BL2. The `TL_TAG_TB_FW_CONFIG` entry type encapsulates the trusted
bootloader firmware configuration [1].

[1] https://github.com/FirmwareHandoff/firmware_handoff/pull/37
[2] https://github.com/FirmwareHandoff/firmware_handoff/pull/36

Change-Id: I1e0eeec2ec204e469896490d42a9dce9b1b2f209
Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>

show more ...

1...<<141142143144145146147148149150>>...733