| ab4d5dfe | 09-Apr-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
docs: clarify build environment prerequisites
Our build system extensively uses syntax and tools that are not natively supported by Windows shells (i.e., CMD.exe and Powershell). This dependency nec
docs: clarify build environment prerequisites
Our build system extensively uses syntax and tools that are not natively supported by Windows shells (i.e., CMD.exe and Powershell). This dependency necessitates a UNIX-compatible build environment. This commit updates the prerequisites section in our documentation to reflect this.
Change-Id: Ia7e02d7a335e6c88bbaa0394650f1313cdfd6e40 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| e494afc0 | 05-Mar-2024 |
Yann Gautier <yann.gautier@st.com> |
feat(stm32mp2): add ddr-fw parameter for fiptool
When generating fiptool for STM32MP2, a new parameter is added to put DDR firmware inside the FIP.
To avoid duplicating fiptool platform files, move
feat(stm32mp2): add ddr-fw parameter for fiptool
When generating fiptool for STM32MP2, a new parameter is added to put DDR firmware inside the FIP.
To avoid duplicating fiptool platform files, move tools/fiptool/plat_fiptool/st/stm32mp1 files in their parent directory and move plat_def_fip_uuid.h in in plat/st/common/include.
Signed-off-by: Nicolas Le Bayon <nicolas.le.bayon@st.com> Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: I1dd796847869e2bfb6ee8c2bcef25c595fa5197a
show more ...
|
| b9014f85 | 12-Mar-2024 |
Ahmad Fatoum <a.fatoum@pengutronix.de> |
feat(build): redirect stdin to nul during toolchain detection
It's common for Makefiles to use variables like CC, AS or LD instead of hardcoding the name of binaries. These can be defined by the use
feat(build): redirect stdin to nul during toolchain detection
It's common for Makefiles to use variables like CC, AS or LD instead of hardcoding the name of binaries. These can be defined by the user to use a differnet toolchain or even as a crutch to enable cross-compilation.
In TF-A, this is not needed, as support for cross-compilation is baked in via the CROSS_COMPILE option. TF-A still defined AS for its internal use, but unlike most other projects, the default was setting it to the C compiler. Overriding it wasn't possible from the environment though, only as a make argument, so this didn't cause much issue.
With commit cc277de81692 ("build: refactor toolchain detection"), AS can now also be set from the environment. This breaks any scripts that supply make with a cross environment that sets AS to an assembler.
Doing so was without effect before, but now leads to a quite ugly failure mode: As TF-A now tries to detect the toolchain, it will call AS with the option -v, which for GNU as(1) prints the version, but doesn't exit.
Thus, as(1) will continue waiting on stdin input and the build hangs without much indication what's wrong.
Avoid this failure mode by ensuring any tool that attempts to read stdin during toolchain detection will immediately get EOF and exit, leading to an error message later on instead of the build hang.
Change-Id: I79a84961f5a69250292caa7f9e879a65be4bd9f2 Signed-off-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
show more ...
|
| 4b50d758 | 08-Apr-2024 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(cm): add more system registers to EL1 context mgmt" into integration |
| 152ad112 | 08-Apr-2024 |
Mark Dykes <mark.dykes@arm.com> |
fix(cc): code coverage optimization fix
Resolve issue where optimization is enabled for TF-A using -Og and compile fail is seen in PSCI module.
Change-Id: Id9afb5c56a6937e7040b20cd01080c190c8276d5
fix(cc): code coverage optimization fix
Resolve issue where optimization is enabled for TF-A using -Og and compile fail is seen in PSCI module.
Change-Id: Id9afb5c56a6937e7040b20cd01080c190c8276d5 Signed-off-by: Mark Dykes <mark.dykes@arm.com>
show more ...
|
| 92bba3e7 | 04-Apr-2024 |
Karl Meakin <karl.meakin@arm.com> |
fix(ff-a): add NS memory node to fvp_spmc_optee_sp manifest
FFA_RXTX_MAP now requires the buffers to be in non-secure memory. This patch ensures that a region of non-secure memory is available so th
fix(ff-a): add NS memory node to fvp_spmc_optee_sp manifest
FFA_RXTX_MAP now requires the buffers to be in non-secure memory. This patch ensures that a region of non-secure memory is available so that tftf tests can pass.
Change-Id: I9daf3182e0dcb73d2bf5a5baffb1b4b78c724dcb Signed-off-by: Karl Meakin <karl.meakin@arm.com>
show more ...
|
| 04e9c66a | 08-Apr-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "docs: update release and code freeze dates" into integration |
| 19b73173 | 08-Apr-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "docs: remove entries of the deleted platforms" into integration |
| c97831eb | 05-Apr-2024 |
Bipin Ravi <bipin.ravi@arm.com> |
Merge "build: use GCC to link by default" into integration |
| 3474340b | 05-Apr-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(spmd): skip NS EL1 context save & restore operations" into integration |
| 2d960a11 | 29-Jan-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
fix(spmd): skip NS EL1 context save & restore operations
NS EL1 context save and restore is taken by SPMC upon entering and exiting S-EL2
BREAKING CHANGE: Corresponding support is needed in Hafnium
fix(spmd): skip NS EL1 context save & restore operations
NS EL1 context save and restore is taken by SPMC upon entering and exiting S-EL2
BREAKING CHANGE: Corresponding support is needed in Hafnium SPMC
Change-Id: I8524f1229b3e13c2df4e4b5be3f12436289c30c7 Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| 7c9720f2 | 04-Apr-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
docs: update release and code freeze dates
Change-Id: I850f26a66f017d5290ca4d3d670a7efed527f1ef Signed-off-by: Harrison Mutai <harrison.mutai@arm.com> |
| 2cbc8952 | 04-Apr-2024 |
Alexei Fedorov <Alexei.Fedorov@arm.com> |
Merge "fix(rmmd): fix bug, raised by coverity, when zeroing manifest struct" into integration |
| 83a4e8e0 | 04-Apr-2024 |
Harry Moulton <harry.moulton@arm.com> |
fix(rmmd): fix bug, raised by coverity, when zeroing manifest struct
An "Incorrect expression (SIZEOF_MISMATCH)" bug was raised by coverity on the memset for clearing the manifest structure. This pa
fix(rmmd): fix bug, raised by coverity, when zeroing manifest struct
An "Incorrect expression (SIZEOF_MISMATCH)" bug was raised by coverity on the memset for clearing the manifest structure. This patch resolves that issue.
Signed-off-by: Harry Moulton <harry.moulton@arm.com> Change-Id: I40431b972fc434d2b33f597813f22126d5d4cb70
show more ...
|
| f7c091ea | 03-Apr-2024 |
Bipin Ravi <bipin.ravi@arm.com> |
Merge "refactor(arm): remove unused SP_MIN UART macros" into integration |
| ed9bb824 | 25-Mar-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
fix(cm): add more system registers to EL1 context mgmt
The following system registers are made part of save and restore operations for EL1 context: MDCCINT_EL1 MDSCR_EL1 DISR_EL1 PIRE0_EL1
fix(cm): add more system registers to EL1 context mgmt
The following system registers are made part of save and restore operations for EL1 context: MDCCINT_EL1 MDSCR_EL1 DISR_EL1 PIRE0_EL1 PIR_EL1 POR_EL1 S2POR_EL1 TCR2_EL1
Some of these registers are available as part of core Armv8-A architecture while others are made available through various architectural extensions.
Change-Id: I507dccb9053ba177e1b98100fceccd1f32bdfc5c Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| d594ace6 | 20-Mar-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
fix(handoff): correct representation of tag_id
The tag ID is a 3-byte field used to identify the contents of a TE. In our library, the internal representation of the tag is a 2 byte field. We curren
fix(handoff): correct representation of tag_id
The tag ID is a 3-byte field used to identify the contents of a TE. In our library, the internal representation of the tag is a 2 byte field. We currently ignore the top byte of this field, marking it res0. This causes problems when dealing with non-standard TE types, whose range starts at 0xff_f000. This commit fixes this by using a bit-field with a 24-bit width, and packing `transfer_list_entry`.
Change-Id: Ib3c212f964b64f528ad6f3dd6ab8b4597b877cd9 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| a77459dc | 03-Apr-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(handoff): add additional TE tags" into integration |
| fd265ece | 02-Apr-2024 |
Bipin Ravi <bipin.ravi@arm.com> |
Merge "fix(cm): save guarded control stack registers" into integration |
| 0f4811b4 | 02-Apr-2024 |
Soby Mathew <soby.mathew@arm.com> |
Merge changes I3a4f9a4f,Iedc4e640 into integration
* changes: docs(rmm): document console struct in rmm boot manifest feat(rme): pass console info via RMM-EL3 ifc |
| a312bfb3 | 01-Dec-2023 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(handoff): add additional TE tags
`TL_TAG_EXEC_EP_INFO64` type entries represent the `entry_point_info_t` data structure. This structure provides the consumer with the execution environment of a
feat(handoff): add additional TE tags
`TL_TAG_EXEC_EP_INFO64` type entries represent the `entry_point_info_t` data structure. This structure provides the consumer with the execution environment of an image. This is needed primarily in BL31 to execute subsequent images i.e. BL32, BL33, or NT FW.
`TL_TAG_DT_SPMC_MANIFEST` holds the SPMC (Secure Partition Manager Core) manifest image which is in DT format.
Change-Id: I80c4a72d639851457bc3c9b158b2e56041e8b29a Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 88f7c87b | 28-Mar-2024 |
Harry Moulton <harry.moulton@arm.com> |
docs(rmm): document console struct in rmm boot manifest
This change adds documentation for the console_list and console_info structures added to the RMM Boot Manifest v0.3.
Signed-off-by: Harry Mou
docs(rmm): document console struct in rmm boot manifest
This change adds documentation for the console_list and console_info structures added to the RMM Boot Manifest v0.3.
Signed-off-by: Harry Moulton <harry.moulton@arm.com> Change-Id: I3a4f9a4f1d34259bc69c0ab497cbfbc268d7a994
show more ...
|
| 32904472 | 26-Mar-2024 |
Soby Mathew <soby.mathew@arm.com> |
feat(rme): pass console info via RMM-EL3 ifc
This patch modifies the boot manifest to add console information to be passed from EL3 to RMM.
Boot manifest version is bumped to v0.3
Signed-off-by: H
feat(rme): pass console info via RMM-EL3 ifc
This patch modifies the boot manifest to add console information to be passed from EL3 to RMM.
Boot manifest version is bumped to v0.3
Signed-off-by: Harry Moulton <harry.moulton@arm.com> Signed-off-by: Soby Mathew <soby.mathew@arm.com> Change-Id: Iedc4e640fb7a4450ce5ce966ae76936d1b7b742d
show more ...
|
| e6f8fc74 | 12-Mar-2024 |
Ahmad Fatoum <a.fatoum@pengutronix.de> |
fix(pmu): fix breakage on ARMv7 CPUs with SP_min as BL32
While comments introduced with the original commit claim that pmuv3_disable_el3()/pmuv3_init_el3() are compatible with PMUv2 and PMUv1, this
fix(pmu): fix breakage on ARMv7 CPUs with SP_min as BL32
While comments introduced with the original commit claim that pmuv3_disable_el3()/pmuv3_init_el3() are compatible with PMUv2 and PMUv1, this is not true in practice: The function accesses the Secure Debug Control Register (SDCR), which only available to ARMv8 CPUs.
ARMv8 CPUs executing in AArch32 mode would thus be able to disable their PMUv3, while ARMv7 CPUs would hang trying to access the SDCR.
Fix this by only doing PMUv3 handling when we know a PMUv3 to be available. This resolves boot hanging on all STM32MP15 platforms that use SP_min as BL32 instead of OP-TEE.
Change-Id: I40f7611cf46b89a30243cc55bf55a8d9c9de93c8 Fixes: c73686a11cea ("feat(pmu): introduce pmuv3 lib/extensions folder") Signed-off-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
show more ...
|
| 67ff4f56 | 28-Mar-2024 |
Leo Yan <leo.yan@arm.com> |
refactor(arm): remove unused SP_MIN UART macros
Currently, tf-a has been refactored to support the multi UARTs (boot and runtime UARTs). As a result, the SP_MIN UART related code has been removed, a
refactor(arm): remove unused SP_MIN UART macros
Currently, tf-a has been refactored to support the multi UARTs (boot and runtime UARTs). As a result, the SP_MIN UART related code has been removed, and the macros are no longer used.
Therefore, this patch removes these unused UART macros.
Change-Id: I496349f876ba918fcafa7ed6c65d149914762290 Signed-off-by: Leo Yan <leo.yan@arm.com>
show more ...
|