| 8c56a788 | 09-Jan-2024 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
fix(context-mgmt): align the memory address of EL2 context registers
EL2 registers are 8 byte wide and are allocated continuous memory. After moving MPAM_EL2 registers out of the EL2 struct, the sec
fix(context-mgmt): align the memory address of EL2 context registers
EL2 registers are 8 byte wide and are allocated continuous memory. After moving MPAM_EL2 registers out of the EL2 struct, the section of memory, assigned to MPAM registers in EL2 registers structure has to be removed.
Henceforth, this patch addresses this issue and cleans up the unsued memory.
Change-Id: I3425b43add0755ff1f5cb803cd5fa667082e7814 Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| 663f024f | 10-Jan-2024 |
Akshay Belsare <akshay.belsare@amd.com> |
feat(versal): extend platform address space sizes
The AMD-Xilinx Versal platform, currently only supports the OCM and Low DDR address ranges in both physical and virtual address range. To locate and
feat(versal): extend platform address space sizes
The AMD-Xilinx Versal platform, currently only supports the OCM and Low DDR address ranges in both physical and virtual address range. To locate and execute TF-A from High DDR and HBM address range, expanding the address scope is necessary.
Depending on the BL31_BASE address both the platform physical and virtual space sizes are selected.
Change-Id: I49112bff9eda44d924c5f49ea99aed9a8d5e5774 Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
show more ...
|
| 9c653440 | 10-Jan-2024 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge changes Id85b2541,I4d253e2f into integration
* changes: fix(intel): update system counter back to 400MHz fix(intel): revert back to use L4 clock |
| bb31fbce | 10-Jan-2024 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "fix(intel): update fcs crypto init code to check for mode" into integration |
| 11190c1b | 10-Jan-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "cpu_trp_rotpk_fixes" into integration
* changes: fix(rotpk): move rotpk definitions out of arm_def.h feat(cpu): add support for Poseidon V CPU fix(cpu): correct varia
Merge changes from topic "cpu_trp_rotpk_fixes" into integration
* changes: fix(rotpk): move rotpk definitions out of arm_def.h feat(cpu): add support for Poseidon V CPU fix(cpu): correct variant name for default Poseidon CPU fix(rmmd): avoid TRP when external RMM is defined
show more ...
|
| 9260a8c8 | 09-Jan-2024 |
Marco Felsch <m.felsch@pengutronix.de> |
feat(imx8m): make bl33 start configurable via PRELOADED_BL33_BASE
The TF-A does have a official PRELOADED_BL33_BASE define which is used to tell the TF-A where to jump and that no bl33 loading is re
feat(imx8m): make bl33 start configurable via PRELOADED_BL33_BASE
The TF-A does have a official PRELOADED_BL33_BASE define which is used to tell the TF-A where to jump and that no bl33 loading is requied. Use this to make the platform specific PLAT_NS_IMAGE_OFFSET configurable.
This becomes necessary if one would like to place the bl33 code to other places.
Signed-off-by: Marco Felsch <m.felsch@pengutronix.de> Change-Id: I9d462c0e9df8e6d2ad78ee770bfa59e680739a51
show more ...
|
| 7ec53afa | 09-Oct-2023 |
Jay Buddhabhatti <jay.buddhabhatti@amd.com> |
fix(xilinx): add console_flush() before shutdown
Add console_flush() call before shutting down in order to ensure that console output is flushed.
Signed-off-by: Jay Buddhabhatti <jay.buddhabhatti@a
fix(xilinx): add console_flush() before shutdown
Add console_flush() call before shutting down in order to ensure that console output is flushed.
Signed-off-by: Jay Buddhabhatti <jay.buddhabhatti@amd.com> Change-Id: I5397105d2d7bf317f199b6326593bdb1c3cc75e2
show more ...
|
| 427e46dd | 12-Sep-2023 |
Jay Buddhabhatti <jay.buddhabhatti@amd.com> |
fix(xilinx): fix sending sgi to linux
Currently in Versal NET TF-A writing 32 bits in icc_asgi1r_el1 register to raise SGI to Linux but this register is of 64 bits. Also its writing only CPU number
fix(xilinx): fix sending sgi to linux
Currently in Versal NET TF-A writing 32 bits in icc_asgi1r_el1 register to raise SGI to Linux but this register is of 64 bits. Also its writing only CPU number and SGI number to this register but along with that it needs to write cluster number and other information. Which is not happening currently. So use generic function plat_ic_raise_ns_sgi() to raise SGI to Linux.
Signed-off-by: Jay Buddhabhatti <jay.buddhabhatti@amd.com> Change-Id: I6f5146c8315a321b705ed2ef79e2dc927b805ffb
show more ...
|
| 59497016 | 12-Sep-2023 |
Jay Buddhabhatti <jay.buddhabhatti@amd.com> |
feat(xilinx): add new state to identify cpu power down
Currently there is only 1 state for CPU idle which is used while CPU power down from Linux CPU idle feature. But CPU power down when firmware s
feat(xilinx): add new state to identify cpu power down
Currently there is only 1 state for CPU idle which is used while CPU power down from Linux CPU idle feature. But CPU power down when firmware send CPU power down request needs new state in self suspend to distinguish in firmware for CPU power down from power down request or CPU power down from Linux CPU idle. So add new state PM_STATE_CPU_OFF to indicate CPU power down from power down request from firmware.
PM_STATE_CPU_OFF state is supported from self-suspend version 3. So added feature check which sends new state in case of new firmware and old state i.e. PM_STATE_CPU_IDLE in case of old firmware.
Signed-off-by: Jay Buddhabhatti <jay.buddhabhatti@amd.com> Change-Id: I4118e1b813e5f76fca7b7e9ca1cc598715203fb0
show more ...
|
| 88ee0816 | 19-Jun-2023 |
Jay Buddhabhatti <jay.buddhabhatti@amd.com> |
feat(xilinx): request cpu power down from reset
Send subsystem restart notification to firmware when TF-A receives system reset PSCI call. On receiving subsystem restart call, firmware will send CPU
feat(xilinx): request cpu power down from reset
Send subsystem restart notification to firmware when TF-A receives system reset PSCI call. On receiving subsystem restart call, firmware will send CPU idle callback to TF-A for powering down all cores. Wait for CPU idle callback from firmware and raise power down request to all cores after it receives CPU idle callback to power down core.
Signed-off-by: Jay Buddhabhatti <jay.buddhabhatti@amd.com> Change-Id: I50f417ae228017f38b648740dc90b2e8f1872620
show more ...
|
| c3280df1 | 25-Apr-2023 |
Jay Buddhabhatti <jay.buddhabhatti@amd.com> |
feat(xilinx): power down all cores on receiving cpu pwrdwn req
On receiving CPU power down request from firmware, TF-A raises SGI interrupt to all active cores for entering in power down state. So a
feat(xilinx): power down all cores on receiving cpu pwrdwn req
On receiving CPU power down request from firmware, TF-A raises SGI interrupt to all active cores for entering in power down state. So add support for power down core on receiving CPU power down request. PWRDWN_WAIT_TIMEOUT is the timeout value in milliseconds for the other cores to transition to power down state.
Signed-off-by: Jay Buddhabhatti <jay.buddhabhatti@amd.com> Change-Id: I29760a2098852c546fa5a1324262a62c3d75b391
show more ...
|
| ade92a64 | 25-Apr-2023 |
Jay Buddhabhatti <jay.buddhabhatti@amd.com> |
feat(xilinx): add handler for power down req sgi irq
On receiving CPU power down callback, TF-A raises SGI interrupt to all active cores to power down each active cores. Add handler for this SGI IRQ
feat(xilinx): add handler for power down req sgi irq
On receiving CPU power down callback, TF-A raises SGI interrupt to all active cores to power down each active cores. Add handler for this SGI IRQ.
By default TF-A uses SGI 6 for CPU power down request. This can be configurable through CPU_PWRDWN_SGI build flag.
e.g., If user wants to use SGI 7 instead of SGI 6 then provide build flag CPU_PWRDWN_SGI=7
Signed-off-by: Jay Buddhabhatti <jay.buddhabhatti@amd.com> Change-Id: Id0df32187d1de3f0af4486eb4d4930cb3ab01dbd
show more ...
|
| 3dd118cf | 25-Apr-2023 |
Jay Buddhabhatti <jay.buddhabhatti@amd.com> |
feat(xilinx): add wrapper to handle cpu power down req
Firmware sends CPU power down request to TF-A through NOTIFY_CB callback. It indicates CPU needs to power down.
Add wrapper to handle CPU powe
feat(xilinx): add wrapper to handle cpu power down req
Firmware sends CPU power down request to TF-A through NOTIFY_CB callback. It indicates CPU needs to power down.
Add wrapper to handle CPU power down request from firmware through IPI callback.
Signed-off-by: Jay Buddhabhatti <jay.buddhabhatti@amd.com> Change-Id: Ic4aff874dd29da057c5ffde1899c7f0e5cdf6733
show more ...
|
| b2259261 | 06-Oct-2023 |
Jay Buddhabhatti <jay.buddhabhatti@amd.com> |
fix(versal-net): use arm common GIC handlers
Currently SGI interrupts are not received in secondary cores because of issue in GIC configuration. In current Versal NET specific GIC functions, redist
fix(versal-net): use arm common GIC handlers
Currently SGI interrupts are not received in secondary cores because of issue in GIC configuration. In current Versal NET specific GIC functions, redistributor configuration is not happening properly. Because of that SGI interrupt from one processor to another processor is not transferring. So, use common GIC handlers which will iterate over all GIC redistributor frames and discovers per cpu redistributor frame. Also, it initializes corresponding interface in GICv3.
Signed-off-by: Jay Buddhabhatti <jay.buddhabhatti@amd.com> Change-Id: I1433260b8520d6a315fdf5df86bd0688f92d211a
show more ...
|
| 79953190 | 05-Oct-2023 |
Jay Buddhabhatti <jay.buddhabhatti@amd.com> |
fix(xilinx): rename macros to align with ARM
Use generic macro name as per common ARM GIC macro name for Versal and Versal NET.
Signed-off-by: Jay Buddhabhatti <jay.buddhabhatti@amd.com> Change-Id:
fix(xilinx): rename macros to align with ARM
Use generic macro name as per common ARM GIC macro name for Versal and Versal NET.
Signed-off-by: Jay Buddhabhatti <jay.buddhabhatti@amd.com> Change-Id: I2987ff2f612993fc80979f0179c04d316259ed1d
show more ...
|
| 2b6f940a | 08-Jan-2024 |
Soby Mathew <soby.mathew@arm.com> |
Merge changes from topic "qemu-rme" into integration
* changes: feat(qemu): support TRP for RME feat(qemu): load and run RMM image feat(qemu): setup Granule Protection Table feat(qemu): setu
Merge changes from topic "qemu-rme" into integration
* changes: feat(qemu): support TRP for RME feat(qemu): load and run RMM image feat(qemu): setup Granule Protection Table feat(qemu): setup memory map for RME feat(qemu): update mapping types for RME feat(qemu): use mock attestation functions for RME fix(qemu): increase max FIP size
show more ...
|
| ebe82a39 | 07-Sep-2023 |
Jean-Philippe Brucker <jean-philippe@linaro.org> |
feat(qemu): support TRP for RME
When an external RMM is not provided during make invocation, include the Test Realm Payload (TRP) to the FIP.
Change-Id: I15d396cf268a08d79da63075aadb4172238eb225 Si
feat(qemu): support TRP for RME
When an external RMM is not provided during make invocation, include the Test Realm Payload (TRP) to the FIP.
Change-Id: I15d396cf268a08d79da63075aadb4172238eb225 Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
show more ...
|
| 8ffe0b2e | 07-Sep-2023 |
Jean-Philippe Brucker <jean-philippe@linaro.org> |
feat(qemu): load and run RMM image
When RME is enabled, jump to the RMM image before BL33. When using semihosting rather than FIP, the image called "rmm.bin" is loaded from the runtime directory.
C
feat(qemu): load and run RMM image
When RME is enabled, jump to the RMM image before BL33. When using semihosting rather than FIP, the image called "rmm.bin" is loaded from the runtime directory.
Change-Id: I15863410b1e505aa502276b339b22a2ddcb0b745 Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
show more ...
|
| 6cd113fe | 07-Sep-2023 |
Jean-Philippe Brucker <jean-philippe@linaro.org> |
feat(qemu): setup Granule Protection Table
When RME is enabled, call the GPT library to setup the granule protection tables and partition the physical address space.
Change-Id: Ib466c4579ff55fcff93
feat(qemu): setup Granule Protection Table
When RME is enabled, call the GPT library to setup the granule protection tables and partition the physical address space.
Change-Id: Ib466c4579ff55fcff9307550e6d26d432674779a Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
show more ...
|
| cd75693f | 07-Sep-2023 |
Jean-Philippe Brucker <jean-philippe@linaro.org> |
feat(qemu): setup memory map for RME
Reserve some space in DRAM for RMM, and some space in SRAM for the GPT tables. Create the page table mappings.
Change-Id: I3822e7e505e86eb0fa15b1b5b6298e4122b17
feat(qemu): setup memory map for RME
Reserve some space in DRAM for RMM, and some space in SRAM for the GPT tables. Create the page table mappings.
Change-Id: I3822e7e505e86eb0fa15b1b5b6298e4122b17181 Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
show more ...
|
| a5ab1ef7 | 07-Sep-2023 |
Jean-Philippe Brucker <jean-philippe@linaro.org> |
feat(qemu): update mapping types for RME
With RME, mappings for EL3 use MT_ROOT rather than MT_SECURE. Update the mapping types to select the right memory type: EL3_PAS is MT_ROOT when RME is enable
feat(qemu): update mapping types for RME
With RME, mappings for EL3 use MT_ROOT rather than MT_SECURE. Update the mapping types to select the right memory type: EL3_PAS is MT_ROOT when RME is enabled, MT_SECURE otherwise.
Change-Id: I93e287009515b64e833a6f69545766be4c87e473 Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
show more ...
|
| c69e95ee | 06-Sep-2023 |
Jean-Philippe Brucker <jean-philippe@linaro.org> |
feat(qemu): use mock attestation functions for RME
Since QEMU doesn't yet emulate hardware attestation, provide hardcoded key and token to demonstrate attestation for RME. They are copied from the m
feat(qemu): use mock attestation functions for RME
Since QEMU doesn't yet emulate hardware attestation, provide hardcoded key and token to demonstrate attestation for RME. They are copied from the mock values for the FVP platform.
Change-Id: I9ce686955345854e9409af5c3aad2a648adea226 Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
show more ...
|
| f465ac22 | 15-Sep-2023 |
Jean-Philippe Brucker <jean-philippe@linaro.org> |
fix(qemu): increase max FIP size
The max FIP size for the QEMU virt platform is currently 4MB, which isn't enough when including a RMM in the FIP. Since the secure flash size is actually 64MB, we ca
fix(qemu): increase max FIP size
The max FIP size for the QEMU virt platform is currently 4MB, which isn't enough when including a RMM in the FIP. Since the secure flash size is actually 64MB, we can significantly increase the max FIP size.
Change-Id: Id2b5df355f8d4c90a41fec66f180e46eb7bab9f8 Fixes: a886bbeceb0d ("qemu: Update flash address map to keep FIP in secure FLASH0") Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
show more ...
|
| 1c76dd2d | 05-Jan-2024 |
Joanna Farley <joanna.farley@arm.com> |
Merge changes from topic "xlnx_set_freq" into integration
* changes: refactor(xilinx): move plat_get_syscnt_freq2 to common file refactor(versal-net): rename VERSAL_NET_IOU_SCNTRS register to ge
Merge changes from topic "xlnx_set_freq" into integration
* changes: refactor(xilinx): move plat_get_syscnt_freq2 to common file refactor(versal-net): rename VERSAL_NET_IOU_SCNTRS register to generic fix(versal-net): setup counter frequency fix(versal): initialize cntfrq_el0 register
show more ...
|
| 0f0fd499 | 26-Dec-2023 |
Rohit Mathew <Rohit.Mathew@arm.com> |
fix(rotpk): move rotpk definitions out of arm_def.h
The file arm_def.h currently contains common definitions used by ARM platforms. However, some platforms may have their own definitions, allowing t
fix(rotpk): move rotpk definitions out of arm_def.h
The file arm_def.h currently contains common definitions used by ARM platforms. However, some platforms may have their own definitions, allowing them to avoid a direct dependency on arm_def.h. For a clean platform port of arm_def.h, none of the source files should directly include arm_def.h; instead, they should include the platform header which would indirectly include the required definitions.
Presently, the rotpk module has a source file that directly includes arm_def.h. This could lead to compilation issues if the platform incorporating the rotpk module has a separate implementation of some or all of the definitions in arm_def.h file. To address this, move the relevant definitions out of arm_def.h and into rotpk_def.h.
Signed-off-by: Rohit Mathew <Rohit.Mathew@arm.com> Change-Id: I9e8b0d319391f9a167af5c69a7b2d42ac488e7b4
show more ...
|