| fffcb25c | 20-Sep-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
feat(intel): support SDM mailbox safe inject seu error for Linux
Linux RAS shall handle the SEU error received from SDM and report an error message to user
Change-Id: I89181a388063ce9bd6f56b45b1851
feat(intel): support SDM mailbox safe inject seu error for Linux
Linux RAS shall handle the SEU error received from SDM and report an error message to user
Change-Id: I89181a388063ce9bd6f56b45b1851ccb08582437 Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
show more ...
|
| f4aaa9fd | 25-Sep-2023 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
fix(intel): update DDR range checking for Agilex5
Update DDR range checking for Agilex when total max size of DRAM_BASE and DRAM_SIZE overflow unsigned 64bit.
Change-Id: Iaecfa5daae48da0af46cc1831d
fix(intel): update DDR range checking for Agilex5
Update DDR range checking for Agilex when total max size of DRAM_BASE and DRAM_SIZE overflow unsigned 64bit.
Change-Id: Iaecfa5daae48da0af46cc1831d10c0e6a79613c2 Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
show more ...
|
| e8a3454c | 17-Nov-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
fix(intel): update fcs functions to check ddr range
The src addr and dest addr of fcs functions are not checked against their valid ddr range. Thus adding the ddr range checking to avoid overlap/ove
fix(intel): update fcs functions to check ddr range
The src addr and dest addr of fcs functions are not checked against their valid ddr range. Thus adding the ddr range checking to avoid overlap/overwritten ddr address.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I9b4d4155dd16d9d5d36e0c91e4a2600c17867daf
show more ...
|
| b0f44789 | 13-Sep-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
fix(intel): update fcs crypto init code to check for mode
The shall code only limit ECB, CBC and CTR mode to flow through the init function. Anything other than that, the code shall reject to preven
fix(intel): update fcs crypto init code to check for mode
The shall code only limit ECB, CBC and CTR mode to flow through the init function. Anything other than that, the code shall reject to prevent security vulnerability.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I702ce90e229188830f8936bee2999610e9559b8b
show more ...
|
| d0574da5 | 14-Dec-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge changes I038dc2bf,Iade15431 into integration
* changes: fix(rcar3): change RAM protection configurations fix(rcar3): fix load address range check |
| 4d877b35 | 14-Dec-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "fix(rcar3-drivers): check loaded NS image area" into integration |
| e9afde1a | 12-Jul-2021 |
Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> |
fix(rcar3): change RAM protection configurations
Change RAM protection control not to overwrite the images by DSMAC.
Signed-off-by: Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> Signed-o
fix(rcar3): change RAM protection configurations
Change RAM protection control not to overwrite the images by DSMAC.
Signed-off-by: Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> Signed-off-by: Yoshifumi Hosoya <yoshifumi.hosoya.wj@renesas.com> Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> Change-Id: I038dc2bf90e721692d392ea4de5441647aa62029 --- Marek: - Move axi DRAM out and merge AXI_SPTCR15 setting into it - Set AXI_SPTCR1 from 0x0E000E0EU to 0x0E000000U to let TEE pick TFA DT
show more ...
|
| ae4860b0 | 16-Mar-2023 |
Tobias Rist <tobias.rist@joynext.com> |
fix(rcar3-drivers): check loaded NS image area
Check if next NS image invades a previous loaded image. Correct non secure image area to avoid loading a NS image to secure
Move GZ compressed payload
fix(rcar3-drivers): check loaded NS image area
Check if next NS image invades a previous loaded image. Correct non secure image area to avoid loading a NS image to secure
Move GZ compressed payload at 32 * compressed payload size offset, so it is loaded in non-secure area and can be decompressed into non-secure area too. It is unlikely that the up to 2 MiB compressed BL33 blob would decompress to payload larger than 64 MiB .
Signed-off-by: Tobias Rist <tobias.rist@joynext.com> Signed-off-by: Yoshifumi Hosoya <yoshifumi.hosoya.wj@renesas.com> Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> # Fix for compressed BL33 Change-Id: I52fd556aab50687e4791e5dbc45d425f802c8757
show more ...
|
| 4f7e0fa3 | 01-Dec-2021 |
Takuya Sakata <takuya.sakata.wz@bp.renesas.com> |
fix(rcar3): fix load address range check
Fixed the check of the address range which the program is loaded to. Use the addresses and sizes in the BL31 and BL32 certificates to check that they are wit
fix(rcar3): fix load address range check
Fixed the check of the address range which the program is loaded to. Use the addresses and sizes in the BL31 and BL32 certificates to check that they are within the range of the target address and size defined inside the TF-A. It also uses the addresses and sizes in the BL33x certificates to check that they are outside the protected area defined inside the TF-A.
Signed-off-by: Hideyuki Nitta <hideyuki.nitta.jf@hitachi.com> Signed-off-by: Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> Signed-off-by: Yoshifumi Hosoya <yoshifumi.hosoya.wj@renesas.com> Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> # Code clean up Change-Id: Iade15431fc86587489fb0ca9106f6baaf7e926e2
show more ...
|
| 62d1adb6 | 13-Dec-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
Merge changes from topic "sm/erratum" into integration
* changes: fix(cpus): workaround for Cortex-A520 erratum 2630792 fix(cpus): workaround for Cortex-X2 erratum 2778471 fix(cpus): workaroun
Merge changes from topic "sm/erratum" into integration
* changes: fix(cpus): workaround for Cortex-A520 erratum 2630792 fix(cpus): workaround for Cortex-X2 erratum 2778471 fix(cpus): workaround for Cortex-A710 erratum 2778471
show more ...
|
| f03bfc30 | 10-Dec-2023 |
Sona Mathew <sonarebecca.mathew@arm.com> |
fix(cpus): workaround for Cortex-A520 erratum 2630792
Cortex-A520 erratum is a Cat B erratum that applies to revisions r0p0 and r0p1 and is still open. The workaround is to set CPUACTLR_EL1[38] to 1
fix(cpus): workaround for Cortex-A520 erratum 2630792
Cortex-A520 erratum is a Cat B erratum that applies to revisions r0p0 and r0p1 and is still open. The workaround is to set CPUACTLR_EL1[38] to 1.
SDEN Documentation: https://developer.arm.com/documentation/SDEN-2444153/latest
Change-Id: Idb6f32f680ee1378a57c2d2f809ea847fffe5910 Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com>
show more ...
|
| b01a93d7 | 09-Dec-2023 |
Sona Mathew <sonarebecca.mathew@arm.com> |
fix(cpus): workaround for Cortex-X2 erratum 2778471
Cortex-X2 erratum 2778471 is a Cat B erratum that applies to revisions r0p1, r1p0, r2p0 and r2p1 and is still open. The workaround is to set CPUAC
fix(cpus): workaround for Cortex-X2 erratum 2778471
Cortex-X2 erratum 2778471 is a Cat B erratum that applies to revisions r0p1, r1p0, r2p0 and r2p1 and is still open. The workaround is to set CPUACTLR3_EL1[47] to 1.
SDEN documentation: https://developer.arm.com/documentation/SDEN-1775100/latest
Change-Id: Ia95f0e276482283bf50e06c58c2bc5faab3f62c6 Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com>
show more ...
|
| c9508d6a | 09-Dec-2023 |
Sona Mathew <sonarebecca.mathew@arm.com> |
fix(cpus): workaround for Cortex-A710 erratum 2778471
Cortex-A710 erratum 2778471 is a Cat B erratum that applies to revisions r0p1, r1p0, r2p0 and r2p1 and is still open. The workaround is to set C
fix(cpus): workaround for Cortex-A710 erratum 2778471
Cortex-A710 erratum 2778471 is a Cat B erratum that applies to revisions r0p1, r1p0, r2p0 and r2p1 and is still open. The workaround is to set CPUACTLR3_EL1[47] to 1.
SDEN documentation: https://developer.arm.com/documentation/SDEN-1775101/latest
Change-Id: Id3bb4a2673e41ff237682e46784d37752daf2f83 Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com>
show more ...
|
| 41beb368 | 11-Dec-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(sgi): apply workarounds for N2 CPU erratum" into integration |
| 7934b68a | 10-Dec-2023 |
Thomas Abraham <thomas.abraham@arm.com> |
fix(sgi): apply workarounds for N2 CPU erratum
For RD-N2 and variant platforms, enable workarounds available for the N2 CPU erratum.
Signed-off-by: Thomas Abraham <thomas.abraham@arm.com> Change-Id
fix(sgi): apply workarounds for N2 CPU erratum
For RD-N2 and variant platforms, enable workarounds available for the N2 CPU erratum.
Signed-off-by: Thomas Abraham <thomas.abraham@arm.com> Change-Id: Ib0240f56813a913309e5a6a1902e2990979e9617
show more ...
|
| 940c1e64 | 11-Dec-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes If2743827,I163f8169,I97a69650 into integration
* changes: feat(imx8m): add 3600 MTps DDR PLL rate fix(imx8m): align 3200 MTps rate with U-Boot fix(imx8m): handle 3734 in addition
Merge changes If2743827,I163f8169,I97a69650 into integration
* changes: feat(imx8m): add 3600 MTps DDR PLL rate fix(imx8m): align 3200 MTps rate with U-Boot fix(imx8m): handle 3734 in addition to 3733 and 3732 MTps rates
show more ...
|
| 54b86d47 | 10-Dec-2023 |
Thomas Abraham <thomas.abraham@arm.com> |
fix(cpus): fix incorrect AMU trap settings for N2 CPU
The TAM bits of CPTR_EL2 and CPTR_EL3 are incorrectly set in the reset handling sequence of the Neoverse N2 CPU. As these bits are set, any acce
fix(cpus): fix incorrect AMU trap settings for N2 CPU
The TAM bits of CPTR_EL2 and CPTR_EL3 are incorrectly set in the reset handling sequence of the Neoverse N2 CPU. As these bits are set, any access of AMU registers from EL0/EL1 and EL2 respectively are incorrectly trapped to a higher EL. Fix this by clearing the TAM bits in both the CPTR_EL2 and CPTR_EL3 registers.
Signed-off-by: Thomas Abraham <thomas.abraham@arm.com> Change-Id: I357b16dfc7d7367b8a0c8086faac28f3e2866cd8
show more ...
|
| c0ae04ad | 08-Dec-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge "feat(versal-net): add bufferless IPI Support" into integration |
| dcbc607d | 08-Dec-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge "build(versal-net): reorganize platform source files" into integration |
| c52fbc0f | 07-Dec-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "ns/spmc_at_el3" into integration
* changes: feat(rdn2): update power message value to 0 feat(el3-spmc): add support to handle power mgmt calls for s-el0 sp |
| 08f6398b | 30-Nov-2023 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(rdn2): update power message value to 0
Standalone MM used by RD-N2 platfrom does not have power messaging support. Set the value to 0.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Ch
feat(rdn2): update power message value to 0
Standalone MM used by RD-N2 platfrom does not have power messaging support. Set the value to 0.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: Icdb16ea1976ce751071ce3df0e4bd86f3fb8ab8b
show more ...
|
| 59173793 | 28-Apr-2022 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(el3-spmc): add support to handle power mgmt calls for s-el0 sp
Add support to setup S-EL0 SP context during power management power on procedure. In case of power on, initialise the context data
feat(el3-spmc): add support to handle power mgmt calls for s-el0 sp
Add support to setup S-EL0 SP context during power management power on procedure. In case of power on, initialise the context data structure for the secure world on the current CPU. The S-EL0 SP does not support power message. Add the check to make sure that it does not subscribe to any power messages.
Signed-off-by: Achin Gupta <achin.gupta@arm.com> Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: Ic9cf98cd15b6ee5d86d071a52bc0973677049df3
show more ...
|
| 27c9f71a | 07-Dec-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "fix(tc): guard PSA crypto headers under TF-M test-suite define" into integration |
| 8eb4efe7 | 04-Dec-2023 |
Henrik Nordstrom <henrik.nordstrom@addiva.se> |
fix(marvell-tools): include mbedtls/version.h before use
mbedtls/version.h needs to be included before the use of any mbedtls config variables.
Fixes a build failure regression from commit a8eadc51
fix(marvell-tools): include mbedtls/version.h before use
mbedtls/version.h needs to be included before the use of any mbedtls config variables.
Fixes a build failure regression from commit a8eadc51a.
Change-Id: Idd955d7955b0a55ffd127f31053335542cb15e22 Signed-off-by: Henrik Nordstrom <henrik.nordstrom@addiva.se>
show more ...
|
| 02091541 | 06-Dec-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "fix(intel): update HPS bridges for Agilex5 SoC FPGA" into integration |