| 61dfdfd4 | 24-Jan-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "refactor(mte): deprecate CTX_INCLUDE_MTE_REGS" into integration |
| fc26a0fc | 24-Jan-2024 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "feat(qemu-sbsa): handle memory information" into integration |
| 3f024595 | 23-Jan-2024 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge changes from topic "errata" into integration
* changes: fix(cpus): workaround for Cortex-A78C erratum 2683027 fix(cpus): workaround for Cortex-X3 erratum 2266875 fix(cpus): workaround fo
Merge changes from topic "errata" into integration
* changes: fix(cpus): workaround for Cortex-A78C erratum 2683027 fix(cpus): workaround for Cortex-X3 erratum 2266875 fix(cpus): workaround for Cortex-X3 erratum 2302506
show more ...
|
| 0a33adc0 | 21-Dec-2023 |
Govindraj Raja <govindraj.raja@arm.com> |
refactor(mte): deprecate CTX_INCLUDE_MTE_REGS
Currently CTX_INCLUDE_MTE_REGS is used for dual purpose, to enable allocation tags register and to context save and restore them and also to check if mt
refactor(mte): deprecate CTX_INCLUDE_MTE_REGS
Currently CTX_INCLUDE_MTE_REGS is used for dual purpose, to enable allocation tags register and to context save and restore them and also to check if mte feature is available.
To make it more meaningful, remove CTX_INCLUDE_MTE_REGS and introduce FEAT_MTE. This would enable allocation tags register when FEAT_MTE is enabled and also supported from platform.
Also arch features can be conditionally enabled disabled based on arch version from `make_helpers/arch_features.mk`
Change-Id: Ibdd2d43874634ad7ddff93c7edad6044ae1631ed Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| ae6ce196 | 19-Jan-2024 |
Ahmad Fatoum <a.fatoum@pengutronix.de> |
fix(imx8mp): uncondtionally enable only the USB power domain
The i.MX8MP exists in multiple SKUs, some of which lack the NPU or VPU. Yet, we unconditionally enable NPU and VPU power domains in upstr
fix(imx8mp): uncondtionally enable only the USB power domain
The i.MX8MP exists in multiple SKUs, some of which lack the NPU or VPU. Yet, we unconditionally enable NPU and VPU power domains in upstream TF-A, causing it to hang on such SoCs, unless patched.
Enabling all power domains is an idiosyncrasy of the i.MX8MP support, which we don't have on i.MX8MQ, i.MX8MM or i.MX8MN. Therefore let's drop unconditional powering on of all power domains.
As only exception, we will keep enabling the USB power domains. These are enabled in the BootROM if booting over SDPS and boot firmware may expect them to be enabled for non-SDPS recovery too. As USB is available unconditionally on the current i.MX8MP variants, this is deemed acceptable and reduces the chance of breaking existing systems.
Fixes: a775ef25c312 ("plat: imx8mp: Add the basic support for i.MX8MP") Change-Id: Idc6e8f770d240f4d929dffa91f9ccf8c476c6c12 Signed-off-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
show more ...
|
| d4a770a9 | 23-Jan-2024 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "fix(intel): update nand driver to match GHRD design" into integration |
| 4b8e5078 | 23-Jan-2024 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge changes Ib481fade,Id4070b46,I4ac997cd into integration
* changes: feat(rcar3): update IPL and Secure Monitor Rev.4.0.0 feat(rcar3): add cache operations to boot process feat(rcar3): chan
Merge changes Ib481fade,Id4070b46,I4ac997cd into integration
* changes: feat(rcar3): update IPL and Secure Monitor Rev.4.0.0 feat(rcar3): add cache operations to boot process feat(rcar3): change MMU configurations
show more ...
|
| 197ac780 | 03-Jan-2024 |
Yann Gautier <yann.gautier@st.com> |
feat(stm32mp2): add BSEC and OTP support
Add compilation and initialization of BSEC peripheral, to access OTP fuses. Add the definition of OTP fuses.
Signed-off-by: Yann Gautier <yann.gautier@st.co
feat(stm32mp2): add BSEC and OTP support
Add compilation and initialization of BSEC peripheral, to access OTP fuses. Add the definition of OTP fuses.
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: If6403838b1e2c04c59effc8545b381aced5f7cda
show more ...
|
| ae6542f6 | 22-May-2019 |
Nicolas Le Bayon <nicolas.le.bayon@st.com> |
feat(st-bsec): add driver for the new IP version BSEC3
This driver is used for the new version of the BSEC peripheral used on STM32MP25.
Change-Id: I38ca0db22d06704769c994c6806ccd80b17dde6e Signed-
feat(st-bsec): add driver for the new IP version BSEC3
This driver is used for the new version of the BSEC peripheral used on STM32MP25.
Change-Id: I38ca0db22d06704769c994c6806ccd80b17dde6e Signed-off-by: Nicolas Le Bayon <nicolas.le.bayon@st.com> Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com> Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
show more ...
|
| e6a0994c | 23-Jan-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "st-bsec-otp" into integration
* changes: feat(stm32mp2-fdts): add board ID OTP in STM32MP257F-EV1 feat(stm32mp2-fdts): add OTP nodes in STM32MP251 SoC DT file fix(stm
Merge changes from topic "st-bsec-otp" into integration
* changes: feat(stm32mp2-fdts): add board ID OTP in STM32MP257F-EV1 feat(stm32mp2-fdts): add OTP nodes in STM32MP251 SoC DT file fix(stm32mp2): add missing include feat(st): do not directly call BSEC functions in common code feat(st): use stm32_get_otp_value_from_idx() in BL31 refactor(st): update test for closed chip refactor(st-bsec): improve BSEC driver refactor(st): use dashes for BSEC node names
show more ...
|
| 9f9b4814 | 23-Jan-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "fix(marvell-tools): include mbedtls/version.h before use" into integration |
| a773f412 | 15-Nov-2023 |
Girisha Dengi <girisha.dengi@intel.com> |
fix(intel): update nand driver to match GHRD design
Update nand driver to match GHRD design, fix row address calculation method and other misc updates.
Signed-off-by: Girisha Dengi <girisha.dengi@i
fix(intel): update nand driver to match GHRD design
Update nand driver to match GHRD design, fix row address calculation method and other misc updates.
Signed-off-by: Girisha Dengi <girisha.dengi@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I1cb3dda43e767ba243fbe89bfa18818db321c5c2
show more ...
|
| 1064bc6c | 22-Jan-2024 |
Joanna Farley <joanna.farley@arm.com> |
Merge changes from topic "idling-during-subsystem-restart" into integration
* changes: fix(xilinx): add console_flush() before shutdown fix(xilinx): fix sending sgi to linux feat(xilinx): add
Merge changes from topic "idling-during-subsystem-restart" into integration
* changes: fix(xilinx): add console_flush() before shutdown fix(xilinx): fix sending sgi to linux feat(xilinx): add new state to identify cpu power down feat(xilinx): request cpu power down from reset feat(xilinx): power down all cores on receiving cpu pwrdwn req feat(xilinx): add handler for power down req sgi irq feat(xilinx): add wrapper to handle cpu power down req fix(versal-net): use arm common GIC handlers fix(xilinx): rename macros to align with ARM
show more ...
|
| b7e85c7c | 22-Jan-2024 |
Joanna Farley <joanna.farley@arm.com> |
Merge "feat(versal): extend platform address space sizes" into integration |
| c0bf07e0 | 22-Jan-2024 |
Joanna Farley <joanna.farley@arm.com> |
Merge "fix(xilinx): deprecate SiP service count query" into integration |
| 99f9aacd | 22-Jan-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "docs(threat-model): supply chain threat model TF-A" into integration |
| 2109aadd | 22-Jan-2024 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "feat(rcar3): enable the stack protection" into integration |
| 81704f5d | 22-Jan-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "docs(security): security advisory for CVE-2023-49100" into integration |
| 8b7dd839 | 12-Jan-2024 |
Xiong Yining <xiongyining1480@phytium.com.cn> |
feat(qemu-sbsa): handle memory information
As a part of removing DeviceTree from EDK2, we move functions to TF-A:
- counting the number of memory nodes - checking NUMA node id - checking the memory
feat(qemu-sbsa): handle memory information
As a part of removing DeviceTree from EDK2, we move functions to TF-A:
- counting the number of memory nodes - checking NUMA node id - checking the memory address
Signed-off-by: Xiong Yining <xiongyining1480@phytium.com.cn> Signed-off-by: Chen Baozi <chenbaozi@phytium.com.cn> Change-Id: Ib7bce3a65c817a5b3bef6c9e0a459c7ce76c7e35
show more ...
|
| 516a98ef | 22-Jul-2023 |
Hieu Nguyen <hieu.nguyen.dn@renesas.com> |
feat(rcar3): update IPL and Secure Monitor Rev.4.0.0
Update the version to match release versioning scheme. No functional change.
Signed-off-by: Hieu Nguyen <hieu.nguyen.dn@renesas.com> Change-Id:
feat(rcar3): update IPL and Secure Monitor Rev.4.0.0
Update the version to match release versioning scheme. No functional change.
Signed-off-by: Hieu Nguyen <hieu.nguyen.dn@renesas.com> Change-Id: Ib481fade925f74dbea1dd2b39c1abfab888379e4
show more ...
|
| 7e06b067 | 12-Jul-2021 |
Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> |
feat(rcar3): add cache operations to boot process
Add cache operations because BL2 disabled MMU at the end of the boot process, but did not clean/invalidate for the cache used by MMU.
Signed-off-by
feat(rcar3): add cache operations to boot process
Add cache operations because BL2 disabled MMU at the end of the boot process, but did not clean/invalidate for the cache used by MMU.
Signed-off-by: Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> Signed-off-by: Yoshifumi Hosoya <yoshifumi.hosoya.wj@renesas.com> Change-Id: Id4070b46103ca2b50788b3a99f6961a35df24418
show more ...
|
| 5e8c2d8e | 12-Jul-2021 |
Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> |
feat(rcar3): change MMU configurations
Always enable MMU and control access protection.
Signed-off-by: Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> Signed-off-by: Yoshifumi Hosoya <yosh
feat(rcar3): change MMU configurations
Always enable MMU and control access protection.
Signed-off-by: Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> Signed-off-by: Yoshifumi Hosoya <yoshifumi.hosoya.wj@renesas.com> Change-Id: I4ac997cda2985746b2bf97ab9e4e5ace600f43ca
show more ...
|
| cfa466ab | 12-Jul-2021 |
Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> |
feat(rcar3): enable the stack protection
This commit changes ENABLE_STACK_PROTECTOR value to "strong" for enabling the stack protector by canary.
Signed-off-by: Koichi Yamaguchi <koichi.yamaguchi.z
feat(rcar3): enable the stack protection
This commit changes ENABLE_STACK_PROTECTOR value to "strong" for enabling the stack protector by canary.
Signed-off-by: Koichi Yamaguchi <koichi.yamaguchi.zb@hitachi.com> Signed-off-by: Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> Signed-off-by: Yoshifumi Hosoya <yoshifumi.hosoya.wj@renesas.com> Change-Id: Ice351d23c98daf12737a5e65cef743035d62dabe
show more ...
|
| b908814c | 08-Dec-2023 |
laurenw-arm <lauren.wehrmeister@arm.com> |
docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a
docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a software product (open-source project).
These include: - Malicious code commits - Malicious dependencies - Malicious toolchains
This document provides analysis of software supply chain attack threats for the TF-A project
Change-Id: I03545d65a38dc372f3868a16c725b7378640a771 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
show more ...
|
| 57410eeb | 19-Jan-2024 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge "docs(threat-model): add threat model for PSA FWU and TBBR FWU(recovery)" into integration |