| 9f9bfd7a | 21-Jul-2023 |
Manish Pandey <manish.pandey2@arm.com> |
docs(el3-runtime): update BL31 exception vector handling
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: Ieae66bafe1cdd253edebecddea156551144a1cc9 |
| 6d22b089 | 11-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
fix(el3-runtime): restrict lower el EA handlers in FFH mode
This patch does following changes to restrict handling of lower EL EA's only if FFH mode is enabled.
- Compile ea_delegate.S only if FFH
fix(el3-runtime): restrict lower el EA handlers in FFH mode
This patch does following changes to restrict handling of lower EL EA's only if FFH mode is enabled.
- Compile ea_delegate.S only if FFH mode is enabled. - For Sync exception from lower ELs if the EC is not SMC or SYS reg trap it was assumed that it is an EA, which is not correct. Move the known Sync exceptions (EL3 Impdef) out of sync EA handler. - Report unhandled exceptions if there are SError from lower EL in KFH mode, as this is unexpected. - Move code out of ea_delegate.S which are used for KFH mode.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I577089677d0ec8cde7c20952172bee955573d2ed
show more ...
|
| f87e54f7 | 10-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
fix(ras): remove RAS_FFH_SUPPORT and introduce FFH_SUPPORT
This patch removes RAS_FFH_SUPPORT macro which is the combination of ENABLE_FEAT_RAS and HANDLE_EA_EL3_FIRST_NS. Instead introduce an inter
fix(ras): remove RAS_FFH_SUPPORT and introduce FFH_SUPPORT
This patch removes RAS_FFH_SUPPORT macro which is the combination of ENABLE_FEAT_RAS and HANDLE_EA_EL3_FIRST_NS. Instead introduce an internal macro FFH_SUPPORT which gets enabled when platforms wants to enable lower EL EA handling at EL3. The internal macro FFH_SUPPORT will be automatically enabled if HANDLE_EA_EL3_FIRST_NS is enabled. FFH_SUPPORT along with ENABLE_FEAT_RAS will be used in source files to provide equivalent check which was provided by RAS_FFH_SUPPORT earlier. In generic code we needed a macro which could abstract both HANDLE_EA_EL3_FIRST_NS and RAS_FFH_SUPPORT macros that had limitations. Former was tied up with NS world only while the latter was tied to RAS feature.
This is to allow Secure/Realm world to have their own FFH macros in future.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: Ie5692ccbf462f5dcc3f005a5beea5aa35124ac73
show more ...
|
| 4c7abf85 | 31-Oct-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
chore(zynqmp): reorganize tsp code into common path
Reorganized TSP code into common folder, updated paths in tsp-zynqmp.mk. Handling the return value of a console registration function.
Change-Id:
chore(zynqmp): reorganize tsp code into common path
Reorganized TSP code into common folder, updated paths in tsp-zynqmp.mk. Handling the return value of a console registration function.
Change-Id: I848f17c3417b3e8c8cbd2058e9642ed13d121325 Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>
show more ...
|
| 51564354 | 26-Oct-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
refactor(xilinx): rename platform function to generic name
Refactor two platform specific functions, plat_versal_get_mmap() and plat_versal_net_get_mmap(), to use a more generic function name plat_g
refactor(xilinx): rename platform function to generic name
Refactor two platform specific functions, plat_versal_get_mmap() and plat_versal_net_get_mmap(), to use a more generic function name plat_get_mmap(). The function can be used in the common code to obtain memory region.
Change-Id: I3eeb24aff217eef30af60a7742cbebe9d3b2edce Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>
show more ...
|
| e712f924 | 01-Nov-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "hst/cs1k-add-gpt-support" into integration
* changes: feat(bl2): add gpt support fix(corstone-1000): modify boot device dependencies fix(corstone-1000): removing the
Merge changes from topic "hst/cs1k-add-gpt-support" into integration
* changes: feat(bl2): add gpt support fix(corstone-1000): modify boot device dependencies fix(corstone-1000): removing the signature area
show more ...
|
| 970a4a8d | 10-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
fix(ras): restrict ENABLE_FEAT_RAS to have only two states
As part of migrating RAS extension to feature detection mechanism, the macro ENABLE_FEAT_RAS was allowed to have dynamic detection (FEAT_ST
fix(ras): restrict ENABLE_FEAT_RAS to have only two states
As part of migrating RAS extension to feature detection mechanism, the macro ENABLE_FEAT_RAS was allowed to have dynamic detection (FEAT_STATE 2). Considering this feature does impact execution of EL3 and we need to know at compile time about the presence of this feature. Do not use dynamic detection part of feature detection mechanism.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I23858f641f81fbd81b6b17504eb4a2cc65c1a752
show more ...
|
| 6597fcf1 | 26-Jun-2023 |
Manish Pandey <manish.pandey2@arm.com> |
feat(ras): use FEAT_IESB for error synchronization
For synchronization of errors at exception boundries TF-A uses "esb" instruction with FEAT_RAS or "dsb" and "isb" otherwise. The problem with esb i
feat(ras): use FEAT_IESB for error synchronization
For synchronization of errors at exception boundries TF-A uses "esb" instruction with FEAT_RAS or "dsb" and "isb" otherwise. The problem with esb instruction is, along with synching errors it might also consume the error, which is not ideal in all scenarios. On the other hand we can't use dsb always as its in the hot path.
To solve above mentioned problem the best way is to use FEAT_IESB feature which provides controls to insert an implicit Error synchronization event at exception entry and exception return.
Assumption in TF-A is, if RAS Extension is present then FEAT_IESB will also be present and enabled.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: Ie5861eec5da4028a116406bb4d1fea7dac232456
show more ...
|
| d04c04a4 | 25-May-2023 |
Manish Pandey <manish.pandey2@arm.com> |
feat(el3-runtime): modify vector entry paths
Vector entries in EL3 from lower ELs, first check for any pending async EAs from lower EL before handling the original exception. This happens when there
feat(el3-runtime): modify vector entry paths
Vector entries in EL3 from lower ELs, first check for any pending async EAs from lower EL before handling the original exception. This happens when there is an error (EA) in the system which is not yet signaled to PE while executing at lower EL. During entry into EL3 the errors (EA) are synchronized causing async EA to pend at EL3.
On detecting the pending EA (via ISR_EL1.A) EL3 either reflects it back to lower EL (KFH) or handles it in EL3 (FFH) based on EA routing model.
In case of Firmware First handling mode (FFH), EL3 handles the pended EA first before returing back to handle the original exception.
While in case of Kernel First handling mode (KFH), EL3 will return back to lower EL without handling the original exception. On returing to lower EL, EA will be pended. In KFH mode there is a risk of back and forth between EL3 and lower EL if the EA is masked at lower EL or priority of EA is lower than that of original exception. This is a limitation in current architecture but can be solved in future if EL3 gets a capability to inject virtual SError.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I3a2a31de7cf454d9d690b1ef769432a5b24f6c11
show more ...
|
| 33bb5787 | 31-Oct-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "feat(cpufeat): add memory retention bit define for CLUSTERPWRDN" into integration |
| 6ed98c45 | 20-Oct-2023 |
Harsimran Singh Tungal <harsimransingh.tungal@arm.com> |
feat(bl2): add gpt support
This includes initialization of the partition with the GPT_IMAGE_ID.
Change-Id: I51b09d82ff40207369d76011556f40169196af22 Signed-off-by: Mohamed Omar Asaker <mohamed.omar
feat(bl2): add gpt support
This includes initialization of the partition with the GPT_IMAGE_ID.
Change-Id: I51b09d82ff40207369d76011556f40169196af22 Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com> Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
show more ...
|
| 3ff5fc2b | 20-Oct-2023 |
Harsimran Singh Tungal <harsimransingh.tungal@arm.com> |
fix(corstone-1000): modify boot device dependencies
Modify boot device dependencies and remove the one's which are not needed.
Change-Id: I71cd60558ab4bb5162afefad4f00d631c2308e72 Signed-off-by: Mo
fix(corstone-1000): modify boot device dependencies
Modify boot device dependencies and remove the one's which are not needed.
Change-Id: I71cd60558ab4bb5162afefad4f00d631c2308e72 Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com> Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
show more ...
|
| 95620113 | 31-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "refactor(cm): move EL3 registers to global context" into integration |
| a0dab4f0 | 31-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(build): remove handling of mandatory options" into integration |
| e8d60a31 | 31-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "hm/mpam" into integration
* changes: fix(build): convert tabs and ifdef comparisons fix(build): disable ENABLE_FEAT_MPAM for Aarch32 |
| 72f027c3 | 31-Oct-2023 |
Harrison Mutai <harrison.mutai@arm.com> |
fix(build): convert tabs and ifdef comparisons
Make interprets lines prefixed with the tab characters as recipes (commands to run in the shell). Convert the use of ifdef as this incorrectly interpre
fix(build): convert tabs and ifdef comparisons
Make interprets lines prefixed with the tab characters as recipes (commands to run in the shell). Convert the use of ifdef as this incorrectly interprets when a flag is disabled i.e. `ENABLE_FEAT_MPAM=0`.
Change-Id: I5173d18a20ef0e3ffc32f0ffb1e70dc30aa4c4a9 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 6cc94958 | 31-Oct-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "refactor(fvp): do not use RSS platform token and attestation key APIs" into integration |
| a07b4590 | 31-Oct-2023 |
Harrison Mutai <harrison.mutai@arm.com> |
fix(build): disable ENABLE_FEAT_MPAM for Aarch32
Disable FEAT_MPAM support for Aarch32 as it is not supported, following [1]. ENABLE_FEAT_MPAM is set to 2 by default for Aarch64 in arch_features.mk,
fix(build): disable ENABLE_FEAT_MPAM for Aarch32
Disable FEAT_MPAM support for Aarch32 as it is not supported, following [1]. ENABLE_FEAT_MPAM is set to 2 by default for Aarch64 in arch_features.mk, eliminating the need for duplication in the platform makefile.
[1] https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/23710
Change-Id: I1c8b6844254e00e6372900f1c87f995f292ae65c Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 5856a91a | 20-Oct-2023 |
Harsimran Singh Tungal <harsimransingh.tungal@arm.com> |
fix(corstone-1000): removing the signature area
The TF-M on the secure enclave side takes care of boot bank selection for our platform. The TF-A doesn't require to manage the boot bank, so, removing
fix(corstone-1000): removing the signature area
The TF-M on the secure enclave side takes care of boot bank selection for our platform. The TF-A doesn't require to manage the boot bank, so, removing the boot bank selection. TF-A doesn't expect the signature area so removed it from FIP partition
Change-Id: I298dd51fa068534c299c66b0e4c353819ea12a26 Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com> Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
show more ...
|
| fd7e32b8 | 31-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "hm/post-image" into integration
* changes: refactor(fvp): move image handling into generic procedure refactor(bl2): make post image handling platform-specific |
| 461c0a5d | 18-Jul-2023 |
Elizabeth Ho <elizabeth.ho@arm.com> |
refactor(cm): move EL3 registers to global context
Currently, EL3 context registers are duplicated per-world per-cpu. Some registers have the same value across all CPUs, so this patch moves these re
refactor(cm): move EL3 registers to global context
Currently, EL3 context registers are duplicated per-world per-cpu. Some registers have the same value across all CPUs, so this patch moves these registers out into a per-world context to reduce memory usage.
Change-Id: I91294e3d5f4af21a58c23599af2bdbd2a747c54a Signed-off-by: Elizabeth Ho <elizabeth.ho@arm.com> Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| 7bf18514 | 31-Oct-2023 |
Soby Mathew <soby.mathew@arm.com> |
Merge "feat(rmm): update RMI VERSION command as per EAC5" into integration |
| d5be8027 | 05-Sep-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
docs(spm-mm): remove reference to SEL2 SPMC
As the SEL2 SPMC design doc is migrated to Hafnium tree, remove the reference to this implementation from TF-A's SPM-MM doc.
Signed-off-by: Olivier Depre
docs(spm-mm): remove reference to SEL2 SPMC
As the SEL2 SPMC design doc is migrated to Hafnium tree, remove the reference to this implementation from TF-A's SPM-MM doc.
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: I1609c7d1d098420412dffc7b1309cc9c11502f8a
show more ...
|
| 6c33e871 | 05-Sep-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
docs: remove SEL2 SPMC threat model
The SEL2/Hafnium SPMC implementation threat model is now hosted at [1].
[1] https://hafnium.readthedocs.io/en/latest/threat_model_spm.html
Signed-off-by: Olivie
docs: remove SEL2 SPMC threat model
The SEL2/Hafnium SPMC implementation threat model is now hosted at [1].
[1] https://hafnium.readthedocs.io/en/latest/threat_model_spm.html
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: I83d3f21ef0ee9364529c7b80de9872034ff92b09
show more ...
|
| 0fd975ac | 05-Sep-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
docs: remove unused SPM related diagrams
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: Ia60c4aa6a0aa0da5765d295e658964e6faa5960a
|