| 1438a5e7 | 21-Sep-2023 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge "fix(cpus): update the fix for Cortex-A78AE erratum 1941500" into integration |
| 67a2ad17 | 20-Sep-2023 |
Varun Wadekar <vwadekar@nvidia.com> |
fix(cpus): update the fix for Cortex-A78AE erratum 1941500
This patch fixes the mitigation for erratum 1941500 for the Cortex-A78AE CPUs. The right fix is to set the bit 8, whereas the current code
fix(cpus): update the fix for Cortex-A78AE erratum 1941500
This patch fixes the mitigation for erratum 1941500 for the Cortex-A78AE CPUs. The right fix is to set the bit 8, whereas the current code clears it.
Reported-by: matthias.rosenfelder@nio.io Signed-off-by: Varun Wadekar <vwadekar@nvidia.com> Change-Id: Ib7c3fddd567eeae6204756377e0f77a573c0a911
show more ...
|
| 616b3ce2 | 12-Sep-2023 |
Robin van der Gracht <robin@protonic.nl> |
feat(cert-create): add pkcs11 engine support
Add pkcs11 engine support which allows using keys that are securely stored on a HSM or TPM. To use this feature the user has to supply an RFC 7512 compli
feat(cert-create): add pkcs11 engine support
Add pkcs11 engine support which allows using keys that are securely stored on a HSM or TPM. To use this feature the user has to supply an RFC 7512 compliant PKCS11 URI to a key instead of a file as an argument to one of the key options. This change is fully backwards compatible.
This change makes use of the openssl engine API which is deprecated since openssl 3.0 and will most likely be removed in version 4. So pkcs11 support will have to be updated to the openssl provider API in the near future.
Signed-off-by: Robin van der Gracht <robin@protonic.nl> Change-Id: If96725988ca62c5613ec59123943bf15922f5d1f
show more ...
|
| aadb759a | 21-Sep-2023 |
Yann Gautier <yann.gautier@st.com> |
Merge "fix(ufs): performs unsigned shift for doorbell" into integration |
| ea6f8452 | 19-Sep-2023 |
Robin van der Gracht <robin@protonic.nl> |
fix(cert-create): key: Avoid having a temporary value for pkey in key_load
key->key and k will point to the same if PEM_read_PrivateKey (pem_read_bio_key_decoder) succeeds. There is no need for the
fix(cert-create): key: Avoid having a temporary value for pkey in key_load
key->key and k will point to the same if PEM_read_PrivateKey (pem_read_bio_key_decoder) succeeds. There is no need for the temporary 'k' pointer here.
Signed-off-by: Robin van der Gracht <robin@protonic.nl> Change-Id: I219c49d331eb6dd7200b49b75d47fd66da3d82dd
show more ...
|
| cd83a766 | 20-Sep-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(st-ddr): express memory size with size_t type" into integration |
| 3e6b96e8 | 20-Sep-2023 |
Michal Simek <michal.simek@amd.com> |
feat(xilinx): used console also as crash console
CONSOLE_FLAG_CRASH should be also setup to get crash logs on the same console. Both platforms are using crash console implementation from plat/common
feat(xilinx): used console also as crash console
CONSOLE_FLAG_CRASH should be also setup to get crash logs on the same console. Both platforms are using crash console implementation from plat/common/aarch64/crash_console_helpers.S that's why there is necessary to setup CONSOLE_FLAG_CRASH. plat_crash_console_putc() implementation is saying: "int plat_crash_console_putc(char c) Prints the character on all consoles registered with the console framework that have CONSOLE_FLAG_CRASH set. Note that this is only helpful for crashes that occur after the platform intialization code has registered a console. Platforms using this implementation need to ensure that all console drivers they use that have the CRASH flag set support this (i.e. are written in assembly and comply to the register clobber requirements of plat_crash_console_putc()."
Change-Id: I314cacbcb0bfcc85fe734882e38718f2763cdbf4 Signed-off-by: Michal Simek <michal.simek@amd.com>
show more ...
|
| 6a14246a | 18-Sep-2023 |
Michal Simek <michal.simek@amd.com> |
feat(versal-net): remove empty crash console setup
Private plat_crash_console_init() has all the setup commented that's why it was never been tested. pl011 uart is supposed to be used as crash conso
feat(versal-net): remove empty crash console setup
Private plat_crash_console_init() has all the setup commented that's why it was never been tested. pl011 uart is supposed to be used as crash console and it should be enought to add CONSOLE_FLAG_CRASH and remove platform specific implementation and use generic one. Early console can't be used for early ASM debugging but that's expected and not required.
Change-Id: I1267fd78c0d6532a0baddbcad8a5b2a7dfc7750b Signed-off-by: Michal Simek <michal.simek@amd.com>
show more ...
|
| 84de50c7 | 19-Sep-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "feat(ethos-n): update npu error handling" into integration |
| 1e038c94 | 19-Sep-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "fix(cpufeat): move nested virtualization support to optionals" into integration |
| 83e79a39 | 19-Sep-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(mmc): initialises response buffer with zeros" into integration |
| 8b2048c1 | 19-Sep-2023 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(cpufeat): move nested virtualization support to optionals
Commit(f5211420b refactor(cpufeat): refactor arch feature build options) accidentally added nested virtualization support to mandatory 8
fix(cpufeat): move nested virtualization support to optionals
Commit(f5211420b refactor(cpufeat): refactor arch feature build options) accidentally added nested virtualization support to mandatory 8.4 features move this to optional 8.4 features list.
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com> Change-Id: I3eb84ea489b6a5cc419359bc056aaadcced0ad0e
show more ...
|
| 455cd0d3 | 19-Sep-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge "chore: remove MULTI_CONSOLE_API references" into integration |
| c228daf5 | 19-Sep-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "fix(qemu_sbsa): align FIP base to BL1 size" into integration |
| 78b3792a | 19-Sep-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "feat(qemu): add "neoverse-n2" cpu support" into integration |
| 58dd153c | 19-Sep-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(cpus): workaround for Neoverse V2 erratum 2743011
Neoverse V2 erratum 2743011 is a Cat B erratum that applies to all revisions <= r0p1 and is fixed in r0p2. The workaround is to set CPUACTLR5_EL
fix(cpus): workaround for Neoverse V2 erratum 2743011
Neoverse V2 erratum 2743011 is a Cat B erratum that applies to all revisions <= r0p1 and is fixed in r0p2. The workaround is to set CPUACTLR5_EL1[56:55] to 2'b01.
SDEN documentation: https://developer.arm.com/documentation/SDEN2332927/latest
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: I0e06ca723a1cce51fb027b7160f3dd06a4c93e64
show more ...
|
| ff342643 | 19-Sep-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(cpus): workaround for Neoverse V2 erratum 2779510
Neoverse V2 erratum 2779510 is a Cat B erratum that applies to all revisions <= r0p1 and is fixed in r0p2. The workaround is to set bit[47] of C
fix(cpus): workaround for Neoverse V2 erratum 2779510
Neoverse V2 erratum 2779510 is a Cat B erratum that applies to all revisions <= r0p1 and is fixed in r0p2. The workaround is to set bit[47] of CPUACTLR3_EL1 which might have a small impact on power and negligible impact on performance.
SDEN documentation: https://developer.arm.com/documentation/SDEN2332927/latest
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: I6d937747bdcbf2913a64c4037f99918cbc466e80
show more ...
|
| b0114025 | 18-Sep-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(cpus): workaround for Neoverse V2 erratum 2719105
Neoverse V2 erratum 2719105 is a Cat B erratum that applies to all revisions <= r0p1 and is fixed in r0p2.
The erratum is avoided by setting CP
fix(cpus): workaround for Neoverse V2 erratum 2719105
Neoverse V2 erratum 2719105 is a Cat B erratum that applies to all revisions <= r0p1 and is fixed in r0p2.
The erratum is avoided by setting CPUACTLR2_EL1[0] to 1 to force PLDW/PFRM ST to behave like PLD/PRFM LD and not cause invalidations to other PE caches. There might be a small performance degradation to this workaround for certain workloads that share data.
SDEN documentation: https://developer.arm.com/documentation/SDEN2332927/latest
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: Id026edcb7ee1ca93371ce0001d18f5a8282c49ba
show more ...
|
| 8852fb5b | 18-Sep-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(cpus): workaround for Neoverse V2 erratum 2331132
Neoverse V2 erratum 2331132 is a Cat B erratum that applies to all revisions <= r0p2 and is still open. The workaround is to write the value 4'b
fix(cpus): workaround for Neoverse V2 erratum 2331132
Neoverse V2 erratum 2331132 is a Cat B erratum that applies to all revisions <= r0p2 and is still open. The workaround is to write the value 4'b1001 to the PF_MODE bits in the IMP_CPUECTLR2_EL1 register which will place the data prefetcher in the most conservative mode instead of disabling it.
SDEN documentation: https://developer.arm.com/documentation/SDEN2332927/latest
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: Ic6c76375df465a4ad2e20dd7add7037477d973c1
show more ...
|
| 57b557d0 | 18-Sep-2023 |
Mark Dykes <mark.dykes@arm.com> |
Merge "refactor(cpufeat): refactor arch feature build options" into integration |
| 408cde8a | 18-Sep-2023 |
Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> |
fix(qemu_sbsa): align FIP base to BL1 size
RME patch series shown that we can build larger BL1 than we can run:
NOTICE: Booting Trusted Firmware NOTICE: BL1: v2.9(debug):v2.9.0-736-g08548888a NOT
fix(qemu_sbsa): align FIP base to BL1 size
RME patch series shown that we can build larger BL1 than we can run:
NOTICE: Booting Trusted Firmware NOTICE: BL1: v2.9(debug):v2.9.0-736-g08548888a NOTICE: BL1: Built : 12:10:39, Sep 18 2023 INFO: BL1: RAM 0x3ffee000 - 0x3fffb000 INFO: BL1: Loading BL2 WARNING: Firmware Image Package header check failed.
RME pushed debug build BL1 over 0x8000 in size. This exposed an error where FIP_BASE (supposed to be at BL1_SIZE offset from start of flash) was actually 0x8000 and not 0x12000. Make sure we have space for BL1 by deriving FIP_BASE from it.
Note: this is a breaking change for edk2 FD image generation, which had similarly hardcoded a 0x8000 offset. These images must be updated in lock-step.
Change-Id: I8a1a85e82319945a4412c424467d818d5b6e4ecd Signed-off-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org>
show more ...
|
| 6ab8bb76 | 18-Sep-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "docs(maintainers): update corstone1000 maintainers" into integration |
| 140d8909 | 10-Aug-2023 |
Xueliang Zhong <xueliang.zhong@arm.com> |
docs(maintainers): update corstone1000 maintainers
Update maintainers list for corstone1000 platform.
Signed-off-by: Xueliang Zhong <xueliang.zhong@arm.com> Change-Id: I779e3717f6a6e19d32e8568eda05
docs(maintainers): update corstone1000 maintainers
Update maintainers list for corstone1000 platform.
Signed-off-by: Xueliang Zhong <xueliang.zhong@arm.com> Change-Id: I779e3717f6a6e19d32e8568eda05204cd46f35ea
show more ...
|
| dbfafc5e | 18-Sep-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "fix(auth): don't overwrite pk with converted pk when rotpk is hash" into integration |
| b4e1e8fb | 18-Sep-2023 |
Yann Gautier <yann.gautier@st.com> |
fix(st-ddr): express memory size with size_t type
Express memory size with size_t type in structures. Retrieve value as uint32_t from device tree and then cast it to size_t. Combined with uintptr_t
fix(st-ddr): express memory size with size_t type
Express memory size with size_t type in structures. Retrieve value as uint32_t from device tree and then cast it to size_t. Combined with uintptr_t use, it ensures a generic algorithm whatever the platform architecture, notably within systematic tests. Adapt also their prototypes.
Move memory size print outside stm32mp_ddr_check_size() to adapt it to related platform.
Signed-off-by: Nicolas Le Bayon <nicolas.le.bayon@st.com> Change-Id: Ic6e1a62d7a5e23cef49909a658098c800e7dae3f
show more ...
|