| 10fd85d8 | 17-Aug-2023 |
Werner Lewis <werner.lewis@arm.com> |
feat(morello): set NT_FW_CONFIG properties for MCC, PCC and SCP version
SDS firmware version structure is added with MCC, PCC and SCP firmware version members. These are set in NT_FW_CONFIG to provi
feat(morello): set NT_FW_CONFIG properties for MCC, PCC and SCP version
SDS firmware version structure is added with MCC, PCC and SCP firmware version members. These are set in NT_FW_CONFIG to provide access to firmware version information in UEFI.
Signed-off-by: Werner Lewis <werner.lewis@arm.com> Change-Id: Ib0c476e54ef428fb7904f0de5c6f4df6a5fbd7db
show more ...
|
| 7414aaa1 | 03-Nov-2023 |
Ronak Jain <ronak.jain@amd.com> |
feat(zynqmp): remove pm_ioctl_set_sgmii_mode api
There are no existing users of pm_ioctl_set_sgmii_mode() API so cleanup the dead code.
Change-Id: I1088d2f5c944bf54fc5fdd554360bdd321ad798a Signed-o
feat(zynqmp): remove pm_ioctl_set_sgmii_mode api
There are no existing users of pm_ioctl_set_sgmii_mode() API so cleanup the dead code.
Change-Id: I1088d2f5c944bf54fc5fdd554360bdd321ad798a Signed-off-by: Ronak Jain <ronak.jain@amd.com>
show more ...
|
| 93823fb6 | 02-Nov-2023 |
Soby Mathew <soby.mathew@arm.com> |
Merge "fix(rmmd): enable sme using sme_enable_per_world" into integration |
| c0e16d30 | 01-Nov-2023 |
Arunachalam Ganapathy <arunachalam.ganapathy@arm.com> |
fix(rmmd): enable sme using sme_enable_per_world
Enable SME for RMM using sme_enable_per_world as well as sme_enable.
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com> Change-Id:
fix(rmmd): enable sme using sme_enable_per_world
Enable SME for RMM using sme_enable_per_world as well as sme_enable.
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com> Change-Id: I6070f4778e507ac9cbc7442e727bedad9b40e635
show more ...
|
| fe06e118 | 17-Oct-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(cpus): workaround for Cortex-X2 erratum 2742423
Cortex-X2 erratum 2742423 is a Cat B erratum that applies to all revisions <= r2p1 and is still open. The workaround is to set CPUACTLR5_EL1[56:55
fix(cpus): workaround for Cortex-X2 erratum 2742423
Cortex-X2 erratum 2742423 is a Cat B erratum that applies to all revisions <= r2p1 and is still open. The workaround is to set CPUACTLR5_EL1[56:55] to 2'b01.
SDEN documentation: https://developer.arm.com/documentation/SDEN-1775100/latest
Change-Id: I03897dc2a7f908937612c2b66ce7a043c1b7575d Signed-off-by: Bipin Ravi <bipin.ravi@arm.com>
show more ...
|
| d7bc2cb4 | 17-Oct-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(cpus): workaround for Cortex-A710 erratum 2742423
Cortex-A710 erratum 2742423 is a Cat B erratum that applies to all revisions <= r2p1 and is still open. The workaround is to set CPUACTLR5_EL1[5
fix(cpus): workaround for Cortex-A710 erratum 2742423
Cortex-A710 erratum 2742423 is a Cat B erratum that applies to all revisions <= r2p1 and is still open. The workaround is to set CPUACTLR5_EL1[56:55] to 2'b01.
SDEN documentation: https://developer.arm.com/documentation/SDEN-1775101/latest
Change-Id: I4d9d3760491f1e6c59b2667c16d59b99cc7979f1 Signed-off-by: Bipin Ravi <bipin.ravi@arm.com>
show more ...
|
| 68085ad4 | 17-Oct-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(cpus): workaround for Neoverse N2 erratum 2340933
Neoverse N2 erratum 2340933 is a Cat B erratum that applies to revision r0p0 and is fixed in r0p1. The workaround is to set CPUACTLR5_EL1[61] to
fix(cpus): workaround for Neoverse N2 erratum 2340933
Neoverse N2 erratum 2340933 is a Cat B erratum that applies to revision r0p0 and is fixed in r0p1. The workaround is to set CPUACTLR5_EL1[61] to 1.
SDEN documentation: https://developer.arm.com/documentation/SDEN-1982442/latest
Change-Id: I121add0dd35072c53392d33f049d893a5ff6354f Signed-off-by: Bipin Ravi <bipin.ravi@arm.com>
show more ...
|
| 6cb8be17 | 17-Oct-2023 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(cpus): workaround for Neoverse N2 erratum 2346952
Neoverse N2 erratum 2346952 is a Cat B erratum that applies to all revisions <= r0p2 and is fixed in r0p3. The workaround is to set L2 TQ size s
fix(cpus): workaround for Neoverse N2 erratum 2346952
Neoverse N2 erratum 2346952 is a Cat B erratum that applies to all revisions <= r0p2 and is fixed in r0p3. The workaround is to set L2 TQ size statically to it's full size.
SDEN documentation: https://developer.arm.com/documentation/SDEN-1982442/latest
Change-Id: I03c3cf1f951fbc906fdebcb99a523c5ac8ba055d Signed-off-by: Bipin Ravi <bipin.ravi@arm.com>
show more ...
|
| d7cff32a | 02-Nov-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(build): remove duplicated include order" into integration |
| 6f802c44 | 02-Nov-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "mp/exceptions" into integration
* changes: docs(ras): update RAS documentation docs(el3-runtime): update BL31 exception vector handling fix(el3-runtime): restrict low
Merge changes from topic "mp/exceptions" into integration
* changes: docs(ras): update RAS documentation docs(el3-runtime): update BL31 exception vector handling fix(el3-runtime): restrict lower el EA handlers in FFH mode fix(ras): remove RAS_FFH_SUPPORT and introduce FFH_SUPPORT fix(ras): restrict ENABLE_FEAT_RAS to have only two states feat(ras): use FEAT_IESB for error synchronization feat(el3-runtime): modify vector entry paths
show more ...
|
| 5fc1a32a | 02-Nov-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "docs: deletion of a few deprecated platforms not yet confirmed" into integration |
| 41b5a23c | 29-Oct-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
docs(versal-net): add TSP build documentation
Add information about Versal NET platform for TSP and provide the build commands.
Change-Id: Id7c9d75f8a42813ca2bfd18494bfc6b73df0af52 Signed-off-by: P
docs(versal-net): add TSP build documentation
Add information about Versal NET platform for TSP and provide the build commands.
Change-Id: Id7c9d75f8a42813ca2bfd18494bfc6b73df0af52 Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>
show more ...
|
| 7b7c5350 | 29-Oct-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
docs(versal): add TSP build documentation
Add information about Versal platform for TSP and provide the build commands.
Change-Id: I7106ab477a881c58e1c45863bd6854d188982282 Signed-off-by: Prasad Ku
docs(versal): add TSP build documentation
Add information about Versal platform for TSP and provide the build commands.
Change-Id: I7106ab477a881c58e1c45863bd6854d188982282 Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>
show more ...
|
| 639b3676 | 27-Oct-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
feat(versal-net): add tsp support
Introduces support for the Test Secure Payload (TSP) for AMD-Xilinx Versal NET platform. TSP is a component for testing and validating secure OS and trusted execut
feat(versal-net): add tsp support
Introduces support for the Test Secure Payload (TSP) for AMD-Xilinx Versal NET platform. TSP is a component for testing and validating secure OS and trusted execution environments.
If a BL32 image is present, then there must be a matching Secure-EL1 Payload Dispatcher (SPD) service called TSPD, this service is responsible for Initializing the TSP. During initialization that service must register a function to carry out initialization of BL32 once the runtime services are fully initialized. BL31 invokes such a registered function to initialize BL32 before running BL33.
The GICv3 driver is initialized in EL3 and does not need to be initialized again in SEL1 GICv3 driver is initialized in EL3 This is because the S-EL1 can use GIC system registers to manage interrupts and does not need GIC interface base addresses to be configured.
The secure code load address is initially being pointed to 0x0 in the handoff parameters, which is different from the default or user-provided load address of 0x60000000. In this case, set up the PC to the requested BL32_BASE address to ensure that the secure code is loaded and executed from the correct location.
Change-Id: I58fe256dc9d6be5cee384c5ebb9baca2737c02a6 Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>
show more ...
|
| 7ff4d4fb | 31-Oct-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
feat(versal): add tsp support
Introduces support for the Test Secure Payload (TSP) for AMD-Xilinx Versal platform. TSP is a component for testing and validating secure OS and trusted execution envi
feat(versal): add tsp support
Introduces support for the Test Secure Payload (TSP) for AMD-Xilinx Versal platform. TSP is a component for testing and validating secure OS and trusted execution environments.
If a BL32 image is present, then there must be a matching Secure- EL1 Payload Dispatcher (SPD) service called TSPD, this service is responsible for Initializing the TSP. During initialization that service must register a function to carry out initialization of BL32 once the runtime services are fully initialized. BL31 invokes such a registered function to initialize BL32 before running BL33.
The GICv3 driver is initialized in EL3 and does not need to be initialized again in SEL1 GICv3 driver is initialized in EL3 This is because the S-EL1 can use GIC system registers to manage interrupts and does not need GIC interface base addresses to be configured.
The secure code load address is initially being pointed to 0x0 in the handoff parameters, which is different from the default or user-provided load address of 0x60000000. In this case, set up the PC to the requested BL32_BASE address to ensure that the secure code is loaded and executed from the correct location.
Change-Id: Ida0fc6467a10bfde8927ff9b3755a83f3e16f068 Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>
show more ...
|
| 0561070e | 01-Nov-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
refactor(xilinx): add generic TSP makefile
Updated the generic TSP makefile in the common path for reuse in different platforms.
Change-Id: Idd14675bc547e0a4a95132653a181e7ff39a547a Signed-off-by:
refactor(xilinx): add generic TSP makefile
Updated the generic TSP makefile in the common path for reuse in different platforms.
Change-Id: Idd14675bc547e0a4a95132653a181e7ff39a547a Signed-off-by: Prasad Kummari <prasad.kummari@amd.com>
show more ...
|
| 857c7643 | 01-Nov-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "fw-caps" into integration
* changes: feat(ti): query firmware for suspend capability feat(ti): add TI-SCI query firmware capabilities command support feat(ti): remove
Merge changes from topic "fw-caps" into integration
* changes: feat(ti): query firmware for suspend capability feat(ti): add TI-SCI query firmware capabilities command support feat(ti): remove extra core counts in cluster 2 and 3
show more ...
|
| c189adbd | 31-Oct-2023 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(build): remove duplicated include order
Commit(3547270f5 refactor(build): reorder platform Makefile evaluation) re-ordered platform makefile inclusion before arch_features evaluations, but then
fix(build): remove duplicated include order
Commit(3547270f5 refactor(build): reorder platform Makefile evaluation) re-ordered platform makefile inclusion before arch_features evaluations, but then it fails to remove the dependency that were moved and thus have double evaluation of some build variables apparently this breaks BUILD_PLAT.
Additionally remove duplicate checks in SPMD similar checks are in place in main level makefile.
Change-Id: I5a71624fc43977054467ec6502ce359fb1d08838 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| a7eff347 | 26-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
fix(sdei): ensure that interrupt ID is valid
As per SDEI spec (section 5.1.14.1), SDEI_INTERRUPT_BIND interface expects a valid PPI or SPI. SGI's are not allowed to be bounded. Current check in the
fix(sdei): ensure that interrupt ID is valid
As per SDEI spec (section 5.1.14.1), SDEI_INTERRUPT_BIND interface expects a valid PPI or SPI. SGI's are not allowed to be bounded. Current check in the code only checks for an SGI and returns invalid ID. This check is insufficient as it will not catch architecturally invalid interrupt IDs.
Modify the check to ensure that interrupt is either PPI or SPI.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I52eb0a6d7f88a12f6816cff9b68fb3a7ca12cbb7
show more ...
|
| 899bcc84 | 01-Nov-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(tegra): return correct error code for plat_core_pos_by_mpidr" into integration |
| 6bd79b13 | 27-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
fix(tegra): return correct error code for plat_core_pos_by_mpidr
The error code for plat_core_pos_by_mpidr() for an invalid mpidr should be -1 as mandated by portig guide, but for tegra t186 return
fix(tegra): return correct error code for plat_core_pos_by_mpidr
The error code for plat_core_pos_by_mpidr() for an invalid mpidr should be -1 as mandated by portig guide, but for tegra t186 return value is PSCI_E_NOT_PRESENT (-7) even though the comment at top of function says that it should return -1.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I2b69bc1a56f7966f21b2a3c89c515ebde41e3eb8
show more ...
|
| 42604d2d | 13-Jul-2023 |
Manish Pandey <manish.pandey2@arm.com> |
docs(ras): update RAS documentation
Add details about RAS error handling philosophies and its implementation It also updates the tests introduced to verify them.
Signed-off-by: Manish Pandey <manis
docs(ras): update RAS documentation
Add details about RAS error handling philosophies and its implementation It also updates the tests introduced to verify them.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: Iedc8c1e713dad05baadd58e5752df36fa00121a7
show more ...
|
| 9f9bfd7a | 21-Jul-2023 |
Manish Pandey <manish.pandey2@arm.com> |
docs(el3-runtime): update BL31 exception vector handling
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: Ieae66bafe1cdd253edebecddea156551144a1cc9 |
| 6d22b089 | 11-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
fix(el3-runtime): restrict lower el EA handlers in FFH mode
This patch does following changes to restrict handling of lower EL EA's only if FFH mode is enabled.
- Compile ea_delegate.S only if FFH
fix(el3-runtime): restrict lower el EA handlers in FFH mode
This patch does following changes to restrict handling of lower EL EA's only if FFH mode is enabled.
- Compile ea_delegate.S only if FFH mode is enabled. - For Sync exception from lower ELs if the EC is not SMC or SYS reg trap it was assumed that it is an EA, which is not correct. Move the known Sync exceptions (EL3 Impdef) out of sync EA handler. - Report unhandled exceptions if there are SError from lower EL in KFH mode, as this is unexpected. - Move code out of ea_delegate.S which are used for KFH mode.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I577089677d0ec8cde7c20952172bee955573d2ed
show more ...
|
| f87e54f7 | 10-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
fix(ras): remove RAS_FFH_SUPPORT and introduce FFH_SUPPORT
This patch removes RAS_FFH_SUPPORT macro which is the combination of ENABLE_FEAT_RAS and HANDLE_EA_EL3_FIRST_NS. Instead introduce an inter
fix(ras): remove RAS_FFH_SUPPORT and introduce FFH_SUPPORT
This patch removes RAS_FFH_SUPPORT macro which is the combination of ENABLE_FEAT_RAS and HANDLE_EA_EL3_FIRST_NS. Instead introduce an internal macro FFH_SUPPORT which gets enabled when platforms wants to enable lower EL EA handling at EL3. The internal macro FFH_SUPPORT will be automatically enabled if HANDLE_EA_EL3_FIRST_NS is enabled. FFH_SUPPORT along with ENABLE_FEAT_RAS will be used in source files to provide equivalent check which was provided by RAS_FFH_SUPPORT earlier. In generic code we needed a macro which could abstract both HANDLE_EA_EL3_FIRST_NS and RAS_FFH_SUPPORT macros that had limitations. Former was tied up with NS world only while the latter was tied to RAS feature.
This is to allow Secure/Realm world to have their own FFH macros in future.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: Ie5692ccbf462f5dcc3f005a5beea5aa35124ac73
show more ...
|