| 079c6e24 | 08-May-2023 |
Akshay Belsare <akshay.belsare@amd.com> |
feat(versal): add support for SMCC ARCH SOC ID
Add support for SMCCC_ARCH_SOC_ID as per SMC Calling Convention for Versal platform. The SMCC ARCH SOC ID call is used by system software to obtain the
feat(versal): add support for SMCC ARCH SOC ID
Add support for SMCCC_ARCH_SOC_ID as per SMC Calling Convention for Versal platform. The SMCC ARCH SOC ID call is used by system software to obtain the SiP defined SoC identification details.
Change-Id: I1466a9ad1bc8dde1cda516ddd3edbaa6a5941237 Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
show more ...
|
| 4265bcae | 12-May-2023 |
Akshay Belsare <akshay.belsare@amd.com> |
refactor(versal-net): move macros to common header
Move the macros to common header from platform specific folder, so that the same macros can be re-used in other platforms.
Change-Id: I355b024f5e8
refactor(versal-net): move macros to common header
Move the macros to common header from platform specific folder, so that the same macros can be re-used in other platforms.
Change-Id: I355b024f5e870c6fc104598bc571dbaa29503ae2 Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
show more ...
|
| 0563601f | 03-Apr-2023 |
Akshay Belsare <akshay.belsare@amd.com> |
feat(xilinx): add support to get chipid
Add support for PM API SYS to get the chip ID from the target. The API calls the IPI command to read the Chip idcode and revision.
Change-Id: Id4d7d812cbf77c
feat(xilinx): add support to get chipid
Add support for PM API SYS to get the chip ID from the target. The API calls the IPI command to read the Chip idcode and revision.
Change-Id: Id4d7d812cbf77c5e2fc7785b8afb379214f8dd19 Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
show more ...
|
| 545330b8 | 24-May-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge "fix(versal-net): fix BLXX memory limits for user defined values" into integration |
| 74bda905 | 24-May-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge changes Ica1f9786,Ic96e3680 into integration
* changes: fix(versal): fix BLXX memory limits for user defined values fix(zynqmp): fix BLXX memory limits for user defined values |
| a80da389 | 24-May-2023 |
Michal Simek <michal.simek@amd.com> |
fix(versal-net): fix BLXX memory limits for user defined values
When compiling with user defined areas of memory the platform code calculates the size with (base + size - 1). However, the linker fi
fix(versal-net): fix BLXX memory limits for user defined values
When compiling with user defined areas of memory the platform code calculates the size with (base + size - 1). However, the linker file aligns section on a page boundary. So having the -1 in the size calculations leads to an error message looking like this:
bl31.elf section `coherent_ram' will not fit in region `RAM' aarch64-buildroot-linux-uclibc-ld: region `RAM' overflowed by 1 byte
While at it fix all other occurences of predefined values that were calculated with -1.
Fixes: 1d333e69091f ("feat(versal-net): add support for Xilinx Versal NET platform") Change-Id: I4455f63ee3ad52369f517a7d8d3627faf0b28c0f Signed-off-by: Michal Simek <michal.simek@amd.com>
show more ...
|
| 13cc1aa7 | 15-May-2023 |
Shruti Gupta <shruti.gupta@arm.com> |
feat(rme): save PAuth context when RME is enabled
This patch enables CTX_INCLUDE_PAUTH_REGS for RME builds. The RMM-EL3 specification is also updated to reflect the changes and also version of the s
feat(rme): save PAuth context when RME is enabled
This patch enables CTX_INCLUDE_PAUTH_REGS for RME builds. The RMM-EL3 specification is also updated to reflect the changes and also version of the same is bumped from 0.1 to 0.2.
Signed-off-by: Shruti Gupta <shruti.gupta@arm.com> Change-Id: I2e96a592d2b75abaee24294240c1727c5ceba420
show more ...
|
| f123b91f | 23-May-2023 |
Ilias Apalodimas <ilias.apalodimas@linaro.org> |
fix(versal): fix BLXX memory limits for user defined values
When compiling with user defined areas of memory the platform code calculates the size with (base + size - 1). However, the linker file a
fix(versal): fix BLXX memory limits for user defined values
When compiling with user defined areas of memory the platform code calculates the size with (base + size - 1). However, the linker file aligns section on a page boundary. So having the -1 in the size calculations leads to an error message looking like this:
bl31.elf section `coherent_ram' will not fit in region `RAM' aarch64-buildroot-linux-uclibc-ld: region `RAM' overflowed by 1 byte
While at it fix all other occurences of predefined values that were calculated with -1
Fixes: commit f91c3cb1df7d4 ("arm64: versal: Add support for new Xilinx Versal ACAPs") Signed-off-by: Ilias Apalodimas <ilias.apalodimas@linaro.org> Change-Id: Ica1f97867b701e7fcd60ea8ea07d2ae96c485443
show more ...
|
| 8ce2fbff | 18-May-2023 |
Ilias Apalodimas <ilias.apalodimas@linaro.org> |
fix(zynqmp): fix BLXX memory limits for user defined values
When compiling with user defined areas of memory the platform code calculates the size with (base + size - 1). However, the linker file a
fix(zynqmp): fix BLXX memory limits for user defined values
When compiling with user defined areas of memory the platform code calculates the size with (base + size - 1). However, the linker file aligns section on a page boundary. So having the -1 in the size calculations leads to an error message looking like this:
bl31.elf section `coherent_ram' will not fit in region `RAM' aarch64-buildroot-linux-uclibc-ld: region `RAM' overflowed by 1 byte
Commit 9b4ed0af02a8 ("feat(plat/zynqmp): fix section `coherent_ram' will not fit in region `RAM'") applied a similar fix, but only in the predefined for BL31LIMIT/BASE.
While at it fix all other occurences of predefined values that were calculated with -1
Fixes: 01555332faa48 ("zynqmp: Revise memory configuration options") Signed-off-by: Ilias Apalodimas <ilias.apalodimas@linaro.org> Change-Id: Ic96e36808d01f6bb92e6839cec92fc52320dd3f3
show more ...
|
| 2abbb457 | 24-May-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "fix(intel): update checking for memcpy and memset" into integration |
| 816c27fb | 23-May-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge changes I38545567,I2f52d3ea into integration
* changes: feat(intel): restructure sys mgr for S10/N5X feat(intel): restructure sys mgr for Agilex |
| a2ecddde | 23-May-2023 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(ti): remove check for zero value in BL31 boot args" into integration |
| 6a6fdd16 | 23-May-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "docs: fix rendering for code blocks in SPM" into integration |
| f7ed5bea | 23-May-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "feat(intel): setup SEU ERR read interface for FP8" into integration |
| ce0f98e8 | 23-May-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "docs(maintainers): add Yann Gautier in TF-A maintainers list" into integration |
| e57ca899 | 23-May-2023 |
Andre Przywara <andre.przywara@arm.com> |
fix(qemu): fix 32-bit builds with stack protector
When using the ENABLE_STACK_PROTECTOR=strong build option, the QEMU code will try to use the RNDR CPU instructions to initialise the stack canary. S
fix(qemu): fix 32-bit builds with stack protector
When using the ENABLE_STACK_PROTECTOR=strong build option, the QEMU code will try to use the RNDR CPU instructions to initialise the stack canary. Since the instructions are defined for AArch64 only, this will fail to build for AArch32.
And even though we now always return "false" when asked about the availability of the RNDR instruction, the compiler will still leave the reference to read_rdnr() in, if optimisations are turned off (-O0).
Avoid this by providing a dummy read_rndr() implementation, that makes the linker happy in any case.
This fixes the QEMU build for AArch32 with ENABLE_STACK_PROTECTOR=strong
Change-Id: Ibf450ba4a46167fdf3a14a527d338350ced8b5ba Signed-off-by: Andre Przywara <andre.przywara@arm.com>
show more ...
|
| 733d112f | 23-May-2023 |
Andre Przywara <andre.przywara@arm.com> |
feat(cpufeat): deny AArch64-only features when building for AArch32
Many newer architecture features are defined for AArch64 only, so cannot be used in an AArch32 build.
To avoid #ifdef-ing every s
feat(cpufeat): deny AArch64-only features when building for AArch32
Many newer architecture features are defined for AArch64 only, so cannot be used in an AArch32 build.
To avoid #ifdef-ing every single user, just provide trivial implementations of the feature check functions is_feat_xxx_supported(), which always return "false" in AArch32. The compiler will then optimise out the dependent code automatically.
Change-Id: I1e7d653fca0e676a11858efd953c2d623f2d5c9e Signed-off-by: Andre Przywara <andre.przywara@arm.com>
show more ...
|
| b653f3ca | 17-May-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
feat(intel): restructure sys mgr for S10/N5X
This patch is to restructure system manager. Move platform dependent MACROs to individual platform system manager. Common system manager will remain for
feat(intel): restructure sys mgr for S10/N5X
This patch is to restructure system manager. Move platform dependent MACROs to individual platform system manager. Common system manager will remain for those common declaration only.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Change-Id: I385455671413e154d04a879d33fdd774fcfefbd6
show more ...
|
| 6197dc98 | 17-May-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
feat(intel): restructure sys mgr for Agilex
This patch is to restructure system manager. Move platform dependent MACROs to individual platform system manager. Common system manager will remain for t
feat(intel): restructure sys mgr for Agilex
This patch is to restructure system manager. Move platform dependent MACROs to individual platform system manager. Common system manager will remain for those common declaration only.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Change-Id: I2f52d3eaf47716f7dfc636bbf1a23d68a04f39cb
show more ...
|
| d156c522 | 23-May-2023 |
Andre Przywara <andre.przywara@arm.com> |
feat(cpufeat): add AArch32 PAN detection support
FEAT_PAN is implemented in AArch32 as well, provide the helper functions to query the feature availability at runtime.
Change-Id: I375e3eb7b05955ea2
feat(cpufeat): add AArch32 PAN detection support
FEAT_PAN is implemented in AArch32 as well, provide the helper functions to query the feature availability at runtime.
Change-Id: I375e3eb7b05955ea28a092ba99bb93302af48a0e Signed-off-by: Andre Przywara <andre.przywara@arm.com>
show more ...
|
| c418064e | 17-May-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
fix(intel): update checking for memcpy and memset
Add checking on the size of source data does not exceed source size when using memcpy and memset.
Add checking on the size of source data in FPGA C
fix(intel): update checking for memcpy and memset
Add checking on the size of source data does not exceed source size when using memcpy and memset.
Add checking on the size of source data in FPGA Crypto Service does not exceed the maximum of expected data size and does not meet the minimum of expected data size.
Signed-off-by: Phui Kei Wong <phui.kei.wong@intel.com> Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Change-Id: Idb18f05c18d9142fbe703c3f4075341d179d8bad
show more ...
|
| e8d61f7d | 11-May-2023 |
Prasad Kummari <prasad.kummari@amd.com> |
fix(zynqmp): handling of type el3 interrrupts
The array type_el3_interrupt_table is defined for MAX_INTR_EL3(128) elements and only two interrupts - ARM_IRQ_SEC_SGI_7(15), IRQ_TTC3_1(77) are being h
fix(zynqmp): handling of type el3 interrrupts
The array type_el3_interrupt_table is defined for MAX_INTR_EL3(128) elements and only two interrupts - ARM_IRQ_SEC_SGI_7(15), IRQ_TTC3_1(77) are being handled. Current implementation is consuming 1024 bytes which can be optimized for the number of interrupts to be handled. The current array is replaced with the array of struct zynmp_intr_info_type_el3_t (id and handler as member) and with maximum number of interrupts to be handled as the size of array (MAX_INTR_EL3 = 2). User is expected to adjust MAX_INTR_EL3 based on how many interrupts are handled in TF-A. With the updated implementation, a reduction of 960 bytes is observed. Versal and Versal NET are using similar implementation introduced by commit e497421d7f1e ("feat(versal): add infrastructure to handle multiple interrupts") and commit 0654ab7f7544 ("feat(versal-net): add support for platform management").
Signed-off-by: Prasad Kummari <prasad.kummari@amd.com> Change-Id: I07aa388d38ac3ff3c0d25decbe0719087b27ee18
show more ...
|
| 91239f2c | 17-May-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
feat(intel): setup SEU ERR read interface for FP8
Enable SEU ERR read interfaces for non-secure world to read out SEU status for DDR. SEU ERR SMC opcode updated to 0xC2000099
Signed-off-by: Jit Loo
feat(intel): setup SEU ERR read interface for FP8
Enable SEU ERR read interfaces for non-secure world to read out SEU status for DDR. SEU ERR SMC opcode updated to 0xC2000099
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Change-Id: I0618dfcdc86a7c1e0c8047b7214d369866dd2281
show more ...
|
| ae074b36 | 22-May-2023 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(tsp): flush uart console
tsp uses uart2 and is printing some init messages in main, but in certain situations we may exit tsp and may not have flushed uart data, this could later land in uart fi
fix(tsp): flush uart console
tsp uses uart2 and is printing some init messages in main, but in certain situations we may exit tsp and may not have flushed uart data, this could later land in uart fifo overflow or random corruption.
Time to time we have seen a character corruption on uart2 arising out of logs from tsp main.
So flush console messages from tsp_main before leaving the function. This is inline with our uart usage strategy across TF-A as most entry _main function ensures uart console is flushed before exit.
The console flush is harmless and should fix the potential character corruption if it was due to tsp_main negligence.
But we cannot also rule out that it could be a potential FVP-UART problem, but that's quite unlikely and further CI daily's will give us a idea if this fixes the character corruption seen or we may need stress test FVP-UART which maybe corrupting character in certain circumstances.
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com> Change-Id: I300c6b71c00fa92b8b97b3e77ea936b393d0f7b5
show more ...
|
| d3e71ead | 22-May-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge "docs(changelog): changelog for v2.9 release" into integration |