| 415195c0 | 09-Feb-2023 |
Boyan Karatotev <boyan.karatotev@arm.com> |
fix(docs): make required compiler version == rather than >=
TF-A carries its own compiler-rt so higher versions of the compilers may not necessarily work. Because TF-A is only tested on the specifie
fix(docs): make required compiler version == rather than >=
TF-A carries its own compiler-rt so higher versions of the compilers may not necessarily work. Because TF-A is only tested on the specified versions in the CI, any breakage remains unknown. Update the prerequisites guide to make it more apparent that this is the case.
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: Ia5da9c5ff505ead99f579f3f5fbe3a480d697c1d
show more ...
|
| bdedee5a | 09-Feb-2023 |
Boyan Karatotev <boyan.karatotev@arm.com> |
fix(deps): add missing aeabi_memset.S
This file provides __aeabi_memclr8 builtin which the Ubuntu 22.04 version of clang 14 needs to compile. Add it to prevent this oddity from failing the build.
S
fix(deps): add missing aeabi_memset.S
This file provides __aeabi_memclr8 builtin which the Ubuntu 22.04 version of clang 14 needs to compile. Add it to prevent this oddity from failing the build.
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: Id67aa0abba4a27c51b3ed6bb1be84b4e803b44bf
show more ...
|
| 3cc02562 | 13-Feb-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "mixed-rwx" into integration
* changes: build: permit multiple linker scripts build: clarify linker script generation style: normalize linker script code style fix(p
Merge changes from topic "mixed-rwx" into integration
* changes: build: permit multiple linker scripts build: clarify linker script generation style: normalize linker script code style fix(pie): pass `-fpie` to the preprocessor as well
show more ...
|
| c8a95567 | 13-Feb-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "docs: add Runtime Security Subsystem (RSS) documentation" into integration |
| 2c039153 | 13-Feb-2023 |
Michal Simek <michal.simek@amd.com> |
fix(zynqmp): fix DT reserved allocated size
BL31_LIMIT is not size but reserved node reg property contains base address and size that's why BL31_LIMIT - BL31_BASE + 1 is correct size of reseved spac
fix(zynqmp): fix DT reserved allocated size
BL31_LIMIT is not size but reserved node reg property contains base address and size that's why BL31_LIMIT - BL31_BASE + 1 is correct size of reseved space for BL31. Also update warning message to cover that it is for BL31.
Change-Id: I53f53d2170eb873f758f9ba250d54f57f0b562b4 Signed-off-by: Michal Simek <michal.simek@amd.com>
show more ...
|
| 6f7de9a8 | 11-Jan-2023 |
Manish Pandey <manish.pandey2@arm.com> |
refactor(el3_runtime): unify handle/enter_lower_el_async_ea
handle_lower_el_async_ea and enter_lower_el_async_ea are same except for saving x30 register, with previous patch x30 is now freed before
refactor(el3_runtime): unify handle/enter_lower_el_async_ea
handle_lower_el_async_ea and enter_lower_el_async_ea are same except for saving x30 register, with previous patch x30 is now freed before calling these function we don't need both of them.
This patch also unifies the naming convention, now we have 3 handlers - handle_lower_el_ea_esb - handle_lower_el_sync_ea - handle_lower_el_async_ea
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I63b584cf059bac80195aa334981d50fa6272cf49
show more ...
|
| d87c0e27 | 11-Jan-2023 |
Manish Pandey <manish.pandey2@arm.com> |
refactor(el3_runtime): introduce save_x30 macro
Most of the macros/routine in vector entry need a free scratch register. Introduce a macro "save_x30" and call it right at the begining of vector entr
refactor(el3_runtime): introduce save_x30 macro
Most of the macros/routine in vector entry need a free scratch register. Introduce a macro "save_x30" and call it right at the begining of vector entries where x30 is used. It is more exlicit and less error prone
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I617f3d41a120739e5e3fe1c421c79ceb70c1188e
show more ...
|
| eea607cb | 13-Oct-2022 |
Tamas Ban <tamas.ban@arm.com> |
docs: add Runtime Security Subsystem (RSS) documentation
Describe: - RSS-AP communication - RSS runtime services - Measured boot - Delegated Attestation
Signed-off-by: Tamas Ban <tamas.ban@
docs: add Runtime Security Subsystem (RSS) documentation
Describe: - RSS-AP communication - RSS runtime services - Measured boot - Delegated Attestation
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: Iaef93361a09355a1edaabcc0c59126e006ad251a
show more ...
|
| a6ff0067 | 16-Jan-2023 |
Chris Kay <chris.kay@arm.com> |
build: permit multiple linker scripts
This change allows platforms to provide more than one linker script to any image utilizing the `MAKE_BL` build system macro.
This is already done by some Media
build: permit multiple linker scripts
This change allows platforms to provide more than one linker script to any image utilizing the `MAKE_BL` build system macro.
This is already done by some MediaTek platforms via the `EXTRA_LINKERFILE` build system variable, which has now been removed.
In its place, additional linker scripts may be added to the `<IMAGE>_LINKER_SCRIPT_SOURCES` variable.
BREAKING-CHANGE: The `EXTRA_LINKERFILE` build system variable has been replaced with the `<IMAGE>_LINKER_SCRIPT_SOURCES` variable. See the commit message for more information.
Change-Id: I3f0b69200d6a4841fd158cd09344ce9e67047271 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 82274936 | 16-Jan-2023 |
Chris Kay <chris.kay@arm.com> |
build: clarify linker script generation
The following build system variables have been renamed:
- `LINKERFILE` -> `DEFAULT_LINKER_SCRIPT` - `BL_LINKERFILE` -> `DEFAULT_LINKER_SCRIPT_SOURCE` - `<IMA
build: clarify linker script generation
The following build system variables have been renamed:
- `LINKERFILE` -> `DEFAULT_LINKER_SCRIPT` - `BL_LINKERFILE` -> `DEFAULT_LINKER_SCRIPT_SOURCE` - `<IMAGE>_LINKERFILE` -> `<IMAGE>_DEFAULT_LINKER_SCRIPT_SOURCE`
These new names better reflect how each variable is used:
1. the default linker script is passed via `-dT` instead of `-T` 2. linker script source files are first preprocessed
Additionally, linker scripts are now placed in the build directory relative to where they exist in the source directory. For example, the `bl32/sp_min/sp_min.ld.S` would now preprocess to `sp_min/sp_min.ld` instead of just `bl32.ld`
BREAKING-CHANGE: The `LINKERFILE`, `BL_LINKERFILE` and `<IMAGE_LINKERFILE>` build system variables have been renamed. See the commit message for more information.
Change-Id: If8cef65dcb8820e8993736702c8741e97a66e6cc Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| f90fe02f | 29-Sep-2022 |
Chris Kay <chris.kay@arm.com> |
style: normalize linker script code style
There are a variety of code styles used by the various linker scripts around the code-base. This change brings them in line with one another and attempts to
style: normalize linker script code style
There are a variety of code styles used by the various linker scripts around the code-base. This change brings them in line with one another and attempts to make the scripts more friendly for skim-readers.
Change-Id: Ibee2afad0d543129c9ba5a8a22e3ec17d77e36ea Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 966660ec | 02-Feb-2023 |
Chris Kay <chris.kay@arm.com> |
fix(pie): pass `-fpie` to the preprocessor as well
When PIE is enabled, the `-fpie` flag is passed to the compiler but not to the preprocessor. This change ensures that both tools are aware of when
fix(pie): pass `-fpie` to the preprocessor as well
When PIE is enabled, the `-fpie` flag is passed to the compiler but not to the preprocessor. This change ensures that both tools are aware of when the image is position-independent when preprocessing, which impacts some pre-defined preprocessor definitions.
Change-Id: I5208a591d60ee01312f6bf3dd7343abe6535ee61 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| ec1c00a7 | 10-Feb-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(tsp): loop / crash if mmap of region fails" into integration |
| ff5cfa58 | 10-Feb-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge "feat(git-hooks): add pre-commit hook" into integration |
| 8c353e00 | 23-Jan-2023 |
Thomas Viehweger <Thomas.Viehweger@rohde-schwarz.com> |
fix(tsp): loop / crash if mmap of region fails
In test_memory_send the variable i is of unsigned type, so it is never negative. If i is 0, the result of i-- is 4294967295. Don't know what happens if
fix(tsp): loop / crash if mmap of region fails
In test_memory_send the variable i is of unsigned type, so it is never negative. If i is 0, the result of i-- is 4294967295. Don't know what happens if trying to access composite->address_range_array[4294967295]. Made i a signed integer.
Signed-off-by: Thomas Viehweger <Thomas.Viehweger@rohde-schwarz.com> Change-Id: I8b4e532749b5e86e4b5acd238e72c3f88e309ff2
show more ...
|
| 904da6f1 | 10-Feb-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(context-mgmt): enable SCXTNUM access" into integration |
| a13b4cd7 | 10-Feb-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge "fix(optee): address late comments and fix bad rc" into integration |
| 7db8d3cb | 10-Feb-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(spmd): copy tos_fw_config in secure region" into integration |
| d69a0bf2 | 10-Feb-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(mpam): run-time checks for mpam save/restore routines" into integration |
| af4fee04 | 10-Feb-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge changes from topic "mb/tos-fw-config-load-refactor" into integration
* changes: feat(spmd): map SPMC manifest region as EL3_PAS feat(fvp): update device tree with load addresses of TOS_FW
Merge changes from topic "mb/tos-fw-config-load-refactor" into integration
* changes: feat(spmd): map SPMC manifest region as EL3_PAS feat(fvp): update device tree with load addresses of TOS_FW config refactor(fvp): rename the DTB info structure member feat(fconf): rename 'ns-load-address' to 'secondary-load-address'
show more ...
|
| 493de4df | 10-Feb-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "fix(cert-create): change WARN to VERBOSE" into integration |
| 8d7c80fa | 09-Feb-2023 |
Jeffrey Kardatzke <jkardatzke@google.com> |
fix(optee): address late comments and fix bad rc
There were some late comments to the prior change (18635) which are address in this commit. There was also an invalid return value check which was ch
fix(optee): address late comments and fix bad rc
There were some late comments to the prior change (18635) which are address in this commit. There was also an invalid return value check which was changed and the wrong result was being returned via the SMC call for loading OP-TEE which is now fixed.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I883ddf966662549a3ef9c801a2d4f47709422332
show more ...
|
| 76a85cfa | 08-Feb-2023 |
laurenw-arm <lauren.wehrmeister@arm.com> |
fix(cert-create): change WARN to VERBOSE
SAVE_KEYS is set to '0' by default, causing cert_create to show the 'Key filename not specified' message on each run even though this is perfectly normal. Sh
fix(cert-create): change WARN to VERBOSE
SAVE_KEYS is set to '0' by default, causing cert_create to show the 'Key filename not specified' message on each run even though this is perfectly normal. Show the message only in the VERBOSE log level.
Signed-off-by: Baruch Siach <baruch@tkos.co.il> Change-Id: I472cdec2670055ab0edd99d172f79d01ad575972
show more ...
|
| cf9346cb | 09-Feb-2023 |
Maksims Svecovs <maksims.svecovs@arm.com> |
feat(git-hooks): add pre-commit hook
Adds a pre-commit git hook to keep track of copyright year. Checks staged files for Arm copyright header and suggests a change if the year is outdated. Works wit
feat(git-hooks): add pre-commit hook
Adds a pre-commit git hook to keep track of copyright year. Checks staged files for Arm copyright header and suggests a change if the year is outdated. Works with both single-year format and from_year-to_year format.
Signed-off-by: Maksims Svecovs <maksims.svecovs@arm.com> Change-Id: If81a0b9f5e047ec0ac401c7cf1792b9da6644926
show more ...
|
| 0cea2ae0 | 07-Feb-2023 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(spmd): copy tos_fw_config in secure region
The tos_fw_config is currently loaded into memory by BL2 and consumed by SPMD (part of BL31) and BL32 firmwares. This does not work in RME-enabled sys
feat(spmd): copy tos_fw_config in secure region
The tos_fw_config is currently loaded into memory by BL2 and consumed by SPMD (part of BL31) and BL32 firmwares. This does not work in RME-enabled systems as BL31 uses the root PAS memory and does not trust secure PAS memory.
A first attempt was made to map the TOS_FW_CONFIG region as root PAS, and then to remap to secure PAS after SPMD consumption, but this was not suitable for RME systems where memory encryption is enabled.
This can be solved by copying the TOS FW config (SPMC manifest) from the Root PAS region to the Secure PAS region so that BL32 can consume it.
Change-Id: I8eef8345366199cb0e367db883c34a5b5136465d Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|