| 9316149e | 24-Jun-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(zynqmp): move bl31 with DEBUG=1 back to OCM" into integration |
| 40366cb6 | 24-Jun-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "xlnx_versal_misra_fix" into integration
* changes: fix(versal): resolve misra 15.6 warnings fix(zynqmp): resolve misra 8.13 warnings fix(versal): resolve misra 8.13 w
Merge changes from topic "xlnx_versal_misra_fix" into integration
* changes: fix(versal): resolve misra 15.6 warnings fix(zynqmp): resolve misra 8.13 warnings fix(versal): resolve misra 8.13 warnings fix(versal): resolve the misra 4.6 warnings
show more ...
|
| f3249498 | 24-Jun-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "lw/cca_cot" into integration
* changes: feat(arm): retrieve the right ROTPK for cca feat(arm): add support for cca CoT feat(arm): provide some swd rotpk files build
Merge changes from topic "lw/cca_cot" into integration
* changes: feat(arm): retrieve the right ROTPK for cca feat(arm): add support for cca CoT feat(arm): provide some swd rotpk files build(tbbr): drive cert_create changes for cca CoT refactor(arm): add cca CoT certificates to fconf feat(fiptool): add cca, core_swd, plat cert in FIP feat(cert_create): define the cca chain of trust feat(cca): introduce new "cca" chain of trust build(changelog): add new scope for CCA refactor(fvp): increase bl2 size when bl31 in DRAM
show more ...
|
| 3f261a56 | 22-Jun-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "ns/cpu_info" into integration
* changes: feat(plat/arm/sgi): increase memory reserved for bl31 image feat(plat/arm/sgi): read isolated cpu mpid list from sds |
| 0f93168c | 22-Jun-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "feat(board/rdn2): add a new 'isolated-cpu-list' property" into integration |
| c4dbcb88 | 20-Jun-2022 |
Yann Gautier <yann.gautier@foss.st.com> |
feat(stm32mp1): optionally use paged OP-TEE
STM32MP13 can encrypt the DDR. OP-TEE is then fully in DDR, and there is no need for paged image on STM32MP13. The management of the paged OP-TEE is made
feat(stm32mp1): optionally use paged OP-TEE
STM32MP13 can encrypt the DDR. OP-TEE is then fully in DDR, and there is no need for paged image on STM32MP13. The management of the paged OP-TEE is made conditional, and will be kept only for STM32MP15.
Signed-off-by: Yann Gautier <yann.gautier@foss.st.com> Change-Id: I85ac7aaf6a172c4ee529736113ed40fe66835fd7
show more ...
|
| c0a11cd8 | 20-Jun-2022 |
Yann Gautier <yann.gautier@foss.st.com> |
feat(optee): check paged_image_info
For OP-TEE without pager, the paged image may not be present in OP-TEE header. We could then pass NULL for paged_image_info to the function parse_optee_header().
feat(optee): check paged_image_info
For OP-TEE without pager, the paged image may not be present in OP-TEE header. We could then pass NULL for paged_image_info to the function parse_optee_header(). It avoids creating a useless struct for that non existing image. But we should then avoid assigning header_ep args that depend on paged_image_info.
Signed-off-by: Yann Gautier <yann.gautier@foss.st.com> Change-Id: I4fdb45a91ac1ba6f912d6130813f5215c7e28c8b
show more ...
|
| daa4df63 | 21-Jun-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "st_clk_fixes" into integration
* changes: fix(st-clock): correct MISRA C2012 15.6 fix(st-clock): correctly check ready bit |
| 56f895ed | 21-Jun-2022 |
Yann Gautier <yann.gautier@st.com> |
fix(st-clock): correct MISRA C2012 15.6
Add braces to correct MISRA C2012 15.6 warning: The body of an iteration-statement or a selection-statement shall be a compound-statement.
Signed-off-by: Yan
fix(st-clock): correct MISRA C2012 15.6
Add braces to correct MISRA C2012 15.6 warning: The body of an iteration-statement or a selection-statement shall be a compound-statement.
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: If26f3732d31df11bf389a16298ec9e9d8a4a2279
show more ...
|
| 3b06a530 | 21-Jun-2022 |
Yann Gautier <yann.gautier@foss.st.com> |
fix(st-clock): correctly check ready bit
The function clk_oscillator_wait_ready() was wrongly checking the set bit and not the ready bit. Correct that by using osc_data->gate_rdy_id when calling _cl
fix(st-clock): correctly check ready bit
The function clk_oscillator_wait_ready() was wrongly checking the set bit and not the ready bit. Correct that by using osc_data->gate_rdy_id when calling _clk_stm32_gate_wait_ready().
Signed-off-by: Yann Gautier <yann.gautier@foss.st.com> Change-Id: Ida58f14d7f0f326b580ae24b98d6b9f592d2d711
show more ...
|
| a62cc91a | 31-Mar-2022 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(plat/arm/sgi): increase memory reserved for bl31 image
Increase the size of bl31 image by 52K to accomodate increased size of xlat table.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com>
feat(plat/arm/sgi): increase memory reserved for bl31 image
Increase the size of bl31 image by 52K to accomodate increased size of xlat table.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: Ic3a8d8be1104adf48d22aa829e2197f710b6b666
show more ...
|
| 4243ef41 | 30-Nov-2021 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(plat/arm/sgi): read isolated cpu mpid list from sds
Add support to read the list of isolated CPUs from SDS and publish this list via the non-trusted firmware configuration file for the next sta
feat(plat/arm/sgi): read isolated cpu mpid list from sds
Add support to read the list of isolated CPUs from SDS and publish this list via the non-trusted firmware configuration file for the next stages of boot software to use.
Isolated CPUs are those that are not to be used on the platform for various reasons. The isolated CPU list is an array of MPID values of the CPUs that have to be isolated.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: I4313cf025f4c9e9feffebca2d35b259f5bafce69
show more ...
|
| 84adb051 | 21-Jun-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "mb/gic600-errata" into integration
* changes: refactor(arm): update BL2 base address refactor(nxp): use DPG0 mask from Arm GICv3 header fix(gic600): implement workaro
Merge changes from topic "mb/gic600-errata" into integration
* changes: refactor(arm): update BL2 base address refactor(nxp): use DPG0 mask from Arm GICv3 header fix(gic600): implement workaround to forward highest priority interrupt
show more ...
|
| afa41571 | 30-Nov-2021 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(board/rdn2): add a new 'isolated-cpu-list' property
Add a new property named 'isolated-cpu-list' to list the CPUs that are to be isolated and not used by the platform. The data represented by t
feat(board/rdn2): add a new 'isolated-cpu-list' property
Add a new property named 'isolated-cpu-list' to list the CPUs that are to be isolated and not used by the platform. The data represented by this property is formatted as below.
strutct isolated_cpu_mpid_list { uint64_t count; uint64_t mpid_list[MAX Number of PE]; }
Also, the property is pre-initialized to 0 to reserve space for the property in the dtb. The data for this property is read from SDS and updated during boot. The number of entries in this list is equal to the maximum number of PEs present on the platform.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: I4119f899a273ccbf8259e0d711d3a25501c7ec64
show more ...
|
| 4e898483 | 21-Jun-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "uart_segregation_v2" into integration
* changes: feat(sgi): add page table translation entry for secure uart feat(sgi): route TF-A logs via secure uart feat(sgi): dev
Merge changes from topic "uart_segregation_v2" into integration
* changes: feat(sgi): add page table translation entry for secure uart feat(sgi): route TF-A logs via secure uart feat(sgi): deviate from arm css common uart related definitions
show more ...
|
| 742c23aa | 08-Apr-2022 |
Jiafei Pan <Jiafei.Pan@nxp.com> |
fix(nxp-ddr): fix firmware buffer re-mapping issue
Firmware buffer has already been mapped when loading 1D firmware, so the same buffer address will be re-mapped when loading 2D firmware. Move the b
fix(nxp-ddr): fix firmware buffer re-mapping issue
Firmware buffer has already been mapped when loading 1D firmware, so the same buffer address will be re-mapped when loading 2D firmware. Move the buffer mapping to be out of load_fw().
Signed-off-by: Jiafei Pan <Jiafei.Pan@nxp.com> Change-Id: Idb29d504bc482a1e7ca58bc51bec09ffe6068324
show more ...
|
| 054f0fe1 | 15-Jun-2022 |
Olivier Deprez <olivier.deprez@arm.com> |
feat(spm): add tpm event log node to spmc manifest
Add the TPM event log node to the SPMC manifest such that the TF-A measured boot infrastructure fills the properties with event log address for com
feat(spm): add tpm event log node to spmc manifest
Add the TPM event log node to the SPMC manifest such that the TF-A measured boot infrastructure fills the properties with event log address for components measured by BL2 at boot time. For a SPMC there is a particular interest with SP measurements. In the particular case of Hafnium SPMC, the tpm event log node is not yet consumed, but the intent is later to pass this information to an attestation SP.
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: Ic30b553d979532c5dad9ed6d419367595be5485e
show more ...
|
| 2a7e080c | 13-Dec-2021 |
Rohit Mathew <rohit.mathew@arm.com> |
feat(sgi): add page table translation entry for secure uart
Add page table translation entry for secure uart so that logs from secure partition can be routed via the same.
Signed-off-by: Rohit Math
feat(sgi): add page table translation entry for secure uart
Add page table translation entry for secure uart so that logs from secure partition can be routed via the same.
Signed-off-by: Rohit Mathew <rohit.mathew@arm.com> Change-Id: I3416d114bcee13824a7d0861ee54fb799e154897
show more ...
|
| 0601083f | 13-Dec-2021 |
Rohit Mathew <rohit.mathew@arm.com> |
feat(sgi): route TF-A logs via secure uart
Route the boot, runtime and crash stage logs via secure UART port instead of the existing use of non-secure UART. This aligns with the security state the P
feat(sgi): route TF-A logs via secure uart
Route the boot, runtime and crash stage logs via secure UART port instead of the existing use of non-secure UART. This aligns with the security state the PE is in when logs are put out. In addition to this, this allows consolidation of the UART related macros across all the variants of the Neoverse reference design platforms.
Signed-off-by: Rohit Mathew <rohit.mathew@arm.com> Change-Id: I417f5d16457b602c94da4c74b4d88bba03da7462
show more ...
|
| 173674ae | 13-Dec-2021 |
Rohit Mathew <rohit.mathew@arm.com> |
feat(sgi): deviate from arm css common uart related definitions
The Neoverse reference design platforms will migrate to use different set of secure and non-secure UART ports. This implies that the b
feat(sgi): deviate from arm css common uart related definitions
The Neoverse reference design platforms will migrate to use different set of secure and non-secure UART ports. This implies that the board specific macros defined in the common Arm platform code will no longer be usable for Neoverse reference design platforms.
In preparation for migrating to a different set of UART ports, add a Neoverse reference design platform specific copy of the board definitions. The value of these definitions will be changed in subsequent patches.
Signed-off-by: Rohit Mathew <rohit.mathew@arm.com> Change-Id: I1ab17a3f02c8180b63be24e9266f7129beee819f
show more ...
|
| 70b1c025 | 09-Jun-2022 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
fix(measured-boot): clear the entire digest array of Startup Locality event
According to TCG PC Client Platform Firmware Profile Specification (Section 10.2.2, TCG_PCR_EVENT2 Structure, and 10.4.5 E
fix(measured-boot): clear the entire digest array of Startup Locality event
According to TCG PC Client Platform Firmware Profile Specification (Section 10.2.2, TCG_PCR_EVENT2 Structure, and 10.4.5 EV_NO_ACTION Event Types), all EV_NO_ACTION events shall set TCG_PCR_EVENT2.digests to all 0x00's for each allocated Hash algorithm.
Right now, this is not enforced. Only part of the buffer is zeroed due to the wrong macro being used for the size of the buffer in the clearing operation (TPM_ALG_ID instead of TCG_DIGEST_SIZE). This could confuse a TPM event log parser.
Also, add an assertion to ensure that the Event Log size is large enough before writing the Event Log header.
Change-Id: I6d4bc3fb28fd10c227e33c8c7bb4a40b08c3fd5e Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 0938847f | 17-Jun-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "docs(security): update security advisory for CVE-2022-23960" into integration |
| 37200ae0 | 16-Jun-2022 |
Bipin Ravi <bipin.ravi@arm.com> |
docs(security): update security advisory for CVE-2022-23960
Update advisory document following Spectre-BHB mitigation support for additional CPUs.
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Cha
docs(security): update security advisory for CVE-2022-23960
Update advisory document following Spectre-BHB mitigation support for additional CPUs.
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: I4492397f18882f514beff4da06afe973acecf1f0
show more ...
|
| ffa3f942 | 16-Jun-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(errata): workaround for Neoverse-V1 erratum 2372203" into integration |
| 75fb34d5 | 16-Jun-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(errata): workaround for Cortex-A77 erratum 2356587" into integration |