| f74e2772 | 17-Aug-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(spmc): add FFA_PARTITION_INFO_GET handler
Enable the SPMC to handle calls to FFA_PARTITION_INFO_GET. This allows the normal world to discover which partitions are running in the secure world in
feat(spmc): add FFA_PARTITION_INFO_GET handler
Enable the SPMC to handle calls to FFA_PARTITION_INFO_GET. This allows the normal world to discover which partitions are running in the secure world including logical partitions in EL3.
This implementation supports both the v1.0 and v1.1 implementations of the Partition Info Get Descriptor. The SPMC populates the appropriate descriptor in the partitions RX buffer, if requested, according to the version of FF-A that the caller is using.
Additionally rename the common/uuid UUID_H include guard due to a conflict with another header file.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: I0a85f1dae50fae1fe47a3cafb765fbe9f40619e1
show more ...
|
| 1a752245 | 25-Aug-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(spmc): enable handling FF-A RX/TX Mapping ABIs
Enable handling of FFA_RXTX_MAP and FFA_RXTX_UNMAP ABIs and ensure these buffers are mapped as required to allow access by the SPMC.
Signed-off-b
feat(spmc): enable handling FF-A RX/TX Mapping ABIs
Enable handling of FFA_RXTX_MAP and FFA_RXTX_UNMAP ABIs and ensure these buffers are mapped as required to allow access by the SPMC.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: Ifc425f1ee16c90d1d95b6ae4ac9992d6f785227b
show more ...
|
| 6aed5549 | 13-May-2022 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge changes from topic "rss/mboot-attest" into integration
* changes: docs(maintainers): add PSA, MHU, RSS comms code owners feat(plat/arm/fvp): enable RSS backend based measured boot feat(l
Merge changes from topic "rss/mboot-attest" into integration
* changes: docs(maintainers): add PSA, MHU, RSS comms code owners feat(plat/arm/fvp): enable RSS backend based measured boot feat(lib/psa): mock PSA APIs feat(drivers/measured_boot): add RSS backend feat(drivers/arm/rss): add RSS communication driver feat(lib/psa): add initial attestation API feat(lib/psa): add measured boot API feat(drivers/arm/mhu): add MHU driver
show more ...
|
| aa69de86 | 13-May-2022 |
Joanna Farley <joanna.farley@arm.com> |
Merge changes I50721040,I1ce4b7b4,I9658aef7,I40ff55eb into integration
* changes: fix(intel): remove unused printout fix(intel): fix configuration status based on start request style(intel): a
Merge changes I50721040,I1ce4b7b4,I9658aef7,I40ff55eb into integration
* changes: fix(intel): remove unused printout fix(intel): fix configuration status based on start request style(intel): align the sequence in header file fix(intel): remove redundant NOC header declarations
show more ...
|
| c671daee | 12-May-2022 |
David Vincze <david.vincze@arm.com> |
docs(maintainers): add PSA, MHU, RSS comms code owners
Adding Sandrine Bailleux for the PSA APIs and myself for the MHU and RSS comms drivers as code owner.
Change-Id: Ib948479cc6e46163aae59c938877
docs(maintainers): add PSA, MHU, RSS comms code owners
Adding Sandrine Bailleux for the PSA APIs and myself for the MHU and RSS comms drivers as code owner.
Change-Id: Ib948479cc6e46163aae59c938877a2d0bcf91754 Signed-off-by: David Vincze <david.vincze@arm.com>
show more ...
|
| 0d19eda0 | 13-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
fix(intel): remove unused printout
This patch is to remove unused printout.
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I507210402dcbaf8369209308ae1fcedaccb0292d |
| 673afd6f | 13-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
fix(intel): fix configuration status based on start request
This patch is to fix configuration status command now returns the result based on the last config start command made to the runtime softwa
fix(intel): fix configuration status based on start request
This patch is to fix configuration status command now returns the result based on the last config start command made to the runtime software. The status type can be either: - NO_REQUEST (default) - RECONFIGURATION - BITSTREAM_AUTH
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I1ce4b7b4c741d88de88778f8fbed7dfe83a39fbc
show more ...
|
| 762c34a8 | 13-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
style(intel): align the sequence in header file
This patch is to align the sequence of function in header file.
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I9658aef78b06b744c6
style(intel): align the sequence in header file
This patch is to align the sequence of function in header file.
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I9658aef78b06b744c6c14f95b2821daf5dbb0082
show more ...
|
| 58690cd6 | 13-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
fix(intel): remove redundant NOC header declarations
This patch is to remove redundant NOC declarations in system manager header file. The NOC headers are shareable across both Stratix 10 and Agilex
fix(intel): remove redundant NOC header declarations
This patch is to remove redundant NOC declarations in system manager header file. The NOC headers are shareable across both Stratix 10 and Agilex platforms.
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I40ff55eb1d8fe280db1d099d5d1a3c2bf4b4b459
show more ...
|
| fcf6f469 | 14-Dec-2021 |
Tanmay Shah <tanmay.shah@xilinx.com> |
feat(versal): add SMCCC call TF_A_PM_REGISTER_SGI
This call is used to register and reset SGI interrupt. Before this functionality was performed using IOCTL_REGISTER_SGI pm_ioctl EEMI call. It's not
feat(versal): add SMCCC call TF_A_PM_REGISTER_SGI
This call is used to register and reset SGI interrupt. Before this functionality was performed using IOCTL_REGISTER_SGI pm_ioctl EEMI call. It's not correct use of PM_IOCTL as it is not EEMI functionality. Instead this new SMCCC call will be handled by TF-A specific handler.
Change-Id: If2408af38b889d29a5c584e8eec5f1672eab4fb5 Signed-off-by: Tanmay Shah <tanmay.shah@xilinx.com>
show more ...
|
| bf70449b | 19-Apr-2021 |
Venkatesh Yadav Abbarapu <venkatesh.abbarapu@xilinx.com> |
feat(versal): add support to reset SGI
Add "reset" parameter in pm_register_sgi() to reset SGI number. This will be required if OS wants to reset SGI number to default state. Caller can reset param
feat(versal): add support to reset SGI
Add "reset" parameter in pm_register_sgi() to reset SGI number. This will be required if OS wants to reset SGI number to default state. Caller can reset param to 1 to reset SGI in ATF.
Change-Id: If485ff275df884f74eb67671cac7fa953458afe9 Signed-off-by: Rajan Vaja <rajan.vaja@xilinx.com> Signed-off-by: Tanmay Shah <tanmay.shah@xilinx.com>
show more ...
|
| 15e498de | 12-May-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(security): workaround for CVE-2022-23960" into integration |
| cf85030e | 15-Mar-2022 |
sahil <sahil@arm.com> |
feat(n1sdp): add support for nt_fw_config
This patch adds support to load nt_fw_config with the information from plat_info sds structure which is then passed from BL2 to BL33.
Signed-off-by: sahil
feat(n1sdp): add support for nt_fw_config
This patch adds support to load nt_fw_config with the information from plat_info sds structure which is then passed from BL2 to BL33.
Signed-off-by: sahil <sahil@arm.com> Change-Id: I2fcf13b7bf5ab042ef830157fd9cceedbdca617a
show more ...
|
| fe2b37f6 | 06-Jun-2021 |
sah01 <sahil@arm.com> |
feat(n1sdp): enable trusted board boot on n1sdp
Move from RESET_TO_BL31 boot to a TBBR style boot on N1sdp.
Signed-off-by: sahil <sahil@arm.com> Change-Id: I153ccb43a4a013830973c7a183825d62b372c65e |
| 1d41ffff | 12-May-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "docs(versal): fix the versal platform emu name" into integration |
| b57ccdf9 | 12-May-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(errata): workaround for DSU-110 erratum 2313941" into integration |
| 868f9768 | 12-May-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes Ie9451e35,I1815deeb,If277b2b3,Ie2ceaf24,I7996d505, ... into integration
* changes: fix(intel): add flash dcache after return response for INTEL_SIP_SMC_MBOX_SEND_CMD fix(intel): ex
Merge changes Ie9451e35,I1815deeb,If277b2b3,Ie2ceaf24,I7996d505, ... into integration
* changes: fix(intel): add flash dcache after return response for INTEL_SIP_SMC_MBOX_SEND_CMD fix(intel): extending to support large file size for SHA2/HMAC get digest and verifying fix(intel): extending to support large file size for SHA-2 ECDSA data signing and signature verifying fix(intel): extending to support large file size for AES encryption and decryption feat(intel): support version 2 SiP SVC SMC function ID for mailbox commands feat(intel): support version 2 SiP SVC SMC function ID for non-mailbox commands fix(intel): update certificate mask for FPGA Attestation feat(intel): update to support maximum response data size feat(intel): support ECDSA HASH Verification feat(intel): support ECDSA HASH Signing feat(intel): support ECDH request feat(intel): support ECDSA SHA-2 Data Signature Verification feat(intel): support ECDSA SHA-2 Data Signing feat(intel): support ECDSA Get Public Key feat(intel): support session based SDOS encrypt and decrypt feat(intel): support AES Crypt Service feat(intel): support HMAC SHA-2 MAC verify request feat(intel): support SHA-2 hash digest generation on a blob feat(intel): support extended random number generation feat(intel): support crypto service key operation feat(intel): support crypto service session feat(intel): extend attestation service to Agilex family fix(intel): flush dcache before sending certificate to mailbox fix(intel): introduce a generic response error code fix(intel): allow non-secure access to FPGA Crypto Services (FCS) feat(intel): single certificate feature enablement feat(intel): initial commit for attestation service fix(intel): update encryption and decryption command logic
show more ...
|
| 1f0309d4 | 12-May-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(zynqmp): define and enable ARM_XLAT_TABLES_LIB_V1" into integration |
| 6c87abdd | 11-May-2022 |
Manish Pandey <manish.pandey2@arm.com> |
fix(arm): remove reclamation of functions starting with "init"
When RECLAIM_INIT_CODE is enabled, functions with __init attribute can be reclaimed after boot and marked as Execute Never. Because of
fix(arm): remove reclamation of functions starting with "init"
When RECLAIM_INIT_CODE is enabled, functions with __init attribute can be reclaimed after boot and marked as Execute Never. Because of a bug in linker script the functions starting with "init" were also marked XN and causing instruction abort.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I2221973c05af170acf4e723cd44645b9ff9d58d2
show more ...
|
| c2a15217 | 06-May-2022 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(security): workaround for CVE-2022-23960
Implements the loop workaround for Cortex Makalu/Makalu-ELP/Hunter and Neoverse Demeter/Poseidon.
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-
fix(security): workaround for CVE-2022-23960
Implements the loop workaround for Cortex Makalu/Makalu-ELP/Hunter and Neoverse Demeter/Poseidon.
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: If5f6689b662ecac92491e0c0902df4270051ce5b
show more ...
|
| 7e3273e8 | 22-Dec-2021 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(errata): workaround for DSU-110 erratum 2313941
DSU-110 erratum 2313941 is a Cat B erratum and applies to revisions r0p0, r1p0, r2p0, r2p1, r3p0, r3p1 and is still open.
The workaround sets IMP
fix(errata): workaround for DSU-110 erratum 2313941
DSU-110 erratum 2313941 is a Cat B erratum and applies to revisions r0p0, r1p0, r2p0, r2p1, r3p0, r3p1 and is still open.
The workaround sets IMP_CLUSTERACTLR_EL1[16:15] bits to 0b11 to disable clock gating of the SCLK domain. This will increase the idle power consumption.
This patch applies the fix for Cortex-X2/A510/A710 and Neoverse N2.
SDEN can be found here: https://developer.arm.com/documentation/SDEN1781796/latest
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: I54d948b23e8e01aaf1898ed9fe4e2255dd209318 Signed-off-by: Bipin Ravi <bipin.ravi@arm.com>
show more ...
|
| 18fa43f7 | 19-Apr-2022 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(sgi): enable fpregs context save and restore
This is required to prevent Nwd context corruption during StMM execution.
Standalone MM uses OpenSSL for secure boot, which uses FP registers for f
feat(sgi): enable fpregs context save and restore
This is required to prevent Nwd context corruption during StMM execution.
Standalone MM uses OpenSSL for secure boot, which uses FP registers for floating point calculations.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: I6ed11d4fa5d64c3089a24b66fd048a841c480792
show more ...
|
| 15dd6f19 | 19-Apr-2022 |
Nishant Sharma <nishant.sharma@arm.com> |
feat(spm_mm): add support to save and restore fp regs
Add the support to save Nwd's floating point registers before switching to SEL0 and then restore it after coming out of it. Emit a warning messa
feat(spm_mm): add support to save and restore fp regs
Add the support to save Nwd's floating point registers before switching to SEL0 and then restore it after coming out of it. Emit a warning message if SPM_MM is built with CTX_INCLUDE_FPREGS == 0
There is no need to save FP registers of SEL0 because secure partitions run to completion.
This change is used to prevent context corruption if secure partition enabled and Nwd decide to use floating point registers.
Signed-off-by: Nishant Sharma <nishant.sharma@arm.com> Change-Id: I1eea16ea2311a4f00a806ea72c118752821b9abb
show more ...
|
| 15ff61f5 | 11-May-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "fix_st_spi" into integration
* changes: fix(st-spi): remove SR_BUSY bit check before sending command fix(st-spi): always check SR_TCF flags in stm32_qspi_wait_cmd() |
| bf61c4f0 | 11-May-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "docs: update release and code freeze dates" into integration |