| 50593e69 | 21-Mar-2022 |
anans <anans@google.com> |
refactor(ufs): adds a function for fdeviceinit
time taken for device init varies based on different devices, instead of waiting for 200ms - we can poll on fdevice init until it gets cleared, similar
refactor(ufs): adds a function for fdeviceinit
time taken for device init varies based on different devices, instead of waiting for 200ms - we can poll on fdevice init until it gets cleared, similar to what linux does
Change-Id: I571649231732fde0cd6d5be89b6f14fe905fcaff Signed-off-by: anans <anans@google.com>
show more ...
|
| 5ca81820 | 19-Mar-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
docs(intel): add Sieu Mun and Benjamin Jit Loon as maintainers
Add Sieu Mun Tang and Benjamin Jit Loon Lim as new Intel SocFPGA platform maintainers and remove the rest of the Intel SocFPGA platform
docs(intel): add Sieu Mun and Benjamin Jit Loon as maintainers
Add Sieu Mun Tang and Benjamin Jit Loon Lim as new Intel SocFPGA platform maintainers and remove the rest of the Intel SocFPGA platform maintainers.
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: Ieb9a35e278d70a12351aaccab90ddc7be09dc861
show more ...
|
| 65b13bac | 22-Apr-2022 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "ffa_el3_spmc" into integration
* changes: feat(spmc): add support for direct req/resp feat(spmc): add support for handling FFA_ERROR ABI feat(spmc): add support for F
Merge changes from topic "ffa_el3_spmc" into integration
* changes: feat(spmc): add support for direct req/resp feat(spmc): add support for handling FFA_ERROR ABI feat(spmc): add support for FFA_MSG_WAIT feat(spmc): add function to determine the return path from the SPMC feat(spmd): enable handling of FF-A SMCs with the SPMC at EL3 feat(spmd): update SPMC init flow to use EL3 implementation feat(spmc): add FF-A secure partition manager core feat(spmc): prevent read only xlat tables with the EL3 SPMC feat(spmc): enable building of the SPMC at EL3 refactor(spm_mm): reorganize secure partition manager code
show more ...
|
| 115748b2 | 22-Apr-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(stm32mp1): correct dtc version check" into integration |
| 429f10e3 | 22-Apr-2022 |
Yann Gautier <yann.gautier@foss.st.com> |
fix(stm32mp1): correct dtc version check
Depending on the shell used, the grep command can fail, leading to a wrong dtc version detection. Correct that by adding quotes.
Signed-off-by: Yann Gautier
fix(stm32mp1): correct dtc version check
Depending on the shell used, the grep command can fail, leading to a wrong dtc version detection. Correct that by adding quotes.
Signed-off-by: Yann Gautier <yann.gautier@foss.st.com> Change-Id: I329ec929559c94bf1bf99b127662c9d978e067cf
show more ...
|
| 6f867496 | 21-Apr-2022 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "feat(spm): add FFA_RX_ACQUIRE forwarding in SPMD" into integration |
| f4a55e6b | 21-Apr-2022 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
docs: fix mailing lists URLs
With the transition to mailman3, the URLs of TF-A and TF-A Tests mailing lists have changed. However, we still refer to the old location, which are now dead links.
Upda
docs: fix mailing lists URLs
With the transition to mailman3, the URLs of TF-A and TF-A Tests mailing lists have changed. However, we still refer to the old location, which are now dead links.
Update all relevant links throughout the documentation.
There is one link referring to a specific thread on the TF-A mailing list in the SPM documentation, for which I had to make a guess as to what's the equivalent mailman3 URL. The old URL scheme indicates that the thread dates from February 2020 but beyond that, I could not make sense of the thread id within the old URL so I picked the most likely match amongst the 3 emails posted on the subject in this time period.
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com> Reported-by: Kuohong Wang <kuohong.wang@mediatek.com> Change-Id: I83f4843afd1dd46f885df225931d8458152dbb58
show more ...
|
| 9741327d | 29-Nov-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(spmc): add support for direct req/resp
Enable the SPMC to handle FFA_MSG_SEND_DIRECT_REQ and FFA_MSG_SEND_DIRECT_RESP ABIs.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: Ia196c
feat(spmc): add support for direct req/resp
Enable the SPMC to handle FFA_MSG_SEND_DIRECT_REQ and FFA_MSG_SEND_DIRECT_RESP ABIs.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: Ia196c7405993f600e4fdbf467397ea3fb035a62a
show more ...
|
| d663fe7a | 10-Dec-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(spmc): add support for handling FFA_ERROR ABI
This ABI is only valid during SP initialisation to indicate failure. If this occurs during SP initialisation signal a failure, otherwise respond wi
feat(spmc): add support for handling FFA_ERROR ABI
This ABI is only valid during SP initialisation to indicate failure. If this occurs during SP initialisation signal a failure, otherwise respond with a not supported error code.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: I0182a1641c0f6850e82173af333be79b594f2318
show more ...
|
| c4db76f0 | 29-Nov-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(spmc): add support for FFA_MSG_WAIT
Handle an incoming call of FFA_MSG_WAIT from the secure world and update the runtime state of the calling partition accordingly.
This ABI can be called in t
feat(spmc): add support for FFA_MSG_WAIT
Handle an incoming call of FFA_MSG_WAIT from the secure world and update the runtime state of the calling partition accordingly.
This ABI can be called in the following scenarios: - Used by an SP to signal it has finished initializing. - To resume the normal world after handling a secure interrupt that interrupted the normal world. - To relinquish control back to the normal world.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: I929713a2280e8ec291b5b4e8f6d4b49df337228c
show more ...
|
| 20fae0a7 | 29-Nov-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(spmc): add function to determine the return path from the SPMC
Use knowledge of the target partition ID and source security state to determine which route should be used to exit the SPMC.
Ther
feat(spmc): add function to determine the return path from the SPMC
Use knowledge of the target partition ID and source security state to determine which route should be used to exit the SPMC.
There are 3 exit paths: 1) Return to the normal world via the SPMD, this will take care of switching contexts if required. 2) Return to the secure world when the call originated in the normal world and therefore switch contexts. 3) Return to the secure world when the call originated in the secure world, therefore we can return directly.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: I4037f3a8a8519e2c9f1876be92806d2c41d0d154
show more ...
|
| bb01a673 | 29-Nov-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(spmd): enable handling of FF-A SMCs with the SPMC at EL3
Any FF-A SMC that arrives from the normal world is handled by the SPMD before being forwarded to the SPMC. Similarly any SMC arriving fr
feat(spmd): enable handling of FF-A SMCs with the SPMC at EL3
Any FF-A SMC that arrives from the normal world is handled by the SPMD before being forwarded to the SPMC. Similarly any SMC arriving from the secure world will hit the SPMC first and be forwarded to the SPMD if required, otherwise the SPMC will respond directly.
This allows for the existing flow of handling FF-A ABI's when the SPMC resides at a lower EL to be preserved.
In order to facilitate this flow the spmd_smc_forward function has been split and control is either passed to the SPMC or it is forwarded as before. To allow this the flags and cookie parameters must now also be passed into this method as the SPMC must be able to provide these when calling back into the SPMD handler as appropriate.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: I84fee8390023295b9689067e14cd25cba23ca39b
show more ...
|
| 6da76075 | 29-Nov-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(spmd): update SPMC init flow to use EL3 implementation
Allow the SPMD to initialise an SPMC implementation at EL3 directly rather than at a lower EL. This includes removing the requirement to p
feat(spmd): update SPMC init flow to use EL3 implementation
Allow the SPMD to initialise an SPMC implementation at EL3 directly rather than at a lower EL. This includes removing the requirement to parse an SPMC manifest to obtain information about the SPMC implementation, in this case since the SPMD and SPMC reside in the same EL we can hardcode the required information directly.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: I66d1e1b3ec2d0abbfc28b011a32445ee890a331d
show more ...
|
| 5096aeb2 | 01-Dec-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(spmc): add FF-A secure partition manager core
This patch introduces the core support for enabling an SPMC in EL3 as per the FF-A spec.
The current implemented functionality is targeted to enab
feat(spmc): add FF-A secure partition manager core
This patch introduces the core support for enabling an SPMC in EL3 as per the FF-A spec.
The current implemented functionality is targeted to enable initialization of the SPMC itself and initial support for bringing up a single S-EL1 SP.
This includes initialization of the SPMC's internal state, parsing of an SP's manifest, preparing the cpu contexts and appropriate system registers for the Secure Partition.
The spmc_smc_handler is the main handler for all incoming SMCs to the SPMC, FF-A ABI handlers and functionality will be implemented in subsequent patches.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: Ib33c240b91e54cbd018a69fec880d02adfbe12b9
show more ...
|
| e96ffdc8 | 19-Apr-2022 |
Joanna Farley <joanna.farley@arm.com> |
Merge "fix(errata): workaround for Cortex-X2 erratum 2147715" into integration |
| dfc59a7b | 19-Apr-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "st_nvmem_layout" into integration
* changes: refactor(stm32mp1-fdts): remove nvmem_layout node refactor(stm32mp1): drop the "st,stm32-nvmem-layout" node refactor(st):
Merge changes from topic "st_nvmem_layout" into integration
* changes: refactor(stm32mp1-fdts): remove nvmem_layout node refactor(stm32mp1): drop the "st,stm32-nvmem-layout" node refactor(st): remove useless includes
show more ...
|
| 38b7828e | 19-Apr-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "refactor(ufs): delete unused variables" into integration |
| 781d07a4 | 28-Mar-2022 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
refactor(twed): improve TWED enablement in EL-3
The current implementation uses plat_arm API under generic code. "plat_arm" API is a convention used with Arm common platform layer and is reserved fo
refactor(twed): improve TWED enablement in EL-3
The current implementation uses plat_arm API under generic code. "plat_arm" API is a convention used with Arm common platform layer and is reserved for that purpose. In addition, the function has a weak definition which is not encouraged in TF-A.
Henceforth, removing the weak API with a configurable macro "TWED_DELAY" of numeric data type in generic code and simplifying the implementation. By default "TWED_DELAY" is defined to zero, and the delay value need to be explicitly set by the platforms during buildtime.
Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> Change-Id: I25cd6f628e863dc40415ced3a82d0662fdf2d75a
show more ...
|
| a8904e94 | 14-Apr-2022 |
Jorge Troncoso <jatron@google.com> |
refactor(ufs): delete unused variables
The result variable is not being used so it's better to delete it.
Signed-off-by: Jorge Troncoso <jatron@google.com> Change-Id: Icae614076ce1ba7cdc86267473d59
refactor(ufs): delete unused variables
The result variable is not being used so it's better to delete it.
Signed-off-by: Jorge Troncoso <jatron@google.com> Change-Id: Icae614076ce1ba7cdc86267473d59a8bec682f6c
show more ...
|
| 70d986dd | 06-Mar-2021 |
Sayanta Pattanayak <sayanta.pattanayak@arm.com> |
feat(spmc): prevent read only xlat tables with the EL3 SPMC
If using the EL3 SPMC ensure that we don't mark the translation tables as read only. The SPMC requires the ability to map and unmap a part
feat(spmc): prevent read only xlat tables with the EL3 SPMC
If using the EL3 SPMC ensure that we don't mark the translation tables as read only. The SPMC requires the ability to map and unmap a partitions RX/TX buffers at runtime.
Signed-off-by: Sayanta Pattanayak <sayanta.pattanayak@arm.com> Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: Ibb78a6a2e3847ce4ec74ce81a9bb61ce34fec24c
show more ...
|
| 1d63ae4d | 01-Dec-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
feat(spmc): enable building of the SPMC at EL3
Introduce build flag for enabling the secure partition manager core, SPMC_AT_EL3. When enabled, the SPMC module will be included into the BL31 image. B
feat(spmc): enable building of the SPMC at EL3
Introduce build flag for enabling the secure partition manager core, SPMC_AT_EL3. When enabled, the SPMC module will be included into the BL31 image. By default the flag is disabled.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: I5ea1b953e5880a07ffc91c4dea876a375850cf2a
show more ...
|
| 86329689 | 12-Apr-2022 |
Joanna Farley <joanna.farley@arm.com> |
Merge "refactor(context mgmt): add cm_prepare_el3_exit_ns function" into integration |
| 9c2e9259 | 12-Apr-2022 |
Joanna Farley <joanna.farley@arm.com> |
Merge "refactor(mpam): remove initialization of EL2 registers when EL2 is used" into integration |
| d2b68f49 | 12-Apr-2022 |
Joanna Farley <joanna.farley@arm.com> |
Merge "refactor(context mgmt): refactor the cm_setup_context function" into integration |
| 6cd0a2cb | 12-Apr-2022 |
Joanna Farley <joanna.farley@arm.com> |
Merge "refactor(context mgmt): remove registers accessible only from secure state from EL2 context" into integration |