| 8b95e848 | 31-Jan-2022 |
Zelalem Aweke <zelalem.aweke@arm.com> |
refactor(context mgmt): add cm_prepare_el3_exit_ns function
As part of the RFC: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/13651, this patch adds the 'cm_prepare_el3_exit_ns' fun
refactor(context mgmt): add cm_prepare_el3_exit_ns function
As part of the RFC: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/13651, this patch adds the 'cm_prepare_el3_exit_ns' function. The function is a wrapper to 'cm_prepare_el3_exit' function for Non-secure state.
When EL2 sysregs context exists (CTX_INCLUDE_EL2_REGS is enabled) EL1 and EL2 sysreg values are restored from the context instead of directly updating the registers.
Signed-off-by: Zelalem Aweke <zelalem.aweke@arm.com> Change-Id: I9b071030576bb05500d54090e2a03b3f125d1653
show more ...
|
| fd5da7a8 | 02-Feb-2022 |
Zelalem Aweke <zelalem.aweke@arm.com> |
refactor(mpam): remove initialization of EL2 registers when EL2 is used
The patch removes initialization of MPAM EL2 registers when an EL2 software exists. The patch assumes the EL2 software will pe
refactor(mpam): remove initialization of EL2 registers when EL2 is used
The patch removes initialization of MPAM EL2 registers when an EL2 software exists. The patch assumes the EL2 software will perform the necessary initializations of the registers.
Signed-off-by: Zelalem Aweke <zelalem.aweke@arm.com> Change-Id: I5bed81bc22f417bc3e3cbbcd860a8553cd4307cd
show more ...
|
| 2bbad1d1 | 05-Jan-2022 |
Zelalem Aweke <zelalem.aweke@arm.com> |
refactor(context mgmt): refactor the cm_setup_context function
This patch splits the function 'cm_setup_context' into four functions to make it more readable and easier to maintain.
The function is
refactor(context mgmt): refactor the cm_setup_context function
This patch splits the function 'cm_setup_context' into four functions to make it more readable and easier to maintain.
The function is split into the following functions based on the security state of the context.
- setup_context_common - performs common initializations - setup_secure_context - performs Secure state specific initializations - setup_realm_context - performs Realm state specific initializations - setup_ns_context - performs Non-secure state specific initializations
Signed-off-by: Zelalem Aweke <zelalem.aweke@arm.com> Change-Id: Ie14a1c2fc6586087e7aa36537cf9064c80802f8f
show more ...
|
| 7f41bcc7 | 03-Nov-2021 |
Zelalem Aweke <zelalem.aweke@arm.com> |
refactor(context mgmt): remove registers accessible only from secure state from EL2 context
The following registers are only accessible from secure state, therefore don't need to be saved/restored d
refactor(context mgmt): remove registers accessible only from secure state from EL2 context
The following registers are only accessible from secure state, therefore don't need to be saved/restored during world switch. - SDER32_EL2 - VSTCR_EL2 - VSTTBR_EL2
This patch removes these registers from EL2 context.
Signed-off-by: Zelalem Aweke <zelalem.aweke@arm.com> Change-Id: I24d08aacb1b6def261c7b37d3e1265bb76adafdc
show more ...
|
| 807d6d62 | 12-Apr-2022 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge "chore(measured boot): remove unused DTC flags" into integration |
| 2d1ba79c | 12-Apr-2022 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "style(plat/arm/corstone1000): resolve checkpatch warnings" into integration |
| a58a25e5 | 04-Apr-2022 |
Daniel Boulby <daniel.boulby@arm.com> |
docs(build): update GCC to version 11.2-2022.02
This toolchain provides multiple cross compilers and is publicly available on developer.arm.com.
We build TF-A in CI using: AArch32 bare-metal target
docs(build): update GCC to version 11.2-2022.02
This toolchain provides multiple cross compilers and is publicly available on developer.arm.com.
We build TF-A in CI using: AArch32 bare-metal target (arm-none-eabi) AArch64 ELF bare-metal target (aarch64-none-elf)
Change-Id: Ia14de2c7d9034a6f0bc56535e961fffc81bcbf29 Signed-off-by: Daniel Boulby <daniel.boulby@arm.com>
show more ...
|
| 63446c27 | 08-Mar-2022 |
Bipin Ravi <bipin.ravi@arm.com> |
fix(errata): workaround for Cortex-X2 erratum 2147715
Cortex-X2 erratum 2147715 is a Cat B erratum that applies to revision r2p0 and is fixed in r2p1. The workaround is to set CPUACTLR_EL1[22]=1, wh
fix(errata): workaround for Cortex-X2 erratum 2147715
Cortex-X2 erratum 2147715 is a Cat B erratum that applies to revision r2p0 and is fixed in r2p1. The workaround is to set CPUACTLR_EL1[22]=1, which will cause the CFP instruction to invalidate all branch predictor resources regardless of context.
SDEN can be found here: https://developer.arm.com/documentation/SDEN1775100/latest
Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: I2d81867486d9130f2c36cd4554ca9a8f37254b57
show more ...
|
| 71e2ea83 | 11-Apr-2022 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "refactor(arm): use MBEDTLS_CONFIG_FILE macro" into integration |
| def5571d | 21-Feb-2022 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
refactor(arm): use MBEDTLS_CONFIG_FILE macro
Used MBEDTLS_CONFIG_FILE macro for including mbedTLS configuration.
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Change-Id: I374b59a31df3a
refactor(arm): use MBEDTLS_CONFIG_FILE macro
Used MBEDTLS_CONFIG_FILE macro for including mbedTLS configuration.
Signed-off-by: Manish V Badarkhe <manish.badarkhe@arm.com> Change-Id: I374b59a31df3ab1e69481b2c37a6f7455a106b6e
show more ...
|
| a934332d | 11-Apr-2022 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "refactor(corstone700): namespace MHU driver filenames" into integration |
| 81333eac | 11-Apr-2022 |
Venkatesh Yadav Abbarapu <venkatesh.abbarapu@xilinx.com> |
fix(xilinx): fix mismatching function prototype
The reported function raises a error when compilers assert the flag `-Warray-parameter=`, signaling that an array-type argument was promoted to a poin
fix(xilinx): fix mismatching function prototype
The reported function raises a error when compilers assert the flag `-Warray-parameter=`, signaling that an array-type argument was promoted to a pointer-type argument. We observed this behaviour with the gcc 11.2 version.
plat/xilinx/common/pm_service/pm_ipi.c:263:34: error: argument 1 of type 'uint32_t *' {aka 'unsigned int *'} declared as a pointer [-Werror=array-parameter=] 263 | uint32_t calculate_crc(uint32_t *payload, uint32_t bufsize) | ~~~~~~~~~~^~~~~~~ In file included from plat/xilinx/common/pm_service/pm_ipi.c:16: plat/xilinx/common/include/pm_ipi.h:30:33: note: previously declared as an array 'uint32_t[8]' {aka 'unsigned int[8]'} 30 | uint32_t calculate_crc(uint32_t payload[PAYLOAD_ARG_CNT], uint32_t buffersize); | ~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~ cc1.real: all warnings being treated as errors
Signed-off-by: Venkatesh Yadav Abbarapu <venkatesh.abbarapu@xilinx.com> Change-Id: I7329f2e76ee0ca5faba71eb50babd20a796fee64
show more ...
|
| 5a030ce4 | 08-Apr-2022 |
Okash Khawaja <okash@google.com> |
fix(bakery_lock): add __unused for clang
is_lock_acquired() function is only used in assert() statements, so when compiling without asserts, e.g. with DEBUG=0, the function is unused. this is okay w
fix(bakery_lock): add __unused for clang
is_lock_acquired() function is only used in assert() statements, so when compiling without asserts, e.g. with DEBUG=0, the function is unused. this is okay when compiling with gcc because the function is marked as inline but that doesn't work for clang. let's mark this as __unused to avoid -Wunused-function warning-as-error.
Change-Id: I93f808fd15f715a65d1bd4f7592affb7997c4bad Signed-off-by: Okash Khawaja <okash@google.com>
show more ...
|
| b61d94a1 | 19-Dec-2021 |
Marc Bonnici <marc.bonnici@arm.com> |
refactor(spm_mm): reorganize secure partition manager code
In preparation for adding the EL3 SPMC configuration as defined in the FF-A specification, restructure the existing SPM_MM code.
With this
refactor(spm_mm): reorganize secure partition manager code
In preparation for adding the EL3 SPMC configuration as defined in the FF-A specification, restructure the existing SPM_MM code.
With this restructuring of the code, the 'spm_mm' directory is renamed as 'spm' and the code inside has been split into two sub-directories named 'common' and 'spm_mm'. The code in 'spm_mm' directory contains the code that implements the MM interface. In subsequent patches, the 'spmc' directory will be introduced under the 'spm' directory providing the code that implements the 'FF-A' interface.
Currently the common functionality for S-EL1 partitions is limited to assembler functions to enter and exit an SP synchronously.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: I37739b9b53bc68e151ab5c1c0c6a15b3ee362241
show more ...
|
| 9bd3cb5c | 08-Apr-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes I573e6478,I52dc3bee,I7e543664 into integration
* changes: feat(gic600ae_fmu): enable all GICD, PPI, ITS SMs feat(gic600ae_fmu): disable SMID for unavailable blocks feat(gic600ae_
Merge changes I573e6478,I52dc3bee,I7e543664 into integration
* changes: feat(gic600ae_fmu): enable all GICD, PPI, ITS SMs feat(gic600ae_fmu): disable SMID for unavailable blocks feat(gic600ae_fmu): introduce support for RAS error handling
show more ...
|
| 92c356e2 | 08-Apr-2022 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
chore(measured boot): remove unused DTC flags
We no longer need to pass special flags to the device tree compiler for measured boot. These are a left over from the days where we used to pass BL2 mea
chore(measured boot): remove unused DTC flags
We no longer need to pass special flags to the device tree compiler for measured boot. These are a left over from the days where we used to pass BL2 measurement to BL2 image via TB_FW configuration file.
This should have been removed as part of commit eab78e9ba4e36da27 ("refactor(measured_boot): remove passing of BL2 hash via device tree") but was missed at the time.
Change-Id: Iced7e60af7ca660c342c0fc3a33b51865d67f04d Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
show more ...
|
| 14179108 | 07-Apr-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "build(changelog): add new scope for TI platform" into integration |
| 6a1c17c7 | 26-Jan-2022 |
Varun Wadekar <vwadekar@nvidia.com> |
feat(gic600ae_fmu): enable all GICD, PPI, ITS SMs
The following SMIDs are disabled by default.
* GICD: MBIST REQ error and GICD FMU ClkGate override * PPI: MBIST REQ error and PPI FMU ClkGate overr
feat(gic600ae_fmu): enable all GICD, PPI, ITS SMs
The following SMIDs are disabled by default.
* GICD: MBIST REQ error and GICD FMU ClkGate override * PPI: MBIST REQ error and PPI FMU ClkGate override * ITS: MBIST REQ error and ITS FMU ClkGate override
This patch explicitly enables them during the FMU init sequence.
Change-Id: I573e64786e3318d4cbcd07d0a1caf25f8e6e9200 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| f6ca81dd | 07-Apr-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "jc/detect_feat" into integration
* changes: docs(build): update the feature enablement flags refactor(el3-runtime): replace ARM_ARCH_AT_LEAST macro with FEAT flags re
Merge changes from topic "jc/detect_feat" into integration
* changes: docs(build): update the feature enablement flags refactor(el3-runtime): replace ARM_ARCH_AT_LEAST macro with FEAT flags refactor(el3-runtime): add arch-features detection mechanism
show more ...
|
| fe029b58 | 07-Apr-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "mapping" into integration
* changes: feat(debug): update print_memory_map.py feat(bl_common): add XLAT tables symbols in linker script |
| d16bfe0f | 04-Apr-2022 |
Yann Gautier <yann.gautier@foss.st.com> |
feat(debug): update print_memory_map.py
Add some entries in blx_symbols, that are used when the flag SEPARATE_CODE_AND_RODATA is not enabled (__RO_* and __TEXT_RESIDENT_*). Add all new symbols that
feat(debug): update print_memory_map.py
Add some entries in blx_symbols, that are used when the flag SEPARATE_CODE_AND_RODATA is not enabled (__RO_* and __TEXT_RESIDENT_*). Add all new symbols that were not yet present in the script. Correct __BSS_END to __BSS_END__, and add __BSS_START__. Add new *_XLAT_TABLE_* symbols. As those strings are longer than 22, update display format string to be dependent on the longest string. The script also skips lines for which the _START__ and _END__ symbols have the same address (empty sections).
Signed-off-by: Yann Gautier <yann.gautier@foss.st.com> Change-Id: I6c510ced6116b35d14ee2cb7a6711405604380d6
show more ...
|
| 3f0094c1 | 25-Jan-2022 |
Varun Wadekar <vwadekar@nvidia.com> |
feat(gic600ae_fmu): disable SMID for unavailable blocks
This patch updates the gic600_fmu_init function to disable all safety mechanisms for a block ID that is not present on the platform. All safet
feat(gic600ae_fmu): disable SMID for unavailable blocks
This patch updates the gic600_fmu_init function to disable all safety mechanisms for a block ID that is not present on the platform. All safety mechanisms for GIC-600AE are enabled by default and should be disabled for blocks that are not present on the platform to avoid false positive RAS errors.
Change-Id: I52dc3bee9a8b49fd2e51d7ed851fdc803a48e6e3 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| bb5b942e | 05-Apr-2022 |
Yann Gautier <yann.gautier@st.com> |
feat(bl_common): add XLAT tables symbols in linker script
Add __BASE_XLAT_TABLE_START__/_END__ and __XLAT_TABLE_START__/_END__ symbols in the linker script to have them in the .map file. This allows
feat(bl_common): add XLAT tables symbols in linker script
Add __BASE_XLAT_TABLE_START__/_END__ and __XLAT_TABLE_START__/_END__ symbols in the linker script to have them in the .map file. This allows displaying those areas when running memory map script.
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: I768a459c5cecc403a9b81b36a71397ecc3179f4f
show more ...
|
| 308dce40 | 24-Jan-2022 |
Varun Wadekar <vwadekar@nvidia.com> |
feat(gic600ae_fmu): introduce support for RAS error handling
The GIC-600AE uses a range of RAS features for all RAMs, which include SECDED, ECC, and Scrub, software and bus error reporting. The GIC
feat(gic600ae_fmu): introduce support for RAS error handling
The GIC-600AE uses a range of RAS features for all RAMs, which include SECDED, ECC, and Scrub, software and bus error reporting. The GIC makes all necessary information available to software through Armv8.2 RAS architecture compliant register space.
This patch introduces support to probe the FMU_ERRGSR register to find the right error record. Once the correct record is identified, the "handler" function queries the FMU_ERR<m>STATUS register to further identify the block ID, safety mechanism and the architecturally defined primary error code. The description of the error is displayed on the console to simplify debug.
Change-Id: I7e543664b74457afee2da250549f4c3d9beb1a03 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| d9e984cc | 28-Feb-2022 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
docs(build): update the feature enablement flags
Adding the newly introduced build flags for feature enablement of the following features: 1.FEAT_AMUv1p1 - ENABLE_FEAT_AMUv1p1 2.FEAT_CSV2_2 - ENABL
docs(build): update the feature enablement flags
Adding the newly introduced build flags for feature enablement of the following features: 1.FEAT_AMUv1p1 - ENABLE_FEAT_AMUv1p1 2.FEAT_CSV2_2 - ENABLE_FEAT_CSV2_2 3.FEAT_VHE - ENABLE_FEAT_VHE 4.FEAT_DIT - ENABLE_FEAT_DIT 5.FEAT_SB - ENABLE_FEAT_SB 6.FEAT_SEL2 - ENABLE_FEAT_SEL2
Also as part of feature detection mechanism, we now support three states for each of these features, allowing the flags to take either (0 , 1 , 2) values. Henceforth the existing feature build options are converted from boolean to numeric type and is updated accordingly in this patch.
The build flags take a default value and will be internally enabled when they become mandatory from a particular architecture version and upwards. Platforms have the flexibility to overide this internal enablement via this feature specific explicit build flags.
Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> Change-Id: I0090c8c780c2e7d1a50ed9676983fe1df7a35e50
show more ...
|