]> git.baikalelectronics.ru Git - arm-tf.git/log
arm-tf.git
5 years agoMerge "stm32mp1: register shared resource per GPIO bank/pin" into integration
Madhukar Pappireddy [Thu, 16 Jul 2020 14:40:07 +0000 (14:40 +0000)]
Merge "stm32mp1: register shared resource per GPIO bank/pin" into integration

5 years agoMerge "stm32mp1: register shared resource per IOMEM address" into integration
Madhukar Pappireddy [Thu, 16 Jul 2020 14:39:13 +0000 (14:39 +0000)]
Merge "stm32mp1: register shared resource per IOMEM address" into integration

5 years agoMerge "stm32mp1: allow non-secure access to reset upon periph registration" into...
Madhukar Pappireddy [Thu, 16 Jul 2020 14:39:03 +0000 (14:39 +0000)]
Merge "stm32mp1: allow non-secure access to reset upon periph registration" into integration

5 years agoMerge "stm32mp1: allow non-secure access to clocks upon periph registration" into...
Madhukar Pappireddy [Thu, 16 Jul 2020 14:38:58 +0000 (14:38 +0000)]
Merge "stm32mp1: allow non-secure access to clocks upon periph registration" into integration

5 years agoMerge "stm32mp1: shared resources: peripheral registering" into integration
Madhukar Pappireddy [Thu, 16 Jul 2020 14:38:52 +0000 (14:38 +0000)]
Merge "stm32mp1: shared resources: peripheral registering" into integration

5 years agoMerge "drivers: st: clock: register parent of secure clocks" into integration
Madhukar Pappireddy [Thu, 16 Jul 2020 14:38:46 +0000 (14:38 +0000)]
Merge "drivers: st: clock: register parent of secure clocks" into integration

5 years agoMerge "stm32mp1: shared resources: add trace messages" into integration
Madhukar Pappireddy [Thu, 16 Jul 2020 14:38:41 +0000 (14:38 +0000)]
Merge "stm32mp1: shared resources: add trace messages" into integration

5 years agoMerge "fiptool: return zero status on help and help <command>" into integration
joanna.farley [Thu, 16 Jul 2020 14:02:16 +0000 (14:02 +0000)]
Merge "fiptool: return zero status on help and help <command>" into integration

5 years agoMerge changes from topic "fpga_cmdline" into integration
André Przywara [Wed, 15 Jul 2020 22:07:00 +0000 (22:07 +0000)]
Merge changes from topic "fpga_cmdline" into integration

* changes:
  arm_fpga: Predefine DTB and BL33 load addresses
  arm_fpga: Add Klein and Matterhorn support
  arm_fpga: Support more CPU clusters

5 years agoMerge "io_storage: remove redundant assigments" into integration
Manish Pandey [Tue, 14 Jul 2020 14:11:14 +0000 (14:11 +0000)]
Merge "io_storage: remove redundant assigments" into integration

5 years agoMerge "SPMD: fix boundary check if manifest is page aligned" into integration
Manish Pandey [Tue, 14 Jul 2020 10:23:56 +0000 (10:23 +0000)]
Merge "SPMD: fix boundary check if manifest is page aligned" into integration

5 years agoSPMD: fix boundary check if manifest is page aligned
Manish Pandey [Wed, 8 Jul 2020 23:39:16 +0000 (00:39 +0100)]
SPMD: fix boundary check if manifest is page aligned

while mapping SPMC manifest page in the SPMD translation regime the
mapped size was resolved to zero if SPMC manifest base address is PAGE
aligned, causing SPMD to abort.

To fix the problem change mapped size to PAGE_SIZE if manifest base is
PAGE aligned.

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: I06cd39dbefaf492682d9bbb0c82b950dd31fb416

5 years agoMerge "Add myself and Andre Przywara as code owners for the Arm FPGA platform port...
Madhukar Pappireddy [Mon, 13 Jul 2020 17:11:42 +0000 (17:11 +0000)]
Merge "Add myself and Andre Przywara as code owners for the Arm FPGA platform port" into integration

5 years agoMerge "plat/arm: Fix build failure due to increase in BL2 size" into integration
Madhukar Pappireddy [Mon, 13 Jul 2020 14:38:40 +0000 (14:38 +0000)]
Merge "plat/arm: Fix build failure due to increase in BL2 size" into integration

5 years agoMerge changes I9feae1fc,I5cbe7192,I1867ece3,I85c2434a,If8edeeec, ... into integration
Manish Pandey [Fri, 10 Jul 2020 14:40:29 +0000 (14:40 +0000)]
Merge changes I9feae1fc,I5cbe7192,I1867ece3,I85c2434a,If8edeeec, ... into integration

* changes:
  plat: marvell: armada: mcbin: squash several IO windows into one
  plat: marvell: armada: fix BL32 extra parameters usage
  drivers: marvell: Fix the LLC SRAM driver
  plat: marvell: armada: a8k: change CCU LLC SRAM mapping
  plat: marvell: armada: adjust trusted DRAM size to match OP-TEE OS
  drivers: marvell: mg_conf_cm3: pass comphy lane number to AP FW
  plat: marvell: armada: move mg conf related code to appropriate driver
  marvell: comphy: start AP FW when comphy AP mode selected
  drivers: marvell: mg_conf_cm3: add basic driver
  tools: doimage: change the binary image alignment to 16
  tools: doimage: migrate to mbedtls v2.8 APIs

5 years agoAdd myself and Andre Przywara as code owners for the Arm FPGA platform port
Javier Almansa Sobrino [Fri, 10 Jul 2020 09:34:04 +0000 (10:34 +0100)]
Add myself and Andre Przywara as code owners for the Arm FPGA platform port

Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com>
Change-Id: I6d3949a971fada5a086b788dbe274f8451fcfc0d

5 years agoplat/arm: Fix build failure due to increase in BL2 size
Manish V Badarkhe [Fri, 10 Jul 2020 08:44:21 +0000 (09:44 +0100)]
plat/arm: Fix build failure due to increase in BL2 size

BL2 size gets increased due to the libfdt library update and
that eventually cause no-optimization build failure for BL2 as below:
aarch64-none-elf-ld.bfd: BL2 image has exceeded its limit.
aarch64-none-elf-ld.bfd: region `RAM' overflowed by 4096 bytes
Makefile:1070: recipe for target 'build/fvp/debug/bl2/bl2.elf' failed
make: *** [build/fvp/debug/bl2/bl2.elf] Error 1

Fixed build failure by increasing BL2 image size limit by 4Kb.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I92a57eb4db601561a98e254b64994bb921a88db3

5 years agoplat: marvell: armada: mcbin: squash several IO windows into one
Grzegorz Jaszczyk [Mon, 10 Jun 2019 15:01:05 +0000 (17:01 +0200)]
plat: marvell: armada: mcbin: squash several IO windows into one

There is no need to open tree different IO window when there is
possibility of having one covering required range.

Change-Id: I9feae1fc583df1f7d97d28161cf7601f43513856
Signed-off-by: Grzegorz Jaszczyk <jaz@semihalf.com>
5 years agoplat: marvell: armada: fix BL32 extra parameters usage
Marcin Wojtas [Wed, 13 Nov 2019 12:31:48 +0000 (13:31 +0100)]
plat: marvell: armada: fix BL32 extra parameters usage

Update missing code releated to the BL32 payload.

Change-Id: I5cbe71921467c53c45be5510f950cefdacc110e1
Signed-off-by: Marcin Wojtas <mw@semihalf.com>
5 years agodrivers: marvell: Fix the LLC SRAM driver
Konstantin Porotchkin [Thu, 4 Apr 2019 07:02:20 +0000 (10:02 +0300)]
drivers: marvell: Fix the LLC SRAM driver

- Fix the line address macro
- LLC invalidate and enable before ways lock for allocation
- Add support for limited SRAM size allocation
- Add SRAM RW test function

Change-Id: I1867ece3047566ddd7931bd7472e1f47fb42c8d4
Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>
5 years agoplat: marvell: armada: a8k: change CCU LLC SRAM mapping
Konstantin Porotchkin [Mon, 15 Apr 2019 13:32:59 +0000 (16:32 +0300)]
plat: marvell: armada: a8k: change CCU LLC SRAM mapping

The LLC SRAM will be enabled in OP-TEE OS for usage as secure storage.
The CCU have to prepare SRAM window, but point to the DRAM-0 target
until the SRAM is actually enabled.
This patch changes CCU SRAM window target to DRAM-0
Remove dependence between LLC_SRAM and LLC_ENABLE and update the
build documentation.
The SRAМ base moved to follow the OP-TEE SHMEM area (0x05400000)

Change-Id: I85c2434a3d515ec37da5ae8eb729e3280f91c456
Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>
5 years agoplat: marvell: armada: adjust trusted DRAM size to match OP-TEE OS
Konstantin Porotchkin [Mon, 15 Apr 2019 13:25:59 +0000 (16:25 +0300)]
plat: marvell: armada: adjust trusted DRAM size to match OP-TEE OS

Area used as trusted DRAM is 12MB in Marvell OP-TEE OS module.
It is followed by 4MB of shared memory.

Change-Id: If8edeeec5861b529408baca25f78c06a0a440d8c
Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>
5 years agodrivers: marvell: mg_conf_cm3: pass comphy lane number to AP FW
Grzegorz Jaszczyk [Tue, 18 Jun 2019 12:43:02 +0000 (14:43 +0200)]
drivers: marvell: mg_conf_cm3: pass comphy lane number to AP FW

Since the AP process can be enabled on different setups, the information
about used comphy lane should be passed to AP FW. For instance:
- A8K development board uses comphy lane 2 for eth 0
- cn913x development board uses comphy lane 4 for eth 0

Change-Id: Icf001fb3eea4d9c24c09384e49844ecaf8655ad2
Signed-off-by: Grzegorz Jaszczyk <jaz@semihalf.com>
5 years agoplat: marvell: armada: move mg conf related code to appropriate driver
Grzegorz Jaszczyk [Wed, 17 Apr 2019 09:24:43 +0000 (11:24 +0200)]
plat: marvell: armada: move mg conf related code to appropriate driver

Now when mg_conf_cm3 driver is present - move all relevant code there.

Change-Id: I444d9e877c450d6ee69ca3a49b547e4c3aeac0be
Signed-off-by: Grzegorz Jaszczyk <jaz@semihalf.com>
5 years agomarvell: comphy: start AP FW when comphy AP mode selected
Grzegorz Jaszczyk [Fri, 12 Apr 2019 14:57:14 +0000 (16:57 +0200)]
marvell: comphy: start AP FW when comphy AP mode selected

After configuring comphy to AP mode also start AP FW.

Change-Id: Ib28977d7ee643575a818ba17f69dea0b7e8e0df4
Signed-off-by: Grzegorz Jaszczyk <jaz@semihalf.com>
5 years agodrivers: marvell: mg_conf_cm3: add basic driver
Grzegorz Jaszczyk [Fri, 12 Apr 2019 14:53:49 +0000 (16:53 +0200)]
drivers: marvell: mg_conf_cm3: add basic driver

Implement function which will allow to start AP FW.

Change-Id: Ie0fc8ad138bf56b10809cdc92d1e5e96a2aaf33f
Signed-off-by: Grzegorz Jaszczyk <jaz@semihalf.com>
5 years agotools: doimage: change the binary image alignment to 16
Konstantin Porotchkin [Thu, 2 May 2019 12:10:07 +0000 (15:10 +0300)]
tools: doimage: change the binary image alignment to 16

Change the binary image alignment from 4 to 16.
The PKCS signature verification fails for unaligned images.

Change-Id: Ieb08dc3ea128790f542ad93e3c948117567a65af
Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>
5 years agotools: doimage: migrate to mbedtls v2.8 APIs
Konstantin Porotchkin [Wed, 1 May 2019 14:08:18 +0000 (17:08 +0300)]
tools: doimage: migrate to mbedtls v2.8 APIs

Replace deprecated mbedtls_sha256 with mbedtls_sha256_ret
The mbedtls_pk_parse_key does not work correctly anymore
with the DER buffer embedded in the secure image extentson
using the buffer size as the the key length.
Move to mbedtls_pk_parse_subpubkey API that handles such
case correctly.
The DER format already contains the key length, so there
is no particular reason to supply it to the key parser.
Update the doimage version to 3.3

Change-Id: I0ec5ee84b7d1505b43138e0b7a6bdba44a6702b6
Signed-off-by: Konstantin Porotchkin <kostap@marvell.com>
5 years agoMerge "plat/arm, dts: Update platform device tree for CoT" into integration
Sandrine Bailleux [Fri, 10 Jul 2020 07:52:07 +0000 (07:52 +0000)]
Merge "plat/arm, dts: Update platform device tree for CoT" into integration

5 years agoplat/arm, dts: Update platform device tree for CoT
Manish V Badarkhe [Mon, 29 Jun 2020 10:14:07 +0000 (11:14 +0100)]
plat/arm, dts: Update platform device tree for CoT

Included cot_descriptors.dtsi in platform device tree
(fvp_tb_fw_config.dts).

Also, updated the maximum size of tb_fw_config to 0x1800
in order to accomodate the device tree for CoT descriptors.

Follow up patch will parse the device tree for these CoT descriptors
and fill the CoT descriptor structures at runtime instead of using
static CoT descriptor structures in the code base.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I90122bc713f6842b82fb019b04caf42629b4f45a

5 years agoMerge "dts: Add CoT descriptor nodes and properties in device tree" into integration
Sandrine Bailleux [Fri, 10 Jul 2020 07:51:06 +0000 (07:51 +0000)]
Merge "dts: Add CoT descriptor nodes and properties in device tree" into integration

5 years agodts: Add CoT descriptor nodes and properties in device tree
Manish V Badarkhe [Mon, 29 Jun 2020 10:12:12 +0000 (11:12 +0100)]
dts: Add CoT descriptor nodes and properties in device tree

Added CoT descriptor nodes and properties in device tree.
Currently, CoT descriptors which are used by BL2 are added as part
of device tree.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Iff23cff843e5489fac18bcee5f5d6a71de5ad0d0

5 years agoMerge "make, doc: Add build option to create chain of trust at runtime" into integration
Sandrine Bailleux [Fri, 10 Jul 2020 07:50:47 +0000 (07:50 +0000)]
Merge "make, doc: Add build option to create chain of trust at runtime" into integration

5 years agoio_storage: remove redundant assigments
Masahiro Yamada [Thu, 9 Jul 2020 13:26:37 +0000 (22:26 +0900)]
io_storage: remove redundant assigments

The assignments to 'result' are unneeded.

Change-Id: I18899f10bf9bd7f219f0e47a981683d8b4701bde
Signed-off-by: Masahiro Yamada <yamada.masahiro@socionext.com>
5 years agoarm_fpga: Predefine DTB and BL33 load addresses
Andre Przywara [Wed, 8 Jul 2020 12:01:00 +0000 (13:01 +0100)]
arm_fpga: Predefine DTB and BL33 load addresses

The memory layout for the FPGA is fairly uniform for most of the FPGA
images, and we already assume that DRAM starts at 2GB by default.

Prepopulate PRELOADED_BL33_BASE and FPGA_PRELOADED_DTB_BASE to some
sane default values, to simplify building some stock image.
If people want to deviate from that, they can always override those
addresses on the make command line.

Change-Id: I2238fafb3f8253a01ad2d88d45827c141d9b29dd
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
5 years agoarm_fpga: Add Klein and Matterhorn support
Andre Przywara [Thu, 25 Jun 2020 12:10:38 +0000 (13:10 +0100)]
arm_fpga: Add Klein and Matterhorn support

To support FPGAs with those cores as well, as the respective cpulib
files to the Makefile.

Change-Id: I1a60867d5937be88b32b210c7817be4274554a76
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
5 years agoarm_fpga: Support more CPU clusters
Andre Przywara [Thu, 25 Jun 2020 12:10:38 +0000 (13:10 +0100)]
arm_fpga: Support more CPU clusters

The maximum number of clusters is currently set to 2, which is quite
limiting. As there are FPGA images with 4 clusters, let's increase the
limit to 4.

Change-Id: I9a85ca07ebbd2a018ad9668536d867ad6b75e537
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
5 years agomake, doc: Add build option to create chain of trust at runtime
Manish V Badarkhe [Mon, 29 Jun 2020 09:32:53 +0000 (10:32 +0100)]
make, doc: Add build option to create chain of trust at runtime

Added a build option 'COT_DESC_IN_DTB' to create chain of trust
at runtime using fconf.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I92b257ac4ece8bbf56f05a41d1e4056e2422ab89

5 years agoMerge "doc: Update CoT binding to make it more generic" into integration
Sandrine Bailleux [Thu, 9 Jul 2020 11:14:32 +0000 (11:14 +0000)]
Merge "doc: Update CoT binding to make it more generic" into integration

5 years agodoc: Update CoT binding to make it more generic
Manish V Badarkhe [Tue, 30 Jun 2020 03:04:05 +0000 (04:04 +0100)]
doc: Update CoT binding to make it more generic

Updated the CoT binding document to show chain of trust relationship
with the help of 'authentication method' and 'authentication data'
instead of showing content of certificate and fixed rendering issue
while creating html page using this document.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ib48279cfe786d149ab69ddc711caa381a50f9e2b

5 years agostm32mp1: register shared resource per GPIO bank/pin
Etienne Carriere [Wed, 13 May 2020 08:19:50 +0000 (10:19 +0200)]
stm32mp1: register shared resource per GPIO bank/pin

Introduce helper functions stm32mp_register_secure_gpio() and
stm32mp_register_non_secure_gpio() for drivers to register a
GPIO pin as secure or non-secure.

These functions are stubbed when shared resource driver is not
embedded in the BL image so that drivers do not bother whether they
shall register or not their resources.

Change-Id: I1fe98576c072ae31f75427c9ac5c9f6c4f1b6ed1
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
5 years agostm32mp1: register shared resource per IOMEM address
Etienne Carriere [Wed, 13 May 2020 08:16:21 +0000 (10:16 +0200)]
stm32mp1: register shared resource per IOMEM address

Introduce helper functions stm32mp_register_secure_periph_iomem()
and stm32mp_register_non_secure_periph_iomem() for drivers to
register a resource as secure or non-secure based on its SoC
interface registers base address.

These functions are stubbed when shared resources driver is not
embedded (!STM32MP_SHARED_RESOURCES) so that drivers embedded
in other BL stages do not bother whether they shall register or
not their resources.

Change-Id: Icebd05a930afc5964bc4677357da5d1b23666066
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
5 years agostm32mp1: allow non-secure access to reset upon periph registration
Etienne Carriere [Wed, 13 May 2020 11:53:15 +0000 (13:53 +0200)]
stm32mp1: allow non-secure access to reset upon periph registration

Update implementation of stm32mp_nsec_can_access_reset() based
on the registering of the shared resources.

Querying registering state locks further registration of
peripherals.

Change-Id: I5f38f2a3481780b9a71939d95984c4821c537aa4
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
5 years agostm32mp1: allow non-secure access to clocks upon periph registration
Etienne Carriere [Wed, 13 May 2020 08:20:34 +0000 (10:20 +0200)]
stm32mp1: allow non-secure access to clocks upon periph registration

Update implementation of stm32mp_nsec_can_access_clock() based
on the registering of the shared resources.

Querying registering state locks further registration of peripherals.

Change-Id: If68f6d4a52c4742ba66244c6ea2d9afa08404137
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
5 years agostm32mp1: shared resources: peripheral registering
Etienne Carriere [Wed, 13 May 2020 12:22:01 +0000 (14:22 +0200)]
stm32mp1: shared resources: peripheral registering

Define helper functions stm32mp_register_secure_periph() and
stm32mp_register_non_secure_periph() for platform drivers to
register a shared resource assigned to respectively secure
or non-secure world.

Some resources are related to clock resources. When a resource is
registered as secure, ensure its clock dependencies are also
registered as secure. Registering a non-secure resource does not
mandate its clock dependencies are also registered as non-secure.

Change-Id: I74975be8976b8d3bf18dcc807541a072803af6e3
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
5 years agodrivers: st: clock: register parent of secure clocks
Etienne Carriere [Wed, 13 May 2020 09:49:49 +0000 (11:49 +0200)]
drivers: st: clock: register parent of secure clocks

Introduce stm32mp1_register_clock_parents_secure() in stm32mp1
clock driver to allow platform shared resources to register as
secure the parent clocks of a clock registered as secure.

Change-Id: I53a9ab6aa78ee840ededce67e7b12a84e08ee843
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
5 years agostm32mp1: shared resources: add trace messages
Etienne Carriere [Wed, 13 May 2020 13:51:56 +0000 (15:51 +0200)]
stm32mp1: shared resources: add trace messages

Define from helper functions to get a human readable string
identifier from a shared resource enumerated ID. Use them to
make debug traces more friendly peripheral registering functions.

Change-Id: I9e207b8ce1d1e9250e242ca7e15461b9a1532f40
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
5 years agoMerge "Upgrade libfdt source files" into integration
Sandrine Bailleux [Wed, 8 Jul 2020 06:54:39 +0000 (06:54 +0000)]
Merge "Upgrade libfdt source files" into integration

5 years agoMerge "drivers: arm: gicv3: auto-detect presence of GIC600-AE" into integration
André Przywara [Tue, 7 Jul 2020 22:06:31 +0000 (22:06 +0000)]
Merge "drivers: arm: gicv3: auto-detect presence of GIC600-AE" into integration

5 years agodrivers: arm: gicv3: auto-detect presence of GIC600-AE
Varun Wadekar [Sun, 5 Jul 2020 20:12:28 +0000 (13:12 -0700)]
drivers: arm: gicv3: auto-detect presence of GIC600-AE

This patch adds the IIDR value for GIC600-AE to the gicv3_is_gic600()
helper function. This helps platforms supporting this version of the
GIC600 interrupt controller to function with the generic GIC driver.

Verified with tftf-validation test suite

******************************* Summary *******************************
> Test suite 'Framework Validation'
                                                                Passed
> Test suite 'Timer framework Validation'
                                                                Passed
=================================
Tests Skipped : 0
Tests Passed  : 6
Tests Failed  : 0
Tests Crashed : 0
Total tests   : 6
=================================
NOTICE:  Exiting tests.

Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
Change-Id: I518ae7b56f7f372e374e453287d76ca370fc3574

5 years agoMerge "corstone700: splitting the platform support into FVP and FPGA" into integration
Manish Pandey [Tue, 7 Jul 2020 15:49:14 +0000 (15:49 +0000)]
Merge "corstone700: splitting the platform support into FVP and FPGA" into integration

5 years agocorstone700: splitting the platform support into FVP and FPGA
Abdellatif El Khlifi [Mon, 6 Jul 2020 15:15:23 +0000 (16:15 +0100)]
corstone700: splitting the platform support into FVP and FPGA

This patch performs the following:

- Creating two corstone700 platforms under corstone700 board:

  fvp and fpga

- Since the FVP and FPGA have IP differences, this commit provides a specific DTS for each platform
- The platform can be specified using the TARGET_PLATFORM Makefile variable
(possible values are: fvp or fpga)
- Allowing to use u-boot by:
  - Enabling NEED_BL33 option
  - Fixing non-secure image base: For no preloaded bl33 we want to
    have the NS base set on shared ram. Setup a memory map region
    for NS in shared map and set the bl33 address in the area.
- Setting the SYS_COUNTER_FREQ_IN_TICKS based on the selected
platform
- Setting ARM_MAP_SHARED_RAM and ARM_MAP_NS_SHARED_RAM to use MT_MEMORY

Change-Id: I4c8ac3387acb1693ab617bcccab00d80e340c163
Signed-off-by: Rui Miguel Silva <rui.silva@linaro.org>
Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
5 years agofiptool: return zero status on help and help <command>
Leonardo Sandoval [Mon, 29 Jun 2020 23:09:24 +0000 (18:09 -0500)]
fiptool: return zero status on help and help <command>

Querying the 'fiptool' for help or help <command> should return 0
return status (success) and not 1 (failure). In the other hand, if tool is
executed with any other command (not help) where command's parameters are
either missing or wrong, then the tool should return non-zero (failure). Now,
the 'usage' function caller is the one that passes the return status.

Change-Id: Id5eea91037cd810fb1e34a42e8199ef504f5daa4
Signed-off-by: Leonardo Sandoval <leonardo.sandoval@linaro.org>
5 years agoMerge "arm_fpga: Fix MPIDR topology checks" into integration
Madhukar Pappireddy [Thu, 2 Jul 2020 23:47:50 +0000 (23:47 +0000)]
Merge "arm_fpga: Fix MPIDR topology checks" into integration

5 years agoMerge changes from topic "stm32-shres" into integration
Mark Dykes [Thu, 2 Jul 2020 16:11:10 +0000 (16:11 +0000)]
Merge changes from topic "stm32-shres" into integration

* changes:
  stm32mp1: shared resources: apply registered configuration
  stm32mp1: shared resources: count GPIOZ bank pins
  stm32mp1: shared resources: define resource identifiers

5 years agoMerge "stm32mp1: introduce shared resources support" into integration
Mark Dykes [Thu, 2 Jul 2020 16:10:12 +0000 (16:10 +0000)]
Merge "stm32mp1: introduce shared resources support" into integration

5 years agoMerge "doc: Fix some broken links" into integration
Manish Pandey [Thu, 2 Jul 2020 14:50:02 +0000 (14:50 +0000)]
Merge "doc: Fix some broken links" into integration

5 years agoMerge "Workaround for Neoverse N1 erratum 1800710" into integration
Lauren Wehrmeister [Wed, 1 Jul 2020 16:57:11 +0000 (16:57 +0000)]
Merge "Workaround for Neoverse N1 erratum 1800710" into integration

5 years agoMerge "doc: RAS: fixing broken links" into integration
Lauren Wehrmeister [Wed, 1 Jul 2020 15:56:19 +0000 (15:56 +0000)]
Merge "doc: RAS: fixing broken links" into integration

5 years agodoc: Fix some broken links
Sandrine Bailleux [Wed, 1 Jul 2020 11:53:07 +0000 (13:53 +0200)]
doc: Fix some broken links

Fix all external broken links reported by Sphinx linkcheck tool.

This does not take care of broken cross-references between internal
TF-A documentation files. These will be fixed in a future patch.

Change-Id: I2a740a3ec0b688c14aad575a6c2ac71e72ce051e
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
5 years agodoc: RAS: fixing broken links
Manish Pandey [Mon, 29 Jun 2020 23:46:08 +0000 (00:46 +0100)]
doc: RAS: fixing broken links

There were some links in the file "ras.rst" which were broken, this
patch fixes all the broken links in this file.

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: I00cf080e9338af5786239a4843cb4c2e0cc9d99d

5 years agoMerge "linker_script: move .rela.dyn section to bl_common.ld.h" into integration
Sandrine Bailleux [Tue, 30 Jun 2020 13:42:09 +0000 (13:42 +0000)]
Merge "linker_script: move .rela.dyn section to bl_common.ld.h" into integration

5 years agoMerge "plat/arm: Add assert for the valid address of dtb information" into integration
Sandrine Bailleux [Tue, 30 Jun 2020 12:12:32 +0000 (12:12 +0000)]
Merge "plat/arm: Add assert for the valid address of dtb information" into integration

5 years agoMerge "Fix makefile to build on a Windows host PC" into integration
Manish Pandey [Mon, 29 Jun 2020 23:49:20 +0000 (23:49 +0000)]
Merge "Fix makefile to build on a Windows host PC" into integration

5 years agoFix makefile to build on a Windows host PC
Sami Mujawar [Thu, 23 Apr 2020 08:28:37 +0000 (09:28 +0100)]
Fix makefile to build on a Windows host PC

The TF-A firmware build system is capable of building on both Unix like
and Windows host PCs. The commit ID 7ff088 "Enable MTE support" updated
the Makefile to conditionally enable the MTE support if the AArch64
architecture revision was greater than 8.5. However, the Makefile changes
were dependent on shell commands that are only available on unix shells,
resulting in build failures on a Windows host PC.

This patch fixes the Makefile by using a more portable approach for
comparing the architecture revision.

Change-Id: Icb56cbecd8af5b0b9056d105970ff4a6edd1755a
Signed-off-by: Sami Mujawar <sami.mujawar@arm.com>
5 years agoMerge "stm32mp1: disable neon in sp_min" into integration
Mark Dykes [Mon, 29 Jun 2020 15:59:45 +0000 (15:59 +0000)]
Merge "stm32mp1: disable neon in sp_min" into integration

5 years agoMerge "stm32mp1: check stronger the secondary CPU entry point" into integration
Mark Dykes [Mon, 29 Jun 2020 15:58:23 +0000 (15:58 +0000)]
Merge "stm32mp1: check stronger the secondary CPU entry point" into integration

5 years agoplat/arm: Add assert for the valid address of dtb information
Manish V Badarkhe [Mon, 29 Jun 2020 06:17:24 +0000 (07:17 +0100)]
plat/arm: Add assert for the valid address of dtb information

Added assert in the code to check valid address of dtb information
structure retrieved from fw_config device tree.
This patch fixes coverity defect:360213.

Also, removed conditional calling of "fconf_populate" as "fconf_populate"
function already checks the validity of the device tree address received
and go to panic in case of address is NULL.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ib83e4e84a95e2456a12c7a2bb3fe70461d882cba

5 years agoMerge "allwinner: Disable NS access to PRCM power control registers" into integration
André Przywara [Mon, 29 Jun 2020 11:50:47 +0000 (11:50 +0000)]
Merge "allwinner: Disable NS access to PRCM power control registers" into integration

5 years agoallwinner: Disable NS access to PRCM power control registers
Samuel Holland [Sun, 29 Dec 2019 22:12:12 +0000 (16:12 -0600)]
allwinner: Disable NS access to PRCM power control registers

The non-secure world has no business accessing the CPU power switches in
the PRCM; those are handled by TF-A or the SCP. Only allow access to the
clock control part of the PRCM.

Signed-off-by: Samuel Holland <samuel@sholland.org>
Change-Id: I657b97f4ea8a0073448ad3343fbc66ba168ed89e

5 years agolinker_script: move .rela.dyn section to bl_common.ld.h
Masahiro Yamada [Wed, 22 Apr 2020 02:27:55 +0000 (11:27 +0900)]
linker_script: move .rela.dyn section to bl_common.ld.h

The .rela.dyn section is the same for BL2-AT-EL3, BL31, TSP.

Move it to the common header file.

I slightly changed the definition so that we can do "RELA_SECTION >RAM".
It still produced equivalent elf images.

Please note I got rid of '.' from the VMA field. Otherwise, if the end
of previous .data section is not 8-byte aligned, it fails to link.

aarch64-linux-gnu-ld.bfd: warning: changing start of section .rela.dyn by 4 bytes
aarch64-linux-gnu-ld.bfd: warning: changing start of section .rela.dyn by 4 bytes
aarch64-linux-gnu-ld.bfd: warning: changing start of section .rela.dyn by 4 bytes
make: *** [Makefile:1071: build/qemu/release/bl31/bl31.elf] Error 1

Change-Id: Iba7422d99c0374d4d9e97e6fd47bae129dba5cc9
Signed-off-by: Masahiro Yamada <yamada.masahiro@socionext.com>
5 years agoUpgrade libfdt source files
Madhukar Pappireddy [Mon, 15 Jun 2020 22:19:09 +0000 (17:19 -0500)]
Upgrade libfdt source files

This version corresponds to the following commit <7be250b>
libfdt: Correct condition for reordering blocks

Also, updated the Juno romlib jumptable with fdt APIs.

Change-Id: Ib6d28c1aea81c2144a263958f0792cc4daea7a1f
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
5 years agoMerge changes Ib9c82b85,Ib348e097,I4dc315e4,I58a8ce44,Iebc03361, ... into integration
Manish Pandey [Fri, 26 Jun 2020 13:59:38 +0000 (13:59 +0000)]
Merge changes Ib9c82b85,Ib348e097,I4dc315e4,I58a8ce44,Iebc03361, ... into integration

* changes:
  plat: marvell: armada: a8k: add OP-TEE OS MMU tables
  drivers: marvell: add support for mapping the entire LLC to SRAM
  plat: marvell: armada: add LLC SRAM CCU setup for AP806/AP807 platforms
  plat: marvell: armada: reduce memory size reserved for FIP image
  plat: marvell: armada: platform definitions cleanup
  plat: marvell: armada: a8k: check CCU window state before loading MSS BL2
  drivers: marvell: add CCU driver API for window state checking
  drivers: marvell: align and extend llc macros
  plat: marvell: a8k: move address config of cp1/2 to BL2
  plat: marvell: armada: re-enable BL32_BASE definition
  plat: marvell: a8k: extend includes to take advantage of the phy_porting_layer
  marvell: comphy: initialize common phy selector for AP mode
  marvell: comphy: update rx_training procedure
  plat: marvell: armada: configure amb for all CPs
  plat: marvell: armada: modify PLAT_FAMILY name for 37xx SoCs

5 years agoarm_fpga: Fix MPIDR topology checks
Andre Przywara [Thu, 25 Jun 2020 12:10:13 +0000 (13:10 +0100)]
arm_fpga: Fix MPIDR topology checks

The plat_core_pos_by_mpidr() implementation for the Arm FPGA port has
some issues, which leads to problems when matching GICv3 redistributors
with cores:
- The power domain tree was not taking multithreading into account, so
  we ended up with the wrong mapping between MPIDRs and core IDs.
- Before even considering an MPIDR, we try to make sure Aff2 is 0.
  Unfortunately this is the cluster ID when the MT bit is set.
- We mask off the MT bit in MPIDR, before basing decisions on it.
- When detecting the MT bit, we are properly calculating the thread ID,
  but don't account for the shift in the core and cluster ID checks.

Those problems lead to early rejections of MPIDRs values, in particular
when called from the GIC code. As a result, CPU_ON for secondary cores
was failing for most of the cores.

Fix this by properly handling the MT bit in plat_core_pos_by_mpidr(),
also pulling in FPGA_MAX_PE_PER_CPU when populating the power domain
tree.

Change-Id: I71b2255fc0d27bfe5806511df479ab38e4e33fc4
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
5 years agoMerge changes from topic "fw_config_handoff" into integration
Sandrine Bailleux [Fri, 26 Jun 2020 07:31:59 +0000 (07:31 +0000)]
Merge changes from topic "fw_config_handoff" into integration

* changes:
  doc: Update arg usage for BL2 and BL31 setup functions
  doc: Update BL1 and BL2 boot flow
  plat/arm: Use only fw_config between bl2 and bl31

5 years agodoc: Update arg usage for BL2 and BL31 setup functions
Manish V Badarkhe [Wed, 24 Jun 2020 14:58:38 +0000 (15:58 +0100)]
doc: Update arg usage for BL2 and BL31 setup functions

Updated the porting guide for the usage of received arguments
in BL2 and BL32 setup functions in case of Arm platform.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ia83a5607fed999819d25e49322b3bfb5db9425c0

5 years agodoc: Update BL1 and BL2 boot flow
Manish V Badarkhe [Sun, 21 Jun 2020 04:41:11 +0000 (05:41 +0100)]
doc: Update BL1 and BL2 boot flow

Updated the document for BL1 and BL2 boot flow to capture
below changes made in FCONF

1. Loading of fw_config and tb_fw_config images by BL1.
2. Population of fw_config and tb_fw_config by BL2.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ifea5c61d520ff1de834c279ce1759b53448303ba

5 years agoplat/arm: Use only fw_config between bl2 and bl31
Manish V Badarkhe [Sat, 30 May 2020 16:40:44 +0000 (17:40 +0100)]
plat/arm: Use only fw_config between bl2 and bl31

Passed the address of fw_config instead of soc_fw_config
as arg1 to BL31 from BL2 for ARM fvp platform.

BL31 then retrieve load-address of other device trees
from fw_config device tree.

Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ib7e9581cd765d76111dcc3b7e0dafc12503c83c1

5 years agoMerge changes from topic "fw_config_handoff" into integration
Sandrine Bailleux [Fri, 26 Jun 2020 07:06:52 +0000 (07:06 +0000)]
Merge changes from topic "fw_config_handoff" into integration

* changes:
  doc: Update memory layout for firmware configuration area
  plat/arm: Increase size of firmware configuration area
  plat/arm: Load and populate fw_config and tb_fw_config
  fconf: Handle error from fconf_load_config
  plat/arm: Update the fw_config load call and populate it's information
  fconf: Allow fconf to load additional firmware configuration
  fconf: Clean confused naming between TB_FW and FW_CONFIG
  tbbr/dualroot: Add fw_config image in chain of trust
  cert_tool: Update cert_tool for fw_config image support
  fiptool: Add fw_config in FIP
  plat/arm: Rentroduce tb_fw_config device tree

5 years agoWorkaround for Neoverse N1 erratum 1800710
johpow01 [Tue, 2 Jun 2020 18:14:11 +0000 (13:14 -0500)]
Workaround for Neoverse N1 erratum 1800710

Neoverse N1 erratum 1800710 is a Cat B erratum, present in older
revisions of the Neoverse N1 processor core.  The workaround is to
set a bit in the ECTLR_EL1 system register, which disables allocation
of splintered pages in the L2 TLB.

This errata is explained in this SDEN:
https://static.docs.arm.com/sden885747/f/Arm_Neoverse_N1_MP050_Software_Developer_Errata_Notice_v21.pdf

Signed-off-by: John Powell <john.powell@arm.com>
Change-Id: Ie5b15c8bc3235e474a06a57c3ec70684361857a6

5 years agoMerge "stm32mp1: use last page of SYSRAM as SCMI shared memory" into integration
Mark Dykes [Thu, 25 Jun 2020 18:37:51 +0000 (18:37 +0000)]
Merge "stm32mp1: use last page of SYSRAM as SCMI shared memory" into integration

5 years agoMerge "stm32mp1: SP_MIN embeds Arm Architecture services" into integration
Mark Dykes [Thu, 25 Jun 2020 18:33:27 +0000 (18:33 +0000)]
Merge "stm32mp1: SP_MIN embeds Arm Architecture services" into integration

5 years agoMerge "Redirect security incident report to TrustedFirmware.org" into integration
Mark Dykes [Thu, 25 Jun 2020 18:27:16 +0000 (18:27 +0000)]
Merge "Redirect security incident report to TrustedFirmware.org" into integration

5 years agoMerge "doc: Add a binding document for COT descriptors" into integration
Mark Dykes [Thu, 25 Jun 2020 18:23:50 +0000 (18:23 +0000)]
Merge "doc: Add a binding document for COT descriptors" into integration

5 years agoMerge "plat/fvp: Dynamic description of clock freq" into integration
Mark Dykes [Thu, 25 Jun 2020 18:20:21 +0000 (18:20 +0000)]
Merge "plat/fvp: Dynamic description of clock freq" into integration

5 years agoMerge "fconf: Extract Timer clock freq from HW_CONFIG dtb" into integration
Mark Dykes [Thu, 25 Jun 2020 18:18:57 +0000 (18:18 +0000)]
Merge "fconf: Extract Timer clock freq from HW_CONFIG dtb" into integration

5 years agoMerge "Workaround for Cortex A77 erratum 1800714" into integration
Lauren Wehrmeister [Thu, 25 Jun 2020 18:15:33 +0000 (18:15 +0000)]
Merge "Workaround for Cortex A77 erratum 1800714" into integration

5 years agoWorkaround for Cortex A77 erratum 1800714
johpow01 [Wed, 3 Jun 2020 20:23:31 +0000 (15:23 -0500)]
Workaround for Cortex A77 erratum 1800714

Cortex A77 erratum 1800714 is a Cat B erratum, present in older
revisions of the Cortex A77 processor core.  The workaround is to
set a bit in the ECTLR_EL1 system register, which disables allocation
of splintered pages in the L2 TLB.

Since this is the first errata workaround implemented for Cortex A77,
this patch also adds the required cortex_a77_reset_func in the file
lib/cpus/aarch64/cortex_a77.S.

This errata is explained in this SDEN:
https://static.docs.arm.com/101992/0010/Arm_Cortex_A77_MP074_Software_Developer_Errata_Notice_v10.pdf

Signed-off-by: John Powell <john.powell@arm.com>
Change-Id: I844de34ee1bd0268f80794e2d9542de2f30fd3ad

5 years agodoc: Update memory layout for firmware configuration area
Manish V Badarkhe [Sat, 13 Jun 2020 08:42:28 +0000 (09:42 +0100)]
doc: Update memory layout for firmware configuration area

Captured the increase in firmware configuration area from
4KB to 8kB in memory layout document. Updated the documentation
to provide details about fw_config separately.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ifbec443ced479301be65827b49ff4fe447e9109f

5 years agoplat/arm: Increase size of firmware configuration area
Manish V Badarkhe [Tue, 9 Jun 2020 10:31:17 +0000 (11:31 +0100)]
plat/arm: Increase size of firmware configuration area

Increased the size of firmware configuration area to accommodate
all configs.

Updated maximum size of following bootloaders due to increase
in firmware configs size and addition of the code in the BL2.

1. Increased maximum size of BL2 for Juno platform in no
   optimisation case.
2. Reduced maximum size of BL31 for fvp and Juno platform.
3. Reduced maximum size of BL32 for Juno platform.

Change-Id: Ifba0564df0d1fe86175bed9fae87fdcf013b1831
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
5 years agoplat/arm: Load and populate fw_config and tb_fw_config
Manish V Badarkhe [Thu, 11 Jun 2020 21:32:11 +0000 (22:32 +0100)]
plat/arm: Load and populate fw_config and tb_fw_config

Modified the code to do below changes:

1. Load tb_fw_config along with fw_config by BL1.
2. Populate fw_config device tree information in the
   BL1 to load tb_fw_config.
3. In BL2, populate fw_config information to retrieve
   the address of tb_fw_config and then tb_fw_config
   gets populated using retrieved address.
4. Avoid processing of configuration file in case of error
   value returned from "fw_config_load" function.
5. Updated entrypoint information for BL2 image so
   that it's arg0 should point to fw_config address.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Change-Id: Ife6f7b673a074e7f544ee3d1bda7645fd5b2886c

5 years agoMerge "Fix usage of incorrect function name" into integration
Sandrine Bailleux [Thu, 25 Jun 2020 07:14:41 +0000 (07:14 +0000)]
Merge "Fix usage of incorrect function name" into integration

5 years agoplat/fvp: Dynamic description of clock freq
laurenw-arm [Wed, 10 Jun 2020 21:33:18 +0000 (16:33 -0500)]
plat/fvp: Dynamic description of clock freq

Query clock frequency in runtime using FCONF getter API

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: Ie6a8a62d8d190b9994feffb167a1d48829913e9b

5 years agofconf: Extract Timer clock freq from HW_CONFIG dtb
laurenw-arm [Thu, 6 Feb 2020 17:42:18 +0000 (11:42 -0600)]
fconf: Extract Timer clock freq from HW_CONFIG dtb

Extract Timer clock frequency from the timer node in
HW_CONFIG dtb. The first timer is a per-core architected timer attached
to a GIC to deliver its per-processor interrupts via PPIs.

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: I2f4b27c48e4c79208dab9f03c768d9221ba6ca86

5 years agoRedirect security incident report to TrustedFirmware.org
Sandrine Bailleux [Mon, 22 Jun 2020 10:11:47 +0000 (12:11 +0200)]
Redirect security incident report to TrustedFirmware.org

All projects under the TrustedFirmware.org project now use the same
security incident process, therefore update the disclosure/vulnerability
reporting information in the TF-A documentation.

------------------------------------------------------------------------
/!\ IMPORTANT /!\

Please note that the email address to send these reports to has changed.
Please do *not* use trusted-firmware-security@arm.com anymore.

Similarly, the PGP key provided to encrypt emails to the security email
alias has changed as well. Please do *not* use the former one provided
in the TF-A source tree. It is recommended to remove it from your
keyring to avoid any mistake. Please use the new key provided on
TrustedFirmware.org from now on.
------------------------------------------------------------------------

Change-Id: I14eb61017ab99182f1c45d1e156b96d5764934c1
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
5 years agofconf: Handle error from fconf_load_config
Manish V Badarkhe [Thu, 11 Jun 2020 21:25:53 +0000 (22:25 +0100)]
fconf: Handle error from fconf_load_config

Updated 'fconf_load_config' function to return
the error.
Error from 'fconf_load_config" gets handled
by BL1 in subsequent patches.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I4360f4df850e355b5762bb2d9666eb285101bc68

5 years agoplat/arm: Update the fw_config load call and populate it's information
Manish V Badarkhe [Thu, 11 Jun 2020 21:09:10 +0000 (22:09 +0100)]
plat/arm: Update the fw_config load call and populate it's information

Modified the code to do below changes:

1. Migrates the Arm platforms to the API changes introduced in the
   previous patches by fixing the fconf_load_config() call.
2. Retrieve dynamically the address of tb_fw_config using fconf
   getter api which is subsequently used to write mbedTLS heap
   address and BL2 hash data in the tb_fw_config DTB.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Change-Id: I3c9d9345dcbfb99127c61d5589b4aa1532fbf4be

5 years agofconf: Allow fconf to load additional firmware configuration
Manish V Badarkhe [Thu, 11 Jun 2020 21:17:30 +0000 (22:17 +0100)]
fconf: Allow fconf to load additional firmware configuration

Modified the `fconf_load_config` function so that it can
additionally support loading of tb_fw_config along with
fw_config.

Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: Ie060121d367ba12e3fcac5b8ff169d415a5c2bcd

5 years agofconf: Clean confused naming between TB_FW and FW_CONFIG
Manish V Badarkhe [Sun, 31 May 2020 09:17:59 +0000 (10:17 +0100)]
fconf: Clean confused naming between TB_FW and FW_CONFIG

Cleaned up confused naming between TB_FW and FW_CONFIG.

Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I9e9f6e6ca076d38fee0388f97d370431ae067f08

5 years agotbbr/dualroot: Add fw_config image in chain of trust
Louis Mayencourt [Thu, 11 Jun 2020 20:15:15 +0000 (21:15 +0100)]
tbbr/dualroot: Add fw_config image in chain of trust

fw_config image is authenticated using secure boot framework by
adding it into the single root and dual root chain of trust.

The COT for fw_config image looks as below:

+------------------+       +-------------------+
| ROTPK/ROTPK Hash |------>| Trusted Boot fw   |
+------------------+       | Certificate       |
                           | (Auth Image)      |
                          /+-------------------+
                         /                   |
                        /                    |
                       /                     |
                      /                      |
                     L                       v
+------------------+       +-------------------+
| fw_config hash   |------>| fw_config         |
|                  |       | (Data Image)      |
+------------------+       +-------------------+

Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I08fc8ee95c29a95bb140c807dd06e772474c7367