]> git.baikalelectronics.ru Git - arm-tf.git/log
arm-tf.git
3 years agoMerge "fix(ufs): removes dp and run-stop polling loops" into integration
Madhukar Pappireddy [Tue, 12 Jul 2022 13:03:44 +0000 (15:03 +0200)]
Merge "fix(ufs): removes dp and run-stop polling loops" into integration

3 years agofix(ufs): removes dp and run-stop polling loops
anans [Tue, 12 Jul 2022 08:48:29 +0000 (08:48 +0000)]
fix(ufs): removes dp and run-stop polling loops

These polling loops are not required according to the spec

Signed-off-by: anans <anans@google.com>
Change-Id: I50d832ba495f30cc7a0553c84e58b747d51e0a4e

3 years agoMerge changes Ie650728a,Ie2736ef4 into integration
Manish Pandey [Mon, 11 Jul 2022 11:08:18 +0000 (13:08 +0200)]
Merge changes Ie650728a,Ie2736ef4 into integration

* changes:
  refactor(stm32mp1-fdts): add missing spaces for consistent codestyle
  refactor(stm32mp1-fdts): drop unused DDR calibration result on DHCOM

3 years agoMerge "docs(prerequisites): fix "Build Host" title" into integration
Manish V Badarkhe [Mon, 11 Jul 2022 09:33:30 +0000 (11:33 +0200)]
Merge "docs(prerequisites): fix "Build Host" title" into integration

3 years agodocs(prerequisites): fix "Build Host" title
Sandrine Bailleux [Mon, 11 Jul 2022 08:53:42 +0000 (10:53 +0200)]
docs(prerequisites): fix "Build Host" title

Add an empty line just before the "Build Host" title.

Without this, the title is not properly recognized, it does not get
added to the table of contents and the underlining characters appear
as dashes, as can be seen here:

https://trustedfirmware-a.readthedocs.io/en/v2.7/getting_started/prerequisites.html#prerequisites

Change-Id: Ia89cf3de0588495cbe64b0247dc860619f5ea6a8
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
3 years agoMerge "fix(cpus): workaround for Neoverse-N2 erratum 2388450" into integration
Bipin Ravi [Fri, 8 Jul 2022 17:25:50 +0000 (19:25 +0200)]
Merge "fix(cpus): workaround for Neoverse-N2 erratum 2388450" into integration

3 years agoMerge "feat(cpus): add a64fx cpu to tf-a" into integration
Bipin Ravi [Fri, 8 Jul 2022 17:21:11 +0000 (19:21 +0200)]
Merge "feat(cpus): add a64fx cpu to tf-a" into integration

3 years agoMerge changes Iec22dcab,Ib88b4b5d,I50cd6b82,If1167785,I9b3a08ef, ... into integration
Madhukar Pappireddy [Fri, 8 Jul 2022 13:40:59 +0000 (15:40 +0200)]
Merge changes Iec22dcab,Ib88b4b5d,I50cd6b82,If1167785,I9b3a08ef, ... into integration

* changes:
  feat(imx8m): keep pu domains in default state during boot stage
  feat(imx8m): add the PU power domain support on imx8mm/mn
  feat(imx8m): add the anamix pll override setting
  feat(imx8m): add the ddr frequency change support for imx8m family
  feat(imx8mn): enable dram retention suuport on imx8mn
  feat(imx8mm): enable dram retention suuport on imx8mm
  feat(imx8m): add dram retention flow for imx8m family

3 years agorefactor(stm32mp1-fdts): add missing spaces for consistent codestyle
Johann Neuhauser [Fri, 8 Jul 2022 13:22:05 +0000 (15:22 +0200)]
refactor(stm32mp1-fdts): add missing spaces for consistent codestyle

Change-Id: Ie650728a0c671f553679b050afd969ce604ca111
Signed-off-by: Johann Neuhauser <jneuhauser@dh-electronics.com>
3 years agorefactor(stm32mp1-fdts): drop unused DDR calibration result on DHCOM
Johann Neuhauser [Fri, 8 Jul 2022 13:18:43 +0000 (15:18 +0200)]
refactor(stm32mp1-fdts): drop unused DDR calibration result on DHCOM

Change-Id: Ie2736ef4c463c51d109c13e59f541fe65039d7c6
Signed-off-by: Johann Neuhauser <jneuhauser@dh-electronics.com>
3 years agoMerge "feat(stm32mp15-fdts): add support for STM32MP157C based DHCOM SoM on PDK2...
Manish Pandey [Fri, 8 Jul 2022 12:48:18 +0000 (14:48 +0200)]
Merge "feat(stm32mp15-fdts): add support for STM32MP157C based DHCOM SoM on PDK2 board" into integration

3 years agofeat(stm32mp15-fdts): add support for STM32MP157C based DHCOM SoM on PDK2 board
Johann Neuhauser [Wed, 16 Feb 2022 16:12:34 +0000 (17:12 +0100)]
feat(stm32mp15-fdts): add support for STM32MP157C based DHCOM SoM on PDK2 board

This is an SoM in SODIMM-200 format on an evaluation board called
"DHCOM Premium Developer Kit #2" (DHCOM PDK2 for short). The SoM features an
STM32MP157C SoC with 1 GB DDR3, 8 GB eMMC, microSD and 2 MB SPI flash.
The baseboard has multiple UART, USB, SPI, and I2C ports/headers and several
other interfaces that are not important for TF-A.

These dts(i) files are based on DHCOM dt's from Linux 5.16 and U-Boot 2022.01.
The DRAM calibration values are taken from U-Boot 2022.01 and are optimized for
industrial temperature range above 85° C.

TF-A on this board was fully tested with the latest OP-TEE developer setup.

Change-Id: I696c01742954d761fbad312cd1059e3ab01fa93c
Signed-off-by: Johann Neuhauser <jneuhauser@dh-electronics.com>
3 years agoMerge "feat(libfdt): add function to set MAC addresses" into integration
Manish Pandey [Fri, 8 Jul 2022 11:29:58 +0000 (13:29 +0200)]
Merge "feat(libfdt): add function to set MAC addresses" into integration

3 years agoMerge "refactor(arm): add debug logs to show the reason behind skipping firmware...
Bipin Ravi [Thu, 7 Jul 2022 21:45:38 +0000 (23:45 +0200)]
Merge "refactor(arm): add debug logs to show the reason behind skipping firmware config loading" into integration

3 years agorefactor(arm): add debug logs to show the reason behind skipping firmware config...
Manish V Badarkhe [Mon, 20 Jun 2022 16:40:40 +0000 (17:40 +0100)]
refactor(arm): add debug logs to show the reason behind skipping firmware config loading

Added debug logs to show the reason behind skipping firmware
configuration loading, and also a few debug strings were corrected.
Additionally, a panic will be triggered if the configuration sanity
fails.

Change-Id: I6bbd67b72801e178a14cbe677a8831b25a907d0c
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
3 years agofix(cpus): workaround for Neoverse-N2 erratum 2388450
Daniel Boulby [Wed, 6 Jul 2022 13:33:13 +0000 (14:33 +0100)]
fix(cpus): workaround for Neoverse-N2 erratum 2388450

Neoverse-N2 erratum 2388450 is a cat B erratum that applies to
revision r0p0 and is fixed in r0p1. The workaround is to set
bit[40] of CPUACTLR2_EL1 to disable folding of demand requests into
older prefetches with L2 miss requests outstanding.

SDEN can be found here:
https://developer.arm.com/documentation/SDEN1982442/latest

Change-Id: I6dd949c79cea8dbad322e569aa5de86cf8cf9639
Signed-off-by: Daniel Boulby <daniel.boulby@arm.com>
3 years agoMerge "fix(morello): move BL31 to run from DRAM space" into integration
Manish V Badarkhe [Thu, 7 Jul 2022 13:28:13 +0000 (15:28 +0200)]
Merge "fix(morello): move BL31 to run from DRAM space" into integration

3 years agoMerge changes from topic "sgi-updates-jul-2022" into integration
Manish V Badarkhe [Thu, 7 Jul 2022 10:38:56 +0000 (12:38 +0200)]
Merge changes from topic "sgi-updates-jul-2022" into integration

* changes:
  feat(sgi): bump bl1 rw size
  refactor(sgi): rewrite address space size definitions

3 years agoMerge "feat(zynqmp): resolve the misra 10.1 warnings" into integration
Joanna Farley [Thu, 7 Jul 2022 10:22:19 +0000 (12:22 +0200)]
Merge "feat(zynqmp): resolve the misra 10.1 warnings" into integration

3 years agofeat(sgi): bump bl1 rw size
Vijayenthiran Subramaniam [Tue, 25 Jan 2022 17:29:10 +0000 (22:59 +0530)]
feat(sgi): bump bl1 rw size

Increase BL1 RW size by 16 KiB to accommodate for future development.

Signed-off-by: Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com>
Change-Id: I21626a97de4a6c98c25b93b9f79e16325c6e4349

3 years agorefactor(sgi): rewrite address space size definitions
Vijayenthiran Subramaniam [Tue, 25 Jan 2022 15:07:20 +0000 (20:37 +0530)]
refactor(sgi): rewrite address space size definitions

The value of the macro CSS_SGI_REMOTE_CHIP_MEM_OFFSET can be different
across all the Neoverse reference design platforms. This value depends
on the number of address bits used per chip. So let all platforms define
CSS_SGI_ADDR_BITS_PER_CHIP which specifies the number of address bits
used per chip.

In addition to this, reuse the definition of CSS_SGI_ADDR_BITS_PER_CHIP
for single chip platforms and CSS_SGI_REMOTE_CHIP_MEM_OFFSET for multi-
chip platforms to determine the maximum address space size. Also,
increase the RD-N2 multi-chip address space per chip from 4TB to 64TB.

Signed-off-by: Vijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com>
Change-Id: If5e69ec26c2389304c71911729d4addbdf8b2686

3 years agofix(morello): move BL31 to run from DRAM space
Manoj Kumar [Thu, 23 Jun 2022 11:30:37 +0000 (12:30 +0100)]
fix(morello): move BL31 to run from DRAM space

The EL3 runtime firmware has been running from internal trusted
SRAM space on the Morello platform. Due to unavailability of tag
support for the internal trusted SRAM this becomes a problem if
we enable capability pointers in BL31.

To support capability pointers in BL31 it has to be run from the
main DDR memory space. This patch updates the Morello platform
configuration such that BL31 is loaded and run from DDR space.

Signed-off-by: Manoj Kumar <manoj.kumar3@arm.com>
Change-Id: I16d4d757fb6f58c364f5133236d50fc06845e0b4

3 years agoMerge "fix(rme): xlat table setup fails for bl2" into integration
Manish Pandey [Thu, 7 Jul 2022 09:38:37 +0000 (11:38 +0200)]
Merge "fix(rme): xlat table setup fails for bl2" into integration

3 years agofix(rme): xlat table setup fails for bl2
Soby Mathew [Wed, 6 Jul 2022 15:01:40 +0000 (16:01 +0100)]
fix(rme): xlat table setup fails for bl2

The patch 8c980a4 created a 4KB shared region from the 32MB
Realm region for RMM-EL3 communication. But this meant that BL2
needs to map a region of 32MB - 4KB, which required more xlat
tables at runtime. This patch maps the entire 32MB region in BL2
which is more memory efficient in terms of xlat tables needed.

Signed-off-by: Soby Mathew <soby.mathew@arm.com>
Change-Id: I17aa27545293d7b5bbec1c9132ea2c22bf2e7e65

3 years agofeat(zynqmp): resolve the misra 10.1 warnings
Venkatesh Yadav Abbarapu [Mon, 4 Jul 2022 06:10:27 +0000 (11:40 +0530)]
feat(zynqmp): resolve the misra 10.1 warnings

MISRA Violation: MISRA-C:2012 R.10.1
1) The expression of non-boolean essential type is being interpreted as a
boolean value for the operator.
2) The operand to the operator does not have an essentially unsigned type.

Signed-off-by: Venkatesh Yadav Abbarapu <venkatesh.abbarapu@xilinx.com>
Change-Id: I97bbc056f4fee167742429e144144ba793bf77b3

3 years agofeat(cpus): add a64fx cpu to tf-a
Itaru Kitayama [Mon, 4 Jul 2022 05:36:00 +0000 (14:36 +0900)]
feat(cpus): add a64fx cpu to tf-a

while sbsa maintainers upstream decide whether new cpus types
should be in, add fujitsu a64fx cpu type in advance

Signed-off-by: Itaru Kitayama <itaru.kitayama@fujitsu.com>
Change-Id: I521a62f1233f3fe6e92f040edaff2cc60a1bd874

3 years agoMerge changes from topic "st_fix_stm32mp13" into integration
Manish Pandey [Wed, 6 Jul 2022 14:08:27 +0000 (16:08 +0200)]
Merge changes from topic "st_fix_stm32mp13" into integration

* changes:
  fix(stm32mp13): correct USART addresses
  feat(stm32mp13): change BL33 memory mapping

3 years agoMerge "docs(rmmd): add myself as RMMD and RME owner" into integration
Olivier Deprez [Wed, 6 Jul 2022 06:47:26 +0000 (08:47 +0200)]
Merge "docs(rmmd): add myself as RMMD and RME owner" into integration

3 years agodocs(rmmd): add myself as RMMD and RME owner
Javier Almansa Sobrino [Tue, 5 Jul 2022 14:32:01 +0000 (15:32 +0100)]
docs(rmmd): add myself as RMMD and RME owner

Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com>
Change-Id: I93f5e622e37f3156bd5326b7d3a3d0d7f73b2c2e

3 years agofix(stm32mp13): correct USART addresses
Yann Gautier [Tue, 5 Jul 2022 11:29:13 +0000 (13:29 +0200)]
fix(stm32mp13): correct USART addresses

On STM32MP13, USART1 and USART2 addresses are 0x4C000000 and 0x4C001000.
Whereas on STM32MP15, the addresses were 0x5C000000 and 0x4000E000.
Use dedicated flags to choose the correct address, that could be use
for early or crash console.

Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
Change-Id: I98bd97a0ac8b0408a50376801e2a1961b241a3d6

3 years agofeat(stm32mp13): change BL33 memory mapping
Patrick Delaunay [Tue, 13 Apr 2021 12:44:48 +0000 (14:44 +0200)]
feat(stm32mp13): change BL33 memory mapping

U-Boot is loaded at the beginning of the DDR:
STM32MP_DDR_BASE = 0xC0000000.

This patch remove the need to use the 0x100000 offset, reserved
on STM32MP15 for flashlayout.

Signed-off-by: Patrick Delaunay <patrick.delaunay@foss.st.com>
Change-Id: I8d0a93f4db411cf59838e635a315c729cccee269

3 years agoMerge "feat(sme): fall back to SVE if SME is not there" into integration
Manish Pandey [Tue, 5 Jul 2022 12:32:39 +0000 (14:32 +0200)]
Merge "feat(sme): fall back to SVE if SME is not there" into integration

3 years agoMerge changes from topic "jas/rmm-el3-ifc" into integration
Soby Mathew [Tue, 5 Jul 2022 10:03:49 +0000 (12:03 +0200)]
Merge changes from topic "jas/rmm-el3-ifc" into integration

* changes:
  docs(rmmd): document EL3-RMM Interfaces
  feat(rmmd): add support to create a boot manifest
  fix(rme): use RMM shared buffer for attest SMCs
  feat(rmmd): add support for RMM Boot interface

3 years agofeat(sme): fall back to SVE if SME is not there
Mark Brown [Mon, 9 May 2022 12:26:36 +0000 (13:26 +0100)]
feat(sme): fall back to SVE if SME is not there

Due to their interrelationship in the architecture the SVE and SME
features in TF-A are mutually exclusive. This means that a single binary
can't be shared between systems with and without SME if the system
without SME does support SVE, SVE will not be initialised so lower ELs
will run into trouble trying to use it. This unusual behaviour for TF-A
which normally gracefully handles situations where features are enabled
but not supported on the current hardware.

Address this by calling the SVE enable and disable functions if SME is
not supported rather than immediately exiting, these perform their own
feature checks so if neither SVE nor SME is supported behaviour is
unchanged.

Signed-off-by: Mark Brown <broonie@kernel.org>
Change-Id: I2c606202fa6c040069f44e29d36b5abb48391874

3 years agodocs(rmmd): document EL3-RMM Interfaces
Javier Almansa Sobrino [Thu, 7 Apr 2022 17:26:49 +0000 (18:26 +0100)]
docs(rmmd): document EL3-RMM Interfaces

This patch documents the RMM-EL3 Boot and runtime interfaces.

Note that for the runtime interfaces, some services are not
documented in this patch and will be added on a later doc patch.

These services are:

* RMMD_GTSI_DELEGATE
* RMMD_GTSI_UNDELEGATE
* RMMD_RMI_REQ_COMPLETE

Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com>
Change-Id: I8fcc89d91fe5a334c2f68c6bfd1fd672a8738b5c

3 years agoMerge "feat(spmd): avoid spoofing in FF-A direct request" into integration
Olivier Deprez [Tue, 5 Jul 2022 08:21:59 +0000 (10:21 +0200)]
Merge "feat(spmd): avoid spoofing in FF-A direct request" into integration

3 years agoMerge "feat(arm): forbid running RME-enlightened BL31 from DRAM" into integration
Sandrine Bailleux [Tue, 5 Jul 2022 08:21:36 +0000 (10:21 +0200)]
Merge "feat(arm): forbid running RME-enlightened BL31 from DRAM" into integration

3 years agofeat(rmmd): add support to create a boot manifest
Javier Almansa Sobrino [Mon, 25 Apr 2022 16:18:15 +0000 (17:18 +0100)]
feat(rmmd): add support to create a boot manifest

This patch also adds an initial RMM Boot Manifest (v0.1) for fvp
platform.

Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com>
Change-Id: I1374f8f9cb207028f1820953cd2a5cf6d6c3b948

3 years agofix(rme): use RMM shared buffer for attest SMCs
Javier Almansa Sobrino [Wed, 13 Apr 2022 16:57:35 +0000 (17:57 +0100)]
fix(rme): use RMM shared buffer for attest SMCs

Use the RMM shared buffer to attestation token and signing key SMCs.

Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com>
Change-Id: I313838b26d3d9334fb0fe8cd4b229a326440d2f4

3 years agofeat(rmmd): add support for RMM Boot interface
Javier Almansa Sobrino [Wed, 24 Nov 2021 18:37:37 +0000 (18:37 +0000)]
feat(rmmd): add support for RMM Boot interface

This patch adds the infrastructure needed to pass boot arguments from
EL3 to RMM and allocates a shared buffer between both worlds that can
be used, among others, to pass a boot manifest to RMM. The buffer is
composed a single memory page be used by a later EL3 <-> RMM interface
by all CPUs.

The RMM boot manifest is not implemented by this patch.

In addition to that, this patch also enables support for RMM when
RESET_TO_BL31 is enabled.

Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com>
Change-Id: I855cd4758ee3843eadd9fb482d70a6d18954d82a

3 years agofeat(arm): forbid running RME-enlightened BL31 from DRAM
Sandrine Bailleux [Mon, 4 Jul 2022 09:17:43 +0000 (11:17 +0200)]
feat(arm): forbid running RME-enlightened BL31 from DRAM

According to Arm CCA security model [1],

"Root world firmware, including Monitor, is the most trusted CCA
component on application PE. It enforces CCA security guarantees for
not just Realm world, but also for Secure world and for itself.

It is expected to be small enough to feasibly fit in on-chip memory,
and typically needs to be available early in the boot process when
only on-chip memory is available."

For these reasons, it is expected that "monitor code executes entirely
from on-chip memory."

This precludes usage of ARM_BL31_IN_DRAM for RME-enlightened firmware.

[1] Arm DEN0096 A.a, section 7.3 "Use of external memory by CCA".

Change-Id: I752eb45f1e6ffddc7a6f53aadcc92a3e71c1759f
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
3 years agofeat(spmd): avoid spoofing in FF-A direct request
Shruti [Thu, 9 Jun 2022 10:03:11 +0000 (11:03 +0100)]
feat(spmd): avoid spoofing in FF-A direct request

Validate that non-secure caller does not spoof
SPMD, SPMC or any secure endpoint ID
in FFA_MSG_SEND_DIRECT_REQ.

Change-Id: I7eadb8886142d94bef107cf485462dfcda828895
Signed-off-by: Shruti <shruti.gupta@arm.com>
3 years agoMerge changes from topics "binary-format-sp", "od/meas-boot-spmc" into integration
Sandrine Bailleux [Thu, 30 Jun 2022 14:47:49 +0000 (16:47 +0200)]
Merge changes from topics "binary-format-sp", "od/meas-boot-spmc" into integration

* changes:
  feat(spm): add tpm event log node to spmc manifest
  fix(measured-boot): add SP entries to event_log_metadata

3 years agoMerge "feat(stm32mp15): manage OP-TEE shared memory" into integration
Manish Pandey [Thu, 30 Jun 2022 14:29:22 +0000 (16:29 +0200)]
Merge "feat(stm32mp15): manage OP-TEE shared memory" into integration

3 years agofeat(stm32mp15): manage OP-TEE shared memory
Yann Gautier [Thu, 30 Jun 2022 09:33:27 +0000 (11:33 +0200)]
feat(stm32mp15): manage OP-TEE shared memory

On STM32MP15, there is currently an OP-TEE shared memory area at the end
of the DDR. But this area will in term be removed. To allow a smooth
transition, a new flag is added (STM32MP15_OPTEE_RSV_SHM). It reflects
the OP-TEE flag: CFG_CORE_RESERVED_SHM. The flag is enabled by default
(no behavior change). It will be set to 0 when OP-TEE is aligned, and
then later be removed.

Signed-off-by: Yann Gautier <yann.gautier@st.com>
Change-Id: I91146cd8a26a24be22143c212362294c1e880264

3 years agoMerge changes from topic "xlnx_zynqmp_misra_fix1" into integration
Joanna Farley [Wed, 29 Jun 2022 22:36:46 +0000 (00:36 +0200)]
Merge changes from topic "xlnx_zynqmp_misra_fix1" into integration

* changes:
  fix(zynqmp): resolve the misra 8.6 warnings
  fix(zynqmp): resolve the misra 4.6 warnings

3 years agoMerge "fix(sptool): fix concurrency issue for SP packages" into integration
Madhukar Pappireddy [Wed, 29 Jun 2022 13:27:32 +0000 (15:27 +0200)]
Merge "fix(sptool): fix concurrency issue for SP packages" into integration

3 years agofix(sptool): fix concurrency issue for SP packages
Daniel Boulby [Thu, 9 Jun 2022 11:04:30 +0000 (12:04 +0100)]
fix(sptool): fix concurrency issue for SP packages

Add dependency between rules to generate SP packages and their dtb files
to ensure the dtb files are built before the sptool attempts to generate
the SP package.

Change-Id: I071806f4aa09f39132e3e1990c91d71dc9acd728
Signed-off-by: Daniel Boulby <daniel.boulby@arm.com>
3 years agoMerge "docs: add Manish Badarkhe to maintainer list" into integration
Joanna Farley [Tue, 28 Jun 2022 11:23:18 +0000 (13:23 +0200)]
Merge "docs: add Manish Badarkhe to maintainer list" into integration

3 years agoMerge "feat(stm32mp1): save boot auth status and partition info" into integration
Manish Pandey [Tue, 28 Jun 2022 08:53:01 +0000 (10:53 +0200)]
Merge "feat(stm32mp1): save boot auth status and partition info" into integration

3 years agoMerge "fix(measured-boot): clear the entire digest array of Startup Locality event...
Sandrine Bailleux [Tue, 28 Jun 2022 07:33:44 +0000 (09:33 +0200)]
Merge "fix(measured-boot): clear the entire digest array of Startup Locality event" into integration

3 years agoMerge changes from topic "HEAD" into integration
Madhukar Pappireddy [Tue, 28 Jun 2022 01:43:48 +0000 (03:43 +0200)]
Merge changes from topic "HEAD" into integration

* changes:
  feat(synquacer): add FWU Multi Bank Update support
  feat(synquacer): add TBBR support
  feat(synquacer): add BL2 support
  refactor(synquacer): move common source files

3 years agofeat(synquacer): add FWU Multi Bank Update support
Jassi Brar [Mon, 23 May 2022 18:16:01 +0000 (13:16 -0500)]
feat(synquacer): add FWU Multi Bank Update support

Add FWU Multi Bank Update support. This reads the platform metadata
and update the FIP base address so that BL2 can load correct BL3X
based on the boot index.

Cc: Sumit Garg <sumit.garg@linaro.org>
Cc: Masahisa Kojima <masahisa.kojima@linaro.org>
Cc: Manish V Badarkhe <manish.badarkhe@arm.com>
Cc: Leonardo Sandoval <leonardo.sandoval@linaro.org>
Change-Id: I5d96972bc4b3b9a12a8157117e53a05da5ce89f6
Signed-off-by: Masami Hiramatsu <masami.hiramatsu@linaro.org>
Signed-off-by: Jassi Brar <jaswinder.singh@linaro.org>
3 years agofeat(synquacer): add TBBR support
Jassi Brar [Thu, 3 Mar 2022 21:24:31 +0000 (15:24 -0600)]
feat(synquacer): add TBBR support

enable Trusted-Boot for Synquacer platform.

Cc: Sumit Garg <sumit.garg@linaro.org>
Cc: Masahisa Kojima <masahisa.kojima@linaro.org>
Cc: Manish V Badarkhe <manish.badarkhe@arm.com>
Cc: Leonardo Sandoval <leonardo.sandoval@linaro.org>
Change-Id: I2608b4d573d95d55da1fc5544333e0dbf3f763f2
Signed-off-by: Jassi Brar <jaswinder.singh@linaro.org>
3 years agofeat(synquacer): add BL2 support
Jassi Brar [Thu, 3 Mar 2022 21:24:31 +0000 (15:24 -0600)]
feat(synquacer): add BL2 support

Add BL2 support by default. Move the legacy mode behind the
RESET_TO_BL31 define.

Cc: Sumit Garg <sumit.garg@linaro.org>
Cc: Masahisa Kojima <masahisa.kojima@linaro.org>
Cc: Manish V Badarkhe <manish.badarkhe@arm.com>
Cc: Leonardo Sandoval <leonardo.sandoval@linaro.org>
Change-Id: Ic490745a7e8f6114172733428ebd6bd6adfcc1ec
Signed-off-by: Jassi Brar <jaswinder.singh@linaro.org>
3 years agorefactor(synquacer): move common source files
Jassi Brar [Thu, 3 Mar 2022 21:24:31 +0000 (15:24 -0600)]
refactor(synquacer): move common source files

Prepare for introduction of BL2 support by moving
reusable files from BL31_SOURCES into PLAT_BL_COMMON_SOURCES

Cc: Sumit Garg <sumit.garg@linaro.org>
Cc: Masahisa Kojima <masahisa.kojima@linaro.org>
Cc: Manish V Badarkhe <manish.badarkhe@arm.com>
Cc: Leonardo Sandoval <leonardo.sandoval@linaro.org>
Change-Id: I21137cdd40d027cfa77f1dec3598ee85d4873581
Signed-off-by: Jassi Brar <jaswinder.singh@linaro.org>
3 years agodocs: add Manish Badarkhe to maintainer list
Manish Pandey [Mon, 27 Jun 2022 17:05:48 +0000 (18:05 +0100)]
docs: add Manish Badarkhe to maintainer list

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: I8fd116962bb9775e2f96faee37bbf73073e15512

3 years agoMerge "feat(auth): enable MBEDTLS_CHECK_RETURN_WARNING" into integration
Madhukar Pappireddy [Mon, 27 Jun 2022 16:01:12 +0000 (18:01 +0200)]
Merge "feat(auth): enable MBEDTLS_CHECK_RETURN_WARNING" into integration

3 years agoMerge changes from topic "st_optee_paged" into integration
Manish Pandey [Mon, 27 Jun 2022 16:00:50 +0000 (18:00 +0200)]
Merge changes from topic "st_optee_paged" into integration

* changes:
  feat(stm32mp1): optionally use paged OP-TEE
  feat(optee): check paged_image_info

3 years agofeat(stm32mp1): save boot auth status and partition info
Igor Opaniuk [Thu, 23 Jun 2022 18:19:26 +0000 (21:19 +0300)]
feat(stm32mp1): save boot auth status and partition info

Introduce a functionality for saving/restoring boot auth status
and partition used for booting (FSBL partition on which the boot
was successful).

Signed-off-by: Igor Opaniuk <igor.opaniuk@foundries.io>
Change-Id: I4d7f153b70dfc49dad8c1c3fa71111a350caf1ee

3 years agoMerge changes from topic "mb_hash" into integration
Lauren Wehrmeister [Mon, 27 Jun 2022 15:32:59 +0000 (17:32 +0200)]
Merge changes from topic "mb_hash" into integration

* changes:
  refactor(imx): update config of mbedtls support
  refactor(qemu): update configuring mbedtls support
  refactor(measured-boot): mb algorithm selection

3 years agoMerge "fix(nxp-ddr): fix firmware buffer re-mapping issue" into integration
Madhukar Pappireddy [Mon, 27 Jun 2022 13:46:58 +0000 (15:46 +0200)]
Merge "fix(nxp-ddr): fix firmware buffer re-mapping issue" into integration

3 years agofeat(auth): enable MBEDTLS_CHECK_RETURN_WARNING
Sandrine Bailleux [Wed, 15 Jun 2022 13:31:52 +0000 (15:31 +0200)]
feat(auth): enable MBEDTLS_CHECK_RETURN_WARNING

Define the MBEDTLS_CHECK_RETURN_WARNING macro in mbedTLS configuration
file to get compile-time warnings for mbedTLS functions we call and do
not check the return value of. Right now, this does not flag anything
but it could help catching bugs in the future.

This was a new feature introduced in mbed TLS 2.28.0 release.

Change-Id: If26f3c83b6ccc8bc60e75c3e582ab20817d047aa
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
3 years agoMerge "fix(measured-boot): fix verbosity level of RSS digests traces" into integration
Sandrine Bailleux [Mon, 27 Jun 2022 07:37:39 +0000 (09:37 +0200)]
Merge "fix(measured-boot): fix verbosity level of RSS digests traces" into integration

3 years agofeat(imx8m): keep pu domains in default state during boot stage
Jacky Bai [Fri, 17 Jan 2020 01:51:27 +0000 (09:51 +0800)]
feat(imx8m): keep pu domains in default state during boot stage

No need to keep all PU domains on as the full power domain driver
support has been added.

Signed-off-by: Jacky Bai <ping.bai@nxp.com>
Change-Id: Iec22dcabbbfe3f38b915104a437d396d7b1bb2d8

3 years agofeat(imx8m): add the PU power domain support on imx8mm/mn
Jacky Bai [Wed, 11 Dec 2019 08:26:59 +0000 (16:26 +0800)]
feat(imx8m): add the PU power domain support on imx8mm/mn

Add the PU power domain support for imx8mm/mn.

Signed-off-by: Jacky Bai <ping.bai@nxp.com>
Change-Id: Ib88b4b5db956fdf2c77d2f2f3723d61a7060409d

3 years agofeat(imx8m): add the anamix pll override setting
Jacky Bai [Mon, 9 Dec 2019 05:27:39 +0000 (13:27 +0800)]
feat(imx8m): add the anamix pll override setting

Add PLL power down override & bypass support when
system enter DSM mode.

Signed-off-by: Jacky Bai <ping.bai@nxp.com>
Change-Id: I50cd6b82151961ab849f58714a8c307d3f7f4166

3 years agofeat(imx8m): add the ddr frequency change support for imx8m family
Jacky Bai [Mon, 25 Nov 2019 05:19:37 +0000 (13:19 +0800)]
feat(imx8m): add the ddr frequency change support for imx8m family

Add the DDR frequency change support.

Signed-off-by: Jacky Bai <ping.bai@nxp.com>
Change-Id: If1167785796b8678c351569b83d2922c66f6e530

3 years agofeat(imx8mn): enable dram retention suuport on imx8mn
Jacky Bai [Tue, 3 Dec 2019 02:38:11 +0000 (10:38 +0800)]
feat(imx8mn): enable dram retention suuport on imx8mn

Enable dram retention support on i.MX8MN.

Signed-off-by: Jacky Bai <ping.bai@nxp.com>
Change-Id: I9b3a08efbbd154b2fc7e41bedb36a4d4e3784448

3 years agofeat(imx8mm): enable dram retention suuport on imx8mm
Jacky Bai [Mon, 25 Nov 2019 06:45:32 +0000 (14:45 +0800)]
feat(imx8mm): enable dram retention suuport on imx8mm

Enable dram retention support on i.MX8MM.

Change-Id: I76ada615d386602e551d572ff4e60ee19bb8e418
Signed-off-by: Jacky Bai <ping.bai@nxp.com>
3 years agofeat(imx8m): add dram retention flow for imx8m family
Jacky Bai [Mon, 25 Nov 2019 06:43:26 +0000 (14:43 +0800)]
feat(imx8m): add dram retention flow for imx8m family

Add the dram retention flow for i.MX8M SoC family.

Change-Id: Ifb8ba5b2f6f002133cf47c07fef73df29c51c890
Signed-off-by: Jacky Bai <ping.bai@nxp.com>
3 years agoMerge "fix(zynqmp): move bl31 with DEBUG=1 back to OCM" into integration
Manish Pandey [Fri, 24 Jun 2022 11:43:41 +0000 (13:43 +0200)]
Merge "fix(zynqmp): move bl31 with DEBUG=1 back to OCM" into integration

3 years agoMerge changes from topic "xlnx_versal_misra_fix" into integration
Manish Pandey [Fri, 24 Jun 2022 11:40:01 +0000 (13:40 +0200)]
Merge changes from topic "xlnx_versal_misra_fix" into integration

* changes:
  fix(versal): resolve misra 15.6 warnings
  fix(zynqmp): resolve misra 8.13 warnings
  fix(versal): resolve misra 8.13 warnings
  fix(versal): resolve the misra 4.6 warnings

3 years agoMerge changes from topic "lw/cca_cot" into integration
Manish Pandey [Fri, 24 Jun 2022 10:44:06 +0000 (12:44 +0200)]
Merge changes from topic "lw/cca_cot" into integration

* changes:
  feat(arm): retrieve the right ROTPK for cca
  feat(arm): add support for cca CoT
  feat(arm): provide some swd rotpk files
  build(tbbr): drive cert_create changes for cca CoT
  refactor(arm): add cca CoT certificates to fconf
  feat(fiptool): add cca, core_swd, plat cert in FIP
  feat(cert_create): define the cca chain of trust
  feat(cca): introduce new "cca" chain of trust
  build(changelog): add new scope for CCA
  refactor(fvp): increase bl2 size when bl31 in DRAM

3 years agoMerge changes from topic "ns/cpu_info" into integration
Madhukar Pappireddy [Wed, 22 Jun 2022 15:45:45 +0000 (17:45 +0200)]
Merge changes from topic "ns/cpu_info" into integration

* changes:
  feat(plat/arm/sgi): increase memory reserved for bl31 image
  feat(plat/arm/sgi): read isolated cpu mpid list from sds

3 years agoMerge "feat(board/rdn2): add a new 'isolated-cpu-list' property" into integration
Madhukar Pappireddy [Wed, 22 Jun 2022 15:45:40 +0000 (17:45 +0200)]
Merge "feat(board/rdn2): add a new 'isolated-cpu-list' property" into integration

3 years agofeat(stm32mp1): optionally use paged OP-TEE
Yann Gautier [Mon, 20 Jun 2022 09:43:17 +0000 (11:43 +0200)]
feat(stm32mp1): optionally use paged OP-TEE

STM32MP13 can encrypt the DDR. OP-TEE is then fully in DDR, and there
is no need for paged image on STM32MP13. The management of the paged
OP-TEE is made conditional, and will be kept only for STM32MP15.

Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
Change-Id: I85ac7aaf6a172c4ee529736113ed40fe66835fd7

3 years agofeat(optee): check paged_image_info
Yann Gautier [Mon, 20 Jun 2022 09:24:22 +0000 (11:24 +0200)]
feat(optee): check paged_image_info

For OP-TEE without pager, the paged image may not be present in OP-TEE
header. We could then pass NULL for paged_image_info to the function
parse_optee_header(). It avoids creating a useless struct for that
non existing image. But we should then avoid assigning header_ep args
that depend on paged_image_info.

Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
Change-Id: I4fdb45a91ac1ba6f912d6130813f5215c7e28c8b

3 years agoMerge changes from topic "st_clk_fixes" into integration
Madhukar Pappireddy [Tue, 21 Jun 2022 15:19:58 +0000 (17:19 +0200)]
Merge changes from topic "st_clk_fixes" into integration

* changes:
  fix(st-clock): correct MISRA C2012 15.6
  fix(st-clock): correctly check ready bit

3 years agofix(st-clock): correct MISRA C2012 15.6
Yann Gautier [Tue, 21 Jun 2022 12:34:13 +0000 (14:34 +0200)]
fix(st-clock): correct MISRA C2012 15.6

Add braces to correct MISRA C2012 15.6 warning:
The body of an iteration-statement or a selection-statement shall be a
compound-statement.

Signed-off-by: Yann Gautier <yann.gautier@st.com>
Change-Id: If26f3732d31df11bf389a16298ec9e9d8a4a2279

3 years agofix(st-clock): correctly check ready bit
Yann Gautier [Tue, 21 Jun 2022 13:12:27 +0000 (15:12 +0200)]
fix(st-clock): correctly check ready bit

The function clk_oscillator_wait_ready() was wrongly checking the set
bit and not the ready bit. Correct that by using osc_data->gate_rdy_id
when calling _clk_stm32_gate_wait_ready().

Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
Change-Id: Ida58f14d7f0f326b580ae24b98d6b9f592d2d711

3 years agofeat(plat/arm/sgi): increase memory reserved for bl31 image
Nishant Sharma [Thu, 31 Mar 2022 16:16:21 +0000 (17:16 +0100)]
feat(plat/arm/sgi): increase memory reserved for bl31 image

Increase the size of bl31 image by 52K to accomodate increased size of
xlat table.

Signed-off-by: Nishant Sharma <nishant.sharma@arm.com>
Change-Id: Ic3a8d8be1104adf48d22aa829e2197f710b6b666

3 years agofeat(plat/arm/sgi): read isolated cpu mpid list from sds
Nishant Sharma [Tue, 30 Nov 2021 09:31:48 +0000 (09:31 +0000)]
feat(plat/arm/sgi): read isolated cpu mpid list from sds

Add support to read the list of isolated CPUs from SDS and publish this
list via the non-trusted firmware configuration file for the next stages
of boot software to use.

Isolated CPUs are those that are not to be used on the platform for
various reasons. The isolated CPU list is an array of MPID values of the
CPUs that have to be isolated.

Signed-off-by: Nishant Sharma <nishant.sharma@arm.com>
Change-Id: I4313cf025f4c9e9feffebca2d35b259f5bafce69

3 years agoMerge changes from topic "mb/gic600-errata" into integration
Manish Pandey [Tue, 21 Jun 2022 12:11:47 +0000 (14:11 +0200)]
Merge changes from topic "mb/gic600-errata" into integration

* changes:
  refactor(arm): update BL2 base address
  refactor(nxp): use DPG0 mask from Arm GICv3 header
  fix(gic600): implement workaround to forward highest priority interrupt

3 years agofeat(board/rdn2): add a new 'isolated-cpu-list' property
Nishant Sharma [Tue, 30 Nov 2021 09:38:46 +0000 (09:38 +0000)]
feat(board/rdn2): add a new 'isolated-cpu-list' property

Add a new property named 'isolated-cpu-list' to list the CPUs that are
to be isolated and not used by the platform. The data represented by
this property is formatted as below.

  strutct isolated_cpu_mpid_list {
          uint64_t count;
          uint64_t mpid_list[MAX Number of PE];
  }

Also, the property is pre-initialized to 0 to reserve space for the
property in the dtb. The data for this property is read from SDS and
updated during boot. The number of entries in this list is equal to the
maximum number of PEs present on the platform.

Signed-off-by: Nishant Sharma <nishant.sharma@arm.com>
Change-Id: I4119f899a273ccbf8259e0d711d3a25501c7ec64

3 years agoMerge changes from topic "uart_segregation_v2" into integration
Manish Pandey [Tue, 21 Jun 2022 10:42:08 +0000 (12:42 +0200)]
Merge changes from topic "uart_segregation_v2" into integration

* changes:
  feat(sgi): add page table translation entry for secure uart
  feat(sgi): route TF-A logs via secure uart
  feat(sgi): deviate from arm css common uart related definitions

3 years agofix(nxp-ddr): fix firmware buffer re-mapping issue
Jiafei Pan [Fri, 8 Apr 2022 03:10:40 +0000 (11:10 +0800)]
fix(nxp-ddr): fix firmware buffer re-mapping issue

Firmware buffer has already been mapped when loading 1D firmware,
so the same buffer address will be re-mapped when loading 2D
firmware. Move the buffer mapping to be out of load_fw().

Signed-off-by: Jiafei Pan <Jiafei.Pan@nxp.com>
Change-Id: Idb29d504bc482a1e7ca58bc51bec09ffe6068324

3 years agofeat(spm): add tpm event log node to spmc manifest
Olivier Deprez [Wed, 15 Jun 2022 09:18:48 +0000 (11:18 +0200)]
feat(spm): add tpm event log node to spmc manifest

Add the TPM event log node to the SPMC manifest such that the TF-A
measured boot infrastructure fills the properties with event log address
for components measured by BL2 at boot time.
For a SPMC there is a particular interest with SP measurements.
In the particular case of Hafnium SPMC, the tpm event log node is not
yet consumed, but the intent is later to pass this information to an
attestation SP.

Signed-off-by: Olivier Deprez <olivier.deprez@arm.com>
Change-Id: Ic30b553d979532c5dad9ed6d419367595be5485e

3 years agofeat(sgi): add page table translation entry for secure uart
Rohit Mathew [Mon, 13 Dec 2021 15:33:04 +0000 (15:33 +0000)]
feat(sgi): add page table translation entry for secure uart

Add page table translation entry for secure uart so that logs from
secure partition can be routed via the same.

Signed-off-by: Rohit Mathew <rohit.mathew@arm.com>
Change-Id: I3416d114bcee13824a7d0861ee54fb799e154897

3 years agofeat(sgi): route TF-A logs via secure uart
Rohit Mathew [Mon, 13 Dec 2021 15:40:25 +0000 (15:40 +0000)]
feat(sgi): route TF-A logs via secure uart

Route the boot, runtime and crash stage logs via secure UART port
instead of the existing use of non-secure UART. This aligns with the
security state the PE is in when logs are put out. In addition to this,
this allows consolidation of the UART related macros across all the
variants of the Neoverse reference design platforms.

Signed-off-by: Rohit Mathew <rohit.mathew@arm.com>
Change-Id: I417f5d16457b602c94da4c74b4d88bba03da7462

3 years agofeat(sgi): deviate from arm css common uart related definitions
Rohit Mathew [Mon, 13 Dec 2021 13:50:15 +0000 (13:50 +0000)]
feat(sgi): deviate from arm css common uart related definitions

The Neoverse reference design platforms will migrate to use different
set of secure and non-secure UART ports. This implies that the board
specific macros defined in the common Arm platform code will no longer
be usable for Neoverse reference design platforms.

In preparation for migrating to a different set of UART ports, add a
Neoverse reference design platform specific copy of the board
definitions. The value of these definitions will be changed in
subsequent patches.

Signed-off-by: Rohit Mathew <rohit.mathew@arm.com>
Change-Id: I1ab17a3f02c8180b63be24e9266f7129beee819f

3 years agofix(measured-boot): clear the entire digest array of Startup Locality event
Manish V Badarkhe [Thu, 9 Jun 2022 21:39:32 +0000 (22:39 +0100)]
fix(measured-boot): clear the entire digest array of Startup Locality event

According to TCG PC Client Platform Firmware Profile Specification
(Section 10.2.2, TCG_PCR_EVENT2 Structure, and 10.4.5 EV_NO_ACTION Event
Types), all EV_NO_ACTION events shall set TCG_PCR_EVENT2.digests to all
0x00's for each allocated Hash algorithm.

Right now, this is not enforced. Only part of the buffer is zeroed due
to the wrong macro being used for the size of the buffer in the clearing
operation (TPM_ALG_ID instead of TCG_DIGEST_SIZE). This could confuse
a TPM event log parser.

Also, add an assertion to ensure that the Event Log size is large enough
before writing the Event Log header.

Change-Id: I6d4bc3fb28fd10c227e33c8c7bb4a40b08c3fd5e
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
3 years agoMerge "docs(security): update security advisory for CVE-2022-23960" into integration
Manish Pandey [Fri, 17 Jun 2022 09:10:35 +0000 (11:10 +0200)]
Merge "docs(security): update security advisory for CVE-2022-23960" into integration

3 years agodocs(security): update security advisory for CVE-2022-23960
Bipin Ravi [Thu, 16 Jun 2022 21:32:22 +0000 (16:32 -0500)]
docs(security): update security advisory for CVE-2022-23960

Update advisory document following Spectre-BHB mitigation support for
additional CPUs.

Signed-off-by: Bipin Ravi <bipin.ravi@arm.com>
Change-Id: I4492397f18882f514beff4da06afe973acecf1f0

3 years agoMerge "fix(errata): workaround for Neoverse-V1 erratum 2372203" into integration
Madhukar Pappireddy [Thu, 16 Jun 2022 21:30:22 +0000 (23:30 +0200)]
Merge "fix(errata): workaround for Neoverse-V1 erratum 2372203" into integration

3 years agoMerge "fix(errata): workaround for Cortex-A77 erratum 2356587" into integration
Madhukar Pappireddy [Thu, 16 Jun 2022 20:06:40 +0000 (22:06 +0200)]
Merge "fix(errata): workaround for Cortex-A77 erratum 2356587" into integration

3 years agorefactor(imx): update config of mbedtls support
laurenw-arm [Thu, 16 Jun 2022 18:40:48 +0000 (13:40 -0500)]
refactor(imx): update config of mbedtls support

Pull in MbedTLS support for sha512 when greater than sha256 is required
based on refactoring for hash algorithm selection for Measured Boot.

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: I489392133435436a16edced1d810bc5204ba608f

3 years agorefactor(qemu): update configuring mbedtls support
laurenw-arm [Thu, 16 Jun 2022 18:36:52 +0000 (13:36 -0500)]
refactor(qemu): update configuring mbedtls support

Pull in MbedTLS support for sha512 when greater than sha256 is required
based on refactoring for hash algorithm selection for Measured Boot.

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: Ib0ca5ecdee7906b41a0e1060339d43ce7a018d31

3 years agorefactor(measured-boot): mb algorithm selection
laurenw-arm [Tue, 31 May 2022 21:39:09 +0000 (16:39 -0500)]
refactor(measured-boot): mb algorithm selection

With RSS now introduced, we have 2 Measured Boot backends. Both backends
can be used in the same firmware build with potentially different hash
algorithms, so now there can be more than one hash algorithm in a build.
Therefore the logic for selecting the measured boot hash algorithm needs
to be updated and the coordination of algorithm selection added. This is
done by:

- Adding MBOOT_EL_HASH_ALG for Event Log to define the hash algorithm
to replace TPM_HASH_ALG, removing reference to TPM.

- Adding MBOOT_RSS_HASH_ALG for RSS to define the hash algorithm to
replace TPM_HASH_ALG.

- Coordinating MBOOT_EL_HASH_ALG and MBOOT_RSS_HASH_ALG to define the
Measured Boot configuration macros through defining
TF_MBEDTLS_MBOOT_USE_SHA512 to pull in SHA-512 support if either
backend requires a stronger algorithm than SHA-256.

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: I4ddf06ebdc3835beb4d1b6c7bab5a257ffc5c71a

3 years agofix(errata): workaround for Cortex-A77 erratum 2356587
Bipin Ravi [Wed, 8 Jun 2022 20:27:00 +0000 (15:27 -0500)]
fix(errata): workaround for Cortex-A77 erratum 2356587

Cortex-A77 erratum 2356587 is a cat B erratum that applies to revisions
r0p0 - r1p1 and is still open. The workaround is to set bit[0] of
CPUACTLR2_EL1 to force PLDW/PFRM ST to behave like PLD/PRFM LD and not
cause invalidations to other PE caches.

SDEN can be found here:
https://developer.arm.com/documentation/SDEN1152370/latest

Signed-off-by: Bipin Ravi <bipin.ravi@arm.com>
Change-Id: I243cfd587bca06ffd2a7be5bce28f8d2c5e68230