]> git.baikalelectronics.ru Git - arm-tf.git/log
arm-tf.git
21 months agoMerge changes from topic "bk/python_dependencies" into integration
Manish V Badarkhe [Tue, 14 Feb 2023 15:14:06 +0000 (16:14 +0100)]
Merge changes from topic "bk/python_dependencies" into integration

* changes:
  build(docs): update Python dependencies
  fix(docs): make required compiler version == rather than >=
  fix(deps): add missing aeabi_memset.S

21 months agoMerge "docs: fix broken Juno links" into integration
Manish V Badarkhe [Tue, 14 Feb 2023 11:45:35 +0000 (12:45 +0100)]
Merge "docs: fix broken Juno links" into integration

21 months agodocs: fix broken Juno links
Harrison Mutai [Mon, 13 Feb 2023 18:30:04 +0000 (18:30 +0000)]
docs: fix broken Juno links

Certain links to Juno documentation point to a location that were
removed at some point, or are unused. Fix links to point to the latest
available version on Arm's public documentation site, and remove those
that are no longer being used.

Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
Change-Id: I59202767db8834e9c302b2826f3faee47d3a5edd

21 months agoMerge "fix(zynqmp): enable A53 workaround(errata 1530924)" into integration
Joanna Farley [Tue, 14 Feb 2023 09:17:43 +0000 (10:17 +0100)]
Merge "fix(zynqmp): enable A53 workaround(errata 1530924)" into integration

21 months agoMerge "feat(zynqmp): add SMCCC_ARCH_SOC_ID support" into integration
Joanna Farley [Tue, 14 Feb 2023 09:16:59 +0000 (10:16 +0100)]
Merge "feat(zynqmp): add SMCCC_ARCH_SOC_ID support" into integration

21 months agobuild(docs): update Python dependencies
Boyan Karatotev [Mon, 9 Jan 2023 11:50:24 +0000 (11:50 +0000)]
build(docs): update Python dependencies

Update the python dependencies for building the project's Sphinx
documentation. Sphinx plugins are updated to the latest version, while
Sphinx itself is only updated to 5.3.0 (latest 5.x.x revision) due to
sphinx-rtd-theme not supporting any higher (both require incompatible
versions of docutils). Myst-parser is also updated to the latest version
to prevent a docutils clash as well.

The effect of this is to bump certifi to version 2022.12.7 and wheel to
0.38.4 as suggested by dependabot.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: I0ced5b127494255ce01aa7f51665bfcba161d135

21 months agofix(docs): make required compiler version == rather than >=
Boyan Karatotev [Thu, 9 Feb 2023 15:59:39 +0000 (15:59 +0000)]
fix(docs): make required compiler version == rather than >=

TF-A carries its own compiler-rt so higher versions of the compilers may
not necessarily work. Because TF-A is only tested on the specified
versions in the CI, any breakage remains unknown. Update the
prerequisites guide to make it more apparent that this is the case.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: Ia5da9c5ff505ead99f579f3f5fbe3a480d697c1d

21 months agofix(deps): add missing aeabi_memset.S
Boyan Karatotev [Thu, 9 Feb 2023 15:55:34 +0000 (15:55 +0000)]
fix(deps): add missing aeabi_memset.S

This file provides __aeabi_memclr8 builtin which the Ubuntu 22.04
version of clang 14 needs to compile. Add it to prevent this oddity from
failing the build.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: Id67aa0abba4a27c51b3ed6bb1be84b4e803b44bf

21 months agoMerge changes from topic "mixed-rwx" into integration
Manish V Badarkhe [Mon, 13 Feb 2023 14:36:28 +0000 (15:36 +0100)]
Merge changes from topic "mixed-rwx" into integration

* changes:
  build: permit multiple linker scripts
  build: clarify linker script generation
  style: normalize linker script code style
  fix(pie): pass `-fpie` to the preprocessor as well

21 months agoMerge "docs: add Runtime Security Subsystem (RSS) documentation" into integration
Sandrine Bailleux [Mon, 13 Feb 2023 14:20:16 +0000 (15:20 +0100)]
Merge "docs: add Runtime Security Subsystem (RSS) documentation" into integration

21 months agodocs: add Runtime Security Subsystem (RSS) documentation
Tamas Ban [Thu, 13 Oct 2022 14:42:48 +0000 (16:42 +0200)]
docs: add Runtime Security Subsystem (RSS) documentation

Describe:
  - RSS-AP communication
  - RSS runtime services
  - Measured boot
  - Delegated Attestation

Signed-off-by: Tamas Ban <tamas.ban@arm.com>
Change-Id: Iaef93361a09355a1edaabcc0c59126e006ad251a

21 months agobuild: permit multiple linker scripts
Chris Kay [Mon, 16 Jan 2023 18:57:26 +0000 (18:57 +0000)]
build: permit multiple linker scripts

This change allows platforms to provide more than one linker script to
any image utilizing the `MAKE_BL` build system macro.

This is already done by some MediaTek platforms via the
`EXTRA_LINKERFILE` build system variable, which has now been removed.

In its place, additional linker scripts may be added to the
`<IMAGE>_LINKER_SCRIPT_SOURCES` variable.

BREAKING-CHANGE: The `EXTRA_LINKERFILE` build system variable has been
 replaced with the `<IMAGE>_LINKER_SCRIPT_SOURCES` variable. See the
 commit message for more information.

Change-Id: I3f0b69200d6a4841fd158cd09344ce9e67047271
Signed-off-by: Chris Kay <chris.kay@arm.com>
21 months agobuild: clarify linker script generation
Chris Kay [Mon, 16 Jan 2023 16:53:45 +0000 (16:53 +0000)]
build: clarify linker script generation

The following build system variables have been renamed:

- `LINKERFILE` -> `DEFAULT_LINKER_SCRIPT`
- `BL_LINKERFILE` -> `DEFAULT_LINKER_SCRIPT_SOURCE`
- `<IMAGE>_LINKERFILE` -> `<IMAGE>_DEFAULT_LINKER_SCRIPT_SOURCE`

These new names better reflect how each variable is used:

1. the default linker script is passed via `-dT` instead of `-T`
2. linker script source files are first preprocessed

Additionally, linker scripts are now placed in the build directory
relative to where they exist in the source directory. For example,
the `bl32/sp_min/sp_min.ld.S` would now preprocess to
`sp_min/sp_min.ld` instead of just `bl32.ld`

BREAKING-CHANGE: The `LINKERFILE`, `BL_LINKERFILE` and
 `<IMAGE_LINKERFILE>` build system variables have been renamed. See the
 commit message for more information.

Change-Id: If8cef65dcb8820e8993736702c8741e97a66e6cc
Signed-off-by: Chris Kay <chris.kay@arm.com>
21 months agostyle: normalize linker script code style
Chris Kay [Thu, 29 Sep 2022 13:36:53 +0000 (14:36 +0100)]
style: normalize linker script code style

There are a variety of code styles used by the various linker scripts
around the code-base. This change brings them in line with one another
and attempts to make the scripts more friendly for skim-readers.

Change-Id: Ibee2afad0d543129c9ba5a8a22e3ec17d77e36ea
Signed-off-by: Chris Kay <chris.kay@arm.com>
21 months agofix(pie): pass `-fpie` to the preprocessor as well
Chris Kay [Thu, 2 Feb 2023 14:39:03 +0000 (14:39 +0000)]
fix(pie): pass `-fpie` to the preprocessor as well

When PIE is enabled, the `-fpie` flag is passed to the compiler but not
to the preprocessor. This change ensures that both tools are aware of
when the image is position-independent when preprocessing, which impacts
some pre-defined preprocessor definitions.

Change-Id: I5208a591d60ee01312f6bf3dd7343abe6535ee61
Signed-off-by: Chris Kay <chris.kay@arm.com>
21 months agoMerge "fix(tsp): loop / crash if mmap of region fails" into integration
Manish V Badarkhe [Fri, 10 Feb 2023 15:11:05 +0000 (16:11 +0100)]
Merge "fix(tsp): loop / crash if mmap of region fails" into integration

21 months agoMerge "feat(git-hooks): add pre-commit hook" into integration
Joanna Farley [Fri, 10 Feb 2023 13:45:47 +0000 (14:45 +0100)]
Merge "feat(git-hooks): add pre-commit hook" into integration

21 months agofix(tsp): loop / crash if mmap of region fails
Thomas Viehweger [Mon, 23 Jan 2023 10:26:37 +0000 (11:26 +0100)]
fix(tsp): loop / crash if mmap of region fails

In test_memory_send the variable i is of unsigned type, so
it is never negative. If i is 0, the result of i-- is
4294967295. Don't know what happens if trying to
access composite->address_range_array[4294967295].
Made i a signed integer.

Signed-off-by: Thomas Viehweger <Thomas.Viehweger@rohde-schwarz.com>
Change-Id: I8b4e532749b5e86e4b5acd238e72c3f88e309ff2

21 months agoMerge "fix(context-mgmt): enable SCXTNUM access" into integration
Manish Pandey [Fri, 10 Feb 2023 11:57:17 +0000 (12:57 +0100)]
Merge "fix(context-mgmt): enable SCXTNUM access" into integration

21 months agoMerge "fix(optee): address late comments and fix bad rc" into integration
Joanna Farley [Fri, 10 Feb 2023 10:26:48 +0000 (11:26 +0100)]
Merge "fix(optee): address late comments and fix bad rc" into integration

21 months agoMerge "feat(spmd): copy tos_fw_config in secure region" into integration
Manish Pandey [Fri, 10 Feb 2023 09:36:01 +0000 (10:36 +0100)]
Merge "feat(spmd): copy tos_fw_config in secure region" into integration

21 months agoMerge "fix(mpam): run-time checks for mpam save/restore routines" into integration
Manish Pandey [Fri, 10 Feb 2023 09:20:07 +0000 (10:20 +0100)]
Merge "fix(mpam): run-time checks for mpam save/restore routines" into integration

21 months agoMerge changes from topic "mb/tos-fw-config-load-refactor" into integration
Sandrine Bailleux [Fri, 10 Feb 2023 09:05:12 +0000 (10:05 +0100)]
Merge changes from topic "mb/tos-fw-config-load-refactor" into integration

* changes:
  feat(spmd): map SPMC manifest region as EL3_PAS
  feat(fvp): update device tree with load addresses of TOS_FW config
  refactor(fvp): rename the DTB info structure member
  feat(fconf): rename 'ns-load-address' to 'secondary-load-address'

21 months agoMerge "fix(cert-create): change WARN to VERBOSE" into integration
Sandrine Bailleux [Fri, 10 Feb 2023 08:58:37 +0000 (09:58 +0100)]
Merge "fix(cert-create): change WARN to VERBOSE" into integration

21 months agofix(optee): address late comments and fix bad rc
Jeffrey Kardatzke [Thu, 9 Feb 2023 19:03:17 +0000 (11:03 -0800)]
fix(optee): address late comments and fix bad rc

There were some late comments to the prior change (18635) which are
address in this commit. There was also an invalid return value check
which was changed and the wrong result was being returned via the SMC
call for loading OP-TEE which is now fixed.

Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com>
Change-Id: I883ddf966662549a3ef9c801a2d4f47709422332

21 months agofix(cert-create): change WARN to VERBOSE
laurenw-arm [Wed, 8 Feb 2023 19:14:54 +0000 (13:14 -0600)]
fix(cert-create): change WARN to VERBOSE

SAVE_KEYS is set to '0' by default, causing cert_create to
show the 'Key filename not specified' message on each run
even though this is perfectly normal. Show the message only
in the VERBOSE log level.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Change-Id: I472cdec2670055ab0edd99d172f79d01ad575972

21 months agofeat(git-hooks): add pre-commit hook
Maksims Svecovs [Thu, 9 Feb 2023 16:48:34 +0000 (16:48 +0000)]
feat(git-hooks): add pre-commit hook

Adds a pre-commit git hook to keep track of copyright year.
Checks staged files for Arm copyright header and suggests a change if
the year is outdated. Works with both single-year format and
from_year-to_year format.

Signed-off-by: Maksims Svecovs <maksims.svecovs@arm.com>
Change-Id: If81a0b9f5e047ec0ac401c7cf1792b9da6644926

21 months agofeat(spmd): copy tos_fw_config in secure region
Manish V Badarkhe [Tue, 7 Feb 2023 11:26:38 +0000 (11:26 +0000)]
feat(spmd): copy tos_fw_config in secure region

The tos_fw_config is currently loaded into memory by BL2 and
consumed by SPMD (part of BL31) and BL32 firmwares. This does
not work in RME-enabled systems as BL31 uses the root PAS memory
and does not trust secure PAS memory.

A first attempt was made to map the TOS_FW_CONFIG region as root PAS,
and then to remap to secure PAS after SPMD consumption, but this was
not suitable for RME systems where memory encryption is enabled.

This can be solved by copying the TOS FW config (SPMC manifest) from
the Root PAS region to the Secure PAS region so that BL32 can consume
it.

Change-Id: I8eef8345366199cb0e367db883c34a5b5136465d
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
21 months agofix(zynqmp): enable A53 workaround(errata 1530924)
Michal Simek [Thu, 9 Feb 2023 12:21:10 +0000 (13:21 +0100)]
fix(zynqmp): enable A53 workaround(errata 1530924)

BL31 already reports that there is missing CPU workaround for this
erratum as
"WARNING: BL31: cortex_a53: CPU workaround for 1530924 was missing!"

That's why enable it by default as was done by other platforms for
example by commit 74665119f04d ("allwinner: Enable workaround for
Cortex-A53 erratum 1530924").

Change-Id: I251ffe3c307781b07477afb64f4e7af5dd9af9fe
Signed-off-by: Michal Simek <michal.simek@amd.com>
21 months agofeat(zynqmp): add SMCCC_ARCH_SOC_ID support
Michal Simek [Thu, 9 Feb 2023 09:28:58 +0000 (10:28 +0100)]
feat(zynqmp): add SMCCC_ARCH_SOC_ID support

Add support for calling SMCCC_ARCH_SOC_ID which is used by Linux soc_id
driver for printing information about manufacturer and also chip version
and silicon ID code. SOC revision is directly mapped to chip ID code.
And SOC version is composed from manufacturer ID based on JEP-106 with
chip_id which contains bits mapped to CPU register 0xffca0044 platform
bits which differentiate between silicon, qemu and other emulated
platforms.

Function description is available at
docs/getting_started/porting-guide.rst.

Change-Id: I1f19e1973593897e71b39244dbdbceb6bd0e8a07
Signed-off-by: Michal Simek <michal.simek@amd.com>
21 months agofix(context-mgmt): enable SCXTNUM access
Maksims Svecovs [Thu, 2 Feb 2023 16:10:22 +0000 (16:10 +0000)]
fix(context-mgmt): enable SCXTNUM access

Enable SCXTNUM_ELx access for lower ELs in non-secure state.
Make realm context setup take this build flag into account but enable it
by default when RME is used.

Signed-off-by: Maksims Svecovs <maksims.svecovs@arm.com>
Change-Id: Ieb0186b2fdffad464bb9316fc3973772c9c28cd0

21 months agoMerge "chore: add encrypt_fw to gitignore" into integration
Manish Pandey [Wed, 8 Feb 2023 17:37:44 +0000 (18:37 +0100)]
Merge "chore: add encrypt_fw to gitignore" into integration

21 months agoMerge changes I7bd311d7,Iea7dcfe3,I9d890934 into integration
Manish V Badarkhe [Wed, 8 Feb 2023 14:20:10 +0000 (15:20 +0100)]
Merge changes I7bd311d7,Iea7dcfe3,I9d890934 into integration

* changes:
  refactor(allwinner): use fdt_node_is_enabled() in AXP driver
  fix(allwinner): check RSB availability in DT on H6
  refactor(fdt): introduce common fdt_node_is_enabled()

21 months agoMerge "feat(psa): interface with RSS for NV counters" into integration
Sandrine Bailleux [Wed, 8 Feb 2023 10:48:14 +0000 (11:48 +0100)]
Merge "feat(psa): interface with RSS for NV counters" into integration

21 months agofeat(psa): interface with RSS for NV counters
laurenw-arm [Thu, 11 Aug 2022 20:29:56 +0000 (15:29 -0500)]
feat(psa): interface with RSS for NV counters

Adding AP/RSS interface for retrieving and incrementing non-volatile
counters.

The read interface implements the psa_call:
psa_call(RSS_PLATFORM_SERVICE_HANDLE,
         RSS_PLATFORM_API_ID_NV_READ,
         in_vec, 1, out_vec, 1);

where the in_vec indicates which of the 3 counters we want, and the
out_vec stores the counter value we get back from RSS.

The increment interface implements the psa_call:
psa_call(RSS_PLATFORM_SERVICE_HANDLE,
         RSS_PLATFORM_API_ID_NV_INCREMENT,
         in_vec, 1, (psa_outvec *)NULL, 0);

where, again, in_vec indicates the counter to increment, and we don't
get any output parameter from RSS.

Through this service, we will be able to get/increment any of the 3 NV
counters used on a CCA platform:
- NV counter for CCA firmware (BL2, BL31, RMM).
- NV counter for secure firmware.
- NV counter for non-secure firmware.

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Signed-off-by: Raef Coles <raef.coles@arm.com>
Change-Id: I4c1c7f4837ebff30de16bb0ce7ecd416b70b1f62

21 months agofeat(spmd): map SPMC manifest region as EL3_PAS
Manish V Badarkhe [Tue, 7 Feb 2023 11:26:38 +0000 (11:26 +0000)]
feat(spmd): map SPMC manifest region as EL3_PAS

Mapped SPMC manifest region as EL3_PAS so that it will get
mapped as Root region in RME enabled system otherwise Secure
region.

Change-Id: I1af5344d7516e948d5b3664bcdb94cdfc367cd78
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
21 months agofeat(fvp): update device tree with load addresses of TOS_FW config
Manish V Badarkhe [Tue, 7 Feb 2023 11:26:38 +0000 (11:26 +0000)]
feat(fvp): update device tree with load addresses of TOS_FW config

Provided both the root and secure addresses for TOS_FW config
in case of RME enabled systems where root address is in Root
SRAM and secure address is in Trusted DRAM.

Non-RME systems are unaffected by this change.

Change-Id: Ifb927c90fa5a68fe5362980858b4ddc5403ac95b
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
21 months agorefactor(fvp): rename the DTB info structure member
Manish V Badarkhe [Tue, 7 Feb 2023 11:26:38 +0000 (11:26 +0000)]
refactor(fvp): rename the DTB info structure member

In line with the previous patch, the name of the member of the
hw_config DTB info structure has been renamed.

Change-Id: I6689e416fecd66faa515e820f1c4b23bcb65bfb1
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
21 months agofeat(fconf): rename 'ns-load-address' to 'secondary-load-address'
Manish V Badarkhe [Tue, 7 Feb 2023 11:26:38 +0000 (11:26 +0000)]
feat(fconf): rename 'ns-load-address' to 'secondary-load-address'

The 'ns-load-address' property has been renamed to 'secondary-load-
address' in order to make it more generic. It can be used to copy
the configuration to any location, be it root, secure, or non-secure.

Change-Id: I122508e155ccd99082296be3f6b8db2f908be221
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
21 months agoMerge "refactor(tc): update total compute gpu device node" into integration
Manish V Badarkhe [Fri, 3 Feb 2023 16:04:42 +0000 (17:04 +0100)]
Merge "refactor(tc): update total compute gpu device node" into integration

21 months agorefactor(allwinner): use fdt_node_is_enabled() in AXP driver
Andre Przywara [Fri, 3 Feb 2023 11:00:26 +0000 (11:00 +0000)]
refactor(allwinner): use fdt_node_is_enabled() in AXP driver

The Allwinner AXP driver was using a private implementation of that
function, remove that in favour of our now common implementation.

Change-Id: I7bd311d73060d4bc83f93cff6bedf6c78dddd3ca
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
21 months agofix(allwinner): check RSB availability in DT on H6
Andre Przywara [Wed, 1 Feb 2023 22:28:37 +0000 (22:28 +0000)]
fix(allwinner): check RSB availability in DT on H6

At the moment we access the RSB bus on all Allwinner H6 boards
unconditionally, even though some boards do not have any PMIC at all,
while others have some I2C devices connected to the same pins.
The latter case is just fragile, but the first case leads to a hang on
at least one board, as reported by Jernej.

Scan the devicetree, to check for the availability of the RSB bus node.
Proceed only if the RSB DT node is actually enabled.

Change-Id: Iea7dcfe3e085e173334d098ec4ddcb6c4b085771
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
Reported-by: Jernej Skrabec <jernej.skrabec@gmail.com>
21 months agorefactor(fdt): introduce common fdt_node_is_enabled()
Andre Przywara [Fri, 3 Feb 2023 11:11:18 +0000 (11:11 +0000)]
refactor(fdt): introduce common fdt_node_is_enabled()

There are several users in the tree which want to check whether a given
FDT node is enabled or not: the "status" property holds that
information. So far all those users provide private implementations,
some of them having issues.

Export a generic implementation of that function in fdt_wrappers.h, as
a "static inline" function to not increase code size.
Also replace the existing implementation in Arm's fconf code, which had
a tiny bug in needlessly using the property length:
"status = [6f 6b 61 79 20];" would pass the check, where it should not.
The proper solution is also simpler: status must be a string, and
strings must be NUL-terminated in a DT. strcmp() would terminate on the
first NUL in *either* of the two strings it compares, so it would never
walk beyond the property boundary in the DTB.

Change-Id: I9d89093432f127c09add6cf5c93a725bc534e5de
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
21 months agorefactor(tc): update total compute gpu device node
Rupinderjit Singh [Fri, 3 Feb 2023 09:29:57 +0000 (09:29 +0000)]
refactor(tc): update total compute gpu device node

updated gpu clocks and added gpu simple power model node

Signed-off-by: Rupinderjit Singh <rupinderjit.singh@arm.com>
Change-Id: Ia475f136bec8a569f764255eb87c212a692626dc

21 months agoMerge "fix(versal-net): populate gic v3 rdist data statically" into integration
Joanna Farley [Fri, 3 Feb 2023 09:27:25 +0000 (10:27 +0100)]
Merge "fix(versal-net): populate gic v3 rdist data statically" into integration

21 months agoMerge "feat(optee): add loading OP-TEE image via an SMC" into integration
Joanna Farley [Thu, 2 Feb 2023 23:42:17 +0000 (00:42 +0100)]
Merge "feat(optee): add loading OP-TEE image via an SMC" into integration

21 months agoMerge changes from topic "xlnx_feat_chores" into integration
Joanna Farley [Thu, 2 Feb 2023 15:53:37 +0000 (16:53 +0100)]
Merge changes from topic "xlnx_feat_chores" into integration

* changes:
  chore(xilinx): update print information
  feat(versal-net): add jtag dcc support

21 months agochore: add encrypt_fw to gitignore
Yann Gautier [Fri, 27 Jan 2023 14:16:45 +0000 (15:16 +0100)]
chore: add encrypt_fw to gitignore

Add tools/encrypt_fw/encrypt_fw & tools/encrypt_fw/encrypt_fw.exe to
.gitignore file, to avoid git listing those binary files.

Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
Change-Id: I2f4ddbe1c11848513fe20f7c8b448a041988cc4f

21 months agochore(xilinx): update print information
Akshay Belsare [Wed, 18 Jan 2023 11:34:22 +0000 (17:04 +0530)]
chore(xilinx): update print information

Remove company name from the console messages while printing only
relevant information for the platform.

Change-Id: Id8171326e0267eb6f3a26de4eb66143970de2dbd
Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
21 months agoMerge changes I1b092bc1,Ifc2461b4,I5176caa5 into integration
Soby Mathew [Wed, 1 Feb 2023 16:03:22 +0000 (17:03 +0100)]
Merge changes I1b092bc1,Ifc2461b4,I5176caa5 into integration

* changes:
  docs(rme): update RMM-EL3 Boot Manifest structure description
  feat(rme): read DRAM information from FVP DTB
  feat(rme): set DRAM information in Boot Manifest platform data

21 months agofix(versal-net): populate gic v3 rdist data statically
Jay Buddhabhatti [Tue, 24 Jan 2023 07:32:35 +0000 (23:32 -0800)]
fix(versal-net): populate gic v3 rdist data statically

Currently gicv3_rdistif_probe() is called per CPU. In case of maxcpus=1,
only 1 core is initialized and gicr_base_addrs initialized for CPU 0
only. Because of this assertion is raised during Linux system suspend.

During Linux suspend, platform callback saves GIC v3 state which
internally invokes arm_gicv3_distif_pre_save(). This function tries to use
gicr_base for all CPUs. Since GICR base address for secondary CPUs are not
initialized, it raises assertion.

To fix the issue, populate GIC v3 rdist data statically (similar to Versal)
instead of dynamically initializing GIC v3 rdist per CPU.

Signed-off-by: Jay Buddhabhatti <jay.buddhabhatti@amd.com>
Change-Id: I98c97c03e451d05f4ebac358e197617ab9d9b71f

21 months agofeat(versal-net): add jtag dcc support
Akshay Belsare [Wed, 18 Jan 2023 10:24:12 +0000 (15:54 +0530)]
feat(versal-net): add jtag dcc support

Add support for JTAG Debug Communication Channel(DCC), using the dcc
console driver, for Versal NET platform.
UART0/UART1 is not configured when the JTAG DCC is used as console for
the platform.
Though DCC is not using any UART, VERSAL_NET_UART_BASE needs
to be defined in the platform code. If its not defined, build errors
are observed.
Now VERSAL_NET_UART_BASE by default points to UART0 base.
Check for valid console(pl011, pl011_0, pl011_1, dcc) is
being done in the platform makefile, the error condition in
setting the value of VERSAL_NET_UART_BASE is redundant, thus the error
message is removed from the code.

Change-Id: I1085433055abea13526230cff4d4183ff7a01477
Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
21 months agofeat(optee): add loading OP-TEE image via an SMC
Jeffrey Kardatzke [Mon, 3 Oct 2022 22:50:21 +0000 (15:50 -0700)]
feat(optee): add loading OP-TEE image via an SMC

This adds the ability to load the OP-TEE image via an SMC called from
non-secure userspace rather than loading it during boot. This should
only be utilized on platforms that can ensure security is maintained up
until the point the SMC is invoked as it breaks the normal barrier
between the secure and non-secure world.

Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com>
Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc

21 months agodocs(rme): update RMM-EL3 Boot Manifest structure description
AlexeiFedorov [Wed, 18 Jan 2023 14:53:56 +0000 (14:53 +0000)]
docs(rme): update RMM-EL3 Boot Manifest structure description

This patch updates description of RMM-EL3 Boot Manifest
structure and its corresponding diagram and tables with DRAM
layout data.

Signed-off-by: AlexeiFedorov <Alexei.Fedorov@arm.com>
Change-Id: I1b092bc1ad5f1c7909d25c1a0dc89c2b210ada27

21 months agofeat(rme): read DRAM information from FVP DTB
AlexeiFedorov [Thu, 29 Dec 2022 15:57:40 +0000 (15:57 +0000)]
feat(rme): read DRAM information from FVP DTB

This patch builds on the previous patch by implementing
support for reading NS DRAM layout of FVP model from
HW_CONFIG Device tree.

Macro _RMMD_MANIFEST_VERSION is renamed to
SET_RMMD_MANIFEST_VERSION to suppress MISRA-C
"rule MC3R1.D4.5: (advisory) Identifiers in
the same name space with overlapping visibility
should be typographically unambiguous" warning

Signed-off-by: AlexeiFedorov <Alexei.Fedorov@arm.com>
Change-Id: Ifc2461b4441a1efdd4b7c656ab4d15e62479f77b

21 months agoMerge "feat(morello): add support for HW_CONFIG" into integration
Manish V Badarkhe [Mon, 30 Jan 2023 15:55:55 +0000 (16:55 +0100)]
Merge "feat(morello): add support for HW_CONFIG" into integration

21 months agoMerge "perf(imx): speed-up console/uart TX using FIFO" into integration
Madhukar Pappireddy [Mon, 30 Jan 2023 15:20:05 +0000 (16:20 +0100)]
Merge "perf(imx): speed-up console/uart TX using FIFO" into integration

21 months agoMerge "docs(measured-boot): fix few typos" into integration
Sandrine Bailleux [Mon, 30 Jan 2023 10:05:43 +0000 (11:05 +0100)]
Merge "docs(measured-boot): fix few typos" into integration

21 months agodocs(measured-boot): fix few typos
Manish V Badarkhe [Fri, 27 Jan 2023 13:51:22 +0000 (13:51 +0000)]
docs(measured-boot): fix few typos

Fixed few typos in the measured boot POC document.

Change-Id: I122c069bbde51febed12c54e2c4a4985b009ef5f
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
21 months agoperf(imx): speed-up console/uart TX using FIFO
Loic Poulain [Wed, 11 Jan 2023 15:08:48 +0000 (16:08 +0100)]
perf(imx): speed-up console/uart TX using FIFO

The current putc version test for TXEMPTY bit set (#6) instead
of waiting for TXFULL bit clear (#4), that slows the global
boot time as we are not taking benefit of the 32-byte FIFO.

We then need to implement the flush function to be sure the
transmit is complete (FIFO and shift register empty).

Signed-off-by: Loic Poulain <loic.poulain@linaro.org>
Change-Id: I54873a5203e2afdc230e44ce73284e7a80985b4f

21 months agofeat(morello): add support for HW_CONFIG
Patrik Berglund [Wed, 14 Sep 2022 16:22:15 +0000 (17:22 +0100)]
feat(morello): add support for HW_CONFIG

This patch add support to load HW_CONFIG in BL2 and pass it to
bootloader stages BL31 and BL33.

Signed-off-by: Patrik Berglund <patrik.berglund@arm.com>
Change-Id: I646fabed83dbca5322a59a399de5194cfef474ad

21 months agoMerge "fix(cpus): workaround for Cortex-A78C erratum 2772121" into integration
Lauren Wehrmeister [Fri, 27 Jan 2023 15:52:19 +0000 (16:52 +0100)]
Merge "fix(cpus): workaround for Cortex-A78C erratum 2772121" into integration

21 months agoMerge "feat(plat/tc): enable MPAM functionality of L3 DSU cache" into integration
Manish V Badarkhe [Fri, 27 Jan 2023 11:50:27 +0000 (12:50 +0100)]
Merge "feat(plat/tc): enable MPAM functionality of L3 DSU cache" into integration

21 months agofeat(plat/tc): enable MPAM functionality of L3 DSU cache
Davidson K [Fri, 13 Jan 2023 08:32:13 +0000 (14:02 +0530)]
feat(plat/tc): enable MPAM functionality of L3 DSU cache

The L3 cache in the DSU supports the Memory System Resources
Partitioning and Monitoring (MPAM). The MPAM specific registers in the
DSU are accessed through utility bus of DSU that are memory mapped from
0x1_0000_1000.

Signed-off-by: Davidson K <davidson.kumaresan@arm.com>
Change-Id: I2798181d599228e96dd4c0043a2ccd94668c7e20

21 months agoMerge "fix(cpus): workaround for Cortex-A510 erratum 2684597" into integration
Lauren Wehrmeister [Thu, 26 Jan 2023 20:24:49 +0000 (21:24 +0100)]
Merge "fix(cpus): workaround for Cortex-A510 erratum 2684597" into integration

21 months agoMerge "fix(psci): tighten psci_power_down_wfi behaviour" into integration
Lauren Wehrmeister [Thu, 26 Jan 2023 20:18:22 +0000 (21:18 +0100)]
Merge "fix(psci): tighten psci_power_down_wfi behaviour" into integration

21 months agoMerge "docs(rme): improve OOB instruction for RME" into integration
Soby Mathew [Thu, 26 Jan 2023 14:43:02 +0000 (15:43 +0100)]
Merge "docs(rme): improve OOB instruction for RME" into integration

21 months agodocs(rme): improve OOB instruction for RME
Soby Mathew [Tue, 24 Jan 2023 15:39:36 +0000 (15:39 +0000)]
docs(rme): improve OOB instruction for RME

This patch reworks the existing OOB instructions for RME enabled
TF-A.

Signed-off-by: Soby Mathew <soby.mathew@arm.com>
Change-Id: Icaeaf48c7061feaad4b1bb92388954694705e45c

21 months agofix(cpus): workaround for Cortex-A510 erratum 2684597
Harrison Mutai [Fri, 9 Dec 2022 12:14:25 +0000 (12:14 +0000)]
fix(cpus): workaround for Cortex-A510 erratum 2684597

Cortex-A510 erratum 2684597 is a Cat B erratum that applies to revisions
r0p0, r0p1, r0p2, r0p3, r1p0, r1p1 and r1p2. It is fixed in r1p3. The
workaround is to execute a TSB CSYNC and DSB before executing WFI for
power down.

SDEN can be found here:
https://developer.arm.com/documentation/SDEN1873361/latest
https://developer.arm.com/documentation/SDEN1873351/latest

Change-Id: Ic0b24b600bc013eb59c797401fbdc9bda8058d6d
Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
22 months agoMerge changes from topic "fix_misra_partition_mmc" into integration
Madhukar Pappireddy [Tue, 24 Jan 2023 16:29:28 +0000 (17:29 +0100)]
Merge changes from topic "fix_misra_partition_mmc" into integration

* changes:
  fix(mmc): align part config type
  fix(mmc): do not modify r_data in mmc_send_cmd()
  fix(mmc): explicitly check operators precedence
  fix(partition): add U suffix for unsigned numbers
  fix(partition): add missing curly braces

22 months agoMerge "docs: change security advisories notification channel" into integration
Sandrine Bailleux [Tue, 24 Jan 2023 10:06:22 +0000 (11:06 +0100)]
Merge "docs: change security advisories notification channel" into integration

22 months agofix(psci): tighten psci_power_down_wfi behaviour
Harrison Mutai [Wed, 11 Jan 2023 17:01:04 +0000 (17:01 +0000)]
fix(psci): tighten psci_power_down_wfi behaviour

A processing element should never return from a wfi, however, due to a
hardware bug, certain CPUs may wake up because of an external event.
This patch tightens the behaviour of the common power down sequence, it
ensures the routine never returns by entering a wfi loop at its end. It
aligns with the behaviour of the platform implementations.

Change-Id: I36d8b0c64eccb71035bf164b4cd658d66ed7beb4
Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
22 months agoMerge "feat(fiptool): handle FIP in a disk partition" into integration
Manish V Badarkhe [Mon, 23 Jan 2023 12:57:39 +0000 (13:57 +0100)]
Merge "feat(fiptool): handle FIP in a disk partition" into integration

22 months agoMerge "feat(rss): add TC platform UUIDs for RSS images" into integration
Sandrine Bailleux [Mon, 23 Jan 2023 11:47:15 +0000 (12:47 +0100)]
Merge "feat(rss): add TC platform UUIDs for RSS images" into integration

22 months agofix(mpam): run-time checks for mpam save/restore routines
Rohit Mathew [Fri, 11 Nov 2022 18:45:11 +0000 (18:45 +0000)]
fix(mpam): run-time checks for mpam save/restore routines

With "ENABLE_MPAM_FOR_LOWER_ELS" and "CTX_INCLUDE_EL2_REGS" build
options enabled, MPAM EL2 registers would be saved/restored as part of
context management. Context save/restore routines as of now would
proceed to access all of MPAM EL2 registers without any runtime checks.
MPAM specification states that MPAMHCR_EL2 should only be accessed if
MPAMIDR_EL1.HAS_HCR is "1". Likewise, MPAMIDR_EL1.VPMR_MAX has to be
probed to obtain the maximum supported MPAMVPM<x>_EL2 before accessing
corresponding MPAMVPM<x>_EL2 registers. Since runtime checks are not
being made, an exception would be raised if the platform under test
doesn't support one of the registers. On Neoverse reference design
platforms, an exception is being raised while MPAMVPM2_EL2 or above are
accessed. Neoverse reference design platforms support only registers
till MPAMVPM1_EL2 at this point.

To resolve this, add sufficient runtime checks in MPAM EL2 context
save/restore routines. As part of the new save/restore routines,
MPAMIDR_EL1.HAS_HCR and MPAMIDR_EL1.VPMR_MAX are probed for the right
set of registers to be saved and restored.

CC: Davidson Kumaresan <davidson.kumaresan@arm.com>
Signed-off-by: Rohit Mathew <rohit.mathew@arm.com>
Change-Id: I2e3affd23091023b287b2bd5057a4a549037b611

22 months agofeat(fiptool): handle FIP in a disk partition
Antonio Borneo [Thu, 22 Sep 2022 10:15:27 +0000 (12:15 +0200)]
feat(fiptool): handle FIP in a disk partition

When FIP is programmed in a disk partition, fiptool cannot be used
directly; this forces the user to temporarily copy the partition
to a file, apply fiptool and copy back the file. This is caused by
fstat() that returns zero file size on a block special file, thus
making fiptool commands info, update, unpack and remove to exit.

For either Linux host or Linux target, recover the partition size
with ioctl() and use it as FIP file size. E.g.:
fiptool info /dev/disk/by-partlabel/fip-a
fiptool info /dev/mtdblock4

While there, rework two identical error log messages to provide
more details about the failure and update the date in copyright.

Signed-off-by: Antonio Borneo <antonio.borneo@foss.st.com>
Change-Id: I7cab60e577422d94c24ba7e39458f58bcebc2336

22 months agoMerge changes from topic "srm/errata" into integration
Bipin Ravi [Fri, 20 Jan 2023 19:37:07 +0000 (20:37 +0100)]
Merge changes from topic "srm/errata" into integration

* changes:
  fix(cpus): workaround for Neoverse V1 errata 2779461
  fix(cpus): workaround for Cortex-A78 erratum 2779479

22 months agoMerge changes from topic "fix_sparse_warnings" into integration
Madhukar Pappireddy [Fri, 20 Jan 2023 17:20:59 +0000 (18:20 +0100)]
Merge changes from topic "fix_sparse_warnings" into integration

* changes:
  fix(libc): remove __putchar alias
  fix(console): correct scopes for console symbols
  fix(auth): use NULL instead of 0 for pointer check
  fix(io): compare function pointers with NULL
  fix(fdt-wrappers): use correct prototypes

22 months agofix(cpus): workaround for Neoverse V1 errata 2779461
Sona Mathew [Wed, 11 Jan 2023 23:04:24 +0000 (17:04 -0600)]
fix(cpus): workaround for Neoverse V1 errata 2779461

Neoverse V1 erratum 2779461 is a Cat B erratum that applies to
all revisions <=r1p2 and is still open.

The workaround sets CPUACTLR3_EL1[47] bit to 1. Setting this
bit might have a small impact on power and negligible impact
on performance.

SDEN documentation:https://developer.arm.com/documentation/SDEN1401781/latest

Change-Id: I367cda1779684638063d7292fda20ca6734e6f10
Signed-off-by: Sona Mathew <SonaRebecca.Mathew@arm.com>
22 months agofix(cpus): workaround for Cortex-A78 erratum 2779479
Sona Mathew [Wed, 11 Jan 2023 18:55:30 +0000 (12:55 -0600)]
fix(cpus): workaround for Cortex-A78 erratum 2779479

Cortex-A78 erratum 2779479 is a Cat B erratum that applies to
all revisions <= r1p2 and is still open.

The workaround is to set the CPUACTLR3_EL1[47] bit to 1. Setting this
bit might have a small impact on power and negligible impact
on performance.

SDEN documentation:
https://developer.arm.com/documentation/SDEN1401784/latest

Change-Id: I3779fd1eff3017c5961ffa101b357918070b3b36
Signed-off-by: Sona Mathew <SonaRebecca.Mathew@arm.com>
22 months agoMerge changes from topic "feat_state_rework" into integration
Manish Pandey [Thu, 19 Jan 2023 17:19:50 +0000 (18:19 +0100)]
Merge changes from topic "feat_state_rework" into integration

* changes:
  feat(fvp): enable FEAT_HCX by default
  refactor(context-mgmt): move FEAT_HCX save/restore into C
  refactor(cpufeat): convert FEAT_HCX to new scheme
  feat(fvp): enable FEAT_FGT by default
  refactor(context-mgmt): move FEAT_FGT save/restore code into C
  refactor(amu): convert FEAT_AMUv1 to new scheme
  refactor(cpufeat): decouple FGT feature detection and build flags
  refactor(cpufeat): check FEAT_FGT in a new way
  refactor(cpufeat): move helpers into .c file, rename FEAT_STATE_
  feat(aarch64): make ID system register reads non-volatile

22 months agoMerge "fix(plat/css): fix invalid redistributor poweroff" into integration
Madhukar Pappireddy [Wed, 18 Jan 2023 18:51:50 +0000 (19:51 +0100)]
Merge "fix(plat/css): fix invalid redistributor poweroff" into integration

22 months agofix(cpus): workaround for Cortex-A78C erratum 2772121
Bipin Ravi [Wed, 18 Jan 2023 17:03:21 +0000 (11:03 -0600)]
fix(cpus): workaround for Cortex-A78C erratum 2772121

Cortex-A78C erratum 2772121 is a Cat B erratum that applies to
all revisions <=r0p2 and is still open. The workaround is to
insert a dsb before the isb in the power down sequence.

SDEN documentation:
https://developer.arm.com/documentation/SDEN1707916/latest

Signed-off-by: Bipin Ravi <bipin.ravi@arm.com>
Change-Id: I0e190dabffc20c4d3b9b98d1abeb50f308b80bb9

22 months agoMerge "fix: add parenthesis for tests in MIN, MAX and CLAMP macros" into integration
Madhukar Pappireddy [Wed, 18 Jan 2023 17:06:38 +0000 (18:06 +0100)]
Merge "fix: add parenthesis for tests in MIN, MAX and CLAMP macros" into integration

22 months agofix(plat/css): fix invalid redistributor poweroff
Waleed Elmelegy [Mon, 16 Jan 2023 15:10:38 +0000 (15:10 +0000)]
fix(plat/css): fix invalid redistributor poweroff

Commit 4d8c18196378824e388cf31ef991ba8fbbb09cbf
introduced an invalid redistributor power off
where we turn off the redistributor without
checking if the system power domain level is
turning off, otherwise we can turn off a
redistributor when other cores or clusters are
sharing it, also if it does indeed needs
powering off during suspend we do it twice.
This change fixes this by checking on the
system power state first then turning off
the redistributor.

Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
Change-Id: Id202bc2316ab7c516298fa33ea089ae2e221a933

22 months agoMerge "fix(zynqmp): fix xck24 silicon ID" into integration
Joanna Farley [Wed, 18 Jan 2023 12:33:02 +0000 (13:33 +0100)]
Merge "fix(zynqmp): fix xck24 silicon ID" into integration

22 months agoMerge changes from topic "mtk_spm" into integration
Manish Pandey [Wed, 18 Jan 2023 11:06:11 +0000 (12:06 +0100)]
Merge changes from topic "mtk_spm" into integration

* changes:
  refactor(mediatek): add new LPM API for further extension
  refactor(mediatek): change the parameters of LPM API
  refactor(mediatek): change LPM header file path for further extension
  feat(mt8188): keep infra and peri on when system suspend
  feat(mt8188): enable SPM and LPM
  feat(mt8188): add SPM feature support
  feat(mt8188): add MT8188 SPM support
  feat(mediatek): add SPM's SSPM notifier
  feat(mt8188): add the register definitions accessed by SPM
  feat(mediatek): add new features of LPM

22 months agofix(zynqmp): fix xck24 silicon ID
Michal Simek [Wed, 18 Jan 2023 07:55:20 +0000 (08:55 +0100)]
fix(zynqmp): fix xck24 silicon ID

Origin ID code has changed from origin description. After receiving part
new ID code come up that's why fix it. The origin ID code has been added
by commit 86869f99d0c1 ("feat(zynqmp): add support for xck24 silicon").

Change-Id: I727bfe43fd7ef9e604f63bde5fa37fa3666db8c4
Signed-off-by: Michal Simek <michal.simek@amd.com>
22 months agoMerge changes from topic "st_dt_update" into integration
Manish Pandey [Tue, 17 Jan 2023 16:43:29 +0000 (17:43 +0100)]
Merge changes from topic "st_dt_update" into integration

* changes:
  refactor(stm32mp15-fdts): remove unused PMIC nodes
  fix(stm32mp15-fdts): use interrupts-extended for i2c2
  style(stm32mp15-fdts): remove extra spaces on vbus

22 months agofeat(rme): set DRAM information in Boot Manifest platform data
AlexeiFedorov [Wed, 14 Dec 2022 17:28:11 +0000 (17:28 +0000)]
feat(rme): set DRAM information in Boot Manifest platform data

This patch adds support for setting configuration of DRAM banks
for FVP model in RMM-EL3 Boot Manifest structure.
Structure 'rmm_manifest' is extended with 'plat_dram' structure
which contains information about platform's DRAM layout:
- number of DRAM banks;
- pointer to 'dram_bank[]' array;
- check sum: two's complement 64-bit value of the sum of
  data in 'plat_dram' and 'dram_bank[] array.
Each 'dram_bank' structure holds information about DRAM
bank base address and its size. This values must be aligned
to 4KB page size.
The patch increases Boot Manifest minor version to 2 and
removes 'typedef rmm_manifest_t' as per
"3.4.15.1. Avoid anonymous typedefs of structs/enums in headers" of
https://trustedfirmware-a.readthedocs.io/en/latest/process/coding-style.html

Signed-off-by: AlexeiFedorov <Alexei.Fedorov@arm.com>
Change-Id: I5176caa5780e27d1e0daeb5dea3e40cf6ad5fd12

22 months agoMerge changes from topic "ti-k3-checks-and-refactor" into integration
Madhukar Pappireddy [Mon, 16 Jan 2023 20:46:50 +0000 (21:46 +0100)]
Merge changes from topic "ti-k3-checks-and-refactor" into integration

* changes:
  fix(ti): fix typo in boot authentication message name
  refactor(ti): remove empty validate_ns_entrypoint function
  refactor(ti): use console_set_scope() rather than empty function hack
  refactor(ti): factor out common board code into common files
  feat(ti): add PSCI system_off support
  feat(ti): do not handle EAs in EL3
  feat(ti): set snoop-delayed exclusive handling on A72 cores
  feat(ti): disable L2 dataless UniqueClean evictions
  feat(ti): set L2 cache ECC and and parity on A72 cores
  feat(ti): set L2 cache data ram latency on A72 cores to 4 cycles

22 months agoMerge changes from topic "deprecate_io_drivers" into integration
Manish Pandey [Mon, 16 Jan 2023 15:45:37 +0000 (16:45 +0100)]
Merge changes from topic "deprecate_io_drivers" into integration

* changes:
  refactor(st): remove unused io_mmc driver
  docs: deprecate io_dummy driver

22 months agoMerge changes from topic "refactor_st_common" into integration
Manish Pandey [Mon, 16 Jan 2023 15:44:17 +0000 (16:44 +0100)]
Merge changes from topic "refactor_st_common" into integration

* changes:
  refactor(st): move board info in common code
  refactor(st): move GIC code to common directory
  refactor(st): move boot backup register management

22 months agoMerge "feat(versal-net): add support for uart1 console" into integration
Joanna Farley [Mon, 16 Jan 2023 13:45:05 +0000 (14:45 +0100)]
Merge "feat(versal-net): add support for uart1 console" into integration

22 months agoMerge "docs(security): security advisory for CVE-2022-47630" into integration
Sandrine Bailleux [Mon, 16 Jan 2023 13:23:39 +0000 (14:23 +0100)]
Merge "docs(security): security advisory for CVE-2022-47630" into integration

22 months agodocs(security): security advisory for CVE-2022-47630
Sandrine Bailleux [Fri, 13 Jan 2023 08:49:34 +0000 (09:49 +0100)]
docs(security): security advisory for CVE-2022-47630

Reported-by: Demi Marie Obenour <demiobenour@gmail.com>
Co-authored-by: Demi Marie Obenour <demiobenour@gmail.com>
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Change-Id: I20be2d280437eb223c988e2bf59c4562515817a0

22 months agofeat(versal-net): add support for uart1 console
Akshay Belsare [Fri, 13 Jan 2023 09:10:37 +0000 (14:40 +0530)]
feat(versal-net): add support for uart1 console

Versal NET platform supports two UART(UART0, UART1)
Add support for UART1 to be used as console for Versal NET platform.

Change-Id: I3bc2034f54052e37cc480f98d48335fa5b2138bf
Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
22 months agoMerge "refactor(el3_runtime): remove unnecessary assembly macros" into integration
Manish Pandey [Fri, 13 Jan 2023 10:19:52 +0000 (11:19 +0100)]
Merge "refactor(el3_runtime): remove unnecessary assembly macros" into integration

22 months agoMerge "fix(mpam): remove unwanted param for "endfunc" macro" into integration
Manish Pandey [Fri, 13 Jan 2023 09:07:42 +0000 (10:07 +0100)]
Merge "fix(mpam): remove unwanted param for "endfunc" macro" into integration

22 months agofix(ti): fix typo in boot authentication message name
Andrew Davis [Tue, 10 Jan 2023 18:34:20 +0000 (12:34 -0600)]
fix(ti): fix typo in boot authentication message name

Fix AUTH_BOOT message identifier (s/IMIAGE/IMAGE).

Reported-by: Jorge Ramirez-Ortiz <jorge@foundries.io>
Signed-off-by: Andrew Davis <afd@ti.com>
Change-Id: I19eb1798c6b9dd8c3f59e05c59318c9c3be971a0