]> git.baikalelectronics.ru Git - arm-tf.git/log
arm-tf.git
18 months agoMerge "docs: add Juno runtime instrumentation data" into integration
Manish Pandey [Mon, 22 May 2023 08:40:37 +0000 (10:40 +0200)]
Merge "docs: add Juno runtime instrumentation data" into integration

18 months agoMerge "fix: pin poetry to version used in CI" into integration
Joanna Farley [Sat, 20 May 2023 17:25:42 +0000 (19:25 +0200)]
Merge "fix: pin poetry to version used in CI" into integration

18 months agofix: pin poetry to version used in CI
Harrison Mutai [Sat, 20 May 2023 09:09:41 +0000 (10:09 +0100)]
fix: pin poetry to version used in CI

Pin poetry to version 1.3.2, which is currently used in CI, to ensure
that all builds are consistent. Also, fix typo in `doc` group name.

Change-Id: Id0c1aa88ac7ffcc241a51c693570e87abacf7ebc
Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
18 months agoMerge "docs(spm): memory region nodes definition" into integration
Madhukar Pappireddy [Fri, 19 May 2023 15:42:58 +0000 (17:42 +0200)]
Merge "docs(spm): memory region nodes definition" into integration

18 months agoMerge changes I0a307cc1,Ic2ad5a56 into integration
Manish Pandey [Fri, 19 May 2023 12:57:03 +0000 (14:57 +0200)]
Merge changes I0a307cc1,Ic2ad5a56 into integration

* changes:
  fix(morello): remove platform specific pwr_domain_suspend wrapper
  fix(n1sdp): remove platform specific pwr_domain_suspend wrapper

18 months agofix(morello): remove platform specific pwr_domain_suspend wrapper
sahil [Fri, 19 May 2023 08:21:21 +0000 (13:51 +0530)]
fix(morello): remove platform specific pwr_domain_suspend wrapper

Turning redistributor off during suspend disables any wakeup interrupts
resulting in cpu getting stuck. This patch removes the platform specific
psci pwr_domain_suspend handler.

Signed-off-by: sahil <sahil@arm.com>
Change-Id: I0a307cc140447e91fd0808fcfb309593f24c14ca

18 months agofix(n1sdp): remove platform specific pwr_domain_suspend wrapper
sahil [Fri, 19 May 2023 05:36:13 +0000 (11:06 +0530)]
fix(n1sdp): remove platform specific pwr_domain_suspend wrapper

Turning redistributor off during suspend disables any wakeup interrupts
resulting in cpu getting stuck. This patch removes the platform specific
psci pwr_domain_suspend handler.

Signed-off-by: sahil <sahil@arm.com>
Change-Id: Ic2ad5a561be29eee9229a5cc11aa3c9320a51cb7

18 months agodocs(spm): memory region nodes definition
J-Alves [Mon, 15 May 2023 15:50:58 +0000 (16:50 +0100)]
docs(spm): memory region nodes definition

Update the documentation related with memory region nodes
of SP's FF-A manifest, to relate to changes from patches [1].

[1] https://review.trustedfirmware.org/q/topic:%22ja%252Fmem_region_fix%22+(status:open%20OR%20status:merged)

Signed-off-by: J-Alves <joao.alves@arm.com>
Change-Id: I16595ec581b0ad9d2c20fca8dab64b6fd9ad001a

18 months agodocs: add Juno runtime instrumentation data
Harrison Mutai [Wed, 17 May 2023 12:09:16 +0000 (13:09 +0100)]
docs: add Juno runtime instrumentation data

Add results from running the TFTF test suite Runtime Instrumentation on Juno.

Change-Id: I4c5b64e1a80b5b88e42835f0700294a02edc8032
Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
18 months agoMerge "docs(prerequisites): update software and libraries prerequisites" into integration
Bipin Ravi [Tue, 16 May 2023 20:22:08 +0000 (22:22 +0200)]
Merge "docs(prerequisites): update software and libraries prerequisites" into integration

18 months agodocs(prerequisites): update software and libraries prerequisites
Govindraj Raja [Fri, 12 May 2023 19:56:42 +0000 (14:56 -0500)]
docs(prerequisites): update software and libraries prerequisites

Update to use the following software:

- mbed TLS == 3.4.0
- (DTC) >= 1.4.7
- Ubuntu 22.04 for builds.

Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
Change-Id: I384aab4dfee9cae9453eebf4091abe82ef9ccfaa

18 months agoMerge "fix(tegra210): mark bits [23:17] as zero for Fast SMCs" into integration
Manish Pandey [Tue, 16 May 2023 14:58:09 +0000 (16:58 +0200)]
Merge "fix(tegra210): mark bits [23:17] as zero for Fast SMCs" into integration

18 months agoMerge changes from topic "ja/mem_share_doc" into integration
Manish Pandey [Tue, 16 May 2023 14:57:15 +0000 (16:57 +0200)]
Merge changes from topic "ja/mem_share_doc" into integration

* changes:
  docs(spm): threat model for memory sharing functionality
  docs(spm): add memory sharing documentation

18 months agoMerge changes from topics "plat_tests_scalability", "sb/tc-plat-tests" into integration
Sandrine Bailleux [Tue, 16 May 2023 11:03:28 +0000 (13:03 +0200)]
Merge changes from topics "plat_tests_scalability", "sb/tc-plat-tests" into integration

* changes:
  test(tc): unify platform tests traces
  test(tc): return test failures count for tfm-testsuite
  test(tc): move platform tests in their own function
  test(tc): centralize platform error handling
  refactor(tc): define PLATFORM_TESTS for scale

18 months agotest(tc): unify platform tests traces
Sandrine Bailleux [Fri, 5 May 2023 13:59:00 +0000 (15:59 +0200)]
test(tc): unify platform tests traces

Add some traces at the start and end of platform tests. These traces
are the same regardless of the set of platform tests we run (NV
counter tests / TF-M testsuite / future set of tests).

This makes it easier to integrate these tests in the CI because we can
now have a unified "expect" script for all platform tests, instead of
having one dedicated "expect" script for each possible set of tests.

Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Change-Id: I5ec30a7a25d8a9a4a90e3338a9789acff7ad4843

18 months agotest(tc): return test failures count for tfm-testsuite
Sandrine Bailleux [Fri, 5 May 2023 13:51:28 +0000 (15:51 +0200)]
test(tc): return test failures count for tfm-testsuite

When running the "tfm-testsuite" set of platform tests, we now count
the number of failed tests (in addition to printing a test summary)
and report that back to the caller,
i.e. tc_bl31_common_platform_setup().

This will be useful to consolidate the tests failure reporting code in
a subsequent patch.

Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Change-Id: I8e51f03869f3b2f264b6581b3bd2a53be0198057

18 months agotest(tc): move platform tests in their own function
Sandrine Bailleux [Fri, 5 May 2023 13:44:26 +0000 (15:44 +0200)]
test(tc): move platform tests in their own function

This is a bit cleaner, as it avoids cluttering the normal boot execution
path. It also gives us the opportunity to mark the tests function with
the __dead2 attribute, which inform both the compiler and the developer
that the test function never returns (since it suspends booting).

Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Change-Id: I082a34a840ef791a2ac4c1f59b19b32aeb0a9ec7

18 months agotest(tc): centralize platform error handling
Sandrine Bailleux [Fri, 5 May 2023 11:59:07 +0000 (13:59 +0200)]
test(tc): centralize platform error handling

Note that this change only affects the platform tests execution
path. It has no impact on the normal boot flow.

Make individual test functions propagate an error code, instead of
calling the platform error handler at the point of failure. The latter
is now the responsibility of the caller - in this case
tc_bl31_common_platform_setup().

Note that right now, tc_bl31_common_platform_setup() does not look at
the said error code but this initial change opens up an opportunity to
centralize any error handling in tc_bl31_common_platform_setup(),
which we will seize in subsequent patches.

Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Change-Id: Ib282b64039e0b1ec6e6d29476fbaa2bcd33cb0c7

18 months agofix(tegra210): mark bits [23:17] as zero for Fast SMCs
Kalyani Chidambaram Vaidyanathan [Mon, 24 Apr 2023 20:56:12 +0000 (13:56 -0700)]
fix(tegra210): mark bits [23:17] as zero for Fast SMCs

Per SMCCC documentation, bits [23:17] must be zero for Fast
SMCs. Other values are reserved for future use. Ensure that
these bits are zeroes for TEGRA_SIP_PMC_COMMANDS.

Commit f8a35797 introduced a check to return error if these
bits are not zero, thus breaking Tegra210 platforms. This
patch fixes the anomaly.

Change-Id: I19edc3b33c999a6fee6b86184233fba146316466
Signed-off-by: Kalyani Chidambaram Vaidyanathan <kalyanic@nvidia.com>
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
18 months agodocs(spm): threat model for memory sharing functionality
J-Alves [Mon, 5 Dec 2022 18:37:06 +0000 (18:37 +0000)]
docs(spm): threat model for memory sharing functionality

Update the SPM threat model with information about FF-A v1.1
memory sharing functionality.

Change-Id: I65ea0d53aba8ac2f8432539968ceaab6be109ac8
Signed-off-by: J-Alves <joao.alves@arm.com>
18 months agodocs(spm): add memory sharing documentation
J-Alves [Wed, 26 Oct 2022 14:28:51 +0000 (15:28 +0100)]
docs(spm): add memory sharing documentation

Add documentation that explains implementation specific
relevant information from the update done to FF-A v1.1
memory sharing in Hafnium.

Change-Id: Ifc3c6b86c0545d53331207b017b990427ee84f2d
Signed-off-by: J-Alves <joao.alves@arm.com>
18 months agoMerge "docs(psci): expound runtime instrumentation docs" into integration
Manish Pandey [Thu, 11 May 2023 11:41:35 +0000 (13:41 +0200)]
Merge "docs(psci): expound runtime instrumentation docs" into integration

18 months agoMerge changes from topic "ms/external_deps" into integration
Joanna Farley [Thu, 11 May 2023 11:12:06 +0000 (13:12 +0200)]
Merge changes from topic "ms/external_deps" into integration

* changes:
  feat(libc): add %c to printf/snprintf
  feat(compiler-rt): update source files
  chore(libfdt): update to v1.7.0 source files

18 months agodocs(psci): expound runtime instrumentation docs
Harrison Mutai [Wed, 8 Mar 2023 12:01:48 +0000 (12:01 +0000)]
docs(psci): expound runtime instrumentation docs

Change-Id: I3c30b44d4196c30fd07373282150e543959fce1a
Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
18 months agofeat(libc): add %c to printf/snprintf
Maksims Svecovs [Tue, 9 May 2023 11:03:31 +0000 (12:03 +0100)]
feat(libc): add %c to printf/snprintf

Adds %c support for printf and snprintf to print one character. Required
by most recent MbedTLS 3.4.0.

Change-Id: I4d9b2725127a929d58946353324f99ff22b3b28b
Signed-off-by: Maksims Svecovs <maksims.svecovs@arm.com>
18 months agofeat(compiler-rt): update source files
Maksims Svecovs [Thu, 4 May 2023 15:57:43 +0000 (16:57 +0100)]
feat(compiler-rt): update source files

Update the compiler-rt source files to the tip of the llvm-project [1]
[1]: https://github.com/llvm/llvm-project/commit/d9683a7

Change-Id: Icec9ec73094a2b39b0240fc8253c36e7485d3a98
Signed-off-by: Maksims Svecovs <maksims.svecovs@arm.com>
18 months agochore(libfdt): update to v1.7.0 source files
Maksims Svecovs [Fri, 21 Apr 2023 15:14:00 +0000 (16:14 +0100)]
chore(libfdt): update to v1.7.0 source files

Update libfdt to source files from v1.7.0 release.
Upstream commit:
https://github.com/dgibson/dtc/commit/039a99414e778332d8f9c04cbd3072e1dcc62798

Change-Id: I7e0475d2ddb819691f476e1753d1c899f8d7c278
Signed-off-by: Maksims Svecovs <maksims.svecovs@arm.com>
18 months agoMerge "feat(optee): add device tree for coreboot table" into integration
Manish Pandey [Thu, 11 May 2023 09:14:50 +0000 (11:14 +0200)]
Merge "feat(optee): add device tree for coreboot table" into integration

18 months agoMerge "fix(n1sdp): add platform-specific power domain functions" into integration
Manish Pandey [Thu, 11 May 2023 09:09:09 +0000 (11:09 +0200)]
Merge "fix(n1sdp): add platform-specific power domain functions" into integration

18 months agoMerge "fix(morello): add platform-specific power domain functions" into integration
Manish Pandey [Thu, 11 May 2023 09:08:52 +0000 (11:08 +0200)]
Merge "fix(morello): add platform-specific power domain functions" into integration

18 months agofeat(optee): add device tree for coreboot table
Jeffrey Kardatzke [Thu, 9 Feb 2023 18:45:35 +0000 (10:45 -0800)]
feat(optee): add device tree for coreboot table

This adds creation of a device tree that will be passed to OP-TEE.
Currently that device tree only contains the coreboot table per the
Linux coreboot device tree specification. This device tree is then
passed to OP-TEE so it can extract the CBMEM console information from
the coreboot table for logging purposes.

Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com>
Change-Id: I6a26d335e16f7226018c56ad571cca77b81b0f6a

18 months agoMerge "fix: increase BL32 limit" into integration
Manish Pandey [Thu, 11 May 2023 08:46:36 +0000 (10:46 +0200)]
Merge "fix: increase BL32 limit" into integration

18 months agofix: increase BL32 limit
Manish V Badarkhe [Sun, 30 Apr 2023 08:25:15 +0000 (09:25 +0100)]
fix: increase BL32 limit

BL32_LIMIT has been increased from 2MB to 4MB to accommodate
the latest tee.bin (it is around ~2.1MB).

Change-Id: I47b770bf23c23d38931a2b3316d076b829338d70
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Co-developed-by: Juan Pablo Conde <juanpablo.conde@arm.com>
18 months agoMerge "fix(spmd): fix build error with spmd" into integration
Madhukar Pappireddy [Wed, 10 May 2023 22:44:49 +0000 (00:44 +0200)]
Merge "fix(spmd): fix build error with spmd" into integration

18 months agofix(spmd): fix build error with spmd
Govindraj Raja [Wed, 10 May 2023 19:50:36 +0000 (14:50 -0500)]
fix(spmd): fix build error with spmd

Currently when we build with 'SPD=spmd SPMD_SPM_AT_SEL2=0'
options, this causes a build failure as
'plat_spmd_handle_group0_interrupt' is called irrespective of
'SPMD_SPM_AT_SEL2' usage in 'spmd_group0_interrupt_handler_nwd'

So make 'plat_spmd_handle_group0_interrupt' dummy implementation
available just when spmd is enabled and SPMC_AT_EL3 is disabled.

Change-Id: Iaccd38faab81671c98f9165f318145187dca9bc2
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
18 months agoMerge "fix(psci): do not panic on illegal MPIDR" into integration
Manish Pandey [Wed, 10 May 2023 16:56:46 +0000 (18:56 +0200)]
Merge "fix(psci): do not panic on illegal MPIDR" into integration

18 months agoMerge "build(fpga): reduce cpu_libs to tc and neoverse" into integration
Manish V Badarkhe [Wed, 10 May 2023 16:34:31 +0000 (18:34 +0200)]
Merge "build(fpga): reduce cpu_libs to tc and neoverse" into integration

18 months agobuild(fpga): reduce cpu_libs to tc and neoverse
Daniel Boulby [Wed, 10 May 2023 13:42:43 +0000 (14:42 +0100)]
build(fpga): reduce cpu_libs to tc and neoverse

Change-Id: I20e88d5e712dafa7364b7932b8b4aaa9051bea55
Signed-off-by: Daniel Boulby <daniel.boulby@arm.com>
18 months agoMerge "docs: update release and code freeze dates" into integration
Joanna Farley [Wed, 10 May 2023 13:16:40 +0000 (15:16 +0200)]
Merge "docs: update release and code freeze dates" into integration

18 months agoMerge "fix(pmu): unconditionally save PMCR_EL0" into integration
Manish Pandey [Wed, 10 May 2023 12:12:25 +0000 (14:12 +0200)]
Merge "fix(pmu): unconditionally save PMCR_EL0" into integration

18 months agoMerge changes I5bb43cb0,I6aebe2ca,Ib59df16a,I9d037ab2,I9df5a465, ... into integration
Manish V Badarkhe [Tue, 9 May 2023 21:29:52 +0000 (23:29 +0200)]
Merge changes I5bb43cb0,I6aebe2ca,Ib59df16a,I9d037ab2,I9df5a465, ... into integration

* changes:
  fix(msm8916): add timeout for crash console TX flush
  style(msm8916): use size macros
  feat(msm8916): expose more timer frames
  fix(msm8916): drop unneeded initialization of CNTACR
  build(msm8916): disable unneeded workarounds
  fix(msm8916): flush dcache after writing msm8916_entry_point
  fix(msm8916): print \r before \n on UART console

18 months agoMerge changes I1bfa797e,I0ec7a70e into integration
Manish Pandey [Tue, 9 May 2023 20:05:52 +0000 (22:05 +0200)]
Merge changes I1bfa797e,I0ec7a70e into integration

* changes:
  fix(tree): correct some typos
  fix(rockchip): use semicolon instead of comma

18 months agoMerge changes from topic "mp/feat_ras" into integration
Manish Pandey [Tue, 9 May 2023 19:48:45 +0000 (21:48 +0200)]
Merge changes from topic "mp/feat_ras" into integration

* changes:
  refactor(cpufeat): enable FEAT_RAS for FEAT_STATE_CHECKED
  refactor(ras): replace RAS_EXTENSION with FEAT_RAS

18 months agofix(msm8916): add timeout for crash console TX flush
Stephan Gerhold [Thu, 6 Apr 2023 19:43:37 +0000 (21:43 +0200)]
fix(msm8916): add timeout for crash console TX flush

Resetting the UART DM controller while there are still remaining
characters in the FIFO often results in corruption on the UART receiver
side. To avoid this the msm8916 crash console implementation tries to
wait until the TX FIFO is empty.

Unfortunately this might spin forever if the transmitter was disabled
before it has fully finished transmitting. In this case the TXEMT bit
console_uartdm_core_flush is waiting for will never get set.

There seems to be no good way to detect if the transmitter is actually
enabled via the status registers. However, the TX FIFO is fairly small
and should not take too long to get flushed, so fix this by simply
limiting the amount of iterations with a short timeout.

Move the code to console_uartdm_core_init to ensure that this always
happens before resetting the transmitter (also during initialization).

Change-Id: I5bb43cb0b6c029bcd15e253d60d36c0b310e108b
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agostyle(msm8916): use size macros
Stephan Gerhold [Sun, 26 Mar 2023 11:07:25 +0000 (13:07 +0200)]
style(msm8916): use size macros

Use the pre-defined size macros (SZ_*) for more clarity and to avoid
having to add comments to each size represented by hexadecimal numbers.

Change-Id: I6aebe2caf1365279670955b9b507dec7d7b04457
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agofeat(msm8916): expose more timer frames
Stephan Gerhold [Wed, 22 Mar 2023 17:15:15 +0000 (18:15 +0100)]
feat(msm8916): expose more timer frames

The memory-mapped generic timer on msm8916 has 7 timer frames, but
currently only one is exposed for usage in the non-secure world.

The platform port is currently only designed to be used as minimal PSCI
implementation, without secure world that could make use of the other
timer frames. Let's make all of them available to the normal world.

If needed this could still be changed later by reserving some timer
frames conditionally to a specific SPD being enabled in the build.

Change-Id: Ib59df16aa1fd3dbc875ab6369c133737830c98c6
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agofix(msm8916): drop unneeded initialization of CNTACR
Stephan Gerhold [Wed, 22 Mar 2023 17:15:15 +0000 (18:15 +0100)]
fix(msm8916): drop unneeded initialization of CNTACR

Normal world software is responsible to initialize CNTACR as needed.
There is no existing software for msm8916 that depends on having this
initialization in BL31 so drop it before anything starts to rely on it.

Related issue: https://github.com/ARM-software/tf-issues/issues/170

Change-Id: I9d037ab218c0c1c8a5d5523722013eba531f4728
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agobuild(msm8916): disable unneeded workarounds
Stephan Gerhold [Tue, 14 Mar 2023 10:09:44 +0000 (11:09 +0100)]
build(msm8916): disable unneeded workarounds

The Cortex-A53 cores used in the msm8916 platform are not affected by
CVE-2017-5715 and CVE-2022-23960, so disable the workarounds for them
to drop the unused code from the compiled binary.

Change-Id: I9df5a4657c4fd90702b4db4e82d4ee1a2f60303c
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agofix(msm8916): flush dcache after writing msm8916_entry_point
Stephan Gerhold [Sat, 17 Sep 2022 16:21:20 +0000 (18:21 +0200)]
fix(msm8916): flush dcache after writing msm8916_entry_point

msm8916_entry_point is read with caches off (and even from two
different physical addresses when read through the "boot remapper"),
so it should be flushed to RAM after writing it.

Change-Id: I5c8193954bb28043b0a46fb2038f629bd8796c74
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agofix(msm8916): print \r before \n on UART console
Stephan Gerhold [Tue, 23 Aug 2022 20:33:11 +0000 (22:33 +0200)]
fix(msm8916): print \r before \n on UART console

UART drivers in TF-A are expected to print \r before \n. Some terminal
emulators expect \r\n as line endings by default so not doing this
causes broken line breaks.

Change-Id: I271a35a7c6907441bc71713b0b6a1da19da96878
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agoMerge changes from topic "srm/Errata_ABI_El3" into integration
Madhukar Pappireddy [Tue, 9 May 2023 19:15:54 +0000 (21:15 +0200)]
Merge changes from topic "srm/Errata_ABI_El3" into integration

* changes:
  docs(errata_abi): document the errata abi changes
  feat(fvp): enable errata management interface
  fix(cpus): workaround platforms non-arm interconnect
  refactor(errata_abi): factor in non-arm interconnect
  feat(errata_abi): errata management firmware interface

18 months agoMerge "fix(qemu-sbsa): enable FGT" into integration
Bipin Ravi [Tue, 9 May 2023 17:04:34 +0000 (19:04 +0200)]
Merge "fix(qemu-sbsa): enable FGT" into integration

18 months agoMerge changes from topic "bk/context_refactor" into integration
Manish V Badarkhe [Tue, 9 May 2023 16:15:01 +0000 (18:15 +0200)]
Merge changes from topic "bk/context_refactor" into integration

* changes:
  fix(gicv3): restore scr_el3 after changing it
  refactor(cm): make SVE and SME build dependencies logical

18 months agoMerge "docs: update TZC secured DRAM map for FVP and Juno" into integration
Madhukar Pappireddy [Tue, 9 May 2023 15:14:41 +0000 (17:14 +0200)]
Merge "docs: update TZC secured DRAM map for FVP and Juno" into integration

18 months agofix(tree): correct some typos
Elyes Haouas [Mon, 13 Feb 2023 08:14:48 +0000 (09:14 +0100)]
fix(tree): correct some typos

found using codespell (https://github.com/codespell-project/codespell).

Signed-off-by: Elyes Haouas <ehaouas@noos.fr>
Change-Id: I1bfa797e3460adddeefa916bb68e22beddaf6373

18 months agofix(rockchip): use semicolon instead of comma
Elyes Haouas [Tue, 21 Feb 2023 14:21:43 +0000 (15:21 +0100)]
fix(rockchip): use semicolon instead of comma

Use semicolon insted of comma at the end of line.

Change-Id: I0ec7a70ec659333c98d586f7bebd5d91bd6c6cc1
Signed-off-by: Elyes Haouas <ehaouas@noos.fr>
18 months agoMerge changes I06b35f11,If80573d6 into integration
Manish Pandey [Tue, 9 May 2023 14:51:38 +0000 (16:51 +0200)]
Merge changes I06b35f11,If80573d6 into integration

* changes:
  docs: remove plat_convert_pk() interface from release doc
  chore(io): remove io_dummy driver

18 months agoMerge "feat(mt8188): add MT8188 SPM debug logs" into integration
Manish Pandey [Tue, 9 May 2023 14:00:50 +0000 (16:00 +0200)]
Merge "feat(mt8188): add MT8188 SPM debug logs" into integration

18 months agorefactor(cpufeat): enable FEAT_RAS for FEAT_STATE_CHECKED
Andre Przywara [Fri, 27 Jan 2023 12:25:49 +0000 (12:25 +0000)]
refactor(cpufeat): enable FEAT_RAS for FEAT_STATE_CHECKED

At the moment we only support FEAT_RAS to be either unconditionally
compiled in, or to be not supported at all.

Add support for runtime detection (FEAT_RAS=2), by splitting
is_armv8_2_feat_ras_present() into an ID register reading function and
a second function to report the support status. That function considers
both build time settings and runtime information (if needed), and is
used before we access RAS related registers.

Also move the context saving code from assembly to C, and use the new
is_feat_ras_supported() function to guard its execution.

Change the FVP platform default to the now supported dynamic
option (=2), so the right decision can be made by the code at runtime.

Change-Id: I30498f72fd80b136850856244687400456a03d0e
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
18 months agorefactor(ras): replace RAS_EXTENSION with FEAT_RAS
Manish Pandey [Mon, 13 Feb 2023 12:39:17 +0000 (12:39 +0000)]
refactor(ras): replace RAS_EXTENSION with FEAT_RAS

The current usage of RAS_EXTENSION in TF-A codebase is to cater for two
things in TF-A :
1. Pull in necessary framework and platform hooks for Firmware first
   handling(FFH) of RAS errors.
2. Manage the FEAT_RAS extension when switching the worlds.

FFH means that all the EAs from NS are trapped in EL3 first and signaled
to NS world later after the first handling is done in firmware. There is
an alternate way of handling RAS errors viz Kernel First handling(KFH).
Tying FEAT_RAS to RAS_EXTENSION build flag was not correct as the
feature is needed for proper handling KFH in as well.

This patch breaks down the RAS_EXTENSION flag into a flag to denote the
CPU architecture `ENABLE_FEAT_RAS` which is used in context management
during world switch and another flag `RAS_FFH_SUPPORT` to pull in
required framework and platform hooks for FFH.

Proper support for KFH will be added in future patches.

BREAKING CHANGE: The previous RAS_EXTENSION is now deprecated. The
equivalent functionality can be achieved by the following
2 options:
 - ENABLE_FEAT_RAS
 - RAS_FFH_SUPPORT

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: I1abb9ab6622b8f1b15712b12f17612804d48a6ec

18 months agoMerge changes from topic "assert_boolean_set" into integration
Manish Pandey [Tue, 9 May 2023 09:26:11 +0000 (11:26 +0200)]
Merge changes from topic "assert_boolean_set" into integration

* changes:
  build!: check boolean flags are not empty
  fix(build): add a default value for INVERTED_MEMMAP
  fix(a5ds): add default value for ARM_DISABLE_TRUSTED_WDOG
  fix(st-crypto): move flag control into source code
  fix(stm32mp1): always define PKA algos flags
  fix(stm32mp1): remove boolean check on PLAT_TBBR_IMG_DEF

18 months agoMerge changes from topics "gr/gcc12", "jc/toolchain_update_2.9" into integration
Manish Pandey [Tue, 9 May 2023 09:04:23 +0000 (11:04 +0200)]
Merge changes from topics "gr/gcc12", "jc/toolchain_update_2.9" into integration

* changes:
  docs(build): update GCC to 12.2.Rel1 version
  fix(build): allow lower address access with gcc-12

18 months agodocs(build): update GCC to 12.2.Rel1 version
Jayanth Dodderi Chidanand [Tue, 18 Apr 2023 09:50:56 +0000 (10:50 +0100)]
docs(build): update GCC to 12.2.Rel1 version

Updating toolchain to the latest production release version
12.2.Rel1 publicly available on https://developer.arm.com/

We build TF-A in CI using:
AArch32 bare-metal target (arm-none-eabi)
AArch64 ELF bare-metal target (aarch64-none-elf)

Change-Id: Ib603cf7417e6878683a1100d5f55311188e36e8e
Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
18 months agofix(build): allow lower address access with gcc-12
Govindraj Raja [Fri, 5 May 2023 14:09:36 +0000 (09:09 -0500)]
fix(build): allow lower address access with gcc-12

With gcc-12 any lower address access can trigger a warning/error
this would be useful in other parts of system but in TF-A
there are various reasons to access to the lower address ranges,
example using mmio_read_*/writes_*

So setup to allow access to lower addresses while using gcc-12

Change-Id: Id1b4012b13bc6876d83b90a347fee12478a1921d
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
18 months agoMerge "feat(fvp): introduce PLATFORM_TEST_RAS_FFH config" into integration
Manish Pandey [Tue, 9 May 2023 08:19:18 +0000 (10:19 +0200)]
Merge "feat(fvp): introduce PLATFORM_TEST_RAS_FFH config" into integration

18 months agodocs: update TZC secured DRAM map for FVP and Juno
Manish V Badarkhe [Tue, 7 Mar 2023 10:21:30 +0000 (10:21 +0000)]
docs: update TZC secured DRAM map for FVP and Juno

Updated the documentation to include missing details about the
TZC secured DRAM mapping for the FVP and Juno platforms.

Change-Id: I10e59b9f9686fa2fef97f89864ebc272b10e5c0b
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
18 months agofeat(mt8188): add MT8188 SPM debug logs
Jason Chen [Wed, 3 May 2023 11:11:29 +0000 (19:11 +0800)]
feat(mt8188): add MT8188 SPM debug logs

Add debug logs for tracking the status of suspend and resume.

Change-Id: Id2d2ab06fadb3118ab66f816937e0dd6e43dbdc3
Signed-off-by: Jason Chen <Jason-ch.Chen@mediatek.com>
18 months agorefactor(tc): define PLATFORM_TESTS for scale
laurenw-arm [Thu, 4 May 2023 19:55:37 +0000 (14:55 -0500)]
refactor(tc): define PLATFORM_TESTS for scale

For scalability when we add more tests in the future, add PLATFORM_TESTS
macro when specific test flags, i.e. PLATFORM_TEST_NV_COUNTERS, are
defined.

Change-Id: Icb875a171dde673fca9fcf66624ac55383e7b641
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
18 months agodocs(errata_abi): document the errata abi changes
Sona Mathew [Wed, 15 Mar 2023 14:40:36 +0000 (09:40 -0500)]
docs(errata_abi): document the errata abi changes

Updated errata ABI feature enable flag and the errata non-arm
interconnect based flag, the default values for when the
feature is not enabled.

Change-Id: Ieb2144a1bc38f4ed684fda8280842a18964ba148
Signed-off-by: Sona Mathew <SonaRebecca.Mathew@arm.com>
18 months agofeat(fvp): enable errata management interface
Sona Mathew [Tue, 14 Mar 2023 22:58:13 +0000 (17:58 -0500)]
feat(fvp): enable errata management interface

Errata ABI feature specific build flag, flag to enable
CPUs in the cpu list, flags to test non-arm interconnect based
errata flags when enabled from a platform level.
Added to the FVP platform makefile to test the errata abi feature
implementation.

The flags to enable CPUs in the cpu list will be removed once
synchronized with the errata framework.

Change-Id: I30877a22ac1348906a6ddfb26f9e8839912d3572
Signed-off-by: Sona Mathew <SonaRebecca.Mathew@arm.com>
18 months agofix(cpus): workaround platforms non-arm interconnect
Sona Mathew [Tue, 14 Mar 2023 21:50:36 +0000 (16:50 -0500)]
fix(cpus): workaround platforms non-arm interconnect

The workarounds for these below mentioned errata are not implemented
in EL3, but the flags can be enabled/disabled at a platform level
based on arm/non-arm interconnect IP. The ABI helps assist the Kernel
in the process of mitigation for the following errata:

Cortex-A715:   erratum 2701951
Neoverse V2:   erratum 2719103
Cortex-A710:   erratum 2701952
Cortex-X2:     erratum 2701952
Neoverse N2:   erratum 2728475
Neoverse V1:   erratum 2701953
Cortex-A78:    erratum 2712571
Cortex-A78AE:  erratum 2712574
Cortex-A78C:   erratum 2712575

EL3 provides an appropriate return value via errata ABI when the
kernel makes an SMC call using the EM_CPU_ERRATUM_FEATURES FID with the
appropriate erratum ID.

Change-Id: I35bd69d812dba37410dd8bc2bbde20d4955b0850
Signed-off-by: Sona Mathew <SonaRebecca.Mathew@arm.com>
18 months agorefactor(errata_abi): factor in non-arm interconnect
Sona Mathew [Tue, 14 Mar 2023 19:02:03 +0000 (14:02 -0500)]
refactor(errata_abi): factor in non-arm interconnect

Workaround to help enable the kernel to query errata status using the
errata abi feature for platforms with a non-arm interconnect.

Change-Id: I47b03eaee5a0a763056ae71883fa30dfacb9b3f7
Signed-off-by: Sona Mathew <SonaRebecca.Mathew@arm.com>
18 months agofeat(errata_abi): errata management firmware interface
Sona Mathew [Sat, 19 Nov 2022 00:05:38 +0000 (18:05 -0600)]
feat(errata_abi): errata management firmware interface

This patch adds the errata management firmware interface for lower ELs
to discover details about CPU erratum. Based on the CPU erratum
identifier the interface enables the OS to find the mitigation of an
erratum in EL3.

The ABI can only be present in a system that is compliant with SMCCCv1.1
or higher. This implements v1.0 of the errata ABI spec.

For details on all possible return values, refer the design
documentation below:

ABI design documentation:
https://developer.arm.com/documentation/den0100/1-0?lang=en

Signed-off-by: Sona Mathew <SonaRebecca.Mathew@arm.com>
Change-Id: I70f0e2569cf92e6e02ad82e3e77874546232b89a

18 months agodocs: update release and code freeze dates
Harrison Mutai [Wed, 26 Apr 2023 15:39:08 +0000 (16:39 +0100)]
docs: update release and code freeze dates

Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
Change-Id: If782bd337d10213cb74503f4ea54ed304d6e4c34

18 months agofix(pmu): unconditionally save PMCR_EL0
Boyan Karatotev [Tue, 6 Dec 2022 09:03:42 +0000 (09:03 +0000)]
fix(pmu): unconditionally save PMCR_EL0

Reading back a RES0 bit does not necessarily mean it will be read as 0.
The Arm ARM explicitly warns against doing this. The PMU initialisation
code tries to set such bits to 1 (in MDCR_EL3) regardless of whether
they are in use or are RES0, checking their value could be wrong and
PMCR_EL0 might not end up being saved.

Save PMCR_EL0 unconditionally to prevent this. Remove the security state
change as the outgoing state is not relevant to what the root world
context should look like.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: Id43667d37b0e2da3ded0beaf23fa0d4f9013f470

18 months agofix(gicv3): restore scr_el3 after changing it
Boyan Karatotev [Thu, 23 Mar 2023 12:46:53 +0000 (12:46 +0000)]
fix(gicv3): restore scr_el3 after changing it

EL3's context is poorly defined as it is and polluting it further is not
a good idea. Put it back as it was before the function call.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: I9d13c9517962b501246989fd2126d08410191784

18 months agorefactor(cm): make SVE and SME build dependencies logical
Boyan Karatotev [Wed, 8 Mar 2023 16:29:26 +0000 (16:29 +0000)]
refactor(cm): make SVE and SME build dependencies logical

Currently, enabling SME forces SVE off. However, the SME enablement
requires SVE to be enabled, which is reflected in code. This is the
opposite of what the build flags require.

Further, the few platforms that enable SME also explicitly enable SVE.
Their platform.mk runs after the defaults.mk file so this override never
materializes. As a result, the override is only present on the
commandline.

Change it to something sensible where if SME is on then code can rely on
SVE being on too. Do this with a check in the Makefile as it is the more
widely used pattern. This maintains all valid use cases but subtly
changes corner cases no one uses at the moment to require a slightly
different combination of flags.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: If7ca3972ebc3c321e554533d7bc81af49c2472be

18 months agoMerge changes from topic "mp/group0_support" into integration
Manish Pandey [Thu, 4 May 2023 16:13:00 +0000 (18:13 +0200)]
Merge changes from topic "mp/group0_support" into integration

* changes:
  feat(tc): allow secure watchdog timer to trigger periodically
  feat(sbsa): helper api for refreshing watchdog timer

18 months agofeat(fvp): introduce PLATFORM_TEST_RAS_FFH config
Manish Pandey [Mon, 24 Apr 2023 13:58:55 +0000 (14:58 +0100)]
feat(fvp): introduce PLATFORM_TEST_RAS_FFH config

While doing RAS related tests there were few patches related with
fault injection and handling were applied through CI hooks.
These patches were invisible as they were applied and removed after the
build is done.

This patch introduces build macro PLATFORM_TEST_RAS_FFH and moves the
patches applied through CI under this.

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: Iddba52f3ebf21f575a473e50c607a944391156b9

18 months agofeat(tc): allow secure watchdog timer to trigger periodically
Madhukar Pappireddy [Wed, 22 Mar 2023 20:40:40 +0000 (15:40 -0500)]
feat(tc): allow secure watchdog timer to trigger periodically

This patch does the following:
  1. Configures SBSA secure watchdog timer as Group0 interrupt for
     TC platform while keeping it as Group1 secure interrupt for
     other CSS based SoCs.
  2. Programs the watchdog timer to trigger periodically
  3. Provides a Group0 interrupt handler for TC platform port to
     deactivate the EL3 interrupt due to expiry of secure watchdog
     timer and refresh it explicitly.

Change-Id: I3847d6eb7347c6ea0e527b97b096119ca1e6701b
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
18 months agofeat(sbsa): helper api for refreshing watchdog timer
Madhukar Pappireddy [Wed, 22 Mar 2023 20:27:22 +0000 (15:27 -0500)]
feat(sbsa): helper api for refreshing watchdog timer

This patch adds a helper API to explicitly refresh SBSA secure watchdog
timer. Please refer section A.3 of the following spec:

https://developer.arm.com/documentation/den0029/latest/

Change-Id: I2d0943792aea0092bee1e51d74b908348587e66b
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
18 months agoMerge "feat(fvp): define ns memory in the SPMC manifest" into integration
Madhukar Pappireddy [Thu, 4 May 2023 13:21:54 +0000 (15:21 +0200)]
Merge "feat(fvp): define ns memory in the SPMC manifest" into integration

18 months agoMerge changes from topic "allwinner_t507" into integration
Madhukar Pappireddy [Thu, 4 May 2023 13:19:50 +0000 (15:19 +0200)]
Merge changes from topic "allwinner_t507" into integration

* changes:
  feat(allwinner): add support for Allwinner T507 SoC
  feat(allwinner): add function to detect H616 die variant
  feat(allwinner): add extra CPU control registers
  refactor(allwinner): consolidate sunxi_cfg.h files

18 months agoMerge "fix(tc): only suspend booting after running plat tests" into integration
Sandrine Bailleux [Thu, 4 May 2023 09:07:42 +0000 (11:07 +0200)]
Merge "fix(tc): only suspend booting after running plat tests" into integration

18 months agofix(tc): only suspend booting after running plat tests
laurenw-arm [Wed, 3 May 2023 17:48:55 +0000 (12:48 -0500)]
fix(tc): only suspend booting after running plat tests

1. When doing a normal boot, tc_bl31_common_platform_setup() should
simply configure the platform and return.

2. When we are running the platform tests instead,
tc_bl31_common_platform_setup() should run the tests then suspend
booting (and thus never return).

We were incorreclty suspending the boot in case 1 as well. Put that
code under a preprocessor condition (PLATFORM_TEST_NV_COUNTERS or
PLATFORM_TEST_TFM_TESTSUITE) to fix this.

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: I7d20800e3bcd85261e2cdad325586d184e12a3e3

18 months agobuild!: check boolean flags are not empty
Yann Gautier [Mon, 24 Apr 2023 11:38:12 +0000 (13:38 +0200)]
build!: check boolean flags are not empty

For numeric flags, there is a check for the value to be set. Do the same
for boolean flags. This avoids issues where a flag is defined but
without a value, leading to potential unexpected behaviors.

Signed-off-by: Yann Gautier <yann.gautier@st.com>
Change-Id: Ib00da2784339471058887e93434d96ccba2aebb2

18 months agoMerge changes from topic "mp/group0_support" into integration
Olivier Deprez [Wed, 3 May 2023 16:15:40 +0000 (18:15 +0200)]
Merge changes from topic "mp/group0_support" into integration

* changes:
  docs(spm): support for handling Group0 interrupts
  feat(spmd): introduce platform handler for Group0 interrupt
  feat(spmd): add support for FFA_EL3_INTR_HANDLE_32 ABI
  feat(spmd): register handler for group0 interrupt from NWd

18 months agofix(psci): do not panic on illegal MPIDR
Andre Przywara [Thu, 27 Apr 2023 12:46:41 +0000 (13:46 +0100)]
fix(psci): do not panic on illegal MPIDR

Commit 66327414fb1e ("fix(psci): potential array overflow with cpu on")
changed an assert in the PSCI library's psci_cpu_on_start() function to
a runtime error message, followed by a panic. This does not seem right
for two reasons:
- We must not panic() triggered by conditions influenced by lower EL
  callers. If non-secure world provides illegal arguments to a PSCI
  call, we can easily detect this and return -PSCI_E_INVALID_PARAMS, as
  the PSCI spec demands. In fact this is done already, which brings us
  to the next reason:
- psci_cpu_on_start() is effectively a function private to the PSCI
  library: its prototype is in psci_private.h. It's just not static
  because it lives in a different code file from the main PSCI code.
  We check for illegal MPID values already in psci_cpu_on(), and return
  an error value to the caller, as we should. This function is the ONLY
  caller of psci_cpu_on_start(), so there is no way we get an illegal
  target_cpu argument into this function. An assert() is thus the proper
  way to check for this.

Mostly revert the patch mentioned above, just extending the assert so
that it does also check for not exceeding the array boundaries.
To harden the code, add a check against PLATFORM_MAX_CORE_COUNT in
psci_validate_mpidr(), and return with the proper PSCI error code if
this number is exceeded.

This also fixes the sun50i_a64 build with DEBUG=1, which exceeded an
SRAM limit due to the error message.

Change-Id: I48fc58d96b0173da5b934750f4cadf7884ef5e42
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
18 months agofix(n1sdp): add platform-specific power domain functions
Werner Lewis [Tue, 21 Feb 2023 14:40:12 +0000 (14:40 +0000)]
fix(n1sdp): add platform-specific power domain functions

Commit 4d8c18196378824e388cf31ef991ba8fbbb09cbf added a redistributor
power off to resolve an error on N1SDP/Morello. Prior to this fix,
turning off both cores in a cluster would cause a hang when powering
back on either core. This change introduced issues on other platforms
with a different GIC implementation, and was reverted in commit
60719e4e0965aead49d927f12bf2a37bd2629012.

This commit uses the previous fix in platform-specific implementations
of power domain off/suspend functions.

Signed-off-by: Werner Lewis <werner.lewis@arm.com>
Change-Id: I52c463646c494fe931ff4ce47afb940a56978fcd

18 months agofix(morello): add platform-specific power domain functions
Werner Lewis [Wed, 15 Feb 2023 16:03:27 +0000 (16:03 +0000)]
fix(morello): add platform-specific power domain functions

Commit 4d8c18196378824e388cf31ef991ba8fbbb09cbf added a redistributor
power off to resolve an error on N1SDP/Morello. Prior to this fix,
turning off both cores in a cluster would cause a hang when powering
back on either core. This change introduced issues on other platforms
with a different GIC implementation, and was reverted in commit
60719e4e0965aead49d927f12bf2a37bd2629012.

This commit uses the previous fix in platform-specific implementations
of power domain off/suspend functions.

Signed-off-by: Werner Lewis <werner.lewis@arm.com>
Change-Id: Ib7689a5e08ada3862406fa92019a6f0bcfb48d79

18 months agoMerge changes I92826714,I9431f9d1 into integration
Manish Pandey [Wed, 3 May 2023 13:47:45 +0000 (15:47 +0200)]
Merge changes I92826714,I9431f9d1 into integration

* changes:
  build(psci): move `runtime_errata.S` to PSCI
  build: allow BL-specific includes/definitions

18 months agobuild(psci): move `runtime_errata.S` to PSCI
Chris Kay [Tue, 28 Mar 2023 16:38:02 +0000 (17:38 +0100)]
build(psci): move `runtime_errata.S` to PSCI

Move the runtime errata source file into the PSCI library, as PSCI is
the only component directly dependent on it, and it doesn't require
internal access to the CPUs library.

Change-Id: I92826714d49b1b0131f62c158543b4c167ab9aa8
Signed-off-by: Chris Kay <chris.kay@arm.com>
18 months agobuild: allow BL-specific includes/definitions
Chris Kay [Wed, 22 Mar 2023 15:42:32 +0000 (15:42 +0000)]
build: allow BL-specific includes/definitions

This change introduces the `BLx_INCLUDE_DIRS` and `BLx_DEFINES`
Makefile variables, which can be used to append include directories
and preprocessor definitions to specific images created using the
`MAKE_BL` Makefile macro.

Change-Id: I9431f9d1cbde5b0b2624d9ce128a4f043c74c87f
Signed-off-by: Chris Kay <chris.kay@arm.com>
18 months agoMerge changes I9d06e0ee,I6980e84f into integration
Manish Pandey [Wed, 3 May 2023 13:10:45 +0000 (15:10 +0200)]
Merge changes I9d06e0ee,I6980e84f into integration

* changes:
  feat(tegra): implement 'pwr_domain_off_early' handler
  feat(psci): introduce 'pwr_domain_off_early' hook

18 months agofix(build): add a default value for INVERTED_MEMMAP
Yann Gautier [Mon, 24 Apr 2023 11:31:27 +0000 (13:31 +0200)]
fix(build): add a default value for INVERTED_MEMMAP

It is needed to check the validity of boolean flags with the updated
macro assert_boolean.

Signed-off-by: Yann Gautier <yann.gautier@st.com>
Change-Id: I185beb55606a4ca435d2fee2092fc61725859aa1

18 months agofix(a5ds): add default value for ARM_DISABLE_TRUSTED_WDOG
Manish Pandey [Tue, 2 May 2023 12:43:22 +0000 (13:43 +0100)]
fix(a5ds): add default value for ARM_DISABLE_TRUSTED_WDOG

With introduction of check on boolean flags, it should be ensured that
each boolean flag has default value provided by platform.

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: Ia92c3dded842e14099b4a7667569605d7066a8f9

18 months agofix(st-crypto): move flag control into source code
Lionel Debieve [Wed, 3 May 2023 09:40:09 +0000 (11:40 +0200)]
fix(st-crypto): move flag control into source code

Remove the control from the include file to avoid compilation
issue. Add the check in the source code instead.

Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
Change-Id: I533f829607f76389399a3e8dbc3c6095278562ab

18 months agofix(stm32mp1): always define PKA algos flags
Yann Gautier [Mon, 24 Apr 2023 09:44:51 +0000 (11:44 +0200)]
fix(stm32mp1): always define PKA algos flags

The flags to set PKA algo are set to 0 when TRUSTED_BOARD_BOOT is not
set.

Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
Change-Id: Ib70a2bc51451a2047d7a50a8307e9063d4a2a0ee

18 months agofix(stm32mp1): remove boolean check on PLAT_TBBR_IMG_DEF
Yann Gautier [Mon, 24 Apr 2023 09:35:40 +0000 (11:35 +0200)]
fix(stm32mp1): remove boolean check on PLAT_TBBR_IMG_DEF

This flag just needs to be defined, and does not need to have a boolean
value. Remove it from the assert_booleans check.

Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
Change-Id: I4e4c9ae1e5003ca2cf7c0c0e31d1561d032937c8

18 months agofeat(fvp): define ns memory in the SPMC manifest
J-Alves [Thu, 16 Mar 2023 15:26:52 +0000 (15:26 +0000)]
feat(fvp): define ns memory in the SPMC manifest

The SPMC (Hafnium) looks for secure and non-secure ranges
in its manifest.
Those relate with ranges that can be used by SPs in their
FF-A manifests.
The NS memory that is not used by SPs will be assigned
to the NWd, for it to share memory with SPs as needed.
Thus, this limits the memory the NWd can share with SPs,
to prevent NWD VMs from sharing memory that belongs
to other critical components.

Signed-off-by: J-Alves <joao.alves@arm.com>
Change-Id: Iad03eb138a57068fbb18c53141bdf6bf9c171b28