]> git.baikalelectronics.ru Git - arm-tf.git/log
arm-tf.git
18 months agodocs(psci): expound runtime instrumentation docs
Harrison Mutai [Wed, 8 Mar 2023 12:01:48 +0000 (12:01 +0000)]
docs(psci): expound runtime instrumentation docs

Change-Id: I3c30b44d4196c30fd07373282150e543959fce1a
Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
18 months agoMerge "fix: increase BL32 limit" into integration
Manish Pandey [Thu, 11 May 2023 08:46:36 +0000 (10:46 +0200)]
Merge "fix: increase BL32 limit" into integration

18 months agofix: increase BL32 limit
Manish V Badarkhe [Sun, 30 Apr 2023 08:25:15 +0000 (09:25 +0100)]
fix: increase BL32 limit

BL32_LIMIT has been increased from 2MB to 4MB to accommodate
the latest tee.bin (it is around ~2.1MB).

Change-Id: I47b770bf23c23d38931a2b3316d076b829338d70
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Co-developed-by: Juan Pablo Conde <juanpablo.conde@arm.com>
18 months agoMerge "fix(spmd): fix build error with spmd" into integration
Madhukar Pappireddy [Wed, 10 May 2023 22:44:49 +0000 (00:44 +0200)]
Merge "fix(spmd): fix build error with spmd" into integration

18 months agofix(spmd): fix build error with spmd
Govindraj Raja [Wed, 10 May 2023 19:50:36 +0000 (14:50 -0500)]
fix(spmd): fix build error with spmd

Currently when we build with 'SPD=spmd SPMD_SPM_AT_SEL2=0'
options, this causes a build failure as
'plat_spmd_handle_group0_interrupt' is called irrespective of
'SPMD_SPM_AT_SEL2' usage in 'spmd_group0_interrupt_handler_nwd'

So make 'plat_spmd_handle_group0_interrupt' dummy implementation
available just when spmd is enabled and SPMC_AT_EL3 is disabled.

Change-Id: Iaccd38faab81671c98f9165f318145187dca9bc2
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
18 months agoMerge "fix(psci): do not panic on illegal MPIDR" into integration
Manish Pandey [Wed, 10 May 2023 16:56:46 +0000 (18:56 +0200)]
Merge "fix(psci): do not panic on illegal MPIDR" into integration

18 months agoMerge "build(fpga): reduce cpu_libs to tc and neoverse" into integration
Manish V Badarkhe [Wed, 10 May 2023 16:34:31 +0000 (18:34 +0200)]
Merge "build(fpga): reduce cpu_libs to tc and neoverse" into integration

18 months agobuild(fpga): reduce cpu_libs to tc and neoverse
Daniel Boulby [Wed, 10 May 2023 13:42:43 +0000 (14:42 +0100)]
build(fpga): reduce cpu_libs to tc and neoverse

Change-Id: I20e88d5e712dafa7364b7932b8b4aaa9051bea55
Signed-off-by: Daniel Boulby <daniel.boulby@arm.com>
18 months agoMerge "docs: update release and code freeze dates" into integration
Joanna Farley [Wed, 10 May 2023 13:16:40 +0000 (15:16 +0200)]
Merge "docs: update release and code freeze dates" into integration

18 months agoMerge "fix(pmu): unconditionally save PMCR_EL0" into integration
Manish Pandey [Wed, 10 May 2023 12:12:25 +0000 (14:12 +0200)]
Merge "fix(pmu): unconditionally save PMCR_EL0" into integration

18 months agoMerge changes I5bb43cb0,I6aebe2ca,Ib59df16a,I9d037ab2,I9df5a465, ... into integration
Manish V Badarkhe [Tue, 9 May 2023 21:29:52 +0000 (23:29 +0200)]
Merge changes I5bb43cb0,I6aebe2ca,Ib59df16a,I9d037ab2,I9df5a465, ... into integration

* changes:
  fix(msm8916): add timeout for crash console TX flush
  style(msm8916): use size macros
  feat(msm8916): expose more timer frames
  fix(msm8916): drop unneeded initialization of CNTACR
  build(msm8916): disable unneeded workarounds
  fix(msm8916): flush dcache after writing msm8916_entry_point
  fix(msm8916): print \r before \n on UART console

18 months agoMerge changes I1bfa797e,I0ec7a70e into integration
Manish Pandey [Tue, 9 May 2023 20:05:52 +0000 (22:05 +0200)]
Merge changes I1bfa797e,I0ec7a70e into integration

* changes:
  fix(tree): correct some typos
  fix(rockchip): use semicolon instead of comma

18 months agoMerge changes from topic "mp/feat_ras" into integration
Manish Pandey [Tue, 9 May 2023 19:48:45 +0000 (21:48 +0200)]
Merge changes from topic "mp/feat_ras" into integration

* changes:
  refactor(cpufeat): enable FEAT_RAS for FEAT_STATE_CHECKED
  refactor(ras): replace RAS_EXTENSION with FEAT_RAS

18 months agofix(msm8916): add timeout for crash console TX flush
Stephan Gerhold [Thu, 6 Apr 2023 19:43:37 +0000 (21:43 +0200)]
fix(msm8916): add timeout for crash console TX flush

Resetting the UART DM controller while there are still remaining
characters in the FIFO often results in corruption on the UART receiver
side. To avoid this the msm8916 crash console implementation tries to
wait until the TX FIFO is empty.

Unfortunately this might spin forever if the transmitter was disabled
before it has fully finished transmitting. In this case the TXEMT bit
console_uartdm_core_flush is waiting for will never get set.

There seems to be no good way to detect if the transmitter is actually
enabled via the status registers. However, the TX FIFO is fairly small
and should not take too long to get flushed, so fix this by simply
limiting the amount of iterations with a short timeout.

Move the code to console_uartdm_core_init to ensure that this always
happens before resetting the transmitter (also during initialization).

Change-Id: I5bb43cb0b6c029bcd15e253d60d36c0b310e108b
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agostyle(msm8916): use size macros
Stephan Gerhold [Sun, 26 Mar 2023 11:07:25 +0000 (13:07 +0200)]
style(msm8916): use size macros

Use the pre-defined size macros (SZ_*) for more clarity and to avoid
having to add comments to each size represented by hexadecimal numbers.

Change-Id: I6aebe2caf1365279670955b9b507dec7d7b04457
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agofeat(msm8916): expose more timer frames
Stephan Gerhold [Wed, 22 Mar 2023 17:15:15 +0000 (18:15 +0100)]
feat(msm8916): expose more timer frames

The memory-mapped generic timer on msm8916 has 7 timer frames, but
currently only one is exposed for usage in the non-secure world.

The platform port is currently only designed to be used as minimal PSCI
implementation, without secure world that could make use of the other
timer frames. Let's make all of them available to the normal world.

If needed this could still be changed later by reserving some timer
frames conditionally to a specific SPD being enabled in the build.

Change-Id: Ib59df16aa1fd3dbc875ab6369c133737830c98c6
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agofix(msm8916): drop unneeded initialization of CNTACR
Stephan Gerhold [Wed, 22 Mar 2023 17:15:15 +0000 (18:15 +0100)]
fix(msm8916): drop unneeded initialization of CNTACR

Normal world software is responsible to initialize CNTACR as needed.
There is no existing software for msm8916 that depends on having this
initialization in BL31 so drop it before anything starts to rely on it.

Related issue: https://github.com/ARM-software/tf-issues/issues/170

Change-Id: I9d037ab218c0c1c8a5d5523722013eba531f4728
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agobuild(msm8916): disable unneeded workarounds
Stephan Gerhold [Tue, 14 Mar 2023 10:09:44 +0000 (11:09 +0100)]
build(msm8916): disable unneeded workarounds

The Cortex-A53 cores used in the msm8916 platform are not affected by
CVE-2017-5715 and CVE-2022-23960, so disable the workarounds for them
to drop the unused code from the compiled binary.

Change-Id: I9df5a4657c4fd90702b4db4e82d4ee1a2f60303c
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agofix(msm8916): flush dcache after writing msm8916_entry_point
Stephan Gerhold [Sat, 17 Sep 2022 16:21:20 +0000 (18:21 +0200)]
fix(msm8916): flush dcache after writing msm8916_entry_point

msm8916_entry_point is read with caches off (and even from two
different physical addresses when read through the "boot remapper"),
so it should be flushed to RAM after writing it.

Change-Id: I5c8193954bb28043b0a46fb2038f629bd8796c74
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agofix(msm8916): print \r before \n on UART console
Stephan Gerhold [Tue, 23 Aug 2022 20:33:11 +0000 (22:33 +0200)]
fix(msm8916): print \r before \n on UART console

UART drivers in TF-A are expected to print \r before \n. Some terminal
emulators expect \r\n as line endings by default so not doing this
causes broken line breaks.

Change-Id: I271a35a7c6907441bc71713b0b6a1da19da96878
Signed-off-by: Stephan Gerhold <stephan@gerhold.net>
18 months agoMerge changes from topic "srm/Errata_ABI_El3" into integration
Madhukar Pappireddy [Tue, 9 May 2023 19:15:54 +0000 (21:15 +0200)]
Merge changes from topic "srm/Errata_ABI_El3" into integration

* changes:
  docs(errata_abi): document the errata abi changes
  feat(fvp): enable errata management interface
  fix(cpus): workaround platforms non-arm interconnect
  refactor(errata_abi): factor in non-arm interconnect
  feat(errata_abi): errata management firmware interface

18 months agoMerge "fix(qemu-sbsa): enable FGT" into integration
Bipin Ravi [Tue, 9 May 2023 17:04:34 +0000 (19:04 +0200)]
Merge "fix(qemu-sbsa): enable FGT" into integration

18 months agoMerge changes from topic "bk/context_refactor" into integration
Manish V Badarkhe [Tue, 9 May 2023 16:15:01 +0000 (18:15 +0200)]
Merge changes from topic "bk/context_refactor" into integration

* changes:
  fix(gicv3): restore scr_el3 after changing it
  refactor(cm): make SVE and SME build dependencies logical

18 months agoMerge "docs: update TZC secured DRAM map for FVP and Juno" into integration
Madhukar Pappireddy [Tue, 9 May 2023 15:14:41 +0000 (17:14 +0200)]
Merge "docs: update TZC secured DRAM map for FVP and Juno" into integration

18 months agofix(tree): correct some typos
Elyes Haouas [Mon, 13 Feb 2023 08:14:48 +0000 (09:14 +0100)]
fix(tree): correct some typos

found using codespell (https://github.com/codespell-project/codespell).

Signed-off-by: Elyes Haouas <ehaouas@noos.fr>
Change-Id: I1bfa797e3460adddeefa916bb68e22beddaf6373

18 months agofix(rockchip): use semicolon instead of comma
Elyes Haouas [Tue, 21 Feb 2023 14:21:43 +0000 (15:21 +0100)]
fix(rockchip): use semicolon instead of comma

Use semicolon insted of comma at the end of line.

Change-Id: I0ec7a70ec659333c98d586f7bebd5d91bd6c6cc1
Signed-off-by: Elyes Haouas <ehaouas@noos.fr>
18 months agoMerge changes I06b35f11,If80573d6 into integration
Manish Pandey [Tue, 9 May 2023 14:51:38 +0000 (16:51 +0200)]
Merge changes I06b35f11,If80573d6 into integration

* changes:
  docs: remove plat_convert_pk() interface from release doc
  chore(io): remove io_dummy driver

18 months agoMerge "feat(mt8188): add MT8188 SPM debug logs" into integration
Manish Pandey [Tue, 9 May 2023 14:00:50 +0000 (16:00 +0200)]
Merge "feat(mt8188): add MT8188 SPM debug logs" into integration

18 months agorefactor(cpufeat): enable FEAT_RAS for FEAT_STATE_CHECKED
Andre Przywara [Fri, 27 Jan 2023 12:25:49 +0000 (12:25 +0000)]
refactor(cpufeat): enable FEAT_RAS for FEAT_STATE_CHECKED

At the moment we only support FEAT_RAS to be either unconditionally
compiled in, or to be not supported at all.

Add support for runtime detection (FEAT_RAS=2), by splitting
is_armv8_2_feat_ras_present() into an ID register reading function and
a second function to report the support status. That function considers
both build time settings and runtime information (if needed), and is
used before we access RAS related registers.

Also move the context saving code from assembly to C, and use the new
is_feat_ras_supported() function to guard its execution.

Change the FVP platform default to the now supported dynamic
option (=2), so the right decision can be made by the code at runtime.

Change-Id: I30498f72fd80b136850856244687400456a03d0e
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
18 months agorefactor(ras): replace RAS_EXTENSION with FEAT_RAS
Manish Pandey [Mon, 13 Feb 2023 12:39:17 +0000 (12:39 +0000)]
refactor(ras): replace RAS_EXTENSION with FEAT_RAS

The current usage of RAS_EXTENSION in TF-A codebase is to cater for two
things in TF-A :
1. Pull in necessary framework and platform hooks for Firmware first
   handling(FFH) of RAS errors.
2. Manage the FEAT_RAS extension when switching the worlds.

FFH means that all the EAs from NS are trapped in EL3 first and signaled
to NS world later after the first handling is done in firmware. There is
an alternate way of handling RAS errors viz Kernel First handling(KFH).
Tying FEAT_RAS to RAS_EXTENSION build flag was not correct as the
feature is needed for proper handling KFH in as well.

This patch breaks down the RAS_EXTENSION flag into a flag to denote the
CPU architecture `ENABLE_FEAT_RAS` which is used in context management
during world switch and another flag `RAS_FFH_SUPPORT` to pull in
required framework and platform hooks for FFH.

Proper support for KFH will be added in future patches.

BREAKING CHANGE: The previous RAS_EXTENSION is now deprecated. The
equivalent functionality can be achieved by the following
2 options:
 - ENABLE_FEAT_RAS
 - RAS_FFH_SUPPORT

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: I1abb9ab6622b8f1b15712b12f17612804d48a6ec

18 months agoMerge changes from topic "assert_boolean_set" into integration
Manish Pandey [Tue, 9 May 2023 09:26:11 +0000 (11:26 +0200)]
Merge changes from topic "assert_boolean_set" into integration

* changes:
  build!: check boolean flags are not empty
  fix(build): add a default value for INVERTED_MEMMAP
  fix(a5ds): add default value for ARM_DISABLE_TRUSTED_WDOG
  fix(st-crypto): move flag control into source code
  fix(stm32mp1): always define PKA algos flags
  fix(stm32mp1): remove boolean check on PLAT_TBBR_IMG_DEF

18 months agoMerge changes from topics "gr/gcc12", "jc/toolchain_update_2.9" into integration
Manish Pandey [Tue, 9 May 2023 09:04:23 +0000 (11:04 +0200)]
Merge changes from topics "gr/gcc12", "jc/toolchain_update_2.9" into integration

* changes:
  docs(build): update GCC to 12.2.Rel1 version
  fix(build): allow lower address access with gcc-12

18 months agodocs(build): update GCC to 12.2.Rel1 version
Jayanth Dodderi Chidanand [Tue, 18 Apr 2023 09:50:56 +0000 (10:50 +0100)]
docs(build): update GCC to 12.2.Rel1 version

Updating toolchain to the latest production release version
12.2.Rel1 publicly available on https://developer.arm.com/

We build TF-A in CI using:
AArch32 bare-metal target (arm-none-eabi)
AArch64 ELF bare-metal target (aarch64-none-elf)

Change-Id: Ib603cf7417e6878683a1100d5f55311188e36e8e
Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
18 months agofix(build): allow lower address access with gcc-12
Govindraj Raja [Fri, 5 May 2023 14:09:36 +0000 (09:09 -0500)]
fix(build): allow lower address access with gcc-12

With gcc-12 any lower address access can trigger a warning/error
this would be useful in other parts of system but in TF-A
there are various reasons to access to the lower address ranges,
example using mmio_read_*/writes_*

So setup to allow access to lower addresses while using gcc-12

Change-Id: Id1b4012b13bc6876d83b90a347fee12478a1921d
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
18 months agoMerge "feat(fvp): introduce PLATFORM_TEST_RAS_FFH config" into integration
Manish Pandey [Tue, 9 May 2023 08:19:18 +0000 (10:19 +0200)]
Merge "feat(fvp): introduce PLATFORM_TEST_RAS_FFH config" into integration

18 months agodocs: update TZC secured DRAM map for FVP and Juno
Manish V Badarkhe [Tue, 7 Mar 2023 10:21:30 +0000 (10:21 +0000)]
docs: update TZC secured DRAM map for FVP and Juno

Updated the documentation to include missing details about the
TZC secured DRAM mapping for the FVP and Juno platforms.

Change-Id: I10e59b9f9686fa2fef97f89864ebc272b10e5c0b
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
18 months agofeat(mt8188): add MT8188 SPM debug logs
Jason Chen [Wed, 3 May 2023 11:11:29 +0000 (19:11 +0800)]
feat(mt8188): add MT8188 SPM debug logs

Add debug logs for tracking the status of suspend and resume.

Change-Id: Id2d2ab06fadb3118ab66f816937e0dd6e43dbdc3
Signed-off-by: Jason Chen <Jason-ch.Chen@mediatek.com>
18 months agodocs(errata_abi): document the errata abi changes
Sona Mathew [Wed, 15 Mar 2023 14:40:36 +0000 (09:40 -0500)]
docs(errata_abi): document the errata abi changes

Updated errata ABI feature enable flag and the errata non-arm
interconnect based flag, the default values for when the
feature is not enabled.

Change-Id: Ieb2144a1bc38f4ed684fda8280842a18964ba148
Signed-off-by: Sona Mathew <SonaRebecca.Mathew@arm.com>
18 months agofeat(fvp): enable errata management interface
Sona Mathew [Tue, 14 Mar 2023 22:58:13 +0000 (17:58 -0500)]
feat(fvp): enable errata management interface

Errata ABI feature specific build flag, flag to enable
CPUs in the cpu list, flags to test non-arm interconnect based
errata flags when enabled from a platform level.
Added to the FVP platform makefile to test the errata abi feature
implementation.

The flags to enable CPUs in the cpu list will be removed once
synchronized with the errata framework.

Change-Id: I30877a22ac1348906a6ddfb26f9e8839912d3572
Signed-off-by: Sona Mathew <SonaRebecca.Mathew@arm.com>
18 months agofix(cpus): workaround platforms non-arm interconnect
Sona Mathew [Tue, 14 Mar 2023 21:50:36 +0000 (16:50 -0500)]
fix(cpus): workaround platforms non-arm interconnect

The workarounds for these below mentioned errata are not implemented
in EL3, but the flags can be enabled/disabled at a platform level
based on arm/non-arm interconnect IP. The ABI helps assist the Kernel
in the process of mitigation for the following errata:

Cortex-A715:   erratum 2701951
Neoverse V2:   erratum 2719103
Cortex-A710:   erratum 2701952
Cortex-X2:     erratum 2701952
Neoverse N2:   erratum 2728475
Neoverse V1:   erratum 2701953
Cortex-A78:    erratum 2712571
Cortex-A78AE:  erratum 2712574
Cortex-A78C:   erratum 2712575

EL3 provides an appropriate return value via errata ABI when the
kernel makes an SMC call using the EM_CPU_ERRATUM_FEATURES FID with the
appropriate erratum ID.

Change-Id: I35bd69d812dba37410dd8bc2bbde20d4955b0850
Signed-off-by: Sona Mathew <SonaRebecca.Mathew@arm.com>
18 months agorefactor(errata_abi): factor in non-arm interconnect
Sona Mathew [Tue, 14 Mar 2023 19:02:03 +0000 (14:02 -0500)]
refactor(errata_abi): factor in non-arm interconnect

Workaround to help enable the kernel to query errata status using the
errata abi feature for platforms with a non-arm interconnect.

Change-Id: I47b03eaee5a0a763056ae71883fa30dfacb9b3f7
Signed-off-by: Sona Mathew <SonaRebecca.Mathew@arm.com>
18 months agofeat(errata_abi): errata management firmware interface
Sona Mathew [Sat, 19 Nov 2022 00:05:38 +0000 (18:05 -0600)]
feat(errata_abi): errata management firmware interface

This patch adds the errata management firmware interface for lower ELs
to discover details about CPU erratum. Based on the CPU erratum
identifier the interface enables the OS to find the mitigation of an
erratum in EL3.

The ABI can only be present in a system that is compliant with SMCCCv1.1
or higher. This implements v1.0 of the errata ABI spec.

For details on all possible return values, refer the design
documentation below:

ABI design documentation:
https://developer.arm.com/documentation/den0100/1-0?lang=en

Signed-off-by: Sona Mathew <SonaRebecca.Mathew@arm.com>
Change-Id: I70f0e2569cf92e6e02ad82e3e77874546232b89a

18 months agodocs: update release and code freeze dates
Harrison Mutai [Wed, 26 Apr 2023 15:39:08 +0000 (16:39 +0100)]
docs: update release and code freeze dates

Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
Change-Id: If782bd337d10213cb74503f4ea54ed304d6e4c34

18 months agofix(pmu): unconditionally save PMCR_EL0
Boyan Karatotev [Tue, 6 Dec 2022 09:03:42 +0000 (09:03 +0000)]
fix(pmu): unconditionally save PMCR_EL0

Reading back a RES0 bit does not necessarily mean it will be read as 0.
The Arm ARM explicitly warns against doing this. The PMU initialisation
code tries to set such bits to 1 (in MDCR_EL3) regardless of whether
they are in use or are RES0, checking their value could be wrong and
PMCR_EL0 might not end up being saved.

Save PMCR_EL0 unconditionally to prevent this. Remove the security state
change as the outgoing state is not relevant to what the root world
context should look like.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: Id43667d37b0e2da3ded0beaf23fa0d4f9013f470

18 months agofix(gicv3): restore scr_el3 after changing it
Boyan Karatotev [Thu, 23 Mar 2023 12:46:53 +0000 (12:46 +0000)]
fix(gicv3): restore scr_el3 after changing it

EL3's context is poorly defined as it is and polluting it further is not
a good idea. Put it back as it was before the function call.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: I9d13c9517962b501246989fd2126d08410191784

18 months agorefactor(cm): make SVE and SME build dependencies logical
Boyan Karatotev [Wed, 8 Mar 2023 16:29:26 +0000 (16:29 +0000)]
refactor(cm): make SVE and SME build dependencies logical

Currently, enabling SME forces SVE off. However, the SME enablement
requires SVE to be enabled, which is reflected in code. This is the
opposite of what the build flags require.

Further, the few platforms that enable SME also explicitly enable SVE.
Their platform.mk runs after the defaults.mk file so this override never
materializes. As a result, the override is only present on the
commandline.

Change it to something sensible where if SME is on then code can rely on
SVE being on too. Do this with a check in the Makefile as it is the more
widely used pattern. This maintains all valid use cases but subtly
changes corner cases no one uses at the moment to require a slightly
different combination of flags.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: If7ca3972ebc3c321e554533d7bc81af49c2472be

18 months agoMerge changes from topic "mp/group0_support" into integration
Manish Pandey [Thu, 4 May 2023 16:13:00 +0000 (18:13 +0200)]
Merge changes from topic "mp/group0_support" into integration

* changes:
  feat(tc): allow secure watchdog timer to trigger periodically
  feat(sbsa): helper api for refreshing watchdog timer

18 months agofeat(fvp): introduce PLATFORM_TEST_RAS_FFH config
Manish Pandey [Mon, 24 Apr 2023 13:58:55 +0000 (14:58 +0100)]
feat(fvp): introduce PLATFORM_TEST_RAS_FFH config

While doing RAS related tests there were few patches related with
fault injection and handling were applied through CI hooks.
These patches were invisible as they were applied and removed after the
build is done.

This patch introduces build macro PLATFORM_TEST_RAS_FFH and moves the
patches applied through CI under this.

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: Iddba52f3ebf21f575a473e50c607a944391156b9

18 months agofeat(tc): allow secure watchdog timer to trigger periodically
Madhukar Pappireddy [Wed, 22 Mar 2023 20:40:40 +0000 (15:40 -0500)]
feat(tc): allow secure watchdog timer to trigger periodically

This patch does the following:
  1. Configures SBSA secure watchdog timer as Group0 interrupt for
     TC platform while keeping it as Group1 secure interrupt for
     other CSS based SoCs.
  2. Programs the watchdog timer to trigger periodically
  3. Provides a Group0 interrupt handler for TC platform port to
     deactivate the EL3 interrupt due to expiry of secure watchdog
     timer and refresh it explicitly.

Change-Id: I3847d6eb7347c6ea0e527b97b096119ca1e6701b
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
18 months agofeat(sbsa): helper api for refreshing watchdog timer
Madhukar Pappireddy [Wed, 22 Mar 2023 20:27:22 +0000 (15:27 -0500)]
feat(sbsa): helper api for refreshing watchdog timer

This patch adds a helper API to explicitly refresh SBSA secure watchdog
timer. Please refer section A.3 of the following spec:

https://developer.arm.com/documentation/den0029/latest/

Change-Id: I2d0943792aea0092bee1e51d74b908348587e66b
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
18 months agoMerge "feat(fvp): define ns memory in the SPMC manifest" into integration
Madhukar Pappireddy [Thu, 4 May 2023 13:21:54 +0000 (15:21 +0200)]
Merge "feat(fvp): define ns memory in the SPMC manifest" into integration

18 months agoMerge changes from topic "allwinner_t507" into integration
Madhukar Pappireddy [Thu, 4 May 2023 13:19:50 +0000 (15:19 +0200)]
Merge changes from topic "allwinner_t507" into integration

* changes:
  feat(allwinner): add support for Allwinner T507 SoC
  feat(allwinner): add function to detect H616 die variant
  feat(allwinner): add extra CPU control registers
  refactor(allwinner): consolidate sunxi_cfg.h files

18 months agoMerge "fix(tc): only suspend booting after running plat tests" into integration
Sandrine Bailleux [Thu, 4 May 2023 09:07:42 +0000 (11:07 +0200)]
Merge "fix(tc): only suspend booting after running plat tests" into integration

18 months agofix(tc): only suspend booting after running plat tests
laurenw-arm [Wed, 3 May 2023 17:48:55 +0000 (12:48 -0500)]
fix(tc): only suspend booting after running plat tests

1. When doing a normal boot, tc_bl31_common_platform_setup() should
simply configure the platform and return.

2. When we are running the platform tests instead,
tc_bl31_common_platform_setup() should run the tests then suspend
booting (and thus never return).

We were incorreclty suspending the boot in case 1 as well. Put that
code under a preprocessor condition (PLATFORM_TEST_NV_COUNTERS or
PLATFORM_TEST_TFM_TESTSUITE) to fix this.

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: I7d20800e3bcd85261e2cdad325586d184e12a3e3

18 months agobuild!: check boolean flags are not empty
Yann Gautier [Mon, 24 Apr 2023 11:38:12 +0000 (13:38 +0200)]
build!: check boolean flags are not empty

For numeric flags, there is a check for the value to be set. Do the same
for boolean flags. This avoids issues where a flag is defined but
without a value, leading to potential unexpected behaviors.

Signed-off-by: Yann Gautier <yann.gautier@st.com>
Change-Id: Ib00da2784339471058887e93434d96ccba2aebb2

18 months agoMerge changes from topic "mp/group0_support" into integration
Olivier Deprez [Wed, 3 May 2023 16:15:40 +0000 (18:15 +0200)]
Merge changes from topic "mp/group0_support" into integration

* changes:
  docs(spm): support for handling Group0 interrupts
  feat(spmd): introduce platform handler for Group0 interrupt
  feat(spmd): add support for FFA_EL3_INTR_HANDLE_32 ABI
  feat(spmd): register handler for group0 interrupt from NWd

18 months agofix(psci): do not panic on illegal MPIDR
Andre Przywara [Thu, 27 Apr 2023 12:46:41 +0000 (13:46 +0100)]
fix(psci): do not panic on illegal MPIDR

Commit 66327414fb1e ("fix(psci): potential array overflow with cpu on")
changed an assert in the PSCI library's psci_cpu_on_start() function to
a runtime error message, followed by a panic. This does not seem right
for two reasons:
- We must not panic() triggered by conditions influenced by lower EL
  callers. If non-secure world provides illegal arguments to a PSCI
  call, we can easily detect this and return -PSCI_E_INVALID_PARAMS, as
  the PSCI spec demands. In fact this is done already, which brings us
  to the next reason:
- psci_cpu_on_start() is effectively a function private to the PSCI
  library: its prototype is in psci_private.h. It's just not static
  because it lives in a different code file from the main PSCI code.
  We check for illegal MPID values already in psci_cpu_on(), and return
  an error value to the caller, as we should. This function is the ONLY
  caller of psci_cpu_on_start(), so there is no way we get an illegal
  target_cpu argument into this function. An assert() is thus the proper
  way to check for this.

Mostly revert the patch mentioned above, just extending the assert so
that it does also check for not exceeding the array boundaries.
To harden the code, add a check against PLATFORM_MAX_CORE_COUNT in
psci_validate_mpidr(), and return with the proper PSCI error code if
this number is exceeded.

This also fixes the sun50i_a64 build with DEBUG=1, which exceeded an
SRAM limit due to the error message.

Change-Id: I48fc58d96b0173da5b934750f4cadf7884ef5e42
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
18 months agoMerge changes I92826714,I9431f9d1 into integration
Manish Pandey [Wed, 3 May 2023 13:47:45 +0000 (15:47 +0200)]
Merge changes I92826714,I9431f9d1 into integration

* changes:
  build(psci): move `runtime_errata.S` to PSCI
  build: allow BL-specific includes/definitions

18 months agobuild(psci): move `runtime_errata.S` to PSCI
Chris Kay [Tue, 28 Mar 2023 16:38:02 +0000 (17:38 +0100)]
build(psci): move `runtime_errata.S` to PSCI

Move the runtime errata source file into the PSCI library, as PSCI is
the only component directly dependent on it, and it doesn't require
internal access to the CPUs library.

Change-Id: I92826714d49b1b0131f62c158543b4c167ab9aa8
Signed-off-by: Chris Kay <chris.kay@arm.com>
18 months agobuild: allow BL-specific includes/definitions
Chris Kay [Wed, 22 Mar 2023 15:42:32 +0000 (15:42 +0000)]
build: allow BL-specific includes/definitions

This change introduces the `BLx_INCLUDE_DIRS` and `BLx_DEFINES`
Makefile variables, which can be used to append include directories
and preprocessor definitions to specific images created using the
`MAKE_BL` Makefile macro.

Change-Id: I9431f9d1cbde5b0b2624d9ce128a4f043c74c87f
Signed-off-by: Chris Kay <chris.kay@arm.com>
18 months agoMerge changes I9d06e0ee,I6980e84f into integration
Manish Pandey [Wed, 3 May 2023 13:10:45 +0000 (15:10 +0200)]
Merge changes I9d06e0ee,I6980e84f into integration

* changes:
  feat(tegra): implement 'pwr_domain_off_early' handler
  feat(psci): introduce 'pwr_domain_off_early' hook

18 months agofix(build): add a default value for INVERTED_MEMMAP
Yann Gautier [Mon, 24 Apr 2023 11:31:27 +0000 (13:31 +0200)]
fix(build): add a default value for INVERTED_MEMMAP

It is needed to check the validity of boolean flags with the updated
macro assert_boolean.

Signed-off-by: Yann Gautier <yann.gautier@st.com>
Change-Id: I185beb55606a4ca435d2fee2092fc61725859aa1

18 months agofix(a5ds): add default value for ARM_DISABLE_TRUSTED_WDOG
Manish Pandey [Tue, 2 May 2023 12:43:22 +0000 (13:43 +0100)]
fix(a5ds): add default value for ARM_DISABLE_TRUSTED_WDOG

With introduction of check on boolean flags, it should be ensured that
each boolean flag has default value provided by platform.

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: Ia92c3dded842e14099b4a7667569605d7066a8f9

18 months agofix(st-crypto): move flag control into source code
Lionel Debieve [Wed, 3 May 2023 09:40:09 +0000 (11:40 +0200)]
fix(st-crypto): move flag control into source code

Remove the control from the include file to avoid compilation
issue. Add the check in the source code instead.

Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
Change-Id: I533f829607f76389399a3e8dbc3c6095278562ab

18 months agofix(stm32mp1): always define PKA algos flags
Yann Gautier [Mon, 24 Apr 2023 09:44:51 +0000 (11:44 +0200)]
fix(stm32mp1): always define PKA algos flags

The flags to set PKA algo are set to 0 when TRUSTED_BOARD_BOOT is not
set.

Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
Change-Id: Ib70a2bc51451a2047d7a50a8307e9063d4a2a0ee

18 months agofix(stm32mp1): remove boolean check on PLAT_TBBR_IMG_DEF
Yann Gautier [Mon, 24 Apr 2023 09:35:40 +0000 (11:35 +0200)]
fix(stm32mp1): remove boolean check on PLAT_TBBR_IMG_DEF

This flag just needs to be defined, and does not need to have a boolean
value. Remove it from the assert_booleans check.

Signed-off-by: Yann Gautier <yann.gautier@foss.st.com>
Change-Id: I4e4c9ae1e5003ca2cf7c0c0e31d1561d032937c8

18 months agofeat(fvp): define ns memory in the SPMC manifest
J-Alves [Thu, 16 Mar 2023 15:26:52 +0000 (15:26 +0000)]
feat(fvp): define ns memory in the SPMC manifest

The SPMC (Hafnium) looks for secure and non-secure ranges
in its manifest.
Those relate with ranges that can be used by SPs in their
FF-A manifests.
The NS memory that is not used by SPs will be assigned
to the NWd, for it to share memory with SPs as needed.
Thus, this limits the memory the NWd can share with SPs,
to prevent NWD VMs from sharing memory that belongs
to other critical components.

Signed-off-by: J-Alves <joao.alves@arm.com>
Change-Id: Iad03eb138a57068fbb18c53141bdf6bf9c171b28

18 months agoMerge "feat(xilinx): sync copyright format" into integration
Joanna Farley [Tue, 2 May 2023 18:53:09 +0000 (20:53 +0200)]
Merge "feat(xilinx): sync copyright format" into integration

18 months agoMerge "refactor(cpus): use BIT macro in a consistent manner" into integration
Bipin Ravi [Tue, 2 May 2023 15:01:02 +0000 (17:01 +0200)]
Merge "refactor(cpus): use BIT macro in a consistent manner" into integration

18 months agoMerge "feat(el3-runtime): handle traps for IMPDEF registers accesses" into integration
Manish Pandey [Tue, 2 May 2023 14:51:14 +0000 (16:51 +0200)]
Merge "feat(el3-runtime): handle traps for IMPDEF registers accesses" into integration

18 months agoMerge "build: deprecate Arm rde1edge" into integration
Manish V Badarkhe [Tue, 2 May 2023 12:31:01 +0000 (14:31 +0200)]
Merge "build: deprecate Arm rde1edge" into integration

18 months agoMerge "fix(sme): disable SME for SPD=spmd" into integration
Manish Pandey [Tue, 2 May 2023 11:11:18 +0000 (13:11 +0200)]
Merge "fix(sme): disable SME for SPD=spmd" into integration

18 months agoMerge changes Ia1142b31,I424f1cde into integration
Sandrine Bailleux [Tue, 2 May 2023 11:09:59 +0000 (13:09 +0200)]
Merge changes Ia1142b31,I424f1cde into integration

* changes:
  fix(tc): enable the execution of both platform tests
  fix(tc): update the name of mbedtls config header

18 months agoMerge "refactor(fiptool): move plat_fiptool.mk to tools" into integration
Sandrine Bailleux [Tue, 2 May 2023 08:47:15 +0000 (10:47 +0200)]
Merge "refactor(fiptool): move plat_fiptool.mk to tools" into integration

18 months agoMerge "fix(tegra): remove dependency on CPU registers to get boot parameters" into...
Varun Wadekar [Tue, 2 May 2023 08:16:53 +0000 (10:16 +0200)]
Merge "fix(tegra): remove dependency on CPU registers to get boot parameters" into integration

18 months agoMerge "docs(measured-boot): update the build command" into integration
Sandrine Bailleux [Tue, 2 May 2023 07:16:01 +0000 (09:16 +0200)]
Merge "docs(measured-boot): update the build command" into integration

18 months agodocs(spm): support for handling Group0 interrupts
Madhukar Pappireddy [Fri, 3 Mar 2023 20:24:24 +0000 (14:24 -0600)]
docs(spm): support for handling Group0 interrupts

Please refer the doc update.

Change-Id: Ib79fae1296bc28fa9bd0cd79609d6153bb57519b
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
18 months agofeat(spmd): introduce platform handler for Group0 interrupt
Madhukar Pappireddy [Thu, 2 Mar 2023 22:33:25 +0000 (16:33 -0600)]
feat(spmd): introduce platform handler for Group0 interrupt

This patch introduces a handler for FVP platform to triage Group0
secure interrupts. Currently, it is empty but serves as a
placeholder for future Group0 interrupt sources.

Moreover, this patch also provides a dummy implementation of the
above mentioned platform hook for QEMU, corstone100, n1sdp and
hikey960 ports.

Change-Id: I01d3451408f47ac313b0af74046cce89f89b85bb
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
18 months agofeat(spmd): add support for FFA_EL3_INTR_HANDLE_32 ABI
Madhukar Pappireddy [Thu, 2 Mar 2023 22:04:38 +0000 (16:04 -0600)]
feat(spmd): add support for FFA_EL3_INTR_HANDLE_32 ABI

When Group0 Secure interrupts in secure world get trapped to S-EL2
SPMC, FFA_EL3_INTR_HANDLE ABI is invoked by SPMC to delegate
interrupt handling to EL3 firmware (i.e., SPMD).

SPMD further delegates to platform handler which successfully handles
the Group0 secure interrupt before returning control to SPMC.

Change-Id: I8cc0fec20803b96c81582910ad2668e38b167fb8
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
18 months agofeat(spmd): register handler for group0 interrupt from NWd
Madhukar Pappireddy [Thu, 2 Mar 2023 21:34:05 +0000 (15:34 -0600)]
feat(spmd): register handler for group0 interrupt from NWd

SPMD registers a generic handler with the interrupt management
framework to handle Group0 secure interrupt from normal world.
The handler further delegates to the platform for successful
handling of the interrupt.

Change-Id: I9cdc721810b09e01190cdcab42c50830792a26e2
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
18 months agofeat(el3-runtime): handle traps for IMPDEF registers accesses
Varun Wadekar [Thu, 13 Apr 2023 20:06:18 +0000 (21:06 +0100)]
feat(el3-runtime): handle traps for IMPDEF registers accesses

This patch introduces support to handle traps from lower ELs for
IMPDEF system register accesses. The actual support is left to the
platforms to implement.

Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
Change-Id: I623d5c432b4ce4328b68f238c15b1c83df97c1e5

18 months agofix(tegra): remove dependency on CPU registers to get boot parameters
Kalyani Chidambaram Vaidyanathan [Mon, 24 Apr 2023 20:32:05 +0000 (13:32 -0700)]
fix(tegra): remove dependency on CPU registers to get boot parameters

Commit 3e14df6f6 removed the code to clear the CPU registers X0 - X3,
which affected the Tegra platforms. Tegra platforms rely on the boot
parameters passed through custom mechanisms and do not use these
general purpose registers, but maintained sanity checks to support
legacy bootloaders. These sanity checks went out of sync due to the
code cleanup from bl31_entrypoint().

This patch removes the checks and calls the SOC specific handlers to
retrieve the boot parameters.

Change-Id: I0cf4d9c0370c33ff7715b48592b6bc0602f3c93e
Signed-off-by: Kalyani Chidambaram Vaidyanathan <kalyanic@nvidia.com>
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
18 months agoMerge "feat(fvp): introduce PLATFORM_TEST_EA_FFH config" into integration
Manish Pandey [Fri, 28 Apr 2023 16:03:37 +0000 (18:03 +0200)]
Merge "feat(fvp): introduce PLATFORM_TEST_EA_FFH config" into integration

18 months agofix(sme): disable SME for SPD=spmd
Jayanth Dodderi Chidanand [Fri, 28 Apr 2023 14:14:27 +0000 (15:14 +0100)]
fix(sme): disable SME for SPD=spmd

SPMD is not compatible with ENABLE_SME_FOR_NS.
Hence disable SME when SPD=spmd

Change-Id: I8bcf2493819718732563f9db69f7186ac7437637
Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
18 months agodocs: remove plat_convert_pk() interface from release doc
Sandrine Bailleux [Fri, 28 Apr 2023 14:07:24 +0000 (16:07 +0200)]
docs: remove plat_convert_pk() interface from release doc

The code was already removed as part of commit 4ac5b3949d87
"refactor(auth): replace plat_convert_pk". The present commit just
removes it from the release documentation.

Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Change-Id: I06b35f110c844267d69a865df55dd451ed2f08cd

18 months agoMerge "docs(juno): refer to SCP v2.12.0" into integration
Manish Pandey [Fri, 28 Apr 2023 13:58:05 +0000 (15:58 +0200)]
Merge "docs(juno): refer to SCP v2.12.0" into integration

18 months agochore(io): remove io_dummy driver
Sandrine Bailleux [Fri, 28 Apr 2023 13:45:43 +0000 (15:45 +0200)]
chore(io): remove io_dummy driver

In accordance with [1], delete the io_dummy driver code in preparation
for the v2.9 release.

[1] https://trustedfirmware-a.readthedocs.io/en/latest/about/release-information.html

Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Change-Id: If80573d6f889624ef06b099fd267ee85f3a6331e

18 months agorefactor(cpus): use BIT macro in a consistent manner
Okash Khawaja [Fri, 28 Apr 2023 12:18:28 +0000 (13:18 +0100)]
refactor(cpus): use BIT macro in a consistent manner

In assembly code, BIT macro is used with a preceding hash #. Let's
update Cortex X1 code to follow the same convention. Excluding hash
doesn't cause compilation to fail or emit incorrect code.

Signed-off-by: Okash Khawaja <okash@google.com>
Change-Id: If304cdf90542d2edcab3e2d66cd7e905ff7fd047

18 months agofeat(fvp): introduce PLATFORM_TEST_EA_FFH config
Manish Pandey [Mon, 24 Apr 2023 09:46:21 +0000 (10:46 +0100)]
feat(fvp): introduce PLATFORM_TEST_EA_FFH config

FVP currently does not have proper handler to do Firmware First Handling
(FFH) of lower EL External aborts and it ends up in EL3 panic.

To test the scenarios sensibly we need a proper handling when the FVP is
under test so that we do not change the default behavior.

Introduce PLATFORM_TEST_EA_FFH config which will be enabled in CI
scripts and implement a proper handling for Sync EA and SErrors from
lower EL.

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: Ib130154206b17f72c49c9f07de2d92f35a97ab0b

18 months agoMerge "fix(ras): do not put RAS check before esb macro" into integration
Manish V Badarkhe [Fri, 28 Apr 2023 10:08:37 +0000 (12:08 +0200)]
Merge "fix(ras): do not put RAS check before esb macro" into integration

18 months agoMerge "docs: fix a typo in the glossary" into integration
Manish V Badarkhe [Fri, 28 Apr 2023 10:08:09 +0000 (12:08 +0200)]
Merge "docs: fix a typo in the glossary" into integration

18 months agoMerge "feat(sme): enable SME2 functionality for NS world" into integration
Manish Pandey [Fri, 28 Apr 2023 09:57:25 +0000 (11:57 +0200)]
Merge "feat(sme): enable SME2 functionality for NS world" into integration

18 months agofix(qemu-sbsa): enable FGT
Marcin Juszkiewicz [Tue, 14 Feb 2023 08:27:59 +0000 (09:27 +0100)]
fix(qemu-sbsa): enable FGT

QEMU 7.2+ has FEAT_FGT support added to 'max' cpu.

So let's enable it to make Debian 'bookworm' kernel boot on sbsa-ref/max setup.

Signed-off-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org>
Change-Id: I49fb3e742b69ce7be5666e0144525dde21a68238

18 months agoMerge "build(fvp): reduce the number of cpu libraries included by default" into integ...
Joanna Farley [Thu, 27 Apr 2023 22:16:11 +0000 (00:16 +0200)]
Merge "build(fvp): reduce the number of cpu libraries included by default" into integration

18 months agoMerge "style(xilinx): fix AMD copyright format" into integration
Joanna Farley [Thu, 27 Apr 2023 22:13:03 +0000 (00:13 +0200)]
Merge "style(xilinx): fix AMD copyright format" into integration

18 months agofeat(sme): enable SME2 functionality for NS world
Jayanth Dodderi Chidanand [Tue, 8 Nov 2022 10:31:07 +0000 (10:31 +0000)]
feat(sme): enable SME2 functionality for NS world

FEAT_SME2 is an extension of FEAT_SME and an optional feature
from v9.2. Its an extension of SME, wherein it not only
processes matrix operations efficiently, but also provides
outer-product instructions to accelerate matrix operations.
It affords instructions for multi-vector operations.
Further, it adds an 512 bit architectural register ZT0.

This patch implements all the changes introduced with FEAT_SME2
to ensure that the instructions are allowed to access ZT0
register from Non-secure lower exception levels.

Additionally, it adds support to ensure FEAT_SME2 is aligned
with the existing FEATURE DETECTION mechanism, and documented.

Change-Id: Iee0f61943304a9cfc3db8f986047b1321d0a6463
Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
18 months agofix(ras): do not put RAS check before esb macro
Manish Pandey [Thu, 27 Apr 2023 09:02:35 +0000 (10:02 +0100)]
fix(ras): do not put RAS check before esb macro

Macro esb used in TF-A executes the instruction "esb" and is kept under
RAS_EXTENSION macro. RAS_EXTENSION, as it stands today, is only enabled
for platforms which wants RAS errors to be handled in Firmware while esb
instruction is available when RAS architecture feature is present
irrespective of its handling.
Currently TF-A does not have mechanism to detect whether RAS is present
or not in HW, define this macro unconditionally.

Its harmless for non-RAS cores as this instruction executes as NOP.

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: I556f2bcf5669c378bda05909525a0a4f96c7b336

18 months agodocs: fix a typo in the glossary
Sandrine Bailleux [Thu, 27 Apr 2023 11:29:13 +0000 (13:29 +0200)]
docs: fix a typo in the glossary

Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Change-Id: I4c76fde5e487ab4b2495f1ea692ae07f8be81d57

18 months agodocs(measured-boot): update the build command
Manish V Badarkhe [Tue, 25 Apr 2023 10:08:16 +0000 (11:08 +0100)]
docs(measured-boot): update the build command

As per recent changes to OPTEE's fvp.mk file, both options
"MEASURED_BOOT" and "MEASURED_BOOT_FTPM" are required for the fTPM
application to be built.

Change-Id: I621113c3fbd47e9f5be015ea65e9b8d0f218e4e8
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
18 months agofix(tc): enable the execution of both platform tests
Tamas Ban [Fri, 21 Apr 2023 07:31:48 +0000 (09:31 +0200)]
fix(tc): enable the execution of both platform tests

The C preprocessor cannot compare defines against strings.
Such an expression is always evaluated to be true. Therefore,
its usage in a conditional expression results that always the
first branch is taken. Other branches cannot be reached by
any configuration value. The fix removes this string comparison
and instead it introduces distinct defines for all the cases.

Signed-off-by: Tamas Ban <tamas.ban@arm.com>
Change-Id: Ia1142b31b6778686c74e1e882fe4604fe3b6501d