]> git.baikalelectronics.ru Git - arm-tf.git/log
arm-tf.git
21 months agodocs: add Runtime Security Subsystem (RSS) documentation
Tamas Ban [Thu, 13 Oct 2022 14:42:48 +0000 (16:42 +0200)]
docs: add Runtime Security Subsystem (RSS) documentation

Describe:
  - RSS-AP communication
  - RSS runtime services
  - Measured boot
  - Delegated Attestation

Signed-off-by: Tamas Ban <tamas.ban@arm.com>
Change-Id: Iaef93361a09355a1edaabcc0c59126e006ad251a

2 years agoMerge "fix(rockchip): align fdt buffer on 8 bytes" into integration
Manish Pandey [Tue, 15 Nov 2022 11:18:39 +0000 (12:18 +0100)]
Merge "fix(rockchip): align fdt buffer on 8 bytes" into integration

2 years agofix(rockchip): align fdt buffer on 8 bytes
Quentin Schulz [Mon, 14 Nov 2022 16:40:33 +0000 (17:40 +0100)]
fix(rockchip): align fdt buffer on 8 bytes

Since commit 94b2f94bd632 ("feat(libfdt): upgrade libfdt source files"),
8-byte alignment of the FDT address is enforced to follow the DT
standard.

Rockchip implementation of params_early_setup loads the FDT address as
passed by the bootloader into a buffer. This buffer is currently made of
uint8_t which means it is not 8-byte aligned and might result in
fdt_open_into failing.

Instead, let's make this buffer uint64_t to make it 8-byte aligned.

Cc: Quentin Schulz <foss+tf-a@0leil.net>
Signed-off-by: Quentin Schulz <quentin.schulz@theobroma-systems.com>
Change-Id: Ifcf0e0cf4000e3661d76d3c3a2fe3921f7fe44b9

2 years agoMerge changes I256959d7,I721376bf into integration
Manish Pandey [Mon, 14 Nov 2022 14:54:27 +0000 (15:54 +0100)]
Merge changes I256959d7,I721376bf into integration

* changes:
  fix(cpus): remove plat_can_cmo check for aarch32
  fix(cpus): update doc and check for plat_can_cmo

2 years agoMerge "refactor(stm32mp1): remove STM32MP_USE_STM32IMAGE" into integration
Manish Pandey [Mon, 14 Nov 2022 14:40:06 +0000 (15:40 +0100)]
Merge "refactor(stm32mp1): remove STM32MP_USE_STM32IMAGE" into integration

2 years agofix(cpus): remove plat_can_cmo check for aarch32
Okash Khawaja [Mon, 14 Nov 2022 13:02:12 +0000 (13:02 +0000)]
fix(cpus): remove plat_can_cmo check for aarch32

We don't need CONDITIONAL_CMO for aarch32 so let's remove it.

Signed-off-by: Okash Khawawja <okash@google.com>
Change-Id: I256959d7005df21a850ff7791c8188ea01f5c53b

2 years agofix(cpus): update doc and check for plat_can_cmo
Okash Khawaja [Mon, 14 Nov 2022 12:50:30 +0000 (12:50 +0000)]
fix(cpus): update doc and check for plat_can_cmo

plat_can_cmo must not clobber x1 but the doc doesn't mention that. This
patch updates the doc to mention x1. It also adds check for plat_can_cmo
to `dcsw_op_louis` which was missed out in original patch.

Signed-off-by: Okash Khawaja <okash@google.com>
Change-Id: I721376bf3726520d0d5b0df0f33f98ce92257287

2 years agorefactor(stm32mp1): remove STM32MP_USE_STM32IMAGE
Yann Gautier [Mon, 14 Nov 2022 13:14:48 +0000 (14:14 +0100)]
refactor(stm32mp1): remove STM32MP_USE_STM32IMAGE

The code managing legacy boot (without FIP) that was under
STM32MP_USE_STM32IMAGE flag is remove.

Change-Id: I04452453ed84567b0de39e900594a81526562259
Signed-off-by: Yann Gautier <yann.gautier@st.com>
2 years agoMerge changes from topic "stm32mp1-trusted-boot" into integration
Manish Pandey [Mon, 14 Nov 2022 13:11:55 +0000 (14:11 +0100)]
Merge changes from topic "stm32mp1-trusted-boot" into integration

* changes:
  docs(st): update documentation for TRUSTED_BOARD_BOOT
  fix(build): ensure that the correct rule is called for tools
  feat(stm32mp1): add the platform specific build for tools
  fix(stm32mp13-fdts): remove secure status
  feat(stm32mp1-fdts): add CoT and fuse references for authentication
  feat(stm32mp1): add a check on TRUSTED_BOARD_BOOT with secure chip
  feat(stm32mp1): add the decryption support
  feat(stm32mp1): add the TRUSTED_BOARD_BOOT support
  feat(stm32mp1): update ROM code API for header v2 management
  feat(stm32mp1): remove unused function from boot API
  refactor(stm32mp1): remove authentication using STM32 image mode
  fix(fconf): fix type error displaying disable_auth
  feat(tbbr): increase PK_DER_LEN size
  fix(auth): correct sign-compare warning
  feat(auth): allow to verify PublicKey with platform format PK
  feat(cert-create): update for ECDSA brainpoolP256r/t1 support
  feat(stm32mp1): add RNG initialization in BL2 for STM32MP13
  feat(st-crypto): remove BL32 HASH driver usage
  feat(stm32mp1): add a stm32mp crypto library
  feat(st-crypto): add STM32 RNG driver
  feat(st-crypto): add AES decrypt/auth by SAES IP
  feat(st-crypto): add ECDSA signature check with PKA
  feat(st-crypto): update HASH for new hardware version used in STM32MP13

2 years agodocs(st): update documentation for TRUSTED_BOARD_BOOT
Lionel Debieve [Thu, 6 Oct 2022 07:00:14 +0000 (09:00 +0200)]
docs(st): update documentation for TRUSTED_BOARD_BOOT

Update the documentation to indicate commands needed for
TRUSTED_BOARD_BOOT management.

Change-Id: I7b8781eaa7f8b6b8d675a625c7ff2e1ee767222a
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofix(build): ensure that the correct rule is called for tools
Lionel Debieve [Mon, 14 Nov 2022 10:05:09 +0000 (11:05 +0100)]
fix(build): ensure that the correct rule is called for tools

In case of platform specific usage for both fiptool or certtool,
we need to ensure that the Makefile will use the correct rule
to generate the binary. Add the explicit call to the "all" rule.

Change-Id: I9724b63e01b3497daaedb9365c7d6a494aac9561
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofeat(stm32mp1): add the platform specific build for tools
Lionel Debieve [Thu, 6 Oct 2022 06:54:23 +0000 (08:54 +0200)]
feat(stm32mp1): add the platform specific build for tools

Add cert_create and fiptool specific files to add the platform
addons to the generic tools.

Change-Id: Ifa600241cdf32b495cc65edccddab47c3796b77d
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofix(stm32mp13-fdts): remove secure status
Lionel Debieve [Thu, 6 Oct 2022 06:52:30 +0000 (08:52 +0200)]
fix(stm32mp13-fdts): remove secure status

Remove the secure status for PKA and SAES entries.
The peripherals are used in BL2 at EL3, context will
remain secure only.

Change-Id: I79d95bc55a9afd27f295249936d7bc332c777f5e
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofeat(stm32mp1-fdts): add CoT and fuse references for authentication
Lionel Debieve [Thu, 6 Oct 2022 06:51:32 +0000 (08:51 +0200)]
feat(stm32mp1-fdts): add CoT and fuse references for authentication

Add the stm32mp1 CoT description file. Include the TRUSTED_BOARD_BOOT
entry in the platform device tree file.
Add the missing public root key reference for stm32mp15 and the
encryption key reference for stm32mp13.

Change-Id: I0ae2454979a3df6dd3e4361510317742e8fbc109
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofeat(stm32mp1): add a check on TRUSTED_BOARD_BOOT with secure chip
Lionel Debieve [Wed, 5 Oct 2022 14:52:09 +0000 (16:52 +0200)]
feat(stm32mp1): add a check on TRUSTED_BOARD_BOOT with secure chip

Add a security check to enforce the usage of TRUSTED_BOARD_BOOT
on closed device. It will guarantee the secure bootchain.

Change-Id: Id6120d0e5041e8f2d3866e5710876ec96b6d0216
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofeat(stm32mp1): add the decryption support
Lionel Debieve [Wed, 5 Oct 2022 14:51:12 +0000 (16:51 +0200)]
feat(stm32mp1): add the decryption support

Add the decryption support for STM32MP1 binaries.
Decryption is limited to the BL32 loaded images.

Limitation: STM32MP15 doesn't support the feature.

Change-Id: I96800bac7b22109f8471eb2953fc0dc269fc4fd1
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofeat(stm32mp1): add the TRUSTED_BOARD_BOOT support
Lionel Debieve [Wed, 5 Oct 2022 14:47:03 +0000 (16:47 +0200)]
feat(stm32mp1): add the TRUSTED_BOARD_BOOT support

Add the support of the TRUSTED_BOARD_BOOT to authenticate the loaded
FIP using platform CoT management.
It adds TBB platform definition, redefining the standard image ID in
order to decrease requested size in BL2 binary.
Authentication will use mbedTLS library for parsing certificate
configured with a platform configuration.

Change-Id: I9da66b915c5e9e9293fccfce92bef2434da1e430
Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofeat(stm32mp1): update ROM code API for header v2 management
Lionel Debieve [Wed, 5 Oct 2022 14:31:28 +0000 (16:31 +0200)]
feat(stm32mp1): update ROM code API for header v2 management

Add the new definition field for authentication used in header V2
on STM32MP13.

Change-Id: Id8f0c2584ca9b74b0d21d82c9a98d286500548c4
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofeat(stm32mp1): remove unused function from boot API
Lionel Debieve [Wed, 5 Oct 2022 14:29:38 +0000 (16:29 +0200)]
feat(stm32mp1): remove unused function from boot API

Remove old library access from ROM library that is no more
used.

Change-Id: I9b91f1efd6ff9d311b69ca36f60474f01268c221
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agorefactor(stm32mp1): remove authentication using STM32 image mode
Lionel Debieve [Wed, 5 Oct 2022 14:22:07 +0000 (16:22 +0200)]
refactor(stm32mp1): remove authentication using STM32 image mode

Remove deprecated authentication mode to use the FIP authentication
based on TBBR requirements. It will use the new crypto library.

Change-Id: I95c7baa64ba42c370ae136f59781f2a7a4c7f507
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofix(fconf): fix type error displaying disable_auth
Lionel Debieve [Wed, 5 Oct 2022 09:40:15 +0000 (11:40 +0200)]
fix(fconf): fix type error displaying disable_auth

disable_auth is defined as uint32_t and must be displayed
as an unsigned int.

lib/fconf/fconf_tbbr_getter.c:
In function ‘fconf_populate_tbbr_dyn_config’:
include/common/debug.h:46:41: error:
format ‘%d’ expects argument of type ‘int’, but argument 3 has
 type ‘uint32_t’ {aka ‘unsigned int’} [-Werror=format=]
   46 | #define LOG_MARKER_WARNING              "\x1e"  /* 30 */
      |                                         ^~~~~~
include/common/debug.h:77:32: note:
 in expansion of macro ‘LOG_MARKER_WARNING’
   77 | # define WARN(...) tf_log(LOG_MARKER_WARNING __VA_ARGS__)
      |                           ^~~~~~~~~~~~~~~~~~
lib/fconf/fconf_tbbr_getter.c:47:17: note:
in expansion of macro ‘WARN’
   47 |                 WARN("Invalid value for `%s` cell %d\n",
      |                 ^~~~
include/common/debug.h:48:41: error:
format ‘%d’ expects argument of type ‘int’, but argument 5 has
 type ‘uint32_t’ {aka ‘unsigned int’} [-Werror=format=]
   48 | #define LOG_MARKER_VERBOSE              "\x32"  /* 50 */
      |                                         ^~~~~~
include/common/debug.h:58:32: note:
in definition of macro ‘no_tf_log’
   58 |                 tf_log(fmt, ##__VA_ARGS__);     \
      |                        ^~~
include/common/debug.h:91:35: note:
in expansion of macro ‘LOG_MARKER_VERBOSE’
   91 | # define VERBOSE(...)
      |           no_tf_log(LOG_MARKER_VERBOSE __VA_ARGS__)
      |                     ^~~~~~~~~~~~~~~~~~
lib/fconf/fconf_tbbr_getter.c:74:9: note:
in expansion of macro ‘VERBOSE’
   74 |    VERBOSE("%s%s%s %d\n","FCONF: `tbbr.", "disable_auth",
      |    ^~~~~~~
cc1: all warnings being treated as errors

Change-Id: I0164ddfe511406cc1a8d014a368ef3e3c5f8cd27
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofeat(tbbr): increase PK_DER_LEN size
Nicolas Toromanoff [Tue, 17 Nov 2020 09:03:40 +0000 (10:03 +0100)]
feat(tbbr): increase PK_DER_LEN size

Public key brainpool ECDSA DER certificate are 92 byte long.
OID for brainpool curve are 1 byte bigger than the one for NIST curve.

Change-Id: Ifad51da3c576d555da9fc519d2df3d9a0e6ed91b
Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
2 years agofix(auth): correct sign-compare warning
Nicolas Toromanoff [Wed, 23 Dec 2020 15:01:25 +0000 (16:01 +0100)]
fix(auth): correct sign-compare warning

Correct the warning due to comparison between signed and
unsigned variable.

drivers/auth/mbedtls/mbedtls_x509_parser.c: In function 'get_ext':
drivers/auth/mbedtls/mbedtls_x509_parser.c:120:30:
error: comparison of integer expressions of different
signedness: 'int' and 'size_t' {aka 'unsigned int'}
[-Werror=sign-compare]
120 | if ((oid_len == strlen(oid_str)) && !strcmp(oid, oid_str)) {
    |              ^~

Change-Id: Ic12527f5f92a34e925bee3047c168eacf5e99d8a
Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
2 years agofeat(auth): allow to verify PublicKey with platform format PK
Nicolas Toromanoff [Mon, 9 Nov 2020 11:14:52 +0000 (12:14 +0100)]
feat(auth): allow to verify PublicKey with platform format PK

In some platform the digest of the public key saved in the OTP is not
the digest of the exact same public key buffer needed to check the
signature. Typically, platform checks signature using the DER ROTPK
whereas some others add some related information. Add a new platform
weak function to transform the public key buffer used by
verify_signature to a platform specific public key.

Mark this new weak function as deprecated as it will be replaced
by another framework implementation.

Change-Id: I71017b41e3eca9398cededf317ad97e9b511be5f
Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofeat(cert-create): update for ECDSA brainpoolP256r/t1 support
Lionel Debieve [Mon, 14 Nov 2022 10:03:42 +0000 (11:03 +0100)]
feat(cert-create): update for ECDSA brainpoolP256r/t1 support

Updated cert_tool to be able to select brainpool P256r/t1
or NIST prim256v1 curve for certificates signature.

Change-Id: I6e800144697069ea83660053b8ba6e21c229243a
Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agoMerge changes I5838964f,Id752c1cc,Idd42d5a2,Iff4680cd,I2b1801a7, ... into integration
Manish Pandey [Mon, 14 Nov 2022 10:17:27 +0000 (11:17 +0100)]
Merge changes I5838964f,Id752c1cc,Idd42d5a2,Iff4680cd,I2b1801a7, ... into integration

* changes:
  fix(mt8188): add mmap entry for CPU idle SRAM
  fix(mt8188): refine gic init flow after system resume
  fix(mt8186): fix the DRAM voltage after the system resumes
  feat(mt8188): add audio support
  refactor(mt8195): use ptp3 common drivers
  feat(mt8188): add support for PTP3
  feat(mt8188): enable MTK_PUBEVENT_ENABLE

2 years agofeat(stm32mp1): add RNG initialization in BL2 for STM32MP13
Nicolas Le Bayon [Wed, 2 Dec 2020 15:23:49 +0000 (16:23 +0100)]
feat(stm32mp1): add RNG initialization in BL2 for STM32MP13

Initialize RNG driver at platform level for STM32MP13.

Change-Id: I64832de43e5f6559a12e26680142db54c88f0b9e
Signed-off-by: Nicolas Le Bayon <nicolas.le.bayon@foss.st.com>
2 years agofeat(st-crypto): remove BL32 HASH driver usage
Lionel Debieve [Tue, 4 Oct 2022 12:28:57 +0000 (14:28 +0200)]
feat(st-crypto): remove BL32 HASH driver usage

Remove unused mode for HASH driver. The driver will only be
used in BL2 scope.

Change-Id: I1fce09cdaa9da0c11554ac5f73433b4bee776011
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofeat(stm32mp1): add a stm32mp crypto library
Lionel Debieve [Wed, 5 Oct 2022 14:16:50 +0000 (16:16 +0200)]
feat(stm32mp1): add a stm32mp crypto library

Add the crypto library for STM32MP1 to use STM32 hardware
accelerators.

Change-Id: I0bbb941001242a6fdc47514ab3efe07b12249285
Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofeat(st-crypto): add STM32 RNG driver
Yann Gautier [Thu, 18 Apr 2019 12:47:35 +0000 (14:47 +0200)]
feat(st-crypto): add STM32 RNG driver

This driver manages the STM32 Random Number Generator
peripheral.

Change-Id: I4403ebb2dbdaa8df993a4413f1ef48eeba00427c
Signed-off-by: Yann Gautier <yann.gautier@st.com>
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofeat(st-crypto): add AES decrypt/auth by SAES IP
Nicolas Toromanoff [Fri, 18 Sep 2020 07:19:11 +0000 (09:19 +0200)]
feat(st-crypto): add AES decrypt/auth by SAES IP

Add code to be able to use STMicroelectronics SAES IP. This driver
can manage many AES algorithms (CBC, ECB, CCM, GCM). It will be used
by the authenticated decryption framework (AES-GCM only).

Change-Id: Ibd4030719fb12877dcecd5d2c395d13b4b15c260
Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
2 years agofeat(st-crypto): add ECDSA signature check with PKA
Nicolas Toromanoff [Wed, 30 Sep 2020 15:36:45 +0000 (17:36 +0200)]
feat(st-crypto): add ECDSA signature check with PKA

Add code to be able to use STMicroelectronics PKA peripheral
in the authentication framework.

Change-Id: Ifeafe84c68db483cd18674f2280576cc065f92ee
Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
2 years agofeat(st-crypto): update HASH for new hardware version used in STM32MP13
Nicolas Toromanoff [Tue, 22 Dec 2020 12:54:51 +0000 (13:54 +0100)]
feat(st-crypto): update HASH for new hardware version used in STM32MP13

Introduce new flag to manage hardware version.
STM32MP15 currently uses the HASH_V2 and STM32MP13 uses the HASH_V4.
For STM32_HASH_V4: remove MD5 algorithm (no more supported) and
add SHA384 and SHA512.

For STM32_HASH_V2: no change.

Change-Id: I3a9ae9e38249a2421c657232cb0877004d04dae1
Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
2 years agofix(mt8188): add mmap entry for CPU idle SRAM
Liju-Clr Chen [Fri, 11 Nov 2022 01:51:51 +0000 (09:51 +0800)]
fix(mt8188): add mmap entry for CPU idle SRAM

CPU PM driver accesses CPU idle SRAM during the system suspend
process. The region of CPU idle SRAM needs to be added as mmap entry.
Otherwise, the execption would occur.

BUG=b:244215539
TEST=Test of suspend resume passes.

Signed-off-by: Liju-Clr Chen <liju-clr.chen@mediatek.com>
Change-Id: I5838964fd9cb1b833e4006e2123febb4a4601003

2 years agofix(mt8188): refine gic init flow after system resume
James Liao [Fri, 23 Sep 2022 08:37:59 +0000 (16:37 +0800)]
fix(mt8188): refine gic init flow after system resume

Call gicv3_distif_init() instead of mt_gic_init() in
armv8_2_mcusys_pwr_on_common(). This is to prevent
gicv3_rdistif_init() and gicv3_cpuif_enable() from being called twice
in the power-on flow. gicv3_rdistif_init() and gicv3_cpuif_enable()
are called in later armv8_2_cpu_pwr_on_common().

BUG=b:244215539
TEST=Suspend Resume Test pass

Change-Id: Id752c1ccbb9eab277ed6278c2dd90a051a894146
Signed-off-by: Liju-Clr Chen <liju-clr.chen@mediatek.com>
2 years agofix(mt8186): fix the DRAM voltage after the system resumes
Allen-KH Cheng [Tue, 8 Nov 2022 10:40:27 +0000 (18:40 +0800)]
fix(mt8186): fix the DRAM voltage after the system resumes

The DRAM power supply must sustain at 0.8V after the system resumes.
Otherwise, unexpected errors would occur. Therefore, we update the
DRAM voltage to 0.8v in PMIC voltage wrap table.

BUG=b:253537849
TEST=Suspend Resume Test

Signed-off-by: Allen-KH Cheng <allen-kh.cheng@mediatek.corp-partner.google.com>
Change-Id: Idd42d5a2d646468822e391e48d01d870c3b7f0d3

2 years agofeat(mt8188): add audio support
Trevor Wu [Tue, 20 Sep 2022 06:50:36 +0000 (14:50 +0800)]
feat(mt8188): add audio support

For MT8188, MTK_AUDIO_SMC_OP_DOMAIN_SIDEBANDS is required for normal
mode switch.
  - Add audio common code and chip specific code.
  - Add new id (MTK_SIP_AUDIO_CONTROL) to mtk_sip_def.h.
  - Enable for MT8188.

Signed-off-by: Trevor Wu <trevor.wu@mediatek.com>
Change-Id: Iff4680cd0b520b2b519ecf30ecafe100f147cc62

2 years agorefactor(mt8195): use ptp3 common drivers
Liju-Clr Chen [Thu, 3 Nov 2022 11:49:23 +0000 (19:49 +0800)]
refactor(mt8195): use ptp3 common drivers

Some 8195 ptp3 drivers are the same in plat/mediatek/drivers/ptp3, so
add this patch to reuse them.

Change-Id: I2b1801a73b6a2979e20d49d314c57f663dc5bf04
Signed-off-by: Liju-Clr Chen <liju-clr.chen@mediatek.com>
2 years agofeat(mt8188): add support for PTP3
Riven Chen [Mon, 17 Oct 2022 05:11:27 +0000 (13:11 +0800)]
feat(mt8188): add support for PTP3

Add PTP3 driver to protect CPU from excessive voltage drop in CPU
heavy loading.

Signed-off-by: Riven Chen <riven.chen@mediatek.corp-partner.google.com>
Change-Id: I394096be43e1d1d615f99b22f38f0b3ae0bb40c1

2 years agofeat(mt8188): enable MTK_PUBEVENT_ENABLE
Rex-BC Chen [Fri, 14 Oct 2022 08:19:25 +0000 (16:19 +0800)]
feat(mt8188): enable MTK_PUBEVENT_ENABLE

Enable MTK_PUBEVENT_ENABLE for subscribing CPUPM events. This
patch also corrects the header file naming.

Signed-off-by: Bo-Chen Chen <rex-bc.chen@mediatek.com>
Change-Id: Iabd89a4ead21ccafa833390367484bfea5d351f6

2 years agoMerge "refactor(security): add OpenSSL 1.x compatibility" into integration
Manish V Badarkhe [Fri, 11 Nov 2022 18:59:58 +0000 (19:59 +0100)]
Merge "refactor(security): add OpenSSL 1.x compatibility" into integration

2 years agorefactor(security): add OpenSSL 1.x compatibility
Juan Pablo Conde [Tue, 25 Oct 2022 23:41:02 +0000 (19:41 -0400)]
refactor(security): add OpenSSL 1.x compatibility

When updated to work with OpenSSL 3.0, the host tools lost their
compatibility with previous versions (1.x) of OpenSSL. This is
mainly due to the fact that 1.x APIs became deprecated in 3.0 and
therefore their use cause compiling errors. In addition, updating
for a newer version of OpenSSL meant improving the stability
against security threats. However, although version 1.1.1 is
now deprecated, it still receives security updates, so it would
not imply major security issues to keep compatibility with it too.

This patch adds backwards compatibility with OpenSSL 1.x versions
by adding back 1.x API code. It defines a macro USING_OPENSSL3,
which will select the appropriate OpenSSL API version depending on
the OpenSSL library path chosen (which is determined by the
already-existing OPENSSL_DIR variable).

In addition, cleanup items were packed in functions and moved to
the proper modules in order to make the code more maintainable and
legible.

Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com>
Change-Id: I8deceb5e419edc73277792861882404790ccd33c

2 years agoMerge "fix(docs): add LTS maintainers" into integration
Manish Pandey [Fri, 11 Nov 2022 17:40:39 +0000 (18:40 +0100)]
Merge "fix(docs): add LTS maintainers" into integration

2 years agoMerge "feat(cpus): make cache ops conditional" into integration
Bipin Ravi [Fri, 11 Nov 2022 16:49:20 +0000 (17:49 +0100)]
Merge "feat(cpus): make cache ops conditional" into integration

2 years agofix(docs): add LTS maintainers
Bipin Ravi [Fri, 11 Nov 2022 05:13:01 +0000 (23:13 -0600)]
fix(docs): add LTS maintainers

Adding the  maintainers for the TF-A LTS releases.

Signed-off-by: Bipin Ravi <bipin.ravi@arm.com>
Change-Id: I683885b8b52c0d004218fa52f71a245bd26b1229

2 years agoMerge "fix(pmu): add sensible default for MDCR_EL2" into integration
Manish Pandey [Fri, 11 Nov 2022 15:56:30 +0000 (16:56 +0100)]
Merge "fix(pmu): add sensible default for MDCR_EL2" into integration

2 years agoMerge "build: deprecate Arm TC0 FVP platform" into integration
Manish V Badarkhe [Fri, 11 Nov 2022 13:06:03 +0000 (14:06 +0100)]
Merge "build: deprecate Arm TC0 FVP platform" into integration

2 years agofix(pmu): add sensible default for MDCR_EL2
Boyan Karatotev [Wed, 26 Oct 2022 14:10:39 +0000 (15:10 +0100)]
fix(pmu): add sensible default for MDCR_EL2

When TF-A is set to save and restore EL2 registers it initially zeroes
all of them so that it does not leak any information. However,
MDCR_EL2.HPMN of 0 is poorly defined when FEAT_HPMN0 is not implemented.
Set it to its hardware reset value so that lower ELs don't inherit a
wrong value.

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: I8055005ef9b6eaafefa13b62a0b41289079fdd23

2 years agobuild: deprecate Arm TC0 FVP platform
Manish V Badarkhe [Fri, 11 Nov 2022 09:36:29 +0000 (09:36 +0000)]
build: deprecate Arm TC0 FVP platform

Arm has decided to deprecate the TC0 platform. The development of
software and fast models for TC0 platform has been discontinued.
TC0 platform has been superseded by the TC1 and TC2 platforms,
which are already supported in TF-A and CI repositories.

Change-Id: I0269816a6ee733f732669027eae4e14cd60b6084
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
2 years agoMerge "fix(cpus): workaround for Cortex-A77 erratum 2743100" into integration
Bipin Ravi [Fri, 11 Nov 2022 04:35:21 +0000 (05:35 +0100)]
Merge "fix(cpus): workaround for Cortex-A77 erratum 2743100" into integration

2 years agoMerge "fix(docs): update maintainers list" into integration
Joanna Farley [Fri, 11 Nov 2022 00:02:44 +0000 (01:02 +0100)]
Merge "fix(docs): update maintainers list" into integration

2 years agofix(docs): update maintainers list
Manish Pandey [Mon, 7 Nov 2022 15:18:38 +0000 (15:18 +0000)]
fix(docs): update maintainers list

As part of release process revisit list of maintainers to keep
it updated.

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: I63b87265a6bff00ad05d8b3b7cad694cdf48e9ea

2 years agoMerge "chore(docs): fix broken url references to arm procedure call" into integration
Manish V Badarkhe [Thu, 10 Nov 2022 18:25:01 +0000 (19:25 +0100)]
Merge "chore(docs): fix broken url references to arm procedure call" into integration

2 years agoMerge changes from topic "mp/ras_refactoring" into integration
Olivier Deprez [Thu, 10 Nov 2022 16:46:21 +0000 (17:46 +0100)]
Merge changes from topic "mp/ras_refactoring" into integration

* changes:
  docs: document do_panic() and panic() helper functions
  fix(ras): restrict RAS support for NS world

2 years agochore(docs): fix broken url references to arm procedure call
Govindraj Raja [Thu, 10 Nov 2022 15:27:35 +0000 (15:27 +0000)]
chore(docs): fix broken url references to arm procedure call

Couple for urls under section: `5.6. Use of built-in C and libc
data types` from docs has broken urls since the new arm procedure
call doc is moved to be part of `ARM-software/abi-aa`.

Change-Id: Ied184ed56c8335d4cbc687e56962439091a18e42
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
2 years agoMerge changes from topic "mp/ras_refactoring" into integration
Manish Pandey [Thu, 10 Nov 2022 16:22:39 +0000 (17:22 +0100)]
Merge changes from topic "mp/ras_refactoring" into integration

* changes:
  fix(debug): decouple "get_el_str()" from backtrace
  fix(bl31): harden check in delegate_async_ea

2 years agofix(cpus): workaround for Cortex-A77 erratum 2743100
Boyan Karatotev [Tue, 1 Nov 2022 11:22:12 +0000 (11:22 +0000)]
fix(cpus): workaround for Cortex-A77 erratum 2743100

Cortex-A77 erratum 2743100 is a Cat B erratum that applies to revisions
r0p0, r1p0, r1p1, and is still open. The workaround is to insert a dsb
before the isb in the power down sequence.

SDEN can be found here:
https://developer.arm.com/documentation/SDEN1152370/latest

Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
Change-Id: I8e49a2dac8611f31ace249a17ae7a90cd60e742a

2 years agoMerge changes from topic "ffa_el3_spmc_fixes" into integration
Joanna Farley [Thu, 10 Nov 2022 12:46:33 +0000 (13:46 +0100)]
Merge changes from topic "ffa_el3_spmc_fixes" into integration

* changes:
  fix(el3-spmc): check descriptor size for overflow
  fix(el3-spmc): fix location of fragment length check
  fix(el3-spmc): fix detection of overlapping memory regions
  fix(el3-spmc): fix incomplete reclaim validation

2 years agofeat(cpus): make cache ops conditional
Okash Khawaja [Fri, 4 Nov 2022 12:38:01 +0000 (12:38 +0000)]
feat(cpus): make cache ops conditional

When a core is in debug recovery mode its caches are not invalidated
upon reset, so the L1 and L2 cache contents from before reset are
observable after reset. Similarly, debug recovery mode of DynamIQ
cluster ensures that contents of the shared L3 cache are also not
invalidated upon transition to On mode.

Booting cores in debug recovery mode means booting with caches disabled
and preserving the caches until a point where software can dump the
caches and retrieve their contents. TF-A however unconditionally cleans
and invalidates caches at multiple points during boot. This can lead to
memory corruption as well as loss of cache contents to be used for
debugging.

This patch fixes this by calling a platform hook before performing CMOs
in helper routines in cache_helpers.S. The platform hook plat_can_cmo is
an assembly routine which must not clobber x2 and x3, and avoid using
stack. The whole checking is conditional upon `CONDITIONAL_CMO` which
can be set at compile time.

Signed-off-by: Okash Khawaja <okash@google.com>
Change-Id: I172e999e4acd0f872c24056e647cc947ee54b193

2 years agoMerge "chore(docs): move deprecated platforms information around" into integration
Manish Pandey [Thu, 10 Nov 2022 11:59:17 +0000 (12:59 +0100)]
Merge "chore(docs): move deprecated platforms information around" into integration

2 years agoMerge "build: warn about RSS driver experimental status" into integration
Sandrine Bailleux [Thu, 10 Nov 2022 06:46:25 +0000 (07:46 +0100)]
Merge "build: warn about RSS driver experimental status" into integration

2 years agoMerge changes from topic "errata" into integration
Madhukar Pappireddy [Wed, 9 Nov 2022 20:20:24 +0000 (21:20 +0100)]
Merge changes from topic "errata" into integration

* changes:
  fix(cpus): workaround for Cortex-A76 erratum 2743102
  fix(cpus): workaround for Neoverse N1 erratum 2743102

2 years agoMerge "refactor(trng): cleanup the existing TRNG support" into integration
Manish V Badarkhe [Wed, 9 Nov 2022 16:30:17 +0000 (17:30 +0100)]
Merge "refactor(trng): cleanup the existing TRNG support" into integration

2 years agoMerge "fix(versal-net): add default values for silicon" into integration
Joanna Farley [Wed, 9 Nov 2022 11:49:28 +0000 (12:49 +0100)]
Merge "fix(versal-net): add default values for silicon" into integration

2 years agoMerge "docs(rme): add instruction to build rmm" into integration
Soby Mathew [Wed, 9 Nov 2022 11:48:38 +0000 (12:48 +0100)]
Merge "docs(rme): add instruction to build rmm" into integration

2 years agoMerge "docs(security): rename Makalu and SB optimisation" into integration
Joanna Farley [Wed, 9 Nov 2022 11:48:23 +0000 (12:48 +0100)]
Merge "docs(security): rename Makalu and SB optimisation" into integration

2 years agoMerge "docs(maintainers): update qti maintainer" into integration
Joanna Farley [Wed, 9 Nov 2022 11:38:48 +0000 (12:38 +0100)]
Merge "docs(maintainers): update qti maintainer" into integration

2 years agodocs(rme): add instruction to build rmm
Shruti Gupta [Wed, 2 Nov 2022 11:33:38 +0000 (11:33 +0000)]
docs(rme): add instruction to build rmm

Add documentation to build and run TF-A with RMM,
Linux kernel and TFTF Realm Payload.

Signed-off-by: Shruti Gupta <shruti.gupta@arm.com>
Change-Id: I951b41a144aabe0fec16eb933d7f005a65f06fb2

2 years agoMerge "docs: add link to DCO" into integration
Manish V Badarkhe [Wed, 9 Nov 2022 09:43:51 +0000 (10:43 +0100)]
Merge "docs: add link to DCO" into integration

2 years agofix(versal-net): add default values for silicon
Michal Simek [Sat, 5 Nov 2022 22:39:47 +0000 (15:39 -0700)]
fix(versal-net): add default values for silicon

Add missing default value for silicon.

Signed-off-by: Michal Simek <michal.simek@amd.com>
Change-Id: Iac7d4db17a29a148298e9e3bd3eb3f74cafe7bc1

2 years agochore(docs): move deprecated platforms information around
Sandrine Bailleux [Tue, 8 Nov 2022 12:36:42 +0000 (13:36 +0100)]
chore(docs): move deprecated platforms information around

We used to have a dedicated page for deprecated platforms information.
This document contained 2 pieces of information:

 a) the process for deprecating a platform port;
 b) the list of deprecated platforms to this day.

I think it makes more sense to move b) to the platforms ports landing
page, such that it is more visible.

This also has the nice effect to move the 'Deprecated platforms' title
as the last entry of the 'Platform ports' table of contents, like so:

 - Platform ports
   - 1. Allwinner ARMv8 SoCs
   - 2. Arm Development Platforms
     ...
   - 39. Broadcom Stingray
   - Deprecated platforms

instead of it being lost in the middle of supported platform ports.

Regarding a), this gets moved under the "Processes & Policies" section.
More specifically, it gets clubbed with the existing platform
compatibility policy. The combined document gets renamed into a
"Platforms Ports Policy" document.

Change-Id: I6e9ce2abc68b8a8ac88e7bd5f21749c14c9a2af6
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
2 years agoMerge "chore(docs): refresh platform ports landing page" into integration
Sandrine Bailleux [Wed, 9 Nov 2022 09:28:07 +0000 (10:28 +0100)]
Merge "chore(docs): refresh platform ports landing page" into integration

2 years agoMerge changes from topic "rdn2cfg2_spi_support" into integration
Manish V Badarkhe [Wed, 9 Nov 2022 09:21:56 +0000 (10:21 +0100)]
Merge changes from topic "rdn2cfg2_spi_support" into integration

* changes:
  feat(rdn2): enable extended SPI support
  feat(rdn2): add SPI ID ranges for RD-N2 multichip platform

2 years agoMerge "feat: pass SMCCCv1.3 SVE hint bit to dispatchers" into integration
Olivier Deprez [Wed, 9 Nov 2022 08:04:07 +0000 (09:04 +0100)]
Merge "feat: pass SMCCCv1.3 SVE hint bit to dispatchers" into integration

2 years agodocs(security): rename Makalu and SB optimisation
Bipin Ravi [Sat, 5 Nov 2022 03:52:56 +0000 (22:52 -0500)]
docs(security): rename Makalu and SB optimisation

Changing Makalu reference to the public name Cortex-A715. Also, added
a note on use of SB instruction for all CPUs supporting ENABLE_FEAT_SB.

Signed-off-by: Bipin Ravi <bipin.ravi@arm.com>
Change-Id: I98bd36c684fa7ae79bd4e8e641fd73404435c202

2 years agodocs: add link to DCO
Chris Kay [Tue, 8 Nov 2022 17:24:23 +0000 (17:24 +0000)]
docs: add link to DCO

The link to the Developer Certificate of Origin was mistakenly removed
in a patch some time ago. This change re-adds it.

Change-Id: Ia8aed055cb449cdf4c1aaeac9b81ca15099e73f5
Signed-off-by: Chris Kay <chris.kay@arm.com>
2 years agoMerge "docs(changelog): add missing scopes for release" into integration
Lauren Wehrmeister [Tue, 8 Nov 2022 17:06:39 +0000 (18:06 +0100)]
Merge "docs(changelog): add missing scopes for release" into integration

2 years agoMerge changes from topic "npm-dependencies" into integration
Manish Pandey [Tue, 8 Nov 2022 16:20:53 +0000 (17:20 +0100)]
Merge changes from topic "npm-dependencies" into integration

* changes:
  docs(changelog): fix invalid context management scope
  docs(commit-style): fix incorrect instructions for adding scopes
  docs(prerequisites): update Node.js prerequisites documentation

2 years agodocs: document do_panic() and panic() helper functions
Manish Pandey [Wed, 2 Nov 2022 16:30:09 +0000 (16:30 +0000)]
docs: document do_panic() and panic() helper functions

panic() and do_panic() are widely used helper functions called when
encountering a critical failure that cannot be recovered from.
Document them in porting guide. Also, remove panic() documentation
from PSCI guide(where it is unused anyways).

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: Ib0965cce56c03d0de5ac0d05d5714a6942793ede

2 years agobuild: warn about RSS driver experimental status
Sandrine Bailleux [Tue, 8 Nov 2022 14:04:36 +0000 (15:04 +0100)]
build: warn about RSS driver experimental status

Change-Id: I93b7afe17395a94e1ec0ae09457eb2fd320d59a9
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
2 years agorefactor(trng): cleanup the existing TRNG support
Jayanth Dodderi Chidanand [Tue, 11 Oct 2022 16:16:07 +0000 (17:16 +0100)]
refactor(trng): cleanup the existing TRNG support

This patch adds the following changes to complete the existing
TRNG implementation:

1. Adds a feature specific scope for buildlog generation.
2. Updates the docs on the build flag "TRNG_SUPPORT" and its values.
3. Makefile update and improves the existing comments at few sections
for better understanding of the underlying logic.

Change-Id: I3f72f0ccd5c94005a2df87158cf23199d2160d37
Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
2 years agochore(docs): refresh platform ports landing page
Sandrine Bailleux [Tue, 8 Nov 2022 12:22:20 +0000 (13:22 +0100)]
chore(docs): refresh platform ports landing page

 - Remove mentions of Arm SGM-775 and MediaTek MT6795 platforms.
   Both platform ports were deleted from TF-A source tree in the
   last release (v2.7).

 - Remove mention of Arm Morello platform, as it now has a dedicated
   documentation page accessible from the table of contents
   (see docs/plat/arm/morello/).

Change-Id: Ie3acdddab81f5589bb36114a8a766200f5b08ad4
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
2 years agoMerge "build(bl2): only set BL2_CPPFLAGS for armv8" into integration
Manish Pandey [Tue, 8 Nov 2022 11:48:31 +0000 (12:48 +0100)]
Merge "build(bl2): only set BL2_CPPFLAGS for armv8" into integration

2 years agofix(ras): restrict RAS support for NS world
Manish Pandey [Mon, 10 Oct 2022 10:43:08 +0000 (11:43 +0100)]
fix(ras): restrict RAS support for NS world

Current RAS framework in TF-A only supports handling errors originating
from NS world but the HANDLE_EA_EL3_FIRST flag configures it for all
lower Els. To make the current design of RAS explicit, rename this macro
to HANDLE_EA_EL3_FIRST_NS and set EA bit in scr_el3 only when
switching to NS world.

Note: I am unaware of any platform which traps errors originating in
Secure world to EL3, if there is any such platform then it need to
be explicitly implemented in TF-A

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: If58eb201d8fa792c16325c85c26056e9b409b750

2 years agofix(debug): decouple "get_el_str()" from backtrace
Manish Pandey [Tue, 1 Nov 2022 16:16:55 +0000 (16:16 +0000)]
fix(debug): decouple "get_el_str()" from backtrace

get_el_str() was implemented under ENABLE_BACKTRACE macro but being
used at generic places too, this causes multiple definition of this
function.
Remove duplicate definition of this function and move it out of
backtrace scope. Also, this patch fixes a small bug where in default
case S-EL1 is returned which ideally should be EL1, as there is no
notion of security state in EL string.

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: Ib186ea03b776e2478eff556065449ebd478c3538

2 years agofeat: pass SMCCCv1.3 SVE hint bit to dispatchers
Olivier Deprez [Tue, 11 Oct 2022 13:38:27 +0000 (15:38 +0200)]
feat: pass SMCCCv1.3 SVE hint bit to dispatchers

SMCCCv1.3 introduces the SVE hint bit added to the SMC FID (bit 16)
denoting that the world issuing an SMC doesn't expect the callee to
preserve the SVE state (FFR, predicates, Zn vector bits greater than
127). Update the generic SMC handler to copy the SVE hint bit state
to SMC flags and mask out the bit by default for the services called
by the standard dispatcher. It is permitted by the SMCCC standard to
ignore the bit as long as the SVE state is preserved. In any case a
callee must preserve the NEON state (FPCR/FPSR, Vn 128b vectors)
whichever the SVE hint bit state.

Signed-off-by: Olivier Deprez <olivier.deprez@arm.com>
Change-Id: I2b163ed83dc311b8f81f96b23c942829ae9fa1b5

2 years agodocs(maintainers): update qti maintainer
Muhammad Arsath K F [Tue, 8 Nov 2022 05:42:34 +0000 (21:42 -0800)]
docs(maintainers): update qti maintainer

Add Muhammad Arsath K F in qti maintainer

Signed-off-by: Muhammad Arsath K F <quic_mkf@quicinc.com>
Change-Id: I71e6cc72b3c658730abe5255977f3b93dd7e4563

2 years agodocs(changelog): add missing scopes for release
laurenw-arm [Tue, 1 Nov 2022 19:45:33 +0000 (14:45 -0500)]
docs(changelog): add missing scopes for release

Add missing scopes from commits for the upcoming release.

Change-Id: I22e38fb0658e42b45591c82aa30e063f7a7edc86
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
2 years agofix(bl31): harden check in delegate_async_ea
Manish Pandey [Tue, 11 Oct 2022 16:28:14 +0000 (17:28 +0100)]
fix(bl31): harden check in delegate_async_ea

Following hardening done around ESR_EL3 register usage
 - Panic if exception is anyting other than SError
 - AET bit is only valid if DFSC is 0x11, move DFSC check before AET.

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: Ib15159920f6cad964332fd40f88943aee2bc73b4

2 years agofix(el3-spmc): check descriptor size for overflow
Marc Bonnici [Tue, 18 Oct 2022 13:03:13 +0000 (14:03 +0100)]
fix(el3-spmc): check descriptor size for overflow

Ensure that the provided descriptor size used when reserving space
for a memory descriptor does not overflow to prevent scope for
memory corruption. Reported by Matt Oh, Google Android Red Team.

Reported-by: mattoh@google.com
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com>
Change-Id: If06985c4de9a88ff82ce60d10e346da948ed383f

2 years agofix(el3-spmc): fix location of fragment length check
Marc Bonnici [Tue, 18 Oct 2022 12:57:16 +0000 (13:57 +0100)]
fix(el3-spmc): fix location of fragment length check

Ensure that the fragment_length parameter is validated to prevent
a buffer overflow before it is used. Reported by Matt Oh, Google Android Red Team.

Reported-by: mattoh@google.com
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com>
Change-Id: I0323c096ffd988fbd85bbd4ade3abd8427aea977

2 years agofix(el3-spmc): fix detection of overlapping memory regions
Marc Bonnici [Tue, 18 Oct 2022 12:50:04 +0000 (13:50 +0100)]
fix(el3-spmc): fix detection of overlapping memory regions

The current logic does not cover all scenarios of overlapping
memory regions. Update the implementation to verify non-overlapping
regions instead. Reported by Matt Oh, Google Android Red Team.

Reported-by: mattoh@google.com
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com>
Change-Id: I16c53d081e4455bc0e28399d28a1b27b1a9eb49c

2 years agofix(el3-spmc): fix incomplete reclaim validation
Marc Bonnici [Tue, 18 Oct 2022 12:39:48 +0000 (13:39 +0100)]
fix(el3-spmc): fix incomplete reclaim validation

Ensure that the full memory transaction descriptor has been transmitted
before a request to reclaim the memory transaction is permitted.
This prevents any potential accesses to the incomplete descriptor.
Reported by Matt Oh, Google Android Red Team.

Reported-by: mattoh@google.com
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com>
Change-Id: I33e993c6b754632051e899ab20edd19b18b6cf65

2 years agobuild(bl2): only set BL2_CPPFLAGS for armv8
Diego Sueiro [Thu, 3 Nov 2022 17:01:39 +0000 (17:01 +0000)]
build(bl2): only set BL2_CPPFLAGS for armv8

If ARM_ARCH_MAJOR is 9 and ARM_ARCH_MINOR is 0 we don't want need to
have "-march=armv8-a+crc" in BL2_CPPFLAGS.

Change-Id: I9ac11522fde00953da40b95eebf82ff8ab2559ba
Signed-off-by: Diego Sueiro <diego.sueiro@arm.com>
2 years agoMerge "feat(qti): updated soc version for sc7180 and sc7280" into integration
Manish V Badarkhe [Fri, 4 Nov 2022 17:55:26 +0000 (18:55 +0100)]
Merge "feat(qti): updated soc version for sc7180 and sc7280" into integration

2 years agodocs(changelog): fix invalid context management scope
Chris Kay [Mon, 10 Oct 2022 15:57:45 +0000 (16:57 +0100)]
docs(changelog): fix invalid context management scope

Change-Id: Ia94b944a023568fc53a812cefffe97a7b3af4266
Signed-off-by: Chris Kay <chris.kay@arm.com>
2 years agodocs(commit-style): fix incorrect instructions for adding scopes
Chris Kay [Mon, 10 Oct 2022 15:50:14 +0000 (16:50 +0100)]
docs(commit-style): fix incorrect instructions for adding scopes

Change-Id: I3ce7abd1c21b084dea6b618c603f71b5bb4c50e8
Signed-off-by: Chris Kay <chris.kay@arm.com>
2 years agodocs(prerequisites): update Node.js prerequisites documentation
Chris Kay [Mon, 10 Oct 2022 13:34:23 +0000 (14:34 +0100)]
docs(prerequisites): update Node.js prerequisites documentation

This change updates the version of the Node Version Manager suggested by
the prerequisites documentation. The NVM installation command line hint
has been replaced with the snippet provided by NVM's user guide, and the
second line now automatically installs a version of Node.js compatible
with TF-A's repository scripts.

Change-Id: I6ef5e504118238716ceb45a52083450c424c5d20
Signed-off-by: Chris Kay <chris.kay@arm.com>
2 years agoMerge changes from topic "hikey960-el3-spmc" into integration
Olivier Deprez [Fri, 4 Nov 2022 09:47:54 +0000 (10:47 +0100)]
Merge changes from topic "hikey960-el3-spmc" into integration

* changes:
  feat(hikey960): read serial number from UFS
  feat(hikey960): add a FF-A logical partition
  feat(hikey960): add memory sharing hooks for SPMC_AT_EL3
  feat(hikey960): add plat-defines for SPMC_AT_EL3
  feat(hikey960): define a datastore for SPMC_AT_EL3
  feat(hikey960): add SP manifest for SPMC_AT_EL3
  feat(hikey960): increase secure workspace to 64MB
  feat(hikey960): upgrade to xlat_tables_v2

2 years agoMerge "fix(build): fix arch32 build issue for clang" into integration
Manish Pandey [Fri, 4 Nov 2022 09:42:17 +0000 (10:42 +0100)]
Merge "fix(build): fix arch32 build issue for clang" into integration