- Oct 31, 2022
-
-
Manish Pandey2 authored
-
- Oct 28, 2022
-
-
Manish Badarkhe authored
* changes: feat(compiler-rt): update compiler-rt source files fix(deps): add missing aeabi_memcpy.S feat(zlib): update zlib source files docs(changelog): add zlib and compiler-rt scope feat(libfdt): upgrade libfdt source files docs(prerequisites): upgrade to Mbed TLS 2.28.1
-
Olivier Deprez authored
* changes: docs(spm): add threat model for el3 spmc docs(spm): add design documentation
-
Sandrine Bailleux authored
-
- Oct 27, 2022
-
-
Bipin Ravi authored
* changes: fix(cpus): workaround for Cortex-A710 erratum 2291219 fix(cpus): workaround for Cortex-X3 erratum 2313909 fix(cpus): workaround for Neoverse-N2 erratum 2326639 fix(rpi3): tighten platform pwr_domain_pwr_down_wfi behaviour chore: rename Makalu ELP to Cortex-X3
-
Madhukar Pappireddy authored
-
Boyan Karatotev authored
Cortex-A710 erratum 2291219 is a Cat B erratum that applies to revisions r0p0, r1p0, and r2p0, and is fixed in r2p1. The workaround is to set CPUACTLR2_EL1[36] to 1 before the power down sequence that sets CORE_PWRDN_EN. This allows the cpu to retry the power down and prevents the deadlock. TF-A never clears this bit even if it wakes up from the wfi in the sequence since it is not expected to do anything but retry to power down after and the bit is cleared on reset. SDEN can be found here: https://developer.arm.com/documentation/SDEN1775101/latest Signed-off-by:
Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: I7d3a97dfac0c433c0be386c1f3d2f2e895a3f691
-
Boyan Karatotev authored
Cortex-X3 erratum 2313909 is a Cat B erratum that applies to revisions r0p0 and r1p0, and is fixed in r1p1. The workaround is to set CPUACTLR2_EL1[36] to 1 before the power down sequence that sets CORE_PWRDN_EN. This allows the cpu to retry the power down and prevents the deadlock. TF-A never clears this bit even if it wakes up from the wfi in the sequence since it is not expected to do anything but retry to power down after and the bit is cleared on reset. SDEN can be found here: https://developer.arm.com/documentation/SDEN2055130/latest Signed-off-by:
Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: I5935b4bcd1e6712477c0d6eab2acc96d7964a35d
-
Boyan Karatotev authored
Neoverse-N2 erratum 2326639 is a Cat B erratum that applies to revision r0p0 and is fixed in r0p1. The workaround is to set CPUACTLR2_EL1[36] to 1 before the power down sequence that sets CORE_PWRDN_EN. This allows the cpu to retry the power down and prevents the deadlock. TF-A never clears this bit even if it wakes up from the wfi in the sequence since it is not expected to do anything but retry to power down after and the bit is cleared on reset. SDEN can be found here: https://developer.arm.com/documentation/SDEN1982442/latest/ Signed-off-by:
Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: I9a325c5b9b498798e5efd5c79a4a6d5bed97c619
-
Boyan Karatotev authored
Platforms which implement pwr_domain_pwr_down_wfi differ substantially in behaviour. However, different cpus require similar sequences to power down. This patch tightens the behaviour of these platforms to end on a wfi loop after performing platform power down. This is required so that platforms behave more consistently on power down, in cases where the wfi can fall through. Signed-off-by:
Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: Ie29bd3a5e654780bacb4e07a6d123ac6d2467c1f
-
Shruti Gupta authored
Threat model for EL3 SPMC. The mitigations are based on the guidance provided in FF-A v1.1 EAC0 spec. Signed-off-by:
Shruti Gupta <shruti.gupta@arm.com> Change-Id: I7f4c9370b6eefe6d1a7d1afac27e8b3a7b476072
-
Shruti Gupta authored
Add documentation how to build EL3 SPMC, briefly describes all FF-A interfaces, SP boot flow, SP Manifest, Power Management, Boot Info Protocol, Runtime model and state transition and Interrupt Handling. Signed-off-by:
Shruti Gupta <shruti.gupta@arm.com> Change-Id: I630df1d50a4621b344a09e462563eacc90109de4
-
Boyan Karatotev authored
The Cortex-X3 cpu port was developed before its public release when it was known as Makalu ELP. Now that it's released we can use the official product name. Signed-off-by:
Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: Iebb90cf2f77330ed848a3d61c5f6928942189c5a
-
- Oct 26, 2022
-
-
Lauren Wehrmeister authored
-
Bipin Ravi authored
Optimised the loop workaround for Spectre_BHB mitigation: 1. use of speculation barrier for cores implementing SB instruction. 2. use str/ldr instead of stp/ldp as the loop uses only X2 register. Signed-off-by:
Bipin Ravi <bipin.ravi@arm.com> Change-Id: I8ac53ea1e42407ad8004c1d59c05f791011f195d
-
Manish Pandey2 authored
-
Shawn Guo authored
Function imx_system_off() writes SNVS_LPCR register to power off the SoC without bit masking. This clears other bits like LPWUI_EN and breaks the function of SoC wake-up using RTC alarm. Fix it by updating poweroff related bits only. Signed-off-by:
Shawn Guo <shawn.guo@linaro.org> Change-Id: If641af4dc1103c67e1a645c03bb36a5f56665aef
-
Manish Badarkhe authored
-
- Oct 24, 2022
-
-
Madhukar Pappireddy authored
-
Daniel Boulby authored
Update the compiler-rt source files to the tip of the llvm-project [1]. To do this some new header files were pulled in from the freebsd-src repo [2]. [1] https://github.com/llvm/llvm-project/commit/fae258e [2] https://github.com/freebsd/freebsd-src/commit/243a0eda Change-Id: I1a012b1fe04e127d35e208923877c98c5d999d00 Signed-off-by:
Daniel Boulby <daniel.boulby@arm.com>
-
Daniel Boulby authored
Add missing aeabi_memcpy.S file from llvm compiler-rt library [1]. This is required for Aarch32 builds with clang. [1] https://github.com/llvm/llvm-project.git Change-Id: I7fd6ab1e81dd45d24afef49a3eb8fcdcbc5c082f Signed-off-by:
Daniel Boulby <daniel.boulby@arm.com>
-
Daniel Boulby authored
Upgrade the zlib source files to the ones present in the version 1.2.13 of zlib [1]. Since 1.2.11 the use of Arm crc32 instructions has been introduced so update the files to make use of this. [1] https://github.com/madler/zlib/tree/v1.2.13 Change-Id: Ideef78c56f05ae7daec390d00dcaa8f66b18729e Signed-off-by:
Daniel Boulby <daniel.boulby@arm.com>
-
Daniel Boulby authored
Change-Id: Id98ca7762fd17cb793b0ec9119d0b026195cf2c2 Signed-off-by:
Daniel Boulby <daniel.boulby@arm.com>
-
- Oct 21, 2022
-
-
Manish Badarkhe authored
-
Sandrine Bailleux authored
* changes: docs(imx8m): update for high assurance boot feat(imx8m): add support for high assurance boot feat(imx8mp): add hab and map required memory blocks feat(imx8mn): add hab and map required memory blocks feat(imx8mm): add hab and map required memory blocks
-
- Oct 20, 2022
-
-
Manish Badarkhe authored
Arm has decided to deprecate the sgi575 and rdn1edge platforms. The development of software and fast models for these platforms has been discontinued. rdn1edge platform has been superseded by the rdn2 platform, which is already supported in TF-A and CI work is underway for this platform. Change-Id: If2228fb73549b244c3a5b0e5746617b3f24fe771 Signed-off-by:
Manish V Badarkhe <Manish.Badarkhe@arm.com>
-
Andre Przywara authored
The ARMv8 ARM says about the values in the ID register scheme: ==== D17.1.3 Principles of the ID scheme for fields in ID registers === The ID fields, which are either signed or unsigned, use increasing numerical values to indicate increases in functionality. Therefore, if a value of 0x1 indicates the presence of some instructions, then the value 0x2 will indicate the presence of those instructions plus some additional instructions or functionality. This means software can be written in the form: if (value >= number) { // do something that relies on the value of the feature } ======================================================================= So to check for the presence of a certain architecture feature, we should not check against a certain specific value, as it's done right now in several cases. Relax the test for Fine Grained Trapping (FGT) to just check against the field being 0 or not. This fixes TF-A crashing due to an unhandled exception, when running a Linux kernel on an FVP enabling ARMv8.9 features. The value of ID_AA64MMFR0_EL1.FGT went from 0b0001 to 0b0010 there. Change-Id: Ic3f1625a7650306ed388a0660429ca8823c673c2 Signed-off-by:
Andre Przywara <andre.przywara@arm.com>
-
Madhukar Pappireddy authored
-
Madhukar Pappireddy authored
-
joannafarley-arm authored
-
- Oct 19, 2022
-
-
Bipin Ravi authored
The CPU version check was moved wrongly down in N2 and missing in V1. The patch fixes the issues. Signed-off-by:
Bipin Ravi <bipin.ravi@arm.com> Change-Id: Icb6e5285d6cc97fbe416fe1f0b1ab7afbd8a8809
-
Andrey Zhizhikin authored
Add a section into documentation listing the support for High Assurance Boot (HABv4), note on the DRAM mapping, and reference to the external documentation. Signed-off-by:
Andrey Zhizhikin <andrey.zhizhikin@leica-geosystems.com> Change-Id: Iaca97f4ac2595e35de2664a880394519f96eca07
-
Andrey Zhizhikin authored
Introduce support for High Assurance Boot (HABv4), which is used to establish and extend the Root-of-Trust during FW loading at any given boot stage. This commit introduces support for HAB ROM Vector Table (RVT) API, which is normally used by post-ROM code to authenticate additional boot images (Kernel, FDT, FIT, etc.) that are taking part in the Root-of-Trust. Signed-off-by:
Andrey Zhizhikin <andrey.zhizhikin@leica-geosystems.com> Change-Id: I780d308369824fa4850844eb9e91768e417166a0
-
Andrey Zhizhikin authored
In order for HAB to perform operations, memory regions has to be mapped in TF-A, which HAB ROM code would use internally. Include those memory blocks for i.MX8M+ SoC. Of a special note, the DRAM block is mapped with complete size available on the platform and uses MT_RW attributes, this is required to minimize the size of translation tables and provide a possibility to exchange the execution results between EL3 and EL1&2, see details in [1]. Link: [1]: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/16880 Signed-off-by:
Andrey Zhizhikin <andrey.zhizhikin@leica-geosystems.com> Change-Id: I986cdce434d1ec9ea8b3c0d5599edde55b9b30f8
-
Andrey Zhizhikin authored
In order for HAB to perform operations, memory regions has to be mapped in TF-A, which HAB ROM code would use internally. Include those memory blocks for i.MX8MN SoC. Of a special note, the DRAM block is mapped with complete size available on the platform and uses MT_RW attributes, this is required to minimize the size of translation tables and provide a possibility to exchange the execution results between EL3 and EL1&2, see details in [1]. Link: [1]: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/16880 Signed-off-by:
Andrey Zhizhikin <andrey.zhizhikin@leica-geosystems.com> Change-Id: If7a2b718658db452871e1ae56b71a4983e8ef2fe
-
Andrey Zhizhikin authored
In order for HAB to perform operations, memory regions has to be mapped in TF-A, which HAB ROM code would use internally. Include those memory blocks for i.MX8MM SoC. Of a special note, the DRAM block is mapped with complete size available on the platform and uses MT_RW attributes, this is required to minimize the size of translation tables and provide a possibility to exchange the execution results between EL3 and EL1&2, see details in [1]. Link: [1]: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/16880 Signed-off-by:
Andrey Zhizhikin <andrey.zhizhikin@leica-geosystems.com> Change-Id: I6a3a3d7105b85c2f4ab6ea6cfbca67c9a325eb11
-
Daniel Boulby authored
Update the libfdt source files to the upstream commit e37c256 [1]. [1] https://github.com/dgibson/dtc/commit/e37c256 Change-Id: I00e29b467ff6f8c094f68245232a7cedeaa14aef Signed-off-by:
Daniel Boulby <daniel.boulby@arm.com>
-
Daniel Boulby authored
In anticpation of the next Trusted Firmware release update the to newest 2.x Mbed TLS library [1]. Note that the Mbed TLS project published version 3.x some time ago. However, as this is a major release with API breakages, upgrading to this one might require some more involved changes in TF-A, which we are not ready to do. We shall upgrade to Mbed TLS 3.x after the v2.8 release of TF-A. [1] https://github.com/Mbed-TLS/mbedtls/tree/v2.28.1 Change-Id: I7594ad062a693d2ecc3b1705e944dce2c3c43bb2 Signed-off-by:
Daniel Boulby <daniel.boulby@arm.com>
-
- Oct 18, 2022
-
-
Sandrine Bailleux authored
-
- Oct 17, 2022
-
-
Andre Przywara authored
-