- May 30, 2023
-
-
Boyan Karatotev authored
The function is called in a fully initialised C environment and calls into other C functions. The Aarch differences are minimal and are hidden by the pre-existing headers. Converting it results into cleaner code that is the same across both Aarch64 and Aarch32. To avoid having to do very ugly pointer arithmetic, define a C struct for the cpu_ops for both Aarch64 and Aarch32. Signed-off-by:
Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: Idc07c4064e03143c88a4a0e2d10ceda70ba19a50
-
Boyan Karatotev authored
The ERRATA_XXX macros, used in cpu_helpers.S, are necessary for the check_errata_xxx family of functions. The CPU_REV should be used in the cpu files but for whatever reason the values have been hard-coded so far (at the cost of readability). It's evident this file is not strictly for status reporting. The new purpose of this file is to make it a one-stop-shop for all things errata. Signed-off-by:
Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: I1ce22dd36df5aa0bcfc5f2772251f91af8703dfb
-
Boyan Karatotev authored
The cpu_macros.S file is loaded with lots of definitions for the cpu_ops structure. However, since they are defined as .equ directives they are inaccessible for C code. Convert them to #defines, put them into order, refactor them for readability, and extract them to a separate file to make this possible. This has the benefit of removing some Aarch differences and a lot of duplicate code. Signed-off-by:
Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: I72861794b6c9131285a9297d5918822ed718b228
-
- May 26, 2023
-
-
Joanna Farley authored
-
- May 25, 2023
-
-
Manish Pandey authored
-
Manish Pandey authored
* changes: fix(el3-spmc): correctly account for emad_offset refactor(el3-spmc): avoid unnecessarily revalidating offset fix(el3-spmc): only call spmc_shm_check_obj() on complete objects refactor(spmc): assert on out-of-bounds emad access refactor(el3-spmc): spmc_shmem_obj_get_emad() will never fail fix(el3-spmc): validate descriptor headers fix(el3-spmc): use version-dependent minimum descriptor length refactor(el3-spmc): check emad_count offset
-
- May 24, 2023
-
-
Joanna Farley authored
* changes: feat(versal-net): add support for SMCC ARCH SOC ID feat(versal): add support for SMCC ARCH SOC ID refactor(versal-net): move macros to common header feat(xilinx): add support to get chipid
-
Joanna Farley authored
-
Michal Simek authored
Pack the structure and make id/ver smaller and sorted. The change saves 400bytes in RODATA section. Change-Id: I8bcbe8fd589ba193551a0dd2cd19572516252e73 Signed-off-by:
Michal Simek <michal.simek@amd.com>
-
Madhukar Pappireddy authored
-
Joanna Farley authored
* changes: feat(xilinx): fix IPI calculation for Versal/NET feat(xilinx): setup local/remote id in header feat(xilinx): clean macro names fix(zynqmp): do not export apu_ipi fix(zynqmp): remove unused headers feat(xilinx): move IPI related macros to plat_ipi.h
-
Joanna Farley authored
-
Soby Mathew authored
-
Akshay Belsare authored
Add support for SMCCC_ARCH_SOC_ID as per SMC Calling Convention for Versal NET platform. The SMCC ARCH SOC ID call is used by system software to obtain the SiP defined SoC identification details. Change-Id: I6648051c7f5fa27d2f02080209da36ee8d5a9d95 Signed-off-by:
Akshay Belsare <akshay.belsare@amd.com>
-
Akshay Belsare authored
Add support for SMCCC_ARCH_SOC_ID as per SMC Calling Convention for Versal platform. The SMCC ARCH SOC ID call is used by system software to obtain the SiP defined SoC identification details. Change-Id: I1466a9ad1bc8dde1cda516ddd3edbaa6a5941237 Signed-off-by:
Akshay Belsare <akshay.belsare@amd.com>
-
Akshay Belsare authored
Move the macros to common header from platform specific folder, so that the same macros can be re-used in other platforms. Change-Id: I355b024f5e870c6fc104598bc571dbaa29503ae2 Signed-off-by:
Akshay Belsare <akshay.belsare@amd.com>
-
Akshay Belsare authored
Add support for PM API SYS to get the chip ID from the target. The API calls the IPI command to read the Chip idcode and revision. Change-Id: Id4d7d812cbf77c5e2fc7785b8afb379214f8dd19 Signed-off-by:
Akshay Belsare <akshay.belsare@amd.com>
-
Joanna Farley authored
-
Joanna Farley authored
* changes: fix(versal): fix BLXX memory limits for user defined values fix(zynqmp): fix BLXX memory limits for user defined values
-
Michal Simek authored
When compiling with user defined areas of memory the platform code calculates the size with (base + size - 1). However, the linker file aligns section on a page boundary. So having the -1 in the size calculations leads to an error message looking like this: bl31.elf section `coherent_ram' will not fit in region `RAM' aarch64-buildroot-linux-uclibc-ld: region `RAM' overflowed by 1 byte While at it fix all other occurences of predefined values that were calculated with -1. Fixes: 1d333e69 ("feat(versal-net): add support for Xilinx Versal NET platform") Change-Id: I4455f63ee3ad52369f517a7d8d3627faf0b28c0f Signed-off-by:
Michal Simek <michal.simek@amd.com>
-
Shruti Gupta authored
This patch enables CTX_INCLUDE_PAUTH_REGS for RME builds. The RMM-EL3 specification is also updated to reflect the changes and also version of the same is bumped from 0.1 to 0.2. Signed-off-by:
Shruti Gupta <shruti.gupta@arm.com> Change-Id: I2e96a592d2b75abaee24294240c1727c5ceba420
-
Ilias Apalodimas authored
When compiling with user defined areas of memory the platform code calculates the size with (base + size - 1). However, the linker file aligns section on a page boundary. So having the -1 in the size calculations leads to an error message looking like this: bl31.elf section `coherent_ram' will not fit in region `RAM' aarch64-buildroot-linux-uclibc-ld: region `RAM' overflowed by 1 byte While at it fix all other occurences of predefined values that were calculated with -1 Fixes: commit f91c3cb1 ("arm64: versal: Add support for new Xilinx Versal ACAPs") Signed-off-by:
Ilias Apalodimas <ilias.apalodimas@linaro.org> Change-Id: Ica1f97867b701e7fcd60ea8ea07d2ae96c485443
-
Ilias Apalodimas authored
When compiling with user defined areas of memory the platform code calculates the size with (base + size - 1). However, the linker file aligns section on a page boundary. So having the -1 in the size calculations leads to an error message looking like this: bl31.elf section `coherent_ram' will not fit in region `RAM' aarch64-buildroot-linux-uclibc-ld: region `RAM' overflowed by 1 byte Commit 9b4ed0af ("feat(plat/zynqmp): fix section `coherent_ram' will not fit in region `RAM'") applied a similar fix, but only in the predefined for BL31LIMIT/BASE. While at it fix all other occurences of predefined values that were calculated with -1 Fixes: 01555332 ("zynqmp: Revise memory configuration options") Signed-off-by:
Ilias Apalodimas <ilias.apalodimas@linaro.org> Change-Id: Ic96e36808d01f6bb92e6839cec92fc52320dd3f3
-
Sandrine Bailleux authored
-
- May 23, 2023
-
-
Sandrine Bailleux authored
* changes: feat(intel): restructure sys mgr for S10/N5X feat(intel): restructure sys mgr for Agilex
-
Madhukar Pappireddy authored
-
Olivier Deprez authored
-
Sandrine Bailleux authored
-
Manish Pandey authored
-
Jit Loon Lim authored
This patch is to restructure system manager. Move platform dependent MACROs to individual platform system manager. Common system manager will remain for those common declaration only. Signed-off-by:
Jit Loon Lim <jit.loon.lim@intel.com> Change-Id: I385455671413e154d04a879d33fdd774fcfefbd6
-
Jit Loon Lim authored
This patch is to restructure system manager. Move platform dependent MACROs to individual platform system manager. Common system manager will remain for those common declaration only. Signed-off-by:
Jit Loon Lim <jit.loon.lim@intel.com> Change-Id: I2f52d3eaf47716f7dfc636bbf1a23d68a04f39cb
-
Jit Loon Lim authored
Add checking on the size of source data does not exceed source size when using memcpy and memset. Add checking on the size of source data in FPGA Crypto Service does not exceed the maximum of expected data size and does not meet the minimum of expected data size. Signed-off-by:
Phui Kei Wong <phui.kei.wong@intel.com> Signed-off-by:
Jit Loon Lim <jit.loon.lim@intel.com> Change-Id: Idb18f05c18d9142fbe703c3f4075341d179d8bad
-
Prasad Kummari authored
The array type_el3_interrupt_table is defined for MAX_INTR_EL3(128) elements and only two interrupts - ARM_IRQ_SEC_SGI_7(15), IRQ_TTC3_1(77) are being handled. Current implementation is consuming 1024 bytes which can be optimized for the number of interrupts to be handled. The current array is replaced with the array of struct zynmp_intr_info_type_el3_t (id and handler as member) and with maximum number of interrupts to be handled as the size of array (MAX_INTR_EL3 = 2). User is expected to adjust MAX_INTR_EL3 based on how many interrupts are handled in TF-A. With the updated implementation, a reduction of 960 bytes is observed. Versal and Versal NET are using similar implementation introduced by commit e497421d ("feat(versal): add infrastructure to handle multiple interrupts") and commit 0654ab7f ("feat(versal-net): add support for platform management"). Signed-off-by:
Prasad Kummari <prasad.kummari@amd.com> Change-Id: I07aa388d38ac3ff3c0d25decbe0719087b27ee18
-
- May 22, 2023
-
-
Jit Loon Lim authored
Enable SEU ERR read interfaces for non-secure world to read out SEU status for DDR. SEU ERR SMC opcode updated to 0xC2000099 Signed-off-by:
Jit Loon Lim <jit.loon.lim@intel.com> Change-Id: I0618dfcdc86a7c1e0c8047b7214d369866dd2281
-
Govindraj Raja authored
tsp uses uart2 and is printing some init messages in main, but in certain situations we may exit tsp and may not have flushed uart data, this could later land in uart fifo overflow or random corruption. Time to time we have seen a character corruption on uart2 arising out of logs from tsp main. So flush console messages from tsp_main before leaving the function. This is inline with our uart usage strategy across TF-A as most entry _main function ensures uart console is flushed before exit. The console flush is harmless and should fix the potential character corruption if it was due to tsp_main negligence. But we cannot also rule out that it could be a potential FVP-UART problem, but that's quite unlikely and further CI daily's will give us a idea if this fixes the character corruption seen or we may need stress test FVP-UART which maybe corrupting character in certain circumstances. Signed-off-by:
Govindraj Raja <govindraj.raja@arm.com> Change-Id: I300c6b71c00fa92b8b97b3e77ea936b393d0f7b5
-
Joanna Farley authored
-
Sandrine Bailleux authored
Signed-off-by:
Sandrine Bailleux <sandrine.bailleux@arm.com> Change-Id: I8d3966e230609f9da4c313201ed0cb0f46f27200
-
Madhukar Pappireddy authored
-
Manish Pandey authored
The feature support overview is meant to list all the major features present in TF-A. It should be precise, non-exhaustive and up-to-date. Updated the document with new features and removed few unnecessary details. Signed-off-by:
Manish Pandey <manish.pandey2@arm.com> Change-Id: I28b378f405a6b9d8f86e7b44e435c33625e3d260
-
Manish Pandey authored
-