1. 19 Aug, 2021 1 commit
  2. 17 Aug, 2021 1 commit
    • johpow01's avatar
      cpu: add support for Demeter CPU · f4616efa
      johpow01 authored
      
      
      This patch adds the basic CPU library code to support the Demeter
      CPU.  This CPU is based on the Makalu-ELP core so that CPU lib code
      was adapted to create this patch.
      Signed-off-by: default avatarJohn Powell <john.powell@arm.com>
      Change-Id: Ib5740b748008a72788c557f0654d8d5e9ec0bb7f
      f4616efa
  3. 16 Aug, 2021 1 commit
  4. 10 Aug, 2021 2 commits
  5. 05 Aug, 2021 1 commit
  6. 03 Aug, 2021 2 commits
  7. 02 Aug, 2021 1 commit
  8. 23 Jul, 2021 1 commit
  9. 19 Jul, 2021 1 commit
  10. 16 Jul, 2021 1 commit
  11. 28 Jun, 2021 1 commit
    • Max Shvetsov's avatar
      feat(sve): enable SVE for the secure world · 0c5e7d1c
      Max Shvetsov authored
      
      
      Enables SVE support for the secure world via ENABLE_SVE_FOR_SWD.
      ENABLE_SVE_FOR_SWD defaults to 0 and has to be explicitly set by the
      platform. SVE is configured during initial setup and then uses EL3
      context save/restore routine to switch between SVE configurations for
      different contexts.
      Reset value of CPTR_EL3 changed to be most restrictive by default.
      Signed-off-by: default avatarMax Shvetsov <maksims.svecovs@arm.com>
      Change-Id: I889fbbc2e435435d66779b73a2d90d1188bf4116
      0c5e7d1c
  12. 23 Jun, 2021 2 commits
  13. 03 Jun, 2021 1 commit
  14. 28 May, 2021 1 commit
  15. 14 May, 2021 1 commit
    • Alexei Fedorov's avatar
      fix(security): Set MDCR_EL3.MCCD bit · 12f6c064
      Alexei Fedorov authored
      
      
      This patch adds setting MDCR_EL3.MCCD in 'el3_arch_init_common'
      macro to disable cycle counting by PMCCNTR_EL0 in EL3 when
      FEAT_PMUv3p7 is implemented. This fixes failing test
      'Leak PMU CYCLE counter values from EL3 on PSCI suspend SMC'
      on FVP models with 'has_v8_7_pmu_extension' parameter set to
      1 or 2.
      Signed-off-by: default avatarAlexei Fedorov <Alexei.Fedorov@arm.com>
      Change-Id: I2ad3ef501b31ee11306f76cb5a61032ecfd0fbda
      12f6c064
  16. 21 Apr, 2021 1 commit
    • Yann Gautier's avatar
      Add PIE support for AARCH32 · 4324a14b
      Yann Gautier authored
      
      
      Only BL32 (SP_min) is supported at the moment, BL1 and BL2_AT_EL3 are just
      stubbed with _pie_fixup_size=0.
      The changes are an adaptation for AARCH32 on what has been done for
      PIE support on AARCH64.
      The RELA_SECTION is redefined for AARCH32, as the created section is
      .rel.dyn and the symbols are .rel*.
      
      Change-Id: I92bafe70e6b77735f6f890f32f2b637b98cf01b9
      Signed-off-by: default avatarYann Gautier <yann.gautier@st.com>
      4324a14b
  17. 20 Apr, 2021 1 commit
  18. 13 Apr, 2021 1 commit
  19. 07 Apr, 2021 1 commit
    • Max Shvetsov's avatar
      Fix: Remove save/restore of EL2 timer registers · a7cf2743
      Max Shvetsov authored
      
      
      Since there is a secure and non-secure version of the timer registers
      there is no need to preserve their context in EL3.
      With that, following registers were removed from EL3 save/restore
      routine:
      	cnthps_ctl_el2
      	cnthps_tval_el2
      	cnthps_cval_el2
      	cnthvs_ctl_el2
      	cnthvs_tval_el2
      	cnthvs_cval_el2
      	cnthp_ctl_el2
      	cnthp_cval_el2
      	cnthp_tval_el2
      	cnthv_ctl_el2
      	cnthv_cval_el2
      	cnthv_tval_el2
      Signed-off-by: default avatarMax Shvetsov <maksims.svecovs@arm.com>
      Change-Id: I6e2fc09c74a7375c4fccc11f12af4e39e6dc616b
      a7cf2743
  20. 06 Apr, 2021 1 commit
  21. 31 Mar, 2021 1 commit
  22. 24 Mar, 2021 1 commit
  23. 10 Mar, 2021 1 commit
  24. 01 Mar, 2021 1 commit
  25. 25 Feb, 2021 1 commit
  26. 24 Feb, 2021 1 commit
    • Andre Przywara's avatar
      libc: memset: Fix MISRA issues · 005415a3
      Andre Przywara authored
      
      
      MISRA complained about "0"s not being followed by an "U" (please note
      my protest about this!) and about values not being explicitly compared
      to 0 (fair enough).
      Also use explicit pointer types.
      
      Fix those issues to make the CI happy.
      
      Change-Id: I4d11e49c14f16223a71c78b0fc3e68ba9a1382d3
      Signed-off-by: default avatarAndre Przywara <andre.przywara@arm.com>
      005415a3
  27. 23 Feb, 2021 1 commit
  28. 05 Feb, 2021 1 commit
  29. 03 Feb, 2021 4 commits
  30. 29 Jan, 2021 1 commit
    • Madhukar Pappireddy's avatar
      Fix exception handlers in BL31: Use DSB to synchronize pending EA · c2d32a5f
      Madhukar Pappireddy authored
      For SoCs which do not implement RAS, use DSB as a barrier to
      synchronize pending external aborts at the entry and exit of
      exception handlers. This is needed to isolate the SErrors to
      appropriate context.
      
      However, this introduces an unintended side effect as discussed
      in the https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/3440
      
      
      A summary of the side effect and a quick workaround is provided as
      part of this patch and summarized here:
      
      The explicit DSB at the entry of various exception vectors in BL31
      for handling exceptions from lower ELs can inadvertently trigger an
      SError exception in EL3 due to pending asyncrhonouus aborts in lower
      ELs. This will end up being handled by serror_sp_elx in EL3 which will
      ultimately panic and die.
      
      The way to workaround is to update a flag to indicate if the exception
      truly came from EL3. This flag is allocated in the cpu_context
      structure. This is not a bullet proof solution to the problem at hand
      because we assume the instructions following "isb" that help to update
      the flag (lines 100-102 & 139-141) execute without causing further
      exceptions.
      
      Change-Id: I4d345b07d746a727459435ddd6abb37fda24a9bf
      Signed-off-by: default avatarMadhukar Pappireddy <madhukar.pappireddy@arm.com>
      c2d32a5f
  31. 21 Jan, 2021 1 commit
  32. 20 Jan, 2021 3 commits