- 19 Mar, 2019 2 commits
-
-
Soby Mathew authored
xlat_tables_v2: Revert recent changes to remove recursion
-
Antonio Nino Diaz authored
This commit reverts the following commits: - c54c7fc3 ("xlat_tables_v2: print xlat tables without recursion") - db8cac2d ("xlat_tables_v2: unmap region without recursion.") - 0ffe2692 ("xlat_tables_v2: map region without recursion.") This was part of PR#1843. A problem has been detected in one of our test run configurations involving dynamic mapping of regions and it is blocking the next release. Until the problem can be solved, it is safer to revert the changes. Change-Id: I3d5456e4dbebf291c8b74939c6fb02a912e0903b Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>
-
- 18 Mar, 2019 4 commits
-
-
Soby Mathew authored
Fix MIDR_EL1 value for Neoverse E1
-
Soby Mathew authored
Declare ENABLE_PAUTH build option as experimental
-
Alexei Fedorov authored
Declare ENABLE_PAUTH and CTX_INCLUDE_PAUTH_REGS build options as experimental. Pointer Authentication is enabled for Non-secure world irrespective of the value of these build flags if the CPU supports it. The patch also fixes the description of fiptool 'help' command. Change-Id: I46de3228fbcce774a2624cd387798680d8504c38 Signed-off-by: Alexei Fedorov <Alexei.Fedorov@arm.com>
-
Soby Mathew authored
Pointer authentication fixes
-
- 15 Mar, 2019 6 commits
-
-
John Tsichritzis authored
Change-Id: I75ee39d78c81ecb528a671c0cfadfc2fe7b5d818 Signed-off-by: John Tsichritzis <john.tsichritzis@arm.com>
-
Dimitris Papastamos authored
rockchip: add an fdt parsing stub for platform param
-
Dimitris Papastamos authored
Introduce preliminary support for Neoverse Zeus
-
Dimitris Papastamos authored
Apply variant 4 mitigation for Neoverse N1
-
Dimitris Papastamos authored
Update documentation for mbed TLS v2.16
-
Dimitris Papastamos authored
fvp: Increase the size of the stack for FVP
-
- 14 Mar, 2019 7 commits
-
-
Heiko Stuebner authored
The Rockchip ATF platform can be entered from both Coreboot and U-Boot. While Coreboot does submit the list of linked parameter structs as platform param, upstream u-boot actually always provides a pointer to a devicetree as parameter. This results in current ATF not running at all when started from U-Boot. To fix this, add a stub that checks if the parameter is a fdt so we can at least boot and not get stuck. Later on we can extend this with actual parsing of information from the devicetree. Signed-off-by: Heiko Stuebner <heiko@sntech.de> Cc: Philipp Tomsich <philipp.tomsich@theobroma-systems.com>
-
Louis Mayencourt authored
When RECLAIM_INIT_CODE is 1, the stack is used to contain the .text.init section. This is by default enable on FVP. Due to the size increase of the .text.init section, the stack had to be adjusted contain it. Change-Id: Ia392341970fb86c0426cf2229b1a7295453e2e32 Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
-
John Tsichritzis authored
Change-Id: I1854b5830dbd48e909a4ce1b931c13fb3e997600 Signed-off-by: John Tsichritzis <john.tsichritzis@arm.com>
-
Sandrine Bailleux authored
The dummy implementation of the plat_init_apiakey() platform API uses an internal 128-bit buffer to store the initial key value used for Pointer Authentication support. The intent - as stated in the file comments - was for this buffer to be write-protected by the MMU. Initialization of the buffer would be performed before enabling the MMU, thus bypassing write protection checks. However, the key buffer ended up into its own read-write section by mistake due to a typo on the section name ('rodata.apiakey' instead of '.rodata.apiakey', note the leading dot). As a result, the linker script was not pulling it into the .rodata output section. One way to address this issue could have been to fix the section name. However, this approach does not work well for BL1. Being the first image in the boot flow, it typically is sitting in real ROM so we don't have the capacity to update the key buffer at any time. The dummy implementation of plat_init_apiakey() provided at the moment is just there to demonstrate the Pointer Authentication feature in action. Proper key management and key generation would have to be a lot more careful on a production system. Therefore, the approach chosen here to leave the key buffer in writable memory but move it to the BSS section. This does mean that the key buffer could be maliciously updated for intalling unintended keys on the warm boot path but at the feature is only at an experimental stage right now, this is deemed acceptable. Change-Id: I121ccf35fe7bc86c73275a4586b32d4bc14698d6 Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
-
Sandrine Bailleux authored
Instruction key A was incorrectly restored in the instruction key B registers. Change-Id: I4cb81ac72180442c077898509cb696c9d992eda3 Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
-
John Tsichritzis authored
Change-Id: If56d1e200a31bd716726d7fdc1cc0ae8a63ba3ee Signed-off-by: John Tsichritzis <john.tsichritzis@arm.com>
-
John Tsichritzis authored
This patch applies the new MSR instruction to directly set the PSTATE.SSBS bit which controls speculative loads. This new instruction is available at Neoverse N1 core so it's utilised. Change-Id: Iee18a8b042c90fdb72d2b98f364dcfbb17510728 Signed-off-by: John Tsichritzis <john.tsichritzis@arm.com>
-
- 13 Mar, 2019 21 commits
-
-
Soby Mathew authored
refact the imx8m common code and add the imx8mm support
-
Soby Mathew authored
Apply workarounds for errata of Cortex-A17
-
Ambroise Vincent authored
Change-Id: I3a101e540f0b134ecf9a51fa3d7d8e3d0369b297 Signed-off-by: Ambroise Vincent <ambroise.vincent@arm.com>
-
Ambroise Vincent authored
Change-Id: Ic3004fc43229d63c5a59ca74c1837fb0604e1f33 Signed-off-by: Ambroise Vincent <ambroise.vincent@arm.com>
-
Soby Mathew authored
Allow setting compiler's target architecture
-
Soby Mathew authored
Apply workarounds for errata of Cortex-A15
-
Soby Mathew authored
Minor doc fixes
-
Soby Mathew authored
PIE: fix linking with pie and binutils > 2.27
-
Soby Mathew authored
Pb/todo removal
-
Soby Mathew authored
Apply stricter speculative load restriction
-
Soby Mathew authored
intel: QSPI boot enablement
-
Soby Mathew authored
intel: Add driver for QSPI
-
Soby Mathew authored
Remove recursion from xlat_tables_v2 library
-
Soby Mathew authored
drivers: synopsys: Fix synopsys MMC driver
-
Soby Mathew authored
plat/synquacer: enable SCMI support
-
Ambroise Vincent authored
This erratum can only be worked around on revisions >= r3p0 because the register that needs to be accessed only exists in those revisions[1]. [1] http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0438g/CIHEAAAD.html Change-Id: I5d773547d7a09b5bd01dabcd19ceeaf53c186faa Signed-off-by: Ambroise Vincent <ambroise.vincent@arm.com>
-
Ambroise Vincent authored
Change-Id: I9755252725be25bfd0147839d7df56888424ff84 Signed-off-by: Ambroise Vincent <ambroise.vincent@arm.com>
-
Dimitris Papastamos authored
bl2-el3: Fix exit to bl32 by ensuring full write to SPSR
-
Dimitris Papastamos authored
Update checkpatch options
-
Dimitris Papastamos authored
fdts: stm32mp1: add bsec node
-
Bryan O'Donoghue authored
A bug recently fixed in bl2/aarch32/bl2_el3_entrypoint.S relates to programming the lower-order 16 bits of the SPSR to populate into the CPSR on eret. The BL1 smc-handler code is identical and has the same shortfall in programming the SPSR from the platform defined struct entry_point_info->spsr. msr spsr, r1 will only update bits f->[31:24] and c->[7:0] respectively. In order to ensure the 16 lower-order processor mode bits x->[15:8] and c->[7:0] this patch changes msr spsr, r1 to msr spsr_xc, r1. This change ensures we capture the x field, which we are interested in and not the f field which we are not. Fixes: f3b4914b ('AArch32: Add generic changes in BL1') Signed-off-by: Bryan O'Donoghue <bryan.odonoghue@linaro.org>
-