Page MenuHomePhabricator
Feed Advanced Search

Advanced Search

Feb 7 2023

odeprez updated the task description for T1018: FF-A runtime power management backlog.
Feb 7 2023, 1:46 PM
odeprez updated the task description for T1018: FF-A runtime power management backlog.
Feb 7 2023, 10:54 AM

Feb 6 2023

odeprez updated the task description for T1018: FF-A runtime power management backlog.
Feb 6 2023, 5:08 PM
odeprez updated the task description for T1018: FF-A runtime power management backlog.
Feb 6 2023, 3:20 PM
odeprez created T1018: FF-A runtime power management backlog.
Feb 6 2023, 1:52 PM

Dec 19 2022

odeprez added a comment to T1011: Fast approach to clean a memory?.

I want to find a way to clean a memory region in TF-A firmware.

Can you elaborate what you mean by "clean" ?
From the description it seems to be a simple memset, in which case data may remain in caches.
Does the requested operation need to complete to memory e.g. involving cache clean?

Dec 19 2022, 9:42 AM · Trusted Firmware A

Nov 15 2022

odeprez added a comment to T1008: Rockchip: refusal to parse FDT from U-Boot since 94b2f94bd63258c300b53ad421488c3c4455712b (after v2.7.0).

fix submitted

Nov 15 2022, 11:20 AM · TF-A Bug, Trusted Firmware A

Sep 22 2022

odeprez added a comment to T1000: imx8m does not start after EHF with S-EL2 SPMC change.

Thanks for your reply. Looks like there is a fix under works:

Sep 22 2022, 11:22 AM · Trusted Firmware A, TF-A Bug

Sep 20 2022

odeprez created T1002: Revisit hypervisor page tables defragmentation.
Sep 20 2022, 8:07 AM · Hafnium

Sep 13 2022

odeprez added a comment to T1000: imx8m does not start after EHF with S-EL2 SPMC change.

Hi,
From the logs I understand BL31 is started by U-Boot SPL rather than TF-A's BL1/BL2, correct?
Would it be possible to gather more verbose logs (build with DEBUG=1 LOG_LEVEL=50) ?
Can you share the TF-A command line used to build this platform?
In particular what's the state of EL3_EXCEPTION_HANDLING, SPD, SPMD_SPM_AT_SEL2 toggles?
Thanks, Olivier.

Sep 13 2022, 7:54 AM · Trusted Firmware A, TF-A Bug

Jun 10 2022

odeprez added a comment to T989: Support SVE in non-secure world with CTX_INCLUDE_FPREGS=1.

Hi,

on systems that don't support S-EL2, SPMC functionality mostly, if not all, resides in EL3

This is an implementation choice. E.g. OP-TEE implements an S-EL1 SPMC without needing SPMC logic at EL3 (beyond the SPMD as FF-A relayer).
If you consider the EL3 FF-A SPMC just recently added, yes most of the SPMC logic resides at EL3.

Jun 10 2022, 6:33 AM · Trusted Firmware A

May 24 2022

odeprez added a comment to T989: Support SVE in non-secure world with CTX_INCLUDE_FPREGS=1.

Hi,
Today SEL2 unconditionally saves/restores FP/SIMD/SVE NS context on any SEL2 entry/exit.
I believe it could be optimized the way Soby is describing it by bullets 1,2,3,4.
It is worth noting that when SEL2 is not present (e.g. using the EL3 FF-A SPMC and a SEL1 TOS), the same lazy NS and TA contexts save/restore mechanism can be used by a SEL1 TOS and EL3 doesn't have to bother.

May 24 2022, 8:53 AM · Trusted Firmware A

Apr 27 2022

odeprez added a comment to T989: Support SVE in non-secure world with CTX_INCLUDE_FPREGS=1.

Hi Peter,
So far this has been a deliberate design choice to avoid saving/restoring SVE state from EL3 mainly for BL31 footprint reasons (and performance if unconditionally done on each and every world switch). The vector register file ranges from 2KB to 8KB with 8 cores, and linearly scales to as many cores in the system (which can be hundreds in a server chipset). Apart from specific cases under discussion (SPM-MM or EL3 FF-A SPM), it is preferable to do this at lower EL e.g. a TOS at SEL1 (or Hafnium at SEL2). Do you have specific reasons why it cannot be done at lower EL?
You may also want to take a look at those options: ENABLE_SVE_FOR_NS and ENABLE_SVE_FOR_SWD
https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/getting_started/build-options.rst#n409
Regards,
Olivier.

Apr 27 2022, 7:22 AM · Trusted Firmware A

Apr 20 2022

odeprez updated the task description for T987: TF-A to permit bundling more than 8 secure partitions.
Apr 20 2022, 6:58 AM · Trusted Firmware A
odeprez updated the task description for T987: TF-A to permit bundling more than 8 secure partitions.
Apr 20 2022, 6:57 AM · Trusted Firmware A
odeprez created T987: TF-A to permit bundling more than 8 secure partitions.
Apr 20 2022, 6:55 AM · Trusted Firmware A

Jan 19 2022

odeprez closed T898: Hafnium fails to build on arm64 hosts as Resolved.

Hi Ross, following changes were merged which help building on Arm and integrating to Yocto. Let us know how it goes. Thanks.

Jan 19 2022, 2:15 PM · Hafnium

Sep 15 2021

odeprez closed T896: Implement FFA_RXTX_UNMAP_32 interface as Resolved.
Sep 15 2021, 10:15 AM · Hafnium
odeprez added a comment to T896: Implement FFA_RXTX_UNMAP_32 interface.

Merged https://review.trustedfirmware.org/c/hafnium/hafnium/+/10759

Sep 15 2021, 10:15 AM · Hafnium

May 5 2021

odeprez added a comment to T925: ATF v2.5-rc0 fails to build rk3399 support with gcc11.

Ok thanks.

May 5 2021, 12:35 PM · Trusted Firmware A
odeprez added a comment to T925: ATF v2.5-rc0 fails to build rk3399 support with gcc11.

Is this building natively on arm64 host?

May 5 2021, 9:31 AM · Trusted Firmware A
odeprez added a comment to T925: ATF v2.5-rc0 fails to build rk3399 support with gcc11.

Can you please provide the link to the gcc11 toolchain you use?
AFAIK latest public Arm release of the cross compiler toolchains is 10.2 (https://developer.arm.com/tools-and-software/open-source-software/developer-tools/gnu-toolchain/gnu-a/downloads)

May 5 2021, 9:19 AM · Trusted Firmware A

Mar 26 2021

odeprez updated the task description for T908: Move platform description to the Hypervisor manifest.
Mar 26 2021, 5:35 PM · Hafnium
odeprez added a comment to T908: Move platform description to the Hypervisor manifest.

Raghu as you are originator for this ask; can you state more about the requirements as to the why we'd really need to do so?

Mar 26 2021, 5:34 PM · Hafnium
odeprez renamed T908: Move platform description to the Hypervisor manifest from Move platform descripton to the Hypervisor manifest to Move platform description to the Hypervisor manifest.
Mar 26 2021, 5:30 PM · Hafnium
odeprez created T908: Move platform description to the Hypervisor manifest.
Mar 26 2021, 5:29 PM · Hafnium

Mar 22 2021

odeprez added a comment to T897: Implement retrieving of memory region by specifying address ranges.

In particular this is about specifying the offset field in the endpoint memory access descriptor.

Mar 22 2021, 3:29 PM · Hafnium
odeprez added a comment to T896: Implement FFA_RXTX_UNMAP_32 interface.

The possible envisioned scenario is related to booting TF-A+UEFI and support for authenticated variables.

Mar 22 2021, 2:54 PM · Hafnium

Feb 15 2021

odeprez added a comment to T723: Support Arm SMMU.

https://review.trustedfirmware.org/c/hafnium/hafnium/+/8243

Feb 15 2021, 4:47 PM · Hafnium

Sep 22 2020

odeprez added a comment to T723: Support Arm SMMU.

SMMUv3.2 supports secure Stage-2 translations and that's the feature we intend to enable as a first step.
The IP also supports "nested translations" aka S-EL1 SMMU paravirtualization although we're not looking at this option immediately.

Sep 22 2020, 4:23 PM · Hafnium

Sep 9 2020

odeprez added a comment to T723: Support Arm SMMU.

We're considering the SMMUv3.2 support which covers the Secure Stage-2 mappings (https://developer.arm.com/documentation/ihi0070/latest).
This is still in initial investigation phases, but we hope to share design details and early patches by end of Q4'20.

Sep 9 2020, 12:12 PM · Hafnium

Jun 29 2020

odeprez updated the task description for T735: Hafnium running in EL2 and S-EL2.
Jun 29 2020, 4:15 PM · Hafnium
odeprez renamed T735: Hafnium running in EL2 and S-EL2 from Hafnium running in EL2 and sEL2 to Hafnium running in EL2 and S-EL2.
Jun 29 2020, 4:15 PM · Hafnium
odeprez added a comment to T722: Support for FF-A direct messages.

Pursuing Jose's early work through Google's gerrit interface.
We'll provide more design details in the shared SPM doc.

Jun 29 2020, 2:03 PM · Hafnium
odeprez claimed T722: Support for FF-A direct messages.
Jun 29 2020, 2:02 PM · Hafnium
odeprez renamed T722: Support for FF-A direct messages from Support for SPCI direct messages to Support for FF-A direct messages.
Jun 29 2020, 1:50 PM · Hafnium

Jun 25 2020

odeprez changed the visibility for Hafnium.
Jun 25 2020, 8:21 AM

May 1 2020

odeprez added a watcher for Hafnium: odeprez.
May 1 2020, 11:23 AM

Apr 9 2020

odeprez added a member for Hafnium: odeprez.
Apr 9 2020, 2:50 PM
odeprez added a member for Hafnium: qwandor.
Apr 9 2020, 2:50 PM
odeprez added a member for Hafnium: joannafarley-arm.
Apr 9 2020, 2:49 PM

Jan 14 2020

odeprez added a comment to T554: Build can fail on systems with stack protection enabled by default.

Nerver mind :) Glad if it works now. Cheers, Olivier.

Jan 14 2020, 2:42 PM · Trusted Firmware A

Jan 13 2020

odeprez added a comment to T554: Build can fail on systems with stack protection enabled by default.

The log seems to show additional options versus the regular TF-A build:
-march=armv8-a -O2 -pipe -fstack-protector-strong -fno-plt

Jan 13 2020, 10:19 AM · Trusted Firmware A

Jan 9 2020

odeprez added a comment to T554: Build can fail on systems with stack protection enabled by default.

I installed manjaro-arm on an rpi3 and cloned TF-A commit 0348ee49135c

Jan 9 2020, 8:44 AM · Trusted Firmware A

Jan 8 2020

odeprez added a comment to T554: Build can fail on systems with stack protection enabled by default.

Unfortunately the option won't show on asm files, but only on C files.

Jan 8 2020, 9:13 AM · Trusted Firmware A

Jan 7 2020

odeprez added a comment to T554: Build can fail on systems with stack protection enabled by default.

I tried on an arm64 machine (using gcc8.3) but did not reproduce the issue.

Jan 7 2020, 8:25 AM · Trusted Firmware A

Jan 6 2020

odeprez added a comment to T554: Build can fail on systems with stack protection enabled by default.

I suspect this problem arises because of building natively (although I agree this should normally work).

Jan 6 2020, 5:01 PM · Trusted Firmware A

Dec 24 2019

odeprez added a comment to T632: End-of-interrupt (EOI) handling is missing for RAS interrupts.

I'm not too much versed into RAS error handling, so please take my explanation below with care.
I suggest you send the question to the TF-A ML to get more sensible insights.

Dec 24 2019, 10:50 AM

Dec 23 2019

odeprez added a comment to T602: Memory corruption on back-to-back SEAs from lower ELs.

https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/2675/

Dec 23 2019, 9:24 AM · Trusted Firmware A
odeprez added a watcher for Trusted Firmware A: odeprez.
Dec 23 2019, 9:10 AM