History log of /rk3399_ARM-atf/plat/ (Results 476 – 500 of 8868)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
7118ad9d09-Jul-2025 Manish Pandey <manish.pandey2@arm.com>

Merge "feat(cpufeat): add support for FEAT_FGWTE3" into integration

0a7bf40a09-Jul-2025 Yann Gautier <yann.gautier@st.com>

Merge "fix(qti): allow secure r/w to the EUD enable register" into integration

4274b52623-Jun-2025 Arvind Ram Prakash <arvind.ramprakash@arm.com>

feat(cpufeat): add support for FEAT_FGWTE3

Enable write traps for key EL3 system registers as per FEAT_FGWTE3,
ensuring their values remain unchanged after boot.

Excluded Registers:
MDCR_EL3 and MP

feat(cpufeat): add support for FEAT_FGWTE3

Enable write traps for key EL3 system registers as per FEAT_FGWTE3,
ensuring their values remain unchanged after boot.

Excluded Registers:
MDCR_EL3 and MPAM3_EL3: Not trapped as they are part of the EL3 context.
SCTLR_EL3: Not trapped since it is overwritten during
powerdown sequence(Included when HW_ASSISTED_COHERENCY=1)

TPIDR_EL3: Excluded due to its use in crash reporting(It is included
when CRASH_REPORTING=0)

Reference:
https://developer.arm.com/documentation/ddi0601/2025-06/AArch64-Registers/FGWTE3-EL3--Fine-Grained-Write-Traps-EL3

Change-Id: Idcb32aaac7d65a0b0e5c90571af00e01a4e9edb1
Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com>

show more ...

1dd3b65611-Dec-2024 Yann Gautier <yann.gautier@st.com>

feat(st): use and override default MBedTLS config

Each time MbedTLS is updated, the default config may be updated. As
STM32MP platforms have their own config file, this needs to be aligned.
To avoid

feat(st): use and override default MBedTLS config

Each time MbedTLS is updated, the default config may be updated. As
STM32MP platforms have their own config file, this needs to be aligned.
To avoid this alignment, directly include the default config and
override some values for ST platforms, mainly heap size.
MBEDTLS_MPI_WINDOW_SIZE is also kept to avoid behavior change.

Signed-off-by: Yann Gautier <yann.gautier@st.com>
Change-Id: I6a9c3141451ab7b11906a7139549d31cfff0581a

show more ...

6287491108-Jul-2025 Govindraj Raja <govindraj.raja@arm.com>

Merge "feat(st): put stm32image tool in build directory" into integration

3fb300a908-Jul-2025 Manish Pandey <manish.pandey2@arm.com>

Merge "feat(mt8189): add hotplug driver" into integration

bdd1932c30-Jun-2025 Konrad Dybcio <konrad.dybcio@oss.qualcomm.com>

fix(qti): allow secure r/w to the EUD enable register

The EUD (Embedded USB Debugger) is an IP block that can only be toggled
from the secure world. Allow accessing its enable register through the
S

fix(qti): allow secure r/w to the EUD enable register

The EUD (Embedded USB Debugger) is an IP block that can only be toggled
from the secure world. Allow accessing its enable register through the
SCM MMIO R/W calls.

The remaining (non-qtiseclib) platforms don't feature this hardware.

Compile-tested only, but should be simple enough.

Change-Id: I2763fd89f2a9d068ec2b4662dc2de91d1d466666
Signed-off-by: Konrad Dybcio <konrad.dybcio@oss.qualcomm.com>

show more ...

0b4722cf08-Jul-2025 Yann Gautier <yann.gautier@st.com>

feat(st): put stm32image tool in build directory

Following the series moving common tools compilation to the build
directory[1], do the same for stm32image tool.

[1]: cbd6cec3c3 feat(build): put fi

feat(st): put stm32image tool in build directory

Following the series moving common tools compilation to the build
directory[1], do the same for stm32image tool.

[1]: cbd6cec3c3 feat(build): put fiptool in the build directory

Signed-off-by: Yann Gautier <yann.gautier@st.com>
Change-Id: If33556e98c4788350a29c8ad96dc574584b67abd

show more ...

7c3e9a0c15-May-2025 Boyan Karatotev <boyan.karatotev@arm.com>

fix(lx2160a): put cert_create_tbbr.mk in the standard location

The cert_create_tbbr.mk file is generally looked for in the platform
directory. The lx2160a breaks from this convention and stores the

fix(lx2160a): put cert_create_tbbr.mk in the standard location

The cert_create_tbbr.mk file is generally looked for in the platform
directory. The lx2160a breaks from this convention and stores the file
elsewhere, requiring a cludgy `cp` mid way through the make process. The
result is an untracked file when building the platform, which is
undesirable.

Fix this by putting the cert_create_tbbr.mk (and associated source
files) in the plat/ directory, just like we do for juno and stm32mp1.

Change-Id: Ifa8bb07dba4f55da4f0e230efa7beccf30bd1de7
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>

show more ...

f4595e6e06-May-2025 Boyan Karatotev <boyan.karatotev@arm.com>

feat(build): put crttool in the build directory

Same as fiptool. Move all artefacts to the platform build directory and
convert to the standard build macro to make things more generic. Leave
a symli

feat(build): put crttool in the build directory

Same as fiptool. Move all artefacts to the platform build directory and
convert to the standard build macro to make things more generic. Leave
a symlink for the final binary in case someone depends on it.

Change-Id: I82ef846a95474ba385377032fb185e548827bf5c
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>

show more ...

662adc0007-May-2025 Boyan Karatotev <boyan.karatotev@arm.com>

build(marvell): avoid using recursive expansion for BLE_INCLUDES

Commit 559ab2df4 specifies that there should be a PLAT_INCLUDES
specifically for the BLE image. This is done with a quirky rule that

build(marvell): avoid using recursive expansion for BLE_INCLUDES

Commit 559ab2df4 specifies that there should be a PLAT_INCLUDES
specifically for the BLE image. This is done with a quirky rule that
triggers only on the BLE files and relies on PLAT_INCLUDES expanding
recursively to work correctly.

Recursively expanded variables are a brittle part of the build system,
so this patch removes that aspect but keeps the BLE_INCLUDES principle
via the BLE_INCLUDE_DIRS variable that MAKE_C will correctly pick up.

Change-Id: Ibd10904f6a005fef9ed242b65e96662ce002eb18
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>

show more ...

adb219f007-Jul-2025 Govindraj Raja <govindraj.raja@arm.com>

Merge changes I9bc7b609,Ie56dc965,Ic57d46bf,I3f2ab549,I3ad715fa, ... into integration

* changes:
refactor(build): initialise `arch-features` closer to where it is needed
refactor(build): define

Merge changes I9bc7b609,Ie56dc965,Ic57d46bf,I3f2ab549,I3ad715fa, ... into integration

* changes:
refactor(build): initialise `arch-features` closer to where it is needed
refactor(build): define the W and DEBUG flags in the standard way
refactor(build): put the cross referencing of options together
fix: use LDLIBS instead of LDFLAGS for library search paths
fix(build): remove redundant variables
fix(intel): fix variable may be used uninitialized error

show more ...

d833129a13-May-2025 Boyan Karatotev <boyan.karatotev@arm.com>

fix: use LDLIBS instead of LDFLAGS for library search paths

The LDLIBS is quite convenient for both the -l and -L flags as both ld
and gcc will accept them identically when linking. So use LDLIBS an

fix: use LDLIBS instead of LDFLAGS for library search paths

The LDLIBS is quite convenient for both the -l and -L flags as both ld
and gcc will accept them identically when linking. So use LDLIBS and
leave LDFLAGS alone for flags that have some difference (eg needing a
-Wl prefix).

Change-Id: I3f2ab54931eff4e796dc4757950ed797ab3344a8
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>

show more ...

500927ef29-Apr-2025 Boyan Karatotev <boyan.karatotev@arm.com>

fix(build): remove redundant variables

The PLAT_BL_* family of variables were intended as the platform
interface to the build system. Unfortunately, only
PLAT_BL_COMMON_SOURCES has caught on and the

fix(build): remove redundant variables

The PLAT_BL_* family of variables were intended as the platform
interface to the build system. Unfortunately, only
PLAT_BL_COMMON_SOURCES has caught on and the rest remain totally
unused. As there is no ongoing effort to change that, those flags are
only noise in the makefiles. Remove them to simplify.

Change-Id: I3ad715fa7859a28cf92d3897421f7b88cdea23cc
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>

show more ...

cfde117008-Apr-2025 Boyan Karatotev <boyan.karatotev@arm.com>

fix(intel): fix variable may be used uninitialized error

When building with LTO, the compiler can correctly see that there are
code paths that can lead to a variable used without it being written to

fix(intel): fix variable may be used uninitialized error

When building with LTO, the compiler can correctly see that there are
code paths that can lead to a variable used without it being written to.
Give these variables a starting value of 0 as a reasonable default
if/when this happens and to make the compiler happy.

Change-Id: I1d1efdbc59945d15a18fb3cfd498061eb681e5f9
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>

show more ...

27e7222125-Jun-2025 Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>

feat(versal2): validate non-secure entry addr

Added validate_ns_entrypoint to get reserved-memory entries from
the Flattened Device Tree (FDT). Identifies secure and non-secure
memory regions and ch

feat(versal2): validate non-secure entry addr

Added validate_ns_entrypoint to get reserved-memory entries from
the Flattened Device Tree (FDT). Identifies secure and non-secure
memory regions and checks if entry point lies within a valid
non-secure region.

Change-Id: Iff998fe855f5de8fbd96f0d7d4b0d7c33c904d34
Signed-off-by: Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>

show more ...

59eaed0325-Jun-2025 Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>

feat(versal2): parse reserve memory subnodes

In Versal Gen 2, TF-A parses the device tree to identify secure and
non-secure memory regions, which are then used to validate the
non-secure entry point

feat(versal2): parse reserve memory subnodes

In Versal Gen 2, TF-A parses the device tree to identify secure and
non-secure memory regions, which are then used to validate the
non-secure entry point address during a hot plug event

Change-Id: I8cdb098509bd3b06f0df5ea647220bdbb8a4bf35
Signed-off-by: Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>

show more ...

36b998d727-Jun-2025 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "fix(lx2160): set snoop-delayed exclusive handling on A72 cores" into integration

b8d63a7a22-Mar-2025 Kai Liang <kai.liang@mediatek.corp-partner.google.com>

feat(mt8189): add hotplug driver

Minor hardware changes require minor driver updates.

Signed-off-by: Kai Liang <kai.liang@mediatek.com>
Change-Id: Iaeed93a7cf1b8c22979fedf7bd571f30398d410e

6cd0ff2c26-Jun-2025 Govindraj Raja <govindraj.raja@arm.com>

Merge "fix(mt8196): duplicated ETIMEDOUT definition" into integration

9bfd8ffb26-Jun-2025 Govindraj Raja <govindraj.raja@arm.com>

Merge "feat(mt8189): add dfd driver" into integration

b1bca91e26-Jun-2025 Govindraj Raja <govindraj.raja@arm.com>

Merge "feat(ti): enable power state validation for K3 SoCs" into integration

0e039eaf17-Jun-2025 Ghennadi Procopciuc <ghennadi.procopciuc@nxp.com>

fix(mt8196): duplicated ETIMEDOUT definition

Refactor the local definition of the ETIMEDOUT macro to prevent
conflicts with the standard definition provided by libc/errno.h.

Change-Id: I3eff7e4a8e3

fix(mt8196): duplicated ETIMEDOUT definition

Refactor the local definition of the ETIMEDOUT macro to prevent
conflicts with the standard definition provided by libc/errno.h.

Change-Id: I3eff7e4a8e395914cb6a4b33d18e6d5b46cc06f6
Signed-off-by: Ghennadi Procopciuc <ghennadi.procopciuc@nxp.com>

show more ...

4040019721-May-2025 Alexander Stein <alexander.stein@ew.tq-group.com>

fix(layerscape): unlock write access SMMU_CBn_ACTLR

This patch is to fix Errata #841119 and #826419 (see [1]) failed
apply in Linux because of SMMU_CBn_ACTLR register can't be modified
in non-secure

fix(layerscape): unlock write access SMMU_CBn_ACTLR

This patch is to fix Errata #841119 and #826419 (see [1]) failed
apply in Linux because of SMMU_CBn_ACTLR register can't be modified
in non-secure states. This mimics the changes from commit 0ca1d8fba
("fix(layerscape): unlock write access SMMU_CBn_ACTLR")

[1] https://developer.arm.com/documentation/epm133458/latest

Change-Id: I3f1e35150f66c604be2e10b3f91b39b2a7dc62bd
Signed-off-by: Alexander Stein <alexander.stein@ew.tq-group.com>

show more ...

5e192ddf25-Jun-2025 Joanna Farley <joanna.farley@arm.com>

Merge "fix(xilinx): add API to get powerdown request status" into integration

1...<<11121314151617181920>>...355