| 7118ad9d | 09-Jul-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(cpufeat): add support for FEAT_FGWTE3" into integration |
| 0a7bf40a | 09-Jul-2025 |
Yann Gautier <yann.gautier@st.com> |
Merge "fix(qti): allow secure r/w to the EUD enable register" into integration |
| 4274b526 | 23-Jun-2025 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
feat(cpufeat): add support for FEAT_FGWTE3
Enable write traps for key EL3 system registers as per FEAT_FGWTE3, ensuring their values remain unchanged after boot.
Excluded Registers: MDCR_EL3 and MP
feat(cpufeat): add support for FEAT_FGWTE3
Enable write traps for key EL3 system registers as per FEAT_FGWTE3, ensuring their values remain unchanged after boot.
Excluded Registers: MDCR_EL3 and MPAM3_EL3: Not trapped as they are part of the EL3 context. SCTLR_EL3: Not trapped since it is overwritten during powerdown sequence(Included when HW_ASSISTED_COHERENCY=1)
TPIDR_EL3: Excluded due to its use in crash reporting(It is included when CRASH_REPORTING=0)
Reference: https://developer.arm.com/documentation/ddi0601/2025-06/AArch64-Registers/FGWTE3-EL3--Fine-Grained-Write-Traps-EL3
Change-Id: Idcb32aaac7d65a0b0e5c90571af00e01a4e9edb1 Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com>
show more ...
|
| 1dd3b656 | 11-Dec-2024 |
Yann Gautier <yann.gautier@st.com> |
feat(st): use and override default MBedTLS config
Each time MbedTLS is updated, the default config may be updated. As STM32MP platforms have their own config file, this needs to be aligned. To avoid
feat(st): use and override default MBedTLS config
Each time MbedTLS is updated, the default config may be updated. As STM32MP platforms have their own config file, this needs to be aligned. To avoid this alignment, directly include the default config and override some values for ST platforms, mainly heap size. MBEDTLS_MPI_WINDOW_SIZE is also kept to avoid behavior change.
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: I6a9c3141451ab7b11906a7139549d31cfff0581a
show more ...
|
| 62874911 | 08-Jul-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge "feat(st): put stm32image tool in build directory" into integration |
| 3fb300a9 | 08-Jul-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(mt8189): add hotplug driver" into integration |
| bdd1932c | 30-Jun-2025 |
Konrad Dybcio <konrad.dybcio@oss.qualcomm.com> |
fix(qti): allow secure r/w to the EUD enable register
The EUD (Embedded USB Debugger) is an IP block that can only be toggled from the secure world. Allow accessing its enable register through the S
fix(qti): allow secure r/w to the EUD enable register
The EUD (Embedded USB Debugger) is an IP block that can only be toggled from the secure world. Allow accessing its enable register through the SCM MMIO R/W calls.
The remaining (non-qtiseclib) platforms don't feature this hardware.
Compile-tested only, but should be simple enough.
Change-Id: I2763fd89f2a9d068ec2b4662dc2de91d1d466666 Signed-off-by: Konrad Dybcio <konrad.dybcio@oss.qualcomm.com>
show more ...
|
| 0b4722cf | 08-Jul-2025 |
Yann Gautier <yann.gautier@st.com> |
feat(st): put stm32image tool in build directory
Following the series moving common tools compilation to the build directory[1], do the same for stm32image tool.
[1]: cbd6cec3c3 feat(build): put fi
feat(st): put stm32image tool in build directory
Following the series moving common tools compilation to the build directory[1], do the same for stm32image tool.
[1]: cbd6cec3c3 feat(build): put fiptool in the build directory
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: If33556e98c4788350a29c8ad96dc574584b67abd
show more ...
|
| 7c3e9a0c | 15-May-2025 |
Boyan Karatotev <boyan.karatotev@arm.com> |
fix(lx2160a): put cert_create_tbbr.mk in the standard location
The cert_create_tbbr.mk file is generally looked for in the platform directory. The lx2160a breaks from this convention and stores the
fix(lx2160a): put cert_create_tbbr.mk in the standard location
The cert_create_tbbr.mk file is generally looked for in the platform directory. The lx2160a breaks from this convention and stores the file elsewhere, requiring a cludgy `cp` mid way through the make process. The result is an untracked file when building the platform, which is undesirable.
Fix this by putting the cert_create_tbbr.mk (and associated source files) in the plat/ directory, just like we do for juno and stm32mp1.
Change-Id: Ifa8bb07dba4f55da4f0e230efa7beccf30bd1de7 Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| f4595e6e | 06-May-2025 |
Boyan Karatotev <boyan.karatotev@arm.com> |
feat(build): put crttool in the build directory
Same as fiptool. Move all artefacts to the platform build directory and convert to the standard build macro to make things more generic. Leave a symli
feat(build): put crttool in the build directory
Same as fiptool. Move all artefacts to the platform build directory and convert to the standard build macro to make things more generic. Leave a symlink for the final binary in case someone depends on it.
Change-Id: I82ef846a95474ba385377032fb185e548827bf5c Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| 662adc00 | 07-May-2025 |
Boyan Karatotev <boyan.karatotev@arm.com> |
build(marvell): avoid using recursive expansion for BLE_INCLUDES
Commit 559ab2df4 specifies that there should be a PLAT_INCLUDES specifically for the BLE image. This is done with a quirky rule that
build(marvell): avoid using recursive expansion for BLE_INCLUDES
Commit 559ab2df4 specifies that there should be a PLAT_INCLUDES specifically for the BLE image. This is done with a quirky rule that triggers only on the BLE files and relies on PLAT_INCLUDES expanding recursively to work correctly.
Recursively expanded variables are a brittle part of the build system, so this patch removes that aspect but keeps the BLE_INCLUDES principle via the BLE_INCLUDE_DIRS variable that MAKE_C will correctly pick up.
Change-Id: Ibd10904f6a005fef9ed242b65e96662ce002eb18 Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| adb219f0 | 07-Jul-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge changes I9bc7b609,Ie56dc965,Ic57d46bf,I3f2ab549,I3ad715fa, ... into integration
* changes: refactor(build): initialise `arch-features` closer to where it is needed refactor(build): define
Merge changes I9bc7b609,Ie56dc965,Ic57d46bf,I3f2ab549,I3ad715fa, ... into integration
* changes: refactor(build): initialise `arch-features` closer to where it is needed refactor(build): define the W and DEBUG flags in the standard way refactor(build): put the cross referencing of options together fix: use LDLIBS instead of LDFLAGS for library search paths fix(build): remove redundant variables fix(intel): fix variable may be used uninitialized error
show more ...
|
| d833129a | 13-May-2025 |
Boyan Karatotev <boyan.karatotev@arm.com> |
fix: use LDLIBS instead of LDFLAGS for library search paths
The LDLIBS is quite convenient for both the -l and -L flags as both ld and gcc will accept them identically when linking. So use LDLIBS an
fix: use LDLIBS instead of LDFLAGS for library search paths
The LDLIBS is quite convenient for both the -l and -L flags as both ld and gcc will accept them identically when linking. So use LDLIBS and leave LDFLAGS alone for flags that have some difference (eg needing a -Wl prefix).
Change-Id: I3f2ab54931eff4e796dc4757950ed797ab3344a8 Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| 500927ef | 29-Apr-2025 |
Boyan Karatotev <boyan.karatotev@arm.com> |
fix(build): remove redundant variables
The PLAT_BL_* family of variables were intended as the platform interface to the build system. Unfortunately, only PLAT_BL_COMMON_SOURCES has caught on and the
fix(build): remove redundant variables
The PLAT_BL_* family of variables were intended as the platform interface to the build system. Unfortunately, only PLAT_BL_COMMON_SOURCES has caught on and the rest remain totally unused. As there is no ongoing effort to change that, those flags are only noise in the makefiles. Remove them to simplify.
Change-Id: I3ad715fa7859a28cf92d3897421f7b88cdea23cc Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| cfde1170 | 08-Apr-2025 |
Boyan Karatotev <boyan.karatotev@arm.com> |
fix(intel): fix variable may be used uninitialized error
When building with LTO, the compiler can correctly see that there are code paths that can lead to a variable used without it being written to
fix(intel): fix variable may be used uninitialized error
When building with LTO, the compiler can correctly see that there are code paths that can lead to a variable used without it being written to. Give these variables a starting value of 0 as a reasonable default if/when this happens and to make the compiler happy.
Change-Id: I1d1efdbc59945d15a18fb3cfd498061eb681e5f9 Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| 27e72221 | 25-Jun-2025 |
Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com> |
feat(versal2): validate non-secure entry addr
Added validate_ns_entrypoint to get reserved-memory entries from the Flattened Device Tree (FDT). Identifies secure and non-secure memory regions and ch
feat(versal2): validate non-secure entry addr
Added validate_ns_entrypoint to get reserved-memory entries from the Flattened Device Tree (FDT). Identifies secure and non-secure memory regions and checks if entry point lies within a valid non-secure region.
Change-Id: Iff998fe855f5de8fbd96f0d7d4b0d7c33c904d34 Signed-off-by: Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>
show more ...
|
| 59eaed03 | 25-Jun-2025 |
Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com> |
feat(versal2): parse reserve memory subnodes
In Versal Gen 2, TF-A parses the device tree to identify secure and non-secure memory regions, which are then used to validate the non-secure entry point
feat(versal2): parse reserve memory subnodes
In Versal Gen 2, TF-A parses the device tree to identify secure and non-secure memory regions, which are then used to validate the non-secure entry point address during a hot plug event
Change-Id: I8cdb098509bd3b06f0df5ea647220bdbb8a4bf35 Signed-off-by: Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>
show more ...
|
| 36b998d7 | 27-Jun-2025 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(lx2160): set snoop-delayed exclusive handling on A72 cores" into integration |
| b8d63a7a | 22-Mar-2025 |
Kai Liang <kai.liang@mediatek.corp-partner.google.com> |
feat(mt8189): add hotplug driver
Minor hardware changes require minor driver updates.
Signed-off-by: Kai Liang <kai.liang@mediatek.com> Change-Id: Iaeed93a7cf1b8c22979fedf7bd571f30398d410e |
| 6cd0ff2c | 26-Jun-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge "fix(mt8196): duplicated ETIMEDOUT definition" into integration |
| 9bfd8ffb | 26-Jun-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge "feat(mt8189): add dfd driver" into integration |
| b1bca91e | 26-Jun-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge "feat(ti): enable power state validation for K3 SoCs" into integration |
| 0e039eaf | 17-Jun-2025 |
Ghennadi Procopciuc <ghennadi.procopciuc@nxp.com> |
fix(mt8196): duplicated ETIMEDOUT definition
Refactor the local definition of the ETIMEDOUT macro to prevent conflicts with the standard definition provided by libc/errno.h.
Change-Id: I3eff7e4a8e3
fix(mt8196): duplicated ETIMEDOUT definition
Refactor the local definition of the ETIMEDOUT macro to prevent conflicts with the standard definition provided by libc/errno.h.
Change-Id: I3eff7e4a8e395914cb6a4b33d18e6d5b46cc06f6 Signed-off-by: Ghennadi Procopciuc <ghennadi.procopciuc@nxp.com>
show more ...
|
| 40400197 | 21-May-2025 |
Alexander Stein <alexander.stein@ew.tq-group.com> |
fix(layerscape): unlock write access SMMU_CBn_ACTLR
This patch is to fix Errata #841119 and #826419 (see [1]) failed apply in Linux because of SMMU_CBn_ACTLR register can't be modified in non-secure
fix(layerscape): unlock write access SMMU_CBn_ACTLR
This patch is to fix Errata #841119 and #826419 (see [1]) failed apply in Linux because of SMMU_CBn_ACTLR register can't be modified in non-secure states. This mimics the changes from commit 0ca1d8fba ("fix(layerscape): unlock write access SMMU_CBn_ACTLR")
[1] https://developer.arm.com/documentation/epm133458/latest
Change-Id: I3f1e35150f66c604be2e10b3f91b39b2a7dc62bd Signed-off-by: Alexander Stein <alexander.stein@ew.tq-group.com>
show more ...
|
| 5e192ddf | 25-Jun-2025 |
Joanna Farley <joanna.farley@arm.com> |
Merge "fix(xilinx): add API to get powerdown request status" into integration |