History log of /rk3399_ARM-atf/ (Results 1526 – 1550 of 18586)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
b4cbf50801-Jun-2025 Manish V Badarkhe <Manish.Badarkhe@arm.com>

feat(fvp): implement platform API for LFA cancel operation

Introduce and implement a stub implementation of `plat_lfa_cancel()`
for the FVP platform. This function will later be expanded to handle
c

feat(fvp): implement platform API for LFA cancel operation

Introduce and implement a stub implementation of `plat_lfa_cancel()`
for the FVP platform. This function will later be expanded to handle
component-specific LFA cancellation logic.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I9690b011313bbe0fd458cbe47f32445f8d2d79fa

show more ...

06a6f29615-Apr-2025 Manish V Badarkhe <Manish.Badarkhe@arm.com>

feat(lfa): implement LFA_GET_INVENTORY SMC

This implementation primarily retrieves activation-related flags for
a given fw_seq_id, including whether the firmware is activation
capable, whether an up

feat(lfa): implement LFA_GET_INVENTORY SMC

This implementation primarily retrieves activation-related flags for
a given fw_seq_id, including whether the firmware is activation
capable, whether an update is pending activation, whether it resets
the CPU during activation, whether CPU rendezvous is required, and the
firmware's UUID.
To support this, a platform API is called to determine whether an
update is available for the specified fw_seq_id, indicating its
pending activation status.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I6e702a8b313386f5668027386845ff2dae9328e7

show more ...

357079c701-Jun-2025 Manish V Badarkhe <Manish.Badarkhe@arm.com>

feat(fvp): implement platform API for LFA activation pending check

Introduce and implement `is_plat_lfa_activation_pending()' API for the
FVP platform. Currently, only the RMM component is marked as

feat(fvp): implement platform API for LFA activation pending check

Introduce and implement `is_plat_lfa_activation_pending()' API for the
FVP platform. Currently, only the RMM component is marked as pending.

Change-Id: I6cc84c65ba5fe1b47cc65cbeeb349aac9235533a
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

b9dee50c30-May-2025 Manish V Badarkhe <Manish.Badarkhe@arm.com>

feat(lfa): implement LFA_GET_INFO SMC and integrate LFA build

Implement the LFA_GET_INFO SMC handler, which retrieves the
number of supported firmware components and performs initial
setup via the p

feat(lfa): implement LFA_GET_INFO SMC and integrate LFA build

Implement the LFA_GET_INFO SMC handler, which retrieves the
number of supported firmware components and performs initial
setup via the platform APIs. This forms the entry point for
LFA usage and makes component metadata available for later use.

Update the build system to include LFA sources.

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I4016615a88706972eff6ea5777dda6d5a3a04074

show more ...

b100e91d30-May-2025 Manish V Badarkhe <Manish.Badarkhe@arm.com>

feat(fvp): initialize LFA component activators in platform layer

Update the FVP platform's LFA component table to populate the
'activator' and 'activation_pending' by introducing fields
in plat_lfa_

feat(fvp): initialize LFA component activators in platform layer

Update the FVP platform's LFA component table to populate the
'activator' and 'activation_pending' by introducing fields
in plat_lfa_component_info_t.
- 'activator': function pointers for component-specific
activation logic
- 'activation_pending': tracks whether the component's activation
is pending

Set the activator function pointers for supported components:
- BL31 via get_bl31_activator()
- RMM (if RME is enabled) via get_rmm_activator()

This allows the LFA service to invoke component-specific prime
and activate callbacks through platform-registered hooks.

Change-Id: Ifd997a8b8cab209c25aabb2e9d4eab59e909ea4d
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

d837ccd830-May-2025 Manish V Badarkhe <Manish.Badarkhe@arm.com>

feat(rmm): add placeholder activator callbacks for LFA

Introduce the RMM component's activator structure for use in
LFA. The 'prime' and 'activate' callbacks currently return
LFA_WRONG_STATE as plac

feat(rmm): add placeholder activator callbacks for LFA

Introduce the RMM component's activator structure for use in
LFA. The 'prime' and 'activate' callbacks currently return
LFA_WRONG_STATE as placeholders.

These functions will be implemented in subsequent patches in
this series to support actual RMM component activation logic.

Change-Id: I899ff51e4065887b7b4bbfbaa827322c51cd215c
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

f647f56130-May-2025 Manish V Badarkhe <Manish.Badarkhe@arm.com>

feat(bl31): add placeholder activator implementation for LFA

Introduce the BL31 component's activator structure with stub
implementations for the 'prime' and 'activate' callbacks.

Both callbacks cu

feat(bl31): add placeholder activator implementation for LFA

Introduce the BL31 component's activator structure with stub
implementations for the 'prime' and 'activate' callbacks.

Both callbacks currently return LFA_WRONG_STATE, indicating that
activation is not supported or allowed from BL31 in this context.

This activator is registered via get_bl31_activator(), allowing
the platform layer to wire it into the LFA framework.

Change-Id: I4279996b218d558a45cd99d5840f0e9f8ee97f90
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

9e03218130-May-2025 Manish V Badarkhe <Manish.Badarkhe@arm.com>

feat(lfa): add activation handler interface for component activation

Introduce `lfa_component_desc.h` defining structures and function
types to support component activation in LFA.

Includes:
- lfa_

feat(lfa): add activation handler interface for component activation

Introduce `lfa_component_desc.h` defining structures and function
types to support component activation in LFA.

Includes:
- lfa_component_status: to track per-component activation state
- lfa_component_ops: function table for prime and activate callbacks

The platform layer uses this interface to register component-specific
callbacks during initialization. These callbacks are implemented in
the component layer, and invoked by the LFA service to coordinate
activation by passing lfa_component_status details.

Change-Id: I141d49679bad3f134a2c5360342331604d2002f8
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

3bb5266130-May-2025 Manish V Badarkhe <Manish.Badarkhe@arm.com>

feat(fvp): implement LFA get components API

Introduce platform-specific implementation of
`plat_lfa_get_components()` for the Arm FVP platform. This function
returns LFA component metadata, includin

feat(fvp): implement LFA get components API

Introduce platform-specific implementation of
`plat_lfa_get_components()` for the Arm FVP platform. This function
returns LFA component metadata, including component ID, UUID for
each supported firmware image and number of components.

Change-Id: I9e7cbce5865becf3e4babcb770bc5eb3b69a0be8
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

cf48f49f15-Apr-2025 Manish V Badarkhe <Manish.Badarkhe@arm.com>

feat(lfa): create LFA SMC handler template

As per the specification v1.0[1], added all Live Firmware Activation
(LFA) SMCs, including their Function IDs (FIDs) and associated error
codes.
A dummy ha

feat(lfa): create LFA SMC handler template

As per the specification v1.0[1], added all Live Firmware Activation
(LFA) SMCs, including their Function IDs (FIDs) and associated error
codes.
A dummy handler function has been created as a template. Subsequent
patches will implement the handling of these SMCs.

[1]: https://developer.arm.com/documentation/den0147/latest/

Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
Change-Id: I5d6500dcff35aa4a438cd5f97f349cd57406ddce

show more ...

911c945c20-Jun-2025 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge "fix(imx8ulp): fix variable may be used uninitialized error" into integration

b9de99b820-Jun-2025 Olivier Deprez <olivier.deprez@arm.com>

Merge "fix(mediatek-drivers): fix incorrect source assignment" into integration

b1ed68d925-Sep-2020 Jacky Bai <ping.bai@nxp.com>

fix(imx8mp): remove ERR050463 VPUMIX workaround

Errata ERR050463 has been fixed in A1 silicon.

Change-Id: I263531c6eef44a679002cd048e71fb50c63d9030
Signed-off-by: Jacky Bai <ping.bai@nxp.com>
Signe

fix(imx8mp): remove ERR050463 VPUMIX workaround

Errata ERR050463 has been fixed in A1 silicon.

Change-Id: I263531c6eef44a679002cd048e71fb50c63d9030
Signed-off-by: Jacky Bai <ping.bai@nxp.com>
Signed-off-by: Alexander Stein <alexander.stein@ew.tq-group.com>

show more ...

7f5ff95b17-Jun-2025 Kendall Willis <k-willis@ti.com>

feat(ti): enable power state validation for K3 SoCs

Add power state validation for K3 SoCs to ensure proper PSCI power state
transitions. Defining validate_power_state enables the
PSCI_CPU_SUSPEND_A

feat(ti): enable power state validation for K3 SoCs

Add power state validation for K3 SoCs to ensure proper PSCI power state
transitions. Defining validate_power_state enables the
PSCI_CPU_SUSPEND_AARCH64 capability and, in turn, CPU_SUSPEND.

validate_power_state checks if the requested power level and power state
are in a valid configuration. If the power state requested is standby,
set the core power state to the maximum retention state.

Change-Id: Ied3ebdc583b2e5b7c86923705954d763997b324e
Signed-off-by: Kendall Willis <k-willis@ti.com>

show more ...

d8fdff3819-Jun-2025 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge changes from topic "map-summary" into integration

* changes:
feat(memmap): add summary command to memory map script
refactor(memmap)!: change behavioural flags to commands
refactor(memma

Merge changes from topic "map-summary" into integration

* changes:
feat(memmap): add summary command to memory map script
refactor(memmap)!: change behavioural flags to commands
refactor(memmap): fix typing-related issues
refactor(memmap): create common image parser interface
refactor(memmap): represent image symbols with key-value map
refactor(memmap): factor memory regions into their own structure
refactor(memmap): apply additional type hints
refactor(memmap): check ELF object type rather than flag
refactor(memmap): remove unused functionality
fix(memmap): ensure terminal width is respected
style(memmap): format with Ruff

show more ...

7896757619-Jun-2025 Joanna Farley <joanna.farley@arm.com>

Merge "fix(zynqmp): workaround issue around cntpct_el0" into integration

7227026019-Jun-2025 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge "feat(fvp): give bootargs on all configs" into integration

50d1ce3d19-Jun-2025 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge changes Ia34bc0f4,I0be3773b,I701e357a,Icdbe1992 into integration

* changes:
refactor(versal2): guard handoff logic w/ build flag
refactor(qemu): guard handoff logic w/ build flag
refacto

Merge changes Ia34bc0f4,I0be3773b,I701e357a,Icdbe1992 into integration

* changes:
refactor(versal2): guard handoff logic w/ build flag
refactor(qemu): guard handoff logic w/ build flag
refactor(optee): guard handoff logic w/ build flag
feat(handoff): support libtl submodule builds

show more ...

e493b52219-Jun-2025 Manish Pandey <manish.pandey2@arm.com>

Merge "perf(bl31): convert cpu_data fetching to C" into integration

d43b2ea618-Mar-2025 Boyan Karatotev <boyan.karatotev@arm.com>

perf(bl31): convert cpu_data fetching to C

The assembly routines are opaque to the compiler and it can't inline
them. There is also no requirement for them to be called without a
stack - each of the

perf(bl31): convert cpu_data fetching to C

The assembly routines are opaque to the compiler and it can't inline
them. There is also no requirement for them to be called without a
stack - each of their calls has a stack available. So convert them to C
so that the compiler can do its inlining magic.

On AArch32 we need to be able to call _cpu_data from the entrypoint so
it has to stay as a slight exception.

We can also straighten out the type of the cpu_ops_ptr member so we
don't have to cast it everywhere.

Change-Id: I9c2939a955b396edf26b99ef36318eebeaab13e6
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>

show more ...

c0719d2116-May-2025 Devanshi Chauhan <devanshi.chauhanalpeshbhai@amd.com>

fix(xilinx): add API to get powerdown request status

The pwrdwn_req_received variable is used across multiple platforms
through extern keyword. Instead of using the extern, add getter
API to access

fix(xilinx): add API to get powerdown request status

The pwrdwn_req_received variable is used across multiple platforms
through extern keyword. Instead of using the extern, add getter
API to access this variable across the platforms, and restrict the
scope of variable to the particular file by defining it as static
variable. This prevents unintended access of variable from other
files and increase safety.

Change-Id: I758466ea7f6be2a90ec249dc3e4fa56cdbe11e57
Signed-off-by: Devanshi Chauhan <devanshi.chauhanalpeshbhai@amd.com>

show more ...

f6d7b01018-Jun-2025 Chris Kay <chris.kay@arm.com>

fix(mediatek-drivers): fix incorrect source assignment

The `LOCAL_SRCS-y` variable is being cleared immediately after appending
the `pmic_common_swap_api.c` file, resulting in the file never being
i

fix(mediatek-drivers): fix incorrect source assignment

The `LOCAL_SRCS-y` variable is being cleared immediately after appending
the `pmic_common_swap_api.c` file, resulting in the file never being
included in any platform build.

Change-Id: I55184e8c090bc9bfb4631da5126e07e57a373065
Signed-off-by: Chris Kay <chris.kay@arm.com>

show more ...

8eaf146318-Jun-2025 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge "docs(changelog): put full name for Granule Protection Tables" into integration

97ec082a07-May-2025 Michal Simek <michal.simek@amd.com>

fix(zynqmp): workaround issue around cntpct_el0

cntvct_el0 after power up has an architecturally UNKNOWN value.
In ZynqMP case the value is very high (e.g. 0xefffffe80d4de62d).
At best value should

fix(zynqmp): workaround issue around cntpct_el0

cntvct_el0 after power up has an architecturally UNKNOWN value.
In ZynqMP case the value is very high (e.g. 0xefffffe80d4de62d).
At best value should be 0 because it is used for time measuring when
systemd analyze command is called (via storing it in UEFI variables).
As a workaround for this issue use cntvoff_el2 to record offset from actual value which clears cntvct_el0.
There could be different way how to achieve this behavior but till that
time use this workaround to fix systemd analyze behavior.

Change-Id: Ie43096bb33bb0e02c8cac07f965610b4565e141c
Signed-off-by: Michal Simek <michal.simek@amd.com>

show more ...

28ac195b12-Jun-2025 Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>

fix(libc): replace true-false with explicit comparisons

This corrects the MISRA violation C2012-10.1:
This change avoids implicit conversions between standard boolean
types and integer types, ensuri

fix(libc): replace true-false with explicit comparisons

This corrects the MISRA violation C2012-10.1:
This change avoids implicit conversions between standard boolean
types and integer types, ensuring type safety and compliance.
Replaced definitions of `true` and `false` in <stdbool.h> with
explicit equality ('0'=='0') and inequality ('1'=='0') checks.

Change-Id: I507522c8be8654d830f73f32dd4ca9fe98cf0f8f
Signed-off-by: Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>

show more ...

1...<<61626364656667686970>>...744