History log of /rk3399_ARM-atf/ (Results 351 – 375 of 18314)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
f2ab124421-Oct-2025 Khristine Andreea Barbulescu <khristineandreea.barbulescu@nxp.com>

feat(s32g274ardb): add mc_rgm_release_periph func

Add `mc_rgm_release_periph` function to
allow callers to specify which particular
peripheral should be released from reset.

Update the existing `mc

feat(s32g274ardb): add mc_rgm_release_periph func

Add `mc_rgm_release_periph` function to
allow callers to specify which particular
peripheral should be released from reset.

Update the existing `mc_rgm_release_part`
to make use of `mc_rgm_release_periph` function.

Change-Id: Ia2e049ac461f823379ddce34b1406eea0a0a86e9
Signed-off-by: Khristine Andreea Barbulescu <khristineandreea.barbulescu@nxp.com>

show more ...

fce63f1829-Oct-2025 Lauren Wehrmeister <lauren.wehrmeister@arm.com>

Merge changes from topic "gr/spectre_bhb_updates" into integration

* changes:
fix(security): remove CVE_2022_23960 Cortex-X4
fix(security): remove CVE_2022_23960 Neoverse V3
fix(security): rem

Merge changes from topic "gr/spectre_bhb_updates" into integration

* changes:
fix(security): remove CVE_2022_23960 Cortex-X4
fix(security): remove CVE_2022_23960 Neoverse V3
fix(security): remove CVE_2022_23960 Cortex-A720

show more ...

037c7a8128-Oct-2025 Govindraj Raja <govindraj.raja@arm.com>

feat(cpus): enable Maximum Power Mitigation Mechanism

Add Maximum Power Mitigation Mechanism(MPMM) for Veymont and Caddo
CPUs.

Change-Id: I4beedd9b95e0fe4069d9cfbf8c0211ccbcaf7f90
Signed-off-by: Go

feat(cpus): enable Maximum Power Mitigation Mechanism

Add Maximum Power Mitigation Mechanism(MPMM) for Veymont and Caddo
CPUs.

Change-Id: I4beedd9b95e0fe4069d9cfbf8c0211ccbcaf7f90
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>

show more ...

4249423b28-Oct-2025 Mark Dykes <mark.dykes@arm.com>

Merge "fix(arm): derive RMM bank size from payload" into integration

d5388ff928-Oct-2025 Mark Dykes <mark.dykes@arm.com>

Merge "fix(rmmd): correct activation condition check" into integration

f8a9aa1028-Oct-2025 Mark Dykes <mark.dykes@arm.com>

Merge changes from topic "mb/lfa-rmm-test" into integration

* changes:
fix(rmmd): avoid race conditions in CPU finish
fix(arm): move lfa componet header to common and fix the helper
chore(lfa)

Merge changes from topic "mb/lfa-rmm-test" into integration

* changes:
fix(rmmd): avoid race conditions in CPU finish
fix(arm): move lfa componet header to common and fix the helper
chore(lfa): rename component_id to lfa_component_id

show more ...

ee87353c28-Oct-2025 Mark Dykes <mark.dykes@arm.com>

Merge "refactor(docs): deduplicate PSCI documentation" into integration

d6affea102-Oct-2025 Govindraj Raja <govindraj.raja@arm.com>

fix(security): add clrbhb support

TF-A mitigates spectre-bhb(CVE-2022-23960) issue with loop
workaround based on - https://developer.arm.com/documentation/110280/latest/

On platforms that support `

fix(security): add clrbhb support

TF-A mitigates spectre-bhb(CVE-2022-23960) issue with loop
workaround based on - https://developer.arm.com/documentation/110280/latest/

On platforms that support `clrbhb` instruction it is recommended to
use `clrbhb` instruction instead of the loop workaround.

Ref- https://developer.arm.com/documentation/102898/0108/

Change-Id: Ie6e56e96378503456a1617d5e5d51bc64c2e0f0b
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>

show more ...

a055fddd27-Oct-2025 Govindraj Raja <govindraj.raja@arm.com>

fix(security): remove CVE_2022_23960 Cortex-X4

Cortex-X4 has ECBHB implemented and is protected against X-Context
attacks.

Ref: https://developer.arm.com/documentation/110280/latest/
TRM: https://d

fix(security): remove CVE_2022_23960 Cortex-X4

Cortex-X4 has ECBHB implemented and is protected against X-Context
attacks.

Ref: https://developer.arm.com/documentation/110280/latest/
TRM: https://developer.arm.com/documentation/102484/0003/The-Cortex-X4--core/Supported-standards-and-specifications?lang=en

Remove WORKAROUND_CVE_2022_23960 for Cortex-X4 to avoid accidental
enabling of this workaround and using loop workaround.

This was accidentally added with
commit@8c87becbc64f2e233ac905aa006d5e15a63a9a8b

Change-Id: I23f5fa748377a920340b3c5a6584ccfadeea901a
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>

show more ...

a2e22acf27-Oct-2025 Govindraj Raja <govindraj.raja@arm.com>

fix(security): remove CVE_2022_23960 Neoverse V3

Neoverse V3 has ECBHB implemented and is protected against X-Context
attacks.

Ref: https://developer.arm.com/documentation/110280/latest/
TRM: https

fix(security): remove CVE_2022_23960 Neoverse V3

Neoverse V3 has ECBHB implemented and is protected against X-Context
attacks.

Ref: https://developer.arm.com/documentation/110280/latest/
TRM: https://developer.arm.com/documentation/107734/0002/The-Neoverse--V3--core/Supported-standards-and-specifications?lang=en

Remove WORKAROUND_CVE_2022_23960 to avoid accidental enabling of this
workaround and using loop workaround.

This was accidentally added with
commit@c2a15217c3053117f4d39233002cb1830fa96670

Change-Id: I13b27c04c3da5ec80fa79422b4ef4fee64738caa
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>

show more ...

e22ccf0127-Oct-2025 Govindraj Raja <govindraj.raja@arm.com>

fix(security): remove CVE_2022_23960 Cortex-A720

Cortex-A720 has ECBHB implemented and is protected against X-Context
attacks.

Ref: https://developer.arm.com/documentation/110280/latest/
TRM: https

fix(security): remove CVE_2022_23960 Cortex-A720

Cortex-A720 has ECBHB implemented and is protected against X-Context
attacks.

Ref: https://developer.arm.com/documentation/110280/latest/
TRM: https://developer.arm.com/documentation/102530/0002/The-Cortex-A720--core/Supported-standards-and-specifications?lang=en

Remove WORKAROUND_CVE_2022_23960 for Cortex-A720 to avoid accidental
enabling of this workaround and using loop workaround.

This was accidentally added with
commit@c2a15217c3053117f4d39233002cb1830fa96670

Change-Id: I3c68b5f5d85ede37a6a039369de8ed2aa9205395
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>

show more ...

d4c50e7714-Oct-2025 Govindraj Raja <govindraj.raja@arm.com>

feat(cpus): add support for venom cpu

Add basic CPU library code to support Venom CPU

Change-Id: I84d4cb77b175812811a17e55b4b290585e05d216
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>

b5f120b513-Oct-2025 Boyan Karatotev <boyan.karatotev@arm.com>

refactor(docs): deduplicate PSCI documentation

It is already described in the porting guide and context management
sections so it's largely redundant. It also hasn't been updated for a
while despite

refactor(docs): deduplicate PSCI documentation

It is already described in the porting guide and context management
sections so it's largely redundant. It also hasn't been updated for a
while despite lots going on around PSCI so it's clearly not read often.
The only part that isn't is that for describing a new secure dispatcher,
which belongs in the porting guide.

Change-Id: Icdc53e19565f0785bc8a112e5eb49df1b365c66c
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>

show more ...

cccd47fd28-Oct-2025 Manish Pandey <manish.pandey2@arm.com>

Merge "docs(build): update GCC toolchain requirement to 14.3.Rel1" into integration

98863b1e13-Oct-2025 Ahmed Azeem <ahmed.azeem@arm.com>

fix(dsu): dsu config for all cores in hot reset

This allows DSU units to be configured across all cpu clusters
instead of the primary cluster. This configures actlr_el3 in the
hot reset path to allo

fix(dsu): dsu config for all cores in hot reset

This allows DSU units to be configured across all cpu clusters
instead of the primary cluster. This configures actlr_el3 in the
hot reset path to allow power control and PMU registers for all
cores in lower ELs and fixes.

Change-Id: If4dd254736fbcc4bcb8785a16972a0132bc477ce
Signed-off-by: Ahmed Azeem <ahmed.azeem@arm.com>
Signed-off-by: Amr Mohamed <amr.mohamed@arm.com>

show more ...

dbe5353e27-Oct-2025 Ahmed Azeem <ahmed.azeem@arm.com>

docs(rdaspen): bl32 and GPT support

Added optional BL32 support for the RDaspen platform to enable
Trusted OS integration when required.

Updated documentation to clarify that if BL32 is not set, BL

docs(rdaspen): bl32 and GPT support

Added optional BL32 support for the RDaspen platform to enable
Trusted OS integration when required.

Updated documentation to clarify that if BL32 is not set, BL33 will
load directly after BL31.

Revised the ARM_GPT_SUPPORT description to note that it must be
enabled when the FIP image resides in a GPT partition on Secure Flash.

Change-Id: I79905efd026994290d0bc6c07cdf1f5a903c9194
Signed-off-by: Ahmed Azeem <ahmed.azeem@arm.com>

show more ...

33a10dca19-Mar-2025 Archish Venkatesh <Archish.Venkatesh@arm.com>

feat(rdaspen): support BL32 (OP-TEE)

Configure SPMC constants and Secure memory partition to boot BL32
image.

This also fixes the build to automatically accommodate BL33 if
BL32 base is not specif

feat(rdaspen): support BL32 (OP-TEE)

Configure SPMC constants and Secure memory partition to boot BL32
image.

This also fixes the build to automatically accommodate BL33 if
BL32 base is not specified, and removes a redundant entry for BL31
in platform definitions for mmap entries aswell.

Change-Id: I6a3ec97c8f41d6bddc4f20b6edc088a46e2caa75
Signed-off-by: Archish Venkatesh <Archish.Venkatesh@arm.com>
Signed-off-by: Ahmed Azeem <ahmed.azeem@arm.com>

show more ...

958e071f27-Oct-2025 Manish Pandey <manish.pandey2@arm.com>

Merge "feat(scmi): add support for discovering and changing parent clocks" into integration

ef44101e27-Oct-2025 Govindraj Raja <govindraj.raja@arm.com>

Merge "feat(cpus): add support for Dionysus cpu library" into integration

684952d127-Dec-2024 Kamlesh Gurudasani <kamlesh@ti.com>

feat(scmi): add support for discovering and changing parent clocks

Add base support for discovering and changing parent clocks

This is the part of SCMI platform design document version 3.2,
which i

feat(scmi): add support for discovering and changing parent clocks

Add base support for discovering and changing parent clocks

This is the part of SCMI platform design document version 3.2,
which introduces SCMI clock protocol version 3.0

Add mandatory support for CLOCK_CONFIG_GET which is needed
for SCMI clock protocol version 3.0

Also, add support for clock_enable_delay parameter which got
introduced as new parameter in return values for command
CLOCK_ATTRIBUTES in same SCMI Platform design document v3.2

Change-Id: Ie5cba83dad27bf1e3b51c11c0218259a44c1af59
Signed-off-by: Kamlesh Gurudasani <kamlesh@ti.com>

show more ...

6af1075327-Oct-2025 Lauren Wehrmeister <lauren.wehrmeister@arm.com>

Merge changes from topic "xl/fwu-trial-run" into integration

* changes:
fix(fwu): fwu NV ctr upgraded on trial run
feat(docs): platform hook for whether NV ctr is shared
feat(fwu): add platfor

Merge changes from topic "xl/fwu-trial-run" into integration

* changes:
fix(fwu): fwu NV ctr upgraded on trial run
feat(docs): platform hook for whether NV ctr is shared
feat(fwu): add platform hook for shared NV ctr

show more ...

3b50591b24-Oct-2025 Chris Kay <chris.kay@arm.com>

chore(compiler-rt): update compiler-rt to v21.1.4

Source: https://github.com/llvm/llvm-project/tree/llvmorg-21.1.4
Change-Id: Ic2ebfb7770a3b88f2c294b31262504c9cb90f48d
Signed-off-by: Chris Kay <chri

chore(compiler-rt): update compiler-rt to v21.1.4

Source: https://github.com/llvm/llvm-project/tree/llvmorg-21.1.4
Change-Id: Ic2ebfb7770a3b88f2c294b31262504c9cb90f48d
Signed-off-by: Chris Kay <chris.kay@arm.com>

show more ...

a8c877cb24-Oct-2025 Chris Kay <chris.kay@arm.com>

chore(zlib): update zlib to v1.3.1

Source: https://github.com/madler/zlib/tree/v1.3.1
Change-Id: I2ab8c7449aef1ad6e95b14a0f690d394d47e1088
Signed-off-by: Chris Kay <chris.kay@arm.com>

1881842624-Oct-2025 Chris Kay <chris.kay@arm.com>

chore(libfdt): update libfdt to v1.7.2

Where previously we cherry-picked individual sources from the libfdt
project tree, this change instead integrates the entire project tree
into the TF-A reposit

chore(libfdt): update libfdt to v1.7.2

Where previously we cherry-picked individual sources from the libfdt
project tree, this change instead integrates the entire project tree
into the TF-A repository. Doing so reduces the manual overhead of
updating libfdt in the future, as we avoid the need to analyse
individual source-level dependencies.

libfdt, conveniently, also provides a Makefile designed to ease its
integration into foreign build systems (like TF-A's), which we also make
use of in this change.

Source: https://git.kernel.org/pub/scm/utils/dtc/dtc.git/tree/?h=v1.7.2
Change-Id: I8babcfd27019fdd6d255d550491e1bb733745f27
Signed-off-by: Chris Kay <chris.kay@arm.com>

show more ...

c1582b7229-Sep-2025 Sumit Garg <sumit.garg@oss.qualcomm.com>

docs(maintainers): update QTI platform maintainers

Add myself to the list of QTI platform maintainers.

Change-Id: I779f457cf075bf42acb62b75223912d7b4f1e95b
Signed-off-by: Sumit Garg <sumit.garg@oss

docs(maintainers): update QTI platform maintainers

Add myself to the list of QTI platform maintainers.

Change-Id: I779f457cf075bf42acb62b75223912d7b4f1e95b
Signed-off-by: Sumit Garg <sumit.garg@oss.qualcomm.com>

show more ...

1...<<11121314151617181920>>...733