| 6ae88e28 | 05-Sep-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(fvp): load SP_PKGs with TRANSFER_LIST
To enable loading of SP_PKGs when using the TRANSFER_LIST build option, this patch loads TB_FW_CONFIG in BL1 and populates sp_mem_params_descs in arm_trans
feat(fvp): load SP_PKGs with TRANSFER_LIST
To enable loading of SP_PKGs when using the TRANSFER_LIST build option, this patch loads TB_FW_CONFIG in BL1 and populates sp_mem_params_descs in arm_transfer_list_dyn_cfg_init().
Since there is no standard tag_id defined for TB_FW_CONFIG in the transfer list, define PLAT_ARM_TB_FW_CONFIG_TL_TAG as a platform-specific identifier to load TB_FW_CONFIG.
With this change, BL2 can load the SP_PKGs specified in TB_FW_CONFIG.
Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com> Change-Id: I2470c1ef3bf2bf921d0de1fff541565df13eaee4
show more ...
|
| dd4c9bde | 13-Nov-2025 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "docs(ff-a): document `sri-interrupts-policy` field" into integration |
| 69b4a591 | 15-Oct-2025 |
Andre Przywara <andre.przywara@arm.com> |
fix(allwinner): avoid crash when running without DTB
For determining the PMIC type and the bus its connected to, we use the DTB that is appended to the U-Boot binary, by looking for it in DRAM. And
fix(allwinner): avoid crash when running without DTB
For determining the PMIC type and the bus its connected to, we use the DTB that is appended to the U-Boot binary, by looking for it in DRAM. And while we bail out correctly if we don't find it there, we later try to use the DTB pointer - without checking.
Add a check in sunxi_pmic_setup(), to only proceed if we have found a DTB before, and exit early otherwise.
This fixes more experimental setups, where TF-A is run without U-Boot.
Change-Id: I9a7677be057a84fe6bee093d098be758970eec81 Signed-off-by: Andre Przywara <andre.przywara@arm.com>
show more ...
|
| b48ba400 | 11-Nov-2025 |
J-Alves <joao.alves@arm.com> |
docs(ff-a): document `sri-interrupts-policy` field
Add the encoding information for the `sri-interrupts-policy` field for SP FF-A manifest.
Signed-off-by: J-Alves <joao.alves@arm.com> Change-Id: Ib
docs(ff-a): document `sri-interrupts-policy` field
Add the encoding information for the `sri-interrupts-policy` field for SP FF-A manifest.
Signed-off-by: J-Alves <joao.alves@arm.com> Change-Id: Ib8f6a3ba02be3a312abd1f8ab4a75874290a244f
show more ...
|
| e928912f | 05-Nov-2025 |
Jit Loon Lim <jit.loon.lim@altera.com> |
fix(intel): remove invalid SDM SMMU Stream ID register from bypass list
The register is SDM-owned and not accessible by HPS. It was added by mistakein v2.7.0. Removing it ensures correct access cont
fix(intel): remove invalid SDM SMMU Stream ID register from bypass list
The register is SDM-owned and not accessible by HPS. It was added by mistakein v2.7.0. Removing it ensures correct access control.
Change-Id: I76d27e5b53bfb115ace6011dbb79f2fac049bb4e Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>
show more ...
|
| d625940f | 10-Oct-2025 |
Jit Loon Lim <jit.loon.lim@altera.com> |
fix(intel): prevent invalid register rejection on non-A5F4 devices
Move TSN_TBU_STREAM_CTRL_REG_3_TSN0/1/2 handling outside the main switch to ensure non-A5F4 devices (e.g., A5F0) evaluate other val
fix(intel): prevent invalid register rejection on non-A5F4 devices
Move TSN_TBU_STREAM_CTRL_REG_3_TSN0/1/2 handling outside the main switch to ensure non-A5F4 devices (e.g., A5F0) evaluate other valid registers.
Previously, TSN cases were inside the switch and followed by a `break` if not A5F4, causing early exit and -1 return. Valid registers (e.g., ECC_INTMASK_x)were rejected, blocking boot.
Now, A5F4 TSN registers are handled conditionally and fallthrough is clean for all other devices.
Change-Id: I1339e0e3951ccb68f02dc437f25db6c27d2a0877 Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>
show more ...
|
| cc226539 | 10-Oct-2025 |
Jit Loon Lim <jit.loon.lim@altera.com> |
fix(intel): allow kernel access to TSN TBU stream control registers
Added TSN_TBU_STREAM_CTRL_REG_3_TSN0/1/2 to ATF's secure range check to permit setting the 31st bit from kernel space.
Change-Id:
fix(intel): allow kernel access to TSN TBU stream control registers
Added TSN_TBU_STREAM_CTRL_REG_3_TSN0/1/2 to ATF's secure range check to permit setting the 31st bit from kernel space.
Change-Id: I74bd296c4c050fb61d4df5c1bd5b57449b3a13e3 Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>
show more ...
|
| 6c79953c | 11-Nov-2025 |
Yeoreum Yun <yeoreum.yun@arm.com> |
feat(spm-mm): fix wrong range of SPM_MM
According to SMCCC specification [1], Table 6-4: Reserved Standard Secure Service Call range,
fid 0x40-0x4f are reserved for Management Mode, fid 0x50-0x5f a
feat(spm-mm): fix wrong range of SPM_MM
According to SMCCC specification [1], Table 6-4: Reserved Standard Secure Service Call range,
fid 0x40-0x4f are reserved for Management Mode, fid 0x50-0x5f are reserved for TRNG interface and fid 0x60-0x7f are not reserved yet for Standard Secure Service Calls and current SPM_MM's implementation uses the 0x40-0x4f and 0x60-0x7f fids.
However, the is_spm_mm_fid() is checking TRNG range too so it returns false positive and TRNG request couldn't be handled properly.
To resolve this, remove the TRNG range check in is_spm_mm_fid().
Link: https://developer.arm.com/documentation/den0028/latest/ [1] Change-Id: Ide41cf3451412676f604e31f3d88aeb2e601c5f2 Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
show more ...
|
| 85476f40 | 10-Nov-2025 |
Manish Pandey <manish.pandey2@arm.com> |
docs: describe RAS KFH limitations and its mitigation in future
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I27b739413140fc310b2bcb3a0812e07ba29e36d8 |
| 1bd4f3c1 | 11-Nov-2025 |
Dhruva Gole <d-gole@ti.com> |
build(changelog): add new scope for TI k3low
Add a new scope for the newly added family of k3low processors which focus more on lower power consumption.
Change-Id: I804ad8bcf14d28b2bb80ac530adf1d29
build(changelog): add new scope for TI k3low
Add a new scope for the newly added family of k3low processors which focus more on lower power consumption.
Change-Id: I804ad8bcf14d28b2bb80ac530adf1d29f4686f65 Signed-off-by: Dhruva Gole <d-gole@ti.com>
show more ...
|
| 4fc70262 | 11-Nov-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(libfdt): fix coverity reported issue
Check for null pointer before usage of prop.
Coverity Reports - CID 394590: (#1 of 1): Dereference null return value (NULL_RETURNS) 6. dereference: Derefere
fix(libfdt): fix coverity reported issue
Check for null pointer before usage of prop.
Coverity Reports - CID 394590: (#1 of 1): Dereference null return value (NULL_RETURNS) 6. dereference: Dereferencing a pointer that might be NULL prop when calling fdt_setprop.
Change-Id: I2f864a1b476ef4a22f34d8157e1176354b996172 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| c2316a99 | 11-Nov-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(libc): fix coverity deadcode issue
Comparison checks makes no sense due to the way libc in TF-A has implemeneted long and long long which are the same so checking for overflow is deadcode.
Cove
fix(libc): fix coverity deadcode issue
Comparison checks makes no sense due to the way libc in TF-A has implemeneted long and long long which are the same so checking for overflow is deadcode.
Coverity reports - CID 493664: (#1 of 1): Logically dead code (DEADCODE)
The cutoff and cutlim check is good enough to avoid any overflow. So remove overflow checks added.
Change-Id: I83e4197e5107bf7c5edc8050bc831b721454573b Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| e03704bf | 10-Nov-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(zlib): fix overflow issue from coverity
Fix the overflow when m equals 0 in the multmodp function during the for loop. As identified by coverity report.
Reported as -
CID 427579: (#1 of 1): Ov
fix(zlib): fix overflow issue from coverity
Fix the overflow when m equals 0 in the multmodp function during the for loop. As identified by coverity report.
Reported as -
CID 427579: (#1 of 1): Overflowed constant (INTEGER_OVERFLOW) 163. overflow_const: Expression m - 1UL, where m is known to be equal to 0, underflows the type of m - 1UL, which is type unsigned long.
Change-Id: Idb0238bc8c7ff11f1fc22f4b69deef3d3ed4acb6 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 138a326c | 11-Nov-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "fix-windows-builds" into integration
* changes: fix(build): shell-escape toolchain wrapper commands fix(build): fix incorrect parentheses expansion in `shell-map` |
| 78cb57cc | 11-Nov-2025 |
Chris Kay <chris.kay@arm.com> |
fix(build): shell-escape toolchain wrapper commands
When we split toolchain tool commands into their wrapper and program shell fragments, we do so by iterating over each shell word and forwarding it
fix(build): shell-escape toolchain wrapper commands
When we split toolchain tool commands into their wrapper and program shell fragments, we do so by iterating over each shell word and forwarding it to `toolchain-guess-tool`.
However, we receive each word in its raw form, but we pass it to a function which expects a fragment. If the raw word contains characters which are syntactically-meaningful to the shell, then the command can misbehave, and the build system can unwittingly do some funky things.
This small change just ensures that we re-quote the shell word we receive before forwarding it on.
Change-Id: I325e1c135fee97d749da927c08e181775b14d146 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| cfc2d766 | 11-Nov-2025 |
Chris Kay <chris.kay@arm.com> |
fix(build): fix incorrect parentheses expansion in `shell-map`
The previous commit which attempted to fix the expansions in `shell-map` doubled up on the dollar signs for all of the escape substitut
fix(build): fix incorrect parentheses expansion in `shell-map`
The previous commit which attempted to fix the expansions in `shell-map` doubled up on the dollar signs for all of the escape substitutions; this "fixed" the Windows build.
However, the expansion of the parentheses is actually still wrong. Consider the following example:
print = $(warning $(1))
$(call shell-map,print,'$$' '$(lparen)' '$(rparen)')
... which prints:
make_helpers/utilities.mk:620: $ make_helpers/utilities.mk:620: ${lparen} make_helpers/utilities.mk:620: ${rparen}
However, what we expect to see is:
make_helpers/utilities.mk:620: $ make_helpers/utilities.mk:620: ( make_helpers/utilities.mk:620: )
The reason we do these substitutions is because, behind the scenes, the function generates a small snippet of Make which calls the map function provided by the user. To do that safely, we need to escape characters which can cause premature expansion (`$`), and any characters which can interfere with the syntax of the `call` function (`(` and `)`).
The shell snippet that we *expected* the example above to generate was:
$(call print,$$,1) $(call print,${lparen},2) $(call print,${rparen},3)
However, as of the last "fix", what it is actually generating is:
$(call print,$$,1) $(call print,$${lparen},2) $(call print,$${rparen},3)
This breaks the Windows build again but that's because this bug was actually three bugs from the start.
Change-Id: Ibaf044806101334ddf4080df8da18f9aac8667e5 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 2ac888f6 | 11-Nov-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(build): fix incorrect expansions in `shell-map`" into integration |
| 988fd102 | 11-Nov-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(fvp): use global option for setting PLAT_ARM_MAX_BL2_SIZE" into integration |
| 27bff0b9 | 10-Nov-2025 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
fix(fvp): use global option for setting PLAT_ARM_MAX_BL2_SIZE
Use global option TRUSTED_BOARD_BOOT for setting PLAT_ARM_MAX_BL2_SIZE.
Change-Id: Ia360b36535d2039de8e41da90dd4c8478adb6d54 Signed-off
fix(fvp): use global option for setting PLAT_ARM_MAX_BL2_SIZE
Use global option TRUSTED_BOARD_BOOT for setting PLAT_ARM_MAX_BL2_SIZE.
Change-Id: Ia360b36535d2039de8e41da90dd4c8478adb6d54 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 4e820fc4 | 10-Nov-2025 |
Chris Kay <chris.kay@arm.com> |
Merge "chore(fvp): bump maximum permitted Trusted SRAM size" into integration |
| cfecbc09 | 10-Nov-2025 |
Yann Gautier <yann.gautier@st.com> |
Merge "fix(versal2): align comment about invalid console selection" into integration |
| cfe7ff31 | 10-Nov-2025 |
Chris Kay <chris.kay@arm.com> |
chore(fvp): bump maximum permitted Trusted SRAM size
Bump the size of the Trusted SRAM in FVP builds, as we are now exceeding the 256KB limit in a meaningful number of builds.
Change-Id: Iefd584172
chore(fvp): bump maximum permitted Trusted SRAM size
Bump the size of the Trusted SRAM in FVP builds, as we are now exceeding the 256KB limit in a meaningful number of builds.
Change-Id: Iefd58417297507eaa9b24e55fc36de67bd16b716 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| e655b00d | 10-Nov-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge changes from topic "gr/cov_fixes" into integration
* changes: fix(libc): fix coverity overflowed constant fix(libc): fix coverity overflowed constant fix(psci): fix coverity issue with o
Merge changes from topic "gr/cov_fixes" into integration
* changes: fix(libc): fix coverity overflowed constant fix(libc): fix coverity overflowed constant fix(psci): fix coverity issue with out-of-bounds read fix(fvp): fix coverity issue unsigned_compare
show more ...
|
| 92f51a4e | 10-Nov-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(scmi): fix coverity issue INTEGER_OVERFLOW" into integration |
| 8924da1e | 10-Nov-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge changes from topic "gr/cov_fixes" into integration
* changes: fix(gic): fix coverity issue INTEGER_OVERFLOW fix(scmi): fix coverity issue INTEGER_OVERFLOW |