History log of /rk3399_ARM-atf/ (Results 476 – 500 of 18586)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
6ae88e2805-Sep-2025 Yeoreum Yun <yeoreum.yun@arm.com>

feat(fvp): load SP_PKGs with TRANSFER_LIST

To enable loading of SP_PKGs when using the TRANSFER_LIST build option,
this patch loads TB_FW_CONFIG in BL1 and populates sp_mem_params_descs
in arm_trans

feat(fvp): load SP_PKGs with TRANSFER_LIST

To enable loading of SP_PKGs when using the TRANSFER_LIST build option,
this patch loads TB_FW_CONFIG in BL1 and populates sp_mem_params_descs
in arm_transfer_list_dyn_cfg_init().

Since there is no standard tag_id defined for TB_FW_CONFIG in the
transfer list, define PLAT_ARM_TB_FW_CONFIG_TL_TAG as a platform-specific
identifier to load TB_FW_CONFIG.

With this change, BL2 can load the SP_PKGs specified in TB_FW_CONFIG.

Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>
Change-Id: I2470c1ef3bf2bf921d0de1fff541565df13eaee4

show more ...

dd4c9bde13-Nov-2025 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "docs(ff-a): document `sri-interrupts-policy` field" into integration

69b4a59115-Oct-2025 Andre Przywara <andre.przywara@arm.com>

fix(allwinner): avoid crash when running without DTB

For determining the PMIC type and the bus its connected to, we use the
DTB that is appended to the U-Boot binary, by looking for it in DRAM.
And

fix(allwinner): avoid crash when running without DTB

For determining the PMIC type and the bus its connected to, we use the
DTB that is appended to the U-Boot binary, by looking for it in DRAM.
And while we bail out correctly if we don't find it there, we later try
to use the DTB pointer - without checking.

Add a check in sunxi_pmic_setup(), to only proceed if we have found a
DTB before, and exit early otherwise.

This fixes more experimental setups, where TF-A is run without U-Boot.

Change-Id: I9a7677be057a84fe6bee093d098be758970eec81
Signed-off-by: Andre Przywara <andre.przywara@arm.com>

show more ...

b48ba40011-Nov-2025 J-Alves <joao.alves@arm.com>

docs(ff-a): document `sri-interrupts-policy` field

Add the encoding information for the `sri-interrupts-policy` field
for SP FF-A manifest.

Signed-off-by: J-Alves <joao.alves@arm.com>
Change-Id: Ib

docs(ff-a): document `sri-interrupts-policy` field

Add the encoding information for the `sri-interrupts-policy` field
for SP FF-A manifest.

Signed-off-by: J-Alves <joao.alves@arm.com>
Change-Id: Ib8f6a3ba02be3a312abd1f8ab4a75874290a244f

show more ...

e928912f05-Nov-2025 Jit Loon Lim <jit.loon.lim@altera.com>

fix(intel): remove invalid SDM SMMU Stream ID register from bypass list

The register is SDM-owned and not accessible by HPS.
It was added by mistakein v2.7.0.
Removing it ensures correct access cont

fix(intel): remove invalid SDM SMMU Stream ID register from bypass list

The register is SDM-owned and not accessible by HPS.
It was added by mistakein v2.7.0.
Removing it ensures correct access control.

Change-Id: I76d27e5b53bfb115ace6011dbb79f2fac049bb4e
Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>

show more ...

d625940f10-Oct-2025 Jit Loon Lim <jit.loon.lim@altera.com>

fix(intel): prevent invalid register rejection on non-A5F4 devices

Move TSN_TBU_STREAM_CTRL_REG_3_TSN0/1/2 handling outside the
main switch to ensure non-A5F4 devices (e.g., A5F0) evaluate
other val

fix(intel): prevent invalid register rejection on non-A5F4 devices

Move TSN_TBU_STREAM_CTRL_REG_3_TSN0/1/2 handling outside the
main switch to ensure non-A5F4 devices (e.g., A5F0) evaluate
other valid registers.

Previously, TSN cases were inside the switch and followed
by a `break` if not A5F4, causing early exit and -1 return.
Valid registers (e.g., ECC_INTMASK_x)were rejected, blocking boot.

Now, A5F4 TSN registers are handled conditionally
and fallthrough is clean for all other devices.

Change-Id: I1339e0e3951ccb68f02dc437f25db6c27d2a0877
Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>

show more ...

cc22653910-Oct-2025 Jit Loon Lim <jit.loon.lim@altera.com>

fix(intel): allow kernel access to TSN TBU stream control registers

Added TSN_TBU_STREAM_CTRL_REG_3_TSN0/1/2 to ATF's secure range check
to permit setting the 31st bit from kernel space.

Change-Id:

fix(intel): allow kernel access to TSN TBU stream control registers

Added TSN_TBU_STREAM_CTRL_REG_3_TSN0/1/2 to ATF's secure range check
to permit setting the 31st bit from kernel space.

Change-Id: I74bd296c4c050fb61d4df5c1bd5b57449b3a13e3
Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>

show more ...

6c79953c11-Nov-2025 Yeoreum Yun <yeoreum.yun@arm.com>

feat(spm-mm): fix wrong range of SPM_MM

According to SMCCC specification [1],
Table 6-4: Reserved Standard Secure Service Call range,

fid 0x40-0x4f are reserved for Management Mode,
fid 0x50-0x5f a

feat(spm-mm): fix wrong range of SPM_MM

According to SMCCC specification [1],
Table 6-4: Reserved Standard Secure Service Call range,

fid 0x40-0x4f are reserved for Management Mode,
fid 0x50-0x5f are reserved for TRNG interface and
fid 0x60-0x7f are not reserved yet for Standard Secure Service Calls
and current SPM_MM's implementation uses the 0x40-0x4f and 0x60-0x7f fids.

However, the is_spm_mm_fid() is checking TRNG range too
so it returns false positive and
TRNG request couldn't be handled properly.

To resolve this, remove the TRNG range check in is_spm_mm_fid().

Link: https://developer.arm.com/documentation/den0028/latest/ [1]
Change-Id: Ide41cf3451412676f604e31f3d88aeb2e601c5f2
Signed-off-by: Yeoreum Yun <yeoreum.yun@arm.com>

show more ...

85476f4010-Nov-2025 Manish Pandey <manish.pandey2@arm.com>

docs: describe RAS KFH limitations and its mitigation in future

Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: I27b739413140fc310b2bcb3a0812e07ba29e36d8

1bd4f3c111-Nov-2025 Dhruva Gole <d-gole@ti.com>

build(changelog): add new scope for TI k3low

Add a new scope for the newly added family of k3low processors which
focus more on lower power consumption.

Change-Id: I804ad8bcf14d28b2bb80ac530adf1d29

build(changelog): add new scope for TI k3low

Add a new scope for the newly added family of k3low processors which
focus more on lower power consumption.

Change-Id: I804ad8bcf14d28b2bb80ac530adf1d29f4686f65
Signed-off-by: Dhruva Gole <d-gole@ti.com>

show more ...

4fc7026211-Nov-2025 Govindraj Raja <govindraj.raja@arm.com>

fix(libfdt): fix coverity reported issue

Check for null pointer before usage of prop.

Coverity Reports -
CID 394590: (#1 of 1): Dereference null return value (NULL_RETURNS)
6. dereference: Derefere

fix(libfdt): fix coverity reported issue

Check for null pointer before usage of prop.

Coverity Reports -
CID 394590: (#1 of 1): Dereference null return value (NULL_RETURNS)
6. dereference: Dereferencing a pointer that might be NULL prop when
calling fdt_setprop.

Change-Id: I2f864a1b476ef4a22f34d8157e1176354b996172
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>

show more ...

c2316a9911-Nov-2025 Govindraj Raja <govindraj.raja@arm.com>

fix(libc): fix coverity deadcode issue

Comparison checks makes no sense due to the way libc
in TF-A has implemeneted long and long long which are the same
so checking for overflow is deadcode.

Cove

fix(libc): fix coverity deadcode issue

Comparison checks makes no sense due to the way libc
in TF-A has implemeneted long and long long which are the same
so checking for overflow is deadcode.

Coverity reports -
CID 493664: (#1 of 1): Logically dead code (DEADCODE)

The cutoff and cutlim check is good enough to avoid any overflow.
So remove overflow checks added.

Change-Id: I83e4197e5107bf7c5edc8050bc831b721454573b
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>

show more ...

e03704bf10-Nov-2025 Govindraj Raja <govindraj.raja@arm.com>

fix(zlib): fix overflow issue from coverity

Fix the overflow when m equals 0 in the multmodp function during the
for loop. As identified by coverity report.

Reported as -

CID 427579: (#1 of 1): Ov

fix(zlib): fix overflow issue from coverity

Fix the overflow when m equals 0 in the multmodp function during the
for loop. As identified by coverity report.

Reported as -

CID 427579: (#1 of 1): Overflowed constant (INTEGER_OVERFLOW)
163. overflow_const: Expression m - 1UL, where m is known to be equal
to 0, underflows the type of m - 1UL, which is type unsigned long.

Change-Id: Idb0238bc8c7ff11f1fc22f4b69deef3d3ed4acb6
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>

show more ...

138a326c11-Nov-2025 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge changes from topic "fix-windows-builds" into integration

* changes:
fix(build): shell-escape toolchain wrapper commands
fix(build): fix incorrect parentheses expansion in `shell-map`

78cb57cc11-Nov-2025 Chris Kay <chris.kay@arm.com>

fix(build): shell-escape toolchain wrapper commands

When we split toolchain tool commands into their wrapper and program
shell fragments, we do so by iterating over each shell word and
forwarding it

fix(build): shell-escape toolchain wrapper commands

When we split toolchain tool commands into their wrapper and program
shell fragments, we do so by iterating over each shell word and
forwarding it to `toolchain-guess-tool`.

However, we receive each word in its raw form, but we pass it to a
function which expects a fragment. If the raw word contains characters
which are syntactically-meaningful to the shell, then the command can
misbehave, and the build system can unwittingly do some funky things.

This small change just ensures that we re-quote the shell word we
receive before forwarding it on.

Change-Id: I325e1c135fee97d749da927c08e181775b14d146
Signed-off-by: Chris Kay <chris.kay@arm.com>

show more ...

cfc2d76611-Nov-2025 Chris Kay <chris.kay@arm.com>

fix(build): fix incorrect parentheses expansion in `shell-map`

The previous commit which attempted to fix the expansions in `shell-map`
doubled up on the dollar signs for all of the escape substitut

fix(build): fix incorrect parentheses expansion in `shell-map`

The previous commit which attempted to fix the expansions in `shell-map`
doubled up on the dollar signs for all of the escape substitutions; this
"fixed" the Windows build.

However, the expansion of the parentheses is actually still wrong.
Consider the following example:

print = $(warning $(1))

$(call shell-map,print,'$$' '$(lparen)' '$(rparen)')

... which prints:

make_helpers/utilities.mk:620: $
make_helpers/utilities.mk:620: ${lparen}
make_helpers/utilities.mk:620: ${rparen}

However, what we expect to see is:

make_helpers/utilities.mk:620: $
make_helpers/utilities.mk:620: (
make_helpers/utilities.mk:620: )

The reason we do these substitutions is because, behind the scenes, the
function generates a small snippet of Make which calls the map function
provided by the user. To do that safely, we need to escape characters
which can cause premature expansion (`$`), and any characters which can
interfere with the syntax of the `call` function (`(` and `)`).

The shell snippet that we *expected* the example above to generate was:

$(call print,$$,1)
$(call print,${lparen},2)
$(call print,${rparen},3)

However, as of the last "fix", what it is actually generating is:

$(call print,$$,1)
$(call print,$${lparen},2)
$(call print,$${rparen},3)

This breaks the Windows build again but that's because this bug was
actually three bugs from the start.

Change-Id: Ibaf044806101334ddf4080df8da18f9aac8667e5
Signed-off-by: Chris Kay <chris.kay@arm.com>

show more ...

2ac888f611-Nov-2025 Manish Pandey <manish.pandey2@arm.com>

Merge "fix(build): fix incorrect expansions in `shell-map`" into integration

988fd10211-Nov-2025 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge "fix(fvp): use global option for setting PLAT_ARM_MAX_BL2_SIZE" into integration

27bff0b910-Nov-2025 Manish V Badarkhe <Manish.Badarkhe@arm.com>

fix(fvp): use global option for setting PLAT_ARM_MAX_BL2_SIZE

Use global option TRUSTED_BOARD_BOOT for setting PLAT_ARM_MAX_BL2_SIZE.

Change-Id: Ia360b36535d2039de8e41da90dd4c8478adb6d54
Signed-off

fix(fvp): use global option for setting PLAT_ARM_MAX_BL2_SIZE

Use global option TRUSTED_BOARD_BOOT for setting PLAT_ARM_MAX_BL2_SIZE.

Change-Id: Ia360b36535d2039de8e41da90dd4c8478adb6d54
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

4e820fc410-Nov-2025 Chris Kay <chris.kay@arm.com>

Merge "chore(fvp): bump maximum permitted Trusted SRAM size" into integration

cfecbc0910-Nov-2025 Yann Gautier <yann.gautier@st.com>

Merge "fix(versal2): align comment about invalid console selection" into integration

cfe7ff3110-Nov-2025 Chris Kay <chris.kay@arm.com>

chore(fvp): bump maximum permitted Trusted SRAM size

Bump the size of the Trusted SRAM in FVP builds, as we are now exceeding
the 256KB limit in a meaningful number of builds.

Change-Id: Iefd584172

chore(fvp): bump maximum permitted Trusted SRAM size

Bump the size of the Trusted SRAM in FVP builds, as we are now exceeding
the 256KB limit in a meaningful number of builds.

Change-Id: Iefd58417297507eaa9b24e55fc36de67bd16b716
Signed-off-by: Chris Kay <chris.kay@arm.com>

show more ...

e655b00d10-Nov-2025 Mark Dykes <mark.dykes@arm.com>

Merge changes from topic "gr/cov_fixes" into integration

* changes:
fix(libc): fix coverity overflowed constant
fix(libc): fix coverity overflowed constant
fix(psci): fix coverity issue with o

Merge changes from topic "gr/cov_fixes" into integration

* changes:
fix(libc): fix coverity overflowed constant
fix(libc): fix coverity overflowed constant
fix(psci): fix coverity issue with out-of-bounds read
fix(fvp): fix coverity issue unsigned_compare

show more ...

92f51a4e10-Nov-2025 Mark Dykes <mark.dykes@arm.com>

Merge "fix(scmi): fix coverity issue INTEGER_OVERFLOW" into integration

8924da1e10-Nov-2025 Mark Dykes <mark.dykes@arm.com>

Merge changes from topic "gr/cov_fixes" into integration

* changes:
fix(gic): fix coverity issue INTEGER_OVERFLOW
fix(scmi): fix coverity issue INTEGER_OVERFLOW

1...<<11121314151617181920>>...744