| 51247ccb | 25-Sep-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
feat(cpus): add support for veymont cpu
Add basic CPU library code to support Veymont CPU
Change-Id: I44db5650e7c9cf8fcc368c935574f4702c373dae Signed-off-by: Govindraj Raja <govindraj.raja@arm.com> |
| c6b2bb99 | 09-Oct-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(intel): update nand driver to enable Linux OS boot" into integration |
| 633cf6b7 | 01-Oct-2025 |
Naman Trivedi <naman.trivedimanojbhai@amd.com> |
fix(versal2): handle debugfs specific APIs before EEMI handler
In Versal Gen 2 SoC, all PM APIs use the extended SMC format including the debugfs-specific APIs. So, call eemi_psci_debugfs_handler be
fix(versal2): handle debugfs specific APIs before EEMI handler
In Versal Gen 2 SoC, all PM APIs use the extended SMC format including the debugfs-specific APIs. So, call eemi_psci_debugfs_handler before eemi_api_handler. This ensures that debugfs-specific PM APIs are handled correctly by TF-A and are not forwarded to the PLM firmware.
Change-Id: Ibab08c851c853a8f4272783b210040ddf7291d76 Signed-off-by: Naman Trivedi <naman.trivedimanojbhai@amd.com>
show more ...
|
| 9cfc7235 | 01-Oct-2025 |
Naman Trivedi <naman.trivedimanojbhai@amd.com> |
fix(versal2): use PM_STATE_CPU_OFF for core power down in SELF_SUSPEND
Currently TF-A provides PM_STATE_CPU_IDLE state during SELF_SUSPEND to power down the core. PM_STATE_CPU_IDLE is intended for C
fix(versal2): use PM_STATE_CPU_OFF for core power down in SELF_SUSPEND
Currently TF-A provides PM_STATE_CPU_IDLE state during SELF_SUSPEND to power down the core. PM_STATE_CPU_IDLE is intended for CPU-idle suspend paths (when Linux CPU idle is enabled) and is not the correct state for a full core power-off.
Fix this by providing PM_STATE_CPU_OFF state to power down the core.
Change-Id: I25585b32fe90372b0404a1ad89544f1aaa2f34a2 Signed-off-by: Naman Trivedi <naman.trivedimanojbhai@amd.com>
show more ...
|
| 249fb06c | 09-Oct-2025 |
Chris Kay <chris.kay@arm.com> |
Merge "refactor(build): avoid implicit pattern rules" into integration |
| 3c6170b6 | 27-Sep-2025 |
Marek Vasut <marek.vasut+renesas@mailbox.org> |
feat(rcar): split common SCIF code
Move common SCIF code into drivers/renesas/common/scif/scif-common.c and retain only SoC-specific console_rcar_init() in drivers/renesas/rcar_gen4/scif/scif.c. Thi
feat(rcar): split common SCIF code
Move common SCIF code into drivers/renesas/common/scif/scif-common.c and retain only SoC-specific console_rcar_init() in drivers/renesas/rcar_gen4/scif/scif.c. This allows other SoCs to reuse the common code and add only SoC specific glue code.
Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> Change-Id: Ie970984ea551e482479af91524974b281923f813
show more ...
|
| 9979a20a | 27-Sep-2025 |
Marek Vasut <marek.vasut+renesas@mailbox.org> |
feat(rcar): deduplicate SCIF console_rcar_register
The console_rcar_register assembler macro is functionally identical between Renesas R-Car Gen3 and R-Car Gen4, deduplicate the code.
Signed-off-by
feat(rcar): deduplicate SCIF console_rcar_register
The console_rcar_register assembler macro is functionally identical between Renesas R-Car Gen3 and R-Car Gen4, deduplicate the code.
Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> Change-Id: Ib498832dbed9063efdb9979e89e53d119303d9df
show more ...
|
| 92196d4f | 27-Sep-2025 |
Marek Vasut <marek.vasut+renesas@mailbox.org> |
feat(rcar): deduplicate PWRC timer
The PWRC timer code is functionally identical between Renesas R-Car Gen3 and R-Car Gen4, deduplicate the code.
Signed-off-by: Marek Vasut <marek.vasut+renesas@mai
feat(rcar): deduplicate PWRC timer
The PWRC timer code is functionally identical between Renesas R-Car Gen3 and R-Car Gen4, deduplicate the code.
Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> Change-Id: Id50a730ea58faedaa24380fd3171be171ecd7269
show more ...
|
| 57e22e07 | 27-Sep-2025 |
Marek Vasut <marek.vasut+renesas@mailbox.org> |
feat(rcar): deduplicate PWRC SRAM trampoline
The PWRC SRAM trampoline code is functionally identical between Renesas R-Car Gen3 and R-Car Gen4, deduplicate the code.
Signed-off-by: Marek Vasut <mar
feat(rcar): deduplicate PWRC SRAM trampoline
The PWRC SRAM trampoline code is functionally identical between Renesas R-Car Gen3 and R-Car Gen4, deduplicate the code.
Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> Change-Id: I24209ac0277fa12898bbeea69d93a8f057e76ed4
show more ...
|
| 223d989e | 27-Sep-2025 |
Marek Vasut <marek.vasut+renesas@mailbox.org> |
feat(rcar): deduplicate stack protector
The stack protector code is functionally identical between Renesas R-Car Gen3 and R-Car Gen4, deduplicate the code.
Signed-off-by: Marek Vasut <marek.vasut+r
feat(rcar): deduplicate stack protector
The stack protector code is functionally identical between Renesas R-Car Gen3 and R-Car Gen4, deduplicate the code.
Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> Change-Id: I1caf6cc6a9ace678b50013eee1a5506fba9acccc
show more ...
|
| de5c4451 | 03-Oct-2025 |
Devanshi Chauhan <devanshi.chauhan@amd.com> |
chore(xilinx): add deprecation warning to pm_feature_check
Add deprecation warning to pm_feature_check() function to inform users that this API will be removed in the 2027.1 release and they should
chore(xilinx): add deprecation warning to pm_feature_check
Add deprecation warning to pm_feature_check() function to inform users that this API will be removed in the 2027.1 release and they should migrate to tfa_api_feature_check() for TF-A specific feature checks.
This warning helps customers prepare for the upcoming API removal and encourages migration to the correct function.
Change-Id: Icab5eb6f1a552553b1cc1215aa683430733667bd Signed-off-by: Devanshi Chauhan <devanshi.chauhan@amd.com>
show more ...
|
| e25fad87 | 03-Oct-2025 |
Devanshi Chauhan <devanshi.chauhan@amd.com> |
refactor(xilinx): rename eemi_feature_check to tfa_api_feature_check
Rename eemi_feature_check() to tfa_api_feature_check() for better clarity. The new name clearly indicates its purpose of handling
refactor(xilinx): rename eemi_feature_check to tfa_api_feature_check
Rename eemi_feature_check() to tfa_api_feature_check() for better clarity. The new name clearly indicates its purpose of handling TF-A specific feature checks and improves code maintainability.
Change-Id: Ia74b12933427ccadbc8ede5ddc2a7a4822766264 Signed-off-by: Devanshi Chauhan <devanshi.chauhan@amd.com>
show more ...
|
| c96f838a | 01-Oct-2025 |
Devanshi Chauhan <devanshi.chauhan@amd.com> |
fix(versal): modify IPI4 and IPI5 trigger bit definitions
The IPI4 and IPI5 trigger bit definitions are incorrect according to the register database specification. This discrepancy can cause IPI com
fix(versal): modify IPI4 and IPI5 trigger bit definitions
The IPI4 and IPI5 trigger bit definitions are incorrect according to the register database specification. This discrepancy can cause IPI communication failures between processing units in Versal SoCs. So, modified the trigger bits to align the software definitions with the hardware register specification as documented in the register database.
Change-Id: I1e32961124daf8e5635906fb615e98a650130f27 Signed-off-by: Devanshi Chauhan <devanshi.chauhan@amd.com>
show more ...
|
| b45fc164 | 13-May-2025 |
Boyan Karatotev <boyan.karatotev@arm.com> |
fix(build): correctly detect that an option is missing with ld_option
We support building directly with ld and indirectly with gcc. The `ld_option` macro is oblivious to this and does a check for bo
fix(build): correctly detect that an option is missing with ld_option
We support building directly with ld and indirectly with gcc. The `ld_option` macro is oblivious to this and does a check for both styles of invocation. However, the gcc one is incorrect - gcc returns `0` even when it has printed an error saying that it doesn't recognise the option. Add a discovery function for each linker we expect and dynamically dispatch to the correct one.
While we're at it, also add a little bit of code to return the -Wl prefix for gcc and not for ld.
All of the above is also true for clang and lld, although they don't suffer from the problem that gcc does.
Change-Id: I4f7bdf40c01f4c5df9c177f5048f5e349bc2b9c9 Co-authored-by: Chris Kay <chris.kay@arm.com> Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| a771dc0f | 07-Oct-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes I44f90daa,I0fed6ef4,I018869d3,I9089b3ad,Ibf5b3a80 into integration
* changes: refactor(fvp): always build RAS files fix(fvp): give fvp_ras.c better dependencies fix(cpufeat): add
Merge changes I44f90daa,I0fed6ef4,I018869d3,I9089b3ad,Ibf5b3a80 into integration
* changes: refactor(fvp): always build RAS files fix(fvp): give fvp_ras.c better dependencies fix(cpufeat): add ras files to the build from a common location fix(cm): do not restore spsr and elr twice on external aborts fix(cm): do not save SCR_EL3 on external aborts
show more ...
|
| cc2523bb | 14-Aug-2025 |
Andre Przywara <andre.przywara@arm.com> |
feat(cpufeat): enable FEAT_AIE support
Implement support for FEAT_AIE, which introduces the AMAIR2_ELx and MAIR2_ELx system registers, extending the memory attributes described by {A}MAIR_ELx. Those
feat(cpufeat): enable FEAT_AIE support
Implement support for FEAT_AIE, which introduces the AMAIR2_ELx and MAIR2_ELx system registers, extending the memory attributes described by {A}MAIR_ELx. Those system registers are trapped by the SCR_EL3.AIEn bit, so set the bit for the non-secure world context to allow OSes to use the feature.
This is controlled by the ENABLE_FEAT_AIE build flag, which follows the usual semantics of 2 meaning the feature being runtime detected. Let the default for this flag be 0, but set it to 2 for the FVP.
Change-Id: Iba2011719013a89f9cb3a4317bde18254f45cd25 Signed-off-by: Andre Przywara <andre.przywara@arm.com>
show more ...
|
| 4fd510e0 | 02-Sep-2025 |
Ronak Jain <ronak.jain@amd.com> |
feat(xilinx): use common SECURE/NON_SECURE macro
Remove platform-specific macro definitions such as SECURE_FLAG and NON_SECURE_FLAG, and replace them with the common macros SECURE and NON_SECURE acr
feat(xilinx): use common SECURE/NON_SECURE macro
Remove platform-specific macro definitions such as SECURE_FLAG and NON_SECURE_FLAG, and replace them with the common macros SECURE and NON_SECURE across all AMD-Xilinx platforms.
Change-Id: I95465e29ac8a9370da135c2113203c3206ecfec0 Signed-off-by: Ronak Jain <ronak.jain@amd.com>
show more ...
|
| 3e3cdf26 | 29-Aug-2025 |
Ronak Jain <ronak.jain@amd.com> |
fix(xilinx): incorrect usage of SECURE_FLAG for psci
As per the PSCI specification, the PSCI SMC call always expects from the NON_SECURE world. However, in the platform specific file SECURE flag was
fix(xilinx): incorrect usage of SECURE_FLAG for psci
As per the PSCI specification, the PSCI SMC call always expects from the NON_SECURE world. However, in the platform specific file SECURE flag was passed to the firmware which is incorrect. Pass NON_SECURE flag from the platform specific file to the firmware in order to align with the PSCI specification.
Change-Id: Iabe2cb45467cf63fe36626d323513ff05548eb3b Signed-off-by: Ronak Jain <ronak.jain@amd.com>
show more ...
|
| 6f7f8b18 | 29-Jun-2025 |
Girisha Dengi <girisha.dengi@altera.com> |
fix(intel): update nand driver to enable Linux OS boot
Update the nand driver SDR mode with the correct timing and combo-phy configurations to enable the Linux system boot.
Change-Id: If592680ef359
fix(intel): update nand driver to enable Linux OS boot
Update the nand driver SDR mode with the correct timing and combo-phy configurations to enable the Linux system boot.
Change-Id: If592680ef359378574b913b11d466c89389a2606 Signed-off-by: Girisha Dengi <girisha.dengi@altera.com> Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>
show more ...
|
| fe87637a | 12-Jul-2021 |
Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> |
fix(rcar3): clear TCR_EL1 at the BL2 entry point
According to ARM DDI0601 2025-06 [1] TCR_EL1, Translation Control Register (EL1), all fields of TCR_EL1 do, on a Warm reset, (this field) resets to a
fix(rcar3): clear TCR_EL1 at the BL2 entry point
According to ARM DDI0601 2025-06 [1] TCR_EL1, Translation Control Register (EL1), all fields of TCR_EL1 do, on a Warm reset, (this field) resets to an architecturally UNKNOWN value.
On some SoCs, after reset, this TCR_EL1 may not be 0, which in itself is perfectly valid behavior. However, existing software may depend on TCR_EL1 being 0, and the UNKNOWN value may confuse such software.
Reset TCR_EL1 to well defined value 0 at BL2 entrypoint to achieve maximum compatibility.
[1] https://developer.arm.com/documentation/ddi0601/2025-06/AArch64-Registers/TCR-EL1--Translation-Control-Register--EL1-
Signed-off-by: Hideyuki Nitta <hideyuki.nitta.jf@hitachi.com> Signed-off-by: Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> Signed-off-by: Yoshifumi Hosoya <yoshifumi.hosoya.wj@renesas.com> Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> # update commit message Change-Id: If3a1d40291b9b9768a8fc55e750bd742f3cc4ddc --- Note: This is related to MR 25532 , but with reworked commit message and broken out from the large work-in-progress series.
show more ...
|
| a4ac07c7 | 04-Jun-2024 |
Chris Kay <chris.kay@arm.com> |
refactor(build): avoid implicit pattern rules
This change translates any implicit pattern rules into the equivalent static pattern rules, i.e. rules like:
%.o: %.s ...
... become:
refactor(build): avoid implicit pattern rules
This change translates any implicit pattern rules into the equivalent static pattern rules, i.e. rules like:
%.o: %.s ...
... become:
$(OBJS): %.o: %.s ...
These behave similarly, but have some subtle differences. The former defines a rule "for any target matching %.o where there is not a more specific rule", whereas the latter defines a rule "for these targets, which match %.o".
Where possible it is better to use a static pattern rule as it reduces the rule space that Make needs to search.
Change-Id: Ifba4f44bcecf4e74980c31347e192cdf1e42003e Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| cf3a7c8c | 02-Oct-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(rcar3): add missing image_base/size assignment to BL33 image loading path" into integration |
| 96ba28a1 | 02-Oct-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(intel): undo setting USB 3.1 reset pulse bit in BL2" into integration |
| d1aecd46 | 02-Oct-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(intel): update the AES GCM/GCM_GHASH modes return data size" into integration |
| 29beda37 | 02-Oct-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(intel): configure SCR1 for 32/16 non-secure SMRs and context banks" into integration |