| d67d0214 | 23-Feb-2017 |
Varun Wadekar <vwadekar@nvidia.com> |
spd: trusty: support for AARCH64 mode
This patch removes support for running Trusty in the AARCH32 mode as all platforms use it in only AARCH64 mode.
Signed-off-by: Varun Wadekar <vwadekar@nvidia.c
spd: trusty: support for AARCH64 mode
This patch removes support for running Trusty in the AARCH32 mode as all platforms use it in only AARCH64 mode.
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| 8e590624 | 17-Feb-2017 |
Varun Wadekar <vwadekar@nvidia.com> |
spd: trusty: save context starting from the stack end
This patch uses the stack end to start saving the CPU context during world switch. The previous logic, used the stack start to save the context,
spd: trusty: save context starting from the stack end
This patch uses the stack end to start saving the CPU context during world switch. The previous logic, used the stack start to save the context, thus overwriting the other members of the context.
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| 0e1f9e31 | 29-Sep-2016 |
Varun Wadekar <vwadekar@nvidia.com> |
spd: trusty: add SET_ROT_PARAMS handling
If Trusty is not running on the device, then Verified Boot is not supported and the NS layer will fail gracefully later during boot. This patch just returns
spd: trusty: add SET_ROT_PARAMS handling
If Trusty is not running on the device, then Verified Boot is not supported and the NS layer will fail gracefully later during boot. This patch just returns success for the case when Trusty is not running on the device and the bootloader issues SET_ROT_PARAMS call during boot, so that we can at least boot non-Android images.
Change-Id: I40fc249983df80fb8cc5be5e4ce94c99d5b5f17d Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| 26670c82 | 08-Jun-2016 |
Varun Wadekar <vwadekar@nvidia.com> |
tlkd: execute standard SMC calls on the boot CPU
This patch checks if standard SMC calls, meant for TLK, are issued only on the boot CPU. TLK is UP Trusted OS stack and so we need this check to avoi
tlkd: execute standard SMC calls on the boot CPU
This patch checks if standard SMC calls, meant for TLK, are issued only on the boot CPU. TLK is UP Trusted OS stack and so we need this check to avoid the NS world calling into TLK from any other CPU.
The previous check tied TLK to CPU0, but the boot CPU can be other than CPU0 in some scenarios.
Change-Id: I75eaafa32471ce19e9920433c2f97b6b5fc02d86 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| feb5aa24 | 24-May-2016 |
Wayne Lin <wlin@nvidia.com> |
spd: trusty: pass boot params to the Trusted OS
This patch passes the boot parameters, provided by the previous bootloader, to the Trusted OS via X0, X1 and X2.
Original change by: Wayne Lin <wlin@
spd: trusty: pass boot params to the Trusted OS
This patch passes the boot parameters, provided by the previous bootloader, to the Trusted OS via X0, X1 and X2.
Original change by: Wayne Lin <wlin@nvidia.com>
Change-Id: I2039612a8a8226158babfd505ce8c31c4212319c Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| 64c07d0f | 20-Apr-2016 |
Anthony Zhou <anzhou@nvidia.com> |
spd: trusty: only process one function ID at a time
In multi-guest trusty environment, all guest's SMCs will be forwarded to Trusty. This change only allows 1 guest's SMC to be forwarded at a time a
spd: trusty: only process one function ID at a time
In multi-guest trusty environment, all guest's SMCs will be forwarded to Trusty. This change only allows 1 guest's SMC to be forwarded at a time and returns 'busy' status to all other requests.
Change-Id: I2144467d11e3680e28ec816adeec2766bca114d4 Signed-off-by: Anthony Zhou <anzhou@nvidia.com> Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| e97e413f | 30-Nov-2016 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Check Trusty is present during the SPD's initialization
Add a debug assertion in the initialization function of Trusty's SPD to check for the presence of Trusty. If Trusty is absent then the SPD's s
Check Trusty is present during the SPD's initialization
Add a debug assertion in the initialization function of Trusty's SPD to check for the presence of Trusty. If Trusty is absent then the SPD's setup function already detects it and returns an error code so the init function will never been called. Therefore, a debug assertion is enough to catch this improbable error case.
Change-Id: Id20013e9291cdeef7827b919de2a22455f6cd9f9 Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
show more ...
|
| 48c1c39f | 23-Nov-2016 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Fix a coding style issue in trusty.c
This patch fixes the following coding style error reported by the checkpatch.pl script:
Bad function definition - void el3_exit() should probably be void el
Fix a coding style issue in trusty.c
This patch fixes the following coding style error reported by the checkpatch.pl script:
Bad function definition - void el3_exit() should probably be void el3_exit(void)
There is another one but it's a false positive so there's no point in fixing it:
space prohibited after that '&' (ctx:WxW) +#define SMC_NR(entity, fn, fastcall, smc64) ((((fastcall) & 0x1) << 31) | \ ^ Change-Id: I34de0337c7216dabd16395879f13845a60ee6df0
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
show more ...
|