| 9b4ee6b3 | 11-Mar-2015 |
Juan Castillo <juan.castillo@arm.com> |
checkpatch: ignore GIT_COMMIT_ID
By default, the checkpatch script requires that commit references included in commit messages follow a predefined format. Github merge commits do not follow this con
checkpatch: ignore GIT_COMMIT_ID
By default, the checkpatch script requires that commit references included in commit messages follow a predefined format. Github merge commits do not follow this convention, causing the code style test to fail when a new pull request is created.
This patch adds the ignore GIT_COMMIT_ID option to the checkpatch parameters. This flag indicates the tool to ignore the commit message format.
Change-Id: I37133cc5cf803f664b8ff00f62d458b39f06918c
show more ...
|
| 9cda6a94 | 17-Feb-2015 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Juno: Disable workaround for Cortex-A57 erratum #806969
Cortex-A57 erratum #806969 applies to revision r0p0 of the CPU but does not manifest itself on Juno r0. It is not applicable to Juno r1 in any
Juno: Disable workaround for Cortex-A57 erratum #806969
Cortex-A57 erratum #806969 applies to revision r0p0 of the CPU but does not manifest itself on Juno r0. It is not applicable to Juno r1 in any case.
This patch modifies the Juno platform Makefile to no longer compile this erratum workaround in.
Change-Id: I32b16835b2ac897e639e869ab2b78b62a51a0139
show more ...
|
| 81ee0983 | 10-Mar-2015 |
Juan Castillo <juan.castillo@arm.com> |
TBB: remove PolarSSL SHA1 functions from the binary
Commit ea4ec3aad5e1 ("TBB: use SHA256 to generate the certificate signatures") updated the cert_create tool to generate the signatures using SHA25
TBB: remove PolarSSL SHA1 functions from the binary
Commit ea4ec3aad5e1 ("TBB: use SHA256 to generate the certificate signatures") updated the cert_create tool to generate the signatures using SHA256 instead of SHA1. Therefore, SHA1 is no longer required.
This patch removes the SHA1 option from the PolarSSL configuration file. The source file sha1.c is no longer needed and has been excluded from the build. The SHA1 functions are no longer included in the binary, reducing the memory footprint of BL1 and BL2 by approximately 6 KB.
Change-Id: I72ea2cff03c0964c3eaadce148ec2ad2c6dde2e3
show more ...
|
| 4da85bb0 | 18-Feb-2015 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
User guide: Add dependency on libssl-dev for cert_create tool
The 'libssl-dev' package must be installed on the host to build the certificate generation tool. This patch adds it to the list of requi
User guide: Add dependency on libssl-dev for cert_create tool
The 'libssl-dev' package must be installed on the host to build the certificate generation tool. This patch adds it to the list of required tools in the User Guide.
Change-Id: I018381fb14b7c2d2bd6f2b7929aaad0571f7eb2e
show more ...
|
| 1b578596 | 18-Feb-2015 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Update help message printed by the Makefile
The message printed by 'make help' is incomplete. It doesn't mention all relevant supported targets. This patch updates it.
The format of the first line
Update help message printed by the Makefile
The message printed by 'make help' is incomplete. It doesn't mention all relevant supported targets. This patch updates it.
The format of the first line of the help message has been changed so that it no longer lists all supported targets. This eases the maintenance as we don't need to update the list in 2 places anymore whenever a new target is added.
Also add a reference to the user guide to get the list of supported options.
Change-Id: I79d8b815b0ffc0c43b4c05124378fce0e938365c
show more ...
|
| dad25049 | 05-Feb-2015 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Enable type-checking of arguments passed to printf() et al.
This patch modifies the declarations of the functions printf() et al. and adds the right GCC attribute to request the compiler to check th
Enable type-checking of arguments passed to printf() et al.
This patch modifies the declarations of the functions printf() et al. and adds the right GCC attribute to request the compiler to check the type of the arguments passed to these functions against the given format string. This will ensure that the compiler outputs warning messages like the following whenever it detects an inconsistency:
file.c:42: warning: format ‘%d’ expects type ‘int’, but argument 3 has type ‘long int’
It also fixes the type mismatch inconsistencies that it revealed across the code base.
NOTE: THIS PATCH MAY FORCE PLATFORM PORTS OR SP/SPDS THAT USE THE PRINTF FAMILY OF FUNCTIONS TO FIX ANY TYPE MISMATCH INCONSISTENCIES.
Change-Id: If36bb54ec7d6dd2cb4791d89b02a24ac13fd2df6
show more ...
|
| b5b12347 | 06-Mar-2015 |
danh-arm <dan.handley@arm.com> |
Merge pull request #260 from jcastillo-arm/jc/tbb_sha256
TBB: use SHA256 to generate the certificate signatures |
| ea4ec3aa | 16-Feb-2015 |
Juan Castillo <juan.castillo@arm.com> |
TBB: use SHA256 to generate the certificate signatures
This patch replaces SHA1 by SHA256 in the 'cert_create' tool, so certificate signatures are generated according to the NSA Suite B cryptographi
TBB: use SHA256 to generate the certificate signatures
This patch replaces SHA1 by SHA256 in the 'cert_create' tool, so certificate signatures are generated according to the NSA Suite B cryptographic algorithm requirements.
Documentation updated accordingly.
Change-Id: I7be79e6b2b62dac8dc78a4f4f5006e37686bccf6
show more ...
|
| 85cdfdb2 | 02-Mar-2015 |
Juan Castillo <juan.castillo@arm.com> |
TBB: fix build target 'all' dependency on certificates
Build target 'all' fails when GENERATE_COT=1 and no BL3-3 or BL3-0 (if required) images are specified. The reason is that, when GENERATE_COT=1,
TBB: fix build target 'all' dependency on certificates
Build target 'all' fails when GENERATE_COT=1 and no BL3-3 or BL3-0 (if required) images are specified. The reason is that, when GENERATE_COT=1, a dependency on the certificates is added to the target 'all', and the certificates depend on the BL3-3 and BL3-0 images, causing the build process to fail if the images are not specified.
This patch moves the dependency on the certificates from 'all' to 'fip'. Target 'all' may be used to build the individual images. The certificates will be created by calling the target 'fip', where BL3-3 and BL3-0 (if required) must be specified.
Change-Id: I870beb4e8f9f1bfad1d35b09c850a7ce3c9f4ec6
show more ...
|
| 5930eadb | 05-Mar-2015 |
danh-arm <dan.handley@arm.com> |
Merge pull request #261 from sandrine-bailleux/sb/coding-style
Ignore C library files when checking coding style
Fix violations to the coding style |
| ba592e28 | 05-Mar-2015 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Fix violations to the coding style
All coding style violations have been fixed in a previous patch and since then, each individual patch has been checked in this regard. However, the latest version
Fix violations to the coding style
All coding style violations have been fixed in a previous patch and since then, each individual patch has been checked in this regard. However, the latest version of the checkpatch.pl script from the Linux kernel is more advanced and it is able to flag new errors in the Trusted Firmware codebase. This patch fixes them.
Change-Id: I1f332f2440984be85d36b231bb83260368987077
show more ...
|
| 95d5353c | 26-Feb-2015 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Ignore C library files when checking coding style
The C library source files embedded into the Trusted Firmware tree are not required to comply to the Linux Coding Style. Unfortunately, 'make checkp
Ignore C library files when checking coding style
The C library source files embedded into the Trusted Firmware tree are not required to comply to the Linux Coding Style. Unfortunately, 'make checkpatch' does take them into account.
This patch modifies the Makefile so that the C library source and header files are now ignored by 'make checkpatch'.
It also instructs the checkpatch.pl script to not treat the presence of a 'Change-Id' line in the commit message as an error.
Change-Id: I38196202efe518bae3a57c2affe2ed7758c9f69c
show more ...
|
| 0412c66a | 25-Feb-2015 |
danh-arm <dan.handley@arm.com> |
Merge pull request #259 from soby-mathew/sm/plat_max_afflvl
Export maximum affinity using PLATFORM_MAX_AFFLVL macro |
| f578d5e1 | 25-Feb-2015 |
danh-arm <dan.handley@arm.com> |
Merge pull request #258 from rmurphy-arm/rm/dma-smmu
Juno: clear DMA-330 SMMU security state |
| 6ff51439 | 19-Feb-2015 |
danh-arm <dan.handley@arm.com> |
Merge pull request #257 from soby-mathew/sm/opt_mmap_reg
Minimize MAX_MMAP_REGIONS for each BL stage |
| 75f8261c | 09-Jan-2015 |
Robin Murphy <robin.murphy@arm.com> |
Juno: clear DMA-330 SMMU security state
By default the SMMU for the DMA-330 is configured to mark some stream IDs as always belonging to the Secure world. As a result, if EL1 software turns the SMMU
Juno: clear DMA-330 SMMU security state
By default the SMMU for the DMA-330 is configured to mark some stream IDs as always belonging to the Secure world. As a result, if EL1 software turns the SMMU on, certain Non-Secure accesses get rewritten as Secure, making them bypass translation and access Secure physical addresses directly.
Since the current Juno board firmware configures the DMA-330 hardware as Non-Secure, rewrite the SMMU's default SSD table as well to prevent any unexpected behaviour in EL1.
Change-Id: Iaa81d883eecf28d80eb182b9ce475684bf9c718c
show more ...
|
| 8c32bc26 | 12-Feb-2015 |
Soby Mathew <soby.mathew@arm.com> |
Export maximum affinity using PLATFORM_MAX_AFFLVL macro
This patch removes the plat_get_max_afflvl() platform API and instead replaces it with a platform macro PLATFORM_MAX_AFFLVL. This is done beca
Export maximum affinity using PLATFORM_MAX_AFFLVL macro
This patch removes the plat_get_max_afflvl() platform API and instead replaces it with a platform macro PLATFORM_MAX_AFFLVL. This is done because the maximum affinity level for a platform is a static value and it is more efficient for it to be defined as a platform macro.
NOTE: PLATFORM PORTS NEED TO BE UPDATED ON MERGE OF THIS COMMIT
Fixes ARM-Software/tf-issues#265
Change-Id: I31d89b30c2ccda30d28271154d869060d50df7bf
show more ...
|
| ce41250e | 22-Jan-2015 |
Soby Mathew <soby.mathew@arm.com> |
Minimize MAX_MMAP_REGIONS for each BL stage
This patch defines MAX_MMAP_REGIONS separately for each BL stage as per its requirements. This minimizes the size of the mmap[] array.
Fixes ARM-Software
Minimize MAX_MMAP_REGIONS for each BL stage
This patch defines MAX_MMAP_REGIONS separately for each BL stage as per its requirements. This minimizes the size of the mmap[] array.
Fixes ARM-Software/tf-issues#201
Change-Id: I19b15e1a91a8365b2ecf24e2cd71937cb73916b2
show more ...
|
| 68fc8174 | 04-Feb-2015 |
achingupta <achin.gupta@arm.com> |
Merge pull request #256 from achingupta/ag/v1.1-rc2-fix
Fix model command line for legacy VE memory map |
| d8d6cc35 | 04-Feb-2015 |
Achin Gupta <achin.gupta@arm.com> |
Fix model command line for legacy VE memory map
The command line options specified in the User Guide to run the AEMv8 Base FVP with the legacy VE memory map apply only when the model is configured t
Fix model command line for legacy VE memory map
The command line options specified in the User Guide to run the AEMv8 Base FVP with the legacy VE memory map apply only when the model is configured to use GIC v2.0. This patch adds the 'gicv3.gicv2-only=1' to the command line to ensure that the right version of GIC is used.
Change-Id: I34c44e19fd42c29818b734ac8f6aa9bf97b4e891
show more ...
|
| 2e4e4d8f | 03-Feb-2015 |
danh-arm <dan.handley@arm.com> |
Merge pull request #254 from achingupta/ag/v1.1-doc-updates
Documentation for version 1.1 |
| 2e1763fc | 03-Feb-2015 |
danh-arm <dan.handley@arm.com> |
Merge pull request #255 from jcastillo-arm/jc/cert_create_gerrit
TBB: Add documentation for Trusted Board Boot |
| 8d35f61b | 25-Jan-2015 |
Achin Gupta <achin.gupta@arm.com> |
TBB: Add documentation for Trusted Board Boot
This patch updates the user-guide.md with the various build options related to Trusted Board Boot and steps to build a FIP image which includes this sup
TBB: Add documentation for Trusted Board Boot
This patch updates the user-guide.md with the various build options related to Trusted Board Boot and steps to build a FIP image which includes this support. It also adds a trusted-board-boot.md which describes the scope and design of this feature.
Change-Id: Ifb421268ebf7e06a135684c8ebb04c94835ce061
show more ...
|
| 130ed88d | 02-Feb-2015 |
Achin Gupta <achin.gupta@arm.com> |
Documentation for version 1.1
Final updates to readme.md and change-log.md for ARM Trusted Firmware version 1.1. Also increment the version in the Makefile.
Change-Id: Ib001a6ec9a9c570985841d06f0ff
Documentation for version 1.1
Final updates to readme.md and change-log.md for ARM Trusted Firmware version 1.1. Also increment the version in the Makefile.
Change-Id: Ib001a6ec9a9c570985841d06f0ff80ed76c2996b
show more ...
|
| 8d6623bf | 02-Feb-2015 |
danh-arm <dan.handley@arm.com> |
Merge pull request #253 from danh-arm/dh/deps-for-v1.1
Move up dependency versions in user guide |