| 4bfc2d21 | 13-Feb-2014 |
Jon Medhurst <tixy@linaro.org> |
Enable platforms to omit some bootloaders
If a platform doesn't specify a BLx_SOURCE variable, then building of the corresponding bootloader isn't attempted. Also allow BL3-3 to be omitted from the
Enable platforms to omit some bootloaders
If a platform doesn't specify a BLx_SOURCE variable, then building of the corresponding bootloader isn't attempted. Also allow BL3-3 to be omitted from the FIP.
Note, this change also removes support for PLAT=all and the 'fip' target from the 'all' recipe.
Fixes ARM-software/tf-issues#30
Change-Id: Ibdfead0440256eaf364617ecff65290ca6fe6240 Signed-off-by: Jon Medhurst <tixy@linaro.org>
show more ...
|
| fb052462 | 17-Feb-2014 |
Jon Medhurst <tixy@linaro.org> |
Generate build time and date message at link time.
So it updates each time a bootloader changes, not just when bl*_main.c files are recompiled.
Fixes ARM-software/tf-issues#33
Change-Id: Ie8e1a7bd
Generate build time and date message at link time.
So it updates each time a bootloader changes, not just when bl*_main.c files are recompiled.
Fixes ARM-software/tf-issues#33
Change-Id: Ie8e1a7bd7e1913d2e96ac268606284f76af8c5ab Signed-off-by: Jon Medhurst <tixy@linaro.org>
show more ...
|
| 38aa76a8 | 26-Feb-2014 |
Jon Medhurst <tixy@linaro.org> |
fvp: Make use of the generic MMU translation table setup code
Change-Id: I559c5a4d86cad55ce3f6ad71285b538d3cfd76dc Signed-off-by: Jon Medhurst <tixy@linaro.org> |
| c481c269 | 24-Jan-2014 |
Jon Medhurst <tixy@linaro.org> |
Add generic functions for setting up aarch64 MMU translation tables
Change-Id: I5b8d040ebc6672e40e4f13925e2fd5bc124103f4 Signed-off-by: Jon Medhurst <tixy@linaro.org> |
| 6d55d109 | 12-Feb-2014 |
Jon Medhurst <tixy@linaro.org> |
Update Makefiles to get proper dependency checking working.
This change requires all platforms to now specify a list of source files rather than object files.
New source files should preferably be
Update Makefiles to get proper dependency checking working.
This change requires all platforms to now specify a list of source files rather than object files.
New source files should preferably be specified by using the path as well and we should add this in the future for all files so we can remove use of vpath. This is desirable because vpath hides issues like the fact that BL2 currently pulls in a BL1 file bl1/aarch64/early_exceptions.S and if in the future we added bl2/aarch64/early_exceptions.S then it's likely only one of the two version would be used for both bootloaders.
This change also removes the 'dump' build target and simply gets bootloaders to always generate a dump file. At the same time the -x option is added so the section headers and symbols table are listed.
Fixes ARM-software/tf-issues#11
Change-Id: Ie38f7be76fed95756c8576cf3f3ea3b7015a18dc Signed-off-by: Jon Medhurst <tixy@linaro.org>
show more ...
|
| cf6eeb8a | 11-Feb-2014 |
Jon Medhurst <tixy@linaro.org> |
Fix implementation and users of gicd_set_ipriorityr()
Make gicd_set_ipriorityr() actually write to the priority register.
Also correct callers of this function which want the highest priority to us
Fix implementation and users of gicd_set_ipriorityr()
Make gicd_set_ipriorityr() actually write to the priority register.
Also correct callers of this function which want the highest priority to use the value zero as this is the highest priority value according to the ARM Generic Interrupt Controller Architecture Specification.
To make this easier to get right, we introduce defines for the lowest and highest priorities for secure and non-secure interrupts.
Fixes ARM-software/tf-issues#21
Signed-off-by: Jon Medhurst <tixy@linaro.org>
show more ...
|
| a4d9f26b | 06-Feb-2014 |
Jon Medhurst <tixy@linaro.org> |
Fix assert in bakery_lock_release()
bakery_lock_release() expects an mpidr as the first argument however bakery_lock_release() is calling it with the 'entry' argument it has calculated. Rather than
Fix assert in bakery_lock_release()
bakery_lock_release() expects an mpidr as the first argument however bakery_lock_release() is calling it with the 'entry' argument it has calculated. Rather than fixing this to pass the mpidr value it would be much more efficient to just replace the call with
assert(bakery->owner == entry)
As this leaves no remaining users of bakery_lock_held(), we might as well delete it.
Fixes ARM-software/tf-issues#27
Signed-off-by: Jon Medhurst <tixy@linaro.org>
show more ...
|
| b2388490 | 26-Feb-2014 |
Dan Handley <dan.handley@arm.com> |
Add v0.3 release documentation
Update the readme.md and change-log.md with release information.
Also, remove the "Detailed changes since last release" section of the change-log.md since the same in
Add v0.3 release documentation
Update the readme.md and change-log.md with release information.
Also, remove the "Detailed changes since last release" section of the change-log.md since the same information can be found in the GIT commit messages. Fixes ARM-software/tf-issues#22.
Change-Id: I968cc8aaf588aa5c34ba8f1c12a5b797a46e04f5
show more ...
|
| 57de6d72 | 27-Feb-2014 |
Dan Handley <dan.handley@arm.com> |
Consolidate design and porting documentation
Consolidate firmware-design.md and porting-guide.pm so that recently added sections fit better with pre-existing sections. Make the documentation more co
Consolidate design and porting documentation
Consolidate firmware-design.md and porting-guide.pm so that recently added sections fit better with pre-existing sections. Make the documentation more consistent in use of terminology.
Change-Id: Id87050b096122fbd845189dc2fe1cd17c3003468
show more ...
|
| 5e1e9200 | 25-Feb-2014 |
Dan Handley <dan.handley@arm.com> |
Add EL3 runtime services and SPD documentation
1. Add design information on EL3 runtime services and Secure-EL1 Payload Dispatchers (SPD) to firmware-design.md.
2. Create new EL3 runtime service wr
Add EL3 runtime services and SPD documentation
1. Add design information on EL3 runtime services and Secure-EL1 Payload Dispatchers (SPD) to firmware-design.md.
2. Create new EL3 runtime service writer's guide (rt-svc-writers-guide.md) to ease creation of new runtime services.
Change-Id: I670aeb5fc246e25c6e599a15139aac886a0074fd
show more ...
|
| 247f60bc | 25-Feb-2014 |
Dan Handley <dan.handley@arm.com> |
Separate firmware design out of user-guide.md
Move the firmware design documentation out of user-guide.md and into a new file - firmware-design.md. Reformat the section headers.
Change-Id: I664815d
Separate firmware design out of user-guide.md
Move the firmware design documentation out of user-guide.md and into a new file - firmware-design.md. Reformat the section headers.
Change-Id: I664815dd47011c7c1cf2202aa4472a8fd78ebb92
show more ...
|
| 3505c044 | 19-Feb-2014 |
Dan Handley <dan.handley@arm.com> |
Update versions of dependencies in user-guide.md
1. Update user-guide.md with the latest versions of dependent components required by the tested configurations of ARM Trusted Firmware. This includes
Update versions of dependencies in user-guide.md
1. Update user-guide.md with the latest versions of dependent components required by the tested configurations of ARM Trusted Firmware. This includes the tested versions of Fixed Virtual Platforms (FVPs), toolchain, EFI Development Kit 2(EDK2), Linux kernel and Linux file system.
2. Remove the instructions to configure the Cortex Base FVP with the legacy GICv2 memory map as this is no longer supported since version 5.3 of the Base FVPs.
3. General tidyup of "Using the software" section.
Change-Id: If8264cd29036b59dc5ff435b5f8b1d072dd36ef0
show more ...
|
| e3fff153 | 24-Feb-2014 |
Jeenu Viswambharan <jeenu.viswambharan@arm.com> |
Remove duplicate xlat_table descriptions
The BL31 and BL2 linker scripts ended up having duplicate descriptions for xlat_tables section. This patch removes those duplicate descriptions.
Change-Id:
Remove duplicate xlat_table descriptions
The BL31 and BL2 linker scripts ended up having duplicate descriptions for xlat_tables section. This patch removes those duplicate descriptions.
Change-Id: Ibbdda0902c57fca5ea4e91e0baefa6df8f0a9bb1
show more ...
|
| 20d284c0 | 21-Feb-2014 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
fvp: Initialise UART earlier
The UART used to be initialised in bl1_platform_setup(). This is too late because there are some calls to the assert() macro, which needs to print some messages on the c
fvp: Initialise UART earlier
The UART used to be initialised in bl1_platform_setup(). This is too late because there are some calls to the assert() macro, which needs to print some messages on the console, before that.
This patch moves the UART initialisation code to bl1_early_platform_setup().
Fixes ARM-software/tf-issues#49
Change-Id: I98c83a803866372806d2a9c2e1ed80f2ef5b3bcc
show more ...
|
| 090630e4 | 20-Feb-2014 |
Jeenu Viswambharan <jeenu.viswambharan@arm.com> |
Tolerate runtime service initialization failure
At present, the firmware panics if a runtime service fails to initialize. An earlier patch had implemented late binding for all runtime service handle
Tolerate runtime service initialization failure
At present, the firmware panics if a runtime service fails to initialize. An earlier patch had implemented late binding for all runtime service handlers.
With that in place, this patch allows the firmware to proceed even when a service fails to initialize.
Change-Id: I6cf4de2cecea9719f4cd48272a77cf459b080d4e
show more ...
|
| 7f366605 | 20-Feb-2014 |
Jeenu Viswambharan <jeenu.viswambharan@arm.com> |
Implement late binding for runtime hooks
At present SPD power management hooks and BL3-2 entry are implemented using weak references. This would have the handlers bound and registered with the core
Implement late binding for runtime hooks
At present SPD power management hooks and BL3-2 entry are implemented using weak references. This would have the handlers bound and registered with the core framework at build time, but leaves them dangling if a service fails to initialize at runtime.
This patch replaces implementation by requiring runtime handlers to register power management and deferred initialization hooks with the core framework at runtime. The runtime services are to register the hooks only as the last step, after having all states successfully initialized.
Change-Id: Ibe788a2a381ef39aec1d4af5ba02376e67269782
show more ...
|
| 9128ffe9 | 24-Feb-2014 |
Dan Handley <dan.handley@arm.com> |
Update contributing.md to new CLA location
This commit updates contributing.md to point to the ARM website for downloading copies of the Contribution License Agreement (CLA). It is no longer necessa
Update contributing.md to new CLA location
This commit updates contributing.md to point to the ARM website for downloading copies of the Contribution License Agreement (CLA). It is no longer necessary to email ARM for these.
Change-Id: Iaf58680631a626f26827577709ac5471e3b84566
show more ...
|
| d19e4979 | 24-Feb-2014 |
Harry Liebel <Harry.Liebel@arm.com> |
Reduce GICv3 debug output
Change-Id: Ia8502f8d0566025d8bad150029f49cb63815261d |
| 8aa559c0 | 21-Feb-2014 |
Jeenu Viswambharan <jeenu.viswambharan@arm.com> |
Revert accidental removal of BL2 from help message
Commit 375f538a7 in Github accidentally removed the BL2 targets from the Makefile help message. This patch reverts that change.
Change-Id: I825a9a
Revert accidental removal of BL2 from help message
Commit 375f538a7 in Github accidentally removed the BL2 targets from the Makefile help message. This patch reverts that change.
Change-Id: I825a9abe5b4ba0f15d02879dda1056912e2ad60c
show more ...
|
| d59a6c6d | 18-Feb-2014 |
Jeenu Viswambharan <jeenu.viswambharan@arm.com> |
Update .gitignore
This patch updates .gitignore file to ignore potential build products, tool object files and binaries
Also fixes issue ARM-software/tf-issues#35
Change-Id: I053dfba4ec8fecbcca081
Update .gitignore
This patch updates .gitignore file to ignore potential build products, tool object files and binaries
Also fixes issue ARM-software/tf-issues#35
Change-Id: I053dfba4ec8fecbcca081cad5b4bf94f8abfb15c
show more ...
|
| cd529320 | 10-Feb-2014 |
Ryan Harkin <ryan.harkin@linaro.org> |
Fix semihosting with latest toolchain
Fixes issues #10:
https://github.com/ARM-software/tf-issues/issues/10
This patch changes all/most variables of type int to be size_t or long to fix the sizing
Fix semihosting with latest toolchain
Fixes issues #10:
https://github.com/ARM-software/tf-issues/issues/10
This patch changes all/most variables of type int to be size_t or long to fix the sizing and alignment problems found when building with the newer toolchains such as Linaro GCC 13.12 or later.
Change-Id: Idc9d48eb2ff9b8c5bbd5b227e6907263d1ea188b Signed-off-by: Ryan Harkin <ryan.harkin@linaro.org>
show more ...
|
| 2f2cef46 | 19-Feb-2014 |
Jeenu Viswambharan <jeenu.viswambharan@arm.com> |
Cleanup FIP build targets and messages
At present the fip.bin depends on phony targets for BL images, resulting in unconditional remake of fip.bin. Also the build messages doesn't match with the res
Cleanup FIP build targets and messages
At present the fip.bin depends on phony targets for BL images, resulting in unconditional remake of fip.bin. Also the build messages doesn't match with the rest of build system.
This patch modifies the fip.bin dependencies to the actual BL binary images so that fip.bin is remade only when the component images are rebuilt/modified. The build messages and FIP Makefile are modified to match the style of rest of the build system.
Change-Id: I8dd08666ff766d106820a5b4b037c2161bcf140f
show more ...
|
| 08c28d53 | 20-Feb-2014 |
Jeenu Viswambharan <jeenu.viswambharan@arm.com> |
Report recoverable errors as warnings
At present many recoverable failures are reported as errors. This patch modifies all such failures to be reported as warnings instead.
Change-Id: I5141653c8249
Report recoverable errors as warnings
At present many recoverable failures are reported as errors. This patch modifies all such failures to be reported as warnings instead.
Change-Id: I5141653c82498defcada9b90fdf7498ba496b2f2
show more ...
|
| 916a2c1e | 09-Feb-2014 |
Achin Gupta <achin.gupta@arm.com> |
Rework arithmetic operations in Test Secure Payload
This patch reworks the service provided by the TSP to perform common arithmetic operations on a set of arguments provided by the non-secure world.
Rework arithmetic operations in Test Secure Payload
This patch reworks the service provided by the TSP to perform common arithmetic operations on a set of arguments provided by the non-secure world. For a addition, division, subtraction & multiplication operation requested on two arguments in x0 and x1 the steps are:
1. TSPD saves the non-secure context and passes the operation and its arguments to the TSP.
2. TSP asks the TSPD to return the same arguments once again. This exercises an additional SMC path.
3. TSP now has two copies of both x0 and x1. It performs the operation on the corresponding copies i.e. in case of addition it returns x0+x0 and x1+x1.
4. TSPD receives the result, saves the secure context, restores the non-secure context and passes the result back to the non-secure client.
Change-Id: I6eebfa2ae0a6f28b1d2e11a31f575c7a4b96724b Co-authored-by: Jeenu Viswambharan <jeenu.viswambharan@arm.com>
show more ...
|
| 607084ee | 09-Feb-2014 |
Achin Gupta <achin.gupta@arm.com> |
Add power management support in the SPD
This patch implements a set of handlers in the SPD which are called by the PSCI runtime service upon receiving a power management operation. These handlers in
Add power management support in the SPD
This patch implements a set of handlers in the SPD which are called by the PSCI runtime service upon receiving a power management operation. These handlers in turn pass control to the Secure Payload image if required before returning control to PSCI. This ensures that the Secure Payload has complete visibility of all power transitions in the system and can prepare accordingly.
Change-Id: I2d1dba5629b7cf2d53999d39fe807dfcf3f62fe2
show more ...
|