Unverified Commit 3ccfcd6e authored by Soby Mathew's avatar Soby Mathew Committed by GitHub
Browse files

Merge pull request #1587 from antonio-nino-diaz-arm/an/deprecated

Remove deprecated interfaces for all platforms
parents 9a983cfe 991f1f4d
......@@ -28,8 +28,13 @@ entry_point_info_t *bl31_plat_get_next_image_ep_info(uint32_t type)
return type == NON_SECURE ? &bl33_image_ep_info : &bl32_image_ep_info;
}
void bl31_early_platform_setup(void *from_bl2, void *plat_params_from_bl2)
void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
u_register_t arg2, u_register_t arg3)
{
void *from_bl2;
from_bl2 = (void *) arg0;
bl_params_node_t *bl_params = ((bl_params_t *)from_bl2)->head;
uniphier_console_setup();
......
......@@ -6,9 +6,7 @@
ARM_CORTEX_A7 := yes
ARM_WITH_NEON := yes
LOAD_IMAGE_V2 := 1
BL2_AT_EL3 := 1
ENABLE_PLAT_COMPAT := 0
USE_COHERENT_MEM := 0
STM32_TF_VERSION ?= 0
......
......@@ -5,7 +5,6 @@
*/
#include <arch_helpers.h>
#include <arm_gic.h>
#include <assert.h>
#include <bl_common.h>
#include <console.h>
......
......@@ -57,12 +57,12 @@ static uint32_t k3_get_spsr_for_bl33_entry(void)
* Perform any BL3-1 early platform setup, such as console init and deciding on
* memory layout.
******************************************************************************/
void bl31_early_platform_setup(bl31_params_t *from_bl2,
void *plat_params_from_bl2)
void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
u_register_t arg2, u_register_t arg3)
{
/* There are no parameters from BL2 if BL31 is a reset vector */
assert(from_bl2 == NULL);
assert(plat_params_from_bl2 == NULL);
assert(arg0 == 0U);
assert(arg1 == 0U);
bl31_console_setup();
......@@ -95,12 +95,6 @@ void bl31_early_platform_setup(bl31_params_t *from_bl2,
#endif
}
void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
u_register_t arg2, u_register_t arg3)
{
bl31_early_platform_setup((void *)arg0, (void *)arg1);
}
void bl31_plat_arch_setup(void)
{
......
......@@ -15,9 +15,6 @@ PROGRAMMABLE_RESET_ADDRESS:= 1
WARMBOOT_ENABLE_DCACHE_EARLY:= 1
USE_COHERENT_MEM := 0
ERROR_DEPRECATED := 1
ENABLE_PLAT_COMPAT := 0
# A53 erratum for SoC. (enable them all)
ERRATA_A53_826319 := 1
ERRATA_A53_835769 := 1
......
......@@ -54,8 +54,8 @@ static inline void bl31_set_default_config(void)
* are lost (potentially). This needs to be done before the MMU is initialized
* so that the memory layout can be used while creating page tables.
*/
void bl31_early_platform_setup(bl31_params_t *from_bl2,
void *plat_params_from_bl2)
void bl31_early_platform_setup2(u_register_t arg0, u_register_t arg1,
u_register_t arg2, u_register_t arg3)
{
/* Initialize the console to provide early debug support */
console_init(ZYNQMP_UART_BASE, zynqmp_get_uart_clk(),
......@@ -65,8 +65,8 @@ void bl31_early_platform_setup(bl31_params_t *from_bl2,
zynqmp_config_setup();
/* There are no parameters from BL2 if BL31 is a reset vector */
assert(from_bl2 == NULL);
assert(plat_params_from_bl2 == NULL);
assert(arg0 == 0U);
assert(arg1 == 0U);
/*
* Do initial security configuration to allow DRAM/device access. On
......
......@@ -4,7 +4,6 @@
# SPDX-License-Identifier: BSD-3-Clause
override ERRATA_A53_855873 := 1
override ENABLE_PLAT_COMPAT := 0
override PROGRAMMABLE_RESET_ADDRESS := 1
PSCI_EXTENDED_STATE_ID := 1
A53_DISABLE_NON_TEMPORAL_HINT := 0
......
......@@ -33,16 +33,6 @@ NEED_BL32 := yes
# generated while the code is executing in S-EL1/0.
TSP_NS_INTR_ASYNC_PREEMPT := 0
# If TSPD_ROUTE_IRQ_TO_EL3 build flag is defined, use it to define value for
# TSP_NS_INTR_ASYNC_PREEMPT for backward compatibility.
ifdef TSPD_ROUTE_IRQ_TO_EL3
ifeq (${ERROR_DEPRECATED},1)
$(error "TSPD_ROUTE_IRQ_TO_EL3 is deprecated. Please use the new build flag TSP_NS_INTR_ASYNC_PREEMPT")
endif
$(warning "TSPD_ROUTE_IRQ_TO_EL3 is deprecated. Please use the new build flag TSP_NS_INTR_ASYNC_PREEMPT")
TSP_NS_INTR_ASYNC_PREEMPT := ${TSPD_ROUTE_IRQ_TO_EL3}
endif
ifeq ($(EL3_EXCEPTION_HANDLING),1)
ifeq ($(TSP_NS_INTR_ASYNC_PREEMPT),0)
$(error When EL3_EXCEPTION_HANDLING=1, TSP_NS_INTR_ASYNC_PREEMPT must also be 1)
......
......@@ -33,7 +33,7 @@ HOSTCC ?= gcc
.PHONY: all clean distclean
all: ${PROJECT} fip_create
all: ${PROJECT}
${PROJECT}: ${OBJECTS} Makefile
@echo " LD $@"
......@@ -42,13 +42,9 @@ ${PROJECT}: ${OBJECTS} Makefile
@echo "Built $@ successfully"
@${ECHO_BLANK_LINE}
fip_create: fip_create.sh
${Q}mkdir -p ../fip_create
${Q}install -m 755 fip_create.sh ../fip_create/fip_create
%.o: %.c %.h Makefile
@echo " CC $<"
${Q}${HOSTCC} -c ${CPPFLAGS} ${CFLAGS} ${INCLUDE_PATHS} $< -o $@
clean:
$(call SHELL_DELETE_ALL, ${PROJECT} ${OBJECTS} fip_create)
$(call SHELL_DELETE_ALL, ${PROJECT} ${OBJECTS})
#!/bin/sh
#
# This script implements the old fip_create tool on top of
# the new fiptool.
#
# SPDX-License-Identifier: BSD-3-Clause
#
usage() {
cat << EOF
This tool is used to create a Firmware Image Package.
Usage:
fip_create [options] FIP_FILENAME
Options:
-h,--help: Print this help message and exit
-d,--dump: Print contents of FIP after update
-u,--unpack: Unpack images from an existing FIP
-f,--force: Overwrite existing files when unpacking images
Components that can be added/updated:
--scp-fwu-cfg FILENAME SCP Firmware Updater Configuration FWU SCP_BL2U
--ap-fwu-cfg FILENAME AP Firmware Updater Configuration BL2U
--fwu FILENAME Firmware Updater NS_BL2U
--fwu-cert FILENAME Non-Trusted Firmware Updater certificate
--tb-fw FILENAME Trusted Boot Firmware BL2
--scp-fw FILENAME SCP Firmware SCP_BL2
--soc-fw FILENAME EL3 Runtime Firmware BL31
--tos-fw FILENAME Secure Payload BL32 (Trusted OS)
--tos-fw-extra1 FILENAME Secure Payload BL32 Extra1 (Trusted OS Extra1)
--tos-fw-extra2 FILENAME Secure Payload BL32 Extra2 (Trusted OS Extra2)
--nt-fw FILENAME Non-Trusted Firmware BL33
--rot-cert FILENAME Root Of Trust key certificate
--trusted-key-cert FILENAME Trusted key certificate
--scp-fw-key-cert FILENAME SCP Firmware key certificate
--soc-fw-key-cert FILENAME SoC Firmware key certificate
--tos-fw-key-cert FILENAME Trusted OS Firmware key certificate
--nt-fw-key-cert FILENAME Non-Trusted Firmware key certificate
--tb-fw-cert FILENAME Trusted Boot Firmware BL2 certificate
--scp-fw-cert FILENAME SCP Firmware content certificate
--soc-fw-cert FILENAME SoC Firmware content certificate
--tos-fw-cert FILENAME Trusted OS Firmware content certificate
--nt-fw-cert FILENAME Non-Trusted Firmware content certificate
EOF
exit
}
echo "!! The fip_create tool is deprecated. Use the new fiptool. !!"
basedir="$(dirname $0)/../fiptool"
fiptool_args=
while :; do
case "$1" in
-h | --help )
usage
break ;;
-d | --dump )
fiptool_args="info $fiptool_args"
shift ;;
-u | --unpack )
fiptool_args="unpack $fiptool_args"
shift ;;
-f | --force )
fiptool_args="$fiptool_args --force"
shift ;;
--scp-fwu-cfg | \
--ap-fwu-cfg | \
--fwu | \
--fwu-cert | \
--tb-fw | \
--scp-fw | \
--soc-fw | \
--tos-fw | \
--tos-fw-extra1 | \
--tos-fw-extra2 | \
--nt-fw | \
--rot-cert | \
--trusted-key-cert | \
--scp-fw-key-cert | \
--soc-fw-key-cert | \
--tos-fw-key-cert | \
--nt-fw-key-cert | \
--tb-fw-cert | \
--scp-fw-cert | \
--soc-fw-cert | \
--tos-fw-cert | \
--nt-fw-cert )
fiptool_args="$fiptool_args $1"
shift
if test -z $1; then
usage
fi
fiptool_args="$fiptool_args $1"
shift ;;
* )
break ;;
esac
done
# expect a FIP filename
if test -z $1; then
usage
fi
is_pack_cmd=1
for arg in $fiptool_args; do
case "$arg" in
unpack )
is_pack_cmd=0
break ;;
info )
is_pack_cmd=0
break ;;
* )
esac
done
# if --unpack and --dump were not specified
# the default action is to pack
if test "$is_pack_cmd" -eq 1; then
fiptool_args="update $fiptool_args"
fi
# append FIP filename
fiptool_args="$fiptool_args $1"
echo "Invoking fiptool with args: $fiptool_args"
"$basedir/fiptool" $fiptool_args
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment