Skip to content
GitLab
Menu
Projects
Groups
Snippets
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
Menu
Open sidebar
adam.huang
Arm Trusted Firmware
Commits
3ccfcd6e
Unverified
Commit
3ccfcd6e
authored
Oct 02, 2018
by
Soby Mathew
Committed by
GitHub
Oct 02, 2018
Browse files
Merge pull request #1587 from antonio-nino-diaz-arm/an/deprecated
Remove deprecated interfaces for all platforms
parents
9a983cfe
991f1f4d
Changes
210
Hide whitespace changes
Inline
Side-by-side
include/lib/smccc_v1.h
View file @
3ccfcd6e
...
...
@@ -66,9 +66,6 @@
#define SMC_32 U(0)
#define SMC_TYPE_FAST ULL(1)
#if !ERROR_DEPRECATED
#define SMC_TYPE_STD ULL(0)
#endif
#define SMC_TYPE_YIELD ULL(0)
#define SMC_OK ULL(0)
...
...
include/lib/utils.h
View file @
3ccfcd6e
...
...
@@ -7,10 +7,6 @@
#ifndef __UTILS_H__
#define __UTILS_H__
#if !ERROR_DEPRECATED
#include <utils_def.h>
#endif
/*
* C code should be put in this part of the header to avoid breaking ASM files
* or linker scripts including it.
...
...
include/lib/xlat_tables/xlat_mmu_helpers.h
View file @
3ccfcd6e
...
...
@@ -67,11 +67,6 @@ void setup_mmu_cfg(uint64_t *params, unsigned int flags,
#ifdef AARCH32
/* AArch32 specific translation table API */
#if !ERROR_DEPRECATED
void
enable_mmu_secure
(
unsigned
int
flags
);
void
enable_mmu_direct
(
unsigned
int
flags
);
#endif
void
enable_mmu_svc_mon
(
unsigned
int
flags
);
void
enable_mmu_hyp
(
unsigned
int
flags
);
...
...
include/lib/xlat_tables/xlat_tables.h
View file @
3ccfcd6e
...
...
@@ -71,10 +71,6 @@
#define MT_CODE (MT_MEMORY | MT_RO | MT_EXECUTE)
#define MT_RO_DATA (MT_MEMORY | MT_RO | MT_EXECUTE_NEVER)
#if !ERROR_DEPRECATED
typedef
unsigned
int
mmap_attr_t
;
#endif
/*
* Structure for specifying a single region of memory.
*/
...
...
include/lib/xlat_tables/xlat_tables_v2.h
View file @
3ccfcd6e
...
...
@@ -104,10 +104,6 @@
#define MT_RO_DATA (MT_MEMORY | MT_RO | MT_EXECUTE_NEVER)
#define MT_RW_DATA (MT_MEMORY | MT_RW | MT_EXECUTE_NEVER)
#if !ERROR_DEPRECATED
typedef
unsigned
int
mmap_attr_t
;
#endif
/*
* Structure for specifying a single region of memory.
*/
...
...
include/plat/arm/common/arm_def.h
View file @
3ccfcd6e
...
...
@@ -165,21 +165,6 @@
#define ARM_IRQ_SEC_SGI_6 14
#define ARM_IRQ_SEC_SGI_7 15
/*
* List of secure interrupts are deprecated, but are retained only to support
* legacy configurations.
*/
#define ARM_G1S_IRQS ARM_IRQ_SEC_PHY_TIMER, \
ARM_IRQ_SEC_SGI_1, \
ARM_IRQ_SEC_SGI_2, \
ARM_IRQ_SEC_SGI_3, \
ARM_IRQ_SEC_SGI_4, \
ARM_IRQ_SEC_SGI_5, \
ARM_IRQ_SEC_SGI_7
#define ARM_G0_IRQS ARM_IRQ_SEC_SGI_0, \
ARM_IRQ_SEC_SGI_6
/*
* Define a list of Group 1 Secure and Group 0 interrupt properties as per GICv3
* terminology. On a GICv2 system or mode, the lists will be merged and treated
...
...
include/plat/arm/common/plat_arm.h
View file @
3ccfcd6e
...
...
@@ -17,7 +17,6 @@
/*******************************************************************************
* Forward declarations
******************************************************************************/
struct
bl31_params
;
struct
meminfo
;
struct
image_info
;
struct
bl_params
;
...
...
@@ -197,13 +196,8 @@ void arm_bl2u_platform_setup(void);
void
arm_bl2u_plat_arch_setup
(
void
);
/* BL31 utility functions */
#if LOAD_IMAGE_V2
void
arm_bl31_early_platform_setup
(
void
*
from_bl2
,
uintptr_t
soc_fw_config
,
uintptr_t
hw_config
,
void
*
plat_params_from_bl2
);
#else
void
arm_bl31_early_platform_setup
(
struct
bl31_params
*
from_bl2
,
uintptr_t
soc_fw_config
,
uintptr_t
hw_config
,
void
*
plat_params_from_bl2
);
#endif
/* LOAD_IMAGE_V2 */
void
arm_bl31_platform_setup
(
void
);
void
arm_bl31_plat_runtime_setup
(
void
);
void
arm_bl31_plat_arch_setup
(
void
);
...
...
@@ -252,13 +246,11 @@ void plat_arm_error_handler(int err);
unsigned
int
plat_arm_get_cpu_pe_count
(
u_register_t
mpidr
);
#endif
#if LOAD_IMAGE_V2
/*
* This function is called after loading SCP_BL2 image and it is used to perform
* any platform-specific actions required to handle the SCP firmware.
*/
int
plat_arm_bl2_handle_scp_bl2
(
struct
image_info
*
scp_bl2_image_info
);
#endif
/*
* Optional functions required in ARM standard platforms
...
...
include/plat/common/common_def.h
View file @
3ccfcd6e
...
...
@@ -31,7 +31,6 @@
*/
#define FIRMWARE_WELCOME_STR "Booting Trusted Firmware\n"
#if LOAD_IMAGE_V2
#define BL2_IMAGE_DESC { \
.image_id = BL2_IMAGE_ID, \
SET_STATIC_PARAM_HEAD(image_info, PARAM_EP, \
...
...
@@ -42,17 +41,6 @@
VERSION_2, entry_point_info_t, SECURE | EXECUTABLE),\
.ep_info.pc = BL2_BASE, \
}
#else
/* LOAD_IMAGE_V2 */
#define BL2_IMAGE_DESC { \
.image_id = BL2_IMAGE_ID, \
SET_STATIC_PARAM_HEAD(image_info, PARAM_EP, \
VERSION_1, image_info_t, 0), \
.image_info.image_base = BL2_BASE, \
SET_STATIC_PARAM_HEAD(ep_info, PARAM_EP, \
VERSION_1, entry_point_info_t, SECURE | EXECUTABLE),\
.ep_info.pc = BL2_BASE, \
}
#endif
/* LOAD_IMAGE_V2 */
/*
* The following constants identify the extents of the code & read-only data
...
...
include/plat/common/platform.h
View file @
3ccfcd6e
...
...
@@ -17,7 +17,6 @@ struct auth_img_desc_s;
struct
meminfo
;
struct
image_info
;
struct
entry_point_info
;
struct
bl31_params
;
struct
image_desc
;
struct
bl_load_info
;
struct
bl_params
;
...
...
@@ -38,7 +37,6 @@ struct secure_partition_boot_info;
/*******************************************************************************
* Mandatory common functions
******************************************************************************/
unsigned
long
long
plat_get_syscnt_freq
(
void
)
__deprecated
;
unsigned
int
plat_get_syscnt_freq2
(
void
);
int
plat_get_image_source
(
unsigned
int
image_id
,
...
...
@@ -136,10 +134,6 @@ int bl1_plat_mem_check(uintptr_t mem_base, unsigned int mem_size,
/*******************************************************************************
* Optional BL1 functions (may be overridden)
******************************************************************************/
#if !ERROR_DEPRECATED
void
bl1_init_bl2_mem_layout
(
const
struct
meminfo
*
bl1_mem_layout
,
struct
meminfo
*
bl2_mem_layout
);
#endif
/*
* The following functions are used for image loading process in BL1.
*/
...
...
@@ -169,14 +163,10 @@ int bl1_plat_handle_post_image_load(unsigned int image_id);
* Mandatory BL2 functions
******************************************************************************/
void
bl2_early_platform_setup2
(
u_register_t
arg0
,
u_register_t
arg1
,
u_register_t
arg2
,
u_register_t
arg3
);
#if !ERROR_DEPRECATED
void
bl2_early_platform_setup
(
struct
meminfo
*
mem_layout
);
#endif
void
bl2_plat_arch_setup
(
void
);
void
bl2_platform_setup
(
void
);
struct
meminfo
*
bl2_plat_sec_mem_layout
(
void
);
#if LOAD_IMAGE_V2
/*
* This function can be used by the platforms to update/use image
* information for given `image_id`.
...
...
@@ -184,65 +174,6 @@ struct meminfo *bl2_plat_sec_mem_layout(void);
int
bl2_plat_handle_pre_image_load
(
unsigned
int
image_id
);
int
bl2_plat_handle_post_image_load
(
unsigned
int
image_id
);
#else
/* LOAD_IMAGE_V2 */
/*
* This function returns a pointer to the shared memory that the platform has
* kept aside to pass trusted firmware related information that BL31
* could need
*/
struct
bl31_params
*
bl2_plat_get_bl31_params
(
void
);
/*
* This function returns a pointer to the shared memory that the platform
* has kept to point to entry point information of BL31 to BL2
*/
struct
entry_point_info
*
bl2_plat_get_bl31_ep_info
(
void
);
/*
* This function flushes to main memory all the params that are
* passed to BL31
*/
void
bl2_plat_flush_bl31_params
(
void
);
/*
* The next 2 functions allow the platform to change the entrypoint information
* for the mandatory 3rd level BL images, BL31 and BL33. This is done after
* BL2 has loaded those images into memory but before BL31 is executed.
*/
void
bl2_plat_set_bl31_ep_info
(
struct
image_info
*
image
,
struct
entry_point_info
*
ep
);
void
bl2_plat_set_bl33_ep_info
(
struct
image_info
*
image
,
struct
entry_point_info
*
ep
);
/* Gets the memory layout for BL33 */
void
bl2_plat_get_bl33_meminfo
(
struct
meminfo
*
mem_info
);
/*******************************************************************************
* Conditionally mandatory BL2 functions: must be implemented if SCP_BL2 image
* is supported
******************************************************************************/
/* Gets the memory layout for SCP_BL2 */
void
bl2_plat_get_scp_bl2_meminfo
(
struct
meminfo
*
mem_info
);
/*
* This function is called after loading SCP_BL2 image and it is used to perform
* any platform-specific actions required to handle the SCP firmware.
*/
int
bl2_plat_handle_scp_bl2
(
struct
image_info
*
scp_bl2_image_info
);
/*******************************************************************************
* Conditionally mandatory BL2 functions: must be implemented if BL32 image
* is supported
******************************************************************************/
void
bl2_plat_set_bl32_ep_info
(
struct
image_info
*
image
,
struct
entry_point_info
*
ep
);
/* Gets the memory layout for BL32 */
void
bl2_plat_get_bl32_meminfo
(
struct
meminfo
*
mem_info
);
#endif
/* LOAD_IMAGE_V2 */
/*******************************************************************************
* Optional BL2 functions (may be overridden)
...
...
@@ -283,15 +214,6 @@ int bl2u_plat_handle_scp_bl2u(void);
/*******************************************************************************
* Mandatory BL31 functions
******************************************************************************/
#if !ERROR_DEPRECATED
#if LOAD_IMAGE_V2
void
bl31_early_platform_setup
(
void
*
from_bl2
,
void
*
plat_params_from_bl2
);
#else
void
bl31_early_platform_setup
(
struct
bl31_params
*
from_bl2
,
void
*
plat_params_from_bl2
);
#endif
#endif
/* ERROR_DEPRECATED */
void
bl31_early_platform_setup2
(
u_register_t
arg0
,
u_register_t
arg1
,
u_register_t
arg2
,
u_register_t
arg3
);
void
bl31_plat_arch_setup
(
void
);
...
...
@@ -345,7 +267,6 @@ const struct mmap_region *plat_get_secure_partition_mmap(void *cookie);
const
struct
secure_partition_boot_info
*
plat_get_secure_partition_boot_info
(
void
*
cookie
);
#if LOAD_IMAGE_V2
/*******************************************************************************
* Mandatory BL image load functions(may be overridden).
******************************************************************************/
...
...
@@ -368,36 +289,11 @@ struct bl_params *plat_get_next_bl_params(void);
*/
void
plat_flush_next_bl_params
(
void
);
#endif
/* LOAD_IMAGE_V2 */
#if ENABLE_PLAT_COMPAT
/*
* The below declarations are to enable compatibility for the platform ports
* using the old platform interface.
*/
/*******************************************************************************
* Optional common functions (may be overridden)
******************************************************************************/
unsigned
int
platform_get_core_pos
(
unsigned
long
mpidr
);
/*******************************************************************************
* Mandatory PSCI Compatibility functions (BL31)
******************************************************************************/
int
platform_setup_pm
(
const
plat_pm_ops_t
**
);
unsigned
int
plat_get_aff_count
(
unsigned
int
,
unsigned
long
);
unsigned
int
plat_get_aff_state
(
unsigned
int
,
unsigned
long
);
#else
/* __ENABLE_PLAT_COMPAT__ */
/*
* The below function enable Trusted Firmware components like SPDs which
* haven't migrated to the new platform API to compile on platforms which
* have the compatibility layer disabled.
*/
unsigned
int
platform_core_pos_helper
(
unsigned
long
mpidr
);
unsigned
int
platform_get_core_pos
(
unsigned
long
mpidr
)
__deprecated
;
#endif
/* __ENABLE_PLAT_COMPAT__ */
#endif
/* PLATFORM_H */
include/plat/marvell/a8k/common/board_marvell_def.h
View file @
3ccfcd6e
...
...
@@ -14,9 +14,7 @@
*/
/* Size of cacheable stacks */
#if DEBUG_XLAT_TABLE
# define PLATFORM_STACK_SIZE 0x800
#elif IMAGE_BL1
#if IMAGE_BL1
#if TRUSTED_BOARD_BOOT
# define PLATFORM_STACK_SIZE 0x1000
#else
...
...
include/plat/marvell/a8k/common/plat_marvell.h
View file @
3ccfcd6e
...
...
@@ -24,6 +24,15 @@ extern const mmap_region_t plat_marvell_mmap[];
<= MAX_MMAP_REGIONS, \
assert_max_mmap_regions)
struct
marvell_bl31_params
{
param_header_t
h
;
image_info_t
*
bl31_image_info
;
entry_point_info_t
*
bl32_ep_info
;
image_info_t
*
bl32_image_info
;
entry_point_info_t
*
bl33_ep_info
;
image_info_t
*
bl33_image_info
;
};
/*
* Utility functions common to Marvell standard platforms
*/
...
...
@@ -67,7 +76,7 @@ uint32_t marvell_get_spsr_for_bl32_entry(void);
uint32_t
marvell_get_spsr_for_bl33_entry
(
void
);
/* BL31 utility functions */
void
marvell_bl31_early_platform_setup
(
struct
bl31_params
*
from_bl2
,
void
marvell_bl31_early_platform_setup
(
void
*
from_bl2
,
uintptr_t
soc_fw_config
,
uintptr_t
hw_config
,
void
*
plat_params_from_bl2
);
...
...
lib/aarch64/misc_helpers.S
View file @
3ccfcd6e
...
...
@@ -55,16 +55,6 @@ func smc
smc
#
0
endfunc
smc
/*
-----------------------------------------------------------------------
*
void
zeromem16
(
void
*
mem
,
unsigned
int
length
)
;
*
*
Initialise
a
memory
region
to
0
.
*
The
memory
address
must
be
16
-
byte
aligned
.
*
NOTE
:
This
function
is
deprecated
and
zeromem
should
be
used
instead
.
*
-----------------------------------------------------------------------
*/
.
equ
zeromem16
,
zeromem
/*
-----------------------------------------------------------------------
*
void
zero_normalmem
(
void
*
mem
,
unsigned
int
length
)
;
*
...
...
lib/aarch64/xlat_tables.c
deleted
100644 → 0
View file @
9a983cfe
/*
* Copyright (c) 2014-2016, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
/*
* This file is deprecated and is retained here only for compatibility.
* The xlat_tables library can be found in `lib/xlat_tables` directory.
*/
#if !ERROR_DEPRECATED
#include "../xlat_tables/xlat_tables_common.c"
#include "../xlat_tables/aarch64/xlat_tables.c"
#endif
lib/locks/exclusive/spinlock.S
deleted
100644 → 0
View file @
9a983cfe
/*
*
Copyright
(
c
)
2013
-
2016
,
ARM
Limited
and
Contributors
.
All
rights
reserved
.
*
*
SPDX
-
License
-
Identifier
:
BSD
-
3
-
Clause
*/
#if !ERROR_DEPRECATED
#include "./aarch64/spinlock.S"
#endif
lib/psci/aarch64/psci_helpers.S
View file @
3ccfcd6e
...
...
@@ -12,9 +12,6 @@
.
globl
psci_do_pwrdown_cache_maintenance
.
globl
psci_do_pwrup_cache_maintenance
.
globl
psci_power_down_wfi
#if !ERROR_DEPRECATED
.
globl
psci_entrypoint
#endif
/*
-----------------------------------------------------------------------
*
void
psci_do_pwrdown_cache_maintenance
(
unsigned
int
power
level
)
;
...
...
@@ -131,12 +128,3 @@ func psci_power_down_wfi
wfi
no_ret
plat_panic_handler
endfunc
psci_power_down_wfi
/*
-----------------------------------------------------------------------
*
void
psci_entrypoint
(
void
)
;
*
The
deprecated
entry
point
for
PSCI
on
warm
boot
for
AArch64
.
*
-----------------------------------------------------------------------
*/
func_deprecated
psci_entrypoint
b
bl31_warm_entrypoint
endfunc_deprecated
psci_entrypoint
lib/psci/psci_common.c
View file @
3ccfcd6e
...
...
@@ -938,84 +938,6 @@ int psci_secondaries_brought_up(void)
return
(
n_valid
>
1U
)
?
1
:
0
;
}
#if ENABLE_PLAT_COMPAT
/*******************************************************************************
* PSCI Compatibility helper function to return the 'power_state' parameter of
* the PSCI CPU SUSPEND request for the current CPU. Returns PSCI_INVALID_DATA
* if not invoked within CPU_SUSPEND for the current CPU.
******************************************************************************/
int
psci_get_suspend_powerstate
(
void
)
{
/* Sanity check to verify that CPU is within CPU_SUSPEND */
if
(
psci_get_aff_info_state
()
==
AFF_STATE_ON
&&
!
is_local_state_run
(
psci_get_cpu_local_state
()))
return
psci_power_state_compat
[
plat_my_core_pos
()];
return
PSCI_INVALID_DATA
;
}
/*******************************************************************************
* PSCI Compatibility helper function to return the state id of the current
* cpu encoded in the 'power_state' parameter. Returns PSCI_INVALID_DATA
* if not invoked within CPU_SUSPEND for the current CPU.
******************************************************************************/
int
psci_get_suspend_stateid
(
void
)
{
unsigned
int
power_state
;
power_state
=
psci_get_suspend_powerstate
();
if
(
power_state
!=
PSCI_INVALID_DATA
)
return
psci_get_pstate_id
(
power_state
);
return
PSCI_INVALID_DATA
;
}
/*******************************************************************************
* PSCI Compatibility helper function to return the state id encoded in the
* 'power_state' parameter of the CPU specified by 'mpidr'. Returns
* PSCI_INVALID_DATA if the CPU is not in CPU_SUSPEND.
******************************************************************************/
int
psci_get_suspend_stateid_by_mpidr
(
unsigned
long
mpidr
)
{
int
cpu_idx
=
plat_core_pos_by_mpidr
(
mpidr
);
if
(
cpu_idx
==
-
1
)
return
PSCI_INVALID_DATA
;
/* Sanity check to verify that the CPU is in CPU_SUSPEND */
if
((
psci_get_aff_info_state_by_idx
(
cpu_idx
)
==
AFF_STATE_ON
)
&&
(
!
is_local_state_run
(
psci_get_cpu_local_state_by_idx
(
cpu_idx
))))
return
psci_get_pstate_id
(
psci_power_state_compat
[
cpu_idx
]);
return
PSCI_INVALID_DATA
;
}
/*******************************************************************************
* This function returns highest affinity level which is in OFF
* state. The affinity instance with which the level is associated is
* determined by the caller.
******************************************************************************/
unsigned
int
psci_get_max_phys_off_afflvl
(
void
)
{
psci_power_state_t
state_info
;
zeromem
(
&
state_info
,
sizeof
(
state_info
));
psci_get_target_local_pwr_states
(
PLAT_MAX_PWR_LVL
,
&
state_info
);
return
psci_find_target_suspend_lvl
(
&
state_info
);
}
/*******************************************************************************
* PSCI Compatibility helper function to return target affinity level requested
* for the CPU_SUSPEND. This function assumes affinity levels correspond to
* power domain levels on the platform.
******************************************************************************/
int
psci_get_suspend_afflvl
(
void
)
{
return
psci_get_suspend_pwrlvl
();
}
#endif
/*******************************************************************************
* Initiate power down sequence, by calling power down operations registered for
* this CPU.
...
...
lib/xlat_tables/aarch32/xlat_tables.c
View file @
3ccfcd6e
...
...
@@ -61,22 +61,6 @@ void init_xlat_tables(void)
assert
((
PLAT_PHY_ADDR_SPACE_SIZE
-
1U
)
<=
get_max_supported_pa
());
}
/*******************************************************************************
* Function for enabling the MMU in Secure PL1, assuming that the
* page-tables have already been created.
******************************************************************************/
#if !ERROR_DEPRECATED
void
enable_mmu_secure
(
unsigned
int
flags
)
{
enable_mmu_svc_mon
(
flags
);
}
void
enable_mmu_direct
(
unsigned
int
flags
)
{
enable_mmu_direct_svc_mon
(
flags
);
}
#endif
void
enable_mmu_svc_mon
(
unsigned
int
flags
)
{
unsigned
int
mair0
,
ttbcr
,
sctlr
;
...
...
lib/xlat_tables/xlat_tables_private.h
View file @
3ccfcd6e
...
...
@@ -15,23 +15,6 @@
#error xlat tables v2 must be used with HW_ASSISTED_COHERENCY
#endif
/*
* If the platform hasn't defined a physical and a virtual address space size
* default to ADDR_SPACE_SIZE.
*/
#if ERROR_DEPRECATED
# ifdef ADDR_SPACE_SIZE
# error "ADDR_SPACE_SIZE is deprecated. Use PLAT_xxx_ADDR_SPACE_SIZE instead."
# endif
#elif defined(ADDR_SPACE_SIZE)
# ifndef PLAT_PHY_ADDR_SPACE_SIZE
# define PLAT_PHY_ADDR_SPACE_SIZE ADDR_SPACE_SIZE
# endif
# ifndef PLAT_VIRT_ADDR_SPACE_SIZE
# define PLAT_VIRT_ADDR_SPACE_SIZE ADDR_SPACE_SIZE
# endif
#endif
CASSERT
(
CHECK_VIRT_ADDR_SPACE_SIZE
(
PLAT_VIRT_ADDR_SPACE_SIZE
),
assert_valid_virt_addr_space_size
);
...
...
lib/xlat_tables_v2/xlat_tables_context.c
View file @
3ccfcd6e
...
...
@@ -18,24 +18,6 @@
*/
uint64_t
mmu_cfg_params
[
MMU_CFG_PARAM_MAX
];
/*
* Each platform can define the size of its physical and virtual address spaces.
* If the platform hasn't defined one or both of them, default to
* ADDR_SPACE_SIZE. The latter is deprecated, though.
*/
#if ERROR_DEPRECATED
# ifdef ADDR_SPACE_SIZE
# error "ADDR_SPACE_SIZE is deprecated. Use PLAT_xxx_ADDR_SPACE_SIZE instead."
# endif
#elif defined(ADDR_SPACE_SIZE)
# ifndef PLAT_PHY_ADDR_SPACE_SIZE
# define PLAT_PHY_ADDR_SPACE_SIZE ADDR_SPACE_SIZE
# endif
# ifndef PLAT_VIRT_ADDR_SPACE_SIZE
# define PLAT_VIRT_ADDR_SPACE_SIZE ADDR_SPACE_SIZE
# endif
#endif
/*
* Allocate and initialise the default translation context for the BL image
* currently executing.
...
...
@@ -121,18 +103,6 @@ int xlat_change_mem_attributes(uintptr_t base_va, size_t size, uint32_t attr)
#ifdef AARCH32
#if !ERROR_DEPRECATED
void
enable_mmu_secure
(
unsigned
int
flags
)
{
enable_mmu_svc_mon
(
flags
);
}
void
enable_mmu_direct
(
unsigned
int
flags
)
{
enable_mmu_direct_svc_mon
(
flags
);
}
#endif
void
enable_mmu_svc_mon
(
unsigned
int
flags
)
{
setup_mmu_cfg
((
uint64_t
*
)
&
mmu_cfg_params
,
flags
,
...
...
make_helpers/defaults.mk
View file @
3ccfcd6e
...
...
@@ -23,10 +23,6 @@ ARCH := aarch64
ARM_ARCH_MAJOR
:=
8
ARM_ARCH_MINOR
:=
0
# Determine the version of ARM GIC architecture to use for interrupt management
# in EL3. The platform port can change this value if needed.
ARM_GIC_ARCH
:=
2
# Base commit to perform code check on
BASE_COMMIT
:=
origin/master
...
...
@@ -116,9 +112,6 @@ HW_ASSISTED_COHERENCY := 0
# Set the default algorithm for the generation of Trusted Board Boot keys
KEY_ALG
:=
rsa
# Flag to enable new version of image loading
LOAD_IMAGE_V2
:=
0
# Enable use of the console API allowing multiple consoles to be registered
# at the same time.
MULTI_CONSOLE_API
:=
0
...
...
@@ -169,14 +162,14 @@ SPIN_ON_BL1_EXIT := 0
# Flags to build TF with Trusted Boot support
TRUSTED_BOARD_BOOT
:=
0
# Build option to choose whether Trusted
f
irmware uses Coherent memory or not.
# Build option to choose whether Trusted
F
irmware uses Coherent memory or not.
USE_COHERENT_MEM
:=
1
# Build option to choose wheter Trusted
f
irmware uses library at ROM
USE_ROMLIB
:=
0
# Build option to choose whet
h
er Trusted
F
irmware uses library at ROM
USE_ROMLIB
:=
0
# Use tbbr_oid.h instead of platform_oid.h
USE_TBBR_DEFS
=
$(ERROR_DEPRECATED)
USE_TBBR_DEFS
:
=
1
# Build verbosity
V
:=
0
...
...
Prev
1
2
3
4
5
6
7
8
…
11
Next
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment