Skip to content
GitLab
Menu
Projects
Groups
Snippets
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
Menu
Open sidebar
adam.huang
Arm Trusted Firmware
Commits
8013bb57
Unverified
Commit
8013bb57
authored
Jan 16, 2019
by
Antonio Niño Díaz
Committed by
GitHub
Jan 16, 2019
Browse files
Merge pull request #1758 from pbeesley-arm/pb/spelling
Correct typographical errors
parents
9f0f203d
8aabea33
Changes
28
Hide whitespace changes
Inline
Side-by-side
bl31/bl31.ld.S
View file @
8013bb57
/*
*
Copyright
(
c
)
2013
-
201
8
,
ARM
Limited
and
Contributors
.
All
rights
reserved
.
*
Copyright
(
c
)
2013
-
201
9
,
ARM
Limited
and
Contributors
.
All
rights
reserved
.
*
*
SPDX
-
License
-
Identifier
:
BSD
-
3
-
Clause
*/
...
...
@@ -240,7 +240,7 @@ SECTIONS
*
Time
-
stamps
are
stored
in
normal
.
bss
memory
*
*
The
compiler
will
allocate
enough
memory
for
one
CPU
's time-stamps,
*
the
remaining
memory
for
other
CPU
'
s is allocated by the
*
the
remaining
memory
for
other
CPUs
is
allocated
by
the
*
linker
script
*/
.
=
ALIGN
(
CACHE_WRITEBACK_GRANULE
)
;
...
...
bl31/bl31_main.c
View file @
8013bb57
/*
* Copyright (c) 2013-201
8
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2013-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -68,7 +68,7 @@ void __init bl31_lib_init(void)
* before passing control to the bootloader or an Operating System. This
* function calls runtime_svc_init() which initializes all registered runtime
* services. The run time services would setup enough context for the core to
* sw
t
ich to the next exception level. When this function returns, the core will
* swi
t
ch to the next exception level. When this function returns, the core will
* switch to the programmed exception level via. an ERET.
******************************************************************************/
void
bl31_main
(
void
)
...
...
@@ -96,13 +96,13 @@ void bl31_main(void)
* decide which is the next image (BL32 or BL33) and how to execute it.
* If the SPD runtime service is present, it would want to pass control
* to BL32 first in S-EL1. In that case, SPD would have registered a
* function to intialize bl32 where it takes responsibility of entering
* function to in
i
tialize bl32 where it takes responsibility of entering
* S-EL1 and returning control back to bl31_main. Once this is done we
* can prepare entry into BL33 as normal.
*/
/*
* If SPD had registerd an init hook, invoke it.
* If SPD had register
e
d an init hook, invoke it.
*/
if
(
bl32_init
!=
NULL
)
{
INFO
(
"BL31: Initializing BL32
\n
"
);
...
...
bl32/sp_min/sp_min.ld.S
View file @
8013bb57
/*
*
Copyright
(
c
)
2016
-
201
8
,
ARM
Limited
and
Contributors
.
All
rights
reserved
.
*
Copyright
(
c
)
2016
-
201
9
,
ARM
Limited
and
Contributors
.
All
rights
reserved
.
*
*
SPDX
-
License
-
Identifier
:
BSD
-
3
-
Clause
*/
...
...
@@ -167,7 +167,7 @@ SECTIONS
*
Time
-
stamps
are
stored
in
normal
.
bss
memory
*
*
The
compiler
will
allocate
enough
memory
for
one
CPU
's time-stamps,
*
the
remaining
memory
for
other
CPU
'
s is allocated by the
*
the
remaining
memory
for
other
CPUs
is
allocated
by
the
*
linker
script
*/
.
=
ALIGN
(
CACHE_WRITEBACK_GRANULE
)
;
...
...
bl32/sp_min/sp_min_main.c
View file @
8013bb57
/*
* Copyright (c) 2016-201
8
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2016-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -35,7 +35,7 @@ static void *sp_min_cpu_ctx_ptr[PLATFORM_CORE_COUNT];
static
smc_ctx_t
sp_min_smc_context
[
PLATFORM_CORE_COUNT
];
/******************************************************************************
* Define the smccc helper library API
'
s
* Define the smccc helper library APIs
*****************************************************************************/
void
*
smc_get_ctx
(
unsigned
int
security_state
)
{
...
...
bl32/tsp/tsp_main.c
View file @
8013bb57
/*
* Copyright (c) 2013-201
7
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2013-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -362,7 +362,7 @@ tsp_args_t *tsp_smc_handler(uint64_t func,
/*
* Request a service back from dispatcher/secure monitor. This call
* return and thereafter resume exec
t
uion
* return and thereafter resume execu
t
ion
*/
tsp_get_magic
(
service_args
);
...
...
@@ -395,7 +395,7 @@ tsp_args_t *tsp_smc_handler(uint64_t func,
}
/*******************************************************************************
* TSP smc abort handler. This function is called when aborting a preem
t
ped
* TSP smc abort handler. This function is called when aborting a preemp
t
ed
* yielding SMC request. It should cleanup all resources owned by the SMC
* handler such as locks or dynamically allocated memory so following SMC
* request are executed in a clean environment.
...
...
bl32/tsp/tsp_timer.c
View file @
8013bb57
/*
* Copyright (c) 2014-201
5
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2014-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -80,7 +80,7 @@ void tsp_generic_timer_save(void)
}
/*******************************************************************************
* This function restores the timer context post cpu resum
m
ption
* This function restores the timer context post cpu resumption
******************************************************************************/
void
tsp_generic_timer_restore
(
void
)
{
...
...
common/backtrace/backtrace.c
View file @
8013bb57
/*
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2018
-2019
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -231,7 +231,7 @@ static void unwind_stack(struct frame_record *fr, uintptr_t current_pc,
* Usage of the trace: addr2line can be used to map the addresses to function
* and source code location when given the ELF file compiled with debug
* information. The "-i" flag is highly recommended to improve display of
* inlined function. The *.dump files generated when buildi
d
ng each image can
* inlined function. The *.dump files generated when building each image can
* also be used.
*
* WARNING: In case of corrupted stack, this function could display security
...
...
docs/auth-framework.rst
View file @
8013bb57
...
...
@@ -160,7 +160,7 @@ These components are responsible for initiating the authentication process for a
particular image in BL1 or BL2. For each BL image that requires authentication,
the Generic code asks recursively the Authentication module what is the parent
image until either an authenticated image or the ROT is reached. Then the
Generic code calls the IO framewo
t
k to load the image and calls the
Generic code calls the IO framewo
r
k to load the image and calls the
Authentication module to authenticate it, following the CoT from ROT to Image.
TF-A Platform Port (PP)
...
...
@@ -422,7 +422,7 @@ An IPL for each type must be registered using the following macro:
- ``_name``: a string containing the IPL name for debugging purposes.
- ``_init``: initialization function pointer.
- ``_check_int``: check image integrity function pointer.
- ``_get_param``: extract authentication parameter funcion pointer.
- ``_get_param``: extract authentication parameter func
t
ion pointer.
The ``init()`` function will be used to initialize the IPL.
...
...
@@ -925,7 +925,7 @@ three functions:
The mbedTLS library algorithm support is configured by the
``TF_MBEDTLS_KEY_ALG`` variable which can take in 3 values: `rsa`, `ecdsa` or
`rsa+ecdsa`. This variable allows the Makefile to include the corresponding
sources in the build for the various algorthms. Setting the variable to
sources in the build for the various algor
i
thms. Setting the variable to
`rsa+ecdsa` enables support for both rsa and ecdsa algorithms in the mbedTLS
library.
...
...
docs/change-log.rst
View file @
8013bb57
...
...
@@ -10,7 +10,7 @@ Trusted Firmware-A - version 2.0
New Features
------------
- Removal of a number of deprecated API
'
s
- Removal of a number of deprecated APIs
- A new Platform Compatibility Policy document has been created which
references a wiki page that maintains a listing of deprecated
...
...
@@ -20,7 +20,7 @@ New Features
from the code base.
- Various Arm and partner platforms have been updated to remove the use of
removed API
'
s in this release.
removed APIs in this release.
- This release is otherwise unchanged from 1.6 release
...
...
@@ -130,7 +130,7 @@ New Features
the clang linker is not used because it is unable to link TF-A objects
due to immaturity of clang linker functionality at this time.
- Refactor support API
'
s into Libraries
- Refactor support APIs into Libraries
- Evolve libfdt, mbed TLS library and standard C library sources as
proper libraries that TF-A may be linked against.
...
...
@@ -435,7 +435,7 @@ New features
- Introduced APIs to get and set the memory attributes of a region.
- Added support to manage both privile
d
ge levels in translation regimes that
- Added support to manage both privilege levels in translation regimes that
describe translations for 2 Exception levels, specifically the EL1&0
translation regime, and extended the memory map region attributes to
include specifying Non-privileged access.
...
...
@@ -683,7 +683,7 @@ New features
- Enhancements to Firmware Update feature:
- The FWU logic now checks for overlapping images to prevent execution of
unauthenticated arbitary code.
unauthenticated arbit
r
ary code.
- Introduced new FWU_SMC_IMAGE_RESET SMC that changes the image loading
state machine to go from COPYING, COPIED or AUTHENTICATED states to
...
...
@@ -855,7 +855,7 @@ New features
- Essential control registers are fully initialised on EL3 start-up, when
initialising the non-secure and secure context structures and when
preparing to leave EL3 for a lower EL. This gives better align
e
ment with
preparing to leave EL3 for a lower EL. This gives better alignment with
the Arm ARM which states that software must initialise RES0 and RES1
fields with 0 / 1.
...
...
@@ -1345,7 +1345,7 @@ New features
- It is now possible to specify the name of the FIP at build time by defining
the ``FIP_NAME`` variable.
- Issues with depedencies on the 'fiptool' makefile target have been
- Issues with depe
n
dencies on the 'fiptool' makefile target have been
rectified. The ``fip_create`` tool is now rebuilt whenever its source files
change.
...
...
@@ -1376,7 +1376,7 @@ New features
the secure world. This can be done by setting the build flag
``FVP_TSP_RAM_LOCATION`` to the value ``dram``.
- Separate transation tables are created for each boot loader image. The
- Separate trans
l
ation tables are created for each boot loader image. The
``IMAGE_BLx`` build options are used to do this. This allows each stage to
create mappings only for areas in the memory map that it needs.
...
...
@@ -1530,7 +1530,7 @@ New features
- Clarified the platform porting interface to the TSP.
- Reworked the TSPD setup code to support the alternate BL3-2
intialization flow where BL3-1 generic code hands control to BL3-2,
in
i
tialization flow where BL3-1 generic code hands control to BL3-2,
rather than expecting the TSPD to hand control directly to BL3-2.
- Considerable rework to PSCI generic code to support CPU specific
...
...
@@ -1569,7 +1569,7 @@ Issues resolved since last release
- Removed the concept of top/bottom image loading. The image loader now
automatically detects the position of the image inside the current memory
layout and updates the layout to minimize frag
e
mentation. This resolves the
layout and updates the layout to minimize fragmentation. This resolves the
image loader limitations of previously releases. There are currently no
plans to support dynamic image loading.
...
...
docs/firmware-design.rst
View file @
8013bb57
...
...
@@ -203,7 +203,7 @@ BL1 performs minimal architectural initialization as follows.
The ``plat_report_exception()`` implementation on the Arm FVP port programs
the Versatile Express System LED register in the following format to
indicate the occurence of an unexpected exception:
indicate the occur
r
ence of an unexpected exception:
::
...
...
@@ -1991,7 +1991,7 @@ Coherent memory usage in PSCI implementation
The ``psci_non_cpu_pd_nodes`` data structure stores the platform'
s
power
domain
tree
information
for
state
management
of
power
domains
.
By
default
,
this
data
structure
is
allocated
in
the
coherent
memory
region
in
TF
-
A
because
it
can
be
accessed
by
multple
CPUs
,
either
with
caches
enabled
or
disabled
.
accessed
by
mult
i
ple
CPUs
,
either
with
caches
enabled
or
disabled
.
..
code
::
c
...
...
@@ -2031,7 +2031,7 @@ cache lines after these fields are written.
The
field
``
local_state
``
can
be
concurrently
accessed
by
multiple
CPUs
in
different
cache
states
.
A
Lamport
's Bakery lock ``psci_locks`` is used to ensure
mutual exlusion to this field and a clean and invalidate is needed after it
mutual ex
c
lusion to this field and a clean and invalidate is needed after it
is written.
Bakery lock data
...
...
@@ -2225,7 +2225,7 @@ appropriately map the code region as executable and the read-only data as
execute-never.
This has an impact on memory footprint, as padding bytes need to be introduced
between the code and read-only data to ensure the segr
a
gation of the two. To
between the code and read-only data to ensure the segr
e
gation of the two. To
limit the memory cost, this flag also changes the memory layout such that the
code and exception vectors are now contiguous, like so:
...
...
@@ -2352,12 +2352,12 @@ has finished and be used for runtime data.
The
build
option
``
RECLAIM_INIT_CODE
``
can
be
set
to
mark
this
boot
time
code
with
a
``.
text
.
init
.*``
attribute
which
can
be
filtered
and
placed
suitably
within
the
BL
image
for
later
recla
i
mation
by
the
platform
.
The
platform
can
specify
the
fiter
and
the
memory
region
for
this
init
section
in
BL31
via
the
within
the
BL
image
for
later
reclamation
by
the
platform
.
The
platform
can
specify
the
fi
l
ter
and
the
memory
region
for
this
init
section
in
BL31
via
the
plat
.
ld
.
S
linker
script
.
For
example
,
on
the
FVP
,
this
section
is
placed
overlapping
the
secondary
CPU
stacks
so
that
after
the
cold
boot
is
done
,
this
memory
can
be
reclaimed
for
the
stacks
.
The
init
memory
section
is
initially
mapped
with
``
RO
``,
``
EXECUTE
``
attributes
.
After
BL31
initilization
has
mapped
with
``
RO
``,
``
EXECUTE
``
attributes
.
After
BL31
initi
a
lization
has
completed
,
the
FVP
changes
the
attributes
of
this
section
to
``
RW
``,
``
EXECUTE_NEVER
``
allowing
it
to
be
used
for
runtime
data
.
The
memory
attributes
are
changed
within
the
``
bl31_plat_runtime_setup
``
platform
hook
.
The
init
...
...
@@ -2553,7 +2553,7 @@ extension is mandatory to support the TF-A bootloader and runtime services.
Platform
implementing
an
Armv7
-
A
system
can
to
define
from
its
target
Cortex
-
A
architecture
through
``
ARM_CORTEX_A
<
X
>
=
yes
``
in
their
``
plaform
.
mk
``
script
.
For
example
``
ARM_CORTEX_A15
=
yes
``
for
a
``
pla
t
form
.
mk
``
script
.
For
example
``
ARM_CORTEX_A15
=
yes
``
for
a
Cortex
-
A15
target
.
Platform
can
also
set
``
ARM_WITH_NEON
=
yes
``
to
enable
neon
support
.
...
...
docs/firmware-update.rst
View file @
8013bb57
...
...
@@ -266,14 +266,14 @@ FWU\_SMC\_IMAGE\_AUTH
if (image_id is invalid) return -EPERM
if (secure world caller)
if (image_id state is not RESET) return -EPERM
if (image_addr/image_size is not mapp
p
ed into BL1) return -ENOMEM
if (image_addr/image_size is not mapped into BL1) return -ENOMEM
else // normal world caller
if (image_id is secure image)
if (image_id state is not COPIED) return -EPERM
else // image_id is non-secure image
if (image_id state is not RESET) return -EPERM
if (image_addr/image_size is in secure memory) return -ENOMEM
if (image_addr/image_size not mapp
p
ed into BL1) return -ENOMEM
if (image_addr/image_size not mapped into BL1) return -ENOMEM
This SMC authenticates the image specified by ``image_id``. If the image is in the
RESET state, BL1 authenticates the image in place using the provided
...
...
docs/porting-guide.rst
View file @
8013bb57
...
...
@@ -390,7 +390,7 @@ also be defined:
- **#define : SCP\_BL2\_IMAGE\_ID**
SCP\_BL2 image identifier, used by BL2 to load SCP\_BL2 into secure memory
from platform storage before being transfered to the SCP.
from platform storage before being transfer
r
ed to the SCP.
- **#define : SCP\_FW\_KEY\_CERT\_ID**
...
...
@@ -439,9 +439,9 @@ platform, the following constants must also be defined:
- **#define : TSP\_SEC\_MEM\_SIZE**
Defines the size of the secure memory used by the BL32 image on the
platform. ``TSP_SEC_MEM_BASE`` and ``TSP_SEC_MEM_SIZE`` must fully
accomodate
the memory required by the BL32 image, defined by ``BL32_BASE``
and
``BL32_LIMIT``.
platform. ``TSP_SEC_MEM_BASE`` and ``TSP_SEC_MEM_SIZE`` must fully
accommodate
the memory required by the BL32 image, defined by ``BL32_BASE``
and
``BL32_LIMIT``.
- **#define : TSP\_IRQ\_SEC\_PHY\_TIMER**
...
...
@@ -821,11 +821,11 @@ Function : plat\_my\_core\_pos()
Argument : void
Return : unsigned int
This funtion returns the index of the calling CPU which is used as a
This fun
c
tion returns the index of the calling CPU which is used as a
CPU-specific linear index into blocks of memory (for example while allocating
per-CPU stacks). This function will be invoked very early in the
initialization sequence which mandates that this function should be
implemented in assembly and should not rely on the avalability of a C
implemented in assembly and should not rely on the ava
i
lability of a C
runtime environment. This function can clobber x0 - x8 and must preserve
x9 - x29.
...
...
@@ -929,7 +929,7 @@ Function : plat\_reset\_handler()
A platform may need to do additional initialization after reset. This function
allows the platform to do the platform specific intializations. Platform
specific errata workarounds could also be implemented here. The
api
should
specific errata workarounds could also be implemented here. The
API
should
preserve the values of callee saved registers x19 to x29.
The default implementation doesn't do anything. If a platform needs to override
...
...
@@ -1543,7 +1543,7 @@ The AP Firmware Updater Configuration, BL2U, is an optional part of the FWU
process and is executed only by the primary CPU. BL1 passes control to BL2U at
``BL2U_BASE``. BL2U executes in Secure-EL1 and is responsible for:
#. (Optional) Transfering the optional SCP\_BL2U binary image from AP secure
#. (Optional) Transfer
r
ing the optional SCP\_BL2U binary image from AP secure
memory to SCP RAM. BL2U uses the SCP\_BL2U ``image_info`` passed by BL1.
``SCP_BL2U_BASE`` defines the address in AP secure memory where SCP\_BL2U
should be copied from. Subsequent handling of the SCP\_BL2U image is
...
...
@@ -1649,7 +1649,7 @@ CPUs. BL31 executes at EL3 and is responsible for:
implementation.
#. Optionally passing control to the BL32 image, pre-loaded at a platform-
specific address by BL2. BL31 exports a set of
api
s that allow runtime
specific address by BL2. BL31 exports a set of
API
s that allow runtime
services to specify the security state in which the next image should be
executed and run the corresponding image. On ARM platforms, BL31 uses the
``bl_params`` list populated by BL2 in memory to do this.
...
...
@@ -1800,7 +1800,7 @@ defined by the translation library, and can be found in the file
``include/lib/xlat_tables/xlat_mmu_helpers.h``.
On DynamIQ systems, this function must not use stack while enabling MMU, which
is how the function in xlat table library version 2 is implement
at
ed.
is how the function in xlat table library version 2 is implemented.
Function : plat\_get\_syscnt\_freq2() [mandatory]
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
...
...
@@ -2030,7 +2030,7 @@ Function : plat\_get\_power\_domain\_tree\_desc() [mandatory]
This function returns a pointer to the byte array containing the power domain
topology tree description. The format and method to construct this array are
described in `Power Domain Topology Design`_. The BL31 PSCI initilization code
described in `Power Domain Topology Design`_. The BL31 PSCI initi
a
lization code
requires this array to be described by the platform, either statically or
dynamically, to initialize the power domain topology tree. In case the array
is populated dynamically, then plat\_core\_pos\_by\_mpidr() and
...
...
@@ -2070,7 +2070,7 @@ plat\_psci\_ops.cpu\_standby()
Perform the platform-specific actions to enter the standby state for a cpu
indicated by the passed argument. This provides a fast path for CPU standby
wherein overheads of PSCI state management and lock acquistion is avoided.
wherein overheads of PSCI state management and lock acquis
i
tion is avoided.
For this handler to be invoked by the PSCI ``CPU_SUSPEND`` API implementation,
the suspend state type specified in the ``power-state`` parameter should be
STANDBY and the target power domain level specified should be the CPU. The
...
...
@@ -2345,7 +2345,7 @@ state or EL3/S-EL1 in the secure state. The design of this framework is
described in the `IMF Design Guide`_
A platform should export the following APIs to support the IMF. The following
text briefly describes each
api
and its implementation in Arm standard
text briefly describes each
API
and its implementation in Arm standard
platforms. The API implementation depends upon the type of interrupt controller
present in the platform. Arm standard platform layer supports both
`Arm Generic Interrupt Controller version 2.0 (GICv2)`_
...
...
@@ -2552,7 +2552,7 @@ Crash Reporting mechanism (in BL31)
BL31 implements a crash reporting mechanism which prints the various registers
of the CPU to enable quick crash analysis and debugging. This mechanism relies
on the platform implement
at
ing ``plat_crash_console_init``,
on the platform implementing ``plat_crash_console_init``,
``plat_crash_console_putc`` and ``plat_crash_console_flush``.
The file ``plat/common/aarch64/crash_console_helpers.S`` contains sample
...
...
docs/psci-lib-integration-guide.rst
View file @
8013bb57
...
...
@@ -240,7 +240,7 @@ As explained in `Secure payload power management callback`_,
the EL3 Runtime Software may want to perform some bookkeeping during power
management operations. This function is used to register the ``spd_pm_ops_t``
(first argument) callbacks with the PSCI library which will be called
ppropriately during power management. Calling this function is optional and
a
ppropriately during power management. Calling this function is optional and
need to be called by the primary CPU during the cold boot sequence after
``psci_setup()`` has completed.
...
...
docs/ras.rst
View file @
8013bb57
...
...
@@ -203,8 +203,8 @@ doesn't return.
Engaging the RAS framework
--------------------------
Enabling RAS support is a platform choice con
junctional of
three distinct but
related build options:
Enabling RAS support is a platform choice con
structed from
three distinct
,
but
related
,
build options:
- ``RAS_EXTENSION=1`` includes the RAS framework in the run time firmware;
...
...
@@ -244,7 +244,7 @@ allocate the highest secure priority for RAS handling.
.. __: exception-handling.rst#partitioning-priority-levels
Handling of both `interr
r
upt`__ and `non-interrupt`__ exceptions follow the
Handling of both `interrupt`__ and `non-interrupt`__ exceptions follow the
sequences outlined in the |EHF| documentation. I.e., for interrupts, the
priority management is implicit; but for non-interrupt exceptions, they're
explicit using `EHF APIs`__.
...
...
docs/secure-partition-manager-design.rst
View file @
8013bb57
...
...
@@ -309,7 +309,7 @@ SPM to delegate service requests to the Secure Partition. The interface also
allows the Secure Partition to:
- Register with the SPM a service that it provides.
- Indicate completion of a service request del
a
gated by the SPM
- Indicate completion of a service request del
e
gated by the SPM
Miscellaneous interfaces
------------------------
...
...
docs/user-guide.rst
View file @
8013bb57
...
...
@@ -108,7 +108,7 @@ Building TF-A
``
CC
``
needs
to
point
to
the
clang
or
armclang
binary
,
which
will
also
select
the
clang
or
armclang
assembler
.
Be
aware
that
the
GNU
linker
is
used
by
default
.
In
case
of
being
needed
the
linker
can
be
overriden
using
the
``
LD
``
variable
.
Clang
linker
version
6
is
can
be
overrid
d
en
using
the
``
LD
``
variable
.
Clang
linker
version
6
is
known
to
work
with
TF
-
A
.
In
both
cases
``
CROSS_COMPILE
``
should
be
set
as
described
above
.
...
...
@@ -357,8 +357,8 @@ Common build options
supports
the
format
used
by
GCC
when
T32
interworking
is
disabled
.
For
this
reason
enabling
this
option
in
AArch32
will
force
the
compiler
to
only
generate
A32
code
.
This
option
is
enabled
by
default
only
in
AArch64
debug
builds
,
but
this
behaviour
can
be
overriden
in
each
platform
's Makefile or
in
the build command line.
builds
,
but
this
behaviour
can
be
overrid
d
en
in
each
platform
's Makefile or
in
the build command line.
- ``ENABLE_MPAM_FOR_LOWER_ELS``: Boolean option to enable lower ELs to use MPAM
feature. MPAM is an optional Armv8.4 extension that enables various memory
...
...
@@ -428,7 +428,7 @@ Common build options
handled
at
EL3
,
and
a
panic
will
result
.
This
is
supported
only
for
AArch64
builds
.
-
``
FAULT_INJECTION_SUPPORT
``:
ARMv8
.4
exte
r
nsions
introduced
support
for
fault
-
``
FAULT_INJECTION_SUPPORT
``:
ARMv8
.4
extensions
introduced
support
for
fault
injection
from
lower
ELs
,
and
this
build
option
enables
lower
ELs
to
use
Error
Records
accessed
via
System
Registers
to
inject
faults
.
This
is
applicable
only
to
AArch64
builds
.
...
...
drivers/arm/ccn/ccn.c
View file @
8013bb57
/*
* Copyright (c) 2015-201
8
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2015-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -370,7 +370,7 @@ void ccn_exit_dvm_domain(unsigned long long master_iface_map)
* system. The state is expected to be one of NO_L3, SF_ONLY, L3_HAM or
* L3_FAM. Instead of comparing the states reported by all HN-Fs, the state of
* the first present HN-F node is reported. Since the driver does not export an
* interface to program them sep
e
rately, there is no reason to perform this
* interface to program them sep
a
rately, there is no reason to perform this
* check. An HN-F could report that the L3 cache is transitioning from one mode
* to another e.g. HNF_PM_NOL3_2_SFONLY. In this case, the function waits for
* the transition to complete and reports the final state.
...
...
@@ -383,7 +383,7 @@ unsigned int ccn_get_l3_run_mode(void)
assert
(
ccn_plat_desc
->
periphbase
);
/*
* Wait for a L3 cache par
i
tition to enter any run mode. The pstate
* Wait for a L3 cache partition to enter any run mode. The pstate
* parameter is read from an HN-F P-state status register. A non-zero
* value in bits[1:0] means that the cache is transitioning to a run
* mode.
...
...
@@ -428,7 +428,7 @@ void ccn_set_l3_run_mode(unsigned int mode)
region_id
=
HNF_REGION_ID_START
;
FOR_EACH_PRESENT_REGION_ID
(
region_id
,
mn_hnf_id_map
)
{
/*
* Wait for a L3 cache par
i
tition to enter a target run
* Wait for a L3 cache partition to enter a target run
* mode. The pstate parameter is read from an HN-F P-state
* status register.
*/
...
...
@@ -584,7 +584,7 @@ void ccn_write_node_reg(node_types_t node_type, unsigned int node_id,
return
;
}
/* Setting the value of Auxilary Control Register of the Node */
/* Setting the value of Auxil
i
ary Control Register of the Node */
ccn_reg_write
(
ccn_plat_desc
->
periphbase
,
region_id
,
reg_offset
,
val
);
VERBOSE
(
"Value is successfully written at address 0x%lx.
\n
"
,
(
ccn_plat_desc
->
periphbase
...
...
@@ -611,7 +611,7 @@ unsigned long long ccn_read_node_reg(node_types_t node_type,
return
ULL
(
0
);
}
/* Setting the value of Auxilary Control Register of the Node */
/* Setting the value of Auxil
i
ary Control Register of the Node */
val
=
ccn_reg_read
(
ccn_plat_desc
->
periphbase
,
region_id
,
reg_offset
);
VERBOSE
(
"Value is successfully read from address 0x%lx.
\n
"
,
(
ccn_plat_desc
->
periphbase
...
...
drivers/partition/partition.c
View file @
8013bb57
/*
* Copyright (c) 2016-201
8
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2016-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -75,7 +75,7 @@ static int load_mbr_header(uintptr_t image_handle, mbr_entry_t *mbr_entry)
/*
* Load GPT header and check the GPT signature.
* If partiton numbers could be found, check & update it.
* If partit
i
on numbers could be found, check & update it.
*/
static
int
load_gpt_header
(
uintptr_t
image_handle
)
{
...
...
lib/aarch32/arm32_aeabi_divmod.c
View file @
8013bb57
/*
* Copyright (c) 2017, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2017
-2019
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -18,12 +18,12 @@
* unsigned denominator);
*/
/* struct qr - stores qutient/remainder to handle divmod EABI interfaces. */
/* struct qr - stores qu
o
tient/remainder to handle divmod EABI interfaces. */
struct
qr
{
unsigned
int
q
;
/* computed quotient */
unsigned
int
r
;
/* computed remainder */
unsigned
int
q_n
;
/* specf
ic
ies if quotient shall be negative */
unsigned
int
r_n
;
/* specf
ic
ies if remainder shall be negative */
unsigned
int
q_n
;
/* spec
i
fies if quotient shall be negative */
unsigned
int
r_n
;
/* spec
i
fies if remainder shall be negative */
};
static
void
uint_div_qr
(
unsigned
int
numerator
,
unsigned
int
denominator
,
...
...
lib/el3_runtime/aarch64/context_mgmt.c
View file @
8013bb57
/*
* Copyright (c) 2013-201
8
, ARM Limited and Contributors. All rights reserved.
* Copyright (c) 2013-201
9
, ARM Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
...
...
@@ -55,7 +55,7 @@ void __init cm_init(void)
* The security state to initialize is determined by the SECURE attribute
* of the entry_point_info.
*
* The EE and ST attributes are used to configure the endianess and secure
* The EE and ST attributes are used to configure the endian
n
ess and secure
* timer availability for the new execution context.
*
* To prepare the register state for entry call cm_prepare_el3_exit() and
...
...
@@ -124,7 +124,7 @@ void cm_setup_context(cpu_context_t *ctx, const entry_point_info_t *ep)
#ifdef IMAGE_BL31
/*
* SCR_EL3.IRQ, SCR_EL3.FIQ: Enable the physical FIQ and IRQ rou
n
ting as
* SCR_EL3.IRQ, SCR_EL3.FIQ: Enable the physical FIQ and IRQ routing as
* indicated by the interrupt routing model for BL31.
*/
scr_el3
|=
get_scr_el3_from_routing_model
(
security_state
);
...
...
@@ -175,7 +175,7 @@ void cm_setup_context(cpu_context_t *ctx, const entry_point_info_t *ep)
/*
* Store the initialised SCTLR_EL1 value in the cpu_context - SCTLR_EL2
* and other EL2 registers are set up by cm_pre
a
pre_ns_entry() as they
* and other EL2 registers are set up by cm_prep
a
re_ns_entry() as they
* are not part of the stored cpu_context.
*/
write_ctx_reg
(
get_sysregs_ctx
(
ctx
),
CTX_SCTLR_EL1
,
sctlr_elx
);
...
...
@@ -350,7 +350,7 @@ void cm_prepare_el3_exit(uint32_t security_state)
|
CPTR_EL2_TFP_BIT
));
/*
* Initili
a
se CNTHCTL_EL2. All fields are
* Initi
a
lise CNTHCTL_EL2. All fields are
* architecturally UNKNOWN on reset and are set to zero
* except for field(s) listed below.
*
...
...
Prev
1
2
Next
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment