1. 18 Feb, 2020 1 commit
    • Alexei Fedorov's avatar
      FVP: Fix BL31 load address and image size for RESET_TO_BL31=1 · 6227cca9
      Alexei Fedorov authored
      
      
      When TF-A is built with RESET_TO_BL31=1 option, BL31 is the
      first image to be run and should have all the memory allocated
      to it except for the memory reserved for Shared RAM at the start
      of Trusted SRAM.
      This patch fixes FVP BL31 load address and its image size for
      RESET_TO_BL31=1 option. BL31 startup address should be set to
      0x400_1000 and its maximum image size to the size of Trusted SRAM
      minus the first 4KB of shared memory.
      Loading BL31 at 0x0402_0000 as it is currently stated in
      '\docs\plat\arm\fvp\index.rst' causes EL3 exception when the
      image size gets increased (i.e. building with LOG_LEVEL=50)
      but doesn't exceed 0x3B000 not causing build error.
      
      Change-Id: Ie450baaf247f1577112f8d143b24e76c39d33e91
      Signed-off-by: default avatarAlexei Fedorov <Alexei.Fedorov@arm.com>
      6227cca9
  2. 14 Feb, 2020 3 commits
  3. 13 Feb, 2020 4 commits
  4. 12 Feb, 2020 16 commits
  5. 11 Feb, 2020 3 commits
    • Sandrine Bailleux's avatar
      Merge changes from topic "lm/fconf" into integration · 21c4f56f
      Sandrine Bailleux authored
      * changes:
        arm-io: Panic in case of io setup failure
        MISRA fix: Use boolean essential type
        fconf: Add documentation
        fconf: Move platform io policies into fconf
        fconf: Add mbedtls shared heap as property
        fconf: Add TBBR disable_authentication property
        fconf: Add dynamic config DTBs info as property
        fconf: Populate properties from dtb during bl2 setup
        fconf: Load config dtb from bl1
        fconf: initial commit
      21c4f56f
    • Max Shvetsov's avatar
      Fixes ROTPK hash generation for ECDSA encryption · 698e231d
      Max Shvetsov authored
      
      
      Forced hash generation used to always generate hash via RSA encryption.
      This patch changes encryption based on ARM_ROTPK_LOCATION.
      Also removes setting KEY_ALG based on ARM_ROTPL_LOCATION - there is no
      relation between these two.
      Signed-off-by: default avatarMax Shvetsov <maksims.svecovs@arm.com>
      Change-Id: Id727d2ed06176a243719fd0adfa0cae26c325005
      698e231d
    • Olivier Deprez's avatar
      Merge changes from topic "spmd" into integration · 63aa4094
      Olivier Deprez authored
      * changes:
        SPMD: enable SPM dispatcher support
        SPMD: hook SPMD into standard services framework
        SPMD: add SPM dispatcher based upon SPCI Beta 0 spec
        SPMD: add support to run BL32 in TDRAM and BL31 in secure DRAM on Arm FVP
        SPMD: add support for an example SPM core manifest
        SPMD: add SPCI Beta 0 specification header file
      63aa4094
  6. 10 Feb, 2020 13 commits