1. 02 May, 2019 1 commit
    • Christoph Müllner's avatar
      build_macros: Add mechanism to prevent bin generation. · 9e4609f1
      Christoph Müllner authored
      
      
      On certain platforms it does not make sense to generate
      TF-A binary images. For example a platform could make use of serveral
      memory areas, which are non-continuous and the resulting binary
      therefore would suffer from the padding-bytes.
      Typically these platforms use the ELF image.
      
      This patch introduces a variable DISABLE_BIN_GENERATION, which
      can be set to '1' in the platform makefile to prevent the binary
      generation.
      Signed-off-by: default avatarChristoph Müllner <christophm30@gmail.com>
      Change-Id: I62948e88bab685bb055fe6167d9660d14e604462
      9e4609f1
  2. 30 Apr, 2019 1 commit
    • Louis Mayencourt's avatar
      Add support for default stack-protector flag · fd7b287c
      Louis Mayencourt authored
      
      
      The current stack-protector support is for none, "strong" or "all".
      The default use of the flag enables the stack-protection to all
      functions that declare a character array of eight bytes or more in
      length on their stack.
      This option can be tuned with the --param=ssp-buffer-size=N option.
      
      Change-Id: I11ad9568187d58de1b962b8ae04edd1dc8578fb0
      Signed-off-by: default avatarLouis Mayencourt <louis.mayencourt@arm.com>
      fd7b287c
  3. 26 Apr, 2019 1 commit
  4. 25 Apr, 2019 2 commits
  5. 23 Apr, 2019 1 commit
    • Yann Gautier's avatar
      stm32mp1: add OP-TEE support · 1989a19c
      Yann Gautier authored
      
      
      Support booting OP-TEE as BL32 boot stage and secure runtime
      service.
      
      OP-TEE executes in internal RAM and uses a secure DDR area to store
      the pager pagestore. Memory mapping and TZC are configured accordingly
      prior OP-TEE boot. OP-TEE image is expected in OP-TEE v2 format where
      a header file describes the effective boot images. This change
      post processes header file content to get OP-TEE load addresses
      and set OP-TEE boot arguments.
      
      Change-Id: I02ef8b915e4be3e95b27029357d799d70e01cd44
      Signed-off-by: default avatarYann Gautier <yann.gautier@st.com>
      Signed-off-by: default avatarEtienne Carriere <etienne.carriere@st.com>
      1989a19c
  6. 18 Apr, 2019 1 commit
  7. 17 Apr, 2019 2 commits
  8. 12 Apr, 2019 2 commits
  9. 11 Apr, 2019 1 commit
  10. 08 Apr, 2019 2 commits
  11. 05 Apr, 2019 1 commit
    • Paul Beesley's avatar
      doc: Fix heading levels for changelog · c48991e1
      Paul Beesley authored
      
      
      The change-log.rst file does not use the same symbols
      as the other documents when organising its headings,
      sub-headings and so on. In order to compile these
      documents together with Sphinx, forming a top-level
      index and a consistent structure, it is necessary to
      normalise these.
      
      Change-Id: Ib4620ff03a9e76fec9e36e95549016c7b3fe12bb
      Signed-off-by: default avatarPaul Beesley <paul.beesley@arm.com>
      c48991e1
  12. 02 Apr, 2019 2 commits
  13. 29 Mar, 2019 2 commits
  14. 28 Mar, 2019 2 commits
  15. 27 Mar, 2019 1 commit
  16. 26 Mar, 2019 2 commits
    • Ambroise Vincent's avatar
      docs: Update user guide · 68126051
      Ambroise Vincent authored
      
      
      Make sure the steps in the user guide are up to date and can be
      performed out of the box.
      
      Change-Id: Ib4d959aa771cf515f74e150aaee2fbad24c18c38
      Signed-off-by: default avatarAmbroise Vincent <ambroise.vincent@arm.com>
      68126051
    • Paul Beesley's avatar
      doc: Add contents.rst to link to pages · 9dc5f21e
      Paul Beesley authored
      
      
      This is the temporary contents page that links
      to all other documents (except platform ports).
      
      This page is needed during the
      trustedfirmware.org migration, before we have a
      Sphinx rendering pipeline set up, because cgit
      doesn't offer a good way to view rendered docs
      while browsing the tree. We need to have a links
      page that can be opened from the cgit 'about'
      view.
      
      Change-Id: I3ad87a9fa8a14dc8e371aac7ee473575fed316bf
      Signed-off-by: default avatarPaul Beesley <paul.beesley@arm.com>
      9dc5f21e
  17. 21 Mar, 2019 1 commit
    • John Tsichritzis's avatar
      ROMLIB bug fixes · ae2e01b8
      John Tsichritzis authored
      
      
      Fixed the below bugs:
      1) Bug related to build flag V=1: if the flag was V=0, building with
      ROMLIB would fail.
      2) Due to a syntax bug in genwrappers.sh, index file entries marked as
      "patch" or "reserved" were ignored.
      3) Added a prepending hash to constants that genwrappers is generating.
      4) Due to broken dependencies, currently the inclusion functionality is
      intentionally not utilised. This is why the contents of romlib/jmptbl.i
      have been copied to platform specific jmptbl.i files. As a result of the
      broken dependencies, when changing the index files, e.g. patching
      functions, a clean build is always required. This is a known issue that
      will be fixed in the future.
      
      Change-Id: I9d92aa9724e86d8f90fcd3e9f66a27aa3cab7aaa
      Signed-off-by: default avatarJohn Tsichritzis <john.tsichritzis@arm.com>
      ae2e01b8
  18. 19 Mar, 2019 1 commit
  19. 18 Mar, 2019 1 commit
    • Alexei Fedorov's avatar
      Declare PAuth for Secure world as experimental · 06715f85
      Alexei Fedorov authored
      
      
      Declare ENABLE_PAUTH and CTX_INCLUDE_PAUTH_REGS
      build options as experimental.
      Pointer Authentication is enabled for Non-secure world
      irrespective of the value of these build flags if the
      CPU supports it.
      The patch also fixes the description of fiptool 'help' command.
      
      Change-Id: I46de3228fbcce774a2624cd387798680d8504c38
      Signed-off-by: default avatarAlexei Fedorov <Alexei.Fedorov@arm.com>
      06715f85
  20. 14 Mar, 2019 1 commit
  21. 13 Mar, 2019 5 commits
  22. 12 Mar, 2019 1 commit
  23. 07 Mar, 2019 4 commits
  24. 06 Mar, 2019 1 commit
  25. 01 Mar, 2019 1 commit