Age | Commit message (Collapse) | Author |
|
The goal is to easily build a version of Cactus that speaks the
MM_COMMUNICATE legacy language, without interfering with the new
SPCI/SPRT interfaces.
This patch introduces the notion of "profile" for Cactus. For now, the
only profile is "legacy". In a subsequent patch we will introduce a
profile for SPCI/SPRT. Profiles are specified on the command line when
building Cactus, e.g.:
> make CACTUS_PROFILE=legacy cactus
The initialisation code is shared amongst all profiles but then each
profile is supposed to provide its own version of the
secure_services_loop() function, which is called from cactus_main().
The profile name is printed in the version string at boot time.
The cactus_sleep() function has been moved to the cactus_helpers.c
file because it will be shared amongst the legacy and SPCI/SPRT
profiles.
Change-Id: Iab1d0ec972f9bd5b818eec6eed131fd0ea328c51
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
|
|
Add support for the first fast secure service in Cactus: the timer
sleep secure service, which allows a caller to request Cactus to
sleep for a certain amount of time.
Change-Id: I85263d33ca570ef08ecc51164ba89d288d1a2cbc
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
|
|
This patch examines the secure_partition_boot_info_t structure passed
from TF to Cactus and makes sure it matches Cactus' expections.
Also add some comments.
Change-Id: I512384003b5192e63cfd9a9ed7cf4ef965090b95
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
|
|
This image performs some boot tests to make sure that the Secure
Partition Manager works correctly. It is introduced as an example of how
to implement and build a Secure Partition using the Trusted Firmware
build system.
This image uses position-independent code so that it can be placed in
all places where the Trusted Firmware supports having a Secure
Partition.
This image is only available for fvp in AArch64 mode.
To compile it:
CROSS_COMPILE=aarch64-linux-gnu- make PLAT=fvp cactus
Change-Id: I636b5e3299ecd4dbae2815a08c7f343a24053568
Co-authored-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Co-authored-by: Douglas Raillard <douglas.raillard@arm.com>
Co-authored-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>
Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>
|