summaryrefslogtreecommitdiff
path: root/cactus/cactus.h
AgeCommit message (Collapse)Author
2018-03-19Cactus: Move legacy MM_COMMUNICATE code in a sub-directorySandrine Bailleux
The goal is to easily build a version of Cactus that speaks the MM_COMMUNICATE legacy language, without interfering with the new SPCI/SPRT interfaces. This patch introduces the notion of "profile" for Cactus. For now, the only profile is "legacy". In a subsequent patch we will introduce a profile for SPCI/SPRT. Profiles are specified on the command line when building Cactus, e.g.: > make CACTUS_PROFILE=legacy cactus The initialisation code is shared amongst all profiles but then each profile is supposed to provide its own version of the secure_services_loop() function, which is called from cactus_main(). The profile name is printed in the version string at boot time. The cactus_sleep() function has been moved to the cactus_helpers.c file because it will be shared amongst the legacy and SPCI/SPRT profiles. Change-Id: Iab1d0ec972f9bd5b818eec6eed131fd0ea328c51 Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
2018-01-22Cactus: Implement timer sleep secure serviceSandrine Bailleux
Add support for the first fast secure service in Cactus: the timer sleep secure service, which allows a caller to request Cactus to sleep for a certain amount of time. Change-Id: I85263d33ca570ef08ecc51164ba89d288d1a2cbc Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
2017-11-23Cactus: Check the boot information data passed by the firmwareSandrine Bailleux
This patch examines the secure_partition_boot_info_t structure passed from TF to Cactus and makes sure it matches Cactus' expections. Also add some comments. Change-Id: I512384003b5192e63cfd9a9ed7cf4ef965090b95 Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
2017-11-06Cactus: Introduce a test Secure PayloadAntonio Nino Diaz
This image performs some boot tests to make sure that the Secure Partition Manager works correctly. It is introduced as an example of how to implement and build a Secure Partition using the Trusted Firmware build system. This image uses position-independent code so that it can be placed in all places where the Trusted Firmware supports having a Secure Partition. This image is only available for fvp in AArch64 mode. To compile it: CROSS_COMPILE=aarch64-linux-gnu- make PLAT=fvp cactus Change-Id: I636b5e3299ecd4dbae2815a08c7f343a24053568 Co-authored-by: Sandrine Bailleux <sandrine.bailleux@arm.com> Co-authored-by: Douglas Raillard <douglas.raillard@arm.com> Co-authored-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com> Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>