aboutsummaryrefslogtreecommitdiffstats
path: root/docs/user-guide.rst
diff options
context:
space:
mode:
authorEtienne Carriere <etienne.carriere@st.com>2017-08-09 15:48:53 +0200
committerEtienne Carriere <etienne.carriere@st.com>2017-08-09 15:48:53 +0200
commit71816096da8e5612cece752d813e10580df9f141 (patch)
treeead9a6012f806050f68efc5e343e2924a0efb9ba /docs/user-guide.rst
parent2f860c7815c648393f0604c872d5b39546da6419 (diff)
downloadplatform_external_arm-trusted-firmware-71816096da8e5612cece752d813e10580df9f141.tar.gz
platform_external_arm-trusted-firmware-71816096da8e5612cece752d813e10580df9f141.tar.bz2
platform_external_arm-trusted-firmware-71816096da8e5612cece752d813e10580df9f141.zip
bl32: add secure interrupt handling in AArch32 sp_min
Add support for a minimal secure interrupt service in sp_min for the AArch32 implementation. Hard code that only FIQs are handled. Introduce bolean build directive SP_MIN_WITH_SECURE_FIQ to enable FIQ handling from SP_MIN. Configure SCR[FIQ] and SCR[FW] from generic code for both cold and warm boots to handle FIQ in secure state from monitor. Since SP_MIN architecture, FIQ are always trapped when system executes in non secure state. Hence discard relay of the secure/non-secure state in the FIQ handler. Change-Id: I1f7d1dc7b21f6f90011b7f3fcd921e455592f5e7 Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
Diffstat (limited to 'docs/user-guide.rst')
-rw-r--r--docs/user-guide.rst7
1 files changed, 7 insertions, 0 deletions
diff --git a/docs/user-guide.rst b/docs/user-guide.rst
index ec8c2333e..5b1ec17a2 100644
--- a/docs/user-guide.rst
+++ b/docs/user-guide.rst
@@ -521,6 +521,13 @@ Common build options
firmware images have been loaded in memory, and the MMU and caches are
turned off. Refer to the "Debugging options" section for more details.
+- ``SP_MIN_WITH_SECURE_FIQ``: Boolean flag to indicate the SP_MIN handles
+ secure interrupts (caught through the FIQ line). Platforms can enable
+ this directive if they need to handle such interruption. When enabled,
+ the FIQ are handled in monitor mode and non secure world is not allowed
+ to mask these events. Platforms that enable FIQ handling in SP_MIN shall
+ implement the api ``sp_min_plat_fiq_handler()``. The default value is 0.
+
- ``TRUSTED_BOARD_BOOT``: Boolean flag to include support for the Trusted Board
Boot feature. When set to '1', BL1 and BL2 images include support to load
and verify the certificates and images in a FIP, and BL1 includes support