diff options
author | Etienne Carriere <etienne.carriere@st.com> | 2017-08-09 15:48:53 +0200 |
---|---|---|
committer | Etienne Carriere <etienne.carriere@st.com> | 2017-08-09 15:48:53 +0200 |
commit | 71816096da8e5612cece752d813e10580df9f141 (patch) | |
tree | ead9a6012f806050f68efc5e343e2924a0efb9ba /docs/user-guide.rst | |
parent | 2f860c7815c648393f0604c872d5b39546da6419 (diff) | |
download | platform_external_arm-trusted-firmware-71816096da8e5612cece752d813e10580df9f141.tar.gz platform_external_arm-trusted-firmware-71816096da8e5612cece752d813e10580df9f141.tar.bz2 platform_external_arm-trusted-firmware-71816096da8e5612cece752d813e10580df9f141.zip |
bl32: add secure interrupt handling in AArch32 sp_min
Add support for a minimal secure interrupt service in sp_min for
the AArch32 implementation. Hard code that only FIQs are handled.
Introduce bolean build directive SP_MIN_WITH_SECURE_FIQ to enable
FIQ handling from SP_MIN.
Configure SCR[FIQ] and SCR[FW] from generic code for both cold and
warm boots to handle FIQ in secure state from monitor.
Since SP_MIN architecture, FIQ are always trapped when system executes
in non secure state. Hence discard relay of the secure/non-secure
state in the FIQ handler.
Change-Id: I1f7d1dc7b21f6f90011b7f3fcd921e455592f5e7
Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
Diffstat (limited to 'docs/user-guide.rst')
-rw-r--r-- | docs/user-guide.rst | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/docs/user-guide.rst b/docs/user-guide.rst index ec8c2333e..5b1ec17a2 100644 --- a/docs/user-guide.rst +++ b/docs/user-guide.rst @@ -521,6 +521,13 @@ Common build options firmware images have been loaded in memory, and the MMU and caches are turned off. Refer to the "Debugging options" section for more details. +- ``SP_MIN_WITH_SECURE_FIQ``: Boolean flag to indicate the SP_MIN handles + secure interrupts (caught through the FIQ line). Platforms can enable + this directive if they need to handle such interruption. When enabled, + the FIQ are handled in monitor mode and non secure world is not allowed + to mask these events. Platforms that enable FIQ handling in SP_MIN shall + implement the api ``sp_min_plat_fiq_handler()``. The default value is 0. + - ``TRUSTED_BOARD_BOOT``: Boolean flag to include support for the Trusted Board Boot feature. When set to '1', BL1 and BL2 images include support to load and verify the certificates and images in a FIP, and BL1 includes support |