mirror of
https://github.com/CTCaer/switch-l4t-atf.git
synced 2024-12-04 08:53:37 +00:00
Merge "fix: remove "experimental" tag for stable features" into integration
This commit is contained in:
commit
292bb9a768
26
Makefile
26
Makefile
@ -150,8 +150,6 @@ endif
|
||||
ifeq (${USE_SPINLOCK_CAS},1)
|
||||
ifneq (${ARCH},aarch64)
|
||||
$(error USE_SPINLOCK_CAS requires AArch64)
|
||||
else
|
||||
$(info USE_SPINLOCK_CAS is an experimental feature)
|
||||
endif
|
||||
endif
|
||||
|
||||
@ -525,7 +523,6 @@ ifneq (${SPD},none)
|
||||
endif
|
||||
|
||||
ifeq (${SPD},spmd)
|
||||
$(warning "SPMD is an experimental feature")
|
||||
# SPMD is located in std_svc directory
|
||||
SPD_DIR := std_svc
|
||||
|
||||
@ -731,12 +728,7 @@ endif
|
||||
|
||||
# SDEI_IN_FCONF is only supported when SDEI_SUPPORT is enabled.
|
||||
ifeq ($(SDEI_SUPPORT)-$(SDEI_IN_FCONF),0-1)
|
||||
$(error "SDEI_IN_FCONF is an experimental feature and is only supported when \
|
||||
SDEI_SUPPORT is enabled")
|
||||
endif
|
||||
|
||||
ifeq ($(COT_DESC_IN_DTB),1)
|
||||
$(info CoT in device tree is an experimental feature)
|
||||
$(error "SDEI_IN_FCONF is only supported when SDEI_SUPPORT is enabled")
|
||||
endif
|
||||
|
||||
# If pointer authentication is used in the firmware, make sure that all the
|
||||
@ -751,24 +743,12 @@ endif
|
||||
ifeq ($(CTX_INCLUDE_PAUTH_REGS),1)
|
||||
ifneq (${ARCH},aarch64)
|
||||
$(error CTX_INCLUDE_PAUTH_REGS requires AArch64)
|
||||
else
|
||||
$(info CTX_INCLUDE_PAUTH_REGS is an experimental feature)
|
||||
endif
|
||||
endif
|
||||
|
||||
ifeq ($(ENABLE_PAUTH),1)
|
||||
$(info Pointer Authentication is an experimental feature)
|
||||
endif
|
||||
|
||||
ifeq ($(ENABLE_BTI),1)
|
||||
$(info Branch Protection is an experimental feature)
|
||||
endif
|
||||
|
||||
ifeq ($(CTX_INCLUDE_MTE_REGS),1)
|
||||
ifneq (${ARCH},aarch64)
|
||||
$(error CTX_INCLUDE_MTE_REGS requires AArch64)
|
||||
else
|
||||
$(info CTX_INCLUDE_MTE_REGS is an experimental feature)
|
||||
endif
|
||||
endif
|
||||
|
||||
@ -778,8 +758,6 @@ endif
|
||||
ifeq ($(MEASURED_BOOT),1)
|
||||
ifneq (${TRUSTED_BOARD_BOOT},1)
|
||||
$(error MEASURED_BOOT requires TRUSTED_BOARD_BOOT=1)
|
||||
else
|
||||
$(info MEASURED_BOOT is an experimental feature)
|
||||
endif
|
||||
endif
|
||||
|
||||
@ -796,8 +774,6 @@ endif
|
||||
ifneq (${DECRYPTION_SUPPORT},none)
|
||||
ifeq (${TRUSTED_BOARD_BOOT}, 0)
|
||||
$(error TRUSTED_BOARD_BOOT must be enabled for DECRYPTION_SUPPORT to be set)
|
||||
else
|
||||
$(info DECRYPTION_SUPPORT is an experimental feature)
|
||||
endif
|
||||
endif
|
||||
|
||||
|
@ -74,7 +74,7 @@ Current features
|
||||
loading of a hardware configuration (for example, a kernel device tree)
|
||||
as part of the FIP, to be passed through the firmware stages.
|
||||
This feature is now incorporated inside the firmware configuration framework
|
||||
(fconf), which is still flagged as experimental.
|
||||
(fconf).
|
||||
|
||||
- Support for alternative boot flows, for example to support platforms where
|
||||
the EL3 Runtime Software is loaded using other firmware or a separate
|
||||
@ -94,9 +94,7 @@ Current features
|
||||
- Support for ARMv8.3 pointer authentication in the normal and secure worlds.
|
||||
The use of pointer authentication in the normal world is enabled whenever
|
||||
architectural support is available, without the need for additional build
|
||||
flags. Use of pointer authentication in the secure world remains an
|
||||
experimental configuration at this time and requires the
|
||||
``BRANCH_PROTECTION`` option to be set to non-zero.
|
||||
flags.
|
||||
|
||||
- Position-Independent Executable (PIE) support. Currently for BL2, BL31, and
|
||||
TSP, with further support to be added in a future release.
|
||||
|
@ -2616,8 +2616,6 @@ Armv8.3-A
|
||||
``CTX_INCLUDE_PAUTH_REGS`` to 1. This enables pointer authentication in BL1,
|
||||
BL2, BL31, and the TSP if it is used.
|
||||
|
||||
These options are experimental features.
|
||||
|
||||
Note that Pointer Authentication is enabled for Non-secure world irrespective
|
||||
of the value of these build flags if the CPU supports it.
|
||||
|
||||
@ -2629,8 +2627,7 @@ Armv8.5-A
|
||||
~~~~~~~~~
|
||||
|
||||
- Branch Target Identification feature is selected by ``BRANCH_PROTECTION``
|
||||
option set to 1. This option defaults to 0 and this is an experimental
|
||||
feature.
|
||||
option set to 1. This option defaults to 0.
|
||||
|
||||
- Memory Tagging Extension feature is unconditionally enabled for both worlds
|
||||
(at EL0 and S-EL0) if it is only supported at EL0. If instead it is
|
||||
|
@ -239,9 +239,6 @@ optionally enabled on platforms to implement the optional requirement:
|
||||
R060_TBBR_FUNCTION as specified in the `Trusted Board Boot Requirements (TBBR)`_
|
||||
document.
|
||||
|
||||
Note that due to security considerations and complexity of this feature, it is
|
||||
marked as experimental.
|
||||
|
||||
Firmware Encryption Tool
|
||||
------------------------
|
||||
|
||||
|
@ -120,7 +120,7 @@ Common build options
|
||||
| 4 | bti | N | Y |
|
||||
+-------+--------------+-------+-----+
|
||||
|
||||
This option defaults to 0 and this is an experimental feature.
|
||||
This option defaults to 0.
|
||||
Note that Pointer Authentication is enabled for Non-secure world
|
||||
irrespective of the value of this option if the CPU supports it.
|
||||
|
||||
@ -181,7 +181,7 @@ Common build options
|
||||
- ``CTX_INCLUDE_PAUTH_REGS``: Boolean option that, when set to 1, enables
|
||||
Pointer Authentication for Secure world. This will cause the ARMv8.3-PAuth
|
||||
registers to be included when saving and restoring the CPU context as
|
||||
part of world switch. Default value is 0 and this is an experimental feature.
|
||||
part of world switch. Default value is 0.
|
||||
Note that Pointer Authentication is enabled for Non-secure world irrespective
|
||||
of the value of this flag if the CPU supports it.
|
||||
|
||||
@ -192,7 +192,7 @@ Common build options
|
||||
authenticated decryption algorithm to be used to decrypt firmware/s during
|
||||
boot. It accepts 2 values: ``aes_gcm`` and ``none``. The default value of
|
||||
this flag is ``none`` to disable firmware decryption which is an optional
|
||||
feature as per TBBR. Also, it is an experimental feature.
|
||||
feature as per TBBR.
|
||||
|
||||
- ``DISABLE_BIN_GENERATION``: Boolean option to disable the generation
|
||||
of the binary image. If set to 1, then only the ELF image is built.
|
||||
@ -312,20 +312,18 @@ Common build options
|
||||
component of the option ``-fstack-protector-$ENABLE_STACK_PROTECTOR``.
|
||||
|
||||
- ``ENCRYPT_BL31``: Binary flag to enable encryption of BL31 firmware. This
|
||||
flag depends on ``DECRYPTION_SUPPORT`` build flag which is marked as
|
||||
experimental.
|
||||
flag depends on ``DECRYPTION_SUPPORT`` build flag.
|
||||
|
||||
- ``ENCRYPT_BL32``: Binary flag to enable encryption of Secure BL32 payload.
|
||||
This flag depends on ``DECRYPTION_SUPPORT`` build flag which is marked as
|
||||
experimental.
|
||||
This flag depends on ``DECRYPTION_SUPPORT`` build flag.
|
||||
|
||||
- ``ENC_KEY``: A 32-byte (256-bit) symmetric key in hex string format. It could
|
||||
either be SSK or BSSK depending on ``FW_ENC_STATUS`` flag. This value depends
|
||||
on ``DECRYPTION_SUPPORT`` build flag which is marked as experimental.
|
||||
on ``DECRYPTION_SUPPORT`` build flag.
|
||||
|
||||
- ``ENC_NONCE``: A 12-byte (96-bit) encryption nonce or Initialization Vector
|
||||
(IV) in hex string format. This value depends on ``DECRYPTION_SUPPORT``
|
||||
build flag which is marked as experimental.
|
||||
build flag.
|
||||
|
||||
- ``ERROR_DEPRECATED``: This option decides whether to treat the usage of
|
||||
deprecated platform APIs, helper functions or drivers within Trusted
|
||||
@ -364,8 +362,7 @@ Common build options
|
||||
1: Encryption is done with Binding Secret Symmetric Key (BSSK) which is
|
||||
unique per device.
|
||||
|
||||
This flag depends on ``DECRYPTION_SUPPORT`` build flag which is marked as
|
||||
experimental.
|
||||
This flag depends on ``DECRYPTION_SUPPORT`` build flag.
|
||||
|
||||
- ``GENERATE_COT``: Boolean flag used to build and execute the ``cert_create``
|
||||
tool to create certificates as per the Chain of Trust described in
|
||||
@ -484,8 +481,7 @@ Common build options
|
||||
in order to provide trust that the code taking the measurements and recording
|
||||
them has not been tampered with.
|
||||
|
||||
This option defaults to 0 and is an experimental feature in the stage of
|
||||
development.
|
||||
This option defaults to 0.
|
||||
|
||||
- ``NON_TRUSTED_WORLD_KEY``: This option is used when ``GENERATE_COT=1``. It
|
||||
specifies the file that contains the Non-Trusted World private key in PEM
|
||||
@ -695,26 +691,25 @@ Common build options
|
||||
- ``ARM_IO_IN_DTB``: This flag determines whether to use IO based on the
|
||||
firmware configuration framework. This will move the io_policies into a
|
||||
configuration device tree, instead of static structure in the code base.
|
||||
This is currently an experimental feature.
|
||||
|
||||
- ``COT_DESC_IN_DTB``: This flag determines whether to create COT descriptors
|
||||
at runtime using fconf. If this flag is enabled, COT descriptors are
|
||||
statically captured in tb_fw_config file in the form of device tree nodes
|
||||
and properties. Currently, COT descriptors used by BL2 are moved to the
|
||||
device tree and COT descriptors used by BL1 are retained in the code
|
||||
base statically. This is currently an experimental feature.
|
||||
base statically.
|
||||
|
||||
- ``SDEI_IN_FCONF``: This flag determines whether to configure SDEI setup in
|
||||
runtime using firmware configuration framework. The platform specific SDEI
|
||||
shared and private events configuration is retrieved from device tree rather
|
||||
than static C structures at compile time. This is currently an experimental
|
||||
feature and is only supported if SDEI_SUPPORT build flag is enabled.
|
||||
than static C structures at compile time. This is only supported if
|
||||
SDEI_SUPPORT build flag is enabled.
|
||||
|
||||
- ``SEC_INT_DESC_IN_FCONF``: This flag determines whether to configure Group 0
|
||||
and Group1 secure interrupts using the firmware configuration framework. The
|
||||
platform specific secure interrupt property descriptor is retrieved from
|
||||
device tree in runtime rather than depending on static C structure at compile
|
||||
time. This is currently an experimental feature.
|
||||
time.
|
||||
|
||||
- ``USE_ROMLIB``: This flag determines whether library at ROM will be used.
|
||||
This feature creates a library of functions to be placed in ROM and thus
|
||||
|
@ -891,8 +891,7 @@ symmetric key/identifier using img_id.
|
||||
|
||||
On success the function should return 0 and a negative error code otherwise.
|
||||
|
||||
Note that this API depends on ``DECRYPTION_SUPPORT`` build flag which is
|
||||
marked as experimental.
|
||||
Note that this API depends on ``DECRYPTION_SUPPORT`` build flag.
|
||||
|
||||
Function : plat_fwu_set_images_source() [when PSA_FWU_SUPPORT == 1]
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
@ -18,8 +18,6 @@
|
||||
#include "../common/gic_common_private.h"
|
||||
#include "gic600_multichip_private.h"
|
||||
|
||||
#warning "GIC-600 Multichip driver is currently experimental and the API may change in future."
|
||||
|
||||
/*******************************************************************************
|
||||
* GIC-600 multichip operation related helper functions
|
||||
******************************************************************************/
|
||||
@ -212,8 +210,6 @@ void gic600_multichip_init(struct gic600_multichip_data *multichip_data)
|
||||
|
||||
gic600_multichip_validate_data(multichip_data);
|
||||
|
||||
INFO("GIC-600 Multichip driver is experimental\n");
|
||||
|
||||
/*
|
||||
* Ensure that G0/G1S/G1NS interrupts are disabled. This also ensures
|
||||
* that GIC-600 Multichip configuration is done first.
|
||||
|
Loading…
Reference in New Issue
Block a user