This patchset adds functionality for enabling the ARM CPU security extensions.
At this time, the only machines supported are Versatile Express and the QEMU
ARM virtual machines both with Cortex A9 & A15.

The patchset establishes the default security state along with adding
overriding controls of the state.  Booting with the "-kernel" QEMU command line
option will start by default in non-secure state with EL3 support disabled.
Booting with the "-bios" QEMU command line option will default to
secure state with EL3 features enabled.  An added "secure" machine property
may be set to either 'on' or 'off' to override this default behavior.  For
example, the below command line syntax would enable security extensions...

    aarch64-softmmu/qemu-system-aarch64
        -machine type=vexpress-a15,secure=on -kernel ...

In order to add the machine specific 'secure' property, the vexpress machine
object creation functionality needed to be updated.  The existing QEMU machine
mechanism was replaced with proper type, class, and instance usage.

Fabian Aggeler (1):
  target-arm: add cpu feature EL3 to CPUs with Security Extensions

Greg Bellows (12):
  target-arm: Add vexpress class and machine types
  target-arm: Add vexpress a9 & a15 machine objects
  target-arm: Switch to common vexpress machine init
  target-arm: Add secure qemu machine option
  target-arm: Add vexpress machine secure property
  target-arm: Change vexpress daughterboard init arg
  target-arm: Add virt class and machine types
  target-arm: Add virt machine secure property
  target-arm: Add feature unset function
  target-arm: Add ARMCPU secure property
  target-arm: Set CPU secure prop during VE init
  target-arm: Set CPU secure prop during virt init

 hw/arm/vexpress.c    | 150 +++++++++++++++++++++++++++++++++++++++++----------
 hw/arm/virt.c        |  87 +++++++++++++++++++++++++++---
 target-arm/cpu-qom.h |   2 +
 target-arm/cpu.c     |  33 ++++++++++++
 vl.c                 |   4 ++
 5 files changed, 242 insertions(+), 34 deletions(-)

--
1.8.3.2


Reply via email to