arm-trusted-firmware/plat/arm/board/common
Soby Mathew b3ba6fda44 Fix BL2 memory map when OP-TEE is the Secure Payload
The commit 3eb2d67 optimizes the memory map for BL2 when TSP
is not present. But this also broke OP-TEE as it was reusing
the TSP mapping. This patch fixes this problem by adding a
separate mapping for OP-TEE in the BL2 memory map table.

Change-Id: I130a2ea552b7b62d8478081feb1f4ddf5292a118
Signed-off-by: Soby Mathew <soby.mathew@arm.com>
2017-09-05 15:03:16 +01:00
..
aarch32 Use SPDX license identifiers 2017-05-03 09:39:28 +01:00
aarch64 Use SPDX license identifiers 2017-05-03 09:39:28 +01:00
drivers/norflash norflash: Add full status check 2017-08-23 10:29:44 +01:00
rotpk TBB: add platform API to read the ROTPK information 2015-06-25 08:53:26 +01:00
board_arm_trusted_boot.c Use CryptoCell to set/get NVcounters and ROTPK 2017-06-28 15:58:06 +01:00
board_common.mk Use CryptoCell to set/get NVcounters and ROTPK 2017-06-28 15:58:06 +01:00
board_css.mk Use SPDX license identifiers 2017-05-03 09:39:28 +01:00
board_css_common.c Fix BL2 memory map when OP-TEE is the Secure Payload 2017-09-05 15:03:16 +01:00