Hi,
See build options here: https://trustedfirmware-a.readthedocs.io/en/latest/components/secure-partiti...
I'd suggest starting from the reference proposed by TF-A/TF-A-tests.
Build Hafnium: make PROJECT=reference
Build TF-A-tests: make CROSS_COMPILE=aarch64-none-elf- PLAT=fvp DEBUG=1 TESTS=spm -j8
Build TF-A: make CROSS_COMPILE=aarch64-none-elf- SPD=spmd CTX_INCLUDE_EL2_REGS=1 ARM_ARCH_MINOR=5 BRANCH_PROTECTION=1 CTX_INCLUDE_PAUTH_REGS=1 PLAT=fvp DEBUG=1 BL33=../tf-a-tests/build/fvp/debug/tftf.bin BL32=../hafnium/out/reference/secure_aem_v8a_fvp_clang/hafnium.bin SP_LAYOUT_FILE=../tf-a-tests/build/fvp/debug/sp_layout.json all fip
BL33 points to the nwd payload (here TFTF, but can be UEFI or uboot) BL32 points to hafnium binary (built for SPMC) SP_LAYOUT_FILE describes the partitions (path to image payload and manifest). Update the first entry to your own kernel and rebuild TF-A.
"cactus-primary" : { "image": "kernel.bin", "pm": "kernel.dts", "owner": "SiP" },
Regards, Olivier.
________________________________________ From: Friedrich via Hafnium hafnium@lists.trustedfirmware.org Sent: 18 February 2022 05:02 To: Hafnium@lists.trustedfirmware.org Subject: [Hafnium] S-EL1
How can I run my kernel in S-EL1 using hafnium?
Best, Friedrich -- Hafnium mailing list -- hafnium@lists.trustedfirmware.org To unsubscribe send an email to hafnium-leave@lists.trustedfirmware.org