AArch64 OpenEmbedded ARM Fast Models 13.09 Release
The AArch64 Open Embedded Engineering Build for ARM Fast Models for ARMv8 is produced, validated and released by Linaro, based on the latest AArch64 open source software from Tianocore EDK2 (UEFI), the Linux kernel, ARM Trusted Firmware and OpenEmbedded. It is produced to enable software development for AArch64 prior to hardware availability, and facilitates development of software that is independent of the specific CPU implementation. This build focuses on availability of new features in order to provide a basis for ongoing and dependent software development.
Linaro releases monthly binary images of this engineering build. This release includes Linaro OpenEmbedded images for Foundation, Versatile Express and FVP Base fast models from ARM. Sources are also made available so you can build your own images.
About the AArch64 OpenEmbedded Engineering Build
This release now supports the new (as of September 2013) FVP Base fast model platforms from ARM, in addition to the existing Foundation (Foundation_v8) and Versatile Express (RTSM_VE_AEMv8A) model platforms.
The ‘Base’ platform is an evolution from the Versatile Express (VE) platform that is better able to support new system IP, larger memory maps and larger numbers of cores. The changes in the Base platform memory map require that software or device trees which specify peripheral addresses may need to be modified for the Base platform models. New Device trees for these models are included in this release.
This build has been tested to work on the following Fast Model platforms:
The Foundation_v8 model is free to use (download from ARM http://www.arm.com/fvp), while the others are licensed from ARM. More information on these specific model platforms is included with this release documentation.
The introduction of the Base platform models sees the introduction of additional software in this engineering build:
- ARM Trusted Firmware which provides secure boot and runtime firmware
- Tianocore EDK2 which provides a UEFI based boot environment for the non-secure operating system or hypervisor (in this case, Linux)
The Foundation_v8 and RTSM_VE_AEMv8A models continue to be booted using the AArch64 Linux boot-wrapper.
The ARM Trusted Firmware is a prototype implementation, currently providing a partial implementation of ARM’s Power State Coordination Interface (PSCI) specification. It also provides configuration of the prototype GICv3 interrupt controller (present in the FVP_Base_AEMv8A-AEMv8A) to enable OS and hypervisor driver development for GICv3.
ARM intends to make its Trusted Firmware open source and continue development to provide a full reference implementation of PSCI and an example of Trusted Board Boot for ARMv8 platforms. More details on the Trusted Firmware can be found elsewhere in this documentation.
The same kernel image is used for all of these models, though the Foundation_v8 and RTSM_VE_AEMv8A images are encapsulated as previously by the kernel boot-wrapper.
Where To Find More Information
More information on Linaro can be found on our website.
More information on ARM Fast Models can be found on ARM’s website: http://www.arm.com/fastmodels
More information on ARM Trusted Firmware and Platform Design Documents (PDDs) can be found elsewhere in this documentation.
More information on building UEFI for AArch64 can be found on Linaro’s wiki: https://wiki.linaro.org/LEG/Engineering/Kernel/UEFI/build..
Feedback and Support
For support matters related to ARMv8 fast models downloaded from ARM sites, please contact ARM Support.
Subscribe to the important Linaro mailing lists and join our IRC channels to stay on top of Linaro development.
- Linaro Development mailing list
- Linaro IRC channel on irc.freenode.net at
- Bug reports should be filed in Launchpad to Linaro OpenEmbedded project.
- Questions? ask Linaro.
- Interested in commercial support? inquire at Linaro support
Changes in this release
- Update to Linaro GCC 4.8-2013.09 release
- Support for new Base platform fast models
- Addition of ARM Trusted Firmware binaries for secure boot and runtime services in Base platform models
- Addition of UEFI for non-secure boot in Base platform models
- Linux CPU hotplug support
- Linux KVM support is configured into the kernel image
- minimal-initramfs image for accelerating LAVA deployments added
- Qemu added and updated to follow git HEAD
- LNG images: added calibrator, fping, qemu and openvswitch
- LEG image: openjdk fixes and updates
- Preliminary ALIP recipe with matchbox, gator and firefox
- Bigendian ARMv7 kernel available
- Linaro images now also need meta-gnome, meta-browser and meta-virtualization layers
Linaro OpenEmbedded released are made up of the following components.
- a hardware pack supporting Foundation, VE and FVP Base Models
- a choice of Root file system (RootFS) images
- The Linux kernel file with and out boot wrapper shims, depending on the version of the model you are using
Using pre-built image
- Ubuntu 12.04 64 bit or newer on your desktop PC (www.ubuntu.com)
- Foundation, Versatile Express or Base platform fast model (Linaro ARMv8 Engineering)
- Artifacts for this release downloaded from the above list.
- 13.09 linaro-image-tools or later
Build Your Own Image
Installing Linaro Image Tools
There are multiple ways you can get the latest Linaro Image Tools:
- Method 1: Install them from the Linaro Image Tools PPA
sudo add-apt-repository ppa:linaro-maintainers/tools sudo apt-get update sudo apt-get install linaro-image-tools
- Method 2: Install from release tarball
cd <installation directory> wget http://releases.linaro.org/13.09/components/platform/linaro-image-tools/linaro-image-tools-2013.09.tar.gz tar zxvf linaro-image-tools-2013.09.tar.gz PATH=`pwd`/linaro-image-tools/2013.09:$PATH
- Method 3: Building from the BZR repository
cd <working direcory> bzr branch lp:linaro-image-tools PATH=`pwd`/linaro-image-tools:$PATH
Creating a disk image
- Download the hardware pack (hwpack-*.tar.gz) from the above list
- Download the rootfs (linaro-*.tar.gz) of your choice from the above list, LAMP is usually a good selection for a more fully featured disk image
- Create the image
linaro-media-create --dev fastmodel --output-directory fastmodel --image_size 2000M --hwpack <hwpack filename> --binary <rootfs filename>
Booting the image on the FVP Base AEMv8 model
cd fastmodel <path to model installation>/models/Linux64_GCC-4.1/FVP_Base_AEMv8A-AEMv8A \ -C pctl.startup=0.0.0.0 \ -C bp.secure_memory=0 \ -C cluster0.NUM_CORES=4 \ -C cluster1.NUM_CORES=4 \ -C cache_state_modelled=1 \ -C bp.pl011_uart0.untimed_fifos=1 \ -C bp.secureflashloader.fname=bl1.bin \ -C bp.flashloader0.fname=uefi_fvp-base.bin \ -C bp.virtioblockdevice.image_path=sd.img
Booting the image on the FVP Base Cortex model
To boot the A57×1 + A53×1 model:
cd fastmodel <path to model installation>/models/Linux64_GCC-4.1/FVP_Base_Cortex-A57x1-A53x1 \ -C pctl.startup=0.0.0.0 \ -C bp.secure_memory=0 \ -C cache_state_modelled=1 \ -C bp.pl011_uart0.untimed_fifos=1 \ -C bp.secureflashloader.fname=bl1.bin \ -C bp.flashloader0.fname=uefi_fvp-base.bin \ -C bp.virtioblockdevice.image_path=sd.img
To boot the A57×4 + A53×4 model, use the same command, only specify a different model binary:
cd fastmodel <path to model installation>/models/Linux64_GCC-4.1/FVP_Base_Cortex-A57x4-A53x4 \ -C pctl.startup=0.0.0.0 \ -C bp.secure_memory=0 \ -C cache_state_modelled=1 \ -C bp.pl011_uart0.untimed_fifos=1 \ -C bp.secureflashloader.fname=bl1.bin \ -C bp.flashloader0.fname=uefi_fvp-base.bin \ -C bp.virtioblockdevice.image_path=sd.img
Using Ethernet networking with the FVP Base Models
To enable networking in the FVP models, you should install a network TAP on your local machine. See the Fast Models User Guide for more information on setting up a TAP for use with the models.
Then, with the network TAP enabled, run with model as above, but with these additional parameters
-C bp.hostbridge.interfaceName=ARM$USER \ -C bp.smsc_91c111.enabled=true \ -C bp.smsc_91c111.mac_address=<MAC address, eg, 00:11:22:33:44:55>
Booting the image on the Foundation Model
If you are using the Foundation Model and wish to use a pre-built image, you can simply unzip the downloaded pre-built image and the img-foundation.axf file and run the following command:
<path to model installation>/Foundation_v8 --image img-foundation.axf \ --block-device vexpress64-openembedded_IMAGENAME-armv8_IMAGEDATE-XYZ.img \ --network nat
To use the image you built with linaro-media-create in the steps above, run this command:
<path to model installation>/Foundation_v8 --image img-foundation.axf \ --block-device fastmodel/sd.img \ --network nat
ARM Trusted Firmware
The ARM Trusted Firmware is designed to implement the trusted (or secure) boot and runtime firmware needed for ARMv8 Base platform models, and provide a reference implementation of various ARM interface standards, such as the Power State Coordination Interface (PSCI) and Trusted Board Boot Requirements (TBBR). It executes entirely in the ARMv8 secure states (aka ARM TrustZone): EL3 and Secure-EL1.
This release includes a binary, prototype implementation of ARM Trusted Firmware. Only limited functionality is provided at this time. It has not been optimized or subjected to extended robustness or stress testing.
ARM intends to make the Trusted Firmware open source and continue development to provide a full reference implementation of PSCI and an example of Trusted Board Boot for ARMv8 platforms
Copyright © 2013, ARM Limited. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
- Neither the name of ARM nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
About ARM Trusted Firmware
The Trusted Firmware implements a subset of the Trusted Board Boot Requirements (TBBR) Platform Design Document (PDD1) for ARM reference platforms. The TBB sequence starts when the platform is powered on and runs up to the stage where it hands-off control to firmware running in the non-trusted world in non-trusted DRAM. This is the cold boot path.
The ARM Trusted Firmware also implements the Power State Coordination Interface (PSCI) PDD2 as a runtime service. PSCI is the interface from non-trusted world software to firmware implementing power management use-cases (for example, secondary CPU boot, hotplug and idle). Non-trusted world software can access ARM Trusted Firmware runtime services via the ARM `SMC` (Secure Monitor Call) instruction. The `SMC` instruction must be used as mandated by the SMC Calling Convention PDD3.
- Initial implementation of a subset of the Trusted Board Boot Requirements (TBBR) Platform Design Document (PDD).
- Initializes the trusted world (for example, exception vectors, control registers, GIC and interrupts for the platform), before transitioning into the non-trusted world.
- Supports both GICv2 and GICv3 initialization for use by non-trusted world software.
- Handles SMCs (Secure Monitor Calls) conforming to the SMC Calling Convention Platform Design Document (PDD).
- Handles SMCs relating to the Power State Coordination Interface (PSCI) PDD for the Secondary CPU Boot and hotplug use-cases only.
The following is a list of issues which are expected to be fixed in the future
releases of the ARM Trusted Firmware.
- ARM Trusted Firmware does not have support for the TrustZone Address Space Controller (TZC-400). Use of `-C bp.secure_memory=1` is not supported.
- No support for trusted world interrupt handling or switching context between trusted and non-trusted worlds in EL3.
- PSCI api calls `AFFINITY_INFO` & `PSCI_VERSION` are implemented but have not been tested.
- The “psci” nodes in the FDTs provided in this release do not fully comply with the recommendations made in the PSCI specification. There are minor mistakes in the FDT definitions that do not match the functionality provided by the ARM Trusted Firmware.
References: ARM Platform Design Documents (PDDs)
1 Trusted Board Boot Requirements CLIENT PDD (ARM DEN 0006B-5):
Available under NDA from ARM.
2 Power State Coordination Interface PDD (ARM DEN 0022B.b):
3 SMC Calling Convention PDD (ARM DEN 0028A):